diff --git a/CHANGES.md b/CHANGES.md index f7d60ea88..b3de079e9 100644 --- a/CHANGES.md +++ b/CHANGES.md @@ -1,101 +1,708 @@ # **Linux Kernel CVE Changes** -## Last Update - 25Feb24 00:13 +## Last Update - 09Apr24 14:45 ### **New CVEs Added:** -[CVE-2023-52429](cves/CVE-2023-52429) -[CVE-2023-52433](cves/CVE-2023-52433) +[CVE-2019-25160](cves/CVE-2019-25160) +[CVE-2019-25162](cves/CVE-2019-25162) +[CVE-2020-36775](cves/CVE-2020-36775) +[CVE-2020-36776](cves/CVE-2020-36776) +[CVE-2020-36777](cves/CVE-2020-36777) +[CVE-2020-36778](cves/CVE-2020-36778) +[CVE-2020-36779](cves/CVE-2020-36779) +[CVE-2020-36780](cves/CVE-2020-36780) +[CVE-2020-36781](cves/CVE-2020-36781) +[CVE-2020-36782](cves/CVE-2020-36782) +[CVE-2020-36783](cves/CVE-2020-36783) +[CVE-2020-36784](cves/CVE-2020-36784) +[CVE-2020-36785](cves/CVE-2020-36785) +[CVE-2020-36786](cves/CVE-2020-36786) +[CVE-2020-36787](cves/CVE-2020-36787) +[CVE-2021-46904](cves/CVE-2021-46904) +[CVE-2021-46905](cves/CVE-2021-46905) +[CVE-2021-46906](cves/CVE-2021-46906) +[CVE-2021-46908](cves/CVE-2021-46908) +[CVE-2021-46909](cves/CVE-2021-46909) +[CVE-2021-46910](cves/CVE-2021-46910) +[CVE-2021-46911](cves/CVE-2021-46911) +[CVE-2021-46912](cves/CVE-2021-46912) +[CVE-2021-46913](cves/CVE-2021-46913) +[CVE-2021-46914](cves/CVE-2021-46914) +[CVE-2021-46915](cves/CVE-2021-46915) +[CVE-2021-46916](cves/CVE-2021-46916) +[CVE-2021-46917](cves/CVE-2021-46917) +[CVE-2021-46918](cves/CVE-2021-46918) +[CVE-2021-46919](cves/CVE-2021-46919) +[CVE-2021-46920](cves/CVE-2021-46920) +[CVE-2021-46921](cves/CVE-2021-46921) +[CVE-2021-46922](cves/CVE-2021-46922) +[CVE-2021-46923](cves/CVE-2021-46923) +[CVE-2021-46924](cves/CVE-2021-46924) +[CVE-2021-46925](cves/CVE-2021-46925) +[CVE-2021-46926](cves/CVE-2021-46926) +[CVE-2021-46927](cves/CVE-2021-46927) +[CVE-2021-46928](cves/CVE-2021-46928) +[CVE-2021-46929](cves/CVE-2021-46929) +[CVE-2021-46930](cves/CVE-2021-46930) +[CVE-2021-46931](cves/CVE-2021-46931) +[CVE-2021-46932](cves/CVE-2021-46932) +[CVE-2021-46933](cves/CVE-2021-46933) +[CVE-2021-46934](cves/CVE-2021-46934) +[CVE-2021-46935](cves/CVE-2021-46935) +[CVE-2021-46936](cves/CVE-2021-46936) +[CVE-2021-46937](cves/CVE-2021-46937) +[CVE-2021-46938](cves/CVE-2021-46938) +[CVE-2021-46939](cves/CVE-2021-46939) +[CVE-2021-46940](cves/CVE-2021-46940) +[CVE-2021-46941](cves/CVE-2021-46941) +[CVE-2021-46942](cves/CVE-2021-46942) +[CVE-2021-46943](cves/CVE-2021-46943) +[CVE-2021-46944](cves/CVE-2021-46944) +[CVE-2021-46945](cves/CVE-2021-46945) +[CVE-2021-46947](cves/CVE-2021-46947) +[CVE-2021-46948](cves/CVE-2021-46948) +[CVE-2021-46949](cves/CVE-2021-46949) +[CVE-2021-46950](cves/CVE-2021-46950) +[CVE-2021-46951](cves/CVE-2021-46951) +[CVE-2021-46952](cves/CVE-2021-46952) +[CVE-2021-46953](cves/CVE-2021-46953) +[CVE-2021-46954](cves/CVE-2021-46954) +[CVE-2021-46955](cves/CVE-2021-46955) +[CVE-2021-46956](cves/CVE-2021-46956) +[CVE-2021-46957](cves/CVE-2021-46957) +[CVE-2021-46958](cves/CVE-2021-46958) +[CVE-2021-46959](cves/CVE-2021-46959) +[CVE-2021-46960](cves/CVE-2021-46960) +[CVE-2021-46961](cves/CVE-2021-46961) +[CVE-2021-46962](cves/CVE-2021-46962) +[CVE-2021-46963](cves/CVE-2021-46963) +[CVE-2021-46964](cves/CVE-2021-46964) +[CVE-2021-46965](cves/CVE-2021-46965) +[CVE-2021-46966](cves/CVE-2021-46966) +[CVE-2021-46967](cves/CVE-2021-46967) +[CVE-2021-46968](cves/CVE-2021-46968) +[CVE-2021-46969](cves/CVE-2021-46969) +[CVE-2021-46970](cves/CVE-2021-46970) +[CVE-2021-46971](cves/CVE-2021-46971) +[CVE-2021-46972](cves/CVE-2021-46972) +[CVE-2021-46973](cves/CVE-2021-46973) +[CVE-2021-46974](cves/CVE-2021-46974) +[CVE-2021-46976](cves/CVE-2021-46976) +[CVE-2021-46977](cves/CVE-2021-46977) +[CVE-2021-46978](cves/CVE-2021-46978) +[CVE-2021-46979](cves/CVE-2021-46979) +[CVE-2021-46980](cves/CVE-2021-46980) +[CVE-2021-46981](cves/CVE-2021-46981) +[CVE-2021-46982](cves/CVE-2021-46982) +[CVE-2021-46983](cves/CVE-2021-46983) +[CVE-2021-46984](cves/CVE-2021-46984) +[CVE-2021-46985](cves/CVE-2021-46985) +[CVE-2021-46986](cves/CVE-2021-46986) +[CVE-2021-46987](cves/CVE-2021-46987) +[CVE-2021-46988](cves/CVE-2021-46988) +[CVE-2021-46989](cves/CVE-2021-46989) +[CVE-2021-46990](cves/CVE-2021-46990) +[CVE-2021-46991](cves/CVE-2021-46991) +[CVE-2021-46992](cves/CVE-2021-46992) +[CVE-2021-46993](cves/CVE-2021-46993) +[CVE-2021-46994](cves/CVE-2021-46994) +[CVE-2021-46995](cves/CVE-2021-46995) +[CVE-2021-46996](cves/CVE-2021-46996) +[CVE-2021-46997](cves/CVE-2021-46997) +[CVE-2021-46998](cves/CVE-2021-46998) +[CVE-2021-46999](cves/CVE-2021-46999) +[CVE-2021-47000](cves/CVE-2021-47000) +[CVE-2021-47001](cves/CVE-2021-47001) +[CVE-2021-47002](cves/CVE-2021-47002) +[CVE-2021-47003](cves/CVE-2021-47003) +[CVE-2021-47004](cves/CVE-2021-47004) +[CVE-2021-47005](cves/CVE-2021-47005) +[CVE-2021-47006](cves/CVE-2021-47006) +[CVE-2021-47007](cves/CVE-2021-47007) +[CVE-2021-47008](cves/CVE-2021-47008) +[CVE-2021-47009](cves/CVE-2021-47009) +[CVE-2021-47010](cves/CVE-2021-47010) +[CVE-2021-47011](cves/CVE-2021-47011) +[CVE-2021-47012](cves/CVE-2021-47012) +[CVE-2021-47013](cves/CVE-2021-47013) +[CVE-2021-47014](cves/CVE-2021-47014) +[CVE-2021-47015](cves/CVE-2021-47015) +[CVE-2021-47016](cves/CVE-2021-47016) +[CVE-2021-47017](cves/CVE-2021-47017) +[CVE-2021-47018](cves/CVE-2021-47018) +[CVE-2021-47019](cves/CVE-2021-47019) +[CVE-2021-47020](cves/CVE-2021-47020) +[CVE-2021-47021](cves/CVE-2021-47021) +[CVE-2021-47022](cves/CVE-2021-47022) +[CVE-2021-47023](cves/CVE-2021-47023) +[CVE-2021-47024](cves/CVE-2021-47024) +[CVE-2021-47025](cves/CVE-2021-47025) +[CVE-2021-47026](cves/CVE-2021-47026) +[CVE-2021-47027](cves/CVE-2021-47027) +[CVE-2021-47028](cves/CVE-2021-47028) +[CVE-2021-47029](cves/CVE-2021-47029) +[CVE-2021-47030](cves/CVE-2021-47030) +[CVE-2021-47031](cves/CVE-2021-47031) +[CVE-2021-47032](cves/CVE-2021-47032) +[CVE-2021-47033](cves/CVE-2021-47033) +[CVE-2021-47034](cves/CVE-2021-47034) +[CVE-2021-47035](cves/CVE-2021-47035) +[CVE-2021-47036](cves/CVE-2021-47036) +[CVE-2021-47037](cves/CVE-2021-47037) +[CVE-2021-47038](cves/CVE-2021-47038) +[CVE-2021-47039](cves/CVE-2021-47039) +[CVE-2021-47040](cves/CVE-2021-47040) +[CVE-2021-47041](cves/CVE-2021-47041) +[CVE-2021-47042](cves/CVE-2021-47042) +[CVE-2021-47043](cves/CVE-2021-47043) +[CVE-2021-47044](cves/CVE-2021-47044) +[CVE-2021-47045](cves/CVE-2021-47045) +[CVE-2021-47046](cves/CVE-2021-47046) +[CVE-2021-47047](cves/CVE-2021-47047) +[CVE-2021-47048](cves/CVE-2021-47048) +[CVE-2021-47049](cves/CVE-2021-47049) +[CVE-2021-47050](cves/CVE-2021-47050) +[CVE-2021-47051](cves/CVE-2021-47051) +[CVE-2021-47052](cves/CVE-2021-47052) +[CVE-2021-47053](cves/CVE-2021-47053) +[CVE-2021-47054](cves/CVE-2021-47054) +[CVE-2021-47055](cves/CVE-2021-47055) +[CVE-2021-47056](cves/CVE-2021-47056) +[CVE-2021-47057](cves/CVE-2021-47057) +[CVE-2021-47058](cves/CVE-2021-47058) +[CVE-2021-47059](cves/CVE-2021-47059) +[CVE-2021-47060](cves/CVE-2021-47060) +[CVE-2021-47061](cves/CVE-2021-47061) +[CVE-2021-47062](cves/CVE-2021-47062) +[CVE-2021-47063](cves/CVE-2021-47063) +[CVE-2021-47064](cves/CVE-2021-47064) +[CVE-2021-47065](cves/CVE-2021-47065) +[CVE-2021-47066](cves/CVE-2021-47066) +[CVE-2021-47067](cves/CVE-2021-47067) +[CVE-2021-47068](cves/CVE-2021-47068) +[CVE-2021-47069](cves/CVE-2021-47069) +[CVE-2021-47070](cves/CVE-2021-47070) +[CVE-2021-47071](cves/CVE-2021-47071) +[CVE-2021-47072](cves/CVE-2021-47072) +[CVE-2021-47073](cves/CVE-2021-47073) +[CVE-2021-47074](cves/CVE-2021-47074) +[CVE-2021-47075](cves/CVE-2021-47075) +[CVE-2021-47076](cves/CVE-2021-47076) +[CVE-2021-47077](cves/CVE-2021-47077) +[CVE-2021-47078](cves/CVE-2021-47078) +[CVE-2021-47079](cves/CVE-2021-47079) +[CVE-2021-47080](cves/CVE-2021-47080) +[CVE-2021-47081](cves/CVE-2021-47081) +[CVE-2021-47082](cves/CVE-2021-47082) +[CVE-2021-47083](cves/CVE-2021-47083) +[CVE-2021-47086](cves/CVE-2021-47086) +[CVE-2021-47087](cves/CVE-2021-47087) +[CVE-2021-47088](cves/CVE-2021-47088) +[CVE-2021-47089](cves/CVE-2021-47089) +[CVE-2021-47090](cves/CVE-2021-47090) +[CVE-2021-47091](cves/CVE-2021-47091) +[CVE-2021-47092](cves/CVE-2021-47092) +[CVE-2021-47093](cves/CVE-2021-47093) +[CVE-2021-47094](cves/CVE-2021-47094) +[CVE-2021-47095](cves/CVE-2021-47095) +[CVE-2021-47096](cves/CVE-2021-47096) +[CVE-2021-47097](cves/CVE-2021-47097) +[CVE-2021-47098](cves/CVE-2021-47098) +[CVE-2021-47099](cves/CVE-2021-47099) +[CVE-2021-47100](cves/CVE-2021-47100) +[CVE-2021-47101](cves/CVE-2021-47101) +[CVE-2021-47102](cves/CVE-2021-47102) +[CVE-2021-47103](cves/CVE-2021-47103) +[CVE-2021-47104](cves/CVE-2021-47104) +[CVE-2021-47105](cves/CVE-2021-47105) +[CVE-2021-47106](cves/CVE-2021-47106) +[CVE-2021-47107](cves/CVE-2021-47107) +[CVE-2021-47108](cves/CVE-2021-47108) +[CVE-2021-47109](cves/CVE-2021-47109) +[CVE-2021-47110](cves/CVE-2021-47110) +[CVE-2021-47111](cves/CVE-2021-47111) +[CVE-2021-47112](cves/CVE-2021-47112) +[CVE-2021-47113](cves/CVE-2021-47113) +[CVE-2021-47114](cves/CVE-2021-47114) +[CVE-2021-47116](cves/CVE-2021-47116) +[CVE-2021-47117](cves/CVE-2021-47117) +[CVE-2021-47118](cves/CVE-2021-47118) +[CVE-2021-47119](cves/CVE-2021-47119) +[CVE-2021-47120](cves/CVE-2021-47120) +[CVE-2021-47121](cves/CVE-2021-47121) +[CVE-2021-47122](cves/CVE-2021-47122) +[CVE-2021-47123](cves/CVE-2021-47123) +[CVE-2021-47124](cves/CVE-2021-47124) +[CVE-2021-47125](cves/CVE-2021-47125) +[CVE-2021-47126](cves/CVE-2021-47126) +[CVE-2021-47127](cves/CVE-2021-47127) +[CVE-2021-47128](cves/CVE-2021-47128) +[CVE-2021-47129](cves/CVE-2021-47129) +[CVE-2021-47130](cves/CVE-2021-47130) +[CVE-2021-47131](cves/CVE-2021-47131) +[CVE-2021-47132](cves/CVE-2021-47132) +[CVE-2021-47133](cves/CVE-2021-47133) +[CVE-2021-47134](cves/CVE-2021-47134) +[CVE-2021-47135](cves/CVE-2021-47135) +[CVE-2021-47136](cves/CVE-2021-47136) +[CVE-2021-47137](cves/CVE-2021-47137) +[CVE-2021-47138](cves/CVE-2021-47138) +[CVE-2021-47139](cves/CVE-2021-47139) +[CVE-2021-47140](cves/CVE-2021-47140) +[CVE-2021-47141](cves/CVE-2021-47141) +[CVE-2021-47142](cves/CVE-2021-47142) +[CVE-2021-47143](cves/CVE-2021-47143) +[CVE-2021-47144](cves/CVE-2021-47144) +[CVE-2021-47145](cves/CVE-2021-47145) +[CVE-2021-47146](cves/CVE-2021-47146) +[CVE-2021-47147](cves/CVE-2021-47147) +[CVE-2021-47148](cves/CVE-2021-47148) +[CVE-2021-47149](cves/CVE-2021-47149) +[CVE-2021-47150](cves/CVE-2021-47150) +[CVE-2021-47151](cves/CVE-2021-47151) +[CVE-2021-47152](cves/CVE-2021-47152) +[CVE-2021-47153](cves/CVE-2021-47153) +[CVE-2021-47158](cves/CVE-2021-47158) +[CVE-2021-47159](cves/CVE-2021-47159) +[CVE-2021-47160](cves/CVE-2021-47160) +[CVE-2021-47161](cves/CVE-2021-47161) +[CVE-2021-47162](cves/CVE-2021-47162) +[CVE-2021-47163](cves/CVE-2021-47163) +[CVE-2021-47164](cves/CVE-2021-47164) +[CVE-2021-47165](cves/CVE-2021-47165) +[CVE-2021-47166](cves/CVE-2021-47166) +[CVE-2021-47167](cves/CVE-2021-47167) +[CVE-2021-47168](cves/CVE-2021-47168) +[CVE-2021-47169](cves/CVE-2021-47169) +[CVE-2021-47170](cves/CVE-2021-47170) +[CVE-2021-47171](cves/CVE-2021-47171) +[CVE-2021-47172](cves/CVE-2021-47172) +[CVE-2021-47173](cves/CVE-2021-47173) +[CVE-2021-47174](cves/CVE-2021-47174) +[CVE-2021-47175](cves/CVE-2021-47175) +[CVE-2021-47176](cves/CVE-2021-47176) +[CVE-2021-47177](cves/CVE-2021-47177) +[CVE-2021-47178](cves/CVE-2021-47178) +[CVE-2021-47179](cves/CVE-2021-47179) +[CVE-2021-47180](cves/CVE-2021-47180) +[CVE-2022-48626](cves/CVE-2022-48626) +[CVE-2022-48627](cves/CVE-2022-48627) +[CVE-2022-48628](cves/CVE-2022-48628) +[CVE-2022-48629](cves/CVE-2022-48629) +[CVE-2022-48630](cves/CVE-2022-48630) +[CVE-2023-28746](cves/CVE-2023-28746) +[CVE-2023-52465](cves/CVE-2023-52465) +[CVE-2023-52467](cves/CVE-2023-52467) +[CVE-2023-52468](cves/CVE-2023-52468) +[CVE-2023-52469](cves/CVE-2023-52469) +[CVE-2023-52470](cves/CVE-2023-52470) +[CVE-2023-52471](cves/CVE-2023-52471) +[CVE-2023-52472](cves/CVE-2023-52472) +[CVE-2023-52473](cves/CVE-2023-52473) +[CVE-2023-52474](cves/CVE-2023-52474) +[CVE-2023-52475](cves/CVE-2023-52475) +[CVE-2023-52476](cves/CVE-2023-52476) +[CVE-2023-52477](cves/CVE-2023-52477) +[CVE-2023-52478](cves/CVE-2023-52478) +[CVE-2023-52479](cves/CVE-2023-52479) +[CVE-2023-52480](cves/CVE-2023-52480) +[CVE-2023-52481](cves/CVE-2023-52481) +[CVE-2023-52482](cves/CVE-2023-52482) +[CVE-2023-52483](cves/CVE-2023-52483) +[CVE-2023-52484](cves/CVE-2023-52484) +[CVE-2023-52485](cves/CVE-2023-52485) +[CVE-2023-52486](cves/CVE-2023-52486) +[CVE-2023-52487](cves/CVE-2023-52487) +[CVE-2023-52488](cves/CVE-2023-52488) +[CVE-2023-52489](cves/CVE-2023-52489) +[CVE-2023-52490](cves/CVE-2023-52490) +[CVE-2023-52491](cves/CVE-2023-52491) +[CVE-2023-52492](cves/CVE-2023-52492) +[CVE-2023-52493](cves/CVE-2023-52493) +[CVE-2023-52494](cves/CVE-2023-52494) +[CVE-2023-52495](cves/CVE-2023-52495) +[CVE-2023-52497](cves/CVE-2023-52497) +[CVE-2023-52498](cves/CVE-2023-52498) +[CVE-2023-52499](cves/CVE-2023-52499) +[CVE-2023-52500](cves/CVE-2023-52500) +[CVE-2023-52501](cves/CVE-2023-52501) +[CVE-2023-52502](cves/CVE-2023-52502) +[CVE-2023-52503](cves/CVE-2023-52503) +[CVE-2023-52504](cves/CVE-2023-52504) +[CVE-2023-52505](cves/CVE-2023-52505) +[CVE-2023-52506](cves/CVE-2023-52506) +[CVE-2023-52507](cves/CVE-2023-52507) +[CVE-2023-52508](cves/CVE-2023-52508) +[CVE-2023-52509](cves/CVE-2023-52509) +[CVE-2023-52510](cves/CVE-2023-52510) +[CVE-2023-52511](cves/CVE-2023-52511) +[CVE-2023-52512](cves/CVE-2023-52512) +[CVE-2023-52513](cves/CVE-2023-52513) +[CVE-2023-52515](cves/CVE-2023-52515) +[CVE-2023-52516](cves/CVE-2023-52516) +[CVE-2023-52517](cves/CVE-2023-52517) +[CVE-2023-52518](cves/CVE-2023-52518) +[CVE-2023-52519](cves/CVE-2023-52519) +[CVE-2023-52520](cves/CVE-2023-52520) +[CVE-2023-52522](cves/CVE-2023-52522) +[CVE-2023-52523](cves/CVE-2023-52523) +[CVE-2023-52524](cves/CVE-2023-52524) +[CVE-2023-52525](cves/CVE-2023-52525) +[CVE-2023-52526](cves/CVE-2023-52526) +[CVE-2023-52527](cves/CVE-2023-52527) +[CVE-2023-52528](cves/CVE-2023-52528) +[CVE-2023-52529](cves/CVE-2023-52529) +[CVE-2023-52530](cves/CVE-2023-52530) +[CVE-2023-52531](cves/CVE-2023-52531) +[CVE-2023-52532](cves/CVE-2023-52532) +[CVE-2023-52559](cves/CVE-2023-52559) +[CVE-2023-52560](cves/CVE-2023-52560) +[CVE-2023-52561](cves/CVE-2023-52561) +[CVE-2023-52562](cves/CVE-2023-52562) +[CVE-2023-52563](cves/CVE-2023-52563) +[CVE-2023-52564](cves/CVE-2023-52564) +[CVE-2023-52565](cves/CVE-2023-52565) +[CVE-2023-52566](cves/CVE-2023-52566) +[CVE-2023-52567](cves/CVE-2023-52567) +[CVE-2023-52568](cves/CVE-2023-52568) +[CVE-2023-52569](cves/CVE-2023-52569) +[CVE-2023-52570](cves/CVE-2023-52570) +[CVE-2023-52571](cves/CVE-2023-52571) +[CVE-2023-52572](cves/CVE-2023-52572) +[CVE-2023-52573](cves/CVE-2023-52573) +[CVE-2023-52574](cves/CVE-2023-52574) +[CVE-2023-52575](cves/CVE-2023-52575) +[CVE-2023-52576](cves/CVE-2023-52576) +[CVE-2023-52577](cves/CVE-2023-52577) +[CVE-2023-52578](cves/CVE-2023-52578) +[CVE-2023-52580](cves/CVE-2023-52580) +[CVE-2023-52581](cves/CVE-2023-52581) +[CVE-2023-52582](cves/CVE-2023-52582) +[CVE-2023-52583](cves/CVE-2023-52583) +[CVE-2023-52584](cves/CVE-2023-52584) +[CVE-2023-52585](cves/CVE-2023-52585) +[CVE-2023-52586](cves/CVE-2023-52586) +[CVE-2023-52587](cves/CVE-2023-52587) +[CVE-2023-52588](cves/CVE-2023-52588) +[CVE-2023-52589](cves/CVE-2023-52589) +[CVE-2023-52590](cves/CVE-2023-52590) +[CVE-2023-52591](cves/CVE-2023-52591) +[CVE-2023-52593](cves/CVE-2023-52593) +[CVE-2023-52594](cves/CVE-2023-52594) +[CVE-2023-52595](cves/CVE-2023-52595) +[CVE-2023-52596](cves/CVE-2023-52596) +[CVE-2023-52597](cves/CVE-2023-52597) +[CVE-2023-52598](cves/CVE-2023-52598) +[CVE-2023-52599](cves/CVE-2023-52599) +[CVE-2023-52600](cves/CVE-2023-52600) +[CVE-2023-52601](cves/CVE-2023-52601) +[CVE-2023-52602](cves/CVE-2023-52602) +[CVE-2023-52603](cves/CVE-2023-52603) +[CVE-2023-52604](cves/CVE-2023-52604) +[CVE-2023-52606](cves/CVE-2023-52606) +[CVE-2023-52607](cves/CVE-2023-52607) +[CVE-2023-52608](cves/CVE-2023-52608) +[CVE-2023-52609](cves/CVE-2023-52609) +[CVE-2023-52610](cves/CVE-2023-52610) +[CVE-2023-52611](cves/CVE-2023-52611) +[CVE-2023-52612](cves/CVE-2023-52612) +[CVE-2023-52613](cves/CVE-2023-52613) +[CVE-2023-52614](cves/CVE-2023-52614) +[CVE-2023-52615](cves/CVE-2023-52615) +[CVE-2023-52616](cves/CVE-2023-52616) +[CVE-2023-52617](cves/CVE-2023-52617) +[CVE-2023-52618](cves/CVE-2023-52618) +[CVE-2023-52619](cves/CVE-2023-52619) +[CVE-2023-52620](cves/CVE-2023-52620) +[CVE-2023-52621](cves/CVE-2023-52621) +[CVE-2023-52622](cves/CVE-2023-52622) +[CVE-2023-52623](cves/CVE-2023-52623) +[CVE-2023-52624](cves/CVE-2023-52624) +[CVE-2023-52625](cves/CVE-2023-52625) +[CVE-2023-52626](cves/CVE-2023-52626) +[CVE-2023-52627](cves/CVE-2023-52627) +[CVE-2023-52628](cves/CVE-2023-52628) +[CVE-2023-52629](cves/CVE-2023-52629) +[CVE-2023-52630](cves/CVE-2023-52630) +[CVE-2023-52631](cves/CVE-2023-52631) +[CVE-2023-52632](cves/CVE-2023-52632) +[CVE-2023-52633](cves/CVE-2023-52633) +[CVE-2023-52634](cves/CVE-2023-52634) +[CVE-2023-52635](cves/CVE-2023-52635) +[CVE-2023-52636](cves/CVE-2023-52636) +[CVE-2023-52637](cves/CVE-2023-52637) +[CVE-2023-52638](cves/CVE-2023-52638) +[CVE-2023-52639](cves/CVE-2023-52639) +[CVE-2023-52640](cves/CVE-2023-52640) +[CVE-2023-52641](cves/CVE-2023-52641) +[CVE-2024-2193](cves/CVE-2024-2193) +[CVE-2024-26600](cves/CVE-2024-26600) +[CVE-2024-26601](cves/CVE-2024-26601) +[CVE-2024-26602](cves/CVE-2024-26602) +[CVE-2024-26603](cves/CVE-2024-26603) +[CVE-2024-26604](cves/CVE-2024-26604) +[CVE-2024-26605](cves/CVE-2024-26605) +[CVE-2024-26606](cves/CVE-2024-26606) +[CVE-2024-26607](cves/CVE-2024-26607) +[CVE-2024-26608](cves/CVE-2024-26608) +[CVE-2024-26610](cves/CVE-2024-26610) +[CVE-2024-26611](cves/CVE-2024-26611) +[CVE-2024-26612](cves/CVE-2024-26612) +[CVE-2024-26614](cves/CVE-2024-26614) +[CVE-2024-26615](cves/CVE-2024-26615) +[CVE-2024-26616](cves/CVE-2024-26616) +[CVE-2024-26617](cves/CVE-2024-26617) +[CVE-2024-26618](cves/CVE-2024-26618) +[CVE-2024-26619](cves/CVE-2024-26619) +[CVE-2024-26620](cves/CVE-2024-26620) +[CVE-2024-26621](cves/CVE-2024-26621) +[CVE-2024-26622](cves/CVE-2024-26622) +[CVE-2024-26623](cves/CVE-2024-26623) +[CVE-2024-26625](cves/CVE-2024-26625) +[CVE-2024-26626](cves/CVE-2024-26626) +[CVE-2024-26627](cves/CVE-2024-26627) +[CVE-2024-26629](cves/CVE-2024-26629) +[CVE-2024-26630](cves/CVE-2024-26630) +[CVE-2024-26631](cves/CVE-2024-26631) +[CVE-2024-26632](cves/CVE-2024-26632) +[CVE-2024-26633](cves/CVE-2024-26633) +[CVE-2024-26634](cves/CVE-2024-26634) +[CVE-2024-26635](cves/CVE-2024-26635) +[CVE-2024-26636](cves/CVE-2024-26636) +[CVE-2024-26637](cves/CVE-2024-26637) +[CVE-2024-26638](cves/CVE-2024-26638) +[CVE-2024-26639](cves/CVE-2024-26639) +[CVE-2024-26640](cves/CVE-2024-26640) +[CVE-2024-26641](cves/CVE-2024-26641) +[CVE-2024-26642](cves/CVE-2024-26642) +[CVE-2024-26643](cves/CVE-2024-26643) +[CVE-2024-26644](cves/CVE-2024-26644) +[CVE-2024-26645](cves/CVE-2024-26645) +[CVE-2024-26646](cves/CVE-2024-26646) +[CVE-2024-26647](cves/CVE-2024-26647) +[CVE-2024-26648](cves/CVE-2024-26648) +[CVE-2024-26649](cves/CVE-2024-26649) +[CVE-2024-26650](cves/CVE-2024-26650) +[CVE-2024-26651](cves/CVE-2024-26651) +[CVE-2024-26652](cves/CVE-2024-26652) +[CVE-2024-26653](cves/CVE-2024-26653) +[CVE-2024-26654](cves/CVE-2024-26654) +[CVE-2024-26655](cves/CVE-2024-26655) +[CVE-2024-26656](cves/CVE-2024-26656) +[CVE-2024-26657](cves/CVE-2024-26657) +[CVE-2024-26658](cves/CVE-2024-26658) +[CVE-2024-26659](cves/CVE-2024-26659) +[CVE-2024-26660](cves/CVE-2024-26660) +[CVE-2024-26661](cves/CVE-2024-26661) +[CVE-2024-26662](cves/CVE-2024-26662) +[CVE-2024-26663](cves/CVE-2024-26663) +[CVE-2024-26664](cves/CVE-2024-26664) +[CVE-2024-26665](cves/CVE-2024-26665) +[CVE-2024-26666](cves/CVE-2024-26666) +[CVE-2024-26667](cves/CVE-2024-26667) +[CVE-2024-26668](cves/CVE-2024-26668) +[CVE-2024-26669](cves/CVE-2024-26669) +[CVE-2024-26670](cves/CVE-2024-26670) +[CVE-2024-26671](cves/CVE-2024-26671) +[CVE-2024-26672](cves/CVE-2024-26672) +[CVE-2024-26673](cves/CVE-2024-26673) +[CVE-2024-26674](cves/CVE-2024-26674) +[CVE-2024-26675](cves/CVE-2024-26675) +[CVE-2024-26676](cves/CVE-2024-26676) +[CVE-2024-26677](cves/CVE-2024-26677) +[CVE-2024-26678](cves/CVE-2024-26678) +[CVE-2024-26679](cves/CVE-2024-26679) +[CVE-2024-26680](cves/CVE-2024-26680) +[CVE-2024-26681](cves/CVE-2024-26681) +[CVE-2024-26682](cves/CVE-2024-26682) +[CVE-2024-26683](cves/CVE-2024-26683) +[CVE-2024-26684](cves/CVE-2024-26684) +[CVE-2024-26685](cves/CVE-2024-26685) +[CVE-2024-26686](cves/CVE-2024-26686) +[CVE-2024-26687](cves/CVE-2024-26687) +[CVE-2024-26688](cves/CVE-2024-26688) +[CVE-2024-26689](cves/CVE-2024-26689) +[CVE-2024-26690](cves/CVE-2024-26690) +[CVE-2024-26691](cves/CVE-2024-26691) +[CVE-2024-26692](cves/CVE-2024-26692) +[CVE-2024-26693](cves/CVE-2024-26693) +[CVE-2024-26694](cves/CVE-2024-26694) +[CVE-2024-26695](cves/CVE-2024-26695) +[CVE-2024-26696](cves/CVE-2024-26696) +[CVE-2024-26697](cves/CVE-2024-26697) +[CVE-2024-26698](cves/CVE-2024-26698) +[CVE-2024-26699](cves/CVE-2024-26699) +[CVE-2024-26700](cves/CVE-2024-26700) +[CVE-2024-26702](cves/CVE-2024-26702) +[CVE-2024-26703](cves/CVE-2024-26703) +[CVE-2024-26704](cves/CVE-2024-26704) +[CVE-2024-26705](cves/CVE-2024-26705) +[CVE-2024-26706](cves/CVE-2024-26706) +[CVE-2024-26707](cves/CVE-2024-26707) +[CVE-2024-26708](cves/CVE-2024-26708) +[CVE-2024-26709](cves/CVE-2024-26709) +[CVE-2024-26710](cves/CVE-2024-26710) +[CVE-2024-26711](cves/CVE-2024-26711) +[CVE-2024-26712](cves/CVE-2024-26712) +[CVE-2024-26713](cves/CVE-2024-26713) +[CVE-2024-26714](cves/CVE-2024-26714) +[CVE-2024-26715](cves/CVE-2024-26715) +[CVE-2024-26716](cves/CVE-2024-26716) +[CVE-2024-26717](cves/CVE-2024-26717) +[CVE-2024-26718](cves/CVE-2024-26718) +[CVE-2024-26719](cves/CVE-2024-26719) +[CVE-2024-26720](cves/CVE-2024-26720) +[CVE-2024-26721](cves/CVE-2024-26721) +[CVE-2024-26722](cves/CVE-2024-26722) +[CVE-2024-26723](cves/CVE-2024-26723) +[CVE-2024-26724](cves/CVE-2024-26724) +[CVE-2024-26725](cves/CVE-2024-26725) +[CVE-2024-26726](cves/CVE-2024-26726) +[CVE-2024-26727](cves/CVE-2024-26727) +[CVE-2024-26728](cves/CVE-2024-26728) +[CVE-2024-26729](cves/CVE-2024-26729) +[CVE-2024-26730](cves/CVE-2024-26730) +[CVE-2024-26731](cves/CVE-2024-26731) +[CVE-2024-26732](cves/CVE-2024-26732) +[CVE-2024-26733](cves/CVE-2024-26733) +[CVE-2024-26734](cves/CVE-2024-26734) +[CVE-2024-26735](cves/CVE-2024-26735) +[CVE-2024-26736](cves/CVE-2024-26736) +[CVE-2024-26737](cves/CVE-2024-26737) +[CVE-2024-26738](cves/CVE-2024-26738) +[CVE-2024-26739](cves/CVE-2024-26739) +[CVE-2024-26740](cves/CVE-2024-26740) +[CVE-2024-26741](cves/CVE-2024-26741) +[CVE-2024-26742](cves/CVE-2024-26742) +[CVE-2024-26743](cves/CVE-2024-26743) +[CVE-2024-26744](cves/CVE-2024-26744) +[CVE-2024-26745](cves/CVE-2024-26745) +[CVE-2024-26746](cves/CVE-2024-26746) +[CVE-2024-26747](cves/CVE-2024-26747) +[CVE-2024-26748](cves/CVE-2024-26748) +[CVE-2024-26749](cves/CVE-2024-26749) +[CVE-2024-26750](cves/CVE-2024-26750) +[CVE-2024-26751](cves/CVE-2024-26751) +[CVE-2024-26752](cves/CVE-2024-26752) +[CVE-2024-26753](cves/CVE-2024-26753) +[CVE-2024-26754](cves/CVE-2024-26754) +[CVE-2024-26755](cves/CVE-2024-26755) +[CVE-2024-26756](cves/CVE-2024-26756) +[CVE-2024-26757](cves/CVE-2024-26757) +[CVE-2024-26758](cves/CVE-2024-26758) +[CVE-2024-26759](cves/CVE-2024-26759) +[CVE-2024-26760](cves/CVE-2024-26760) +[CVE-2024-26761](cves/CVE-2024-26761) +[CVE-2024-26762](cves/CVE-2024-26762) +[CVE-2024-26763](cves/CVE-2024-26763) +[CVE-2024-26764](cves/CVE-2024-26764) +[CVE-2024-26765](cves/CVE-2024-26765) +[CVE-2024-26766](cves/CVE-2024-26766) +[CVE-2024-26767](cves/CVE-2024-26767) +[CVE-2024-26768](cves/CVE-2024-26768) +[CVE-2024-26769](cves/CVE-2024-26769) +[CVE-2024-26770](cves/CVE-2024-26770) +[CVE-2024-26771](cves/CVE-2024-26771) +[CVE-2024-26772](cves/CVE-2024-26772) +[CVE-2024-26773](cves/CVE-2024-26773) +[CVE-2024-26774](cves/CVE-2024-26774) +[CVE-2024-26775](cves/CVE-2024-26775) +[CVE-2024-26776](cves/CVE-2024-26776) +[CVE-2024-26777](cves/CVE-2024-26777) +[CVE-2024-26778](cves/CVE-2024-26778) +[CVE-2024-26779](cves/CVE-2024-26779) +[CVE-2024-26780](cves/CVE-2024-26780) +[CVE-2024-26781](cves/CVE-2024-26781) +[CVE-2024-26782](cves/CVE-2024-26782) +[CVE-2024-26783](cves/CVE-2024-26783) +[CVE-2024-26784](cves/CVE-2024-26784) +[CVE-2024-26785](cves/CVE-2024-26785) +[CVE-2024-26786](cves/CVE-2024-26786) +[CVE-2024-26787](cves/CVE-2024-26787) +[CVE-2024-26788](cves/CVE-2024-26788) +[CVE-2024-26789](cves/CVE-2024-26789) +[CVE-2024-26790](cves/CVE-2024-26790) +[CVE-2024-26791](cves/CVE-2024-26791) +[CVE-2024-26792](cves/CVE-2024-26792) +[CVE-2024-26793](cves/CVE-2024-26793) +[CVE-2024-26794](cves/CVE-2024-26794) +[CVE-2024-26795](cves/CVE-2024-26795) +[CVE-2024-26796](cves/CVE-2024-26796) +[CVE-2024-26797](cves/CVE-2024-26797) +[CVE-2024-26798](cves/CVE-2024-26798) +[CVE-2024-26799](cves/CVE-2024-26799) +[CVE-2024-26800](cves/CVE-2024-26800) +[CVE-2024-26801](cves/CVE-2024-26801) +[CVE-2024-26802](cves/CVE-2024-26802) +[CVE-2024-26803](cves/CVE-2024-26803) +[CVE-2024-26804](cves/CVE-2024-26804) +[CVE-2024-26805](cves/CVE-2024-26805) +[CVE-2024-26806](cves/CVE-2024-26806) +[CVE-2024-26807](cves/CVE-2024-26807) +[CVE-2024-26808](cves/CVE-2024-26808) +[CVE-2024-26809](cves/CVE-2024-26809) + + +### **New Versions Checked:** + +[4.19.311](streams/4.19) +[5.10.214](streams/5.10) +[5.15.153](streams/5.15) +[5.4.273](streams/5.4) +[6.1.84](streams/6.1) +[6.6.25](streams/6.6) +[6.7.12](streams/6.7) + + +### **Updated CVEs:** + +[CVE-2022-41850](cves/CVE-2022-41850) +[CVE-2023-2176](cves/CVE-2023-2176) +[CVE-2023-47233](cves/CVE-2023-47233) [CVE-2023-52434](cves/CVE-2023-52434) [CVE-2023-52435](cves/CVE-2023-52435) -[CVE-2023-52436](cves/CVE-2023-52436) +[CVE-2023-52447](cves/CVE-2023-52447) +[CVE-2023-52456](cves/CVE-2023-52456) +[CVE-2023-52457](cves/CVE-2023-52457) +[CVE-2023-52458](cves/CVE-2023-52458) +[CVE-2023-6270](cves/CVE-2023-6270) +[CVE-2023-6356](cves/CVE-2023-6356) +[CVE-2023-6536](cves/CVE-2023-6536) +[CVE-2023-7042](cves/CVE-2023-7042) +[CVE-2024-0565](cves/CVE-2024-0565) +[CVE-2024-0841](cves/CVE-2024-0841) +[CVE-2024-22099](cves/CVE-2024-22099) +[CVE-2024-23196](cves/CVE-2024-23196) +[CVE-2024-23307](cves/CVE-2024-23307) +[CVE-2024-23851](cves/CVE-2024-23851) +[CVE-2024-24861](cves/CVE-2024-24861) +[CVE-2024-26584](cves/CVE-2024-26584) +[CVE-2024-26585](cves/CVE-2024-26585) +[CVE-2024-26587](cves/CVE-2024-26587) +[CVE-2024-26588](cves/CVE-2024-26588) +[CVE-2024-26590](cves/CVE-2024-26590) +[CVE-2024-26591](cves/CVE-2024-26591) +[CVE-2021-42739](cves/CVE-2021-42739) +[CVE-2023-51779](cves/CVE-2023-51779) +[CVE-2023-52429](cves/CVE-2023-52429) [CVE-2023-52438](cves/CVE-2023-52438) [CVE-2023-52439](cves/CVE-2023-52439) [CVE-2023-52440](cves/CVE-2023-52440) [CVE-2023-52441](cves/CVE-2023-52441) -[CVE-2023-52442](cves/CVE-2023-52442) [CVE-2023-52443](cves/CVE-2023-52443) [CVE-2023-52444](cves/CVE-2023-52444) [CVE-2023-52445](cves/CVE-2023-52445) [CVE-2023-52446](cves/CVE-2023-52446) -[CVE-2023-52447](cves/CVE-2023-52447) [CVE-2023-52448](cves/CVE-2023-52448) [CVE-2023-52449](cves/CVE-2023-52449) [CVE-2023-52450](cves/CVE-2023-52450) [CVE-2023-52451](cves/CVE-2023-52451) [CVE-2023-52452](cves/CVE-2023-52452) -[CVE-2023-52453](cves/CVE-2023-52453) -[CVE-2023-52454](cves/CVE-2023-52454) -[CVE-2023-52455](cves/CVE-2023-52455) -[CVE-2023-52456](cves/CVE-2023-52456) -[CVE-2023-52457](cves/CVE-2023-52457) -[CVE-2023-52458](cves/CVE-2023-52458) -[CVE-2023-52459](cves/CVE-2023-52459) -[CVE-2023-52460](cves/CVE-2023-52460) -[CVE-2023-52461](cves/CVE-2023-52461) -[CVE-2023-52462](cves/CVE-2023-52462) -[CVE-2023-52463](cves/CVE-2023-52463) -[CVE-2023-52464](cves/CVE-2023-52464) -[CVE-2024-1151](cves/CVE-2024-1151) [CVE-2024-25739](cves/CVE-2024-25739) [CVE-2024-25740](cves/CVE-2024-25740) -[CVE-2024-25741](cves/CVE-2024-25741) -[CVE-2024-25744](cves/CVE-2024-25744) -[CVE-2024-26581](cves/CVE-2024-26581) [CVE-2024-26582](cves/CVE-2024-26582) [CVE-2024-26583](cves/CVE-2024-26583) -[CVE-2024-26584](cves/CVE-2024-26584) -[CVE-2024-26585](cves/CVE-2024-26585) [CVE-2024-26586](cves/CVE-2024-26586) -[CVE-2024-26587](cves/CVE-2024-26587) -[CVE-2024-26588](cves/CVE-2024-26588) [CVE-2024-26589](cves/CVE-2024-26589) -[CVE-2024-26590](cves/CVE-2024-26590) -[CVE-2024-26591](cves/CVE-2024-26591) -[CVE-2024-26592](cves/CVE-2024-26592) -[CVE-2024-26593](cves/CVE-2024-26593) -[CVE-2024-26594](cves/CVE-2024-26594) -[CVE-2024-26595](cves/CVE-2024-26595) -[CVE-2024-26596](cves/CVE-2024-26596) -[CVE-2024-26597](cves/CVE-2024-26597) -[CVE-2024-26598](cves/CVE-2024-26598) -[CVE-2024-26599](cves/CVE-2024-26599) - - -### **New Versions Checked:** - -[4.19.307](streams/4.19) -[5.10.210](streams/5.10) -[5.15.149](streams/5.15) -[5.4.269](streams/5.4) -[6.1.79](streams/6.1) -[6.6.18](streams/6.6) -[6.7.6](streams/6.7) - - -### **Updated CVEs:** - -[CVE-2021-33630](cves/CVE-2021-33630) -[CVE-2023-52340](cves/CVE-2023-52340) -[CVE-2024-0340](cves/CVE-2024-0340) -[CVE-2024-0607](cves/CVE-2024-0607) -[CVE-2024-1086](cves/CVE-2024-1086) -[CVE-2024-1312](cves/CVE-2024-1312) -[CVE-2024-23849](cves/CVE-2024-23849) -[CVE-2024-23850](cves/CVE-2024-23850) -[CVE-2024-23851](cves/CVE-2024-23851) -[CVE-2024-24855](cves/CVE-2024-24855) -[CVE-2024-24857](cves/CVE-2024-24857) -[CVE-2024-24858](cves/CVE-2024-24858) -[CVE-2024-24859](cves/CVE-2024-24859) -[CVE-2024-24860](cves/CVE-2024-24860) -[CVE-2023-6240](cves/CVE-2023-6240) -[CVE-2023-6356](cves/CVE-2023-6356) -[CVE-2023-6535](cves/CVE-2023-6535) -[CVE-2023-6536](cves/CVE-2023-6536) -[CVE-2024-0584](cves/CVE-2024-0584) -[CVE-2024-22386](cves/CVE-2024-22386) -[CVE-2024-23196](cves/CVE-2024-23196) -[CVE-2024-24861](cves/CVE-2024-24861) -[CVE-2024-24864](cves/CVE-2024-24864) diff --git a/data/3.12/3.12_CVEs.txt b/data/3.12/3.12_CVEs.txt index c980a2897..71222fe6c 100644 --- a/data/3.12/3.12_CVEs.txt +++ b/data/3.12/3.12_CVEs.txt @@ -805,6 +805,7 @@ CVE-2019-2101: Fix not seen in stream CVE-2019-2181: Fix not seen in stream CVE-2019-2213: Fix not seen in stream CVE-2019-2215: Fix not seen in stream +CVE-2019-25160: Fix not seen in stream CVE-2019-3459: Fix not seen in stream CVE-2019-3460: Fix not seen in stream CVE-2019-3701: Fix not seen in stream @@ -962,6 +963,9 @@ CVE-2020-36386: Fix not seen in stream CVE-2020-36557: Fix not seen in stream CVE-2020-36558: Fix not seen in stream CVE-2020-36691: Fix not seen in stream +CVE-2020-36775: Fix not seen in stream +CVE-2020-36780: Fix not seen in stream +CVE-2020-36781: Fix not seen in stream CVE-2020-3702: Fix not seen in stream CVE-2020-4788: Fix not seen in stream CVE-2020-8647: Fix not seen in stream @@ -1081,6 +1085,76 @@ CVE-2021-45095: Fix not seen in stream CVE-2021-45469: Fix not seen in stream CVE-2021-45485: Fix not seen in stream CVE-2021-45868: Fix not seen in stream +CVE-2021-46904: Fix not seen in stream +CVE-2021-46906: Fix not seen in stream +CVE-2021-46908: Fix not seen in stream +CVE-2021-46926: Fix not seen in stream +CVE-2021-46928: Fix not seen in stream +CVE-2021-46932: Fix not seen in stream +CVE-2021-46936: Fix not seen in stream +CVE-2021-46939: Fix not seen in stream +CVE-2021-46950: Fix not seen in stream +CVE-2021-46951: Fix not seen in stream +CVE-2021-46952: Fix not seen in stream +CVE-2021-46959: Fix not seen in stream +CVE-2021-46962: Fix not seen in stream +CVE-2021-46965: Fix not seen in stream +CVE-2021-46969: Fix not seen in stream +CVE-2021-46970: Fix not seen in stream +CVE-2021-46982: Fix not seen in stream +CVE-2021-47028: Fix not seen in stream +CVE-2021-47046: Fix not seen in stream +CVE-2021-47052: Fix not seen in stream +CVE-2021-47059: Fix not seen in stream +CVE-2021-47065: Fix not seen in stream +CVE-2021-47070: Fix not seen in stream +CVE-2021-47075: Fix not seen in stream +CVE-2021-47076: Fix not seen in stream +CVE-2021-47082: Fix not seen in stream +CVE-2021-47083: Fix not seen in stream +CVE-2021-47086: Fix not seen in stream +CVE-2021-47101: Fix not seen in stream +CVE-2021-47103: Fix not seen in stream +CVE-2021-47110: Fix not seen in stream +CVE-2021-47112: Fix not seen in stream +CVE-2021-47113: Fix not seen in stream +CVE-2021-47114: Fix not seen in stream +CVE-2021-47116: Fix not seen in stream +CVE-2021-47117: Fix not seen in stream +CVE-2021-47118: Fix not seen in stream +CVE-2021-47119: Fix not seen in stream +CVE-2021-47121: Fix not seen in stream +CVE-2021-47122: Fix not seen in stream +CVE-2021-47124: Fix not seen in stream +CVE-2021-47125: Fix not seen in stream +CVE-2021-47128: Fix not seen in stream +CVE-2021-47131: Fix not seen in stream +CVE-2021-47133: Fix not seen in stream +CVE-2021-47135: Fix not seen in stream +CVE-2021-47136: Fix not seen in stream +CVE-2021-47137: Fix not seen in stream +CVE-2021-47140: Fix not seen in stream +CVE-2021-47142: Fix not seen in stream +CVE-2021-47143: Fix not seen in stream +CVE-2021-47144: Fix not seen in stream +CVE-2021-47145: Fix not seen in stream +CVE-2021-47146: Fix not seen in stream +CVE-2021-47147: Fix not seen in stream +CVE-2021-47149: Fix not seen in stream +CVE-2021-47151: Fix not seen in stream +CVE-2021-47153: Fix not seen in stream +CVE-2021-47158: Fix not seen in stream +CVE-2021-47160: Fix not seen in stream +CVE-2021-47165: Fix not seen in stream +CVE-2021-47168: Fix not seen in stream +CVE-2021-47169: Fix not seen in stream +CVE-2021-47170: Fix not seen in stream +CVE-2021-47171: Fix not seen in stream +CVE-2021-47172: Fix not seen in stream +CVE-2021-47173: Fix not seen in stream +CVE-2021-47175: Fix not seen in stream +CVE-2021-47179: Fix not seen in stream +CVE-2021-47180: Fix not seen in stream CVE-2022-0001: Fix not seen in stream CVE-2022-0002: Fix not seen in stream CVE-2022-0168: Fix not seen in stream @@ -1231,6 +1305,9 @@ CVE-2022-45934: Fix not seen in stream CVE-2022-4662: Fix not seen in stream CVE-2022-4744: Fix not seen in stream CVE-2022-48619: Fix not seen in stream +CVE-2022-48626: Fix not seen in stream +CVE-2022-48627: Fix not seen in stream +CVE-2022-48628: Fix not seen in stream CVE-2023-0030: Fix not seen in stream CVE-2023-0047: Fix not seen in stream CVE-2023-0266: Fix not seen in stream @@ -1272,6 +1349,7 @@ CVE-2023-23559: Fix not seen in stream CVE-2023-2513: Fix not seen in stream CVE-2023-26607: Fix not seen in stream CVE-2023-28328: Fix not seen in stream +CVE-2023-28746: Fix not seen in stream CVE-2023-28772: Fix not seen in stream CVE-2023-2985: Fix not seen in stream CVE-2023-3006: Fix not seen in stream @@ -1323,7 +1401,7 @@ CVE-2023-45871: Fix not seen in stream CVE-2023-4623: Fix not seen in stream CVE-2023-46343: Fix not seen in stream CVE-2023-46838: Fix not seen in stream -CVE-2023-47233: Fix unknown +CVE-2023-47233: Fix not seen in stream CVE-2023-4921: Fix not seen in stream CVE-2023-51043: Fix not seen in stream CVE-2023-51779: Fix not seen in stream @@ -1334,49 +1412,207 @@ CVE-2023-51782: Fix not seen in stream CVE-2023-52340: Fix not seen in stream CVE-2023-52429: Fix not seen in stream CVE-2023-52434: Fix not seen in stream -CVE-2023-52435: Fix not seen in stream CVE-2023-52436: Fix not seen in stream CVE-2023-52442: Fix not seen in stream CVE-2023-52445: Fix not seen in stream CVE-2023-52449: Fix not seen in stream -CVE-2023-52456: Fix not seen in stream -CVE-2023-52457: Fix not seen in stream CVE-2023-52458: Fix not seen in stream +CVE-2023-52475: Fix not seen in stream +CVE-2023-52476: Fix not seen in stream +CVE-2023-52477: Fix not seen in stream +CVE-2023-52478: Fix not seen in stream +CVE-2023-52479: Fix not seen in stream +CVE-2023-52480: Fix not seen in stream +CVE-2023-52481: Fix not seen in stream +CVE-2023-52482: Fix not seen in stream +CVE-2023-52484: Fix not seen in stream +CVE-2023-52485: Fix not seen in stream +CVE-2023-52486: Fix not seen in stream +CVE-2023-52489: Fix not seen in stream +CVE-2023-52498: Fix not seen in stream +CVE-2023-52500: Fix not seen in stream +CVE-2023-52501: Fix not seen in stream +CVE-2023-52502: Fix not seen in stream +CVE-2023-52506: Fix not seen in stream +CVE-2023-52507: Fix not seen in stream +CVE-2023-52508: Fix not seen in stream +CVE-2023-52509: Fix not seen in stream +CVE-2023-52511: Fix not seen in stream +CVE-2023-52515: Fix not seen in stream +CVE-2023-52516: Fix not seen in stream +CVE-2023-52517: Fix not seen in stream +CVE-2023-52519: Fix not seen in stream +CVE-2023-52522: Fix not seen in stream +CVE-2023-52527: Fix not seen in stream +CVE-2023-52528: Fix not seen in stream +CVE-2023-52531: Fix not seen in stream +CVE-2023-52532: Fix not seen in stream +CVE-2023-52559: Fix not seen in stream +CVE-2023-52561: Fix not seen in stream +CVE-2023-52563: Fix not seen in stream +CVE-2023-52565: Fix not seen in stream +CVE-2023-52566: Fix not seen in stream +CVE-2023-52568: Fix not seen in stream +CVE-2023-52569: Fix not seen in stream +CVE-2023-52571: Fix not seen in stream +CVE-2023-52572: Fix not seen in stream +CVE-2023-52574: Fix not seen in stream +CVE-2023-52578: Fix not seen in stream +CVE-2023-52583: Fix not seen in stream +CVE-2023-52584: Fix not seen in stream +CVE-2023-52585: Fix not seen in stream +CVE-2023-52586: Fix not seen in stream +CVE-2023-52587: Fix not seen in stream +CVE-2023-52588: Fix not seen in stream +CVE-2023-52589: Fix not seen in stream +CVE-2023-52590: Fix not seen in stream +CVE-2023-52591: Fix not seen in stream +CVE-2023-52593: Fix not seen in stream +CVE-2023-52594: Fix not seen in stream +CVE-2023-52595: Fix not seen in stream +CVE-2023-52596: Fix not seen in stream +CVE-2023-52597: Fix not seen in stream +CVE-2023-52598: Fix not seen in stream +CVE-2023-52599: Fix not seen in stream +CVE-2023-52600: Fix not seen in stream +CVE-2023-52601: Fix not seen in stream +CVE-2023-52602: Fix not seen in stream +CVE-2023-52603: Fix not seen in stream +CVE-2023-52604: Fix not seen in stream +CVE-2023-52606: Fix not seen in stream +CVE-2023-52607: Fix not seen in stream +CVE-2023-52609: Fix not seen in stream +CVE-2023-52614: Fix not seen in stream +CVE-2023-52615: Fix not seen in stream +CVE-2023-52617: Fix not seen in stream +CVE-2023-52618: Fix not seen in stream +CVE-2023-52619: Fix not seen in stream +CVE-2023-52620: Fix not seen in stream +CVE-2023-52621: Fix not seen in stream +CVE-2023-52622: Fix not seen in stream +CVE-2023-52623: Fix not seen in stream +CVE-2023-52624: Fix not seen in stream +CVE-2023-52625: Fix not seen in stream +CVE-2023-52629: Fix not seen in stream +CVE-2023-52632: Fix not seen in stream +CVE-2023-52633: Fix not seen in stream +CVE-2023-52634: Fix not seen in stream +CVE-2023-52635: Fix not seen in stream +CVE-2023-52638: Fix not seen in stream +CVE-2023-52639: Fix not seen in stream +CVE-2023-52640: Fix not seen in stream +CVE-2023-52641: Fix not seen in stream CVE-2023-6040: Fix not seen in stream CVE-2023-6240: Fix unknown -CVE-2023-6270: Fix unknown -CVE-2023-6356: Fix unknown +CVE-2023-6270: Fix not seen in stream +CVE-2023-6356: Fix not seen in stream CVE-2023-6535: Fix unknown -CVE-2023-6536: Fix unknown +CVE-2023-6536: Fix not seen in stream CVE-2023-6546: Fix not seen in stream CVE-2023-6606: Fix not seen in stream CVE-2023-6610: Fix not seen in stream CVE-2023-6915: Fix not seen in stream CVE-2023-6932: Fix not seen in stream -CVE-2023-7042: Fix unknown +CVE-2023-7042: Fix not seen in stream CVE-2023-7192: Fix not seen in stream CVE-2024-0340: Fix not seen in stream CVE-2024-0584: Fix not seen in stream CVE-2024-0775: Fix not seen in stream CVE-2024-1312: Fix not seen in stream CVE-2024-21803: Fix unknown -CVE-2024-22099: Fix unknown +CVE-2024-2193: Fix unknown +CVE-2024-22099: Fix not seen in stream CVE-2024-22386: Fix unknown -CVE-2024-23196: Fix unknown +CVE-2024-23196: Fix not seen in stream CVE-2024-23848: Fix unknown CVE-2024-23851: Fix not seen in stream CVE-2024-24855: Fix not seen in stream CVE-2024-24859: Fix unknown -CVE-2024-24861: Fix unknown +CVE-2024-24861: Fix not seen in stream CVE-2024-24864: Fix unknown CVE-2024-25739: Fix unknown CVE-2024-25740: Fix unknown CVE-2024-25741: Fix unknown CVE-2024-25744: Fix not seen in stream -CVE-2024-26584: Fix not seen in stream -CVE-2024-26587: Fix not seen in stream -CVE-2024-26588: Fix not seen in stream -CVE-2024-26591: Fix not seen in stream CVE-2024-26592: Fix not seen in stream CVE-2024-26594: Fix not seen in stream CVE-2024-26598: Fix not seen in stream +CVE-2024-26600: Fix not seen in stream +CVE-2024-26606: Fix not seen in stream +CVE-2024-26622: Fix not seen in stream +CVE-2024-26623: Fix not seen in stream +CVE-2024-26625: Fix not seen in stream +CVE-2024-26627: Fix not seen in stream +CVE-2024-26633: Fix not seen in stream +CVE-2024-26635: Fix not seen in stream +CVE-2024-26636: Fix not seen in stream +CVE-2024-26644: Fix not seen in stream +CVE-2024-26646: Fix not seen in stream +CVE-2024-26647: Fix not seen in stream +CVE-2024-26648: Fix not seen in stream +CVE-2024-26650: Fix not seen in stream +CVE-2024-26651: Fix not seen in stream +CVE-2024-26654: Fix not seen in stream +CVE-2024-26655: Fix not seen in stream +CVE-2024-26656: Fix not seen in stream +CVE-2024-26658: Fix not seen in stream +CVE-2024-26659: Fix not seen in stream +CVE-2024-26664: Fix not seen in stream +CVE-2024-26671: Fix not seen in stream +CVE-2024-26672: Fix not seen in stream +CVE-2024-26675: Fix not seen in stream +CVE-2024-26676: Fix not seen in stream +CVE-2024-26677: Fix not seen in stream +CVE-2024-26685: Fix not seen in stream +CVE-2024-26686: Fix not seen in stream +CVE-2024-26687: Fix not seen in stream +CVE-2024-26689: Fix not seen in stream +CVE-2024-26691: Fix not seen in stream +CVE-2024-26696: Fix not seen in stream +CVE-2024-26697: Fix not seen in stream +CVE-2024-26699: Fix not seen in stream +CVE-2024-26700: Fix not seen in stream +CVE-2024-26706: Fix not seen in stream +CVE-2024-26713: Fix not seen in stream +CVE-2024-26719: Fix not seen in stream +CVE-2024-26726: Fix not seen in stream +CVE-2024-26733: Fix not seen in stream +CVE-2024-26738: Fix not seen in stream +CVE-2024-26739: Fix not seen in stream +CVE-2024-26743: Fix not seen in stream +CVE-2024-26744: Fix not seen in stream +CVE-2024-26745: Fix not seen in stream +CVE-2024-26748: Fix not seen in stream +CVE-2024-26752: Fix not seen in stream +CVE-2024-26756: Fix not seen in stream +CVE-2024-26758: Fix not seen in stream +CVE-2024-26759: Fix not seen in stream +CVE-2024-26763: Fix not seen in stream +CVE-2024-26764: Fix not seen in stream +CVE-2024-26765: Fix not seen in stream +CVE-2024-26766: Fix not seen in stream +CVE-2024-26767: Fix not seen in stream +CVE-2024-26768: Fix not seen in stream +CVE-2024-26769: Fix not seen in stream +CVE-2024-26770: Fix not seen in stream +CVE-2024-26771: Fix not seen in stream +CVE-2024-26772: Fix not seen in stream +CVE-2024-26773: Fix not seen in stream +CVE-2024-26774: Fix not seen in stream +CVE-2024-26775: Fix not seen in stream +CVE-2024-26776: Fix not seen in stream +CVE-2024-26777: Fix not seen in stream +CVE-2024-26778: Fix not seen in stream +CVE-2024-26779: Fix not seen in stream +CVE-2024-26784: Fix not seen in stream +CVE-2024-26789: Fix not seen in stream +CVE-2024-26791: Fix not seen in stream +CVE-2024-26793: Fix not seen in stream +CVE-2024-26797: Fix not seen in stream +CVE-2024-26798: Fix not seen in stream +CVE-2024-26802: Fix not seen in stream +CVE-2024-26803: Fix not seen in stream +CVE-2024-26804: Fix not seen in stream +CVE-2024-26806: Fix not seen in stream +CVE-2024-26808: Fix not seen in stream +CVE-2024-26809: Fix not seen in stream diff --git a/data/3.12/3.12_security.txt b/data/3.12/3.12_security.txt index 313e5e25a..605b52566 100644 --- a/data/3.12/3.12_security.txt +++ b/data/3.12/3.12_security.txt @@ -944,6 +944,7 @@ Outstanding CVEs: CVE-2019-2181: (unk) binder: check for overflow when alloc for security context CVE-2019-2213: (unk) binder: fix possible UAF when freeing buffer CVE-2019-2215: (unk) ANDROID: binder: remove waitqueue when thread exits. + CVE-2019-25160: (unk) netlabel: fix out-of-bounds memory accesses CVE-2019-3459: (unk) Bluetooth: Verify that l2cap_get_conf_opt provides large enough buffer CVE-2019-3460: (unk) Bluetooth: Check L2CAP option sizes returned from l2cap_get_conf_opt CVE-2019-3701: (unk) can: gw: ensure DLC boundaries after CAN frame modification @@ -1101,6 +1102,9 @@ Outstanding CVEs: CVE-2020-36557: (unk) vt: vt_ioctl: fix VT_DISALLOCATE freeing in-use virtual console CVE-2020-36558: (unk) vt: vt_ioctl: fix race in VT_RESIZEX CVE-2020-36691: (unk) netlink: limit recursion depth in policy validation + CVE-2020-36775: (unk) f2fs: fix to avoid potential deadlock + CVE-2020-36780: (unk) i2c: sprd: fix reference leak when pm_runtime_get_sync fails + CVE-2020-36781: (unk) i2c: imx: fix reference leak when pm_runtime_get_sync fails CVE-2020-3702: (unk) ath: Use safer key clearing with key cache entries CVE-2020-4788: (unk) powerpc/64s: flush L1D on kernel entry CVE-2020-8647: (unk) vgacon: Fix a UAF in vgacon_invert_region @@ -1219,6 +1223,76 @@ Outstanding CVEs: CVE-2021-45469: (unk) f2fs: fix to do sanity check on last xattr entry in __f2fs_setxattr() CVE-2021-45485: (unk) ipv6: use prandom_u32() for ID generation CVE-2021-45868: (unk) quota: check block number when reading the block in quota file + CVE-2021-46904: (unk) net: hso: fix null-ptr-deref during tty device unregistration + CVE-2021-46906: (unk) HID: usbhid: fix info leak in hid_submit_ctrl + CVE-2021-46908: (unk) bpf: Use correct permission flag for mixed signed bounds arithmetic + CVE-2021-46926: (unk) ALSA: hda: intel-sdw-acpi: harden detection of controller + CVE-2021-46928: (unk) parisc: Clear stale IIR value on instruction access rights trap + CVE-2021-46932: (unk) Input: appletouch - initialize work before device registration + CVE-2021-46936: (unk) net: fix use-after-free in tw_timer_handler + CVE-2021-46939: (unk) tracing: Restructure trace_clock_global() to never block + CVE-2021-46950: (unk) md/raid1: properly indicate failure when ending a failed write request + CVE-2021-46951: (unk) tpm: efi: Use local variable for calculating final log size + CVE-2021-46952: (unk) NFS: fs_context: validate UDP retrans to prevent shift out-of-bounds + CVE-2021-46959: (unk) spi: Fix use-after-free with devm_spi_alloc_* + CVE-2021-46962: (unk) mmc: uniphier-sd: Fix a resource leak in the remove function + CVE-2021-46965: (unk) mtd: physmap: physmap-bt1-rom: Fix unintentional stack access + CVE-2021-46969: (unk) bus: mhi: core: Fix invalid error returning in mhi_queue + CVE-2021-46970: (unk) bus: mhi: pci_generic: Remove WQ_MEM_RECLAIM flag from state workqueue + CVE-2021-46982: (unk) f2fs: compress: fix race condition of overwrite vs truncate + CVE-2021-47028: (unk) mt76: mt7915: fix txrate reporting + CVE-2021-47046: (unk) drm/amd/display: Fix off by one in hdmi_14_process_transaction() + CVE-2021-47052: (unk) crypto: sa2ul - Fix memory leak of rxd + CVE-2021-47059: (unk) crypto: sun8i-ss - fix result memory leak on error path + CVE-2021-47065: (unk) rtw88: Fix array overrun in rtw_get_tx_power_params() + CVE-2021-47070: (unk) uio_hv_generic: Fix another memory leak in error handling paths + CVE-2021-47075: (unk) nvmet: fix memory leak in nvmet_alloc_ctrl() + CVE-2021-47076: (unk) RDMA/rxe: Return CQE error if invalid lkey was supplied + CVE-2021-47082: (unk) tun: avoid double free in tun_free_netdev + CVE-2021-47083: (unk) pinctrl: mediatek: fix global-out-of-bounds issue + CVE-2021-47086: (unk) phonet/pep: refuse to enable an unbound pipe + CVE-2021-47101: (unk) asix: fix uninit-value in asix_mdio_read() + CVE-2021-47103: (unk) inet: fully convert sk->sk_rx_dst to RCU rules + CVE-2021-47110: (unk) x86/kvm: Disable kvmclock on all CPUs on shutdown + CVE-2021-47112: (unk) x86/kvm: Teardown PV features on boot CPU as well + CVE-2021-47113: (unk) btrfs: abort in rename_exchange if we fail to insert the second ref + CVE-2021-47114: (unk) ocfs2: fix data corruption by fallocate + CVE-2021-47116: (unk) ext4: fix memory leak in ext4_mb_init_backend on error path. + CVE-2021-47117: (unk) ext4: fix bug on in ext4_es_cache_extent as ext4_split_extent_at failed + CVE-2021-47118: (unk) pid: take a reference when initializing `cad_pid` + CVE-2021-47119: (unk) ext4: fix memory leak in ext4_fill_super + CVE-2021-47121: (unk) net: caif: fix memory leak in cfusbl_device_notify + CVE-2021-47122: (unk) net: caif: fix memory leak in caif_device_notify + CVE-2021-47124: (unk) io_uring: fix link timeout refs + CVE-2021-47125: (unk) sch_htb: fix refcount leak in htb_parent_to_leaf_offload + CVE-2021-47128: (unk) bpf, lockdown, audit: Fix buggy SELinux lockdown permission checks + CVE-2021-47131: (unk) net/tls: Fix use-after-free after the TLS device goes down and up + CVE-2021-47133: (unk) HID: amd_sfh: Fix memory leak in amd_sfh_work + CVE-2021-47135: (unk) mt76: mt7921: fix possible AOOB issue in mt7921_mcu_tx_rate_report + CVE-2021-47136: (unk) net: zero-initialize tc skb extension on allocation + CVE-2021-47137: (unk) net: lantiq: fix memory corruption in RX ring + CVE-2021-47140: (unk) iommu/amd: Clear DMA ops when switching domain + CVE-2021-47142: (unk) drm/amdgpu: Fix a use-after-free + CVE-2021-47143: (unk) net/smc: remove device from smcd_dev_list after failed device_add() + CVE-2021-47144: (unk) drm/amd/amdgpu: fix refcount leak + CVE-2021-47145: (unk) btrfs: do not BUG_ON in link_to_fixup_dir + CVE-2021-47146: (unk) mld: fix panic in mld_newpack() + CVE-2021-47147: (unk) ptp: ocp: Fix a resource leak in an error handling path + CVE-2021-47149: (unk) net: fujitsu: fix potential null-ptr-deref + CVE-2021-47151: (unk) interconnect: qcom: bcm-voter: add a missing of_node_put() + CVE-2021-47153: (unk) i2c: i801: Don't generate an interrupt on bus reset + CVE-2021-47158: (unk) net: dsa: sja1105: add error handling in sja1105_setup() + CVE-2021-47160: (unk) net: dsa: mt7530: fix VLAN traffic leaks + CVE-2021-47165: (unk) drm/meson: fix shutdown crash when component not probed + CVE-2021-47168: (unk) NFS: fix an incorrect limit in filelayout_decode_layout() + CVE-2021-47169: (unk) serial: rp2: use 'request_firmware' instead of 'request_firmware_nowait' + CVE-2021-47170: (unk) USB: usbfs: Don't WARN about excessively large memory allocations + CVE-2021-47171: (unk) net: usb: fix memory leak in smsc75xx_bind + CVE-2021-47172: (unk) iio: adc: ad7124: Fix potential overflow due to non sequential channel numbers + CVE-2021-47173: (unk) misc/uss720: fix memory leak in uss720_probe + CVE-2021-47175: (unk) net/sched: fq_pie: fix OOB access in the traffic path + CVE-2021-47179: (unk) NFSv4: Fix a NULL pointer dereference in pnfs_mark_matching_lsegs_return() + CVE-2021-47180: (unk) NFC: nci: fix memory leak in nci_allocate_device CVE-2022-0001: (unk) x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE CVE-2022-0002: (unk) x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE CVE-2022-0168: (unk) cifs: fix NULL ptr dereference in smb2_ioctl_query_info() @@ -1369,6 +1443,9 @@ Outstanding CVEs: CVE-2022-4662: (unk) USB: core: Prevent nested device-reset calls CVE-2022-4744: (unk) tun: avoid double free in tun_free_netdev CVE-2022-48619: (unk) Input: add bounds checking to input_set_capability() + CVE-2022-48626: (unk) moxart: fix potential use-after-free on remove path + CVE-2022-48627: (unk) vt: fix memory overlapping when deleting chars in the buffer + CVE-2022-48628: (unk) ceph: drop messages from MDS when unmounting CVE-2023-0030: (unk) drm/nouveau/mmu: add more general vmm free/node handling functions CVE-2023-0047: (unk) mm, oom: do not trigger out_of_memory from the #PF CVE-2023-0266: (unk) ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF @@ -1410,6 +1487,7 @@ Outstanding CVEs: CVE-2023-2513: (unk) ext4: fix use-after-free in ext4_xattr_set_entry CVE-2023-26607: (unk) ntfs: fix out-of-bounds read in ntfs_attr_find() CVE-2023-28328: (unk) media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer() + CVE-2023-28746: (unk) x86/mmio: Disable KVM mitigation when X86_FEATURE_CLEAR_CPU_BUF is set CVE-2023-28772: (unk) seq_buf: Fix overflow in seq_buf_putmem_hex() CVE-2023-2985: (unk) fs: hfsplus: fix UAF issue in hfsplus_put_super CVE-2023-3006: (unk) arm64: Add AMPERE1 to the Spectre-BHB affected list @@ -1461,7 +1539,7 @@ Outstanding CVEs: CVE-2023-4623: (unk) net/sched: sch_hfsc: Ensure inner classes have fsc curve CVE-2023-46343: (unk) nfc: nci: fix possible NULL pointer dereference in send_acknowledge() CVE-2023-46838: (unk) xen-netback: don't produce zero-size SKB frags - CVE-2023-47233: (unk) + CVE-2023-47233: (unk) wifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach CVE-2023-4921: (unk) net: sched: sch_qfq: Fix UAF in qfq_dequeue() CVE-2023-51043: (unk) drm/atomic: Fix potential use-after-free in nonblocking commits CVE-2023-51779: (unk) Bluetooth: af_bluetooth: Fix Use-After-Free in bt_sock_recvmsg @@ -1472,49 +1550,207 @@ Outstanding CVEs: CVE-2023-52340: (unk) ipv6: remove max_size check inline with ipv4 CVE-2023-52429: (unk) dm: limit the number of targets and parameter size area CVE-2023-52434: (unk) smb: client: fix potential OOBs in smb2_parse_contexts() - CVE-2023-52435: (unk) net: prevent mss overflow in skb_segment() CVE-2023-52436: (unk) f2fs: explicitly null-terminate the xattr list CVE-2023-52442: (unk) ksmbd: validate session id and tree id in compound request CVE-2023-52445: (unk) media: pvrusb2: fix use after free on context disconnection CVE-2023-52449: (unk) mtd: Fix gluebi NULL pointer dereference caused by ftl notifier - CVE-2023-52456: (unk) serial: imx: fix tx statemachine deadlock - CVE-2023-52457: (unk) serial: 8250: omap: Don't skip resource freeing if pm_runtime_resume_and_get() failed CVE-2023-52458: (unk) block: add check that partition length needs to be aligned with block size + CVE-2023-52475: (unk) Input: powermate - fix use-after-free in powermate_config_complete + CVE-2023-52476: (unk) perf/x86/lbr: Filter vsyscall addresses + CVE-2023-52477: (unk) usb: hub: Guard against accesses to uninitialized BOS descriptors + CVE-2023-52478: (unk) HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect + CVE-2023-52479: (unk) ksmbd: fix uaf in smb20_oplock_break_ack + CVE-2023-52480: (unk) ksmbd: fix race condition between session lookup and expire + CVE-2023-52481: (unk) arm64: errata: Add Cortex-A520 speculative unprivileged load workaround + CVE-2023-52482: (unk) x86/srso: Add SRSO mitigation for Hygon processors + CVE-2023-52484: (unk) iommu/arm-smmu-v3: Fix soft lockup triggered by arm_smmu_mm_invalidate_range + CVE-2023-52485: (unk) drm/amd/display: Wake DMCUB before sending a command + CVE-2023-52486: (unk) drm: Don't unref the same fb many times by mistake due to deadlock handling + CVE-2023-52489: (unk) mm/sparsemem: fix race in accessing memory_section->usage + CVE-2023-52498: (unk) PM: sleep: Fix possible deadlocks in core system-wide PM code + CVE-2023-52500: (unk) scsi: pm80xx: Avoid leaking tags when processing OPC_INB_SET_CONTROLLER_CONFIG command + CVE-2023-52501: (unk) ring-buffer: Do not attempt to read past "commit" + CVE-2023-52502: (unk) net: nfc: fix races in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn() + CVE-2023-52506: (unk) LoongArch: Set all reserved memblocks on Node#0 at initialization + CVE-2023-52507: (unk) nfc: nci: assert requested protocol is valid + CVE-2023-52508: (unk) nvme-fc: Prevent null pointer dereference in nvme_fc_io_getuuid() + CVE-2023-52509: (unk) ravb: Fix use-after-free issue in ravb_tx_timeout_work() + CVE-2023-52511: (unk) spi: sun6i: reduce DMA RX transfer width to single byte + CVE-2023-52515: (unk) RDMA/srp: Do not call scsi_done() from srp_abort() + CVE-2023-52516: (unk) dma-debug: don't call __dma_entry_alloc_check_leak() under free_entries_lock + CVE-2023-52517: (unk) spi: sun6i: fix race between DMA RX transfer completion and RX FIFO drain + CVE-2023-52519: (unk) HID: intel-ish-hid: ipc: Disable and reenable ACPI GPE bit + CVE-2023-52522: (unk) net: fix possible store tearing in neigh_periodic_work() + CVE-2023-52527: (unk) ipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data() + CVE-2023-52528: (unk) net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg + CVE-2023-52531: (unk) wifi: iwlwifi: mvm: Fix a memory corruption issue + CVE-2023-52532: (unk) net: mana: Fix TX CQE error handling + CVE-2023-52559: (unk) iommu/vt-d: Avoid memory allocation in iommu_suspend() + CVE-2023-52561: (unk) arm64: dts: qcom: sdm845-db845c: Mark cont splash memory region as reserved + CVE-2023-52563: (unk) drm/meson: fix memory leak on ->hpd_notify callback + CVE-2023-52565: (unk) media: uvcvideo: Fix OOB read + CVE-2023-52566: (unk) nilfs2: fix potential use after free in nilfs_gccache_submit_read_data() + CVE-2023-52568: (unk) x86/sgx: Resolves SECS reclaim vs. page fault for EAUG race + CVE-2023-52569: (unk) btrfs: remove BUG() after failure to insert delayed dir index item + CVE-2023-52571: (unk) power: supply: rk817: Fix node refcount leak + CVE-2023-52572: (unk) cifs: Fix UAF in cifs_demultiplex_thread() + CVE-2023-52574: (unk) team: fix null-ptr-deref when team device type is changed + CVE-2023-52578: (unk) net: bridge: use DEV_STATS_INC() + CVE-2023-52583: (unk) ceph: fix deadlock or deadcode of misusing dget() + CVE-2023-52584: (unk) spmi: mediatek: Fix UAF on device remove + CVE-2023-52585: (unk) drm/amdgpu: Fix possible NULL dereference in amdgpu_ras_query_error_status_helper() + CVE-2023-52586: (unk) drm/msm/dpu: Add mutex lock in control vblank irq + CVE-2023-52587: (unk) IB/ipoib: Fix mcast list locking + CVE-2023-52588: (unk) f2fs: fix to tag gcing flag on page during block migration + CVE-2023-52589: (unk) media: rkisp1: Fix IRQ disable race issue + CVE-2023-52590: (unk) ocfs2: Avoid touching renamed directory if parent does not change + CVE-2023-52591: (unk) reiserfs: Avoid touching renamed directory if parent does not change + CVE-2023-52593: (unk) wifi: wfx: fix possible NULL pointer dereference in wfx_set_mfp_ap() + CVE-2023-52594: (unk) wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus() + CVE-2023-52595: (unk) wifi: rt2x00: restart beacon queue when hardware reset + CVE-2023-52596: (unk) sysctl: Fix out of bounds access for empty sysctl registers + CVE-2023-52597: (unk) KVM: s390: fix setting of fpc register + CVE-2023-52598: (unk) s390/ptrace: handle setting of fpc register correctly + CVE-2023-52599: (unk) jfs: fix array-index-out-of-bounds in diNewExt + CVE-2023-52600: (unk) jfs: fix uaf in jfs_evict_inode + CVE-2023-52601: (unk) jfs: fix array-index-out-of-bounds in dbAdjTree + CVE-2023-52602: (unk) jfs: fix slab-out-of-bounds Read in dtSearch + CVE-2023-52603: (unk) UBSAN: array-index-out-of-bounds in dtSplitRoot + CVE-2023-52604: (unk) FS:JFS:UBSAN:array-index-out-of-bounds in dbAdjTree + CVE-2023-52606: (unk) powerpc/lib: Validate size for vector operations + CVE-2023-52607: (unk) powerpc/mm: Fix null-pointer dereference in pgtable_cache_add + CVE-2023-52609: (unk) binder: fix race between mmput() and do_exit() + CVE-2023-52614: (unk) PM / devfreq: Fix buffer overflow in trans_stat_show + CVE-2023-52615: (unk) hwrng: core - Fix page fault dead lock on mmap-ed hwrng + CVE-2023-52617: (unk) PCI: switchtec: Fix stdev_release() crash after surprise hot remove + CVE-2023-52618: (unk) block/rnbd-srv: Check for unlikely string overflow + CVE-2023-52619: (unk) pstore/ram: Fix crash when setting number of cpus to an odd number + CVE-2023-52620: (unk) netfilter: nf_tables: disallow timeout for anonymous sets + CVE-2023-52621: (unk) bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers + CVE-2023-52622: (unk) ext4: avoid online resizing failures due to oversized flex bg + CVE-2023-52623: (unk) SUNRPC: Fix a suspicious RCU usage warning + CVE-2023-52624: (unk) drm/amd/display: Wake DMCUB before executing GPINT commands + CVE-2023-52625: (unk) drm/amd/display: Refactor DMCUB enter/exit idle interface + CVE-2023-52629: (unk) sh: push-switch: Reorder cleanup operations to avoid use-after-free bug + CVE-2023-52632: (unk) drm/amdkfd: Fix lock dependency warning with srcu + CVE-2023-52633: (unk) um: time-travel: fix time corruption + CVE-2023-52634: (unk) drm/amd/display: Fix disable_otg_wa logic + CVE-2023-52635: (unk) PM / devfreq: Synchronize devfreq_monitor_[start/stop] + CVE-2023-52638: (unk) can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock + CVE-2023-52639: (unk) KVM: s390: vsie: fix race during shadow creation + CVE-2023-52640: (unk) fs/ntfs3: Fix oob in ntfs_listxattr + CVE-2023-52641: (unk) fs/ntfs3: Add NULL ptr dereference checking at the end of attr_allocate_frame() CVE-2023-6040: (unk) netfilter: nf_tables: Reject tables of unsupported family CVE-2023-6240: (unk) - CVE-2023-6270: (unk) - CVE-2023-6356: (unk) + CVE-2023-6270: (unk) aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts + CVE-2023-6356: (unk) nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length CVE-2023-6535: (unk) - CVE-2023-6536: (unk) + CVE-2023-6536: (unk) nvmet-tcp: fix a crash in nvmet_req_complete() CVE-2023-6546: (unk) tty: n_gsm: fix the UAF caused by race condition in gsm_cleanup_mux CVE-2023-6606: (unk) smb: client: fix OOB in smbCalcSize() CVE-2023-6610: (unk) smb: client: fix potential OOB in smb2_dump_detail() CVE-2023-6915: (unk) ida: Fix crash in ida_free when the bitmap is empty CVE-2023-6932: (unk) ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet - CVE-2023-7042: (unk) + CVE-2023-7042: (unk) wifi: ath10k: fix NULL pointer dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev() CVE-2023-7192: (unk) netfilter: ctnetlink: fix possible refcount leak in ctnetlink_create_conntrack() CVE-2024-0340: (unk) vhost: use kzalloc() instead of kmalloc() followed by memset() CVE-2024-0584: (unk) ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet CVE-2024-0775: (unk) ext4: improve error recovery code paths in __ext4_remount() CVE-2024-1312: (unk) mm: lock_vma_under_rcu() must check vma->anon_vma under vma lock CVE-2024-21803: (unk) - CVE-2024-22099: (unk) + CVE-2024-2193: (unk) + CVE-2024-22099: (unk) Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security CVE-2024-22386: (unk) - CVE-2024-23196: (unk) + CVE-2024-23196: (unk) ALSA: hda: fix a possible null-pointer dereference due to data race in snd_hdac_regmap_sync() CVE-2024-23848: (unk) CVE-2024-23851: (unk) dm: limit the number of targets and parameter size area CVE-2024-24855: (unk) scsi: lpfc: Fix a possible data race in lpfc_unregister_fcf_rescan() CVE-2024-24859: (unk) - CVE-2024-24861: (unk) + CVE-2024-24861: (unk) media: xc4000: Fix atomicity violation in xc4000_get_frequency CVE-2024-24864: (unk) CVE-2024-25739: (unk) CVE-2024-25740: (unk) CVE-2024-25741: (unk) CVE-2024-25744: (unk) x86/coco: Disable 32-bit emulation by default on TDX and SEV - CVE-2024-26584: (unk) net: tls: handle backlogging of crypto requests - CVE-2024-26587: (unk) net: netdevsim: don't try to destroy PHC on VFs - CVE-2024-26588: (unk) LoongArch: BPF: Prevent out-of-bounds memory access - CVE-2024-26591: (unk) bpf: Fix re-attachment branch in bpf_tracing_prog_attach CVE-2024-26592: (unk) ksmbd: fix UAF issue in ksmbd_tcp_new_connection() CVE-2024-26594: (unk) ksmbd: validate mech token in session setup CVE-2024-26598: (unk) KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache + CVE-2024-26600: (unk) phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP + CVE-2024-26606: (unk) binder: signal epoll threads of self-work + CVE-2024-26622: (unk) tomoyo: fix UAF write bug in tomoyo_write_control() + CVE-2024-26623: (unk) pds_core: Prevent race issues involving the adminq + CVE-2024-26625: (unk) llc: call sock_orphan() at release time + CVE-2024-26627: (unk) scsi: core: Move scsi_host_busy() out of host lock for waking up EH handler + CVE-2024-26633: (unk) ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim() + CVE-2024-26635: (unk) llc: Drop support for ETH_P_TR_802_2. + CVE-2024-26636: (unk) llc: make llc_ui_sendmsg() more robust against bonding changes + CVE-2024-26644: (unk) btrfs: don't abort filesystem when attempting to snapshot deleted subvolume + CVE-2024-26646: (unk) thermal: intel: hfi: Add syscore callbacks for system-wide PM + CVE-2024-26647: (unk) drm/amd/display: Fix late derefrence 'dsc' check in 'link_set_dsc_pps_packet()' + CVE-2024-26648: (unk) drm/amd/display: Fix variable deferencing before NULL check in edp_setup_replay() + CVE-2024-26650: (unk) platform/x86: p2sb: Allow p2sb_bar() calls during PCI device probe + CVE-2024-26651: (unk) sr9800: Add check for usbnet_get_endpoints + CVE-2024-26654: (unk) ALSA: sh: aica: reorder cleanup operations to avoid UAF bugs + CVE-2024-26655: (unk) Fix memory leak in posix_clock_open() + CVE-2024-26656: (unk) drm/amdgpu: fix use-after-free bug + CVE-2024-26658: (unk) bcachefs: grab s_umount only if snapshotting + CVE-2024-26659: (unk) xhci: handle isoc Babble and Buffer Overrun events properly + CVE-2024-26664: (unk) hwmon: (coretemp) Fix out-of-bounds memory access + CVE-2024-26671: (unk) blk-mq: fix IO hang from sbitmap wakeup race + CVE-2024-26672: (unk) drm/amdgpu: Fix variable 'mca_funcs' dereferenced before NULL check in 'amdgpu_mca_smu_get_mca_entry()' + CVE-2024-26675: (unk) ppp_async: limit MRU to 64K + CVE-2024-26676: (unk) af_unix: Call kfree_skb() for dead unix_(sk)->oob_skb in GC. + CVE-2024-26677: (unk) rxrpc: Fix delayed ACKs to not set the reference serial number + CVE-2024-26685: (unk) nilfs2: fix potential bug in end_buffer_async_write + CVE-2024-26686: (unk) fs/proc: do_task_stat: use sig->stats_lock to gather the threads/children stats + CVE-2024-26687: (unk) xen/events: close evtchn after mapping cleanup + CVE-2024-26689: (unk) ceph: prevent use-after-free in encode_cap_msg() + CVE-2024-26691: (unk) KVM: arm64: Fix circular locking dependency + CVE-2024-26696: (unk) nilfs2: fix hang in nilfs_lookup_dirty_data_buffers() + CVE-2024-26697: (unk) nilfs2: fix data corruption in dsync block recovery for small block sizes + CVE-2024-26699: (unk) drm/amd/display: Fix array-index-out-of-bounds in dcn35_clkmgr + CVE-2024-26700: (unk) drm/amd/display: Fix MST Null Ptr for RV + CVE-2024-26706: (unk) parisc: Fix random data corruption from exception handler + CVE-2024-26713: (unk) powerpc/pseries/iommu: Fix iommu initialisation during DLPAR add + CVE-2024-26719: (unk) nouveau: offload fence uevents work to workqueue + CVE-2024-26726: (unk) btrfs: don't drop extent_map for free space inode on write error + CVE-2024-26733: (unk) arp: Prevent overflow in arp_req_get(). + CVE-2024-26738: (unk) powerpc/pseries/iommu: DLPAR add doesn't completely initialize pci_controller + CVE-2024-26739: (unk) net/sched: act_mirred: don't override retval if we already lost the skb + CVE-2024-26743: (unk) RDMA/qedr: Fix qedr_create_user_qp error flow + CVE-2024-26744: (unk) RDMA/srpt: Support specifying the srpt_service_guid parameter + CVE-2024-26745: (unk) powerpc/pseries/iommu: IOMMU table is not initialized for kdump over SR-IOV + CVE-2024-26748: (unk) usb: cdns3: fix memory double free when handle zero packet + CVE-2024-26752: (unk) l2tp: pass correct message length to ip6_append_data + CVE-2024-26756: (unk) md: Don't register sync_thread for reshape directly + CVE-2024-26758: (unk) md: Don't ignore suspended array in md_check_recovery() + CVE-2024-26759: (unk) mm/swap: fix race when skipping swapcache + CVE-2024-26763: (unk) dm-crypt: don't modify the data when using authenticated encryption + CVE-2024-26764: (unk) fs/aio: Restrict kiocb_set_cancel_fn() to I/O submitted via libaio + CVE-2024-26765: (unk) LoongArch: Disable IRQ before init_fn() for nonboot CPUs + CVE-2024-26766: (unk) IB/hfi1: Fix sdma.h tx->num_descs off-by-one error + CVE-2024-26767: (unk) drm/amd/display: fixed integer types and null check locations + CVE-2024-26768: (unk) LoongArch: Change acpi_core_pic[NR_CPUS] to acpi_core_pic[MAX_CORE_PIC] + CVE-2024-26769: (unk) nvmet-fc: avoid deadlock on delete association path + CVE-2024-26770: (unk) HID: nvidia-shield: Add missing null pointer checks to LED initialization + CVE-2024-26771: (unk) dmaengine: ti: edma: Add some null pointer checks to the edma_probe + CVE-2024-26772: (unk) ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal() + CVE-2024-26773: (unk) ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found() + CVE-2024-26774: (unk) ext4: avoid dividing by 0 in mb_update_avg_fragment_size() when block bitmap corrupt + CVE-2024-26775: (unk) aoe: avoid potential deadlock at set_capacity + CVE-2024-26776: (unk) spi: hisi-sfc-v3xx: Return IRQ_NONE if no interrupts were detected + CVE-2024-26777: (unk) fbdev: sis: Error out if pixclock equals zero + CVE-2024-26778: (unk) fbdev: savage: Error out if pixclock equals zero + CVE-2024-26779: (unk) wifi: mac80211: fix race condition on enabling fast-xmit + CVE-2024-26784: (unk) pmdomain: arm: Fix NULL dereference on scmi_perf_domain removal + CVE-2024-26789: (unk) crypto: arm64/neonbs - fix out-of-bounds access on short input + CVE-2024-26791: (unk) btrfs: dev-replace: properly validate device names + CVE-2024-26793: (unk) gtp: fix use-after-free and null-ptr-deref in gtp_newlink() + CVE-2024-26797: (unk) drm/amd/display: Prevent potential buffer overflow in map_hw_resources + CVE-2024-26798: (unk) fbcon: always restore the old font data in fbcon_do_set_font() + CVE-2024-26802: (unk) stmmac: Clear variable when destroying workqueue + CVE-2024-26803: (unk) net: veth: clear GRO when clearing XDP even when down + CVE-2024-26804: (unk) net: ip_tunnel: prevent perpetual headroom growth + CVE-2024-26806: (unk) spi: cadence-qspi: remove system-wide suspend helper calls from runtime PM hooks + CVE-2024-26808: (unk) netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain + CVE-2024-26809: (unk) netfilter: nft_set_pipapo: release elements in clone only from destroy path diff --git a/data/3.14/3.14_CVEs.txt b/data/3.14/3.14_CVEs.txt index fa7e850c0..f7822182e 100644 --- a/data/3.14/3.14_CVEs.txt +++ b/data/3.14/3.14_CVEs.txt @@ -769,6 +769,7 @@ CVE-2019-2101: Fix not seen in stream CVE-2019-2181: Fix not seen in stream CVE-2019-2213: Fix not seen in stream CVE-2019-2215: Fix not seen in stream +CVE-2019-25160: Fix not seen in stream CVE-2019-3459: Fix not seen in stream CVE-2019-3460: Fix not seen in stream CVE-2019-3701: Fix not seen in stream @@ -927,6 +928,9 @@ CVE-2020-36386: Fix not seen in stream CVE-2020-36557: Fix not seen in stream CVE-2020-36558: Fix not seen in stream CVE-2020-36691: Fix not seen in stream +CVE-2020-36775: Fix not seen in stream +CVE-2020-36780: Fix not seen in stream +CVE-2020-36781: Fix not seen in stream CVE-2020-3702: Fix not seen in stream CVE-2020-4788: Fix not seen in stream CVE-2020-8647: Fix not seen in stream @@ -1048,6 +1052,76 @@ CVE-2021-45095: Fix not seen in stream CVE-2021-45469: Fix not seen in stream CVE-2021-45485: Fix not seen in stream CVE-2021-45868: Fix not seen in stream +CVE-2021-46904: Fix not seen in stream +CVE-2021-46906: Fix not seen in stream +CVE-2021-46908: Fix not seen in stream +CVE-2021-46926: Fix not seen in stream +CVE-2021-46928: Fix not seen in stream +CVE-2021-46932: Fix not seen in stream +CVE-2021-46936: Fix not seen in stream +CVE-2021-46939: Fix not seen in stream +CVE-2021-46950: Fix not seen in stream +CVE-2021-46951: Fix not seen in stream +CVE-2021-46952: Fix not seen in stream +CVE-2021-46959: Fix not seen in stream +CVE-2021-46962: Fix not seen in stream +CVE-2021-46965: Fix not seen in stream +CVE-2021-46969: Fix not seen in stream +CVE-2021-46970: Fix not seen in stream +CVE-2021-46982: Fix not seen in stream +CVE-2021-47028: Fix not seen in stream +CVE-2021-47046: Fix not seen in stream +CVE-2021-47052: Fix not seen in stream +CVE-2021-47059: Fix not seen in stream +CVE-2021-47065: Fix not seen in stream +CVE-2021-47070: Fix not seen in stream +CVE-2021-47075: Fix not seen in stream +CVE-2021-47076: Fix not seen in stream +CVE-2021-47082: Fix not seen in stream +CVE-2021-47083: Fix not seen in stream +CVE-2021-47086: Fix not seen in stream +CVE-2021-47101: Fix not seen in stream +CVE-2021-47103: Fix not seen in stream +CVE-2021-47110: Fix not seen in stream +CVE-2021-47112: Fix not seen in stream +CVE-2021-47113: Fix not seen in stream +CVE-2021-47114: Fix not seen in stream +CVE-2021-47116: Fix not seen in stream +CVE-2021-47117: Fix not seen in stream +CVE-2021-47118: Fix not seen in stream +CVE-2021-47119: Fix not seen in stream +CVE-2021-47121: Fix not seen in stream +CVE-2021-47122: Fix not seen in stream +CVE-2021-47124: Fix not seen in stream +CVE-2021-47125: Fix not seen in stream +CVE-2021-47128: Fix not seen in stream +CVE-2021-47131: Fix not seen in stream +CVE-2021-47133: Fix not seen in stream +CVE-2021-47135: Fix not seen in stream +CVE-2021-47136: Fix not seen in stream +CVE-2021-47137: Fix not seen in stream +CVE-2021-47140: Fix not seen in stream +CVE-2021-47142: Fix not seen in stream +CVE-2021-47143: Fix not seen in stream +CVE-2021-47144: Fix not seen in stream +CVE-2021-47145: Fix not seen in stream +CVE-2021-47146: Fix not seen in stream +CVE-2021-47147: Fix not seen in stream +CVE-2021-47149: Fix not seen in stream +CVE-2021-47151: Fix not seen in stream +CVE-2021-47153: Fix not seen in stream +CVE-2021-47158: Fix not seen in stream +CVE-2021-47160: Fix not seen in stream +CVE-2021-47165: Fix not seen in stream +CVE-2021-47168: Fix not seen in stream +CVE-2021-47169: Fix not seen in stream +CVE-2021-47170: Fix not seen in stream +CVE-2021-47171: Fix not seen in stream +CVE-2021-47172: Fix not seen in stream +CVE-2021-47173: Fix not seen in stream +CVE-2021-47175: Fix not seen in stream +CVE-2021-47179: Fix not seen in stream +CVE-2021-47180: Fix not seen in stream CVE-2022-0001: Fix not seen in stream CVE-2022-0002: Fix not seen in stream CVE-2022-0168: Fix not seen in stream @@ -1200,6 +1274,9 @@ CVE-2022-45934: Fix not seen in stream CVE-2022-4662: Fix not seen in stream CVE-2022-4744: Fix not seen in stream CVE-2022-48619: Fix not seen in stream +CVE-2022-48626: Fix not seen in stream +CVE-2022-48627: Fix not seen in stream +CVE-2022-48628: Fix not seen in stream CVE-2023-0030: Fix not seen in stream CVE-2023-0047: Fix not seen in stream CVE-2023-0266: Fix not seen in stream @@ -1241,6 +1318,7 @@ CVE-2023-23559: Fix not seen in stream CVE-2023-2513: Fix not seen in stream CVE-2023-26607: Fix not seen in stream CVE-2023-28328: Fix not seen in stream +CVE-2023-28746: Fix not seen in stream CVE-2023-28772: Fix not seen in stream CVE-2023-2985: Fix not seen in stream CVE-2023-3006: Fix not seen in stream @@ -1293,7 +1371,7 @@ CVE-2023-45871: Fix not seen in stream CVE-2023-4623: Fix not seen in stream CVE-2023-46343: Fix not seen in stream CVE-2023-46838: Fix not seen in stream -CVE-2023-47233: Fix unknown +CVE-2023-47233: Fix not seen in stream CVE-2023-4921: Fix not seen in stream CVE-2023-51043: Fix not seen in stream CVE-2023-51779: Fix not seen in stream @@ -1304,50 +1382,208 @@ CVE-2023-51782: Fix not seen in stream CVE-2023-52340: Fix not seen in stream CVE-2023-52429: Fix not seen in stream CVE-2023-52434: Fix not seen in stream -CVE-2023-52435: Fix not seen in stream CVE-2023-52436: Fix not seen in stream CVE-2023-52442: Fix not seen in stream CVE-2023-52445: Fix not seen in stream CVE-2023-52449: Fix not seen in stream -CVE-2023-52456: Fix not seen in stream -CVE-2023-52457: Fix not seen in stream CVE-2023-52458: Fix not seen in stream +CVE-2023-52475: Fix not seen in stream +CVE-2023-52476: Fix not seen in stream +CVE-2023-52477: Fix not seen in stream +CVE-2023-52478: Fix not seen in stream +CVE-2023-52479: Fix not seen in stream +CVE-2023-52480: Fix not seen in stream +CVE-2023-52481: Fix not seen in stream +CVE-2023-52482: Fix not seen in stream +CVE-2023-52484: Fix not seen in stream +CVE-2023-52485: Fix not seen in stream +CVE-2023-52486: Fix not seen in stream +CVE-2023-52489: Fix not seen in stream +CVE-2023-52498: Fix not seen in stream +CVE-2023-52500: Fix not seen in stream +CVE-2023-52501: Fix not seen in stream +CVE-2023-52502: Fix not seen in stream +CVE-2023-52506: Fix not seen in stream +CVE-2023-52507: Fix not seen in stream +CVE-2023-52508: Fix not seen in stream +CVE-2023-52509: Fix not seen in stream +CVE-2023-52511: Fix not seen in stream +CVE-2023-52515: Fix not seen in stream +CVE-2023-52516: Fix not seen in stream +CVE-2023-52517: Fix not seen in stream +CVE-2023-52519: Fix not seen in stream +CVE-2023-52522: Fix not seen in stream +CVE-2023-52527: Fix not seen in stream +CVE-2023-52528: Fix not seen in stream +CVE-2023-52531: Fix not seen in stream +CVE-2023-52532: Fix not seen in stream +CVE-2023-52559: Fix not seen in stream +CVE-2023-52561: Fix not seen in stream +CVE-2023-52563: Fix not seen in stream +CVE-2023-52565: Fix not seen in stream +CVE-2023-52566: Fix not seen in stream +CVE-2023-52568: Fix not seen in stream +CVE-2023-52569: Fix not seen in stream +CVE-2023-52571: Fix not seen in stream +CVE-2023-52572: Fix not seen in stream +CVE-2023-52574: Fix not seen in stream +CVE-2023-52578: Fix not seen in stream +CVE-2023-52583: Fix not seen in stream +CVE-2023-52584: Fix not seen in stream +CVE-2023-52585: Fix not seen in stream +CVE-2023-52586: Fix not seen in stream +CVE-2023-52587: Fix not seen in stream +CVE-2023-52588: Fix not seen in stream +CVE-2023-52589: Fix not seen in stream +CVE-2023-52590: Fix not seen in stream +CVE-2023-52591: Fix not seen in stream +CVE-2023-52593: Fix not seen in stream +CVE-2023-52594: Fix not seen in stream +CVE-2023-52595: Fix not seen in stream +CVE-2023-52596: Fix not seen in stream +CVE-2023-52597: Fix not seen in stream +CVE-2023-52598: Fix not seen in stream +CVE-2023-52599: Fix not seen in stream +CVE-2023-52600: Fix not seen in stream +CVE-2023-52601: Fix not seen in stream +CVE-2023-52602: Fix not seen in stream +CVE-2023-52603: Fix not seen in stream +CVE-2023-52604: Fix not seen in stream +CVE-2023-52606: Fix not seen in stream +CVE-2023-52607: Fix not seen in stream +CVE-2023-52609: Fix not seen in stream +CVE-2023-52614: Fix not seen in stream +CVE-2023-52615: Fix not seen in stream +CVE-2023-52617: Fix not seen in stream +CVE-2023-52618: Fix not seen in stream +CVE-2023-52619: Fix not seen in stream +CVE-2023-52620: Fix not seen in stream +CVE-2023-52621: Fix not seen in stream +CVE-2023-52622: Fix not seen in stream +CVE-2023-52623: Fix not seen in stream +CVE-2023-52624: Fix not seen in stream +CVE-2023-52625: Fix not seen in stream +CVE-2023-52629: Fix not seen in stream +CVE-2023-52632: Fix not seen in stream +CVE-2023-52633: Fix not seen in stream +CVE-2023-52634: Fix not seen in stream +CVE-2023-52635: Fix not seen in stream +CVE-2023-52638: Fix not seen in stream +CVE-2023-52639: Fix not seen in stream +CVE-2023-52640: Fix not seen in stream +CVE-2023-52641: Fix not seen in stream CVE-2023-6040: Fix not seen in stream CVE-2023-6240: Fix unknown -CVE-2023-6270: Fix unknown -CVE-2023-6356: Fix unknown +CVE-2023-6270: Fix not seen in stream +CVE-2023-6356: Fix not seen in stream CVE-2023-6535: Fix unknown -CVE-2023-6536: Fix unknown +CVE-2023-6536: Fix not seen in stream CVE-2023-6546: Fix not seen in stream CVE-2023-6606: Fix not seen in stream CVE-2023-6610: Fix not seen in stream CVE-2023-6915: Fix not seen in stream CVE-2023-6932: Fix not seen in stream -CVE-2023-7042: Fix unknown +CVE-2023-7042: Fix not seen in stream CVE-2023-7192: Fix not seen in stream CVE-2024-0340: Fix not seen in stream CVE-2024-0584: Fix not seen in stream CVE-2024-0775: Fix not seen in stream CVE-2024-1312: Fix not seen in stream CVE-2024-21803: Fix unknown -CVE-2024-22099: Fix unknown +CVE-2024-2193: Fix unknown +CVE-2024-22099: Fix not seen in stream CVE-2024-22386: Fix unknown -CVE-2024-23196: Fix unknown +CVE-2024-23196: Fix not seen in stream CVE-2024-23848: Fix unknown CVE-2024-23851: Fix not seen in stream CVE-2024-24855: Fix not seen in stream CVE-2024-24858: Fix unknown CVE-2024-24859: Fix unknown -CVE-2024-24861: Fix unknown +CVE-2024-24861: Fix not seen in stream CVE-2024-24864: Fix unknown CVE-2024-25739: Fix unknown CVE-2024-25740: Fix unknown CVE-2024-25741: Fix unknown CVE-2024-25744: Fix not seen in stream -CVE-2024-26584: Fix not seen in stream -CVE-2024-26587: Fix not seen in stream -CVE-2024-26588: Fix not seen in stream -CVE-2024-26591: Fix not seen in stream CVE-2024-26592: Fix not seen in stream CVE-2024-26594: Fix not seen in stream CVE-2024-26598: Fix not seen in stream +CVE-2024-26600: Fix not seen in stream +CVE-2024-26606: Fix not seen in stream +CVE-2024-26622: Fix not seen in stream +CVE-2024-26623: Fix not seen in stream +CVE-2024-26625: Fix not seen in stream +CVE-2024-26627: Fix not seen in stream +CVE-2024-26633: Fix not seen in stream +CVE-2024-26635: Fix not seen in stream +CVE-2024-26636: Fix not seen in stream +CVE-2024-26644: Fix not seen in stream +CVE-2024-26646: Fix not seen in stream +CVE-2024-26647: Fix not seen in stream +CVE-2024-26648: Fix not seen in stream +CVE-2024-26650: Fix not seen in stream +CVE-2024-26651: Fix not seen in stream +CVE-2024-26654: Fix not seen in stream +CVE-2024-26655: Fix not seen in stream +CVE-2024-26656: Fix not seen in stream +CVE-2024-26658: Fix not seen in stream +CVE-2024-26659: Fix not seen in stream +CVE-2024-26664: Fix not seen in stream +CVE-2024-26671: Fix not seen in stream +CVE-2024-26672: Fix not seen in stream +CVE-2024-26675: Fix not seen in stream +CVE-2024-26676: Fix not seen in stream +CVE-2024-26677: Fix not seen in stream +CVE-2024-26685: Fix not seen in stream +CVE-2024-26686: Fix not seen in stream +CVE-2024-26687: Fix not seen in stream +CVE-2024-26689: Fix not seen in stream +CVE-2024-26691: Fix not seen in stream +CVE-2024-26696: Fix not seen in stream +CVE-2024-26697: Fix not seen in stream +CVE-2024-26699: Fix not seen in stream +CVE-2024-26700: Fix not seen in stream +CVE-2024-26706: Fix not seen in stream +CVE-2024-26713: Fix not seen in stream +CVE-2024-26719: Fix not seen in stream +CVE-2024-26726: Fix not seen in stream +CVE-2024-26733: Fix not seen in stream +CVE-2024-26738: Fix not seen in stream +CVE-2024-26739: Fix not seen in stream +CVE-2024-26743: Fix not seen in stream +CVE-2024-26744: Fix not seen in stream +CVE-2024-26745: Fix not seen in stream +CVE-2024-26748: Fix not seen in stream +CVE-2024-26752: Fix not seen in stream +CVE-2024-26756: Fix not seen in stream +CVE-2024-26758: Fix not seen in stream +CVE-2024-26759: Fix not seen in stream +CVE-2024-26763: Fix not seen in stream +CVE-2024-26764: Fix not seen in stream +CVE-2024-26765: Fix not seen in stream +CVE-2024-26766: Fix not seen in stream +CVE-2024-26767: Fix not seen in stream +CVE-2024-26768: Fix not seen in stream +CVE-2024-26769: Fix not seen in stream +CVE-2024-26770: Fix not seen in stream +CVE-2024-26771: Fix not seen in stream +CVE-2024-26772: Fix not seen in stream +CVE-2024-26773: Fix not seen in stream +CVE-2024-26774: Fix not seen in stream +CVE-2024-26775: Fix not seen in stream +CVE-2024-26776: Fix not seen in stream +CVE-2024-26777: Fix not seen in stream +CVE-2024-26778: Fix not seen in stream +CVE-2024-26779: Fix not seen in stream +CVE-2024-26784: Fix not seen in stream +CVE-2024-26789: Fix not seen in stream +CVE-2024-26791: Fix not seen in stream +CVE-2024-26793: Fix not seen in stream +CVE-2024-26797: Fix not seen in stream +CVE-2024-26798: Fix not seen in stream +CVE-2024-26802: Fix not seen in stream +CVE-2024-26803: Fix not seen in stream +CVE-2024-26804: Fix not seen in stream +CVE-2024-26806: Fix not seen in stream +CVE-2024-26808: Fix not seen in stream +CVE-2024-26809: Fix not seen in stream diff --git a/data/3.14/3.14_security.txt b/data/3.14/3.14_security.txt index bd3d323ff..8c85a67ae 100644 --- a/data/3.14/3.14_security.txt +++ b/data/3.14/3.14_security.txt @@ -903,6 +903,7 @@ Outstanding CVEs: CVE-2019-2181: (unk) binder: check for overflow when alloc for security context CVE-2019-2213: (unk) binder: fix possible UAF when freeing buffer CVE-2019-2215: (unk) ANDROID: binder: remove waitqueue when thread exits. + CVE-2019-25160: (unk) netlabel: fix out-of-bounds memory accesses CVE-2019-3459: (unk) Bluetooth: Verify that l2cap_get_conf_opt provides large enough buffer CVE-2019-3460: (unk) Bluetooth: Check L2CAP option sizes returned from l2cap_get_conf_opt CVE-2019-3701: (unk) can: gw: ensure DLC boundaries after CAN frame modification @@ -1061,6 +1062,9 @@ Outstanding CVEs: CVE-2020-36557: (unk) vt: vt_ioctl: fix VT_DISALLOCATE freeing in-use virtual console CVE-2020-36558: (unk) vt: vt_ioctl: fix race in VT_RESIZEX CVE-2020-36691: (unk) netlink: limit recursion depth in policy validation + CVE-2020-36775: (unk) f2fs: fix to avoid potential deadlock + CVE-2020-36780: (unk) i2c: sprd: fix reference leak when pm_runtime_get_sync fails + CVE-2020-36781: (unk) i2c: imx: fix reference leak when pm_runtime_get_sync fails CVE-2020-3702: (unk) ath: Use safer key clearing with key cache entries CVE-2020-4788: (unk) powerpc/64s: flush L1D on kernel entry CVE-2020-8647: (unk) vgacon: Fix a UAF in vgacon_invert_region @@ -1182,6 +1186,76 @@ Outstanding CVEs: CVE-2021-45469: (unk) f2fs: fix to do sanity check on last xattr entry in __f2fs_setxattr() CVE-2021-45485: (unk) ipv6: use prandom_u32() for ID generation CVE-2021-45868: (unk) quota: check block number when reading the block in quota file + CVE-2021-46904: (unk) net: hso: fix null-ptr-deref during tty device unregistration + CVE-2021-46906: (unk) HID: usbhid: fix info leak in hid_submit_ctrl + CVE-2021-46908: (unk) bpf: Use correct permission flag for mixed signed bounds arithmetic + CVE-2021-46926: (unk) ALSA: hda: intel-sdw-acpi: harden detection of controller + CVE-2021-46928: (unk) parisc: Clear stale IIR value on instruction access rights trap + CVE-2021-46932: (unk) Input: appletouch - initialize work before device registration + CVE-2021-46936: (unk) net: fix use-after-free in tw_timer_handler + CVE-2021-46939: (unk) tracing: Restructure trace_clock_global() to never block + CVE-2021-46950: (unk) md/raid1: properly indicate failure when ending a failed write request + CVE-2021-46951: (unk) tpm: efi: Use local variable for calculating final log size + CVE-2021-46952: (unk) NFS: fs_context: validate UDP retrans to prevent shift out-of-bounds + CVE-2021-46959: (unk) spi: Fix use-after-free with devm_spi_alloc_* + CVE-2021-46962: (unk) mmc: uniphier-sd: Fix a resource leak in the remove function + CVE-2021-46965: (unk) mtd: physmap: physmap-bt1-rom: Fix unintentional stack access + CVE-2021-46969: (unk) bus: mhi: core: Fix invalid error returning in mhi_queue + CVE-2021-46970: (unk) bus: mhi: pci_generic: Remove WQ_MEM_RECLAIM flag from state workqueue + CVE-2021-46982: (unk) f2fs: compress: fix race condition of overwrite vs truncate + CVE-2021-47028: (unk) mt76: mt7915: fix txrate reporting + CVE-2021-47046: (unk) drm/amd/display: Fix off by one in hdmi_14_process_transaction() + CVE-2021-47052: (unk) crypto: sa2ul - Fix memory leak of rxd + CVE-2021-47059: (unk) crypto: sun8i-ss - fix result memory leak on error path + CVE-2021-47065: (unk) rtw88: Fix array overrun in rtw_get_tx_power_params() + CVE-2021-47070: (unk) uio_hv_generic: Fix another memory leak in error handling paths + CVE-2021-47075: (unk) nvmet: fix memory leak in nvmet_alloc_ctrl() + CVE-2021-47076: (unk) RDMA/rxe: Return CQE error if invalid lkey was supplied + CVE-2021-47082: (unk) tun: avoid double free in tun_free_netdev + CVE-2021-47083: (unk) pinctrl: mediatek: fix global-out-of-bounds issue + CVE-2021-47086: (unk) phonet/pep: refuse to enable an unbound pipe + CVE-2021-47101: (unk) asix: fix uninit-value in asix_mdio_read() + CVE-2021-47103: (unk) inet: fully convert sk->sk_rx_dst to RCU rules + CVE-2021-47110: (unk) x86/kvm: Disable kvmclock on all CPUs on shutdown + CVE-2021-47112: (unk) x86/kvm: Teardown PV features on boot CPU as well + CVE-2021-47113: (unk) btrfs: abort in rename_exchange if we fail to insert the second ref + CVE-2021-47114: (unk) ocfs2: fix data corruption by fallocate + CVE-2021-47116: (unk) ext4: fix memory leak in ext4_mb_init_backend on error path. + CVE-2021-47117: (unk) ext4: fix bug on in ext4_es_cache_extent as ext4_split_extent_at failed + CVE-2021-47118: (unk) pid: take a reference when initializing `cad_pid` + CVE-2021-47119: (unk) ext4: fix memory leak in ext4_fill_super + CVE-2021-47121: (unk) net: caif: fix memory leak in cfusbl_device_notify + CVE-2021-47122: (unk) net: caif: fix memory leak in caif_device_notify + CVE-2021-47124: (unk) io_uring: fix link timeout refs + CVE-2021-47125: (unk) sch_htb: fix refcount leak in htb_parent_to_leaf_offload + CVE-2021-47128: (unk) bpf, lockdown, audit: Fix buggy SELinux lockdown permission checks + CVE-2021-47131: (unk) net/tls: Fix use-after-free after the TLS device goes down and up + CVE-2021-47133: (unk) HID: amd_sfh: Fix memory leak in amd_sfh_work + CVE-2021-47135: (unk) mt76: mt7921: fix possible AOOB issue in mt7921_mcu_tx_rate_report + CVE-2021-47136: (unk) net: zero-initialize tc skb extension on allocation + CVE-2021-47137: (unk) net: lantiq: fix memory corruption in RX ring + CVE-2021-47140: (unk) iommu/amd: Clear DMA ops when switching domain + CVE-2021-47142: (unk) drm/amdgpu: Fix a use-after-free + CVE-2021-47143: (unk) net/smc: remove device from smcd_dev_list after failed device_add() + CVE-2021-47144: (unk) drm/amd/amdgpu: fix refcount leak + CVE-2021-47145: (unk) btrfs: do not BUG_ON in link_to_fixup_dir + CVE-2021-47146: (unk) mld: fix panic in mld_newpack() + CVE-2021-47147: (unk) ptp: ocp: Fix a resource leak in an error handling path + CVE-2021-47149: (unk) net: fujitsu: fix potential null-ptr-deref + CVE-2021-47151: (unk) interconnect: qcom: bcm-voter: add a missing of_node_put() + CVE-2021-47153: (unk) i2c: i801: Don't generate an interrupt on bus reset + CVE-2021-47158: (unk) net: dsa: sja1105: add error handling in sja1105_setup() + CVE-2021-47160: (unk) net: dsa: mt7530: fix VLAN traffic leaks + CVE-2021-47165: (unk) drm/meson: fix shutdown crash when component not probed + CVE-2021-47168: (unk) NFS: fix an incorrect limit in filelayout_decode_layout() + CVE-2021-47169: (unk) serial: rp2: use 'request_firmware' instead of 'request_firmware_nowait' + CVE-2021-47170: (unk) USB: usbfs: Don't WARN about excessively large memory allocations + CVE-2021-47171: (unk) net: usb: fix memory leak in smsc75xx_bind + CVE-2021-47172: (unk) iio: adc: ad7124: Fix potential overflow due to non sequential channel numbers + CVE-2021-47173: (unk) misc/uss720: fix memory leak in uss720_probe + CVE-2021-47175: (unk) net/sched: fq_pie: fix OOB access in the traffic path + CVE-2021-47179: (unk) NFSv4: Fix a NULL pointer dereference in pnfs_mark_matching_lsegs_return() + CVE-2021-47180: (unk) NFC: nci: fix memory leak in nci_allocate_device CVE-2022-0001: (unk) x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE CVE-2022-0002: (unk) x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE CVE-2022-0168: (unk) cifs: fix NULL ptr dereference in smb2_ioctl_query_info() @@ -1334,6 +1408,9 @@ Outstanding CVEs: CVE-2022-4662: (unk) USB: core: Prevent nested device-reset calls CVE-2022-4744: (unk) tun: avoid double free in tun_free_netdev CVE-2022-48619: (unk) Input: add bounds checking to input_set_capability() + CVE-2022-48626: (unk) moxart: fix potential use-after-free on remove path + CVE-2022-48627: (unk) vt: fix memory overlapping when deleting chars in the buffer + CVE-2022-48628: (unk) ceph: drop messages from MDS when unmounting CVE-2023-0030: (unk) drm/nouveau/mmu: add more general vmm free/node handling functions CVE-2023-0047: (unk) mm, oom: do not trigger out_of_memory from the #PF CVE-2023-0266: (unk) ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF @@ -1375,6 +1452,7 @@ Outstanding CVEs: CVE-2023-2513: (unk) ext4: fix use-after-free in ext4_xattr_set_entry CVE-2023-26607: (unk) ntfs: fix out-of-bounds read in ntfs_attr_find() CVE-2023-28328: (unk) media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer() + CVE-2023-28746: (unk) x86/mmio: Disable KVM mitigation when X86_FEATURE_CLEAR_CPU_BUF is set CVE-2023-28772: (unk) seq_buf: Fix overflow in seq_buf_putmem_hex() CVE-2023-2985: (unk) fs: hfsplus: fix UAF issue in hfsplus_put_super CVE-2023-3006: (unk) arm64: Add AMPERE1 to the Spectre-BHB affected list @@ -1427,7 +1505,7 @@ Outstanding CVEs: CVE-2023-4623: (unk) net/sched: sch_hfsc: Ensure inner classes have fsc curve CVE-2023-46343: (unk) nfc: nci: fix possible NULL pointer dereference in send_acknowledge() CVE-2023-46838: (unk) xen-netback: don't produce zero-size SKB frags - CVE-2023-47233: (unk) + CVE-2023-47233: (unk) wifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach CVE-2023-4921: (unk) net: sched: sch_qfq: Fix UAF in qfq_dequeue() CVE-2023-51043: (unk) drm/atomic: Fix potential use-after-free in nonblocking commits CVE-2023-51779: (unk) Bluetooth: af_bluetooth: Fix Use-After-Free in bt_sock_recvmsg @@ -1438,50 +1516,208 @@ Outstanding CVEs: CVE-2023-52340: (unk) ipv6: remove max_size check inline with ipv4 CVE-2023-52429: (unk) dm: limit the number of targets and parameter size area CVE-2023-52434: (unk) smb: client: fix potential OOBs in smb2_parse_contexts() - CVE-2023-52435: (unk) net: prevent mss overflow in skb_segment() CVE-2023-52436: (unk) f2fs: explicitly null-terminate the xattr list CVE-2023-52442: (unk) ksmbd: validate session id and tree id in compound request CVE-2023-52445: (unk) media: pvrusb2: fix use after free on context disconnection CVE-2023-52449: (unk) mtd: Fix gluebi NULL pointer dereference caused by ftl notifier - CVE-2023-52456: (unk) serial: imx: fix tx statemachine deadlock - CVE-2023-52457: (unk) serial: 8250: omap: Don't skip resource freeing if pm_runtime_resume_and_get() failed CVE-2023-52458: (unk) block: add check that partition length needs to be aligned with block size + CVE-2023-52475: (unk) Input: powermate - fix use-after-free in powermate_config_complete + CVE-2023-52476: (unk) perf/x86/lbr: Filter vsyscall addresses + CVE-2023-52477: (unk) usb: hub: Guard against accesses to uninitialized BOS descriptors + CVE-2023-52478: (unk) HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect + CVE-2023-52479: (unk) ksmbd: fix uaf in smb20_oplock_break_ack + CVE-2023-52480: (unk) ksmbd: fix race condition between session lookup and expire + CVE-2023-52481: (unk) arm64: errata: Add Cortex-A520 speculative unprivileged load workaround + CVE-2023-52482: (unk) x86/srso: Add SRSO mitigation for Hygon processors + CVE-2023-52484: (unk) iommu/arm-smmu-v3: Fix soft lockup triggered by arm_smmu_mm_invalidate_range + CVE-2023-52485: (unk) drm/amd/display: Wake DMCUB before sending a command + CVE-2023-52486: (unk) drm: Don't unref the same fb many times by mistake due to deadlock handling + CVE-2023-52489: (unk) mm/sparsemem: fix race in accessing memory_section->usage + CVE-2023-52498: (unk) PM: sleep: Fix possible deadlocks in core system-wide PM code + CVE-2023-52500: (unk) scsi: pm80xx: Avoid leaking tags when processing OPC_INB_SET_CONTROLLER_CONFIG command + CVE-2023-52501: (unk) ring-buffer: Do not attempt to read past "commit" + CVE-2023-52502: (unk) net: nfc: fix races in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn() + CVE-2023-52506: (unk) LoongArch: Set all reserved memblocks on Node#0 at initialization + CVE-2023-52507: (unk) nfc: nci: assert requested protocol is valid + CVE-2023-52508: (unk) nvme-fc: Prevent null pointer dereference in nvme_fc_io_getuuid() + CVE-2023-52509: (unk) ravb: Fix use-after-free issue in ravb_tx_timeout_work() + CVE-2023-52511: (unk) spi: sun6i: reduce DMA RX transfer width to single byte + CVE-2023-52515: (unk) RDMA/srp: Do not call scsi_done() from srp_abort() + CVE-2023-52516: (unk) dma-debug: don't call __dma_entry_alloc_check_leak() under free_entries_lock + CVE-2023-52517: (unk) spi: sun6i: fix race between DMA RX transfer completion and RX FIFO drain + CVE-2023-52519: (unk) HID: intel-ish-hid: ipc: Disable and reenable ACPI GPE bit + CVE-2023-52522: (unk) net: fix possible store tearing in neigh_periodic_work() + CVE-2023-52527: (unk) ipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data() + CVE-2023-52528: (unk) net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg + CVE-2023-52531: (unk) wifi: iwlwifi: mvm: Fix a memory corruption issue + CVE-2023-52532: (unk) net: mana: Fix TX CQE error handling + CVE-2023-52559: (unk) iommu/vt-d: Avoid memory allocation in iommu_suspend() + CVE-2023-52561: (unk) arm64: dts: qcom: sdm845-db845c: Mark cont splash memory region as reserved + CVE-2023-52563: (unk) drm/meson: fix memory leak on ->hpd_notify callback + CVE-2023-52565: (unk) media: uvcvideo: Fix OOB read + CVE-2023-52566: (unk) nilfs2: fix potential use after free in nilfs_gccache_submit_read_data() + CVE-2023-52568: (unk) x86/sgx: Resolves SECS reclaim vs. page fault for EAUG race + CVE-2023-52569: (unk) btrfs: remove BUG() after failure to insert delayed dir index item + CVE-2023-52571: (unk) power: supply: rk817: Fix node refcount leak + CVE-2023-52572: (unk) cifs: Fix UAF in cifs_demultiplex_thread() + CVE-2023-52574: (unk) team: fix null-ptr-deref when team device type is changed + CVE-2023-52578: (unk) net: bridge: use DEV_STATS_INC() + CVE-2023-52583: (unk) ceph: fix deadlock or deadcode of misusing dget() + CVE-2023-52584: (unk) spmi: mediatek: Fix UAF on device remove + CVE-2023-52585: (unk) drm/amdgpu: Fix possible NULL dereference in amdgpu_ras_query_error_status_helper() + CVE-2023-52586: (unk) drm/msm/dpu: Add mutex lock in control vblank irq + CVE-2023-52587: (unk) IB/ipoib: Fix mcast list locking + CVE-2023-52588: (unk) f2fs: fix to tag gcing flag on page during block migration + CVE-2023-52589: (unk) media: rkisp1: Fix IRQ disable race issue + CVE-2023-52590: (unk) ocfs2: Avoid touching renamed directory if parent does not change + CVE-2023-52591: (unk) reiserfs: Avoid touching renamed directory if parent does not change + CVE-2023-52593: (unk) wifi: wfx: fix possible NULL pointer dereference in wfx_set_mfp_ap() + CVE-2023-52594: (unk) wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus() + CVE-2023-52595: (unk) wifi: rt2x00: restart beacon queue when hardware reset + CVE-2023-52596: (unk) sysctl: Fix out of bounds access for empty sysctl registers + CVE-2023-52597: (unk) KVM: s390: fix setting of fpc register + CVE-2023-52598: (unk) s390/ptrace: handle setting of fpc register correctly + CVE-2023-52599: (unk) jfs: fix array-index-out-of-bounds in diNewExt + CVE-2023-52600: (unk) jfs: fix uaf in jfs_evict_inode + CVE-2023-52601: (unk) jfs: fix array-index-out-of-bounds in dbAdjTree + CVE-2023-52602: (unk) jfs: fix slab-out-of-bounds Read in dtSearch + CVE-2023-52603: (unk) UBSAN: array-index-out-of-bounds in dtSplitRoot + CVE-2023-52604: (unk) FS:JFS:UBSAN:array-index-out-of-bounds in dbAdjTree + CVE-2023-52606: (unk) powerpc/lib: Validate size for vector operations + CVE-2023-52607: (unk) powerpc/mm: Fix null-pointer dereference in pgtable_cache_add + CVE-2023-52609: (unk) binder: fix race between mmput() and do_exit() + CVE-2023-52614: (unk) PM / devfreq: Fix buffer overflow in trans_stat_show + CVE-2023-52615: (unk) hwrng: core - Fix page fault dead lock on mmap-ed hwrng + CVE-2023-52617: (unk) PCI: switchtec: Fix stdev_release() crash after surprise hot remove + CVE-2023-52618: (unk) block/rnbd-srv: Check for unlikely string overflow + CVE-2023-52619: (unk) pstore/ram: Fix crash when setting number of cpus to an odd number + CVE-2023-52620: (unk) netfilter: nf_tables: disallow timeout for anonymous sets + CVE-2023-52621: (unk) bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers + CVE-2023-52622: (unk) ext4: avoid online resizing failures due to oversized flex bg + CVE-2023-52623: (unk) SUNRPC: Fix a suspicious RCU usage warning + CVE-2023-52624: (unk) drm/amd/display: Wake DMCUB before executing GPINT commands + CVE-2023-52625: (unk) drm/amd/display: Refactor DMCUB enter/exit idle interface + CVE-2023-52629: (unk) sh: push-switch: Reorder cleanup operations to avoid use-after-free bug + CVE-2023-52632: (unk) drm/amdkfd: Fix lock dependency warning with srcu + CVE-2023-52633: (unk) um: time-travel: fix time corruption + CVE-2023-52634: (unk) drm/amd/display: Fix disable_otg_wa logic + CVE-2023-52635: (unk) PM / devfreq: Synchronize devfreq_monitor_[start/stop] + CVE-2023-52638: (unk) can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock + CVE-2023-52639: (unk) KVM: s390: vsie: fix race during shadow creation + CVE-2023-52640: (unk) fs/ntfs3: Fix oob in ntfs_listxattr + CVE-2023-52641: (unk) fs/ntfs3: Add NULL ptr dereference checking at the end of attr_allocate_frame() CVE-2023-6040: (unk) netfilter: nf_tables: Reject tables of unsupported family CVE-2023-6240: (unk) - CVE-2023-6270: (unk) - CVE-2023-6356: (unk) + CVE-2023-6270: (unk) aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts + CVE-2023-6356: (unk) nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length CVE-2023-6535: (unk) - CVE-2023-6536: (unk) + CVE-2023-6536: (unk) nvmet-tcp: fix a crash in nvmet_req_complete() CVE-2023-6546: (unk) tty: n_gsm: fix the UAF caused by race condition in gsm_cleanup_mux CVE-2023-6606: (unk) smb: client: fix OOB in smbCalcSize() CVE-2023-6610: (unk) smb: client: fix potential OOB in smb2_dump_detail() CVE-2023-6915: (unk) ida: Fix crash in ida_free when the bitmap is empty CVE-2023-6932: (unk) ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet - CVE-2023-7042: (unk) + CVE-2023-7042: (unk) wifi: ath10k: fix NULL pointer dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev() CVE-2023-7192: (unk) netfilter: ctnetlink: fix possible refcount leak in ctnetlink_create_conntrack() CVE-2024-0340: (unk) vhost: use kzalloc() instead of kmalloc() followed by memset() CVE-2024-0584: (unk) ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet CVE-2024-0775: (unk) ext4: improve error recovery code paths in __ext4_remount() CVE-2024-1312: (unk) mm: lock_vma_under_rcu() must check vma->anon_vma under vma lock CVE-2024-21803: (unk) - CVE-2024-22099: (unk) + CVE-2024-2193: (unk) + CVE-2024-22099: (unk) Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security CVE-2024-22386: (unk) - CVE-2024-23196: (unk) + CVE-2024-23196: (unk) ALSA: hda: fix a possible null-pointer dereference due to data race in snd_hdac_regmap_sync() CVE-2024-23848: (unk) CVE-2024-23851: (unk) dm: limit the number of targets and parameter size area CVE-2024-24855: (unk) scsi: lpfc: Fix a possible data race in lpfc_unregister_fcf_rescan() CVE-2024-24858: (unk) CVE-2024-24859: (unk) - CVE-2024-24861: (unk) + CVE-2024-24861: (unk) media: xc4000: Fix atomicity violation in xc4000_get_frequency CVE-2024-24864: (unk) CVE-2024-25739: (unk) CVE-2024-25740: (unk) CVE-2024-25741: (unk) CVE-2024-25744: (unk) x86/coco: Disable 32-bit emulation by default on TDX and SEV - CVE-2024-26584: (unk) net: tls: handle backlogging of crypto requests - CVE-2024-26587: (unk) net: netdevsim: don't try to destroy PHC on VFs - CVE-2024-26588: (unk) LoongArch: BPF: Prevent out-of-bounds memory access - CVE-2024-26591: (unk) bpf: Fix re-attachment branch in bpf_tracing_prog_attach CVE-2024-26592: (unk) ksmbd: fix UAF issue in ksmbd_tcp_new_connection() CVE-2024-26594: (unk) ksmbd: validate mech token in session setup CVE-2024-26598: (unk) KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache + CVE-2024-26600: (unk) phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP + CVE-2024-26606: (unk) binder: signal epoll threads of self-work + CVE-2024-26622: (unk) tomoyo: fix UAF write bug in tomoyo_write_control() + CVE-2024-26623: (unk) pds_core: Prevent race issues involving the adminq + CVE-2024-26625: (unk) llc: call sock_orphan() at release time + CVE-2024-26627: (unk) scsi: core: Move scsi_host_busy() out of host lock for waking up EH handler + CVE-2024-26633: (unk) ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim() + CVE-2024-26635: (unk) llc: Drop support for ETH_P_TR_802_2. + CVE-2024-26636: (unk) llc: make llc_ui_sendmsg() more robust against bonding changes + CVE-2024-26644: (unk) btrfs: don't abort filesystem when attempting to snapshot deleted subvolume + CVE-2024-26646: (unk) thermal: intel: hfi: Add syscore callbacks for system-wide PM + CVE-2024-26647: (unk) drm/amd/display: Fix late derefrence 'dsc' check in 'link_set_dsc_pps_packet()' + CVE-2024-26648: (unk) drm/amd/display: Fix variable deferencing before NULL check in edp_setup_replay() + CVE-2024-26650: (unk) platform/x86: p2sb: Allow p2sb_bar() calls during PCI device probe + CVE-2024-26651: (unk) sr9800: Add check for usbnet_get_endpoints + CVE-2024-26654: (unk) ALSA: sh: aica: reorder cleanup operations to avoid UAF bugs + CVE-2024-26655: (unk) Fix memory leak in posix_clock_open() + CVE-2024-26656: (unk) drm/amdgpu: fix use-after-free bug + CVE-2024-26658: (unk) bcachefs: grab s_umount only if snapshotting + CVE-2024-26659: (unk) xhci: handle isoc Babble and Buffer Overrun events properly + CVE-2024-26664: (unk) hwmon: (coretemp) Fix out-of-bounds memory access + CVE-2024-26671: (unk) blk-mq: fix IO hang from sbitmap wakeup race + CVE-2024-26672: (unk) drm/amdgpu: Fix variable 'mca_funcs' dereferenced before NULL check in 'amdgpu_mca_smu_get_mca_entry()' + CVE-2024-26675: (unk) ppp_async: limit MRU to 64K + CVE-2024-26676: (unk) af_unix: Call kfree_skb() for dead unix_(sk)->oob_skb in GC. + CVE-2024-26677: (unk) rxrpc: Fix delayed ACKs to not set the reference serial number + CVE-2024-26685: (unk) nilfs2: fix potential bug in end_buffer_async_write + CVE-2024-26686: (unk) fs/proc: do_task_stat: use sig->stats_lock to gather the threads/children stats + CVE-2024-26687: (unk) xen/events: close evtchn after mapping cleanup + CVE-2024-26689: (unk) ceph: prevent use-after-free in encode_cap_msg() + CVE-2024-26691: (unk) KVM: arm64: Fix circular locking dependency + CVE-2024-26696: (unk) nilfs2: fix hang in nilfs_lookup_dirty_data_buffers() + CVE-2024-26697: (unk) nilfs2: fix data corruption in dsync block recovery for small block sizes + CVE-2024-26699: (unk) drm/amd/display: Fix array-index-out-of-bounds in dcn35_clkmgr + CVE-2024-26700: (unk) drm/amd/display: Fix MST Null Ptr for RV + CVE-2024-26706: (unk) parisc: Fix random data corruption from exception handler + CVE-2024-26713: (unk) powerpc/pseries/iommu: Fix iommu initialisation during DLPAR add + CVE-2024-26719: (unk) nouveau: offload fence uevents work to workqueue + CVE-2024-26726: (unk) btrfs: don't drop extent_map for free space inode on write error + CVE-2024-26733: (unk) arp: Prevent overflow in arp_req_get(). + CVE-2024-26738: (unk) powerpc/pseries/iommu: DLPAR add doesn't completely initialize pci_controller + CVE-2024-26739: (unk) net/sched: act_mirred: don't override retval if we already lost the skb + CVE-2024-26743: (unk) RDMA/qedr: Fix qedr_create_user_qp error flow + CVE-2024-26744: (unk) RDMA/srpt: Support specifying the srpt_service_guid parameter + CVE-2024-26745: (unk) powerpc/pseries/iommu: IOMMU table is not initialized for kdump over SR-IOV + CVE-2024-26748: (unk) usb: cdns3: fix memory double free when handle zero packet + CVE-2024-26752: (unk) l2tp: pass correct message length to ip6_append_data + CVE-2024-26756: (unk) md: Don't register sync_thread for reshape directly + CVE-2024-26758: (unk) md: Don't ignore suspended array in md_check_recovery() + CVE-2024-26759: (unk) mm/swap: fix race when skipping swapcache + CVE-2024-26763: (unk) dm-crypt: don't modify the data when using authenticated encryption + CVE-2024-26764: (unk) fs/aio: Restrict kiocb_set_cancel_fn() to I/O submitted via libaio + CVE-2024-26765: (unk) LoongArch: Disable IRQ before init_fn() for nonboot CPUs + CVE-2024-26766: (unk) IB/hfi1: Fix sdma.h tx->num_descs off-by-one error + CVE-2024-26767: (unk) drm/amd/display: fixed integer types and null check locations + CVE-2024-26768: (unk) LoongArch: Change acpi_core_pic[NR_CPUS] to acpi_core_pic[MAX_CORE_PIC] + CVE-2024-26769: (unk) nvmet-fc: avoid deadlock on delete association path + CVE-2024-26770: (unk) HID: nvidia-shield: Add missing null pointer checks to LED initialization + CVE-2024-26771: (unk) dmaengine: ti: edma: Add some null pointer checks to the edma_probe + CVE-2024-26772: (unk) ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal() + CVE-2024-26773: (unk) ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found() + CVE-2024-26774: (unk) ext4: avoid dividing by 0 in mb_update_avg_fragment_size() when block bitmap corrupt + CVE-2024-26775: (unk) aoe: avoid potential deadlock at set_capacity + CVE-2024-26776: (unk) spi: hisi-sfc-v3xx: Return IRQ_NONE if no interrupts were detected + CVE-2024-26777: (unk) fbdev: sis: Error out if pixclock equals zero + CVE-2024-26778: (unk) fbdev: savage: Error out if pixclock equals zero + CVE-2024-26779: (unk) wifi: mac80211: fix race condition on enabling fast-xmit + CVE-2024-26784: (unk) pmdomain: arm: Fix NULL dereference on scmi_perf_domain removal + CVE-2024-26789: (unk) crypto: arm64/neonbs - fix out-of-bounds access on short input + CVE-2024-26791: (unk) btrfs: dev-replace: properly validate device names + CVE-2024-26793: (unk) gtp: fix use-after-free and null-ptr-deref in gtp_newlink() + CVE-2024-26797: (unk) drm/amd/display: Prevent potential buffer overflow in map_hw_resources + CVE-2024-26798: (unk) fbcon: always restore the old font data in fbcon_do_set_font() + CVE-2024-26802: (unk) stmmac: Clear variable when destroying workqueue + CVE-2024-26803: (unk) net: veth: clear GRO when clearing XDP even when down + CVE-2024-26804: (unk) net: ip_tunnel: prevent perpetual headroom growth + CVE-2024-26806: (unk) spi: cadence-qspi: remove system-wide suspend helper calls from runtime PM hooks + CVE-2024-26808: (unk) netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain + CVE-2024-26809: (unk) netfilter: nft_set_pipapo: release elements in clone only from destroy path diff --git a/data/3.16/3.16_CVEs.txt b/data/3.16/3.16_CVEs.txt index 91aa96809..d6a29afeb 100644 --- a/data/3.16/3.16_CVEs.txt +++ b/data/3.16/3.16_CVEs.txt @@ -741,6 +741,7 @@ CVE-2019-2101: Fixed with 3.16.70 CVE-2019-2181: Fix not seen in stream CVE-2019-2213: Fix not seen in stream CVE-2019-2215: Fixed with 3.16.79 +CVE-2019-25160: Fixed with 3.16.66 CVE-2019-3459: Fixed with 3.16.66 CVE-2019-3460: Fixed with 3.16.66 CVE-2019-3701: Fixed with 3.16.64 @@ -903,6 +904,9 @@ CVE-2020-36516: Fix not seen in stream CVE-2020-36557: Fix not seen in stream CVE-2020-36558: Fix not seen in stream CVE-2020-36691: Fix not seen in stream +CVE-2020-36775: Fix not seen in stream +CVE-2020-36780: Fix not seen in stream +CVE-2020-36781: Fix not seen in stream CVE-2020-3702: Fix not seen in stream CVE-2020-4788: Fix not seen in stream CVE-2020-8647: Fixed with 3.16.83 @@ -1029,6 +1033,77 @@ CVE-2021-45469: Fix not seen in stream CVE-2021-45485: Fix not seen in stream CVE-2021-45486: Fix not seen in stream CVE-2021-45868: Fix not seen in stream +CVE-2021-46904: Fix not seen in stream +CVE-2021-46906: Fix not seen in stream +CVE-2021-46908: Fix not seen in stream +CVE-2021-46924: Fix not seen in stream +CVE-2021-46926: Fix not seen in stream +CVE-2021-46928: Fix not seen in stream +CVE-2021-46932: Fix not seen in stream +CVE-2021-46936: Fix not seen in stream +CVE-2021-46939: Fix not seen in stream +CVE-2021-46950: Fix not seen in stream +CVE-2021-46951: Fix not seen in stream +CVE-2021-46952: Fix not seen in stream +CVE-2021-46959: Fix not seen in stream +CVE-2021-46962: Fix not seen in stream +CVE-2021-46965: Fix not seen in stream +CVE-2021-46969: Fix not seen in stream +CVE-2021-46970: Fix not seen in stream +CVE-2021-46982: Fix not seen in stream +CVE-2021-47028: Fix not seen in stream +CVE-2021-47046: Fix not seen in stream +CVE-2021-47052: Fix not seen in stream +CVE-2021-47059: Fix not seen in stream +CVE-2021-47065: Fix not seen in stream +CVE-2021-47070: Fix not seen in stream +CVE-2021-47075: Fix not seen in stream +CVE-2021-47076: Fix not seen in stream +CVE-2021-47082: Fix not seen in stream +CVE-2021-47083: Fix not seen in stream +CVE-2021-47086: Fix not seen in stream +CVE-2021-47101: Fix not seen in stream +CVE-2021-47103: Fix not seen in stream +CVE-2021-47110: Fix not seen in stream +CVE-2021-47112: Fix not seen in stream +CVE-2021-47113: Fix not seen in stream +CVE-2021-47114: Fix not seen in stream +CVE-2021-47116: Fix not seen in stream +CVE-2021-47117: Fix not seen in stream +CVE-2021-47118: Fix not seen in stream +CVE-2021-47119: Fix not seen in stream +CVE-2021-47121: Fix not seen in stream +CVE-2021-47122: Fix not seen in stream +CVE-2021-47124: Fix not seen in stream +CVE-2021-47125: Fix not seen in stream +CVE-2021-47128: Fix not seen in stream +CVE-2021-47131: Fix not seen in stream +CVE-2021-47133: Fix not seen in stream +CVE-2021-47135: Fix not seen in stream +CVE-2021-47136: Fix not seen in stream +CVE-2021-47137: Fix not seen in stream +CVE-2021-47140: Fix not seen in stream +CVE-2021-47142: Fix not seen in stream +CVE-2021-47143: Fix not seen in stream +CVE-2021-47144: Fix not seen in stream +CVE-2021-47145: Fix not seen in stream +CVE-2021-47146: Fix not seen in stream +CVE-2021-47147: Fix not seen in stream +CVE-2021-47149: Fix not seen in stream +CVE-2021-47151: Fix not seen in stream +CVE-2021-47153: Fix not seen in stream +CVE-2021-47158: Fix not seen in stream +CVE-2021-47160: Fix not seen in stream +CVE-2021-47165: Fix not seen in stream +CVE-2021-47168: Fix not seen in stream +CVE-2021-47169: Fix not seen in stream +CVE-2021-47170: Fix not seen in stream +CVE-2021-47171: Fix not seen in stream +CVE-2021-47172: Fix not seen in stream +CVE-2021-47173: Fix not seen in stream +CVE-2021-47175: Fix not seen in stream +CVE-2021-47179: Fix not seen in stream +CVE-2021-47180: Fix not seen in stream CVE-2022-0001: Fix not seen in stream CVE-2022-0002: Fix not seen in stream CVE-2022-0168: Fix not seen in stream @@ -1186,6 +1261,9 @@ CVE-2022-45934: Fix not seen in stream CVE-2022-4662: Fix not seen in stream CVE-2022-4744: Fix not seen in stream CVE-2022-48619: Fix not seen in stream +CVE-2022-48626: Fix not seen in stream +CVE-2022-48627: Fix not seen in stream +CVE-2022-48628: Fix not seen in stream CVE-2023-0030: Fix not seen in stream CVE-2023-0047: Fix not seen in stream CVE-2023-0266: Fix not seen in stream @@ -1229,6 +1307,7 @@ CVE-2023-23559: Fix not seen in stream CVE-2023-2513: Fix not seen in stream CVE-2023-26607: Fix not seen in stream CVE-2023-28328: Fix not seen in stream +CVE-2023-28746: Fix not seen in stream CVE-2023-28772: Fix not seen in stream CVE-2023-2985: Fix not seen in stream CVE-2023-3006: Fix not seen in stream @@ -1285,7 +1364,7 @@ CVE-2023-45871: Fix not seen in stream CVE-2023-4623: Fix not seen in stream CVE-2023-46343: Fix not seen in stream CVE-2023-46838: Fix not seen in stream -CVE-2023-47233: Fix unknown +CVE-2023-47233: Fix not seen in stream CVE-2023-4921: Fix not seen in stream CVE-2023-51043: Fix not seen in stream CVE-2023-51779: Fix not seen in stream @@ -1296,26 +1375,110 @@ CVE-2023-51782: Fix not seen in stream CVE-2023-52340: Fix not seen in stream CVE-2023-52429: Fix not seen in stream CVE-2023-52434: Fix not seen in stream -CVE-2023-52435: Fix not seen in stream CVE-2023-52436: Fix not seen in stream CVE-2023-52442: Fix not seen in stream CVE-2023-52445: Fix not seen in stream CVE-2023-52449: Fix not seen in stream -CVE-2023-52456: Fix not seen in stream -CVE-2023-52457: Fix not seen in stream CVE-2023-52458: Fix not seen in stream +CVE-2023-52470: Fix not seen in stream +CVE-2023-52475: Fix not seen in stream +CVE-2023-52476: Fix not seen in stream +CVE-2023-52477: Fix not seen in stream +CVE-2023-52478: Fix not seen in stream +CVE-2023-52479: Fix not seen in stream +CVE-2023-52480: Fix not seen in stream +CVE-2023-52481: Fix not seen in stream +CVE-2023-52482: Fix not seen in stream +CVE-2023-52484: Fix not seen in stream +CVE-2023-52485: Fix not seen in stream +CVE-2023-52486: Fix not seen in stream +CVE-2023-52488: Fix not seen in stream +CVE-2023-52489: Fix not seen in stream +CVE-2023-52498: Fix not seen in stream +CVE-2023-52500: Fix not seen in stream +CVE-2023-52501: Fix not seen in stream +CVE-2023-52502: Fix not seen in stream +CVE-2023-52506: Fix not seen in stream +CVE-2023-52507: Fix not seen in stream +CVE-2023-52508: Fix not seen in stream +CVE-2023-52509: Fix not seen in stream +CVE-2023-52511: Fix not seen in stream +CVE-2023-52515: Fix not seen in stream +CVE-2023-52516: Fix not seen in stream +CVE-2023-52517: Fix not seen in stream +CVE-2023-52519: Fix not seen in stream +CVE-2023-52522: Fix not seen in stream +CVE-2023-52527: Fix not seen in stream +CVE-2023-52528: Fix not seen in stream +CVE-2023-52531: Fix not seen in stream +CVE-2023-52532: Fix not seen in stream +CVE-2023-52559: Fix not seen in stream +CVE-2023-52561: Fix not seen in stream +CVE-2023-52563: Fix not seen in stream +CVE-2023-52565: Fix not seen in stream +CVE-2023-52566: Fix not seen in stream +CVE-2023-52568: Fix not seen in stream +CVE-2023-52569: Fix not seen in stream +CVE-2023-52571: Fix not seen in stream +CVE-2023-52572: Fix not seen in stream +CVE-2023-52574: Fix not seen in stream +CVE-2023-52578: Fix not seen in stream +CVE-2023-52583: Fix not seen in stream +CVE-2023-52584: Fix not seen in stream +CVE-2023-52585: Fix not seen in stream +CVE-2023-52586: Fix not seen in stream +CVE-2023-52587: Fix not seen in stream +CVE-2023-52588: Fix not seen in stream +CVE-2023-52589: Fix not seen in stream +CVE-2023-52590: Fix not seen in stream +CVE-2023-52591: Fix not seen in stream +CVE-2023-52593: Fix not seen in stream +CVE-2023-52594: Fix not seen in stream +CVE-2023-52595: Fix not seen in stream +CVE-2023-52596: Fix not seen in stream +CVE-2023-52597: Fix not seen in stream +CVE-2023-52598: Fix not seen in stream +CVE-2023-52599: Fix not seen in stream +CVE-2023-52600: Fix not seen in stream +CVE-2023-52601: Fix not seen in stream +CVE-2023-52602: Fix not seen in stream +CVE-2023-52603: Fix not seen in stream +CVE-2023-52604: Fix not seen in stream +CVE-2023-52606: Fix not seen in stream +CVE-2023-52607: Fix not seen in stream +CVE-2023-52609: Fix not seen in stream +CVE-2023-52614: Fix not seen in stream +CVE-2023-52615: Fix not seen in stream +CVE-2023-52617: Fix not seen in stream +CVE-2023-52618: Fix not seen in stream +CVE-2023-52619: Fix not seen in stream +CVE-2023-52620: Fix not seen in stream +CVE-2023-52621: Fix not seen in stream +CVE-2023-52622: Fix not seen in stream +CVE-2023-52623: Fix not seen in stream +CVE-2023-52624: Fix not seen in stream +CVE-2023-52625: Fix not seen in stream +CVE-2023-52629: Fix not seen in stream +CVE-2023-52632: Fix not seen in stream +CVE-2023-52633: Fix not seen in stream +CVE-2023-52634: Fix not seen in stream +CVE-2023-52635: Fix not seen in stream +CVE-2023-52638: Fix not seen in stream +CVE-2023-52639: Fix not seen in stream +CVE-2023-52640: Fix not seen in stream +CVE-2023-52641: Fix not seen in stream CVE-2023-6040: Fix not seen in stream CVE-2023-6240: Fix unknown -CVE-2023-6270: Fix unknown -CVE-2023-6356: Fix unknown +CVE-2023-6270: Fix not seen in stream +CVE-2023-6356: Fix not seen in stream CVE-2023-6535: Fix unknown -CVE-2023-6536: Fix unknown +CVE-2023-6536: Fix not seen in stream CVE-2023-6546: Fix not seen in stream CVE-2023-6606: Fix not seen in stream CVE-2023-6610: Fix not seen in stream CVE-2023-6915: Fix not seen in stream CVE-2023-6932: Fix not seen in stream -CVE-2023-7042: Fix unknown +CVE-2023-7042: Fix not seen in stream CVE-2023-7192: Fix not seen in stream CVE-2024-0340: Fix not seen in stream CVE-2024-0584: Fix not seen in stream @@ -1323,25 +1486,102 @@ CVE-2024-0775: Fix not seen in stream CVE-2024-1086: Fix not seen in stream CVE-2024-1312: Fix not seen in stream CVE-2024-21803: Fix unknown -CVE-2024-22099: Fix unknown +CVE-2024-2193: Fix unknown +CVE-2024-22099: Fix not seen in stream CVE-2024-22386: Fix unknown -CVE-2024-23196: Fix unknown +CVE-2024-23196: Fix not seen in stream CVE-2024-23848: Fix unknown CVE-2024-23851: Fix not seen in stream CVE-2024-24855: Fix not seen in stream CVE-2024-24857: Fix unknown CVE-2024-24858: Fix unknown CVE-2024-24859: Fix unknown -CVE-2024-24861: Fix unknown +CVE-2024-24861: Fix not seen in stream CVE-2024-24864: Fix unknown CVE-2024-25739: Fix unknown CVE-2024-25740: Fix unknown CVE-2024-25741: Fix unknown CVE-2024-25744: Fix not seen in stream -CVE-2024-26584: Fix not seen in stream -CVE-2024-26587: Fix not seen in stream -CVE-2024-26588: Fix not seen in stream -CVE-2024-26591: Fix not seen in stream CVE-2024-26592: Fix not seen in stream CVE-2024-26594: Fix not seen in stream CVE-2024-26598: Fix not seen in stream +CVE-2024-26600: Fix not seen in stream +CVE-2024-26606: Fix not seen in stream +CVE-2024-26622: Fix not seen in stream +CVE-2024-26623: Fix not seen in stream +CVE-2024-26625: Fix not seen in stream +CVE-2024-26627: Fix not seen in stream +CVE-2024-26633: Fix not seen in stream +CVE-2024-26635: Fix not seen in stream +CVE-2024-26636: Fix not seen in stream +CVE-2024-26644: Fix not seen in stream +CVE-2024-26646: Fix not seen in stream +CVE-2024-26647: Fix not seen in stream +CVE-2024-26648: Fix not seen in stream +CVE-2024-26650: Fix not seen in stream +CVE-2024-26651: Fix not seen in stream +CVE-2024-26654: Fix not seen in stream +CVE-2024-26655: Fix not seen in stream +CVE-2024-26656: Fix not seen in stream +CVE-2024-26658: Fix not seen in stream +CVE-2024-26659: Fix not seen in stream +CVE-2024-26664: Fix not seen in stream +CVE-2024-26671: Fix not seen in stream +CVE-2024-26672: Fix not seen in stream +CVE-2024-26675: Fix not seen in stream +CVE-2024-26676: Fix not seen in stream +CVE-2024-26677: Fix not seen in stream +CVE-2024-26685: Fix not seen in stream +CVE-2024-26686: Fix not seen in stream +CVE-2024-26687: Fix not seen in stream +CVE-2024-26689: Fix not seen in stream +CVE-2024-26691: Fix not seen in stream +CVE-2024-26696: Fix not seen in stream +CVE-2024-26697: Fix not seen in stream +CVE-2024-26699: Fix not seen in stream +CVE-2024-26700: Fix not seen in stream +CVE-2024-26706: Fix not seen in stream +CVE-2024-26713: Fix not seen in stream +CVE-2024-26719: Fix not seen in stream +CVE-2024-26720: Fix not seen in stream +CVE-2024-26726: Fix not seen in stream +CVE-2024-26733: Fix not seen in stream +CVE-2024-26738: Fix not seen in stream +CVE-2024-26739: Fix not seen in stream +CVE-2024-26743: Fix not seen in stream +CVE-2024-26744: Fix not seen in stream +CVE-2024-26745: Fix not seen in stream +CVE-2024-26748: Fix not seen in stream +CVE-2024-26752: Fix not seen in stream +CVE-2024-26756: Fix not seen in stream +CVE-2024-26758: Fix not seen in stream +CVE-2024-26759: Fix not seen in stream +CVE-2024-26763: Fix not seen in stream +CVE-2024-26764: Fix not seen in stream +CVE-2024-26765: Fix not seen in stream +CVE-2024-26766: Fix not seen in stream +CVE-2024-26767: Fix not seen in stream +CVE-2024-26768: Fix not seen in stream +CVE-2024-26769: Fix not seen in stream +CVE-2024-26770: Fix not seen in stream +CVE-2024-26771: Fix not seen in stream +CVE-2024-26772: Fix not seen in stream +CVE-2024-26773: Fix not seen in stream +CVE-2024-26774: Fix not seen in stream +CVE-2024-26775: Fix not seen in stream +CVE-2024-26776: Fix not seen in stream +CVE-2024-26777: Fix not seen in stream +CVE-2024-26778: Fix not seen in stream +CVE-2024-26779: Fix not seen in stream +CVE-2024-26784: Fix not seen in stream +CVE-2024-26789: Fix not seen in stream +CVE-2024-26791: Fix not seen in stream +CVE-2024-26793: Fix not seen in stream +CVE-2024-26797: Fix not seen in stream +CVE-2024-26798: Fix not seen in stream +CVE-2024-26802: Fix not seen in stream +CVE-2024-26803: Fix not seen in stream +CVE-2024-26804: Fix not seen in stream +CVE-2024-26806: Fix not seen in stream +CVE-2024-26808: Fix not seen in stream +CVE-2024-26809: Fix not seen in stream diff --git a/data/3.16/3.16_security.txt b/data/3.16/3.16_security.txt index cbe466306..7c8426578 100644 --- a/data/3.16/3.16_security.txt +++ b/data/3.16/3.16_security.txt @@ -569,6 +569,7 @@ CVEs fixed in 3.16.66: CVE-2019-12819: 8a5e2f4be5d08d16964ce2adb8da6fc42052c6f1 mdio_bus: Fix use-after-free on device_register fails CVE-2019-15927: cacb39e5e4b7de790939b174165503bbe8c82208 ALSA: usb-audio: Avoid access before bLength check in build_audio_procunit() CVE-2019-2024: abbb5cf0c8e9995defed43a6c98296f357098b5b media: em28xx: Fix use-after-free when disconnecting + CVE-2019-25160: 97bc3683c24999ee621d847c9348c75d2fe86272 netlabel: fix out-of-bounds memory accesses CVE-2019-3459: 78c2887130f1a7d1883195732be1b6cdab667487 Bluetooth: Verify that l2cap_get_conf_opt provides large enough buffer CVE-2019-3460: c5c6a5c7eb7e3d7859e7ec78a2872360e4bab6aa Bluetooth: Check L2CAP option sizes returned from l2cap_get_conf_opt CVE-2019-3882: d3334471c34797ab1729cbadddd411118d51c584 vfio/type1: Limit DMA mappings per container @@ -1016,6 +1017,9 @@ Outstanding CVEs: CVE-2020-36557: (unk) vt: vt_ioctl: fix VT_DISALLOCATE freeing in-use virtual console CVE-2020-36558: (unk) vt: vt_ioctl: fix race in VT_RESIZEX CVE-2020-36691: (unk) netlink: limit recursion depth in policy validation + CVE-2020-36775: (unk) f2fs: fix to avoid potential deadlock + CVE-2020-36780: (unk) i2c: sprd: fix reference leak when pm_runtime_get_sync fails + CVE-2020-36781: (unk) i2c: imx: fix reference leak when pm_runtime_get_sync fails CVE-2020-3702: (unk) ath: Use safer key clearing with key cache entries CVE-2020-4788: (unk) powerpc/64s: flush L1D on kernel entry CVE-2020-8694: (unk) powercap: restrict energy meter to root access @@ -1136,6 +1140,77 @@ Outstanding CVEs: CVE-2021-45485: (unk) ipv6: use prandom_u32() for ID generation CVE-2021-45486: (unk) inet: use bigger hash table for IP ID generation CVE-2021-45868: (unk) quota: check block number when reading the block in quota file + CVE-2021-46904: (unk) net: hso: fix null-ptr-deref during tty device unregistration + CVE-2021-46906: (unk) HID: usbhid: fix info leak in hid_submit_ctrl + CVE-2021-46908: (unk) bpf: Use correct permission flag for mixed signed bounds arithmetic + CVE-2021-46924: (unk) NFC: st21nfca: Fix memory leak in device probe and remove + CVE-2021-46926: (unk) ALSA: hda: intel-sdw-acpi: harden detection of controller + CVE-2021-46928: (unk) parisc: Clear stale IIR value on instruction access rights trap + CVE-2021-46932: (unk) Input: appletouch - initialize work before device registration + CVE-2021-46936: (unk) net: fix use-after-free in tw_timer_handler + CVE-2021-46939: (unk) tracing: Restructure trace_clock_global() to never block + CVE-2021-46950: (unk) md/raid1: properly indicate failure when ending a failed write request + CVE-2021-46951: (unk) tpm: efi: Use local variable for calculating final log size + CVE-2021-46952: (unk) NFS: fs_context: validate UDP retrans to prevent shift out-of-bounds + CVE-2021-46959: (unk) spi: Fix use-after-free with devm_spi_alloc_* + CVE-2021-46962: (unk) mmc: uniphier-sd: Fix a resource leak in the remove function + CVE-2021-46965: (unk) mtd: physmap: physmap-bt1-rom: Fix unintentional stack access + CVE-2021-46969: (unk) bus: mhi: core: Fix invalid error returning in mhi_queue + CVE-2021-46970: (unk) bus: mhi: pci_generic: Remove WQ_MEM_RECLAIM flag from state workqueue + CVE-2021-46982: (unk) f2fs: compress: fix race condition of overwrite vs truncate + CVE-2021-47028: (unk) mt76: mt7915: fix txrate reporting + CVE-2021-47046: (unk) drm/amd/display: Fix off by one in hdmi_14_process_transaction() + CVE-2021-47052: (unk) crypto: sa2ul - Fix memory leak of rxd + CVE-2021-47059: (unk) crypto: sun8i-ss - fix result memory leak on error path + CVE-2021-47065: (unk) rtw88: Fix array overrun in rtw_get_tx_power_params() + CVE-2021-47070: (unk) uio_hv_generic: Fix another memory leak in error handling paths + CVE-2021-47075: (unk) nvmet: fix memory leak in nvmet_alloc_ctrl() + CVE-2021-47076: (unk) RDMA/rxe: Return CQE error if invalid lkey was supplied + CVE-2021-47082: (unk) tun: avoid double free in tun_free_netdev + CVE-2021-47083: (unk) pinctrl: mediatek: fix global-out-of-bounds issue + CVE-2021-47086: (unk) phonet/pep: refuse to enable an unbound pipe + CVE-2021-47101: (unk) asix: fix uninit-value in asix_mdio_read() + CVE-2021-47103: (unk) inet: fully convert sk->sk_rx_dst to RCU rules + CVE-2021-47110: (unk) x86/kvm: Disable kvmclock on all CPUs on shutdown + CVE-2021-47112: (unk) x86/kvm: Teardown PV features on boot CPU as well + CVE-2021-47113: (unk) btrfs: abort in rename_exchange if we fail to insert the second ref + CVE-2021-47114: (unk) ocfs2: fix data corruption by fallocate + CVE-2021-47116: (unk) ext4: fix memory leak in ext4_mb_init_backend on error path. + CVE-2021-47117: (unk) ext4: fix bug on in ext4_es_cache_extent as ext4_split_extent_at failed + CVE-2021-47118: (unk) pid: take a reference when initializing `cad_pid` + CVE-2021-47119: (unk) ext4: fix memory leak in ext4_fill_super + CVE-2021-47121: (unk) net: caif: fix memory leak in cfusbl_device_notify + CVE-2021-47122: (unk) net: caif: fix memory leak in caif_device_notify + CVE-2021-47124: (unk) io_uring: fix link timeout refs + CVE-2021-47125: (unk) sch_htb: fix refcount leak in htb_parent_to_leaf_offload + CVE-2021-47128: (unk) bpf, lockdown, audit: Fix buggy SELinux lockdown permission checks + CVE-2021-47131: (unk) net/tls: Fix use-after-free after the TLS device goes down and up + CVE-2021-47133: (unk) HID: amd_sfh: Fix memory leak in amd_sfh_work + CVE-2021-47135: (unk) mt76: mt7921: fix possible AOOB issue in mt7921_mcu_tx_rate_report + CVE-2021-47136: (unk) net: zero-initialize tc skb extension on allocation + CVE-2021-47137: (unk) net: lantiq: fix memory corruption in RX ring + CVE-2021-47140: (unk) iommu/amd: Clear DMA ops when switching domain + CVE-2021-47142: (unk) drm/amdgpu: Fix a use-after-free + CVE-2021-47143: (unk) net/smc: remove device from smcd_dev_list after failed device_add() + CVE-2021-47144: (unk) drm/amd/amdgpu: fix refcount leak + CVE-2021-47145: (unk) btrfs: do not BUG_ON in link_to_fixup_dir + CVE-2021-47146: (unk) mld: fix panic in mld_newpack() + CVE-2021-47147: (unk) ptp: ocp: Fix a resource leak in an error handling path + CVE-2021-47149: (unk) net: fujitsu: fix potential null-ptr-deref + CVE-2021-47151: (unk) interconnect: qcom: bcm-voter: add a missing of_node_put() + CVE-2021-47153: (unk) i2c: i801: Don't generate an interrupt on bus reset + CVE-2021-47158: (unk) net: dsa: sja1105: add error handling in sja1105_setup() + CVE-2021-47160: (unk) net: dsa: mt7530: fix VLAN traffic leaks + CVE-2021-47165: (unk) drm/meson: fix shutdown crash when component not probed + CVE-2021-47168: (unk) NFS: fix an incorrect limit in filelayout_decode_layout() + CVE-2021-47169: (unk) serial: rp2: use 'request_firmware' instead of 'request_firmware_nowait' + CVE-2021-47170: (unk) USB: usbfs: Don't WARN about excessively large memory allocations + CVE-2021-47171: (unk) net: usb: fix memory leak in smsc75xx_bind + CVE-2021-47172: (unk) iio: adc: ad7124: Fix potential overflow due to non sequential channel numbers + CVE-2021-47173: (unk) misc/uss720: fix memory leak in uss720_probe + CVE-2021-47175: (unk) net/sched: fq_pie: fix OOB access in the traffic path + CVE-2021-47179: (unk) NFSv4: Fix a NULL pointer dereference in pnfs_mark_matching_lsegs_return() + CVE-2021-47180: (unk) NFC: nci: fix memory leak in nci_allocate_device CVE-2022-0001: (unk) x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE CVE-2022-0002: (unk) x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE CVE-2022-0168: (unk) cifs: fix NULL ptr dereference in smb2_ioctl_query_info() @@ -1293,6 +1368,9 @@ Outstanding CVEs: CVE-2022-4662: (unk) USB: core: Prevent nested device-reset calls CVE-2022-4744: (unk) tun: avoid double free in tun_free_netdev CVE-2022-48619: (unk) Input: add bounds checking to input_set_capability() + CVE-2022-48626: (unk) moxart: fix potential use-after-free on remove path + CVE-2022-48627: (unk) vt: fix memory overlapping when deleting chars in the buffer + CVE-2022-48628: (unk) ceph: drop messages from MDS when unmounting CVE-2023-0030: (unk) drm/nouveau/mmu: add more general vmm free/node handling functions CVE-2023-0047: (unk) mm, oom: do not trigger out_of_memory from the #PF CVE-2023-0266: (unk) ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF @@ -1336,6 +1414,7 @@ Outstanding CVEs: CVE-2023-2513: (unk) ext4: fix use-after-free in ext4_xattr_set_entry CVE-2023-26607: (unk) ntfs: fix out-of-bounds read in ntfs_attr_find() CVE-2023-28328: (unk) media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer() + CVE-2023-28746: (unk) x86/mmio: Disable KVM mitigation when X86_FEATURE_CLEAR_CPU_BUF is set CVE-2023-28772: (unk) seq_buf: Fix overflow in seq_buf_putmem_hex() CVE-2023-2985: (unk) fs: hfsplus: fix UAF issue in hfsplus_put_super CVE-2023-3006: (unk) arm64: Add AMPERE1 to the Spectre-BHB affected list @@ -1391,7 +1470,7 @@ Outstanding CVEs: CVE-2023-4623: (unk) net/sched: sch_hfsc: Ensure inner classes have fsc curve CVE-2023-46343: (unk) nfc: nci: fix possible NULL pointer dereference in send_acknowledge() CVE-2023-46838: (unk) xen-netback: don't produce zero-size SKB frags - CVE-2023-47233: (unk) + CVE-2023-47233: (unk) wifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach CVE-2023-4921: (unk) net: sched: sch_qfq: Fix UAF in qfq_dequeue() CVE-2023-51043: (unk) drm/atomic: Fix potential use-after-free in nonblocking commits CVE-2023-51779: (unk) Bluetooth: af_bluetooth: Fix Use-After-Free in bt_sock_recvmsg @@ -1402,26 +1481,110 @@ Outstanding CVEs: CVE-2023-52340: (unk) ipv6: remove max_size check inline with ipv4 CVE-2023-52429: (unk) dm: limit the number of targets and parameter size area CVE-2023-52434: (unk) smb: client: fix potential OOBs in smb2_parse_contexts() - CVE-2023-52435: (unk) net: prevent mss overflow in skb_segment() CVE-2023-52436: (unk) f2fs: explicitly null-terminate the xattr list CVE-2023-52442: (unk) ksmbd: validate session id and tree id in compound request CVE-2023-52445: (unk) media: pvrusb2: fix use after free on context disconnection CVE-2023-52449: (unk) mtd: Fix gluebi NULL pointer dereference caused by ftl notifier - CVE-2023-52456: (unk) serial: imx: fix tx statemachine deadlock - CVE-2023-52457: (unk) serial: 8250: omap: Don't skip resource freeing if pm_runtime_resume_and_get() failed CVE-2023-52458: (unk) block: add check that partition length needs to be aligned with block size + CVE-2023-52470: (unk) drm/radeon: check the alloc_workqueue return value in radeon_crtc_init() + CVE-2023-52475: (unk) Input: powermate - fix use-after-free in powermate_config_complete + CVE-2023-52476: (unk) perf/x86/lbr: Filter vsyscall addresses + CVE-2023-52477: (unk) usb: hub: Guard against accesses to uninitialized BOS descriptors + CVE-2023-52478: (unk) HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect + CVE-2023-52479: (unk) ksmbd: fix uaf in smb20_oplock_break_ack + CVE-2023-52480: (unk) ksmbd: fix race condition between session lookup and expire + CVE-2023-52481: (unk) arm64: errata: Add Cortex-A520 speculative unprivileged load workaround + CVE-2023-52482: (unk) x86/srso: Add SRSO mitigation for Hygon processors + CVE-2023-52484: (unk) iommu/arm-smmu-v3: Fix soft lockup triggered by arm_smmu_mm_invalidate_range + CVE-2023-52485: (unk) drm/amd/display: Wake DMCUB before sending a command + CVE-2023-52486: (unk) drm: Don't unref the same fb many times by mistake due to deadlock handling + CVE-2023-52488: (unk) serial: sc16is7xx: convert from _raw_ to _noinc_ regmap functions for FIFO + CVE-2023-52489: (unk) mm/sparsemem: fix race in accessing memory_section->usage + CVE-2023-52498: (unk) PM: sleep: Fix possible deadlocks in core system-wide PM code + CVE-2023-52500: (unk) scsi: pm80xx: Avoid leaking tags when processing OPC_INB_SET_CONTROLLER_CONFIG command + CVE-2023-52501: (unk) ring-buffer: Do not attempt to read past "commit" + CVE-2023-52502: (unk) net: nfc: fix races in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn() + CVE-2023-52506: (unk) LoongArch: Set all reserved memblocks on Node#0 at initialization + CVE-2023-52507: (unk) nfc: nci: assert requested protocol is valid + CVE-2023-52508: (unk) nvme-fc: Prevent null pointer dereference in nvme_fc_io_getuuid() + CVE-2023-52509: (unk) ravb: Fix use-after-free issue in ravb_tx_timeout_work() + CVE-2023-52511: (unk) spi: sun6i: reduce DMA RX transfer width to single byte + CVE-2023-52515: (unk) RDMA/srp: Do not call scsi_done() from srp_abort() + CVE-2023-52516: (unk) dma-debug: don't call __dma_entry_alloc_check_leak() under free_entries_lock + CVE-2023-52517: (unk) spi: sun6i: fix race between DMA RX transfer completion and RX FIFO drain + CVE-2023-52519: (unk) HID: intel-ish-hid: ipc: Disable and reenable ACPI GPE bit + CVE-2023-52522: (unk) net: fix possible store tearing in neigh_periodic_work() + CVE-2023-52527: (unk) ipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data() + CVE-2023-52528: (unk) net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg + CVE-2023-52531: (unk) wifi: iwlwifi: mvm: Fix a memory corruption issue + CVE-2023-52532: (unk) net: mana: Fix TX CQE error handling + CVE-2023-52559: (unk) iommu/vt-d: Avoid memory allocation in iommu_suspend() + CVE-2023-52561: (unk) arm64: dts: qcom: sdm845-db845c: Mark cont splash memory region as reserved + CVE-2023-52563: (unk) drm/meson: fix memory leak on ->hpd_notify callback + CVE-2023-52565: (unk) media: uvcvideo: Fix OOB read + CVE-2023-52566: (unk) nilfs2: fix potential use after free in nilfs_gccache_submit_read_data() + CVE-2023-52568: (unk) x86/sgx: Resolves SECS reclaim vs. page fault for EAUG race + CVE-2023-52569: (unk) btrfs: remove BUG() after failure to insert delayed dir index item + CVE-2023-52571: (unk) power: supply: rk817: Fix node refcount leak + CVE-2023-52572: (unk) cifs: Fix UAF in cifs_demultiplex_thread() + CVE-2023-52574: (unk) team: fix null-ptr-deref when team device type is changed + CVE-2023-52578: (unk) net: bridge: use DEV_STATS_INC() + CVE-2023-52583: (unk) ceph: fix deadlock or deadcode of misusing dget() + CVE-2023-52584: (unk) spmi: mediatek: Fix UAF on device remove + CVE-2023-52585: (unk) drm/amdgpu: Fix possible NULL dereference in amdgpu_ras_query_error_status_helper() + CVE-2023-52586: (unk) drm/msm/dpu: Add mutex lock in control vblank irq + CVE-2023-52587: (unk) IB/ipoib: Fix mcast list locking + CVE-2023-52588: (unk) f2fs: fix to tag gcing flag on page during block migration + CVE-2023-52589: (unk) media: rkisp1: Fix IRQ disable race issue + CVE-2023-52590: (unk) ocfs2: Avoid touching renamed directory if parent does not change + CVE-2023-52591: (unk) reiserfs: Avoid touching renamed directory if parent does not change + CVE-2023-52593: (unk) wifi: wfx: fix possible NULL pointer dereference in wfx_set_mfp_ap() + CVE-2023-52594: (unk) wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus() + CVE-2023-52595: (unk) wifi: rt2x00: restart beacon queue when hardware reset + CVE-2023-52596: (unk) sysctl: Fix out of bounds access for empty sysctl registers + CVE-2023-52597: (unk) KVM: s390: fix setting of fpc register + CVE-2023-52598: (unk) s390/ptrace: handle setting of fpc register correctly + CVE-2023-52599: (unk) jfs: fix array-index-out-of-bounds in diNewExt + CVE-2023-52600: (unk) jfs: fix uaf in jfs_evict_inode + CVE-2023-52601: (unk) jfs: fix array-index-out-of-bounds in dbAdjTree + CVE-2023-52602: (unk) jfs: fix slab-out-of-bounds Read in dtSearch + CVE-2023-52603: (unk) UBSAN: array-index-out-of-bounds in dtSplitRoot + CVE-2023-52604: (unk) FS:JFS:UBSAN:array-index-out-of-bounds in dbAdjTree + CVE-2023-52606: (unk) powerpc/lib: Validate size for vector operations + CVE-2023-52607: (unk) powerpc/mm: Fix null-pointer dereference in pgtable_cache_add + CVE-2023-52609: (unk) binder: fix race between mmput() and do_exit() + CVE-2023-52614: (unk) PM / devfreq: Fix buffer overflow in trans_stat_show + CVE-2023-52615: (unk) hwrng: core - Fix page fault dead lock on mmap-ed hwrng + CVE-2023-52617: (unk) PCI: switchtec: Fix stdev_release() crash after surprise hot remove + CVE-2023-52618: (unk) block/rnbd-srv: Check for unlikely string overflow + CVE-2023-52619: (unk) pstore/ram: Fix crash when setting number of cpus to an odd number + CVE-2023-52620: (unk) netfilter: nf_tables: disallow timeout for anonymous sets + CVE-2023-52621: (unk) bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers + CVE-2023-52622: (unk) ext4: avoid online resizing failures due to oversized flex bg + CVE-2023-52623: (unk) SUNRPC: Fix a suspicious RCU usage warning + CVE-2023-52624: (unk) drm/amd/display: Wake DMCUB before executing GPINT commands + CVE-2023-52625: (unk) drm/amd/display: Refactor DMCUB enter/exit idle interface + CVE-2023-52629: (unk) sh: push-switch: Reorder cleanup operations to avoid use-after-free bug + CVE-2023-52632: (unk) drm/amdkfd: Fix lock dependency warning with srcu + CVE-2023-52633: (unk) um: time-travel: fix time corruption + CVE-2023-52634: (unk) drm/amd/display: Fix disable_otg_wa logic + CVE-2023-52635: (unk) PM / devfreq: Synchronize devfreq_monitor_[start/stop] + CVE-2023-52638: (unk) can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock + CVE-2023-52639: (unk) KVM: s390: vsie: fix race during shadow creation + CVE-2023-52640: (unk) fs/ntfs3: Fix oob in ntfs_listxattr + CVE-2023-52641: (unk) fs/ntfs3: Add NULL ptr dereference checking at the end of attr_allocate_frame() CVE-2023-6040: (unk) netfilter: nf_tables: Reject tables of unsupported family CVE-2023-6240: (unk) - CVE-2023-6270: (unk) - CVE-2023-6356: (unk) + CVE-2023-6270: (unk) aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts + CVE-2023-6356: (unk) nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length CVE-2023-6535: (unk) - CVE-2023-6536: (unk) + CVE-2023-6536: (unk) nvmet-tcp: fix a crash in nvmet_req_complete() CVE-2023-6546: (unk) tty: n_gsm: fix the UAF caused by race condition in gsm_cleanup_mux CVE-2023-6606: (unk) smb: client: fix OOB in smbCalcSize() CVE-2023-6610: (unk) smb: client: fix potential OOB in smb2_dump_detail() CVE-2023-6915: (unk) ida: Fix crash in ida_free when the bitmap is empty CVE-2023-6932: (unk) ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet - CVE-2023-7042: (unk) + CVE-2023-7042: (unk) wifi: ath10k: fix NULL pointer dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev() CVE-2023-7192: (unk) netfilter: ctnetlink: fix possible refcount leak in ctnetlink_create_conntrack() CVE-2024-0340: (unk) vhost: use kzalloc() instead of kmalloc() followed by memset() CVE-2024-0584: (unk) ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet @@ -1429,25 +1592,102 @@ Outstanding CVEs: CVE-2024-1086: (unk) netfilter: nf_tables: reject QUEUE/DROP verdict parameters CVE-2024-1312: (unk) mm: lock_vma_under_rcu() must check vma->anon_vma under vma lock CVE-2024-21803: (unk) - CVE-2024-22099: (unk) + CVE-2024-2193: (unk) + CVE-2024-22099: (unk) Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security CVE-2024-22386: (unk) - CVE-2024-23196: (unk) + CVE-2024-23196: (unk) ALSA: hda: fix a possible null-pointer dereference due to data race in snd_hdac_regmap_sync() CVE-2024-23848: (unk) CVE-2024-23851: (unk) dm: limit the number of targets and parameter size area CVE-2024-24855: (unk) scsi: lpfc: Fix a possible data race in lpfc_unregister_fcf_rescan() CVE-2024-24857: (unk) CVE-2024-24858: (unk) CVE-2024-24859: (unk) - CVE-2024-24861: (unk) + CVE-2024-24861: (unk) media: xc4000: Fix atomicity violation in xc4000_get_frequency CVE-2024-24864: (unk) CVE-2024-25739: (unk) CVE-2024-25740: (unk) CVE-2024-25741: (unk) CVE-2024-25744: (unk) x86/coco: Disable 32-bit emulation by default on TDX and SEV - CVE-2024-26584: (unk) net: tls: handle backlogging of crypto requests - CVE-2024-26587: (unk) net: netdevsim: don't try to destroy PHC on VFs - CVE-2024-26588: (unk) LoongArch: BPF: Prevent out-of-bounds memory access - CVE-2024-26591: (unk) bpf: Fix re-attachment branch in bpf_tracing_prog_attach CVE-2024-26592: (unk) ksmbd: fix UAF issue in ksmbd_tcp_new_connection() CVE-2024-26594: (unk) ksmbd: validate mech token in session setup CVE-2024-26598: (unk) KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache + CVE-2024-26600: (unk) phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP + CVE-2024-26606: (unk) binder: signal epoll threads of self-work + CVE-2024-26622: (unk) tomoyo: fix UAF write bug in tomoyo_write_control() + CVE-2024-26623: (unk) pds_core: Prevent race issues involving the adminq + CVE-2024-26625: (unk) llc: call sock_orphan() at release time + CVE-2024-26627: (unk) scsi: core: Move scsi_host_busy() out of host lock for waking up EH handler + CVE-2024-26633: (unk) ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim() + CVE-2024-26635: (unk) llc: Drop support for ETH_P_TR_802_2. + CVE-2024-26636: (unk) llc: make llc_ui_sendmsg() more robust against bonding changes + CVE-2024-26644: (unk) btrfs: don't abort filesystem when attempting to snapshot deleted subvolume + CVE-2024-26646: (unk) thermal: intel: hfi: Add syscore callbacks for system-wide PM + CVE-2024-26647: (unk) drm/amd/display: Fix late derefrence 'dsc' check in 'link_set_dsc_pps_packet()' + CVE-2024-26648: (unk) drm/amd/display: Fix variable deferencing before NULL check in edp_setup_replay() + CVE-2024-26650: (unk) platform/x86: p2sb: Allow p2sb_bar() calls during PCI device probe + CVE-2024-26651: (unk) sr9800: Add check for usbnet_get_endpoints + CVE-2024-26654: (unk) ALSA: sh: aica: reorder cleanup operations to avoid UAF bugs + CVE-2024-26655: (unk) Fix memory leak in posix_clock_open() + CVE-2024-26656: (unk) drm/amdgpu: fix use-after-free bug + CVE-2024-26658: (unk) bcachefs: grab s_umount only if snapshotting + CVE-2024-26659: (unk) xhci: handle isoc Babble and Buffer Overrun events properly + CVE-2024-26664: (unk) hwmon: (coretemp) Fix out-of-bounds memory access + CVE-2024-26671: (unk) blk-mq: fix IO hang from sbitmap wakeup race + CVE-2024-26672: (unk) drm/amdgpu: Fix variable 'mca_funcs' dereferenced before NULL check in 'amdgpu_mca_smu_get_mca_entry()' + CVE-2024-26675: (unk) ppp_async: limit MRU to 64K + CVE-2024-26676: (unk) af_unix: Call kfree_skb() for dead unix_(sk)->oob_skb in GC. + CVE-2024-26677: (unk) rxrpc: Fix delayed ACKs to not set the reference serial number + CVE-2024-26685: (unk) nilfs2: fix potential bug in end_buffer_async_write + CVE-2024-26686: (unk) fs/proc: do_task_stat: use sig->stats_lock to gather the threads/children stats + CVE-2024-26687: (unk) xen/events: close evtchn after mapping cleanup + CVE-2024-26689: (unk) ceph: prevent use-after-free in encode_cap_msg() + CVE-2024-26691: (unk) KVM: arm64: Fix circular locking dependency + CVE-2024-26696: (unk) nilfs2: fix hang in nilfs_lookup_dirty_data_buffers() + CVE-2024-26697: (unk) nilfs2: fix data corruption in dsync block recovery for small block sizes + CVE-2024-26699: (unk) drm/amd/display: Fix array-index-out-of-bounds in dcn35_clkmgr + CVE-2024-26700: (unk) drm/amd/display: Fix MST Null Ptr for RV + CVE-2024-26706: (unk) parisc: Fix random data corruption from exception handler + CVE-2024-26713: (unk) powerpc/pseries/iommu: Fix iommu initialisation during DLPAR add + CVE-2024-26719: (unk) nouveau: offload fence uevents work to workqueue + CVE-2024-26720: (unk) mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again + CVE-2024-26726: (unk) btrfs: don't drop extent_map for free space inode on write error + CVE-2024-26733: (unk) arp: Prevent overflow in arp_req_get(). + CVE-2024-26738: (unk) powerpc/pseries/iommu: DLPAR add doesn't completely initialize pci_controller + CVE-2024-26739: (unk) net/sched: act_mirred: don't override retval if we already lost the skb + CVE-2024-26743: (unk) RDMA/qedr: Fix qedr_create_user_qp error flow + CVE-2024-26744: (unk) RDMA/srpt: Support specifying the srpt_service_guid parameter + CVE-2024-26745: (unk) powerpc/pseries/iommu: IOMMU table is not initialized for kdump over SR-IOV + CVE-2024-26748: (unk) usb: cdns3: fix memory double free when handle zero packet + CVE-2024-26752: (unk) l2tp: pass correct message length to ip6_append_data + CVE-2024-26756: (unk) md: Don't register sync_thread for reshape directly + CVE-2024-26758: (unk) md: Don't ignore suspended array in md_check_recovery() + CVE-2024-26759: (unk) mm/swap: fix race when skipping swapcache + CVE-2024-26763: (unk) dm-crypt: don't modify the data when using authenticated encryption + CVE-2024-26764: (unk) fs/aio: Restrict kiocb_set_cancel_fn() to I/O submitted via libaio + CVE-2024-26765: (unk) LoongArch: Disable IRQ before init_fn() for nonboot CPUs + CVE-2024-26766: (unk) IB/hfi1: Fix sdma.h tx->num_descs off-by-one error + CVE-2024-26767: (unk) drm/amd/display: fixed integer types and null check locations + CVE-2024-26768: (unk) LoongArch: Change acpi_core_pic[NR_CPUS] to acpi_core_pic[MAX_CORE_PIC] + CVE-2024-26769: (unk) nvmet-fc: avoid deadlock on delete association path + CVE-2024-26770: (unk) HID: nvidia-shield: Add missing null pointer checks to LED initialization + CVE-2024-26771: (unk) dmaengine: ti: edma: Add some null pointer checks to the edma_probe + CVE-2024-26772: (unk) ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal() + CVE-2024-26773: (unk) ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found() + CVE-2024-26774: (unk) ext4: avoid dividing by 0 in mb_update_avg_fragment_size() when block bitmap corrupt + CVE-2024-26775: (unk) aoe: avoid potential deadlock at set_capacity + CVE-2024-26776: (unk) spi: hisi-sfc-v3xx: Return IRQ_NONE if no interrupts were detected + CVE-2024-26777: (unk) fbdev: sis: Error out if pixclock equals zero + CVE-2024-26778: (unk) fbdev: savage: Error out if pixclock equals zero + CVE-2024-26779: (unk) wifi: mac80211: fix race condition on enabling fast-xmit + CVE-2024-26784: (unk) pmdomain: arm: Fix NULL dereference on scmi_perf_domain removal + CVE-2024-26789: (unk) crypto: arm64/neonbs - fix out-of-bounds access on short input + CVE-2024-26791: (unk) btrfs: dev-replace: properly validate device names + CVE-2024-26793: (unk) gtp: fix use-after-free and null-ptr-deref in gtp_newlink() + CVE-2024-26797: (unk) drm/amd/display: Prevent potential buffer overflow in map_hw_resources + CVE-2024-26798: (unk) fbcon: always restore the old font data in fbcon_do_set_font() + CVE-2024-26802: (unk) stmmac: Clear variable when destroying workqueue + CVE-2024-26803: (unk) net: veth: clear GRO when clearing XDP even when down + CVE-2024-26804: (unk) net: ip_tunnel: prevent perpetual headroom growth + CVE-2024-26806: (unk) spi: cadence-qspi: remove system-wide suspend helper calls from runtime PM hooks + CVE-2024-26808: (unk) netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain + CVE-2024-26809: (unk) netfilter: nft_set_pipapo: release elements in clone only from destroy path diff --git a/data/3.18/3.18_CVEs.txt b/data/3.18/3.18_CVEs.txt index 1b0d116b6..e4a65997a 100644 --- a/data/3.18/3.18_CVEs.txt +++ b/data/3.18/3.18_CVEs.txt @@ -720,6 +720,7 @@ CVE-2019-2101: Fixed with 3.18.137 CVE-2019-2181: Fix not seen in stream CVE-2019-2213: Fix not seen in stream CVE-2019-2215: Fix not seen in stream +CVE-2019-25160: Fixed with 3.18.137 CVE-2019-3459: Fixed with 3.18.138 CVE-2019-3460: Fixed with 3.18.138 CVE-2019-3701: Fixed with 3.18.133 @@ -884,6 +885,9 @@ CVE-2020-36516: Fix not seen in stream CVE-2020-36557: Fix not seen in stream CVE-2020-36558: Fix not seen in stream CVE-2020-36691: Fix not seen in stream +CVE-2020-36775: Fix not seen in stream +CVE-2020-36780: Fix not seen in stream +CVE-2020-36781: Fix not seen in stream CVE-2020-3702: Fix not seen in stream CVE-2020-4788: Fix not seen in stream CVE-2020-8647: Fix not seen in stream @@ -1013,6 +1017,78 @@ CVE-2021-45469: Fix not seen in stream CVE-2021-45485: Fix not seen in stream CVE-2021-45486: Fix not seen in stream CVE-2021-45868: Fix not seen in stream +CVE-2021-46904: Fix not seen in stream +CVE-2021-46906: Fix not seen in stream +CVE-2021-46908: Fix not seen in stream +CVE-2021-46924: Fix not seen in stream +CVE-2021-46926: Fix not seen in stream +CVE-2021-46928: Fix not seen in stream +CVE-2021-46932: Fix not seen in stream +CVE-2021-46936: Fix not seen in stream +CVE-2021-46939: Fix not seen in stream +CVE-2021-46950: Fix not seen in stream +CVE-2021-46951: Fix not seen in stream +CVE-2021-46952: Fix not seen in stream +CVE-2021-46959: Fix not seen in stream +CVE-2021-46962: Fix not seen in stream +CVE-2021-46965: Fix not seen in stream +CVE-2021-46969: Fix not seen in stream +CVE-2021-46970: Fix not seen in stream +CVE-2021-46982: Fix not seen in stream +CVE-2021-47028: Fix not seen in stream +CVE-2021-47046: Fix not seen in stream +CVE-2021-47052: Fix not seen in stream +CVE-2021-47059: Fix not seen in stream +CVE-2021-47065: Fix not seen in stream +CVE-2021-47070: Fix not seen in stream +CVE-2021-47075: Fix not seen in stream +CVE-2021-47076: Fix not seen in stream +CVE-2021-47082: Fix not seen in stream +CVE-2021-47083: Fix not seen in stream +CVE-2021-47086: Fix not seen in stream +CVE-2021-47101: Fix not seen in stream +CVE-2021-47103: Fix not seen in stream +CVE-2021-47110: Fix not seen in stream +CVE-2021-47112: Fix not seen in stream +CVE-2021-47113: Fix not seen in stream +CVE-2021-47114: Fix not seen in stream +CVE-2021-47116: Fix not seen in stream +CVE-2021-47117: Fix not seen in stream +CVE-2021-47118: Fix not seen in stream +CVE-2021-47119: Fix not seen in stream +CVE-2021-47121: Fix not seen in stream +CVE-2021-47122: Fix not seen in stream +CVE-2021-47124: Fix not seen in stream +CVE-2021-47125: Fix not seen in stream +CVE-2021-47128: Fix not seen in stream +CVE-2021-47131: Fix not seen in stream +CVE-2021-47133: Fix not seen in stream +CVE-2021-47135: Fix not seen in stream +CVE-2021-47136: Fix not seen in stream +CVE-2021-47137: Fix not seen in stream +CVE-2021-47140: Fix not seen in stream +CVE-2021-47142: Fix not seen in stream +CVE-2021-47143: Fix not seen in stream +CVE-2021-47144: Fix not seen in stream +CVE-2021-47145: Fix not seen in stream +CVE-2021-47146: Fix not seen in stream +CVE-2021-47147: Fix not seen in stream +CVE-2021-47149: Fix not seen in stream +CVE-2021-47150: Fix not seen in stream +CVE-2021-47151: Fix not seen in stream +CVE-2021-47153: Fix not seen in stream +CVE-2021-47158: Fix not seen in stream +CVE-2021-47160: Fix not seen in stream +CVE-2021-47165: Fix not seen in stream +CVE-2021-47168: Fix not seen in stream +CVE-2021-47169: Fix not seen in stream +CVE-2021-47170: Fix not seen in stream +CVE-2021-47171: Fix not seen in stream +CVE-2021-47172: Fix not seen in stream +CVE-2021-47173: Fix not seen in stream +CVE-2021-47175: Fix not seen in stream +CVE-2021-47179: Fix not seen in stream +CVE-2021-47180: Fix not seen in stream CVE-2022-0001: Fix not seen in stream CVE-2022-0002: Fix not seen in stream CVE-2022-0168: Fix not seen in stream @@ -1171,6 +1247,9 @@ CVE-2022-45934: Fix not seen in stream CVE-2022-4662: Fix not seen in stream CVE-2022-4744: Fix not seen in stream CVE-2022-48619: Fix not seen in stream +CVE-2022-48626: Fix not seen in stream +CVE-2022-48627: Fix not seen in stream +CVE-2022-48628: Fix not seen in stream CVE-2023-0030: Fix not seen in stream CVE-2023-0047: Fix not seen in stream CVE-2023-0266: Fix not seen in stream @@ -1216,6 +1295,7 @@ CVE-2023-23559: Fix not seen in stream CVE-2023-2513: Fix not seen in stream CVE-2023-26607: Fix not seen in stream CVE-2023-28328: Fix not seen in stream +CVE-2023-28746: Fix not seen in stream CVE-2023-28772: Fix not seen in stream CVE-2023-2985: Fix not seen in stream CVE-2023-3006: Fix not seen in stream @@ -1276,7 +1356,7 @@ CVE-2023-45871: Fix not seen in stream CVE-2023-4623: Fix not seen in stream CVE-2023-46343: Fix not seen in stream CVE-2023-46838: Fix not seen in stream -CVE-2023-47233: Fix unknown +CVE-2023-47233: Fix not seen in stream CVE-2023-4921: Fix not seen in stream CVE-2023-51043: Fix not seen in stream CVE-2023-51779: Fix not seen in stream @@ -1287,26 +1367,110 @@ CVE-2023-51782: Fix not seen in stream CVE-2023-52340: Fix not seen in stream CVE-2023-52429: Fix not seen in stream CVE-2023-52434: Fix not seen in stream -CVE-2023-52435: Fix not seen in stream CVE-2023-52436: Fix not seen in stream CVE-2023-52442: Fix not seen in stream CVE-2023-52445: Fix not seen in stream CVE-2023-52449: Fix not seen in stream -CVE-2023-52456: Fix not seen in stream -CVE-2023-52457: Fix not seen in stream CVE-2023-52458: Fix not seen in stream +CVE-2023-52470: Fix not seen in stream +CVE-2023-52475: Fix not seen in stream +CVE-2023-52476: Fix not seen in stream +CVE-2023-52477: Fix not seen in stream +CVE-2023-52478: Fix not seen in stream +CVE-2023-52479: Fix not seen in stream +CVE-2023-52480: Fix not seen in stream +CVE-2023-52481: Fix not seen in stream +CVE-2023-52482: Fix not seen in stream +CVE-2023-52484: Fix not seen in stream +CVE-2023-52485: Fix not seen in stream +CVE-2023-52486: Fix not seen in stream +CVE-2023-52488: Fix not seen in stream +CVE-2023-52489: Fix not seen in stream +CVE-2023-52498: Fix not seen in stream +CVE-2023-52500: Fix not seen in stream +CVE-2023-52501: Fix not seen in stream +CVE-2023-52502: Fix not seen in stream +CVE-2023-52506: Fix not seen in stream +CVE-2023-52507: Fix not seen in stream +CVE-2023-52508: Fix not seen in stream +CVE-2023-52509: Fix not seen in stream +CVE-2023-52511: Fix not seen in stream +CVE-2023-52515: Fix not seen in stream +CVE-2023-52516: Fix not seen in stream +CVE-2023-52517: Fix not seen in stream +CVE-2023-52519: Fix not seen in stream +CVE-2023-52522: Fix not seen in stream +CVE-2023-52527: Fix not seen in stream +CVE-2023-52528: Fix not seen in stream +CVE-2023-52531: Fix not seen in stream +CVE-2023-52532: Fix not seen in stream +CVE-2023-52559: Fix not seen in stream +CVE-2023-52561: Fix not seen in stream +CVE-2023-52563: Fix not seen in stream +CVE-2023-52565: Fix not seen in stream +CVE-2023-52566: Fix not seen in stream +CVE-2023-52568: Fix not seen in stream +CVE-2023-52569: Fix not seen in stream +CVE-2023-52571: Fix not seen in stream +CVE-2023-52572: Fix not seen in stream +CVE-2023-52574: Fix not seen in stream +CVE-2023-52578: Fix not seen in stream +CVE-2023-52583: Fix not seen in stream +CVE-2023-52584: Fix not seen in stream +CVE-2023-52585: Fix not seen in stream +CVE-2023-52586: Fix not seen in stream +CVE-2023-52587: Fix not seen in stream +CVE-2023-52588: Fix not seen in stream +CVE-2023-52589: Fix not seen in stream +CVE-2023-52590: Fix not seen in stream +CVE-2023-52591: Fix not seen in stream +CVE-2023-52593: Fix not seen in stream +CVE-2023-52594: Fix not seen in stream +CVE-2023-52595: Fix not seen in stream +CVE-2023-52596: Fix not seen in stream +CVE-2023-52597: Fix not seen in stream +CVE-2023-52598: Fix not seen in stream +CVE-2023-52599: Fix not seen in stream +CVE-2023-52600: Fix not seen in stream +CVE-2023-52601: Fix not seen in stream +CVE-2023-52602: Fix not seen in stream +CVE-2023-52603: Fix not seen in stream +CVE-2023-52604: Fix not seen in stream +CVE-2023-52606: Fix not seen in stream +CVE-2023-52607: Fix not seen in stream +CVE-2023-52609: Fix not seen in stream +CVE-2023-52614: Fix not seen in stream +CVE-2023-52615: Fix not seen in stream +CVE-2023-52617: Fix not seen in stream +CVE-2023-52618: Fix not seen in stream +CVE-2023-52619: Fix not seen in stream +CVE-2023-52620: Fix not seen in stream +CVE-2023-52621: Fix not seen in stream +CVE-2023-52622: Fix not seen in stream +CVE-2023-52623: Fix not seen in stream +CVE-2023-52624: Fix not seen in stream +CVE-2023-52625: Fix not seen in stream +CVE-2023-52629: Fix not seen in stream +CVE-2023-52632: Fix not seen in stream +CVE-2023-52633: Fix not seen in stream +CVE-2023-52634: Fix not seen in stream +CVE-2023-52635: Fix not seen in stream +CVE-2023-52638: Fix not seen in stream +CVE-2023-52639: Fix not seen in stream +CVE-2023-52640: Fix not seen in stream +CVE-2023-52641: Fix not seen in stream CVE-2023-6040: Fix not seen in stream CVE-2023-6240: Fix unknown -CVE-2023-6270: Fix unknown -CVE-2023-6356: Fix unknown +CVE-2023-6270: Fix not seen in stream +CVE-2023-6356: Fix not seen in stream CVE-2023-6535: Fix unknown -CVE-2023-6536: Fix unknown +CVE-2023-6536: Fix not seen in stream CVE-2023-6546: Fix not seen in stream CVE-2023-6606: Fix not seen in stream CVE-2023-6610: Fix not seen in stream CVE-2023-6915: Fix not seen in stream CVE-2023-6932: Fix not seen in stream -CVE-2023-7042: Fix unknown +CVE-2023-7042: Fix not seen in stream CVE-2023-7192: Fix not seen in stream CVE-2024-0340: Fix not seen in stream CVE-2024-0584: Fix not seen in stream @@ -1314,25 +1478,104 @@ CVE-2024-0775: Fix not seen in stream CVE-2024-1086: Fix not seen in stream CVE-2024-1312: Fix not seen in stream CVE-2024-21803: Fix unknown -CVE-2024-22099: Fix unknown +CVE-2024-2193: Fix unknown +CVE-2024-22099: Fix not seen in stream CVE-2024-22386: Fix unknown -CVE-2024-23196: Fix unknown +CVE-2024-23196: Fix not seen in stream CVE-2024-23848: Fix unknown CVE-2024-23851: Fix not seen in stream CVE-2024-24855: Fix not seen in stream CVE-2024-24857: Fix unknown CVE-2024-24858: Fix unknown CVE-2024-24859: Fix unknown -CVE-2024-24861: Fix unknown +CVE-2024-24861: Fix not seen in stream CVE-2024-24864: Fix unknown CVE-2024-25739: Fix unknown CVE-2024-25740: Fix unknown CVE-2024-25741: Fix unknown CVE-2024-25744: Fix not seen in stream -CVE-2024-26584: Fix not seen in stream -CVE-2024-26587: Fix not seen in stream -CVE-2024-26588: Fix not seen in stream -CVE-2024-26591: Fix not seen in stream CVE-2024-26592: Fix not seen in stream CVE-2024-26594: Fix not seen in stream CVE-2024-26598: Fix not seen in stream +CVE-2024-26600: Fix not seen in stream +CVE-2024-26606: Fix not seen in stream +CVE-2024-26622: Fix not seen in stream +CVE-2024-26623: Fix not seen in stream +CVE-2024-26625: Fix not seen in stream +CVE-2024-26627: Fix not seen in stream +CVE-2024-26633: Fix not seen in stream +CVE-2024-26635: Fix not seen in stream +CVE-2024-26636: Fix not seen in stream +CVE-2024-26644: Fix not seen in stream +CVE-2024-26646: Fix not seen in stream +CVE-2024-26647: Fix not seen in stream +CVE-2024-26648: Fix not seen in stream +CVE-2024-26650: Fix not seen in stream +CVE-2024-26651: Fix not seen in stream +CVE-2024-26654: Fix not seen in stream +CVE-2024-26655: Fix not seen in stream +CVE-2024-26656: Fix not seen in stream +CVE-2024-26658: Fix not seen in stream +CVE-2024-26659: Fix not seen in stream +CVE-2024-26664: Fix not seen in stream +CVE-2024-26671: Fix not seen in stream +CVE-2024-26672: Fix not seen in stream +CVE-2024-26675: Fix not seen in stream +CVE-2024-26676: Fix not seen in stream +CVE-2024-26677: Fix not seen in stream +CVE-2024-26679: Fix not seen in stream +CVE-2024-26685: Fix not seen in stream +CVE-2024-26686: Fix not seen in stream +CVE-2024-26687: Fix not seen in stream +CVE-2024-26689: Fix not seen in stream +CVE-2024-26691: Fix not seen in stream +CVE-2024-26696: Fix not seen in stream +CVE-2024-26697: Fix not seen in stream +CVE-2024-26699: Fix not seen in stream +CVE-2024-26700: Fix not seen in stream +CVE-2024-26704: Fix not seen in stream +CVE-2024-26706: Fix not seen in stream +CVE-2024-26713: Fix not seen in stream +CVE-2024-26719: Fix not seen in stream +CVE-2024-26720: Fix not seen in stream +CVE-2024-26726: Fix not seen in stream +CVE-2024-26733: Fix not seen in stream +CVE-2024-26738: Fix not seen in stream +CVE-2024-26739: Fix not seen in stream +CVE-2024-26743: Fix not seen in stream +CVE-2024-26744: Fix not seen in stream +CVE-2024-26745: Fix not seen in stream +CVE-2024-26748: Fix not seen in stream +CVE-2024-26752: Fix not seen in stream +CVE-2024-26756: Fix not seen in stream +CVE-2024-26758: Fix not seen in stream +CVE-2024-26759: Fix not seen in stream +CVE-2024-26763: Fix not seen in stream +CVE-2024-26764: Fix not seen in stream +CVE-2024-26765: Fix not seen in stream +CVE-2024-26766: Fix not seen in stream +CVE-2024-26767: Fix not seen in stream +CVE-2024-26768: Fix not seen in stream +CVE-2024-26769: Fix not seen in stream +CVE-2024-26770: Fix not seen in stream +CVE-2024-26771: Fix not seen in stream +CVE-2024-26772: Fix not seen in stream +CVE-2024-26773: Fix not seen in stream +CVE-2024-26774: Fix not seen in stream +CVE-2024-26775: Fix not seen in stream +CVE-2024-26776: Fix not seen in stream +CVE-2024-26777: Fix not seen in stream +CVE-2024-26778: Fix not seen in stream +CVE-2024-26779: Fix not seen in stream +CVE-2024-26784: Fix not seen in stream +CVE-2024-26789: Fix not seen in stream +CVE-2024-26791: Fix not seen in stream +CVE-2024-26793: Fix not seen in stream +CVE-2024-26797: Fix not seen in stream +CVE-2024-26798: Fix not seen in stream +CVE-2024-26802: Fix not seen in stream +CVE-2024-26803: Fix not seen in stream +CVE-2024-26804: Fix not seen in stream +CVE-2024-26806: Fix not seen in stream +CVE-2024-26808: Fix not seen in stream +CVE-2024-26809: Fix not seen in stream diff --git a/data/3.18/3.18_security.txt b/data/3.18/3.18_security.txt index 4902ed0a9..2869bdaaa 100644 --- a/data/3.18/3.18_security.txt +++ b/data/3.18/3.18_security.txt @@ -628,6 +628,7 @@ CVEs fixed in 3.18.137: CVE-2019-15916: a7053bc3aeefb24b94290a5c438fbcfe635ee4c7 net-sysfs: Fix mem leak in netdev_register_kobject CVE-2019-16995: e3d6490ad2b47f41bd534a6a5f8655549a754665 net: hsr: fix memory leak in hsr_dev_finalize() CVE-2019-2101: 7828fe7452f151cc1107a5c28ed042aeb64c1166 media: uvcvideo: Fix 'type' check leading to overflow + CVE-2019-25160: c61d01faa5550e06794dcf86125ccd325bfad950 netlabel: fix out-of-bounds memory accesses CVE-2019-9213: f290a73f3e919c4d5482632284ccb0aa17f7380c mm: enforce min addr even if capable() in expand_downwards() CVE-2020-0066: 5821948648caf10f8c8f7e9c9f8ac8fd22c640ba netlink: Trim skb to alloc size to avoid MSG_TRUNC @@ -1120,6 +1121,9 @@ Outstanding CVEs: CVE-2020-36557: (unk) vt: vt_ioctl: fix VT_DISALLOCATE freeing in-use virtual console CVE-2020-36558: (unk) vt: vt_ioctl: fix race in VT_RESIZEX CVE-2020-36691: (unk) netlink: limit recursion depth in policy validation + CVE-2020-36775: (unk) f2fs: fix to avoid potential deadlock + CVE-2020-36780: (unk) i2c: sprd: fix reference leak when pm_runtime_get_sync fails + CVE-2020-36781: (unk) i2c: imx: fix reference leak when pm_runtime_get_sync fails CVE-2020-3702: (unk) ath: Use safer key clearing with key cache entries CVE-2020-4788: (unk) powerpc/64s: flush L1D on kernel entry CVE-2020-8647: (unk) vgacon: Fix a UAF in vgacon_invert_region @@ -1249,6 +1253,78 @@ Outstanding CVEs: CVE-2021-45485: (unk) ipv6: use prandom_u32() for ID generation CVE-2021-45486: (unk) inet: use bigger hash table for IP ID generation CVE-2021-45868: (unk) quota: check block number when reading the block in quota file + CVE-2021-46904: (unk) net: hso: fix null-ptr-deref during tty device unregistration + CVE-2021-46906: (unk) HID: usbhid: fix info leak in hid_submit_ctrl + CVE-2021-46908: (unk) bpf: Use correct permission flag for mixed signed bounds arithmetic + CVE-2021-46924: (unk) NFC: st21nfca: Fix memory leak in device probe and remove + CVE-2021-46926: (unk) ALSA: hda: intel-sdw-acpi: harden detection of controller + CVE-2021-46928: (unk) parisc: Clear stale IIR value on instruction access rights trap + CVE-2021-46932: (unk) Input: appletouch - initialize work before device registration + CVE-2021-46936: (unk) net: fix use-after-free in tw_timer_handler + CVE-2021-46939: (unk) tracing: Restructure trace_clock_global() to never block + CVE-2021-46950: (unk) md/raid1: properly indicate failure when ending a failed write request + CVE-2021-46951: (unk) tpm: efi: Use local variable for calculating final log size + CVE-2021-46952: (unk) NFS: fs_context: validate UDP retrans to prevent shift out-of-bounds + CVE-2021-46959: (unk) spi: Fix use-after-free with devm_spi_alloc_* + CVE-2021-46962: (unk) mmc: uniphier-sd: Fix a resource leak in the remove function + CVE-2021-46965: (unk) mtd: physmap: physmap-bt1-rom: Fix unintentional stack access + CVE-2021-46969: (unk) bus: mhi: core: Fix invalid error returning in mhi_queue + CVE-2021-46970: (unk) bus: mhi: pci_generic: Remove WQ_MEM_RECLAIM flag from state workqueue + CVE-2021-46982: (unk) f2fs: compress: fix race condition of overwrite vs truncate + CVE-2021-47028: (unk) mt76: mt7915: fix txrate reporting + CVE-2021-47046: (unk) drm/amd/display: Fix off by one in hdmi_14_process_transaction() + CVE-2021-47052: (unk) crypto: sa2ul - Fix memory leak of rxd + CVE-2021-47059: (unk) crypto: sun8i-ss - fix result memory leak on error path + CVE-2021-47065: (unk) rtw88: Fix array overrun in rtw_get_tx_power_params() + CVE-2021-47070: (unk) uio_hv_generic: Fix another memory leak in error handling paths + CVE-2021-47075: (unk) nvmet: fix memory leak in nvmet_alloc_ctrl() + CVE-2021-47076: (unk) RDMA/rxe: Return CQE error if invalid lkey was supplied + CVE-2021-47082: (unk) tun: avoid double free in tun_free_netdev + CVE-2021-47083: (unk) pinctrl: mediatek: fix global-out-of-bounds issue + CVE-2021-47086: (unk) phonet/pep: refuse to enable an unbound pipe + CVE-2021-47101: (unk) asix: fix uninit-value in asix_mdio_read() + CVE-2021-47103: (unk) inet: fully convert sk->sk_rx_dst to RCU rules + CVE-2021-47110: (unk) x86/kvm: Disable kvmclock on all CPUs on shutdown + CVE-2021-47112: (unk) x86/kvm: Teardown PV features on boot CPU as well + CVE-2021-47113: (unk) btrfs: abort in rename_exchange if we fail to insert the second ref + CVE-2021-47114: (unk) ocfs2: fix data corruption by fallocate + CVE-2021-47116: (unk) ext4: fix memory leak in ext4_mb_init_backend on error path. + CVE-2021-47117: (unk) ext4: fix bug on in ext4_es_cache_extent as ext4_split_extent_at failed + CVE-2021-47118: (unk) pid: take a reference when initializing `cad_pid` + CVE-2021-47119: (unk) ext4: fix memory leak in ext4_fill_super + CVE-2021-47121: (unk) net: caif: fix memory leak in cfusbl_device_notify + CVE-2021-47122: (unk) net: caif: fix memory leak in caif_device_notify + CVE-2021-47124: (unk) io_uring: fix link timeout refs + CVE-2021-47125: (unk) sch_htb: fix refcount leak in htb_parent_to_leaf_offload + CVE-2021-47128: (unk) bpf, lockdown, audit: Fix buggy SELinux lockdown permission checks + CVE-2021-47131: (unk) net/tls: Fix use-after-free after the TLS device goes down and up + CVE-2021-47133: (unk) HID: amd_sfh: Fix memory leak in amd_sfh_work + CVE-2021-47135: (unk) mt76: mt7921: fix possible AOOB issue in mt7921_mcu_tx_rate_report + CVE-2021-47136: (unk) net: zero-initialize tc skb extension on allocation + CVE-2021-47137: (unk) net: lantiq: fix memory corruption in RX ring + CVE-2021-47140: (unk) iommu/amd: Clear DMA ops when switching domain + CVE-2021-47142: (unk) drm/amdgpu: Fix a use-after-free + CVE-2021-47143: (unk) net/smc: remove device from smcd_dev_list after failed device_add() + CVE-2021-47144: (unk) drm/amd/amdgpu: fix refcount leak + CVE-2021-47145: (unk) btrfs: do not BUG_ON in link_to_fixup_dir + CVE-2021-47146: (unk) mld: fix panic in mld_newpack() + CVE-2021-47147: (unk) ptp: ocp: Fix a resource leak in an error handling path + CVE-2021-47149: (unk) net: fujitsu: fix potential null-ptr-deref + CVE-2021-47150: (unk) net: fec: fix the potential memory leak in fec_enet_init() + CVE-2021-47151: (unk) interconnect: qcom: bcm-voter: add a missing of_node_put() + CVE-2021-47153: (unk) i2c: i801: Don't generate an interrupt on bus reset + CVE-2021-47158: (unk) net: dsa: sja1105: add error handling in sja1105_setup() + CVE-2021-47160: (unk) net: dsa: mt7530: fix VLAN traffic leaks + CVE-2021-47165: (unk) drm/meson: fix shutdown crash when component not probed + CVE-2021-47168: (unk) NFS: fix an incorrect limit in filelayout_decode_layout() + CVE-2021-47169: (unk) serial: rp2: use 'request_firmware' instead of 'request_firmware_nowait' + CVE-2021-47170: (unk) USB: usbfs: Don't WARN about excessively large memory allocations + CVE-2021-47171: (unk) net: usb: fix memory leak in smsc75xx_bind + CVE-2021-47172: (unk) iio: adc: ad7124: Fix potential overflow due to non sequential channel numbers + CVE-2021-47173: (unk) misc/uss720: fix memory leak in uss720_probe + CVE-2021-47175: (unk) net/sched: fq_pie: fix OOB access in the traffic path + CVE-2021-47179: (unk) NFSv4: Fix a NULL pointer dereference in pnfs_mark_matching_lsegs_return() + CVE-2021-47180: (unk) NFC: nci: fix memory leak in nci_allocate_device CVE-2022-0001: (unk) x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE CVE-2022-0002: (unk) x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE CVE-2022-0168: (unk) cifs: fix NULL ptr dereference in smb2_ioctl_query_info() @@ -1407,6 +1483,9 @@ Outstanding CVEs: CVE-2022-4662: (unk) USB: core: Prevent nested device-reset calls CVE-2022-4744: (unk) tun: avoid double free in tun_free_netdev CVE-2022-48619: (unk) Input: add bounds checking to input_set_capability() + CVE-2022-48626: (unk) moxart: fix potential use-after-free on remove path + CVE-2022-48627: (unk) vt: fix memory overlapping when deleting chars in the buffer + CVE-2022-48628: (unk) ceph: drop messages from MDS when unmounting CVE-2023-0030: (unk) drm/nouveau/mmu: add more general vmm free/node handling functions CVE-2023-0047: (unk) mm, oom: do not trigger out_of_memory from the #PF CVE-2023-0266: (unk) ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF @@ -1452,6 +1531,7 @@ Outstanding CVEs: CVE-2023-2513: (unk) ext4: fix use-after-free in ext4_xattr_set_entry CVE-2023-26607: (unk) ntfs: fix out-of-bounds read in ntfs_attr_find() CVE-2023-28328: (unk) media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer() + CVE-2023-28746: (unk) x86/mmio: Disable KVM mitigation when X86_FEATURE_CLEAR_CPU_BUF is set CVE-2023-28772: (unk) seq_buf: Fix overflow in seq_buf_putmem_hex() CVE-2023-2985: (unk) fs: hfsplus: fix UAF issue in hfsplus_put_super CVE-2023-3006: (unk) arm64: Add AMPERE1 to the Spectre-BHB affected list @@ -1512,7 +1592,7 @@ Outstanding CVEs: CVE-2023-4623: (unk) net/sched: sch_hfsc: Ensure inner classes have fsc curve CVE-2023-46343: (unk) nfc: nci: fix possible NULL pointer dereference in send_acknowledge() CVE-2023-46838: (unk) xen-netback: don't produce zero-size SKB frags - CVE-2023-47233: (unk) + CVE-2023-47233: (unk) wifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach CVE-2023-4921: (unk) net: sched: sch_qfq: Fix UAF in qfq_dequeue() CVE-2023-51043: (unk) drm/atomic: Fix potential use-after-free in nonblocking commits CVE-2023-51779: (unk) Bluetooth: af_bluetooth: Fix Use-After-Free in bt_sock_recvmsg @@ -1523,26 +1603,110 @@ Outstanding CVEs: CVE-2023-52340: (unk) ipv6: remove max_size check inline with ipv4 CVE-2023-52429: (unk) dm: limit the number of targets and parameter size area CVE-2023-52434: (unk) smb: client: fix potential OOBs in smb2_parse_contexts() - CVE-2023-52435: (unk) net: prevent mss overflow in skb_segment() CVE-2023-52436: (unk) f2fs: explicitly null-terminate the xattr list CVE-2023-52442: (unk) ksmbd: validate session id and tree id in compound request CVE-2023-52445: (unk) media: pvrusb2: fix use after free on context disconnection CVE-2023-52449: (unk) mtd: Fix gluebi NULL pointer dereference caused by ftl notifier - CVE-2023-52456: (unk) serial: imx: fix tx statemachine deadlock - CVE-2023-52457: (unk) serial: 8250: omap: Don't skip resource freeing if pm_runtime_resume_and_get() failed CVE-2023-52458: (unk) block: add check that partition length needs to be aligned with block size + CVE-2023-52470: (unk) drm/radeon: check the alloc_workqueue return value in radeon_crtc_init() + CVE-2023-52475: (unk) Input: powermate - fix use-after-free in powermate_config_complete + CVE-2023-52476: (unk) perf/x86/lbr: Filter vsyscall addresses + CVE-2023-52477: (unk) usb: hub: Guard against accesses to uninitialized BOS descriptors + CVE-2023-52478: (unk) HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect + CVE-2023-52479: (unk) ksmbd: fix uaf in smb20_oplock_break_ack + CVE-2023-52480: (unk) ksmbd: fix race condition between session lookup and expire + CVE-2023-52481: (unk) arm64: errata: Add Cortex-A520 speculative unprivileged load workaround + CVE-2023-52482: (unk) x86/srso: Add SRSO mitigation for Hygon processors + CVE-2023-52484: (unk) iommu/arm-smmu-v3: Fix soft lockup triggered by arm_smmu_mm_invalidate_range + CVE-2023-52485: (unk) drm/amd/display: Wake DMCUB before sending a command + CVE-2023-52486: (unk) drm: Don't unref the same fb many times by mistake due to deadlock handling + CVE-2023-52488: (unk) serial: sc16is7xx: convert from _raw_ to _noinc_ regmap functions for FIFO + CVE-2023-52489: (unk) mm/sparsemem: fix race in accessing memory_section->usage + CVE-2023-52498: (unk) PM: sleep: Fix possible deadlocks in core system-wide PM code + CVE-2023-52500: (unk) scsi: pm80xx: Avoid leaking tags when processing OPC_INB_SET_CONTROLLER_CONFIG command + CVE-2023-52501: (unk) ring-buffer: Do not attempt to read past "commit" + CVE-2023-52502: (unk) net: nfc: fix races in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn() + CVE-2023-52506: (unk) LoongArch: Set all reserved memblocks on Node#0 at initialization + CVE-2023-52507: (unk) nfc: nci: assert requested protocol is valid + CVE-2023-52508: (unk) nvme-fc: Prevent null pointer dereference in nvme_fc_io_getuuid() + CVE-2023-52509: (unk) ravb: Fix use-after-free issue in ravb_tx_timeout_work() + CVE-2023-52511: (unk) spi: sun6i: reduce DMA RX transfer width to single byte + CVE-2023-52515: (unk) RDMA/srp: Do not call scsi_done() from srp_abort() + CVE-2023-52516: (unk) dma-debug: don't call __dma_entry_alloc_check_leak() under free_entries_lock + CVE-2023-52517: (unk) spi: sun6i: fix race between DMA RX transfer completion and RX FIFO drain + CVE-2023-52519: (unk) HID: intel-ish-hid: ipc: Disable and reenable ACPI GPE bit + CVE-2023-52522: (unk) net: fix possible store tearing in neigh_periodic_work() + CVE-2023-52527: (unk) ipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data() + CVE-2023-52528: (unk) net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg + CVE-2023-52531: (unk) wifi: iwlwifi: mvm: Fix a memory corruption issue + CVE-2023-52532: (unk) net: mana: Fix TX CQE error handling + CVE-2023-52559: (unk) iommu/vt-d: Avoid memory allocation in iommu_suspend() + CVE-2023-52561: (unk) arm64: dts: qcom: sdm845-db845c: Mark cont splash memory region as reserved + CVE-2023-52563: (unk) drm/meson: fix memory leak on ->hpd_notify callback + CVE-2023-52565: (unk) media: uvcvideo: Fix OOB read + CVE-2023-52566: (unk) nilfs2: fix potential use after free in nilfs_gccache_submit_read_data() + CVE-2023-52568: (unk) x86/sgx: Resolves SECS reclaim vs. page fault for EAUG race + CVE-2023-52569: (unk) btrfs: remove BUG() after failure to insert delayed dir index item + CVE-2023-52571: (unk) power: supply: rk817: Fix node refcount leak + CVE-2023-52572: (unk) cifs: Fix UAF in cifs_demultiplex_thread() + CVE-2023-52574: (unk) team: fix null-ptr-deref when team device type is changed + CVE-2023-52578: (unk) net: bridge: use DEV_STATS_INC() + CVE-2023-52583: (unk) ceph: fix deadlock or deadcode of misusing dget() + CVE-2023-52584: (unk) spmi: mediatek: Fix UAF on device remove + CVE-2023-52585: (unk) drm/amdgpu: Fix possible NULL dereference in amdgpu_ras_query_error_status_helper() + CVE-2023-52586: (unk) drm/msm/dpu: Add mutex lock in control vblank irq + CVE-2023-52587: (unk) IB/ipoib: Fix mcast list locking + CVE-2023-52588: (unk) f2fs: fix to tag gcing flag on page during block migration + CVE-2023-52589: (unk) media: rkisp1: Fix IRQ disable race issue + CVE-2023-52590: (unk) ocfs2: Avoid touching renamed directory if parent does not change + CVE-2023-52591: (unk) reiserfs: Avoid touching renamed directory if parent does not change + CVE-2023-52593: (unk) wifi: wfx: fix possible NULL pointer dereference in wfx_set_mfp_ap() + CVE-2023-52594: (unk) wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus() + CVE-2023-52595: (unk) wifi: rt2x00: restart beacon queue when hardware reset + CVE-2023-52596: (unk) sysctl: Fix out of bounds access for empty sysctl registers + CVE-2023-52597: (unk) KVM: s390: fix setting of fpc register + CVE-2023-52598: (unk) s390/ptrace: handle setting of fpc register correctly + CVE-2023-52599: (unk) jfs: fix array-index-out-of-bounds in diNewExt + CVE-2023-52600: (unk) jfs: fix uaf in jfs_evict_inode + CVE-2023-52601: (unk) jfs: fix array-index-out-of-bounds in dbAdjTree + CVE-2023-52602: (unk) jfs: fix slab-out-of-bounds Read in dtSearch + CVE-2023-52603: (unk) UBSAN: array-index-out-of-bounds in dtSplitRoot + CVE-2023-52604: (unk) FS:JFS:UBSAN:array-index-out-of-bounds in dbAdjTree + CVE-2023-52606: (unk) powerpc/lib: Validate size for vector operations + CVE-2023-52607: (unk) powerpc/mm: Fix null-pointer dereference in pgtable_cache_add + CVE-2023-52609: (unk) binder: fix race between mmput() and do_exit() + CVE-2023-52614: (unk) PM / devfreq: Fix buffer overflow in trans_stat_show + CVE-2023-52615: (unk) hwrng: core - Fix page fault dead lock on mmap-ed hwrng + CVE-2023-52617: (unk) PCI: switchtec: Fix stdev_release() crash after surprise hot remove + CVE-2023-52618: (unk) block/rnbd-srv: Check for unlikely string overflow + CVE-2023-52619: (unk) pstore/ram: Fix crash when setting number of cpus to an odd number + CVE-2023-52620: (unk) netfilter: nf_tables: disallow timeout for anonymous sets + CVE-2023-52621: (unk) bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers + CVE-2023-52622: (unk) ext4: avoid online resizing failures due to oversized flex bg + CVE-2023-52623: (unk) SUNRPC: Fix a suspicious RCU usage warning + CVE-2023-52624: (unk) drm/amd/display: Wake DMCUB before executing GPINT commands + CVE-2023-52625: (unk) drm/amd/display: Refactor DMCUB enter/exit idle interface + CVE-2023-52629: (unk) sh: push-switch: Reorder cleanup operations to avoid use-after-free bug + CVE-2023-52632: (unk) drm/amdkfd: Fix lock dependency warning with srcu + CVE-2023-52633: (unk) um: time-travel: fix time corruption + CVE-2023-52634: (unk) drm/amd/display: Fix disable_otg_wa logic + CVE-2023-52635: (unk) PM / devfreq: Synchronize devfreq_monitor_[start/stop] + CVE-2023-52638: (unk) can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock + CVE-2023-52639: (unk) KVM: s390: vsie: fix race during shadow creation + CVE-2023-52640: (unk) fs/ntfs3: Fix oob in ntfs_listxattr + CVE-2023-52641: (unk) fs/ntfs3: Add NULL ptr dereference checking at the end of attr_allocate_frame() CVE-2023-6040: (unk) netfilter: nf_tables: Reject tables of unsupported family CVE-2023-6240: (unk) - CVE-2023-6270: (unk) - CVE-2023-6356: (unk) + CVE-2023-6270: (unk) aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts + CVE-2023-6356: (unk) nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length CVE-2023-6535: (unk) - CVE-2023-6536: (unk) + CVE-2023-6536: (unk) nvmet-tcp: fix a crash in nvmet_req_complete() CVE-2023-6546: (unk) tty: n_gsm: fix the UAF caused by race condition in gsm_cleanup_mux CVE-2023-6606: (unk) smb: client: fix OOB in smbCalcSize() CVE-2023-6610: (unk) smb: client: fix potential OOB in smb2_dump_detail() CVE-2023-6915: (unk) ida: Fix crash in ida_free when the bitmap is empty CVE-2023-6932: (unk) ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet - CVE-2023-7042: (unk) + CVE-2023-7042: (unk) wifi: ath10k: fix NULL pointer dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev() CVE-2023-7192: (unk) netfilter: ctnetlink: fix possible refcount leak in ctnetlink_create_conntrack() CVE-2024-0340: (unk) vhost: use kzalloc() instead of kmalloc() followed by memset() CVE-2024-0584: (unk) ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet @@ -1550,25 +1714,104 @@ Outstanding CVEs: CVE-2024-1086: (unk) netfilter: nf_tables: reject QUEUE/DROP verdict parameters CVE-2024-1312: (unk) mm: lock_vma_under_rcu() must check vma->anon_vma under vma lock CVE-2024-21803: (unk) - CVE-2024-22099: (unk) + CVE-2024-2193: (unk) + CVE-2024-22099: (unk) Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security CVE-2024-22386: (unk) - CVE-2024-23196: (unk) + CVE-2024-23196: (unk) ALSA: hda: fix a possible null-pointer dereference due to data race in snd_hdac_regmap_sync() CVE-2024-23848: (unk) CVE-2024-23851: (unk) dm: limit the number of targets and parameter size area CVE-2024-24855: (unk) scsi: lpfc: Fix a possible data race in lpfc_unregister_fcf_rescan() CVE-2024-24857: (unk) CVE-2024-24858: (unk) CVE-2024-24859: (unk) - CVE-2024-24861: (unk) + CVE-2024-24861: (unk) media: xc4000: Fix atomicity violation in xc4000_get_frequency CVE-2024-24864: (unk) CVE-2024-25739: (unk) CVE-2024-25740: (unk) CVE-2024-25741: (unk) CVE-2024-25744: (unk) x86/coco: Disable 32-bit emulation by default on TDX and SEV - CVE-2024-26584: (unk) net: tls: handle backlogging of crypto requests - CVE-2024-26587: (unk) net: netdevsim: don't try to destroy PHC on VFs - CVE-2024-26588: (unk) LoongArch: BPF: Prevent out-of-bounds memory access - CVE-2024-26591: (unk) bpf: Fix re-attachment branch in bpf_tracing_prog_attach CVE-2024-26592: (unk) ksmbd: fix UAF issue in ksmbd_tcp_new_connection() CVE-2024-26594: (unk) ksmbd: validate mech token in session setup CVE-2024-26598: (unk) KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache + CVE-2024-26600: (unk) phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP + CVE-2024-26606: (unk) binder: signal epoll threads of self-work + CVE-2024-26622: (unk) tomoyo: fix UAF write bug in tomoyo_write_control() + CVE-2024-26623: (unk) pds_core: Prevent race issues involving the adminq + CVE-2024-26625: (unk) llc: call sock_orphan() at release time + CVE-2024-26627: (unk) scsi: core: Move scsi_host_busy() out of host lock for waking up EH handler + CVE-2024-26633: (unk) ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim() + CVE-2024-26635: (unk) llc: Drop support for ETH_P_TR_802_2. + CVE-2024-26636: (unk) llc: make llc_ui_sendmsg() more robust against bonding changes + CVE-2024-26644: (unk) btrfs: don't abort filesystem when attempting to snapshot deleted subvolume + CVE-2024-26646: (unk) thermal: intel: hfi: Add syscore callbacks for system-wide PM + CVE-2024-26647: (unk) drm/amd/display: Fix late derefrence 'dsc' check in 'link_set_dsc_pps_packet()' + CVE-2024-26648: (unk) drm/amd/display: Fix variable deferencing before NULL check in edp_setup_replay() + CVE-2024-26650: (unk) platform/x86: p2sb: Allow p2sb_bar() calls during PCI device probe + CVE-2024-26651: (unk) sr9800: Add check for usbnet_get_endpoints + CVE-2024-26654: (unk) ALSA: sh: aica: reorder cleanup operations to avoid UAF bugs + CVE-2024-26655: (unk) Fix memory leak in posix_clock_open() + CVE-2024-26656: (unk) drm/amdgpu: fix use-after-free bug + CVE-2024-26658: (unk) bcachefs: grab s_umount only if snapshotting + CVE-2024-26659: (unk) xhci: handle isoc Babble and Buffer Overrun events properly + CVE-2024-26664: (unk) hwmon: (coretemp) Fix out-of-bounds memory access + CVE-2024-26671: (unk) blk-mq: fix IO hang from sbitmap wakeup race + CVE-2024-26672: (unk) drm/amdgpu: Fix variable 'mca_funcs' dereferenced before NULL check in 'amdgpu_mca_smu_get_mca_entry()' + CVE-2024-26675: (unk) ppp_async: limit MRU to 64K + CVE-2024-26676: (unk) af_unix: Call kfree_skb() for dead unix_(sk)->oob_skb in GC. + CVE-2024-26677: (unk) rxrpc: Fix delayed ACKs to not set the reference serial number + CVE-2024-26679: (unk) inet: read sk->sk_family once in inet_recv_error() + CVE-2024-26685: (unk) nilfs2: fix potential bug in end_buffer_async_write + CVE-2024-26686: (unk) fs/proc: do_task_stat: use sig->stats_lock to gather the threads/children stats + CVE-2024-26687: (unk) xen/events: close evtchn after mapping cleanup + CVE-2024-26689: (unk) ceph: prevent use-after-free in encode_cap_msg() + CVE-2024-26691: (unk) KVM: arm64: Fix circular locking dependency + CVE-2024-26696: (unk) nilfs2: fix hang in nilfs_lookup_dirty_data_buffers() + CVE-2024-26697: (unk) nilfs2: fix data corruption in dsync block recovery for small block sizes + CVE-2024-26699: (unk) drm/amd/display: Fix array-index-out-of-bounds in dcn35_clkmgr + CVE-2024-26700: (unk) drm/amd/display: Fix MST Null Ptr for RV + CVE-2024-26704: (unk) ext4: fix double-free of blocks due to wrong extents moved_len + CVE-2024-26706: (unk) parisc: Fix random data corruption from exception handler + CVE-2024-26713: (unk) powerpc/pseries/iommu: Fix iommu initialisation during DLPAR add + CVE-2024-26719: (unk) nouveau: offload fence uevents work to workqueue + CVE-2024-26720: (unk) mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again + CVE-2024-26726: (unk) btrfs: don't drop extent_map for free space inode on write error + CVE-2024-26733: (unk) arp: Prevent overflow in arp_req_get(). + CVE-2024-26738: (unk) powerpc/pseries/iommu: DLPAR add doesn't completely initialize pci_controller + CVE-2024-26739: (unk) net/sched: act_mirred: don't override retval if we already lost the skb + CVE-2024-26743: (unk) RDMA/qedr: Fix qedr_create_user_qp error flow + CVE-2024-26744: (unk) RDMA/srpt: Support specifying the srpt_service_guid parameter + CVE-2024-26745: (unk) powerpc/pseries/iommu: IOMMU table is not initialized for kdump over SR-IOV + CVE-2024-26748: (unk) usb: cdns3: fix memory double free when handle zero packet + CVE-2024-26752: (unk) l2tp: pass correct message length to ip6_append_data + CVE-2024-26756: (unk) md: Don't register sync_thread for reshape directly + CVE-2024-26758: (unk) md: Don't ignore suspended array in md_check_recovery() + CVE-2024-26759: (unk) mm/swap: fix race when skipping swapcache + CVE-2024-26763: (unk) dm-crypt: don't modify the data when using authenticated encryption + CVE-2024-26764: (unk) fs/aio: Restrict kiocb_set_cancel_fn() to I/O submitted via libaio + CVE-2024-26765: (unk) LoongArch: Disable IRQ before init_fn() for nonboot CPUs + CVE-2024-26766: (unk) IB/hfi1: Fix sdma.h tx->num_descs off-by-one error + CVE-2024-26767: (unk) drm/amd/display: fixed integer types and null check locations + CVE-2024-26768: (unk) LoongArch: Change acpi_core_pic[NR_CPUS] to acpi_core_pic[MAX_CORE_PIC] + CVE-2024-26769: (unk) nvmet-fc: avoid deadlock on delete association path + CVE-2024-26770: (unk) HID: nvidia-shield: Add missing null pointer checks to LED initialization + CVE-2024-26771: (unk) dmaengine: ti: edma: Add some null pointer checks to the edma_probe + CVE-2024-26772: (unk) ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal() + CVE-2024-26773: (unk) ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found() + CVE-2024-26774: (unk) ext4: avoid dividing by 0 in mb_update_avg_fragment_size() when block bitmap corrupt + CVE-2024-26775: (unk) aoe: avoid potential deadlock at set_capacity + CVE-2024-26776: (unk) spi: hisi-sfc-v3xx: Return IRQ_NONE if no interrupts were detected + CVE-2024-26777: (unk) fbdev: sis: Error out if pixclock equals zero + CVE-2024-26778: (unk) fbdev: savage: Error out if pixclock equals zero + CVE-2024-26779: (unk) wifi: mac80211: fix race condition on enabling fast-xmit + CVE-2024-26784: (unk) pmdomain: arm: Fix NULL dereference on scmi_perf_domain removal + CVE-2024-26789: (unk) crypto: arm64/neonbs - fix out-of-bounds access on short input + CVE-2024-26791: (unk) btrfs: dev-replace: properly validate device names + CVE-2024-26793: (unk) gtp: fix use-after-free and null-ptr-deref in gtp_newlink() + CVE-2024-26797: (unk) drm/amd/display: Prevent potential buffer overflow in map_hw_resources + CVE-2024-26798: (unk) fbcon: always restore the old font data in fbcon_do_set_font() + CVE-2024-26802: (unk) stmmac: Clear variable when destroying workqueue + CVE-2024-26803: (unk) net: veth: clear GRO when clearing XDP even when down + CVE-2024-26804: (unk) net: ip_tunnel: prevent perpetual headroom growth + CVE-2024-26806: (unk) spi: cadence-qspi: remove system-wide suspend helper calls from runtime PM hooks + CVE-2024-26808: (unk) netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain + CVE-2024-26809: (unk) netfilter: nft_set_pipapo: release elements in clone only from destroy path diff --git a/data/3.2/3.2_CVEs.txt b/data/3.2/3.2_CVEs.txt index 9f48d1307..b55ae45a5 100644 --- a/data/3.2/3.2_CVEs.txt +++ b/data/3.2/3.2_CVEs.txt @@ -821,6 +821,7 @@ CVE-2019-2101: Fix not seen in stream CVE-2019-2181: Fix not seen in stream CVE-2019-2213: Fix not seen in stream CVE-2019-2215: Fix not seen in stream +CVE-2019-25160: Fix not seen in stream CVE-2019-3459: Fix not seen in stream CVE-2019-3460: Fix not seen in stream CVE-2019-3701: Fix not seen in stream @@ -958,6 +959,9 @@ CVE-2020-36385: Fix not seen in stream CVE-2020-36386: Fix not seen in stream CVE-2020-36558: Fix not seen in stream CVE-2020-36691: Fix not seen in stream +CVE-2020-36775: Fix not seen in stream +CVE-2020-36780: Fix not seen in stream +CVE-2020-36781: Fix not seen in stream CVE-2020-3702: Fix not seen in stream CVE-2020-4788: Fix not seen in stream CVE-2020-8647: Fix not seen in stream @@ -1065,6 +1069,72 @@ CVE-2021-44879: Fix not seen in stream CVE-2021-45095: Fix not seen in stream CVE-2021-45485: Fix not seen in stream CVE-2021-45868: Fix not seen in stream +CVE-2021-46904: Fix not seen in stream +CVE-2021-46906: Fix not seen in stream +CVE-2021-46908: Fix not seen in stream +CVE-2021-46926: Fix not seen in stream +CVE-2021-46928: Fix not seen in stream +CVE-2021-46932: Fix not seen in stream +CVE-2021-46936: Fix not seen in stream +CVE-2021-46939: Fix not seen in stream +CVE-2021-46950: Fix not seen in stream +CVE-2021-46951: Fix not seen in stream +CVE-2021-46952: Fix not seen in stream +CVE-2021-46959: Fix not seen in stream +CVE-2021-46962: Fix not seen in stream +CVE-2021-46965: Fix not seen in stream +CVE-2021-46969: Fix not seen in stream +CVE-2021-46970: Fix not seen in stream +CVE-2021-46982: Fix not seen in stream +CVE-2021-47028: Fix not seen in stream +CVE-2021-47046: Fix not seen in stream +CVE-2021-47052: Fix not seen in stream +CVE-2021-47059: Fix not seen in stream +CVE-2021-47065: Fix not seen in stream +CVE-2021-47070: Fix not seen in stream +CVE-2021-47075: Fix not seen in stream +CVE-2021-47076: Fix not seen in stream +CVE-2021-47082: Fix not seen in stream +CVE-2021-47083: Fix not seen in stream +CVE-2021-47101: Fix not seen in stream +CVE-2021-47103: Fix not seen in stream +CVE-2021-47110: Fix not seen in stream +CVE-2021-47112: Fix not seen in stream +CVE-2021-47113: Fix not seen in stream +CVE-2021-47114: Fix not seen in stream +CVE-2021-47116: Fix not seen in stream +CVE-2021-47117: Fix not seen in stream +CVE-2021-47118: Fix not seen in stream +CVE-2021-47119: Fix not seen in stream +CVE-2021-47124: Fix not seen in stream +CVE-2021-47125: Fix not seen in stream +CVE-2021-47128: Fix not seen in stream +CVE-2021-47131: Fix not seen in stream +CVE-2021-47133: Fix not seen in stream +CVE-2021-47135: Fix not seen in stream +CVE-2021-47136: Fix not seen in stream +CVE-2021-47137: Fix not seen in stream +CVE-2021-47140: Fix not seen in stream +CVE-2021-47142: Fix not seen in stream +CVE-2021-47143: Fix not seen in stream +CVE-2021-47144: Fix not seen in stream +CVE-2021-47145: Fix not seen in stream +CVE-2021-47146: Fix not seen in stream +CVE-2021-47147: Fix not seen in stream +CVE-2021-47149: Fix not seen in stream +CVE-2021-47151: Fix not seen in stream +CVE-2021-47158: Fix not seen in stream +CVE-2021-47160: Fix not seen in stream +CVE-2021-47165: Fix not seen in stream +CVE-2021-47168: Fix not seen in stream +CVE-2021-47169: Fix not seen in stream +CVE-2021-47170: Fix not seen in stream +CVE-2021-47171: Fix not seen in stream +CVE-2021-47172: Fix not seen in stream +CVE-2021-47173: Fix not seen in stream +CVE-2021-47175: Fix not seen in stream +CVE-2021-47179: Fix not seen in stream +CVE-2021-47180: Fix not seen in stream CVE-2022-0001: Fix not seen in stream CVE-2022-0002: Fix not seen in stream CVE-2022-0168: Fix not seen in stream @@ -1202,6 +1272,8 @@ CVE-2022-45934: Fix not seen in stream CVE-2022-4662: Fix not seen in stream CVE-2022-4744: Fix not seen in stream CVE-2022-48619: Fix not seen in stream +CVE-2022-48626: Fix not seen in stream +CVE-2022-48628: Fix not seen in stream CVE-2023-0030: Fix not seen in stream CVE-2023-0047: Fix not seen in stream CVE-2023-0266: Fix not seen in stream @@ -1239,6 +1311,7 @@ CVE-2023-23559: Fix not seen in stream CVE-2023-2513: Fix not seen in stream CVE-2023-26607: Fix not seen in stream CVE-2023-28328: Fix not seen in stream +CVE-2023-28746: Fix not seen in stream CVE-2023-28772: Fix not seen in stream CVE-2023-2985: Fix not seen in stream CVE-2023-3006: Fix not seen in stream @@ -1292,20 +1365,98 @@ CVE-2023-51782: Fix not seen in stream CVE-2023-52340: Fix not seen in stream CVE-2023-52429: Fix not seen in stream CVE-2023-52434: Fix not seen in stream -CVE-2023-52435: Fix not seen in stream CVE-2023-52436: Fix not seen in stream CVE-2023-52442: Fix not seen in stream CVE-2023-52445: Fix not seen in stream CVE-2023-52449: Fix not seen in stream -CVE-2023-52456: Fix not seen in stream -CVE-2023-52457: Fix not seen in stream CVE-2023-52458: Fix not seen in stream +CVE-2023-52475: Fix not seen in stream +CVE-2023-52476: Fix not seen in stream +CVE-2023-52477: Fix not seen in stream +CVE-2023-52478: Fix not seen in stream +CVE-2023-52479: Fix not seen in stream +CVE-2023-52480: Fix not seen in stream +CVE-2023-52481: Fix not seen in stream +CVE-2023-52482: Fix not seen in stream +CVE-2023-52484: Fix not seen in stream +CVE-2023-52485: Fix not seen in stream +CVE-2023-52486: Fix not seen in stream +CVE-2023-52489: Fix not seen in stream +CVE-2023-52498: Fix not seen in stream +CVE-2023-52500: Fix not seen in stream +CVE-2023-52501: Fix not seen in stream +CVE-2023-52506: Fix not seen in stream +CVE-2023-52507: Fix not seen in stream +CVE-2023-52508: Fix not seen in stream +CVE-2023-52509: Fix not seen in stream +CVE-2023-52511: Fix not seen in stream +CVE-2023-52516: Fix not seen in stream +CVE-2023-52517: Fix not seen in stream +CVE-2023-52519: Fix not seen in stream +CVE-2023-52522: Fix not seen in stream +CVE-2023-52528: Fix not seen in stream +CVE-2023-52532: Fix not seen in stream +CVE-2023-52559: Fix not seen in stream +CVE-2023-52561: Fix not seen in stream +CVE-2023-52563: Fix not seen in stream +CVE-2023-52565: Fix not seen in stream +CVE-2023-52566: Fix not seen in stream +CVE-2023-52568: Fix not seen in stream +CVE-2023-52569: Fix not seen in stream +CVE-2023-52571: Fix not seen in stream +CVE-2023-52572: Fix not seen in stream +CVE-2023-52574: Fix not seen in stream +CVE-2023-52578: Fix not seen in stream +CVE-2023-52583: Fix not seen in stream +CVE-2023-52584: Fix not seen in stream +CVE-2023-52585: Fix not seen in stream +CVE-2023-52586: Fix not seen in stream +CVE-2023-52587: Fix not seen in stream +CVE-2023-52588: Fix not seen in stream +CVE-2023-52589: Fix not seen in stream +CVE-2023-52590: Fix not seen in stream +CVE-2023-52591: Fix not seen in stream +CVE-2023-52593: Fix not seen in stream +CVE-2023-52594: Fix not seen in stream +CVE-2023-52595: Fix not seen in stream +CVE-2023-52596: Fix not seen in stream +CVE-2023-52597: Fix not seen in stream +CVE-2023-52598: Fix not seen in stream +CVE-2023-52599: Fix not seen in stream +CVE-2023-52600: Fix not seen in stream +CVE-2023-52601: Fix not seen in stream +CVE-2023-52602: Fix not seen in stream +CVE-2023-52603: Fix not seen in stream +CVE-2023-52604: Fix not seen in stream +CVE-2023-52606: Fix not seen in stream +CVE-2023-52607: Fix not seen in stream +CVE-2023-52609: Fix not seen in stream +CVE-2023-52614: Fix not seen in stream +CVE-2023-52615: Fix not seen in stream +CVE-2023-52617: Fix not seen in stream +CVE-2023-52618: Fix not seen in stream +CVE-2023-52619: Fix not seen in stream +CVE-2023-52620: Fix not seen in stream +CVE-2023-52621: Fix not seen in stream +CVE-2023-52622: Fix not seen in stream +CVE-2023-52623: Fix not seen in stream +CVE-2023-52624: Fix not seen in stream +CVE-2023-52625: Fix not seen in stream +CVE-2023-52629: Fix not seen in stream +CVE-2023-52632: Fix not seen in stream +CVE-2023-52633: Fix not seen in stream +CVE-2023-52634: Fix not seen in stream +CVE-2023-52635: Fix not seen in stream +CVE-2023-52638: Fix not seen in stream +CVE-2023-52639: Fix not seen in stream +CVE-2023-52640: Fix not seen in stream +CVE-2023-52641: Fix not seen in stream CVE-2023-6040: Fix not seen in stream CVE-2023-6240: Fix unknown -CVE-2023-6270: Fix unknown -CVE-2023-6356: Fix unknown +CVE-2023-6270: Fix not seen in stream +CVE-2023-6356: Fix not seen in stream CVE-2023-6535: Fix unknown -CVE-2023-6536: Fix unknown +CVE-2023-6536: Fix not seen in stream CVE-2023-6546: Fix not seen in stream CVE-2023-6606: Fix not seen in stream CVE-2023-6610: Fix not seen in stream @@ -1315,23 +1466,95 @@ CVE-2024-0340: Fix not seen in stream CVE-2024-0584: Fix not seen in stream CVE-2024-1312: Fix not seen in stream CVE-2024-21803: Fix unknown -CVE-2024-22099: Fix unknown +CVE-2024-2193: Fix unknown +CVE-2024-22099: Fix not seen in stream CVE-2024-22386: Fix unknown -CVE-2024-23196: Fix unknown +CVE-2024-23196: Fix not seen in stream CVE-2024-23848: Fix unknown CVE-2024-23851: Fix not seen in stream CVE-2024-24855: Fix not seen in stream CVE-2024-24859: Fix unknown -CVE-2024-24861: Fix unknown +CVE-2024-24861: Fix not seen in stream CVE-2024-24864: Fix unknown CVE-2024-25739: Fix unknown CVE-2024-25740: Fix unknown CVE-2024-25741: Fix unknown CVE-2024-25744: Fix not seen in stream -CVE-2024-26584: Fix not seen in stream -CVE-2024-26587: Fix not seen in stream -CVE-2024-26588: Fix not seen in stream -CVE-2024-26591: Fix not seen in stream CVE-2024-26592: Fix not seen in stream CVE-2024-26594: Fix not seen in stream CVE-2024-26598: Fix not seen in stream +CVE-2024-26606: Fix not seen in stream +CVE-2024-26622: Fix not seen in stream +CVE-2024-26623: Fix not seen in stream +CVE-2024-26625: Fix not seen in stream +CVE-2024-26627: Fix not seen in stream +CVE-2024-26633: Fix not seen in stream +CVE-2024-26635: Fix not seen in stream +CVE-2024-26636: Fix not seen in stream +CVE-2024-26644: Fix not seen in stream +CVE-2024-26646: Fix not seen in stream +CVE-2024-26647: Fix not seen in stream +CVE-2024-26648: Fix not seen in stream +CVE-2024-26650: Fix not seen in stream +CVE-2024-26651: Fix not seen in stream +CVE-2024-26654: Fix not seen in stream +CVE-2024-26655: Fix not seen in stream +CVE-2024-26656: Fix not seen in stream +CVE-2024-26658: Fix not seen in stream +CVE-2024-26659: Fix not seen in stream +CVE-2024-26664: Fix not seen in stream +CVE-2024-26671: Fix not seen in stream +CVE-2024-26672: Fix not seen in stream +CVE-2024-26675: Fix not seen in stream +CVE-2024-26676: Fix not seen in stream +CVE-2024-26677: Fix not seen in stream +CVE-2024-26686: Fix not seen in stream +CVE-2024-26687: Fix not seen in stream +CVE-2024-26689: Fix not seen in stream +CVE-2024-26691: Fix not seen in stream +CVE-2024-26697: Fix not seen in stream +CVE-2024-26699: Fix not seen in stream +CVE-2024-26700: Fix not seen in stream +CVE-2024-26706: Fix not seen in stream +CVE-2024-26713: Fix not seen in stream +CVE-2024-26719: Fix not seen in stream +CVE-2024-26726: Fix not seen in stream +CVE-2024-26733: Fix not seen in stream +CVE-2024-26738: Fix not seen in stream +CVE-2024-26739: Fix not seen in stream +CVE-2024-26743: Fix not seen in stream +CVE-2024-26745: Fix not seen in stream +CVE-2024-26748: Fix not seen in stream +CVE-2024-26752: Fix not seen in stream +CVE-2024-26756: Fix not seen in stream +CVE-2024-26758: Fix not seen in stream +CVE-2024-26759: Fix not seen in stream +CVE-2024-26763: Fix not seen in stream +CVE-2024-26764: Fix not seen in stream +CVE-2024-26765: Fix not seen in stream +CVE-2024-26766: Fix not seen in stream +CVE-2024-26767: Fix not seen in stream +CVE-2024-26768: Fix not seen in stream +CVE-2024-26769: Fix not seen in stream +CVE-2024-26770: Fix not seen in stream +CVE-2024-26771: Fix not seen in stream +CVE-2024-26772: Fix not seen in stream +CVE-2024-26773: Fix not seen in stream +CVE-2024-26774: Fix not seen in stream +CVE-2024-26775: Fix not seen in stream +CVE-2024-26776: Fix not seen in stream +CVE-2024-26777: Fix not seen in stream +CVE-2024-26778: Fix not seen in stream +CVE-2024-26779: Fix not seen in stream +CVE-2024-26784: Fix not seen in stream +CVE-2024-26789: Fix not seen in stream +CVE-2024-26791: Fix not seen in stream +CVE-2024-26793: Fix not seen in stream +CVE-2024-26797: Fix not seen in stream +CVE-2024-26798: Fix not seen in stream +CVE-2024-26802: Fix not seen in stream +CVE-2024-26803: Fix not seen in stream +CVE-2024-26804: Fix not seen in stream +CVE-2024-26806: Fix not seen in stream +CVE-2024-26808: Fix not seen in stream +CVE-2024-26809: Fix not seen in stream diff --git a/data/3.2/3.2_security.txt b/data/3.2/3.2_security.txt index 21a28ad96..3cc3b8d4b 100644 --- a/data/3.2/3.2_security.txt +++ b/data/3.2/3.2_security.txt @@ -985,6 +985,7 @@ Outstanding CVEs: CVE-2019-2181: (unk) binder: check for overflow when alloc for security context CVE-2019-2213: (unk) binder: fix possible UAF when freeing buffer CVE-2019-2215: (unk) ANDROID: binder: remove waitqueue when thread exits. + CVE-2019-25160: (unk) netlabel: fix out-of-bounds memory accesses CVE-2019-3459: (unk) Bluetooth: Verify that l2cap_get_conf_opt provides large enough buffer CVE-2019-3460: (unk) Bluetooth: Check L2CAP option sizes returned from l2cap_get_conf_opt CVE-2019-3701: (unk) can: gw: ensure DLC boundaries after CAN frame modification @@ -1118,6 +1119,9 @@ Outstanding CVEs: CVE-2020-36386: (unk) Bluetooth: Fix slab-out-of-bounds read in hci_extended_inquiry_result_evt() CVE-2020-36558: (unk) vt: vt_ioctl: fix race in VT_RESIZEX CVE-2020-36691: (unk) netlink: limit recursion depth in policy validation + CVE-2020-36775: (unk) f2fs: fix to avoid potential deadlock + CVE-2020-36780: (unk) i2c: sprd: fix reference leak when pm_runtime_get_sync fails + CVE-2020-36781: (unk) i2c: imx: fix reference leak when pm_runtime_get_sync fails CVE-2020-3702: (unk) ath: Use safer key clearing with key cache entries CVE-2020-4788: (unk) powerpc/64s: flush L1D on kernel entry CVE-2020-8647: (unk) vgacon: Fix a UAF in vgacon_invert_region @@ -1223,6 +1227,72 @@ Outstanding CVEs: CVE-2021-45095: (unk) phonet: refcount leak in pep_sock_accep CVE-2021-45485: (unk) ipv6: use prandom_u32() for ID generation CVE-2021-45868: (unk) quota: check block number when reading the block in quota file + CVE-2021-46904: (unk) net: hso: fix null-ptr-deref during tty device unregistration + CVE-2021-46906: (unk) HID: usbhid: fix info leak in hid_submit_ctrl + CVE-2021-46908: (unk) bpf: Use correct permission flag for mixed signed bounds arithmetic + CVE-2021-46926: (unk) ALSA: hda: intel-sdw-acpi: harden detection of controller + CVE-2021-46928: (unk) parisc: Clear stale IIR value on instruction access rights trap + CVE-2021-46932: (unk) Input: appletouch - initialize work before device registration + CVE-2021-46936: (unk) net: fix use-after-free in tw_timer_handler + CVE-2021-46939: (unk) tracing: Restructure trace_clock_global() to never block + CVE-2021-46950: (unk) md/raid1: properly indicate failure when ending a failed write request + CVE-2021-46951: (unk) tpm: efi: Use local variable for calculating final log size + CVE-2021-46952: (unk) NFS: fs_context: validate UDP retrans to prevent shift out-of-bounds + CVE-2021-46959: (unk) spi: Fix use-after-free with devm_spi_alloc_* + CVE-2021-46962: (unk) mmc: uniphier-sd: Fix a resource leak in the remove function + CVE-2021-46965: (unk) mtd: physmap: physmap-bt1-rom: Fix unintentional stack access + CVE-2021-46969: (unk) bus: mhi: core: Fix invalid error returning in mhi_queue + CVE-2021-46970: (unk) bus: mhi: pci_generic: Remove WQ_MEM_RECLAIM flag from state workqueue + CVE-2021-46982: (unk) f2fs: compress: fix race condition of overwrite vs truncate + CVE-2021-47028: (unk) mt76: mt7915: fix txrate reporting + CVE-2021-47046: (unk) drm/amd/display: Fix off by one in hdmi_14_process_transaction() + CVE-2021-47052: (unk) crypto: sa2ul - Fix memory leak of rxd + CVE-2021-47059: (unk) crypto: sun8i-ss - fix result memory leak on error path + CVE-2021-47065: (unk) rtw88: Fix array overrun in rtw_get_tx_power_params() + CVE-2021-47070: (unk) uio_hv_generic: Fix another memory leak in error handling paths + CVE-2021-47075: (unk) nvmet: fix memory leak in nvmet_alloc_ctrl() + CVE-2021-47076: (unk) RDMA/rxe: Return CQE error if invalid lkey was supplied + CVE-2021-47082: (unk) tun: avoid double free in tun_free_netdev + CVE-2021-47083: (unk) pinctrl: mediatek: fix global-out-of-bounds issue + CVE-2021-47101: (unk) asix: fix uninit-value in asix_mdio_read() + CVE-2021-47103: (unk) inet: fully convert sk->sk_rx_dst to RCU rules + CVE-2021-47110: (unk) x86/kvm: Disable kvmclock on all CPUs on shutdown + CVE-2021-47112: (unk) x86/kvm: Teardown PV features on boot CPU as well + CVE-2021-47113: (unk) btrfs: abort in rename_exchange if we fail to insert the second ref + CVE-2021-47114: (unk) ocfs2: fix data corruption by fallocate + CVE-2021-47116: (unk) ext4: fix memory leak in ext4_mb_init_backend on error path. + CVE-2021-47117: (unk) ext4: fix bug on in ext4_es_cache_extent as ext4_split_extent_at failed + CVE-2021-47118: (unk) pid: take a reference when initializing `cad_pid` + CVE-2021-47119: (unk) ext4: fix memory leak in ext4_fill_super + CVE-2021-47124: (unk) io_uring: fix link timeout refs + CVE-2021-47125: (unk) sch_htb: fix refcount leak in htb_parent_to_leaf_offload + CVE-2021-47128: (unk) bpf, lockdown, audit: Fix buggy SELinux lockdown permission checks + CVE-2021-47131: (unk) net/tls: Fix use-after-free after the TLS device goes down and up + CVE-2021-47133: (unk) HID: amd_sfh: Fix memory leak in amd_sfh_work + CVE-2021-47135: (unk) mt76: mt7921: fix possible AOOB issue in mt7921_mcu_tx_rate_report + CVE-2021-47136: (unk) net: zero-initialize tc skb extension on allocation + CVE-2021-47137: (unk) net: lantiq: fix memory corruption in RX ring + CVE-2021-47140: (unk) iommu/amd: Clear DMA ops when switching domain + CVE-2021-47142: (unk) drm/amdgpu: Fix a use-after-free + CVE-2021-47143: (unk) net/smc: remove device from smcd_dev_list after failed device_add() + CVE-2021-47144: (unk) drm/amd/amdgpu: fix refcount leak + CVE-2021-47145: (unk) btrfs: do not BUG_ON in link_to_fixup_dir + CVE-2021-47146: (unk) mld: fix panic in mld_newpack() + CVE-2021-47147: (unk) ptp: ocp: Fix a resource leak in an error handling path + CVE-2021-47149: (unk) net: fujitsu: fix potential null-ptr-deref + CVE-2021-47151: (unk) interconnect: qcom: bcm-voter: add a missing of_node_put() + CVE-2021-47158: (unk) net: dsa: sja1105: add error handling in sja1105_setup() + CVE-2021-47160: (unk) net: dsa: mt7530: fix VLAN traffic leaks + CVE-2021-47165: (unk) drm/meson: fix shutdown crash when component not probed + CVE-2021-47168: (unk) NFS: fix an incorrect limit in filelayout_decode_layout() + CVE-2021-47169: (unk) serial: rp2: use 'request_firmware' instead of 'request_firmware_nowait' + CVE-2021-47170: (unk) USB: usbfs: Don't WARN about excessively large memory allocations + CVE-2021-47171: (unk) net: usb: fix memory leak in smsc75xx_bind + CVE-2021-47172: (unk) iio: adc: ad7124: Fix potential overflow due to non sequential channel numbers + CVE-2021-47173: (unk) misc/uss720: fix memory leak in uss720_probe + CVE-2021-47175: (unk) net/sched: fq_pie: fix OOB access in the traffic path + CVE-2021-47179: (unk) NFSv4: Fix a NULL pointer dereference in pnfs_mark_matching_lsegs_return() + CVE-2021-47180: (unk) NFC: nci: fix memory leak in nci_allocate_device CVE-2022-0001: (unk) x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE CVE-2022-0002: (unk) x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE CVE-2022-0168: (unk) cifs: fix NULL ptr dereference in smb2_ioctl_query_info() @@ -1360,6 +1430,8 @@ Outstanding CVEs: CVE-2022-4662: (unk) USB: core: Prevent nested device-reset calls CVE-2022-4744: (unk) tun: avoid double free in tun_free_netdev CVE-2022-48619: (unk) Input: add bounds checking to input_set_capability() + CVE-2022-48626: (unk) moxart: fix potential use-after-free on remove path + CVE-2022-48628: (unk) ceph: drop messages from MDS when unmounting CVE-2023-0030: (unk) drm/nouveau/mmu: add more general vmm free/node handling functions CVE-2023-0047: (unk) mm, oom: do not trigger out_of_memory from the #PF CVE-2023-0266: (unk) ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF @@ -1397,6 +1469,7 @@ Outstanding CVEs: CVE-2023-2513: (unk) ext4: fix use-after-free in ext4_xattr_set_entry CVE-2023-26607: (unk) ntfs: fix out-of-bounds read in ntfs_attr_find() CVE-2023-28328: (unk) media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer() + CVE-2023-28746: (unk) x86/mmio: Disable KVM mitigation when X86_FEATURE_CLEAR_CPU_BUF is set CVE-2023-28772: (unk) seq_buf: Fix overflow in seq_buf_putmem_hex() CVE-2023-2985: (unk) fs: hfsplus: fix UAF issue in hfsplus_put_super CVE-2023-3006: (unk) arm64: Add AMPERE1 to the Spectre-BHB affected list @@ -1450,20 +1523,98 @@ Outstanding CVEs: CVE-2023-52340: (unk) ipv6: remove max_size check inline with ipv4 CVE-2023-52429: (unk) dm: limit the number of targets and parameter size area CVE-2023-52434: (unk) smb: client: fix potential OOBs in smb2_parse_contexts() - CVE-2023-52435: (unk) net: prevent mss overflow in skb_segment() CVE-2023-52436: (unk) f2fs: explicitly null-terminate the xattr list CVE-2023-52442: (unk) ksmbd: validate session id and tree id in compound request CVE-2023-52445: (unk) media: pvrusb2: fix use after free on context disconnection CVE-2023-52449: (unk) mtd: Fix gluebi NULL pointer dereference caused by ftl notifier - CVE-2023-52456: (unk) serial: imx: fix tx statemachine deadlock - CVE-2023-52457: (unk) serial: 8250: omap: Don't skip resource freeing if pm_runtime_resume_and_get() failed CVE-2023-52458: (unk) block: add check that partition length needs to be aligned with block size + CVE-2023-52475: (unk) Input: powermate - fix use-after-free in powermate_config_complete + CVE-2023-52476: (unk) perf/x86/lbr: Filter vsyscall addresses + CVE-2023-52477: (unk) usb: hub: Guard against accesses to uninitialized BOS descriptors + CVE-2023-52478: (unk) HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect + CVE-2023-52479: (unk) ksmbd: fix uaf in smb20_oplock_break_ack + CVE-2023-52480: (unk) ksmbd: fix race condition between session lookup and expire + CVE-2023-52481: (unk) arm64: errata: Add Cortex-A520 speculative unprivileged load workaround + CVE-2023-52482: (unk) x86/srso: Add SRSO mitigation for Hygon processors + CVE-2023-52484: (unk) iommu/arm-smmu-v3: Fix soft lockup triggered by arm_smmu_mm_invalidate_range + CVE-2023-52485: (unk) drm/amd/display: Wake DMCUB before sending a command + CVE-2023-52486: (unk) drm: Don't unref the same fb many times by mistake due to deadlock handling + CVE-2023-52489: (unk) mm/sparsemem: fix race in accessing memory_section->usage + CVE-2023-52498: (unk) PM: sleep: Fix possible deadlocks in core system-wide PM code + CVE-2023-52500: (unk) scsi: pm80xx: Avoid leaking tags when processing OPC_INB_SET_CONTROLLER_CONFIG command + CVE-2023-52501: (unk) ring-buffer: Do not attempt to read past "commit" + CVE-2023-52506: (unk) LoongArch: Set all reserved memblocks on Node#0 at initialization + CVE-2023-52507: (unk) nfc: nci: assert requested protocol is valid + CVE-2023-52508: (unk) nvme-fc: Prevent null pointer dereference in nvme_fc_io_getuuid() + CVE-2023-52509: (unk) ravb: Fix use-after-free issue in ravb_tx_timeout_work() + CVE-2023-52511: (unk) spi: sun6i: reduce DMA RX transfer width to single byte + CVE-2023-52516: (unk) dma-debug: don't call __dma_entry_alloc_check_leak() under free_entries_lock + CVE-2023-52517: (unk) spi: sun6i: fix race between DMA RX transfer completion and RX FIFO drain + CVE-2023-52519: (unk) HID: intel-ish-hid: ipc: Disable and reenable ACPI GPE bit + CVE-2023-52522: (unk) net: fix possible store tearing in neigh_periodic_work() + CVE-2023-52528: (unk) net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg + CVE-2023-52532: (unk) net: mana: Fix TX CQE error handling + CVE-2023-52559: (unk) iommu/vt-d: Avoid memory allocation in iommu_suspend() + CVE-2023-52561: (unk) arm64: dts: qcom: sdm845-db845c: Mark cont splash memory region as reserved + CVE-2023-52563: (unk) drm/meson: fix memory leak on ->hpd_notify callback + CVE-2023-52565: (unk) media: uvcvideo: Fix OOB read + CVE-2023-52566: (unk) nilfs2: fix potential use after free in nilfs_gccache_submit_read_data() + CVE-2023-52568: (unk) x86/sgx: Resolves SECS reclaim vs. page fault for EAUG race + CVE-2023-52569: (unk) btrfs: remove BUG() after failure to insert delayed dir index item + CVE-2023-52571: (unk) power: supply: rk817: Fix node refcount leak + CVE-2023-52572: (unk) cifs: Fix UAF in cifs_demultiplex_thread() + CVE-2023-52574: (unk) team: fix null-ptr-deref when team device type is changed + CVE-2023-52578: (unk) net: bridge: use DEV_STATS_INC() + CVE-2023-52583: (unk) ceph: fix deadlock or deadcode of misusing dget() + CVE-2023-52584: (unk) spmi: mediatek: Fix UAF on device remove + CVE-2023-52585: (unk) drm/amdgpu: Fix possible NULL dereference in amdgpu_ras_query_error_status_helper() + CVE-2023-52586: (unk) drm/msm/dpu: Add mutex lock in control vblank irq + CVE-2023-52587: (unk) IB/ipoib: Fix mcast list locking + CVE-2023-52588: (unk) f2fs: fix to tag gcing flag on page during block migration + CVE-2023-52589: (unk) media: rkisp1: Fix IRQ disable race issue + CVE-2023-52590: (unk) ocfs2: Avoid touching renamed directory if parent does not change + CVE-2023-52591: (unk) reiserfs: Avoid touching renamed directory if parent does not change + CVE-2023-52593: (unk) wifi: wfx: fix possible NULL pointer dereference in wfx_set_mfp_ap() + CVE-2023-52594: (unk) wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus() + CVE-2023-52595: (unk) wifi: rt2x00: restart beacon queue when hardware reset + CVE-2023-52596: (unk) sysctl: Fix out of bounds access for empty sysctl registers + CVE-2023-52597: (unk) KVM: s390: fix setting of fpc register + CVE-2023-52598: (unk) s390/ptrace: handle setting of fpc register correctly + CVE-2023-52599: (unk) jfs: fix array-index-out-of-bounds in diNewExt + CVE-2023-52600: (unk) jfs: fix uaf in jfs_evict_inode + CVE-2023-52601: (unk) jfs: fix array-index-out-of-bounds in dbAdjTree + CVE-2023-52602: (unk) jfs: fix slab-out-of-bounds Read in dtSearch + CVE-2023-52603: (unk) UBSAN: array-index-out-of-bounds in dtSplitRoot + CVE-2023-52604: (unk) FS:JFS:UBSAN:array-index-out-of-bounds in dbAdjTree + CVE-2023-52606: (unk) powerpc/lib: Validate size for vector operations + CVE-2023-52607: (unk) powerpc/mm: Fix null-pointer dereference in pgtable_cache_add + CVE-2023-52609: (unk) binder: fix race between mmput() and do_exit() + CVE-2023-52614: (unk) PM / devfreq: Fix buffer overflow in trans_stat_show + CVE-2023-52615: (unk) hwrng: core - Fix page fault dead lock on mmap-ed hwrng + CVE-2023-52617: (unk) PCI: switchtec: Fix stdev_release() crash after surprise hot remove + CVE-2023-52618: (unk) block/rnbd-srv: Check for unlikely string overflow + CVE-2023-52619: (unk) pstore/ram: Fix crash when setting number of cpus to an odd number + CVE-2023-52620: (unk) netfilter: nf_tables: disallow timeout for anonymous sets + CVE-2023-52621: (unk) bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers + CVE-2023-52622: (unk) ext4: avoid online resizing failures due to oversized flex bg + CVE-2023-52623: (unk) SUNRPC: Fix a suspicious RCU usage warning + CVE-2023-52624: (unk) drm/amd/display: Wake DMCUB before executing GPINT commands + CVE-2023-52625: (unk) drm/amd/display: Refactor DMCUB enter/exit idle interface + CVE-2023-52629: (unk) sh: push-switch: Reorder cleanup operations to avoid use-after-free bug + CVE-2023-52632: (unk) drm/amdkfd: Fix lock dependency warning with srcu + CVE-2023-52633: (unk) um: time-travel: fix time corruption + CVE-2023-52634: (unk) drm/amd/display: Fix disable_otg_wa logic + CVE-2023-52635: (unk) PM / devfreq: Synchronize devfreq_monitor_[start/stop] + CVE-2023-52638: (unk) can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock + CVE-2023-52639: (unk) KVM: s390: vsie: fix race during shadow creation + CVE-2023-52640: (unk) fs/ntfs3: Fix oob in ntfs_listxattr + CVE-2023-52641: (unk) fs/ntfs3: Add NULL ptr dereference checking at the end of attr_allocate_frame() CVE-2023-6040: (unk) netfilter: nf_tables: Reject tables of unsupported family CVE-2023-6240: (unk) - CVE-2023-6270: (unk) - CVE-2023-6356: (unk) + CVE-2023-6270: (unk) aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts + CVE-2023-6356: (unk) nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length CVE-2023-6535: (unk) - CVE-2023-6536: (unk) + CVE-2023-6536: (unk) nvmet-tcp: fix a crash in nvmet_req_complete() CVE-2023-6546: (unk) tty: n_gsm: fix the UAF caused by race condition in gsm_cleanup_mux CVE-2023-6606: (unk) smb: client: fix OOB in smbCalcSize() CVE-2023-6610: (unk) smb: client: fix potential OOB in smb2_dump_detail() @@ -1473,23 +1624,95 @@ Outstanding CVEs: CVE-2024-0584: (unk) ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet CVE-2024-1312: (unk) mm: lock_vma_under_rcu() must check vma->anon_vma under vma lock CVE-2024-21803: (unk) - CVE-2024-22099: (unk) + CVE-2024-2193: (unk) + CVE-2024-22099: (unk) Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security CVE-2024-22386: (unk) - CVE-2024-23196: (unk) + CVE-2024-23196: (unk) ALSA: hda: fix a possible null-pointer dereference due to data race in snd_hdac_regmap_sync() CVE-2024-23848: (unk) CVE-2024-23851: (unk) dm: limit the number of targets and parameter size area CVE-2024-24855: (unk) scsi: lpfc: Fix a possible data race in lpfc_unregister_fcf_rescan() CVE-2024-24859: (unk) - CVE-2024-24861: (unk) + CVE-2024-24861: (unk) media: xc4000: Fix atomicity violation in xc4000_get_frequency CVE-2024-24864: (unk) CVE-2024-25739: (unk) CVE-2024-25740: (unk) CVE-2024-25741: (unk) CVE-2024-25744: (unk) x86/coco: Disable 32-bit emulation by default on TDX and SEV - CVE-2024-26584: (unk) net: tls: handle backlogging of crypto requests - CVE-2024-26587: (unk) net: netdevsim: don't try to destroy PHC on VFs - CVE-2024-26588: (unk) LoongArch: BPF: Prevent out-of-bounds memory access - CVE-2024-26591: (unk) bpf: Fix re-attachment branch in bpf_tracing_prog_attach CVE-2024-26592: (unk) ksmbd: fix UAF issue in ksmbd_tcp_new_connection() CVE-2024-26594: (unk) ksmbd: validate mech token in session setup CVE-2024-26598: (unk) KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache + CVE-2024-26606: (unk) binder: signal epoll threads of self-work + CVE-2024-26622: (unk) tomoyo: fix UAF write bug in tomoyo_write_control() + CVE-2024-26623: (unk) pds_core: Prevent race issues involving the adminq + CVE-2024-26625: (unk) llc: call sock_orphan() at release time + CVE-2024-26627: (unk) scsi: core: Move scsi_host_busy() out of host lock for waking up EH handler + CVE-2024-26633: (unk) ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim() + CVE-2024-26635: (unk) llc: Drop support for ETH_P_TR_802_2. + CVE-2024-26636: (unk) llc: make llc_ui_sendmsg() more robust against bonding changes + CVE-2024-26644: (unk) btrfs: don't abort filesystem when attempting to snapshot deleted subvolume + CVE-2024-26646: (unk) thermal: intel: hfi: Add syscore callbacks for system-wide PM + CVE-2024-26647: (unk) drm/amd/display: Fix late derefrence 'dsc' check in 'link_set_dsc_pps_packet()' + CVE-2024-26648: (unk) drm/amd/display: Fix variable deferencing before NULL check in edp_setup_replay() + CVE-2024-26650: (unk) platform/x86: p2sb: Allow p2sb_bar() calls during PCI device probe + CVE-2024-26651: (unk) sr9800: Add check for usbnet_get_endpoints + CVE-2024-26654: (unk) ALSA: sh: aica: reorder cleanup operations to avoid UAF bugs + CVE-2024-26655: (unk) Fix memory leak in posix_clock_open() + CVE-2024-26656: (unk) drm/amdgpu: fix use-after-free bug + CVE-2024-26658: (unk) bcachefs: grab s_umount only if snapshotting + CVE-2024-26659: (unk) xhci: handle isoc Babble and Buffer Overrun events properly + CVE-2024-26664: (unk) hwmon: (coretemp) Fix out-of-bounds memory access + CVE-2024-26671: (unk) blk-mq: fix IO hang from sbitmap wakeup race + CVE-2024-26672: (unk) drm/amdgpu: Fix variable 'mca_funcs' dereferenced before NULL check in 'amdgpu_mca_smu_get_mca_entry()' + CVE-2024-26675: (unk) ppp_async: limit MRU to 64K + CVE-2024-26676: (unk) af_unix: Call kfree_skb() for dead unix_(sk)->oob_skb in GC. + CVE-2024-26677: (unk) rxrpc: Fix delayed ACKs to not set the reference serial number + CVE-2024-26686: (unk) fs/proc: do_task_stat: use sig->stats_lock to gather the threads/children stats + CVE-2024-26687: (unk) xen/events: close evtchn after mapping cleanup + CVE-2024-26689: (unk) ceph: prevent use-after-free in encode_cap_msg() + CVE-2024-26691: (unk) KVM: arm64: Fix circular locking dependency + CVE-2024-26697: (unk) nilfs2: fix data corruption in dsync block recovery for small block sizes + CVE-2024-26699: (unk) drm/amd/display: Fix array-index-out-of-bounds in dcn35_clkmgr + CVE-2024-26700: (unk) drm/amd/display: Fix MST Null Ptr for RV + CVE-2024-26706: (unk) parisc: Fix random data corruption from exception handler + CVE-2024-26713: (unk) powerpc/pseries/iommu: Fix iommu initialisation during DLPAR add + CVE-2024-26719: (unk) nouveau: offload fence uevents work to workqueue + CVE-2024-26726: (unk) btrfs: don't drop extent_map for free space inode on write error + CVE-2024-26733: (unk) arp: Prevent overflow in arp_req_get(). + CVE-2024-26738: (unk) powerpc/pseries/iommu: DLPAR add doesn't completely initialize pci_controller + CVE-2024-26739: (unk) net/sched: act_mirred: don't override retval if we already lost the skb + CVE-2024-26743: (unk) RDMA/qedr: Fix qedr_create_user_qp error flow + CVE-2024-26745: (unk) powerpc/pseries/iommu: IOMMU table is not initialized for kdump over SR-IOV + CVE-2024-26748: (unk) usb: cdns3: fix memory double free when handle zero packet + CVE-2024-26752: (unk) l2tp: pass correct message length to ip6_append_data + CVE-2024-26756: (unk) md: Don't register sync_thread for reshape directly + CVE-2024-26758: (unk) md: Don't ignore suspended array in md_check_recovery() + CVE-2024-26759: (unk) mm/swap: fix race when skipping swapcache + CVE-2024-26763: (unk) dm-crypt: don't modify the data when using authenticated encryption + CVE-2024-26764: (unk) fs/aio: Restrict kiocb_set_cancel_fn() to I/O submitted via libaio + CVE-2024-26765: (unk) LoongArch: Disable IRQ before init_fn() for nonboot CPUs + CVE-2024-26766: (unk) IB/hfi1: Fix sdma.h tx->num_descs off-by-one error + CVE-2024-26767: (unk) drm/amd/display: fixed integer types and null check locations + CVE-2024-26768: (unk) LoongArch: Change acpi_core_pic[NR_CPUS] to acpi_core_pic[MAX_CORE_PIC] + CVE-2024-26769: (unk) nvmet-fc: avoid deadlock on delete association path + CVE-2024-26770: (unk) HID: nvidia-shield: Add missing null pointer checks to LED initialization + CVE-2024-26771: (unk) dmaengine: ti: edma: Add some null pointer checks to the edma_probe + CVE-2024-26772: (unk) ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal() + CVE-2024-26773: (unk) ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found() + CVE-2024-26774: (unk) ext4: avoid dividing by 0 in mb_update_avg_fragment_size() when block bitmap corrupt + CVE-2024-26775: (unk) aoe: avoid potential deadlock at set_capacity + CVE-2024-26776: (unk) spi: hisi-sfc-v3xx: Return IRQ_NONE if no interrupts were detected + CVE-2024-26777: (unk) fbdev: sis: Error out if pixclock equals zero + CVE-2024-26778: (unk) fbdev: savage: Error out if pixclock equals zero + CVE-2024-26779: (unk) wifi: mac80211: fix race condition on enabling fast-xmit + CVE-2024-26784: (unk) pmdomain: arm: Fix NULL dereference on scmi_perf_domain removal + CVE-2024-26789: (unk) crypto: arm64/neonbs - fix out-of-bounds access on short input + CVE-2024-26791: (unk) btrfs: dev-replace: properly validate device names + CVE-2024-26793: (unk) gtp: fix use-after-free and null-ptr-deref in gtp_newlink() + CVE-2024-26797: (unk) drm/amd/display: Prevent potential buffer overflow in map_hw_resources + CVE-2024-26798: (unk) fbcon: always restore the old font data in fbcon_do_set_font() + CVE-2024-26802: (unk) stmmac: Clear variable when destroying workqueue + CVE-2024-26803: (unk) net: veth: clear GRO when clearing XDP even when down + CVE-2024-26804: (unk) net: ip_tunnel: prevent perpetual headroom growth + CVE-2024-26806: (unk) spi: cadence-qspi: remove system-wide suspend helper calls from runtime PM hooks + CVE-2024-26808: (unk) netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain + CVE-2024-26809: (unk) netfilter: nft_set_pipapo: release elements in clone only from destroy path diff --git a/data/4.1/4.1_CVEs.txt b/data/4.1/4.1_CVEs.txt index b68f420be..4ab618f6b 100644 --- a/data/4.1/4.1_CVEs.txt +++ b/data/4.1/4.1_CVEs.txt @@ -672,6 +672,7 @@ CVE-2019-2101: Fix not seen in stream CVE-2019-2181: Fix not seen in stream CVE-2019-2213: Fix not seen in stream CVE-2019-2215: Fix not seen in stream +CVE-2019-25160: Fix not seen in stream CVE-2019-3459: Fix not seen in stream CVE-2019-3460: Fix not seen in stream CVE-2019-3701: Fix not seen in stream @@ -838,6 +839,9 @@ CVE-2020-36516: Fix not seen in stream CVE-2020-36557: Fix not seen in stream CVE-2020-36558: Fix not seen in stream CVE-2020-36691: Fix not seen in stream +CVE-2020-36775: Fix not seen in stream +CVE-2020-36780: Fix not seen in stream +CVE-2020-36781: Fix not seen in stream CVE-2020-3702: Fix not seen in stream CVE-2020-4788: Fix not seen in stream CVE-2020-8647: Fix not seen in stream @@ -970,6 +974,82 @@ CVE-2021-45469: Fix not seen in stream CVE-2021-45485: Fix not seen in stream CVE-2021-45486: Fix not seen in stream CVE-2021-45868: Fix not seen in stream +CVE-2021-46904: Fix not seen in stream +CVE-2021-46906: Fix not seen in stream +CVE-2021-46908: Fix not seen in stream +CVE-2021-46924: Fix not seen in stream +CVE-2021-46926: Fix not seen in stream +CVE-2021-46928: Fix not seen in stream +CVE-2021-46932: Fix not seen in stream +CVE-2021-46933: Fix not seen in stream +CVE-2021-46936: Fix not seen in stream +CVE-2021-46939: Fix not seen in stream +CVE-2021-46950: Fix not seen in stream +CVE-2021-46951: Fix not seen in stream +CVE-2021-46952: Fix not seen in stream +CVE-2021-46959: Fix not seen in stream +CVE-2021-46962: Fix not seen in stream +CVE-2021-46965: Fix not seen in stream +CVE-2021-46969: Fix not seen in stream +CVE-2021-46970: Fix not seen in stream +CVE-2021-46982: Fix not seen in stream +CVE-2021-47028: Fix not seen in stream +CVE-2021-47046: Fix not seen in stream +CVE-2021-47052: Fix not seen in stream +CVE-2021-47059: Fix not seen in stream +CVE-2021-47065: Fix not seen in stream +CVE-2021-47070: Fix not seen in stream +CVE-2021-47075: Fix not seen in stream +CVE-2021-47076: Fix not seen in stream +CVE-2021-47082: Fix not seen in stream +CVE-2021-47083: Fix not seen in stream +CVE-2021-47086: Fix not seen in stream +CVE-2021-47101: Fix not seen in stream +CVE-2021-47103: Fix not seen in stream +CVE-2021-47110: Fix not seen in stream +CVE-2021-47112: Fix not seen in stream +CVE-2021-47113: Fix not seen in stream +CVE-2021-47114: Fix not seen in stream +CVE-2021-47116: Fix not seen in stream +CVE-2021-47117: Fix not seen in stream +CVE-2021-47118: Fix not seen in stream +CVE-2021-47119: Fix not seen in stream +CVE-2021-47121: Fix not seen in stream +CVE-2021-47122: Fix not seen in stream +CVE-2021-47124: Fix not seen in stream +CVE-2021-47125: Fix not seen in stream +CVE-2021-47128: Fix not seen in stream +CVE-2021-47131: Fix not seen in stream +CVE-2021-47133: Fix not seen in stream +CVE-2021-47135: Fix not seen in stream +CVE-2021-47136: Fix not seen in stream +CVE-2021-47137: Fix not seen in stream +CVE-2021-47140: Fix not seen in stream +CVE-2021-47142: Fix not seen in stream +CVE-2021-47143: Fix not seen in stream +CVE-2021-47144: Fix not seen in stream +CVE-2021-47145: Fix not seen in stream +CVE-2021-47146: Fix not seen in stream +CVE-2021-47147: Fix not seen in stream +CVE-2021-47149: Fix not seen in stream +CVE-2021-47150: Fix not seen in stream +CVE-2021-47151: Fix not seen in stream +CVE-2021-47153: Fix not seen in stream +CVE-2021-47158: Fix not seen in stream +CVE-2021-47160: Fix not seen in stream +CVE-2021-47163: Fix not seen in stream +CVE-2021-47165: Fix not seen in stream +CVE-2021-47166: Fix not seen in stream +CVE-2021-47167: Fix not seen in stream +CVE-2021-47168: Fix not seen in stream +CVE-2021-47169: Fix not seen in stream +CVE-2021-47170: Fix not seen in stream +CVE-2021-47171: Fix not seen in stream +CVE-2021-47172: Fix not seen in stream +CVE-2021-47173: Fix not seen in stream +CVE-2021-47175: Fix not seen in stream +CVE-2021-47179: Fix not seen in stream +CVE-2021-47180: Fix not seen in stream CVE-2022-0001: Fix not seen in stream CVE-2022-0002: Fix not seen in stream CVE-2022-0168: Fix not seen in stream @@ -1136,6 +1216,9 @@ CVE-2022-45934: Fix not seen in stream CVE-2022-4662: Fix not seen in stream CVE-2022-4744: Fix not seen in stream CVE-2022-48619: Fix not seen in stream +CVE-2022-48626: Fix not seen in stream +CVE-2022-48627: Fix not seen in stream +CVE-2022-48628: Fix not seen in stream CVE-2023-0030: Fix not seen in stream CVE-2023-0047: Fix not seen in stream CVE-2023-0266: Fix not seen in stream @@ -1182,6 +1265,7 @@ CVE-2023-2513: Fix not seen in stream CVE-2023-26545: Fix not seen in stream CVE-2023-26607: Fix not seen in stream CVE-2023-28328: Fix not seen in stream +CVE-2023-28746: Fix not seen in stream CVE-2023-28772: Fix not seen in stream CVE-2023-2985: Fix not seen in stream CVE-2023-3006: Fix not seen in stream @@ -1243,7 +1327,7 @@ CVE-2023-45871: Fix not seen in stream CVE-2023-4623: Fix not seen in stream CVE-2023-46343: Fix not seen in stream CVE-2023-46838: Fix not seen in stream -CVE-2023-47233: Fix unknown +CVE-2023-47233: Fix not seen in stream CVE-2023-4881: Fix not seen in stream CVE-2023-4921: Fix not seen in stream CVE-2023-51043: Fix not seen in stream @@ -1255,27 +1339,112 @@ CVE-2023-51782: Fix not seen in stream CVE-2023-52340: Fix not seen in stream CVE-2023-52429: Fix not seen in stream CVE-2023-52434: Fix not seen in stream -CVE-2023-52435: Fix not seen in stream CVE-2023-52436: Fix not seen in stream CVE-2023-52442: Fix not seen in stream CVE-2023-52445: Fix not seen in stream CVE-2023-52449: Fix not seen in stream CVE-2023-52451: Fix not seen in stream -CVE-2023-52456: Fix not seen in stream -CVE-2023-52457: Fix not seen in stream CVE-2023-52458: Fix not seen in stream +CVE-2023-52470: Fix not seen in stream +CVE-2023-52475: Fix not seen in stream +CVE-2023-52476: Fix not seen in stream +CVE-2023-52477: Fix not seen in stream +CVE-2023-52478: Fix not seen in stream +CVE-2023-52479: Fix not seen in stream +CVE-2023-52480: Fix not seen in stream +CVE-2023-52481: Fix not seen in stream +CVE-2023-52482: Fix not seen in stream +CVE-2023-52484: Fix not seen in stream +CVE-2023-52485: Fix not seen in stream +CVE-2023-52486: Fix not seen in stream +CVE-2023-52488: Fix not seen in stream +CVE-2023-52489: Fix not seen in stream +CVE-2023-52498: Fix not seen in stream +CVE-2023-52500: Fix not seen in stream +CVE-2023-52501: Fix not seen in stream +CVE-2023-52502: Fix not seen in stream +CVE-2023-52506: Fix not seen in stream +CVE-2023-52507: Fix not seen in stream +CVE-2023-52508: Fix not seen in stream +CVE-2023-52509: Fix not seen in stream +CVE-2023-52511: Fix not seen in stream +CVE-2023-52515: Fix not seen in stream +CVE-2023-52516: Fix not seen in stream +CVE-2023-52517: Fix not seen in stream +CVE-2023-52519: Fix not seen in stream +CVE-2023-52522: Fix not seen in stream +CVE-2023-52527: Fix not seen in stream +CVE-2023-52528: Fix not seen in stream +CVE-2023-52531: Fix not seen in stream +CVE-2023-52532: Fix not seen in stream +CVE-2023-52559: Fix not seen in stream +CVE-2023-52561: Fix not seen in stream +CVE-2023-52563: Fix not seen in stream +CVE-2023-52565: Fix not seen in stream +CVE-2023-52566: Fix not seen in stream +CVE-2023-52568: Fix not seen in stream +CVE-2023-52569: Fix not seen in stream +CVE-2023-52571: Fix not seen in stream +CVE-2023-52572: Fix not seen in stream +CVE-2023-52574: Fix not seen in stream +CVE-2023-52578: Fix not seen in stream +CVE-2023-52583: Fix not seen in stream +CVE-2023-52584: Fix not seen in stream +CVE-2023-52585: Fix not seen in stream +CVE-2023-52586: Fix not seen in stream +CVE-2023-52587: Fix not seen in stream +CVE-2023-52588: Fix not seen in stream +CVE-2023-52589: Fix not seen in stream +CVE-2023-52590: Fix not seen in stream +CVE-2023-52591: Fix not seen in stream +CVE-2023-52593: Fix not seen in stream +CVE-2023-52594: Fix not seen in stream +CVE-2023-52595: Fix not seen in stream +CVE-2023-52596: Fix not seen in stream +CVE-2023-52597: Fix not seen in stream +CVE-2023-52598: Fix not seen in stream +CVE-2023-52599: Fix not seen in stream +CVE-2023-52600: Fix not seen in stream +CVE-2023-52601: Fix not seen in stream +CVE-2023-52602: Fix not seen in stream +CVE-2023-52603: Fix not seen in stream +CVE-2023-52604: Fix not seen in stream +CVE-2023-52606: Fix not seen in stream +CVE-2023-52607: Fix not seen in stream +CVE-2023-52609: Fix not seen in stream +CVE-2023-52614: Fix not seen in stream +CVE-2023-52615: Fix not seen in stream +CVE-2023-52617: Fix not seen in stream +CVE-2023-52618: Fix not seen in stream +CVE-2023-52619: Fix not seen in stream +CVE-2023-52620: Fix not seen in stream +CVE-2023-52621: Fix not seen in stream +CVE-2023-52622: Fix not seen in stream +CVE-2023-52623: Fix not seen in stream +CVE-2023-52624: Fix not seen in stream +CVE-2023-52625: Fix not seen in stream +CVE-2023-52628: Fix not seen in stream +CVE-2023-52629: Fix not seen in stream +CVE-2023-52632: Fix not seen in stream +CVE-2023-52633: Fix not seen in stream +CVE-2023-52634: Fix not seen in stream +CVE-2023-52635: Fix not seen in stream +CVE-2023-52638: Fix not seen in stream +CVE-2023-52639: Fix not seen in stream +CVE-2023-52640: Fix not seen in stream +CVE-2023-52641: Fix not seen in stream CVE-2023-6040: Fix not seen in stream CVE-2023-6240: Fix unknown -CVE-2023-6270: Fix unknown -CVE-2023-6356: Fix unknown +CVE-2023-6270: Fix not seen in stream +CVE-2023-6356: Fix not seen in stream CVE-2023-6535: Fix unknown -CVE-2023-6536: Fix unknown +CVE-2023-6536: Fix not seen in stream CVE-2023-6546: Fix not seen in stream CVE-2023-6606: Fix not seen in stream CVE-2023-6610: Fix not seen in stream CVE-2023-6915: Fix not seen in stream CVE-2023-6932: Fix not seen in stream -CVE-2023-7042: Fix unknown +CVE-2023-7042: Fix not seen in stream CVE-2023-7192: Fix not seen in stream CVE-2024-0340: Fix not seen in stream CVE-2024-0584: Fix not seen in stream @@ -1283,26 +1452,107 @@ CVE-2024-0775: Fix not seen in stream CVE-2024-1086: Fix not seen in stream CVE-2024-1312: Fix not seen in stream CVE-2024-21803: Fix unknown -CVE-2024-22099: Fix unknown +CVE-2024-2193: Fix unknown +CVE-2024-22099: Fix not seen in stream CVE-2024-22386: Fix unknown -CVE-2024-23196: Fix unknown -CVE-2024-23307: Fix unknown +CVE-2024-23196: Fix not seen in stream +CVE-2024-23307: Fix not seen in stream CVE-2024-23848: Fix unknown CVE-2024-23851: Fix not seen in stream CVE-2024-24855: Fix not seen in stream CVE-2024-24857: Fix unknown CVE-2024-24858: Fix unknown CVE-2024-24859: Fix unknown -CVE-2024-24861: Fix unknown +CVE-2024-24861: Fix not seen in stream CVE-2024-24864: Fix unknown CVE-2024-25739: Fix unknown CVE-2024-25740: Fix unknown CVE-2024-25741: Fix unknown CVE-2024-25744: Fix not seen in stream -CVE-2024-26584: Fix not seen in stream -CVE-2024-26587: Fix not seen in stream -CVE-2024-26588: Fix not seen in stream -CVE-2024-26591: Fix not seen in stream CVE-2024-26592: Fix not seen in stream CVE-2024-26594: Fix not seen in stream CVE-2024-26598: Fix not seen in stream +CVE-2024-26600: Fix not seen in stream +CVE-2024-26606: Fix not seen in stream +CVE-2024-26622: Fix not seen in stream +CVE-2024-26623: Fix not seen in stream +CVE-2024-26625: Fix not seen in stream +CVE-2024-26627: Fix not seen in stream +CVE-2024-26633: Fix not seen in stream +CVE-2024-26635: Fix not seen in stream +CVE-2024-26636: Fix not seen in stream +CVE-2024-26642: Fix not seen in stream +CVE-2024-26644: Fix not seen in stream +CVE-2024-26646: Fix not seen in stream +CVE-2024-26647: Fix not seen in stream +CVE-2024-26648: Fix not seen in stream +CVE-2024-26650: Fix not seen in stream +CVE-2024-26651: Fix not seen in stream +CVE-2024-26654: Fix not seen in stream +CVE-2024-26655: Fix not seen in stream +CVE-2024-26656: Fix not seen in stream +CVE-2024-26658: Fix not seen in stream +CVE-2024-26659: Fix not seen in stream +CVE-2024-26664: Fix not seen in stream +CVE-2024-26671: Fix not seen in stream +CVE-2024-26672: Fix not seen in stream +CVE-2024-26675: Fix not seen in stream +CVE-2024-26676: Fix not seen in stream +CVE-2024-26677: Fix not seen in stream +CVE-2024-26679: Fix not seen in stream +CVE-2024-26685: Fix not seen in stream +CVE-2024-26686: Fix not seen in stream +CVE-2024-26687: Fix not seen in stream +CVE-2024-26689: Fix not seen in stream +CVE-2024-26691: Fix not seen in stream +CVE-2024-26696: Fix not seen in stream +CVE-2024-26697: Fix not seen in stream +CVE-2024-26699: Fix not seen in stream +CVE-2024-26700: Fix not seen in stream +CVE-2024-26704: Fix not seen in stream +CVE-2024-26706: Fix not seen in stream +CVE-2024-26713: Fix not seen in stream +CVE-2024-26719: Fix not seen in stream +CVE-2024-26720: Fix not seen in stream +CVE-2024-26726: Fix not seen in stream +CVE-2024-26733: Fix not seen in stream +CVE-2024-26738: Fix not seen in stream +CVE-2024-26739: Fix not seen in stream +CVE-2024-26743: Fix not seen in stream +CVE-2024-26744: Fix not seen in stream +CVE-2024-26745: Fix not seen in stream +CVE-2024-26748: Fix not seen in stream +CVE-2024-26752: Fix not seen in stream +CVE-2024-26756: Fix not seen in stream +CVE-2024-26758: Fix not seen in stream +CVE-2024-26759: Fix not seen in stream +CVE-2024-26763: Fix not seen in stream +CVE-2024-26764: Fix not seen in stream +CVE-2024-26765: Fix not seen in stream +CVE-2024-26766: Fix not seen in stream +CVE-2024-26767: Fix not seen in stream +CVE-2024-26768: Fix not seen in stream +CVE-2024-26769: Fix not seen in stream +CVE-2024-26770: Fix not seen in stream +CVE-2024-26771: Fix not seen in stream +CVE-2024-26772: Fix not seen in stream +CVE-2024-26773: Fix not seen in stream +CVE-2024-26774: Fix not seen in stream +CVE-2024-26775: Fix not seen in stream +CVE-2024-26776: Fix not seen in stream +CVE-2024-26777: Fix not seen in stream +CVE-2024-26778: Fix not seen in stream +CVE-2024-26779: Fix not seen in stream +CVE-2024-26784: Fix not seen in stream +CVE-2024-26789: Fix not seen in stream +CVE-2024-26791: Fix not seen in stream +CVE-2024-26793: Fix not seen in stream +CVE-2024-26797: Fix not seen in stream +CVE-2024-26798: Fix not seen in stream +CVE-2024-26801: Fix not seen in stream +CVE-2024-26802: Fix not seen in stream +CVE-2024-26803: Fix not seen in stream +CVE-2024-26804: Fix not seen in stream +CVE-2024-26806: Fix not seen in stream +CVE-2024-26808: Fix not seen in stream +CVE-2024-26809: Fix not seen in stream diff --git a/data/4.1/4.1_security.txt b/data/4.1/4.1_security.txt index 2ebbd979f..d239f63cc 100644 --- a/data/4.1/4.1_security.txt +++ b/data/4.1/4.1_security.txt @@ -775,6 +775,7 @@ Outstanding CVEs: CVE-2019-2181: (unk) binder: check for overflow when alloc for security context CVE-2019-2213: (unk) binder: fix possible UAF when freeing buffer CVE-2019-2215: (unk) ANDROID: binder: remove waitqueue when thread exits. + CVE-2019-25160: (unk) netlabel: fix out-of-bounds memory accesses CVE-2019-3459: (unk) Bluetooth: Verify that l2cap_get_conf_opt provides large enough buffer CVE-2019-3460: (unk) Bluetooth: Check L2CAP option sizes returned from l2cap_get_conf_opt CVE-2019-3701: (unk) can: gw: ensure DLC boundaries after CAN frame modification @@ -937,6 +938,9 @@ Outstanding CVEs: CVE-2020-36557: (unk) vt: vt_ioctl: fix VT_DISALLOCATE freeing in-use virtual console CVE-2020-36558: (unk) vt: vt_ioctl: fix race in VT_RESIZEX CVE-2020-36691: (unk) netlink: limit recursion depth in policy validation + CVE-2020-36775: (unk) f2fs: fix to avoid potential deadlock + CVE-2020-36780: (unk) i2c: sprd: fix reference leak when pm_runtime_get_sync fails + CVE-2020-36781: (unk) i2c: imx: fix reference leak when pm_runtime_get_sync fails CVE-2020-3702: (unk) ath: Use safer key clearing with key cache entries CVE-2020-4788: (unk) powerpc/64s: flush L1D on kernel entry CVE-2020-8647: (unk) vgacon: Fix a UAF in vgacon_invert_region @@ -1068,6 +1072,82 @@ Outstanding CVEs: CVE-2021-45485: (unk) ipv6: use prandom_u32() for ID generation CVE-2021-45486: (unk) inet: use bigger hash table for IP ID generation CVE-2021-45868: (unk) quota: check block number when reading the block in quota file + CVE-2021-46904: (unk) net: hso: fix null-ptr-deref during tty device unregistration + CVE-2021-46906: (unk) HID: usbhid: fix info leak in hid_submit_ctrl + CVE-2021-46908: (unk) bpf: Use correct permission flag for mixed signed bounds arithmetic + CVE-2021-46924: (unk) NFC: st21nfca: Fix memory leak in device probe and remove + CVE-2021-46926: (unk) ALSA: hda: intel-sdw-acpi: harden detection of controller + CVE-2021-46928: (unk) parisc: Clear stale IIR value on instruction access rights trap + CVE-2021-46932: (unk) Input: appletouch - initialize work before device registration + CVE-2021-46933: (unk) usb: gadget: f_fs: Clear ffs_eventfd in ffs_data_clear. + CVE-2021-46936: (unk) net: fix use-after-free in tw_timer_handler + CVE-2021-46939: (unk) tracing: Restructure trace_clock_global() to never block + CVE-2021-46950: (unk) md/raid1: properly indicate failure when ending a failed write request + CVE-2021-46951: (unk) tpm: efi: Use local variable for calculating final log size + CVE-2021-46952: (unk) NFS: fs_context: validate UDP retrans to prevent shift out-of-bounds + CVE-2021-46959: (unk) spi: Fix use-after-free with devm_spi_alloc_* + CVE-2021-46962: (unk) mmc: uniphier-sd: Fix a resource leak in the remove function + CVE-2021-46965: (unk) mtd: physmap: physmap-bt1-rom: Fix unintentional stack access + CVE-2021-46969: (unk) bus: mhi: core: Fix invalid error returning in mhi_queue + CVE-2021-46970: (unk) bus: mhi: pci_generic: Remove WQ_MEM_RECLAIM flag from state workqueue + CVE-2021-46982: (unk) f2fs: compress: fix race condition of overwrite vs truncate + CVE-2021-47028: (unk) mt76: mt7915: fix txrate reporting + CVE-2021-47046: (unk) drm/amd/display: Fix off by one in hdmi_14_process_transaction() + CVE-2021-47052: (unk) crypto: sa2ul - Fix memory leak of rxd + CVE-2021-47059: (unk) crypto: sun8i-ss - fix result memory leak on error path + CVE-2021-47065: (unk) rtw88: Fix array overrun in rtw_get_tx_power_params() + CVE-2021-47070: (unk) uio_hv_generic: Fix another memory leak in error handling paths + CVE-2021-47075: (unk) nvmet: fix memory leak in nvmet_alloc_ctrl() + CVE-2021-47076: (unk) RDMA/rxe: Return CQE error if invalid lkey was supplied + CVE-2021-47082: (unk) tun: avoid double free in tun_free_netdev + CVE-2021-47083: (unk) pinctrl: mediatek: fix global-out-of-bounds issue + CVE-2021-47086: (unk) phonet/pep: refuse to enable an unbound pipe + CVE-2021-47101: (unk) asix: fix uninit-value in asix_mdio_read() + CVE-2021-47103: (unk) inet: fully convert sk->sk_rx_dst to RCU rules + CVE-2021-47110: (unk) x86/kvm: Disable kvmclock on all CPUs on shutdown + CVE-2021-47112: (unk) x86/kvm: Teardown PV features on boot CPU as well + CVE-2021-47113: (unk) btrfs: abort in rename_exchange if we fail to insert the second ref + CVE-2021-47114: (unk) ocfs2: fix data corruption by fallocate + CVE-2021-47116: (unk) ext4: fix memory leak in ext4_mb_init_backend on error path. + CVE-2021-47117: (unk) ext4: fix bug on in ext4_es_cache_extent as ext4_split_extent_at failed + CVE-2021-47118: (unk) pid: take a reference when initializing `cad_pid` + CVE-2021-47119: (unk) ext4: fix memory leak in ext4_fill_super + CVE-2021-47121: (unk) net: caif: fix memory leak in cfusbl_device_notify + CVE-2021-47122: (unk) net: caif: fix memory leak in caif_device_notify + CVE-2021-47124: (unk) io_uring: fix link timeout refs + CVE-2021-47125: (unk) sch_htb: fix refcount leak in htb_parent_to_leaf_offload + CVE-2021-47128: (unk) bpf, lockdown, audit: Fix buggy SELinux lockdown permission checks + CVE-2021-47131: (unk) net/tls: Fix use-after-free after the TLS device goes down and up + CVE-2021-47133: (unk) HID: amd_sfh: Fix memory leak in amd_sfh_work + CVE-2021-47135: (unk) mt76: mt7921: fix possible AOOB issue in mt7921_mcu_tx_rate_report + CVE-2021-47136: (unk) net: zero-initialize tc skb extension on allocation + CVE-2021-47137: (unk) net: lantiq: fix memory corruption in RX ring + CVE-2021-47140: (unk) iommu/amd: Clear DMA ops when switching domain + CVE-2021-47142: (unk) drm/amdgpu: Fix a use-after-free + CVE-2021-47143: (unk) net/smc: remove device from smcd_dev_list after failed device_add() + CVE-2021-47144: (unk) drm/amd/amdgpu: fix refcount leak + CVE-2021-47145: (unk) btrfs: do not BUG_ON in link_to_fixup_dir + CVE-2021-47146: (unk) mld: fix panic in mld_newpack() + CVE-2021-47147: (unk) ptp: ocp: Fix a resource leak in an error handling path + CVE-2021-47149: (unk) net: fujitsu: fix potential null-ptr-deref + CVE-2021-47150: (unk) net: fec: fix the potential memory leak in fec_enet_init() + CVE-2021-47151: (unk) interconnect: qcom: bcm-voter: add a missing of_node_put() + CVE-2021-47153: (unk) i2c: i801: Don't generate an interrupt on bus reset + CVE-2021-47158: (unk) net: dsa: sja1105: add error handling in sja1105_setup() + CVE-2021-47160: (unk) net: dsa: mt7530: fix VLAN traffic leaks + CVE-2021-47163: (unk) tipc: wait and exit until all work queues are done + CVE-2021-47165: (unk) drm/meson: fix shutdown crash when component not probed + CVE-2021-47166: (unk) NFS: Don't corrupt the value of pg_bytes_written in nfs_do_recoalesce() + CVE-2021-47167: (unk) NFS: Fix an Oopsable condition in __nfs_pageio_add_request() + CVE-2021-47168: (unk) NFS: fix an incorrect limit in filelayout_decode_layout() + CVE-2021-47169: (unk) serial: rp2: use 'request_firmware' instead of 'request_firmware_nowait' + CVE-2021-47170: (unk) USB: usbfs: Don't WARN about excessively large memory allocations + CVE-2021-47171: (unk) net: usb: fix memory leak in smsc75xx_bind + CVE-2021-47172: (unk) iio: adc: ad7124: Fix potential overflow due to non sequential channel numbers + CVE-2021-47173: (unk) misc/uss720: fix memory leak in uss720_probe + CVE-2021-47175: (unk) net/sched: fq_pie: fix OOB access in the traffic path + CVE-2021-47179: (unk) NFSv4: Fix a NULL pointer dereference in pnfs_mark_matching_lsegs_return() + CVE-2021-47180: (unk) NFC: nci: fix memory leak in nci_allocate_device CVE-2022-0001: (unk) x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE CVE-2022-0002: (unk) x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE CVE-2022-0168: (unk) cifs: fix NULL ptr dereference in smb2_ioctl_query_info() @@ -1234,6 +1314,9 @@ Outstanding CVEs: CVE-2022-4662: (unk) USB: core: Prevent nested device-reset calls CVE-2022-4744: (unk) tun: avoid double free in tun_free_netdev CVE-2022-48619: (unk) Input: add bounds checking to input_set_capability() + CVE-2022-48626: (unk) moxart: fix potential use-after-free on remove path + CVE-2022-48627: (unk) vt: fix memory overlapping when deleting chars in the buffer + CVE-2022-48628: (unk) ceph: drop messages from MDS when unmounting CVE-2023-0030: (unk) drm/nouveau/mmu: add more general vmm free/node handling functions CVE-2023-0047: (unk) mm, oom: do not trigger out_of_memory from the #PF CVE-2023-0266: (unk) ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF @@ -1280,6 +1363,7 @@ Outstanding CVEs: CVE-2023-26545: (unk) net: mpls: fix stale pointer if allocation fails during device rename CVE-2023-26607: (unk) ntfs: fix out-of-bounds read in ntfs_attr_find() CVE-2023-28328: (unk) media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer() + CVE-2023-28746: (unk) x86/mmio: Disable KVM mitigation when X86_FEATURE_CLEAR_CPU_BUF is set CVE-2023-28772: (unk) seq_buf: Fix overflow in seq_buf_putmem_hex() CVE-2023-2985: (unk) fs: hfsplus: fix UAF issue in hfsplus_put_super CVE-2023-3006: (unk) arm64: Add AMPERE1 to the Spectre-BHB affected list @@ -1341,7 +1425,7 @@ Outstanding CVEs: CVE-2023-4623: (unk) net/sched: sch_hfsc: Ensure inner classes have fsc curve CVE-2023-46343: (unk) nfc: nci: fix possible NULL pointer dereference in send_acknowledge() CVE-2023-46838: (unk) xen-netback: don't produce zero-size SKB frags - CVE-2023-47233: (unk) + CVE-2023-47233: (unk) wifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach CVE-2023-4881: (unk) netfilter: nftables: exthdr: fix 4-byte stack OOB write CVE-2023-4921: (unk) net: sched: sch_qfq: Fix UAF in qfq_dequeue() CVE-2023-51043: (unk) drm/atomic: Fix potential use-after-free in nonblocking commits @@ -1353,27 +1437,112 @@ Outstanding CVEs: CVE-2023-52340: (unk) ipv6: remove max_size check inline with ipv4 CVE-2023-52429: (unk) dm: limit the number of targets and parameter size area CVE-2023-52434: (unk) smb: client: fix potential OOBs in smb2_parse_contexts() - CVE-2023-52435: (unk) net: prevent mss overflow in skb_segment() CVE-2023-52436: (unk) f2fs: explicitly null-terminate the xattr list CVE-2023-52442: (unk) ksmbd: validate session id and tree id in compound request CVE-2023-52445: (unk) media: pvrusb2: fix use after free on context disconnection CVE-2023-52449: (unk) mtd: Fix gluebi NULL pointer dereference caused by ftl notifier CVE-2023-52451: (unk) powerpc/pseries/memhp: Fix access beyond end of drmem array - CVE-2023-52456: (unk) serial: imx: fix tx statemachine deadlock - CVE-2023-52457: (unk) serial: 8250: omap: Don't skip resource freeing if pm_runtime_resume_and_get() failed CVE-2023-52458: (unk) block: add check that partition length needs to be aligned with block size + CVE-2023-52470: (unk) drm/radeon: check the alloc_workqueue return value in radeon_crtc_init() + CVE-2023-52475: (unk) Input: powermate - fix use-after-free in powermate_config_complete + CVE-2023-52476: (unk) perf/x86/lbr: Filter vsyscall addresses + CVE-2023-52477: (unk) usb: hub: Guard against accesses to uninitialized BOS descriptors + CVE-2023-52478: (unk) HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect + CVE-2023-52479: (unk) ksmbd: fix uaf in smb20_oplock_break_ack + CVE-2023-52480: (unk) ksmbd: fix race condition between session lookup and expire + CVE-2023-52481: (unk) arm64: errata: Add Cortex-A520 speculative unprivileged load workaround + CVE-2023-52482: (unk) x86/srso: Add SRSO mitigation for Hygon processors + CVE-2023-52484: (unk) iommu/arm-smmu-v3: Fix soft lockup triggered by arm_smmu_mm_invalidate_range + CVE-2023-52485: (unk) drm/amd/display: Wake DMCUB before sending a command + CVE-2023-52486: (unk) drm: Don't unref the same fb many times by mistake due to deadlock handling + CVE-2023-52488: (unk) serial: sc16is7xx: convert from _raw_ to _noinc_ regmap functions for FIFO + CVE-2023-52489: (unk) mm/sparsemem: fix race in accessing memory_section->usage + CVE-2023-52498: (unk) PM: sleep: Fix possible deadlocks in core system-wide PM code + CVE-2023-52500: (unk) scsi: pm80xx: Avoid leaking tags when processing OPC_INB_SET_CONTROLLER_CONFIG command + CVE-2023-52501: (unk) ring-buffer: Do not attempt to read past "commit" + CVE-2023-52502: (unk) net: nfc: fix races in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn() + CVE-2023-52506: (unk) LoongArch: Set all reserved memblocks on Node#0 at initialization + CVE-2023-52507: (unk) nfc: nci: assert requested protocol is valid + CVE-2023-52508: (unk) nvme-fc: Prevent null pointer dereference in nvme_fc_io_getuuid() + CVE-2023-52509: (unk) ravb: Fix use-after-free issue in ravb_tx_timeout_work() + CVE-2023-52511: (unk) spi: sun6i: reduce DMA RX transfer width to single byte + CVE-2023-52515: (unk) RDMA/srp: Do not call scsi_done() from srp_abort() + CVE-2023-52516: (unk) dma-debug: don't call __dma_entry_alloc_check_leak() under free_entries_lock + CVE-2023-52517: (unk) spi: sun6i: fix race between DMA RX transfer completion and RX FIFO drain + CVE-2023-52519: (unk) HID: intel-ish-hid: ipc: Disable and reenable ACPI GPE bit + CVE-2023-52522: (unk) net: fix possible store tearing in neigh_periodic_work() + CVE-2023-52527: (unk) ipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data() + CVE-2023-52528: (unk) net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg + CVE-2023-52531: (unk) wifi: iwlwifi: mvm: Fix a memory corruption issue + CVE-2023-52532: (unk) net: mana: Fix TX CQE error handling + CVE-2023-52559: (unk) iommu/vt-d: Avoid memory allocation in iommu_suspend() + CVE-2023-52561: (unk) arm64: dts: qcom: sdm845-db845c: Mark cont splash memory region as reserved + CVE-2023-52563: (unk) drm/meson: fix memory leak on ->hpd_notify callback + CVE-2023-52565: (unk) media: uvcvideo: Fix OOB read + CVE-2023-52566: (unk) nilfs2: fix potential use after free in nilfs_gccache_submit_read_data() + CVE-2023-52568: (unk) x86/sgx: Resolves SECS reclaim vs. page fault for EAUG race + CVE-2023-52569: (unk) btrfs: remove BUG() after failure to insert delayed dir index item + CVE-2023-52571: (unk) power: supply: rk817: Fix node refcount leak + CVE-2023-52572: (unk) cifs: Fix UAF in cifs_demultiplex_thread() + CVE-2023-52574: (unk) team: fix null-ptr-deref when team device type is changed + CVE-2023-52578: (unk) net: bridge: use DEV_STATS_INC() + CVE-2023-52583: (unk) ceph: fix deadlock or deadcode of misusing dget() + CVE-2023-52584: (unk) spmi: mediatek: Fix UAF on device remove + CVE-2023-52585: (unk) drm/amdgpu: Fix possible NULL dereference in amdgpu_ras_query_error_status_helper() + CVE-2023-52586: (unk) drm/msm/dpu: Add mutex lock in control vblank irq + CVE-2023-52587: (unk) IB/ipoib: Fix mcast list locking + CVE-2023-52588: (unk) f2fs: fix to tag gcing flag on page during block migration + CVE-2023-52589: (unk) media: rkisp1: Fix IRQ disable race issue + CVE-2023-52590: (unk) ocfs2: Avoid touching renamed directory if parent does not change + CVE-2023-52591: (unk) reiserfs: Avoid touching renamed directory if parent does not change + CVE-2023-52593: (unk) wifi: wfx: fix possible NULL pointer dereference in wfx_set_mfp_ap() + CVE-2023-52594: (unk) wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus() + CVE-2023-52595: (unk) wifi: rt2x00: restart beacon queue when hardware reset + CVE-2023-52596: (unk) sysctl: Fix out of bounds access for empty sysctl registers + CVE-2023-52597: (unk) KVM: s390: fix setting of fpc register + CVE-2023-52598: (unk) s390/ptrace: handle setting of fpc register correctly + CVE-2023-52599: (unk) jfs: fix array-index-out-of-bounds in diNewExt + CVE-2023-52600: (unk) jfs: fix uaf in jfs_evict_inode + CVE-2023-52601: (unk) jfs: fix array-index-out-of-bounds in dbAdjTree + CVE-2023-52602: (unk) jfs: fix slab-out-of-bounds Read in dtSearch + CVE-2023-52603: (unk) UBSAN: array-index-out-of-bounds in dtSplitRoot + CVE-2023-52604: (unk) FS:JFS:UBSAN:array-index-out-of-bounds in dbAdjTree + CVE-2023-52606: (unk) powerpc/lib: Validate size for vector operations + CVE-2023-52607: (unk) powerpc/mm: Fix null-pointer dereference in pgtable_cache_add + CVE-2023-52609: (unk) binder: fix race between mmput() and do_exit() + CVE-2023-52614: (unk) PM / devfreq: Fix buffer overflow in trans_stat_show + CVE-2023-52615: (unk) hwrng: core - Fix page fault dead lock on mmap-ed hwrng + CVE-2023-52617: (unk) PCI: switchtec: Fix stdev_release() crash after surprise hot remove + CVE-2023-52618: (unk) block/rnbd-srv: Check for unlikely string overflow + CVE-2023-52619: (unk) pstore/ram: Fix crash when setting number of cpus to an odd number + CVE-2023-52620: (unk) netfilter: nf_tables: disallow timeout for anonymous sets + CVE-2023-52621: (unk) bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers + CVE-2023-52622: (unk) ext4: avoid online resizing failures due to oversized flex bg + CVE-2023-52623: (unk) SUNRPC: Fix a suspicious RCU usage warning + CVE-2023-52624: (unk) drm/amd/display: Wake DMCUB before executing GPINT commands + CVE-2023-52625: (unk) drm/amd/display: Refactor DMCUB enter/exit idle interface + CVE-2023-52628: (unk) netfilter: nftables: exthdr: fix 4-byte stack OOB write + CVE-2023-52629: (unk) sh: push-switch: Reorder cleanup operations to avoid use-after-free bug + CVE-2023-52632: (unk) drm/amdkfd: Fix lock dependency warning with srcu + CVE-2023-52633: (unk) um: time-travel: fix time corruption + CVE-2023-52634: (unk) drm/amd/display: Fix disable_otg_wa logic + CVE-2023-52635: (unk) PM / devfreq: Synchronize devfreq_monitor_[start/stop] + CVE-2023-52638: (unk) can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock + CVE-2023-52639: (unk) KVM: s390: vsie: fix race during shadow creation + CVE-2023-52640: (unk) fs/ntfs3: Fix oob in ntfs_listxattr + CVE-2023-52641: (unk) fs/ntfs3: Add NULL ptr dereference checking at the end of attr_allocate_frame() CVE-2023-6040: (unk) netfilter: nf_tables: Reject tables of unsupported family CVE-2023-6240: (unk) - CVE-2023-6270: (unk) - CVE-2023-6356: (unk) + CVE-2023-6270: (unk) aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts + CVE-2023-6356: (unk) nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length CVE-2023-6535: (unk) - CVE-2023-6536: (unk) + CVE-2023-6536: (unk) nvmet-tcp: fix a crash in nvmet_req_complete() CVE-2023-6546: (unk) tty: n_gsm: fix the UAF caused by race condition in gsm_cleanup_mux CVE-2023-6606: (unk) smb: client: fix OOB in smbCalcSize() CVE-2023-6610: (unk) smb: client: fix potential OOB in smb2_dump_detail() CVE-2023-6915: (unk) ida: Fix crash in ida_free when the bitmap is empty CVE-2023-6932: (unk) ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet - CVE-2023-7042: (unk) + CVE-2023-7042: (unk) wifi: ath10k: fix NULL pointer dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev() CVE-2023-7192: (unk) netfilter: ctnetlink: fix possible refcount leak in ctnetlink_create_conntrack() CVE-2024-0340: (unk) vhost: use kzalloc() instead of kmalloc() followed by memset() CVE-2024-0584: (unk) ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet @@ -1381,26 +1550,107 @@ Outstanding CVEs: CVE-2024-1086: (unk) netfilter: nf_tables: reject QUEUE/DROP verdict parameters CVE-2024-1312: (unk) mm: lock_vma_under_rcu() must check vma->anon_vma under vma lock CVE-2024-21803: (unk) - CVE-2024-22099: (unk) + CVE-2024-2193: (unk) + CVE-2024-22099: (unk) Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security CVE-2024-22386: (unk) - CVE-2024-23196: (unk) - CVE-2024-23307: (unk) + CVE-2024-23196: (unk) ALSA: hda: fix a possible null-pointer dereference due to data race in snd_hdac_regmap_sync() + CVE-2024-23307: (unk) md/raid5: fix atomicity violation in raid5_cache_count CVE-2024-23848: (unk) CVE-2024-23851: (unk) dm: limit the number of targets and parameter size area CVE-2024-24855: (unk) scsi: lpfc: Fix a possible data race in lpfc_unregister_fcf_rescan() CVE-2024-24857: (unk) CVE-2024-24858: (unk) CVE-2024-24859: (unk) - CVE-2024-24861: (unk) + CVE-2024-24861: (unk) media: xc4000: Fix atomicity violation in xc4000_get_frequency CVE-2024-24864: (unk) CVE-2024-25739: (unk) CVE-2024-25740: (unk) CVE-2024-25741: (unk) CVE-2024-25744: (unk) x86/coco: Disable 32-bit emulation by default on TDX and SEV - CVE-2024-26584: (unk) net: tls: handle backlogging of crypto requests - CVE-2024-26587: (unk) net: netdevsim: don't try to destroy PHC on VFs - CVE-2024-26588: (unk) LoongArch: BPF: Prevent out-of-bounds memory access - CVE-2024-26591: (unk) bpf: Fix re-attachment branch in bpf_tracing_prog_attach CVE-2024-26592: (unk) ksmbd: fix UAF issue in ksmbd_tcp_new_connection() CVE-2024-26594: (unk) ksmbd: validate mech token in session setup CVE-2024-26598: (unk) KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache + CVE-2024-26600: (unk) phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP + CVE-2024-26606: (unk) binder: signal epoll threads of self-work + CVE-2024-26622: (unk) tomoyo: fix UAF write bug in tomoyo_write_control() + CVE-2024-26623: (unk) pds_core: Prevent race issues involving the adminq + CVE-2024-26625: (unk) llc: call sock_orphan() at release time + CVE-2024-26627: (unk) scsi: core: Move scsi_host_busy() out of host lock for waking up EH handler + CVE-2024-26633: (unk) ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim() + CVE-2024-26635: (unk) llc: Drop support for ETH_P_TR_802_2. + CVE-2024-26636: (unk) llc: make llc_ui_sendmsg() more robust against bonding changes + CVE-2024-26642: (unk) netfilter: nf_tables: disallow anonymous set with timeout flag + CVE-2024-26644: (unk) btrfs: don't abort filesystem when attempting to snapshot deleted subvolume + CVE-2024-26646: (unk) thermal: intel: hfi: Add syscore callbacks for system-wide PM + CVE-2024-26647: (unk) drm/amd/display: Fix late derefrence 'dsc' check in 'link_set_dsc_pps_packet()' + CVE-2024-26648: (unk) drm/amd/display: Fix variable deferencing before NULL check in edp_setup_replay() + CVE-2024-26650: (unk) platform/x86: p2sb: Allow p2sb_bar() calls during PCI device probe + CVE-2024-26651: (unk) sr9800: Add check for usbnet_get_endpoints + CVE-2024-26654: (unk) ALSA: sh: aica: reorder cleanup operations to avoid UAF bugs + CVE-2024-26655: (unk) Fix memory leak in posix_clock_open() + CVE-2024-26656: (unk) drm/amdgpu: fix use-after-free bug + CVE-2024-26658: (unk) bcachefs: grab s_umount only if snapshotting + CVE-2024-26659: (unk) xhci: handle isoc Babble and Buffer Overrun events properly + CVE-2024-26664: (unk) hwmon: (coretemp) Fix out-of-bounds memory access + CVE-2024-26671: (unk) blk-mq: fix IO hang from sbitmap wakeup race + CVE-2024-26672: (unk) drm/amdgpu: Fix variable 'mca_funcs' dereferenced before NULL check in 'amdgpu_mca_smu_get_mca_entry()' + CVE-2024-26675: (unk) ppp_async: limit MRU to 64K + CVE-2024-26676: (unk) af_unix: Call kfree_skb() for dead unix_(sk)->oob_skb in GC. + CVE-2024-26677: (unk) rxrpc: Fix delayed ACKs to not set the reference serial number + CVE-2024-26679: (unk) inet: read sk->sk_family once in inet_recv_error() + CVE-2024-26685: (unk) nilfs2: fix potential bug in end_buffer_async_write + CVE-2024-26686: (unk) fs/proc: do_task_stat: use sig->stats_lock to gather the threads/children stats + CVE-2024-26687: (unk) xen/events: close evtchn after mapping cleanup + CVE-2024-26689: (unk) ceph: prevent use-after-free in encode_cap_msg() + CVE-2024-26691: (unk) KVM: arm64: Fix circular locking dependency + CVE-2024-26696: (unk) nilfs2: fix hang in nilfs_lookup_dirty_data_buffers() + CVE-2024-26697: (unk) nilfs2: fix data corruption in dsync block recovery for small block sizes + CVE-2024-26699: (unk) drm/amd/display: Fix array-index-out-of-bounds in dcn35_clkmgr + CVE-2024-26700: (unk) drm/amd/display: Fix MST Null Ptr for RV + CVE-2024-26704: (unk) ext4: fix double-free of blocks due to wrong extents moved_len + CVE-2024-26706: (unk) parisc: Fix random data corruption from exception handler + CVE-2024-26713: (unk) powerpc/pseries/iommu: Fix iommu initialisation during DLPAR add + CVE-2024-26719: (unk) nouveau: offload fence uevents work to workqueue + CVE-2024-26720: (unk) mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again + CVE-2024-26726: (unk) btrfs: don't drop extent_map for free space inode on write error + CVE-2024-26733: (unk) arp: Prevent overflow in arp_req_get(). + CVE-2024-26738: (unk) powerpc/pseries/iommu: DLPAR add doesn't completely initialize pci_controller + CVE-2024-26739: (unk) net/sched: act_mirred: don't override retval if we already lost the skb + CVE-2024-26743: (unk) RDMA/qedr: Fix qedr_create_user_qp error flow + CVE-2024-26744: (unk) RDMA/srpt: Support specifying the srpt_service_guid parameter + CVE-2024-26745: (unk) powerpc/pseries/iommu: IOMMU table is not initialized for kdump over SR-IOV + CVE-2024-26748: (unk) usb: cdns3: fix memory double free when handle zero packet + CVE-2024-26752: (unk) l2tp: pass correct message length to ip6_append_data + CVE-2024-26756: (unk) md: Don't register sync_thread for reshape directly + CVE-2024-26758: (unk) md: Don't ignore suspended array in md_check_recovery() + CVE-2024-26759: (unk) mm/swap: fix race when skipping swapcache + CVE-2024-26763: (unk) dm-crypt: don't modify the data when using authenticated encryption + CVE-2024-26764: (unk) fs/aio: Restrict kiocb_set_cancel_fn() to I/O submitted via libaio + CVE-2024-26765: (unk) LoongArch: Disable IRQ before init_fn() for nonboot CPUs + CVE-2024-26766: (unk) IB/hfi1: Fix sdma.h tx->num_descs off-by-one error + CVE-2024-26767: (unk) drm/amd/display: fixed integer types and null check locations + CVE-2024-26768: (unk) LoongArch: Change acpi_core_pic[NR_CPUS] to acpi_core_pic[MAX_CORE_PIC] + CVE-2024-26769: (unk) nvmet-fc: avoid deadlock on delete association path + CVE-2024-26770: (unk) HID: nvidia-shield: Add missing null pointer checks to LED initialization + CVE-2024-26771: (unk) dmaengine: ti: edma: Add some null pointer checks to the edma_probe + CVE-2024-26772: (unk) ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal() + CVE-2024-26773: (unk) ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found() + CVE-2024-26774: (unk) ext4: avoid dividing by 0 in mb_update_avg_fragment_size() when block bitmap corrupt + CVE-2024-26775: (unk) aoe: avoid potential deadlock at set_capacity + CVE-2024-26776: (unk) spi: hisi-sfc-v3xx: Return IRQ_NONE if no interrupts were detected + CVE-2024-26777: (unk) fbdev: sis: Error out if pixclock equals zero + CVE-2024-26778: (unk) fbdev: savage: Error out if pixclock equals zero + CVE-2024-26779: (unk) wifi: mac80211: fix race condition on enabling fast-xmit + CVE-2024-26784: (unk) pmdomain: arm: Fix NULL dereference on scmi_perf_domain removal + CVE-2024-26789: (unk) crypto: arm64/neonbs - fix out-of-bounds access on short input + CVE-2024-26791: (unk) btrfs: dev-replace: properly validate device names + CVE-2024-26793: (unk) gtp: fix use-after-free and null-ptr-deref in gtp_newlink() + CVE-2024-26797: (unk) drm/amd/display: Prevent potential buffer overflow in map_hw_resources + CVE-2024-26798: (unk) fbcon: always restore the old font data in fbcon_do_set_font() + CVE-2024-26801: (unk) Bluetooth: Avoid potential use-after-free in hci_error_reset + CVE-2024-26802: (unk) stmmac: Clear variable when destroying workqueue + CVE-2024-26803: (unk) net: veth: clear GRO when clearing XDP even when down + CVE-2024-26804: (unk) net: ip_tunnel: prevent perpetual headroom growth + CVE-2024-26806: (unk) spi: cadence-qspi: remove system-wide suspend helper calls from runtime PM hooks + CVE-2024-26808: (unk) netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain + CVE-2024-26809: (unk) netfilter: nft_set_pipapo: release elements in clone only from destroy path diff --git a/data/4.10/4.10_CVEs.txt b/data/4.10/4.10_CVEs.txt index 57d5d2dc7..cfbbbb5b0 100644 --- a/data/4.10/4.10_CVEs.txt +++ b/data/4.10/4.10_CVEs.txt @@ -536,6 +536,8 @@ CVE-2019-2181: Fix not seen in stream CVE-2019-2182: Fix not seen in stream CVE-2019-2213: Fix not seen in stream CVE-2019-2215: Fix not seen in stream +CVE-2019-25160: Fix not seen in stream +CVE-2019-25162: Fix not seen in stream CVE-2019-3016: Fix not seen in stream CVE-2019-3459: Fix not seen in stream CVE-2019-3460: Fix not seen in stream @@ -720,6 +722,11 @@ CVE-2020-36557: Fix not seen in stream CVE-2020-36558: Fix not seen in stream CVE-2020-36691: Fix not seen in stream CVE-2020-36766: Fix not seen in stream +CVE-2020-36775: Fix not seen in stream +CVE-2020-36777: Fix not seen in stream +CVE-2020-36780: Fix not seen in stream +CVE-2020-36781: Fix not seen in stream +CVE-2020-36784: Fix not seen in stream CVE-2020-3702: Fix not seen in stream CVE-2020-4788: Fix not seen in stream CVE-2020-8647: Fix not seen in stream @@ -862,6 +869,93 @@ CVE-2021-45469: Fix not seen in stream CVE-2021-45485: Fix not seen in stream CVE-2021-45486: Fix not seen in stream CVE-2021-45868: Fix not seen in stream +CVE-2021-46904: Fix not seen in stream +CVE-2021-46906: Fix not seen in stream +CVE-2021-46908: Fix not seen in stream +CVE-2021-46924: Fix not seen in stream +CVE-2021-46926: Fix not seen in stream +CVE-2021-46928: Fix not seen in stream +CVE-2021-46932: Fix not seen in stream +CVE-2021-46933: Fix not seen in stream +CVE-2021-46936: Fix not seen in stream +CVE-2021-46938: Fix not seen in stream +CVE-2021-46939: Fix not seen in stream +CVE-2021-46950: Fix not seen in stream +CVE-2021-46951: Fix not seen in stream +CVE-2021-46952: Fix not seen in stream +CVE-2021-46959: Fix not seen in stream +CVE-2021-46962: Fix not seen in stream +CVE-2021-46965: Fix not seen in stream +CVE-2021-46969: Fix not seen in stream +CVE-2021-46970: Fix not seen in stream +CVE-2021-46982: Fix not seen in stream +CVE-2021-46992: Fix not seen in stream +CVE-2021-47006: Fix not seen in stream +CVE-2021-47013: Fix not seen in stream +CVE-2021-47028: Fix not seen in stream +CVE-2021-47046: Fix not seen in stream +CVE-2021-47052: Fix not seen in stream +CVE-2021-47054: Fix not seen in stream +CVE-2021-47056: Fix not seen in stream +CVE-2021-47059: Fix not seen in stream +CVE-2021-47065: Fix not seen in stream +CVE-2021-47070: Fix not seen in stream +CVE-2021-47074: Fix not seen in stream +CVE-2021-47075: Fix not seen in stream +CVE-2021-47076: Fix not seen in stream +CVE-2021-47078: Fix not seen in stream +CVE-2021-47082: Fix not seen in stream +CVE-2021-47083: Fix not seen in stream +CVE-2021-47086: Fix not seen in stream +CVE-2021-47101: Fix not seen in stream +CVE-2021-47103: Fix not seen in stream +CVE-2021-47110: Fix not seen in stream +CVE-2021-47112: Fix not seen in stream +CVE-2021-47113: Fix not seen in stream +CVE-2021-47114: Fix not seen in stream +CVE-2021-47116: Fix not seen in stream +CVE-2021-47117: Fix not seen in stream +CVE-2021-47118: Fix not seen in stream +CVE-2021-47119: Fix not seen in stream +CVE-2021-47121: Fix not seen in stream +CVE-2021-47122: Fix not seen in stream +CVE-2021-47124: Fix not seen in stream +CVE-2021-47125: Fix not seen in stream +CVE-2021-47128: Fix not seen in stream +CVE-2021-47131: Fix not seen in stream +CVE-2021-47133: Fix not seen in stream +CVE-2021-47135: Fix not seen in stream +CVE-2021-47136: Fix not seen in stream +CVE-2021-47137: Fix not seen in stream +CVE-2021-47140: Fix not seen in stream +CVE-2021-47142: Fix not seen in stream +CVE-2021-47143: Fix not seen in stream +CVE-2021-47144: Fix not seen in stream +CVE-2021-47145: Fix not seen in stream +CVE-2021-47146: Fix not seen in stream +CVE-2021-47147: Fix not seen in stream +CVE-2021-47149: Fix not seen in stream +CVE-2021-47150: Fix not seen in stream +CVE-2021-47151: Fix not seen in stream +CVE-2021-47153: Fix not seen in stream +CVE-2021-47158: Fix not seen in stream +CVE-2021-47159: Fix not seen in stream +CVE-2021-47160: Fix not seen in stream +CVE-2021-47161: Fix not seen in stream +CVE-2021-47162: Fix not seen in stream +CVE-2021-47163: Fix not seen in stream +CVE-2021-47165: Fix not seen in stream +CVE-2021-47166: Fix not seen in stream +CVE-2021-47167: Fix not seen in stream +CVE-2021-47168: Fix not seen in stream +CVE-2021-47169: Fix not seen in stream +CVE-2021-47170: Fix not seen in stream +CVE-2021-47171: Fix not seen in stream +CVE-2021-47172: Fix not seen in stream +CVE-2021-47173: Fix not seen in stream +CVE-2021-47175: Fix not seen in stream +CVE-2021-47179: Fix not seen in stream +CVE-2021-47180: Fix not seen in stream CVE-2022-0001: Fix not seen in stream CVE-2022-0002: Fix not seen in stream CVE-2022-0168: Fix not seen in stream @@ -1042,6 +1136,9 @@ CVE-2022-4744: Fix not seen in stream CVE-2022-47520: Fix not seen in stream CVE-2022-47929: Fix not seen in stream CVE-2022-48619: Fix not seen in stream +CVE-2022-48626: Fix not seen in stream +CVE-2022-48627: Fix not seen in stream +CVE-2022-48628: Fix not seen in stream CVE-2023-0030: Fix not seen in stream CVE-2023-0047: Fix not seen in stream CVE-2023-0266: Fix not seen in stream @@ -1096,6 +1193,7 @@ CVE-2023-26545: Fix not seen in stream CVE-2023-26607: Fix not seen in stream CVE-2023-28328: Fix not seen in stream CVE-2023-2860: Fix not seen in stream +CVE-2023-28746: Fix not seen in stream CVE-2023-28772: Fix not seen in stream CVE-2023-2985: Fix not seen in stream CVE-2023-3006: Fix not seen in stream @@ -1162,7 +1260,7 @@ CVE-2023-4622: Fix not seen in stream CVE-2023-4623: Fix not seen in stream CVE-2023-46343: Fix not seen in stream CVE-2023-46838: Fix not seen in stream -CVE-2023-47233: Fix unknown +CVE-2023-47233: Fix not seen in stream CVE-2023-4881: Fix not seen in stream CVE-2023-4921: Fix not seen in stream CVE-2023-51043: Fix not seen in stream @@ -1181,24 +1279,112 @@ CVE-2023-52444: Fix not seen in stream CVE-2023-52445: Fix not seen in stream CVE-2023-52449: Fix not seen in stream CVE-2023-52451: Fix not seen in stream -CVE-2023-52456: Fix not seen in stream -CVE-2023-52457: Fix not seen in stream CVE-2023-52458: Fix not seen in stream +CVE-2023-52469: Fix not seen in stream +CVE-2023-52470: Fix not seen in stream +CVE-2023-52475: Fix not seen in stream +CVE-2023-52476: Fix not seen in stream +CVE-2023-52477: Fix not seen in stream +CVE-2023-52478: Fix not seen in stream +CVE-2023-52479: Fix not seen in stream +CVE-2023-52480: Fix not seen in stream +CVE-2023-52481: Fix not seen in stream +CVE-2023-52482: Fix not seen in stream +CVE-2023-52484: Fix not seen in stream +CVE-2023-52485: Fix not seen in stream +CVE-2023-52486: Fix not seen in stream +CVE-2023-52488: Fix not seen in stream +CVE-2023-52489: Fix not seen in stream +CVE-2023-52498: Fix not seen in stream +CVE-2023-52500: Fix not seen in stream +CVE-2023-52501: Fix not seen in stream +CVE-2023-52502: Fix not seen in stream +CVE-2023-52506: Fix not seen in stream +CVE-2023-52507: Fix not seen in stream +CVE-2023-52508: Fix not seen in stream +CVE-2023-52509: Fix not seen in stream +CVE-2023-52511: Fix not seen in stream +CVE-2023-52515: Fix not seen in stream +CVE-2023-52516: Fix not seen in stream +CVE-2023-52517: Fix not seen in stream +CVE-2023-52519: Fix not seen in stream +CVE-2023-52522: Fix not seen in stream +CVE-2023-52527: Fix not seen in stream +CVE-2023-52528: Fix not seen in stream +CVE-2023-52531: Fix not seen in stream +CVE-2023-52532: Fix not seen in stream +CVE-2023-52559: Fix not seen in stream +CVE-2023-52561: Fix not seen in stream +CVE-2023-52563: Fix not seen in stream +CVE-2023-52565: Fix not seen in stream +CVE-2023-52566: Fix not seen in stream +CVE-2023-52568: Fix not seen in stream +CVE-2023-52569: Fix not seen in stream +CVE-2023-52571: Fix not seen in stream +CVE-2023-52572: Fix not seen in stream +CVE-2023-52574: Fix not seen in stream +CVE-2023-52578: Fix not seen in stream +CVE-2023-52583: Fix not seen in stream +CVE-2023-52584: Fix not seen in stream +CVE-2023-52585: Fix not seen in stream +CVE-2023-52586: Fix not seen in stream +CVE-2023-52587: Fix not seen in stream +CVE-2023-52588: Fix not seen in stream +CVE-2023-52589: Fix not seen in stream +CVE-2023-52590: Fix not seen in stream +CVE-2023-52591: Fix not seen in stream +CVE-2023-52593: Fix not seen in stream +CVE-2023-52594: Fix not seen in stream +CVE-2023-52595: Fix not seen in stream +CVE-2023-52596: Fix not seen in stream +CVE-2023-52597: Fix not seen in stream +CVE-2023-52598: Fix not seen in stream +CVE-2023-52599: Fix not seen in stream +CVE-2023-52600: Fix not seen in stream +CVE-2023-52601: Fix not seen in stream +CVE-2023-52602: Fix not seen in stream +CVE-2023-52603: Fix not seen in stream +CVE-2023-52604: Fix not seen in stream +CVE-2023-52606: Fix not seen in stream +CVE-2023-52607: Fix not seen in stream +CVE-2023-52609: Fix not seen in stream +CVE-2023-52612: Fix not seen in stream +CVE-2023-52614: Fix not seen in stream +CVE-2023-52615: Fix not seen in stream +CVE-2023-52617: Fix not seen in stream +CVE-2023-52618: Fix not seen in stream +CVE-2023-52619: Fix not seen in stream +CVE-2023-52620: Fix not seen in stream +CVE-2023-52621: Fix not seen in stream +CVE-2023-52622: Fix not seen in stream +CVE-2023-52623: Fix not seen in stream +CVE-2023-52624: Fix not seen in stream +CVE-2023-52625: Fix not seen in stream +CVE-2023-52628: Fix not seen in stream +CVE-2023-52629: Fix not seen in stream +CVE-2023-52632: Fix not seen in stream +CVE-2023-52633: Fix not seen in stream +CVE-2023-52634: Fix not seen in stream +CVE-2023-52635: Fix not seen in stream +CVE-2023-52638: Fix not seen in stream +CVE-2023-52639: Fix not seen in stream +CVE-2023-52640: Fix not seen in stream +CVE-2023-52641: Fix not seen in stream CVE-2023-5717: Fix not seen in stream CVE-2023-6040: Fix not seen in stream CVE-2023-6121: Fix not seen in stream CVE-2023-6240: Fix unknown -CVE-2023-6270: Fix unknown -CVE-2023-6356: Fix unknown +CVE-2023-6270: Fix not seen in stream +CVE-2023-6356: Fix not seen in stream CVE-2023-6535: Fix unknown -CVE-2023-6536: Fix unknown +CVE-2023-6536: Fix not seen in stream CVE-2023-6546: Fix not seen in stream CVE-2023-6606: Fix not seen in stream CVE-2023-6610: Fix not seen in stream CVE-2023-6915: Fix not seen in stream CVE-2023-6931: Fix not seen in stream CVE-2023-6932: Fix not seen in stream -CVE-2023-7042: Fix unknown +CVE-2023-7042: Fix not seen in stream CVE-2023-7192: Fix not seen in stream CVE-2024-0340: Fix not seen in stream CVE-2024-0584: Fix not seen in stream @@ -1207,10 +1393,11 @@ CVE-2024-0775: Fix not seen in stream CVE-2024-1086: Fix not seen in stream CVE-2024-1312: Fix not seen in stream CVE-2024-21803: Fix unknown -CVE-2024-22099: Fix unknown +CVE-2024-2193: Fix unknown +CVE-2024-22099: Fix not seen in stream CVE-2024-22386: Fix unknown -CVE-2024-23196: Fix unknown -CVE-2024-23307: Fix unknown +CVE-2024-23196: Fix not seen in stream +CVE-2024-23307: Fix not seen in stream CVE-2024-23848: Fix unknown CVE-2024-23851: Fix not seen in stream CVE-2024-24855: Fix not seen in stream @@ -1218,16 +1405,106 @@ CVE-2024-24857: Fix unknown CVE-2024-24858: Fix unknown CVE-2024-24859: Fix unknown CVE-2024-24860: Fix not seen in stream -CVE-2024-24861: Fix unknown +CVE-2024-24861: Fix not seen in stream CVE-2024-24864: Fix unknown CVE-2024-25739: Fix unknown CVE-2024-25740: Fix unknown CVE-2024-25741: Fix unknown CVE-2024-25744: Fix not seen in stream -CVE-2024-26584: Fix not seen in stream -CVE-2024-26587: Fix not seen in stream -CVE-2024-26588: Fix not seen in stream -CVE-2024-26591: Fix not seen in stream CVE-2024-26592: Fix not seen in stream CVE-2024-26594: Fix not seen in stream CVE-2024-26598: Fix not seen in stream +CVE-2024-26600: Fix not seen in stream +CVE-2024-26606: Fix not seen in stream +CVE-2024-26614: Fix not seen in stream +CVE-2024-26622: Fix not seen in stream +CVE-2024-26623: Fix not seen in stream +CVE-2024-26625: Fix not seen in stream +CVE-2024-26627: Fix not seen in stream +CVE-2024-26633: Fix not seen in stream +CVE-2024-26635: Fix not seen in stream +CVE-2024-26636: Fix not seen in stream +CVE-2024-26641: Fix not seen in stream +CVE-2024-26642: Fix not seen in stream +CVE-2024-26644: Fix not seen in stream +CVE-2024-26646: Fix not seen in stream +CVE-2024-26647: Fix not seen in stream +CVE-2024-26648: Fix not seen in stream +CVE-2024-26650: Fix not seen in stream +CVE-2024-26651: Fix not seen in stream +CVE-2024-26654: Fix not seen in stream +CVE-2024-26655: Fix not seen in stream +CVE-2024-26656: Fix not seen in stream +CVE-2024-26658: Fix not seen in stream +CVE-2024-26659: Fix not seen in stream +CVE-2024-26663: Fix not seen in stream +CVE-2024-26664: Fix not seen in stream +CVE-2024-26668: Fix not seen in stream +CVE-2024-26671: Fix not seen in stream +CVE-2024-26672: Fix not seen in stream +CVE-2024-26675: Fix not seen in stream +CVE-2024-26676: Fix not seen in stream +CVE-2024-26677: Fix not seen in stream +CVE-2024-26679: Fix not seen in stream +CVE-2024-26685: Fix not seen in stream +CVE-2024-26686: Fix not seen in stream +CVE-2024-26687: Fix not seen in stream +CVE-2024-26689: Fix not seen in stream +CVE-2024-26691: Fix not seen in stream +CVE-2024-26696: Fix not seen in stream +CVE-2024-26697: Fix not seen in stream +CVE-2024-26699: Fix not seen in stream +CVE-2024-26700: Fix not seen in stream +CVE-2024-26704: Fix not seen in stream +CVE-2024-26706: Fix not seen in stream +CVE-2024-26713: Fix not seen in stream +CVE-2024-26715: Fix not seen in stream +CVE-2024-26719: Fix not seen in stream +CVE-2024-26720: Fix not seen in stream +CVE-2024-26726: Fix not seen in stream +CVE-2024-26733: Fix not seen in stream +CVE-2024-26735: Fix not seen in stream +CVE-2024-26738: Fix not seen in stream +CVE-2024-26739: Fix not seen in stream +CVE-2024-26740: Fix not seen in stream +CVE-2024-26743: Fix not seen in stream +CVE-2024-26744: Fix not seen in stream +CVE-2024-26745: Fix not seen in stream +CVE-2024-26748: Fix not seen in stream +CVE-2024-26752: Fix not seen in stream +CVE-2024-26754: Fix not seen in stream +CVE-2024-26756: Fix not seen in stream +CVE-2024-26757: Fix not seen in stream +CVE-2024-26758: Fix not seen in stream +CVE-2024-26759: Fix not seen in stream +CVE-2024-26763: Fix not seen in stream +CVE-2024-26764: Fix not seen in stream +CVE-2024-26765: Fix not seen in stream +CVE-2024-26766: Fix not seen in stream +CVE-2024-26767: Fix not seen in stream +CVE-2024-26768: Fix not seen in stream +CVE-2024-26769: Fix not seen in stream +CVE-2024-26770: Fix not seen in stream +CVE-2024-26771: Fix not seen in stream +CVE-2024-26772: Fix not seen in stream +CVE-2024-26773: Fix not seen in stream +CVE-2024-26774: Fix not seen in stream +CVE-2024-26775: Fix not seen in stream +CVE-2024-26776: Fix not seen in stream +CVE-2024-26777: Fix not seen in stream +CVE-2024-26778: Fix not seen in stream +CVE-2024-26779: Fix not seen in stream +CVE-2024-26784: Fix not seen in stream +CVE-2024-26789: Fix not seen in stream +CVE-2024-26791: Fix not seen in stream +CVE-2024-26793: Fix not seen in stream +CVE-2024-26797: Fix not seen in stream +CVE-2024-26798: Fix not seen in stream +CVE-2024-26801: Fix not seen in stream +CVE-2024-26802: Fix not seen in stream +CVE-2024-26803: Fix not seen in stream +CVE-2024-26804: Fix not seen in stream +CVE-2024-26805: Fix not seen in stream +CVE-2024-26806: Fix not seen in stream +CVE-2024-26808: Fix not seen in stream +CVE-2024-26809: Fix not seen in stream diff --git a/data/4.10/4.10_security.txt b/data/4.10/4.10_security.txt index 3672219cd..389ebc178 100644 --- a/data/4.10/4.10_security.txt +++ b/data/4.10/4.10_security.txt @@ -570,6 +570,8 @@ Outstanding CVEs: CVE-2019-2182: (unk) arm64: Enforce BBM for huge IO/VMAP mappings CVE-2019-2213: (unk) binder: fix possible UAF when freeing buffer CVE-2019-2215: (unk) ANDROID: binder: remove waitqueue when thread exits. + CVE-2019-25160: (unk) netlabel: fix out-of-bounds memory accesses + CVE-2019-25162: (unk) i2c: Fix a potential use after free CVE-2019-3016: (unk) x86/kvm: Be careful not to clear KVM_VCPU_FLUSH_TLB bit CVE-2019-3459: (unk) Bluetooth: Verify that l2cap_get_conf_opt provides large enough buffer CVE-2019-3460: (unk) Bluetooth: Check L2CAP option sizes returned from l2cap_get_conf_opt @@ -754,6 +756,11 @@ Outstanding CVEs: CVE-2020-36558: (unk) vt: vt_ioctl: fix race in VT_RESIZEX CVE-2020-36691: (unk) netlink: limit recursion depth in policy validation CVE-2020-36766: (unk) cec-api: prevent leaking memory through hole in structure + CVE-2020-36775: (unk) f2fs: fix to avoid potential deadlock + CVE-2020-36777: (unk) media: dvbdev: Fix memory leak in dvb_media_device_free() + CVE-2020-36780: (unk) i2c: sprd: fix reference leak when pm_runtime_get_sync fails + CVE-2020-36781: (unk) i2c: imx: fix reference leak when pm_runtime_get_sync fails + CVE-2020-36784: (unk) i2c: cadence: fix reference leak when pm_runtime_get_sync fails CVE-2020-3702: (unk) ath: Use safer key clearing with key cache entries CVE-2020-4788: (unk) powerpc/64s: flush L1D on kernel entry CVE-2020-8647: (unk) vgacon: Fix a UAF in vgacon_invert_region @@ -896,6 +903,93 @@ Outstanding CVEs: CVE-2021-45485: (unk) ipv6: use prandom_u32() for ID generation CVE-2021-45486: (unk) inet: use bigger hash table for IP ID generation CVE-2021-45868: (unk) quota: check block number when reading the block in quota file + CVE-2021-46904: (unk) net: hso: fix null-ptr-deref during tty device unregistration + CVE-2021-46906: (unk) HID: usbhid: fix info leak in hid_submit_ctrl + CVE-2021-46908: (unk) bpf: Use correct permission flag for mixed signed bounds arithmetic + CVE-2021-46924: (unk) NFC: st21nfca: Fix memory leak in device probe and remove + CVE-2021-46926: (unk) ALSA: hda: intel-sdw-acpi: harden detection of controller + CVE-2021-46928: (unk) parisc: Clear stale IIR value on instruction access rights trap + CVE-2021-46932: (unk) Input: appletouch - initialize work before device registration + CVE-2021-46933: (unk) usb: gadget: f_fs: Clear ffs_eventfd in ffs_data_clear. + CVE-2021-46936: (unk) net: fix use-after-free in tw_timer_handler + CVE-2021-46938: (unk) dm rq: fix double free of blk_mq_tag_set in dev remove after table load fails + CVE-2021-46939: (unk) tracing: Restructure trace_clock_global() to never block + CVE-2021-46950: (unk) md/raid1: properly indicate failure when ending a failed write request + CVE-2021-46951: (unk) tpm: efi: Use local variable for calculating final log size + CVE-2021-46952: (unk) NFS: fs_context: validate UDP retrans to prevent shift out-of-bounds + CVE-2021-46959: (unk) spi: Fix use-after-free with devm_spi_alloc_* + CVE-2021-46962: (unk) mmc: uniphier-sd: Fix a resource leak in the remove function + CVE-2021-46965: (unk) mtd: physmap: physmap-bt1-rom: Fix unintentional stack access + CVE-2021-46969: (unk) bus: mhi: core: Fix invalid error returning in mhi_queue + CVE-2021-46970: (unk) bus: mhi: pci_generic: Remove WQ_MEM_RECLAIM flag from state workqueue + CVE-2021-46982: (unk) f2fs: compress: fix race condition of overwrite vs truncate + CVE-2021-46992: (unk) netfilter: nftables: avoid overflows in nft_hash_buckets() + CVE-2021-47006: (unk) ARM: 9064/1: hw_breakpoint: Do not directly check the event's overflow_handler hook + CVE-2021-47013: (unk) net:emac/emac-mac: Fix a use after free in emac_mac_tx_buf_send + CVE-2021-47028: (unk) mt76: mt7915: fix txrate reporting + CVE-2021-47046: (unk) drm/amd/display: Fix off by one in hdmi_14_process_transaction() + CVE-2021-47052: (unk) crypto: sa2ul - Fix memory leak of rxd + CVE-2021-47054: (unk) bus: qcom: Put child node before return + CVE-2021-47056: (unk) crypto: qat - ADF_STATUS_PF_RUNNING should be set after adf_dev_init + CVE-2021-47059: (unk) crypto: sun8i-ss - fix result memory leak on error path + CVE-2021-47065: (unk) rtw88: Fix array overrun in rtw_get_tx_power_params() + CVE-2021-47070: (unk) uio_hv_generic: Fix another memory leak in error handling paths + CVE-2021-47074: (unk) nvme-loop: fix memory leak in nvme_loop_create_ctrl() + CVE-2021-47075: (unk) nvmet: fix memory leak in nvmet_alloc_ctrl() + CVE-2021-47076: (unk) RDMA/rxe: Return CQE error if invalid lkey was supplied + CVE-2021-47078: (unk) RDMA/rxe: Clear all QP fields if creation failed + CVE-2021-47082: (unk) tun: avoid double free in tun_free_netdev + CVE-2021-47083: (unk) pinctrl: mediatek: fix global-out-of-bounds issue + CVE-2021-47086: (unk) phonet/pep: refuse to enable an unbound pipe + CVE-2021-47101: (unk) asix: fix uninit-value in asix_mdio_read() + CVE-2021-47103: (unk) inet: fully convert sk->sk_rx_dst to RCU rules + CVE-2021-47110: (unk) x86/kvm: Disable kvmclock on all CPUs on shutdown + CVE-2021-47112: (unk) x86/kvm: Teardown PV features on boot CPU as well + CVE-2021-47113: (unk) btrfs: abort in rename_exchange if we fail to insert the second ref + CVE-2021-47114: (unk) ocfs2: fix data corruption by fallocate + CVE-2021-47116: (unk) ext4: fix memory leak in ext4_mb_init_backend on error path. + CVE-2021-47117: (unk) ext4: fix bug on in ext4_es_cache_extent as ext4_split_extent_at failed + CVE-2021-47118: (unk) pid: take a reference when initializing `cad_pid` + CVE-2021-47119: (unk) ext4: fix memory leak in ext4_fill_super + CVE-2021-47121: (unk) net: caif: fix memory leak in cfusbl_device_notify + CVE-2021-47122: (unk) net: caif: fix memory leak in caif_device_notify + CVE-2021-47124: (unk) io_uring: fix link timeout refs + CVE-2021-47125: (unk) sch_htb: fix refcount leak in htb_parent_to_leaf_offload + CVE-2021-47128: (unk) bpf, lockdown, audit: Fix buggy SELinux lockdown permission checks + CVE-2021-47131: (unk) net/tls: Fix use-after-free after the TLS device goes down and up + CVE-2021-47133: (unk) HID: amd_sfh: Fix memory leak in amd_sfh_work + CVE-2021-47135: (unk) mt76: mt7921: fix possible AOOB issue in mt7921_mcu_tx_rate_report + CVE-2021-47136: (unk) net: zero-initialize tc skb extension on allocation + CVE-2021-47137: (unk) net: lantiq: fix memory corruption in RX ring + CVE-2021-47140: (unk) iommu/amd: Clear DMA ops when switching domain + CVE-2021-47142: (unk) drm/amdgpu: Fix a use-after-free + CVE-2021-47143: (unk) net/smc: remove device from smcd_dev_list after failed device_add() + CVE-2021-47144: (unk) drm/amd/amdgpu: fix refcount leak + CVE-2021-47145: (unk) btrfs: do not BUG_ON in link_to_fixup_dir + CVE-2021-47146: (unk) mld: fix panic in mld_newpack() + CVE-2021-47147: (unk) ptp: ocp: Fix a resource leak in an error handling path + CVE-2021-47149: (unk) net: fujitsu: fix potential null-ptr-deref + CVE-2021-47150: (unk) net: fec: fix the potential memory leak in fec_enet_init() + CVE-2021-47151: (unk) interconnect: qcom: bcm-voter: add a missing of_node_put() + CVE-2021-47153: (unk) i2c: i801: Don't generate an interrupt on bus reset + CVE-2021-47158: (unk) net: dsa: sja1105: add error handling in sja1105_setup() + CVE-2021-47159: (unk) net: dsa: fix a crash if ->get_sset_count() fails + CVE-2021-47160: (unk) net: dsa: mt7530: fix VLAN traffic leaks + CVE-2021-47161: (unk) spi: spi-fsl-dspi: Fix a resource leak in an error handling path + CVE-2021-47162: (unk) tipc: skb_linearize the head skb when reassembling msgs + CVE-2021-47163: (unk) tipc: wait and exit until all work queues are done + CVE-2021-47165: (unk) drm/meson: fix shutdown crash when component not probed + CVE-2021-47166: (unk) NFS: Don't corrupt the value of pg_bytes_written in nfs_do_recoalesce() + CVE-2021-47167: (unk) NFS: Fix an Oopsable condition in __nfs_pageio_add_request() + CVE-2021-47168: (unk) NFS: fix an incorrect limit in filelayout_decode_layout() + CVE-2021-47169: (unk) serial: rp2: use 'request_firmware' instead of 'request_firmware_nowait' + CVE-2021-47170: (unk) USB: usbfs: Don't WARN about excessively large memory allocations + CVE-2021-47171: (unk) net: usb: fix memory leak in smsc75xx_bind + CVE-2021-47172: (unk) iio: adc: ad7124: Fix potential overflow due to non sequential channel numbers + CVE-2021-47173: (unk) misc/uss720: fix memory leak in uss720_probe + CVE-2021-47175: (unk) net/sched: fq_pie: fix OOB access in the traffic path + CVE-2021-47179: (unk) NFSv4: Fix a NULL pointer dereference in pnfs_mark_matching_lsegs_return() + CVE-2021-47180: (unk) NFC: nci: fix memory leak in nci_allocate_device CVE-2022-0001: (unk) x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE CVE-2022-0002: (unk) x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE CVE-2022-0168: (unk) cifs: fix NULL ptr dereference in smb2_ioctl_query_info() @@ -1076,6 +1170,9 @@ Outstanding CVEs: CVE-2022-47520: (unk) wifi: wilc1000: validate pairwise and authentication suite offsets CVE-2022-47929: (unk) net: sched: disallow noqueue for qdisc classes CVE-2022-48619: (unk) Input: add bounds checking to input_set_capability() + CVE-2022-48626: (unk) moxart: fix potential use-after-free on remove path + CVE-2022-48627: (unk) vt: fix memory overlapping when deleting chars in the buffer + CVE-2022-48628: (unk) ceph: drop messages from MDS when unmounting CVE-2023-0030: (unk) drm/nouveau/mmu: add more general vmm free/node handling functions CVE-2023-0047: (unk) mm, oom: do not trigger out_of_memory from the #PF CVE-2023-0266: (unk) ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF @@ -1130,6 +1227,7 @@ Outstanding CVEs: CVE-2023-26607: (unk) ntfs: fix out-of-bounds read in ntfs_attr_find() CVE-2023-28328: (unk) media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer() CVE-2023-2860: (unk) ipv6: sr: fix out-of-bounds read when setting HMAC data. + CVE-2023-28746: (unk) x86/mmio: Disable KVM mitigation when X86_FEATURE_CLEAR_CPU_BUF is set CVE-2023-28772: (unk) seq_buf: Fix overflow in seq_buf_putmem_hex() CVE-2023-2985: (unk) fs: hfsplus: fix UAF issue in hfsplus_put_super CVE-2023-3006: (unk) arm64: Add AMPERE1 to the Spectre-BHB affected list @@ -1196,7 +1294,7 @@ Outstanding CVEs: CVE-2023-4623: (unk) net/sched: sch_hfsc: Ensure inner classes have fsc curve CVE-2023-46343: (unk) nfc: nci: fix possible NULL pointer dereference in send_acknowledge() CVE-2023-46838: (unk) xen-netback: don't produce zero-size SKB frags - CVE-2023-47233: (unk) + CVE-2023-47233: (unk) wifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach CVE-2023-4881: (unk) netfilter: nftables: exthdr: fix 4-byte stack OOB write CVE-2023-4921: (unk) net: sched: sch_qfq: Fix UAF in qfq_dequeue() CVE-2023-51043: (unk) drm/atomic: Fix potential use-after-free in nonblocking commits @@ -1215,24 +1313,112 @@ Outstanding CVEs: CVE-2023-52445: (unk) media: pvrusb2: fix use after free on context disconnection CVE-2023-52449: (unk) mtd: Fix gluebi NULL pointer dereference caused by ftl notifier CVE-2023-52451: (unk) powerpc/pseries/memhp: Fix access beyond end of drmem array - CVE-2023-52456: (unk) serial: imx: fix tx statemachine deadlock - CVE-2023-52457: (unk) serial: 8250: omap: Don't skip resource freeing if pm_runtime_resume_and_get() failed CVE-2023-52458: (unk) block: add check that partition length needs to be aligned with block size + CVE-2023-52469: (unk) drivers/amd/pm: fix a use-after-free in kv_parse_power_table + CVE-2023-52470: (unk) drm/radeon: check the alloc_workqueue return value in radeon_crtc_init() + CVE-2023-52475: (unk) Input: powermate - fix use-after-free in powermate_config_complete + CVE-2023-52476: (unk) perf/x86/lbr: Filter vsyscall addresses + CVE-2023-52477: (unk) usb: hub: Guard against accesses to uninitialized BOS descriptors + CVE-2023-52478: (unk) HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect + CVE-2023-52479: (unk) ksmbd: fix uaf in smb20_oplock_break_ack + CVE-2023-52480: (unk) ksmbd: fix race condition between session lookup and expire + CVE-2023-52481: (unk) arm64: errata: Add Cortex-A520 speculative unprivileged load workaround + CVE-2023-52482: (unk) x86/srso: Add SRSO mitigation for Hygon processors + CVE-2023-52484: (unk) iommu/arm-smmu-v3: Fix soft lockup triggered by arm_smmu_mm_invalidate_range + CVE-2023-52485: (unk) drm/amd/display: Wake DMCUB before sending a command + CVE-2023-52486: (unk) drm: Don't unref the same fb many times by mistake due to deadlock handling + CVE-2023-52488: (unk) serial: sc16is7xx: convert from _raw_ to _noinc_ regmap functions for FIFO + CVE-2023-52489: (unk) mm/sparsemem: fix race in accessing memory_section->usage + CVE-2023-52498: (unk) PM: sleep: Fix possible deadlocks in core system-wide PM code + CVE-2023-52500: (unk) scsi: pm80xx: Avoid leaking tags when processing OPC_INB_SET_CONTROLLER_CONFIG command + CVE-2023-52501: (unk) ring-buffer: Do not attempt to read past "commit" + CVE-2023-52502: (unk) net: nfc: fix races in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn() + CVE-2023-52506: (unk) LoongArch: Set all reserved memblocks on Node#0 at initialization + CVE-2023-52507: (unk) nfc: nci: assert requested protocol is valid + CVE-2023-52508: (unk) nvme-fc: Prevent null pointer dereference in nvme_fc_io_getuuid() + CVE-2023-52509: (unk) ravb: Fix use-after-free issue in ravb_tx_timeout_work() + CVE-2023-52511: (unk) spi: sun6i: reduce DMA RX transfer width to single byte + CVE-2023-52515: (unk) RDMA/srp: Do not call scsi_done() from srp_abort() + CVE-2023-52516: (unk) dma-debug: don't call __dma_entry_alloc_check_leak() under free_entries_lock + CVE-2023-52517: (unk) spi: sun6i: fix race between DMA RX transfer completion and RX FIFO drain + CVE-2023-52519: (unk) HID: intel-ish-hid: ipc: Disable and reenable ACPI GPE bit + CVE-2023-52522: (unk) net: fix possible store tearing in neigh_periodic_work() + CVE-2023-52527: (unk) ipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data() + CVE-2023-52528: (unk) net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg + CVE-2023-52531: (unk) wifi: iwlwifi: mvm: Fix a memory corruption issue + CVE-2023-52532: (unk) net: mana: Fix TX CQE error handling + CVE-2023-52559: (unk) iommu/vt-d: Avoid memory allocation in iommu_suspend() + CVE-2023-52561: (unk) arm64: dts: qcom: sdm845-db845c: Mark cont splash memory region as reserved + CVE-2023-52563: (unk) drm/meson: fix memory leak on ->hpd_notify callback + CVE-2023-52565: (unk) media: uvcvideo: Fix OOB read + CVE-2023-52566: (unk) nilfs2: fix potential use after free in nilfs_gccache_submit_read_data() + CVE-2023-52568: (unk) x86/sgx: Resolves SECS reclaim vs. page fault for EAUG race + CVE-2023-52569: (unk) btrfs: remove BUG() after failure to insert delayed dir index item + CVE-2023-52571: (unk) power: supply: rk817: Fix node refcount leak + CVE-2023-52572: (unk) cifs: Fix UAF in cifs_demultiplex_thread() + CVE-2023-52574: (unk) team: fix null-ptr-deref when team device type is changed + CVE-2023-52578: (unk) net: bridge: use DEV_STATS_INC() + CVE-2023-52583: (unk) ceph: fix deadlock or deadcode of misusing dget() + CVE-2023-52584: (unk) spmi: mediatek: Fix UAF on device remove + CVE-2023-52585: (unk) drm/amdgpu: Fix possible NULL dereference in amdgpu_ras_query_error_status_helper() + CVE-2023-52586: (unk) drm/msm/dpu: Add mutex lock in control vblank irq + CVE-2023-52587: (unk) IB/ipoib: Fix mcast list locking + CVE-2023-52588: (unk) f2fs: fix to tag gcing flag on page during block migration + CVE-2023-52589: (unk) media: rkisp1: Fix IRQ disable race issue + CVE-2023-52590: (unk) ocfs2: Avoid touching renamed directory if parent does not change + CVE-2023-52591: (unk) reiserfs: Avoid touching renamed directory if parent does not change + CVE-2023-52593: (unk) wifi: wfx: fix possible NULL pointer dereference in wfx_set_mfp_ap() + CVE-2023-52594: (unk) wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus() + CVE-2023-52595: (unk) wifi: rt2x00: restart beacon queue when hardware reset + CVE-2023-52596: (unk) sysctl: Fix out of bounds access for empty sysctl registers + CVE-2023-52597: (unk) KVM: s390: fix setting of fpc register + CVE-2023-52598: (unk) s390/ptrace: handle setting of fpc register correctly + CVE-2023-52599: (unk) jfs: fix array-index-out-of-bounds in diNewExt + CVE-2023-52600: (unk) jfs: fix uaf in jfs_evict_inode + CVE-2023-52601: (unk) jfs: fix array-index-out-of-bounds in dbAdjTree + CVE-2023-52602: (unk) jfs: fix slab-out-of-bounds Read in dtSearch + CVE-2023-52603: (unk) UBSAN: array-index-out-of-bounds in dtSplitRoot + CVE-2023-52604: (unk) FS:JFS:UBSAN:array-index-out-of-bounds in dbAdjTree + CVE-2023-52606: (unk) powerpc/lib: Validate size for vector operations + CVE-2023-52607: (unk) powerpc/mm: Fix null-pointer dereference in pgtable_cache_add + CVE-2023-52609: (unk) binder: fix race between mmput() and do_exit() + CVE-2023-52612: (unk) crypto: scomp - fix req->dst buffer overflow + CVE-2023-52614: (unk) PM / devfreq: Fix buffer overflow in trans_stat_show + CVE-2023-52615: (unk) hwrng: core - Fix page fault dead lock on mmap-ed hwrng + CVE-2023-52617: (unk) PCI: switchtec: Fix stdev_release() crash after surprise hot remove + CVE-2023-52618: (unk) block/rnbd-srv: Check for unlikely string overflow + CVE-2023-52619: (unk) pstore/ram: Fix crash when setting number of cpus to an odd number + CVE-2023-52620: (unk) netfilter: nf_tables: disallow timeout for anonymous sets + CVE-2023-52621: (unk) bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers + CVE-2023-52622: (unk) ext4: avoid online resizing failures due to oversized flex bg + CVE-2023-52623: (unk) SUNRPC: Fix a suspicious RCU usage warning + CVE-2023-52624: (unk) drm/amd/display: Wake DMCUB before executing GPINT commands + CVE-2023-52625: (unk) drm/amd/display: Refactor DMCUB enter/exit idle interface + CVE-2023-52628: (unk) netfilter: nftables: exthdr: fix 4-byte stack OOB write + CVE-2023-52629: (unk) sh: push-switch: Reorder cleanup operations to avoid use-after-free bug + CVE-2023-52632: (unk) drm/amdkfd: Fix lock dependency warning with srcu + CVE-2023-52633: (unk) um: time-travel: fix time corruption + CVE-2023-52634: (unk) drm/amd/display: Fix disable_otg_wa logic + CVE-2023-52635: (unk) PM / devfreq: Synchronize devfreq_monitor_[start/stop] + CVE-2023-52638: (unk) can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock + CVE-2023-52639: (unk) KVM: s390: vsie: fix race during shadow creation + CVE-2023-52640: (unk) fs/ntfs3: Fix oob in ntfs_listxattr + CVE-2023-52641: (unk) fs/ntfs3: Add NULL ptr dereference checking at the end of attr_allocate_frame() CVE-2023-5717: (unk) perf: Disallow mis-matched inherited group reads CVE-2023-6040: (unk) netfilter: nf_tables: Reject tables of unsupported family CVE-2023-6121: (unk) nvmet: nul-terminate the NQNs passed in the connect command CVE-2023-6240: (unk) - CVE-2023-6270: (unk) - CVE-2023-6356: (unk) + CVE-2023-6270: (unk) aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts + CVE-2023-6356: (unk) nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length CVE-2023-6535: (unk) - CVE-2023-6536: (unk) + CVE-2023-6536: (unk) nvmet-tcp: fix a crash in nvmet_req_complete() CVE-2023-6546: (unk) tty: n_gsm: fix the UAF caused by race condition in gsm_cleanup_mux CVE-2023-6606: (unk) smb: client: fix OOB in smbCalcSize() CVE-2023-6610: (unk) smb: client: fix potential OOB in smb2_dump_detail() CVE-2023-6915: (unk) ida: Fix crash in ida_free when the bitmap is empty CVE-2023-6931: (unk) perf: Fix perf_event_validate_size() CVE-2023-6932: (unk) ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet - CVE-2023-7042: (unk) + CVE-2023-7042: (unk) wifi: ath10k: fix NULL pointer dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev() CVE-2023-7192: (unk) netfilter: ctnetlink: fix possible refcount leak in ctnetlink_create_conntrack() CVE-2024-0340: (unk) vhost: use kzalloc() instead of kmalloc() followed by memset() CVE-2024-0584: (unk) ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet @@ -1241,10 +1427,11 @@ Outstanding CVEs: CVE-2024-1086: (unk) netfilter: nf_tables: reject QUEUE/DROP verdict parameters CVE-2024-1312: (unk) mm: lock_vma_under_rcu() must check vma->anon_vma under vma lock CVE-2024-21803: (unk) - CVE-2024-22099: (unk) + CVE-2024-2193: (unk) + CVE-2024-22099: (unk) Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security CVE-2024-22386: (unk) - CVE-2024-23196: (unk) - CVE-2024-23307: (unk) + CVE-2024-23196: (unk) ALSA: hda: fix a possible null-pointer dereference due to data race in snd_hdac_regmap_sync() + CVE-2024-23307: (unk) md/raid5: fix atomicity violation in raid5_cache_count CVE-2024-23848: (unk) CVE-2024-23851: (unk) dm: limit the number of targets and parameter size area CVE-2024-24855: (unk) scsi: lpfc: Fix a possible data race in lpfc_unregister_fcf_rescan() @@ -1252,16 +1439,106 @@ Outstanding CVEs: CVE-2024-24858: (unk) CVE-2024-24859: (unk) CVE-2024-24860: (unk) Bluetooth: Fix atomicity violation in {min,max}_key_size_set - CVE-2024-24861: (unk) + CVE-2024-24861: (unk) media: xc4000: Fix atomicity violation in xc4000_get_frequency CVE-2024-24864: (unk) CVE-2024-25739: (unk) CVE-2024-25740: (unk) CVE-2024-25741: (unk) CVE-2024-25744: (unk) x86/coco: Disable 32-bit emulation by default on TDX and SEV - CVE-2024-26584: (unk) net: tls: handle backlogging of crypto requests - CVE-2024-26587: (unk) net: netdevsim: don't try to destroy PHC on VFs - CVE-2024-26588: (unk) LoongArch: BPF: Prevent out-of-bounds memory access - CVE-2024-26591: (unk) bpf: Fix re-attachment branch in bpf_tracing_prog_attach CVE-2024-26592: (unk) ksmbd: fix UAF issue in ksmbd_tcp_new_connection() CVE-2024-26594: (unk) ksmbd: validate mech token in session setup CVE-2024-26598: (unk) KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache + CVE-2024-26600: (unk) phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP + CVE-2024-26606: (unk) binder: signal epoll threads of self-work + CVE-2024-26614: (unk) tcp: make sure init the accept_queue's spinlocks once + CVE-2024-26622: (unk) tomoyo: fix UAF write bug in tomoyo_write_control() + CVE-2024-26623: (unk) pds_core: Prevent race issues involving the adminq + CVE-2024-26625: (unk) llc: call sock_orphan() at release time + CVE-2024-26627: (unk) scsi: core: Move scsi_host_busy() out of host lock for waking up EH handler + CVE-2024-26633: (unk) ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim() + CVE-2024-26635: (unk) llc: Drop support for ETH_P_TR_802_2. + CVE-2024-26636: (unk) llc: make llc_ui_sendmsg() more robust against bonding changes + CVE-2024-26641: (unk) ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv() + CVE-2024-26642: (unk) netfilter: nf_tables: disallow anonymous set with timeout flag + CVE-2024-26644: (unk) btrfs: don't abort filesystem when attempting to snapshot deleted subvolume + CVE-2024-26646: (unk) thermal: intel: hfi: Add syscore callbacks for system-wide PM + CVE-2024-26647: (unk) drm/amd/display: Fix late derefrence 'dsc' check in 'link_set_dsc_pps_packet()' + CVE-2024-26648: (unk) drm/amd/display: Fix variable deferencing before NULL check in edp_setup_replay() + CVE-2024-26650: (unk) platform/x86: p2sb: Allow p2sb_bar() calls during PCI device probe + CVE-2024-26651: (unk) sr9800: Add check for usbnet_get_endpoints + CVE-2024-26654: (unk) ALSA: sh: aica: reorder cleanup operations to avoid UAF bugs + CVE-2024-26655: (unk) Fix memory leak in posix_clock_open() + CVE-2024-26656: (unk) drm/amdgpu: fix use-after-free bug + CVE-2024-26658: (unk) bcachefs: grab s_umount only if snapshotting + CVE-2024-26659: (unk) xhci: handle isoc Babble and Buffer Overrun events properly + CVE-2024-26663: (unk) tipc: Check the bearer type before calling tipc_udp_nl_bearer_add() + CVE-2024-26664: (unk) hwmon: (coretemp) Fix out-of-bounds memory access + CVE-2024-26668: (unk) netfilter: nft_limit: reject configurations that cause integer overflow + CVE-2024-26671: (unk) blk-mq: fix IO hang from sbitmap wakeup race + CVE-2024-26672: (unk) drm/amdgpu: Fix variable 'mca_funcs' dereferenced before NULL check in 'amdgpu_mca_smu_get_mca_entry()' + CVE-2024-26675: (unk) ppp_async: limit MRU to 64K + CVE-2024-26676: (unk) af_unix: Call kfree_skb() for dead unix_(sk)->oob_skb in GC. + CVE-2024-26677: (unk) rxrpc: Fix delayed ACKs to not set the reference serial number + CVE-2024-26679: (unk) inet: read sk->sk_family once in inet_recv_error() + CVE-2024-26685: (unk) nilfs2: fix potential bug in end_buffer_async_write + CVE-2024-26686: (unk) fs/proc: do_task_stat: use sig->stats_lock to gather the threads/children stats + CVE-2024-26687: (unk) xen/events: close evtchn after mapping cleanup + CVE-2024-26689: (unk) ceph: prevent use-after-free in encode_cap_msg() + CVE-2024-26691: (unk) KVM: arm64: Fix circular locking dependency + CVE-2024-26696: (unk) nilfs2: fix hang in nilfs_lookup_dirty_data_buffers() + CVE-2024-26697: (unk) nilfs2: fix data corruption in dsync block recovery for small block sizes + CVE-2024-26699: (unk) drm/amd/display: Fix array-index-out-of-bounds in dcn35_clkmgr + CVE-2024-26700: (unk) drm/amd/display: Fix MST Null Ptr for RV + CVE-2024-26704: (unk) ext4: fix double-free of blocks due to wrong extents moved_len + CVE-2024-26706: (unk) parisc: Fix random data corruption from exception handler + CVE-2024-26713: (unk) powerpc/pseries/iommu: Fix iommu initialisation during DLPAR add + CVE-2024-26715: (unk) usb: dwc3: gadget: Fix NULL pointer dereference in dwc3_gadget_suspend + CVE-2024-26719: (unk) nouveau: offload fence uevents work to workqueue + CVE-2024-26720: (unk) mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again + CVE-2024-26726: (unk) btrfs: don't drop extent_map for free space inode on write error + CVE-2024-26733: (unk) arp: Prevent overflow in arp_req_get(). + CVE-2024-26735: (unk) ipv6: sr: fix possible use-after-free and null-ptr-deref + CVE-2024-26738: (unk) powerpc/pseries/iommu: DLPAR add doesn't completely initialize pci_controller + CVE-2024-26739: (unk) net/sched: act_mirred: don't override retval if we already lost the skb + CVE-2024-26740: (unk) net/sched: act_mirred: use the backlog for mirred ingress + CVE-2024-26743: (unk) RDMA/qedr: Fix qedr_create_user_qp error flow + CVE-2024-26744: (unk) RDMA/srpt: Support specifying the srpt_service_guid parameter + CVE-2024-26745: (unk) powerpc/pseries/iommu: IOMMU table is not initialized for kdump over SR-IOV + CVE-2024-26748: (unk) usb: cdns3: fix memory double free when handle zero packet + CVE-2024-26752: (unk) l2tp: pass correct message length to ip6_append_data + CVE-2024-26754: (unk) gtp: fix use-after-free and null-ptr-deref in gtp_genl_dump_pdp() + CVE-2024-26756: (unk) md: Don't register sync_thread for reshape directly + CVE-2024-26757: (unk) md: Don't ignore read-only array in md_check_recovery() + CVE-2024-26758: (unk) md: Don't ignore suspended array in md_check_recovery() + CVE-2024-26759: (unk) mm/swap: fix race when skipping swapcache + CVE-2024-26763: (unk) dm-crypt: don't modify the data when using authenticated encryption + CVE-2024-26764: (unk) fs/aio: Restrict kiocb_set_cancel_fn() to I/O submitted via libaio + CVE-2024-26765: (unk) LoongArch: Disable IRQ before init_fn() for nonboot CPUs + CVE-2024-26766: (unk) IB/hfi1: Fix sdma.h tx->num_descs off-by-one error + CVE-2024-26767: (unk) drm/amd/display: fixed integer types and null check locations + CVE-2024-26768: (unk) LoongArch: Change acpi_core_pic[NR_CPUS] to acpi_core_pic[MAX_CORE_PIC] + CVE-2024-26769: (unk) nvmet-fc: avoid deadlock on delete association path + CVE-2024-26770: (unk) HID: nvidia-shield: Add missing null pointer checks to LED initialization + CVE-2024-26771: (unk) dmaengine: ti: edma: Add some null pointer checks to the edma_probe + CVE-2024-26772: (unk) ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal() + CVE-2024-26773: (unk) ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found() + CVE-2024-26774: (unk) ext4: avoid dividing by 0 in mb_update_avg_fragment_size() when block bitmap corrupt + CVE-2024-26775: (unk) aoe: avoid potential deadlock at set_capacity + CVE-2024-26776: (unk) spi: hisi-sfc-v3xx: Return IRQ_NONE if no interrupts were detected + CVE-2024-26777: (unk) fbdev: sis: Error out if pixclock equals zero + CVE-2024-26778: (unk) fbdev: savage: Error out if pixclock equals zero + CVE-2024-26779: (unk) wifi: mac80211: fix race condition on enabling fast-xmit + CVE-2024-26784: (unk) pmdomain: arm: Fix NULL dereference on scmi_perf_domain removal + CVE-2024-26789: (unk) crypto: arm64/neonbs - fix out-of-bounds access on short input + CVE-2024-26791: (unk) btrfs: dev-replace: properly validate device names + CVE-2024-26793: (unk) gtp: fix use-after-free and null-ptr-deref in gtp_newlink() + CVE-2024-26797: (unk) drm/amd/display: Prevent potential buffer overflow in map_hw_resources + CVE-2024-26798: (unk) fbcon: always restore the old font data in fbcon_do_set_font() + CVE-2024-26801: (unk) Bluetooth: Avoid potential use-after-free in hci_error_reset + CVE-2024-26802: (unk) stmmac: Clear variable when destroying workqueue + CVE-2024-26803: (unk) net: veth: clear GRO when clearing XDP even when down + CVE-2024-26804: (unk) net: ip_tunnel: prevent perpetual headroom growth + CVE-2024-26805: (unk) netlink: Fix kernel-infoleak-after-free in __skb_datagram_iter + CVE-2024-26806: (unk) spi: cadence-qspi: remove system-wide suspend helper calls from runtime PM hooks + CVE-2024-26808: (unk) netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain + CVE-2024-26809: (unk) netfilter: nft_set_pipapo: release elements in clone only from destroy path diff --git a/data/4.11/4.11_CVEs.txt b/data/4.11/4.11_CVEs.txt index f193bf5cb..840bad300 100644 --- a/data/4.11/4.11_CVEs.txt +++ b/data/4.11/4.11_CVEs.txt @@ -503,6 +503,8 @@ CVE-2019-2181: Fix not seen in stream CVE-2019-2182: Fix not seen in stream CVE-2019-2213: Fix not seen in stream CVE-2019-2215: Fix not seen in stream +CVE-2019-25160: Fix not seen in stream +CVE-2019-25162: Fix not seen in stream CVE-2019-3016: Fix not seen in stream CVE-2019-3459: Fix not seen in stream CVE-2019-3460: Fix not seen in stream @@ -689,6 +691,11 @@ CVE-2020-36557: Fix not seen in stream CVE-2020-36558: Fix not seen in stream CVE-2020-36691: Fix not seen in stream CVE-2020-36766: Fix not seen in stream +CVE-2020-36775: Fix not seen in stream +CVE-2020-36777: Fix not seen in stream +CVE-2020-36780: Fix not seen in stream +CVE-2020-36781: Fix not seen in stream +CVE-2020-36784: Fix not seen in stream CVE-2020-3702: Fix not seen in stream CVE-2020-4788: Fix not seen in stream CVE-2020-8647: Fix not seen in stream @@ -832,6 +839,98 @@ CVE-2021-45469: Fix not seen in stream CVE-2021-45485: Fix not seen in stream CVE-2021-45486: Fix not seen in stream CVE-2021-45868: Fix not seen in stream +CVE-2021-46904: Fix not seen in stream +CVE-2021-46906: Fix not seen in stream +CVE-2021-46908: Fix not seen in stream +CVE-2021-46924: Fix not seen in stream +CVE-2021-46925: Fix not seen in stream +CVE-2021-46926: Fix not seen in stream +CVE-2021-46928: Fix not seen in stream +CVE-2021-46932: Fix not seen in stream +CVE-2021-46933: Fix not seen in stream +CVE-2021-46936: Fix not seen in stream +CVE-2021-46938: Fix not seen in stream +CVE-2021-46939: Fix not seen in stream +CVE-2021-46950: Fix not seen in stream +CVE-2021-46951: Fix not seen in stream +CVE-2021-46952: Fix not seen in stream +CVE-2021-46959: Fix not seen in stream +CVE-2021-46960: Fix not seen in stream +CVE-2021-46962: Fix not seen in stream +CVE-2021-46965: Fix not seen in stream +CVE-2021-46969: Fix not seen in stream +CVE-2021-46970: Fix not seen in stream +CVE-2021-46982: Fix not seen in stream +CVE-2021-46988: Fix not seen in stream +CVE-2021-46992: Fix not seen in stream +CVE-2021-47006: Fix not seen in stream +CVE-2021-47013: Fix not seen in stream +CVE-2021-47028: Fix not seen in stream +CVE-2021-47046: Fix not seen in stream +CVE-2021-47052: Fix not seen in stream +CVE-2021-47054: Fix not seen in stream +CVE-2021-47056: Fix not seen in stream +CVE-2021-47059: Fix not seen in stream +CVE-2021-47065: Fix not seen in stream +CVE-2021-47070: Fix not seen in stream +CVE-2021-47074: Fix not seen in stream +CVE-2021-47075: Fix not seen in stream +CVE-2021-47076: Fix not seen in stream +CVE-2021-47077: Fix not seen in stream +CVE-2021-47078: Fix not seen in stream +CVE-2021-47082: Fix not seen in stream +CVE-2021-47083: Fix not seen in stream +CVE-2021-47086: Fix not seen in stream +CVE-2021-47101: Fix not seen in stream +CVE-2021-47103: Fix not seen in stream +CVE-2021-47110: Fix not seen in stream +CVE-2021-47112: Fix not seen in stream +CVE-2021-47113: Fix not seen in stream +CVE-2021-47114: Fix not seen in stream +CVE-2021-47116: Fix not seen in stream +CVE-2021-47117: Fix not seen in stream +CVE-2021-47118: Fix not seen in stream +CVE-2021-47119: Fix not seen in stream +CVE-2021-47121: Fix not seen in stream +CVE-2021-47122: Fix not seen in stream +CVE-2021-47124: Fix not seen in stream +CVE-2021-47125: Fix not seen in stream +CVE-2021-47128: Fix not seen in stream +CVE-2021-47131: Fix not seen in stream +CVE-2021-47133: Fix not seen in stream +CVE-2021-47135: Fix not seen in stream +CVE-2021-47136: Fix not seen in stream +CVE-2021-47137: Fix not seen in stream +CVE-2021-47140: Fix not seen in stream +CVE-2021-47142: Fix not seen in stream +CVE-2021-47143: Fix not seen in stream +CVE-2021-47144: Fix not seen in stream +CVE-2021-47145: Fix not seen in stream +CVE-2021-47146: Fix not seen in stream +CVE-2021-47147: Fix not seen in stream +CVE-2021-47149: Fix not seen in stream +CVE-2021-47150: Fix not seen in stream +CVE-2021-47151: Fix not seen in stream +CVE-2021-47153: Fix not seen in stream +CVE-2021-47158: Fix not seen in stream +CVE-2021-47159: Fix not seen in stream +CVE-2021-47160: Fix not seen in stream +CVE-2021-47161: Fix not seen in stream +CVE-2021-47162: Fix not seen in stream +CVE-2021-47163: Fix not seen in stream +CVE-2021-47165: Fix not seen in stream +CVE-2021-47166: Fix not seen in stream +CVE-2021-47167: Fix not seen in stream +CVE-2021-47168: Fix not seen in stream +CVE-2021-47169: Fix not seen in stream +CVE-2021-47170: Fix not seen in stream +CVE-2021-47171: Fix not seen in stream +CVE-2021-47172: Fix not seen in stream +CVE-2021-47173: Fix not seen in stream +CVE-2021-47175: Fix not seen in stream +CVE-2021-47177: Fix not seen in stream +CVE-2021-47179: Fix not seen in stream +CVE-2021-47180: Fix not seen in stream CVE-2022-0001: Fix not seen in stream CVE-2022-0002: Fix not seen in stream CVE-2022-0168: Fix not seen in stream @@ -1014,6 +1113,9 @@ CVE-2022-4744: Fix not seen in stream CVE-2022-47520: Fix not seen in stream CVE-2022-47929: Fix not seen in stream CVE-2022-48619: Fix not seen in stream +CVE-2022-48626: Fix not seen in stream +CVE-2022-48627: Fix not seen in stream +CVE-2022-48628: Fix not seen in stream CVE-2023-0030: Fix not seen in stream CVE-2023-0047: Fix not seen in stream CVE-2023-0266: Fix not seen in stream @@ -1068,6 +1170,7 @@ CVE-2023-26545: Fix not seen in stream CVE-2023-26607: Fix not seen in stream CVE-2023-28328: Fix not seen in stream CVE-2023-2860: Fix not seen in stream +CVE-2023-28746: Fix not seen in stream CVE-2023-28772: Fix not seen in stream CVE-2023-2985: Fix not seen in stream CVE-2023-3006: Fix not seen in stream @@ -1134,7 +1237,7 @@ CVE-2023-4622: Fix not seen in stream CVE-2023-4623: Fix not seen in stream CVE-2023-46343: Fix not seen in stream CVE-2023-46838: Fix not seen in stream -CVE-2023-47233: Fix unknown +CVE-2023-47233: Fix not seen in stream CVE-2023-4881: Fix not seen in stream CVE-2023-4921: Fix not seen in stream CVE-2023-51043: Fix not seen in stream @@ -1154,24 +1257,112 @@ CVE-2023-52444: Fix not seen in stream CVE-2023-52445: Fix not seen in stream CVE-2023-52449: Fix not seen in stream CVE-2023-52451: Fix not seen in stream -CVE-2023-52456: Fix not seen in stream -CVE-2023-52457: Fix not seen in stream CVE-2023-52458: Fix not seen in stream +CVE-2023-52469: Fix not seen in stream +CVE-2023-52470: Fix not seen in stream +CVE-2023-52475: Fix not seen in stream +CVE-2023-52476: Fix not seen in stream +CVE-2023-52477: Fix not seen in stream +CVE-2023-52478: Fix not seen in stream +CVE-2023-52479: Fix not seen in stream +CVE-2023-52480: Fix not seen in stream +CVE-2023-52481: Fix not seen in stream +CVE-2023-52482: Fix not seen in stream +CVE-2023-52484: Fix not seen in stream +CVE-2023-52485: Fix not seen in stream +CVE-2023-52486: Fix not seen in stream +CVE-2023-52488: Fix not seen in stream +CVE-2023-52489: Fix not seen in stream +CVE-2023-52498: Fix not seen in stream +CVE-2023-52500: Fix not seen in stream +CVE-2023-52501: Fix not seen in stream +CVE-2023-52502: Fix not seen in stream +CVE-2023-52506: Fix not seen in stream +CVE-2023-52507: Fix not seen in stream +CVE-2023-52508: Fix not seen in stream +CVE-2023-52509: Fix not seen in stream +CVE-2023-52511: Fix not seen in stream +CVE-2023-52515: Fix not seen in stream +CVE-2023-52516: Fix not seen in stream +CVE-2023-52517: Fix not seen in stream +CVE-2023-52519: Fix not seen in stream +CVE-2023-52522: Fix not seen in stream +CVE-2023-52527: Fix not seen in stream +CVE-2023-52528: Fix not seen in stream +CVE-2023-52531: Fix not seen in stream +CVE-2023-52532: Fix not seen in stream +CVE-2023-52559: Fix not seen in stream +CVE-2023-52561: Fix not seen in stream +CVE-2023-52563: Fix not seen in stream +CVE-2023-52565: Fix not seen in stream +CVE-2023-52566: Fix not seen in stream +CVE-2023-52568: Fix not seen in stream +CVE-2023-52569: Fix not seen in stream +CVE-2023-52571: Fix not seen in stream +CVE-2023-52572: Fix not seen in stream +CVE-2023-52574: Fix not seen in stream +CVE-2023-52578: Fix not seen in stream +CVE-2023-52583: Fix not seen in stream +CVE-2023-52584: Fix not seen in stream +CVE-2023-52585: Fix not seen in stream +CVE-2023-52586: Fix not seen in stream +CVE-2023-52587: Fix not seen in stream +CVE-2023-52588: Fix not seen in stream +CVE-2023-52589: Fix not seen in stream +CVE-2023-52590: Fix not seen in stream +CVE-2023-52591: Fix not seen in stream +CVE-2023-52593: Fix not seen in stream +CVE-2023-52594: Fix not seen in stream +CVE-2023-52595: Fix not seen in stream +CVE-2023-52596: Fix not seen in stream +CVE-2023-52597: Fix not seen in stream +CVE-2023-52598: Fix not seen in stream +CVE-2023-52599: Fix not seen in stream +CVE-2023-52600: Fix not seen in stream +CVE-2023-52601: Fix not seen in stream +CVE-2023-52602: Fix not seen in stream +CVE-2023-52603: Fix not seen in stream +CVE-2023-52604: Fix not seen in stream +CVE-2023-52606: Fix not seen in stream +CVE-2023-52607: Fix not seen in stream +CVE-2023-52609: Fix not seen in stream +CVE-2023-52612: Fix not seen in stream +CVE-2023-52614: Fix not seen in stream +CVE-2023-52615: Fix not seen in stream +CVE-2023-52617: Fix not seen in stream +CVE-2023-52618: Fix not seen in stream +CVE-2023-52619: Fix not seen in stream +CVE-2023-52620: Fix not seen in stream +CVE-2023-52621: Fix not seen in stream +CVE-2023-52622: Fix not seen in stream +CVE-2023-52623: Fix not seen in stream +CVE-2023-52624: Fix not seen in stream +CVE-2023-52625: Fix not seen in stream +CVE-2023-52628: Fix not seen in stream +CVE-2023-52629: Fix not seen in stream +CVE-2023-52632: Fix not seen in stream +CVE-2023-52633: Fix not seen in stream +CVE-2023-52634: Fix not seen in stream +CVE-2023-52635: Fix not seen in stream +CVE-2023-52638: Fix not seen in stream +CVE-2023-52639: Fix not seen in stream +CVE-2023-52640: Fix not seen in stream +CVE-2023-52641: Fix not seen in stream CVE-2023-5717: Fix not seen in stream CVE-2023-6040: Fix not seen in stream CVE-2023-6121: Fix not seen in stream CVE-2023-6240: Fix unknown -CVE-2023-6270: Fix unknown -CVE-2023-6356: Fix unknown +CVE-2023-6270: Fix not seen in stream +CVE-2023-6356: Fix not seen in stream CVE-2023-6535: Fix unknown -CVE-2023-6536: Fix unknown +CVE-2023-6536: Fix not seen in stream CVE-2023-6546: Fix not seen in stream CVE-2023-6606: Fix not seen in stream CVE-2023-6610: Fix not seen in stream CVE-2023-6915: Fix not seen in stream CVE-2023-6931: Fix not seen in stream CVE-2023-6932: Fix not seen in stream -CVE-2023-7042: Fix unknown +CVE-2023-7042: Fix not seen in stream CVE-2023-7192: Fix not seen in stream CVE-2024-0340: Fix not seen in stream CVE-2024-0584: Fix not seen in stream @@ -1180,10 +1371,11 @@ CVE-2024-0775: Fix not seen in stream CVE-2024-1086: Fix not seen in stream CVE-2024-1312: Fix not seen in stream CVE-2024-21803: Fix unknown -CVE-2024-22099: Fix unknown +CVE-2024-2193: Fix unknown +CVE-2024-22099: Fix not seen in stream CVE-2024-22386: Fix unknown -CVE-2024-23196: Fix unknown -CVE-2024-23307: Fix unknown +CVE-2024-23196: Fix not seen in stream +CVE-2024-23307: Fix not seen in stream CVE-2024-23848: Fix unknown CVE-2024-23849: Fix not seen in stream CVE-2024-23851: Fix not seen in stream @@ -1192,17 +1384,107 @@ CVE-2024-24857: Fix unknown CVE-2024-24858: Fix unknown CVE-2024-24859: Fix unknown CVE-2024-24860: Fix not seen in stream -CVE-2024-24861: Fix unknown +CVE-2024-24861: Fix not seen in stream CVE-2024-24864: Fix unknown CVE-2024-25739: Fix unknown CVE-2024-25740: Fix unknown CVE-2024-25741: Fix unknown CVE-2024-25744: Fix not seen in stream -CVE-2024-26584: Fix not seen in stream -CVE-2024-26587: Fix not seen in stream -CVE-2024-26588: Fix not seen in stream -CVE-2024-26591: Fix not seen in stream CVE-2024-26592: Fix not seen in stream CVE-2024-26594: Fix not seen in stream CVE-2024-26595: Fix not seen in stream CVE-2024-26598: Fix not seen in stream +CVE-2024-26600: Fix not seen in stream +CVE-2024-26606: Fix not seen in stream +CVE-2024-26614: Fix not seen in stream +CVE-2024-26622: Fix not seen in stream +CVE-2024-26623: Fix not seen in stream +CVE-2024-26625: Fix not seen in stream +CVE-2024-26627: Fix not seen in stream +CVE-2024-26633: Fix not seen in stream +CVE-2024-26635: Fix not seen in stream +CVE-2024-26636: Fix not seen in stream +CVE-2024-26641: Fix not seen in stream +CVE-2024-26642: Fix not seen in stream +CVE-2024-26644: Fix not seen in stream +CVE-2024-26646: Fix not seen in stream +CVE-2024-26647: Fix not seen in stream +CVE-2024-26648: Fix not seen in stream +CVE-2024-26650: Fix not seen in stream +CVE-2024-26651: Fix not seen in stream +CVE-2024-26654: Fix not seen in stream +CVE-2024-26655: Fix not seen in stream +CVE-2024-26656: Fix not seen in stream +CVE-2024-26658: Fix not seen in stream +CVE-2024-26659: Fix not seen in stream +CVE-2024-26663: Fix not seen in stream +CVE-2024-26664: Fix not seen in stream +CVE-2024-26668: Fix not seen in stream +CVE-2024-26671: Fix not seen in stream +CVE-2024-26672: Fix not seen in stream +CVE-2024-26675: Fix not seen in stream +CVE-2024-26676: Fix not seen in stream +CVE-2024-26677: Fix not seen in stream +CVE-2024-26679: Fix not seen in stream +CVE-2024-26685: Fix not seen in stream +CVE-2024-26686: Fix not seen in stream +CVE-2024-26687: Fix not seen in stream +CVE-2024-26689: Fix not seen in stream +CVE-2024-26691: Fix not seen in stream +CVE-2024-26696: Fix not seen in stream +CVE-2024-26697: Fix not seen in stream +CVE-2024-26699: Fix not seen in stream +CVE-2024-26700: Fix not seen in stream +CVE-2024-26704: Fix not seen in stream +CVE-2024-26706: Fix not seen in stream +CVE-2024-26713: Fix not seen in stream +CVE-2024-26715: Fix not seen in stream +CVE-2024-26719: Fix not seen in stream +CVE-2024-26720: Fix not seen in stream +CVE-2024-26726: Fix not seen in stream +CVE-2024-26733: Fix not seen in stream +CVE-2024-26735: Fix not seen in stream +CVE-2024-26738: Fix not seen in stream +CVE-2024-26739: Fix not seen in stream +CVE-2024-26740: Fix not seen in stream +CVE-2024-26743: Fix not seen in stream +CVE-2024-26744: Fix not seen in stream +CVE-2024-26745: Fix not seen in stream +CVE-2024-26748: Fix not seen in stream +CVE-2024-26752: Fix not seen in stream +CVE-2024-26754: Fix not seen in stream +CVE-2024-26756: Fix not seen in stream +CVE-2024-26757: Fix not seen in stream +CVE-2024-26758: Fix not seen in stream +CVE-2024-26759: Fix not seen in stream +CVE-2024-26763: Fix not seen in stream +CVE-2024-26764: Fix not seen in stream +CVE-2024-26765: Fix not seen in stream +CVE-2024-26766: Fix not seen in stream +CVE-2024-26767: Fix not seen in stream +CVE-2024-26768: Fix not seen in stream +CVE-2024-26769: Fix not seen in stream +CVE-2024-26770: Fix not seen in stream +CVE-2024-26771: Fix not seen in stream +CVE-2024-26772: Fix not seen in stream +CVE-2024-26773: Fix not seen in stream +CVE-2024-26774: Fix not seen in stream +CVE-2024-26775: Fix not seen in stream +CVE-2024-26776: Fix not seen in stream +CVE-2024-26777: Fix not seen in stream +CVE-2024-26778: Fix not seen in stream +CVE-2024-26779: Fix not seen in stream +CVE-2024-26784: Fix not seen in stream +CVE-2024-26789: Fix not seen in stream +CVE-2024-26791: Fix not seen in stream +CVE-2024-26793: Fix not seen in stream +CVE-2024-26797: Fix not seen in stream +CVE-2024-26798: Fix not seen in stream +CVE-2024-26801: Fix not seen in stream +CVE-2024-26802: Fix not seen in stream +CVE-2024-26803: Fix not seen in stream +CVE-2024-26804: Fix not seen in stream +CVE-2024-26805: Fix not seen in stream +CVE-2024-26806: Fix not seen in stream +CVE-2024-26808: Fix not seen in stream +CVE-2024-26809: Fix not seen in stream diff --git a/data/4.11/4.11_security.txt b/data/4.11/4.11_security.txt index 3b4f0e9cc..bcaf4cee6 100644 --- a/data/4.11/4.11_security.txt +++ b/data/4.11/4.11_security.txt @@ -526,6 +526,8 @@ Outstanding CVEs: CVE-2019-2182: (unk) arm64: Enforce BBM for huge IO/VMAP mappings CVE-2019-2213: (unk) binder: fix possible UAF when freeing buffer CVE-2019-2215: (unk) ANDROID: binder: remove waitqueue when thread exits. + CVE-2019-25160: (unk) netlabel: fix out-of-bounds memory accesses + CVE-2019-25162: (unk) i2c: Fix a potential use after free CVE-2019-3016: (unk) x86/kvm: Be careful not to clear KVM_VCPU_FLUSH_TLB bit CVE-2019-3459: (unk) Bluetooth: Verify that l2cap_get_conf_opt provides large enough buffer CVE-2019-3460: (unk) Bluetooth: Check L2CAP option sizes returned from l2cap_get_conf_opt @@ -711,6 +713,11 @@ Outstanding CVEs: CVE-2020-36558: (unk) vt: vt_ioctl: fix race in VT_RESIZEX CVE-2020-36691: (unk) netlink: limit recursion depth in policy validation CVE-2020-36766: (unk) cec-api: prevent leaking memory through hole in structure + CVE-2020-36775: (unk) f2fs: fix to avoid potential deadlock + CVE-2020-36777: (unk) media: dvbdev: Fix memory leak in dvb_media_device_free() + CVE-2020-36780: (unk) i2c: sprd: fix reference leak when pm_runtime_get_sync fails + CVE-2020-36781: (unk) i2c: imx: fix reference leak when pm_runtime_get_sync fails + CVE-2020-36784: (unk) i2c: cadence: fix reference leak when pm_runtime_get_sync fails CVE-2020-3702: (unk) ath: Use safer key clearing with key cache entries CVE-2020-4788: (unk) powerpc/64s: flush L1D on kernel entry CVE-2020-8647: (unk) vgacon: Fix a UAF in vgacon_invert_region @@ -854,6 +861,98 @@ Outstanding CVEs: CVE-2021-45485: (unk) ipv6: use prandom_u32() for ID generation CVE-2021-45486: (unk) inet: use bigger hash table for IP ID generation CVE-2021-45868: (unk) quota: check block number when reading the block in quota file + CVE-2021-46904: (unk) net: hso: fix null-ptr-deref during tty device unregistration + CVE-2021-46906: (unk) HID: usbhid: fix info leak in hid_submit_ctrl + CVE-2021-46908: (unk) bpf: Use correct permission flag for mixed signed bounds arithmetic + CVE-2021-46924: (unk) NFC: st21nfca: Fix memory leak in device probe and remove + CVE-2021-46925: (unk) net/smc: fix kernel panic caused by race of smc_sock + CVE-2021-46926: (unk) ALSA: hda: intel-sdw-acpi: harden detection of controller + CVE-2021-46928: (unk) parisc: Clear stale IIR value on instruction access rights trap + CVE-2021-46932: (unk) Input: appletouch - initialize work before device registration + CVE-2021-46933: (unk) usb: gadget: f_fs: Clear ffs_eventfd in ffs_data_clear. + CVE-2021-46936: (unk) net: fix use-after-free in tw_timer_handler + CVE-2021-46938: (unk) dm rq: fix double free of blk_mq_tag_set in dev remove after table load fails + CVE-2021-46939: (unk) tracing: Restructure trace_clock_global() to never block + CVE-2021-46950: (unk) md/raid1: properly indicate failure when ending a failed write request + CVE-2021-46951: (unk) tpm: efi: Use local variable for calculating final log size + CVE-2021-46952: (unk) NFS: fs_context: validate UDP retrans to prevent shift out-of-bounds + CVE-2021-46959: (unk) spi: Fix use-after-free with devm_spi_alloc_* + CVE-2021-46960: (unk) cifs: Return correct error code from smb2_get_enc_key + CVE-2021-46962: (unk) mmc: uniphier-sd: Fix a resource leak in the remove function + CVE-2021-46965: (unk) mtd: physmap: physmap-bt1-rom: Fix unintentional stack access + CVE-2021-46969: (unk) bus: mhi: core: Fix invalid error returning in mhi_queue + CVE-2021-46970: (unk) bus: mhi: pci_generic: Remove WQ_MEM_RECLAIM flag from state workqueue + CVE-2021-46982: (unk) f2fs: compress: fix race condition of overwrite vs truncate + CVE-2021-46988: (unk) userfaultfd: release page in error path to avoid BUG_ON + CVE-2021-46992: (unk) netfilter: nftables: avoid overflows in nft_hash_buckets() + CVE-2021-47006: (unk) ARM: 9064/1: hw_breakpoint: Do not directly check the event's overflow_handler hook + CVE-2021-47013: (unk) net:emac/emac-mac: Fix a use after free in emac_mac_tx_buf_send + CVE-2021-47028: (unk) mt76: mt7915: fix txrate reporting + CVE-2021-47046: (unk) drm/amd/display: Fix off by one in hdmi_14_process_transaction() + CVE-2021-47052: (unk) crypto: sa2ul - Fix memory leak of rxd + CVE-2021-47054: (unk) bus: qcom: Put child node before return + CVE-2021-47056: (unk) crypto: qat - ADF_STATUS_PF_RUNNING should be set after adf_dev_init + CVE-2021-47059: (unk) crypto: sun8i-ss - fix result memory leak on error path + CVE-2021-47065: (unk) rtw88: Fix array overrun in rtw_get_tx_power_params() + CVE-2021-47070: (unk) uio_hv_generic: Fix another memory leak in error handling paths + CVE-2021-47074: (unk) nvme-loop: fix memory leak in nvme_loop_create_ctrl() + CVE-2021-47075: (unk) nvmet: fix memory leak in nvmet_alloc_ctrl() + CVE-2021-47076: (unk) RDMA/rxe: Return CQE error if invalid lkey was supplied + CVE-2021-47077: (unk) scsi: qedf: Add pointer checks in qedf_update_link_speed() + CVE-2021-47078: (unk) RDMA/rxe: Clear all QP fields if creation failed + CVE-2021-47082: (unk) tun: avoid double free in tun_free_netdev + CVE-2021-47083: (unk) pinctrl: mediatek: fix global-out-of-bounds issue + CVE-2021-47086: (unk) phonet/pep: refuse to enable an unbound pipe + CVE-2021-47101: (unk) asix: fix uninit-value in asix_mdio_read() + CVE-2021-47103: (unk) inet: fully convert sk->sk_rx_dst to RCU rules + CVE-2021-47110: (unk) x86/kvm: Disable kvmclock on all CPUs on shutdown + CVE-2021-47112: (unk) x86/kvm: Teardown PV features on boot CPU as well + CVE-2021-47113: (unk) btrfs: abort in rename_exchange if we fail to insert the second ref + CVE-2021-47114: (unk) ocfs2: fix data corruption by fallocate + CVE-2021-47116: (unk) ext4: fix memory leak in ext4_mb_init_backend on error path. + CVE-2021-47117: (unk) ext4: fix bug on in ext4_es_cache_extent as ext4_split_extent_at failed + CVE-2021-47118: (unk) pid: take a reference when initializing `cad_pid` + CVE-2021-47119: (unk) ext4: fix memory leak in ext4_fill_super + CVE-2021-47121: (unk) net: caif: fix memory leak in cfusbl_device_notify + CVE-2021-47122: (unk) net: caif: fix memory leak in caif_device_notify + CVE-2021-47124: (unk) io_uring: fix link timeout refs + CVE-2021-47125: (unk) sch_htb: fix refcount leak in htb_parent_to_leaf_offload + CVE-2021-47128: (unk) bpf, lockdown, audit: Fix buggy SELinux lockdown permission checks + CVE-2021-47131: (unk) net/tls: Fix use-after-free after the TLS device goes down and up + CVE-2021-47133: (unk) HID: amd_sfh: Fix memory leak in amd_sfh_work + CVE-2021-47135: (unk) mt76: mt7921: fix possible AOOB issue in mt7921_mcu_tx_rate_report + CVE-2021-47136: (unk) net: zero-initialize tc skb extension on allocation + CVE-2021-47137: (unk) net: lantiq: fix memory corruption in RX ring + CVE-2021-47140: (unk) iommu/amd: Clear DMA ops when switching domain + CVE-2021-47142: (unk) drm/amdgpu: Fix a use-after-free + CVE-2021-47143: (unk) net/smc: remove device from smcd_dev_list after failed device_add() + CVE-2021-47144: (unk) drm/amd/amdgpu: fix refcount leak + CVE-2021-47145: (unk) btrfs: do not BUG_ON in link_to_fixup_dir + CVE-2021-47146: (unk) mld: fix panic in mld_newpack() + CVE-2021-47147: (unk) ptp: ocp: Fix a resource leak in an error handling path + CVE-2021-47149: (unk) net: fujitsu: fix potential null-ptr-deref + CVE-2021-47150: (unk) net: fec: fix the potential memory leak in fec_enet_init() + CVE-2021-47151: (unk) interconnect: qcom: bcm-voter: add a missing of_node_put() + CVE-2021-47153: (unk) i2c: i801: Don't generate an interrupt on bus reset + CVE-2021-47158: (unk) net: dsa: sja1105: add error handling in sja1105_setup() + CVE-2021-47159: (unk) net: dsa: fix a crash if ->get_sset_count() fails + CVE-2021-47160: (unk) net: dsa: mt7530: fix VLAN traffic leaks + CVE-2021-47161: (unk) spi: spi-fsl-dspi: Fix a resource leak in an error handling path + CVE-2021-47162: (unk) tipc: skb_linearize the head skb when reassembling msgs + CVE-2021-47163: (unk) tipc: wait and exit until all work queues are done + CVE-2021-47165: (unk) drm/meson: fix shutdown crash when component not probed + CVE-2021-47166: (unk) NFS: Don't corrupt the value of pg_bytes_written in nfs_do_recoalesce() + CVE-2021-47167: (unk) NFS: Fix an Oopsable condition in __nfs_pageio_add_request() + CVE-2021-47168: (unk) NFS: fix an incorrect limit in filelayout_decode_layout() + CVE-2021-47169: (unk) serial: rp2: use 'request_firmware' instead of 'request_firmware_nowait' + CVE-2021-47170: (unk) USB: usbfs: Don't WARN about excessively large memory allocations + CVE-2021-47171: (unk) net: usb: fix memory leak in smsc75xx_bind + CVE-2021-47172: (unk) iio: adc: ad7124: Fix potential overflow due to non sequential channel numbers + CVE-2021-47173: (unk) misc/uss720: fix memory leak in uss720_probe + CVE-2021-47175: (unk) net/sched: fq_pie: fix OOB access in the traffic path + CVE-2021-47177: (unk) iommu/vt-d: Fix sysfs leak in alloc_iommu() + CVE-2021-47179: (unk) NFSv4: Fix a NULL pointer dereference in pnfs_mark_matching_lsegs_return() + CVE-2021-47180: (unk) NFC: nci: fix memory leak in nci_allocate_device CVE-2022-0001: (unk) x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE CVE-2022-0002: (unk) x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE CVE-2022-0168: (unk) cifs: fix NULL ptr dereference in smb2_ioctl_query_info() @@ -1036,6 +1135,9 @@ Outstanding CVEs: CVE-2022-47520: (unk) wifi: wilc1000: validate pairwise and authentication suite offsets CVE-2022-47929: (unk) net: sched: disallow noqueue for qdisc classes CVE-2022-48619: (unk) Input: add bounds checking to input_set_capability() + CVE-2022-48626: (unk) moxart: fix potential use-after-free on remove path + CVE-2022-48627: (unk) vt: fix memory overlapping when deleting chars in the buffer + CVE-2022-48628: (unk) ceph: drop messages from MDS when unmounting CVE-2023-0030: (unk) drm/nouveau/mmu: add more general vmm free/node handling functions CVE-2023-0047: (unk) mm, oom: do not trigger out_of_memory from the #PF CVE-2023-0266: (unk) ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF @@ -1090,6 +1192,7 @@ Outstanding CVEs: CVE-2023-26607: (unk) ntfs: fix out-of-bounds read in ntfs_attr_find() CVE-2023-28328: (unk) media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer() CVE-2023-2860: (unk) ipv6: sr: fix out-of-bounds read when setting HMAC data. + CVE-2023-28746: (unk) x86/mmio: Disable KVM mitigation when X86_FEATURE_CLEAR_CPU_BUF is set CVE-2023-28772: (unk) seq_buf: Fix overflow in seq_buf_putmem_hex() CVE-2023-2985: (unk) fs: hfsplus: fix UAF issue in hfsplus_put_super CVE-2023-3006: (unk) arm64: Add AMPERE1 to the Spectre-BHB affected list @@ -1156,7 +1259,7 @@ Outstanding CVEs: CVE-2023-4623: (unk) net/sched: sch_hfsc: Ensure inner classes have fsc curve CVE-2023-46343: (unk) nfc: nci: fix possible NULL pointer dereference in send_acknowledge() CVE-2023-46838: (unk) xen-netback: don't produce zero-size SKB frags - CVE-2023-47233: (unk) + CVE-2023-47233: (unk) wifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach CVE-2023-4881: (unk) netfilter: nftables: exthdr: fix 4-byte stack OOB write CVE-2023-4921: (unk) net: sched: sch_qfq: Fix UAF in qfq_dequeue() CVE-2023-51043: (unk) drm/atomic: Fix potential use-after-free in nonblocking commits @@ -1176,24 +1279,112 @@ Outstanding CVEs: CVE-2023-52445: (unk) media: pvrusb2: fix use after free on context disconnection CVE-2023-52449: (unk) mtd: Fix gluebi NULL pointer dereference caused by ftl notifier CVE-2023-52451: (unk) powerpc/pseries/memhp: Fix access beyond end of drmem array - CVE-2023-52456: (unk) serial: imx: fix tx statemachine deadlock - CVE-2023-52457: (unk) serial: 8250: omap: Don't skip resource freeing if pm_runtime_resume_and_get() failed CVE-2023-52458: (unk) block: add check that partition length needs to be aligned with block size + CVE-2023-52469: (unk) drivers/amd/pm: fix a use-after-free in kv_parse_power_table + CVE-2023-52470: (unk) drm/radeon: check the alloc_workqueue return value in radeon_crtc_init() + CVE-2023-52475: (unk) Input: powermate - fix use-after-free in powermate_config_complete + CVE-2023-52476: (unk) perf/x86/lbr: Filter vsyscall addresses + CVE-2023-52477: (unk) usb: hub: Guard against accesses to uninitialized BOS descriptors + CVE-2023-52478: (unk) HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect + CVE-2023-52479: (unk) ksmbd: fix uaf in smb20_oplock_break_ack + CVE-2023-52480: (unk) ksmbd: fix race condition between session lookup and expire + CVE-2023-52481: (unk) arm64: errata: Add Cortex-A520 speculative unprivileged load workaround + CVE-2023-52482: (unk) x86/srso: Add SRSO mitigation for Hygon processors + CVE-2023-52484: (unk) iommu/arm-smmu-v3: Fix soft lockup triggered by arm_smmu_mm_invalidate_range + CVE-2023-52485: (unk) drm/amd/display: Wake DMCUB before sending a command + CVE-2023-52486: (unk) drm: Don't unref the same fb many times by mistake due to deadlock handling + CVE-2023-52488: (unk) serial: sc16is7xx: convert from _raw_ to _noinc_ regmap functions for FIFO + CVE-2023-52489: (unk) mm/sparsemem: fix race in accessing memory_section->usage + CVE-2023-52498: (unk) PM: sleep: Fix possible deadlocks in core system-wide PM code + CVE-2023-52500: (unk) scsi: pm80xx: Avoid leaking tags when processing OPC_INB_SET_CONTROLLER_CONFIG command + CVE-2023-52501: (unk) ring-buffer: Do not attempt to read past "commit" + CVE-2023-52502: (unk) net: nfc: fix races in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn() + CVE-2023-52506: (unk) LoongArch: Set all reserved memblocks on Node#0 at initialization + CVE-2023-52507: (unk) nfc: nci: assert requested protocol is valid + CVE-2023-52508: (unk) nvme-fc: Prevent null pointer dereference in nvme_fc_io_getuuid() + CVE-2023-52509: (unk) ravb: Fix use-after-free issue in ravb_tx_timeout_work() + CVE-2023-52511: (unk) spi: sun6i: reduce DMA RX transfer width to single byte + CVE-2023-52515: (unk) RDMA/srp: Do not call scsi_done() from srp_abort() + CVE-2023-52516: (unk) dma-debug: don't call __dma_entry_alloc_check_leak() under free_entries_lock + CVE-2023-52517: (unk) spi: sun6i: fix race between DMA RX transfer completion and RX FIFO drain + CVE-2023-52519: (unk) HID: intel-ish-hid: ipc: Disable and reenable ACPI GPE bit + CVE-2023-52522: (unk) net: fix possible store tearing in neigh_periodic_work() + CVE-2023-52527: (unk) ipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data() + CVE-2023-52528: (unk) net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg + CVE-2023-52531: (unk) wifi: iwlwifi: mvm: Fix a memory corruption issue + CVE-2023-52532: (unk) net: mana: Fix TX CQE error handling + CVE-2023-52559: (unk) iommu/vt-d: Avoid memory allocation in iommu_suspend() + CVE-2023-52561: (unk) arm64: dts: qcom: sdm845-db845c: Mark cont splash memory region as reserved + CVE-2023-52563: (unk) drm/meson: fix memory leak on ->hpd_notify callback + CVE-2023-52565: (unk) media: uvcvideo: Fix OOB read + CVE-2023-52566: (unk) nilfs2: fix potential use after free in nilfs_gccache_submit_read_data() + CVE-2023-52568: (unk) x86/sgx: Resolves SECS reclaim vs. page fault for EAUG race + CVE-2023-52569: (unk) btrfs: remove BUG() after failure to insert delayed dir index item + CVE-2023-52571: (unk) power: supply: rk817: Fix node refcount leak + CVE-2023-52572: (unk) cifs: Fix UAF in cifs_demultiplex_thread() + CVE-2023-52574: (unk) team: fix null-ptr-deref when team device type is changed + CVE-2023-52578: (unk) net: bridge: use DEV_STATS_INC() + CVE-2023-52583: (unk) ceph: fix deadlock or deadcode of misusing dget() + CVE-2023-52584: (unk) spmi: mediatek: Fix UAF on device remove + CVE-2023-52585: (unk) drm/amdgpu: Fix possible NULL dereference in amdgpu_ras_query_error_status_helper() + CVE-2023-52586: (unk) drm/msm/dpu: Add mutex lock in control vblank irq + CVE-2023-52587: (unk) IB/ipoib: Fix mcast list locking + CVE-2023-52588: (unk) f2fs: fix to tag gcing flag on page during block migration + CVE-2023-52589: (unk) media: rkisp1: Fix IRQ disable race issue + CVE-2023-52590: (unk) ocfs2: Avoid touching renamed directory if parent does not change + CVE-2023-52591: (unk) reiserfs: Avoid touching renamed directory if parent does not change + CVE-2023-52593: (unk) wifi: wfx: fix possible NULL pointer dereference in wfx_set_mfp_ap() + CVE-2023-52594: (unk) wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus() + CVE-2023-52595: (unk) wifi: rt2x00: restart beacon queue when hardware reset + CVE-2023-52596: (unk) sysctl: Fix out of bounds access for empty sysctl registers + CVE-2023-52597: (unk) KVM: s390: fix setting of fpc register + CVE-2023-52598: (unk) s390/ptrace: handle setting of fpc register correctly + CVE-2023-52599: (unk) jfs: fix array-index-out-of-bounds in diNewExt + CVE-2023-52600: (unk) jfs: fix uaf in jfs_evict_inode + CVE-2023-52601: (unk) jfs: fix array-index-out-of-bounds in dbAdjTree + CVE-2023-52602: (unk) jfs: fix slab-out-of-bounds Read in dtSearch + CVE-2023-52603: (unk) UBSAN: array-index-out-of-bounds in dtSplitRoot + CVE-2023-52604: (unk) FS:JFS:UBSAN:array-index-out-of-bounds in dbAdjTree + CVE-2023-52606: (unk) powerpc/lib: Validate size for vector operations + CVE-2023-52607: (unk) powerpc/mm: Fix null-pointer dereference in pgtable_cache_add + CVE-2023-52609: (unk) binder: fix race between mmput() and do_exit() + CVE-2023-52612: (unk) crypto: scomp - fix req->dst buffer overflow + CVE-2023-52614: (unk) PM / devfreq: Fix buffer overflow in trans_stat_show + CVE-2023-52615: (unk) hwrng: core - Fix page fault dead lock on mmap-ed hwrng + CVE-2023-52617: (unk) PCI: switchtec: Fix stdev_release() crash after surprise hot remove + CVE-2023-52618: (unk) block/rnbd-srv: Check for unlikely string overflow + CVE-2023-52619: (unk) pstore/ram: Fix crash when setting number of cpus to an odd number + CVE-2023-52620: (unk) netfilter: nf_tables: disallow timeout for anonymous sets + CVE-2023-52621: (unk) bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers + CVE-2023-52622: (unk) ext4: avoid online resizing failures due to oversized flex bg + CVE-2023-52623: (unk) SUNRPC: Fix a suspicious RCU usage warning + CVE-2023-52624: (unk) drm/amd/display: Wake DMCUB before executing GPINT commands + CVE-2023-52625: (unk) drm/amd/display: Refactor DMCUB enter/exit idle interface + CVE-2023-52628: (unk) netfilter: nftables: exthdr: fix 4-byte stack OOB write + CVE-2023-52629: (unk) sh: push-switch: Reorder cleanup operations to avoid use-after-free bug + CVE-2023-52632: (unk) drm/amdkfd: Fix lock dependency warning with srcu + CVE-2023-52633: (unk) um: time-travel: fix time corruption + CVE-2023-52634: (unk) drm/amd/display: Fix disable_otg_wa logic + CVE-2023-52635: (unk) PM / devfreq: Synchronize devfreq_monitor_[start/stop] + CVE-2023-52638: (unk) can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock + CVE-2023-52639: (unk) KVM: s390: vsie: fix race during shadow creation + CVE-2023-52640: (unk) fs/ntfs3: Fix oob in ntfs_listxattr + CVE-2023-52641: (unk) fs/ntfs3: Add NULL ptr dereference checking at the end of attr_allocate_frame() CVE-2023-5717: (unk) perf: Disallow mis-matched inherited group reads CVE-2023-6040: (unk) netfilter: nf_tables: Reject tables of unsupported family CVE-2023-6121: (unk) nvmet: nul-terminate the NQNs passed in the connect command CVE-2023-6240: (unk) - CVE-2023-6270: (unk) - CVE-2023-6356: (unk) + CVE-2023-6270: (unk) aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts + CVE-2023-6356: (unk) nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length CVE-2023-6535: (unk) - CVE-2023-6536: (unk) + CVE-2023-6536: (unk) nvmet-tcp: fix a crash in nvmet_req_complete() CVE-2023-6546: (unk) tty: n_gsm: fix the UAF caused by race condition in gsm_cleanup_mux CVE-2023-6606: (unk) smb: client: fix OOB in smbCalcSize() CVE-2023-6610: (unk) smb: client: fix potential OOB in smb2_dump_detail() CVE-2023-6915: (unk) ida: Fix crash in ida_free when the bitmap is empty CVE-2023-6931: (unk) perf: Fix perf_event_validate_size() CVE-2023-6932: (unk) ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet - CVE-2023-7042: (unk) + CVE-2023-7042: (unk) wifi: ath10k: fix NULL pointer dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev() CVE-2023-7192: (unk) netfilter: ctnetlink: fix possible refcount leak in ctnetlink_create_conntrack() CVE-2024-0340: (unk) vhost: use kzalloc() instead of kmalloc() followed by memset() CVE-2024-0584: (unk) ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet @@ -1202,10 +1393,11 @@ Outstanding CVEs: CVE-2024-1086: (unk) netfilter: nf_tables: reject QUEUE/DROP verdict parameters CVE-2024-1312: (unk) mm: lock_vma_under_rcu() must check vma->anon_vma under vma lock CVE-2024-21803: (unk) - CVE-2024-22099: (unk) + CVE-2024-2193: (unk) + CVE-2024-22099: (unk) Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security CVE-2024-22386: (unk) - CVE-2024-23196: (unk) - CVE-2024-23307: (unk) + CVE-2024-23196: (unk) ALSA: hda: fix a possible null-pointer dereference due to data race in snd_hdac_regmap_sync() + CVE-2024-23307: (unk) md/raid5: fix atomicity violation in raid5_cache_count CVE-2024-23848: (unk) CVE-2024-23849: (unk) net/rds: Fix UBSAN: array-index-out-of-bounds in rds_cmsg_recv CVE-2024-23851: (unk) dm: limit the number of targets and parameter size area @@ -1214,17 +1406,107 @@ Outstanding CVEs: CVE-2024-24858: (unk) CVE-2024-24859: (unk) CVE-2024-24860: (unk) Bluetooth: Fix atomicity violation in {min,max}_key_size_set - CVE-2024-24861: (unk) + CVE-2024-24861: (unk) media: xc4000: Fix atomicity violation in xc4000_get_frequency CVE-2024-24864: (unk) CVE-2024-25739: (unk) CVE-2024-25740: (unk) CVE-2024-25741: (unk) CVE-2024-25744: (unk) x86/coco: Disable 32-bit emulation by default on TDX and SEV - CVE-2024-26584: (unk) net: tls: handle backlogging of crypto requests - CVE-2024-26587: (unk) net: netdevsim: don't try to destroy PHC on VFs - CVE-2024-26588: (unk) LoongArch: BPF: Prevent out-of-bounds memory access - CVE-2024-26591: (unk) bpf: Fix re-attachment branch in bpf_tracing_prog_attach CVE-2024-26592: (unk) ksmbd: fix UAF issue in ksmbd_tcp_new_connection() CVE-2024-26594: (unk) ksmbd: validate mech token in session setup CVE-2024-26595: (unk) mlxsw: spectrum_acl_tcam: Fix NULL pointer dereference in error path CVE-2024-26598: (unk) KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache + CVE-2024-26600: (unk) phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP + CVE-2024-26606: (unk) binder: signal epoll threads of self-work + CVE-2024-26614: (unk) tcp: make sure init the accept_queue's spinlocks once + CVE-2024-26622: (unk) tomoyo: fix UAF write bug in tomoyo_write_control() + CVE-2024-26623: (unk) pds_core: Prevent race issues involving the adminq + CVE-2024-26625: (unk) llc: call sock_orphan() at release time + CVE-2024-26627: (unk) scsi: core: Move scsi_host_busy() out of host lock for waking up EH handler + CVE-2024-26633: (unk) ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim() + CVE-2024-26635: (unk) llc: Drop support for ETH_P_TR_802_2. + CVE-2024-26636: (unk) llc: make llc_ui_sendmsg() more robust against bonding changes + CVE-2024-26641: (unk) ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv() + CVE-2024-26642: (unk) netfilter: nf_tables: disallow anonymous set with timeout flag + CVE-2024-26644: (unk) btrfs: don't abort filesystem when attempting to snapshot deleted subvolume + CVE-2024-26646: (unk) thermal: intel: hfi: Add syscore callbacks for system-wide PM + CVE-2024-26647: (unk) drm/amd/display: Fix late derefrence 'dsc' check in 'link_set_dsc_pps_packet()' + CVE-2024-26648: (unk) drm/amd/display: Fix variable deferencing before NULL check in edp_setup_replay() + CVE-2024-26650: (unk) platform/x86: p2sb: Allow p2sb_bar() calls during PCI device probe + CVE-2024-26651: (unk) sr9800: Add check for usbnet_get_endpoints + CVE-2024-26654: (unk) ALSA: sh: aica: reorder cleanup operations to avoid UAF bugs + CVE-2024-26655: (unk) Fix memory leak in posix_clock_open() + CVE-2024-26656: (unk) drm/amdgpu: fix use-after-free bug + CVE-2024-26658: (unk) bcachefs: grab s_umount only if snapshotting + CVE-2024-26659: (unk) xhci: handle isoc Babble and Buffer Overrun events properly + CVE-2024-26663: (unk) tipc: Check the bearer type before calling tipc_udp_nl_bearer_add() + CVE-2024-26664: (unk) hwmon: (coretemp) Fix out-of-bounds memory access + CVE-2024-26668: (unk) netfilter: nft_limit: reject configurations that cause integer overflow + CVE-2024-26671: (unk) blk-mq: fix IO hang from sbitmap wakeup race + CVE-2024-26672: (unk) drm/amdgpu: Fix variable 'mca_funcs' dereferenced before NULL check in 'amdgpu_mca_smu_get_mca_entry()' + CVE-2024-26675: (unk) ppp_async: limit MRU to 64K + CVE-2024-26676: (unk) af_unix: Call kfree_skb() for dead unix_(sk)->oob_skb in GC. + CVE-2024-26677: (unk) rxrpc: Fix delayed ACKs to not set the reference serial number + CVE-2024-26679: (unk) inet: read sk->sk_family once in inet_recv_error() + CVE-2024-26685: (unk) nilfs2: fix potential bug in end_buffer_async_write + CVE-2024-26686: (unk) fs/proc: do_task_stat: use sig->stats_lock to gather the threads/children stats + CVE-2024-26687: (unk) xen/events: close evtchn after mapping cleanup + CVE-2024-26689: (unk) ceph: prevent use-after-free in encode_cap_msg() + CVE-2024-26691: (unk) KVM: arm64: Fix circular locking dependency + CVE-2024-26696: (unk) nilfs2: fix hang in nilfs_lookup_dirty_data_buffers() + CVE-2024-26697: (unk) nilfs2: fix data corruption in dsync block recovery for small block sizes + CVE-2024-26699: (unk) drm/amd/display: Fix array-index-out-of-bounds in dcn35_clkmgr + CVE-2024-26700: (unk) drm/amd/display: Fix MST Null Ptr for RV + CVE-2024-26704: (unk) ext4: fix double-free of blocks due to wrong extents moved_len + CVE-2024-26706: (unk) parisc: Fix random data corruption from exception handler + CVE-2024-26713: (unk) powerpc/pseries/iommu: Fix iommu initialisation during DLPAR add + CVE-2024-26715: (unk) usb: dwc3: gadget: Fix NULL pointer dereference in dwc3_gadget_suspend + CVE-2024-26719: (unk) nouveau: offload fence uevents work to workqueue + CVE-2024-26720: (unk) mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again + CVE-2024-26726: (unk) btrfs: don't drop extent_map for free space inode on write error + CVE-2024-26733: (unk) arp: Prevent overflow in arp_req_get(). + CVE-2024-26735: (unk) ipv6: sr: fix possible use-after-free and null-ptr-deref + CVE-2024-26738: (unk) powerpc/pseries/iommu: DLPAR add doesn't completely initialize pci_controller + CVE-2024-26739: (unk) net/sched: act_mirred: don't override retval if we already lost the skb + CVE-2024-26740: (unk) net/sched: act_mirred: use the backlog for mirred ingress + CVE-2024-26743: (unk) RDMA/qedr: Fix qedr_create_user_qp error flow + CVE-2024-26744: (unk) RDMA/srpt: Support specifying the srpt_service_guid parameter + CVE-2024-26745: (unk) powerpc/pseries/iommu: IOMMU table is not initialized for kdump over SR-IOV + CVE-2024-26748: (unk) usb: cdns3: fix memory double free when handle zero packet + CVE-2024-26752: (unk) l2tp: pass correct message length to ip6_append_data + CVE-2024-26754: (unk) gtp: fix use-after-free and null-ptr-deref in gtp_genl_dump_pdp() + CVE-2024-26756: (unk) md: Don't register sync_thread for reshape directly + CVE-2024-26757: (unk) md: Don't ignore read-only array in md_check_recovery() + CVE-2024-26758: (unk) md: Don't ignore suspended array in md_check_recovery() + CVE-2024-26759: (unk) mm/swap: fix race when skipping swapcache + CVE-2024-26763: (unk) dm-crypt: don't modify the data when using authenticated encryption + CVE-2024-26764: (unk) fs/aio: Restrict kiocb_set_cancel_fn() to I/O submitted via libaio + CVE-2024-26765: (unk) LoongArch: Disable IRQ before init_fn() for nonboot CPUs + CVE-2024-26766: (unk) IB/hfi1: Fix sdma.h tx->num_descs off-by-one error + CVE-2024-26767: (unk) drm/amd/display: fixed integer types and null check locations + CVE-2024-26768: (unk) LoongArch: Change acpi_core_pic[NR_CPUS] to acpi_core_pic[MAX_CORE_PIC] + CVE-2024-26769: (unk) nvmet-fc: avoid deadlock on delete association path + CVE-2024-26770: (unk) HID: nvidia-shield: Add missing null pointer checks to LED initialization + CVE-2024-26771: (unk) dmaengine: ti: edma: Add some null pointer checks to the edma_probe + CVE-2024-26772: (unk) ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal() + CVE-2024-26773: (unk) ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found() + CVE-2024-26774: (unk) ext4: avoid dividing by 0 in mb_update_avg_fragment_size() when block bitmap corrupt + CVE-2024-26775: (unk) aoe: avoid potential deadlock at set_capacity + CVE-2024-26776: (unk) spi: hisi-sfc-v3xx: Return IRQ_NONE if no interrupts were detected + CVE-2024-26777: (unk) fbdev: sis: Error out if pixclock equals zero + CVE-2024-26778: (unk) fbdev: savage: Error out if pixclock equals zero + CVE-2024-26779: (unk) wifi: mac80211: fix race condition on enabling fast-xmit + CVE-2024-26784: (unk) pmdomain: arm: Fix NULL dereference on scmi_perf_domain removal + CVE-2024-26789: (unk) crypto: arm64/neonbs - fix out-of-bounds access on short input + CVE-2024-26791: (unk) btrfs: dev-replace: properly validate device names + CVE-2024-26793: (unk) gtp: fix use-after-free and null-ptr-deref in gtp_newlink() + CVE-2024-26797: (unk) drm/amd/display: Prevent potential buffer overflow in map_hw_resources + CVE-2024-26798: (unk) fbcon: always restore the old font data in fbcon_do_set_font() + CVE-2024-26801: (unk) Bluetooth: Avoid potential use-after-free in hci_error_reset + CVE-2024-26802: (unk) stmmac: Clear variable when destroying workqueue + CVE-2024-26803: (unk) net: veth: clear GRO when clearing XDP even when down + CVE-2024-26804: (unk) net: ip_tunnel: prevent perpetual headroom growth + CVE-2024-26805: (unk) netlink: Fix kernel-infoleak-after-free in __skb_datagram_iter + CVE-2024-26806: (unk) spi: cadence-qspi: remove system-wide suspend helper calls from runtime PM hooks + CVE-2024-26808: (unk) netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain + CVE-2024-26809: (unk) netfilter: nft_set_pipapo: release elements in clone only from destroy path diff --git a/data/4.12/4.12_CVEs.txt b/data/4.12/4.12_CVEs.txt index e871d861c..abc7080e2 100644 --- a/data/4.12/4.12_CVEs.txt +++ b/data/4.12/4.12_CVEs.txt @@ -477,6 +477,8 @@ CVE-2019-2181: Fix not seen in stream CVE-2019-2182: Fix not seen in stream CVE-2019-2213: Fix not seen in stream CVE-2019-2215: Fix not seen in stream +CVE-2019-25160: Fix not seen in stream +CVE-2019-25162: Fix not seen in stream CVE-2019-3016: Fix not seen in stream CVE-2019-3459: Fix not seen in stream CVE-2019-3460: Fix not seen in stream @@ -664,6 +666,11 @@ CVE-2020-36557: Fix not seen in stream CVE-2020-36558: Fix not seen in stream CVE-2020-36691: Fix not seen in stream CVE-2020-36766: Fix not seen in stream +CVE-2020-36775: Fix not seen in stream +CVE-2020-36777: Fix not seen in stream +CVE-2020-36780: Fix not seen in stream +CVE-2020-36781: Fix not seen in stream +CVE-2020-36784: Fix not seen in stream CVE-2020-3702: Fix not seen in stream CVE-2020-4788: Fix not seen in stream CVE-2020-8647: Fix not seen in stream @@ -813,6 +820,100 @@ CVE-2021-45469: Fix not seen in stream CVE-2021-45485: Fix not seen in stream CVE-2021-45486: Fix not seen in stream CVE-2021-45868: Fix not seen in stream +CVE-2021-46904: Fix not seen in stream +CVE-2021-46906: Fix not seen in stream +CVE-2021-46908: Fix not seen in stream +CVE-2021-46924: Fix not seen in stream +CVE-2021-46925: Fix not seen in stream +CVE-2021-46926: Fix not seen in stream +CVE-2021-46928: Fix not seen in stream +CVE-2021-46932: Fix not seen in stream +CVE-2021-46933: Fix not seen in stream +CVE-2021-46936: Fix not seen in stream +CVE-2021-46938: Fix not seen in stream +CVE-2021-46939: Fix not seen in stream +CVE-2021-46941: Fix not seen in stream +CVE-2021-46950: Fix not seen in stream +CVE-2021-46951: Fix not seen in stream +CVE-2021-46952: Fix not seen in stream +CVE-2021-46953: Fix not seen in stream +CVE-2021-46959: Fix not seen in stream +CVE-2021-46960: Fix not seen in stream +CVE-2021-46962: Fix not seen in stream +CVE-2021-46965: Fix not seen in stream +CVE-2021-46969: Fix not seen in stream +CVE-2021-46970: Fix not seen in stream +CVE-2021-46982: Fix not seen in stream +CVE-2021-46988: Fix not seen in stream +CVE-2021-46992: Fix not seen in stream +CVE-2021-47006: Fix not seen in stream +CVE-2021-47013: Fix not seen in stream +CVE-2021-47028: Fix not seen in stream +CVE-2021-47046: Fix not seen in stream +CVE-2021-47052: Fix not seen in stream +CVE-2021-47054: Fix not seen in stream +CVE-2021-47056: Fix not seen in stream +CVE-2021-47059: Fix not seen in stream +CVE-2021-47065: Fix not seen in stream +CVE-2021-47070: Fix not seen in stream +CVE-2021-47074: Fix not seen in stream +CVE-2021-47075: Fix not seen in stream +CVE-2021-47076: Fix not seen in stream +CVE-2021-47077: Fix not seen in stream +CVE-2021-47078: Fix not seen in stream +CVE-2021-47082: Fix not seen in stream +CVE-2021-47083: Fix not seen in stream +CVE-2021-47086: Fix not seen in stream +CVE-2021-47101: Fix not seen in stream +CVE-2021-47103: Fix not seen in stream +CVE-2021-47110: Fix not seen in stream +CVE-2021-47112: Fix not seen in stream +CVE-2021-47113: Fix not seen in stream +CVE-2021-47114: Fix not seen in stream +CVE-2021-47116: Fix not seen in stream +CVE-2021-47117: Fix not seen in stream +CVE-2021-47118: Fix not seen in stream +CVE-2021-47119: Fix not seen in stream +CVE-2021-47121: Fix not seen in stream +CVE-2021-47122: Fix not seen in stream +CVE-2021-47124: Fix not seen in stream +CVE-2021-47125: Fix not seen in stream +CVE-2021-47128: Fix not seen in stream +CVE-2021-47131: Fix not seen in stream +CVE-2021-47133: Fix not seen in stream +CVE-2021-47135: Fix not seen in stream +CVE-2021-47136: Fix not seen in stream +CVE-2021-47137: Fix not seen in stream +CVE-2021-47140: Fix not seen in stream +CVE-2021-47142: Fix not seen in stream +CVE-2021-47143: Fix not seen in stream +CVE-2021-47144: Fix not seen in stream +CVE-2021-47145: Fix not seen in stream +CVE-2021-47146: Fix not seen in stream +CVE-2021-47147: Fix not seen in stream +CVE-2021-47149: Fix not seen in stream +CVE-2021-47150: Fix not seen in stream +CVE-2021-47151: Fix not seen in stream +CVE-2021-47153: Fix not seen in stream +CVE-2021-47158: Fix not seen in stream +CVE-2021-47159: Fix not seen in stream +CVE-2021-47160: Fix not seen in stream +CVE-2021-47161: Fix not seen in stream +CVE-2021-47162: Fix not seen in stream +CVE-2021-47163: Fix not seen in stream +CVE-2021-47165: Fix not seen in stream +CVE-2021-47166: Fix not seen in stream +CVE-2021-47167: Fix not seen in stream +CVE-2021-47168: Fix not seen in stream +CVE-2021-47169: Fix not seen in stream +CVE-2021-47170: Fix not seen in stream +CVE-2021-47171: Fix not seen in stream +CVE-2021-47172: Fix not seen in stream +CVE-2021-47173: Fix not seen in stream +CVE-2021-47175: Fix not seen in stream +CVE-2021-47177: Fix not seen in stream +CVE-2021-47179: Fix not seen in stream +CVE-2021-47180: Fix not seen in stream CVE-2022-0001: Fix not seen in stream CVE-2022-0002: Fix not seen in stream CVE-2022-0168: Fix not seen in stream @@ -999,6 +1100,9 @@ CVE-2022-4744: Fix not seen in stream CVE-2022-47520: Fix not seen in stream CVE-2022-47929: Fix not seen in stream CVE-2022-48619: Fix not seen in stream +CVE-2022-48626: Fix not seen in stream +CVE-2022-48627: Fix not seen in stream +CVE-2022-48628: Fix not seen in stream CVE-2023-0030: Fix not seen in stream CVE-2023-0047: Fix not seen in stream CVE-2023-0266: Fix not seen in stream @@ -1055,6 +1159,7 @@ CVE-2023-26545: Fix not seen in stream CVE-2023-26607: Fix not seen in stream CVE-2023-28328: Fix not seen in stream CVE-2023-2860: Fix not seen in stream +CVE-2023-28746: Fix not seen in stream CVE-2023-28772: Fix not seen in stream CVE-2023-2985: Fix not seen in stream CVE-2023-3006: Fix not seen in stream @@ -1121,7 +1226,7 @@ CVE-2023-4622: Fix not seen in stream CVE-2023-4623: Fix not seen in stream CVE-2023-46343: Fix not seen in stream CVE-2023-46838: Fix not seen in stream -CVE-2023-47233: Fix unknown +CVE-2023-47233: Fix not seen in stream CVE-2023-4881: Fix not seen in stream CVE-2023-4921: Fix not seen in stream CVE-2023-51043: Fix not seen in stream @@ -1141,25 +1246,115 @@ CVE-2023-52444: Fix not seen in stream CVE-2023-52445: Fix not seen in stream CVE-2023-52449: Fix not seen in stream CVE-2023-52451: Fix not seen in stream -CVE-2023-52456: Fix not seen in stream -CVE-2023-52457: Fix not seen in stream CVE-2023-52458: Fix not seen in stream CVE-2023-52464: Fix not seen in stream +CVE-2023-52469: Fix not seen in stream +CVE-2023-52470: Fix not seen in stream +CVE-2023-52475: Fix not seen in stream +CVE-2023-52476: Fix not seen in stream +CVE-2023-52477: Fix not seen in stream +CVE-2023-52478: Fix not seen in stream +CVE-2023-52479: Fix not seen in stream +CVE-2023-52480: Fix not seen in stream +CVE-2023-52481: Fix not seen in stream +CVE-2023-52482: Fix not seen in stream +CVE-2023-52484: Fix not seen in stream +CVE-2023-52485: Fix not seen in stream +CVE-2023-52486: Fix not seen in stream +CVE-2023-52488: Fix not seen in stream +CVE-2023-52489: Fix not seen in stream +CVE-2023-52491: Fix not seen in stream +CVE-2023-52498: Fix not seen in stream +CVE-2023-52500: Fix not seen in stream +CVE-2023-52501: Fix not seen in stream +CVE-2023-52502: Fix not seen in stream +CVE-2023-52506: Fix not seen in stream +CVE-2023-52507: Fix not seen in stream +CVE-2023-52508: Fix not seen in stream +CVE-2023-52509: Fix not seen in stream +CVE-2023-52510: Fix not seen in stream +CVE-2023-52511: Fix not seen in stream +CVE-2023-52515: Fix not seen in stream +CVE-2023-52516: Fix not seen in stream +CVE-2023-52517: Fix not seen in stream +CVE-2023-52519: Fix not seen in stream +CVE-2023-52522: Fix not seen in stream +CVE-2023-52527: Fix not seen in stream +CVE-2023-52528: Fix not seen in stream +CVE-2023-52531: Fix not seen in stream +CVE-2023-52532: Fix not seen in stream +CVE-2023-52559: Fix not seen in stream +CVE-2023-52561: Fix not seen in stream +CVE-2023-52563: Fix not seen in stream +CVE-2023-52565: Fix not seen in stream +CVE-2023-52566: Fix not seen in stream +CVE-2023-52568: Fix not seen in stream +CVE-2023-52569: Fix not seen in stream +CVE-2023-52571: Fix not seen in stream +CVE-2023-52572: Fix not seen in stream +CVE-2023-52574: Fix not seen in stream +CVE-2023-52578: Fix not seen in stream +CVE-2023-52583: Fix not seen in stream +CVE-2023-52584: Fix not seen in stream +CVE-2023-52585: Fix not seen in stream +CVE-2023-52586: Fix not seen in stream +CVE-2023-52587: Fix not seen in stream +CVE-2023-52588: Fix not seen in stream +CVE-2023-52589: Fix not seen in stream +CVE-2023-52590: Fix not seen in stream +CVE-2023-52591: Fix not seen in stream +CVE-2023-52593: Fix not seen in stream +CVE-2023-52594: Fix not seen in stream +CVE-2023-52595: Fix not seen in stream +CVE-2023-52596: Fix not seen in stream +CVE-2023-52597: Fix not seen in stream +CVE-2023-52598: Fix not seen in stream +CVE-2023-52599: Fix not seen in stream +CVE-2023-52600: Fix not seen in stream +CVE-2023-52601: Fix not seen in stream +CVE-2023-52602: Fix not seen in stream +CVE-2023-52603: Fix not seen in stream +CVE-2023-52604: Fix not seen in stream +CVE-2023-52606: Fix not seen in stream +CVE-2023-52607: Fix not seen in stream +CVE-2023-52609: Fix not seen in stream +CVE-2023-52612: Fix not seen in stream +CVE-2023-52614: Fix not seen in stream +CVE-2023-52615: Fix not seen in stream +CVE-2023-52617: Fix not seen in stream +CVE-2023-52618: Fix not seen in stream +CVE-2023-52619: Fix not seen in stream +CVE-2023-52620: Fix not seen in stream +CVE-2023-52621: Fix not seen in stream +CVE-2023-52622: Fix not seen in stream +CVE-2023-52623: Fix not seen in stream +CVE-2023-52624: Fix not seen in stream +CVE-2023-52625: Fix not seen in stream +CVE-2023-52628: Fix not seen in stream +CVE-2023-52629: Fix not seen in stream +CVE-2023-52632: Fix not seen in stream +CVE-2023-52633: Fix not seen in stream +CVE-2023-52634: Fix not seen in stream +CVE-2023-52635: Fix not seen in stream +CVE-2023-52638: Fix not seen in stream +CVE-2023-52639: Fix not seen in stream +CVE-2023-52640: Fix not seen in stream +CVE-2023-52641: Fix not seen in stream CVE-2023-5717: Fix not seen in stream CVE-2023-6040: Fix not seen in stream CVE-2023-6121: Fix not seen in stream CVE-2023-6240: Fix unknown -CVE-2023-6270: Fix unknown -CVE-2023-6356: Fix unknown +CVE-2023-6270: Fix not seen in stream +CVE-2023-6356: Fix not seen in stream CVE-2023-6535: Fix unknown -CVE-2023-6536: Fix unknown +CVE-2023-6536: Fix not seen in stream CVE-2023-6546: Fix not seen in stream CVE-2023-6606: Fix not seen in stream CVE-2023-6610: Fix not seen in stream CVE-2023-6915: Fix not seen in stream CVE-2023-6931: Fix not seen in stream CVE-2023-6932: Fix not seen in stream -CVE-2023-7042: Fix unknown +CVE-2023-7042: Fix not seen in stream CVE-2023-7192: Fix not seen in stream CVE-2024-0340: Fix not seen in stream CVE-2024-0584: Fix not seen in stream @@ -1169,10 +1364,11 @@ CVE-2024-1086: Fix not seen in stream CVE-2024-1151: Fix not seen in stream CVE-2024-1312: Fix not seen in stream CVE-2024-21803: Fix unknown -CVE-2024-22099: Fix unknown +CVE-2024-2193: Fix unknown +CVE-2024-22099: Fix not seen in stream CVE-2024-22386: Fix unknown -CVE-2024-23196: Fix unknown -CVE-2024-23307: Fix unknown +CVE-2024-23196: Fix not seen in stream +CVE-2024-23307: Fix not seen in stream CVE-2024-23848: Fix unknown CVE-2024-23849: Fix not seen in stream CVE-2024-23851: Fix not seen in stream @@ -1181,17 +1377,107 @@ CVE-2024-24857: Fix unknown CVE-2024-24858: Fix unknown CVE-2024-24859: Fix unknown CVE-2024-24860: Fix not seen in stream -CVE-2024-24861: Fix unknown +CVE-2024-24861: Fix not seen in stream CVE-2024-24864: Fix unknown CVE-2024-25739: Fix unknown CVE-2024-25740: Fix unknown CVE-2024-25741: Fix unknown CVE-2024-25744: Fix not seen in stream -CVE-2024-26584: Fix not seen in stream -CVE-2024-26587: Fix not seen in stream -CVE-2024-26588: Fix not seen in stream -CVE-2024-26591: Fix not seen in stream CVE-2024-26592: Fix not seen in stream CVE-2024-26594: Fix not seen in stream CVE-2024-26595: Fix not seen in stream CVE-2024-26598: Fix not seen in stream +CVE-2024-26600: Fix not seen in stream +CVE-2024-26606: Fix not seen in stream +CVE-2024-26614: Fix not seen in stream +CVE-2024-26622: Fix not seen in stream +CVE-2024-26623: Fix not seen in stream +CVE-2024-26625: Fix not seen in stream +CVE-2024-26627: Fix not seen in stream +CVE-2024-26633: Fix not seen in stream +CVE-2024-26635: Fix not seen in stream +CVE-2024-26636: Fix not seen in stream +CVE-2024-26641: Fix not seen in stream +CVE-2024-26642: Fix not seen in stream +CVE-2024-26644: Fix not seen in stream +CVE-2024-26646: Fix not seen in stream +CVE-2024-26647: Fix not seen in stream +CVE-2024-26648: Fix not seen in stream +CVE-2024-26650: Fix not seen in stream +CVE-2024-26651: Fix not seen in stream +CVE-2024-26654: Fix not seen in stream +CVE-2024-26655: Fix not seen in stream +CVE-2024-26656: Fix not seen in stream +CVE-2024-26658: Fix not seen in stream +CVE-2024-26659: Fix not seen in stream +CVE-2024-26663: Fix not seen in stream +CVE-2024-26664: Fix not seen in stream +CVE-2024-26668: Fix not seen in stream +CVE-2024-26671: Fix not seen in stream +CVE-2024-26672: Fix not seen in stream +CVE-2024-26675: Fix not seen in stream +CVE-2024-26676: Fix not seen in stream +CVE-2024-26677: Fix not seen in stream +CVE-2024-26679: Fix not seen in stream +CVE-2024-26685: Fix not seen in stream +CVE-2024-26686: Fix not seen in stream +CVE-2024-26687: Fix not seen in stream +CVE-2024-26689: Fix not seen in stream +CVE-2024-26691: Fix not seen in stream +CVE-2024-26696: Fix not seen in stream +CVE-2024-26697: Fix not seen in stream +CVE-2024-26699: Fix not seen in stream +CVE-2024-26700: Fix not seen in stream +CVE-2024-26704: Fix not seen in stream +CVE-2024-26706: Fix not seen in stream +CVE-2024-26713: Fix not seen in stream +CVE-2024-26715: Fix not seen in stream +CVE-2024-26719: Fix not seen in stream +CVE-2024-26720: Fix not seen in stream +CVE-2024-26726: Fix not seen in stream +CVE-2024-26733: Fix not seen in stream +CVE-2024-26735: Fix not seen in stream +CVE-2024-26738: Fix not seen in stream +CVE-2024-26739: Fix not seen in stream +CVE-2024-26740: Fix not seen in stream +CVE-2024-26743: Fix not seen in stream +CVE-2024-26744: Fix not seen in stream +CVE-2024-26745: Fix not seen in stream +CVE-2024-26748: Fix not seen in stream +CVE-2024-26752: Fix not seen in stream +CVE-2024-26754: Fix not seen in stream +CVE-2024-26756: Fix not seen in stream +CVE-2024-26757: Fix not seen in stream +CVE-2024-26758: Fix not seen in stream +CVE-2024-26759: Fix not seen in stream +CVE-2024-26763: Fix not seen in stream +CVE-2024-26764: Fix not seen in stream +CVE-2024-26765: Fix not seen in stream +CVE-2024-26766: Fix not seen in stream +CVE-2024-26767: Fix not seen in stream +CVE-2024-26768: Fix not seen in stream +CVE-2024-26769: Fix not seen in stream +CVE-2024-26770: Fix not seen in stream +CVE-2024-26771: Fix not seen in stream +CVE-2024-26772: Fix not seen in stream +CVE-2024-26773: Fix not seen in stream +CVE-2024-26774: Fix not seen in stream +CVE-2024-26775: Fix not seen in stream +CVE-2024-26776: Fix not seen in stream +CVE-2024-26777: Fix not seen in stream +CVE-2024-26778: Fix not seen in stream +CVE-2024-26779: Fix not seen in stream +CVE-2024-26784: Fix not seen in stream +CVE-2024-26789: Fix not seen in stream +CVE-2024-26791: Fix not seen in stream +CVE-2024-26793: Fix not seen in stream +CVE-2024-26797: Fix not seen in stream +CVE-2024-26798: Fix not seen in stream +CVE-2024-26801: Fix not seen in stream +CVE-2024-26802: Fix not seen in stream +CVE-2024-26803: Fix not seen in stream +CVE-2024-26804: Fix not seen in stream +CVE-2024-26805: Fix not seen in stream +CVE-2024-26806: Fix not seen in stream +CVE-2024-26808: Fix not seen in stream +CVE-2024-26809: Fix not seen in stream diff --git a/data/4.12/4.12_security.txt b/data/4.12/4.12_security.txt index 0aff772db..9390be69f 100644 --- a/data/4.12/4.12_security.txt +++ b/data/4.12/4.12_security.txt @@ -504,6 +504,8 @@ Outstanding CVEs: CVE-2019-2182: (unk) arm64: Enforce BBM for huge IO/VMAP mappings CVE-2019-2213: (unk) binder: fix possible UAF when freeing buffer CVE-2019-2215: (unk) ANDROID: binder: remove waitqueue when thread exits. + CVE-2019-25160: (unk) netlabel: fix out-of-bounds memory accesses + CVE-2019-25162: (unk) i2c: Fix a potential use after free CVE-2019-3016: (unk) x86/kvm: Be careful not to clear KVM_VCPU_FLUSH_TLB bit CVE-2019-3459: (unk) Bluetooth: Verify that l2cap_get_conf_opt provides large enough buffer CVE-2019-3460: (unk) Bluetooth: Check L2CAP option sizes returned from l2cap_get_conf_opt @@ -690,6 +692,11 @@ Outstanding CVEs: CVE-2020-36558: (unk) vt: vt_ioctl: fix race in VT_RESIZEX CVE-2020-36691: (unk) netlink: limit recursion depth in policy validation CVE-2020-36766: (unk) cec-api: prevent leaking memory through hole in structure + CVE-2020-36775: (unk) f2fs: fix to avoid potential deadlock + CVE-2020-36777: (unk) media: dvbdev: Fix memory leak in dvb_media_device_free() + CVE-2020-36780: (unk) i2c: sprd: fix reference leak when pm_runtime_get_sync fails + CVE-2020-36781: (unk) i2c: imx: fix reference leak when pm_runtime_get_sync fails + CVE-2020-36784: (unk) i2c: cadence: fix reference leak when pm_runtime_get_sync fails CVE-2020-3702: (unk) ath: Use safer key clearing with key cache entries CVE-2020-4788: (unk) powerpc/64s: flush L1D on kernel entry CVE-2020-8647: (unk) vgacon: Fix a UAF in vgacon_invert_region @@ -839,6 +846,100 @@ Outstanding CVEs: CVE-2021-45485: (unk) ipv6: use prandom_u32() for ID generation CVE-2021-45486: (unk) inet: use bigger hash table for IP ID generation CVE-2021-45868: (unk) quota: check block number when reading the block in quota file + CVE-2021-46904: (unk) net: hso: fix null-ptr-deref during tty device unregistration + CVE-2021-46906: (unk) HID: usbhid: fix info leak in hid_submit_ctrl + CVE-2021-46908: (unk) bpf: Use correct permission flag for mixed signed bounds arithmetic + CVE-2021-46924: (unk) NFC: st21nfca: Fix memory leak in device probe and remove + CVE-2021-46925: (unk) net/smc: fix kernel panic caused by race of smc_sock + CVE-2021-46926: (unk) ALSA: hda: intel-sdw-acpi: harden detection of controller + CVE-2021-46928: (unk) parisc: Clear stale IIR value on instruction access rights trap + CVE-2021-46932: (unk) Input: appletouch - initialize work before device registration + CVE-2021-46933: (unk) usb: gadget: f_fs: Clear ffs_eventfd in ffs_data_clear. + CVE-2021-46936: (unk) net: fix use-after-free in tw_timer_handler + CVE-2021-46938: (unk) dm rq: fix double free of blk_mq_tag_set in dev remove after table load fails + CVE-2021-46939: (unk) tracing: Restructure trace_clock_global() to never block + CVE-2021-46941: (unk) usb: dwc3: core: Do core softreset when switch mode + CVE-2021-46950: (unk) md/raid1: properly indicate failure when ending a failed write request + CVE-2021-46951: (unk) tpm: efi: Use local variable for calculating final log size + CVE-2021-46952: (unk) NFS: fs_context: validate UDP retrans to prevent shift out-of-bounds + CVE-2021-46953: (unk) ACPI: GTDT: Don't corrupt interrupt mappings on watchdow probe failure + CVE-2021-46959: (unk) spi: Fix use-after-free with devm_spi_alloc_* + CVE-2021-46960: (unk) cifs: Return correct error code from smb2_get_enc_key + CVE-2021-46962: (unk) mmc: uniphier-sd: Fix a resource leak in the remove function + CVE-2021-46965: (unk) mtd: physmap: physmap-bt1-rom: Fix unintentional stack access + CVE-2021-46969: (unk) bus: mhi: core: Fix invalid error returning in mhi_queue + CVE-2021-46970: (unk) bus: mhi: pci_generic: Remove WQ_MEM_RECLAIM flag from state workqueue + CVE-2021-46982: (unk) f2fs: compress: fix race condition of overwrite vs truncate + CVE-2021-46988: (unk) userfaultfd: release page in error path to avoid BUG_ON + CVE-2021-46992: (unk) netfilter: nftables: avoid overflows in nft_hash_buckets() + CVE-2021-47006: (unk) ARM: 9064/1: hw_breakpoint: Do not directly check the event's overflow_handler hook + CVE-2021-47013: (unk) net:emac/emac-mac: Fix a use after free in emac_mac_tx_buf_send + CVE-2021-47028: (unk) mt76: mt7915: fix txrate reporting + CVE-2021-47046: (unk) drm/amd/display: Fix off by one in hdmi_14_process_transaction() + CVE-2021-47052: (unk) crypto: sa2ul - Fix memory leak of rxd + CVE-2021-47054: (unk) bus: qcom: Put child node before return + CVE-2021-47056: (unk) crypto: qat - ADF_STATUS_PF_RUNNING should be set after adf_dev_init + CVE-2021-47059: (unk) crypto: sun8i-ss - fix result memory leak on error path + CVE-2021-47065: (unk) rtw88: Fix array overrun in rtw_get_tx_power_params() + CVE-2021-47070: (unk) uio_hv_generic: Fix another memory leak in error handling paths + CVE-2021-47074: (unk) nvme-loop: fix memory leak in nvme_loop_create_ctrl() + CVE-2021-47075: (unk) nvmet: fix memory leak in nvmet_alloc_ctrl() + CVE-2021-47076: (unk) RDMA/rxe: Return CQE error if invalid lkey was supplied + CVE-2021-47077: (unk) scsi: qedf: Add pointer checks in qedf_update_link_speed() + CVE-2021-47078: (unk) RDMA/rxe: Clear all QP fields if creation failed + CVE-2021-47082: (unk) tun: avoid double free in tun_free_netdev + CVE-2021-47083: (unk) pinctrl: mediatek: fix global-out-of-bounds issue + CVE-2021-47086: (unk) phonet/pep: refuse to enable an unbound pipe + CVE-2021-47101: (unk) asix: fix uninit-value in asix_mdio_read() + CVE-2021-47103: (unk) inet: fully convert sk->sk_rx_dst to RCU rules + CVE-2021-47110: (unk) x86/kvm: Disable kvmclock on all CPUs on shutdown + CVE-2021-47112: (unk) x86/kvm: Teardown PV features on boot CPU as well + CVE-2021-47113: (unk) btrfs: abort in rename_exchange if we fail to insert the second ref + CVE-2021-47114: (unk) ocfs2: fix data corruption by fallocate + CVE-2021-47116: (unk) ext4: fix memory leak in ext4_mb_init_backend on error path. + CVE-2021-47117: (unk) ext4: fix bug on in ext4_es_cache_extent as ext4_split_extent_at failed + CVE-2021-47118: (unk) pid: take a reference when initializing `cad_pid` + CVE-2021-47119: (unk) ext4: fix memory leak in ext4_fill_super + CVE-2021-47121: (unk) net: caif: fix memory leak in cfusbl_device_notify + CVE-2021-47122: (unk) net: caif: fix memory leak in caif_device_notify + CVE-2021-47124: (unk) io_uring: fix link timeout refs + CVE-2021-47125: (unk) sch_htb: fix refcount leak in htb_parent_to_leaf_offload + CVE-2021-47128: (unk) bpf, lockdown, audit: Fix buggy SELinux lockdown permission checks + CVE-2021-47131: (unk) net/tls: Fix use-after-free after the TLS device goes down and up + CVE-2021-47133: (unk) HID: amd_sfh: Fix memory leak in amd_sfh_work + CVE-2021-47135: (unk) mt76: mt7921: fix possible AOOB issue in mt7921_mcu_tx_rate_report + CVE-2021-47136: (unk) net: zero-initialize tc skb extension on allocation + CVE-2021-47137: (unk) net: lantiq: fix memory corruption in RX ring + CVE-2021-47140: (unk) iommu/amd: Clear DMA ops when switching domain + CVE-2021-47142: (unk) drm/amdgpu: Fix a use-after-free + CVE-2021-47143: (unk) net/smc: remove device from smcd_dev_list after failed device_add() + CVE-2021-47144: (unk) drm/amd/amdgpu: fix refcount leak + CVE-2021-47145: (unk) btrfs: do not BUG_ON in link_to_fixup_dir + CVE-2021-47146: (unk) mld: fix panic in mld_newpack() + CVE-2021-47147: (unk) ptp: ocp: Fix a resource leak in an error handling path + CVE-2021-47149: (unk) net: fujitsu: fix potential null-ptr-deref + CVE-2021-47150: (unk) net: fec: fix the potential memory leak in fec_enet_init() + CVE-2021-47151: (unk) interconnect: qcom: bcm-voter: add a missing of_node_put() + CVE-2021-47153: (unk) i2c: i801: Don't generate an interrupt on bus reset + CVE-2021-47158: (unk) net: dsa: sja1105: add error handling in sja1105_setup() + CVE-2021-47159: (unk) net: dsa: fix a crash if ->get_sset_count() fails + CVE-2021-47160: (unk) net: dsa: mt7530: fix VLAN traffic leaks + CVE-2021-47161: (unk) spi: spi-fsl-dspi: Fix a resource leak in an error handling path + CVE-2021-47162: (unk) tipc: skb_linearize the head skb when reassembling msgs + CVE-2021-47163: (unk) tipc: wait and exit until all work queues are done + CVE-2021-47165: (unk) drm/meson: fix shutdown crash when component not probed + CVE-2021-47166: (unk) NFS: Don't corrupt the value of pg_bytes_written in nfs_do_recoalesce() + CVE-2021-47167: (unk) NFS: Fix an Oopsable condition in __nfs_pageio_add_request() + CVE-2021-47168: (unk) NFS: fix an incorrect limit in filelayout_decode_layout() + CVE-2021-47169: (unk) serial: rp2: use 'request_firmware' instead of 'request_firmware_nowait' + CVE-2021-47170: (unk) USB: usbfs: Don't WARN about excessively large memory allocations + CVE-2021-47171: (unk) net: usb: fix memory leak in smsc75xx_bind + CVE-2021-47172: (unk) iio: adc: ad7124: Fix potential overflow due to non sequential channel numbers + CVE-2021-47173: (unk) misc/uss720: fix memory leak in uss720_probe + CVE-2021-47175: (unk) net/sched: fq_pie: fix OOB access in the traffic path + CVE-2021-47177: (unk) iommu/vt-d: Fix sysfs leak in alloc_iommu() + CVE-2021-47179: (unk) NFSv4: Fix a NULL pointer dereference in pnfs_mark_matching_lsegs_return() + CVE-2021-47180: (unk) NFC: nci: fix memory leak in nci_allocate_device CVE-2022-0001: (unk) x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE CVE-2022-0002: (unk) x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE CVE-2022-0168: (unk) cifs: fix NULL ptr dereference in smb2_ioctl_query_info() @@ -1025,6 +1126,9 @@ Outstanding CVEs: CVE-2022-47520: (unk) wifi: wilc1000: validate pairwise and authentication suite offsets CVE-2022-47929: (unk) net: sched: disallow noqueue for qdisc classes CVE-2022-48619: (unk) Input: add bounds checking to input_set_capability() + CVE-2022-48626: (unk) moxart: fix potential use-after-free on remove path + CVE-2022-48627: (unk) vt: fix memory overlapping when deleting chars in the buffer + CVE-2022-48628: (unk) ceph: drop messages from MDS when unmounting CVE-2023-0030: (unk) drm/nouveau/mmu: add more general vmm free/node handling functions CVE-2023-0047: (unk) mm, oom: do not trigger out_of_memory from the #PF CVE-2023-0266: (unk) ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF @@ -1081,6 +1185,7 @@ Outstanding CVEs: CVE-2023-26607: (unk) ntfs: fix out-of-bounds read in ntfs_attr_find() CVE-2023-28328: (unk) media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer() CVE-2023-2860: (unk) ipv6: sr: fix out-of-bounds read when setting HMAC data. + CVE-2023-28746: (unk) x86/mmio: Disable KVM mitigation when X86_FEATURE_CLEAR_CPU_BUF is set CVE-2023-28772: (unk) seq_buf: Fix overflow in seq_buf_putmem_hex() CVE-2023-2985: (unk) fs: hfsplus: fix UAF issue in hfsplus_put_super CVE-2023-3006: (unk) arm64: Add AMPERE1 to the Spectre-BHB affected list @@ -1147,7 +1252,7 @@ Outstanding CVEs: CVE-2023-4623: (unk) net/sched: sch_hfsc: Ensure inner classes have fsc curve CVE-2023-46343: (unk) nfc: nci: fix possible NULL pointer dereference in send_acknowledge() CVE-2023-46838: (unk) xen-netback: don't produce zero-size SKB frags - CVE-2023-47233: (unk) + CVE-2023-47233: (unk) wifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach CVE-2023-4881: (unk) netfilter: nftables: exthdr: fix 4-byte stack OOB write CVE-2023-4921: (unk) net: sched: sch_qfq: Fix UAF in qfq_dequeue() CVE-2023-51043: (unk) drm/atomic: Fix potential use-after-free in nonblocking commits @@ -1167,25 +1272,115 @@ Outstanding CVEs: CVE-2023-52445: (unk) media: pvrusb2: fix use after free on context disconnection CVE-2023-52449: (unk) mtd: Fix gluebi NULL pointer dereference caused by ftl notifier CVE-2023-52451: (unk) powerpc/pseries/memhp: Fix access beyond end of drmem array - CVE-2023-52456: (unk) serial: imx: fix tx statemachine deadlock - CVE-2023-52457: (unk) serial: 8250: omap: Don't skip resource freeing if pm_runtime_resume_and_get() failed CVE-2023-52458: (unk) block: add check that partition length needs to be aligned with block size CVE-2023-52464: (unk) EDAC/thunderx: Fix possible out-of-bounds string access + CVE-2023-52469: (unk) drivers/amd/pm: fix a use-after-free in kv_parse_power_table + CVE-2023-52470: (unk) drm/radeon: check the alloc_workqueue return value in radeon_crtc_init() + CVE-2023-52475: (unk) Input: powermate - fix use-after-free in powermate_config_complete + CVE-2023-52476: (unk) perf/x86/lbr: Filter vsyscall addresses + CVE-2023-52477: (unk) usb: hub: Guard against accesses to uninitialized BOS descriptors + CVE-2023-52478: (unk) HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect + CVE-2023-52479: (unk) ksmbd: fix uaf in smb20_oplock_break_ack + CVE-2023-52480: (unk) ksmbd: fix race condition between session lookup and expire + CVE-2023-52481: (unk) arm64: errata: Add Cortex-A520 speculative unprivileged load workaround + CVE-2023-52482: (unk) x86/srso: Add SRSO mitigation for Hygon processors + CVE-2023-52484: (unk) iommu/arm-smmu-v3: Fix soft lockup triggered by arm_smmu_mm_invalidate_range + CVE-2023-52485: (unk) drm/amd/display: Wake DMCUB before sending a command + CVE-2023-52486: (unk) drm: Don't unref the same fb many times by mistake due to deadlock handling + CVE-2023-52488: (unk) serial: sc16is7xx: convert from _raw_ to _noinc_ regmap functions for FIFO + CVE-2023-52489: (unk) mm/sparsemem: fix race in accessing memory_section->usage + CVE-2023-52491: (unk) media: mtk-jpeg: Fix use after free bug due to error path handling in mtk_jpeg_dec_device_run + CVE-2023-52498: (unk) PM: sleep: Fix possible deadlocks in core system-wide PM code + CVE-2023-52500: (unk) scsi: pm80xx: Avoid leaking tags when processing OPC_INB_SET_CONTROLLER_CONFIG command + CVE-2023-52501: (unk) ring-buffer: Do not attempt to read past "commit" + CVE-2023-52502: (unk) net: nfc: fix races in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn() + CVE-2023-52506: (unk) LoongArch: Set all reserved memblocks on Node#0 at initialization + CVE-2023-52507: (unk) nfc: nci: assert requested protocol is valid + CVE-2023-52508: (unk) nvme-fc: Prevent null pointer dereference in nvme_fc_io_getuuid() + CVE-2023-52509: (unk) ravb: Fix use-after-free issue in ravb_tx_timeout_work() + CVE-2023-52510: (unk) ieee802154: ca8210: Fix a potential UAF in ca8210_probe + CVE-2023-52511: (unk) spi: sun6i: reduce DMA RX transfer width to single byte + CVE-2023-52515: (unk) RDMA/srp: Do not call scsi_done() from srp_abort() + CVE-2023-52516: (unk) dma-debug: don't call __dma_entry_alloc_check_leak() under free_entries_lock + CVE-2023-52517: (unk) spi: sun6i: fix race between DMA RX transfer completion and RX FIFO drain + CVE-2023-52519: (unk) HID: intel-ish-hid: ipc: Disable and reenable ACPI GPE bit + CVE-2023-52522: (unk) net: fix possible store tearing in neigh_periodic_work() + CVE-2023-52527: (unk) ipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data() + CVE-2023-52528: (unk) net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg + CVE-2023-52531: (unk) wifi: iwlwifi: mvm: Fix a memory corruption issue + CVE-2023-52532: (unk) net: mana: Fix TX CQE error handling + CVE-2023-52559: (unk) iommu/vt-d: Avoid memory allocation in iommu_suspend() + CVE-2023-52561: (unk) arm64: dts: qcom: sdm845-db845c: Mark cont splash memory region as reserved + CVE-2023-52563: (unk) drm/meson: fix memory leak on ->hpd_notify callback + CVE-2023-52565: (unk) media: uvcvideo: Fix OOB read + CVE-2023-52566: (unk) nilfs2: fix potential use after free in nilfs_gccache_submit_read_data() + CVE-2023-52568: (unk) x86/sgx: Resolves SECS reclaim vs. page fault for EAUG race + CVE-2023-52569: (unk) btrfs: remove BUG() after failure to insert delayed dir index item + CVE-2023-52571: (unk) power: supply: rk817: Fix node refcount leak + CVE-2023-52572: (unk) cifs: Fix UAF in cifs_demultiplex_thread() + CVE-2023-52574: (unk) team: fix null-ptr-deref when team device type is changed + CVE-2023-52578: (unk) net: bridge: use DEV_STATS_INC() + CVE-2023-52583: (unk) ceph: fix deadlock or deadcode of misusing dget() + CVE-2023-52584: (unk) spmi: mediatek: Fix UAF on device remove + CVE-2023-52585: (unk) drm/amdgpu: Fix possible NULL dereference in amdgpu_ras_query_error_status_helper() + CVE-2023-52586: (unk) drm/msm/dpu: Add mutex lock in control vblank irq + CVE-2023-52587: (unk) IB/ipoib: Fix mcast list locking + CVE-2023-52588: (unk) f2fs: fix to tag gcing flag on page during block migration + CVE-2023-52589: (unk) media: rkisp1: Fix IRQ disable race issue + CVE-2023-52590: (unk) ocfs2: Avoid touching renamed directory if parent does not change + CVE-2023-52591: (unk) reiserfs: Avoid touching renamed directory if parent does not change + CVE-2023-52593: (unk) wifi: wfx: fix possible NULL pointer dereference in wfx_set_mfp_ap() + CVE-2023-52594: (unk) wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus() + CVE-2023-52595: (unk) wifi: rt2x00: restart beacon queue when hardware reset + CVE-2023-52596: (unk) sysctl: Fix out of bounds access for empty sysctl registers + CVE-2023-52597: (unk) KVM: s390: fix setting of fpc register + CVE-2023-52598: (unk) s390/ptrace: handle setting of fpc register correctly + CVE-2023-52599: (unk) jfs: fix array-index-out-of-bounds in diNewExt + CVE-2023-52600: (unk) jfs: fix uaf in jfs_evict_inode + CVE-2023-52601: (unk) jfs: fix array-index-out-of-bounds in dbAdjTree + CVE-2023-52602: (unk) jfs: fix slab-out-of-bounds Read in dtSearch + CVE-2023-52603: (unk) UBSAN: array-index-out-of-bounds in dtSplitRoot + CVE-2023-52604: (unk) FS:JFS:UBSAN:array-index-out-of-bounds in dbAdjTree + CVE-2023-52606: (unk) powerpc/lib: Validate size for vector operations + CVE-2023-52607: (unk) powerpc/mm: Fix null-pointer dereference in pgtable_cache_add + CVE-2023-52609: (unk) binder: fix race between mmput() and do_exit() + CVE-2023-52612: (unk) crypto: scomp - fix req->dst buffer overflow + CVE-2023-52614: (unk) PM / devfreq: Fix buffer overflow in trans_stat_show + CVE-2023-52615: (unk) hwrng: core - Fix page fault dead lock on mmap-ed hwrng + CVE-2023-52617: (unk) PCI: switchtec: Fix stdev_release() crash after surprise hot remove + CVE-2023-52618: (unk) block/rnbd-srv: Check for unlikely string overflow + CVE-2023-52619: (unk) pstore/ram: Fix crash when setting number of cpus to an odd number + CVE-2023-52620: (unk) netfilter: nf_tables: disallow timeout for anonymous sets + CVE-2023-52621: (unk) bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers + CVE-2023-52622: (unk) ext4: avoid online resizing failures due to oversized flex bg + CVE-2023-52623: (unk) SUNRPC: Fix a suspicious RCU usage warning + CVE-2023-52624: (unk) drm/amd/display: Wake DMCUB before executing GPINT commands + CVE-2023-52625: (unk) drm/amd/display: Refactor DMCUB enter/exit idle interface + CVE-2023-52628: (unk) netfilter: nftables: exthdr: fix 4-byte stack OOB write + CVE-2023-52629: (unk) sh: push-switch: Reorder cleanup operations to avoid use-after-free bug + CVE-2023-52632: (unk) drm/amdkfd: Fix lock dependency warning with srcu + CVE-2023-52633: (unk) um: time-travel: fix time corruption + CVE-2023-52634: (unk) drm/amd/display: Fix disable_otg_wa logic + CVE-2023-52635: (unk) PM / devfreq: Synchronize devfreq_monitor_[start/stop] + CVE-2023-52638: (unk) can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock + CVE-2023-52639: (unk) KVM: s390: vsie: fix race during shadow creation + CVE-2023-52640: (unk) fs/ntfs3: Fix oob in ntfs_listxattr + CVE-2023-52641: (unk) fs/ntfs3: Add NULL ptr dereference checking at the end of attr_allocate_frame() CVE-2023-5717: (unk) perf: Disallow mis-matched inherited group reads CVE-2023-6040: (unk) netfilter: nf_tables: Reject tables of unsupported family CVE-2023-6121: (unk) nvmet: nul-terminate the NQNs passed in the connect command CVE-2023-6240: (unk) - CVE-2023-6270: (unk) - CVE-2023-6356: (unk) + CVE-2023-6270: (unk) aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts + CVE-2023-6356: (unk) nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length CVE-2023-6535: (unk) - CVE-2023-6536: (unk) + CVE-2023-6536: (unk) nvmet-tcp: fix a crash in nvmet_req_complete() CVE-2023-6546: (unk) tty: n_gsm: fix the UAF caused by race condition in gsm_cleanup_mux CVE-2023-6606: (unk) smb: client: fix OOB in smbCalcSize() CVE-2023-6610: (unk) smb: client: fix potential OOB in smb2_dump_detail() CVE-2023-6915: (unk) ida: Fix crash in ida_free when the bitmap is empty CVE-2023-6931: (unk) perf: Fix perf_event_validate_size() CVE-2023-6932: (unk) ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet - CVE-2023-7042: (unk) + CVE-2023-7042: (unk) wifi: ath10k: fix NULL pointer dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev() CVE-2023-7192: (unk) netfilter: ctnetlink: fix possible refcount leak in ctnetlink_create_conntrack() CVE-2024-0340: (unk) vhost: use kzalloc() instead of kmalloc() followed by memset() CVE-2024-0584: (unk) ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet @@ -1195,10 +1390,11 @@ Outstanding CVEs: CVE-2024-1151: (unk) net: openvswitch: limit the number of recursions from action sets CVE-2024-1312: (unk) mm: lock_vma_under_rcu() must check vma->anon_vma under vma lock CVE-2024-21803: (unk) - CVE-2024-22099: (unk) + CVE-2024-2193: (unk) + CVE-2024-22099: (unk) Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security CVE-2024-22386: (unk) - CVE-2024-23196: (unk) - CVE-2024-23307: (unk) + CVE-2024-23196: (unk) ALSA: hda: fix a possible null-pointer dereference due to data race in snd_hdac_regmap_sync() + CVE-2024-23307: (unk) md/raid5: fix atomicity violation in raid5_cache_count CVE-2024-23848: (unk) CVE-2024-23849: (unk) net/rds: Fix UBSAN: array-index-out-of-bounds in rds_cmsg_recv CVE-2024-23851: (unk) dm: limit the number of targets and parameter size area @@ -1207,17 +1403,107 @@ Outstanding CVEs: CVE-2024-24858: (unk) CVE-2024-24859: (unk) CVE-2024-24860: (unk) Bluetooth: Fix atomicity violation in {min,max}_key_size_set - CVE-2024-24861: (unk) + CVE-2024-24861: (unk) media: xc4000: Fix atomicity violation in xc4000_get_frequency CVE-2024-24864: (unk) CVE-2024-25739: (unk) CVE-2024-25740: (unk) CVE-2024-25741: (unk) CVE-2024-25744: (unk) x86/coco: Disable 32-bit emulation by default on TDX and SEV - CVE-2024-26584: (unk) net: tls: handle backlogging of crypto requests - CVE-2024-26587: (unk) net: netdevsim: don't try to destroy PHC on VFs - CVE-2024-26588: (unk) LoongArch: BPF: Prevent out-of-bounds memory access - CVE-2024-26591: (unk) bpf: Fix re-attachment branch in bpf_tracing_prog_attach CVE-2024-26592: (unk) ksmbd: fix UAF issue in ksmbd_tcp_new_connection() CVE-2024-26594: (unk) ksmbd: validate mech token in session setup CVE-2024-26595: (unk) mlxsw: spectrum_acl_tcam: Fix NULL pointer dereference in error path CVE-2024-26598: (unk) KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache + CVE-2024-26600: (unk) phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP + CVE-2024-26606: (unk) binder: signal epoll threads of self-work + CVE-2024-26614: (unk) tcp: make sure init the accept_queue's spinlocks once + CVE-2024-26622: (unk) tomoyo: fix UAF write bug in tomoyo_write_control() + CVE-2024-26623: (unk) pds_core: Prevent race issues involving the adminq + CVE-2024-26625: (unk) llc: call sock_orphan() at release time + CVE-2024-26627: (unk) scsi: core: Move scsi_host_busy() out of host lock for waking up EH handler + CVE-2024-26633: (unk) ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim() + CVE-2024-26635: (unk) llc: Drop support for ETH_P_TR_802_2. + CVE-2024-26636: (unk) llc: make llc_ui_sendmsg() more robust against bonding changes + CVE-2024-26641: (unk) ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv() + CVE-2024-26642: (unk) netfilter: nf_tables: disallow anonymous set with timeout flag + CVE-2024-26644: (unk) btrfs: don't abort filesystem when attempting to snapshot deleted subvolume + CVE-2024-26646: (unk) thermal: intel: hfi: Add syscore callbacks for system-wide PM + CVE-2024-26647: (unk) drm/amd/display: Fix late derefrence 'dsc' check in 'link_set_dsc_pps_packet()' + CVE-2024-26648: (unk) drm/amd/display: Fix variable deferencing before NULL check in edp_setup_replay() + CVE-2024-26650: (unk) platform/x86: p2sb: Allow p2sb_bar() calls during PCI device probe + CVE-2024-26651: (unk) sr9800: Add check for usbnet_get_endpoints + CVE-2024-26654: (unk) ALSA: sh: aica: reorder cleanup operations to avoid UAF bugs + CVE-2024-26655: (unk) Fix memory leak in posix_clock_open() + CVE-2024-26656: (unk) drm/amdgpu: fix use-after-free bug + CVE-2024-26658: (unk) bcachefs: grab s_umount only if snapshotting + CVE-2024-26659: (unk) xhci: handle isoc Babble and Buffer Overrun events properly + CVE-2024-26663: (unk) tipc: Check the bearer type before calling tipc_udp_nl_bearer_add() + CVE-2024-26664: (unk) hwmon: (coretemp) Fix out-of-bounds memory access + CVE-2024-26668: (unk) netfilter: nft_limit: reject configurations that cause integer overflow + CVE-2024-26671: (unk) blk-mq: fix IO hang from sbitmap wakeup race + CVE-2024-26672: (unk) drm/amdgpu: Fix variable 'mca_funcs' dereferenced before NULL check in 'amdgpu_mca_smu_get_mca_entry()' + CVE-2024-26675: (unk) ppp_async: limit MRU to 64K + CVE-2024-26676: (unk) af_unix: Call kfree_skb() for dead unix_(sk)->oob_skb in GC. + CVE-2024-26677: (unk) rxrpc: Fix delayed ACKs to not set the reference serial number + CVE-2024-26679: (unk) inet: read sk->sk_family once in inet_recv_error() + CVE-2024-26685: (unk) nilfs2: fix potential bug in end_buffer_async_write + CVE-2024-26686: (unk) fs/proc: do_task_stat: use sig->stats_lock to gather the threads/children stats + CVE-2024-26687: (unk) xen/events: close evtchn after mapping cleanup + CVE-2024-26689: (unk) ceph: prevent use-after-free in encode_cap_msg() + CVE-2024-26691: (unk) KVM: arm64: Fix circular locking dependency + CVE-2024-26696: (unk) nilfs2: fix hang in nilfs_lookup_dirty_data_buffers() + CVE-2024-26697: (unk) nilfs2: fix data corruption in dsync block recovery for small block sizes + CVE-2024-26699: (unk) drm/amd/display: Fix array-index-out-of-bounds in dcn35_clkmgr + CVE-2024-26700: (unk) drm/amd/display: Fix MST Null Ptr for RV + CVE-2024-26704: (unk) ext4: fix double-free of blocks due to wrong extents moved_len + CVE-2024-26706: (unk) parisc: Fix random data corruption from exception handler + CVE-2024-26713: (unk) powerpc/pseries/iommu: Fix iommu initialisation during DLPAR add + CVE-2024-26715: (unk) usb: dwc3: gadget: Fix NULL pointer dereference in dwc3_gadget_suspend + CVE-2024-26719: (unk) nouveau: offload fence uevents work to workqueue + CVE-2024-26720: (unk) mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again + CVE-2024-26726: (unk) btrfs: don't drop extent_map for free space inode on write error + CVE-2024-26733: (unk) arp: Prevent overflow in arp_req_get(). + CVE-2024-26735: (unk) ipv6: sr: fix possible use-after-free and null-ptr-deref + CVE-2024-26738: (unk) powerpc/pseries/iommu: DLPAR add doesn't completely initialize pci_controller + CVE-2024-26739: (unk) net/sched: act_mirred: don't override retval if we already lost the skb + CVE-2024-26740: (unk) net/sched: act_mirred: use the backlog for mirred ingress + CVE-2024-26743: (unk) RDMA/qedr: Fix qedr_create_user_qp error flow + CVE-2024-26744: (unk) RDMA/srpt: Support specifying the srpt_service_guid parameter + CVE-2024-26745: (unk) powerpc/pseries/iommu: IOMMU table is not initialized for kdump over SR-IOV + CVE-2024-26748: (unk) usb: cdns3: fix memory double free when handle zero packet + CVE-2024-26752: (unk) l2tp: pass correct message length to ip6_append_data + CVE-2024-26754: (unk) gtp: fix use-after-free and null-ptr-deref in gtp_genl_dump_pdp() + CVE-2024-26756: (unk) md: Don't register sync_thread for reshape directly + CVE-2024-26757: (unk) md: Don't ignore read-only array in md_check_recovery() + CVE-2024-26758: (unk) md: Don't ignore suspended array in md_check_recovery() + CVE-2024-26759: (unk) mm/swap: fix race when skipping swapcache + CVE-2024-26763: (unk) dm-crypt: don't modify the data when using authenticated encryption + CVE-2024-26764: (unk) fs/aio: Restrict kiocb_set_cancel_fn() to I/O submitted via libaio + CVE-2024-26765: (unk) LoongArch: Disable IRQ before init_fn() for nonboot CPUs + CVE-2024-26766: (unk) IB/hfi1: Fix sdma.h tx->num_descs off-by-one error + CVE-2024-26767: (unk) drm/amd/display: fixed integer types and null check locations + CVE-2024-26768: (unk) LoongArch: Change acpi_core_pic[NR_CPUS] to acpi_core_pic[MAX_CORE_PIC] + CVE-2024-26769: (unk) nvmet-fc: avoid deadlock on delete association path + CVE-2024-26770: (unk) HID: nvidia-shield: Add missing null pointer checks to LED initialization + CVE-2024-26771: (unk) dmaengine: ti: edma: Add some null pointer checks to the edma_probe + CVE-2024-26772: (unk) ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal() + CVE-2024-26773: (unk) ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found() + CVE-2024-26774: (unk) ext4: avoid dividing by 0 in mb_update_avg_fragment_size() when block bitmap corrupt + CVE-2024-26775: (unk) aoe: avoid potential deadlock at set_capacity + CVE-2024-26776: (unk) spi: hisi-sfc-v3xx: Return IRQ_NONE if no interrupts were detected + CVE-2024-26777: (unk) fbdev: sis: Error out if pixclock equals zero + CVE-2024-26778: (unk) fbdev: savage: Error out if pixclock equals zero + CVE-2024-26779: (unk) wifi: mac80211: fix race condition on enabling fast-xmit + CVE-2024-26784: (unk) pmdomain: arm: Fix NULL dereference on scmi_perf_domain removal + CVE-2024-26789: (unk) crypto: arm64/neonbs - fix out-of-bounds access on short input + CVE-2024-26791: (unk) btrfs: dev-replace: properly validate device names + CVE-2024-26793: (unk) gtp: fix use-after-free and null-ptr-deref in gtp_newlink() + CVE-2024-26797: (unk) drm/amd/display: Prevent potential buffer overflow in map_hw_resources + CVE-2024-26798: (unk) fbcon: always restore the old font data in fbcon_do_set_font() + CVE-2024-26801: (unk) Bluetooth: Avoid potential use-after-free in hci_error_reset + CVE-2024-26802: (unk) stmmac: Clear variable when destroying workqueue + CVE-2024-26803: (unk) net: veth: clear GRO when clearing XDP even when down + CVE-2024-26804: (unk) net: ip_tunnel: prevent perpetual headroom growth + CVE-2024-26805: (unk) netlink: Fix kernel-infoleak-after-free in __skb_datagram_iter + CVE-2024-26806: (unk) spi: cadence-qspi: remove system-wide suspend helper calls from runtime PM hooks + CVE-2024-26808: (unk) netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain + CVE-2024-26809: (unk) netfilter: nft_set_pipapo: release elements in clone only from destroy path diff --git a/data/4.13/4.13_CVEs.txt b/data/4.13/4.13_CVEs.txt index 4cf1fc0ab..aaf59788a 100644 --- a/data/4.13/4.13_CVEs.txt +++ b/data/4.13/4.13_CVEs.txt @@ -457,6 +457,8 @@ CVE-2019-2181: Fix not seen in stream CVE-2019-2182: Fix not seen in stream CVE-2019-2213: Fix not seen in stream CVE-2019-2215: Fix not seen in stream +CVE-2019-25160: Fix not seen in stream +CVE-2019-25162: Fix not seen in stream CVE-2019-3016: Fix not seen in stream CVE-2019-3459: Fix not seen in stream CVE-2019-3460: Fix not seen in stream @@ -646,6 +648,11 @@ CVE-2020-36557: Fix not seen in stream CVE-2020-36558: Fix not seen in stream CVE-2020-36691: Fix not seen in stream CVE-2020-36766: Fix not seen in stream +CVE-2020-36775: Fix not seen in stream +CVE-2020-36777: Fix not seen in stream +CVE-2020-36780: Fix not seen in stream +CVE-2020-36781: Fix not seen in stream +CVE-2020-36784: Fix not seen in stream CVE-2020-3702: Fix not seen in stream CVE-2020-4788: Fix not seen in stream CVE-2020-8647: Fix not seen in stream @@ -796,6 +803,103 @@ CVE-2021-45469: Fix not seen in stream CVE-2021-45485: Fix not seen in stream CVE-2021-45486: Fix not seen in stream CVE-2021-45868: Fix not seen in stream +CVE-2021-46904: Fix not seen in stream +CVE-2021-46906: Fix not seen in stream +CVE-2021-46908: Fix not seen in stream +CVE-2021-46909: Fix not seen in stream +CVE-2021-46915: Fix not seen in stream +CVE-2021-46924: Fix not seen in stream +CVE-2021-46925: Fix not seen in stream +CVE-2021-46926: Fix not seen in stream +CVE-2021-46928: Fix not seen in stream +CVE-2021-46932: Fix not seen in stream +CVE-2021-46933: Fix not seen in stream +CVE-2021-46936: Fix not seen in stream +CVE-2021-46938: Fix not seen in stream +CVE-2021-46939: Fix not seen in stream +CVE-2021-46941: Fix not seen in stream +CVE-2021-46950: Fix not seen in stream +CVE-2021-46951: Fix not seen in stream +CVE-2021-46952: Fix not seen in stream +CVE-2021-46953: Fix not seen in stream +CVE-2021-46959: Fix not seen in stream +CVE-2021-46960: Fix not seen in stream +CVE-2021-46962: Fix not seen in stream +CVE-2021-46965: Fix not seen in stream +CVE-2021-46969: Fix not seen in stream +CVE-2021-46970: Fix not seen in stream +CVE-2021-46982: Fix not seen in stream +CVE-2021-46988: Fix not seen in stream +CVE-2021-46992: Fix not seen in stream +CVE-2021-47006: Fix not seen in stream +CVE-2021-47013: Fix not seen in stream +CVE-2021-47028: Fix not seen in stream +CVE-2021-47046: Fix not seen in stream +CVE-2021-47052: Fix not seen in stream +CVE-2021-47054: Fix not seen in stream +CVE-2021-47056: Fix not seen in stream +CVE-2021-47059: Fix not seen in stream +CVE-2021-47063: Fix not seen in stream +CVE-2021-47065: Fix not seen in stream +CVE-2021-47070: Fix not seen in stream +CVE-2021-47074: Fix not seen in stream +CVE-2021-47075: Fix not seen in stream +CVE-2021-47076: Fix not seen in stream +CVE-2021-47077: Fix not seen in stream +CVE-2021-47078: Fix not seen in stream +CVE-2021-47082: Fix not seen in stream +CVE-2021-47083: Fix not seen in stream +CVE-2021-47086: Fix not seen in stream +CVE-2021-47101: Fix not seen in stream +CVE-2021-47103: Fix not seen in stream +CVE-2021-47110: Fix not seen in stream +CVE-2021-47112: Fix not seen in stream +CVE-2021-47113: Fix not seen in stream +CVE-2021-47114: Fix not seen in stream +CVE-2021-47116: Fix not seen in stream +CVE-2021-47117: Fix not seen in stream +CVE-2021-47118: Fix not seen in stream +CVE-2021-47119: Fix not seen in stream +CVE-2021-47121: Fix not seen in stream +CVE-2021-47122: Fix not seen in stream +CVE-2021-47124: Fix not seen in stream +CVE-2021-47125: Fix not seen in stream +CVE-2021-47128: Fix not seen in stream +CVE-2021-47131: Fix not seen in stream +CVE-2021-47133: Fix not seen in stream +CVE-2021-47135: Fix not seen in stream +CVE-2021-47136: Fix not seen in stream +CVE-2021-47137: Fix not seen in stream +CVE-2021-47140: Fix not seen in stream +CVE-2021-47142: Fix not seen in stream +CVE-2021-47143: Fix not seen in stream +CVE-2021-47144: Fix not seen in stream +CVE-2021-47145: Fix not seen in stream +CVE-2021-47146: Fix not seen in stream +CVE-2021-47147: Fix not seen in stream +CVE-2021-47149: Fix not seen in stream +CVE-2021-47150: Fix not seen in stream +CVE-2021-47151: Fix not seen in stream +CVE-2021-47153: Fix not seen in stream +CVE-2021-47158: Fix not seen in stream +CVE-2021-47159: Fix not seen in stream +CVE-2021-47160: Fix not seen in stream +CVE-2021-47161: Fix not seen in stream +CVE-2021-47162: Fix not seen in stream +CVE-2021-47163: Fix not seen in stream +CVE-2021-47165: Fix not seen in stream +CVE-2021-47166: Fix not seen in stream +CVE-2021-47167: Fix not seen in stream +CVE-2021-47168: Fix not seen in stream +CVE-2021-47169: Fix not seen in stream +CVE-2021-47170: Fix not seen in stream +CVE-2021-47171: Fix not seen in stream +CVE-2021-47172: Fix not seen in stream +CVE-2021-47173: Fix not seen in stream +CVE-2021-47175: Fix not seen in stream +CVE-2021-47177: Fix not seen in stream +CVE-2021-47179: Fix not seen in stream +CVE-2021-47180: Fix not seen in stream CVE-2022-0001: Fix not seen in stream CVE-2022-0002: Fix not seen in stream CVE-2022-0168: Fix not seen in stream @@ -982,6 +1086,9 @@ CVE-2022-4744: Fix not seen in stream CVE-2022-47520: Fix not seen in stream CVE-2022-47929: Fix not seen in stream CVE-2022-48619: Fix not seen in stream +CVE-2022-48626: Fix not seen in stream +CVE-2022-48627: Fix not seen in stream +CVE-2022-48628: Fix not seen in stream CVE-2023-0030: Fix not seen in stream CVE-2023-0047: Fix not seen in stream CVE-2023-0266: Fix not seen in stream @@ -1040,6 +1147,7 @@ CVE-2023-26607: Fix not seen in stream CVE-2023-28328: Fix not seen in stream CVE-2023-28466: Fix not seen in stream CVE-2023-2860: Fix not seen in stream +CVE-2023-28746: Fix not seen in stream CVE-2023-28772: Fix not seen in stream CVE-2023-2985: Fix not seen in stream CVE-2023-3006: Fix not seen in stream @@ -1106,7 +1214,7 @@ CVE-2023-4622: Fix not seen in stream CVE-2023-4623: Fix not seen in stream CVE-2023-46343: Fix not seen in stream CVE-2023-46838: Fix not seen in stream -CVE-2023-47233: Fix unknown +CVE-2023-47233: Fix not seen in stream CVE-2023-4881: Fix not seen in stream CVE-2023-4921: Fix not seen in stream CVE-2023-51043: Fix not seen in stream @@ -1126,25 +1234,115 @@ CVE-2023-52444: Fix not seen in stream CVE-2023-52445: Fix not seen in stream CVE-2023-52449: Fix not seen in stream CVE-2023-52451: Fix not seen in stream -CVE-2023-52456: Fix not seen in stream -CVE-2023-52457: Fix not seen in stream CVE-2023-52458: Fix not seen in stream CVE-2023-52464: Fix not seen in stream +CVE-2023-52469: Fix not seen in stream +CVE-2023-52470: Fix not seen in stream +CVE-2023-52475: Fix not seen in stream +CVE-2023-52476: Fix not seen in stream +CVE-2023-52477: Fix not seen in stream +CVE-2023-52478: Fix not seen in stream +CVE-2023-52479: Fix not seen in stream +CVE-2023-52480: Fix not seen in stream +CVE-2023-52481: Fix not seen in stream +CVE-2023-52482: Fix not seen in stream +CVE-2023-52484: Fix not seen in stream +CVE-2023-52485: Fix not seen in stream +CVE-2023-52486: Fix not seen in stream +CVE-2023-52488: Fix not seen in stream +CVE-2023-52489: Fix not seen in stream +CVE-2023-52491: Fix not seen in stream +CVE-2023-52498: Fix not seen in stream +CVE-2023-52500: Fix not seen in stream +CVE-2023-52501: Fix not seen in stream +CVE-2023-52502: Fix not seen in stream +CVE-2023-52506: Fix not seen in stream +CVE-2023-52507: Fix not seen in stream +CVE-2023-52508: Fix not seen in stream +CVE-2023-52509: Fix not seen in stream +CVE-2023-52510: Fix not seen in stream +CVE-2023-52511: Fix not seen in stream +CVE-2023-52515: Fix not seen in stream +CVE-2023-52516: Fix not seen in stream +CVE-2023-52517: Fix not seen in stream +CVE-2023-52519: Fix not seen in stream +CVE-2023-52522: Fix not seen in stream +CVE-2023-52527: Fix not seen in stream +CVE-2023-52528: Fix not seen in stream +CVE-2023-52531: Fix not seen in stream +CVE-2023-52532: Fix not seen in stream +CVE-2023-52559: Fix not seen in stream +CVE-2023-52561: Fix not seen in stream +CVE-2023-52563: Fix not seen in stream +CVE-2023-52565: Fix not seen in stream +CVE-2023-52566: Fix not seen in stream +CVE-2023-52568: Fix not seen in stream +CVE-2023-52569: Fix not seen in stream +CVE-2023-52571: Fix not seen in stream +CVE-2023-52572: Fix not seen in stream +CVE-2023-52574: Fix not seen in stream +CVE-2023-52578: Fix not seen in stream +CVE-2023-52583: Fix not seen in stream +CVE-2023-52584: Fix not seen in stream +CVE-2023-52585: Fix not seen in stream +CVE-2023-52586: Fix not seen in stream +CVE-2023-52587: Fix not seen in stream +CVE-2023-52588: Fix not seen in stream +CVE-2023-52589: Fix not seen in stream +CVE-2023-52590: Fix not seen in stream +CVE-2023-52591: Fix not seen in stream +CVE-2023-52593: Fix not seen in stream +CVE-2023-52594: Fix not seen in stream +CVE-2023-52595: Fix not seen in stream +CVE-2023-52596: Fix not seen in stream +CVE-2023-52597: Fix not seen in stream +CVE-2023-52598: Fix not seen in stream +CVE-2023-52599: Fix not seen in stream +CVE-2023-52600: Fix not seen in stream +CVE-2023-52601: Fix not seen in stream +CVE-2023-52602: Fix not seen in stream +CVE-2023-52603: Fix not seen in stream +CVE-2023-52604: Fix not seen in stream +CVE-2023-52606: Fix not seen in stream +CVE-2023-52607: Fix not seen in stream +CVE-2023-52609: Fix not seen in stream +CVE-2023-52612: Fix not seen in stream +CVE-2023-52614: Fix not seen in stream +CVE-2023-52615: Fix not seen in stream +CVE-2023-52617: Fix not seen in stream +CVE-2023-52618: Fix not seen in stream +CVE-2023-52619: Fix not seen in stream +CVE-2023-52620: Fix not seen in stream +CVE-2023-52621: Fix not seen in stream +CVE-2023-52622: Fix not seen in stream +CVE-2023-52623: Fix not seen in stream +CVE-2023-52624: Fix not seen in stream +CVE-2023-52625: Fix not seen in stream +CVE-2023-52628: Fix not seen in stream +CVE-2023-52629: Fix not seen in stream +CVE-2023-52632: Fix not seen in stream +CVE-2023-52633: Fix not seen in stream +CVE-2023-52634: Fix not seen in stream +CVE-2023-52635: Fix not seen in stream +CVE-2023-52638: Fix not seen in stream +CVE-2023-52639: Fix not seen in stream +CVE-2023-52640: Fix not seen in stream +CVE-2023-52641: Fix not seen in stream CVE-2023-5717: Fix not seen in stream CVE-2023-6040: Fix not seen in stream CVE-2023-6121: Fix not seen in stream CVE-2023-6240: Fix unknown -CVE-2023-6270: Fix unknown -CVE-2023-6356: Fix unknown +CVE-2023-6270: Fix not seen in stream +CVE-2023-6356: Fix not seen in stream CVE-2023-6535: Fix unknown -CVE-2023-6536: Fix unknown +CVE-2023-6536: Fix not seen in stream CVE-2023-6546: Fix not seen in stream CVE-2023-6606: Fix not seen in stream CVE-2023-6610: Fix not seen in stream CVE-2023-6915: Fix not seen in stream CVE-2023-6931: Fix not seen in stream CVE-2023-6932: Fix not seen in stream -CVE-2023-7042: Fix unknown +CVE-2023-7042: Fix not seen in stream CVE-2023-7192: Fix not seen in stream CVE-2024-0340: Fix not seen in stream CVE-2024-0564: Fix unknown @@ -1155,10 +1353,11 @@ CVE-2024-1086: Fix not seen in stream CVE-2024-1151: Fix not seen in stream CVE-2024-1312: Fix not seen in stream CVE-2024-21803: Fix unknown -CVE-2024-22099: Fix unknown +CVE-2024-2193: Fix unknown +CVE-2024-22099: Fix not seen in stream CVE-2024-22386: Fix unknown -CVE-2024-23196: Fix unknown -CVE-2024-23307: Fix unknown +CVE-2024-23196: Fix not seen in stream +CVE-2024-23307: Fix not seen in stream CVE-2024-23848: Fix unknown CVE-2024-23849: Fix not seen in stream CVE-2024-23851: Fix not seen in stream @@ -1167,17 +1366,107 @@ CVE-2024-24857: Fix unknown CVE-2024-24858: Fix unknown CVE-2024-24859: Fix unknown CVE-2024-24860: Fix not seen in stream -CVE-2024-24861: Fix unknown +CVE-2024-24861: Fix not seen in stream CVE-2024-24864: Fix unknown CVE-2024-25739: Fix unknown CVE-2024-25740: Fix unknown CVE-2024-25741: Fix unknown CVE-2024-25744: Fix not seen in stream -CVE-2024-26584: Fix not seen in stream -CVE-2024-26587: Fix not seen in stream -CVE-2024-26588: Fix not seen in stream -CVE-2024-26591: Fix not seen in stream CVE-2024-26592: Fix not seen in stream CVE-2024-26594: Fix not seen in stream CVE-2024-26595: Fix not seen in stream CVE-2024-26598: Fix not seen in stream +CVE-2024-26600: Fix not seen in stream +CVE-2024-26606: Fix not seen in stream +CVE-2024-26614: Fix not seen in stream +CVE-2024-26622: Fix not seen in stream +CVE-2024-26623: Fix not seen in stream +CVE-2024-26625: Fix not seen in stream +CVE-2024-26627: Fix not seen in stream +CVE-2024-26633: Fix not seen in stream +CVE-2024-26635: Fix not seen in stream +CVE-2024-26636: Fix not seen in stream +CVE-2024-26641: Fix not seen in stream +CVE-2024-26642: Fix not seen in stream +CVE-2024-26644: Fix not seen in stream +CVE-2024-26646: Fix not seen in stream +CVE-2024-26647: Fix not seen in stream +CVE-2024-26648: Fix not seen in stream +CVE-2024-26650: Fix not seen in stream +CVE-2024-26651: Fix not seen in stream +CVE-2024-26654: Fix not seen in stream +CVE-2024-26655: Fix not seen in stream +CVE-2024-26656: Fix not seen in stream +CVE-2024-26658: Fix not seen in stream +CVE-2024-26659: Fix not seen in stream +CVE-2024-26663: Fix not seen in stream +CVE-2024-26664: Fix not seen in stream +CVE-2024-26668: Fix not seen in stream +CVE-2024-26671: Fix not seen in stream +CVE-2024-26672: Fix not seen in stream +CVE-2024-26675: Fix not seen in stream +CVE-2024-26676: Fix not seen in stream +CVE-2024-26677: Fix not seen in stream +CVE-2024-26679: Fix not seen in stream +CVE-2024-26685: Fix not seen in stream +CVE-2024-26686: Fix not seen in stream +CVE-2024-26687: Fix not seen in stream +CVE-2024-26689: Fix not seen in stream +CVE-2024-26691: Fix not seen in stream +CVE-2024-26696: Fix not seen in stream +CVE-2024-26697: Fix not seen in stream +CVE-2024-26699: Fix not seen in stream +CVE-2024-26700: Fix not seen in stream +CVE-2024-26704: Fix not seen in stream +CVE-2024-26706: Fix not seen in stream +CVE-2024-26713: Fix not seen in stream +CVE-2024-26715: Fix not seen in stream +CVE-2024-26719: Fix not seen in stream +CVE-2024-26720: Fix not seen in stream +CVE-2024-26726: Fix not seen in stream +CVE-2024-26733: Fix not seen in stream +CVE-2024-26735: Fix not seen in stream +CVE-2024-26738: Fix not seen in stream +CVE-2024-26739: Fix not seen in stream +CVE-2024-26740: Fix not seen in stream +CVE-2024-26743: Fix not seen in stream +CVE-2024-26744: Fix not seen in stream +CVE-2024-26745: Fix not seen in stream +CVE-2024-26748: Fix not seen in stream +CVE-2024-26752: Fix not seen in stream +CVE-2024-26754: Fix not seen in stream +CVE-2024-26756: Fix not seen in stream +CVE-2024-26757: Fix not seen in stream +CVE-2024-26758: Fix not seen in stream +CVE-2024-26759: Fix not seen in stream +CVE-2024-26763: Fix not seen in stream +CVE-2024-26764: Fix not seen in stream +CVE-2024-26765: Fix not seen in stream +CVE-2024-26766: Fix not seen in stream +CVE-2024-26767: Fix not seen in stream +CVE-2024-26768: Fix not seen in stream +CVE-2024-26769: Fix not seen in stream +CVE-2024-26770: Fix not seen in stream +CVE-2024-26771: Fix not seen in stream +CVE-2024-26772: Fix not seen in stream +CVE-2024-26773: Fix not seen in stream +CVE-2024-26774: Fix not seen in stream +CVE-2024-26775: Fix not seen in stream +CVE-2024-26776: Fix not seen in stream +CVE-2024-26777: Fix not seen in stream +CVE-2024-26778: Fix not seen in stream +CVE-2024-26779: Fix not seen in stream +CVE-2024-26784: Fix not seen in stream +CVE-2024-26789: Fix not seen in stream +CVE-2024-26791: Fix not seen in stream +CVE-2024-26793: Fix not seen in stream +CVE-2024-26797: Fix not seen in stream +CVE-2024-26798: Fix not seen in stream +CVE-2024-26801: Fix not seen in stream +CVE-2024-26802: Fix not seen in stream +CVE-2024-26803: Fix not seen in stream +CVE-2024-26804: Fix not seen in stream +CVE-2024-26805: Fix not seen in stream +CVE-2024-26806: Fix not seen in stream +CVE-2024-26808: Fix not seen in stream +CVE-2024-26809: Fix not seen in stream diff --git a/data/4.13/4.13_security.txt b/data/4.13/4.13_security.txt index 30ebdfd5e..30c8aaaaf 100644 --- a/data/4.13/4.13_security.txt +++ b/data/4.13/4.13_security.txt @@ -487,6 +487,8 @@ Outstanding CVEs: CVE-2019-2182: (unk) arm64: Enforce BBM for huge IO/VMAP mappings CVE-2019-2213: (unk) binder: fix possible UAF when freeing buffer CVE-2019-2215: (unk) ANDROID: binder: remove waitqueue when thread exits. + CVE-2019-25160: (unk) netlabel: fix out-of-bounds memory accesses + CVE-2019-25162: (unk) i2c: Fix a potential use after free CVE-2019-3016: (unk) x86/kvm: Be careful not to clear KVM_VCPU_FLUSH_TLB bit CVE-2019-3459: (unk) Bluetooth: Verify that l2cap_get_conf_opt provides large enough buffer CVE-2019-3460: (unk) Bluetooth: Check L2CAP option sizes returned from l2cap_get_conf_opt @@ -674,6 +676,11 @@ Outstanding CVEs: CVE-2020-36558: (unk) vt: vt_ioctl: fix race in VT_RESIZEX CVE-2020-36691: (unk) netlink: limit recursion depth in policy validation CVE-2020-36766: (unk) cec-api: prevent leaking memory through hole in structure + CVE-2020-36775: (unk) f2fs: fix to avoid potential deadlock + CVE-2020-36777: (unk) media: dvbdev: Fix memory leak in dvb_media_device_free() + CVE-2020-36780: (unk) i2c: sprd: fix reference leak when pm_runtime_get_sync fails + CVE-2020-36781: (unk) i2c: imx: fix reference leak when pm_runtime_get_sync fails + CVE-2020-36784: (unk) i2c: cadence: fix reference leak when pm_runtime_get_sync fails CVE-2020-3702: (unk) ath: Use safer key clearing with key cache entries CVE-2020-4788: (unk) powerpc/64s: flush L1D on kernel entry CVE-2020-8647: (unk) vgacon: Fix a UAF in vgacon_invert_region @@ -824,6 +831,103 @@ Outstanding CVEs: CVE-2021-45485: (unk) ipv6: use prandom_u32() for ID generation CVE-2021-45486: (unk) inet: use bigger hash table for IP ID generation CVE-2021-45868: (unk) quota: check block number when reading the block in quota file + CVE-2021-46904: (unk) net: hso: fix null-ptr-deref during tty device unregistration + CVE-2021-46906: (unk) HID: usbhid: fix info leak in hid_submit_ctrl + CVE-2021-46908: (unk) bpf: Use correct permission flag for mixed signed bounds arithmetic + CVE-2021-46909: (unk) ARM: footbridge: fix PCI interrupt mapping + CVE-2021-46915: (unk) netfilter: nft_limit: avoid possible divide error in nft_limit_init + CVE-2021-46924: (unk) NFC: st21nfca: Fix memory leak in device probe and remove + CVE-2021-46925: (unk) net/smc: fix kernel panic caused by race of smc_sock + CVE-2021-46926: (unk) ALSA: hda: intel-sdw-acpi: harden detection of controller + CVE-2021-46928: (unk) parisc: Clear stale IIR value on instruction access rights trap + CVE-2021-46932: (unk) Input: appletouch - initialize work before device registration + CVE-2021-46933: (unk) usb: gadget: f_fs: Clear ffs_eventfd in ffs_data_clear. + CVE-2021-46936: (unk) net: fix use-after-free in tw_timer_handler + CVE-2021-46938: (unk) dm rq: fix double free of blk_mq_tag_set in dev remove after table load fails + CVE-2021-46939: (unk) tracing: Restructure trace_clock_global() to never block + CVE-2021-46941: (unk) usb: dwc3: core: Do core softreset when switch mode + CVE-2021-46950: (unk) md/raid1: properly indicate failure when ending a failed write request + CVE-2021-46951: (unk) tpm: efi: Use local variable for calculating final log size + CVE-2021-46952: (unk) NFS: fs_context: validate UDP retrans to prevent shift out-of-bounds + CVE-2021-46953: (unk) ACPI: GTDT: Don't corrupt interrupt mappings on watchdow probe failure + CVE-2021-46959: (unk) spi: Fix use-after-free with devm_spi_alloc_* + CVE-2021-46960: (unk) cifs: Return correct error code from smb2_get_enc_key + CVE-2021-46962: (unk) mmc: uniphier-sd: Fix a resource leak in the remove function + CVE-2021-46965: (unk) mtd: physmap: physmap-bt1-rom: Fix unintentional stack access + CVE-2021-46969: (unk) bus: mhi: core: Fix invalid error returning in mhi_queue + CVE-2021-46970: (unk) bus: mhi: pci_generic: Remove WQ_MEM_RECLAIM flag from state workqueue + CVE-2021-46982: (unk) f2fs: compress: fix race condition of overwrite vs truncate + CVE-2021-46988: (unk) userfaultfd: release page in error path to avoid BUG_ON + CVE-2021-46992: (unk) netfilter: nftables: avoid overflows in nft_hash_buckets() + CVE-2021-47006: (unk) ARM: 9064/1: hw_breakpoint: Do not directly check the event's overflow_handler hook + CVE-2021-47013: (unk) net:emac/emac-mac: Fix a use after free in emac_mac_tx_buf_send + CVE-2021-47028: (unk) mt76: mt7915: fix txrate reporting + CVE-2021-47046: (unk) drm/amd/display: Fix off by one in hdmi_14_process_transaction() + CVE-2021-47052: (unk) crypto: sa2ul - Fix memory leak of rxd + CVE-2021-47054: (unk) bus: qcom: Put child node before return + CVE-2021-47056: (unk) crypto: qat - ADF_STATUS_PF_RUNNING should be set after adf_dev_init + CVE-2021-47059: (unk) crypto: sun8i-ss - fix result memory leak on error path + CVE-2021-47063: (unk) drm: bridge/panel: Cleanup connector on bridge detach + CVE-2021-47065: (unk) rtw88: Fix array overrun in rtw_get_tx_power_params() + CVE-2021-47070: (unk) uio_hv_generic: Fix another memory leak in error handling paths + CVE-2021-47074: (unk) nvme-loop: fix memory leak in nvme_loop_create_ctrl() + CVE-2021-47075: (unk) nvmet: fix memory leak in nvmet_alloc_ctrl() + CVE-2021-47076: (unk) RDMA/rxe: Return CQE error if invalid lkey was supplied + CVE-2021-47077: (unk) scsi: qedf: Add pointer checks in qedf_update_link_speed() + CVE-2021-47078: (unk) RDMA/rxe: Clear all QP fields if creation failed + CVE-2021-47082: (unk) tun: avoid double free in tun_free_netdev + CVE-2021-47083: (unk) pinctrl: mediatek: fix global-out-of-bounds issue + CVE-2021-47086: (unk) phonet/pep: refuse to enable an unbound pipe + CVE-2021-47101: (unk) asix: fix uninit-value in asix_mdio_read() + CVE-2021-47103: (unk) inet: fully convert sk->sk_rx_dst to RCU rules + CVE-2021-47110: (unk) x86/kvm: Disable kvmclock on all CPUs on shutdown + CVE-2021-47112: (unk) x86/kvm: Teardown PV features on boot CPU as well + CVE-2021-47113: (unk) btrfs: abort in rename_exchange if we fail to insert the second ref + CVE-2021-47114: (unk) ocfs2: fix data corruption by fallocate + CVE-2021-47116: (unk) ext4: fix memory leak in ext4_mb_init_backend on error path. + CVE-2021-47117: (unk) ext4: fix bug on in ext4_es_cache_extent as ext4_split_extent_at failed + CVE-2021-47118: (unk) pid: take a reference when initializing `cad_pid` + CVE-2021-47119: (unk) ext4: fix memory leak in ext4_fill_super + CVE-2021-47121: (unk) net: caif: fix memory leak in cfusbl_device_notify + CVE-2021-47122: (unk) net: caif: fix memory leak in caif_device_notify + CVE-2021-47124: (unk) io_uring: fix link timeout refs + CVE-2021-47125: (unk) sch_htb: fix refcount leak in htb_parent_to_leaf_offload + CVE-2021-47128: (unk) bpf, lockdown, audit: Fix buggy SELinux lockdown permission checks + CVE-2021-47131: (unk) net/tls: Fix use-after-free after the TLS device goes down and up + CVE-2021-47133: (unk) HID: amd_sfh: Fix memory leak in amd_sfh_work + CVE-2021-47135: (unk) mt76: mt7921: fix possible AOOB issue in mt7921_mcu_tx_rate_report + CVE-2021-47136: (unk) net: zero-initialize tc skb extension on allocation + CVE-2021-47137: (unk) net: lantiq: fix memory corruption in RX ring + CVE-2021-47140: (unk) iommu/amd: Clear DMA ops when switching domain + CVE-2021-47142: (unk) drm/amdgpu: Fix a use-after-free + CVE-2021-47143: (unk) net/smc: remove device from smcd_dev_list after failed device_add() + CVE-2021-47144: (unk) drm/amd/amdgpu: fix refcount leak + CVE-2021-47145: (unk) btrfs: do not BUG_ON in link_to_fixup_dir + CVE-2021-47146: (unk) mld: fix panic in mld_newpack() + CVE-2021-47147: (unk) ptp: ocp: Fix a resource leak in an error handling path + CVE-2021-47149: (unk) net: fujitsu: fix potential null-ptr-deref + CVE-2021-47150: (unk) net: fec: fix the potential memory leak in fec_enet_init() + CVE-2021-47151: (unk) interconnect: qcom: bcm-voter: add a missing of_node_put() + CVE-2021-47153: (unk) i2c: i801: Don't generate an interrupt on bus reset + CVE-2021-47158: (unk) net: dsa: sja1105: add error handling in sja1105_setup() + CVE-2021-47159: (unk) net: dsa: fix a crash if ->get_sset_count() fails + CVE-2021-47160: (unk) net: dsa: mt7530: fix VLAN traffic leaks + CVE-2021-47161: (unk) spi: spi-fsl-dspi: Fix a resource leak in an error handling path + CVE-2021-47162: (unk) tipc: skb_linearize the head skb when reassembling msgs + CVE-2021-47163: (unk) tipc: wait and exit until all work queues are done + CVE-2021-47165: (unk) drm/meson: fix shutdown crash when component not probed + CVE-2021-47166: (unk) NFS: Don't corrupt the value of pg_bytes_written in nfs_do_recoalesce() + CVE-2021-47167: (unk) NFS: Fix an Oopsable condition in __nfs_pageio_add_request() + CVE-2021-47168: (unk) NFS: fix an incorrect limit in filelayout_decode_layout() + CVE-2021-47169: (unk) serial: rp2: use 'request_firmware' instead of 'request_firmware_nowait' + CVE-2021-47170: (unk) USB: usbfs: Don't WARN about excessively large memory allocations + CVE-2021-47171: (unk) net: usb: fix memory leak in smsc75xx_bind + CVE-2021-47172: (unk) iio: adc: ad7124: Fix potential overflow due to non sequential channel numbers + CVE-2021-47173: (unk) misc/uss720: fix memory leak in uss720_probe + CVE-2021-47175: (unk) net/sched: fq_pie: fix OOB access in the traffic path + CVE-2021-47177: (unk) iommu/vt-d: Fix sysfs leak in alloc_iommu() + CVE-2021-47179: (unk) NFSv4: Fix a NULL pointer dereference in pnfs_mark_matching_lsegs_return() + CVE-2021-47180: (unk) NFC: nci: fix memory leak in nci_allocate_device CVE-2022-0001: (unk) x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE CVE-2022-0002: (unk) x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE CVE-2022-0168: (unk) cifs: fix NULL ptr dereference in smb2_ioctl_query_info() @@ -1010,6 +1114,9 @@ Outstanding CVEs: CVE-2022-47520: (unk) wifi: wilc1000: validate pairwise and authentication suite offsets CVE-2022-47929: (unk) net: sched: disallow noqueue for qdisc classes CVE-2022-48619: (unk) Input: add bounds checking to input_set_capability() + CVE-2022-48626: (unk) moxart: fix potential use-after-free on remove path + CVE-2022-48627: (unk) vt: fix memory overlapping when deleting chars in the buffer + CVE-2022-48628: (unk) ceph: drop messages from MDS when unmounting CVE-2023-0030: (unk) drm/nouveau/mmu: add more general vmm free/node handling functions CVE-2023-0047: (unk) mm, oom: do not trigger out_of_memory from the #PF CVE-2023-0266: (unk) ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF @@ -1068,6 +1175,7 @@ Outstanding CVEs: CVE-2023-28328: (unk) media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer() CVE-2023-28466: (unk) net: tls: fix possible race condition between do_tls_getsockopt_conf() and do_tls_setsockopt_conf() CVE-2023-2860: (unk) ipv6: sr: fix out-of-bounds read when setting HMAC data. + CVE-2023-28746: (unk) x86/mmio: Disable KVM mitigation when X86_FEATURE_CLEAR_CPU_BUF is set CVE-2023-28772: (unk) seq_buf: Fix overflow in seq_buf_putmem_hex() CVE-2023-2985: (unk) fs: hfsplus: fix UAF issue in hfsplus_put_super CVE-2023-3006: (unk) arm64: Add AMPERE1 to the Spectre-BHB affected list @@ -1134,7 +1242,7 @@ Outstanding CVEs: CVE-2023-4623: (unk) net/sched: sch_hfsc: Ensure inner classes have fsc curve CVE-2023-46343: (unk) nfc: nci: fix possible NULL pointer dereference in send_acknowledge() CVE-2023-46838: (unk) xen-netback: don't produce zero-size SKB frags - CVE-2023-47233: (unk) + CVE-2023-47233: (unk) wifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach CVE-2023-4881: (unk) netfilter: nftables: exthdr: fix 4-byte stack OOB write CVE-2023-4921: (unk) net: sched: sch_qfq: Fix UAF in qfq_dequeue() CVE-2023-51043: (unk) drm/atomic: Fix potential use-after-free in nonblocking commits @@ -1154,25 +1262,115 @@ Outstanding CVEs: CVE-2023-52445: (unk) media: pvrusb2: fix use after free on context disconnection CVE-2023-52449: (unk) mtd: Fix gluebi NULL pointer dereference caused by ftl notifier CVE-2023-52451: (unk) powerpc/pseries/memhp: Fix access beyond end of drmem array - CVE-2023-52456: (unk) serial: imx: fix tx statemachine deadlock - CVE-2023-52457: (unk) serial: 8250: omap: Don't skip resource freeing if pm_runtime_resume_and_get() failed CVE-2023-52458: (unk) block: add check that partition length needs to be aligned with block size CVE-2023-52464: (unk) EDAC/thunderx: Fix possible out-of-bounds string access + CVE-2023-52469: (unk) drivers/amd/pm: fix a use-after-free in kv_parse_power_table + CVE-2023-52470: (unk) drm/radeon: check the alloc_workqueue return value in radeon_crtc_init() + CVE-2023-52475: (unk) Input: powermate - fix use-after-free in powermate_config_complete + CVE-2023-52476: (unk) perf/x86/lbr: Filter vsyscall addresses + CVE-2023-52477: (unk) usb: hub: Guard against accesses to uninitialized BOS descriptors + CVE-2023-52478: (unk) HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect + CVE-2023-52479: (unk) ksmbd: fix uaf in smb20_oplock_break_ack + CVE-2023-52480: (unk) ksmbd: fix race condition between session lookup and expire + CVE-2023-52481: (unk) arm64: errata: Add Cortex-A520 speculative unprivileged load workaround + CVE-2023-52482: (unk) x86/srso: Add SRSO mitigation for Hygon processors + CVE-2023-52484: (unk) iommu/arm-smmu-v3: Fix soft lockup triggered by arm_smmu_mm_invalidate_range + CVE-2023-52485: (unk) drm/amd/display: Wake DMCUB before sending a command + CVE-2023-52486: (unk) drm: Don't unref the same fb many times by mistake due to deadlock handling + CVE-2023-52488: (unk) serial: sc16is7xx: convert from _raw_ to _noinc_ regmap functions for FIFO + CVE-2023-52489: (unk) mm/sparsemem: fix race in accessing memory_section->usage + CVE-2023-52491: (unk) media: mtk-jpeg: Fix use after free bug due to error path handling in mtk_jpeg_dec_device_run + CVE-2023-52498: (unk) PM: sleep: Fix possible deadlocks in core system-wide PM code + CVE-2023-52500: (unk) scsi: pm80xx: Avoid leaking tags when processing OPC_INB_SET_CONTROLLER_CONFIG command + CVE-2023-52501: (unk) ring-buffer: Do not attempt to read past "commit" + CVE-2023-52502: (unk) net: nfc: fix races in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn() + CVE-2023-52506: (unk) LoongArch: Set all reserved memblocks on Node#0 at initialization + CVE-2023-52507: (unk) nfc: nci: assert requested protocol is valid + CVE-2023-52508: (unk) nvme-fc: Prevent null pointer dereference in nvme_fc_io_getuuid() + CVE-2023-52509: (unk) ravb: Fix use-after-free issue in ravb_tx_timeout_work() + CVE-2023-52510: (unk) ieee802154: ca8210: Fix a potential UAF in ca8210_probe + CVE-2023-52511: (unk) spi: sun6i: reduce DMA RX transfer width to single byte + CVE-2023-52515: (unk) RDMA/srp: Do not call scsi_done() from srp_abort() + CVE-2023-52516: (unk) dma-debug: don't call __dma_entry_alloc_check_leak() under free_entries_lock + CVE-2023-52517: (unk) spi: sun6i: fix race between DMA RX transfer completion and RX FIFO drain + CVE-2023-52519: (unk) HID: intel-ish-hid: ipc: Disable and reenable ACPI GPE bit + CVE-2023-52522: (unk) net: fix possible store tearing in neigh_periodic_work() + CVE-2023-52527: (unk) ipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data() + CVE-2023-52528: (unk) net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg + CVE-2023-52531: (unk) wifi: iwlwifi: mvm: Fix a memory corruption issue + CVE-2023-52532: (unk) net: mana: Fix TX CQE error handling + CVE-2023-52559: (unk) iommu/vt-d: Avoid memory allocation in iommu_suspend() + CVE-2023-52561: (unk) arm64: dts: qcom: sdm845-db845c: Mark cont splash memory region as reserved + CVE-2023-52563: (unk) drm/meson: fix memory leak on ->hpd_notify callback + CVE-2023-52565: (unk) media: uvcvideo: Fix OOB read + CVE-2023-52566: (unk) nilfs2: fix potential use after free in nilfs_gccache_submit_read_data() + CVE-2023-52568: (unk) x86/sgx: Resolves SECS reclaim vs. page fault for EAUG race + CVE-2023-52569: (unk) btrfs: remove BUG() after failure to insert delayed dir index item + CVE-2023-52571: (unk) power: supply: rk817: Fix node refcount leak + CVE-2023-52572: (unk) cifs: Fix UAF in cifs_demultiplex_thread() + CVE-2023-52574: (unk) team: fix null-ptr-deref when team device type is changed + CVE-2023-52578: (unk) net: bridge: use DEV_STATS_INC() + CVE-2023-52583: (unk) ceph: fix deadlock or deadcode of misusing dget() + CVE-2023-52584: (unk) spmi: mediatek: Fix UAF on device remove + CVE-2023-52585: (unk) drm/amdgpu: Fix possible NULL dereference in amdgpu_ras_query_error_status_helper() + CVE-2023-52586: (unk) drm/msm/dpu: Add mutex lock in control vblank irq + CVE-2023-52587: (unk) IB/ipoib: Fix mcast list locking + CVE-2023-52588: (unk) f2fs: fix to tag gcing flag on page during block migration + CVE-2023-52589: (unk) media: rkisp1: Fix IRQ disable race issue + CVE-2023-52590: (unk) ocfs2: Avoid touching renamed directory if parent does not change + CVE-2023-52591: (unk) reiserfs: Avoid touching renamed directory if parent does not change + CVE-2023-52593: (unk) wifi: wfx: fix possible NULL pointer dereference in wfx_set_mfp_ap() + CVE-2023-52594: (unk) wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus() + CVE-2023-52595: (unk) wifi: rt2x00: restart beacon queue when hardware reset + CVE-2023-52596: (unk) sysctl: Fix out of bounds access for empty sysctl registers + CVE-2023-52597: (unk) KVM: s390: fix setting of fpc register + CVE-2023-52598: (unk) s390/ptrace: handle setting of fpc register correctly + CVE-2023-52599: (unk) jfs: fix array-index-out-of-bounds in diNewExt + CVE-2023-52600: (unk) jfs: fix uaf in jfs_evict_inode + CVE-2023-52601: (unk) jfs: fix array-index-out-of-bounds in dbAdjTree + CVE-2023-52602: (unk) jfs: fix slab-out-of-bounds Read in dtSearch + CVE-2023-52603: (unk) UBSAN: array-index-out-of-bounds in dtSplitRoot + CVE-2023-52604: (unk) FS:JFS:UBSAN:array-index-out-of-bounds in dbAdjTree + CVE-2023-52606: (unk) powerpc/lib: Validate size for vector operations + CVE-2023-52607: (unk) powerpc/mm: Fix null-pointer dereference in pgtable_cache_add + CVE-2023-52609: (unk) binder: fix race between mmput() and do_exit() + CVE-2023-52612: (unk) crypto: scomp - fix req->dst buffer overflow + CVE-2023-52614: (unk) PM / devfreq: Fix buffer overflow in trans_stat_show + CVE-2023-52615: (unk) hwrng: core - Fix page fault dead lock on mmap-ed hwrng + CVE-2023-52617: (unk) PCI: switchtec: Fix stdev_release() crash after surprise hot remove + CVE-2023-52618: (unk) block/rnbd-srv: Check for unlikely string overflow + CVE-2023-52619: (unk) pstore/ram: Fix crash when setting number of cpus to an odd number + CVE-2023-52620: (unk) netfilter: nf_tables: disallow timeout for anonymous sets + CVE-2023-52621: (unk) bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers + CVE-2023-52622: (unk) ext4: avoid online resizing failures due to oversized flex bg + CVE-2023-52623: (unk) SUNRPC: Fix a suspicious RCU usage warning + CVE-2023-52624: (unk) drm/amd/display: Wake DMCUB before executing GPINT commands + CVE-2023-52625: (unk) drm/amd/display: Refactor DMCUB enter/exit idle interface + CVE-2023-52628: (unk) netfilter: nftables: exthdr: fix 4-byte stack OOB write + CVE-2023-52629: (unk) sh: push-switch: Reorder cleanup operations to avoid use-after-free bug + CVE-2023-52632: (unk) drm/amdkfd: Fix lock dependency warning with srcu + CVE-2023-52633: (unk) um: time-travel: fix time corruption + CVE-2023-52634: (unk) drm/amd/display: Fix disable_otg_wa logic + CVE-2023-52635: (unk) PM / devfreq: Synchronize devfreq_monitor_[start/stop] + CVE-2023-52638: (unk) can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock + CVE-2023-52639: (unk) KVM: s390: vsie: fix race during shadow creation + CVE-2023-52640: (unk) fs/ntfs3: Fix oob in ntfs_listxattr + CVE-2023-52641: (unk) fs/ntfs3: Add NULL ptr dereference checking at the end of attr_allocate_frame() CVE-2023-5717: (unk) perf: Disallow mis-matched inherited group reads CVE-2023-6040: (unk) netfilter: nf_tables: Reject tables of unsupported family CVE-2023-6121: (unk) nvmet: nul-terminate the NQNs passed in the connect command CVE-2023-6240: (unk) - CVE-2023-6270: (unk) - CVE-2023-6356: (unk) + CVE-2023-6270: (unk) aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts + CVE-2023-6356: (unk) nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length CVE-2023-6535: (unk) - CVE-2023-6536: (unk) + CVE-2023-6536: (unk) nvmet-tcp: fix a crash in nvmet_req_complete() CVE-2023-6546: (unk) tty: n_gsm: fix the UAF caused by race condition in gsm_cleanup_mux CVE-2023-6606: (unk) smb: client: fix OOB in smbCalcSize() CVE-2023-6610: (unk) smb: client: fix potential OOB in smb2_dump_detail() CVE-2023-6915: (unk) ida: Fix crash in ida_free when the bitmap is empty CVE-2023-6931: (unk) perf: Fix perf_event_validate_size() CVE-2023-6932: (unk) ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet - CVE-2023-7042: (unk) + CVE-2023-7042: (unk) wifi: ath10k: fix NULL pointer dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev() CVE-2023-7192: (unk) netfilter: ctnetlink: fix possible refcount leak in ctnetlink_create_conntrack() CVE-2024-0340: (unk) vhost: use kzalloc() instead of kmalloc() followed by memset() CVE-2024-0564: (unk) @@ -1183,10 +1381,11 @@ Outstanding CVEs: CVE-2024-1151: (unk) net: openvswitch: limit the number of recursions from action sets CVE-2024-1312: (unk) mm: lock_vma_under_rcu() must check vma->anon_vma under vma lock CVE-2024-21803: (unk) - CVE-2024-22099: (unk) + CVE-2024-2193: (unk) + CVE-2024-22099: (unk) Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security CVE-2024-22386: (unk) - CVE-2024-23196: (unk) - CVE-2024-23307: (unk) + CVE-2024-23196: (unk) ALSA: hda: fix a possible null-pointer dereference due to data race in snd_hdac_regmap_sync() + CVE-2024-23307: (unk) md/raid5: fix atomicity violation in raid5_cache_count CVE-2024-23848: (unk) CVE-2024-23849: (unk) net/rds: Fix UBSAN: array-index-out-of-bounds in rds_cmsg_recv CVE-2024-23851: (unk) dm: limit the number of targets and parameter size area @@ -1195,17 +1394,107 @@ Outstanding CVEs: CVE-2024-24858: (unk) CVE-2024-24859: (unk) CVE-2024-24860: (unk) Bluetooth: Fix atomicity violation in {min,max}_key_size_set - CVE-2024-24861: (unk) + CVE-2024-24861: (unk) media: xc4000: Fix atomicity violation in xc4000_get_frequency CVE-2024-24864: (unk) CVE-2024-25739: (unk) CVE-2024-25740: (unk) CVE-2024-25741: (unk) CVE-2024-25744: (unk) x86/coco: Disable 32-bit emulation by default on TDX and SEV - CVE-2024-26584: (unk) net: tls: handle backlogging of crypto requests - CVE-2024-26587: (unk) net: netdevsim: don't try to destroy PHC on VFs - CVE-2024-26588: (unk) LoongArch: BPF: Prevent out-of-bounds memory access - CVE-2024-26591: (unk) bpf: Fix re-attachment branch in bpf_tracing_prog_attach CVE-2024-26592: (unk) ksmbd: fix UAF issue in ksmbd_tcp_new_connection() CVE-2024-26594: (unk) ksmbd: validate mech token in session setup CVE-2024-26595: (unk) mlxsw: spectrum_acl_tcam: Fix NULL pointer dereference in error path CVE-2024-26598: (unk) KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache + CVE-2024-26600: (unk) phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP + CVE-2024-26606: (unk) binder: signal epoll threads of self-work + CVE-2024-26614: (unk) tcp: make sure init the accept_queue's spinlocks once + CVE-2024-26622: (unk) tomoyo: fix UAF write bug in tomoyo_write_control() + CVE-2024-26623: (unk) pds_core: Prevent race issues involving the adminq + CVE-2024-26625: (unk) llc: call sock_orphan() at release time + CVE-2024-26627: (unk) scsi: core: Move scsi_host_busy() out of host lock for waking up EH handler + CVE-2024-26633: (unk) ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim() + CVE-2024-26635: (unk) llc: Drop support for ETH_P_TR_802_2. + CVE-2024-26636: (unk) llc: make llc_ui_sendmsg() more robust against bonding changes + CVE-2024-26641: (unk) ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv() + CVE-2024-26642: (unk) netfilter: nf_tables: disallow anonymous set with timeout flag + CVE-2024-26644: (unk) btrfs: don't abort filesystem when attempting to snapshot deleted subvolume + CVE-2024-26646: (unk) thermal: intel: hfi: Add syscore callbacks for system-wide PM + CVE-2024-26647: (unk) drm/amd/display: Fix late derefrence 'dsc' check in 'link_set_dsc_pps_packet()' + CVE-2024-26648: (unk) drm/amd/display: Fix variable deferencing before NULL check in edp_setup_replay() + CVE-2024-26650: (unk) platform/x86: p2sb: Allow p2sb_bar() calls during PCI device probe + CVE-2024-26651: (unk) sr9800: Add check for usbnet_get_endpoints + CVE-2024-26654: (unk) ALSA: sh: aica: reorder cleanup operations to avoid UAF bugs + CVE-2024-26655: (unk) Fix memory leak in posix_clock_open() + CVE-2024-26656: (unk) drm/amdgpu: fix use-after-free bug + CVE-2024-26658: (unk) bcachefs: grab s_umount only if snapshotting + CVE-2024-26659: (unk) xhci: handle isoc Babble and Buffer Overrun events properly + CVE-2024-26663: (unk) tipc: Check the bearer type before calling tipc_udp_nl_bearer_add() + CVE-2024-26664: (unk) hwmon: (coretemp) Fix out-of-bounds memory access + CVE-2024-26668: (unk) netfilter: nft_limit: reject configurations that cause integer overflow + CVE-2024-26671: (unk) blk-mq: fix IO hang from sbitmap wakeup race + CVE-2024-26672: (unk) drm/amdgpu: Fix variable 'mca_funcs' dereferenced before NULL check in 'amdgpu_mca_smu_get_mca_entry()' + CVE-2024-26675: (unk) ppp_async: limit MRU to 64K + CVE-2024-26676: (unk) af_unix: Call kfree_skb() for dead unix_(sk)->oob_skb in GC. + CVE-2024-26677: (unk) rxrpc: Fix delayed ACKs to not set the reference serial number + CVE-2024-26679: (unk) inet: read sk->sk_family once in inet_recv_error() + CVE-2024-26685: (unk) nilfs2: fix potential bug in end_buffer_async_write + CVE-2024-26686: (unk) fs/proc: do_task_stat: use sig->stats_lock to gather the threads/children stats + CVE-2024-26687: (unk) xen/events: close evtchn after mapping cleanup + CVE-2024-26689: (unk) ceph: prevent use-after-free in encode_cap_msg() + CVE-2024-26691: (unk) KVM: arm64: Fix circular locking dependency + CVE-2024-26696: (unk) nilfs2: fix hang in nilfs_lookup_dirty_data_buffers() + CVE-2024-26697: (unk) nilfs2: fix data corruption in dsync block recovery for small block sizes + CVE-2024-26699: (unk) drm/amd/display: Fix array-index-out-of-bounds in dcn35_clkmgr + CVE-2024-26700: (unk) drm/amd/display: Fix MST Null Ptr for RV + CVE-2024-26704: (unk) ext4: fix double-free of blocks due to wrong extents moved_len + CVE-2024-26706: (unk) parisc: Fix random data corruption from exception handler + CVE-2024-26713: (unk) powerpc/pseries/iommu: Fix iommu initialisation during DLPAR add + CVE-2024-26715: (unk) usb: dwc3: gadget: Fix NULL pointer dereference in dwc3_gadget_suspend + CVE-2024-26719: (unk) nouveau: offload fence uevents work to workqueue + CVE-2024-26720: (unk) mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again + CVE-2024-26726: (unk) btrfs: don't drop extent_map for free space inode on write error + CVE-2024-26733: (unk) arp: Prevent overflow in arp_req_get(). + CVE-2024-26735: (unk) ipv6: sr: fix possible use-after-free and null-ptr-deref + CVE-2024-26738: (unk) powerpc/pseries/iommu: DLPAR add doesn't completely initialize pci_controller + CVE-2024-26739: (unk) net/sched: act_mirred: don't override retval if we already lost the skb + CVE-2024-26740: (unk) net/sched: act_mirred: use the backlog for mirred ingress + CVE-2024-26743: (unk) RDMA/qedr: Fix qedr_create_user_qp error flow + CVE-2024-26744: (unk) RDMA/srpt: Support specifying the srpt_service_guid parameter + CVE-2024-26745: (unk) powerpc/pseries/iommu: IOMMU table is not initialized for kdump over SR-IOV + CVE-2024-26748: (unk) usb: cdns3: fix memory double free when handle zero packet + CVE-2024-26752: (unk) l2tp: pass correct message length to ip6_append_data + CVE-2024-26754: (unk) gtp: fix use-after-free and null-ptr-deref in gtp_genl_dump_pdp() + CVE-2024-26756: (unk) md: Don't register sync_thread for reshape directly + CVE-2024-26757: (unk) md: Don't ignore read-only array in md_check_recovery() + CVE-2024-26758: (unk) md: Don't ignore suspended array in md_check_recovery() + CVE-2024-26759: (unk) mm/swap: fix race when skipping swapcache + CVE-2024-26763: (unk) dm-crypt: don't modify the data when using authenticated encryption + CVE-2024-26764: (unk) fs/aio: Restrict kiocb_set_cancel_fn() to I/O submitted via libaio + CVE-2024-26765: (unk) LoongArch: Disable IRQ before init_fn() for nonboot CPUs + CVE-2024-26766: (unk) IB/hfi1: Fix sdma.h tx->num_descs off-by-one error + CVE-2024-26767: (unk) drm/amd/display: fixed integer types and null check locations + CVE-2024-26768: (unk) LoongArch: Change acpi_core_pic[NR_CPUS] to acpi_core_pic[MAX_CORE_PIC] + CVE-2024-26769: (unk) nvmet-fc: avoid deadlock on delete association path + CVE-2024-26770: (unk) HID: nvidia-shield: Add missing null pointer checks to LED initialization + CVE-2024-26771: (unk) dmaengine: ti: edma: Add some null pointer checks to the edma_probe + CVE-2024-26772: (unk) ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal() + CVE-2024-26773: (unk) ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found() + CVE-2024-26774: (unk) ext4: avoid dividing by 0 in mb_update_avg_fragment_size() when block bitmap corrupt + CVE-2024-26775: (unk) aoe: avoid potential deadlock at set_capacity + CVE-2024-26776: (unk) spi: hisi-sfc-v3xx: Return IRQ_NONE if no interrupts were detected + CVE-2024-26777: (unk) fbdev: sis: Error out if pixclock equals zero + CVE-2024-26778: (unk) fbdev: savage: Error out if pixclock equals zero + CVE-2024-26779: (unk) wifi: mac80211: fix race condition on enabling fast-xmit + CVE-2024-26784: (unk) pmdomain: arm: Fix NULL dereference on scmi_perf_domain removal + CVE-2024-26789: (unk) crypto: arm64/neonbs - fix out-of-bounds access on short input + CVE-2024-26791: (unk) btrfs: dev-replace: properly validate device names + CVE-2024-26793: (unk) gtp: fix use-after-free and null-ptr-deref in gtp_newlink() + CVE-2024-26797: (unk) drm/amd/display: Prevent potential buffer overflow in map_hw_resources + CVE-2024-26798: (unk) fbcon: always restore the old font data in fbcon_do_set_font() + CVE-2024-26801: (unk) Bluetooth: Avoid potential use-after-free in hci_error_reset + CVE-2024-26802: (unk) stmmac: Clear variable when destroying workqueue + CVE-2024-26803: (unk) net: veth: clear GRO when clearing XDP even when down + CVE-2024-26804: (unk) net: ip_tunnel: prevent perpetual headroom growth + CVE-2024-26805: (unk) netlink: Fix kernel-infoleak-after-free in __skb_datagram_iter + CVE-2024-26806: (unk) spi: cadence-qspi: remove system-wide suspend helper calls from runtime PM hooks + CVE-2024-26808: (unk) netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain + CVE-2024-26809: (unk) netfilter: nft_set_pipapo: release elements in clone only from destroy path diff --git a/data/4.14/4.14_CVEs.txt b/data/4.14/4.14_CVEs.txt index 7586e416d..85e6baca4 100644 --- a/data/4.14/4.14_CVEs.txt +++ b/data/4.14/4.14_CVEs.txt @@ -422,6 +422,8 @@ CVE-2019-2181: Fix not seen in stream CVE-2019-2182: Fixed with 4.14.166 CVE-2019-2213: Fixed with 4.14.136 CVE-2019-2215: Fixed with 4.14.17 +CVE-2019-25160: Fixed with 4.14.106 +CVE-2019-25162: Fixed with 4.14.291 CVE-2019-3016: Fixed with 4.14.192 CVE-2019-3459: Fixed with 4.14.110 CVE-2019-3460: Fixed with 4.14.110 @@ -610,6 +612,11 @@ CVE-2020-36557: Fixed with 4.14.175 CVE-2020-36558: Fixed with 4.14.172 CVE-2020-36691: Fix not seen in stream CVE-2020-36766: Fixed with 4.14.196 +CVE-2020-36775: Fix not seen in stream +CVE-2020-36777: Fixed with 4.14.233 +CVE-2020-36780: Fix not seen in stream +CVE-2020-36781: Fix not seen in stream +CVE-2020-36784: Fix not seen in stream CVE-2020-3702: Fixed with 4.14.245 CVE-2020-4788: Fixed with 4.14.208 CVE-2020-7053: Fix not seen in stream @@ -761,6 +768,106 @@ CVE-2021-45469: Fixed with 4.14.260 CVE-2021-45485: Fixed with 4.14.240 CVE-2021-45486: Fixed with 4.14.238 CVE-2021-45868: Fixed with 4.14.256 +CVE-2021-46904: Fixed with 4.14.232 +CVE-2021-46906: Fixed with 4.14.238 +CVE-2021-46908: Fix not seen in stream +CVE-2021-46909: Fixed with 4.14.232 +CVE-2021-46915: Fixed with 4.14.232 +CVE-2021-46924: Fixed with 4.14.261 +CVE-2021-46925: Fix not seen in stream +CVE-2021-46926: Fix not seen in stream +CVE-2021-46928: Fix not seen in stream +CVE-2021-46929: Fixed with 4.14.261 +CVE-2021-46932: Fixed with 4.14.261 +CVE-2021-46933: Fixed with 4.14.261 +CVE-2021-46935: Fixed with 4.14.261 +CVE-2021-46936: Fixed with 4.14.261 +CVE-2021-46938: Fixed with 4.14.233 +CVE-2021-46939: Fixed with 4.14.233 +CVE-2021-46941: Fix not seen in stream +CVE-2021-46950: Fixed with 4.14.233 +CVE-2021-46951: Fix not seen in stream +CVE-2021-46952: Fix not seen in stream +CVE-2021-46953: Fixed with 4.14.233 +CVE-2021-46959: Fix not seen in stream +CVE-2021-46960: Fixed with 4.14.233 +CVE-2021-46962: Fix not seen in stream +CVE-2021-46965: Fix not seen in stream +CVE-2021-46969: Fix not seen in stream +CVE-2021-46970: Fix not seen in stream +CVE-2021-46982: Fix not seen in stream +CVE-2021-46988: Fixed with 4.14.233 +CVE-2021-46992: Fixed with 4.14.233 +CVE-2021-47006: Fixed with 4.14.233 +CVE-2021-47013: Fixed with 4.14.233 +CVE-2021-47028: Fix not seen in stream +CVE-2021-47046: Fix not seen in stream +CVE-2021-47049: Fix not seen in stream +CVE-2021-47052: Fix not seen in stream +CVE-2021-47054: Fixed with 4.14.233 +CVE-2021-47056: Fixed with 4.14.233 +CVE-2021-47059: Fix not seen in stream +CVE-2021-47063: Fix not seen in stream +CVE-2021-47065: Fix not seen in stream +CVE-2021-47070: Fix not seen in stream +CVE-2021-47074: Fix not seen in stream +CVE-2021-47075: Fix not seen in stream +CVE-2021-47076: Fix not seen in stream +CVE-2021-47077: Fix not seen in stream +CVE-2021-47078: Fixed with 4.14.234 +CVE-2021-47082: Fix not seen in stream +CVE-2021-47083: Fix not seen in stream +CVE-2021-47086: Fixed with 4.14.260 +CVE-2021-47101: Fix not seen in stream +CVE-2021-47103: Fixed with 4.14.296 +CVE-2021-47110: Fix not seen in stream +CVE-2021-47112: Fix not seen in stream +CVE-2021-47113: Fix not seen in stream +CVE-2021-47114: Fixed with 4.14.236 +CVE-2021-47116: Fix not seen in stream +CVE-2021-47117: Fixed with 4.14.236 +CVE-2021-47118: Fixed with 4.14.236 +CVE-2021-47119: Fix not seen in stream +CVE-2021-47121: Fixed with 4.14.236 +CVE-2021-47122: Fixed with 4.14.236 +CVE-2021-47124: Fix not seen in stream +CVE-2021-47125: Fix not seen in stream +CVE-2021-47128: Fix not seen in stream +CVE-2021-47131: Fix not seen in stream +CVE-2021-47133: Fix not seen in stream +CVE-2021-47135: Fix not seen in stream +CVE-2021-47136: Fix not seen in stream +CVE-2021-47137: Fix not seen in stream +CVE-2021-47140: Fix not seen in stream +CVE-2021-47142: Fixed with 4.14.235 +CVE-2021-47143: Fix not seen in stream +CVE-2021-47144: Fix not seen in stream +CVE-2021-47145: Fixed with 4.14.235 +CVE-2021-47146: Fixed with 4.14.235 +CVE-2021-47147: Fix not seen in stream +CVE-2021-47149: Fixed with 4.14.235 +CVE-2021-47150: Fix not seen in stream +CVE-2021-47151: Fix not seen in stream +CVE-2021-47153: Fixed with 4.14.235 +CVE-2021-47158: Fix not seen in stream +CVE-2021-47159: Fix not seen in stream +CVE-2021-47160: Fix not seen in stream +CVE-2021-47161: Fixed with 4.14.241 +CVE-2021-47162: Fixed with 4.14.235 +CVE-2021-47163: Fix not seen in stream +CVE-2021-47165: Fixed with 4.14.235 +CVE-2021-47166: Fixed with 4.14.235 +CVE-2021-47167: Fix not seen in stream +CVE-2021-47168: Fixed with 4.14.235 +CVE-2021-47169: Fixed with 4.14.235 +CVE-2021-47170: Fix not seen in stream +CVE-2021-47171: Fixed with 4.14.235 +CVE-2021-47172: Fix not seen in stream +CVE-2021-47173: Fixed with 4.14.235 +CVE-2021-47175: Fix not seen in stream +CVE-2021-47177: Fixed with 4.14.235 +CVE-2021-47179: Fixed with 4.14.235 +CVE-2021-47180: Fixed with 4.14.235 CVE-2022-0001: Fixed with 4.14.271 CVE-2022-0002: Fixed with 4.14.271 CVE-2022-0168: Fix not seen in stream @@ -951,6 +1058,9 @@ CVE-2022-4744: Fix not seen in stream CVE-2022-47520: Fix not seen in stream CVE-2022-47929: Fixed with 4.14.303 CVE-2022-48619: Fixed with 4.14.281 +CVE-2022-48626: Fixed with 4.14.266 +CVE-2022-48627: Fix not seen in stream +CVE-2022-48628: Fix not seen in stream CVE-2023-0030: Fix not seen in stream CVE-2023-0047: Fixed with 4.14.256 CVE-2023-0266: Fixed with 4.14.303 @@ -1011,6 +1121,7 @@ CVE-2023-26607: Fixed with 4.14.300 CVE-2023-28328: Fixed with 4.14.303 CVE-2023-28466: Fix not seen in stream CVE-2023-2860: Fixed with 4.14.293 +CVE-2023-28746: Fix not seen in stream CVE-2023-28772: Fixed with 4.14.240 CVE-2023-2985: Fixed with 4.14.308 CVE-2023-3006: Fix not seen in stream @@ -1078,7 +1189,7 @@ CVE-2023-4622: Fix not seen in stream CVE-2023-4623: Fixed with 4.14.327 CVE-2023-46343: Fixed with 4.14.328 CVE-2023-46838: Fix not seen in stream -CVE-2023-47233: Fix unknown +CVE-2023-47233: Fix not seen in stream CVE-2023-4881: Fix not seen in stream CVE-2023-4921: Fixed with 4.14.326 CVE-2023-51043: Fix not seen in stream @@ -1098,25 +1209,117 @@ CVE-2023-52444: Fix not seen in stream CVE-2023-52445: Fix not seen in stream CVE-2023-52449: Fix not seen in stream CVE-2023-52451: Fix not seen in stream -CVE-2023-52456: Fix not seen in stream -CVE-2023-52457: Fix not seen in stream CVE-2023-52458: Fix not seen in stream CVE-2023-52464: Fix not seen in stream +CVE-2023-52469: Fix not seen in stream +CVE-2023-52470: Fix not seen in stream +CVE-2023-52474: Fix not seen in stream +CVE-2023-52475: Fixed with 4.14.328 +CVE-2023-52476: Fix not seen in stream +CVE-2023-52477: Fixed with 4.14.328 +CVE-2023-52478: Fixed with 4.14.328 +CVE-2023-52479: Fix not seen in stream +CVE-2023-52480: Fix not seen in stream +CVE-2023-52481: Fix not seen in stream +CVE-2023-52482: Fix not seen in stream +CVE-2023-52484: Fix not seen in stream +CVE-2023-52485: Fix not seen in stream +CVE-2023-52486: Fix not seen in stream +CVE-2023-52488: Fix not seen in stream +CVE-2023-52489: Fix not seen in stream +CVE-2023-52491: Fix not seen in stream +CVE-2023-52498: Fix not seen in stream +CVE-2023-52500: Fix not seen in stream +CVE-2023-52501: Fix not seen in stream +CVE-2023-52502: Fix not seen in stream +CVE-2023-52506: Fix not seen in stream +CVE-2023-52507: Fixed with 4.14.328 +CVE-2023-52508: Fix not seen in stream +CVE-2023-52509: Fix not seen in stream +CVE-2023-52510: Fixed with 4.14.328 +CVE-2023-52511: Fix not seen in stream +CVE-2023-52515: Fix not seen in stream +CVE-2023-52516: Fix not seen in stream +CVE-2023-52517: Fix not seen in stream +CVE-2023-52519: Fix not seen in stream +CVE-2023-52522: Fix not seen in stream +CVE-2023-52527: Fixed with 4.14.327 +CVE-2023-52528: Fixed with 4.14.327 +CVE-2023-52530: Fix not seen in stream +CVE-2023-52531: Fix not seen in stream +CVE-2023-52532: Fix not seen in stream +CVE-2023-52559: Fix not seen in stream +CVE-2023-52561: Fix not seen in stream +CVE-2023-52563: Fix not seen in stream +CVE-2023-52565: Fix not seen in stream +CVE-2023-52566: Fixed with 4.14.327 +CVE-2023-52568: Fix not seen in stream +CVE-2023-52569: Fix not seen in stream +CVE-2023-52571: Fix not seen in stream +CVE-2023-52572: Fix not seen in stream +CVE-2023-52574: Fixed with 4.14.327 +CVE-2023-52578: Fix not seen in stream +CVE-2023-52583: Fix not seen in stream +CVE-2023-52584: Fix not seen in stream +CVE-2023-52585: Fix not seen in stream +CVE-2023-52586: Fix not seen in stream +CVE-2023-52587: Fix not seen in stream +CVE-2023-52588: Fix not seen in stream +CVE-2023-52589: Fix not seen in stream +CVE-2023-52590: Fix not seen in stream +CVE-2023-52591: Fix not seen in stream +CVE-2023-52593: Fix not seen in stream +CVE-2023-52594: Fix not seen in stream +CVE-2023-52595: Fix not seen in stream +CVE-2023-52596: Fix not seen in stream +CVE-2023-52597: Fix not seen in stream +CVE-2023-52598: Fix not seen in stream +CVE-2023-52599: Fix not seen in stream +CVE-2023-52600: Fix not seen in stream +CVE-2023-52601: Fix not seen in stream +CVE-2023-52602: Fix not seen in stream +CVE-2023-52603: Fix not seen in stream +CVE-2023-52604: Fix not seen in stream +CVE-2023-52606: Fix not seen in stream +CVE-2023-52607: Fix not seen in stream +CVE-2023-52609: Fix not seen in stream +CVE-2023-52612: Fix not seen in stream +CVE-2023-52614: Fix not seen in stream +CVE-2023-52615: Fix not seen in stream +CVE-2023-52617: Fix not seen in stream +CVE-2023-52618: Fix not seen in stream +CVE-2023-52619: Fix not seen in stream +CVE-2023-52620: Fix not seen in stream +CVE-2023-52621: Fix not seen in stream +CVE-2023-52622: Fix not seen in stream +CVE-2023-52623: Fix not seen in stream +CVE-2023-52624: Fix not seen in stream +CVE-2023-52625: Fix not seen in stream +CVE-2023-52628: Fix not seen in stream +CVE-2023-52629: Fix not seen in stream +CVE-2023-52632: Fix not seen in stream +CVE-2023-52633: Fix not seen in stream +CVE-2023-52634: Fix not seen in stream +CVE-2023-52635: Fix not seen in stream +CVE-2023-52638: Fix not seen in stream +CVE-2023-52639: Fix not seen in stream +CVE-2023-52640: Fix not seen in stream +CVE-2023-52641: Fix not seen in stream CVE-2023-5717: Fixed with 4.14.328 CVE-2023-6040: Fix not seen in stream CVE-2023-6121: Fix not seen in stream CVE-2023-6240: Fix unknown -CVE-2023-6270: Fix unknown -CVE-2023-6356: Fix unknown +CVE-2023-6270: Fix not seen in stream +CVE-2023-6356: Fix not seen in stream CVE-2023-6535: Fix unknown -CVE-2023-6536: Fix unknown +CVE-2023-6536: Fix not seen in stream CVE-2023-6546: Fix not seen in stream CVE-2023-6606: Fix not seen in stream CVE-2023-6610: Fix not seen in stream CVE-2023-6915: Fix not seen in stream CVE-2023-6931: Fix not seen in stream CVE-2023-6932: Fixed with 4.14.332 -CVE-2023-7042: Fix unknown +CVE-2023-7042: Fix not seen in stream CVE-2023-7192: Fixed with 4.14.308 CVE-2024-0340: Fix not seen in stream CVE-2024-0564: Fix unknown @@ -1127,10 +1330,11 @@ CVE-2024-1086: Fix not seen in stream CVE-2024-1151: Fix not seen in stream CVE-2024-1312: Fix not seen in stream CVE-2024-21803: Fix unknown -CVE-2024-22099: Fix unknown +CVE-2024-2193: Fix unknown +CVE-2024-22099: Fix not seen in stream CVE-2024-22386: Fix unknown -CVE-2024-23196: Fix unknown -CVE-2024-23307: Fix unknown +CVE-2024-23196: Fix not seen in stream +CVE-2024-23307: Fix not seen in stream CVE-2024-23848: Fix unknown CVE-2024-23849: Fix not seen in stream CVE-2024-23851: Fix not seen in stream @@ -1139,17 +1343,108 @@ CVE-2024-24857: Fix unknown CVE-2024-24858: Fix unknown CVE-2024-24859: Fix unknown CVE-2024-24860: Fix not seen in stream -CVE-2024-24861: Fix unknown +CVE-2024-24861: Fix not seen in stream CVE-2024-24864: Fix unknown CVE-2024-25739: Fix unknown CVE-2024-25740: Fix unknown CVE-2024-25741: Fix unknown CVE-2024-25744: Fix not seen in stream -CVE-2024-26584: Fix not seen in stream -CVE-2024-26587: Fix not seen in stream -CVE-2024-26588: Fix not seen in stream -CVE-2024-26591: Fix not seen in stream CVE-2024-26592: Fix not seen in stream CVE-2024-26594: Fix not seen in stream CVE-2024-26595: Fix not seen in stream CVE-2024-26598: Fix not seen in stream +CVE-2024-26600: Fix not seen in stream +CVE-2024-26602: Fix not seen in stream +CVE-2024-26606: Fix not seen in stream +CVE-2024-26614: Fix not seen in stream +CVE-2024-26622: Fix not seen in stream +CVE-2024-26623: Fix not seen in stream +CVE-2024-26625: Fix not seen in stream +CVE-2024-26627: Fix not seen in stream +CVE-2024-26633: Fix not seen in stream +CVE-2024-26635: Fix not seen in stream +CVE-2024-26636: Fix not seen in stream +CVE-2024-26641: Fix not seen in stream +CVE-2024-26642: Fix not seen in stream +CVE-2024-26644: Fix not seen in stream +CVE-2024-26646: Fix not seen in stream +CVE-2024-26647: Fix not seen in stream +CVE-2024-26648: Fix not seen in stream +CVE-2024-26650: Fix not seen in stream +CVE-2024-26651: Fix not seen in stream +CVE-2024-26654: Fix not seen in stream +CVE-2024-26655: Fix not seen in stream +CVE-2024-26656: Fix not seen in stream +CVE-2024-26658: Fix not seen in stream +CVE-2024-26659: Fix not seen in stream +CVE-2024-26663: Fix not seen in stream +CVE-2024-26664: Fix not seen in stream +CVE-2024-26668: Fix not seen in stream +CVE-2024-26671: Fix not seen in stream +CVE-2024-26672: Fix not seen in stream +CVE-2024-26675: Fix not seen in stream +CVE-2024-26676: Fix not seen in stream +CVE-2024-26677: Fix not seen in stream +CVE-2024-26679: Fix not seen in stream +CVE-2024-26685: Fix not seen in stream +CVE-2024-26686: Fix not seen in stream +CVE-2024-26687: Fix not seen in stream +CVE-2024-26689: Fix not seen in stream +CVE-2024-26691: Fix not seen in stream +CVE-2024-26696: Fix not seen in stream +CVE-2024-26697: Fix not seen in stream +CVE-2024-26699: Fix not seen in stream +CVE-2024-26700: Fix not seen in stream +CVE-2024-26704: Fix not seen in stream +CVE-2024-26706: Fix not seen in stream +CVE-2024-26713: Fix not seen in stream +CVE-2024-26715: Fix not seen in stream +CVE-2024-26719: Fix not seen in stream +CVE-2024-26720: Fix not seen in stream +CVE-2024-26726: Fix not seen in stream +CVE-2024-26733: Fix not seen in stream +CVE-2024-26735: Fix not seen in stream +CVE-2024-26738: Fix not seen in stream +CVE-2024-26739: Fix not seen in stream +CVE-2024-26740: Fix not seen in stream +CVE-2024-26743: Fix not seen in stream +CVE-2024-26744: Fix not seen in stream +CVE-2024-26745: Fix not seen in stream +CVE-2024-26748: Fix not seen in stream +CVE-2024-26752: Fix not seen in stream +CVE-2024-26754: Fix not seen in stream +CVE-2024-26756: Fix not seen in stream +CVE-2024-26757: Fix not seen in stream +CVE-2024-26758: Fix not seen in stream +CVE-2024-26759: Fix not seen in stream +CVE-2024-26763: Fix not seen in stream +CVE-2024-26764: Fix not seen in stream +CVE-2024-26765: Fix not seen in stream +CVE-2024-26766: Fix not seen in stream +CVE-2024-26767: Fix not seen in stream +CVE-2024-26768: Fix not seen in stream +CVE-2024-26769: Fix not seen in stream +CVE-2024-26770: Fix not seen in stream +CVE-2024-26771: Fix not seen in stream +CVE-2024-26772: Fix not seen in stream +CVE-2024-26773: Fix not seen in stream +CVE-2024-26774: Fix not seen in stream +CVE-2024-26775: Fix not seen in stream +CVE-2024-26776: Fix not seen in stream +CVE-2024-26777: Fix not seen in stream +CVE-2024-26778: Fix not seen in stream +CVE-2024-26779: Fix not seen in stream +CVE-2024-26784: Fix not seen in stream +CVE-2024-26789: Fix not seen in stream +CVE-2024-26791: Fix not seen in stream +CVE-2024-26793: Fix not seen in stream +CVE-2024-26797: Fix not seen in stream +CVE-2024-26798: Fix not seen in stream +CVE-2024-26801: Fix not seen in stream +CVE-2024-26802: Fix not seen in stream +CVE-2024-26803: Fix not seen in stream +CVE-2024-26804: Fix not seen in stream +CVE-2024-26805: Fix not seen in stream +CVE-2024-26806: Fix not seen in stream +CVE-2024-26808: Fix not seen in stream +CVE-2024-26809: Fix not seen in stream diff --git a/data/4.14/4.14_security.txt b/data/4.14/4.14_security.txt index 3f3823372..ba4eaeb78 100644 --- a/data/4.14/4.14_security.txt +++ b/data/4.14/4.14_security.txt @@ -355,6 +355,7 @@ CVEs fixed in 4.14.106: CVE-2019-15916: 306bbaeb077068141d472b922ae1adf7ab81fd72 net-sysfs: Fix mem leak in netdev_register_kobject CVE-2019-16994: 46a5caa79ff73c9403ab37475ef47ed4c027e712 net: sit: fix memory leak in sit_init_net() CVE-2019-2101: aa4ba765e0903926de64b359e8653bfd29a3c353 media: uvcvideo: Fix 'type' check leading to overflow + CVE-2019-25160: fcfe700acdc1c72eab231300e82b962bac2b2b2c netlabel: fix out-of-bounds memory accesses CVE-2019-8980: 069fb92ea221c72bd75f4863b3540420082f32ba exec: Fix mem leak in kernel_read_file CVEs fixed in 4.14.107: @@ -926,16 +927,32 @@ CVEs fixed in 4.14.231: CVEs fixed in 4.14.232: CVE-2020-29374: 407faed92b4a4e2ad900d61ea3831dd597640f29 gup: document and work around "COW can break either way" issue CVE-2021-23133: 54b63c76b9bb95fba20cd268086ee448f87208c6 net/sctp: fix race condition in sctp_destroy_sock + CVE-2021-46904: caf5ac93b3b5d5fac032fc11fbea680e115421b4 net: hso: fix null-ptr-deref during tty device unregistration + CVE-2021-46909: 532747fd5c7aaa17ee5cf79f3e947c31eb0e35cf ARM: footbridge: fix PCI interrupt mapping + CVE-2021-46915: 9065ccb9ec92c5120e7e97958397ebdb454f23d6 netfilter: nft_limit: avoid possible divide error in nft_limit_init CVEs fixed in 4.14.233: + CVE-2020-36777: 32168ca1f123316848fffb85d059860adf3c409f media: dvbdev: Fix memory leak in dvb_media_device_free() CVE-2021-32399: 40acc1aa3e2a705a3c2ed171ed563ef04f7ba19e bluetooth: eliminate the potential race condition when removing the HCI controller CVE-2021-33034: 21f6aee6682a1f7415e23f96ce94ff387d9cdb2e Bluetooth: verify AMP hci_chan before amp_destroy CVE-2021-4157: 40286f0852d2ecfa713438199557c706dc6a8db3 pNFS/flexfiles: fix incorrect size check in decode_nfs_fh() + CVE-2021-46938: b42c0a33dfdd451d9be62dd5de58c39f2750b6e3 dm rq: fix double free of blk_mq_tag_set in dev remove after table load fails + CVE-2021-46939: 1fca00920327be96f3318224f502e4d5460f9545 tracing: Restructure trace_clock_global() to never block + CVE-2021-46950: 12216d0919b64ee2ea5dc7a50e455670f44383d5 md/raid1: properly indicate failure when ending a failed write request + CVE-2021-46953: c3385a9122f8db15b453e07bfc88117fce7f3724 ACPI: GTDT: Don't corrupt interrupt mappings on watchdow probe failure + CVE-2021-46960: e94851629c49c65b4fbb29a5725ddfd7988f8f20 cifs: Return correct error code from smb2_get_enc_key + CVE-2021-46988: 319116227e52d49eee671f0aa278bac89b3c1b69 userfaultfd: release page in error path to avoid BUG_ON + CVE-2021-46992: 2824cafc6a93792d9ad85939c499161214d84c4b netfilter: nftables: avoid overflows in nft_hash_buckets() + CVE-2021-47006: ed1f67465327cec4457bb988775245b199da86e6 ARM: 9064/1: hw_breakpoint: Do not directly check the event's overflow_handler hook + CVE-2021-47013: dc1b438a35773d030be0ee80d9c635c3e558a322 net:emac/emac-mac: Fix a use after free in emac_mac_tx_buf_send + CVE-2021-47054: 94810fc52925eb122a922df7f9966cf3f4ba7391 bus: qcom: Put child node before return + CVE-2021-47056: 446045cf682af12d9294765f6c46084b374b5654 crypto: qat - ADF_STATUS_PF_RUNNING should be set after adf_dev_init CVEs fixed in 4.14.234: CVE-2020-26555: 4555cee33f7d75c1ee69902c872c9d1e9568ebd5 Bluetooth: SMP: Fail if remote and local public keys are identical CVE-2020-26558: 4555cee33f7d75c1ee69902c872c9d1e9568ebd5 Bluetooth: SMP: Fail if remote and local public keys are identical CVE-2021-0129: 4555cee33f7d75c1ee69902c872c9d1e9568ebd5 Bluetooth: SMP: Fail if remote and local public keys are identical + CVE-2021-47078: 6a8086a42dfbf548a42bf2ae4faa291645c72c66 RDMA/rxe: Clear all QP fields if creation failed CVEs fixed in 4.14.235: CVE-2020-24586: f643397142c196d3ac653b2df32997dad991cb29 mac80211: prevent mixed key and fragment cache attacks @@ -946,16 +963,37 @@ CVEs fixed in 4.14.235: CVE-2021-29650: f1fd7a174018f1107881150c6c2ce00e49a1e643 netfilter: x_tables: Use correct memory barriers. CVE-2021-33098: 5217f9cab7dd28e9c7626cd795e51da98ecb2af4 ixgbe: fix large MTU request from VF CVE-2021-34981: 6f6ac2a7959b1864886d07fcf3b9cec587dfe635 Bluetooth: cmtp: fix file refcount when cmtp_attach_device fails + CVE-2021-47142: 952ab3f9f48eb0e8050596d41951cf516be6b122 drm/amdgpu: Fix a use-after-free + CVE-2021-47145: 0eaf383c6a4a83c09f60fd07a1bea9f1a9181611 btrfs: do not BUG_ON in link_to_fixup_dir + CVE-2021-47146: 221142038f36d9f28b64e83e954774da4d4ccd17 mld: fix panic in mld_newpack() + CVE-2021-47149: c4f1c23edbe921ab2ecd6140d700e756cd44c5f7 net: fujitsu: fix potential null-ptr-deref + CVE-2021-47153: dfa8929e117b0228a7765f5c3f5988a4a028f3c6 i2c: i801: Don't generate an interrupt on bus reset + CVE-2021-47162: 436d650d374329a591c30339a91fa5078052ed1e tipc: skb_linearize the head skb when reassembling msgs + CVE-2021-47165: b4298d33c1fcce511ffe84d8d3de07e220300f9b drm/meson: fix shutdown crash when component not probed + CVE-2021-47166: c757c1f1e65d89429db1409429436cf40d47c008 NFS: Don't corrupt the value of pg_bytes_written in nfs_do_recoalesce() + CVE-2021-47168: f299522eda1566cbfbae4b15c82970fc41b03714 NFS: fix an incorrect limit in filelayout_decode_layout() + CVE-2021-47169: 1cc57cb32c84e059bd158494f746b665fc14d1b1 serial: rp2: use 'request_firmware' instead of 'request_firmware_nowait' + CVE-2021-47171: 9e6b8c1ff9d997e1fa16cbd2d60739adf6dc1bbc net: usb: fix memory leak in smsc75xx_bind + CVE-2021-47173: bcb30cc8f8befcbdbcf7a016e4dfd4747c54a364 misc/uss720: fix memory leak in uss720_probe + CVE-2021-47177: 22da9f4978381a99f1abaeaf6c9b83be6ab5ddd8 iommu/vt-d: Fix sysfs leak in alloc_iommu() + CVE-2021-47179: 42637ca25c7d7b5a92804a679af5192e8c1a9f48 NFSv4: Fix a NULL pointer dereference in pnfs_mark_matching_lsegs_return() + CVE-2021-47180: 2c2fb2df46ea866b49fea5ec7112ec3cd4896c74 NFC: nci: fix memory leak in nci_allocate_device CVEs fixed in 4.14.236: CVE-2021-3564: fa7d2874963312030d9618541b9bc2e549e19ac1 Bluetooth: fix the erroneous flush_work() order CVE-2021-3573: 88481ea480756644b5221648216bb67866e51391 Bluetooth: use correct lock to prevent UAF of hdev object CVE-2021-3587: ffff05b9ee5c74c04bba2801c1f99b31975d74d9 nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect CVE-2021-38208: ffff05b9ee5c74c04bba2801c1f99b31975d74d9 nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect + CVE-2021-47114: a1700479524bb9cb5e8ae720236a6fabd003acae ocfs2: fix data corruption by fallocate + CVE-2021-47117: d8116743ef5432336289256b2f7c117299213eb9 ext4: fix bug on in ext4_es_cache_extent as ext4_split_extent_at failed + CVE-2021-47118: 4dbd8808a591b49b717862e6e0081bcf14a87788 pid: take a reference when initializing `cad_pid` + CVE-2021-47121: e8b37f5009ea7095529790f022859711e6939c76 net: caif: fix memory leak in cfusbl_device_notify + CVE-2021-47122: 4bca2034b41c15b62d47a19158bb76235fd4455d net: caif: fix memory leak in caif_device_notify CVEs fixed in 4.14.238: CVE-2021-34693: 4fa028860bb1656f370851c2c26de15fc67da300 can: bcm: fix infoleak in struct bcm_msg_head CVE-2021-45486: 3ba51ed2c3ac36aa947d0b250d318de6ed7cf552 inet: use bigger hash table for IP ID generation + CVE-2021-46906: 8c064eece9a51856f3f275104520c7e3017fc5c0 HID: usbhid: fix info leak in hid_submit_ctrl CVEs fixed in 4.14.240: CVE-2021-33909: 3c07d1335d17ae0411101024de438dbc3734e992 seq_file: disallow extremely large seq buffer allocations @@ -970,6 +1008,7 @@ CVEs fixed in 4.14.241: CVE-2021-3679: 76598512d5d7fc407c319ca4448cf5348b65058a tracing: Fix bug in rb_per_cpu_empty() that might cause deadloop. CVE-2021-37576: b67a821813c7b8160b54d83928281fec84a42d88 KVM: PPC: Book3S: Fix H_RTAS rets buffer overflow CVE-2021-38204: edddc79c4391f8001095320d3ca423214b9aa4bf usb: max-3421: Prevent corruption of freed memory + CVE-2021-47161: 10a089bae827ec30ad9b6cb7048020a62fae0cfa spi: spi-fsl-dspi: Fix a resource leak in an error handling path CVEs fixed in 4.14.242: CVE-2021-0920: af3e2b87b36100c28feb71da52c57293c4540690 af_unix: fix garbage collect vs MSG_PEEK @@ -1057,10 +1096,17 @@ CVEs fixed in 4.14.259: CVEs fixed in 4.14.260: CVE-2021-45469: 88dedecc24763c2e0bc1e8eeb35f9f2cd785a7e5 f2fs: fix to do sanity check on last xattr entry in __f2fs_setxattr() + CVE-2021-47086: 311601f114859d586d5ef8833d60d3aa23282161 phonet/pep: refuse to enable an unbound pipe CVE-2022-1195: a7b0ae2cc486fcb601f9f9d87d98138cc7b7f7f9 hamradio: improve the incomplete fix to avoid NPD CVEs fixed in 4.14.261: CVE-2021-44733: 3d556a28bbfe34a80b014db49908b0f1bcb1ae80 tee: handle lookup of shm with reference count 0 + CVE-2021-46924: 38c3e320e7ff46f2dc67bc5045333e63d9f8918d NFC: st21nfca: Fix memory leak in device probe and remove + CVE-2021-46929: 8873140f95d4977bf37e4cf0d5c5e3f6e34cdd3e sctp: use call_rcu to free endpoint + CVE-2021-46932: 292d2ac61fb0d9276a0f7b7ce4f50426f2a1c99f Input: appletouch - initialize work before device registration + CVE-2021-46933: 52500239e3f2d6fc77b6f58632a9fb98fe74ac09 usb: gadget: f_fs: Clear ffs_eventfd in ffs_data_clear. + CVE-2021-46935: 2d2df539d05205fd83c404d5f2dff48d36f9b495 binder: fix async_free_space accounting for empty parcels + CVE-2021-46936: 5c2fe20ad37ff56070ae0acb34152333976929b4 net: fix use-after-free in tw_timer_handler CVE-2022-20154: 8873140f95d4977bf37e4cf0d5c5e3f6e34cdd3e sctp: use call_rcu to free endpoint CVEs fixed in 4.14.262: @@ -1089,6 +1135,7 @@ CVEs fixed in 4.14.266: CVE-2022-0435: fde4ddeadd099bf9fbb9ccbee8e1b5c20d530a2d tipc: improve size validations for received domain records CVE-2022-0487: e6f580d0b3349646d4ee1ce0057eb273e8fb7e2e moxart: fix potential use-after-free on remove path CVE-2022-0492: b391bb3554dd6e04b7a8ede975dbd3342526a045 cgroup-v1: Require capabilities to set release_agent + CVE-2022-48626: e6f580d0b3349646d4ee1ce0057eb273e8fb7e2e moxart: fix potential use-after-free on remove path CVEs fixed in 4.14.267: CVE-2022-25258: c7ad83d561df15ac6043d3b0d783aee777cf1731 USB: gadget: validate interface OS descriptor requests @@ -1213,6 +1260,7 @@ CVEs fixed in 4.14.290: CVE-2022-36879: 2c9d93e35cb857fc613ec9d58d690d332252747b xfrm: xfrm_policy: fix a possible double xfrm_pols_put() in xfrm_bundle_lookup() CVEs fixed in 4.14.291: + CVE-2019-25162: e6412ba3b6508bdf9c074d310bf4144afa6aec1a i2c: Fix a potential use after free CVE-2022-1679: 62bc1ea5c7401d77eaf73d0c6a15f3d2e742856e ath9k: fix use-after-free in ath9k_hif_usb_rx_cb CVE-2022-20422: 9d5fec6ba2e4117d196a8259ab54615ffe562460 arm64: fix oops in concurrently setting insn_emulation sysctls CVE-2022-20566: 5bb395334392891dffae5a0e8f37dbe1d70496c9 Bluetooth: L2CAP: Fix use-after-free caused by l2cap_chan_put @@ -1242,6 +1290,7 @@ CVEs fixed in 4.14.295: CVE-2022-39842: 9556a88a16e381dbd6834da95206742d0973afc6 video: fbdev: pxa3xx-gcu: Fix integer overflow in pxa3xx_gcu_write CVEs fixed in 4.14.296: + CVE-2021-47103: 92e6e36ecd16808866ac6172b9491b5097cde449 inet: fully convert sk->sk_rx_dst to RCU rules CVE-2022-2978: c0aa76b0f17f59dd9c9d3463550a2986a1d592e4 fs: fix UAF/GPF bug in nilfs_mdt_destroy CVE-2022-3542: f63e896e78c247d0be8165d99d543a28ca0be360 bnx2x: fix potential memory leak in bnx2x_tpa_stop() CVE-2022-3565: cbd342376a4e7ea481891181910e9e995390eb24 mISDN: fix use-after-free bugs in l1oip timer handlers @@ -1399,9 +1448,18 @@ CVEs fixed in 4.14.326: CVEs fixed in 4.14.327: CVE-2023-31085: ef7a4c97a85ab1bff7abc98f885678bd33bb4881 ubi: Refuse attaching if mtd's erasesize is 0 CVE-2023-4623: 3c0bd0b79733b7f628af1c967269db339eeef8d3 net/sched: sch_hfsc: Ensure inner classes have fsc curve + CVE-2023-52527: 7626b9fed53092aa2147978070e610ecb61af844 ipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data() + CVE-2023-52528: 3e0af6eec1789fd11934164a7f4dbcad979855a4 net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg + CVE-2023-52566: fb1084e63ee56958b0a56e17a50a4fd86445b9c1 nilfs2: fix potential use after free in nilfs_gccache_submit_read_data() + CVE-2023-52574: 1779eb51b9cc628cee551f252701a85a2a50a457 team: fix null-ptr-deref when team device type is changed CVEs fixed in 4.14.328: CVE-2023-46343: 2b2edf089df3a69f0072c6e71563394c5a94e62e nfc: nci: fix possible NULL pointer dereference in send_acknowledge() + CVE-2023-52475: 8677575c4f39d65bf0d719b5d20e8042e550ccb9 Input: powermate - fix use-after-free in powermate_config_complete + CVE-2023-52477: c64e4dca9aefd232b17ac4c779b608b286654e81 usb: hub: Guard against accesses to uninitialized BOS descriptors + CVE-2023-52478: ca0c4cc1d215dc22ab0e738c9f017c650f3183f5 HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect + CVE-2023-52507: 2c231a247a1d1628e41fa1eefd1a5307c41c5f53 nfc: nci: assert requested protocol is valid + CVE-2023-52510: 28b68cba378e3e50a4082b65f262bc4f2c7c2add ieee802154: ca8210: Fix a potential UAF in ca8210_probe CVE-2023-5717: 555e15e93f6dbb8ce6b5b92e5272473abfe8bd2b perf: Disallow mis-matched inherited group reads CVEs fixed in 4.14.329: @@ -1513,6 +1571,10 @@ Outstanding CVEs: CVE-2020-36313: (unk) KVM: Fix out of range accesses to memslots CVE-2020-36385: (unk) RDMA/ucma: Rework ucma_migrate_id() to avoid races with destroy CVE-2020-36691: (unk) netlink: limit recursion depth in policy validation + CVE-2020-36775: (unk) f2fs: fix to avoid potential deadlock + CVE-2020-36780: (unk) i2c: sprd: fix reference leak when pm_runtime_get_sync fails + CVE-2020-36781: (unk) i2c: imx: fix reference leak when pm_runtime_get_sync fails + CVE-2020-36784: (unk) i2c: cadence: fix reference leak when pm_runtime_get_sync fails CVE-2020-7053: (unk) drm/i915: Introduce a mutex for file_priv->context_idr CVE-2020-8832: (unk) drm/i915: Record the default hw state after reset upon load CVE-2020-8834: (unk) KVM: PPC: Book3S HV: Factor fake-suspend handling out of kvmppc_save/restore_tm @@ -1538,6 +1600,61 @@ Outstanding CVEs: CVE-2021-4150: (unk) block: fix incorrect references to disk objects CVE-2021-4218: (unk) sysctl: pass kernel pointers to ->proc_handler CVE-2021-43975: (unk) atlantic: Fix OOB read and write in hw_atl_utils_fw_rpc_wait + CVE-2021-46908: (unk) bpf: Use correct permission flag for mixed signed bounds arithmetic + CVE-2021-46925: (unk) net/smc: fix kernel panic caused by race of smc_sock + CVE-2021-46926: (unk) ALSA: hda: intel-sdw-acpi: harden detection of controller + CVE-2021-46928: (unk) parisc: Clear stale IIR value on instruction access rights trap + CVE-2021-46941: (unk) usb: dwc3: core: Do core softreset when switch mode + CVE-2021-46951: (unk) tpm: efi: Use local variable for calculating final log size + CVE-2021-46952: (unk) NFS: fs_context: validate UDP retrans to prevent shift out-of-bounds + CVE-2021-46959: (unk) spi: Fix use-after-free with devm_spi_alloc_* + CVE-2021-46962: (unk) mmc: uniphier-sd: Fix a resource leak in the remove function + CVE-2021-46965: (unk) mtd: physmap: physmap-bt1-rom: Fix unintentional stack access + CVE-2021-46969: (unk) bus: mhi: core: Fix invalid error returning in mhi_queue + CVE-2021-46970: (unk) bus: mhi: pci_generic: Remove WQ_MEM_RECLAIM flag from state workqueue + CVE-2021-46982: (unk) f2fs: compress: fix race condition of overwrite vs truncate + CVE-2021-47028: (unk) mt76: mt7915: fix txrate reporting + CVE-2021-47046: (unk) drm/amd/display: Fix off by one in hdmi_14_process_transaction() + CVE-2021-47049: (unk) Drivers: hv: vmbus: Use after free in __vmbus_open() + CVE-2021-47052: (unk) crypto: sa2ul - Fix memory leak of rxd + CVE-2021-47059: (unk) crypto: sun8i-ss - fix result memory leak on error path + CVE-2021-47063: (unk) drm: bridge/panel: Cleanup connector on bridge detach + CVE-2021-47065: (unk) rtw88: Fix array overrun in rtw_get_tx_power_params() + CVE-2021-47070: (unk) uio_hv_generic: Fix another memory leak in error handling paths + CVE-2021-47074: (unk) nvme-loop: fix memory leak in nvme_loop_create_ctrl() + CVE-2021-47075: (unk) nvmet: fix memory leak in nvmet_alloc_ctrl() + CVE-2021-47076: (unk) RDMA/rxe: Return CQE error if invalid lkey was supplied + CVE-2021-47077: (unk) scsi: qedf: Add pointer checks in qedf_update_link_speed() + CVE-2021-47082: (unk) tun: avoid double free in tun_free_netdev + CVE-2021-47083: (unk) pinctrl: mediatek: fix global-out-of-bounds issue + CVE-2021-47101: (unk) asix: fix uninit-value in asix_mdio_read() + CVE-2021-47110: (unk) x86/kvm: Disable kvmclock on all CPUs on shutdown + CVE-2021-47112: (unk) x86/kvm: Teardown PV features on boot CPU as well + CVE-2021-47113: (unk) btrfs: abort in rename_exchange if we fail to insert the second ref + CVE-2021-47116: (unk) ext4: fix memory leak in ext4_mb_init_backend on error path. + CVE-2021-47119: (unk) ext4: fix memory leak in ext4_fill_super + CVE-2021-47124: (unk) io_uring: fix link timeout refs + CVE-2021-47125: (unk) sch_htb: fix refcount leak in htb_parent_to_leaf_offload + CVE-2021-47128: (unk) bpf, lockdown, audit: Fix buggy SELinux lockdown permission checks + CVE-2021-47131: (unk) net/tls: Fix use-after-free after the TLS device goes down and up + CVE-2021-47133: (unk) HID: amd_sfh: Fix memory leak in amd_sfh_work + CVE-2021-47135: (unk) mt76: mt7921: fix possible AOOB issue in mt7921_mcu_tx_rate_report + CVE-2021-47136: (unk) net: zero-initialize tc skb extension on allocation + CVE-2021-47137: (unk) net: lantiq: fix memory corruption in RX ring + CVE-2021-47140: (unk) iommu/amd: Clear DMA ops when switching domain + CVE-2021-47143: (unk) net/smc: remove device from smcd_dev_list after failed device_add() + CVE-2021-47144: (unk) drm/amd/amdgpu: fix refcount leak + CVE-2021-47147: (unk) ptp: ocp: Fix a resource leak in an error handling path + CVE-2021-47150: (unk) net: fec: fix the potential memory leak in fec_enet_init() + CVE-2021-47151: (unk) interconnect: qcom: bcm-voter: add a missing of_node_put() + CVE-2021-47158: (unk) net: dsa: sja1105: add error handling in sja1105_setup() + CVE-2021-47159: (unk) net: dsa: fix a crash if ->get_sset_count() fails + CVE-2021-47160: (unk) net: dsa: mt7530: fix VLAN traffic leaks + CVE-2021-47163: (unk) tipc: wait and exit until all work queues are done + CVE-2021-47167: (unk) NFS: Fix an Oopsable condition in __nfs_pageio_add_request() + CVE-2021-47170: (unk) USB: usbfs: Don't WARN about excessively large memory allocations + CVE-2021-47172: (unk) iio: adc: ad7124: Fix potential overflow due to non sequential channel numbers + CVE-2021-47175: (unk) net/sched: fq_pie: fix OOB access in the traffic path CVE-2022-0168: (unk) cifs: fix NULL ptr dereference in smb2_ioctl_query_info() CVE-2022-0382: (unk) net ticp:fix a kernel-infoleak in __tipc_sendmsg() CVE-2022-0400: (unk) @@ -1595,6 +1712,8 @@ Outstanding CVEs: CVE-2022-45886: (unk) media: dvb-core: Fix use-after-free due on race condition at dvb_net CVE-2022-4744: (unk) tun: avoid double free in tun_free_netdev CVE-2022-47520: (unk) wifi: wilc1000: validate pairwise and authentication suite offsets + CVE-2022-48627: (unk) vt: fix memory overlapping when deleting chars in the buffer + CVE-2022-48628: (unk) ceph: drop messages from MDS when unmounting CVE-2023-0030: (unk) drm/nouveau/mmu: add more general vmm free/node handling functions CVE-2023-0386: (unk) ovl: fail on invalid uid/gid mapping at copy up CVE-2023-0597: (unk) x86/mm: Randomize per-cpu entry area @@ -1617,6 +1736,7 @@ Outstanding CVEs: CVE-2023-23000: (unk) phy: tegra: xusb: Fix return value of tegra_xusb_find_port_node function CVE-2023-23039: (unk) CVE-2023-28466: (unk) net: tls: fix possible race condition between do_tls_getsockopt_conf() and do_tls_setsockopt_conf() + CVE-2023-28746: (unk) x86/mmio: Disable KVM mitigation when X86_FEATURE_CLEAR_CPU_BUF is set CVE-2023-3006: (unk) arm64: Add AMPERE1 to the Spectre-BHB affected list CVE-2023-3022: (unk) ipv6: Use result arg in fib_lookup_arg consistently CVE-2023-30456: (unk) KVM: nVMX: add missing consistency checks for CR0 and CR4 @@ -1639,7 +1759,7 @@ Outstanding CVEs: CVE-2023-4134: (unk) Input: cyttsp4_core - change del_timer_sync() to timer_shutdown_sync() CVE-2023-4622: (unk) unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES CVE-2023-46838: (unk) xen-netback: don't produce zero-size SKB frags - CVE-2023-47233: (unk) + CVE-2023-47233: (unk) wifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach CVE-2023-4881: (unk) netfilter: nftables: exthdr: fix 4-byte stack OOB write CVE-2023-51043: (unk) drm/atomic: Fix potential use-after-free in nonblocking commits CVE-2023-51779: (unk) Bluetooth: af_bluetooth: Fix Use-After-Free in bt_sock_recvmsg @@ -1655,23 +1775,106 @@ Outstanding CVEs: CVE-2023-52445: (unk) media: pvrusb2: fix use after free on context disconnection CVE-2023-52449: (unk) mtd: Fix gluebi NULL pointer dereference caused by ftl notifier CVE-2023-52451: (unk) powerpc/pseries/memhp: Fix access beyond end of drmem array - CVE-2023-52456: (unk) serial: imx: fix tx statemachine deadlock - CVE-2023-52457: (unk) serial: 8250: omap: Don't skip resource freeing if pm_runtime_resume_and_get() failed CVE-2023-52458: (unk) block: add check that partition length needs to be aligned with block size CVE-2023-52464: (unk) EDAC/thunderx: Fix possible out-of-bounds string access + CVE-2023-52469: (unk) drivers/amd/pm: fix a use-after-free in kv_parse_power_table + CVE-2023-52470: (unk) drm/radeon: check the alloc_workqueue return value in radeon_crtc_init() + CVE-2023-52474: (unk) IB/hfi1: Fix bugs with non-PAGE_SIZE-end multi-iovec user SDMA requests + CVE-2023-52476: (unk) perf/x86/lbr: Filter vsyscall addresses + CVE-2023-52479: (unk) ksmbd: fix uaf in smb20_oplock_break_ack + CVE-2023-52480: (unk) ksmbd: fix race condition between session lookup and expire + CVE-2023-52481: (unk) arm64: errata: Add Cortex-A520 speculative unprivileged load workaround + CVE-2023-52482: (unk) x86/srso: Add SRSO mitigation for Hygon processors + CVE-2023-52484: (unk) iommu/arm-smmu-v3: Fix soft lockup triggered by arm_smmu_mm_invalidate_range + CVE-2023-52485: (unk) drm/amd/display: Wake DMCUB before sending a command + CVE-2023-52486: (unk) drm: Don't unref the same fb many times by mistake due to deadlock handling + CVE-2023-52488: (unk) serial: sc16is7xx: convert from _raw_ to _noinc_ regmap functions for FIFO + CVE-2023-52489: (unk) mm/sparsemem: fix race in accessing memory_section->usage + CVE-2023-52491: (unk) media: mtk-jpeg: Fix use after free bug due to error path handling in mtk_jpeg_dec_device_run + CVE-2023-52498: (unk) PM: sleep: Fix possible deadlocks in core system-wide PM code + CVE-2023-52500: (unk) scsi: pm80xx: Avoid leaking tags when processing OPC_INB_SET_CONTROLLER_CONFIG command + CVE-2023-52501: (unk) ring-buffer: Do not attempt to read past "commit" + CVE-2023-52502: (unk) net: nfc: fix races in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn() + CVE-2023-52506: (unk) LoongArch: Set all reserved memblocks on Node#0 at initialization + CVE-2023-52508: (unk) nvme-fc: Prevent null pointer dereference in nvme_fc_io_getuuid() + CVE-2023-52509: (unk) ravb: Fix use-after-free issue in ravb_tx_timeout_work() + CVE-2023-52511: (unk) spi: sun6i: reduce DMA RX transfer width to single byte + CVE-2023-52515: (unk) RDMA/srp: Do not call scsi_done() from srp_abort() + CVE-2023-52516: (unk) dma-debug: don't call __dma_entry_alloc_check_leak() under free_entries_lock + CVE-2023-52517: (unk) spi: sun6i: fix race between DMA RX transfer completion and RX FIFO drain + CVE-2023-52519: (unk) HID: intel-ish-hid: ipc: Disable and reenable ACPI GPE bit + CVE-2023-52522: (unk) net: fix possible store tearing in neigh_periodic_work() + CVE-2023-52530: (unk) wifi: mac80211: fix potential key use-after-free + CVE-2023-52531: (unk) wifi: iwlwifi: mvm: Fix a memory corruption issue + CVE-2023-52532: (unk) net: mana: Fix TX CQE error handling + CVE-2023-52559: (unk) iommu/vt-d: Avoid memory allocation in iommu_suspend() + CVE-2023-52561: (unk) arm64: dts: qcom: sdm845-db845c: Mark cont splash memory region as reserved + CVE-2023-52563: (unk) drm/meson: fix memory leak on ->hpd_notify callback + CVE-2023-52565: (unk) media: uvcvideo: Fix OOB read + CVE-2023-52568: (unk) x86/sgx: Resolves SECS reclaim vs. page fault for EAUG race + CVE-2023-52569: (unk) btrfs: remove BUG() after failure to insert delayed dir index item + CVE-2023-52571: (unk) power: supply: rk817: Fix node refcount leak + CVE-2023-52572: (unk) cifs: Fix UAF in cifs_demultiplex_thread() + CVE-2023-52578: (unk) net: bridge: use DEV_STATS_INC() + CVE-2023-52583: (unk) ceph: fix deadlock or deadcode of misusing dget() + CVE-2023-52584: (unk) spmi: mediatek: Fix UAF on device remove + CVE-2023-52585: (unk) drm/amdgpu: Fix possible NULL dereference in amdgpu_ras_query_error_status_helper() + CVE-2023-52586: (unk) drm/msm/dpu: Add mutex lock in control vblank irq + CVE-2023-52587: (unk) IB/ipoib: Fix mcast list locking + CVE-2023-52588: (unk) f2fs: fix to tag gcing flag on page during block migration + CVE-2023-52589: (unk) media: rkisp1: Fix IRQ disable race issue + CVE-2023-52590: (unk) ocfs2: Avoid touching renamed directory if parent does not change + CVE-2023-52591: (unk) reiserfs: Avoid touching renamed directory if parent does not change + CVE-2023-52593: (unk) wifi: wfx: fix possible NULL pointer dereference in wfx_set_mfp_ap() + CVE-2023-52594: (unk) wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus() + CVE-2023-52595: (unk) wifi: rt2x00: restart beacon queue when hardware reset + CVE-2023-52596: (unk) sysctl: Fix out of bounds access for empty sysctl registers + CVE-2023-52597: (unk) KVM: s390: fix setting of fpc register + CVE-2023-52598: (unk) s390/ptrace: handle setting of fpc register correctly + CVE-2023-52599: (unk) jfs: fix array-index-out-of-bounds in diNewExt + CVE-2023-52600: (unk) jfs: fix uaf in jfs_evict_inode + CVE-2023-52601: (unk) jfs: fix array-index-out-of-bounds in dbAdjTree + CVE-2023-52602: (unk) jfs: fix slab-out-of-bounds Read in dtSearch + CVE-2023-52603: (unk) UBSAN: array-index-out-of-bounds in dtSplitRoot + CVE-2023-52604: (unk) FS:JFS:UBSAN:array-index-out-of-bounds in dbAdjTree + CVE-2023-52606: (unk) powerpc/lib: Validate size for vector operations + CVE-2023-52607: (unk) powerpc/mm: Fix null-pointer dereference in pgtable_cache_add + CVE-2023-52609: (unk) binder: fix race between mmput() and do_exit() + CVE-2023-52612: (unk) crypto: scomp - fix req->dst buffer overflow + CVE-2023-52614: (unk) PM / devfreq: Fix buffer overflow in trans_stat_show + CVE-2023-52615: (unk) hwrng: core - Fix page fault dead lock on mmap-ed hwrng + CVE-2023-52617: (unk) PCI: switchtec: Fix stdev_release() crash after surprise hot remove + CVE-2023-52618: (unk) block/rnbd-srv: Check for unlikely string overflow + CVE-2023-52619: (unk) pstore/ram: Fix crash when setting number of cpus to an odd number + CVE-2023-52620: (unk) netfilter: nf_tables: disallow timeout for anonymous sets + CVE-2023-52621: (unk) bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers + CVE-2023-52622: (unk) ext4: avoid online resizing failures due to oversized flex bg + CVE-2023-52623: (unk) SUNRPC: Fix a suspicious RCU usage warning + CVE-2023-52624: (unk) drm/amd/display: Wake DMCUB before executing GPINT commands + CVE-2023-52625: (unk) drm/amd/display: Refactor DMCUB enter/exit idle interface + CVE-2023-52628: (unk) netfilter: nftables: exthdr: fix 4-byte stack OOB write + CVE-2023-52629: (unk) sh: push-switch: Reorder cleanup operations to avoid use-after-free bug + CVE-2023-52632: (unk) drm/amdkfd: Fix lock dependency warning with srcu + CVE-2023-52633: (unk) um: time-travel: fix time corruption + CVE-2023-52634: (unk) drm/amd/display: Fix disable_otg_wa logic + CVE-2023-52635: (unk) PM / devfreq: Synchronize devfreq_monitor_[start/stop] + CVE-2023-52638: (unk) can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock + CVE-2023-52639: (unk) KVM: s390: vsie: fix race during shadow creation + CVE-2023-52640: (unk) fs/ntfs3: Fix oob in ntfs_listxattr + CVE-2023-52641: (unk) fs/ntfs3: Add NULL ptr dereference checking at the end of attr_allocate_frame() CVE-2023-6040: (unk) netfilter: nf_tables: Reject tables of unsupported family CVE-2023-6121: (unk) nvmet: nul-terminate the NQNs passed in the connect command CVE-2023-6240: (unk) - CVE-2023-6270: (unk) - CVE-2023-6356: (unk) + CVE-2023-6270: (unk) aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts + CVE-2023-6356: (unk) nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length CVE-2023-6535: (unk) - CVE-2023-6536: (unk) + CVE-2023-6536: (unk) nvmet-tcp: fix a crash in nvmet_req_complete() CVE-2023-6546: (unk) tty: n_gsm: fix the UAF caused by race condition in gsm_cleanup_mux CVE-2023-6606: (unk) smb: client: fix OOB in smbCalcSize() CVE-2023-6610: (unk) smb: client: fix potential OOB in smb2_dump_detail() CVE-2023-6915: (unk) ida: Fix crash in ida_free when the bitmap is empty CVE-2023-6931: (unk) perf: Fix perf_event_validate_size() - CVE-2023-7042: (unk) + CVE-2023-7042: (unk) wifi: ath10k: fix NULL pointer dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev() CVE-2024-0340: (unk) vhost: use kzalloc() instead of kmalloc() followed by memset() CVE-2024-0564: (unk) CVE-2024-0607: (unk) netfilter: nf_tables: fix pointer math issue in nft_byteorder_eval() @@ -1679,10 +1882,11 @@ Outstanding CVEs: CVE-2024-1151: (unk) net: openvswitch: limit the number of recursions from action sets CVE-2024-1312: (unk) mm: lock_vma_under_rcu() must check vma->anon_vma under vma lock CVE-2024-21803: (unk) - CVE-2024-22099: (unk) + CVE-2024-2193: (unk) + CVE-2024-22099: (unk) Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security CVE-2024-22386: (unk) - CVE-2024-23196: (unk) - CVE-2024-23307: (unk) + CVE-2024-23196: (unk) ALSA: hda: fix a possible null-pointer dereference due to data race in snd_hdac_regmap_sync() + CVE-2024-23307: (unk) md/raid5: fix atomicity violation in raid5_cache_count CVE-2024-23848: (unk) CVE-2024-23849: (unk) net/rds: Fix UBSAN: array-index-out-of-bounds in rds_cmsg_recv CVE-2024-23851: (unk) dm: limit the number of targets and parameter size area @@ -1691,17 +1895,108 @@ Outstanding CVEs: CVE-2024-24858: (unk) CVE-2024-24859: (unk) CVE-2024-24860: (unk) Bluetooth: Fix atomicity violation in {min,max}_key_size_set - CVE-2024-24861: (unk) + CVE-2024-24861: (unk) media: xc4000: Fix atomicity violation in xc4000_get_frequency CVE-2024-24864: (unk) CVE-2024-25739: (unk) CVE-2024-25740: (unk) CVE-2024-25741: (unk) CVE-2024-25744: (unk) x86/coco: Disable 32-bit emulation by default on TDX and SEV - CVE-2024-26584: (unk) net: tls: handle backlogging of crypto requests - CVE-2024-26587: (unk) net: netdevsim: don't try to destroy PHC on VFs - CVE-2024-26588: (unk) LoongArch: BPF: Prevent out-of-bounds memory access - CVE-2024-26591: (unk) bpf: Fix re-attachment branch in bpf_tracing_prog_attach CVE-2024-26592: (unk) ksmbd: fix UAF issue in ksmbd_tcp_new_connection() CVE-2024-26594: (unk) ksmbd: validate mech token in session setup CVE-2024-26595: (unk) mlxsw: spectrum_acl_tcam: Fix NULL pointer dereference in error path CVE-2024-26598: (unk) KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache + CVE-2024-26600: (unk) phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP + CVE-2024-26602: (unk) sched/membarrier: reduce the ability to hammer on sys_membarrier + CVE-2024-26606: (unk) binder: signal epoll threads of self-work + CVE-2024-26614: (unk) tcp: make sure init the accept_queue's spinlocks once + CVE-2024-26622: (unk) tomoyo: fix UAF write bug in tomoyo_write_control() + CVE-2024-26623: (unk) pds_core: Prevent race issues involving the adminq + CVE-2024-26625: (unk) llc: call sock_orphan() at release time + CVE-2024-26627: (unk) scsi: core: Move scsi_host_busy() out of host lock for waking up EH handler + CVE-2024-26633: (unk) ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim() + CVE-2024-26635: (unk) llc: Drop support for ETH_P_TR_802_2. + CVE-2024-26636: (unk) llc: make llc_ui_sendmsg() more robust against bonding changes + CVE-2024-26641: (unk) ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv() + CVE-2024-26642: (unk) netfilter: nf_tables: disallow anonymous set with timeout flag + CVE-2024-26644: (unk) btrfs: don't abort filesystem when attempting to snapshot deleted subvolume + CVE-2024-26646: (unk) thermal: intel: hfi: Add syscore callbacks for system-wide PM + CVE-2024-26647: (unk) drm/amd/display: Fix late derefrence 'dsc' check in 'link_set_dsc_pps_packet()' + CVE-2024-26648: (unk) drm/amd/display: Fix variable deferencing before NULL check in edp_setup_replay() + CVE-2024-26650: (unk) platform/x86: p2sb: Allow p2sb_bar() calls during PCI device probe + CVE-2024-26651: (unk) sr9800: Add check for usbnet_get_endpoints + CVE-2024-26654: (unk) ALSA: sh: aica: reorder cleanup operations to avoid UAF bugs + CVE-2024-26655: (unk) Fix memory leak in posix_clock_open() + CVE-2024-26656: (unk) drm/amdgpu: fix use-after-free bug + CVE-2024-26658: (unk) bcachefs: grab s_umount only if snapshotting + CVE-2024-26659: (unk) xhci: handle isoc Babble and Buffer Overrun events properly + CVE-2024-26663: (unk) tipc: Check the bearer type before calling tipc_udp_nl_bearer_add() + CVE-2024-26664: (unk) hwmon: (coretemp) Fix out-of-bounds memory access + CVE-2024-26668: (unk) netfilter: nft_limit: reject configurations that cause integer overflow + CVE-2024-26671: (unk) blk-mq: fix IO hang from sbitmap wakeup race + CVE-2024-26672: (unk) drm/amdgpu: Fix variable 'mca_funcs' dereferenced before NULL check in 'amdgpu_mca_smu_get_mca_entry()' + CVE-2024-26675: (unk) ppp_async: limit MRU to 64K + CVE-2024-26676: (unk) af_unix: Call kfree_skb() for dead unix_(sk)->oob_skb in GC. + CVE-2024-26677: (unk) rxrpc: Fix delayed ACKs to not set the reference serial number + CVE-2024-26679: (unk) inet: read sk->sk_family once in inet_recv_error() + CVE-2024-26685: (unk) nilfs2: fix potential bug in end_buffer_async_write + CVE-2024-26686: (unk) fs/proc: do_task_stat: use sig->stats_lock to gather the threads/children stats + CVE-2024-26687: (unk) xen/events: close evtchn after mapping cleanup + CVE-2024-26689: (unk) ceph: prevent use-after-free in encode_cap_msg() + CVE-2024-26691: (unk) KVM: arm64: Fix circular locking dependency + CVE-2024-26696: (unk) nilfs2: fix hang in nilfs_lookup_dirty_data_buffers() + CVE-2024-26697: (unk) nilfs2: fix data corruption in dsync block recovery for small block sizes + CVE-2024-26699: (unk) drm/amd/display: Fix array-index-out-of-bounds in dcn35_clkmgr + CVE-2024-26700: (unk) drm/amd/display: Fix MST Null Ptr for RV + CVE-2024-26704: (unk) ext4: fix double-free of blocks due to wrong extents moved_len + CVE-2024-26706: (unk) parisc: Fix random data corruption from exception handler + CVE-2024-26713: (unk) powerpc/pseries/iommu: Fix iommu initialisation during DLPAR add + CVE-2024-26715: (unk) usb: dwc3: gadget: Fix NULL pointer dereference in dwc3_gadget_suspend + CVE-2024-26719: (unk) nouveau: offload fence uevents work to workqueue + CVE-2024-26720: (unk) mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again + CVE-2024-26726: (unk) btrfs: don't drop extent_map for free space inode on write error + CVE-2024-26733: (unk) arp: Prevent overflow in arp_req_get(). + CVE-2024-26735: (unk) ipv6: sr: fix possible use-after-free and null-ptr-deref + CVE-2024-26738: (unk) powerpc/pseries/iommu: DLPAR add doesn't completely initialize pci_controller + CVE-2024-26739: (unk) net/sched: act_mirred: don't override retval if we already lost the skb + CVE-2024-26740: (unk) net/sched: act_mirred: use the backlog for mirred ingress + CVE-2024-26743: (unk) RDMA/qedr: Fix qedr_create_user_qp error flow + CVE-2024-26744: (unk) RDMA/srpt: Support specifying the srpt_service_guid parameter + CVE-2024-26745: (unk) powerpc/pseries/iommu: IOMMU table is not initialized for kdump over SR-IOV + CVE-2024-26748: (unk) usb: cdns3: fix memory double free when handle zero packet + CVE-2024-26752: (unk) l2tp: pass correct message length to ip6_append_data + CVE-2024-26754: (unk) gtp: fix use-after-free and null-ptr-deref in gtp_genl_dump_pdp() + CVE-2024-26756: (unk) md: Don't register sync_thread for reshape directly + CVE-2024-26757: (unk) md: Don't ignore read-only array in md_check_recovery() + CVE-2024-26758: (unk) md: Don't ignore suspended array in md_check_recovery() + CVE-2024-26759: (unk) mm/swap: fix race when skipping swapcache + CVE-2024-26763: (unk) dm-crypt: don't modify the data when using authenticated encryption + CVE-2024-26764: (unk) fs/aio: Restrict kiocb_set_cancel_fn() to I/O submitted via libaio + CVE-2024-26765: (unk) LoongArch: Disable IRQ before init_fn() for nonboot CPUs + CVE-2024-26766: (unk) IB/hfi1: Fix sdma.h tx->num_descs off-by-one error + CVE-2024-26767: (unk) drm/amd/display: fixed integer types and null check locations + CVE-2024-26768: (unk) LoongArch: Change acpi_core_pic[NR_CPUS] to acpi_core_pic[MAX_CORE_PIC] + CVE-2024-26769: (unk) nvmet-fc: avoid deadlock on delete association path + CVE-2024-26770: (unk) HID: nvidia-shield: Add missing null pointer checks to LED initialization + CVE-2024-26771: (unk) dmaengine: ti: edma: Add some null pointer checks to the edma_probe + CVE-2024-26772: (unk) ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal() + CVE-2024-26773: (unk) ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found() + CVE-2024-26774: (unk) ext4: avoid dividing by 0 in mb_update_avg_fragment_size() when block bitmap corrupt + CVE-2024-26775: (unk) aoe: avoid potential deadlock at set_capacity + CVE-2024-26776: (unk) spi: hisi-sfc-v3xx: Return IRQ_NONE if no interrupts were detected + CVE-2024-26777: (unk) fbdev: sis: Error out if pixclock equals zero + CVE-2024-26778: (unk) fbdev: savage: Error out if pixclock equals zero + CVE-2024-26779: (unk) wifi: mac80211: fix race condition on enabling fast-xmit + CVE-2024-26784: (unk) pmdomain: arm: Fix NULL dereference on scmi_perf_domain removal + CVE-2024-26789: (unk) crypto: arm64/neonbs - fix out-of-bounds access on short input + CVE-2024-26791: (unk) btrfs: dev-replace: properly validate device names + CVE-2024-26793: (unk) gtp: fix use-after-free and null-ptr-deref in gtp_newlink() + CVE-2024-26797: (unk) drm/amd/display: Prevent potential buffer overflow in map_hw_resources + CVE-2024-26798: (unk) fbcon: always restore the old font data in fbcon_do_set_font() + CVE-2024-26801: (unk) Bluetooth: Avoid potential use-after-free in hci_error_reset + CVE-2024-26802: (unk) stmmac: Clear variable when destroying workqueue + CVE-2024-26803: (unk) net: veth: clear GRO when clearing XDP even when down + CVE-2024-26804: (unk) net: ip_tunnel: prevent perpetual headroom growth + CVE-2024-26805: (unk) netlink: Fix kernel-infoleak-after-free in __skb_datagram_iter + CVE-2024-26806: (unk) spi: cadence-qspi: remove system-wide suspend helper calls from runtime PM hooks + CVE-2024-26808: (unk) netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain + CVE-2024-26809: (unk) netfilter: nft_set_pipapo: release elements in clone only from destroy path diff --git a/data/4.15/4.15_CVEs.txt b/data/4.15/4.15_CVEs.txt index 43c71827a..15bceb9b6 100644 --- a/data/4.15/4.15_CVEs.txt +++ b/data/4.15/4.15_CVEs.txt @@ -366,6 +366,8 @@ CVE-2019-2182: Fix not seen in stream CVE-2019-2213: Fix not seen in stream CVE-2019-2215: Fixed with 4.15.1 CVE-2019-25045: Fix not seen in stream +CVE-2019-25160: Fix not seen in stream +CVE-2019-25162: Fix not seen in stream CVE-2019-3016: Fix not seen in stream CVE-2019-3459: Fix not seen in stream CVE-2019-3460: Fix not seen in stream @@ -554,6 +556,12 @@ CVE-2020-36558: Fix not seen in stream CVE-2020-36691: Fix not seen in stream CVE-2020-36694: Fix not seen in stream CVE-2020-36766: Fix not seen in stream +CVE-2020-36775: Fix not seen in stream +CVE-2020-36777: Fix not seen in stream +CVE-2020-36780: Fix not seen in stream +CVE-2020-36781: Fix not seen in stream +CVE-2020-36783: Fix not seen in stream +CVE-2020-36784: Fix not seen in stream CVE-2020-3702: Fix not seen in stream CVE-2020-4788: Fix not seen in stream CVE-2020-7053: Fix not seen in stream @@ -712,6 +720,111 @@ CVE-2021-45469: Fix not seen in stream CVE-2021-45485: Fix not seen in stream CVE-2021-45486: Fix not seen in stream CVE-2021-45868: Fix not seen in stream +CVE-2021-46904: Fix not seen in stream +CVE-2021-46906: Fix not seen in stream +CVE-2021-46908: Fix not seen in stream +CVE-2021-46909: Fix not seen in stream +CVE-2021-46915: Fix not seen in stream +CVE-2021-46921: Fix not seen in stream +CVE-2021-46924: Fix not seen in stream +CVE-2021-46925: Fix not seen in stream +CVE-2021-46926: Fix not seen in stream +CVE-2021-46928: Fix not seen in stream +CVE-2021-46929: Fix not seen in stream +CVE-2021-46932: Fix not seen in stream +CVE-2021-46933: Fix not seen in stream +CVE-2021-46934: Fix not seen in stream +CVE-2021-46935: Fix not seen in stream +CVE-2021-46936: Fix not seen in stream +CVE-2021-46938: Fix not seen in stream +CVE-2021-46939: Fix not seen in stream +CVE-2021-46941: Fix not seen in stream +CVE-2021-46950: Fix not seen in stream +CVE-2021-46951: Fix not seen in stream +CVE-2021-46952: Fix not seen in stream +CVE-2021-46953: Fix not seen in stream +CVE-2021-46959: Fix not seen in stream +CVE-2021-46960: Fix not seen in stream +CVE-2021-46962: Fix not seen in stream +CVE-2021-46965: Fix not seen in stream +CVE-2021-46969: Fix not seen in stream +CVE-2021-46970: Fix not seen in stream +CVE-2021-46982: Fix not seen in stream +CVE-2021-46988: Fix not seen in stream +CVE-2021-46992: Fix not seen in stream +CVE-2021-47006: Fix not seen in stream +CVE-2021-47010: Fix not seen in stream +CVE-2021-47013: Fix not seen in stream +CVE-2021-47028: Fix not seen in stream +CVE-2021-47046: Fix not seen in stream +CVE-2021-47049: Fix not seen in stream +CVE-2021-47052: Fix not seen in stream +CVE-2021-47054: Fix not seen in stream +CVE-2021-47056: Fix not seen in stream +CVE-2021-47059: Fix not seen in stream +CVE-2021-47063: Fix not seen in stream +CVE-2021-47065: Fix not seen in stream +CVE-2021-47070: Fix not seen in stream +CVE-2021-47073: Fix not seen in stream +CVE-2021-47074: Fix not seen in stream +CVE-2021-47075: Fix not seen in stream +CVE-2021-47076: Fix not seen in stream +CVE-2021-47077: Fix not seen in stream +CVE-2021-47078: Fix not seen in stream +CVE-2021-47082: Fix not seen in stream +CVE-2021-47083: Fix not seen in stream +CVE-2021-47086: Fix not seen in stream +CVE-2021-47100: Fix not seen in stream +CVE-2021-47101: Fix not seen in stream +CVE-2021-47103: Fix not seen in stream +CVE-2021-47110: Fix not seen in stream +CVE-2021-47112: Fix not seen in stream +CVE-2021-47113: Fix not seen in stream +CVE-2021-47114: Fix not seen in stream +CVE-2021-47116: Fix not seen in stream +CVE-2021-47117: Fix not seen in stream +CVE-2021-47118: Fix not seen in stream +CVE-2021-47119: Fix not seen in stream +CVE-2021-47121: Fix not seen in stream +CVE-2021-47122: Fix not seen in stream +CVE-2021-47124: Fix not seen in stream +CVE-2021-47125: Fix not seen in stream +CVE-2021-47128: Fix not seen in stream +CVE-2021-47131: Fix not seen in stream +CVE-2021-47133: Fix not seen in stream +CVE-2021-47135: Fix not seen in stream +CVE-2021-47136: Fix not seen in stream +CVE-2021-47137: Fix not seen in stream +CVE-2021-47140: Fix not seen in stream +CVE-2021-47142: Fix not seen in stream +CVE-2021-47143: Fix not seen in stream +CVE-2021-47144: Fix not seen in stream +CVE-2021-47145: Fix not seen in stream +CVE-2021-47146: Fix not seen in stream +CVE-2021-47147: Fix not seen in stream +CVE-2021-47149: Fix not seen in stream +CVE-2021-47150: Fix not seen in stream +CVE-2021-47151: Fix not seen in stream +CVE-2021-47153: Fix not seen in stream +CVE-2021-47158: Fix not seen in stream +CVE-2021-47159: Fix not seen in stream +CVE-2021-47160: Fix not seen in stream +CVE-2021-47161: Fix not seen in stream +CVE-2021-47162: Fix not seen in stream +CVE-2021-47163: Fix not seen in stream +CVE-2021-47165: Fix not seen in stream +CVE-2021-47166: Fix not seen in stream +CVE-2021-47167: Fix not seen in stream +CVE-2021-47168: Fix not seen in stream +CVE-2021-47169: Fix not seen in stream +CVE-2021-47170: Fix not seen in stream +CVE-2021-47171: Fix not seen in stream +CVE-2021-47172: Fix not seen in stream +CVE-2021-47173: Fix not seen in stream +CVE-2021-47175: Fix not seen in stream +CVE-2021-47177: Fix not seen in stream +CVE-2021-47179: Fix not seen in stream +CVE-2021-47180: Fix not seen in stream CVE-2022-0001: Fix not seen in stream CVE-2022-0002: Fix not seen in stream CVE-2022-0168: Fix not seen in stream @@ -903,6 +1016,9 @@ CVE-2022-4744: Fix not seen in stream CVE-2022-47520: Fix not seen in stream CVE-2022-47929: Fix not seen in stream CVE-2022-48619: Fix not seen in stream +CVE-2022-48626: Fix not seen in stream +CVE-2022-48627: Fix not seen in stream +CVE-2022-48628: Fix not seen in stream CVE-2023-0030: Fix not seen in stream CVE-2023-0047: Fix not seen in stream CVE-2023-0266: Fix not seen in stream @@ -964,6 +1080,7 @@ CVE-2023-26607: Fix not seen in stream CVE-2023-28328: Fix not seen in stream CVE-2023-28466: Fix not seen in stream CVE-2023-2860: Fix not seen in stream +CVE-2023-28746: Fix not seen in stream CVE-2023-28772: Fix not seen in stream CVE-2023-2985: Fix not seen in stream CVE-2023-3006: Fix not seen in stream @@ -1034,7 +1151,7 @@ CVE-2023-4622: Fix not seen in stream CVE-2023-4623: Fix not seen in stream CVE-2023-46343: Fix not seen in stream CVE-2023-46838: Fix not seen in stream -CVE-2023-47233: Fix unknown +CVE-2023-47233: Fix not seen in stream CVE-2023-4881: Fix not seen in stream CVE-2023-4921: Fix not seen in stream CVE-2023-51042: Fix not seen in stream @@ -1055,25 +1172,117 @@ CVE-2023-52444: Fix not seen in stream CVE-2023-52445: Fix not seen in stream CVE-2023-52449: Fix not seen in stream CVE-2023-52451: Fix not seen in stream -CVE-2023-52456: Fix not seen in stream -CVE-2023-52457: Fix not seen in stream CVE-2023-52458: Fix not seen in stream CVE-2023-52464: Fix not seen in stream +CVE-2023-52469: Fix not seen in stream +CVE-2023-52470: Fix not seen in stream +CVE-2023-52474: Fix not seen in stream +CVE-2023-52475: Fix not seen in stream +CVE-2023-52476: Fix not seen in stream +CVE-2023-52477: Fix not seen in stream +CVE-2023-52478: Fix not seen in stream +CVE-2023-52479: Fix not seen in stream +CVE-2023-52480: Fix not seen in stream +CVE-2023-52481: Fix not seen in stream +CVE-2023-52482: Fix not seen in stream +CVE-2023-52484: Fix not seen in stream +CVE-2023-52485: Fix not seen in stream +CVE-2023-52486: Fix not seen in stream +CVE-2023-52488: Fix not seen in stream +CVE-2023-52489: Fix not seen in stream +CVE-2023-52491: Fix not seen in stream +CVE-2023-52498: Fix not seen in stream +CVE-2023-52500: Fix not seen in stream +CVE-2023-52501: Fix not seen in stream +CVE-2023-52502: Fix not seen in stream +CVE-2023-52506: Fix not seen in stream +CVE-2023-52507: Fix not seen in stream +CVE-2023-52508: Fix not seen in stream +CVE-2023-52509: Fix not seen in stream +CVE-2023-52510: Fix not seen in stream +CVE-2023-52511: Fix not seen in stream +CVE-2023-52515: Fix not seen in stream +CVE-2023-52516: Fix not seen in stream +CVE-2023-52517: Fix not seen in stream +CVE-2023-52519: Fix not seen in stream +CVE-2023-52522: Fix not seen in stream +CVE-2023-52527: Fix not seen in stream +CVE-2023-52528: Fix not seen in stream +CVE-2023-52530: Fix not seen in stream +CVE-2023-52531: Fix not seen in stream +CVE-2023-52532: Fix not seen in stream +CVE-2023-52559: Fix not seen in stream +CVE-2023-52561: Fix not seen in stream +CVE-2023-52563: Fix not seen in stream +CVE-2023-52565: Fix not seen in stream +CVE-2023-52566: Fix not seen in stream +CVE-2023-52568: Fix not seen in stream +CVE-2023-52569: Fix not seen in stream +CVE-2023-52571: Fix not seen in stream +CVE-2023-52572: Fix not seen in stream +CVE-2023-52574: Fix not seen in stream +CVE-2023-52578: Fix not seen in stream +CVE-2023-52583: Fix not seen in stream +CVE-2023-52584: Fix not seen in stream +CVE-2023-52585: Fix not seen in stream +CVE-2023-52586: Fix not seen in stream +CVE-2023-52587: Fix not seen in stream +CVE-2023-52588: Fix not seen in stream +CVE-2023-52589: Fix not seen in stream +CVE-2023-52590: Fix not seen in stream +CVE-2023-52591: Fix not seen in stream +CVE-2023-52593: Fix not seen in stream +CVE-2023-52594: Fix not seen in stream +CVE-2023-52595: Fix not seen in stream +CVE-2023-52596: Fix not seen in stream +CVE-2023-52597: Fix not seen in stream +CVE-2023-52598: Fix not seen in stream +CVE-2023-52599: Fix not seen in stream +CVE-2023-52600: Fix not seen in stream +CVE-2023-52601: Fix not seen in stream +CVE-2023-52602: Fix not seen in stream +CVE-2023-52603: Fix not seen in stream +CVE-2023-52604: Fix not seen in stream +CVE-2023-52606: Fix not seen in stream +CVE-2023-52607: Fix not seen in stream +CVE-2023-52609: Fix not seen in stream +CVE-2023-52612: Fix not seen in stream +CVE-2023-52614: Fix not seen in stream +CVE-2023-52615: Fix not seen in stream +CVE-2023-52617: Fix not seen in stream +CVE-2023-52618: Fix not seen in stream +CVE-2023-52619: Fix not seen in stream +CVE-2023-52620: Fix not seen in stream +CVE-2023-52621: Fix not seen in stream +CVE-2023-52622: Fix not seen in stream +CVE-2023-52623: Fix not seen in stream +CVE-2023-52624: Fix not seen in stream +CVE-2023-52625: Fix not seen in stream +CVE-2023-52628: Fix not seen in stream +CVE-2023-52629: Fix not seen in stream +CVE-2023-52632: Fix not seen in stream +CVE-2023-52633: Fix not seen in stream +CVE-2023-52634: Fix not seen in stream +CVE-2023-52635: Fix not seen in stream +CVE-2023-52638: Fix not seen in stream +CVE-2023-52639: Fix not seen in stream +CVE-2023-52640: Fix not seen in stream +CVE-2023-52641: Fix not seen in stream CVE-2023-5717: Fix not seen in stream CVE-2023-6040: Fix not seen in stream CVE-2023-6121: Fix not seen in stream CVE-2023-6240: Fix unknown -CVE-2023-6270: Fix unknown -CVE-2023-6356: Fix unknown +CVE-2023-6270: Fix not seen in stream +CVE-2023-6356: Fix not seen in stream CVE-2023-6535: Fix unknown -CVE-2023-6536: Fix unknown +CVE-2023-6536: Fix not seen in stream CVE-2023-6546: Fix not seen in stream CVE-2023-6606: Fix not seen in stream CVE-2023-6610: Fix not seen in stream CVE-2023-6915: Fix not seen in stream CVE-2023-6931: Fix not seen in stream CVE-2023-6932: Fix not seen in stream -CVE-2023-7042: Fix unknown +CVE-2023-7042: Fix not seen in stream CVE-2023-7192: Fix not seen in stream CVE-2024-0340: Fix not seen in stream CVE-2024-0564: Fix unknown @@ -1084,10 +1293,11 @@ CVE-2024-1086: Fix not seen in stream CVE-2024-1151: Fix not seen in stream CVE-2024-1312: Fix not seen in stream CVE-2024-21803: Fix unknown -CVE-2024-22099: Fix unknown +CVE-2024-2193: Fix unknown +CVE-2024-22099: Fix not seen in stream CVE-2024-22386: Fix unknown -CVE-2024-23196: Fix unknown -CVE-2024-23307: Fix unknown +CVE-2024-23196: Fix not seen in stream +CVE-2024-23307: Fix not seen in stream CVE-2024-23848: Fix unknown CVE-2024-23849: Fix not seen in stream CVE-2024-23851: Fix not seen in stream @@ -1096,17 +1306,110 @@ CVE-2024-24857: Fix unknown CVE-2024-24858: Fix unknown CVE-2024-24859: Fix unknown CVE-2024-24860: Fix not seen in stream -CVE-2024-24861: Fix unknown +CVE-2024-24861: Fix not seen in stream CVE-2024-24864: Fix unknown CVE-2024-25739: Fix unknown CVE-2024-25740: Fix unknown CVE-2024-25741: Fix unknown CVE-2024-25744: Fix not seen in stream -CVE-2024-26584: Fix not seen in stream -CVE-2024-26587: Fix not seen in stream -CVE-2024-26588: Fix not seen in stream -CVE-2024-26591: Fix not seen in stream CVE-2024-26592: Fix not seen in stream CVE-2024-26594: Fix not seen in stream CVE-2024-26595: Fix not seen in stream CVE-2024-26598: Fix not seen in stream +CVE-2024-26600: Fix not seen in stream +CVE-2024-26602: Fix not seen in stream +CVE-2024-26606: Fix not seen in stream +CVE-2024-26614: Fix not seen in stream +CVE-2024-26622: Fix not seen in stream +CVE-2024-26623: Fix not seen in stream +CVE-2024-26625: Fix not seen in stream +CVE-2024-26627: Fix not seen in stream +CVE-2024-26633: Fix not seen in stream +CVE-2024-26635: Fix not seen in stream +CVE-2024-26636: Fix not seen in stream +CVE-2024-26641: Fix not seen in stream +CVE-2024-26642: Fix not seen in stream +CVE-2024-26644: Fix not seen in stream +CVE-2024-26646: Fix not seen in stream +CVE-2024-26647: Fix not seen in stream +CVE-2024-26648: Fix not seen in stream +CVE-2024-26650: Fix not seen in stream +CVE-2024-26651: Fix not seen in stream +CVE-2024-26654: Fix not seen in stream +CVE-2024-26655: Fix not seen in stream +CVE-2024-26656: Fix not seen in stream +CVE-2024-26658: Fix not seen in stream +CVE-2024-26659: Fix not seen in stream +CVE-2024-26663: Fix not seen in stream +CVE-2024-26664: Fix not seen in stream +CVE-2024-26668: Fix not seen in stream +CVE-2024-26671: Fix not seen in stream +CVE-2024-26672: Fix not seen in stream +CVE-2024-26675: Fix not seen in stream +CVE-2024-26676: Fix not seen in stream +CVE-2024-26677: Fix not seen in stream +CVE-2024-26679: Fix not seen in stream +CVE-2024-26685: Fix not seen in stream +CVE-2024-26686: Fix not seen in stream +CVE-2024-26687: Fix not seen in stream +CVE-2024-26689: Fix not seen in stream +CVE-2024-26691: Fix not seen in stream +CVE-2024-26696: Fix not seen in stream +CVE-2024-26697: Fix not seen in stream +CVE-2024-26699: Fix not seen in stream +CVE-2024-26700: Fix not seen in stream +CVE-2024-26704: Fix not seen in stream +CVE-2024-26706: Fix not seen in stream +CVE-2024-26713: Fix not seen in stream +CVE-2024-26715: Fix not seen in stream +CVE-2024-26719: Fix not seen in stream +CVE-2024-26720: Fix not seen in stream +CVE-2024-26726: Fix not seen in stream +CVE-2024-26733: Fix not seen in stream +CVE-2024-26735: Fix not seen in stream +CVE-2024-26736: Fix not seen in stream +CVE-2024-26738: Fix not seen in stream +CVE-2024-26739: Fix not seen in stream +CVE-2024-26740: Fix not seen in stream +CVE-2024-26743: Fix not seen in stream +CVE-2024-26744: Fix not seen in stream +CVE-2024-26745: Fix not seen in stream +CVE-2024-26748: Fix not seen in stream +CVE-2024-26751: Fix not seen in stream +CVE-2024-26752: Fix not seen in stream +CVE-2024-26754: Fix not seen in stream +CVE-2024-26756: Fix not seen in stream +CVE-2024-26757: Fix not seen in stream +CVE-2024-26758: Fix not seen in stream +CVE-2024-26759: Fix not seen in stream +CVE-2024-26763: Fix not seen in stream +CVE-2024-26764: Fix not seen in stream +CVE-2024-26765: Fix not seen in stream +CVE-2024-26766: Fix not seen in stream +CVE-2024-26767: Fix not seen in stream +CVE-2024-26768: Fix not seen in stream +CVE-2024-26769: Fix not seen in stream +CVE-2024-26770: Fix not seen in stream +CVE-2024-26771: Fix not seen in stream +CVE-2024-26772: Fix not seen in stream +CVE-2024-26773: Fix not seen in stream +CVE-2024-26774: Fix not seen in stream +CVE-2024-26775: Fix not seen in stream +CVE-2024-26776: Fix not seen in stream +CVE-2024-26777: Fix not seen in stream +CVE-2024-26778: Fix not seen in stream +CVE-2024-26779: Fix not seen in stream +CVE-2024-26784: Fix not seen in stream +CVE-2024-26789: Fix not seen in stream +CVE-2024-26791: Fix not seen in stream +CVE-2024-26793: Fix not seen in stream +CVE-2024-26797: Fix not seen in stream +CVE-2024-26798: Fix not seen in stream +CVE-2024-26801: Fix not seen in stream +CVE-2024-26802: Fix not seen in stream +CVE-2024-26803: Fix not seen in stream +CVE-2024-26804: Fix not seen in stream +CVE-2024-26805: Fix not seen in stream +CVE-2024-26806: Fix not seen in stream +CVE-2024-26808: Fix not seen in stream +CVE-2024-26809: Fix not seen in stream diff --git a/data/4.15/4.15_security.txt b/data/4.15/4.15_security.txt index 143191f23..bf3f95b78 100644 --- a/data/4.15/4.15_security.txt +++ b/data/4.15/4.15_security.txt @@ -403,6 +403,8 @@ Outstanding CVEs: CVE-2019-2182: (unk) arm64: Enforce BBM for huge IO/VMAP mappings CVE-2019-2213: (unk) binder: fix possible UAF when freeing buffer CVE-2019-25045: (unk) xfrm: clean up xfrm protocol checks + CVE-2019-25160: (unk) netlabel: fix out-of-bounds memory accesses + CVE-2019-25162: (unk) i2c: Fix a potential use after free CVE-2019-3016: (unk) x86/kvm: Be careful not to clear KVM_VCPU_FLUSH_TLB bit CVE-2019-3459: (unk) Bluetooth: Verify that l2cap_get_conf_opt provides large enough buffer CVE-2019-3460: (unk) Bluetooth: Check L2CAP option sizes returned from l2cap_get_conf_opt @@ -588,6 +590,12 @@ Outstanding CVEs: CVE-2020-36691: (unk) netlink: limit recursion depth in policy validation CVE-2020-36694: (unk) netfilter: x_tables: Switch synchronization to RCU CVE-2020-36766: (unk) cec-api: prevent leaking memory through hole in structure + CVE-2020-36775: (unk) f2fs: fix to avoid potential deadlock + CVE-2020-36777: (unk) media: dvbdev: Fix memory leak in dvb_media_device_free() + CVE-2020-36780: (unk) i2c: sprd: fix reference leak when pm_runtime_get_sync fails + CVE-2020-36781: (unk) i2c: imx: fix reference leak when pm_runtime_get_sync fails + CVE-2020-36783: (unk) i2c: img-scb: fix reference leak when pm_runtime_get_sync fails + CVE-2020-36784: (unk) i2c: cadence: fix reference leak when pm_runtime_get_sync fails CVE-2020-3702: (unk) ath: Use safer key clearing with key cache entries CVE-2020-4788: (unk) powerpc/64s: flush L1D on kernel entry CVE-2020-7053: (unk) drm/i915: Introduce a mutex for file_priv->context_idr @@ -745,6 +753,111 @@ Outstanding CVEs: CVE-2021-45485: (unk) ipv6: use prandom_u32() for ID generation CVE-2021-45486: (unk) inet: use bigger hash table for IP ID generation CVE-2021-45868: (unk) quota: check block number when reading the block in quota file + CVE-2021-46904: (unk) net: hso: fix null-ptr-deref during tty device unregistration + CVE-2021-46906: (unk) HID: usbhid: fix info leak in hid_submit_ctrl + CVE-2021-46908: (unk) bpf: Use correct permission flag for mixed signed bounds arithmetic + CVE-2021-46909: (unk) ARM: footbridge: fix PCI interrupt mapping + CVE-2021-46915: (unk) netfilter: nft_limit: avoid possible divide error in nft_limit_init + CVE-2021-46921: (unk) locking/qrwlock: Fix ordering in queued_write_lock_slowpath() + CVE-2021-46924: (unk) NFC: st21nfca: Fix memory leak in device probe and remove + CVE-2021-46925: (unk) net/smc: fix kernel panic caused by race of smc_sock + CVE-2021-46926: (unk) ALSA: hda: intel-sdw-acpi: harden detection of controller + CVE-2021-46928: (unk) parisc: Clear stale IIR value on instruction access rights trap + CVE-2021-46929: (unk) sctp: use call_rcu to free endpoint + CVE-2021-46932: (unk) Input: appletouch - initialize work before device registration + CVE-2021-46933: (unk) usb: gadget: f_fs: Clear ffs_eventfd in ffs_data_clear. + CVE-2021-46934: (unk) i2c: validate user data in compat ioctl + CVE-2021-46935: (unk) binder: fix async_free_space accounting for empty parcels + CVE-2021-46936: (unk) net: fix use-after-free in tw_timer_handler + CVE-2021-46938: (unk) dm rq: fix double free of blk_mq_tag_set in dev remove after table load fails + CVE-2021-46939: (unk) tracing: Restructure trace_clock_global() to never block + CVE-2021-46941: (unk) usb: dwc3: core: Do core softreset when switch mode + CVE-2021-46950: (unk) md/raid1: properly indicate failure when ending a failed write request + CVE-2021-46951: (unk) tpm: efi: Use local variable for calculating final log size + CVE-2021-46952: (unk) NFS: fs_context: validate UDP retrans to prevent shift out-of-bounds + CVE-2021-46953: (unk) ACPI: GTDT: Don't corrupt interrupt mappings on watchdow probe failure + CVE-2021-46959: (unk) spi: Fix use-after-free with devm_spi_alloc_* + CVE-2021-46960: (unk) cifs: Return correct error code from smb2_get_enc_key + CVE-2021-46962: (unk) mmc: uniphier-sd: Fix a resource leak in the remove function + CVE-2021-46965: (unk) mtd: physmap: physmap-bt1-rom: Fix unintentional stack access + CVE-2021-46969: (unk) bus: mhi: core: Fix invalid error returning in mhi_queue + CVE-2021-46970: (unk) bus: mhi: pci_generic: Remove WQ_MEM_RECLAIM flag from state workqueue + CVE-2021-46982: (unk) f2fs: compress: fix race condition of overwrite vs truncate + CVE-2021-46988: (unk) userfaultfd: release page in error path to avoid BUG_ON + CVE-2021-46992: (unk) netfilter: nftables: avoid overflows in nft_hash_buckets() + CVE-2021-47006: (unk) ARM: 9064/1: hw_breakpoint: Do not directly check the event's overflow_handler hook + CVE-2021-47010: (unk) net: Only allow init netns to set default tcp cong to a restricted algo + CVE-2021-47013: (unk) net:emac/emac-mac: Fix a use after free in emac_mac_tx_buf_send + CVE-2021-47028: (unk) mt76: mt7915: fix txrate reporting + CVE-2021-47046: (unk) drm/amd/display: Fix off by one in hdmi_14_process_transaction() + CVE-2021-47049: (unk) Drivers: hv: vmbus: Use after free in __vmbus_open() + CVE-2021-47052: (unk) crypto: sa2ul - Fix memory leak of rxd + CVE-2021-47054: (unk) bus: qcom: Put child node before return + CVE-2021-47056: (unk) crypto: qat - ADF_STATUS_PF_RUNNING should be set after adf_dev_init + CVE-2021-47059: (unk) crypto: sun8i-ss - fix result memory leak on error path + CVE-2021-47063: (unk) drm: bridge/panel: Cleanup connector on bridge detach + CVE-2021-47065: (unk) rtw88: Fix array overrun in rtw_get_tx_power_params() + CVE-2021-47070: (unk) uio_hv_generic: Fix another memory leak in error handling paths + CVE-2021-47073: (unk) platform/x86: dell-smbios-wmi: Fix oops on rmmod dell_smbios + CVE-2021-47074: (unk) nvme-loop: fix memory leak in nvme_loop_create_ctrl() + CVE-2021-47075: (unk) nvmet: fix memory leak in nvmet_alloc_ctrl() + CVE-2021-47076: (unk) RDMA/rxe: Return CQE error if invalid lkey was supplied + CVE-2021-47077: (unk) scsi: qedf: Add pointer checks in qedf_update_link_speed() + CVE-2021-47078: (unk) RDMA/rxe: Clear all QP fields if creation failed + CVE-2021-47082: (unk) tun: avoid double free in tun_free_netdev + CVE-2021-47083: (unk) pinctrl: mediatek: fix global-out-of-bounds issue + CVE-2021-47086: (unk) phonet/pep: refuse to enable an unbound pipe + CVE-2021-47100: (unk) ipmi: Fix UAF when uninstall ipmi_si and ipmi_msghandler module + CVE-2021-47101: (unk) asix: fix uninit-value in asix_mdio_read() + CVE-2021-47103: (unk) inet: fully convert sk->sk_rx_dst to RCU rules + CVE-2021-47110: (unk) x86/kvm: Disable kvmclock on all CPUs on shutdown + CVE-2021-47112: (unk) x86/kvm: Teardown PV features on boot CPU as well + CVE-2021-47113: (unk) btrfs: abort in rename_exchange if we fail to insert the second ref + CVE-2021-47114: (unk) ocfs2: fix data corruption by fallocate + CVE-2021-47116: (unk) ext4: fix memory leak in ext4_mb_init_backend on error path. + CVE-2021-47117: (unk) ext4: fix bug on in ext4_es_cache_extent as ext4_split_extent_at failed + CVE-2021-47118: (unk) pid: take a reference when initializing `cad_pid` + CVE-2021-47119: (unk) ext4: fix memory leak in ext4_fill_super + CVE-2021-47121: (unk) net: caif: fix memory leak in cfusbl_device_notify + CVE-2021-47122: (unk) net: caif: fix memory leak in caif_device_notify + CVE-2021-47124: (unk) io_uring: fix link timeout refs + CVE-2021-47125: (unk) sch_htb: fix refcount leak in htb_parent_to_leaf_offload + CVE-2021-47128: (unk) bpf, lockdown, audit: Fix buggy SELinux lockdown permission checks + CVE-2021-47131: (unk) net/tls: Fix use-after-free after the TLS device goes down and up + CVE-2021-47133: (unk) HID: amd_sfh: Fix memory leak in amd_sfh_work + CVE-2021-47135: (unk) mt76: mt7921: fix possible AOOB issue in mt7921_mcu_tx_rate_report + CVE-2021-47136: (unk) net: zero-initialize tc skb extension on allocation + CVE-2021-47137: (unk) net: lantiq: fix memory corruption in RX ring + CVE-2021-47140: (unk) iommu/amd: Clear DMA ops when switching domain + CVE-2021-47142: (unk) drm/amdgpu: Fix a use-after-free + CVE-2021-47143: (unk) net/smc: remove device from smcd_dev_list after failed device_add() + CVE-2021-47144: (unk) drm/amd/amdgpu: fix refcount leak + CVE-2021-47145: (unk) btrfs: do not BUG_ON in link_to_fixup_dir + CVE-2021-47146: (unk) mld: fix panic in mld_newpack() + CVE-2021-47147: (unk) ptp: ocp: Fix a resource leak in an error handling path + CVE-2021-47149: (unk) net: fujitsu: fix potential null-ptr-deref + CVE-2021-47150: (unk) net: fec: fix the potential memory leak in fec_enet_init() + CVE-2021-47151: (unk) interconnect: qcom: bcm-voter: add a missing of_node_put() + CVE-2021-47153: (unk) i2c: i801: Don't generate an interrupt on bus reset + CVE-2021-47158: (unk) net: dsa: sja1105: add error handling in sja1105_setup() + CVE-2021-47159: (unk) net: dsa: fix a crash if ->get_sset_count() fails + CVE-2021-47160: (unk) net: dsa: mt7530: fix VLAN traffic leaks + CVE-2021-47161: (unk) spi: spi-fsl-dspi: Fix a resource leak in an error handling path + CVE-2021-47162: (unk) tipc: skb_linearize the head skb when reassembling msgs + CVE-2021-47163: (unk) tipc: wait and exit until all work queues are done + CVE-2021-47165: (unk) drm/meson: fix shutdown crash when component not probed + CVE-2021-47166: (unk) NFS: Don't corrupt the value of pg_bytes_written in nfs_do_recoalesce() + CVE-2021-47167: (unk) NFS: Fix an Oopsable condition in __nfs_pageio_add_request() + CVE-2021-47168: (unk) NFS: fix an incorrect limit in filelayout_decode_layout() + CVE-2021-47169: (unk) serial: rp2: use 'request_firmware' instead of 'request_firmware_nowait' + CVE-2021-47170: (unk) USB: usbfs: Don't WARN about excessively large memory allocations + CVE-2021-47171: (unk) net: usb: fix memory leak in smsc75xx_bind + CVE-2021-47172: (unk) iio: adc: ad7124: Fix potential overflow due to non sequential channel numbers + CVE-2021-47173: (unk) misc/uss720: fix memory leak in uss720_probe + CVE-2021-47175: (unk) net/sched: fq_pie: fix OOB access in the traffic path + CVE-2021-47177: (unk) iommu/vt-d: Fix sysfs leak in alloc_iommu() + CVE-2021-47179: (unk) NFSv4: Fix a NULL pointer dereference in pnfs_mark_matching_lsegs_return() + CVE-2021-47180: (unk) NFC: nci: fix memory leak in nci_allocate_device CVE-2022-0001: (unk) x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE CVE-2022-0002: (unk) x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE CVE-2022-0168: (unk) cifs: fix NULL ptr dereference in smb2_ioctl_query_info() @@ -935,6 +1048,9 @@ Outstanding CVEs: CVE-2022-47520: (unk) wifi: wilc1000: validate pairwise and authentication suite offsets CVE-2022-47929: (unk) net: sched: disallow noqueue for qdisc classes CVE-2022-48619: (unk) Input: add bounds checking to input_set_capability() + CVE-2022-48626: (unk) moxart: fix potential use-after-free on remove path + CVE-2022-48627: (unk) vt: fix memory overlapping when deleting chars in the buffer + CVE-2022-48628: (unk) ceph: drop messages from MDS when unmounting CVE-2023-0030: (unk) drm/nouveau/mmu: add more general vmm free/node handling functions CVE-2023-0047: (unk) mm, oom: do not trigger out_of_memory from the #PF CVE-2023-0266: (unk) ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF @@ -996,6 +1112,7 @@ Outstanding CVEs: CVE-2023-28328: (unk) media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer() CVE-2023-28466: (unk) net: tls: fix possible race condition between do_tls_getsockopt_conf() and do_tls_setsockopt_conf() CVE-2023-2860: (unk) ipv6: sr: fix out-of-bounds read when setting HMAC data. + CVE-2023-28746: (unk) x86/mmio: Disable KVM mitigation when X86_FEATURE_CLEAR_CPU_BUF is set CVE-2023-28772: (unk) seq_buf: Fix overflow in seq_buf_putmem_hex() CVE-2023-2985: (unk) fs: hfsplus: fix UAF issue in hfsplus_put_super CVE-2023-3006: (unk) arm64: Add AMPERE1 to the Spectre-BHB affected list @@ -1066,7 +1183,7 @@ Outstanding CVEs: CVE-2023-4623: (unk) net/sched: sch_hfsc: Ensure inner classes have fsc curve CVE-2023-46343: (unk) nfc: nci: fix possible NULL pointer dereference in send_acknowledge() CVE-2023-46838: (unk) xen-netback: don't produce zero-size SKB frags - CVE-2023-47233: (unk) + CVE-2023-47233: (unk) wifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach CVE-2023-4881: (unk) netfilter: nftables: exthdr: fix 4-byte stack OOB write CVE-2023-4921: (unk) net: sched: sch_qfq: Fix UAF in qfq_dequeue() CVE-2023-51042: (unk) drm/amdgpu: Fix potential fence use-after-free v2 @@ -1087,25 +1204,117 @@ Outstanding CVEs: CVE-2023-52445: (unk) media: pvrusb2: fix use after free on context disconnection CVE-2023-52449: (unk) mtd: Fix gluebi NULL pointer dereference caused by ftl notifier CVE-2023-52451: (unk) powerpc/pseries/memhp: Fix access beyond end of drmem array - CVE-2023-52456: (unk) serial: imx: fix tx statemachine deadlock - CVE-2023-52457: (unk) serial: 8250: omap: Don't skip resource freeing if pm_runtime_resume_and_get() failed CVE-2023-52458: (unk) block: add check that partition length needs to be aligned with block size CVE-2023-52464: (unk) EDAC/thunderx: Fix possible out-of-bounds string access + CVE-2023-52469: (unk) drivers/amd/pm: fix a use-after-free in kv_parse_power_table + CVE-2023-52470: (unk) drm/radeon: check the alloc_workqueue return value in radeon_crtc_init() + CVE-2023-52474: (unk) IB/hfi1: Fix bugs with non-PAGE_SIZE-end multi-iovec user SDMA requests + CVE-2023-52475: (unk) Input: powermate - fix use-after-free in powermate_config_complete + CVE-2023-52476: (unk) perf/x86/lbr: Filter vsyscall addresses + CVE-2023-52477: (unk) usb: hub: Guard against accesses to uninitialized BOS descriptors + CVE-2023-52478: (unk) HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect + CVE-2023-52479: (unk) ksmbd: fix uaf in smb20_oplock_break_ack + CVE-2023-52480: (unk) ksmbd: fix race condition between session lookup and expire + CVE-2023-52481: (unk) arm64: errata: Add Cortex-A520 speculative unprivileged load workaround + CVE-2023-52482: (unk) x86/srso: Add SRSO mitigation for Hygon processors + CVE-2023-52484: (unk) iommu/arm-smmu-v3: Fix soft lockup triggered by arm_smmu_mm_invalidate_range + CVE-2023-52485: (unk) drm/amd/display: Wake DMCUB before sending a command + CVE-2023-52486: (unk) drm: Don't unref the same fb many times by mistake due to deadlock handling + CVE-2023-52488: (unk) serial: sc16is7xx: convert from _raw_ to _noinc_ regmap functions for FIFO + CVE-2023-52489: (unk) mm/sparsemem: fix race in accessing memory_section->usage + CVE-2023-52491: (unk) media: mtk-jpeg: Fix use after free bug due to error path handling in mtk_jpeg_dec_device_run + CVE-2023-52498: (unk) PM: sleep: Fix possible deadlocks in core system-wide PM code + CVE-2023-52500: (unk) scsi: pm80xx: Avoid leaking tags when processing OPC_INB_SET_CONTROLLER_CONFIG command + CVE-2023-52501: (unk) ring-buffer: Do not attempt to read past "commit" + CVE-2023-52502: (unk) net: nfc: fix races in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn() + CVE-2023-52506: (unk) LoongArch: Set all reserved memblocks on Node#0 at initialization + CVE-2023-52507: (unk) nfc: nci: assert requested protocol is valid + CVE-2023-52508: (unk) nvme-fc: Prevent null pointer dereference in nvme_fc_io_getuuid() + CVE-2023-52509: (unk) ravb: Fix use-after-free issue in ravb_tx_timeout_work() + CVE-2023-52510: (unk) ieee802154: ca8210: Fix a potential UAF in ca8210_probe + CVE-2023-52511: (unk) spi: sun6i: reduce DMA RX transfer width to single byte + CVE-2023-52515: (unk) RDMA/srp: Do not call scsi_done() from srp_abort() + CVE-2023-52516: (unk) dma-debug: don't call __dma_entry_alloc_check_leak() under free_entries_lock + CVE-2023-52517: (unk) spi: sun6i: fix race between DMA RX transfer completion and RX FIFO drain + CVE-2023-52519: (unk) HID: intel-ish-hid: ipc: Disable and reenable ACPI GPE bit + CVE-2023-52522: (unk) net: fix possible store tearing in neigh_periodic_work() + CVE-2023-52527: (unk) ipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data() + CVE-2023-52528: (unk) net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg + CVE-2023-52530: (unk) wifi: mac80211: fix potential key use-after-free + CVE-2023-52531: (unk) wifi: iwlwifi: mvm: Fix a memory corruption issue + CVE-2023-52532: (unk) net: mana: Fix TX CQE error handling + CVE-2023-52559: (unk) iommu/vt-d: Avoid memory allocation in iommu_suspend() + CVE-2023-52561: (unk) arm64: dts: qcom: sdm845-db845c: Mark cont splash memory region as reserved + CVE-2023-52563: (unk) drm/meson: fix memory leak on ->hpd_notify callback + CVE-2023-52565: (unk) media: uvcvideo: Fix OOB read + CVE-2023-52566: (unk) nilfs2: fix potential use after free in nilfs_gccache_submit_read_data() + CVE-2023-52568: (unk) x86/sgx: Resolves SECS reclaim vs. page fault for EAUG race + CVE-2023-52569: (unk) btrfs: remove BUG() after failure to insert delayed dir index item + CVE-2023-52571: (unk) power: supply: rk817: Fix node refcount leak + CVE-2023-52572: (unk) cifs: Fix UAF in cifs_demultiplex_thread() + CVE-2023-52574: (unk) team: fix null-ptr-deref when team device type is changed + CVE-2023-52578: (unk) net: bridge: use DEV_STATS_INC() + CVE-2023-52583: (unk) ceph: fix deadlock or deadcode of misusing dget() + CVE-2023-52584: (unk) spmi: mediatek: Fix UAF on device remove + CVE-2023-52585: (unk) drm/amdgpu: Fix possible NULL dereference in amdgpu_ras_query_error_status_helper() + CVE-2023-52586: (unk) drm/msm/dpu: Add mutex lock in control vblank irq + CVE-2023-52587: (unk) IB/ipoib: Fix mcast list locking + CVE-2023-52588: (unk) f2fs: fix to tag gcing flag on page during block migration + CVE-2023-52589: (unk) media: rkisp1: Fix IRQ disable race issue + CVE-2023-52590: (unk) ocfs2: Avoid touching renamed directory if parent does not change + CVE-2023-52591: (unk) reiserfs: Avoid touching renamed directory if parent does not change + CVE-2023-52593: (unk) wifi: wfx: fix possible NULL pointer dereference in wfx_set_mfp_ap() + CVE-2023-52594: (unk) wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus() + CVE-2023-52595: (unk) wifi: rt2x00: restart beacon queue when hardware reset + CVE-2023-52596: (unk) sysctl: Fix out of bounds access for empty sysctl registers + CVE-2023-52597: (unk) KVM: s390: fix setting of fpc register + CVE-2023-52598: (unk) s390/ptrace: handle setting of fpc register correctly + CVE-2023-52599: (unk) jfs: fix array-index-out-of-bounds in diNewExt + CVE-2023-52600: (unk) jfs: fix uaf in jfs_evict_inode + CVE-2023-52601: (unk) jfs: fix array-index-out-of-bounds in dbAdjTree + CVE-2023-52602: (unk) jfs: fix slab-out-of-bounds Read in dtSearch + CVE-2023-52603: (unk) UBSAN: array-index-out-of-bounds in dtSplitRoot + CVE-2023-52604: (unk) FS:JFS:UBSAN:array-index-out-of-bounds in dbAdjTree + CVE-2023-52606: (unk) powerpc/lib: Validate size for vector operations + CVE-2023-52607: (unk) powerpc/mm: Fix null-pointer dereference in pgtable_cache_add + CVE-2023-52609: (unk) binder: fix race between mmput() and do_exit() + CVE-2023-52612: (unk) crypto: scomp - fix req->dst buffer overflow + CVE-2023-52614: (unk) PM / devfreq: Fix buffer overflow in trans_stat_show + CVE-2023-52615: (unk) hwrng: core - Fix page fault dead lock on mmap-ed hwrng + CVE-2023-52617: (unk) PCI: switchtec: Fix stdev_release() crash after surprise hot remove + CVE-2023-52618: (unk) block/rnbd-srv: Check for unlikely string overflow + CVE-2023-52619: (unk) pstore/ram: Fix crash when setting number of cpus to an odd number + CVE-2023-52620: (unk) netfilter: nf_tables: disallow timeout for anonymous sets + CVE-2023-52621: (unk) bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers + CVE-2023-52622: (unk) ext4: avoid online resizing failures due to oversized flex bg + CVE-2023-52623: (unk) SUNRPC: Fix a suspicious RCU usage warning + CVE-2023-52624: (unk) drm/amd/display: Wake DMCUB before executing GPINT commands + CVE-2023-52625: (unk) drm/amd/display: Refactor DMCUB enter/exit idle interface + CVE-2023-52628: (unk) netfilter: nftables: exthdr: fix 4-byte stack OOB write + CVE-2023-52629: (unk) sh: push-switch: Reorder cleanup operations to avoid use-after-free bug + CVE-2023-52632: (unk) drm/amdkfd: Fix lock dependency warning with srcu + CVE-2023-52633: (unk) um: time-travel: fix time corruption + CVE-2023-52634: (unk) drm/amd/display: Fix disable_otg_wa logic + CVE-2023-52635: (unk) PM / devfreq: Synchronize devfreq_monitor_[start/stop] + CVE-2023-52638: (unk) can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock + CVE-2023-52639: (unk) KVM: s390: vsie: fix race during shadow creation + CVE-2023-52640: (unk) fs/ntfs3: Fix oob in ntfs_listxattr + CVE-2023-52641: (unk) fs/ntfs3: Add NULL ptr dereference checking at the end of attr_allocate_frame() CVE-2023-5717: (unk) perf: Disallow mis-matched inherited group reads CVE-2023-6040: (unk) netfilter: nf_tables: Reject tables of unsupported family CVE-2023-6121: (unk) nvmet: nul-terminate the NQNs passed in the connect command CVE-2023-6240: (unk) - CVE-2023-6270: (unk) - CVE-2023-6356: (unk) + CVE-2023-6270: (unk) aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts + CVE-2023-6356: (unk) nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length CVE-2023-6535: (unk) - CVE-2023-6536: (unk) + CVE-2023-6536: (unk) nvmet-tcp: fix a crash in nvmet_req_complete() CVE-2023-6546: (unk) tty: n_gsm: fix the UAF caused by race condition in gsm_cleanup_mux CVE-2023-6606: (unk) smb: client: fix OOB in smbCalcSize() CVE-2023-6610: (unk) smb: client: fix potential OOB in smb2_dump_detail() CVE-2023-6915: (unk) ida: Fix crash in ida_free when the bitmap is empty CVE-2023-6931: (unk) perf: Fix perf_event_validate_size() CVE-2023-6932: (unk) ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet - CVE-2023-7042: (unk) + CVE-2023-7042: (unk) wifi: ath10k: fix NULL pointer dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev() CVE-2023-7192: (unk) netfilter: ctnetlink: fix possible refcount leak in ctnetlink_create_conntrack() CVE-2024-0340: (unk) vhost: use kzalloc() instead of kmalloc() followed by memset() CVE-2024-0564: (unk) @@ -1116,10 +1325,11 @@ Outstanding CVEs: CVE-2024-1151: (unk) net: openvswitch: limit the number of recursions from action sets CVE-2024-1312: (unk) mm: lock_vma_under_rcu() must check vma->anon_vma under vma lock CVE-2024-21803: (unk) - CVE-2024-22099: (unk) + CVE-2024-2193: (unk) + CVE-2024-22099: (unk) Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security CVE-2024-22386: (unk) - CVE-2024-23196: (unk) - CVE-2024-23307: (unk) + CVE-2024-23196: (unk) ALSA: hda: fix a possible null-pointer dereference due to data race in snd_hdac_regmap_sync() + CVE-2024-23307: (unk) md/raid5: fix atomicity violation in raid5_cache_count CVE-2024-23848: (unk) CVE-2024-23849: (unk) net/rds: Fix UBSAN: array-index-out-of-bounds in rds_cmsg_recv CVE-2024-23851: (unk) dm: limit the number of targets and parameter size area @@ -1128,17 +1338,110 @@ Outstanding CVEs: CVE-2024-24858: (unk) CVE-2024-24859: (unk) CVE-2024-24860: (unk) Bluetooth: Fix atomicity violation in {min,max}_key_size_set - CVE-2024-24861: (unk) + CVE-2024-24861: (unk) media: xc4000: Fix atomicity violation in xc4000_get_frequency CVE-2024-24864: (unk) CVE-2024-25739: (unk) CVE-2024-25740: (unk) CVE-2024-25741: (unk) CVE-2024-25744: (unk) x86/coco: Disable 32-bit emulation by default on TDX and SEV - CVE-2024-26584: (unk) net: tls: handle backlogging of crypto requests - CVE-2024-26587: (unk) net: netdevsim: don't try to destroy PHC on VFs - CVE-2024-26588: (unk) LoongArch: BPF: Prevent out-of-bounds memory access - CVE-2024-26591: (unk) bpf: Fix re-attachment branch in bpf_tracing_prog_attach CVE-2024-26592: (unk) ksmbd: fix UAF issue in ksmbd_tcp_new_connection() CVE-2024-26594: (unk) ksmbd: validate mech token in session setup CVE-2024-26595: (unk) mlxsw: spectrum_acl_tcam: Fix NULL pointer dereference in error path CVE-2024-26598: (unk) KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache + CVE-2024-26600: (unk) phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP + CVE-2024-26602: (unk) sched/membarrier: reduce the ability to hammer on sys_membarrier + CVE-2024-26606: (unk) binder: signal epoll threads of self-work + CVE-2024-26614: (unk) tcp: make sure init the accept_queue's spinlocks once + CVE-2024-26622: (unk) tomoyo: fix UAF write bug in tomoyo_write_control() + CVE-2024-26623: (unk) pds_core: Prevent race issues involving the adminq + CVE-2024-26625: (unk) llc: call sock_orphan() at release time + CVE-2024-26627: (unk) scsi: core: Move scsi_host_busy() out of host lock for waking up EH handler + CVE-2024-26633: (unk) ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim() + CVE-2024-26635: (unk) llc: Drop support for ETH_P_TR_802_2. + CVE-2024-26636: (unk) llc: make llc_ui_sendmsg() more robust against bonding changes + CVE-2024-26641: (unk) ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv() + CVE-2024-26642: (unk) netfilter: nf_tables: disallow anonymous set with timeout flag + CVE-2024-26644: (unk) btrfs: don't abort filesystem when attempting to snapshot deleted subvolume + CVE-2024-26646: (unk) thermal: intel: hfi: Add syscore callbacks for system-wide PM + CVE-2024-26647: (unk) drm/amd/display: Fix late derefrence 'dsc' check in 'link_set_dsc_pps_packet()' + CVE-2024-26648: (unk) drm/amd/display: Fix variable deferencing before NULL check in edp_setup_replay() + CVE-2024-26650: (unk) platform/x86: p2sb: Allow p2sb_bar() calls during PCI device probe + CVE-2024-26651: (unk) sr9800: Add check for usbnet_get_endpoints + CVE-2024-26654: (unk) ALSA: sh: aica: reorder cleanup operations to avoid UAF bugs + CVE-2024-26655: (unk) Fix memory leak in posix_clock_open() + CVE-2024-26656: (unk) drm/amdgpu: fix use-after-free bug + CVE-2024-26658: (unk) bcachefs: grab s_umount only if snapshotting + CVE-2024-26659: (unk) xhci: handle isoc Babble and Buffer Overrun events properly + CVE-2024-26663: (unk) tipc: Check the bearer type before calling tipc_udp_nl_bearer_add() + CVE-2024-26664: (unk) hwmon: (coretemp) Fix out-of-bounds memory access + CVE-2024-26668: (unk) netfilter: nft_limit: reject configurations that cause integer overflow + CVE-2024-26671: (unk) blk-mq: fix IO hang from sbitmap wakeup race + CVE-2024-26672: (unk) drm/amdgpu: Fix variable 'mca_funcs' dereferenced before NULL check in 'amdgpu_mca_smu_get_mca_entry()' + CVE-2024-26675: (unk) ppp_async: limit MRU to 64K + CVE-2024-26676: (unk) af_unix: Call kfree_skb() for dead unix_(sk)->oob_skb in GC. + CVE-2024-26677: (unk) rxrpc: Fix delayed ACKs to not set the reference serial number + CVE-2024-26679: (unk) inet: read sk->sk_family once in inet_recv_error() + CVE-2024-26685: (unk) nilfs2: fix potential bug in end_buffer_async_write + CVE-2024-26686: (unk) fs/proc: do_task_stat: use sig->stats_lock to gather the threads/children stats + CVE-2024-26687: (unk) xen/events: close evtchn after mapping cleanup + CVE-2024-26689: (unk) ceph: prevent use-after-free in encode_cap_msg() + CVE-2024-26691: (unk) KVM: arm64: Fix circular locking dependency + CVE-2024-26696: (unk) nilfs2: fix hang in nilfs_lookup_dirty_data_buffers() + CVE-2024-26697: (unk) nilfs2: fix data corruption in dsync block recovery for small block sizes + CVE-2024-26699: (unk) drm/amd/display: Fix array-index-out-of-bounds in dcn35_clkmgr + CVE-2024-26700: (unk) drm/amd/display: Fix MST Null Ptr for RV + CVE-2024-26704: (unk) ext4: fix double-free of blocks due to wrong extents moved_len + CVE-2024-26706: (unk) parisc: Fix random data corruption from exception handler + CVE-2024-26713: (unk) powerpc/pseries/iommu: Fix iommu initialisation during DLPAR add + CVE-2024-26715: (unk) usb: dwc3: gadget: Fix NULL pointer dereference in dwc3_gadget_suspend + CVE-2024-26719: (unk) nouveau: offload fence uevents work to workqueue + CVE-2024-26720: (unk) mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again + CVE-2024-26726: (unk) btrfs: don't drop extent_map for free space inode on write error + CVE-2024-26733: (unk) arp: Prevent overflow in arp_req_get(). + CVE-2024-26735: (unk) ipv6: sr: fix possible use-after-free and null-ptr-deref + CVE-2024-26736: (unk) afs: Increase buffer size in afs_update_volume_status() + CVE-2024-26738: (unk) powerpc/pseries/iommu: DLPAR add doesn't completely initialize pci_controller + CVE-2024-26739: (unk) net/sched: act_mirred: don't override retval if we already lost the skb + CVE-2024-26740: (unk) net/sched: act_mirred: use the backlog for mirred ingress + CVE-2024-26743: (unk) RDMA/qedr: Fix qedr_create_user_qp error flow + CVE-2024-26744: (unk) RDMA/srpt: Support specifying the srpt_service_guid parameter + CVE-2024-26745: (unk) powerpc/pseries/iommu: IOMMU table is not initialized for kdump over SR-IOV + CVE-2024-26748: (unk) usb: cdns3: fix memory double free when handle zero packet + CVE-2024-26751: (unk) ARM: ep93xx: Add terminator to gpiod_lookup_table + CVE-2024-26752: (unk) l2tp: pass correct message length to ip6_append_data + CVE-2024-26754: (unk) gtp: fix use-after-free and null-ptr-deref in gtp_genl_dump_pdp() + CVE-2024-26756: (unk) md: Don't register sync_thread for reshape directly + CVE-2024-26757: (unk) md: Don't ignore read-only array in md_check_recovery() + CVE-2024-26758: (unk) md: Don't ignore suspended array in md_check_recovery() + CVE-2024-26759: (unk) mm/swap: fix race when skipping swapcache + CVE-2024-26763: (unk) dm-crypt: don't modify the data when using authenticated encryption + CVE-2024-26764: (unk) fs/aio: Restrict kiocb_set_cancel_fn() to I/O submitted via libaio + CVE-2024-26765: (unk) LoongArch: Disable IRQ before init_fn() for nonboot CPUs + CVE-2024-26766: (unk) IB/hfi1: Fix sdma.h tx->num_descs off-by-one error + CVE-2024-26767: (unk) drm/amd/display: fixed integer types and null check locations + CVE-2024-26768: (unk) LoongArch: Change acpi_core_pic[NR_CPUS] to acpi_core_pic[MAX_CORE_PIC] + CVE-2024-26769: (unk) nvmet-fc: avoid deadlock on delete association path + CVE-2024-26770: (unk) HID: nvidia-shield: Add missing null pointer checks to LED initialization + CVE-2024-26771: (unk) dmaengine: ti: edma: Add some null pointer checks to the edma_probe + CVE-2024-26772: (unk) ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal() + CVE-2024-26773: (unk) ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found() + CVE-2024-26774: (unk) ext4: avoid dividing by 0 in mb_update_avg_fragment_size() when block bitmap corrupt + CVE-2024-26775: (unk) aoe: avoid potential deadlock at set_capacity + CVE-2024-26776: (unk) spi: hisi-sfc-v3xx: Return IRQ_NONE if no interrupts were detected + CVE-2024-26777: (unk) fbdev: sis: Error out if pixclock equals zero + CVE-2024-26778: (unk) fbdev: savage: Error out if pixclock equals zero + CVE-2024-26779: (unk) wifi: mac80211: fix race condition on enabling fast-xmit + CVE-2024-26784: (unk) pmdomain: arm: Fix NULL dereference on scmi_perf_domain removal + CVE-2024-26789: (unk) crypto: arm64/neonbs - fix out-of-bounds access on short input + CVE-2024-26791: (unk) btrfs: dev-replace: properly validate device names + CVE-2024-26793: (unk) gtp: fix use-after-free and null-ptr-deref in gtp_newlink() + CVE-2024-26797: (unk) drm/amd/display: Prevent potential buffer overflow in map_hw_resources + CVE-2024-26798: (unk) fbcon: always restore the old font data in fbcon_do_set_font() + CVE-2024-26801: (unk) Bluetooth: Avoid potential use-after-free in hci_error_reset + CVE-2024-26802: (unk) stmmac: Clear variable when destroying workqueue + CVE-2024-26803: (unk) net: veth: clear GRO when clearing XDP even when down + CVE-2024-26804: (unk) net: ip_tunnel: prevent perpetual headroom growth + CVE-2024-26805: (unk) netlink: Fix kernel-infoleak-after-free in __skb_datagram_iter + CVE-2024-26806: (unk) spi: cadence-qspi: remove system-wide suspend helper calls from runtime PM hooks + CVE-2024-26808: (unk) netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain + CVE-2024-26809: (unk) netfilter: nft_set_pipapo: release elements in clone only from destroy path diff --git a/data/4.16/4.16_CVEs.txt b/data/4.16/4.16_CVEs.txt index 1a63db048..db7e518d8 100644 --- a/data/4.16/4.16_CVEs.txt +++ b/data/4.16/4.16_CVEs.txt @@ -341,6 +341,8 @@ CVE-2019-2101: Fix not seen in stream CVE-2019-2181: Fix not seen in stream CVE-2019-2213: Fix not seen in stream CVE-2019-25045: Fix not seen in stream +CVE-2019-25160: Fix not seen in stream +CVE-2019-25162: Fix not seen in stream CVE-2019-3016: Fix not seen in stream CVE-2019-3459: Fix not seen in stream CVE-2019-3460: Fix not seen in stream @@ -533,6 +535,13 @@ CVE-2020-36558: Fix not seen in stream CVE-2020-36691: Fix not seen in stream CVE-2020-36694: Fix not seen in stream CVE-2020-36766: Fix not seen in stream +CVE-2020-36775: Fix not seen in stream +CVE-2020-36777: Fix not seen in stream +CVE-2020-36780: Fix not seen in stream +CVE-2020-36781: Fix not seen in stream +CVE-2020-36782: Fix not seen in stream +CVE-2020-36783: Fix not seen in stream +CVE-2020-36784: Fix not seen in stream CVE-2020-3702: Fix not seen in stream CVE-2020-4788: Fix not seen in stream CVE-2020-7053: Fix not seen in stream @@ -690,6 +699,114 @@ CVE-2021-45469: Fix not seen in stream CVE-2021-45485: Fix not seen in stream CVE-2021-45486: Fix not seen in stream CVE-2021-45868: Fix not seen in stream +CVE-2021-46904: Fix not seen in stream +CVE-2021-46906: Fix not seen in stream +CVE-2021-46908: Fix not seen in stream +CVE-2021-46909: Fix not seen in stream +CVE-2021-46915: Fix not seen in stream +CVE-2021-46921: Fix not seen in stream +CVE-2021-46924: Fix not seen in stream +CVE-2021-46925: Fix not seen in stream +CVE-2021-46926: Fix not seen in stream +CVE-2021-46928: Fix not seen in stream +CVE-2021-46929: Fix not seen in stream +CVE-2021-46932: Fix not seen in stream +CVE-2021-46933: Fix not seen in stream +CVE-2021-46934: Fix not seen in stream +CVE-2021-46935: Fix not seen in stream +CVE-2021-46936: Fix not seen in stream +CVE-2021-46938: Fix not seen in stream +CVE-2021-46939: Fix not seen in stream +CVE-2021-46941: Fix not seen in stream +CVE-2021-46950: Fix not seen in stream +CVE-2021-46951: Fix not seen in stream +CVE-2021-46952: Fix not seen in stream +CVE-2021-46953: Fix not seen in stream +CVE-2021-46955: Fix not seen in stream +CVE-2021-46959: Fix not seen in stream +CVE-2021-46960: Fix not seen in stream +CVE-2021-46962: Fix not seen in stream +CVE-2021-46965: Fix not seen in stream +CVE-2021-46969: Fix not seen in stream +CVE-2021-46970: Fix not seen in stream +CVE-2021-46982: Fix not seen in stream +CVE-2021-46988: Fix not seen in stream +CVE-2021-46991: Fix not seen in stream +CVE-2021-46992: Fix not seen in stream +CVE-2021-46998: Fix not seen in stream +CVE-2021-47006: Fix not seen in stream +CVE-2021-47010: Fix not seen in stream +CVE-2021-47013: Fix not seen in stream +CVE-2021-47028: Fix not seen in stream +CVE-2021-47046: Fix not seen in stream +CVE-2021-47049: Fix not seen in stream +CVE-2021-47052: Fix not seen in stream +CVE-2021-47054: Fix not seen in stream +CVE-2021-47056: Fix not seen in stream +CVE-2021-47059: Fix not seen in stream +CVE-2021-47063: Fix not seen in stream +CVE-2021-47065: Fix not seen in stream +CVE-2021-47070: Fix not seen in stream +CVE-2021-47073: Fix not seen in stream +CVE-2021-47074: Fix not seen in stream +CVE-2021-47075: Fix not seen in stream +CVE-2021-47076: Fix not seen in stream +CVE-2021-47077: Fix not seen in stream +CVE-2021-47078: Fix not seen in stream +CVE-2021-47082: Fix not seen in stream +CVE-2021-47083: Fix not seen in stream +CVE-2021-47086: Fix not seen in stream +CVE-2021-47100: Fix not seen in stream +CVE-2021-47101: Fix not seen in stream +CVE-2021-47103: Fix not seen in stream +CVE-2021-47110: Fix not seen in stream +CVE-2021-47112: Fix not seen in stream +CVE-2021-47113: Fix not seen in stream +CVE-2021-47114: Fix not seen in stream +CVE-2021-47116: Fix not seen in stream +CVE-2021-47117: Fix not seen in stream +CVE-2021-47118: Fix not seen in stream +CVE-2021-47119: Fix not seen in stream +CVE-2021-47121: Fix not seen in stream +CVE-2021-47122: Fix not seen in stream +CVE-2021-47124: Fix not seen in stream +CVE-2021-47125: Fix not seen in stream +CVE-2021-47128: Fix not seen in stream +CVE-2021-47131: Fix not seen in stream +CVE-2021-47133: Fix not seen in stream +CVE-2021-47135: Fix not seen in stream +CVE-2021-47136: Fix not seen in stream +CVE-2021-47137: Fix not seen in stream +CVE-2021-47140: Fix not seen in stream +CVE-2021-47142: Fix not seen in stream +CVE-2021-47143: Fix not seen in stream +CVE-2021-47144: Fix not seen in stream +CVE-2021-47145: Fix not seen in stream +CVE-2021-47146: Fix not seen in stream +CVE-2021-47147: Fix not seen in stream +CVE-2021-47149: Fix not seen in stream +CVE-2021-47150: Fix not seen in stream +CVE-2021-47151: Fix not seen in stream +CVE-2021-47153: Fix not seen in stream +CVE-2021-47158: Fix not seen in stream +CVE-2021-47159: Fix not seen in stream +CVE-2021-47160: Fix not seen in stream +CVE-2021-47161: Fix not seen in stream +CVE-2021-47162: Fix not seen in stream +CVE-2021-47163: Fix not seen in stream +CVE-2021-47165: Fix not seen in stream +CVE-2021-47166: Fix not seen in stream +CVE-2021-47167: Fix not seen in stream +CVE-2021-47168: Fix not seen in stream +CVE-2021-47169: Fix not seen in stream +CVE-2021-47170: Fix not seen in stream +CVE-2021-47171: Fix not seen in stream +CVE-2021-47172: Fix not seen in stream +CVE-2021-47173: Fix not seen in stream +CVE-2021-47175: Fix not seen in stream +CVE-2021-47177: Fix not seen in stream +CVE-2021-47179: Fix not seen in stream +CVE-2021-47180: Fix not seen in stream CVE-2022-0001: Fix not seen in stream CVE-2022-0002: Fix not seen in stream CVE-2022-0168: Fix not seen in stream @@ -883,6 +1000,9 @@ CVE-2022-4744: Fix not seen in stream CVE-2022-47520: Fix not seen in stream CVE-2022-47929: Fix not seen in stream CVE-2022-48619: Fix not seen in stream +CVE-2022-48626: Fix not seen in stream +CVE-2022-48627: Fix not seen in stream +CVE-2022-48628: Fix not seen in stream CVE-2023-0030: Fix not seen in stream CVE-2023-0047: Fix not seen in stream CVE-2023-0266: Fix not seen in stream @@ -944,6 +1064,7 @@ CVE-2023-26607: Fix not seen in stream CVE-2023-28328: Fix not seen in stream CVE-2023-28466: Fix not seen in stream CVE-2023-2860: Fix not seen in stream +CVE-2023-28746: Fix not seen in stream CVE-2023-28772: Fix not seen in stream CVE-2023-2985: Fix not seen in stream CVE-2023-3006: Fix not seen in stream @@ -1014,7 +1135,7 @@ CVE-2023-4622: Fix not seen in stream CVE-2023-4623: Fix not seen in stream CVE-2023-46343: Fix not seen in stream CVE-2023-46838: Fix not seen in stream -CVE-2023-47233: Fix unknown +CVE-2023-47233: Fix not seen in stream CVE-2023-4881: Fix not seen in stream CVE-2023-4921: Fix not seen in stream CVE-2023-51042: Fix not seen in stream @@ -1035,25 +1156,117 @@ CVE-2023-52444: Fix not seen in stream CVE-2023-52445: Fix not seen in stream CVE-2023-52449: Fix not seen in stream CVE-2023-52451: Fix not seen in stream -CVE-2023-52456: Fix not seen in stream -CVE-2023-52457: Fix not seen in stream CVE-2023-52458: Fix not seen in stream CVE-2023-52464: Fix not seen in stream +CVE-2023-52469: Fix not seen in stream +CVE-2023-52470: Fix not seen in stream +CVE-2023-52474: Fix not seen in stream +CVE-2023-52475: Fix not seen in stream +CVE-2023-52476: Fix not seen in stream +CVE-2023-52477: Fix not seen in stream +CVE-2023-52478: Fix not seen in stream +CVE-2023-52479: Fix not seen in stream +CVE-2023-52480: Fix not seen in stream +CVE-2023-52481: Fix not seen in stream +CVE-2023-52482: Fix not seen in stream +CVE-2023-52484: Fix not seen in stream +CVE-2023-52485: Fix not seen in stream +CVE-2023-52486: Fix not seen in stream +CVE-2023-52488: Fix not seen in stream +CVE-2023-52489: Fix not seen in stream +CVE-2023-52491: Fix not seen in stream +CVE-2023-52498: Fix not seen in stream +CVE-2023-52500: Fix not seen in stream +CVE-2023-52501: Fix not seen in stream +CVE-2023-52502: Fix not seen in stream +CVE-2023-52506: Fix not seen in stream +CVE-2023-52507: Fix not seen in stream +CVE-2023-52508: Fix not seen in stream +CVE-2023-52509: Fix not seen in stream +CVE-2023-52510: Fix not seen in stream +CVE-2023-52511: Fix not seen in stream +CVE-2023-52515: Fix not seen in stream +CVE-2023-52516: Fix not seen in stream +CVE-2023-52517: Fix not seen in stream +CVE-2023-52519: Fix not seen in stream +CVE-2023-52522: Fix not seen in stream +CVE-2023-52527: Fix not seen in stream +CVE-2023-52528: Fix not seen in stream +CVE-2023-52530: Fix not seen in stream +CVE-2023-52531: Fix not seen in stream +CVE-2023-52532: Fix not seen in stream +CVE-2023-52559: Fix not seen in stream +CVE-2023-52561: Fix not seen in stream +CVE-2023-52563: Fix not seen in stream +CVE-2023-52565: Fix not seen in stream +CVE-2023-52566: Fix not seen in stream +CVE-2023-52568: Fix not seen in stream +CVE-2023-52569: Fix not seen in stream +CVE-2023-52571: Fix not seen in stream +CVE-2023-52572: Fix not seen in stream +CVE-2023-52574: Fix not seen in stream +CVE-2023-52578: Fix not seen in stream +CVE-2023-52583: Fix not seen in stream +CVE-2023-52584: Fix not seen in stream +CVE-2023-52585: Fix not seen in stream +CVE-2023-52586: Fix not seen in stream +CVE-2023-52587: Fix not seen in stream +CVE-2023-52588: Fix not seen in stream +CVE-2023-52589: Fix not seen in stream +CVE-2023-52590: Fix not seen in stream +CVE-2023-52591: Fix not seen in stream +CVE-2023-52593: Fix not seen in stream +CVE-2023-52594: Fix not seen in stream +CVE-2023-52595: Fix not seen in stream +CVE-2023-52596: Fix not seen in stream +CVE-2023-52597: Fix not seen in stream +CVE-2023-52598: Fix not seen in stream +CVE-2023-52599: Fix not seen in stream +CVE-2023-52600: Fix not seen in stream +CVE-2023-52601: Fix not seen in stream +CVE-2023-52602: Fix not seen in stream +CVE-2023-52603: Fix not seen in stream +CVE-2023-52604: Fix not seen in stream +CVE-2023-52606: Fix not seen in stream +CVE-2023-52607: Fix not seen in stream +CVE-2023-52609: Fix not seen in stream +CVE-2023-52612: Fix not seen in stream +CVE-2023-52614: Fix not seen in stream +CVE-2023-52615: Fix not seen in stream +CVE-2023-52617: Fix not seen in stream +CVE-2023-52618: Fix not seen in stream +CVE-2023-52619: Fix not seen in stream +CVE-2023-52620: Fix not seen in stream +CVE-2023-52621: Fix not seen in stream +CVE-2023-52622: Fix not seen in stream +CVE-2023-52623: Fix not seen in stream +CVE-2023-52624: Fix not seen in stream +CVE-2023-52625: Fix not seen in stream +CVE-2023-52628: Fix not seen in stream +CVE-2023-52629: Fix not seen in stream +CVE-2023-52632: Fix not seen in stream +CVE-2023-52633: Fix not seen in stream +CVE-2023-52634: Fix not seen in stream +CVE-2023-52635: Fix not seen in stream +CVE-2023-52638: Fix not seen in stream +CVE-2023-52639: Fix not seen in stream +CVE-2023-52640: Fix not seen in stream +CVE-2023-52641: Fix not seen in stream CVE-2023-5717: Fix not seen in stream CVE-2023-6040: Fix not seen in stream CVE-2023-6121: Fix not seen in stream CVE-2023-6240: Fix unknown -CVE-2023-6270: Fix unknown -CVE-2023-6356: Fix unknown +CVE-2023-6270: Fix not seen in stream +CVE-2023-6356: Fix not seen in stream CVE-2023-6535: Fix unknown -CVE-2023-6536: Fix unknown +CVE-2023-6536: Fix not seen in stream CVE-2023-6546: Fix not seen in stream CVE-2023-6606: Fix not seen in stream CVE-2023-6610: Fix not seen in stream CVE-2023-6915: Fix not seen in stream CVE-2023-6931: Fix not seen in stream CVE-2023-6932: Fix not seen in stream -CVE-2023-7042: Fix unknown +CVE-2023-7042: Fix not seen in stream CVE-2023-7192: Fix not seen in stream CVE-2024-0340: Fix not seen in stream CVE-2024-0564: Fix unknown @@ -1064,10 +1277,11 @@ CVE-2024-1086: Fix not seen in stream CVE-2024-1151: Fix not seen in stream CVE-2024-1312: Fix not seen in stream CVE-2024-21803: Fix unknown -CVE-2024-22099: Fix unknown +CVE-2024-2193: Fix unknown +CVE-2024-22099: Fix not seen in stream CVE-2024-22386: Fix unknown -CVE-2024-23196: Fix unknown -CVE-2024-23307: Fix unknown +CVE-2024-23196: Fix not seen in stream +CVE-2024-23307: Fix not seen in stream CVE-2024-23848: Fix unknown CVE-2024-23849: Fix not seen in stream CVE-2024-23851: Fix not seen in stream @@ -1076,17 +1290,111 @@ CVE-2024-24857: Fix unknown CVE-2024-24858: Fix unknown CVE-2024-24859: Fix unknown CVE-2024-24860: Fix not seen in stream -CVE-2024-24861: Fix unknown +CVE-2024-24861: Fix not seen in stream CVE-2024-24864: Fix unknown CVE-2024-25739: Fix unknown CVE-2024-25740: Fix unknown CVE-2024-25741: Fix unknown CVE-2024-25744: Fix not seen in stream CVE-2024-26584: Fix not seen in stream -CVE-2024-26587: Fix not seen in stream -CVE-2024-26588: Fix not seen in stream -CVE-2024-26591: Fix not seen in stream CVE-2024-26592: Fix not seen in stream CVE-2024-26594: Fix not seen in stream CVE-2024-26595: Fix not seen in stream CVE-2024-26598: Fix not seen in stream +CVE-2024-26600: Fix not seen in stream +CVE-2024-26602: Fix not seen in stream +CVE-2024-26606: Fix not seen in stream +CVE-2024-26614: Fix not seen in stream +CVE-2024-26622: Fix not seen in stream +CVE-2024-26623: Fix not seen in stream +CVE-2024-26625: Fix not seen in stream +CVE-2024-26627: Fix not seen in stream +CVE-2024-26633: Fix not seen in stream +CVE-2024-26635: Fix not seen in stream +CVE-2024-26636: Fix not seen in stream +CVE-2024-26641: Fix not seen in stream +CVE-2024-26642: Fix not seen in stream +CVE-2024-26644: Fix not seen in stream +CVE-2024-26646: Fix not seen in stream +CVE-2024-26647: Fix not seen in stream +CVE-2024-26648: Fix not seen in stream +CVE-2024-26650: Fix not seen in stream +CVE-2024-26651: Fix not seen in stream +CVE-2024-26654: Fix not seen in stream +CVE-2024-26655: Fix not seen in stream +CVE-2024-26656: Fix not seen in stream +CVE-2024-26658: Fix not seen in stream +CVE-2024-26659: Fix not seen in stream +CVE-2024-26663: Fix not seen in stream +CVE-2024-26664: Fix not seen in stream +CVE-2024-26668: Fix not seen in stream +CVE-2024-26671: Fix not seen in stream +CVE-2024-26672: Fix not seen in stream +CVE-2024-26675: Fix not seen in stream +CVE-2024-26676: Fix not seen in stream +CVE-2024-26677: Fix not seen in stream +CVE-2024-26679: Fix not seen in stream +CVE-2024-26685: Fix not seen in stream +CVE-2024-26686: Fix not seen in stream +CVE-2024-26687: Fix not seen in stream +CVE-2024-26689: Fix not seen in stream +CVE-2024-26691: Fix not seen in stream +CVE-2024-26696: Fix not seen in stream +CVE-2024-26697: Fix not seen in stream +CVE-2024-26699: Fix not seen in stream +CVE-2024-26700: Fix not seen in stream +CVE-2024-26704: Fix not seen in stream +CVE-2024-26706: Fix not seen in stream +CVE-2024-26713: Fix not seen in stream +CVE-2024-26715: Fix not seen in stream +CVE-2024-26719: Fix not seen in stream +CVE-2024-26720: Fix not seen in stream +CVE-2024-26726: Fix not seen in stream +CVE-2024-26733: Fix not seen in stream +CVE-2024-26735: Fix not seen in stream +CVE-2024-26736: Fix not seen in stream +CVE-2024-26738: Fix not seen in stream +CVE-2024-26739: Fix not seen in stream +CVE-2024-26740: Fix not seen in stream +CVE-2024-26743: Fix not seen in stream +CVE-2024-26744: Fix not seen in stream +CVE-2024-26745: Fix not seen in stream +CVE-2024-26748: Fix not seen in stream +CVE-2024-26751: Fix not seen in stream +CVE-2024-26752: Fix not seen in stream +CVE-2024-26754: Fix not seen in stream +CVE-2024-26756: Fix not seen in stream +CVE-2024-26757: Fix not seen in stream +CVE-2024-26758: Fix not seen in stream +CVE-2024-26759: Fix not seen in stream +CVE-2024-26763: Fix not seen in stream +CVE-2024-26764: Fix not seen in stream +CVE-2024-26765: Fix not seen in stream +CVE-2024-26766: Fix not seen in stream +CVE-2024-26767: Fix not seen in stream +CVE-2024-26768: Fix not seen in stream +CVE-2024-26769: Fix not seen in stream +CVE-2024-26770: Fix not seen in stream +CVE-2024-26771: Fix not seen in stream +CVE-2024-26772: Fix not seen in stream +CVE-2024-26773: Fix not seen in stream +CVE-2024-26774: Fix not seen in stream +CVE-2024-26775: Fix not seen in stream +CVE-2024-26776: Fix not seen in stream +CVE-2024-26777: Fix not seen in stream +CVE-2024-26778: Fix not seen in stream +CVE-2024-26779: Fix not seen in stream +CVE-2024-26784: Fix not seen in stream +CVE-2024-26789: Fix not seen in stream +CVE-2024-26791: Fix not seen in stream +CVE-2024-26793: Fix not seen in stream +CVE-2024-26797: Fix not seen in stream +CVE-2024-26798: Fix not seen in stream +CVE-2024-26801: Fix not seen in stream +CVE-2024-26802: Fix not seen in stream +CVE-2024-26803: Fix not seen in stream +CVE-2024-26804: Fix not seen in stream +CVE-2024-26805: Fix not seen in stream +CVE-2024-26806: Fix not seen in stream +CVE-2024-26808: Fix not seen in stream +CVE-2024-26809: Fix not seen in stream diff --git a/data/4.16/4.16_security.txt b/data/4.16/4.16_security.txt index de9a3bfdf..3b81d9174 100644 --- a/data/4.16/4.16_security.txt +++ b/data/4.16/4.16_security.txt @@ -374,6 +374,8 @@ Outstanding CVEs: CVE-2019-2181: (unk) binder: check for overflow when alloc for security context CVE-2019-2213: (unk) binder: fix possible UAF when freeing buffer CVE-2019-25045: (unk) xfrm: clean up xfrm protocol checks + CVE-2019-25160: (unk) netlabel: fix out-of-bounds memory accesses + CVE-2019-25162: (unk) i2c: Fix a potential use after free CVE-2019-3016: (unk) x86/kvm: Be careful not to clear KVM_VCPU_FLUSH_TLB bit CVE-2019-3459: (unk) Bluetooth: Verify that l2cap_get_conf_opt provides large enough buffer CVE-2019-3460: (unk) Bluetooth: Check L2CAP option sizes returned from l2cap_get_conf_opt @@ -565,6 +567,13 @@ Outstanding CVEs: CVE-2020-36691: (unk) netlink: limit recursion depth in policy validation CVE-2020-36694: (unk) netfilter: x_tables: Switch synchronization to RCU CVE-2020-36766: (unk) cec-api: prevent leaking memory through hole in structure + CVE-2020-36775: (unk) f2fs: fix to avoid potential deadlock + CVE-2020-36777: (unk) media: dvbdev: Fix memory leak in dvb_media_device_free() + CVE-2020-36780: (unk) i2c: sprd: fix reference leak when pm_runtime_get_sync fails + CVE-2020-36781: (unk) i2c: imx: fix reference leak when pm_runtime_get_sync fails + CVE-2020-36782: (unk) i2c: imx-lpi2c: fix reference leak when pm_runtime_get_sync fails + CVE-2020-36783: (unk) i2c: img-scb: fix reference leak when pm_runtime_get_sync fails + CVE-2020-36784: (unk) i2c: cadence: fix reference leak when pm_runtime_get_sync fails CVE-2020-3702: (unk) ath: Use safer key clearing with key cache entries CVE-2020-4788: (unk) powerpc/64s: flush L1D on kernel entry CVE-2020-7053: (unk) drm/i915: Introduce a mutex for file_priv->context_idr @@ -722,6 +731,114 @@ Outstanding CVEs: CVE-2021-45485: (unk) ipv6: use prandom_u32() for ID generation CVE-2021-45486: (unk) inet: use bigger hash table for IP ID generation CVE-2021-45868: (unk) quota: check block number when reading the block in quota file + CVE-2021-46904: (unk) net: hso: fix null-ptr-deref during tty device unregistration + CVE-2021-46906: (unk) HID: usbhid: fix info leak in hid_submit_ctrl + CVE-2021-46908: (unk) bpf: Use correct permission flag for mixed signed bounds arithmetic + CVE-2021-46909: (unk) ARM: footbridge: fix PCI interrupt mapping + CVE-2021-46915: (unk) netfilter: nft_limit: avoid possible divide error in nft_limit_init + CVE-2021-46921: (unk) locking/qrwlock: Fix ordering in queued_write_lock_slowpath() + CVE-2021-46924: (unk) NFC: st21nfca: Fix memory leak in device probe and remove + CVE-2021-46925: (unk) net/smc: fix kernel panic caused by race of smc_sock + CVE-2021-46926: (unk) ALSA: hda: intel-sdw-acpi: harden detection of controller + CVE-2021-46928: (unk) parisc: Clear stale IIR value on instruction access rights trap + CVE-2021-46929: (unk) sctp: use call_rcu to free endpoint + CVE-2021-46932: (unk) Input: appletouch - initialize work before device registration + CVE-2021-46933: (unk) usb: gadget: f_fs: Clear ffs_eventfd in ffs_data_clear. + CVE-2021-46934: (unk) i2c: validate user data in compat ioctl + CVE-2021-46935: (unk) binder: fix async_free_space accounting for empty parcels + CVE-2021-46936: (unk) net: fix use-after-free in tw_timer_handler + CVE-2021-46938: (unk) dm rq: fix double free of blk_mq_tag_set in dev remove after table load fails + CVE-2021-46939: (unk) tracing: Restructure trace_clock_global() to never block + CVE-2021-46941: (unk) usb: dwc3: core: Do core softreset when switch mode + CVE-2021-46950: (unk) md/raid1: properly indicate failure when ending a failed write request + CVE-2021-46951: (unk) tpm: efi: Use local variable for calculating final log size + CVE-2021-46952: (unk) NFS: fs_context: validate UDP retrans to prevent shift out-of-bounds + CVE-2021-46953: (unk) ACPI: GTDT: Don't corrupt interrupt mappings on watchdow probe failure + CVE-2021-46955: (unk) openvswitch: fix stack OOB read while fragmenting IPv4 packets + CVE-2021-46959: (unk) spi: Fix use-after-free with devm_spi_alloc_* + CVE-2021-46960: (unk) cifs: Return correct error code from smb2_get_enc_key + CVE-2021-46962: (unk) mmc: uniphier-sd: Fix a resource leak in the remove function + CVE-2021-46965: (unk) mtd: physmap: physmap-bt1-rom: Fix unintentional stack access + CVE-2021-46969: (unk) bus: mhi: core: Fix invalid error returning in mhi_queue + CVE-2021-46970: (unk) bus: mhi: pci_generic: Remove WQ_MEM_RECLAIM flag from state workqueue + CVE-2021-46982: (unk) f2fs: compress: fix race condition of overwrite vs truncate + CVE-2021-46988: (unk) userfaultfd: release page in error path to avoid BUG_ON + CVE-2021-46991: (unk) i40e: Fix use-after-free in i40e_client_subtask() + CVE-2021-46992: (unk) netfilter: nftables: avoid overflows in nft_hash_buckets() + CVE-2021-46998: (unk) ethernet:enic: Fix a use after free bug in enic_hard_start_xmit + CVE-2021-47006: (unk) ARM: 9064/1: hw_breakpoint: Do not directly check the event's overflow_handler hook + CVE-2021-47010: (unk) net: Only allow init netns to set default tcp cong to a restricted algo + CVE-2021-47013: (unk) net:emac/emac-mac: Fix a use after free in emac_mac_tx_buf_send + CVE-2021-47028: (unk) mt76: mt7915: fix txrate reporting + CVE-2021-47046: (unk) drm/amd/display: Fix off by one in hdmi_14_process_transaction() + CVE-2021-47049: (unk) Drivers: hv: vmbus: Use after free in __vmbus_open() + CVE-2021-47052: (unk) crypto: sa2ul - Fix memory leak of rxd + CVE-2021-47054: (unk) bus: qcom: Put child node before return + CVE-2021-47056: (unk) crypto: qat - ADF_STATUS_PF_RUNNING should be set after adf_dev_init + CVE-2021-47059: (unk) crypto: sun8i-ss - fix result memory leak on error path + CVE-2021-47063: (unk) drm: bridge/panel: Cleanup connector on bridge detach + CVE-2021-47065: (unk) rtw88: Fix array overrun in rtw_get_tx_power_params() + CVE-2021-47070: (unk) uio_hv_generic: Fix another memory leak in error handling paths + CVE-2021-47073: (unk) platform/x86: dell-smbios-wmi: Fix oops on rmmod dell_smbios + CVE-2021-47074: (unk) nvme-loop: fix memory leak in nvme_loop_create_ctrl() + CVE-2021-47075: (unk) nvmet: fix memory leak in nvmet_alloc_ctrl() + CVE-2021-47076: (unk) RDMA/rxe: Return CQE error if invalid lkey was supplied + CVE-2021-47077: (unk) scsi: qedf: Add pointer checks in qedf_update_link_speed() + CVE-2021-47078: (unk) RDMA/rxe: Clear all QP fields if creation failed + CVE-2021-47082: (unk) tun: avoid double free in tun_free_netdev + CVE-2021-47083: (unk) pinctrl: mediatek: fix global-out-of-bounds issue + CVE-2021-47086: (unk) phonet/pep: refuse to enable an unbound pipe + CVE-2021-47100: (unk) ipmi: Fix UAF when uninstall ipmi_si and ipmi_msghandler module + CVE-2021-47101: (unk) asix: fix uninit-value in asix_mdio_read() + CVE-2021-47103: (unk) inet: fully convert sk->sk_rx_dst to RCU rules + CVE-2021-47110: (unk) x86/kvm: Disable kvmclock on all CPUs on shutdown + CVE-2021-47112: (unk) x86/kvm: Teardown PV features on boot CPU as well + CVE-2021-47113: (unk) btrfs: abort in rename_exchange if we fail to insert the second ref + CVE-2021-47114: (unk) ocfs2: fix data corruption by fallocate + CVE-2021-47116: (unk) ext4: fix memory leak in ext4_mb_init_backend on error path. + CVE-2021-47117: (unk) ext4: fix bug on in ext4_es_cache_extent as ext4_split_extent_at failed + CVE-2021-47118: (unk) pid: take a reference when initializing `cad_pid` + CVE-2021-47119: (unk) ext4: fix memory leak in ext4_fill_super + CVE-2021-47121: (unk) net: caif: fix memory leak in cfusbl_device_notify + CVE-2021-47122: (unk) net: caif: fix memory leak in caif_device_notify + CVE-2021-47124: (unk) io_uring: fix link timeout refs + CVE-2021-47125: (unk) sch_htb: fix refcount leak in htb_parent_to_leaf_offload + CVE-2021-47128: (unk) bpf, lockdown, audit: Fix buggy SELinux lockdown permission checks + CVE-2021-47131: (unk) net/tls: Fix use-after-free after the TLS device goes down and up + CVE-2021-47133: (unk) HID: amd_sfh: Fix memory leak in amd_sfh_work + CVE-2021-47135: (unk) mt76: mt7921: fix possible AOOB issue in mt7921_mcu_tx_rate_report + CVE-2021-47136: (unk) net: zero-initialize tc skb extension on allocation + CVE-2021-47137: (unk) net: lantiq: fix memory corruption in RX ring + CVE-2021-47140: (unk) iommu/amd: Clear DMA ops when switching domain + CVE-2021-47142: (unk) drm/amdgpu: Fix a use-after-free + CVE-2021-47143: (unk) net/smc: remove device from smcd_dev_list after failed device_add() + CVE-2021-47144: (unk) drm/amd/amdgpu: fix refcount leak + CVE-2021-47145: (unk) btrfs: do not BUG_ON in link_to_fixup_dir + CVE-2021-47146: (unk) mld: fix panic in mld_newpack() + CVE-2021-47147: (unk) ptp: ocp: Fix a resource leak in an error handling path + CVE-2021-47149: (unk) net: fujitsu: fix potential null-ptr-deref + CVE-2021-47150: (unk) net: fec: fix the potential memory leak in fec_enet_init() + CVE-2021-47151: (unk) interconnect: qcom: bcm-voter: add a missing of_node_put() + CVE-2021-47153: (unk) i2c: i801: Don't generate an interrupt on bus reset + CVE-2021-47158: (unk) net: dsa: sja1105: add error handling in sja1105_setup() + CVE-2021-47159: (unk) net: dsa: fix a crash if ->get_sset_count() fails + CVE-2021-47160: (unk) net: dsa: mt7530: fix VLAN traffic leaks + CVE-2021-47161: (unk) spi: spi-fsl-dspi: Fix a resource leak in an error handling path + CVE-2021-47162: (unk) tipc: skb_linearize the head skb when reassembling msgs + CVE-2021-47163: (unk) tipc: wait and exit until all work queues are done + CVE-2021-47165: (unk) drm/meson: fix shutdown crash when component not probed + CVE-2021-47166: (unk) NFS: Don't corrupt the value of pg_bytes_written in nfs_do_recoalesce() + CVE-2021-47167: (unk) NFS: Fix an Oopsable condition in __nfs_pageio_add_request() + CVE-2021-47168: (unk) NFS: fix an incorrect limit in filelayout_decode_layout() + CVE-2021-47169: (unk) serial: rp2: use 'request_firmware' instead of 'request_firmware_nowait' + CVE-2021-47170: (unk) USB: usbfs: Don't WARN about excessively large memory allocations + CVE-2021-47171: (unk) net: usb: fix memory leak in smsc75xx_bind + CVE-2021-47172: (unk) iio: adc: ad7124: Fix potential overflow due to non sequential channel numbers + CVE-2021-47173: (unk) misc/uss720: fix memory leak in uss720_probe + CVE-2021-47175: (unk) net/sched: fq_pie: fix OOB access in the traffic path + CVE-2021-47177: (unk) iommu/vt-d: Fix sysfs leak in alloc_iommu() + CVE-2021-47179: (unk) NFSv4: Fix a NULL pointer dereference in pnfs_mark_matching_lsegs_return() + CVE-2021-47180: (unk) NFC: nci: fix memory leak in nci_allocate_device CVE-2022-0001: (unk) x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE CVE-2022-0002: (unk) x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE CVE-2022-0168: (unk) cifs: fix NULL ptr dereference in smb2_ioctl_query_info() @@ -915,6 +1032,9 @@ Outstanding CVEs: CVE-2022-47520: (unk) wifi: wilc1000: validate pairwise and authentication suite offsets CVE-2022-47929: (unk) net: sched: disallow noqueue for qdisc classes CVE-2022-48619: (unk) Input: add bounds checking to input_set_capability() + CVE-2022-48626: (unk) moxart: fix potential use-after-free on remove path + CVE-2022-48627: (unk) vt: fix memory overlapping when deleting chars in the buffer + CVE-2022-48628: (unk) ceph: drop messages from MDS when unmounting CVE-2023-0030: (unk) drm/nouveau/mmu: add more general vmm free/node handling functions CVE-2023-0047: (unk) mm, oom: do not trigger out_of_memory from the #PF CVE-2023-0266: (unk) ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF @@ -976,6 +1096,7 @@ Outstanding CVEs: CVE-2023-28328: (unk) media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer() CVE-2023-28466: (unk) net: tls: fix possible race condition between do_tls_getsockopt_conf() and do_tls_setsockopt_conf() CVE-2023-2860: (unk) ipv6: sr: fix out-of-bounds read when setting HMAC data. + CVE-2023-28746: (unk) x86/mmio: Disable KVM mitigation when X86_FEATURE_CLEAR_CPU_BUF is set CVE-2023-28772: (unk) seq_buf: Fix overflow in seq_buf_putmem_hex() CVE-2023-2985: (unk) fs: hfsplus: fix UAF issue in hfsplus_put_super CVE-2023-3006: (unk) arm64: Add AMPERE1 to the Spectre-BHB affected list @@ -1046,7 +1167,7 @@ Outstanding CVEs: CVE-2023-4623: (unk) net/sched: sch_hfsc: Ensure inner classes have fsc curve CVE-2023-46343: (unk) nfc: nci: fix possible NULL pointer dereference in send_acknowledge() CVE-2023-46838: (unk) xen-netback: don't produce zero-size SKB frags - CVE-2023-47233: (unk) + CVE-2023-47233: (unk) wifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach CVE-2023-4881: (unk) netfilter: nftables: exthdr: fix 4-byte stack OOB write CVE-2023-4921: (unk) net: sched: sch_qfq: Fix UAF in qfq_dequeue() CVE-2023-51042: (unk) drm/amdgpu: Fix potential fence use-after-free v2 @@ -1067,25 +1188,117 @@ Outstanding CVEs: CVE-2023-52445: (unk) media: pvrusb2: fix use after free on context disconnection CVE-2023-52449: (unk) mtd: Fix gluebi NULL pointer dereference caused by ftl notifier CVE-2023-52451: (unk) powerpc/pseries/memhp: Fix access beyond end of drmem array - CVE-2023-52456: (unk) serial: imx: fix tx statemachine deadlock - CVE-2023-52457: (unk) serial: 8250: omap: Don't skip resource freeing if pm_runtime_resume_and_get() failed CVE-2023-52458: (unk) block: add check that partition length needs to be aligned with block size CVE-2023-52464: (unk) EDAC/thunderx: Fix possible out-of-bounds string access + CVE-2023-52469: (unk) drivers/amd/pm: fix a use-after-free in kv_parse_power_table + CVE-2023-52470: (unk) drm/radeon: check the alloc_workqueue return value in radeon_crtc_init() + CVE-2023-52474: (unk) IB/hfi1: Fix bugs with non-PAGE_SIZE-end multi-iovec user SDMA requests + CVE-2023-52475: (unk) Input: powermate - fix use-after-free in powermate_config_complete + CVE-2023-52476: (unk) perf/x86/lbr: Filter vsyscall addresses + CVE-2023-52477: (unk) usb: hub: Guard against accesses to uninitialized BOS descriptors + CVE-2023-52478: (unk) HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect + CVE-2023-52479: (unk) ksmbd: fix uaf in smb20_oplock_break_ack + CVE-2023-52480: (unk) ksmbd: fix race condition between session lookup and expire + CVE-2023-52481: (unk) arm64: errata: Add Cortex-A520 speculative unprivileged load workaround + CVE-2023-52482: (unk) x86/srso: Add SRSO mitigation for Hygon processors + CVE-2023-52484: (unk) iommu/arm-smmu-v3: Fix soft lockup triggered by arm_smmu_mm_invalidate_range + CVE-2023-52485: (unk) drm/amd/display: Wake DMCUB before sending a command + CVE-2023-52486: (unk) drm: Don't unref the same fb many times by mistake due to deadlock handling + CVE-2023-52488: (unk) serial: sc16is7xx: convert from _raw_ to _noinc_ regmap functions for FIFO + CVE-2023-52489: (unk) mm/sparsemem: fix race in accessing memory_section->usage + CVE-2023-52491: (unk) media: mtk-jpeg: Fix use after free bug due to error path handling in mtk_jpeg_dec_device_run + CVE-2023-52498: (unk) PM: sleep: Fix possible deadlocks in core system-wide PM code + CVE-2023-52500: (unk) scsi: pm80xx: Avoid leaking tags when processing OPC_INB_SET_CONTROLLER_CONFIG command + CVE-2023-52501: (unk) ring-buffer: Do not attempt to read past "commit" + CVE-2023-52502: (unk) net: nfc: fix races in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn() + CVE-2023-52506: (unk) LoongArch: Set all reserved memblocks on Node#0 at initialization + CVE-2023-52507: (unk) nfc: nci: assert requested protocol is valid + CVE-2023-52508: (unk) nvme-fc: Prevent null pointer dereference in nvme_fc_io_getuuid() + CVE-2023-52509: (unk) ravb: Fix use-after-free issue in ravb_tx_timeout_work() + CVE-2023-52510: (unk) ieee802154: ca8210: Fix a potential UAF in ca8210_probe + CVE-2023-52511: (unk) spi: sun6i: reduce DMA RX transfer width to single byte + CVE-2023-52515: (unk) RDMA/srp: Do not call scsi_done() from srp_abort() + CVE-2023-52516: (unk) dma-debug: don't call __dma_entry_alloc_check_leak() under free_entries_lock + CVE-2023-52517: (unk) spi: sun6i: fix race between DMA RX transfer completion and RX FIFO drain + CVE-2023-52519: (unk) HID: intel-ish-hid: ipc: Disable and reenable ACPI GPE bit + CVE-2023-52522: (unk) net: fix possible store tearing in neigh_periodic_work() + CVE-2023-52527: (unk) ipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data() + CVE-2023-52528: (unk) net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg + CVE-2023-52530: (unk) wifi: mac80211: fix potential key use-after-free + CVE-2023-52531: (unk) wifi: iwlwifi: mvm: Fix a memory corruption issue + CVE-2023-52532: (unk) net: mana: Fix TX CQE error handling + CVE-2023-52559: (unk) iommu/vt-d: Avoid memory allocation in iommu_suspend() + CVE-2023-52561: (unk) arm64: dts: qcom: sdm845-db845c: Mark cont splash memory region as reserved + CVE-2023-52563: (unk) drm/meson: fix memory leak on ->hpd_notify callback + CVE-2023-52565: (unk) media: uvcvideo: Fix OOB read + CVE-2023-52566: (unk) nilfs2: fix potential use after free in nilfs_gccache_submit_read_data() + CVE-2023-52568: (unk) x86/sgx: Resolves SECS reclaim vs. page fault for EAUG race + CVE-2023-52569: (unk) btrfs: remove BUG() after failure to insert delayed dir index item + CVE-2023-52571: (unk) power: supply: rk817: Fix node refcount leak + CVE-2023-52572: (unk) cifs: Fix UAF in cifs_demultiplex_thread() + CVE-2023-52574: (unk) team: fix null-ptr-deref when team device type is changed + CVE-2023-52578: (unk) net: bridge: use DEV_STATS_INC() + CVE-2023-52583: (unk) ceph: fix deadlock or deadcode of misusing dget() + CVE-2023-52584: (unk) spmi: mediatek: Fix UAF on device remove + CVE-2023-52585: (unk) drm/amdgpu: Fix possible NULL dereference in amdgpu_ras_query_error_status_helper() + CVE-2023-52586: (unk) drm/msm/dpu: Add mutex lock in control vblank irq + CVE-2023-52587: (unk) IB/ipoib: Fix mcast list locking + CVE-2023-52588: (unk) f2fs: fix to tag gcing flag on page during block migration + CVE-2023-52589: (unk) media: rkisp1: Fix IRQ disable race issue + CVE-2023-52590: (unk) ocfs2: Avoid touching renamed directory if parent does not change + CVE-2023-52591: (unk) reiserfs: Avoid touching renamed directory if parent does not change + CVE-2023-52593: (unk) wifi: wfx: fix possible NULL pointer dereference in wfx_set_mfp_ap() + CVE-2023-52594: (unk) wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus() + CVE-2023-52595: (unk) wifi: rt2x00: restart beacon queue when hardware reset + CVE-2023-52596: (unk) sysctl: Fix out of bounds access for empty sysctl registers + CVE-2023-52597: (unk) KVM: s390: fix setting of fpc register + CVE-2023-52598: (unk) s390/ptrace: handle setting of fpc register correctly + CVE-2023-52599: (unk) jfs: fix array-index-out-of-bounds in diNewExt + CVE-2023-52600: (unk) jfs: fix uaf in jfs_evict_inode + CVE-2023-52601: (unk) jfs: fix array-index-out-of-bounds in dbAdjTree + CVE-2023-52602: (unk) jfs: fix slab-out-of-bounds Read in dtSearch + CVE-2023-52603: (unk) UBSAN: array-index-out-of-bounds in dtSplitRoot + CVE-2023-52604: (unk) FS:JFS:UBSAN:array-index-out-of-bounds in dbAdjTree + CVE-2023-52606: (unk) powerpc/lib: Validate size for vector operations + CVE-2023-52607: (unk) powerpc/mm: Fix null-pointer dereference in pgtable_cache_add + CVE-2023-52609: (unk) binder: fix race between mmput() and do_exit() + CVE-2023-52612: (unk) crypto: scomp - fix req->dst buffer overflow + CVE-2023-52614: (unk) PM / devfreq: Fix buffer overflow in trans_stat_show + CVE-2023-52615: (unk) hwrng: core - Fix page fault dead lock on mmap-ed hwrng + CVE-2023-52617: (unk) PCI: switchtec: Fix stdev_release() crash after surprise hot remove + CVE-2023-52618: (unk) block/rnbd-srv: Check for unlikely string overflow + CVE-2023-52619: (unk) pstore/ram: Fix crash when setting number of cpus to an odd number + CVE-2023-52620: (unk) netfilter: nf_tables: disallow timeout for anonymous sets + CVE-2023-52621: (unk) bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers + CVE-2023-52622: (unk) ext4: avoid online resizing failures due to oversized flex bg + CVE-2023-52623: (unk) SUNRPC: Fix a suspicious RCU usage warning + CVE-2023-52624: (unk) drm/amd/display: Wake DMCUB before executing GPINT commands + CVE-2023-52625: (unk) drm/amd/display: Refactor DMCUB enter/exit idle interface + CVE-2023-52628: (unk) netfilter: nftables: exthdr: fix 4-byte stack OOB write + CVE-2023-52629: (unk) sh: push-switch: Reorder cleanup operations to avoid use-after-free bug + CVE-2023-52632: (unk) drm/amdkfd: Fix lock dependency warning with srcu + CVE-2023-52633: (unk) um: time-travel: fix time corruption + CVE-2023-52634: (unk) drm/amd/display: Fix disable_otg_wa logic + CVE-2023-52635: (unk) PM / devfreq: Synchronize devfreq_monitor_[start/stop] + CVE-2023-52638: (unk) can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock + CVE-2023-52639: (unk) KVM: s390: vsie: fix race during shadow creation + CVE-2023-52640: (unk) fs/ntfs3: Fix oob in ntfs_listxattr + CVE-2023-52641: (unk) fs/ntfs3: Add NULL ptr dereference checking at the end of attr_allocate_frame() CVE-2023-5717: (unk) perf: Disallow mis-matched inherited group reads CVE-2023-6040: (unk) netfilter: nf_tables: Reject tables of unsupported family CVE-2023-6121: (unk) nvmet: nul-terminate the NQNs passed in the connect command CVE-2023-6240: (unk) - CVE-2023-6270: (unk) - CVE-2023-6356: (unk) + CVE-2023-6270: (unk) aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts + CVE-2023-6356: (unk) nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length CVE-2023-6535: (unk) - CVE-2023-6536: (unk) + CVE-2023-6536: (unk) nvmet-tcp: fix a crash in nvmet_req_complete() CVE-2023-6546: (unk) tty: n_gsm: fix the UAF caused by race condition in gsm_cleanup_mux CVE-2023-6606: (unk) smb: client: fix OOB in smbCalcSize() CVE-2023-6610: (unk) smb: client: fix potential OOB in smb2_dump_detail() CVE-2023-6915: (unk) ida: Fix crash in ida_free when the bitmap is empty CVE-2023-6931: (unk) perf: Fix perf_event_validate_size() CVE-2023-6932: (unk) ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet - CVE-2023-7042: (unk) + CVE-2023-7042: (unk) wifi: ath10k: fix NULL pointer dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev() CVE-2023-7192: (unk) netfilter: ctnetlink: fix possible refcount leak in ctnetlink_create_conntrack() CVE-2024-0340: (unk) vhost: use kzalloc() instead of kmalloc() followed by memset() CVE-2024-0564: (unk) @@ -1096,10 +1309,11 @@ Outstanding CVEs: CVE-2024-1151: (unk) net: openvswitch: limit the number of recursions from action sets CVE-2024-1312: (unk) mm: lock_vma_under_rcu() must check vma->anon_vma under vma lock CVE-2024-21803: (unk) - CVE-2024-22099: (unk) + CVE-2024-2193: (unk) + CVE-2024-22099: (unk) Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security CVE-2024-22386: (unk) - CVE-2024-23196: (unk) - CVE-2024-23307: (unk) + CVE-2024-23196: (unk) ALSA: hda: fix a possible null-pointer dereference due to data race in snd_hdac_regmap_sync() + CVE-2024-23307: (unk) md/raid5: fix atomicity violation in raid5_cache_count CVE-2024-23848: (unk) CVE-2024-23849: (unk) net/rds: Fix UBSAN: array-index-out-of-bounds in rds_cmsg_recv CVE-2024-23851: (unk) dm: limit the number of targets and parameter size area @@ -1108,17 +1322,111 @@ Outstanding CVEs: CVE-2024-24858: (unk) CVE-2024-24859: (unk) CVE-2024-24860: (unk) Bluetooth: Fix atomicity violation in {min,max}_key_size_set - CVE-2024-24861: (unk) + CVE-2024-24861: (unk) media: xc4000: Fix atomicity violation in xc4000_get_frequency CVE-2024-24864: (unk) CVE-2024-25739: (unk) CVE-2024-25740: (unk) CVE-2024-25741: (unk) CVE-2024-25744: (unk) x86/coco: Disable 32-bit emulation by default on TDX and SEV CVE-2024-26584: (unk) net: tls: handle backlogging of crypto requests - CVE-2024-26587: (unk) net: netdevsim: don't try to destroy PHC on VFs - CVE-2024-26588: (unk) LoongArch: BPF: Prevent out-of-bounds memory access - CVE-2024-26591: (unk) bpf: Fix re-attachment branch in bpf_tracing_prog_attach CVE-2024-26592: (unk) ksmbd: fix UAF issue in ksmbd_tcp_new_connection() CVE-2024-26594: (unk) ksmbd: validate mech token in session setup CVE-2024-26595: (unk) mlxsw: spectrum_acl_tcam: Fix NULL pointer dereference in error path CVE-2024-26598: (unk) KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache + CVE-2024-26600: (unk) phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP + CVE-2024-26602: (unk) sched/membarrier: reduce the ability to hammer on sys_membarrier + CVE-2024-26606: (unk) binder: signal epoll threads of self-work + CVE-2024-26614: (unk) tcp: make sure init the accept_queue's spinlocks once + CVE-2024-26622: (unk) tomoyo: fix UAF write bug in tomoyo_write_control() + CVE-2024-26623: (unk) pds_core: Prevent race issues involving the adminq + CVE-2024-26625: (unk) llc: call sock_orphan() at release time + CVE-2024-26627: (unk) scsi: core: Move scsi_host_busy() out of host lock for waking up EH handler + CVE-2024-26633: (unk) ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim() + CVE-2024-26635: (unk) llc: Drop support for ETH_P_TR_802_2. + CVE-2024-26636: (unk) llc: make llc_ui_sendmsg() more robust against bonding changes + CVE-2024-26641: (unk) ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv() + CVE-2024-26642: (unk) netfilter: nf_tables: disallow anonymous set with timeout flag + CVE-2024-26644: (unk) btrfs: don't abort filesystem when attempting to snapshot deleted subvolume + CVE-2024-26646: (unk) thermal: intel: hfi: Add syscore callbacks for system-wide PM + CVE-2024-26647: (unk) drm/amd/display: Fix late derefrence 'dsc' check in 'link_set_dsc_pps_packet()' + CVE-2024-26648: (unk) drm/amd/display: Fix variable deferencing before NULL check in edp_setup_replay() + CVE-2024-26650: (unk) platform/x86: p2sb: Allow p2sb_bar() calls during PCI device probe + CVE-2024-26651: (unk) sr9800: Add check for usbnet_get_endpoints + CVE-2024-26654: (unk) ALSA: sh: aica: reorder cleanup operations to avoid UAF bugs + CVE-2024-26655: (unk) Fix memory leak in posix_clock_open() + CVE-2024-26656: (unk) drm/amdgpu: fix use-after-free bug + CVE-2024-26658: (unk) bcachefs: grab s_umount only if snapshotting + CVE-2024-26659: (unk) xhci: handle isoc Babble and Buffer Overrun events properly + CVE-2024-26663: (unk) tipc: Check the bearer type before calling tipc_udp_nl_bearer_add() + CVE-2024-26664: (unk) hwmon: (coretemp) Fix out-of-bounds memory access + CVE-2024-26668: (unk) netfilter: nft_limit: reject configurations that cause integer overflow + CVE-2024-26671: (unk) blk-mq: fix IO hang from sbitmap wakeup race + CVE-2024-26672: (unk) drm/amdgpu: Fix variable 'mca_funcs' dereferenced before NULL check in 'amdgpu_mca_smu_get_mca_entry()' + CVE-2024-26675: (unk) ppp_async: limit MRU to 64K + CVE-2024-26676: (unk) af_unix: Call kfree_skb() for dead unix_(sk)->oob_skb in GC. + CVE-2024-26677: (unk) rxrpc: Fix delayed ACKs to not set the reference serial number + CVE-2024-26679: (unk) inet: read sk->sk_family once in inet_recv_error() + CVE-2024-26685: (unk) nilfs2: fix potential bug in end_buffer_async_write + CVE-2024-26686: (unk) fs/proc: do_task_stat: use sig->stats_lock to gather the threads/children stats + CVE-2024-26687: (unk) xen/events: close evtchn after mapping cleanup + CVE-2024-26689: (unk) ceph: prevent use-after-free in encode_cap_msg() + CVE-2024-26691: (unk) KVM: arm64: Fix circular locking dependency + CVE-2024-26696: (unk) nilfs2: fix hang in nilfs_lookup_dirty_data_buffers() + CVE-2024-26697: (unk) nilfs2: fix data corruption in dsync block recovery for small block sizes + CVE-2024-26699: (unk) drm/amd/display: Fix array-index-out-of-bounds in dcn35_clkmgr + CVE-2024-26700: (unk) drm/amd/display: Fix MST Null Ptr for RV + CVE-2024-26704: (unk) ext4: fix double-free of blocks due to wrong extents moved_len + CVE-2024-26706: (unk) parisc: Fix random data corruption from exception handler + CVE-2024-26713: (unk) powerpc/pseries/iommu: Fix iommu initialisation during DLPAR add + CVE-2024-26715: (unk) usb: dwc3: gadget: Fix NULL pointer dereference in dwc3_gadget_suspend + CVE-2024-26719: (unk) nouveau: offload fence uevents work to workqueue + CVE-2024-26720: (unk) mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again + CVE-2024-26726: (unk) btrfs: don't drop extent_map for free space inode on write error + CVE-2024-26733: (unk) arp: Prevent overflow in arp_req_get(). + CVE-2024-26735: (unk) ipv6: sr: fix possible use-after-free and null-ptr-deref + CVE-2024-26736: (unk) afs: Increase buffer size in afs_update_volume_status() + CVE-2024-26738: (unk) powerpc/pseries/iommu: DLPAR add doesn't completely initialize pci_controller + CVE-2024-26739: (unk) net/sched: act_mirred: don't override retval if we already lost the skb + CVE-2024-26740: (unk) net/sched: act_mirred: use the backlog for mirred ingress + CVE-2024-26743: (unk) RDMA/qedr: Fix qedr_create_user_qp error flow + CVE-2024-26744: (unk) RDMA/srpt: Support specifying the srpt_service_guid parameter + CVE-2024-26745: (unk) powerpc/pseries/iommu: IOMMU table is not initialized for kdump over SR-IOV + CVE-2024-26748: (unk) usb: cdns3: fix memory double free when handle zero packet + CVE-2024-26751: (unk) ARM: ep93xx: Add terminator to gpiod_lookup_table + CVE-2024-26752: (unk) l2tp: pass correct message length to ip6_append_data + CVE-2024-26754: (unk) gtp: fix use-after-free and null-ptr-deref in gtp_genl_dump_pdp() + CVE-2024-26756: (unk) md: Don't register sync_thread for reshape directly + CVE-2024-26757: (unk) md: Don't ignore read-only array in md_check_recovery() + CVE-2024-26758: (unk) md: Don't ignore suspended array in md_check_recovery() + CVE-2024-26759: (unk) mm/swap: fix race when skipping swapcache + CVE-2024-26763: (unk) dm-crypt: don't modify the data when using authenticated encryption + CVE-2024-26764: (unk) fs/aio: Restrict kiocb_set_cancel_fn() to I/O submitted via libaio + CVE-2024-26765: (unk) LoongArch: Disable IRQ before init_fn() for nonboot CPUs + CVE-2024-26766: (unk) IB/hfi1: Fix sdma.h tx->num_descs off-by-one error + CVE-2024-26767: (unk) drm/amd/display: fixed integer types and null check locations + CVE-2024-26768: (unk) LoongArch: Change acpi_core_pic[NR_CPUS] to acpi_core_pic[MAX_CORE_PIC] + CVE-2024-26769: (unk) nvmet-fc: avoid deadlock on delete association path + CVE-2024-26770: (unk) HID: nvidia-shield: Add missing null pointer checks to LED initialization + CVE-2024-26771: (unk) dmaengine: ti: edma: Add some null pointer checks to the edma_probe + CVE-2024-26772: (unk) ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal() + CVE-2024-26773: (unk) ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found() + CVE-2024-26774: (unk) ext4: avoid dividing by 0 in mb_update_avg_fragment_size() when block bitmap corrupt + CVE-2024-26775: (unk) aoe: avoid potential deadlock at set_capacity + CVE-2024-26776: (unk) spi: hisi-sfc-v3xx: Return IRQ_NONE if no interrupts were detected + CVE-2024-26777: (unk) fbdev: sis: Error out if pixclock equals zero + CVE-2024-26778: (unk) fbdev: savage: Error out if pixclock equals zero + CVE-2024-26779: (unk) wifi: mac80211: fix race condition on enabling fast-xmit + CVE-2024-26784: (unk) pmdomain: arm: Fix NULL dereference on scmi_perf_domain removal + CVE-2024-26789: (unk) crypto: arm64/neonbs - fix out-of-bounds access on short input + CVE-2024-26791: (unk) btrfs: dev-replace: properly validate device names + CVE-2024-26793: (unk) gtp: fix use-after-free and null-ptr-deref in gtp_newlink() + CVE-2024-26797: (unk) drm/amd/display: Prevent potential buffer overflow in map_hw_resources + CVE-2024-26798: (unk) fbcon: always restore the old font data in fbcon_do_set_font() + CVE-2024-26801: (unk) Bluetooth: Avoid potential use-after-free in hci_error_reset + CVE-2024-26802: (unk) stmmac: Clear variable when destroying workqueue + CVE-2024-26803: (unk) net: veth: clear GRO when clearing XDP even when down + CVE-2024-26804: (unk) net: ip_tunnel: prevent perpetual headroom growth + CVE-2024-26805: (unk) netlink: Fix kernel-infoleak-after-free in __skb_datagram_iter + CVE-2024-26806: (unk) spi: cadence-qspi: remove system-wide suspend helper calls from runtime PM hooks + CVE-2024-26808: (unk) netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain + CVE-2024-26809: (unk) netfilter: nft_set_pipapo: release elements in clone only from destroy path diff --git a/data/4.17/4.17_CVEs.txt b/data/4.17/4.17_CVEs.txt index 0f1ba21c8..c996a3ac4 100644 --- a/data/4.17/4.17_CVEs.txt +++ b/data/4.17/4.17_CVEs.txt @@ -319,6 +319,8 @@ CVE-2019-2101: Fix not seen in stream CVE-2019-2181: Fix not seen in stream CVE-2019-2213: Fix not seen in stream CVE-2019-25045: Fix not seen in stream +CVE-2019-25160: Fix not seen in stream +CVE-2019-25162: Fix not seen in stream CVE-2019-3016: Fix not seen in stream CVE-2019-3459: Fix not seen in stream CVE-2019-3460: Fix not seen in stream @@ -513,6 +515,13 @@ CVE-2020-36558: Fix not seen in stream CVE-2020-36691: Fix not seen in stream CVE-2020-36694: Fix not seen in stream CVE-2020-36766: Fix not seen in stream +CVE-2020-36775: Fix not seen in stream +CVE-2020-36777: Fix not seen in stream +CVE-2020-36780: Fix not seen in stream +CVE-2020-36781: Fix not seen in stream +CVE-2020-36782: Fix not seen in stream +CVE-2020-36783: Fix not seen in stream +CVE-2020-36784: Fix not seen in stream CVE-2020-3702: Fix not seen in stream CVE-2020-4788: Fix not seen in stream CVE-2020-7053: Fix not seen in stream @@ -670,6 +679,114 @@ CVE-2021-45469: Fix not seen in stream CVE-2021-45485: Fix not seen in stream CVE-2021-45486: Fix not seen in stream CVE-2021-45868: Fix not seen in stream +CVE-2021-46904: Fix not seen in stream +CVE-2021-46906: Fix not seen in stream +CVE-2021-46908: Fix not seen in stream +CVE-2021-46909: Fix not seen in stream +CVE-2021-46915: Fix not seen in stream +CVE-2021-46921: Fix not seen in stream +CVE-2021-46924: Fix not seen in stream +CVE-2021-46925: Fix not seen in stream +CVE-2021-46926: Fix not seen in stream +CVE-2021-46928: Fix not seen in stream +CVE-2021-46929: Fix not seen in stream +CVE-2021-46932: Fix not seen in stream +CVE-2021-46933: Fix not seen in stream +CVE-2021-46934: Fix not seen in stream +CVE-2021-46935: Fix not seen in stream +CVE-2021-46936: Fix not seen in stream +CVE-2021-46938: Fix not seen in stream +CVE-2021-46939: Fix not seen in stream +CVE-2021-46941: Fix not seen in stream +CVE-2021-46950: Fix not seen in stream +CVE-2021-46951: Fix not seen in stream +CVE-2021-46952: Fix not seen in stream +CVE-2021-46953: Fix not seen in stream +CVE-2021-46955: Fix not seen in stream +CVE-2021-46959: Fix not seen in stream +CVE-2021-46960: Fix not seen in stream +CVE-2021-46962: Fix not seen in stream +CVE-2021-46965: Fix not seen in stream +CVE-2021-46969: Fix not seen in stream +CVE-2021-46970: Fix not seen in stream +CVE-2021-46982: Fix not seen in stream +CVE-2021-46988: Fix not seen in stream +CVE-2021-46991: Fix not seen in stream +CVE-2021-46992: Fix not seen in stream +CVE-2021-46998: Fix not seen in stream +CVE-2021-47006: Fix not seen in stream +CVE-2021-47010: Fix not seen in stream +CVE-2021-47013: Fix not seen in stream +CVE-2021-47028: Fix not seen in stream +CVE-2021-47046: Fix not seen in stream +CVE-2021-47049: Fix not seen in stream +CVE-2021-47052: Fix not seen in stream +CVE-2021-47054: Fix not seen in stream +CVE-2021-47056: Fix not seen in stream +CVE-2021-47059: Fix not seen in stream +CVE-2021-47063: Fix not seen in stream +CVE-2021-47065: Fix not seen in stream +CVE-2021-47070: Fix not seen in stream +CVE-2021-47073: Fix not seen in stream +CVE-2021-47074: Fix not seen in stream +CVE-2021-47075: Fix not seen in stream +CVE-2021-47076: Fix not seen in stream +CVE-2021-47077: Fix not seen in stream +CVE-2021-47078: Fix not seen in stream +CVE-2021-47082: Fix not seen in stream +CVE-2021-47083: Fix not seen in stream +CVE-2021-47086: Fix not seen in stream +CVE-2021-47100: Fix not seen in stream +CVE-2021-47101: Fix not seen in stream +CVE-2021-47103: Fix not seen in stream +CVE-2021-47110: Fix not seen in stream +CVE-2021-47112: Fix not seen in stream +CVE-2021-47113: Fix not seen in stream +CVE-2021-47114: Fix not seen in stream +CVE-2021-47116: Fix not seen in stream +CVE-2021-47117: Fix not seen in stream +CVE-2021-47118: Fix not seen in stream +CVE-2021-47119: Fix not seen in stream +CVE-2021-47121: Fix not seen in stream +CVE-2021-47122: Fix not seen in stream +CVE-2021-47124: Fix not seen in stream +CVE-2021-47125: Fix not seen in stream +CVE-2021-47128: Fix not seen in stream +CVE-2021-47131: Fix not seen in stream +CVE-2021-47133: Fix not seen in stream +CVE-2021-47135: Fix not seen in stream +CVE-2021-47136: Fix not seen in stream +CVE-2021-47137: Fix not seen in stream +CVE-2021-47140: Fix not seen in stream +CVE-2021-47142: Fix not seen in stream +CVE-2021-47143: Fix not seen in stream +CVE-2021-47144: Fix not seen in stream +CVE-2021-47145: Fix not seen in stream +CVE-2021-47146: Fix not seen in stream +CVE-2021-47147: Fix not seen in stream +CVE-2021-47149: Fix not seen in stream +CVE-2021-47150: Fix not seen in stream +CVE-2021-47151: Fix not seen in stream +CVE-2021-47153: Fix not seen in stream +CVE-2021-47158: Fix not seen in stream +CVE-2021-47159: Fix not seen in stream +CVE-2021-47160: Fix not seen in stream +CVE-2021-47161: Fix not seen in stream +CVE-2021-47162: Fix not seen in stream +CVE-2021-47163: Fix not seen in stream +CVE-2021-47165: Fix not seen in stream +CVE-2021-47166: Fix not seen in stream +CVE-2021-47167: Fix not seen in stream +CVE-2021-47168: Fix not seen in stream +CVE-2021-47169: Fix not seen in stream +CVE-2021-47170: Fix not seen in stream +CVE-2021-47171: Fix not seen in stream +CVE-2021-47172: Fix not seen in stream +CVE-2021-47173: Fix not seen in stream +CVE-2021-47175: Fix not seen in stream +CVE-2021-47177: Fix not seen in stream +CVE-2021-47179: Fix not seen in stream +CVE-2021-47180: Fix not seen in stream CVE-2022-0001: Fix not seen in stream CVE-2022-0002: Fix not seen in stream CVE-2022-0168: Fix not seen in stream @@ -863,6 +980,9 @@ CVE-2022-4744: Fix not seen in stream CVE-2022-47520: Fix not seen in stream CVE-2022-47929: Fix not seen in stream CVE-2022-48619: Fix not seen in stream +CVE-2022-48626: Fix not seen in stream +CVE-2022-48627: Fix not seen in stream +CVE-2022-48628: Fix not seen in stream CVE-2023-0030: Fix not seen in stream CVE-2023-0047: Fix not seen in stream CVE-2023-0266: Fix not seen in stream @@ -926,6 +1046,7 @@ CVE-2023-26607: Fix not seen in stream CVE-2023-28328: Fix not seen in stream CVE-2023-28466: Fix not seen in stream CVE-2023-2860: Fix not seen in stream +CVE-2023-28746: Fix not seen in stream CVE-2023-28772: Fix not seen in stream CVE-2023-2985: Fix not seen in stream CVE-2023-3006: Fix not seen in stream @@ -996,7 +1117,7 @@ CVE-2023-4622: Fix not seen in stream CVE-2023-4623: Fix not seen in stream CVE-2023-46343: Fix not seen in stream CVE-2023-46838: Fix not seen in stream -CVE-2023-47233: Fix unknown +CVE-2023-47233: Fix not seen in stream CVE-2023-4881: Fix not seen in stream CVE-2023-4921: Fix not seen in stream CVE-2023-51042: Fix not seen in stream @@ -1017,25 +1138,118 @@ CVE-2023-52444: Fix not seen in stream CVE-2023-52445: Fix not seen in stream CVE-2023-52449: Fix not seen in stream CVE-2023-52451: Fix not seen in stream -CVE-2023-52456: Fix not seen in stream -CVE-2023-52457: Fix not seen in stream CVE-2023-52458: Fix not seen in stream CVE-2023-52464: Fix not seen in stream +CVE-2023-52469: Fix not seen in stream +CVE-2023-52470: Fix not seen in stream +CVE-2023-52474: Fix not seen in stream +CVE-2023-52475: Fix not seen in stream +CVE-2023-52476: Fix not seen in stream +CVE-2023-52477: Fix not seen in stream +CVE-2023-52478: Fix not seen in stream +CVE-2023-52479: Fix not seen in stream +CVE-2023-52480: Fix not seen in stream +CVE-2023-52481: Fix not seen in stream +CVE-2023-52482: Fix not seen in stream +CVE-2023-52484: Fix not seen in stream +CVE-2023-52485: Fix not seen in stream +CVE-2023-52486: Fix not seen in stream +CVE-2023-52488: Fix not seen in stream +CVE-2023-52489: Fix not seen in stream +CVE-2023-52491: Fix not seen in stream +CVE-2023-52498: Fix not seen in stream +CVE-2023-52500: Fix not seen in stream +CVE-2023-52501: Fix not seen in stream +CVE-2023-52502: Fix not seen in stream +CVE-2023-52504: Fix not seen in stream +CVE-2023-52506: Fix not seen in stream +CVE-2023-52507: Fix not seen in stream +CVE-2023-52508: Fix not seen in stream +CVE-2023-52509: Fix not seen in stream +CVE-2023-52510: Fix not seen in stream +CVE-2023-52511: Fix not seen in stream +CVE-2023-52515: Fix not seen in stream +CVE-2023-52516: Fix not seen in stream +CVE-2023-52517: Fix not seen in stream +CVE-2023-52519: Fix not seen in stream +CVE-2023-52522: Fix not seen in stream +CVE-2023-52527: Fix not seen in stream +CVE-2023-52528: Fix not seen in stream +CVE-2023-52530: Fix not seen in stream +CVE-2023-52531: Fix not seen in stream +CVE-2023-52532: Fix not seen in stream +CVE-2023-52559: Fix not seen in stream +CVE-2023-52561: Fix not seen in stream +CVE-2023-52563: Fix not seen in stream +CVE-2023-52565: Fix not seen in stream +CVE-2023-52566: Fix not seen in stream +CVE-2023-52568: Fix not seen in stream +CVE-2023-52569: Fix not seen in stream +CVE-2023-52571: Fix not seen in stream +CVE-2023-52572: Fix not seen in stream +CVE-2023-52574: Fix not seen in stream +CVE-2023-52578: Fix not seen in stream +CVE-2023-52583: Fix not seen in stream +CVE-2023-52584: Fix not seen in stream +CVE-2023-52585: Fix not seen in stream +CVE-2023-52586: Fix not seen in stream +CVE-2023-52587: Fix not seen in stream +CVE-2023-52588: Fix not seen in stream +CVE-2023-52589: Fix not seen in stream +CVE-2023-52590: Fix not seen in stream +CVE-2023-52591: Fix not seen in stream +CVE-2023-52593: Fix not seen in stream +CVE-2023-52594: Fix not seen in stream +CVE-2023-52595: Fix not seen in stream +CVE-2023-52596: Fix not seen in stream +CVE-2023-52597: Fix not seen in stream +CVE-2023-52598: Fix not seen in stream +CVE-2023-52599: Fix not seen in stream +CVE-2023-52600: Fix not seen in stream +CVE-2023-52601: Fix not seen in stream +CVE-2023-52602: Fix not seen in stream +CVE-2023-52603: Fix not seen in stream +CVE-2023-52604: Fix not seen in stream +CVE-2023-52606: Fix not seen in stream +CVE-2023-52607: Fix not seen in stream +CVE-2023-52609: Fix not seen in stream +CVE-2023-52612: Fix not seen in stream +CVE-2023-52614: Fix not seen in stream +CVE-2023-52615: Fix not seen in stream +CVE-2023-52617: Fix not seen in stream +CVE-2023-52618: Fix not seen in stream +CVE-2023-52619: Fix not seen in stream +CVE-2023-52620: Fix not seen in stream +CVE-2023-52621: Fix not seen in stream +CVE-2023-52622: Fix not seen in stream +CVE-2023-52623: Fix not seen in stream +CVE-2023-52624: Fix not seen in stream +CVE-2023-52625: Fix not seen in stream +CVE-2023-52628: Fix not seen in stream +CVE-2023-52629: Fix not seen in stream +CVE-2023-52632: Fix not seen in stream +CVE-2023-52633: Fix not seen in stream +CVE-2023-52634: Fix not seen in stream +CVE-2023-52635: Fix not seen in stream +CVE-2023-52638: Fix not seen in stream +CVE-2023-52639: Fix not seen in stream +CVE-2023-52640: Fix not seen in stream +CVE-2023-52641: Fix not seen in stream CVE-2023-5717: Fix not seen in stream CVE-2023-6040: Fix not seen in stream CVE-2023-6121: Fix not seen in stream CVE-2023-6240: Fix unknown -CVE-2023-6270: Fix unknown -CVE-2023-6356: Fix unknown +CVE-2023-6270: Fix not seen in stream +CVE-2023-6356: Fix not seen in stream CVE-2023-6535: Fix unknown -CVE-2023-6536: Fix unknown +CVE-2023-6536: Fix not seen in stream CVE-2023-6546: Fix not seen in stream CVE-2023-6606: Fix not seen in stream CVE-2023-6610: Fix not seen in stream CVE-2023-6915: Fix not seen in stream CVE-2023-6931: Fix not seen in stream CVE-2023-6932: Fix not seen in stream -CVE-2023-7042: Fix unknown +CVE-2023-7042: Fix not seen in stream CVE-2023-7192: Fix not seen in stream CVE-2024-0340: Fix not seen in stream CVE-2024-0564: Fix unknown @@ -1046,10 +1260,11 @@ CVE-2024-1086: Fix not seen in stream CVE-2024-1151: Fix not seen in stream CVE-2024-1312: Fix not seen in stream CVE-2024-21803: Fix unknown -CVE-2024-22099: Fix unknown +CVE-2024-2193: Fix unknown +CVE-2024-22099: Fix not seen in stream CVE-2024-22386: Fix unknown -CVE-2024-23196: Fix unknown -CVE-2024-23307: Fix unknown +CVE-2024-23196: Fix not seen in stream +CVE-2024-23307: Fix not seen in stream CVE-2024-23848: Fix unknown CVE-2024-23849: Fix not seen in stream CVE-2024-23851: Fix not seen in stream @@ -1058,18 +1273,113 @@ CVE-2024-24857: Fix unknown CVE-2024-24858: Fix unknown CVE-2024-24859: Fix unknown CVE-2024-24860: Fix not seen in stream -CVE-2024-24861: Fix unknown +CVE-2024-24861: Fix not seen in stream CVE-2024-24864: Fix unknown CVE-2024-25739: Fix unknown CVE-2024-25740: Fix unknown CVE-2024-25741: Fix unknown CVE-2024-25744: Fix not seen in stream CVE-2024-26584: Fix not seen in stream -CVE-2024-26587: Fix not seen in stream -CVE-2024-26588: Fix not seen in stream -CVE-2024-26591: Fix not seen in stream CVE-2024-26592: Fix not seen in stream CVE-2024-26594: Fix not seen in stream CVE-2024-26595: Fix not seen in stream CVE-2024-26597: Fix not seen in stream CVE-2024-26598: Fix not seen in stream +CVE-2024-26600: Fix not seen in stream +CVE-2024-26602: Fix not seen in stream +CVE-2024-26606: Fix not seen in stream +CVE-2024-26614: Fix not seen in stream +CVE-2024-26622: Fix not seen in stream +CVE-2024-26623: Fix not seen in stream +CVE-2024-26625: Fix not seen in stream +CVE-2024-26627: Fix not seen in stream +CVE-2024-26633: Fix not seen in stream +CVE-2024-26635: Fix not seen in stream +CVE-2024-26636: Fix not seen in stream +CVE-2024-26641: Fix not seen in stream +CVE-2024-26642: Fix not seen in stream +CVE-2024-26644: Fix not seen in stream +CVE-2024-26645: Fix not seen in stream +CVE-2024-26646: Fix not seen in stream +CVE-2024-26647: Fix not seen in stream +CVE-2024-26648: Fix not seen in stream +CVE-2024-26650: Fix not seen in stream +CVE-2024-26651: Fix not seen in stream +CVE-2024-26654: Fix not seen in stream +CVE-2024-26655: Fix not seen in stream +CVE-2024-26656: Fix not seen in stream +CVE-2024-26658: Fix not seen in stream +CVE-2024-26659: Fix not seen in stream +CVE-2024-26663: Fix not seen in stream +CVE-2024-26664: Fix not seen in stream +CVE-2024-26668: Fix not seen in stream +CVE-2024-26671: Fix not seen in stream +CVE-2024-26672: Fix not seen in stream +CVE-2024-26675: Fix not seen in stream +CVE-2024-26676: Fix not seen in stream +CVE-2024-26677: Fix not seen in stream +CVE-2024-26679: Fix not seen in stream +CVE-2024-26685: Fix not seen in stream +CVE-2024-26686: Fix not seen in stream +CVE-2024-26687: Fix not seen in stream +CVE-2024-26689: Fix not seen in stream +CVE-2024-26691: Fix not seen in stream +CVE-2024-26696: Fix not seen in stream +CVE-2024-26697: Fix not seen in stream +CVE-2024-26699: Fix not seen in stream +CVE-2024-26700: Fix not seen in stream +CVE-2024-26704: Fix not seen in stream +CVE-2024-26706: Fix not seen in stream +CVE-2024-26713: Fix not seen in stream +CVE-2024-26715: Fix not seen in stream +CVE-2024-26719: Fix not seen in stream +CVE-2024-26720: Fix not seen in stream +CVE-2024-26726: Fix not seen in stream +CVE-2024-26733: Fix not seen in stream +CVE-2024-26735: Fix not seen in stream +CVE-2024-26736: Fix not seen in stream +CVE-2024-26738: Fix not seen in stream +CVE-2024-26739: Fix not seen in stream +CVE-2024-26740: Fix not seen in stream +CVE-2024-26743: Fix not seen in stream +CVE-2024-26744: Fix not seen in stream +CVE-2024-26745: Fix not seen in stream +CVE-2024-26748: Fix not seen in stream +CVE-2024-26751: Fix not seen in stream +CVE-2024-26752: Fix not seen in stream +CVE-2024-26754: Fix not seen in stream +CVE-2024-26756: Fix not seen in stream +CVE-2024-26757: Fix not seen in stream +CVE-2024-26758: Fix not seen in stream +CVE-2024-26759: Fix not seen in stream +CVE-2024-26763: Fix not seen in stream +CVE-2024-26764: Fix not seen in stream +CVE-2024-26765: Fix not seen in stream +CVE-2024-26766: Fix not seen in stream +CVE-2024-26767: Fix not seen in stream +CVE-2024-26768: Fix not seen in stream +CVE-2024-26769: Fix not seen in stream +CVE-2024-26770: Fix not seen in stream +CVE-2024-26771: Fix not seen in stream +CVE-2024-26772: Fix not seen in stream +CVE-2024-26773: Fix not seen in stream +CVE-2024-26774: Fix not seen in stream +CVE-2024-26775: Fix not seen in stream +CVE-2024-26776: Fix not seen in stream +CVE-2024-26777: Fix not seen in stream +CVE-2024-26778: Fix not seen in stream +CVE-2024-26779: Fix not seen in stream +CVE-2024-26784: Fix not seen in stream +CVE-2024-26789: Fix not seen in stream +CVE-2024-26791: Fix not seen in stream +CVE-2024-26793: Fix not seen in stream +CVE-2024-26797: Fix not seen in stream +CVE-2024-26798: Fix not seen in stream +CVE-2024-26801: Fix not seen in stream +CVE-2024-26802: Fix not seen in stream +CVE-2024-26803: Fix not seen in stream +CVE-2024-26804: Fix not seen in stream +CVE-2024-26805: Fix not seen in stream +CVE-2024-26806: Fix not seen in stream +CVE-2024-26808: Fix not seen in stream +CVE-2024-26809: Fix not seen in stream diff --git a/data/4.17/4.17_security.txt b/data/4.17/4.17_security.txt index 7b63d7b07..d52310ed8 100644 --- a/data/4.17/4.17_security.txt +++ b/data/4.17/4.17_security.txt @@ -352,6 +352,8 @@ Outstanding CVEs: CVE-2019-2181: (unk) binder: check for overflow when alloc for security context CVE-2019-2213: (unk) binder: fix possible UAF when freeing buffer CVE-2019-25045: (unk) xfrm: clean up xfrm protocol checks + CVE-2019-25160: (unk) netlabel: fix out-of-bounds memory accesses + CVE-2019-25162: (unk) i2c: Fix a potential use after free CVE-2019-3016: (unk) x86/kvm: Be careful not to clear KVM_VCPU_FLUSH_TLB bit CVE-2019-3459: (unk) Bluetooth: Verify that l2cap_get_conf_opt provides large enough buffer CVE-2019-3460: (unk) Bluetooth: Check L2CAP option sizes returned from l2cap_get_conf_opt @@ -545,6 +547,13 @@ Outstanding CVEs: CVE-2020-36691: (unk) netlink: limit recursion depth in policy validation CVE-2020-36694: (unk) netfilter: x_tables: Switch synchronization to RCU CVE-2020-36766: (unk) cec-api: prevent leaking memory through hole in structure + CVE-2020-36775: (unk) f2fs: fix to avoid potential deadlock + CVE-2020-36777: (unk) media: dvbdev: Fix memory leak in dvb_media_device_free() + CVE-2020-36780: (unk) i2c: sprd: fix reference leak when pm_runtime_get_sync fails + CVE-2020-36781: (unk) i2c: imx: fix reference leak when pm_runtime_get_sync fails + CVE-2020-36782: (unk) i2c: imx-lpi2c: fix reference leak when pm_runtime_get_sync fails + CVE-2020-36783: (unk) i2c: img-scb: fix reference leak when pm_runtime_get_sync fails + CVE-2020-36784: (unk) i2c: cadence: fix reference leak when pm_runtime_get_sync fails CVE-2020-3702: (unk) ath: Use safer key clearing with key cache entries CVE-2020-4788: (unk) powerpc/64s: flush L1D on kernel entry CVE-2020-7053: (unk) drm/i915: Introduce a mutex for file_priv->context_idr @@ -702,6 +711,114 @@ Outstanding CVEs: CVE-2021-45485: (unk) ipv6: use prandom_u32() for ID generation CVE-2021-45486: (unk) inet: use bigger hash table for IP ID generation CVE-2021-45868: (unk) quota: check block number when reading the block in quota file + CVE-2021-46904: (unk) net: hso: fix null-ptr-deref during tty device unregistration + CVE-2021-46906: (unk) HID: usbhid: fix info leak in hid_submit_ctrl + CVE-2021-46908: (unk) bpf: Use correct permission flag for mixed signed bounds arithmetic + CVE-2021-46909: (unk) ARM: footbridge: fix PCI interrupt mapping + CVE-2021-46915: (unk) netfilter: nft_limit: avoid possible divide error in nft_limit_init + CVE-2021-46921: (unk) locking/qrwlock: Fix ordering in queued_write_lock_slowpath() + CVE-2021-46924: (unk) NFC: st21nfca: Fix memory leak in device probe and remove + CVE-2021-46925: (unk) net/smc: fix kernel panic caused by race of smc_sock + CVE-2021-46926: (unk) ALSA: hda: intel-sdw-acpi: harden detection of controller + CVE-2021-46928: (unk) parisc: Clear stale IIR value on instruction access rights trap + CVE-2021-46929: (unk) sctp: use call_rcu to free endpoint + CVE-2021-46932: (unk) Input: appletouch - initialize work before device registration + CVE-2021-46933: (unk) usb: gadget: f_fs: Clear ffs_eventfd in ffs_data_clear. + CVE-2021-46934: (unk) i2c: validate user data in compat ioctl + CVE-2021-46935: (unk) binder: fix async_free_space accounting for empty parcels + CVE-2021-46936: (unk) net: fix use-after-free in tw_timer_handler + CVE-2021-46938: (unk) dm rq: fix double free of blk_mq_tag_set in dev remove after table load fails + CVE-2021-46939: (unk) tracing: Restructure trace_clock_global() to never block + CVE-2021-46941: (unk) usb: dwc3: core: Do core softreset when switch mode + CVE-2021-46950: (unk) md/raid1: properly indicate failure when ending a failed write request + CVE-2021-46951: (unk) tpm: efi: Use local variable for calculating final log size + CVE-2021-46952: (unk) NFS: fs_context: validate UDP retrans to prevent shift out-of-bounds + CVE-2021-46953: (unk) ACPI: GTDT: Don't corrupt interrupt mappings on watchdow probe failure + CVE-2021-46955: (unk) openvswitch: fix stack OOB read while fragmenting IPv4 packets + CVE-2021-46959: (unk) spi: Fix use-after-free with devm_spi_alloc_* + CVE-2021-46960: (unk) cifs: Return correct error code from smb2_get_enc_key + CVE-2021-46962: (unk) mmc: uniphier-sd: Fix a resource leak in the remove function + CVE-2021-46965: (unk) mtd: physmap: physmap-bt1-rom: Fix unintentional stack access + CVE-2021-46969: (unk) bus: mhi: core: Fix invalid error returning in mhi_queue + CVE-2021-46970: (unk) bus: mhi: pci_generic: Remove WQ_MEM_RECLAIM flag from state workqueue + CVE-2021-46982: (unk) f2fs: compress: fix race condition of overwrite vs truncate + CVE-2021-46988: (unk) userfaultfd: release page in error path to avoid BUG_ON + CVE-2021-46991: (unk) i40e: Fix use-after-free in i40e_client_subtask() + CVE-2021-46992: (unk) netfilter: nftables: avoid overflows in nft_hash_buckets() + CVE-2021-46998: (unk) ethernet:enic: Fix a use after free bug in enic_hard_start_xmit + CVE-2021-47006: (unk) ARM: 9064/1: hw_breakpoint: Do not directly check the event's overflow_handler hook + CVE-2021-47010: (unk) net: Only allow init netns to set default tcp cong to a restricted algo + CVE-2021-47013: (unk) net:emac/emac-mac: Fix a use after free in emac_mac_tx_buf_send + CVE-2021-47028: (unk) mt76: mt7915: fix txrate reporting + CVE-2021-47046: (unk) drm/amd/display: Fix off by one in hdmi_14_process_transaction() + CVE-2021-47049: (unk) Drivers: hv: vmbus: Use after free in __vmbus_open() + CVE-2021-47052: (unk) crypto: sa2ul - Fix memory leak of rxd + CVE-2021-47054: (unk) bus: qcom: Put child node before return + CVE-2021-47056: (unk) crypto: qat - ADF_STATUS_PF_RUNNING should be set after adf_dev_init + CVE-2021-47059: (unk) crypto: sun8i-ss - fix result memory leak on error path + CVE-2021-47063: (unk) drm: bridge/panel: Cleanup connector on bridge detach + CVE-2021-47065: (unk) rtw88: Fix array overrun in rtw_get_tx_power_params() + CVE-2021-47070: (unk) uio_hv_generic: Fix another memory leak in error handling paths + CVE-2021-47073: (unk) platform/x86: dell-smbios-wmi: Fix oops on rmmod dell_smbios + CVE-2021-47074: (unk) nvme-loop: fix memory leak in nvme_loop_create_ctrl() + CVE-2021-47075: (unk) nvmet: fix memory leak in nvmet_alloc_ctrl() + CVE-2021-47076: (unk) RDMA/rxe: Return CQE error if invalid lkey was supplied + CVE-2021-47077: (unk) scsi: qedf: Add pointer checks in qedf_update_link_speed() + CVE-2021-47078: (unk) RDMA/rxe: Clear all QP fields if creation failed + CVE-2021-47082: (unk) tun: avoid double free in tun_free_netdev + CVE-2021-47083: (unk) pinctrl: mediatek: fix global-out-of-bounds issue + CVE-2021-47086: (unk) phonet/pep: refuse to enable an unbound pipe + CVE-2021-47100: (unk) ipmi: Fix UAF when uninstall ipmi_si and ipmi_msghandler module + CVE-2021-47101: (unk) asix: fix uninit-value in asix_mdio_read() + CVE-2021-47103: (unk) inet: fully convert sk->sk_rx_dst to RCU rules + CVE-2021-47110: (unk) x86/kvm: Disable kvmclock on all CPUs on shutdown + CVE-2021-47112: (unk) x86/kvm: Teardown PV features on boot CPU as well + CVE-2021-47113: (unk) btrfs: abort in rename_exchange if we fail to insert the second ref + CVE-2021-47114: (unk) ocfs2: fix data corruption by fallocate + CVE-2021-47116: (unk) ext4: fix memory leak in ext4_mb_init_backend on error path. + CVE-2021-47117: (unk) ext4: fix bug on in ext4_es_cache_extent as ext4_split_extent_at failed + CVE-2021-47118: (unk) pid: take a reference when initializing `cad_pid` + CVE-2021-47119: (unk) ext4: fix memory leak in ext4_fill_super + CVE-2021-47121: (unk) net: caif: fix memory leak in cfusbl_device_notify + CVE-2021-47122: (unk) net: caif: fix memory leak in caif_device_notify + CVE-2021-47124: (unk) io_uring: fix link timeout refs + CVE-2021-47125: (unk) sch_htb: fix refcount leak in htb_parent_to_leaf_offload + CVE-2021-47128: (unk) bpf, lockdown, audit: Fix buggy SELinux lockdown permission checks + CVE-2021-47131: (unk) net/tls: Fix use-after-free after the TLS device goes down and up + CVE-2021-47133: (unk) HID: amd_sfh: Fix memory leak in amd_sfh_work + CVE-2021-47135: (unk) mt76: mt7921: fix possible AOOB issue in mt7921_mcu_tx_rate_report + CVE-2021-47136: (unk) net: zero-initialize tc skb extension on allocation + CVE-2021-47137: (unk) net: lantiq: fix memory corruption in RX ring + CVE-2021-47140: (unk) iommu/amd: Clear DMA ops when switching domain + CVE-2021-47142: (unk) drm/amdgpu: Fix a use-after-free + CVE-2021-47143: (unk) net/smc: remove device from smcd_dev_list after failed device_add() + CVE-2021-47144: (unk) drm/amd/amdgpu: fix refcount leak + CVE-2021-47145: (unk) btrfs: do not BUG_ON in link_to_fixup_dir + CVE-2021-47146: (unk) mld: fix panic in mld_newpack() + CVE-2021-47147: (unk) ptp: ocp: Fix a resource leak in an error handling path + CVE-2021-47149: (unk) net: fujitsu: fix potential null-ptr-deref + CVE-2021-47150: (unk) net: fec: fix the potential memory leak in fec_enet_init() + CVE-2021-47151: (unk) interconnect: qcom: bcm-voter: add a missing of_node_put() + CVE-2021-47153: (unk) i2c: i801: Don't generate an interrupt on bus reset + CVE-2021-47158: (unk) net: dsa: sja1105: add error handling in sja1105_setup() + CVE-2021-47159: (unk) net: dsa: fix a crash if ->get_sset_count() fails + CVE-2021-47160: (unk) net: dsa: mt7530: fix VLAN traffic leaks + CVE-2021-47161: (unk) spi: spi-fsl-dspi: Fix a resource leak in an error handling path + CVE-2021-47162: (unk) tipc: skb_linearize the head skb when reassembling msgs + CVE-2021-47163: (unk) tipc: wait and exit until all work queues are done + CVE-2021-47165: (unk) drm/meson: fix shutdown crash when component not probed + CVE-2021-47166: (unk) NFS: Don't corrupt the value of pg_bytes_written in nfs_do_recoalesce() + CVE-2021-47167: (unk) NFS: Fix an Oopsable condition in __nfs_pageio_add_request() + CVE-2021-47168: (unk) NFS: fix an incorrect limit in filelayout_decode_layout() + CVE-2021-47169: (unk) serial: rp2: use 'request_firmware' instead of 'request_firmware_nowait' + CVE-2021-47170: (unk) USB: usbfs: Don't WARN about excessively large memory allocations + CVE-2021-47171: (unk) net: usb: fix memory leak in smsc75xx_bind + CVE-2021-47172: (unk) iio: adc: ad7124: Fix potential overflow due to non sequential channel numbers + CVE-2021-47173: (unk) misc/uss720: fix memory leak in uss720_probe + CVE-2021-47175: (unk) net/sched: fq_pie: fix OOB access in the traffic path + CVE-2021-47177: (unk) iommu/vt-d: Fix sysfs leak in alloc_iommu() + CVE-2021-47179: (unk) NFSv4: Fix a NULL pointer dereference in pnfs_mark_matching_lsegs_return() + CVE-2021-47180: (unk) NFC: nci: fix memory leak in nci_allocate_device CVE-2022-0001: (unk) x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE CVE-2022-0002: (unk) x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE CVE-2022-0168: (unk) cifs: fix NULL ptr dereference in smb2_ioctl_query_info() @@ -895,6 +1012,9 @@ Outstanding CVEs: CVE-2022-47520: (unk) wifi: wilc1000: validate pairwise and authentication suite offsets CVE-2022-47929: (unk) net: sched: disallow noqueue for qdisc classes CVE-2022-48619: (unk) Input: add bounds checking to input_set_capability() + CVE-2022-48626: (unk) moxart: fix potential use-after-free on remove path + CVE-2022-48627: (unk) vt: fix memory overlapping when deleting chars in the buffer + CVE-2022-48628: (unk) ceph: drop messages from MDS when unmounting CVE-2023-0030: (unk) drm/nouveau/mmu: add more general vmm free/node handling functions CVE-2023-0047: (unk) mm, oom: do not trigger out_of_memory from the #PF CVE-2023-0266: (unk) ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF @@ -958,6 +1078,7 @@ Outstanding CVEs: CVE-2023-28328: (unk) media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer() CVE-2023-28466: (unk) net: tls: fix possible race condition between do_tls_getsockopt_conf() and do_tls_setsockopt_conf() CVE-2023-2860: (unk) ipv6: sr: fix out-of-bounds read when setting HMAC data. + CVE-2023-28746: (unk) x86/mmio: Disable KVM mitigation when X86_FEATURE_CLEAR_CPU_BUF is set CVE-2023-28772: (unk) seq_buf: Fix overflow in seq_buf_putmem_hex() CVE-2023-2985: (unk) fs: hfsplus: fix UAF issue in hfsplus_put_super CVE-2023-3006: (unk) arm64: Add AMPERE1 to the Spectre-BHB affected list @@ -1028,7 +1149,7 @@ Outstanding CVEs: CVE-2023-4623: (unk) net/sched: sch_hfsc: Ensure inner classes have fsc curve CVE-2023-46343: (unk) nfc: nci: fix possible NULL pointer dereference in send_acknowledge() CVE-2023-46838: (unk) xen-netback: don't produce zero-size SKB frags - CVE-2023-47233: (unk) + CVE-2023-47233: (unk) wifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach CVE-2023-4881: (unk) netfilter: nftables: exthdr: fix 4-byte stack OOB write CVE-2023-4921: (unk) net: sched: sch_qfq: Fix UAF in qfq_dequeue() CVE-2023-51042: (unk) drm/amdgpu: Fix potential fence use-after-free v2 @@ -1049,25 +1170,118 @@ Outstanding CVEs: CVE-2023-52445: (unk) media: pvrusb2: fix use after free on context disconnection CVE-2023-52449: (unk) mtd: Fix gluebi NULL pointer dereference caused by ftl notifier CVE-2023-52451: (unk) powerpc/pseries/memhp: Fix access beyond end of drmem array - CVE-2023-52456: (unk) serial: imx: fix tx statemachine deadlock - CVE-2023-52457: (unk) serial: 8250: omap: Don't skip resource freeing if pm_runtime_resume_and_get() failed CVE-2023-52458: (unk) block: add check that partition length needs to be aligned with block size CVE-2023-52464: (unk) EDAC/thunderx: Fix possible out-of-bounds string access + CVE-2023-52469: (unk) drivers/amd/pm: fix a use-after-free in kv_parse_power_table + CVE-2023-52470: (unk) drm/radeon: check the alloc_workqueue return value in radeon_crtc_init() + CVE-2023-52474: (unk) IB/hfi1: Fix bugs with non-PAGE_SIZE-end multi-iovec user SDMA requests + CVE-2023-52475: (unk) Input: powermate - fix use-after-free in powermate_config_complete + CVE-2023-52476: (unk) perf/x86/lbr: Filter vsyscall addresses + CVE-2023-52477: (unk) usb: hub: Guard against accesses to uninitialized BOS descriptors + CVE-2023-52478: (unk) HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect + CVE-2023-52479: (unk) ksmbd: fix uaf in smb20_oplock_break_ack + CVE-2023-52480: (unk) ksmbd: fix race condition between session lookup and expire + CVE-2023-52481: (unk) arm64: errata: Add Cortex-A520 speculative unprivileged load workaround + CVE-2023-52482: (unk) x86/srso: Add SRSO mitigation for Hygon processors + CVE-2023-52484: (unk) iommu/arm-smmu-v3: Fix soft lockup triggered by arm_smmu_mm_invalidate_range + CVE-2023-52485: (unk) drm/amd/display: Wake DMCUB before sending a command + CVE-2023-52486: (unk) drm: Don't unref the same fb many times by mistake due to deadlock handling + CVE-2023-52488: (unk) serial: sc16is7xx: convert from _raw_ to _noinc_ regmap functions for FIFO + CVE-2023-52489: (unk) mm/sparsemem: fix race in accessing memory_section->usage + CVE-2023-52491: (unk) media: mtk-jpeg: Fix use after free bug due to error path handling in mtk_jpeg_dec_device_run + CVE-2023-52498: (unk) PM: sleep: Fix possible deadlocks in core system-wide PM code + CVE-2023-52500: (unk) scsi: pm80xx: Avoid leaking tags when processing OPC_INB_SET_CONTROLLER_CONFIG command + CVE-2023-52501: (unk) ring-buffer: Do not attempt to read past "commit" + CVE-2023-52502: (unk) net: nfc: fix races in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn() + CVE-2023-52504: (unk) x86/alternatives: Disable KASAN in apply_alternatives() + CVE-2023-52506: (unk) LoongArch: Set all reserved memblocks on Node#0 at initialization + CVE-2023-52507: (unk) nfc: nci: assert requested protocol is valid + CVE-2023-52508: (unk) nvme-fc: Prevent null pointer dereference in nvme_fc_io_getuuid() + CVE-2023-52509: (unk) ravb: Fix use-after-free issue in ravb_tx_timeout_work() + CVE-2023-52510: (unk) ieee802154: ca8210: Fix a potential UAF in ca8210_probe + CVE-2023-52511: (unk) spi: sun6i: reduce DMA RX transfer width to single byte + CVE-2023-52515: (unk) RDMA/srp: Do not call scsi_done() from srp_abort() + CVE-2023-52516: (unk) dma-debug: don't call __dma_entry_alloc_check_leak() under free_entries_lock + CVE-2023-52517: (unk) spi: sun6i: fix race between DMA RX transfer completion and RX FIFO drain + CVE-2023-52519: (unk) HID: intel-ish-hid: ipc: Disable and reenable ACPI GPE bit + CVE-2023-52522: (unk) net: fix possible store tearing in neigh_periodic_work() + CVE-2023-52527: (unk) ipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data() + CVE-2023-52528: (unk) net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg + CVE-2023-52530: (unk) wifi: mac80211: fix potential key use-after-free + CVE-2023-52531: (unk) wifi: iwlwifi: mvm: Fix a memory corruption issue + CVE-2023-52532: (unk) net: mana: Fix TX CQE error handling + CVE-2023-52559: (unk) iommu/vt-d: Avoid memory allocation in iommu_suspend() + CVE-2023-52561: (unk) arm64: dts: qcom: sdm845-db845c: Mark cont splash memory region as reserved + CVE-2023-52563: (unk) drm/meson: fix memory leak on ->hpd_notify callback + CVE-2023-52565: (unk) media: uvcvideo: Fix OOB read + CVE-2023-52566: (unk) nilfs2: fix potential use after free in nilfs_gccache_submit_read_data() + CVE-2023-52568: (unk) x86/sgx: Resolves SECS reclaim vs. page fault for EAUG race + CVE-2023-52569: (unk) btrfs: remove BUG() after failure to insert delayed dir index item + CVE-2023-52571: (unk) power: supply: rk817: Fix node refcount leak + CVE-2023-52572: (unk) cifs: Fix UAF in cifs_demultiplex_thread() + CVE-2023-52574: (unk) team: fix null-ptr-deref when team device type is changed + CVE-2023-52578: (unk) net: bridge: use DEV_STATS_INC() + CVE-2023-52583: (unk) ceph: fix deadlock or deadcode of misusing dget() + CVE-2023-52584: (unk) spmi: mediatek: Fix UAF on device remove + CVE-2023-52585: (unk) drm/amdgpu: Fix possible NULL dereference in amdgpu_ras_query_error_status_helper() + CVE-2023-52586: (unk) drm/msm/dpu: Add mutex lock in control vblank irq + CVE-2023-52587: (unk) IB/ipoib: Fix mcast list locking + CVE-2023-52588: (unk) f2fs: fix to tag gcing flag on page during block migration + CVE-2023-52589: (unk) media: rkisp1: Fix IRQ disable race issue + CVE-2023-52590: (unk) ocfs2: Avoid touching renamed directory if parent does not change + CVE-2023-52591: (unk) reiserfs: Avoid touching renamed directory if parent does not change + CVE-2023-52593: (unk) wifi: wfx: fix possible NULL pointer dereference in wfx_set_mfp_ap() + CVE-2023-52594: (unk) wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus() + CVE-2023-52595: (unk) wifi: rt2x00: restart beacon queue when hardware reset + CVE-2023-52596: (unk) sysctl: Fix out of bounds access for empty sysctl registers + CVE-2023-52597: (unk) KVM: s390: fix setting of fpc register + CVE-2023-52598: (unk) s390/ptrace: handle setting of fpc register correctly + CVE-2023-52599: (unk) jfs: fix array-index-out-of-bounds in diNewExt + CVE-2023-52600: (unk) jfs: fix uaf in jfs_evict_inode + CVE-2023-52601: (unk) jfs: fix array-index-out-of-bounds in dbAdjTree + CVE-2023-52602: (unk) jfs: fix slab-out-of-bounds Read in dtSearch + CVE-2023-52603: (unk) UBSAN: array-index-out-of-bounds in dtSplitRoot + CVE-2023-52604: (unk) FS:JFS:UBSAN:array-index-out-of-bounds in dbAdjTree + CVE-2023-52606: (unk) powerpc/lib: Validate size for vector operations + CVE-2023-52607: (unk) powerpc/mm: Fix null-pointer dereference in pgtable_cache_add + CVE-2023-52609: (unk) binder: fix race between mmput() and do_exit() + CVE-2023-52612: (unk) crypto: scomp - fix req->dst buffer overflow + CVE-2023-52614: (unk) PM / devfreq: Fix buffer overflow in trans_stat_show + CVE-2023-52615: (unk) hwrng: core - Fix page fault dead lock on mmap-ed hwrng + CVE-2023-52617: (unk) PCI: switchtec: Fix stdev_release() crash after surprise hot remove + CVE-2023-52618: (unk) block/rnbd-srv: Check for unlikely string overflow + CVE-2023-52619: (unk) pstore/ram: Fix crash when setting number of cpus to an odd number + CVE-2023-52620: (unk) netfilter: nf_tables: disallow timeout for anonymous sets + CVE-2023-52621: (unk) bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers + CVE-2023-52622: (unk) ext4: avoid online resizing failures due to oversized flex bg + CVE-2023-52623: (unk) SUNRPC: Fix a suspicious RCU usage warning + CVE-2023-52624: (unk) drm/amd/display: Wake DMCUB before executing GPINT commands + CVE-2023-52625: (unk) drm/amd/display: Refactor DMCUB enter/exit idle interface + CVE-2023-52628: (unk) netfilter: nftables: exthdr: fix 4-byte stack OOB write + CVE-2023-52629: (unk) sh: push-switch: Reorder cleanup operations to avoid use-after-free bug + CVE-2023-52632: (unk) drm/amdkfd: Fix lock dependency warning with srcu + CVE-2023-52633: (unk) um: time-travel: fix time corruption + CVE-2023-52634: (unk) drm/amd/display: Fix disable_otg_wa logic + CVE-2023-52635: (unk) PM / devfreq: Synchronize devfreq_monitor_[start/stop] + CVE-2023-52638: (unk) can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock + CVE-2023-52639: (unk) KVM: s390: vsie: fix race during shadow creation + CVE-2023-52640: (unk) fs/ntfs3: Fix oob in ntfs_listxattr + CVE-2023-52641: (unk) fs/ntfs3: Add NULL ptr dereference checking at the end of attr_allocate_frame() CVE-2023-5717: (unk) perf: Disallow mis-matched inherited group reads CVE-2023-6040: (unk) netfilter: nf_tables: Reject tables of unsupported family CVE-2023-6121: (unk) nvmet: nul-terminate the NQNs passed in the connect command CVE-2023-6240: (unk) - CVE-2023-6270: (unk) - CVE-2023-6356: (unk) + CVE-2023-6270: (unk) aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts + CVE-2023-6356: (unk) nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length CVE-2023-6535: (unk) - CVE-2023-6536: (unk) + CVE-2023-6536: (unk) nvmet-tcp: fix a crash in nvmet_req_complete() CVE-2023-6546: (unk) tty: n_gsm: fix the UAF caused by race condition in gsm_cleanup_mux CVE-2023-6606: (unk) smb: client: fix OOB in smbCalcSize() CVE-2023-6610: (unk) smb: client: fix potential OOB in smb2_dump_detail() CVE-2023-6915: (unk) ida: Fix crash in ida_free when the bitmap is empty CVE-2023-6931: (unk) perf: Fix perf_event_validate_size() CVE-2023-6932: (unk) ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet - CVE-2023-7042: (unk) + CVE-2023-7042: (unk) wifi: ath10k: fix NULL pointer dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev() CVE-2023-7192: (unk) netfilter: ctnetlink: fix possible refcount leak in ctnetlink_create_conntrack() CVE-2024-0340: (unk) vhost: use kzalloc() instead of kmalloc() followed by memset() CVE-2024-0564: (unk) @@ -1078,10 +1292,11 @@ Outstanding CVEs: CVE-2024-1151: (unk) net: openvswitch: limit the number of recursions from action sets CVE-2024-1312: (unk) mm: lock_vma_under_rcu() must check vma->anon_vma under vma lock CVE-2024-21803: (unk) - CVE-2024-22099: (unk) + CVE-2024-2193: (unk) + CVE-2024-22099: (unk) Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security CVE-2024-22386: (unk) - CVE-2024-23196: (unk) - CVE-2024-23307: (unk) + CVE-2024-23196: (unk) ALSA: hda: fix a possible null-pointer dereference due to data race in snd_hdac_regmap_sync() + CVE-2024-23307: (unk) md/raid5: fix atomicity violation in raid5_cache_count CVE-2024-23848: (unk) CVE-2024-23849: (unk) net/rds: Fix UBSAN: array-index-out-of-bounds in rds_cmsg_recv CVE-2024-23851: (unk) dm: limit the number of targets and parameter size area @@ -1090,18 +1305,113 @@ Outstanding CVEs: CVE-2024-24858: (unk) CVE-2024-24859: (unk) CVE-2024-24860: (unk) Bluetooth: Fix atomicity violation in {min,max}_key_size_set - CVE-2024-24861: (unk) + CVE-2024-24861: (unk) media: xc4000: Fix atomicity violation in xc4000_get_frequency CVE-2024-24864: (unk) CVE-2024-25739: (unk) CVE-2024-25740: (unk) CVE-2024-25741: (unk) CVE-2024-25744: (unk) x86/coco: Disable 32-bit emulation by default on TDX and SEV CVE-2024-26584: (unk) net: tls: handle backlogging of crypto requests - CVE-2024-26587: (unk) net: netdevsim: don't try to destroy PHC on VFs - CVE-2024-26588: (unk) LoongArch: BPF: Prevent out-of-bounds memory access - CVE-2024-26591: (unk) bpf: Fix re-attachment branch in bpf_tracing_prog_attach CVE-2024-26592: (unk) ksmbd: fix UAF issue in ksmbd_tcp_new_connection() CVE-2024-26594: (unk) ksmbd: validate mech token in session setup CVE-2024-26595: (unk) mlxsw: spectrum_acl_tcam: Fix NULL pointer dereference in error path CVE-2024-26597: (unk) net: qualcomm: rmnet: fix global oob in rmnet_policy CVE-2024-26598: (unk) KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache + CVE-2024-26600: (unk) phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP + CVE-2024-26602: (unk) sched/membarrier: reduce the ability to hammer on sys_membarrier + CVE-2024-26606: (unk) binder: signal epoll threads of self-work + CVE-2024-26614: (unk) tcp: make sure init the accept_queue's spinlocks once + CVE-2024-26622: (unk) tomoyo: fix UAF write bug in tomoyo_write_control() + CVE-2024-26623: (unk) pds_core: Prevent race issues involving the adminq + CVE-2024-26625: (unk) llc: call sock_orphan() at release time + CVE-2024-26627: (unk) scsi: core: Move scsi_host_busy() out of host lock for waking up EH handler + CVE-2024-26633: (unk) ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim() + CVE-2024-26635: (unk) llc: Drop support for ETH_P_TR_802_2. + CVE-2024-26636: (unk) llc: make llc_ui_sendmsg() more robust against bonding changes + CVE-2024-26641: (unk) ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv() + CVE-2024-26642: (unk) netfilter: nf_tables: disallow anonymous set with timeout flag + CVE-2024-26644: (unk) btrfs: don't abort filesystem when attempting to snapshot deleted subvolume + CVE-2024-26645: (unk) tracing: Ensure visibility when inserting an element into tracing_map + CVE-2024-26646: (unk) thermal: intel: hfi: Add syscore callbacks for system-wide PM + CVE-2024-26647: (unk) drm/amd/display: Fix late derefrence 'dsc' check in 'link_set_dsc_pps_packet()' + CVE-2024-26648: (unk) drm/amd/display: Fix variable deferencing before NULL check in edp_setup_replay() + CVE-2024-26650: (unk) platform/x86: p2sb: Allow p2sb_bar() calls during PCI device probe + CVE-2024-26651: (unk) sr9800: Add check for usbnet_get_endpoints + CVE-2024-26654: (unk) ALSA: sh: aica: reorder cleanup operations to avoid UAF bugs + CVE-2024-26655: (unk) Fix memory leak in posix_clock_open() + CVE-2024-26656: (unk) drm/amdgpu: fix use-after-free bug + CVE-2024-26658: (unk) bcachefs: grab s_umount only if snapshotting + CVE-2024-26659: (unk) xhci: handle isoc Babble and Buffer Overrun events properly + CVE-2024-26663: (unk) tipc: Check the bearer type before calling tipc_udp_nl_bearer_add() + CVE-2024-26664: (unk) hwmon: (coretemp) Fix out-of-bounds memory access + CVE-2024-26668: (unk) netfilter: nft_limit: reject configurations that cause integer overflow + CVE-2024-26671: (unk) blk-mq: fix IO hang from sbitmap wakeup race + CVE-2024-26672: (unk) drm/amdgpu: Fix variable 'mca_funcs' dereferenced before NULL check in 'amdgpu_mca_smu_get_mca_entry()' + CVE-2024-26675: (unk) ppp_async: limit MRU to 64K + CVE-2024-26676: (unk) af_unix: Call kfree_skb() for dead unix_(sk)->oob_skb in GC. + CVE-2024-26677: (unk) rxrpc: Fix delayed ACKs to not set the reference serial number + CVE-2024-26679: (unk) inet: read sk->sk_family once in inet_recv_error() + CVE-2024-26685: (unk) nilfs2: fix potential bug in end_buffer_async_write + CVE-2024-26686: (unk) fs/proc: do_task_stat: use sig->stats_lock to gather the threads/children stats + CVE-2024-26687: (unk) xen/events: close evtchn after mapping cleanup + CVE-2024-26689: (unk) ceph: prevent use-after-free in encode_cap_msg() + CVE-2024-26691: (unk) KVM: arm64: Fix circular locking dependency + CVE-2024-26696: (unk) nilfs2: fix hang in nilfs_lookup_dirty_data_buffers() + CVE-2024-26697: (unk) nilfs2: fix data corruption in dsync block recovery for small block sizes + CVE-2024-26699: (unk) drm/amd/display: Fix array-index-out-of-bounds in dcn35_clkmgr + CVE-2024-26700: (unk) drm/amd/display: Fix MST Null Ptr for RV + CVE-2024-26704: (unk) ext4: fix double-free of blocks due to wrong extents moved_len + CVE-2024-26706: (unk) parisc: Fix random data corruption from exception handler + CVE-2024-26713: (unk) powerpc/pseries/iommu: Fix iommu initialisation during DLPAR add + CVE-2024-26715: (unk) usb: dwc3: gadget: Fix NULL pointer dereference in dwc3_gadget_suspend + CVE-2024-26719: (unk) nouveau: offload fence uevents work to workqueue + CVE-2024-26720: (unk) mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again + CVE-2024-26726: (unk) btrfs: don't drop extent_map for free space inode on write error + CVE-2024-26733: (unk) arp: Prevent overflow in arp_req_get(). + CVE-2024-26735: (unk) ipv6: sr: fix possible use-after-free and null-ptr-deref + CVE-2024-26736: (unk) afs: Increase buffer size in afs_update_volume_status() + CVE-2024-26738: (unk) powerpc/pseries/iommu: DLPAR add doesn't completely initialize pci_controller + CVE-2024-26739: (unk) net/sched: act_mirred: don't override retval if we already lost the skb + CVE-2024-26740: (unk) net/sched: act_mirred: use the backlog for mirred ingress + CVE-2024-26743: (unk) RDMA/qedr: Fix qedr_create_user_qp error flow + CVE-2024-26744: (unk) RDMA/srpt: Support specifying the srpt_service_guid parameter + CVE-2024-26745: (unk) powerpc/pseries/iommu: IOMMU table is not initialized for kdump over SR-IOV + CVE-2024-26748: (unk) usb: cdns3: fix memory double free when handle zero packet + CVE-2024-26751: (unk) ARM: ep93xx: Add terminator to gpiod_lookup_table + CVE-2024-26752: (unk) l2tp: pass correct message length to ip6_append_data + CVE-2024-26754: (unk) gtp: fix use-after-free and null-ptr-deref in gtp_genl_dump_pdp() + CVE-2024-26756: (unk) md: Don't register sync_thread for reshape directly + CVE-2024-26757: (unk) md: Don't ignore read-only array in md_check_recovery() + CVE-2024-26758: (unk) md: Don't ignore suspended array in md_check_recovery() + CVE-2024-26759: (unk) mm/swap: fix race when skipping swapcache + CVE-2024-26763: (unk) dm-crypt: don't modify the data when using authenticated encryption + CVE-2024-26764: (unk) fs/aio: Restrict kiocb_set_cancel_fn() to I/O submitted via libaio + CVE-2024-26765: (unk) LoongArch: Disable IRQ before init_fn() for nonboot CPUs + CVE-2024-26766: (unk) IB/hfi1: Fix sdma.h tx->num_descs off-by-one error + CVE-2024-26767: (unk) drm/amd/display: fixed integer types and null check locations + CVE-2024-26768: (unk) LoongArch: Change acpi_core_pic[NR_CPUS] to acpi_core_pic[MAX_CORE_PIC] + CVE-2024-26769: (unk) nvmet-fc: avoid deadlock on delete association path + CVE-2024-26770: (unk) HID: nvidia-shield: Add missing null pointer checks to LED initialization + CVE-2024-26771: (unk) dmaengine: ti: edma: Add some null pointer checks to the edma_probe + CVE-2024-26772: (unk) ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal() + CVE-2024-26773: (unk) ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found() + CVE-2024-26774: (unk) ext4: avoid dividing by 0 in mb_update_avg_fragment_size() when block bitmap corrupt + CVE-2024-26775: (unk) aoe: avoid potential deadlock at set_capacity + CVE-2024-26776: (unk) spi: hisi-sfc-v3xx: Return IRQ_NONE if no interrupts were detected + CVE-2024-26777: (unk) fbdev: sis: Error out if pixclock equals zero + CVE-2024-26778: (unk) fbdev: savage: Error out if pixclock equals zero + CVE-2024-26779: (unk) wifi: mac80211: fix race condition on enabling fast-xmit + CVE-2024-26784: (unk) pmdomain: arm: Fix NULL dereference on scmi_perf_domain removal + CVE-2024-26789: (unk) crypto: arm64/neonbs - fix out-of-bounds access on short input + CVE-2024-26791: (unk) btrfs: dev-replace: properly validate device names + CVE-2024-26793: (unk) gtp: fix use-after-free and null-ptr-deref in gtp_newlink() + CVE-2024-26797: (unk) drm/amd/display: Prevent potential buffer overflow in map_hw_resources + CVE-2024-26798: (unk) fbcon: always restore the old font data in fbcon_do_set_font() + CVE-2024-26801: (unk) Bluetooth: Avoid potential use-after-free in hci_error_reset + CVE-2024-26802: (unk) stmmac: Clear variable when destroying workqueue + CVE-2024-26803: (unk) net: veth: clear GRO when clearing XDP even when down + CVE-2024-26804: (unk) net: ip_tunnel: prevent perpetual headroom growth + CVE-2024-26805: (unk) netlink: Fix kernel-infoleak-after-free in __skb_datagram_iter + CVE-2024-26806: (unk) spi: cadence-qspi: remove system-wide suspend helper calls from runtime PM hooks + CVE-2024-26808: (unk) netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain + CVE-2024-26809: (unk) netfilter: nft_set_pipapo: release elements in clone only from destroy path diff --git a/data/4.18/4.18_CVEs.txt b/data/4.18/4.18_CVEs.txt index f97a35402..37525a6a7 100644 --- a/data/4.18/4.18_CVEs.txt +++ b/data/4.18/4.18_CVEs.txt @@ -295,6 +295,8 @@ CVE-2019-2101: Fix not seen in stream CVE-2019-2181: Fix not seen in stream CVE-2019-2213: Fix not seen in stream CVE-2019-25045: Fix not seen in stream +CVE-2019-25160: Fix not seen in stream +CVE-2019-25162: Fix not seen in stream CVE-2019-3016: Fix not seen in stream CVE-2019-3459: Fix not seen in stream CVE-2019-3460: Fix not seen in stream @@ -491,6 +493,13 @@ CVE-2020-36558: Fix not seen in stream CVE-2020-36691: Fix not seen in stream CVE-2020-36694: Fix not seen in stream CVE-2020-36766: Fix not seen in stream +CVE-2020-36775: Fix not seen in stream +CVE-2020-36777: Fix not seen in stream +CVE-2020-36780: Fix not seen in stream +CVE-2020-36781: Fix not seen in stream +CVE-2020-36782: Fix not seen in stream +CVE-2020-36783: Fix not seen in stream +CVE-2020-36784: Fix not seen in stream CVE-2020-3702: Fix not seen in stream CVE-2020-4788: Fix not seen in stream CVE-2020-7053: Fix not seen in stream @@ -647,6 +656,117 @@ CVE-2021-45469: Fix not seen in stream CVE-2021-45485: Fix not seen in stream CVE-2021-45486: Fix not seen in stream CVE-2021-45868: Fix not seen in stream +CVE-2021-46904: Fix not seen in stream +CVE-2021-46906: Fix not seen in stream +CVE-2021-46908: Fix not seen in stream +CVE-2021-46909: Fix not seen in stream +CVE-2021-46915: Fix not seen in stream +CVE-2021-46921: Fix not seen in stream +CVE-2021-46924: Fix not seen in stream +CVE-2021-46925: Fix not seen in stream +CVE-2021-46926: Fix not seen in stream +CVE-2021-46928: Fix not seen in stream +CVE-2021-46929: Fix not seen in stream +CVE-2021-46932: Fix not seen in stream +CVE-2021-46933: Fix not seen in stream +CVE-2021-46934: Fix not seen in stream +CVE-2021-46935: Fix not seen in stream +CVE-2021-46936: Fix not seen in stream +CVE-2021-46938: Fix not seen in stream +CVE-2021-46939: Fix not seen in stream +CVE-2021-46941: Fix not seen in stream +CVE-2021-46950: Fix not seen in stream +CVE-2021-46951: Fix not seen in stream +CVE-2021-46952: Fix not seen in stream +CVE-2021-46953: Fix not seen in stream +CVE-2021-46955: Fix not seen in stream +CVE-2021-46959: Fix not seen in stream +CVE-2021-46960: Fix not seen in stream +CVE-2021-46962: Fix not seen in stream +CVE-2021-46965: Fix not seen in stream +CVE-2021-46969: Fix not seen in stream +CVE-2021-46970: Fix not seen in stream +CVE-2021-46982: Fix not seen in stream +CVE-2021-46984: Fix not seen in stream +CVE-2021-46988: Fix not seen in stream +CVE-2021-46991: Fix not seen in stream +CVE-2021-46992: Fix not seen in stream +CVE-2021-46998: Fix not seen in stream +CVE-2021-47006: Fix not seen in stream +CVE-2021-47010: Fix not seen in stream +CVE-2021-47013: Fix not seen in stream +CVE-2021-47020: Fix not seen in stream +CVE-2021-47028: Fix not seen in stream +CVE-2021-47034: Fix not seen in stream +CVE-2021-47046: Fix not seen in stream +CVE-2021-47049: Fix not seen in stream +CVE-2021-47052: Fix not seen in stream +CVE-2021-47054: Fix not seen in stream +CVE-2021-47056: Fix not seen in stream +CVE-2021-47059: Fix not seen in stream +CVE-2021-47063: Fix not seen in stream +CVE-2021-47065: Fix not seen in stream +CVE-2021-47070: Fix not seen in stream +CVE-2021-47073: Fix not seen in stream +CVE-2021-47074: Fix not seen in stream +CVE-2021-47075: Fix not seen in stream +CVE-2021-47076: Fix not seen in stream +CVE-2021-47077: Fix not seen in stream +CVE-2021-47078: Fix not seen in stream +CVE-2021-47082: Fix not seen in stream +CVE-2021-47083: Fix not seen in stream +CVE-2021-47086: Fix not seen in stream +CVE-2021-47100: Fix not seen in stream +CVE-2021-47101: Fix not seen in stream +CVE-2021-47103: Fix not seen in stream +CVE-2021-47110: Fix not seen in stream +CVE-2021-47112: Fix not seen in stream +CVE-2021-47113: Fix not seen in stream +CVE-2021-47114: Fix not seen in stream +CVE-2021-47116: Fix not seen in stream +CVE-2021-47117: Fix not seen in stream +CVE-2021-47118: Fix not seen in stream +CVE-2021-47119: Fix not seen in stream +CVE-2021-47121: Fix not seen in stream +CVE-2021-47122: Fix not seen in stream +CVE-2021-47124: Fix not seen in stream +CVE-2021-47125: Fix not seen in stream +CVE-2021-47128: Fix not seen in stream +CVE-2021-47131: Fix not seen in stream +CVE-2021-47133: Fix not seen in stream +CVE-2021-47135: Fix not seen in stream +CVE-2021-47136: Fix not seen in stream +CVE-2021-47137: Fix not seen in stream +CVE-2021-47140: Fix not seen in stream +CVE-2021-47142: Fix not seen in stream +CVE-2021-47143: Fix not seen in stream +CVE-2021-47144: Fix not seen in stream +CVE-2021-47145: Fix not seen in stream +CVE-2021-47146: Fix not seen in stream +CVE-2021-47147: Fix not seen in stream +CVE-2021-47149: Fix not seen in stream +CVE-2021-47150: Fix not seen in stream +CVE-2021-47151: Fix not seen in stream +CVE-2021-47153: Fix not seen in stream +CVE-2021-47158: Fix not seen in stream +CVE-2021-47159: Fix not seen in stream +CVE-2021-47160: Fix not seen in stream +CVE-2021-47161: Fix not seen in stream +CVE-2021-47162: Fix not seen in stream +CVE-2021-47163: Fix not seen in stream +CVE-2021-47165: Fix not seen in stream +CVE-2021-47166: Fix not seen in stream +CVE-2021-47167: Fix not seen in stream +CVE-2021-47168: Fix not seen in stream +CVE-2021-47169: Fix not seen in stream +CVE-2021-47170: Fix not seen in stream +CVE-2021-47171: Fix not seen in stream +CVE-2021-47172: Fix not seen in stream +CVE-2021-47173: Fix not seen in stream +CVE-2021-47175: Fix not seen in stream +CVE-2021-47177: Fix not seen in stream +CVE-2021-47179: Fix not seen in stream +CVE-2021-47180: Fix not seen in stream CVE-2022-0001: Fix not seen in stream CVE-2022-0002: Fix not seen in stream CVE-2022-0168: Fix not seen in stream @@ -841,6 +961,9 @@ CVE-2022-4744: Fix not seen in stream CVE-2022-47520: Fix not seen in stream CVE-2022-47929: Fix not seen in stream CVE-2022-48619: Fix not seen in stream +CVE-2022-48626: Fix not seen in stream +CVE-2022-48627: Fix not seen in stream +CVE-2022-48628: Fix not seen in stream CVE-2023-0030: Fix not seen in stream CVE-2023-0047: Fix not seen in stream CVE-2023-0266: Fix not seen in stream @@ -904,6 +1027,7 @@ CVE-2023-26607: Fix not seen in stream CVE-2023-28328: Fix not seen in stream CVE-2023-28466: Fix not seen in stream CVE-2023-2860: Fix not seen in stream +CVE-2023-28746: Fix not seen in stream CVE-2023-28772: Fix not seen in stream CVE-2023-2985: Fix not seen in stream CVE-2023-3006: Fix not seen in stream @@ -974,7 +1098,7 @@ CVE-2023-4622: Fix not seen in stream CVE-2023-4623: Fix not seen in stream CVE-2023-46343: Fix not seen in stream CVE-2023-46838: Fix not seen in stream -CVE-2023-47233: Fix unknown +CVE-2023-47233: Fix not seen in stream CVE-2023-4881: Fix not seen in stream CVE-2023-4921: Fix not seen in stream CVE-2023-51042: Fix not seen in stream @@ -996,25 +1120,118 @@ CVE-2023-52444: Fix not seen in stream CVE-2023-52445: Fix not seen in stream CVE-2023-52449: Fix not seen in stream CVE-2023-52451: Fix not seen in stream -CVE-2023-52456: Fix not seen in stream -CVE-2023-52457: Fix not seen in stream CVE-2023-52458: Fix not seen in stream CVE-2023-52464: Fix not seen in stream +CVE-2023-52469: Fix not seen in stream +CVE-2023-52470: Fix not seen in stream +CVE-2023-52474: Fix not seen in stream +CVE-2023-52475: Fix not seen in stream +CVE-2023-52476: Fix not seen in stream +CVE-2023-52477: Fix not seen in stream +CVE-2023-52478: Fix not seen in stream +CVE-2023-52479: Fix not seen in stream +CVE-2023-52480: Fix not seen in stream +CVE-2023-52481: Fix not seen in stream +CVE-2023-52482: Fix not seen in stream +CVE-2023-52484: Fix not seen in stream +CVE-2023-52485: Fix not seen in stream +CVE-2023-52486: Fix not seen in stream +CVE-2023-52488: Fix not seen in stream +CVE-2023-52489: Fix not seen in stream +CVE-2023-52491: Fix not seen in stream +CVE-2023-52498: Fix not seen in stream +CVE-2023-52500: Fix not seen in stream +CVE-2023-52501: Fix not seen in stream +CVE-2023-52502: Fix not seen in stream +CVE-2023-52504: Fix not seen in stream +CVE-2023-52506: Fix not seen in stream +CVE-2023-52507: Fix not seen in stream +CVE-2023-52508: Fix not seen in stream +CVE-2023-52509: Fix not seen in stream +CVE-2023-52510: Fix not seen in stream +CVE-2023-52511: Fix not seen in stream +CVE-2023-52515: Fix not seen in stream +CVE-2023-52516: Fix not seen in stream +CVE-2023-52517: Fix not seen in stream +CVE-2023-52519: Fix not seen in stream +CVE-2023-52522: Fix not seen in stream +CVE-2023-52527: Fix not seen in stream +CVE-2023-52528: Fix not seen in stream +CVE-2023-52530: Fix not seen in stream +CVE-2023-52531: Fix not seen in stream +CVE-2023-52532: Fix not seen in stream +CVE-2023-52559: Fix not seen in stream +CVE-2023-52561: Fix not seen in stream +CVE-2023-52563: Fix not seen in stream +CVE-2023-52565: Fix not seen in stream +CVE-2023-52566: Fix not seen in stream +CVE-2023-52568: Fix not seen in stream +CVE-2023-52569: Fix not seen in stream +CVE-2023-52571: Fix not seen in stream +CVE-2023-52572: Fix not seen in stream +CVE-2023-52574: Fix not seen in stream +CVE-2023-52578: Fix not seen in stream +CVE-2023-52583: Fix not seen in stream +CVE-2023-52584: Fix not seen in stream +CVE-2023-52585: Fix not seen in stream +CVE-2023-52586: Fix not seen in stream +CVE-2023-52587: Fix not seen in stream +CVE-2023-52588: Fix not seen in stream +CVE-2023-52589: Fix not seen in stream +CVE-2023-52590: Fix not seen in stream +CVE-2023-52591: Fix not seen in stream +CVE-2023-52593: Fix not seen in stream +CVE-2023-52594: Fix not seen in stream +CVE-2023-52595: Fix not seen in stream +CVE-2023-52596: Fix not seen in stream +CVE-2023-52597: Fix not seen in stream +CVE-2023-52598: Fix not seen in stream +CVE-2023-52599: Fix not seen in stream +CVE-2023-52600: Fix not seen in stream +CVE-2023-52601: Fix not seen in stream +CVE-2023-52602: Fix not seen in stream +CVE-2023-52603: Fix not seen in stream +CVE-2023-52604: Fix not seen in stream +CVE-2023-52606: Fix not seen in stream +CVE-2023-52607: Fix not seen in stream +CVE-2023-52609: Fix not seen in stream +CVE-2023-52612: Fix not seen in stream +CVE-2023-52614: Fix not seen in stream +CVE-2023-52615: Fix not seen in stream +CVE-2023-52617: Fix not seen in stream +CVE-2023-52618: Fix not seen in stream +CVE-2023-52619: Fix not seen in stream +CVE-2023-52620: Fix not seen in stream +CVE-2023-52621: Fix not seen in stream +CVE-2023-52622: Fix not seen in stream +CVE-2023-52623: Fix not seen in stream +CVE-2023-52624: Fix not seen in stream +CVE-2023-52625: Fix not seen in stream +CVE-2023-52628: Fix not seen in stream +CVE-2023-52629: Fix not seen in stream +CVE-2023-52632: Fix not seen in stream +CVE-2023-52633: Fix not seen in stream +CVE-2023-52634: Fix not seen in stream +CVE-2023-52635: Fix not seen in stream +CVE-2023-52638: Fix not seen in stream +CVE-2023-52639: Fix not seen in stream +CVE-2023-52640: Fix not seen in stream +CVE-2023-52641: Fix not seen in stream CVE-2023-5717: Fix not seen in stream CVE-2023-6040: Fix not seen in stream CVE-2023-6121: Fix not seen in stream CVE-2023-6240: Fix unknown -CVE-2023-6270: Fix unknown -CVE-2023-6356: Fix unknown +CVE-2023-6270: Fix not seen in stream +CVE-2023-6356: Fix not seen in stream CVE-2023-6535: Fix unknown -CVE-2023-6536: Fix unknown +CVE-2023-6536: Fix not seen in stream CVE-2023-6546: Fix not seen in stream CVE-2023-6606: Fix not seen in stream CVE-2023-6610: Fix not seen in stream CVE-2023-6915: Fix not seen in stream CVE-2023-6931: Fix not seen in stream CVE-2023-6932: Fix not seen in stream -CVE-2023-7042: Fix unknown +CVE-2023-7042: Fix not seen in stream CVE-2023-7192: Fix not seen in stream CVE-2024-0340: Fix not seen in stream CVE-2024-0564: Fix unknown @@ -1025,10 +1242,11 @@ CVE-2024-1086: Fix not seen in stream CVE-2024-1151: Fix not seen in stream CVE-2024-1312: Fix not seen in stream CVE-2024-21803: Fix unknown -CVE-2024-22099: Fix unknown +CVE-2024-2193: Fix unknown +CVE-2024-22099: Fix not seen in stream CVE-2024-22386: Fix unknown -CVE-2024-23196: Fix unknown -CVE-2024-23307: Fix unknown +CVE-2024-23196: Fix not seen in stream +CVE-2024-23307: Fix not seen in stream CVE-2024-23848: Fix unknown CVE-2024-23849: Fix not seen in stream CVE-2024-23851: Fix not seen in stream @@ -1037,18 +1255,114 @@ CVE-2024-24857: Fix unknown CVE-2024-24858: Fix unknown CVE-2024-24859: Fix unknown CVE-2024-24860: Fix not seen in stream -CVE-2024-24861: Fix unknown +CVE-2024-24861: Fix not seen in stream CVE-2024-24864: Fix unknown CVE-2024-25739: Fix unknown CVE-2024-25740: Fix unknown CVE-2024-25741: Fix unknown CVE-2024-25744: Fix not seen in stream CVE-2024-26584: Fix not seen in stream -CVE-2024-26587: Fix not seen in stream -CVE-2024-26588: Fix not seen in stream -CVE-2024-26591: Fix not seen in stream CVE-2024-26592: Fix not seen in stream CVE-2024-26594: Fix not seen in stream CVE-2024-26595: Fix not seen in stream CVE-2024-26597: Fix not seen in stream CVE-2024-26598: Fix not seen in stream +CVE-2024-26600: Fix not seen in stream +CVE-2024-26602: Fix not seen in stream +CVE-2024-26606: Fix not seen in stream +CVE-2024-26614: Fix not seen in stream +CVE-2024-26622: Fix not seen in stream +CVE-2024-26623: Fix not seen in stream +CVE-2024-26625: Fix not seen in stream +CVE-2024-26627: Fix not seen in stream +CVE-2024-26633: Fix not seen in stream +CVE-2024-26635: Fix not seen in stream +CVE-2024-26636: Fix not seen in stream +CVE-2024-26640: Fix not seen in stream +CVE-2024-26641: Fix not seen in stream +CVE-2024-26642: Fix not seen in stream +CVE-2024-26644: Fix not seen in stream +CVE-2024-26645: Fix not seen in stream +CVE-2024-26646: Fix not seen in stream +CVE-2024-26647: Fix not seen in stream +CVE-2024-26648: Fix not seen in stream +CVE-2024-26650: Fix not seen in stream +CVE-2024-26651: Fix not seen in stream +CVE-2024-26654: Fix not seen in stream +CVE-2024-26655: Fix not seen in stream +CVE-2024-26656: Fix not seen in stream +CVE-2024-26658: Fix not seen in stream +CVE-2024-26659: Fix not seen in stream +CVE-2024-26663: Fix not seen in stream +CVE-2024-26664: Fix not seen in stream +CVE-2024-26668: Fix not seen in stream +CVE-2024-26671: Fix not seen in stream +CVE-2024-26672: Fix not seen in stream +CVE-2024-26675: Fix not seen in stream +CVE-2024-26676: Fix not seen in stream +CVE-2024-26677: Fix not seen in stream +CVE-2024-26679: Fix not seen in stream +CVE-2024-26685: Fix not seen in stream +CVE-2024-26686: Fix not seen in stream +CVE-2024-26687: Fix not seen in stream +CVE-2024-26689: Fix not seen in stream +CVE-2024-26691: Fix not seen in stream +CVE-2024-26696: Fix not seen in stream +CVE-2024-26697: Fix not seen in stream +CVE-2024-26699: Fix not seen in stream +CVE-2024-26700: Fix not seen in stream +CVE-2024-26704: Fix not seen in stream +CVE-2024-26706: Fix not seen in stream +CVE-2024-26713: Fix not seen in stream +CVE-2024-26715: Fix not seen in stream +CVE-2024-26719: Fix not seen in stream +CVE-2024-26720: Fix not seen in stream +CVE-2024-26726: Fix not seen in stream +CVE-2024-26733: Fix not seen in stream +CVE-2024-26735: Fix not seen in stream +CVE-2024-26736: Fix not seen in stream +CVE-2024-26738: Fix not seen in stream +CVE-2024-26739: Fix not seen in stream +CVE-2024-26740: Fix not seen in stream +CVE-2024-26743: Fix not seen in stream +CVE-2024-26744: Fix not seen in stream +CVE-2024-26745: Fix not seen in stream +CVE-2024-26748: Fix not seen in stream +CVE-2024-26751: Fix not seen in stream +CVE-2024-26752: Fix not seen in stream +CVE-2024-26754: Fix not seen in stream +CVE-2024-26756: Fix not seen in stream +CVE-2024-26757: Fix not seen in stream +CVE-2024-26758: Fix not seen in stream +CVE-2024-26759: Fix not seen in stream +CVE-2024-26763: Fix not seen in stream +CVE-2024-26764: Fix not seen in stream +CVE-2024-26765: Fix not seen in stream +CVE-2024-26766: Fix not seen in stream +CVE-2024-26767: Fix not seen in stream +CVE-2024-26768: Fix not seen in stream +CVE-2024-26769: Fix not seen in stream +CVE-2024-26770: Fix not seen in stream +CVE-2024-26771: Fix not seen in stream +CVE-2024-26772: Fix not seen in stream +CVE-2024-26773: Fix not seen in stream +CVE-2024-26774: Fix not seen in stream +CVE-2024-26775: Fix not seen in stream +CVE-2024-26776: Fix not seen in stream +CVE-2024-26777: Fix not seen in stream +CVE-2024-26778: Fix not seen in stream +CVE-2024-26779: Fix not seen in stream +CVE-2024-26784: Fix not seen in stream +CVE-2024-26789: Fix not seen in stream +CVE-2024-26791: Fix not seen in stream +CVE-2024-26793: Fix not seen in stream +CVE-2024-26797: Fix not seen in stream +CVE-2024-26798: Fix not seen in stream +CVE-2024-26801: Fix not seen in stream +CVE-2024-26802: Fix not seen in stream +CVE-2024-26803: Fix not seen in stream +CVE-2024-26804: Fix not seen in stream +CVE-2024-26805: Fix not seen in stream +CVE-2024-26806: Fix not seen in stream +CVE-2024-26808: Fix not seen in stream +CVE-2024-26809: Fix not seen in stream diff --git a/data/4.18/4.18_security.txt b/data/4.18/4.18_security.txt index 9e298a1fd..f3f7a71b0 100644 --- a/data/4.18/4.18_security.txt +++ b/data/4.18/4.18_security.txt @@ -328,6 +328,8 @@ Outstanding CVEs: CVE-2019-2181: (unk) binder: check for overflow when alloc for security context CVE-2019-2213: (unk) binder: fix possible UAF when freeing buffer CVE-2019-25045: (unk) xfrm: clean up xfrm protocol checks + CVE-2019-25160: (unk) netlabel: fix out-of-bounds memory accesses + CVE-2019-25162: (unk) i2c: Fix a potential use after free CVE-2019-3016: (unk) x86/kvm: Be careful not to clear KVM_VCPU_FLUSH_TLB bit CVE-2019-3459: (unk) Bluetooth: Verify that l2cap_get_conf_opt provides large enough buffer CVE-2019-3460: (unk) Bluetooth: Check L2CAP option sizes returned from l2cap_get_conf_opt @@ -523,6 +525,13 @@ Outstanding CVEs: CVE-2020-36691: (unk) netlink: limit recursion depth in policy validation CVE-2020-36694: (unk) netfilter: x_tables: Switch synchronization to RCU CVE-2020-36766: (unk) cec-api: prevent leaking memory through hole in structure + CVE-2020-36775: (unk) f2fs: fix to avoid potential deadlock + CVE-2020-36777: (unk) media: dvbdev: Fix memory leak in dvb_media_device_free() + CVE-2020-36780: (unk) i2c: sprd: fix reference leak when pm_runtime_get_sync fails + CVE-2020-36781: (unk) i2c: imx: fix reference leak when pm_runtime_get_sync fails + CVE-2020-36782: (unk) i2c: imx-lpi2c: fix reference leak when pm_runtime_get_sync fails + CVE-2020-36783: (unk) i2c: img-scb: fix reference leak when pm_runtime_get_sync fails + CVE-2020-36784: (unk) i2c: cadence: fix reference leak when pm_runtime_get_sync fails CVE-2020-3702: (unk) ath: Use safer key clearing with key cache entries CVE-2020-4788: (unk) powerpc/64s: flush L1D on kernel entry CVE-2020-7053: (unk) drm/i915: Introduce a mutex for file_priv->context_idr @@ -679,6 +688,117 @@ Outstanding CVEs: CVE-2021-45485: (unk) ipv6: use prandom_u32() for ID generation CVE-2021-45486: (unk) inet: use bigger hash table for IP ID generation CVE-2021-45868: (unk) quota: check block number when reading the block in quota file + CVE-2021-46904: (unk) net: hso: fix null-ptr-deref during tty device unregistration + CVE-2021-46906: (unk) HID: usbhid: fix info leak in hid_submit_ctrl + CVE-2021-46908: (unk) bpf: Use correct permission flag for mixed signed bounds arithmetic + CVE-2021-46909: (unk) ARM: footbridge: fix PCI interrupt mapping + CVE-2021-46915: (unk) netfilter: nft_limit: avoid possible divide error in nft_limit_init + CVE-2021-46921: (unk) locking/qrwlock: Fix ordering in queued_write_lock_slowpath() + CVE-2021-46924: (unk) NFC: st21nfca: Fix memory leak in device probe and remove + CVE-2021-46925: (unk) net/smc: fix kernel panic caused by race of smc_sock + CVE-2021-46926: (unk) ALSA: hda: intel-sdw-acpi: harden detection of controller + CVE-2021-46928: (unk) parisc: Clear stale IIR value on instruction access rights trap + CVE-2021-46929: (unk) sctp: use call_rcu to free endpoint + CVE-2021-46932: (unk) Input: appletouch - initialize work before device registration + CVE-2021-46933: (unk) usb: gadget: f_fs: Clear ffs_eventfd in ffs_data_clear. + CVE-2021-46934: (unk) i2c: validate user data in compat ioctl + CVE-2021-46935: (unk) binder: fix async_free_space accounting for empty parcels + CVE-2021-46936: (unk) net: fix use-after-free in tw_timer_handler + CVE-2021-46938: (unk) dm rq: fix double free of blk_mq_tag_set in dev remove after table load fails + CVE-2021-46939: (unk) tracing: Restructure trace_clock_global() to never block + CVE-2021-46941: (unk) usb: dwc3: core: Do core softreset when switch mode + CVE-2021-46950: (unk) md/raid1: properly indicate failure when ending a failed write request + CVE-2021-46951: (unk) tpm: efi: Use local variable for calculating final log size + CVE-2021-46952: (unk) NFS: fs_context: validate UDP retrans to prevent shift out-of-bounds + CVE-2021-46953: (unk) ACPI: GTDT: Don't corrupt interrupt mappings on watchdow probe failure + CVE-2021-46955: (unk) openvswitch: fix stack OOB read while fragmenting IPv4 packets + CVE-2021-46959: (unk) spi: Fix use-after-free with devm_spi_alloc_* + CVE-2021-46960: (unk) cifs: Return correct error code from smb2_get_enc_key + CVE-2021-46962: (unk) mmc: uniphier-sd: Fix a resource leak in the remove function + CVE-2021-46965: (unk) mtd: physmap: physmap-bt1-rom: Fix unintentional stack access + CVE-2021-46969: (unk) bus: mhi: core: Fix invalid error returning in mhi_queue + CVE-2021-46970: (unk) bus: mhi: pci_generic: Remove WQ_MEM_RECLAIM flag from state workqueue + CVE-2021-46982: (unk) f2fs: compress: fix race condition of overwrite vs truncate + CVE-2021-46984: (unk) kyber: fix out of bounds access when preempted + CVE-2021-46988: (unk) userfaultfd: release page in error path to avoid BUG_ON + CVE-2021-46991: (unk) i40e: Fix use-after-free in i40e_client_subtask() + CVE-2021-46992: (unk) netfilter: nftables: avoid overflows in nft_hash_buckets() + CVE-2021-46998: (unk) ethernet:enic: Fix a use after free bug in enic_hard_start_xmit + CVE-2021-47006: (unk) ARM: 9064/1: hw_breakpoint: Do not directly check the event's overflow_handler hook + CVE-2021-47010: (unk) net: Only allow init netns to set default tcp cong to a restricted algo + CVE-2021-47013: (unk) net:emac/emac-mac: Fix a use after free in emac_mac_tx_buf_send + CVE-2021-47020: (unk) soundwire: stream: fix memory leak in stream config error path + CVE-2021-47028: (unk) mt76: mt7915: fix txrate reporting + CVE-2021-47034: (unk) powerpc/64s: Fix pte update for kernel memory on radix + CVE-2021-47046: (unk) drm/amd/display: Fix off by one in hdmi_14_process_transaction() + CVE-2021-47049: (unk) Drivers: hv: vmbus: Use after free in __vmbus_open() + CVE-2021-47052: (unk) crypto: sa2ul - Fix memory leak of rxd + CVE-2021-47054: (unk) bus: qcom: Put child node before return + CVE-2021-47056: (unk) crypto: qat - ADF_STATUS_PF_RUNNING should be set after adf_dev_init + CVE-2021-47059: (unk) crypto: sun8i-ss - fix result memory leak on error path + CVE-2021-47063: (unk) drm: bridge/panel: Cleanup connector on bridge detach + CVE-2021-47065: (unk) rtw88: Fix array overrun in rtw_get_tx_power_params() + CVE-2021-47070: (unk) uio_hv_generic: Fix another memory leak in error handling paths + CVE-2021-47073: (unk) platform/x86: dell-smbios-wmi: Fix oops on rmmod dell_smbios + CVE-2021-47074: (unk) nvme-loop: fix memory leak in nvme_loop_create_ctrl() + CVE-2021-47075: (unk) nvmet: fix memory leak in nvmet_alloc_ctrl() + CVE-2021-47076: (unk) RDMA/rxe: Return CQE error if invalid lkey was supplied + CVE-2021-47077: (unk) scsi: qedf: Add pointer checks in qedf_update_link_speed() + CVE-2021-47078: (unk) RDMA/rxe: Clear all QP fields if creation failed + CVE-2021-47082: (unk) tun: avoid double free in tun_free_netdev + CVE-2021-47083: (unk) pinctrl: mediatek: fix global-out-of-bounds issue + CVE-2021-47086: (unk) phonet/pep: refuse to enable an unbound pipe + CVE-2021-47100: (unk) ipmi: Fix UAF when uninstall ipmi_si and ipmi_msghandler module + CVE-2021-47101: (unk) asix: fix uninit-value in asix_mdio_read() + CVE-2021-47103: (unk) inet: fully convert sk->sk_rx_dst to RCU rules + CVE-2021-47110: (unk) x86/kvm: Disable kvmclock on all CPUs on shutdown + CVE-2021-47112: (unk) x86/kvm: Teardown PV features on boot CPU as well + CVE-2021-47113: (unk) btrfs: abort in rename_exchange if we fail to insert the second ref + CVE-2021-47114: (unk) ocfs2: fix data corruption by fallocate + CVE-2021-47116: (unk) ext4: fix memory leak in ext4_mb_init_backend on error path. + CVE-2021-47117: (unk) ext4: fix bug on in ext4_es_cache_extent as ext4_split_extent_at failed + CVE-2021-47118: (unk) pid: take a reference when initializing `cad_pid` + CVE-2021-47119: (unk) ext4: fix memory leak in ext4_fill_super + CVE-2021-47121: (unk) net: caif: fix memory leak in cfusbl_device_notify + CVE-2021-47122: (unk) net: caif: fix memory leak in caif_device_notify + CVE-2021-47124: (unk) io_uring: fix link timeout refs + CVE-2021-47125: (unk) sch_htb: fix refcount leak in htb_parent_to_leaf_offload + CVE-2021-47128: (unk) bpf, lockdown, audit: Fix buggy SELinux lockdown permission checks + CVE-2021-47131: (unk) net/tls: Fix use-after-free after the TLS device goes down and up + CVE-2021-47133: (unk) HID: amd_sfh: Fix memory leak in amd_sfh_work + CVE-2021-47135: (unk) mt76: mt7921: fix possible AOOB issue in mt7921_mcu_tx_rate_report + CVE-2021-47136: (unk) net: zero-initialize tc skb extension on allocation + CVE-2021-47137: (unk) net: lantiq: fix memory corruption in RX ring + CVE-2021-47140: (unk) iommu/amd: Clear DMA ops when switching domain + CVE-2021-47142: (unk) drm/amdgpu: Fix a use-after-free + CVE-2021-47143: (unk) net/smc: remove device from smcd_dev_list after failed device_add() + CVE-2021-47144: (unk) drm/amd/amdgpu: fix refcount leak + CVE-2021-47145: (unk) btrfs: do not BUG_ON in link_to_fixup_dir + CVE-2021-47146: (unk) mld: fix panic in mld_newpack() + CVE-2021-47147: (unk) ptp: ocp: Fix a resource leak in an error handling path + CVE-2021-47149: (unk) net: fujitsu: fix potential null-ptr-deref + CVE-2021-47150: (unk) net: fec: fix the potential memory leak in fec_enet_init() + CVE-2021-47151: (unk) interconnect: qcom: bcm-voter: add a missing of_node_put() + CVE-2021-47153: (unk) i2c: i801: Don't generate an interrupt on bus reset + CVE-2021-47158: (unk) net: dsa: sja1105: add error handling in sja1105_setup() + CVE-2021-47159: (unk) net: dsa: fix a crash if ->get_sset_count() fails + CVE-2021-47160: (unk) net: dsa: mt7530: fix VLAN traffic leaks + CVE-2021-47161: (unk) spi: spi-fsl-dspi: Fix a resource leak in an error handling path + CVE-2021-47162: (unk) tipc: skb_linearize the head skb when reassembling msgs + CVE-2021-47163: (unk) tipc: wait and exit until all work queues are done + CVE-2021-47165: (unk) drm/meson: fix shutdown crash when component not probed + CVE-2021-47166: (unk) NFS: Don't corrupt the value of pg_bytes_written in nfs_do_recoalesce() + CVE-2021-47167: (unk) NFS: Fix an Oopsable condition in __nfs_pageio_add_request() + CVE-2021-47168: (unk) NFS: fix an incorrect limit in filelayout_decode_layout() + CVE-2021-47169: (unk) serial: rp2: use 'request_firmware' instead of 'request_firmware_nowait' + CVE-2021-47170: (unk) USB: usbfs: Don't WARN about excessively large memory allocations + CVE-2021-47171: (unk) net: usb: fix memory leak in smsc75xx_bind + CVE-2021-47172: (unk) iio: adc: ad7124: Fix potential overflow due to non sequential channel numbers + CVE-2021-47173: (unk) misc/uss720: fix memory leak in uss720_probe + CVE-2021-47175: (unk) net/sched: fq_pie: fix OOB access in the traffic path + CVE-2021-47177: (unk) iommu/vt-d: Fix sysfs leak in alloc_iommu() + CVE-2021-47179: (unk) NFSv4: Fix a NULL pointer dereference in pnfs_mark_matching_lsegs_return() + CVE-2021-47180: (unk) NFC: nci: fix memory leak in nci_allocate_device CVE-2022-0001: (unk) x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE CVE-2022-0002: (unk) x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE CVE-2022-0168: (unk) cifs: fix NULL ptr dereference in smb2_ioctl_query_info() @@ -873,6 +993,9 @@ Outstanding CVEs: CVE-2022-47520: (unk) wifi: wilc1000: validate pairwise and authentication suite offsets CVE-2022-47929: (unk) net: sched: disallow noqueue for qdisc classes CVE-2022-48619: (unk) Input: add bounds checking to input_set_capability() + CVE-2022-48626: (unk) moxart: fix potential use-after-free on remove path + CVE-2022-48627: (unk) vt: fix memory overlapping when deleting chars in the buffer + CVE-2022-48628: (unk) ceph: drop messages from MDS when unmounting CVE-2023-0030: (unk) drm/nouveau/mmu: add more general vmm free/node handling functions CVE-2023-0047: (unk) mm, oom: do not trigger out_of_memory from the #PF CVE-2023-0266: (unk) ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF @@ -936,6 +1059,7 @@ Outstanding CVEs: CVE-2023-28328: (unk) media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer() CVE-2023-28466: (unk) net: tls: fix possible race condition between do_tls_getsockopt_conf() and do_tls_setsockopt_conf() CVE-2023-2860: (unk) ipv6: sr: fix out-of-bounds read when setting HMAC data. + CVE-2023-28746: (unk) x86/mmio: Disable KVM mitigation when X86_FEATURE_CLEAR_CPU_BUF is set CVE-2023-28772: (unk) seq_buf: Fix overflow in seq_buf_putmem_hex() CVE-2023-2985: (unk) fs: hfsplus: fix UAF issue in hfsplus_put_super CVE-2023-3006: (unk) arm64: Add AMPERE1 to the Spectre-BHB affected list @@ -1006,7 +1130,7 @@ Outstanding CVEs: CVE-2023-4623: (unk) net/sched: sch_hfsc: Ensure inner classes have fsc curve CVE-2023-46343: (unk) nfc: nci: fix possible NULL pointer dereference in send_acknowledge() CVE-2023-46838: (unk) xen-netback: don't produce zero-size SKB frags - CVE-2023-47233: (unk) + CVE-2023-47233: (unk) wifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach CVE-2023-4881: (unk) netfilter: nftables: exthdr: fix 4-byte stack OOB write CVE-2023-4921: (unk) net: sched: sch_qfq: Fix UAF in qfq_dequeue() CVE-2023-51042: (unk) drm/amdgpu: Fix potential fence use-after-free v2 @@ -1028,25 +1152,118 @@ Outstanding CVEs: CVE-2023-52445: (unk) media: pvrusb2: fix use after free on context disconnection CVE-2023-52449: (unk) mtd: Fix gluebi NULL pointer dereference caused by ftl notifier CVE-2023-52451: (unk) powerpc/pseries/memhp: Fix access beyond end of drmem array - CVE-2023-52456: (unk) serial: imx: fix tx statemachine deadlock - CVE-2023-52457: (unk) serial: 8250: omap: Don't skip resource freeing if pm_runtime_resume_and_get() failed CVE-2023-52458: (unk) block: add check that partition length needs to be aligned with block size CVE-2023-52464: (unk) EDAC/thunderx: Fix possible out-of-bounds string access + CVE-2023-52469: (unk) drivers/amd/pm: fix a use-after-free in kv_parse_power_table + CVE-2023-52470: (unk) drm/radeon: check the alloc_workqueue return value in radeon_crtc_init() + CVE-2023-52474: (unk) IB/hfi1: Fix bugs with non-PAGE_SIZE-end multi-iovec user SDMA requests + CVE-2023-52475: (unk) Input: powermate - fix use-after-free in powermate_config_complete + CVE-2023-52476: (unk) perf/x86/lbr: Filter vsyscall addresses + CVE-2023-52477: (unk) usb: hub: Guard against accesses to uninitialized BOS descriptors + CVE-2023-52478: (unk) HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect + CVE-2023-52479: (unk) ksmbd: fix uaf in smb20_oplock_break_ack + CVE-2023-52480: (unk) ksmbd: fix race condition between session lookup and expire + CVE-2023-52481: (unk) arm64: errata: Add Cortex-A520 speculative unprivileged load workaround + CVE-2023-52482: (unk) x86/srso: Add SRSO mitigation for Hygon processors + CVE-2023-52484: (unk) iommu/arm-smmu-v3: Fix soft lockup triggered by arm_smmu_mm_invalidate_range + CVE-2023-52485: (unk) drm/amd/display: Wake DMCUB before sending a command + CVE-2023-52486: (unk) drm: Don't unref the same fb many times by mistake due to deadlock handling + CVE-2023-52488: (unk) serial: sc16is7xx: convert from _raw_ to _noinc_ regmap functions for FIFO + CVE-2023-52489: (unk) mm/sparsemem: fix race in accessing memory_section->usage + CVE-2023-52491: (unk) media: mtk-jpeg: Fix use after free bug due to error path handling in mtk_jpeg_dec_device_run + CVE-2023-52498: (unk) PM: sleep: Fix possible deadlocks in core system-wide PM code + CVE-2023-52500: (unk) scsi: pm80xx: Avoid leaking tags when processing OPC_INB_SET_CONTROLLER_CONFIG command + CVE-2023-52501: (unk) ring-buffer: Do not attempt to read past "commit" + CVE-2023-52502: (unk) net: nfc: fix races in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn() + CVE-2023-52504: (unk) x86/alternatives: Disable KASAN in apply_alternatives() + CVE-2023-52506: (unk) LoongArch: Set all reserved memblocks on Node#0 at initialization + CVE-2023-52507: (unk) nfc: nci: assert requested protocol is valid + CVE-2023-52508: (unk) nvme-fc: Prevent null pointer dereference in nvme_fc_io_getuuid() + CVE-2023-52509: (unk) ravb: Fix use-after-free issue in ravb_tx_timeout_work() + CVE-2023-52510: (unk) ieee802154: ca8210: Fix a potential UAF in ca8210_probe + CVE-2023-52511: (unk) spi: sun6i: reduce DMA RX transfer width to single byte + CVE-2023-52515: (unk) RDMA/srp: Do not call scsi_done() from srp_abort() + CVE-2023-52516: (unk) dma-debug: don't call __dma_entry_alloc_check_leak() under free_entries_lock + CVE-2023-52517: (unk) spi: sun6i: fix race between DMA RX transfer completion and RX FIFO drain + CVE-2023-52519: (unk) HID: intel-ish-hid: ipc: Disable and reenable ACPI GPE bit + CVE-2023-52522: (unk) net: fix possible store tearing in neigh_periodic_work() + CVE-2023-52527: (unk) ipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data() + CVE-2023-52528: (unk) net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg + CVE-2023-52530: (unk) wifi: mac80211: fix potential key use-after-free + CVE-2023-52531: (unk) wifi: iwlwifi: mvm: Fix a memory corruption issue + CVE-2023-52532: (unk) net: mana: Fix TX CQE error handling + CVE-2023-52559: (unk) iommu/vt-d: Avoid memory allocation in iommu_suspend() + CVE-2023-52561: (unk) arm64: dts: qcom: sdm845-db845c: Mark cont splash memory region as reserved + CVE-2023-52563: (unk) drm/meson: fix memory leak on ->hpd_notify callback + CVE-2023-52565: (unk) media: uvcvideo: Fix OOB read + CVE-2023-52566: (unk) nilfs2: fix potential use after free in nilfs_gccache_submit_read_data() + CVE-2023-52568: (unk) x86/sgx: Resolves SECS reclaim vs. page fault for EAUG race + CVE-2023-52569: (unk) btrfs: remove BUG() after failure to insert delayed dir index item + CVE-2023-52571: (unk) power: supply: rk817: Fix node refcount leak + CVE-2023-52572: (unk) cifs: Fix UAF in cifs_demultiplex_thread() + CVE-2023-52574: (unk) team: fix null-ptr-deref when team device type is changed + CVE-2023-52578: (unk) net: bridge: use DEV_STATS_INC() + CVE-2023-52583: (unk) ceph: fix deadlock or deadcode of misusing dget() + CVE-2023-52584: (unk) spmi: mediatek: Fix UAF on device remove + CVE-2023-52585: (unk) drm/amdgpu: Fix possible NULL dereference in amdgpu_ras_query_error_status_helper() + CVE-2023-52586: (unk) drm/msm/dpu: Add mutex lock in control vblank irq + CVE-2023-52587: (unk) IB/ipoib: Fix mcast list locking + CVE-2023-52588: (unk) f2fs: fix to tag gcing flag on page during block migration + CVE-2023-52589: (unk) media: rkisp1: Fix IRQ disable race issue + CVE-2023-52590: (unk) ocfs2: Avoid touching renamed directory if parent does not change + CVE-2023-52591: (unk) reiserfs: Avoid touching renamed directory if parent does not change + CVE-2023-52593: (unk) wifi: wfx: fix possible NULL pointer dereference in wfx_set_mfp_ap() + CVE-2023-52594: (unk) wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus() + CVE-2023-52595: (unk) wifi: rt2x00: restart beacon queue when hardware reset + CVE-2023-52596: (unk) sysctl: Fix out of bounds access for empty sysctl registers + CVE-2023-52597: (unk) KVM: s390: fix setting of fpc register + CVE-2023-52598: (unk) s390/ptrace: handle setting of fpc register correctly + CVE-2023-52599: (unk) jfs: fix array-index-out-of-bounds in diNewExt + CVE-2023-52600: (unk) jfs: fix uaf in jfs_evict_inode + CVE-2023-52601: (unk) jfs: fix array-index-out-of-bounds in dbAdjTree + CVE-2023-52602: (unk) jfs: fix slab-out-of-bounds Read in dtSearch + CVE-2023-52603: (unk) UBSAN: array-index-out-of-bounds in dtSplitRoot + CVE-2023-52604: (unk) FS:JFS:UBSAN:array-index-out-of-bounds in dbAdjTree + CVE-2023-52606: (unk) powerpc/lib: Validate size for vector operations + CVE-2023-52607: (unk) powerpc/mm: Fix null-pointer dereference in pgtable_cache_add + CVE-2023-52609: (unk) binder: fix race between mmput() and do_exit() + CVE-2023-52612: (unk) crypto: scomp - fix req->dst buffer overflow + CVE-2023-52614: (unk) PM / devfreq: Fix buffer overflow in trans_stat_show + CVE-2023-52615: (unk) hwrng: core - Fix page fault dead lock on mmap-ed hwrng + CVE-2023-52617: (unk) PCI: switchtec: Fix stdev_release() crash after surprise hot remove + CVE-2023-52618: (unk) block/rnbd-srv: Check for unlikely string overflow + CVE-2023-52619: (unk) pstore/ram: Fix crash when setting number of cpus to an odd number + CVE-2023-52620: (unk) netfilter: nf_tables: disallow timeout for anonymous sets + CVE-2023-52621: (unk) bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers + CVE-2023-52622: (unk) ext4: avoid online resizing failures due to oversized flex bg + CVE-2023-52623: (unk) SUNRPC: Fix a suspicious RCU usage warning + CVE-2023-52624: (unk) drm/amd/display: Wake DMCUB before executing GPINT commands + CVE-2023-52625: (unk) drm/amd/display: Refactor DMCUB enter/exit idle interface + CVE-2023-52628: (unk) netfilter: nftables: exthdr: fix 4-byte stack OOB write + CVE-2023-52629: (unk) sh: push-switch: Reorder cleanup operations to avoid use-after-free bug + CVE-2023-52632: (unk) drm/amdkfd: Fix lock dependency warning with srcu + CVE-2023-52633: (unk) um: time-travel: fix time corruption + CVE-2023-52634: (unk) drm/amd/display: Fix disable_otg_wa logic + CVE-2023-52635: (unk) PM / devfreq: Synchronize devfreq_monitor_[start/stop] + CVE-2023-52638: (unk) can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock + CVE-2023-52639: (unk) KVM: s390: vsie: fix race during shadow creation + CVE-2023-52640: (unk) fs/ntfs3: Fix oob in ntfs_listxattr + CVE-2023-52641: (unk) fs/ntfs3: Add NULL ptr dereference checking at the end of attr_allocate_frame() CVE-2023-5717: (unk) perf: Disallow mis-matched inherited group reads CVE-2023-6040: (unk) netfilter: nf_tables: Reject tables of unsupported family CVE-2023-6121: (unk) nvmet: nul-terminate the NQNs passed in the connect command CVE-2023-6240: (unk) - CVE-2023-6270: (unk) - CVE-2023-6356: (unk) + CVE-2023-6270: (unk) aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts + CVE-2023-6356: (unk) nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length CVE-2023-6535: (unk) - CVE-2023-6536: (unk) + CVE-2023-6536: (unk) nvmet-tcp: fix a crash in nvmet_req_complete() CVE-2023-6546: (unk) tty: n_gsm: fix the UAF caused by race condition in gsm_cleanup_mux CVE-2023-6606: (unk) smb: client: fix OOB in smbCalcSize() CVE-2023-6610: (unk) smb: client: fix potential OOB in smb2_dump_detail() CVE-2023-6915: (unk) ida: Fix crash in ida_free when the bitmap is empty CVE-2023-6931: (unk) perf: Fix perf_event_validate_size() CVE-2023-6932: (unk) ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet - CVE-2023-7042: (unk) + CVE-2023-7042: (unk) wifi: ath10k: fix NULL pointer dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev() CVE-2023-7192: (unk) netfilter: ctnetlink: fix possible refcount leak in ctnetlink_create_conntrack() CVE-2024-0340: (unk) vhost: use kzalloc() instead of kmalloc() followed by memset() CVE-2024-0564: (unk) @@ -1057,10 +1274,11 @@ Outstanding CVEs: CVE-2024-1151: (unk) net: openvswitch: limit the number of recursions from action sets CVE-2024-1312: (unk) mm: lock_vma_under_rcu() must check vma->anon_vma under vma lock CVE-2024-21803: (unk) - CVE-2024-22099: (unk) + CVE-2024-2193: (unk) + CVE-2024-22099: (unk) Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security CVE-2024-22386: (unk) - CVE-2024-23196: (unk) - CVE-2024-23307: (unk) + CVE-2024-23196: (unk) ALSA: hda: fix a possible null-pointer dereference due to data race in snd_hdac_regmap_sync() + CVE-2024-23307: (unk) md/raid5: fix atomicity violation in raid5_cache_count CVE-2024-23848: (unk) CVE-2024-23849: (unk) net/rds: Fix UBSAN: array-index-out-of-bounds in rds_cmsg_recv CVE-2024-23851: (unk) dm: limit the number of targets and parameter size area @@ -1069,18 +1287,114 @@ Outstanding CVEs: CVE-2024-24858: (unk) CVE-2024-24859: (unk) CVE-2024-24860: (unk) Bluetooth: Fix atomicity violation in {min,max}_key_size_set - CVE-2024-24861: (unk) + CVE-2024-24861: (unk) media: xc4000: Fix atomicity violation in xc4000_get_frequency CVE-2024-24864: (unk) CVE-2024-25739: (unk) CVE-2024-25740: (unk) CVE-2024-25741: (unk) CVE-2024-25744: (unk) x86/coco: Disable 32-bit emulation by default on TDX and SEV CVE-2024-26584: (unk) net: tls: handle backlogging of crypto requests - CVE-2024-26587: (unk) net: netdevsim: don't try to destroy PHC on VFs - CVE-2024-26588: (unk) LoongArch: BPF: Prevent out-of-bounds memory access - CVE-2024-26591: (unk) bpf: Fix re-attachment branch in bpf_tracing_prog_attach CVE-2024-26592: (unk) ksmbd: fix UAF issue in ksmbd_tcp_new_connection() CVE-2024-26594: (unk) ksmbd: validate mech token in session setup CVE-2024-26595: (unk) mlxsw: spectrum_acl_tcam: Fix NULL pointer dereference in error path CVE-2024-26597: (unk) net: qualcomm: rmnet: fix global oob in rmnet_policy CVE-2024-26598: (unk) KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache + CVE-2024-26600: (unk) phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP + CVE-2024-26602: (unk) sched/membarrier: reduce the ability to hammer on sys_membarrier + CVE-2024-26606: (unk) binder: signal epoll threads of self-work + CVE-2024-26614: (unk) tcp: make sure init the accept_queue's spinlocks once + CVE-2024-26622: (unk) tomoyo: fix UAF write bug in tomoyo_write_control() + CVE-2024-26623: (unk) pds_core: Prevent race issues involving the adminq + CVE-2024-26625: (unk) llc: call sock_orphan() at release time + CVE-2024-26627: (unk) scsi: core: Move scsi_host_busy() out of host lock for waking up EH handler + CVE-2024-26633: (unk) ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim() + CVE-2024-26635: (unk) llc: Drop support for ETH_P_TR_802_2. + CVE-2024-26636: (unk) llc: make llc_ui_sendmsg() more robust against bonding changes + CVE-2024-26640: (unk) tcp: add sanity checks to rx zerocopy + CVE-2024-26641: (unk) ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv() + CVE-2024-26642: (unk) netfilter: nf_tables: disallow anonymous set with timeout flag + CVE-2024-26644: (unk) btrfs: don't abort filesystem when attempting to snapshot deleted subvolume + CVE-2024-26645: (unk) tracing: Ensure visibility when inserting an element into tracing_map + CVE-2024-26646: (unk) thermal: intel: hfi: Add syscore callbacks for system-wide PM + CVE-2024-26647: (unk) drm/amd/display: Fix late derefrence 'dsc' check in 'link_set_dsc_pps_packet()' + CVE-2024-26648: (unk) drm/amd/display: Fix variable deferencing before NULL check in edp_setup_replay() + CVE-2024-26650: (unk) platform/x86: p2sb: Allow p2sb_bar() calls during PCI device probe + CVE-2024-26651: (unk) sr9800: Add check for usbnet_get_endpoints + CVE-2024-26654: (unk) ALSA: sh: aica: reorder cleanup operations to avoid UAF bugs + CVE-2024-26655: (unk) Fix memory leak in posix_clock_open() + CVE-2024-26656: (unk) drm/amdgpu: fix use-after-free bug + CVE-2024-26658: (unk) bcachefs: grab s_umount only if snapshotting + CVE-2024-26659: (unk) xhci: handle isoc Babble and Buffer Overrun events properly + CVE-2024-26663: (unk) tipc: Check the bearer type before calling tipc_udp_nl_bearer_add() + CVE-2024-26664: (unk) hwmon: (coretemp) Fix out-of-bounds memory access + CVE-2024-26668: (unk) netfilter: nft_limit: reject configurations that cause integer overflow + CVE-2024-26671: (unk) blk-mq: fix IO hang from sbitmap wakeup race + CVE-2024-26672: (unk) drm/amdgpu: Fix variable 'mca_funcs' dereferenced before NULL check in 'amdgpu_mca_smu_get_mca_entry()' + CVE-2024-26675: (unk) ppp_async: limit MRU to 64K + CVE-2024-26676: (unk) af_unix: Call kfree_skb() for dead unix_(sk)->oob_skb in GC. + CVE-2024-26677: (unk) rxrpc: Fix delayed ACKs to not set the reference serial number + CVE-2024-26679: (unk) inet: read sk->sk_family once in inet_recv_error() + CVE-2024-26685: (unk) nilfs2: fix potential bug in end_buffer_async_write + CVE-2024-26686: (unk) fs/proc: do_task_stat: use sig->stats_lock to gather the threads/children stats + CVE-2024-26687: (unk) xen/events: close evtchn after mapping cleanup + CVE-2024-26689: (unk) ceph: prevent use-after-free in encode_cap_msg() + CVE-2024-26691: (unk) KVM: arm64: Fix circular locking dependency + CVE-2024-26696: (unk) nilfs2: fix hang in nilfs_lookup_dirty_data_buffers() + CVE-2024-26697: (unk) nilfs2: fix data corruption in dsync block recovery for small block sizes + CVE-2024-26699: (unk) drm/amd/display: Fix array-index-out-of-bounds in dcn35_clkmgr + CVE-2024-26700: (unk) drm/amd/display: Fix MST Null Ptr for RV + CVE-2024-26704: (unk) ext4: fix double-free of blocks due to wrong extents moved_len + CVE-2024-26706: (unk) parisc: Fix random data corruption from exception handler + CVE-2024-26713: (unk) powerpc/pseries/iommu: Fix iommu initialisation during DLPAR add + CVE-2024-26715: (unk) usb: dwc3: gadget: Fix NULL pointer dereference in dwc3_gadget_suspend + CVE-2024-26719: (unk) nouveau: offload fence uevents work to workqueue + CVE-2024-26720: (unk) mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again + CVE-2024-26726: (unk) btrfs: don't drop extent_map for free space inode on write error + CVE-2024-26733: (unk) arp: Prevent overflow in arp_req_get(). + CVE-2024-26735: (unk) ipv6: sr: fix possible use-after-free and null-ptr-deref + CVE-2024-26736: (unk) afs: Increase buffer size in afs_update_volume_status() + CVE-2024-26738: (unk) powerpc/pseries/iommu: DLPAR add doesn't completely initialize pci_controller + CVE-2024-26739: (unk) net/sched: act_mirred: don't override retval if we already lost the skb + CVE-2024-26740: (unk) net/sched: act_mirred: use the backlog for mirred ingress + CVE-2024-26743: (unk) RDMA/qedr: Fix qedr_create_user_qp error flow + CVE-2024-26744: (unk) RDMA/srpt: Support specifying the srpt_service_guid parameter + CVE-2024-26745: (unk) powerpc/pseries/iommu: IOMMU table is not initialized for kdump over SR-IOV + CVE-2024-26748: (unk) usb: cdns3: fix memory double free when handle zero packet + CVE-2024-26751: (unk) ARM: ep93xx: Add terminator to gpiod_lookup_table + CVE-2024-26752: (unk) l2tp: pass correct message length to ip6_append_data + CVE-2024-26754: (unk) gtp: fix use-after-free and null-ptr-deref in gtp_genl_dump_pdp() + CVE-2024-26756: (unk) md: Don't register sync_thread for reshape directly + CVE-2024-26757: (unk) md: Don't ignore read-only array in md_check_recovery() + CVE-2024-26758: (unk) md: Don't ignore suspended array in md_check_recovery() + CVE-2024-26759: (unk) mm/swap: fix race when skipping swapcache + CVE-2024-26763: (unk) dm-crypt: don't modify the data when using authenticated encryption + CVE-2024-26764: (unk) fs/aio: Restrict kiocb_set_cancel_fn() to I/O submitted via libaio + CVE-2024-26765: (unk) LoongArch: Disable IRQ before init_fn() for nonboot CPUs + CVE-2024-26766: (unk) IB/hfi1: Fix sdma.h tx->num_descs off-by-one error + CVE-2024-26767: (unk) drm/amd/display: fixed integer types and null check locations + CVE-2024-26768: (unk) LoongArch: Change acpi_core_pic[NR_CPUS] to acpi_core_pic[MAX_CORE_PIC] + CVE-2024-26769: (unk) nvmet-fc: avoid deadlock on delete association path + CVE-2024-26770: (unk) HID: nvidia-shield: Add missing null pointer checks to LED initialization + CVE-2024-26771: (unk) dmaengine: ti: edma: Add some null pointer checks to the edma_probe + CVE-2024-26772: (unk) ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal() + CVE-2024-26773: (unk) ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found() + CVE-2024-26774: (unk) ext4: avoid dividing by 0 in mb_update_avg_fragment_size() when block bitmap corrupt + CVE-2024-26775: (unk) aoe: avoid potential deadlock at set_capacity + CVE-2024-26776: (unk) spi: hisi-sfc-v3xx: Return IRQ_NONE if no interrupts were detected + CVE-2024-26777: (unk) fbdev: sis: Error out if pixclock equals zero + CVE-2024-26778: (unk) fbdev: savage: Error out if pixclock equals zero + CVE-2024-26779: (unk) wifi: mac80211: fix race condition on enabling fast-xmit + CVE-2024-26784: (unk) pmdomain: arm: Fix NULL dereference on scmi_perf_domain removal + CVE-2024-26789: (unk) crypto: arm64/neonbs - fix out-of-bounds access on short input + CVE-2024-26791: (unk) btrfs: dev-replace: properly validate device names + CVE-2024-26793: (unk) gtp: fix use-after-free and null-ptr-deref in gtp_newlink() + CVE-2024-26797: (unk) drm/amd/display: Prevent potential buffer overflow in map_hw_resources + CVE-2024-26798: (unk) fbcon: always restore the old font data in fbcon_do_set_font() + CVE-2024-26801: (unk) Bluetooth: Avoid potential use-after-free in hci_error_reset + CVE-2024-26802: (unk) stmmac: Clear variable when destroying workqueue + CVE-2024-26803: (unk) net: veth: clear GRO when clearing XDP even when down + CVE-2024-26804: (unk) net: ip_tunnel: prevent perpetual headroom growth + CVE-2024-26805: (unk) netlink: Fix kernel-infoleak-after-free in __skb_datagram_iter + CVE-2024-26806: (unk) spi: cadence-qspi: remove system-wide suspend helper calls from runtime PM hooks + CVE-2024-26808: (unk) netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain + CVE-2024-26809: (unk) netfilter: nft_set_pipapo: release elements in clone only from destroy path diff --git a/data/4.19/4.19_CVEs.txt b/data/4.19/4.19_CVEs.txt index d6932846c..1f8dfb6f1 100644 --- a/data/4.19/4.19_CVEs.txt +++ b/data/4.19/4.19_CVEs.txt @@ -265,6 +265,8 @@ CVE-2019-2101: Fixed with 4.19.29 CVE-2019-2181: Fix not seen in stream CVE-2019-2213: Fixed with 4.19.64 CVE-2019-25045: Fixed with 4.19.46 +CVE-2019-25160: Fixed with 4.19.28 +CVE-2019-25162: Fixed with 4.19.256 CVE-2019-3016: Fixed with 4.19.103 CVE-2019-3459: Fixed with 4.19.33 CVE-2019-3460: Fixed with 4.19.33 @@ -460,6 +462,13 @@ CVE-2020-36558: Fixed with 4.19.107 CVE-2020-36691: Fix not seen in stream CVE-2020-36694: Fixed with 4.19.164 CVE-2020-36766: Fixed with 4.19.143 +CVE-2020-36775: Fix not seen in stream +CVE-2020-36777: Fixed with 4.19.191 +CVE-2020-36780: Fix not seen in stream +CVE-2020-36781: Fix not seen in stream +CVE-2020-36782: Fix not seen in stream +CVE-2020-36783: Fix not seen in stream +CVE-2020-36784: Fix not seen in stream CVE-2020-3702: Fixed with 4.19.205 CVE-2020-4788: Fixed with 4.19.159 CVE-2020-7053: Fix not seen in stream @@ -620,6 +629,118 @@ CVE-2021-45469: Fixed with 4.19.223 CVE-2021-45485: Fixed with 4.19.198 CVE-2021-45486: Fixed with 4.19.196 CVE-2021-45868: Fixed with 4.19.218 +CVE-2021-46904: Fixed with 4.19.187 +CVE-2021-46906: Fixed with 4.19.196 +CVE-2021-46908: Fix not seen in stream +CVE-2021-46909: Fixed with 4.19.189 +CVE-2021-46915: Fixed with 4.19.189 +CVE-2021-46921: Fixed with 4.19.189 +CVE-2021-46924: Fixed with 4.19.224 +CVE-2021-46925: Fix not seen in stream +CVE-2021-46926: Fix not seen in stream +CVE-2021-46928: Fix not seen in stream +CVE-2021-46929: Fixed with 4.19.224 +CVE-2021-46932: Fixed with 4.19.224 +CVE-2021-46933: Fixed with 4.19.224 +CVE-2021-46934: Fixed with 4.19.224 +CVE-2021-46935: Fixed with 4.19.224 +CVE-2021-46936: Fixed with 4.19.224 +CVE-2021-46938: Fixed with 4.19.191 +CVE-2021-46939: Fixed with 4.19.191 +CVE-2021-46941: Fix not seen in stream +CVE-2021-46950: Fixed with 4.19.191 +CVE-2021-46951: Fix not seen in stream +CVE-2021-46952: Fix not seen in stream +CVE-2021-46953: Fixed with 4.19.191 +CVE-2021-46955: Fixed with 4.19.191 +CVE-2021-46959: Fix not seen in stream +CVE-2021-46960: Fixed with 4.19.191 +CVE-2021-46962: Fix not seen in stream +CVE-2021-46965: Fix not seen in stream +CVE-2021-46969: Fix not seen in stream +CVE-2021-46970: Fix not seen in stream +CVE-2021-46982: Fix not seen in stream +CVE-2021-46984: Fix not seen in stream +CVE-2021-46988: Fixed with 4.19.191 +CVE-2021-46989: Fixed with 4.19.191 +CVE-2021-46991: Fixed with 4.19.191 +CVE-2021-46992: Fixed with 4.19.191 +CVE-2021-46998: Fixed with 4.19.191 +CVE-2021-47006: Fixed with 4.19.191 +CVE-2021-47010: Fixed with 4.19.191 +CVE-2021-47013: Fixed with 4.19.191 +CVE-2021-47020: Fixed with 4.19.191 +CVE-2021-47028: Fix not seen in stream +CVE-2021-47034: Fixed with 4.19.191 +CVE-2021-47046: Fix not seen in stream +CVE-2021-47049: Fix not seen in stream +CVE-2021-47052: Fix not seen in stream +CVE-2021-47054: Fixed with 4.19.191 +CVE-2021-47056: Fixed with 4.19.191 +CVE-2021-47059: Fix not seen in stream +CVE-2021-47063: Fix not seen in stream +CVE-2021-47065: Fix not seen in stream +CVE-2021-47070: Fix not seen in stream +CVE-2021-47073: Fixed with 4.19.192 +CVE-2021-47074: Fix not seen in stream +CVE-2021-47075: Fix not seen in stream +CVE-2021-47076: Fix not seen in stream +CVE-2021-47077: Fix not seen in stream +CVE-2021-47078: Fixed with 4.19.192 +CVE-2021-47082: Fixed with 4.19.280 +CVE-2021-47083: Fix not seen in stream +CVE-2021-47086: Fixed with 4.19.223 +CVE-2021-47100: Fixed with 4.19.223 +CVE-2021-47101: Fix not seen in stream +CVE-2021-47103: Fixed with 4.19.262 +CVE-2021-47110: Fix not seen in stream +CVE-2021-47112: Fix not seen in stream +CVE-2021-47113: Fix not seen in stream +CVE-2021-47114: Fixed with 4.19.194 +CVE-2021-47116: Fix not seen in stream +CVE-2021-47117: Fixed with 4.19.194 +CVE-2021-47118: Fixed with 4.19.194 +CVE-2021-47119: Fix not seen in stream +CVE-2021-47121: Fixed with 4.19.194 +CVE-2021-47122: Fixed with 4.19.194 +CVE-2021-47124: Fix not seen in stream +CVE-2021-47125: Fix not seen in stream +CVE-2021-47128: Fix not seen in stream +CVE-2021-47131: Fix not seen in stream +CVE-2021-47133: Fix not seen in stream +CVE-2021-47135: Fix not seen in stream +CVE-2021-47136: Fix not seen in stream +CVE-2021-47137: Fix not seen in stream +CVE-2021-47140: Fix not seen in stream +CVE-2021-47142: Fixed with 4.19.193 +CVE-2021-47143: Fix not seen in stream +CVE-2021-47144: Fixed with 4.19.193 +CVE-2021-47145: Fixed with 4.19.193 +CVE-2021-47146: Fixed with 4.19.193 +CVE-2021-47147: Fix not seen in stream +CVE-2021-47149: Fixed with 4.19.193 +CVE-2021-47150: Fixed with 4.19.193 +CVE-2021-47151: Fix not seen in stream +CVE-2021-47153: Fixed with 4.19.193 +CVE-2021-47158: Fix not seen in stream +CVE-2021-47159: Fixed with 4.19.193 +CVE-2021-47160: Fixed with 4.19.193 +CVE-2021-47161: Fixed with 4.19.199 +CVE-2021-47162: Fixed with 4.19.193 +CVE-2021-47163: Fix not seen in stream +CVE-2021-47165: Fixed with 4.19.193 +CVE-2021-47166: Fixed with 4.19.193 +CVE-2021-47167: Fix not seen in stream +CVE-2021-47168: Fixed with 4.19.193 +CVE-2021-47169: Fixed with 4.19.193 +CVE-2021-47170: Fixed with 4.19.193 +CVE-2021-47171: Fixed with 4.19.193 +CVE-2021-47172: Fix not seen in stream +CVE-2021-47173: Fixed with 4.19.193 +CVE-2021-47175: Fix not seen in stream +CVE-2021-47177: Fixed with 4.19.193 +CVE-2021-47179: Fixed with 4.19.193 +CVE-2021-47180: Fixed with 4.19.193 CVE-2022-0001: Fixed with 4.19.234 CVE-2022-0002: Fixed with 4.19.234 CVE-2022-0168: Fix not seen in stream @@ -820,6 +941,10 @@ CVE-2022-4744: Fixed with 4.19.280 CVE-2022-47520: Fix not seen in stream CVE-2022-47929: Fixed with 4.19.270 CVE-2022-48619: Fixed with 4.19.245 +CVE-2022-48626: Fixed with 4.19.229 +CVE-2022-48627: Fix not seen in stream +CVE-2022-48628: Fix not seen in stream +CVE-2022-48629: Fixed with 4.19.236 CVE-2023-0030: Fix not seen in stream CVE-2023-0047: Fixed with 4.19.218 CVE-2023-0266: Fixed with 4.19.270 @@ -884,6 +1009,7 @@ CVE-2023-26607: Fixed with 4.19.267 CVE-2023-28328: Fixed with 4.19.270 CVE-2023-28466: Fix not seen in stream CVE-2023-2860: Fixed with 4.19.258 +CVE-2023-28746: Fix not seen in stream CVE-2023-28772: Fixed with 4.19.198 CVE-2023-2985: Fixed with 4.19.276 CVE-2023-3006: Fix not seen in stream @@ -957,7 +1083,7 @@ CVE-2023-4622: Fix not seen in stream CVE-2023-4623: Fixed with 4.19.295 CVE-2023-46343: Fixed with 4.19.297 CVE-2023-46838: Fixed with 4.19.306 -CVE-2023-47233: Fix unknown +CVE-2023-47233: Fix not seen in stream CVE-2023-4881: Fix not seen in stream CVE-2023-4921: Fixed with 4.19.295 CVE-2023-51042: Fixed with 4.19.293 @@ -979,25 +1105,118 @@ CVE-2023-52444: Fixed with 4.19.306 CVE-2023-52445: Fixed with 4.19.306 CVE-2023-52449: Fixed with 4.19.306 CVE-2023-52451: Fixed with 4.19.306 -CVE-2023-52456: Fix not seen in stream -CVE-2023-52457: Fix not seen in stream CVE-2023-52458: Fix not seen in stream CVE-2023-52464: Fixed with 4.19.306 +CVE-2023-52469: Fixed with 4.19.306 +CVE-2023-52470: Fixed with 4.19.306 +CVE-2023-52474: Fix not seen in stream +CVE-2023-52475: Fixed with 4.19.297 +CVE-2023-52476: Fix not seen in stream +CVE-2023-52477: Fixed with 4.19.297 +CVE-2023-52478: Fixed with 4.19.297 +CVE-2023-52479: Fix not seen in stream +CVE-2023-52480: Fix not seen in stream +CVE-2023-52481: Fix not seen in stream +CVE-2023-52482: Fix not seen in stream +CVE-2023-52484: Fix not seen in stream +CVE-2023-52485: Fix not seen in stream +CVE-2023-52486: Fixed with 4.19.307 +CVE-2023-52488: Fix not seen in stream +CVE-2023-52489: Fix not seen in stream +CVE-2023-52491: Fix not seen in stream +CVE-2023-52498: Fix not seen in stream +CVE-2023-52500: Fix not seen in stream +CVE-2023-52501: Fix not seen in stream +CVE-2023-52502: Fixed with 4.19.297 +CVE-2023-52504: Fixed with 4.19.297 +CVE-2023-52506: Fix not seen in stream +CVE-2023-52507: Fixed with 4.19.297 +CVE-2023-52508: Fix not seen in stream +CVE-2023-52509: Fix not seen in stream +CVE-2023-52510: Fixed with 4.19.297 +CVE-2023-52511: Fix not seen in stream +CVE-2023-52515: Fix not seen in stream +CVE-2023-52516: Fix not seen in stream +CVE-2023-52517: Fix not seen in stream +CVE-2023-52519: Fix not seen in stream +CVE-2023-52522: Fix not seen in stream +CVE-2023-52527: Fixed with 4.19.296 +CVE-2023-52528: Fixed with 4.19.296 +CVE-2023-52530: Fix not seen in stream +CVE-2023-52531: Fix not seen in stream +CVE-2023-52532: Fix not seen in stream +CVE-2023-52559: Fix not seen in stream +CVE-2023-52561: Fix not seen in stream +CVE-2023-52563: Fix not seen in stream +CVE-2023-52565: Fix not seen in stream +CVE-2023-52566: Fixed with 4.19.296 +CVE-2023-52568: Fix not seen in stream +CVE-2023-52569: Fix not seen in stream +CVE-2023-52571: Fix not seen in stream +CVE-2023-52572: Fix not seen in stream +CVE-2023-52574: Fixed with 4.19.296 +CVE-2023-52578: Fixed with 4.19.296 +CVE-2023-52583: Fixed with 4.19.307 +CVE-2023-52584: Fix not seen in stream +CVE-2023-52585: Fix not seen in stream +CVE-2023-52586: Fix not seen in stream +CVE-2023-52587: Fixed with 4.19.307 +CVE-2023-52588: Fix not seen in stream +CVE-2023-52589: Fix not seen in stream +CVE-2023-52590: Fix not seen in stream +CVE-2023-52591: Fix not seen in stream +CVE-2023-52593: Fix not seen in stream +CVE-2023-52594: Fixed with 4.19.307 +CVE-2023-52595: Fix not seen in stream +CVE-2023-52596: Fix not seen in stream +CVE-2023-52597: Fixed with 4.19.307 +CVE-2023-52598: Fixed with 4.19.307 +CVE-2023-52599: Fixed with 4.19.307 +CVE-2023-52600: Fixed with 4.19.307 +CVE-2023-52601: Fixed with 4.19.307 +CVE-2023-52602: Fixed with 4.19.307 +CVE-2023-52603: Fixed with 4.19.307 +CVE-2023-52604: Fixed with 4.19.307 +CVE-2023-52606: Fixed with 4.19.307 +CVE-2023-52607: Fixed with 4.19.307 +CVE-2023-52609: Fixed with 4.19.306 +CVE-2023-52612: Fixed with 4.19.306 +CVE-2023-52614: Fix not seen in stream +CVE-2023-52615: Fixed with 4.19.307 +CVE-2023-52617: Fix not seen in stream +CVE-2023-52618: Fix not seen in stream +CVE-2023-52619: Fixed with 4.19.307 +CVE-2023-52620: Fix not seen in stream +CVE-2023-52621: Fix not seen in stream +CVE-2023-52622: Fixed with 4.19.307 +CVE-2023-52623: Fixed with 4.19.307 +CVE-2023-52624: Fix not seen in stream +CVE-2023-52625: Fix not seen in stream +CVE-2023-52628: Fix not seen in stream +CVE-2023-52629: Fix not seen in stream +CVE-2023-52632: Fix not seen in stream +CVE-2023-52633: Fix not seen in stream +CVE-2023-52634: Fix not seen in stream +CVE-2023-52635: Fix not seen in stream +CVE-2023-52638: Fix not seen in stream +CVE-2023-52639: Fix not seen in stream +CVE-2023-52640: Fix not seen in stream +CVE-2023-52641: Fix not seen in stream CVE-2023-5717: Fixed with 4.19.297 CVE-2023-6040: Fixed with 4.19.305 CVE-2023-6121: Fix not seen in stream CVE-2023-6240: Fix unknown -CVE-2023-6270: Fix unknown -CVE-2023-6356: Fix unknown +CVE-2023-6270: Fixed with 4.19.311 +CVE-2023-6356: Fix not seen in stream CVE-2023-6535: Fix unknown -CVE-2023-6536: Fix unknown +CVE-2023-6536: Fix not seen in stream CVE-2023-6546: Fix not seen in stream CVE-2023-6606: Fixed with 4.19.304 CVE-2023-6610: Fix not seen in stream CVE-2023-6915: Fix not seen in stream CVE-2023-6931: Fixed with 4.19.302 CVE-2023-6932: Fixed with 4.19.301 -CVE-2023-7042: Fix unknown +CVE-2023-7042: Fixed with 4.19.311 CVE-2023-7192: Fixed with 4.19.276 CVE-2024-0340: Fixed with 4.19.307 CVE-2024-0564: Fix unknown @@ -1009,10 +1228,11 @@ CVE-2024-1086: Fixed with 4.19.307 CVE-2024-1151: Fix not seen in stream CVE-2024-1312: Fix not seen in stream CVE-2024-21803: Fix unknown -CVE-2024-22099: Fix unknown +CVE-2024-2193: Fix unknown +CVE-2024-22099: Fixed with 4.19.311 CVE-2024-22386: Fix unknown -CVE-2024-23196: Fix unknown -CVE-2024-23307: Fix unknown +CVE-2024-23196: Fix not seen in stream +CVE-2024-23307: Fix not seen in stream CVE-2024-23848: Fix unknown CVE-2024-23849: Fixed with 4.19.307 CVE-2024-23851: Fix not seen in stream @@ -1021,7 +1241,7 @@ CVE-2024-24857: Fix unknown CVE-2024-24858: Fix unknown CVE-2024-24859: Fix unknown CVE-2024-24860: Fix not seen in stream -CVE-2024-24861: Fix unknown +CVE-2024-24861: Fix not seen in stream CVE-2024-24864: Fix unknown CVE-2024-25739: Fix unknown CVE-2024-25740: Fix unknown @@ -1029,11 +1249,109 @@ CVE-2024-25741: Fix unknown CVE-2024-25744: Fix not seen in stream CVE-2024-26584: Fix not seen in stream CVE-2024-26586: Fix not seen in stream -CVE-2024-26587: Fix not seen in stream -CVE-2024-26588: Fix not seen in stream -CVE-2024-26591: Fix not seen in stream CVE-2024-26592: Fix not seen in stream CVE-2024-26594: Fix not seen in stream CVE-2024-26595: Fix not seen in stream CVE-2024-26597: Fixed with 4.19.306 CVE-2024-26598: Fix not seen in stream +CVE-2024-26600: Fixed with 4.19.307 +CVE-2024-26602: Fixed with 4.19.307 +CVE-2024-26606: Fixed with 4.19.307 +CVE-2024-26614: Fix not seen in stream +CVE-2024-26615: Fixed with 4.19.307 +CVE-2024-26622: Fix not seen in stream +CVE-2024-26623: Fix not seen in stream +CVE-2024-26625: Fixed with 4.19.307 +CVE-2024-26627: Fix not seen in stream +CVE-2024-26633: Fixed with 4.19.306 +CVE-2024-26635: Fixed with 4.19.307 +CVE-2024-26636: Fixed with 4.19.307 +CVE-2024-26640: Fix not seen in stream +CVE-2024-26641: Fix not seen in stream +CVE-2024-26642: Fix not seen in stream +CVE-2024-26644: Fix not seen in stream +CVE-2024-26645: Fixed with 4.19.307 +CVE-2024-26646: Fix not seen in stream +CVE-2024-26647: Fix not seen in stream +CVE-2024-26648: Fix not seen in stream +CVE-2024-26650: Fix not seen in stream +CVE-2024-26651: Fixed with 4.19.311 +CVE-2024-26654: Fix not seen in stream +CVE-2024-26655: Fix not seen in stream +CVE-2024-26656: Fix not seen in stream +CVE-2024-26658: Fix not seen in stream +CVE-2024-26659: Fix not seen in stream +CVE-2024-26663: Fixed with 4.19.307 +CVE-2024-26664: Fixed with 4.19.307 +CVE-2024-26668: Fix not seen in stream +CVE-2024-26671: Fixed with 4.19.307 +CVE-2024-26672: Fix not seen in stream +CVE-2024-26675: Fixed with 4.19.307 +CVE-2024-26676: Fix not seen in stream +CVE-2024-26677: Fix not seen in stream +CVE-2024-26679: Fixed with 4.19.307 +CVE-2024-26685: Fixed with 4.19.307 +CVE-2024-26686: Fix not seen in stream +CVE-2024-26687: Fix not seen in stream +CVE-2024-26689: Fix not seen in stream +CVE-2024-26691: Fix not seen in stream +CVE-2024-26696: Fixed with 4.19.307 +CVE-2024-26697: Fixed with 4.19.307 +CVE-2024-26699: Fix not seen in stream +CVE-2024-26700: Fix not seen in stream +CVE-2024-26704: Fixed with 4.19.307 +CVE-2024-26706: Fix not seen in stream +CVE-2024-26713: Fix not seen in stream +CVE-2024-26715: Fix not seen in stream +CVE-2024-26719: Fix not seen in stream +CVE-2024-26720: Fixed with 4.19.307 +CVE-2024-26726: Fix not seen in stream +CVE-2024-26733: Fix not seen in stream +CVE-2024-26735: Fixed with 4.19.308 +CVE-2024-26736: Fix not seen in stream +CVE-2024-26738: Fix not seen in stream +CVE-2024-26739: Fix not seen in stream +CVE-2024-26740: Fix not seen in stream +CVE-2024-26743: Fix not seen in stream +CVE-2024-26744: Fixed with 4.19.308 +CVE-2024-26745: Fix not seen in stream +CVE-2024-26747: Fix not seen in stream +CVE-2024-26748: Fix not seen in stream +CVE-2024-26751: Fixed with 4.19.308 +CVE-2024-26752: Fixed with 4.19.308 +CVE-2024-26754: Fixed with 4.19.308 +CVE-2024-26756: Fix not seen in stream +CVE-2024-26757: Fix not seen in stream +CVE-2024-26758: Fix not seen in stream +CVE-2024-26759: Fix not seen in stream +CVE-2024-26763: Fixed with 4.19.308 +CVE-2024-26764: Fixed with 4.19.308 +CVE-2024-26765: Fix not seen in stream +CVE-2024-26766: Fixed with 4.19.308 +CVE-2024-26767: Fix not seen in stream +CVE-2024-26768: Fix not seen in stream +CVE-2024-26769: Fix not seen in stream +CVE-2024-26770: Fix not seen in stream +CVE-2024-26771: Fix not seen in stream +CVE-2024-26772: Fixed with 4.19.308 +CVE-2024-26773: Fixed with 4.19.308 +CVE-2024-26774: Fix not seen in stream +CVE-2024-26775: Fix not seen in stream +CVE-2024-26776: Fix not seen in stream +CVE-2024-26777: Fixed with 4.19.308 +CVE-2024-26778: Fixed with 4.19.308 +CVE-2024-26779: Fixed with 4.19.308 +CVE-2024-26784: Fix not seen in stream +CVE-2024-26789: Fix not seen in stream +CVE-2024-26791: Fixed with 4.19.309 +CVE-2024-26793: Fixed with 4.19.309 +CVE-2024-26797: Fix not seen in stream +CVE-2024-26798: Fix not seen in stream +CVE-2024-26801: Fixed with 4.19.309 +CVE-2024-26802: Fix not seen in stream +CVE-2024-26803: Fix not seen in stream +CVE-2024-26804: Fix not seen in stream +CVE-2024-26805: Fixed with 4.19.309 +CVE-2024-26806: Fix not seen in stream +CVE-2024-26808: Fix not seen in stream +CVE-2024-26809: Fix not seen in stream diff --git a/data/4.19/4.19_security.txt b/data/4.19/4.19_security.txt index e599f2772..a900ef8a3 100644 --- a/data/4.19/4.19_security.txt +++ b/data/4.19/4.19_security.txt @@ -74,6 +74,7 @@ CVEs fixed in 4.19.28: CVE-2019-12818: f132b3f5f1ad1cbe818474ab8d0b555ff39369d5 net: nfc: Fix NULL dereference on nfc_llcp_build_tlv fails CVE-2019-15916: 7ce2a517fd8b7742e381d3b3551b9b03e667ad79 net-sysfs: Fix mem leak in netdev_register_kobject CVE-2019-16994: d0bedaac932f4c02c080a50d4a30b2a1fec5d682 net: sit: fix memory leak in sit_init_net() + CVE-2019-25160: e3713abc4248aa6bcc11173d754c418b02a62cbb netlabel: fix out-of-bounds memory accesses CVE-2019-8980: b60d90b2d3d14c426693a0a34041db11be66d29e exec: Fix mem leak in kernel_read_file CVEs fixed in 4.19.29: @@ -709,6 +710,7 @@ CVEs fixed in 4.19.187: CVE-2020-25672: 301a4264d6ab56d2b9230066b060d7ceaa000d68 nfc: fix memory leak in llcp_sock_connect() CVE-2020-25673: eab391e0766ed88262160b14bb7131f331f6af1a nfc: Avoid endless loops caused by repeated llcp_sock_connect() CVE-2021-3659: c166c0f5311dc9de687b8985574a5ee5166d367e net: mac802154: Fix general protection fault + CVE-2021-46904: 92028d7a31e55d53e41cff679156b9432cffcb36 net: hso: fix null-ptr-deref during tty device unregistration CVEs fixed in 4.19.188: CVE-2021-0937: 12ec80252edefff00809d473a47e5f89c7485499 netfilter: x_tables: fix compat match/target pad out-of-bound write @@ -717,17 +719,41 @@ CVEs fixed in 4.19.188: CVEs fixed in 4.19.189: CVE-2020-29374: 5e24029791e809d641e9ea46a1f99806484e53fc gup: document and work around "COW can break either way" issue CVE-2021-23133: 301084de76eb5bfedddda41ec33e2913e90c99e7 net/sctp: fix race condition in sctp_destroy_sock + CVE-2021-46909: 2643da6aa57920d9159a1a579fb04f89a2b0d29a ARM: footbridge: fix PCI interrupt mapping + CVE-2021-46915: fadd3c4afdf3d4c21f4d138502f8b76334987e26 netfilter: nft_limit: avoid possible divide error in nft_limit_init + CVE-2021-46921: 5902f9453a313be8fe78cbd7e7ca9dba9319fc6e locking/qrwlock: Fix ordering in queued_write_lock_slowpath() CVEs fixed in 4.19.191: + CVE-2020-36777: cd89f79be5d553c78202f686e8e4caa5fbe94e98 media: dvbdev: Fix memory leak in dvb_media_device_free() CVE-2021-32399: 35113c4c9fa7c970ff456982e381dc9e9594154a bluetooth: eliminate the potential race condition when removing the HCI controller CVE-2021-33034: 75e26178e26f910f7f26c79c2824b726eecf0dfb Bluetooth: verify AMP hci_chan before amp_destroy CVE-2021-3506: bfa08a47cea2a9fab077c7135b9cfdf04e69c67a f2fs: fix to avoid out-of-bounds memory access CVE-2021-4157: f27638a92f77d8107efbaf48a0d3bfa24da8cdad pNFS/flexfiles: fix incorrect size check in decode_nfs_fh() + CVE-2021-46938: 772b9f59657665af3b68d24d12b9d172d31f0dfb dm rq: fix double free of blk_mq_tag_set in dev remove after table load fails + CVE-2021-46939: d43d56dbf452ccecc1ec735cd4b6840118005d7c tracing: Restructure trace_clock_global() to never block + CVE-2021-46950: a6e17cab00fc5bf85472434c52ac751426257c6f md/raid1: properly indicate failure when ending a failed write request + CVE-2021-46953: 7b2162db1498c71962a4bb2f776fa4e76d4d305b ACPI: GTDT: Don't corrupt interrupt mappings on watchdow probe failure + CVE-2021-46955: df9e900de24637be41879e2c50afb713ec4e8b2e openvswitch: fix stack OOB read while fragmenting IPv4 packets + CVE-2021-46960: e486f8397f3f14a7cadc166138141fdb14379a54 cifs: Return correct error code from smb2_get_enc_key + CVE-2021-46988: 07c9b834c97d0fa3402fb7f3f3b32df370a6ff1f userfaultfd: release page in error path to avoid BUG_ON + CVE-2021-46989: 52dde855663e5db824af51db39b5757d2ef3e28a hfsplus: prevent corruption in shrinking truncate + CVE-2021-46991: c1322eaeb8af0d8985b5cc5fa759140fa0e57b84 i40e: Fix use-after-free in i40e_client_subtask() + CVE-2021-46992: efcd730ddd6f25578bd31bfe703e593e2421d708 netfilter: nftables: avoid overflows in nft_hash_buckets() + CVE-2021-46998: 25a87b1f566b5eb2af2857a928f0e2310d900976 ethernet:enic: Fix a use after free bug in enic_hard_start_xmit + CVE-2021-47006: a9938d6d78a238d6ab8de57a4d3dcf77adceb9bb ARM: 9064/1: hw_breakpoint: Do not directly check the event's overflow_handler hook + CVE-2021-47010: 992de06308d9a9584d59b96d294ac676f924e437 net: Only allow init netns to set default tcp cong to a restricted algo + CVE-2021-47013: 16d8c44be52e3650917736d45f5904384a9da834 net:emac/emac-mac: Fix a use after free in emac_mac_tx_buf_send + CVE-2021-47020: 342260fe821047c3d515e3d28085d73fbdce3e80 soundwire: stream: fix memory leak in stream config error path + CVE-2021-47034: b3d5d0983388d6c4fb35f7d722556d5595f167a7 powerpc/64s: Fix pte update for kernel memory on radix + CVE-2021-47054: a399dd80e697a02cfb23e2fc09b87849994043d9 bus: qcom: Put child node before return + CVE-2021-47056: 09d16cee6285d37cc76311c29add6d97a7e4acda crypto: qat - ADF_STATUS_PF_RUNNING should be set after adf_dev_init CVEs fixed in 4.19.192: CVE-2020-26555: 30126d4ba73119565f1748b116b9869ac6bbda6b Bluetooth: SMP: Fail if remote and local public keys are identical CVE-2020-26558: 30126d4ba73119565f1748b116b9869ac6bbda6b Bluetooth: SMP: Fail if remote and local public keys are identical CVE-2021-0129: 30126d4ba73119565f1748b116b9869ac6bbda6b Bluetooth: SMP: Fail if remote and local public keys are identical + CVE-2021-47073: 75cfc833da4a2111106d4c134e93e0c7f41e35e7 platform/x86: dell-smbios-wmi: Fix oops on rmmod dell_smbios + CVE-2021-47078: f3783c415bf6d2ead3d7aa2c38802bbe10723646 RDMA/rxe: Clear all QP fields if creation failed CVEs fixed in 4.19.193: CVE-2020-24586: 76ffc27967211afba6f0045ac840e7027fbeefcf mac80211: prevent mixed key and fragment cache attacks @@ -737,18 +763,44 @@ CVEs fixed in 4.19.193: CVE-2020-26147: 3c919823e4cad7bdc2c92b0dd3b4dc463c9315bd mac80211: assure all fragments are encrypted CVE-2021-33098: 938ffd6d2dd78fb83b9346c9b689e2a3a6fe7174 ixgbe: fix large MTU request from VF CVE-2021-34981: f8be26b9950710fe50fb45358df5bd01ad18efb7 Bluetooth: cmtp: fix file refcount when cmtp_attach_device fails + CVE-2021-47142: a849e218556f932576c0fb1c5a88714b61709a17 drm/amdgpu: Fix a use-after-free + CVE-2021-47144: 599e5d61ace952b0bb9bd942b198bbd0cfded1d7 drm/amd/amdgpu: fix refcount leak + CVE-2021-47145: 6eccfb28f8dca70c9b1b3bb3194ca54cbe73a9fa btrfs: do not BUG_ON in link_to_fixup_dir + CVE-2021-47146: 4b77ad9097067b31237eeeee0bf70f80849680a0 mld: fix panic in mld_newpack() + CVE-2021-47149: 7883d3895d0fbb0ba9bff0f8665f99974b45210f net: fujitsu: fix potential null-ptr-deref + CVE-2021-47150: 15102886bc8f5f29daaadf2d925591d564c17e9f net: fec: fix the potential memory leak in fec_enet_init() + CVE-2021-47153: c70e1ba2e7e65255a0ce004f531dd90dada97a8c i2c: i801: Don't generate an interrupt on bus reset + CVE-2021-47159: 0f2cb08c57edefb0e7b5045e0e3e9980a3d3aa37 net: dsa: fix a crash if ->get_sset_count() fails + CVE-2021-47160: ae389812733b1b1e8e07fcc238e41db166b5c78d net: dsa: mt7530: fix VLAN traffic leaks + CVE-2021-47162: 4b1761898861117c97066aea6c58f68a7787f0bf tipc: skb_linearize the head skb when reassembling msgs + CVE-2021-47165: e256a0eb43e17209e347409a80805b1659398d68 drm/meson: fix shutdown crash when component not probed + CVE-2021-47166: 40f139a6d50c232c0d1fd1c5e65a845c62db0ede NFS: Don't corrupt the value of pg_bytes_written in nfs_do_recoalesce() + CVE-2021-47168: 945ebef997227ca8c20bad7f8a8358c8ee57a84a NFS: fix an incorrect limit in filelayout_decode_layout() + CVE-2021-47169: 35265552c7fe9553c75e324c80f45e28ff14eb6e serial: rp2: use 'request_firmware' instead of 'request_firmware_nowait' + CVE-2021-47170: 2ab21d6e1411999b5fb43434f421f00bf50002eb USB: usbfs: Don't WARN about excessively large memory allocations + CVE-2021-47171: 9e6a3eccb28779710cbbafc4f4258d92509c6d07 net: usb: fix memory leak in smsc75xx_bind + CVE-2021-47173: 386918878ce4cd676e4607233866e03c9399a46a misc/uss720: fix memory leak in uss720_probe + CVE-2021-47177: 2ec5e9bb6b0560c90d315559c28a99723c80b996 iommu/vt-d: Fix sysfs leak in alloc_iommu() + CVE-2021-47179: 39785761feadf261bc5101372b0b0bbaf6a94494 NFSv4: Fix a NULL pointer dereference in pnfs_mark_matching_lsegs_return() + CVE-2021-47180: 0365701bc44e078682ee1224866a71897495c7ef NFC: nci: fix memory leak in nci_allocate_device CVEs fixed in 4.19.194: CVE-2021-3564: 64700748e8a7af4883538c72ada57999d9a78e92 Bluetooth: fix the erroneous flush_work() order CVE-2021-3573: 2b9e9c2ed0f1910b5201c5d37b355b60201df415 Bluetooth: use correct lock to prevent UAF of hdev object CVE-2021-3587: 93e4ac2a9979a9a4ecc158409ed9c3044dc0ae1f nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect CVE-2021-38208: 93e4ac2a9979a9a4ecc158409ed9c3044dc0ae1f nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect + CVE-2021-47114: cec4e857ffaa8c447f51cd8ab4e72350077b6770 ocfs2: fix data corruption by fallocate + CVE-2021-47117: 569496aa3776eea1ff0d49d0174ac1b7e861e107 ext4: fix bug on in ext4_es_cache_extent as ext4_split_extent_at failed + CVE-2021-47118: d106f05432e60f9f62d456ef017687f5c73cb414 pid: take a reference when initializing `cad_pid` + CVE-2021-47121: 9ea0ab48e755d8f29fe89eb235fb86176fdb597f net: caif: fix memory leak in cfusbl_device_notify + CVE-2021-47122: 3be863c11cab725add9fef4237ed4e232c3fc3bb net: caif: fix memory leak in caif_device_notify CVEs fixed in 4.19.196: CVE-2021-34693: 8899857d7e450805e6410de5004126491f197146 can: bcm: fix infoleak in struct bcm_msg_head CVE-2021-35039: ff660863628fb144badcb3395cde7821c82c13a6 module: limit enabling module.sig_enforce CVE-2021-3743: f8111c0d7ed42ede41a3d0d393b104de0730a8a6 net: qrtr: fix OOB Read in qrtr_endpoint_post CVE-2021-45486: 7f7e23df8509e072593200400a4b094cc44376d2 inet: use bigger hash table for IP ID generation + CVE-2021-46906: 0e280502be1b003c3483ae03fc60dea554fcfa82 HID: usbhid: fix info leak in hid_submit_ctrl CVEs fixed in 4.19.197: CVE-2020-36311: cadf5bbcefbd9717e51c61d6128b520583ffdf4f KVM: SVM: Periodically schedule when unregistering regions on destroy @@ -768,6 +820,7 @@ CVEs fixed in 4.19.199: CVE-2021-3679: 6a99bfee7f5625d2577a5c3b09a2bd2a845feb8a tracing: Fix bug in rb_per_cpu_empty() that might cause deadloop. CVE-2021-37576: 0493b10c06021796ba80cbe53c961defd5aca6e5 KVM: PPC: Book3S: Fix H_RTAS rets buffer overflow CVE-2021-38204: 51fc12f4d37622fa0c481604833f98f11b1cac4f usb: max-3421: Prevent corruption of freed memory + CVE-2021-47161: 00450ed03a17143e2433b461a656ef9cd17c2f1d spi: spi-fsl-dspi: Fix a resource leak in an error handling path CVEs fixed in 4.19.200: CVE-2021-0920: 1dabafa9f61118b1377fde424d9a94bf8dbf2813 af_unix: fix garbage collect vs MSG_PEEK @@ -863,10 +916,19 @@ CVEs fixed in 4.19.222: CVEs fixed in 4.19.223: CVE-2021-45469: f9dfa44be0fb5e8426183a70f69a246cf5827f49 f2fs: fix to do sanity check on last xattr entry in __f2fs_setxattr() + CVE-2021-47086: 982b6ba1ce626ef87e5c29f26f2401897554f235 phonet/pep: refuse to enable an unbound pipe + CVE-2021-47100: 925229d552724e1bba1abf01d3a0b1318539b012 ipmi: Fix UAF when uninstall ipmi_si and ipmi_msghandler module CVE-2022-1195: b68f41c6320b2b7fbb54a95f07a69f3dc7e56c59 hamradio: improve the incomplete fix to avoid NPD CVEs fixed in 4.19.224: CVE-2021-44733: b4a661b4212b8fac8853ec3b68e4a909dccc88a1 tee: handle lookup of shm with reference count 0 + CVE-2021-46924: a1e0080a35a16ce3808f7040fe0c3a8fdb052349 NFC: st21nfca: Fix memory leak in device probe and remove + CVE-2021-46929: af6e6e58f7ebf86b4e7201694b1e4f3a62cbc3ec sctp: use call_rcu to free endpoint + CVE-2021-46932: a02e1404e27855089d2b0a0acc4652c2ce65fe46 Input: appletouch - initialize work before device registration + CVE-2021-46933: 33f6a0cbb7772146e1c11f38028fffbfed14728b usb: gadget: f_fs: Clear ffs_eventfd in ffs_data_clear. + CVE-2021-46934: 407c8708fb1bf2d4afc5337ef50635cf540c364b i2c: validate user data in compat ioctl + CVE-2021-46935: 7c7064402609aeb6fb11be1b4ec10673ff17b593 binder: fix async_free_space accounting for empty parcels + CVE-2021-46936: a8e1944b44f94f5c5f530e434c5eaee787254566 net: fix use-after-free in tw_timer_handler CVE-2022-20154: af6e6e58f7ebf86b4e7201694b1e4f3a62cbc3ec sctp: use call_rcu to free endpoint CVEs fixed in 4.19.225: @@ -893,6 +955,7 @@ CVEs fixed in 4.19.229: CVE-2022-0435: f1af11edd08dd8376f7a84487cbb0ea8203e3a1d tipc: improve size validations for received domain records CVE-2022-0487: 9c25d5ff1856b91bd4365e813f566cb59aaa9552 moxart: fix potential use-after-free on remove path CVE-2022-0492: 939f8b491887c27585933ea7dc5ad4123de58ff3 cgroup-v1: Require capabilities to set release_agent + CVE-2022-48626: 9c25d5ff1856b91bd4365e813f566cb59aaa9552 moxart: fix potential use-after-free on remove path CVEs fixed in 4.19.230: CVE-2022-25258: e5eb8d19aee115d8fb354d1eff1b8df700467164 USB: gadget: validate interface OS descriptor requests @@ -930,6 +993,7 @@ CVEs fixed in 4.19.236: CVE-2022-20158: a33dd1e6693f80d805155b3f69c18c2f642915da net/packet: fix slab-out-of-bounds access in packet_recvmsg() CVE-2022-20368: a33dd1e6693f80d805155b3f69c18c2f642915da net/packet: fix slab-out-of-bounds access in packet_recvmsg() CVE-2022-3107: a30c7c81db60f7f7ad52f75a4f7de5f628063df4 hv_netvsc: Add check for kvmalloc_array + CVE-2022-48629: a8e32bbb96c25b7ab29b1894dcd45e0b3b08fd9d crypto: qcom-rng - ensure buffer for generate is completely filled CVEs fixed in 4.19.237: CVE-2022-1016: 88791b79a1eb2ba94e95d039243e28433583a67b netfilter: nf_tables: initialize registers in nft_do_chain() @@ -1031,6 +1095,7 @@ CVEs fixed in 4.19.255: CVE-2022-36946: f295d365b30626f82423a923695274024016380e netfilter: nf_queue: do not allow packet truncation below transport header offset CVEs fixed in 4.19.256: + CVE-2019-25162: 23a191b132cd87f746c62f3dc27da33683d85829 i2c: Fix a potential use after free CVE-2021-4159: 6c6b84ef5ea8dc0ca3559ccf69810960e348c555 bpf: Verifer, adjust_scalar_min_max_vals to always call update_reg_bounds() CVE-2022-1679: ab7a0ddf5f1cdec63cb21840369873806fc36d80 ath9k: fix use-after-free in ath9k_hif_usb_rx_cb CVE-2022-20422: b51881b1da57fe9877125dfdd0aac5172958fcfd arm64: fix oops in concurrently setting insn_emulation sysctls @@ -1058,6 +1123,7 @@ CVEs fixed in 4.19.260: CVE-2022-39842: a34547fc43d02f2662b2b62c9a4c578594cf662d video: fbdev: pxa3xx-gcu: Fix integer overflow in pxa3xx_gcu_write CVEs fixed in 4.19.262: + CVE-2021-47103: 75a578000ae5e511e5d0e8433c94a14d9c99c412 inet: fully convert sk->sk_rx_dst to RCU rules CVE-2022-2978: ec2aab115eb38ac4992ea2fcc2a02fbe7af5cf48 fs: fix UAF/GPF bug in nilfs_mdt_destroy CVE-2022-3535: 84e2394b0be397f7198986aa9a28207f70b29bd4 net: mvpp2: fix mvpp2 debugfs leak CVE-2022-3542: 70421f9708d4cf14c2bd15de58862a3d22e00bbe bnx2x: fix potential memory leak in bnx2x_tpa_stop() @@ -1143,6 +1209,7 @@ CVEs fixed in 4.19.279: CVEs fixed in 4.19.280: CVE-2021-33631: 53bb0d3e0a3dfc9649add8133f1ecd9c1bc2dd70 ext4: fix kernel BUG in 'ext4_write_inline_data_end()' + CVE-2021-47082: 8eb43d635950e27c29f1e9e49a23b31637f37757 tun: avoid double free in tun_free_netdev CVE-2022-4744: 8eb43d635950e27c29f1e9e49a23b31637f37757 tun: avoid double free in tun_free_netdev CVE-2023-1670: 526660c25d3b93b1232a525b75469048388f0928 xirc2ps_cs: Fix use after free bug in xirc2ps_detach CVE-2023-1989: af4d48754d5517d33bac5e504ff1f1de0808e29e Bluetooth: btsdio: fix use after free bug in btsdio_remove due to unfinished work @@ -1231,9 +1298,21 @@ CVEs fixed in 4.19.295: CVEs fixed in 4.19.296: CVE-2023-31085: a0d71e9e61da8a85a46774c67549739e28fda795 ubi: Refuse attaching if mtd's erasesize is 0 + CVE-2023-52527: 559d697c5d072593d22b3e0bd8b8081108aeaf59 ipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data() + CVE-2023-52528: 2a36d9e2995c8c3c3f179aab1215a69cff06cbed net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg + CVE-2023-52566: bb61224f6abc8e71bfdf06d7c984e23460875f5b nilfs2: fix potential use after free in nilfs_gccache_submit_read_data() + CVE-2023-52574: a7fb47b9711101d2405b0eb1276fb1f9b9b270c7 team: fix null-ptr-deref when team device type is changed + CVE-2023-52578: d2346e6beb699909ca455d9d20c4e577ce900839 net: bridge: use DEV_STATS_INC() CVEs fixed in 4.19.297: CVE-2023-46343: 5622592f8f74ae3e594379af02e64ea84772d0dd nfc: nci: fix possible NULL pointer dereference in send_acknowledge() + CVE-2023-52475: 67cace72606baf1758fd60feb358f4c6be92e1cc Input: powermate - fix use-after-free in powermate_config_complete + CVE-2023-52477: 8e7346bfea56453e31b7421c1c17ca2fb9ed613d usb: hub: Guard against accesses to uninitialized BOS descriptors + CVE-2023-52478: 44481b244fcaa2b895a53081d6204c574720c38c HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect + CVE-2023-52502: e863f5720a5680e50c4cecf12424d7cc31b3eb0a net: nfc: fix races in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn() + CVE-2023-52504: 3719d3c36aa853d5a2401af9f8d6b116c91ad5ae x86/alternatives: Disable KASAN in apply_alternatives() + CVE-2023-52507: a686f84101680b8442181a8846fbd3c934653729 nfc: nci: assert requested protocol is valid + CVE-2023-52510: cdb46be93c1f7bbf2c4649e9fc5fb147cfb5245d ieee802154: ca8210: Fix a potential UAF in ca8210_probe CVE-2023-5717: a714491fa92d2068358dd603cc50bf2062517bd8 perf: Disallow mis-matched inherited group reads CVEs fixed in 4.19.298: @@ -1272,13 +1351,81 @@ CVEs fixed in 4.19.306: CVE-2023-52449: aeba358bcc8ffddf9b4a9bd0e5ec9eb338d46022 mtd: Fix gluebi NULL pointer dereference caused by ftl notifier CVE-2023-52451: bb79613a9a704469ddb8d6c6029d532a5cea384c powerpc/pseries/memhp: Fix access beyond end of drmem array CVE-2023-52464: 71c17ee02538802ceafc830f0736aa35b564e601 EDAC/thunderx: Fix possible out-of-bounds string access + CVE-2023-52469: 8a27d9d9fc9b5564b8904c3a77a7dea482bfa34e drivers/amd/pm: fix a use-after-free in kv_parse_power_table + CVE-2023-52470: 21b1645660717d6126dd4866c850fcc5c4703a41 drm/radeon: check the alloc_workqueue return value in radeon_crtc_init() + CVE-2023-52609: 95b1d336b0642198b56836b89908d07b9a0c9608 binder: fix race between mmput() and do_exit() + CVE-2023-52612: 1142d65c5b881590962ad763f94505b6dd67d2fe crypto: scomp - fix req->dst buffer overflow CVE-2024-26597: 093dab655808207f7a9f54cf156240aeafc70590 net: qualcomm: rmnet: fix global oob in rmnet_policy + CVE-2024-26633: 135414f300c5db995e2a2f3bf0f455de9d014aee ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim() CVEs fixed in 4.19.307: + CVE-2023-52486: 376e21a9e4c2c63ee5d8d3aa74be5082c3882229 drm: Don't unref the same fb many times by mistake due to deadlock handling + CVE-2023-52583: eb55ba8aa7fb7aad54f40fbf4d8dcdfdba0bebf6 ceph: fix deadlock or deadcode of misusing dget() + CVE-2023-52587: 4c8922ae8eb8dcc1e4b7d1059d97a8334288d825 IB/ipoib: Fix mcast list locking + CVE-2023-52594: f44f073c78112ff921a220d01b86d09f2ace59bc wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus() + CVE-2023-52597: 3a04410b0bc7e056e0843ac598825dd359246d18 KVM: s390: fix setting of fpc register + CVE-2023-52598: 6ccf904aac0292e1f6b1a1be6c407c414f7cf713 s390/ptrace: handle setting of fpc register correctly + CVE-2023-52599: f423528488e4f9606cef858eceea210bf1163f41 jfs: fix array-index-out-of-bounds in diNewExt + CVE-2023-52600: 81b4249ef37297fb17ba102a524039a05c6c5d35 jfs: fix uaf in jfs_evict_inode + CVE-2023-52601: 3d3898b4d72c677d47fe3cb554449f2df5c12555 jfs: fix array-index-out-of-bounds in dbAdjTree + CVE-2023-52602: ce8bc22e948634a5c0a3fa58a179177d0e3f3950 jfs: fix slab-out-of-bounds Read in dtSearch + CVE-2023-52603: e30b52a2ea3d1e0aaee68096957cf90a2f4ec5af UBSAN: array-index-out-of-bounds in dtSplitRoot + CVE-2023-52604: e3e95c6850661c77e6dab079d9b5374a618ebb15 FS:JFS:UBSAN:array-index-out-of-bounds in dbAdjTree + CVE-2023-52606: 42084a428a139f1a429f597d44621e3a18f3e414 powerpc/lib: Validate size for vector operations + CVE-2023-52607: 21e45a7b08d7cd98d6a53c5fc5111879f2d96611 powerpc/mm: Fix null-pointer dereference in pgtable_cache_add + CVE-2023-52615: eafd83b92f6c044007a3591cbd476bcf90455990 hwrng: core - Fix page fault dead lock on mmap-ed hwrng + CVE-2023-52619: 8b69c30f4e8b69131d92096cb296dc1f217101e4 pstore/ram: Fix crash when setting number of cpus to an odd number + CVE-2023-52622: cd1f93ca97a9136989f3bd2bf90696732a2ed644 ext4: avoid online resizing failures due to oversized flex bg + CVE-2023-52623: fece80a2a6718ed58487ce397285bb1b83a3e54e SUNRPC: Fix a suspicious RCU usage warning CVE-2024-0340: 95eab1039625d54d1770665756dd34e9fe926638 vhost: use kzalloc() instead of kmalloc() followed by memset() CVE-2024-0607: fca41e5b687e029f69e3a35a2fa31e2560e538dc netfilter: nf_tables: fix pointer math issue in nft_byteorder_eval() CVE-2024-1086: 8365e9d92b85fda975a5ece7a3a139cb964018c8 netfilter: nf_tables: reject QUEUE/DROP verdict parameters CVE-2024-23849: 344350bfa3b4b37d7c3d5a00536e6fbf0e953fbf net/rds: Fix UBSAN: array-index-out-of-bounds in rds_cmsg_recv + CVE-2024-26600: 486218c11e8d1c8f515a3bdd70d62203609d4b6b phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP + CVE-2024-26602: 3cd139875e9a7688b3fc715264032620812a5fa3 sched/membarrier: reduce the ability to hammer on sys_membarrier + CVE-2024-26606: dd64bb8329ce0ea27bc557e4160c2688835402ac binder: signal epoll threads of self-work + CVE-2024-26615: 27aea64838914c6122db5b8bd4bed865c9736f22 net/smc: fix illegal rmb_desc access in SMC-D connection dump + CVE-2024-26625: 6b950c712a9a05cdda4aea7fcb2848766576c11b llc: call sock_orphan() at release time + CVE-2024-26635: 165ad1e22779685c3ed3dd349c6c4c632309cc62 llc: Drop support for ETH_P_TR_802_2. + CVE-2024-26636: 84e9d10419f6f4f3f3cd8f9aaf44a48719aa4b1b llc: make llc_ui_sendmsg() more robust against bonding changes + CVE-2024-26645: 5022b331c041e8c54b9a6a3251579bd1e8c0fc0b tracing: Ensure visibility when inserting an element into tracing_map + CVE-2024-26663: 24ec8f0da93b8a9fba11600be8a90f0d73fb46f1 tipc: Check the bearer type before calling tipc_udp_nl_bearer_add() + CVE-2024-26664: 93f0f4e846fcb682c3ec436e3b2e30e5a3a8ee6a hwmon: (coretemp) Fix out-of-bounds memory access + CVE-2024-26671: 9525b38180e2753f0daa1a522b7767a2aa969676 blk-mq: fix IO hang from sbitmap wakeup race + CVE-2024-26675: 4fdb14ba89faff6e6969a4dffdc8e54235d6e5ed ppp_async: limit MRU to 64K + CVE-2024-26679: caa064c3c2394d03e289ebd6b0be5102eb8a5b40 inet: read sk->sk_family once in inet_recv_error() + CVE-2024-26685: c4a09fdac625e64abe478dcf88bfa20406616928 nilfs2: fix potential bug in end_buffer_async_write + CVE-2024-26696: 228742b2ddfb99dfd71e5a307e6088ab6836272e nilfs2: fix hang in nilfs_lookup_dirty_data_buffers() + CVE-2024-26697: 5278c3eb6bf5896417572b52adb6be9d26e92f65 nilfs2: fix data corruption in dsync block recovery for small block sizes + CVE-2024-26704: b4fbb89d722cbb16beaaea234b7230faaaf68c71 ext4: fix double-free of blocks due to wrong extents moved_len + CVE-2024-26720: c593d26fb5d577ef31b6e49a31e08ae3ebc1bc1e mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again + +CVEs fixed in 4.19.308: + CVE-2024-26735: 953f42934533c151f440cd32390044d2396b87aa ipv6: sr: fix possible use-after-free and null-ptr-deref + CVE-2024-26744: 84f1dac960cfa210a3b7a7522e6c2320ae91932b RDMA/srpt: Support specifying the srpt_service_guid parameter + CVE-2024-26751: 9e200a06ae2abb321939693008290af32b33dd6e ARM: ep93xx: Add terminator to gpiod_lookup_table + CVE-2024-26752: 4c3ce64bc9d36ca9164dd6c77ff144c121011aae l2tp: pass correct message length to ip6_append_data + CVE-2024-26754: f0ecdfa679189d26aedfe24212d4e69e42c2c861 gtp: fix use-after-free and null-ptr-deref in gtp_genl_dump_pdp() + CVE-2024-26763: 43a202bd552976497474ae144942e32cc5f34d7e dm-crypt: don't modify the data when using authenticated encryption + CVE-2024-26764: 337b543e274fe7a8f47df3c8293cc6686ffa620f fs/aio: Restrict kiocb_set_cancel_fn() to I/O submitted via libaio + CVE-2024-26766: 115b7f3bc1dce590a6851a2dcf23dc1100c49790 IB/hfi1: Fix sdma.h tx->num_descs off-by-one error + CVE-2024-26772: 5a6dcc4ad0f7f7fa8e8d127b5526e7c5f2d38a43 ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal() + CVE-2024-26773: 21f8cfe79f776287459343e9cfa6055af61328ea ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found() + CVE-2024-26777: 84246c35ca34207114055a87552a1c4289c8fd7e fbdev: sis: Error out if pixclock equals zero + CVE-2024-26778: 224453de8505aede1890f007be973925a3edf6a1 fbdev: savage: Error out if pixclock equals zero + CVE-2024-26779: 76fad1174a0cae6fc857b9f88b261a2e4f07d587 wifi: mac80211: fix race condition on enabling fast-xmit + +CVEs fixed in 4.19.309: + CVE-2024-26791: 11d7a2e429c02d51e2dc90713823ea8b8d3d3a84 btrfs: dev-replace: properly validate device names + CVE-2024-26793: 01129059d5141d62fae692f7a336ae3bc712d3eb gtp: fix use-after-free and null-ptr-deref in gtp_newlink() + CVE-2024-26801: e0b278650f07acf2e0932149183458468a731c03 Bluetooth: Avoid potential use-after-free in hci_error_reset + CVE-2024-26805: ec343a55b687a452f5e87f3b52bf9f155864df65 netlink: Fix kernel-infoleak-after-free in __skb_datagram_iter + +CVEs fixed in 4.19.311: + CVE-2023-6270: ad80c34944d7175fa1f5c7a55066020002921a99 aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts + CVE-2023-7042: 0cd3b0a1dc987697cba1fe93c784365aa1f8a230 wifi: ath10k: fix NULL pointer dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev() + CVE-2024-22099: 369f419c097e82407dd429a202cde9a73d3ae29b Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security + CVE-2024-26651: 424eba06ed405d557077339edb19ce0ebe39e7c7 sr9800: Add check for usbnet_get_endpoints Outstanding CVEs: CVE-2005-3660: (unk) @@ -1358,6 +1505,12 @@ Outstanding CVEs: CVE-2020-36313: (unk) KVM: Fix out of range accesses to memslots CVE-2020-36385: (unk) RDMA/ucma: Rework ucma_migrate_id() to avoid races with destroy CVE-2020-36691: (unk) netlink: limit recursion depth in policy validation + CVE-2020-36775: (unk) f2fs: fix to avoid potential deadlock + CVE-2020-36780: (unk) i2c: sprd: fix reference leak when pm_runtime_get_sync fails + CVE-2020-36781: (unk) i2c: imx: fix reference leak when pm_runtime_get_sync fails + CVE-2020-36782: (unk) i2c: imx-lpi2c: fix reference leak when pm_runtime_get_sync fails + CVE-2020-36783: (unk) i2c: img-scb: fix reference leak when pm_runtime_get_sync fails + CVE-2020-36784: (unk) i2c: cadence: fix reference leak when pm_runtime_get_sync fails CVE-2020-7053: (unk) drm/i915: Introduce a mutex for file_priv->context_idr CVE-2021-0399: (unk) CVE-2021-0929: (unk) staging/android/ion: delete dma_buf->kmap/unmap implemenation @@ -1379,6 +1532,56 @@ Outstanding CVEs: CVE-2021-4037: (unk) xfs: fix up non-directory creation in SGID directories CVE-2021-4150: (unk) block: fix incorrect references to disk objects CVE-2021-4218: (unk) sysctl: pass kernel pointers to ->proc_handler + CVE-2021-46908: (unk) bpf: Use correct permission flag for mixed signed bounds arithmetic + CVE-2021-46925: (unk) net/smc: fix kernel panic caused by race of smc_sock + CVE-2021-46926: (unk) ALSA: hda: intel-sdw-acpi: harden detection of controller + CVE-2021-46928: (unk) parisc: Clear stale IIR value on instruction access rights trap + CVE-2021-46941: (unk) usb: dwc3: core: Do core softreset when switch mode + CVE-2021-46951: (unk) tpm: efi: Use local variable for calculating final log size + CVE-2021-46952: (unk) NFS: fs_context: validate UDP retrans to prevent shift out-of-bounds + CVE-2021-46959: (unk) spi: Fix use-after-free with devm_spi_alloc_* + CVE-2021-46962: (unk) mmc: uniphier-sd: Fix a resource leak in the remove function + CVE-2021-46965: (unk) mtd: physmap: physmap-bt1-rom: Fix unintentional stack access + CVE-2021-46969: (unk) bus: mhi: core: Fix invalid error returning in mhi_queue + CVE-2021-46970: (unk) bus: mhi: pci_generic: Remove WQ_MEM_RECLAIM flag from state workqueue + CVE-2021-46982: (unk) f2fs: compress: fix race condition of overwrite vs truncate + CVE-2021-46984: (unk) kyber: fix out of bounds access when preempted + CVE-2021-47028: (unk) mt76: mt7915: fix txrate reporting + CVE-2021-47046: (unk) drm/amd/display: Fix off by one in hdmi_14_process_transaction() + CVE-2021-47049: (unk) Drivers: hv: vmbus: Use after free in __vmbus_open() + CVE-2021-47052: (unk) crypto: sa2ul - Fix memory leak of rxd + CVE-2021-47059: (unk) crypto: sun8i-ss - fix result memory leak on error path + CVE-2021-47063: (unk) drm: bridge/panel: Cleanup connector on bridge detach + CVE-2021-47065: (unk) rtw88: Fix array overrun in rtw_get_tx_power_params() + CVE-2021-47070: (unk) uio_hv_generic: Fix another memory leak in error handling paths + CVE-2021-47074: (unk) nvme-loop: fix memory leak in nvme_loop_create_ctrl() + CVE-2021-47075: (unk) nvmet: fix memory leak in nvmet_alloc_ctrl() + CVE-2021-47076: (unk) RDMA/rxe: Return CQE error if invalid lkey was supplied + CVE-2021-47077: (unk) scsi: qedf: Add pointer checks in qedf_update_link_speed() + CVE-2021-47083: (unk) pinctrl: mediatek: fix global-out-of-bounds issue + CVE-2021-47101: (unk) asix: fix uninit-value in asix_mdio_read() + CVE-2021-47110: (unk) x86/kvm: Disable kvmclock on all CPUs on shutdown + CVE-2021-47112: (unk) x86/kvm: Teardown PV features on boot CPU as well + CVE-2021-47113: (unk) btrfs: abort in rename_exchange if we fail to insert the second ref + CVE-2021-47116: (unk) ext4: fix memory leak in ext4_mb_init_backend on error path. + CVE-2021-47119: (unk) ext4: fix memory leak in ext4_fill_super + CVE-2021-47124: (unk) io_uring: fix link timeout refs + CVE-2021-47125: (unk) sch_htb: fix refcount leak in htb_parent_to_leaf_offload + CVE-2021-47128: (unk) bpf, lockdown, audit: Fix buggy SELinux lockdown permission checks + CVE-2021-47131: (unk) net/tls: Fix use-after-free after the TLS device goes down and up + CVE-2021-47133: (unk) HID: amd_sfh: Fix memory leak in amd_sfh_work + CVE-2021-47135: (unk) mt76: mt7921: fix possible AOOB issue in mt7921_mcu_tx_rate_report + CVE-2021-47136: (unk) net: zero-initialize tc skb extension on allocation + CVE-2021-47137: (unk) net: lantiq: fix memory corruption in RX ring + CVE-2021-47140: (unk) iommu/amd: Clear DMA ops when switching domain + CVE-2021-47143: (unk) net/smc: remove device from smcd_dev_list after failed device_add() + CVE-2021-47147: (unk) ptp: ocp: Fix a resource leak in an error handling path + CVE-2021-47151: (unk) interconnect: qcom: bcm-voter: add a missing of_node_put() + CVE-2021-47158: (unk) net: dsa: sja1105: add error handling in sja1105_setup() + CVE-2021-47163: (unk) tipc: wait and exit until all work queues are done + CVE-2021-47167: (unk) NFS: Fix an Oopsable condition in __nfs_pageio_add_request() + CVE-2021-47172: (unk) iio: adc: ad7124: Fix potential overflow due to non sequential channel numbers + CVE-2021-47175: (unk) net/sched: fq_pie: fix OOB access in the traffic path CVE-2022-0168: (unk) cifs: fix NULL ptr dereference in smb2_ioctl_query_info() CVE-2022-0382: (unk) net ticp:fix a kernel-infoleak in __tipc_sendmsg() CVE-2022-0400: (unk) @@ -1437,6 +1640,8 @@ Outstanding CVEs: CVE-2022-45884: (unk) CVE-2022-45885: (unk) CVE-2022-47520: (unk) wifi: wilc1000: validate pairwise and authentication suite offsets + CVE-2022-48627: (unk) vt: fix memory overlapping when deleting chars in the buffer + CVE-2022-48628: (unk) ceph: drop messages from MDS when unmounting CVE-2023-0030: (unk) drm/nouveau/mmu: add more general vmm free/node handling functions CVE-2023-0386: (unk) ovl: fail on invalid uid/gid mapping at copy up CVE-2023-0597: (unk) x86/mm: Randomize per-cpu entry area @@ -1458,6 +1663,7 @@ Outstanding CVEs: CVE-2023-23039: (unk) CVE-2023-26242: (unk) CVE-2023-28466: (unk) net: tls: fix possible race condition between do_tls_getsockopt_conf() and do_tls_setsockopt_conf() + CVE-2023-28746: (unk) x86/mmio: Disable KVM mitigation when X86_FEATURE_CLEAR_CPU_BUF is set CVE-2023-3006: (unk) arm64: Add AMPERE1 to the Spectre-BHB affected list CVE-2023-3022: (unk) ipv6: Use result arg in fib_lookup_arg consistently CVE-2023-31081: (unk) @@ -1477,7 +1683,7 @@ Outstanding CVEs: CVE-2023-4133: (unk) cxgb4: fix use after free bugs caused by circular dependency problem CVE-2023-4134: (unk) Input: cyttsp4_core - change del_timer_sync() to timer_shutdown_sync() CVE-2023-4622: (unk) unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES - CVE-2023-47233: (unk) + CVE-2023-47233: (unk) wifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach CVE-2023-4881: (unk) netfilter: nftables: exthdr: fix 4-byte stack OOB write CVE-2023-51779: (unk) Bluetooth: af_bluetooth: Fix Use-After-Free in bt_sock_recvmsg CVE-2023-5178: (unk) nvmet-tcp: Fix a possible UAF in queue intialization setup @@ -1485,28 +1691,85 @@ Outstanding CVEs: CVE-2023-52434: (unk) smb: client: fix potential OOBs in smb2_parse_contexts() CVE-2023-52435: (unk) net: prevent mss overflow in skb_segment() CVE-2023-52442: (unk) ksmbd: validate session id and tree id in compound request - CVE-2023-52456: (unk) serial: imx: fix tx statemachine deadlock - CVE-2023-52457: (unk) serial: 8250: omap: Don't skip resource freeing if pm_runtime_resume_and_get() failed CVE-2023-52458: (unk) block: add check that partition length needs to be aligned with block size + CVE-2023-52474: (unk) IB/hfi1: Fix bugs with non-PAGE_SIZE-end multi-iovec user SDMA requests + CVE-2023-52476: (unk) perf/x86/lbr: Filter vsyscall addresses + CVE-2023-52479: (unk) ksmbd: fix uaf in smb20_oplock_break_ack + CVE-2023-52480: (unk) ksmbd: fix race condition between session lookup and expire + CVE-2023-52481: (unk) arm64: errata: Add Cortex-A520 speculative unprivileged load workaround + CVE-2023-52482: (unk) x86/srso: Add SRSO mitigation for Hygon processors + CVE-2023-52484: (unk) iommu/arm-smmu-v3: Fix soft lockup triggered by arm_smmu_mm_invalidate_range + CVE-2023-52485: (unk) drm/amd/display: Wake DMCUB before sending a command + CVE-2023-52488: (unk) serial: sc16is7xx: convert from _raw_ to _noinc_ regmap functions for FIFO + CVE-2023-52489: (unk) mm/sparsemem: fix race in accessing memory_section->usage + CVE-2023-52491: (unk) media: mtk-jpeg: Fix use after free bug due to error path handling in mtk_jpeg_dec_device_run + CVE-2023-52498: (unk) PM: sleep: Fix possible deadlocks in core system-wide PM code + CVE-2023-52500: (unk) scsi: pm80xx: Avoid leaking tags when processing OPC_INB_SET_CONTROLLER_CONFIG command + CVE-2023-52501: (unk) ring-buffer: Do not attempt to read past "commit" + CVE-2023-52506: (unk) LoongArch: Set all reserved memblocks on Node#0 at initialization + CVE-2023-52508: (unk) nvme-fc: Prevent null pointer dereference in nvme_fc_io_getuuid() + CVE-2023-52509: (unk) ravb: Fix use-after-free issue in ravb_tx_timeout_work() + CVE-2023-52511: (unk) spi: sun6i: reduce DMA RX transfer width to single byte + CVE-2023-52515: (unk) RDMA/srp: Do not call scsi_done() from srp_abort() + CVE-2023-52516: (unk) dma-debug: don't call __dma_entry_alloc_check_leak() under free_entries_lock + CVE-2023-52517: (unk) spi: sun6i: fix race between DMA RX transfer completion and RX FIFO drain + CVE-2023-52519: (unk) HID: intel-ish-hid: ipc: Disable and reenable ACPI GPE bit + CVE-2023-52522: (unk) net: fix possible store tearing in neigh_periodic_work() + CVE-2023-52530: (unk) wifi: mac80211: fix potential key use-after-free + CVE-2023-52531: (unk) wifi: iwlwifi: mvm: Fix a memory corruption issue + CVE-2023-52532: (unk) net: mana: Fix TX CQE error handling + CVE-2023-52559: (unk) iommu/vt-d: Avoid memory allocation in iommu_suspend() + CVE-2023-52561: (unk) arm64: dts: qcom: sdm845-db845c: Mark cont splash memory region as reserved + CVE-2023-52563: (unk) drm/meson: fix memory leak on ->hpd_notify callback + CVE-2023-52565: (unk) media: uvcvideo: Fix OOB read + CVE-2023-52568: (unk) x86/sgx: Resolves SECS reclaim vs. page fault for EAUG race + CVE-2023-52569: (unk) btrfs: remove BUG() after failure to insert delayed dir index item + CVE-2023-52571: (unk) power: supply: rk817: Fix node refcount leak + CVE-2023-52572: (unk) cifs: Fix UAF in cifs_demultiplex_thread() + CVE-2023-52584: (unk) spmi: mediatek: Fix UAF on device remove + CVE-2023-52585: (unk) drm/amdgpu: Fix possible NULL dereference in amdgpu_ras_query_error_status_helper() + CVE-2023-52586: (unk) drm/msm/dpu: Add mutex lock in control vblank irq + CVE-2023-52588: (unk) f2fs: fix to tag gcing flag on page during block migration + CVE-2023-52589: (unk) media: rkisp1: Fix IRQ disable race issue + CVE-2023-52590: (unk) ocfs2: Avoid touching renamed directory if parent does not change + CVE-2023-52591: (unk) reiserfs: Avoid touching renamed directory if parent does not change + CVE-2023-52593: (unk) wifi: wfx: fix possible NULL pointer dereference in wfx_set_mfp_ap() + CVE-2023-52595: (unk) wifi: rt2x00: restart beacon queue when hardware reset + CVE-2023-52596: (unk) sysctl: Fix out of bounds access for empty sysctl registers + CVE-2023-52614: (unk) PM / devfreq: Fix buffer overflow in trans_stat_show + CVE-2023-52617: (unk) PCI: switchtec: Fix stdev_release() crash after surprise hot remove + CVE-2023-52618: (unk) block/rnbd-srv: Check for unlikely string overflow + CVE-2023-52620: (unk) netfilter: nf_tables: disallow timeout for anonymous sets + CVE-2023-52621: (unk) bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers + CVE-2023-52624: (unk) drm/amd/display: Wake DMCUB before executing GPINT commands + CVE-2023-52625: (unk) drm/amd/display: Refactor DMCUB enter/exit idle interface + CVE-2023-52628: (unk) netfilter: nftables: exthdr: fix 4-byte stack OOB write + CVE-2023-52629: (unk) sh: push-switch: Reorder cleanup operations to avoid use-after-free bug + CVE-2023-52632: (unk) drm/amdkfd: Fix lock dependency warning with srcu + CVE-2023-52633: (unk) um: time-travel: fix time corruption + CVE-2023-52634: (unk) drm/amd/display: Fix disable_otg_wa logic + CVE-2023-52635: (unk) PM / devfreq: Synchronize devfreq_monitor_[start/stop] + CVE-2023-52638: (unk) can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock + CVE-2023-52639: (unk) KVM: s390: vsie: fix race during shadow creation + CVE-2023-52640: (unk) fs/ntfs3: Fix oob in ntfs_listxattr + CVE-2023-52641: (unk) fs/ntfs3: Add NULL ptr dereference checking at the end of attr_allocate_frame() CVE-2023-6121: (unk) nvmet: nul-terminate the NQNs passed in the connect command CVE-2023-6240: (unk) - CVE-2023-6270: (unk) - CVE-2023-6356: (unk) + CVE-2023-6356: (unk) nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length CVE-2023-6535: (unk) - CVE-2023-6536: (unk) + CVE-2023-6536: (unk) nvmet-tcp: fix a crash in nvmet_req_complete() CVE-2023-6546: (unk) tty: n_gsm: fix the UAF caused by race condition in gsm_cleanup_mux CVE-2023-6610: (unk) smb: client: fix potential OOB in smb2_dump_detail() CVE-2023-6915: (unk) ida: Fix crash in ida_free when the bitmap is empty - CVE-2023-7042: (unk) CVE-2024-0564: (unk) CVE-2024-0565: (unk) smb: client: fix OOB in receive_encrypted_standard() CVE-2024-1151: (unk) net: openvswitch: limit the number of recursions from action sets CVE-2024-1312: (unk) mm: lock_vma_under_rcu() must check vma->anon_vma under vma lock CVE-2024-21803: (unk) - CVE-2024-22099: (unk) + CVE-2024-2193: (unk) CVE-2024-22386: (unk) - CVE-2024-23196: (unk) - CVE-2024-23307: (unk) + CVE-2024-23196: (unk) ALSA: hda: fix a possible null-pointer dereference due to data race in snd_hdac_regmap_sync() + CVE-2024-23307: (unk) md/raid5: fix atomicity violation in raid5_cache_count CVE-2024-23848: (unk) CVE-2024-23851: (unk) dm: limit the number of targets and parameter size area CVE-2024-24855: (unk) scsi: lpfc: Fix a possible data race in lpfc_unregister_fcf_rescan() @@ -1514,7 +1777,7 @@ Outstanding CVEs: CVE-2024-24858: (unk) CVE-2024-24859: (unk) CVE-2024-24860: (unk) Bluetooth: Fix atomicity violation in {min,max}_key_size_set - CVE-2024-24861: (unk) + CVE-2024-24861: (unk) media: xc4000: Fix atomicity violation in xc4000_get_frequency CVE-2024-24864: (unk) CVE-2024-25739: (unk) CVE-2024-25740: (unk) @@ -1522,10 +1785,71 @@ Outstanding CVEs: CVE-2024-25744: (unk) x86/coco: Disable 32-bit emulation by default on TDX and SEV CVE-2024-26584: (unk) net: tls: handle backlogging of crypto requests CVE-2024-26586: (unk) mlxsw: spectrum_acl_tcam: Fix stack corruption - CVE-2024-26587: (unk) net: netdevsim: don't try to destroy PHC on VFs - CVE-2024-26588: (unk) LoongArch: BPF: Prevent out-of-bounds memory access - CVE-2024-26591: (unk) bpf: Fix re-attachment branch in bpf_tracing_prog_attach CVE-2024-26592: (unk) ksmbd: fix UAF issue in ksmbd_tcp_new_connection() CVE-2024-26594: (unk) ksmbd: validate mech token in session setup CVE-2024-26595: (unk) mlxsw: spectrum_acl_tcam: Fix NULL pointer dereference in error path CVE-2024-26598: (unk) KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache + CVE-2024-26614: (unk) tcp: make sure init the accept_queue's spinlocks once + CVE-2024-26622: (unk) tomoyo: fix UAF write bug in tomoyo_write_control() + CVE-2024-26623: (unk) pds_core: Prevent race issues involving the adminq + CVE-2024-26627: (unk) scsi: core: Move scsi_host_busy() out of host lock for waking up EH handler + CVE-2024-26640: (unk) tcp: add sanity checks to rx zerocopy + CVE-2024-26641: (unk) ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv() + CVE-2024-26642: (unk) netfilter: nf_tables: disallow anonymous set with timeout flag + CVE-2024-26644: (unk) btrfs: don't abort filesystem when attempting to snapshot deleted subvolume + CVE-2024-26646: (unk) thermal: intel: hfi: Add syscore callbacks for system-wide PM + CVE-2024-26647: (unk) drm/amd/display: Fix late derefrence 'dsc' check in 'link_set_dsc_pps_packet()' + CVE-2024-26648: (unk) drm/amd/display: Fix variable deferencing before NULL check in edp_setup_replay() + CVE-2024-26650: (unk) platform/x86: p2sb: Allow p2sb_bar() calls during PCI device probe + CVE-2024-26654: (unk) ALSA: sh: aica: reorder cleanup operations to avoid UAF bugs + CVE-2024-26655: (unk) Fix memory leak in posix_clock_open() + CVE-2024-26656: (unk) drm/amdgpu: fix use-after-free bug + CVE-2024-26658: (unk) bcachefs: grab s_umount only if snapshotting + CVE-2024-26659: (unk) xhci: handle isoc Babble and Buffer Overrun events properly + CVE-2024-26668: (unk) netfilter: nft_limit: reject configurations that cause integer overflow + CVE-2024-26672: (unk) drm/amdgpu: Fix variable 'mca_funcs' dereferenced before NULL check in 'amdgpu_mca_smu_get_mca_entry()' + CVE-2024-26676: (unk) af_unix: Call kfree_skb() for dead unix_(sk)->oob_skb in GC. + CVE-2024-26677: (unk) rxrpc: Fix delayed ACKs to not set the reference serial number + CVE-2024-26686: (unk) fs/proc: do_task_stat: use sig->stats_lock to gather the threads/children stats + CVE-2024-26687: (unk) xen/events: close evtchn after mapping cleanup + CVE-2024-26689: (unk) ceph: prevent use-after-free in encode_cap_msg() + CVE-2024-26691: (unk) KVM: arm64: Fix circular locking dependency + CVE-2024-26699: (unk) drm/amd/display: Fix array-index-out-of-bounds in dcn35_clkmgr + CVE-2024-26700: (unk) drm/amd/display: Fix MST Null Ptr for RV + CVE-2024-26706: (unk) parisc: Fix random data corruption from exception handler + CVE-2024-26713: (unk) powerpc/pseries/iommu: Fix iommu initialisation during DLPAR add + CVE-2024-26715: (unk) usb: dwc3: gadget: Fix NULL pointer dereference in dwc3_gadget_suspend + CVE-2024-26719: (unk) nouveau: offload fence uevents work to workqueue + CVE-2024-26726: (unk) btrfs: don't drop extent_map for free space inode on write error + CVE-2024-26733: (unk) arp: Prevent overflow in arp_req_get(). + CVE-2024-26736: (unk) afs: Increase buffer size in afs_update_volume_status() + CVE-2024-26738: (unk) powerpc/pseries/iommu: DLPAR add doesn't completely initialize pci_controller + CVE-2024-26739: (unk) net/sched: act_mirred: don't override retval if we already lost the skb + CVE-2024-26740: (unk) net/sched: act_mirred: use the backlog for mirred ingress + CVE-2024-26743: (unk) RDMA/qedr: Fix qedr_create_user_qp error flow + CVE-2024-26745: (unk) powerpc/pseries/iommu: IOMMU table is not initialized for kdump over SR-IOV + CVE-2024-26747: (unk) usb: roles: fix NULL pointer issue when put module's reference + CVE-2024-26748: (unk) usb: cdns3: fix memory double free when handle zero packet + CVE-2024-26756: (unk) md: Don't register sync_thread for reshape directly + CVE-2024-26757: (unk) md: Don't ignore read-only array in md_check_recovery() + CVE-2024-26758: (unk) md: Don't ignore suspended array in md_check_recovery() + CVE-2024-26759: (unk) mm/swap: fix race when skipping swapcache + CVE-2024-26765: (unk) LoongArch: Disable IRQ before init_fn() for nonboot CPUs + CVE-2024-26767: (unk) drm/amd/display: fixed integer types and null check locations + CVE-2024-26768: (unk) LoongArch: Change acpi_core_pic[NR_CPUS] to acpi_core_pic[MAX_CORE_PIC] + CVE-2024-26769: (unk) nvmet-fc: avoid deadlock on delete association path + CVE-2024-26770: (unk) HID: nvidia-shield: Add missing null pointer checks to LED initialization + CVE-2024-26771: (unk) dmaengine: ti: edma: Add some null pointer checks to the edma_probe + CVE-2024-26774: (unk) ext4: avoid dividing by 0 in mb_update_avg_fragment_size() when block bitmap corrupt + CVE-2024-26775: (unk) aoe: avoid potential deadlock at set_capacity + CVE-2024-26776: (unk) spi: hisi-sfc-v3xx: Return IRQ_NONE if no interrupts were detected + CVE-2024-26784: (unk) pmdomain: arm: Fix NULL dereference on scmi_perf_domain removal + CVE-2024-26789: (unk) crypto: arm64/neonbs - fix out-of-bounds access on short input + CVE-2024-26797: (unk) drm/amd/display: Prevent potential buffer overflow in map_hw_resources + CVE-2024-26798: (unk) fbcon: always restore the old font data in fbcon_do_set_font() + CVE-2024-26802: (unk) stmmac: Clear variable when destroying workqueue + CVE-2024-26803: (unk) net: veth: clear GRO when clearing XDP even when down + CVE-2024-26804: (unk) net: ip_tunnel: prevent perpetual headroom growth + CVE-2024-26806: (unk) spi: cadence-qspi: remove system-wide suspend helper calls from runtime PM hooks + CVE-2024-26808: (unk) netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain + CVE-2024-26809: (unk) netfilter: nft_set_pipapo: release elements in clone only from destroy path diff --git a/data/4.20/4.20_CVEs.txt b/data/4.20/4.20_CVEs.txt index 21db7cf95..53157793c 100644 --- a/data/4.20/4.20_CVEs.txt +++ b/data/4.20/4.20_CVEs.txt @@ -253,6 +253,8 @@ CVE-2019-2101: Fixed with 4.20.16 CVE-2019-2181: Fix not seen in stream CVE-2019-2213: Fix not seen in stream CVE-2019-25045: Fix not seen in stream +CVE-2019-25160: Fixed with 4.20.15 +CVE-2019-25162: Fix not seen in stream CVE-2019-3016: Fix not seen in stream CVE-2019-3459: Fix not seen in stream CVE-2019-3460: Fix not seen in stream @@ -449,6 +451,13 @@ CVE-2020-36558: Fix not seen in stream CVE-2020-36691: Fix not seen in stream CVE-2020-36694: Fix not seen in stream CVE-2020-36766: Fix not seen in stream +CVE-2020-36775: Fix not seen in stream +CVE-2020-36777: Fix not seen in stream +CVE-2020-36780: Fix not seen in stream +CVE-2020-36781: Fix not seen in stream +CVE-2020-36782: Fix not seen in stream +CVE-2020-36783: Fix not seen in stream +CVE-2020-36784: Fix not seen in stream CVE-2020-3702: Fix not seen in stream CVE-2020-4788: Fix not seen in stream CVE-2020-7053: Fix not seen in stream @@ -609,6 +618,121 @@ CVE-2021-45469: Fix not seen in stream CVE-2021-45485: Fix not seen in stream CVE-2021-45486: Fix not seen in stream CVE-2021-45868: Fix not seen in stream +CVE-2021-46904: Fix not seen in stream +CVE-2021-46906: Fix not seen in stream +CVE-2021-46908: Fix not seen in stream +CVE-2021-46909: Fix not seen in stream +CVE-2021-46915: Fix not seen in stream +CVE-2021-46921: Fix not seen in stream +CVE-2021-46924: Fix not seen in stream +CVE-2021-46925: Fix not seen in stream +CVE-2021-46926: Fix not seen in stream +CVE-2021-46928: Fix not seen in stream +CVE-2021-46929: Fix not seen in stream +CVE-2021-46932: Fix not seen in stream +CVE-2021-46933: Fix not seen in stream +CVE-2021-46934: Fix not seen in stream +CVE-2021-46935: Fix not seen in stream +CVE-2021-46936: Fix not seen in stream +CVE-2021-46938: Fix not seen in stream +CVE-2021-46939: Fix not seen in stream +CVE-2021-46941: Fix not seen in stream +CVE-2021-46950: Fix not seen in stream +CVE-2021-46951: Fix not seen in stream +CVE-2021-46952: Fix not seen in stream +CVE-2021-46953: Fix not seen in stream +CVE-2021-46955: Fix not seen in stream +CVE-2021-46959: Fix not seen in stream +CVE-2021-46960: Fix not seen in stream +CVE-2021-46962: Fix not seen in stream +CVE-2021-46965: Fix not seen in stream +CVE-2021-46969: Fix not seen in stream +CVE-2021-46970: Fix not seen in stream +CVE-2021-46982: Fix not seen in stream +CVE-2021-46984: Fix not seen in stream +CVE-2021-46988: Fix not seen in stream +CVE-2021-46989: Fix not seen in stream +CVE-2021-46991: Fix not seen in stream +CVE-2021-46992: Fix not seen in stream +CVE-2021-46998: Fix not seen in stream +CVE-2021-47004: Fix not seen in stream +CVE-2021-47006: Fix not seen in stream +CVE-2021-47010: Fix not seen in stream +CVE-2021-47013: Fix not seen in stream +CVE-2021-47020: Fix not seen in stream +CVE-2021-47028: Fix not seen in stream +CVE-2021-47034: Fix not seen in stream +CVE-2021-47046: Fix not seen in stream +CVE-2021-47049: Fix not seen in stream +CVE-2021-47052: Fix not seen in stream +CVE-2021-47054: Fix not seen in stream +CVE-2021-47056: Fix not seen in stream +CVE-2021-47059: Fix not seen in stream +CVE-2021-47063: Fix not seen in stream +CVE-2021-47065: Fix not seen in stream +CVE-2021-47070: Fix not seen in stream +CVE-2021-47071: Fix not seen in stream +CVE-2021-47073: Fix not seen in stream +CVE-2021-47074: Fix not seen in stream +CVE-2021-47075: Fix not seen in stream +CVE-2021-47076: Fix not seen in stream +CVE-2021-47077: Fix not seen in stream +CVE-2021-47078: Fix not seen in stream +CVE-2021-47082: Fix not seen in stream +CVE-2021-47083: Fix not seen in stream +CVE-2021-47086: Fix not seen in stream +CVE-2021-47100: Fix not seen in stream +CVE-2021-47101: Fix not seen in stream +CVE-2021-47103: Fix not seen in stream +CVE-2021-47110: Fix not seen in stream +CVE-2021-47112: Fix not seen in stream +CVE-2021-47113: Fix not seen in stream +CVE-2021-47114: Fix not seen in stream +CVE-2021-47116: Fix not seen in stream +CVE-2021-47117: Fix not seen in stream +CVE-2021-47118: Fix not seen in stream +CVE-2021-47119: Fix not seen in stream +CVE-2021-47120: Fix not seen in stream +CVE-2021-47121: Fix not seen in stream +CVE-2021-47122: Fix not seen in stream +CVE-2021-47124: Fix not seen in stream +CVE-2021-47125: Fix not seen in stream +CVE-2021-47128: Fix not seen in stream +CVE-2021-47131: Fix not seen in stream +CVE-2021-47133: Fix not seen in stream +CVE-2021-47135: Fix not seen in stream +CVE-2021-47136: Fix not seen in stream +CVE-2021-47137: Fix not seen in stream +CVE-2021-47140: Fix not seen in stream +CVE-2021-47142: Fix not seen in stream +CVE-2021-47143: Fix not seen in stream +CVE-2021-47144: Fix not seen in stream +CVE-2021-47145: Fix not seen in stream +CVE-2021-47146: Fix not seen in stream +CVE-2021-47147: Fix not seen in stream +CVE-2021-47149: Fix not seen in stream +CVE-2021-47150: Fix not seen in stream +CVE-2021-47151: Fix not seen in stream +CVE-2021-47153: Fix not seen in stream +CVE-2021-47158: Fix not seen in stream +CVE-2021-47159: Fix not seen in stream +CVE-2021-47160: Fix not seen in stream +CVE-2021-47161: Fix not seen in stream +CVE-2021-47162: Fix not seen in stream +CVE-2021-47163: Fix not seen in stream +CVE-2021-47165: Fix not seen in stream +CVE-2021-47166: Fix not seen in stream +CVE-2021-47167: Fix not seen in stream +CVE-2021-47168: Fix not seen in stream +CVE-2021-47169: Fix not seen in stream +CVE-2021-47170: Fix not seen in stream +CVE-2021-47171: Fix not seen in stream +CVE-2021-47172: Fix not seen in stream +CVE-2021-47173: Fix not seen in stream +CVE-2021-47175: Fix not seen in stream +CVE-2021-47177: Fix not seen in stream +CVE-2021-47179: Fix not seen in stream +CVE-2021-47180: Fix not seen in stream CVE-2022-0001: Fix not seen in stream CVE-2022-0002: Fix not seen in stream CVE-2022-0168: Fix not seen in stream @@ -811,6 +935,10 @@ CVE-2022-4744: Fix not seen in stream CVE-2022-47520: Fix not seen in stream CVE-2022-47929: Fix not seen in stream CVE-2022-48619: Fix not seen in stream +CVE-2022-48626: Fix not seen in stream +CVE-2022-48627: Fix not seen in stream +CVE-2022-48628: Fix not seen in stream +CVE-2022-48629: Fix not seen in stream CVE-2023-0030: Fix not seen in stream CVE-2023-0045: Fix not seen in stream CVE-2023-0047: Fix not seen in stream @@ -881,6 +1009,7 @@ CVE-2023-26607: Fix not seen in stream CVE-2023-28328: Fix not seen in stream CVE-2023-28466: Fix not seen in stream CVE-2023-2860: Fix not seen in stream +CVE-2023-28746: Fix not seen in stream CVE-2023-28772: Fix not seen in stream CVE-2023-2985: Fix not seen in stream CVE-2023-3006: Fix not seen in stream @@ -955,7 +1084,7 @@ CVE-2023-4622: Fix not seen in stream CVE-2023-4623: Fix not seen in stream CVE-2023-46343: Fix not seen in stream CVE-2023-46838: Fix not seen in stream -CVE-2023-47233: Fix unknown +CVE-2023-47233: Fix not seen in stream CVE-2023-4881: Fix not seen in stream CVE-2023-4921: Fix not seen in stream CVE-2023-51042: Fix not seen in stream @@ -979,25 +1108,118 @@ CVE-2023-52445: Fix not seen in stream CVE-2023-52448: Fix not seen in stream CVE-2023-52449: Fix not seen in stream CVE-2023-52451: Fix not seen in stream -CVE-2023-52456: Fix not seen in stream -CVE-2023-52457: Fix not seen in stream CVE-2023-52458: Fix not seen in stream CVE-2023-52464: Fix not seen in stream +CVE-2023-52469: Fix not seen in stream +CVE-2023-52470: Fix not seen in stream +CVE-2023-52474: Fix not seen in stream +CVE-2023-52475: Fix not seen in stream +CVE-2023-52476: Fix not seen in stream +CVE-2023-52477: Fix not seen in stream +CVE-2023-52478: Fix not seen in stream +CVE-2023-52479: Fix not seen in stream +CVE-2023-52480: Fix not seen in stream +CVE-2023-52481: Fix not seen in stream +CVE-2023-52482: Fix not seen in stream +CVE-2023-52484: Fix not seen in stream +CVE-2023-52485: Fix not seen in stream +CVE-2023-52486: Fix not seen in stream +CVE-2023-52488: Fix not seen in stream +CVE-2023-52489: Fix not seen in stream +CVE-2023-52491: Fix not seen in stream +CVE-2023-52498: Fix not seen in stream +CVE-2023-52500: Fix not seen in stream +CVE-2023-52501: Fix not seen in stream +CVE-2023-52502: Fix not seen in stream +CVE-2023-52504: Fix not seen in stream +CVE-2023-52506: Fix not seen in stream +CVE-2023-52507: Fix not seen in stream +CVE-2023-52508: Fix not seen in stream +CVE-2023-52509: Fix not seen in stream +CVE-2023-52510: Fix not seen in stream +CVE-2023-52511: Fix not seen in stream +CVE-2023-52515: Fix not seen in stream +CVE-2023-52516: Fix not seen in stream +CVE-2023-52517: Fix not seen in stream +CVE-2023-52519: Fix not seen in stream +CVE-2023-52522: Fix not seen in stream +CVE-2023-52527: Fix not seen in stream +CVE-2023-52528: Fix not seen in stream +CVE-2023-52530: Fix not seen in stream +CVE-2023-52531: Fix not seen in stream +CVE-2023-52532: Fix not seen in stream +CVE-2023-52559: Fix not seen in stream +CVE-2023-52561: Fix not seen in stream +CVE-2023-52563: Fix not seen in stream +CVE-2023-52565: Fix not seen in stream +CVE-2023-52566: Fix not seen in stream +CVE-2023-52568: Fix not seen in stream +CVE-2023-52569: Fix not seen in stream +CVE-2023-52571: Fix not seen in stream +CVE-2023-52572: Fix not seen in stream +CVE-2023-52574: Fix not seen in stream +CVE-2023-52578: Fix not seen in stream +CVE-2023-52583: Fix not seen in stream +CVE-2023-52584: Fix not seen in stream +CVE-2023-52585: Fix not seen in stream +CVE-2023-52586: Fix not seen in stream +CVE-2023-52587: Fix not seen in stream +CVE-2023-52588: Fix not seen in stream +CVE-2023-52589: Fix not seen in stream +CVE-2023-52590: Fix not seen in stream +CVE-2023-52591: Fix not seen in stream +CVE-2023-52593: Fix not seen in stream +CVE-2023-52594: Fix not seen in stream +CVE-2023-52595: Fix not seen in stream +CVE-2023-52596: Fix not seen in stream +CVE-2023-52597: Fix not seen in stream +CVE-2023-52598: Fix not seen in stream +CVE-2023-52599: Fix not seen in stream +CVE-2023-52600: Fix not seen in stream +CVE-2023-52601: Fix not seen in stream +CVE-2023-52602: Fix not seen in stream +CVE-2023-52603: Fix not seen in stream +CVE-2023-52604: Fix not seen in stream +CVE-2023-52606: Fix not seen in stream +CVE-2023-52607: Fix not seen in stream +CVE-2023-52609: Fix not seen in stream +CVE-2023-52612: Fix not seen in stream +CVE-2023-52614: Fix not seen in stream +CVE-2023-52615: Fix not seen in stream +CVE-2023-52617: Fix not seen in stream +CVE-2023-52618: Fix not seen in stream +CVE-2023-52619: Fix not seen in stream +CVE-2023-52620: Fix not seen in stream +CVE-2023-52621: Fix not seen in stream +CVE-2023-52622: Fix not seen in stream +CVE-2023-52623: Fix not seen in stream +CVE-2023-52624: Fix not seen in stream +CVE-2023-52625: Fix not seen in stream +CVE-2023-52628: Fix not seen in stream +CVE-2023-52629: Fix not seen in stream +CVE-2023-52632: Fix not seen in stream +CVE-2023-52633: Fix not seen in stream +CVE-2023-52634: Fix not seen in stream +CVE-2023-52635: Fix not seen in stream +CVE-2023-52638: Fix not seen in stream +CVE-2023-52639: Fix not seen in stream +CVE-2023-52640: Fix not seen in stream +CVE-2023-52641: Fix not seen in stream CVE-2023-5717: Fix not seen in stream CVE-2023-6040: Fix not seen in stream CVE-2023-6121: Fix not seen in stream CVE-2023-6240: Fix unknown -CVE-2023-6270: Fix unknown -CVE-2023-6356: Fix unknown +CVE-2023-6270: Fix not seen in stream +CVE-2023-6356: Fix not seen in stream CVE-2023-6535: Fix unknown -CVE-2023-6536: Fix unknown +CVE-2023-6536: Fix not seen in stream CVE-2023-6546: Fix not seen in stream CVE-2023-6606: Fix not seen in stream CVE-2023-6610: Fix not seen in stream CVE-2023-6915: Fix not seen in stream CVE-2023-6931: Fix not seen in stream CVE-2023-6932: Fix not seen in stream -CVE-2023-7042: Fix unknown +CVE-2023-7042: Fix not seen in stream CVE-2023-7192: Fix not seen in stream CVE-2024-0340: Fix not seen in stream CVE-2024-0564: Fix unknown @@ -1010,10 +1232,11 @@ CVE-2024-1086: Fix not seen in stream CVE-2024-1151: Fix not seen in stream CVE-2024-1312: Fix not seen in stream CVE-2024-21803: Fix unknown -CVE-2024-22099: Fix unknown +CVE-2024-2193: Fix unknown +CVE-2024-22099: Fix not seen in stream CVE-2024-22386: Fix unknown -CVE-2024-23196: Fix unknown -CVE-2024-23307: Fix unknown +CVE-2024-23196: Fix not seen in stream +CVE-2024-23307: Fix not seen in stream CVE-2024-23848: Fix unknown CVE-2024-23849: Fix not seen in stream CVE-2024-23851: Fix not seen in stream @@ -1022,7 +1245,7 @@ CVE-2024-24857: Fix unknown CVE-2024-24858: Fix unknown CVE-2024-24859: Fix unknown CVE-2024-24860: Fix not seen in stream -CVE-2024-24861: Fix unknown +CVE-2024-24861: Fix not seen in stream CVE-2024-24864: Fix unknown CVE-2024-25739: Fix unknown CVE-2024-25740: Fix unknown @@ -1031,12 +1254,111 @@ CVE-2024-25744: Fix not seen in stream CVE-2024-26584: Fix not seen in stream CVE-2024-26585: Fix not seen in stream CVE-2024-26586: Fix not seen in stream -CVE-2024-26587: Fix not seen in stream -CVE-2024-26588: Fix not seen in stream CVE-2024-26589: Fix not seen in stream -CVE-2024-26591: Fix not seen in stream CVE-2024-26592: Fix not seen in stream CVE-2024-26594: Fix not seen in stream CVE-2024-26595: Fix not seen in stream CVE-2024-26597: Fix not seen in stream CVE-2024-26598: Fix not seen in stream +CVE-2024-26600: Fix not seen in stream +CVE-2024-26602: Fix not seen in stream +CVE-2024-26606: Fix not seen in stream +CVE-2024-26614: Fix not seen in stream +CVE-2024-26615: Fix not seen in stream +CVE-2024-26622: Fix not seen in stream +CVE-2024-26623: Fix not seen in stream +CVE-2024-26625: Fix not seen in stream +CVE-2024-26627: Fix not seen in stream +CVE-2024-26633: Fix not seen in stream +CVE-2024-26635: Fix not seen in stream +CVE-2024-26636: Fix not seen in stream +CVE-2024-26640: Fix not seen in stream +CVE-2024-26641: Fix not seen in stream +CVE-2024-26642: Fix not seen in stream +CVE-2024-26644: Fix not seen in stream +CVE-2024-26645: Fix not seen in stream +CVE-2024-26646: Fix not seen in stream +CVE-2024-26647: Fix not seen in stream +CVE-2024-26648: Fix not seen in stream +CVE-2024-26650: Fix not seen in stream +CVE-2024-26651: Fix not seen in stream +CVE-2024-26654: Fix not seen in stream +CVE-2024-26655: Fix not seen in stream +CVE-2024-26656: Fix not seen in stream +CVE-2024-26658: Fix not seen in stream +CVE-2024-26659: Fix not seen in stream +CVE-2024-26663: Fix not seen in stream +CVE-2024-26664: Fix not seen in stream +CVE-2024-26668: Fix not seen in stream +CVE-2024-26671: Fix not seen in stream +CVE-2024-26672: Fix not seen in stream +CVE-2024-26675: Fix not seen in stream +CVE-2024-26676: Fix not seen in stream +CVE-2024-26677: Fix not seen in stream +CVE-2024-26679: Fix not seen in stream +CVE-2024-26685: Fix not seen in stream +CVE-2024-26686: Fix not seen in stream +CVE-2024-26687: Fix not seen in stream +CVE-2024-26689: Fix not seen in stream +CVE-2024-26691: Fix not seen in stream +CVE-2024-26696: Fix not seen in stream +CVE-2024-26697: Fix not seen in stream +CVE-2024-26699: Fix not seen in stream +CVE-2024-26700: Fix not seen in stream +CVE-2024-26704: Fix not seen in stream +CVE-2024-26706: Fix not seen in stream +CVE-2024-26713: Fix not seen in stream +CVE-2024-26715: Fix not seen in stream +CVE-2024-26719: Fix not seen in stream +CVE-2024-26720: Fix not seen in stream +CVE-2024-26726: Fix not seen in stream +CVE-2024-26733: Fix not seen in stream +CVE-2024-26735: Fix not seen in stream +CVE-2024-26736: Fix not seen in stream +CVE-2024-26738: Fix not seen in stream +CVE-2024-26739: Fix not seen in stream +CVE-2024-26740: Fix not seen in stream +CVE-2024-26743: Fix not seen in stream +CVE-2024-26744: Fix not seen in stream +CVE-2024-26745: Fix not seen in stream +CVE-2024-26747: Fix not seen in stream +CVE-2024-26748: Fix not seen in stream +CVE-2024-26751: Fix not seen in stream +CVE-2024-26752: Fix not seen in stream +CVE-2024-26754: Fix not seen in stream +CVE-2024-26756: Fix not seen in stream +CVE-2024-26757: Fix not seen in stream +CVE-2024-26758: Fix not seen in stream +CVE-2024-26759: Fix not seen in stream +CVE-2024-26763: Fix not seen in stream +CVE-2024-26764: Fix not seen in stream +CVE-2024-26765: Fix not seen in stream +CVE-2024-26766: Fix not seen in stream +CVE-2024-26767: Fix not seen in stream +CVE-2024-26768: Fix not seen in stream +CVE-2024-26769: Fix not seen in stream +CVE-2024-26770: Fix not seen in stream +CVE-2024-26771: Fix not seen in stream +CVE-2024-26772: Fix not seen in stream +CVE-2024-26773: Fix not seen in stream +CVE-2024-26774: Fix not seen in stream +CVE-2024-26775: Fix not seen in stream +CVE-2024-26776: Fix not seen in stream +CVE-2024-26777: Fix not seen in stream +CVE-2024-26778: Fix not seen in stream +CVE-2024-26779: Fix not seen in stream +CVE-2024-26784: Fix not seen in stream +CVE-2024-26787: Fix not seen in stream +CVE-2024-26789: Fix not seen in stream +CVE-2024-26791: Fix not seen in stream +CVE-2024-26793: Fix not seen in stream +CVE-2024-26797: Fix not seen in stream +CVE-2024-26798: Fix not seen in stream +CVE-2024-26801: Fix not seen in stream +CVE-2024-26802: Fix not seen in stream +CVE-2024-26803: Fix not seen in stream +CVE-2024-26804: Fix not seen in stream +CVE-2024-26805: Fix not seen in stream +CVE-2024-26806: Fix not seen in stream +CVE-2024-26808: Fix not seen in stream +CVE-2024-26809: Fix not seen in stream diff --git a/data/4.20/4.20_security.txt b/data/4.20/4.20_security.txt index 96ffdbc03..e6ab99936 100644 --- a/data/4.20/4.20_security.txt +++ b/data/4.20/4.20_security.txt @@ -50,6 +50,7 @@ CVEs fixed in 4.20.15: CVE-2019-12818: 97dc863bf0bda8d6edac8c932ef0d4b12b679607 net: nfc: Fix NULL dereference on nfc_llcp_build_tlv fails CVE-2019-15916: f04fba61adf70dc5a67285ebfcd0db34c782910b net-sysfs: Fix mem leak in netdev_register_kobject CVE-2019-16994: 058a6cc9f0ded32822b4f2370de110c940438fcb net: sit: fix memory leak in sit_init_net() + CVE-2019-25160: fbf9578919d6c91100ec63acf2cba641383f6c78 netlabel: fix out-of-bounds memory accesses CVE-2019-8980: 1ffa4ebedacb578fad9a207a3c3f897b467d045e exec: Fix mem leak in kernel_read_file CVEs fixed in 4.20.16: @@ -301,6 +302,7 @@ Outstanding CVEs: CVE-2019-2181: (unk) binder: check for overflow when alloc for security context CVE-2019-2213: (unk) binder: fix possible UAF when freeing buffer CVE-2019-25045: (unk) xfrm: clean up xfrm protocol checks + CVE-2019-25162: (unk) i2c: Fix a potential use after free CVE-2019-3016: (unk) x86/kvm: Be careful not to clear KVM_VCPU_FLUSH_TLB bit CVE-2019-3459: (unk) Bluetooth: Verify that l2cap_get_conf_opt provides large enough buffer CVE-2019-3460: (unk) Bluetooth: Check L2CAP option sizes returned from l2cap_get_conf_opt @@ -482,6 +484,13 @@ Outstanding CVEs: CVE-2020-36691: (unk) netlink: limit recursion depth in policy validation CVE-2020-36694: (unk) netfilter: x_tables: Switch synchronization to RCU CVE-2020-36766: (unk) cec-api: prevent leaking memory through hole in structure + CVE-2020-36775: (unk) f2fs: fix to avoid potential deadlock + CVE-2020-36777: (unk) media: dvbdev: Fix memory leak in dvb_media_device_free() + CVE-2020-36780: (unk) i2c: sprd: fix reference leak when pm_runtime_get_sync fails + CVE-2020-36781: (unk) i2c: imx: fix reference leak when pm_runtime_get_sync fails + CVE-2020-36782: (unk) i2c: imx-lpi2c: fix reference leak when pm_runtime_get_sync fails + CVE-2020-36783: (unk) i2c: img-scb: fix reference leak when pm_runtime_get_sync fails + CVE-2020-36784: (unk) i2c: cadence: fix reference leak when pm_runtime_get_sync fails CVE-2020-3702: (unk) ath: Use safer key clearing with key cache entries CVE-2020-4788: (unk) powerpc/64s: flush L1D on kernel entry CVE-2020-7053: (unk) drm/i915: Introduce a mutex for file_priv->context_idr @@ -642,6 +651,121 @@ Outstanding CVEs: CVE-2021-45485: (unk) ipv6: use prandom_u32() for ID generation CVE-2021-45486: (unk) inet: use bigger hash table for IP ID generation CVE-2021-45868: (unk) quota: check block number when reading the block in quota file + CVE-2021-46904: (unk) net: hso: fix null-ptr-deref during tty device unregistration + CVE-2021-46906: (unk) HID: usbhid: fix info leak in hid_submit_ctrl + CVE-2021-46908: (unk) bpf: Use correct permission flag for mixed signed bounds arithmetic + CVE-2021-46909: (unk) ARM: footbridge: fix PCI interrupt mapping + CVE-2021-46915: (unk) netfilter: nft_limit: avoid possible divide error in nft_limit_init + CVE-2021-46921: (unk) locking/qrwlock: Fix ordering in queued_write_lock_slowpath() + CVE-2021-46924: (unk) NFC: st21nfca: Fix memory leak in device probe and remove + CVE-2021-46925: (unk) net/smc: fix kernel panic caused by race of smc_sock + CVE-2021-46926: (unk) ALSA: hda: intel-sdw-acpi: harden detection of controller + CVE-2021-46928: (unk) parisc: Clear stale IIR value on instruction access rights trap + CVE-2021-46929: (unk) sctp: use call_rcu to free endpoint + CVE-2021-46932: (unk) Input: appletouch - initialize work before device registration + CVE-2021-46933: (unk) usb: gadget: f_fs: Clear ffs_eventfd in ffs_data_clear. + CVE-2021-46934: (unk) i2c: validate user data in compat ioctl + CVE-2021-46935: (unk) binder: fix async_free_space accounting for empty parcels + CVE-2021-46936: (unk) net: fix use-after-free in tw_timer_handler + CVE-2021-46938: (unk) dm rq: fix double free of blk_mq_tag_set in dev remove after table load fails + CVE-2021-46939: (unk) tracing: Restructure trace_clock_global() to never block + CVE-2021-46941: (unk) usb: dwc3: core: Do core softreset when switch mode + CVE-2021-46950: (unk) md/raid1: properly indicate failure when ending a failed write request + CVE-2021-46951: (unk) tpm: efi: Use local variable for calculating final log size + CVE-2021-46952: (unk) NFS: fs_context: validate UDP retrans to prevent shift out-of-bounds + CVE-2021-46953: (unk) ACPI: GTDT: Don't corrupt interrupt mappings on watchdow probe failure + CVE-2021-46955: (unk) openvswitch: fix stack OOB read while fragmenting IPv4 packets + CVE-2021-46959: (unk) spi: Fix use-after-free with devm_spi_alloc_* + CVE-2021-46960: (unk) cifs: Return correct error code from smb2_get_enc_key + CVE-2021-46962: (unk) mmc: uniphier-sd: Fix a resource leak in the remove function + CVE-2021-46965: (unk) mtd: physmap: physmap-bt1-rom: Fix unintentional stack access + CVE-2021-46969: (unk) bus: mhi: core: Fix invalid error returning in mhi_queue + CVE-2021-46970: (unk) bus: mhi: pci_generic: Remove WQ_MEM_RECLAIM flag from state workqueue + CVE-2021-46982: (unk) f2fs: compress: fix race condition of overwrite vs truncate + CVE-2021-46984: (unk) kyber: fix out of bounds access when preempted + CVE-2021-46988: (unk) userfaultfd: release page in error path to avoid BUG_ON + CVE-2021-46989: (unk) hfsplus: prevent corruption in shrinking truncate + CVE-2021-46991: (unk) i40e: Fix use-after-free in i40e_client_subtask() + CVE-2021-46992: (unk) netfilter: nftables: avoid overflows in nft_hash_buckets() + CVE-2021-46998: (unk) ethernet:enic: Fix a use after free bug in enic_hard_start_xmit + CVE-2021-47004: (unk) f2fs: fix to avoid touching checkpointed data in get_victim() + CVE-2021-47006: (unk) ARM: 9064/1: hw_breakpoint: Do not directly check the event's overflow_handler hook + CVE-2021-47010: (unk) net: Only allow init netns to set default tcp cong to a restricted algo + CVE-2021-47013: (unk) net:emac/emac-mac: Fix a use after free in emac_mac_tx_buf_send + CVE-2021-47020: (unk) soundwire: stream: fix memory leak in stream config error path + CVE-2021-47028: (unk) mt76: mt7915: fix txrate reporting + CVE-2021-47034: (unk) powerpc/64s: Fix pte update for kernel memory on radix + CVE-2021-47046: (unk) drm/amd/display: Fix off by one in hdmi_14_process_transaction() + CVE-2021-47049: (unk) Drivers: hv: vmbus: Use after free in __vmbus_open() + CVE-2021-47052: (unk) crypto: sa2ul - Fix memory leak of rxd + CVE-2021-47054: (unk) bus: qcom: Put child node before return + CVE-2021-47056: (unk) crypto: qat - ADF_STATUS_PF_RUNNING should be set after adf_dev_init + CVE-2021-47059: (unk) crypto: sun8i-ss - fix result memory leak on error path + CVE-2021-47063: (unk) drm: bridge/panel: Cleanup connector on bridge detach + CVE-2021-47065: (unk) rtw88: Fix array overrun in rtw_get_tx_power_params() + CVE-2021-47070: (unk) uio_hv_generic: Fix another memory leak in error handling paths + CVE-2021-47071: (unk) uio_hv_generic: Fix a memory leak in error handling paths + CVE-2021-47073: (unk) platform/x86: dell-smbios-wmi: Fix oops on rmmod dell_smbios + CVE-2021-47074: (unk) nvme-loop: fix memory leak in nvme_loop_create_ctrl() + CVE-2021-47075: (unk) nvmet: fix memory leak in nvmet_alloc_ctrl() + CVE-2021-47076: (unk) RDMA/rxe: Return CQE error if invalid lkey was supplied + CVE-2021-47077: (unk) scsi: qedf: Add pointer checks in qedf_update_link_speed() + CVE-2021-47078: (unk) RDMA/rxe: Clear all QP fields if creation failed + CVE-2021-47082: (unk) tun: avoid double free in tun_free_netdev + CVE-2021-47083: (unk) pinctrl: mediatek: fix global-out-of-bounds issue + CVE-2021-47086: (unk) phonet/pep: refuse to enable an unbound pipe + CVE-2021-47100: (unk) ipmi: Fix UAF when uninstall ipmi_si and ipmi_msghandler module + CVE-2021-47101: (unk) asix: fix uninit-value in asix_mdio_read() + CVE-2021-47103: (unk) inet: fully convert sk->sk_rx_dst to RCU rules + CVE-2021-47110: (unk) x86/kvm: Disable kvmclock on all CPUs on shutdown + CVE-2021-47112: (unk) x86/kvm: Teardown PV features on boot CPU as well + CVE-2021-47113: (unk) btrfs: abort in rename_exchange if we fail to insert the second ref + CVE-2021-47114: (unk) ocfs2: fix data corruption by fallocate + CVE-2021-47116: (unk) ext4: fix memory leak in ext4_mb_init_backend on error path. + CVE-2021-47117: (unk) ext4: fix bug on in ext4_es_cache_extent as ext4_split_extent_at failed + CVE-2021-47118: (unk) pid: take a reference when initializing `cad_pid` + CVE-2021-47119: (unk) ext4: fix memory leak in ext4_fill_super + CVE-2021-47120: (unk) HID: magicmouse: fix NULL-deref on disconnect + CVE-2021-47121: (unk) net: caif: fix memory leak in cfusbl_device_notify + CVE-2021-47122: (unk) net: caif: fix memory leak in caif_device_notify + CVE-2021-47124: (unk) io_uring: fix link timeout refs + CVE-2021-47125: (unk) sch_htb: fix refcount leak in htb_parent_to_leaf_offload + CVE-2021-47128: (unk) bpf, lockdown, audit: Fix buggy SELinux lockdown permission checks + CVE-2021-47131: (unk) net/tls: Fix use-after-free after the TLS device goes down and up + CVE-2021-47133: (unk) HID: amd_sfh: Fix memory leak in amd_sfh_work + CVE-2021-47135: (unk) mt76: mt7921: fix possible AOOB issue in mt7921_mcu_tx_rate_report + CVE-2021-47136: (unk) net: zero-initialize tc skb extension on allocation + CVE-2021-47137: (unk) net: lantiq: fix memory corruption in RX ring + CVE-2021-47140: (unk) iommu/amd: Clear DMA ops when switching domain + CVE-2021-47142: (unk) drm/amdgpu: Fix a use-after-free + CVE-2021-47143: (unk) net/smc: remove device from smcd_dev_list after failed device_add() + CVE-2021-47144: (unk) drm/amd/amdgpu: fix refcount leak + CVE-2021-47145: (unk) btrfs: do not BUG_ON in link_to_fixup_dir + CVE-2021-47146: (unk) mld: fix panic in mld_newpack() + CVE-2021-47147: (unk) ptp: ocp: Fix a resource leak in an error handling path + CVE-2021-47149: (unk) net: fujitsu: fix potential null-ptr-deref + CVE-2021-47150: (unk) net: fec: fix the potential memory leak in fec_enet_init() + CVE-2021-47151: (unk) interconnect: qcom: bcm-voter: add a missing of_node_put() + CVE-2021-47153: (unk) i2c: i801: Don't generate an interrupt on bus reset + CVE-2021-47158: (unk) net: dsa: sja1105: add error handling in sja1105_setup() + CVE-2021-47159: (unk) net: dsa: fix a crash if ->get_sset_count() fails + CVE-2021-47160: (unk) net: dsa: mt7530: fix VLAN traffic leaks + CVE-2021-47161: (unk) spi: spi-fsl-dspi: Fix a resource leak in an error handling path + CVE-2021-47162: (unk) tipc: skb_linearize the head skb when reassembling msgs + CVE-2021-47163: (unk) tipc: wait and exit until all work queues are done + CVE-2021-47165: (unk) drm/meson: fix shutdown crash when component not probed + CVE-2021-47166: (unk) NFS: Don't corrupt the value of pg_bytes_written in nfs_do_recoalesce() + CVE-2021-47167: (unk) NFS: Fix an Oopsable condition in __nfs_pageio_add_request() + CVE-2021-47168: (unk) NFS: fix an incorrect limit in filelayout_decode_layout() + CVE-2021-47169: (unk) serial: rp2: use 'request_firmware' instead of 'request_firmware_nowait' + CVE-2021-47170: (unk) USB: usbfs: Don't WARN about excessively large memory allocations + CVE-2021-47171: (unk) net: usb: fix memory leak in smsc75xx_bind + CVE-2021-47172: (unk) iio: adc: ad7124: Fix potential overflow due to non sequential channel numbers + CVE-2021-47173: (unk) misc/uss720: fix memory leak in uss720_probe + CVE-2021-47175: (unk) net/sched: fq_pie: fix OOB access in the traffic path + CVE-2021-47177: (unk) iommu/vt-d: Fix sysfs leak in alloc_iommu() + CVE-2021-47179: (unk) NFSv4: Fix a NULL pointer dereference in pnfs_mark_matching_lsegs_return() + CVE-2021-47180: (unk) NFC: nci: fix memory leak in nci_allocate_device CVE-2022-0001: (unk) x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE CVE-2022-0002: (unk) x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE CVE-2022-0168: (unk) cifs: fix NULL ptr dereference in smb2_ioctl_query_info() @@ -843,6 +967,10 @@ Outstanding CVEs: CVE-2022-47520: (unk) wifi: wilc1000: validate pairwise and authentication suite offsets CVE-2022-47929: (unk) net: sched: disallow noqueue for qdisc classes CVE-2022-48619: (unk) Input: add bounds checking to input_set_capability() + CVE-2022-48626: (unk) moxart: fix potential use-after-free on remove path + CVE-2022-48627: (unk) vt: fix memory overlapping when deleting chars in the buffer + CVE-2022-48628: (unk) ceph: drop messages from MDS when unmounting + CVE-2022-48629: (unk) crypto: qcom-rng - ensure buffer for generate is completely filled CVE-2023-0030: (unk) drm/nouveau/mmu: add more general vmm free/node handling functions CVE-2023-0045: (unk) x86/bugs: Flush IBP in ib_prctl_set() CVE-2023-0047: (unk) mm, oom: do not trigger out_of_memory from the #PF @@ -913,6 +1041,7 @@ Outstanding CVEs: CVE-2023-28328: (unk) media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer() CVE-2023-28466: (unk) net: tls: fix possible race condition between do_tls_getsockopt_conf() and do_tls_setsockopt_conf() CVE-2023-2860: (unk) ipv6: sr: fix out-of-bounds read when setting HMAC data. + CVE-2023-28746: (unk) x86/mmio: Disable KVM mitigation when X86_FEATURE_CLEAR_CPU_BUF is set CVE-2023-28772: (unk) seq_buf: Fix overflow in seq_buf_putmem_hex() CVE-2023-2985: (unk) fs: hfsplus: fix UAF issue in hfsplus_put_super CVE-2023-3006: (unk) arm64: Add AMPERE1 to the Spectre-BHB affected list @@ -987,7 +1116,7 @@ Outstanding CVEs: CVE-2023-4623: (unk) net/sched: sch_hfsc: Ensure inner classes have fsc curve CVE-2023-46343: (unk) nfc: nci: fix possible NULL pointer dereference in send_acknowledge() CVE-2023-46838: (unk) xen-netback: don't produce zero-size SKB frags - CVE-2023-47233: (unk) + CVE-2023-47233: (unk) wifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach CVE-2023-4881: (unk) netfilter: nftables: exthdr: fix 4-byte stack OOB write CVE-2023-4921: (unk) net: sched: sch_qfq: Fix UAF in qfq_dequeue() CVE-2023-51042: (unk) drm/amdgpu: Fix potential fence use-after-free v2 @@ -1011,25 +1140,118 @@ Outstanding CVEs: CVE-2023-52448: (unk) gfs2: Fix kernel NULL pointer dereference in gfs2_rgrp_dump CVE-2023-52449: (unk) mtd: Fix gluebi NULL pointer dereference caused by ftl notifier CVE-2023-52451: (unk) powerpc/pseries/memhp: Fix access beyond end of drmem array - CVE-2023-52456: (unk) serial: imx: fix tx statemachine deadlock - CVE-2023-52457: (unk) serial: 8250: omap: Don't skip resource freeing if pm_runtime_resume_and_get() failed CVE-2023-52458: (unk) block: add check that partition length needs to be aligned with block size CVE-2023-52464: (unk) EDAC/thunderx: Fix possible out-of-bounds string access + CVE-2023-52469: (unk) drivers/amd/pm: fix a use-after-free in kv_parse_power_table + CVE-2023-52470: (unk) drm/radeon: check the alloc_workqueue return value in radeon_crtc_init() + CVE-2023-52474: (unk) IB/hfi1: Fix bugs with non-PAGE_SIZE-end multi-iovec user SDMA requests + CVE-2023-52475: (unk) Input: powermate - fix use-after-free in powermate_config_complete + CVE-2023-52476: (unk) perf/x86/lbr: Filter vsyscall addresses + CVE-2023-52477: (unk) usb: hub: Guard against accesses to uninitialized BOS descriptors + CVE-2023-52478: (unk) HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect + CVE-2023-52479: (unk) ksmbd: fix uaf in smb20_oplock_break_ack + CVE-2023-52480: (unk) ksmbd: fix race condition between session lookup and expire + CVE-2023-52481: (unk) arm64: errata: Add Cortex-A520 speculative unprivileged load workaround + CVE-2023-52482: (unk) x86/srso: Add SRSO mitigation for Hygon processors + CVE-2023-52484: (unk) iommu/arm-smmu-v3: Fix soft lockup triggered by arm_smmu_mm_invalidate_range + CVE-2023-52485: (unk) drm/amd/display: Wake DMCUB before sending a command + CVE-2023-52486: (unk) drm: Don't unref the same fb many times by mistake due to deadlock handling + CVE-2023-52488: (unk) serial: sc16is7xx: convert from _raw_ to _noinc_ regmap functions for FIFO + CVE-2023-52489: (unk) mm/sparsemem: fix race in accessing memory_section->usage + CVE-2023-52491: (unk) media: mtk-jpeg: Fix use after free bug due to error path handling in mtk_jpeg_dec_device_run + CVE-2023-52498: (unk) PM: sleep: Fix possible deadlocks in core system-wide PM code + CVE-2023-52500: (unk) scsi: pm80xx: Avoid leaking tags when processing OPC_INB_SET_CONTROLLER_CONFIG command + CVE-2023-52501: (unk) ring-buffer: Do not attempt to read past "commit" + CVE-2023-52502: (unk) net: nfc: fix races in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn() + CVE-2023-52504: (unk) x86/alternatives: Disable KASAN in apply_alternatives() + CVE-2023-52506: (unk) LoongArch: Set all reserved memblocks on Node#0 at initialization + CVE-2023-52507: (unk) nfc: nci: assert requested protocol is valid + CVE-2023-52508: (unk) nvme-fc: Prevent null pointer dereference in nvme_fc_io_getuuid() + CVE-2023-52509: (unk) ravb: Fix use-after-free issue in ravb_tx_timeout_work() + CVE-2023-52510: (unk) ieee802154: ca8210: Fix a potential UAF in ca8210_probe + CVE-2023-52511: (unk) spi: sun6i: reduce DMA RX transfer width to single byte + CVE-2023-52515: (unk) RDMA/srp: Do not call scsi_done() from srp_abort() + CVE-2023-52516: (unk) dma-debug: don't call __dma_entry_alloc_check_leak() under free_entries_lock + CVE-2023-52517: (unk) spi: sun6i: fix race between DMA RX transfer completion and RX FIFO drain + CVE-2023-52519: (unk) HID: intel-ish-hid: ipc: Disable and reenable ACPI GPE bit + CVE-2023-52522: (unk) net: fix possible store tearing in neigh_periodic_work() + CVE-2023-52527: (unk) ipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data() + CVE-2023-52528: (unk) net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg + CVE-2023-52530: (unk) wifi: mac80211: fix potential key use-after-free + CVE-2023-52531: (unk) wifi: iwlwifi: mvm: Fix a memory corruption issue + CVE-2023-52532: (unk) net: mana: Fix TX CQE error handling + CVE-2023-52559: (unk) iommu/vt-d: Avoid memory allocation in iommu_suspend() + CVE-2023-52561: (unk) arm64: dts: qcom: sdm845-db845c: Mark cont splash memory region as reserved + CVE-2023-52563: (unk) drm/meson: fix memory leak on ->hpd_notify callback + CVE-2023-52565: (unk) media: uvcvideo: Fix OOB read + CVE-2023-52566: (unk) nilfs2: fix potential use after free in nilfs_gccache_submit_read_data() + CVE-2023-52568: (unk) x86/sgx: Resolves SECS reclaim vs. page fault for EAUG race + CVE-2023-52569: (unk) btrfs: remove BUG() after failure to insert delayed dir index item + CVE-2023-52571: (unk) power: supply: rk817: Fix node refcount leak + CVE-2023-52572: (unk) cifs: Fix UAF in cifs_demultiplex_thread() + CVE-2023-52574: (unk) team: fix null-ptr-deref when team device type is changed + CVE-2023-52578: (unk) net: bridge: use DEV_STATS_INC() + CVE-2023-52583: (unk) ceph: fix deadlock or deadcode of misusing dget() + CVE-2023-52584: (unk) spmi: mediatek: Fix UAF on device remove + CVE-2023-52585: (unk) drm/amdgpu: Fix possible NULL dereference in amdgpu_ras_query_error_status_helper() + CVE-2023-52586: (unk) drm/msm/dpu: Add mutex lock in control vblank irq + CVE-2023-52587: (unk) IB/ipoib: Fix mcast list locking + CVE-2023-52588: (unk) f2fs: fix to tag gcing flag on page during block migration + CVE-2023-52589: (unk) media: rkisp1: Fix IRQ disable race issue + CVE-2023-52590: (unk) ocfs2: Avoid touching renamed directory if parent does not change + CVE-2023-52591: (unk) reiserfs: Avoid touching renamed directory if parent does not change + CVE-2023-52593: (unk) wifi: wfx: fix possible NULL pointer dereference in wfx_set_mfp_ap() + CVE-2023-52594: (unk) wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus() + CVE-2023-52595: (unk) wifi: rt2x00: restart beacon queue when hardware reset + CVE-2023-52596: (unk) sysctl: Fix out of bounds access for empty sysctl registers + CVE-2023-52597: (unk) KVM: s390: fix setting of fpc register + CVE-2023-52598: (unk) s390/ptrace: handle setting of fpc register correctly + CVE-2023-52599: (unk) jfs: fix array-index-out-of-bounds in diNewExt + CVE-2023-52600: (unk) jfs: fix uaf in jfs_evict_inode + CVE-2023-52601: (unk) jfs: fix array-index-out-of-bounds in dbAdjTree + CVE-2023-52602: (unk) jfs: fix slab-out-of-bounds Read in dtSearch + CVE-2023-52603: (unk) UBSAN: array-index-out-of-bounds in dtSplitRoot + CVE-2023-52604: (unk) FS:JFS:UBSAN:array-index-out-of-bounds in dbAdjTree + CVE-2023-52606: (unk) powerpc/lib: Validate size for vector operations + CVE-2023-52607: (unk) powerpc/mm: Fix null-pointer dereference in pgtable_cache_add + CVE-2023-52609: (unk) binder: fix race between mmput() and do_exit() + CVE-2023-52612: (unk) crypto: scomp - fix req->dst buffer overflow + CVE-2023-52614: (unk) PM / devfreq: Fix buffer overflow in trans_stat_show + CVE-2023-52615: (unk) hwrng: core - Fix page fault dead lock on mmap-ed hwrng + CVE-2023-52617: (unk) PCI: switchtec: Fix stdev_release() crash after surprise hot remove + CVE-2023-52618: (unk) block/rnbd-srv: Check for unlikely string overflow + CVE-2023-52619: (unk) pstore/ram: Fix crash when setting number of cpus to an odd number + CVE-2023-52620: (unk) netfilter: nf_tables: disallow timeout for anonymous sets + CVE-2023-52621: (unk) bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers + CVE-2023-52622: (unk) ext4: avoid online resizing failures due to oversized flex bg + CVE-2023-52623: (unk) SUNRPC: Fix a suspicious RCU usage warning + CVE-2023-52624: (unk) drm/amd/display: Wake DMCUB before executing GPINT commands + CVE-2023-52625: (unk) drm/amd/display: Refactor DMCUB enter/exit idle interface + CVE-2023-52628: (unk) netfilter: nftables: exthdr: fix 4-byte stack OOB write + CVE-2023-52629: (unk) sh: push-switch: Reorder cleanup operations to avoid use-after-free bug + CVE-2023-52632: (unk) drm/amdkfd: Fix lock dependency warning with srcu + CVE-2023-52633: (unk) um: time-travel: fix time corruption + CVE-2023-52634: (unk) drm/amd/display: Fix disable_otg_wa logic + CVE-2023-52635: (unk) PM / devfreq: Synchronize devfreq_monitor_[start/stop] + CVE-2023-52638: (unk) can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock + CVE-2023-52639: (unk) KVM: s390: vsie: fix race during shadow creation + CVE-2023-52640: (unk) fs/ntfs3: Fix oob in ntfs_listxattr + CVE-2023-52641: (unk) fs/ntfs3: Add NULL ptr dereference checking at the end of attr_allocate_frame() CVE-2023-5717: (unk) perf: Disallow mis-matched inherited group reads CVE-2023-6040: (unk) netfilter: nf_tables: Reject tables of unsupported family CVE-2023-6121: (unk) nvmet: nul-terminate the NQNs passed in the connect command CVE-2023-6240: (unk) - CVE-2023-6270: (unk) - CVE-2023-6356: (unk) + CVE-2023-6270: (unk) aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts + CVE-2023-6356: (unk) nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length CVE-2023-6535: (unk) - CVE-2023-6536: (unk) + CVE-2023-6536: (unk) nvmet-tcp: fix a crash in nvmet_req_complete() CVE-2023-6546: (unk) tty: n_gsm: fix the UAF caused by race condition in gsm_cleanup_mux CVE-2023-6606: (unk) smb: client: fix OOB in smbCalcSize() CVE-2023-6610: (unk) smb: client: fix potential OOB in smb2_dump_detail() CVE-2023-6915: (unk) ida: Fix crash in ida_free when the bitmap is empty CVE-2023-6931: (unk) perf: Fix perf_event_validate_size() CVE-2023-6932: (unk) ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet - CVE-2023-7042: (unk) + CVE-2023-7042: (unk) wifi: ath10k: fix NULL pointer dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev() CVE-2023-7192: (unk) netfilter: ctnetlink: fix possible refcount leak in ctnetlink_create_conntrack() CVE-2024-0340: (unk) vhost: use kzalloc() instead of kmalloc() followed by memset() CVE-2024-0564: (unk) @@ -1042,10 +1264,11 @@ Outstanding CVEs: CVE-2024-1151: (unk) net: openvswitch: limit the number of recursions from action sets CVE-2024-1312: (unk) mm: lock_vma_under_rcu() must check vma->anon_vma under vma lock CVE-2024-21803: (unk) - CVE-2024-22099: (unk) + CVE-2024-2193: (unk) + CVE-2024-22099: (unk) Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security CVE-2024-22386: (unk) - CVE-2024-23196: (unk) - CVE-2024-23307: (unk) + CVE-2024-23196: (unk) ALSA: hda: fix a possible null-pointer dereference due to data race in snd_hdac_regmap_sync() + CVE-2024-23307: (unk) md/raid5: fix atomicity violation in raid5_cache_count CVE-2024-23848: (unk) CVE-2024-23849: (unk) net/rds: Fix UBSAN: array-index-out-of-bounds in rds_cmsg_recv CVE-2024-23851: (unk) dm: limit the number of targets and parameter size area @@ -1054,7 +1277,7 @@ Outstanding CVEs: CVE-2024-24858: (unk) CVE-2024-24859: (unk) CVE-2024-24860: (unk) Bluetooth: Fix atomicity violation in {min,max}_key_size_set - CVE-2024-24861: (unk) + CVE-2024-24861: (unk) media: xc4000: Fix atomicity violation in xc4000_get_frequency CVE-2024-24864: (unk) CVE-2024-25739: (unk) CVE-2024-25740: (unk) @@ -1063,12 +1286,111 @@ Outstanding CVEs: CVE-2024-26584: (unk) net: tls: handle backlogging of crypto requests CVE-2024-26585: (unk) tls: fix race between tx work scheduling and socket close CVE-2024-26586: (unk) mlxsw: spectrum_acl_tcam: Fix stack corruption - CVE-2024-26587: (unk) net: netdevsim: don't try to destroy PHC on VFs - CVE-2024-26588: (unk) LoongArch: BPF: Prevent out-of-bounds memory access CVE-2024-26589: (unk) bpf: Reject variable offset alu on PTR_TO_FLOW_KEYS - CVE-2024-26591: (unk) bpf: Fix re-attachment branch in bpf_tracing_prog_attach CVE-2024-26592: (unk) ksmbd: fix UAF issue in ksmbd_tcp_new_connection() CVE-2024-26594: (unk) ksmbd: validate mech token in session setup CVE-2024-26595: (unk) mlxsw: spectrum_acl_tcam: Fix NULL pointer dereference in error path CVE-2024-26597: (unk) net: qualcomm: rmnet: fix global oob in rmnet_policy CVE-2024-26598: (unk) KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache + CVE-2024-26600: (unk) phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP + CVE-2024-26602: (unk) sched/membarrier: reduce the ability to hammer on sys_membarrier + CVE-2024-26606: (unk) binder: signal epoll threads of self-work + CVE-2024-26614: (unk) tcp: make sure init the accept_queue's spinlocks once + CVE-2024-26615: (unk) net/smc: fix illegal rmb_desc access in SMC-D connection dump + CVE-2024-26622: (unk) tomoyo: fix UAF write bug in tomoyo_write_control() + CVE-2024-26623: (unk) pds_core: Prevent race issues involving the adminq + CVE-2024-26625: (unk) llc: call sock_orphan() at release time + CVE-2024-26627: (unk) scsi: core: Move scsi_host_busy() out of host lock for waking up EH handler + CVE-2024-26633: (unk) ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim() + CVE-2024-26635: (unk) llc: Drop support for ETH_P_TR_802_2. + CVE-2024-26636: (unk) llc: make llc_ui_sendmsg() more robust against bonding changes + CVE-2024-26640: (unk) tcp: add sanity checks to rx zerocopy + CVE-2024-26641: (unk) ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv() + CVE-2024-26642: (unk) netfilter: nf_tables: disallow anonymous set with timeout flag + CVE-2024-26644: (unk) btrfs: don't abort filesystem when attempting to snapshot deleted subvolume + CVE-2024-26645: (unk) tracing: Ensure visibility when inserting an element into tracing_map + CVE-2024-26646: (unk) thermal: intel: hfi: Add syscore callbacks for system-wide PM + CVE-2024-26647: (unk) drm/amd/display: Fix late derefrence 'dsc' check in 'link_set_dsc_pps_packet()' + CVE-2024-26648: (unk) drm/amd/display: Fix variable deferencing before NULL check in edp_setup_replay() + CVE-2024-26650: (unk) platform/x86: p2sb: Allow p2sb_bar() calls during PCI device probe + CVE-2024-26651: (unk) sr9800: Add check for usbnet_get_endpoints + CVE-2024-26654: (unk) ALSA: sh: aica: reorder cleanup operations to avoid UAF bugs + CVE-2024-26655: (unk) Fix memory leak in posix_clock_open() + CVE-2024-26656: (unk) drm/amdgpu: fix use-after-free bug + CVE-2024-26658: (unk) bcachefs: grab s_umount only if snapshotting + CVE-2024-26659: (unk) xhci: handle isoc Babble and Buffer Overrun events properly + CVE-2024-26663: (unk) tipc: Check the bearer type before calling tipc_udp_nl_bearer_add() + CVE-2024-26664: (unk) hwmon: (coretemp) Fix out-of-bounds memory access + CVE-2024-26668: (unk) netfilter: nft_limit: reject configurations that cause integer overflow + CVE-2024-26671: (unk) blk-mq: fix IO hang from sbitmap wakeup race + CVE-2024-26672: (unk) drm/amdgpu: Fix variable 'mca_funcs' dereferenced before NULL check in 'amdgpu_mca_smu_get_mca_entry()' + CVE-2024-26675: (unk) ppp_async: limit MRU to 64K + CVE-2024-26676: (unk) af_unix: Call kfree_skb() for dead unix_(sk)->oob_skb in GC. + CVE-2024-26677: (unk) rxrpc: Fix delayed ACKs to not set the reference serial number + CVE-2024-26679: (unk) inet: read sk->sk_family once in inet_recv_error() + CVE-2024-26685: (unk) nilfs2: fix potential bug in end_buffer_async_write + CVE-2024-26686: (unk) fs/proc: do_task_stat: use sig->stats_lock to gather the threads/children stats + CVE-2024-26687: (unk) xen/events: close evtchn after mapping cleanup + CVE-2024-26689: (unk) ceph: prevent use-after-free in encode_cap_msg() + CVE-2024-26691: (unk) KVM: arm64: Fix circular locking dependency + CVE-2024-26696: (unk) nilfs2: fix hang in nilfs_lookup_dirty_data_buffers() + CVE-2024-26697: (unk) nilfs2: fix data corruption in dsync block recovery for small block sizes + CVE-2024-26699: (unk) drm/amd/display: Fix array-index-out-of-bounds in dcn35_clkmgr + CVE-2024-26700: (unk) drm/amd/display: Fix MST Null Ptr for RV + CVE-2024-26704: (unk) ext4: fix double-free of blocks due to wrong extents moved_len + CVE-2024-26706: (unk) parisc: Fix random data corruption from exception handler + CVE-2024-26713: (unk) powerpc/pseries/iommu: Fix iommu initialisation during DLPAR add + CVE-2024-26715: (unk) usb: dwc3: gadget: Fix NULL pointer dereference in dwc3_gadget_suspend + CVE-2024-26719: (unk) nouveau: offload fence uevents work to workqueue + CVE-2024-26720: (unk) mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again + CVE-2024-26726: (unk) btrfs: don't drop extent_map for free space inode on write error + CVE-2024-26733: (unk) arp: Prevent overflow in arp_req_get(). + CVE-2024-26735: (unk) ipv6: sr: fix possible use-after-free and null-ptr-deref + CVE-2024-26736: (unk) afs: Increase buffer size in afs_update_volume_status() + CVE-2024-26738: (unk) powerpc/pseries/iommu: DLPAR add doesn't completely initialize pci_controller + CVE-2024-26739: (unk) net/sched: act_mirred: don't override retval if we already lost the skb + CVE-2024-26740: (unk) net/sched: act_mirred: use the backlog for mirred ingress + CVE-2024-26743: (unk) RDMA/qedr: Fix qedr_create_user_qp error flow + CVE-2024-26744: (unk) RDMA/srpt: Support specifying the srpt_service_guid parameter + CVE-2024-26745: (unk) powerpc/pseries/iommu: IOMMU table is not initialized for kdump over SR-IOV + CVE-2024-26747: (unk) usb: roles: fix NULL pointer issue when put module's reference + CVE-2024-26748: (unk) usb: cdns3: fix memory double free when handle zero packet + CVE-2024-26751: (unk) ARM: ep93xx: Add terminator to gpiod_lookup_table + CVE-2024-26752: (unk) l2tp: pass correct message length to ip6_append_data + CVE-2024-26754: (unk) gtp: fix use-after-free and null-ptr-deref in gtp_genl_dump_pdp() + CVE-2024-26756: (unk) md: Don't register sync_thread for reshape directly + CVE-2024-26757: (unk) md: Don't ignore read-only array in md_check_recovery() + CVE-2024-26758: (unk) md: Don't ignore suspended array in md_check_recovery() + CVE-2024-26759: (unk) mm/swap: fix race when skipping swapcache + CVE-2024-26763: (unk) dm-crypt: don't modify the data when using authenticated encryption + CVE-2024-26764: (unk) fs/aio: Restrict kiocb_set_cancel_fn() to I/O submitted via libaio + CVE-2024-26765: (unk) LoongArch: Disable IRQ before init_fn() for nonboot CPUs + CVE-2024-26766: (unk) IB/hfi1: Fix sdma.h tx->num_descs off-by-one error + CVE-2024-26767: (unk) drm/amd/display: fixed integer types and null check locations + CVE-2024-26768: (unk) LoongArch: Change acpi_core_pic[NR_CPUS] to acpi_core_pic[MAX_CORE_PIC] + CVE-2024-26769: (unk) nvmet-fc: avoid deadlock on delete association path + CVE-2024-26770: (unk) HID: nvidia-shield: Add missing null pointer checks to LED initialization + CVE-2024-26771: (unk) dmaengine: ti: edma: Add some null pointer checks to the edma_probe + CVE-2024-26772: (unk) ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal() + CVE-2024-26773: (unk) ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found() + CVE-2024-26774: (unk) ext4: avoid dividing by 0 in mb_update_avg_fragment_size() when block bitmap corrupt + CVE-2024-26775: (unk) aoe: avoid potential deadlock at set_capacity + CVE-2024-26776: (unk) spi: hisi-sfc-v3xx: Return IRQ_NONE if no interrupts were detected + CVE-2024-26777: (unk) fbdev: sis: Error out if pixclock equals zero + CVE-2024-26778: (unk) fbdev: savage: Error out if pixclock equals zero + CVE-2024-26779: (unk) wifi: mac80211: fix race condition on enabling fast-xmit + CVE-2024-26784: (unk) pmdomain: arm: Fix NULL dereference on scmi_perf_domain removal + CVE-2024-26787: (unk) mmc: mmci: stm32: fix DMA API overlapping mappings warning + CVE-2024-26789: (unk) crypto: arm64/neonbs - fix out-of-bounds access on short input + CVE-2024-26791: (unk) btrfs: dev-replace: properly validate device names + CVE-2024-26793: (unk) gtp: fix use-after-free and null-ptr-deref in gtp_newlink() + CVE-2024-26797: (unk) drm/amd/display: Prevent potential buffer overflow in map_hw_resources + CVE-2024-26798: (unk) fbcon: always restore the old font data in fbcon_do_set_font() + CVE-2024-26801: (unk) Bluetooth: Avoid potential use-after-free in hci_error_reset + CVE-2024-26802: (unk) stmmac: Clear variable when destroying workqueue + CVE-2024-26803: (unk) net: veth: clear GRO when clearing XDP even when down + CVE-2024-26804: (unk) net: ip_tunnel: prevent perpetual headroom growth + CVE-2024-26805: (unk) netlink: Fix kernel-infoleak-after-free in __skb_datagram_iter + CVE-2024-26806: (unk) spi: cadence-qspi: remove system-wide suspend helper calls from runtime PM hooks + CVE-2024-26808: (unk) netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain + CVE-2024-26809: (unk) netfilter: nft_set_pipapo: release elements in clone only from destroy path diff --git a/data/4.3/4.3_CVEs.txt b/data/4.3/4.3_CVEs.txt index 0bbfee2bb..584c8e113 100644 --- a/data/4.3/4.3_CVEs.txt +++ b/data/4.3/4.3_CVEs.txt @@ -663,6 +663,8 @@ CVE-2019-2101: Fix not seen in stream CVE-2019-2181: Fix not seen in stream CVE-2019-2213: Fix not seen in stream CVE-2019-2215: Fix not seen in stream +CVE-2019-25160: Fix not seen in stream +CVE-2019-25162: Fix not seen in stream CVE-2019-3459: Fix not seen in stream CVE-2019-3460: Fix not seen in stream CVE-2019-3701: Fix not seen in stream @@ -831,6 +833,9 @@ CVE-2020-36516: Fix not seen in stream CVE-2020-36557: Fix not seen in stream CVE-2020-36558: Fix not seen in stream CVE-2020-36691: Fix not seen in stream +CVE-2020-36775: Fix not seen in stream +CVE-2020-36780: Fix not seen in stream +CVE-2020-36781: Fix not seen in stream CVE-2020-3702: Fix not seen in stream CVE-2020-4788: Fix not seen in stream CVE-2020-8647: Fix not seen in stream @@ -965,6 +970,83 @@ CVE-2021-45469: Fix not seen in stream CVE-2021-45485: Fix not seen in stream CVE-2021-45486: Fix not seen in stream CVE-2021-45868: Fix not seen in stream +CVE-2021-46904: Fix not seen in stream +CVE-2021-46906: Fix not seen in stream +CVE-2021-46908: Fix not seen in stream +CVE-2021-46924: Fix not seen in stream +CVE-2021-46926: Fix not seen in stream +CVE-2021-46928: Fix not seen in stream +CVE-2021-46932: Fix not seen in stream +CVE-2021-46933: Fix not seen in stream +CVE-2021-46936: Fix not seen in stream +CVE-2021-46939: Fix not seen in stream +CVE-2021-46950: Fix not seen in stream +CVE-2021-46951: Fix not seen in stream +CVE-2021-46952: Fix not seen in stream +CVE-2021-46959: Fix not seen in stream +CVE-2021-46962: Fix not seen in stream +CVE-2021-46965: Fix not seen in stream +CVE-2021-46969: Fix not seen in stream +CVE-2021-46970: Fix not seen in stream +CVE-2021-46982: Fix not seen in stream +CVE-2021-47028: Fix not seen in stream +CVE-2021-47046: Fix not seen in stream +CVE-2021-47052: Fix not seen in stream +CVE-2021-47059: Fix not seen in stream +CVE-2021-47065: Fix not seen in stream +CVE-2021-47070: Fix not seen in stream +CVE-2021-47075: Fix not seen in stream +CVE-2021-47076: Fix not seen in stream +CVE-2021-47082: Fix not seen in stream +CVE-2021-47083: Fix not seen in stream +CVE-2021-47086: Fix not seen in stream +CVE-2021-47101: Fix not seen in stream +CVE-2021-47103: Fix not seen in stream +CVE-2021-47110: Fix not seen in stream +CVE-2021-47112: Fix not seen in stream +CVE-2021-47113: Fix not seen in stream +CVE-2021-47114: Fix not seen in stream +CVE-2021-47116: Fix not seen in stream +CVE-2021-47117: Fix not seen in stream +CVE-2021-47118: Fix not seen in stream +CVE-2021-47119: Fix not seen in stream +CVE-2021-47121: Fix not seen in stream +CVE-2021-47122: Fix not seen in stream +CVE-2021-47124: Fix not seen in stream +CVE-2021-47125: Fix not seen in stream +CVE-2021-47128: Fix not seen in stream +CVE-2021-47131: Fix not seen in stream +CVE-2021-47133: Fix not seen in stream +CVE-2021-47135: Fix not seen in stream +CVE-2021-47136: Fix not seen in stream +CVE-2021-47137: Fix not seen in stream +CVE-2021-47140: Fix not seen in stream +CVE-2021-47142: Fix not seen in stream +CVE-2021-47143: Fix not seen in stream +CVE-2021-47144: Fix not seen in stream +CVE-2021-47145: Fix not seen in stream +CVE-2021-47146: Fix not seen in stream +CVE-2021-47147: Fix not seen in stream +CVE-2021-47149: Fix not seen in stream +CVE-2021-47150: Fix not seen in stream +CVE-2021-47151: Fix not seen in stream +CVE-2021-47153: Fix not seen in stream +CVE-2021-47158: Fix not seen in stream +CVE-2021-47160: Fix not seen in stream +CVE-2021-47162: Fix not seen in stream +CVE-2021-47163: Fix not seen in stream +CVE-2021-47165: Fix not seen in stream +CVE-2021-47166: Fix not seen in stream +CVE-2021-47167: Fix not seen in stream +CVE-2021-47168: Fix not seen in stream +CVE-2021-47169: Fix not seen in stream +CVE-2021-47170: Fix not seen in stream +CVE-2021-47171: Fix not seen in stream +CVE-2021-47172: Fix not seen in stream +CVE-2021-47173: Fix not seen in stream +CVE-2021-47175: Fix not seen in stream +CVE-2021-47179: Fix not seen in stream +CVE-2021-47180: Fix not seen in stream CVE-2022-0001: Fix not seen in stream CVE-2022-0002: Fix not seen in stream CVE-2022-0168: Fix not seen in stream @@ -1136,6 +1218,9 @@ CVE-2022-4744: Fix not seen in stream CVE-2022-47520: Fix not seen in stream CVE-2022-47929: Fix not seen in stream CVE-2022-48619: Fix not seen in stream +CVE-2022-48626: Fix not seen in stream +CVE-2022-48627: Fix not seen in stream +CVE-2022-48628: Fix not seen in stream CVE-2023-0030: Fix not seen in stream CVE-2023-0047: Fix not seen in stream CVE-2023-0266: Fix not seen in stream @@ -1184,6 +1269,7 @@ CVE-2023-2513: Fix not seen in stream CVE-2023-26545: Fix not seen in stream CVE-2023-26607: Fix not seen in stream CVE-2023-28328: Fix not seen in stream +CVE-2023-28746: Fix not seen in stream CVE-2023-28772: Fix not seen in stream CVE-2023-2985: Fix not seen in stream CVE-2023-3006: Fix not seen in stream @@ -1247,7 +1333,7 @@ CVE-2023-4622: Fix not seen in stream CVE-2023-4623: Fix not seen in stream CVE-2023-46343: Fix not seen in stream CVE-2023-46838: Fix not seen in stream -CVE-2023-47233: Fix unknown +CVE-2023-47233: Fix not seen in stream CVE-2023-4881: Fix not seen in stream CVE-2023-4921: Fix not seen in stream CVE-2023-51043: Fix not seen in stream @@ -1259,29 +1345,115 @@ CVE-2023-51782: Fix not seen in stream CVE-2023-52340: Fix not seen in stream CVE-2023-52429: Fix not seen in stream CVE-2023-52434: Fix not seen in stream -CVE-2023-52435: Fix not seen in stream CVE-2023-52436: Fix not seen in stream CVE-2023-52442: Fix not seen in stream CVE-2023-52444: Fix not seen in stream CVE-2023-52445: Fix not seen in stream CVE-2023-52449: Fix not seen in stream CVE-2023-52451: Fix not seen in stream -CVE-2023-52456: Fix not seen in stream -CVE-2023-52457: Fix not seen in stream CVE-2023-52458: Fix not seen in stream +CVE-2023-52469: Fix not seen in stream +CVE-2023-52470: Fix not seen in stream +CVE-2023-52475: Fix not seen in stream +CVE-2023-52476: Fix not seen in stream +CVE-2023-52477: Fix not seen in stream +CVE-2023-52478: Fix not seen in stream +CVE-2023-52479: Fix not seen in stream +CVE-2023-52480: Fix not seen in stream +CVE-2023-52481: Fix not seen in stream +CVE-2023-52482: Fix not seen in stream +CVE-2023-52484: Fix not seen in stream +CVE-2023-52485: Fix not seen in stream +CVE-2023-52486: Fix not seen in stream +CVE-2023-52488: Fix not seen in stream +CVE-2023-52489: Fix not seen in stream +CVE-2023-52498: Fix not seen in stream +CVE-2023-52500: Fix not seen in stream +CVE-2023-52501: Fix not seen in stream +CVE-2023-52502: Fix not seen in stream +CVE-2023-52506: Fix not seen in stream +CVE-2023-52507: Fix not seen in stream +CVE-2023-52508: Fix not seen in stream +CVE-2023-52509: Fix not seen in stream +CVE-2023-52511: Fix not seen in stream +CVE-2023-52515: Fix not seen in stream +CVE-2023-52516: Fix not seen in stream +CVE-2023-52517: Fix not seen in stream +CVE-2023-52519: Fix not seen in stream +CVE-2023-52522: Fix not seen in stream +CVE-2023-52527: Fix not seen in stream +CVE-2023-52528: Fix not seen in stream +CVE-2023-52531: Fix not seen in stream +CVE-2023-52532: Fix not seen in stream +CVE-2023-52559: Fix not seen in stream +CVE-2023-52561: Fix not seen in stream +CVE-2023-52563: Fix not seen in stream +CVE-2023-52565: Fix not seen in stream +CVE-2023-52566: Fix not seen in stream +CVE-2023-52568: Fix not seen in stream +CVE-2023-52569: Fix not seen in stream +CVE-2023-52571: Fix not seen in stream +CVE-2023-52572: Fix not seen in stream +CVE-2023-52574: Fix not seen in stream +CVE-2023-52578: Fix not seen in stream +CVE-2023-52583: Fix not seen in stream +CVE-2023-52584: Fix not seen in stream +CVE-2023-52585: Fix not seen in stream +CVE-2023-52586: Fix not seen in stream +CVE-2023-52587: Fix not seen in stream +CVE-2023-52588: Fix not seen in stream +CVE-2023-52589: Fix not seen in stream +CVE-2023-52590: Fix not seen in stream +CVE-2023-52591: Fix not seen in stream +CVE-2023-52593: Fix not seen in stream +CVE-2023-52594: Fix not seen in stream +CVE-2023-52595: Fix not seen in stream +CVE-2023-52596: Fix not seen in stream +CVE-2023-52597: Fix not seen in stream +CVE-2023-52598: Fix not seen in stream +CVE-2023-52599: Fix not seen in stream +CVE-2023-52600: Fix not seen in stream +CVE-2023-52601: Fix not seen in stream +CVE-2023-52602: Fix not seen in stream +CVE-2023-52603: Fix not seen in stream +CVE-2023-52604: Fix not seen in stream +CVE-2023-52606: Fix not seen in stream +CVE-2023-52607: Fix not seen in stream +CVE-2023-52609: Fix not seen in stream +CVE-2023-52614: Fix not seen in stream +CVE-2023-52615: Fix not seen in stream +CVE-2023-52617: Fix not seen in stream +CVE-2023-52618: Fix not seen in stream +CVE-2023-52619: Fix not seen in stream +CVE-2023-52620: Fix not seen in stream +CVE-2023-52621: Fix not seen in stream +CVE-2023-52622: Fix not seen in stream +CVE-2023-52623: Fix not seen in stream +CVE-2023-52624: Fix not seen in stream +CVE-2023-52625: Fix not seen in stream +CVE-2023-52628: Fix not seen in stream +CVE-2023-52629: Fix not seen in stream +CVE-2023-52632: Fix not seen in stream +CVE-2023-52633: Fix not seen in stream +CVE-2023-52634: Fix not seen in stream +CVE-2023-52635: Fix not seen in stream +CVE-2023-52638: Fix not seen in stream +CVE-2023-52639: Fix not seen in stream +CVE-2023-52640: Fix not seen in stream +CVE-2023-52641: Fix not seen in stream CVE-2023-6040: Fix not seen in stream CVE-2023-6240: Fix unknown -CVE-2023-6270: Fix unknown -CVE-2023-6356: Fix unknown +CVE-2023-6270: Fix not seen in stream +CVE-2023-6356: Fix not seen in stream CVE-2023-6535: Fix unknown -CVE-2023-6536: Fix unknown +CVE-2023-6536: Fix not seen in stream CVE-2023-6546: Fix not seen in stream CVE-2023-6606: Fix not seen in stream CVE-2023-6610: Fix not seen in stream CVE-2023-6915: Fix not seen in stream CVE-2023-6931: Fix not seen in stream CVE-2023-6932: Fix not seen in stream -CVE-2023-7042: Fix unknown +CVE-2023-7042: Fix not seen in stream CVE-2023-7192: Fix not seen in stream CVE-2024-0340: Fix not seen in stream CVE-2024-0584: Fix not seen in stream @@ -1289,10 +1461,11 @@ CVE-2024-0775: Fix not seen in stream CVE-2024-1086: Fix not seen in stream CVE-2024-1312: Fix not seen in stream CVE-2024-21803: Fix unknown -CVE-2024-22099: Fix unknown +CVE-2024-2193: Fix unknown +CVE-2024-22099: Fix not seen in stream CVE-2024-22386: Fix unknown -CVE-2024-23196: Fix unknown -CVE-2024-23307: Fix unknown +CVE-2024-23196: Fix not seen in stream +CVE-2024-23307: Fix not seen in stream CVE-2024-23848: Fix unknown CVE-2024-23851: Fix not seen in stream CVE-2024-24855: Fix not seen in stream @@ -1300,16 +1473,98 @@ CVE-2024-24857: Fix unknown CVE-2024-24858: Fix unknown CVE-2024-24859: Fix unknown CVE-2024-24860: Fix not seen in stream -CVE-2024-24861: Fix unknown +CVE-2024-24861: Fix not seen in stream CVE-2024-24864: Fix unknown CVE-2024-25739: Fix unknown CVE-2024-25740: Fix unknown CVE-2024-25741: Fix unknown CVE-2024-25744: Fix not seen in stream -CVE-2024-26584: Fix not seen in stream -CVE-2024-26587: Fix not seen in stream -CVE-2024-26588: Fix not seen in stream -CVE-2024-26591: Fix not seen in stream CVE-2024-26592: Fix not seen in stream CVE-2024-26594: Fix not seen in stream CVE-2024-26598: Fix not seen in stream +CVE-2024-26600: Fix not seen in stream +CVE-2024-26606: Fix not seen in stream +CVE-2024-26622: Fix not seen in stream +CVE-2024-26623: Fix not seen in stream +CVE-2024-26625: Fix not seen in stream +CVE-2024-26627: Fix not seen in stream +CVE-2024-26633: Fix not seen in stream +CVE-2024-26635: Fix not seen in stream +CVE-2024-26636: Fix not seen in stream +CVE-2024-26642: Fix not seen in stream +CVE-2024-26644: Fix not seen in stream +CVE-2024-26646: Fix not seen in stream +CVE-2024-26647: Fix not seen in stream +CVE-2024-26648: Fix not seen in stream +CVE-2024-26650: Fix not seen in stream +CVE-2024-26651: Fix not seen in stream +CVE-2024-26654: Fix not seen in stream +CVE-2024-26655: Fix not seen in stream +CVE-2024-26656: Fix not seen in stream +CVE-2024-26658: Fix not seen in stream +CVE-2024-26659: Fix not seen in stream +CVE-2024-26664: Fix not seen in stream +CVE-2024-26668: Fix not seen in stream +CVE-2024-26671: Fix not seen in stream +CVE-2024-26672: Fix not seen in stream +CVE-2024-26675: Fix not seen in stream +CVE-2024-26676: Fix not seen in stream +CVE-2024-26677: Fix not seen in stream +CVE-2024-26679: Fix not seen in stream +CVE-2024-26685: Fix not seen in stream +CVE-2024-26686: Fix not seen in stream +CVE-2024-26687: Fix not seen in stream +CVE-2024-26689: Fix not seen in stream +CVE-2024-26691: Fix not seen in stream +CVE-2024-26696: Fix not seen in stream +CVE-2024-26697: Fix not seen in stream +CVE-2024-26699: Fix not seen in stream +CVE-2024-26700: Fix not seen in stream +CVE-2024-26704: Fix not seen in stream +CVE-2024-26706: Fix not seen in stream +CVE-2024-26713: Fix not seen in stream +CVE-2024-26719: Fix not seen in stream +CVE-2024-26720: Fix not seen in stream +CVE-2024-26726: Fix not seen in stream +CVE-2024-26733: Fix not seen in stream +CVE-2024-26738: Fix not seen in stream +CVE-2024-26739: Fix not seen in stream +CVE-2024-26743: Fix not seen in stream +CVE-2024-26744: Fix not seen in stream +CVE-2024-26745: Fix not seen in stream +CVE-2024-26748: Fix not seen in stream +CVE-2024-26752: Fix not seen in stream +CVE-2024-26756: Fix not seen in stream +CVE-2024-26758: Fix not seen in stream +CVE-2024-26759: Fix not seen in stream +CVE-2024-26763: Fix not seen in stream +CVE-2024-26764: Fix not seen in stream +CVE-2024-26765: Fix not seen in stream +CVE-2024-26766: Fix not seen in stream +CVE-2024-26767: Fix not seen in stream +CVE-2024-26768: Fix not seen in stream +CVE-2024-26769: Fix not seen in stream +CVE-2024-26770: Fix not seen in stream +CVE-2024-26771: Fix not seen in stream +CVE-2024-26772: Fix not seen in stream +CVE-2024-26773: Fix not seen in stream +CVE-2024-26774: Fix not seen in stream +CVE-2024-26775: Fix not seen in stream +CVE-2024-26776: Fix not seen in stream +CVE-2024-26777: Fix not seen in stream +CVE-2024-26778: Fix not seen in stream +CVE-2024-26779: Fix not seen in stream +CVE-2024-26784: Fix not seen in stream +CVE-2024-26789: Fix not seen in stream +CVE-2024-26791: Fix not seen in stream +CVE-2024-26793: Fix not seen in stream +CVE-2024-26797: Fix not seen in stream +CVE-2024-26798: Fix not seen in stream +CVE-2024-26801: Fix not seen in stream +CVE-2024-26802: Fix not seen in stream +CVE-2024-26803: Fix not seen in stream +CVE-2024-26804: Fix not seen in stream +CVE-2024-26805: Fix not seen in stream +CVE-2024-26806: Fix not seen in stream +CVE-2024-26808: Fix not seen in stream +CVE-2024-26809: Fix not seen in stream diff --git a/data/4.3/4.3_security.txt b/data/4.3/4.3_security.txt index ef6d46f04..679f35226 100644 --- a/data/4.3/4.3_security.txt +++ b/data/4.3/4.3_security.txt @@ -679,6 +679,8 @@ Outstanding CVEs: CVE-2019-2181: (unk) binder: check for overflow when alloc for security context CVE-2019-2213: (unk) binder: fix possible UAF when freeing buffer CVE-2019-2215: (unk) ANDROID: binder: remove waitqueue when thread exits. + CVE-2019-25160: (unk) netlabel: fix out-of-bounds memory accesses + CVE-2019-25162: (unk) i2c: Fix a potential use after free CVE-2019-3459: (unk) Bluetooth: Verify that l2cap_get_conf_opt provides large enough buffer CVE-2019-3460: (unk) Bluetooth: Check L2CAP option sizes returned from l2cap_get_conf_opt CVE-2019-3701: (unk) can: gw: ensure DLC boundaries after CAN frame modification @@ -847,6 +849,9 @@ Outstanding CVEs: CVE-2020-36557: (unk) vt: vt_ioctl: fix VT_DISALLOCATE freeing in-use virtual console CVE-2020-36558: (unk) vt: vt_ioctl: fix race in VT_RESIZEX CVE-2020-36691: (unk) netlink: limit recursion depth in policy validation + CVE-2020-36775: (unk) f2fs: fix to avoid potential deadlock + CVE-2020-36780: (unk) i2c: sprd: fix reference leak when pm_runtime_get_sync fails + CVE-2020-36781: (unk) i2c: imx: fix reference leak when pm_runtime_get_sync fails CVE-2020-3702: (unk) ath: Use safer key clearing with key cache entries CVE-2020-4788: (unk) powerpc/64s: flush L1D on kernel entry CVE-2020-8647: (unk) vgacon: Fix a UAF in vgacon_invert_region @@ -981,6 +986,83 @@ Outstanding CVEs: CVE-2021-45485: (unk) ipv6: use prandom_u32() for ID generation CVE-2021-45486: (unk) inet: use bigger hash table for IP ID generation CVE-2021-45868: (unk) quota: check block number when reading the block in quota file + CVE-2021-46904: (unk) net: hso: fix null-ptr-deref during tty device unregistration + CVE-2021-46906: (unk) HID: usbhid: fix info leak in hid_submit_ctrl + CVE-2021-46908: (unk) bpf: Use correct permission flag for mixed signed bounds arithmetic + CVE-2021-46924: (unk) NFC: st21nfca: Fix memory leak in device probe and remove + CVE-2021-46926: (unk) ALSA: hda: intel-sdw-acpi: harden detection of controller + CVE-2021-46928: (unk) parisc: Clear stale IIR value on instruction access rights trap + CVE-2021-46932: (unk) Input: appletouch - initialize work before device registration + CVE-2021-46933: (unk) usb: gadget: f_fs: Clear ffs_eventfd in ffs_data_clear. + CVE-2021-46936: (unk) net: fix use-after-free in tw_timer_handler + CVE-2021-46939: (unk) tracing: Restructure trace_clock_global() to never block + CVE-2021-46950: (unk) md/raid1: properly indicate failure when ending a failed write request + CVE-2021-46951: (unk) tpm: efi: Use local variable for calculating final log size + CVE-2021-46952: (unk) NFS: fs_context: validate UDP retrans to prevent shift out-of-bounds + CVE-2021-46959: (unk) spi: Fix use-after-free with devm_spi_alloc_* + CVE-2021-46962: (unk) mmc: uniphier-sd: Fix a resource leak in the remove function + CVE-2021-46965: (unk) mtd: physmap: physmap-bt1-rom: Fix unintentional stack access + CVE-2021-46969: (unk) bus: mhi: core: Fix invalid error returning in mhi_queue + CVE-2021-46970: (unk) bus: mhi: pci_generic: Remove WQ_MEM_RECLAIM flag from state workqueue + CVE-2021-46982: (unk) f2fs: compress: fix race condition of overwrite vs truncate + CVE-2021-47028: (unk) mt76: mt7915: fix txrate reporting + CVE-2021-47046: (unk) drm/amd/display: Fix off by one in hdmi_14_process_transaction() + CVE-2021-47052: (unk) crypto: sa2ul - Fix memory leak of rxd + CVE-2021-47059: (unk) crypto: sun8i-ss - fix result memory leak on error path + CVE-2021-47065: (unk) rtw88: Fix array overrun in rtw_get_tx_power_params() + CVE-2021-47070: (unk) uio_hv_generic: Fix another memory leak in error handling paths + CVE-2021-47075: (unk) nvmet: fix memory leak in nvmet_alloc_ctrl() + CVE-2021-47076: (unk) RDMA/rxe: Return CQE error if invalid lkey was supplied + CVE-2021-47082: (unk) tun: avoid double free in tun_free_netdev + CVE-2021-47083: (unk) pinctrl: mediatek: fix global-out-of-bounds issue + CVE-2021-47086: (unk) phonet/pep: refuse to enable an unbound pipe + CVE-2021-47101: (unk) asix: fix uninit-value in asix_mdio_read() + CVE-2021-47103: (unk) inet: fully convert sk->sk_rx_dst to RCU rules + CVE-2021-47110: (unk) x86/kvm: Disable kvmclock on all CPUs on shutdown + CVE-2021-47112: (unk) x86/kvm: Teardown PV features on boot CPU as well + CVE-2021-47113: (unk) btrfs: abort in rename_exchange if we fail to insert the second ref + CVE-2021-47114: (unk) ocfs2: fix data corruption by fallocate + CVE-2021-47116: (unk) ext4: fix memory leak in ext4_mb_init_backend on error path. + CVE-2021-47117: (unk) ext4: fix bug on in ext4_es_cache_extent as ext4_split_extent_at failed + CVE-2021-47118: (unk) pid: take a reference when initializing `cad_pid` + CVE-2021-47119: (unk) ext4: fix memory leak in ext4_fill_super + CVE-2021-47121: (unk) net: caif: fix memory leak in cfusbl_device_notify + CVE-2021-47122: (unk) net: caif: fix memory leak in caif_device_notify + CVE-2021-47124: (unk) io_uring: fix link timeout refs + CVE-2021-47125: (unk) sch_htb: fix refcount leak in htb_parent_to_leaf_offload + CVE-2021-47128: (unk) bpf, lockdown, audit: Fix buggy SELinux lockdown permission checks + CVE-2021-47131: (unk) net/tls: Fix use-after-free after the TLS device goes down and up + CVE-2021-47133: (unk) HID: amd_sfh: Fix memory leak in amd_sfh_work + CVE-2021-47135: (unk) mt76: mt7921: fix possible AOOB issue in mt7921_mcu_tx_rate_report + CVE-2021-47136: (unk) net: zero-initialize tc skb extension on allocation + CVE-2021-47137: (unk) net: lantiq: fix memory corruption in RX ring + CVE-2021-47140: (unk) iommu/amd: Clear DMA ops when switching domain + CVE-2021-47142: (unk) drm/amdgpu: Fix a use-after-free + CVE-2021-47143: (unk) net/smc: remove device from smcd_dev_list after failed device_add() + CVE-2021-47144: (unk) drm/amd/amdgpu: fix refcount leak + CVE-2021-47145: (unk) btrfs: do not BUG_ON in link_to_fixup_dir + CVE-2021-47146: (unk) mld: fix panic in mld_newpack() + CVE-2021-47147: (unk) ptp: ocp: Fix a resource leak in an error handling path + CVE-2021-47149: (unk) net: fujitsu: fix potential null-ptr-deref + CVE-2021-47150: (unk) net: fec: fix the potential memory leak in fec_enet_init() + CVE-2021-47151: (unk) interconnect: qcom: bcm-voter: add a missing of_node_put() + CVE-2021-47153: (unk) i2c: i801: Don't generate an interrupt on bus reset + CVE-2021-47158: (unk) net: dsa: sja1105: add error handling in sja1105_setup() + CVE-2021-47160: (unk) net: dsa: mt7530: fix VLAN traffic leaks + CVE-2021-47162: (unk) tipc: skb_linearize the head skb when reassembling msgs + CVE-2021-47163: (unk) tipc: wait and exit until all work queues are done + CVE-2021-47165: (unk) drm/meson: fix shutdown crash when component not probed + CVE-2021-47166: (unk) NFS: Don't corrupt the value of pg_bytes_written in nfs_do_recoalesce() + CVE-2021-47167: (unk) NFS: Fix an Oopsable condition in __nfs_pageio_add_request() + CVE-2021-47168: (unk) NFS: fix an incorrect limit in filelayout_decode_layout() + CVE-2021-47169: (unk) serial: rp2: use 'request_firmware' instead of 'request_firmware_nowait' + CVE-2021-47170: (unk) USB: usbfs: Don't WARN about excessively large memory allocations + CVE-2021-47171: (unk) net: usb: fix memory leak in smsc75xx_bind + CVE-2021-47172: (unk) iio: adc: ad7124: Fix potential overflow due to non sequential channel numbers + CVE-2021-47173: (unk) misc/uss720: fix memory leak in uss720_probe + CVE-2021-47175: (unk) net/sched: fq_pie: fix OOB access in the traffic path + CVE-2021-47179: (unk) NFSv4: Fix a NULL pointer dereference in pnfs_mark_matching_lsegs_return() + CVE-2021-47180: (unk) NFC: nci: fix memory leak in nci_allocate_device CVE-2022-0001: (unk) x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE CVE-2022-0002: (unk) x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE CVE-2022-0168: (unk) cifs: fix NULL ptr dereference in smb2_ioctl_query_info() @@ -1152,6 +1234,9 @@ Outstanding CVEs: CVE-2022-47520: (unk) wifi: wilc1000: validate pairwise and authentication suite offsets CVE-2022-47929: (unk) net: sched: disallow noqueue for qdisc classes CVE-2022-48619: (unk) Input: add bounds checking to input_set_capability() + CVE-2022-48626: (unk) moxart: fix potential use-after-free on remove path + CVE-2022-48627: (unk) vt: fix memory overlapping when deleting chars in the buffer + CVE-2022-48628: (unk) ceph: drop messages from MDS when unmounting CVE-2023-0030: (unk) drm/nouveau/mmu: add more general vmm free/node handling functions CVE-2023-0047: (unk) mm, oom: do not trigger out_of_memory from the #PF CVE-2023-0266: (unk) ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF @@ -1200,6 +1285,7 @@ Outstanding CVEs: CVE-2023-26545: (unk) net: mpls: fix stale pointer if allocation fails during device rename CVE-2023-26607: (unk) ntfs: fix out-of-bounds read in ntfs_attr_find() CVE-2023-28328: (unk) media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer() + CVE-2023-28746: (unk) x86/mmio: Disable KVM mitigation when X86_FEATURE_CLEAR_CPU_BUF is set CVE-2023-28772: (unk) seq_buf: Fix overflow in seq_buf_putmem_hex() CVE-2023-2985: (unk) fs: hfsplus: fix UAF issue in hfsplus_put_super CVE-2023-3006: (unk) arm64: Add AMPERE1 to the Spectre-BHB affected list @@ -1263,7 +1349,7 @@ Outstanding CVEs: CVE-2023-4623: (unk) net/sched: sch_hfsc: Ensure inner classes have fsc curve CVE-2023-46343: (unk) nfc: nci: fix possible NULL pointer dereference in send_acknowledge() CVE-2023-46838: (unk) xen-netback: don't produce zero-size SKB frags - CVE-2023-47233: (unk) + CVE-2023-47233: (unk) wifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach CVE-2023-4881: (unk) netfilter: nftables: exthdr: fix 4-byte stack OOB write CVE-2023-4921: (unk) net: sched: sch_qfq: Fix UAF in qfq_dequeue() CVE-2023-51043: (unk) drm/atomic: Fix potential use-after-free in nonblocking commits @@ -1275,29 +1361,115 @@ Outstanding CVEs: CVE-2023-52340: (unk) ipv6: remove max_size check inline with ipv4 CVE-2023-52429: (unk) dm: limit the number of targets and parameter size area CVE-2023-52434: (unk) smb: client: fix potential OOBs in smb2_parse_contexts() - CVE-2023-52435: (unk) net: prevent mss overflow in skb_segment() CVE-2023-52436: (unk) f2fs: explicitly null-terminate the xattr list CVE-2023-52442: (unk) ksmbd: validate session id and tree id in compound request CVE-2023-52444: (unk) f2fs: fix to avoid dirent corruption CVE-2023-52445: (unk) media: pvrusb2: fix use after free on context disconnection CVE-2023-52449: (unk) mtd: Fix gluebi NULL pointer dereference caused by ftl notifier CVE-2023-52451: (unk) powerpc/pseries/memhp: Fix access beyond end of drmem array - CVE-2023-52456: (unk) serial: imx: fix tx statemachine deadlock - CVE-2023-52457: (unk) serial: 8250: omap: Don't skip resource freeing if pm_runtime_resume_and_get() failed CVE-2023-52458: (unk) block: add check that partition length needs to be aligned with block size + CVE-2023-52469: (unk) drivers/amd/pm: fix a use-after-free in kv_parse_power_table + CVE-2023-52470: (unk) drm/radeon: check the alloc_workqueue return value in radeon_crtc_init() + CVE-2023-52475: (unk) Input: powermate - fix use-after-free in powermate_config_complete + CVE-2023-52476: (unk) perf/x86/lbr: Filter vsyscall addresses + CVE-2023-52477: (unk) usb: hub: Guard against accesses to uninitialized BOS descriptors + CVE-2023-52478: (unk) HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect + CVE-2023-52479: (unk) ksmbd: fix uaf in smb20_oplock_break_ack + CVE-2023-52480: (unk) ksmbd: fix race condition between session lookup and expire + CVE-2023-52481: (unk) arm64: errata: Add Cortex-A520 speculative unprivileged load workaround + CVE-2023-52482: (unk) x86/srso: Add SRSO mitigation for Hygon processors + CVE-2023-52484: (unk) iommu/arm-smmu-v3: Fix soft lockup triggered by arm_smmu_mm_invalidate_range + CVE-2023-52485: (unk) drm/amd/display: Wake DMCUB before sending a command + CVE-2023-52486: (unk) drm: Don't unref the same fb many times by mistake due to deadlock handling + CVE-2023-52488: (unk) serial: sc16is7xx: convert from _raw_ to _noinc_ regmap functions for FIFO + CVE-2023-52489: (unk) mm/sparsemem: fix race in accessing memory_section->usage + CVE-2023-52498: (unk) PM: sleep: Fix possible deadlocks in core system-wide PM code + CVE-2023-52500: (unk) scsi: pm80xx: Avoid leaking tags when processing OPC_INB_SET_CONTROLLER_CONFIG command + CVE-2023-52501: (unk) ring-buffer: Do not attempt to read past "commit" + CVE-2023-52502: (unk) net: nfc: fix races in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn() + CVE-2023-52506: (unk) LoongArch: Set all reserved memblocks on Node#0 at initialization + CVE-2023-52507: (unk) nfc: nci: assert requested protocol is valid + CVE-2023-52508: (unk) nvme-fc: Prevent null pointer dereference in nvme_fc_io_getuuid() + CVE-2023-52509: (unk) ravb: Fix use-after-free issue in ravb_tx_timeout_work() + CVE-2023-52511: (unk) spi: sun6i: reduce DMA RX transfer width to single byte + CVE-2023-52515: (unk) RDMA/srp: Do not call scsi_done() from srp_abort() + CVE-2023-52516: (unk) dma-debug: don't call __dma_entry_alloc_check_leak() under free_entries_lock + CVE-2023-52517: (unk) spi: sun6i: fix race between DMA RX transfer completion and RX FIFO drain + CVE-2023-52519: (unk) HID: intel-ish-hid: ipc: Disable and reenable ACPI GPE bit + CVE-2023-52522: (unk) net: fix possible store tearing in neigh_periodic_work() + CVE-2023-52527: (unk) ipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data() + CVE-2023-52528: (unk) net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg + CVE-2023-52531: (unk) wifi: iwlwifi: mvm: Fix a memory corruption issue + CVE-2023-52532: (unk) net: mana: Fix TX CQE error handling + CVE-2023-52559: (unk) iommu/vt-d: Avoid memory allocation in iommu_suspend() + CVE-2023-52561: (unk) arm64: dts: qcom: sdm845-db845c: Mark cont splash memory region as reserved + CVE-2023-52563: (unk) drm/meson: fix memory leak on ->hpd_notify callback + CVE-2023-52565: (unk) media: uvcvideo: Fix OOB read + CVE-2023-52566: (unk) nilfs2: fix potential use after free in nilfs_gccache_submit_read_data() + CVE-2023-52568: (unk) x86/sgx: Resolves SECS reclaim vs. page fault for EAUG race + CVE-2023-52569: (unk) btrfs: remove BUG() after failure to insert delayed dir index item + CVE-2023-52571: (unk) power: supply: rk817: Fix node refcount leak + CVE-2023-52572: (unk) cifs: Fix UAF in cifs_demultiplex_thread() + CVE-2023-52574: (unk) team: fix null-ptr-deref when team device type is changed + CVE-2023-52578: (unk) net: bridge: use DEV_STATS_INC() + CVE-2023-52583: (unk) ceph: fix deadlock or deadcode of misusing dget() + CVE-2023-52584: (unk) spmi: mediatek: Fix UAF on device remove + CVE-2023-52585: (unk) drm/amdgpu: Fix possible NULL dereference in amdgpu_ras_query_error_status_helper() + CVE-2023-52586: (unk) drm/msm/dpu: Add mutex lock in control vblank irq + CVE-2023-52587: (unk) IB/ipoib: Fix mcast list locking + CVE-2023-52588: (unk) f2fs: fix to tag gcing flag on page during block migration + CVE-2023-52589: (unk) media: rkisp1: Fix IRQ disable race issue + CVE-2023-52590: (unk) ocfs2: Avoid touching renamed directory if parent does not change + CVE-2023-52591: (unk) reiserfs: Avoid touching renamed directory if parent does not change + CVE-2023-52593: (unk) wifi: wfx: fix possible NULL pointer dereference in wfx_set_mfp_ap() + CVE-2023-52594: (unk) wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus() + CVE-2023-52595: (unk) wifi: rt2x00: restart beacon queue when hardware reset + CVE-2023-52596: (unk) sysctl: Fix out of bounds access for empty sysctl registers + CVE-2023-52597: (unk) KVM: s390: fix setting of fpc register + CVE-2023-52598: (unk) s390/ptrace: handle setting of fpc register correctly + CVE-2023-52599: (unk) jfs: fix array-index-out-of-bounds in diNewExt + CVE-2023-52600: (unk) jfs: fix uaf in jfs_evict_inode + CVE-2023-52601: (unk) jfs: fix array-index-out-of-bounds in dbAdjTree + CVE-2023-52602: (unk) jfs: fix slab-out-of-bounds Read in dtSearch + CVE-2023-52603: (unk) UBSAN: array-index-out-of-bounds in dtSplitRoot + CVE-2023-52604: (unk) FS:JFS:UBSAN:array-index-out-of-bounds in dbAdjTree + CVE-2023-52606: (unk) powerpc/lib: Validate size for vector operations + CVE-2023-52607: (unk) powerpc/mm: Fix null-pointer dereference in pgtable_cache_add + CVE-2023-52609: (unk) binder: fix race between mmput() and do_exit() + CVE-2023-52614: (unk) PM / devfreq: Fix buffer overflow in trans_stat_show + CVE-2023-52615: (unk) hwrng: core - Fix page fault dead lock on mmap-ed hwrng + CVE-2023-52617: (unk) PCI: switchtec: Fix stdev_release() crash after surprise hot remove + CVE-2023-52618: (unk) block/rnbd-srv: Check for unlikely string overflow + CVE-2023-52619: (unk) pstore/ram: Fix crash when setting number of cpus to an odd number + CVE-2023-52620: (unk) netfilter: nf_tables: disallow timeout for anonymous sets + CVE-2023-52621: (unk) bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers + CVE-2023-52622: (unk) ext4: avoid online resizing failures due to oversized flex bg + CVE-2023-52623: (unk) SUNRPC: Fix a suspicious RCU usage warning + CVE-2023-52624: (unk) drm/amd/display: Wake DMCUB before executing GPINT commands + CVE-2023-52625: (unk) drm/amd/display: Refactor DMCUB enter/exit idle interface + CVE-2023-52628: (unk) netfilter: nftables: exthdr: fix 4-byte stack OOB write + CVE-2023-52629: (unk) sh: push-switch: Reorder cleanup operations to avoid use-after-free bug + CVE-2023-52632: (unk) drm/amdkfd: Fix lock dependency warning with srcu + CVE-2023-52633: (unk) um: time-travel: fix time corruption + CVE-2023-52634: (unk) drm/amd/display: Fix disable_otg_wa logic + CVE-2023-52635: (unk) PM / devfreq: Synchronize devfreq_monitor_[start/stop] + CVE-2023-52638: (unk) can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock + CVE-2023-52639: (unk) KVM: s390: vsie: fix race during shadow creation + CVE-2023-52640: (unk) fs/ntfs3: Fix oob in ntfs_listxattr + CVE-2023-52641: (unk) fs/ntfs3: Add NULL ptr dereference checking at the end of attr_allocate_frame() CVE-2023-6040: (unk) netfilter: nf_tables: Reject tables of unsupported family CVE-2023-6240: (unk) - CVE-2023-6270: (unk) - CVE-2023-6356: (unk) + CVE-2023-6270: (unk) aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts + CVE-2023-6356: (unk) nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length CVE-2023-6535: (unk) - CVE-2023-6536: (unk) + CVE-2023-6536: (unk) nvmet-tcp: fix a crash in nvmet_req_complete() CVE-2023-6546: (unk) tty: n_gsm: fix the UAF caused by race condition in gsm_cleanup_mux CVE-2023-6606: (unk) smb: client: fix OOB in smbCalcSize() CVE-2023-6610: (unk) smb: client: fix potential OOB in smb2_dump_detail() CVE-2023-6915: (unk) ida: Fix crash in ida_free when the bitmap is empty CVE-2023-6931: (unk) perf: Fix perf_event_validate_size() CVE-2023-6932: (unk) ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet - CVE-2023-7042: (unk) + CVE-2023-7042: (unk) wifi: ath10k: fix NULL pointer dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev() CVE-2023-7192: (unk) netfilter: ctnetlink: fix possible refcount leak in ctnetlink_create_conntrack() CVE-2024-0340: (unk) vhost: use kzalloc() instead of kmalloc() followed by memset() CVE-2024-0584: (unk) ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet @@ -1305,10 +1477,11 @@ Outstanding CVEs: CVE-2024-1086: (unk) netfilter: nf_tables: reject QUEUE/DROP verdict parameters CVE-2024-1312: (unk) mm: lock_vma_under_rcu() must check vma->anon_vma under vma lock CVE-2024-21803: (unk) - CVE-2024-22099: (unk) + CVE-2024-2193: (unk) + CVE-2024-22099: (unk) Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security CVE-2024-22386: (unk) - CVE-2024-23196: (unk) - CVE-2024-23307: (unk) + CVE-2024-23196: (unk) ALSA: hda: fix a possible null-pointer dereference due to data race in snd_hdac_regmap_sync() + CVE-2024-23307: (unk) md/raid5: fix atomicity violation in raid5_cache_count CVE-2024-23848: (unk) CVE-2024-23851: (unk) dm: limit the number of targets and parameter size area CVE-2024-24855: (unk) scsi: lpfc: Fix a possible data race in lpfc_unregister_fcf_rescan() @@ -1316,16 +1489,98 @@ Outstanding CVEs: CVE-2024-24858: (unk) CVE-2024-24859: (unk) CVE-2024-24860: (unk) Bluetooth: Fix atomicity violation in {min,max}_key_size_set - CVE-2024-24861: (unk) + CVE-2024-24861: (unk) media: xc4000: Fix atomicity violation in xc4000_get_frequency CVE-2024-24864: (unk) CVE-2024-25739: (unk) CVE-2024-25740: (unk) CVE-2024-25741: (unk) CVE-2024-25744: (unk) x86/coco: Disable 32-bit emulation by default on TDX and SEV - CVE-2024-26584: (unk) net: tls: handle backlogging of crypto requests - CVE-2024-26587: (unk) net: netdevsim: don't try to destroy PHC on VFs - CVE-2024-26588: (unk) LoongArch: BPF: Prevent out-of-bounds memory access - CVE-2024-26591: (unk) bpf: Fix re-attachment branch in bpf_tracing_prog_attach CVE-2024-26592: (unk) ksmbd: fix UAF issue in ksmbd_tcp_new_connection() CVE-2024-26594: (unk) ksmbd: validate mech token in session setup CVE-2024-26598: (unk) KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache + CVE-2024-26600: (unk) phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP + CVE-2024-26606: (unk) binder: signal epoll threads of self-work + CVE-2024-26622: (unk) tomoyo: fix UAF write bug in tomoyo_write_control() + CVE-2024-26623: (unk) pds_core: Prevent race issues involving the adminq + CVE-2024-26625: (unk) llc: call sock_orphan() at release time + CVE-2024-26627: (unk) scsi: core: Move scsi_host_busy() out of host lock for waking up EH handler + CVE-2024-26633: (unk) ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim() + CVE-2024-26635: (unk) llc: Drop support for ETH_P_TR_802_2. + CVE-2024-26636: (unk) llc: make llc_ui_sendmsg() more robust against bonding changes + CVE-2024-26642: (unk) netfilter: nf_tables: disallow anonymous set with timeout flag + CVE-2024-26644: (unk) btrfs: don't abort filesystem when attempting to snapshot deleted subvolume + CVE-2024-26646: (unk) thermal: intel: hfi: Add syscore callbacks for system-wide PM + CVE-2024-26647: (unk) drm/amd/display: Fix late derefrence 'dsc' check in 'link_set_dsc_pps_packet()' + CVE-2024-26648: (unk) drm/amd/display: Fix variable deferencing before NULL check in edp_setup_replay() + CVE-2024-26650: (unk) platform/x86: p2sb: Allow p2sb_bar() calls during PCI device probe + CVE-2024-26651: (unk) sr9800: Add check for usbnet_get_endpoints + CVE-2024-26654: (unk) ALSA: sh: aica: reorder cleanup operations to avoid UAF bugs + CVE-2024-26655: (unk) Fix memory leak in posix_clock_open() + CVE-2024-26656: (unk) drm/amdgpu: fix use-after-free bug + CVE-2024-26658: (unk) bcachefs: grab s_umount only if snapshotting + CVE-2024-26659: (unk) xhci: handle isoc Babble and Buffer Overrun events properly + CVE-2024-26664: (unk) hwmon: (coretemp) Fix out-of-bounds memory access + CVE-2024-26668: (unk) netfilter: nft_limit: reject configurations that cause integer overflow + CVE-2024-26671: (unk) blk-mq: fix IO hang from sbitmap wakeup race + CVE-2024-26672: (unk) drm/amdgpu: Fix variable 'mca_funcs' dereferenced before NULL check in 'amdgpu_mca_smu_get_mca_entry()' + CVE-2024-26675: (unk) ppp_async: limit MRU to 64K + CVE-2024-26676: (unk) af_unix: Call kfree_skb() for dead unix_(sk)->oob_skb in GC. + CVE-2024-26677: (unk) rxrpc: Fix delayed ACKs to not set the reference serial number + CVE-2024-26679: (unk) inet: read sk->sk_family once in inet_recv_error() + CVE-2024-26685: (unk) nilfs2: fix potential bug in end_buffer_async_write + CVE-2024-26686: (unk) fs/proc: do_task_stat: use sig->stats_lock to gather the threads/children stats + CVE-2024-26687: (unk) xen/events: close evtchn after mapping cleanup + CVE-2024-26689: (unk) ceph: prevent use-after-free in encode_cap_msg() + CVE-2024-26691: (unk) KVM: arm64: Fix circular locking dependency + CVE-2024-26696: (unk) nilfs2: fix hang in nilfs_lookup_dirty_data_buffers() + CVE-2024-26697: (unk) nilfs2: fix data corruption in dsync block recovery for small block sizes + CVE-2024-26699: (unk) drm/amd/display: Fix array-index-out-of-bounds in dcn35_clkmgr + CVE-2024-26700: (unk) drm/amd/display: Fix MST Null Ptr for RV + CVE-2024-26704: (unk) ext4: fix double-free of blocks due to wrong extents moved_len + CVE-2024-26706: (unk) parisc: Fix random data corruption from exception handler + CVE-2024-26713: (unk) powerpc/pseries/iommu: Fix iommu initialisation during DLPAR add + CVE-2024-26719: (unk) nouveau: offload fence uevents work to workqueue + CVE-2024-26720: (unk) mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again + CVE-2024-26726: (unk) btrfs: don't drop extent_map for free space inode on write error + CVE-2024-26733: (unk) arp: Prevent overflow in arp_req_get(). + CVE-2024-26738: (unk) powerpc/pseries/iommu: DLPAR add doesn't completely initialize pci_controller + CVE-2024-26739: (unk) net/sched: act_mirred: don't override retval if we already lost the skb + CVE-2024-26743: (unk) RDMA/qedr: Fix qedr_create_user_qp error flow + CVE-2024-26744: (unk) RDMA/srpt: Support specifying the srpt_service_guid parameter + CVE-2024-26745: (unk) powerpc/pseries/iommu: IOMMU table is not initialized for kdump over SR-IOV + CVE-2024-26748: (unk) usb: cdns3: fix memory double free when handle zero packet + CVE-2024-26752: (unk) l2tp: pass correct message length to ip6_append_data + CVE-2024-26756: (unk) md: Don't register sync_thread for reshape directly + CVE-2024-26758: (unk) md: Don't ignore suspended array in md_check_recovery() + CVE-2024-26759: (unk) mm/swap: fix race when skipping swapcache + CVE-2024-26763: (unk) dm-crypt: don't modify the data when using authenticated encryption + CVE-2024-26764: (unk) fs/aio: Restrict kiocb_set_cancel_fn() to I/O submitted via libaio + CVE-2024-26765: (unk) LoongArch: Disable IRQ before init_fn() for nonboot CPUs + CVE-2024-26766: (unk) IB/hfi1: Fix sdma.h tx->num_descs off-by-one error + CVE-2024-26767: (unk) drm/amd/display: fixed integer types and null check locations + CVE-2024-26768: (unk) LoongArch: Change acpi_core_pic[NR_CPUS] to acpi_core_pic[MAX_CORE_PIC] + CVE-2024-26769: (unk) nvmet-fc: avoid deadlock on delete association path + CVE-2024-26770: (unk) HID: nvidia-shield: Add missing null pointer checks to LED initialization + CVE-2024-26771: (unk) dmaengine: ti: edma: Add some null pointer checks to the edma_probe + CVE-2024-26772: (unk) ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal() + CVE-2024-26773: (unk) ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found() + CVE-2024-26774: (unk) ext4: avoid dividing by 0 in mb_update_avg_fragment_size() when block bitmap corrupt + CVE-2024-26775: (unk) aoe: avoid potential deadlock at set_capacity + CVE-2024-26776: (unk) spi: hisi-sfc-v3xx: Return IRQ_NONE if no interrupts were detected + CVE-2024-26777: (unk) fbdev: sis: Error out if pixclock equals zero + CVE-2024-26778: (unk) fbdev: savage: Error out if pixclock equals zero + CVE-2024-26779: (unk) wifi: mac80211: fix race condition on enabling fast-xmit + CVE-2024-26784: (unk) pmdomain: arm: Fix NULL dereference on scmi_perf_domain removal + CVE-2024-26789: (unk) crypto: arm64/neonbs - fix out-of-bounds access on short input + CVE-2024-26791: (unk) btrfs: dev-replace: properly validate device names + CVE-2024-26793: (unk) gtp: fix use-after-free and null-ptr-deref in gtp_newlink() + CVE-2024-26797: (unk) drm/amd/display: Prevent potential buffer overflow in map_hw_resources + CVE-2024-26798: (unk) fbcon: always restore the old font data in fbcon_do_set_font() + CVE-2024-26801: (unk) Bluetooth: Avoid potential use-after-free in hci_error_reset + CVE-2024-26802: (unk) stmmac: Clear variable when destroying workqueue + CVE-2024-26803: (unk) net: veth: clear GRO when clearing XDP even when down + CVE-2024-26804: (unk) net: ip_tunnel: prevent perpetual headroom growth + CVE-2024-26805: (unk) netlink: Fix kernel-infoleak-after-free in __skb_datagram_iter + CVE-2024-26806: (unk) spi: cadence-qspi: remove system-wide suspend helper calls from runtime PM hooks + CVE-2024-26808: (unk) netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain + CVE-2024-26809: (unk) netfilter: nft_set_pipapo: release elements in clone only from destroy path diff --git a/data/4.4/4.4_CVEs.txt b/data/4.4/4.4_CVEs.txt index 263e83938..02fa769bd 100644 --- a/data/4.4/4.4_CVEs.txt +++ b/data/4.4/4.4_CVEs.txt @@ -642,6 +642,8 @@ CVE-2019-2101: Fixed with 4.4.177 CVE-2019-2181: Fix not seen in stream CVE-2019-2213: Fix not seen in stream CVE-2019-2215: Fixed with 4.4.196 +CVE-2019-25160: Fixed with 4.4.177 +CVE-2019-25162: Fix not seen in stream CVE-2019-3459: Fixed with 4.4.178 CVE-2019-3460: Fixed with 4.4.178 CVE-2019-3701: Fixed with 4.4.172 @@ -810,6 +812,9 @@ CVE-2020-36516: Fixed with 4.4.302 CVE-2020-36557: Fixed with 4.4.218 CVE-2020-36558: Fixed with 4.4.215 CVE-2020-36691: Fix not seen in stream +CVE-2020-36775: Fix not seen in stream +CVE-2020-36780: Fix not seen in stream +CVE-2020-36781: Fix not seen in stream CVE-2020-3702: Fixed with 4.4.284 CVE-2020-4788: Fixed with 4.4.245 CVE-2020-8647: Fixed with 4.4.216 @@ -944,6 +949,83 @@ CVE-2021-45469: Fix not seen in stream CVE-2021-45485: Fixed with 4.4.276 CVE-2021-45486: Fixed with 4.4.274 CVE-2021-45868: Fixed with 4.4.293 +CVE-2021-46904: Fixed with 4.4.268 +CVE-2021-46906: Fixed with 4.4.274 +CVE-2021-46908: Fix not seen in stream +CVE-2021-46924: Fix not seen in stream +CVE-2021-46926: Fix not seen in stream +CVE-2021-46928: Fix not seen in stream +CVE-2021-46932: Fixed with 4.4.298 +CVE-2021-46933: Fixed with 4.4.298 +CVE-2021-46936: Fixed with 4.4.298 +CVE-2021-46939: Fixed with 4.4.269 +CVE-2021-46950: Fix not seen in stream +CVE-2021-46951: Fix not seen in stream +CVE-2021-46952: Fix not seen in stream +CVE-2021-46959: Fix not seen in stream +CVE-2021-46962: Fix not seen in stream +CVE-2021-46965: Fix not seen in stream +CVE-2021-46969: Fix not seen in stream +CVE-2021-46970: Fix not seen in stream +CVE-2021-46982: Fix not seen in stream +CVE-2021-47028: Fix not seen in stream +CVE-2021-47046: Fix not seen in stream +CVE-2021-47052: Fix not seen in stream +CVE-2021-47059: Fix not seen in stream +CVE-2021-47065: Fix not seen in stream +CVE-2021-47070: Fix not seen in stream +CVE-2021-47075: Fix not seen in stream +CVE-2021-47076: Fix not seen in stream +CVE-2021-47082: Fix not seen in stream +CVE-2021-47083: Fix not seen in stream +CVE-2021-47086: Fixed with 4.4.297 +CVE-2021-47101: Fix not seen in stream +CVE-2021-47103: Fix not seen in stream +CVE-2021-47110: Fix not seen in stream +CVE-2021-47112: Fix not seen in stream +CVE-2021-47113: Fix not seen in stream +CVE-2021-47114: Fixed with 4.4.272 +CVE-2021-47116: Fix not seen in stream +CVE-2021-47117: Fixed with 4.4.272 +CVE-2021-47118: Fixed with 4.4.272 +CVE-2021-47119: Fix not seen in stream +CVE-2021-47121: Fixed with 4.4.272 +CVE-2021-47122: Fixed with 4.4.272 +CVE-2021-47124: Fix not seen in stream +CVE-2021-47125: Fix not seen in stream +CVE-2021-47128: Fix not seen in stream +CVE-2021-47131: Fix not seen in stream +CVE-2021-47133: Fix not seen in stream +CVE-2021-47135: Fix not seen in stream +CVE-2021-47136: Fix not seen in stream +CVE-2021-47137: Fix not seen in stream +CVE-2021-47140: Fix not seen in stream +CVE-2021-47142: Fixed with 4.4.271 +CVE-2021-47143: Fix not seen in stream +CVE-2021-47144: Fix not seen in stream +CVE-2021-47145: Fixed with 4.4.271 +CVE-2021-47146: Fixed with 4.4.271 +CVE-2021-47147: Fix not seen in stream +CVE-2021-47149: Fixed with 4.4.271 +CVE-2021-47150: Fix not seen in stream +CVE-2021-47151: Fix not seen in stream +CVE-2021-47153: Fixed with 4.4.271 +CVE-2021-47158: Fix not seen in stream +CVE-2021-47160: Fix not seen in stream +CVE-2021-47162: Fixed with 4.4.271 +CVE-2021-47163: Fix not seen in stream +CVE-2021-47165: Fix not seen in stream +CVE-2021-47166: Fixed with 4.4.271 +CVE-2021-47167: Fix not seen in stream +CVE-2021-47168: Fixed with 4.4.271 +CVE-2021-47169: Fixed with 4.4.271 +CVE-2021-47170: Fix not seen in stream +CVE-2021-47171: Fixed with 4.4.271 +CVE-2021-47172: Fix not seen in stream +CVE-2021-47173: Fixed with 4.4.271 +CVE-2021-47175: Fix not seen in stream +CVE-2021-47179: Fix not seen in stream +CVE-2021-47180: Fixed with 4.4.271 CVE-2022-0001: Fix not seen in stream CVE-2022-0002: Fix not seen in stream CVE-2022-0168: Fix not seen in stream @@ -1117,6 +1199,9 @@ CVE-2022-4744: Fix not seen in stream CVE-2022-47520: Fix not seen in stream CVE-2022-47929: Fix not seen in stream CVE-2022-48619: Fix not seen in stream +CVE-2022-48626: Fix not seen in stream +CVE-2022-48627: Fix not seen in stream +CVE-2022-48628: Fix not seen in stream CVE-2023-0030: Fix not seen in stream CVE-2023-0047: Fix not seen in stream CVE-2023-0266: Fix not seen in stream @@ -1165,6 +1250,7 @@ CVE-2023-2513: Fix not seen in stream CVE-2023-26545: Fix not seen in stream CVE-2023-26607: Fix not seen in stream CVE-2023-28328: Fix not seen in stream +CVE-2023-28746: Fix not seen in stream CVE-2023-28772: Fixed with 4.4.276 CVE-2023-2985: Fix not seen in stream CVE-2023-3006: Fix not seen in stream @@ -1229,7 +1315,7 @@ CVE-2023-4622: Fix not seen in stream CVE-2023-4623: Fix not seen in stream CVE-2023-46343: Fix not seen in stream CVE-2023-46838: Fix not seen in stream -CVE-2023-47233: Fix unknown +CVE-2023-47233: Fix not seen in stream CVE-2023-4881: Fix not seen in stream CVE-2023-4921: Fix not seen in stream CVE-2023-51043: Fix not seen in stream @@ -1241,30 +1327,116 @@ CVE-2023-51782: Fix not seen in stream CVE-2023-52340: Fix not seen in stream CVE-2023-52429: Fix not seen in stream CVE-2023-52434: Fix not seen in stream -CVE-2023-52435: Fix not seen in stream CVE-2023-52436: Fix not seen in stream CVE-2023-52442: Fix not seen in stream CVE-2023-52444: Fix not seen in stream CVE-2023-52445: Fix not seen in stream CVE-2023-52449: Fix not seen in stream CVE-2023-52451: Fix not seen in stream -CVE-2023-52456: Fix not seen in stream -CVE-2023-52457: Fix not seen in stream CVE-2023-52458: Fix not seen in stream +CVE-2023-52469: Fix not seen in stream +CVE-2023-52470: Fix not seen in stream +CVE-2023-52475: Fix not seen in stream +CVE-2023-52476: Fix not seen in stream +CVE-2023-52477: Fix not seen in stream +CVE-2023-52478: Fix not seen in stream +CVE-2023-52479: Fix not seen in stream +CVE-2023-52480: Fix not seen in stream +CVE-2023-52481: Fix not seen in stream +CVE-2023-52482: Fix not seen in stream +CVE-2023-52484: Fix not seen in stream +CVE-2023-52485: Fix not seen in stream +CVE-2023-52486: Fix not seen in stream +CVE-2023-52488: Fix not seen in stream +CVE-2023-52489: Fix not seen in stream +CVE-2023-52498: Fix not seen in stream +CVE-2023-52500: Fix not seen in stream +CVE-2023-52501: Fix not seen in stream +CVE-2023-52502: Fix not seen in stream +CVE-2023-52506: Fix not seen in stream +CVE-2023-52507: Fix not seen in stream +CVE-2023-52508: Fix not seen in stream +CVE-2023-52509: Fix not seen in stream +CVE-2023-52511: Fix not seen in stream +CVE-2023-52515: Fix not seen in stream +CVE-2023-52516: Fix not seen in stream +CVE-2023-52517: Fix not seen in stream +CVE-2023-52519: Fix not seen in stream +CVE-2023-52522: Fix not seen in stream +CVE-2023-52527: Fix not seen in stream +CVE-2023-52528: Fix not seen in stream +CVE-2023-52531: Fix not seen in stream +CVE-2023-52532: Fix not seen in stream +CVE-2023-52559: Fix not seen in stream +CVE-2023-52561: Fix not seen in stream +CVE-2023-52563: Fix not seen in stream +CVE-2023-52565: Fix not seen in stream +CVE-2023-52566: Fix not seen in stream +CVE-2023-52568: Fix not seen in stream +CVE-2023-52569: Fix not seen in stream +CVE-2023-52571: Fix not seen in stream +CVE-2023-52572: Fix not seen in stream +CVE-2023-52574: Fix not seen in stream +CVE-2023-52578: Fix not seen in stream +CVE-2023-52583: Fix not seen in stream +CVE-2023-52584: Fix not seen in stream +CVE-2023-52585: Fix not seen in stream +CVE-2023-52586: Fix not seen in stream +CVE-2023-52587: Fix not seen in stream +CVE-2023-52588: Fix not seen in stream +CVE-2023-52589: Fix not seen in stream +CVE-2023-52590: Fix not seen in stream +CVE-2023-52591: Fix not seen in stream +CVE-2023-52593: Fix not seen in stream +CVE-2023-52594: Fix not seen in stream +CVE-2023-52595: Fix not seen in stream +CVE-2023-52596: Fix not seen in stream +CVE-2023-52597: Fix not seen in stream +CVE-2023-52598: Fix not seen in stream +CVE-2023-52599: Fix not seen in stream +CVE-2023-52600: Fix not seen in stream +CVE-2023-52601: Fix not seen in stream +CVE-2023-52602: Fix not seen in stream +CVE-2023-52603: Fix not seen in stream +CVE-2023-52604: Fix not seen in stream +CVE-2023-52606: Fix not seen in stream +CVE-2023-52607: Fix not seen in stream +CVE-2023-52609: Fix not seen in stream +CVE-2023-52614: Fix not seen in stream +CVE-2023-52615: Fix not seen in stream +CVE-2023-52617: Fix not seen in stream +CVE-2023-52618: Fix not seen in stream +CVE-2023-52619: Fix not seen in stream +CVE-2023-52620: Fix not seen in stream +CVE-2023-52621: Fix not seen in stream +CVE-2023-52622: Fix not seen in stream +CVE-2023-52623: Fix not seen in stream +CVE-2023-52624: Fix not seen in stream +CVE-2023-52625: Fix not seen in stream +CVE-2023-52628: Fix not seen in stream +CVE-2023-52629: Fix not seen in stream +CVE-2023-52632: Fix not seen in stream +CVE-2023-52633: Fix not seen in stream +CVE-2023-52634: Fix not seen in stream +CVE-2023-52635: Fix not seen in stream +CVE-2023-52638: Fix not seen in stream +CVE-2023-52639: Fix not seen in stream +CVE-2023-52640: Fix not seen in stream +CVE-2023-52641: Fix not seen in stream CVE-2023-5717: Fix not seen in stream CVE-2023-6040: Fix not seen in stream CVE-2023-6240: Fix unknown -CVE-2023-6270: Fix unknown -CVE-2023-6356: Fix unknown +CVE-2023-6270: Fix not seen in stream +CVE-2023-6356: Fix not seen in stream CVE-2023-6535: Fix unknown -CVE-2023-6536: Fix unknown +CVE-2023-6536: Fix not seen in stream CVE-2023-6546: Fix not seen in stream CVE-2023-6606: Fix not seen in stream CVE-2023-6610: Fix not seen in stream CVE-2023-6915: Fix not seen in stream CVE-2023-6931: Fix not seen in stream CVE-2023-6932: Fix not seen in stream -CVE-2023-7042: Fix unknown +CVE-2023-7042: Fix not seen in stream CVE-2023-7192: Fix not seen in stream CVE-2024-0340: Fix not seen in stream CVE-2024-0584: Fix not seen in stream @@ -1272,10 +1444,11 @@ CVE-2024-0775: Fix not seen in stream CVE-2024-1086: Fix not seen in stream CVE-2024-1312: Fix not seen in stream CVE-2024-21803: Fix unknown -CVE-2024-22099: Fix unknown +CVE-2024-2193: Fix unknown +CVE-2024-22099: Fix not seen in stream CVE-2024-22386: Fix unknown -CVE-2024-23196: Fix unknown -CVE-2024-23307: Fix unknown +CVE-2024-23196: Fix not seen in stream +CVE-2024-23307: Fix not seen in stream CVE-2024-23848: Fix unknown CVE-2024-23851: Fix not seen in stream CVE-2024-24855: Fix not seen in stream @@ -1283,16 +1456,99 @@ CVE-2024-24857: Fix unknown CVE-2024-24858: Fix unknown CVE-2024-24859: Fix unknown CVE-2024-24860: Fix not seen in stream -CVE-2024-24861: Fix unknown +CVE-2024-24861: Fix not seen in stream CVE-2024-24864: Fix unknown CVE-2024-25739: Fix unknown CVE-2024-25740: Fix unknown CVE-2024-25741: Fix unknown CVE-2024-25744: Fix not seen in stream -CVE-2024-26584: Fix not seen in stream -CVE-2024-26587: Fix not seen in stream -CVE-2024-26588: Fix not seen in stream -CVE-2024-26591: Fix not seen in stream CVE-2024-26592: Fix not seen in stream CVE-2024-26594: Fix not seen in stream CVE-2024-26598: Fix not seen in stream +CVE-2024-26600: Fix not seen in stream +CVE-2024-26606: Fix not seen in stream +CVE-2024-26614: Fix not seen in stream +CVE-2024-26622: Fix not seen in stream +CVE-2024-26623: Fix not seen in stream +CVE-2024-26625: Fix not seen in stream +CVE-2024-26627: Fix not seen in stream +CVE-2024-26633: Fix not seen in stream +CVE-2024-26635: Fix not seen in stream +CVE-2024-26636: Fix not seen in stream +CVE-2024-26642: Fix not seen in stream +CVE-2024-26644: Fix not seen in stream +CVE-2024-26646: Fix not seen in stream +CVE-2024-26647: Fix not seen in stream +CVE-2024-26648: Fix not seen in stream +CVE-2024-26650: Fix not seen in stream +CVE-2024-26651: Fix not seen in stream +CVE-2024-26654: Fix not seen in stream +CVE-2024-26655: Fix not seen in stream +CVE-2024-26656: Fix not seen in stream +CVE-2024-26658: Fix not seen in stream +CVE-2024-26659: Fix not seen in stream +CVE-2024-26664: Fix not seen in stream +CVE-2024-26668: Fix not seen in stream +CVE-2024-26671: Fix not seen in stream +CVE-2024-26672: Fix not seen in stream +CVE-2024-26675: Fix not seen in stream +CVE-2024-26676: Fix not seen in stream +CVE-2024-26677: Fix not seen in stream +CVE-2024-26679: Fix not seen in stream +CVE-2024-26685: Fix not seen in stream +CVE-2024-26686: Fix not seen in stream +CVE-2024-26687: Fix not seen in stream +CVE-2024-26689: Fix not seen in stream +CVE-2024-26691: Fix not seen in stream +CVE-2024-26696: Fix not seen in stream +CVE-2024-26697: Fix not seen in stream +CVE-2024-26699: Fix not seen in stream +CVE-2024-26700: Fix not seen in stream +CVE-2024-26704: Fix not seen in stream +CVE-2024-26706: Fix not seen in stream +CVE-2024-26713: Fix not seen in stream +CVE-2024-26719: Fix not seen in stream +CVE-2024-26720: Fix not seen in stream +CVE-2024-26726: Fix not seen in stream +CVE-2024-26733: Fix not seen in stream +CVE-2024-26738: Fix not seen in stream +CVE-2024-26739: Fix not seen in stream +CVE-2024-26743: Fix not seen in stream +CVE-2024-26744: Fix not seen in stream +CVE-2024-26745: Fix not seen in stream +CVE-2024-26748: Fix not seen in stream +CVE-2024-26752: Fix not seen in stream +CVE-2024-26756: Fix not seen in stream +CVE-2024-26758: Fix not seen in stream +CVE-2024-26759: Fix not seen in stream +CVE-2024-26763: Fix not seen in stream +CVE-2024-26764: Fix not seen in stream +CVE-2024-26765: Fix not seen in stream +CVE-2024-26766: Fix not seen in stream +CVE-2024-26767: Fix not seen in stream +CVE-2024-26768: Fix not seen in stream +CVE-2024-26769: Fix not seen in stream +CVE-2024-26770: Fix not seen in stream +CVE-2024-26771: Fix not seen in stream +CVE-2024-26772: Fix not seen in stream +CVE-2024-26773: Fix not seen in stream +CVE-2024-26774: Fix not seen in stream +CVE-2024-26775: Fix not seen in stream +CVE-2024-26776: Fix not seen in stream +CVE-2024-26777: Fix not seen in stream +CVE-2024-26778: Fix not seen in stream +CVE-2024-26779: Fix not seen in stream +CVE-2024-26784: Fix not seen in stream +CVE-2024-26789: Fix not seen in stream +CVE-2024-26791: Fix not seen in stream +CVE-2024-26793: Fix not seen in stream +CVE-2024-26797: Fix not seen in stream +CVE-2024-26798: Fix not seen in stream +CVE-2024-26801: Fix not seen in stream +CVE-2024-26802: Fix not seen in stream +CVE-2024-26803: Fix not seen in stream +CVE-2024-26804: Fix not seen in stream +CVE-2024-26805: Fix not seen in stream +CVE-2024-26806: Fix not seen in stream +CVE-2024-26808: Fix not seen in stream +CVE-2024-26809: Fix not seen in stream diff --git a/data/4.4/4.4_security.txt b/data/4.4/4.4_security.txt index 0393258fc..be084cec2 100644 --- a/data/4.4/4.4_security.txt +++ b/data/4.4/4.4_security.txt @@ -698,6 +698,7 @@ CVEs fixed in 4.4.177: CVE-2019-16413: f289ac1f6eb2d024793732ddb629595ab85674b7 9p: use inode->i_lock to protect i_size_write() under 32-bit CVE-2019-16995: 453e3b319d28f2023d45073e6eb30c5efa2fd06b net: hsr: fix memory leak in hsr_dev_finalize() CVE-2019-2101: bba078c9fc3c7e44370f870d97c5eed64f6c5d1f media: uvcvideo: Fix 'type' check leading to overflow + CVE-2019-25160: dc18101f95fa6e815f426316b8b9a5cee28a334e netlabel: fix out-of-bounds memory accesses CVE-2019-9213: 40952b6a649b9bfad11ae4fa2862fa0108c9ec24 mm: enforce min addr even if capable() in expand_downwards() CVE-2019-9455: 7b5115689bf9dafc5127b28ace4589f698d4adfa media: videobuf2-v4l2: drop WARN_ON in vb2_warn_zero_bytesused() @@ -1137,11 +1138,15 @@ CVEs fixed in 4.4.267: CVE-2021-22555: b0d98b2193a38ef93c92e5e1953d134d0f426531 netfilter: x_tables: fix compat match/target pad out-of-bound write CVE-2021-3659: cd19d85e6d4a361beb11431af3d22248190f5b48 net: mac802154: Fix general protection fault +CVEs fixed in 4.4.268: + CVE-2021-46904: a462067d7c8e6953a733bf5ade8db947b1bb5449 net: hso: fix null-ptr-deref during tty device unregistration + CVEs fixed in 4.4.269: CVE-2017-0605: 150381302389fa01425396489a21dc7c53383a5b tracing: Use strlcpy() instead of strcpy() in __trace_find_cmdline() CVE-2021-31916: 0c0f93fbd20276d65ae0581edfcdc93579aa1dc7 dm ioctl: fix out of bounds array access when no devices CVE-2021-33034: b27a218d166b7f07cd5616fb90e727b6ed662b1a Bluetooth: verify AMP hci_chan before amp_destroy CVE-2021-4157: 0c5ccd5e2a2e291774618c24c459fa397fd1b7da pNFS/flexfiles: fix incorrect size check in decode_nfs_fh() + CVE-2021-46939: 91ca6f6a91f679c8645d7f3307e03ce86ad518c4 tracing: Restructure trace_clock_global() to never block CVEs fixed in 4.4.270: CVE-2020-26555: 75523bbfb0eaead670c97fbcf096ca2ab556f0c0 Bluetooth: SMP: Fail if remote and local public keys are identical @@ -1157,16 +1162,34 @@ CVEs fixed in 4.4.271: CVE-2021-29650: 9bc6c1246941cf88cf06a27153d6a1108a240067 netfilter: x_tables: Use correct memory barriers. CVE-2021-32399: a7dc1c981038bbd5f7379148d7fd8821d2a7b9ae bluetooth: eliminate the potential race condition when removing the HCI controller CVE-2021-34981: 61a811e8f5229264b822361f8b23d7638fd8c914 Bluetooth: cmtp: fix file refcount when cmtp_attach_device fails + CVE-2021-47142: 0707c3fea8102d211631ba515ef2159707561b0d drm/amdgpu: Fix a use-after-free + CVE-2021-47145: 76bfd8ac20bebeae599452a03dfc5724c0475dcf btrfs: do not BUG_ON in link_to_fixup_dir + CVE-2021-47146: 0e35b7457b7b6e73ffeaaca1a577fdf1af0feca1 mld: fix panic in mld_newpack() + CVE-2021-47149: b92170e209f7746ed72eaac98f2c2f4b9af734e6 net: fujitsu: fix potential null-ptr-deref + CVE-2021-47153: f9469082126cebb7337db3992d143f5e4edfe629 i2c: i801: Don't generate an interrupt on bus reset + CVE-2021-47162: b2c8d28c34b3070407cb1741f9ba3f15d0284b8b tipc: skb_linearize the head skb when reassembling msgs + CVE-2021-47166: e8b8418ce14ae66ee55179901edd12191ab06a9e NFS: Don't corrupt the value of pg_bytes_written in nfs_do_recoalesce() + CVE-2021-47168: 9d280ab53df1d4a1043bd7a9e7c6a2f9cfbfe040 NFS: fix an incorrect limit in filelayout_decode_layout() + CVE-2021-47169: 1e04d5d5fe5e76af68f834e1941fcbfa439653be serial: rp2: use 'request_firmware' instead of 'request_firmware_nowait' + CVE-2021-47171: 200dbfcad8011e50c3cec269ed7b980836eeb1fa net: usb: fix memory leak in smsc75xx_bind + CVE-2021-47173: 5f46b2410db2c8f26b8bb91b40deebf4ec184391 misc/uss720: fix memory leak in uss720_probe + CVE-2021-47180: 448a1cb12977f52142e6feb12022c59662d88dc1 NFC: nci: fix memory leak in nci_allocate_device CVEs fixed in 4.4.272: CVE-2021-3564: 054b0b4f9bf86baac0774e1ea38f4b65497089e5 Bluetooth: fix the erroneous flush_work() order CVE-2021-3573: 2260759b5300865dc209150e925aaeb9df758630 Bluetooth: use correct lock to prevent UAF of hdev object CVE-2021-3587: eb6875d48590d8e564092e831ff07fa384d7e477 nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect CVE-2021-38208: eb6875d48590d8e564092e831ff07fa384d7e477 nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect + CVE-2021-47114: 624fa7baa3788dc9e57840ba5b94bc22b03cda57 ocfs2: fix data corruption by fallocate + CVE-2021-47117: e33bafad30d34cfa5e9787cb099cab05e2677fcb ext4: fix bug on in ext4_es_cache_extent as ext4_split_extent_at failed + CVE-2021-47118: 764c2e892d1fe895392aff62fb353fdce43bb529 pid: take a reference when initializing `cad_pid` + CVE-2021-47121: cc302e30a504e6b60a9ac8df7988646f46cd0294 net: caif: fix memory leak in cfusbl_device_notify + CVE-2021-47122: b042e2b2039565eb8f0eb51c14fbe1ef463c8cd8 net: caif: fix memory leak in caif_device_notify CVEs fixed in 4.4.274: CVE-2021-34693: f638caa211e7a121a5596986d29ebbdaf9156398 can: bcm: fix infoleak in struct bcm_msg_head CVE-2021-45486: 8fb8c138b5d69128964e54e1b5ee49fc395f011c inet: use bigger hash table for IP ID generation + CVE-2021-46906: c5d3c142f2d57d40c55e65d5622d319125a45366 HID: usbhid: fix info leak in hid_submit_ctrl CVEs fixed in 4.4.276: CVE-2021-33909: 3533e50cbee8ff086bfa04176ac42a01ee3db37d seq_file: disallow extremely large seq buffer allocations @@ -1246,8 +1269,14 @@ CVEs fixed in 4.4.296: CVE-2021-28715: 0928efb09178e01d3dc8e8849aa1c807436c3c37 xen/netback: don't queue unlimited number of packages CVEs fixed in 4.4.297: + CVE-2021-47086: 0bbdd62ce9d44f3a22059b3d20a0df977d9f6d59 phonet/pep: refuse to enable an unbound pipe CVE-2022-1195: 371a874ea06f147d6ca30be43dad33683965eba6 hamradio: improve the incomplete fix to avoid NPD +CVEs fixed in 4.4.298: + CVE-2021-46932: d2cb2bf39a6d17ef4bdc0e59c1a35cf5751ad8f4 Input: appletouch - initialize work before device registration + CVE-2021-46933: f976dd7011150244a7ba820f2c331e9fb253befa usb: gadget: f_fs: Clear ffs_eventfd in ffs_data_clear. + CVE-2021-46936: 15579e1301f856ad9385d720c9267c11032a5022 net: fix use-after-free in tw_timer_handler + CVEs fixed in 4.4.299: CVE-2021-4155: 56adcda55aa213e106224ff3d18ef4625e25f52b xfs: map unwritten blocks in XFS_IOC_{ALLOC,FREE}SP just like fallocate CVE-2021-45095: 172b3f506c24a61805b3910b9acfe7159d980b9b phonet: refcount leak in pep_sock_accep @@ -1355,6 +1384,7 @@ Outstanding CVEs: CVE-2019-20908: (unk) efi: Restrict efivar_ssdt_load when the kernel is locked down CVE-2019-2181: (unk) binder: check for overflow when alloc for security context CVE-2019-2213: (unk) binder: fix possible UAF when freeing buffer + CVE-2019-25162: (unk) i2c: Fix a potential use after free CVE-2019-3874: (unk) sctp: implement memory accounting on tx path CVE-2019-5489: (unk) Change mincore() to count "mapped" pages rather than "cached" pages CVE-2019-7308: (unk) bpf: fix sanitation of alu op with pointer / scalar type from different paths @@ -1395,6 +1425,9 @@ Outstanding CVEs: CVE-2020-36322: (unk) fuse: fix bad inode CVE-2020-36385: (unk) RDMA/ucma: Rework ucma_migrate_id() to avoid races with destroy CVE-2020-36691: (unk) netlink: limit recursion depth in policy validation + CVE-2020-36775: (unk) f2fs: fix to avoid potential deadlock + CVE-2020-36780: (unk) i2c: sprd: fix reference leak when pm_runtime_get_sync fails + CVE-2020-36781: (unk) i2c: imx: fix reference leak when pm_runtime_get_sync fails CVE-2020-8832: (unk) drm/i915: Record the default hw state after reset upon load CVE-2021-0399: (unk) CVE-2021-0929: (unk) staging/android/ion: delete dma_buf->kmap/unmap implemenation @@ -1439,6 +1472,59 @@ Outstanding CVEs: CVE-2021-43975: (unk) atlantic: Fix OOB read and write in hw_atl_utils_fw_rpc_wait CVE-2021-44879: (unk) f2fs: fix to do sanity check on inode type during garbage collection CVE-2021-45469: (unk) f2fs: fix to do sanity check on last xattr entry in __f2fs_setxattr() + CVE-2021-46908: (unk) bpf: Use correct permission flag for mixed signed bounds arithmetic + CVE-2021-46924: (unk) NFC: st21nfca: Fix memory leak in device probe and remove + CVE-2021-46926: (unk) ALSA: hda: intel-sdw-acpi: harden detection of controller + CVE-2021-46928: (unk) parisc: Clear stale IIR value on instruction access rights trap + CVE-2021-46950: (unk) md/raid1: properly indicate failure when ending a failed write request + CVE-2021-46951: (unk) tpm: efi: Use local variable for calculating final log size + CVE-2021-46952: (unk) NFS: fs_context: validate UDP retrans to prevent shift out-of-bounds + CVE-2021-46959: (unk) spi: Fix use-after-free with devm_spi_alloc_* + CVE-2021-46962: (unk) mmc: uniphier-sd: Fix a resource leak in the remove function + CVE-2021-46965: (unk) mtd: physmap: physmap-bt1-rom: Fix unintentional stack access + CVE-2021-46969: (unk) bus: mhi: core: Fix invalid error returning in mhi_queue + CVE-2021-46970: (unk) bus: mhi: pci_generic: Remove WQ_MEM_RECLAIM flag from state workqueue + CVE-2021-46982: (unk) f2fs: compress: fix race condition of overwrite vs truncate + CVE-2021-47028: (unk) mt76: mt7915: fix txrate reporting + CVE-2021-47046: (unk) drm/amd/display: Fix off by one in hdmi_14_process_transaction() + CVE-2021-47052: (unk) crypto: sa2ul - Fix memory leak of rxd + CVE-2021-47059: (unk) crypto: sun8i-ss - fix result memory leak on error path + CVE-2021-47065: (unk) rtw88: Fix array overrun in rtw_get_tx_power_params() + CVE-2021-47070: (unk) uio_hv_generic: Fix another memory leak in error handling paths + CVE-2021-47075: (unk) nvmet: fix memory leak in nvmet_alloc_ctrl() + CVE-2021-47076: (unk) RDMA/rxe: Return CQE error if invalid lkey was supplied + CVE-2021-47082: (unk) tun: avoid double free in tun_free_netdev + CVE-2021-47083: (unk) pinctrl: mediatek: fix global-out-of-bounds issue + CVE-2021-47101: (unk) asix: fix uninit-value in asix_mdio_read() + CVE-2021-47103: (unk) inet: fully convert sk->sk_rx_dst to RCU rules + CVE-2021-47110: (unk) x86/kvm: Disable kvmclock on all CPUs on shutdown + CVE-2021-47112: (unk) x86/kvm: Teardown PV features on boot CPU as well + CVE-2021-47113: (unk) btrfs: abort in rename_exchange if we fail to insert the second ref + CVE-2021-47116: (unk) ext4: fix memory leak in ext4_mb_init_backend on error path. + CVE-2021-47119: (unk) ext4: fix memory leak in ext4_fill_super + CVE-2021-47124: (unk) io_uring: fix link timeout refs + CVE-2021-47125: (unk) sch_htb: fix refcount leak in htb_parent_to_leaf_offload + CVE-2021-47128: (unk) bpf, lockdown, audit: Fix buggy SELinux lockdown permission checks + CVE-2021-47131: (unk) net/tls: Fix use-after-free after the TLS device goes down and up + CVE-2021-47133: (unk) HID: amd_sfh: Fix memory leak in amd_sfh_work + CVE-2021-47135: (unk) mt76: mt7921: fix possible AOOB issue in mt7921_mcu_tx_rate_report + CVE-2021-47136: (unk) net: zero-initialize tc skb extension on allocation + CVE-2021-47137: (unk) net: lantiq: fix memory corruption in RX ring + CVE-2021-47140: (unk) iommu/amd: Clear DMA ops when switching domain + CVE-2021-47143: (unk) net/smc: remove device from smcd_dev_list after failed device_add() + CVE-2021-47144: (unk) drm/amd/amdgpu: fix refcount leak + CVE-2021-47147: (unk) ptp: ocp: Fix a resource leak in an error handling path + CVE-2021-47150: (unk) net: fec: fix the potential memory leak in fec_enet_init() + CVE-2021-47151: (unk) interconnect: qcom: bcm-voter: add a missing of_node_put() + CVE-2021-47158: (unk) net: dsa: sja1105: add error handling in sja1105_setup() + CVE-2021-47160: (unk) net: dsa: mt7530: fix VLAN traffic leaks + CVE-2021-47163: (unk) tipc: wait and exit until all work queues are done + CVE-2021-47165: (unk) drm/meson: fix shutdown crash when component not probed + CVE-2021-47167: (unk) NFS: Fix an Oopsable condition in __nfs_pageio_add_request() + CVE-2021-47170: (unk) USB: usbfs: Don't WARN about excessively large memory allocations + CVE-2021-47172: (unk) iio: adc: ad7124: Fix potential overflow due to non sequential channel numbers + CVE-2021-47175: (unk) net/sched: fq_pie: fix OOB access in the traffic path + CVE-2021-47179: (unk) NFSv4: Fix a NULL pointer dereference in pnfs_mark_matching_lsegs_return() CVE-2022-0001: (unk) x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE CVE-2022-0002: (unk) x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE CVE-2022-0168: (unk) cifs: fix NULL ptr dereference in smb2_ioctl_query_info() @@ -1605,6 +1691,9 @@ Outstanding CVEs: CVE-2022-47520: (unk) wifi: wilc1000: validate pairwise and authentication suite offsets CVE-2022-47929: (unk) net: sched: disallow noqueue for qdisc classes CVE-2022-48619: (unk) Input: add bounds checking to input_set_capability() + CVE-2022-48626: (unk) moxart: fix potential use-after-free on remove path + CVE-2022-48627: (unk) vt: fix memory overlapping when deleting chars in the buffer + CVE-2022-48628: (unk) ceph: drop messages from MDS when unmounting CVE-2023-0030: (unk) drm/nouveau/mmu: add more general vmm free/node handling functions CVE-2023-0047: (unk) mm, oom: do not trigger out_of_memory from the #PF CVE-2023-0266: (unk) ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF @@ -1653,6 +1742,7 @@ Outstanding CVEs: CVE-2023-26545: (unk) net: mpls: fix stale pointer if allocation fails during device rename CVE-2023-26607: (unk) ntfs: fix out-of-bounds read in ntfs_attr_find() CVE-2023-28328: (unk) media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer() + CVE-2023-28746: (unk) x86/mmio: Disable KVM mitigation when X86_FEATURE_CLEAR_CPU_BUF is set CVE-2023-2985: (unk) fs: hfsplus: fix UAF issue in hfsplus_put_super CVE-2023-3006: (unk) arm64: Add AMPERE1 to the Spectre-BHB affected list CVE-2023-3022: (unk) ipv6: Use result arg in fib_lookup_arg consistently @@ -1715,7 +1805,7 @@ Outstanding CVEs: CVE-2023-4623: (unk) net/sched: sch_hfsc: Ensure inner classes have fsc curve CVE-2023-46343: (unk) nfc: nci: fix possible NULL pointer dereference in send_acknowledge() CVE-2023-46838: (unk) xen-netback: don't produce zero-size SKB frags - CVE-2023-47233: (unk) + CVE-2023-47233: (unk) wifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach CVE-2023-4881: (unk) netfilter: nftables: exthdr: fix 4-byte stack OOB write CVE-2023-4921: (unk) net: sched: sch_qfq: Fix UAF in qfq_dequeue() CVE-2023-51043: (unk) drm/atomic: Fix potential use-after-free in nonblocking commits @@ -1727,30 +1817,116 @@ Outstanding CVEs: CVE-2023-52340: (unk) ipv6: remove max_size check inline with ipv4 CVE-2023-52429: (unk) dm: limit the number of targets and parameter size area CVE-2023-52434: (unk) smb: client: fix potential OOBs in smb2_parse_contexts() - CVE-2023-52435: (unk) net: prevent mss overflow in skb_segment() CVE-2023-52436: (unk) f2fs: explicitly null-terminate the xattr list CVE-2023-52442: (unk) ksmbd: validate session id and tree id in compound request CVE-2023-52444: (unk) f2fs: fix to avoid dirent corruption CVE-2023-52445: (unk) media: pvrusb2: fix use after free on context disconnection CVE-2023-52449: (unk) mtd: Fix gluebi NULL pointer dereference caused by ftl notifier CVE-2023-52451: (unk) powerpc/pseries/memhp: Fix access beyond end of drmem array - CVE-2023-52456: (unk) serial: imx: fix tx statemachine deadlock - CVE-2023-52457: (unk) serial: 8250: omap: Don't skip resource freeing if pm_runtime_resume_and_get() failed CVE-2023-52458: (unk) block: add check that partition length needs to be aligned with block size + CVE-2023-52469: (unk) drivers/amd/pm: fix a use-after-free in kv_parse_power_table + CVE-2023-52470: (unk) drm/radeon: check the alloc_workqueue return value in radeon_crtc_init() + CVE-2023-52475: (unk) Input: powermate - fix use-after-free in powermate_config_complete + CVE-2023-52476: (unk) perf/x86/lbr: Filter vsyscall addresses + CVE-2023-52477: (unk) usb: hub: Guard against accesses to uninitialized BOS descriptors + CVE-2023-52478: (unk) HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect + CVE-2023-52479: (unk) ksmbd: fix uaf in smb20_oplock_break_ack + CVE-2023-52480: (unk) ksmbd: fix race condition between session lookup and expire + CVE-2023-52481: (unk) arm64: errata: Add Cortex-A520 speculative unprivileged load workaround + CVE-2023-52482: (unk) x86/srso: Add SRSO mitigation for Hygon processors + CVE-2023-52484: (unk) iommu/arm-smmu-v3: Fix soft lockup triggered by arm_smmu_mm_invalidate_range + CVE-2023-52485: (unk) drm/amd/display: Wake DMCUB before sending a command + CVE-2023-52486: (unk) drm: Don't unref the same fb many times by mistake due to deadlock handling + CVE-2023-52488: (unk) serial: sc16is7xx: convert from _raw_ to _noinc_ regmap functions for FIFO + CVE-2023-52489: (unk) mm/sparsemem: fix race in accessing memory_section->usage + CVE-2023-52498: (unk) PM: sleep: Fix possible deadlocks in core system-wide PM code + CVE-2023-52500: (unk) scsi: pm80xx: Avoid leaking tags when processing OPC_INB_SET_CONTROLLER_CONFIG command + CVE-2023-52501: (unk) ring-buffer: Do not attempt to read past "commit" + CVE-2023-52502: (unk) net: nfc: fix races in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn() + CVE-2023-52506: (unk) LoongArch: Set all reserved memblocks on Node#0 at initialization + CVE-2023-52507: (unk) nfc: nci: assert requested protocol is valid + CVE-2023-52508: (unk) nvme-fc: Prevent null pointer dereference in nvme_fc_io_getuuid() + CVE-2023-52509: (unk) ravb: Fix use-after-free issue in ravb_tx_timeout_work() + CVE-2023-52511: (unk) spi: sun6i: reduce DMA RX transfer width to single byte + CVE-2023-52515: (unk) RDMA/srp: Do not call scsi_done() from srp_abort() + CVE-2023-52516: (unk) dma-debug: don't call __dma_entry_alloc_check_leak() under free_entries_lock + CVE-2023-52517: (unk) spi: sun6i: fix race between DMA RX transfer completion and RX FIFO drain + CVE-2023-52519: (unk) HID: intel-ish-hid: ipc: Disable and reenable ACPI GPE bit + CVE-2023-52522: (unk) net: fix possible store tearing in neigh_periodic_work() + CVE-2023-52527: (unk) ipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data() + CVE-2023-52528: (unk) net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg + CVE-2023-52531: (unk) wifi: iwlwifi: mvm: Fix a memory corruption issue + CVE-2023-52532: (unk) net: mana: Fix TX CQE error handling + CVE-2023-52559: (unk) iommu/vt-d: Avoid memory allocation in iommu_suspend() + CVE-2023-52561: (unk) arm64: dts: qcom: sdm845-db845c: Mark cont splash memory region as reserved + CVE-2023-52563: (unk) drm/meson: fix memory leak on ->hpd_notify callback + CVE-2023-52565: (unk) media: uvcvideo: Fix OOB read + CVE-2023-52566: (unk) nilfs2: fix potential use after free in nilfs_gccache_submit_read_data() + CVE-2023-52568: (unk) x86/sgx: Resolves SECS reclaim vs. page fault for EAUG race + CVE-2023-52569: (unk) btrfs: remove BUG() after failure to insert delayed dir index item + CVE-2023-52571: (unk) power: supply: rk817: Fix node refcount leak + CVE-2023-52572: (unk) cifs: Fix UAF in cifs_demultiplex_thread() + CVE-2023-52574: (unk) team: fix null-ptr-deref when team device type is changed + CVE-2023-52578: (unk) net: bridge: use DEV_STATS_INC() + CVE-2023-52583: (unk) ceph: fix deadlock or deadcode of misusing dget() + CVE-2023-52584: (unk) spmi: mediatek: Fix UAF on device remove + CVE-2023-52585: (unk) drm/amdgpu: Fix possible NULL dereference in amdgpu_ras_query_error_status_helper() + CVE-2023-52586: (unk) drm/msm/dpu: Add mutex lock in control vblank irq + CVE-2023-52587: (unk) IB/ipoib: Fix mcast list locking + CVE-2023-52588: (unk) f2fs: fix to tag gcing flag on page during block migration + CVE-2023-52589: (unk) media: rkisp1: Fix IRQ disable race issue + CVE-2023-52590: (unk) ocfs2: Avoid touching renamed directory if parent does not change + CVE-2023-52591: (unk) reiserfs: Avoid touching renamed directory if parent does not change + CVE-2023-52593: (unk) wifi: wfx: fix possible NULL pointer dereference in wfx_set_mfp_ap() + CVE-2023-52594: (unk) wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus() + CVE-2023-52595: (unk) wifi: rt2x00: restart beacon queue when hardware reset + CVE-2023-52596: (unk) sysctl: Fix out of bounds access for empty sysctl registers + CVE-2023-52597: (unk) KVM: s390: fix setting of fpc register + CVE-2023-52598: (unk) s390/ptrace: handle setting of fpc register correctly + CVE-2023-52599: (unk) jfs: fix array-index-out-of-bounds in diNewExt + CVE-2023-52600: (unk) jfs: fix uaf in jfs_evict_inode + CVE-2023-52601: (unk) jfs: fix array-index-out-of-bounds in dbAdjTree + CVE-2023-52602: (unk) jfs: fix slab-out-of-bounds Read in dtSearch + CVE-2023-52603: (unk) UBSAN: array-index-out-of-bounds in dtSplitRoot + CVE-2023-52604: (unk) FS:JFS:UBSAN:array-index-out-of-bounds in dbAdjTree + CVE-2023-52606: (unk) powerpc/lib: Validate size for vector operations + CVE-2023-52607: (unk) powerpc/mm: Fix null-pointer dereference in pgtable_cache_add + CVE-2023-52609: (unk) binder: fix race between mmput() and do_exit() + CVE-2023-52614: (unk) PM / devfreq: Fix buffer overflow in trans_stat_show + CVE-2023-52615: (unk) hwrng: core - Fix page fault dead lock on mmap-ed hwrng + CVE-2023-52617: (unk) PCI: switchtec: Fix stdev_release() crash after surprise hot remove + CVE-2023-52618: (unk) block/rnbd-srv: Check for unlikely string overflow + CVE-2023-52619: (unk) pstore/ram: Fix crash when setting number of cpus to an odd number + CVE-2023-52620: (unk) netfilter: nf_tables: disallow timeout for anonymous sets + CVE-2023-52621: (unk) bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers + CVE-2023-52622: (unk) ext4: avoid online resizing failures due to oversized flex bg + CVE-2023-52623: (unk) SUNRPC: Fix a suspicious RCU usage warning + CVE-2023-52624: (unk) drm/amd/display: Wake DMCUB before executing GPINT commands + CVE-2023-52625: (unk) drm/amd/display: Refactor DMCUB enter/exit idle interface + CVE-2023-52628: (unk) netfilter: nftables: exthdr: fix 4-byte stack OOB write + CVE-2023-52629: (unk) sh: push-switch: Reorder cleanup operations to avoid use-after-free bug + CVE-2023-52632: (unk) drm/amdkfd: Fix lock dependency warning with srcu + CVE-2023-52633: (unk) um: time-travel: fix time corruption + CVE-2023-52634: (unk) drm/amd/display: Fix disable_otg_wa logic + CVE-2023-52635: (unk) PM / devfreq: Synchronize devfreq_monitor_[start/stop] + CVE-2023-52638: (unk) can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock + CVE-2023-52639: (unk) KVM: s390: vsie: fix race during shadow creation + CVE-2023-52640: (unk) fs/ntfs3: Fix oob in ntfs_listxattr + CVE-2023-52641: (unk) fs/ntfs3: Add NULL ptr dereference checking at the end of attr_allocate_frame() CVE-2023-5717: (unk) perf: Disallow mis-matched inherited group reads CVE-2023-6040: (unk) netfilter: nf_tables: Reject tables of unsupported family CVE-2023-6240: (unk) - CVE-2023-6270: (unk) - CVE-2023-6356: (unk) + CVE-2023-6270: (unk) aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts + CVE-2023-6356: (unk) nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length CVE-2023-6535: (unk) - CVE-2023-6536: (unk) + CVE-2023-6536: (unk) nvmet-tcp: fix a crash in nvmet_req_complete() CVE-2023-6546: (unk) tty: n_gsm: fix the UAF caused by race condition in gsm_cleanup_mux CVE-2023-6606: (unk) smb: client: fix OOB in smbCalcSize() CVE-2023-6610: (unk) smb: client: fix potential OOB in smb2_dump_detail() CVE-2023-6915: (unk) ida: Fix crash in ida_free when the bitmap is empty CVE-2023-6931: (unk) perf: Fix perf_event_validate_size() CVE-2023-6932: (unk) ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet - CVE-2023-7042: (unk) + CVE-2023-7042: (unk) wifi: ath10k: fix NULL pointer dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev() CVE-2023-7192: (unk) netfilter: ctnetlink: fix possible refcount leak in ctnetlink_create_conntrack() CVE-2024-0340: (unk) vhost: use kzalloc() instead of kmalloc() followed by memset() CVE-2024-0584: (unk) ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet @@ -1758,10 +1934,11 @@ Outstanding CVEs: CVE-2024-1086: (unk) netfilter: nf_tables: reject QUEUE/DROP verdict parameters CVE-2024-1312: (unk) mm: lock_vma_under_rcu() must check vma->anon_vma under vma lock CVE-2024-21803: (unk) - CVE-2024-22099: (unk) + CVE-2024-2193: (unk) + CVE-2024-22099: (unk) Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security CVE-2024-22386: (unk) - CVE-2024-23196: (unk) - CVE-2024-23307: (unk) + CVE-2024-23196: (unk) ALSA: hda: fix a possible null-pointer dereference due to data race in snd_hdac_regmap_sync() + CVE-2024-23307: (unk) md/raid5: fix atomicity violation in raid5_cache_count CVE-2024-23848: (unk) CVE-2024-23851: (unk) dm: limit the number of targets and parameter size area CVE-2024-24855: (unk) scsi: lpfc: Fix a possible data race in lpfc_unregister_fcf_rescan() @@ -1769,16 +1946,99 @@ Outstanding CVEs: CVE-2024-24858: (unk) CVE-2024-24859: (unk) CVE-2024-24860: (unk) Bluetooth: Fix atomicity violation in {min,max}_key_size_set - CVE-2024-24861: (unk) + CVE-2024-24861: (unk) media: xc4000: Fix atomicity violation in xc4000_get_frequency CVE-2024-24864: (unk) CVE-2024-25739: (unk) CVE-2024-25740: (unk) CVE-2024-25741: (unk) CVE-2024-25744: (unk) x86/coco: Disable 32-bit emulation by default on TDX and SEV - CVE-2024-26584: (unk) net: tls: handle backlogging of crypto requests - CVE-2024-26587: (unk) net: netdevsim: don't try to destroy PHC on VFs - CVE-2024-26588: (unk) LoongArch: BPF: Prevent out-of-bounds memory access - CVE-2024-26591: (unk) bpf: Fix re-attachment branch in bpf_tracing_prog_attach CVE-2024-26592: (unk) ksmbd: fix UAF issue in ksmbd_tcp_new_connection() CVE-2024-26594: (unk) ksmbd: validate mech token in session setup CVE-2024-26598: (unk) KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache + CVE-2024-26600: (unk) phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP + CVE-2024-26606: (unk) binder: signal epoll threads of self-work + CVE-2024-26614: (unk) tcp: make sure init the accept_queue's spinlocks once + CVE-2024-26622: (unk) tomoyo: fix UAF write bug in tomoyo_write_control() + CVE-2024-26623: (unk) pds_core: Prevent race issues involving the adminq + CVE-2024-26625: (unk) llc: call sock_orphan() at release time + CVE-2024-26627: (unk) scsi: core: Move scsi_host_busy() out of host lock for waking up EH handler + CVE-2024-26633: (unk) ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim() + CVE-2024-26635: (unk) llc: Drop support for ETH_P_TR_802_2. + CVE-2024-26636: (unk) llc: make llc_ui_sendmsg() more robust against bonding changes + CVE-2024-26642: (unk) netfilter: nf_tables: disallow anonymous set with timeout flag + CVE-2024-26644: (unk) btrfs: don't abort filesystem when attempting to snapshot deleted subvolume + CVE-2024-26646: (unk) thermal: intel: hfi: Add syscore callbacks for system-wide PM + CVE-2024-26647: (unk) drm/amd/display: Fix late derefrence 'dsc' check in 'link_set_dsc_pps_packet()' + CVE-2024-26648: (unk) drm/amd/display: Fix variable deferencing before NULL check in edp_setup_replay() + CVE-2024-26650: (unk) platform/x86: p2sb: Allow p2sb_bar() calls during PCI device probe + CVE-2024-26651: (unk) sr9800: Add check for usbnet_get_endpoints + CVE-2024-26654: (unk) ALSA: sh: aica: reorder cleanup operations to avoid UAF bugs + CVE-2024-26655: (unk) Fix memory leak in posix_clock_open() + CVE-2024-26656: (unk) drm/amdgpu: fix use-after-free bug + CVE-2024-26658: (unk) bcachefs: grab s_umount only if snapshotting + CVE-2024-26659: (unk) xhci: handle isoc Babble and Buffer Overrun events properly + CVE-2024-26664: (unk) hwmon: (coretemp) Fix out-of-bounds memory access + CVE-2024-26668: (unk) netfilter: nft_limit: reject configurations that cause integer overflow + CVE-2024-26671: (unk) blk-mq: fix IO hang from sbitmap wakeup race + CVE-2024-26672: (unk) drm/amdgpu: Fix variable 'mca_funcs' dereferenced before NULL check in 'amdgpu_mca_smu_get_mca_entry()' + CVE-2024-26675: (unk) ppp_async: limit MRU to 64K + CVE-2024-26676: (unk) af_unix: Call kfree_skb() for dead unix_(sk)->oob_skb in GC. + CVE-2024-26677: (unk) rxrpc: Fix delayed ACKs to not set the reference serial number + CVE-2024-26679: (unk) inet: read sk->sk_family once in inet_recv_error() + CVE-2024-26685: (unk) nilfs2: fix potential bug in end_buffer_async_write + CVE-2024-26686: (unk) fs/proc: do_task_stat: use sig->stats_lock to gather the threads/children stats + CVE-2024-26687: (unk) xen/events: close evtchn after mapping cleanup + CVE-2024-26689: (unk) ceph: prevent use-after-free in encode_cap_msg() + CVE-2024-26691: (unk) KVM: arm64: Fix circular locking dependency + CVE-2024-26696: (unk) nilfs2: fix hang in nilfs_lookup_dirty_data_buffers() + CVE-2024-26697: (unk) nilfs2: fix data corruption in dsync block recovery for small block sizes + CVE-2024-26699: (unk) drm/amd/display: Fix array-index-out-of-bounds in dcn35_clkmgr + CVE-2024-26700: (unk) drm/amd/display: Fix MST Null Ptr for RV + CVE-2024-26704: (unk) ext4: fix double-free of blocks due to wrong extents moved_len + CVE-2024-26706: (unk) parisc: Fix random data corruption from exception handler + CVE-2024-26713: (unk) powerpc/pseries/iommu: Fix iommu initialisation during DLPAR add + CVE-2024-26719: (unk) nouveau: offload fence uevents work to workqueue + CVE-2024-26720: (unk) mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again + CVE-2024-26726: (unk) btrfs: don't drop extent_map for free space inode on write error + CVE-2024-26733: (unk) arp: Prevent overflow in arp_req_get(). + CVE-2024-26738: (unk) powerpc/pseries/iommu: DLPAR add doesn't completely initialize pci_controller + CVE-2024-26739: (unk) net/sched: act_mirred: don't override retval if we already lost the skb + CVE-2024-26743: (unk) RDMA/qedr: Fix qedr_create_user_qp error flow + CVE-2024-26744: (unk) RDMA/srpt: Support specifying the srpt_service_guid parameter + CVE-2024-26745: (unk) powerpc/pseries/iommu: IOMMU table is not initialized for kdump over SR-IOV + CVE-2024-26748: (unk) usb: cdns3: fix memory double free when handle zero packet + CVE-2024-26752: (unk) l2tp: pass correct message length to ip6_append_data + CVE-2024-26756: (unk) md: Don't register sync_thread for reshape directly + CVE-2024-26758: (unk) md: Don't ignore suspended array in md_check_recovery() + CVE-2024-26759: (unk) mm/swap: fix race when skipping swapcache + CVE-2024-26763: (unk) dm-crypt: don't modify the data when using authenticated encryption + CVE-2024-26764: (unk) fs/aio: Restrict kiocb_set_cancel_fn() to I/O submitted via libaio + CVE-2024-26765: (unk) LoongArch: Disable IRQ before init_fn() for nonboot CPUs + CVE-2024-26766: (unk) IB/hfi1: Fix sdma.h tx->num_descs off-by-one error + CVE-2024-26767: (unk) drm/amd/display: fixed integer types and null check locations + CVE-2024-26768: (unk) LoongArch: Change acpi_core_pic[NR_CPUS] to acpi_core_pic[MAX_CORE_PIC] + CVE-2024-26769: (unk) nvmet-fc: avoid deadlock on delete association path + CVE-2024-26770: (unk) HID: nvidia-shield: Add missing null pointer checks to LED initialization + CVE-2024-26771: (unk) dmaengine: ti: edma: Add some null pointer checks to the edma_probe + CVE-2024-26772: (unk) ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal() + CVE-2024-26773: (unk) ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found() + CVE-2024-26774: (unk) ext4: avoid dividing by 0 in mb_update_avg_fragment_size() when block bitmap corrupt + CVE-2024-26775: (unk) aoe: avoid potential deadlock at set_capacity + CVE-2024-26776: (unk) spi: hisi-sfc-v3xx: Return IRQ_NONE if no interrupts were detected + CVE-2024-26777: (unk) fbdev: sis: Error out if pixclock equals zero + CVE-2024-26778: (unk) fbdev: savage: Error out if pixclock equals zero + CVE-2024-26779: (unk) wifi: mac80211: fix race condition on enabling fast-xmit + CVE-2024-26784: (unk) pmdomain: arm: Fix NULL dereference on scmi_perf_domain removal + CVE-2024-26789: (unk) crypto: arm64/neonbs - fix out-of-bounds access on short input + CVE-2024-26791: (unk) btrfs: dev-replace: properly validate device names + CVE-2024-26793: (unk) gtp: fix use-after-free and null-ptr-deref in gtp_newlink() + CVE-2024-26797: (unk) drm/amd/display: Prevent potential buffer overflow in map_hw_resources + CVE-2024-26798: (unk) fbcon: always restore the old font data in fbcon_do_set_font() + CVE-2024-26801: (unk) Bluetooth: Avoid potential use-after-free in hci_error_reset + CVE-2024-26802: (unk) stmmac: Clear variable when destroying workqueue + CVE-2024-26803: (unk) net: veth: clear GRO when clearing XDP even when down + CVE-2024-26804: (unk) net: ip_tunnel: prevent perpetual headroom growth + CVE-2024-26805: (unk) netlink: Fix kernel-infoleak-after-free in __skb_datagram_iter + CVE-2024-26806: (unk) spi: cadence-qspi: remove system-wide suspend helper calls from runtime PM hooks + CVE-2024-26808: (unk) netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain + CVE-2024-26809: (unk) netfilter: nft_set_pipapo: release elements in clone only from destroy path diff --git a/data/4.5/4.5_CVEs.txt b/data/4.5/4.5_CVEs.txt index 5f6d5e623..8f990a307 100644 --- a/data/4.5/4.5_CVEs.txt +++ b/data/4.5/4.5_CVEs.txt @@ -621,6 +621,8 @@ CVE-2019-2101: Fix not seen in stream CVE-2019-2181: Fix not seen in stream CVE-2019-2213: Fix not seen in stream CVE-2019-2215: Fix not seen in stream +CVE-2019-25160: Fix not seen in stream +CVE-2019-25162: Fix not seen in stream CVE-2019-3459: Fix not seen in stream CVE-2019-3460: Fix not seen in stream CVE-2019-3701: Fix not seen in stream @@ -792,6 +794,11 @@ CVE-2020-36516: Fix not seen in stream CVE-2020-36557: Fix not seen in stream CVE-2020-36558: Fix not seen in stream CVE-2020-36691: Fix not seen in stream +CVE-2020-36775: Fix not seen in stream +CVE-2020-36777: Fix not seen in stream +CVE-2020-36780: Fix not seen in stream +CVE-2020-36781: Fix not seen in stream +CVE-2020-36784: Fix not seen in stream CVE-2020-3702: Fix not seen in stream CVE-2020-4788: Fix not seen in stream CVE-2020-8647: Fix not seen in stream @@ -926,6 +933,83 @@ CVE-2021-45469: Fix not seen in stream CVE-2021-45485: Fix not seen in stream CVE-2021-45486: Fix not seen in stream CVE-2021-45868: Fix not seen in stream +CVE-2021-46904: Fix not seen in stream +CVE-2021-46906: Fix not seen in stream +CVE-2021-46908: Fix not seen in stream +CVE-2021-46924: Fix not seen in stream +CVE-2021-46926: Fix not seen in stream +CVE-2021-46928: Fix not seen in stream +CVE-2021-46932: Fix not seen in stream +CVE-2021-46933: Fix not seen in stream +CVE-2021-46936: Fix not seen in stream +CVE-2021-46939: Fix not seen in stream +CVE-2021-46950: Fix not seen in stream +CVE-2021-46951: Fix not seen in stream +CVE-2021-46952: Fix not seen in stream +CVE-2021-46959: Fix not seen in stream +CVE-2021-46962: Fix not seen in stream +CVE-2021-46965: Fix not seen in stream +CVE-2021-46969: Fix not seen in stream +CVE-2021-46970: Fix not seen in stream +CVE-2021-46982: Fix not seen in stream +CVE-2021-47028: Fix not seen in stream +CVE-2021-47046: Fix not seen in stream +CVE-2021-47052: Fix not seen in stream +CVE-2021-47059: Fix not seen in stream +CVE-2021-47065: Fix not seen in stream +CVE-2021-47070: Fix not seen in stream +CVE-2021-47075: Fix not seen in stream +CVE-2021-47076: Fix not seen in stream +CVE-2021-47082: Fix not seen in stream +CVE-2021-47083: Fix not seen in stream +CVE-2021-47086: Fix not seen in stream +CVE-2021-47101: Fix not seen in stream +CVE-2021-47103: Fix not seen in stream +CVE-2021-47110: Fix not seen in stream +CVE-2021-47112: Fix not seen in stream +CVE-2021-47113: Fix not seen in stream +CVE-2021-47114: Fix not seen in stream +CVE-2021-47116: Fix not seen in stream +CVE-2021-47117: Fix not seen in stream +CVE-2021-47118: Fix not seen in stream +CVE-2021-47119: Fix not seen in stream +CVE-2021-47121: Fix not seen in stream +CVE-2021-47122: Fix not seen in stream +CVE-2021-47124: Fix not seen in stream +CVE-2021-47125: Fix not seen in stream +CVE-2021-47128: Fix not seen in stream +CVE-2021-47131: Fix not seen in stream +CVE-2021-47133: Fix not seen in stream +CVE-2021-47135: Fix not seen in stream +CVE-2021-47136: Fix not seen in stream +CVE-2021-47137: Fix not seen in stream +CVE-2021-47140: Fix not seen in stream +CVE-2021-47142: Fix not seen in stream +CVE-2021-47143: Fix not seen in stream +CVE-2021-47144: Fix not seen in stream +CVE-2021-47145: Fix not seen in stream +CVE-2021-47146: Fix not seen in stream +CVE-2021-47147: Fix not seen in stream +CVE-2021-47149: Fix not seen in stream +CVE-2021-47150: Fix not seen in stream +CVE-2021-47151: Fix not seen in stream +CVE-2021-47153: Fix not seen in stream +CVE-2021-47158: Fix not seen in stream +CVE-2021-47160: Fix not seen in stream +CVE-2021-47162: Fix not seen in stream +CVE-2021-47163: Fix not seen in stream +CVE-2021-47165: Fix not seen in stream +CVE-2021-47166: Fix not seen in stream +CVE-2021-47167: Fix not seen in stream +CVE-2021-47168: Fix not seen in stream +CVE-2021-47169: Fix not seen in stream +CVE-2021-47170: Fix not seen in stream +CVE-2021-47171: Fix not seen in stream +CVE-2021-47172: Fix not seen in stream +CVE-2021-47173: Fix not seen in stream +CVE-2021-47175: Fix not seen in stream +CVE-2021-47179: Fix not seen in stream +CVE-2021-47180: Fix not seen in stream CVE-2022-0001: Fix not seen in stream CVE-2022-0002: Fix not seen in stream CVE-2022-0168: Fix not seen in stream @@ -1099,6 +1183,9 @@ CVE-2022-4744: Fix not seen in stream CVE-2022-47520: Fix not seen in stream CVE-2022-47929: Fix not seen in stream CVE-2022-48619: Fix not seen in stream +CVE-2022-48626: Fix not seen in stream +CVE-2022-48627: Fix not seen in stream +CVE-2022-48628: Fix not seen in stream CVE-2023-0030: Fix not seen in stream CVE-2023-0047: Fix not seen in stream CVE-2023-0266: Fix not seen in stream @@ -1148,6 +1235,7 @@ CVE-2023-2513: Fix not seen in stream CVE-2023-26545: Fix not seen in stream CVE-2023-26607: Fix not seen in stream CVE-2023-28328: Fix not seen in stream +CVE-2023-28746: Fix not seen in stream CVE-2023-28772: Fix not seen in stream CVE-2023-2985: Fix not seen in stream CVE-2023-3006: Fix not seen in stream @@ -1212,7 +1300,7 @@ CVE-2023-4622: Fix not seen in stream CVE-2023-4623: Fix not seen in stream CVE-2023-46343: Fix not seen in stream CVE-2023-46838: Fix not seen in stream -CVE-2023-47233: Fix unknown +CVE-2023-47233: Fix not seen in stream CVE-2023-4881: Fix not seen in stream CVE-2023-4921: Fix not seen in stream CVE-2023-51043: Fix not seen in stream @@ -1224,30 +1312,116 @@ CVE-2023-51782: Fix not seen in stream CVE-2023-52340: Fix not seen in stream CVE-2023-52429: Fix not seen in stream CVE-2023-52434: Fix not seen in stream -CVE-2023-52435: Fix not seen in stream CVE-2023-52436: Fix not seen in stream CVE-2023-52442: Fix not seen in stream CVE-2023-52444: Fix not seen in stream CVE-2023-52445: Fix not seen in stream CVE-2023-52449: Fix not seen in stream CVE-2023-52451: Fix not seen in stream -CVE-2023-52456: Fix not seen in stream -CVE-2023-52457: Fix not seen in stream CVE-2023-52458: Fix not seen in stream +CVE-2023-52469: Fix not seen in stream +CVE-2023-52470: Fix not seen in stream +CVE-2023-52475: Fix not seen in stream +CVE-2023-52476: Fix not seen in stream +CVE-2023-52477: Fix not seen in stream +CVE-2023-52478: Fix not seen in stream +CVE-2023-52479: Fix not seen in stream +CVE-2023-52480: Fix not seen in stream +CVE-2023-52481: Fix not seen in stream +CVE-2023-52482: Fix not seen in stream +CVE-2023-52484: Fix not seen in stream +CVE-2023-52485: Fix not seen in stream +CVE-2023-52486: Fix not seen in stream +CVE-2023-52488: Fix not seen in stream +CVE-2023-52489: Fix not seen in stream +CVE-2023-52498: Fix not seen in stream +CVE-2023-52500: Fix not seen in stream +CVE-2023-52501: Fix not seen in stream +CVE-2023-52502: Fix not seen in stream +CVE-2023-52506: Fix not seen in stream +CVE-2023-52507: Fix not seen in stream +CVE-2023-52508: Fix not seen in stream +CVE-2023-52509: Fix not seen in stream +CVE-2023-52511: Fix not seen in stream +CVE-2023-52515: Fix not seen in stream +CVE-2023-52516: Fix not seen in stream +CVE-2023-52517: Fix not seen in stream +CVE-2023-52519: Fix not seen in stream +CVE-2023-52522: Fix not seen in stream +CVE-2023-52527: Fix not seen in stream +CVE-2023-52528: Fix not seen in stream +CVE-2023-52531: Fix not seen in stream +CVE-2023-52532: Fix not seen in stream +CVE-2023-52559: Fix not seen in stream +CVE-2023-52561: Fix not seen in stream +CVE-2023-52563: Fix not seen in stream +CVE-2023-52565: Fix not seen in stream +CVE-2023-52566: Fix not seen in stream +CVE-2023-52568: Fix not seen in stream +CVE-2023-52569: Fix not seen in stream +CVE-2023-52571: Fix not seen in stream +CVE-2023-52572: Fix not seen in stream +CVE-2023-52574: Fix not seen in stream +CVE-2023-52578: Fix not seen in stream +CVE-2023-52583: Fix not seen in stream +CVE-2023-52584: Fix not seen in stream +CVE-2023-52585: Fix not seen in stream +CVE-2023-52586: Fix not seen in stream +CVE-2023-52587: Fix not seen in stream +CVE-2023-52588: Fix not seen in stream +CVE-2023-52589: Fix not seen in stream +CVE-2023-52590: Fix not seen in stream +CVE-2023-52591: Fix not seen in stream +CVE-2023-52593: Fix not seen in stream +CVE-2023-52594: Fix not seen in stream +CVE-2023-52595: Fix not seen in stream +CVE-2023-52596: Fix not seen in stream +CVE-2023-52597: Fix not seen in stream +CVE-2023-52598: Fix not seen in stream +CVE-2023-52599: Fix not seen in stream +CVE-2023-52600: Fix not seen in stream +CVE-2023-52601: Fix not seen in stream +CVE-2023-52602: Fix not seen in stream +CVE-2023-52603: Fix not seen in stream +CVE-2023-52604: Fix not seen in stream +CVE-2023-52606: Fix not seen in stream +CVE-2023-52607: Fix not seen in stream +CVE-2023-52609: Fix not seen in stream +CVE-2023-52614: Fix not seen in stream +CVE-2023-52615: Fix not seen in stream +CVE-2023-52617: Fix not seen in stream +CVE-2023-52618: Fix not seen in stream +CVE-2023-52619: Fix not seen in stream +CVE-2023-52620: Fix not seen in stream +CVE-2023-52621: Fix not seen in stream +CVE-2023-52622: Fix not seen in stream +CVE-2023-52623: Fix not seen in stream +CVE-2023-52624: Fix not seen in stream +CVE-2023-52625: Fix not seen in stream +CVE-2023-52628: Fix not seen in stream +CVE-2023-52629: Fix not seen in stream +CVE-2023-52632: Fix not seen in stream +CVE-2023-52633: Fix not seen in stream +CVE-2023-52634: Fix not seen in stream +CVE-2023-52635: Fix not seen in stream +CVE-2023-52638: Fix not seen in stream +CVE-2023-52639: Fix not seen in stream +CVE-2023-52640: Fix not seen in stream +CVE-2023-52641: Fix not seen in stream CVE-2023-5717: Fix not seen in stream CVE-2023-6040: Fix not seen in stream CVE-2023-6240: Fix unknown -CVE-2023-6270: Fix unknown -CVE-2023-6356: Fix unknown +CVE-2023-6270: Fix not seen in stream +CVE-2023-6356: Fix not seen in stream CVE-2023-6535: Fix unknown -CVE-2023-6536: Fix unknown +CVE-2023-6536: Fix not seen in stream CVE-2023-6546: Fix not seen in stream CVE-2023-6606: Fix not seen in stream CVE-2023-6610: Fix not seen in stream CVE-2023-6915: Fix not seen in stream CVE-2023-6931: Fix not seen in stream CVE-2023-6932: Fix not seen in stream -CVE-2023-7042: Fix unknown +CVE-2023-7042: Fix not seen in stream CVE-2023-7192: Fix not seen in stream CVE-2024-0340: Fix not seen in stream CVE-2024-0584: Fix not seen in stream @@ -1256,10 +1430,11 @@ CVE-2024-0775: Fix not seen in stream CVE-2024-1086: Fix not seen in stream CVE-2024-1312: Fix not seen in stream CVE-2024-21803: Fix unknown -CVE-2024-22099: Fix unknown +CVE-2024-2193: Fix unknown +CVE-2024-22099: Fix not seen in stream CVE-2024-22386: Fix unknown -CVE-2024-23196: Fix unknown -CVE-2024-23307: Fix unknown +CVE-2024-23196: Fix not seen in stream +CVE-2024-23307: Fix not seen in stream CVE-2024-23848: Fix unknown CVE-2024-23851: Fix not seen in stream CVE-2024-24855: Fix not seen in stream @@ -1267,16 +1442,99 @@ CVE-2024-24857: Fix unknown CVE-2024-24858: Fix unknown CVE-2024-24859: Fix unknown CVE-2024-24860: Fix not seen in stream -CVE-2024-24861: Fix unknown +CVE-2024-24861: Fix not seen in stream CVE-2024-24864: Fix unknown CVE-2024-25739: Fix unknown CVE-2024-25740: Fix unknown CVE-2024-25741: Fix unknown CVE-2024-25744: Fix not seen in stream -CVE-2024-26584: Fix not seen in stream -CVE-2024-26587: Fix not seen in stream -CVE-2024-26588: Fix not seen in stream -CVE-2024-26591: Fix not seen in stream CVE-2024-26592: Fix not seen in stream CVE-2024-26594: Fix not seen in stream CVE-2024-26598: Fix not seen in stream +CVE-2024-26600: Fix not seen in stream +CVE-2024-26606: Fix not seen in stream +CVE-2024-26614: Fix not seen in stream +CVE-2024-26622: Fix not seen in stream +CVE-2024-26623: Fix not seen in stream +CVE-2024-26625: Fix not seen in stream +CVE-2024-26627: Fix not seen in stream +CVE-2024-26633: Fix not seen in stream +CVE-2024-26635: Fix not seen in stream +CVE-2024-26636: Fix not seen in stream +CVE-2024-26642: Fix not seen in stream +CVE-2024-26644: Fix not seen in stream +CVE-2024-26646: Fix not seen in stream +CVE-2024-26647: Fix not seen in stream +CVE-2024-26648: Fix not seen in stream +CVE-2024-26650: Fix not seen in stream +CVE-2024-26651: Fix not seen in stream +CVE-2024-26654: Fix not seen in stream +CVE-2024-26655: Fix not seen in stream +CVE-2024-26656: Fix not seen in stream +CVE-2024-26658: Fix not seen in stream +CVE-2024-26659: Fix not seen in stream +CVE-2024-26664: Fix not seen in stream +CVE-2024-26668: Fix not seen in stream +CVE-2024-26671: Fix not seen in stream +CVE-2024-26672: Fix not seen in stream +CVE-2024-26675: Fix not seen in stream +CVE-2024-26676: Fix not seen in stream +CVE-2024-26677: Fix not seen in stream +CVE-2024-26679: Fix not seen in stream +CVE-2024-26685: Fix not seen in stream +CVE-2024-26686: Fix not seen in stream +CVE-2024-26687: Fix not seen in stream +CVE-2024-26689: Fix not seen in stream +CVE-2024-26691: Fix not seen in stream +CVE-2024-26696: Fix not seen in stream +CVE-2024-26697: Fix not seen in stream +CVE-2024-26699: Fix not seen in stream +CVE-2024-26700: Fix not seen in stream +CVE-2024-26704: Fix not seen in stream +CVE-2024-26706: Fix not seen in stream +CVE-2024-26713: Fix not seen in stream +CVE-2024-26719: Fix not seen in stream +CVE-2024-26720: Fix not seen in stream +CVE-2024-26726: Fix not seen in stream +CVE-2024-26733: Fix not seen in stream +CVE-2024-26738: Fix not seen in stream +CVE-2024-26739: Fix not seen in stream +CVE-2024-26743: Fix not seen in stream +CVE-2024-26744: Fix not seen in stream +CVE-2024-26745: Fix not seen in stream +CVE-2024-26748: Fix not seen in stream +CVE-2024-26752: Fix not seen in stream +CVE-2024-26756: Fix not seen in stream +CVE-2024-26758: Fix not seen in stream +CVE-2024-26759: Fix not seen in stream +CVE-2024-26763: Fix not seen in stream +CVE-2024-26764: Fix not seen in stream +CVE-2024-26765: Fix not seen in stream +CVE-2024-26766: Fix not seen in stream +CVE-2024-26767: Fix not seen in stream +CVE-2024-26768: Fix not seen in stream +CVE-2024-26769: Fix not seen in stream +CVE-2024-26770: Fix not seen in stream +CVE-2024-26771: Fix not seen in stream +CVE-2024-26772: Fix not seen in stream +CVE-2024-26773: Fix not seen in stream +CVE-2024-26774: Fix not seen in stream +CVE-2024-26775: Fix not seen in stream +CVE-2024-26776: Fix not seen in stream +CVE-2024-26777: Fix not seen in stream +CVE-2024-26778: Fix not seen in stream +CVE-2024-26779: Fix not seen in stream +CVE-2024-26784: Fix not seen in stream +CVE-2024-26789: Fix not seen in stream +CVE-2024-26791: Fix not seen in stream +CVE-2024-26793: Fix not seen in stream +CVE-2024-26797: Fix not seen in stream +CVE-2024-26798: Fix not seen in stream +CVE-2024-26801: Fix not seen in stream +CVE-2024-26802: Fix not seen in stream +CVE-2024-26803: Fix not seen in stream +CVE-2024-26804: Fix not seen in stream +CVE-2024-26805: Fix not seen in stream +CVE-2024-26806: Fix not seen in stream +CVE-2024-26808: Fix not seen in stream +CVE-2024-26809: Fix not seen in stream diff --git a/data/4.5/4.5_security.txt b/data/4.5/4.5_security.txt index 21b9a7f25..e8a28f14b 100644 --- a/data/4.5/4.5_security.txt +++ b/data/4.5/4.5_security.txt @@ -638,6 +638,8 @@ Outstanding CVEs: CVE-2019-2181: (unk) binder: check for overflow when alloc for security context CVE-2019-2213: (unk) binder: fix possible UAF when freeing buffer CVE-2019-2215: (unk) ANDROID: binder: remove waitqueue when thread exits. + CVE-2019-25160: (unk) netlabel: fix out-of-bounds memory accesses + CVE-2019-25162: (unk) i2c: Fix a potential use after free CVE-2019-3459: (unk) Bluetooth: Verify that l2cap_get_conf_opt provides large enough buffer CVE-2019-3460: (unk) Bluetooth: Check L2CAP option sizes returned from l2cap_get_conf_opt CVE-2019-3701: (unk) can: gw: ensure DLC boundaries after CAN frame modification @@ -808,6 +810,11 @@ Outstanding CVEs: CVE-2020-36557: (unk) vt: vt_ioctl: fix VT_DISALLOCATE freeing in-use virtual console CVE-2020-36558: (unk) vt: vt_ioctl: fix race in VT_RESIZEX CVE-2020-36691: (unk) netlink: limit recursion depth in policy validation + CVE-2020-36775: (unk) f2fs: fix to avoid potential deadlock + CVE-2020-36777: (unk) media: dvbdev: Fix memory leak in dvb_media_device_free() + CVE-2020-36780: (unk) i2c: sprd: fix reference leak when pm_runtime_get_sync fails + CVE-2020-36781: (unk) i2c: imx: fix reference leak when pm_runtime_get_sync fails + CVE-2020-36784: (unk) i2c: cadence: fix reference leak when pm_runtime_get_sync fails CVE-2020-3702: (unk) ath: Use safer key clearing with key cache entries CVE-2020-4788: (unk) powerpc/64s: flush L1D on kernel entry CVE-2020-8647: (unk) vgacon: Fix a UAF in vgacon_invert_region @@ -942,6 +949,83 @@ Outstanding CVEs: CVE-2021-45485: (unk) ipv6: use prandom_u32() for ID generation CVE-2021-45486: (unk) inet: use bigger hash table for IP ID generation CVE-2021-45868: (unk) quota: check block number when reading the block in quota file + CVE-2021-46904: (unk) net: hso: fix null-ptr-deref during tty device unregistration + CVE-2021-46906: (unk) HID: usbhid: fix info leak in hid_submit_ctrl + CVE-2021-46908: (unk) bpf: Use correct permission flag for mixed signed bounds arithmetic + CVE-2021-46924: (unk) NFC: st21nfca: Fix memory leak in device probe and remove + CVE-2021-46926: (unk) ALSA: hda: intel-sdw-acpi: harden detection of controller + CVE-2021-46928: (unk) parisc: Clear stale IIR value on instruction access rights trap + CVE-2021-46932: (unk) Input: appletouch - initialize work before device registration + CVE-2021-46933: (unk) usb: gadget: f_fs: Clear ffs_eventfd in ffs_data_clear. + CVE-2021-46936: (unk) net: fix use-after-free in tw_timer_handler + CVE-2021-46939: (unk) tracing: Restructure trace_clock_global() to never block + CVE-2021-46950: (unk) md/raid1: properly indicate failure when ending a failed write request + CVE-2021-46951: (unk) tpm: efi: Use local variable for calculating final log size + CVE-2021-46952: (unk) NFS: fs_context: validate UDP retrans to prevent shift out-of-bounds + CVE-2021-46959: (unk) spi: Fix use-after-free with devm_spi_alloc_* + CVE-2021-46962: (unk) mmc: uniphier-sd: Fix a resource leak in the remove function + CVE-2021-46965: (unk) mtd: physmap: physmap-bt1-rom: Fix unintentional stack access + CVE-2021-46969: (unk) bus: mhi: core: Fix invalid error returning in mhi_queue + CVE-2021-46970: (unk) bus: mhi: pci_generic: Remove WQ_MEM_RECLAIM flag from state workqueue + CVE-2021-46982: (unk) f2fs: compress: fix race condition of overwrite vs truncate + CVE-2021-47028: (unk) mt76: mt7915: fix txrate reporting + CVE-2021-47046: (unk) drm/amd/display: Fix off by one in hdmi_14_process_transaction() + CVE-2021-47052: (unk) crypto: sa2ul - Fix memory leak of rxd + CVE-2021-47059: (unk) crypto: sun8i-ss - fix result memory leak on error path + CVE-2021-47065: (unk) rtw88: Fix array overrun in rtw_get_tx_power_params() + CVE-2021-47070: (unk) uio_hv_generic: Fix another memory leak in error handling paths + CVE-2021-47075: (unk) nvmet: fix memory leak in nvmet_alloc_ctrl() + CVE-2021-47076: (unk) RDMA/rxe: Return CQE error if invalid lkey was supplied + CVE-2021-47082: (unk) tun: avoid double free in tun_free_netdev + CVE-2021-47083: (unk) pinctrl: mediatek: fix global-out-of-bounds issue + CVE-2021-47086: (unk) phonet/pep: refuse to enable an unbound pipe + CVE-2021-47101: (unk) asix: fix uninit-value in asix_mdio_read() + CVE-2021-47103: (unk) inet: fully convert sk->sk_rx_dst to RCU rules + CVE-2021-47110: (unk) x86/kvm: Disable kvmclock on all CPUs on shutdown + CVE-2021-47112: (unk) x86/kvm: Teardown PV features on boot CPU as well + CVE-2021-47113: (unk) btrfs: abort in rename_exchange if we fail to insert the second ref + CVE-2021-47114: (unk) ocfs2: fix data corruption by fallocate + CVE-2021-47116: (unk) ext4: fix memory leak in ext4_mb_init_backend on error path. + CVE-2021-47117: (unk) ext4: fix bug on in ext4_es_cache_extent as ext4_split_extent_at failed + CVE-2021-47118: (unk) pid: take a reference when initializing `cad_pid` + CVE-2021-47119: (unk) ext4: fix memory leak in ext4_fill_super + CVE-2021-47121: (unk) net: caif: fix memory leak in cfusbl_device_notify + CVE-2021-47122: (unk) net: caif: fix memory leak in caif_device_notify + CVE-2021-47124: (unk) io_uring: fix link timeout refs + CVE-2021-47125: (unk) sch_htb: fix refcount leak in htb_parent_to_leaf_offload + CVE-2021-47128: (unk) bpf, lockdown, audit: Fix buggy SELinux lockdown permission checks + CVE-2021-47131: (unk) net/tls: Fix use-after-free after the TLS device goes down and up + CVE-2021-47133: (unk) HID: amd_sfh: Fix memory leak in amd_sfh_work + CVE-2021-47135: (unk) mt76: mt7921: fix possible AOOB issue in mt7921_mcu_tx_rate_report + CVE-2021-47136: (unk) net: zero-initialize tc skb extension on allocation + CVE-2021-47137: (unk) net: lantiq: fix memory corruption in RX ring + CVE-2021-47140: (unk) iommu/amd: Clear DMA ops when switching domain + CVE-2021-47142: (unk) drm/amdgpu: Fix a use-after-free + CVE-2021-47143: (unk) net/smc: remove device from smcd_dev_list after failed device_add() + CVE-2021-47144: (unk) drm/amd/amdgpu: fix refcount leak + CVE-2021-47145: (unk) btrfs: do not BUG_ON in link_to_fixup_dir + CVE-2021-47146: (unk) mld: fix panic in mld_newpack() + CVE-2021-47147: (unk) ptp: ocp: Fix a resource leak in an error handling path + CVE-2021-47149: (unk) net: fujitsu: fix potential null-ptr-deref + CVE-2021-47150: (unk) net: fec: fix the potential memory leak in fec_enet_init() + CVE-2021-47151: (unk) interconnect: qcom: bcm-voter: add a missing of_node_put() + CVE-2021-47153: (unk) i2c: i801: Don't generate an interrupt on bus reset + CVE-2021-47158: (unk) net: dsa: sja1105: add error handling in sja1105_setup() + CVE-2021-47160: (unk) net: dsa: mt7530: fix VLAN traffic leaks + CVE-2021-47162: (unk) tipc: skb_linearize the head skb when reassembling msgs + CVE-2021-47163: (unk) tipc: wait and exit until all work queues are done + CVE-2021-47165: (unk) drm/meson: fix shutdown crash when component not probed + CVE-2021-47166: (unk) NFS: Don't corrupt the value of pg_bytes_written in nfs_do_recoalesce() + CVE-2021-47167: (unk) NFS: Fix an Oopsable condition in __nfs_pageio_add_request() + CVE-2021-47168: (unk) NFS: fix an incorrect limit in filelayout_decode_layout() + CVE-2021-47169: (unk) serial: rp2: use 'request_firmware' instead of 'request_firmware_nowait' + CVE-2021-47170: (unk) USB: usbfs: Don't WARN about excessively large memory allocations + CVE-2021-47171: (unk) net: usb: fix memory leak in smsc75xx_bind + CVE-2021-47172: (unk) iio: adc: ad7124: Fix potential overflow due to non sequential channel numbers + CVE-2021-47173: (unk) misc/uss720: fix memory leak in uss720_probe + CVE-2021-47175: (unk) net/sched: fq_pie: fix OOB access in the traffic path + CVE-2021-47179: (unk) NFSv4: Fix a NULL pointer dereference in pnfs_mark_matching_lsegs_return() + CVE-2021-47180: (unk) NFC: nci: fix memory leak in nci_allocate_device CVE-2022-0001: (unk) x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE CVE-2022-0002: (unk) x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE CVE-2022-0168: (unk) cifs: fix NULL ptr dereference in smb2_ioctl_query_info() @@ -1115,6 +1199,9 @@ Outstanding CVEs: CVE-2022-47520: (unk) wifi: wilc1000: validate pairwise and authentication suite offsets CVE-2022-47929: (unk) net: sched: disallow noqueue for qdisc classes CVE-2022-48619: (unk) Input: add bounds checking to input_set_capability() + CVE-2022-48626: (unk) moxart: fix potential use-after-free on remove path + CVE-2022-48627: (unk) vt: fix memory overlapping when deleting chars in the buffer + CVE-2022-48628: (unk) ceph: drop messages from MDS when unmounting CVE-2023-0030: (unk) drm/nouveau/mmu: add more general vmm free/node handling functions CVE-2023-0047: (unk) mm, oom: do not trigger out_of_memory from the #PF CVE-2023-0266: (unk) ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF @@ -1164,6 +1251,7 @@ Outstanding CVEs: CVE-2023-26545: (unk) net: mpls: fix stale pointer if allocation fails during device rename CVE-2023-26607: (unk) ntfs: fix out-of-bounds read in ntfs_attr_find() CVE-2023-28328: (unk) media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer() + CVE-2023-28746: (unk) x86/mmio: Disable KVM mitigation when X86_FEATURE_CLEAR_CPU_BUF is set CVE-2023-28772: (unk) seq_buf: Fix overflow in seq_buf_putmem_hex() CVE-2023-2985: (unk) fs: hfsplus: fix UAF issue in hfsplus_put_super CVE-2023-3006: (unk) arm64: Add AMPERE1 to the Spectre-BHB affected list @@ -1228,7 +1316,7 @@ Outstanding CVEs: CVE-2023-4623: (unk) net/sched: sch_hfsc: Ensure inner classes have fsc curve CVE-2023-46343: (unk) nfc: nci: fix possible NULL pointer dereference in send_acknowledge() CVE-2023-46838: (unk) xen-netback: don't produce zero-size SKB frags - CVE-2023-47233: (unk) + CVE-2023-47233: (unk) wifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach CVE-2023-4881: (unk) netfilter: nftables: exthdr: fix 4-byte stack OOB write CVE-2023-4921: (unk) net: sched: sch_qfq: Fix UAF in qfq_dequeue() CVE-2023-51043: (unk) drm/atomic: Fix potential use-after-free in nonblocking commits @@ -1240,30 +1328,116 @@ Outstanding CVEs: CVE-2023-52340: (unk) ipv6: remove max_size check inline with ipv4 CVE-2023-52429: (unk) dm: limit the number of targets and parameter size area CVE-2023-52434: (unk) smb: client: fix potential OOBs in smb2_parse_contexts() - CVE-2023-52435: (unk) net: prevent mss overflow in skb_segment() CVE-2023-52436: (unk) f2fs: explicitly null-terminate the xattr list CVE-2023-52442: (unk) ksmbd: validate session id and tree id in compound request CVE-2023-52444: (unk) f2fs: fix to avoid dirent corruption CVE-2023-52445: (unk) media: pvrusb2: fix use after free on context disconnection CVE-2023-52449: (unk) mtd: Fix gluebi NULL pointer dereference caused by ftl notifier CVE-2023-52451: (unk) powerpc/pseries/memhp: Fix access beyond end of drmem array - CVE-2023-52456: (unk) serial: imx: fix tx statemachine deadlock - CVE-2023-52457: (unk) serial: 8250: omap: Don't skip resource freeing if pm_runtime_resume_and_get() failed CVE-2023-52458: (unk) block: add check that partition length needs to be aligned with block size + CVE-2023-52469: (unk) drivers/amd/pm: fix a use-after-free in kv_parse_power_table + CVE-2023-52470: (unk) drm/radeon: check the alloc_workqueue return value in radeon_crtc_init() + CVE-2023-52475: (unk) Input: powermate - fix use-after-free in powermate_config_complete + CVE-2023-52476: (unk) perf/x86/lbr: Filter vsyscall addresses + CVE-2023-52477: (unk) usb: hub: Guard against accesses to uninitialized BOS descriptors + CVE-2023-52478: (unk) HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect + CVE-2023-52479: (unk) ksmbd: fix uaf in smb20_oplock_break_ack + CVE-2023-52480: (unk) ksmbd: fix race condition between session lookup and expire + CVE-2023-52481: (unk) arm64: errata: Add Cortex-A520 speculative unprivileged load workaround + CVE-2023-52482: (unk) x86/srso: Add SRSO mitigation for Hygon processors + CVE-2023-52484: (unk) iommu/arm-smmu-v3: Fix soft lockup triggered by arm_smmu_mm_invalidate_range + CVE-2023-52485: (unk) drm/amd/display: Wake DMCUB before sending a command + CVE-2023-52486: (unk) drm: Don't unref the same fb many times by mistake due to deadlock handling + CVE-2023-52488: (unk) serial: sc16is7xx: convert from _raw_ to _noinc_ regmap functions for FIFO + CVE-2023-52489: (unk) mm/sparsemem: fix race in accessing memory_section->usage + CVE-2023-52498: (unk) PM: sleep: Fix possible deadlocks in core system-wide PM code + CVE-2023-52500: (unk) scsi: pm80xx: Avoid leaking tags when processing OPC_INB_SET_CONTROLLER_CONFIG command + CVE-2023-52501: (unk) ring-buffer: Do not attempt to read past "commit" + CVE-2023-52502: (unk) net: nfc: fix races in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn() + CVE-2023-52506: (unk) LoongArch: Set all reserved memblocks on Node#0 at initialization + CVE-2023-52507: (unk) nfc: nci: assert requested protocol is valid + CVE-2023-52508: (unk) nvme-fc: Prevent null pointer dereference in nvme_fc_io_getuuid() + CVE-2023-52509: (unk) ravb: Fix use-after-free issue in ravb_tx_timeout_work() + CVE-2023-52511: (unk) spi: sun6i: reduce DMA RX transfer width to single byte + CVE-2023-52515: (unk) RDMA/srp: Do not call scsi_done() from srp_abort() + CVE-2023-52516: (unk) dma-debug: don't call __dma_entry_alloc_check_leak() under free_entries_lock + CVE-2023-52517: (unk) spi: sun6i: fix race between DMA RX transfer completion and RX FIFO drain + CVE-2023-52519: (unk) HID: intel-ish-hid: ipc: Disable and reenable ACPI GPE bit + CVE-2023-52522: (unk) net: fix possible store tearing in neigh_periodic_work() + CVE-2023-52527: (unk) ipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data() + CVE-2023-52528: (unk) net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg + CVE-2023-52531: (unk) wifi: iwlwifi: mvm: Fix a memory corruption issue + CVE-2023-52532: (unk) net: mana: Fix TX CQE error handling + CVE-2023-52559: (unk) iommu/vt-d: Avoid memory allocation in iommu_suspend() + CVE-2023-52561: (unk) arm64: dts: qcom: sdm845-db845c: Mark cont splash memory region as reserved + CVE-2023-52563: (unk) drm/meson: fix memory leak on ->hpd_notify callback + CVE-2023-52565: (unk) media: uvcvideo: Fix OOB read + CVE-2023-52566: (unk) nilfs2: fix potential use after free in nilfs_gccache_submit_read_data() + CVE-2023-52568: (unk) x86/sgx: Resolves SECS reclaim vs. page fault for EAUG race + CVE-2023-52569: (unk) btrfs: remove BUG() after failure to insert delayed dir index item + CVE-2023-52571: (unk) power: supply: rk817: Fix node refcount leak + CVE-2023-52572: (unk) cifs: Fix UAF in cifs_demultiplex_thread() + CVE-2023-52574: (unk) team: fix null-ptr-deref when team device type is changed + CVE-2023-52578: (unk) net: bridge: use DEV_STATS_INC() + CVE-2023-52583: (unk) ceph: fix deadlock or deadcode of misusing dget() + CVE-2023-52584: (unk) spmi: mediatek: Fix UAF on device remove + CVE-2023-52585: (unk) drm/amdgpu: Fix possible NULL dereference in amdgpu_ras_query_error_status_helper() + CVE-2023-52586: (unk) drm/msm/dpu: Add mutex lock in control vblank irq + CVE-2023-52587: (unk) IB/ipoib: Fix mcast list locking + CVE-2023-52588: (unk) f2fs: fix to tag gcing flag on page during block migration + CVE-2023-52589: (unk) media: rkisp1: Fix IRQ disable race issue + CVE-2023-52590: (unk) ocfs2: Avoid touching renamed directory if parent does not change + CVE-2023-52591: (unk) reiserfs: Avoid touching renamed directory if parent does not change + CVE-2023-52593: (unk) wifi: wfx: fix possible NULL pointer dereference in wfx_set_mfp_ap() + CVE-2023-52594: (unk) wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus() + CVE-2023-52595: (unk) wifi: rt2x00: restart beacon queue when hardware reset + CVE-2023-52596: (unk) sysctl: Fix out of bounds access for empty sysctl registers + CVE-2023-52597: (unk) KVM: s390: fix setting of fpc register + CVE-2023-52598: (unk) s390/ptrace: handle setting of fpc register correctly + CVE-2023-52599: (unk) jfs: fix array-index-out-of-bounds in diNewExt + CVE-2023-52600: (unk) jfs: fix uaf in jfs_evict_inode + CVE-2023-52601: (unk) jfs: fix array-index-out-of-bounds in dbAdjTree + CVE-2023-52602: (unk) jfs: fix slab-out-of-bounds Read in dtSearch + CVE-2023-52603: (unk) UBSAN: array-index-out-of-bounds in dtSplitRoot + CVE-2023-52604: (unk) FS:JFS:UBSAN:array-index-out-of-bounds in dbAdjTree + CVE-2023-52606: (unk) powerpc/lib: Validate size for vector operations + CVE-2023-52607: (unk) powerpc/mm: Fix null-pointer dereference in pgtable_cache_add + CVE-2023-52609: (unk) binder: fix race between mmput() and do_exit() + CVE-2023-52614: (unk) PM / devfreq: Fix buffer overflow in trans_stat_show + CVE-2023-52615: (unk) hwrng: core - Fix page fault dead lock on mmap-ed hwrng + CVE-2023-52617: (unk) PCI: switchtec: Fix stdev_release() crash after surprise hot remove + CVE-2023-52618: (unk) block/rnbd-srv: Check for unlikely string overflow + CVE-2023-52619: (unk) pstore/ram: Fix crash when setting number of cpus to an odd number + CVE-2023-52620: (unk) netfilter: nf_tables: disallow timeout for anonymous sets + CVE-2023-52621: (unk) bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers + CVE-2023-52622: (unk) ext4: avoid online resizing failures due to oversized flex bg + CVE-2023-52623: (unk) SUNRPC: Fix a suspicious RCU usage warning + CVE-2023-52624: (unk) drm/amd/display: Wake DMCUB before executing GPINT commands + CVE-2023-52625: (unk) drm/amd/display: Refactor DMCUB enter/exit idle interface + CVE-2023-52628: (unk) netfilter: nftables: exthdr: fix 4-byte stack OOB write + CVE-2023-52629: (unk) sh: push-switch: Reorder cleanup operations to avoid use-after-free bug + CVE-2023-52632: (unk) drm/amdkfd: Fix lock dependency warning with srcu + CVE-2023-52633: (unk) um: time-travel: fix time corruption + CVE-2023-52634: (unk) drm/amd/display: Fix disable_otg_wa logic + CVE-2023-52635: (unk) PM / devfreq: Synchronize devfreq_monitor_[start/stop] + CVE-2023-52638: (unk) can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock + CVE-2023-52639: (unk) KVM: s390: vsie: fix race during shadow creation + CVE-2023-52640: (unk) fs/ntfs3: Fix oob in ntfs_listxattr + CVE-2023-52641: (unk) fs/ntfs3: Add NULL ptr dereference checking at the end of attr_allocate_frame() CVE-2023-5717: (unk) perf: Disallow mis-matched inherited group reads CVE-2023-6040: (unk) netfilter: nf_tables: Reject tables of unsupported family CVE-2023-6240: (unk) - CVE-2023-6270: (unk) - CVE-2023-6356: (unk) + CVE-2023-6270: (unk) aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts + CVE-2023-6356: (unk) nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length CVE-2023-6535: (unk) - CVE-2023-6536: (unk) + CVE-2023-6536: (unk) nvmet-tcp: fix a crash in nvmet_req_complete() CVE-2023-6546: (unk) tty: n_gsm: fix the UAF caused by race condition in gsm_cleanup_mux CVE-2023-6606: (unk) smb: client: fix OOB in smbCalcSize() CVE-2023-6610: (unk) smb: client: fix potential OOB in smb2_dump_detail() CVE-2023-6915: (unk) ida: Fix crash in ida_free when the bitmap is empty CVE-2023-6931: (unk) perf: Fix perf_event_validate_size() CVE-2023-6932: (unk) ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet - CVE-2023-7042: (unk) + CVE-2023-7042: (unk) wifi: ath10k: fix NULL pointer dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev() CVE-2023-7192: (unk) netfilter: ctnetlink: fix possible refcount leak in ctnetlink_create_conntrack() CVE-2024-0340: (unk) vhost: use kzalloc() instead of kmalloc() followed by memset() CVE-2024-0584: (unk) ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet @@ -1272,10 +1446,11 @@ Outstanding CVEs: CVE-2024-1086: (unk) netfilter: nf_tables: reject QUEUE/DROP verdict parameters CVE-2024-1312: (unk) mm: lock_vma_under_rcu() must check vma->anon_vma under vma lock CVE-2024-21803: (unk) - CVE-2024-22099: (unk) + CVE-2024-2193: (unk) + CVE-2024-22099: (unk) Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security CVE-2024-22386: (unk) - CVE-2024-23196: (unk) - CVE-2024-23307: (unk) + CVE-2024-23196: (unk) ALSA: hda: fix a possible null-pointer dereference due to data race in snd_hdac_regmap_sync() + CVE-2024-23307: (unk) md/raid5: fix atomicity violation in raid5_cache_count CVE-2024-23848: (unk) CVE-2024-23851: (unk) dm: limit the number of targets and parameter size area CVE-2024-24855: (unk) scsi: lpfc: Fix a possible data race in lpfc_unregister_fcf_rescan() @@ -1283,16 +1458,99 @@ Outstanding CVEs: CVE-2024-24858: (unk) CVE-2024-24859: (unk) CVE-2024-24860: (unk) Bluetooth: Fix atomicity violation in {min,max}_key_size_set - CVE-2024-24861: (unk) + CVE-2024-24861: (unk) media: xc4000: Fix atomicity violation in xc4000_get_frequency CVE-2024-24864: (unk) CVE-2024-25739: (unk) CVE-2024-25740: (unk) CVE-2024-25741: (unk) CVE-2024-25744: (unk) x86/coco: Disable 32-bit emulation by default on TDX and SEV - CVE-2024-26584: (unk) net: tls: handle backlogging of crypto requests - CVE-2024-26587: (unk) net: netdevsim: don't try to destroy PHC on VFs - CVE-2024-26588: (unk) LoongArch: BPF: Prevent out-of-bounds memory access - CVE-2024-26591: (unk) bpf: Fix re-attachment branch in bpf_tracing_prog_attach CVE-2024-26592: (unk) ksmbd: fix UAF issue in ksmbd_tcp_new_connection() CVE-2024-26594: (unk) ksmbd: validate mech token in session setup CVE-2024-26598: (unk) KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache + CVE-2024-26600: (unk) phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP + CVE-2024-26606: (unk) binder: signal epoll threads of self-work + CVE-2024-26614: (unk) tcp: make sure init the accept_queue's spinlocks once + CVE-2024-26622: (unk) tomoyo: fix UAF write bug in tomoyo_write_control() + CVE-2024-26623: (unk) pds_core: Prevent race issues involving the adminq + CVE-2024-26625: (unk) llc: call sock_orphan() at release time + CVE-2024-26627: (unk) scsi: core: Move scsi_host_busy() out of host lock for waking up EH handler + CVE-2024-26633: (unk) ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim() + CVE-2024-26635: (unk) llc: Drop support for ETH_P_TR_802_2. + CVE-2024-26636: (unk) llc: make llc_ui_sendmsg() more robust against bonding changes + CVE-2024-26642: (unk) netfilter: nf_tables: disallow anonymous set with timeout flag + CVE-2024-26644: (unk) btrfs: don't abort filesystem when attempting to snapshot deleted subvolume + CVE-2024-26646: (unk) thermal: intel: hfi: Add syscore callbacks for system-wide PM + CVE-2024-26647: (unk) drm/amd/display: Fix late derefrence 'dsc' check in 'link_set_dsc_pps_packet()' + CVE-2024-26648: (unk) drm/amd/display: Fix variable deferencing before NULL check in edp_setup_replay() + CVE-2024-26650: (unk) platform/x86: p2sb: Allow p2sb_bar() calls during PCI device probe + CVE-2024-26651: (unk) sr9800: Add check for usbnet_get_endpoints + CVE-2024-26654: (unk) ALSA: sh: aica: reorder cleanup operations to avoid UAF bugs + CVE-2024-26655: (unk) Fix memory leak in posix_clock_open() + CVE-2024-26656: (unk) drm/amdgpu: fix use-after-free bug + CVE-2024-26658: (unk) bcachefs: grab s_umount only if snapshotting + CVE-2024-26659: (unk) xhci: handle isoc Babble and Buffer Overrun events properly + CVE-2024-26664: (unk) hwmon: (coretemp) Fix out-of-bounds memory access + CVE-2024-26668: (unk) netfilter: nft_limit: reject configurations that cause integer overflow + CVE-2024-26671: (unk) blk-mq: fix IO hang from sbitmap wakeup race + CVE-2024-26672: (unk) drm/amdgpu: Fix variable 'mca_funcs' dereferenced before NULL check in 'amdgpu_mca_smu_get_mca_entry()' + CVE-2024-26675: (unk) ppp_async: limit MRU to 64K + CVE-2024-26676: (unk) af_unix: Call kfree_skb() for dead unix_(sk)->oob_skb in GC. + CVE-2024-26677: (unk) rxrpc: Fix delayed ACKs to not set the reference serial number + CVE-2024-26679: (unk) inet: read sk->sk_family once in inet_recv_error() + CVE-2024-26685: (unk) nilfs2: fix potential bug in end_buffer_async_write + CVE-2024-26686: (unk) fs/proc: do_task_stat: use sig->stats_lock to gather the threads/children stats + CVE-2024-26687: (unk) xen/events: close evtchn after mapping cleanup + CVE-2024-26689: (unk) ceph: prevent use-after-free in encode_cap_msg() + CVE-2024-26691: (unk) KVM: arm64: Fix circular locking dependency + CVE-2024-26696: (unk) nilfs2: fix hang in nilfs_lookup_dirty_data_buffers() + CVE-2024-26697: (unk) nilfs2: fix data corruption in dsync block recovery for small block sizes + CVE-2024-26699: (unk) drm/amd/display: Fix array-index-out-of-bounds in dcn35_clkmgr + CVE-2024-26700: (unk) drm/amd/display: Fix MST Null Ptr for RV + CVE-2024-26704: (unk) ext4: fix double-free of blocks due to wrong extents moved_len + CVE-2024-26706: (unk) parisc: Fix random data corruption from exception handler + CVE-2024-26713: (unk) powerpc/pseries/iommu: Fix iommu initialisation during DLPAR add + CVE-2024-26719: (unk) nouveau: offload fence uevents work to workqueue + CVE-2024-26720: (unk) mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again + CVE-2024-26726: (unk) btrfs: don't drop extent_map for free space inode on write error + CVE-2024-26733: (unk) arp: Prevent overflow in arp_req_get(). + CVE-2024-26738: (unk) powerpc/pseries/iommu: DLPAR add doesn't completely initialize pci_controller + CVE-2024-26739: (unk) net/sched: act_mirred: don't override retval if we already lost the skb + CVE-2024-26743: (unk) RDMA/qedr: Fix qedr_create_user_qp error flow + CVE-2024-26744: (unk) RDMA/srpt: Support specifying the srpt_service_guid parameter + CVE-2024-26745: (unk) powerpc/pseries/iommu: IOMMU table is not initialized for kdump over SR-IOV + CVE-2024-26748: (unk) usb: cdns3: fix memory double free when handle zero packet + CVE-2024-26752: (unk) l2tp: pass correct message length to ip6_append_data + CVE-2024-26756: (unk) md: Don't register sync_thread for reshape directly + CVE-2024-26758: (unk) md: Don't ignore suspended array in md_check_recovery() + CVE-2024-26759: (unk) mm/swap: fix race when skipping swapcache + CVE-2024-26763: (unk) dm-crypt: don't modify the data when using authenticated encryption + CVE-2024-26764: (unk) fs/aio: Restrict kiocb_set_cancel_fn() to I/O submitted via libaio + CVE-2024-26765: (unk) LoongArch: Disable IRQ before init_fn() for nonboot CPUs + CVE-2024-26766: (unk) IB/hfi1: Fix sdma.h tx->num_descs off-by-one error + CVE-2024-26767: (unk) drm/amd/display: fixed integer types and null check locations + CVE-2024-26768: (unk) LoongArch: Change acpi_core_pic[NR_CPUS] to acpi_core_pic[MAX_CORE_PIC] + CVE-2024-26769: (unk) nvmet-fc: avoid deadlock on delete association path + CVE-2024-26770: (unk) HID: nvidia-shield: Add missing null pointer checks to LED initialization + CVE-2024-26771: (unk) dmaengine: ti: edma: Add some null pointer checks to the edma_probe + CVE-2024-26772: (unk) ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal() + CVE-2024-26773: (unk) ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found() + CVE-2024-26774: (unk) ext4: avoid dividing by 0 in mb_update_avg_fragment_size() when block bitmap corrupt + CVE-2024-26775: (unk) aoe: avoid potential deadlock at set_capacity + CVE-2024-26776: (unk) spi: hisi-sfc-v3xx: Return IRQ_NONE if no interrupts were detected + CVE-2024-26777: (unk) fbdev: sis: Error out if pixclock equals zero + CVE-2024-26778: (unk) fbdev: savage: Error out if pixclock equals zero + CVE-2024-26779: (unk) wifi: mac80211: fix race condition on enabling fast-xmit + CVE-2024-26784: (unk) pmdomain: arm: Fix NULL dereference on scmi_perf_domain removal + CVE-2024-26789: (unk) crypto: arm64/neonbs - fix out-of-bounds access on short input + CVE-2024-26791: (unk) btrfs: dev-replace: properly validate device names + CVE-2024-26793: (unk) gtp: fix use-after-free and null-ptr-deref in gtp_newlink() + CVE-2024-26797: (unk) drm/amd/display: Prevent potential buffer overflow in map_hw_resources + CVE-2024-26798: (unk) fbcon: always restore the old font data in fbcon_do_set_font() + CVE-2024-26801: (unk) Bluetooth: Avoid potential use-after-free in hci_error_reset + CVE-2024-26802: (unk) stmmac: Clear variable when destroying workqueue + CVE-2024-26803: (unk) net: veth: clear GRO when clearing XDP even when down + CVE-2024-26804: (unk) net: ip_tunnel: prevent perpetual headroom growth + CVE-2024-26805: (unk) netlink: Fix kernel-infoleak-after-free in __skb_datagram_iter + CVE-2024-26806: (unk) spi: cadence-qspi: remove system-wide suspend helper calls from runtime PM hooks + CVE-2024-26808: (unk) netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain + CVE-2024-26809: (unk) netfilter: nft_set_pipapo: release elements in clone only from destroy path diff --git a/data/4.6/4.6_CVEs.txt b/data/4.6/4.6_CVEs.txt index ffb5ca2fc..78f08f0d9 100644 --- a/data/4.6/4.6_CVEs.txt +++ b/data/4.6/4.6_CVEs.txt @@ -590,6 +590,8 @@ CVE-2019-2181: Fix not seen in stream CVE-2019-2182: Fix not seen in stream CVE-2019-2213: Fix not seen in stream CVE-2019-2215: Fix not seen in stream +CVE-2019-25160: Fix not seen in stream +CVE-2019-25162: Fix not seen in stream CVE-2019-3459: Fix not seen in stream CVE-2019-3460: Fix not seen in stream CVE-2019-3701: Fix not seen in stream @@ -762,6 +764,11 @@ CVE-2020-36516: Fix not seen in stream CVE-2020-36557: Fix not seen in stream CVE-2020-36558: Fix not seen in stream CVE-2020-36691: Fix not seen in stream +CVE-2020-36775: Fix not seen in stream +CVE-2020-36777: Fix not seen in stream +CVE-2020-36780: Fix not seen in stream +CVE-2020-36781: Fix not seen in stream +CVE-2020-36784: Fix not seen in stream CVE-2020-3702: Fix not seen in stream CVE-2020-4788: Fix not seen in stream CVE-2020-8647: Fix not seen in stream @@ -897,6 +904,84 @@ CVE-2021-45469: Fix not seen in stream CVE-2021-45485: Fix not seen in stream CVE-2021-45486: Fix not seen in stream CVE-2021-45868: Fix not seen in stream +CVE-2021-46904: Fix not seen in stream +CVE-2021-46906: Fix not seen in stream +CVE-2021-46908: Fix not seen in stream +CVE-2021-46924: Fix not seen in stream +CVE-2021-46926: Fix not seen in stream +CVE-2021-46928: Fix not seen in stream +CVE-2021-46932: Fix not seen in stream +CVE-2021-46933: Fix not seen in stream +CVE-2021-46936: Fix not seen in stream +CVE-2021-46938: Fix not seen in stream +CVE-2021-46939: Fix not seen in stream +CVE-2021-46950: Fix not seen in stream +CVE-2021-46951: Fix not seen in stream +CVE-2021-46952: Fix not seen in stream +CVE-2021-46959: Fix not seen in stream +CVE-2021-46962: Fix not seen in stream +CVE-2021-46965: Fix not seen in stream +CVE-2021-46969: Fix not seen in stream +CVE-2021-46970: Fix not seen in stream +CVE-2021-46982: Fix not seen in stream +CVE-2021-47028: Fix not seen in stream +CVE-2021-47046: Fix not seen in stream +CVE-2021-47052: Fix not seen in stream +CVE-2021-47059: Fix not seen in stream +CVE-2021-47065: Fix not seen in stream +CVE-2021-47070: Fix not seen in stream +CVE-2021-47075: Fix not seen in stream +CVE-2021-47076: Fix not seen in stream +CVE-2021-47082: Fix not seen in stream +CVE-2021-47083: Fix not seen in stream +CVE-2021-47086: Fix not seen in stream +CVE-2021-47101: Fix not seen in stream +CVE-2021-47103: Fix not seen in stream +CVE-2021-47110: Fix not seen in stream +CVE-2021-47112: Fix not seen in stream +CVE-2021-47113: Fix not seen in stream +CVE-2021-47114: Fix not seen in stream +CVE-2021-47116: Fix not seen in stream +CVE-2021-47117: Fix not seen in stream +CVE-2021-47118: Fix not seen in stream +CVE-2021-47119: Fix not seen in stream +CVE-2021-47121: Fix not seen in stream +CVE-2021-47122: Fix not seen in stream +CVE-2021-47124: Fix not seen in stream +CVE-2021-47125: Fix not seen in stream +CVE-2021-47128: Fix not seen in stream +CVE-2021-47131: Fix not seen in stream +CVE-2021-47133: Fix not seen in stream +CVE-2021-47135: Fix not seen in stream +CVE-2021-47136: Fix not seen in stream +CVE-2021-47137: Fix not seen in stream +CVE-2021-47140: Fix not seen in stream +CVE-2021-47142: Fix not seen in stream +CVE-2021-47143: Fix not seen in stream +CVE-2021-47144: Fix not seen in stream +CVE-2021-47145: Fix not seen in stream +CVE-2021-47146: Fix not seen in stream +CVE-2021-47147: Fix not seen in stream +CVE-2021-47149: Fix not seen in stream +CVE-2021-47150: Fix not seen in stream +CVE-2021-47151: Fix not seen in stream +CVE-2021-47153: Fix not seen in stream +CVE-2021-47158: Fix not seen in stream +CVE-2021-47160: Fix not seen in stream +CVE-2021-47162: Fix not seen in stream +CVE-2021-47163: Fix not seen in stream +CVE-2021-47165: Fix not seen in stream +CVE-2021-47166: Fix not seen in stream +CVE-2021-47167: Fix not seen in stream +CVE-2021-47168: Fix not seen in stream +CVE-2021-47169: Fix not seen in stream +CVE-2021-47170: Fix not seen in stream +CVE-2021-47171: Fix not seen in stream +CVE-2021-47172: Fix not seen in stream +CVE-2021-47173: Fix not seen in stream +CVE-2021-47175: Fix not seen in stream +CVE-2021-47179: Fix not seen in stream +CVE-2021-47180: Fix not seen in stream CVE-2022-0001: Fix not seen in stream CVE-2022-0002: Fix not seen in stream CVE-2022-0168: Fix not seen in stream @@ -1072,6 +1157,9 @@ CVE-2022-4744: Fix not seen in stream CVE-2022-47520: Fix not seen in stream CVE-2022-47929: Fix not seen in stream CVE-2022-48619: Fix not seen in stream +CVE-2022-48626: Fix not seen in stream +CVE-2022-48627: Fix not seen in stream +CVE-2022-48628: Fix not seen in stream CVE-2023-0030: Fix not seen in stream CVE-2023-0047: Fix not seen in stream CVE-2023-0266: Fix not seen in stream @@ -1121,6 +1209,7 @@ CVE-2023-2513: Fix not seen in stream CVE-2023-26545: Fix not seen in stream CVE-2023-26607: Fix not seen in stream CVE-2023-28328: Fix not seen in stream +CVE-2023-28746: Fix not seen in stream CVE-2023-28772: Fix not seen in stream CVE-2023-2985: Fix not seen in stream CVE-2023-3006: Fix not seen in stream @@ -1186,7 +1275,7 @@ CVE-2023-4622: Fix not seen in stream CVE-2023-4623: Fix not seen in stream CVE-2023-46343: Fix not seen in stream CVE-2023-46838: Fix not seen in stream -CVE-2023-47233: Fix unknown +CVE-2023-47233: Fix not seen in stream CVE-2023-4881: Fix not seen in stream CVE-2023-4921: Fix not seen in stream CVE-2023-51043: Fix not seen in stream @@ -1198,30 +1287,116 @@ CVE-2023-51782: Fix not seen in stream CVE-2023-52340: Fix not seen in stream CVE-2023-52429: Fix not seen in stream CVE-2023-52434: Fix not seen in stream -CVE-2023-52435: Fix not seen in stream CVE-2023-52436: Fix not seen in stream CVE-2023-52442: Fix not seen in stream CVE-2023-52444: Fix not seen in stream CVE-2023-52445: Fix not seen in stream CVE-2023-52449: Fix not seen in stream CVE-2023-52451: Fix not seen in stream -CVE-2023-52456: Fix not seen in stream -CVE-2023-52457: Fix not seen in stream CVE-2023-52458: Fix not seen in stream +CVE-2023-52469: Fix not seen in stream +CVE-2023-52470: Fix not seen in stream +CVE-2023-52475: Fix not seen in stream +CVE-2023-52476: Fix not seen in stream +CVE-2023-52477: Fix not seen in stream +CVE-2023-52478: Fix not seen in stream +CVE-2023-52479: Fix not seen in stream +CVE-2023-52480: Fix not seen in stream +CVE-2023-52481: Fix not seen in stream +CVE-2023-52482: Fix not seen in stream +CVE-2023-52484: Fix not seen in stream +CVE-2023-52485: Fix not seen in stream +CVE-2023-52486: Fix not seen in stream +CVE-2023-52488: Fix not seen in stream +CVE-2023-52489: Fix not seen in stream +CVE-2023-52498: Fix not seen in stream +CVE-2023-52500: Fix not seen in stream +CVE-2023-52501: Fix not seen in stream +CVE-2023-52502: Fix not seen in stream +CVE-2023-52506: Fix not seen in stream +CVE-2023-52507: Fix not seen in stream +CVE-2023-52508: Fix not seen in stream +CVE-2023-52509: Fix not seen in stream +CVE-2023-52511: Fix not seen in stream +CVE-2023-52515: Fix not seen in stream +CVE-2023-52516: Fix not seen in stream +CVE-2023-52517: Fix not seen in stream +CVE-2023-52519: Fix not seen in stream +CVE-2023-52522: Fix not seen in stream +CVE-2023-52527: Fix not seen in stream +CVE-2023-52528: Fix not seen in stream +CVE-2023-52531: Fix not seen in stream +CVE-2023-52532: Fix not seen in stream +CVE-2023-52559: Fix not seen in stream +CVE-2023-52561: Fix not seen in stream +CVE-2023-52563: Fix not seen in stream +CVE-2023-52565: Fix not seen in stream +CVE-2023-52566: Fix not seen in stream +CVE-2023-52568: Fix not seen in stream +CVE-2023-52569: Fix not seen in stream +CVE-2023-52571: Fix not seen in stream +CVE-2023-52572: Fix not seen in stream +CVE-2023-52574: Fix not seen in stream +CVE-2023-52578: Fix not seen in stream +CVE-2023-52583: Fix not seen in stream +CVE-2023-52584: Fix not seen in stream +CVE-2023-52585: Fix not seen in stream +CVE-2023-52586: Fix not seen in stream +CVE-2023-52587: Fix not seen in stream +CVE-2023-52588: Fix not seen in stream +CVE-2023-52589: Fix not seen in stream +CVE-2023-52590: Fix not seen in stream +CVE-2023-52591: Fix not seen in stream +CVE-2023-52593: Fix not seen in stream +CVE-2023-52594: Fix not seen in stream +CVE-2023-52595: Fix not seen in stream +CVE-2023-52596: Fix not seen in stream +CVE-2023-52597: Fix not seen in stream +CVE-2023-52598: Fix not seen in stream +CVE-2023-52599: Fix not seen in stream +CVE-2023-52600: Fix not seen in stream +CVE-2023-52601: Fix not seen in stream +CVE-2023-52602: Fix not seen in stream +CVE-2023-52603: Fix not seen in stream +CVE-2023-52604: Fix not seen in stream +CVE-2023-52606: Fix not seen in stream +CVE-2023-52607: Fix not seen in stream +CVE-2023-52609: Fix not seen in stream +CVE-2023-52614: Fix not seen in stream +CVE-2023-52615: Fix not seen in stream +CVE-2023-52617: Fix not seen in stream +CVE-2023-52618: Fix not seen in stream +CVE-2023-52619: Fix not seen in stream +CVE-2023-52620: Fix not seen in stream +CVE-2023-52621: Fix not seen in stream +CVE-2023-52622: Fix not seen in stream +CVE-2023-52623: Fix not seen in stream +CVE-2023-52624: Fix not seen in stream +CVE-2023-52625: Fix not seen in stream +CVE-2023-52628: Fix not seen in stream +CVE-2023-52629: Fix not seen in stream +CVE-2023-52632: Fix not seen in stream +CVE-2023-52633: Fix not seen in stream +CVE-2023-52634: Fix not seen in stream +CVE-2023-52635: Fix not seen in stream +CVE-2023-52638: Fix not seen in stream +CVE-2023-52639: Fix not seen in stream +CVE-2023-52640: Fix not seen in stream +CVE-2023-52641: Fix not seen in stream CVE-2023-5717: Fix not seen in stream CVE-2023-6040: Fix not seen in stream CVE-2023-6240: Fix unknown -CVE-2023-6270: Fix unknown -CVE-2023-6356: Fix unknown +CVE-2023-6270: Fix not seen in stream +CVE-2023-6356: Fix not seen in stream CVE-2023-6535: Fix unknown -CVE-2023-6536: Fix unknown +CVE-2023-6536: Fix not seen in stream CVE-2023-6546: Fix not seen in stream CVE-2023-6606: Fix not seen in stream CVE-2023-6610: Fix not seen in stream CVE-2023-6915: Fix not seen in stream CVE-2023-6931: Fix not seen in stream CVE-2023-6932: Fix not seen in stream -CVE-2023-7042: Fix unknown +CVE-2023-7042: Fix not seen in stream CVE-2023-7192: Fix not seen in stream CVE-2024-0340: Fix not seen in stream CVE-2024-0584: Fix not seen in stream @@ -1230,10 +1405,11 @@ CVE-2024-0775: Fix not seen in stream CVE-2024-1086: Fix not seen in stream CVE-2024-1312: Fix not seen in stream CVE-2024-21803: Fix unknown -CVE-2024-22099: Fix unknown +CVE-2024-2193: Fix unknown +CVE-2024-22099: Fix not seen in stream CVE-2024-22386: Fix unknown -CVE-2024-23196: Fix unknown -CVE-2024-23307: Fix unknown +CVE-2024-23196: Fix not seen in stream +CVE-2024-23307: Fix not seen in stream CVE-2024-23848: Fix unknown CVE-2024-23851: Fix not seen in stream CVE-2024-24855: Fix not seen in stream @@ -1241,16 +1417,100 @@ CVE-2024-24857: Fix unknown CVE-2024-24858: Fix unknown CVE-2024-24859: Fix unknown CVE-2024-24860: Fix not seen in stream -CVE-2024-24861: Fix unknown +CVE-2024-24861: Fix not seen in stream CVE-2024-24864: Fix unknown CVE-2024-25739: Fix unknown CVE-2024-25740: Fix unknown CVE-2024-25741: Fix unknown CVE-2024-25744: Fix not seen in stream -CVE-2024-26584: Fix not seen in stream -CVE-2024-26587: Fix not seen in stream -CVE-2024-26588: Fix not seen in stream -CVE-2024-26591: Fix not seen in stream CVE-2024-26592: Fix not seen in stream CVE-2024-26594: Fix not seen in stream CVE-2024-26598: Fix not seen in stream +CVE-2024-26600: Fix not seen in stream +CVE-2024-26606: Fix not seen in stream +CVE-2024-26614: Fix not seen in stream +CVE-2024-26622: Fix not seen in stream +CVE-2024-26623: Fix not seen in stream +CVE-2024-26625: Fix not seen in stream +CVE-2024-26627: Fix not seen in stream +CVE-2024-26633: Fix not seen in stream +CVE-2024-26635: Fix not seen in stream +CVE-2024-26636: Fix not seen in stream +CVE-2024-26642: Fix not seen in stream +CVE-2024-26644: Fix not seen in stream +CVE-2024-26646: Fix not seen in stream +CVE-2024-26647: Fix not seen in stream +CVE-2024-26648: Fix not seen in stream +CVE-2024-26650: Fix not seen in stream +CVE-2024-26651: Fix not seen in stream +CVE-2024-26654: Fix not seen in stream +CVE-2024-26655: Fix not seen in stream +CVE-2024-26656: Fix not seen in stream +CVE-2024-26658: Fix not seen in stream +CVE-2024-26659: Fix not seen in stream +CVE-2024-26664: Fix not seen in stream +CVE-2024-26668: Fix not seen in stream +CVE-2024-26671: Fix not seen in stream +CVE-2024-26672: Fix not seen in stream +CVE-2024-26675: Fix not seen in stream +CVE-2024-26676: Fix not seen in stream +CVE-2024-26677: Fix not seen in stream +CVE-2024-26679: Fix not seen in stream +CVE-2024-26685: Fix not seen in stream +CVE-2024-26686: Fix not seen in stream +CVE-2024-26687: Fix not seen in stream +CVE-2024-26689: Fix not seen in stream +CVE-2024-26691: Fix not seen in stream +CVE-2024-26696: Fix not seen in stream +CVE-2024-26697: Fix not seen in stream +CVE-2024-26699: Fix not seen in stream +CVE-2024-26700: Fix not seen in stream +CVE-2024-26704: Fix not seen in stream +CVE-2024-26706: Fix not seen in stream +CVE-2024-26713: Fix not seen in stream +CVE-2024-26715: Fix not seen in stream +CVE-2024-26719: Fix not seen in stream +CVE-2024-26720: Fix not seen in stream +CVE-2024-26726: Fix not seen in stream +CVE-2024-26733: Fix not seen in stream +CVE-2024-26738: Fix not seen in stream +CVE-2024-26739: Fix not seen in stream +CVE-2024-26743: Fix not seen in stream +CVE-2024-26744: Fix not seen in stream +CVE-2024-26745: Fix not seen in stream +CVE-2024-26748: Fix not seen in stream +CVE-2024-26752: Fix not seen in stream +CVE-2024-26756: Fix not seen in stream +CVE-2024-26758: Fix not seen in stream +CVE-2024-26759: Fix not seen in stream +CVE-2024-26763: Fix not seen in stream +CVE-2024-26764: Fix not seen in stream +CVE-2024-26765: Fix not seen in stream +CVE-2024-26766: Fix not seen in stream +CVE-2024-26767: Fix not seen in stream +CVE-2024-26768: Fix not seen in stream +CVE-2024-26769: Fix not seen in stream +CVE-2024-26770: Fix not seen in stream +CVE-2024-26771: Fix not seen in stream +CVE-2024-26772: Fix not seen in stream +CVE-2024-26773: Fix not seen in stream +CVE-2024-26774: Fix not seen in stream +CVE-2024-26775: Fix not seen in stream +CVE-2024-26776: Fix not seen in stream +CVE-2024-26777: Fix not seen in stream +CVE-2024-26778: Fix not seen in stream +CVE-2024-26779: Fix not seen in stream +CVE-2024-26784: Fix not seen in stream +CVE-2024-26789: Fix not seen in stream +CVE-2024-26791: Fix not seen in stream +CVE-2024-26793: Fix not seen in stream +CVE-2024-26797: Fix not seen in stream +CVE-2024-26798: Fix not seen in stream +CVE-2024-26801: Fix not seen in stream +CVE-2024-26802: Fix not seen in stream +CVE-2024-26803: Fix not seen in stream +CVE-2024-26804: Fix not seen in stream +CVE-2024-26805: Fix not seen in stream +CVE-2024-26806: Fix not seen in stream +CVE-2024-26808: Fix not seen in stream +CVE-2024-26809: Fix not seen in stream diff --git a/data/4.6/4.6_security.txt b/data/4.6/4.6_security.txt index ce3f365ad..ff8230c11 100644 --- a/data/4.6/4.6_security.txt +++ b/data/4.6/4.6_security.txt @@ -608,6 +608,8 @@ Outstanding CVEs: CVE-2019-2182: (unk) arm64: Enforce BBM for huge IO/VMAP mappings CVE-2019-2213: (unk) binder: fix possible UAF when freeing buffer CVE-2019-2215: (unk) ANDROID: binder: remove waitqueue when thread exits. + CVE-2019-25160: (unk) netlabel: fix out-of-bounds memory accesses + CVE-2019-25162: (unk) i2c: Fix a potential use after free CVE-2019-3459: (unk) Bluetooth: Verify that l2cap_get_conf_opt provides large enough buffer CVE-2019-3460: (unk) Bluetooth: Check L2CAP option sizes returned from l2cap_get_conf_opt CVE-2019-3701: (unk) can: gw: ensure DLC boundaries after CAN frame modification @@ -780,6 +782,11 @@ Outstanding CVEs: CVE-2020-36557: (unk) vt: vt_ioctl: fix VT_DISALLOCATE freeing in-use virtual console CVE-2020-36558: (unk) vt: vt_ioctl: fix race in VT_RESIZEX CVE-2020-36691: (unk) netlink: limit recursion depth in policy validation + CVE-2020-36775: (unk) f2fs: fix to avoid potential deadlock + CVE-2020-36777: (unk) media: dvbdev: Fix memory leak in dvb_media_device_free() + CVE-2020-36780: (unk) i2c: sprd: fix reference leak when pm_runtime_get_sync fails + CVE-2020-36781: (unk) i2c: imx: fix reference leak when pm_runtime_get_sync fails + CVE-2020-36784: (unk) i2c: cadence: fix reference leak when pm_runtime_get_sync fails CVE-2020-3702: (unk) ath: Use safer key clearing with key cache entries CVE-2020-4788: (unk) powerpc/64s: flush L1D on kernel entry CVE-2020-8647: (unk) vgacon: Fix a UAF in vgacon_invert_region @@ -915,6 +922,84 @@ Outstanding CVEs: CVE-2021-45485: (unk) ipv6: use prandom_u32() for ID generation CVE-2021-45486: (unk) inet: use bigger hash table for IP ID generation CVE-2021-45868: (unk) quota: check block number when reading the block in quota file + CVE-2021-46904: (unk) net: hso: fix null-ptr-deref during tty device unregistration + CVE-2021-46906: (unk) HID: usbhid: fix info leak in hid_submit_ctrl + CVE-2021-46908: (unk) bpf: Use correct permission flag for mixed signed bounds arithmetic + CVE-2021-46924: (unk) NFC: st21nfca: Fix memory leak in device probe and remove + CVE-2021-46926: (unk) ALSA: hda: intel-sdw-acpi: harden detection of controller + CVE-2021-46928: (unk) parisc: Clear stale IIR value on instruction access rights trap + CVE-2021-46932: (unk) Input: appletouch - initialize work before device registration + CVE-2021-46933: (unk) usb: gadget: f_fs: Clear ffs_eventfd in ffs_data_clear. + CVE-2021-46936: (unk) net: fix use-after-free in tw_timer_handler + CVE-2021-46938: (unk) dm rq: fix double free of blk_mq_tag_set in dev remove after table load fails + CVE-2021-46939: (unk) tracing: Restructure trace_clock_global() to never block + CVE-2021-46950: (unk) md/raid1: properly indicate failure when ending a failed write request + CVE-2021-46951: (unk) tpm: efi: Use local variable for calculating final log size + CVE-2021-46952: (unk) NFS: fs_context: validate UDP retrans to prevent shift out-of-bounds + CVE-2021-46959: (unk) spi: Fix use-after-free with devm_spi_alloc_* + CVE-2021-46962: (unk) mmc: uniphier-sd: Fix a resource leak in the remove function + CVE-2021-46965: (unk) mtd: physmap: physmap-bt1-rom: Fix unintentional stack access + CVE-2021-46969: (unk) bus: mhi: core: Fix invalid error returning in mhi_queue + CVE-2021-46970: (unk) bus: mhi: pci_generic: Remove WQ_MEM_RECLAIM flag from state workqueue + CVE-2021-46982: (unk) f2fs: compress: fix race condition of overwrite vs truncate + CVE-2021-47028: (unk) mt76: mt7915: fix txrate reporting + CVE-2021-47046: (unk) drm/amd/display: Fix off by one in hdmi_14_process_transaction() + CVE-2021-47052: (unk) crypto: sa2ul - Fix memory leak of rxd + CVE-2021-47059: (unk) crypto: sun8i-ss - fix result memory leak on error path + CVE-2021-47065: (unk) rtw88: Fix array overrun in rtw_get_tx_power_params() + CVE-2021-47070: (unk) uio_hv_generic: Fix another memory leak in error handling paths + CVE-2021-47075: (unk) nvmet: fix memory leak in nvmet_alloc_ctrl() + CVE-2021-47076: (unk) RDMA/rxe: Return CQE error if invalid lkey was supplied + CVE-2021-47082: (unk) tun: avoid double free in tun_free_netdev + CVE-2021-47083: (unk) pinctrl: mediatek: fix global-out-of-bounds issue + CVE-2021-47086: (unk) phonet/pep: refuse to enable an unbound pipe + CVE-2021-47101: (unk) asix: fix uninit-value in asix_mdio_read() + CVE-2021-47103: (unk) inet: fully convert sk->sk_rx_dst to RCU rules + CVE-2021-47110: (unk) x86/kvm: Disable kvmclock on all CPUs on shutdown + CVE-2021-47112: (unk) x86/kvm: Teardown PV features on boot CPU as well + CVE-2021-47113: (unk) btrfs: abort in rename_exchange if we fail to insert the second ref + CVE-2021-47114: (unk) ocfs2: fix data corruption by fallocate + CVE-2021-47116: (unk) ext4: fix memory leak in ext4_mb_init_backend on error path. + CVE-2021-47117: (unk) ext4: fix bug on in ext4_es_cache_extent as ext4_split_extent_at failed + CVE-2021-47118: (unk) pid: take a reference when initializing `cad_pid` + CVE-2021-47119: (unk) ext4: fix memory leak in ext4_fill_super + CVE-2021-47121: (unk) net: caif: fix memory leak in cfusbl_device_notify + CVE-2021-47122: (unk) net: caif: fix memory leak in caif_device_notify + CVE-2021-47124: (unk) io_uring: fix link timeout refs + CVE-2021-47125: (unk) sch_htb: fix refcount leak in htb_parent_to_leaf_offload + CVE-2021-47128: (unk) bpf, lockdown, audit: Fix buggy SELinux lockdown permission checks + CVE-2021-47131: (unk) net/tls: Fix use-after-free after the TLS device goes down and up + CVE-2021-47133: (unk) HID: amd_sfh: Fix memory leak in amd_sfh_work + CVE-2021-47135: (unk) mt76: mt7921: fix possible AOOB issue in mt7921_mcu_tx_rate_report + CVE-2021-47136: (unk) net: zero-initialize tc skb extension on allocation + CVE-2021-47137: (unk) net: lantiq: fix memory corruption in RX ring + CVE-2021-47140: (unk) iommu/amd: Clear DMA ops when switching domain + CVE-2021-47142: (unk) drm/amdgpu: Fix a use-after-free + CVE-2021-47143: (unk) net/smc: remove device from smcd_dev_list after failed device_add() + CVE-2021-47144: (unk) drm/amd/amdgpu: fix refcount leak + CVE-2021-47145: (unk) btrfs: do not BUG_ON in link_to_fixup_dir + CVE-2021-47146: (unk) mld: fix panic in mld_newpack() + CVE-2021-47147: (unk) ptp: ocp: Fix a resource leak in an error handling path + CVE-2021-47149: (unk) net: fujitsu: fix potential null-ptr-deref + CVE-2021-47150: (unk) net: fec: fix the potential memory leak in fec_enet_init() + CVE-2021-47151: (unk) interconnect: qcom: bcm-voter: add a missing of_node_put() + CVE-2021-47153: (unk) i2c: i801: Don't generate an interrupt on bus reset + CVE-2021-47158: (unk) net: dsa: sja1105: add error handling in sja1105_setup() + CVE-2021-47160: (unk) net: dsa: mt7530: fix VLAN traffic leaks + CVE-2021-47162: (unk) tipc: skb_linearize the head skb when reassembling msgs + CVE-2021-47163: (unk) tipc: wait and exit until all work queues are done + CVE-2021-47165: (unk) drm/meson: fix shutdown crash when component not probed + CVE-2021-47166: (unk) NFS: Don't corrupt the value of pg_bytes_written in nfs_do_recoalesce() + CVE-2021-47167: (unk) NFS: Fix an Oopsable condition in __nfs_pageio_add_request() + CVE-2021-47168: (unk) NFS: fix an incorrect limit in filelayout_decode_layout() + CVE-2021-47169: (unk) serial: rp2: use 'request_firmware' instead of 'request_firmware_nowait' + CVE-2021-47170: (unk) USB: usbfs: Don't WARN about excessively large memory allocations + CVE-2021-47171: (unk) net: usb: fix memory leak in smsc75xx_bind + CVE-2021-47172: (unk) iio: adc: ad7124: Fix potential overflow due to non sequential channel numbers + CVE-2021-47173: (unk) misc/uss720: fix memory leak in uss720_probe + CVE-2021-47175: (unk) net/sched: fq_pie: fix OOB access in the traffic path + CVE-2021-47179: (unk) NFSv4: Fix a NULL pointer dereference in pnfs_mark_matching_lsegs_return() + CVE-2021-47180: (unk) NFC: nci: fix memory leak in nci_allocate_device CVE-2022-0001: (unk) x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE CVE-2022-0002: (unk) x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE CVE-2022-0168: (unk) cifs: fix NULL ptr dereference in smb2_ioctl_query_info() @@ -1090,6 +1175,9 @@ Outstanding CVEs: CVE-2022-47520: (unk) wifi: wilc1000: validate pairwise and authentication suite offsets CVE-2022-47929: (unk) net: sched: disallow noqueue for qdisc classes CVE-2022-48619: (unk) Input: add bounds checking to input_set_capability() + CVE-2022-48626: (unk) moxart: fix potential use-after-free on remove path + CVE-2022-48627: (unk) vt: fix memory overlapping when deleting chars in the buffer + CVE-2022-48628: (unk) ceph: drop messages from MDS when unmounting CVE-2023-0030: (unk) drm/nouveau/mmu: add more general vmm free/node handling functions CVE-2023-0047: (unk) mm, oom: do not trigger out_of_memory from the #PF CVE-2023-0266: (unk) ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF @@ -1139,6 +1227,7 @@ Outstanding CVEs: CVE-2023-26545: (unk) net: mpls: fix stale pointer if allocation fails during device rename CVE-2023-26607: (unk) ntfs: fix out-of-bounds read in ntfs_attr_find() CVE-2023-28328: (unk) media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer() + CVE-2023-28746: (unk) x86/mmio: Disable KVM mitigation when X86_FEATURE_CLEAR_CPU_BUF is set CVE-2023-28772: (unk) seq_buf: Fix overflow in seq_buf_putmem_hex() CVE-2023-2985: (unk) fs: hfsplus: fix UAF issue in hfsplus_put_super CVE-2023-3006: (unk) arm64: Add AMPERE1 to the Spectre-BHB affected list @@ -1204,7 +1293,7 @@ Outstanding CVEs: CVE-2023-4623: (unk) net/sched: sch_hfsc: Ensure inner classes have fsc curve CVE-2023-46343: (unk) nfc: nci: fix possible NULL pointer dereference in send_acknowledge() CVE-2023-46838: (unk) xen-netback: don't produce zero-size SKB frags - CVE-2023-47233: (unk) + CVE-2023-47233: (unk) wifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach CVE-2023-4881: (unk) netfilter: nftables: exthdr: fix 4-byte stack OOB write CVE-2023-4921: (unk) net: sched: sch_qfq: Fix UAF in qfq_dequeue() CVE-2023-51043: (unk) drm/atomic: Fix potential use-after-free in nonblocking commits @@ -1216,30 +1305,116 @@ Outstanding CVEs: CVE-2023-52340: (unk) ipv6: remove max_size check inline with ipv4 CVE-2023-52429: (unk) dm: limit the number of targets and parameter size area CVE-2023-52434: (unk) smb: client: fix potential OOBs in smb2_parse_contexts() - CVE-2023-52435: (unk) net: prevent mss overflow in skb_segment() CVE-2023-52436: (unk) f2fs: explicitly null-terminate the xattr list CVE-2023-52442: (unk) ksmbd: validate session id and tree id in compound request CVE-2023-52444: (unk) f2fs: fix to avoid dirent corruption CVE-2023-52445: (unk) media: pvrusb2: fix use after free on context disconnection CVE-2023-52449: (unk) mtd: Fix gluebi NULL pointer dereference caused by ftl notifier CVE-2023-52451: (unk) powerpc/pseries/memhp: Fix access beyond end of drmem array - CVE-2023-52456: (unk) serial: imx: fix tx statemachine deadlock - CVE-2023-52457: (unk) serial: 8250: omap: Don't skip resource freeing if pm_runtime_resume_and_get() failed CVE-2023-52458: (unk) block: add check that partition length needs to be aligned with block size + CVE-2023-52469: (unk) drivers/amd/pm: fix a use-after-free in kv_parse_power_table + CVE-2023-52470: (unk) drm/radeon: check the alloc_workqueue return value in radeon_crtc_init() + CVE-2023-52475: (unk) Input: powermate - fix use-after-free in powermate_config_complete + CVE-2023-52476: (unk) perf/x86/lbr: Filter vsyscall addresses + CVE-2023-52477: (unk) usb: hub: Guard against accesses to uninitialized BOS descriptors + CVE-2023-52478: (unk) HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect + CVE-2023-52479: (unk) ksmbd: fix uaf in smb20_oplock_break_ack + CVE-2023-52480: (unk) ksmbd: fix race condition between session lookup and expire + CVE-2023-52481: (unk) arm64: errata: Add Cortex-A520 speculative unprivileged load workaround + CVE-2023-52482: (unk) x86/srso: Add SRSO mitigation for Hygon processors + CVE-2023-52484: (unk) iommu/arm-smmu-v3: Fix soft lockup triggered by arm_smmu_mm_invalidate_range + CVE-2023-52485: (unk) drm/amd/display: Wake DMCUB before sending a command + CVE-2023-52486: (unk) drm: Don't unref the same fb many times by mistake due to deadlock handling + CVE-2023-52488: (unk) serial: sc16is7xx: convert from _raw_ to _noinc_ regmap functions for FIFO + CVE-2023-52489: (unk) mm/sparsemem: fix race in accessing memory_section->usage + CVE-2023-52498: (unk) PM: sleep: Fix possible deadlocks in core system-wide PM code + CVE-2023-52500: (unk) scsi: pm80xx: Avoid leaking tags when processing OPC_INB_SET_CONTROLLER_CONFIG command + CVE-2023-52501: (unk) ring-buffer: Do not attempt to read past "commit" + CVE-2023-52502: (unk) net: nfc: fix races in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn() + CVE-2023-52506: (unk) LoongArch: Set all reserved memblocks on Node#0 at initialization + CVE-2023-52507: (unk) nfc: nci: assert requested protocol is valid + CVE-2023-52508: (unk) nvme-fc: Prevent null pointer dereference in nvme_fc_io_getuuid() + CVE-2023-52509: (unk) ravb: Fix use-after-free issue in ravb_tx_timeout_work() + CVE-2023-52511: (unk) spi: sun6i: reduce DMA RX transfer width to single byte + CVE-2023-52515: (unk) RDMA/srp: Do not call scsi_done() from srp_abort() + CVE-2023-52516: (unk) dma-debug: don't call __dma_entry_alloc_check_leak() under free_entries_lock + CVE-2023-52517: (unk) spi: sun6i: fix race between DMA RX transfer completion and RX FIFO drain + CVE-2023-52519: (unk) HID: intel-ish-hid: ipc: Disable and reenable ACPI GPE bit + CVE-2023-52522: (unk) net: fix possible store tearing in neigh_periodic_work() + CVE-2023-52527: (unk) ipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data() + CVE-2023-52528: (unk) net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg + CVE-2023-52531: (unk) wifi: iwlwifi: mvm: Fix a memory corruption issue + CVE-2023-52532: (unk) net: mana: Fix TX CQE error handling + CVE-2023-52559: (unk) iommu/vt-d: Avoid memory allocation in iommu_suspend() + CVE-2023-52561: (unk) arm64: dts: qcom: sdm845-db845c: Mark cont splash memory region as reserved + CVE-2023-52563: (unk) drm/meson: fix memory leak on ->hpd_notify callback + CVE-2023-52565: (unk) media: uvcvideo: Fix OOB read + CVE-2023-52566: (unk) nilfs2: fix potential use after free in nilfs_gccache_submit_read_data() + CVE-2023-52568: (unk) x86/sgx: Resolves SECS reclaim vs. page fault for EAUG race + CVE-2023-52569: (unk) btrfs: remove BUG() after failure to insert delayed dir index item + CVE-2023-52571: (unk) power: supply: rk817: Fix node refcount leak + CVE-2023-52572: (unk) cifs: Fix UAF in cifs_demultiplex_thread() + CVE-2023-52574: (unk) team: fix null-ptr-deref when team device type is changed + CVE-2023-52578: (unk) net: bridge: use DEV_STATS_INC() + CVE-2023-52583: (unk) ceph: fix deadlock or deadcode of misusing dget() + CVE-2023-52584: (unk) spmi: mediatek: Fix UAF on device remove + CVE-2023-52585: (unk) drm/amdgpu: Fix possible NULL dereference in amdgpu_ras_query_error_status_helper() + CVE-2023-52586: (unk) drm/msm/dpu: Add mutex lock in control vblank irq + CVE-2023-52587: (unk) IB/ipoib: Fix mcast list locking + CVE-2023-52588: (unk) f2fs: fix to tag gcing flag on page during block migration + CVE-2023-52589: (unk) media: rkisp1: Fix IRQ disable race issue + CVE-2023-52590: (unk) ocfs2: Avoid touching renamed directory if parent does not change + CVE-2023-52591: (unk) reiserfs: Avoid touching renamed directory if parent does not change + CVE-2023-52593: (unk) wifi: wfx: fix possible NULL pointer dereference in wfx_set_mfp_ap() + CVE-2023-52594: (unk) wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus() + CVE-2023-52595: (unk) wifi: rt2x00: restart beacon queue when hardware reset + CVE-2023-52596: (unk) sysctl: Fix out of bounds access for empty sysctl registers + CVE-2023-52597: (unk) KVM: s390: fix setting of fpc register + CVE-2023-52598: (unk) s390/ptrace: handle setting of fpc register correctly + CVE-2023-52599: (unk) jfs: fix array-index-out-of-bounds in diNewExt + CVE-2023-52600: (unk) jfs: fix uaf in jfs_evict_inode + CVE-2023-52601: (unk) jfs: fix array-index-out-of-bounds in dbAdjTree + CVE-2023-52602: (unk) jfs: fix slab-out-of-bounds Read in dtSearch + CVE-2023-52603: (unk) UBSAN: array-index-out-of-bounds in dtSplitRoot + CVE-2023-52604: (unk) FS:JFS:UBSAN:array-index-out-of-bounds in dbAdjTree + CVE-2023-52606: (unk) powerpc/lib: Validate size for vector operations + CVE-2023-52607: (unk) powerpc/mm: Fix null-pointer dereference in pgtable_cache_add + CVE-2023-52609: (unk) binder: fix race between mmput() and do_exit() + CVE-2023-52614: (unk) PM / devfreq: Fix buffer overflow in trans_stat_show + CVE-2023-52615: (unk) hwrng: core - Fix page fault dead lock on mmap-ed hwrng + CVE-2023-52617: (unk) PCI: switchtec: Fix stdev_release() crash after surprise hot remove + CVE-2023-52618: (unk) block/rnbd-srv: Check for unlikely string overflow + CVE-2023-52619: (unk) pstore/ram: Fix crash when setting number of cpus to an odd number + CVE-2023-52620: (unk) netfilter: nf_tables: disallow timeout for anonymous sets + CVE-2023-52621: (unk) bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers + CVE-2023-52622: (unk) ext4: avoid online resizing failures due to oversized flex bg + CVE-2023-52623: (unk) SUNRPC: Fix a suspicious RCU usage warning + CVE-2023-52624: (unk) drm/amd/display: Wake DMCUB before executing GPINT commands + CVE-2023-52625: (unk) drm/amd/display: Refactor DMCUB enter/exit idle interface + CVE-2023-52628: (unk) netfilter: nftables: exthdr: fix 4-byte stack OOB write + CVE-2023-52629: (unk) sh: push-switch: Reorder cleanup operations to avoid use-after-free bug + CVE-2023-52632: (unk) drm/amdkfd: Fix lock dependency warning with srcu + CVE-2023-52633: (unk) um: time-travel: fix time corruption + CVE-2023-52634: (unk) drm/amd/display: Fix disable_otg_wa logic + CVE-2023-52635: (unk) PM / devfreq: Synchronize devfreq_monitor_[start/stop] + CVE-2023-52638: (unk) can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock + CVE-2023-52639: (unk) KVM: s390: vsie: fix race during shadow creation + CVE-2023-52640: (unk) fs/ntfs3: Fix oob in ntfs_listxattr + CVE-2023-52641: (unk) fs/ntfs3: Add NULL ptr dereference checking at the end of attr_allocate_frame() CVE-2023-5717: (unk) perf: Disallow mis-matched inherited group reads CVE-2023-6040: (unk) netfilter: nf_tables: Reject tables of unsupported family CVE-2023-6240: (unk) - CVE-2023-6270: (unk) - CVE-2023-6356: (unk) + CVE-2023-6270: (unk) aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts + CVE-2023-6356: (unk) nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length CVE-2023-6535: (unk) - CVE-2023-6536: (unk) + CVE-2023-6536: (unk) nvmet-tcp: fix a crash in nvmet_req_complete() CVE-2023-6546: (unk) tty: n_gsm: fix the UAF caused by race condition in gsm_cleanup_mux CVE-2023-6606: (unk) smb: client: fix OOB in smbCalcSize() CVE-2023-6610: (unk) smb: client: fix potential OOB in smb2_dump_detail() CVE-2023-6915: (unk) ida: Fix crash in ida_free when the bitmap is empty CVE-2023-6931: (unk) perf: Fix perf_event_validate_size() CVE-2023-6932: (unk) ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet - CVE-2023-7042: (unk) + CVE-2023-7042: (unk) wifi: ath10k: fix NULL pointer dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev() CVE-2023-7192: (unk) netfilter: ctnetlink: fix possible refcount leak in ctnetlink_create_conntrack() CVE-2024-0340: (unk) vhost: use kzalloc() instead of kmalloc() followed by memset() CVE-2024-0584: (unk) ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet @@ -1248,10 +1423,11 @@ Outstanding CVEs: CVE-2024-1086: (unk) netfilter: nf_tables: reject QUEUE/DROP verdict parameters CVE-2024-1312: (unk) mm: lock_vma_under_rcu() must check vma->anon_vma under vma lock CVE-2024-21803: (unk) - CVE-2024-22099: (unk) + CVE-2024-2193: (unk) + CVE-2024-22099: (unk) Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security CVE-2024-22386: (unk) - CVE-2024-23196: (unk) - CVE-2024-23307: (unk) + CVE-2024-23196: (unk) ALSA: hda: fix a possible null-pointer dereference due to data race in snd_hdac_regmap_sync() + CVE-2024-23307: (unk) md/raid5: fix atomicity violation in raid5_cache_count CVE-2024-23848: (unk) CVE-2024-23851: (unk) dm: limit the number of targets and parameter size area CVE-2024-24855: (unk) scsi: lpfc: Fix a possible data race in lpfc_unregister_fcf_rescan() @@ -1259,16 +1435,100 @@ Outstanding CVEs: CVE-2024-24858: (unk) CVE-2024-24859: (unk) CVE-2024-24860: (unk) Bluetooth: Fix atomicity violation in {min,max}_key_size_set - CVE-2024-24861: (unk) + CVE-2024-24861: (unk) media: xc4000: Fix atomicity violation in xc4000_get_frequency CVE-2024-24864: (unk) CVE-2024-25739: (unk) CVE-2024-25740: (unk) CVE-2024-25741: (unk) CVE-2024-25744: (unk) x86/coco: Disable 32-bit emulation by default on TDX and SEV - CVE-2024-26584: (unk) net: tls: handle backlogging of crypto requests - CVE-2024-26587: (unk) net: netdevsim: don't try to destroy PHC on VFs - CVE-2024-26588: (unk) LoongArch: BPF: Prevent out-of-bounds memory access - CVE-2024-26591: (unk) bpf: Fix re-attachment branch in bpf_tracing_prog_attach CVE-2024-26592: (unk) ksmbd: fix UAF issue in ksmbd_tcp_new_connection() CVE-2024-26594: (unk) ksmbd: validate mech token in session setup CVE-2024-26598: (unk) KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache + CVE-2024-26600: (unk) phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP + CVE-2024-26606: (unk) binder: signal epoll threads of self-work + CVE-2024-26614: (unk) tcp: make sure init the accept_queue's spinlocks once + CVE-2024-26622: (unk) tomoyo: fix UAF write bug in tomoyo_write_control() + CVE-2024-26623: (unk) pds_core: Prevent race issues involving the adminq + CVE-2024-26625: (unk) llc: call sock_orphan() at release time + CVE-2024-26627: (unk) scsi: core: Move scsi_host_busy() out of host lock for waking up EH handler + CVE-2024-26633: (unk) ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim() + CVE-2024-26635: (unk) llc: Drop support for ETH_P_TR_802_2. + CVE-2024-26636: (unk) llc: make llc_ui_sendmsg() more robust against bonding changes + CVE-2024-26642: (unk) netfilter: nf_tables: disallow anonymous set with timeout flag + CVE-2024-26644: (unk) btrfs: don't abort filesystem when attempting to snapshot deleted subvolume + CVE-2024-26646: (unk) thermal: intel: hfi: Add syscore callbacks for system-wide PM + CVE-2024-26647: (unk) drm/amd/display: Fix late derefrence 'dsc' check in 'link_set_dsc_pps_packet()' + CVE-2024-26648: (unk) drm/amd/display: Fix variable deferencing before NULL check in edp_setup_replay() + CVE-2024-26650: (unk) platform/x86: p2sb: Allow p2sb_bar() calls during PCI device probe + CVE-2024-26651: (unk) sr9800: Add check for usbnet_get_endpoints + CVE-2024-26654: (unk) ALSA: sh: aica: reorder cleanup operations to avoid UAF bugs + CVE-2024-26655: (unk) Fix memory leak in posix_clock_open() + CVE-2024-26656: (unk) drm/amdgpu: fix use-after-free bug + CVE-2024-26658: (unk) bcachefs: grab s_umount only if snapshotting + CVE-2024-26659: (unk) xhci: handle isoc Babble and Buffer Overrun events properly + CVE-2024-26664: (unk) hwmon: (coretemp) Fix out-of-bounds memory access + CVE-2024-26668: (unk) netfilter: nft_limit: reject configurations that cause integer overflow + CVE-2024-26671: (unk) blk-mq: fix IO hang from sbitmap wakeup race + CVE-2024-26672: (unk) drm/amdgpu: Fix variable 'mca_funcs' dereferenced before NULL check in 'amdgpu_mca_smu_get_mca_entry()' + CVE-2024-26675: (unk) ppp_async: limit MRU to 64K + CVE-2024-26676: (unk) af_unix: Call kfree_skb() for dead unix_(sk)->oob_skb in GC. + CVE-2024-26677: (unk) rxrpc: Fix delayed ACKs to not set the reference serial number + CVE-2024-26679: (unk) inet: read sk->sk_family once in inet_recv_error() + CVE-2024-26685: (unk) nilfs2: fix potential bug in end_buffer_async_write + CVE-2024-26686: (unk) fs/proc: do_task_stat: use sig->stats_lock to gather the threads/children stats + CVE-2024-26687: (unk) xen/events: close evtchn after mapping cleanup + CVE-2024-26689: (unk) ceph: prevent use-after-free in encode_cap_msg() + CVE-2024-26691: (unk) KVM: arm64: Fix circular locking dependency + CVE-2024-26696: (unk) nilfs2: fix hang in nilfs_lookup_dirty_data_buffers() + CVE-2024-26697: (unk) nilfs2: fix data corruption in dsync block recovery for small block sizes + CVE-2024-26699: (unk) drm/amd/display: Fix array-index-out-of-bounds in dcn35_clkmgr + CVE-2024-26700: (unk) drm/amd/display: Fix MST Null Ptr for RV + CVE-2024-26704: (unk) ext4: fix double-free of blocks due to wrong extents moved_len + CVE-2024-26706: (unk) parisc: Fix random data corruption from exception handler + CVE-2024-26713: (unk) powerpc/pseries/iommu: Fix iommu initialisation during DLPAR add + CVE-2024-26715: (unk) usb: dwc3: gadget: Fix NULL pointer dereference in dwc3_gadget_suspend + CVE-2024-26719: (unk) nouveau: offload fence uevents work to workqueue + CVE-2024-26720: (unk) mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again + CVE-2024-26726: (unk) btrfs: don't drop extent_map for free space inode on write error + CVE-2024-26733: (unk) arp: Prevent overflow in arp_req_get(). + CVE-2024-26738: (unk) powerpc/pseries/iommu: DLPAR add doesn't completely initialize pci_controller + CVE-2024-26739: (unk) net/sched: act_mirred: don't override retval if we already lost the skb + CVE-2024-26743: (unk) RDMA/qedr: Fix qedr_create_user_qp error flow + CVE-2024-26744: (unk) RDMA/srpt: Support specifying the srpt_service_guid parameter + CVE-2024-26745: (unk) powerpc/pseries/iommu: IOMMU table is not initialized for kdump over SR-IOV + CVE-2024-26748: (unk) usb: cdns3: fix memory double free when handle zero packet + CVE-2024-26752: (unk) l2tp: pass correct message length to ip6_append_data + CVE-2024-26756: (unk) md: Don't register sync_thread for reshape directly + CVE-2024-26758: (unk) md: Don't ignore suspended array in md_check_recovery() + CVE-2024-26759: (unk) mm/swap: fix race when skipping swapcache + CVE-2024-26763: (unk) dm-crypt: don't modify the data when using authenticated encryption + CVE-2024-26764: (unk) fs/aio: Restrict kiocb_set_cancel_fn() to I/O submitted via libaio + CVE-2024-26765: (unk) LoongArch: Disable IRQ before init_fn() for nonboot CPUs + CVE-2024-26766: (unk) IB/hfi1: Fix sdma.h tx->num_descs off-by-one error + CVE-2024-26767: (unk) drm/amd/display: fixed integer types and null check locations + CVE-2024-26768: (unk) LoongArch: Change acpi_core_pic[NR_CPUS] to acpi_core_pic[MAX_CORE_PIC] + CVE-2024-26769: (unk) nvmet-fc: avoid deadlock on delete association path + CVE-2024-26770: (unk) HID: nvidia-shield: Add missing null pointer checks to LED initialization + CVE-2024-26771: (unk) dmaengine: ti: edma: Add some null pointer checks to the edma_probe + CVE-2024-26772: (unk) ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal() + CVE-2024-26773: (unk) ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found() + CVE-2024-26774: (unk) ext4: avoid dividing by 0 in mb_update_avg_fragment_size() when block bitmap corrupt + CVE-2024-26775: (unk) aoe: avoid potential deadlock at set_capacity + CVE-2024-26776: (unk) spi: hisi-sfc-v3xx: Return IRQ_NONE if no interrupts were detected + CVE-2024-26777: (unk) fbdev: sis: Error out if pixclock equals zero + CVE-2024-26778: (unk) fbdev: savage: Error out if pixclock equals zero + CVE-2024-26779: (unk) wifi: mac80211: fix race condition on enabling fast-xmit + CVE-2024-26784: (unk) pmdomain: arm: Fix NULL dereference on scmi_perf_domain removal + CVE-2024-26789: (unk) crypto: arm64/neonbs - fix out-of-bounds access on short input + CVE-2024-26791: (unk) btrfs: dev-replace: properly validate device names + CVE-2024-26793: (unk) gtp: fix use-after-free and null-ptr-deref in gtp_newlink() + CVE-2024-26797: (unk) drm/amd/display: Prevent potential buffer overflow in map_hw_resources + CVE-2024-26798: (unk) fbcon: always restore the old font data in fbcon_do_set_font() + CVE-2024-26801: (unk) Bluetooth: Avoid potential use-after-free in hci_error_reset + CVE-2024-26802: (unk) stmmac: Clear variable when destroying workqueue + CVE-2024-26803: (unk) net: veth: clear GRO when clearing XDP even when down + CVE-2024-26804: (unk) net: ip_tunnel: prevent perpetual headroom growth + CVE-2024-26805: (unk) netlink: Fix kernel-infoleak-after-free in __skb_datagram_iter + CVE-2024-26806: (unk) spi: cadence-qspi: remove system-wide suspend helper calls from runtime PM hooks + CVE-2024-26808: (unk) netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain + CVE-2024-26809: (unk) netfilter: nft_set_pipapo: release elements in clone only from destroy path diff --git a/data/4.7/4.7_CVEs.txt b/data/4.7/4.7_CVEs.txt index 6624bbfff..d4a6484f5 100644 --- a/data/4.7/4.7_CVEs.txt +++ b/data/4.7/4.7_CVEs.txt @@ -568,6 +568,8 @@ CVE-2019-2181: Fix not seen in stream CVE-2019-2182: Fix not seen in stream CVE-2019-2213: Fix not seen in stream CVE-2019-2215: Fix not seen in stream +CVE-2019-25160: Fix not seen in stream +CVE-2019-25162: Fix not seen in stream CVE-2019-3459: Fix not seen in stream CVE-2019-3460: Fix not seen in stream CVE-2019-3701: Fix not seen in stream @@ -742,6 +744,11 @@ CVE-2020-36516: Fix not seen in stream CVE-2020-36557: Fix not seen in stream CVE-2020-36558: Fix not seen in stream CVE-2020-36691: Fix not seen in stream +CVE-2020-36775: Fix not seen in stream +CVE-2020-36777: Fix not seen in stream +CVE-2020-36780: Fix not seen in stream +CVE-2020-36781: Fix not seen in stream +CVE-2020-36784: Fix not seen in stream CVE-2020-3702: Fix not seen in stream CVE-2020-4788: Fix not seen in stream CVE-2020-8647: Fix not seen in stream @@ -878,6 +885,87 @@ CVE-2021-45469: Fix not seen in stream CVE-2021-45485: Fix not seen in stream CVE-2021-45486: Fix not seen in stream CVE-2021-45868: Fix not seen in stream +CVE-2021-46904: Fix not seen in stream +CVE-2021-46906: Fix not seen in stream +CVE-2021-46908: Fix not seen in stream +CVE-2021-46924: Fix not seen in stream +CVE-2021-46926: Fix not seen in stream +CVE-2021-46928: Fix not seen in stream +CVE-2021-46932: Fix not seen in stream +CVE-2021-46933: Fix not seen in stream +CVE-2021-46936: Fix not seen in stream +CVE-2021-46938: Fix not seen in stream +CVE-2021-46939: Fix not seen in stream +CVE-2021-46950: Fix not seen in stream +CVE-2021-46951: Fix not seen in stream +CVE-2021-46952: Fix not seen in stream +CVE-2021-46959: Fix not seen in stream +CVE-2021-46962: Fix not seen in stream +CVE-2021-46965: Fix not seen in stream +CVE-2021-46969: Fix not seen in stream +CVE-2021-46970: Fix not seen in stream +CVE-2021-46982: Fix not seen in stream +CVE-2021-47006: Fix not seen in stream +CVE-2021-47028: Fix not seen in stream +CVE-2021-47046: Fix not seen in stream +CVE-2021-47052: Fix not seen in stream +CVE-2021-47056: Fix not seen in stream +CVE-2021-47059: Fix not seen in stream +CVE-2021-47065: Fix not seen in stream +CVE-2021-47070: Fix not seen in stream +CVE-2021-47075: Fix not seen in stream +CVE-2021-47076: Fix not seen in stream +CVE-2021-47082: Fix not seen in stream +CVE-2021-47083: Fix not seen in stream +CVE-2021-47086: Fix not seen in stream +CVE-2021-47101: Fix not seen in stream +CVE-2021-47103: Fix not seen in stream +CVE-2021-47110: Fix not seen in stream +CVE-2021-47112: Fix not seen in stream +CVE-2021-47113: Fix not seen in stream +CVE-2021-47114: Fix not seen in stream +CVE-2021-47116: Fix not seen in stream +CVE-2021-47117: Fix not seen in stream +CVE-2021-47118: Fix not seen in stream +CVE-2021-47119: Fix not seen in stream +CVE-2021-47121: Fix not seen in stream +CVE-2021-47122: Fix not seen in stream +CVE-2021-47124: Fix not seen in stream +CVE-2021-47125: Fix not seen in stream +CVE-2021-47128: Fix not seen in stream +CVE-2021-47131: Fix not seen in stream +CVE-2021-47133: Fix not seen in stream +CVE-2021-47135: Fix not seen in stream +CVE-2021-47136: Fix not seen in stream +CVE-2021-47137: Fix not seen in stream +CVE-2021-47140: Fix not seen in stream +CVE-2021-47142: Fix not seen in stream +CVE-2021-47143: Fix not seen in stream +CVE-2021-47144: Fix not seen in stream +CVE-2021-47145: Fix not seen in stream +CVE-2021-47146: Fix not seen in stream +CVE-2021-47147: Fix not seen in stream +CVE-2021-47149: Fix not seen in stream +CVE-2021-47150: Fix not seen in stream +CVE-2021-47151: Fix not seen in stream +CVE-2021-47153: Fix not seen in stream +CVE-2021-47158: Fix not seen in stream +CVE-2021-47159: Fix not seen in stream +CVE-2021-47160: Fix not seen in stream +CVE-2021-47162: Fix not seen in stream +CVE-2021-47163: Fix not seen in stream +CVE-2021-47165: Fix not seen in stream +CVE-2021-47166: Fix not seen in stream +CVE-2021-47167: Fix not seen in stream +CVE-2021-47168: Fix not seen in stream +CVE-2021-47169: Fix not seen in stream +CVE-2021-47170: Fix not seen in stream +CVE-2021-47171: Fix not seen in stream +CVE-2021-47172: Fix not seen in stream +CVE-2021-47173: Fix not seen in stream +CVE-2021-47175: Fix not seen in stream +CVE-2021-47179: Fix not seen in stream +CVE-2021-47180: Fix not seen in stream CVE-2022-0001: Fix not seen in stream CVE-2022-0002: Fix not seen in stream CVE-2022-0168: Fix not seen in stream @@ -1055,6 +1143,9 @@ CVE-2022-4744: Fix not seen in stream CVE-2022-47520: Fix not seen in stream CVE-2022-47929: Fix not seen in stream CVE-2022-48619: Fix not seen in stream +CVE-2022-48626: Fix not seen in stream +CVE-2022-48627: Fix not seen in stream +CVE-2022-48628: Fix not seen in stream CVE-2023-0030: Fix not seen in stream CVE-2023-0047: Fix not seen in stream CVE-2023-0266: Fix not seen in stream @@ -1104,6 +1195,7 @@ CVE-2023-2513: Fix not seen in stream CVE-2023-26545: Fix not seen in stream CVE-2023-26607: Fix not seen in stream CVE-2023-28328: Fix not seen in stream +CVE-2023-28746: Fix not seen in stream CVE-2023-28772: Fix not seen in stream CVE-2023-2985: Fix not seen in stream CVE-2023-3006: Fix not seen in stream @@ -1169,7 +1261,7 @@ CVE-2023-4622: Fix not seen in stream CVE-2023-4623: Fix not seen in stream CVE-2023-46343: Fix not seen in stream CVE-2023-46838: Fix not seen in stream -CVE-2023-47233: Fix unknown +CVE-2023-47233: Fix not seen in stream CVE-2023-4881: Fix not seen in stream CVE-2023-4921: Fix not seen in stream CVE-2023-51043: Fix not seen in stream @@ -1181,30 +1273,116 @@ CVE-2023-51782: Fix not seen in stream CVE-2023-52340: Fix not seen in stream CVE-2023-52429: Fix not seen in stream CVE-2023-52434: Fix not seen in stream -CVE-2023-52435: Fix not seen in stream CVE-2023-52436: Fix not seen in stream CVE-2023-52442: Fix not seen in stream CVE-2023-52444: Fix not seen in stream CVE-2023-52445: Fix not seen in stream CVE-2023-52449: Fix not seen in stream CVE-2023-52451: Fix not seen in stream -CVE-2023-52456: Fix not seen in stream -CVE-2023-52457: Fix not seen in stream CVE-2023-52458: Fix not seen in stream +CVE-2023-52469: Fix not seen in stream +CVE-2023-52470: Fix not seen in stream +CVE-2023-52475: Fix not seen in stream +CVE-2023-52476: Fix not seen in stream +CVE-2023-52477: Fix not seen in stream +CVE-2023-52478: Fix not seen in stream +CVE-2023-52479: Fix not seen in stream +CVE-2023-52480: Fix not seen in stream +CVE-2023-52481: Fix not seen in stream +CVE-2023-52482: Fix not seen in stream +CVE-2023-52484: Fix not seen in stream +CVE-2023-52485: Fix not seen in stream +CVE-2023-52486: Fix not seen in stream +CVE-2023-52488: Fix not seen in stream +CVE-2023-52489: Fix not seen in stream +CVE-2023-52498: Fix not seen in stream +CVE-2023-52500: Fix not seen in stream +CVE-2023-52501: Fix not seen in stream +CVE-2023-52502: Fix not seen in stream +CVE-2023-52506: Fix not seen in stream +CVE-2023-52507: Fix not seen in stream +CVE-2023-52508: Fix not seen in stream +CVE-2023-52509: Fix not seen in stream +CVE-2023-52511: Fix not seen in stream +CVE-2023-52515: Fix not seen in stream +CVE-2023-52516: Fix not seen in stream +CVE-2023-52517: Fix not seen in stream +CVE-2023-52519: Fix not seen in stream +CVE-2023-52522: Fix not seen in stream +CVE-2023-52527: Fix not seen in stream +CVE-2023-52528: Fix not seen in stream +CVE-2023-52531: Fix not seen in stream +CVE-2023-52532: Fix not seen in stream +CVE-2023-52559: Fix not seen in stream +CVE-2023-52561: Fix not seen in stream +CVE-2023-52563: Fix not seen in stream +CVE-2023-52565: Fix not seen in stream +CVE-2023-52566: Fix not seen in stream +CVE-2023-52568: Fix not seen in stream +CVE-2023-52569: Fix not seen in stream +CVE-2023-52571: Fix not seen in stream +CVE-2023-52572: Fix not seen in stream +CVE-2023-52574: Fix not seen in stream +CVE-2023-52578: Fix not seen in stream +CVE-2023-52583: Fix not seen in stream +CVE-2023-52584: Fix not seen in stream +CVE-2023-52585: Fix not seen in stream +CVE-2023-52586: Fix not seen in stream +CVE-2023-52587: Fix not seen in stream +CVE-2023-52588: Fix not seen in stream +CVE-2023-52589: Fix not seen in stream +CVE-2023-52590: Fix not seen in stream +CVE-2023-52591: Fix not seen in stream +CVE-2023-52593: Fix not seen in stream +CVE-2023-52594: Fix not seen in stream +CVE-2023-52595: Fix not seen in stream +CVE-2023-52596: Fix not seen in stream +CVE-2023-52597: Fix not seen in stream +CVE-2023-52598: Fix not seen in stream +CVE-2023-52599: Fix not seen in stream +CVE-2023-52600: Fix not seen in stream +CVE-2023-52601: Fix not seen in stream +CVE-2023-52602: Fix not seen in stream +CVE-2023-52603: Fix not seen in stream +CVE-2023-52604: Fix not seen in stream +CVE-2023-52606: Fix not seen in stream +CVE-2023-52607: Fix not seen in stream +CVE-2023-52609: Fix not seen in stream +CVE-2023-52614: Fix not seen in stream +CVE-2023-52615: Fix not seen in stream +CVE-2023-52617: Fix not seen in stream +CVE-2023-52618: Fix not seen in stream +CVE-2023-52619: Fix not seen in stream +CVE-2023-52620: Fix not seen in stream +CVE-2023-52621: Fix not seen in stream +CVE-2023-52622: Fix not seen in stream +CVE-2023-52623: Fix not seen in stream +CVE-2023-52624: Fix not seen in stream +CVE-2023-52625: Fix not seen in stream +CVE-2023-52628: Fix not seen in stream +CVE-2023-52629: Fix not seen in stream +CVE-2023-52632: Fix not seen in stream +CVE-2023-52633: Fix not seen in stream +CVE-2023-52634: Fix not seen in stream +CVE-2023-52635: Fix not seen in stream +CVE-2023-52638: Fix not seen in stream +CVE-2023-52639: Fix not seen in stream +CVE-2023-52640: Fix not seen in stream +CVE-2023-52641: Fix not seen in stream CVE-2023-5717: Fix not seen in stream CVE-2023-6040: Fix not seen in stream CVE-2023-6240: Fix unknown -CVE-2023-6270: Fix unknown -CVE-2023-6356: Fix unknown +CVE-2023-6270: Fix not seen in stream +CVE-2023-6356: Fix not seen in stream CVE-2023-6535: Fix unknown -CVE-2023-6536: Fix unknown +CVE-2023-6536: Fix not seen in stream CVE-2023-6546: Fix not seen in stream CVE-2023-6606: Fix not seen in stream CVE-2023-6610: Fix not seen in stream CVE-2023-6915: Fix not seen in stream CVE-2023-6931: Fix not seen in stream CVE-2023-6932: Fix not seen in stream -CVE-2023-7042: Fix unknown +CVE-2023-7042: Fix not seen in stream CVE-2023-7192: Fix not seen in stream CVE-2024-0340: Fix not seen in stream CVE-2024-0584: Fix not seen in stream @@ -1213,10 +1391,11 @@ CVE-2024-0775: Fix not seen in stream CVE-2024-1086: Fix not seen in stream CVE-2024-1312: Fix not seen in stream CVE-2024-21803: Fix unknown -CVE-2024-22099: Fix unknown +CVE-2024-2193: Fix unknown +CVE-2024-22099: Fix not seen in stream CVE-2024-22386: Fix unknown -CVE-2024-23196: Fix unknown -CVE-2024-23307: Fix unknown +CVE-2024-23196: Fix not seen in stream +CVE-2024-23307: Fix not seen in stream CVE-2024-23848: Fix unknown CVE-2024-23851: Fix not seen in stream CVE-2024-24855: Fix not seen in stream @@ -1224,16 +1403,102 @@ CVE-2024-24857: Fix unknown CVE-2024-24858: Fix unknown CVE-2024-24859: Fix unknown CVE-2024-24860: Fix not seen in stream -CVE-2024-24861: Fix unknown +CVE-2024-24861: Fix not seen in stream CVE-2024-24864: Fix unknown CVE-2024-25739: Fix unknown CVE-2024-25740: Fix unknown CVE-2024-25741: Fix unknown CVE-2024-25744: Fix not seen in stream -CVE-2024-26584: Fix not seen in stream -CVE-2024-26587: Fix not seen in stream -CVE-2024-26588: Fix not seen in stream -CVE-2024-26591: Fix not seen in stream CVE-2024-26592: Fix not seen in stream CVE-2024-26594: Fix not seen in stream CVE-2024-26598: Fix not seen in stream +CVE-2024-26600: Fix not seen in stream +CVE-2024-26606: Fix not seen in stream +CVE-2024-26614: Fix not seen in stream +CVE-2024-26622: Fix not seen in stream +CVE-2024-26623: Fix not seen in stream +CVE-2024-26625: Fix not seen in stream +CVE-2024-26627: Fix not seen in stream +CVE-2024-26633: Fix not seen in stream +CVE-2024-26635: Fix not seen in stream +CVE-2024-26636: Fix not seen in stream +CVE-2024-26641: Fix not seen in stream +CVE-2024-26642: Fix not seen in stream +CVE-2024-26644: Fix not seen in stream +CVE-2024-26646: Fix not seen in stream +CVE-2024-26647: Fix not seen in stream +CVE-2024-26648: Fix not seen in stream +CVE-2024-26650: Fix not seen in stream +CVE-2024-26651: Fix not seen in stream +CVE-2024-26654: Fix not seen in stream +CVE-2024-26655: Fix not seen in stream +CVE-2024-26656: Fix not seen in stream +CVE-2024-26658: Fix not seen in stream +CVE-2024-26659: Fix not seen in stream +CVE-2024-26664: Fix not seen in stream +CVE-2024-26668: Fix not seen in stream +CVE-2024-26671: Fix not seen in stream +CVE-2024-26672: Fix not seen in stream +CVE-2024-26675: Fix not seen in stream +CVE-2024-26676: Fix not seen in stream +CVE-2024-26677: Fix not seen in stream +CVE-2024-26679: Fix not seen in stream +CVE-2024-26685: Fix not seen in stream +CVE-2024-26686: Fix not seen in stream +CVE-2024-26687: Fix not seen in stream +CVE-2024-26689: Fix not seen in stream +CVE-2024-26691: Fix not seen in stream +CVE-2024-26696: Fix not seen in stream +CVE-2024-26697: Fix not seen in stream +CVE-2024-26699: Fix not seen in stream +CVE-2024-26700: Fix not seen in stream +CVE-2024-26704: Fix not seen in stream +CVE-2024-26706: Fix not seen in stream +CVE-2024-26713: Fix not seen in stream +CVE-2024-26715: Fix not seen in stream +CVE-2024-26719: Fix not seen in stream +CVE-2024-26720: Fix not seen in stream +CVE-2024-26726: Fix not seen in stream +CVE-2024-26733: Fix not seen in stream +CVE-2024-26738: Fix not seen in stream +CVE-2024-26739: Fix not seen in stream +CVE-2024-26743: Fix not seen in stream +CVE-2024-26744: Fix not seen in stream +CVE-2024-26745: Fix not seen in stream +CVE-2024-26748: Fix not seen in stream +CVE-2024-26752: Fix not seen in stream +CVE-2024-26754: Fix not seen in stream +CVE-2024-26756: Fix not seen in stream +CVE-2024-26758: Fix not seen in stream +CVE-2024-26759: Fix not seen in stream +CVE-2024-26763: Fix not seen in stream +CVE-2024-26764: Fix not seen in stream +CVE-2024-26765: Fix not seen in stream +CVE-2024-26766: Fix not seen in stream +CVE-2024-26767: Fix not seen in stream +CVE-2024-26768: Fix not seen in stream +CVE-2024-26769: Fix not seen in stream +CVE-2024-26770: Fix not seen in stream +CVE-2024-26771: Fix not seen in stream +CVE-2024-26772: Fix not seen in stream +CVE-2024-26773: Fix not seen in stream +CVE-2024-26774: Fix not seen in stream +CVE-2024-26775: Fix not seen in stream +CVE-2024-26776: Fix not seen in stream +CVE-2024-26777: Fix not seen in stream +CVE-2024-26778: Fix not seen in stream +CVE-2024-26779: Fix not seen in stream +CVE-2024-26784: Fix not seen in stream +CVE-2024-26789: Fix not seen in stream +CVE-2024-26791: Fix not seen in stream +CVE-2024-26793: Fix not seen in stream +CVE-2024-26797: Fix not seen in stream +CVE-2024-26798: Fix not seen in stream +CVE-2024-26801: Fix not seen in stream +CVE-2024-26802: Fix not seen in stream +CVE-2024-26803: Fix not seen in stream +CVE-2024-26804: Fix not seen in stream +CVE-2024-26805: Fix not seen in stream +CVE-2024-26806: Fix not seen in stream +CVE-2024-26808: Fix not seen in stream +CVE-2024-26809: Fix not seen in stream diff --git a/data/4.7/4.7_security.txt b/data/4.7/4.7_security.txt index 8ccaa2e3a..0b9376618 100644 --- a/data/4.7/4.7_security.txt +++ b/data/4.7/4.7_security.txt @@ -588,6 +588,8 @@ Outstanding CVEs: CVE-2019-2182: (unk) arm64: Enforce BBM for huge IO/VMAP mappings CVE-2019-2213: (unk) binder: fix possible UAF when freeing buffer CVE-2019-2215: (unk) ANDROID: binder: remove waitqueue when thread exits. + CVE-2019-25160: (unk) netlabel: fix out-of-bounds memory accesses + CVE-2019-25162: (unk) i2c: Fix a potential use after free CVE-2019-3459: (unk) Bluetooth: Verify that l2cap_get_conf_opt provides large enough buffer CVE-2019-3460: (unk) Bluetooth: Check L2CAP option sizes returned from l2cap_get_conf_opt CVE-2019-3701: (unk) can: gw: ensure DLC boundaries after CAN frame modification @@ -762,6 +764,11 @@ Outstanding CVEs: CVE-2020-36557: (unk) vt: vt_ioctl: fix VT_DISALLOCATE freeing in-use virtual console CVE-2020-36558: (unk) vt: vt_ioctl: fix race in VT_RESIZEX CVE-2020-36691: (unk) netlink: limit recursion depth in policy validation + CVE-2020-36775: (unk) f2fs: fix to avoid potential deadlock + CVE-2020-36777: (unk) media: dvbdev: Fix memory leak in dvb_media_device_free() + CVE-2020-36780: (unk) i2c: sprd: fix reference leak when pm_runtime_get_sync fails + CVE-2020-36781: (unk) i2c: imx: fix reference leak when pm_runtime_get_sync fails + CVE-2020-36784: (unk) i2c: cadence: fix reference leak when pm_runtime_get_sync fails CVE-2020-3702: (unk) ath: Use safer key clearing with key cache entries CVE-2020-4788: (unk) powerpc/64s: flush L1D on kernel entry CVE-2020-8647: (unk) vgacon: Fix a UAF in vgacon_invert_region @@ -898,6 +905,87 @@ Outstanding CVEs: CVE-2021-45485: (unk) ipv6: use prandom_u32() for ID generation CVE-2021-45486: (unk) inet: use bigger hash table for IP ID generation CVE-2021-45868: (unk) quota: check block number when reading the block in quota file + CVE-2021-46904: (unk) net: hso: fix null-ptr-deref during tty device unregistration + CVE-2021-46906: (unk) HID: usbhid: fix info leak in hid_submit_ctrl + CVE-2021-46908: (unk) bpf: Use correct permission flag for mixed signed bounds arithmetic + CVE-2021-46924: (unk) NFC: st21nfca: Fix memory leak in device probe and remove + CVE-2021-46926: (unk) ALSA: hda: intel-sdw-acpi: harden detection of controller + CVE-2021-46928: (unk) parisc: Clear stale IIR value on instruction access rights trap + CVE-2021-46932: (unk) Input: appletouch - initialize work before device registration + CVE-2021-46933: (unk) usb: gadget: f_fs: Clear ffs_eventfd in ffs_data_clear. + CVE-2021-46936: (unk) net: fix use-after-free in tw_timer_handler + CVE-2021-46938: (unk) dm rq: fix double free of blk_mq_tag_set in dev remove after table load fails + CVE-2021-46939: (unk) tracing: Restructure trace_clock_global() to never block + CVE-2021-46950: (unk) md/raid1: properly indicate failure when ending a failed write request + CVE-2021-46951: (unk) tpm: efi: Use local variable for calculating final log size + CVE-2021-46952: (unk) NFS: fs_context: validate UDP retrans to prevent shift out-of-bounds + CVE-2021-46959: (unk) spi: Fix use-after-free with devm_spi_alloc_* + CVE-2021-46962: (unk) mmc: uniphier-sd: Fix a resource leak in the remove function + CVE-2021-46965: (unk) mtd: physmap: physmap-bt1-rom: Fix unintentional stack access + CVE-2021-46969: (unk) bus: mhi: core: Fix invalid error returning in mhi_queue + CVE-2021-46970: (unk) bus: mhi: pci_generic: Remove WQ_MEM_RECLAIM flag from state workqueue + CVE-2021-46982: (unk) f2fs: compress: fix race condition of overwrite vs truncate + CVE-2021-47006: (unk) ARM: 9064/1: hw_breakpoint: Do not directly check the event's overflow_handler hook + CVE-2021-47028: (unk) mt76: mt7915: fix txrate reporting + CVE-2021-47046: (unk) drm/amd/display: Fix off by one in hdmi_14_process_transaction() + CVE-2021-47052: (unk) crypto: sa2ul - Fix memory leak of rxd + CVE-2021-47056: (unk) crypto: qat - ADF_STATUS_PF_RUNNING should be set after adf_dev_init + CVE-2021-47059: (unk) crypto: sun8i-ss - fix result memory leak on error path + CVE-2021-47065: (unk) rtw88: Fix array overrun in rtw_get_tx_power_params() + CVE-2021-47070: (unk) uio_hv_generic: Fix another memory leak in error handling paths + CVE-2021-47075: (unk) nvmet: fix memory leak in nvmet_alloc_ctrl() + CVE-2021-47076: (unk) RDMA/rxe: Return CQE error if invalid lkey was supplied + CVE-2021-47082: (unk) tun: avoid double free in tun_free_netdev + CVE-2021-47083: (unk) pinctrl: mediatek: fix global-out-of-bounds issue + CVE-2021-47086: (unk) phonet/pep: refuse to enable an unbound pipe + CVE-2021-47101: (unk) asix: fix uninit-value in asix_mdio_read() + CVE-2021-47103: (unk) inet: fully convert sk->sk_rx_dst to RCU rules + CVE-2021-47110: (unk) x86/kvm: Disable kvmclock on all CPUs on shutdown + CVE-2021-47112: (unk) x86/kvm: Teardown PV features on boot CPU as well + CVE-2021-47113: (unk) btrfs: abort in rename_exchange if we fail to insert the second ref + CVE-2021-47114: (unk) ocfs2: fix data corruption by fallocate + CVE-2021-47116: (unk) ext4: fix memory leak in ext4_mb_init_backend on error path. + CVE-2021-47117: (unk) ext4: fix bug on in ext4_es_cache_extent as ext4_split_extent_at failed + CVE-2021-47118: (unk) pid: take a reference when initializing `cad_pid` + CVE-2021-47119: (unk) ext4: fix memory leak in ext4_fill_super + CVE-2021-47121: (unk) net: caif: fix memory leak in cfusbl_device_notify + CVE-2021-47122: (unk) net: caif: fix memory leak in caif_device_notify + CVE-2021-47124: (unk) io_uring: fix link timeout refs + CVE-2021-47125: (unk) sch_htb: fix refcount leak in htb_parent_to_leaf_offload + CVE-2021-47128: (unk) bpf, lockdown, audit: Fix buggy SELinux lockdown permission checks + CVE-2021-47131: (unk) net/tls: Fix use-after-free after the TLS device goes down and up + CVE-2021-47133: (unk) HID: amd_sfh: Fix memory leak in amd_sfh_work + CVE-2021-47135: (unk) mt76: mt7921: fix possible AOOB issue in mt7921_mcu_tx_rate_report + CVE-2021-47136: (unk) net: zero-initialize tc skb extension on allocation + CVE-2021-47137: (unk) net: lantiq: fix memory corruption in RX ring + CVE-2021-47140: (unk) iommu/amd: Clear DMA ops when switching domain + CVE-2021-47142: (unk) drm/amdgpu: Fix a use-after-free + CVE-2021-47143: (unk) net/smc: remove device from smcd_dev_list after failed device_add() + CVE-2021-47144: (unk) drm/amd/amdgpu: fix refcount leak + CVE-2021-47145: (unk) btrfs: do not BUG_ON in link_to_fixup_dir + CVE-2021-47146: (unk) mld: fix panic in mld_newpack() + CVE-2021-47147: (unk) ptp: ocp: Fix a resource leak in an error handling path + CVE-2021-47149: (unk) net: fujitsu: fix potential null-ptr-deref + CVE-2021-47150: (unk) net: fec: fix the potential memory leak in fec_enet_init() + CVE-2021-47151: (unk) interconnect: qcom: bcm-voter: add a missing of_node_put() + CVE-2021-47153: (unk) i2c: i801: Don't generate an interrupt on bus reset + CVE-2021-47158: (unk) net: dsa: sja1105: add error handling in sja1105_setup() + CVE-2021-47159: (unk) net: dsa: fix a crash if ->get_sset_count() fails + CVE-2021-47160: (unk) net: dsa: mt7530: fix VLAN traffic leaks + CVE-2021-47162: (unk) tipc: skb_linearize the head skb when reassembling msgs + CVE-2021-47163: (unk) tipc: wait and exit until all work queues are done + CVE-2021-47165: (unk) drm/meson: fix shutdown crash when component not probed + CVE-2021-47166: (unk) NFS: Don't corrupt the value of pg_bytes_written in nfs_do_recoalesce() + CVE-2021-47167: (unk) NFS: Fix an Oopsable condition in __nfs_pageio_add_request() + CVE-2021-47168: (unk) NFS: fix an incorrect limit in filelayout_decode_layout() + CVE-2021-47169: (unk) serial: rp2: use 'request_firmware' instead of 'request_firmware_nowait' + CVE-2021-47170: (unk) USB: usbfs: Don't WARN about excessively large memory allocations + CVE-2021-47171: (unk) net: usb: fix memory leak in smsc75xx_bind + CVE-2021-47172: (unk) iio: adc: ad7124: Fix potential overflow due to non sequential channel numbers + CVE-2021-47173: (unk) misc/uss720: fix memory leak in uss720_probe + CVE-2021-47175: (unk) net/sched: fq_pie: fix OOB access in the traffic path + CVE-2021-47179: (unk) NFSv4: Fix a NULL pointer dereference in pnfs_mark_matching_lsegs_return() + CVE-2021-47180: (unk) NFC: nci: fix memory leak in nci_allocate_device CVE-2022-0001: (unk) x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE CVE-2022-0002: (unk) x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE CVE-2022-0168: (unk) cifs: fix NULL ptr dereference in smb2_ioctl_query_info() @@ -1075,6 +1163,9 @@ Outstanding CVEs: CVE-2022-47520: (unk) wifi: wilc1000: validate pairwise and authentication suite offsets CVE-2022-47929: (unk) net: sched: disallow noqueue for qdisc classes CVE-2022-48619: (unk) Input: add bounds checking to input_set_capability() + CVE-2022-48626: (unk) moxart: fix potential use-after-free on remove path + CVE-2022-48627: (unk) vt: fix memory overlapping when deleting chars in the buffer + CVE-2022-48628: (unk) ceph: drop messages from MDS when unmounting CVE-2023-0030: (unk) drm/nouveau/mmu: add more general vmm free/node handling functions CVE-2023-0047: (unk) mm, oom: do not trigger out_of_memory from the #PF CVE-2023-0266: (unk) ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF @@ -1124,6 +1215,7 @@ Outstanding CVEs: CVE-2023-26545: (unk) net: mpls: fix stale pointer if allocation fails during device rename CVE-2023-26607: (unk) ntfs: fix out-of-bounds read in ntfs_attr_find() CVE-2023-28328: (unk) media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer() + CVE-2023-28746: (unk) x86/mmio: Disable KVM mitigation when X86_FEATURE_CLEAR_CPU_BUF is set CVE-2023-28772: (unk) seq_buf: Fix overflow in seq_buf_putmem_hex() CVE-2023-2985: (unk) fs: hfsplus: fix UAF issue in hfsplus_put_super CVE-2023-3006: (unk) arm64: Add AMPERE1 to the Spectre-BHB affected list @@ -1189,7 +1281,7 @@ Outstanding CVEs: CVE-2023-4623: (unk) net/sched: sch_hfsc: Ensure inner classes have fsc curve CVE-2023-46343: (unk) nfc: nci: fix possible NULL pointer dereference in send_acknowledge() CVE-2023-46838: (unk) xen-netback: don't produce zero-size SKB frags - CVE-2023-47233: (unk) + CVE-2023-47233: (unk) wifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach CVE-2023-4881: (unk) netfilter: nftables: exthdr: fix 4-byte stack OOB write CVE-2023-4921: (unk) net: sched: sch_qfq: Fix UAF in qfq_dequeue() CVE-2023-51043: (unk) drm/atomic: Fix potential use-after-free in nonblocking commits @@ -1201,30 +1293,116 @@ Outstanding CVEs: CVE-2023-52340: (unk) ipv6: remove max_size check inline with ipv4 CVE-2023-52429: (unk) dm: limit the number of targets and parameter size area CVE-2023-52434: (unk) smb: client: fix potential OOBs in smb2_parse_contexts() - CVE-2023-52435: (unk) net: prevent mss overflow in skb_segment() CVE-2023-52436: (unk) f2fs: explicitly null-terminate the xattr list CVE-2023-52442: (unk) ksmbd: validate session id and tree id in compound request CVE-2023-52444: (unk) f2fs: fix to avoid dirent corruption CVE-2023-52445: (unk) media: pvrusb2: fix use after free on context disconnection CVE-2023-52449: (unk) mtd: Fix gluebi NULL pointer dereference caused by ftl notifier CVE-2023-52451: (unk) powerpc/pseries/memhp: Fix access beyond end of drmem array - CVE-2023-52456: (unk) serial: imx: fix tx statemachine deadlock - CVE-2023-52457: (unk) serial: 8250: omap: Don't skip resource freeing if pm_runtime_resume_and_get() failed CVE-2023-52458: (unk) block: add check that partition length needs to be aligned with block size + CVE-2023-52469: (unk) drivers/amd/pm: fix a use-after-free in kv_parse_power_table + CVE-2023-52470: (unk) drm/radeon: check the alloc_workqueue return value in radeon_crtc_init() + CVE-2023-52475: (unk) Input: powermate - fix use-after-free in powermate_config_complete + CVE-2023-52476: (unk) perf/x86/lbr: Filter vsyscall addresses + CVE-2023-52477: (unk) usb: hub: Guard against accesses to uninitialized BOS descriptors + CVE-2023-52478: (unk) HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect + CVE-2023-52479: (unk) ksmbd: fix uaf in smb20_oplock_break_ack + CVE-2023-52480: (unk) ksmbd: fix race condition between session lookup and expire + CVE-2023-52481: (unk) arm64: errata: Add Cortex-A520 speculative unprivileged load workaround + CVE-2023-52482: (unk) x86/srso: Add SRSO mitigation for Hygon processors + CVE-2023-52484: (unk) iommu/arm-smmu-v3: Fix soft lockup triggered by arm_smmu_mm_invalidate_range + CVE-2023-52485: (unk) drm/amd/display: Wake DMCUB before sending a command + CVE-2023-52486: (unk) drm: Don't unref the same fb many times by mistake due to deadlock handling + CVE-2023-52488: (unk) serial: sc16is7xx: convert from _raw_ to _noinc_ regmap functions for FIFO + CVE-2023-52489: (unk) mm/sparsemem: fix race in accessing memory_section->usage + CVE-2023-52498: (unk) PM: sleep: Fix possible deadlocks in core system-wide PM code + CVE-2023-52500: (unk) scsi: pm80xx: Avoid leaking tags when processing OPC_INB_SET_CONTROLLER_CONFIG command + CVE-2023-52501: (unk) ring-buffer: Do not attempt to read past "commit" + CVE-2023-52502: (unk) net: nfc: fix races in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn() + CVE-2023-52506: (unk) LoongArch: Set all reserved memblocks on Node#0 at initialization + CVE-2023-52507: (unk) nfc: nci: assert requested protocol is valid + CVE-2023-52508: (unk) nvme-fc: Prevent null pointer dereference in nvme_fc_io_getuuid() + CVE-2023-52509: (unk) ravb: Fix use-after-free issue in ravb_tx_timeout_work() + CVE-2023-52511: (unk) spi: sun6i: reduce DMA RX transfer width to single byte + CVE-2023-52515: (unk) RDMA/srp: Do not call scsi_done() from srp_abort() + CVE-2023-52516: (unk) dma-debug: don't call __dma_entry_alloc_check_leak() under free_entries_lock + CVE-2023-52517: (unk) spi: sun6i: fix race between DMA RX transfer completion and RX FIFO drain + CVE-2023-52519: (unk) HID: intel-ish-hid: ipc: Disable and reenable ACPI GPE bit + CVE-2023-52522: (unk) net: fix possible store tearing in neigh_periodic_work() + CVE-2023-52527: (unk) ipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data() + CVE-2023-52528: (unk) net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg + CVE-2023-52531: (unk) wifi: iwlwifi: mvm: Fix a memory corruption issue + CVE-2023-52532: (unk) net: mana: Fix TX CQE error handling + CVE-2023-52559: (unk) iommu/vt-d: Avoid memory allocation in iommu_suspend() + CVE-2023-52561: (unk) arm64: dts: qcom: sdm845-db845c: Mark cont splash memory region as reserved + CVE-2023-52563: (unk) drm/meson: fix memory leak on ->hpd_notify callback + CVE-2023-52565: (unk) media: uvcvideo: Fix OOB read + CVE-2023-52566: (unk) nilfs2: fix potential use after free in nilfs_gccache_submit_read_data() + CVE-2023-52568: (unk) x86/sgx: Resolves SECS reclaim vs. page fault for EAUG race + CVE-2023-52569: (unk) btrfs: remove BUG() after failure to insert delayed dir index item + CVE-2023-52571: (unk) power: supply: rk817: Fix node refcount leak + CVE-2023-52572: (unk) cifs: Fix UAF in cifs_demultiplex_thread() + CVE-2023-52574: (unk) team: fix null-ptr-deref when team device type is changed + CVE-2023-52578: (unk) net: bridge: use DEV_STATS_INC() + CVE-2023-52583: (unk) ceph: fix deadlock or deadcode of misusing dget() + CVE-2023-52584: (unk) spmi: mediatek: Fix UAF on device remove + CVE-2023-52585: (unk) drm/amdgpu: Fix possible NULL dereference in amdgpu_ras_query_error_status_helper() + CVE-2023-52586: (unk) drm/msm/dpu: Add mutex lock in control vblank irq + CVE-2023-52587: (unk) IB/ipoib: Fix mcast list locking + CVE-2023-52588: (unk) f2fs: fix to tag gcing flag on page during block migration + CVE-2023-52589: (unk) media: rkisp1: Fix IRQ disable race issue + CVE-2023-52590: (unk) ocfs2: Avoid touching renamed directory if parent does not change + CVE-2023-52591: (unk) reiserfs: Avoid touching renamed directory if parent does not change + CVE-2023-52593: (unk) wifi: wfx: fix possible NULL pointer dereference in wfx_set_mfp_ap() + CVE-2023-52594: (unk) wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus() + CVE-2023-52595: (unk) wifi: rt2x00: restart beacon queue when hardware reset + CVE-2023-52596: (unk) sysctl: Fix out of bounds access for empty sysctl registers + CVE-2023-52597: (unk) KVM: s390: fix setting of fpc register + CVE-2023-52598: (unk) s390/ptrace: handle setting of fpc register correctly + CVE-2023-52599: (unk) jfs: fix array-index-out-of-bounds in diNewExt + CVE-2023-52600: (unk) jfs: fix uaf in jfs_evict_inode + CVE-2023-52601: (unk) jfs: fix array-index-out-of-bounds in dbAdjTree + CVE-2023-52602: (unk) jfs: fix slab-out-of-bounds Read in dtSearch + CVE-2023-52603: (unk) UBSAN: array-index-out-of-bounds in dtSplitRoot + CVE-2023-52604: (unk) FS:JFS:UBSAN:array-index-out-of-bounds in dbAdjTree + CVE-2023-52606: (unk) powerpc/lib: Validate size for vector operations + CVE-2023-52607: (unk) powerpc/mm: Fix null-pointer dereference in pgtable_cache_add + CVE-2023-52609: (unk) binder: fix race between mmput() and do_exit() + CVE-2023-52614: (unk) PM / devfreq: Fix buffer overflow in trans_stat_show + CVE-2023-52615: (unk) hwrng: core - Fix page fault dead lock on mmap-ed hwrng + CVE-2023-52617: (unk) PCI: switchtec: Fix stdev_release() crash after surprise hot remove + CVE-2023-52618: (unk) block/rnbd-srv: Check for unlikely string overflow + CVE-2023-52619: (unk) pstore/ram: Fix crash when setting number of cpus to an odd number + CVE-2023-52620: (unk) netfilter: nf_tables: disallow timeout for anonymous sets + CVE-2023-52621: (unk) bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers + CVE-2023-52622: (unk) ext4: avoid online resizing failures due to oversized flex bg + CVE-2023-52623: (unk) SUNRPC: Fix a suspicious RCU usage warning + CVE-2023-52624: (unk) drm/amd/display: Wake DMCUB before executing GPINT commands + CVE-2023-52625: (unk) drm/amd/display: Refactor DMCUB enter/exit idle interface + CVE-2023-52628: (unk) netfilter: nftables: exthdr: fix 4-byte stack OOB write + CVE-2023-52629: (unk) sh: push-switch: Reorder cleanup operations to avoid use-after-free bug + CVE-2023-52632: (unk) drm/amdkfd: Fix lock dependency warning with srcu + CVE-2023-52633: (unk) um: time-travel: fix time corruption + CVE-2023-52634: (unk) drm/amd/display: Fix disable_otg_wa logic + CVE-2023-52635: (unk) PM / devfreq: Synchronize devfreq_monitor_[start/stop] + CVE-2023-52638: (unk) can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock + CVE-2023-52639: (unk) KVM: s390: vsie: fix race during shadow creation + CVE-2023-52640: (unk) fs/ntfs3: Fix oob in ntfs_listxattr + CVE-2023-52641: (unk) fs/ntfs3: Add NULL ptr dereference checking at the end of attr_allocate_frame() CVE-2023-5717: (unk) perf: Disallow mis-matched inherited group reads CVE-2023-6040: (unk) netfilter: nf_tables: Reject tables of unsupported family CVE-2023-6240: (unk) - CVE-2023-6270: (unk) - CVE-2023-6356: (unk) + CVE-2023-6270: (unk) aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts + CVE-2023-6356: (unk) nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length CVE-2023-6535: (unk) - CVE-2023-6536: (unk) + CVE-2023-6536: (unk) nvmet-tcp: fix a crash in nvmet_req_complete() CVE-2023-6546: (unk) tty: n_gsm: fix the UAF caused by race condition in gsm_cleanup_mux CVE-2023-6606: (unk) smb: client: fix OOB in smbCalcSize() CVE-2023-6610: (unk) smb: client: fix potential OOB in smb2_dump_detail() CVE-2023-6915: (unk) ida: Fix crash in ida_free when the bitmap is empty CVE-2023-6931: (unk) perf: Fix perf_event_validate_size() CVE-2023-6932: (unk) ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet - CVE-2023-7042: (unk) + CVE-2023-7042: (unk) wifi: ath10k: fix NULL pointer dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev() CVE-2023-7192: (unk) netfilter: ctnetlink: fix possible refcount leak in ctnetlink_create_conntrack() CVE-2024-0340: (unk) vhost: use kzalloc() instead of kmalloc() followed by memset() CVE-2024-0584: (unk) ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet @@ -1233,10 +1411,11 @@ Outstanding CVEs: CVE-2024-1086: (unk) netfilter: nf_tables: reject QUEUE/DROP verdict parameters CVE-2024-1312: (unk) mm: lock_vma_under_rcu() must check vma->anon_vma under vma lock CVE-2024-21803: (unk) - CVE-2024-22099: (unk) + CVE-2024-2193: (unk) + CVE-2024-22099: (unk) Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security CVE-2024-22386: (unk) - CVE-2024-23196: (unk) - CVE-2024-23307: (unk) + CVE-2024-23196: (unk) ALSA: hda: fix a possible null-pointer dereference due to data race in snd_hdac_regmap_sync() + CVE-2024-23307: (unk) md/raid5: fix atomicity violation in raid5_cache_count CVE-2024-23848: (unk) CVE-2024-23851: (unk) dm: limit the number of targets and parameter size area CVE-2024-24855: (unk) scsi: lpfc: Fix a possible data race in lpfc_unregister_fcf_rescan() @@ -1244,16 +1423,102 @@ Outstanding CVEs: CVE-2024-24858: (unk) CVE-2024-24859: (unk) CVE-2024-24860: (unk) Bluetooth: Fix atomicity violation in {min,max}_key_size_set - CVE-2024-24861: (unk) + CVE-2024-24861: (unk) media: xc4000: Fix atomicity violation in xc4000_get_frequency CVE-2024-24864: (unk) CVE-2024-25739: (unk) CVE-2024-25740: (unk) CVE-2024-25741: (unk) CVE-2024-25744: (unk) x86/coco: Disable 32-bit emulation by default on TDX and SEV - CVE-2024-26584: (unk) net: tls: handle backlogging of crypto requests - CVE-2024-26587: (unk) net: netdevsim: don't try to destroy PHC on VFs - CVE-2024-26588: (unk) LoongArch: BPF: Prevent out-of-bounds memory access - CVE-2024-26591: (unk) bpf: Fix re-attachment branch in bpf_tracing_prog_attach CVE-2024-26592: (unk) ksmbd: fix UAF issue in ksmbd_tcp_new_connection() CVE-2024-26594: (unk) ksmbd: validate mech token in session setup CVE-2024-26598: (unk) KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache + CVE-2024-26600: (unk) phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP + CVE-2024-26606: (unk) binder: signal epoll threads of self-work + CVE-2024-26614: (unk) tcp: make sure init the accept_queue's spinlocks once + CVE-2024-26622: (unk) tomoyo: fix UAF write bug in tomoyo_write_control() + CVE-2024-26623: (unk) pds_core: Prevent race issues involving the adminq + CVE-2024-26625: (unk) llc: call sock_orphan() at release time + CVE-2024-26627: (unk) scsi: core: Move scsi_host_busy() out of host lock for waking up EH handler + CVE-2024-26633: (unk) ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim() + CVE-2024-26635: (unk) llc: Drop support for ETH_P_TR_802_2. + CVE-2024-26636: (unk) llc: make llc_ui_sendmsg() more robust against bonding changes + CVE-2024-26641: (unk) ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv() + CVE-2024-26642: (unk) netfilter: nf_tables: disallow anonymous set with timeout flag + CVE-2024-26644: (unk) btrfs: don't abort filesystem when attempting to snapshot deleted subvolume + CVE-2024-26646: (unk) thermal: intel: hfi: Add syscore callbacks for system-wide PM + CVE-2024-26647: (unk) drm/amd/display: Fix late derefrence 'dsc' check in 'link_set_dsc_pps_packet()' + CVE-2024-26648: (unk) drm/amd/display: Fix variable deferencing before NULL check in edp_setup_replay() + CVE-2024-26650: (unk) platform/x86: p2sb: Allow p2sb_bar() calls during PCI device probe + CVE-2024-26651: (unk) sr9800: Add check for usbnet_get_endpoints + CVE-2024-26654: (unk) ALSA: sh: aica: reorder cleanup operations to avoid UAF bugs + CVE-2024-26655: (unk) Fix memory leak in posix_clock_open() + CVE-2024-26656: (unk) drm/amdgpu: fix use-after-free bug + CVE-2024-26658: (unk) bcachefs: grab s_umount only if snapshotting + CVE-2024-26659: (unk) xhci: handle isoc Babble and Buffer Overrun events properly + CVE-2024-26664: (unk) hwmon: (coretemp) Fix out-of-bounds memory access + CVE-2024-26668: (unk) netfilter: nft_limit: reject configurations that cause integer overflow + CVE-2024-26671: (unk) blk-mq: fix IO hang from sbitmap wakeup race + CVE-2024-26672: (unk) drm/amdgpu: Fix variable 'mca_funcs' dereferenced before NULL check in 'amdgpu_mca_smu_get_mca_entry()' + CVE-2024-26675: (unk) ppp_async: limit MRU to 64K + CVE-2024-26676: (unk) af_unix: Call kfree_skb() for dead unix_(sk)->oob_skb in GC. + CVE-2024-26677: (unk) rxrpc: Fix delayed ACKs to not set the reference serial number + CVE-2024-26679: (unk) inet: read sk->sk_family once in inet_recv_error() + CVE-2024-26685: (unk) nilfs2: fix potential bug in end_buffer_async_write + CVE-2024-26686: (unk) fs/proc: do_task_stat: use sig->stats_lock to gather the threads/children stats + CVE-2024-26687: (unk) xen/events: close evtchn after mapping cleanup + CVE-2024-26689: (unk) ceph: prevent use-after-free in encode_cap_msg() + CVE-2024-26691: (unk) KVM: arm64: Fix circular locking dependency + CVE-2024-26696: (unk) nilfs2: fix hang in nilfs_lookup_dirty_data_buffers() + CVE-2024-26697: (unk) nilfs2: fix data corruption in dsync block recovery for small block sizes + CVE-2024-26699: (unk) drm/amd/display: Fix array-index-out-of-bounds in dcn35_clkmgr + CVE-2024-26700: (unk) drm/amd/display: Fix MST Null Ptr for RV + CVE-2024-26704: (unk) ext4: fix double-free of blocks due to wrong extents moved_len + CVE-2024-26706: (unk) parisc: Fix random data corruption from exception handler + CVE-2024-26713: (unk) powerpc/pseries/iommu: Fix iommu initialisation during DLPAR add + CVE-2024-26715: (unk) usb: dwc3: gadget: Fix NULL pointer dereference in dwc3_gadget_suspend + CVE-2024-26719: (unk) nouveau: offload fence uevents work to workqueue + CVE-2024-26720: (unk) mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again + CVE-2024-26726: (unk) btrfs: don't drop extent_map for free space inode on write error + CVE-2024-26733: (unk) arp: Prevent overflow in arp_req_get(). + CVE-2024-26738: (unk) powerpc/pseries/iommu: DLPAR add doesn't completely initialize pci_controller + CVE-2024-26739: (unk) net/sched: act_mirred: don't override retval if we already lost the skb + CVE-2024-26743: (unk) RDMA/qedr: Fix qedr_create_user_qp error flow + CVE-2024-26744: (unk) RDMA/srpt: Support specifying the srpt_service_guid parameter + CVE-2024-26745: (unk) powerpc/pseries/iommu: IOMMU table is not initialized for kdump over SR-IOV + CVE-2024-26748: (unk) usb: cdns3: fix memory double free when handle zero packet + CVE-2024-26752: (unk) l2tp: pass correct message length to ip6_append_data + CVE-2024-26754: (unk) gtp: fix use-after-free and null-ptr-deref in gtp_genl_dump_pdp() + CVE-2024-26756: (unk) md: Don't register sync_thread for reshape directly + CVE-2024-26758: (unk) md: Don't ignore suspended array in md_check_recovery() + CVE-2024-26759: (unk) mm/swap: fix race when skipping swapcache + CVE-2024-26763: (unk) dm-crypt: don't modify the data when using authenticated encryption + CVE-2024-26764: (unk) fs/aio: Restrict kiocb_set_cancel_fn() to I/O submitted via libaio + CVE-2024-26765: (unk) LoongArch: Disable IRQ before init_fn() for nonboot CPUs + CVE-2024-26766: (unk) IB/hfi1: Fix sdma.h tx->num_descs off-by-one error + CVE-2024-26767: (unk) drm/amd/display: fixed integer types and null check locations + CVE-2024-26768: (unk) LoongArch: Change acpi_core_pic[NR_CPUS] to acpi_core_pic[MAX_CORE_PIC] + CVE-2024-26769: (unk) nvmet-fc: avoid deadlock on delete association path + CVE-2024-26770: (unk) HID: nvidia-shield: Add missing null pointer checks to LED initialization + CVE-2024-26771: (unk) dmaengine: ti: edma: Add some null pointer checks to the edma_probe + CVE-2024-26772: (unk) ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal() + CVE-2024-26773: (unk) ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found() + CVE-2024-26774: (unk) ext4: avoid dividing by 0 in mb_update_avg_fragment_size() when block bitmap corrupt + CVE-2024-26775: (unk) aoe: avoid potential deadlock at set_capacity + CVE-2024-26776: (unk) spi: hisi-sfc-v3xx: Return IRQ_NONE if no interrupts were detected + CVE-2024-26777: (unk) fbdev: sis: Error out if pixclock equals zero + CVE-2024-26778: (unk) fbdev: savage: Error out if pixclock equals zero + CVE-2024-26779: (unk) wifi: mac80211: fix race condition on enabling fast-xmit + CVE-2024-26784: (unk) pmdomain: arm: Fix NULL dereference on scmi_perf_domain removal + CVE-2024-26789: (unk) crypto: arm64/neonbs - fix out-of-bounds access on short input + CVE-2024-26791: (unk) btrfs: dev-replace: properly validate device names + CVE-2024-26793: (unk) gtp: fix use-after-free and null-ptr-deref in gtp_newlink() + CVE-2024-26797: (unk) drm/amd/display: Prevent potential buffer overflow in map_hw_resources + CVE-2024-26798: (unk) fbcon: always restore the old font data in fbcon_do_set_font() + CVE-2024-26801: (unk) Bluetooth: Avoid potential use-after-free in hci_error_reset + CVE-2024-26802: (unk) stmmac: Clear variable when destroying workqueue + CVE-2024-26803: (unk) net: veth: clear GRO when clearing XDP even when down + CVE-2024-26804: (unk) net: ip_tunnel: prevent perpetual headroom growth + CVE-2024-26805: (unk) netlink: Fix kernel-infoleak-after-free in __skb_datagram_iter + CVE-2024-26806: (unk) spi: cadence-qspi: remove system-wide suspend helper calls from runtime PM hooks + CVE-2024-26808: (unk) netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain + CVE-2024-26809: (unk) netfilter: nft_set_pipapo: release elements in clone only from destroy path diff --git a/data/4.8/4.8_CVEs.txt b/data/4.8/4.8_CVEs.txt index 84f02e621..79bd3a399 100644 --- a/data/4.8/4.8_CVEs.txt +++ b/data/4.8/4.8_CVEs.txt @@ -563,6 +563,8 @@ CVE-2019-2181: Fix not seen in stream CVE-2019-2182: Fix not seen in stream CVE-2019-2213: Fix not seen in stream CVE-2019-2215: Fix not seen in stream +CVE-2019-25160: Fix not seen in stream +CVE-2019-25162: Fix not seen in stream CVE-2019-3459: Fix not seen in stream CVE-2019-3460: Fix not seen in stream CVE-2019-3701: Fix not seen in stream @@ -742,6 +744,11 @@ CVE-2020-36557: Fix not seen in stream CVE-2020-36558: Fix not seen in stream CVE-2020-36691: Fix not seen in stream CVE-2020-36766: Fix not seen in stream +CVE-2020-36775: Fix not seen in stream +CVE-2020-36777: Fix not seen in stream +CVE-2020-36780: Fix not seen in stream +CVE-2020-36781: Fix not seen in stream +CVE-2020-36784: Fix not seen in stream CVE-2020-3702: Fix not seen in stream CVE-2020-4788: Fix not seen in stream CVE-2020-8647: Fix not seen in stream @@ -882,6 +889,89 @@ CVE-2021-45469: Fix not seen in stream CVE-2021-45485: Fix not seen in stream CVE-2021-45486: Fix not seen in stream CVE-2021-45868: Fix not seen in stream +CVE-2021-46904: Fix not seen in stream +CVE-2021-46906: Fix not seen in stream +CVE-2021-46908: Fix not seen in stream +CVE-2021-46924: Fix not seen in stream +CVE-2021-46926: Fix not seen in stream +CVE-2021-46928: Fix not seen in stream +CVE-2021-46932: Fix not seen in stream +CVE-2021-46933: Fix not seen in stream +CVE-2021-46936: Fix not seen in stream +CVE-2021-46938: Fix not seen in stream +CVE-2021-46939: Fix not seen in stream +CVE-2021-46950: Fix not seen in stream +CVE-2021-46951: Fix not seen in stream +CVE-2021-46952: Fix not seen in stream +CVE-2021-46959: Fix not seen in stream +CVE-2021-46962: Fix not seen in stream +CVE-2021-46965: Fix not seen in stream +CVE-2021-46969: Fix not seen in stream +CVE-2021-46970: Fix not seen in stream +CVE-2021-46982: Fix not seen in stream +CVE-2021-47006: Fix not seen in stream +CVE-2021-47028: Fix not seen in stream +CVE-2021-47046: Fix not seen in stream +CVE-2021-47052: Fix not seen in stream +CVE-2021-47056: Fix not seen in stream +CVE-2021-47059: Fix not seen in stream +CVE-2021-47065: Fix not seen in stream +CVE-2021-47070: Fix not seen in stream +CVE-2021-47074: Fix not seen in stream +CVE-2021-47075: Fix not seen in stream +CVE-2021-47076: Fix not seen in stream +CVE-2021-47078: Fix not seen in stream +CVE-2021-47082: Fix not seen in stream +CVE-2021-47083: Fix not seen in stream +CVE-2021-47086: Fix not seen in stream +CVE-2021-47101: Fix not seen in stream +CVE-2021-47103: Fix not seen in stream +CVE-2021-47110: Fix not seen in stream +CVE-2021-47112: Fix not seen in stream +CVE-2021-47113: Fix not seen in stream +CVE-2021-47114: Fix not seen in stream +CVE-2021-47116: Fix not seen in stream +CVE-2021-47117: Fix not seen in stream +CVE-2021-47118: Fix not seen in stream +CVE-2021-47119: Fix not seen in stream +CVE-2021-47121: Fix not seen in stream +CVE-2021-47122: Fix not seen in stream +CVE-2021-47124: Fix not seen in stream +CVE-2021-47125: Fix not seen in stream +CVE-2021-47128: Fix not seen in stream +CVE-2021-47131: Fix not seen in stream +CVE-2021-47133: Fix not seen in stream +CVE-2021-47135: Fix not seen in stream +CVE-2021-47136: Fix not seen in stream +CVE-2021-47137: Fix not seen in stream +CVE-2021-47140: Fix not seen in stream +CVE-2021-47142: Fix not seen in stream +CVE-2021-47143: Fix not seen in stream +CVE-2021-47144: Fix not seen in stream +CVE-2021-47145: Fix not seen in stream +CVE-2021-47146: Fix not seen in stream +CVE-2021-47147: Fix not seen in stream +CVE-2021-47149: Fix not seen in stream +CVE-2021-47150: Fix not seen in stream +CVE-2021-47151: Fix not seen in stream +CVE-2021-47153: Fix not seen in stream +CVE-2021-47158: Fix not seen in stream +CVE-2021-47159: Fix not seen in stream +CVE-2021-47160: Fix not seen in stream +CVE-2021-47162: Fix not seen in stream +CVE-2021-47163: Fix not seen in stream +CVE-2021-47165: Fix not seen in stream +CVE-2021-47166: Fix not seen in stream +CVE-2021-47167: Fix not seen in stream +CVE-2021-47168: Fix not seen in stream +CVE-2021-47169: Fix not seen in stream +CVE-2021-47170: Fix not seen in stream +CVE-2021-47171: Fix not seen in stream +CVE-2021-47172: Fix not seen in stream +CVE-2021-47173: Fix not seen in stream +CVE-2021-47175: Fix not seen in stream +CVE-2021-47179: Fix not seen in stream +CVE-2021-47180: Fix not seen in stream CVE-2022-0001: Fix not seen in stream CVE-2022-0002: Fix not seen in stream CVE-2022-0168: Fix not seen in stream @@ -1060,6 +1150,9 @@ CVE-2022-4744: Fix not seen in stream CVE-2022-47520: Fix not seen in stream CVE-2022-47929: Fix not seen in stream CVE-2022-48619: Fix not seen in stream +CVE-2022-48626: Fix not seen in stream +CVE-2022-48627: Fix not seen in stream +CVE-2022-48628: Fix not seen in stream CVE-2023-0030: Fix not seen in stream CVE-2023-0047: Fix not seen in stream CVE-2023-0266: Fix not seen in stream @@ -1109,6 +1202,7 @@ CVE-2023-2513: Fix not seen in stream CVE-2023-26545: Fix not seen in stream CVE-2023-26607: Fix not seen in stream CVE-2023-28328: Fix not seen in stream +CVE-2023-28746: Fix not seen in stream CVE-2023-28772: Fix not seen in stream CVE-2023-2985: Fix not seen in stream CVE-2023-3006: Fix not seen in stream @@ -1173,7 +1267,7 @@ CVE-2023-4622: Fix not seen in stream CVE-2023-4623: Fix not seen in stream CVE-2023-46343: Fix not seen in stream CVE-2023-46838: Fix not seen in stream -CVE-2023-47233: Fix unknown +CVE-2023-47233: Fix not seen in stream CVE-2023-4881: Fix not seen in stream CVE-2023-4921: Fix not seen in stream CVE-2023-51043: Fix not seen in stream @@ -1192,24 +1286,111 @@ CVE-2023-52444: Fix not seen in stream CVE-2023-52445: Fix not seen in stream CVE-2023-52449: Fix not seen in stream CVE-2023-52451: Fix not seen in stream -CVE-2023-52456: Fix not seen in stream -CVE-2023-52457: Fix not seen in stream CVE-2023-52458: Fix not seen in stream +CVE-2023-52469: Fix not seen in stream +CVE-2023-52470: Fix not seen in stream +CVE-2023-52475: Fix not seen in stream +CVE-2023-52476: Fix not seen in stream +CVE-2023-52477: Fix not seen in stream +CVE-2023-52478: Fix not seen in stream +CVE-2023-52479: Fix not seen in stream +CVE-2023-52480: Fix not seen in stream +CVE-2023-52481: Fix not seen in stream +CVE-2023-52482: Fix not seen in stream +CVE-2023-52484: Fix not seen in stream +CVE-2023-52485: Fix not seen in stream +CVE-2023-52486: Fix not seen in stream +CVE-2023-52488: Fix not seen in stream +CVE-2023-52489: Fix not seen in stream +CVE-2023-52498: Fix not seen in stream +CVE-2023-52500: Fix not seen in stream +CVE-2023-52501: Fix not seen in stream +CVE-2023-52502: Fix not seen in stream +CVE-2023-52506: Fix not seen in stream +CVE-2023-52507: Fix not seen in stream +CVE-2023-52508: Fix not seen in stream +CVE-2023-52509: Fix not seen in stream +CVE-2023-52511: Fix not seen in stream +CVE-2023-52515: Fix not seen in stream +CVE-2023-52516: Fix not seen in stream +CVE-2023-52517: Fix not seen in stream +CVE-2023-52519: Fix not seen in stream +CVE-2023-52522: Fix not seen in stream +CVE-2023-52527: Fix not seen in stream +CVE-2023-52528: Fix not seen in stream +CVE-2023-52531: Fix not seen in stream +CVE-2023-52532: Fix not seen in stream +CVE-2023-52559: Fix not seen in stream +CVE-2023-52561: Fix not seen in stream +CVE-2023-52563: Fix not seen in stream +CVE-2023-52565: Fix not seen in stream +CVE-2023-52566: Fix not seen in stream +CVE-2023-52568: Fix not seen in stream +CVE-2023-52569: Fix not seen in stream +CVE-2023-52571: Fix not seen in stream +CVE-2023-52572: Fix not seen in stream +CVE-2023-52574: Fix not seen in stream +CVE-2023-52578: Fix not seen in stream +CVE-2023-52583: Fix not seen in stream +CVE-2023-52584: Fix not seen in stream +CVE-2023-52585: Fix not seen in stream +CVE-2023-52586: Fix not seen in stream +CVE-2023-52587: Fix not seen in stream +CVE-2023-52588: Fix not seen in stream +CVE-2023-52589: Fix not seen in stream +CVE-2023-52590: Fix not seen in stream +CVE-2023-52591: Fix not seen in stream +CVE-2023-52593: Fix not seen in stream +CVE-2023-52594: Fix not seen in stream +CVE-2023-52595: Fix not seen in stream +CVE-2023-52596: Fix not seen in stream +CVE-2023-52597: Fix not seen in stream +CVE-2023-52598: Fix not seen in stream +CVE-2023-52599: Fix not seen in stream +CVE-2023-52600: Fix not seen in stream +CVE-2023-52601: Fix not seen in stream +CVE-2023-52602: Fix not seen in stream +CVE-2023-52603: Fix not seen in stream +CVE-2023-52604: Fix not seen in stream +CVE-2023-52606: Fix not seen in stream +CVE-2023-52607: Fix not seen in stream +CVE-2023-52609: Fix not seen in stream +CVE-2023-52614: Fix not seen in stream +CVE-2023-52615: Fix not seen in stream +CVE-2023-52617: Fix not seen in stream +CVE-2023-52618: Fix not seen in stream +CVE-2023-52619: Fix not seen in stream +CVE-2023-52620: Fix not seen in stream +CVE-2023-52621: Fix not seen in stream +CVE-2023-52622: Fix not seen in stream +CVE-2023-52623: Fix not seen in stream +CVE-2023-52624: Fix not seen in stream +CVE-2023-52625: Fix not seen in stream +CVE-2023-52628: Fix not seen in stream +CVE-2023-52629: Fix not seen in stream +CVE-2023-52632: Fix not seen in stream +CVE-2023-52633: Fix not seen in stream +CVE-2023-52634: Fix not seen in stream +CVE-2023-52635: Fix not seen in stream +CVE-2023-52638: Fix not seen in stream +CVE-2023-52639: Fix not seen in stream +CVE-2023-52640: Fix not seen in stream +CVE-2023-52641: Fix not seen in stream CVE-2023-5717: Fix not seen in stream CVE-2023-6040: Fix not seen in stream CVE-2023-6121: Fix not seen in stream CVE-2023-6240: Fix unknown -CVE-2023-6270: Fix unknown -CVE-2023-6356: Fix unknown +CVE-2023-6270: Fix not seen in stream +CVE-2023-6356: Fix not seen in stream CVE-2023-6535: Fix unknown -CVE-2023-6536: Fix unknown +CVE-2023-6536: Fix not seen in stream CVE-2023-6546: Fix not seen in stream CVE-2023-6606: Fix not seen in stream CVE-2023-6610: Fix not seen in stream CVE-2023-6915: Fix not seen in stream CVE-2023-6931: Fix not seen in stream CVE-2023-6932: Fix not seen in stream -CVE-2023-7042: Fix unknown +CVE-2023-7042: Fix not seen in stream CVE-2023-7192: Fix not seen in stream CVE-2024-0340: Fix not seen in stream CVE-2024-0584: Fix not seen in stream @@ -1218,10 +1399,11 @@ CVE-2024-0775: Fix not seen in stream CVE-2024-1086: Fix not seen in stream CVE-2024-1312: Fix not seen in stream CVE-2024-21803: Fix unknown -CVE-2024-22099: Fix unknown +CVE-2024-2193: Fix unknown +CVE-2024-22099: Fix not seen in stream CVE-2024-22386: Fix unknown -CVE-2024-23196: Fix unknown -CVE-2024-23307: Fix unknown +CVE-2024-23196: Fix not seen in stream +CVE-2024-23307: Fix not seen in stream CVE-2024-23848: Fix unknown CVE-2024-23851: Fix not seen in stream CVE-2024-24855: Fix not seen in stream @@ -1229,16 +1411,103 @@ CVE-2024-24857: Fix unknown CVE-2024-24858: Fix unknown CVE-2024-24859: Fix unknown CVE-2024-24860: Fix not seen in stream -CVE-2024-24861: Fix unknown +CVE-2024-24861: Fix not seen in stream CVE-2024-24864: Fix unknown CVE-2024-25739: Fix unknown CVE-2024-25740: Fix unknown CVE-2024-25741: Fix unknown CVE-2024-25744: Fix not seen in stream -CVE-2024-26584: Fix not seen in stream -CVE-2024-26587: Fix not seen in stream -CVE-2024-26588: Fix not seen in stream -CVE-2024-26591: Fix not seen in stream CVE-2024-26592: Fix not seen in stream CVE-2024-26594: Fix not seen in stream CVE-2024-26598: Fix not seen in stream +CVE-2024-26600: Fix not seen in stream +CVE-2024-26606: Fix not seen in stream +CVE-2024-26614: Fix not seen in stream +CVE-2024-26622: Fix not seen in stream +CVE-2024-26623: Fix not seen in stream +CVE-2024-26625: Fix not seen in stream +CVE-2024-26627: Fix not seen in stream +CVE-2024-26633: Fix not seen in stream +CVE-2024-26635: Fix not seen in stream +CVE-2024-26636: Fix not seen in stream +CVE-2024-26641: Fix not seen in stream +CVE-2024-26642: Fix not seen in stream +CVE-2024-26644: Fix not seen in stream +CVE-2024-26646: Fix not seen in stream +CVE-2024-26647: Fix not seen in stream +CVE-2024-26648: Fix not seen in stream +CVE-2024-26650: Fix not seen in stream +CVE-2024-26651: Fix not seen in stream +CVE-2024-26654: Fix not seen in stream +CVE-2024-26655: Fix not seen in stream +CVE-2024-26656: Fix not seen in stream +CVE-2024-26658: Fix not seen in stream +CVE-2024-26659: Fix not seen in stream +CVE-2024-26664: Fix not seen in stream +CVE-2024-26668: Fix not seen in stream +CVE-2024-26671: Fix not seen in stream +CVE-2024-26672: Fix not seen in stream +CVE-2024-26675: Fix not seen in stream +CVE-2024-26676: Fix not seen in stream +CVE-2024-26677: Fix not seen in stream +CVE-2024-26679: Fix not seen in stream +CVE-2024-26685: Fix not seen in stream +CVE-2024-26686: Fix not seen in stream +CVE-2024-26687: Fix not seen in stream +CVE-2024-26689: Fix not seen in stream +CVE-2024-26691: Fix not seen in stream +CVE-2024-26696: Fix not seen in stream +CVE-2024-26697: Fix not seen in stream +CVE-2024-26699: Fix not seen in stream +CVE-2024-26700: Fix not seen in stream +CVE-2024-26704: Fix not seen in stream +CVE-2024-26706: Fix not seen in stream +CVE-2024-26713: Fix not seen in stream +CVE-2024-26715: Fix not seen in stream +CVE-2024-26719: Fix not seen in stream +CVE-2024-26720: Fix not seen in stream +CVE-2024-26726: Fix not seen in stream +CVE-2024-26733: Fix not seen in stream +CVE-2024-26738: Fix not seen in stream +CVE-2024-26739: Fix not seen in stream +CVE-2024-26743: Fix not seen in stream +CVE-2024-26744: Fix not seen in stream +CVE-2024-26745: Fix not seen in stream +CVE-2024-26748: Fix not seen in stream +CVE-2024-26752: Fix not seen in stream +CVE-2024-26754: Fix not seen in stream +CVE-2024-26756: Fix not seen in stream +CVE-2024-26757: Fix not seen in stream +CVE-2024-26758: Fix not seen in stream +CVE-2024-26759: Fix not seen in stream +CVE-2024-26763: Fix not seen in stream +CVE-2024-26764: Fix not seen in stream +CVE-2024-26765: Fix not seen in stream +CVE-2024-26766: Fix not seen in stream +CVE-2024-26767: Fix not seen in stream +CVE-2024-26768: Fix not seen in stream +CVE-2024-26769: Fix not seen in stream +CVE-2024-26770: Fix not seen in stream +CVE-2024-26771: Fix not seen in stream +CVE-2024-26772: Fix not seen in stream +CVE-2024-26773: Fix not seen in stream +CVE-2024-26774: Fix not seen in stream +CVE-2024-26775: Fix not seen in stream +CVE-2024-26776: Fix not seen in stream +CVE-2024-26777: Fix not seen in stream +CVE-2024-26778: Fix not seen in stream +CVE-2024-26779: Fix not seen in stream +CVE-2024-26784: Fix not seen in stream +CVE-2024-26789: Fix not seen in stream +CVE-2024-26791: Fix not seen in stream +CVE-2024-26793: Fix not seen in stream +CVE-2024-26797: Fix not seen in stream +CVE-2024-26798: Fix not seen in stream +CVE-2024-26801: Fix not seen in stream +CVE-2024-26802: Fix not seen in stream +CVE-2024-26803: Fix not seen in stream +CVE-2024-26804: Fix not seen in stream +CVE-2024-26805: Fix not seen in stream +CVE-2024-26806: Fix not seen in stream +CVE-2024-26808: Fix not seen in stream +CVE-2024-26809: Fix not seen in stream diff --git a/data/4.8/4.8_security.txt b/data/4.8/4.8_security.txt index a545f3929..0ccb17430 100644 --- a/data/4.8/4.8_security.txt +++ b/data/4.8/4.8_security.txt @@ -593,6 +593,8 @@ Outstanding CVEs: CVE-2019-2182: (unk) arm64: Enforce BBM for huge IO/VMAP mappings CVE-2019-2213: (unk) binder: fix possible UAF when freeing buffer CVE-2019-2215: (unk) ANDROID: binder: remove waitqueue when thread exits. + CVE-2019-25160: (unk) netlabel: fix out-of-bounds memory accesses + CVE-2019-25162: (unk) i2c: Fix a potential use after free CVE-2019-3459: (unk) Bluetooth: Verify that l2cap_get_conf_opt provides large enough buffer CVE-2019-3460: (unk) Bluetooth: Check L2CAP option sizes returned from l2cap_get_conf_opt CVE-2019-3701: (unk) can: gw: ensure DLC boundaries after CAN frame modification @@ -772,6 +774,11 @@ Outstanding CVEs: CVE-2020-36558: (unk) vt: vt_ioctl: fix race in VT_RESIZEX CVE-2020-36691: (unk) netlink: limit recursion depth in policy validation CVE-2020-36766: (unk) cec-api: prevent leaking memory through hole in structure + CVE-2020-36775: (unk) f2fs: fix to avoid potential deadlock + CVE-2020-36777: (unk) media: dvbdev: Fix memory leak in dvb_media_device_free() + CVE-2020-36780: (unk) i2c: sprd: fix reference leak when pm_runtime_get_sync fails + CVE-2020-36781: (unk) i2c: imx: fix reference leak when pm_runtime_get_sync fails + CVE-2020-36784: (unk) i2c: cadence: fix reference leak when pm_runtime_get_sync fails CVE-2020-3702: (unk) ath: Use safer key clearing with key cache entries CVE-2020-4788: (unk) powerpc/64s: flush L1D on kernel entry CVE-2020-8647: (unk) vgacon: Fix a UAF in vgacon_invert_region @@ -912,6 +919,89 @@ Outstanding CVEs: CVE-2021-45485: (unk) ipv6: use prandom_u32() for ID generation CVE-2021-45486: (unk) inet: use bigger hash table for IP ID generation CVE-2021-45868: (unk) quota: check block number when reading the block in quota file + CVE-2021-46904: (unk) net: hso: fix null-ptr-deref during tty device unregistration + CVE-2021-46906: (unk) HID: usbhid: fix info leak in hid_submit_ctrl + CVE-2021-46908: (unk) bpf: Use correct permission flag for mixed signed bounds arithmetic + CVE-2021-46924: (unk) NFC: st21nfca: Fix memory leak in device probe and remove + CVE-2021-46926: (unk) ALSA: hda: intel-sdw-acpi: harden detection of controller + CVE-2021-46928: (unk) parisc: Clear stale IIR value on instruction access rights trap + CVE-2021-46932: (unk) Input: appletouch - initialize work before device registration + CVE-2021-46933: (unk) usb: gadget: f_fs: Clear ffs_eventfd in ffs_data_clear. + CVE-2021-46936: (unk) net: fix use-after-free in tw_timer_handler + CVE-2021-46938: (unk) dm rq: fix double free of blk_mq_tag_set in dev remove after table load fails + CVE-2021-46939: (unk) tracing: Restructure trace_clock_global() to never block + CVE-2021-46950: (unk) md/raid1: properly indicate failure when ending a failed write request + CVE-2021-46951: (unk) tpm: efi: Use local variable for calculating final log size + CVE-2021-46952: (unk) NFS: fs_context: validate UDP retrans to prevent shift out-of-bounds + CVE-2021-46959: (unk) spi: Fix use-after-free with devm_spi_alloc_* + CVE-2021-46962: (unk) mmc: uniphier-sd: Fix a resource leak in the remove function + CVE-2021-46965: (unk) mtd: physmap: physmap-bt1-rom: Fix unintentional stack access + CVE-2021-46969: (unk) bus: mhi: core: Fix invalid error returning in mhi_queue + CVE-2021-46970: (unk) bus: mhi: pci_generic: Remove WQ_MEM_RECLAIM flag from state workqueue + CVE-2021-46982: (unk) f2fs: compress: fix race condition of overwrite vs truncate + CVE-2021-47006: (unk) ARM: 9064/1: hw_breakpoint: Do not directly check the event's overflow_handler hook + CVE-2021-47028: (unk) mt76: mt7915: fix txrate reporting + CVE-2021-47046: (unk) drm/amd/display: Fix off by one in hdmi_14_process_transaction() + CVE-2021-47052: (unk) crypto: sa2ul - Fix memory leak of rxd + CVE-2021-47056: (unk) crypto: qat - ADF_STATUS_PF_RUNNING should be set after adf_dev_init + CVE-2021-47059: (unk) crypto: sun8i-ss - fix result memory leak on error path + CVE-2021-47065: (unk) rtw88: Fix array overrun in rtw_get_tx_power_params() + CVE-2021-47070: (unk) uio_hv_generic: Fix another memory leak in error handling paths + CVE-2021-47074: (unk) nvme-loop: fix memory leak in nvme_loop_create_ctrl() + CVE-2021-47075: (unk) nvmet: fix memory leak in nvmet_alloc_ctrl() + CVE-2021-47076: (unk) RDMA/rxe: Return CQE error if invalid lkey was supplied + CVE-2021-47078: (unk) RDMA/rxe: Clear all QP fields if creation failed + CVE-2021-47082: (unk) tun: avoid double free in tun_free_netdev + CVE-2021-47083: (unk) pinctrl: mediatek: fix global-out-of-bounds issue + CVE-2021-47086: (unk) phonet/pep: refuse to enable an unbound pipe + CVE-2021-47101: (unk) asix: fix uninit-value in asix_mdio_read() + CVE-2021-47103: (unk) inet: fully convert sk->sk_rx_dst to RCU rules + CVE-2021-47110: (unk) x86/kvm: Disable kvmclock on all CPUs on shutdown + CVE-2021-47112: (unk) x86/kvm: Teardown PV features on boot CPU as well + CVE-2021-47113: (unk) btrfs: abort in rename_exchange if we fail to insert the second ref + CVE-2021-47114: (unk) ocfs2: fix data corruption by fallocate + CVE-2021-47116: (unk) ext4: fix memory leak in ext4_mb_init_backend on error path. + CVE-2021-47117: (unk) ext4: fix bug on in ext4_es_cache_extent as ext4_split_extent_at failed + CVE-2021-47118: (unk) pid: take a reference when initializing `cad_pid` + CVE-2021-47119: (unk) ext4: fix memory leak in ext4_fill_super + CVE-2021-47121: (unk) net: caif: fix memory leak in cfusbl_device_notify + CVE-2021-47122: (unk) net: caif: fix memory leak in caif_device_notify + CVE-2021-47124: (unk) io_uring: fix link timeout refs + CVE-2021-47125: (unk) sch_htb: fix refcount leak in htb_parent_to_leaf_offload + CVE-2021-47128: (unk) bpf, lockdown, audit: Fix buggy SELinux lockdown permission checks + CVE-2021-47131: (unk) net/tls: Fix use-after-free after the TLS device goes down and up + CVE-2021-47133: (unk) HID: amd_sfh: Fix memory leak in amd_sfh_work + CVE-2021-47135: (unk) mt76: mt7921: fix possible AOOB issue in mt7921_mcu_tx_rate_report + CVE-2021-47136: (unk) net: zero-initialize tc skb extension on allocation + CVE-2021-47137: (unk) net: lantiq: fix memory corruption in RX ring + CVE-2021-47140: (unk) iommu/amd: Clear DMA ops when switching domain + CVE-2021-47142: (unk) drm/amdgpu: Fix a use-after-free + CVE-2021-47143: (unk) net/smc: remove device from smcd_dev_list after failed device_add() + CVE-2021-47144: (unk) drm/amd/amdgpu: fix refcount leak + CVE-2021-47145: (unk) btrfs: do not BUG_ON in link_to_fixup_dir + CVE-2021-47146: (unk) mld: fix panic in mld_newpack() + CVE-2021-47147: (unk) ptp: ocp: Fix a resource leak in an error handling path + CVE-2021-47149: (unk) net: fujitsu: fix potential null-ptr-deref + CVE-2021-47150: (unk) net: fec: fix the potential memory leak in fec_enet_init() + CVE-2021-47151: (unk) interconnect: qcom: bcm-voter: add a missing of_node_put() + CVE-2021-47153: (unk) i2c: i801: Don't generate an interrupt on bus reset + CVE-2021-47158: (unk) net: dsa: sja1105: add error handling in sja1105_setup() + CVE-2021-47159: (unk) net: dsa: fix a crash if ->get_sset_count() fails + CVE-2021-47160: (unk) net: dsa: mt7530: fix VLAN traffic leaks + CVE-2021-47162: (unk) tipc: skb_linearize the head skb when reassembling msgs + CVE-2021-47163: (unk) tipc: wait and exit until all work queues are done + CVE-2021-47165: (unk) drm/meson: fix shutdown crash when component not probed + CVE-2021-47166: (unk) NFS: Don't corrupt the value of pg_bytes_written in nfs_do_recoalesce() + CVE-2021-47167: (unk) NFS: Fix an Oopsable condition in __nfs_pageio_add_request() + CVE-2021-47168: (unk) NFS: fix an incorrect limit in filelayout_decode_layout() + CVE-2021-47169: (unk) serial: rp2: use 'request_firmware' instead of 'request_firmware_nowait' + CVE-2021-47170: (unk) USB: usbfs: Don't WARN about excessively large memory allocations + CVE-2021-47171: (unk) net: usb: fix memory leak in smsc75xx_bind + CVE-2021-47172: (unk) iio: adc: ad7124: Fix potential overflow due to non sequential channel numbers + CVE-2021-47173: (unk) misc/uss720: fix memory leak in uss720_probe + CVE-2021-47175: (unk) net/sched: fq_pie: fix OOB access in the traffic path + CVE-2021-47179: (unk) NFSv4: Fix a NULL pointer dereference in pnfs_mark_matching_lsegs_return() + CVE-2021-47180: (unk) NFC: nci: fix memory leak in nci_allocate_device CVE-2022-0001: (unk) x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE CVE-2022-0002: (unk) x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE CVE-2022-0168: (unk) cifs: fix NULL ptr dereference in smb2_ioctl_query_info() @@ -1090,6 +1180,9 @@ Outstanding CVEs: CVE-2022-47520: (unk) wifi: wilc1000: validate pairwise and authentication suite offsets CVE-2022-47929: (unk) net: sched: disallow noqueue for qdisc classes CVE-2022-48619: (unk) Input: add bounds checking to input_set_capability() + CVE-2022-48626: (unk) moxart: fix potential use-after-free on remove path + CVE-2022-48627: (unk) vt: fix memory overlapping when deleting chars in the buffer + CVE-2022-48628: (unk) ceph: drop messages from MDS when unmounting CVE-2023-0030: (unk) drm/nouveau/mmu: add more general vmm free/node handling functions CVE-2023-0047: (unk) mm, oom: do not trigger out_of_memory from the #PF CVE-2023-0266: (unk) ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF @@ -1139,6 +1232,7 @@ Outstanding CVEs: CVE-2023-26545: (unk) net: mpls: fix stale pointer if allocation fails during device rename CVE-2023-26607: (unk) ntfs: fix out-of-bounds read in ntfs_attr_find() CVE-2023-28328: (unk) media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer() + CVE-2023-28746: (unk) x86/mmio: Disable KVM mitigation when X86_FEATURE_CLEAR_CPU_BUF is set CVE-2023-28772: (unk) seq_buf: Fix overflow in seq_buf_putmem_hex() CVE-2023-2985: (unk) fs: hfsplus: fix UAF issue in hfsplus_put_super CVE-2023-3006: (unk) arm64: Add AMPERE1 to the Spectre-BHB affected list @@ -1203,7 +1297,7 @@ Outstanding CVEs: CVE-2023-4623: (unk) net/sched: sch_hfsc: Ensure inner classes have fsc curve CVE-2023-46343: (unk) nfc: nci: fix possible NULL pointer dereference in send_acknowledge() CVE-2023-46838: (unk) xen-netback: don't produce zero-size SKB frags - CVE-2023-47233: (unk) + CVE-2023-47233: (unk) wifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach CVE-2023-4881: (unk) netfilter: nftables: exthdr: fix 4-byte stack OOB write CVE-2023-4921: (unk) net: sched: sch_qfq: Fix UAF in qfq_dequeue() CVE-2023-51043: (unk) drm/atomic: Fix potential use-after-free in nonblocking commits @@ -1222,24 +1316,111 @@ Outstanding CVEs: CVE-2023-52445: (unk) media: pvrusb2: fix use after free on context disconnection CVE-2023-52449: (unk) mtd: Fix gluebi NULL pointer dereference caused by ftl notifier CVE-2023-52451: (unk) powerpc/pseries/memhp: Fix access beyond end of drmem array - CVE-2023-52456: (unk) serial: imx: fix tx statemachine deadlock - CVE-2023-52457: (unk) serial: 8250: omap: Don't skip resource freeing if pm_runtime_resume_and_get() failed CVE-2023-52458: (unk) block: add check that partition length needs to be aligned with block size + CVE-2023-52469: (unk) drivers/amd/pm: fix a use-after-free in kv_parse_power_table + CVE-2023-52470: (unk) drm/radeon: check the alloc_workqueue return value in radeon_crtc_init() + CVE-2023-52475: (unk) Input: powermate - fix use-after-free in powermate_config_complete + CVE-2023-52476: (unk) perf/x86/lbr: Filter vsyscall addresses + CVE-2023-52477: (unk) usb: hub: Guard against accesses to uninitialized BOS descriptors + CVE-2023-52478: (unk) HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect + CVE-2023-52479: (unk) ksmbd: fix uaf in smb20_oplock_break_ack + CVE-2023-52480: (unk) ksmbd: fix race condition between session lookup and expire + CVE-2023-52481: (unk) arm64: errata: Add Cortex-A520 speculative unprivileged load workaround + CVE-2023-52482: (unk) x86/srso: Add SRSO mitigation for Hygon processors + CVE-2023-52484: (unk) iommu/arm-smmu-v3: Fix soft lockup triggered by arm_smmu_mm_invalidate_range + CVE-2023-52485: (unk) drm/amd/display: Wake DMCUB before sending a command + CVE-2023-52486: (unk) drm: Don't unref the same fb many times by mistake due to deadlock handling + CVE-2023-52488: (unk) serial: sc16is7xx: convert from _raw_ to _noinc_ regmap functions for FIFO + CVE-2023-52489: (unk) mm/sparsemem: fix race in accessing memory_section->usage + CVE-2023-52498: (unk) PM: sleep: Fix possible deadlocks in core system-wide PM code + CVE-2023-52500: (unk) scsi: pm80xx: Avoid leaking tags when processing OPC_INB_SET_CONTROLLER_CONFIG command + CVE-2023-52501: (unk) ring-buffer: Do not attempt to read past "commit" + CVE-2023-52502: (unk) net: nfc: fix races in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn() + CVE-2023-52506: (unk) LoongArch: Set all reserved memblocks on Node#0 at initialization + CVE-2023-52507: (unk) nfc: nci: assert requested protocol is valid + CVE-2023-52508: (unk) nvme-fc: Prevent null pointer dereference in nvme_fc_io_getuuid() + CVE-2023-52509: (unk) ravb: Fix use-after-free issue in ravb_tx_timeout_work() + CVE-2023-52511: (unk) spi: sun6i: reduce DMA RX transfer width to single byte + CVE-2023-52515: (unk) RDMA/srp: Do not call scsi_done() from srp_abort() + CVE-2023-52516: (unk) dma-debug: don't call __dma_entry_alloc_check_leak() under free_entries_lock + CVE-2023-52517: (unk) spi: sun6i: fix race between DMA RX transfer completion and RX FIFO drain + CVE-2023-52519: (unk) HID: intel-ish-hid: ipc: Disable and reenable ACPI GPE bit + CVE-2023-52522: (unk) net: fix possible store tearing in neigh_periodic_work() + CVE-2023-52527: (unk) ipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data() + CVE-2023-52528: (unk) net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg + CVE-2023-52531: (unk) wifi: iwlwifi: mvm: Fix a memory corruption issue + CVE-2023-52532: (unk) net: mana: Fix TX CQE error handling + CVE-2023-52559: (unk) iommu/vt-d: Avoid memory allocation in iommu_suspend() + CVE-2023-52561: (unk) arm64: dts: qcom: sdm845-db845c: Mark cont splash memory region as reserved + CVE-2023-52563: (unk) drm/meson: fix memory leak on ->hpd_notify callback + CVE-2023-52565: (unk) media: uvcvideo: Fix OOB read + CVE-2023-52566: (unk) nilfs2: fix potential use after free in nilfs_gccache_submit_read_data() + CVE-2023-52568: (unk) x86/sgx: Resolves SECS reclaim vs. page fault for EAUG race + CVE-2023-52569: (unk) btrfs: remove BUG() after failure to insert delayed dir index item + CVE-2023-52571: (unk) power: supply: rk817: Fix node refcount leak + CVE-2023-52572: (unk) cifs: Fix UAF in cifs_demultiplex_thread() + CVE-2023-52574: (unk) team: fix null-ptr-deref when team device type is changed + CVE-2023-52578: (unk) net: bridge: use DEV_STATS_INC() + CVE-2023-52583: (unk) ceph: fix deadlock or deadcode of misusing dget() + CVE-2023-52584: (unk) spmi: mediatek: Fix UAF on device remove + CVE-2023-52585: (unk) drm/amdgpu: Fix possible NULL dereference in amdgpu_ras_query_error_status_helper() + CVE-2023-52586: (unk) drm/msm/dpu: Add mutex lock in control vblank irq + CVE-2023-52587: (unk) IB/ipoib: Fix mcast list locking + CVE-2023-52588: (unk) f2fs: fix to tag gcing flag on page during block migration + CVE-2023-52589: (unk) media: rkisp1: Fix IRQ disable race issue + CVE-2023-52590: (unk) ocfs2: Avoid touching renamed directory if parent does not change + CVE-2023-52591: (unk) reiserfs: Avoid touching renamed directory if parent does not change + CVE-2023-52593: (unk) wifi: wfx: fix possible NULL pointer dereference in wfx_set_mfp_ap() + CVE-2023-52594: (unk) wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus() + CVE-2023-52595: (unk) wifi: rt2x00: restart beacon queue when hardware reset + CVE-2023-52596: (unk) sysctl: Fix out of bounds access for empty sysctl registers + CVE-2023-52597: (unk) KVM: s390: fix setting of fpc register + CVE-2023-52598: (unk) s390/ptrace: handle setting of fpc register correctly + CVE-2023-52599: (unk) jfs: fix array-index-out-of-bounds in diNewExt + CVE-2023-52600: (unk) jfs: fix uaf in jfs_evict_inode + CVE-2023-52601: (unk) jfs: fix array-index-out-of-bounds in dbAdjTree + CVE-2023-52602: (unk) jfs: fix slab-out-of-bounds Read in dtSearch + CVE-2023-52603: (unk) UBSAN: array-index-out-of-bounds in dtSplitRoot + CVE-2023-52604: (unk) FS:JFS:UBSAN:array-index-out-of-bounds in dbAdjTree + CVE-2023-52606: (unk) powerpc/lib: Validate size for vector operations + CVE-2023-52607: (unk) powerpc/mm: Fix null-pointer dereference in pgtable_cache_add + CVE-2023-52609: (unk) binder: fix race between mmput() and do_exit() + CVE-2023-52614: (unk) PM / devfreq: Fix buffer overflow in trans_stat_show + CVE-2023-52615: (unk) hwrng: core - Fix page fault dead lock on mmap-ed hwrng + CVE-2023-52617: (unk) PCI: switchtec: Fix stdev_release() crash after surprise hot remove + CVE-2023-52618: (unk) block/rnbd-srv: Check for unlikely string overflow + CVE-2023-52619: (unk) pstore/ram: Fix crash when setting number of cpus to an odd number + CVE-2023-52620: (unk) netfilter: nf_tables: disallow timeout for anonymous sets + CVE-2023-52621: (unk) bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers + CVE-2023-52622: (unk) ext4: avoid online resizing failures due to oversized flex bg + CVE-2023-52623: (unk) SUNRPC: Fix a suspicious RCU usage warning + CVE-2023-52624: (unk) drm/amd/display: Wake DMCUB before executing GPINT commands + CVE-2023-52625: (unk) drm/amd/display: Refactor DMCUB enter/exit idle interface + CVE-2023-52628: (unk) netfilter: nftables: exthdr: fix 4-byte stack OOB write + CVE-2023-52629: (unk) sh: push-switch: Reorder cleanup operations to avoid use-after-free bug + CVE-2023-52632: (unk) drm/amdkfd: Fix lock dependency warning with srcu + CVE-2023-52633: (unk) um: time-travel: fix time corruption + CVE-2023-52634: (unk) drm/amd/display: Fix disable_otg_wa logic + CVE-2023-52635: (unk) PM / devfreq: Synchronize devfreq_monitor_[start/stop] + CVE-2023-52638: (unk) can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock + CVE-2023-52639: (unk) KVM: s390: vsie: fix race during shadow creation + CVE-2023-52640: (unk) fs/ntfs3: Fix oob in ntfs_listxattr + CVE-2023-52641: (unk) fs/ntfs3: Add NULL ptr dereference checking at the end of attr_allocate_frame() CVE-2023-5717: (unk) perf: Disallow mis-matched inherited group reads CVE-2023-6040: (unk) netfilter: nf_tables: Reject tables of unsupported family CVE-2023-6121: (unk) nvmet: nul-terminate the NQNs passed in the connect command CVE-2023-6240: (unk) - CVE-2023-6270: (unk) - CVE-2023-6356: (unk) + CVE-2023-6270: (unk) aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts + CVE-2023-6356: (unk) nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length CVE-2023-6535: (unk) - CVE-2023-6536: (unk) + CVE-2023-6536: (unk) nvmet-tcp: fix a crash in nvmet_req_complete() CVE-2023-6546: (unk) tty: n_gsm: fix the UAF caused by race condition in gsm_cleanup_mux CVE-2023-6606: (unk) smb: client: fix OOB in smbCalcSize() CVE-2023-6610: (unk) smb: client: fix potential OOB in smb2_dump_detail() CVE-2023-6915: (unk) ida: Fix crash in ida_free when the bitmap is empty CVE-2023-6931: (unk) perf: Fix perf_event_validate_size() CVE-2023-6932: (unk) ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet - CVE-2023-7042: (unk) + CVE-2023-7042: (unk) wifi: ath10k: fix NULL pointer dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev() CVE-2023-7192: (unk) netfilter: ctnetlink: fix possible refcount leak in ctnetlink_create_conntrack() CVE-2024-0340: (unk) vhost: use kzalloc() instead of kmalloc() followed by memset() CVE-2024-0584: (unk) ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet @@ -1248,10 +1429,11 @@ Outstanding CVEs: CVE-2024-1086: (unk) netfilter: nf_tables: reject QUEUE/DROP verdict parameters CVE-2024-1312: (unk) mm: lock_vma_under_rcu() must check vma->anon_vma under vma lock CVE-2024-21803: (unk) - CVE-2024-22099: (unk) + CVE-2024-2193: (unk) + CVE-2024-22099: (unk) Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security CVE-2024-22386: (unk) - CVE-2024-23196: (unk) - CVE-2024-23307: (unk) + CVE-2024-23196: (unk) ALSA: hda: fix a possible null-pointer dereference due to data race in snd_hdac_regmap_sync() + CVE-2024-23307: (unk) md/raid5: fix atomicity violation in raid5_cache_count CVE-2024-23848: (unk) CVE-2024-23851: (unk) dm: limit the number of targets and parameter size area CVE-2024-24855: (unk) scsi: lpfc: Fix a possible data race in lpfc_unregister_fcf_rescan() @@ -1259,16 +1441,103 @@ Outstanding CVEs: CVE-2024-24858: (unk) CVE-2024-24859: (unk) CVE-2024-24860: (unk) Bluetooth: Fix atomicity violation in {min,max}_key_size_set - CVE-2024-24861: (unk) + CVE-2024-24861: (unk) media: xc4000: Fix atomicity violation in xc4000_get_frequency CVE-2024-24864: (unk) CVE-2024-25739: (unk) CVE-2024-25740: (unk) CVE-2024-25741: (unk) CVE-2024-25744: (unk) x86/coco: Disable 32-bit emulation by default on TDX and SEV - CVE-2024-26584: (unk) net: tls: handle backlogging of crypto requests - CVE-2024-26587: (unk) net: netdevsim: don't try to destroy PHC on VFs - CVE-2024-26588: (unk) LoongArch: BPF: Prevent out-of-bounds memory access - CVE-2024-26591: (unk) bpf: Fix re-attachment branch in bpf_tracing_prog_attach CVE-2024-26592: (unk) ksmbd: fix UAF issue in ksmbd_tcp_new_connection() CVE-2024-26594: (unk) ksmbd: validate mech token in session setup CVE-2024-26598: (unk) KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache + CVE-2024-26600: (unk) phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP + CVE-2024-26606: (unk) binder: signal epoll threads of self-work + CVE-2024-26614: (unk) tcp: make sure init the accept_queue's spinlocks once + CVE-2024-26622: (unk) tomoyo: fix UAF write bug in tomoyo_write_control() + CVE-2024-26623: (unk) pds_core: Prevent race issues involving the adminq + CVE-2024-26625: (unk) llc: call sock_orphan() at release time + CVE-2024-26627: (unk) scsi: core: Move scsi_host_busy() out of host lock for waking up EH handler + CVE-2024-26633: (unk) ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim() + CVE-2024-26635: (unk) llc: Drop support for ETH_P_TR_802_2. + CVE-2024-26636: (unk) llc: make llc_ui_sendmsg() more robust against bonding changes + CVE-2024-26641: (unk) ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv() + CVE-2024-26642: (unk) netfilter: nf_tables: disallow anonymous set with timeout flag + CVE-2024-26644: (unk) btrfs: don't abort filesystem when attempting to snapshot deleted subvolume + CVE-2024-26646: (unk) thermal: intel: hfi: Add syscore callbacks for system-wide PM + CVE-2024-26647: (unk) drm/amd/display: Fix late derefrence 'dsc' check in 'link_set_dsc_pps_packet()' + CVE-2024-26648: (unk) drm/amd/display: Fix variable deferencing before NULL check in edp_setup_replay() + CVE-2024-26650: (unk) platform/x86: p2sb: Allow p2sb_bar() calls during PCI device probe + CVE-2024-26651: (unk) sr9800: Add check for usbnet_get_endpoints + CVE-2024-26654: (unk) ALSA: sh: aica: reorder cleanup operations to avoid UAF bugs + CVE-2024-26655: (unk) Fix memory leak in posix_clock_open() + CVE-2024-26656: (unk) drm/amdgpu: fix use-after-free bug + CVE-2024-26658: (unk) bcachefs: grab s_umount only if snapshotting + CVE-2024-26659: (unk) xhci: handle isoc Babble and Buffer Overrun events properly + CVE-2024-26664: (unk) hwmon: (coretemp) Fix out-of-bounds memory access + CVE-2024-26668: (unk) netfilter: nft_limit: reject configurations that cause integer overflow + CVE-2024-26671: (unk) blk-mq: fix IO hang from sbitmap wakeup race + CVE-2024-26672: (unk) drm/amdgpu: Fix variable 'mca_funcs' dereferenced before NULL check in 'amdgpu_mca_smu_get_mca_entry()' + CVE-2024-26675: (unk) ppp_async: limit MRU to 64K + CVE-2024-26676: (unk) af_unix: Call kfree_skb() for dead unix_(sk)->oob_skb in GC. + CVE-2024-26677: (unk) rxrpc: Fix delayed ACKs to not set the reference serial number + CVE-2024-26679: (unk) inet: read sk->sk_family once in inet_recv_error() + CVE-2024-26685: (unk) nilfs2: fix potential bug in end_buffer_async_write + CVE-2024-26686: (unk) fs/proc: do_task_stat: use sig->stats_lock to gather the threads/children stats + CVE-2024-26687: (unk) xen/events: close evtchn after mapping cleanup + CVE-2024-26689: (unk) ceph: prevent use-after-free in encode_cap_msg() + CVE-2024-26691: (unk) KVM: arm64: Fix circular locking dependency + CVE-2024-26696: (unk) nilfs2: fix hang in nilfs_lookup_dirty_data_buffers() + CVE-2024-26697: (unk) nilfs2: fix data corruption in dsync block recovery for small block sizes + CVE-2024-26699: (unk) drm/amd/display: Fix array-index-out-of-bounds in dcn35_clkmgr + CVE-2024-26700: (unk) drm/amd/display: Fix MST Null Ptr for RV + CVE-2024-26704: (unk) ext4: fix double-free of blocks due to wrong extents moved_len + CVE-2024-26706: (unk) parisc: Fix random data corruption from exception handler + CVE-2024-26713: (unk) powerpc/pseries/iommu: Fix iommu initialisation during DLPAR add + CVE-2024-26715: (unk) usb: dwc3: gadget: Fix NULL pointer dereference in dwc3_gadget_suspend + CVE-2024-26719: (unk) nouveau: offload fence uevents work to workqueue + CVE-2024-26720: (unk) mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again + CVE-2024-26726: (unk) btrfs: don't drop extent_map for free space inode on write error + CVE-2024-26733: (unk) arp: Prevent overflow in arp_req_get(). + CVE-2024-26738: (unk) powerpc/pseries/iommu: DLPAR add doesn't completely initialize pci_controller + CVE-2024-26739: (unk) net/sched: act_mirred: don't override retval if we already lost the skb + CVE-2024-26743: (unk) RDMA/qedr: Fix qedr_create_user_qp error flow + CVE-2024-26744: (unk) RDMA/srpt: Support specifying the srpt_service_guid parameter + CVE-2024-26745: (unk) powerpc/pseries/iommu: IOMMU table is not initialized for kdump over SR-IOV + CVE-2024-26748: (unk) usb: cdns3: fix memory double free when handle zero packet + CVE-2024-26752: (unk) l2tp: pass correct message length to ip6_append_data + CVE-2024-26754: (unk) gtp: fix use-after-free and null-ptr-deref in gtp_genl_dump_pdp() + CVE-2024-26756: (unk) md: Don't register sync_thread for reshape directly + CVE-2024-26757: (unk) md: Don't ignore read-only array in md_check_recovery() + CVE-2024-26758: (unk) md: Don't ignore suspended array in md_check_recovery() + CVE-2024-26759: (unk) mm/swap: fix race when skipping swapcache + CVE-2024-26763: (unk) dm-crypt: don't modify the data when using authenticated encryption + CVE-2024-26764: (unk) fs/aio: Restrict kiocb_set_cancel_fn() to I/O submitted via libaio + CVE-2024-26765: (unk) LoongArch: Disable IRQ before init_fn() for nonboot CPUs + CVE-2024-26766: (unk) IB/hfi1: Fix sdma.h tx->num_descs off-by-one error + CVE-2024-26767: (unk) drm/amd/display: fixed integer types and null check locations + CVE-2024-26768: (unk) LoongArch: Change acpi_core_pic[NR_CPUS] to acpi_core_pic[MAX_CORE_PIC] + CVE-2024-26769: (unk) nvmet-fc: avoid deadlock on delete association path + CVE-2024-26770: (unk) HID: nvidia-shield: Add missing null pointer checks to LED initialization + CVE-2024-26771: (unk) dmaengine: ti: edma: Add some null pointer checks to the edma_probe + CVE-2024-26772: (unk) ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal() + CVE-2024-26773: (unk) ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found() + CVE-2024-26774: (unk) ext4: avoid dividing by 0 in mb_update_avg_fragment_size() when block bitmap corrupt + CVE-2024-26775: (unk) aoe: avoid potential deadlock at set_capacity + CVE-2024-26776: (unk) spi: hisi-sfc-v3xx: Return IRQ_NONE if no interrupts were detected + CVE-2024-26777: (unk) fbdev: sis: Error out if pixclock equals zero + CVE-2024-26778: (unk) fbdev: savage: Error out if pixclock equals zero + CVE-2024-26779: (unk) wifi: mac80211: fix race condition on enabling fast-xmit + CVE-2024-26784: (unk) pmdomain: arm: Fix NULL dereference on scmi_perf_domain removal + CVE-2024-26789: (unk) crypto: arm64/neonbs - fix out-of-bounds access on short input + CVE-2024-26791: (unk) btrfs: dev-replace: properly validate device names + CVE-2024-26793: (unk) gtp: fix use-after-free and null-ptr-deref in gtp_newlink() + CVE-2024-26797: (unk) drm/amd/display: Prevent potential buffer overflow in map_hw_resources + CVE-2024-26798: (unk) fbcon: always restore the old font data in fbcon_do_set_font() + CVE-2024-26801: (unk) Bluetooth: Avoid potential use-after-free in hci_error_reset + CVE-2024-26802: (unk) stmmac: Clear variable when destroying workqueue + CVE-2024-26803: (unk) net: veth: clear GRO when clearing XDP even when down + CVE-2024-26804: (unk) net: ip_tunnel: prevent perpetual headroom growth + CVE-2024-26805: (unk) netlink: Fix kernel-infoleak-after-free in __skb_datagram_iter + CVE-2024-26806: (unk) spi: cadence-qspi: remove system-wide suspend helper calls from runtime PM hooks + CVE-2024-26808: (unk) netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain + CVE-2024-26809: (unk) netfilter: nft_set_pipapo: release elements in clone only from destroy path diff --git a/data/4.9/4.9_CVEs.txt b/data/4.9/4.9_CVEs.txt index 727e47e7a..434b39ce2 100644 --- a/data/4.9/4.9_CVEs.txt +++ b/data/4.9/4.9_CVEs.txt @@ -561,6 +561,8 @@ CVE-2019-2181: Fix not seen in stream CVE-2019-2182: Fixed with 4.9.211 CVE-2019-2213: Fix not seen in stream CVE-2019-2215: Fixed with 4.9.196 +CVE-2019-25160: Fixed with 4.9.163 +CVE-2019-25162: Fix not seen in stream CVE-2019-3459: Fixed with 4.9.167 CVE-2019-3460: Fixed with 4.9.167 CVE-2019-3701: Fixed with 4.9.152 @@ -741,6 +743,11 @@ CVE-2020-36557: Fixed with 4.9.218 CVE-2020-36558: Fixed with 4.9.215 CVE-2020-36691: Fix not seen in stream CVE-2020-36766: Fixed with 4.9.235 +CVE-2020-36775: Fix not seen in stream +CVE-2020-36777: Fixed with 4.9.269 +CVE-2020-36780: Fix not seen in stream +CVE-2020-36781: Fix not seen in stream +CVE-2020-36784: Fix not seen in stream CVE-2020-3702: Fixed with 4.9.283 CVE-2020-4788: Fixed with 4.9.245 CVE-2020-8647: Fixed with 4.9.216 @@ -881,6 +888,92 @@ CVE-2021-45469: Fix not seen in stream CVE-2021-45485: Fixed with 4.9.276 CVE-2021-45486: Fixed with 4.9.274 CVE-2021-45868: Fixed with 4.9.291 +CVE-2021-46904: Fixed with 4.9.268 +CVE-2021-46906: Fixed with 4.9.274 +CVE-2021-46908: Fix not seen in stream +CVE-2021-46924: Fix not seen in stream +CVE-2021-46926: Fix not seen in stream +CVE-2021-46928: Fix not seen in stream +CVE-2021-46932: Fixed with 4.9.296 +CVE-2021-46933: Fixed with 4.9.296 +CVE-2021-46936: Fixed with 4.9.296 +CVE-2021-46938: Fixed with 4.9.269 +CVE-2021-46939: Fixed with 4.9.269 +CVE-2021-46950: Fix not seen in stream +CVE-2021-46951: Fix not seen in stream +CVE-2021-46952: Fix not seen in stream +CVE-2021-46959: Fix not seen in stream +CVE-2021-46962: Fix not seen in stream +CVE-2021-46965: Fix not seen in stream +CVE-2021-46969: Fix not seen in stream +CVE-2021-46970: Fix not seen in stream +CVE-2021-46982: Fix not seen in stream +CVE-2021-46992: Fix not seen in stream +CVE-2021-47006: Fixed with 4.9.269 +CVE-2021-47013: Fixed with 4.9.269 +CVE-2021-47028: Fix not seen in stream +CVE-2021-47046: Fix not seen in stream +CVE-2021-47052: Fix not seen in stream +CVE-2021-47054: Fixed with 4.9.269 +CVE-2021-47056: Fixed with 4.9.269 +CVE-2021-47059: Fix not seen in stream +CVE-2021-47065: Fix not seen in stream +CVE-2021-47070: Fix not seen in stream +CVE-2021-47074: Fix not seen in stream +CVE-2021-47075: Fix not seen in stream +CVE-2021-47076: Fix not seen in stream +CVE-2021-47078: Fixed with 4.9.270 +CVE-2021-47082: Fix not seen in stream +CVE-2021-47083: Fix not seen in stream +CVE-2021-47086: Fixed with 4.9.295 +CVE-2021-47101: Fix not seen in stream +CVE-2021-47103: Fixed with 4.9.331 +CVE-2021-47110: Fix not seen in stream +CVE-2021-47112: Fix not seen in stream +CVE-2021-47113: Fix not seen in stream +CVE-2021-47114: Fixed with 4.9.272 +CVE-2021-47116: Fix not seen in stream +CVE-2021-47117: Fixed with 4.9.272 +CVE-2021-47118: Fixed with 4.9.272 +CVE-2021-47119: Fix not seen in stream +CVE-2021-47121: Fixed with 4.9.272 +CVE-2021-47122: Fixed with 4.9.272 +CVE-2021-47124: Fix not seen in stream +CVE-2021-47125: Fix not seen in stream +CVE-2021-47128: Fix not seen in stream +CVE-2021-47131: Fix not seen in stream +CVE-2021-47133: Fix not seen in stream +CVE-2021-47135: Fix not seen in stream +CVE-2021-47136: Fix not seen in stream +CVE-2021-47137: Fix not seen in stream +CVE-2021-47140: Fix not seen in stream +CVE-2021-47142: Fixed with 4.9.271 +CVE-2021-47143: Fix not seen in stream +CVE-2021-47144: Fix not seen in stream +CVE-2021-47145: Fixed with 4.9.271 +CVE-2021-47146: Fixed with 4.9.271 +CVE-2021-47147: Fix not seen in stream +CVE-2021-47149: Fixed with 4.9.271 +CVE-2021-47150: Fix not seen in stream +CVE-2021-47151: Fix not seen in stream +CVE-2021-47153: Fixed with 4.9.271 +CVE-2021-47158: Fix not seen in stream +CVE-2021-47159: Fix not seen in stream +CVE-2021-47160: Fix not seen in stream +CVE-2021-47162: Fixed with 4.9.271 +CVE-2021-47163: Fix not seen in stream +CVE-2021-47165: Fix not seen in stream +CVE-2021-47166: Fixed with 4.9.271 +CVE-2021-47167: Fix not seen in stream +CVE-2021-47168: Fixed with 4.9.271 +CVE-2021-47169: Fixed with 4.9.271 +CVE-2021-47170: Fix not seen in stream +CVE-2021-47171: Fixed with 4.9.271 +CVE-2021-47172: Fix not seen in stream +CVE-2021-47173: Fixed with 4.9.271 +CVE-2021-47175: Fix not seen in stream +CVE-2021-47179: Fixed with 4.9.271 +CVE-2021-47180: Fixed with 4.9.271 CVE-2022-0001: Fixed with 4.9.306 CVE-2022-0002: Fixed with 4.9.306 CVE-2022-0168: Fix not seen in stream @@ -1059,6 +1152,9 @@ CVE-2022-4744: Fix not seen in stream CVE-2022-47520: Fix not seen in stream CVE-2022-47929: Fix not seen in stream CVE-2022-48619: Fixed with 4.9.316 +CVE-2022-48626: Fixed with 4.9.301 +CVE-2022-48627: Fix not seen in stream +CVE-2022-48628: Fix not seen in stream CVE-2023-0030: Fix not seen in stream CVE-2023-0047: Fixed with 4.9.291 CVE-2023-0266: Fix not seen in stream @@ -1111,6 +1207,7 @@ CVE-2023-2513: Fixed with 4.9.326 CVE-2023-26545: Fix not seen in stream CVE-2023-26607: Fixed with 4.9.334 CVE-2023-28328: Fixed with 4.9.337 +CVE-2023-28746: Fix not seen in stream CVE-2023-28772: Fixed with 4.9.276 CVE-2023-2985: Fix not seen in stream CVE-2023-3006: Fix not seen in stream @@ -1177,7 +1274,7 @@ CVE-2023-4622: Fix not seen in stream CVE-2023-4623: Fix not seen in stream CVE-2023-46343: Fix not seen in stream CVE-2023-46838: Fix not seen in stream -CVE-2023-47233: Fix unknown +CVE-2023-47233: Fix not seen in stream CVE-2023-4881: Fix not seen in stream CVE-2023-4921: Fix not seen in stream CVE-2023-51043: Fix not seen in stream @@ -1196,24 +1293,111 @@ CVE-2023-52444: Fix not seen in stream CVE-2023-52445: Fix not seen in stream CVE-2023-52449: Fix not seen in stream CVE-2023-52451: Fix not seen in stream -CVE-2023-52456: Fix not seen in stream -CVE-2023-52457: Fix not seen in stream CVE-2023-52458: Fix not seen in stream +CVE-2023-52469: Fix not seen in stream +CVE-2023-52470: Fix not seen in stream +CVE-2023-52475: Fix not seen in stream +CVE-2023-52476: Fix not seen in stream +CVE-2023-52477: Fix not seen in stream +CVE-2023-52478: Fix not seen in stream +CVE-2023-52479: Fix not seen in stream +CVE-2023-52480: Fix not seen in stream +CVE-2023-52481: Fix not seen in stream +CVE-2023-52482: Fix not seen in stream +CVE-2023-52484: Fix not seen in stream +CVE-2023-52485: Fix not seen in stream +CVE-2023-52486: Fix not seen in stream +CVE-2023-52488: Fix not seen in stream +CVE-2023-52489: Fix not seen in stream +CVE-2023-52498: Fix not seen in stream +CVE-2023-52500: Fix not seen in stream +CVE-2023-52501: Fix not seen in stream +CVE-2023-52502: Fix not seen in stream +CVE-2023-52506: Fix not seen in stream +CVE-2023-52507: Fix not seen in stream +CVE-2023-52508: Fix not seen in stream +CVE-2023-52509: Fix not seen in stream +CVE-2023-52511: Fix not seen in stream +CVE-2023-52515: Fix not seen in stream +CVE-2023-52516: Fix not seen in stream +CVE-2023-52517: Fix not seen in stream +CVE-2023-52519: Fix not seen in stream +CVE-2023-52522: Fix not seen in stream +CVE-2023-52527: Fix not seen in stream +CVE-2023-52528: Fix not seen in stream +CVE-2023-52531: Fix not seen in stream +CVE-2023-52532: Fix not seen in stream +CVE-2023-52559: Fix not seen in stream +CVE-2023-52561: Fix not seen in stream +CVE-2023-52563: Fix not seen in stream +CVE-2023-52565: Fix not seen in stream +CVE-2023-52566: Fix not seen in stream +CVE-2023-52568: Fix not seen in stream +CVE-2023-52569: Fix not seen in stream +CVE-2023-52571: Fix not seen in stream +CVE-2023-52572: Fix not seen in stream +CVE-2023-52574: Fix not seen in stream +CVE-2023-52578: Fix not seen in stream +CVE-2023-52583: Fix not seen in stream +CVE-2023-52584: Fix not seen in stream +CVE-2023-52585: Fix not seen in stream +CVE-2023-52586: Fix not seen in stream +CVE-2023-52587: Fix not seen in stream +CVE-2023-52588: Fix not seen in stream +CVE-2023-52589: Fix not seen in stream +CVE-2023-52590: Fix not seen in stream +CVE-2023-52591: Fix not seen in stream +CVE-2023-52593: Fix not seen in stream +CVE-2023-52594: Fix not seen in stream +CVE-2023-52595: Fix not seen in stream +CVE-2023-52596: Fix not seen in stream +CVE-2023-52597: Fix not seen in stream +CVE-2023-52598: Fix not seen in stream +CVE-2023-52599: Fix not seen in stream +CVE-2023-52600: Fix not seen in stream +CVE-2023-52601: Fix not seen in stream +CVE-2023-52602: Fix not seen in stream +CVE-2023-52603: Fix not seen in stream +CVE-2023-52604: Fix not seen in stream +CVE-2023-52606: Fix not seen in stream +CVE-2023-52607: Fix not seen in stream +CVE-2023-52609: Fix not seen in stream +CVE-2023-52614: Fix not seen in stream +CVE-2023-52615: Fix not seen in stream +CVE-2023-52617: Fix not seen in stream +CVE-2023-52618: Fix not seen in stream +CVE-2023-52619: Fix not seen in stream +CVE-2023-52620: Fix not seen in stream +CVE-2023-52621: Fix not seen in stream +CVE-2023-52622: Fix not seen in stream +CVE-2023-52623: Fix not seen in stream +CVE-2023-52624: Fix not seen in stream +CVE-2023-52625: Fix not seen in stream +CVE-2023-52628: Fix not seen in stream +CVE-2023-52629: Fix not seen in stream +CVE-2023-52632: Fix not seen in stream +CVE-2023-52633: Fix not seen in stream +CVE-2023-52634: Fix not seen in stream +CVE-2023-52635: Fix not seen in stream +CVE-2023-52638: Fix not seen in stream +CVE-2023-52639: Fix not seen in stream +CVE-2023-52640: Fix not seen in stream +CVE-2023-52641: Fix not seen in stream CVE-2023-5717: Fix not seen in stream CVE-2023-6040: Fix not seen in stream CVE-2023-6121: Fix not seen in stream CVE-2023-6240: Fix unknown -CVE-2023-6270: Fix unknown -CVE-2023-6356: Fix unknown +CVE-2023-6270: Fix not seen in stream +CVE-2023-6356: Fix not seen in stream CVE-2023-6535: Fix unknown -CVE-2023-6536: Fix unknown +CVE-2023-6536: Fix not seen in stream CVE-2023-6546: Fix not seen in stream CVE-2023-6606: Fix not seen in stream CVE-2023-6610: Fix not seen in stream CVE-2023-6915: Fix not seen in stream CVE-2023-6931: Fix not seen in stream CVE-2023-6932: Fix not seen in stream -CVE-2023-7042: Fix unknown +CVE-2023-7042: Fix not seen in stream CVE-2023-7192: Fix not seen in stream CVE-2024-0340: Fix not seen in stream CVE-2024-0584: Fix not seen in stream @@ -1222,10 +1406,11 @@ CVE-2024-0775: Fix not seen in stream CVE-2024-1086: Fix not seen in stream CVE-2024-1312: Fix not seen in stream CVE-2024-21803: Fix unknown -CVE-2024-22099: Fix unknown +CVE-2024-2193: Fix unknown +CVE-2024-22099: Fix not seen in stream CVE-2024-22386: Fix unknown -CVE-2024-23196: Fix unknown -CVE-2024-23307: Fix unknown +CVE-2024-23196: Fix not seen in stream +CVE-2024-23307: Fix not seen in stream CVE-2024-23848: Fix unknown CVE-2024-23851: Fix not seen in stream CVE-2024-24855: Fix not seen in stream @@ -1233,16 +1418,104 @@ CVE-2024-24857: Fix unknown CVE-2024-24858: Fix unknown CVE-2024-24859: Fix unknown CVE-2024-24860: Fix not seen in stream -CVE-2024-24861: Fix unknown +CVE-2024-24861: Fix not seen in stream CVE-2024-24864: Fix unknown CVE-2024-25739: Fix unknown CVE-2024-25740: Fix unknown CVE-2024-25741: Fix unknown CVE-2024-25744: Fix not seen in stream -CVE-2024-26584: Fix not seen in stream -CVE-2024-26587: Fix not seen in stream -CVE-2024-26588: Fix not seen in stream -CVE-2024-26591: Fix not seen in stream CVE-2024-26592: Fix not seen in stream CVE-2024-26594: Fix not seen in stream CVE-2024-26598: Fix not seen in stream +CVE-2024-26600: Fix not seen in stream +CVE-2024-26606: Fix not seen in stream +CVE-2024-26614: Fix not seen in stream +CVE-2024-26622: Fix not seen in stream +CVE-2024-26623: Fix not seen in stream +CVE-2024-26625: Fix not seen in stream +CVE-2024-26627: Fix not seen in stream +CVE-2024-26633: Fix not seen in stream +CVE-2024-26635: Fix not seen in stream +CVE-2024-26636: Fix not seen in stream +CVE-2024-26641: Fix not seen in stream +CVE-2024-26642: Fix not seen in stream +CVE-2024-26644: Fix not seen in stream +CVE-2024-26646: Fix not seen in stream +CVE-2024-26647: Fix not seen in stream +CVE-2024-26648: Fix not seen in stream +CVE-2024-26650: Fix not seen in stream +CVE-2024-26651: Fix not seen in stream +CVE-2024-26654: Fix not seen in stream +CVE-2024-26655: Fix not seen in stream +CVE-2024-26656: Fix not seen in stream +CVE-2024-26658: Fix not seen in stream +CVE-2024-26659: Fix not seen in stream +CVE-2024-26663: Fix not seen in stream +CVE-2024-26664: Fix not seen in stream +CVE-2024-26668: Fix not seen in stream +CVE-2024-26671: Fix not seen in stream +CVE-2024-26672: Fix not seen in stream +CVE-2024-26675: Fix not seen in stream +CVE-2024-26676: Fix not seen in stream +CVE-2024-26677: Fix not seen in stream +CVE-2024-26679: Fix not seen in stream +CVE-2024-26685: Fix not seen in stream +CVE-2024-26686: Fix not seen in stream +CVE-2024-26687: Fix not seen in stream +CVE-2024-26689: Fix not seen in stream +CVE-2024-26691: Fix not seen in stream +CVE-2024-26696: Fix not seen in stream +CVE-2024-26697: Fix not seen in stream +CVE-2024-26699: Fix not seen in stream +CVE-2024-26700: Fix not seen in stream +CVE-2024-26704: Fix not seen in stream +CVE-2024-26706: Fix not seen in stream +CVE-2024-26713: Fix not seen in stream +CVE-2024-26715: Fix not seen in stream +CVE-2024-26719: Fix not seen in stream +CVE-2024-26720: Fix not seen in stream +CVE-2024-26726: Fix not seen in stream +CVE-2024-26733: Fix not seen in stream +CVE-2024-26738: Fix not seen in stream +CVE-2024-26739: Fix not seen in stream +CVE-2024-26743: Fix not seen in stream +CVE-2024-26744: Fix not seen in stream +CVE-2024-26745: Fix not seen in stream +CVE-2024-26748: Fix not seen in stream +CVE-2024-26752: Fix not seen in stream +CVE-2024-26754: Fix not seen in stream +CVE-2024-26756: Fix not seen in stream +CVE-2024-26757: Fix not seen in stream +CVE-2024-26758: Fix not seen in stream +CVE-2024-26759: Fix not seen in stream +CVE-2024-26763: Fix not seen in stream +CVE-2024-26764: Fix not seen in stream +CVE-2024-26765: Fix not seen in stream +CVE-2024-26766: Fix not seen in stream +CVE-2024-26767: Fix not seen in stream +CVE-2024-26768: Fix not seen in stream +CVE-2024-26769: Fix not seen in stream +CVE-2024-26770: Fix not seen in stream +CVE-2024-26771: Fix not seen in stream +CVE-2024-26772: Fix not seen in stream +CVE-2024-26773: Fix not seen in stream +CVE-2024-26774: Fix not seen in stream +CVE-2024-26775: Fix not seen in stream +CVE-2024-26776: Fix not seen in stream +CVE-2024-26777: Fix not seen in stream +CVE-2024-26778: Fix not seen in stream +CVE-2024-26779: Fix not seen in stream +CVE-2024-26784: Fix not seen in stream +CVE-2024-26789: Fix not seen in stream +CVE-2024-26791: Fix not seen in stream +CVE-2024-26793: Fix not seen in stream +CVE-2024-26797: Fix not seen in stream +CVE-2024-26798: Fix not seen in stream +CVE-2024-26801: Fix not seen in stream +CVE-2024-26802: Fix not seen in stream +CVE-2024-26803: Fix not seen in stream +CVE-2024-26804: Fix not seen in stream +CVE-2024-26805: Fix not seen in stream +CVE-2024-26806: Fix not seen in stream +CVE-2024-26808: Fix not seen in stream +CVE-2024-26809: Fix not seen in stream diff --git a/data/4.9/4.9_security.txt b/data/4.9/4.9_security.txt index 9cb8291dd..f4733b5c2 100644 --- a/data/4.9/4.9_security.txt +++ b/data/4.9/4.9_security.txt @@ -589,6 +589,7 @@ CVEs fixed in 4.9.163: CVE-2019-12818: 05d3d2d0b8574d0f61d12a64e2c6475a5c3d5ba6 net: nfc: Fix NULL dereference on nfc_llcp_build_tlv fails CVE-2019-15916: d81778b842536c9437acb43138f3fc8520b1b12c net-sysfs: Fix mem leak in netdev_register_kobject CVE-2019-2101: 47d77d464e574d56eecb39677df7bc6663635a3f media: uvcvideo: Fix 'type' check leading to overflow + CVE-2019-25160: 1c973f9c7cc2b3caae93192fdc8ecb3f0b4ac000 netlabel: fix out-of-bounds memory accesses CVE-2019-8980: dd6734e17903f16a47c78d0418f02e06df080c54 exec: Fix mem leak in kernel_read_file CVEs fixed in 4.9.164: @@ -1082,17 +1083,28 @@ CVEs fixed in 4.9.267: CVE-2021-22555: 0c58c9f9c5c5326320bbe0429a0f45fc1b92024b netfilter: x_tables: fix compat match/target pad out-of-bound write CVE-2021-3659: c3883480ce4ebe5b13dbfdc9f2c6503bc9e8ab69 net: mac802154: Fix general protection fault +CVEs fixed in 4.9.268: + CVE-2021-46904: 145c89c441d27696961752bf51b323f347601bee net: hso: fix null-ptr-deref during tty device unregistration + CVEs fixed in 4.9.269: CVE-2017-0605: 27b1e95a936e23a9328e1f318c199d3946352531 tracing: Use strlcpy() instead of strcpy() in __trace_find_cmdline() + CVE-2020-36777: 06854b943e0571ccbd7ad0a529babed1a98ff275 media: dvbdev: Fix memory leak in dvb_media_device_free() CVE-2021-31916: c13f07341685149cfbc2014e8b4a85ff56d4ae0e dm ioctl: fix out of bounds array access when no devices CVE-2021-32399: 34f1f8aecf16798c91154e0f6d56b4f804a39bd1 bluetooth: eliminate the potential race condition when removing the HCI controller CVE-2021-33034: 31f20a6e73663c8ac3c625aa6b24cbdc8541c674 Bluetooth: verify AMP hci_chan before amp_destroy CVE-2021-4157: c621f3654bba1096ec913d0942e27bd032bb6090 pNFS/flexfiles: fix incorrect size check in decode_nfs_fh() + CVE-2021-46938: 8ae0185255eaf05bd66f4215c81e99bf01140fd9 dm rq: fix double free of blk_mq_tag_set in dev remove after table load fails + CVE-2021-46939: 859b47a43f5a0e5b9a92b621dc6ceaad39fb5c8b tracing: Restructure trace_clock_global() to never block + CVE-2021-47006: 555a70f7fff03bd669123487905c47ae27dbdaac ARM: 9064/1: hw_breakpoint: Do not directly check the event's overflow_handler hook + CVE-2021-47013: c7f75d11fe72913d2619f97b2334b083cd7bb955 net:emac/emac-mac: Fix a use after free in emac_mac_tx_buf_send + CVE-2021-47054: a6191e91c10e50bd51db65a00e03d02b6b0cf8c4 bus: qcom: Put child node before return + CVE-2021-47056: f4c4e07140687f42bfa40e091bb4a55d7960ce4d crypto: qat - ADF_STATUS_PF_RUNNING should be set after adf_dev_init CVEs fixed in 4.9.270: CVE-2020-26555: 6555a006b21ab49090b9a7b36e92d0421db19328 Bluetooth: SMP: Fail if remote and local public keys are identical CVE-2020-26558: 6555a006b21ab49090b9a7b36e92d0421db19328 Bluetooth: SMP: Fail if remote and local public keys are identical CVE-2021-0129: 6555a006b21ab49090b9a7b36e92d0421db19328 Bluetooth: SMP: Fail if remote and local public keys are identical + CVE-2021-47078: c65391dd9f0a47617e96e38bd27e277cbe1c40b0 RDMA/rxe: Clear all QP fields if creation failed CVEs fixed in 4.9.271: CVE-2020-24586: bb47466456af2f1ac7ab48e5e69d4d8e0dd361e8 mac80211: prevent mixed key and fragment cache attacks @@ -1102,16 +1114,35 @@ CVEs fixed in 4.9.271: CVE-2020-26147: 29bc5b2bccf5f5601cabf9562454f213fb8dcd67 mac80211: assure all fragments are encrypted CVE-2021-29650: e2a2d6c9accf3c3cdf44990c03498e86f27d5ea3 netfilter: x_tables: Use correct memory barriers. CVE-2021-34981: 77c559407276ed4a8854dafc4a5efc8608e51906 Bluetooth: cmtp: fix file refcount when cmtp_attach_device fails + CVE-2021-47142: 3293cf3513d69f00c14d43e2020826d45ea0e46a drm/amdgpu: Fix a use-after-free + CVE-2021-47145: e934c4ee17b33bafb0444f2f9766cda7166d3c40 btrfs: do not BUG_ON in link_to_fixup_dir + CVE-2021-47146: 17728616a4c85baf0edc975c60ba4e4157684d9a mld: fix panic in mld_newpack() + CVE-2021-47149: 6dbf1101594f7c76990b63c35b5a40205a914b6b net: fujitsu: fix potential null-ptr-deref + CVE-2021-47153: 09c9e79f4c10cfb6b9e0e1b4dd355232e4b5a3b3 i2c: i801: Don't generate an interrupt on bus reset + CVE-2021-47162: 5489f30bb78ff0dafb4229a69632afc2ba20765c tipc: skb_linearize the head skb when reassembling msgs + CVE-2021-47166: b291baae24f876acd5a5dd57d0bb2bbac8a68b0c NFS: Don't corrupt the value of pg_bytes_written in nfs_do_recoalesce() + CVE-2021-47168: b287521e9e94bb342ebe5fd8c3fd7db9aef4e6f1 NFS: fix an incorrect limit in filelayout_decode_layout() + CVE-2021-47169: c697244ce940ec07e2d745ccb63ca97fc0266fbc serial: rp2: use 'request_firmware' instead of 'request_firmware_nowait' + CVE-2021-47171: 22c840596af0c09068b6cf948616e6496e59e07f net: usb: fix memory leak in smsc75xx_bind + CVE-2021-47173: 7889c70e6173ef358f3cd7578db127a489035a42 misc/uss720: fix memory leak in uss720_probe + CVE-2021-47179: 4e1ba532dbc1a0e19fc2458d74ab8d98680c4e42 NFSv4: Fix a NULL pointer dereference in pnfs_mark_matching_lsegs_return() + CVE-2021-47180: 4a621621c7af3cec21c47c349b30cd9c3cea11c8 NFC: nci: fix memory leak in nci_allocate_device CVEs fixed in 4.9.272: CVE-2021-3564: 75aa7baab3e18a98f232f14dd9cc6965bcf9b31a Bluetooth: fix the erroneous flush_work() order CVE-2021-3573: 3c62132da179fd30531958d51c68ba4915996556 Bluetooth: use correct lock to prevent UAF of hdev object CVE-2021-3587: 39c15bd2e5d11bcf7f4c3dba2aad9e1e110a5d94 nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect CVE-2021-38208: 39c15bd2e5d11bcf7f4c3dba2aad9e1e110a5d94 nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect + CVE-2021-47114: 33e03adafb29eedae1bae9cdb50c1385279fcf65 ocfs2: fix data corruption by fallocate + CVE-2021-47117: 5b3a9a2be59478b013a430ac57b0f3d65471b071 ext4: fix bug on in ext4_es_cache_extent as ext4_split_extent_at failed + CVE-2021-47118: f86c80515a8a3703e0ca2e56deb50fc2879c5ea4 pid: take a reference when initializing `cad_pid` + CVE-2021-47121: 81afc61cb6e2b553f2c5f992fa79e0ae73857141 net: caif: fix memory leak in cfusbl_device_notify + CVE-2021-47122: 9348c1f10932f13b299cbc8b1bd5f780751fae49 net: caif: fix memory leak in caif_device_notify CVEs fixed in 4.9.274: CVE-2021-34693: d240a28396e08023987384ce80bc940bb38ac779 can: bcm: fix infoleak in struct bcm_msg_head CVE-2021-45486: 0889f0a3bb2de535f48424491d8f9d5954a3cde8 inet: use bigger hash table for IP ID generation + CVE-2021-46906: 41b1e71a2c57366b08dcca1a28b0d45ca69429ce HID: usbhid: fix info leak in hid_submit_ctrl CVEs fixed in 4.9.276: CVE-2021-33909: c5157b3e775dac31d51b11f993a06a84dc11fc8c seq_file: disallow extremely large seq buffer allocations @@ -1196,8 +1227,14 @@ CVEs fixed in 4.9.294: CVE-2021-28715: b4226b387436315e7f57465c15335f4f4b5b075d xen/netback: don't queue unlimited number of packages CVEs fixed in 4.9.295: + CVE-2021-47086: b10c7d745615a092a50c2e03ce70446d2bec2aca phonet/pep: refuse to enable an unbound pipe CVE-2022-1195: 83ba6ec97c74fb1a60f7779a26b6a94b28741d8a hamradio: improve the incomplete fix to avoid NPD +CVEs fixed in 4.9.296: + CVE-2021-46932: d1962f263a176f493400b8f91bfbf2bfedce951e Input: appletouch - initialize work before device registration + CVE-2021-46933: cc8c8028c21b2a3842a1e98e99e55028df275919 usb: gadget: f_fs: Clear ffs_eventfd in ffs_data_clear. + CVE-2021-46936: e73164e89d1be561228a4534e1091369ee4ba41a net: fix use-after-free in tw_timer_handler + CVEs fixed in 4.9.297: CVE-2021-4155: 19e3d9a26f28f432ae89acec22ec47b2a72a502c xfs: map unwritten blocks in XFS_IOC_{ALLOC,FREE}SP just like fallocate CVE-2021-45095: 3bae29ecb2909c46309671090311230239f1bdd7 phonet: refcount leak in pep_sock_accep @@ -1226,6 +1263,7 @@ CVEs fixed in 4.9.301: CVE-2022-0435: 175db196e45d6f0e6047eccd09c8ba55465eb131 tipc: improve size validations for received domain records CVE-2022-0487: f5dc193167591e88797262ec78515a0cbe79ff5f moxart: fix potential use-after-free on remove path CVE-2022-0492: 7e33a0ad792f04bad920c7197bda8cc2ea08d304 cgroup-v1: Require capabilities to set release_agent + CVE-2022-48626: f5dc193167591e88797262ec78515a0cbe79ff5f moxart: fix potential use-after-free on remove path CVEs fixed in 4.9.302: CVE-2022-25258: f3bcd744b0bc8dcc6cdb3ac5be20f54aecfb78a4 USB: gadget: validate interface OS descriptor requests @@ -1355,6 +1393,7 @@ CVEs fixed in 4.9.330: CVE-2022-39842: a0dcaa48042a56a9eee2efed19563866a0ddbce2 video: fbdev: pxa3xx-gcu: Fix integer overflow in pxa3xx_gcu_write CVEs fixed in 4.9.331: + CVE-2021-47103: 68c34ce11ef23328692aa35fa6aaafdd75913100 inet: fully convert sk->sk_rx_dst to RCU rules CVE-2022-2978: d1ff475d7c83289d0a7faef346ea3bbf90818bad fs: fix UAF/GPF bug in nilfs_mdt_destroy CVE-2022-3542: 9ec3f783f08b57a861700fdf4d3d8f3cfb68f471 bnx2x: fix potential memory leak in bnx2x_tpa_stop() CVE-2022-3565: 1ba21168faf881c23c270605834d01af260cbb72 mISDN: fix use-after-free bugs in l1oip timer handlers @@ -1472,6 +1511,7 @@ Outstanding CVEs: CVE-2019-20908: (unk) efi: Restrict efivar_ssdt_load when the kernel is locked down CVE-2019-2181: (unk) binder: check for overflow when alloc for security context CVE-2019-2213: (unk) binder: fix possible UAF when freeing buffer + CVE-2019-25162: (unk) i2c: Fix a potential use after free CVE-2019-3874: (unk) sctp: implement memory accounting on tx path CVE-2019-5489: (unk) Change mincore() to count "mapped" pages rather than "cached" pages CVE-2019-7308: (unk) bpf: fix sanitation of alu op with pointer / scalar type from different paths @@ -1512,6 +1552,10 @@ Outstanding CVEs: CVE-2020-36313: (unk) KVM: Fix out of range accesses to memslots CVE-2020-36385: (unk) RDMA/ucma: Rework ucma_migrate_id() to avoid races with destroy CVE-2020-36691: (unk) netlink: limit recursion depth in policy validation + CVE-2020-36775: (unk) f2fs: fix to avoid potential deadlock + CVE-2020-36780: (unk) i2c: sprd: fix reference leak when pm_runtime_get_sync fails + CVE-2020-36781: (unk) i2c: imx: fix reference leak when pm_runtime_get_sync fails + CVE-2020-36784: (unk) i2c: cadence: fix reference leak when pm_runtime_get_sync fails CVE-2020-8832: (unk) drm/i915: Record the default hw state after reset upon load CVE-2020-8834: (unk) KVM: PPC: Book3S HV: Factor fake-suspend handling out of kvmppc_save/restore_tm CVE-2021-0399: (unk) @@ -1546,6 +1590,60 @@ Outstanding CVEs: CVE-2021-43975: (unk) atlantic: Fix OOB read and write in hw_atl_utils_fw_rpc_wait CVE-2021-44879: (unk) f2fs: fix to do sanity check on inode type during garbage collection CVE-2021-45469: (unk) f2fs: fix to do sanity check on last xattr entry in __f2fs_setxattr() + CVE-2021-46908: (unk) bpf: Use correct permission flag for mixed signed bounds arithmetic + CVE-2021-46924: (unk) NFC: st21nfca: Fix memory leak in device probe and remove + CVE-2021-46926: (unk) ALSA: hda: intel-sdw-acpi: harden detection of controller + CVE-2021-46928: (unk) parisc: Clear stale IIR value on instruction access rights trap + CVE-2021-46950: (unk) md/raid1: properly indicate failure when ending a failed write request + CVE-2021-46951: (unk) tpm: efi: Use local variable for calculating final log size + CVE-2021-46952: (unk) NFS: fs_context: validate UDP retrans to prevent shift out-of-bounds + CVE-2021-46959: (unk) spi: Fix use-after-free with devm_spi_alloc_* + CVE-2021-46962: (unk) mmc: uniphier-sd: Fix a resource leak in the remove function + CVE-2021-46965: (unk) mtd: physmap: physmap-bt1-rom: Fix unintentional stack access + CVE-2021-46969: (unk) bus: mhi: core: Fix invalid error returning in mhi_queue + CVE-2021-46970: (unk) bus: mhi: pci_generic: Remove WQ_MEM_RECLAIM flag from state workqueue + CVE-2021-46982: (unk) f2fs: compress: fix race condition of overwrite vs truncate + CVE-2021-46992: (unk) netfilter: nftables: avoid overflows in nft_hash_buckets() + CVE-2021-47028: (unk) mt76: mt7915: fix txrate reporting + CVE-2021-47046: (unk) drm/amd/display: Fix off by one in hdmi_14_process_transaction() + CVE-2021-47052: (unk) crypto: sa2ul - Fix memory leak of rxd + CVE-2021-47059: (unk) crypto: sun8i-ss - fix result memory leak on error path + CVE-2021-47065: (unk) rtw88: Fix array overrun in rtw_get_tx_power_params() + CVE-2021-47070: (unk) uio_hv_generic: Fix another memory leak in error handling paths + CVE-2021-47074: (unk) nvme-loop: fix memory leak in nvme_loop_create_ctrl() + CVE-2021-47075: (unk) nvmet: fix memory leak in nvmet_alloc_ctrl() + CVE-2021-47076: (unk) RDMA/rxe: Return CQE error if invalid lkey was supplied + CVE-2021-47082: (unk) tun: avoid double free in tun_free_netdev + CVE-2021-47083: (unk) pinctrl: mediatek: fix global-out-of-bounds issue + CVE-2021-47101: (unk) asix: fix uninit-value in asix_mdio_read() + CVE-2021-47110: (unk) x86/kvm: Disable kvmclock on all CPUs on shutdown + CVE-2021-47112: (unk) x86/kvm: Teardown PV features on boot CPU as well + CVE-2021-47113: (unk) btrfs: abort in rename_exchange if we fail to insert the second ref + CVE-2021-47116: (unk) ext4: fix memory leak in ext4_mb_init_backend on error path. + CVE-2021-47119: (unk) ext4: fix memory leak in ext4_fill_super + CVE-2021-47124: (unk) io_uring: fix link timeout refs + CVE-2021-47125: (unk) sch_htb: fix refcount leak in htb_parent_to_leaf_offload + CVE-2021-47128: (unk) bpf, lockdown, audit: Fix buggy SELinux lockdown permission checks + CVE-2021-47131: (unk) net/tls: Fix use-after-free after the TLS device goes down and up + CVE-2021-47133: (unk) HID: amd_sfh: Fix memory leak in amd_sfh_work + CVE-2021-47135: (unk) mt76: mt7921: fix possible AOOB issue in mt7921_mcu_tx_rate_report + CVE-2021-47136: (unk) net: zero-initialize tc skb extension on allocation + CVE-2021-47137: (unk) net: lantiq: fix memory corruption in RX ring + CVE-2021-47140: (unk) iommu/amd: Clear DMA ops when switching domain + CVE-2021-47143: (unk) net/smc: remove device from smcd_dev_list after failed device_add() + CVE-2021-47144: (unk) drm/amd/amdgpu: fix refcount leak + CVE-2021-47147: (unk) ptp: ocp: Fix a resource leak in an error handling path + CVE-2021-47150: (unk) net: fec: fix the potential memory leak in fec_enet_init() + CVE-2021-47151: (unk) interconnect: qcom: bcm-voter: add a missing of_node_put() + CVE-2021-47158: (unk) net: dsa: sja1105: add error handling in sja1105_setup() + CVE-2021-47159: (unk) net: dsa: fix a crash if ->get_sset_count() fails + CVE-2021-47160: (unk) net: dsa: mt7530: fix VLAN traffic leaks + CVE-2021-47163: (unk) tipc: wait and exit until all work queues are done + CVE-2021-47165: (unk) drm/meson: fix shutdown crash when component not probed + CVE-2021-47167: (unk) NFS: Fix an Oopsable condition in __nfs_pageio_add_request() + CVE-2021-47170: (unk) USB: usbfs: Don't WARN about excessively large memory allocations + CVE-2021-47172: (unk) iio: adc: ad7124: Fix potential overflow due to non sequential channel numbers + CVE-2021-47175: (unk) net/sched: fq_pie: fix OOB access in the traffic path CVE-2022-0168: (unk) cifs: fix NULL ptr dereference in smb2_ioctl_query_info() CVE-2022-0382: (unk) net ticp:fix a kernel-infoleak in __tipc_sendmsg() CVE-2022-0400: (unk) @@ -1619,6 +1717,8 @@ Outstanding CVEs: CVE-2022-4744: (unk) tun: avoid double free in tun_free_netdev CVE-2022-47520: (unk) wifi: wilc1000: validate pairwise and authentication suite offsets CVE-2022-47929: (unk) net: sched: disallow noqueue for qdisc classes + CVE-2022-48627: (unk) vt: fix memory overlapping when deleting chars in the buffer + CVE-2022-48628: (unk) ceph: drop messages from MDS when unmounting CVE-2023-0030: (unk) drm/nouveau/mmu: add more general vmm free/node handling functions CVE-2023-0266: (unk) ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF CVE-2023-0386: (unk) ovl: fail on invalid uid/gid mapping at copy up @@ -1664,6 +1764,7 @@ Outstanding CVEs: CVE-2023-23559: (unk) wifi: rndis_wlan: Prevent buffer overflow in rndis_query_oid CVE-2023-2483: (unk) net: qcom/emac: Fix use after free bug in emac_remove due to race condition CVE-2023-26545: (unk) net: mpls: fix stale pointer if allocation fails during device rename + CVE-2023-28746: (unk) x86/mmio: Disable KVM mitigation when X86_FEATURE_CLEAR_CPU_BUF is set CVE-2023-2985: (unk) fs: hfsplus: fix UAF issue in hfsplus_put_super CVE-2023-3006: (unk) arm64: Add AMPERE1 to the Spectre-BHB affected list CVE-2023-3022: (unk) ipv6: Use result arg in fib_lookup_arg consistently @@ -1725,7 +1826,7 @@ Outstanding CVEs: CVE-2023-4623: (unk) net/sched: sch_hfsc: Ensure inner classes have fsc curve CVE-2023-46343: (unk) nfc: nci: fix possible NULL pointer dereference in send_acknowledge() CVE-2023-46838: (unk) xen-netback: don't produce zero-size SKB frags - CVE-2023-47233: (unk) + CVE-2023-47233: (unk) wifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach CVE-2023-4881: (unk) netfilter: nftables: exthdr: fix 4-byte stack OOB write CVE-2023-4921: (unk) net: sched: sch_qfq: Fix UAF in qfq_dequeue() CVE-2023-51043: (unk) drm/atomic: Fix potential use-after-free in nonblocking commits @@ -1744,24 +1845,111 @@ Outstanding CVEs: CVE-2023-52445: (unk) media: pvrusb2: fix use after free on context disconnection CVE-2023-52449: (unk) mtd: Fix gluebi NULL pointer dereference caused by ftl notifier CVE-2023-52451: (unk) powerpc/pseries/memhp: Fix access beyond end of drmem array - CVE-2023-52456: (unk) serial: imx: fix tx statemachine deadlock - CVE-2023-52457: (unk) serial: 8250: omap: Don't skip resource freeing if pm_runtime_resume_and_get() failed CVE-2023-52458: (unk) block: add check that partition length needs to be aligned with block size + CVE-2023-52469: (unk) drivers/amd/pm: fix a use-after-free in kv_parse_power_table + CVE-2023-52470: (unk) drm/radeon: check the alloc_workqueue return value in radeon_crtc_init() + CVE-2023-52475: (unk) Input: powermate - fix use-after-free in powermate_config_complete + CVE-2023-52476: (unk) perf/x86/lbr: Filter vsyscall addresses + CVE-2023-52477: (unk) usb: hub: Guard against accesses to uninitialized BOS descriptors + CVE-2023-52478: (unk) HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect + CVE-2023-52479: (unk) ksmbd: fix uaf in smb20_oplock_break_ack + CVE-2023-52480: (unk) ksmbd: fix race condition between session lookup and expire + CVE-2023-52481: (unk) arm64: errata: Add Cortex-A520 speculative unprivileged load workaround + CVE-2023-52482: (unk) x86/srso: Add SRSO mitigation for Hygon processors + CVE-2023-52484: (unk) iommu/arm-smmu-v3: Fix soft lockup triggered by arm_smmu_mm_invalidate_range + CVE-2023-52485: (unk) drm/amd/display: Wake DMCUB before sending a command + CVE-2023-52486: (unk) drm: Don't unref the same fb many times by mistake due to deadlock handling + CVE-2023-52488: (unk) serial: sc16is7xx: convert from _raw_ to _noinc_ regmap functions for FIFO + CVE-2023-52489: (unk) mm/sparsemem: fix race in accessing memory_section->usage + CVE-2023-52498: (unk) PM: sleep: Fix possible deadlocks in core system-wide PM code + CVE-2023-52500: (unk) scsi: pm80xx: Avoid leaking tags when processing OPC_INB_SET_CONTROLLER_CONFIG command + CVE-2023-52501: (unk) ring-buffer: Do not attempt to read past "commit" + CVE-2023-52502: (unk) net: nfc: fix races in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn() + CVE-2023-52506: (unk) LoongArch: Set all reserved memblocks on Node#0 at initialization + CVE-2023-52507: (unk) nfc: nci: assert requested protocol is valid + CVE-2023-52508: (unk) nvme-fc: Prevent null pointer dereference in nvme_fc_io_getuuid() + CVE-2023-52509: (unk) ravb: Fix use-after-free issue in ravb_tx_timeout_work() + CVE-2023-52511: (unk) spi: sun6i: reduce DMA RX transfer width to single byte + CVE-2023-52515: (unk) RDMA/srp: Do not call scsi_done() from srp_abort() + CVE-2023-52516: (unk) dma-debug: don't call __dma_entry_alloc_check_leak() under free_entries_lock + CVE-2023-52517: (unk) spi: sun6i: fix race between DMA RX transfer completion and RX FIFO drain + CVE-2023-52519: (unk) HID: intel-ish-hid: ipc: Disable and reenable ACPI GPE bit + CVE-2023-52522: (unk) net: fix possible store tearing in neigh_periodic_work() + CVE-2023-52527: (unk) ipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data() + CVE-2023-52528: (unk) net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg + CVE-2023-52531: (unk) wifi: iwlwifi: mvm: Fix a memory corruption issue + CVE-2023-52532: (unk) net: mana: Fix TX CQE error handling + CVE-2023-52559: (unk) iommu/vt-d: Avoid memory allocation in iommu_suspend() + CVE-2023-52561: (unk) arm64: dts: qcom: sdm845-db845c: Mark cont splash memory region as reserved + CVE-2023-52563: (unk) drm/meson: fix memory leak on ->hpd_notify callback + CVE-2023-52565: (unk) media: uvcvideo: Fix OOB read + CVE-2023-52566: (unk) nilfs2: fix potential use after free in nilfs_gccache_submit_read_data() + CVE-2023-52568: (unk) x86/sgx: Resolves SECS reclaim vs. page fault for EAUG race + CVE-2023-52569: (unk) btrfs: remove BUG() after failure to insert delayed dir index item + CVE-2023-52571: (unk) power: supply: rk817: Fix node refcount leak + CVE-2023-52572: (unk) cifs: Fix UAF in cifs_demultiplex_thread() + CVE-2023-52574: (unk) team: fix null-ptr-deref when team device type is changed + CVE-2023-52578: (unk) net: bridge: use DEV_STATS_INC() + CVE-2023-52583: (unk) ceph: fix deadlock or deadcode of misusing dget() + CVE-2023-52584: (unk) spmi: mediatek: Fix UAF on device remove + CVE-2023-52585: (unk) drm/amdgpu: Fix possible NULL dereference in amdgpu_ras_query_error_status_helper() + CVE-2023-52586: (unk) drm/msm/dpu: Add mutex lock in control vblank irq + CVE-2023-52587: (unk) IB/ipoib: Fix mcast list locking + CVE-2023-52588: (unk) f2fs: fix to tag gcing flag on page during block migration + CVE-2023-52589: (unk) media: rkisp1: Fix IRQ disable race issue + CVE-2023-52590: (unk) ocfs2: Avoid touching renamed directory if parent does not change + CVE-2023-52591: (unk) reiserfs: Avoid touching renamed directory if parent does not change + CVE-2023-52593: (unk) wifi: wfx: fix possible NULL pointer dereference in wfx_set_mfp_ap() + CVE-2023-52594: (unk) wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus() + CVE-2023-52595: (unk) wifi: rt2x00: restart beacon queue when hardware reset + CVE-2023-52596: (unk) sysctl: Fix out of bounds access for empty sysctl registers + CVE-2023-52597: (unk) KVM: s390: fix setting of fpc register + CVE-2023-52598: (unk) s390/ptrace: handle setting of fpc register correctly + CVE-2023-52599: (unk) jfs: fix array-index-out-of-bounds in diNewExt + CVE-2023-52600: (unk) jfs: fix uaf in jfs_evict_inode + CVE-2023-52601: (unk) jfs: fix array-index-out-of-bounds in dbAdjTree + CVE-2023-52602: (unk) jfs: fix slab-out-of-bounds Read in dtSearch + CVE-2023-52603: (unk) UBSAN: array-index-out-of-bounds in dtSplitRoot + CVE-2023-52604: (unk) FS:JFS:UBSAN:array-index-out-of-bounds in dbAdjTree + CVE-2023-52606: (unk) powerpc/lib: Validate size for vector operations + CVE-2023-52607: (unk) powerpc/mm: Fix null-pointer dereference in pgtable_cache_add + CVE-2023-52609: (unk) binder: fix race between mmput() and do_exit() + CVE-2023-52614: (unk) PM / devfreq: Fix buffer overflow in trans_stat_show + CVE-2023-52615: (unk) hwrng: core - Fix page fault dead lock on mmap-ed hwrng + CVE-2023-52617: (unk) PCI: switchtec: Fix stdev_release() crash after surprise hot remove + CVE-2023-52618: (unk) block/rnbd-srv: Check for unlikely string overflow + CVE-2023-52619: (unk) pstore/ram: Fix crash when setting number of cpus to an odd number + CVE-2023-52620: (unk) netfilter: nf_tables: disallow timeout for anonymous sets + CVE-2023-52621: (unk) bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers + CVE-2023-52622: (unk) ext4: avoid online resizing failures due to oversized flex bg + CVE-2023-52623: (unk) SUNRPC: Fix a suspicious RCU usage warning + CVE-2023-52624: (unk) drm/amd/display: Wake DMCUB before executing GPINT commands + CVE-2023-52625: (unk) drm/amd/display: Refactor DMCUB enter/exit idle interface + CVE-2023-52628: (unk) netfilter: nftables: exthdr: fix 4-byte stack OOB write + CVE-2023-52629: (unk) sh: push-switch: Reorder cleanup operations to avoid use-after-free bug + CVE-2023-52632: (unk) drm/amdkfd: Fix lock dependency warning with srcu + CVE-2023-52633: (unk) um: time-travel: fix time corruption + CVE-2023-52634: (unk) drm/amd/display: Fix disable_otg_wa logic + CVE-2023-52635: (unk) PM / devfreq: Synchronize devfreq_monitor_[start/stop] + CVE-2023-52638: (unk) can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock + CVE-2023-52639: (unk) KVM: s390: vsie: fix race during shadow creation + CVE-2023-52640: (unk) fs/ntfs3: Fix oob in ntfs_listxattr + CVE-2023-52641: (unk) fs/ntfs3: Add NULL ptr dereference checking at the end of attr_allocate_frame() CVE-2023-5717: (unk) perf: Disallow mis-matched inherited group reads CVE-2023-6040: (unk) netfilter: nf_tables: Reject tables of unsupported family CVE-2023-6121: (unk) nvmet: nul-terminate the NQNs passed in the connect command CVE-2023-6240: (unk) - CVE-2023-6270: (unk) - CVE-2023-6356: (unk) + CVE-2023-6270: (unk) aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts + CVE-2023-6356: (unk) nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length CVE-2023-6535: (unk) - CVE-2023-6536: (unk) + CVE-2023-6536: (unk) nvmet-tcp: fix a crash in nvmet_req_complete() CVE-2023-6546: (unk) tty: n_gsm: fix the UAF caused by race condition in gsm_cleanup_mux CVE-2023-6606: (unk) smb: client: fix OOB in smbCalcSize() CVE-2023-6610: (unk) smb: client: fix potential OOB in smb2_dump_detail() CVE-2023-6915: (unk) ida: Fix crash in ida_free when the bitmap is empty CVE-2023-6931: (unk) perf: Fix perf_event_validate_size() CVE-2023-6932: (unk) ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet - CVE-2023-7042: (unk) + CVE-2023-7042: (unk) wifi: ath10k: fix NULL pointer dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev() CVE-2023-7192: (unk) netfilter: ctnetlink: fix possible refcount leak in ctnetlink_create_conntrack() CVE-2024-0340: (unk) vhost: use kzalloc() instead of kmalloc() followed by memset() CVE-2024-0584: (unk) ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet @@ -1770,10 +1958,11 @@ Outstanding CVEs: CVE-2024-1086: (unk) netfilter: nf_tables: reject QUEUE/DROP verdict parameters CVE-2024-1312: (unk) mm: lock_vma_under_rcu() must check vma->anon_vma under vma lock CVE-2024-21803: (unk) - CVE-2024-22099: (unk) + CVE-2024-2193: (unk) + CVE-2024-22099: (unk) Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security CVE-2024-22386: (unk) - CVE-2024-23196: (unk) - CVE-2024-23307: (unk) + CVE-2024-23196: (unk) ALSA: hda: fix a possible null-pointer dereference due to data race in snd_hdac_regmap_sync() + CVE-2024-23307: (unk) md/raid5: fix atomicity violation in raid5_cache_count CVE-2024-23848: (unk) CVE-2024-23851: (unk) dm: limit the number of targets and parameter size area CVE-2024-24855: (unk) scsi: lpfc: Fix a possible data race in lpfc_unregister_fcf_rescan() @@ -1781,16 +1970,104 @@ Outstanding CVEs: CVE-2024-24858: (unk) CVE-2024-24859: (unk) CVE-2024-24860: (unk) Bluetooth: Fix atomicity violation in {min,max}_key_size_set - CVE-2024-24861: (unk) + CVE-2024-24861: (unk) media: xc4000: Fix atomicity violation in xc4000_get_frequency CVE-2024-24864: (unk) CVE-2024-25739: (unk) CVE-2024-25740: (unk) CVE-2024-25741: (unk) CVE-2024-25744: (unk) x86/coco: Disable 32-bit emulation by default on TDX and SEV - CVE-2024-26584: (unk) net: tls: handle backlogging of crypto requests - CVE-2024-26587: (unk) net: netdevsim: don't try to destroy PHC on VFs - CVE-2024-26588: (unk) LoongArch: BPF: Prevent out-of-bounds memory access - CVE-2024-26591: (unk) bpf: Fix re-attachment branch in bpf_tracing_prog_attach CVE-2024-26592: (unk) ksmbd: fix UAF issue in ksmbd_tcp_new_connection() CVE-2024-26594: (unk) ksmbd: validate mech token in session setup CVE-2024-26598: (unk) KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache + CVE-2024-26600: (unk) phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP + CVE-2024-26606: (unk) binder: signal epoll threads of self-work + CVE-2024-26614: (unk) tcp: make sure init the accept_queue's spinlocks once + CVE-2024-26622: (unk) tomoyo: fix UAF write bug in tomoyo_write_control() + CVE-2024-26623: (unk) pds_core: Prevent race issues involving the adminq + CVE-2024-26625: (unk) llc: call sock_orphan() at release time + CVE-2024-26627: (unk) scsi: core: Move scsi_host_busy() out of host lock for waking up EH handler + CVE-2024-26633: (unk) ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim() + CVE-2024-26635: (unk) llc: Drop support for ETH_P_TR_802_2. + CVE-2024-26636: (unk) llc: make llc_ui_sendmsg() more robust against bonding changes + CVE-2024-26641: (unk) ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv() + CVE-2024-26642: (unk) netfilter: nf_tables: disallow anonymous set with timeout flag + CVE-2024-26644: (unk) btrfs: don't abort filesystem when attempting to snapshot deleted subvolume + CVE-2024-26646: (unk) thermal: intel: hfi: Add syscore callbacks for system-wide PM + CVE-2024-26647: (unk) drm/amd/display: Fix late derefrence 'dsc' check in 'link_set_dsc_pps_packet()' + CVE-2024-26648: (unk) drm/amd/display: Fix variable deferencing before NULL check in edp_setup_replay() + CVE-2024-26650: (unk) platform/x86: p2sb: Allow p2sb_bar() calls during PCI device probe + CVE-2024-26651: (unk) sr9800: Add check for usbnet_get_endpoints + CVE-2024-26654: (unk) ALSA: sh: aica: reorder cleanup operations to avoid UAF bugs + CVE-2024-26655: (unk) Fix memory leak in posix_clock_open() + CVE-2024-26656: (unk) drm/amdgpu: fix use-after-free bug + CVE-2024-26658: (unk) bcachefs: grab s_umount only if snapshotting + CVE-2024-26659: (unk) xhci: handle isoc Babble and Buffer Overrun events properly + CVE-2024-26663: (unk) tipc: Check the bearer type before calling tipc_udp_nl_bearer_add() + CVE-2024-26664: (unk) hwmon: (coretemp) Fix out-of-bounds memory access + CVE-2024-26668: (unk) netfilter: nft_limit: reject configurations that cause integer overflow + CVE-2024-26671: (unk) blk-mq: fix IO hang from sbitmap wakeup race + CVE-2024-26672: (unk) drm/amdgpu: Fix variable 'mca_funcs' dereferenced before NULL check in 'amdgpu_mca_smu_get_mca_entry()' + CVE-2024-26675: (unk) ppp_async: limit MRU to 64K + CVE-2024-26676: (unk) af_unix: Call kfree_skb() for dead unix_(sk)->oob_skb in GC. + CVE-2024-26677: (unk) rxrpc: Fix delayed ACKs to not set the reference serial number + CVE-2024-26679: (unk) inet: read sk->sk_family once in inet_recv_error() + CVE-2024-26685: (unk) nilfs2: fix potential bug in end_buffer_async_write + CVE-2024-26686: (unk) fs/proc: do_task_stat: use sig->stats_lock to gather the threads/children stats + CVE-2024-26687: (unk) xen/events: close evtchn after mapping cleanup + CVE-2024-26689: (unk) ceph: prevent use-after-free in encode_cap_msg() + CVE-2024-26691: (unk) KVM: arm64: Fix circular locking dependency + CVE-2024-26696: (unk) nilfs2: fix hang in nilfs_lookup_dirty_data_buffers() + CVE-2024-26697: (unk) nilfs2: fix data corruption in dsync block recovery for small block sizes + CVE-2024-26699: (unk) drm/amd/display: Fix array-index-out-of-bounds in dcn35_clkmgr + CVE-2024-26700: (unk) drm/amd/display: Fix MST Null Ptr for RV + CVE-2024-26704: (unk) ext4: fix double-free of blocks due to wrong extents moved_len + CVE-2024-26706: (unk) parisc: Fix random data corruption from exception handler + CVE-2024-26713: (unk) powerpc/pseries/iommu: Fix iommu initialisation during DLPAR add + CVE-2024-26715: (unk) usb: dwc3: gadget: Fix NULL pointer dereference in dwc3_gadget_suspend + CVE-2024-26719: (unk) nouveau: offload fence uevents work to workqueue + CVE-2024-26720: (unk) mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again + CVE-2024-26726: (unk) btrfs: don't drop extent_map for free space inode on write error + CVE-2024-26733: (unk) arp: Prevent overflow in arp_req_get(). + CVE-2024-26738: (unk) powerpc/pseries/iommu: DLPAR add doesn't completely initialize pci_controller + CVE-2024-26739: (unk) net/sched: act_mirred: don't override retval if we already lost the skb + CVE-2024-26743: (unk) RDMA/qedr: Fix qedr_create_user_qp error flow + CVE-2024-26744: (unk) RDMA/srpt: Support specifying the srpt_service_guid parameter + CVE-2024-26745: (unk) powerpc/pseries/iommu: IOMMU table is not initialized for kdump over SR-IOV + CVE-2024-26748: (unk) usb: cdns3: fix memory double free when handle zero packet + CVE-2024-26752: (unk) l2tp: pass correct message length to ip6_append_data + CVE-2024-26754: (unk) gtp: fix use-after-free and null-ptr-deref in gtp_genl_dump_pdp() + CVE-2024-26756: (unk) md: Don't register sync_thread for reshape directly + CVE-2024-26757: (unk) md: Don't ignore read-only array in md_check_recovery() + CVE-2024-26758: (unk) md: Don't ignore suspended array in md_check_recovery() + CVE-2024-26759: (unk) mm/swap: fix race when skipping swapcache + CVE-2024-26763: (unk) dm-crypt: don't modify the data when using authenticated encryption + CVE-2024-26764: (unk) fs/aio: Restrict kiocb_set_cancel_fn() to I/O submitted via libaio + CVE-2024-26765: (unk) LoongArch: Disable IRQ before init_fn() for nonboot CPUs + CVE-2024-26766: (unk) IB/hfi1: Fix sdma.h tx->num_descs off-by-one error + CVE-2024-26767: (unk) drm/amd/display: fixed integer types and null check locations + CVE-2024-26768: (unk) LoongArch: Change acpi_core_pic[NR_CPUS] to acpi_core_pic[MAX_CORE_PIC] + CVE-2024-26769: (unk) nvmet-fc: avoid deadlock on delete association path + CVE-2024-26770: (unk) HID: nvidia-shield: Add missing null pointer checks to LED initialization + CVE-2024-26771: (unk) dmaengine: ti: edma: Add some null pointer checks to the edma_probe + CVE-2024-26772: (unk) ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal() + CVE-2024-26773: (unk) ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found() + CVE-2024-26774: (unk) ext4: avoid dividing by 0 in mb_update_avg_fragment_size() when block bitmap corrupt + CVE-2024-26775: (unk) aoe: avoid potential deadlock at set_capacity + CVE-2024-26776: (unk) spi: hisi-sfc-v3xx: Return IRQ_NONE if no interrupts were detected + CVE-2024-26777: (unk) fbdev: sis: Error out if pixclock equals zero + CVE-2024-26778: (unk) fbdev: savage: Error out if pixclock equals zero + CVE-2024-26779: (unk) wifi: mac80211: fix race condition on enabling fast-xmit + CVE-2024-26784: (unk) pmdomain: arm: Fix NULL dereference on scmi_perf_domain removal + CVE-2024-26789: (unk) crypto: arm64/neonbs - fix out-of-bounds access on short input + CVE-2024-26791: (unk) btrfs: dev-replace: properly validate device names + CVE-2024-26793: (unk) gtp: fix use-after-free and null-ptr-deref in gtp_newlink() + CVE-2024-26797: (unk) drm/amd/display: Prevent potential buffer overflow in map_hw_resources + CVE-2024-26798: (unk) fbcon: always restore the old font data in fbcon_do_set_font() + CVE-2024-26801: (unk) Bluetooth: Avoid potential use-after-free in hci_error_reset + CVE-2024-26802: (unk) stmmac: Clear variable when destroying workqueue + CVE-2024-26803: (unk) net: veth: clear GRO when clearing XDP even when down + CVE-2024-26804: (unk) net: ip_tunnel: prevent perpetual headroom growth + CVE-2024-26805: (unk) netlink: Fix kernel-infoleak-after-free in __skb_datagram_iter + CVE-2024-26806: (unk) spi: cadence-qspi: remove system-wide suspend helper calls from runtime PM hooks + CVE-2024-26808: (unk) netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain + CVE-2024-26809: (unk) netfilter: nft_set_pipapo: release elements in clone only from destroy path diff --git a/data/5.0/5.0_CVEs.txt b/data/5.0/5.0_CVEs.txt index d20842fcd..812e8a143 100644 --- a/data/5.0/5.0_CVEs.txt +++ b/data/5.0/5.0_CVEs.txt @@ -247,6 +247,8 @@ CVE-2019-2101: Fixed with 5.0.2 CVE-2019-2181: Fix not seen in stream CVE-2019-2213: Fix not seen in stream CVE-2019-25045: Fixed with 5.0.19 +CVE-2019-25160: Fixed with 5.0 +CVE-2019-25162: Fix not seen in stream CVE-2019-3016: Fix not seen in stream CVE-2019-3459: Fixed with 5.0.6 CVE-2019-3460: Fixed with 5.0.6 @@ -428,6 +430,14 @@ CVE-2020-36558: Fix not seen in stream CVE-2020-36691: Fix not seen in stream CVE-2020-36694: Fix not seen in stream CVE-2020-36766: Fix not seen in stream +CVE-2020-36775: Fix not seen in stream +CVE-2020-36777: Fix not seen in stream +CVE-2020-36780: Fix not seen in stream +CVE-2020-36781: Fix not seen in stream +CVE-2020-36782: Fix not seen in stream +CVE-2020-36783: Fix not seen in stream +CVE-2020-36784: Fix not seen in stream +CVE-2020-36787: Fix not seen in stream CVE-2020-3702: Fix not seen in stream CVE-2020-4788: Fix not seen in stream CVE-2020-7053: Fix not seen in stream @@ -589,6 +599,124 @@ CVE-2021-45469: Fix not seen in stream CVE-2021-45485: Fix not seen in stream CVE-2021-45486: Fix not seen in stream CVE-2021-45868: Fix not seen in stream +CVE-2021-46904: Fix not seen in stream +CVE-2021-46906: Fix not seen in stream +CVE-2021-46908: Fix not seen in stream +CVE-2021-46909: Fix not seen in stream +CVE-2021-46915: Fix not seen in stream +CVE-2021-46921: Fix not seen in stream +CVE-2021-46924: Fix not seen in stream +CVE-2021-46925: Fix not seen in stream +CVE-2021-46926: Fix not seen in stream +CVE-2021-46928: Fix not seen in stream +CVE-2021-46929: Fix not seen in stream +CVE-2021-46932: Fix not seen in stream +CVE-2021-46933: Fix not seen in stream +CVE-2021-46934: Fix not seen in stream +CVE-2021-46935: Fix not seen in stream +CVE-2021-46936: Fix not seen in stream +CVE-2021-46938: Fix not seen in stream +CVE-2021-46939: Fix not seen in stream +CVE-2021-46941: Fix not seen in stream +CVE-2021-46950: Fix not seen in stream +CVE-2021-46951: Fix not seen in stream +CVE-2021-46952: Fix not seen in stream +CVE-2021-46953: Fix not seen in stream +CVE-2021-46955: Fix not seen in stream +CVE-2021-46959: Fix not seen in stream +CVE-2021-46960: Fix not seen in stream +CVE-2021-46962: Fix not seen in stream +CVE-2021-46965: Fix not seen in stream +CVE-2021-46969: Fix not seen in stream +CVE-2021-46970: Fix not seen in stream +CVE-2021-46974: Fix not seen in stream +CVE-2021-46982: Fix not seen in stream +CVE-2021-46984: Fix not seen in stream +CVE-2021-46988: Fix not seen in stream +CVE-2021-46989: Fix not seen in stream +CVE-2021-46991: Fix not seen in stream +CVE-2021-46992: Fix not seen in stream +CVE-2021-46998: Fix not seen in stream +CVE-2021-47004: Fix not seen in stream +CVE-2021-47006: Fix not seen in stream +CVE-2021-47010: Fix not seen in stream +CVE-2021-47013: Fix not seen in stream +CVE-2021-47020: Fix not seen in stream +CVE-2021-47028: Fix not seen in stream +CVE-2021-47034: Fix not seen in stream +CVE-2021-47041: Fix not seen in stream +CVE-2021-47046: Fix not seen in stream +CVE-2021-47049: Fix not seen in stream +CVE-2021-47052: Fix not seen in stream +CVE-2021-47054: Fix not seen in stream +CVE-2021-47056: Fix not seen in stream +CVE-2021-47059: Fix not seen in stream +CVE-2021-47063: Fix not seen in stream +CVE-2021-47065: Fix not seen in stream +CVE-2021-47070: Fix not seen in stream +CVE-2021-47071: Fix not seen in stream +CVE-2021-47073: Fix not seen in stream +CVE-2021-47074: Fix not seen in stream +CVE-2021-47075: Fix not seen in stream +CVE-2021-47076: Fix not seen in stream +CVE-2021-47077: Fix not seen in stream +CVE-2021-47078: Fix not seen in stream +CVE-2021-47082: Fix not seen in stream +CVE-2021-47083: Fix not seen in stream +CVE-2021-47086: Fix not seen in stream +CVE-2021-47100: Fix not seen in stream +CVE-2021-47101: Fix not seen in stream +CVE-2021-47103: Fix not seen in stream +CVE-2021-47109: Fix not seen in stream +CVE-2021-47110: Fix not seen in stream +CVE-2021-47112: Fix not seen in stream +CVE-2021-47113: Fix not seen in stream +CVE-2021-47114: Fix not seen in stream +CVE-2021-47116: Fix not seen in stream +CVE-2021-47117: Fix not seen in stream +CVE-2021-47118: Fix not seen in stream +CVE-2021-47119: Fix not seen in stream +CVE-2021-47120: Fix not seen in stream +CVE-2021-47121: Fix not seen in stream +CVE-2021-47122: Fix not seen in stream +CVE-2021-47124: Fix not seen in stream +CVE-2021-47125: Fix not seen in stream +CVE-2021-47128: Fix not seen in stream +CVE-2021-47131: Fix not seen in stream +CVE-2021-47133: Fix not seen in stream +CVE-2021-47135: Fix not seen in stream +CVE-2021-47136: Fix not seen in stream +CVE-2021-47137: Fix not seen in stream +CVE-2021-47140: Fix not seen in stream +CVE-2021-47142: Fix not seen in stream +CVE-2021-47143: Fix not seen in stream +CVE-2021-47144: Fix not seen in stream +CVE-2021-47145: Fix not seen in stream +CVE-2021-47146: Fix not seen in stream +CVE-2021-47147: Fix not seen in stream +CVE-2021-47149: Fix not seen in stream +CVE-2021-47150: Fix not seen in stream +CVE-2021-47151: Fix not seen in stream +CVE-2021-47153: Fix not seen in stream +CVE-2021-47158: Fix not seen in stream +CVE-2021-47159: Fix not seen in stream +CVE-2021-47160: Fix not seen in stream +CVE-2021-47161: Fix not seen in stream +CVE-2021-47162: Fix not seen in stream +CVE-2021-47163: Fix not seen in stream +CVE-2021-47165: Fix not seen in stream +CVE-2021-47166: Fix not seen in stream +CVE-2021-47167: Fix not seen in stream +CVE-2021-47168: Fix not seen in stream +CVE-2021-47169: Fix not seen in stream +CVE-2021-47170: Fix not seen in stream +CVE-2021-47171: Fix not seen in stream +CVE-2021-47172: Fix not seen in stream +CVE-2021-47173: Fix not seen in stream +CVE-2021-47175: Fix not seen in stream +CVE-2021-47177: Fix not seen in stream +CVE-2021-47179: Fix not seen in stream +CVE-2021-47180: Fix not seen in stream CVE-2022-0001: Fix not seen in stream CVE-2022-0002: Fix not seen in stream CVE-2022-0168: Fix not seen in stream @@ -791,6 +919,10 @@ CVE-2022-4744: Fix not seen in stream CVE-2022-47520: Fix not seen in stream CVE-2022-47929: Fix not seen in stream CVE-2022-48619: Fix not seen in stream +CVE-2022-48626: Fix not seen in stream +CVE-2022-48627: Fix not seen in stream +CVE-2022-48628: Fix not seen in stream +CVE-2022-48629: Fix not seen in stream CVE-2023-0045: Fix not seen in stream CVE-2023-0047: Fix not seen in stream CVE-2023-0160: Fix not seen in stream @@ -860,6 +992,7 @@ CVE-2023-26607: Fix not seen in stream CVE-2023-28328: Fix not seen in stream CVE-2023-28466: Fix not seen in stream CVE-2023-2860: Fix not seen in stream +CVE-2023-28746: Fix not seen in stream CVE-2023-28772: Fix not seen in stream CVE-2023-2985: Fix not seen in stream CVE-2023-3006: Fix not seen in stream @@ -934,7 +1067,7 @@ CVE-2023-4622: Fix not seen in stream CVE-2023-4623: Fix not seen in stream CVE-2023-46343: Fix not seen in stream CVE-2023-46838: Fix not seen in stream -CVE-2023-47233: Fix unknown +CVE-2023-47233: Fix not seen in stream CVE-2023-4881: Fix not seen in stream CVE-2023-4921: Fix not seen in stream CVE-2023-51042: Fix not seen in stream @@ -958,25 +1091,118 @@ CVE-2023-52448: Fix not seen in stream CVE-2023-52449: Fix not seen in stream CVE-2023-52451: Fix not seen in stream CVE-2023-52454: Fix not seen in stream -CVE-2023-52456: Fix not seen in stream -CVE-2023-52457: Fix not seen in stream CVE-2023-52458: Fix not seen in stream CVE-2023-52464: Fix not seen in stream +CVE-2023-52469: Fix not seen in stream +CVE-2023-52470: Fix not seen in stream +CVE-2023-52474: Fix not seen in stream +CVE-2023-52475: Fix not seen in stream +CVE-2023-52476: Fix not seen in stream +CVE-2023-52477: Fix not seen in stream +CVE-2023-52478: Fix not seen in stream +CVE-2023-52479: Fix not seen in stream +CVE-2023-52480: Fix not seen in stream +CVE-2023-52481: Fix not seen in stream +CVE-2023-52482: Fix not seen in stream +CVE-2023-52484: Fix not seen in stream +CVE-2023-52485: Fix not seen in stream +CVE-2023-52486: Fix not seen in stream +CVE-2023-52488: Fix not seen in stream +CVE-2023-52489: Fix not seen in stream +CVE-2023-52491: Fix not seen in stream +CVE-2023-52498: Fix not seen in stream +CVE-2023-52500: Fix not seen in stream +CVE-2023-52501: Fix not seen in stream +CVE-2023-52502: Fix not seen in stream +CVE-2023-52504: Fix not seen in stream +CVE-2023-52506: Fix not seen in stream +CVE-2023-52507: Fix not seen in stream +CVE-2023-52508: Fix not seen in stream +CVE-2023-52509: Fix not seen in stream +CVE-2023-52510: Fix not seen in stream +CVE-2023-52511: Fix not seen in stream +CVE-2023-52515: Fix not seen in stream +CVE-2023-52516: Fix not seen in stream +CVE-2023-52517: Fix not seen in stream +CVE-2023-52519: Fix not seen in stream +CVE-2023-52522: Fix not seen in stream +CVE-2023-52527: Fix not seen in stream +CVE-2023-52528: Fix not seen in stream +CVE-2023-52530: Fix not seen in stream +CVE-2023-52531: Fix not seen in stream +CVE-2023-52532: Fix not seen in stream +CVE-2023-52559: Fix not seen in stream +CVE-2023-52561: Fix not seen in stream +CVE-2023-52563: Fix not seen in stream +CVE-2023-52565: Fix not seen in stream +CVE-2023-52566: Fix not seen in stream +CVE-2023-52568: Fix not seen in stream +CVE-2023-52569: Fix not seen in stream +CVE-2023-52571: Fix not seen in stream +CVE-2023-52572: Fix not seen in stream +CVE-2023-52574: Fix not seen in stream +CVE-2023-52578: Fix not seen in stream +CVE-2023-52583: Fix not seen in stream +CVE-2023-52584: Fix not seen in stream +CVE-2023-52585: Fix not seen in stream +CVE-2023-52586: Fix not seen in stream +CVE-2023-52587: Fix not seen in stream +CVE-2023-52588: Fix not seen in stream +CVE-2023-52589: Fix not seen in stream +CVE-2023-52590: Fix not seen in stream +CVE-2023-52591: Fix not seen in stream +CVE-2023-52593: Fix not seen in stream +CVE-2023-52594: Fix not seen in stream +CVE-2023-52595: Fix not seen in stream +CVE-2023-52596: Fix not seen in stream +CVE-2023-52597: Fix not seen in stream +CVE-2023-52598: Fix not seen in stream +CVE-2023-52599: Fix not seen in stream +CVE-2023-52600: Fix not seen in stream +CVE-2023-52601: Fix not seen in stream +CVE-2023-52602: Fix not seen in stream +CVE-2023-52603: Fix not seen in stream +CVE-2023-52604: Fix not seen in stream +CVE-2023-52606: Fix not seen in stream +CVE-2023-52607: Fix not seen in stream +CVE-2023-52609: Fix not seen in stream +CVE-2023-52612: Fix not seen in stream +CVE-2023-52614: Fix not seen in stream +CVE-2023-52615: Fix not seen in stream +CVE-2023-52617: Fix not seen in stream +CVE-2023-52618: Fix not seen in stream +CVE-2023-52619: Fix not seen in stream +CVE-2023-52620: Fix not seen in stream +CVE-2023-52621: Fix not seen in stream +CVE-2023-52622: Fix not seen in stream +CVE-2023-52623: Fix not seen in stream +CVE-2023-52624: Fix not seen in stream +CVE-2023-52625: Fix not seen in stream +CVE-2023-52628: Fix not seen in stream +CVE-2023-52629: Fix not seen in stream +CVE-2023-52632: Fix not seen in stream +CVE-2023-52633: Fix not seen in stream +CVE-2023-52634: Fix not seen in stream +CVE-2023-52635: Fix not seen in stream +CVE-2023-52638: Fix not seen in stream +CVE-2023-52639: Fix not seen in stream +CVE-2023-52640: Fix not seen in stream +CVE-2023-52641: Fix not seen in stream CVE-2023-5717: Fix not seen in stream CVE-2023-6040: Fix not seen in stream CVE-2023-6121: Fix not seen in stream CVE-2023-6240: Fix unknown -CVE-2023-6270: Fix unknown -CVE-2023-6356: Fix unknown +CVE-2023-6270: Fix not seen in stream +CVE-2023-6356: Fix not seen in stream CVE-2023-6535: Fix unknown -CVE-2023-6536: Fix unknown +CVE-2023-6536: Fix not seen in stream CVE-2023-6546: Fix not seen in stream CVE-2023-6606: Fix not seen in stream CVE-2023-6610: Fix not seen in stream CVE-2023-6915: Fix not seen in stream CVE-2023-6931: Fix not seen in stream CVE-2023-6932: Fix not seen in stream -CVE-2023-7042: Fix unknown +CVE-2023-7042: Fix not seen in stream CVE-2023-7192: Fix not seen in stream CVE-2024-0340: Fix not seen in stream CVE-2024-0564: Fix unknown @@ -989,10 +1215,11 @@ CVE-2024-1086: Fix not seen in stream CVE-2024-1151: Fix not seen in stream CVE-2024-1312: Fix not seen in stream CVE-2024-21803: Fix unknown -CVE-2024-22099: Fix unknown +CVE-2024-2193: Fix unknown +CVE-2024-22099: Fix not seen in stream CVE-2024-22386: Fix unknown -CVE-2024-23196: Fix unknown -CVE-2024-23307: Fix unknown +CVE-2024-23196: Fix not seen in stream +CVE-2024-23307: Fix not seen in stream CVE-2024-23848: Fix unknown CVE-2024-23849: Fix not seen in stream CVE-2024-23851: Fix not seen in stream @@ -1001,7 +1228,7 @@ CVE-2024-24857: Fix unknown CVE-2024-24858: Fix unknown CVE-2024-24859: Fix unknown CVE-2024-24860: Fix not seen in stream -CVE-2024-24861: Fix unknown +CVE-2024-24861: Fix not seen in stream CVE-2024-24864: Fix unknown CVE-2024-25739: Fix unknown CVE-2024-25740: Fix unknown @@ -1010,12 +1237,113 @@ CVE-2024-25744: Fix not seen in stream CVE-2024-26584: Fix not seen in stream CVE-2024-26585: Fix not seen in stream CVE-2024-26586: Fix not seen in stream -CVE-2024-26587: Fix not seen in stream -CVE-2024-26588: Fix not seen in stream CVE-2024-26589: Fix not seen in stream -CVE-2024-26591: Fix not seen in stream CVE-2024-26592: Fix not seen in stream CVE-2024-26594: Fix not seen in stream CVE-2024-26595: Fix not seen in stream CVE-2024-26597: Fix not seen in stream CVE-2024-26598: Fix not seen in stream +CVE-2024-26600: Fix not seen in stream +CVE-2024-26602: Fix not seen in stream +CVE-2024-26606: Fix not seen in stream +CVE-2024-26607: Fix not seen in stream +CVE-2024-26614: Fix not seen in stream +CVE-2024-26615: Fix not seen in stream +CVE-2024-26622: Fix not seen in stream +CVE-2024-26623: Fix not seen in stream +CVE-2024-26625: Fix not seen in stream +CVE-2024-26627: Fix not seen in stream +CVE-2024-26633: Fix not seen in stream +CVE-2024-26635: Fix not seen in stream +CVE-2024-26636: Fix not seen in stream +CVE-2024-26640: Fix not seen in stream +CVE-2024-26641: Fix not seen in stream +CVE-2024-26642: Fix not seen in stream +CVE-2024-26644: Fix not seen in stream +CVE-2024-26645: Fix not seen in stream +CVE-2024-26646: Fix not seen in stream +CVE-2024-26647: Fix not seen in stream +CVE-2024-26648: Fix not seen in stream +CVE-2024-26650: Fix not seen in stream +CVE-2024-26651: Fix not seen in stream +CVE-2024-26654: Fix not seen in stream +CVE-2024-26655: Fix not seen in stream +CVE-2024-26656: Fix not seen in stream +CVE-2024-26658: Fix not seen in stream +CVE-2024-26659: Fix not seen in stream +CVE-2024-26663: Fix not seen in stream +CVE-2024-26664: Fix not seen in stream +CVE-2024-26668: Fix not seen in stream +CVE-2024-26671: Fix not seen in stream +CVE-2024-26672: Fix not seen in stream +CVE-2024-26675: Fix not seen in stream +CVE-2024-26676: Fix not seen in stream +CVE-2024-26677: Fix not seen in stream +CVE-2024-26679: Fix not seen in stream +CVE-2024-26685: Fix not seen in stream +CVE-2024-26686: Fix not seen in stream +CVE-2024-26687: Fix not seen in stream +CVE-2024-26689: Fix not seen in stream +CVE-2024-26691: Fix not seen in stream +CVE-2024-26696: Fix not seen in stream +CVE-2024-26697: Fix not seen in stream +CVE-2024-26699: Fix not seen in stream +CVE-2024-26700: Fix not seen in stream +CVE-2024-26702: Fix not seen in stream +CVE-2024-26704: Fix not seen in stream +CVE-2024-26706: Fix not seen in stream +CVE-2024-26713: Fix not seen in stream +CVE-2024-26715: Fix not seen in stream +CVE-2024-26719: Fix not seen in stream +CVE-2024-26720: Fix not seen in stream +CVE-2024-26726: Fix not seen in stream +CVE-2024-26733: Fix not seen in stream +CVE-2024-26735: Fix not seen in stream +CVE-2024-26736: Fix not seen in stream +CVE-2024-26738: Fix not seen in stream +CVE-2024-26739: Fix not seen in stream +CVE-2024-26740: Fix not seen in stream +CVE-2024-26743: Fix not seen in stream +CVE-2024-26744: Fix not seen in stream +CVE-2024-26745: Fix not seen in stream +CVE-2024-26747: Fix not seen in stream +CVE-2024-26748: Fix not seen in stream +CVE-2024-26751: Fix not seen in stream +CVE-2024-26752: Fix not seen in stream +CVE-2024-26754: Fix not seen in stream +CVE-2024-26756: Fix not seen in stream +CVE-2024-26757: Fix not seen in stream +CVE-2024-26758: Fix not seen in stream +CVE-2024-26759: Fix not seen in stream +CVE-2024-26763: Fix not seen in stream +CVE-2024-26764: Fix not seen in stream +CVE-2024-26765: Fix not seen in stream +CVE-2024-26766: Fix not seen in stream +CVE-2024-26767: Fix not seen in stream +CVE-2024-26768: Fix not seen in stream +CVE-2024-26769: Fix not seen in stream +CVE-2024-26770: Fix not seen in stream +CVE-2024-26771: Fix not seen in stream +CVE-2024-26772: Fix not seen in stream +CVE-2024-26773: Fix not seen in stream +CVE-2024-26774: Fix not seen in stream +CVE-2024-26775: Fix not seen in stream +CVE-2024-26776: Fix not seen in stream +CVE-2024-26777: Fix not seen in stream +CVE-2024-26778: Fix not seen in stream +CVE-2024-26779: Fix not seen in stream +CVE-2024-26784: Fix not seen in stream +CVE-2024-26787: Fix not seen in stream +CVE-2024-26789: Fix not seen in stream +CVE-2024-26791: Fix not seen in stream +CVE-2024-26793: Fix not seen in stream +CVE-2024-26797: Fix not seen in stream +CVE-2024-26798: Fix not seen in stream +CVE-2024-26801: Fix not seen in stream +CVE-2024-26802: Fix not seen in stream +CVE-2024-26803: Fix not seen in stream +CVE-2024-26804: Fix not seen in stream +CVE-2024-26805: Fix not seen in stream +CVE-2024-26806: Fix not seen in stream +CVE-2024-26808: Fix not seen in stream +CVE-2024-26809: Fix not seen in stream diff --git a/data/5.0/5.0_security.txt b/data/5.0/5.0_security.txt index ed04bcfde..fdec5697e 100644 --- a/data/5.0/5.0_security.txt +++ b/data/5.0/5.0_security.txt @@ -2,6 +2,7 @@ CVEs fixed in 5.0: CVE-2019-12818: 58bdd544e2933a21a51eecf17c3f5f94038261b5 net: nfc: Fix NULL dereference on nfc_llcp_build_tlv fails CVE-2019-16994: 07f12b26e21ab359261bf75cfcb424fdc7daeb6d net: sit: fix memory leak in sit_init_net() + CVE-2019-25160: 5578de4834fe0f2a34fedc7374be691443396d1f netlabel: fix out-of-bounds memory accesses CVE-2019-9213: 0a1d52994d440e21def1c2174932410b4f2a98a1 mm: enforce min addr even if capable() in expand_downwards() CVEs fixed in 5.0-rc1: @@ -307,6 +308,7 @@ Outstanding CVEs: CVE-2019-20934: (unk) sched/fair: Don't free p->numa_faults with concurrent readers CVE-2019-2181: (unk) binder: check for overflow when alloc for security context CVE-2019-2213: (unk) binder: fix possible UAF when freeing buffer + CVE-2019-25162: (unk) i2c: Fix a potential use after free CVE-2019-3016: (unk) x86/kvm: Be careful not to clear KVM_VCPU_FLUSH_TLB bit CVE-2019-3846: (unk) mwifiex: Fix possible buffer overflows at parsing bss descriptor CVE-2019-3874: (unk) sctp: implement memory accounting on tx path @@ -476,6 +478,14 @@ Outstanding CVEs: CVE-2020-36691: (unk) netlink: limit recursion depth in policy validation CVE-2020-36694: (unk) netfilter: x_tables: Switch synchronization to RCU CVE-2020-36766: (unk) cec-api: prevent leaking memory through hole in structure + CVE-2020-36775: (unk) f2fs: fix to avoid potential deadlock + CVE-2020-36777: (unk) media: dvbdev: Fix memory leak in dvb_media_device_free() + CVE-2020-36780: (unk) i2c: sprd: fix reference leak when pm_runtime_get_sync fails + CVE-2020-36781: (unk) i2c: imx: fix reference leak when pm_runtime_get_sync fails + CVE-2020-36782: (unk) i2c: imx-lpi2c: fix reference leak when pm_runtime_get_sync fails + CVE-2020-36783: (unk) i2c: img-scb: fix reference leak when pm_runtime_get_sync fails + CVE-2020-36784: (unk) i2c: cadence: fix reference leak when pm_runtime_get_sync fails + CVE-2020-36787: (unk) media: aspeed: fix clock handling logic CVE-2020-3702: (unk) ath: Use safer key clearing with key cache entries CVE-2020-4788: (unk) powerpc/64s: flush L1D on kernel entry CVE-2020-7053: (unk) drm/i915: Introduce a mutex for file_priv->context_idr @@ -637,6 +647,124 @@ Outstanding CVEs: CVE-2021-45485: (unk) ipv6: use prandom_u32() for ID generation CVE-2021-45486: (unk) inet: use bigger hash table for IP ID generation CVE-2021-45868: (unk) quota: check block number when reading the block in quota file + CVE-2021-46904: (unk) net: hso: fix null-ptr-deref during tty device unregistration + CVE-2021-46906: (unk) HID: usbhid: fix info leak in hid_submit_ctrl + CVE-2021-46908: (unk) bpf: Use correct permission flag for mixed signed bounds arithmetic + CVE-2021-46909: (unk) ARM: footbridge: fix PCI interrupt mapping + CVE-2021-46915: (unk) netfilter: nft_limit: avoid possible divide error in nft_limit_init + CVE-2021-46921: (unk) locking/qrwlock: Fix ordering in queued_write_lock_slowpath() + CVE-2021-46924: (unk) NFC: st21nfca: Fix memory leak in device probe and remove + CVE-2021-46925: (unk) net/smc: fix kernel panic caused by race of smc_sock + CVE-2021-46926: (unk) ALSA: hda: intel-sdw-acpi: harden detection of controller + CVE-2021-46928: (unk) parisc: Clear stale IIR value on instruction access rights trap + CVE-2021-46929: (unk) sctp: use call_rcu to free endpoint + CVE-2021-46932: (unk) Input: appletouch - initialize work before device registration + CVE-2021-46933: (unk) usb: gadget: f_fs: Clear ffs_eventfd in ffs_data_clear. + CVE-2021-46934: (unk) i2c: validate user data in compat ioctl + CVE-2021-46935: (unk) binder: fix async_free_space accounting for empty parcels + CVE-2021-46936: (unk) net: fix use-after-free in tw_timer_handler + CVE-2021-46938: (unk) dm rq: fix double free of blk_mq_tag_set in dev remove after table load fails + CVE-2021-46939: (unk) tracing: Restructure trace_clock_global() to never block + CVE-2021-46941: (unk) usb: dwc3: core: Do core softreset when switch mode + CVE-2021-46950: (unk) md/raid1: properly indicate failure when ending a failed write request + CVE-2021-46951: (unk) tpm: efi: Use local variable for calculating final log size + CVE-2021-46952: (unk) NFS: fs_context: validate UDP retrans to prevent shift out-of-bounds + CVE-2021-46953: (unk) ACPI: GTDT: Don't corrupt interrupt mappings on watchdow probe failure + CVE-2021-46955: (unk) openvswitch: fix stack OOB read while fragmenting IPv4 packets + CVE-2021-46959: (unk) spi: Fix use-after-free with devm_spi_alloc_* + CVE-2021-46960: (unk) cifs: Return correct error code from smb2_get_enc_key + CVE-2021-46962: (unk) mmc: uniphier-sd: Fix a resource leak in the remove function + CVE-2021-46965: (unk) mtd: physmap: physmap-bt1-rom: Fix unintentional stack access + CVE-2021-46969: (unk) bus: mhi: core: Fix invalid error returning in mhi_queue + CVE-2021-46970: (unk) bus: mhi: pci_generic: Remove WQ_MEM_RECLAIM flag from state workqueue + CVE-2021-46974: (unk) bpf: Fix masking negation logic upon negative dst register + CVE-2021-46982: (unk) f2fs: compress: fix race condition of overwrite vs truncate + CVE-2021-46984: (unk) kyber: fix out of bounds access when preempted + CVE-2021-46988: (unk) userfaultfd: release page in error path to avoid BUG_ON + CVE-2021-46989: (unk) hfsplus: prevent corruption in shrinking truncate + CVE-2021-46991: (unk) i40e: Fix use-after-free in i40e_client_subtask() + CVE-2021-46992: (unk) netfilter: nftables: avoid overflows in nft_hash_buckets() + CVE-2021-46998: (unk) ethernet:enic: Fix a use after free bug in enic_hard_start_xmit + CVE-2021-47004: (unk) f2fs: fix to avoid touching checkpointed data in get_victim() + CVE-2021-47006: (unk) ARM: 9064/1: hw_breakpoint: Do not directly check the event's overflow_handler hook + CVE-2021-47010: (unk) net: Only allow init netns to set default tcp cong to a restricted algo + CVE-2021-47013: (unk) net:emac/emac-mac: Fix a use after free in emac_mac_tx_buf_send + CVE-2021-47020: (unk) soundwire: stream: fix memory leak in stream config error path + CVE-2021-47028: (unk) mt76: mt7915: fix txrate reporting + CVE-2021-47034: (unk) powerpc/64s: Fix pte update for kernel memory on radix + CVE-2021-47041: (unk) nvmet-tcp: fix incorrect locking in state_change sk callback + CVE-2021-47046: (unk) drm/amd/display: Fix off by one in hdmi_14_process_transaction() + CVE-2021-47049: (unk) Drivers: hv: vmbus: Use after free in __vmbus_open() + CVE-2021-47052: (unk) crypto: sa2ul - Fix memory leak of rxd + CVE-2021-47054: (unk) bus: qcom: Put child node before return + CVE-2021-47056: (unk) crypto: qat - ADF_STATUS_PF_RUNNING should be set after adf_dev_init + CVE-2021-47059: (unk) crypto: sun8i-ss - fix result memory leak on error path + CVE-2021-47063: (unk) drm: bridge/panel: Cleanup connector on bridge detach + CVE-2021-47065: (unk) rtw88: Fix array overrun in rtw_get_tx_power_params() + CVE-2021-47070: (unk) uio_hv_generic: Fix another memory leak in error handling paths + CVE-2021-47071: (unk) uio_hv_generic: Fix a memory leak in error handling paths + CVE-2021-47073: (unk) platform/x86: dell-smbios-wmi: Fix oops on rmmod dell_smbios + CVE-2021-47074: (unk) nvme-loop: fix memory leak in nvme_loop_create_ctrl() + CVE-2021-47075: (unk) nvmet: fix memory leak in nvmet_alloc_ctrl() + CVE-2021-47076: (unk) RDMA/rxe: Return CQE error if invalid lkey was supplied + CVE-2021-47077: (unk) scsi: qedf: Add pointer checks in qedf_update_link_speed() + CVE-2021-47078: (unk) RDMA/rxe: Clear all QP fields if creation failed + CVE-2021-47082: (unk) tun: avoid double free in tun_free_netdev + CVE-2021-47083: (unk) pinctrl: mediatek: fix global-out-of-bounds issue + CVE-2021-47086: (unk) phonet/pep: refuse to enable an unbound pipe + CVE-2021-47100: (unk) ipmi: Fix UAF when uninstall ipmi_si and ipmi_msghandler module + CVE-2021-47101: (unk) asix: fix uninit-value in asix_mdio_read() + CVE-2021-47103: (unk) inet: fully convert sk->sk_rx_dst to RCU rules + CVE-2021-47109: (unk) neighbour: allow NUD_NOARP entries to be forced GCed + CVE-2021-47110: (unk) x86/kvm: Disable kvmclock on all CPUs on shutdown + CVE-2021-47112: (unk) x86/kvm: Teardown PV features on boot CPU as well + CVE-2021-47113: (unk) btrfs: abort in rename_exchange if we fail to insert the second ref + CVE-2021-47114: (unk) ocfs2: fix data corruption by fallocate + CVE-2021-47116: (unk) ext4: fix memory leak in ext4_mb_init_backend on error path. + CVE-2021-47117: (unk) ext4: fix bug on in ext4_es_cache_extent as ext4_split_extent_at failed + CVE-2021-47118: (unk) pid: take a reference when initializing `cad_pid` + CVE-2021-47119: (unk) ext4: fix memory leak in ext4_fill_super + CVE-2021-47120: (unk) HID: magicmouse: fix NULL-deref on disconnect + CVE-2021-47121: (unk) net: caif: fix memory leak in cfusbl_device_notify + CVE-2021-47122: (unk) net: caif: fix memory leak in caif_device_notify + CVE-2021-47124: (unk) io_uring: fix link timeout refs + CVE-2021-47125: (unk) sch_htb: fix refcount leak in htb_parent_to_leaf_offload + CVE-2021-47128: (unk) bpf, lockdown, audit: Fix buggy SELinux lockdown permission checks + CVE-2021-47131: (unk) net/tls: Fix use-after-free after the TLS device goes down and up + CVE-2021-47133: (unk) HID: amd_sfh: Fix memory leak in amd_sfh_work + CVE-2021-47135: (unk) mt76: mt7921: fix possible AOOB issue in mt7921_mcu_tx_rate_report + CVE-2021-47136: (unk) net: zero-initialize tc skb extension on allocation + CVE-2021-47137: (unk) net: lantiq: fix memory corruption in RX ring + CVE-2021-47140: (unk) iommu/amd: Clear DMA ops when switching domain + CVE-2021-47142: (unk) drm/amdgpu: Fix a use-after-free + CVE-2021-47143: (unk) net/smc: remove device from smcd_dev_list after failed device_add() + CVE-2021-47144: (unk) drm/amd/amdgpu: fix refcount leak + CVE-2021-47145: (unk) btrfs: do not BUG_ON in link_to_fixup_dir + CVE-2021-47146: (unk) mld: fix panic in mld_newpack() + CVE-2021-47147: (unk) ptp: ocp: Fix a resource leak in an error handling path + CVE-2021-47149: (unk) net: fujitsu: fix potential null-ptr-deref + CVE-2021-47150: (unk) net: fec: fix the potential memory leak in fec_enet_init() + CVE-2021-47151: (unk) interconnect: qcom: bcm-voter: add a missing of_node_put() + CVE-2021-47153: (unk) i2c: i801: Don't generate an interrupt on bus reset + CVE-2021-47158: (unk) net: dsa: sja1105: add error handling in sja1105_setup() + CVE-2021-47159: (unk) net: dsa: fix a crash if ->get_sset_count() fails + CVE-2021-47160: (unk) net: dsa: mt7530: fix VLAN traffic leaks + CVE-2021-47161: (unk) spi: spi-fsl-dspi: Fix a resource leak in an error handling path + CVE-2021-47162: (unk) tipc: skb_linearize the head skb when reassembling msgs + CVE-2021-47163: (unk) tipc: wait and exit until all work queues are done + CVE-2021-47165: (unk) drm/meson: fix shutdown crash when component not probed + CVE-2021-47166: (unk) NFS: Don't corrupt the value of pg_bytes_written in nfs_do_recoalesce() + CVE-2021-47167: (unk) NFS: Fix an Oopsable condition in __nfs_pageio_add_request() + CVE-2021-47168: (unk) NFS: fix an incorrect limit in filelayout_decode_layout() + CVE-2021-47169: (unk) serial: rp2: use 'request_firmware' instead of 'request_firmware_nowait' + CVE-2021-47170: (unk) USB: usbfs: Don't WARN about excessively large memory allocations + CVE-2021-47171: (unk) net: usb: fix memory leak in smsc75xx_bind + CVE-2021-47172: (unk) iio: adc: ad7124: Fix potential overflow due to non sequential channel numbers + CVE-2021-47173: (unk) misc/uss720: fix memory leak in uss720_probe + CVE-2021-47175: (unk) net/sched: fq_pie: fix OOB access in the traffic path + CVE-2021-47177: (unk) iommu/vt-d: Fix sysfs leak in alloc_iommu() + CVE-2021-47179: (unk) NFSv4: Fix a NULL pointer dereference in pnfs_mark_matching_lsegs_return() + CVE-2021-47180: (unk) NFC: nci: fix memory leak in nci_allocate_device CVE-2022-0001: (unk) x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE CVE-2022-0002: (unk) x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE CVE-2022-0168: (unk) cifs: fix NULL ptr dereference in smb2_ioctl_query_info() @@ -839,6 +967,10 @@ Outstanding CVEs: CVE-2022-47520: (unk) wifi: wilc1000: validate pairwise and authentication suite offsets CVE-2022-47929: (unk) net: sched: disallow noqueue for qdisc classes CVE-2022-48619: (unk) Input: add bounds checking to input_set_capability() + CVE-2022-48626: (unk) moxart: fix potential use-after-free on remove path + CVE-2022-48627: (unk) vt: fix memory overlapping when deleting chars in the buffer + CVE-2022-48628: (unk) ceph: drop messages from MDS when unmounting + CVE-2022-48629: (unk) crypto: qcom-rng - ensure buffer for generate is completely filled CVE-2023-0045: (unk) x86/bugs: Flush IBP in ib_prctl_set() CVE-2023-0047: (unk) mm, oom: do not trigger out_of_memory from the #PF CVE-2023-0160: (unk) bpf, sockmap: fix deadlocks in the sockhash and sockmap @@ -908,6 +1040,7 @@ Outstanding CVEs: CVE-2023-28328: (unk) media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer() CVE-2023-28466: (unk) net: tls: fix possible race condition between do_tls_getsockopt_conf() and do_tls_setsockopt_conf() CVE-2023-2860: (unk) ipv6: sr: fix out-of-bounds read when setting HMAC data. + CVE-2023-28746: (unk) x86/mmio: Disable KVM mitigation when X86_FEATURE_CLEAR_CPU_BUF is set CVE-2023-28772: (unk) seq_buf: Fix overflow in seq_buf_putmem_hex() CVE-2023-2985: (unk) fs: hfsplus: fix UAF issue in hfsplus_put_super CVE-2023-3006: (unk) arm64: Add AMPERE1 to the Spectre-BHB affected list @@ -982,7 +1115,7 @@ Outstanding CVEs: CVE-2023-4623: (unk) net/sched: sch_hfsc: Ensure inner classes have fsc curve CVE-2023-46343: (unk) nfc: nci: fix possible NULL pointer dereference in send_acknowledge() CVE-2023-46838: (unk) xen-netback: don't produce zero-size SKB frags - CVE-2023-47233: (unk) + CVE-2023-47233: (unk) wifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach CVE-2023-4881: (unk) netfilter: nftables: exthdr: fix 4-byte stack OOB write CVE-2023-4921: (unk) net: sched: sch_qfq: Fix UAF in qfq_dequeue() CVE-2023-51042: (unk) drm/amdgpu: Fix potential fence use-after-free v2 @@ -1006,25 +1139,118 @@ Outstanding CVEs: CVE-2023-52449: (unk) mtd: Fix gluebi NULL pointer dereference caused by ftl notifier CVE-2023-52451: (unk) powerpc/pseries/memhp: Fix access beyond end of drmem array CVE-2023-52454: (unk) nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length - CVE-2023-52456: (unk) serial: imx: fix tx statemachine deadlock - CVE-2023-52457: (unk) serial: 8250: omap: Don't skip resource freeing if pm_runtime_resume_and_get() failed CVE-2023-52458: (unk) block: add check that partition length needs to be aligned with block size CVE-2023-52464: (unk) EDAC/thunderx: Fix possible out-of-bounds string access + CVE-2023-52469: (unk) drivers/amd/pm: fix a use-after-free in kv_parse_power_table + CVE-2023-52470: (unk) drm/radeon: check the alloc_workqueue return value in radeon_crtc_init() + CVE-2023-52474: (unk) IB/hfi1: Fix bugs with non-PAGE_SIZE-end multi-iovec user SDMA requests + CVE-2023-52475: (unk) Input: powermate - fix use-after-free in powermate_config_complete + CVE-2023-52476: (unk) perf/x86/lbr: Filter vsyscall addresses + CVE-2023-52477: (unk) usb: hub: Guard against accesses to uninitialized BOS descriptors + CVE-2023-52478: (unk) HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect + CVE-2023-52479: (unk) ksmbd: fix uaf in smb20_oplock_break_ack + CVE-2023-52480: (unk) ksmbd: fix race condition between session lookup and expire + CVE-2023-52481: (unk) arm64: errata: Add Cortex-A520 speculative unprivileged load workaround + CVE-2023-52482: (unk) x86/srso: Add SRSO mitigation for Hygon processors + CVE-2023-52484: (unk) iommu/arm-smmu-v3: Fix soft lockup triggered by arm_smmu_mm_invalidate_range + CVE-2023-52485: (unk) drm/amd/display: Wake DMCUB before sending a command + CVE-2023-52486: (unk) drm: Don't unref the same fb many times by mistake due to deadlock handling + CVE-2023-52488: (unk) serial: sc16is7xx: convert from _raw_ to _noinc_ regmap functions for FIFO + CVE-2023-52489: (unk) mm/sparsemem: fix race in accessing memory_section->usage + CVE-2023-52491: (unk) media: mtk-jpeg: Fix use after free bug due to error path handling in mtk_jpeg_dec_device_run + CVE-2023-52498: (unk) PM: sleep: Fix possible deadlocks in core system-wide PM code + CVE-2023-52500: (unk) scsi: pm80xx: Avoid leaking tags when processing OPC_INB_SET_CONTROLLER_CONFIG command + CVE-2023-52501: (unk) ring-buffer: Do not attempt to read past "commit" + CVE-2023-52502: (unk) net: nfc: fix races in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn() + CVE-2023-52504: (unk) x86/alternatives: Disable KASAN in apply_alternatives() + CVE-2023-52506: (unk) LoongArch: Set all reserved memblocks on Node#0 at initialization + CVE-2023-52507: (unk) nfc: nci: assert requested protocol is valid + CVE-2023-52508: (unk) nvme-fc: Prevent null pointer dereference in nvme_fc_io_getuuid() + CVE-2023-52509: (unk) ravb: Fix use-after-free issue in ravb_tx_timeout_work() + CVE-2023-52510: (unk) ieee802154: ca8210: Fix a potential UAF in ca8210_probe + CVE-2023-52511: (unk) spi: sun6i: reduce DMA RX transfer width to single byte + CVE-2023-52515: (unk) RDMA/srp: Do not call scsi_done() from srp_abort() + CVE-2023-52516: (unk) dma-debug: don't call __dma_entry_alloc_check_leak() under free_entries_lock + CVE-2023-52517: (unk) spi: sun6i: fix race between DMA RX transfer completion and RX FIFO drain + CVE-2023-52519: (unk) HID: intel-ish-hid: ipc: Disable and reenable ACPI GPE bit + CVE-2023-52522: (unk) net: fix possible store tearing in neigh_periodic_work() + CVE-2023-52527: (unk) ipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data() + CVE-2023-52528: (unk) net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg + CVE-2023-52530: (unk) wifi: mac80211: fix potential key use-after-free + CVE-2023-52531: (unk) wifi: iwlwifi: mvm: Fix a memory corruption issue + CVE-2023-52532: (unk) net: mana: Fix TX CQE error handling + CVE-2023-52559: (unk) iommu/vt-d: Avoid memory allocation in iommu_suspend() + CVE-2023-52561: (unk) arm64: dts: qcom: sdm845-db845c: Mark cont splash memory region as reserved + CVE-2023-52563: (unk) drm/meson: fix memory leak on ->hpd_notify callback + CVE-2023-52565: (unk) media: uvcvideo: Fix OOB read + CVE-2023-52566: (unk) nilfs2: fix potential use after free in nilfs_gccache_submit_read_data() + CVE-2023-52568: (unk) x86/sgx: Resolves SECS reclaim vs. page fault for EAUG race + CVE-2023-52569: (unk) btrfs: remove BUG() after failure to insert delayed dir index item + CVE-2023-52571: (unk) power: supply: rk817: Fix node refcount leak + CVE-2023-52572: (unk) cifs: Fix UAF in cifs_demultiplex_thread() + CVE-2023-52574: (unk) team: fix null-ptr-deref when team device type is changed + CVE-2023-52578: (unk) net: bridge: use DEV_STATS_INC() + CVE-2023-52583: (unk) ceph: fix deadlock or deadcode of misusing dget() + CVE-2023-52584: (unk) spmi: mediatek: Fix UAF on device remove + CVE-2023-52585: (unk) drm/amdgpu: Fix possible NULL dereference in amdgpu_ras_query_error_status_helper() + CVE-2023-52586: (unk) drm/msm/dpu: Add mutex lock in control vblank irq + CVE-2023-52587: (unk) IB/ipoib: Fix mcast list locking + CVE-2023-52588: (unk) f2fs: fix to tag gcing flag on page during block migration + CVE-2023-52589: (unk) media: rkisp1: Fix IRQ disable race issue + CVE-2023-52590: (unk) ocfs2: Avoid touching renamed directory if parent does not change + CVE-2023-52591: (unk) reiserfs: Avoid touching renamed directory if parent does not change + CVE-2023-52593: (unk) wifi: wfx: fix possible NULL pointer dereference in wfx_set_mfp_ap() + CVE-2023-52594: (unk) wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus() + CVE-2023-52595: (unk) wifi: rt2x00: restart beacon queue when hardware reset + CVE-2023-52596: (unk) sysctl: Fix out of bounds access for empty sysctl registers + CVE-2023-52597: (unk) KVM: s390: fix setting of fpc register + CVE-2023-52598: (unk) s390/ptrace: handle setting of fpc register correctly + CVE-2023-52599: (unk) jfs: fix array-index-out-of-bounds in diNewExt + CVE-2023-52600: (unk) jfs: fix uaf in jfs_evict_inode + CVE-2023-52601: (unk) jfs: fix array-index-out-of-bounds in dbAdjTree + CVE-2023-52602: (unk) jfs: fix slab-out-of-bounds Read in dtSearch + CVE-2023-52603: (unk) UBSAN: array-index-out-of-bounds in dtSplitRoot + CVE-2023-52604: (unk) FS:JFS:UBSAN:array-index-out-of-bounds in dbAdjTree + CVE-2023-52606: (unk) powerpc/lib: Validate size for vector operations + CVE-2023-52607: (unk) powerpc/mm: Fix null-pointer dereference in pgtable_cache_add + CVE-2023-52609: (unk) binder: fix race between mmput() and do_exit() + CVE-2023-52612: (unk) crypto: scomp - fix req->dst buffer overflow + CVE-2023-52614: (unk) PM / devfreq: Fix buffer overflow in trans_stat_show + CVE-2023-52615: (unk) hwrng: core - Fix page fault dead lock on mmap-ed hwrng + CVE-2023-52617: (unk) PCI: switchtec: Fix stdev_release() crash after surprise hot remove + CVE-2023-52618: (unk) block/rnbd-srv: Check for unlikely string overflow + CVE-2023-52619: (unk) pstore/ram: Fix crash when setting number of cpus to an odd number + CVE-2023-52620: (unk) netfilter: nf_tables: disallow timeout for anonymous sets + CVE-2023-52621: (unk) bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers + CVE-2023-52622: (unk) ext4: avoid online resizing failures due to oversized flex bg + CVE-2023-52623: (unk) SUNRPC: Fix a suspicious RCU usage warning + CVE-2023-52624: (unk) drm/amd/display: Wake DMCUB before executing GPINT commands + CVE-2023-52625: (unk) drm/amd/display: Refactor DMCUB enter/exit idle interface + CVE-2023-52628: (unk) netfilter: nftables: exthdr: fix 4-byte stack OOB write + CVE-2023-52629: (unk) sh: push-switch: Reorder cleanup operations to avoid use-after-free bug + CVE-2023-52632: (unk) drm/amdkfd: Fix lock dependency warning with srcu + CVE-2023-52633: (unk) um: time-travel: fix time corruption + CVE-2023-52634: (unk) drm/amd/display: Fix disable_otg_wa logic + CVE-2023-52635: (unk) PM / devfreq: Synchronize devfreq_monitor_[start/stop] + CVE-2023-52638: (unk) can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock + CVE-2023-52639: (unk) KVM: s390: vsie: fix race during shadow creation + CVE-2023-52640: (unk) fs/ntfs3: Fix oob in ntfs_listxattr + CVE-2023-52641: (unk) fs/ntfs3: Add NULL ptr dereference checking at the end of attr_allocate_frame() CVE-2023-5717: (unk) perf: Disallow mis-matched inherited group reads CVE-2023-6040: (unk) netfilter: nf_tables: Reject tables of unsupported family CVE-2023-6121: (unk) nvmet: nul-terminate the NQNs passed in the connect command CVE-2023-6240: (unk) - CVE-2023-6270: (unk) - CVE-2023-6356: (unk) + CVE-2023-6270: (unk) aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts + CVE-2023-6356: (unk) nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length CVE-2023-6535: (unk) - CVE-2023-6536: (unk) + CVE-2023-6536: (unk) nvmet-tcp: fix a crash in nvmet_req_complete() CVE-2023-6546: (unk) tty: n_gsm: fix the UAF caused by race condition in gsm_cleanup_mux CVE-2023-6606: (unk) smb: client: fix OOB in smbCalcSize() CVE-2023-6610: (unk) smb: client: fix potential OOB in smb2_dump_detail() CVE-2023-6915: (unk) ida: Fix crash in ida_free when the bitmap is empty CVE-2023-6931: (unk) perf: Fix perf_event_validate_size() CVE-2023-6932: (unk) ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet - CVE-2023-7042: (unk) + CVE-2023-7042: (unk) wifi: ath10k: fix NULL pointer dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev() CVE-2023-7192: (unk) netfilter: ctnetlink: fix possible refcount leak in ctnetlink_create_conntrack() CVE-2024-0340: (unk) vhost: use kzalloc() instead of kmalloc() followed by memset() CVE-2024-0564: (unk) @@ -1037,10 +1263,11 @@ Outstanding CVEs: CVE-2024-1151: (unk) net: openvswitch: limit the number of recursions from action sets CVE-2024-1312: (unk) mm: lock_vma_under_rcu() must check vma->anon_vma under vma lock CVE-2024-21803: (unk) - CVE-2024-22099: (unk) + CVE-2024-2193: (unk) + CVE-2024-22099: (unk) Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security CVE-2024-22386: (unk) - CVE-2024-23196: (unk) - CVE-2024-23307: (unk) + CVE-2024-23196: (unk) ALSA: hda: fix a possible null-pointer dereference due to data race in snd_hdac_regmap_sync() + CVE-2024-23307: (unk) md/raid5: fix atomicity violation in raid5_cache_count CVE-2024-23848: (unk) CVE-2024-23849: (unk) net/rds: Fix UBSAN: array-index-out-of-bounds in rds_cmsg_recv CVE-2024-23851: (unk) dm: limit the number of targets and parameter size area @@ -1049,7 +1276,7 @@ Outstanding CVEs: CVE-2024-24858: (unk) CVE-2024-24859: (unk) CVE-2024-24860: (unk) Bluetooth: Fix atomicity violation in {min,max}_key_size_set - CVE-2024-24861: (unk) + CVE-2024-24861: (unk) media: xc4000: Fix atomicity violation in xc4000_get_frequency CVE-2024-24864: (unk) CVE-2024-25739: (unk) CVE-2024-25740: (unk) @@ -1058,12 +1285,113 @@ Outstanding CVEs: CVE-2024-26584: (unk) net: tls: handle backlogging of crypto requests CVE-2024-26585: (unk) tls: fix race between tx work scheduling and socket close CVE-2024-26586: (unk) mlxsw: spectrum_acl_tcam: Fix stack corruption - CVE-2024-26587: (unk) net: netdevsim: don't try to destroy PHC on VFs - CVE-2024-26588: (unk) LoongArch: BPF: Prevent out-of-bounds memory access CVE-2024-26589: (unk) bpf: Reject variable offset alu on PTR_TO_FLOW_KEYS - CVE-2024-26591: (unk) bpf: Fix re-attachment branch in bpf_tracing_prog_attach CVE-2024-26592: (unk) ksmbd: fix UAF issue in ksmbd_tcp_new_connection() CVE-2024-26594: (unk) ksmbd: validate mech token in session setup CVE-2024-26595: (unk) mlxsw: spectrum_acl_tcam: Fix NULL pointer dereference in error path CVE-2024-26597: (unk) net: qualcomm: rmnet: fix global oob in rmnet_policy CVE-2024-26598: (unk) KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache + CVE-2024-26600: (unk) phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP + CVE-2024-26602: (unk) sched/membarrier: reduce the ability to hammer on sys_membarrier + CVE-2024-26606: (unk) binder: signal epoll threads of self-work + CVE-2024-26607: (unk) drm/bridge: sii902x: Fix probing race issue + CVE-2024-26614: (unk) tcp: make sure init the accept_queue's spinlocks once + CVE-2024-26615: (unk) net/smc: fix illegal rmb_desc access in SMC-D connection dump + CVE-2024-26622: (unk) tomoyo: fix UAF write bug in tomoyo_write_control() + CVE-2024-26623: (unk) pds_core: Prevent race issues involving the adminq + CVE-2024-26625: (unk) llc: call sock_orphan() at release time + CVE-2024-26627: (unk) scsi: core: Move scsi_host_busy() out of host lock for waking up EH handler + CVE-2024-26633: (unk) ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim() + CVE-2024-26635: (unk) llc: Drop support for ETH_P_TR_802_2. + CVE-2024-26636: (unk) llc: make llc_ui_sendmsg() more robust against bonding changes + CVE-2024-26640: (unk) tcp: add sanity checks to rx zerocopy + CVE-2024-26641: (unk) ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv() + CVE-2024-26642: (unk) netfilter: nf_tables: disallow anonymous set with timeout flag + CVE-2024-26644: (unk) btrfs: don't abort filesystem when attempting to snapshot deleted subvolume + CVE-2024-26645: (unk) tracing: Ensure visibility when inserting an element into tracing_map + CVE-2024-26646: (unk) thermal: intel: hfi: Add syscore callbacks for system-wide PM + CVE-2024-26647: (unk) drm/amd/display: Fix late derefrence 'dsc' check in 'link_set_dsc_pps_packet()' + CVE-2024-26648: (unk) drm/amd/display: Fix variable deferencing before NULL check in edp_setup_replay() + CVE-2024-26650: (unk) platform/x86: p2sb: Allow p2sb_bar() calls during PCI device probe + CVE-2024-26651: (unk) sr9800: Add check for usbnet_get_endpoints + CVE-2024-26654: (unk) ALSA: sh: aica: reorder cleanup operations to avoid UAF bugs + CVE-2024-26655: (unk) Fix memory leak in posix_clock_open() + CVE-2024-26656: (unk) drm/amdgpu: fix use-after-free bug + CVE-2024-26658: (unk) bcachefs: grab s_umount only if snapshotting + CVE-2024-26659: (unk) xhci: handle isoc Babble and Buffer Overrun events properly + CVE-2024-26663: (unk) tipc: Check the bearer type before calling tipc_udp_nl_bearer_add() + CVE-2024-26664: (unk) hwmon: (coretemp) Fix out-of-bounds memory access + CVE-2024-26668: (unk) netfilter: nft_limit: reject configurations that cause integer overflow + CVE-2024-26671: (unk) blk-mq: fix IO hang from sbitmap wakeup race + CVE-2024-26672: (unk) drm/amdgpu: Fix variable 'mca_funcs' dereferenced before NULL check in 'amdgpu_mca_smu_get_mca_entry()' + CVE-2024-26675: (unk) ppp_async: limit MRU to 64K + CVE-2024-26676: (unk) af_unix: Call kfree_skb() for dead unix_(sk)->oob_skb in GC. + CVE-2024-26677: (unk) rxrpc: Fix delayed ACKs to not set the reference serial number + CVE-2024-26679: (unk) inet: read sk->sk_family once in inet_recv_error() + CVE-2024-26685: (unk) nilfs2: fix potential bug in end_buffer_async_write + CVE-2024-26686: (unk) fs/proc: do_task_stat: use sig->stats_lock to gather the threads/children stats + CVE-2024-26687: (unk) xen/events: close evtchn after mapping cleanup + CVE-2024-26689: (unk) ceph: prevent use-after-free in encode_cap_msg() + CVE-2024-26691: (unk) KVM: arm64: Fix circular locking dependency + CVE-2024-26696: (unk) nilfs2: fix hang in nilfs_lookup_dirty_data_buffers() + CVE-2024-26697: (unk) nilfs2: fix data corruption in dsync block recovery for small block sizes + CVE-2024-26699: (unk) drm/amd/display: Fix array-index-out-of-bounds in dcn35_clkmgr + CVE-2024-26700: (unk) drm/amd/display: Fix MST Null Ptr for RV + CVE-2024-26702: (unk) iio: magnetometer: rm3100: add boundary check for the value read from RM3100_REG_TMRC + CVE-2024-26704: (unk) ext4: fix double-free of blocks due to wrong extents moved_len + CVE-2024-26706: (unk) parisc: Fix random data corruption from exception handler + CVE-2024-26713: (unk) powerpc/pseries/iommu: Fix iommu initialisation during DLPAR add + CVE-2024-26715: (unk) usb: dwc3: gadget: Fix NULL pointer dereference in dwc3_gadget_suspend + CVE-2024-26719: (unk) nouveau: offload fence uevents work to workqueue + CVE-2024-26720: (unk) mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again + CVE-2024-26726: (unk) btrfs: don't drop extent_map for free space inode on write error + CVE-2024-26733: (unk) arp: Prevent overflow in arp_req_get(). + CVE-2024-26735: (unk) ipv6: sr: fix possible use-after-free and null-ptr-deref + CVE-2024-26736: (unk) afs: Increase buffer size in afs_update_volume_status() + CVE-2024-26738: (unk) powerpc/pseries/iommu: DLPAR add doesn't completely initialize pci_controller + CVE-2024-26739: (unk) net/sched: act_mirred: don't override retval if we already lost the skb + CVE-2024-26740: (unk) net/sched: act_mirred: use the backlog for mirred ingress + CVE-2024-26743: (unk) RDMA/qedr: Fix qedr_create_user_qp error flow + CVE-2024-26744: (unk) RDMA/srpt: Support specifying the srpt_service_guid parameter + CVE-2024-26745: (unk) powerpc/pseries/iommu: IOMMU table is not initialized for kdump over SR-IOV + CVE-2024-26747: (unk) usb: roles: fix NULL pointer issue when put module's reference + CVE-2024-26748: (unk) usb: cdns3: fix memory double free when handle zero packet + CVE-2024-26751: (unk) ARM: ep93xx: Add terminator to gpiod_lookup_table + CVE-2024-26752: (unk) l2tp: pass correct message length to ip6_append_data + CVE-2024-26754: (unk) gtp: fix use-after-free and null-ptr-deref in gtp_genl_dump_pdp() + CVE-2024-26756: (unk) md: Don't register sync_thread for reshape directly + CVE-2024-26757: (unk) md: Don't ignore read-only array in md_check_recovery() + CVE-2024-26758: (unk) md: Don't ignore suspended array in md_check_recovery() + CVE-2024-26759: (unk) mm/swap: fix race when skipping swapcache + CVE-2024-26763: (unk) dm-crypt: don't modify the data when using authenticated encryption + CVE-2024-26764: (unk) fs/aio: Restrict kiocb_set_cancel_fn() to I/O submitted via libaio + CVE-2024-26765: (unk) LoongArch: Disable IRQ before init_fn() for nonboot CPUs + CVE-2024-26766: (unk) IB/hfi1: Fix sdma.h tx->num_descs off-by-one error + CVE-2024-26767: (unk) drm/amd/display: fixed integer types and null check locations + CVE-2024-26768: (unk) LoongArch: Change acpi_core_pic[NR_CPUS] to acpi_core_pic[MAX_CORE_PIC] + CVE-2024-26769: (unk) nvmet-fc: avoid deadlock on delete association path + CVE-2024-26770: (unk) HID: nvidia-shield: Add missing null pointer checks to LED initialization + CVE-2024-26771: (unk) dmaengine: ti: edma: Add some null pointer checks to the edma_probe + CVE-2024-26772: (unk) ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal() + CVE-2024-26773: (unk) ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found() + CVE-2024-26774: (unk) ext4: avoid dividing by 0 in mb_update_avg_fragment_size() when block bitmap corrupt + CVE-2024-26775: (unk) aoe: avoid potential deadlock at set_capacity + CVE-2024-26776: (unk) spi: hisi-sfc-v3xx: Return IRQ_NONE if no interrupts were detected + CVE-2024-26777: (unk) fbdev: sis: Error out if pixclock equals zero + CVE-2024-26778: (unk) fbdev: savage: Error out if pixclock equals zero + CVE-2024-26779: (unk) wifi: mac80211: fix race condition on enabling fast-xmit + CVE-2024-26784: (unk) pmdomain: arm: Fix NULL dereference on scmi_perf_domain removal + CVE-2024-26787: (unk) mmc: mmci: stm32: fix DMA API overlapping mappings warning + CVE-2024-26789: (unk) crypto: arm64/neonbs - fix out-of-bounds access on short input + CVE-2024-26791: (unk) btrfs: dev-replace: properly validate device names + CVE-2024-26793: (unk) gtp: fix use-after-free and null-ptr-deref in gtp_newlink() + CVE-2024-26797: (unk) drm/amd/display: Prevent potential buffer overflow in map_hw_resources + CVE-2024-26798: (unk) fbcon: always restore the old font data in fbcon_do_set_font() + CVE-2024-26801: (unk) Bluetooth: Avoid potential use-after-free in hci_error_reset + CVE-2024-26802: (unk) stmmac: Clear variable when destroying workqueue + CVE-2024-26803: (unk) net: veth: clear GRO when clearing XDP even when down + CVE-2024-26804: (unk) net: ip_tunnel: prevent perpetual headroom growth + CVE-2024-26805: (unk) netlink: Fix kernel-infoleak-after-free in __skb_datagram_iter + CVE-2024-26806: (unk) spi: cadence-qspi: remove system-wide suspend helper calls from runtime PM hooks + CVE-2024-26808: (unk) netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain + CVE-2024-26809: (unk) netfilter: nft_set_pipapo: release elements in clone only from destroy path diff --git a/data/5.1/5.1_CVEs.txt b/data/5.1/5.1_CVEs.txt index 499f19852..2ec8128b5 100644 --- a/data/5.1/5.1_CVEs.txt +++ b/data/5.1/5.1_CVEs.txt @@ -218,6 +218,7 @@ CVE-2019-2181: Fix not seen in stream CVE-2019-2213: Fixed with 5.1.15 CVE-2019-2214: Fix not seen in stream CVE-2019-25045: Fixed with 5.1 +CVE-2019-25162: Fix not seen in stream CVE-2019-3016: Fix not seen in stream CVE-2019-3846: Fixed with 5.1.18 CVE-2019-3874: Fix not seen in stream @@ -392,6 +393,14 @@ CVE-2020-36558: Fix not seen in stream CVE-2020-36691: Fix not seen in stream CVE-2020-36694: Fix not seen in stream CVE-2020-36766: Fix not seen in stream +CVE-2020-36775: Fix not seen in stream +CVE-2020-36777: Fix not seen in stream +CVE-2020-36780: Fix not seen in stream +CVE-2020-36781: Fix not seen in stream +CVE-2020-36782: Fix not seen in stream +CVE-2020-36783: Fix not seen in stream +CVE-2020-36784: Fix not seen in stream +CVE-2020-36787: Fix not seen in stream CVE-2020-3702: Fix not seen in stream CVE-2020-4788: Fix not seen in stream CVE-2020-7053: Fix not seen in stream @@ -555,6 +564,127 @@ CVE-2021-45469: Fix not seen in stream CVE-2021-45485: Fix not seen in stream CVE-2021-45486: Fix not seen in stream CVE-2021-45868: Fix not seen in stream +CVE-2021-46904: Fix not seen in stream +CVE-2021-46906: Fix not seen in stream +CVE-2021-46908: Fix not seen in stream +CVE-2021-46909: Fix not seen in stream +CVE-2021-46915: Fix not seen in stream +CVE-2021-46921: Fix not seen in stream +CVE-2021-46924: Fix not seen in stream +CVE-2021-46925: Fix not seen in stream +CVE-2021-46926: Fix not seen in stream +CVE-2021-46928: Fix not seen in stream +CVE-2021-46929: Fix not seen in stream +CVE-2021-46932: Fix not seen in stream +CVE-2021-46933: Fix not seen in stream +CVE-2021-46934: Fix not seen in stream +CVE-2021-46935: Fix not seen in stream +CVE-2021-46936: Fix not seen in stream +CVE-2021-46938: Fix not seen in stream +CVE-2021-46939: Fix not seen in stream +CVE-2021-46941: Fix not seen in stream +CVE-2021-46950: Fix not seen in stream +CVE-2021-46951: Fix not seen in stream +CVE-2021-46952: Fix not seen in stream +CVE-2021-46953: Fix not seen in stream +CVE-2021-46955: Fix not seen in stream +CVE-2021-46959: Fix not seen in stream +CVE-2021-46960: Fix not seen in stream +CVE-2021-46961: Fix not seen in stream +CVE-2021-46962: Fix not seen in stream +CVE-2021-46965: Fix not seen in stream +CVE-2021-46969: Fix not seen in stream +CVE-2021-46970: Fix not seen in stream +CVE-2021-46974: Fix not seen in stream +CVE-2021-46982: Fix not seen in stream +CVE-2021-46984: Fix not seen in stream +CVE-2021-46988: Fix not seen in stream +CVE-2021-46989: Fix not seen in stream +CVE-2021-46991: Fix not seen in stream +CVE-2021-46992: Fix not seen in stream +CVE-2021-46998: Fix not seen in stream +CVE-2021-47004: Fix not seen in stream +CVE-2021-47005: Fix not seen in stream +CVE-2021-47006: Fix not seen in stream +CVE-2021-47010: Fix not seen in stream +CVE-2021-47013: Fix not seen in stream +CVE-2021-47015: Fix not seen in stream +CVE-2021-47020: Fix not seen in stream +CVE-2021-47028: Fix not seen in stream +CVE-2021-47034: Fix not seen in stream +CVE-2021-47041: Fix not seen in stream +CVE-2021-47046: Fix not seen in stream +CVE-2021-47049: Fix not seen in stream +CVE-2021-47052: Fix not seen in stream +CVE-2021-47054: Fix not seen in stream +CVE-2021-47056: Fix not seen in stream +CVE-2021-47059: Fix not seen in stream +CVE-2021-47063: Fix not seen in stream +CVE-2021-47065: Fix not seen in stream +CVE-2021-47070: Fix not seen in stream +CVE-2021-47071: Fix not seen in stream +CVE-2021-47073: Fix not seen in stream +CVE-2021-47074: Fix not seen in stream +CVE-2021-47075: Fix not seen in stream +CVE-2021-47076: Fix not seen in stream +CVE-2021-47077: Fix not seen in stream +CVE-2021-47078: Fix not seen in stream +CVE-2021-47082: Fix not seen in stream +CVE-2021-47083: Fix not seen in stream +CVE-2021-47086: Fix not seen in stream +CVE-2021-47100: Fix not seen in stream +CVE-2021-47101: Fix not seen in stream +CVE-2021-47103: Fix not seen in stream +CVE-2021-47109: Fix not seen in stream +CVE-2021-47110: Fix not seen in stream +CVE-2021-47112: Fix not seen in stream +CVE-2021-47113: Fix not seen in stream +CVE-2021-47114: Fix not seen in stream +CVE-2021-47116: Fix not seen in stream +CVE-2021-47117: Fix not seen in stream +CVE-2021-47118: Fix not seen in stream +CVE-2021-47119: Fix not seen in stream +CVE-2021-47120: Fix not seen in stream +CVE-2021-47121: Fix not seen in stream +CVE-2021-47122: Fix not seen in stream +CVE-2021-47124: Fix not seen in stream +CVE-2021-47125: Fix not seen in stream +CVE-2021-47128: Fix not seen in stream +CVE-2021-47131: Fix not seen in stream +CVE-2021-47133: Fix not seen in stream +CVE-2021-47135: Fix not seen in stream +CVE-2021-47136: Fix not seen in stream +CVE-2021-47137: Fix not seen in stream +CVE-2021-47140: Fix not seen in stream +CVE-2021-47142: Fix not seen in stream +CVE-2021-47143: Fix not seen in stream +CVE-2021-47144: Fix not seen in stream +CVE-2021-47145: Fix not seen in stream +CVE-2021-47146: Fix not seen in stream +CVE-2021-47147: Fix not seen in stream +CVE-2021-47149: Fix not seen in stream +CVE-2021-47150: Fix not seen in stream +CVE-2021-47151: Fix not seen in stream +CVE-2021-47153: Fix not seen in stream +CVE-2021-47158: Fix not seen in stream +CVE-2021-47159: Fix not seen in stream +CVE-2021-47160: Fix not seen in stream +CVE-2021-47161: Fix not seen in stream +CVE-2021-47162: Fix not seen in stream +CVE-2021-47163: Fix not seen in stream +CVE-2021-47165: Fix not seen in stream +CVE-2021-47166: Fix not seen in stream +CVE-2021-47167: Fix not seen in stream +CVE-2021-47168: Fix not seen in stream +CVE-2021-47169: Fix not seen in stream +CVE-2021-47170: Fix not seen in stream +CVE-2021-47171: Fix not seen in stream +CVE-2021-47172: Fix not seen in stream +CVE-2021-47173: Fix not seen in stream +CVE-2021-47175: Fix not seen in stream +CVE-2021-47177: Fix not seen in stream +CVE-2021-47179: Fix not seen in stream +CVE-2021-47180: Fix not seen in stream CVE-2022-0001: Fix not seen in stream CVE-2022-0002: Fix not seen in stream CVE-2022-0168: Fix not seen in stream @@ -769,6 +899,10 @@ CVE-2022-47520: Fix not seen in stream CVE-2022-47929: Fix not seen in stream CVE-2022-47946: Fix not seen in stream CVE-2022-48619: Fix not seen in stream +CVE-2022-48626: Fix not seen in stream +CVE-2022-48627: Fix not seen in stream +CVE-2022-48628: Fix not seen in stream +CVE-2022-48629: Fix not seen in stream CVE-2023-0045: Fix not seen in stream CVE-2023-0047: Fix not seen in stream CVE-2023-0160: Fix not seen in stream @@ -840,6 +974,7 @@ CVE-2023-26607: Fix not seen in stream CVE-2023-28328: Fix not seen in stream CVE-2023-28466: Fix not seen in stream CVE-2023-2860: Fix not seen in stream +CVE-2023-28746: Fix not seen in stream CVE-2023-28772: Fix not seen in stream CVE-2023-2985: Fix not seen in stream CVE-2023-3006: Fix not seen in stream @@ -916,7 +1051,7 @@ CVE-2023-4622: Fix not seen in stream CVE-2023-4623: Fix not seen in stream CVE-2023-46343: Fix not seen in stream CVE-2023-46838: Fix not seen in stream -CVE-2023-47233: Fix unknown +CVE-2023-47233: Fix not seen in stream CVE-2023-4881: Fix not seen in stream CVE-2023-4921: Fix not seen in stream CVE-2023-50431: Fix not seen in stream @@ -941,18 +1076,112 @@ CVE-2023-52448: Fix not seen in stream CVE-2023-52449: Fix not seen in stream CVE-2023-52451: Fix not seen in stream CVE-2023-52454: Fix not seen in stream -CVE-2023-52456: Fix not seen in stream -CVE-2023-52457: Fix not seen in stream CVE-2023-52458: Fix not seen in stream CVE-2023-52464: Fix not seen in stream +CVE-2023-52469: Fix not seen in stream +CVE-2023-52470: Fix not seen in stream +CVE-2023-52474: Fix not seen in stream +CVE-2023-52475: Fix not seen in stream +CVE-2023-52476: Fix not seen in stream +CVE-2023-52477: Fix not seen in stream +CVE-2023-52478: Fix not seen in stream +CVE-2023-52479: Fix not seen in stream +CVE-2023-52480: Fix not seen in stream +CVE-2023-52481: Fix not seen in stream +CVE-2023-52482: Fix not seen in stream +CVE-2023-52484: Fix not seen in stream +CVE-2023-52485: Fix not seen in stream +CVE-2023-52486: Fix not seen in stream +CVE-2023-52488: Fix not seen in stream +CVE-2023-52489: Fix not seen in stream +CVE-2023-52491: Fix not seen in stream +CVE-2023-52498: Fix not seen in stream +CVE-2023-52500: Fix not seen in stream +CVE-2023-52501: Fix not seen in stream +CVE-2023-52502: Fix not seen in stream +CVE-2023-52504: Fix not seen in stream +CVE-2023-52506: Fix not seen in stream +CVE-2023-52507: Fix not seen in stream +CVE-2023-52508: Fix not seen in stream +CVE-2023-52509: Fix not seen in stream +CVE-2023-52510: Fix not seen in stream +CVE-2023-52511: Fix not seen in stream +CVE-2023-52515: Fix not seen in stream +CVE-2023-52516: Fix not seen in stream +CVE-2023-52517: Fix not seen in stream +CVE-2023-52519: Fix not seen in stream +CVE-2023-52522: Fix not seen in stream +CVE-2023-52527: Fix not seen in stream +CVE-2023-52528: Fix not seen in stream +CVE-2023-52530: Fix not seen in stream +CVE-2023-52531: Fix not seen in stream +CVE-2023-52532: Fix not seen in stream +CVE-2023-52559: Fix not seen in stream +CVE-2023-52561: Fix not seen in stream +CVE-2023-52563: Fix not seen in stream +CVE-2023-52565: Fix not seen in stream +CVE-2023-52566: Fix not seen in stream +CVE-2023-52568: Fix not seen in stream +CVE-2023-52569: Fix not seen in stream +CVE-2023-52571: Fix not seen in stream +CVE-2023-52572: Fix not seen in stream +CVE-2023-52573: Fix not seen in stream +CVE-2023-52574: Fix not seen in stream +CVE-2023-52578: Fix not seen in stream +CVE-2023-52583: Fix not seen in stream +CVE-2023-52584: Fix not seen in stream +CVE-2023-52585: Fix not seen in stream +CVE-2023-52586: Fix not seen in stream +CVE-2023-52587: Fix not seen in stream +CVE-2023-52588: Fix not seen in stream +CVE-2023-52589: Fix not seen in stream +CVE-2023-52590: Fix not seen in stream +CVE-2023-52591: Fix not seen in stream +CVE-2023-52593: Fix not seen in stream +CVE-2023-52594: Fix not seen in stream +CVE-2023-52595: Fix not seen in stream +CVE-2023-52596: Fix not seen in stream +CVE-2023-52597: Fix not seen in stream +CVE-2023-52598: Fix not seen in stream +CVE-2023-52599: Fix not seen in stream +CVE-2023-52600: Fix not seen in stream +CVE-2023-52601: Fix not seen in stream +CVE-2023-52602: Fix not seen in stream +CVE-2023-52603: Fix not seen in stream +CVE-2023-52604: Fix not seen in stream +CVE-2023-52606: Fix not seen in stream +CVE-2023-52607: Fix not seen in stream +CVE-2023-52609: Fix not seen in stream +CVE-2023-52612: Fix not seen in stream +CVE-2023-52614: Fix not seen in stream +CVE-2023-52615: Fix not seen in stream +CVE-2023-52617: Fix not seen in stream +CVE-2023-52618: Fix not seen in stream +CVE-2023-52619: Fix not seen in stream +CVE-2023-52620: Fix not seen in stream +CVE-2023-52621: Fix not seen in stream +CVE-2023-52622: Fix not seen in stream +CVE-2023-52623: Fix not seen in stream +CVE-2023-52624: Fix not seen in stream +CVE-2023-52625: Fix not seen in stream +CVE-2023-52628: Fix not seen in stream +CVE-2023-52629: Fix not seen in stream +CVE-2023-52632: Fix not seen in stream +CVE-2023-52633: Fix not seen in stream +CVE-2023-52634: Fix not seen in stream +CVE-2023-52635: Fix not seen in stream +CVE-2023-52638: Fix not seen in stream +CVE-2023-52639: Fix not seen in stream +CVE-2023-52640: Fix not seen in stream +CVE-2023-52641: Fix not seen in stream CVE-2023-5717: Fix not seen in stream CVE-2023-6040: Fix not seen in stream CVE-2023-6121: Fix not seen in stream CVE-2023-6240: Fix unknown -CVE-2023-6270: Fix unknown -CVE-2023-6356: Fix unknown +CVE-2023-6270: Fix not seen in stream +CVE-2023-6356: Fix not seen in stream CVE-2023-6535: Fix unknown -CVE-2023-6536: Fix unknown +CVE-2023-6536: Fix not seen in stream CVE-2023-6546: Fix not seen in stream CVE-2023-6560: Fix not seen in stream CVE-2023-6606: Fix not seen in stream @@ -960,7 +1189,7 @@ CVE-2023-6610: Fix not seen in stream CVE-2023-6915: Fix not seen in stream CVE-2023-6931: Fix not seen in stream CVE-2023-6932: Fix not seen in stream -CVE-2023-7042: Fix unknown +CVE-2023-7042: Fix not seen in stream CVE-2023-7192: Fix not seen in stream CVE-2024-0340: Fix not seen in stream CVE-2024-0564: Fix unknown @@ -969,15 +1198,16 @@ CVE-2024-0584: Fix not seen in stream CVE-2024-0607: Fix not seen in stream CVE-2024-0646: Fix not seen in stream CVE-2024-0775: Fix not seen in stream -CVE-2024-0841: Fix unknown +CVE-2024-0841: Fix not seen in stream CVE-2024-1086: Fix not seen in stream CVE-2024-1151: Fix not seen in stream CVE-2024-1312: Fix not seen in stream CVE-2024-21803: Fix unknown -CVE-2024-22099: Fix unknown +CVE-2024-2193: Fix unknown +CVE-2024-22099: Fix not seen in stream CVE-2024-22386: Fix unknown -CVE-2024-23196: Fix unknown -CVE-2024-23307: Fix unknown +CVE-2024-23196: Fix not seen in stream +CVE-2024-23307: Fix not seen in stream CVE-2024-23848: Fix unknown CVE-2024-23849: Fix not seen in stream CVE-2024-23851: Fix not seen in stream @@ -986,7 +1216,7 @@ CVE-2024-24857: Fix unknown CVE-2024-24858: Fix unknown CVE-2024-24859: Fix unknown CVE-2024-24860: Fix not seen in stream -CVE-2024-24861: Fix unknown +CVE-2024-24861: Fix not seen in stream CVE-2024-24864: Fix unknown CVE-2024-25739: Fix unknown CVE-2024-25740: Fix unknown @@ -995,12 +1225,117 @@ CVE-2024-25744: Fix not seen in stream CVE-2024-26584: Fix not seen in stream CVE-2024-26585: Fix not seen in stream CVE-2024-26586: Fix not seen in stream -CVE-2024-26587: Fix not seen in stream -CVE-2024-26588: Fix not seen in stream CVE-2024-26589: Fix not seen in stream -CVE-2024-26591: Fix not seen in stream CVE-2024-26592: Fix not seen in stream CVE-2024-26594: Fix not seen in stream CVE-2024-26595: Fix not seen in stream CVE-2024-26597: Fix not seen in stream CVE-2024-26598: Fix not seen in stream +CVE-2024-26600: Fix not seen in stream +CVE-2024-26602: Fix not seen in stream +CVE-2024-26606: Fix not seen in stream +CVE-2024-26607: Fix not seen in stream +CVE-2024-26614: Fix not seen in stream +CVE-2024-26615: Fix not seen in stream +CVE-2024-26622: Fix not seen in stream +CVE-2024-26623: Fix not seen in stream +CVE-2024-26625: Fix not seen in stream +CVE-2024-26627: Fix not seen in stream +CVE-2024-26633: Fix not seen in stream +CVE-2024-26635: Fix not seen in stream +CVE-2024-26636: Fix not seen in stream +CVE-2024-26640: Fix not seen in stream +CVE-2024-26641: Fix not seen in stream +CVE-2024-26642: Fix not seen in stream +CVE-2024-26644: Fix not seen in stream +CVE-2024-26645: Fix not seen in stream +CVE-2024-26646: Fix not seen in stream +CVE-2024-26647: Fix not seen in stream +CVE-2024-26648: Fix not seen in stream +CVE-2024-26650: Fix not seen in stream +CVE-2024-26651: Fix not seen in stream +CVE-2024-26654: Fix not seen in stream +CVE-2024-26655: Fix not seen in stream +CVE-2024-26656: Fix not seen in stream +CVE-2024-26658: Fix not seen in stream +CVE-2024-26659: Fix not seen in stream +CVE-2024-26663: Fix not seen in stream +CVE-2024-26664: Fix not seen in stream +CVE-2024-26668: Fix not seen in stream +CVE-2024-26669: Fix not seen in stream +CVE-2024-26671: Fix not seen in stream +CVE-2024-26672: Fix not seen in stream +CVE-2024-26675: Fix not seen in stream +CVE-2024-26676: Fix not seen in stream +CVE-2024-26677: Fix not seen in stream +CVE-2024-26679: Fix not seen in stream +CVE-2024-26685: Fix not seen in stream +CVE-2024-26686: Fix not seen in stream +CVE-2024-26687: Fix not seen in stream +CVE-2024-26688: Fix not seen in stream +CVE-2024-26689: Fix not seen in stream +CVE-2024-26691: Fix not seen in stream +CVE-2024-26696: Fix not seen in stream +CVE-2024-26697: Fix not seen in stream +CVE-2024-26699: Fix not seen in stream +CVE-2024-26700: Fix not seen in stream +CVE-2024-26702: Fix not seen in stream +CVE-2024-26704: Fix not seen in stream +CVE-2024-26706: Fix not seen in stream +CVE-2024-26713: Fix not seen in stream +CVE-2024-26715: Fix not seen in stream +CVE-2024-26719: Fix not seen in stream +CVE-2024-26720: Fix not seen in stream +CVE-2024-26726: Fix not seen in stream +CVE-2024-26733: Fix not seen in stream +CVE-2024-26735: Fix not seen in stream +CVE-2024-26736: Fix not seen in stream +CVE-2024-26738: Fix not seen in stream +CVE-2024-26739: Fix not seen in stream +CVE-2024-26740: Fix not seen in stream +CVE-2024-26743: Fix not seen in stream +CVE-2024-26744: Fix not seen in stream +CVE-2024-26745: Fix not seen in stream +CVE-2024-26747: Fix not seen in stream +CVE-2024-26748: Fix not seen in stream +CVE-2024-26751: Fix not seen in stream +CVE-2024-26752: Fix not seen in stream +CVE-2024-26754: Fix not seen in stream +CVE-2024-26756: Fix not seen in stream +CVE-2024-26757: Fix not seen in stream +CVE-2024-26758: Fix not seen in stream +CVE-2024-26759: Fix not seen in stream +CVE-2024-26763: Fix not seen in stream +CVE-2024-26764: Fix not seen in stream +CVE-2024-26765: Fix not seen in stream +CVE-2024-26766: Fix not seen in stream +CVE-2024-26767: Fix not seen in stream +CVE-2024-26768: Fix not seen in stream +CVE-2024-26769: Fix not seen in stream +CVE-2024-26770: Fix not seen in stream +CVE-2024-26771: Fix not seen in stream +CVE-2024-26772: Fix not seen in stream +CVE-2024-26773: Fix not seen in stream +CVE-2024-26774: Fix not seen in stream +CVE-2024-26775: Fix not seen in stream +CVE-2024-26776: Fix not seen in stream +CVE-2024-26777: Fix not seen in stream +CVE-2024-26778: Fix not seen in stream +CVE-2024-26779: Fix not seen in stream +CVE-2024-26784: Fix not seen in stream +CVE-2024-26787: Fix not seen in stream +CVE-2024-26788: Fix not seen in stream +CVE-2024-26789: Fix not seen in stream +CVE-2024-26790: Fix not seen in stream +CVE-2024-26791: Fix not seen in stream +CVE-2024-26793: Fix not seen in stream +CVE-2024-26797: Fix not seen in stream +CVE-2024-26798: Fix not seen in stream +CVE-2024-26801: Fix not seen in stream +CVE-2024-26802: Fix not seen in stream +CVE-2024-26803: Fix not seen in stream +CVE-2024-26804: Fix not seen in stream +CVE-2024-26805: Fix not seen in stream +CVE-2024-26806: Fix not seen in stream +CVE-2024-26808: Fix not seen in stream +CVE-2024-26809: Fix not seen in stream diff --git a/data/5.1/5.1_security.txt b/data/5.1/5.1_security.txt index 34a619126..90aeeb448 100644 --- a/data/5.1/5.1_security.txt +++ b/data/5.1/5.1_security.txt @@ -258,6 +258,7 @@ Outstanding CVEs: CVE-2019-20934: (unk) sched/fair: Don't free p->numa_faults with concurrent readers CVE-2019-2181: (unk) binder: check for overflow when alloc for security context CVE-2019-2214: (unk) binder: Set end of SG buffer area properly. + CVE-2019-25162: (unk) i2c: Fix a potential use after free CVE-2019-3016: (unk) x86/kvm: Be careful not to clear KVM_VCPU_FLUSH_TLB bit CVE-2019-3874: (unk) sctp: implement memory accounting on tx path CVE-2019-3900: (unk) vhost_net: fix possible infinite loop @@ -428,6 +429,14 @@ Outstanding CVEs: CVE-2020-36691: (unk) netlink: limit recursion depth in policy validation CVE-2020-36694: (unk) netfilter: x_tables: Switch synchronization to RCU CVE-2020-36766: (unk) cec-api: prevent leaking memory through hole in structure + CVE-2020-36775: (unk) f2fs: fix to avoid potential deadlock + CVE-2020-36777: (unk) media: dvbdev: Fix memory leak in dvb_media_device_free() + CVE-2020-36780: (unk) i2c: sprd: fix reference leak when pm_runtime_get_sync fails + CVE-2020-36781: (unk) i2c: imx: fix reference leak when pm_runtime_get_sync fails + CVE-2020-36782: (unk) i2c: imx-lpi2c: fix reference leak when pm_runtime_get_sync fails + CVE-2020-36783: (unk) i2c: img-scb: fix reference leak when pm_runtime_get_sync fails + CVE-2020-36784: (unk) i2c: cadence: fix reference leak when pm_runtime_get_sync fails + CVE-2020-36787: (unk) media: aspeed: fix clock handling logic CVE-2020-3702: (unk) ath: Use safer key clearing with key cache entries CVE-2020-4788: (unk) powerpc/64s: flush L1D on kernel entry CVE-2020-7053: (unk) drm/i915: Introduce a mutex for file_priv->context_idr @@ -591,6 +600,127 @@ Outstanding CVEs: CVE-2021-45485: (unk) ipv6: use prandom_u32() for ID generation CVE-2021-45486: (unk) inet: use bigger hash table for IP ID generation CVE-2021-45868: (unk) quota: check block number when reading the block in quota file + CVE-2021-46904: (unk) net: hso: fix null-ptr-deref during tty device unregistration + CVE-2021-46906: (unk) HID: usbhid: fix info leak in hid_submit_ctrl + CVE-2021-46908: (unk) bpf: Use correct permission flag for mixed signed bounds arithmetic + CVE-2021-46909: (unk) ARM: footbridge: fix PCI interrupt mapping + CVE-2021-46915: (unk) netfilter: nft_limit: avoid possible divide error in nft_limit_init + CVE-2021-46921: (unk) locking/qrwlock: Fix ordering in queued_write_lock_slowpath() + CVE-2021-46924: (unk) NFC: st21nfca: Fix memory leak in device probe and remove + CVE-2021-46925: (unk) net/smc: fix kernel panic caused by race of smc_sock + CVE-2021-46926: (unk) ALSA: hda: intel-sdw-acpi: harden detection of controller + CVE-2021-46928: (unk) parisc: Clear stale IIR value on instruction access rights trap + CVE-2021-46929: (unk) sctp: use call_rcu to free endpoint + CVE-2021-46932: (unk) Input: appletouch - initialize work before device registration + CVE-2021-46933: (unk) usb: gadget: f_fs: Clear ffs_eventfd in ffs_data_clear. + CVE-2021-46934: (unk) i2c: validate user data in compat ioctl + CVE-2021-46935: (unk) binder: fix async_free_space accounting for empty parcels + CVE-2021-46936: (unk) net: fix use-after-free in tw_timer_handler + CVE-2021-46938: (unk) dm rq: fix double free of blk_mq_tag_set in dev remove after table load fails + CVE-2021-46939: (unk) tracing: Restructure trace_clock_global() to never block + CVE-2021-46941: (unk) usb: dwc3: core: Do core softreset when switch mode + CVE-2021-46950: (unk) md/raid1: properly indicate failure when ending a failed write request + CVE-2021-46951: (unk) tpm: efi: Use local variable for calculating final log size + CVE-2021-46952: (unk) NFS: fs_context: validate UDP retrans to prevent shift out-of-bounds + CVE-2021-46953: (unk) ACPI: GTDT: Don't corrupt interrupt mappings on watchdow probe failure + CVE-2021-46955: (unk) openvswitch: fix stack OOB read while fragmenting IPv4 packets + CVE-2021-46959: (unk) spi: Fix use-after-free with devm_spi_alloc_* + CVE-2021-46960: (unk) cifs: Return correct error code from smb2_get_enc_key + CVE-2021-46961: (unk) irqchip/gic-v3: Do not enable irqs when handling spurious interrups + CVE-2021-46962: (unk) mmc: uniphier-sd: Fix a resource leak in the remove function + CVE-2021-46965: (unk) mtd: physmap: physmap-bt1-rom: Fix unintentional stack access + CVE-2021-46969: (unk) bus: mhi: core: Fix invalid error returning in mhi_queue + CVE-2021-46970: (unk) bus: mhi: pci_generic: Remove WQ_MEM_RECLAIM flag from state workqueue + CVE-2021-46974: (unk) bpf: Fix masking negation logic upon negative dst register + CVE-2021-46982: (unk) f2fs: compress: fix race condition of overwrite vs truncate + CVE-2021-46984: (unk) kyber: fix out of bounds access when preempted + CVE-2021-46988: (unk) userfaultfd: release page in error path to avoid BUG_ON + CVE-2021-46989: (unk) hfsplus: prevent corruption in shrinking truncate + CVE-2021-46991: (unk) i40e: Fix use-after-free in i40e_client_subtask() + CVE-2021-46992: (unk) netfilter: nftables: avoid overflows in nft_hash_buckets() + CVE-2021-46998: (unk) ethernet:enic: Fix a use after free bug in enic_hard_start_xmit + CVE-2021-47004: (unk) f2fs: fix to avoid touching checkpointed data in get_victim() + CVE-2021-47005: (unk) PCI: endpoint: Fix NULL pointer dereference for ->get_features() + CVE-2021-47006: (unk) ARM: 9064/1: hw_breakpoint: Do not directly check the event's overflow_handler hook + CVE-2021-47010: (unk) net: Only allow init netns to set default tcp cong to a restricted algo + CVE-2021-47013: (unk) net:emac/emac-mac: Fix a use after free in emac_mac_tx_buf_send + CVE-2021-47015: (unk) bnxt_en: Fix RX consumer index logic in the error path. + CVE-2021-47020: (unk) soundwire: stream: fix memory leak in stream config error path + CVE-2021-47028: (unk) mt76: mt7915: fix txrate reporting + CVE-2021-47034: (unk) powerpc/64s: Fix pte update for kernel memory on radix + CVE-2021-47041: (unk) nvmet-tcp: fix incorrect locking in state_change sk callback + CVE-2021-47046: (unk) drm/amd/display: Fix off by one in hdmi_14_process_transaction() + CVE-2021-47049: (unk) Drivers: hv: vmbus: Use after free in __vmbus_open() + CVE-2021-47052: (unk) crypto: sa2ul - Fix memory leak of rxd + CVE-2021-47054: (unk) bus: qcom: Put child node before return + CVE-2021-47056: (unk) crypto: qat - ADF_STATUS_PF_RUNNING should be set after adf_dev_init + CVE-2021-47059: (unk) crypto: sun8i-ss - fix result memory leak on error path + CVE-2021-47063: (unk) drm: bridge/panel: Cleanup connector on bridge detach + CVE-2021-47065: (unk) rtw88: Fix array overrun in rtw_get_tx_power_params() + CVE-2021-47070: (unk) uio_hv_generic: Fix another memory leak in error handling paths + CVE-2021-47071: (unk) uio_hv_generic: Fix a memory leak in error handling paths + CVE-2021-47073: (unk) platform/x86: dell-smbios-wmi: Fix oops on rmmod dell_smbios + CVE-2021-47074: (unk) nvme-loop: fix memory leak in nvme_loop_create_ctrl() + CVE-2021-47075: (unk) nvmet: fix memory leak in nvmet_alloc_ctrl() + CVE-2021-47076: (unk) RDMA/rxe: Return CQE error if invalid lkey was supplied + CVE-2021-47077: (unk) scsi: qedf: Add pointer checks in qedf_update_link_speed() + CVE-2021-47078: (unk) RDMA/rxe: Clear all QP fields if creation failed + CVE-2021-47082: (unk) tun: avoid double free in tun_free_netdev + CVE-2021-47083: (unk) pinctrl: mediatek: fix global-out-of-bounds issue + CVE-2021-47086: (unk) phonet/pep: refuse to enable an unbound pipe + CVE-2021-47100: (unk) ipmi: Fix UAF when uninstall ipmi_si and ipmi_msghandler module + CVE-2021-47101: (unk) asix: fix uninit-value in asix_mdio_read() + CVE-2021-47103: (unk) inet: fully convert sk->sk_rx_dst to RCU rules + CVE-2021-47109: (unk) neighbour: allow NUD_NOARP entries to be forced GCed + CVE-2021-47110: (unk) x86/kvm: Disable kvmclock on all CPUs on shutdown + CVE-2021-47112: (unk) x86/kvm: Teardown PV features on boot CPU as well + CVE-2021-47113: (unk) btrfs: abort in rename_exchange if we fail to insert the second ref + CVE-2021-47114: (unk) ocfs2: fix data corruption by fallocate + CVE-2021-47116: (unk) ext4: fix memory leak in ext4_mb_init_backend on error path. + CVE-2021-47117: (unk) ext4: fix bug on in ext4_es_cache_extent as ext4_split_extent_at failed + CVE-2021-47118: (unk) pid: take a reference when initializing `cad_pid` + CVE-2021-47119: (unk) ext4: fix memory leak in ext4_fill_super + CVE-2021-47120: (unk) HID: magicmouse: fix NULL-deref on disconnect + CVE-2021-47121: (unk) net: caif: fix memory leak in cfusbl_device_notify + CVE-2021-47122: (unk) net: caif: fix memory leak in caif_device_notify + CVE-2021-47124: (unk) io_uring: fix link timeout refs + CVE-2021-47125: (unk) sch_htb: fix refcount leak in htb_parent_to_leaf_offload + CVE-2021-47128: (unk) bpf, lockdown, audit: Fix buggy SELinux lockdown permission checks + CVE-2021-47131: (unk) net/tls: Fix use-after-free after the TLS device goes down and up + CVE-2021-47133: (unk) HID: amd_sfh: Fix memory leak in amd_sfh_work + CVE-2021-47135: (unk) mt76: mt7921: fix possible AOOB issue in mt7921_mcu_tx_rate_report + CVE-2021-47136: (unk) net: zero-initialize tc skb extension on allocation + CVE-2021-47137: (unk) net: lantiq: fix memory corruption in RX ring + CVE-2021-47140: (unk) iommu/amd: Clear DMA ops when switching domain + CVE-2021-47142: (unk) drm/amdgpu: Fix a use-after-free + CVE-2021-47143: (unk) net/smc: remove device from smcd_dev_list after failed device_add() + CVE-2021-47144: (unk) drm/amd/amdgpu: fix refcount leak + CVE-2021-47145: (unk) btrfs: do not BUG_ON in link_to_fixup_dir + CVE-2021-47146: (unk) mld: fix panic in mld_newpack() + CVE-2021-47147: (unk) ptp: ocp: Fix a resource leak in an error handling path + CVE-2021-47149: (unk) net: fujitsu: fix potential null-ptr-deref + CVE-2021-47150: (unk) net: fec: fix the potential memory leak in fec_enet_init() + CVE-2021-47151: (unk) interconnect: qcom: bcm-voter: add a missing of_node_put() + CVE-2021-47153: (unk) i2c: i801: Don't generate an interrupt on bus reset + CVE-2021-47158: (unk) net: dsa: sja1105: add error handling in sja1105_setup() + CVE-2021-47159: (unk) net: dsa: fix a crash if ->get_sset_count() fails + CVE-2021-47160: (unk) net: dsa: mt7530: fix VLAN traffic leaks + CVE-2021-47161: (unk) spi: spi-fsl-dspi: Fix a resource leak in an error handling path + CVE-2021-47162: (unk) tipc: skb_linearize the head skb when reassembling msgs + CVE-2021-47163: (unk) tipc: wait and exit until all work queues are done + CVE-2021-47165: (unk) drm/meson: fix shutdown crash when component not probed + CVE-2021-47166: (unk) NFS: Don't corrupt the value of pg_bytes_written in nfs_do_recoalesce() + CVE-2021-47167: (unk) NFS: Fix an Oopsable condition in __nfs_pageio_add_request() + CVE-2021-47168: (unk) NFS: fix an incorrect limit in filelayout_decode_layout() + CVE-2021-47169: (unk) serial: rp2: use 'request_firmware' instead of 'request_firmware_nowait' + CVE-2021-47170: (unk) USB: usbfs: Don't WARN about excessively large memory allocations + CVE-2021-47171: (unk) net: usb: fix memory leak in smsc75xx_bind + CVE-2021-47172: (unk) iio: adc: ad7124: Fix potential overflow due to non sequential channel numbers + CVE-2021-47173: (unk) misc/uss720: fix memory leak in uss720_probe + CVE-2021-47175: (unk) net/sched: fq_pie: fix OOB access in the traffic path + CVE-2021-47177: (unk) iommu/vt-d: Fix sysfs leak in alloc_iommu() + CVE-2021-47179: (unk) NFSv4: Fix a NULL pointer dereference in pnfs_mark_matching_lsegs_return() + CVE-2021-47180: (unk) NFC: nci: fix memory leak in nci_allocate_device CVE-2022-0001: (unk) x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE CVE-2022-0002: (unk) x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE CVE-2022-0168: (unk) cifs: fix NULL ptr dereference in smb2_ioctl_query_info() @@ -805,6 +935,10 @@ Outstanding CVEs: CVE-2022-47929: (unk) net: sched: disallow noqueue for qdisc classes CVE-2022-47946: (unk) io_uring: kill sqo_dead and sqo submission halting CVE-2022-48619: (unk) Input: add bounds checking to input_set_capability() + CVE-2022-48626: (unk) moxart: fix potential use-after-free on remove path + CVE-2022-48627: (unk) vt: fix memory overlapping when deleting chars in the buffer + CVE-2022-48628: (unk) ceph: drop messages from MDS when unmounting + CVE-2022-48629: (unk) crypto: qcom-rng - ensure buffer for generate is completely filled CVE-2023-0045: (unk) x86/bugs: Flush IBP in ib_prctl_set() CVE-2023-0047: (unk) mm, oom: do not trigger out_of_memory from the #PF CVE-2023-0160: (unk) bpf, sockmap: fix deadlocks in the sockhash and sockmap @@ -876,6 +1010,7 @@ Outstanding CVEs: CVE-2023-28328: (unk) media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer() CVE-2023-28466: (unk) net: tls: fix possible race condition between do_tls_getsockopt_conf() and do_tls_setsockopt_conf() CVE-2023-2860: (unk) ipv6: sr: fix out-of-bounds read when setting HMAC data. + CVE-2023-28746: (unk) x86/mmio: Disable KVM mitigation when X86_FEATURE_CLEAR_CPU_BUF is set CVE-2023-28772: (unk) seq_buf: Fix overflow in seq_buf_putmem_hex() CVE-2023-2985: (unk) fs: hfsplus: fix UAF issue in hfsplus_put_super CVE-2023-3006: (unk) arm64: Add AMPERE1 to the Spectre-BHB affected list @@ -952,7 +1087,7 @@ Outstanding CVEs: CVE-2023-4623: (unk) net/sched: sch_hfsc: Ensure inner classes have fsc curve CVE-2023-46343: (unk) nfc: nci: fix possible NULL pointer dereference in send_acknowledge() CVE-2023-46838: (unk) xen-netback: don't produce zero-size SKB frags - CVE-2023-47233: (unk) + CVE-2023-47233: (unk) wifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach CVE-2023-4881: (unk) netfilter: nftables: exthdr: fix 4-byte stack OOB write CVE-2023-4921: (unk) net: sched: sch_qfq: Fix UAF in qfq_dequeue() CVE-2023-50431: (unk) accel/habanalabs: fix information leak in sec_attest_info() @@ -977,18 +1112,112 @@ Outstanding CVEs: CVE-2023-52449: (unk) mtd: Fix gluebi NULL pointer dereference caused by ftl notifier CVE-2023-52451: (unk) powerpc/pseries/memhp: Fix access beyond end of drmem array CVE-2023-52454: (unk) nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length - CVE-2023-52456: (unk) serial: imx: fix tx statemachine deadlock - CVE-2023-52457: (unk) serial: 8250: omap: Don't skip resource freeing if pm_runtime_resume_and_get() failed CVE-2023-52458: (unk) block: add check that partition length needs to be aligned with block size CVE-2023-52464: (unk) EDAC/thunderx: Fix possible out-of-bounds string access + CVE-2023-52469: (unk) drivers/amd/pm: fix a use-after-free in kv_parse_power_table + CVE-2023-52470: (unk) drm/radeon: check the alloc_workqueue return value in radeon_crtc_init() + CVE-2023-52474: (unk) IB/hfi1: Fix bugs with non-PAGE_SIZE-end multi-iovec user SDMA requests + CVE-2023-52475: (unk) Input: powermate - fix use-after-free in powermate_config_complete + CVE-2023-52476: (unk) perf/x86/lbr: Filter vsyscall addresses + CVE-2023-52477: (unk) usb: hub: Guard against accesses to uninitialized BOS descriptors + CVE-2023-52478: (unk) HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect + CVE-2023-52479: (unk) ksmbd: fix uaf in smb20_oplock_break_ack + CVE-2023-52480: (unk) ksmbd: fix race condition between session lookup and expire + CVE-2023-52481: (unk) arm64: errata: Add Cortex-A520 speculative unprivileged load workaround + CVE-2023-52482: (unk) x86/srso: Add SRSO mitigation for Hygon processors + CVE-2023-52484: (unk) iommu/arm-smmu-v3: Fix soft lockup triggered by arm_smmu_mm_invalidate_range + CVE-2023-52485: (unk) drm/amd/display: Wake DMCUB before sending a command + CVE-2023-52486: (unk) drm: Don't unref the same fb many times by mistake due to deadlock handling + CVE-2023-52488: (unk) serial: sc16is7xx: convert from _raw_ to _noinc_ regmap functions for FIFO + CVE-2023-52489: (unk) mm/sparsemem: fix race in accessing memory_section->usage + CVE-2023-52491: (unk) media: mtk-jpeg: Fix use after free bug due to error path handling in mtk_jpeg_dec_device_run + CVE-2023-52498: (unk) PM: sleep: Fix possible deadlocks in core system-wide PM code + CVE-2023-52500: (unk) scsi: pm80xx: Avoid leaking tags when processing OPC_INB_SET_CONTROLLER_CONFIG command + CVE-2023-52501: (unk) ring-buffer: Do not attempt to read past "commit" + CVE-2023-52502: (unk) net: nfc: fix races in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn() + CVE-2023-52504: (unk) x86/alternatives: Disable KASAN in apply_alternatives() + CVE-2023-52506: (unk) LoongArch: Set all reserved memblocks on Node#0 at initialization + CVE-2023-52507: (unk) nfc: nci: assert requested protocol is valid + CVE-2023-52508: (unk) nvme-fc: Prevent null pointer dereference in nvme_fc_io_getuuid() + CVE-2023-52509: (unk) ravb: Fix use-after-free issue in ravb_tx_timeout_work() + CVE-2023-52510: (unk) ieee802154: ca8210: Fix a potential UAF in ca8210_probe + CVE-2023-52511: (unk) spi: sun6i: reduce DMA RX transfer width to single byte + CVE-2023-52515: (unk) RDMA/srp: Do not call scsi_done() from srp_abort() + CVE-2023-52516: (unk) dma-debug: don't call __dma_entry_alloc_check_leak() under free_entries_lock + CVE-2023-52517: (unk) spi: sun6i: fix race between DMA RX transfer completion and RX FIFO drain + CVE-2023-52519: (unk) HID: intel-ish-hid: ipc: Disable and reenable ACPI GPE bit + CVE-2023-52522: (unk) net: fix possible store tearing in neigh_periodic_work() + CVE-2023-52527: (unk) ipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data() + CVE-2023-52528: (unk) net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg + CVE-2023-52530: (unk) wifi: mac80211: fix potential key use-after-free + CVE-2023-52531: (unk) wifi: iwlwifi: mvm: Fix a memory corruption issue + CVE-2023-52532: (unk) net: mana: Fix TX CQE error handling + CVE-2023-52559: (unk) iommu/vt-d: Avoid memory allocation in iommu_suspend() + CVE-2023-52561: (unk) arm64: dts: qcom: sdm845-db845c: Mark cont splash memory region as reserved + CVE-2023-52563: (unk) drm/meson: fix memory leak on ->hpd_notify callback + CVE-2023-52565: (unk) media: uvcvideo: Fix OOB read + CVE-2023-52566: (unk) nilfs2: fix potential use after free in nilfs_gccache_submit_read_data() + CVE-2023-52568: (unk) x86/sgx: Resolves SECS reclaim vs. page fault for EAUG race + CVE-2023-52569: (unk) btrfs: remove BUG() after failure to insert delayed dir index item + CVE-2023-52571: (unk) power: supply: rk817: Fix node refcount leak + CVE-2023-52572: (unk) cifs: Fix UAF in cifs_demultiplex_thread() + CVE-2023-52573: (unk) net: rds: Fix possible NULL-pointer dereference + CVE-2023-52574: (unk) team: fix null-ptr-deref when team device type is changed + CVE-2023-52578: (unk) net: bridge: use DEV_STATS_INC() + CVE-2023-52583: (unk) ceph: fix deadlock or deadcode of misusing dget() + CVE-2023-52584: (unk) spmi: mediatek: Fix UAF on device remove + CVE-2023-52585: (unk) drm/amdgpu: Fix possible NULL dereference in amdgpu_ras_query_error_status_helper() + CVE-2023-52586: (unk) drm/msm/dpu: Add mutex lock in control vblank irq + CVE-2023-52587: (unk) IB/ipoib: Fix mcast list locking + CVE-2023-52588: (unk) f2fs: fix to tag gcing flag on page during block migration + CVE-2023-52589: (unk) media: rkisp1: Fix IRQ disable race issue + CVE-2023-52590: (unk) ocfs2: Avoid touching renamed directory if parent does not change + CVE-2023-52591: (unk) reiserfs: Avoid touching renamed directory if parent does not change + CVE-2023-52593: (unk) wifi: wfx: fix possible NULL pointer dereference in wfx_set_mfp_ap() + CVE-2023-52594: (unk) wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus() + CVE-2023-52595: (unk) wifi: rt2x00: restart beacon queue when hardware reset + CVE-2023-52596: (unk) sysctl: Fix out of bounds access for empty sysctl registers + CVE-2023-52597: (unk) KVM: s390: fix setting of fpc register + CVE-2023-52598: (unk) s390/ptrace: handle setting of fpc register correctly + CVE-2023-52599: (unk) jfs: fix array-index-out-of-bounds in diNewExt + CVE-2023-52600: (unk) jfs: fix uaf in jfs_evict_inode + CVE-2023-52601: (unk) jfs: fix array-index-out-of-bounds in dbAdjTree + CVE-2023-52602: (unk) jfs: fix slab-out-of-bounds Read in dtSearch + CVE-2023-52603: (unk) UBSAN: array-index-out-of-bounds in dtSplitRoot + CVE-2023-52604: (unk) FS:JFS:UBSAN:array-index-out-of-bounds in dbAdjTree + CVE-2023-52606: (unk) powerpc/lib: Validate size for vector operations + CVE-2023-52607: (unk) powerpc/mm: Fix null-pointer dereference in pgtable_cache_add + CVE-2023-52609: (unk) binder: fix race between mmput() and do_exit() + CVE-2023-52612: (unk) crypto: scomp - fix req->dst buffer overflow + CVE-2023-52614: (unk) PM / devfreq: Fix buffer overflow in trans_stat_show + CVE-2023-52615: (unk) hwrng: core - Fix page fault dead lock on mmap-ed hwrng + CVE-2023-52617: (unk) PCI: switchtec: Fix stdev_release() crash after surprise hot remove + CVE-2023-52618: (unk) block/rnbd-srv: Check for unlikely string overflow + CVE-2023-52619: (unk) pstore/ram: Fix crash when setting number of cpus to an odd number + CVE-2023-52620: (unk) netfilter: nf_tables: disallow timeout for anonymous sets + CVE-2023-52621: (unk) bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers + CVE-2023-52622: (unk) ext4: avoid online resizing failures due to oversized flex bg + CVE-2023-52623: (unk) SUNRPC: Fix a suspicious RCU usage warning + CVE-2023-52624: (unk) drm/amd/display: Wake DMCUB before executing GPINT commands + CVE-2023-52625: (unk) drm/amd/display: Refactor DMCUB enter/exit idle interface + CVE-2023-52628: (unk) netfilter: nftables: exthdr: fix 4-byte stack OOB write + CVE-2023-52629: (unk) sh: push-switch: Reorder cleanup operations to avoid use-after-free bug + CVE-2023-52632: (unk) drm/amdkfd: Fix lock dependency warning with srcu + CVE-2023-52633: (unk) um: time-travel: fix time corruption + CVE-2023-52634: (unk) drm/amd/display: Fix disable_otg_wa logic + CVE-2023-52635: (unk) PM / devfreq: Synchronize devfreq_monitor_[start/stop] + CVE-2023-52638: (unk) can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock + CVE-2023-52639: (unk) KVM: s390: vsie: fix race during shadow creation + CVE-2023-52640: (unk) fs/ntfs3: Fix oob in ntfs_listxattr + CVE-2023-52641: (unk) fs/ntfs3: Add NULL ptr dereference checking at the end of attr_allocate_frame() CVE-2023-5717: (unk) perf: Disallow mis-matched inherited group reads CVE-2023-6040: (unk) netfilter: nf_tables: Reject tables of unsupported family CVE-2023-6121: (unk) nvmet: nul-terminate the NQNs passed in the connect command CVE-2023-6240: (unk) - CVE-2023-6270: (unk) - CVE-2023-6356: (unk) + CVE-2023-6270: (unk) aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts + CVE-2023-6356: (unk) nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length CVE-2023-6535: (unk) - CVE-2023-6536: (unk) + CVE-2023-6536: (unk) nvmet-tcp: fix a crash in nvmet_req_complete() CVE-2023-6546: (unk) tty: n_gsm: fix the UAF caused by race condition in gsm_cleanup_mux CVE-2023-6560: (unk) io_uring: don't allow discontig pages for IORING_SETUP_NO_MMAP CVE-2023-6606: (unk) smb: client: fix OOB in smbCalcSize() @@ -996,7 +1225,7 @@ Outstanding CVEs: CVE-2023-6915: (unk) ida: Fix crash in ida_free when the bitmap is empty CVE-2023-6931: (unk) perf: Fix perf_event_validate_size() CVE-2023-6932: (unk) ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet - CVE-2023-7042: (unk) + CVE-2023-7042: (unk) wifi: ath10k: fix NULL pointer dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev() CVE-2023-7192: (unk) netfilter: ctnetlink: fix possible refcount leak in ctnetlink_create_conntrack() CVE-2024-0340: (unk) vhost: use kzalloc() instead of kmalloc() followed by memset() CVE-2024-0564: (unk) @@ -1005,15 +1234,16 @@ Outstanding CVEs: CVE-2024-0607: (unk) netfilter: nf_tables: fix pointer math issue in nft_byteorder_eval() CVE-2024-0646: (unk) net: tls, update curr on splice as well CVE-2024-0775: (unk) ext4: improve error recovery code paths in __ext4_remount() - CVE-2024-0841: (unk) + CVE-2024-0841: (unk) fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super CVE-2024-1086: (unk) netfilter: nf_tables: reject QUEUE/DROP verdict parameters CVE-2024-1151: (unk) net: openvswitch: limit the number of recursions from action sets CVE-2024-1312: (unk) mm: lock_vma_under_rcu() must check vma->anon_vma under vma lock CVE-2024-21803: (unk) - CVE-2024-22099: (unk) + CVE-2024-2193: (unk) + CVE-2024-22099: (unk) Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security CVE-2024-22386: (unk) - CVE-2024-23196: (unk) - CVE-2024-23307: (unk) + CVE-2024-23196: (unk) ALSA: hda: fix a possible null-pointer dereference due to data race in snd_hdac_regmap_sync() + CVE-2024-23307: (unk) md/raid5: fix atomicity violation in raid5_cache_count CVE-2024-23848: (unk) CVE-2024-23849: (unk) net/rds: Fix UBSAN: array-index-out-of-bounds in rds_cmsg_recv CVE-2024-23851: (unk) dm: limit the number of targets and parameter size area @@ -1022,7 +1252,7 @@ Outstanding CVEs: CVE-2024-24858: (unk) CVE-2024-24859: (unk) CVE-2024-24860: (unk) Bluetooth: Fix atomicity violation in {min,max}_key_size_set - CVE-2024-24861: (unk) + CVE-2024-24861: (unk) media: xc4000: Fix atomicity violation in xc4000_get_frequency CVE-2024-24864: (unk) CVE-2024-25739: (unk) CVE-2024-25740: (unk) @@ -1031,12 +1261,117 @@ Outstanding CVEs: CVE-2024-26584: (unk) net: tls: handle backlogging of crypto requests CVE-2024-26585: (unk) tls: fix race between tx work scheduling and socket close CVE-2024-26586: (unk) mlxsw: spectrum_acl_tcam: Fix stack corruption - CVE-2024-26587: (unk) net: netdevsim: don't try to destroy PHC on VFs - CVE-2024-26588: (unk) LoongArch: BPF: Prevent out-of-bounds memory access CVE-2024-26589: (unk) bpf: Reject variable offset alu on PTR_TO_FLOW_KEYS - CVE-2024-26591: (unk) bpf: Fix re-attachment branch in bpf_tracing_prog_attach CVE-2024-26592: (unk) ksmbd: fix UAF issue in ksmbd_tcp_new_connection() CVE-2024-26594: (unk) ksmbd: validate mech token in session setup CVE-2024-26595: (unk) mlxsw: spectrum_acl_tcam: Fix NULL pointer dereference in error path CVE-2024-26597: (unk) net: qualcomm: rmnet: fix global oob in rmnet_policy CVE-2024-26598: (unk) KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache + CVE-2024-26600: (unk) phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP + CVE-2024-26602: (unk) sched/membarrier: reduce the ability to hammer on sys_membarrier + CVE-2024-26606: (unk) binder: signal epoll threads of self-work + CVE-2024-26607: (unk) drm/bridge: sii902x: Fix probing race issue + CVE-2024-26614: (unk) tcp: make sure init the accept_queue's spinlocks once + CVE-2024-26615: (unk) net/smc: fix illegal rmb_desc access in SMC-D connection dump + CVE-2024-26622: (unk) tomoyo: fix UAF write bug in tomoyo_write_control() + CVE-2024-26623: (unk) pds_core: Prevent race issues involving the adminq + CVE-2024-26625: (unk) llc: call sock_orphan() at release time + CVE-2024-26627: (unk) scsi: core: Move scsi_host_busy() out of host lock for waking up EH handler + CVE-2024-26633: (unk) ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim() + CVE-2024-26635: (unk) llc: Drop support for ETH_P_TR_802_2. + CVE-2024-26636: (unk) llc: make llc_ui_sendmsg() more robust against bonding changes + CVE-2024-26640: (unk) tcp: add sanity checks to rx zerocopy + CVE-2024-26641: (unk) ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv() + CVE-2024-26642: (unk) netfilter: nf_tables: disallow anonymous set with timeout flag + CVE-2024-26644: (unk) btrfs: don't abort filesystem when attempting to snapshot deleted subvolume + CVE-2024-26645: (unk) tracing: Ensure visibility when inserting an element into tracing_map + CVE-2024-26646: (unk) thermal: intel: hfi: Add syscore callbacks for system-wide PM + CVE-2024-26647: (unk) drm/amd/display: Fix late derefrence 'dsc' check in 'link_set_dsc_pps_packet()' + CVE-2024-26648: (unk) drm/amd/display: Fix variable deferencing before NULL check in edp_setup_replay() + CVE-2024-26650: (unk) platform/x86: p2sb: Allow p2sb_bar() calls during PCI device probe + CVE-2024-26651: (unk) sr9800: Add check for usbnet_get_endpoints + CVE-2024-26654: (unk) ALSA: sh: aica: reorder cleanup operations to avoid UAF bugs + CVE-2024-26655: (unk) Fix memory leak in posix_clock_open() + CVE-2024-26656: (unk) drm/amdgpu: fix use-after-free bug + CVE-2024-26658: (unk) bcachefs: grab s_umount only if snapshotting + CVE-2024-26659: (unk) xhci: handle isoc Babble and Buffer Overrun events properly + CVE-2024-26663: (unk) tipc: Check the bearer type before calling tipc_udp_nl_bearer_add() + CVE-2024-26664: (unk) hwmon: (coretemp) Fix out-of-bounds memory access + CVE-2024-26668: (unk) netfilter: nft_limit: reject configurations that cause integer overflow + CVE-2024-26669: (unk) net/sched: flower: Fix chain template offload + CVE-2024-26671: (unk) blk-mq: fix IO hang from sbitmap wakeup race + CVE-2024-26672: (unk) drm/amdgpu: Fix variable 'mca_funcs' dereferenced before NULL check in 'amdgpu_mca_smu_get_mca_entry()' + CVE-2024-26675: (unk) ppp_async: limit MRU to 64K + CVE-2024-26676: (unk) af_unix: Call kfree_skb() for dead unix_(sk)->oob_skb in GC. + CVE-2024-26677: (unk) rxrpc: Fix delayed ACKs to not set the reference serial number + CVE-2024-26679: (unk) inet: read sk->sk_family once in inet_recv_error() + CVE-2024-26685: (unk) nilfs2: fix potential bug in end_buffer_async_write + CVE-2024-26686: (unk) fs/proc: do_task_stat: use sig->stats_lock to gather the threads/children stats + CVE-2024-26687: (unk) xen/events: close evtchn after mapping cleanup + CVE-2024-26688: (unk) fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super + CVE-2024-26689: (unk) ceph: prevent use-after-free in encode_cap_msg() + CVE-2024-26691: (unk) KVM: arm64: Fix circular locking dependency + CVE-2024-26696: (unk) nilfs2: fix hang in nilfs_lookup_dirty_data_buffers() + CVE-2024-26697: (unk) nilfs2: fix data corruption in dsync block recovery for small block sizes + CVE-2024-26699: (unk) drm/amd/display: Fix array-index-out-of-bounds in dcn35_clkmgr + CVE-2024-26700: (unk) drm/amd/display: Fix MST Null Ptr for RV + CVE-2024-26702: (unk) iio: magnetometer: rm3100: add boundary check for the value read from RM3100_REG_TMRC + CVE-2024-26704: (unk) ext4: fix double-free of blocks due to wrong extents moved_len + CVE-2024-26706: (unk) parisc: Fix random data corruption from exception handler + CVE-2024-26713: (unk) powerpc/pseries/iommu: Fix iommu initialisation during DLPAR add + CVE-2024-26715: (unk) usb: dwc3: gadget: Fix NULL pointer dereference in dwc3_gadget_suspend + CVE-2024-26719: (unk) nouveau: offload fence uevents work to workqueue + CVE-2024-26720: (unk) mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again + CVE-2024-26726: (unk) btrfs: don't drop extent_map for free space inode on write error + CVE-2024-26733: (unk) arp: Prevent overflow in arp_req_get(). + CVE-2024-26735: (unk) ipv6: sr: fix possible use-after-free and null-ptr-deref + CVE-2024-26736: (unk) afs: Increase buffer size in afs_update_volume_status() + CVE-2024-26738: (unk) powerpc/pseries/iommu: DLPAR add doesn't completely initialize pci_controller + CVE-2024-26739: (unk) net/sched: act_mirred: don't override retval if we already lost the skb + CVE-2024-26740: (unk) net/sched: act_mirred: use the backlog for mirred ingress + CVE-2024-26743: (unk) RDMA/qedr: Fix qedr_create_user_qp error flow + CVE-2024-26744: (unk) RDMA/srpt: Support specifying the srpt_service_guid parameter + CVE-2024-26745: (unk) powerpc/pseries/iommu: IOMMU table is not initialized for kdump over SR-IOV + CVE-2024-26747: (unk) usb: roles: fix NULL pointer issue when put module's reference + CVE-2024-26748: (unk) usb: cdns3: fix memory double free when handle zero packet + CVE-2024-26751: (unk) ARM: ep93xx: Add terminator to gpiod_lookup_table + CVE-2024-26752: (unk) l2tp: pass correct message length to ip6_append_data + CVE-2024-26754: (unk) gtp: fix use-after-free and null-ptr-deref in gtp_genl_dump_pdp() + CVE-2024-26756: (unk) md: Don't register sync_thread for reshape directly + CVE-2024-26757: (unk) md: Don't ignore read-only array in md_check_recovery() + CVE-2024-26758: (unk) md: Don't ignore suspended array in md_check_recovery() + CVE-2024-26759: (unk) mm/swap: fix race when skipping swapcache + CVE-2024-26763: (unk) dm-crypt: don't modify the data when using authenticated encryption + CVE-2024-26764: (unk) fs/aio: Restrict kiocb_set_cancel_fn() to I/O submitted via libaio + CVE-2024-26765: (unk) LoongArch: Disable IRQ before init_fn() for nonboot CPUs + CVE-2024-26766: (unk) IB/hfi1: Fix sdma.h tx->num_descs off-by-one error + CVE-2024-26767: (unk) drm/amd/display: fixed integer types and null check locations + CVE-2024-26768: (unk) LoongArch: Change acpi_core_pic[NR_CPUS] to acpi_core_pic[MAX_CORE_PIC] + CVE-2024-26769: (unk) nvmet-fc: avoid deadlock on delete association path + CVE-2024-26770: (unk) HID: nvidia-shield: Add missing null pointer checks to LED initialization + CVE-2024-26771: (unk) dmaengine: ti: edma: Add some null pointer checks to the edma_probe + CVE-2024-26772: (unk) ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal() + CVE-2024-26773: (unk) ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found() + CVE-2024-26774: (unk) ext4: avoid dividing by 0 in mb_update_avg_fragment_size() when block bitmap corrupt + CVE-2024-26775: (unk) aoe: avoid potential deadlock at set_capacity + CVE-2024-26776: (unk) spi: hisi-sfc-v3xx: Return IRQ_NONE if no interrupts were detected + CVE-2024-26777: (unk) fbdev: sis: Error out if pixclock equals zero + CVE-2024-26778: (unk) fbdev: savage: Error out if pixclock equals zero + CVE-2024-26779: (unk) wifi: mac80211: fix race condition on enabling fast-xmit + CVE-2024-26784: (unk) pmdomain: arm: Fix NULL dereference on scmi_perf_domain removal + CVE-2024-26787: (unk) mmc: mmci: stm32: fix DMA API overlapping mappings warning + CVE-2024-26788: (unk) dmaengine: fsl-qdma: init irq after reg initialization + CVE-2024-26789: (unk) crypto: arm64/neonbs - fix out-of-bounds access on short input + CVE-2024-26790: (unk) dmaengine: fsl-qdma: fix SoC may hang on 16 byte unaligned read + CVE-2024-26791: (unk) btrfs: dev-replace: properly validate device names + CVE-2024-26793: (unk) gtp: fix use-after-free and null-ptr-deref in gtp_newlink() + CVE-2024-26797: (unk) drm/amd/display: Prevent potential buffer overflow in map_hw_resources + CVE-2024-26798: (unk) fbcon: always restore the old font data in fbcon_do_set_font() + CVE-2024-26801: (unk) Bluetooth: Avoid potential use-after-free in hci_error_reset + CVE-2024-26802: (unk) stmmac: Clear variable when destroying workqueue + CVE-2024-26803: (unk) net: veth: clear GRO when clearing XDP even when down + CVE-2024-26804: (unk) net: ip_tunnel: prevent perpetual headroom growth + CVE-2024-26805: (unk) netlink: Fix kernel-infoleak-after-free in __skb_datagram_iter + CVE-2024-26806: (unk) spi: cadence-qspi: remove system-wide suspend helper calls from runtime PM hooks + CVE-2024-26808: (unk) netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain + CVE-2024-26809: (unk) netfilter: nft_set_pipapo: release elements in clone only from destroy path diff --git a/data/5.10/5.10_CVEs.txt b/data/5.10/5.10_CVEs.txt index 1a3d1cab5..6083feb73 100644 --- a/data/5.10/5.10_CVEs.txt +++ b/data/5.10/5.10_CVEs.txt @@ -27,6 +27,7 @@ CVE-2019-16089: Fix unknown CVE-2019-19378: Fix unknown CVE-2019-19814: Fix unknown CVE-2019-20794: Fix unknown +CVE-2019-25162: Fixed with 5.10.137 CVE-2020-0347: Fix unknown CVE-2020-10708: Fix unknown CVE-2020-11725: Fix unknown @@ -75,6 +76,18 @@ CVE-2020-36158: Fixed with 5.10.6 CVE-2020-36322: Fixed with 5.10.6 CVE-2020-36516: Fixed with 5.10.96 CVE-2020-36694: Fixed with 5.10 +CVE-2020-36776: Fixed with 5.10.36 +CVE-2020-36777: Fixed with 5.10.36 +CVE-2020-36778: Fixed with 5.10.37 +CVE-2020-36779: Fixed with 5.10.37 +CVE-2020-36780: Fixed with 5.10.37 +CVE-2020-36781: Fixed with 5.10.37 +CVE-2020-36782: Fixed with 5.10.37 +CVE-2020-36783: Fixed with 5.10.37 +CVE-2020-36784: Fixed with 5.10.37 +CVE-2020-36785: Fixed with 5.10.37 +CVE-2020-36786: Fixed with 5.10.37 +CVE-2020-36787: Fixed with 5.10.37 CVE-2020-3702: Fixed with 5.10.61 CVE-2021-0129: Fixed with 5.10.40 CVE-2021-0399: Fix unknown @@ -251,6 +264,214 @@ CVE-2021-45485: Fixed with 5.10.51 CVE-2021-45486: Fixed with 5.10.37 CVE-2021-45868: Fixed with 5.10.80 CVE-2021-46283: Fixed with 5.10.64 +CVE-2021-46904: Fixed with 5.10.30 +CVE-2021-46906: Fixed with 5.10.45 +CVE-2021-46908: Fixed with 5.10.32 +CVE-2021-46909: Fixed with 5.10.32 +CVE-2021-46911: Fixed with 5.10.32 +CVE-2021-46912: Fixed with 5.10.32 +CVE-2021-46913: Fixed with 5.10.64 +CVE-2021-46914: Fixed with 5.10.32 +CVE-2021-46915: Fixed with 5.10.32 +CVE-2021-46917: Fixed with 5.10.32 +CVE-2021-46919: Fixed with 5.10.32 +CVE-2021-46920: Fixed with 5.10.32 +CVE-2021-46921: Fixed with 5.10.33 +CVE-2021-46924: Fixed with 5.10.90 +CVE-2021-46925: Fixed with 5.10.90 +CVE-2021-46926: Fix not seen in stream +CVE-2021-46928: Fixed with 5.10.90 +CVE-2021-46929: Fixed with 5.10.90 +CVE-2021-46930: Fixed with 5.10.90 +CVE-2021-46931: Fixed with 5.10.90 +CVE-2021-46932: Fixed with 5.10.90 +CVE-2021-46933: Fixed with 5.10.90 +CVE-2021-46934: Fixed with 5.10.90 +CVE-2021-46935: Fixed with 5.10.90 +CVE-2021-46936: Fixed with 5.10.90 +CVE-2021-46938: Fixed with 5.10.36 +CVE-2021-46939: Fixed with 5.10.36 +CVE-2021-46940: Fixed with 5.10.36 +CVE-2021-46941: Fixed with 5.10.36 +CVE-2021-46943: Fixed with 5.10.36 +CVE-2021-46944: Fixed with 5.10.36 +CVE-2021-46948: Fixed with 5.10.36 +CVE-2021-46949: Fixed with 5.10.36 +CVE-2021-46950: Fixed with 5.10.36 +CVE-2021-46951: Fixed with 5.10.36 +CVE-2021-46952: Fixed with 5.10.36 +CVE-2021-46953: Fixed with 5.10.36 +CVE-2021-46955: Fixed with 5.10.36 +CVE-2021-46956: Fixed with 5.10.36 +CVE-2021-46958: Fixed with 5.10.36 +CVE-2021-46959: Fix not seen in stream +CVE-2021-46960: Fixed with 5.10.36 +CVE-2021-46961: Fixed with 5.10.36 +CVE-2021-46962: Fixed with 5.10.36 +CVE-2021-46963: Fixed with 5.10.36 +CVE-2021-46965: Fixed with 5.10.36 +CVE-2021-46966: Fixed with 5.10.36 +CVE-2021-46967: Fixed with 5.10.36 +CVE-2021-46968: Fixed with 5.10.36 +CVE-2021-46969: Fix not seen in stream +CVE-2021-46970: Fix not seen in stream +CVE-2021-46971: Fixed with 5.10.35 +CVE-2021-46972: Fixed with 5.10.35 +CVE-2021-46973: Fixed with 5.10.35 +CVE-2021-46974: Fixed with 5.10.35 +CVE-2021-46976: Fixed with 5.10.38 +CVE-2021-46977: Fixed with 5.10.38 +CVE-2021-46980: Fixed with 5.10.38 +CVE-2021-46981: Fixed with 5.10.38 +CVE-2021-46982: Fixed with 5.10.38 +CVE-2021-46983: Fixed with 5.10.38 +CVE-2021-46984: Fixed with 5.10.38 +CVE-2021-46986: Fixed with 5.10.38 +CVE-2021-46987: Fix not seen in stream +CVE-2021-46988: Fixed with 5.10.38 +CVE-2021-46989: Fixed with 5.10.38 +CVE-2021-46990: Fixed with 5.10.38 +CVE-2021-46991: Fixed with 5.10.38 +CVE-2021-46992: Fixed with 5.10.38 +CVE-2021-46993: Fixed with 5.10.38 +CVE-2021-46994: Fixed with 5.10.38 +CVE-2021-46996: Fixed with 5.10.38 +CVE-2021-46997: Fixed with 5.10.38 +CVE-2021-46998: Fixed with 5.10.38 +CVE-2021-46999: Fixed with 5.10.38 +CVE-2021-47000: Fixed with 5.10.38 +CVE-2021-47001: Fixed with 5.10.38 +CVE-2021-47004: Fixed with 5.10.38 +CVE-2021-47005: Fixed with 5.10.38 +CVE-2021-47006: Fixed with 5.10.38 +CVE-2021-47007: Fixed with 5.10.38 +CVE-2021-47010: Fixed with 5.10.37 +CVE-2021-47012: Fixed with 5.10.37 +CVE-2021-47013: Fixed with 5.10.37 +CVE-2021-47014: Fix not seen in stream +CVE-2021-47015: Fixed with 5.10.37 +CVE-2021-47016: Fixed with 5.10.37 +CVE-2021-47017: Fixed with 5.10.37 +CVE-2021-47018: Fixed with 5.10.37 +CVE-2021-47020: Fixed with 5.10.37 +CVE-2021-47023: Fixed with 5.10.37 +CVE-2021-47024: Fixed with 5.10.37 +CVE-2021-47026: Fixed with 5.10.37 +CVE-2021-47028: Fix not seen in stream +CVE-2021-47032: Fixed with 5.10.37 +CVE-2021-47033: Fixed with 5.10.37 +CVE-2021-47034: Fixed with 5.10.37 +CVE-2021-47035: Fixed with 5.10.38 +CVE-2021-47036: Fix not seen in stream +CVE-2021-47037: Fix not seen in stream +CVE-2021-47038: Fixed with 5.10.37 +CVE-2021-47040: Fixed with 5.10.37 +CVE-2021-47041: Fixed with 5.10.37 +CVE-2021-47043: Fixed with 5.10.37 +CVE-2021-47044: Fixed with 5.10.37 +CVE-2021-47046: Fixed with 5.10.37 +CVE-2021-47047: Fixed with 5.10.37 +CVE-2021-47048: Fixed with 5.10.37 +CVE-2021-47049: Fixed with 5.10.37 +CVE-2021-47050: Fixed with 5.10.37 +CVE-2021-47051: Fixed with 5.10.37 +CVE-2021-47052: Fixed with 5.10.37 +CVE-2021-47053: Fixed with 5.10.37 +CVE-2021-47054: Fixed with 5.10.37 +CVE-2021-47055: Fixed with 5.10.37 +CVE-2021-47056: Fixed with 5.10.37 +CVE-2021-47057: Fixed with 5.10.37 +CVE-2021-47059: Fixed with 5.10.37 +CVE-2021-47060: Fixed with 5.10.37 +CVE-2021-47061: Fixed with 5.10.37 +CVE-2021-47063: Fixed with 5.10.37 +CVE-2021-47064: Fixed with 5.10.37 +CVE-2021-47065: Fixed with 5.10.37 +CVE-2021-47066: Fixed with 5.10.37 +CVE-2021-47067: Fixed with 5.10.37 +CVE-2021-47069: Fixed with 5.10.40 +CVE-2021-47070: Fix not seen in stream +CVE-2021-47071: Fixed with 5.10.40 +CVE-2021-47073: Fixed with 5.10.40 +CVE-2021-47074: Fixed with 5.10.40 +CVE-2021-47075: Fixed with 5.10.40 +CVE-2021-47076: Fix not seen in stream +CVE-2021-47077: Fixed with 5.10.40 +CVE-2021-47078: Fixed with 5.10.40 +CVE-2021-47080: Fixed with 5.10.40 +CVE-2021-47082: Fixed with 5.10.136 +CVE-2021-47083: Fixed with 5.10.89 +CVE-2021-47086: Fixed with 5.10.89 +CVE-2021-47090: Fixed with 5.10.89 +CVE-2021-47091: Fixed with 5.10.89 +CVE-2021-47093: Fixed with 5.10.89 +CVE-2021-47094: Fix not seen in stream +CVE-2021-47095: Fixed with 5.10.89 +CVE-2021-47100: Fixed with 5.10.89 +CVE-2021-47101: Fix not seen in stream +CVE-2021-47103: Fixed with 5.10.150 +CVE-2021-47105: Fix not seen in stream +CVE-2021-47109: Fixed with 5.10.43 +CVE-2021-47110: Fixed with 5.10.43 +CVE-2021-47111: Fixed with 5.10.43 +CVE-2021-47112: Fixed with 5.10.43 +CVE-2021-47113: Fixed with 5.10.43 +CVE-2021-47114: Fixed with 5.10.43 +CVE-2021-47116: Fixed with 5.10.43 +CVE-2021-47117: Fixed with 5.10.43 +CVE-2021-47118: Fixed with 5.10.43 +CVE-2021-47119: Fixed with 5.10.51 +CVE-2021-47120: Fixed with 5.10.43 +CVE-2021-47121: Fixed with 5.10.43 +CVE-2021-47122: Fixed with 5.10.43 +CVE-2021-47124: Fixed with 5.10.55 +CVE-2021-47125: Fix not seen in stream +CVE-2021-47126: Fixed with 5.10.43 +CVE-2021-47128: Fixed with 5.10.43 +CVE-2021-47129: Fixed with 5.10.43 +CVE-2021-47130: Fixed with 5.10.43 +CVE-2021-47131: Fixed with 5.10.43 +CVE-2021-47133: Fix not seen in stream +CVE-2021-47134: Fixed with 5.10.43 +CVE-2021-47135: Fix not seen in stream +CVE-2021-47136: Fixed with 5.10.42 +CVE-2021-47137: Fixed with 5.10.42 +CVE-2021-47138: Fixed with 5.10.42 +CVE-2021-47139: Fixed with 5.10.42 +CVE-2021-47140: Fix not seen in stream +CVE-2021-47141: Fixed with 5.10.42 +CVE-2021-47142: Fixed with 5.10.42 +CVE-2021-47143: Fixed with 5.10.42 +CVE-2021-47144: Fixed with 5.10.42 +CVE-2021-47145: Fixed with 5.10.42 +CVE-2021-47146: Fixed with 5.10.42 +CVE-2021-47147: Fix not seen in stream +CVE-2021-47149: Fixed with 5.10.42 +CVE-2021-47150: Fixed with 5.10.42 +CVE-2021-47151: Fixed with 5.10.42 +CVE-2021-47152: Fixed with 5.10.42 +CVE-2021-47153: Fixed with 5.10.42 +CVE-2021-47158: Fixed with 5.10.42 +CVE-2021-47159: Fixed with 5.10.42 +CVE-2021-47160: Fixed with 5.10.42 +CVE-2021-47161: Fixed with 5.10.42 +CVE-2021-47162: Fixed with 5.10.42 +CVE-2021-47163: Fixed with 5.10.42 +CVE-2021-47164: Fixed with 5.10.42 +CVE-2021-47165: Fixed with 5.10.42 +CVE-2021-47166: Fixed with 5.10.42 +CVE-2021-47167: Fixed with 5.10.42 +CVE-2021-47168: Fixed with 5.10.42 +CVE-2021-47169: Fixed with 5.10.42 +CVE-2021-47170: Fixed with 5.10.42 +CVE-2021-47171: Fixed with 5.10.42 +CVE-2021-47172: Fixed with 5.10.42 +CVE-2021-47173: Fixed with 5.10.42 +CVE-2021-47174: Fixed with 5.10.42 +CVE-2021-47175: Fixed with 5.10.42 +CVE-2021-47177: Fixed with 5.10.42 +CVE-2021-47179: Fixed with 5.10.42 +CVE-2021-47180: Fixed with 5.10.41 CVE-2022-0001: Fixed with 5.10.105 CVE-2022-0002: Fixed with 5.10.105 CVE-2022-0168: Fixed with 5.10.110 @@ -500,6 +721,10 @@ CVE-2022-47521: Fixed with 5.10.157 CVE-2022-47929: Fixed with 5.10.163 CVE-2022-47946: Fix not seen in stream CVE-2022-48619: Fixed with 5.10.118 +CVE-2022-48626: Fixed with 5.10.100 +CVE-2022-48627: Fixed with 5.10.132 +CVE-2022-48628: Fix not seen in stream +CVE-2022-48629: Fixed with 5.10.108 CVE-2023-0045: Fixed with 5.10.163 CVE-2023-0047: Fixed with 5.10.80 CVE-2023-0160: Fixed with 5.10.180 @@ -584,6 +809,7 @@ CVE-2023-28328: Fixed with 5.10.163 CVE-2023-28410: Fixed with 5.10.110 CVE-2023-28466: Fixed with 5.10.177 CVE-2023-2860: Fixed with 5.10.143 +CVE-2023-28746: Fix not seen in stream CVE-2023-28772: Fixed with 5.10.51 CVE-2023-2898: Fixed with 5.10.188 CVE-2023-2985: Fixed with 5.10.173 @@ -674,7 +900,7 @@ CVE-2023-46343: Fixed with 5.10.199 CVE-2023-46813: Fixed with 5.10.199 CVE-2023-46838: Fixed with 5.10.209 CVE-2023-46862: Fixed with 5.10.202 -CVE-2023-47233: Fix unknown +CVE-2023-47233: Fix not seen in stream CVE-2023-4732: Fixed with 5.10.53 CVE-2023-4881: Fixed with 5.10.198 CVE-2023-4921: Fixed with 5.10.195 @@ -688,7 +914,7 @@ CVE-2023-51782: Fixed with 5.10.205 CVE-2023-5197: Fixed with 5.10.198 CVE-2023-52340: Fixed with 5.10.208 CVE-2023-52429: Fixed with 5.10.210 -CVE-2023-52434: Fix not seen in stream +CVE-2023-52434: Fixed with 5.10.211 CVE-2023-52435: Fixed with 5.10.210 CVE-2023-52436: Fixed with 5.10.209 CVE-2023-52438: Fixed with 5.10.209 @@ -697,25 +923,132 @@ CVE-2023-52442: Fix not seen in stream CVE-2023-52443: Fixed with 5.10.209 CVE-2023-52444: Fixed with 5.10.209 CVE-2023-52445: Fixed with 5.10.209 -CVE-2023-52447: Fix not seen in stream +CVE-2023-52447: Fixed with 5.10.214 CVE-2023-52448: Fixed with 5.10.209 CVE-2023-52449: Fixed with 5.10.209 CVE-2023-52451: Fixed with 5.10.209 CVE-2023-52454: Fixed with 5.10.209 CVE-2023-52456: Fixed with 5.10.209 -CVE-2023-52457: Fixed with 5.10.209 CVE-2023-52458: Fix not seen in stream CVE-2023-52463: Fixed with 5.10.209 CVE-2023-52464: Fixed with 5.10.209 +CVE-2023-52467: Fixed with 5.10.209 +CVE-2023-52469: Fixed with 5.10.209 +CVE-2023-52470: Fixed with 5.10.209 +CVE-2023-52474: Fixed with 5.10.180 +CVE-2023-52475: Fixed with 5.10.199 +CVE-2023-52476: Fix not seen in stream +CVE-2023-52477: Fixed with 5.10.199 +CVE-2023-52478: Fixed with 5.10.199 +CVE-2023-52479: Fix not seen in stream +CVE-2023-52480: Fix not seen in stream +CVE-2023-52481: Fix not seen in stream +CVE-2023-52482: Fix not seen in stream +CVE-2023-52484: Fix not seen in stream +CVE-2023-52485: Fix not seen in stream +CVE-2023-52486: Fixed with 5.10.210 +CVE-2023-52488: Fix not seen in stream +CVE-2023-52489: Fixed with 5.10.210 +CVE-2023-52491: Fixed with 5.10.210 +CVE-2023-52492: Fixed with 5.10.210 +CVE-2023-52493: Fixed with 5.10.210 +CVE-2023-52497: Fixed with 5.10.211 +CVE-2023-52498: Fixed with 5.10.210 +CVE-2023-52500: Fixed with 5.10.198 +CVE-2023-52501: Fixed with 5.10.198 +CVE-2023-52502: Fixed with 5.10.199 +CVE-2023-52503: Fixed with 5.10.199 +CVE-2023-52504: Fixed with 5.10.199 +CVE-2023-52506: Fix not seen in stream +CVE-2023-52507: Fixed with 5.10.199 +CVE-2023-52508: Fix not seen in stream +CVE-2023-52509: Fixed with 5.10.199 +CVE-2023-52510: Fixed with 5.10.199 +CVE-2023-52511: Fix not seen in stream +CVE-2023-52513: Fixed with 5.10.198 +CVE-2023-52515: Fixed with 5.10.199 +CVE-2023-52516: Fixed with 5.10.198 +CVE-2023-52517: Fix not seen in stream +CVE-2023-52519: Fix not seen in stream +CVE-2023-52522: Fixed with 5.10.198 +CVE-2023-52527: Fixed with 5.10.198 +CVE-2023-52528: Fixed with 5.10.198 +CVE-2023-52530: Fix not seen in stream +CVE-2023-52531: Fix not seen in stream +CVE-2023-52532: Fix not seen in stream +CVE-2023-52559: Fix not seen in stream +CVE-2023-52561: Fix not seen in stream +CVE-2023-52563: Fix not seen in stream +CVE-2023-52565: Fix not seen in stream +CVE-2023-52566: Fixed with 5.10.198 +CVE-2023-52568: Fix not seen in stream +CVE-2023-52569: Fix not seen in stream +CVE-2023-52571: Fix not seen in stream +CVE-2023-52572: Fix not seen in stream +CVE-2023-52573: Fixed with 5.10.198 +CVE-2023-52574: Fixed with 5.10.198 +CVE-2023-52578: Fixed with 5.10.198 +CVE-2023-52583: Fixed with 5.10.210 +CVE-2023-52584: Fix not seen in stream +CVE-2023-52585: Fix not seen in stream +CVE-2023-52586: Fix not seen in stream +CVE-2023-52587: Fixed with 5.10.210 +CVE-2023-52588: Fix not seen in stream +CVE-2023-52589: Fix not seen in stream +CVE-2023-52590: Fix not seen in stream +CVE-2023-52591: Fix not seen in stream +CVE-2023-52593: Fix not seen in stream +CVE-2023-52594: Fixed with 5.10.210 +CVE-2023-52595: Fixed with 5.10.210 +CVE-2023-52596: Fix not seen in stream +CVE-2023-52597: Fixed with 5.10.210 +CVE-2023-52598: Fixed with 5.10.210 +CVE-2023-52599: Fixed with 5.10.210 +CVE-2023-52600: Fixed with 5.10.210 +CVE-2023-52601: Fixed with 5.10.210 +CVE-2023-52602: Fixed with 5.10.210 +CVE-2023-52603: Fixed with 5.10.210 +CVE-2023-52604: Fixed with 5.10.210 +CVE-2023-52606: Fixed with 5.10.210 +CVE-2023-52607: Fixed with 5.10.210 +CVE-2023-52608: Fix not seen in stream +CVE-2023-52609: Fixed with 5.10.209 +CVE-2023-52610: Fix not seen in stream +CVE-2023-52612: Fixed with 5.10.209 +CVE-2023-52614: Fix not seen in stream +CVE-2023-52615: Fixed with 5.10.210 +CVE-2023-52616: Fixed with 5.10.210 +CVE-2023-52617: Fixed with 5.10.210 +CVE-2023-52618: Fixed with 5.10.210 +CVE-2023-52619: Fixed with 5.10.210 +CVE-2023-52620: Fix not seen in stream +CVE-2023-52621: Fix not seen in stream +CVE-2023-52622: Fixed with 5.10.210 +CVE-2023-52623: Fixed with 5.10.210 +CVE-2023-52624: Fix not seen in stream +CVE-2023-52625: Fix not seen in stream +CVE-2023-52627: Fixed with 5.10.210 +CVE-2023-52628: Fixed with 5.10.198 +CVE-2023-52629: Fix not seen in stream +CVE-2023-52630: Fixed with 5.10.210 +CVE-2023-52632: Fix not seen in stream +CVE-2023-52633: Fix not seen in stream +CVE-2023-52634: Fix not seen in stream +CVE-2023-52635: Fixed with 5.10.210 +CVE-2023-52637: Fixed with 5.10.210 +CVE-2023-52638: Fix not seen in stream +CVE-2023-52639: Fix not seen in stream +CVE-2023-52640: Fix not seen in stream +CVE-2023-52641: Fix not seen in stream CVE-2023-5717: Fixed with 5.10.199 CVE-2023-6040: Fixed with 5.10.208 CVE-2023-6121: Fixed with 5.10.203 CVE-2023-6176: Fixed with 5.10.195 CVE-2023-6240: Fix unknown -CVE-2023-6270: Fix unknown -CVE-2023-6356: Fix unknown +CVE-2023-6270: Fixed with 5.10.214 +CVE-2023-6356: Fixed with 5.10.209 CVE-2023-6535: Fix unknown -CVE-2023-6536: Fix unknown +CVE-2023-6536: Fixed with 5.10.209 CVE-2023-6546: Fixed with 5.10.192 CVE-2023-6560: Fix not seen in stream CVE-2023-6606: Fixed with 5.10.206 @@ -724,25 +1057,26 @@ CVE-2023-6817: Fixed with 5.10.204 CVE-2023-6915: Fixed with 5.10.209 CVE-2023-6931: Fixed with 5.10.204 CVE-2023-6932: Fixed with 5.10.203 -CVE-2023-7042: Fix unknown +CVE-2023-7042: Fixed with 5.10.214 CVE-2023-7192: Fixed with 5.10.173 CVE-2024-0340: Fixed with 5.10.210 CVE-2024-0564: Fix unknown -CVE-2024-0565: Fix not seen in stream +CVE-2024-0565: Fixed with 5.10.211 CVE-2024-0584: Fixed with 5.10.203 CVE-2024-0607: Fixed with 5.10.210 CVE-2024-0641: Fixed with 5.10.198 CVE-2024-0646: Fixed with 5.10.208 CVE-2024-0775: Fixed with 5.10.180 -CVE-2024-0841: Fix unknown +CVE-2024-0841: Fixed with 5.10.212 CVE-2024-1086: Fixed with 5.10.210 CVE-2024-1151: Fixed with 5.10.210 CVE-2024-1312: Fix not seen in stream CVE-2024-21803: Fix unknown -CVE-2024-22099: Fix unknown +CVE-2024-2193: Fix unknown +CVE-2024-22099: Fixed with 5.10.214 CVE-2024-22386: Fix unknown -CVE-2024-23196: Fix unknown -CVE-2024-23307: Fix unknown +CVE-2024-23196: Fixed with 5.10.192 +CVE-2024-23307: Fix not seen in stream CVE-2024-23848: Fix unknown CVE-2024-23849: Fixed with 5.10.210 CVE-2024-23850: Fixed with 5.10.210 @@ -752,7 +1086,7 @@ CVE-2024-24857: Fix unknown CVE-2024-24858: Fix unknown CVE-2024-24859: Fix unknown CVE-2024-24860: Fixed with 5.10.209 -CVE-2024-24861: Fix unknown +CVE-2024-24861: Fix not seen in stream CVE-2024-24864: Fix unknown CVE-2024-25739: Fix unknown CVE-2024-25740: Fix unknown @@ -762,13 +1096,133 @@ CVE-2024-26583: Fix not seen in stream CVE-2024-26584: Fix not seen in stream CVE-2024-26585: Fix not seen in stream CVE-2024-26586: Fixed with 5.10.209 -CVE-2024-26587: Fix not seen in stream -CVE-2024-26588: Fix not seen in stream CVE-2024-26589: Fix not seen in stream -CVE-2024-26591: Fix not seen in stream CVE-2024-26592: Fix not seen in stream CVE-2024-26593: Fixed with 5.10.210 CVE-2024-26594: Fix not seen in stream CVE-2024-26595: Fix not seen in stream CVE-2024-26597: Fixed with 5.10.209 CVE-2024-26598: Fixed with 5.10.209 +CVE-2024-26600: Fixed with 5.10.210 +CVE-2024-26602: Fixed with 5.10.210 +CVE-2024-26606: Fixed with 5.10.210 +CVE-2024-26607: Fix not seen in stream +CVE-2024-26610: Fixed with 5.10.210 +CVE-2024-26614: Fixed with 5.10.210 +CVE-2024-26615: Fixed with 5.10.210 +CVE-2024-26622: Fixed with 5.10.212 +CVE-2024-26623: Fix not seen in stream +CVE-2024-26625: Fixed with 5.10.210 +CVE-2024-26627: Fixed with 5.10.210 +CVE-2024-26633: Fixed with 5.10.209 +CVE-2024-26635: Fixed with 5.10.210 +CVE-2024-26636: Fixed with 5.10.210 +CVE-2024-26640: Fixed with 5.10.210 +CVE-2024-26641: Fixed with 5.10.210 +CVE-2024-26642: Fix not seen in stream +CVE-2024-26644: Fixed with 5.10.210 +CVE-2024-26645: Fixed with 5.10.210 +CVE-2024-26646: Fix not seen in stream +CVE-2024-26647: Fix not seen in stream +CVE-2024-26648: Fix not seen in stream +CVE-2024-26650: Fix not seen in stream +CVE-2024-26651: Fixed with 5.10.214 +CVE-2024-26654: Fix not seen in stream +CVE-2024-26655: Fix not seen in stream +CVE-2024-26656: Fix not seen in stream +CVE-2024-26658: Fix not seen in stream +CVE-2024-26659: Fixed with 5.10.213 +CVE-2024-26661: Fix not seen in stream +CVE-2024-26662: Fix not seen in stream +CVE-2024-26663: Fixed with 5.10.210 +CVE-2024-26664: Fixed with 5.10.210 +CVE-2024-26665: Fixed with 5.10.210 +CVE-2024-26668: Fix not seen in stream +CVE-2024-26669: Fix not seen in stream +CVE-2024-26671: Fixed with 5.10.210 +CVE-2024-26672: Fix not seen in stream +CVE-2024-26673: Fixed with 5.10.210 +CVE-2024-26675: Fixed with 5.10.210 +CVE-2024-26676: Fix not seen in stream +CVE-2024-26677: Fix not seen in stream +CVE-2024-26679: Fixed with 5.10.210 +CVE-2024-26680: Fix not seen in stream +CVE-2024-26684: Fixed with 5.10.210 +CVE-2024-26685: Fixed with 5.10.210 +CVE-2024-26686: Fix not seen in stream +CVE-2024-26687: Fix not seen in stream +CVE-2024-26688: Fixed with 5.10.212 +CVE-2024-26689: Fixed with 5.10.210 +CVE-2024-26691: Fix not seen in stream +CVE-2024-26696: Fixed with 5.10.210 +CVE-2024-26697: Fixed with 5.10.210 +CVE-2024-26698: Fixed with 5.10.210 +CVE-2024-26699: Fix not seen in stream +CVE-2024-26700: Fix not seen in stream +CVE-2024-26702: Fixed with 5.10.210 +CVE-2024-26704: Fixed with 5.10.210 +CVE-2024-26706: Fix not seen in stream +CVE-2024-26707: Fixed with 5.10.210 +CVE-2024-26712: Fixed with 5.10.210 +CVE-2024-26713: Fix not seen in stream +CVE-2024-26715: Fix not seen in stream +CVE-2024-26718: Fix not seen in stream +CVE-2024-26719: Fix not seen in stream +CVE-2024-26720: Fixed with 5.10.210 +CVE-2024-26726: Fix not seen in stream +CVE-2024-26727: Fixed with 5.10.210 +CVE-2024-26733: Fixed with 5.10.211 +CVE-2024-26735: Fixed with 5.10.211 +CVE-2024-26736: Fixed with 5.10.211 +CVE-2024-26738: Fix not seen in stream +CVE-2024-26739: Fix not seen in stream +CVE-2024-26740: Fix not seen in stream +CVE-2024-26743: Fixed with 5.10.211 +CVE-2024-26744: Fixed with 5.10.211 +CVE-2024-26745: Fix not seen in stream +CVE-2024-26747: Fixed with 5.10.211 +CVE-2024-26748: Fixed with 5.10.211 +CVE-2024-26749: Fixed with 5.10.211 +CVE-2024-26751: Fixed with 5.10.211 +CVE-2024-26752: Fixed with 5.10.211 +CVE-2024-26754: Fixed with 5.10.211 +CVE-2024-26756: Fix not seen in stream +CVE-2024-26757: Fix not seen in stream +CVE-2024-26758: Fix not seen in stream +CVE-2024-26759: Fix not seen in stream +CVE-2024-26763: Fixed with 5.10.211 +CVE-2024-26764: Fixed with 5.10.211 +CVE-2024-26765: Fix not seen in stream +CVE-2024-26766: Fixed with 5.10.211 +CVE-2024-26767: Fix not seen in stream +CVE-2024-26768: Fix not seen in stream +CVE-2024-26769: Fix not seen in stream +CVE-2024-26770: Fix not seen in stream +CVE-2024-26771: Fixed with 5.10.211 +CVE-2024-26772: Fixed with 5.10.211 +CVE-2024-26773: Fixed with 5.10.211 +CVE-2024-26774: Fix not seen in stream +CVE-2024-26775: Fix not seen in stream +CVE-2024-26776: Fixed with 5.10.211 +CVE-2024-26777: Fixed with 5.10.211 +CVE-2024-26778: Fixed with 5.10.211 +CVE-2024-26779: Fixed with 5.10.211 +CVE-2024-26782: Fixed with 5.10.212 +CVE-2024-26784: Fix not seen in stream +CVE-2024-26787: Fixed with 5.10.213 +CVE-2024-26788: Fixed with 5.10.212 +CVE-2024-26789: Fix not seen in stream +CVE-2024-26790: Fixed with 5.10.212 +CVE-2024-26791: Fixed with 5.10.212 +CVE-2024-26793: Fixed with 5.10.212 +CVE-2024-26795: Fixed with 5.10.212 +CVE-2024-26797: Fix not seen in stream +CVE-2024-26798: Fix not seen in stream +CVE-2024-26801: Fixed with 5.10.212 +CVE-2024-26802: Fix not seen in stream +CVE-2024-26803: Fix not seen in stream +CVE-2024-26804: Fixed with 5.10.212 +CVE-2024-26805: Fixed with 5.10.212 +CVE-2024-26806: Fix not seen in stream +CVE-2024-26808: Fixed with 5.10.210 +CVE-2024-26809: Fixed with 5.10.214 diff --git a/data/5.10/5.10_security.txt b/data/5.10/5.10_security.txt index 9817c9c1d..b6074d2d0 100644 --- a/data/5.10/5.10_security.txt +++ b/data/5.10/5.10_security.txt @@ -102,6 +102,7 @@ CVEs fixed in 5.10.30: CVE-2020-25672: 568ac94df580b1a65837dc299e8758635e7b1423 nfc: fix memory leak in llcp_sock_connect() CVE-2020-25673: a12a2fa9a129d3200065fde95f6eb0a98672a2c3 nfc: Avoid endless loops caused by repeated llcp_sock_connect() CVE-2021-3659: 38731bbcd9f0bb8228baaed5feb4a1f76530e49c net: mac802154: Fix general protection fault + CVE-2021-46904: dc195928d7e4ec7b5cfc6cd10dc4c8d87a7c72ac net: hso: fix null-ptr-deref during tty device unregistration CVEs fixed in 5.10.31: CVE-2021-0937: 1f3b9000cb44318b0de40a0f495a5a708cd9be6e netfilter: x_tables: fix compat match/target pad out-of-bound write @@ -111,16 +112,67 @@ CVEs fixed in 5.10.32: CVE-2021-23133: 5a627026be4a17e5b9db23558cd28e62b2cbc66e net/sctp: fix race condition in sctp_destroy_sock CVE-2021-29155: 4f3ff11204eac0ee23acf64deecb3bad7b0db0c6 bpf: Use correct permission flag for mixed signed bounds arithmetic CVE-2021-3501: 7f64753835a78c7d2cc2932a5808ef3b7fd4c050 KVM: VMX: Don't use vcpu->run->internal.ndata as an array index + CVE-2021-46908: 4f3ff11204eac0ee23acf64deecb3bad7b0db0c6 bpf: Use correct permission flag for mixed signed bounds arithmetic + CVE-2021-46909: 1fc087fdb98d556b416c82ed6e3964a30885f47a ARM: footbridge: fix PCI interrupt mapping + CVE-2021-46911: 8d5a9dbd2116a852f8f0f91f6fbc42a0afe1091f ch_ktls: Fix kernel panic + CVE-2021-46912: 35d7491e2f77ce480097cabcaf93ed409e916e12 net: Make tcp_allowed_congestion_control readonly in non-init netns + CVE-2021-46914: be07581aacae7cd0a073afae8e8862032f794309 ixgbe: fix unbalanced device enable/disable in suspend/resume + CVE-2021-46915: dc1732baa9da5b68621586bf8636ebbc27dc62d2 netfilter: nft_limit: avoid possible divide error in nft_limit_init + CVE-2021-46917: e5eb9757fe4c2392e069246ae78badc573af1833 dmaengine: idxd: fix wq cleanup of WQCFG registers + CVE-2021-46919: 4ecf25595273203010bc8318c4aee60ad64037ae dmaengine: idxd: fix wq size store permission state + CVE-2021-46920: a5ad12d5d69c63af289a37f05187a0c6fe93553d dmaengine: idxd: Fix clobbering of SWERR overflow bit on writeback + +CVEs fixed in 5.10.33: + CVE-2021-46921: 82fa9ced35d88581cffa4a1c856fc41fca96d80a locking/qrwlock: Fix ordering in queued_write_lock_slowpath() CVEs fixed in 5.10.35: CVE-2021-31829: 2cfa537674cd1051a3b8111536d77d0558f33d5d bpf: Fix masking negation logic upon negative dst register CVE-2021-38209: d3598eb3915cc0c0d8cab42f4a6258ff44c4033e netfilter: conntrack: Make global sysctls readonly in non-init netns + CVE-2021-46971: 4348d3b5027bc3ff6336368b6c60605d4ef8e1ce perf/core: Fix unconditional security_locked_down() call + CVE-2021-46972: 71d58457a8afc650da5d3292a7f7029317654d95 ovl: fix leaked dentry + CVE-2021-46973: 48ec949ac979b4b42d740f67b6177797af834f80 net: qrtr: Avoid potential use after free in MHI send + CVE-2021-46974: 2cfa537674cd1051a3b8111536d77d0558f33d5d bpf: Fix masking negation logic upon negative dst register CVEs fixed in 5.10.36: + CVE-2020-36776: c24a20912eef00587416628149c438e885eb1304 thermal/drivers/cpufreq_cooling: Fix slab OOB issue + CVE-2020-36777: 43263fd43083e412311fa764cd04a727b0c6a749 media: dvbdev: Fix memory leak in dvb_media_device_free() CVE-2021-3506: 9aa4602237d535b83c579eb752e8fc1c3e7e7055 f2fs: fix to avoid out-of-bounds memory access CVE-2021-3543: ed9cfd60c7875b0597e672e89c0bad09a88307d2 nitro_enclaves: Fix stale file descriptors on failed usercopy + CVE-2021-46938: 1cb02dc76f4c0a2749a02b26469512d6984252e9 dm rq: fix double free of blk_mq_tag_set in dev remove after table load fails + CVE-2021-46939: a33614d52e97fc8077eb0b292189ca7d964cc534 tracing: Restructure trace_clock_global() to never block + CVE-2021-46940: ea6803ff2cd1a2d7d880256bf562172b708a76ff tools/power turbostat: Fix offset overflow issue in index converting + CVE-2021-46941: fce7bbcd07d59ac30dba8ce225316b3b4c1c7b50 usb: dwc3: core: Do core softreset when switch mode + CVE-2021-46943: c6b81b897f6f9445d57f8d47c4e060ec21556137 media: staging/intel-ipu3: Fix set_fmt error handling + CVE-2021-46944: 517f6f570566a863c2422b843c8b7d099474f6a9 media: staging/intel-ipu3: Fix memory leak in imu_fmt + CVE-2021-46948: bf2b941d0a6f2d3b9f5fa3c4c21bdd54f71ce253 sfc: farch: fix TX queue lookup in TX event handling + CVE-2021-46949: fb791572d6747ef385f628450f8d57cd132e6e5a sfc: farch: fix TX queue lookup in TX flush done handling + CVE-2021-46950: 661061a45e32d8b2cc0e306da9f169ad44011382 md/raid1: properly indicate failure when ending a failed write request + CVE-2021-46951: 60a01ecc9f68067e4314a0b55148e39e5d58a51b tpm: efi: Use local variable for calculating final log size + CVE-2021-46952: 96fa26b74cdcf9f5c98996bf36bec9fb5b19ffe2 NFS: fs_context: validate UDP retrans to prevent shift out-of-bounds + CVE-2021-46953: e0f2d86481eaa83df33b0793f75212919db7a19d ACPI: GTDT: Don't corrupt interrupt mappings on watchdow probe failure + CVE-2021-46955: a1478374b0bda89b4277a8afd39208271faad4be openvswitch: fix stack OOB read while fragmenting IPv4 packets + CVE-2021-46956: d19555ff225d0896a33246a49279e6d578095f15 virtiofs: fix memory leak in virtio_fs_probe() + CVE-2021-46958: a4794be7b00b7eda4b45fffd283ab7d76df7e5d6 btrfs: fix race between transaction aborts and fsyncs leading to use-after-free + CVE-2021-46960: aaa0faa5c28a91c362352d6b35dc3ed10df56fb0 cifs: Return correct error code from smb2_get_enc_key + CVE-2021-46961: 7be4db5c2b59fa77071c93ca4329876fb9777202 irqchip/gic-v3: Do not enable irqs when handling spurious interrups + CVE-2021-46962: 25ac6ce65f1ab458982d15ec1caf441acd37106a mmc: uniphier-sd: Fix a resource leak in the remove function + CVE-2021-46963: 702cdaa2c6283c135ef16d52e0e4e3c1005aa538 scsi: qla2xxx: Fix crash in qla2xxx_mqueuecommand() + CVE-2021-46965: 34ec706bf0b7c4ca249a729c1bcb91f706c7a7be mtd: physmap: physmap-bt1-rom: Fix unintentional stack access + CVE-2021-46966: 62dc2440ebb552aa0d7f635e1697e077d9d21203 ACPI: custom_method: fix potential use-after-free issue + CVE-2021-46967: 3b8b6399666a29daa30b0bb3f5c9e3fc81c5a6a6 vhost-vdpa: fix vm_flags for virtqueue doorbell mapping + CVE-2021-46968: 026499a9c2e002e621ad568d1378324ae97e5524 s390/zcrypt: fix zcard and zqueue hot-unplug memleak CVEs fixed in 5.10.37: + CVE-2020-36778: c977426db644ba476938125597947979e8aba725 i2c: xiic: fix reference leak when pm_runtime_get_sync fails + CVE-2020-36779: c323b270a52a26aa8038a4d1fd9a850904a41166 i2c: stm32f7: fix reference leak when pm_runtime_get_sync fails + CVE-2020-36780: e547640cee7981fd751d2c9cde3a61bdb678b755 i2c: sprd: fix reference leak when pm_runtime_get_sync fails + CVE-2020-36781: 3a0cdd336d92c429b51a79bf4f64b17eafa0325d i2c: imx: fix reference leak when pm_runtime_get_sync fails + CVE-2020-36782: cc49d206414240483bb93ffa3d80243e6a776916 i2c: imx-lpi2c: fix reference leak when pm_runtime_get_sync fails + CVE-2020-36783: e80ae8bde41266d3b8bf012460b6593851766006 i2c: img-scb: fix reference leak when pm_runtime_get_sync fails + CVE-2020-36784: 30410519328c94367e561fd878e5f0d3a0303585 i2c: cadence: fix reference leak when pm_runtime_get_sync fails + CVE-2020-36785: d218c7a0284f6b92a7b82d2e19706e18663b4193 media: atomisp: Fix use after free in atomisp_alloc_css_stat_bufs() + CVE-2020-36786: cc4cc2fb5aaf9adb83c02211eb13b16cfcb7ba64 media: [next] staging: media: atomisp: fix memory leak of object flash + CVE-2020-36787: a59d01384c80a8a4392665802df57c3df20055f5 media: aspeed: fix clock handling logic CVE-2021-31440: 4394be0a1866fb78a4dfe0ea38e29c4ed107b890 bpf: Fix propagation of 32 bit unsigned bounds from 64 bit bounds CVE-2021-32399: 2d84ef4e6569a818f912d93d5345c21542807ac7 bluetooth: eliminate the potential race condition when removing the HCI controller CVE-2021-33034: 1d7bd87a2c8d264ca3e5c9ba6f3eafc23e994028 Bluetooth: verify AMP hci_chan before amp_destroy @@ -128,14 +180,90 @@ CVEs fixed in 5.10.37: CVE-2021-3490: 282bfc8848eaa195d5e994bb700f2c7afb7eb3e6 bpf: Fix alu32 const subreg bound tracking on bitwise operations CVE-2021-3491: 7e916d0124e5f40d7912f93a633f5dee2c3ad735 io_uring: truncate lengths larger than MAX_RW_COUNT on provide buffers CVE-2021-45486: a273c27d7255fc527023edeb528386d1b64bedf5 inet: use bigger hash table for IP ID generation + CVE-2021-47010: 6c1ea8bee75df8fe2184a50fcd0f70bf82986f42 net: Only allow init netns to set default tcp cong to a restricted algo + CVE-2021-47012: 608a4b90ece039940e9425ee2b39c8beff27e00c RDMA/siw: Fix a use after free in siw_alloc_mr + CVE-2021-47013: 9dc373f74097edd0e35f3393d6248eda8d1ba99d net:emac/emac-mac: Fix a use after free in emac_mac_tx_buf_send + CVE-2021-47015: 4fcaad2b7dac3f16704f8118c7e481024ddbd3ed bnxt_en: Fix RX consumer index logic in the error path. + CVE-2021-47016: 1dfb26df15fc7036a74221d43de7427f74293dae m68k: mvme147,mvme16x: Don't wipe PCC timer config bits + CVE-2021-47017: 8bb054fb336f4250002fff4e0b075221c05c3c65 ath10k: Fix a use after free in ath10k_htc_send_bundle + CVE-2021-47018: 4b9fb2c9039a206d37f215936a4d5bee7b1bf9cd powerpc/64: Fix the definition of the fixmap area + CVE-2021-47020: 7c468deae306d0cbbd539408c26cfec04c66159a soundwire: stream: fix memory leak in stream config error path + CVE-2021-47023: 0ce6052802be2cb61a57b753e41301339c88c839 net: marvell: prestera: fix port event handling on init + CVE-2021-47024: b605673b523fe33abeafb2136759bcbc9c1e6ebf vsock/virtio: free queued packets when closing socket + CVE-2021-47026: b64415c6b3476cf9fa4d0aea3807065b8403a937 RDMA/rtrs-clt: destroy sysfs after removing session from active list + CVE-2021-47032: 4e7914ce23306b28d377ec395e00e5fde0e6f96e mt76: mt7915: fix tx skb dma unmap + CVE-2021-47033: 75bc5f779a7664d1fc19cb915039439c6e58bb94 mt76: mt7615: fix tx skb dma unmap + CVE-2021-47034: 84c0762633f2a7ac8399e6b97d3b9bb8e6e1d50f powerpc/64s: Fix pte update for kernel memory on radix + CVE-2021-47038: 7cc0ba67883c6c8d3bddb283f56c167fc837a555 Bluetooth: avoid deadlock between hci_dev->lock and socket lock + CVE-2021-47040: cbbc13b115b8f18e0a714d89f87fbdc499acfe2d io_uring: fix overflows checks in provide buffers + CVE-2021-47041: 60ade0d56b06537a28884745059b3801c78e03bc nvmet-tcp: fix incorrect locking in state_change sk callback + CVE-2021-47043: 00b68a7478343afdf83f30c43e64db5296057030 media: venus: core: Fix some resource leaks in the error path of 'venus_probe()' + CVE-2021-47044: 80862cbf76c2646f709a57c4517aefe0b094c774 sched/fair: Fix shift-out-of-bounds in load_balance() + CVE-2021-47046: 403c4528e5887af3deb9838cb77a557631d1e138 drm/amd/display: Fix off by one in hdmi_14_process_transaction() + CVE-2021-47047: 5980a3b9c933408bc22b0e349b78c3ebd7cbf880 spi: spi-zynqmp-gqspi: return -ENOMEM if dma_map_single fails + CVE-2021-47048: 1231279389b5e638bc3b66b9741c94077aed4b5a spi: spi-zynqmp-gqspi: fix use-after-free in zynqmp_qspi_exec_op + CVE-2021-47049: d5c7b42c9f56ca46b286daa537d181bd7f69214f Drivers: hv: vmbus: Use after free in __vmbus_open() + CVE-2021-47050: 71bcc1b4a1743534d8abdcb57ff912e6bc390438 memory: renesas-rpc-if: fix possible NULL pointer dereference of resource + CVE-2021-47051: ce02e58ddf8658a4c3bed2296f32a5873b3f7cce spi: fsl-lpspi: Fix PM reference leak in lpspi_prepare_xfer_hardware() + CVE-2021-47052: 0e596b3734649041ed77edc86a23c0442bbe062b crypto: sa2ul - Fix memory leak of rxd + CVE-2021-47053: 2c67a9333da9d0a3b87310e0d116b7c9070c7b00 crypto: sun8i-ss - Fix memory leak of pad + CVE-2021-47054: 00f6abd3509b1d70d0ab0fbe65ce5685cebed8be bus: qcom: Put child node before return + CVE-2021-47055: 7b6552719c0ccbbea29dde4be141da54fdb5877e mtd: require write permissions for locking and badblock ioctls + CVE-2021-47056: 1f50392650ae794a1aea41c213c6a3e1c824413c crypto: qat - ADF_STATUS_PF_RUNNING should be set after adf_dev_init + CVE-2021-47057: 617ec35ed51f731a593ae7274228ef2cfc9cb781 crypto: sun8i-ss - Fix memory leak of object d when dma_iv fails to map + CVE-2021-47059: 1f12aaf07f61122cf5074d29714ee26f8d44b0e7 crypto: sun8i-ss - fix result memory leak on error path + CVE-2021-47060: 2a20592baff59c5351c5200ec667e1a2aa22af85 KVM: Stop looking for coalesced MMIO zones if the bus is destroyed + CVE-2021-47061: 03c6cccedd3913006744faa252a4da5145299343 KVM: Destroy I/O bus devices on unregister failure _after_ sync'ing SRCU + CVE-2021-47063: ce450934a00cf896e648fde08d0bd1426653d7a2 drm: bridge/panel: Cleanup connector on bridge detach + CVE-2021-47064: 9fa26701cd1fc4d932d431971efc5746325bdfce mt76: fix potential DMA mapping leak + CVE-2021-47065: 95fb153c6027924cda3422120169d1890737f3a0 rtw88: Fix array overrun in rtw_get_tx_power_params() + CVE-2021-47066: cab2e8e5997b592fdb7d02cf2387b4b8e3057174 async_xor: increase src_offs when dropping destination page + CVE-2021-47067: a1ad124c836816fac8bd5e461d36eaf33cee4e24 soc/tegra: regulators: Fix locking up when voltage-spread is out of range CVEs fixed in 5.10.38: CVE-2021-4157: 1fbea60ea658ab887fb899532d783732b04e53e6 pNFS/flexfiles: fix incorrect size check in decode_nfs_fh() + CVE-2021-46976: 805c990a9c54b9451d3daff640b850909c31ab9d drm/i915: Fix crash in auto_retire + CVE-2021-46977: 31f29749ee970c251b3a7e5b914108425940d089 KVM: VMX: Disable preemption when probing user return MSRs + CVE-2021-46980: e5366bea0277425e1868ba20eeb27c879d5a6e2d usb: typec: ucsi: Retrieve all the PDOs instead of just the first 4 + CVE-2021-46981: cde4b55cfb24522dcbba80bbdb0c082303e76c43 nbd: Fix NULL pointer in flush_workqueue + CVE-2021-46982: 5639b73fd3bc6fc8ca72e3a9ac15aacaabd7ebff f2fs: compress: fix race condition of overwrite vs truncate + CVE-2021-46983: 64f3410c7bfc389b1a58611d0799f4a36ce4b6b5 nvmet-rdma: Fix NULL deref when SEND is completed with error + CVE-2021-46984: 54dbe2d2c1fcabf650c7a8b747601da355cd7f9f kyber: fix out of bounds access when preempted + CVE-2021-46986: 1ea775021282d90e1d08d696b7ab54aa75d688e5 usb: dwc3: gadget: Free gadget structure only after freeing endpoints + CVE-2021-46988: 140cfd9980124aecb6c03ef2e69c72d0548744de userfaultfd: release page in error path to avoid BUG_ON + CVE-2021-46989: adbd8a2a8cc05d9e501f93e5c95c59307874cc99 hfsplus: prevent corruption in shrinking truncate + CVE-2021-46990: d2e3590ca39ccfd8a5a46d8c7f095cb6c7b9ae92 powerpc/64s: Fix crashes when toggling entry flush barrier + CVE-2021-46991: 829a713450b8fb127cbabfc1244c1d8179ec5107 i40e: Fix use-after-free in i40e_client_subtask() + CVE-2021-46992: 72b49dd116ca00a46a11d5a4d8d7987f05ed9cd7 netfilter: nftables: avoid overflows in nft_hash_buckets() + CVE-2021-46993: f7347c85490b92dd144fa1fba9e1eca501656ab3 sched: Fix out-of-bound access in uclamp + CVE-2021-46994: eecb4df8ec9f896b19ee05bfa632ac6c1dcd8f21 can: mcp251x: fix resume from sleep before interface was brought up + CVE-2021-46996: 2c784a500f5edd337258b0fdb2f31bc9abde1a23 netfilter: nftables: Fix a memleak from userdata error path in new objects + CVE-2021-46997: 51524fa8b5f7b879ba569227738375d283b79382 arm64: entry: always set GIC_PRIO_PSR_I_SET during entry + CVE-2021-46998: 7afdd6aba95c8a526038e7abe283eeac3e4320f1 ethernet:enic: Fix a use after free bug in enic_hard_start_xmit + CVE-2021-46999: f01988ecf3654f805282dce2d3bb9afe68d2691e sctp: do asoc update earlier in sctp_sf_do_dupcook_a + CVE-2021-47000: bf45c9fe99aa8003d2703f1bd353f956dea47e40 ceph: fix inode leak on getattr error in __fh_to_dentry + CVE-2021-47001: eddae8be7944096419c2ae29477a45f767d0fcd4 xprtrdma: Fix cwnd update ordering + CVE-2021-47004: 105155a8146ddb54c119d8318964eef3859d109d f2fs: fix to avoid touching checkpointed data in get_victim() + CVE-2021-47005: bbed83d7060e07a5d309104d25a00f0a24441428 PCI: endpoint: Fix NULL pointer dereference for ->get_features() + CVE-2021-47006: 630146203108bf6b8934eec0dfdb3e46dcb917de ARM: 9064/1: hw_breakpoint: Do not directly check the event's overflow_handler hook + CVE-2021-47007: 1c20a4896409f5ca1c770e1880c33d0a28a8b10f f2fs: fix panic during f2fs_resize_fs() + CVE-2021-47035: 89bd620798704a8805fc9db0d71d7f812cf5b3d2 iommu/vt-d: Remove WO permissions on second-level paging entries CVEs fixed in 5.10.40: CVE-2020-26555: d8d261c7cfb3a5dd921b4aeeb944718afc3f3961 Bluetooth: SMP: Fail if remote and local public keys are identical CVE-2020-26558: d8d261c7cfb3a5dd921b4aeeb944718afc3f3961 Bluetooth: SMP: Fail if remote and local public keys are identical CVE-2021-0129: d8d261c7cfb3a5dd921b4aeeb944718afc3f3961 Bluetooth: SMP: Fail if remote and local public keys are identical + CVE-2021-47069: 4528c0c323085e645b8765913b4a7fd42cf49b65 ipc/mqueue, msg, sem: avoid relying on a stack reference past its expiry + CVE-2021-47071: d84b5e912212b05f6b5bde9f682046accfbe0354 uio_hv_generic: Fix a memory leak in error handling paths + CVE-2021-47073: 0cf036a0d325200e6c27b90908e51195bbc557b1 platform/x86: dell-smbios-wmi: Fix oops on rmmod dell_smbios + CVE-2021-47074: 9c980795ccd77e8abec33dd6fe28dfe1c4083e65 nvme-loop: fix memory leak in nvme_loop_create_ctrl() + CVE-2021-47075: 4720f29acb3fe67aa8aa71e6b675b079d193aaeb nvmet: fix memory leak in nvmet_alloc_ctrl() + CVE-2021-47077: a6362a737572f66051deb7637f3f77ddf7a4402f scsi: qedf: Add pointer checks in qedf_update_link_speed() + CVE-2021-47078: 2ee4d79c364914989c80de382c0b1a7259a7e4b3 RDMA/rxe: Clear all QP fields if creation failed + CVE-2021-47080: 66ab7fcdac34b890017f04f391507ef5b2b89a13 RDMA/core: Prevent divide-by-zero error triggered by the user + +CVEs fixed in 5.10.41: + CVE-2021-47180: b34cb7ac32cc8e5471dc773180ea9ae676b1a745 NFC: nci: fix memory leak in nci_allocate_device CVEs fixed in 5.10.42: CVE-2020-24586: 42d98e02193d163c1523a8840a2effcc4c6eb111 mac80211: prevent mixed key and fragment cache attacks @@ -147,6 +275,41 @@ CVEs fixed in 5.10.42: CVE-2020-26147: f7829b014bb670a77f6f66d265b058534367d04b mac80211: assure all fragments are encrypted CVE-2021-33098: 3cfd11506ed032446358eedf7e31b4defd819d91 ixgbe: fix large MTU request from VF CVE-2021-34981: 1b364f8ede200e79e25df0df588fcedc322518fb Bluetooth: cmtp: fix file refcount when cmtp_attach_device fails + CVE-2021-47136: ac493452e937b8939eaf2d24cac51a4804b6c20e net: zero-initialize tc skb extension on allocation + CVE-2021-47137: 5ac72351655f8b033a2935646f53b7465c903418 net: lantiq: fix memory corruption in RX ring + CVE-2021-47138: 02f03883fdb10ad7e66717c70ea163a8d27ae6e7 cxgb4: avoid accessing registers when clearing filters + CVE-2021-47139: a663c1e418a3b5b8e8edfad4bc8e7278c312d6fc net: hns3: put off calling register_netdev() until client initialize complete + CVE-2021-47141: da21a35c00ff1a1794d4f166d3b3fa8db4d0f6fb gve: Add NULL pointer checks when freeing irqs. + CVE-2021-47142: f98cdf084405333ee2f5be548a91b2d168e49276 drm/amdgpu: Fix a use-after-free + CVE-2021-47143: 8b2cdc004d21a7255f219706dca64411108f7897 net/smc: remove device from smcd_dev_list after failed device_add() + CVE-2021-47144: 9fdb8ed37a3a44f9c49372b69f87fd5f61cb3240 drm/amd/amdgpu: fix refcount leak + CVE-2021-47145: 7e13db503918820e6333811cdc6f151dcea5090a btrfs: do not BUG_ON in link_to_fixup_dir + CVE-2021-47146: beb39adb150f8f3b516ddf7c39835a9788704d23 mld: fix panic in mld_newpack() + CVE-2021-47149: 71723a796ab7881f491d663c6cd94b29be5fba50 net: fujitsu: fix potential null-ptr-deref + CVE-2021-47150: 8ee7ef4a57a9e1228b6f345aaa70aa8951c7e9cd net: fec: fix the potential memory leak in fec_enet_init() + CVE-2021-47151: 4e3cea8035b6f1b9055e69cc6ebf9fa4e50763ae interconnect: qcom: bcm-voter: add a missing of_node_put() + CVE-2021-47152: 3267a061096efc91eda52c2a0c61ba76e46e4b34 mptcp: fix data stream corruption + CVE-2021-47153: b523feb7e8e44652f92f3babb953a976e7ccbbef i2c: i801: Don't generate an interrupt on bus reset + CVE-2021-47158: dd8609f203448ca6d58ae71461208b3f6b0329b0 net: dsa: sja1105: add error handling in sja1105_setup() + CVE-2021-47159: caff86f85512b8e0d9830e8b8b0dfe13c68ce5b6 net: dsa: fix a crash if ->get_sset_count() fails + CVE-2021-47160: b91117b66fe875723a4e79ec6263526fffdb44d2 net: dsa: mt7530: fix VLAN traffic leaks + CVE-2021-47161: fe6921e3b8451a537e01c031b8212366bb386e3e spi: spi-fsl-dspi: Fix a resource leak in an error handling path + CVE-2021-47162: 6da24cfc83ba4f97ea44fc7ae9999a006101755c tipc: skb_linearize the head skb when reassembling msgs + CVE-2021-47163: 5195ec5e365a2a9331bfeb585b613a6e94f98dba tipc: wait and exit until all work queues are done + CVE-2021-47164: 2e4b0b95a489259f9d35a3db17023061f8f3d587 net/mlx5e: Fix null deref accessing lag dev + CVE-2021-47165: d66083c0d6f5125a4d982aa177dd71ab4cd3d212 drm/meson: fix shutdown crash when component not probed + CVE-2021-47166: 7087db95c0a06ab201b8ebfac6a7ec1e34257997 NFS: Don't corrupt the value of pg_bytes_written in nfs_do_recoalesce() + CVE-2021-47167: ee21cd3aa8548e0cbc8c67a80b62113aedd2d101 NFS: Fix an Oopsable condition in __nfs_pageio_add_request() + CVE-2021-47168: 9b367fe770b1b80d7bf64ed0d177544a44405f6e NFS: fix an incorrect limit in filelayout_decode_layout() + CVE-2021-47169: 6a931ceb0b9401fe18d0c500e08164bf9cc7be4b serial: rp2: use 'request_firmware' instead of 'request_firmware_nowait' + CVE-2021-47170: 8d83f109e920d2776991fa142bb904d985dca2ed USB: usbfs: Don't WARN about excessively large memory allocations + CVE-2021-47171: 635ac38b36255d3cfb8312cf7c471334f4d537e0 net: usb: fix memory leak in smsc75xx_bind + CVE-2021-47172: f70122825076117787b91e7f219e21c09f11a5b9 iio: adc: ad7124: Fix potential overflow due to non sequential channel numbers + CVE-2021-47173: 5394ae9d8c7961dd93807fdf1b12a1dde96b0a55 misc/uss720: fix memory leak in uss720_probe + CVE-2021-47174: b1f45a26bd322525c14edd9504f6d46dfad679a4 netfilter: nft_set_pipapo_avx2: Add irq_fpu_usable() check, fallback to non-AVX2 version + CVE-2021-47175: e6294c06e7c62ffdd5bf3df696d3a4fcbb753d3c net/sched: fq_pie: fix OOB access in the traffic path + CVE-2021-47177: f01134321d04f47c718bb41b799bcdeda27873d2 iommu/vt-d: Fix sysfs leak in alloc_iommu() + CVE-2021-47179: f9890652185b72b8de9ebeb4406037640b6e1b53 NFSv4: Fix a NULL pointer dereference in pnfs_mark_matching_lsegs_return() CVEs fixed in 5.10.43: CVE-2021-28691: 6b53db8c4c14b4e7256f058d202908b54a7b85b4 xen-netback: take a reference to the RX task thread @@ -154,10 +317,31 @@ CVEs fixed in 5.10.43: CVE-2021-3573: 74caf718cc7422a957aac381c73d798c0a999a65 Bluetooth: use correct lock to prevent UAF of hdev object CVE-2021-3587: 48ee0db61c8299022ec88c79ad137f290196cac2 nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect CVE-2021-38208: 48ee0db61c8299022ec88c79ad137f290196cac2 nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect + CVE-2021-47109: d17d47da59f726dc4c87caebda3a50333d7e2fd3 neighbour: allow NUD_NOARP entries to be forced GCed + CVE-2021-47110: 3b0becf8b1ecf642a9edaf4c9628ffc641e490d6 x86/kvm: Disable kvmclock on all CPUs on shutdown + CVE-2021-47111: 6b53db8c4c14b4e7256f058d202908b54a7b85b4 xen-netback: take a reference to the RX task thread + CVE-2021-47112: 38b858da1c58ad46519a257764e059e663b59ff2 x86/kvm: Teardown PV features on boot CPU as well + CVE-2021-47113: 0df50d47d17401f9f140dfbe752a65e5d72f9932 btrfs: abort in rename_exchange if we fail to insert the second ref + CVE-2021-47114: c8d5faee46242c3f33b8a71a4d7d52214785bfcc ocfs2: fix data corruption by fallocate + CVE-2021-47116: 2050c6e5b161e5e25ce3c420fef58b24fa388a49 ext4: fix memory leak in ext4_mb_init_backend on error path. + CVE-2021-47117: d3b668b96ad3192c0581a248ae2f596cd054792a ext4: fix bug on in ext4_es_cache_extent as ext4_split_extent_at failed + CVE-2021-47118: 7178be006d495ffb741c329012da289b62dddfe6 pid: take a reference when initializing `cad_pid` + CVE-2021-47120: b5d013c4c76b276890135b5d32803c4c63924b77 HID: magicmouse: fix NULL-deref on disconnect + CVE-2021-47121: 46403c1f80b0d3f937ff9c4f5edc63bb64bc5051 net: caif: fix memory leak in cfusbl_device_notify + CVE-2021-47122: af2806345a37313f01b1c9f15e046745b8ee2daa net: caif: fix memory leak in caif_device_notify + CVE-2021-47126: 09870235827451409ff546b073d754a19fd17e2e ipv6: Fix KASAN: slab-out-of-bounds Read in fib6_nh_flush_exceptions + CVE-2021-47128: ff5039ec75c83d2ed5b781dc7733420ee8c985fc bpf, lockdown, audit: Fix buggy SELinux lockdown permission checks + CVE-2021-47129: 5f3429c05e4028a0e241afdad856dd15dec2ffb9 netfilter: nft_ct: skip expectations for confirmed conntrack + CVE-2021-47130: c440cd080761b18a52cac20f2a42e5da1e3995af nvmet: fix freeing unallocated p2pmem + CVE-2021-47131: f1d4184f128dede82a59a841658ed40d4e6d3aa2 net/tls: Fix use-after-free after the TLS device goes down and up + CVE-2021-47134: 5148066edbdc89c6fe5bc419c31a5c22e5f83bdb efi/fdt: fix panic when no valid fdt found CVEs fixed in 5.10.44: CVE-2021-38198: 6b6ff4d1f349cb35a7c7d2057819af1b14f80437 KVM: X86: MMU: Use the correct inherited permissions to get shadow page +CVEs fixed in 5.10.45: + CVE-2021-46906: b1e3596416d74ce95cc0b7b38472329a3818f8a9 HID: usbhid: fix info leak in hid_submit_ctrl + CVEs fixed in 5.10.46: CVE-2021-33624: e9d271731d21647f8f9e9a261582cf47b868589a bpf: Inherit expanded/patched seen count from old aux data CVE-2021-34693: acb755be1f7adb204dcedc4d3b204ef098628623 can: bcm: fix infoleak in struct bcm_msg_head @@ -177,6 +361,7 @@ CVEs fixed in 5.10.50: CVEs fixed in 5.10.51: CVE-2021-3655: d4dbef7046e24669278eba4455e9e8053ead6ba0 sctp: validate from_addr_param return CVE-2021-45485: 8f939b79579715b195dc3ad36669707fce6853ee ipv6: use prandom_u32() for ID generation + CVE-2021-47119: 5e4f5138bd8522ebe231a137682d3857209a2c07 ext4: fix memory leak in ext4_fill_super CVE-2023-28772: f9fb4986f4d81182f938d16beb4f983fe71212aa seq_buf: Fix overflow in seq_buf_putmem_hex() CVEs fixed in 5.10.52: @@ -197,6 +382,7 @@ CVEs fixed in 5.10.54: CVEs fixed in 5.10.55: CVE-2021-0920: 93c5951e0ce137e994237c19cd75a7caa1f80543 af_unix: fix garbage collect vs MSG_PEEK + CVE-2021-47124: 6f5d7a45f58d3abe3a936de1441b8d6318f978ff io_uring: fix link timeout refs CVEs fixed in 5.10.56: CVE-2021-34556: bea9e2fd180892eba2574711b05b794f1d0e7b73 bpf: Introduce BPF nospec instruction for mitigating Spectre v4 @@ -226,6 +412,7 @@ CVEs fixed in 5.10.63: CVEs fixed in 5.10.64: CVE-2021-46283: 36983fc2f87ea3b74a33bf460c9ee7329735b7b5 netfilter: nf_tables: initialize set before expression setup + CVE-2021-46913: e51ff3ffc316377cca21de8b80404eed0c37b3c3 netfilter: nftables: clone set element expression template CVE-2022-20141: ddd7e8b7b84836c584a284b98ca9bd7a348a0558 igmp: Add ip_mc_list lock in ip_check_mc_rcu CVEs fixed in 5.10.65: @@ -310,9 +497,27 @@ CVEs fixed in 5.10.88: CVEs fixed in 5.10.89: CVE-2021-44733: c05d8f66ec3470e5212c4d08c46d6cb5738d600d tee: handle lookup of shm with reference count 0 CVE-2021-45469: fffb6581a23add416239dfcf7e7f3980c6b913da f2fs: fix to do sanity check on last xattr entry in __f2fs_setxattr() + CVE-2021-47083: 441d3873664d170982922c5d2fc01fa89d9439ed pinctrl: mediatek: fix global-out-of-bounds issue + CVE-2021-47086: 52ad5da8e316fa11e3a50b3f089aa63e4089bf52 phonet/pep: refuse to enable an unbound pipe + CVE-2021-47090: 1f207076740101fed87074a6bc924dbe806f08a5 mm/hwpoison: clear MF_COUNT_INCREASED before retrying get_any_page() + CVE-2021-47091: ac61b9c6c0549aaeb98194cf429d93c41bfe5f79 mac80211: fix locking in ieee80211_start_ap error path + CVE-2021-47093: 7a37f2e370699e2feca3dca6c8178c71ceee7e8a platform/x86: intel_pmc_core: fix memleak on registration failure + CVE-2021-47095: 1f6ab847461ce7dd89ae9db2dd4658c993355d7c ipmi: ssif: initialize ssif_info->client early + CVE-2021-47100: 6809da5185141e61401da5b01896b79a4deed1ad ipmi: Fix UAF when uninstall ipmi_si and ipmi_msghandler module CVE-2022-1195: 7dd52af1eb5798f590d9d9e1c56ed8f5744ee0ca hamradio: improve the incomplete fix to avoid NPD CVEs fixed in 5.10.90: + CVE-2021-46924: e553265ea56482da5700f56319fda9ff53e7dcb4 NFC: st21nfca: Fix memory leak in device probe and remove + CVE-2021-46925: e8a5988a85c719ce7205cb00dcf0716dcf611332 net/smc: fix kernel panic caused by race of smc_sock + CVE-2021-46928: d01e9ce1af6116f812491d3d3873d204f10ae0b8 parisc: Clear stale IIR value on instruction access rights trap + CVE-2021-46929: 769d14abd35e0e153b5149c3e1e989a9d719e3ff sctp: use call_rcu to free endpoint + CVE-2021-46930: 3b6efe0b7ba03cc2acf0694b46d6ff33c5b4c295 usb: mtu3: fix list_head check warning + CVE-2021-46931: 73665165b64a8f3c5b3534009a69be55bb744f05 net/mlx5e: Wrap the tx reporter dump callback to extract the sq + CVE-2021-46932: 9f329d0d6c91142cf0ad08d23c72dd195db2633c Input: appletouch - initialize work before device registration + CVE-2021-46933: 1c4ace3e6b8575745c50dca9e76e0021e697d645 usb: gadget: f_fs: Clear ffs_eventfd in ffs_data_clear. + CVE-2021-46934: 8d31cbab4c295d7010ebb729e9d02d0e9cece18f i2c: validate user data in compat ioctl + CVE-2021-46935: 1cb8444f3114f0bb2f6e3bcadcf09aa4a28425d4 binder: fix async_free_space accounting for empty parcels + CVE-2021-46936: 2386e81a1d277f540e1285565c9d41d531bb69d4 net: fix use-after-free in tw_timer_handler CVE-2022-20154: 769d14abd35e0e153b5149c3e1e989a9d719e3ff sctp: use call_rcu to free endpoint CVE-2023-23006: 4cd1da02f0c39606e3378c9255f17d6f85d106c7 net/mlx5: DR, Fix NULL vs IS_ERR checking in dr_domain_init_resources @@ -348,6 +553,7 @@ CVEs fixed in 5.10.100: CVE-2022-0435: 3c7e5943553594f68bbc070683db6bb6f6e9e78e tipc: improve size validations for received domain records CVE-2022-0487: be93028d306dac9f5b59ebebd9ec7abcfc69c156 moxart: fix potential use-after-free on remove path CVE-2022-0516: b62267b8b06e9b8bb429ae8f962ee431e6535d60 KVM: s390: Return error on SIDA memop on normal guest + CVE-2022-48626: be93028d306dac9f5b59ebebd9ec7abcfc69c156 moxart: fix potential use-after-free on remove path CVEs fixed in 5.10.101: CVE-2022-25258: 22ec1004728548598f4f5b4a079a7873409eacfd USB: gadget: validate interface OS descriptor requests @@ -390,6 +596,7 @@ CVEs fixed in 5.10.108: CVE-2022-20368: 70b7b3c055fd4a464da8da55ff4c1f84269f9b02 net/packet: fix slab-out-of-bounds access in packet_recvmsg() CVE-2022-27666: 9248694dac20eda06e22d8503364dc9d03df4e2f esp: Fix possible buffer overflow in ESP transformation CVE-2022-3107: 9b763ceda6f8963cc99df5772540c54ba46ba37c hv_netvsc: Add check for kvmalloc_array + CVE-2022-48629: 0f9b7b8df17525e464294c916acc8194ce38446b crypto: qcom-rng - ensure buffer for generate is completely filled CVEs fixed in 5.10.109: CVE-2022-1016: 2c74374c2e88c7b7992bf808d9f9391f7452f9d9 netfilter: nf_tables: initialize registers in nft_do_chain() @@ -507,6 +714,7 @@ CVEs fixed in 5.10.130: CVEs fixed in 5.10.132: CVE-2022-36123: 136d7987fcfdeca73ee3c6a29e48f99fdd0f4d87 x86: Clear .brk area at early boot + CVE-2022-48627: bfee93c9a6c395f9aa62268f1cedf64999844926 vt: fix memory overlapping when deleting chars in the buffer CVEs fixed in 5.10.133: CVE-2022-23816: 7070bbb66c5303117e4c7651711ea7daae4c64b5 x86/kvm/vmx: Make noinstr clean @@ -524,10 +732,12 @@ CVEs fixed in 5.10.135: CVE-2023-2177: 6f3505588d66b27220f07d0cab18da380fae2e2d sctp: leave the err path free in sctp_stream_init to sctp_stream_free CVEs fixed in 5.10.136: + CVE-2021-47082: a01a4e9f5dc93335c716fa4023b1901956e8c904 tun: avoid double free in tun_free_netdev CVE-2022-26373: 509c2c9fe75ea7493eebbb6bb2f711f37530ae19 x86/speculation: Add RSB VM Exit protections CVE-2022-4744: a01a4e9f5dc93335c716fa4023b1901956e8c904 tun: avoid double free in tun_free_netdev CVEs fixed in 5.10.137: + CVE-2019-25162: 81cb31756888bb062e92d2dca21cd629d77a46a9 i2c: Fix a potential use after free CVE-2022-1679: eccd7c3e2596b574241a7670b5b53f5322f470e5 ath9k: fix use-after-free in ath9k_hif_usb_rx_cb CVE-2022-20422: 353b4673d01c512303c45cf2346f630cda73b5c9 arm64: fix oops in concurrently setting insn_emulation sysctls CVE-2022-2153: ac7de8c2ba1292856fdd4a4c0764669b9607cf0a KVM: x86: Avoid theoretical NULL pointer dereference in kvm_irq_delivery_to_apic_fast() @@ -588,6 +798,7 @@ CVEs fixed in 5.10.149: CVE-2022-42719: 31ce5da48a845bac48930bbde1d45e7449591728 wifi: mac80211: fix MBSSID parsing use-after-free CVEs fixed in 5.10.150: + CVE-2021-47103: f039b43cbaea5e0700980c2f0052da05a70782e0 inet: fully convert sk->sk_rx_dst to RCU rules CVE-2022-2602: c378c479c5175833bb22ff71974cda47d7b05401 io_uring/af_unix: defer registered files gc to io_uring release CVE-2022-3535: 29f50bcf0f8b9e49c3c9b0e08fcae2ec3a88cc9f net: mvpp2: fix mvpp2 debugfs leak CVE-2022-3542: 6cc0e2afc6a137d45b9523f61a1b1b16a68c9dc0 bnx2x: fix potential memory leak in bnx2x_tpa_stop() @@ -741,6 +952,7 @@ CVEs fixed in 5.10.180: CVE-2023-35824: e9d64e90a0ada4d00ac6562e351ef10ae7d9b911 media: dm1105: Fix use after free bug in dm1105_remove due to race condition CVE-2023-35828: 36c237b202a406ba441892eabcf44e60dae7ad73 usb: gadget: udc: renesas_usb3: Fix use after free bug in renesas_usb3_remove due to race condition CVE-2023-35829: de19d02d734ef29f5dbd2c12fe810fa960ecd83f media: rkvdec: fix use after free bug in rkvdec_remove + CVE-2023-52474: 9c4c6512d7330b743c4ffd18bd999a86ca26db0d IB/hfi1: Fix bugs with non-PAGE_SIZE-end multi-iovec user SDMA requests CVE-2024-0775: 37c69da3adc45fc34df0b8d07a158a6fa5b2a3f7 ext4: improve error recovery code paths in __ext4_remount() CVEs fixed in 5.10.181: @@ -804,6 +1016,7 @@ CVEs fixed in 5.10.192: CVE-2023-39194: 7e50815d29037e08d3d26f3ebc41bcec729847b7 net: xfrm: Fix xfrm_address_filter OOB read CVE-2023-51042: b870b9a47fdba29bd6828f690e4817c950fa3430 drm/amdgpu: Fix potential fence use-after-free v2 CVE-2023-6546: 869ce5e5984595bd2c62b598d977debc218b6f4d tty: n_gsm: fix the UAF caused by race condition in gsm_cleanup_mux + CVE-2024-23196: 9f9eed451176ffcac6b5ba0f6dae1a6b4a1cb0eb ALSA: hda: fix a possible null-pointer dereference due to data race in snd_hdac_regmap_sync() CVEs fixed in 5.10.193: CVE-2022-36402: 8735d1c66c7cf54e7b265a2911891f75674db342 drm/vmwgfx: Fix shader stage validation @@ -830,12 +1043,34 @@ CVEs fixed in 5.10.198: CVE-2023-4563: b15ea4017af82011dd55225ce77cce3d4dfc169c netfilter: nf_tables: don't skip expired elements during walk CVE-2023-4881: a7d86a77c33ba1c357a7504341172cc1507f0698 netfilter: nftables: exthdr: fix 4-byte stack OOB write CVE-2023-5197: 5a03b42ae1ed646eb5f5acceff1fb2b1d85ec077 netfilter: nf_tables: disallow rule removal from chain binding + CVE-2023-52500: 2afd8fcee0c4d65a482e30c3ad2a92c25e5e92d4 scsi: pm80xx: Avoid leaking tags when processing OPC_INB_SET_CONTROLLER_CONFIG command + CVE-2023-52501: cee5151c5410e868826b8afecfb356f3799ebea3 ring-buffer: Do not attempt to read past "commit" + CVE-2023-52513: 0d520cdb0cd095eac5d00078dfd318408c9b5eed RDMA/siw: Fix connection failure handling + CVE-2023-52516: c79300599923daaa30f417c75555d5566b3d31ae dma-debug: don't call __dma_entry_alloc_check_leak() under free_entries_lock + CVE-2023-52522: 2ea52a2fb8e87067e26bbab4efb8872639240eb0 net: fix possible store tearing in neigh_periodic_work() + CVE-2023-52527: 96b2e1090397217839fcd6c9b6d8f5d439e705ed ipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data() + CVE-2023-52528: 30bc4d7aebe33904b0f2d3aad4b4a9c6029ad0c5 net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg + CVE-2023-52566: 7130a87ca32396eb9bf48b71a2d42259ae44c6c7 nilfs2: fix potential use after free in nilfs_gccache_submit_read_data() + CVE-2023-52573: f515112e833791001aaa8ab886af3ca78503617f net: rds: Fix possible NULL-pointer dereference + CVE-2023-52574: b44dd92e2afd89eb6e9d27616858e72a67bdc1a7 team: fix null-ptr-deref when team device type is changed + CVE-2023-52578: 04cc361f029c14dd067ad180525c7392334c9bfd net: bridge: use DEV_STATS_INC() + CVE-2023-52628: a7d86a77c33ba1c357a7504341172cc1507f0698 netfilter: nftables: exthdr: fix 4-byte stack OOB write CVE-2024-0641: 6a24d0661fa389c241d935da38e0f6a5ee8eb1ae tipc: fix a potential deadlock on &tx->lock CVEs fixed in 5.10.199: CVE-2023-35827: db9aafa19547833240f58c2998aed7baf414dc82 ravb: Fix use-after-free issue in ravb_tx_timeout_work() CVE-2023-46343: c95fa5b20fe03609e0894656fa43c18045b5097e nfc: nci: fix possible NULL pointer dereference in send_acknowledge() CVE-2023-46813: 6550cbe25de182f6c0176909a90b324cb375133f x86/sev: Check for user-space IOIO pointing to kernel space + CVE-2023-52475: cd2fbfd8b922b7fdd50732e47d797754ab59cb06 Input: powermate - fix use-after-free in powermate_config_complete + CVE-2023-52477: 241f230324337ed5eae3846a554fb6d15169872c usb: hub: Guard against accesses to uninitialized BOS descriptors + CVE-2023-52478: 093af62c023537f097d2ebdfaa0bc7c1a6e874e1 HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect + CVE-2023-52502: 6ac22ecdaad2ecc662048f8c6b0ceb1ca0699ef9 net: nfc: fix races in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn() + CVE-2023-52503: da7ce52a2f6c468946195b116615297d3d113a27 tee: amdtee: fix use-after-free vulnerability in amdtee_close_session + CVE-2023-52504: 6788b10620ca6e98575d1e06e72a8974aad7657e x86/alternatives: Disable KASAN in apply_alternatives() + CVE-2023-52507: a424807d860ba816aaafc3064b46b456361c0802 nfc: nci: assert requested protocol is valid + CVE-2023-52509: db9aafa19547833240f58c2998aed7baf414dc82 ravb: Fix use-after-free issue in ravb_tx_timeout_work() + CVE-2023-52510: 55e06850c7894f00d41b767c5f5665459f83f58f ieee802154: ca8210: Fix a potential UAF in ca8210_probe + CVE-2023-52515: 26788a5b48d9d5cd3283d777d238631c8cd7495a RDMA/srp: Do not call scsi_done() from srp_abort() CVE-2023-5717: 487a8e24643a0effb2ba19cad3227fc75dc3c4b7 perf: Disallow mis-matched inherited group reads CVEs fixed in 5.10.200: @@ -882,18 +1117,56 @@ CVEs fixed in 5.10.209: CVE-2023-52451: b582aa1f66411d4adcc1aa55b8c575683fb4687e powerpc/pseries/memhp: Fix access beyond end of drmem array CVE-2023-52454: f775f2621c2ac5cc3a0b3a64665dad4fb146e510 nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length CVE-2023-52456: 6e04a9d30509fb53ba6df5d655ed61d607a7cfda serial: imx: fix tx statemachine deadlock - CVE-2023-52457: bc57f3ef8a9eb0180606696f586a6dcfaa175ed0 serial: 8250: omap: Don't skip resource freeing if pm_runtime_resume_and_get() failed CVE-2023-52463: 94c742324ed7e42c5bd6a9ed22e4ec6d764db4d8 efivarfs: force RO when remounting if SetVariable is not supported CVE-2023-52464: 6aa7865ba7ff7f0ede0035180fb3b9400ceb405a EDAC/thunderx: Fix possible out-of-bounds string access + CVE-2023-52467: 927626a2073887ee30ba00633260d4d203f8e875 mfd: syscon: Fix null pointer dereference in of_syscon_register() + CVE-2023-52469: 520e213a0b97b64735a13950e9371e0a5d7a5dc3 drivers/amd/pm: fix a use-after-free in kv_parse_power_table + CVE-2023-52470: 57ca7984806d79b38af528de88fd803babf27feb drm/radeon: check the alloc_workqueue return value in radeon_crtc_init() + CVE-2023-52609: 7e7a0d86542b0ea903006d3f42f33c4f7ead6918 binder: fix race between mmput() and do_exit() + CVE-2023-52612: 4518dc468cdd796757190515a9be7408adc8911e crypto: scomp - fix req->dst buffer overflow + CVE-2023-6356: f775f2621c2ac5cc3a0b3a64665dad4fb146e510 nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length + CVE-2023-6536: 39669fae69f302961d89f38d969c6fcc1d07eb02 nvmet-tcp: fix a crash in nvmet_req_complete() CVE-2023-6915: dbf8b0d9387fa02de0aa047ce23eb3a7bd134e03 ida: Fix crash in ida_free when the bitmap is empty CVE-2024-24860: 394c6c0b6d9bdd7d6ebca35ca9cfbabf44c0c257 Bluetooth: Fix atomicity violation in {min,max}_key_size_set CVE-2024-26586: 56750ea5d15426b5f307554e7699e8b5f76c3182 mlxsw: spectrum_acl_tcam: Fix stack corruption CVE-2024-26597: 2295c22348faf795e1ccdf618f6eb7afdb2f7447 net: qualcomm: rmnet: fix global oob in rmnet_policy CVE-2024-26598: ba7be666740847d967822bed15500656b26bc703 KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache + CVE-2024-26633: da23bd709b46168f7dfc36055801011222b076cd ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim() CVEs fixed in 5.10.210: CVE-2023-52429: a891a0621e725e85529985139cada8cb5a74a116 dm: limit the number of targets and parameter size area CVE-2023-52435: 8f8f185643747fbb448de6aab0efa51c679909a3 net: prevent mss overflow in skb_segment() + CVE-2023-52486: f55261469be87c55df13db76dc945f6bcd825105 drm: Don't unref the same fb many times by mistake due to deadlock handling + CVE-2023-52489: 90ad17575d26874287271127d43ef3c2af876cea mm/sparsemem: fix race in accessing memory_section->usage + CVE-2023-52491: 43872f44eee6c6781fea1348b38885d8e78face9 media: mtk-jpeg: Fix use after free bug due to error path handling in mtk_jpeg_dec_device_run + CVE-2023-52492: 9de69732dde4e443c1c7f89acbbed2c45a6a8e17 dmaengine: fix NULL pointer in channel unregistration function + CVE-2023-52493: 20a6dea2d1c68d4e03c6bb50bc12e72e226b5c0e bus: mhi: host: Drop chan lock before queuing buffers + CVE-2023-52498: f46eb832389f162ad13cb780d0b8cde93641990d PM: sleep: Fix possible deadlocks in core system-wide PM code + CVE-2023-52583: e016e358461b89b231626fcf78c5c38e35c44fd3 ceph: fix deadlock or deadcode of misusing dget() + CVE-2023-52587: ac2630fd3c90ffec34a0bfc4d413668538b0e8f2 IB/ipoib: Fix mcast list locking + CVE-2023-52594: 84770a996ad8d7f121ff2fb5a8d149aad52d64c1 wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus() + CVE-2023-52595: 69e905beca193125820c201ab3db4fb0e245124e wifi: rt2x00: restart beacon queue when hardware reset + CVE-2023-52597: 150a3a3871490e8c454ffbac2e60abeafcecff99 KVM: s390: fix setting of fpc register + CVE-2023-52598: 856caf2730ea18cb39e95833719c02a02447dc0a s390/ptrace: handle setting of fpc register correctly + CVE-2023-52599: e2b77d107b33bb31c8b1f5c4cb8f277b23728f1e jfs: fix array-index-out-of-bounds in diNewExt + CVE-2023-52600: bc6ef64dbe71136f327d63b2b9071b828af2c2a8 jfs: fix uaf in jfs_evict_inode + CVE-2023-52601: 2037cb9d95f1741885f7daf50e8a028c4ade5317 jfs: fix array-index-out-of-bounds in dbAdjTree + CVE-2023-52602: 1c40ca3d39d769931b28295b3145c25f1decf5a6 jfs: fix slab-out-of-bounds Read in dtSearch + CVE-2023-52603: 7aa33854477d9c346f5560a1a1fcb3fe7783e2a8 UBSAN: array-index-out-of-bounds in dtSplitRoot + CVE-2023-52604: de34de6e57bbbc868e4fcf9e98c76b3587cabb0b FS:JFS:UBSAN:array-index-out-of-bounds in dbAdjTree + CVE-2023-52606: beee482cc4c9a6b1dcffb2e190b4fd8782258678 powerpc/lib: Validate size for vector operations + CVE-2023-52607: aa28eecb43cac6e20ef14dfc50b8892c1fbcda5b powerpc/mm: Fix null-pointer dereference in pgtable_cache_add + CVE-2023-52615: c6a8111aacbfe7a8a70f46cc0de8eed00561693c hwrng: core - Fix page fault dead lock on mmap-ed hwrng + CVE-2023-52616: 0c3687822259a7628c85cd21a3445cbe3c367165 crypto: lib/mpi - Fix unexpected pointer access in mpi_ec_init + CVE-2023-52617: 4a5d0528cf19dbf060313dffbe047bc11c90c24c PCI: switchtec: Fix stdev_release() crash after surprise hot remove + CVE-2023-52618: 95bc866c11974d3e4a9d922275ea8127ff809cf7 block/rnbd-srv: Check for unlikely string overflow + CVE-2023-52619: a63e48cd835c34c38ef671d344cc029b1ea5bf10 pstore/ram: Fix crash when setting number of cpus to an odd number + CVE-2023-52622: cfbbb3199e71b63fc26cee0ebff327c47128a1e8 ext4: avoid online resizing failures due to oversized flex bg + CVE-2023-52623: c430e6bb43955c6bf573665fcebf31694925b9f7 SUNRPC: Fix a suspicious RCU usage warning + CVE-2023-52627: 1eba6f7ffa295a0eec098c107043074be7cc4ec5 iio: adc: ad7091r: Allow users to configure device events + CVE-2023-52630: 9f56f38331171c9a19754004f0664686d67ee48d blk-iocost: Fix an UBSAN shift-out-of-bounds warning + CVE-2023-52635: 3399cc7013e761fee9d6eec795e9b31ab0cbe475 PM / devfreq: Synchronize devfreq_monitor_[start/stop] + CVE-2023-52637: 978e50ef8c38dc71bd14d1b0143d554ff5d188ba can: j1939: Fix UAF in j1939_sk_match_filter during setsockopt(SO_J1939_FILTER) CVE-2024-0340: cda4ca038cafe016bd8dcac8cac83d771dfdcbf0 vhost: use kzalloc() instead of kmalloc() followed by memset() CVE-2024-0607: 9a865a11d6890d4a789db1eaafebdc8bd092b12c netfilter: nf_tables: fix pointer math issue in nft_byteorder_eval() CVE-2024-1086: 55a60251fa50d4e68175e36666b536a602ce4f6c netfilter: nf_tables: reject QUEUE/DROP verdict parameters @@ -902,6 +1175,92 @@ CVEs fixed in 5.10.210: CVE-2024-23850: 3f5d47eb163bceb1b9e613c9003bae5fefc0046f btrfs: do not ASSERT() if the newly created subvolume already got read CVE-2024-23851: a891a0621e725e85529985139cada8cb5a74a116 dm: limit the number of targets and parameter size area CVE-2024-26593: 7a14b8a477b88607d157c24aeb23e7389ec3319f i2c: i801: Fix block process call transactions + CVE-2024-26600: be3b82e4871ba00e9b5d0ede92d396d579d7b3b3 phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP + CVE-2024-26602: db896bbe4a9c67cee377e5f6a743350d3ae4acf6 sched/membarrier: reduce the ability to hammer on sys_membarrier + CVE-2024-26606: a423042052ec2bdbf1e552e621e6a768922363cc binder: signal epoll threads of self-work + CVE-2024-26610: 05dd9facfb9a1e056752c0901c6e86416037d15a wifi: iwlwifi: fix a memory corruption + CVE-2024-26614: bc99dcedd2f422d602516762b96c8ef1ae6b2882 tcp: make sure init the accept_queue's spinlocks once + CVE-2024-26615: 5fed92ca32eafbfae8b6bee8ca34cca71c6a8b6d net/smc: fix illegal rmb_desc access in SMC-D connection dump + CVE-2024-26625: d0b5b1f12429df3cd9751ab8b2f53729b77733b7 llc: call sock_orphan() at release time + CVE-2024-26627: f5944853f7a961fedc1227dc8f60393f8936d37c scsi: core: Move scsi_host_busy() out of host lock for waking up EH handler + CVE-2024-26635: 9ccdef19cf9497c2803b005369668feb91cacdfd llc: Drop support for ETH_P_TR_802_2. + CVE-2024-26636: 04f2a74b562f3a7498be0399309669f342793d8c llc: make llc_ui_sendmsg() more robust against bonding changes + CVE-2024-26640: f48bf9a83b1666d934247cb58a9887d7b3127b6f tcp: add sanity checks to rx zerocopy + CVE-2024-26641: a9bc32879a08f23cdb80a48c738017e39aea1080 ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv() + CVE-2024-26644: 2bdf872bcfe629a6202ffd6641615a8ed00e8464 btrfs: don't abort filesystem when attempting to snapshot deleted subvolume + CVE-2024-26645: ef70dfa0b1e5084f32635156c9a5c795352ad860 tracing: Ensure visibility when inserting an element into tracing_map + CVE-2024-26663: 19d7314f2fb9515bdaac9829d4d8eb34edd1fe95 tipc: Check the bearer type before calling tipc_udp_nl_bearer_add() + CVE-2024-26664: f0da068c75c20ffc5ba28243ff577531dc2af1fd hwmon: (coretemp) Fix out-of-bounds memory access + CVE-2024-26665: e77bf828f1ca1c47fcff58bdc26b60a9d3dfbe1d tunnels: fix out of bounds access when building IPv6 PMTU error + CVE-2024-26671: 7610ba1319253225a9ba8a9d28d472fc883b4e2f blk-mq: fix IO hang from sbitmap wakeup race + CVE-2024-26673: 65ee90efc928410c6f73b3d2e0afdd762652c09d netfilter: nft_ct: sanitize layer 3 and 4 protocol number in custom expectations + CVE-2024-26675: b06e067e93fa4b98acfd3a9f38a398ab91bbc58b ppp_async: limit MRU to 64K + CVE-2024-26679: 88081ba415224cf413101def4343d660f56d082b inet: read sk->sk_family once in inet_recv_error() + CVE-2024-26684: 2fc45a4631ac7837a5c497cb4f7e2115d950fc37 net: stmmac: xgmac: fix handling of DPP safety error for DMA channels + CVE-2024-26685: f3e4963566f58726d3265a727116a42b591f6596 nilfs2: fix potential bug in end_buffer_async_write + CVE-2024-26689: 8180d0c27b93a6eb60da1b08ea079e3926328214 ceph: prevent use-after-free in encode_cap_msg() + CVE-2024-26696: 98a4026b22ff440c7f47056481bcbbe442f607d6 nilfs2: fix hang in nilfs_lookup_dirty_data_buffers() + CVE-2024-26697: 364a66be2abdcd4fd426ffa44d9b8f40aafb3caa nilfs2: fix data corruption in dsync block recovery for small block sizes + CVE-2024-26698: 9ec807e7b6f5fcf9499f3baa69f254bb239a847f hv_netvsc: Fix race condition between netvsc_probe and netvsc_remove + CVE-2024-26702: 36a49290d7e6d554020057a409747a092b1d3b56 iio: magnetometer: rm3100: add boundary check for the value read from RM3100_REG_TMRC + CVE-2024-26704: d033a555d9a1cf53dbf3301af7199cc4a4c8f537 ext4: fix double-free of blocks due to wrong extents moved_len + CVE-2024-26707: 0d8011a878fdf96123bc0d6a12e2fe7ced5fddfb net: hsr: remove WARN_ONCE() in send_hsr_supervision_frame() + CVE-2024-26712: 230e89b5ad0a33f530a2a976b3e5e4385cb27882 powerpc/kasan: Fix addr error caused by page alignment + CVE-2024-26720: 81e7d2530d458548b90a5c5e76b77ad5e5d1c0df mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again + CVE-2024-26727: 3f5d47eb163bceb1b9e613c9003bae5fefc0046f btrfs: do not ASSERT() if the newly created subvolume already got read + CVE-2024-26808: 9489e214ea8f2a90345516016aa51f2db3a8cc2f netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain + +CVEs fixed in 5.10.211: + CVE-2023-52434: 13fb0fc4917621f3dfa285a27eaf7151d770b5e5 smb: client: fix potential OOBs in smb2_parse_contexts() + CVE-2023-52497: a0180e940cf1aefa7d516e20b259ad34f7a8b379 erofs: fix lz4 inplace decompression + CVE-2024-0565: b03c8099a738a04d2343547ae6a04e5f0f63d3fa smb: client: fix OOB in receive_encrypted_standard() + CVE-2024-26733: dbc9b22d0ed319b4e29034ce0a3fe32a3ee2c587 arp: Prevent overflow in arp_req_get(). + CVE-2024-26735: 65c38f23d10ff79feea1e5d50b76dc7af383c1e6 ipv6: sr: fix possible use-after-free and null-ptr-deref + CVE-2024-26736: d9b5e2b7a8196850383c70d099bfd39e81ab6637 afs: Increase buffer size in afs_update_volume_status() + CVE-2024-26743: 5639414a52a29336ffa1ede80a67c6d927acbc5a RDMA/qedr: Fix qedr_create_user_qp error flow + CVE-2024-26744: 5a5c039dac1b1b7ba3e91c791f4421052bf79b82 RDMA/srpt: Support specifying the srpt_service_guid parameter + CVE-2024-26747: e279bf8e51893e1fe160b3d8126ef2dd00f661e1 usb: roles: fix NULL pointer issue when put module's reference + CVE-2024-26748: 1e204a8e9eb514e22a6567fb340ebb47df3f3a48 usb: cdns3: fix memory double free when handle zero packet + CVE-2024-26749: b40328eea93c75a5645891408010141a0159f643 usb: cdns3: fixed memory use after free at cdns3_gadget_ep_disable() + CVE-2024-26751: 70d92abbe29692a3de8697ae082c60f2d21ab482 ARM: ep93xx: Add terminator to gpiod_lookup_table + CVE-2024-26752: dcb4d14268595065c85dc5528056713928e17243 l2tp: pass correct message length to ip6_append_data + CVE-2024-26754: 2e534fd15e5c2ca15821c897352cf0e8a3e30dca gtp: fix use-after-free and null-ptr-deref in gtp_genl_dump_pdp() + CVE-2024-26763: 3c652f6fa1e1f9f02c3fbf359d260ad153ec5f90 dm-crypt: don't modify the data when using authenticated encryption + CVE-2024-26764: ea1cd64d59f22d6d13f367d62ec6e27b9344695f fs/aio: Restrict kiocb_set_cancel_fn() to I/O submitted via libaio + CVE-2024-26766: 3f38d22e645e2e994979426ea5a35186102ff3c2 IB/hfi1: Fix sdma.h tx->num_descs off-by-one error + CVE-2024-26771: c432094aa7c9970f2fa10d2305d550d3810657ce dmaengine: ti: edma: Add some null pointer checks to the edma_probe + CVE-2024-26772: ffeb72a80a82aba59a6774b0611f792e0ed3b0b7 ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal() + CVE-2024-26773: 927794a02169778c9c2e7b25c768ab3ea8c1dc03 ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found() + CVE-2024-26776: e94da8aca2e78ef9ecca02eb211869eacd5504e5 spi: hisi-sfc-v3xx: Return IRQ_NONE if no interrupts were detected + CVE-2024-26777: cd36da760bd1f78c63c7078407baf01dd724f313 fbdev: sis: Error out if pixclock equals zero + CVE-2024-26778: 512ee6d6041e007ef5bf200c6e388e172a2c5b24 fbdev: savage: Error out if pixclock equals zero + CVE-2024-26779: 5ffab99e070b9f8ae0cf60c3c3602b84eee818dd wifi: mac80211: fix race condition on enabling fast-xmit + +CVEs fixed in 5.10.212: + CVE-2024-0841: 80d852299987a8037be145a94f41874228f1a773 fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super + CVE-2024-26622: a23ac1788e2c828c097119e9a3178f0b7e503fee tomoyo: fix UAF write bug in tomoyo_write_control() + CVE-2024-26688: 80d852299987a8037be145a94f41874228f1a773 fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super + CVE-2024-26782: f74362a004225df935863dea6eb7d82daaa5b16e mptcp: fix double-free on socket dismantle + CVE-2024-26788: 9579a21e99fe8dab22a253050ddff28d340d74e1 dmaengine: fsl-qdma: init irq after reg initialization + CVE-2024-26790: bb3a06e9b9a30e33d96aadc0e077be095a4f8580 dmaengine: fsl-qdma: fix SoC may hang on 16 byte unaligned read + CVE-2024-26791: 2886fe308a83968dde252302884a1e63351cf16d btrfs: dev-replace: properly validate device names + CVE-2024-26793: e668b92a3a01429923fd5ca13e99642aab47de69 gtp: fix use-after-free and null-ptr-deref in gtp_newlink() + CVE-2024-26795: 8af1c121b0102041809bc137ec600d1865eaeedd riscv: Sparse-Memory/vmemmap out-of-bounds fix + CVE-2024-26801: 6dd0a9dfa99f8990a08eb8fdd8e79bee31c7d8e2 Bluetooth: Avoid potential use-after-free in hci_error_reset + CVE-2024-26804: 2e95350fe9db9d53c701075060ac8ac883b68aee net: ip_tunnel: prevent perpetual headroom growth + CVE-2024-26805: f19d1f98e60e68b11fc60839105dd02a30ec0d77 netlink: Fix kernel-infoleak-after-free in __skb_datagram_iter + +CVEs fixed in 5.10.213: + CVE-2024-26659: 696e4112e5c1ee61996198f0ebb6ca3fab55166e xhci: handle isoc Babble and Buffer Overrun events properly + CVE-2024-26787: 0224cbc53ba82b84affa7619b6d1b1a254bc2c53 mmc: mmci: stm32: fix DMA API overlapping mappings warning + +CVEs fixed in 5.10.214: + CVE-2023-52447: 90c445799fd1dc214d7c6279c144e33a35e29ef2 bpf: Defer the free of inner map when necessary + CVE-2023-6270: faf0b4c5e00bb680e8e43ac936df24d3f48c8e65 aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts + CVE-2023-7042: e1dc7aa814a95aeeb1b2c05be2b62af8423b15cc wifi: ath10k: fix NULL pointer dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev() + CVE-2024-22099: 81d7d920a22fd58ef9aedb1bd0a68ee32bd23e96 Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security + CVE-2024-26651: 6b4a39acafaf0186ed8e97c16e0aa6fca0e52009 sr9800: Add check for usbnet_get_endpoints + CVE-2024-26809: b36b83297ff4910dfc8705402c8abffd4bbf8144 netfilter: nft_set_pipapo: release elements in clone only from destroy path Outstanding CVEs: CVE-2005-3660: (unk) @@ -968,6 +1327,25 @@ Outstanding CVEs: CVE-2021-4023: (unk) io-wq: fix cancellation on create-worker failure CVE-2021-4150: (unk) block: fix incorrect references to disk objects CVE-2021-4204: (unk) bpf: Generalize check_ctx_reg for reuse with other types + CVE-2021-46926: (unk) ALSA: hda: intel-sdw-acpi: harden detection of controller + CVE-2021-46959: (unk) spi: Fix use-after-free with devm_spi_alloc_* + CVE-2021-46969: (unk) bus: mhi: core: Fix invalid error returning in mhi_queue + CVE-2021-46970: (unk) bus: mhi: pci_generic: Remove WQ_MEM_RECLAIM flag from state workqueue + CVE-2021-46987: (unk) btrfs: fix deadlock when cloning inline extents and using qgroups + CVE-2021-47014: (unk) net/sched: act_ct: fix wild memory access when clearing fragments + CVE-2021-47028: (unk) mt76: mt7915: fix txrate reporting + CVE-2021-47036: (unk) udp: skip L4 aggregation for UDP tunnel packets + CVE-2021-47037: (unk) ASoC: q6afe-clocks: fix reprobing of the driver + CVE-2021-47070: (unk) uio_hv_generic: Fix another memory leak in error handling paths + CVE-2021-47076: (unk) RDMA/rxe: Return CQE error if invalid lkey was supplied + CVE-2021-47094: (unk) KVM: x86/mmu: Don't advance iterator after restart due to yielding + CVE-2021-47101: (unk) asix: fix uninit-value in asix_mdio_read() + CVE-2021-47105: (unk) ice: xsk: return xsk buffers back to pool when cleaning the ring + CVE-2021-47125: (unk) sch_htb: fix refcount leak in htb_parent_to_leaf_offload + CVE-2021-47133: (unk) HID: amd_sfh: Fix memory leak in amd_sfh_work + CVE-2021-47135: (unk) mt76: mt7921: fix possible AOOB issue in mt7921_mcu_tx_rate_report + CVE-2021-47140: (unk) iommu/amd: Clear DMA ops when switching domain + CVE-2021-47147: (unk) ptp: ocp: Fix a resource leak in an error handling path CVE-2022-0382: (unk) net ticp:fix a kernel-infoleak in __tipc_sendmsg() CVE-2022-0400: (unk) CVE-2022-0480: (unk) memcg: enable accounting for file lock caches @@ -1016,6 +1394,7 @@ Outstanding CVEs: CVE-2022-45885: (unk) CVE-2022-4696: (unk) io_uring: remove any grabbing of context CVE-2022-47946: (unk) io_uring: kill sqo_dead and sqo submission halting + CVE-2022-48628: (unk) ceph: drop messages from MDS when unmounting CVE-2023-0386: (unk) ovl: fail on invalid uid/gid mapping at copy up CVE-2023-0597: (unk) x86/mm: Randomize per-cpu entry area CVE-2023-1075: (unk) net/tls: tls_is_tx_ready() checked list_entry @@ -1032,6 +1411,7 @@ Outstanding CVEs: CVE-2023-23039: (unk) CVE-2023-23586: (unk) io_uring: remove io_identity CVE-2023-26242: (unk) + CVE-2023-28746: (unk) x86/mmio: Disable KVM mitigation when X86_FEATURE_CLEAR_CPU_BUF is set CVE-2023-31081: (unk) CVE-2023-31082: (unk) CVE-2023-31083: (unk) Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO @@ -1044,35 +1424,74 @@ Outstanding CVEs: CVE-2023-4133: (unk) cxgb4: fix use after free bugs caused by circular dependency problem CVE-2023-4134: (unk) Input: cyttsp4_core - change del_timer_sync() to timer_shutdown_sync() CVE-2023-4622: (unk) unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES - CVE-2023-47233: (unk) + CVE-2023-47233: (unk) wifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach CVE-2023-50431: (unk) accel/habanalabs: fix information leak in sec_attest_info() - CVE-2023-52434: (unk) smb: client: fix potential OOBs in smb2_parse_contexts() CVE-2023-52442: (unk) ksmbd: validate session id and tree id in compound request - CVE-2023-52447: (unk) bpf: Defer the free of inner map when necessary CVE-2023-52458: (unk) block: add check that partition length needs to be aligned with block size + CVE-2023-52476: (unk) perf/x86/lbr: Filter vsyscall addresses + CVE-2023-52479: (unk) ksmbd: fix uaf in smb20_oplock_break_ack + CVE-2023-52480: (unk) ksmbd: fix race condition between session lookup and expire + CVE-2023-52481: (unk) arm64: errata: Add Cortex-A520 speculative unprivileged load workaround + CVE-2023-52482: (unk) x86/srso: Add SRSO mitigation for Hygon processors + CVE-2023-52484: (unk) iommu/arm-smmu-v3: Fix soft lockup triggered by arm_smmu_mm_invalidate_range + CVE-2023-52485: (unk) drm/amd/display: Wake DMCUB before sending a command + CVE-2023-52488: (unk) serial: sc16is7xx: convert from _raw_ to _noinc_ regmap functions for FIFO + CVE-2023-52506: (unk) LoongArch: Set all reserved memblocks on Node#0 at initialization + CVE-2023-52508: (unk) nvme-fc: Prevent null pointer dereference in nvme_fc_io_getuuid() + CVE-2023-52511: (unk) spi: sun6i: reduce DMA RX transfer width to single byte + CVE-2023-52517: (unk) spi: sun6i: fix race between DMA RX transfer completion and RX FIFO drain + CVE-2023-52519: (unk) HID: intel-ish-hid: ipc: Disable and reenable ACPI GPE bit + CVE-2023-52530: (unk) wifi: mac80211: fix potential key use-after-free + CVE-2023-52531: (unk) wifi: iwlwifi: mvm: Fix a memory corruption issue + CVE-2023-52532: (unk) net: mana: Fix TX CQE error handling + CVE-2023-52559: (unk) iommu/vt-d: Avoid memory allocation in iommu_suspend() + CVE-2023-52561: (unk) arm64: dts: qcom: sdm845-db845c: Mark cont splash memory region as reserved + CVE-2023-52563: (unk) drm/meson: fix memory leak on ->hpd_notify callback + CVE-2023-52565: (unk) media: uvcvideo: Fix OOB read + CVE-2023-52568: (unk) x86/sgx: Resolves SECS reclaim vs. page fault for EAUG race + CVE-2023-52569: (unk) btrfs: remove BUG() after failure to insert delayed dir index item + CVE-2023-52571: (unk) power: supply: rk817: Fix node refcount leak + CVE-2023-52572: (unk) cifs: Fix UAF in cifs_demultiplex_thread() + CVE-2023-52584: (unk) spmi: mediatek: Fix UAF on device remove + CVE-2023-52585: (unk) drm/amdgpu: Fix possible NULL dereference in amdgpu_ras_query_error_status_helper() + CVE-2023-52586: (unk) drm/msm/dpu: Add mutex lock in control vblank irq + CVE-2023-52588: (unk) f2fs: fix to tag gcing flag on page during block migration + CVE-2023-52589: (unk) media: rkisp1: Fix IRQ disable race issue + CVE-2023-52590: (unk) ocfs2: Avoid touching renamed directory if parent does not change + CVE-2023-52591: (unk) reiserfs: Avoid touching renamed directory if parent does not change + CVE-2023-52593: (unk) wifi: wfx: fix possible NULL pointer dereference in wfx_set_mfp_ap() + CVE-2023-52596: (unk) sysctl: Fix out of bounds access for empty sysctl registers + CVE-2023-52608: (unk) firmware: arm_scmi: Check mailbox/SMT channel for consistency + CVE-2023-52610: (unk) net/sched: act_ct: fix skb leak and crash on ooo frags + CVE-2023-52614: (unk) PM / devfreq: Fix buffer overflow in trans_stat_show + CVE-2023-52620: (unk) netfilter: nf_tables: disallow timeout for anonymous sets + CVE-2023-52621: (unk) bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers + CVE-2023-52624: (unk) drm/amd/display: Wake DMCUB before executing GPINT commands + CVE-2023-52625: (unk) drm/amd/display: Refactor DMCUB enter/exit idle interface + CVE-2023-52629: (unk) sh: push-switch: Reorder cleanup operations to avoid use-after-free bug + CVE-2023-52632: (unk) drm/amdkfd: Fix lock dependency warning with srcu + CVE-2023-52633: (unk) um: time-travel: fix time corruption + CVE-2023-52634: (unk) drm/amd/display: Fix disable_otg_wa logic + CVE-2023-52638: (unk) can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock + CVE-2023-52639: (unk) KVM: s390: vsie: fix race during shadow creation + CVE-2023-52640: (unk) fs/ntfs3: Fix oob in ntfs_listxattr + CVE-2023-52641: (unk) fs/ntfs3: Add NULL ptr dereference checking at the end of attr_allocate_frame() CVE-2023-6240: (unk) - CVE-2023-6270: (unk) - CVE-2023-6356: (unk) CVE-2023-6535: (unk) - CVE-2023-6536: (unk) CVE-2023-6560: (unk) io_uring: don't allow discontig pages for IORING_SETUP_NO_MMAP CVE-2023-6610: (unk) smb: client: fix potential OOB in smb2_dump_detail() - CVE-2023-7042: (unk) CVE-2024-0564: (unk) - CVE-2024-0565: (unk) smb: client: fix OOB in receive_encrypted_standard() - CVE-2024-0841: (unk) CVE-2024-1312: (unk) mm: lock_vma_under_rcu() must check vma->anon_vma under vma lock CVE-2024-21803: (unk) - CVE-2024-22099: (unk) + CVE-2024-2193: (unk) CVE-2024-22386: (unk) - CVE-2024-23196: (unk) - CVE-2024-23307: (unk) + CVE-2024-23307: (unk) md/raid5: fix atomicity violation in raid5_cache_count CVE-2024-23848: (unk) CVE-2024-24855: (unk) scsi: lpfc: Fix a possible data race in lpfc_unregister_fcf_rescan() CVE-2024-24857: (unk) CVE-2024-24858: (unk) CVE-2024-24859: (unk) - CVE-2024-24861: (unk) + CVE-2024-24861: (unk) media: xc4000: Fix atomicity violation in xc4000_get_frequency CVE-2024-24864: (unk) CVE-2024-25739: (unk) CVE-2024-25740: (unk) @@ -1081,10 +1500,59 @@ Outstanding CVEs: CVE-2024-26583: (unk) tls: fix race between async notify and socket close CVE-2024-26584: (unk) net: tls: handle backlogging of crypto requests CVE-2024-26585: (unk) tls: fix race between tx work scheduling and socket close - CVE-2024-26587: (unk) net: netdevsim: don't try to destroy PHC on VFs - CVE-2024-26588: (unk) LoongArch: BPF: Prevent out-of-bounds memory access CVE-2024-26589: (unk) bpf: Reject variable offset alu on PTR_TO_FLOW_KEYS - CVE-2024-26591: (unk) bpf: Fix re-attachment branch in bpf_tracing_prog_attach CVE-2024-26592: (unk) ksmbd: fix UAF issue in ksmbd_tcp_new_connection() CVE-2024-26594: (unk) ksmbd: validate mech token in session setup CVE-2024-26595: (unk) mlxsw: spectrum_acl_tcam: Fix NULL pointer dereference in error path + CVE-2024-26607: (unk) drm/bridge: sii902x: Fix probing race issue + CVE-2024-26623: (unk) pds_core: Prevent race issues involving the adminq + CVE-2024-26642: (unk) netfilter: nf_tables: disallow anonymous set with timeout flag + CVE-2024-26646: (unk) thermal: intel: hfi: Add syscore callbacks for system-wide PM + CVE-2024-26647: (unk) drm/amd/display: Fix late derefrence 'dsc' check in 'link_set_dsc_pps_packet()' + CVE-2024-26648: (unk) drm/amd/display: Fix variable deferencing before NULL check in edp_setup_replay() + CVE-2024-26650: (unk) platform/x86: p2sb: Allow p2sb_bar() calls during PCI device probe + CVE-2024-26654: (unk) ALSA: sh: aica: reorder cleanup operations to avoid UAF bugs + CVE-2024-26655: (unk) Fix memory leak in posix_clock_open() + CVE-2024-26656: (unk) drm/amdgpu: fix use-after-free bug + CVE-2024-26658: (unk) bcachefs: grab s_umount only if snapshotting + CVE-2024-26661: (unk) drm/amd/display: Add NULL test for 'timing generator' in 'dcn21_set_pipe()' + CVE-2024-26662: (unk) drm/amd/display: Fix 'panel_cntl' could be null in 'dcn21_set_backlight_level()' + CVE-2024-26668: (unk) netfilter: nft_limit: reject configurations that cause integer overflow + CVE-2024-26669: (unk) net/sched: flower: Fix chain template offload + CVE-2024-26672: (unk) drm/amdgpu: Fix variable 'mca_funcs' dereferenced before NULL check in 'amdgpu_mca_smu_get_mca_entry()' + CVE-2024-26676: (unk) af_unix: Call kfree_skb() for dead unix_(sk)->oob_skb in GC. + CVE-2024-26677: (unk) rxrpc: Fix delayed ACKs to not set the reference serial number + CVE-2024-26680: (unk) net: atlantic: Fix DMA mapping for PTP hwts ring + CVE-2024-26686: (unk) fs/proc: do_task_stat: use sig->stats_lock to gather the threads/children stats + CVE-2024-26687: (unk) xen/events: close evtchn after mapping cleanup + CVE-2024-26691: (unk) KVM: arm64: Fix circular locking dependency + CVE-2024-26699: (unk) drm/amd/display: Fix array-index-out-of-bounds in dcn35_clkmgr + CVE-2024-26700: (unk) drm/amd/display: Fix MST Null Ptr for RV + CVE-2024-26706: (unk) parisc: Fix random data corruption from exception handler + CVE-2024-26713: (unk) powerpc/pseries/iommu: Fix iommu initialisation during DLPAR add + CVE-2024-26715: (unk) usb: dwc3: gadget: Fix NULL pointer dereference in dwc3_gadget_suspend + CVE-2024-26718: (unk) dm-crypt, dm-verity: disable tasklets + CVE-2024-26719: (unk) nouveau: offload fence uevents work to workqueue + CVE-2024-26726: (unk) btrfs: don't drop extent_map for free space inode on write error + CVE-2024-26738: (unk) powerpc/pseries/iommu: DLPAR add doesn't completely initialize pci_controller + CVE-2024-26739: (unk) net/sched: act_mirred: don't override retval if we already lost the skb + CVE-2024-26740: (unk) net/sched: act_mirred: use the backlog for mirred ingress + CVE-2024-26745: (unk) powerpc/pseries/iommu: IOMMU table is not initialized for kdump over SR-IOV + CVE-2024-26756: (unk) md: Don't register sync_thread for reshape directly + CVE-2024-26757: (unk) md: Don't ignore read-only array in md_check_recovery() + CVE-2024-26758: (unk) md: Don't ignore suspended array in md_check_recovery() + CVE-2024-26759: (unk) mm/swap: fix race when skipping swapcache + CVE-2024-26765: (unk) LoongArch: Disable IRQ before init_fn() for nonboot CPUs + CVE-2024-26767: (unk) drm/amd/display: fixed integer types and null check locations + CVE-2024-26768: (unk) LoongArch: Change acpi_core_pic[NR_CPUS] to acpi_core_pic[MAX_CORE_PIC] + CVE-2024-26769: (unk) nvmet-fc: avoid deadlock on delete association path + CVE-2024-26770: (unk) HID: nvidia-shield: Add missing null pointer checks to LED initialization + CVE-2024-26774: (unk) ext4: avoid dividing by 0 in mb_update_avg_fragment_size() when block bitmap corrupt + CVE-2024-26775: (unk) aoe: avoid potential deadlock at set_capacity + CVE-2024-26784: (unk) pmdomain: arm: Fix NULL dereference on scmi_perf_domain removal + CVE-2024-26789: (unk) crypto: arm64/neonbs - fix out-of-bounds access on short input + CVE-2024-26797: (unk) drm/amd/display: Prevent potential buffer overflow in map_hw_resources + CVE-2024-26798: (unk) fbcon: always restore the old font data in fbcon_do_set_font() + CVE-2024-26802: (unk) stmmac: Clear variable when destroying workqueue + CVE-2024-26803: (unk) net: veth: clear GRO when clearing XDP even when down + CVE-2024-26806: (unk) spi: cadence-qspi: remove system-wide suspend helper calls from runtime PM hooks diff --git a/data/5.11/5.11_CVEs.txt b/data/5.11/5.11_CVEs.txt index ff8a5c18c..5e60f6242 100644 --- a/data/5.11/5.11_CVEs.txt +++ b/data/5.11/5.11_CVEs.txt @@ -27,6 +27,7 @@ CVE-2019-16089: Fix unknown CVE-2019-19378: Fix unknown CVE-2019-19814: Fix unknown CVE-2019-20794: Fix unknown +CVE-2019-25162: Fix not seen in stream CVE-2020-0347: Fix unknown CVE-2020-10708: Fix unknown CVE-2020-11725: Fix unknown @@ -64,6 +65,18 @@ CVE-2020-27171: Fixed with 5.11.8 CVE-2020-27820: Fix not seen in stream CVE-2020-35501: Fix unknown CVE-2020-36516: Fix not seen in stream +CVE-2020-36776: Fixed with 5.11.20 +CVE-2020-36777: Fixed with 5.11.20 +CVE-2020-36778: Fixed with 5.11.21 +CVE-2020-36779: Fixed with 5.11.21 +CVE-2020-36780: Fixed with 5.11.21 +CVE-2020-36781: Fixed with 5.11.21 +CVE-2020-36782: Fixed with 5.11.21 +CVE-2020-36783: Fixed with 5.11.21 +CVE-2020-36784: Fixed with 5.11.21 +CVE-2020-36785: Fixed with 5.11.21 +CVE-2020-36786: Fixed with 5.11.21 +CVE-2020-36787: Fixed with 5.11.21 CVE-2020-3702: Fix not seen in stream CVE-2021-0129: Fix not seen in stream CVE-2021-0399: Fix unknown @@ -238,6 +251,234 @@ CVE-2021-45485: Fix not seen in stream CVE-2021-45486: Fixed with 5.11.21 CVE-2021-45868: Fix not seen in stream CVE-2021-46283: Fix not seen in stream +CVE-2021-46904: Fixed with 5.11.14 +CVE-2021-46906: Fix not seen in stream +CVE-2021-46908: Fixed with 5.11.16 +CVE-2021-46909: Fixed with 5.11.16 +CVE-2021-46910: Fixed with 5.11.16 +CVE-2021-46911: Fixed with 5.11.16 +CVE-2021-46912: Fixed with 5.11.16 +CVE-2021-46913: Fixed with 5.11.16 +CVE-2021-46914: Fixed with 5.11.16 +CVE-2021-46915: Fixed with 5.11.16 +CVE-2021-46916: Fixed with 5.11.16 +CVE-2021-46917: Fixed with 5.11.16 +CVE-2021-46918: Fixed with 5.11.16 +CVE-2021-46919: Fixed with 5.11.16 +CVE-2021-46920: Fixed with 5.11.16 +CVE-2021-46921: Fixed with 5.11.17 +CVE-2021-46924: Fix not seen in stream +CVE-2021-46925: Fix not seen in stream +CVE-2021-46926: Fix not seen in stream +CVE-2021-46928: Fix not seen in stream +CVE-2021-46929: Fix not seen in stream +CVE-2021-46930: Fix not seen in stream +CVE-2021-46931: Fix not seen in stream +CVE-2021-46932: Fix not seen in stream +CVE-2021-46933: Fix not seen in stream +CVE-2021-46934: Fix not seen in stream +CVE-2021-46935: Fix not seen in stream +CVE-2021-46936: Fix not seen in stream +CVE-2021-46938: Fixed with 5.11.20 +CVE-2021-46939: Fixed with 5.11.20 +CVE-2021-46940: Fixed with 5.11.20 +CVE-2021-46941: Fixed with 5.11.20 +CVE-2021-46943: Fixed with 5.11.20 +CVE-2021-46944: Fixed with 5.11.20 +CVE-2021-46945: Fixed with 5.11.20 +CVE-2021-46948: Fixed with 5.11.20 +CVE-2021-46949: Fixed with 5.11.20 +CVE-2021-46950: Fixed with 5.11.20 +CVE-2021-46951: Fixed with 5.11.20 +CVE-2021-46952: Fixed with 5.11.20 +CVE-2021-46953: Fixed with 5.11.20 +CVE-2021-46954: Fixed with 5.11.20 +CVE-2021-46955: Fixed with 5.11.20 +CVE-2021-46956: Fixed with 5.11.20 +CVE-2021-46958: Fixed with 5.11.20 +CVE-2021-46959: Fix not seen in stream +CVE-2021-46960: Fixed with 5.11.20 +CVE-2021-46961: Fixed with 5.11.20 +CVE-2021-46962: Fixed with 5.11.20 +CVE-2021-46963: Fixed with 5.11.20 +CVE-2021-46964: Fixed with 5.11.20 +CVE-2021-46965: Fixed with 5.11.20 +CVE-2021-46966: Fixed with 5.11.20 +CVE-2021-46967: Fixed with 5.11.20 +CVE-2021-46968: Fixed with 5.11.20 +CVE-2021-46969: Fix not seen in stream +CVE-2021-46970: Fixed with 5.11.20 +CVE-2021-46971: Fixed with 5.11.19 +CVE-2021-46972: Fixed with 5.11.19 +CVE-2021-46973: Fixed with 5.11.19 +CVE-2021-46974: Fixed with 5.11.19 +CVE-2021-46976: Fixed with 5.11.22 +CVE-2021-46977: Fixed with 5.11.22 +CVE-2021-46978: Fixed with 5.11.22 +CVE-2021-46979: Fixed with 5.11.22 +CVE-2021-46980: Fixed with 5.11.22 +CVE-2021-46981: Fixed with 5.11.22 +CVE-2021-46982: Fixed with 5.11.22 +CVE-2021-46983: Fixed with 5.11.22 +CVE-2021-46984: Fixed with 5.11.22 +CVE-2021-46986: Fixed with 5.11.22 +CVE-2021-46987: Fixed with 5.11.22 +CVE-2021-46988: Fixed with 5.11.22 +CVE-2021-46989: Fixed with 5.11.22 +CVE-2021-46990: Fixed with 5.11.22 +CVE-2021-46991: Fixed with 5.11.22 +CVE-2021-46992: Fixed with 5.11.22 +CVE-2021-46993: Fixed with 5.11.22 +CVE-2021-46994: Fixed with 5.11.22 +CVE-2021-46996: Fixed with 5.11.22 +CVE-2021-46997: Fixed with 5.11.22 +CVE-2021-46998: Fixed with 5.11.22 +CVE-2021-46999: Fixed with 5.11.22 +CVE-2021-47000: Fixed with 5.11.22 +CVE-2021-47001: Fixed with 5.11.22 +CVE-2021-47002: Fixed with 5.11.22 +CVE-2021-47003: Fixed with 5.11.22 +CVE-2021-47004: Fixed with 5.11.22 +CVE-2021-47005: Fixed with 5.11.22 +CVE-2021-47006: Fixed with 5.11.22 +CVE-2021-47007: Fixed with 5.11.22 +CVE-2021-47008: Fixed with 5.11.22 +CVE-2021-47010: Fixed with 5.11.21 +CVE-2021-47011: Fixed with 5.11.21 +CVE-2021-47012: Fixed with 5.11.21 +CVE-2021-47013: Fixed with 5.11.21 +CVE-2021-47014: Fix not seen in stream +CVE-2021-47015: Fixed with 5.11.21 +CVE-2021-47016: Fixed with 5.11.21 +CVE-2021-47017: Fixed with 5.11.21 +CVE-2021-47018: Fixed with 5.11.21 +CVE-2021-47020: Fixed with 5.11.21 +CVE-2021-47023: Fixed with 5.11.21 +CVE-2021-47024: Fixed with 5.11.21 +CVE-2021-47026: Fixed with 5.11.21 +CVE-2021-47028: Fixed with 5.11.21 +CVE-2021-47032: Fixed with 5.11.21 +CVE-2021-47033: Fixed with 5.11.21 +CVE-2021-47034: Fixed with 5.11.21 +CVE-2021-47035: Fixed with 5.11.21 +CVE-2021-47036: Fix not seen in stream +CVE-2021-47037: Fixed with 5.11.21 +CVE-2021-47038: Fixed with 5.11.21 +CVE-2021-47039: Fixed with 5.11.21 +CVE-2021-47040: Fixed with 5.11.21 +CVE-2021-47041: Fixed with 5.11.21 +CVE-2021-47043: Fixed with 5.11.21 +CVE-2021-47044: Fixed with 5.11.21 +CVE-2021-47045: Fixed with 5.11.21 +CVE-2021-47046: Fixed with 5.11.21 +CVE-2021-47047: Fixed with 5.11.21 +CVE-2021-47048: Fixed with 5.11.21 +CVE-2021-47049: Fixed with 5.11.21 +CVE-2021-47050: Fixed with 5.11.21 +CVE-2021-47051: Fixed with 5.11.21 +CVE-2021-47052: Fixed with 5.11.21 +CVE-2021-47053: Fixed with 5.11.21 +CVE-2021-47054: Fixed with 5.11.21 +CVE-2021-47055: Fixed with 5.11.21 +CVE-2021-47056: Fixed with 5.11.21 +CVE-2021-47057: Fixed with 5.11.21 +CVE-2021-47058: Fixed with 5.11.21 +CVE-2021-47059: Fixed with 5.11.21 +CVE-2021-47060: Fixed with 5.11.21 +CVE-2021-47061: Fixed with 5.11.21 +CVE-2021-47062: Fixed with 5.11.21 +CVE-2021-47063: Fixed with 5.11.21 +CVE-2021-47064: Fixed with 5.11.21 +CVE-2021-47065: Fixed with 5.11.21 +CVE-2021-47066: Fixed with 5.11.21 +CVE-2021-47067: Fixed with 5.11.21 +CVE-2021-47069: Fix not seen in stream +CVE-2021-47070: Fix not seen in stream +CVE-2021-47071: Fix not seen in stream +CVE-2021-47073: Fix not seen in stream +CVE-2021-47074: Fix not seen in stream +CVE-2021-47075: Fix not seen in stream +CVE-2021-47076: Fix not seen in stream +CVE-2021-47077: Fix not seen in stream +CVE-2021-47078: Fix not seen in stream +CVE-2021-47080: Fix not seen in stream +CVE-2021-47082: Fix not seen in stream +CVE-2021-47083: Fix not seen in stream +CVE-2021-47086: Fix not seen in stream +CVE-2021-47090: Fix not seen in stream +CVE-2021-47091: Fix not seen in stream +CVE-2021-47093: Fix not seen in stream +CVE-2021-47094: Fix not seen in stream +CVE-2021-47095: Fix not seen in stream +CVE-2021-47097: Fix not seen in stream +CVE-2021-47100: Fix not seen in stream +CVE-2021-47101: Fix not seen in stream +CVE-2021-47103: Fix not seen in stream +CVE-2021-47105: Fix not seen in stream +CVE-2021-47109: Fix not seen in stream +CVE-2021-47110: Fix not seen in stream +CVE-2021-47111: Fix not seen in stream +CVE-2021-47112: Fix not seen in stream +CVE-2021-47113: Fix not seen in stream +CVE-2021-47114: Fix not seen in stream +CVE-2021-47116: Fix not seen in stream +CVE-2021-47117: Fix not seen in stream +CVE-2021-47118: Fix not seen in stream +CVE-2021-47119: Fix not seen in stream +CVE-2021-47120: Fix not seen in stream +CVE-2021-47121: Fix not seen in stream +CVE-2021-47122: Fix not seen in stream +CVE-2021-47123: Fix not seen in stream +CVE-2021-47124: Fix not seen in stream +CVE-2021-47125: Fix not seen in stream +CVE-2021-47126: Fix not seen in stream +CVE-2021-47128: Fix not seen in stream +CVE-2021-47129: Fix not seen in stream +CVE-2021-47130: Fix not seen in stream +CVE-2021-47131: Fix not seen in stream +CVE-2021-47133: Fix not seen in stream +CVE-2021-47134: Fix not seen in stream +CVE-2021-47135: Fix not seen in stream +CVE-2021-47136: Fix not seen in stream +CVE-2021-47137: Fix not seen in stream +CVE-2021-47138: Fix not seen in stream +CVE-2021-47139: Fix not seen in stream +CVE-2021-47140: Fix not seen in stream +CVE-2021-47141: Fix not seen in stream +CVE-2021-47142: Fix not seen in stream +CVE-2021-47143: Fix not seen in stream +CVE-2021-47144: Fix not seen in stream +CVE-2021-47145: Fix not seen in stream +CVE-2021-47146: Fix not seen in stream +CVE-2021-47147: Fix not seen in stream +CVE-2021-47149: Fix not seen in stream +CVE-2021-47150: Fix not seen in stream +CVE-2021-47151: Fix not seen in stream +CVE-2021-47152: Fix not seen in stream +CVE-2021-47153: Fix not seen in stream +CVE-2021-47158: Fix not seen in stream +CVE-2021-47159: Fix not seen in stream +CVE-2021-47160: Fix not seen in stream +CVE-2021-47161: Fix not seen in stream +CVE-2021-47162: Fix not seen in stream +CVE-2021-47163: Fix not seen in stream +CVE-2021-47164: Fix not seen in stream +CVE-2021-47165: Fix not seen in stream +CVE-2021-47166: Fix not seen in stream +CVE-2021-47167: Fix not seen in stream +CVE-2021-47168: Fix not seen in stream +CVE-2021-47169: Fix not seen in stream +CVE-2021-47170: Fix not seen in stream +CVE-2021-47171: Fix not seen in stream +CVE-2021-47172: Fix not seen in stream +CVE-2021-47173: Fix not seen in stream +CVE-2021-47174: Fix not seen in stream +CVE-2021-47175: Fix not seen in stream +CVE-2021-47176: Fix not seen in stream +CVE-2021-47177: Fix not seen in stream +CVE-2021-47178: Fix not seen in stream +CVE-2021-47179: Fix not seen in stream +CVE-2021-47180: Fix not seen in stream CVE-2022-0001: Fix not seen in stream CVE-2022-0002: Fix not seen in stream CVE-2022-0168: Fix not seen in stream @@ -492,6 +733,10 @@ CVE-2022-47521: Fix not seen in stream CVE-2022-47929: Fix not seen in stream CVE-2022-47946: Fix not seen in stream CVE-2022-48619: Fix not seen in stream +CVE-2022-48626: Fix not seen in stream +CVE-2022-48627: Fix not seen in stream +CVE-2022-48628: Fix not seen in stream +CVE-2022-48629: Fix not seen in stream CVE-2023-0045: Fix not seen in stream CVE-2023-0047: Fix not seen in stream CVE-2023-0160: Fix not seen in stream @@ -576,6 +821,7 @@ CVE-2023-28328: Fix not seen in stream CVE-2023-28410: Fix not seen in stream CVE-2023-28466: Fix not seen in stream CVE-2023-2860: Fix not seen in stream +CVE-2023-28746: Fix not seen in stream CVE-2023-28772: Fix not seen in stream CVE-2023-2898: Fix not seen in stream CVE-2023-2985: Fix not seen in stream @@ -670,7 +916,7 @@ CVE-2023-46343: Fix not seen in stream CVE-2023-46813: Fix not seen in stream CVE-2023-46838: Fix not seen in stream CVE-2023-46862: Fix not seen in stream -CVE-2023-47233: Fix unknown +CVE-2023-47233: Fix not seen in stream CVE-2023-4732: Fix not seen in stream CVE-2023-4881: Fix not seen in stream CVE-2023-4921: Fix not seen in stream @@ -699,19 +945,126 @@ CVE-2023-52449: Fix not seen in stream CVE-2023-52451: Fix not seen in stream CVE-2023-52454: Fix not seen in stream CVE-2023-52456: Fix not seen in stream -CVE-2023-52457: Fix not seen in stream CVE-2023-52458: Fix not seen in stream CVE-2023-52463: Fix not seen in stream CVE-2023-52464: Fix not seen in stream +CVE-2023-52467: Fix not seen in stream +CVE-2023-52469: Fix not seen in stream +CVE-2023-52470: Fix not seen in stream +CVE-2023-52474: Fix not seen in stream +CVE-2023-52475: Fix not seen in stream +CVE-2023-52476: Fix not seen in stream +CVE-2023-52477: Fix not seen in stream +CVE-2023-52478: Fix not seen in stream +CVE-2023-52479: Fix not seen in stream +CVE-2023-52480: Fix not seen in stream +CVE-2023-52481: Fix not seen in stream +CVE-2023-52482: Fix not seen in stream +CVE-2023-52484: Fix not seen in stream +CVE-2023-52485: Fix not seen in stream +CVE-2023-52486: Fix not seen in stream +CVE-2023-52488: Fix not seen in stream +CVE-2023-52489: Fix not seen in stream +CVE-2023-52491: Fix not seen in stream +CVE-2023-52492: Fix not seen in stream +CVE-2023-52493: Fix not seen in stream +CVE-2023-52497: Fix not seen in stream +CVE-2023-52498: Fix not seen in stream +CVE-2023-52500: Fix not seen in stream +CVE-2023-52501: Fix not seen in stream +CVE-2023-52502: Fix not seen in stream +CVE-2023-52503: Fix not seen in stream +CVE-2023-52504: Fix not seen in stream +CVE-2023-52506: Fix not seen in stream +CVE-2023-52507: Fix not seen in stream +CVE-2023-52508: Fix not seen in stream +CVE-2023-52509: Fix not seen in stream +CVE-2023-52510: Fix not seen in stream +CVE-2023-52511: Fix not seen in stream +CVE-2023-52513: Fix not seen in stream +CVE-2023-52515: Fix not seen in stream +CVE-2023-52516: Fix not seen in stream +CVE-2023-52517: Fix not seen in stream +CVE-2023-52519: Fix not seen in stream +CVE-2023-52522: Fix not seen in stream +CVE-2023-52527: Fix not seen in stream +CVE-2023-52528: Fix not seen in stream +CVE-2023-52530: Fix not seen in stream +CVE-2023-52531: Fix not seen in stream +CVE-2023-52532: Fix not seen in stream +CVE-2023-52559: Fix not seen in stream +CVE-2023-52561: Fix not seen in stream +CVE-2023-52563: Fix not seen in stream +CVE-2023-52565: Fix not seen in stream +CVE-2023-52566: Fix not seen in stream +CVE-2023-52568: Fix not seen in stream +CVE-2023-52569: Fix not seen in stream +CVE-2023-52571: Fix not seen in stream +CVE-2023-52572: Fix not seen in stream +CVE-2023-52573: Fix not seen in stream +CVE-2023-52574: Fix not seen in stream +CVE-2023-52578: Fix not seen in stream +CVE-2023-52583: Fix not seen in stream +CVE-2023-52584: Fix not seen in stream +CVE-2023-52585: Fix not seen in stream +CVE-2023-52586: Fix not seen in stream +CVE-2023-52587: Fix not seen in stream +CVE-2023-52588: Fix not seen in stream +CVE-2023-52589: Fix not seen in stream +CVE-2023-52590: Fix not seen in stream +CVE-2023-52591: Fix not seen in stream +CVE-2023-52593: Fix not seen in stream +CVE-2023-52594: Fix not seen in stream +CVE-2023-52595: Fix not seen in stream +CVE-2023-52596: Fix not seen in stream +CVE-2023-52597: Fix not seen in stream +CVE-2023-52598: Fix not seen in stream +CVE-2023-52599: Fix not seen in stream +CVE-2023-52600: Fix not seen in stream +CVE-2023-52601: Fix not seen in stream +CVE-2023-52602: Fix not seen in stream +CVE-2023-52603: Fix not seen in stream +CVE-2023-52604: Fix not seen in stream +CVE-2023-52606: Fix not seen in stream +CVE-2023-52607: Fix not seen in stream +CVE-2023-52608: Fix not seen in stream +CVE-2023-52609: Fix not seen in stream +CVE-2023-52610: Fix not seen in stream +CVE-2023-52612: Fix not seen in stream +CVE-2023-52614: Fix not seen in stream +CVE-2023-52615: Fix not seen in stream +CVE-2023-52616: Fix not seen in stream +CVE-2023-52617: Fix not seen in stream +CVE-2023-52618: Fix not seen in stream +CVE-2023-52619: Fix not seen in stream +CVE-2023-52620: Fix not seen in stream +CVE-2023-52621: Fix not seen in stream +CVE-2023-52622: Fix not seen in stream +CVE-2023-52623: Fix not seen in stream +CVE-2023-52624: Fix not seen in stream +CVE-2023-52625: Fix not seen in stream +CVE-2023-52627: Fix not seen in stream +CVE-2023-52628: Fix not seen in stream +CVE-2023-52629: Fix not seen in stream +CVE-2023-52630: Fix not seen in stream +CVE-2023-52632: Fix not seen in stream +CVE-2023-52633: Fix not seen in stream +CVE-2023-52634: Fix not seen in stream +CVE-2023-52635: Fix not seen in stream +CVE-2023-52637: Fix not seen in stream +CVE-2023-52638: Fix not seen in stream +CVE-2023-52639: Fix not seen in stream +CVE-2023-52640: Fix not seen in stream +CVE-2023-52641: Fix not seen in stream CVE-2023-5717: Fix not seen in stream CVE-2023-6040: Fix not seen in stream CVE-2023-6121: Fix not seen in stream CVE-2023-6176: Fix not seen in stream CVE-2023-6240: Fix unknown -CVE-2023-6270: Fix unknown -CVE-2023-6356: Fix unknown +CVE-2023-6270: Fix not seen in stream +CVE-2023-6356: Fix not seen in stream CVE-2023-6535: Fix unknown -CVE-2023-6536: Fix unknown +CVE-2023-6536: Fix not seen in stream CVE-2023-6546: Fix not seen in stream CVE-2023-6560: Fix not seen in stream CVE-2023-6606: Fix not seen in stream @@ -721,7 +1074,7 @@ CVE-2023-6817: Fix not seen in stream CVE-2023-6915: Fix not seen in stream CVE-2023-6931: Fix not seen in stream CVE-2023-6932: Fix not seen in stream -CVE-2023-7042: Fix unknown +CVE-2023-7042: Fix not seen in stream CVE-2023-7192: Fix not seen in stream CVE-2024-0340: Fix not seen in stream CVE-2024-0564: Fix unknown @@ -731,15 +1084,16 @@ CVE-2024-0607: Fix not seen in stream CVE-2024-0641: Fix not seen in stream CVE-2024-0646: Fix not seen in stream CVE-2024-0775: Fix not seen in stream -CVE-2024-0841: Fix unknown +CVE-2024-0841: Fix not seen in stream CVE-2024-1086: Fix not seen in stream CVE-2024-1151: Fix not seen in stream CVE-2024-1312: Fix not seen in stream CVE-2024-21803: Fix unknown -CVE-2024-22099: Fix unknown +CVE-2024-2193: Fix unknown +CVE-2024-22099: Fix not seen in stream CVE-2024-22386: Fix unknown -CVE-2024-23196: Fix unknown -CVE-2024-23307: Fix unknown +CVE-2024-23196: Fix not seen in stream +CVE-2024-23307: Fix not seen in stream CVE-2024-23848: Fix unknown CVE-2024-23849: Fix not seen in stream CVE-2024-23850: Fix not seen in stream @@ -749,7 +1103,7 @@ CVE-2024-24857: Fix unknown CVE-2024-24858: Fix unknown CVE-2024-24859: Fix unknown CVE-2024-24860: Fix not seen in stream -CVE-2024-24861: Fix unknown +CVE-2024-24861: Fix not seen in stream CVE-2024-24864: Fix unknown CVE-2024-25739: Fix unknown CVE-2024-25740: Fix unknown @@ -759,13 +1113,135 @@ CVE-2024-26583: Fix not seen in stream CVE-2024-26584: Fix not seen in stream CVE-2024-26585: Fix not seen in stream CVE-2024-26586: Fix not seen in stream -CVE-2024-26587: Fix not seen in stream -CVE-2024-26588: Fix not seen in stream CVE-2024-26589: Fix not seen in stream -CVE-2024-26591: Fix not seen in stream CVE-2024-26592: Fix not seen in stream CVE-2024-26593: Fix not seen in stream CVE-2024-26594: Fix not seen in stream CVE-2024-26595: Fix not seen in stream CVE-2024-26597: Fix not seen in stream CVE-2024-26598: Fix not seen in stream +CVE-2024-26600: Fix not seen in stream +CVE-2024-26601: Fix not seen in stream +CVE-2024-26602: Fix not seen in stream +CVE-2024-26606: Fix not seen in stream +CVE-2024-26607: Fix not seen in stream +CVE-2024-26610: Fix not seen in stream +CVE-2024-26614: Fix not seen in stream +CVE-2024-26615: Fix not seen in stream +CVE-2024-26622: Fix not seen in stream +CVE-2024-26623: Fix not seen in stream +CVE-2024-26625: Fix not seen in stream +CVE-2024-26627: Fix not seen in stream +CVE-2024-26633: Fix not seen in stream +CVE-2024-26635: Fix not seen in stream +CVE-2024-26636: Fix not seen in stream +CVE-2024-26640: Fix not seen in stream +CVE-2024-26641: Fix not seen in stream +CVE-2024-26642: Fix not seen in stream +CVE-2024-26644: Fix not seen in stream +CVE-2024-26645: Fix not seen in stream +CVE-2024-26646: Fix not seen in stream +CVE-2024-26647: Fix not seen in stream +CVE-2024-26648: Fix not seen in stream +CVE-2024-26650: Fix not seen in stream +CVE-2024-26651: Fix not seen in stream +CVE-2024-26654: Fix not seen in stream +CVE-2024-26655: Fix not seen in stream +CVE-2024-26656: Fix not seen in stream +CVE-2024-26658: Fix not seen in stream +CVE-2024-26659: Fix not seen in stream +CVE-2024-26660: Fix not seen in stream +CVE-2024-26661: Fix not seen in stream +CVE-2024-26662: Fix not seen in stream +CVE-2024-26663: Fix not seen in stream +CVE-2024-26664: Fix not seen in stream +CVE-2024-26665: Fix not seen in stream +CVE-2024-26668: Fix not seen in stream +CVE-2024-26669: Fix not seen in stream +CVE-2024-26671: Fix not seen in stream +CVE-2024-26672: Fix not seen in stream +CVE-2024-26673: Fix not seen in stream +CVE-2024-26675: Fix not seen in stream +CVE-2024-26676: Fix not seen in stream +CVE-2024-26677: Fix not seen in stream +CVE-2024-26679: Fix not seen in stream +CVE-2024-26680: Fix not seen in stream +CVE-2024-26684: Fix not seen in stream +CVE-2024-26685: Fix not seen in stream +CVE-2024-26686: Fix not seen in stream +CVE-2024-26687: Fix not seen in stream +CVE-2024-26688: Fix not seen in stream +CVE-2024-26689: Fix not seen in stream +CVE-2024-26691: Fix not seen in stream +CVE-2024-26696: Fix not seen in stream +CVE-2024-26697: Fix not seen in stream +CVE-2024-26698: Fix not seen in stream +CVE-2024-26699: Fix not seen in stream +CVE-2024-26700: Fix not seen in stream +CVE-2024-26702: Fix not seen in stream +CVE-2024-26704: Fix not seen in stream +CVE-2024-26706: Fix not seen in stream +CVE-2024-26707: Fix not seen in stream +CVE-2024-26712: Fix not seen in stream +CVE-2024-26713: Fix not seen in stream +CVE-2024-26715: Fix not seen in stream +CVE-2024-26718: Fix not seen in stream +CVE-2024-26719: Fix not seen in stream +CVE-2024-26720: Fix not seen in stream +CVE-2024-26726: Fix not seen in stream +CVE-2024-26727: Fix not seen in stream +CVE-2024-26733: Fix not seen in stream +CVE-2024-26735: Fix not seen in stream +CVE-2024-26736: Fix not seen in stream +CVE-2024-26738: Fix not seen in stream +CVE-2024-26739: Fix not seen in stream +CVE-2024-26740: Fix not seen in stream +CVE-2024-26743: Fix not seen in stream +CVE-2024-26744: Fix not seen in stream +CVE-2024-26745: Fix not seen in stream +CVE-2024-26747: Fix not seen in stream +CVE-2024-26748: Fix not seen in stream +CVE-2024-26749: Fix not seen in stream +CVE-2024-26751: Fix not seen in stream +CVE-2024-26752: Fix not seen in stream +CVE-2024-26754: Fix not seen in stream +CVE-2024-26756: Fix not seen in stream +CVE-2024-26757: Fix not seen in stream +CVE-2024-26758: Fix not seen in stream +CVE-2024-26759: Fix not seen in stream +CVE-2024-26763: Fix not seen in stream +CVE-2024-26764: Fix not seen in stream +CVE-2024-26765: Fix not seen in stream +CVE-2024-26766: Fix not seen in stream +CVE-2024-26767: Fix not seen in stream +CVE-2024-26768: Fix not seen in stream +CVE-2024-26769: Fix not seen in stream +CVE-2024-26770: Fix not seen in stream +CVE-2024-26771: Fix not seen in stream +CVE-2024-26772: Fix not seen in stream +CVE-2024-26773: Fix not seen in stream +CVE-2024-26774: Fix not seen in stream +CVE-2024-26775: Fix not seen in stream +CVE-2024-26776: Fix not seen in stream +CVE-2024-26777: Fix not seen in stream +CVE-2024-26778: Fix not seen in stream +CVE-2024-26779: Fix not seen in stream +CVE-2024-26782: Fix not seen in stream +CVE-2024-26784: Fix not seen in stream +CVE-2024-26787: Fix not seen in stream +CVE-2024-26788: Fix not seen in stream +CVE-2024-26789: Fix not seen in stream +CVE-2024-26790: Fix not seen in stream +CVE-2024-26791: Fix not seen in stream +CVE-2024-26793: Fix not seen in stream +CVE-2024-26795: Fix not seen in stream +CVE-2024-26797: Fix not seen in stream +CVE-2024-26798: Fix not seen in stream +CVE-2024-26801: Fix not seen in stream +CVE-2024-26802: Fix not seen in stream +CVE-2024-26803: Fix not seen in stream +CVE-2024-26804: Fix not seen in stream +CVE-2024-26805: Fix not seen in stream +CVE-2024-26806: Fix not seen in stream +CVE-2024-26808: Fix not seen in stream +CVE-2024-26809: Fix not seen in stream diff --git a/data/5.11/5.11_security.txt b/data/5.11/5.11_security.txt index 1f58c4baa..a3cb1be0b 100644 --- a/data/5.11/5.11_security.txt +++ b/data/5.11/5.11_security.txt @@ -70,6 +70,7 @@ CVEs fixed in 5.11.14: CVE-2020-25672: 596ad6296f07c63bed3cbd573de42f99b7984599 nfc: fix memory leak in llcp_sock_connect() CVE-2020-25673: 820d46654348863bf6b359ab1cc978eb1126bcac nfc: Avoid endless loops caused by repeated llcp_sock_connect() CVE-2021-3659: 743c9072afafd1919b41ae319044513ed014a58f net: mac802154: Fix general protection fault + CVE-2021-46904: 388d05f70f1ee0cac4a2068fd295072f1a44152a net: hso: fix null-ptr-deref during tty device unregistration CVEs fixed in 5.11.15: CVE-2021-0937: b4c4e4660b37a57011677809205a3f36725b70ae netfilter: x_tables: fix compat match/target pad out-of-bound write @@ -79,19 +80,76 @@ CVEs fixed in 5.11.16: CVE-2021-23133: 59b5f3e478dbcb4c384cf0888d6cc9f5cad79f2f net/sctp: fix race condition in sctp_destroy_sock CVE-2021-29155: 4ccdc6c6cae38b91c871293fb0ed8c6845a61b51 bpf: Use correct permission flag for mixed signed bounds arithmetic CVE-2021-3501: ce541d7b59566a0d94c7c99bfb5d34b050e6af70 KVM: VMX: Don't use vcpu->run->internal.ndata as an array index + CVE-2021-46908: 4ccdc6c6cae38b91c871293fb0ed8c6845a61b51 bpf: Use correct permission flag for mixed signed bounds arithmetic + CVE-2021-46909: c3efce8cc9807339633ee30e39882f4c8626ee1d ARM: footbridge: fix PCI interrupt mapping + CVE-2021-46910: 5965ac11b1d5fcb38464728931649cd9df79c7c9 ARM: 9063/1: mm: reduce maximum number of CPUs if DEBUG_KMAP_LOCAL is enabled + CVE-2021-46911: 8348665d4181c68b0ca1205b48e1753d78bc810f ch_ktls: Fix kernel panic + CVE-2021-46912: 1ccdf1bed140820240e383ba0accc474ffc7f006 net: Make tcp_allowed_congestion_control readonly in non-init netns + CVE-2021-46913: 47d8de3c226574a3ddb8b87d0c152028d1bafef4 netfilter: nftables: clone set element expression template + CVE-2021-46914: f1b4be4a753caa4056496f679d70550d0c11a264 ixgbe: fix unbalanced device enable/disable in suspend/resume + CVE-2021-46915: 1bb3ee4259936cc3b2d80a4a480bbb4868575071 netfilter: nft_limit: avoid possible divide error in nft_limit_init + CVE-2021-46916: 758d19098df4b0bbca9f40d6ae6c82c9c18b9bba ixgbe: Fix NULL pointer dereference in ethtool loopback test + CVE-2021-46917: f7dc8f5619165e1fa3383d0c2519f502d9e2a1a9 dmaengine: idxd: fix wq cleanup of WQCFG registers + CVE-2021-46918: c84b8982d7aa9b4717dc36a1c6cbc93ee153b500 dmaengine: idxd: clear MSIX permission entry on shutdown + CVE-2021-46919: 05b7791c4c4aa8304368fdc55ae911f6b34e7281 dmaengine: idxd: fix wq size store permission state + CVE-2021-46920: 02981a44a0e402089775416371bd2e0c935685f8 dmaengine: idxd: Fix clobbering of SWERR overflow bit on writeback CVEs fixed in 5.11.17: CVE-2019-15794: f65c0fdb7db2750677bf2cb53e62d7d205c20ab5 ovl: fix reference counting in ovl_mmap error path + CVE-2021-46921: d558fcdb17139728347bccc60a16af3e639649d2 locking/qrwlock: Fix ordering in queued_write_lock_slowpath() CVEs fixed in 5.11.19: CVE-2021-31829: 6eba92a4d4be8feb4dc33976abac544fa99d6ecc bpf: Fix masking negation logic upon negative dst register CVE-2021-38209: fbf85a34ce17c4cf0a37ee253f4c582bbfb8231b netfilter: conntrack: Make global sysctls readonly in non-init netns + CVE-2021-46971: f5809ca4c311b71bfaba6d13f4e39eab0557895e perf/core: Fix unconditional security_locked_down() call + CVE-2021-46972: cf3e3330bc5719fa9d658e3e2f596bde89344a94 ovl: fix leaked dentry + CVE-2021-46973: ea474054c2cc6e1284604b21361f475c7cc8c0a0 net: qrtr: Avoid potential use after free in MHI send + CVE-2021-46974: 6eba92a4d4be8feb4dc33976abac544fa99d6ecc bpf: Fix masking negation logic upon negative dst register CVEs fixed in 5.11.20: + CVE-2020-36776: 876a5f33e5d961d879c5436987c09b3d9ef70379 thermal/drivers/cpufreq_cooling: Fix slab OOB issue + CVE-2020-36777: 9ad15e214fcd73694ea51967d86055f47b802066 media: dvbdev: Fix memory leak in dvb_media_device_free() CVE-2021-3506: 7fe4c47161c21f3b1c3581c2653147281ca0e4fa f2fs: fix to avoid out-of-bounds memory access CVE-2021-3543: 5f4a8ccfc15c1498d897139e5dbff82a35005144 nitro_enclaves: Fix stale file descriptors on failed usercopy + CVE-2021-46938: 6086f957416a6e87236c06079fcaba7a3998aeca dm rq: fix double free of blk_mq_tag_set in dev remove after table load fails + CVE-2021-46939: 6e2418576228eeb12e7ba82edb8f9500623942ff tracing: Restructure trace_clock_global() to never block + CVE-2021-46940: dbdf22fc825fdb1d97f23230064e0f9819471628 tools/power turbostat: Fix offset overflow issue in index converting + CVE-2021-46941: 800f58217626c8b147aa40660e572ed8a0d56e3b usb: dwc3: core: Do core softreset when switch mode + CVE-2021-46943: 34892ea938387d83ffcfb7775ec55f0f80767916 media: staging/intel-ipu3: Fix set_fmt error handling + CVE-2021-46944: 14d0e99c3ef6b0648535a31bf2eaabb4eff97b9e media: staging/intel-ipu3: Fix memory leak in imu_fmt + CVE-2021-46945: 64e1eebe2131183174f4fbb6b1491355f96c6cde ext4: always panic when errors=panic is specified + CVE-2021-46948: 35c7a83ad1bb1d48ae249346e61b1132bcbf9052 sfc: farch: fix TX queue lookup in TX event handling + CVE-2021-46949: a1570985ec04116cc665b760faf666a104154170 sfc: farch: fix TX queue lookup in TX flush done handling + CVE-2021-46950: 59452e551784b7a57a45d971727e9db63b192515 md/raid1: properly indicate failure when ending a failed write request + CVE-2021-46951: 3818b753277f5ca0c170bf5b98e0a5a225542fcb tpm: efi: Use local variable for calculating final log size + CVE-2021-46952: 2f3380121d49e829fb73ba86240c181bc32ad897 NFS: fs_context: validate UDP retrans to prevent shift out-of-bounds + CVE-2021-46953: 42e69521ee1fa5abf21f478d147d06bbfe6bf6a8 ACPI: GTDT: Don't corrupt interrupt mappings on watchdow probe failure + CVE-2021-46954: 018bb8da5b5888e19585f9b802f036afe643fcef net/sched: sch_frag: fix stack OOB read while fragmenting IPv4 packets + CVE-2021-46955: d841d3cf5297fde4ce6a41ff35451d0e82917f3e openvswitch: fix stack OOB read while fragmenting IPv4 packets + CVE-2021-46956: 9b9d60c0eb8ada99cce2a9ab5c15dffc523b01ae virtiofs: fix memory leak in virtio_fs_probe() + CVE-2021-46958: 633f7f216663587f17601eaa1cf2ac3d5654874c btrfs: fix race between transaction aborts and fsyncs leading to use-after-free + CVE-2021-46960: f59a9242942fef0de7b926e438ba4eae65d4b4dd cifs: Return correct error code from smb2_get_enc_key + CVE-2021-46961: ea817ac1014c04f47885532b55f5d0898deadfba irqchip/gic-v3: Do not enable irqs when handling spurious interrups + CVE-2021-46962: ebe0f12cf4c044f812c6d17011531582f9ac8bb3 mmc: uniphier-sd: Fix a resource leak in the remove function + CVE-2021-46963: 80ef24175df2cba3860d0369d1c662b49ee2de56 scsi: qla2xxx: Fix crash in qla2xxx_mqueuecommand() + CVE-2021-46964: 4ecd42dec858b6632c5f024fe13e9ad6c30f2734 scsi: qla2xxx: Reserve extra IRQ vectors + CVE-2021-46965: 4e4ebb827bf09311469ffd9d0c14ed40ed9747aa mtd: physmap: physmap-bt1-rom: Fix unintentional stack access + CVE-2021-46966: f16737caf41fc06cfe6e49048becb09657074d4b ACPI: custom_method: fix potential use-after-free issue + CVE-2021-46967: 940230a5c31e2714722aee04c521a21f484b4df7 vhost-vdpa: fix vm_flags for virtqueue doorbell mapping + CVE-2021-46968: 055a063a18bcd19b93709e3eac8078d6b2f04599 s390/zcrypt: fix zcard and zqueue hot-unplug memleak + CVE-2021-46970: abd1510c08a13c88d24b622a83c82e87ff1d3135 bus: mhi: pci_generic: Remove WQ_MEM_RECLAIM flag from state workqueue CVEs fixed in 5.11.21: + CVE-2020-36778: e2ba996577eaea423694dc69ae43d56f1410a22b i2c: xiic: fix reference leak when pm_runtime_get_sync fails + CVE-2020-36779: d791b90f5c5e5aa8ccf9e33386c16bd2b7e333a4 i2c: stm32f7: fix reference leak when pm_runtime_get_sync fails + CVE-2020-36780: 9223505e938ba3db5907e058f4209770cff2f2a7 i2c: sprd: fix reference leak when pm_runtime_get_sync fails + CVE-2020-36781: 1ecc0ebc2ebbad4a22a670a07d27a21fa0b59c77 i2c: imx: fix reference leak when pm_runtime_get_sync fails + CVE-2020-36782: bb300acc867e937edc2a6898e92b21f88e4e4e66 i2c: imx-lpi2c: fix reference leak when pm_runtime_get_sync fails + CVE-2020-36783: 96c4a03658d661666c360959aa80cdabfe2972ed i2c: img-scb: fix reference leak when pm_runtime_get_sync fails + CVE-2020-36784: d57ff04e0ed6f3be1682ae861ead33f879225e07 i2c: cadence: fix reference leak when pm_runtime_get_sync fails + CVE-2020-36785: 801c1d505894008c888bc71d08d5cff5d87f8aba media: atomisp: Fix use after free in atomisp_alloc_css_stat_bufs() + CVE-2020-36786: 4f0f37d03cde8f4341df8454f9b40a67fda94a33 media: [next] staging: media: atomisp: fix memory leak of object flash + CVE-2020-36787: 2964c37563e86cfdc439f217eb3c5a69adfdba6a media: aspeed: fix clock handling logic CVE-2021-31440: d11e645725e9850109a40031997fc05b7dda34c7 bpf: Fix propagation of 32 bit unsigned bounds from 64 bit bounds CVE-2021-32399: c20a95f000bc369176d1698fce2515656b5db924 bluetooth: eliminate the potential race condition when removing the HCI controller CVE-2021-33034: 7064d5651ba08adbcd3d8a2fc78f8a117a768935 Bluetooth: verify AMP hci_chan before amp_destroy @@ -99,9 +157,87 @@ CVEs fixed in 5.11.21: CVE-2021-3490: 3a0066086a338f99205b1c38c9fbefaeb5cd6d28 bpf: Fix alu32 const subreg bound tracking on bitwise operations CVE-2021-3491: 7a8411015f744e68013d77432d869be5ad34208f io_uring: truncate lengths larger than MAX_RW_COUNT on provide buffers CVE-2021-45486: 4bfdd8b53f7440ac0f6290720c6e1ad5952377ec inet: use bigger hash table for IP ID generation + CVE-2021-47010: efe1532a6e1a8e3c343d04fff510f0ed80328f9c net: Only allow init netns to set default tcp cong to a restricted algo + CVE-2021-47011: 89b1ed358e01e1b0417f5d3b0082359a23355552 mm: memcontrol: slab: fix obtain a reference to a freeing memcg + CVE-2021-47012: 3e22b88e02c194f6c80867abfef5cc09383461f4 RDMA/siw: Fix a use after free in siw_alloc_mr + CVE-2021-47013: 8c06f34785068b87e2b560534c77c163d6c6dca7 net:emac/emac-mac: Fix a use after free in emac_mac_tx_buf_send + CVE-2021-47015: e187ef83c04a5d23e68d39cfdff1a1931e29890c bnxt_en: Fix RX consumer index logic in the error path. + CVE-2021-47016: 73fdeb612d25b5e105c219e05434285a45d23576 m68k: mvme147,mvme16x: Don't wipe PCC timer config bits + CVE-2021-47017: 3b1ac40c6012140828caa79e592a438a18ebf71b ath10k: Fix a use after free in ath10k_htc_send_bundle + CVE-2021-47018: abb07dc5e8b61ab7b1dde20dd73aa01a3aeb183f powerpc/64: Fix the definition of the fixmap area + CVE-2021-47020: 2f17ac005b320c85d686088cfd4c2e7017912b88 soundwire: stream: fix memory leak in stream config error path + CVE-2021-47023: b5bba6ede42693f50ce1c9944315cefed7491061 net: marvell: prestera: fix port event handling on init + CVE-2021-47024: 27691665145e74a45034a9dccf1150cf1894763a vsock/virtio: free queued packets when closing socket + CVE-2021-47026: 676171f9405dcaa45a33d18241c32f387dbaae39 RDMA/rtrs-clt: destroy sysfs after removing session from active list + CVE-2021-47028: dfc8a71448c7d4fec38fb22bdc8a76d79c14b6da mt76: mt7915: fix txrate reporting + CVE-2021-47032: 4a9dcd6efb2a268fc5707dcfb3b0c412975c4462 mt76: mt7915: fix tx skb dma unmap + CVE-2021-47033: a025277a80add18c33d01042525a74fe5b875f25 mt76: mt7615: fix tx skb dma unmap + CVE-2021-47034: 01ac203e2119d8922126886ddea309fb676f955f powerpc/64s: Fix pte update for kernel memory on radix + CVE-2021-47035: 25faff78138933244c678c7fc78f7c0340fa04a0 iommu/vt-d: Remove WO permissions on second-level paging entries + CVE-2021-47037: 6893df3753beafa5f7351228a9dd8157a57d7492 ASoC: q6afe-clocks: fix reprobing of the driver + CVE-2021-47038: fee71f480bc1dec5f6ae3b0b185ff12a62bceabc Bluetooth: avoid deadlock between hci_dev->lock and socket lock + CVE-2021-47039: 07f86aa8f4fe077be1b018cc177eb8c6573e5671 ataflop: potential out of bounds in do_format() + CVE-2021-47040: 51bf90901952aaac564bbdb36b2b503050c53dd9 io_uring: fix overflows checks in provide buffers + CVE-2021-47041: 06beaa1a9f6e501213195e47c30416032fd2bbd5 nvmet-tcp: fix incorrect locking in state_change sk callback + CVE-2021-47043: 940d01eceb3a7866fbfca136a55a5625fc75a565 media: venus: core: Fix some resource leaks in the error path of 'venus_probe()' + CVE-2021-47044: 2f3eab368e313dba35fc2f51ede778bf7b030b54 sched/fair: Fix shift-out-of-bounds in load_balance() + CVE-2021-47045: a09677de458d500b00701f6036baa423d9995408 scsi: lpfc: Fix null pointer dereference in lpfc_prep_els_iocb() + CVE-2021-47046: 6a58310d5d1e5b02d0fc9b393ba540c9367bced5 drm/amd/display: Fix off by one in hdmi_14_process_transaction() + CVE-2021-47047: c26c026eb496261dbc0adbf606cc81989cd2038c spi: spi-zynqmp-gqspi: return -ENOMEM if dma_map_single fails + CVE-2021-47048: d67e0d6bd92ebbb0294e7062bbf5cdc773764e62 spi: spi-zynqmp-gqspi: fix use-after-free in zynqmp_qspi_exec_op + CVE-2021-47049: f37dd5d1b5d38a79a4f7b8dd7bbb705505f05560 Drivers: hv: vmbus: Use after free in __vmbus_open() + CVE-2021-47050: e16acc3a37f09e18835dc5d8014942c2ef6ca957 memory: renesas-rpc-if: fix possible NULL pointer dereference of resource + CVE-2021-47051: b8207bfc539cd07d15e753ff2d179c5b61c673b1 spi: fsl-lpspi: Fix PM reference leak in lpspi_prepare_xfer_hardware() + CVE-2021-47052: dfd6443bf49ac17adf882ca46c40c506a0284bd6 crypto: sa2ul - Fix memory leak of rxd + CVE-2021-47053: c633e025bd04f54d7b33331cfcdb71354b08ce59 crypto: sun8i-ss - Fix memory leak of pad + CVE-2021-47054: 6b68c03dfc79cd95a58dfd03f91f6e82829a1b0c bus: qcom: Put child node before return + CVE-2021-47055: 077259f5e777c3c8821f6b41dee709fcda27306b mtd: require write permissions for locking and badblock ioctls + CVE-2021-47056: 20fd40fc6f2c2b41dc6f637f88d494b14e9c21f1 crypto: qat - ADF_STATUS_PF_RUNNING should be set after adf_dev_init + CVE-2021-47057: e1f2d739849c3239df1ea3f97d40bade4b808410 crypto: sun8i-ss - Fix memory leak of object d when dma_iv fails to map + CVE-2021-47058: c764e375ae647832de1ee73d43a4bb3ef8a8f43d regmap: set debugfs_name to NULL after it is freed + CVE-2021-47059: ca065a93699f8cf3f42c60eefed73086007e928e crypto: sun8i-ss - fix result memory leak on error path + CVE-2021-47060: 168e82f640ed1891a700bdb43e37da354b2ab63c KVM: Stop looking for coalesced MMIO zones if the bus is destroyed + CVE-2021-47061: 4e899ca848636b37e9ac124bc1723862a7d7d927 KVM: Destroy I/O bus devices on unregister failure _after_ sync'ing SRCU + CVE-2021-47062: bd0cced2ae93195668f983d443f7f17e8efd24d2 KVM: SVM: Use online_vcpus, not created_vcpus, to iterate over vCPUs + CVE-2021-47063: 18149b420c9bd93c443e8d1f48a063d71d9f6aa1 drm: bridge/panel: Cleanup connector on bridge detach + CVE-2021-47064: 9b68ce2856dadc0e1cb6fd21fbeb850da49efd08 mt76: fix potential DMA mapping leak + CVE-2021-47065: 5f3dbced8eaa5c9ed7d6943f3fea99f235a6516a rtw88: Fix array overrun in rtw_get_tx_power_params() + CVE-2021-47066: 29ffa50f33de824b5491f8239c88c4a0efdd03af async_xor: increase src_offs when dropping destination page + CVE-2021-47067: dc4452867200fa94589b382740952b58aa1c3e6c soc/tegra: regulators: Fix locking up when voltage-spread is out of range CVEs fixed in 5.11.22: CVE-2021-4157: fd02a794aaeac693c7c092a4b482f87256d151fc pNFS/flexfiles: fix incorrect size check in decode_nfs_fh() + CVE-2021-46976: 608441de3976c526b02af4d7063093c8adf351e3 drm/i915: Fix crash in auto_retire + CVE-2021-46977: 5adcdeb57007ccf8ab7ac20bf787ffb6fafb1a94 KVM: VMX: Disable preemption when probing user return MSRs + CVE-2021-46978: 200a45649ab7361bc80c70aebf7165b64f9a6c9f KVM: nVMX: Always make an attempt to map eVMCS after migration + CVE-2021-46979: 11e1cae5da4096552f7c091476cbadbc0d1817da iio: core: fix ioctl handlers removal + CVE-2021-46980: a453bfd7ef15fd9d524004d3ca7b05353a302911 usb: typec: ucsi: Retrieve all the PDOs instead of just the first 4 + CVE-2021-46981: b31d237796fd618379ec8e0f4de3370b5e4aeee7 nbd: Fix NULL pointer in flush_workqueue + CVE-2021-46982: 64acb100fe3beb5d20184d0ae3307235bd3555c4 f2fs: compress: fix race condition of overwrite vs truncate + CVE-2021-46983: 17fb6dfa5162b89ecfa07df891a53afec321abe8 nvmet-rdma: Fix NULL deref when SEND is completed with error + CVE-2021-46984: a287cd84e047045f5a4d4da793414e848de627c6 kyber: fix out of bounds access when preempted + CVE-2021-46986: bc0cdd72493236fb72b390ad38ce581e353c143c usb: dwc3: gadget: Free gadget structure only after freeing endpoints + CVE-2021-46987: d5347827d0b4b2250cbce6eccaa1c81dc78d8651 btrfs: fix deadlock when cloning inline extents and using qgroups + CVE-2021-46988: ad53127973034c63b5348715a1043d0e80ceb330 userfaultfd: release page in error path to avoid BUG_ON + CVE-2021-46989: c477f62db1a0c0ecaa60a29713006ceeeb04b685 hfsplus: prevent corruption in shrinking truncate + CVE-2021-46990: dd0d6117052faace5440db20fc37175efe921c7d powerpc/64s: Fix crashes when toggling entry flush barrier + CVE-2021-46991: 4ebc10aa7cd17fd9857dedac69600465c9dd16d1 i40e: Fix use-after-free in i40e_client_subtask() + CVE-2021-46992: 1e8ab479cfbe5751efccedb95afb9b112a5ba475 netfilter: nftables: avoid overflows in nft_hash_buckets() + CVE-2021-46993: 3da3f804b82a0a382d523a21acf4cf3bb35f936d sched: Fix out-of-bound access in uclamp + CVE-2021-46994: 6f8f1c27b577de15f69fefce3c502bb6300d825c can: mcp251x: fix resume from sleep before interface was brought up + CVE-2021-46996: 59fa98bfa1f4013d658d990cac88c87b46ff410c netfilter: nftables: Fix a memleak from userdata error path in new objects + CVE-2021-46997: e67a83f078005461b59b4c776e6b5addd11725fa arm64: entry: always set GIC_PRIO_PSR_I_SET during entry + CVE-2021-46998: 6892396ebf04ea2c021d80e10f4075e014cd7cc3 ethernet:enic: Fix a use after free bug in enic_hard_start_xmit + CVE-2021-46999: 61b877bad9bb0d82b7d8841be50872557090a704 sctp: do asoc update earlier in sctp_sf_do_dupcook_a + CVE-2021-47000: 22fa4c8288f1ec40f6d62d7a32c57ac176f9f0bc ceph: fix inode leak on getattr error in __fh_to_dentry + CVE-2021-47001: 8834ecb5df22b7ff3c9b0deba7726579bb613f95 xprtrdma: Fix cwnd update ordering + CVE-2021-47002: 1e10f58f1c9a6b667b045513c7a4e6111c24fe7c SUNRPC: Fix null pointer dereference in svc_rqst_free() + CVE-2021-47003: 2280b4cc29d8cdd2be3d1b2d1ea4f958e2131c97 dmaengine: idxd: Fix potential null dereference on pointer status + CVE-2021-47004: 1e116f87825f01a6380286472196882746b16f63 f2fs: fix to avoid touching checkpointed data in get_victim() + CVE-2021-47005: 679ebad058b8168f10e63876d63b0877fd2fe784 PCI: endpoint: Fix NULL pointer dereference for ->get_features() + CVE-2021-47006: 7eeacc6728c5478e3c01bc82a1f08958eaa12366 ARM: 9064/1: hw_breakpoint: Do not directly check the event's overflow_handler hook + CVE-2021-47007: 860afd680d9cc1dabd61cda3cd246f60aa1eb705 f2fs: fix panic during f2fs_resize_fs() + CVE-2021-47008: fb9e14f4f8217a0980f8da2c8ff70dee058cbe47 KVM: SVM: Make sure GHCB is mapped before updating Outstanding CVEs: CVE-2005-3660: (unk) @@ -132,6 +268,7 @@ Outstanding CVEs: CVE-2019-19378: (unk) CVE-2019-19814: (unk) CVE-2019-20794: (unk) + CVE-2019-25162: (unk) i2c: Fix a potential use after free CVE-2020-0347: (unk) CVE-2020-10708: (unk) CVE-2020-11725: (unk) @@ -281,6 +418,110 @@ Outstanding CVEs: CVE-2021-45485: (unk) ipv6: use prandom_u32() for ID generation CVE-2021-45868: (unk) quota: check block number when reading the block in quota file CVE-2021-46283: (unk) netfilter: nf_tables: initialize set before expression setup + CVE-2021-46906: (unk) HID: usbhid: fix info leak in hid_submit_ctrl + CVE-2021-46924: (unk) NFC: st21nfca: Fix memory leak in device probe and remove + CVE-2021-46925: (unk) net/smc: fix kernel panic caused by race of smc_sock + CVE-2021-46926: (unk) ALSA: hda: intel-sdw-acpi: harden detection of controller + CVE-2021-46928: (unk) parisc: Clear stale IIR value on instruction access rights trap + CVE-2021-46929: (unk) sctp: use call_rcu to free endpoint + CVE-2021-46930: (unk) usb: mtu3: fix list_head check warning + CVE-2021-46931: (unk) net/mlx5e: Wrap the tx reporter dump callback to extract the sq + CVE-2021-46932: (unk) Input: appletouch - initialize work before device registration + CVE-2021-46933: (unk) usb: gadget: f_fs: Clear ffs_eventfd in ffs_data_clear. + CVE-2021-46934: (unk) i2c: validate user data in compat ioctl + CVE-2021-46935: (unk) binder: fix async_free_space accounting for empty parcels + CVE-2021-46936: (unk) net: fix use-after-free in tw_timer_handler + CVE-2021-46959: (unk) spi: Fix use-after-free with devm_spi_alloc_* + CVE-2021-46969: (unk) bus: mhi: core: Fix invalid error returning in mhi_queue + CVE-2021-47014: (unk) net/sched: act_ct: fix wild memory access when clearing fragments + CVE-2021-47036: (unk) udp: skip L4 aggregation for UDP tunnel packets + CVE-2021-47069: (unk) ipc/mqueue, msg, sem: avoid relying on a stack reference past its expiry + CVE-2021-47070: (unk) uio_hv_generic: Fix another memory leak in error handling paths + CVE-2021-47071: (unk) uio_hv_generic: Fix a memory leak in error handling paths + CVE-2021-47073: (unk) platform/x86: dell-smbios-wmi: Fix oops on rmmod dell_smbios + CVE-2021-47074: (unk) nvme-loop: fix memory leak in nvme_loop_create_ctrl() + CVE-2021-47075: (unk) nvmet: fix memory leak in nvmet_alloc_ctrl() + CVE-2021-47076: (unk) RDMA/rxe: Return CQE error if invalid lkey was supplied + CVE-2021-47077: (unk) scsi: qedf: Add pointer checks in qedf_update_link_speed() + CVE-2021-47078: (unk) RDMA/rxe: Clear all QP fields if creation failed + CVE-2021-47080: (unk) RDMA/core: Prevent divide-by-zero error triggered by the user + CVE-2021-47082: (unk) tun: avoid double free in tun_free_netdev + CVE-2021-47083: (unk) pinctrl: mediatek: fix global-out-of-bounds issue + CVE-2021-47086: (unk) phonet/pep: refuse to enable an unbound pipe + CVE-2021-47090: (unk) mm/hwpoison: clear MF_COUNT_INCREASED before retrying get_any_page() + CVE-2021-47091: (unk) mac80211: fix locking in ieee80211_start_ap error path + CVE-2021-47093: (unk) platform/x86: intel_pmc_core: fix memleak on registration failure + CVE-2021-47094: (unk) KVM: x86/mmu: Don't advance iterator after restart due to yielding + CVE-2021-47095: (unk) ipmi: ssif: initialize ssif_info->client early + CVE-2021-47097: (unk) Input: elantech - fix stack out of bound access in elantech_change_report_id() + CVE-2021-47100: (unk) ipmi: Fix UAF when uninstall ipmi_si and ipmi_msghandler module + CVE-2021-47101: (unk) asix: fix uninit-value in asix_mdio_read() + CVE-2021-47103: (unk) inet: fully convert sk->sk_rx_dst to RCU rules + CVE-2021-47105: (unk) ice: xsk: return xsk buffers back to pool when cleaning the ring + CVE-2021-47109: (unk) neighbour: allow NUD_NOARP entries to be forced GCed + CVE-2021-47110: (unk) x86/kvm: Disable kvmclock on all CPUs on shutdown + CVE-2021-47111: (unk) xen-netback: take a reference to the RX task thread + CVE-2021-47112: (unk) x86/kvm: Teardown PV features on boot CPU as well + CVE-2021-47113: (unk) btrfs: abort in rename_exchange if we fail to insert the second ref + CVE-2021-47114: (unk) ocfs2: fix data corruption by fallocate + CVE-2021-47116: (unk) ext4: fix memory leak in ext4_mb_init_backend on error path. + CVE-2021-47117: (unk) ext4: fix bug on in ext4_es_cache_extent as ext4_split_extent_at failed + CVE-2021-47118: (unk) pid: take a reference when initializing `cad_pid` + CVE-2021-47119: (unk) ext4: fix memory leak in ext4_fill_super + CVE-2021-47120: (unk) HID: magicmouse: fix NULL-deref on disconnect + CVE-2021-47121: (unk) net: caif: fix memory leak in cfusbl_device_notify + CVE-2021-47122: (unk) net: caif: fix memory leak in caif_device_notify + CVE-2021-47123: (unk) io_uring: fix ltout double free on completion race + CVE-2021-47124: (unk) io_uring: fix link timeout refs + CVE-2021-47125: (unk) sch_htb: fix refcount leak in htb_parent_to_leaf_offload + CVE-2021-47126: (unk) ipv6: Fix KASAN: slab-out-of-bounds Read in fib6_nh_flush_exceptions + CVE-2021-47128: (unk) bpf, lockdown, audit: Fix buggy SELinux lockdown permission checks + CVE-2021-47129: (unk) netfilter: nft_ct: skip expectations for confirmed conntrack + CVE-2021-47130: (unk) nvmet: fix freeing unallocated p2pmem + CVE-2021-47131: (unk) net/tls: Fix use-after-free after the TLS device goes down and up + CVE-2021-47133: (unk) HID: amd_sfh: Fix memory leak in amd_sfh_work + CVE-2021-47134: (unk) efi/fdt: fix panic when no valid fdt found + CVE-2021-47135: (unk) mt76: mt7921: fix possible AOOB issue in mt7921_mcu_tx_rate_report + CVE-2021-47136: (unk) net: zero-initialize tc skb extension on allocation + CVE-2021-47137: (unk) net: lantiq: fix memory corruption in RX ring + CVE-2021-47138: (unk) cxgb4: avoid accessing registers when clearing filters + CVE-2021-47139: (unk) net: hns3: put off calling register_netdev() until client initialize complete + CVE-2021-47140: (unk) iommu/amd: Clear DMA ops when switching domain + CVE-2021-47141: (unk) gve: Add NULL pointer checks when freeing irqs. + CVE-2021-47142: (unk) drm/amdgpu: Fix a use-after-free + CVE-2021-47143: (unk) net/smc: remove device from smcd_dev_list after failed device_add() + CVE-2021-47144: (unk) drm/amd/amdgpu: fix refcount leak + CVE-2021-47145: (unk) btrfs: do not BUG_ON in link_to_fixup_dir + CVE-2021-47146: (unk) mld: fix panic in mld_newpack() + CVE-2021-47147: (unk) ptp: ocp: Fix a resource leak in an error handling path + CVE-2021-47149: (unk) net: fujitsu: fix potential null-ptr-deref + CVE-2021-47150: (unk) net: fec: fix the potential memory leak in fec_enet_init() + CVE-2021-47151: (unk) interconnect: qcom: bcm-voter: add a missing of_node_put() + CVE-2021-47152: (unk) mptcp: fix data stream corruption + CVE-2021-47153: (unk) i2c: i801: Don't generate an interrupt on bus reset + CVE-2021-47158: (unk) net: dsa: sja1105: add error handling in sja1105_setup() + CVE-2021-47159: (unk) net: dsa: fix a crash if ->get_sset_count() fails + CVE-2021-47160: (unk) net: dsa: mt7530: fix VLAN traffic leaks + CVE-2021-47161: (unk) spi: spi-fsl-dspi: Fix a resource leak in an error handling path + CVE-2021-47162: (unk) tipc: skb_linearize the head skb when reassembling msgs + CVE-2021-47163: (unk) tipc: wait and exit until all work queues are done + CVE-2021-47164: (unk) net/mlx5e: Fix null deref accessing lag dev + CVE-2021-47165: (unk) drm/meson: fix shutdown crash when component not probed + CVE-2021-47166: (unk) NFS: Don't corrupt the value of pg_bytes_written in nfs_do_recoalesce() + CVE-2021-47167: (unk) NFS: Fix an Oopsable condition in __nfs_pageio_add_request() + CVE-2021-47168: (unk) NFS: fix an incorrect limit in filelayout_decode_layout() + CVE-2021-47169: (unk) serial: rp2: use 'request_firmware' instead of 'request_firmware_nowait' + CVE-2021-47170: (unk) USB: usbfs: Don't WARN about excessively large memory allocations + CVE-2021-47171: (unk) net: usb: fix memory leak in smsc75xx_bind + CVE-2021-47172: (unk) iio: adc: ad7124: Fix potential overflow due to non sequential channel numbers + CVE-2021-47173: (unk) misc/uss720: fix memory leak in uss720_probe + CVE-2021-47174: (unk) netfilter: nft_set_pipapo_avx2: Add irq_fpu_usable() check, fallback to non-AVX2 version + CVE-2021-47175: (unk) net/sched: fq_pie: fix OOB access in the traffic path + CVE-2021-47176: (unk) s390/dasd: add missing discipline function + CVE-2021-47177: (unk) iommu/vt-d: Fix sysfs leak in alloc_iommu() + CVE-2021-47178: (unk) scsi: target: core: Avoid smp_processor_id() in preemptible code + CVE-2021-47179: (unk) NFSv4: Fix a NULL pointer dereference in pnfs_mark_matching_lsegs_return() + CVE-2021-47180: (unk) NFC: nci: fix memory leak in nci_allocate_device CVE-2022-0001: (unk) x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE CVE-2022-0002: (unk) x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE CVE-2022-0168: (unk) cifs: fix NULL ptr dereference in smb2_ioctl_query_info() @@ -535,6 +776,10 @@ Outstanding CVEs: CVE-2022-47929: (unk) net: sched: disallow noqueue for qdisc classes CVE-2022-47946: (unk) io_uring: kill sqo_dead and sqo submission halting CVE-2022-48619: (unk) Input: add bounds checking to input_set_capability() + CVE-2022-48626: (unk) moxart: fix potential use-after-free on remove path + CVE-2022-48627: (unk) vt: fix memory overlapping when deleting chars in the buffer + CVE-2022-48628: (unk) ceph: drop messages from MDS when unmounting + CVE-2022-48629: (unk) crypto: qcom-rng - ensure buffer for generate is completely filled CVE-2023-0045: (unk) x86/bugs: Flush IBP in ib_prctl_set() CVE-2023-0047: (unk) mm, oom: do not trigger out_of_memory from the #PF CVE-2023-0160: (unk) bpf, sockmap: fix deadlocks in the sockhash and sockmap @@ -618,6 +863,7 @@ Outstanding CVEs: CVE-2023-28410: (unk) drm/i915/gem: add missing boundary check in vm_access CVE-2023-28466: (unk) net: tls: fix possible race condition between do_tls_getsockopt_conf() and do_tls_setsockopt_conf() CVE-2023-2860: (unk) ipv6: sr: fix out-of-bounds read when setting HMAC data. + CVE-2023-28746: (unk) x86/mmio: Disable KVM mitigation when X86_FEATURE_CLEAR_CPU_BUF is set CVE-2023-28772: (unk) seq_buf: Fix overflow in seq_buf_putmem_hex() CVE-2023-2898: (unk) f2fs: fix to avoid NULL pointer dereference f2fs_write_end_io() CVE-2023-2985: (unk) fs: hfsplus: fix UAF issue in hfsplus_put_super @@ -712,7 +958,7 @@ Outstanding CVEs: CVE-2023-46813: (unk) x86/sev: Check for user-space IOIO pointing to kernel space CVE-2023-46838: (unk) xen-netback: don't produce zero-size SKB frags CVE-2023-46862: (unk) io_uring/fdinfo: lock SQ thread while retrieving thread cpu/pid - CVE-2023-47233: (unk) + CVE-2023-47233: (unk) wifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach CVE-2023-4732: (unk) mm/userfaultfd: fix uffd-wp special cases for fork() CVE-2023-4881: (unk) netfilter: nftables: exthdr: fix 4-byte stack OOB write CVE-2023-4921: (unk) net: sched: sch_qfq: Fix UAF in qfq_dequeue() @@ -741,19 +987,126 @@ Outstanding CVEs: CVE-2023-52451: (unk) powerpc/pseries/memhp: Fix access beyond end of drmem array CVE-2023-52454: (unk) nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length CVE-2023-52456: (unk) serial: imx: fix tx statemachine deadlock - CVE-2023-52457: (unk) serial: 8250: omap: Don't skip resource freeing if pm_runtime_resume_and_get() failed CVE-2023-52458: (unk) block: add check that partition length needs to be aligned with block size CVE-2023-52463: (unk) efivarfs: force RO when remounting if SetVariable is not supported CVE-2023-52464: (unk) EDAC/thunderx: Fix possible out-of-bounds string access + CVE-2023-52467: (unk) mfd: syscon: Fix null pointer dereference in of_syscon_register() + CVE-2023-52469: (unk) drivers/amd/pm: fix a use-after-free in kv_parse_power_table + CVE-2023-52470: (unk) drm/radeon: check the alloc_workqueue return value in radeon_crtc_init() + CVE-2023-52474: (unk) IB/hfi1: Fix bugs with non-PAGE_SIZE-end multi-iovec user SDMA requests + CVE-2023-52475: (unk) Input: powermate - fix use-after-free in powermate_config_complete + CVE-2023-52476: (unk) perf/x86/lbr: Filter vsyscall addresses + CVE-2023-52477: (unk) usb: hub: Guard against accesses to uninitialized BOS descriptors + CVE-2023-52478: (unk) HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect + CVE-2023-52479: (unk) ksmbd: fix uaf in smb20_oplock_break_ack + CVE-2023-52480: (unk) ksmbd: fix race condition between session lookup and expire + CVE-2023-52481: (unk) arm64: errata: Add Cortex-A520 speculative unprivileged load workaround + CVE-2023-52482: (unk) x86/srso: Add SRSO mitigation for Hygon processors + CVE-2023-52484: (unk) iommu/arm-smmu-v3: Fix soft lockup triggered by arm_smmu_mm_invalidate_range + CVE-2023-52485: (unk) drm/amd/display: Wake DMCUB before sending a command + CVE-2023-52486: (unk) drm: Don't unref the same fb many times by mistake due to deadlock handling + CVE-2023-52488: (unk) serial: sc16is7xx: convert from _raw_ to _noinc_ regmap functions for FIFO + CVE-2023-52489: (unk) mm/sparsemem: fix race in accessing memory_section->usage + CVE-2023-52491: (unk) media: mtk-jpeg: Fix use after free bug due to error path handling in mtk_jpeg_dec_device_run + CVE-2023-52492: (unk) dmaengine: fix NULL pointer in channel unregistration function + CVE-2023-52493: (unk) bus: mhi: host: Drop chan lock before queuing buffers + CVE-2023-52497: (unk) erofs: fix lz4 inplace decompression + CVE-2023-52498: (unk) PM: sleep: Fix possible deadlocks in core system-wide PM code + CVE-2023-52500: (unk) scsi: pm80xx: Avoid leaking tags when processing OPC_INB_SET_CONTROLLER_CONFIG command + CVE-2023-52501: (unk) ring-buffer: Do not attempt to read past "commit" + CVE-2023-52502: (unk) net: nfc: fix races in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn() + CVE-2023-52503: (unk) tee: amdtee: fix use-after-free vulnerability in amdtee_close_session + CVE-2023-52504: (unk) x86/alternatives: Disable KASAN in apply_alternatives() + CVE-2023-52506: (unk) LoongArch: Set all reserved memblocks on Node#0 at initialization + CVE-2023-52507: (unk) nfc: nci: assert requested protocol is valid + CVE-2023-52508: (unk) nvme-fc: Prevent null pointer dereference in nvme_fc_io_getuuid() + CVE-2023-52509: (unk) ravb: Fix use-after-free issue in ravb_tx_timeout_work() + CVE-2023-52510: (unk) ieee802154: ca8210: Fix a potential UAF in ca8210_probe + CVE-2023-52511: (unk) spi: sun6i: reduce DMA RX transfer width to single byte + CVE-2023-52513: (unk) RDMA/siw: Fix connection failure handling + CVE-2023-52515: (unk) RDMA/srp: Do not call scsi_done() from srp_abort() + CVE-2023-52516: (unk) dma-debug: don't call __dma_entry_alloc_check_leak() under free_entries_lock + CVE-2023-52517: (unk) spi: sun6i: fix race between DMA RX transfer completion and RX FIFO drain + CVE-2023-52519: (unk) HID: intel-ish-hid: ipc: Disable and reenable ACPI GPE bit + CVE-2023-52522: (unk) net: fix possible store tearing in neigh_periodic_work() + CVE-2023-52527: (unk) ipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data() + CVE-2023-52528: (unk) net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg + CVE-2023-52530: (unk) wifi: mac80211: fix potential key use-after-free + CVE-2023-52531: (unk) wifi: iwlwifi: mvm: Fix a memory corruption issue + CVE-2023-52532: (unk) net: mana: Fix TX CQE error handling + CVE-2023-52559: (unk) iommu/vt-d: Avoid memory allocation in iommu_suspend() + CVE-2023-52561: (unk) arm64: dts: qcom: sdm845-db845c: Mark cont splash memory region as reserved + CVE-2023-52563: (unk) drm/meson: fix memory leak on ->hpd_notify callback + CVE-2023-52565: (unk) media: uvcvideo: Fix OOB read + CVE-2023-52566: (unk) nilfs2: fix potential use after free in nilfs_gccache_submit_read_data() + CVE-2023-52568: (unk) x86/sgx: Resolves SECS reclaim vs. page fault for EAUG race + CVE-2023-52569: (unk) btrfs: remove BUG() after failure to insert delayed dir index item + CVE-2023-52571: (unk) power: supply: rk817: Fix node refcount leak + CVE-2023-52572: (unk) cifs: Fix UAF in cifs_demultiplex_thread() + CVE-2023-52573: (unk) net: rds: Fix possible NULL-pointer dereference + CVE-2023-52574: (unk) team: fix null-ptr-deref when team device type is changed + CVE-2023-52578: (unk) net: bridge: use DEV_STATS_INC() + CVE-2023-52583: (unk) ceph: fix deadlock or deadcode of misusing dget() + CVE-2023-52584: (unk) spmi: mediatek: Fix UAF on device remove + CVE-2023-52585: (unk) drm/amdgpu: Fix possible NULL dereference in amdgpu_ras_query_error_status_helper() + CVE-2023-52586: (unk) drm/msm/dpu: Add mutex lock in control vblank irq + CVE-2023-52587: (unk) IB/ipoib: Fix mcast list locking + CVE-2023-52588: (unk) f2fs: fix to tag gcing flag on page during block migration + CVE-2023-52589: (unk) media: rkisp1: Fix IRQ disable race issue + CVE-2023-52590: (unk) ocfs2: Avoid touching renamed directory if parent does not change + CVE-2023-52591: (unk) reiserfs: Avoid touching renamed directory if parent does not change + CVE-2023-52593: (unk) wifi: wfx: fix possible NULL pointer dereference in wfx_set_mfp_ap() + CVE-2023-52594: (unk) wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus() + CVE-2023-52595: (unk) wifi: rt2x00: restart beacon queue when hardware reset + CVE-2023-52596: (unk) sysctl: Fix out of bounds access for empty sysctl registers + CVE-2023-52597: (unk) KVM: s390: fix setting of fpc register + CVE-2023-52598: (unk) s390/ptrace: handle setting of fpc register correctly + CVE-2023-52599: (unk) jfs: fix array-index-out-of-bounds in diNewExt + CVE-2023-52600: (unk) jfs: fix uaf in jfs_evict_inode + CVE-2023-52601: (unk) jfs: fix array-index-out-of-bounds in dbAdjTree + CVE-2023-52602: (unk) jfs: fix slab-out-of-bounds Read in dtSearch + CVE-2023-52603: (unk) UBSAN: array-index-out-of-bounds in dtSplitRoot + CVE-2023-52604: (unk) FS:JFS:UBSAN:array-index-out-of-bounds in dbAdjTree + CVE-2023-52606: (unk) powerpc/lib: Validate size for vector operations + CVE-2023-52607: (unk) powerpc/mm: Fix null-pointer dereference in pgtable_cache_add + CVE-2023-52608: (unk) firmware: arm_scmi: Check mailbox/SMT channel for consistency + CVE-2023-52609: (unk) binder: fix race between mmput() and do_exit() + CVE-2023-52610: (unk) net/sched: act_ct: fix skb leak and crash on ooo frags + CVE-2023-52612: (unk) crypto: scomp - fix req->dst buffer overflow + CVE-2023-52614: (unk) PM / devfreq: Fix buffer overflow in trans_stat_show + CVE-2023-52615: (unk) hwrng: core - Fix page fault dead lock on mmap-ed hwrng + CVE-2023-52616: (unk) crypto: lib/mpi - Fix unexpected pointer access in mpi_ec_init + CVE-2023-52617: (unk) PCI: switchtec: Fix stdev_release() crash after surprise hot remove + CVE-2023-52618: (unk) block/rnbd-srv: Check for unlikely string overflow + CVE-2023-52619: (unk) pstore/ram: Fix crash when setting number of cpus to an odd number + CVE-2023-52620: (unk) netfilter: nf_tables: disallow timeout for anonymous sets + CVE-2023-52621: (unk) bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers + CVE-2023-52622: (unk) ext4: avoid online resizing failures due to oversized flex bg + CVE-2023-52623: (unk) SUNRPC: Fix a suspicious RCU usage warning + CVE-2023-52624: (unk) drm/amd/display: Wake DMCUB before executing GPINT commands + CVE-2023-52625: (unk) drm/amd/display: Refactor DMCUB enter/exit idle interface + CVE-2023-52627: (unk) iio: adc: ad7091r: Allow users to configure device events + CVE-2023-52628: (unk) netfilter: nftables: exthdr: fix 4-byte stack OOB write + CVE-2023-52629: (unk) sh: push-switch: Reorder cleanup operations to avoid use-after-free bug + CVE-2023-52630: (unk) blk-iocost: Fix an UBSAN shift-out-of-bounds warning + CVE-2023-52632: (unk) drm/amdkfd: Fix lock dependency warning with srcu + CVE-2023-52633: (unk) um: time-travel: fix time corruption + CVE-2023-52634: (unk) drm/amd/display: Fix disable_otg_wa logic + CVE-2023-52635: (unk) PM / devfreq: Synchronize devfreq_monitor_[start/stop] + CVE-2023-52637: (unk) can: j1939: Fix UAF in j1939_sk_match_filter during setsockopt(SO_J1939_FILTER) + CVE-2023-52638: (unk) can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock + CVE-2023-52639: (unk) KVM: s390: vsie: fix race during shadow creation + CVE-2023-52640: (unk) fs/ntfs3: Fix oob in ntfs_listxattr + CVE-2023-52641: (unk) fs/ntfs3: Add NULL ptr dereference checking at the end of attr_allocate_frame() CVE-2023-5717: (unk) perf: Disallow mis-matched inherited group reads CVE-2023-6040: (unk) netfilter: nf_tables: Reject tables of unsupported family CVE-2023-6121: (unk) nvmet: nul-terminate the NQNs passed in the connect command CVE-2023-6176: (unk) net/tls: do not free tls_rec on async operation in bpf_exec_tx_verdict() CVE-2023-6240: (unk) - CVE-2023-6270: (unk) - CVE-2023-6356: (unk) + CVE-2023-6270: (unk) aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts + CVE-2023-6356: (unk) nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length CVE-2023-6535: (unk) - CVE-2023-6536: (unk) + CVE-2023-6536: (unk) nvmet-tcp: fix a crash in nvmet_req_complete() CVE-2023-6546: (unk) tty: n_gsm: fix the UAF caused by race condition in gsm_cleanup_mux CVE-2023-6560: (unk) io_uring: don't allow discontig pages for IORING_SETUP_NO_MMAP CVE-2023-6606: (unk) smb: client: fix OOB in smbCalcSize() @@ -763,7 +1116,7 @@ Outstanding CVEs: CVE-2023-6915: (unk) ida: Fix crash in ida_free when the bitmap is empty CVE-2023-6931: (unk) perf: Fix perf_event_validate_size() CVE-2023-6932: (unk) ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet - CVE-2023-7042: (unk) + CVE-2023-7042: (unk) wifi: ath10k: fix NULL pointer dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev() CVE-2023-7192: (unk) netfilter: ctnetlink: fix possible refcount leak in ctnetlink_create_conntrack() CVE-2024-0340: (unk) vhost: use kzalloc() instead of kmalloc() followed by memset() CVE-2024-0564: (unk) @@ -773,15 +1126,16 @@ Outstanding CVEs: CVE-2024-0641: (unk) tipc: fix a potential deadlock on &tx->lock CVE-2024-0646: (unk) net: tls, update curr on splice as well CVE-2024-0775: (unk) ext4: improve error recovery code paths in __ext4_remount() - CVE-2024-0841: (unk) + CVE-2024-0841: (unk) fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super CVE-2024-1086: (unk) netfilter: nf_tables: reject QUEUE/DROP verdict parameters CVE-2024-1151: (unk) net: openvswitch: limit the number of recursions from action sets CVE-2024-1312: (unk) mm: lock_vma_under_rcu() must check vma->anon_vma under vma lock CVE-2024-21803: (unk) - CVE-2024-22099: (unk) + CVE-2024-2193: (unk) + CVE-2024-22099: (unk) Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security CVE-2024-22386: (unk) - CVE-2024-23196: (unk) - CVE-2024-23307: (unk) + CVE-2024-23196: (unk) ALSA: hda: fix a possible null-pointer dereference due to data race in snd_hdac_regmap_sync() + CVE-2024-23307: (unk) md/raid5: fix atomicity violation in raid5_cache_count CVE-2024-23848: (unk) CVE-2024-23849: (unk) net/rds: Fix UBSAN: array-index-out-of-bounds in rds_cmsg_recv CVE-2024-23850: (unk) btrfs: do not ASSERT() if the newly created subvolume already got read @@ -791,7 +1145,7 @@ Outstanding CVEs: CVE-2024-24858: (unk) CVE-2024-24859: (unk) CVE-2024-24860: (unk) Bluetooth: Fix atomicity violation in {min,max}_key_size_set - CVE-2024-24861: (unk) + CVE-2024-24861: (unk) media: xc4000: Fix atomicity violation in xc4000_get_frequency CVE-2024-24864: (unk) CVE-2024-25739: (unk) CVE-2024-25740: (unk) @@ -801,13 +1155,135 @@ Outstanding CVEs: CVE-2024-26584: (unk) net: tls: handle backlogging of crypto requests CVE-2024-26585: (unk) tls: fix race between tx work scheduling and socket close CVE-2024-26586: (unk) mlxsw: spectrum_acl_tcam: Fix stack corruption - CVE-2024-26587: (unk) net: netdevsim: don't try to destroy PHC on VFs - CVE-2024-26588: (unk) LoongArch: BPF: Prevent out-of-bounds memory access CVE-2024-26589: (unk) bpf: Reject variable offset alu on PTR_TO_FLOW_KEYS - CVE-2024-26591: (unk) bpf: Fix re-attachment branch in bpf_tracing_prog_attach CVE-2024-26592: (unk) ksmbd: fix UAF issue in ksmbd_tcp_new_connection() CVE-2024-26593: (unk) i2c: i801: Fix block process call transactions CVE-2024-26594: (unk) ksmbd: validate mech token in session setup CVE-2024-26595: (unk) mlxsw: spectrum_acl_tcam: Fix NULL pointer dereference in error path CVE-2024-26597: (unk) net: qualcomm: rmnet: fix global oob in rmnet_policy CVE-2024-26598: (unk) KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache + CVE-2024-26600: (unk) phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP + CVE-2024-26601: (unk) ext4: regenerate buddy after block freeing failed if under fc replay + CVE-2024-26602: (unk) sched/membarrier: reduce the ability to hammer on sys_membarrier + CVE-2024-26606: (unk) binder: signal epoll threads of self-work + CVE-2024-26607: (unk) drm/bridge: sii902x: Fix probing race issue + CVE-2024-26610: (unk) wifi: iwlwifi: fix a memory corruption + CVE-2024-26614: (unk) tcp: make sure init the accept_queue's spinlocks once + CVE-2024-26615: (unk) net/smc: fix illegal rmb_desc access in SMC-D connection dump + CVE-2024-26622: (unk) tomoyo: fix UAF write bug in tomoyo_write_control() + CVE-2024-26623: (unk) pds_core: Prevent race issues involving the adminq + CVE-2024-26625: (unk) llc: call sock_orphan() at release time + CVE-2024-26627: (unk) scsi: core: Move scsi_host_busy() out of host lock for waking up EH handler + CVE-2024-26633: (unk) ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim() + CVE-2024-26635: (unk) llc: Drop support for ETH_P_TR_802_2. + CVE-2024-26636: (unk) llc: make llc_ui_sendmsg() more robust against bonding changes + CVE-2024-26640: (unk) tcp: add sanity checks to rx zerocopy + CVE-2024-26641: (unk) ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv() + CVE-2024-26642: (unk) netfilter: nf_tables: disallow anonymous set with timeout flag + CVE-2024-26644: (unk) btrfs: don't abort filesystem when attempting to snapshot deleted subvolume + CVE-2024-26645: (unk) tracing: Ensure visibility when inserting an element into tracing_map + CVE-2024-26646: (unk) thermal: intel: hfi: Add syscore callbacks for system-wide PM + CVE-2024-26647: (unk) drm/amd/display: Fix late derefrence 'dsc' check in 'link_set_dsc_pps_packet()' + CVE-2024-26648: (unk) drm/amd/display: Fix variable deferencing before NULL check in edp_setup_replay() + CVE-2024-26650: (unk) platform/x86: p2sb: Allow p2sb_bar() calls during PCI device probe + CVE-2024-26651: (unk) sr9800: Add check for usbnet_get_endpoints + CVE-2024-26654: (unk) ALSA: sh: aica: reorder cleanup operations to avoid UAF bugs + CVE-2024-26655: (unk) Fix memory leak in posix_clock_open() + CVE-2024-26656: (unk) drm/amdgpu: fix use-after-free bug + CVE-2024-26658: (unk) bcachefs: grab s_umount only if snapshotting + CVE-2024-26659: (unk) xhci: handle isoc Babble and Buffer Overrun events properly + CVE-2024-26660: (unk) drm/amd/display: Implement bounds check for stream encoder creation in DCN301 + CVE-2024-26661: (unk) drm/amd/display: Add NULL test for 'timing generator' in 'dcn21_set_pipe()' + CVE-2024-26662: (unk) drm/amd/display: Fix 'panel_cntl' could be null in 'dcn21_set_backlight_level()' + CVE-2024-26663: (unk) tipc: Check the bearer type before calling tipc_udp_nl_bearer_add() + CVE-2024-26664: (unk) hwmon: (coretemp) Fix out-of-bounds memory access + CVE-2024-26665: (unk) tunnels: fix out of bounds access when building IPv6 PMTU error + CVE-2024-26668: (unk) netfilter: nft_limit: reject configurations that cause integer overflow + CVE-2024-26669: (unk) net/sched: flower: Fix chain template offload + CVE-2024-26671: (unk) blk-mq: fix IO hang from sbitmap wakeup race + CVE-2024-26672: (unk) drm/amdgpu: Fix variable 'mca_funcs' dereferenced before NULL check in 'amdgpu_mca_smu_get_mca_entry()' + CVE-2024-26673: (unk) netfilter: nft_ct: sanitize layer 3 and 4 protocol number in custom expectations + CVE-2024-26675: (unk) ppp_async: limit MRU to 64K + CVE-2024-26676: (unk) af_unix: Call kfree_skb() for dead unix_(sk)->oob_skb in GC. + CVE-2024-26677: (unk) rxrpc: Fix delayed ACKs to not set the reference serial number + CVE-2024-26679: (unk) inet: read sk->sk_family once in inet_recv_error() + CVE-2024-26680: (unk) net: atlantic: Fix DMA mapping for PTP hwts ring + CVE-2024-26684: (unk) net: stmmac: xgmac: fix handling of DPP safety error for DMA channels + CVE-2024-26685: (unk) nilfs2: fix potential bug in end_buffer_async_write + CVE-2024-26686: (unk) fs/proc: do_task_stat: use sig->stats_lock to gather the threads/children stats + CVE-2024-26687: (unk) xen/events: close evtchn after mapping cleanup + CVE-2024-26688: (unk) fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super + CVE-2024-26689: (unk) ceph: prevent use-after-free in encode_cap_msg() + CVE-2024-26691: (unk) KVM: arm64: Fix circular locking dependency + CVE-2024-26696: (unk) nilfs2: fix hang in nilfs_lookup_dirty_data_buffers() + CVE-2024-26697: (unk) nilfs2: fix data corruption in dsync block recovery for small block sizes + CVE-2024-26698: (unk) hv_netvsc: Fix race condition between netvsc_probe and netvsc_remove + CVE-2024-26699: (unk) drm/amd/display: Fix array-index-out-of-bounds in dcn35_clkmgr + CVE-2024-26700: (unk) drm/amd/display: Fix MST Null Ptr for RV + CVE-2024-26702: (unk) iio: magnetometer: rm3100: add boundary check for the value read from RM3100_REG_TMRC + CVE-2024-26704: (unk) ext4: fix double-free of blocks due to wrong extents moved_len + CVE-2024-26706: (unk) parisc: Fix random data corruption from exception handler + CVE-2024-26707: (unk) net: hsr: remove WARN_ONCE() in send_hsr_supervision_frame() + CVE-2024-26712: (unk) powerpc/kasan: Fix addr error caused by page alignment + CVE-2024-26713: (unk) powerpc/pseries/iommu: Fix iommu initialisation during DLPAR add + CVE-2024-26715: (unk) usb: dwc3: gadget: Fix NULL pointer dereference in dwc3_gadget_suspend + CVE-2024-26718: (unk) dm-crypt, dm-verity: disable tasklets + CVE-2024-26719: (unk) nouveau: offload fence uevents work to workqueue + CVE-2024-26720: (unk) mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again + CVE-2024-26726: (unk) btrfs: don't drop extent_map for free space inode on write error + CVE-2024-26727: (unk) btrfs: do not ASSERT() if the newly created subvolume already got read + CVE-2024-26733: (unk) arp: Prevent overflow in arp_req_get(). + CVE-2024-26735: (unk) ipv6: sr: fix possible use-after-free and null-ptr-deref + CVE-2024-26736: (unk) afs: Increase buffer size in afs_update_volume_status() + CVE-2024-26738: (unk) powerpc/pseries/iommu: DLPAR add doesn't completely initialize pci_controller + CVE-2024-26739: (unk) net/sched: act_mirred: don't override retval if we already lost the skb + CVE-2024-26740: (unk) net/sched: act_mirred: use the backlog for mirred ingress + CVE-2024-26743: (unk) RDMA/qedr: Fix qedr_create_user_qp error flow + CVE-2024-26744: (unk) RDMA/srpt: Support specifying the srpt_service_guid parameter + CVE-2024-26745: (unk) powerpc/pseries/iommu: IOMMU table is not initialized for kdump over SR-IOV + CVE-2024-26747: (unk) usb: roles: fix NULL pointer issue when put module's reference + CVE-2024-26748: (unk) usb: cdns3: fix memory double free when handle zero packet + CVE-2024-26749: (unk) usb: cdns3: fixed memory use after free at cdns3_gadget_ep_disable() + CVE-2024-26751: (unk) ARM: ep93xx: Add terminator to gpiod_lookup_table + CVE-2024-26752: (unk) l2tp: pass correct message length to ip6_append_data + CVE-2024-26754: (unk) gtp: fix use-after-free and null-ptr-deref in gtp_genl_dump_pdp() + CVE-2024-26756: (unk) md: Don't register sync_thread for reshape directly + CVE-2024-26757: (unk) md: Don't ignore read-only array in md_check_recovery() + CVE-2024-26758: (unk) md: Don't ignore suspended array in md_check_recovery() + CVE-2024-26759: (unk) mm/swap: fix race when skipping swapcache + CVE-2024-26763: (unk) dm-crypt: don't modify the data when using authenticated encryption + CVE-2024-26764: (unk) fs/aio: Restrict kiocb_set_cancel_fn() to I/O submitted via libaio + CVE-2024-26765: (unk) LoongArch: Disable IRQ before init_fn() for nonboot CPUs + CVE-2024-26766: (unk) IB/hfi1: Fix sdma.h tx->num_descs off-by-one error + CVE-2024-26767: (unk) drm/amd/display: fixed integer types and null check locations + CVE-2024-26768: (unk) LoongArch: Change acpi_core_pic[NR_CPUS] to acpi_core_pic[MAX_CORE_PIC] + CVE-2024-26769: (unk) nvmet-fc: avoid deadlock on delete association path + CVE-2024-26770: (unk) HID: nvidia-shield: Add missing null pointer checks to LED initialization + CVE-2024-26771: (unk) dmaengine: ti: edma: Add some null pointer checks to the edma_probe + CVE-2024-26772: (unk) ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal() + CVE-2024-26773: (unk) ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found() + CVE-2024-26774: (unk) ext4: avoid dividing by 0 in mb_update_avg_fragment_size() when block bitmap corrupt + CVE-2024-26775: (unk) aoe: avoid potential deadlock at set_capacity + CVE-2024-26776: (unk) spi: hisi-sfc-v3xx: Return IRQ_NONE if no interrupts were detected + CVE-2024-26777: (unk) fbdev: sis: Error out if pixclock equals zero + CVE-2024-26778: (unk) fbdev: savage: Error out if pixclock equals zero + CVE-2024-26779: (unk) wifi: mac80211: fix race condition on enabling fast-xmit + CVE-2024-26782: (unk) mptcp: fix double-free on socket dismantle + CVE-2024-26784: (unk) pmdomain: arm: Fix NULL dereference on scmi_perf_domain removal + CVE-2024-26787: (unk) mmc: mmci: stm32: fix DMA API overlapping mappings warning + CVE-2024-26788: (unk) dmaengine: fsl-qdma: init irq after reg initialization + CVE-2024-26789: (unk) crypto: arm64/neonbs - fix out-of-bounds access on short input + CVE-2024-26790: (unk) dmaengine: fsl-qdma: fix SoC may hang on 16 byte unaligned read + CVE-2024-26791: (unk) btrfs: dev-replace: properly validate device names + CVE-2024-26793: (unk) gtp: fix use-after-free and null-ptr-deref in gtp_newlink() + CVE-2024-26795: (unk) riscv: Sparse-Memory/vmemmap out-of-bounds fix + CVE-2024-26797: (unk) drm/amd/display: Prevent potential buffer overflow in map_hw_resources + CVE-2024-26798: (unk) fbcon: always restore the old font data in fbcon_do_set_font() + CVE-2024-26801: (unk) Bluetooth: Avoid potential use-after-free in hci_error_reset + CVE-2024-26802: (unk) stmmac: Clear variable when destroying workqueue + CVE-2024-26803: (unk) net: veth: clear GRO when clearing XDP even when down + CVE-2024-26804: (unk) net: ip_tunnel: prevent perpetual headroom growth + CVE-2024-26805: (unk) netlink: Fix kernel-infoleak-after-free in __skb_datagram_iter + CVE-2024-26806: (unk) spi: cadence-qspi: remove system-wide suspend helper calls from runtime PM hooks + CVE-2024-26808: (unk) netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain + CVE-2024-26809: (unk) netfilter: nft_set_pipapo: release elements in clone only from destroy path diff --git a/data/5.12/5.12_CVEs.txt b/data/5.12/5.12_CVEs.txt index cf19e819b..b9b2058a2 100644 --- a/data/5.12/5.12_CVEs.txt +++ b/data/5.12/5.12_CVEs.txt @@ -27,6 +27,7 @@ CVE-2019-16089: Fix unknown CVE-2019-19378: Fix unknown CVE-2019-19814: Fix unknown CVE-2019-20794: Fix unknown +CVE-2019-25162: Fix not seen in stream CVE-2020-0347: Fix unknown CVE-2020-10708: Fix unknown CVE-2020-11725: Fix unknown @@ -56,6 +57,18 @@ CVE-2020-26560: Fix unknown CVE-2020-27820: Fix not seen in stream CVE-2020-35501: Fix unknown CVE-2020-36516: Fix not seen in stream +CVE-2020-36776: Fixed with 5.12.3 +CVE-2020-36777: Fixed with 5.12.3 +CVE-2020-36778: Fixed with 5.12.4 +CVE-2020-36779: Fixed with 5.12.4 +CVE-2020-36780: Fixed with 5.12.4 +CVE-2020-36781: Fixed with 5.12.4 +CVE-2020-36782: Fixed with 5.12.4 +CVE-2020-36783: Fixed with 5.12.4 +CVE-2020-36784: Fixed with 5.12.4 +CVE-2020-36785: Fixed with 5.12.4 +CVE-2020-36786: Fixed with 5.12.4 +CVE-2020-36787: Fixed with 5.12.4 CVE-2021-0129: Fixed with 5.12.7 CVE-2021-0399: Fix unknown CVE-2021-0920: Fix not seen in stream @@ -187,6 +200,246 @@ CVE-2021-45485: Fixed with 5.12.18 CVE-2021-45486: Fixed with 5.12.4 CVE-2021-45868: Fix not seen in stream CVE-2021-46283: Fixed with 5.12.13 +CVE-2021-46905: Fixed with 5.12.1 +CVE-2021-46906: Fixed with 5.12.12 +CVE-2021-46921: Fixed with 5.12 +CVE-2021-46922: Fixed with 5.12 +CVE-2021-46923: Fix not seen in stream +CVE-2021-46924: Fix not seen in stream +CVE-2021-46925: Fix not seen in stream +CVE-2021-46926: Fix not seen in stream +CVE-2021-46928: Fix not seen in stream +CVE-2021-46929: Fix not seen in stream +CVE-2021-46930: Fix not seen in stream +CVE-2021-46931: Fix not seen in stream +CVE-2021-46932: Fix not seen in stream +CVE-2021-46933: Fix not seen in stream +CVE-2021-46934: Fix not seen in stream +CVE-2021-46935: Fix not seen in stream +CVE-2021-46936: Fix not seen in stream +CVE-2021-46938: Fixed with 5.12.3 +CVE-2021-46939: Fixed with 5.12.3 +CVE-2021-46940: Fixed with 5.12.3 +CVE-2021-46941: Fixed with 5.12.3 +CVE-2021-46942: Fixed with 5.12.3 +CVE-2021-46943: Fixed with 5.12.3 +CVE-2021-46944: Fixed with 5.12.3 +CVE-2021-46945: Fixed with 5.12.3 +CVE-2021-46947: Fixed with 5.12.3 +CVE-2021-46948: Fixed with 5.12.3 +CVE-2021-46949: Fixed with 5.12.3 +CVE-2021-46950: Fixed with 5.12.3 +CVE-2021-46951: Fixed with 5.12.3 +CVE-2021-46952: Fixed with 5.12.3 +CVE-2021-46953: Fixed with 5.12.3 +CVE-2021-46954: Fixed with 5.12.3 +CVE-2021-46955: Fixed with 5.12.3 +CVE-2021-46956: Fixed with 5.12.3 +CVE-2021-46957: Fixed with 5.12.3 +CVE-2021-46958: Fixed with 5.12.3 +CVE-2021-46959: Fix not seen in stream +CVE-2021-46960: Fixed with 5.12.3 +CVE-2021-46961: Fixed with 5.12.3 +CVE-2021-46962: Fixed with 5.12.3 +CVE-2021-46963: Fixed with 5.12.3 +CVE-2021-46964: Fixed with 5.12.3 +CVE-2021-46965: Fixed with 5.12.3 +CVE-2021-46966: Fixed with 5.12.3 +CVE-2021-46967: Fixed with 5.12.3 +CVE-2021-46968: Fixed with 5.12.3 +CVE-2021-46969: Fixed with 5.12.3 +CVE-2021-46970: Fixed with 5.12.3 +CVE-2021-46971: Fixed with 5.12.2 +CVE-2021-46972: Fixed with 5.12.2 +CVE-2021-46973: Fixed with 5.12.2 +CVE-2021-46974: Fixed with 5.12.2 +CVE-2021-46976: Fixed with 5.12.5 +CVE-2021-46977: Fixed with 5.12.5 +CVE-2021-46978: Fixed with 5.12.5 +CVE-2021-46979: Fixed with 5.12.5 +CVE-2021-46980: Fixed with 5.12.5 +CVE-2021-46981: Fixed with 5.12.5 +CVE-2021-46982: Fixed with 5.12.5 +CVE-2021-46983: Fixed with 5.12.5 +CVE-2021-46984: Fixed with 5.12.5 +CVE-2021-46985: Fixed with 5.12.5 +CVE-2021-46986: Fixed with 5.12.5 +CVE-2021-46987: Fixed with 5.12.5 +CVE-2021-46988: Fixed with 5.12.5 +CVE-2021-46989: Fixed with 5.12.5 +CVE-2021-46990: Fixed with 5.12.5 +CVE-2021-46991: Fixed with 5.12.5 +CVE-2021-46992: Fixed with 5.12.5 +CVE-2021-46993: Fixed with 5.12.5 +CVE-2021-46994: Fixed with 5.12.5 +CVE-2021-46995: Fixed with 5.12.5 +CVE-2021-46996: Fixed with 5.12.5 +CVE-2021-46997: Fixed with 5.12.5 +CVE-2021-46998: Fixed with 5.12.5 +CVE-2021-46999: Fixed with 5.12.5 +CVE-2021-47000: Fixed with 5.12.5 +CVE-2021-47001: Fixed with 5.12.5 +CVE-2021-47002: Fixed with 5.12.5 +CVE-2021-47003: Fixed with 5.12.5 +CVE-2021-47004: Fixed with 5.12.5 +CVE-2021-47005: Fixed with 5.12.5 +CVE-2021-47006: Fixed with 5.12.5 +CVE-2021-47007: Fixed with 5.12.5 +CVE-2021-47008: Fixed with 5.12.5 +CVE-2021-47009: Fixed with 5.12.5 +CVE-2021-47010: Fixed with 5.12.4 +CVE-2021-47011: Fixed with 5.12.4 +CVE-2021-47012: Fixed with 5.12.4 +CVE-2021-47013: Fixed with 5.12.4 +CVE-2021-47014: Fixed with 5.12.4 +CVE-2021-47015: Fixed with 5.12.4 +CVE-2021-47016: Fixed with 5.12.4 +CVE-2021-47017: Fixed with 5.12.4 +CVE-2021-47018: Fixed with 5.12.4 +CVE-2021-47019: Fixed with 5.12.4 +CVE-2021-47020: Fixed with 5.12.4 +CVE-2021-47021: Fixed with 5.12.4 +CVE-2021-47022: Fixed with 5.12.4 +CVE-2021-47023: Fixed with 5.12.4 +CVE-2021-47024: Fixed with 5.12.4 +CVE-2021-47025: Fixed with 5.12.4 +CVE-2021-47026: Fixed with 5.12.4 +CVE-2021-47027: Fixed with 5.12.4 +CVE-2021-47028: Fixed with 5.12.4 +CVE-2021-47029: Fixed with 5.12.4 +CVE-2021-47030: Fixed with 5.12.4 +CVE-2021-47031: Fixed with 5.12.4 +CVE-2021-47032: Fixed with 5.12.4 +CVE-2021-47033: Fixed with 5.12.4 +CVE-2021-47034: Fixed with 5.12.4 +CVE-2021-47035: Fixed with 5.12.4 +CVE-2021-47036: Fixed with 5.12.4 +CVE-2021-47037: Fixed with 5.12.4 +CVE-2021-47038: Fixed with 5.12.4 +CVE-2021-47039: Fixed with 5.12.4 +CVE-2021-47040: Fixed with 5.12.4 +CVE-2021-47041: Fixed with 5.12.4 +CVE-2021-47042: Fixed with 5.12.4 +CVE-2021-47043: Fixed with 5.12.4 +CVE-2021-47044: Fixed with 5.12.4 +CVE-2021-47045: Fixed with 5.12.4 +CVE-2021-47046: Fixed with 5.12.4 +CVE-2021-47047: Fixed with 5.12.4 +CVE-2021-47048: Fixed with 5.12.4 +CVE-2021-47049: Fixed with 5.12.4 +CVE-2021-47050: Fixed with 5.12.4 +CVE-2021-47051: Fixed with 5.12.4 +CVE-2021-47052: Fixed with 5.12.4 +CVE-2021-47053: Fixed with 5.12.4 +CVE-2021-47054: Fixed with 5.12.4 +CVE-2021-47055: Fixed with 5.12.4 +CVE-2021-47056: Fixed with 5.12.4 +CVE-2021-47057: Fixed with 5.12.4 +CVE-2021-47058: Fixed with 5.12.4 +CVE-2021-47059: Fixed with 5.12.4 +CVE-2021-47060: Fixed with 5.12.4 +CVE-2021-47061: Fixed with 5.12.4 +CVE-2021-47062: Fixed with 5.12.4 +CVE-2021-47063: Fixed with 5.12.4 +CVE-2021-47064: Fixed with 5.12.4 +CVE-2021-47065: Fixed with 5.12.4 +CVE-2021-47066: Fixed with 5.12.4 +CVE-2021-47067: Fixed with 5.12.4 +CVE-2021-47068: Fixed with 5.12.4 +CVE-2021-47069: Fixed with 5.12.7 +CVE-2021-47070: Fixed with 5.12.7 +CVE-2021-47071: Fixed with 5.12.7 +CVE-2021-47072: Fixed with 5.12.7 +CVE-2021-47073: Fixed with 5.12.7 +CVE-2021-47074: Fixed with 5.12.7 +CVE-2021-47075: Fixed with 5.12.7 +CVE-2021-47076: Fixed with 5.12.7 +CVE-2021-47077: Fixed with 5.12.7 +CVE-2021-47078: Fixed with 5.12.7 +CVE-2021-47079: Fixed with 5.12.7 +CVE-2021-47080: Fixed with 5.12.7 +CVE-2021-47081: Fixed with 5.12.7 +CVE-2021-47082: Fix not seen in stream +CVE-2021-47083: Fix not seen in stream +CVE-2021-47086: Fix not seen in stream +CVE-2021-47089: Fix not seen in stream +CVE-2021-47090: Fix not seen in stream +CVE-2021-47091: Fix not seen in stream +CVE-2021-47093: Fix not seen in stream +CVE-2021-47094: Fix not seen in stream +CVE-2021-47095: Fix not seen in stream +CVE-2021-47097: Fix not seen in stream +CVE-2021-47100: Fix not seen in stream +CVE-2021-47101: Fix not seen in stream +CVE-2021-47103: Fix not seen in stream +CVE-2021-47105: Fix not seen in stream +CVE-2021-47109: Fixed with 5.12.10 +CVE-2021-47110: Fixed with 5.12.10 +CVE-2021-47111: Fixed with 5.12.10 +CVE-2021-47112: Fixed with 5.12.10 +CVE-2021-47113: Fixed with 5.12.10 +CVE-2021-47114: Fixed with 5.12.10 +CVE-2021-47116: Fixed with 5.12.10 +CVE-2021-47117: Fixed with 5.12.10 +CVE-2021-47118: Fixed with 5.12.10 +CVE-2021-47119: Fixed with 5.12.18 +CVE-2021-47120: Fixed with 5.12.10 +CVE-2021-47121: Fixed with 5.12.10 +CVE-2021-47122: Fixed with 5.12.10 +CVE-2021-47123: Fixed with 5.12.10 +CVE-2021-47124: Fixed with 5.12.19 +CVE-2021-47125: Fixed with 5.12.10 +CVE-2021-47126: Fixed with 5.12.10 +CVE-2021-47127: Fixed with 5.12.10 +CVE-2021-47128: Fixed with 5.12.10 +CVE-2021-47129: Fixed with 5.12.10 +CVE-2021-47130: Fixed with 5.12.10 +CVE-2021-47131: Fixed with 5.12.10 +CVE-2021-47132: Fixed with 5.12.10 +CVE-2021-47133: Fixed with 5.12.10 +CVE-2021-47134: Fixed with 5.12.10 +CVE-2021-47135: Fixed with 5.12.10 +CVE-2021-47136: Fixed with 5.12.9 +CVE-2021-47137: Fixed with 5.12.9 +CVE-2021-47138: Fixed with 5.12.9 +CVE-2021-47139: Fixed with 5.12.9 +CVE-2021-47140: Fixed with 5.12.9 +CVE-2021-47141: Fixed with 5.12.9 +CVE-2021-47142: Fixed with 5.12.9 +CVE-2021-47143: Fixed with 5.12.9 +CVE-2021-47144: Fixed with 5.12.9 +CVE-2021-47145: Fixed with 5.12.9 +CVE-2021-47146: Fixed with 5.12.9 +CVE-2021-47147: Fixed with 5.12.9 +CVE-2021-47148: Fixed with 5.12.9 +CVE-2021-47149: Fixed with 5.12.9 +CVE-2021-47150: Fixed with 5.12.9 +CVE-2021-47151: Fixed with 5.12.9 +CVE-2021-47152: Fixed with 5.12.9 +CVE-2021-47153: Fixed with 5.12.9 +CVE-2021-47158: Fixed with 5.12.9 +CVE-2021-47159: Fixed with 5.12.9 +CVE-2021-47160: Fixed with 5.12.9 +CVE-2021-47161: Fixed with 5.12.9 +CVE-2021-47162: Fixed with 5.12.9 +CVE-2021-47163: Fixed with 5.12.9 +CVE-2021-47164: Fixed with 5.12.9 +CVE-2021-47165: Fixed with 5.12.9 +CVE-2021-47166: Fixed with 5.12.9 +CVE-2021-47167: Fixed with 5.12.9 +CVE-2021-47168: Fixed with 5.12.9 +CVE-2021-47169: Fixed with 5.12.9 +CVE-2021-47170: Fixed with 5.12.9 +CVE-2021-47171: Fixed with 5.12.9 +CVE-2021-47172: Fixed with 5.12.9 +CVE-2021-47173: Fixed with 5.12.9 +CVE-2021-47174: Fixed with 5.12.9 +CVE-2021-47175: Fixed with 5.12.9 +CVE-2021-47176: Fixed with 5.12.9 +CVE-2021-47177: Fixed with 5.12.9 +CVE-2021-47178: Fixed with 5.12.9 +CVE-2021-47179: Fixed with 5.12.9 +CVE-2021-47180: Fixed with 5.12.8 CVE-2022-0001: Fix not seen in stream CVE-2022-0002: Fix not seen in stream CVE-2022-0168: Fix not seen in stream @@ -443,6 +696,10 @@ CVE-2022-47520: Fix not seen in stream CVE-2022-47521: Fix not seen in stream CVE-2022-47929: Fix not seen in stream CVE-2022-48619: Fix not seen in stream +CVE-2022-48626: Fix not seen in stream +CVE-2022-48627: Fix not seen in stream +CVE-2022-48628: Fix not seen in stream +CVE-2022-48629: Fix not seen in stream CVE-2023-0045: Fix not seen in stream CVE-2023-0047: Fix not seen in stream CVE-2023-0160: Fix not seen in stream @@ -528,6 +785,7 @@ CVE-2023-28328: Fix not seen in stream CVE-2023-28410: Fix not seen in stream CVE-2023-28466: Fix not seen in stream CVE-2023-2860: Fix not seen in stream +CVE-2023-28746: Fix not seen in stream CVE-2023-28772: Fixed with 5.12.18 CVE-2023-2898: Fix not seen in stream CVE-2023-2985: Fix not seen in stream @@ -622,7 +880,7 @@ CVE-2023-46343: Fix not seen in stream CVE-2023-46813: Fix not seen in stream CVE-2023-46838: Fix not seen in stream CVE-2023-46862: Fix not seen in stream -CVE-2023-47233: Fix unknown +CVE-2023-47233: Fix not seen in stream CVE-2023-4732: Fix not seen in stream CVE-2023-4881: Fix not seen in stream CVE-2023-4921: Fix not seen in stream @@ -652,19 +910,128 @@ CVE-2023-52451: Fix not seen in stream CVE-2023-52452: Fix not seen in stream CVE-2023-52454: Fix not seen in stream CVE-2023-52456: Fix not seen in stream -CVE-2023-52457: Fix not seen in stream CVE-2023-52458: Fix not seen in stream CVE-2023-52463: Fix not seen in stream CVE-2023-52464: Fix not seen in stream +CVE-2023-52467: Fix not seen in stream +CVE-2023-52469: Fix not seen in stream +CVE-2023-52470: Fix not seen in stream +CVE-2023-52474: Fix not seen in stream +CVE-2023-52475: Fix not seen in stream +CVE-2023-52476: Fix not seen in stream +CVE-2023-52477: Fix not seen in stream +CVE-2023-52478: Fix not seen in stream +CVE-2023-52479: Fix not seen in stream +CVE-2023-52480: Fix not seen in stream +CVE-2023-52481: Fix not seen in stream +CVE-2023-52482: Fix not seen in stream +CVE-2023-52484: Fix not seen in stream +CVE-2023-52485: Fix not seen in stream +CVE-2023-52486: Fix not seen in stream +CVE-2023-52488: Fix not seen in stream +CVE-2023-52489: Fix not seen in stream +CVE-2023-52491: Fix not seen in stream +CVE-2023-52492: Fix not seen in stream +CVE-2023-52493: Fix not seen in stream +CVE-2023-52497: Fix not seen in stream +CVE-2023-52498: Fix not seen in stream +CVE-2023-52499: Fix not seen in stream +CVE-2023-52500: Fix not seen in stream +CVE-2023-52501: Fix not seen in stream +CVE-2023-52502: Fix not seen in stream +CVE-2023-52503: Fix not seen in stream +CVE-2023-52504: Fix not seen in stream +CVE-2023-52506: Fix not seen in stream +CVE-2023-52507: Fix not seen in stream +CVE-2023-52508: Fix not seen in stream +CVE-2023-52509: Fix not seen in stream +CVE-2023-52510: Fix not seen in stream +CVE-2023-52511: Fix not seen in stream +CVE-2023-52513: Fix not seen in stream +CVE-2023-52515: Fix not seen in stream +CVE-2023-52516: Fix not seen in stream +CVE-2023-52517: Fix not seen in stream +CVE-2023-52519: Fix not seen in stream +CVE-2023-52522: Fix not seen in stream +CVE-2023-52527: Fix not seen in stream +CVE-2023-52528: Fix not seen in stream +CVE-2023-52530: Fix not seen in stream +CVE-2023-52531: Fix not seen in stream +CVE-2023-52532: Fix not seen in stream +CVE-2023-52559: Fix not seen in stream +CVE-2023-52561: Fix not seen in stream +CVE-2023-52563: Fix not seen in stream +CVE-2023-52565: Fix not seen in stream +CVE-2023-52566: Fix not seen in stream +CVE-2023-52568: Fix not seen in stream +CVE-2023-52569: Fix not seen in stream +CVE-2023-52571: Fix not seen in stream +CVE-2023-52572: Fix not seen in stream +CVE-2023-52573: Fix not seen in stream +CVE-2023-52574: Fix not seen in stream +CVE-2023-52578: Fix not seen in stream +CVE-2023-52580: Fix not seen in stream +CVE-2023-52583: Fix not seen in stream +CVE-2023-52584: Fix not seen in stream +CVE-2023-52585: Fix not seen in stream +CVE-2023-52586: Fix not seen in stream +CVE-2023-52587: Fix not seen in stream +CVE-2023-52588: Fix not seen in stream +CVE-2023-52589: Fix not seen in stream +CVE-2023-52590: Fix not seen in stream +CVE-2023-52591: Fix not seen in stream +CVE-2023-52593: Fix not seen in stream +CVE-2023-52594: Fix not seen in stream +CVE-2023-52595: Fix not seen in stream +CVE-2023-52596: Fix not seen in stream +CVE-2023-52597: Fix not seen in stream +CVE-2023-52598: Fix not seen in stream +CVE-2023-52599: Fix not seen in stream +CVE-2023-52600: Fix not seen in stream +CVE-2023-52601: Fix not seen in stream +CVE-2023-52602: Fix not seen in stream +CVE-2023-52603: Fix not seen in stream +CVE-2023-52604: Fix not seen in stream +CVE-2023-52606: Fix not seen in stream +CVE-2023-52607: Fix not seen in stream +CVE-2023-52608: Fix not seen in stream +CVE-2023-52609: Fix not seen in stream +CVE-2023-52610: Fix not seen in stream +CVE-2023-52612: Fix not seen in stream +CVE-2023-52614: Fix not seen in stream +CVE-2023-52615: Fix not seen in stream +CVE-2023-52616: Fix not seen in stream +CVE-2023-52617: Fix not seen in stream +CVE-2023-52618: Fix not seen in stream +CVE-2023-52619: Fix not seen in stream +CVE-2023-52620: Fix not seen in stream +CVE-2023-52621: Fix not seen in stream +CVE-2023-52622: Fix not seen in stream +CVE-2023-52623: Fix not seen in stream +CVE-2023-52624: Fix not seen in stream +CVE-2023-52625: Fix not seen in stream +CVE-2023-52627: Fix not seen in stream +CVE-2023-52628: Fix not seen in stream +CVE-2023-52629: Fix not seen in stream +CVE-2023-52630: Fix not seen in stream +CVE-2023-52632: Fix not seen in stream +CVE-2023-52633: Fix not seen in stream +CVE-2023-52634: Fix not seen in stream +CVE-2023-52635: Fix not seen in stream +CVE-2023-52637: Fix not seen in stream +CVE-2023-52638: Fix not seen in stream +CVE-2023-52639: Fix not seen in stream +CVE-2023-52640: Fix not seen in stream +CVE-2023-52641: Fix not seen in stream CVE-2023-5717: Fix not seen in stream CVE-2023-6040: Fix not seen in stream CVE-2023-6121: Fix not seen in stream CVE-2023-6176: Fix not seen in stream CVE-2023-6240: Fix unknown -CVE-2023-6270: Fix unknown -CVE-2023-6356: Fix unknown +CVE-2023-6270: Fix not seen in stream +CVE-2023-6356: Fix not seen in stream CVE-2023-6535: Fix unknown -CVE-2023-6536: Fix unknown +CVE-2023-6536: Fix not seen in stream CVE-2023-6546: Fix not seen in stream CVE-2023-6560: Fix not seen in stream CVE-2023-6606: Fix not seen in stream @@ -674,7 +1041,7 @@ CVE-2023-6817: Fix not seen in stream CVE-2023-6915: Fix not seen in stream CVE-2023-6931: Fix not seen in stream CVE-2023-6932: Fix not seen in stream -CVE-2023-7042: Fix unknown +CVE-2023-7042: Fix not seen in stream CVE-2023-7192: Fix not seen in stream CVE-2024-0340: Fix not seen in stream CVE-2024-0564: Fix unknown @@ -684,15 +1051,16 @@ CVE-2024-0607: Fix not seen in stream CVE-2024-0641: Fix not seen in stream CVE-2024-0646: Fix not seen in stream CVE-2024-0775: Fix not seen in stream -CVE-2024-0841: Fix unknown +CVE-2024-0841: Fix not seen in stream CVE-2024-1086: Fix not seen in stream CVE-2024-1151: Fix not seen in stream CVE-2024-1312: Fix not seen in stream CVE-2024-21803: Fix unknown -CVE-2024-22099: Fix unknown +CVE-2024-2193: Fix unknown +CVE-2024-22099: Fix not seen in stream CVE-2024-22386: Fix unknown -CVE-2024-23196: Fix unknown -CVE-2024-23307: Fix unknown +CVE-2024-23196: Fix not seen in stream +CVE-2024-23307: Fix not seen in stream CVE-2024-23848: Fix unknown CVE-2024-23849: Fix not seen in stream CVE-2024-23850: Fix not seen in stream @@ -702,7 +1070,7 @@ CVE-2024-24857: Fix unknown CVE-2024-24858: Fix unknown CVE-2024-24859: Fix unknown CVE-2024-24860: Fix not seen in stream -CVE-2024-24861: Fix unknown +CVE-2024-24861: Fix not seen in stream CVE-2024-24864: Fix unknown CVE-2024-25739: Fix unknown CVE-2024-25740: Fix unknown @@ -712,13 +1080,136 @@ CVE-2024-26583: Fix not seen in stream CVE-2024-26584: Fix not seen in stream CVE-2024-26585: Fix not seen in stream CVE-2024-26586: Fix not seen in stream -CVE-2024-26587: Fix not seen in stream -CVE-2024-26588: Fix not seen in stream CVE-2024-26589: Fix not seen in stream -CVE-2024-26591: Fix not seen in stream CVE-2024-26592: Fix not seen in stream CVE-2024-26593: Fix not seen in stream CVE-2024-26594: Fix not seen in stream CVE-2024-26595: Fix not seen in stream CVE-2024-26597: Fix not seen in stream CVE-2024-26598: Fix not seen in stream +CVE-2024-26600: Fix not seen in stream +CVE-2024-26601: Fix not seen in stream +CVE-2024-26602: Fix not seen in stream +CVE-2024-26606: Fix not seen in stream +CVE-2024-26607: Fix not seen in stream +CVE-2024-26610: Fix not seen in stream +CVE-2024-26614: Fix not seen in stream +CVE-2024-26615: Fix not seen in stream +CVE-2024-26622: Fix not seen in stream +CVE-2024-26623: Fix not seen in stream +CVE-2024-26625: Fix not seen in stream +CVE-2024-26627: Fix not seen in stream +CVE-2024-26633: Fix not seen in stream +CVE-2024-26635: Fix not seen in stream +CVE-2024-26636: Fix not seen in stream +CVE-2024-26640: Fix not seen in stream +CVE-2024-26641: Fix not seen in stream +CVE-2024-26642: Fix not seen in stream +CVE-2024-26644: Fix not seen in stream +CVE-2024-26645: Fix not seen in stream +CVE-2024-26646: Fix not seen in stream +CVE-2024-26647: Fix not seen in stream +CVE-2024-26648: Fix not seen in stream +CVE-2024-26650: Fix not seen in stream +CVE-2024-26651: Fix not seen in stream +CVE-2024-26654: Fix not seen in stream +CVE-2024-26655: Fix not seen in stream +CVE-2024-26656: Fix not seen in stream +CVE-2024-26658: Fix not seen in stream +CVE-2024-26659: Fix not seen in stream +CVE-2024-26660: Fix not seen in stream +CVE-2024-26661: Fix not seen in stream +CVE-2024-26662: Fix not seen in stream +CVE-2024-26663: Fix not seen in stream +CVE-2024-26664: Fix not seen in stream +CVE-2024-26665: Fix not seen in stream +CVE-2024-26668: Fix not seen in stream +CVE-2024-26669: Fix not seen in stream +CVE-2024-26671: Fix not seen in stream +CVE-2024-26672: Fix not seen in stream +CVE-2024-26673: Fix not seen in stream +CVE-2024-26675: Fix not seen in stream +CVE-2024-26676: Fix not seen in stream +CVE-2024-26677: Fix not seen in stream +CVE-2024-26679: Fix not seen in stream +CVE-2024-26680: Fix not seen in stream +CVE-2024-26684: Fix not seen in stream +CVE-2024-26685: Fix not seen in stream +CVE-2024-26686: Fix not seen in stream +CVE-2024-26687: Fix not seen in stream +CVE-2024-26688: Fix not seen in stream +CVE-2024-26689: Fix not seen in stream +CVE-2024-26691: Fix not seen in stream +CVE-2024-26696: Fix not seen in stream +CVE-2024-26697: Fix not seen in stream +CVE-2024-26698: Fix not seen in stream +CVE-2024-26699: Fix not seen in stream +CVE-2024-26700: Fix not seen in stream +CVE-2024-26702: Fix not seen in stream +CVE-2024-26704: Fix not seen in stream +CVE-2024-26706: Fix not seen in stream +CVE-2024-26707: Fix not seen in stream +CVE-2024-26712: Fix not seen in stream +CVE-2024-26713: Fix not seen in stream +CVE-2024-26715: Fix not seen in stream +CVE-2024-26717: Fix not seen in stream +CVE-2024-26718: Fix not seen in stream +CVE-2024-26719: Fix not seen in stream +CVE-2024-26720: Fix not seen in stream +CVE-2024-26726: Fix not seen in stream +CVE-2024-26727: Fix not seen in stream +CVE-2024-26733: Fix not seen in stream +CVE-2024-26735: Fix not seen in stream +CVE-2024-26736: Fix not seen in stream +CVE-2024-26738: Fix not seen in stream +CVE-2024-26739: Fix not seen in stream +CVE-2024-26740: Fix not seen in stream +CVE-2024-26743: Fix not seen in stream +CVE-2024-26744: Fix not seen in stream +CVE-2024-26745: Fix not seen in stream +CVE-2024-26747: Fix not seen in stream +CVE-2024-26748: Fix not seen in stream +CVE-2024-26749: Fix not seen in stream +CVE-2024-26751: Fix not seen in stream +CVE-2024-26752: Fix not seen in stream +CVE-2024-26754: Fix not seen in stream +CVE-2024-26756: Fix not seen in stream +CVE-2024-26757: Fix not seen in stream +CVE-2024-26758: Fix not seen in stream +CVE-2024-26759: Fix not seen in stream +CVE-2024-26763: Fix not seen in stream +CVE-2024-26764: Fix not seen in stream +CVE-2024-26765: Fix not seen in stream +CVE-2024-26766: Fix not seen in stream +CVE-2024-26767: Fix not seen in stream +CVE-2024-26768: Fix not seen in stream +CVE-2024-26769: Fix not seen in stream +CVE-2024-26770: Fix not seen in stream +CVE-2024-26771: Fix not seen in stream +CVE-2024-26772: Fix not seen in stream +CVE-2024-26773: Fix not seen in stream +CVE-2024-26774: Fix not seen in stream +CVE-2024-26775: Fix not seen in stream +CVE-2024-26776: Fix not seen in stream +CVE-2024-26777: Fix not seen in stream +CVE-2024-26778: Fix not seen in stream +CVE-2024-26779: Fix not seen in stream +CVE-2024-26782: Fix not seen in stream +CVE-2024-26784: Fix not seen in stream +CVE-2024-26787: Fix not seen in stream +CVE-2024-26788: Fix not seen in stream +CVE-2024-26789: Fix not seen in stream +CVE-2024-26790: Fix not seen in stream +CVE-2024-26791: Fix not seen in stream +CVE-2024-26793: Fix not seen in stream +CVE-2024-26795: Fix not seen in stream +CVE-2024-26797: Fix not seen in stream +CVE-2024-26798: Fix not seen in stream +CVE-2024-26801: Fix not seen in stream +CVE-2024-26802: Fix not seen in stream +CVE-2024-26803: Fix not seen in stream +CVE-2024-26804: Fix not seen in stream +CVE-2024-26805: Fix not seen in stream +CVE-2024-26806: Fix not seen in stream +CVE-2024-26808: Fix not seen in stream +CVE-2024-26809: Fix not seen in stream diff --git a/data/5.12/5.12_security.txt b/data/5.12/5.12_security.txt index dc1584c5d..a2782a5a9 100644 --- a/data/5.12/5.12_security.txt +++ b/data/5.12/5.12_security.txt @@ -1,16 +1,68 @@ CVEs fixed in 5.12: CVE-2019-15794: 2896900e22f8212606a1837d89a6bbce314ceeda ovl: fix reference counting in ovl_mmap error path + CVE-2021-46921: 84a24bf8c52e66b7ac89ada5e3cfbe72d65c1896 locking/qrwlock: Fix ordering in queued_write_lock_slowpath() + CVE-2021-46922: 9d5171eab462a63e2fbebfccf6026e92be018f20 KEYS: trusted: Fix TPM reservation for seal/unseal + +CVEs fixed in 5.12.1: + CVE-2021-46905: 41c44e1f3112d7265dae522c026399b2a42d19ef net: hso: fix NULL-deref on disconnect regression CVEs fixed in 5.12.2: CVE-2021-31829: 7cf64d8679ca1cb20cf57d6a88bfee79a0922a66 bpf: Fix masking negation logic upon negative dst register CVE-2021-38209: 671c54ea8c7ff47bd88444f3fffb65bf9799ce43 netfilter: conntrack: Make global sysctls readonly in non-init netns + CVE-2021-46971: c7b0208ee370b89d20486fae71cd9abb759819c1 perf/core: Fix unconditional security_locked_down() call + CVE-2021-46972: d587cfaef72b1b6f4b2774827123bce91f497cc8 ovl: fix leaked dentry + CVE-2021-46973: 03c649dee8b1eb5600212a249542a70f47a5ab40 net: qrtr: Avoid potential use after free in MHI send + CVE-2021-46974: 7cf64d8679ca1cb20cf57d6a88bfee79a0922a66 bpf: Fix masking negation logic upon negative dst register CVEs fixed in 5.12.3: + CVE-2020-36776: 6bf443acf6ca4f666d0e4225614ba9993a3aa1a9 thermal/drivers/cpufreq_cooling: Fix slab OOB issue + CVE-2020-36777: cede24d13be6c2a62be6d7ceea63c2719b0cfa82 media: dvbdev: Fix memory leak in dvb_media_device_free() CVE-2021-3506: 0b60f23e29c8dfcf1b8a037fae1167e4f2e3249e f2fs: fix to avoid out-of-bounds memory access CVE-2021-3543: 3494c68d79cbb7ddff88fd35e0796343ef736606 nitro_enclaves: Fix stale file descriptors on failed usercopy + CVE-2021-46938: d757bf4c69cda3c3ab7f775dfabbf5a80e2f6f9d dm rq: fix double free of blk_mq_tag_set in dev remove after table load fails + CVE-2021-46939: 2a1bd74b8186d7938bf004f5603f25b84785f63e tracing: Restructure trace_clock_global() to never block + CVE-2021-46940: 337b1546cde87fb8588ddaedf0201b769baa572a tools/power turbostat: Fix offset overflow issue in index converting + CVE-2021-46941: 1c10fd60c8595ea7ff7e29d3cf1fa88069941da3 usb: dwc3: core: Do core softreset when switch mode + CVE-2021-46942: cb5e0b3d0f993a6268c1a2c7ede2f9aa0c17ef68 io_uring: fix shared sqpoll cancellation hangs + CVE-2021-46943: 6fb617e37a39db0a3eca4489431359d0bdf3b9bc media: staging/intel-ipu3: Fix set_fmt error handling + CVE-2021-46944: 74ba0adb5e983503b18a96121d965cad34ac7ce3 media: staging/intel-ipu3: Fix memory leak in imu_fmt + CVE-2021-46945: 1e9ea8f4637026b8e965128953f2da061ccae9c4 ext4: always panic when errors=panic is specified + CVE-2021-46947: ebeac958b690123a0b40aa61f688f2f170035fad sfc: adjust efx->xdp_tx_queue_count with the real number of initialized queues + CVE-2021-46948: e531db1ea6f98c9612cb2de093a107c7eadfb96c sfc: farch: fix TX queue lookup in TX event handling + CVE-2021-46949: 98d91180748986bfb6dfb3e72765f3225719a647 sfc: farch: fix TX queue lookup in TX flush done handling + CVE-2021-46950: 538244fba59fde17186322776247cd9c05be86dd md/raid1: properly indicate failure when ending a failed write request + CVE-2021-46951: ac07c557ca12ec9276c0375517bac7ae5be4e50c tpm: efi: Use local variable for calculating final log size + CVE-2021-46952: 3d0163821c035040a46d816a42c0780f0f0a30a8 NFS: fs_context: validate UDP retrans to prevent shift out-of-bounds + CVE-2021-46953: 596e079c362ac17ed02aa1b99fdc444d62072a01 ACPI: GTDT: Don't corrupt interrupt mappings on watchdow probe failure + CVE-2021-46954: 8e6dfb7beeb6489ac1365b8a71052e737f5da76e net/sched: sch_frag: fix stack OOB read while fragmenting IPv4 packets + CVE-2021-46955: b3502b04e84ac5349be95fc033c17bd701d2787a openvswitch: fix stack OOB read while fragmenting IPv4 packets + CVE-2021-46956: 5116e79fc6e6725b8acdad8b7e928a83ab7b47e6 virtiofs: fix memory leak in virtio_fs_probe() + CVE-2021-46957: fd0f06590d35c99f98d12c7984897ec4201a6263 riscv/kprobe: fix kernel panic when invoking sys_read traced by kprobe + CVE-2021-46958: e2da98788369bfba1138bada72765c47989a4338 btrfs: fix race between transaction aborts and fsyncs leading to use-after-free + CVE-2021-46960: b399c1a3ea0b9d10047ff266d65533df7f15532f cifs: Return correct error code from smb2_get_enc_key + CVE-2021-46961: 3f72d3709f53af72835af7dc8b15ba61611a0e36 irqchip/gic-v3: Do not enable irqs when handling spurious interrups + CVE-2021-46962: d6e7fda496978f2763413b5523557b38dc2bf6c2 mmc: uniphier-sd: Fix a resource leak in the remove function + CVE-2021-46963: a73208e3244127ef9f2cdf24e4adb947aaa32053 scsi: qla2xxx: Fix crash in qla2xxx_mqueuecommand() + CVE-2021-46964: 0f86d66b38501e3ac66cf2d9f9f8ad6838bad0e6 scsi: qla2xxx: Reserve extra IRQ vectors + CVE-2021-46965: 4d786870e3262ec098a3b4ed10b895176bc66ecb mtd: physmap: physmap-bt1-rom: Fix unintentional stack access + CVE-2021-46966: b7a5baaae212a686ceb812c32fceed79c03c0234 ACPI: custom_method: fix potential use-after-free issue + CVE-2021-46967: 93dbbf20e3ffad14f04227a0b7105f6e6f0387ce vhost-vdpa: fix vm_flags for virtqueue doorbell mapping + CVE-2021-46968: 971dc8706cee47393d393905d294ea47e39503d3 s390/zcrypt: fix zcard and zqueue hot-unplug memleak + CVE-2021-46969: a99b661c3187365f81026d89b1133a76cd2652b3 bus: mhi: core: Fix invalid error returning in mhi_queue + CVE-2021-46970: ed541cff35cbdb695f0c98ef506dd7218883fc07 bus: mhi: pci_generic: Remove WQ_MEM_RECLAIM flag from state workqueue CVEs fixed in 5.12.4: + CVE-2020-36778: a42ac16e6573f19c78f556ea292f5b534fcc4514 i2c: xiic: fix reference leak when pm_runtime_get_sync fails + CVE-2020-36779: c7ea772c9fcf711ed566814b92eecaffc0e2bfd0 i2c: stm32f7: fix reference leak when pm_runtime_get_sync fails + CVE-2020-36780: d3406ab52097328a3bc4cbe124bfd8f6d51fb86f i2c: sprd: fix reference leak when pm_runtime_get_sync fails + CVE-2020-36781: ff406f6cd09c273337ab4854292e4aca48f8affd i2c: imx: fix reference leak when pm_runtime_get_sync fails + CVE-2020-36782: b100650d80cd2292f6c152f5f2943b5944b3e8ce i2c: imx-lpi2c: fix reference leak when pm_runtime_get_sync fails + CVE-2020-36783: 7ee35cde1e810ad6ca589980b9ec2b7b62946a5b i2c: img-scb: fix reference leak when pm_runtime_get_sync fails + CVE-2020-36784: a45fc41beed8e0fe31864619c34aa00797fb60c1 i2c: cadence: fix reference leak when pm_runtime_get_sync fails + CVE-2020-36785: 8267ccd7b9df7ab682043507dd682fe0621cf045 media: atomisp: Fix use after free in atomisp_alloc_css_stat_bufs() + CVE-2020-36786: 27d2eab69f7da8e94e4751ac5c6d22d809275484 media: [next] staging: media: atomisp: fix memory leak of object flash + CVE-2020-36787: 75321dc8aebe3f30eff226028fe6da340fe0bf02 media: aspeed: fix clock handling logic CVE-2021-23134: 18175fe17ae043a0b81e5d511f8817825784c299 net/nfc: fix use-after-free llcp_sock_bind/connect CVE-2021-31440: b64a9914918d4f2112fd244fe7bb6f98b20e8f60 bpf: Fix propagation of 32 bit unsigned bounds from 64 bit bounds CVE-2021-32399: 93d388c087d71aed0e79b8c7db3132f28c010197 bluetooth: eliminate the potential race condition when removing the HCI controller @@ -19,17 +71,124 @@ CVEs fixed in 5.12.4: CVE-2021-3490: 9fdd1d10daac186e21a77290f9d22b41e175e1b9 bpf: Fix alu32 const subreg bound tracking on bitwise operations CVE-2021-3491: ca2960d35c36f2e601563c49f6673efd111b94c0 io_uring: truncate lengths larger than MAX_RW_COUNT on provide buffers CVE-2021-45486: 806245375ff907cc8771de7a11585992a96d7937 inet: use bigger hash table for IP ID generation + CVE-2021-47010: e7d7bedd507bb732e600403b7a96f9fe48d0ca31 net: Only allow init netns to set default tcp cong to a restricted algo + CVE-2021-47011: c3ae6a3f3ca4f02f6ccddf213c027302586580d0 mm: memcontrol: slab: fix obtain a reference to a freeing memcg + CVE-2021-47012: ad9ce7188432650469a6c7625bf479f5ed0b6155 RDMA/siw: Fix a use after free in siw_alloc_mr + CVE-2021-47013: e407495ba6788a67d1bd41714158c079e340879b net:emac/emac-mac: Fix a use after free in emac_mac_tx_buf_send + CVE-2021-47014: 0648941f4c8bbf8b4b6c0b270889ae7aa769b921 net/sched: act_ct: fix wild memory access when clearing fragments + CVE-2021-47015: 3fbc5bc651d688fbea2a59cdc91520a2f5334d0a bnxt_en: Fix RX consumer index logic in the error path. + CVE-2021-47016: 5d34225169346cab5145978d153b9ce90e9ace21 m68k: mvme147,mvme16x: Don't wipe PCC timer config bits + CVE-2021-47017: 5e413c0831ff4700d1739db3fa3ae9f859744676 ath10k: Fix a use after free in ath10k_htc_send_bundle + CVE-2021-47018: a84df7c80bdac598d6ac9268ae578da6928883e8 powerpc/64: Fix the definition of the fixmap area + CVE-2021-47019: b13cbc536990ff609afa878b6211cd6f6265ba60 mt76: mt7921: fix possible invalid register access + CVE-2021-47020: effd2bd62b416f6629e18e3ce077c60de14cfdea soundwire: stream: fix memory leak in stream config error path + CVE-2021-47021: d754c80ae82a662e692a82faad71b8c218cb7f52 mt76: mt7915: fix memleak when mt7915_unregister_device() + CVE-2021-47022: 6c5b2b0c6e5a6ce2d8f9f85b8b72bfad60eaa506 mt76: mt7615: fix memleak when mt7615_unregister_device() + CVE-2021-47023: 9d1ba11fabdd8f25abb24272ef1621417981320b net: marvell: prestera: fix port event handling on init + CVE-2021-47024: 37c38674ef2f8d7e8629e5d433c37d6c1273d16b vsock/virtio: free queued packets when closing socket + CVE-2021-47025: 5cad9e2caa9613fdcd246bd4ebf0ffbec1cba2ca iommu/mediatek: Always enable the clk on resume + CVE-2021-47026: d3cca8067d43dfee4a3535c645b55f618708dccb RDMA/rtrs-clt: destroy sysfs after removing session from active list + CVE-2021-47027: a46b536cd60c0dbd4bf767c62a8774dec52bf099 mt76: mt7921: fix kernel crash when the firmware fails to download + CVE-2021-47028: 4bd926e5ca88eac4d95eacb806b229f8729bc62e mt76: mt7915: fix txrate reporting + CVE-2021-47029: 2554b9cb4b5e097c6071ec3ed5bc7c665c477ca7 mt76: connac: fix kernel warning adding monitor interface + CVE-2021-47030: 54b989653c5531bc4416ced33f146b9cb633d978 mt76: mt7615: fix memory leak in mt7615_coredump_work + CVE-2021-47031: 4811226374453607175ea057777faa7e7f752204 mt76: mt7921: fix memory leak in mt7921_coredump_work + CVE-2021-47032: e2cdc9cb33c5963efe1a7c022753386f9463d1b7 mt76: mt7915: fix tx skb dma unmap + CVE-2021-47033: 821ae236ccea989a1fcc6abfc4d5b74ad4ba39d2 mt76: mt7615: fix tx skb dma unmap + CVE-2021-47034: e40c52ee67b155ad59f59e73ea136d02685f0e0d powerpc/64s: Fix pte update for kernel memory on radix + CVE-2021-47035: 66c24699f266ff310381a9552d3576eea8ad6e20 iommu/vt-d: Remove WO permissions on second-level paging entries + CVE-2021-47036: 450687386cd16d081b58cd7a342acff370a96078 udp: skip L4 aggregation for UDP tunnel packets + CVE-2021-47037: 62413972f5266568848a36fd15160397b211fa74 ASoC: q6afe-clocks: fix reprobing of the driver + CVE-2021-47038: 332e69eb3bd90370f2d9f2c2ca7974ff523dea17 Bluetooth: avoid deadlock between hci_dev->lock and socket lock + CVE-2021-47039: 2a3a8bbca28b899806844c00d49ed1b7ccb50957 ataflop: potential out of bounds in do_format() + CVE-2021-47040: 84b8c266c4bfe9ed5128e13253c388deb74b1b03 io_uring: fix overflows checks in provide buffers + CVE-2021-47041: 906c538340dde6d891df89fe7dac8eaa724e40da nvmet-tcp: fix incorrect locking in state_change sk callback + CVE-2021-47042: 296443139f893b554dddd56a99ba8471ab5802d4 drm/amd/display: Free local data after use + CVE-2021-47043: 711acdf0228dc71601247f28b56f13e850e395c8 media: venus: core: Fix some resource leaks in the error path of 'venus_probe()' + CVE-2021-47044: 805cea93e66ca7deaaf6ad3b67224ce47c104c2f sched/fair: Fix shift-out-of-bounds in load_balance() + CVE-2021-47045: 9bdcfbed2a9fe24d2c7eaa1bad7c705e18de8cc7 scsi: lpfc: Fix null pointer dereference in lpfc_prep_els_iocb() + CVE-2021-47046: 080bd41d6478a64edf96704fddcda52b1fd5fed7 drm/amd/display: Fix off by one in hdmi_14_process_transaction() + CVE-2021-47047: bad5a23cf2b477fa78b85fd392736dae09a1e818 spi: spi-zynqmp-gqspi: return -ENOMEM if dma_map_single fails + CVE-2021-47048: 23269ac9f123eca3aea7682d3345c02e71ed696c spi: spi-zynqmp-gqspi: fix use-after-free in zynqmp_qspi_exec_op + CVE-2021-47049: 2728f289b3270b0e273292b46c534421a33bbfd5 Drivers: hv: vmbus: Use after free in __vmbus_open() + CVE-2021-47050: a74cb41af7dbe019e4096171f8bc641c7ce910ad memory: renesas-rpc-if: fix possible NULL pointer dereference of resource + CVE-2021-47051: 6a2b5cee0d31ab6cc51030c441135b0e31217282 spi: fsl-lpspi: Fix PM reference leak in lpspi_prepare_xfer_hardware() + CVE-2021-47052: b7bd0657c2036add71981d88a7fae50188150b6e crypto: sa2ul - Fix memory leak of rxd + CVE-2021-47053: d3d702084d125689edb2b9395c707e09b471352e crypto: sun8i-ss - Fix memory leak of pad + CVE-2021-47054: c6f8e0dc8da1cd78d640dee392071cc2326ec1b2 bus: qcom: Put child node before return + CVE-2021-47055: a08799d3e8c8088640956237c183f83463c39668 mtd: require write permissions for locking and badblock ioctls + CVE-2021-47056: 1ea500ce6f7c9106e4a561d28e69215f3d451818 crypto: qat - ADF_STATUS_PF_RUNNING should be set after adf_dev_init + CVE-2021-47057: 6516cb852d704ff8d615de1f93cd443a99736c3d crypto: sun8i-ss - Fix memory leak of object d when dma_iv fails to map + CVE-2021-47058: b9e569ae1da3a113b3acee8703c94777fd20938a regmap: set debugfs_name to NULL after it is freed + CVE-2021-47059: 50e7b39b808430ad49a637dc6fb72ca93b451b13 crypto: sun8i-ss - fix result memory leak on error path + CVE-2021-47060: 50cbad42bfea8c052b7ca590bd4126cdc898713c KVM: Stop looking for coalesced MMIO zones if the bus is destroyed + CVE-2021-47061: 30f46c6993731efb2a690c9197c0fd9ed425da2d KVM: Destroy I/O bus devices on unregister failure _after_ sync'ing SRCU + CVE-2021-47062: ba7bf5d6336aa9c0d977b161bfa420c56d46ee40 KVM: SVM: Use online_vcpus, not created_vcpus, to iterate over vCPUs + CVE-2021-47063: 98d7d76a74e48ec3ddf2e23950adff7edcab9327 drm: bridge/panel: Cleanup connector on bridge detach + CVE-2021-47064: 91b9548d413fda488ea853cd1b9f59b572db3a0c mt76: fix potential DMA mapping leak + CVE-2021-47065: 9cd09722e18a08b6a3d68b8bccfac39ddc22434c rtw88: Fix array overrun in rtw_get_tx_power_params() + CVE-2021-47066: 53f8208e11abd6dde9480dfcb97fecdb1bc2ac18 async_xor: increase src_offs when dropping destination page + CVE-2021-47067: ff39adf5d31c72025bba799aec69c5c86d81d549 soc/tegra: regulators: Fix locking up when voltage-spread is out of range + CVE-2021-47068: 18175fe17ae043a0b81e5d511f8817825784c299 net/nfc: fix use-after-free llcp_sock_bind/connect CVEs fixed in 5.12.5: CVE-2021-4157: 754efbbdaf4e99f9e8d9bd0ef1470ff639cdb5f4 pNFS/flexfiles: fix incorrect size check in decode_nfs_fh() + CVE-2021-46976: f7520970d5353cb1fa4d9089a1b23669c5da97fe drm/i915: Fix crash in auto_retire + CVE-2021-46977: e3ea1895df719c4ef87862501bb10d95f4177bed KVM: VMX: Disable preemption when probing user return MSRs + CVE-2021-46978: bd0e8455b85b651a4c77de9616e307129b15aaa7 KVM: nVMX: Always make an attempt to map eVMCS after migration + CVE-2021-46979: ab6c935ba3a04317632f3b8b68675bdbaf395303 iio: core: fix ioctl handlers removal + CVE-2021-46980: 5e9c6f58b01e6fdfbc740390c01f542a35c97e57 usb: typec: ucsi: Retrieve all the PDOs instead of just the first 4 + CVE-2021-46981: 54b78ba7e96e5fe1edb8054e375d31a6c0dc60dc nbd: Fix NULL pointer in flush_workqueue + CVE-2021-46982: 936158b15e2648253afb824d252c910c496d34b5 f2fs: compress: fix race condition of overwrite vs truncate + CVE-2021-46983: 5bdb34466ad8370546dfa0497594fb1d6f2fed90 nvmet-rdma: Fix NULL deref when SEND is completed with error + CVE-2021-46984: 2ef3c76540c49167a0bc3d5f80d00fd1fc4586df kyber: fix out of bounds access when preempted + CVE-2021-46985: a7e17a8d421ae23c920240625b4413c7b94d94a4 ACPI: scan: Fix a memory leak in an error handling path + CVE-2021-46986: b4b8e9601d7ee8806d2687f081a42485d27674a1 usb: dwc3: gadget: Free gadget structure only after freeing endpoints + CVE-2021-46987: 96157707c0420e3d3edfe046f1cc797fee117ade btrfs: fix deadlock when cloning inline extents and using qgroups + CVE-2021-46988: 2d59a0ed8b26b8f3638d8afc31f839e27759f1f6 userfaultfd: release page in error path to avoid BUG_ON + CVE-2021-46989: 97314e45aa1223a42d60256a62c5d9af54baf446 hfsplus: prevent corruption in shrinking truncate + CVE-2021-46990: 5bc00fdda1e934c557351a9c751a205293e68cbf powerpc/64s: Fix crashes when toggling entry flush barrier + CVE-2021-46991: 1fd5d262e7442192ac7611ff1597a36c5b044323 i40e: Fix use-after-free in i40e_client_subtask() + CVE-2021-46992: a388d10961ff8578b1a6691945d406c0f33aa71b netfilter: nftables: avoid overflows in nft_hash_buckets() + CVE-2021-46993: 42ee47c7e3569d9a0e2cb5053c496d97d380472f sched: Fix out-of-bound access in uclamp + CVE-2021-46994: e1e10a390fd9479209c4d834d916ca5e6d5d396b can: mcp251x: fix resume from sleep before interface was brought up + CVE-2021-46995: 15f8f96ec7fc35024d4e03296e4d838fcea33d83 can: mcp251xfd: mcp251xfd_probe(): fix an error pointer dereference in probe + CVE-2021-46996: dd3bebf515f336214a91994348a2b86b9a1d3d7f netfilter: nftables: Fix a memleak from userdata error path in new objects + CVE-2021-46997: d8d52005f57bbb4a4ec02f647e2555d327135c68 arm64: entry: always set GIC_PRIO_PSR_I_SET during entry + CVE-2021-46998: d90529392aaf498dafa95d212295d64b2cea4e24 ethernet:enic: Fix a use after free bug in enic_hard_start_xmit + CVE-2021-46999: 0bfd913c2121b3d553bfd52810fe6061d542d625 sctp: do asoc update earlier in sctp_sf_do_dupcook_a + CVE-2021-47000: 0a219432127d396120fc88cabd82785e0ff72a2f ceph: fix inode leak on getattr error in __fh_to_dentry + CVE-2021-47001: 19b5fa9489b5706bc878c3a522a7f771079e2fa0 xprtrdma: Fix cwnd update ordering + CVE-2021-47002: c664aaec9aee544538a78ba4893a44bc73a6d742 SUNRPC: Fix null pointer dereference in svc_rqst_free() + CVE-2021-47003: 7bc402f843e7817a4a808e7b9ab0bcd7ffd55bfa dmaengine: idxd: Fix potential null dereference on pointer status + CVE-2021-47004: 211372b2571520e394b56b431a0705586013b3ff f2fs: fix to avoid touching checkpointed data in get_victim() + CVE-2021-47005: 0169d4f0bee44fdfef908c13ed21fcb326c38695 PCI: endpoint: Fix NULL pointer dereference for ->get_features() + CVE-2021-47006: dabe299425b1a53a69461fed7ac8922ea6733a25 ARM: 9064/1: hw_breakpoint: Do not directly check the event's overflow_handler hook + CVE-2021-47007: 822054e5026c43b1dd60cf387dd999e95ee2ecc2 f2fs: fix panic during f2fs_resize_fs() + CVE-2021-47008: fd722a57fe0b80133dacae4e1c852ee4212f9b2e KVM: SVM: Make sure GHCB is mapped before updating + CVE-2021-47009: 3e24fbd37e72e8a67b74991970fecc82d14f57af KEYS: trusted: Fix memory leak on object td CVEs fixed in 5.12.7: CVE-2020-26555: 58cca5ec43be72a1af95f11966381e9953b0c9f5 Bluetooth: SMP: Fail if remote and local public keys are identical CVE-2020-26558: 58cca5ec43be72a1af95f11966381e9953b0c9f5 Bluetooth: SMP: Fail if remote and local public keys are identical CVE-2021-0129: 58cca5ec43be72a1af95f11966381e9953b0c9f5 Bluetooth: SMP: Fail if remote and local public keys are identical + CVE-2021-47069: 807fa14536b26803b858da878b643be72952a097 ipc/mqueue, msg, sem: avoid relying on a stack reference past its expiry + CVE-2021-47070: 5f59240cf25b2f7a0fdffc2701482a70310fec07 uio_hv_generic: Fix another memory leak in error handling paths + CVE-2021-47071: 53486c467e356e06aa37047c984fccd64d78c827 uio_hv_generic: Fix a memory leak in error handling paths + CVE-2021-47072: 6d0924c5b742036b4f20a0ffdf2b6cf3f963f5f6 btrfs: fix removed dentries still existing after log is synced + CVE-2021-47073: 8d746ea7c687bab060a2c05a35c449302406cd52 platform/x86: dell-smbios-wmi: Fix oops on rmmod dell_smbios + CVE-2021-47074: 551ba08d4b7eb26f75758cdb9f15105b276517ad nvme-loop: fix memory leak in nvme_loop_create_ctrl() + CVE-2021-47075: afb680ed7ecbb7fd66ddb43650e9b533fd8b4b9a nvmet: fix memory leak in nvmet_alloc_ctrl() + CVE-2021-47076: abe31d25facdb9109fe2cf69890748295291570c RDMA/rxe: Return CQE error if invalid lkey was supplied + CVE-2021-47077: 11014efcec378bb0050a6cf08eaf375e3693400a scsi: qedf: Add pointer checks in qedf_update_link_speed() + CVE-2021-47078: 03344e843ab6dd3b3f2cadfb65ed910590856c70 RDMA/rxe: Clear all QP fields if creation failed + CVE-2021-47079: beab753fe3b4e087411a850a64c6cd748544d8a1 platform/x86: ideapad-laptop: fix a NULL pointer dereference + CVE-2021-47080: e6871b4270c05f8b212e7d98aee82b357972c80a RDMA/core: Prevent divide-by-zero error triggered by the user + CVE-2021-47081: b49f5af30b0e4064fbd91e83823a4bfcb2c7a3e7 habanalabs/gaudi: Fix a potential use after free in gaudi_memset_device_memory CVEs fixed in 5.12.8: CVE-2021-33200: 9accd53bd479974c434554e3446149884890623a bpf: Wrap aux data inside bpf_sanitize_info container + CVE-2021-47180: 65234f50a90b64b335cbb9164b8a98c2a0d031dd NFC: nci: fix memory leak in nci_allocate_device CVEs fixed in 5.12.9: CVE-2020-24586: 94eebceb18e552c72b845055ca9d12c3debc0c99 mac80211: prevent mixed key and fragment cache attacks @@ -42,6 +201,46 @@ CVEs fixed in 5.12.9: CVE-2021-32606: b190618d8337b9466d985854e417dc0e8b012e3c can: isotp: prevent race between isotp_bind() and isotp_setsockopt() CVE-2021-33098: 027c76ea1f107881babb79ddc04b5dfb27a8d4c3 ixgbe: fix large MTU request from VF CVE-2021-34981: 3178e0a38f204a61ed4fe5739d6a4732879b34d1 Bluetooth: cmtp: fix file refcount when cmtp_attach_device fails + CVE-2021-47136: 86ab133b695ed7ba1f8786b12f4ca43137ad8c18 net: zero-initialize tc skb extension on allocation + CVE-2021-47137: 46dd4abced3cb2c912916f4a5353e0927db0c4a2 net: lantiq: fix memory corruption in RX ring + CVE-2021-47138: 285207a558ab456aa7d8aa877ecc7e91fcc51710 cxgb4: avoid accessing registers when clearing filters + CVE-2021-47139: 0921a0620b5077796fddffb22a8e6bc635a4bb50 net: hns3: put off calling register_netdev() until client initialize complete + CVE-2021-47140: f3f2cf46291a693eab21adb94171b0128c2a9ec1 iommu/amd: Clear DMA ops when switching domain + CVE-2021-47141: 5278c75266c5094d3c0958793bf12fc90300e580 gve: Add NULL pointer checks when freeing irqs. + CVE-2021-47142: d4ea141fd4b40636a8326df5a377d9c5cf9b3faa drm/amdgpu: Fix a use-after-free + CVE-2021-47143: 40588782f1016c655ae1d302892f61d35af96842 net/smc: remove device from smcd_dev_list after failed device_add() + CVE-2021-47144: 95a4ec905e51a30c64cf2d78b04a7acbeae5ca94 drm/amd/amdgpu: fix refcount leak + CVE-2021-47145: b545442133580dcb2f2496133bf850824d41255c btrfs: do not BUG_ON in link_to_fixup_dir + CVE-2021-47146: a76fb9ba545289379acf409653ad5f74417be59c mld: fix panic in mld_newpack() + CVE-2021-47147: 0e38e702f1152479e6afac34f151dbfd99417f99 ptp: ocp: Fix a resource leak in an error handling path + CVE-2021-47148: 389146bc6d2bbb20714d06624b74856320ce40f7 octeontx2-pf: fix a buffer overflow in otx2_set_rxfh_context() + CVE-2021-47149: f14bf57a08779a5dee9936f63ada0149ea89c5e6 net: fujitsu: fix potential null-ptr-deref + CVE-2021-47150: 32a1777fd113335c3f70dc445dffee0ad1c6870f net: fec: fix the potential memory leak in fec_enet_init() + CVE-2021-47151: 93d1dbe7043b3c9492bdf396b2e98a008435b55b interconnect: qcom: bcm-voter: add a missing of_node_put() + CVE-2021-47152: 18e7f0580da15cac1e79d73683ada5a9e70980f8 mptcp: fix data stream corruption + CVE-2021-47153: 1f583d3813f204449037cd2acbfc09168171362a i2c: i801: Don't generate an interrupt on bus reset + CVE-2021-47158: 987e4ab8b8a4fcbf783069e03e7524cd39ffd563 net: dsa: sja1105: add error handling in sja1105_setup() + CVE-2021-47159: 7b22466648a4f8e3e94f57ca428d1531866d1373 net: dsa: fix a crash if ->get_sset_count() fails + CVE-2021-47160: 82ae35b6c14feae5f216913d5b433e143c756d4e net: dsa: mt7530: fix VLAN traffic leaks + CVE-2021-47161: 12391be4724acc9269e1845ccbd881df37de4b56 spi: spi-fsl-dspi: Fix a resource leak in an error handling path + CVE-2021-47162: ace300eecbccaa698e2b472843c74a5f33f7dce8 tipc: skb_linearize the head skb when reassembling msgs + CVE-2021-47163: b9f5b7ad4ac3af006443f535b1ce7bff1d130d7d tipc: wait and exit until all work queues are done + CVE-2021-47164: bdfd3593a8248eea6ecfcbf7b47b56b86515672d net/mlx5e: Fix null deref accessing lag dev + CVE-2021-47165: b4b91033a0b11fe9ade58156cd9168f89f4a8c1a drm/meson: fix shutdown crash when component not probed + CVE-2021-47166: 2fe1cac336b55a1f79e603e9ce3552c3623e90eb NFS: Don't corrupt the value of pg_bytes_written in nfs_do_recoalesce() + CVE-2021-47167: 15ac6f14787649e8ebd75c142e2c5d2a243c8490 NFS: Fix an Oopsable condition in __nfs_pageio_add_request() + CVE-2021-47168: d34fb628f6ef522f996205a9e578216bbee09e84 NFS: fix an incorrect limit in filelayout_decode_layout() + CVE-2021-47169: 9b07b6973f7359e2dd6a9fe6db0c142634c823b7 serial: rp2: use 'request_firmware' instead of 'request_firmware_nowait' + CVE-2021-47170: 9f7cb3f01a10d9064cf13b3d26fb7e7a5827d098 USB: usbfs: Don't WARN about excessively large memory allocations + CVE-2021-47171: 70c886ac93f87ae7214a0c69151a28a8075dd95b net: usb: fix memory leak in smsc75xx_bind + CVE-2021-47172: 26da8040eccc6c6b0e415e9a3baf72fd39eb2fdc iio: adc: ad7124: Fix potential overflow due to non sequential channel numbers + CVE-2021-47173: a3c3face38cb49932c62adcc1289914f1c742096 misc/uss720: fix memory leak in uss720_probe + CVE-2021-47174: 727a2b4fc951ee69847d4904d98961856ea9fbe6 netfilter: nft_set_pipapo_avx2: Add irq_fpu_usable() check, fallback to non-AVX2 version + CVE-2021-47175: 7a1bdec12e43e29cc34a4394590337069d8812ce net/sched: fq_pie: fix OOB access in the traffic path + CVE-2021-47176: a16be88a3d7e5efcb59a15edea87a8bd369630c6 s390/dasd: add missing discipline function + CVE-2021-47177: ca466561eef36d1ec657673e3944eb6340bddb5b iommu/vt-d: Fix sysfs leak in alloc_iommu() + CVE-2021-47178: a20b6eaf4f35046a429cde57bee7eb5f13d6857f scsi: target: core: Avoid smp_processor_id() in preemptible code + CVE-2021-47179: b090d110e66636bca473fd8b98d5c97b555a965a NFSv4: Fix a NULL pointer dereference in pnfs_mark_matching_lsegs_return() CVEs fixed in 5.12.10: CVE-2021-28691: caec9bcaeb1a5f03f2d406305355c853af10c13e xen-netback: take a reference to the RX task thread @@ -49,10 +248,37 @@ CVEs fixed in 5.12.10: CVE-2021-3573: 7422eadcf201f2e25eb45b46ffc900fc4214e14f Bluetooth: use correct lock to prevent UAF of hdev object CVE-2021-3587: 0c4559736d9a4ec1ca58ba98ca34e7c4da4c422b nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect CVE-2021-38208: 0c4559736d9a4ec1ca58ba98ca34e7c4da4c422b nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect + CVE-2021-47109: ddf088d7aaaaacfc836104f2e632b29b1d383cfc neighbour: allow NUD_NOARP entries to be forced GCed + CVE-2021-47110: 1df2dc09926f61319116c80ee85701df33577d70 x86/kvm: Disable kvmclock on all CPUs on shutdown + CVE-2021-47111: caec9bcaeb1a5f03f2d406305355c853af10c13e xen-netback: take a reference to the RX task thread + CVE-2021-47112: d1629b5b925de9b27979e929dae7fcb766daf6b6 x86/kvm: Teardown PV features on boot CPU as well + CVE-2021-47113: ff8de2cec65a8c8521faade12a31b39c80e49f5b btrfs: abort in rename_exchange if we fail to insert the second ref + CVE-2021-47114: 0a31dd6fd2f4e7db538fb6eb1f06973d81f8dd3b ocfs2: fix data corruption by fallocate + CVE-2021-47116: 04fb2baa0b147f51db065a1b13a11954abe592d0 ext4: fix memory leak in ext4_mb_init_backend on error path. + CVE-2021-47117: 48105dc98c9ca35af418746277b087cb2bc6df7c ext4: fix bug on in ext4_es_cache_extent as ext4_split_extent_at failed + CVE-2021-47118: b8ff869f20152fbe66b6c2e2715d26a2f9897cca pid: take a reference when initializing `cad_pid` + CVE-2021-47120: 9cf27473f21913a3eaf4702dd2a25415afd5f33f HID: magicmouse: fix NULL-deref on disconnect + CVE-2021-47121: dde8686985ec24d6b00487080a906609bd613ea1 net: caif: fix memory leak in cfusbl_device_notify + CVE-2021-47122: 6a0e317f61094d377335547e015dd2ff12caf893 net: caif: fix memory leak in caif_device_notify + CVE-2021-47123: 1f64f5e903b9d1d157875721e02adadc9d6f0a5d io_uring: fix ltout double free on completion race + CVE-2021-47125: 2411c02d03892a5057499f8102d0cc1e0f852416 sch_htb: fix refcount leak in htb_parent_to_leaf_offload + CVE-2021-47126: 0a462e25ef0f7ab305081a08d435bbd1f13c0a94 ipv6: Fix KASAN: slab-out-of-bounds Read in fib6_nh_flush_exceptions + CVE-2021-47127: 1d34fa4fcf06649036ba0c97854fcf7a741ee18c ice: track AF_XDP ZC enabled queues in bitmap + CVE-2021-47128: acc43fc6cf0d50612193813c5906a1ab9d433e1e bpf, lockdown, audit: Fix buggy SELinux lockdown permission checks + CVE-2021-47129: 2c0e6b35b88a961127066a1028bce9c727cbc3e5 netfilter: nft_ct: skip expectations for confirmed conntrack + CVE-2021-47130: 8a452d62e7cea3c8a2676a3b89a9118755a1a271 nvmet: fix freeing unallocated p2pmem + CVE-2021-47131: 0f1e6fe66977a864fe850522316f713d7b926fd9 net/tls: Fix use-after-free after the TLS device goes down and up + CVE-2021-47132: b9c78b1a95966a7bd2ddae05b73eafc0cda4fba3 mptcp: fix sk_forward_memory corruption on retransmission + CVE-2021-47133: 29beadea66a226d744d5ffdcde6b984623053d24 HID: amd_sfh: Fix memory leak in amd_sfh_work + CVE-2021-47134: 8a7e8b4e5631a03ea2fee27957857a56612108ca efi/fdt: fix panic when no valid fdt found + CVE-2021-47135: 6919e8a24e70b6ba148fe07f44f835bcdd1a8d02 mt76: mt7921: fix possible AOOB issue in mt7921_mcu_tx_rate_report CVEs fixed in 5.12.11: CVE-2021-38198: 7707f7244d813f8279143d5dfdee7a318801231b KVM: X86: MMU: Use the correct inherited permissions to get shadow page +CVEs fixed in 5.12.12: + CVE-2021-46906: 21883bff0fd854e07429a773ff18f1e9658f50e8 HID: usbhid: fix info leak in hid_submit_ctrl + CVEs fixed in 5.12.13: CVE-2021-33624: 408a4956acde24413f3c684912b1d3e404bed8e2 bpf: Inherit expanded/patched seen count from old aux data CVE-2021-34693: dc6415cb5cf8ebc8b334b7d0be916a0bf4353779 can: bcm: fix infoleak in struct bcm_msg_head @@ -75,6 +301,7 @@ CVEs fixed in 5.12.18: CVE-2021-3655: d91adac26d5ebac78c731b3aa23ff2c210ce2a0d sctp: validate from_addr_param return CVE-2021-38205: 7a9bfd7589c18c20df5a5b9278549a2807627e30 net: xilinx_emaclite: Do not print real IOMEM pointer CVE-2021-45485: 478ec08ae2097b7262a69d951f95e9ef16ff45a0 ipv6: use prandom_u32() for ID generation + CVE-2021-47119: cecfdb9cf9a700d1037066173abac0617f6788df ext4: fix memory leak in ext4_fill_super CVE-2022-41222: 864c4d1d25170def283b2bf87726218126634f04 mm/mremap: hold the rmap lock in write mode when moving page table entries. CVE-2023-28772: 681f78589bdb473de5276e0f5b7811101c0c7b87 seq_buf: Fix overflow in seq_buf_putmem_hex() @@ -84,6 +311,7 @@ CVEs fixed in 5.12.19: CVE-2021-38199: 87871d990a2c1879fb5c543f7244f360532e2f28 NFSv4: Initialise connection to the server in nfs4_alloc_client() CVE-2021-38201: 9a4f77f171f68e5a275c4fabd8d78579af7b4950 sunrpc: Avoid a KASAN slab-out-of-bounds bug in xdr_set_page_base() CVE-2021-4154: 242f80be5b13257173eadbc03a90932e786b4c9b cgroup: verify that source is a string + CVE-2021-47124: ff4a96ba5c8f9b266706280ff8021d2ef3f17e86 io_uring: fix link timeout refs Outstanding CVEs: CVE-2005-3660: (unk) @@ -114,6 +342,7 @@ Outstanding CVEs: CVE-2019-19378: (unk) CVE-2019-19814: (unk) CVE-2019-20794: (unk) + CVE-2019-25162: (unk) i2c: Fix a potential use after free CVE-2020-0347: (unk) CVE-2020-10708: (unk) CVE-2020-11725: (unk) @@ -222,6 +451,34 @@ Outstanding CVEs: CVE-2021-45402: (unk) bpf: Fix signed bounds propagation after mov32 CVE-2021-45469: (unk) f2fs: fix to do sanity check on last xattr entry in __f2fs_setxattr() CVE-2021-45868: (unk) quota: check block number when reading the block in quota file + CVE-2021-46923: (unk) fs/mount_setattr: always cleanup mount_kattr + CVE-2021-46924: (unk) NFC: st21nfca: Fix memory leak in device probe and remove + CVE-2021-46925: (unk) net/smc: fix kernel panic caused by race of smc_sock + CVE-2021-46926: (unk) ALSA: hda: intel-sdw-acpi: harden detection of controller + CVE-2021-46928: (unk) parisc: Clear stale IIR value on instruction access rights trap + CVE-2021-46929: (unk) sctp: use call_rcu to free endpoint + CVE-2021-46930: (unk) usb: mtu3: fix list_head check warning + CVE-2021-46931: (unk) net/mlx5e: Wrap the tx reporter dump callback to extract the sq + CVE-2021-46932: (unk) Input: appletouch - initialize work before device registration + CVE-2021-46933: (unk) usb: gadget: f_fs: Clear ffs_eventfd in ffs_data_clear. + CVE-2021-46934: (unk) i2c: validate user data in compat ioctl + CVE-2021-46935: (unk) binder: fix async_free_space accounting for empty parcels + CVE-2021-46936: (unk) net: fix use-after-free in tw_timer_handler + CVE-2021-46959: (unk) spi: Fix use-after-free with devm_spi_alloc_* + CVE-2021-47082: (unk) tun: avoid double free in tun_free_netdev + CVE-2021-47083: (unk) pinctrl: mediatek: fix global-out-of-bounds issue + CVE-2021-47086: (unk) phonet/pep: refuse to enable an unbound pipe + CVE-2021-47089: (unk) kfence: fix memory leak when cat kfence objects + CVE-2021-47090: (unk) mm/hwpoison: clear MF_COUNT_INCREASED before retrying get_any_page() + CVE-2021-47091: (unk) mac80211: fix locking in ieee80211_start_ap error path + CVE-2021-47093: (unk) platform/x86: intel_pmc_core: fix memleak on registration failure + CVE-2021-47094: (unk) KVM: x86/mmu: Don't advance iterator after restart due to yielding + CVE-2021-47095: (unk) ipmi: ssif: initialize ssif_info->client early + CVE-2021-47097: (unk) Input: elantech - fix stack out of bound access in elantech_change_report_id() + CVE-2021-47100: (unk) ipmi: Fix UAF when uninstall ipmi_si and ipmi_msghandler module + CVE-2021-47101: (unk) asix: fix uninit-value in asix_mdio_read() + CVE-2021-47103: (unk) inet: fully convert sk->sk_rx_dst to RCU rules + CVE-2021-47105: (unk) ice: xsk: return xsk buffers back to pool when cleaning the ring CVE-2022-0001: (unk) x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE CVE-2022-0002: (unk) x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE CVE-2022-0168: (unk) cifs: fix NULL ptr dereference in smb2_ioctl_query_info() @@ -476,6 +733,10 @@ Outstanding CVEs: CVE-2022-47521: (unk) wifi: wilc1000: validate length of IEEE80211_P2P_ATTR_CHANNEL_LIST attribute CVE-2022-47929: (unk) net: sched: disallow noqueue for qdisc classes CVE-2022-48619: (unk) Input: add bounds checking to input_set_capability() + CVE-2022-48626: (unk) moxart: fix potential use-after-free on remove path + CVE-2022-48627: (unk) vt: fix memory overlapping when deleting chars in the buffer + CVE-2022-48628: (unk) ceph: drop messages from MDS when unmounting + CVE-2022-48629: (unk) crypto: qcom-rng - ensure buffer for generate is completely filled CVE-2023-0045: (unk) x86/bugs: Flush IBP in ib_prctl_set() CVE-2023-0047: (unk) mm, oom: do not trigger out_of_memory from the #PF CVE-2023-0160: (unk) bpf, sockmap: fix deadlocks in the sockhash and sockmap @@ -561,6 +822,7 @@ Outstanding CVEs: CVE-2023-28410: (unk) drm/i915/gem: add missing boundary check in vm_access CVE-2023-28466: (unk) net: tls: fix possible race condition between do_tls_getsockopt_conf() and do_tls_setsockopt_conf() CVE-2023-2860: (unk) ipv6: sr: fix out-of-bounds read when setting HMAC data. + CVE-2023-28746: (unk) x86/mmio: Disable KVM mitigation when X86_FEATURE_CLEAR_CPU_BUF is set CVE-2023-2898: (unk) f2fs: fix to avoid NULL pointer dereference f2fs_write_end_io() CVE-2023-2985: (unk) fs: hfsplus: fix UAF issue in hfsplus_put_super CVE-2023-3006: (unk) arm64: Add AMPERE1 to the Spectre-BHB affected list @@ -654,7 +916,7 @@ Outstanding CVEs: CVE-2023-46813: (unk) x86/sev: Check for user-space IOIO pointing to kernel space CVE-2023-46838: (unk) xen-netback: don't produce zero-size SKB frags CVE-2023-46862: (unk) io_uring/fdinfo: lock SQ thread while retrieving thread cpu/pid - CVE-2023-47233: (unk) + CVE-2023-47233: (unk) wifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach CVE-2023-4732: (unk) mm/userfaultfd: fix uffd-wp special cases for fork() CVE-2023-4881: (unk) netfilter: nftables: exthdr: fix 4-byte stack OOB write CVE-2023-4921: (unk) net: sched: sch_qfq: Fix UAF in qfq_dequeue() @@ -684,19 +946,128 @@ Outstanding CVEs: CVE-2023-52452: (unk) bpf: Fix accesses to uninit stack slots CVE-2023-52454: (unk) nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length CVE-2023-52456: (unk) serial: imx: fix tx statemachine deadlock - CVE-2023-52457: (unk) serial: 8250: omap: Don't skip resource freeing if pm_runtime_resume_and_get() failed CVE-2023-52458: (unk) block: add check that partition length needs to be aligned with block size CVE-2023-52463: (unk) efivarfs: force RO when remounting if SetVariable is not supported CVE-2023-52464: (unk) EDAC/thunderx: Fix possible out-of-bounds string access + CVE-2023-52467: (unk) mfd: syscon: Fix null pointer dereference in of_syscon_register() + CVE-2023-52469: (unk) drivers/amd/pm: fix a use-after-free in kv_parse_power_table + CVE-2023-52470: (unk) drm/radeon: check the alloc_workqueue return value in radeon_crtc_init() + CVE-2023-52474: (unk) IB/hfi1: Fix bugs with non-PAGE_SIZE-end multi-iovec user SDMA requests + CVE-2023-52475: (unk) Input: powermate - fix use-after-free in powermate_config_complete + CVE-2023-52476: (unk) perf/x86/lbr: Filter vsyscall addresses + CVE-2023-52477: (unk) usb: hub: Guard against accesses to uninitialized BOS descriptors + CVE-2023-52478: (unk) HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect + CVE-2023-52479: (unk) ksmbd: fix uaf in smb20_oplock_break_ack + CVE-2023-52480: (unk) ksmbd: fix race condition between session lookup and expire + CVE-2023-52481: (unk) arm64: errata: Add Cortex-A520 speculative unprivileged load workaround + CVE-2023-52482: (unk) x86/srso: Add SRSO mitigation for Hygon processors + CVE-2023-52484: (unk) iommu/arm-smmu-v3: Fix soft lockup triggered by arm_smmu_mm_invalidate_range + CVE-2023-52485: (unk) drm/amd/display: Wake DMCUB before sending a command + CVE-2023-52486: (unk) drm: Don't unref the same fb many times by mistake due to deadlock handling + CVE-2023-52488: (unk) serial: sc16is7xx: convert from _raw_ to _noinc_ regmap functions for FIFO + CVE-2023-52489: (unk) mm/sparsemem: fix race in accessing memory_section->usage + CVE-2023-52491: (unk) media: mtk-jpeg: Fix use after free bug due to error path handling in mtk_jpeg_dec_device_run + CVE-2023-52492: (unk) dmaengine: fix NULL pointer in channel unregistration function + CVE-2023-52493: (unk) bus: mhi: host: Drop chan lock before queuing buffers + CVE-2023-52497: (unk) erofs: fix lz4 inplace decompression + CVE-2023-52498: (unk) PM: sleep: Fix possible deadlocks in core system-wide PM code + CVE-2023-52499: (unk) powerpc/47x: Fix 47x syscall return crash + CVE-2023-52500: (unk) scsi: pm80xx: Avoid leaking tags when processing OPC_INB_SET_CONTROLLER_CONFIG command + CVE-2023-52501: (unk) ring-buffer: Do not attempt to read past "commit" + CVE-2023-52502: (unk) net: nfc: fix races in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn() + CVE-2023-52503: (unk) tee: amdtee: fix use-after-free vulnerability in amdtee_close_session + CVE-2023-52504: (unk) x86/alternatives: Disable KASAN in apply_alternatives() + CVE-2023-52506: (unk) LoongArch: Set all reserved memblocks on Node#0 at initialization + CVE-2023-52507: (unk) nfc: nci: assert requested protocol is valid + CVE-2023-52508: (unk) nvme-fc: Prevent null pointer dereference in nvme_fc_io_getuuid() + CVE-2023-52509: (unk) ravb: Fix use-after-free issue in ravb_tx_timeout_work() + CVE-2023-52510: (unk) ieee802154: ca8210: Fix a potential UAF in ca8210_probe + CVE-2023-52511: (unk) spi: sun6i: reduce DMA RX transfer width to single byte + CVE-2023-52513: (unk) RDMA/siw: Fix connection failure handling + CVE-2023-52515: (unk) RDMA/srp: Do not call scsi_done() from srp_abort() + CVE-2023-52516: (unk) dma-debug: don't call __dma_entry_alloc_check_leak() under free_entries_lock + CVE-2023-52517: (unk) spi: sun6i: fix race between DMA RX transfer completion and RX FIFO drain + CVE-2023-52519: (unk) HID: intel-ish-hid: ipc: Disable and reenable ACPI GPE bit + CVE-2023-52522: (unk) net: fix possible store tearing in neigh_periodic_work() + CVE-2023-52527: (unk) ipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data() + CVE-2023-52528: (unk) net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg + CVE-2023-52530: (unk) wifi: mac80211: fix potential key use-after-free + CVE-2023-52531: (unk) wifi: iwlwifi: mvm: Fix a memory corruption issue + CVE-2023-52532: (unk) net: mana: Fix TX CQE error handling + CVE-2023-52559: (unk) iommu/vt-d: Avoid memory allocation in iommu_suspend() + CVE-2023-52561: (unk) arm64: dts: qcom: sdm845-db845c: Mark cont splash memory region as reserved + CVE-2023-52563: (unk) drm/meson: fix memory leak on ->hpd_notify callback + CVE-2023-52565: (unk) media: uvcvideo: Fix OOB read + CVE-2023-52566: (unk) nilfs2: fix potential use after free in nilfs_gccache_submit_read_data() + CVE-2023-52568: (unk) x86/sgx: Resolves SECS reclaim vs. page fault for EAUG race + CVE-2023-52569: (unk) btrfs: remove BUG() after failure to insert delayed dir index item + CVE-2023-52571: (unk) power: supply: rk817: Fix node refcount leak + CVE-2023-52572: (unk) cifs: Fix UAF in cifs_demultiplex_thread() + CVE-2023-52573: (unk) net: rds: Fix possible NULL-pointer dereference + CVE-2023-52574: (unk) team: fix null-ptr-deref when team device type is changed + CVE-2023-52578: (unk) net: bridge: use DEV_STATS_INC() + CVE-2023-52580: (unk) net/core: Fix ETH_P_1588 flow dissector + CVE-2023-52583: (unk) ceph: fix deadlock or deadcode of misusing dget() + CVE-2023-52584: (unk) spmi: mediatek: Fix UAF on device remove + CVE-2023-52585: (unk) drm/amdgpu: Fix possible NULL dereference in amdgpu_ras_query_error_status_helper() + CVE-2023-52586: (unk) drm/msm/dpu: Add mutex lock in control vblank irq + CVE-2023-52587: (unk) IB/ipoib: Fix mcast list locking + CVE-2023-52588: (unk) f2fs: fix to tag gcing flag on page during block migration + CVE-2023-52589: (unk) media: rkisp1: Fix IRQ disable race issue + CVE-2023-52590: (unk) ocfs2: Avoid touching renamed directory if parent does not change + CVE-2023-52591: (unk) reiserfs: Avoid touching renamed directory if parent does not change + CVE-2023-52593: (unk) wifi: wfx: fix possible NULL pointer dereference in wfx_set_mfp_ap() + CVE-2023-52594: (unk) wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus() + CVE-2023-52595: (unk) wifi: rt2x00: restart beacon queue when hardware reset + CVE-2023-52596: (unk) sysctl: Fix out of bounds access for empty sysctl registers + CVE-2023-52597: (unk) KVM: s390: fix setting of fpc register + CVE-2023-52598: (unk) s390/ptrace: handle setting of fpc register correctly + CVE-2023-52599: (unk) jfs: fix array-index-out-of-bounds in diNewExt + CVE-2023-52600: (unk) jfs: fix uaf in jfs_evict_inode + CVE-2023-52601: (unk) jfs: fix array-index-out-of-bounds in dbAdjTree + CVE-2023-52602: (unk) jfs: fix slab-out-of-bounds Read in dtSearch + CVE-2023-52603: (unk) UBSAN: array-index-out-of-bounds in dtSplitRoot + CVE-2023-52604: (unk) FS:JFS:UBSAN:array-index-out-of-bounds in dbAdjTree + CVE-2023-52606: (unk) powerpc/lib: Validate size for vector operations + CVE-2023-52607: (unk) powerpc/mm: Fix null-pointer dereference in pgtable_cache_add + CVE-2023-52608: (unk) firmware: arm_scmi: Check mailbox/SMT channel for consistency + CVE-2023-52609: (unk) binder: fix race between mmput() and do_exit() + CVE-2023-52610: (unk) net/sched: act_ct: fix skb leak and crash on ooo frags + CVE-2023-52612: (unk) crypto: scomp - fix req->dst buffer overflow + CVE-2023-52614: (unk) PM / devfreq: Fix buffer overflow in trans_stat_show + CVE-2023-52615: (unk) hwrng: core - Fix page fault dead lock on mmap-ed hwrng + CVE-2023-52616: (unk) crypto: lib/mpi - Fix unexpected pointer access in mpi_ec_init + CVE-2023-52617: (unk) PCI: switchtec: Fix stdev_release() crash after surprise hot remove + CVE-2023-52618: (unk) block/rnbd-srv: Check for unlikely string overflow + CVE-2023-52619: (unk) pstore/ram: Fix crash when setting number of cpus to an odd number + CVE-2023-52620: (unk) netfilter: nf_tables: disallow timeout for anonymous sets + CVE-2023-52621: (unk) bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers + CVE-2023-52622: (unk) ext4: avoid online resizing failures due to oversized flex bg + CVE-2023-52623: (unk) SUNRPC: Fix a suspicious RCU usage warning + CVE-2023-52624: (unk) drm/amd/display: Wake DMCUB before executing GPINT commands + CVE-2023-52625: (unk) drm/amd/display: Refactor DMCUB enter/exit idle interface + CVE-2023-52627: (unk) iio: adc: ad7091r: Allow users to configure device events + CVE-2023-52628: (unk) netfilter: nftables: exthdr: fix 4-byte stack OOB write + CVE-2023-52629: (unk) sh: push-switch: Reorder cleanup operations to avoid use-after-free bug + CVE-2023-52630: (unk) blk-iocost: Fix an UBSAN shift-out-of-bounds warning + CVE-2023-52632: (unk) drm/amdkfd: Fix lock dependency warning with srcu + CVE-2023-52633: (unk) um: time-travel: fix time corruption + CVE-2023-52634: (unk) drm/amd/display: Fix disable_otg_wa logic + CVE-2023-52635: (unk) PM / devfreq: Synchronize devfreq_monitor_[start/stop] + CVE-2023-52637: (unk) can: j1939: Fix UAF in j1939_sk_match_filter during setsockopt(SO_J1939_FILTER) + CVE-2023-52638: (unk) can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock + CVE-2023-52639: (unk) KVM: s390: vsie: fix race during shadow creation + CVE-2023-52640: (unk) fs/ntfs3: Fix oob in ntfs_listxattr + CVE-2023-52641: (unk) fs/ntfs3: Add NULL ptr dereference checking at the end of attr_allocate_frame() CVE-2023-5717: (unk) perf: Disallow mis-matched inherited group reads CVE-2023-6040: (unk) netfilter: nf_tables: Reject tables of unsupported family CVE-2023-6121: (unk) nvmet: nul-terminate the NQNs passed in the connect command CVE-2023-6176: (unk) net/tls: do not free tls_rec on async operation in bpf_exec_tx_verdict() CVE-2023-6240: (unk) - CVE-2023-6270: (unk) - CVE-2023-6356: (unk) + CVE-2023-6270: (unk) aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts + CVE-2023-6356: (unk) nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length CVE-2023-6535: (unk) - CVE-2023-6536: (unk) + CVE-2023-6536: (unk) nvmet-tcp: fix a crash in nvmet_req_complete() CVE-2023-6546: (unk) tty: n_gsm: fix the UAF caused by race condition in gsm_cleanup_mux CVE-2023-6560: (unk) io_uring: don't allow discontig pages for IORING_SETUP_NO_MMAP CVE-2023-6606: (unk) smb: client: fix OOB in smbCalcSize() @@ -706,7 +1077,7 @@ Outstanding CVEs: CVE-2023-6915: (unk) ida: Fix crash in ida_free when the bitmap is empty CVE-2023-6931: (unk) perf: Fix perf_event_validate_size() CVE-2023-6932: (unk) ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet - CVE-2023-7042: (unk) + CVE-2023-7042: (unk) wifi: ath10k: fix NULL pointer dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev() CVE-2023-7192: (unk) netfilter: ctnetlink: fix possible refcount leak in ctnetlink_create_conntrack() CVE-2024-0340: (unk) vhost: use kzalloc() instead of kmalloc() followed by memset() CVE-2024-0564: (unk) @@ -716,15 +1087,16 @@ Outstanding CVEs: CVE-2024-0641: (unk) tipc: fix a potential deadlock on &tx->lock CVE-2024-0646: (unk) net: tls, update curr on splice as well CVE-2024-0775: (unk) ext4: improve error recovery code paths in __ext4_remount() - CVE-2024-0841: (unk) + CVE-2024-0841: (unk) fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super CVE-2024-1086: (unk) netfilter: nf_tables: reject QUEUE/DROP verdict parameters CVE-2024-1151: (unk) net: openvswitch: limit the number of recursions from action sets CVE-2024-1312: (unk) mm: lock_vma_under_rcu() must check vma->anon_vma under vma lock CVE-2024-21803: (unk) - CVE-2024-22099: (unk) + CVE-2024-2193: (unk) + CVE-2024-22099: (unk) Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security CVE-2024-22386: (unk) - CVE-2024-23196: (unk) - CVE-2024-23307: (unk) + CVE-2024-23196: (unk) ALSA: hda: fix a possible null-pointer dereference due to data race in snd_hdac_regmap_sync() + CVE-2024-23307: (unk) md/raid5: fix atomicity violation in raid5_cache_count CVE-2024-23848: (unk) CVE-2024-23849: (unk) net/rds: Fix UBSAN: array-index-out-of-bounds in rds_cmsg_recv CVE-2024-23850: (unk) btrfs: do not ASSERT() if the newly created subvolume already got read @@ -734,7 +1106,7 @@ Outstanding CVEs: CVE-2024-24858: (unk) CVE-2024-24859: (unk) CVE-2024-24860: (unk) Bluetooth: Fix atomicity violation in {min,max}_key_size_set - CVE-2024-24861: (unk) + CVE-2024-24861: (unk) media: xc4000: Fix atomicity violation in xc4000_get_frequency CVE-2024-24864: (unk) CVE-2024-25739: (unk) CVE-2024-25740: (unk) @@ -744,13 +1116,136 @@ Outstanding CVEs: CVE-2024-26584: (unk) net: tls: handle backlogging of crypto requests CVE-2024-26585: (unk) tls: fix race between tx work scheduling and socket close CVE-2024-26586: (unk) mlxsw: spectrum_acl_tcam: Fix stack corruption - CVE-2024-26587: (unk) net: netdevsim: don't try to destroy PHC on VFs - CVE-2024-26588: (unk) LoongArch: BPF: Prevent out-of-bounds memory access CVE-2024-26589: (unk) bpf: Reject variable offset alu on PTR_TO_FLOW_KEYS - CVE-2024-26591: (unk) bpf: Fix re-attachment branch in bpf_tracing_prog_attach CVE-2024-26592: (unk) ksmbd: fix UAF issue in ksmbd_tcp_new_connection() CVE-2024-26593: (unk) i2c: i801: Fix block process call transactions CVE-2024-26594: (unk) ksmbd: validate mech token in session setup CVE-2024-26595: (unk) mlxsw: spectrum_acl_tcam: Fix NULL pointer dereference in error path CVE-2024-26597: (unk) net: qualcomm: rmnet: fix global oob in rmnet_policy CVE-2024-26598: (unk) KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache + CVE-2024-26600: (unk) phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP + CVE-2024-26601: (unk) ext4: regenerate buddy after block freeing failed if under fc replay + CVE-2024-26602: (unk) sched/membarrier: reduce the ability to hammer on sys_membarrier + CVE-2024-26606: (unk) binder: signal epoll threads of self-work + CVE-2024-26607: (unk) drm/bridge: sii902x: Fix probing race issue + CVE-2024-26610: (unk) wifi: iwlwifi: fix a memory corruption + CVE-2024-26614: (unk) tcp: make sure init the accept_queue's spinlocks once + CVE-2024-26615: (unk) net/smc: fix illegal rmb_desc access in SMC-D connection dump + CVE-2024-26622: (unk) tomoyo: fix UAF write bug in tomoyo_write_control() + CVE-2024-26623: (unk) pds_core: Prevent race issues involving the adminq + CVE-2024-26625: (unk) llc: call sock_orphan() at release time + CVE-2024-26627: (unk) scsi: core: Move scsi_host_busy() out of host lock for waking up EH handler + CVE-2024-26633: (unk) ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim() + CVE-2024-26635: (unk) llc: Drop support for ETH_P_TR_802_2. + CVE-2024-26636: (unk) llc: make llc_ui_sendmsg() more robust against bonding changes + CVE-2024-26640: (unk) tcp: add sanity checks to rx zerocopy + CVE-2024-26641: (unk) ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv() + CVE-2024-26642: (unk) netfilter: nf_tables: disallow anonymous set with timeout flag + CVE-2024-26644: (unk) btrfs: don't abort filesystem when attempting to snapshot deleted subvolume + CVE-2024-26645: (unk) tracing: Ensure visibility when inserting an element into tracing_map + CVE-2024-26646: (unk) thermal: intel: hfi: Add syscore callbacks for system-wide PM + CVE-2024-26647: (unk) drm/amd/display: Fix late derefrence 'dsc' check in 'link_set_dsc_pps_packet()' + CVE-2024-26648: (unk) drm/amd/display: Fix variable deferencing before NULL check in edp_setup_replay() + CVE-2024-26650: (unk) platform/x86: p2sb: Allow p2sb_bar() calls during PCI device probe + CVE-2024-26651: (unk) sr9800: Add check for usbnet_get_endpoints + CVE-2024-26654: (unk) ALSA: sh: aica: reorder cleanup operations to avoid UAF bugs + CVE-2024-26655: (unk) Fix memory leak in posix_clock_open() + CVE-2024-26656: (unk) drm/amdgpu: fix use-after-free bug + CVE-2024-26658: (unk) bcachefs: grab s_umount only if snapshotting + CVE-2024-26659: (unk) xhci: handle isoc Babble and Buffer Overrun events properly + CVE-2024-26660: (unk) drm/amd/display: Implement bounds check for stream encoder creation in DCN301 + CVE-2024-26661: (unk) drm/amd/display: Add NULL test for 'timing generator' in 'dcn21_set_pipe()' + CVE-2024-26662: (unk) drm/amd/display: Fix 'panel_cntl' could be null in 'dcn21_set_backlight_level()' + CVE-2024-26663: (unk) tipc: Check the bearer type before calling tipc_udp_nl_bearer_add() + CVE-2024-26664: (unk) hwmon: (coretemp) Fix out-of-bounds memory access + CVE-2024-26665: (unk) tunnels: fix out of bounds access when building IPv6 PMTU error + CVE-2024-26668: (unk) netfilter: nft_limit: reject configurations that cause integer overflow + CVE-2024-26669: (unk) net/sched: flower: Fix chain template offload + CVE-2024-26671: (unk) blk-mq: fix IO hang from sbitmap wakeup race + CVE-2024-26672: (unk) drm/amdgpu: Fix variable 'mca_funcs' dereferenced before NULL check in 'amdgpu_mca_smu_get_mca_entry()' + CVE-2024-26673: (unk) netfilter: nft_ct: sanitize layer 3 and 4 protocol number in custom expectations + CVE-2024-26675: (unk) ppp_async: limit MRU to 64K + CVE-2024-26676: (unk) af_unix: Call kfree_skb() for dead unix_(sk)->oob_skb in GC. + CVE-2024-26677: (unk) rxrpc: Fix delayed ACKs to not set the reference serial number + CVE-2024-26679: (unk) inet: read sk->sk_family once in inet_recv_error() + CVE-2024-26680: (unk) net: atlantic: Fix DMA mapping for PTP hwts ring + CVE-2024-26684: (unk) net: stmmac: xgmac: fix handling of DPP safety error for DMA channels + CVE-2024-26685: (unk) nilfs2: fix potential bug in end_buffer_async_write + CVE-2024-26686: (unk) fs/proc: do_task_stat: use sig->stats_lock to gather the threads/children stats + CVE-2024-26687: (unk) xen/events: close evtchn after mapping cleanup + CVE-2024-26688: (unk) fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super + CVE-2024-26689: (unk) ceph: prevent use-after-free in encode_cap_msg() + CVE-2024-26691: (unk) KVM: arm64: Fix circular locking dependency + CVE-2024-26696: (unk) nilfs2: fix hang in nilfs_lookup_dirty_data_buffers() + CVE-2024-26697: (unk) nilfs2: fix data corruption in dsync block recovery for small block sizes + CVE-2024-26698: (unk) hv_netvsc: Fix race condition between netvsc_probe and netvsc_remove + CVE-2024-26699: (unk) drm/amd/display: Fix array-index-out-of-bounds in dcn35_clkmgr + CVE-2024-26700: (unk) drm/amd/display: Fix MST Null Ptr for RV + CVE-2024-26702: (unk) iio: magnetometer: rm3100: add boundary check for the value read from RM3100_REG_TMRC + CVE-2024-26704: (unk) ext4: fix double-free of blocks due to wrong extents moved_len + CVE-2024-26706: (unk) parisc: Fix random data corruption from exception handler + CVE-2024-26707: (unk) net: hsr: remove WARN_ONCE() in send_hsr_supervision_frame() + CVE-2024-26712: (unk) powerpc/kasan: Fix addr error caused by page alignment + CVE-2024-26713: (unk) powerpc/pseries/iommu: Fix iommu initialisation during DLPAR add + CVE-2024-26715: (unk) usb: dwc3: gadget: Fix NULL pointer dereference in dwc3_gadget_suspend + CVE-2024-26717: (unk) HID: i2c-hid-of: fix NULL-deref on failed power up + CVE-2024-26718: (unk) dm-crypt, dm-verity: disable tasklets + CVE-2024-26719: (unk) nouveau: offload fence uevents work to workqueue + CVE-2024-26720: (unk) mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again + CVE-2024-26726: (unk) btrfs: don't drop extent_map for free space inode on write error + CVE-2024-26727: (unk) btrfs: do not ASSERT() if the newly created subvolume already got read + CVE-2024-26733: (unk) arp: Prevent overflow in arp_req_get(). + CVE-2024-26735: (unk) ipv6: sr: fix possible use-after-free and null-ptr-deref + CVE-2024-26736: (unk) afs: Increase buffer size in afs_update_volume_status() + CVE-2024-26738: (unk) powerpc/pseries/iommu: DLPAR add doesn't completely initialize pci_controller + CVE-2024-26739: (unk) net/sched: act_mirred: don't override retval if we already lost the skb + CVE-2024-26740: (unk) net/sched: act_mirred: use the backlog for mirred ingress + CVE-2024-26743: (unk) RDMA/qedr: Fix qedr_create_user_qp error flow + CVE-2024-26744: (unk) RDMA/srpt: Support specifying the srpt_service_guid parameter + CVE-2024-26745: (unk) powerpc/pseries/iommu: IOMMU table is not initialized for kdump over SR-IOV + CVE-2024-26747: (unk) usb: roles: fix NULL pointer issue when put module's reference + CVE-2024-26748: (unk) usb: cdns3: fix memory double free when handle zero packet + CVE-2024-26749: (unk) usb: cdns3: fixed memory use after free at cdns3_gadget_ep_disable() + CVE-2024-26751: (unk) ARM: ep93xx: Add terminator to gpiod_lookup_table + CVE-2024-26752: (unk) l2tp: pass correct message length to ip6_append_data + CVE-2024-26754: (unk) gtp: fix use-after-free and null-ptr-deref in gtp_genl_dump_pdp() + CVE-2024-26756: (unk) md: Don't register sync_thread for reshape directly + CVE-2024-26757: (unk) md: Don't ignore read-only array in md_check_recovery() + CVE-2024-26758: (unk) md: Don't ignore suspended array in md_check_recovery() + CVE-2024-26759: (unk) mm/swap: fix race when skipping swapcache + CVE-2024-26763: (unk) dm-crypt: don't modify the data when using authenticated encryption + CVE-2024-26764: (unk) fs/aio: Restrict kiocb_set_cancel_fn() to I/O submitted via libaio + CVE-2024-26765: (unk) LoongArch: Disable IRQ before init_fn() for nonboot CPUs + CVE-2024-26766: (unk) IB/hfi1: Fix sdma.h tx->num_descs off-by-one error + CVE-2024-26767: (unk) drm/amd/display: fixed integer types and null check locations + CVE-2024-26768: (unk) LoongArch: Change acpi_core_pic[NR_CPUS] to acpi_core_pic[MAX_CORE_PIC] + CVE-2024-26769: (unk) nvmet-fc: avoid deadlock on delete association path + CVE-2024-26770: (unk) HID: nvidia-shield: Add missing null pointer checks to LED initialization + CVE-2024-26771: (unk) dmaengine: ti: edma: Add some null pointer checks to the edma_probe + CVE-2024-26772: (unk) ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal() + CVE-2024-26773: (unk) ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found() + CVE-2024-26774: (unk) ext4: avoid dividing by 0 in mb_update_avg_fragment_size() when block bitmap corrupt + CVE-2024-26775: (unk) aoe: avoid potential deadlock at set_capacity + CVE-2024-26776: (unk) spi: hisi-sfc-v3xx: Return IRQ_NONE if no interrupts were detected + CVE-2024-26777: (unk) fbdev: sis: Error out if pixclock equals zero + CVE-2024-26778: (unk) fbdev: savage: Error out if pixclock equals zero + CVE-2024-26779: (unk) wifi: mac80211: fix race condition on enabling fast-xmit + CVE-2024-26782: (unk) mptcp: fix double-free on socket dismantle + CVE-2024-26784: (unk) pmdomain: arm: Fix NULL dereference on scmi_perf_domain removal + CVE-2024-26787: (unk) mmc: mmci: stm32: fix DMA API overlapping mappings warning + CVE-2024-26788: (unk) dmaengine: fsl-qdma: init irq after reg initialization + CVE-2024-26789: (unk) crypto: arm64/neonbs - fix out-of-bounds access on short input + CVE-2024-26790: (unk) dmaengine: fsl-qdma: fix SoC may hang on 16 byte unaligned read + CVE-2024-26791: (unk) btrfs: dev-replace: properly validate device names + CVE-2024-26793: (unk) gtp: fix use-after-free and null-ptr-deref in gtp_newlink() + CVE-2024-26795: (unk) riscv: Sparse-Memory/vmemmap out-of-bounds fix + CVE-2024-26797: (unk) drm/amd/display: Prevent potential buffer overflow in map_hw_resources + CVE-2024-26798: (unk) fbcon: always restore the old font data in fbcon_do_set_font() + CVE-2024-26801: (unk) Bluetooth: Avoid potential use-after-free in hci_error_reset + CVE-2024-26802: (unk) stmmac: Clear variable when destroying workqueue + CVE-2024-26803: (unk) net: veth: clear GRO when clearing XDP even when down + CVE-2024-26804: (unk) net: ip_tunnel: prevent perpetual headroom growth + CVE-2024-26805: (unk) netlink: Fix kernel-infoleak-after-free in __skb_datagram_iter + CVE-2024-26806: (unk) spi: cadence-qspi: remove system-wide suspend helper calls from runtime PM hooks + CVE-2024-26808: (unk) netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain + CVE-2024-26809: (unk) netfilter: nft_set_pipapo: release elements in clone only from destroy path diff --git a/data/5.13/5.13_CVEs.txt b/data/5.13/5.13_CVEs.txt index 5d931c90d..86893e449 100644 --- a/data/5.13/5.13_CVEs.txt +++ b/data/5.13/5.13_CVEs.txt @@ -26,6 +26,7 @@ CVE-2019-16089: Fix unknown CVE-2019-19378: Fix unknown CVE-2019-19814: Fix unknown CVE-2019-20794: Fix unknown +CVE-2019-25162: Fix not seen in stream CVE-2020-0347: Fix unknown CVE-2020-10708: Fix unknown CVE-2020-11725: Fix unknown @@ -149,6 +150,36 @@ CVE-2021-45469: Fix not seen in stream CVE-2021-45480: Fix not seen in stream CVE-2021-45485: Fixed with 5.13.3 CVE-2021-45868: Fix not seen in stream +CVE-2021-46923: Fix not seen in stream +CVE-2021-46924: Fix not seen in stream +CVE-2021-46925: Fix not seen in stream +CVE-2021-46926: Fix not seen in stream +CVE-2021-46928: Fix not seen in stream +CVE-2021-46929: Fix not seen in stream +CVE-2021-46930: Fix not seen in stream +CVE-2021-46931: Fix not seen in stream +CVE-2021-46932: Fix not seen in stream +CVE-2021-46933: Fix not seen in stream +CVE-2021-46934: Fix not seen in stream +CVE-2021-46935: Fix not seen in stream +CVE-2021-46936: Fix not seen in stream +CVE-2021-47082: Fix not seen in stream +CVE-2021-47083: Fix not seen in stream +CVE-2021-47086: Fix not seen in stream +CVE-2021-47089: Fix not seen in stream +CVE-2021-47090: Fix not seen in stream +CVE-2021-47091: Fix not seen in stream +CVE-2021-47093: Fix not seen in stream +CVE-2021-47094: Fix not seen in stream +CVE-2021-47095: Fix not seen in stream +CVE-2021-47097: Fix not seen in stream +CVE-2021-47099: Fix not seen in stream +CVE-2021-47100: Fix not seen in stream +CVE-2021-47101: Fix not seen in stream +CVE-2021-47103: Fix not seen in stream +CVE-2021-47105: Fix not seen in stream +CVE-2021-47106: Fix not seen in stream +CVE-2021-47107: Fix not seen in stream CVE-2022-0001: Fix not seen in stream CVE-2022-0002: Fix not seen in stream CVE-2022-0168: Fix not seen in stream @@ -411,6 +442,10 @@ CVE-2022-47520: Fix not seen in stream CVE-2022-47521: Fix not seen in stream CVE-2022-47929: Fix not seen in stream CVE-2022-48619: Fix not seen in stream +CVE-2022-48626: Fix not seen in stream +CVE-2022-48627: Fix not seen in stream +CVE-2022-48628: Fix not seen in stream +CVE-2022-48629: Fix not seen in stream CVE-2023-0045: Fix not seen in stream CVE-2023-0047: Fix not seen in stream CVE-2023-0160: Fix not seen in stream @@ -497,6 +532,7 @@ CVE-2023-28328: Fix not seen in stream CVE-2023-28410: Fix not seen in stream CVE-2023-28466: Fix not seen in stream CVE-2023-2860: Fix not seen in stream +CVE-2023-28746: Fix not seen in stream CVE-2023-28772: Fixed with 5.13.3 CVE-2023-2898: Fix not seen in stream CVE-2023-2985: Fix not seen in stream @@ -592,7 +628,7 @@ CVE-2023-46343: Fix not seen in stream CVE-2023-46813: Fix not seen in stream CVE-2023-46838: Fix not seen in stream CVE-2023-46862: Fix not seen in stream -CVE-2023-47233: Fix unknown +CVE-2023-47233: Fix not seen in stream CVE-2023-4732: Fixed with 5.13.5 CVE-2023-4881: Fix not seen in stream CVE-2023-4921: Fix not seen in stream @@ -623,19 +659,132 @@ CVE-2023-52451: Fix not seen in stream CVE-2023-52452: Fix not seen in stream CVE-2023-52454: Fix not seen in stream CVE-2023-52456: Fix not seen in stream -CVE-2023-52457: Fix not seen in stream CVE-2023-52458: Fix not seen in stream CVE-2023-52463: Fix not seen in stream CVE-2023-52464: Fix not seen in stream +CVE-2023-52467: Fix not seen in stream +CVE-2023-52469: Fix not seen in stream +CVE-2023-52470: Fix not seen in stream +CVE-2023-52474: Fix not seen in stream +CVE-2023-52475: Fix not seen in stream +CVE-2023-52476: Fix not seen in stream +CVE-2023-52477: Fix not seen in stream +CVE-2023-52478: Fix not seen in stream +CVE-2023-52479: Fix not seen in stream +CVE-2023-52480: Fix not seen in stream +CVE-2023-52481: Fix not seen in stream +CVE-2023-52482: Fix not seen in stream +CVE-2023-52484: Fix not seen in stream +CVE-2023-52485: Fix not seen in stream +CVE-2023-52486: Fix not seen in stream +CVE-2023-52488: Fix not seen in stream +CVE-2023-52489: Fix not seen in stream +CVE-2023-52491: Fix not seen in stream +CVE-2023-52492: Fix not seen in stream +CVE-2023-52493: Fix not seen in stream +CVE-2023-52494: Fix not seen in stream +CVE-2023-52497: Fix not seen in stream +CVE-2023-52498: Fix not seen in stream +CVE-2023-52499: Fix not seen in stream +CVE-2023-52500: Fix not seen in stream +CVE-2023-52501: Fix not seen in stream +CVE-2023-52502: Fix not seen in stream +CVE-2023-52503: Fix not seen in stream +CVE-2023-52504: Fix not seen in stream +CVE-2023-52506: Fix not seen in stream +CVE-2023-52507: Fix not seen in stream +CVE-2023-52508: Fix not seen in stream +CVE-2023-52509: Fix not seen in stream +CVE-2023-52510: Fix not seen in stream +CVE-2023-52511: Fix not seen in stream +CVE-2023-52513: Fix not seen in stream +CVE-2023-52515: Fix not seen in stream +CVE-2023-52516: Fix not seen in stream +CVE-2023-52517: Fix not seen in stream +CVE-2023-52519: Fix not seen in stream +CVE-2023-52522: Fix not seen in stream +CVE-2023-52523: Fix not seen in stream +CVE-2023-52527: Fix not seen in stream +CVE-2023-52528: Fix not seen in stream +CVE-2023-52530: Fix not seen in stream +CVE-2023-52531: Fix not seen in stream +CVE-2023-52532: Fix not seen in stream +CVE-2023-52559: Fix not seen in stream +CVE-2023-52561: Fix not seen in stream +CVE-2023-52563: Fix not seen in stream +CVE-2023-52565: Fix not seen in stream +CVE-2023-52566: Fix not seen in stream +CVE-2023-52568: Fix not seen in stream +CVE-2023-52569: Fix not seen in stream +CVE-2023-52571: Fix not seen in stream +CVE-2023-52572: Fix not seen in stream +CVE-2023-52573: Fix not seen in stream +CVE-2023-52574: Fix not seen in stream +CVE-2023-52576: Fix not seen in stream +CVE-2023-52578: Fix not seen in stream +CVE-2023-52580: Fix not seen in stream +CVE-2023-52582: Fix not seen in stream +CVE-2023-52583: Fix not seen in stream +CVE-2023-52584: Fix not seen in stream +CVE-2023-52585: Fix not seen in stream +CVE-2023-52586: Fix not seen in stream +CVE-2023-52587: Fix not seen in stream +CVE-2023-52588: Fix not seen in stream +CVE-2023-52589: Fix not seen in stream +CVE-2023-52590: Fix not seen in stream +CVE-2023-52591: Fix not seen in stream +CVE-2023-52593: Fix not seen in stream +CVE-2023-52594: Fix not seen in stream +CVE-2023-52595: Fix not seen in stream +CVE-2023-52596: Fix not seen in stream +CVE-2023-52597: Fix not seen in stream +CVE-2023-52598: Fix not seen in stream +CVE-2023-52599: Fix not seen in stream +CVE-2023-52600: Fix not seen in stream +CVE-2023-52601: Fix not seen in stream +CVE-2023-52602: Fix not seen in stream +CVE-2023-52603: Fix not seen in stream +CVE-2023-52604: Fix not seen in stream +CVE-2023-52606: Fix not seen in stream +CVE-2023-52607: Fix not seen in stream +CVE-2023-52608: Fix not seen in stream +CVE-2023-52609: Fix not seen in stream +CVE-2023-52610: Fix not seen in stream +CVE-2023-52612: Fix not seen in stream +CVE-2023-52614: Fix not seen in stream +CVE-2023-52615: Fix not seen in stream +CVE-2023-52616: Fix not seen in stream +CVE-2023-52617: Fix not seen in stream +CVE-2023-52618: Fix not seen in stream +CVE-2023-52619: Fix not seen in stream +CVE-2023-52620: Fix not seen in stream +CVE-2023-52621: Fix not seen in stream +CVE-2023-52622: Fix not seen in stream +CVE-2023-52623: Fix not seen in stream +CVE-2023-52624: Fix not seen in stream +CVE-2023-52625: Fix not seen in stream +CVE-2023-52627: Fix not seen in stream +CVE-2023-52628: Fix not seen in stream +CVE-2023-52629: Fix not seen in stream +CVE-2023-52630: Fix not seen in stream +CVE-2023-52632: Fix not seen in stream +CVE-2023-52633: Fix not seen in stream +CVE-2023-52634: Fix not seen in stream +CVE-2023-52635: Fix not seen in stream +CVE-2023-52637: Fix not seen in stream +CVE-2023-52638: Fix not seen in stream +CVE-2023-52639: Fix not seen in stream +CVE-2023-52640: Fix not seen in stream +CVE-2023-52641: Fix not seen in stream CVE-2023-5717: Fix not seen in stream CVE-2023-6040: Fix not seen in stream CVE-2023-6121: Fix not seen in stream CVE-2023-6176: Fix not seen in stream CVE-2023-6240: Fix unknown -CVE-2023-6270: Fix unknown -CVE-2023-6356: Fix unknown +CVE-2023-6270: Fix not seen in stream +CVE-2023-6356: Fix not seen in stream CVE-2023-6535: Fix unknown -CVE-2023-6536: Fix unknown +CVE-2023-6536: Fix not seen in stream CVE-2023-6546: Fix not seen in stream CVE-2023-6560: Fix not seen in stream CVE-2023-6606: Fix not seen in stream @@ -645,7 +794,7 @@ CVE-2023-6817: Fix not seen in stream CVE-2023-6915: Fix not seen in stream CVE-2023-6931: Fix not seen in stream CVE-2023-6932: Fix not seen in stream -CVE-2023-7042: Fix unknown +CVE-2023-7042: Fix not seen in stream CVE-2023-7192: Fix not seen in stream CVE-2024-0340: Fix not seen in stream CVE-2024-0564: Fix unknown @@ -656,16 +805,17 @@ CVE-2024-0639: Fix not seen in stream CVE-2024-0641: Fix not seen in stream CVE-2024-0646: Fix not seen in stream CVE-2024-0775: Fix not seen in stream -CVE-2024-0841: Fix unknown +CVE-2024-0841: Fix not seen in stream CVE-2024-1085: Fix not seen in stream CVE-2024-1086: Fix not seen in stream CVE-2024-1151: Fix not seen in stream CVE-2024-1312: Fix not seen in stream CVE-2024-21803: Fix unknown -CVE-2024-22099: Fix unknown +CVE-2024-2193: Fix unknown +CVE-2024-22099: Fix not seen in stream CVE-2024-22386: Fix unknown -CVE-2024-23196: Fix unknown -CVE-2024-23307: Fix unknown +CVE-2024-23196: Fix not seen in stream +CVE-2024-23307: Fix not seen in stream CVE-2024-23848: Fix unknown CVE-2024-23849: Fix not seen in stream CVE-2024-23850: Fix not seen in stream @@ -675,7 +825,7 @@ CVE-2024-24857: Fix unknown CVE-2024-24858: Fix unknown CVE-2024-24859: Fix unknown CVE-2024-24860: Fix not seen in stream -CVE-2024-24861: Fix unknown +CVE-2024-24861: Fix not seen in stream CVE-2024-24864: Fix unknown CVE-2024-25739: Fix unknown CVE-2024-25740: Fix unknown @@ -685,8 +835,6 @@ CVE-2024-26583: Fix not seen in stream CVE-2024-26584: Fix not seen in stream CVE-2024-26585: Fix not seen in stream CVE-2024-26586: Fix not seen in stream -CVE-2024-26587: Fix not seen in stream -CVE-2024-26588: Fix not seen in stream CVE-2024-26589: Fix not seen in stream CVE-2024-26591: Fix not seen in stream CVE-2024-26592: Fix not seen in stream @@ -695,3 +843,130 @@ CVE-2024-26594: Fix not seen in stream CVE-2024-26595: Fix not seen in stream CVE-2024-26597: Fix not seen in stream CVE-2024-26598: Fix not seen in stream +CVE-2024-26600: Fix not seen in stream +CVE-2024-26601: Fix not seen in stream +CVE-2024-26602: Fix not seen in stream +CVE-2024-26606: Fix not seen in stream +CVE-2024-26607: Fix not seen in stream +CVE-2024-26610: Fix not seen in stream +CVE-2024-26614: Fix not seen in stream +CVE-2024-26615: Fix not seen in stream +CVE-2024-26622: Fix not seen in stream +CVE-2024-26623: Fix not seen in stream +CVE-2024-26625: Fix not seen in stream +CVE-2024-26627: Fix not seen in stream +CVE-2024-26631: Fix not seen in stream +CVE-2024-26633: Fix not seen in stream +CVE-2024-26635: Fix not seen in stream +CVE-2024-26636: Fix not seen in stream +CVE-2024-26640: Fix not seen in stream +CVE-2024-26641: Fix not seen in stream +CVE-2024-26642: Fix not seen in stream +CVE-2024-26644: Fix not seen in stream +CVE-2024-26645: Fix not seen in stream +CVE-2024-26646: Fix not seen in stream +CVE-2024-26647: Fix not seen in stream +CVE-2024-26648: Fix not seen in stream +CVE-2024-26650: Fix not seen in stream +CVE-2024-26651: Fix not seen in stream +CVE-2024-26654: Fix not seen in stream +CVE-2024-26655: Fix not seen in stream +CVE-2024-26656: Fix not seen in stream +CVE-2024-26658: Fix not seen in stream +CVE-2024-26659: Fix not seen in stream +CVE-2024-26660: Fix not seen in stream +CVE-2024-26661: Fix not seen in stream +CVE-2024-26662: Fix not seen in stream +CVE-2024-26663: Fix not seen in stream +CVE-2024-26664: Fix not seen in stream +CVE-2024-26665: Fix not seen in stream +CVE-2024-26668: Fix not seen in stream +CVE-2024-26669: Fix not seen in stream +CVE-2024-26671: Fix not seen in stream +CVE-2024-26672: Fix not seen in stream +CVE-2024-26673: Fix not seen in stream +CVE-2024-26675: Fix not seen in stream +CVE-2024-26676: Fix not seen in stream +CVE-2024-26677: Fix not seen in stream +CVE-2024-26679: Fix not seen in stream +CVE-2024-26680: Fix not seen in stream +CVE-2024-26684: Fix not seen in stream +CVE-2024-26685: Fix not seen in stream +CVE-2024-26686: Fix not seen in stream +CVE-2024-26687: Fix not seen in stream +CVE-2024-26688: Fix not seen in stream +CVE-2024-26689: Fix not seen in stream +CVE-2024-26691: Fix not seen in stream +CVE-2024-26696: Fix not seen in stream +CVE-2024-26697: Fix not seen in stream +CVE-2024-26698: Fix not seen in stream +CVE-2024-26699: Fix not seen in stream +CVE-2024-26700: Fix not seen in stream +CVE-2024-26702: Fix not seen in stream +CVE-2024-26704: Fix not seen in stream +CVE-2024-26706: Fix not seen in stream +CVE-2024-26707: Fix not seen in stream +CVE-2024-26712: Fix not seen in stream +CVE-2024-26713: Fix not seen in stream +CVE-2024-26715: Fix not seen in stream +CVE-2024-26717: Fix not seen in stream +CVE-2024-26718: Fix not seen in stream +CVE-2024-26719: Fix not seen in stream +CVE-2024-26720: Fix not seen in stream +CVE-2024-26726: Fix not seen in stream +CVE-2024-26727: Fix not seen in stream +CVE-2024-26733: Fix not seen in stream +CVE-2024-26735: Fix not seen in stream +CVE-2024-26736: Fix not seen in stream +CVE-2024-26738: Fix not seen in stream +CVE-2024-26739: Fix not seen in stream +CVE-2024-26740: Fix not seen in stream +CVE-2024-26743: Fix not seen in stream +CVE-2024-26744: Fix not seen in stream +CVE-2024-26745: Fix not seen in stream +CVE-2024-26747: Fix not seen in stream +CVE-2024-26748: Fix not seen in stream +CVE-2024-26749: Fix not seen in stream +CVE-2024-26751: Fix not seen in stream +CVE-2024-26752: Fix not seen in stream +CVE-2024-26754: Fix not seen in stream +CVE-2024-26756: Fix not seen in stream +CVE-2024-26757: Fix not seen in stream +CVE-2024-26758: Fix not seen in stream +CVE-2024-26759: Fix not seen in stream +CVE-2024-26763: Fix not seen in stream +CVE-2024-26764: Fix not seen in stream +CVE-2024-26765: Fix not seen in stream +CVE-2024-26766: Fix not seen in stream +CVE-2024-26767: Fix not seen in stream +CVE-2024-26768: Fix not seen in stream +CVE-2024-26769: Fix not seen in stream +CVE-2024-26770: Fix not seen in stream +CVE-2024-26771: Fix not seen in stream +CVE-2024-26772: Fix not seen in stream +CVE-2024-26773: Fix not seen in stream +CVE-2024-26774: Fix not seen in stream +CVE-2024-26775: Fix not seen in stream +CVE-2024-26776: Fix not seen in stream +CVE-2024-26777: Fix not seen in stream +CVE-2024-26778: Fix not seen in stream +CVE-2024-26779: Fix not seen in stream +CVE-2024-26782: Fix not seen in stream +CVE-2024-26784: Fix not seen in stream +CVE-2024-26787: Fix not seen in stream +CVE-2024-26788: Fix not seen in stream +CVE-2024-26789: Fix not seen in stream +CVE-2024-26790: Fix not seen in stream +CVE-2024-26791: Fix not seen in stream +CVE-2024-26793: Fix not seen in stream +CVE-2024-26795: Fix not seen in stream +CVE-2024-26797: Fix not seen in stream +CVE-2024-26798: Fix not seen in stream +CVE-2024-26801: Fix not seen in stream +CVE-2024-26802: Fix not seen in stream +CVE-2024-26803: Fix not seen in stream +CVE-2024-26804: Fix not seen in stream +CVE-2024-26805: Fix not seen in stream +CVE-2024-26806: Fix not seen in stream +CVE-2024-26808: Fix not seen in stream +CVE-2024-26809: Fix not seen in stream diff --git a/data/5.13/5.13_security.txt b/data/5.13/5.13_security.txt index b881133b6..713492e79 100644 --- a/data/5.13/5.13_security.txt +++ b/data/5.13/5.13_security.txt @@ -100,6 +100,7 @@ Outstanding CVEs: CVE-2019-19378: (unk) CVE-2019-19814: (unk) CVE-2019-20794: (unk) + CVE-2019-25162: (unk) i2c: Fix a potential use after free CVE-2020-0347: (unk) CVE-2020-10708: (unk) CVE-2020-11725: (unk) @@ -190,6 +191,36 @@ Outstanding CVEs: CVE-2021-45469: (unk) f2fs: fix to do sanity check on last xattr entry in __f2fs_setxattr() CVE-2021-45480: (unk) rds: memory leak in __rds_conn_create() CVE-2021-45868: (unk) quota: check block number when reading the block in quota file + CVE-2021-46923: (unk) fs/mount_setattr: always cleanup mount_kattr + CVE-2021-46924: (unk) NFC: st21nfca: Fix memory leak in device probe and remove + CVE-2021-46925: (unk) net/smc: fix kernel panic caused by race of smc_sock + CVE-2021-46926: (unk) ALSA: hda: intel-sdw-acpi: harden detection of controller + CVE-2021-46928: (unk) parisc: Clear stale IIR value on instruction access rights trap + CVE-2021-46929: (unk) sctp: use call_rcu to free endpoint + CVE-2021-46930: (unk) usb: mtu3: fix list_head check warning + CVE-2021-46931: (unk) net/mlx5e: Wrap the tx reporter dump callback to extract the sq + CVE-2021-46932: (unk) Input: appletouch - initialize work before device registration + CVE-2021-46933: (unk) usb: gadget: f_fs: Clear ffs_eventfd in ffs_data_clear. + CVE-2021-46934: (unk) i2c: validate user data in compat ioctl + CVE-2021-46935: (unk) binder: fix async_free_space accounting for empty parcels + CVE-2021-46936: (unk) net: fix use-after-free in tw_timer_handler + CVE-2021-47082: (unk) tun: avoid double free in tun_free_netdev + CVE-2021-47083: (unk) pinctrl: mediatek: fix global-out-of-bounds issue + CVE-2021-47086: (unk) phonet/pep: refuse to enable an unbound pipe + CVE-2021-47089: (unk) kfence: fix memory leak when cat kfence objects + CVE-2021-47090: (unk) mm/hwpoison: clear MF_COUNT_INCREASED before retrying get_any_page() + CVE-2021-47091: (unk) mac80211: fix locking in ieee80211_start_ap error path + CVE-2021-47093: (unk) platform/x86: intel_pmc_core: fix memleak on registration failure + CVE-2021-47094: (unk) KVM: x86/mmu: Don't advance iterator after restart due to yielding + CVE-2021-47095: (unk) ipmi: ssif: initialize ssif_info->client early + CVE-2021-47097: (unk) Input: elantech - fix stack out of bound access in elantech_change_report_id() + CVE-2021-47099: (unk) veth: ensure skb entering GRO are not cloned. + CVE-2021-47100: (unk) ipmi: Fix UAF when uninstall ipmi_si and ipmi_msghandler module + CVE-2021-47101: (unk) asix: fix uninit-value in asix_mdio_read() + CVE-2021-47103: (unk) inet: fully convert sk->sk_rx_dst to RCU rules + CVE-2021-47105: (unk) ice: xsk: return xsk buffers back to pool when cleaning the ring + CVE-2021-47106: (unk) netfilter: nf_tables: fix use-after-free in nft_set_catchall_destroy() + CVE-2021-47107: (unk) NFSD: Fix READDIR buffer overflow CVE-2022-0001: (unk) x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE CVE-2022-0002: (unk) x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE CVE-2022-0168: (unk) cifs: fix NULL ptr dereference in smb2_ioctl_query_info() @@ -447,6 +478,10 @@ Outstanding CVEs: CVE-2022-47521: (unk) wifi: wilc1000: validate length of IEEE80211_P2P_ATTR_CHANNEL_LIST attribute CVE-2022-47929: (unk) net: sched: disallow noqueue for qdisc classes CVE-2022-48619: (unk) Input: add bounds checking to input_set_capability() + CVE-2022-48626: (unk) moxart: fix potential use-after-free on remove path + CVE-2022-48627: (unk) vt: fix memory overlapping when deleting chars in the buffer + CVE-2022-48628: (unk) ceph: drop messages from MDS when unmounting + CVE-2022-48629: (unk) crypto: qcom-rng - ensure buffer for generate is completely filled CVE-2023-0045: (unk) x86/bugs: Flush IBP in ib_prctl_set() CVE-2023-0047: (unk) mm, oom: do not trigger out_of_memory from the #PF CVE-2023-0160: (unk) bpf, sockmap: fix deadlocks in the sockhash and sockmap @@ -533,6 +568,7 @@ Outstanding CVEs: CVE-2023-28410: (unk) drm/i915/gem: add missing boundary check in vm_access CVE-2023-28466: (unk) net: tls: fix possible race condition between do_tls_getsockopt_conf() and do_tls_setsockopt_conf() CVE-2023-2860: (unk) ipv6: sr: fix out-of-bounds read when setting HMAC data. + CVE-2023-28746: (unk) x86/mmio: Disable KVM mitigation when X86_FEATURE_CLEAR_CPU_BUF is set CVE-2023-2898: (unk) f2fs: fix to avoid NULL pointer dereference f2fs_write_end_io() CVE-2023-2985: (unk) fs: hfsplus: fix UAF issue in hfsplus_put_super CVE-2023-3006: (unk) arm64: Add AMPERE1 to the Spectre-BHB affected list @@ -627,7 +663,7 @@ Outstanding CVEs: CVE-2023-46813: (unk) x86/sev: Check for user-space IOIO pointing to kernel space CVE-2023-46838: (unk) xen-netback: don't produce zero-size SKB frags CVE-2023-46862: (unk) io_uring/fdinfo: lock SQ thread while retrieving thread cpu/pid - CVE-2023-47233: (unk) + CVE-2023-47233: (unk) wifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach CVE-2023-4881: (unk) netfilter: nftables: exthdr: fix 4-byte stack OOB write CVE-2023-4921: (unk) net: sched: sch_qfq: Fix UAF in qfq_dequeue() CVE-2023-50431: (unk) accel/habanalabs: fix information leak in sec_attest_info() @@ -657,19 +693,132 @@ Outstanding CVEs: CVE-2023-52452: (unk) bpf: Fix accesses to uninit stack slots CVE-2023-52454: (unk) nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length CVE-2023-52456: (unk) serial: imx: fix tx statemachine deadlock - CVE-2023-52457: (unk) serial: 8250: omap: Don't skip resource freeing if pm_runtime_resume_and_get() failed CVE-2023-52458: (unk) block: add check that partition length needs to be aligned with block size CVE-2023-52463: (unk) efivarfs: force RO when remounting if SetVariable is not supported CVE-2023-52464: (unk) EDAC/thunderx: Fix possible out-of-bounds string access + CVE-2023-52467: (unk) mfd: syscon: Fix null pointer dereference in of_syscon_register() + CVE-2023-52469: (unk) drivers/amd/pm: fix a use-after-free in kv_parse_power_table + CVE-2023-52470: (unk) drm/radeon: check the alloc_workqueue return value in radeon_crtc_init() + CVE-2023-52474: (unk) IB/hfi1: Fix bugs with non-PAGE_SIZE-end multi-iovec user SDMA requests + CVE-2023-52475: (unk) Input: powermate - fix use-after-free in powermate_config_complete + CVE-2023-52476: (unk) perf/x86/lbr: Filter vsyscall addresses + CVE-2023-52477: (unk) usb: hub: Guard against accesses to uninitialized BOS descriptors + CVE-2023-52478: (unk) HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect + CVE-2023-52479: (unk) ksmbd: fix uaf in smb20_oplock_break_ack + CVE-2023-52480: (unk) ksmbd: fix race condition between session lookup and expire + CVE-2023-52481: (unk) arm64: errata: Add Cortex-A520 speculative unprivileged load workaround + CVE-2023-52482: (unk) x86/srso: Add SRSO mitigation for Hygon processors + CVE-2023-52484: (unk) iommu/arm-smmu-v3: Fix soft lockup triggered by arm_smmu_mm_invalidate_range + CVE-2023-52485: (unk) drm/amd/display: Wake DMCUB before sending a command + CVE-2023-52486: (unk) drm: Don't unref the same fb many times by mistake due to deadlock handling + CVE-2023-52488: (unk) serial: sc16is7xx: convert from _raw_ to _noinc_ regmap functions for FIFO + CVE-2023-52489: (unk) mm/sparsemem: fix race in accessing memory_section->usage + CVE-2023-52491: (unk) media: mtk-jpeg: Fix use after free bug due to error path handling in mtk_jpeg_dec_device_run + CVE-2023-52492: (unk) dmaengine: fix NULL pointer in channel unregistration function + CVE-2023-52493: (unk) bus: mhi: host: Drop chan lock before queuing buffers + CVE-2023-52494: (unk) bus: mhi: host: Add alignment check for event ring read pointer + CVE-2023-52497: (unk) erofs: fix lz4 inplace decompression + CVE-2023-52498: (unk) PM: sleep: Fix possible deadlocks in core system-wide PM code + CVE-2023-52499: (unk) powerpc/47x: Fix 47x syscall return crash + CVE-2023-52500: (unk) scsi: pm80xx: Avoid leaking tags when processing OPC_INB_SET_CONTROLLER_CONFIG command + CVE-2023-52501: (unk) ring-buffer: Do not attempt to read past "commit" + CVE-2023-52502: (unk) net: nfc: fix races in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn() + CVE-2023-52503: (unk) tee: amdtee: fix use-after-free vulnerability in amdtee_close_session + CVE-2023-52504: (unk) x86/alternatives: Disable KASAN in apply_alternatives() + CVE-2023-52506: (unk) LoongArch: Set all reserved memblocks on Node#0 at initialization + CVE-2023-52507: (unk) nfc: nci: assert requested protocol is valid + CVE-2023-52508: (unk) nvme-fc: Prevent null pointer dereference in nvme_fc_io_getuuid() + CVE-2023-52509: (unk) ravb: Fix use-after-free issue in ravb_tx_timeout_work() + CVE-2023-52510: (unk) ieee802154: ca8210: Fix a potential UAF in ca8210_probe + CVE-2023-52511: (unk) spi: sun6i: reduce DMA RX transfer width to single byte + CVE-2023-52513: (unk) RDMA/siw: Fix connection failure handling + CVE-2023-52515: (unk) RDMA/srp: Do not call scsi_done() from srp_abort() + CVE-2023-52516: (unk) dma-debug: don't call __dma_entry_alloc_check_leak() under free_entries_lock + CVE-2023-52517: (unk) spi: sun6i: fix race between DMA RX transfer completion and RX FIFO drain + CVE-2023-52519: (unk) HID: intel-ish-hid: ipc: Disable and reenable ACPI GPE bit + CVE-2023-52522: (unk) net: fix possible store tearing in neigh_periodic_work() + CVE-2023-52523: (unk) bpf, sockmap: Reject sk_msg egress redirects to non-TCP sockets + CVE-2023-52527: (unk) ipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data() + CVE-2023-52528: (unk) net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg + CVE-2023-52530: (unk) wifi: mac80211: fix potential key use-after-free + CVE-2023-52531: (unk) wifi: iwlwifi: mvm: Fix a memory corruption issue + CVE-2023-52532: (unk) net: mana: Fix TX CQE error handling + CVE-2023-52559: (unk) iommu/vt-d: Avoid memory allocation in iommu_suspend() + CVE-2023-52561: (unk) arm64: dts: qcom: sdm845-db845c: Mark cont splash memory region as reserved + CVE-2023-52563: (unk) drm/meson: fix memory leak on ->hpd_notify callback + CVE-2023-52565: (unk) media: uvcvideo: Fix OOB read + CVE-2023-52566: (unk) nilfs2: fix potential use after free in nilfs_gccache_submit_read_data() + CVE-2023-52568: (unk) x86/sgx: Resolves SECS reclaim vs. page fault for EAUG race + CVE-2023-52569: (unk) btrfs: remove BUG() after failure to insert delayed dir index item + CVE-2023-52571: (unk) power: supply: rk817: Fix node refcount leak + CVE-2023-52572: (unk) cifs: Fix UAF in cifs_demultiplex_thread() + CVE-2023-52573: (unk) net: rds: Fix possible NULL-pointer dereference + CVE-2023-52574: (unk) team: fix null-ptr-deref when team device type is changed + CVE-2023-52576: (unk) x86/mm, kexec, ima: Use memblock_free_late() from ima_free_kexec_buffer() + CVE-2023-52578: (unk) net: bridge: use DEV_STATS_INC() + CVE-2023-52580: (unk) net/core: Fix ETH_P_1588 flow dissector + CVE-2023-52582: (unk) netfs: Only call folio_start_fscache() one time for each folio + CVE-2023-52583: (unk) ceph: fix deadlock or deadcode of misusing dget() + CVE-2023-52584: (unk) spmi: mediatek: Fix UAF on device remove + CVE-2023-52585: (unk) drm/amdgpu: Fix possible NULL dereference in amdgpu_ras_query_error_status_helper() + CVE-2023-52586: (unk) drm/msm/dpu: Add mutex lock in control vblank irq + CVE-2023-52587: (unk) IB/ipoib: Fix mcast list locking + CVE-2023-52588: (unk) f2fs: fix to tag gcing flag on page during block migration + CVE-2023-52589: (unk) media: rkisp1: Fix IRQ disable race issue + CVE-2023-52590: (unk) ocfs2: Avoid touching renamed directory if parent does not change + CVE-2023-52591: (unk) reiserfs: Avoid touching renamed directory if parent does not change + CVE-2023-52593: (unk) wifi: wfx: fix possible NULL pointer dereference in wfx_set_mfp_ap() + CVE-2023-52594: (unk) wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus() + CVE-2023-52595: (unk) wifi: rt2x00: restart beacon queue when hardware reset + CVE-2023-52596: (unk) sysctl: Fix out of bounds access for empty sysctl registers + CVE-2023-52597: (unk) KVM: s390: fix setting of fpc register + CVE-2023-52598: (unk) s390/ptrace: handle setting of fpc register correctly + CVE-2023-52599: (unk) jfs: fix array-index-out-of-bounds in diNewExt + CVE-2023-52600: (unk) jfs: fix uaf in jfs_evict_inode + CVE-2023-52601: (unk) jfs: fix array-index-out-of-bounds in dbAdjTree + CVE-2023-52602: (unk) jfs: fix slab-out-of-bounds Read in dtSearch + CVE-2023-52603: (unk) UBSAN: array-index-out-of-bounds in dtSplitRoot + CVE-2023-52604: (unk) FS:JFS:UBSAN:array-index-out-of-bounds in dbAdjTree + CVE-2023-52606: (unk) powerpc/lib: Validate size for vector operations + CVE-2023-52607: (unk) powerpc/mm: Fix null-pointer dereference in pgtable_cache_add + CVE-2023-52608: (unk) firmware: arm_scmi: Check mailbox/SMT channel for consistency + CVE-2023-52609: (unk) binder: fix race between mmput() and do_exit() + CVE-2023-52610: (unk) net/sched: act_ct: fix skb leak and crash on ooo frags + CVE-2023-52612: (unk) crypto: scomp - fix req->dst buffer overflow + CVE-2023-52614: (unk) PM / devfreq: Fix buffer overflow in trans_stat_show + CVE-2023-52615: (unk) hwrng: core - Fix page fault dead lock on mmap-ed hwrng + CVE-2023-52616: (unk) crypto: lib/mpi - Fix unexpected pointer access in mpi_ec_init + CVE-2023-52617: (unk) PCI: switchtec: Fix stdev_release() crash after surprise hot remove + CVE-2023-52618: (unk) block/rnbd-srv: Check for unlikely string overflow + CVE-2023-52619: (unk) pstore/ram: Fix crash when setting number of cpus to an odd number + CVE-2023-52620: (unk) netfilter: nf_tables: disallow timeout for anonymous sets + CVE-2023-52621: (unk) bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers + CVE-2023-52622: (unk) ext4: avoid online resizing failures due to oversized flex bg + CVE-2023-52623: (unk) SUNRPC: Fix a suspicious RCU usage warning + CVE-2023-52624: (unk) drm/amd/display: Wake DMCUB before executing GPINT commands + CVE-2023-52625: (unk) drm/amd/display: Refactor DMCUB enter/exit idle interface + CVE-2023-52627: (unk) iio: adc: ad7091r: Allow users to configure device events + CVE-2023-52628: (unk) netfilter: nftables: exthdr: fix 4-byte stack OOB write + CVE-2023-52629: (unk) sh: push-switch: Reorder cleanup operations to avoid use-after-free bug + CVE-2023-52630: (unk) blk-iocost: Fix an UBSAN shift-out-of-bounds warning + CVE-2023-52632: (unk) drm/amdkfd: Fix lock dependency warning with srcu + CVE-2023-52633: (unk) um: time-travel: fix time corruption + CVE-2023-52634: (unk) drm/amd/display: Fix disable_otg_wa logic + CVE-2023-52635: (unk) PM / devfreq: Synchronize devfreq_monitor_[start/stop] + CVE-2023-52637: (unk) can: j1939: Fix UAF in j1939_sk_match_filter during setsockopt(SO_J1939_FILTER) + CVE-2023-52638: (unk) can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock + CVE-2023-52639: (unk) KVM: s390: vsie: fix race during shadow creation + CVE-2023-52640: (unk) fs/ntfs3: Fix oob in ntfs_listxattr + CVE-2023-52641: (unk) fs/ntfs3: Add NULL ptr dereference checking at the end of attr_allocate_frame() CVE-2023-5717: (unk) perf: Disallow mis-matched inherited group reads CVE-2023-6040: (unk) netfilter: nf_tables: Reject tables of unsupported family CVE-2023-6121: (unk) nvmet: nul-terminate the NQNs passed in the connect command CVE-2023-6176: (unk) net/tls: do not free tls_rec on async operation in bpf_exec_tx_verdict() CVE-2023-6240: (unk) - CVE-2023-6270: (unk) - CVE-2023-6356: (unk) + CVE-2023-6270: (unk) aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts + CVE-2023-6356: (unk) nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length CVE-2023-6535: (unk) - CVE-2023-6536: (unk) + CVE-2023-6536: (unk) nvmet-tcp: fix a crash in nvmet_req_complete() CVE-2023-6546: (unk) tty: n_gsm: fix the UAF caused by race condition in gsm_cleanup_mux CVE-2023-6560: (unk) io_uring: don't allow discontig pages for IORING_SETUP_NO_MMAP CVE-2023-6606: (unk) smb: client: fix OOB in smbCalcSize() @@ -679,7 +828,7 @@ Outstanding CVEs: CVE-2023-6915: (unk) ida: Fix crash in ida_free when the bitmap is empty CVE-2023-6931: (unk) perf: Fix perf_event_validate_size() CVE-2023-6932: (unk) ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet - CVE-2023-7042: (unk) + CVE-2023-7042: (unk) wifi: ath10k: fix NULL pointer dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev() CVE-2023-7192: (unk) netfilter: ctnetlink: fix possible refcount leak in ctnetlink_create_conntrack() CVE-2024-0340: (unk) vhost: use kzalloc() instead of kmalloc() followed by memset() CVE-2024-0564: (unk) @@ -690,16 +839,17 @@ Outstanding CVEs: CVE-2024-0641: (unk) tipc: fix a potential deadlock on &tx->lock CVE-2024-0646: (unk) net: tls, update curr on splice as well CVE-2024-0775: (unk) ext4: improve error recovery code paths in __ext4_remount() - CVE-2024-0841: (unk) + CVE-2024-0841: (unk) fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super CVE-2024-1085: (unk) netfilter: nf_tables: check if catch-all set element is active in next generation CVE-2024-1086: (unk) netfilter: nf_tables: reject QUEUE/DROP verdict parameters CVE-2024-1151: (unk) net: openvswitch: limit the number of recursions from action sets CVE-2024-1312: (unk) mm: lock_vma_under_rcu() must check vma->anon_vma under vma lock CVE-2024-21803: (unk) - CVE-2024-22099: (unk) + CVE-2024-2193: (unk) + CVE-2024-22099: (unk) Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security CVE-2024-22386: (unk) - CVE-2024-23196: (unk) - CVE-2024-23307: (unk) + CVE-2024-23196: (unk) ALSA: hda: fix a possible null-pointer dereference due to data race in snd_hdac_regmap_sync() + CVE-2024-23307: (unk) md/raid5: fix atomicity violation in raid5_cache_count CVE-2024-23848: (unk) CVE-2024-23849: (unk) net/rds: Fix UBSAN: array-index-out-of-bounds in rds_cmsg_recv CVE-2024-23850: (unk) btrfs: do not ASSERT() if the newly created subvolume already got read @@ -709,7 +859,7 @@ Outstanding CVEs: CVE-2024-24858: (unk) CVE-2024-24859: (unk) CVE-2024-24860: (unk) Bluetooth: Fix atomicity violation in {min,max}_key_size_set - CVE-2024-24861: (unk) + CVE-2024-24861: (unk) media: xc4000: Fix atomicity violation in xc4000_get_frequency CVE-2024-24864: (unk) CVE-2024-25739: (unk) CVE-2024-25740: (unk) @@ -719,8 +869,6 @@ Outstanding CVEs: CVE-2024-26584: (unk) net: tls: handle backlogging of crypto requests CVE-2024-26585: (unk) tls: fix race between tx work scheduling and socket close CVE-2024-26586: (unk) mlxsw: spectrum_acl_tcam: Fix stack corruption - CVE-2024-26587: (unk) net: netdevsim: don't try to destroy PHC on VFs - CVE-2024-26588: (unk) LoongArch: BPF: Prevent out-of-bounds memory access CVE-2024-26589: (unk) bpf: Reject variable offset alu on PTR_TO_FLOW_KEYS CVE-2024-26591: (unk) bpf: Fix re-attachment branch in bpf_tracing_prog_attach CVE-2024-26592: (unk) ksmbd: fix UAF issue in ksmbd_tcp_new_connection() @@ -729,3 +877,130 @@ Outstanding CVEs: CVE-2024-26595: (unk) mlxsw: spectrum_acl_tcam: Fix NULL pointer dereference in error path CVE-2024-26597: (unk) net: qualcomm: rmnet: fix global oob in rmnet_policy CVE-2024-26598: (unk) KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache + CVE-2024-26600: (unk) phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP + CVE-2024-26601: (unk) ext4: regenerate buddy after block freeing failed if under fc replay + CVE-2024-26602: (unk) sched/membarrier: reduce the ability to hammer on sys_membarrier + CVE-2024-26606: (unk) binder: signal epoll threads of self-work + CVE-2024-26607: (unk) drm/bridge: sii902x: Fix probing race issue + CVE-2024-26610: (unk) wifi: iwlwifi: fix a memory corruption + CVE-2024-26614: (unk) tcp: make sure init the accept_queue's spinlocks once + CVE-2024-26615: (unk) net/smc: fix illegal rmb_desc access in SMC-D connection dump + CVE-2024-26622: (unk) tomoyo: fix UAF write bug in tomoyo_write_control() + CVE-2024-26623: (unk) pds_core: Prevent race issues involving the adminq + CVE-2024-26625: (unk) llc: call sock_orphan() at release time + CVE-2024-26627: (unk) scsi: core: Move scsi_host_busy() out of host lock for waking up EH handler + CVE-2024-26631: (unk) ipv6: mcast: fix data-race in ipv6_mc_down / mld_ifc_work + CVE-2024-26633: (unk) ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim() + CVE-2024-26635: (unk) llc: Drop support for ETH_P_TR_802_2. + CVE-2024-26636: (unk) llc: make llc_ui_sendmsg() more robust against bonding changes + CVE-2024-26640: (unk) tcp: add sanity checks to rx zerocopy + CVE-2024-26641: (unk) ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv() + CVE-2024-26642: (unk) netfilter: nf_tables: disallow anonymous set with timeout flag + CVE-2024-26644: (unk) btrfs: don't abort filesystem when attempting to snapshot deleted subvolume + CVE-2024-26645: (unk) tracing: Ensure visibility when inserting an element into tracing_map + CVE-2024-26646: (unk) thermal: intel: hfi: Add syscore callbacks for system-wide PM + CVE-2024-26647: (unk) drm/amd/display: Fix late derefrence 'dsc' check in 'link_set_dsc_pps_packet()' + CVE-2024-26648: (unk) drm/amd/display: Fix variable deferencing before NULL check in edp_setup_replay() + CVE-2024-26650: (unk) platform/x86: p2sb: Allow p2sb_bar() calls during PCI device probe + CVE-2024-26651: (unk) sr9800: Add check for usbnet_get_endpoints + CVE-2024-26654: (unk) ALSA: sh: aica: reorder cleanup operations to avoid UAF bugs + CVE-2024-26655: (unk) Fix memory leak in posix_clock_open() + CVE-2024-26656: (unk) drm/amdgpu: fix use-after-free bug + CVE-2024-26658: (unk) bcachefs: grab s_umount only if snapshotting + CVE-2024-26659: (unk) xhci: handle isoc Babble and Buffer Overrun events properly + CVE-2024-26660: (unk) drm/amd/display: Implement bounds check for stream encoder creation in DCN301 + CVE-2024-26661: (unk) drm/amd/display: Add NULL test for 'timing generator' in 'dcn21_set_pipe()' + CVE-2024-26662: (unk) drm/amd/display: Fix 'panel_cntl' could be null in 'dcn21_set_backlight_level()' + CVE-2024-26663: (unk) tipc: Check the bearer type before calling tipc_udp_nl_bearer_add() + CVE-2024-26664: (unk) hwmon: (coretemp) Fix out-of-bounds memory access + CVE-2024-26665: (unk) tunnels: fix out of bounds access when building IPv6 PMTU error + CVE-2024-26668: (unk) netfilter: nft_limit: reject configurations that cause integer overflow + CVE-2024-26669: (unk) net/sched: flower: Fix chain template offload + CVE-2024-26671: (unk) blk-mq: fix IO hang from sbitmap wakeup race + CVE-2024-26672: (unk) drm/amdgpu: Fix variable 'mca_funcs' dereferenced before NULL check in 'amdgpu_mca_smu_get_mca_entry()' + CVE-2024-26673: (unk) netfilter: nft_ct: sanitize layer 3 and 4 protocol number in custom expectations + CVE-2024-26675: (unk) ppp_async: limit MRU to 64K + CVE-2024-26676: (unk) af_unix: Call kfree_skb() for dead unix_(sk)->oob_skb in GC. + CVE-2024-26677: (unk) rxrpc: Fix delayed ACKs to not set the reference serial number + CVE-2024-26679: (unk) inet: read sk->sk_family once in inet_recv_error() + CVE-2024-26680: (unk) net: atlantic: Fix DMA mapping for PTP hwts ring + CVE-2024-26684: (unk) net: stmmac: xgmac: fix handling of DPP safety error for DMA channels + CVE-2024-26685: (unk) nilfs2: fix potential bug in end_buffer_async_write + CVE-2024-26686: (unk) fs/proc: do_task_stat: use sig->stats_lock to gather the threads/children stats + CVE-2024-26687: (unk) xen/events: close evtchn after mapping cleanup + CVE-2024-26688: (unk) fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super + CVE-2024-26689: (unk) ceph: prevent use-after-free in encode_cap_msg() + CVE-2024-26691: (unk) KVM: arm64: Fix circular locking dependency + CVE-2024-26696: (unk) nilfs2: fix hang in nilfs_lookup_dirty_data_buffers() + CVE-2024-26697: (unk) nilfs2: fix data corruption in dsync block recovery for small block sizes + CVE-2024-26698: (unk) hv_netvsc: Fix race condition between netvsc_probe and netvsc_remove + CVE-2024-26699: (unk) drm/amd/display: Fix array-index-out-of-bounds in dcn35_clkmgr + CVE-2024-26700: (unk) drm/amd/display: Fix MST Null Ptr for RV + CVE-2024-26702: (unk) iio: magnetometer: rm3100: add boundary check for the value read from RM3100_REG_TMRC + CVE-2024-26704: (unk) ext4: fix double-free of blocks due to wrong extents moved_len + CVE-2024-26706: (unk) parisc: Fix random data corruption from exception handler + CVE-2024-26707: (unk) net: hsr: remove WARN_ONCE() in send_hsr_supervision_frame() + CVE-2024-26712: (unk) powerpc/kasan: Fix addr error caused by page alignment + CVE-2024-26713: (unk) powerpc/pseries/iommu: Fix iommu initialisation during DLPAR add + CVE-2024-26715: (unk) usb: dwc3: gadget: Fix NULL pointer dereference in dwc3_gadget_suspend + CVE-2024-26717: (unk) HID: i2c-hid-of: fix NULL-deref on failed power up + CVE-2024-26718: (unk) dm-crypt, dm-verity: disable tasklets + CVE-2024-26719: (unk) nouveau: offload fence uevents work to workqueue + CVE-2024-26720: (unk) mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again + CVE-2024-26726: (unk) btrfs: don't drop extent_map for free space inode on write error + CVE-2024-26727: (unk) btrfs: do not ASSERT() if the newly created subvolume already got read + CVE-2024-26733: (unk) arp: Prevent overflow in arp_req_get(). + CVE-2024-26735: (unk) ipv6: sr: fix possible use-after-free and null-ptr-deref + CVE-2024-26736: (unk) afs: Increase buffer size in afs_update_volume_status() + CVE-2024-26738: (unk) powerpc/pseries/iommu: DLPAR add doesn't completely initialize pci_controller + CVE-2024-26739: (unk) net/sched: act_mirred: don't override retval if we already lost the skb + CVE-2024-26740: (unk) net/sched: act_mirred: use the backlog for mirred ingress + CVE-2024-26743: (unk) RDMA/qedr: Fix qedr_create_user_qp error flow + CVE-2024-26744: (unk) RDMA/srpt: Support specifying the srpt_service_guid parameter + CVE-2024-26745: (unk) powerpc/pseries/iommu: IOMMU table is not initialized for kdump over SR-IOV + CVE-2024-26747: (unk) usb: roles: fix NULL pointer issue when put module's reference + CVE-2024-26748: (unk) usb: cdns3: fix memory double free when handle zero packet + CVE-2024-26749: (unk) usb: cdns3: fixed memory use after free at cdns3_gadget_ep_disable() + CVE-2024-26751: (unk) ARM: ep93xx: Add terminator to gpiod_lookup_table + CVE-2024-26752: (unk) l2tp: pass correct message length to ip6_append_data + CVE-2024-26754: (unk) gtp: fix use-after-free and null-ptr-deref in gtp_genl_dump_pdp() + CVE-2024-26756: (unk) md: Don't register sync_thread for reshape directly + CVE-2024-26757: (unk) md: Don't ignore read-only array in md_check_recovery() + CVE-2024-26758: (unk) md: Don't ignore suspended array in md_check_recovery() + CVE-2024-26759: (unk) mm/swap: fix race when skipping swapcache + CVE-2024-26763: (unk) dm-crypt: don't modify the data when using authenticated encryption + CVE-2024-26764: (unk) fs/aio: Restrict kiocb_set_cancel_fn() to I/O submitted via libaio + CVE-2024-26765: (unk) LoongArch: Disable IRQ before init_fn() for nonboot CPUs + CVE-2024-26766: (unk) IB/hfi1: Fix sdma.h tx->num_descs off-by-one error + CVE-2024-26767: (unk) drm/amd/display: fixed integer types and null check locations + CVE-2024-26768: (unk) LoongArch: Change acpi_core_pic[NR_CPUS] to acpi_core_pic[MAX_CORE_PIC] + CVE-2024-26769: (unk) nvmet-fc: avoid deadlock on delete association path + CVE-2024-26770: (unk) HID: nvidia-shield: Add missing null pointer checks to LED initialization + CVE-2024-26771: (unk) dmaengine: ti: edma: Add some null pointer checks to the edma_probe + CVE-2024-26772: (unk) ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal() + CVE-2024-26773: (unk) ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found() + CVE-2024-26774: (unk) ext4: avoid dividing by 0 in mb_update_avg_fragment_size() when block bitmap corrupt + CVE-2024-26775: (unk) aoe: avoid potential deadlock at set_capacity + CVE-2024-26776: (unk) spi: hisi-sfc-v3xx: Return IRQ_NONE if no interrupts were detected + CVE-2024-26777: (unk) fbdev: sis: Error out if pixclock equals zero + CVE-2024-26778: (unk) fbdev: savage: Error out if pixclock equals zero + CVE-2024-26779: (unk) wifi: mac80211: fix race condition on enabling fast-xmit + CVE-2024-26782: (unk) mptcp: fix double-free on socket dismantle + CVE-2024-26784: (unk) pmdomain: arm: Fix NULL dereference on scmi_perf_domain removal + CVE-2024-26787: (unk) mmc: mmci: stm32: fix DMA API overlapping mappings warning + CVE-2024-26788: (unk) dmaengine: fsl-qdma: init irq after reg initialization + CVE-2024-26789: (unk) crypto: arm64/neonbs - fix out-of-bounds access on short input + CVE-2024-26790: (unk) dmaengine: fsl-qdma: fix SoC may hang on 16 byte unaligned read + CVE-2024-26791: (unk) btrfs: dev-replace: properly validate device names + CVE-2024-26793: (unk) gtp: fix use-after-free and null-ptr-deref in gtp_newlink() + CVE-2024-26795: (unk) riscv: Sparse-Memory/vmemmap out-of-bounds fix + CVE-2024-26797: (unk) drm/amd/display: Prevent potential buffer overflow in map_hw_resources + CVE-2024-26798: (unk) fbcon: always restore the old font data in fbcon_do_set_font() + CVE-2024-26801: (unk) Bluetooth: Avoid potential use-after-free in hci_error_reset + CVE-2024-26802: (unk) stmmac: Clear variable when destroying workqueue + CVE-2024-26803: (unk) net: veth: clear GRO when clearing XDP even when down + CVE-2024-26804: (unk) net: ip_tunnel: prevent perpetual headroom growth + CVE-2024-26805: (unk) netlink: Fix kernel-infoleak-after-free in __skb_datagram_iter + CVE-2024-26806: (unk) spi: cadence-qspi: remove system-wide suspend helper calls from runtime PM hooks + CVE-2024-26808: (unk) netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain + CVE-2024-26809: (unk) netfilter: nft_set_pipapo: release elements in clone only from destroy path diff --git a/data/5.14/5.14_CVEs.txt b/data/5.14/5.14_CVEs.txt index f8907d4cb..6ba93c9bd 100644 --- a/data/5.14/5.14_CVEs.txt +++ b/data/5.14/5.14_CVEs.txt @@ -26,6 +26,7 @@ CVE-2019-16089: Fix unknown CVE-2019-19378: Fix unknown CVE-2019-19814: Fix unknown CVE-2019-20794: Fix unknown +CVE-2019-25162: Fix not seen in stream CVE-2020-0347: Fix unknown CVE-2020-10708: Fix unknown CVE-2020-11725: Fix unknown @@ -124,6 +125,40 @@ CVE-2021-45402: Fix not seen in stream CVE-2021-45469: Fix not seen in stream CVE-2021-45480: Fix not seen in stream CVE-2021-45868: Fixed with 5.14.19 +CVE-2021-46923: Fix not seen in stream +CVE-2021-46924: Fix not seen in stream +CVE-2021-46925: Fix not seen in stream +CVE-2021-46926: Fix not seen in stream +CVE-2021-46928: Fix not seen in stream +CVE-2021-46929: Fix not seen in stream +CVE-2021-46930: Fix not seen in stream +CVE-2021-46931: Fix not seen in stream +CVE-2021-46932: Fix not seen in stream +CVE-2021-46933: Fix not seen in stream +CVE-2021-46934: Fix not seen in stream +CVE-2021-46935: Fix not seen in stream +CVE-2021-46936: Fix not seen in stream +CVE-2021-47082: Fix not seen in stream +CVE-2021-47083: Fix not seen in stream +CVE-2021-47086: Fix not seen in stream +CVE-2021-47087: Fix not seen in stream +CVE-2021-47089: Fix not seen in stream +CVE-2021-47090: Fix not seen in stream +CVE-2021-47091: Fix not seen in stream +CVE-2021-47093: Fix not seen in stream +CVE-2021-47094: Fix not seen in stream +CVE-2021-47095: Fix not seen in stream +CVE-2021-47097: Fix not seen in stream +CVE-2021-47098: Fix not seen in stream +CVE-2021-47099: Fix not seen in stream +CVE-2021-47100: Fix not seen in stream +CVE-2021-47101: Fix not seen in stream +CVE-2021-47102: Fix not seen in stream +CVE-2021-47103: Fix not seen in stream +CVE-2021-47105: Fix not seen in stream +CVE-2021-47106: Fix not seen in stream +CVE-2021-47107: Fix not seen in stream +CVE-2021-47108: Fix not seen in stream CVE-2022-0001: Fix not seen in stream CVE-2022-0002: Fix not seen in stream CVE-2022-0168: Fix not seen in stream @@ -384,6 +419,10 @@ CVE-2022-47520: Fix not seen in stream CVE-2022-47521: Fix not seen in stream CVE-2022-47929: Fix not seen in stream CVE-2022-48619: Fix not seen in stream +CVE-2022-48626: Fix not seen in stream +CVE-2022-48627: Fix not seen in stream +CVE-2022-48628: Fix not seen in stream +CVE-2022-48629: Fix not seen in stream CVE-2023-0045: Fix not seen in stream CVE-2023-0047: Fixed with 5.14.19 CVE-2023-0160: Fix not seen in stream @@ -473,6 +512,7 @@ CVE-2023-28328: Fix not seen in stream CVE-2023-28410: Fix not seen in stream CVE-2023-28466: Fix not seen in stream CVE-2023-2860: Fix not seen in stream +CVE-2023-28746: Fix not seen in stream CVE-2023-2898: Fix not seen in stream CVE-2023-2985: Fix not seen in stream CVE-2023-3006: Fix not seen in stream @@ -567,7 +607,7 @@ CVE-2023-46343: Fix not seen in stream CVE-2023-46813: Fix not seen in stream CVE-2023-46838: Fix not seen in stream CVE-2023-46862: Fix not seen in stream -CVE-2023-47233: Fix unknown +CVE-2023-47233: Fix not seen in stream CVE-2023-4881: Fix not seen in stream CVE-2023-4921: Fix not seen in stream CVE-2023-50431: Fix not seen in stream @@ -597,19 +637,134 @@ CVE-2023-52451: Fix not seen in stream CVE-2023-52452: Fix not seen in stream CVE-2023-52454: Fix not seen in stream CVE-2023-52456: Fix not seen in stream -CVE-2023-52457: Fix not seen in stream CVE-2023-52458: Fix not seen in stream CVE-2023-52463: Fix not seen in stream CVE-2023-52464: Fix not seen in stream +CVE-2023-52467: Fix not seen in stream +CVE-2023-52469: Fix not seen in stream +CVE-2023-52470: Fix not seen in stream +CVE-2023-52474: Fix not seen in stream +CVE-2023-52475: Fix not seen in stream +CVE-2023-52476: Fix not seen in stream +CVE-2023-52477: Fix not seen in stream +CVE-2023-52478: Fix not seen in stream +CVE-2023-52479: Fix not seen in stream +CVE-2023-52480: Fix not seen in stream +CVE-2023-52481: Fix not seen in stream +CVE-2023-52482: Fix not seen in stream +CVE-2023-52484: Fix not seen in stream +CVE-2023-52485: Fix not seen in stream +CVE-2023-52486: Fix not seen in stream +CVE-2023-52488: Fix not seen in stream +CVE-2023-52489: Fix not seen in stream +CVE-2023-52491: Fix not seen in stream +CVE-2023-52492: Fix not seen in stream +CVE-2023-52493: Fix not seen in stream +CVE-2023-52494: Fix not seen in stream +CVE-2023-52497: Fix not seen in stream +CVE-2023-52498: Fix not seen in stream +CVE-2023-52499: Fix not seen in stream +CVE-2023-52500: Fix not seen in stream +CVE-2023-52501: Fix not seen in stream +CVE-2023-52502: Fix not seen in stream +CVE-2023-52503: Fix not seen in stream +CVE-2023-52504: Fix not seen in stream +CVE-2023-52506: Fix not seen in stream +CVE-2023-52507: Fix not seen in stream +CVE-2023-52508: Fix not seen in stream +CVE-2023-52509: Fix not seen in stream +CVE-2023-52510: Fix not seen in stream +CVE-2023-52511: Fix not seen in stream +CVE-2023-52513: Fix not seen in stream +CVE-2023-52515: Fix not seen in stream +CVE-2023-52516: Fix not seen in stream +CVE-2023-52517: Fix not seen in stream +CVE-2023-52519: Fix not seen in stream +CVE-2023-52520: Fix not seen in stream +CVE-2023-52522: Fix not seen in stream +CVE-2023-52523: Fix not seen in stream +CVE-2023-52527: Fix not seen in stream +CVE-2023-52528: Fix not seen in stream +CVE-2023-52529: Fix not seen in stream +CVE-2023-52530: Fix not seen in stream +CVE-2023-52531: Fix not seen in stream +CVE-2023-52532: Fix not seen in stream +CVE-2023-52559: Fix not seen in stream +CVE-2023-52561: Fix not seen in stream +CVE-2023-52563: Fix not seen in stream +CVE-2023-52565: Fix not seen in stream +CVE-2023-52566: Fix not seen in stream +CVE-2023-52568: Fix not seen in stream +CVE-2023-52569: Fix not seen in stream +CVE-2023-52571: Fix not seen in stream +CVE-2023-52572: Fix not seen in stream +CVE-2023-52573: Fix not seen in stream +CVE-2023-52574: Fix not seen in stream +CVE-2023-52576: Fix not seen in stream +CVE-2023-52578: Fix not seen in stream +CVE-2023-52580: Fix not seen in stream +CVE-2023-52582: Fix not seen in stream +CVE-2023-52583: Fix not seen in stream +CVE-2023-52584: Fix not seen in stream +CVE-2023-52585: Fix not seen in stream +CVE-2023-52586: Fix not seen in stream +CVE-2023-52587: Fix not seen in stream +CVE-2023-52588: Fix not seen in stream +CVE-2023-52589: Fix not seen in stream +CVE-2023-52590: Fix not seen in stream +CVE-2023-52591: Fix not seen in stream +CVE-2023-52593: Fix not seen in stream +CVE-2023-52594: Fix not seen in stream +CVE-2023-52595: Fix not seen in stream +CVE-2023-52596: Fix not seen in stream +CVE-2023-52597: Fix not seen in stream +CVE-2023-52598: Fix not seen in stream +CVE-2023-52599: Fix not seen in stream +CVE-2023-52600: Fix not seen in stream +CVE-2023-52601: Fix not seen in stream +CVE-2023-52602: Fix not seen in stream +CVE-2023-52603: Fix not seen in stream +CVE-2023-52604: Fix not seen in stream +CVE-2023-52606: Fix not seen in stream +CVE-2023-52607: Fix not seen in stream +CVE-2023-52608: Fix not seen in stream +CVE-2023-52609: Fix not seen in stream +CVE-2023-52610: Fix not seen in stream +CVE-2023-52612: Fix not seen in stream +CVE-2023-52614: Fix not seen in stream +CVE-2023-52615: Fix not seen in stream +CVE-2023-52616: Fix not seen in stream +CVE-2023-52617: Fix not seen in stream +CVE-2023-52618: Fix not seen in stream +CVE-2023-52619: Fix not seen in stream +CVE-2023-52620: Fix not seen in stream +CVE-2023-52621: Fix not seen in stream +CVE-2023-52622: Fix not seen in stream +CVE-2023-52623: Fix not seen in stream +CVE-2023-52624: Fix not seen in stream +CVE-2023-52625: Fix not seen in stream +CVE-2023-52627: Fix not seen in stream +CVE-2023-52628: Fix not seen in stream +CVE-2023-52629: Fix not seen in stream +CVE-2023-52630: Fix not seen in stream +CVE-2023-52632: Fix not seen in stream +CVE-2023-52633: Fix not seen in stream +CVE-2023-52634: Fix not seen in stream +CVE-2023-52635: Fix not seen in stream +CVE-2023-52637: Fix not seen in stream +CVE-2023-52638: Fix not seen in stream +CVE-2023-52639: Fix not seen in stream +CVE-2023-52640: Fix not seen in stream +CVE-2023-52641: Fix not seen in stream CVE-2023-5717: Fix not seen in stream CVE-2023-6040: Fix not seen in stream CVE-2023-6121: Fix not seen in stream CVE-2023-6176: Fix not seen in stream CVE-2023-6240: Fix unknown -CVE-2023-6270: Fix unknown -CVE-2023-6356: Fix unknown +CVE-2023-6270: Fix not seen in stream +CVE-2023-6356: Fix not seen in stream CVE-2023-6535: Fix unknown -CVE-2023-6536: Fix unknown +CVE-2023-6536: Fix not seen in stream CVE-2023-6546: Fix not seen in stream CVE-2023-6560: Fix not seen in stream CVE-2023-6606: Fix not seen in stream @@ -619,7 +774,7 @@ CVE-2023-6817: Fix not seen in stream CVE-2023-6915: Fix not seen in stream CVE-2023-6931: Fix not seen in stream CVE-2023-6932: Fix not seen in stream -CVE-2023-7042: Fix unknown +CVE-2023-7042: Fix not seen in stream CVE-2023-7192: Fix not seen in stream CVE-2024-0340: Fix not seen in stream CVE-2024-0564: Fix unknown @@ -630,16 +785,17 @@ CVE-2024-0639: Fix not seen in stream CVE-2024-0641: Fix not seen in stream CVE-2024-0646: Fix not seen in stream CVE-2024-0775: Fix not seen in stream -CVE-2024-0841: Fix unknown +CVE-2024-0841: Fix not seen in stream CVE-2024-1085: Fix not seen in stream CVE-2024-1086: Fix not seen in stream CVE-2024-1151: Fix not seen in stream CVE-2024-1312: Fix not seen in stream CVE-2024-21803: Fix unknown -CVE-2024-22099: Fix unknown +CVE-2024-2193: Fix unknown +CVE-2024-22099: Fix not seen in stream CVE-2024-22386: Fix unknown -CVE-2024-23196: Fix unknown -CVE-2024-23307: Fix unknown +CVE-2024-23196: Fix not seen in stream +CVE-2024-23307: Fix not seen in stream CVE-2024-23848: Fix unknown CVE-2024-23849: Fix not seen in stream CVE-2024-23850: Fix not seen in stream @@ -649,7 +805,7 @@ CVE-2024-24857: Fix unknown CVE-2024-24858: Fix unknown CVE-2024-24859: Fix unknown CVE-2024-24860: Fix not seen in stream -CVE-2024-24861: Fix unknown +CVE-2024-24861: Fix not seen in stream CVE-2024-24864: Fix unknown CVE-2024-25739: Fix unknown CVE-2024-25740: Fix unknown @@ -659,8 +815,6 @@ CVE-2024-26583: Fix not seen in stream CVE-2024-26584: Fix not seen in stream CVE-2024-26585: Fix not seen in stream CVE-2024-26586: Fix not seen in stream -CVE-2024-26587: Fix not seen in stream -CVE-2024-26588: Fix not seen in stream CVE-2024-26589: Fix not seen in stream CVE-2024-26591: Fix not seen in stream CVE-2024-26592: Fix not seen in stream @@ -669,3 +823,131 @@ CVE-2024-26594: Fix not seen in stream CVE-2024-26595: Fix not seen in stream CVE-2024-26597: Fix not seen in stream CVE-2024-26598: Fix not seen in stream +CVE-2024-26600: Fix not seen in stream +CVE-2024-26601: Fix not seen in stream +CVE-2024-26602: Fix not seen in stream +CVE-2024-26603: Fix not seen in stream +CVE-2024-26606: Fix not seen in stream +CVE-2024-26607: Fix not seen in stream +CVE-2024-26610: Fix not seen in stream +CVE-2024-26614: Fix not seen in stream +CVE-2024-26615: Fix not seen in stream +CVE-2024-26622: Fix not seen in stream +CVE-2024-26623: Fix not seen in stream +CVE-2024-26625: Fix not seen in stream +CVE-2024-26627: Fix not seen in stream +CVE-2024-26631: Fix not seen in stream +CVE-2024-26633: Fix not seen in stream +CVE-2024-26635: Fix not seen in stream +CVE-2024-26636: Fix not seen in stream +CVE-2024-26640: Fix not seen in stream +CVE-2024-26641: Fix not seen in stream +CVE-2024-26642: Fix not seen in stream +CVE-2024-26644: Fix not seen in stream +CVE-2024-26645: Fix not seen in stream +CVE-2024-26646: Fix not seen in stream +CVE-2024-26647: Fix not seen in stream +CVE-2024-26648: Fix not seen in stream +CVE-2024-26650: Fix not seen in stream +CVE-2024-26651: Fix not seen in stream +CVE-2024-26654: Fix not seen in stream +CVE-2024-26655: Fix not seen in stream +CVE-2024-26656: Fix not seen in stream +CVE-2024-26658: Fix not seen in stream +CVE-2024-26659: Fix not seen in stream +CVE-2024-26660: Fix not seen in stream +CVE-2024-26661: Fix not seen in stream +CVE-2024-26662: Fix not seen in stream +CVE-2024-26663: Fix not seen in stream +CVE-2024-26664: Fix not seen in stream +CVE-2024-26665: Fix not seen in stream +CVE-2024-26668: Fix not seen in stream +CVE-2024-26669: Fix not seen in stream +CVE-2024-26671: Fix not seen in stream +CVE-2024-26672: Fix not seen in stream +CVE-2024-26673: Fix not seen in stream +CVE-2024-26675: Fix not seen in stream +CVE-2024-26676: Fix not seen in stream +CVE-2024-26677: Fix not seen in stream +CVE-2024-26679: Fix not seen in stream +CVE-2024-26680: Fix not seen in stream +CVE-2024-26684: Fix not seen in stream +CVE-2024-26685: Fix not seen in stream +CVE-2024-26686: Fix not seen in stream +CVE-2024-26687: Fix not seen in stream +CVE-2024-26688: Fix not seen in stream +CVE-2024-26689: Fix not seen in stream +CVE-2024-26691: Fix not seen in stream +CVE-2024-26696: Fix not seen in stream +CVE-2024-26697: Fix not seen in stream +CVE-2024-26698: Fix not seen in stream +CVE-2024-26699: Fix not seen in stream +CVE-2024-26700: Fix not seen in stream +CVE-2024-26702: Fix not seen in stream +CVE-2024-26704: Fix not seen in stream +CVE-2024-26706: Fix not seen in stream +CVE-2024-26707: Fix not seen in stream +CVE-2024-26712: Fix not seen in stream +CVE-2024-26713: Fix not seen in stream +CVE-2024-26715: Fix not seen in stream +CVE-2024-26717: Fix not seen in stream +CVE-2024-26718: Fix not seen in stream +CVE-2024-26719: Fix not seen in stream +CVE-2024-26720: Fix not seen in stream +CVE-2024-26726: Fix not seen in stream +CVE-2024-26727: Fix not seen in stream +CVE-2024-26733: Fix not seen in stream +CVE-2024-26735: Fix not seen in stream +CVE-2024-26736: Fix not seen in stream +CVE-2024-26738: Fix not seen in stream +CVE-2024-26739: Fix not seen in stream +CVE-2024-26740: Fix not seen in stream +CVE-2024-26743: Fix not seen in stream +CVE-2024-26744: Fix not seen in stream +CVE-2024-26745: Fix not seen in stream +CVE-2024-26747: Fix not seen in stream +CVE-2024-26748: Fix not seen in stream +CVE-2024-26749: Fix not seen in stream +CVE-2024-26751: Fix not seen in stream +CVE-2024-26752: Fix not seen in stream +CVE-2024-26754: Fix not seen in stream +CVE-2024-26756: Fix not seen in stream +CVE-2024-26757: Fix not seen in stream +CVE-2024-26758: Fix not seen in stream +CVE-2024-26759: Fix not seen in stream +CVE-2024-26763: Fix not seen in stream +CVE-2024-26764: Fix not seen in stream +CVE-2024-26765: Fix not seen in stream +CVE-2024-26766: Fix not seen in stream +CVE-2024-26767: Fix not seen in stream +CVE-2024-26768: Fix not seen in stream +CVE-2024-26769: Fix not seen in stream +CVE-2024-26770: Fix not seen in stream +CVE-2024-26771: Fix not seen in stream +CVE-2024-26772: Fix not seen in stream +CVE-2024-26773: Fix not seen in stream +CVE-2024-26774: Fix not seen in stream +CVE-2024-26775: Fix not seen in stream +CVE-2024-26776: Fix not seen in stream +CVE-2024-26777: Fix not seen in stream +CVE-2024-26778: Fix not seen in stream +CVE-2024-26779: Fix not seen in stream +CVE-2024-26782: Fix not seen in stream +CVE-2024-26784: Fix not seen in stream +CVE-2024-26787: Fix not seen in stream +CVE-2024-26788: Fix not seen in stream +CVE-2024-26789: Fix not seen in stream +CVE-2024-26790: Fix not seen in stream +CVE-2024-26791: Fix not seen in stream +CVE-2024-26793: Fix not seen in stream +CVE-2024-26795: Fix not seen in stream +CVE-2024-26797: Fix not seen in stream +CVE-2024-26798: Fix not seen in stream +CVE-2024-26801: Fix not seen in stream +CVE-2024-26802: Fix not seen in stream +CVE-2024-26803: Fix not seen in stream +CVE-2024-26804: Fix not seen in stream +CVE-2024-26805: Fix not seen in stream +CVE-2024-26806: Fix not seen in stream +CVE-2024-26808: Fix not seen in stream +CVE-2024-26809: Fix not seen in stream diff --git a/data/5.14/5.14_security.txt b/data/5.14/5.14_security.txt index 0bca8422e..cb138b0db 100644 --- a/data/5.14/5.14_security.txt +++ b/data/5.14/5.14_security.txt @@ -101,6 +101,7 @@ Outstanding CVEs: CVE-2019-19378: (unk) CVE-2019-19814: (unk) CVE-2019-20794: (unk) + CVE-2019-25162: (unk) i2c: Fix a potential use after free CVE-2020-0347: (unk) CVE-2020-10708: (unk) CVE-2020-11725: (unk) @@ -164,6 +165,40 @@ Outstanding CVEs: CVE-2021-45402: (unk) bpf: Fix signed bounds propagation after mov32 CVE-2021-45469: (unk) f2fs: fix to do sanity check on last xattr entry in __f2fs_setxattr() CVE-2021-45480: (unk) rds: memory leak in __rds_conn_create() + CVE-2021-46923: (unk) fs/mount_setattr: always cleanup mount_kattr + CVE-2021-46924: (unk) NFC: st21nfca: Fix memory leak in device probe and remove + CVE-2021-46925: (unk) net/smc: fix kernel panic caused by race of smc_sock + CVE-2021-46926: (unk) ALSA: hda: intel-sdw-acpi: harden detection of controller + CVE-2021-46928: (unk) parisc: Clear stale IIR value on instruction access rights trap + CVE-2021-46929: (unk) sctp: use call_rcu to free endpoint + CVE-2021-46930: (unk) usb: mtu3: fix list_head check warning + CVE-2021-46931: (unk) net/mlx5e: Wrap the tx reporter dump callback to extract the sq + CVE-2021-46932: (unk) Input: appletouch - initialize work before device registration + CVE-2021-46933: (unk) usb: gadget: f_fs: Clear ffs_eventfd in ffs_data_clear. + CVE-2021-46934: (unk) i2c: validate user data in compat ioctl + CVE-2021-46935: (unk) binder: fix async_free_space accounting for empty parcels + CVE-2021-46936: (unk) net: fix use-after-free in tw_timer_handler + CVE-2021-47082: (unk) tun: avoid double free in tun_free_netdev + CVE-2021-47083: (unk) pinctrl: mediatek: fix global-out-of-bounds issue + CVE-2021-47086: (unk) phonet/pep: refuse to enable an unbound pipe + CVE-2021-47087: (unk) tee: optee: Fix incorrect page free bug + CVE-2021-47089: (unk) kfence: fix memory leak when cat kfence objects + CVE-2021-47090: (unk) mm/hwpoison: clear MF_COUNT_INCREASED before retrying get_any_page() + CVE-2021-47091: (unk) mac80211: fix locking in ieee80211_start_ap error path + CVE-2021-47093: (unk) platform/x86: intel_pmc_core: fix memleak on registration failure + CVE-2021-47094: (unk) KVM: x86/mmu: Don't advance iterator after restart due to yielding + CVE-2021-47095: (unk) ipmi: ssif: initialize ssif_info->client early + CVE-2021-47097: (unk) Input: elantech - fix stack out of bound access in elantech_change_report_id() + CVE-2021-47098: (unk) hwmon: (lm90) Prevent integer overflow/underflow in hysteresis calculations + CVE-2021-47099: (unk) veth: ensure skb entering GRO are not cloned. + CVE-2021-47100: (unk) ipmi: Fix UAF when uninstall ipmi_si and ipmi_msghandler module + CVE-2021-47101: (unk) asix: fix uninit-value in asix_mdio_read() + CVE-2021-47102: (unk) net: marvell: prestera: fix incorrect structure access + CVE-2021-47103: (unk) inet: fully convert sk->sk_rx_dst to RCU rules + CVE-2021-47105: (unk) ice: xsk: return xsk buffers back to pool when cleaning the ring + CVE-2021-47106: (unk) netfilter: nf_tables: fix use-after-free in nft_set_catchall_destroy() + CVE-2021-47107: (unk) NFSD: Fix READDIR buffer overflow + CVE-2021-47108: (unk) drm/mediatek: hdmi: Perform NULL pointer check for mtk_hdmi_conf CVE-2022-0001: (unk) x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE CVE-2022-0002: (unk) x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE CVE-2022-0168: (unk) cifs: fix NULL ptr dereference in smb2_ioctl_query_info() @@ -420,6 +455,10 @@ Outstanding CVEs: CVE-2022-47521: (unk) wifi: wilc1000: validate length of IEEE80211_P2P_ATTR_CHANNEL_LIST attribute CVE-2022-47929: (unk) net: sched: disallow noqueue for qdisc classes CVE-2022-48619: (unk) Input: add bounds checking to input_set_capability() + CVE-2022-48626: (unk) moxart: fix potential use-after-free on remove path + CVE-2022-48627: (unk) vt: fix memory overlapping when deleting chars in the buffer + CVE-2022-48628: (unk) ceph: drop messages from MDS when unmounting + CVE-2022-48629: (unk) crypto: qcom-rng - ensure buffer for generate is completely filled CVE-2023-0045: (unk) x86/bugs: Flush IBP in ib_prctl_set() CVE-2023-0160: (unk) bpf, sockmap: fix deadlocks in the sockhash and sockmap CVE-2023-0179: (unk) netfilter: nft_payload: incorrect arithmetics when fetching VLAN header bits @@ -507,6 +546,7 @@ Outstanding CVEs: CVE-2023-28410: (unk) drm/i915/gem: add missing boundary check in vm_access CVE-2023-28466: (unk) net: tls: fix possible race condition between do_tls_getsockopt_conf() and do_tls_setsockopt_conf() CVE-2023-2860: (unk) ipv6: sr: fix out-of-bounds read when setting HMAC data. + CVE-2023-28746: (unk) x86/mmio: Disable KVM mitigation when X86_FEATURE_CLEAR_CPU_BUF is set CVE-2023-2898: (unk) f2fs: fix to avoid NULL pointer dereference f2fs_write_end_io() CVE-2023-2985: (unk) fs: hfsplus: fix UAF issue in hfsplus_put_super CVE-2023-3006: (unk) arm64: Add AMPERE1 to the Spectre-BHB affected list @@ -601,7 +641,7 @@ Outstanding CVEs: CVE-2023-46813: (unk) x86/sev: Check for user-space IOIO pointing to kernel space CVE-2023-46838: (unk) xen-netback: don't produce zero-size SKB frags CVE-2023-46862: (unk) io_uring/fdinfo: lock SQ thread while retrieving thread cpu/pid - CVE-2023-47233: (unk) + CVE-2023-47233: (unk) wifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach CVE-2023-4881: (unk) netfilter: nftables: exthdr: fix 4-byte stack OOB write CVE-2023-4921: (unk) net: sched: sch_qfq: Fix UAF in qfq_dequeue() CVE-2023-50431: (unk) accel/habanalabs: fix information leak in sec_attest_info() @@ -631,19 +671,134 @@ Outstanding CVEs: CVE-2023-52452: (unk) bpf: Fix accesses to uninit stack slots CVE-2023-52454: (unk) nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length CVE-2023-52456: (unk) serial: imx: fix tx statemachine deadlock - CVE-2023-52457: (unk) serial: 8250: omap: Don't skip resource freeing if pm_runtime_resume_and_get() failed CVE-2023-52458: (unk) block: add check that partition length needs to be aligned with block size CVE-2023-52463: (unk) efivarfs: force RO when remounting if SetVariable is not supported CVE-2023-52464: (unk) EDAC/thunderx: Fix possible out-of-bounds string access + CVE-2023-52467: (unk) mfd: syscon: Fix null pointer dereference in of_syscon_register() + CVE-2023-52469: (unk) drivers/amd/pm: fix a use-after-free in kv_parse_power_table + CVE-2023-52470: (unk) drm/radeon: check the alloc_workqueue return value in radeon_crtc_init() + CVE-2023-52474: (unk) IB/hfi1: Fix bugs with non-PAGE_SIZE-end multi-iovec user SDMA requests + CVE-2023-52475: (unk) Input: powermate - fix use-after-free in powermate_config_complete + CVE-2023-52476: (unk) perf/x86/lbr: Filter vsyscall addresses + CVE-2023-52477: (unk) usb: hub: Guard against accesses to uninitialized BOS descriptors + CVE-2023-52478: (unk) HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect + CVE-2023-52479: (unk) ksmbd: fix uaf in smb20_oplock_break_ack + CVE-2023-52480: (unk) ksmbd: fix race condition between session lookup and expire + CVE-2023-52481: (unk) arm64: errata: Add Cortex-A520 speculative unprivileged load workaround + CVE-2023-52482: (unk) x86/srso: Add SRSO mitigation for Hygon processors + CVE-2023-52484: (unk) iommu/arm-smmu-v3: Fix soft lockup triggered by arm_smmu_mm_invalidate_range + CVE-2023-52485: (unk) drm/amd/display: Wake DMCUB before sending a command + CVE-2023-52486: (unk) drm: Don't unref the same fb many times by mistake due to deadlock handling + CVE-2023-52488: (unk) serial: sc16is7xx: convert from _raw_ to _noinc_ regmap functions for FIFO + CVE-2023-52489: (unk) mm/sparsemem: fix race in accessing memory_section->usage + CVE-2023-52491: (unk) media: mtk-jpeg: Fix use after free bug due to error path handling in mtk_jpeg_dec_device_run + CVE-2023-52492: (unk) dmaengine: fix NULL pointer in channel unregistration function + CVE-2023-52493: (unk) bus: mhi: host: Drop chan lock before queuing buffers + CVE-2023-52494: (unk) bus: mhi: host: Add alignment check for event ring read pointer + CVE-2023-52497: (unk) erofs: fix lz4 inplace decompression + CVE-2023-52498: (unk) PM: sleep: Fix possible deadlocks in core system-wide PM code + CVE-2023-52499: (unk) powerpc/47x: Fix 47x syscall return crash + CVE-2023-52500: (unk) scsi: pm80xx: Avoid leaking tags when processing OPC_INB_SET_CONTROLLER_CONFIG command + CVE-2023-52501: (unk) ring-buffer: Do not attempt to read past "commit" + CVE-2023-52502: (unk) net: nfc: fix races in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn() + CVE-2023-52503: (unk) tee: amdtee: fix use-after-free vulnerability in amdtee_close_session + CVE-2023-52504: (unk) x86/alternatives: Disable KASAN in apply_alternatives() + CVE-2023-52506: (unk) LoongArch: Set all reserved memblocks on Node#0 at initialization + CVE-2023-52507: (unk) nfc: nci: assert requested protocol is valid + CVE-2023-52508: (unk) nvme-fc: Prevent null pointer dereference in nvme_fc_io_getuuid() + CVE-2023-52509: (unk) ravb: Fix use-after-free issue in ravb_tx_timeout_work() + CVE-2023-52510: (unk) ieee802154: ca8210: Fix a potential UAF in ca8210_probe + CVE-2023-52511: (unk) spi: sun6i: reduce DMA RX transfer width to single byte + CVE-2023-52513: (unk) RDMA/siw: Fix connection failure handling + CVE-2023-52515: (unk) RDMA/srp: Do not call scsi_done() from srp_abort() + CVE-2023-52516: (unk) dma-debug: don't call __dma_entry_alloc_check_leak() under free_entries_lock + CVE-2023-52517: (unk) spi: sun6i: fix race between DMA RX transfer completion and RX FIFO drain + CVE-2023-52519: (unk) HID: intel-ish-hid: ipc: Disable and reenable ACPI GPE bit + CVE-2023-52520: (unk) platform/x86: think-lmi: Fix reference leak + CVE-2023-52522: (unk) net: fix possible store tearing in neigh_periodic_work() + CVE-2023-52523: (unk) bpf, sockmap: Reject sk_msg egress redirects to non-TCP sockets + CVE-2023-52527: (unk) ipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data() + CVE-2023-52528: (unk) net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg + CVE-2023-52529: (unk) HID: sony: Fix a potential memory leak in sony_probe() + CVE-2023-52530: (unk) wifi: mac80211: fix potential key use-after-free + CVE-2023-52531: (unk) wifi: iwlwifi: mvm: Fix a memory corruption issue + CVE-2023-52532: (unk) net: mana: Fix TX CQE error handling + CVE-2023-52559: (unk) iommu/vt-d: Avoid memory allocation in iommu_suspend() + CVE-2023-52561: (unk) arm64: dts: qcom: sdm845-db845c: Mark cont splash memory region as reserved + CVE-2023-52563: (unk) drm/meson: fix memory leak on ->hpd_notify callback + CVE-2023-52565: (unk) media: uvcvideo: Fix OOB read + CVE-2023-52566: (unk) nilfs2: fix potential use after free in nilfs_gccache_submit_read_data() + CVE-2023-52568: (unk) x86/sgx: Resolves SECS reclaim vs. page fault for EAUG race + CVE-2023-52569: (unk) btrfs: remove BUG() after failure to insert delayed dir index item + CVE-2023-52571: (unk) power: supply: rk817: Fix node refcount leak + CVE-2023-52572: (unk) cifs: Fix UAF in cifs_demultiplex_thread() + CVE-2023-52573: (unk) net: rds: Fix possible NULL-pointer dereference + CVE-2023-52574: (unk) team: fix null-ptr-deref when team device type is changed + CVE-2023-52576: (unk) x86/mm, kexec, ima: Use memblock_free_late() from ima_free_kexec_buffer() + CVE-2023-52578: (unk) net: bridge: use DEV_STATS_INC() + CVE-2023-52580: (unk) net/core: Fix ETH_P_1588 flow dissector + CVE-2023-52582: (unk) netfs: Only call folio_start_fscache() one time for each folio + CVE-2023-52583: (unk) ceph: fix deadlock or deadcode of misusing dget() + CVE-2023-52584: (unk) spmi: mediatek: Fix UAF on device remove + CVE-2023-52585: (unk) drm/amdgpu: Fix possible NULL dereference in amdgpu_ras_query_error_status_helper() + CVE-2023-52586: (unk) drm/msm/dpu: Add mutex lock in control vblank irq + CVE-2023-52587: (unk) IB/ipoib: Fix mcast list locking + CVE-2023-52588: (unk) f2fs: fix to tag gcing flag on page during block migration + CVE-2023-52589: (unk) media: rkisp1: Fix IRQ disable race issue + CVE-2023-52590: (unk) ocfs2: Avoid touching renamed directory if parent does not change + CVE-2023-52591: (unk) reiserfs: Avoid touching renamed directory if parent does not change + CVE-2023-52593: (unk) wifi: wfx: fix possible NULL pointer dereference in wfx_set_mfp_ap() + CVE-2023-52594: (unk) wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus() + CVE-2023-52595: (unk) wifi: rt2x00: restart beacon queue when hardware reset + CVE-2023-52596: (unk) sysctl: Fix out of bounds access for empty sysctl registers + CVE-2023-52597: (unk) KVM: s390: fix setting of fpc register + CVE-2023-52598: (unk) s390/ptrace: handle setting of fpc register correctly + CVE-2023-52599: (unk) jfs: fix array-index-out-of-bounds in diNewExt + CVE-2023-52600: (unk) jfs: fix uaf in jfs_evict_inode + CVE-2023-52601: (unk) jfs: fix array-index-out-of-bounds in dbAdjTree + CVE-2023-52602: (unk) jfs: fix slab-out-of-bounds Read in dtSearch + CVE-2023-52603: (unk) UBSAN: array-index-out-of-bounds in dtSplitRoot + CVE-2023-52604: (unk) FS:JFS:UBSAN:array-index-out-of-bounds in dbAdjTree + CVE-2023-52606: (unk) powerpc/lib: Validate size for vector operations + CVE-2023-52607: (unk) powerpc/mm: Fix null-pointer dereference in pgtable_cache_add + CVE-2023-52608: (unk) firmware: arm_scmi: Check mailbox/SMT channel for consistency + CVE-2023-52609: (unk) binder: fix race between mmput() and do_exit() + CVE-2023-52610: (unk) net/sched: act_ct: fix skb leak and crash on ooo frags + CVE-2023-52612: (unk) crypto: scomp - fix req->dst buffer overflow + CVE-2023-52614: (unk) PM / devfreq: Fix buffer overflow in trans_stat_show + CVE-2023-52615: (unk) hwrng: core - Fix page fault dead lock on mmap-ed hwrng + CVE-2023-52616: (unk) crypto: lib/mpi - Fix unexpected pointer access in mpi_ec_init + CVE-2023-52617: (unk) PCI: switchtec: Fix stdev_release() crash after surprise hot remove + CVE-2023-52618: (unk) block/rnbd-srv: Check for unlikely string overflow + CVE-2023-52619: (unk) pstore/ram: Fix crash when setting number of cpus to an odd number + CVE-2023-52620: (unk) netfilter: nf_tables: disallow timeout for anonymous sets + CVE-2023-52621: (unk) bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers + CVE-2023-52622: (unk) ext4: avoid online resizing failures due to oversized flex bg + CVE-2023-52623: (unk) SUNRPC: Fix a suspicious RCU usage warning + CVE-2023-52624: (unk) drm/amd/display: Wake DMCUB before executing GPINT commands + CVE-2023-52625: (unk) drm/amd/display: Refactor DMCUB enter/exit idle interface + CVE-2023-52627: (unk) iio: adc: ad7091r: Allow users to configure device events + CVE-2023-52628: (unk) netfilter: nftables: exthdr: fix 4-byte stack OOB write + CVE-2023-52629: (unk) sh: push-switch: Reorder cleanup operations to avoid use-after-free bug + CVE-2023-52630: (unk) blk-iocost: Fix an UBSAN shift-out-of-bounds warning + CVE-2023-52632: (unk) drm/amdkfd: Fix lock dependency warning with srcu + CVE-2023-52633: (unk) um: time-travel: fix time corruption + CVE-2023-52634: (unk) drm/amd/display: Fix disable_otg_wa logic + CVE-2023-52635: (unk) PM / devfreq: Synchronize devfreq_monitor_[start/stop] + CVE-2023-52637: (unk) can: j1939: Fix UAF in j1939_sk_match_filter during setsockopt(SO_J1939_FILTER) + CVE-2023-52638: (unk) can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock + CVE-2023-52639: (unk) KVM: s390: vsie: fix race during shadow creation + CVE-2023-52640: (unk) fs/ntfs3: Fix oob in ntfs_listxattr + CVE-2023-52641: (unk) fs/ntfs3: Add NULL ptr dereference checking at the end of attr_allocate_frame() CVE-2023-5717: (unk) perf: Disallow mis-matched inherited group reads CVE-2023-6040: (unk) netfilter: nf_tables: Reject tables of unsupported family CVE-2023-6121: (unk) nvmet: nul-terminate the NQNs passed in the connect command CVE-2023-6176: (unk) net/tls: do not free tls_rec on async operation in bpf_exec_tx_verdict() CVE-2023-6240: (unk) - CVE-2023-6270: (unk) - CVE-2023-6356: (unk) + CVE-2023-6270: (unk) aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts + CVE-2023-6356: (unk) nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length CVE-2023-6535: (unk) - CVE-2023-6536: (unk) + CVE-2023-6536: (unk) nvmet-tcp: fix a crash in nvmet_req_complete() CVE-2023-6546: (unk) tty: n_gsm: fix the UAF caused by race condition in gsm_cleanup_mux CVE-2023-6560: (unk) io_uring: don't allow discontig pages for IORING_SETUP_NO_MMAP CVE-2023-6606: (unk) smb: client: fix OOB in smbCalcSize() @@ -653,7 +808,7 @@ Outstanding CVEs: CVE-2023-6915: (unk) ida: Fix crash in ida_free when the bitmap is empty CVE-2023-6931: (unk) perf: Fix perf_event_validate_size() CVE-2023-6932: (unk) ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet - CVE-2023-7042: (unk) + CVE-2023-7042: (unk) wifi: ath10k: fix NULL pointer dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev() CVE-2023-7192: (unk) netfilter: ctnetlink: fix possible refcount leak in ctnetlink_create_conntrack() CVE-2024-0340: (unk) vhost: use kzalloc() instead of kmalloc() followed by memset() CVE-2024-0564: (unk) @@ -664,16 +819,17 @@ Outstanding CVEs: CVE-2024-0641: (unk) tipc: fix a potential deadlock on &tx->lock CVE-2024-0646: (unk) net: tls, update curr on splice as well CVE-2024-0775: (unk) ext4: improve error recovery code paths in __ext4_remount() - CVE-2024-0841: (unk) + CVE-2024-0841: (unk) fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super CVE-2024-1085: (unk) netfilter: nf_tables: check if catch-all set element is active in next generation CVE-2024-1086: (unk) netfilter: nf_tables: reject QUEUE/DROP verdict parameters CVE-2024-1151: (unk) net: openvswitch: limit the number of recursions from action sets CVE-2024-1312: (unk) mm: lock_vma_under_rcu() must check vma->anon_vma under vma lock CVE-2024-21803: (unk) - CVE-2024-22099: (unk) + CVE-2024-2193: (unk) + CVE-2024-22099: (unk) Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security CVE-2024-22386: (unk) - CVE-2024-23196: (unk) - CVE-2024-23307: (unk) + CVE-2024-23196: (unk) ALSA: hda: fix a possible null-pointer dereference due to data race in snd_hdac_regmap_sync() + CVE-2024-23307: (unk) md/raid5: fix atomicity violation in raid5_cache_count CVE-2024-23848: (unk) CVE-2024-23849: (unk) net/rds: Fix UBSAN: array-index-out-of-bounds in rds_cmsg_recv CVE-2024-23850: (unk) btrfs: do not ASSERT() if the newly created subvolume already got read @@ -683,7 +839,7 @@ Outstanding CVEs: CVE-2024-24858: (unk) CVE-2024-24859: (unk) CVE-2024-24860: (unk) Bluetooth: Fix atomicity violation in {min,max}_key_size_set - CVE-2024-24861: (unk) + CVE-2024-24861: (unk) media: xc4000: Fix atomicity violation in xc4000_get_frequency CVE-2024-24864: (unk) CVE-2024-25739: (unk) CVE-2024-25740: (unk) @@ -693,8 +849,6 @@ Outstanding CVEs: CVE-2024-26584: (unk) net: tls: handle backlogging of crypto requests CVE-2024-26585: (unk) tls: fix race between tx work scheduling and socket close CVE-2024-26586: (unk) mlxsw: spectrum_acl_tcam: Fix stack corruption - CVE-2024-26587: (unk) net: netdevsim: don't try to destroy PHC on VFs - CVE-2024-26588: (unk) LoongArch: BPF: Prevent out-of-bounds memory access CVE-2024-26589: (unk) bpf: Reject variable offset alu on PTR_TO_FLOW_KEYS CVE-2024-26591: (unk) bpf: Fix re-attachment branch in bpf_tracing_prog_attach CVE-2024-26592: (unk) ksmbd: fix UAF issue in ksmbd_tcp_new_connection() @@ -703,3 +857,131 @@ Outstanding CVEs: CVE-2024-26595: (unk) mlxsw: spectrum_acl_tcam: Fix NULL pointer dereference in error path CVE-2024-26597: (unk) net: qualcomm: rmnet: fix global oob in rmnet_policy CVE-2024-26598: (unk) KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache + CVE-2024-26600: (unk) phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP + CVE-2024-26601: (unk) ext4: regenerate buddy after block freeing failed if under fc replay + CVE-2024-26602: (unk) sched/membarrier: reduce the ability to hammer on sys_membarrier + CVE-2024-26603: (unk) x86/fpu: Stop relying on userspace for info to fault in xsave buffer + CVE-2024-26606: (unk) binder: signal epoll threads of self-work + CVE-2024-26607: (unk) drm/bridge: sii902x: Fix probing race issue + CVE-2024-26610: (unk) wifi: iwlwifi: fix a memory corruption + CVE-2024-26614: (unk) tcp: make sure init the accept_queue's spinlocks once + CVE-2024-26615: (unk) net/smc: fix illegal rmb_desc access in SMC-D connection dump + CVE-2024-26622: (unk) tomoyo: fix UAF write bug in tomoyo_write_control() + CVE-2024-26623: (unk) pds_core: Prevent race issues involving the adminq + CVE-2024-26625: (unk) llc: call sock_orphan() at release time + CVE-2024-26627: (unk) scsi: core: Move scsi_host_busy() out of host lock for waking up EH handler + CVE-2024-26631: (unk) ipv6: mcast: fix data-race in ipv6_mc_down / mld_ifc_work + CVE-2024-26633: (unk) ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim() + CVE-2024-26635: (unk) llc: Drop support for ETH_P_TR_802_2. + CVE-2024-26636: (unk) llc: make llc_ui_sendmsg() more robust against bonding changes + CVE-2024-26640: (unk) tcp: add sanity checks to rx zerocopy + CVE-2024-26641: (unk) ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv() + CVE-2024-26642: (unk) netfilter: nf_tables: disallow anonymous set with timeout flag + CVE-2024-26644: (unk) btrfs: don't abort filesystem when attempting to snapshot deleted subvolume + CVE-2024-26645: (unk) tracing: Ensure visibility when inserting an element into tracing_map + CVE-2024-26646: (unk) thermal: intel: hfi: Add syscore callbacks for system-wide PM + CVE-2024-26647: (unk) drm/amd/display: Fix late derefrence 'dsc' check in 'link_set_dsc_pps_packet()' + CVE-2024-26648: (unk) drm/amd/display: Fix variable deferencing before NULL check in edp_setup_replay() + CVE-2024-26650: (unk) platform/x86: p2sb: Allow p2sb_bar() calls during PCI device probe + CVE-2024-26651: (unk) sr9800: Add check for usbnet_get_endpoints + CVE-2024-26654: (unk) ALSA: sh: aica: reorder cleanup operations to avoid UAF bugs + CVE-2024-26655: (unk) Fix memory leak in posix_clock_open() + CVE-2024-26656: (unk) drm/amdgpu: fix use-after-free bug + CVE-2024-26658: (unk) bcachefs: grab s_umount only if snapshotting + CVE-2024-26659: (unk) xhci: handle isoc Babble and Buffer Overrun events properly + CVE-2024-26660: (unk) drm/amd/display: Implement bounds check for stream encoder creation in DCN301 + CVE-2024-26661: (unk) drm/amd/display: Add NULL test for 'timing generator' in 'dcn21_set_pipe()' + CVE-2024-26662: (unk) drm/amd/display: Fix 'panel_cntl' could be null in 'dcn21_set_backlight_level()' + CVE-2024-26663: (unk) tipc: Check the bearer type before calling tipc_udp_nl_bearer_add() + CVE-2024-26664: (unk) hwmon: (coretemp) Fix out-of-bounds memory access + CVE-2024-26665: (unk) tunnels: fix out of bounds access when building IPv6 PMTU error + CVE-2024-26668: (unk) netfilter: nft_limit: reject configurations that cause integer overflow + CVE-2024-26669: (unk) net/sched: flower: Fix chain template offload + CVE-2024-26671: (unk) blk-mq: fix IO hang from sbitmap wakeup race + CVE-2024-26672: (unk) drm/amdgpu: Fix variable 'mca_funcs' dereferenced before NULL check in 'amdgpu_mca_smu_get_mca_entry()' + CVE-2024-26673: (unk) netfilter: nft_ct: sanitize layer 3 and 4 protocol number in custom expectations + CVE-2024-26675: (unk) ppp_async: limit MRU to 64K + CVE-2024-26676: (unk) af_unix: Call kfree_skb() for dead unix_(sk)->oob_skb in GC. + CVE-2024-26677: (unk) rxrpc: Fix delayed ACKs to not set the reference serial number + CVE-2024-26679: (unk) inet: read sk->sk_family once in inet_recv_error() + CVE-2024-26680: (unk) net: atlantic: Fix DMA mapping for PTP hwts ring + CVE-2024-26684: (unk) net: stmmac: xgmac: fix handling of DPP safety error for DMA channels + CVE-2024-26685: (unk) nilfs2: fix potential bug in end_buffer_async_write + CVE-2024-26686: (unk) fs/proc: do_task_stat: use sig->stats_lock to gather the threads/children stats + CVE-2024-26687: (unk) xen/events: close evtchn after mapping cleanup + CVE-2024-26688: (unk) fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super + CVE-2024-26689: (unk) ceph: prevent use-after-free in encode_cap_msg() + CVE-2024-26691: (unk) KVM: arm64: Fix circular locking dependency + CVE-2024-26696: (unk) nilfs2: fix hang in nilfs_lookup_dirty_data_buffers() + CVE-2024-26697: (unk) nilfs2: fix data corruption in dsync block recovery for small block sizes + CVE-2024-26698: (unk) hv_netvsc: Fix race condition between netvsc_probe and netvsc_remove + CVE-2024-26699: (unk) drm/amd/display: Fix array-index-out-of-bounds in dcn35_clkmgr + CVE-2024-26700: (unk) drm/amd/display: Fix MST Null Ptr for RV + CVE-2024-26702: (unk) iio: magnetometer: rm3100: add boundary check for the value read from RM3100_REG_TMRC + CVE-2024-26704: (unk) ext4: fix double-free of blocks due to wrong extents moved_len + CVE-2024-26706: (unk) parisc: Fix random data corruption from exception handler + CVE-2024-26707: (unk) net: hsr: remove WARN_ONCE() in send_hsr_supervision_frame() + CVE-2024-26712: (unk) powerpc/kasan: Fix addr error caused by page alignment + CVE-2024-26713: (unk) powerpc/pseries/iommu: Fix iommu initialisation during DLPAR add + CVE-2024-26715: (unk) usb: dwc3: gadget: Fix NULL pointer dereference in dwc3_gadget_suspend + CVE-2024-26717: (unk) HID: i2c-hid-of: fix NULL-deref on failed power up + CVE-2024-26718: (unk) dm-crypt, dm-verity: disable tasklets + CVE-2024-26719: (unk) nouveau: offload fence uevents work to workqueue + CVE-2024-26720: (unk) mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again + CVE-2024-26726: (unk) btrfs: don't drop extent_map for free space inode on write error + CVE-2024-26727: (unk) btrfs: do not ASSERT() if the newly created subvolume already got read + CVE-2024-26733: (unk) arp: Prevent overflow in arp_req_get(). + CVE-2024-26735: (unk) ipv6: sr: fix possible use-after-free and null-ptr-deref + CVE-2024-26736: (unk) afs: Increase buffer size in afs_update_volume_status() + CVE-2024-26738: (unk) powerpc/pseries/iommu: DLPAR add doesn't completely initialize pci_controller + CVE-2024-26739: (unk) net/sched: act_mirred: don't override retval if we already lost the skb + CVE-2024-26740: (unk) net/sched: act_mirred: use the backlog for mirred ingress + CVE-2024-26743: (unk) RDMA/qedr: Fix qedr_create_user_qp error flow + CVE-2024-26744: (unk) RDMA/srpt: Support specifying the srpt_service_guid parameter + CVE-2024-26745: (unk) powerpc/pseries/iommu: IOMMU table is not initialized for kdump over SR-IOV + CVE-2024-26747: (unk) usb: roles: fix NULL pointer issue when put module's reference + CVE-2024-26748: (unk) usb: cdns3: fix memory double free when handle zero packet + CVE-2024-26749: (unk) usb: cdns3: fixed memory use after free at cdns3_gadget_ep_disable() + CVE-2024-26751: (unk) ARM: ep93xx: Add terminator to gpiod_lookup_table + CVE-2024-26752: (unk) l2tp: pass correct message length to ip6_append_data + CVE-2024-26754: (unk) gtp: fix use-after-free and null-ptr-deref in gtp_genl_dump_pdp() + CVE-2024-26756: (unk) md: Don't register sync_thread for reshape directly + CVE-2024-26757: (unk) md: Don't ignore read-only array in md_check_recovery() + CVE-2024-26758: (unk) md: Don't ignore suspended array in md_check_recovery() + CVE-2024-26759: (unk) mm/swap: fix race when skipping swapcache + CVE-2024-26763: (unk) dm-crypt: don't modify the data when using authenticated encryption + CVE-2024-26764: (unk) fs/aio: Restrict kiocb_set_cancel_fn() to I/O submitted via libaio + CVE-2024-26765: (unk) LoongArch: Disable IRQ before init_fn() for nonboot CPUs + CVE-2024-26766: (unk) IB/hfi1: Fix sdma.h tx->num_descs off-by-one error + CVE-2024-26767: (unk) drm/amd/display: fixed integer types and null check locations + CVE-2024-26768: (unk) LoongArch: Change acpi_core_pic[NR_CPUS] to acpi_core_pic[MAX_CORE_PIC] + CVE-2024-26769: (unk) nvmet-fc: avoid deadlock on delete association path + CVE-2024-26770: (unk) HID: nvidia-shield: Add missing null pointer checks to LED initialization + CVE-2024-26771: (unk) dmaengine: ti: edma: Add some null pointer checks to the edma_probe + CVE-2024-26772: (unk) ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal() + CVE-2024-26773: (unk) ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found() + CVE-2024-26774: (unk) ext4: avoid dividing by 0 in mb_update_avg_fragment_size() when block bitmap corrupt + CVE-2024-26775: (unk) aoe: avoid potential deadlock at set_capacity + CVE-2024-26776: (unk) spi: hisi-sfc-v3xx: Return IRQ_NONE if no interrupts were detected + CVE-2024-26777: (unk) fbdev: sis: Error out if pixclock equals zero + CVE-2024-26778: (unk) fbdev: savage: Error out if pixclock equals zero + CVE-2024-26779: (unk) wifi: mac80211: fix race condition on enabling fast-xmit + CVE-2024-26782: (unk) mptcp: fix double-free on socket dismantle + CVE-2024-26784: (unk) pmdomain: arm: Fix NULL dereference on scmi_perf_domain removal + CVE-2024-26787: (unk) mmc: mmci: stm32: fix DMA API overlapping mappings warning + CVE-2024-26788: (unk) dmaengine: fsl-qdma: init irq after reg initialization + CVE-2024-26789: (unk) crypto: arm64/neonbs - fix out-of-bounds access on short input + CVE-2024-26790: (unk) dmaengine: fsl-qdma: fix SoC may hang on 16 byte unaligned read + CVE-2024-26791: (unk) btrfs: dev-replace: properly validate device names + CVE-2024-26793: (unk) gtp: fix use-after-free and null-ptr-deref in gtp_newlink() + CVE-2024-26795: (unk) riscv: Sparse-Memory/vmemmap out-of-bounds fix + CVE-2024-26797: (unk) drm/amd/display: Prevent potential buffer overflow in map_hw_resources + CVE-2024-26798: (unk) fbcon: always restore the old font data in fbcon_do_set_font() + CVE-2024-26801: (unk) Bluetooth: Avoid potential use-after-free in hci_error_reset + CVE-2024-26802: (unk) stmmac: Clear variable when destroying workqueue + CVE-2024-26803: (unk) net: veth: clear GRO when clearing XDP even when down + CVE-2024-26804: (unk) net: ip_tunnel: prevent perpetual headroom growth + CVE-2024-26805: (unk) netlink: Fix kernel-infoleak-after-free in __skb_datagram_iter + CVE-2024-26806: (unk) spi: cadence-qspi: remove system-wide suspend helper calls from runtime PM hooks + CVE-2024-26808: (unk) netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain + CVE-2024-26809: (unk) netfilter: nft_set_pipapo: release elements in clone only from destroy path diff --git a/data/5.15/5.15_CVEs.txt b/data/5.15/5.15_CVEs.txt index b49697aad..1d5271e1d 100644 --- a/data/5.15/5.15_CVEs.txt +++ b/data/5.15/5.15_CVEs.txt @@ -26,6 +26,7 @@ CVE-2019-16089: Fix unknown CVE-2019-19378: Fix unknown CVE-2019-19814: Fix unknown CVE-2019-20794: Fix unknown +CVE-2019-25162: Fixed with 5.15.61 CVE-2020-0347: Fix unknown CVE-2020-10708: Fix unknown CVE-2020-11725: Fix unknown @@ -95,6 +96,46 @@ CVE-2021-45402: Fixed with 5.15.11 CVE-2021-45469: Fixed with 5.15.12 CVE-2021-45480: Fixed with 5.15.11 CVE-2021-45868: Fixed with 5.15.3 +CVE-2021-46923: Fixed with 5.15.13 +CVE-2021-46924: Fixed with 5.15.13 +CVE-2021-46925: Fixed with 5.15.13 +CVE-2021-46926: Fixed with 5.15.13 +CVE-2021-46927: Fixed with 5.15.13 +CVE-2021-46928: Fixed with 5.15.13 +CVE-2021-46929: Fixed with 5.15.13 +CVE-2021-46930: Fixed with 5.15.13 +CVE-2021-46931: Fixed with 5.15.13 +CVE-2021-46932: Fixed with 5.15.13 +CVE-2021-46933: Fixed with 5.15.13 +CVE-2021-46934: Fixed with 5.15.13 +CVE-2021-46935: Fixed with 5.15.13 +CVE-2021-46936: Fixed with 5.15.13 +CVE-2021-46937: Fixed with 5.15.13 +CVE-2021-47082: Fixed with 5.15.12 +CVE-2021-47083: Fixed with 5.15.12 +CVE-2021-47086: Fixed with 5.15.12 +CVE-2021-47087: Fixed with 5.15.12 +CVE-2021-47088: Fixed with 5.15.12 +CVE-2021-47089: Fixed with 5.15.12 +CVE-2021-47090: Fixed with 5.15.12 +CVE-2021-47091: Fixed with 5.15.12 +CVE-2021-47092: Fixed with 5.15.12 +CVE-2021-47093: Fixed with 5.15.12 +CVE-2021-47094: Fixed with 5.15.12 +CVE-2021-47095: Fixed with 5.15.12 +CVE-2021-47096: Fixed with 5.15.12 +CVE-2021-47097: Fixed with 5.15.12 +CVE-2021-47098: Fixed with 5.15.12 +CVE-2021-47099: Fixed with 5.15.12 +CVE-2021-47100: Fixed with 5.15.12 +CVE-2021-47101: Fixed with 5.15.12 +CVE-2021-47102: Fixed with 5.15.12 +CVE-2021-47103: Fixed with 5.15.12 +CVE-2021-47104: Fixed with 5.15.12 +CVE-2021-47105: Fixed with 5.15.12 +CVE-2021-47106: Fixed with 5.15.12 +CVE-2021-47107: Fixed with 5.15.12 +CVE-2021-47108: Fixed with 5.15.12 CVE-2022-0001: Fixed with 5.15.28 CVE-2022-0002: Fixed with 5.15.28 CVE-2022-0168: Fixed with 5.15.33 @@ -366,6 +407,10 @@ CVE-2022-48424: Fixed with 5.15.87 CVE-2022-48425: Fixed with 5.15.113 CVE-2022-48502: Fixed with 5.15.121 CVE-2022-48619: Fixed with 5.15.42 +CVE-2022-48626: Fixed with 5.15.23 +CVE-2022-48627: Fixed with 5.15.56 +CVE-2022-48628: Fix not seen in stream +CVE-2022-48629: Fixed with 5.15.31 CVE-2023-0045: Fixed with 5.15.87 CVE-2023-0047: Fixed with 5.15.3 CVE-2023-0160: Fixed with 5.15.111 @@ -461,6 +506,7 @@ CVE-2023-28328: Fixed with 5.15.86 CVE-2023-28410: Fixed with 5.15.33 CVE-2023-28466: Fixed with 5.15.105 CVE-2023-2860: Fixed with 5.15.68 +CVE-2023-28746: Fix not seen in stream CVE-2023-2898: Fixed with 5.15.121 CVE-2023-2985: Fixed with 5.15.99 CVE-2023-3006: Fixed with 5.15.77 @@ -573,7 +619,7 @@ CVE-2023-46343: Fixed with 5.15.137 CVE-2023-46813: Fixed with 5.15.137 CVE-2023-46838: Fixed with 5.15.148 CVE-2023-46862: Fixed with 5.15.140 -CVE-2023-47233: Fix unknown +CVE-2023-47233: Fix not seen in stream CVE-2023-4881: Fixed with 5.15.132 CVE-2023-4921: Fixed with 5.15.132 CVE-2023-50431: Fix not seen in stream @@ -587,7 +633,7 @@ CVE-2023-51782: Fixed with 5.15.144 CVE-2023-5197: Fixed with 5.15.134 CVE-2023-52340: Fixed with 5.15.147 CVE-2023-52429: Fixed with 5.15.149 -CVE-2023-52434: Fix not seen in stream +CVE-2023-52434: Fixed with 5.15.150 CVE-2023-52435: Fixed with 5.15.149 CVE-2023-52436: Fixed with 5.15.148 CVE-2023-52438: Fixed with 5.15.148 @@ -597,27 +643,144 @@ CVE-2023-52442: Fixed with 5.15.145 CVE-2023-52443: Fixed with 5.15.148 CVE-2023-52444: Fixed with 5.15.148 CVE-2023-52445: Fixed with 5.15.148 -CVE-2023-52447: Fix not seen in stream +CVE-2023-52447: Fixed with 5.15.153 CVE-2023-52448: Fixed with 5.15.148 CVE-2023-52449: Fixed with 5.15.148 CVE-2023-52451: Fixed with 5.15.148 CVE-2023-52452: Fix not seen in stream CVE-2023-52454: Fixed with 5.15.148 CVE-2023-52456: Fixed with 5.15.148 -CVE-2023-52457: Fixed with 5.15.148 CVE-2023-52458: Fixed with 5.15.148 CVE-2023-52463: Fixed with 5.15.148 CVE-2023-52464: Fixed with 5.15.148 +CVE-2023-52467: Fixed with 5.15.148 +CVE-2023-52469: Fixed with 5.15.148 +CVE-2023-52470: Fixed with 5.15.148 +CVE-2023-52474: Fixed with 5.15.111 +CVE-2023-52475: Fixed with 5.15.136 +CVE-2023-52476: Fixed with 5.15.137 +CVE-2023-52477: Fixed with 5.15.136 +CVE-2023-52478: Fixed with 5.15.136 +CVE-2023-52479: Fixed with 5.15.135 +CVE-2023-52480: Fixed with 5.15.145 +CVE-2023-52481: Fix not seen in stream +CVE-2023-52482: Fixed with 5.15.134 +CVE-2023-52483: Fixed with 5.15.137 +CVE-2023-52484: Fixed with 5.15.134 +CVE-2023-52485: Fix not seen in stream +CVE-2023-52486: Fixed with 5.15.149 +CVE-2023-52488: Fix not seen in stream +CVE-2023-52489: Fixed with 5.15.149 +CVE-2023-52491: Fixed with 5.15.149 +CVE-2023-52492: Fixed with 5.15.149 +CVE-2023-52493: Fixed with 5.15.149 +CVE-2023-52494: Fixed with 5.15.149 +CVE-2023-52497: Fixed with 5.15.150 +CVE-2023-52498: Fixed with 5.15.149 +CVE-2023-52499: Fixed with 5.15.137 +CVE-2023-52500: Fixed with 5.15.134 +CVE-2023-52501: Fixed with 5.15.134 +CVE-2023-52502: Fixed with 5.15.136 +CVE-2023-52503: Fixed with 5.15.136 +CVE-2023-52504: Fixed with 5.15.136 +CVE-2023-52506: Fix not seen in stream +CVE-2023-52507: Fixed with 5.15.136 +CVE-2023-52508: Fix not seen in stream +CVE-2023-52509: Fixed with 5.15.136 +CVE-2023-52510: Fixed with 5.15.136 +CVE-2023-52511: Fixed with 5.15.134 +CVE-2023-52513: Fixed with 5.15.135 +CVE-2023-52515: Fixed with 5.15.136 +CVE-2023-52516: Fixed with 5.15.134 +CVE-2023-52517: Fixed with 5.15.134 +CVE-2023-52519: Fixed with 5.15.135 +CVE-2023-52520: Fixed with 5.15.136 +CVE-2023-52522: Fixed with 5.15.135 +CVE-2023-52523: Fixed with 5.15.135 +CVE-2023-52527: Fixed with 5.15.135 +CVE-2023-52528: Fixed with 5.15.135 +CVE-2023-52529: Fixed with 5.15.135 +CVE-2023-52530: Fix not seen in stream +CVE-2023-52531: Fixed with 5.15.135 +CVE-2023-52532: Fix not seen in stream +CVE-2023-52559: Fixed with 5.15.136 +CVE-2023-52561: Fix not seen in stream +CVE-2023-52563: Fixed with 5.15.134 +CVE-2023-52565: Fix not seen in stream +CVE-2023-52566: Fixed with 5.15.134 +CVE-2023-52568: Fix not seen in stream +CVE-2023-52569: Fix not seen in stream +CVE-2023-52571: Fix not seen in stream +CVE-2023-52572: Fix not seen in stream +CVE-2023-52573: Fixed with 5.15.134 +CVE-2023-52574: Fixed with 5.15.134 +CVE-2023-52576: Fix not seen in stream +CVE-2023-52578: Fixed with 5.15.134 +CVE-2023-52580: Fixed with 5.15.134 +CVE-2023-52582: Fix not seen in stream +CVE-2023-52583: Fixed with 5.15.149 +CVE-2023-52584: Fix not seen in stream +CVE-2023-52585: Fix not seen in stream +CVE-2023-52586: Fix not seen in stream +CVE-2023-52587: Fixed with 5.15.149 +CVE-2023-52588: Fixed with 5.15.149 +CVE-2023-52589: Fix not seen in stream +CVE-2023-52590: Fix not seen in stream +CVE-2023-52591: Fix not seen in stream +CVE-2023-52593: Fix not seen in stream +CVE-2023-52594: Fixed with 5.15.149 +CVE-2023-52595: Fixed with 5.15.149 +CVE-2023-52596: Fix not seen in stream +CVE-2023-52597: Fixed with 5.15.149 +CVE-2023-52598: Fixed with 5.15.149 +CVE-2023-52599: Fixed with 5.15.149 +CVE-2023-52600: Fixed with 5.15.149 +CVE-2023-52601: Fixed with 5.15.149 +CVE-2023-52602: Fixed with 5.15.149 +CVE-2023-52603: Fixed with 5.15.149 +CVE-2023-52604: Fixed with 5.15.149 +CVE-2023-52606: Fixed with 5.15.149 +CVE-2023-52607: Fixed with 5.15.149 +CVE-2023-52608: Fixed with 5.15.149 +CVE-2023-52609: Fixed with 5.15.148 +CVE-2023-52610: Fixed with 5.15.148 +CVE-2023-52612: Fixed with 5.15.148 +CVE-2023-52614: Fixed with 5.15.149 +CVE-2023-52615: Fixed with 5.15.149 +CVE-2023-52616: Fixed with 5.15.149 +CVE-2023-52617: Fixed with 5.15.149 +CVE-2023-52618: Fixed with 5.15.149 +CVE-2023-52619: Fixed with 5.15.149 +CVE-2023-52620: Fixed with 5.15.151 +CVE-2023-52621: Fix not seen in stream +CVE-2023-52622: Fixed with 5.15.149 +CVE-2023-52623: Fixed with 5.15.149 +CVE-2023-52624: Fix not seen in stream +CVE-2023-52625: Fix not seen in stream +CVE-2023-52627: Fixed with 5.15.149 +CVE-2023-52628: Fixed with 5.15.132 +CVE-2023-52629: Fix not seen in stream +CVE-2023-52630: Fixed with 5.15.149 +CVE-2023-52631: Fixed with 5.15.149 +CVE-2023-52632: Fix not seen in stream +CVE-2023-52633: Fixed with 5.15.149 +CVE-2023-52634: Fix not seen in stream +CVE-2023-52635: Fixed with 5.15.149 +CVE-2023-52637: Fixed with 5.15.149 +CVE-2023-52638: Fixed with 5.15.149 +CVE-2023-52639: Fix not seen in stream +CVE-2023-52640: Fixed with 5.15.150 +CVE-2023-52641: Fixed with 5.15.150 CVE-2023-5717: Fixed with 5.15.137 CVE-2023-6039: Fix not seen in stream CVE-2023-6040: Fixed with 5.15.147 CVE-2023-6121: Fixed with 5.15.141 CVE-2023-6176: Fixed with 5.15.132 CVE-2023-6240: Fix unknown -CVE-2023-6270: Fix unknown -CVE-2023-6356: Fix unknown +CVE-2023-6270: Fixed with 5.15.153 +CVE-2023-6356: Fixed with 5.15.148 CVE-2023-6535: Fix unknown -CVE-2023-6536: Fix unknown +CVE-2023-6536: Fixed with 5.15.148 CVE-2023-6546: Fixed with 5.15.128 CVE-2023-6560: Fix not seen in stream CVE-2023-6606: Fixed with 5.15.146 @@ -627,29 +790,30 @@ CVE-2023-6817: Fixed with 5.15.143 CVE-2023-6915: Fixed with 5.15.148 CVE-2023-6931: Fixed with 5.15.143 CVE-2023-6932: Fixed with 5.15.142 -CVE-2023-7042: Fix unknown +CVE-2023-7042: Fixed with 5.15.153 CVE-2023-7192: Fixed with 5.15.100 CVE-2024-0340: Fixed with 5.15.149 CVE-2024-0562: Fixed with 5.15.64 CVE-2024-0564: Fix unknown -CVE-2024-0565: Fix not seen in stream +CVE-2024-0565: Fixed with 5.15.150 CVE-2024-0584: Fixed with 5.15.142 CVE-2024-0607: Fixed with 5.15.140 CVE-2024-0639: Fixed with 5.15.121 CVE-2024-0641: Fixed with 5.15.135 CVE-2024-0646: Fixed with 5.15.147 CVE-2024-0775: Fixed with 5.15.112 -CVE-2024-0841: Fix unknown +CVE-2024-0841: Fixed with 5.15.151 CVE-2024-1085: Fixed with 5.15.148 CVE-2024-1086: Fixed with 5.15.149 CVE-2024-1151: Fixed with 5.15.149 CVE-2024-1312: Fix not seen in stream CVE-2024-21803: Fix unknown -CVE-2024-22099: Fix unknown +CVE-2024-2193: Fix unknown +CVE-2024-22099: Fixed with 5.15.153 CVE-2024-22386: Fix unknown CVE-2024-22705: Fixed with 5.15.146 -CVE-2024-23196: Fix unknown -CVE-2024-23307: Fix unknown +CVE-2024-23196: Fixed with 5.15.128 +CVE-2024-23307: Fix not seen in stream CVE-2024-23848: Fix unknown CVE-2024-23849: Fixed with 5.15.149 CVE-2024-23850: Fixed with 5.15.149 @@ -659,7 +823,7 @@ CVE-2024-24857: Fix unknown CVE-2024-24858: Fix unknown CVE-2024-24859: Fix unknown CVE-2024-24860: Fixed with 5.15.148 -CVE-2024-24861: Fix unknown +CVE-2024-24861: Fix not seen in stream CVE-2024-24864: Fix unknown CVE-2024-25739: Fix unknown CVE-2024-25740: Fix unknown @@ -669,8 +833,6 @@ CVE-2024-26583: Fix not seen in stream CVE-2024-26584: Fix not seen in stream CVE-2024-26585: Fix not seen in stream CVE-2024-26586: Fixed with 5.15.148 -CVE-2024-26587: Fix not seen in stream -CVE-2024-26588: Fix not seen in stream CVE-2024-26589: Fixed with 5.15.148 CVE-2024-26591: Fixed with 5.15.148 CVE-2024-26592: Fixed with 5.15.149 @@ -679,3 +841,134 @@ CVE-2024-26594: Fixed with 5.15.149 CVE-2024-26595: Fix not seen in stream CVE-2024-26597: Fixed with 5.15.148 CVE-2024-26598: Fixed with 5.15.148 +CVE-2024-26600: Fixed with 5.15.149 +CVE-2024-26601: Fixed with 5.15.150 +CVE-2024-26602: Fixed with 5.15.149 +CVE-2024-26603: Fixed with 5.15.150 +CVE-2024-26606: Fixed with 5.15.149 +CVE-2024-26607: Fix not seen in stream +CVE-2024-26608: Fixed with 5.15.149 +CVE-2024-26610: Fixed with 5.15.149 +CVE-2024-26614: Fixed with 5.15.149 +CVE-2024-26615: Fixed with 5.15.149 +CVE-2024-26622: Fixed with 5.15.151 +CVE-2024-26623: Fix not seen in stream +CVE-2024-26625: Fixed with 5.15.149 +CVE-2024-26627: Fixed with 5.15.149 +CVE-2024-26631: Fixed with 5.15.148 +CVE-2024-26633: Fixed with 5.15.148 +CVE-2024-26635: Fixed with 5.15.149 +CVE-2024-26636: Fixed with 5.15.149 +CVE-2024-26640: Fixed with 5.15.149 +CVE-2024-26641: Fixed with 5.15.149 +CVE-2024-26642: Fix not seen in stream +CVE-2024-26644: Fixed with 5.15.149 +CVE-2024-26645: Fixed with 5.15.149 +CVE-2024-26646: Fix not seen in stream +CVE-2024-26647: Fix not seen in stream +CVE-2024-26648: Fix not seen in stream +CVE-2024-26650: Fix not seen in stream +CVE-2024-26651: Fixed with 5.15.153 +CVE-2024-26654: Fix not seen in stream +CVE-2024-26655: Fix not seen in stream +CVE-2024-26656: Fix not seen in stream +CVE-2024-26658: Fix not seen in stream +CVE-2024-26659: Fixed with 5.15.152 +CVE-2024-26660: Fixed with 5.15.149 +CVE-2024-26661: Fix not seen in stream +CVE-2024-26662: Fix not seen in stream +CVE-2024-26663: Fixed with 5.15.149 +CVE-2024-26664: Fixed with 5.15.149 +CVE-2024-26665: Fixed with 5.15.149 +CVE-2024-26668: Fixed with 5.15.149 +CVE-2024-26669: Fix not seen in stream +CVE-2024-26671: Fixed with 5.15.149 +CVE-2024-26672: Fix not seen in stream +CVE-2024-26673: Fixed with 5.15.149 +CVE-2024-26675: Fixed with 5.15.149 +CVE-2024-26676: Fixed with 5.15.149 +CVE-2024-26677: Fix not seen in stream +CVE-2024-26679: Fixed with 5.15.149 +CVE-2024-26680: Fix not seen in stream +CVE-2024-26684: Fixed with 5.15.149 +CVE-2024-26685: Fixed with 5.15.149 +CVE-2024-26686: Fix not seen in stream +CVE-2024-26687: Fix not seen in stream +CVE-2024-26688: Fixed with 5.15.151 +CVE-2024-26689: Fixed with 5.15.149 +CVE-2024-26691: Fix not seen in stream +CVE-2024-26696: Fixed with 5.15.149 +CVE-2024-26697: Fixed with 5.15.149 +CVE-2024-26698: Fixed with 5.15.149 +CVE-2024-26699: Fix not seen in stream +CVE-2024-26700: Fix not seen in stream +CVE-2024-26702: Fixed with 5.15.149 +CVE-2024-26704: Fixed with 5.15.149 +CVE-2024-26706: Fix not seen in stream +CVE-2024-26707: Fixed with 5.15.149 +CVE-2024-26712: Fixed with 5.15.149 +CVE-2024-26713: Fix not seen in stream +CVE-2024-26714: Fix not seen in stream +CVE-2024-26715: Fixed with 5.15.149 +CVE-2024-26717: Fixed with 5.15.149 +CVE-2024-26718: Fix not seen in stream +CVE-2024-26719: Fix not seen in stream +CVE-2024-26720: Fixed with 5.15.149 +CVE-2024-26726: Fix not seen in stream +CVE-2024-26727: Fixed with 5.15.149 +CVE-2024-26733: Fixed with 5.15.150 +CVE-2024-26735: Fixed with 5.15.150 +CVE-2024-26736: Fixed with 5.15.150 +CVE-2024-26737: Fixed with 5.15.150 +CVE-2024-26738: Fix not seen in stream +CVE-2024-26739: Fix not seen in stream +CVE-2024-26740: Fix not seen in stream +CVE-2024-26743: Fixed with 5.15.150 +CVE-2024-26744: Fixed with 5.15.150 +CVE-2024-26745: Fix not seen in stream +CVE-2024-26747: Fixed with 5.15.150 +CVE-2024-26748: Fixed with 5.15.150 +CVE-2024-26749: Fixed with 5.15.150 +CVE-2024-26751: Fixed with 5.15.150 +CVE-2024-26752: Fixed with 5.15.150 +CVE-2024-26754: Fixed with 5.15.150 +CVE-2024-26756: Fix not seen in stream +CVE-2024-26757: Fix not seen in stream +CVE-2024-26758: Fix not seen in stream +CVE-2024-26759: Fix not seen in stream +CVE-2024-26763: Fixed with 5.15.150 +CVE-2024-26764: Fixed with 5.15.150 +CVE-2024-26765: Fix not seen in stream +CVE-2024-26766: Fixed with 5.15.150 +CVE-2024-26767: Fix not seen in stream +CVE-2024-26768: Fix not seen in stream +CVE-2024-26769: Fixed with 5.15.150 +CVE-2024-26770: Fix not seen in stream +CVE-2024-26771: Fixed with 5.15.150 +CVE-2024-26772: Fixed with 5.15.150 +CVE-2024-26773: Fixed with 5.15.150 +CVE-2024-26774: Fixed with 5.15.150 +CVE-2024-26775: Fix not seen in stream +CVE-2024-26776: Fixed with 5.15.150 +CVE-2024-26777: Fixed with 5.15.150 +CVE-2024-26778: Fixed with 5.15.150 +CVE-2024-26779: Fixed with 5.15.150 +CVE-2024-26782: Fixed with 5.15.151 +CVE-2024-26784: Fix not seen in stream +CVE-2024-26787: Fixed with 5.15.152 +CVE-2024-26788: Fixed with 5.15.151 +CVE-2024-26789: Fix not seen in stream +CVE-2024-26790: Fixed with 5.15.151 +CVE-2024-26791: Fixed with 5.15.151 +CVE-2024-26793: Fixed with 5.15.151 +CVE-2024-26795: Fixed with 5.15.151 +CVE-2024-26797: Fix not seen in stream +CVE-2024-26798: Fixed with 5.15.151 +CVE-2024-26801: Fixed with 5.15.151 +CVE-2024-26802: Fixed with 5.15.151 +CVE-2024-26803: Fixed with 5.15.151 +CVE-2024-26804: Fixed with 5.15.151 +CVE-2024-26805: Fixed with 5.15.151 +CVE-2024-26806: Fix not seen in stream +CVE-2024-26808: Fixed with 5.15.149 +CVE-2024-26809: Fixed with 5.15.153 diff --git a/data/5.15/5.15_security.txt b/data/5.15/5.15_security.txt index ed7b47519..42f689c84 100644 --- a/data/5.15/5.15_security.txt +++ b/data/5.15/5.15_security.txt @@ -52,10 +52,50 @@ CVEs fixed in 5.15.12: CVE-2021-44733: 492eb7afe858d60408b2da09adc78540c4d16543 tee: handle lookup of shm with reference count 0 CVE-2021-45100: a2c144d17623984fdafa4634ecf4ab64580d29bb ksmbd: disable SMB2_GLOBAL_CAP_ENCRYPTION for SMB 3.1.1 CVE-2021-45469: a8a9d753edd7f71e6a2edaa580d8182530b68791 f2fs: fix to do sanity check on last xattr entry in __f2fs_setxattr() + CVE-2021-47082: 3cb5ae77799e8ed6ec3fec0b6b4cd07f01650cc5 tun: avoid double free in tun_free_netdev + CVE-2021-47083: fb563baa3eb8e7a15f2cff3c2695e2cca0493e69 pinctrl: mediatek: fix global-out-of-bounds issue + CVE-2021-47086: 53ccdc73eedaf0e922c45b569b797d2796fbaafa phonet/pep: refuse to enable an unbound pipe + CVE-2021-47087: 91e94e42f6fc49635f1a16d8ae3f79552bcfda29 tee: optee: Fix incorrect page free bug + CVE-2021-47088: 330c6117a82c16a9a365a51cec5c9ab30b13245c mm/damon/dbgfs: protect targets destructions with kdamond_lock + CVE-2021-47089: 2f06c8293d27f6337f907042c602c9c953988c48 kfence: fix memory leak when cat kfence objects + CVE-2021-47090: c691e7575eff76e563b0199c23ec46bd454f43e3 mm/hwpoison: clear MF_COUNT_INCREASED before retrying get_any_page() + CVE-2021-47091: c1d1ec4db5f7264cfc21993e59e8f2dcecf4b44f mac80211: fix locking in ieee80211_start_ap error path + CVE-2021-47092: e4e4e7cb229821cd215031abc47efdab5486a67c KVM: VMX: Always clear vmx->fail on emulation_required + CVE-2021-47093: 9ca1324755f1f8629a370af5cc315b175331f5d1 platform/x86: intel_pmc_core: fix memleak on registration failure + CVE-2021-47094: d884eefd75cc54887bc2e9e724207443525dfb2c KVM: x86/mmu: Don't advance iterator after restart due to yielding + CVE-2021-47095: 77a7311ca167aa5b7055c549a940a56e73ee5f29 ipmi: ssif: initialize ssif_info->client early + CVE-2021-47096: b398fcbe4de1e1100867fdb6f447c6fbc8fe7085 ALSA: rawmidi - fix the uninitalized user_pversion + CVE-2021-47097: dfd5b60b5342b6b505a104e48f08ad9b9bdbbd7b Input: elantech - fix stack out of bound access in elantech_change_report_id() + CVE-2021-47098: d105f30bea9104c590a9e5b495cb8a49bdfe405f hwmon: (lm90) Prevent integer overflow/underflow in hysteresis calculations + CVE-2021-47099: d2269ae48598e05b59ec9ea9e6e44fd33941130d veth: ensure skb entering GRO are not cloned. + CVE-2021-47100: 6b3f7e4b10f343f05b5fb513b07a9168fbf1172e ipmi: Fix UAF when uninstall ipmi_si and ipmi_msghandler module + CVE-2021-47101: d259f621c85949f30cc578cac813b82bb5169f56 asix: fix uninit-value in asix_mdio_read() + CVE-2021-47102: 5c553a0cd1263e4da5f220d80fa713fc3959c1d0 net: marvell: prestera: fix incorrect structure access + CVE-2021-47103: 0249a4b8a554f2eb6a27b62516fa50168584faa4 inet: fully convert sk->sk_rx_dst to RCU rules + CVE-2021-47104: aefcc25f3a0cd28a87d11d41d30419a12cd26a34 IB/qib: Fix memory leak in qib_user_sdma_queue_pkts() + CVE-2021-47105: ad6d20da2cfbe14b7b1200d15f39e65988b0b9e8 ice: xsk: return xsk buffers back to pool when cleaning the ring + CVE-2021-47106: 9d558e5f0d6fdd0a568f73dceb0b40c4f5012e5a netfilter: nf_tables: fix use-after-free in nft_set_catchall_destroy() + CVE-2021-47107: eabc0aab98e5218ceecd82069b0d6fdfff5ee885 NFSD: Fix READDIR buffer overflow + CVE-2021-47108: 71d07ebc5000b9c1d140e99e7493b0bafa954776 drm/mediatek: hdmi: Perform NULL pointer check for mtk_hdmi_conf CVE-2022-1195: 03d00f7f1815ec00dab5035851b3de83afd054a8 hamradio: improve the incomplete fix to avoid NPD CVE-2022-4744: 3cb5ae77799e8ed6ec3fec0b6b4cd07f01650cc5 tun: avoid double free in tun_free_netdev CVEs fixed in 5.15.13: + CVE-2021-46923: 47b5d0a7532d39e42a938f81e3904268145c341d fs/mount_setattr: always cleanup mount_kattr + CVE-2021-46924: 238920381b8925d070d32d73cd9ce52ab29896fe NFC: st21nfca: Fix memory leak in device probe and remove + CVE-2021-46925: b85f751d71ae8e2a15e9bda98852ea9af35282eb net/smc: fix kernel panic caused by race of smc_sock + CVE-2021-46926: cce476954401e3421afafb25bbaa926050688b1d ALSA: hda: intel-sdw-acpi: harden detection of controller + CVE-2021-46927: 90d2beed5e753805c5eab656b8d48257638fe543 nitro_enclaves: Use get_user_pages_unlocked() call to handle mmap assert + CVE-2021-46928: e96373f0a5f484bc1e193f9951dcb3adf24bf3f7 parisc: Clear stale IIR value on instruction access rights trap + CVE-2021-46929: 75799e71df1da11394740b43ae5686646179561d sctp: use call_rcu to free endpoint + CVE-2021-46930: 249ddfbe00570d6dc76208e88017937d4d374c79 usb: mtu3: fix list_head check warning + CVE-2021-46931: 07f13d58a8ecc3baf9a488588fb38c5cb0db484f net/mlx5e: Wrap the tx reporter dump callback to extract the sq + CVE-2021-46932: e79ff8c68acb1eddf709d3ac84716868f2a91012 Input: appletouch - initialize work before device registration + CVE-2021-46933: ebef2aa29f370b5096c16020c104e393192ef684 usb: gadget: f_fs: Clear ffs_eventfd in ffs_data_clear. + CVE-2021-46934: f68599581067e8a5a8901ba9eb270b4519690e26 i2c: validate user data in compat ioctl + CVE-2021-46935: 17691bada6b2f1d5f1c0f6d28cd9d0727023b0ff binder: fix async_free_space accounting for empty parcels + CVE-2021-46936: 08eacbd141e2495d2fcdde84358a06c4f95cbb13 net: fix use-after-free in tw_timer_handler + CVE-2021-46937: ffe4a1ba1a82c416a6b3a09d46594f6a885ae141 mm/damon/dbgfs: fix 'struct pid' leaks in 'dbgfs_target_ids_write()' CVE-2022-20154: 75799e71df1da11394740b43ae5686646179561d sctp: use call_rcu to free endpoint CVE-2023-23006: 4595dffccfa5b9360162c72cc0f6a33477d871cf net/mlx5: DR, Fix NULL vs IS_ERR checking in dr_domain_init_resources @@ -98,6 +138,7 @@ CVEs fixed in 5.15.23: CVE-2022-0435: 1f1788616157b0222b0c2153828b475d95e374a7 tipc: improve size validations for received domain records CVE-2022-0487: af0e6c49438b1596e4be8a267d218a0c88a42323 moxart: fix potential use-after-free on remove path CVE-2022-0516: 14f880ea779e11a6c162f122c1199e3578e6e3f3 KVM: s390: Return error on SIDA memop on normal guest + CVE-2022-48626: af0e6c49438b1596e4be8a267d218a0c88a42323 moxart: fix potential use-after-free on remove path CVEs fixed in 5.15.24: CVE-2022-25258: 3e33e5c67cb9ebd2b791b9a9fb2b71daacebd8d4 USB: gadget: validate interface OS descriptor requests @@ -146,6 +187,7 @@ CVEs fixed in 5.15.31: CVE-2022-20158: a055f5f2841f7522b44a2b1eccb1951b4b03d51a net/packet: fix slab-out-of-bounds access in packet_recvmsg() CVE-2022-20368: a055f5f2841f7522b44a2b1eccb1951b4b03d51a net/packet: fix slab-out-of-bounds access in packet_recvmsg() CVE-2022-3107: ab0ab176183191cffc69fe9dd8ac6c8db23f60d3 hv_netvsc: Add check for kvmalloc_array + CVE-2022-48629: ab9337c7cb6f875b6286440b1adfbeeef2b2b2bd crypto: qcom-rng - ensure buffer for generate is completely filled CVEs fixed in 5.15.32: CVE-2022-1015: 1bd57dea456149619f3b80d67eee012122325af8 netfilter: nf_tables: validate registers coming from userspace. @@ -275,6 +317,7 @@ CVEs fixed in 5.15.54: CVEs fixed in 5.15.56: CVE-2022-36123: 26bb7afc027ce6ac8ab6747babec674d55689ff0 x86: Clear .brk area at early boot + CVE-2022-48627: 57964a5710252bc82fe22d9fa98c180c58c20244 vt: fix memory overlapping when deleting chars in the buffer CVEs fixed in 5.15.57: CVE-2022-23816: ccb25d7db1a29bc251692be745b000e6f0754048 x86/kvm/vmx: Make noinstr clean @@ -296,6 +339,7 @@ CVEs fixed in 5.15.60: CVE-2022-39189: 92343314d34e04da0923cefd3be67521d706fa35 KVM: x86: do not report a vCPU as preempted outside instruction boundaries CVEs fixed in 5.15.61: + CVE-2019-25162: 35927d7509ab9bf41896b7e44f639504eae08af7 i2c: Fix a potential use after free CVE-2022-1679: 03ca957c5f7b55660957eda20b5db4110319ac7a ath9k: fix use-after-free in ath9k_hif_usb_rx_cb CVE-2022-20422: cc69ef95988b9ef2fc730ec452a7441efb90ef5e arm64: fix oops in concurrently setting insn_emulation sysctls CVE-2022-2585: 9e255ed238fc67058df87b0388ad6d4b2ef3a2bd posix-cpu-timers: Cleanup CPU timers before freeing them during exec @@ -550,6 +594,7 @@ CVEs fixed in 5.15.111: CVE-2023-35824: c94388b5b9098db82d6ba4627ef6e41a35870818 media: dm1105: Fix use after free bug in dm1105_remove due to race condition CVE-2023-35828: 1e58fb6b1cef4d5e552a0c3038bf946890af6f3b usb: gadget: udc: renesas_usb3: Fix use after free bug in renesas_usb3_remove due to race condition CVE-2023-35829: cac0f4f36e226c79c83d01dddc049ac59d2de157 media: rkvdec: fix use after free bug in rkvdec_remove + CVE-2023-52474: a2bd706ab63509793b5cd5065e685b7ef5cba678 IB/hfi1: Fix bugs with non-PAGE_SIZE-end multi-iovec user SDMA requests CVEs fixed in 5.15.112: CVE-2023-34256: 6d9a705a653eb146b4991dbd198b258f787c70b1 ext4: avoid a potential slab-out-of-bounds in ext4_group_desc_csum @@ -633,6 +678,7 @@ CVEs fixed in 5.15.128: CVE-2023-4569: 1adaec4758d1cefbf348a291ad9b752aaa10f8d3 netfilter: nf_tables: deactivate catchall elements in next generation CVE-2023-51042: ef568da1fd843581e855c79a368209b752dea2c1 drm/amdgpu: Fix potential fence use-after-free v2 CVE-2023-6546: 2a523446438376bb7c224f3169ae9b98ce0fb893 tty: n_gsm: fix the UAF caused by race condition in gsm_cleanup_mux + CVE-2024-23196: 8703b26387e1fa4f8749db98d24c67617b873acb ALSA: hda: fix a possible null-pointer dereference due to data race in snd_hdac_regmap_sync() CVEs fixed in 5.15.129: CVE-2022-36402: c8aab333d41a4ed6c5e7987c6cc5505ab86b5652 drm/vmwgfx: Fix shader stage validation @@ -647,6 +693,7 @@ CVEs fixed in 5.15.132: CVE-2023-4623: 4cf994d3f4ff42d604fae2b461bdd5195a7dfabd net/sched: sch_hfsc: Ensure inner classes have fsc curve CVE-2023-4881: 1ad7b189cc1411048434e8595ffcbe7873b71082 netfilter: nftables: exthdr: fix 4-byte stack OOB write CVE-2023-4921: 6ea277b2c6263931798234e2eed892ecfbb85596 net: sched: sch_qfq: Fix UAF in qfq_dequeue() + CVE-2023-52628: 1ad7b189cc1411048434e8595ffcbe7873b71082 netfilter: nftables: exthdr: fix 4-byte stack OOB write CVE-2023-6176: 481bd6dcc5fe6c0ec57b61240ab552f67ff51b6b net/tls: do not free tls_rec on async operation in bpf_exec_tx_verdict() CVEs fixed in 5.15.133: @@ -657,19 +704,56 @@ CVEs fixed in 5.15.134: CVE-2023-42754: 8860d354f653628b6330e1c5b06b2828948135a4 ipv4: fix null-deref in ipv4_link_failure CVE-2023-4563: 7c7e658a36f8b1522bd3586d8137e5f93a25ddc5 netfilter: nf_tables: don't skip expired elements during walk CVE-2023-5197: 0c5fd85fb01fa1a5dbb9f213b0d1925e671f30df netfilter: nf_tables: disallow rule removal from chain binding + CVE-2023-52482: f090a8b4d2e3ec6f318d6fdab243a2edc5a8cc37 x86/srso: Add SRSO mitigation for Hygon processors + CVE-2023-52484: f5a604757aa8e37ea9c7011dc9da54fa1b30f29b iommu/arm-smmu-v3: Fix soft lockup triggered by arm_smmu_mm_invalidate_range + CVE-2023-52500: d540a4370aba378fbedf349ba0bb68e96e24243d scsi: pm80xx: Avoid leaking tags when processing OPC_INB_SET_CONTROLLER_CONFIG command + CVE-2023-52501: 344f2f3e61a90f0150c754796ec9a17fcaeec03d ring-buffer: Do not attempt to read past "commit" + CVE-2023-52511: ff05ed4ae214011464a0156f05cac1b0b46b5fbc spi: sun6i: reduce DMA RX transfer width to single byte + CVE-2023-52516: ac0d068099349cbca3d93f2e3b15bb329364b08c dma-debug: don't call __dma_entry_alloc_check_leak() under free_entries_lock + CVE-2023-52517: bd1ec7f9983b5cd3c77e0f7cda3fa8aed041af2f spi: sun6i: fix race between DMA RX transfer completion and RX FIFO drain + CVE-2023-52563: 66cb6d74f5a1b6eafe3370b56bf2cb575a91acbc drm/meson: fix memory leak on ->hpd_notify callback + CVE-2023-52566: 3936e8714907cd55e37c7cc50e50229e4a9042e8 nilfs2: fix potential use after free in nilfs_gccache_submit_read_data() + CVE-2023-52573: ea82139e6e3561100d38d14401d57c0ea93fc07e net: rds: Fix possible NULL-pointer dereference + CVE-2023-52574: cd05eec2ee0cc396813a32ef675634e403748255 team: fix null-ptr-deref when team device type is changed + CVE-2023-52578: 8bc97117b51d68d5cea8f5351cca2d8c4153f394 net: bridge: use DEV_STATS_INC() + CVE-2023-52580: f90a7b9586d72f907092078a9f394733ca502cc9 net/core: Fix ETH_P_1588 flow dissector CVEs fixed in 5.15.135: CVE-2023-31085: 0ea2a63497333019bd2931975ed489216b365755 ubi: Refuse attaching if mtd's erasesize is 0 CVE-2023-34324: c8af81a9d36e0d2e5f198eaceb38a743d834dfe2 xen/events: replace evtchn_rwlock with RCU CVE-2023-5158: 1e69422efcc60571cc04f6c1940da848a8c2f21b vringh: don't use vringh_kiov_advance() in vringh_iov_xfer() + CVE-2023-52479: 694e13732e830cbbfedb562e57f28644927c33fd ksmbd: fix uaf in smb20_oplock_break_ack + CVE-2023-52513: 81b7bf367eea795d259d0261710c6a89f548844d RDMA/siw: Fix connection failure handling + CVE-2023-52519: 8781fe259dd5a178fdd1069401bbd1437f9491c5 HID: intel-ish-hid: ipc: Disable and reenable ACPI GPE bit + CVE-2023-52522: 147d89ee41434b97043c2dcb17a97dc151859baa net: fix possible store tearing in neigh_periodic_work() + CVE-2023-52523: bc8b89b6963803a123f64aa9494155a037b3d728 bpf, sockmap: Reject sk_msg egress redirects to non-TCP sockets + CVE-2023-52527: cd1189956393bf850b2e275e37411855d3bd86bb ipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data() + CVE-2023-52528: cda10784a176d7192f08ecb518f777a4e9575812 net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg + CVE-2023-52529: bb0707fde7492121917fd9ddb43829e96ec0bb9e HID: sony: Fix a potential memory leak in sony_probe() + CVE-2023-52531: 7c8faa31080342aec4903c9acb20caf82fcca1ef wifi: iwlwifi: mvm: Fix a memory corruption issue CVE-2024-0641: 24fb22bddb71c6bfbe0fe25e1b7f793c5b580918 tipc: fix a potential deadlock on &tx->lock CVEs fixed in 5.15.136: CVE-2023-35827: 616761cf9df9af838c0a1a1232a69322a9eb67e6 ravb: Fix use-after-free issue in ravb_tx_timeout_work() + CVE-2023-52475: 6a4a396386404e62fb59bc3bde48871a64a82b4f Input: powermate - fix use-after-free in powermate_config_complete + CVE-2023-52477: 528f0ba9f7a4bc1b61c9b6eb591ff97ca37cac6b usb: hub: Guard against accesses to uninitialized BOS descriptors + CVE-2023-52478: 28ddc1e0b898291323b62d770b1b931de131a528 HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect + CVE-2023-52502: d888d3f70b0de32b4f51534175f039ddab15eef8 net: nfc: fix races in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn() + CVE-2023-52503: 1680c82929bc14d706065f123dab77f2f1293116 tee: amdtee: fix use-after-free vulnerability in amdtee_close_session + CVE-2023-52504: ecba5afe86f30605eb9dfb7f265a8de0218d4cfc x86/alternatives: Disable KASAN in apply_alternatives() + CVE-2023-52507: 25dd54b95abfdca423b65a4ee620a774777d8213 nfc: nci: assert requested protocol is valid + CVE-2023-52509: 616761cf9df9af838c0a1a1232a69322a9eb67e6 ravb: Fix use-after-free issue in ravb_tx_timeout_work() + CVE-2023-52510: 84c6aa0ae5c4dc121f9996bb8fed46c80909d80e ieee802154: ca8210: Fix a potential UAF in ca8210_probe + CVE-2023-52515: b9bdffb3f9aaeff8379c83f5449c6b42cb71c2b5 RDMA/srp: Do not call scsi_done() from srp_abort() + CVE-2023-52520: 124cf0ea4b82e1444ec8c7420af4e7db5558c293 platform/x86: think-lmi: Fix reference leak + CVE-2023-52559: 29298c85a81abdc512e87537515ed4b1a9601d0e iommu/vt-d: Avoid memory allocation in iommu_suspend() CVEs fixed in 5.15.137: CVE-2023-46343: ffdc881f68073ff86bf21afb9bb954812e8278be nfc: nci: fix possible NULL pointer dereference in send_acknowledge() CVE-2023-46813: 582f7993353c7b116651f88385b1785dffa14c5d x86/sev: Check for user-space IOIO pointing to kernel space + CVE-2023-52476: 403d201d1fd144cb249836dafb222f6375871c6c perf/x86/lbr: Filter vsyscall addresses + CVE-2023-52483: 6c52b12159049046483fdb0c411a0a1869c41a67 mctp: perform route lookups under a RCU read-side lock + CVE-2023-52499: 29017ab1a539101d9c7bec63cc13a019f97b2820 powerpc/47x: Fix 47x syscall return crash CVE-2023-5717: 71d224acc4d1df1b61a294abee0f1032a9b03b40 perf: Disallow mis-matched inherited group reads CVEs fixed in 5.15.140: @@ -710,6 +794,7 @@ CVEs fixed in 5.15.145: CVE-2023-3867: 97f5c1e3086c8ba1473c265d9a5523cc9ef5579e ksmbd: add missing compound request handing in some commands CVE-2023-52441: 5c0df9d30c289d6b9d7d44e2a450de2f8e3cf40b ksmbd: fix out of bounds in init_smb2_rsp_hdr() CVE-2023-52442: 017d85c94f02090a87f4a473dbe0d6ee0da72693 ksmbd: validate session id and tree id in compound request + CVE-2023-52480: c77fd3e25a51ac92b0f1b347a96eff6a0b4f066f ksmbd: fix race condition between session lookup and expire CVEs fixed in 5.15.146: CVE-2023-51779: 2b16d960c79abc397f102c3d23d30005b68cb036 Bluetooth: af_bluetooth: Fix Use-After-Free in bt_sock_recvmsg @@ -734,10 +819,17 @@ CVEs fixed in 5.15.148: CVE-2023-52451: 999a27b3ce9a69d54ccd5db000ec3a447bc43e6d powerpc/pseries/memhp: Fix access beyond end of drmem array CVE-2023-52454: 4cb3cf7177ae3666be7fb27d4ad4d72a295fb02d nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length CVE-2023-52456: ff168d4fdb0e1ba35fb413a749b3d6cce918ec19 serial: imx: fix tx statemachine deadlock - CVE-2023-52457: 828cd829483f0cda920710997aed79130b0af690 serial: 8250: omap: Don't skip resource freeing if pm_runtime_resume_and_get() failed CVE-2023-52458: 5010c27120962c85d2f421d2cf211791c9603503 block: add check that partition length needs to be aligned with block size CVE-2023-52463: 2aa141f8bc580f8f9811dfe4e0e6009812b73826 efivarfs: force RO when remounting if SetVariable is not supported CVE-2023-52464: 700cf4bead80fac994dcc43ae1ca5d86d8959b21 EDAC/thunderx: Fix possible out-of-bounds string access + CVE-2023-52467: c3e3a2144bf50877551138ffce9f7aa6ddfe385b mfd: syscon: Fix null pointer dereference in of_syscon_register() + CVE-2023-52469: b6dcba02ee178282e0d28684d241e0b8462dea6a drivers/amd/pm: fix a use-after-free in kv_parse_power_table + CVE-2023-52470: 14bbfaa5df273b26cde6707f6e655585700e6fe1 drm/radeon: check the alloc_workqueue return value in radeon_crtc_init() + CVE-2023-52609: 98fee5bee97ad47b527a997d5786410430d1f0e9 binder: fix race between mmput() and do_exit() + CVE-2023-52610: 172ba7d46c202e679f3ccb10264c67416aaeb1c4 net/sched: act_ct: fix skb leak and crash on ooo frags + CVE-2023-52612: a5f2f91b3fd7387e5102060809316a0f8f0bc625 crypto: scomp - fix req->dst buffer overflow + CVE-2023-6356: 4cb3cf7177ae3666be7fb27d4ad4d72a295fb02d nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length + CVE-2023-6536: 0613a2fbdf8d32c3f8f1e62d704e92251a100795 nvmet-tcp: fix a crash in nvmet_req_complete() CVE-2023-6915: 5dbcdaf4dbfe074e9142991c5c28eef789c1f6c6 ida: Fix crash in ida_free when the bitmap is empty CVE-2024-1085: c9ed30eea4f7bfa2441235ce23abd339ee671f50 netfilter: nf_tables: check if catch-all set element is active in next generation CVE-2024-24860: 4c71c01df8ef209e7fe22b58666cd2cf3dbafb44 Bluetooth: Fix atomicity violation in {min,max}_key_size_set @@ -746,10 +838,50 @@ CVEs fixed in 5.15.148: CVE-2024-26591: a7b98aa10f895e2569403896f2d19b73b6c95653 bpf: Fix re-attachment branch in bpf_tracing_prog_attach CVE-2024-26597: 3b5254862258b595662a0ccca6e9eeb88d6e7468 net: qualcomm: rmnet: fix global oob in rmnet_policy CVE-2024-26598: 12c2759ab1343c124ed46ba48f27bd1ef5d2dff4 KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache + CVE-2024-26631: 62b3387beef11738eb6ce667601a28fa089fa02c ipv6: mcast: fix data-race in ipv6_mc_down / mld_ifc_work + CVE-2024-26633: 4329426cf6b8e22b798db2331c7ef1dd2a9c748d ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim() CVEs fixed in 5.15.149: CVE-2023-52429: 888a0a46b80fa37eacfe81faf47ba0b83876251d dm: limit the number of targets and parameter size area CVE-2023-52435: 6c53e8547687d9c767c139cd4b50af566f58c29a net: prevent mss overflow in skb_segment() + CVE-2023-52486: b4af63da9d94986c529d74499fdfe44289acd551 drm: Don't unref the same fb many times by mistake due to deadlock handling + CVE-2023-52489: b448de2459b6d62a53892487ab18b7d823ff0529 mm/sparsemem: fix race in accessing memory_section->usage + CVE-2023-52491: 1b1036c60a37a30caf6759a90fe5ecd06ec35590 media: mtk-jpeg: Fix use after free bug due to error path handling in mtk_jpeg_dec_device_run + CVE-2023-52492: 047fce470412ab64cb7345f9ff5d06919078ad79 dmaengine: fix NULL pointer in channel unregistration function + CVE-2023-52493: 6e4c84316e2b70709f0d00c33ba3358d9fc8eece bus: mhi: host: Drop chan lock before queuing buffers + CVE-2023-52494: 94991728c84f8df54fd9eec9b85855ef9057ea08 bus: mhi: host: Add alignment check for event ring read pointer + CVE-2023-52498: a1d62c775b07213c73f81ae842424c74dd14b5f0 PM: sleep: Fix possible deadlocks in core system-wide PM code + CVE-2023-52583: a9c15d6e8aee074fae66c04d114f20b84274fcca ceph: fix deadlock or deadcode of misusing dget() + CVE-2023-52587: ed790bd0903ed3352ebf7f650d910f49b7319b34 IB/ipoib: Fix mcast list locking + CVE-2023-52588: 7ea0f29d9fd84905051be020c0df7d557e286136 f2fs: fix to tag gcing flag on page during block migration + CVE-2023-52594: 9003fa9a0198ce004b30738766c67eb7373479c9 wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus() + CVE-2023-52595: 4cc198580a7b93a36f5beb923f40f7ae27a3716c wifi: rt2x00: restart beacon queue when hardware reset + CVE-2023-52597: 732a3bea7aba5b15026ea42d14953c3425cc7dc2 KVM: s390: fix setting of fpc register + CVE-2023-52598: 28a1f492cb527f64593457a0a0f0d809b3f36c25 s390/ptrace: handle setting of fpc register correctly + CVE-2023-52599: 6aa30020879042d46df9f747e4f0a486eea6fe98 jfs: fix array-index-out-of-bounds in diNewExt + CVE-2023-52600: 8e44dc3f96e903815dab1d74fff8faafdc6feb61 jfs: fix uaf in jfs_evict_inode + CVE-2023-52601: 8393c80cce45f40c1256d72e21ad351b3650c57e jfs: fix array-index-out-of-bounds in dbAdjTree + CVE-2023-52602: 6c6a96c3d74df185ee344977d46944d6f33bb4dd jfs: fix slab-out-of-bounds Read in dtSearch + CVE-2023-52603: e4ce01c25ccbea02a09a5291c21749b1fc358e39 UBSAN: array-index-out-of-bounds in dtSplitRoot + CVE-2023-52604: 6fe8b702125aeee6ce83f20092a2341446704e7b FS:JFS:UBSAN:array-index-out-of-bounds in dbAdjTree + CVE-2023-52606: de4f5ed63b8a199704d8cdcbf810309d7eb4b36b powerpc/lib: Validate size for vector operations + CVE-2023-52607: ac3ed969a40357b0542d20f096a6d43acdfa6cc7 powerpc/mm: Fix null-pointer dereference in pgtable_cache_add + CVE-2023-52608: 614cc65032dcb0b64d23f5c5e338a8a04b12be5d firmware: arm_scmi: Check mailbox/SMT channel for consistency + CVE-2023-52614: 796d3fad8c35ee9df9027899fb90ceaeb41b958f PM / devfreq: Fix buffer overflow in trans_stat_show + CVE-2023-52615: 26cc6d7006f922df6cc4389248032d955750b2a0 hwrng: core - Fix page fault dead lock on mmap-ed hwrng + CVE-2023-52616: 2bb86817b33c9d704e127f92b838035a72c315b6 crypto: lib/mpi - Fix unexpected pointer access in mpi_ec_init + CVE-2023-52617: ff1c7e2fb9e9c3f53715fbe04d3ac47b80be7eb8 PCI: switchtec: Fix stdev_release() crash after surprise hot remove + CVE-2023-52618: f6abd5e17da33eba15df2bddc93413e76c2b55f7 block/rnbd-srv: Check for unlikely string overflow + CVE-2023-52619: 2a37905d47bffec61e95d99f0c1cc5dc6377956c pstore/ram: Fix crash when setting number of cpus to an odd number + CVE-2023-52622: d76c8d7ffe163c6bf2f1ef680b0539c2b3902b90 ext4: avoid online resizing failures due to oversized flex bg + CVE-2023-52623: f8cf4dabbdcb8bef85335b0ed7ad5b25fd82ff56 SUNRPC: Fix a suspicious RCU usage warning + CVE-2023-52627: 49f322ce1f265935f15e5512da69a399f27a5091 iio: adc: ad7091r: Allow users to configure device events + CVE-2023-52630: 1e4d3f8bd880e02932a9ea179f90bfa74fd2e899 blk-iocost: Fix an UBSAN shift-out-of-bounds warning + CVE-2023-52631: ae4acad41b0f93f1c26cc0fc9135bb79d8282d0b fs/ntfs3: Fix an NULL dereference bug + CVE-2023-52633: 0c7478a2da3f5fe106b4658338873d50c86ac7ab um: time-travel: fix time corruption + CVE-2023-52635: 099f6a9edbe30b142c1d97fe9a4748601d995675 PM / devfreq: Synchronize devfreq_monitor_[start/stop] + CVE-2023-52637: 41ccb5bcbf03f02d820bc6ea8390811859f558f8 can: j1939: Fix UAF in j1939_sk_match_filter during setsockopt(SO_J1939_FILTER) + CVE-2023-52638: 03358aba991668d3bb2c65b3c82aa32c36851170 can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock CVE-2024-0340: be38f291fd4d106be66370debd23d625c576023e vhost: use kzalloc() instead of kmalloc() followed by memset() CVE-2024-1086: 960cf4f812530f01f6acc6878ceaa5404c06af7b netfilter: nf_tables: reject QUEUE/DROP verdict parameters CVE-2024-1151: c45f2fa92cb273f77be33b60a120ff7cf6df8085 net: openvswitch: limit the number of recursions from action sets @@ -759,6 +891,109 @@ CVEs fixed in 5.15.149: CVE-2024-26592: 999daf367b924fdf14e9d83e034ee0f86bc17ec6 ksmbd: fix UAF issue in ksmbd_tcp_new_connection() CVE-2024-26593: 1f8d0691c50581ba6043f009ec9e8b9f78f09d5a i2c: i801: Fix block process call transactions CVE-2024-26594: dd1de9268745f0eac83a430db7afc32cbd62e84b ksmbd: validate mech token in session setup + CVE-2024-26600: 8cc889b9dea0579726be9520fcc766077890b462 phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP + CVE-2024-26602: 50fb4e17df319bb33be6f14e2a856950c1577dee sched/membarrier: reduce the ability to hammer on sys_membarrier + CVE-2024-26606: 82722b453dc2f967b172603e389ee7dc1b3137cc binder: signal epoll threads of self-work + CVE-2024-26608: aaa1f1a2ee80888c12ae2783f3a0be10e14067c5 ksmbd: fix global oob in ksmbd_nl_policy + CVE-2024-26610: 99a23462fe1a6f709f0fda3ebbe8b6b193ac75bd wifi: iwlwifi: fix a memory corruption + CVE-2024-26614: d86cc6ab33b085eaef27ea88b78fc8e2375c0ef3 tcp: make sure init the accept_queue's spinlocks once + CVE-2024-26615: 68b888d51ac82f2b96bf5e077a31d76afcdef25a net/smc: fix illegal rmb_desc access in SMC-D connection dump + CVE-2024-26625: dbc1b89981f9c5360277071d33d7f04a43ffda4a llc: call sock_orphan() at release time + CVE-2024-26627: d37c1c81419fdef66ebd0747cf76fb8b7d979059 scsi: core: Move scsi_host_busy() out of host lock for waking up EH handler + CVE-2024-26635: c0fe2fe7a5a291dfcf6dc64301732c8d3dc6a828 llc: Drop support for ETH_P_TR_802_2. + CVE-2024-26636: c22044270da68881074fda81a7d34812726cb249 llc: make llc_ui_sendmsg() more robust against bonding changes + CVE-2024-26640: 718f446e60316bf606946f7f42367d691d21541e tcp: add sanity checks to rx zerocopy + CVE-2024-26641: af6b5c50d47ab43e5272ad61935d0ed2e264d3f0 ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv() + CVE-2024-26644: 0877497dc97834728e1b528ddf1e1c484292c29c btrfs: don't abort filesystem when attempting to snapshot deleted subvolume + CVE-2024-26645: aef1cb00856ccfd614467cfb50b791278992e177 tracing: Ensure visibility when inserting an element into tracing_map + CVE-2024-26660: 42442f74314d41ddc68227047036fa3e78940054 drm/amd/display: Implement bounds check for stream encoder creation in DCN301 + CVE-2024-26663: c1701ea85ef0ec7be6a1b36c7da69f572ed2fd12 tipc: Check the bearer type before calling tipc_udp_nl_bearer_add() + CVE-2024-26664: a16afec8e83c56b14a4a73d2e3fb8eec3a8a057e hwmon: (coretemp) Fix out-of-bounds memory access + CVE-2024-26665: d964dd1bc1452594b4207d9229c157d9386e5d8a tunnels: fix out of bounds access when building IPv6 PMTU error + CVE-2024-26668: 79d4efd75e7dbecd855a3b8a63e65f7265f466e1 netfilter: nft_limit: reject configurations that cause integer overflow + CVE-2024-26671: 89e0e66682e1538aeeaa3109503473663cd24c8b blk-mq: fix IO hang from sbitmap wakeup race + CVE-2024-26673: b775ced05489f4b77a35fe203e9aeb22f428e38f netfilter: nft_ct: sanitize layer 3 and 4 protocol number in custom expectations + CVE-2024-26675: 58fbe665b097bf7b3144da7e7b91fb27aa8d0ae3 ppp_async: limit MRU to 64K + CVE-2024-26676: 4fe505c63aa3273135a57597fda761e9aecc7668 af_unix: Call kfree_skb() for dead unix_(sk)->oob_skb in GC. + CVE-2024-26679: 3266e638ba5cc1165f5e6989eb8c0720f1cc4b41 inet: read sk->sk_family once in inet_recv_error() + CVE-2024-26684: 6609e98ed82966a1b3168c142aca30f8284a7b89 net: stmmac: xgmac: fix handling of DPP safety error for DMA channels + CVE-2024-26685: 8fa90634ec3e9cc50f42dd605eec60f2d146ced8 nilfs2: fix potential bug in end_buffer_async_write + CVE-2024-26689: 70e329b440762390258a6fe8c0de93c9fdd56c77 ceph: prevent use-after-free in encode_cap_msg() + CVE-2024-26696: 7e9b622bd0748cc104d66535b76d9b3535f9dc0f nilfs2: fix hang in nilfs_lookup_dirty_data_buffers() + CVE-2024-26697: 120f7fa2008e3bd8b7680b4ab5df942decf60fd5 nilfs2: fix data corruption in dsync block recovery for small block sizes + CVE-2024-26698: 7656372ae190e54e8c8cf1039725a5ea59fdf84a hv_netvsc: Fix race condition between netvsc_probe and netvsc_remove + CVE-2024-26702: 8d5838a473e8e6d812257c69745f5920e4924a60 iio: magnetometer: rm3100: add boundary check for the value read from RM3100_REG_TMRC + CVE-2024-26704: afba9d11320dad5ce222ac8964caf64b7b4bedb1 ext4: fix double-free of blocks due to wrong extents moved_len + CVE-2024-26707: de769423b2f053182a41317c4db5a927e90622a0 net: hsr: remove WARN_ONCE() in send_hsr_supervision_frame() + CVE-2024-26712: 2738e0aa2fb24a7ab9c878d912dc2b239738c6c6 powerpc/kasan: Fix addr error caused by page alignment + CVE-2024-26715: 88936ceab6b426f1312327e9ef849c215c6007a7 usb: dwc3: gadget: Fix NULL pointer dereference in dwc3_gadget_suspend + CVE-2024-26717: 62f5d219edbd174829aa18d4b3d97cd5fefbb783 HID: i2c-hid-of: fix NULL-deref on failed power up + CVE-2024-26720: 5099871b370335809c0fd1abad74d9c7c205d43f mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again + CVE-2024-26727: e31546b0f34af21738c4ceac47d662c00ee6382f btrfs: do not ASSERT() if the newly created subvolume already got read + CVE-2024-26808: 70f17b48c86622217a58d5099d29242fc9adac58 netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain + +CVEs fixed in 5.15.150: + CVE-2023-52434: 890bc4fac3c0973a49cac35f634579bebba7fe48 smb: client: fix potential OOBs in smb2_parse_contexts() + CVE-2023-52497: 77cbc04a1a8610e303a0e0d74f2676667876a184 erofs: fix lz4 inplace decompression + CVE-2023-52640: a585faf0591548fe0920641950ebfa8a6eefe1cd fs/ntfs3: Fix oob in ntfs_listxattr + CVE-2023-52641: ee8db6475cb15c8122855f72ad4cfa5375af6a7b fs/ntfs3: Add NULL ptr dereference checking at the end of attr_allocate_frame() + CVE-2024-0565: 858e73ff25639a0cc1f6f8d2587b62c045867e41 smb: client: fix OOB in receive_encrypted_standard() + CVE-2024-26601: c1317822e2de80e78f137d3a2d99febab1b80326 ext4: regenerate buddy after block freeing failed if under fc replay + CVE-2024-26603: 8bd3eee7720c14b59a206bd05b98d7586bccf99a x86/fpu: Stop relying on userspace for info to fault in xsave buffer + CVE-2024-26733: 97eaa2955db4120ce6ec2ef123e860bc32232c50 arp: Prevent overflow in arp_req_get(). + CVE-2024-26735: 91b020aaa1e59bfb669d34c968e3db3d5416bcee ipv6: sr: fix possible use-after-free and null-ptr-deref + CVE-2024-26736: e56662160fc24d28cb75ac095cc6415ae1bda43e afs: Increase buffer size in afs_update_volume_status() + CVE-2024-26737: 5268bb02107b9eedfdcd51db75b407d10043368c bpf: Fix racing between bpf_timer_cancel_and_free and bpf_timer_cancel + CVE-2024-26743: 135e5465fefa463c5ec93c4eede48b9fedac894a RDMA/qedr: Fix qedr_create_user_qp error flow + CVE-2024-26744: 989af2f29342a9a7c7515523d879b698ac8465f4 RDMA/srpt: Support specifying the srpt_service_guid parameter + CVE-2024-26747: ef982fc41055fcebb361a92288d3225783d12913 usb: roles: fix NULL pointer issue when put module's reference + CVE-2024-26748: 3a2a909942b5335b7ea66366d84261b3ed5f89c8 usb: cdns3: fix memory double free when handle zero packet + CVE-2024-26749: 4e5c73b15d95452c1ba9c771dd013a3fbe052ff3 usb: cdns3: fixed memory use after free at cdns3_gadget_ep_disable() + CVE-2024-26751: eec6cbbfa1e8d685cc245cfd5626d0715a127a48 ARM: ep93xx: Add terminator to gpiod_lookup_table + CVE-2024-26752: 0da15a70395182ee8cb75716baf00dddc0bea38d l2tp: pass correct message length to ip6_append_data + CVE-2024-26754: a576308800be28f2eaa099e7caad093b97d66e77 gtp: fix use-after-free and null-ptr-deref in gtp_genl_dump_pdp() + CVE-2024-26763: 1a4371db68a31076afbe56ecce34fbbe6c80c529 dm-crypt: don't modify the data when using authenticated encryption + CVE-2024-26764: d7b6fa97ec894edd02f64b83e5e72e1aa352f353 fs/aio: Restrict kiocb_set_cancel_fn() to I/O submitted via libaio + CVE-2024-26766: 47ae64df23ed1318e27bd9844e135a5e1c0e6e39 IB/hfi1: Fix sdma.h tx->num_descs off-by-one error + CVE-2024-26769: 5e0bc09a52b6169ce90f7ac6e195791adb16cec4 nvmet-fc: avoid deadlock on delete association path + CVE-2024-26771: 4fe4e5adc7d29d214c59b59f61db73dec505ca3d dmaengine: ti: edma: Add some null pointer checks to the edma_probe + CVE-2024-26772: 8de8305a25bfda607fc13475ebe84b978c96d7ff ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal() + CVE-2024-26773: 4c21fa60a6f4606f6214a38f50612b17b2f738f5 ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found() + CVE-2024-26774: 687061cfaa2ac3095170e136dd9c29a4974f41d4 ext4: avoid dividing by 0 in mb_update_avg_fragment_size() when block bitmap corrupt + CVE-2024-26776: 0399d7eba41d9b28f5bdd7757ec21a5b7046858d spi: hisi-sfc-v3xx: Return IRQ_NONE if no interrupts were detected + CVE-2024-26777: df6e2088c6f4cad539cf67cba2d6764461e798d1 fbdev: sis: Error out if pixclock equals zero + CVE-2024-26778: 8c54acf33e5adaad6374bf3ec1e3aff0591cc8e1 fbdev: savage: Error out if pixclock equals zero + CVE-2024-26779: 88c18fd06608b3adee547102505d715f21075c9d wifi: mac80211: fix race condition on enabling fast-xmit + +CVEs fixed in 5.15.151: + CVE-2023-52620: 00b19ee0dcc1aef06294471ab489bae26d94524e netfilter: nf_tables: disallow timeout for anonymous sets + CVE-2024-0841: 22850c9950a4e43a67299755d11498f3292d02ff fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super + CVE-2024-26622: 7d930a4da17958f869ef679ee0e4a8729337affc tomoyo: fix UAF write bug in tomoyo_write_control() + CVE-2024-26688: 22850c9950a4e43a67299755d11498f3292d02ff fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super + CVE-2024-26782: 4a4eeb6912538c2d0b158e8d11b62d96c1dada4e mptcp: fix double-free on socket dismantle + CVE-2024-26788: 4529c084a320be78ff2c5e64297ae998c6fdf66b dmaengine: fsl-qdma: init irq after reg initialization + CVE-2024-26790: 106c1ac953a66556ec77456c46e818208d3a9bce dmaengine: fsl-qdma: fix SoC may hang on 16 byte unaligned read + CVE-2024-26791: ab2d68655d0f04650bef09fee948ff80597c5fb9 btrfs: dev-replace: properly validate device names + CVE-2024-26793: 9376d059a705c5dfaac566c2d09891242013ae16 gtp: fix use-after-free and null-ptr-deref in gtp_newlink() + CVE-2024-26795: 5941a90c55d3bfba732b32208d58d997600b44ef riscv: Sparse-Memory/vmemmap out-of-bounds fix + CVE-2024-26798: 20a4b5214f7bee13c897477168c77bbf79683c3d fbcon: always restore the old font data in fbcon_do_set_font() + CVE-2024-26801: da4569d450b193e39e87119fd316c0291b585d14 Bluetooth: Avoid potential use-after-free in hci_error_reset + CVE-2024-26802: 8e99556301172465c8fe33c7f78c39a3d4ce8462 stmmac: Clear variable when destroying workqueue + CVE-2024-26803: f011c103e654d83dc85f057a7d1bd0960d02831c net: veth: clear GRO when clearing XDP even when down + CVE-2024-26804: afec0c5cd2ed71ca95a8b36a5e6d03333bf34282 net: ip_tunnel: prevent perpetual headroom growth + CVE-2024-26805: c71ed29d15b1a1ed6c464f8c3536996963046285 netlink: Fix kernel-infoleak-after-free in __skb_datagram_iter + +CVEs fixed in 5.15.152: + CVE-2024-26659: 2aa7bcfdbb46241c701811bbc0d64d7884e3346c xhci: handle isoc Babble and Buffer Overrun events properly + CVE-2024-26787: 5ae5060e17a3fc38e54c3e5bd8abd6b1d5bfae7c mmc: mmci: stm32: fix DMA API overlapping mappings warning + +CVEs fixed in 5.15.153: + CVE-2023-52447: 37d98fb9c3144c0fddf7f6e99aece9927ac8dce6 bpf: Defer the free of inner map when necessary + CVE-2023-6270: 7dd09fa80b0765ce68bfae92f4e2f395ccf0fba4 aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts + CVE-2023-7042: 4c4e592266b6eec748ce90e82bd9cbc9838f3633 wifi: ath10k: fix NULL pointer dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev() + CVE-2024-22099: 8d1753973f598531baaa2c1033cf7f7b5bb004b0 Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security + CVE-2024-26651: 276873ae26c8d75b00747c1dadb9561d6ef20581 sr9800: Add check for usbnet_get_endpoints + CVE-2024-26809: 362508506bf545e9ce18c72a2c48dcbfb891ab9c netfilter: nft_set_pipapo: release elements in clone only from destroy path Outstanding CVEs: CVE-2005-3660: (unk) @@ -851,6 +1086,7 @@ Outstanding CVEs: CVE-2022-45884: (unk) CVE-2022-45885: (unk) CVE-2022-45888: (unk) char: xillybus: Prevent use-after-free due to race condition + CVE-2022-48628: (unk) ceph: drop messages from MDS when unmounting CVE-2023-0597: (unk) x86/mm: Randomize per-cpu entry area CVE-2023-1075: (unk) net/tls: tls_is_tx_ready() checked list_entry CVE-2023-1476: (unk) @@ -863,6 +1099,7 @@ Outstanding CVEs: CVE-2023-23000: (unk) phy: tegra: xusb: Fix return value of tegra_xusb_find_port_node function CVE-2023-23039: (unk) CVE-2023-26242: (unk) + CVE-2023-28746: (unk) x86/mmio: Disable KVM mitigation when X86_FEATURE_CLEAR_CPU_BUF is set CVE-2023-31081: (unk) CVE-2023-31082: (unk) CVE-2023-31083: (unk) Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO @@ -877,35 +1114,56 @@ Outstanding CVEs: CVE-2023-4134: (unk) Input: cyttsp4_core - change del_timer_sync() to timer_shutdown_sync() CVE-2023-4155: (unk) KVM: SEV: only access GHCB fields once CVE-2023-4622: (unk) unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES - CVE-2023-47233: (unk) + CVE-2023-47233: (unk) wifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach CVE-2023-50431: (unk) accel/habanalabs: fix information leak in sec_attest_info() - CVE-2023-52434: (unk) smb: client: fix potential OOBs in smb2_parse_contexts() - CVE-2023-52447: (unk) bpf: Defer the free of inner map when necessary CVE-2023-52452: (unk) bpf: Fix accesses to uninit stack slots + CVE-2023-52481: (unk) arm64: errata: Add Cortex-A520 speculative unprivileged load workaround + CVE-2023-52485: (unk) drm/amd/display: Wake DMCUB before sending a command + CVE-2023-52488: (unk) serial: sc16is7xx: convert from _raw_ to _noinc_ regmap functions for FIFO + CVE-2023-52506: (unk) LoongArch: Set all reserved memblocks on Node#0 at initialization + CVE-2023-52508: (unk) nvme-fc: Prevent null pointer dereference in nvme_fc_io_getuuid() + CVE-2023-52530: (unk) wifi: mac80211: fix potential key use-after-free + CVE-2023-52532: (unk) net: mana: Fix TX CQE error handling + CVE-2023-52561: (unk) arm64: dts: qcom: sdm845-db845c: Mark cont splash memory region as reserved + CVE-2023-52565: (unk) media: uvcvideo: Fix OOB read + CVE-2023-52568: (unk) x86/sgx: Resolves SECS reclaim vs. page fault for EAUG race + CVE-2023-52569: (unk) btrfs: remove BUG() after failure to insert delayed dir index item + CVE-2023-52571: (unk) power: supply: rk817: Fix node refcount leak + CVE-2023-52572: (unk) cifs: Fix UAF in cifs_demultiplex_thread() + CVE-2023-52576: (unk) x86/mm, kexec, ima: Use memblock_free_late() from ima_free_kexec_buffer() + CVE-2023-52582: (unk) netfs: Only call folio_start_fscache() one time for each folio + CVE-2023-52584: (unk) spmi: mediatek: Fix UAF on device remove + CVE-2023-52585: (unk) drm/amdgpu: Fix possible NULL dereference in amdgpu_ras_query_error_status_helper() + CVE-2023-52586: (unk) drm/msm/dpu: Add mutex lock in control vblank irq + CVE-2023-52589: (unk) media: rkisp1: Fix IRQ disable race issue + CVE-2023-52590: (unk) ocfs2: Avoid touching renamed directory if parent does not change + CVE-2023-52591: (unk) reiserfs: Avoid touching renamed directory if parent does not change + CVE-2023-52593: (unk) wifi: wfx: fix possible NULL pointer dereference in wfx_set_mfp_ap() + CVE-2023-52596: (unk) sysctl: Fix out of bounds access for empty sysctl registers + CVE-2023-52621: (unk) bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers + CVE-2023-52624: (unk) drm/amd/display: Wake DMCUB before executing GPINT commands + CVE-2023-52625: (unk) drm/amd/display: Refactor DMCUB enter/exit idle interface + CVE-2023-52629: (unk) sh: push-switch: Reorder cleanup operations to avoid use-after-free bug + CVE-2023-52632: (unk) drm/amdkfd: Fix lock dependency warning with srcu + CVE-2023-52634: (unk) drm/amd/display: Fix disable_otg_wa logic + CVE-2023-52639: (unk) KVM: s390: vsie: fix race during shadow creation CVE-2023-6039: (unk) net: usb: lan78xx: reorder cleanup operations to avoid UAF bugs CVE-2023-6240: (unk) - CVE-2023-6270: (unk) - CVE-2023-6356: (unk) CVE-2023-6535: (unk) - CVE-2023-6536: (unk) CVE-2023-6560: (unk) io_uring: don't allow discontig pages for IORING_SETUP_NO_MMAP CVE-2023-6610: (unk) smb: client: fix potential OOB in smb2_dump_detail() - CVE-2023-7042: (unk) CVE-2024-0564: (unk) - CVE-2024-0565: (unk) smb: client: fix OOB in receive_encrypted_standard() - CVE-2024-0841: (unk) CVE-2024-1312: (unk) mm: lock_vma_under_rcu() must check vma->anon_vma under vma lock CVE-2024-21803: (unk) - CVE-2024-22099: (unk) + CVE-2024-2193: (unk) CVE-2024-22386: (unk) - CVE-2024-23196: (unk) - CVE-2024-23307: (unk) + CVE-2024-23307: (unk) md/raid5: fix atomicity violation in raid5_cache_count CVE-2024-23848: (unk) CVE-2024-24855: (unk) scsi: lpfc: Fix a possible data race in lpfc_unregister_fcf_rescan() CVE-2024-24857: (unk) CVE-2024-24858: (unk) CVE-2024-24859: (unk) - CVE-2024-24861: (unk) + CVE-2024-24861: (unk) media: xc4000: Fix atomicity violation in xc4000_get_frequency CVE-2024-24864: (unk) CVE-2024-25739: (unk) CVE-2024-25740: (unk) @@ -914,6 +1172,49 @@ Outstanding CVEs: CVE-2024-26583: (unk) tls: fix race between async notify and socket close CVE-2024-26584: (unk) net: tls: handle backlogging of crypto requests CVE-2024-26585: (unk) tls: fix race between tx work scheduling and socket close - CVE-2024-26587: (unk) net: netdevsim: don't try to destroy PHC on VFs - CVE-2024-26588: (unk) LoongArch: BPF: Prevent out-of-bounds memory access CVE-2024-26595: (unk) mlxsw: spectrum_acl_tcam: Fix NULL pointer dereference in error path + CVE-2024-26607: (unk) drm/bridge: sii902x: Fix probing race issue + CVE-2024-26623: (unk) pds_core: Prevent race issues involving the adminq + CVE-2024-26642: (unk) netfilter: nf_tables: disallow anonymous set with timeout flag + CVE-2024-26646: (unk) thermal: intel: hfi: Add syscore callbacks for system-wide PM + CVE-2024-26647: (unk) drm/amd/display: Fix late derefrence 'dsc' check in 'link_set_dsc_pps_packet()' + CVE-2024-26648: (unk) drm/amd/display: Fix variable deferencing before NULL check in edp_setup_replay() + CVE-2024-26650: (unk) platform/x86: p2sb: Allow p2sb_bar() calls during PCI device probe + CVE-2024-26654: (unk) ALSA: sh: aica: reorder cleanup operations to avoid UAF bugs + CVE-2024-26655: (unk) Fix memory leak in posix_clock_open() + CVE-2024-26656: (unk) drm/amdgpu: fix use-after-free bug + CVE-2024-26658: (unk) bcachefs: grab s_umount only if snapshotting + CVE-2024-26661: (unk) drm/amd/display: Add NULL test for 'timing generator' in 'dcn21_set_pipe()' + CVE-2024-26662: (unk) drm/amd/display: Fix 'panel_cntl' could be null in 'dcn21_set_backlight_level()' + CVE-2024-26669: (unk) net/sched: flower: Fix chain template offload + CVE-2024-26672: (unk) drm/amdgpu: Fix variable 'mca_funcs' dereferenced before NULL check in 'amdgpu_mca_smu_get_mca_entry()' + CVE-2024-26677: (unk) rxrpc: Fix delayed ACKs to not set the reference serial number + CVE-2024-26680: (unk) net: atlantic: Fix DMA mapping for PTP hwts ring + CVE-2024-26686: (unk) fs/proc: do_task_stat: use sig->stats_lock to gather the threads/children stats + CVE-2024-26687: (unk) xen/events: close evtchn after mapping cleanup + CVE-2024-26691: (unk) KVM: arm64: Fix circular locking dependency + CVE-2024-26699: (unk) drm/amd/display: Fix array-index-out-of-bounds in dcn35_clkmgr + CVE-2024-26700: (unk) drm/amd/display: Fix MST Null Ptr for RV + CVE-2024-26706: (unk) parisc: Fix random data corruption from exception handler + CVE-2024-26713: (unk) powerpc/pseries/iommu: Fix iommu initialisation during DLPAR add + CVE-2024-26714: (unk) interconnect: qcom: sc8180x: Mark CO0 BCM keepalive + CVE-2024-26718: (unk) dm-crypt, dm-verity: disable tasklets + CVE-2024-26719: (unk) nouveau: offload fence uevents work to workqueue + CVE-2024-26726: (unk) btrfs: don't drop extent_map for free space inode on write error + CVE-2024-26738: (unk) powerpc/pseries/iommu: DLPAR add doesn't completely initialize pci_controller + CVE-2024-26739: (unk) net/sched: act_mirred: don't override retval if we already lost the skb + CVE-2024-26740: (unk) net/sched: act_mirred: use the backlog for mirred ingress + CVE-2024-26745: (unk) powerpc/pseries/iommu: IOMMU table is not initialized for kdump over SR-IOV + CVE-2024-26756: (unk) md: Don't register sync_thread for reshape directly + CVE-2024-26757: (unk) md: Don't ignore read-only array in md_check_recovery() + CVE-2024-26758: (unk) md: Don't ignore suspended array in md_check_recovery() + CVE-2024-26759: (unk) mm/swap: fix race when skipping swapcache + CVE-2024-26765: (unk) LoongArch: Disable IRQ before init_fn() for nonboot CPUs + CVE-2024-26767: (unk) drm/amd/display: fixed integer types and null check locations + CVE-2024-26768: (unk) LoongArch: Change acpi_core_pic[NR_CPUS] to acpi_core_pic[MAX_CORE_PIC] + CVE-2024-26770: (unk) HID: nvidia-shield: Add missing null pointer checks to LED initialization + CVE-2024-26775: (unk) aoe: avoid potential deadlock at set_capacity + CVE-2024-26784: (unk) pmdomain: arm: Fix NULL dereference on scmi_perf_domain removal + CVE-2024-26789: (unk) crypto: arm64/neonbs - fix out-of-bounds access on short input + CVE-2024-26797: (unk) drm/amd/display: Prevent potential buffer overflow in map_hw_resources + CVE-2024-26806: (unk) spi: cadence-qspi: remove system-wide suspend helper calls from runtime PM hooks diff --git a/data/5.16/5.16_CVEs.txt b/data/5.16/5.16_CVEs.txt index 75a5933ee..c59517ee7 100644 --- a/data/5.16/5.16_CVEs.txt +++ b/data/5.16/5.16_CVEs.txt @@ -26,6 +26,7 @@ CVE-2019-16089: Fix unknown CVE-2019-19378: Fix unknown CVE-2019-19814: Fix unknown CVE-2019-20794: Fix unknown +CVE-2019-25162: Fix not seen in stream CVE-2020-0347: Fix unknown CVE-2020-10708: Fix unknown CVE-2020-11725: Fix unknown @@ -334,6 +335,10 @@ CVE-2022-48424: Fix not seen in stream CVE-2022-48425: Fix not seen in stream CVE-2022-48502: Fix not seen in stream CVE-2022-48619: Fix not seen in stream +CVE-2022-48626: Fixed with 5.16.9 +CVE-2022-48627: Fix not seen in stream +CVE-2022-48628: Fix not seen in stream +CVE-2022-48629: Fixed with 5.16.17 CVE-2023-0045: Fix not seen in stream CVE-2023-0160: Fix not seen in stream CVE-2023-0179: Fix not seen in stream @@ -429,6 +434,7 @@ CVE-2023-28328: Fix not seen in stream CVE-2023-28410: Fixed with 5.16.19 CVE-2023-28466: Fix not seen in stream CVE-2023-2860: Fix not seen in stream +CVE-2023-28746: Fix not seen in stream CVE-2023-2898: Fix not seen in stream CVE-2023-2985: Fix not seen in stream CVE-2023-3006: Fix not seen in stream @@ -542,7 +548,7 @@ CVE-2023-46343: Fix not seen in stream CVE-2023-46813: Fix not seen in stream CVE-2023-46838: Fix not seen in stream CVE-2023-46862: Fix not seen in stream -CVE-2023-47233: Fix unknown +CVE-2023-47233: Fix not seen in stream CVE-2023-4881: Fix not seen in stream CVE-2023-4921: Fix not seen in stream CVE-2023-50431: Fix not seen in stream @@ -573,21 +579,140 @@ CVE-2023-52451: Fix not seen in stream CVE-2023-52452: Fix not seen in stream CVE-2023-52454: Fix not seen in stream CVE-2023-52456: Fix not seen in stream -CVE-2023-52457: Fix not seen in stream CVE-2023-52458: Fix not seen in stream CVE-2023-52462: Fix not seen in stream CVE-2023-52463: Fix not seen in stream CVE-2023-52464: Fix not seen in stream +CVE-2023-52467: Fix not seen in stream +CVE-2023-52469: Fix not seen in stream +CVE-2023-52470: Fix not seen in stream +CVE-2023-52474: Fix not seen in stream +CVE-2023-52475: Fix not seen in stream +CVE-2023-52476: Fix not seen in stream +CVE-2023-52477: Fix not seen in stream +CVE-2023-52478: Fix not seen in stream +CVE-2023-52479: Fix not seen in stream +CVE-2023-52480: Fix not seen in stream +CVE-2023-52481: Fix not seen in stream +CVE-2023-52482: Fix not seen in stream +CVE-2023-52483: Fix not seen in stream +CVE-2023-52484: Fix not seen in stream +CVE-2023-52485: Fix not seen in stream +CVE-2023-52486: Fix not seen in stream +CVE-2023-52488: Fix not seen in stream +CVE-2023-52489: Fix not seen in stream +CVE-2023-52491: Fix not seen in stream +CVE-2023-52492: Fix not seen in stream +CVE-2023-52493: Fix not seen in stream +CVE-2023-52494: Fix not seen in stream +CVE-2023-52497: Fix not seen in stream +CVE-2023-52498: Fix not seen in stream +CVE-2023-52499: Fix not seen in stream +CVE-2023-52500: Fix not seen in stream +CVE-2023-52501: Fix not seen in stream +CVE-2023-52502: Fix not seen in stream +CVE-2023-52503: Fix not seen in stream +CVE-2023-52504: Fix not seen in stream +CVE-2023-52506: Fix not seen in stream +CVE-2023-52507: Fix not seen in stream +CVE-2023-52508: Fix not seen in stream +CVE-2023-52509: Fix not seen in stream +CVE-2023-52510: Fix not seen in stream +CVE-2023-52511: Fix not seen in stream +CVE-2023-52513: Fix not seen in stream +CVE-2023-52515: Fix not seen in stream +CVE-2023-52516: Fix not seen in stream +CVE-2023-52517: Fix not seen in stream +CVE-2023-52518: Fix not seen in stream +CVE-2023-52519: Fix not seen in stream +CVE-2023-52520: Fix not seen in stream +CVE-2023-52522: Fix not seen in stream +CVE-2023-52523: Fix not seen in stream +CVE-2023-52527: Fix not seen in stream +CVE-2023-52528: Fix not seen in stream +CVE-2023-52529: Fix not seen in stream +CVE-2023-52530: Fix not seen in stream +CVE-2023-52531: Fix not seen in stream +CVE-2023-52532: Fix not seen in stream +CVE-2023-52559: Fix not seen in stream +CVE-2023-52560: Fix not seen in stream +CVE-2023-52561: Fix not seen in stream +CVE-2023-52563: Fix not seen in stream +CVE-2023-52565: Fix not seen in stream +CVE-2023-52566: Fix not seen in stream +CVE-2023-52568: Fix not seen in stream +CVE-2023-52569: Fix not seen in stream +CVE-2023-52571: Fix not seen in stream +CVE-2023-52572: Fix not seen in stream +CVE-2023-52573: Fix not seen in stream +CVE-2023-52574: Fix not seen in stream +CVE-2023-52576: Fix not seen in stream +CVE-2023-52578: Fix not seen in stream +CVE-2023-52580: Fix not seen in stream +CVE-2023-52582: Fix not seen in stream +CVE-2023-52583: Fix not seen in stream +CVE-2023-52584: Fix not seen in stream +CVE-2023-52585: Fix not seen in stream +CVE-2023-52586: Fix not seen in stream +CVE-2023-52587: Fix not seen in stream +CVE-2023-52588: Fix not seen in stream +CVE-2023-52589: Fix not seen in stream +CVE-2023-52590: Fix not seen in stream +CVE-2023-52591: Fix not seen in stream +CVE-2023-52593: Fix not seen in stream +CVE-2023-52594: Fix not seen in stream +CVE-2023-52595: Fix not seen in stream +CVE-2023-52596: Fix not seen in stream +CVE-2023-52597: Fix not seen in stream +CVE-2023-52598: Fix not seen in stream +CVE-2023-52599: Fix not seen in stream +CVE-2023-52600: Fix not seen in stream +CVE-2023-52601: Fix not seen in stream +CVE-2023-52602: Fix not seen in stream +CVE-2023-52603: Fix not seen in stream +CVE-2023-52604: Fix not seen in stream +CVE-2023-52606: Fix not seen in stream +CVE-2023-52607: Fix not seen in stream +CVE-2023-52608: Fix not seen in stream +CVE-2023-52609: Fix not seen in stream +CVE-2023-52610: Fix not seen in stream +CVE-2023-52612: Fix not seen in stream +CVE-2023-52614: Fix not seen in stream +CVE-2023-52615: Fix not seen in stream +CVE-2023-52616: Fix not seen in stream +CVE-2023-52617: Fix not seen in stream +CVE-2023-52618: Fix not seen in stream +CVE-2023-52619: Fix not seen in stream +CVE-2023-52620: Fix not seen in stream +CVE-2023-52621: Fix not seen in stream +CVE-2023-52622: Fix not seen in stream +CVE-2023-52623: Fix not seen in stream +CVE-2023-52624: Fix not seen in stream +CVE-2023-52625: Fix not seen in stream +CVE-2023-52627: Fix not seen in stream +CVE-2023-52628: Fix not seen in stream +CVE-2023-52629: Fix not seen in stream +CVE-2023-52630: Fix not seen in stream +CVE-2023-52631: Fix not seen in stream +CVE-2023-52632: Fix not seen in stream +CVE-2023-52633: Fix not seen in stream +CVE-2023-52634: Fix not seen in stream +CVE-2023-52635: Fix not seen in stream +CVE-2023-52637: Fix not seen in stream +CVE-2023-52638: Fix not seen in stream +CVE-2023-52639: Fix not seen in stream +CVE-2023-52640: Fix not seen in stream +CVE-2023-52641: Fix not seen in stream CVE-2023-5717: Fix not seen in stream CVE-2023-6039: Fix not seen in stream CVE-2023-6040: Fix not seen in stream CVE-2023-6121: Fix not seen in stream CVE-2023-6176: Fix not seen in stream CVE-2023-6240: Fix unknown -CVE-2023-6270: Fix unknown -CVE-2023-6356: Fix unknown +CVE-2023-6270: Fix not seen in stream +CVE-2023-6356: Fix not seen in stream CVE-2023-6535: Fix unknown -CVE-2023-6536: Fix unknown +CVE-2023-6536: Fix not seen in stream CVE-2023-6546: Fix not seen in stream CVE-2023-6560: Fix not seen in stream CVE-2023-6606: Fix not seen in stream @@ -597,7 +722,7 @@ CVE-2023-6817: Fix not seen in stream CVE-2023-6915: Fix not seen in stream CVE-2023-6931: Fix not seen in stream CVE-2023-6932: Fix not seen in stream -CVE-2023-7042: Fix unknown +CVE-2023-7042: Fix not seen in stream CVE-2023-7192: Fix not seen in stream CVE-2024-0340: Fix not seen in stream CVE-2024-0562: Fix not seen in stream @@ -609,17 +734,18 @@ CVE-2024-0639: Fix not seen in stream CVE-2024-0641: Fix not seen in stream CVE-2024-0646: Fix not seen in stream CVE-2024-0775: Fix not seen in stream -CVE-2024-0841: Fix unknown +CVE-2024-0841: Fix not seen in stream CVE-2024-1085: Fix not seen in stream CVE-2024-1086: Fix not seen in stream CVE-2024-1151: Fix not seen in stream CVE-2024-1312: Fix not seen in stream CVE-2024-21803: Fix unknown -CVE-2024-22099: Fix unknown +CVE-2024-2193: Fix unknown +CVE-2024-22099: Fix not seen in stream CVE-2024-22386: Fix unknown CVE-2024-22705: Fix not seen in stream -CVE-2024-23196: Fix unknown -CVE-2024-23307: Fix unknown +CVE-2024-23196: Fix not seen in stream +CVE-2024-23307: Fix not seen in stream CVE-2024-23848: Fix unknown CVE-2024-23849: Fix not seen in stream CVE-2024-23850: Fix not seen in stream @@ -629,7 +755,7 @@ CVE-2024-24857: Fix unknown CVE-2024-24858: Fix unknown CVE-2024-24859: Fix unknown CVE-2024-24860: Fix not seen in stream -CVE-2024-24861: Fix unknown +CVE-2024-24861: Fix not seen in stream CVE-2024-24864: Fix unknown CVE-2024-25739: Fix unknown CVE-2024-25740: Fix unknown @@ -639,8 +765,6 @@ CVE-2024-26583: Fix not seen in stream CVE-2024-26584: Fix not seen in stream CVE-2024-26585: Fix not seen in stream CVE-2024-26586: Fix not seen in stream -CVE-2024-26587: Fix not seen in stream -CVE-2024-26588: Fix not seen in stream CVE-2024-26589: Fix not seen in stream CVE-2024-26590: Fix not seen in stream CVE-2024-26591: Fix not seen in stream @@ -650,3 +774,134 @@ CVE-2024-26594: Fix not seen in stream CVE-2024-26595: Fix not seen in stream CVE-2024-26597: Fix not seen in stream CVE-2024-26598: Fix not seen in stream +CVE-2024-26600: Fix not seen in stream +CVE-2024-26601: Fix not seen in stream +CVE-2024-26602: Fix not seen in stream +CVE-2024-26603: Fix not seen in stream +CVE-2024-26606: Fix not seen in stream +CVE-2024-26607: Fix not seen in stream +CVE-2024-26608: Fix not seen in stream +CVE-2024-26610: Fix not seen in stream +CVE-2024-26614: Fix not seen in stream +CVE-2024-26615: Fix not seen in stream +CVE-2024-26622: Fix not seen in stream +CVE-2024-26623: Fix not seen in stream +CVE-2024-26625: Fix not seen in stream +CVE-2024-26627: Fix not seen in stream +CVE-2024-26631: Fix not seen in stream +CVE-2024-26633: Fix not seen in stream +CVE-2024-26635: Fix not seen in stream +CVE-2024-26636: Fix not seen in stream +CVE-2024-26640: Fix not seen in stream +CVE-2024-26641: Fix not seen in stream +CVE-2024-26642: Fix not seen in stream +CVE-2024-26644: Fix not seen in stream +CVE-2024-26645: Fix not seen in stream +CVE-2024-26646: Fix not seen in stream +CVE-2024-26647: Fix not seen in stream +CVE-2024-26648: Fix not seen in stream +CVE-2024-26650: Fix not seen in stream +CVE-2024-26651: Fix not seen in stream +CVE-2024-26654: Fix not seen in stream +CVE-2024-26655: Fix not seen in stream +CVE-2024-26656: Fix not seen in stream +CVE-2024-26658: Fix not seen in stream +CVE-2024-26659: Fix not seen in stream +CVE-2024-26660: Fix not seen in stream +CVE-2024-26661: Fix not seen in stream +CVE-2024-26662: Fix not seen in stream +CVE-2024-26663: Fix not seen in stream +CVE-2024-26664: Fix not seen in stream +CVE-2024-26665: Fix not seen in stream +CVE-2024-26668: Fix not seen in stream +CVE-2024-26669: Fix not seen in stream +CVE-2024-26671: Fix not seen in stream +CVE-2024-26672: Fix not seen in stream +CVE-2024-26673: Fix not seen in stream +CVE-2024-26675: Fix not seen in stream +CVE-2024-26676: Fix not seen in stream +CVE-2024-26677: Fix not seen in stream +CVE-2024-26679: Fix not seen in stream +CVE-2024-26680: Fix not seen in stream +CVE-2024-26684: Fix not seen in stream +CVE-2024-26685: Fix not seen in stream +CVE-2024-26686: Fix not seen in stream +CVE-2024-26687: Fix not seen in stream +CVE-2024-26688: Fix not seen in stream +CVE-2024-26689: Fix not seen in stream +CVE-2024-26691: Fix not seen in stream +CVE-2024-26696: Fix not seen in stream +CVE-2024-26697: Fix not seen in stream +CVE-2024-26698: Fix not seen in stream +CVE-2024-26699: Fix not seen in stream +CVE-2024-26700: Fix not seen in stream +CVE-2024-26702: Fix not seen in stream +CVE-2024-26704: Fix not seen in stream +CVE-2024-26706: Fix not seen in stream +CVE-2024-26707: Fix not seen in stream +CVE-2024-26712: Fix not seen in stream +CVE-2024-26713: Fix not seen in stream +CVE-2024-26714: Fix not seen in stream +CVE-2024-26715: Fix not seen in stream +CVE-2024-26717: Fix not seen in stream +CVE-2024-26718: Fix not seen in stream +CVE-2024-26719: Fix not seen in stream +CVE-2024-26720: Fix not seen in stream +CVE-2024-26726: Fix not seen in stream +CVE-2024-26727: Fix not seen in stream +CVE-2024-26733: Fix not seen in stream +CVE-2024-26735: Fix not seen in stream +CVE-2024-26736: Fix not seen in stream +CVE-2024-26737: Fix not seen in stream +CVE-2024-26738: Fix not seen in stream +CVE-2024-26739: Fix not seen in stream +CVE-2024-26740: Fix not seen in stream +CVE-2024-26743: Fix not seen in stream +CVE-2024-26744: Fix not seen in stream +CVE-2024-26745: Fix not seen in stream +CVE-2024-26747: Fix not seen in stream +CVE-2024-26748: Fix not seen in stream +CVE-2024-26749: Fix not seen in stream +CVE-2024-26751: Fix not seen in stream +CVE-2024-26752: Fix not seen in stream +CVE-2024-26754: Fix not seen in stream +CVE-2024-26756: Fix not seen in stream +CVE-2024-26757: Fix not seen in stream +CVE-2024-26758: Fix not seen in stream +CVE-2024-26759: Fix not seen in stream +CVE-2024-26763: Fix not seen in stream +CVE-2024-26764: Fix not seen in stream +CVE-2024-26765: Fix not seen in stream +CVE-2024-26766: Fix not seen in stream +CVE-2024-26767: Fix not seen in stream +CVE-2024-26768: Fix not seen in stream +CVE-2024-26769: Fix not seen in stream +CVE-2024-26770: Fix not seen in stream +CVE-2024-26771: Fix not seen in stream +CVE-2024-26772: Fix not seen in stream +CVE-2024-26773: Fix not seen in stream +CVE-2024-26774: Fix not seen in stream +CVE-2024-26775: Fix not seen in stream +CVE-2024-26776: Fix not seen in stream +CVE-2024-26777: Fix not seen in stream +CVE-2024-26778: Fix not seen in stream +CVE-2024-26779: Fix not seen in stream +CVE-2024-26782: Fix not seen in stream +CVE-2024-26784: Fix not seen in stream +CVE-2024-26787: Fix not seen in stream +CVE-2024-26788: Fix not seen in stream +CVE-2024-26789: Fix not seen in stream +CVE-2024-26790: Fix not seen in stream +CVE-2024-26791: Fix not seen in stream +CVE-2024-26793: Fix not seen in stream +CVE-2024-26795: Fix not seen in stream +CVE-2024-26797: Fix not seen in stream +CVE-2024-26798: Fix not seen in stream +CVE-2024-26801: Fix not seen in stream +CVE-2024-26802: Fix not seen in stream +CVE-2024-26803: Fix not seen in stream +CVE-2024-26804: Fix not seen in stream +CVE-2024-26805: Fix not seen in stream +CVE-2024-26806: Fix not seen in stream +CVE-2024-26808: Fix not seen in stream +CVE-2024-26809: Fix not seen in stream diff --git a/data/5.16/5.16_security.txt b/data/5.16/5.16_security.txt index a9a4befb4..bff481fcd 100644 --- a/data/5.16/5.16_security.txt +++ b/data/5.16/5.16_security.txt @@ -39,6 +39,7 @@ CVEs fixed in 5.16.9: CVE-2022-0435: 59ff7514f8c56f166aadca49bcecfa028e0ad50f tipc: improve size validations for received domain records CVE-2022-0487: 7f901d53f120d1921f84f7b9b118e87e94b403c5 moxart: fix potential use-after-free on remove path CVE-2022-0516: 8c68c50109c22502b647f4e86ec74400c7a3f6e0 KVM: s390: Return error on SIDA memop on normal guest + CVE-2022-48626: 7f901d53f120d1921f84f7b9b118e87e94b403c5 moxart: fix potential use-after-free on remove path CVEs fixed in 5.16.10: CVE-2022-25258: 8895017abfc76bbc223499b179919dd205047197 USB: gadget: validate interface OS descriptor requests @@ -89,6 +90,7 @@ CVEs fixed in 5.16.17: CVE-2022-20158: ef591b35176029fdefea38e8388ffa371e18f4b2 net/packet: fix slab-out-of-bounds access in packet_recvmsg() CVE-2022-20368: ef591b35176029fdefea38e8388ffa371e18f4b2 net/packet: fix slab-out-of-bounds access in packet_recvmsg() CVE-2022-3107: 411e256ddf6c2295439c74f2176b0ed630c148f3 hv_netvsc: Add check for kvmalloc_array + CVE-2022-48629: 485995cbc98a4f77cfd4f8ed4dd7ff8ab262964d crypto: qcom-rng - ensure buffer for generate is completely filled CVEs fixed in 5.16.18: CVE-2022-1015: 2c8ebdaa7c9755b85d90c07530210e83665bad9a netfilter: nf_tables: validate registers coming from userspace. @@ -157,6 +159,7 @@ Outstanding CVEs: CVE-2019-19378: (unk) CVE-2019-19814: (unk) CVE-2019-20794: (unk) + CVE-2019-25162: (unk) i2c: Fix a potential use after free CVE-2020-0347: (unk) CVE-2020-10708: (unk) CVE-2020-11725: (unk) @@ -378,6 +381,8 @@ Outstanding CVEs: CVE-2022-48425: (unk) fs/ntfs3: Validate MFT flags before replaying logs CVE-2022-48502: (unk) fs/ntfs3: Check fields while reading CVE-2022-48619: (unk) Input: add bounds checking to input_set_capability() + CVE-2022-48627: (unk) vt: fix memory overlapping when deleting chars in the buffer + CVE-2022-48628: (unk) ceph: drop messages from MDS when unmounting CVE-2023-0045: (unk) x86/bugs: Flush IBP in ib_prctl_set() CVE-2023-0160: (unk) bpf, sockmap: fix deadlocks in the sockhash and sockmap CVE-2023-0179: (unk) netfilter: nft_payload: incorrect arithmetics when fetching VLAN header bits @@ -465,6 +470,7 @@ Outstanding CVEs: CVE-2023-28328: (unk) media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer() CVE-2023-28466: (unk) net: tls: fix possible race condition between do_tls_getsockopt_conf() and do_tls_setsockopt_conf() CVE-2023-2860: (unk) ipv6: sr: fix out-of-bounds read when setting HMAC data. + CVE-2023-28746: (unk) x86/mmio: Disable KVM mitigation when X86_FEATURE_CLEAR_CPU_BUF is set CVE-2023-2898: (unk) f2fs: fix to avoid NULL pointer dereference f2fs_write_end_io() CVE-2023-2985: (unk) fs: hfsplus: fix UAF issue in hfsplus_put_super CVE-2023-3006: (unk) arm64: Add AMPERE1 to the Spectre-BHB affected list @@ -578,7 +584,7 @@ Outstanding CVEs: CVE-2023-46813: (unk) x86/sev: Check for user-space IOIO pointing to kernel space CVE-2023-46838: (unk) xen-netback: don't produce zero-size SKB frags CVE-2023-46862: (unk) io_uring/fdinfo: lock SQ thread while retrieving thread cpu/pid - CVE-2023-47233: (unk) + CVE-2023-47233: (unk) wifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach CVE-2023-4881: (unk) netfilter: nftables: exthdr: fix 4-byte stack OOB write CVE-2023-4921: (unk) net: sched: sch_qfq: Fix UAF in qfq_dequeue() CVE-2023-50431: (unk) accel/habanalabs: fix information leak in sec_attest_info() @@ -609,21 +615,140 @@ Outstanding CVEs: CVE-2023-52452: (unk) bpf: Fix accesses to uninit stack slots CVE-2023-52454: (unk) nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length CVE-2023-52456: (unk) serial: imx: fix tx statemachine deadlock - CVE-2023-52457: (unk) serial: 8250: omap: Don't skip resource freeing if pm_runtime_resume_and_get() failed CVE-2023-52458: (unk) block: add check that partition length needs to be aligned with block size CVE-2023-52462: (unk) bpf: fix check for attempt to corrupt spilled pointer CVE-2023-52463: (unk) efivarfs: force RO when remounting if SetVariable is not supported CVE-2023-52464: (unk) EDAC/thunderx: Fix possible out-of-bounds string access + CVE-2023-52467: (unk) mfd: syscon: Fix null pointer dereference in of_syscon_register() + CVE-2023-52469: (unk) drivers/amd/pm: fix a use-after-free in kv_parse_power_table + CVE-2023-52470: (unk) drm/radeon: check the alloc_workqueue return value in radeon_crtc_init() + CVE-2023-52474: (unk) IB/hfi1: Fix bugs with non-PAGE_SIZE-end multi-iovec user SDMA requests + CVE-2023-52475: (unk) Input: powermate - fix use-after-free in powermate_config_complete + CVE-2023-52476: (unk) perf/x86/lbr: Filter vsyscall addresses + CVE-2023-52477: (unk) usb: hub: Guard against accesses to uninitialized BOS descriptors + CVE-2023-52478: (unk) HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect + CVE-2023-52479: (unk) ksmbd: fix uaf in smb20_oplock_break_ack + CVE-2023-52480: (unk) ksmbd: fix race condition between session lookup and expire + CVE-2023-52481: (unk) arm64: errata: Add Cortex-A520 speculative unprivileged load workaround + CVE-2023-52482: (unk) x86/srso: Add SRSO mitigation for Hygon processors + CVE-2023-52483: (unk) mctp: perform route lookups under a RCU read-side lock + CVE-2023-52484: (unk) iommu/arm-smmu-v3: Fix soft lockup triggered by arm_smmu_mm_invalidate_range + CVE-2023-52485: (unk) drm/amd/display: Wake DMCUB before sending a command + CVE-2023-52486: (unk) drm: Don't unref the same fb many times by mistake due to deadlock handling + CVE-2023-52488: (unk) serial: sc16is7xx: convert from _raw_ to _noinc_ regmap functions for FIFO + CVE-2023-52489: (unk) mm/sparsemem: fix race in accessing memory_section->usage + CVE-2023-52491: (unk) media: mtk-jpeg: Fix use after free bug due to error path handling in mtk_jpeg_dec_device_run + CVE-2023-52492: (unk) dmaengine: fix NULL pointer in channel unregistration function + CVE-2023-52493: (unk) bus: mhi: host: Drop chan lock before queuing buffers + CVE-2023-52494: (unk) bus: mhi: host: Add alignment check for event ring read pointer + CVE-2023-52497: (unk) erofs: fix lz4 inplace decompression + CVE-2023-52498: (unk) PM: sleep: Fix possible deadlocks in core system-wide PM code + CVE-2023-52499: (unk) powerpc/47x: Fix 47x syscall return crash + CVE-2023-52500: (unk) scsi: pm80xx: Avoid leaking tags when processing OPC_INB_SET_CONTROLLER_CONFIG command + CVE-2023-52501: (unk) ring-buffer: Do not attempt to read past "commit" + CVE-2023-52502: (unk) net: nfc: fix races in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn() + CVE-2023-52503: (unk) tee: amdtee: fix use-after-free vulnerability in amdtee_close_session + CVE-2023-52504: (unk) x86/alternatives: Disable KASAN in apply_alternatives() + CVE-2023-52506: (unk) LoongArch: Set all reserved memblocks on Node#0 at initialization + CVE-2023-52507: (unk) nfc: nci: assert requested protocol is valid + CVE-2023-52508: (unk) nvme-fc: Prevent null pointer dereference in nvme_fc_io_getuuid() + CVE-2023-52509: (unk) ravb: Fix use-after-free issue in ravb_tx_timeout_work() + CVE-2023-52510: (unk) ieee802154: ca8210: Fix a potential UAF in ca8210_probe + CVE-2023-52511: (unk) spi: sun6i: reduce DMA RX transfer width to single byte + CVE-2023-52513: (unk) RDMA/siw: Fix connection failure handling + CVE-2023-52515: (unk) RDMA/srp: Do not call scsi_done() from srp_abort() + CVE-2023-52516: (unk) dma-debug: don't call __dma_entry_alloc_check_leak() under free_entries_lock + CVE-2023-52517: (unk) spi: sun6i: fix race between DMA RX transfer completion and RX FIFO drain + CVE-2023-52518: (unk) Bluetooth: hci_codec: Fix leaking content of local_codecs + CVE-2023-52519: (unk) HID: intel-ish-hid: ipc: Disable and reenable ACPI GPE bit + CVE-2023-52520: (unk) platform/x86: think-lmi: Fix reference leak + CVE-2023-52522: (unk) net: fix possible store tearing in neigh_periodic_work() + CVE-2023-52523: (unk) bpf, sockmap: Reject sk_msg egress redirects to non-TCP sockets + CVE-2023-52527: (unk) ipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data() + CVE-2023-52528: (unk) net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg + CVE-2023-52529: (unk) HID: sony: Fix a potential memory leak in sony_probe() + CVE-2023-52530: (unk) wifi: mac80211: fix potential key use-after-free + CVE-2023-52531: (unk) wifi: iwlwifi: mvm: Fix a memory corruption issue + CVE-2023-52532: (unk) net: mana: Fix TX CQE error handling + CVE-2023-52559: (unk) iommu/vt-d: Avoid memory allocation in iommu_suspend() + CVE-2023-52560: (unk) mm/damon/vaddr-test: fix memory leak in damon_do_test_apply_three_regions() + CVE-2023-52561: (unk) arm64: dts: qcom: sdm845-db845c: Mark cont splash memory region as reserved + CVE-2023-52563: (unk) drm/meson: fix memory leak on ->hpd_notify callback + CVE-2023-52565: (unk) media: uvcvideo: Fix OOB read + CVE-2023-52566: (unk) nilfs2: fix potential use after free in nilfs_gccache_submit_read_data() + CVE-2023-52568: (unk) x86/sgx: Resolves SECS reclaim vs. page fault for EAUG race + CVE-2023-52569: (unk) btrfs: remove BUG() after failure to insert delayed dir index item + CVE-2023-52571: (unk) power: supply: rk817: Fix node refcount leak + CVE-2023-52572: (unk) cifs: Fix UAF in cifs_demultiplex_thread() + CVE-2023-52573: (unk) net: rds: Fix possible NULL-pointer dereference + CVE-2023-52574: (unk) team: fix null-ptr-deref when team device type is changed + CVE-2023-52576: (unk) x86/mm, kexec, ima: Use memblock_free_late() from ima_free_kexec_buffer() + CVE-2023-52578: (unk) net: bridge: use DEV_STATS_INC() + CVE-2023-52580: (unk) net/core: Fix ETH_P_1588 flow dissector + CVE-2023-52582: (unk) netfs: Only call folio_start_fscache() one time for each folio + CVE-2023-52583: (unk) ceph: fix deadlock or deadcode of misusing dget() + CVE-2023-52584: (unk) spmi: mediatek: Fix UAF on device remove + CVE-2023-52585: (unk) drm/amdgpu: Fix possible NULL dereference in amdgpu_ras_query_error_status_helper() + CVE-2023-52586: (unk) drm/msm/dpu: Add mutex lock in control vblank irq + CVE-2023-52587: (unk) IB/ipoib: Fix mcast list locking + CVE-2023-52588: (unk) f2fs: fix to tag gcing flag on page during block migration + CVE-2023-52589: (unk) media: rkisp1: Fix IRQ disable race issue + CVE-2023-52590: (unk) ocfs2: Avoid touching renamed directory if parent does not change + CVE-2023-52591: (unk) reiserfs: Avoid touching renamed directory if parent does not change + CVE-2023-52593: (unk) wifi: wfx: fix possible NULL pointer dereference in wfx_set_mfp_ap() + CVE-2023-52594: (unk) wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus() + CVE-2023-52595: (unk) wifi: rt2x00: restart beacon queue when hardware reset + CVE-2023-52596: (unk) sysctl: Fix out of bounds access for empty sysctl registers + CVE-2023-52597: (unk) KVM: s390: fix setting of fpc register + CVE-2023-52598: (unk) s390/ptrace: handle setting of fpc register correctly + CVE-2023-52599: (unk) jfs: fix array-index-out-of-bounds in diNewExt + CVE-2023-52600: (unk) jfs: fix uaf in jfs_evict_inode + CVE-2023-52601: (unk) jfs: fix array-index-out-of-bounds in dbAdjTree + CVE-2023-52602: (unk) jfs: fix slab-out-of-bounds Read in dtSearch + CVE-2023-52603: (unk) UBSAN: array-index-out-of-bounds in dtSplitRoot + CVE-2023-52604: (unk) FS:JFS:UBSAN:array-index-out-of-bounds in dbAdjTree + CVE-2023-52606: (unk) powerpc/lib: Validate size for vector operations + CVE-2023-52607: (unk) powerpc/mm: Fix null-pointer dereference in pgtable_cache_add + CVE-2023-52608: (unk) firmware: arm_scmi: Check mailbox/SMT channel for consistency + CVE-2023-52609: (unk) binder: fix race between mmput() and do_exit() + CVE-2023-52610: (unk) net/sched: act_ct: fix skb leak and crash on ooo frags + CVE-2023-52612: (unk) crypto: scomp - fix req->dst buffer overflow + CVE-2023-52614: (unk) PM / devfreq: Fix buffer overflow in trans_stat_show + CVE-2023-52615: (unk) hwrng: core - Fix page fault dead lock on mmap-ed hwrng + CVE-2023-52616: (unk) crypto: lib/mpi - Fix unexpected pointer access in mpi_ec_init + CVE-2023-52617: (unk) PCI: switchtec: Fix stdev_release() crash after surprise hot remove + CVE-2023-52618: (unk) block/rnbd-srv: Check for unlikely string overflow + CVE-2023-52619: (unk) pstore/ram: Fix crash when setting number of cpus to an odd number + CVE-2023-52620: (unk) netfilter: nf_tables: disallow timeout for anonymous sets + CVE-2023-52621: (unk) bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers + CVE-2023-52622: (unk) ext4: avoid online resizing failures due to oversized flex bg + CVE-2023-52623: (unk) SUNRPC: Fix a suspicious RCU usage warning + CVE-2023-52624: (unk) drm/amd/display: Wake DMCUB before executing GPINT commands + CVE-2023-52625: (unk) drm/amd/display: Refactor DMCUB enter/exit idle interface + CVE-2023-52627: (unk) iio: adc: ad7091r: Allow users to configure device events + CVE-2023-52628: (unk) netfilter: nftables: exthdr: fix 4-byte stack OOB write + CVE-2023-52629: (unk) sh: push-switch: Reorder cleanup operations to avoid use-after-free bug + CVE-2023-52630: (unk) blk-iocost: Fix an UBSAN shift-out-of-bounds warning + CVE-2023-52631: (unk) fs/ntfs3: Fix an NULL dereference bug + CVE-2023-52632: (unk) drm/amdkfd: Fix lock dependency warning with srcu + CVE-2023-52633: (unk) um: time-travel: fix time corruption + CVE-2023-52634: (unk) drm/amd/display: Fix disable_otg_wa logic + CVE-2023-52635: (unk) PM / devfreq: Synchronize devfreq_monitor_[start/stop] + CVE-2023-52637: (unk) can: j1939: Fix UAF in j1939_sk_match_filter during setsockopt(SO_J1939_FILTER) + CVE-2023-52638: (unk) can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock + CVE-2023-52639: (unk) KVM: s390: vsie: fix race during shadow creation + CVE-2023-52640: (unk) fs/ntfs3: Fix oob in ntfs_listxattr + CVE-2023-52641: (unk) fs/ntfs3: Add NULL ptr dereference checking at the end of attr_allocate_frame() CVE-2023-5717: (unk) perf: Disallow mis-matched inherited group reads CVE-2023-6039: (unk) net: usb: lan78xx: reorder cleanup operations to avoid UAF bugs CVE-2023-6040: (unk) netfilter: nf_tables: Reject tables of unsupported family CVE-2023-6121: (unk) nvmet: nul-terminate the NQNs passed in the connect command CVE-2023-6176: (unk) net/tls: do not free tls_rec on async operation in bpf_exec_tx_verdict() CVE-2023-6240: (unk) - CVE-2023-6270: (unk) - CVE-2023-6356: (unk) + CVE-2023-6270: (unk) aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts + CVE-2023-6356: (unk) nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length CVE-2023-6535: (unk) - CVE-2023-6536: (unk) + CVE-2023-6536: (unk) nvmet-tcp: fix a crash in nvmet_req_complete() CVE-2023-6546: (unk) tty: n_gsm: fix the UAF caused by race condition in gsm_cleanup_mux CVE-2023-6560: (unk) io_uring: don't allow discontig pages for IORING_SETUP_NO_MMAP CVE-2023-6606: (unk) smb: client: fix OOB in smbCalcSize() @@ -633,7 +758,7 @@ Outstanding CVEs: CVE-2023-6915: (unk) ida: Fix crash in ida_free when the bitmap is empty CVE-2023-6931: (unk) perf: Fix perf_event_validate_size() CVE-2023-6932: (unk) ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet - CVE-2023-7042: (unk) + CVE-2023-7042: (unk) wifi: ath10k: fix NULL pointer dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev() CVE-2023-7192: (unk) netfilter: ctnetlink: fix possible refcount leak in ctnetlink_create_conntrack() CVE-2024-0340: (unk) vhost: use kzalloc() instead of kmalloc() followed by memset() CVE-2024-0562: (unk) writeback: avoid use-after-free after removing device @@ -645,17 +770,18 @@ Outstanding CVEs: CVE-2024-0641: (unk) tipc: fix a potential deadlock on &tx->lock CVE-2024-0646: (unk) net: tls, update curr on splice as well CVE-2024-0775: (unk) ext4: improve error recovery code paths in __ext4_remount() - CVE-2024-0841: (unk) + CVE-2024-0841: (unk) fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super CVE-2024-1085: (unk) netfilter: nf_tables: check if catch-all set element is active in next generation CVE-2024-1086: (unk) netfilter: nf_tables: reject QUEUE/DROP verdict parameters CVE-2024-1151: (unk) net: openvswitch: limit the number of recursions from action sets CVE-2024-1312: (unk) mm: lock_vma_under_rcu() must check vma->anon_vma under vma lock CVE-2024-21803: (unk) - CVE-2024-22099: (unk) + CVE-2024-2193: (unk) + CVE-2024-22099: (unk) Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security CVE-2024-22386: (unk) CVE-2024-22705: (unk) ksmbd: fix slab-out-of-bounds in smb_strndup_from_utf16() - CVE-2024-23196: (unk) - CVE-2024-23307: (unk) + CVE-2024-23196: (unk) ALSA: hda: fix a possible null-pointer dereference due to data race in snd_hdac_regmap_sync() + CVE-2024-23307: (unk) md/raid5: fix atomicity violation in raid5_cache_count CVE-2024-23848: (unk) CVE-2024-23849: (unk) net/rds: Fix UBSAN: array-index-out-of-bounds in rds_cmsg_recv CVE-2024-23850: (unk) btrfs: do not ASSERT() if the newly created subvolume already got read @@ -665,7 +791,7 @@ Outstanding CVEs: CVE-2024-24858: (unk) CVE-2024-24859: (unk) CVE-2024-24860: (unk) Bluetooth: Fix atomicity violation in {min,max}_key_size_set - CVE-2024-24861: (unk) + CVE-2024-24861: (unk) media: xc4000: Fix atomicity violation in xc4000_get_frequency CVE-2024-24864: (unk) CVE-2024-25739: (unk) CVE-2024-25740: (unk) @@ -675,8 +801,6 @@ Outstanding CVEs: CVE-2024-26584: (unk) net: tls: handle backlogging of crypto requests CVE-2024-26585: (unk) tls: fix race between tx work scheduling and socket close CVE-2024-26586: (unk) mlxsw: spectrum_acl_tcam: Fix stack corruption - CVE-2024-26587: (unk) net: netdevsim: don't try to destroy PHC on VFs - CVE-2024-26588: (unk) LoongArch: BPF: Prevent out-of-bounds memory access CVE-2024-26589: (unk) bpf: Reject variable offset alu on PTR_TO_FLOW_KEYS CVE-2024-26590: (unk) erofs: fix inconsistent per-file compression format CVE-2024-26591: (unk) bpf: Fix re-attachment branch in bpf_tracing_prog_attach @@ -686,3 +810,134 @@ Outstanding CVEs: CVE-2024-26595: (unk) mlxsw: spectrum_acl_tcam: Fix NULL pointer dereference in error path CVE-2024-26597: (unk) net: qualcomm: rmnet: fix global oob in rmnet_policy CVE-2024-26598: (unk) KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache + CVE-2024-26600: (unk) phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP + CVE-2024-26601: (unk) ext4: regenerate buddy after block freeing failed if under fc replay + CVE-2024-26602: (unk) sched/membarrier: reduce the ability to hammer on sys_membarrier + CVE-2024-26603: (unk) x86/fpu: Stop relying on userspace for info to fault in xsave buffer + CVE-2024-26606: (unk) binder: signal epoll threads of self-work + CVE-2024-26607: (unk) drm/bridge: sii902x: Fix probing race issue + CVE-2024-26608: (unk) ksmbd: fix global oob in ksmbd_nl_policy + CVE-2024-26610: (unk) wifi: iwlwifi: fix a memory corruption + CVE-2024-26614: (unk) tcp: make sure init the accept_queue's spinlocks once + CVE-2024-26615: (unk) net/smc: fix illegal rmb_desc access in SMC-D connection dump + CVE-2024-26622: (unk) tomoyo: fix UAF write bug in tomoyo_write_control() + CVE-2024-26623: (unk) pds_core: Prevent race issues involving the adminq + CVE-2024-26625: (unk) llc: call sock_orphan() at release time + CVE-2024-26627: (unk) scsi: core: Move scsi_host_busy() out of host lock for waking up EH handler + CVE-2024-26631: (unk) ipv6: mcast: fix data-race in ipv6_mc_down / mld_ifc_work + CVE-2024-26633: (unk) ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim() + CVE-2024-26635: (unk) llc: Drop support for ETH_P_TR_802_2. + CVE-2024-26636: (unk) llc: make llc_ui_sendmsg() more robust against bonding changes + CVE-2024-26640: (unk) tcp: add sanity checks to rx zerocopy + CVE-2024-26641: (unk) ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv() + CVE-2024-26642: (unk) netfilter: nf_tables: disallow anonymous set with timeout flag + CVE-2024-26644: (unk) btrfs: don't abort filesystem when attempting to snapshot deleted subvolume + CVE-2024-26645: (unk) tracing: Ensure visibility when inserting an element into tracing_map + CVE-2024-26646: (unk) thermal: intel: hfi: Add syscore callbacks for system-wide PM + CVE-2024-26647: (unk) drm/amd/display: Fix late derefrence 'dsc' check in 'link_set_dsc_pps_packet()' + CVE-2024-26648: (unk) drm/amd/display: Fix variable deferencing before NULL check in edp_setup_replay() + CVE-2024-26650: (unk) platform/x86: p2sb: Allow p2sb_bar() calls during PCI device probe + CVE-2024-26651: (unk) sr9800: Add check for usbnet_get_endpoints + CVE-2024-26654: (unk) ALSA: sh: aica: reorder cleanup operations to avoid UAF bugs + CVE-2024-26655: (unk) Fix memory leak in posix_clock_open() + CVE-2024-26656: (unk) drm/amdgpu: fix use-after-free bug + CVE-2024-26658: (unk) bcachefs: grab s_umount only if snapshotting + CVE-2024-26659: (unk) xhci: handle isoc Babble and Buffer Overrun events properly + CVE-2024-26660: (unk) drm/amd/display: Implement bounds check for stream encoder creation in DCN301 + CVE-2024-26661: (unk) drm/amd/display: Add NULL test for 'timing generator' in 'dcn21_set_pipe()' + CVE-2024-26662: (unk) drm/amd/display: Fix 'panel_cntl' could be null in 'dcn21_set_backlight_level()' + CVE-2024-26663: (unk) tipc: Check the bearer type before calling tipc_udp_nl_bearer_add() + CVE-2024-26664: (unk) hwmon: (coretemp) Fix out-of-bounds memory access + CVE-2024-26665: (unk) tunnels: fix out of bounds access when building IPv6 PMTU error + CVE-2024-26668: (unk) netfilter: nft_limit: reject configurations that cause integer overflow + CVE-2024-26669: (unk) net/sched: flower: Fix chain template offload + CVE-2024-26671: (unk) blk-mq: fix IO hang from sbitmap wakeup race + CVE-2024-26672: (unk) drm/amdgpu: Fix variable 'mca_funcs' dereferenced before NULL check in 'amdgpu_mca_smu_get_mca_entry()' + CVE-2024-26673: (unk) netfilter: nft_ct: sanitize layer 3 and 4 protocol number in custom expectations + CVE-2024-26675: (unk) ppp_async: limit MRU to 64K + CVE-2024-26676: (unk) af_unix: Call kfree_skb() for dead unix_(sk)->oob_skb in GC. + CVE-2024-26677: (unk) rxrpc: Fix delayed ACKs to not set the reference serial number + CVE-2024-26679: (unk) inet: read sk->sk_family once in inet_recv_error() + CVE-2024-26680: (unk) net: atlantic: Fix DMA mapping for PTP hwts ring + CVE-2024-26684: (unk) net: stmmac: xgmac: fix handling of DPP safety error for DMA channels + CVE-2024-26685: (unk) nilfs2: fix potential bug in end_buffer_async_write + CVE-2024-26686: (unk) fs/proc: do_task_stat: use sig->stats_lock to gather the threads/children stats + CVE-2024-26687: (unk) xen/events: close evtchn after mapping cleanup + CVE-2024-26688: (unk) fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super + CVE-2024-26689: (unk) ceph: prevent use-after-free in encode_cap_msg() + CVE-2024-26691: (unk) KVM: arm64: Fix circular locking dependency + CVE-2024-26696: (unk) nilfs2: fix hang in nilfs_lookup_dirty_data_buffers() + CVE-2024-26697: (unk) nilfs2: fix data corruption in dsync block recovery for small block sizes + CVE-2024-26698: (unk) hv_netvsc: Fix race condition between netvsc_probe and netvsc_remove + CVE-2024-26699: (unk) drm/amd/display: Fix array-index-out-of-bounds in dcn35_clkmgr + CVE-2024-26700: (unk) drm/amd/display: Fix MST Null Ptr for RV + CVE-2024-26702: (unk) iio: magnetometer: rm3100: add boundary check for the value read from RM3100_REG_TMRC + CVE-2024-26704: (unk) ext4: fix double-free of blocks due to wrong extents moved_len + CVE-2024-26706: (unk) parisc: Fix random data corruption from exception handler + CVE-2024-26707: (unk) net: hsr: remove WARN_ONCE() in send_hsr_supervision_frame() + CVE-2024-26712: (unk) powerpc/kasan: Fix addr error caused by page alignment + CVE-2024-26713: (unk) powerpc/pseries/iommu: Fix iommu initialisation during DLPAR add + CVE-2024-26714: (unk) interconnect: qcom: sc8180x: Mark CO0 BCM keepalive + CVE-2024-26715: (unk) usb: dwc3: gadget: Fix NULL pointer dereference in dwc3_gadget_suspend + CVE-2024-26717: (unk) HID: i2c-hid-of: fix NULL-deref on failed power up + CVE-2024-26718: (unk) dm-crypt, dm-verity: disable tasklets + CVE-2024-26719: (unk) nouveau: offload fence uevents work to workqueue + CVE-2024-26720: (unk) mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again + CVE-2024-26726: (unk) btrfs: don't drop extent_map for free space inode on write error + CVE-2024-26727: (unk) btrfs: do not ASSERT() if the newly created subvolume already got read + CVE-2024-26733: (unk) arp: Prevent overflow in arp_req_get(). + CVE-2024-26735: (unk) ipv6: sr: fix possible use-after-free and null-ptr-deref + CVE-2024-26736: (unk) afs: Increase buffer size in afs_update_volume_status() + CVE-2024-26737: (unk) bpf: Fix racing between bpf_timer_cancel_and_free and bpf_timer_cancel + CVE-2024-26738: (unk) powerpc/pseries/iommu: DLPAR add doesn't completely initialize pci_controller + CVE-2024-26739: (unk) net/sched: act_mirred: don't override retval if we already lost the skb + CVE-2024-26740: (unk) net/sched: act_mirred: use the backlog for mirred ingress + CVE-2024-26743: (unk) RDMA/qedr: Fix qedr_create_user_qp error flow + CVE-2024-26744: (unk) RDMA/srpt: Support specifying the srpt_service_guid parameter + CVE-2024-26745: (unk) powerpc/pseries/iommu: IOMMU table is not initialized for kdump over SR-IOV + CVE-2024-26747: (unk) usb: roles: fix NULL pointer issue when put module's reference + CVE-2024-26748: (unk) usb: cdns3: fix memory double free when handle zero packet + CVE-2024-26749: (unk) usb: cdns3: fixed memory use after free at cdns3_gadget_ep_disable() + CVE-2024-26751: (unk) ARM: ep93xx: Add terminator to gpiod_lookup_table + CVE-2024-26752: (unk) l2tp: pass correct message length to ip6_append_data + CVE-2024-26754: (unk) gtp: fix use-after-free and null-ptr-deref in gtp_genl_dump_pdp() + CVE-2024-26756: (unk) md: Don't register sync_thread for reshape directly + CVE-2024-26757: (unk) md: Don't ignore read-only array in md_check_recovery() + CVE-2024-26758: (unk) md: Don't ignore suspended array in md_check_recovery() + CVE-2024-26759: (unk) mm/swap: fix race when skipping swapcache + CVE-2024-26763: (unk) dm-crypt: don't modify the data when using authenticated encryption + CVE-2024-26764: (unk) fs/aio: Restrict kiocb_set_cancel_fn() to I/O submitted via libaio + CVE-2024-26765: (unk) LoongArch: Disable IRQ before init_fn() for nonboot CPUs + CVE-2024-26766: (unk) IB/hfi1: Fix sdma.h tx->num_descs off-by-one error + CVE-2024-26767: (unk) drm/amd/display: fixed integer types and null check locations + CVE-2024-26768: (unk) LoongArch: Change acpi_core_pic[NR_CPUS] to acpi_core_pic[MAX_CORE_PIC] + CVE-2024-26769: (unk) nvmet-fc: avoid deadlock on delete association path + CVE-2024-26770: (unk) HID: nvidia-shield: Add missing null pointer checks to LED initialization + CVE-2024-26771: (unk) dmaengine: ti: edma: Add some null pointer checks to the edma_probe + CVE-2024-26772: (unk) ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal() + CVE-2024-26773: (unk) ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found() + CVE-2024-26774: (unk) ext4: avoid dividing by 0 in mb_update_avg_fragment_size() when block bitmap corrupt + CVE-2024-26775: (unk) aoe: avoid potential deadlock at set_capacity + CVE-2024-26776: (unk) spi: hisi-sfc-v3xx: Return IRQ_NONE if no interrupts were detected + CVE-2024-26777: (unk) fbdev: sis: Error out if pixclock equals zero + CVE-2024-26778: (unk) fbdev: savage: Error out if pixclock equals zero + CVE-2024-26779: (unk) wifi: mac80211: fix race condition on enabling fast-xmit + CVE-2024-26782: (unk) mptcp: fix double-free on socket dismantle + CVE-2024-26784: (unk) pmdomain: arm: Fix NULL dereference on scmi_perf_domain removal + CVE-2024-26787: (unk) mmc: mmci: stm32: fix DMA API overlapping mappings warning + CVE-2024-26788: (unk) dmaengine: fsl-qdma: init irq after reg initialization + CVE-2024-26789: (unk) crypto: arm64/neonbs - fix out-of-bounds access on short input + CVE-2024-26790: (unk) dmaengine: fsl-qdma: fix SoC may hang on 16 byte unaligned read + CVE-2024-26791: (unk) btrfs: dev-replace: properly validate device names + CVE-2024-26793: (unk) gtp: fix use-after-free and null-ptr-deref in gtp_newlink() + CVE-2024-26795: (unk) riscv: Sparse-Memory/vmemmap out-of-bounds fix + CVE-2024-26797: (unk) drm/amd/display: Prevent potential buffer overflow in map_hw_resources + CVE-2024-26798: (unk) fbcon: always restore the old font data in fbcon_do_set_font() + CVE-2024-26801: (unk) Bluetooth: Avoid potential use-after-free in hci_error_reset + CVE-2024-26802: (unk) stmmac: Clear variable when destroying workqueue + CVE-2024-26803: (unk) net: veth: clear GRO when clearing XDP even when down + CVE-2024-26804: (unk) net: ip_tunnel: prevent perpetual headroom growth + CVE-2024-26805: (unk) netlink: Fix kernel-infoleak-after-free in __skb_datagram_iter + CVE-2024-26806: (unk) spi: cadence-qspi: remove system-wide suspend helper calls from runtime PM hooks + CVE-2024-26808: (unk) netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain + CVE-2024-26809: (unk) netfilter: nft_set_pipapo: release elements in clone only from destroy path diff --git a/data/5.17/5.17_CVEs.txt b/data/5.17/5.17_CVEs.txt index 82c345627..be1e70356 100644 --- a/data/5.17/5.17_CVEs.txt +++ b/data/5.17/5.17_CVEs.txt @@ -26,6 +26,7 @@ CVE-2019-16089: Fix unknown CVE-2019-19378: Fix unknown CVE-2019-19814: Fix unknown CVE-2019-20794: Fix unknown +CVE-2019-25162: Fix not seen in stream CVE-2020-0347: Fix unknown CVE-2020-10708: Fix unknown CVE-2020-11725: Fix unknown @@ -278,6 +279,10 @@ CVE-2022-48424: Fix not seen in stream CVE-2022-48425: Fix not seen in stream CVE-2022-48502: Fix not seen in stream CVE-2022-48619: Fixed with 5.17.10 +CVE-2022-48627: Fix not seen in stream +CVE-2022-48628: Fix not seen in stream +CVE-2022-48629: Fixed with 5.17 +CVE-2022-48630: Fixed with 5.17.10 CVE-2023-0045: Fix not seen in stream CVE-2023-0160: Fix not seen in stream CVE-2023-0179: Fix not seen in stream @@ -371,6 +376,7 @@ CVE-2023-28328: Fix not seen in stream CVE-2023-28410: Fixed with 5.17.2 CVE-2023-28466: Fix not seen in stream CVE-2023-2860: Fix not seen in stream +CVE-2023-28746: Fix not seen in stream CVE-2023-28866: Fix not seen in stream CVE-2023-2898: Fix not seen in stream CVE-2023-2985: Fix not seen in stream @@ -488,7 +494,7 @@ CVE-2023-46343: Fix not seen in stream CVE-2023-46813: Fix not seen in stream CVE-2023-46838: Fix not seen in stream CVE-2023-46862: Fix not seen in stream -CVE-2023-47233: Fix unknown +CVE-2023-47233: Fix not seen in stream CVE-2023-4881: Fix not seen in stream CVE-2023-4921: Fix not seen in stream CVE-2023-50431: Fix not seen in stream @@ -520,21 +526,140 @@ CVE-2023-52451: Fix not seen in stream CVE-2023-52452: Fix not seen in stream CVE-2023-52454: Fix not seen in stream CVE-2023-52456: Fix not seen in stream -CVE-2023-52457: Fix not seen in stream CVE-2023-52458: Fix not seen in stream CVE-2023-52462: Fix not seen in stream CVE-2023-52463: Fix not seen in stream CVE-2023-52464: Fix not seen in stream +CVE-2023-52467: Fix not seen in stream +CVE-2023-52469: Fix not seen in stream +CVE-2023-52470: Fix not seen in stream +CVE-2023-52474: Fix not seen in stream +CVE-2023-52475: Fix not seen in stream +CVE-2023-52476: Fix not seen in stream +CVE-2023-52477: Fix not seen in stream +CVE-2023-52478: Fix not seen in stream +CVE-2023-52479: Fix not seen in stream +CVE-2023-52480: Fix not seen in stream +CVE-2023-52481: Fix not seen in stream +CVE-2023-52482: Fix not seen in stream +CVE-2023-52483: Fix not seen in stream +CVE-2023-52484: Fix not seen in stream +CVE-2023-52485: Fix not seen in stream +CVE-2023-52486: Fix not seen in stream +CVE-2023-52488: Fix not seen in stream +CVE-2023-52489: Fix not seen in stream +CVE-2023-52491: Fix not seen in stream +CVE-2023-52492: Fix not seen in stream +CVE-2023-52493: Fix not seen in stream +CVE-2023-52494: Fix not seen in stream +CVE-2023-52497: Fix not seen in stream +CVE-2023-52498: Fix not seen in stream +CVE-2023-52499: Fix not seen in stream +CVE-2023-52500: Fix not seen in stream +CVE-2023-52501: Fix not seen in stream +CVE-2023-52502: Fix not seen in stream +CVE-2023-52503: Fix not seen in stream +CVE-2023-52504: Fix not seen in stream +CVE-2023-52506: Fix not seen in stream +CVE-2023-52507: Fix not seen in stream +CVE-2023-52508: Fix not seen in stream +CVE-2023-52509: Fix not seen in stream +CVE-2023-52510: Fix not seen in stream +CVE-2023-52511: Fix not seen in stream +CVE-2023-52513: Fix not seen in stream +CVE-2023-52515: Fix not seen in stream +CVE-2023-52516: Fix not seen in stream +CVE-2023-52517: Fix not seen in stream +CVE-2023-52518: Fix not seen in stream +CVE-2023-52519: Fix not seen in stream +CVE-2023-52520: Fix not seen in stream +CVE-2023-52522: Fix not seen in stream +CVE-2023-52523: Fix not seen in stream +CVE-2023-52527: Fix not seen in stream +CVE-2023-52528: Fix not seen in stream +CVE-2023-52529: Fix not seen in stream +CVE-2023-52530: Fix not seen in stream +CVE-2023-52531: Fix not seen in stream +CVE-2023-52532: Fix not seen in stream +CVE-2023-52559: Fix not seen in stream +CVE-2023-52560: Fix not seen in stream +CVE-2023-52561: Fix not seen in stream +CVE-2023-52563: Fix not seen in stream +CVE-2023-52565: Fix not seen in stream +CVE-2023-52566: Fix not seen in stream +CVE-2023-52568: Fix not seen in stream +CVE-2023-52569: Fix not seen in stream +CVE-2023-52571: Fix not seen in stream +CVE-2023-52572: Fix not seen in stream +CVE-2023-52573: Fix not seen in stream +CVE-2023-52574: Fix not seen in stream +CVE-2023-52576: Fix not seen in stream +CVE-2023-52578: Fix not seen in stream +CVE-2023-52580: Fix not seen in stream +CVE-2023-52582: Fix not seen in stream +CVE-2023-52583: Fix not seen in stream +CVE-2023-52584: Fix not seen in stream +CVE-2023-52585: Fix not seen in stream +CVE-2023-52586: Fix not seen in stream +CVE-2023-52587: Fix not seen in stream +CVE-2023-52588: Fix not seen in stream +CVE-2023-52589: Fix not seen in stream +CVE-2023-52590: Fix not seen in stream +CVE-2023-52591: Fix not seen in stream +CVE-2023-52593: Fix not seen in stream +CVE-2023-52594: Fix not seen in stream +CVE-2023-52595: Fix not seen in stream +CVE-2023-52596: Fix not seen in stream +CVE-2023-52597: Fix not seen in stream +CVE-2023-52598: Fix not seen in stream +CVE-2023-52599: Fix not seen in stream +CVE-2023-52600: Fix not seen in stream +CVE-2023-52601: Fix not seen in stream +CVE-2023-52602: Fix not seen in stream +CVE-2023-52603: Fix not seen in stream +CVE-2023-52604: Fix not seen in stream +CVE-2023-52606: Fix not seen in stream +CVE-2023-52607: Fix not seen in stream +CVE-2023-52608: Fix not seen in stream +CVE-2023-52609: Fix not seen in stream +CVE-2023-52610: Fix not seen in stream +CVE-2023-52612: Fix not seen in stream +CVE-2023-52614: Fix not seen in stream +CVE-2023-52615: Fix not seen in stream +CVE-2023-52616: Fix not seen in stream +CVE-2023-52617: Fix not seen in stream +CVE-2023-52618: Fix not seen in stream +CVE-2023-52619: Fix not seen in stream +CVE-2023-52620: Fix not seen in stream +CVE-2023-52621: Fix not seen in stream +CVE-2023-52622: Fix not seen in stream +CVE-2023-52623: Fix not seen in stream +CVE-2023-52624: Fix not seen in stream +CVE-2023-52625: Fix not seen in stream +CVE-2023-52627: Fix not seen in stream +CVE-2023-52628: Fix not seen in stream +CVE-2023-52629: Fix not seen in stream +CVE-2023-52630: Fix not seen in stream +CVE-2023-52631: Fix not seen in stream +CVE-2023-52632: Fix not seen in stream +CVE-2023-52633: Fix not seen in stream +CVE-2023-52634: Fix not seen in stream +CVE-2023-52635: Fix not seen in stream +CVE-2023-52637: Fix not seen in stream +CVE-2023-52638: Fix not seen in stream +CVE-2023-52639: Fix not seen in stream +CVE-2023-52640: Fix not seen in stream +CVE-2023-52641: Fix not seen in stream CVE-2023-5717: Fix not seen in stream CVE-2023-6039: Fix not seen in stream CVE-2023-6040: Fix not seen in stream CVE-2023-6121: Fix not seen in stream CVE-2023-6176: Fix not seen in stream CVE-2023-6240: Fix unknown -CVE-2023-6270: Fix unknown -CVE-2023-6356: Fix unknown +CVE-2023-6270: Fix not seen in stream +CVE-2023-6356: Fix not seen in stream CVE-2023-6535: Fix unknown -CVE-2023-6536: Fix unknown +CVE-2023-6536: Fix not seen in stream CVE-2023-6546: Fix not seen in stream CVE-2023-6560: Fix not seen in stream CVE-2023-6606: Fix not seen in stream @@ -544,7 +669,7 @@ CVE-2023-6817: Fix not seen in stream CVE-2023-6915: Fix not seen in stream CVE-2023-6931: Fix not seen in stream CVE-2023-6932: Fix not seen in stream -CVE-2023-7042: Fix unknown +CVE-2023-7042: Fix not seen in stream CVE-2023-7192: Fix not seen in stream CVE-2024-0340: Fix not seen in stream CVE-2024-0562: Fix not seen in stream @@ -556,17 +681,18 @@ CVE-2024-0639: Fix not seen in stream CVE-2024-0641: Fix not seen in stream CVE-2024-0646: Fix not seen in stream CVE-2024-0775: Fix not seen in stream -CVE-2024-0841: Fix unknown +CVE-2024-0841: Fix not seen in stream CVE-2024-1085: Fix not seen in stream CVE-2024-1086: Fix not seen in stream CVE-2024-1151: Fix not seen in stream CVE-2024-1312: Fix not seen in stream CVE-2024-21803: Fix unknown -CVE-2024-22099: Fix unknown +CVE-2024-2193: Fix unknown +CVE-2024-22099: Fix not seen in stream CVE-2024-22386: Fix unknown CVE-2024-22705: Fix not seen in stream -CVE-2024-23196: Fix unknown -CVE-2024-23307: Fix unknown +CVE-2024-23196: Fix not seen in stream +CVE-2024-23307: Fix not seen in stream CVE-2024-23848: Fix unknown CVE-2024-23849: Fix not seen in stream CVE-2024-23850: Fix not seen in stream @@ -576,7 +702,7 @@ CVE-2024-24857: Fix unknown CVE-2024-24858: Fix unknown CVE-2024-24859: Fix unknown CVE-2024-24860: Fix not seen in stream -CVE-2024-24861: Fix unknown +CVE-2024-24861: Fix not seen in stream CVE-2024-24864: Fix unknown CVE-2024-25739: Fix unknown CVE-2024-25740: Fix unknown @@ -586,8 +712,6 @@ CVE-2024-26583: Fix not seen in stream CVE-2024-26584: Fix not seen in stream CVE-2024-26585: Fix not seen in stream CVE-2024-26586: Fix not seen in stream -CVE-2024-26587: Fix not seen in stream -CVE-2024-26588: Fix not seen in stream CVE-2024-26589: Fix not seen in stream CVE-2024-26590: Fix not seen in stream CVE-2024-26591: Fix not seen in stream @@ -598,3 +722,136 @@ CVE-2024-26595: Fix not seen in stream CVE-2024-26597: Fix not seen in stream CVE-2024-26598: Fix not seen in stream CVE-2024-26599: Fix not seen in stream +CVE-2024-26600: Fix not seen in stream +CVE-2024-26601: Fix not seen in stream +CVE-2024-26602: Fix not seen in stream +CVE-2024-26603: Fix not seen in stream +CVE-2024-26606: Fix not seen in stream +CVE-2024-26607: Fix not seen in stream +CVE-2024-26608: Fix not seen in stream +CVE-2024-26610: Fix not seen in stream +CVE-2024-26612: Fix not seen in stream +CVE-2024-26614: Fix not seen in stream +CVE-2024-26615: Fix not seen in stream +CVE-2024-26622: Fix not seen in stream +CVE-2024-26623: Fix not seen in stream +CVE-2024-26625: Fix not seen in stream +CVE-2024-26627: Fix not seen in stream +CVE-2024-26631: Fix not seen in stream +CVE-2024-26632: Fix not seen in stream +CVE-2024-26633: Fix not seen in stream +CVE-2024-26635: Fix not seen in stream +CVE-2024-26636: Fix not seen in stream +CVE-2024-26640: Fix not seen in stream +CVE-2024-26641: Fix not seen in stream +CVE-2024-26642: Fix not seen in stream +CVE-2024-26644: Fix not seen in stream +CVE-2024-26645: Fix not seen in stream +CVE-2024-26646: Fix not seen in stream +CVE-2024-26647: Fix not seen in stream +CVE-2024-26648: Fix not seen in stream +CVE-2024-26650: Fix not seen in stream +CVE-2024-26651: Fix not seen in stream +CVE-2024-26654: Fix not seen in stream +CVE-2024-26655: Fix not seen in stream +CVE-2024-26656: Fix not seen in stream +CVE-2024-26658: Fix not seen in stream +CVE-2024-26659: Fix not seen in stream +CVE-2024-26660: Fix not seen in stream +CVE-2024-26661: Fix not seen in stream +CVE-2024-26662: Fix not seen in stream +CVE-2024-26663: Fix not seen in stream +CVE-2024-26664: Fix not seen in stream +CVE-2024-26665: Fix not seen in stream +CVE-2024-26668: Fix not seen in stream +CVE-2024-26669: Fix not seen in stream +CVE-2024-26671: Fix not seen in stream +CVE-2024-26672: Fix not seen in stream +CVE-2024-26673: Fix not seen in stream +CVE-2024-26675: Fix not seen in stream +CVE-2024-26676: Fix not seen in stream +CVE-2024-26677: Fix not seen in stream +CVE-2024-26679: Fix not seen in stream +CVE-2024-26680: Fix not seen in stream +CVE-2024-26684: Fix not seen in stream +CVE-2024-26685: Fix not seen in stream +CVE-2024-26686: Fix not seen in stream +CVE-2024-26687: Fix not seen in stream +CVE-2024-26688: Fix not seen in stream +CVE-2024-26689: Fix not seen in stream +CVE-2024-26691: Fix not seen in stream +CVE-2024-26696: Fix not seen in stream +CVE-2024-26697: Fix not seen in stream +CVE-2024-26698: Fix not seen in stream +CVE-2024-26699: Fix not seen in stream +CVE-2024-26700: Fix not seen in stream +CVE-2024-26702: Fix not seen in stream +CVE-2024-26704: Fix not seen in stream +CVE-2024-26706: Fix not seen in stream +CVE-2024-26707: Fix not seen in stream +CVE-2024-26712: Fix not seen in stream +CVE-2024-26713: Fix not seen in stream +CVE-2024-26714: Fix not seen in stream +CVE-2024-26715: Fix not seen in stream +CVE-2024-26717: Fix not seen in stream +CVE-2024-26718: Fix not seen in stream +CVE-2024-26719: Fix not seen in stream +CVE-2024-26720: Fix not seen in stream +CVE-2024-26726: Fix not seen in stream +CVE-2024-26727: Fix not seen in stream +CVE-2024-26733: Fix not seen in stream +CVE-2024-26735: Fix not seen in stream +CVE-2024-26736: Fix not seen in stream +CVE-2024-26737: Fix not seen in stream +CVE-2024-26738: Fix not seen in stream +CVE-2024-26739: Fix not seen in stream +CVE-2024-26740: Fix not seen in stream +CVE-2024-26743: Fix not seen in stream +CVE-2024-26744: Fix not seen in stream +CVE-2024-26745: Fix not seen in stream +CVE-2024-26747: Fix not seen in stream +CVE-2024-26748: Fix not seen in stream +CVE-2024-26749: Fix not seen in stream +CVE-2024-26751: Fix not seen in stream +CVE-2024-26752: Fix not seen in stream +CVE-2024-26754: Fix not seen in stream +CVE-2024-26756: Fix not seen in stream +CVE-2024-26757: Fix not seen in stream +CVE-2024-26758: Fix not seen in stream +CVE-2024-26759: Fix not seen in stream +CVE-2024-26763: Fix not seen in stream +CVE-2024-26764: Fix not seen in stream +CVE-2024-26765: Fix not seen in stream +CVE-2024-26766: Fix not seen in stream +CVE-2024-26767: Fix not seen in stream +CVE-2024-26768: Fix not seen in stream +CVE-2024-26769: Fix not seen in stream +CVE-2024-26770: Fix not seen in stream +CVE-2024-26771: Fix not seen in stream +CVE-2024-26772: Fix not seen in stream +CVE-2024-26773: Fix not seen in stream +CVE-2024-26774: Fix not seen in stream +CVE-2024-26775: Fix not seen in stream +CVE-2024-26776: Fix not seen in stream +CVE-2024-26777: Fix not seen in stream +CVE-2024-26778: Fix not seen in stream +CVE-2024-26779: Fix not seen in stream +CVE-2024-26782: Fix not seen in stream +CVE-2024-26784: Fix not seen in stream +CVE-2024-26787: Fix not seen in stream +CVE-2024-26788: Fix not seen in stream +CVE-2024-26789: Fix not seen in stream +CVE-2024-26790: Fix not seen in stream +CVE-2024-26791: Fix not seen in stream +CVE-2024-26793: Fix not seen in stream +CVE-2024-26795: Fix not seen in stream +CVE-2024-26797: Fix not seen in stream +CVE-2024-26798: Fix not seen in stream +CVE-2024-26801: Fix not seen in stream +CVE-2024-26802: Fix not seen in stream +CVE-2024-26803: Fix not seen in stream +CVE-2024-26804: Fix not seen in stream +CVE-2024-26805: Fix not seen in stream +CVE-2024-26806: Fix not seen in stream +CVE-2024-26808: Fix not seen in stream +CVE-2024-26809: Fix not seen in stream diff --git a/data/5.17/5.17_security.txt b/data/5.17/5.17_security.txt index e0a9dfcd0..ffd40cdf9 100644 --- a/data/5.17/5.17_security.txt +++ b/data/5.17/5.17_security.txt @@ -5,6 +5,7 @@ CVEs fixed in 5.17: CVE-2022-20368: c700525fcc06b05adfea78039de02628af79e07a net/packet: fix slab-out-of-bounds access in packet_recvmsg() CVE-2022-20423: 65f3324f4b6fed78b8761c3b74615ecf0ffa81fa usb: gadget: rndis: prevent integer overflow in rndis_set_response() CVE-2022-3107: 886e44c9298a6b428ae046e2fa092ca52e822e6a hv_netvsc: Add check for kvmalloc_array + CVE-2022-48629: a680b1832ced3b5fa7c93484248fd221ea0d614b crypto: qcom-rng - ensure buffer for generate is completely filled CVEs fixed in 5.17.1: CVE-2022-1015: afdc3f4b81f0ec9f97f0910476af4620a2481a6d netfilter: nf_tables: validate registers coming from userspace. @@ -80,6 +81,7 @@ CVEs fixed in 5.17.10: CVE-2022-1729: 22fb2974224c9836eeaf0d24fdd481fcdaa0aea8 perf: Fix sys_perf_event_open() race against self CVE-2022-21499: 281d356a035132f2603724ee0f04767d70e2e98e lockdown: also lock down previous kgdb use CVE-2022-48619: 93cf9a32d6c21325761503dcaae3c58ae55cc018 Input: add bounds checking to input_set_capability() + CVE-2022-48630: 05d4d17475d8d094c519bb51658bc47899c175e3 crypto: qcom-rng - fix infinite loop on requests not multiple of WORD_SZ CVE-2023-1838: d759015c9bcaa87d2ebf41c7bab561f7033c3e80 Fix double fget() in vhost_net_set_backend() CVE-2023-4387: 54f87f3478097fe5b7e473738b787a24cbc2061e net: vmxnet3: fix possible use-after-free bugs in vmxnet3_rq_alloc_rx_buf() CVE-2023-4459: 8d20af6cdd1639c1e14346d4cb1d7b1d19fee34b net: vmxnet3: fix possible NULL pointer dereference in vmxnet3_rq_cleanup() @@ -142,6 +144,7 @@ Outstanding CVEs: CVE-2019-19378: (unk) CVE-2019-19814: (unk) CVE-2019-20794: (unk) + CVE-2019-25162: (unk) i2c: Fix a potential use after free CVE-2020-0347: (unk) CVE-2020-10708: (unk) CVE-2020-11725: (unk) @@ -323,6 +326,8 @@ Outstanding CVEs: CVE-2022-48424: (unk) fs/ntfs3: Validate attribute name offset CVE-2022-48425: (unk) fs/ntfs3: Validate MFT flags before replaying logs CVE-2022-48502: (unk) fs/ntfs3: Check fields while reading + CVE-2022-48627: (unk) vt: fix memory overlapping when deleting chars in the buffer + CVE-2022-48628: (unk) ceph: drop messages from MDS when unmounting CVE-2023-0045: (unk) x86/bugs: Flush IBP in ib_prctl_set() CVE-2023-0160: (unk) bpf, sockmap: fix deadlocks in the sockhash and sockmap CVE-2023-0179: (unk) netfilter: nft_payload: incorrect arithmetics when fetching VLAN header bits @@ -409,6 +414,7 @@ Outstanding CVEs: CVE-2023-28328: (unk) media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer() CVE-2023-28466: (unk) net: tls: fix possible race condition between do_tls_getsockopt_conf() and do_tls_setsockopt_conf() CVE-2023-2860: (unk) ipv6: sr: fix out-of-bounds read when setting HMAC data. + CVE-2023-28746: (unk) x86/mmio: Disable KVM mitigation when X86_FEATURE_CLEAR_CPU_BUF is set CVE-2023-28866: (unk) Bluetooth: HCI: Fix global-out-of-bounds CVE-2023-2898: (unk) f2fs: fix to avoid NULL pointer dereference f2fs_write_end_io() CVE-2023-2985: (unk) fs: hfsplus: fix UAF issue in hfsplus_put_super @@ -520,7 +526,7 @@ Outstanding CVEs: CVE-2023-46813: (unk) x86/sev: Check for user-space IOIO pointing to kernel space CVE-2023-46838: (unk) xen-netback: don't produce zero-size SKB frags CVE-2023-46862: (unk) io_uring/fdinfo: lock SQ thread while retrieving thread cpu/pid - CVE-2023-47233: (unk) + CVE-2023-47233: (unk) wifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach CVE-2023-4881: (unk) netfilter: nftables: exthdr: fix 4-byte stack OOB write CVE-2023-4921: (unk) net: sched: sch_qfq: Fix UAF in qfq_dequeue() CVE-2023-50431: (unk) accel/habanalabs: fix information leak in sec_attest_info() @@ -552,21 +558,140 @@ Outstanding CVEs: CVE-2023-52452: (unk) bpf: Fix accesses to uninit stack slots CVE-2023-52454: (unk) nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length CVE-2023-52456: (unk) serial: imx: fix tx statemachine deadlock - CVE-2023-52457: (unk) serial: 8250: omap: Don't skip resource freeing if pm_runtime_resume_and_get() failed CVE-2023-52458: (unk) block: add check that partition length needs to be aligned with block size CVE-2023-52462: (unk) bpf: fix check for attempt to corrupt spilled pointer CVE-2023-52463: (unk) efivarfs: force RO when remounting if SetVariable is not supported CVE-2023-52464: (unk) EDAC/thunderx: Fix possible out-of-bounds string access + CVE-2023-52467: (unk) mfd: syscon: Fix null pointer dereference in of_syscon_register() + CVE-2023-52469: (unk) drivers/amd/pm: fix a use-after-free in kv_parse_power_table + CVE-2023-52470: (unk) drm/radeon: check the alloc_workqueue return value in radeon_crtc_init() + CVE-2023-52474: (unk) IB/hfi1: Fix bugs with non-PAGE_SIZE-end multi-iovec user SDMA requests + CVE-2023-52475: (unk) Input: powermate - fix use-after-free in powermate_config_complete + CVE-2023-52476: (unk) perf/x86/lbr: Filter vsyscall addresses + CVE-2023-52477: (unk) usb: hub: Guard against accesses to uninitialized BOS descriptors + CVE-2023-52478: (unk) HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect + CVE-2023-52479: (unk) ksmbd: fix uaf in smb20_oplock_break_ack + CVE-2023-52480: (unk) ksmbd: fix race condition between session lookup and expire + CVE-2023-52481: (unk) arm64: errata: Add Cortex-A520 speculative unprivileged load workaround + CVE-2023-52482: (unk) x86/srso: Add SRSO mitigation for Hygon processors + CVE-2023-52483: (unk) mctp: perform route lookups under a RCU read-side lock + CVE-2023-52484: (unk) iommu/arm-smmu-v3: Fix soft lockup triggered by arm_smmu_mm_invalidate_range + CVE-2023-52485: (unk) drm/amd/display: Wake DMCUB before sending a command + CVE-2023-52486: (unk) drm: Don't unref the same fb many times by mistake due to deadlock handling + CVE-2023-52488: (unk) serial: sc16is7xx: convert from _raw_ to _noinc_ regmap functions for FIFO + CVE-2023-52489: (unk) mm/sparsemem: fix race in accessing memory_section->usage + CVE-2023-52491: (unk) media: mtk-jpeg: Fix use after free bug due to error path handling in mtk_jpeg_dec_device_run + CVE-2023-52492: (unk) dmaengine: fix NULL pointer in channel unregistration function + CVE-2023-52493: (unk) bus: mhi: host: Drop chan lock before queuing buffers + CVE-2023-52494: (unk) bus: mhi: host: Add alignment check for event ring read pointer + CVE-2023-52497: (unk) erofs: fix lz4 inplace decompression + CVE-2023-52498: (unk) PM: sleep: Fix possible deadlocks in core system-wide PM code + CVE-2023-52499: (unk) powerpc/47x: Fix 47x syscall return crash + CVE-2023-52500: (unk) scsi: pm80xx: Avoid leaking tags when processing OPC_INB_SET_CONTROLLER_CONFIG command + CVE-2023-52501: (unk) ring-buffer: Do not attempt to read past "commit" + CVE-2023-52502: (unk) net: nfc: fix races in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn() + CVE-2023-52503: (unk) tee: amdtee: fix use-after-free vulnerability in amdtee_close_session + CVE-2023-52504: (unk) x86/alternatives: Disable KASAN in apply_alternatives() + CVE-2023-52506: (unk) LoongArch: Set all reserved memblocks on Node#0 at initialization + CVE-2023-52507: (unk) nfc: nci: assert requested protocol is valid + CVE-2023-52508: (unk) nvme-fc: Prevent null pointer dereference in nvme_fc_io_getuuid() + CVE-2023-52509: (unk) ravb: Fix use-after-free issue in ravb_tx_timeout_work() + CVE-2023-52510: (unk) ieee802154: ca8210: Fix a potential UAF in ca8210_probe + CVE-2023-52511: (unk) spi: sun6i: reduce DMA RX transfer width to single byte + CVE-2023-52513: (unk) RDMA/siw: Fix connection failure handling + CVE-2023-52515: (unk) RDMA/srp: Do not call scsi_done() from srp_abort() + CVE-2023-52516: (unk) dma-debug: don't call __dma_entry_alloc_check_leak() under free_entries_lock + CVE-2023-52517: (unk) spi: sun6i: fix race between DMA RX transfer completion and RX FIFO drain + CVE-2023-52518: (unk) Bluetooth: hci_codec: Fix leaking content of local_codecs + CVE-2023-52519: (unk) HID: intel-ish-hid: ipc: Disable and reenable ACPI GPE bit + CVE-2023-52520: (unk) platform/x86: think-lmi: Fix reference leak + CVE-2023-52522: (unk) net: fix possible store tearing in neigh_periodic_work() + CVE-2023-52523: (unk) bpf, sockmap: Reject sk_msg egress redirects to non-TCP sockets + CVE-2023-52527: (unk) ipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data() + CVE-2023-52528: (unk) net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg + CVE-2023-52529: (unk) HID: sony: Fix a potential memory leak in sony_probe() + CVE-2023-52530: (unk) wifi: mac80211: fix potential key use-after-free + CVE-2023-52531: (unk) wifi: iwlwifi: mvm: Fix a memory corruption issue + CVE-2023-52532: (unk) net: mana: Fix TX CQE error handling + CVE-2023-52559: (unk) iommu/vt-d: Avoid memory allocation in iommu_suspend() + CVE-2023-52560: (unk) mm/damon/vaddr-test: fix memory leak in damon_do_test_apply_three_regions() + CVE-2023-52561: (unk) arm64: dts: qcom: sdm845-db845c: Mark cont splash memory region as reserved + CVE-2023-52563: (unk) drm/meson: fix memory leak on ->hpd_notify callback + CVE-2023-52565: (unk) media: uvcvideo: Fix OOB read + CVE-2023-52566: (unk) nilfs2: fix potential use after free in nilfs_gccache_submit_read_data() + CVE-2023-52568: (unk) x86/sgx: Resolves SECS reclaim vs. page fault for EAUG race + CVE-2023-52569: (unk) btrfs: remove BUG() after failure to insert delayed dir index item + CVE-2023-52571: (unk) power: supply: rk817: Fix node refcount leak + CVE-2023-52572: (unk) cifs: Fix UAF in cifs_demultiplex_thread() + CVE-2023-52573: (unk) net: rds: Fix possible NULL-pointer dereference + CVE-2023-52574: (unk) team: fix null-ptr-deref when team device type is changed + CVE-2023-52576: (unk) x86/mm, kexec, ima: Use memblock_free_late() from ima_free_kexec_buffer() + CVE-2023-52578: (unk) net: bridge: use DEV_STATS_INC() + CVE-2023-52580: (unk) net/core: Fix ETH_P_1588 flow dissector + CVE-2023-52582: (unk) netfs: Only call folio_start_fscache() one time for each folio + CVE-2023-52583: (unk) ceph: fix deadlock or deadcode of misusing dget() + CVE-2023-52584: (unk) spmi: mediatek: Fix UAF on device remove + CVE-2023-52585: (unk) drm/amdgpu: Fix possible NULL dereference in amdgpu_ras_query_error_status_helper() + CVE-2023-52586: (unk) drm/msm/dpu: Add mutex lock in control vblank irq + CVE-2023-52587: (unk) IB/ipoib: Fix mcast list locking + CVE-2023-52588: (unk) f2fs: fix to tag gcing flag on page during block migration + CVE-2023-52589: (unk) media: rkisp1: Fix IRQ disable race issue + CVE-2023-52590: (unk) ocfs2: Avoid touching renamed directory if parent does not change + CVE-2023-52591: (unk) reiserfs: Avoid touching renamed directory if parent does not change + CVE-2023-52593: (unk) wifi: wfx: fix possible NULL pointer dereference in wfx_set_mfp_ap() + CVE-2023-52594: (unk) wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus() + CVE-2023-52595: (unk) wifi: rt2x00: restart beacon queue when hardware reset + CVE-2023-52596: (unk) sysctl: Fix out of bounds access for empty sysctl registers + CVE-2023-52597: (unk) KVM: s390: fix setting of fpc register + CVE-2023-52598: (unk) s390/ptrace: handle setting of fpc register correctly + CVE-2023-52599: (unk) jfs: fix array-index-out-of-bounds in diNewExt + CVE-2023-52600: (unk) jfs: fix uaf in jfs_evict_inode + CVE-2023-52601: (unk) jfs: fix array-index-out-of-bounds in dbAdjTree + CVE-2023-52602: (unk) jfs: fix slab-out-of-bounds Read in dtSearch + CVE-2023-52603: (unk) UBSAN: array-index-out-of-bounds in dtSplitRoot + CVE-2023-52604: (unk) FS:JFS:UBSAN:array-index-out-of-bounds in dbAdjTree + CVE-2023-52606: (unk) powerpc/lib: Validate size for vector operations + CVE-2023-52607: (unk) powerpc/mm: Fix null-pointer dereference in pgtable_cache_add + CVE-2023-52608: (unk) firmware: arm_scmi: Check mailbox/SMT channel for consistency + CVE-2023-52609: (unk) binder: fix race between mmput() and do_exit() + CVE-2023-52610: (unk) net/sched: act_ct: fix skb leak and crash on ooo frags + CVE-2023-52612: (unk) crypto: scomp - fix req->dst buffer overflow + CVE-2023-52614: (unk) PM / devfreq: Fix buffer overflow in trans_stat_show + CVE-2023-52615: (unk) hwrng: core - Fix page fault dead lock on mmap-ed hwrng + CVE-2023-52616: (unk) crypto: lib/mpi - Fix unexpected pointer access in mpi_ec_init + CVE-2023-52617: (unk) PCI: switchtec: Fix stdev_release() crash after surprise hot remove + CVE-2023-52618: (unk) block/rnbd-srv: Check for unlikely string overflow + CVE-2023-52619: (unk) pstore/ram: Fix crash when setting number of cpus to an odd number + CVE-2023-52620: (unk) netfilter: nf_tables: disallow timeout for anonymous sets + CVE-2023-52621: (unk) bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers + CVE-2023-52622: (unk) ext4: avoid online resizing failures due to oversized flex bg + CVE-2023-52623: (unk) SUNRPC: Fix a suspicious RCU usage warning + CVE-2023-52624: (unk) drm/amd/display: Wake DMCUB before executing GPINT commands + CVE-2023-52625: (unk) drm/amd/display: Refactor DMCUB enter/exit idle interface + CVE-2023-52627: (unk) iio: adc: ad7091r: Allow users to configure device events + CVE-2023-52628: (unk) netfilter: nftables: exthdr: fix 4-byte stack OOB write + CVE-2023-52629: (unk) sh: push-switch: Reorder cleanup operations to avoid use-after-free bug + CVE-2023-52630: (unk) blk-iocost: Fix an UBSAN shift-out-of-bounds warning + CVE-2023-52631: (unk) fs/ntfs3: Fix an NULL dereference bug + CVE-2023-52632: (unk) drm/amdkfd: Fix lock dependency warning with srcu + CVE-2023-52633: (unk) um: time-travel: fix time corruption + CVE-2023-52634: (unk) drm/amd/display: Fix disable_otg_wa logic + CVE-2023-52635: (unk) PM / devfreq: Synchronize devfreq_monitor_[start/stop] + CVE-2023-52637: (unk) can: j1939: Fix UAF in j1939_sk_match_filter during setsockopt(SO_J1939_FILTER) + CVE-2023-52638: (unk) can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock + CVE-2023-52639: (unk) KVM: s390: vsie: fix race during shadow creation + CVE-2023-52640: (unk) fs/ntfs3: Fix oob in ntfs_listxattr + CVE-2023-52641: (unk) fs/ntfs3: Add NULL ptr dereference checking at the end of attr_allocate_frame() CVE-2023-5717: (unk) perf: Disallow mis-matched inherited group reads CVE-2023-6039: (unk) net: usb: lan78xx: reorder cleanup operations to avoid UAF bugs CVE-2023-6040: (unk) netfilter: nf_tables: Reject tables of unsupported family CVE-2023-6121: (unk) nvmet: nul-terminate the NQNs passed in the connect command CVE-2023-6176: (unk) net/tls: do not free tls_rec on async operation in bpf_exec_tx_verdict() CVE-2023-6240: (unk) - CVE-2023-6270: (unk) - CVE-2023-6356: (unk) + CVE-2023-6270: (unk) aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts + CVE-2023-6356: (unk) nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length CVE-2023-6535: (unk) - CVE-2023-6536: (unk) + CVE-2023-6536: (unk) nvmet-tcp: fix a crash in nvmet_req_complete() CVE-2023-6546: (unk) tty: n_gsm: fix the UAF caused by race condition in gsm_cleanup_mux CVE-2023-6560: (unk) io_uring: don't allow discontig pages for IORING_SETUP_NO_MMAP CVE-2023-6606: (unk) smb: client: fix OOB in smbCalcSize() @@ -576,7 +701,7 @@ Outstanding CVEs: CVE-2023-6915: (unk) ida: Fix crash in ida_free when the bitmap is empty CVE-2023-6931: (unk) perf: Fix perf_event_validate_size() CVE-2023-6932: (unk) ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet - CVE-2023-7042: (unk) + CVE-2023-7042: (unk) wifi: ath10k: fix NULL pointer dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev() CVE-2023-7192: (unk) netfilter: ctnetlink: fix possible refcount leak in ctnetlink_create_conntrack() CVE-2024-0340: (unk) vhost: use kzalloc() instead of kmalloc() followed by memset() CVE-2024-0562: (unk) writeback: avoid use-after-free after removing device @@ -588,17 +713,18 @@ Outstanding CVEs: CVE-2024-0641: (unk) tipc: fix a potential deadlock on &tx->lock CVE-2024-0646: (unk) net: tls, update curr on splice as well CVE-2024-0775: (unk) ext4: improve error recovery code paths in __ext4_remount() - CVE-2024-0841: (unk) + CVE-2024-0841: (unk) fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super CVE-2024-1085: (unk) netfilter: nf_tables: check if catch-all set element is active in next generation CVE-2024-1086: (unk) netfilter: nf_tables: reject QUEUE/DROP verdict parameters CVE-2024-1151: (unk) net: openvswitch: limit the number of recursions from action sets CVE-2024-1312: (unk) mm: lock_vma_under_rcu() must check vma->anon_vma under vma lock CVE-2024-21803: (unk) - CVE-2024-22099: (unk) + CVE-2024-2193: (unk) + CVE-2024-22099: (unk) Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security CVE-2024-22386: (unk) CVE-2024-22705: (unk) ksmbd: fix slab-out-of-bounds in smb_strndup_from_utf16() - CVE-2024-23196: (unk) - CVE-2024-23307: (unk) + CVE-2024-23196: (unk) ALSA: hda: fix a possible null-pointer dereference due to data race in snd_hdac_regmap_sync() + CVE-2024-23307: (unk) md/raid5: fix atomicity violation in raid5_cache_count CVE-2024-23848: (unk) CVE-2024-23849: (unk) net/rds: Fix UBSAN: array-index-out-of-bounds in rds_cmsg_recv CVE-2024-23850: (unk) btrfs: do not ASSERT() if the newly created subvolume already got read @@ -608,7 +734,7 @@ Outstanding CVEs: CVE-2024-24858: (unk) CVE-2024-24859: (unk) CVE-2024-24860: (unk) Bluetooth: Fix atomicity violation in {min,max}_key_size_set - CVE-2024-24861: (unk) + CVE-2024-24861: (unk) media: xc4000: Fix atomicity violation in xc4000_get_frequency CVE-2024-24864: (unk) CVE-2024-25739: (unk) CVE-2024-25740: (unk) @@ -618,8 +744,6 @@ Outstanding CVEs: CVE-2024-26584: (unk) net: tls: handle backlogging of crypto requests CVE-2024-26585: (unk) tls: fix race between tx work scheduling and socket close CVE-2024-26586: (unk) mlxsw: spectrum_acl_tcam: Fix stack corruption - CVE-2024-26587: (unk) net: netdevsim: don't try to destroy PHC on VFs - CVE-2024-26588: (unk) LoongArch: BPF: Prevent out-of-bounds memory access CVE-2024-26589: (unk) bpf: Reject variable offset alu on PTR_TO_FLOW_KEYS CVE-2024-26590: (unk) erofs: fix inconsistent per-file compression format CVE-2024-26591: (unk) bpf: Fix re-attachment branch in bpf_tracing_prog_attach @@ -630,3 +754,136 @@ Outstanding CVEs: CVE-2024-26597: (unk) net: qualcomm: rmnet: fix global oob in rmnet_policy CVE-2024-26598: (unk) KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache CVE-2024-26599: (unk) pwm: Fix out-of-bounds access in of_pwm_single_xlate() + CVE-2024-26600: (unk) phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP + CVE-2024-26601: (unk) ext4: regenerate buddy after block freeing failed if under fc replay + CVE-2024-26602: (unk) sched/membarrier: reduce the ability to hammer on sys_membarrier + CVE-2024-26603: (unk) x86/fpu: Stop relying on userspace for info to fault in xsave buffer + CVE-2024-26606: (unk) binder: signal epoll threads of self-work + CVE-2024-26607: (unk) drm/bridge: sii902x: Fix probing race issue + CVE-2024-26608: (unk) ksmbd: fix global oob in ksmbd_nl_policy + CVE-2024-26610: (unk) wifi: iwlwifi: fix a memory corruption + CVE-2024-26612: (unk) netfs, fscache: Prevent Oops in fscache_put_cache() + CVE-2024-26614: (unk) tcp: make sure init the accept_queue's spinlocks once + CVE-2024-26615: (unk) net/smc: fix illegal rmb_desc access in SMC-D connection dump + CVE-2024-26622: (unk) tomoyo: fix UAF write bug in tomoyo_write_control() + CVE-2024-26623: (unk) pds_core: Prevent race issues involving the adminq + CVE-2024-26625: (unk) llc: call sock_orphan() at release time + CVE-2024-26627: (unk) scsi: core: Move scsi_host_busy() out of host lock for waking up EH handler + CVE-2024-26631: (unk) ipv6: mcast: fix data-race in ipv6_mc_down / mld_ifc_work + CVE-2024-26632: (unk) block: Fix iterating over an empty bio with bio_for_each_folio_all + CVE-2024-26633: (unk) ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim() + CVE-2024-26635: (unk) llc: Drop support for ETH_P_TR_802_2. + CVE-2024-26636: (unk) llc: make llc_ui_sendmsg() more robust against bonding changes + CVE-2024-26640: (unk) tcp: add sanity checks to rx zerocopy + CVE-2024-26641: (unk) ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv() + CVE-2024-26642: (unk) netfilter: nf_tables: disallow anonymous set with timeout flag + CVE-2024-26644: (unk) btrfs: don't abort filesystem when attempting to snapshot deleted subvolume + CVE-2024-26645: (unk) tracing: Ensure visibility when inserting an element into tracing_map + CVE-2024-26646: (unk) thermal: intel: hfi: Add syscore callbacks for system-wide PM + CVE-2024-26647: (unk) drm/amd/display: Fix late derefrence 'dsc' check in 'link_set_dsc_pps_packet()' + CVE-2024-26648: (unk) drm/amd/display: Fix variable deferencing before NULL check in edp_setup_replay() + CVE-2024-26650: (unk) platform/x86: p2sb: Allow p2sb_bar() calls during PCI device probe + CVE-2024-26651: (unk) sr9800: Add check for usbnet_get_endpoints + CVE-2024-26654: (unk) ALSA: sh: aica: reorder cleanup operations to avoid UAF bugs + CVE-2024-26655: (unk) Fix memory leak in posix_clock_open() + CVE-2024-26656: (unk) drm/amdgpu: fix use-after-free bug + CVE-2024-26658: (unk) bcachefs: grab s_umount only if snapshotting + CVE-2024-26659: (unk) xhci: handle isoc Babble and Buffer Overrun events properly + CVE-2024-26660: (unk) drm/amd/display: Implement bounds check for stream encoder creation in DCN301 + CVE-2024-26661: (unk) drm/amd/display: Add NULL test for 'timing generator' in 'dcn21_set_pipe()' + CVE-2024-26662: (unk) drm/amd/display: Fix 'panel_cntl' could be null in 'dcn21_set_backlight_level()' + CVE-2024-26663: (unk) tipc: Check the bearer type before calling tipc_udp_nl_bearer_add() + CVE-2024-26664: (unk) hwmon: (coretemp) Fix out-of-bounds memory access + CVE-2024-26665: (unk) tunnels: fix out of bounds access when building IPv6 PMTU error + CVE-2024-26668: (unk) netfilter: nft_limit: reject configurations that cause integer overflow + CVE-2024-26669: (unk) net/sched: flower: Fix chain template offload + CVE-2024-26671: (unk) blk-mq: fix IO hang from sbitmap wakeup race + CVE-2024-26672: (unk) drm/amdgpu: Fix variable 'mca_funcs' dereferenced before NULL check in 'amdgpu_mca_smu_get_mca_entry()' + CVE-2024-26673: (unk) netfilter: nft_ct: sanitize layer 3 and 4 protocol number in custom expectations + CVE-2024-26675: (unk) ppp_async: limit MRU to 64K + CVE-2024-26676: (unk) af_unix: Call kfree_skb() for dead unix_(sk)->oob_skb in GC. + CVE-2024-26677: (unk) rxrpc: Fix delayed ACKs to not set the reference serial number + CVE-2024-26679: (unk) inet: read sk->sk_family once in inet_recv_error() + CVE-2024-26680: (unk) net: atlantic: Fix DMA mapping for PTP hwts ring + CVE-2024-26684: (unk) net: stmmac: xgmac: fix handling of DPP safety error for DMA channels + CVE-2024-26685: (unk) nilfs2: fix potential bug in end_buffer_async_write + CVE-2024-26686: (unk) fs/proc: do_task_stat: use sig->stats_lock to gather the threads/children stats + CVE-2024-26687: (unk) xen/events: close evtchn after mapping cleanup + CVE-2024-26688: (unk) fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super + CVE-2024-26689: (unk) ceph: prevent use-after-free in encode_cap_msg() + CVE-2024-26691: (unk) KVM: arm64: Fix circular locking dependency + CVE-2024-26696: (unk) nilfs2: fix hang in nilfs_lookup_dirty_data_buffers() + CVE-2024-26697: (unk) nilfs2: fix data corruption in dsync block recovery for small block sizes + CVE-2024-26698: (unk) hv_netvsc: Fix race condition between netvsc_probe and netvsc_remove + CVE-2024-26699: (unk) drm/amd/display: Fix array-index-out-of-bounds in dcn35_clkmgr + CVE-2024-26700: (unk) drm/amd/display: Fix MST Null Ptr for RV + CVE-2024-26702: (unk) iio: magnetometer: rm3100: add boundary check for the value read from RM3100_REG_TMRC + CVE-2024-26704: (unk) ext4: fix double-free of blocks due to wrong extents moved_len + CVE-2024-26706: (unk) parisc: Fix random data corruption from exception handler + CVE-2024-26707: (unk) net: hsr: remove WARN_ONCE() in send_hsr_supervision_frame() + CVE-2024-26712: (unk) powerpc/kasan: Fix addr error caused by page alignment + CVE-2024-26713: (unk) powerpc/pseries/iommu: Fix iommu initialisation during DLPAR add + CVE-2024-26714: (unk) interconnect: qcom: sc8180x: Mark CO0 BCM keepalive + CVE-2024-26715: (unk) usb: dwc3: gadget: Fix NULL pointer dereference in dwc3_gadget_suspend + CVE-2024-26717: (unk) HID: i2c-hid-of: fix NULL-deref on failed power up + CVE-2024-26718: (unk) dm-crypt, dm-verity: disable tasklets + CVE-2024-26719: (unk) nouveau: offload fence uevents work to workqueue + CVE-2024-26720: (unk) mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again + CVE-2024-26726: (unk) btrfs: don't drop extent_map for free space inode on write error + CVE-2024-26727: (unk) btrfs: do not ASSERT() if the newly created subvolume already got read + CVE-2024-26733: (unk) arp: Prevent overflow in arp_req_get(). + CVE-2024-26735: (unk) ipv6: sr: fix possible use-after-free and null-ptr-deref + CVE-2024-26736: (unk) afs: Increase buffer size in afs_update_volume_status() + CVE-2024-26737: (unk) bpf: Fix racing between bpf_timer_cancel_and_free and bpf_timer_cancel + CVE-2024-26738: (unk) powerpc/pseries/iommu: DLPAR add doesn't completely initialize pci_controller + CVE-2024-26739: (unk) net/sched: act_mirred: don't override retval if we already lost the skb + CVE-2024-26740: (unk) net/sched: act_mirred: use the backlog for mirred ingress + CVE-2024-26743: (unk) RDMA/qedr: Fix qedr_create_user_qp error flow + CVE-2024-26744: (unk) RDMA/srpt: Support specifying the srpt_service_guid parameter + CVE-2024-26745: (unk) powerpc/pseries/iommu: IOMMU table is not initialized for kdump over SR-IOV + CVE-2024-26747: (unk) usb: roles: fix NULL pointer issue when put module's reference + CVE-2024-26748: (unk) usb: cdns3: fix memory double free when handle zero packet + CVE-2024-26749: (unk) usb: cdns3: fixed memory use after free at cdns3_gadget_ep_disable() + CVE-2024-26751: (unk) ARM: ep93xx: Add terminator to gpiod_lookup_table + CVE-2024-26752: (unk) l2tp: pass correct message length to ip6_append_data + CVE-2024-26754: (unk) gtp: fix use-after-free and null-ptr-deref in gtp_genl_dump_pdp() + CVE-2024-26756: (unk) md: Don't register sync_thread for reshape directly + CVE-2024-26757: (unk) md: Don't ignore read-only array in md_check_recovery() + CVE-2024-26758: (unk) md: Don't ignore suspended array in md_check_recovery() + CVE-2024-26759: (unk) mm/swap: fix race when skipping swapcache + CVE-2024-26763: (unk) dm-crypt: don't modify the data when using authenticated encryption + CVE-2024-26764: (unk) fs/aio: Restrict kiocb_set_cancel_fn() to I/O submitted via libaio + CVE-2024-26765: (unk) LoongArch: Disable IRQ before init_fn() for nonboot CPUs + CVE-2024-26766: (unk) IB/hfi1: Fix sdma.h tx->num_descs off-by-one error + CVE-2024-26767: (unk) drm/amd/display: fixed integer types and null check locations + CVE-2024-26768: (unk) LoongArch: Change acpi_core_pic[NR_CPUS] to acpi_core_pic[MAX_CORE_PIC] + CVE-2024-26769: (unk) nvmet-fc: avoid deadlock on delete association path + CVE-2024-26770: (unk) HID: nvidia-shield: Add missing null pointer checks to LED initialization + CVE-2024-26771: (unk) dmaengine: ti: edma: Add some null pointer checks to the edma_probe + CVE-2024-26772: (unk) ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal() + CVE-2024-26773: (unk) ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found() + CVE-2024-26774: (unk) ext4: avoid dividing by 0 in mb_update_avg_fragment_size() when block bitmap corrupt + CVE-2024-26775: (unk) aoe: avoid potential deadlock at set_capacity + CVE-2024-26776: (unk) spi: hisi-sfc-v3xx: Return IRQ_NONE if no interrupts were detected + CVE-2024-26777: (unk) fbdev: sis: Error out if pixclock equals zero + CVE-2024-26778: (unk) fbdev: savage: Error out if pixclock equals zero + CVE-2024-26779: (unk) wifi: mac80211: fix race condition on enabling fast-xmit + CVE-2024-26782: (unk) mptcp: fix double-free on socket dismantle + CVE-2024-26784: (unk) pmdomain: arm: Fix NULL dereference on scmi_perf_domain removal + CVE-2024-26787: (unk) mmc: mmci: stm32: fix DMA API overlapping mappings warning + CVE-2024-26788: (unk) dmaengine: fsl-qdma: init irq after reg initialization + CVE-2024-26789: (unk) crypto: arm64/neonbs - fix out-of-bounds access on short input + CVE-2024-26790: (unk) dmaengine: fsl-qdma: fix SoC may hang on 16 byte unaligned read + CVE-2024-26791: (unk) btrfs: dev-replace: properly validate device names + CVE-2024-26793: (unk) gtp: fix use-after-free and null-ptr-deref in gtp_newlink() + CVE-2024-26795: (unk) riscv: Sparse-Memory/vmemmap out-of-bounds fix + CVE-2024-26797: (unk) drm/amd/display: Prevent potential buffer overflow in map_hw_resources + CVE-2024-26798: (unk) fbcon: always restore the old font data in fbcon_do_set_font() + CVE-2024-26801: (unk) Bluetooth: Avoid potential use-after-free in hci_error_reset + CVE-2024-26802: (unk) stmmac: Clear variable when destroying workqueue + CVE-2024-26803: (unk) net: veth: clear GRO when clearing XDP even when down + CVE-2024-26804: (unk) net: ip_tunnel: prevent perpetual headroom growth + CVE-2024-26805: (unk) netlink: Fix kernel-infoleak-after-free in __skb_datagram_iter + CVE-2024-26806: (unk) spi: cadence-qspi: remove system-wide suspend helper calls from runtime PM hooks + CVE-2024-26808: (unk) netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain + CVE-2024-26809: (unk) netfilter: nft_set_pipapo: release elements in clone only from destroy path diff --git a/data/5.18/5.18_CVEs.txt b/data/5.18/5.18_CVEs.txt index 3198f968f..5e6af888d 100644 --- a/data/5.18/5.18_CVEs.txt +++ b/data/5.18/5.18_CVEs.txt @@ -26,6 +26,7 @@ CVE-2019-16089: Fix unknown CVE-2019-19378: Fix unknown CVE-2019-19814: Fix unknown CVE-2019-20794: Fix unknown +CVE-2019-25162: Fixed with 5.18.18 CVE-2020-0347: Fix unknown CVE-2020-10708: Fix unknown CVE-2020-11725: Fix unknown @@ -232,6 +233,9 @@ CVE-2022-48423: Fix not seen in stream CVE-2022-48424: Fix not seen in stream CVE-2022-48425: Fix not seen in stream CVE-2022-48502: Fix not seen in stream +CVE-2022-48627: Fixed with 5.18.13 +CVE-2022-48628: Fix not seen in stream +CVE-2022-48630: Fixed with 5.18 CVE-2023-0045: Fix not seen in stream CVE-2023-0160: Fix not seen in stream CVE-2023-0179: Fix not seen in stream @@ -321,6 +325,7 @@ CVE-2023-28328: Fix not seen in stream CVE-2023-28410: Fixed with 5.18-rc1 CVE-2023-28466: Fix not seen in stream CVE-2023-2860: Fix not seen in stream +CVE-2023-28746: Fix not seen in stream CVE-2023-28866: Fix not seen in stream CVE-2023-2898: Fix not seen in stream CVE-2023-2985: Fix not seen in stream @@ -437,7 +442,7 @@ CVE-2023-46343: Fix not seen in stream CVE-2023-46813: Fix not seen in stream CVE-2023-46838: Fix not seen in stream CVE-2023-46862: Fix not seen in stream -CVE-2023-47233: Fix unknown +CVE-2023-47233: Fix not seen in stream CVE-2023-4881: Fix not seen in stream CVE-2023-4921: Fix not seen in stream CVE-2023-50431: Fix not seen in stream @@ -469,20 +474,141 @@ CVE-2023-52451: Fix not seen in stream CVE-2023-52452: Fix not seen in stream CVE-2023-52454: Fix not seen in stream CVE-2023-52456: Fix not seen in stream -CVE-2023-52457: Fix not seen in stream CVE-2023-52458: Fix not seen in stream CVE-2023-52462: Fix not seen in stream CVE-2023-52463: Fix not seen in stream CVE-2023-52464: Fix not seen in stream +CVE-2023-52467: Fix not seen in stream +CVE-2023-52469: Fix not seen in stream +CVE-2023-52470: Fix not seen in stream +CVE-2023-52474: Fix not seen in stream +CVE-2023-52475: Fix not seen in stream +CVE-2023-52476: Fix not seen in stream +CVE-2023-52477: Fix not seen in stream +CVE-2023-52478: Fix not seen in stream +CVE-2023-52479: Fix not seen in stream +CVE-2023-52480: Fix not seen in stream +CVE-2023-52481: Fix not seen in stream +CVE-2023-52482: Fix not seen in stream +CVE-2023-52483: Fix not seen in stream +CVE-2023-52484: Fix not seen in stream +CVE-2023-52485: Fix not seen in stream +CVE-2023-52486: Fix not seen in stream +CVE-2023-52488: Fix not seen in stream +CVE-2023-52489: Fix not seen in stream +CVE-2023-52491: Fix not seen in stream +CVE-2023-52492: Fix not seen in stream +CVE-2023-52493: Fix not seen in stream +CVE-2023-52494: Fix not seen in stream +CVE-2023-52497: Fix not seen in stream +CVE-2023-52498: Fix not seen in stream +CVE-2023-52499: Fix not seen in stream +CVE-2023-52500: Fix not seen in stream +CVE-2023-52501: Fix not seen in stream +CVE-2023-52502: Fix not seen in stream +CVE-2023-52503: Fix not seen in stream +CVE-2023-52504: Fix not seen in stream +CVE-2023-52505: Fix not seen in stream +CVE-2023-52506: Fix not seen in stream +CVE-2023-52507: Fix not seen in stream +CVE-2023-52508: Fix not seen in stream +CVE-2023-52509: Fix not seen in stream +CVE-2023-52510: Fix not seen in stream +CVE-2023-52511: Fix not seen in stream +CVE-2023-52512: Fix not seen in stream +CVE-2023-52513: Fix not seen in stream +CVE-2023-52515: Fix not seen in stream +CVE-2023-52516: Fix not seen in stream +CVE-2023-52517: Fix not seen in stream +CVE-2023-52518: Fix not seen in stream +CVE-2023-52519: Fix not seen in stream +CVE-2023-52520: Fix not seen in stream +CVE-2023-52522: Fix not seen in stream +CVE-2023-52523: Fix not seen in stream +CVE-2023-52527: Fix not seen in stream +CVE-2023-52528: Fix not seen in stream +CVE-2023-52529: Fix not seen in stream +CVE-2023-52530: Fix not seen in stream +CVE-2023-52531: Fix not seen in stream +CVE-2023-52532: Fix not seen in stream +CVE-2023-52559: Fix not seen in stream +CVE-2023-52560: Fix not seen in stream +CVE-2023-52561: Fix not seen in stream +CVE-2023-52563: Fix not seen in stream +CVE-2023-52565: Fix not seen in stream +CVE-2023-52566: Fix not seen in stream +CVE-2023-52568: Fix not seen in stream +CVE-2023-52569: Fix not seen in stream +CVE-2023-52571: Fix not seen in stream +CVE-2023-52572: Fix not seen in stream +CVE-2023-52573: Fix not seen in stream +CVE-2023-52574: Fix not seen in stream +CVE-2023-52576: Fix not seen in stream +CVE-2023-52578: Fix not seen in stream +CVE-2023-52580: Fix not seen in stream +CVE-2023-52582: Fix not seen in stream +CVE-2023-52583: Fix not seen in stream +CVE-2023-52584: Fix not seen in stream +CVE-2023-52585: Fix not seen in stream +CVE-2023-52586: Fix not seen in stream +CVE-2023-52587: Fix not seen in stream +CVE-2023-52588: Fix not seen in stream +CVE-2023-52589: Fix not seen in stream +CVE-2023-52590: Fix not seen in stream +CVE-2023-52591: Fix not seen in stream +CVE-2023-52593: Fix not seen in stream +CVE-2023-52594: Fix not seen in stream +CVE-2023-52595: Fix not seen in stream +CVE-2023-52596: Fix not seen in stream +CVE-2023-52597: Fix not seen in stream +CVE-2023-52598: Fix not seen in stream +CVE-2023-52599: Fix not seen in stream +CVE-2023-52600: Fix not seen in stream +CVE-2023-52601: Fix not seen in stream +CVE-2023-52602: Fix not seen in stream +CVE-2023-52603: Fix not seen in stream +CVE-2023-52604: Fix not seen in stream +CVE-2023-52606: Fix not seen in stream +CVE-2023-52607: Fix not seen in stream +CVE-2023-52608: Fix not seen in stream +CVE-2023-52609: Fix not seen in stream +CVE-2023-52610: Fix not seen in stream +CVE-2023-52612: Fix not seen in stream +CVE-2023-52614: Fix not seen in stream +CVE-2023-52615: Fix not seen in stream +CVE-2023-52616: Fix not seen in stream +CVE-2023-52617: Fix not seen in stream +CVE-2023-52618: Fix not seen in stream +CVE-2023-52619: Fix not seen in stream +CVE-2023-52620: Fix not seen in stream +CVE-2023-52621: Fix not seen in stream +CVE-2023-52622: Fix not seen in stream +CVE-2023-52623: Fix not seen in stream +CVE-2023-52624: Fix not seen in stream +CVE-2023-52625: Fix not seen in stream +CVE-2023-52627: Fix not seen in stream +CVE-2023-52628: Fix not seen in stream +CVE-2023-52629: Fix not seen in stream +CVE-2023-52630: Fix not seen in stream +CVE-2023-52631: Fix not seen in stream +CVE-2023-52632: Fix not seen in stream +CVE-2023-52633: Fix not seen in stream +CVE-2023-52634: Fix not seen in stream +CVE-2023-52635: Fix not seen in stream +CVE-2023-52637: Fix not seen in stream +CVE-2023-52638: Fix not seen in stream +CVE-2023-52639: Fix not seen in stream +CVE-2023-52640: Fix not seen in stream +CVE-2023-52641: Fix not seen in stream CVE-2023-5717: Fix not seen in stream CVE-2023-6039: Fix not seen in stream CVE-2023-6121: Fix not seen in stream CVE-2023-6176: Fix not seen in stream CVE-2023-6240: Fix unknown -CVE-2023-6270: Fix unknown -CVE-2023-6356: Fix unknown +CVE-2023-6270: Fix not seen in stream +CVE-2023-6356: Fix not seen in stream CVE-2023-6535: Fix unknown -CVE-2023-6536: Fix unknown +CVE-2023-6536: Fix not seen in stream CVE-2023-6546: Fix not seen in stream CVE-2023-6560: Fix not seen in stream CVE-2023-6606: Fix not seen in stream @@ -492,7 +618,7 @@ CVE-2023-6817: Fix not seen in stream CVE-2023-6915: Fix not seen in stream CVE-2023-6931: Fix not seen in stream CVE-2023-6932: Fix not seen in stream -CVE-2023-7042: Fix unknown +CVE-2023-7042: Fix not seen in stream CVE-2023-7192: Fix not seen in stream CVE-2024-0340: Fix not seen in stream CVE-2024-0562: Fix not seen in stream @@ -504,17 +630,18 @@ CVE-2024-0639: Fix not seen in stream CVE-2024-0641: Fix not seen in stream CVE-2024-0646: Fix not seen in stream CVE-2024-0775: Fix not seen in stream -CVE-2024-0841: Fix unknown +CVE-2024-0841: Fix not seen in stream CVE-2024-1085: Fix not seen in stream CVE-2024-1086: Fix not seen in stream CVE-2024-1151: Fix not seen in stream CVE-2024-1312: Fix not seen in stream CVE-2024-21803: Fix unknown -CVE-2024-22099: Fix unknown +CVE-2024-2193: Fix unknown +CVE-2024-22099: Fix not seen in stream CVE-2024-22386: Fix unknown CVE-2024-22705: Fix not seen in stream -CVE-2024-23196: Fix unknown -CVE-2024-23307: Fix unknown +CVE-2024-23196: Fix not seen in stream +CVE-2024-23307: Fix not seen in stream CVE-2024-23848: Fix unknown CVE-2024-23849: Fix not seen in stream CVE-2024-23850: Fix not seen in stream @@ -524,7 +651,7 @@ CVE-2024-24857: Fix unknown CVE-2024-24858: Fix unknown CVE-2024-24859: Fix unknown CVE-2024-24860: Fix not seen in stream -CVE-2024-24861: Fix unknown +CVE-2024-24861: Fix not seen in stream CVE-2024-24864: Fix unknown CVE-2024-25739: Fix unknown CVE-2024-25740: Fix unknown @@ -534,8 +661,6 @@ CVE-2024-26583: Fix not seen in stream CVE-2024-26584: Fix not seen in stream CVE-2024-26585: Fix not seen in stream CVE-2024-26586: Fix not seen in stream -CVE-2024-26587: Fix not seen in stream -CVE-2024-26588: Fix not seen in stream CVE-2024-26589: Fix not seen in stream CVE-2024-26590: Fix not seen in stream CVE-2024-26591: Fix not seen in stream @@ -546,3 +671,139 @@ CVE-2024-26595: Fix not seen in stream CVE-2024-26597: Fix not seen in stream CVE-2024-26598: Fix not seen in stream CVE-2024-26599: Fix not seen in stream +CVE-2024-26600: Fix not seen in stream +CVE-2024-26601: Fix not seen in stream +CVE-2024-26602: Fix not seen in stream +CVE-2024-26603: Fix not seen in stream +CVE-2024-26606: Fix not seen in stream +CVE-2024-26607: Fix not seen in stream +CVE-2024-26608: Fix not seen in stream +CVE-2024-26610: Fix not seen in stream +CVE-2024-26612: Fix not seen in stream +CVE-2024-26614: Fix not seen in stream +CVE-2024-26615: Fix not seen in stream +CVE-2024-26622: Fix not seen in stream +CVE-2024-26623: Fix not seen in stream +CVE-2024-26625: Fix not seen in stream +CVE-2024-26627: Fix not seen in stream +CVE-2024-26631: Fix not seen in stream +CVE-2024-26632: Fix not seen in stream +CVE-2024-26633: Fix not seen in stream +CVE-2024-26635: Fix not seen in stream +CVE-2024-26636: Fix not seen in stream +CVE-2024-26640: Fix not seen in stream +CVE-2024-26641: Fix not seen in stream +CVE-2024-26642: Fix not seen in stream +CVE-2024-26644: Fix not seen in stream +CVE-2024-26645: Fix not seen in stream +CVE-2024-26646: Fix not seen in stream +CVE-2024-26647: Fix not seen in stream +CVE-2024-26648: Fix not seen in stream +CVE-2024-26650: Fix not seen in stream +CVE-2024-26651: Fix not seen in stream +CVE-2024-26654: Fix not seen in stream +CVE-2024-26655: Fix not seen in stream +CVE-2024-26656: Fix not seen in stream +CVE-2024-26658: Fix not seen in stream +CVE-2024-26659: Fix not seen in stream +CVE-2024-26660: Fix not seen in stream +CVE-2024-26661: Fix not seen in stream +CVE-2024-26662: Fix not seen in stream +CVE-2024-26663: Fix not seen in stream +CVE-2024-26664: Fix not seen in stream +CVE-2024-26665: Fix not seen in stream +CVE-2024-26668: Fix not seen in stream +CVE-2024-26669: Fix not seen in stream +CVE-2024-26671: Fix not seen in stream +CVE-2024-26672: Fix not seen in stream +CVE-2024-26673: Fix not seen in stream +CVE-2024-26675: Fix not seen in stream +CVE-2024-26676: Fix not seen in stream +CVE-2024-26677: Fix not seen in stream +CVE-2024-26679: Fix not seen in stream +CVE-2024-26680: Fix not seen in stream +CVE-2024-26684: Fix not seen in stream +CVE-2024-26685: Fix not seen in stream +CVE-2024-26686: Fix not seen in stream +CVE-2024-26687: Fix not seen in stream +CVE-2024-26688: Fix not seen in stream +CVE-2024-26689: Fix not seen in stream +CVE-2024-26691: Fix not seen in stream +CVE-2024-26696: Fix not seen in stream +CVE-2024-26697: Fix not seen in stream +CVE-2024-26698: Fix not seen in stream +CVE-2024-26699: Fix not seen in stream +CVE-2024-26700: Fix not seen in stream +CVE-2024-26702: Fix not seen in stream +CVE-2024-26704: Fix not seen in stream +CVE-2024-26706: Fix not seen in stream +CVE-2024-26707: Fix not seen in stream +CVE-2024-26712: Fix not seen in stream +CVE-2024-26713: Fix not seen in stream +CVE-2024-26714: Fix not seen in stream +CVE-2024-26715: Fix not seen in stream +CVE-2024-26717: Fix not seen in stream +CVE-2024-26718: Fix not seen in stream +CVE-2024-26719: Fix not seen in stream +CVE-2024-26720: Fix not seen in stream +CVE-2024-26726: Fix not seen in stream +CVE-2024-26727: Fix not seen in stream +CVE-2024-26733: Fix not seen in stream +CVE-2024-26735: Fix not seen in stream +CVE-2024-26736: Fix not seen in stream +CVE-2024-26737: Fix not seen in stream +CVE-2024-26738: Fix not seen in stream +CVE-2024-26739: Fix not seen in stream +CVE-2024-26740: Fix not seen in stream +CVE-2024-26743: Fix not seen in stream +CVE-2024-26744: Fix not seen in stream +CVE-2024-26745: Fix not seen in stream +CVE-2024-26747: Fix not seen in stream +CVE-2024-26748: Fix not seen in stream +CVE-2024-26749: Fix not seen in stream +CVE-2024-26751: Fix not seen in stream +CVE-2024-26752: Fix not seen in stream +CVE-2024-26753: Fix not seen in stream +CVE-2024-26754: Fix not seen in stream +CVE-2024-26756: Fix not seen in stream +CVE-2024-26757: Fix not seen in stream +CVE-2024-26758: Fix not seen in stream +CVE-2024-26759: Fix not seen in stream +CVE-2024-26763: Fix not seen in stream +CVE-2024-26764: Fix not seen in stream +CVE-2024-26765: Fix not seen in stream +CVE-2024-26766: Fix not seen in stream +CVE-2024-26767: Fix not seen in stream +CVE-2024-26768: Fix not seen in stream +CVE-2024-26769: Fix not seen in stream +CVE-2024-26770: Fix not seen in stream +CVE-2024-26771: Fix not seen in stream +CVE-2024-26772: Fix not seen in stream +CVE-2024-26773: Fix not seen in stream +CVE-2024-26774: Fix not seen in stream +CVE-2024-26775: Fix not seen in stream +CVE-2024-26776: Fix not seen in stream +CVE-2024-26777: Fix not seen in stream +CVE-2024-26778: Fix not seen in stream +CVE-2024-26779: Fix not seen in stream +CVE-2024-26782: Fix not seen in stream +CVE-2024-26783: Fix not seen in stream +CVE-2024-26784: Fix not seen in stream +CVE-2024-26787: Fix not seen in stream +CVE-2024-26788: Fix not seen in stream +CVE-2024-26789: Fix not seen in stream +CVE-2024-26790: Fix not seen in stream +CVE-2024-26791: Fix not seen in stream +CVE-2024-26793: Fix not seen in stream +CVE-2024-26795: Fix not seen in stream +CVE-2024-26797: Fix not seen in stream +CVE-2024-26798: Fix not seen in stream +CVE-2024-26799: Fix not seen in stream +CVE-2024-26801: Fix not seen in stream +CVE-2024-26802: Fix not seen in stream +CVE-2024-26803: Fix not seen in stream +CVE-2024-26804: Fix not seen in stream +CVE-2024-26805: Fix not seen in stream +CVE-2024-26806: Fix not seen in stream +CVE-2024-26808: Fix not seen in stream +CVE-2024-26809: Fix not seen in stream diff --git a/data/5.18/5.18_security.txt b/data/5.18/5.18_security.txt index b875d533a..de74415e6 100644 --- a/data/5.18/5.18_security.txt +++ b/data/5.18/5.18_security.txt @@ -2,6 +2,7 @@ CVEs fixed in 5.18: CVE-2022-1729: 3ac6487e584a1eb54071dbe1212e05b884136704 perf: Fix sys_perf_event_open() race against self CVE-2022-1789: 9f46c187e2e680ecd9de7983e4d081c3391acc76 KVM: x86/mmu: fix NULL pointer dereference on guest INVPCID + CVE-2022-48630: 16287397ec5c08aa58db6acf7dbc55470d78087d crypto: qcom-rng - fix infinite loop on requests not multiple of WORD_SZ CVE-2023-1838: fb4554c2232e44d595920f4d5c66cf8f7d13f9bc Fix double fget() in vhost_net_set_backend() CVE-2023-4387: 9e7fef9521e73ca8afd7da9e58c14654b02dfad8 net: vmxnet3: fix possible use-after-free bugs in vmxnet3_rq_alloc_rx_buf() CVE-2023-4459: edf410cb74dc612fd47ef5be319c5a0bcd6e6ccd net: vmxnet3: fix possible NULL pointer dereference in vmxnet3_rq_cleanup() @@ -66,6 +67,7 @@ CVEs fixed in 5.18.13: CVE-2022-1462: fa3302714c03e4e6c9b5aad5dacae33e75f76cf7 tty: use new tty_insert_flip_string_and_push_buffer() in pty_write() CVE-2022-36123: 2334bdfc2da469c9807767002a2831274b82c39a x86: Clear .brk area at early boot CVE-2022-4128: ff151c477f6a529b0e4643d90f4f0b8eca85de04 mptcp: fix subflow traversal at disconnect time + CVE-2022-48627: 14d2cc21ca622310babf373e3a8f0b40acfe8265 vt: fix memory overlapping when deleting chars in the buffer CVEs fixed in 5.18.14: CVE-2022-23816: e492002673b03c636d2297fb869d68ae545c41c4 x86/kvm/vmx: Make noinstr clean @@ -87,6 +89,7 @@ CVEs fixed in 5.18.17: CVE-2022-39189: 719492d2bc3b99c067076bddc62e63cda8ad16e2 KVM: x86: do not report a vCPU as preempted outside instruction boundaries CVEs fixed in 5.18.18: + CVE-2019-25162: e8e1a046cf87c8b1363e5de835114f2779e2aaf4 i2c: Fix a potential use after free CVE-2022-1679: 6b14ab47937ba441e75e8dbb9fbfc9c55efa41c6 ath9k: fix use-after-free in ath9k_hif_usb_rx_cb CVE-2022-20422: 6a2fd114678d7fc1b5a0f8865ae98f1c17787455 arm64: fix oops in concurrently setting insn_emulation sysctls CVE-2022-2585: e8cb6e8fd9890780f1bfcf5592889e1b879e779c posix-cpu-timers: Cleanup CPU timers before freeing them during exec @@ -280,6 +283,7 @@ Outstanding CVEs: CVE-2022-48424: (unk) fs/ntfs3: Validate attribute name offset CVE-2022-48425: (unk) fs/ntfs3: Validate MFT flags before replaying logs CVE-2022-48502: (unk) fs/ntfs3: Check fields while reading + CVE-2022-48628: (unk) ceph: drop messages from MDS when unmounting CVE-2023-0045: (unk) x86/bugs: Flush IBP in ib_prctl_set() CVE-2023-0160: (unk) bpf, sockmap: fix deadlocks in the sockhash and sockmap CVE-2023-0179: (unk) netfilter: nft_payload: incorrect arithmetics when fetching VLAN header bits @@ -360,6 +364,7 @@ Outstanding CVEs: CVE-2023-28328: (unk) media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer() CVE-2023-28466: (unk) net: tls: fix possible race condition between do_tls_getsockopt_conf() and do_tls_setsockopt_conf() CVE-2023-2860: (unk) ipv6: sr: fix out-of-bounds read when setting HMAC data. + CVE-2023-28746: (unk) x86/mmio: Disable KVM mitigation when X86_FEATURE_CLEAR_CPU_BUF is set CVE-2023-28866: (unk) Bluetooth: HCI: Fix global-out-of-bounds CVE-2023-2898: (unk) f2fs: fix to avoid NULL pointer dereference f2fs_write_end_io() CVE-2023-2985: (unk) fs: hfsplus: fix UAF issue in hfsplus_put_super @@ -473,7 +478,7 @@ Outstanding CVEs: CVE-2023-46813: (unk) x86/sev: Check for user-space IOIO pointing to kernel space CVE-2023-46838: (unk) xen-netback: don't produce zero-size SKB frags CVE-2023-46862: (unk) io_uring/fdinfo: lock SQ thread while retrieving thread cpu/pid - CVE-2023-47233: (unk) + CVE-2023-47233: (unk) wifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach CVE-2023-4881: (unk) netfilter: nftables: exthdr: fix 4-byte stack OOB write CVE-2023-4921: (unk) net: sched: sch_qfq: Fix UAF in qfq_dequeue() CVE-2023-50431: (unk) accel/habanalabs: fix information leak in sec_attest_info() @@ -505,20 +510,141 @@ Outstanding CVEs: CVE-2023-52452: (unk) bpf: Fix accesses to uninit stack slots CVE-2023-52454: (unk) nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length CVE-2023-52456: (unk) serial: imx: fix tx statemachine deadlock - CVE-2023-52457: (unk) serial: 8250: omap: Don't skip resource freeing if pm_runtime_resume_and_get() failed CVE-2023-52458: (unk) block: add check that partition length needs to be aligned with block size CVE-2023-52462: (unk) bpf: fix check for attempt to corrupt spilled pointer CVE-2023-52463: (unk) efivarfs: force RO when remounting if SetVariable is not supported CVE-2023-52464: (unk) EDAC/thunderx: Fix possible out-of-bounds string access + CVE-2023-52467: (unk) mfd: syscon: Fix null pointer dereference in of_syscon_register() + CVE-2023-52469: (unk) drivers/amd/pm: fix a use-after-free in kv_parse_power_table + CVE-2023-52470: (unk) drm/radeon: check the alloc_workqueue return value in radeon_crtc_init() + CVE-2023-52474: (unk) IB/hfi1: Fix bugs with non-PAGE_SIZE-end multi-iovec user SDMA requests + CVE-2023-52475: (unk) Input: powermate - fix use-after-free in powermate_config_complete + CVE-2023-52476: (unk) perf/x86/lbr: Filter vsyscall addresses + CVE-2023-52477: (unk) usb: hub: Guard against accesses to uninitialized BOS descriptors + CVE-2023-52478: (unk) HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect + CVE-2023-52479: (unk) ksmbd: fix uaf in smb20_oplock_break_ack + CVE-2023-52480: (unk) ksmbd: fix race condition between session lookup and expire + CVE-2023-52481: (unk) arm64: errata: Add Cortex-A520 speculative unprivileged load workaround + CVE-2023-52482: (unk) x86/srso: Add SRSO mitigation for Hygon processors + CVE-2023-52483: (unk) mctp: perform route lookups under a RCU read-side lock + CVE-2023-52484: (unk) iommu/arm-smmu-v3: Fix soft lockup triggered by arm_smmu_mm_invalidate_range + CVE-2023-52485: (unk) drm/amd/display: Wake DMCUB before sending a command + CVE-2023-52486: (unk) drm: Don't unref the same fb many times by mistake due to deadlock handling + CVE-2023-52488: (unk) serial: sc16is7xx: convert from _raw_ to _noinc_ regmap functions for FIFO + CVE-2023-52489: (unk) mm/sparsemem: fix race in accessing memory_section->usage + CVE-2023-52491: (unk) media: mtk-jpeg: Fix use after free bug due to error path handling in mtk_jpeg_dec_device_run + CVE-2023-52492: (unk) dmaengine: fix NULL pointer in channel unregistration function + CVE-2023-52493: (unk) bus: mhi: host: Drop chan lock before queuing buffers + CVE-2023-52494: (unk) bus: mhi: host: Add alignment check for event ring read pointer + CVE-2023-52497: (unk) erofs: fix lz4 inplace decompression + CVE-2023-52498: (unk) PM: sleep: Fix possible deadlocks in core system-wide PM code + CVE-2023-52499: (unk) powerpc/47x: Fix 47x syscall return crash + CVE-2023-52500: (unk) scsi: pm80xx: Avoid leaking tags when processing OPC_INB_SET_CONTROLLER_CONFIG command + CVE-2023-52501: (unk) ring-buffer: Do not attempt to read past "commit" + CVE-2023-52502: (unk) net: nfc: fix races in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn() + CVE-2023-52503: (unk) tee: amdtee: fix use-after-free vulnerability in amdtee_close_session + CVE-2023-52504: (unk) x86/alternatives: Disable KASAN in apply_alternatives() + CVE-2023-52505: (unk) phy: lynx-28g: serialize concurrent phy_set_mode_ext() calls to shared registers + CVE-2023-52506: (unk) LoongArch: Set all reserved memblocks on Node#0 at initialization + CVE-2023-52507: (unk) nfc: nci: assert requested protocol is valid + CVE-2023-52508: (unk) nvme-fc: Prevent null pointer dereference in nvme_fc_io_getuuid() + CVE-2023-52509: (unk) ravb: Fix use-after-free issue in ravb_tx_timeout_work() + CVE-2023-52510: (unk) ieee802154: ca8210: Fix a potential UAF in ca8210_probe + CVE-2023-52511: (unk) spi: sun6i: reduce DMA RX transfer width to single byte + CVE-2023-52512: (unk) pinctrl: nuvoton: wpcm450: fix out of bounds write + CVE-2023-52513: (unk) RDMA/siw: Fix connection failure handling + CVE-2023-52515: (unk) RDMA/srp: Do not call scsi_done() from srp_abort() + CVE-2023-52516: (unk) dma-debug: don't call __dma_entry_alloc_check_leak() under free_entries_lock + CVE-2023-52517: (unk) spi: sun6i: fix race between DMA RX transfer completion and RX FIFO drain + CVE-2023-52518: (unk) Bluetooth: hci_codec: Fix leaking content of local_codecs + CVE-2023-52519: (unk) HID: intel-ish-hid: ipc: Disable and reenable ACPI GPE bit + CVE-2023-52520: (unk) platform/x86: think-lmi: Fix reference leak + CVE-2023-52522: (unk) net: fix possible store tearing in neigh_periodic_work() + CVE-2023-52523: (unk) bpf, sockmap: Reject sk_msg egress redirects to non-TCP sockets + CVE-2023-52527: (unk) ipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data() + CVE-2023-52528: (unk) net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg + CVE-2023-52529: (unk) HID: sony: Fix a potential memory leak in sony_probe() + CVE-2023-52530: (unk) wifi: mac80211: fix potential key use-after-free + CVE-2023-52531: (unk) wifi: iwlwifi: mvm: Fix a memory corruption issue + CVE-2023-52532: (unk) net: mana: Fix TX CQE error handling + CVE-2023-52559: (unk) iommu/vt-d: Avoid memory allocation in iommu_suspend() + CVE-2023-52560: (unk) mm/damon/vaddr-test: fix memory leak in damon_do_test_apply_three_regions() + CVE-2023-52561: (unk) arm64: dts: qcom: sdm845-db845c: Mark cont splash memory region as reserved + CVE-2023-52563: (unk) drm/meson: fix memory leak on ->hpd_notify callback + CVE-2023-52565: (unk) media: uvcvideo: Fix OOB read + CVE-2023-52566: (unk) nilfs2: fix potential use after free in nilfs_gccache_submit_read_data() + CVE-2023-52568: (unk) x86/sgx: Resolves SECS reclaim vs. page fault for EAUG race + CVE-2023-52569: (unk) btrfs: remove BUG() after failure to insert delayed dir index item + CVE-2023-52571: (unk) power: supply: rk817: Fix node refcount leak + CVE-2023-52572: (unk) cifs: Fix UAF in cifs_demultiplex_thread() + CVE-2023-52573: (unk) net: rds: Fix possible NULL-pointer dereference + CVE-2023-52574: (unk) team: fix null-ptr-deref when team device type is changed + CVE-2023-52576: (unk) x86/mm, kexec, ima: Use memblock_free_late() from ima_free_kexec_buffer() + CVE-2023-52578: (unk) net: bridge: use DEV_STATS_INC() + CVE-2023-52580: (unk) net/core: Fix ETH_P_1588 flow dissector + CVE-2023-52582: (unk) netfs: Only call folio_start_fscache() one time for each folio + CVE-2023-52583: (unk) ceph: fix deadlock or deadcode of misusing dget() + CVE-2023-52584: (unk) spmi: mediatek: Fix UAF on device remove + CVE-2023-52585: (unk) drm/amdgpu: Fix possible NULL dereference in amdgpu_ras_query_error_status_helper() + CVE-2023-52586: (unk) drm/msm/dpu: Add mutex lock in control vblank irq + CVE-2023-52587: (unk) IB/ipoib: Fix mcast list locking + CVE-2023-52588: (unk) f2fs: fix to tag gcing flag on page during block migration + CVE-2023-52589: (unk) media: rkisp1: Fix IRQ disable race issue + CVE-2023-52590: (unk) ocfs2: Avoid touching renamed directory if parent does not change + CVE-2023-52591: (unk) reiserfs: Avoid touching renamed directory if parent does not change + CVE-2023-52593: (unk) wifi: wfx: fix possible NULL pointer dereference in wfx_set_mfp_ap() + CVE-2023-52594: (unk) wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus() + CVE-2023-52595: (unk) wifi: rt2x00: restart beacon queue when hardware reset + CVE-2023-52596: (unk) sysctl: Fix out of bounds access for empty sysctl registers + CVE-2023-52597: (unk) KVM: s390: fix setting of fpc register + CVE-2023-52598: (unk) s390/ptrace: handle setting of fpc register correctly + CVE-2023-52599: (unk) jfs: fix array-index-out-of-bounds in diNewExt + CVE-2023-52600: (unk) jfs: fix uaf in jfs_evict_inode + CVE-2023-52601: (unk) jfs: fix array-index-out-of-bounds in dbAdjTree + CVE-2023-52602: (unk) jfs: fix slab-out-of-bounds Read in dtSearch + CVE-2023-52603: (unk) UBSAN: array-index-out-of-bounds in dtSplitRoot + CVE-2023-52604: (unk) FS:JFS:UBSAN:array-index-out-of-bounds in dbAdjTree + CVE-2023-52606: (unk) powerpc/lib: Validate size for vector operations + CVE-2023-52607: (unk) powerpc/mm: Fix null-pointer dereference in pgtable_cache_add + CVE-2023-52608: (unk) firmware: arm_scmi: Check mailbox/SMT channel for consistency + CVE-2023-52609: (unk) binder: fix race between mmput() and do_exit() + CVE-2023-52610: (unk) net/sched: act_ct: fix skb leak and crash on ooo frags + CVE-2023-52612: (unk) crypto: scomp - fix req->dst buffer overflow + CVE-2023-52614: (unk) PM / devfreq: Fix buffer overflow in trans_stat_show + CVE-2023-52615: (unk) hwrng: core - Fix page fault dead lock on mmap-ed hwrng + CVE-2023-52616: (unk) crypto: lib/mpi - Fix unexpected pointer access in mpi_ec_init + CVE-2023-52617: (unk) PCI: switchtec: Fix stdev_release() crash after surprise hot remove + CVE-2023-52618: (unk) block/rnbd-srv: Check for unlikely string overflow + CVE-2023-52619: (unk) pstore/ram: Fix crash when setting number of cpus to an odd number + CVE-2023-52620: (unk) netfilter: nf_tables: disallow timeout for anonymous sets + CVE-2023-52621: (unk) bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers + CVE-2023-52622: (unk) ext4: avoid online resizing failures due to oversized flex bg + CVE-2023-52623: (unk) SUNRPC: Fix a suspicious RCU usage warning + CVE-2023-52624: (unk) drm/amd/display: Wake DMCUB before executing GPINT commands + CVE-2023-52625: (unk) drm/amd/display: Refactor DMCUB enter/exit idle interface + CVE-2023-52627: (unk) iio: adc: ad7091r: Allow users to configure device events + CVE-2023-52628: (unk) netfilter: nftables: exthdr: fix 4-byte stack OOB write + CVE-2023-52629: (unk) sh: push-switch: Reorder cleanup operations to avoid use-after-free bug + CVE-2023-52630: (unk) blk-iocost: Fix an UBSAN shift-out-of-bounds warning + CVE-2023-52631: (unk) fs/ntfs3: Fix an NULL dereference bug + CVE-2023-52632: (unk) drm/amdkfd: Fix lock dependency warning with srcu + CVE-2023-52633: (unk) um: time-travel: fix time corruption + CVE-2023-52634: (unk) drm/amd/display: Fix disable_otg_wa logic + CVE-2023-52635: (unk) PM / devfreq: Synchronize devfreq_monitor_[start/stop] + CVE-2023-52637: (unk) can: j1939: Fix UAF in j1939_sk_match_filter during setsockopt(SO_J1939_FILTER) + CVE-2023-52638: (unk) can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock + CVE-2023-52639: (unk) KVM: s390: vsie: fix race during shadow creation + CVE-2023-52640: (unk) fs/ntfs3: Fix oob in ntfs_listxattr + CVE-2023-52641: (unk) fs/ntfs3: Add NULL ptr dereference checking at the end of attr_allocate_frame() CVE-2023-5717: (unk) perf: Disallow mis-matched inherited group reads CVE-2023-6039: (unk) net: usb: lan78xx: reorder cleanup operations to avoid UAF bugs CVE-2023-6121: (unk) nvmet: nul-terminate the NQNs passed in the connect command CVE-2023-6176: (unk) net/tls: do not free tls_rec on async operation in bpf_exec_tx_verdict() CVE-2023-6240: (unk) - CVE-2023-6270: (unk) - CVE-2023-6356: (unk) + CVE-2023-6270: (unk) aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts + CVE-2023-6356: (unk) nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length CVE-2023-6535: (unk) - CVE-2023-6536: (unk) + CVE-2023-6536: (unk) nvmet-tcp: fix a crash in nvmet_req_complete() CVE-2023-6546: (unk) tty: n_gsm: fix the UAF caused by race condition in gsm_cleanup_mux CVE-2023-6560: (unk) io_uring: don't allow discontig pages for IORING_SETUP_NO_MMAP CVE-2023-6606: (unk) smb: client: fix OOB in smbCalcSize() @@ -528,7 +654,7 @@ Outstanding CVEs: CVE-2023-6915: (unk) ida: Fix crash in ida_free when the bitmap is empty CVE-2023-6931: (unk) perf: Fix perf_event_validate_size() CVE-2023-6932: (unk) ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet - CVE-2023-7042: (unk) + CVE-2023-7042: (unk) wifi: ath10k: fix NULL pointer dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev() CVE-2023-7192: (unk) netfilter: ctnetlink: fix possible refcount leak in ctnetlink_create_conntrack() CVE-2024-0340: (unk) vhost: use kzalloc() instead of kmalloc() followed by memset() CVE-2024-0562: (unk) writeback: avoid use-after-free after removing device @@ -540,17 +666,18 @@ Outstanding CVEs: CVE-2024-0641: (unk) tipc: fix a potential deadlock on &tx->lock CVE-2024-0646: (unk) net: tls, update curr on splice as well CVE-2024-0775: (unk) ext4: improve error recovery code paths in __ext4_remount() - CVE-2024-0841: (unk) + CVE-2024-0841: (unk) fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super CVE-2024-1085: (unk) netfilter: nf_tables: check if catch-all set element is active in next generation CVE-2024-1086: (unk) netfilter: nf_tables: reject QUEUE/DROP verdict parameters CVE-2024-1151: (unk) net: openvswitch: limit the number of recursions from action sets CVE-2024-1312: (unk) mm: lock_vma_under_rcu() must check vma->anon_vma under vma lock CVE-2024-21803: (unk) - CVE-2024-22099: (unk) + CVE-2024-2193: (unk) + CVE-2024-22099: (unk) Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security CVE-2024-22386: (unk) CVE-2024-22705: (unk) ksmbd: fix slab-out-of-bounds in smb_strndup_from_utf16() - CVE-2024-23196: (unk) - CVE-2024-23307: (unk) + CVE-2024-23196: (unk) ALSA: hda: fix a possible null-pointer dereference due to data race in snd_hdac_regmap_sync() + CVE-2024-23307: (unk) md/raid5: fix atomicity violation in raid5_cache_count CVE-2024-23848: (unk) CVE-2024-23849: (unk) net/rds: Fix UBSAN: array-index-out-of-bounds in rds_cmsg_recv CVE-2024-23850: (unk) btrfs: do not ASSERT() if the newly created subvolume already got read @@ -560,7 +687,7 @@ Outstanding CVEs: CVE-2024-24858: (unk) CVE-2024-24859: (unk) CVE-2024-24860: (unk) Bluetooth: Fix atomicity violation in {min,max}_key_size_set - CVE-2024-24861: (unk) + CVE-2024-24861: (unk) media: xc4000: Fix atomicity violation in xc4000_get_frequency CVE-2024-24864: (unk) CVE-2024-25739: (unk) CVE-2024-25740: (unk) @@ -570,8 +697,6 @@ Outstanding CVEs: CVE-2024-26584: (unk) net: tls: handle backlogging of crypto requests CVE-2024-26585: (unk) tls: fix race between tx work scheduling and socket close CVE-2024-26586: (unk) mlxsw: spectrum_acl_tcam: Fix stack corruption - CVE-2024-26587: (unk) net: netdevsim: don't try to destroy PHC on VFs - CVE-2024-26588: (unk) LoongArch: BPF: Prevent out-of-bounds memory access CVE-2024-26589: (unk) bpf: Reject variable offset alu on PTR_TO_FLOW_KEYS CVE-2024-26590: (unk) erofs: fix inconsistent per-file compression format CVE-2024-26591: (unk) bpf: Fix re-attachment branch in bpf_tracing_prog_attach @@ -582,3 +707,139 @@ Outstanding CVEs: CVE-2024-26597: (unk) net: qualcomm: rmnet: fix global oob in rmnet_policy CVE-2024-26598: (unk) KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache CVE-2024-26599: (unk) pwm: Fix out-of-bounds access in of_pwm_single_xlate() + CVE-2024-26600: (unk) phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP + CVE-2024-26601: (unk) ext4: regenerate buddy after block freeing failed if under fc replay + CVE-2024-26602: (unk) sched/membarrier: reduce the ability to hammer on sys_membarrier + CVE-2024-26603: (unk) x86/fpu: Stop relying on userspace for info to fault in xsave buffer + CVE-2024-26606: (unk) binder: signal epoll threads of self-work + CVE-2024-26607: (unk) drm/bridge: sii902x: Fix probing race issue + CVE-2024-26608: (unk) ksmbd: fix global oob in ksmbd_nl_policy + CVE-2024-26610: (unk) wifi: iwlwifi: fix a memory corruption + CVE-2024-26612: (unk) netfs, fscache: Prevent Oops in fscache_put_cache() + CVE-2024-26614: (unk) tcp: make sure init the accept_queue's spinlocks once + CVE-2024-26615: (unk) net/smc: fix illegal rmb_desc access in SMC-D connection dump + CVE-2024-26622: (unk) tomoyo: fix UAF write bug in tomoyo_write_control() + CVE-2024-26623: (unk) pds_core: Prevent race issues involving the adminq + CVE-2024-26625: (unk) llc: call sock_orphan() at release time + CVE-2024-26627: (unk) scsi: core: Move scsi_host_busy() out of host lock for waking up EH handler + CVE-2024-26631: (unk) ipv6: mcast: fix data-race in ipv6_mc_down / mld_ifc_work + CVE-2024-26632: (unk) block: Fix iterating over an empty bio with bio_for_each_folio_all + CVE-2024-26633: (unk) ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim() + CVE-2024-26635: (unk) llc: Drop support for ETH_P_TR_802_2. + CVE-2024-26636: (unk) llc: make llc_ui_sendmsg() more robust against bonding changes + CVE-2024-26640: (unk) tcp: add sanity checks to rx zerocopy + CVE-2024-26641: (unk) ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv() + CVE-2024-26642: (unk) netfilter: nf_tables: disallow anonymous set with timeout flag + CVE-2024-26644: (unk) btrfs: don't abort filesystem when attempting to snapshot deleted subvolume + CVE-2024-26645: (unk) tracing: Ensure visibility when inserting an element into tracing_map + CVE-2024-26646: (unk) thermal: intel: hfi: Add syscore callbacks for system-wide PM + CVE-2024-26647: (unk) drm/amd/display: Fix late derefrence 'dsc' check in 'link_set_dsc_pps_packet()' + CVE-2024-26648: (unk) drm/amd/display: Fix variable deferencing before NULL check in edp_setup_replay() + CVE-2024-26650: (unk) platform/x86: p2sb: Allow p2sb_bar() calls during PCI device probe + CVE-2024-26651: (unk) sr9800: Add check for usbnet_get_endpoints + CVE-2024-26654: (unk) ALSA: sh: aica: reorder cleanup operations to avoid UAF bugs + CVE-2024-26655: (unk) Fix memory leak in posix_clock_open() + CVE-2024-26656: (unk) drm/amdgpu: fix use-after-free bug + CVE-2024-26658: (unk) bcachefs: grab s_umount only if snapshotting + CVE-2024-26659: (unk) xhci: handle isoc Babble and Buffer Overrun events properly + CVE-2024-26660: (unk) drm/amd/display: Implement bounds check for stream encoder creation in DCN301 + CVE-2024-26661: (unk) drm/amd/display: Add NULL test for 'timing generator' in 'dcn21_set_pipe()' + CVE-2024-26662: (unk) drm/amd/display: Fix 'panel_cntl' could be null in 'dcn21_set_backlight_level()' + CVE-2024-26663: (unk) tipc: Check the bearer type before calling tipc_udp_nl_bearer_add() + CVE-2024-26664: (unk) hwmon: (coretemp) Fix out-of-bounds memory access + CVE-2024-26665: (unk) tunnels: fix out of bounds access when building IPv6 PMTU error + CVE-2024-26668: (unk) netfilter: nft_limit: reject configurations that cause integer overflow + CVE-2024-26669: (unk) net/sched: flower: Fix chain template offload + CVE-2024-26671: (unk) blk-mq: fix IO hang from sbitmap wakeup race + CVE-2024-26672: (unk) drm/amdgpu: Fix variable 'mca_funcs' dereferenced before NULL check in 'amdgpu_mca_smu_get_mca_entry()' + CVE-2024-26673: (unk) netfilter: nft_ct: sanitize layer 3 and 4 protocol number in custom expectations + CVE-2024-26675: (unk) ppp_async: limit MRU to 64K + CVE-2024-26676: (unk) af_unix: Call kfree_skb() for dead unix_(sk)->oob_skb in GC. + CVE-2024-26677: (unk) rxrpc: Fix delayed ACKs to not set the reference serial number + CVE-2024-26679: (unk) inet: read sk->sk_family once in inet_recv_error() + CVE-2024-26680: (unk) net: atlantic: Fix DMA mapping for PTP hwts ring + CVE-2024-26684: (unk) net: stmmac: xgmac: fix handling of DPP safety error for DMA channels + CVE-2024-26685: (unk) nilfs2: fix potential bug in end_buffer_async_write + CVE-2024-26686: (unk) fs/proc: do_task_stat: use sig->stats_lock to gather the threads/children stats + CVE-2024-26687: (unk) xen/events: close evtchn after mapping cleanup + CVE-2024-26688: (unk) fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super + CVE-2024-26689: (unk) ceph: prevent use-after-free in encode_cap_msg() + CVE-2024-26691: (unk) KVM: arm64: Fix circular locking dependency + CVE-2024-26696: (unk) nilfs2: fix hang in nilfs_lookup_dirty_data_buffers() + CVE-2024-26697: (unk) nilfs2: fix data corruption in dsync block recovery for small block sizes + CVE-2024-26698: (unk) hv_netvsc: Fix race condition between netvsc_probe and netvsc_remove + CVE-2024-26699: (unk) drm/amd/display: Fix array-index-out-of-bounds in dcn35_clkmgr + CVE-2024-26700: (unk) drm/amd/display: Fix MST Null Ptr for RV + CVE-2024-26702: (unk) iio: magnetometer: rm3100: add boundary check for the value read from RM3100_REG_TMRC + CVE-2024-26704: (unk) ext4: fix double-free of blocks due to wrong extents moved_len + CVE-2024-26706: (unk) parisc: Fix random data corruption from exception handler + CVE-2024-26707: (unk) net: hsr: remove WARN_ONCE() in send_hsr_supervision_frame() + CVE-2024-26712: (unk) powerpc/kasan: Fix addr error caused by page alignment + CVE-2024-26713: (unk) powerpc/pseries/iommu: Fix iommu initialisation during DLPAR add + CVE-2024-26714: (unk) interconnect: qcom: sc8180x: Mark CO0 BCM keepalive + CVE-2024-26715: (unk) usb: dwc3: gadget: Fix NULL pointer dereference in dwc3_gadget_suspend + CVE-2024-26717: (unk) HID: i2c-hid-of: fix NULL-deref on failed power up + CVE-2024-26718: (unk) dm-crypt, dm-verity: disable tasklets + CVE-2024-26719: (unk) nouveau: offload fence uevents work to workqueue + CVE-2024-26720: (unk) mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again + CVE-2024-26726: (unk) btrfs: don't drop extent_map for free space inode on write error + CVE-2024-26727: (unk) btrfs: do not ASSERT() if the newly created subvolume already got read + CVE-2024-26733: (unk) arp: Prevent overflow in arp_req_get(). + CVE-2024-26735: (unk) ipv6: sr: fix possible use-after-free and null-ptr-deref + CVE-2024-26736: (unk) afs: Increase buffer size in afs_update_volume_status() + CVE-2024-26737: (unk) bpf: Fix racing between bpf_timer_cancel_and_free and bpf_timer_cancel + CVE-2024-26738: (unk) powerpc/pseries/iommu: DLPAR add doesn't completely initialize pci_controller + CVE-2024-26739: (unk) net/sched: act_mirred: don't override retval if we already lost the skb + CVE-2024-26740: (unk) net/sched: act_mirred: use the backlog for mirred ingress + CVE-2024-26743: (unk) RDMA/qedr: Fix qedr_create_user_qp error flow + CVE-2024-26744: (unk) RDMA/srpt: Support specifying the srpt_service_guid parameter + CVE-2024-26745: (unk) powerpc/pseries/iommu: IOMMU table is not initialized for kdump over SR-IOV + CVE-2024-26747: (unk) usb: roles: fix NULL pointer issue when put module's reference + CVE-2024-26748: (unk) usb: cdns3: fix memory double free when handle zero packet + CVE-2024-26749: (unk) usb: cdns3: fixed memory use after free at cdns3_gadget_ep_disable() + CVE-2024-26751: (unk) ARM: ep93xx: Add terminator to gpiod_lookup_table + CVE-2024-26752: (unk) l2tp: pass correct message length to ip6_append_data + CVE-2024-26753: (unk) crypto: virtio/akcipher - Fix stack overflow on memcpy + CVE-2024-26754: (unk) gtp: fix use-after-free and null-ptr-deref in gtp_genl_dump_pdp() + CVE-2024-26756: (unk) md: Don't register sync_thread for reshape directly + CVE-2024-26757: (unk) md: Don't ignore read-only array in md_check_recovery() + CVE-2024-26758: (unk) md: Don't ignore suspended array in md_check_recovery() + CVE-2024-26759: (unk) mm/swap: fix race when skipping swapcache + CVE-2024-26763: (unk) dm-crypt: don't modify the data when using authenticated encryption + CVE-2024-26764: (unk) fs/aio: Restrict kiocb_set_cancel_fn() to I/O submitted via libaio + CVE-2024-26765: (unk) LoongArch: Disable IRQ before init_fn() for nonboot CPUs + CVE-2024-26766: (unk) IB/hfi1: Fix sdma.h tx->num_descs off-by-one error + CVE-2024-26767: (unk) drm/amd/display: fixed integer types and null check locations + CVE-2024-26768: (unk) LoongArch: Change acpi_core_pic[NR_CPUS] to acpi_core_pic[MAX_CORE_PIC] + CVE-2024-26769: (unk) nvmet-fc: avoid deadlock on delete association path + CVE-2024-26770: (unk) HID: nvidia-shield: Add missing null pointer checks to LED initialization + CVE-2024-26771: (unk) dmaengine: ti: edma: Add some null pointer checks to the edma_probe + CVE-2024-26772: (unk) ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal() + CVE-2024-26773: (unk) ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found() + CVE-2024-26774: (unk) ext4: avoid dividing by 0 in mb_update_avg_fragment_size() when block bitmap corrupt + CVE-2024-26775: (unk) aoe: avoid potential deadlock at set_capacity + CVE-2024-26776: (unk) spi: hisi-sfc-v3xx: Return IRQ_NONE if no interrupts were detected + CVE-2024-26777: (unk) fbdev: sis: Error out if pixclock equals zero + CVE-2024-26778: (unk) fbdev: savage: Error out if pixclock equals zero + CVE-2024-26779: (unk) wifi: mac80211: fix race condition on enabling fast-xmit + CVE-2024-26782: (unk) mptcp: fix double-free on socket dismantle + CVE-2024-26783: (unk) mm/vmscan: fix a bug calling wakeup_kswapd() with a wrong zone index + CVE-2024-26784: (unk) pmdomain: arm: Fix NULL dereference on scmi_perf_domain removal + CVE-2024-26787: (unk) mmc: mmci: stm32: fix DMA API overlapping mappings warning + CVE-2024-26788: (unk) dmaengine: fsl-qdma: init irq after reg initialization + CVE-2024-26789: (unk) crypto: arm64/neonbs - fix out-of-bounds access on short input + CVE-2024-26790: (unk) dmaengine: fsl-qdma: fix SoC may hang on 16 byte unaligned read + CVE-2024-26791: (unk) btrfs: dev-replace: properly validate device names + CVE-2024-26793: (unk) gtp: fix use-after-free and null-ptr-deref in gtp_newlink() + CVE-2024-26795: (unk) riscv: Sparse-Memory/vmemmap out-of-bounds fix + CVE-2024-26797: (unk) drm/amd/display: Prevent potential buffer overflow in map_hw_resources + CVE-2024-26798: (unk) fbcon: always restore the old font data in fbcon_do_set_font() + CVE-2024-26799: (unk) ASoC: qcom: Fix uninitialized pointer dmactl + CVE-2024-26801: (unk) Bluetooth: Avoid potential use-after-free in hci_error_reset + CVE-2024-26802: (unk) stmmac: Clear variable when destroying workqueue + CVE-2024-26803: (unk) net: veth: clear GRO when clearing XDP even when down + CVE-2024-26804: (unk) net: ip_tunnel: prevent perpetual headroom growth + CVE-2024-26805: (unk) netlink: Fix kernel-infoleak-after-free in __skb_datagram_iter + CVE-2024-26806: (unk) spi: cadence-qspi: remove system-wide suspend helper calls from runtime PM hooks + CVE-2024-26808: (unk) netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain + CVE-2024-26809: (unk) netfilter: nft_set_pipapo: release elements in clone only from destroy path diff --git a/data/5.19/5.19_CVEs.txt b/data/5.19/5.19_CVEs.txt index 019b2df37..f7f20a0aa 100644 --- a/data/5.19/5.19_CVEs.txt +++ b/data/5.19/5.19_CVEs.txt @@ -26,6 +26,7 @@ CVE-2019-16089: Fix unknown CVE-2019-19378: Fix unknown CVE-2019-19814: Fix unknown CVE-2019-20794: Fix unknown +CVE-2019-25162: Fix not seen in stream CVE-2020-0347: Fix unknown CVE-2020-10708: Fix unknown CVE-2020-11725: Fix unknown @@ -141,7 +142,7 @@ CVE-2022-4139: Fix not seen in stream CVE-2022-41674: Fixed with 5.19.16 CVE-2022-41848: Fix unknown CVE-2022-41849: Fix not seen in stream -CVE-2022-41850: Fix not seen in stream +CVE-2022-41850: Fixed with 5.19.17 CVE-2022-42328: Fix not seen in stream CVE-2022-42329: Fix not seen in stream CVE-2022-42432: Fixed with 5.19.12 @@ -186,6 +187,7 @@ CVE-2022-48423: Fix not seen in stream CVE-2022-48424: Fix not seen in stream CVE-2022-48425: Fix not seen in stream CVE-2022-48502: Fix not seen in stream +CVE-2022-48628: Fix not seen in stream CVE-2023-0045: Fix not seen in stream CVE-2023-0160: Fix not seen in stream CVE-2023-0179: Fix not seen in stream @@ -278,6 +280,7 @@ CVE-2023-28327: Fix not seen in stream CVE-2023-28328: Fix not seen in stream CVE-2023-28466: Fix not seen in stream CVE-2023-2860: Fix not seen in stream +CVE-2023-28746: Fix not seen in stream CVE-2023-28866: Fix not seen in stream CVE-2023-2898: Fix not seen in stream CVE-2023-2985: Fix not seen in stream @@ -394,7 +397,7 @@ CVE-2023-46343: Fix not seen in stream CVE-2023-46813: Fix not seen in stream CVE-2023-46838: Fix not seen in stream CVE-2023-46862: Fix not seen in stream -CVE-2023-47233: Fix unknown +CVE-2023-47233: Fix not seen in stream CVE-2023-4881: Fix not seen in stream CVE-2023-4921: Fix not seen in stream CVE-2023-50431: Fix not seen in stream @@ -426,20 +429,141 @@ CVE-2023-52451: Fix not seen in stream CVE-2023-52452: Fix not seen in stream CVE-2023-52454: Fix not seen in stream CVE-2023-52456: Fix not seen in stream -CVE-2023-52457: Fix not seen in stream CVE-2023-52458: Fix not seen in stream CVE-2023-52462: Fix not seen in stream CVE-2023-52463: Fix not seen in stream CVE-2023-52464: Fix not seen in stream +CVE-2023-52467: Fix not seen in stream +CVE-2023-52469: Fix not seen in stream +CVE-2023-52470: Fix not seen in stream +CVE-2023-52474: Fix not seen in stream +CVE-2023-52475: Fix not seen in stream +CVE-2023-52476: Fix not seen in stream +CVE-2023-52477: Fix not seen in stream +CVE-2023-52478: Fix not seen in stream +CVE-2023-52479: Fix not seen in stream +CVE-2023-52480: Fix not seen in stream +CVE-2023-52481: Fix not seen in stream +CVE-2023-52482: Fix not seen in stream +CVE-2023-52483: Fix not seen in stream +CVE-2023-52484: Fix not seen in stream +CVE-2023-52485: Fix not seen in stream +CVE-2023-52486: Fix not seen in stream +CVE-2023-52488: Fix not seen in stream +CVE-2023-52489: Fix not seen in stream +CVE-2023-52491: Fix not seen in stream +CVE-2023-52492: Fix not seen in stream +CVE-2023-52493: Fix not seen in stream +CVE-2023-52494: Fix not seen in stream +CVE-2023-52497: Fix not seen in stream +CVE-2023-52498: Fix not seen in stream +CVE-2023-52499: Fix not seen in stream +CVE-2023-52500: Fix not seen in stream +CVE-2023-52501: Fix not seen in stream +CVE-2023-52502: Fix not seen in stream +CVE-2023-52503: Fix not seen in stream +CVE-2023-52504: Fix not seen in stream +CVE-2023-52505: Fix not seen in stream +CVE-2023-52506: Fix not seen in stream +CVE-2023-52507: Fix not seen in stream +CVE-2023-52508: Fix not seen in stream +CVE-2023-52509: Fix not seen in stream +CVE-2023-52510: Fix not seen in stream +CVE-2023-52511: Fix not seen in stream +CVE-2023-52512: Fix not seen in stream +CVE-2023-52513: Fix not seen in stream +CVE-2023-52515: Fix not seen in stream +CVE-2023-52516: Fix not seen in stream +CVE-2023-52517: Fix not seen in stream +CVE-2023-52518: Fix not seen in stream +CVE-2023-52519: Fix not seen in stream +CVE-2023-52520: Fix not seen in stream +CVE-2023-52522: Fix not seen in stream +CVE-2023-52523: Fix not seen in stream +CVE-2023-52527: Fix not seen in stream +CVE-2023-52528: Fix not seen in stream +CVE-2023-52529: Fix not seen in stream +CVE-2023-52530: Fix not seen in stream +CVE-2023-52531: Fix not seen in stream +CVE-2023-52532: Fix not seen in stream +CVE-2023-52559: Fix not seen in stream +CVE-2023-52560: Fix not seen in stream +CVE-2023-52561: Fix not seen in stream +CVE-2023-52563: Fix not seen in stream +CVE-2023-52565: Fix not seen in stream +CVE-2023-52566: Fix not seen in stream +CVE-2023-52568: Fix not seen in stream +CVE-2023-52569: Fix not seen in stream +CVE-2023-52571: Fix not seen in stream +CVE-2023-52572: Fix not seen in stream +CVE-2023-52573: Fix not seen in stream +CVE-2023-52574: Fix not seen in stream +CVE-2023-52576: Fix not seen in stream +CVE-2023-52578: Fix not seen in stream +CVE-2023-52580: Fix not seen in stream +CVE-2023-52582: Fix not seen in stream +CVE-2023-52583: Fix not seen in stream +CVE-2023-52584: Fix not seen in stream +CVE-2023-52585: Fix not seen in stream +CVE-2023-52586: Fix not seen in stream +CVE-2023-52587: Fix not seen in stream +CVE-2023-52588: Fix not seen in stream +CVE-2023-52589: Fix not seen in stream +CVE-2023-52590: Fix not seen in stream +CVE-2023-52591: Fix not seen in stream +CVE-2023-52593: Fix not seen in stream +CVE-2023-52594: Fix not seen in stream +CVE-2023-52595: Fix not seen in stream +CVE-2023-52596: Fix not seen in stream +CVE-2023-52597: Fix not seen in stream +CVE-2023-52598: Fix not seen in stream +CVE-2023-52599: Fix not seen in stream +CVE-2023-52600: Fix not seen in stream +CVE-2023-52601: Fix not seen in stream +CVE-2023-52602: Fix not seen in stream +CVE-2023-52603: Fix not seen in stream +CVE-2023-52604: Fix not seen in stream +CVE-2023-52606: Fix not seen in stream +CVE-2023-52607: Fix not seen in stream +CVE-2023-52608: Fix not seen in stream +CVE-2023-52609: Fix not seen in stream +CVE-2023-52610: Fix not seen in stream +CVE-2023-52612: Fix not seen in stream +CVE-2023-52614: Fix not seen in stream +CVE-2023-52615: Fix not seen in stream +CVE-2023-52616: Fix not seen in stream +CVE-2023-52617: Fix not seen in stream +CVE-2023-52618: Fix not seen in stream +CVE-2023-52619: Fix not seen in stream +CVE-2023-52620: Fix not seen in stream +CVE-2023-52621: Fix not seen in stream +CVE-2023-52622: Fix not seen in stream +CVE-2023-52623: Fix not seen in stream +CVE-2023-52624: Fix not seen in stream +CVE-2023-52625: Fix not seen in stream +CVE-2023-52627: Fix not seen in stream +CVE-2023-52628: Fix not seen in stream +CVE-2023-52629: Fix not seen in stream +CVE-2023-52630: Fix not seen in stream +CVE-2023-52631: Fix not seen in stream +CVE-2023-52632: Fix not seen in stream +CVE-2023-52633: Fix not seen in stream +CVE-2023-52634: Fix not seen in stream +CVE-2023-52635: Fix not seen in stream +CVE-2023-52637: Fix not seen in stream +CVE-2023-52638: Fix not seen in stream +CVE-2023-52639: Fix not seen in stream +CVE-2023-52640: Fix not seen in stream +CVE-2023-52641: Fix not seen in stream CVE-2023-5717: Fix not seen in stream CVE-2023-6039: Fix not seen in stream CVE-2023-6121: Fix not seen in stream CVE-2023-6176: Fix not seen in stream CVE-2023-6240: Fix unknown -CVE-2023-6270: Fix unknown -CVE-2023-6356: Fix unknown +CVE-2023-6270: Fix not seen in stream +CVE-2023-6356: Fix not seen in stream CVE-2023-6535: Fix unknown -CVE-2023-6536: Fix unknown +CVE-2023-6536: Fix not seen in stream CVE-2023-6546: Fix not seen in stream CVE-2023-6560: Fix not seen in stream CVE-2023-6606: Fix not seen in stream @@ -449,7 +573,7 @@ CVE-2023-6817: Fix not seen in stream CVE-2023-6915: Fix not seen in stream CVE-2023-6931: Fix not seen in stream CVE-2023-6932: Fix not seen in stream -CVE-2023-7042: Fix unknown +CVE-2023-7042: Fix not seen in stream CVE-2023-7192: Fix not seen in stream CVE-2024-0340: Fix not seen in stream CVE-2024-0562: Fixed with 5.19.6 @@ -461,17 +585,18 @@ CVE-2024-0639: Fix not seen in stream CVE-2024-0641: Fix not seen in stream CVE-2024-0646: Fix not seen in stream CVE-2024-0775: Fix not seen in stream -CVE-2024-0841: Fix unknown +CVE-2024-0841: Fix not seen in stream CVE-2024-1085: Fix not seen in stream CVE-2024-1086: Fix not seen in stream CVE-2024-1151: Fix not seen in stream CVE-2024-1312: Fix not seen in stream CVE-2024-21803: Fix unknown -CVE-2024-22099: Fix unknown +CVE-2024-2193: Fix unknown +CVE-2024-22099: Fix not seen in stream CVE-2024-22386: Fix unknown CVE-2024-22705: Fix not seen in stream -CVE-2024-23196: Fix unknown -CVE-2024-23307: Fix unknown +CVE-2024-23196: Fix not seen in stream +CVE-2024-23307: Fix not seen in stream CVE-2024-23848: Fix unknown CVE-2024-23849: Fix not seen in stream CVE-2024-23850: Fix not seen in stream @@ -481,7 +606,7 @@ CVE-2024-24857: Fix unknown CVE-2024-24858: Fix unknown CVE-2024-24859: Fix unknown CVE-2024-24860: Fix not seen in stream -CVE-2024-24861: Fix unknown +CVE-2024-24861: Fix not seen in stream CVE-2024-24864: Fix unknown CVE-2024-25739: Fix unknown CVE-2024-25740: Fix unknown @@ -491,8 +616,6 @@ CVE-2024-26583: Fix not seen in stream CVE-2024-26584: Fix not seen in stream CVE-2024-26585: Fix not seen in stream CVE-2024-26586: Fix not seen in stream -CVE-2024-26587: Fix not seen in stream -CVE-2024-26588: Fix not seen in stream CVE-2024-26589: Fix not seen in stream CVE-2024-26590: Fix not seen in stream CVE-2024-26591: Fix not seen in stream @@ -503,3 +626,144 @@ CVE-2024-26595: Fix not seen in stream CVE-2024-26597: Fix not seen in stream CVE-2024-26598: Fix not seen in stream CVE-2024-26599: Fix not seen in stream +CVE-2024-26600: Fix not seen in stream +CVE-2024-26601: Fix not seen in stream +CVE-2024-26602: Fix not seen in stream +CVE-2024-26603: Fix not seen in stream +CVE-2024-26606: Fix not seen in stream +CVE-2024-26607: Fix not seen in stream +CVE-2024-26608: Fix not seen in stream +CVE-2024-26610: Fix not seen in stream +CVE-2024-26612: Fix not seen in stream +CVE-2024-26614: Fix not seen in stream +CVE-2024-26615: Fix not seen in stream +CVE-2024-26622: Fix not seen in stream +CVE-2024-26623: Fix not seen in stream +CVE-2024-26625: Fix not seen in stream +CVE-2024-26627: Fix not seen in stream +CVE-2024-26629: Fix not seen in stream +CVE-2024-26631: Fix not seen in stream +CVE-2024-26632: Fix not seen in stream +CVE-2024-26633: Fix not seen in stream +CVE-2024-26635: Fix not seen in stream +CVE-2024-26636: Fix not seen in stream +CVE-2024-26638: Fix not seen in stream +CVE-2024-26640: Fix not seen in stream +CVE-2024-26641: Fix not seen in stream +CVE-2024-26642: Fix not seen in stream +CVE-2024-26644: Fix not seen in stream +CVE-2024-26645: Fix not seen in stream +CVE-2024-26646: Fix not seen in stream +CVE-2024-26647: Fix not seen in stream +CVE-2024-26648: Fix not seen in stream +CVE-2024-26650: Fix not seen in stream +CVE-2024-26651: Fix not seen in stream +CVE-2024-26654: Fix not seen in stream +CVE-2024-26655: Fix not seen in stream +CVE-2024-26656: Fix not seen in stream +CVE-2024-26658: Fix not seen in stream +CVE-2024-26659: Fix not seen in stream +CVE-2024-26660: Fix not seen in stream +CVE-2024-26661: Fix not seen in stream +CVE-2024-26662: Fix not seen in stream +CVE-2024-26663: Fix not seen in stream +CVE-2024-26664: Fix not seen in stream +CVE-2024-26665: Fix not seen in stream +CVE-2024-26667: Fix not seen in stream +CVE-2024-26668: Fix not seen in stream +CVE-2024-26669: Fix not seen in stream +CVE-2024-26671: Fix not seen in stream +CVE-2024-26672: Fix not seen in stream +CVE-2024-26673: Fix not seen in stream +CVE-2024-26675: Fix not seen in stream +CVE-2024-26676: Fix not seen in stream +CVE-2024-26677: Fix not seen in stream +CVE-2024-26679: Fix not seen in stream +CVE-2024-26680: Fix not seen in stream +CVE-2024-26684: Fix not seen in stream +CVE-2024-26685: Fix not seen in stream +CVE-2024-26686: Fix not seen in stream +CVE-2024-26687: Fix not seen in stream +CVE-2024-26688: Fix not seen in stream +CVE-2024-26689: Fix not seen in stream +CVE-2024-26691: Fix not seen in stream +CVE-2024-26696: Fix not seen in stream +CVE-2024-26697: Fix not seen in stream +CVE-2024-26698: Fix not seen in stream +CVE-2024-26699: Fix not seen in stream +CVE-2024-26700: Fix not seen in stream +CVE-2024-26702: Fix not seen in stream +CVE-2024-26704: Fix not seen in stream +CVE-2024-26706: Fix not seen in stream +CVE-2024-26707: Fix not seen in stream +CVE-2024-26712: Fix not seen in stream +CVE-2024-26713: Fix not seen in stream +CVE-2024-26714: Fix not seen in stream +CVE-2024-26715: Fix not seen in stream +CVE-2024-26717: Fix not seen in stream +CVE-2024-26718: Fix not seen in stream +CVE-2024-26719: Fix not seen in stream +CVE-2024-26720: Fix not seen in stream +CVE-2024-26726: Fix not seen in stream +CVE-2024-26727: Fix not seen in stream +CVE-2024-26733: Fix not seen in stream +CVE-2024-26735: Fix not seen in stream +CVE-2024-26736: Fix not seen in stream +CVE-2024-26737: Fix not seen in stream +CVE-2024-26738: Fix not seen in stream +CVE-2024-26739: Fix not seen in stream +CVE-2024-26740: Fix not seen in stream +CVE-2024-26743: Fix not seen in stream +CVE-2024-26744: Fix not seen in stream +CVE-2024-26745: Fix not seen in stream +CVE-2024-26747: Fix not seen in stream +CVE-2024-26748: Fix not seen in stream +CVE-2024-26749: Fix not seen in stream +CVE-2024-26751: Fix not seen in stream +CVE-2024-26752: Fix not seen in stream +CVE-2024-26753: Fix not seen in stream +CVE-2024-26754: Fix not seen in stream +CVE-2024-26756: Fix not seen in stream +CVE-2024-26757: Fix not seen in stream +CVE-2024-26758: Fix not seen in stream +CVE-2024-26759: Fix not seen in stream +CVE-2024-26760: Fix not seen in stream +CVE-2024-26761: Fix not seen in stream +CVE-2024-26763: Fix not seen in stream +CVE-2024-26764: Fix not seen in stream +CVE-2024-26765: Fix not seen in stream +CVE-2024-26766: Fix not seen in stream +CVE-2024-26767: Fix not seen in stream +CVE-2024-26768: Fix not seen in stream +CVE-2024-26769: Fix not seen in stream +CVE-2024-26770: Fix not seen in stream +CVE-2024-26771: Fix not seen in stream +CVE-2024-26772: Fix not seen in stream +CVE-2024-26773: Fix not seen in stream +CVE-2024-26774: Fix not seen in stream +CVE-2024-26775: Fix not seen in stream +CVE-2024-26776: Fix not seen in stream +CVE-2024-26777: Fix not seen in stream +CVE-2024-26778: Fix not seen in stream +CVE-2024-26779: Fix not seen in stream +CVE-2024-26782: Fix not seen in stream +CVE-2024-26783: Fix not seen in stream +CVE-2024-26784: Fix not seen in stream +CVE-2024-26787: Fix not seen in stream +CVE-2024-26788: Fix not seen in stream +CVE-2024-26789: Fix not seen in stream +CVE-2024-26790: Fix not seen in stream +CVE-2024-26791: Fix not seen in stream +CVE-2024-26793: Fix not seen in stream +CVE-2024-26795: Fix not seen in stream +CVE-2024-26797: Fix not seen in stream +CVE-2024-26798: Fix not seen in stream +CVE-2024-26799: Fix not seen in stream +CVE-2024-26801: Fix not seen in stream +CVE-2024-26802: Fix not seen in stream +CVE-2024-26803: Fix not seen in stream +CVE-2024-26804: Fix not seen in stream +CVE-2024-26805: Fix not seen in stream +CVE-2024-26806: Fix not seen in stream +CVE-2024-26808: Fix not seen in stream +CVE-2024-26809: Fix not seen in stream diff --git a/data/5.19/5.19_security.txt b/data/5.19/5.19_security.txt index 9401c91ec..2ec5fc56d 100644 --- a/data/5.19/5.19_security.txt +++ b/data/5.19/5.19_security.txt @@ -82,6 +82,7 @@ CVEs fixed in 5.19.17: CVE-2022-3565: 1f76323ac43fe0b00677794c930dee9f66ea2999 mISDN: fix use-after-free bugs in l1oip timer handlers CVE-2022-3594: 2e896abccf99fef76691d8e1019bd44105a12e1f r8152: Rate limit overflow messages CVE-2022-3623: 86a913d55c89dd13ba070a87f61a493563e94b54 mm/hugetlb: fix races when looking up a CONT-PTE/PMD size hugetlb page + CVE-2022-41850: 2d38886ae0365463cdba3db669170eef1e3d55c0 HID: roccat: Fix use-after-free in roccat_read() CVE-2022-43945: c2a878095b5c6f04f90553a3c45872f990dab14e NFSD: Protect against send buffer overflow in NFSv2 READDIR Outstanding CVEs: @@ -113,6 +114,7 @@ Outstanding CVEs: CVE-2019-19378: (unk) CVE-2019-19814: (unk) CVE-2019-20794: (unk) + CVE-2019-25162: (unk) i2c: Fix a potential use after free CVE-2020-0347: (unk) CVE-2020-10708: (unk) CVE-2020-11725: (unk) @@ -193,7 +195,6 @@ Outstanding CVEs: CVE-2022-4139: (unk) drm/i915: fix TLB invalidation for Gen12 video and compute engines CVE-2022-41848: (unk) CVE-2022-41849: (unk) fbdev: smscufx: Fix use-after-free in ufx_ops_open() - CVE-2022-41850: (unk) HID: roccat: Fix use-after-free in roccat_read() CVE-2022-42328: (unk) xen/netback: don't call kfree_skb() with interrupts disabled CVE-2022-42329: (unk) xen/netback: don't call kfree_skb() with interrupts disabled CVE-2022-4269: (unk) act_mirred: use the backlog for nested calls to mirred ingress @@ -224,6 +225,7 @@ Outstanding CVEs: CVE-2022-48424: (unk) fs/ntfs3: Validate attribute name offset CVE-2022-48425: (unk) fs/ntfs3: Validate MFT flags before replaying logs CVE-2022-48502: (unk) fs/ntfs3: Check fields while reading + CVE-2022-48628: (unk) ceph: drop messages from MDS when unmounting CVE-2023-0045: (unk) x86/bugs: Flush IBP in ib_prctl_set() CVE-2023-0160: (unk) bpf, sockmap: fix deadlocks in the sockhash and sockmap CVE-2023-0179: (unk) netfilter: nft_payload: incorrect arithmetics when fetching VLAN header bits @@ -311,6 +313,7 @@ Outstanding CVEs: CVE-2023-28328: (unk) media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer() CVE-2023-28466: (unk) net: tls: fix possible race condition between do_tls_getsockopt_conf() and do_tls_setsockopt_conf() CVE-2023-2860: (unk) ipv6: sr: fix out-of-bounds read when setting HMAC data. + CVE-2023-28746: (unk) x86/mmio: Disable KVM mitigation when X86_FEATURE_CLEAR_CPU_BUF is set CVE-2023-28866: (unk) Bluetooth: HCI: Fix global-out-of-bounds CVE-2023-2898: (unk) f2fs: fix to avoid NULL pointer dereference f2fs_write_end_io() CVE-2023-2985: (unk) fs: hfsplus: fix UAF issue in hfsplus_put_super @@ -425,7 +428,7 @@ Outstanding CVEs: CVE-2023-46813: (unk) x86/sev: Check for user-space IOIO pointing to kernel space CVE-2023-46838: (unk) xen-netback: don't produce zero-size SKB frags CVE-2023-46862: (unk) io_uring/fdinfo: lock SQ thread while retrieving thread cpu/pid - CVE-2023-47233: (unk) + CVE-2023-47233: (unk) wifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach CVE-2023-4881: (unk) netfilter: nftables: exthdr: fix 4-byte stack OOB write CVE-2023-4921: (unk) net: sched: sch_qfq: Fix UAF in qfq_dequeue() CVE-2023-50431: (unk) accel/habanalabs: fix information leak in sec_attest_info() @@ -457,20 +460,141 @@ Outstanding CVEs: CVE-2023-52452: (unk) bpf: Fix accesses to uninit stack slots CVE-2023-52454: (unk) nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length CVE-2023-52456: (unk) serial: imx: fix tx statemachine deadlock - CVE-2023-52457: (unk) serial: 8250: omap: Don't skip resource freeing if pm_runtime_resume_and_get() failed CVE-2023-52458: (unk) block: add check that partition length needs to be aligned with block size CVE-2023-52462: (unk) bpf: fix check for attempt to corrupt spilled pointer CVE-2023-52463: (unk) efivarfs: force RO when remounting if SetVariable is not supported CVE-2023-52464: (unk) EDAC/thunderx: Fix possible out-of-bounds string access + CVE-2023-52467: (unk) mfd: syscon: Fix null pointer dereference in of_syscon_register() + CVE-2023-52469: (unk) drivers/amd/pm: fix a use-after-free in kv_parse_power_table + CVE-2023-52470: (unk) drm/radeon: check the alloc_workqueue return value in radeon_crtc_init() + CVE-2023-52474: (unk) IB/hfi1: Fix bugs with non-PAGE_SIZE-end multi-iovec user SDMA requests + CVE-2023-52475: (unk) Input: powermate - fix use-after-free in powermate_config_complete + CVE-2023-52476: (unk) perf/x86/lbr: Filter vsyscall addresses + CVE-2023-52477: (unk) usb: hub: Guard against accesses to uninitialized BOS descriptors + CVE-2023-52478: (unk) HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect + CVE-2023-52479: (unk) ksmbd: fix uaf in smb20_oplock_break_ack + CVE-2023-52480: (unk) ksmbd: fix race condition between session lookup and expire + CVE-2023-52481: (unk) arm64: errata: Add Cortex-A520 speculative unprivileged load workaround + CVE-2023-52482: (unk) x86/srso: Add SRSO mitigation for Hygon processors + CVE-2023-52483: (unk) mctp: perform route lookups under a RCU read-side lock + CVE-2023-52484: (unk) iommu/arm-smmu-v3: Fix soft lockup triggered by arm_smmu_mm_invalidate_range + CVE-2023-52485: (unk) drm/amd/display: Wake DMCUB before sending a command + CVE-2023-52486: (unk) drm: Don't unref the same fb many times by mistake due to deadlock handling + CVE-2023-52488: (unk) serial: sc16is7xx: convert from _raw_ to _noinc_ regmap functions for FIFO + CVE-2023-52489: (unk) mm/sparsemem: fix race in accessing memory_section->usage + CVE-2023-52491: (unk) media: mtk-jpeg: Fix use after free bug due to error path handling in mtk_jpeg_dec_device_run + CVE-2023-52492: (unk) dmaengine: fix NULL pointer in channel unregistration function + CVE-2023-52493: (unk) bus: mhi: host: Drop chan lock before queuing buffers + CVE-2023-52494: (unk) bus: mhi: host: Add alignment check for event ring read pointer + CVE-2023-52497: (unk) erofs: fix lz4 inplace decompression + CVE-2023-52498: (unk) PM: sleep: Fix possible deadlocks in core system-wide PM code + CVE-2023-52499: (unk) powerpc/47x: Fix 47x syscall return crash + CVE-2023-52500: (unk) scsi: pm80xx: Avoid leaking tags when processing OPC_INB_SET_CONTROLLER_CONFIG command + CVE-2023-52501: (unk) ring-buffer: Do not attempt to read past "commit" + CVE-2023-52502: (unk) net: nfc: fix races in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn() + CVE-2023-52503: (unk) tee: amdtee: fix use-after-free vulnerability in amdtee_close_session + CVE-2023-52504: (unk) x86/alternatives: Disable KASAN in apply_alternatives() + CVE-2023-52505: (unk) phy: lynx-28g: serialize concurrent phy_set_mode_ext() calls to shared registers + CVE-2023-52506: (unk) LoongArch: Set all reserved memblocks on Node#0 at initialization + CVE-2023-52507: (unk) nfc: nci: assert requested protocol is valid + CVE-2023-52508: (unk) nvme-fc: Prevent null pointer dereference in nvme_fc_io_getuuid() + CVE-2023-52509: (unk) ravb: Fix use-after-free issue in ravb_tx_timeout_work() + CVE-2023-52510: (unk) ieee802154: ca8210: Fix a potential UAF in ca8210_probe + CVE-2023-52511: (unk) spi: sun6i: reduce DMA RX transfer width to single byte + CVE-2023-52512: (unk) pinctrl: nuvoton: wpcm450: fix out of bounds write + CVE-2023-52513: (unk) RDMA/siw: Fix connection failure handling + CVE-2023-52515: (unk) RDMA/srp: Do not call scsi_done() from srp_abort() + CVE-2023-52516: (unk) dma-debug: don't call __dma_entry_alloc_check_leak() under free_entries_lock + CVE-2023-52517: (unk) spi: sun6i: fix race between DMA RX transfer completion and RX FIFO drain + CVE-2023-52518: (unk) Bluetooth: hci_codec: Fix leaking content of local_codecs + CVE-2023-52519: (unk) HID: intel-ish-hid: ipc: Disable and reenable ACPI GPE bit + CVE-2023-52520: (unk) platform/x86: think-lmi: Fix reference leak + CVE-2023-52522: (unk) net: fix possible store tearing in neigh_periodic_work() + CVE-2023-52523: (unk) bpf, sockmap: Reject sk_msg egress redirects to non-TCP sockets + CVE-2023-52527: (unk) ipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data() + CVE-2023-52528: (unk) net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg + CVE-2023-52529: (unk) HID: sony: Fix a potential memory leak in sony_probe() + CVE-2023-52530: (unk) wifi: mac80211: fix potential key use-after-free + CVE-2023-52531: (unk) wifi: iwlwifi: mvm: Fix a memory corruption issue + CVE-2023-52532: (unk) net: mana: Fix TX CQE error handling + CVE-2023-52559: (unk) iommu/vt-d: Avoid memory allocation in iommu_suspend() + CVE-2023-52560: (unk) mm/damon/vaddr-test: fix memory leak in damon_do_test_apply_three_regions() + CVE-2023-52561: (unk) arm64: dts: qcom: sdm845-db845c: Mark cont splash memory region as reserved + CVE-2023-52563: (unk) drm/meson: fix memory leak on ->hpd_notify callback + CVE-2023-52565: (unk) media: uvcvideo: Fix OOB read + CVE-2023-52566: (unk) nilfs2: fix potential use after free in nilfs_gccache_submit_read_data() + CVE-2023-52568: (unk) x86/sgx: Resolves SECS reclaim vs. page fault for EAUG race + CVE-2023-52569: (unk) btrfs: remove BUG() after failure to insert delayed dir index item + CVE-2023-52571: (unk) power: supply: rk817: Fix node refcount leak + CVE-2023-52572: (unk) cifs: Fix UAF in cifs_demultiplex_thread() + CVE-2023-52573: (unk) net: rds: Fix possible NULL-pointer dereference + CVE-2023-52574: (unk) team: fix null-ptr-deref when team device type is changed + CVE-2023-52576: (unk) x86/mm, kexec, ima: Use memblock_free_late() from ima_free_kexec_buffer() + CVE-2023-52578: (unk) net: bridge: use DEV_STATS_INC() + CVE-2023-52580: (unk) net/core: Fix ETH_P_1588 flow dissector + CVE-2023-52582: (unk) netfs: Only call folio_start_fscache() one time for each folio + CVE-2023-52583: (unk) ceph: fix deadlock or deadcode of misusing dget() + CVE-2023-52584: (unk) spmi: mediatek: Fix UAF on device remove + CVE-2023-52585: (unk) drm/amdgpu: Fix possible NULL dereference in amdgpu_ras_query_error_status_helper() + CVE-2023-52586: (unk) drm/msm/dpu: Add mutex lock in control vblank irq + CVE-2023-52587: (unk) IB/ipoib: Fix mcast list locking + CVE-2023-52588: (unk) f2fs: fix to tag gcing flag on page during block migration + CVE-2023-52589: (unk) media: rkisp1: Fix IRQ disable race issue + CVE-2023-52590: (unk) ocfs2: Avoid touching renamed directory if parent does not change + CVE-2023-52591: (unk) reiserfs: Avoid touching renamed directory if parent does not change + CVE-2023-52593: (unk) wifi: wfx: fix possible NULL pointer dereference in wfx_set_mfp_ap() + CVE-2023-52594: (unk) wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus() + CVE-2023-52595: (unk) wifi: rt2x00: restart beacon queue when hardware reset + CVE-2023-52596: (unk) sysctl: Fix out of bounds access for empty sysctl registers + CVE-2023-52597: (unk) KVM: s390: fix setting of fpc register + CVE-2023-52598: (unk) s390/ptrace: handle setting of fpc register correctly + CVE-2023-52599: (unk) jfs: fix array-index-out-of-bounds in diNewExt + CVE-2023-52600: (unk) jfs: fix uaf in jfs_evict_inode + CVE-2023-52601: (unk) jfs: fix array-index-out-of-bounds in dbAdjTree + CVE-2023-52602: (unk) jfs: fix slab-out-of-bounds Read in dtSearch + CVE-2023-52603: (unk) UBSAN: array-index-out-of-bounds in dtSplitRoot + CVE-2023-52604: (unk) FS:JFS:UBSAN:array-index-out-of-bounds in dbAdjTree + CVE-2023-52606: (unk) powerpc/lib: Validate size for vector operations + CVE-2023-52607: (unk) powerpc/mm: Fix null-pointer dereference in pgtable_cache_add + CVE-2023-52608: (unk) firmware: arm_scmi: Check mailbox/SMT channel for consistency + CVE-2023-52609: (unk) binder: fix race between mmput() and do_exit() + CVE-2023-52610: (unk) net/sched: act_ct: fix skb leak and crash on ooo frags + CVE-2023-52612: (unk) crypto: scomp - fix req->dst buffer overflow + CVE-2023-52614: (unk) PM / devfreq: Fix buffer overflow in trans_stat_show + CVE-2023-52615: (unk) hwrng: core - Fix page fault dead lock on mmap-ed hwrng + CVE-2023-52616: (unk) crypto: lib/mpi - Fix unexpected pointer access in mpi_ec_init + CVE-2023-52617: (unk) PCI: switchtec: Fix stdev_release() crash after surprise hot remove + CVE-2023-52618: (unk) block/rnbd-srv: Check for unlikely string overflow + CVE-2023-52619: (unk) pstore/ram: Fix crash when setting number of cpus to an odd number + CVE-2023-52620: (unk) netfilter: nf_tables: disallow timeout for anonymous sets + CVE-2023-52621: (unk) bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers + CVE-2023-52622: (unk) ext4: avoid online resizing failures due to oversized flex bg + CVE-2023-52623: (unk) SUNRPC: Fix a suspicious RCU usage warning + CVE-2023-52624: (unk) drm/amd/display: Wake DMCUB before executing GPINT commands + CVE-2023-52625: (unk) drm/amd/display: Refactor DMCUB enter/exit idle interface + CVE-2023-52627: (unk) iio: adc: ad7091r: Allow users to configure device events + CVE-2023-52628: (unk) netfilter: nftables: exthdr: fix 4-byte stack OOB write + CVE-2023-52629: (unk) sh: push-switch: Reorder cleanup operations to avoid use-after-free bug + CVE-2023-52630: (unk) blk-iocost: Fix an UBSAN shift-out-of-bounds warning + CVE-2023-52631: (unk) fs/ntfs3: Fix an NULL dereference bug + CVE-2023-52632: (unk) drm/amdkfd: Fix lock dependency warning with srcu + CVE-2023-52633: (unk) um: time-travel: fix time corruption + CVE-2023-52634: (unk) drm/amd/display: Fix disable_otg_wa logic + CVE-2023-52635: (unk) PM / devfreq: Synchronize devfreq_monitor_[start/stop] + CVE-2023-52637: (unk) can: j1939: Fix UAF in j1939_sk_match_filter during setsockopt(SO_J1939_FILTER) + CVE-2023-52638: (unk) can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock + CVE-2023-52639: (unk) KVM: s390: vsie: fix race during shadow creation + CVE-2023-52640: (unk) fs/ntfs3: Fix oob in ntfs_listxattr + CVE-2023-52641: (unk) fs/ntfs3: Add NULL ptr dereference checking at the end of attr_allocate_frame() CVE-2023-5717: (unk) perf: Disallow mis-matched inherited group reads CVE-2023-6039: (unk) net: usb: lan78xx: reorder cleanup operations to avoid UAF bugs CVE-2023-6121: (unk) nvmet: nul-terminate the NQNs passed in the connect command CVE-2023-6176: (unk) net/tls: do not free tls_rec on async operation in bpf_exec_tx_verdict() CVE-2023-6240: (unk) - CVE-2023-6270: (unk) - CVE-2023-6356: (unk) + CVE-2023-6270: (unk) aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts + CVE-2023-6356: (unk) nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length CVE-2023-6535: (unk) - CVE-2023-6536: (unk) + CVE-2023-6536: (unk) nvmet-tcp: fix a crash in nvmet_req_complete() CVE-2023-6546: (unk) tty: n_gsm: fix the UAF caused by race condition in gsm_cleanup_mux CVE-2023-6560: (unk) io_uring: don't allow discontig pages for IORING_SETUP_NO_MMAP CVE-2023-6606: (unk) smb: client: fix OOB in smbCalcSize() @@ -480,7 +604,7 @@ Outstanding CVEs: CVE-2023-6915: (unk) ida: Fix crash in ida_free when the bitmap is empty CVE-2023-6931: (unk) perf: Fix perf_event_validate_size() CVE-2023-6932: (unk) ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet - CVE-2023-7042: (unk) + CVE-2023-7042: (unk) wifi: ath10k: fix NULL pointer dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev() CVE-2023-7192: (unk) netfilter: ctnetlink: fix possible refcount leak in ctnetlink_create_conntrack() CVE-2024-0340: (unk) vhost: use kzalloc() instead of kmalloc() followed by memset() CVE-2024-0564: (unk) @@ -491,17 +615,18 @@ Outstanding CVEs: CVE-2024-0641: (unk) tipc: fix a potential deadlock on &tx->lock CVE-2024-0646: (unk) net: tls, update curr on splice as well CVE-2024-0775: (unk) ext4: improve error recovery code paths in __ext4_remount() - CVE-2024-0841: (unk) + CVE-2024-0841: (unk) fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super CVE-2024-1085: (unk) netfilter: nf_tables: check if catch-all set element is active in next generation CVE-2024-1086: (unk) netfilter: nf_tables: reject QUEUE/DROP verdict parameters CVE-2024-1151: (unk) net: openvswitch: limit the number of recursions from action sets CVE-2024-1312: (unk) mm: lock_vma_under_rcu() must check vma->anon_vma under vma lock CVE-2024-21803: (unk) - CVE-2024-22099: (unk) + CVE-2024-2193: (unk) + CVE-2024-22099: (unk) Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security CVE-2024-22386: (unk) CVE-2024-22705: (unk) ksmbd: fix slab-out-of-bounds in smb_strndup_from_utf16() - CVE-2024-23196: (unk) - CVE-2024-23307: (unk) + CVE-2024-23196: (unk) ALSA: hda: fix a possible null-pointer dereference due to data race in snd_hdac_regmap_sync() + CVE-2024-23307: (unk) md/raid5: fix atomicity violation in raid5_cache_count CVE-2024-23848: (unk) CVE-2024-23849: (unk) net/rds: Fix UBSAN: array-index-out-of-bounds in rds_cmsg_recv CVE-2024-23850: (unk) btrfs: do not ASSERT() if the newly created subvolume already got read @@ -511,7 +636,7 @@ Outstanding CVEs: CVE-2024-24858: (unk) CVE-2024-24859: (unk) CVE-2024-24860: (unk) Bluetooth: Fix atomicity violation in {min,max}_key_size_set - CVE-2024-24861: (unk) + CVE-2024-24861: (unk) media: xc4000: Fix atomicity violation in xc4000_get_frequency CVE-2024-24864: (unk) CVE-2024-25739: (unk) CVE-2024-25740: (unk) @@ -521,8 +646,6 @@ Outstanding CVEs: CVE-2024-26584: (unk) net: tls: handle backlogging of crypto requests CVE-2024-26585: (unk) tls: fix race between tx work scheduling and socket close CVE-2024-26586: (unk) mlxsw: spectrum_acl_tcam: Fix stack corruption - CVE-2024-26587: (unk) net: netdevsim: don't try to destroy PHC on VFs - CVE-2024-26588: (unk) LoongArch: BPF: Prevent out-of-bounds memory access CVE-2024-26589: (unk) bpf: Reject variable offset alu on PTR_TO_FLOW_KEYS CVE-2024-26590: (unk) erofs: fix inconsistent per-file compression format CVE-2024-26591: (unk) bpf: Fix re-attachment branch in bpf_tracing_prog_attach @@ -533,3 +656,144 @@ Outstanding CVEs: CVE-2024-26597: (unk) net: qualcomm: rmnet: fix global oob in rmnet_policy CVE-2024-26598: (unk) KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache CVE-2024-26599: (unk) pwm: Fix out-of-bounds access in of_pwm_single_xlate() + CVE-2024-26600: (unk) phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP + CVE-2024-26601: (unk) ext4: regenerate buddy after block freeing failed if under fc replay + CVE-2024-26602: (unk) sched/membarrier: reduce the ability to hammer on sys_membarrier + CVE-2024-26603: (unk) x86/fpu: Stop relying on userspace for info to fault in xsave buffer + CVE-2024-26606: (unk) binder: signal epoll threads of self-work + CVE-2024-26607: (unk) drm/bridge: sii902x: Fix probing race issue + CVE-2024-26608: (unk) ksmbd: fix global oob in ksmbd_nl_policy + CVE-2024-26610: (unk) wifi: iwlwifi: fix a memory corruption + CVE-2024-26612: (unk) netfs, fscache: Prevent Oops in fscache_put_cache() + CVE-2024-26614: (unk) tcp: make sure init the accept_queue's spinlocks once + CVE-2024-26615: (unk) net/smc: fix illegal rmb_desc access in SMC-D connection dump + CVE-2024-26622: (unk) tomoyo: fix UAF write bug in tomoyo_write_control() + CVE-2024-26623: (unk) pds_core: Prevent race issues involving the adminq + CVE-2024-26625: (unk) llc: call sock_orphan() at release time + CVE-2024-26627: (unk) scsi: core: Move scsi_host_busy() out of host lock for waking up EH handler + CVE-2024-26629: (unk) nfsd: fix RELEASE_LOCKOWNER + CVE-2024-26631: (unk) ipv6: mcast: fix data-race in ipv6_mc_down / mld_ifc_work + CVE-2024-26632: (unk) block: Fix iterating over an empty bio with bio_for_each_folio_all + CVE-2024-26633: (unk) ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim() + CVE-2024-26635: (unk) llc: Drop support for ETH_P_TR_802_2. + CVE-2024-26636: (unk) llc: make llc_ui_sendmsg() more robust against bonding changes + CVE-2024-26638: (unk) nbd: always initialize struct msghdr completely + CVE-2024-26640: (unk) tcp: add sanity checks to rx zerocopy + CVE-2024-26641: (unk) ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv() + CVE-2024-26642: (unk) netfilter: nf_tables: disallow anonymous set with timeout flag + CVE-2024-26644: (unk) btrfs: don't abort filesystem when attempting to snapshot deleted subvolume + CVE-2024-26645: (unk) tracing: Ensure visibility when inserting an element into tracing_map + CVE-2024-26646: (unk) thermal: intel: hfi: Add syscore callbacks for system-wide PM + CVE-2024-26647: (unk) drm/amd/display: Fix late derefrence 'dsc' check in 'link_set_dsc_pps_packet()' + CVE-2024-26648: (unk) drm/amd/display: Fix variable deferencing before NULL check in edp_setup_replay() + CVE-2024-26650: (unk) platform/x86: p2sb: Allow p2sb_bar() calls during PCI device probe + CVE-2024-26651: (unk) sr9800: Add check for usbnet_get_endpoints + CVE-2024-26654: (unk) ALSA: sh: aica: reorder cleanup operations to avoid UAF bugs + CVE-2024-26655: (unk) Fix memory leak in posix_clock_open() + CVE-2024-26656: (unk) drm/amdgpu: fix use-after-free bug + CVE-2024-26658: (unk) bcachefs: grab s_umount only if snapshotting + CVE-2024-26659: (unk) xhci: handle isoc Babble and Buffer Overrun events properly + CVE-2024-26660: (unk) drm/amd/display: Implement bounds check for stream encoder creation in DCN301 + CVE-2024-26661: (unk) drm/amd/display: Add NULL test for 'timing generator' in 'dcn21_set_pipe()' + CVE-2024-26662: (unk) drm/amd/display: Fix 'panel_cntl' could be null in 'dcn21_set_backlight_level()' + CVE-2024-26663: (unk) tipc: Check the bearer type before calling tipc_udp_nl_bearer_add() + CVE-2024-26664: (unk) hwmon: (coretemp) Fix out-of-bounds memory access + CVE-2024-26665: (unk) tunnels: fix out of bounds access when building IPv6 PMTU error + CVE-2024-26667: (unk) drm/msm/dpu: check for valid hw_pp in dpu_encoder_helper_phys_cleanup + CVE-2024-26668: (unk) netfilter: nft_limit: reject configurations that cause integer overflow + CVE-2024-26669: (unk) net/sched: flower: Fix chain template offload + CVE-2024-26671: (unk) blk-mq: fix IO hang from sbitmap wakeup race + CVE-2024-26672: (unk) drm/amdgpu: Fix variable 'mca_funcs' dereferenced before NULL check in 'amdgpu_mca_smu_get_mca_entry()' + CVE-2024-26673: (unk) netfilter: nft_ct: sanitize layer 3 and 4 protocol number in custom expectations + CVE-2024-26675: (unk) ppp_async: limit MRU to 64K + CVE-2024-26676: (unk) af_unix: Call kfree_skb() for dead unix_(sk)->oob_skb in GC. + CVE-2024-26677: (unk) rxrpc: Fix delayed ACKs to not set the reference serial number + CVE-2024-26679: (unk) inet: read sk->sk_family once in inet_recv_error() + CVE-2024-26680: (unk) net: atlantic: Fix DMA mapping for PTP hwts ring + CVE-2024-26684: (unk) net: stmmac: xgmac: fix handling of DPP safety error for DMA channels + CVE-2024-26685: (unk) nilfs2: fix potential bug in end_buffer_async_write + CVE-2024-26686: (unk) fs/proc: do_task_stat: use sig->stats_lock to gather the threads/children stats + CVE-2024-26687: (unk) xen/events: close evtchn after mapping cleanup + CVE-2024-26688: (unk) fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super + CVE-2024-26689: (unk) ceph: prevent use-after-free in encode_cap_msg() + CVE-2024-26691: (unk) KVM: arm64: Fix circular locking dependency + CVE-2024-26696: (unk) nilfs2: fix hang in nilfs_lookup_dirty_data_buffers() + CVE-2024-26697: (unk) nilfs2: fix data corruption in dsync block recovery for small block sizes + CVE-2024-26698: (unk) hv_netvsc: Fix race condition between netvsc_probe and netvsc_remove + CVE-2024-26699: (unk) drm/amd/display: Fix array-index-out-of-bounds in dcn35_clkmgr + CVE-2024-26700: (unk) drm/amd/display: Fix MST Null Ptr for RV + CVE-2024-26702: (unk) iio: magnetometer: rm3100: add boundary check for the value read from RM3100_REG_TMRC + CVE-2024-26704: (unk) ext4: fix double-free of blocks due to wrong extents moved_len + CVE-2024-26706: (unk) parisc: Fix random data corruption from exception handler + CVE-2024-26707: (unk) net: hsr: remove WARN_ONCE() in send_hsr_supervision_frame() + CVE-2024-26712: (unk) powerpc/kasan: Fix addr error caused by page alignment + CVE-2024-26713: (unk) powerpc/pseries/iommu: Fix iommu initialisation during DLPAR add + CVE-2024-26714: (unk) interconnect: qcom: sc8180x: Mark CO0 BCM keepalive + CVE-2024-26715: (unk) usb: dwc3: gadget: Fix NULL pointer dereference in dwc3_gadget_suspend + CVE-2024-26717: (unk) HID: i2c-hid-of: fix NULL-deref on failed power up + CVE-2024-26718: (unk) dm-crypt, dm-verity: disable tasklets + CVE-2024-26719: (unk) nouveau: offload fence uevents work to workqueue + CVE-2024-26720: (unk) mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again + CVE-2024-26726: (unk) btrfs: don't drop extent_map for free space inode on write error + CVE-2024-26727: (unk) btrfs: do not ASSERT() if the newly created subvolume already got read + CVE-2024-26733: (unk) arp: Prevent overflow in arp_req_get(). + CVE-2024-26735: (unk) ipv6: sr: fix possible use-after-free and null-ptr-deref + CVE-2024-26736: (unk) afs: Increase buffer size in afs_update_volume_status() + CVE-2024-26737: (unk) bpf: Fix racing between bpf_timer_cancel_and_free and bpf_timer_cancel + CVE-2024-26738: (unk) powerpc/pseries/iommu: DLPAR add doesn't completely initialize pci_controller + CVE-2024-26739: (unk) net/sched: act_mirred: don't override retval if we already lost the skb + CVE-2024-26740: (unk) net/sched: act_mirred: use the backlog for mirred ingress + CVE-2024-26743: (unk) RDMA/qedr: Fix qedr_create_user_qp error flow + CVE-2024-26744: (unk) RDMA/srpt: Support specifying the srpt_service_guid parameter + CVE-2024-26745: (unk) powerpc/pseries/iommu: IOMMU table is not initialized for kdump over SR-IOV + CVE-2024-26747: (unk) usb: roles: fix NULL pointer issue when put module's reference + CVE-2024-26748: (unk) usb: cdns3: fix memory double free when handle zero packet + CVE-2024-26749: (unk) usb: cdns3: fixed memory use after free at cdns3_gadget_ep_disable() + CVE-2024-26751: (unk) ARM: ep93xx: Add terminator to gpiod_lookup_table + CVE-2024-26752: (unk) l2tp: pass correct message length to ip6_append_data + CVE-2024-26753: (unk) crypto: virtio/akcipher - Fix stack overflow on memcpy + CVE-2024-26754: (unk) gtp: fix use-after-free and null-ptr-deref in gtp_genl_dump_pdp() + CVE-2024-26756: (unk) md: Don't register sync_thread for reshape directly + CVE-2024-26757: (unk) md: Don't ignore read-only array in md_check_recovery() + CVE-2024-26758: (unk) md: Don't ignore suspended array in md_check_recovery() + CVE-2024-26759: (unk) mm/swap: fix race when skipping swapcache + CVE-2024-26760: (unk) scsi: target: pscsi: Fix bio_put() for error case + CVE-2024-26761: (unk) cxl/pci: Fix disabling memory if DVSEC CXL Range does not match a CFMWS window + CVE-2024-26763: (unk) dm-crypt: don't modify the data when using authenticated encryption + CVE-2024-26764: (unk) fs/aio: Restrict kiocb_set_cancel_fn() to I/O submitted via libaio + CVE-2024-26765: (unk) LoongArch: Disable IRQ before init_fn() for nonboot CPUs + CVE-2024-26766: (unk) IB/hfi1: Fix sdma.h tx->num_descs off-by-one error + CVE-2024-26767: (unk) drm/amd/display: fixed integer types and null check locations + CVE-2024-26768: (unk) LoongArch: Change acpi_core_pic[NR_CPUS] to acpi_core_pic[MAX_CORE_PIC] + CVE-2024-26769: (unk) nvmet-fc: avoid deadlock on delete association path + CVE-2024-26770: (unk) HID: nvidia-shield: Add missing null pointer checks to LED initialization + CVE-2024-26771: (unk) dmaengine: ti: edma: Add some null pointer checks to the edma_probe + CVE-2024-26772: (unk) ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal() + CVE-2024-26773: (unk) ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found() + CVE-2024-26774: (unk) ext4: avoid dividing by 0 in mb_update_avg_fragment_size() when block bitmap corrupt + CVE-2024-26775: (unk) aoe: avoid potential deadlock at set_capacity + CVE-2024-26776: (unk) spi: hisi-sfc-v3xx: Return IRQ_NONE if no interrupts were detected + CVE-2024-26777: (unk) fbdev: sis: Error out if pixclock equals zero + CVE-2024-26778: (unk) fbdev: savage: Error out if pixclock equals zero + CVE-2024-26779: (unk) wifi: mac80211: fix race condition on enabling fast-xmit + CVE-2024-26782: (unk) mptcp: fix double-free on socket dismantle + CVE-2024-26783: (unk) mm/vmscan: fix a bug calling wakeup_kswapd() with a wrong zone index + CVE-2024-26784: (unk) pmdomain: arm: Fix NULL dereference on scmi_perf_domain removal + CVE-2024-26787: (unk) mmc: mmci: stm32: fix DMA API overlapping mappings warning + CVE-2024-26788: (unk) dmaengine: fsl-qdma: init irq after reg initialization + CVE-2024-26789: (unk) crypto: arm64/neonbs - fix out-of-bounds access on short input + CVE-2024-26790: (unk) dmaengine: fsl-qdma: fix SoC may hang on 16 byte unaligned read + CVE-2024-26791: (unk) btrfs: dev-replace: properly validate device names + CVE-2024-26793: (unk) gtp: fix use-after-free and null-ptr-deref in gtp_newlink() + CVE-2024-26795: (unk) riscv: Sparse-Memory/vmemmap out-of-bounds fix + CVE-2024-26797: (unk) drm/amd/display: Prevent potential buffer overflow in map_hw_resources + CVE-2024-26798: (unk) fbcon: always restore the old font data in fbcon_do_set_font() + CVE-2024-26799: (unk) ASoC: qcom: Fix uninitialized pointer dmactl + CVE-2024-26801: (unk) Bluetooth: Avoid potential use-after-free in hci_error_reset + CVE-2024-26802: (unk) stmmac: Clear variable when destroying workqueue + CVE-2024-26803: (unk) net: veth: clear GRO when clearing XDP even when down + CVE-2024-26804: (unk) net: ip_tunnel: prevent perpetual headroom growth + CVE-2024-26805: (unk) netlink: Fix kernel-infoleak-after-free in __skb_datagram_iter + CVE-2024-26806: (unk) spi: cadence-qspi: remove system-wide suspend helper calls from runtime PM hooks + CVE-2024-26808: (unk) netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain + CVE-2024-26809: (unk) netfilter: nft_set_pipapo: release elements in clone only from destroy path diff --git a/data/5.2/5.2_CVEs.txt b/data/5.2/5.2_CVEs.txt index bd8c36f35..28dcd04e6 100644 --- a/data/5.2/5.2_CVEs.txt +++ b/data/5.2/5.2_CVEs.txt @@ -180,6 +180,7 @@ CVE-2019-20812: Fix not seen in stream CVE-2019-20908: Fix not seen in stream CVE-2019-20934: Fixed with 5.2.6 CVE-2019-2214: Fixed with 5.2.5 +CVE-2019-25162: Fix not seen in stream CVE-2019-3016: Fix not seen in stream CVE-2019-5108: Fix not seen in stream CVE-2019-9506: Fixed with 5.2 @@ -349,6 +350,14 @@ CVE-2020-36558: Fix not seen in stream CVE-2020-36691: Fix not seen in stream CVE-2020-36694: Fix not seen in stream CVE-2020-36766: Fix not seen in stream +CVE-2020-36775: Fix not seen in stream +CVE-2020-36777: Fix not seen in stream +CVE-2020-36780: Fix not seen in stream +CVE-2020-36781: Fix not seen in stream +CVE-2020-36782: Fix not seen in stream +CVE-2020-36783: Fix not seen in stream +CVE-2020-36784: Fix not seen in stream +CVE-2020-36787: Fix not seen in stream CVE-2020-3702: Fix not seen in stream CVE-2020-4788: Fix not seen in stream CVE-2020-8428: Fix not seen in stream @@ -515,6 +524,134 @@ CVE-2021-45469: Fix not seen in stream CVE-2021-45485: Fix not seen in stream CVE-2021-45486: Fix not seen in stream CVE-2021-45868: Fix not seen in stream +CVE-2021-46904: Fix not seen in stream +CVE-2021-46906: Fix not seen in stream +CVE-2021-46908: Fix not seen in stream +CVE-2021-46909: Fix not seen in stream +CVE-2021-46915: Fix not seen in stream +CVE-2021-46921: Fix not seen in stream +CVE-2021-46924: Fix not seen in stream +CVE-2021-46925: Fix not seen in stream +CVE-2021-46926: Fix not seen in stream +CVE-2021-46928: Fix not seen in stream +CVE-2021-46929: Fix not seen in stream +CVE-2021-46930: Fix not seen in stream +CVE-2021-46932: Fix not seen in stream +CVE-2021-46933: Fix not seen in stream +CVE-2021-46934: Fix not seen in stream +CVE-2021-46935: Fix not seen in stream +CVE-2021-46936: Fix not seen in stream +CVE-2021-46938: Fix not seen in stream +CVE-2021-46939: Fix not seen in stream +CVE-2021-46941: Fix not seen in stream +CVE-2021-46943: Fix not seen in stream +CVE-2021-46944: Fix not seen in stream +CVE-2021-46950: Fix not seen in stream +CVE-2021-46951: Fix not seen in stream +CVE-2021-46952: Fix not seen in stream +CVE-2021-46953: Fix not seen in stream +CVE-2021-46955: Fix not seen in stream +CVE-2021-46959: Fix not seen in stream +CVE-2021-46960: Fix not seen in stream +CVE-2021-46961: Fix not seen in stream +CVE-2021-46962: Fix not seen in stream +CVE-2021-46965: Fix not seen in stream +CVE-2021-46969: Fix not seen in stream +CVE-2021-46970: Fix not seen in stream +CVE-2021-46974: Fix not seen in stream +CVE-2021-46982: Fix not seen in stream +CVE-2021-46984: Fix not seen in stream +CVE-2021-46988: Fix not seen in stream +CVE-2021-46989: Fix not seen in stream +CVE-2021-46991: Fix not seen in stream +CVE-2021-46992: Fix not seen in stream +CVE-2021-46998: Fix not seen in stream +CVE-2021-47004: Fix not seen in stream +CVE-2021-47005: Fix not seen in stream +CVE-2021-47006: Fix not seen in stream +CVE-2021-47010: Fix not seen in stream +CVE-2021-47013: Fix not seen in stream +CVE-2021-47015: Fix not seen in stream +CVE-2021-47016: Fix not seen in stream +CVE-2021-47020: Fix not seen in stream +CVE-2021-47024: Fix not seen in stream +CVE-2021-47028: Fix not seen in stream +CVE-2021-47034: Fix not seen in stream +CVE-2021-47041: Fix not seen in stream +CVE-2021-47046: Fix not seen in stream +CVE-2021-47049: Fix not seen in stream +CVE-2021-47051: Fix not seen in stream +CVE-2021-47052: Fix not seen in stream +CVE-2021-47054: Fix not seen in stream +CVE-2021-47056: Fix not seen in stream +CVE-2021-47059: Fix not seen in stream +CVE-2021-47063: Fix not seen in stream +CVE-2021-47065: Fix not seen in stream +CVE-2021-47070: Fix not seen in stream +CVE-2021-47071: Fix not seen in stream +CVE-2021-47073: Fix not seen in stream +CVE-2021-47074: Fix not seen in stream +CVE-2021-47075: Fix not seen in stream +CVE-2021-47076: Fix not seen in stream +CVE-2021-47077: Fix not seen in stream +CVE-2021-47078: Fix not seen in stream +CVE-2021-47082: Fix not seen in stream +CVE-2021-47083: Fix not seen in stream +CVE-2021-47086: Fix not seen in stream +CVE-2021-47100: Fix not seen in stream +CVE-2021-47101: Fix not seen in stream +CVE-2021-47103: Fix not seen in stream +CVE-2021-47109: Fix not seen in stream +CVE-2021-47110: Fix not seen in stream +CVE-2021-47112: Fix not seen in stream +CVE-2021-47113: Fix not seen in stream +CVE-2021-47114: Fix not seen in stream +CVE-2021-47116: Fix not seen in stream +CVE-2021-47117: Fix not seen in stream +CVE-2021-47118: Fix not seen in stream +CVE-2021-47119: Fix not seen in stream +CVE-2021-47120: Fix not seen in stream +CVE-2021-47121: Fix not seen in stream +CVE-2021-47122: Fix not seen in stream +CVE-2021-47124: Fix not seen in stream +CVE-2021-47125: Fix not seen in stream +CVE-2021-47128: Fix not seen in stream +CVE-2021-47131: Fix not seen in stream +CVE-2021-47133: Fix not seen in stream +CVE-2021-47135: Fix not seen in stream +CVE-2021-47136: Fix not seen in stream +CVE-2021-47137: Fix not seen in stream +CVE-2021-47138: Fix not seen in stream +CVE-2021-47140: Fix not seen in stream +CVE-2021-47142: Fix not seen in stream +CVE-2021-47143: Fix not seen in stream +CVE-2021-47144: Fix not seen in stream +CVE-2021-47145: Fix not seen in stream +CVE-2021-47146: Fix not seen in stream +CVE-2021-47147: Fix not seen in stream +CVE-2021-47149: Fix not seen in stream +CVE-2021-47150: Fix not seen in stream +CVE-2021-47151: Fix not seen in stream +CVE-2021-47153: Fix not seen in stream +CVE-2021-47158: Fix not seen in stream +CVE-2021-47159: Fix not seen in stream +CVE-2021-47160: Fix not seen in stream +CVE-2021-47161: Fix not seen in stream +CVE-2021-47162: Fix not seen in stream +CVE-2021-47163: Fix not seen in stream +CVE-2021-47165: Fix not seen in stream +CVE-2021-47166: Fix not seen in stream +CVE-2021-47167: Fix not seen in stream +CVE-2021-47168: Fix not seen in stream +CVE-2021-47169: Fix not seen in stream +CVE-2021-47170: Fix not seen in stream +CVE-2021-47171: Fix not seen in stream +CVE-2021-47172: Fix not seen in stream +CVE-2021-47173: Fix not seen in stream +CVE-2021-47175: Fix not seen in stream +CVE-2021-47177: Fix not seen in stream +CVE-2021-47179: Fix not seen in stream +CVE-2021-47180: Fix not seen in stream CVE-2022-0001: Fix not seen in stream CVE-2022-0002: Fix not seen in stream CVE-2022-0168: Fix not seen in stream @@ -733,6 +870,10 @@ CVE-2022-47520: Fix not seen in stream CVE-2022-47929: Fix not seen in stream CVE-2022-47946: Fix not seen in stream CVE-2022-48619: Fix not seen in stream +CVE-2022-48626: Fix not seen in stream +CVE-2022-48627: Fix not seen in stream +CVE-2022-48628: Fix not seen in stream +CVE-2022-48629: Fix not seen in stream CVE-2023-0045: Fix not seen in stream CVE-2023-0047: Fix not seen in stream CVE-2023-0160: Fix not seen in stream @@ -804,6 +945,7 @@ CVE-2023-26607: Fix not seen in stream CVE-2023-28328: Fix not seen in stream CVE-2023-28466: Fix not seen in stream CVE-2023-2860: Fix not seen in stream +CVE-2023-28746: Fix not seen in stream CVE-2023-28772: Fix not seen in stream CVE-2023-2985: Fix not seen in stream CVE-2023-3006: Fix not seen in stream @@ -879,7 +1021,7 @@ CVE-2023-4622: Fix not seen in stream CVE-2023-4623: Fix not seen in stream CVE-2023-46343: Fix not seen in stream CVE-2023-46838: Fix not seen in stream -CVE-2023-47233: Fix unknown +CVE-2023-47233: Fix not seen in stream CVE-2023-4881: Fix not seen in stream CVE-2023-4921: Fix not seen in stream CVE-2023-50431: Fix not seen in stream @@ -904,18 +1046,112 @@ CVE-2023-52448: Fix not seen in stream CVE-2023-52449: Fix not seen in stream CVE-2023-52451: Fix not seen in stream CVE-2023-52454: Fix not seen in stream -CVE-2023-52456: Fix not seen in stream -CVE-2023-52457: Fix not seen in stream CVE-2023-52458: Fix not seen in stream CVE-2023-52464: Fix not seen in stream +CVE-2023-52469: Fix not seen in stream +CVE-2023-52470: Fix not seen in stream +CVE-2023-52474: Fix not seen in stream +CVE-2023-52475: Fix not seen in stream +CVE-2023-52476: Fix not seen in stream +CVE-2023-52477: Fix not seen in stream +CVE-2023-52478: Fix not seen in stream +CVE-2023-52479: Fix not seen in stream +CVE-2023-52480: Fix not seen in stream +CVE-2023-52481: Fix not seen in stream +CVE-2023-52482: Fix not seen in stream +CVE-2023-52484: Fix not seen in stream +CVE-2023-52485: Fix not seen in stream +CVE-2023-52486: Fix not seen in stream +CVE-2023-52488: Fix not seen in stream +CVE-2023-52489: Fix not seen in stream +CVE-2023-52491: Fix not seen in stream +CVE-2023-52498: Fix not seen in stream +CVE-2023-52500: Fix not seen in stream +CVE-2023-52501: Fix not seen in stream +CVE-2023-52502: Fix not seen in stream +CVE-2023-52504: Fix not seen in stream +CVE-2023-52506: Fix not seen in stream +CVE-2023-52507: Fix not seen in stream +CVE-2023-52508: Fix not seen in stream +CVE-2023-52509: Fix not seen in stream +CVE-2023-52510: Fix not seen in stream +CVE-2023-52511: Fix not seen in stream +CVE-2023-52515: Fix not seen in stream +CVE-2023-52516: Fix not seen in stream +CVE-2023-52517: Fix not seen in stream +CVE-2023-52519: Fix not seen in stream +CVE-2023-52522: Fix not seen in stream +CVE-2023-52527: Fix not seen in stream +CVE-2023-52528: Fix not seen in stream +CVE-2023-52530: Fix not seen in stream +CVE-2023-52531: Fix not seen in stream +CVE-2023-52532: Fix not seen in stream +CVE-2023-52559: Fix not seen in stream +CVE-2023-52561: Fix not seen in stream +CVE-2023-52563: Fix not seen in stream +CVE-2023-52565: Fix not seen in stream +CVE-2023-52566: Fix not seen in stream +CVE-2023-52568: Fix not seen in stream +CVE-2023-52569: Fix not seen in stream +CVE-2023-52571: Fix not seen in stream +CVE-2023-52572: Fix not seen in stream +CVE-2023-52573: Fix not seen in stream +CVE-2023-52574: Fix not seen in stream +CVE-2023-52578: Fix not seen in stream +CVE-2023-52583: Fix not seen in stream +CVE-2023-52584: Fix not seen in stream +CVE-2023-52585: Fix not seen in stream +CVE-2023-52586: Fix not seen in stream +CVE-2023-52587: Fix not seen in stream +CVE-2023-52588: Fix not seen in stream +CVE-2023-52589: Fix not seen in stream +CVE-2023-52590: Fix not seen in stream +CVE-2023-52591: Fix not seen in stream +CVE-2023-52593: Fix not seen in stream +CVE-2023-52594: Fix not seen in stream +CVE-2023-52595: Fix not seen in stream +CVE-2023-52596: Fix not seen in stream +CVE-2023-52597: Fix not seen in stream +CVE-2023-52598: Fix not seen in stream +CVE-2023-52599: Fix not seen in stream +CVE-2023-52600: Fix not seen in stream +CVE-2023-52601: Fix not seen in stream +CVE-2023-52602: Fix not seen in stream +CVE-2023-52603: Fix not seen in stream +CVE-2023-52604: Fix not seen in stream +CVE-2023-52606: Fix not seen in stream +CVE-2023-52607: Fix not seen in stream +CVE-2023-52609: Fix not seen in stream +CVE-2023-52612: Fix not seen in stream +CVE-2023-52614: Fix not seen in stream +CVE-2023-52615: Fix not seen in stream +CVE-2023-52617: Fix not seen in stream +CVE-2023-52618: Fix not seen in stream +CVE-2023-52619: Fix not seen in stream +CVE-2023-52620: Fix not seen in stream +CVE-2023-52621: Fix not seen in stream +CVE-2023-52622: Fix not seen in stream +CVE-2023-52623: Fix not seen in stream +CVE-2023-52624: Fix not seen in stream +CVE-2023-52625: Fix not seen in stream +CVE-2023-52628: Fix not seen in stream +CVE-2023-52629: Fix not seen in stream +CVE-2023-52632: Fix not seen in stream +CVE-2023-52633: Fix not seen in stream +CVE-2023-52634: Fix not seen in stream +CVE-2023-52635: Fix not seen in stream +CVE-2023-52638: Fix not seen in stream +CVE-2023-52639: Fix not seen in stream +CVE-2023-52640: Fix not seen in stream +CVE-2023-52641: Fix not seen in stream CVE-2023-5717: Fix not seen in stream CVE-2023-6040: Fix not seen in stream CVE-2023-6121: Fix not seen in stream CVE-2023-6240: Fix unknown -CVE-2023-6270: Fix unknown -CVE-2023-6356: Fix unknown +CVE-2023-6270: Fix not seen in stream +CVE-2023-6356: Fix not seen in stream CVE-2023-6535: Fix unknown -CVE-2023-6536: Fix unknown +CVE-2023-6536: Fix not seen in stream CVE-2023-6546: Fix not seen in stream CVE-2023-6560: Fix not seen in stream CVE-2023-6606: Fix not seen in stream @@ -923,7 +1159,7 @@ CVE-2023-6610: Fix not seen in stream CVE-2023-6915: Fix not seen in stream CVE-2023-6931: Fix not seen in stream CVE-2023-6932: Fix not seen in stream -CVE-2023-7042: Fix unknown +CVE-2023-7042: Fix not seen in stream CVE-2023-7192: Fix not seen in stream CVE-2024-0340: Fix not seen in stream CVE-2024-0564: Fix unknown @@ -932,15 +1168,16 @@ CVE-2024-0584: Fix not seen in stream CVE-2024-0607: Fix not seen in stream CVE-2024-0646: Fix not seen in stream CVE-2024-0775: Fix not seen in stream -CVE-2024-0841: Fix unknown +CVE-2024-0841: Fix not seen in stream CVE-2024-1086: Fix not seen in stream CVE-2024-1151: Fix not seen in stream CVE-2024-1312: Fix not seen in stream CVE-2024-21803: Fix unknown -CVE-2024-22099: Fix unknown +CVE-2024-2193: Fix unknown +CVE-2024-22099: Fix not seen in stream CVE-2024-22386: Fix unknown -CVE-2024-23196: Fix unknown -CVE-2024-23307: Fix unknown +CVE-2024-23196: Fix not seen in stream +CVE-2024-23307: Fix not seen in stream CVE-2024-23848: Fix unknown CVE-2024-23849: Fix not seen in stream CVE-2024-23851: Fix not seen in stream @@ -949,7 +1186,7 @@ CVE-2024-24857: Fix unknown CVE-2024-24858: Fix unknown CVE-2024-24859: Fix unknown CVE-2024-24860: Fix not seen in stream -CVE-2024-24861: Fix unknown +CVE-2024-24861: Fix not seen in stream CVE-2024-24864: Fix unknown CVE-2024-25739: Fix unknown CVE-2024-25740: Fix unknown @@ -958,12 +1195,117 @@ CVE-2024-25744: Fix not seen in stream CVE-2024-26584: Fix not seen in stream CVE-2024-26585: Fix not seen in stream CVE-2024-26586: Fix not seen in stream -CVE-2024-26587: Fix not seen in stream -CVE-2024-26588: Fix not seen in stream CVE-2024-26589: Fix not seen in stream -CVE-2024-26591: Fix not seen in stream CVE-2024-26592: Fix not seen in stream CVE-2024-26594: Fix not seen in stream CVE-2024-26595: Fix not seen in stream CVE-2024-26597: Fix not seen in stream CVE-2024-26598: Fix not seen in stream +CVE-2024-26600: Fix not seen in stream +CVE-2024-26602: Fix not seen in stream +CVE-2024-26606: Fix not seen in stream +CVE-2024-26607: Fix not seen in stream +CVE-2024-26614: Fix not seen in stream +CVE-2024-26615: Fix not seen in stream +CVE-2024-26622: Fix not seen in stream +CVE-2024-26623: Fix not seen in stream +CVE-2024-26625: Fix not seen in stream +CVE-2024-26627: Fix not seen in stream +CVE-2024-26633: Fix not seen in stream +CVE-2024-26635: Fix not seen in stream +CVE-2024-26636: Fix not seen in stream +CVE-2024-26640: Fix not seen in stream +CVE-2024-26641: Fix not seen in stream +CVE-2024-26642: Fix not seen in stream +CVE-2024-26644: Fix not seen in stream +CVE-2024-26645: Fix not seen in stream +CVE-2024-26646: Fix not seen in stream +CVE-2024-26647: Fix not seen in stream +CVE-2024-26648: Fix not seen in stream +CVE-2024-26650: Fix not seen in stream +CVE-2024-26651: Fix not seen in stream +CVE-2024-26654: Fix not seen in stream +CVE-2024-26655: Fix not seen in stream +CVE-2024-26656: Fix not seen in stream +CVE-2024-26658: Fix not seen in stream +CVE-2024-26659: Fix not seen in stream +CVE-2024-26663: Fix not seen in stream +CVE-2024-26664: Fix not seen in stream +CVE-2024-26668: Fix not seen in stream +CVE-2024-26669: Fix not seen in stream +CVE-2024-26671: Fix not seen in stream +CVE-2024-26672: Fix not seen in stream +CVE-2024-26675: Fix not seen in stream +CVE-2024-26676: Fix not seen in stream +CVE-2024-26677: Fix not seen in stream +CVE-2024-26679: Fix not seen in stream +CVE-2024-26685: Fix not seen in stream +CVE-2024-26686: Fix not seen in stream +CVE-2024-26687: Fix not seen in stream +CVE-2024-26688: Fix not seen in stream +CVE-2024-26689: Fix not seen in stream +CVE-2024-26691: Fix not seen in stream +CVE-2024-26696: Fix not seen in stream +CVE-2024-26697: Fix not seen in stream +CVE-2024-26699: Fix not seen in stream +CVE-2024-26700: Fix not seen in stream +CVE-2024-26702: Fix not seen in stream +CVE-2024-26704: Fix not seen in stream +CVE-2024-26706: Fix not seen in stream +CVE-2024-26713: Fix not seen in stream +CVE-2024-26715: Fix not seen in stream +CVE-2024-26719: Fix not seen in stream +CVE-2024-26720: Fix not seen in stream +CVE-2024-26726: Fix not seen in stream +CVE-2024-26733: Fix not seen in stream +CVE-2024-26735: Fix not seen in stream +CVE-2024-26736: Fix not seen in stream +CVE-2024-26738: Fix not seen in stream +CVE-2024-26739: Fix not seen in stream +CVE-2024-26740: Fix not seen in stream +CVE-2024-26743: Fix not seen in stream +CVE-2024-26744: Fix not seen in stream +CVE-2024-26745: Fix not seen in stream +CVE-2024-26747: Fix not seen in stream +CVE-2024-26748: Fix not seen in stream +CVE-2024-26751: Fix not seen in stream +CVE-2024-26752: Fix not seen in stream +CVE-2024-26754: Fix not seen in stream +CVE-2024-26756: Fix not seen in stream +CVE-2024-26757: Fix not seen in stream +CVE-2024-26758: Fix not seen in stream +CVE-2024-26759: Fix not seen in stream +CVE-2024-26763: Fix not seen in stream +CVE-2024-26764: Fix not seen in stream +CVE-2024-26765: Fix not seen in stream +CVE-2024-26766: Fix not seen in stream +CVE-2024-26767: Fix not seen in stream +CVE-2024-26768: Fix not seen in stream +CVE-2024-26769: Fix not seen in stream +CVE-2024-26770: Fix not seen in stream +CVE-2024-26771: Fix not seen in stream +CVE-2024-26772: Fix not seen in stream +CVE-2024-26773: Fix not seen in stream +CVE-2024-26774: Fix not seen in stream +CVE-2024-26775: Fix not seen in stream +CVE-2024-26776: Fix not seen in stream +CVE-2024-26777: Fix not seen in stream +CVE-2024-26778: Fix not seen in stream +CVE-2024-26779: Fix not seen in stream +CVE-2024-26784: Fix not seen in stream +CVE-2024-26787: Fix not seen in stream +CVE-2024-26788: Fix not seen in stream +CVE-2024-26789: Fix not seen in stream +CVE-2024-26790: Fix not seen in stream +CVE-2024-26791: Fix not seen in stream +CVE-2024-26793: Fix not seen in stream +CVE-2024-26797: Fix not seen in stream +CVE-2024-26798: Fix not seen in stream +CVE-2024-26801: Fix not seen in stream +CVE-2024-26802: Fix not seen in stream +CVE-2024-26803: Fix not seen in stream +CVE-2024-26804: Fix not seen in stream +CVE-2024-26805: Fix not seen in stream +CVE-2024-26806: Fix not seen in stream +CVE-2024-26808: Fix not seen in stream +CVE-2024-26809: Fix not seen in stream diff --git a/data/5.2/5.2_security.txt b/data/5.2/5.2_security.txt index 1fe6a5fa5..1b57de9b0 100644 --- a/data/5.2/5.2_security.txt +++ b/data/5.2/5.2_security.txt @@ -220,6 +220,7 @@ Outstanding CVEs: CVE-2019-20810: (unk) media: go7007: fix a miss of snd_card_free CVE-2019-20812: (unk) af_packet: set defaule value for tmo CVE-2019-20908: (unk) efi: Restrict efivar_ssdt_load when the kernel is locked down + CVE-2019-25162: (unk) i2c: Fix a potential use after free CVE-2019-3016: (unk) x86/kvm: Be careful not to clear KVM_VCPU_FLUSH_TLB bit CVE-2019-5108: (unk) mac80211: Do not send Layer 2 Update frame before authorization CVE-2020-0009: (unk) staging: android: ashmem: Disallow ashmem memory from being remapped @@ -388,6 +389,14 @@ Outstanding CVEs: CVE-2020-36691: (unk) netlink: limit recursion depth in policy validation CVE-2020-36694: (unk) netfilter: x_tables: Switch synchronization to RCU CVE-2020-36766: (unk) cec-api: prevent leaking memory through hole in structure + CVE-2020-36775: (unk) f2fs: fix to avoid potential deadlock + CVE-2020-36777: (unk) media: dvbdev: Fix memory leak in dvb_media_device_free() + CVE-2020-36780: (unk) i2c: sprd: fix reference leak when pm_runtime_get_sync fails + CVE-2020-36781: (unk) i2c: imx: fix reference leak when pm_runtime_get_sync fails + CVE-2020-36782: (unk) i2c: imx-lpi2c: fix reference leak when pm_runtime_get_sync fails + CVE-2020-36783: (unk) i2c: img-scb: fix reference leak when pm_runtime_get_sync fails + CVE-2020-36784: (unk) i2c: cadence: fix reference leak when pm_runtime_get_sync fails + CVE-2020-36787: (unk) media: aspeed: fix clock handling logic CVE-2020-3702: (unk) ath: Use safer key clearing with key cache entries CVE-2020-4788: (unk) powerpc/64s: flush L1D on kernel entry CVE-2020-8428: (unk) do_last(): fetch directory ->i_mode and ->i_uid before it's too late @@ -553,6 +562,134 @@ Outstanding CVEs: CVE-2021-45485: (unk) ipv6: use prandom_u32() for ID generation CVE-2021-45486: (unk) inet: use bigger hash table for IP ID generation CVE-2021-45868: (unk) quota: check block number when reading the block in quota file + CVE-2021-46904: (unk) net: hso: fix null-ptr-deref during tty device unregistration + CVE-2021-46906: (unk) HID: usbhid: fix info leak in hid_submit_ctrl + CVE-2021-46908: (unk) bpf: Use correct permission flag for mixed signed bounds arithmetic + CVE-2021-46909: (unk) ARM: footbridge: fix PCI interrupt mapping + CVE-2021-46915: (unk) netfilter: nft_limit: avoid possible divide error in nft_limit_init + CVE-2021-46921: (unk) locking/qrwlock: Fix ordering in queued_write_lock_slowpath() + CVE-2021-46924: (unk) NFC: st21nfca: Fix memory leak in device probe and remove + CVE-2021-46925: (unk) net/smc: fix kernel panic caused by race of smc_sock + CVE-2021-46926: (unk) ALSA: hda: intel-sdw-acpi: harden detection of controller + CVE-2021-46928: (unk) parisc: Clear stale IIR value on instruction access rights trap + CVE-2021-46929: (unk) sctp: use call_rcu to free endpoint + CVE-2021-46930: (unk) usb: mtu3: fix list_head check warning + CVE-2021-46932: (unk) Input: appletouch - initialize work before device registration + CVE-2021-46933: (unk) usb: gadget: f_fs: Clear ffs_eventfd in ffs_data_clear. + CVE-2021-46934: (unk) i2c: validate user data in compat ioctl + CVE-2021-46935: (unk) binder: fix async_free_space accounting for empty parcels + CVE-2021-46936: (unk) net: fix use-after-free in tw_timer_handler + CVE-2021-46938: (unk) dm rq: fix double free of blk_mq_tag_set in dev remove after table load fails + CVE-2021-46939: (unk) tracing: Restructure trace_clock_global() to never block + CVE-2021-46941: (unk) usb: dwc3: core: Do core softreset when switch mode + CVE-2021-46943: (unk) media: staging/intel-ipu3: Fix set_fmt error handling + CVE-2021-46944: (unk) media: staging/intel-ipu3: Fix memory leak in imu_fmt + CVE-2021-46950: (unk) md/raid1: properly indicate failure when ending a failed write request + CVE-2021-46951: (unk) tpm: efi: Use local variable for calculating final log size + CVE-2021-46952: (unk) NFS: fs_context: validate UDP retrans to prevent shift out-of-bounds + CVE-2021-46953: (unk) ACPI: GTDT: Don't corrupt interrupt mappings on watchdow probe failure + CVE-2021-46955: (unk) openvswitch: fix stack OOB read while fragmenting IPv4 packets + CVE-2021-46959: (unk) spi: Fix use-after-free with devm_spi_alloc_* + CVE-2021-46960: (unk) cifs: Return correct error code from smb2_get_enc_key + CVE-2021-46961: (unk) irqchip/gic-v3: Do not enable irqs when handling spurious interrups + CVE-2021-46962: (unk) mmc: uniphier-sd: Fix a resource leak in the remove function + CVE-2021-46965: (unk) mtd: physmap: physmap-bt1-rom: Fix unintentional stack access + CVE-2021-46969: (unk) bus: mhi: core: Fix invalid error returning in mhi_queue + CVE-2021-46970: (unk) bus: mhi: pci_generic: Remove WQ_MEM_RECLAIM flag from state workqueue + CVE-2021-46974: (unk) bpf: Fix masking negation logic upon negative dst register + CVE-2021-46982: (unk) f2fs: compress: fix race condition of overwrite vs truncate + CVE-2021-46984: (unk) kyber: fix out of bounds access when preempted + CVE-2021-46988: (unk) userfaultfd: release page in error path to avoid BUG_ON + CVE-2021-46989: (unk) hfsplus: prevent corruption in shrinking truncate + CVE-2021-46991: (unk) i40e: Fix use-after-free in i40e_client_subtask() + CVE-2021-46992: (unk) netfilter: nftables: avoid overflows in nft_hash_buckets() + CVE-2021-46998: (unk) ethernet:enic: Fix a use after free bug in enic_hard_start_xmit + CVE-2021-47004: (unk) f2fs: fix to avoid touching checkpointed data in get_victim() + CVE-2021-47005: (unk) PCI: endpoint: Fix NULL pointer dereference for ->get_features() + CVE-2021-47006: (unk) ARM: 9064/1: hw_breakpoint: Do not directly check the event's overflow_handler hook + CVE-2021-47010: (unk) net: Only allow init netns to set default tcp cong to a restricted algo + CVE-2021-47013: (unk) net:emac/emac-mac: Fix a use after free in emac_mac_tx_buf_send + CVE-2021-47015: (unk) bnxt_en: Fix RX consumer index logic in the error path. + CVE-2021-47016: (unk) m68k: mvme147,mvme16x: Don't wipe PCC timer config bits + CVE-2021-47020: (unk) soundwire: stream: fix memory leak in stream config error path + CVE-2021-47024: (unk) vsock/virtio: free queued packets when closing socket + CVE-2021-47028: (unk) mt76: mt7915: fix txrate reporting + CVE-2021-47034: (unk) powerpc/64s: Fix pte update for kernel memory on radix + CVE-2021-47041: (unk) nvmet-tcp: fix incorrect locking in state_change sk callback + CVE-2021-47046: (unk) drm/amd/display: Fix off by one in hdmi_14_process_transaction() + CVE-2021-47049: (unk) Drivers: hv: vmbus: Use after free in __vmbus_open() + CVE-2021-47051: (unk) spi: fsl-lpspi: Fix PM reference leak in lpspi_prepare_xfer_hardware() + CVE-2021-47052: (unk) crypto: sa2ul - Fix memory leak of rxd + CVE-2021-47054: (unk) bus: qcom: Put child node before return + CVE-2021-47056: (unk) crypto: qat - ADF_STATUS_PF_RUNNING should be set after adf_dev_init + CVE-2021-47059: (unk) crypto: sun8i-ss - fix result memory leak on error path + CVE-2021-47063: (unk) drm: bridge/panel: Cleanup connector on bridge detach + CVE-2021-47065: (unk) rtw88: Fix array overrun in rtw_get_tx_power_params() + CVE-2021-47070: (unk) uio_hv_generic: Fix another memory leak in error handling paths + CVE-2021-47071: (unk) uio_hv_generic: Fix a memory leak in error handling paths + CVE-2021-47073: (unk) platform/x86: dell-smbios-wmi: Fix oops on rmmod dell_smbios + CVE-2021-47074: (unk) nvme-loop: fix memory leak in nvme_loop_create_ctrl() + CVE-2021-47075: (unk) nvmet: fix memory leak in nvmet_alloc_ctrl() + CVE-2021-47076: (unk) RDMA/rxe: Return CQE error if invalid lkey was supplied + CVE-2021-47077: (unk) scsi: qedf: Add pointer checks in qedf_update_link_speed() + CVE-2021-47078: (unk) RDMA/rxe: Clear all QP fields if creation failed + CVE-2021-47082: (unk) tun: avoid double free in tun_free_netdev + CVE-2021-47083: (unk) pinctrl: mediatek: fix global-out-of-bounds issue + CVE-2021-47086: (unk) phonet/pep: refuse to enable an unbound pipe + CVE-2021-47100: (unk) ipmi: Fix UAF when uninstall ipmi_si and ipmi_msghandler module + CVE-2021-47101: (unk) asix: fix uninit-value in asix_mdio_read() + CVE-2021-47103: (unk) inet: fully convert sk->sk_rx_dst to RCU rules + CVE-2021-47109: (unk) neighbour: allow NUD_NOARP entries to be forced GCed + CVE-2021-47110: (unk) x86/kvm: Disable kvmclock on all CPUs on shutdown + CVE-2021-47112: (unk) x86/kvm: Teardown PV features on boot CPU as well + CVE-2021-47113: (unk) btrfs: abort in rename_exchange if we fail to insert the second ref + CVE-2021-47114: (unk) ocfs2: fix data corruption by fallocate + CVE-2021-47116: (unk) ext4: fix memory leak in ext4_mb_init_backend on error path. + CVE-2021-47117: (unk) ext4: fix bug on in ext4_es_cache_extent as ext4_split_extent_at failed + CVE-2021-47118: (unk) pid: take a reference when initializing `cad_pid` + CVE-2021-47119: (unk) ext4: fix memory leak in ext4_fill_super + CVE-2021-47120: (unk) HID: magicmouse: fix NULL-deref on disconnect + CVE-2021-47121: (unk) net: caif: fix memory leak in cfusbl_device_notify + CVE-2021-47122: (unk) net: caif: fix memory leak in caif_device_notify + CVE-2021-47124: (unk) io_uring: fix link timeout refs + CVE-2021-47125: (unk) sch_htb: fix refcount leak in htb_parent_to_leaf_offload + CVE-2021-47128: (unk) bpf, lockdown, audit: Fix buggy SELinux lockdown permission checks + CVE-2021-47131: (unk) net/tls: Fix use-after-free after the TLS device goes down and up + CVE-2021-47133: (unk) HID: amd_sfh: Fix memory leak in amd_sfh_work + CVE-2021-47135: (unk) mt76: mt7921: fix possible AOOB issue in mt7921_mcu_tx_rate_report + CVE-2021-47136: (unk) net: zero-initialize tc skb extension on allocation + CVE-2021-47137: (unk) net: lantiq: fix memory corruption in RX ring + CVE-2021-47138: (unk) cxgb4: avoid accessing registers when clearing filters + CVE-2021-47140: (unk) iommu/amd: Clear DMA ops when switching domain + CVE-2021-47142: (unk) drm/amdgpu: Fix a use-after-free + CVE-2021-47143: (unk) net/smc: remove device from smcd_dev_list after failed device_add() + CVE-2021-47144: (unk) drm/amd/amdgpu: fix refcount leak + CVE-2021-47145: (unk) btrfs: do not BUG_ON in link_to_fixup_dir + CVE-2021-47146: (unk) mld: fix panic in mld_newpack() + CVE-2021-47147: (unk) ptp: ocp: Fix a resource leak in an error handling path + CVE-2021-47149: (unk) net: fujitsu: fix potential null-ptr-deref + CVE-2021-47150: (unk) net: fec: fix the potential memory leak in fec_enet_init() + CVE-2021-47151: (unk) interconnect: qcom: bcm-voter: add a missing of_node_put() + CVE-2021-47153: (unk) i2c: i801: Don't generate an interrupt on bus reset + CVE-2021-47158: (unk) net: dsa: sja1105: add error handling in sja1105_setup() + CVE-2021-47159: (unk) net: dsa: fix a crash if ->get_sset_count() fails + CVE-2021-47160: (unk) net: dsa: mt7530: fix VLAN traffic leaks + CVE-2021-47161: (unk) spi: spi-fsl-dspi: Fix a resource leak in an error handling path + CVE-2021-47162: (unk) tipc: skb_linearize the head skb when reassembling msgs + CVE-2021-47163: (unk) tipc: wait and exit until all work queues are done + CVE-2021-47165: (unk) drm/meson: fix shutdown crash when component not probed + CVE-2021-47166: (unk) NFS: Don't corrupt the value of pg_bytes_written in nfs_do_recoalesce() + CVE-2021-47167: (unk) NFS: Fix an Oopsable condition in __nfs_pageio_add_request() + CVE-2021-47168: (unk) NFS: fix an incorrect limit in filelayout_decode_layout() + CVE-2021-47169: (unk) serial: rp2: use 'request_firmware' instead of 'request_firmware_nowait' + CVE-2021-47170: (unk) USB: usbfs: Don't WARN about excessively large memory allocations + CVE-2021-47171: (unk) net: usb: fix memory leak in smsc75xx_bind + CVE-2021-47172: (unk) iio: adc: ad7124: Fix potential overflow due to non sequential channel numbers + CVE-2021-47173: (unk) misc/uss720: fix memory leak in uss720_probe + CVE-2021-47175: (unk) net/sched: fq_pie: fix OOB access in the traffic path + CVE-2021-47177: (unk) iommu/vt-d: Fix sysfs leak in alloc_iommu() + CVE-2021-47179: (unk) NFSv4: Fix a NULL pointer dereference in pnfs_mark_matching_lsegs_return() + CVE-2021-47180: (unk) NFC: nci: fix memory leak in nci_allocate_device CVE-2022-0001: (unk) x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE CVE-2022-0002: (unk) x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE CVE-2022-0168: (unk) cifs: fix NULL ptr dereference in smb2_ioctl_query_info() @@ -771,6 +908,10 @@ Outstanding CVEs: CVE-2022-47929: (unk) net: sched: disallow noqueue for qdisc classes CVE-2022-47946: (unk) io_uring: kill sqo_dead and sqo submission halting CVE-2022-48619: (unk) Input: add bounds checking to input_set_capability() + CVE-2022-48626: (unk) moxart: fix potential use-after-free on remove path + CVE-2022-48627: (unk) vt: fix memory overlapping when deleting chars in the buffer + CVE-2022-48628: (unk) ceph: drop messages from MDS when unmounting + CVE-2022-48629: (unk) crypto: qcom-rng - ensure buffer for generate is completely filled CVE-2023-0045: (unk) x86/bugs: Flush IBP in ib_prctl_set() CVE-2023-0047: (unk) mm, oom: do not trigger out_of_memory from the #PF CVE-2023-0160: (unk) bpf, sockmap: fix deadlocks in the sockhash and sockmap @@ -842,6 +983,7 @@ Outstanding CVEs: CVE-2023-28328: (unk) media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer() CVE-2023-28466: (unk) net: tls: fix possible race condition between do_tls_getsockopt_conf() and do_tls_setsockopt_conf() CVE-2023-2860: (unk) ipv6: sr: fix out-of-bounds read when setting HMAC data. + CVE-2023-28746: (unk) x86/mmio: Disable KVM mitigation when X86_FEATURE_CLEAR_CPU_BUF is set CVE-2023-28772: (unk) seq_buf: Fix overflow in seq_buf_putmem_hex() CVE-2023-2985: (unk) fs: hfsplus: fix UAF issue in hfsplus_put_super CVE-2023-3006: (unk) arm64: Add AMPERE1 to the Spectre-BHB affected list @@ -917,7 +1059,7 @@ Outstanding CVEs: CVE-2023-4623: (unk) net/sched: sch_hfsc: Ensure inner classes have fsc curve CVE-2023-46343: (unk) nfc: nci: fix possible NULL pointer dereference in send_acknowledge() CVE-2023-46838: (unk) xen-netback: don't produce zero-size SKB frags - CVE-2023-47233: (unk) + CVE-2023-47233: (unk) wifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach CVE-2023-4881: (unk) netfilter: nftables: exthdr: fix 4-byte stack OOB write CVE-2023-4921: (unk) net: sched: sch_qfq: Fix UAF in qfq_dequeue() CVE-2023-50431: (unk) accel/habanalabs: fix information leak in sec_attest_info() @@ -942,18 +1084,112 @@ Outstanding CVEs: CVE-2023-52449: (unk) mtd: Fix gluebi NULL pointer dereference caused by ftl notifier CVE-2023-52451: (unk) powerpc/pseries/memhp: Fix access beyond end of drmem array CVE-2023-52454: (unk) nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length - CVE-2023-52456: (unk) serial: imx: fix tx statemachine deadlock - CVE-2023-52457: (unk) serial: 8250: omap: Don't skip resource freeing if pm_runtime_resume_and_get() failed CVE-2023-52458: (unk) block: add check that partition length needs to be aligned with block size CVE-2023-52464: (unk) EDAC/thunderx: Fix possible out-of-bounds string access + CVE-2023-52469: (unk) drivers/amd/pm: fix a use-after-free in kv_parse_power_table + CVE-2023-52470: (unk) drm/radeon: check the alloc_workqueue return value in radeon_crtc_init() + CVE-2023-52474: (unk) IB/hfi1: Fix bugs with non-PAGE_SIZE-end multi-iovec user SDMA requests + CVE-2023-52475: (unk) Input: powermate - fix use-after-free in powermate_config_complete + CVE-2023-52476: (unk) perf/x86/lbr: Filter vsyscall addresses + CVE-2023-52477: (unk) usb: hub: Guard against accesses to uninitialized BOS descriptors + CVE-2023-52478: (unk) HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect + CVE-2023-52479: (unk) ksmbd: fix uaf in smb20_oplock_break_ack + CVE-2023-52480: (unk) ksmbd: fix race condition between session lookup and expire + CVE-2023-52481: (unk) arm64: errata: Add Cortex-A520 speculative unprivileged load workaround + CVE-2023-52482: (unk) x86/srso: Add SRSO mitigation for Hygon processors + CVE-2023-52484: (unk) iommu/arm-smmu-v3: Fix soft lockup triggered by arm_smmu_mm_invalidate_range + CVE-2023-52485: (unk) drm/amd/display: Wake DMCUB before sending a command + CVE-2023-52486: (unk) drm: Don't unref the same fb many times by mistake due to deadlock handling + CVE-2023-52488: (unk) serial: sc16is7xx: convert from _raw_ to _noinc_ regmap functions for FIFO + CVE-2023-52489: (unk) mm/sparsemem: fix race in accessing memory_section->usage + CVE-2023-52491: (unk) media: mtk-jpeg: Fix use after free bug due to error path handling in mtk_jpeg_dec_device_run + CVE-2023-52498: (unk) PM: sleep: Fix possible deadlocks in core system-wide PM code + CVE-2023-52500: (unk) scsi: pm80xx: Avoid leaking tags when processing OPC_INB_SET_CONTROLLER_CONFIG command + CVE-2023-52501: (unk) ring-buffer: Do not attempt to read past "commit" + CVE-2023-52502: (unk) net: nfc: fix races in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn() + CVE-2023-52504: (unk) x86/alternatives: Disable KASAN in apply_alternatives() + CVE-2023-52506: (unk) LoongArch: Set all reserved memblocks on Node#0 at initialization + CVE-2023-52507: (unk) nfc: nci: assert requested protocol is valid + CVE-2023-52508: (unk) nvme-fc: Prevent null pointer dereference in nvme_fc_io_getuuid() + CVE-2023-52509: (unk) ravb: Fix use-after-free issue in ravb_tx_timeout_work() + CVE-2023-52510: (unk) ieee802154: ca8210: Fix a potential UAF in ca8210_probe + CVE-2023-52511: (unk) spi: sun6i: reduce DMA RX transfer width to single byte + CVE-2023-52515: (unk) RDMA/srp: Do not call scsi_done() from srp_abort() + CVE-2023-52516: (unk) dma-debug: don't call __dma_entry_alloc_check_leak() under free_entries_lock + CVE-2023-52517: (unk) spi: sun6i: fix race between DMA RX transfer completion and RX FIFO drain + CVE-2023-52519: (unk) HID: intel-ish-hid: ipc: Disable and reenable ACPI GPE bit + CVE-2023-52522: (unk) net: fix possible store tearing in neigh_periodic_work() + CVE-2023-52527: (unk) ipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data() + CVE-2023-52528: (unk) net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg + CVE-2023-52530: (unk) wifi: mac80211: fix potential key use-after-free + CVE-2023-52531: (unk) wifi: iwlwifi: mvm: Fix a memory corruption issue + CVE-2023-52532: (unk) net: mana: Fix TX CQE error handling + CVE-2023-52559: (unk) iommu/vt-d: Avoid memory allocation in iommu_suspend() + CVE-2023-52561: (unk) arm64: dts: qcom: sdm845-db845c: Mark cont splash memory region as reserved + CVE-2023-52563: (unk) drm/meson: fix memory leak on ->hpd_notify callback + CVE-2023-52565: (unk) media: uvcvideo: Fix OOB read + CVE-2023-52566: (unk) nilfs2: fix potential use after free in nilfs_gccache_submit_read_data() + CVE-2023-52568: (unk) x86/sgx: Resolves SECS reclaim vs. page fault for EAUG race + CVE-2023-52569: (unk) btrfs: remove BUG() after failure to insert delayed dir index item + CVE-2023-52571: (unk) power: supply: rk817: Fix node refcount leak + CVE-2023-52572: (unk) cifs: Fix UAF in cifs_demultiplex_thread() + CVE-2023-52573: (unk) net: rds: Fix possible NULL-pointer dereference + CVE-2023-52574: (unk) team: fix null-ptr-deref when team device type is changed + CVE-2023-52578: (unk) net: bridge: use DEV_STATS_INC() + CVE-2023-52583: (unk) ceph: fix deadlock or deadcode of misusing dget() + CVE-2023-52584: (unk) spmi: mediatek: Fix UAF on device remove + CVE-2023-52585: (unk) drm/amdgpu: Fix possible NULL dereference in amdgpu_ras_query_error_status_helper() + CVE-2023-52586: (unk) drm/msm/dpu: Add mutex lock in control vblank irq + CVE-2023-52587: (unk) IB/ipoib: Fix mcast list locking + CVE-2023-52588: (unk) f2fs: fix to tag gcing flag on page during block migration + CVE-2023-52589: (unk) media: rkisp1: Fix IRQ disable race issue + CVE-2023-52590: (unk) ocfs2: Avoid touching renamed directory if parent does not change + CVE-2023-52591: (unk) reiserfs: Avoid touching renamed directory if parent does not change + CVE-2023-52593: (unk) wifi: wfx: fix possible NULL pointer dereference in wfx_set_mfp_ap() + CVE-2023-52594: (unk) wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus() + CVE-2023-52595: (unk) wifi: rt2x00: restart beacon queue when hardware reset + CVE-2023-52596: (unk) sysctl: Fix out of bounds access for empty sysctl registers + CVE-2023-52597: (unk) KVM: s390: fix setting of fpc register + CVE-2023-52598: (unk) s390/ptrace: handle setting of fpc register correctly + CVE-2023-52599: (unk) jfs: fix array-index-out-of-bounds in diNewExt + CVE-2023-52600: (unk) jfs: fix uaf in jfs_evict_inode + CVE-2023-52601: (unk) jfs: fix array-index-out-of-bounds in dbAdjTree + CVE-2023-52602: (unk) jfs: fix slab-out-of-bounds Read in dtSearch + CVE-2023-52603: (unk) UBSAN: array-index-out-of-bounds in dtSplitRoot + CVE-2023-52604: (unk) FS:JFS:UBSAN:array-index-out-of-bounds in dbAdjTree + CVE-2023-52606: (unk) powerpc/lib: Validate size for vector operations + CVE-2023-52607: (unk) powerpc/mm: Fix null-pointer dereference in pgtable_cache_add + CVE-2023-52609: (unk) binder: fix race between mmput() and do_exit() + CVE-2023-52612: (unk) crypto: scomp - fix req->dst buffer overflow + CVE-2023-52614: (unk) PM / devfreq: Fix buffer overflow in trans_stat_show + CVE-2023-52615: (unk) hwrng: core - Fix page fault dead lock on mmap-ed hwrng + CVE-2023-52617: (unk) PCI: switchtec: Fix stdev_release() crash after surprise hot remove + CVE-2023-52618: (unk) block/rnbd-srv: Check for unlikely string overflow + CVE-2023-52619: (unk) pstore/ram: Fix crash when setting number of cpus to an odd number + CVE-2023-52620: (unk) netfilter: nf_tables: disallow timeout for anonymous sets + CVE-2023-52621: (unk) bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers + CVE-2023-52622: (unk) ext4: avoid online resizing failures due to oversized flex bg + CVE-2023-52623: (unk) SUNRPC: Fix a suspicious RCU usage warning + CVE-2023-52624: (unk) drm/amd/display: Wake DMCUB before executing GPINT commands + CVE-2023-52625: (unk) drm/amd/display: Refactor DMCUB enter/exit idle interface + CVE-2023-52628: (unk) netfilter: nftables: exthdr: fix 4-byte stack OOB write + CVE-2023-52629: (unk) sh: push-switch: Reorder cleanup operations to avoid use-after-free bug + CVE-2023-52632: (unk) drm/amdkfd: Fix lock dependency warning with srcu + CVE-2023-52633: (unk) um: time-travel: fix time corruption + CVE-2023-52634: (unk) drm/amd/display: Fix disable_otg_wa logic + CVE-2023-52635: (unk) PM / devfreq: Synchronize devfreq_monitor_[start/stop] + CVE-2023-52638: (unk) can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock + CVE-2023-52639: (unk) KVM: s390: vsie: fix race during shadow creation + CVE-2023-52640: (unk) fs/ntfs3: Fix oob in ntfs_listxattr + CVE-2023-52641: (unk) fs/ntfs3: Add NULL ptr dereference checking at the end of attr_allocate_frame() CVE-2023-5717: (unk) perf: Disallow mis-matched inherited group reads CVE-2023-6040: (unk) netfilter: nf_tables: Reject tables of unsupported family CVE-2023-6121: (unk) nvmet: nul-terminate the NQNs passed in the connect command CVE-2023-6240: (unk) - CVE-2023-6270: (unk) - CVE-2023-6356: (unk) + CVE-2023-6270: (unk) aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts + CVE-2023-6356: (unk) nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length CVE-2023-6535: (unk) - CVE-2023-6536: (unk) + CVE-2023-6536: (unk) nvmet-tcp: fix a crash in nvmet_req_complete() CVE-2023-6546: (unk) tty: n_gsm: fix the UAF caused by race condition in gsm_cleanup_mux CVE-2023-6560: (unk) io_uring: don't allow discontig pages for IORING_SETUP_NO_MMAP CVE-2023-6606: (unk) smb: client: fix OOB in smbCalcSize() @@ -961,7 +1197,7 @@ Outstanding CVEs: CVE-2023-6915: (unk) ida: Fix crash in ida_free when the bitmap is empty CVE-2023-6931: (unk) perf: Fix perf_event_validate_size() CVE-2023-6932: (unk) ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet - CVE-2023-7042: (unk) + CVE-2023-7042: (unk) wifi: ath10k: fix NULL pointer dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev() CVE-2023-7192: (unk) netfilter: ctnetlink: fix possible refcount leak in ctnetlink_create_conntrack() CVE-2024-0340: (unk) vhost: use kzalloc() instead of kmalloc() followed by memset() CVE-2024-0564: (unk) @@ -970,15 +1206,16 @@ Outstanding CVEs: CVE-2024-0607: (unk) netfilter: nf_tables: fix pointer math issue in nft_byteorder_eval() CVE-2024-0646: (unk) net: tls, update curr on splice as well CVE-2024-0775: (unk) ext4: improve error recovery code paths in __ext4_remount() - CVE-2024-0841: (unk) + CVE-2024-0841: (unk) fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super CVE-2024-1086: (unk) netfilter: nf_tables: reject QUEUE/DROP verdict parameters CVE-2024-1151: (unk) net: openvswitch: limit the number of recursions from action sets CVE-2024-1312: (unk) mm: lock_vma_under_rcu() must check vma->anon_vma under vma lock CVE-2024-21803: (unk) - CVE-2024-22099: (unk) + CVE-2024-2193: (unk) + CVE-2024-22099: (unk) Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security CVE-2024-22386: (unk) - CVE-2024-23196: (unk) - CVE-2024-23307: (unk) + CVE-2024-23196: (unk) ALSA: hda: fix a possible null-pointer dereference due to data race in snd_hdac_regmap_sync() + CVE-2024-23307: (unk) md/raid5: fix atomicity violation in raid5_cache_count CVE-2024-23848: (unk) CVE-2024-23849: (unk) net/rds: Fix UBSAN: array-index-out-of-bounds in rds_cmsg_recv CVE-2024-23851: (unk) dm: limit the number of targets and parameter size area @@ -987,7 +1224,7 @@ Outstanding CVEs: CVE-2024-24858: (unk) CVE-2024-24859: (unk) CVE-2024-24860: (unk) Bluetooth: Fix atomicity violation in {min,max}_key_size_set - CVE-2024-24861: (unk) + CVE-2024-24861: (unk) media: xc4000: Fix atomicity violation in xc4000_get_frequency CVE-2024-24864: (unk) CVE-2024-25739: (unk) CVE-2024-25740: (unk) @@ -996,12 +1233,117 @@ Outstanding CVEs: CVE-2024-26584: (unk) net: tls: handle backlogging of crypto requests CVE-2024-26585: (unk) tls: fix race between tx work scheduling and socket close CVE-2024-26586: (unk) mlxsw: spectrum_acl_tcam: Fix stack corruption - CVE-2024-26587: (unk) net: netdevsim: don't try to destroy PHC on VFs - CVE-2024-26588: (unk) LoongArch: BPF: Prevent out-of-bounds memory access CVE-2024-26589: (unk) bpf: Reject variable offset alu on PTR_TO_FLOW_KEYS - CVE-2024-26591: (unk) bpf: Fix re-attachment branch in bpf_tracing_prog_attach CVE-2024-26592: (unk) ksmbd: fix UAF issue in ksmbd_tcp_new_connection() CVE-2024-26594: (unk) ksmbd: validate mech token in session setup CVE-2024-26595: (unk) mlxsw: spectrum_acl_tcam: Fix NULL pointer dereference in error path CVE-2024-26597: (unk) net: qualcomm: rmnet: fix global oob in rmnet_policy CVE-2024-26598: (unk) KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache + CVE-2024-26600: (unk) phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP + CVE-2024-26602: (unk) sched/membarrier: reduce the ability to hammer on sys_membarrier + CVE-2024-26606: (unk) binder: signal epoll threads of self-work + CVE-2024-26607: (unk) drm/bridge: sii902x: Fix probing race issue + CVE-2024-26614: (unk) tcp: make sure init the accept_queue's spinlocks once + CVE-2024-26615: (unk) net/smc: fix illegal rmb_desc access in SMC-D connection dump + CVE-2024-26622: (unk) tomoyo: fix UAF write bug in tomoyo_write_control() + CVE-2024-26623: (unk) pds_core: Prevent race issues involving the adminq + CVE-2024-26625: (unk) llc: call sock_orphan() at release time + CVE-2024-26627: (unk) scsi: core: Move scsi_host_busy() out of host lock for waking up EH handler + CVE-2024-26633: (unk) ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim() + CVE-2024-26635: (unk) llc: Drop support for ETH_P_TR_802_2. + CVE-2024-26636: (unk) llc: make llc_ui_sendmsg() more robust against bonding changes + CVE-2024-26640: (unk) tcp: add sanity checks to rx zerocopy + CVE-2024-26641: (unk) ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv() + CVE-2024-26642: (unk) netfilter: nf_tables: disallow anonymous set with timeout flag + CVE-2024-26644: (unk) btrfs: don't abort filesystem when attempting to snapshot deleted subvolume + CVE-2024-26645: (unk) tracing: Ensure visibility when inserting an element into tracing_map + CVE-2024-26646: (unk) thermal: intel: hfi: Add syscore callbacks for system-wide PM + CVE-2024-26647: (unk) drm/amd/display: Fix late derefrence 'dsc' check in 'link_set_dsc_pps_packet()' + CVE-2024-26648: (unk) drm/amd/display: Fix variable deferencing before NULL check in edp_setup_replay() + CVE-2024-26650: (unk) platform/x86: p2sb: Allow p2sb_bar() calls during PCI device probe + CVE-2024-26651: (unk) sr9800: Add check for usbnet_get_endpoints + CVE-2024-26654: (unk) ALSA: sh: aica: reorder cleanup operations to avoid UAF bugs + CVE-2024-26655: (unk) Fix memory leak in posix_clock_open() + CVE-2024-26656: (unk) drm/amdgpu: fix use-after-free bug + CVE-2024-26658: (unk) bcachefs: grab s_umount only if snapshotting + CVE-2024-26659: (unk) xhci: handle isoc Babble and Buffer Overrun events properly + CVE-2024-26663: (unk) tipc: Check the bearer type before calling tipc_udp_nl_bearer_add() + CVE-2024-26664: (unk) hwmon: (coretemp) Fix out-of-bounds memory access + CVE-2024-26668: (unk) netfilter: nft_limit: reject configurations that cause integer overflow + CVE-2024-26669: (unk) net/sched: flower: Fix chain template offload + CVE-2024-26671: (unk) blk-mq: fix IO hang from sbitmap wakeup race + CVE-2024-26672: (unk) drm/amdgpu: Fix variable 'mca_funcs' dereferenced before NULL check in 'amdgpu_mca_smu_get_mca_entry()' + CVE-2024-26675: (unk) ppp_async: limit MRU to 64K + CVE-2024-26676: (unk) af_unix: Call kfree_skb() for dead unix_(sk)->oob_skb in GC. + CVE-2024-26677: (unk) rxrpc: Fix delayed ACKs to not set the reference serial number + CVE-2024-26679: (unk) inet: read sk->sk_family once in inet_recv_error() + CVE-2024-26685: (unk) nilfs2: fix potential bug in end_buffer_async_write + CVE-2024-26686: (unk) fs/proc: do_task_stat: use sig->stats_lock to gather the threads/children stats + CVE-2024-26687: (unk) xen/events: close evtchn after mapping cleanup + CVE-2024-26688: (unk) fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super + CVE-2024-26689: (unk) ceph: prevent use-after-free in encode_cap_msg() + CVE-2024-26691: (unk) KVM: arm64: Fix circular locking dependency + CVE-2024-26696: (unk) nilfs2: fix hang in nilfs_lookup_dirty_data_buffers() + CVE-2024-26697: (unk) nilfs2: fix data corruption in dsync block recovery for small block sizes + CVE-2024-26699: (unk) drm/amd/display: Fix array-index-out-of-bounds in dcn35_clkmgr + CVE-2024-26700: (unk) drm/amd/display: Fix MST Null Ptr for RV + CVE-2024-26702: (unk) iio: magnetometer: rm3100: add boundary check for the value read from RM3100_REG_TMRC + CVE-2024-26704: (unk) ext4: fix double-free of blocks due to wrong extents moved_len + CVE-2024-26706: (unk) parisc: Fix random data corruption from exception handler + CVE-2024-26713: (unk) powerpc/pseries/iommu: Fix iommu initialisation during DLPAR add + CVE-2024-26715: (unk) usb: dwc3: gadget: Fix NULL pointer dereference in dwc3_gadget_suspend + CVE-2024-26719: (unk) nouveau: offload fence uevents work to workqueue + CVE-2024-26720: (unk) mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again + CVE-2024-26726: (unk) btrfs: don't drop extent_map for free space inode on write error + CVE-2024-26733: (unk) arp: Prevent overflow in arp_req_get(). + CVE-2024-26735: (unk) ipv6: sr: fix possible use-after-free and null-ptr-deref + CVE-2024-26736: (unk) afs: Increase buffer size in afs_update_volume_status() + CVE-2024-26738: (unk) powerpc/pseries/iommu: DLPAR add doesn't completely initialize pci_controller + CVE-2024-26739: (unk) net/sched: act_mirred: don't override retval if we already lost the skb + CVE-2024-26740: (unk) net/sched: act_mirred: use the backlog for mirred ingress + CVE-2024-26743: (unk) RDMA/qedr: Fix qedr_create_user_qp error flow + CVE-2024-26744: (unk) RDMA/srpt: Support specifying the srpt_service_guid parameter + CVE-2024-26745: (unk) powerpc/pseries/iommu: IOMMU table is not initialized for kdump over SR-IOV + CVE-2024-26747: (unk) usb: roles: fix NULL pointer issue when put module's reference + CVE-2024-26748: (unk) usb: cdns3: fix memory double free when handle zero packet + CVE-2024-26751: (unk) ARM: ep93xx: Add terminator to gpiod_lookup_table + CVE-2024-26752: (unk) l2tp: pass correct message length to ip6_append_data + CVE-2024-26754: (unk) gtp: fix use-after-free and null-ptr-deref in gtp_genl_dump_pdp() + CVE-2024-26756: (unk) md: Don't register sync_thread for reshape directly + CVE-2024-26757: (unk) md: Don't ignore read-only array in md_check_recovery() + CVE-2024-26758: (unk) md: Don't ignore suspended array in md_check_recovery() + CVE-2024-26759: (unk) mm/swap: fix race when skipping swapcache + CVE-2024-26763: (unk) dm-crypt: don't modify the data when using authenticated encryption + CVE-2024-26764: (unk) fs/aio: Restrict kiocb_set_cancel_fn() to I/O submitted via libaio + CVE-2024-26765: (unk) LoongArch: Disable IRQ before init_fn() for nonboot CPUs + CVE-2024-26766: (unk) IB/hfi1: Fix sdma.h tx->num_descs off-by-one error + CVE-2024-26767: (unk) drm/amd/display: fixed integer types and null check locations + CVE-2024-26768: (unk) LoongArch: Change acpi_core_pic[NR_CPUS] to acpi_core_pic[MAX_CORE_PIC] + CVE-2024-26769: (unk) nvmet-fc: avoid deadlock on delete association path + CVE-2024-26770: (unk) HID: nvidia-shield: Add missing null pointer checks to LED initialization + CVE-2024-26771: (unk) dmaengine: ti: edma: Add some null pointer checks to the edma_probe + CVE-2024-26772: (unk) ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal() + CVE-2024-26773: (unk) ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found() + CVE-2024-26774: (unk) ext4: avoid dividing by 0 in mb_update_avg_fragment_size() when block bitmap corrupt + CVE-2024-26775: (unk) aoe: avoid potential deadlock at set_capacity + CVE-2024-26776: (unk) spi: hisi-sfc-v3xx: Return IRQ_NONE if no interrupts were detected + CVE-2024-26777: (unk) fbdev: sis: Error out if pixclock equals zero + CVE-2024-26778: (unk) fbdev: savage: Error out if pixclock equals zero + CVE-2024-26779: (unk) wifi: mac80211: fix race condition on enabling fast-xmit + CVE-2024-26784: (unk) pmdomain: arm: Fix NULL dereference on scmi_perf_domain removal + CVE-2024-26787: (unk) mmc: mmci: stm32: fix DMA API overlapping mappings warning + CVE-2024-26788: (unk) dmaengine: fsl-qdma: init irq after reg initialization + CVE-2024-26789: (unk) crypto: arm64/neonbs - fix out-of-bounds access on short input + CVE-2024-26790: (unk) dmaengine: fsl-qdma: fix SoC may hang on 16 byte unaligned read + CVE-2024-26791: (unk) btrfs: dev-replace: properly validate device names + CVE-2024-26793: (unk) gtp: fix use-after-free and null-ptr-deref in gtp_newlink() + CVE-2024-26797: (unk) drm/amd/display: Prevent potential buffer overflow in map_hw_resources + CVE-2024-26798: (unk) fbcon: always restore the old font data in fbcon_do_set_font() + CVE-2024-26801: (unk) Bluetooth: Avoid potential use-after-free in hci_error_reset + CVE-2024-26802: (unk) stmmac: Clear variable when destroying workqueue + CVE-2024-26803: (unk) net: veth: clear GRO when clearing XDP even when down + CVE-2024-26804: (unk) net: ip_tunnel: prevent perpetual headroom growth + CVE-2024-26805: (unk) netlink: Fix kernel-infoleak-after-free in __skb_datagram_iter + CVE-2024-26806: (unk) spi: cadence-qspi: remove system-wide suspend helper calls from runtime PM hooks + CVE-2024-26808: (unk) netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain + CVE-2024-26809: (unk) netfilter: nft_set_pipapo: release elements in clone only from destroy path diff --git a/data/5.3/5.3_CVEs.txt b/data/5.3/5.3_CVEs.txt index 0b43b4b3d..fc1085f35 100644 --- a/data/5.3/5.3_CVEs.txt +++ b/data/5.3/5.3_CVEs.txt @@ -152,6 +152,7 @@ CVE-2019-20794: Fix unknown CVE-2019-20810: Fix not seen in stream CVE-2019-20812: Fix not seen in stream CVE-2019-20908: Fix not seen in stream +CVE-2019-25162: Fix not seen in stream CVE-2019-3016: Fix not seen in stream CVE-2019-5108: Fixed with 5.3 CVE-2020-0009: Fix not seen in stream @@ -319,6 +320,14 @@ CVE-2020-36558: Fix not seen in stream CVE-2020-36691: Fix not seen in stream CVE-2020-36694: Fix not seen in stream CVE-2020-36766: Fix not seen in stream +CVE-2020-36775: Fix not seen in stream +CVE-2020-36777: Fix not seen in stream +CVE-2020-36780: Fix not seen in stream +CVE-2020-36781: Fix not seen in stream +CVE-2020-36782: Fix not seen in stream +CVE-2020-36783: Fix not seen in stream +CVE-2020-36784: Fix not seen in stream +CVE-2020-36787: Fix not seen in stream CVE-2020-3702: Fix not seen in stream CVE-2020-4788: Fix not seen in stream CVE-2020-8428: Fix not seen in stream @@ -487,6 +496,139 @@ CVE-2021-45469: Fix not seen in stream CVE-2021-45485: Fix not seen in stream CVE-2021-45486: Fix not seen in stream CVE-2021-45868: Fix not seen in stream +CVE-2021-46904: Fix not seen in stream +CVE-2021-46906: Fix not seen in stream +CVE-2021-46908: Fix not seen in stream +CVE-2021-46909: Fix not seen in stream +CVE-2021-46915: Fix not seen in stream +CVE-2021-46921: Fix not seen in stream +CVE-2021-46924: Fix not seen in stream +CVE-2021-46925: Fix not seen in stream +CVE-2021-46926: Fix not seen in stream +CVE-2021-46928: Fix not seen in stream +CVE-2021-46929: Fix not seen in stream +CVE-2021-46930: Fix not seen in stream +CVE-2021-46932: Fix not seen in stream +CVE-2021-46933: Fix not seen in stream +CVE-2021-46934: Fix not seen in stream +CVE-2021-46935: Fix not seen in stream +CVE-2021-46936: Fix not seen in stream +CVE-2021-46938: Fix not seen in stream +CVE-2021-46939: Fix not seen in stream +CVE-2021-46941: Fix not seen in stream +CVE-2021-46943: Fix not seen in stream +CVE-2021-46944: Fix not seen in stream +CVE-2021-46950: Fix not seen in stream +CVE-2021-46951: Fix not seen in stream +CVE-2021-46952: Fix not seen in stream +CVE-2021-46953: Fix not seen in stream +CVE-2021-46955: Fix not seen in stream +CVE-2021-46959: Fix not seen in stream +CVE-2021-46960: Fix not seen in stream +CVE-2021-46961: Fix not seen in stream +CVE-2021-46962: Fix not seen in stream +CVE-2021-46965: Fix not seen in stream +CVE-2021-46969: Fix not seen in stream +CVE-2021-46970: Fix not seen in stream +CVE-2021-46974: Fix not seen in stream +CVE-2021-46982: Fix not seen in stream +CVE-2021-46984: Fix not seen in stream +CVE-2021-46988: Fix not seen in stream +CVE-2021-46989: Fix not seen in stream +CVE-2021-46991: Fix not seen in stream +CVE-2021-46992: Fix not seen in stream +CVE-2021-46993: Fix not seen in stream +CVE-2021-46998: Fix not seen in stream +CVE-2021-47004: Fix not seen in stream +CVE-2021-47005: Fix not seen in stream +CVE-2021-47006: Fix not seen in stream +CVE-2021-47010: Fix not seen in stream +CVE-2021-47012: Fix not seen in stream +CVE-2021-47013: Fix not seen in stream +CVE-2021-47015: Fix not seen in stream +CVE-2021-47016: Fix not seen in stream +CVE-2021-47020: Fix not seen in stream +CVE-2021-47024: Fix not seen in stream +CVE-2021-47028: Fix not seen in stream +CVE-2021-47034: Fix not seen in stream +CVE-2021-47041: Fix not seen in stream +CVE-2021-47046: Fix not seen in stream +CVE-2021-47049: Fix not seen in stream +CVE-2021-47051: Fix not seen in stream +CVE-2021-47052: Fix not seen in stream +CVE-2021-47054: Fix not seen in stream +CVE-2021-47056: Fix not seen in stream +CVE-2021-47059: Fix not seen in stream +CVE-2021-47063: Fix not seen in stream +CVE-2021-47065: Fix not seen in stream +CVE-2021-47070: Fix not seen in stream +CVE-2021-47071: Fix not seen in stream +CVE-2021-47073: Fix not seen in stream +CVE-2021-47074: Fix not seen in stream +CVE-2021-47075: Fix not seen in stream +CVE-2021-47076: Fix not seen in stream +CVE-2021-47077: Fix not seen in stream +CVE-2021-47078: Fix not seen in stream +CVE-2021-47082: Fix not seen in stream +CVE-2021-47083: Fix not seen in stream +CVE-2021-47086: Fix not seen in stream +CVE-2021-47100: Fix not seen in stream +CVE-2021-47101: Fix not seen in stream +CVE-2021-47103: Fix not seen in stream +CVE-2021-47109: Fix not seen in stream +CVE-2021-47110: Fix not seen in stream +CVE-2021-47112: Fix not seen in stream +CVE-2021-47113: Fix not seen in stream +CVE-2021-47114: Fix not seen in stream +CVE-2021-47116: Fix not seen in stream +CVE-2021-47117: Fix not seen in stream +CVE-2021-47118: Fix not seen in stream +CVE-2021-47119: Fix not seen in stream +CVE-2021-47120: Fix not seen in stream +CVE-2021-47121: Fix not seen in stream +CVE-2021-47122: Fix not seen in stream +CVE-2021-47124: Fix not seen in stream +CVE-2021-47125: Fix not seen in stream +CVE-2021-47126: Fix not seen in stream +CVE-2021-47128: Fix not seen in stream +CVE-2021-47129: Fix not seen in stream +CVE-2021-47131: Fix not seen in stream +CVE-2021-47133: Fix not seen in stream +CVE-2021-47135: Fix not seen in stream +CVE-2021-47136: Fix not seen in stream +CVE-2021-47137: Fix not seen in stream +CVE-2021-47138: Fix not seen in stream +CVE-2021-47140: Fix not seen in stream +CVE-2021-47141: Fix not seen in stream +CVE-2021-47142: Fix not seen in stream +CVE-2021-47143: Fix not seen in stream +CVE-2021-47144: Fix not seen in stream +CVE-2021-47145: Fix not seen in stream +CVE-2021-47146: Fix not seen in stream +CVE-2021-47147: Fix not seen in stream +CVE-2021-47149: Fix not seen in stream +CVE-2021-47150: Fix not seen in stream +CVE-2021-47151: Fix not seen in stream +CVE-2021-47153: Fix not seen in stream +CVE-2021-47158: Fix not seen in stream +CVE-2021-47159: Fix not seen in stream +CVE-2021-47160: Fix not seen in stream +CVE-2021-47161: Fix not seen in stream +CVE-2021-47162: Fix not seen in stream +CVE-2021-47163: Fix not seen in stream +CVE-2021-47165: Fix not seen in stream +CVE-2021-47166: Fix not seen in stream +CVE-2021-47167: Fix not seen in stream +CVE-2021-47168: Fix not seen in stream +CVE-2021-47169: Fix not seen in stream +CVE-2021-47170: Fix not seen in stream +CVE-2021-47171: Fix not seen in stream +CVE-2021-47172: Fix not seen in stream +CVE-2021-47173: Fix not seen in stream +CVE-2021-47175: Fix not seen in stream +CVE-2021-47177: Fix not seen in stream +CVE-2021-47179: Fix not seen in stream +CVE-2021-47180: Fix not seen in stream CVE-2022-0001: Fix not seen in stream CVE-2022-0002: Fix not seen in stream CVE-2022-0168: Fix not seen in stream @@ -706,6 +848,10 @@ CVE-2022-47520: Fix not seen in stream CVE-2022-47929: Fix not seen in stream CVE-2022-47946: Fix not seen in stream CVE-2022-48619: Fix not seen in stream +CVE-2022-48626: Fix not seen in stream +CVE-2022-48627: Fix not seen in stream +CVE-2022-48628: Fix not seen in stream +CVE-2022-48629: Fix not seen in stream CVE-2023-0045: Fix not seen in stream CVE-2023-0047: Fix not seen in stream CVE-2023-0160: Fix not seen in stream @@ -779,6 +925,7 @@ CVE-2023-28327: Fix not seen in stream CVE-2023-28328: Fix not seen in stream CVE-2023-28466: Fix not seen in stream CVE-2023-2860: Fix not seen in stream +CVE-2023-28746: Fix not seen in stream CVE-2023-28772: Fix not seen in stream CVE-2023-2985: Fix not seen in stream CVE-2023-3006: Fix not seen in stream @@ -854,7 +1001,7 @@ CVE-2023-4622: Fix not seen in stream CVE-2023-4623: Fix not seen in stream CVE-2023-46343: Fix not seen in stream CVE-2023-46838: Fix not seen in stream -CVE-2023-47233: Fix unknown +CVE-2023-47233: Fix not seen in stream CVE-2023-4881: Fix not seen in stream CVE-2023-4921: Fix not seen in stream CVE-2023-50431: Fix not seen in stream @@ -879,18 +1026,115 @@ CVE-2023-52448: Fix not seen in stream CVE-2023-52449: Fix not seen in stream CVE-2023-52451: Fix not seen in stream CVE-2023-52454: Fix not seen in stream -CVE-2023-52456: Fix not seen in stream -CVE-2023-52457: Fix not seen in stream CVE-2023-52458: Fix not seen in stream CVE-2023-52464: Fix not seen in stream +CVE-2023-52469: Fix not seen in stream +CVE-2023-52470: Fix not seen in stream +CVE-2023-52474: Fix not seen in stream +CVE-2023-52475: Fix not seen in stream +CVE-2023-52476: Fix not seen in stream +CVE-2023-52477: Fix not seen in stream +CVE-2023-52478: Fix not seen in stream +CVE-2023-52479: Fix not seen in stream +CVE-2023-52480: Fix not seen in stream +CVE-2023-52481: Fix not seen in stream +CVE-2023-52482: Fix not seen in stream +CVE-2023-52484: Fix not seen in stream +CVE-2023-52485: Fix not seen in stream +CVE-2023-52486: Fix not seen in stream +CVE-2023-52488: Fix not seen in stream +CVE-2023-52489: Fix not seen in stream +CVE-2023-52491: Fix not seen in stream +CVE-2023-52497: Fix not seen in stream +CVE-2023-52498: Fix not seen in stream +CVE-2023-52500: Fix not seen in stream +CVE-2023-52501: Fix not seen in stream +CVE-2023-52502: Fix not seen in stream +CVE-2023-52504: Fix not seen in stream +CVE-2023-52506: Fix not seen in stream +CVE-2023-52507: Fix not seen in stream +CVE-2023-52508: Fix not seen in stream +CVE-2023-52509: Fix not seen in stream +CVE-2023-52510: Fix not seen in stream +CVE-2023-52511: Fix not seen in stream +CVE-2023-52513: Fix not seen in stream +CVE-2023-52515: Fix not seen in stream +CVE-2023-52516: Fix not seen in stream +CVE-2023-52517: Fix not seen in stream +CVE-2023-52519: Fix not seen in stream +CVE-2023-52522: Fix not seen in stream +CVE-2023-52527: Fix not seen in stream +CVE-2023-52528: Fix not seen in stream +CVE-2023-52530: Fix not seen in stream +CVE-2023-52531: Fix not seen in stream +CVE-2023-52532: Fix not seen in stream +CVE-2023-52559: Fix not seen in stream +CVE-2023-52561: Fix not seen in stream +CVE-2023-52563: Fix not seen in stream +CVE-2023-52565: Fix not seen in stream +CVE-2023-52566: Fix not seen in stream +CVE-2023-52568: Fix not seen in stream +CVE-2023-52569: Fix not seen in stream +CVE-2023-52571: Fix not seen in stream +CVE-2023-52572: Fix not seen in stream +CVE-2023-52573: Fix not seen in stream +CVE-2023-52574: Fix not seen in stream +CVE-2023-52578: Fix not seen in stream +CVE-2023-52583: Fix not seen in stream +CVE-2023-52584: Fix not seen in stream +CVE-2023-52585: Fix not seen in stream +CVE-2023-52586: Fix not seen in stream +CVE-2023-52587: Fix not seen in stream +CVE-2023-52588: Fix not seen in stream +CVE-2023-52589: Fix not seen in stream +CVE-2023-52590: Fix not seen in stream +CVE-2023-52591: Fix not seen in stream +CVE-2023-52593: Fix not seen in stream +CVE-2023-52594: Fix not seen in stream +CVE-2023-52595: Fix not seen in stream +CVE-2023-52596: Fix not seen in stream +CVE-2023-52597: Fix not seen in stream +CVE-2023-52598: Fix not seen in stream +CVE-2023-52599: Fix not seen in stream +CVE-2023-52600: Fix not seen in stream +CVE-2023-52601: Fix not seen in stream +CVE-2023-52602: Fix not seen in stream +CVE-2023-52603: Fix not seen in stream +CVE-2023-52604: Fix not seen in stream +CVE-2023-52606: Fix not seen in stream +CVE-2023-52607: Fix not seen in stream +CVE-2023-52609: Fix not seen in stream +CVE-2023-52610: Fix not seen in stream +CVE-2023-52612: Fix not seen in stream +CVE-2023-52614: Fix not seen in stream +CVE-2023-52615: Fix not seen in stream +CVE-2023-52617: Fix not seen in stream +CVE-2023-52618: Fix not seen in stream +CVE-2023-52619: Fix not seen in stream +CVE-2023-52620: Fix not seen in stream +CVE-2023-52621: Fix not seen in stream +CVE-2023-52622: Fix not seen in stream +CVE-2023-52623: Fix not seen in stream +CVE-2023-52624: Fix not seen in stream +CVE-2023-52625: Fix not seen in stream +CVE-2023-52628: Fix not seen in stream +CVE-2023-52629: Fix not seen in stream +CVE-2023-52632: Fix not seen in stream +CVE-2023-52633: Fix not seen in stream +CVE-2023-52634: Fix not seen in stream +CVE-2023-52635: Fix not seen in stream +CVE-2023-52638: Fix not seen in stream +CVE-2023-52639: Fix not seen in stream +CVE-2023-52640: Fix not seen in stream +CVE-2023-52641: Fix not seen in stream CVE-2023-5717: Fix not seen in stream CVE-2023-6040: Fix not seen in stream CVE-2023-6121: Fix not seen in stream CVE-2023-6240: Fix unknown -CVE-2023-6270: Fix unknown -CVE-2023-6356: Fix unknown +CVE-2023-6270: Fix not seen in stream +CVE-2023-6356: Fix not seen in stream CVE-2023-6535: Fix unknown -CVE-2023-6536: Fix unknown +CVE-2023-6536: Fix not seen in stream CVE-2023-6546: Fix not seen in stream CVE-2023-6560: Fix not seen in stream CVE-2023-6606: Fix not seen in stream @@ -898,7 +1142,7 @@ CVE-2023-6610: Fix not seen in stream CVE-2023-6915: Fix not seen in stream CVE-2023-6931: Fix not seen in stream CVE-2023-6932: Fix not seen in stream -CVE-2023-7042: Fix unknown +CVE-2023-7042: Fix not seen in stream CVE-2023-7192: Fix not seen in stream CVE-2024-0340: Fix not seen in stream CVE-2024-0564: Fix unknown @@ -907,15 +1151,16 @@ CVE-2024-0584: Fix not seen in stream CVE-2024-0607: Fix not seen in stream CVE-2024-0646: Fix not seen in stream CVE-2024-0775: Fix not seen in stream -CVE-2024-0841: Fix unknown +CVE-2024-0841: Fix not seen in stream CVE-2024-1086: Fix not seen in stream CVE-2024-1151: Fix not seen in stream CVE-2024-1312: Fix not seen in stream CVE-2024-21803: Fix unknown -CVE-2024-22099: Fix unknown +CVE-2024-2193: Fix unknown +CVE-2024-22099: Fix not seen in stream CVE-2024-22386: Fix unknown -CVE-2024-23196: Fix unknown -CVE-2024-23307: Fix unknown +CVE-2024-23196: Fix not seen in stream +CVE-2024-23307: Fix not seen in stream CVE-2024-23848: Fix unknown CVE-2024-23849: Fix not seen in stream CVE-2024-23851: Fix not seen in stream @@ -924,7 +1169,7 @@ CVE-2024-24857: Fix unknown CVE-2024-24858: Fix unknown CVE-2024-24859: Fix unknown CVE-2024-24860: Fix not seen in stream -CVE-2024-24861: Fix unknown +CVE-2024-24861: Fix not seen in stream CVE-2024-24864: Fix unknown CVE-2024-25739: Fix unknown CVE-2024-25740: Fix unknown @@ -933,13 +1178,119 @@ CVE-2024-25744: Fix not seen in stream CVE-2024-26584: Fix not seen in stream CVE-2024-26585: Fix not seen in stream CVE-2024-26586: Fix not seen in stream -CVE-2024-26587: Fix not seen in stream -CVE-2024-26588: Fix not seen in stream CVE-2024-26589: Fix not seen in stream -CVE-2024-26591: Fix not seen in stream CVE-2024-26592: Fix not seen in stream CVE-2024-26593: Fix not seen in stream CVE-2024-26594: Fix not seen in stream CVE-2024-26595: Fix not seen in stream CVE-2024-26597: Fix not seen in stream CVE-2024-26598: Fix not seen in stream +CVE-2024-26600: Fix not seen in stream +CVE-2024-26602: Fix not seen in stream +CVE-2024-26606: Fix not seen in stream +CVE-2024-26607: Fix not seen in stream +CVE-2024-26614: Fix not seen in stream +CVE-2024-26615: Fix not seen in stream +CVE-2024-26622: Fix not seen in stream +CVE-2024-26623: Fix not seen in stream +CVE-2024-26625: Fix not seen in stream +CVE-2024-26627: Fix not seen in stream +CVE-2024-26633: Fix not seen in stream +CVE-2024-26635: Fix not seen in stream +CVE-2024-26636: Fix not seen in stream +CVE-2024-26640: Fix not seen in stream +CVE-2024-26641: Fix not seen in stream +CVE-2024-26642: Fix not seen in stream +CVE-2024-26644: Fix not seen in stream +CVE-2024-26645: Fix not seen in stream +CVE-2024-26646: Fix not seen in stream +CVE-2024-26647: Fix not seen in stream +CVE-2024-26648: Fix not seen in stream +CVE-2024-26650: Fix not seen in stream +CVE-2024-26651: Fix not seen in stream +CVE-2024-26654: Fix not seen in stream +CVE-2024-26655: Fix not seen in stream +CVE-2024-26656: Fix not seen in stream +CVE-2024-26658: Fix not seen in stream +CVE-2024-26659: Fix not seen in stream +CVE-2024-26663: Fix not seen in stream +CVE-2024-26664: Fix not seen in stream +CVE-2024-26668: Fix not seen in stream +CVE-2024-26669: Fix not seen in stream +CVE-2024-26671: Fix not seen in stream +CVE-2024-26672: Fix not seen in stream +CVE-2024-26673: Fix not seen in stream +CVE-2024-26675: Fix not seen in stream +CVE-2024-26676: Fix not seen in stream +CVE-2024-26677: Fix not seen in stream +CVE-2024-26679: Fix not seen in stream +CVE-2024-26685: Fix not seen in stream +CVE-2024-26686: Fix not seen in stream +CVE-2024-26687: Fix not seen in stream +CVE-2024-26688: Fix not seen in stream +CVE-2024-26689: Fix not seen in stream +CVE-2024-26691: Fix not seen in stream +CVE-2024-26696: Fix not seen in stream +CVE-2024-26697: Fix not seen in stream +CVE-2024-26699: Fix not seen in stream +CVE-2024-26700: Fix not seen in stream +CVE-2024-26702: Fix not seen in stream +CVE-2024-26704: Fix not seen in stream +CVE-2024-26706: Fix not seen in stream +CVE-2024-26713: Fix not seen in stream +CVE-2024-26715: Fix not seen in stream +CVE-2024-26719: Fix not seen in stream +CVE-2024-26720: Fix not seen in stream +CVE-2024-26726: Fix not seen in stream +CVE-2024-26733: Fix not seen in stream +CVE-2024-26735: Fix not seen in stream +CVE-2024-26736: Fix not seen in stream +CVE-2024-26738: Fix not seen in stream +CVE-2024-26739: Fix not seen in stream +CVE-2024-26740: Fix not seen in stream +CVE-2024-26743: Fix not seen in stream +CVE-2024-26744: Fix not seen in stream +CVE-2024-26745: Fix not seen in stream +CVE-2024-26747: Fix not seen in stream +CVE-2024-26748: Fix not seen in stream +CVE-2024-26751: Fix not seen in stream +CVE-2024-26752: Fix not seen in stream +CVE-2024-26754: Fix not seen in stream +CVE-2024-26756: Fix not seen in stream +CVE-2024-26757: Fix not seen in stream +CVE-2024-26758: Fix not seen in stream +CVE-2024-26759: Fix not seen in stream +CVE-2024-26763: Fix not seen in stream +CVE-2024-26764: Fix not seen in stream +CVE-2024-26765: Fix not seen in stream +CVE-2024-26766: Fix not seen in stream +CVE-2024-26767: Fix not seen in stream +CVE-2024-26768: Fix not seen in stream +CVE-2024-26769: Fix not seen in stream +CVE-2024-26770: Fix not seen in stream +CVE-2024-26771: Fix not seen in stream +CVE-2024-26772: Fix not seen in stream +CVE-2024-26773: Fix not seen in stream +CVE-2024-26774: Fix not seen in stream +CVE-2024-26775: Fix not seen in stream +CVE-2024-26776: Fix not seen in stream +CVE-2024-26777: Fix not seen in stream +CVE-2024-26778: Fix not seen in stream +CVE-2024-26779: Fix not seen in stream +CVE-2024-26784: Fix not seen in stream +CVE-2024-26787: Fix not seen in stream +CVE-2024-26788: Fix not seen in stream +CVE-2024-26789: Fix not seen in stream +CVE-2024-26790: Fix not seen in stream +CVE-2024-26791: Fix not seen in stream +CVE-2024-26793: Fix not seen in stream +CVE-2024-26797: Fix not seen in stream +CVE-2024-26798: Fix not seen in stream +CVE-2024-26801: Fix not seen in stream +CVE-2024-26802: Fix not seen in stream +CVE-2024-26803: Fix not seen in stream +CVE-2024-26804: Fix not seen in stream +CVE-2024-26805: Fix not seen in stream +CVE-2024-26806: Fix not seen in stream +CVE-2024-26808: Fix not seen in stream +CVE-2024-26809: Fix not seen in stream diff --git a/data/5.3/5.3_security.txt b/data/5.3/5.3_security.txt index c361c1357..48b818b2b 100644 --- a/data/5.3/5.3_security.txt +++ b/data/5.3/5.3_security.txt @@ -193,6 +193,7 @@ Outstanding CVEs: CVE-2019-20810: (unk) media: go7007: fix a miss of snd_card_free CVE-2019-20812: (unk) af_packet: set defaule value for tmo CVE-2019-20908: (unk) efi: Restrict efivar_ssdt_load when the kernel is locked down + CVE-2019-25162: (unk) i2c: Fix a potential use after free CVE-2019-3016: (unk) x86/kvm: Be careful not to clear KVM_VCPU_FLUSH_TLB bit CVE-2020-0009: (unk) staging: android: ashmem: Disallow ashmem memory from being remapped CVE-2020-0067: (unk) f2fs: fix to avoid memory leakage in f2fs_listxattr @@ -356,6 +357,14 @@ Outstanding CVEs: CVE-2020-36691: (unk) netlink: limit recursion depth in policy validation CVE-2020-36694: (unk) netfilter: x_tables: Switch synchronization to RCU CVE-2020-36766: (unk) cec-api: prevent leaking memory through hole in structure + CVE-2020-36775: (unk) f2fs: fix to avoid potential deadlock + CVE-2020-36777: (unk) media: dvbdev: Fix memory leak in dvb_media_device_free() + CVE-2020-36780: (unk) i2c: sprd: fix reference leak when pm_runtime_get_sync fails + CVE-2020-36781: (unk) i2c: imx: fix reference leak when pm_runtime_get_sync fails + CVE-2020-36782: (unk) i2c: imx-lpi2c: fix reference leak when pm_runtime_get_sync fails + CVE-2020-36783: (unk) i2c: img-scb: fix reference leak when pm_runtime_get_sync fails + CVE-2020-36784: (unk) i2c: cadence: fix reference leak when pm_runtime_get_sync fails + CVE-2020-36787: (unk) media: aspeed: fix clock handling logic CVE-2020-3702: (unk) ath: Use safer key clearing with key cache entries CVE-2020-4788: (unk) powerpc/64s: flush L1D on kernel entry CVE-2020-8428: (unk) do_last(): fetch directory ->i_mode and ->i_uid before it's too late @@ -523,6 +532,139 @@ Outstanding CVEs: CVE-2021-45485: (unk) ipv6: use prandom_u32() for ID generation CVE-2021-45486: (unk) inet: use bigger hash table for IP ID generation CVE-2021-45868: (unk) quota: check block number when reading the block in quota file + CVE-2021-46904: (unk) net: hso: fix null-ptr-deref during tty device unregistration + CVE-2021-46906: (unk) HID: usbhid: fix info leak in hid_submit_ctrl + CVE-2021-46908: (unk) bpf: Use correct permission flag for mixed signed bounds arithmetic + CVE-2021-46909: (unk) ARM: footbridge: fix PCI interrupt mapping + CVE-2021-46915: (unk) netfilter: nft_limit: avoid possible divide error in nft_limit_init + CVE-2021-46921: (unk) locking/qrwlock: Fix ordering in queued_write_lock_slowpath() + CVE-2021-46924: (unk) NFC: st21nfca: Fix memory leak in device probe and remove + CVE-2021-46925: (unk) net/smc: fix kernel panic caused by race of smc_sock + CVE-2021-46926: (unk) ALSA: hda: intel-sdw-acpi: harden detection of controller + CVE-2021-46928: (unk) parisc: Clear stale IIR value on instruction access rights trap + CVE-2021-46929: (unk) sctp: use call_rcu to free endpoint + CVE-2021-46930: (unk) usb: mtu3: fix list_head check warning + CVE-2021-46932: (unk) Input: appletouch - initialize work before device registration + CVE-2021-46933: (unk) usb: gadget: f_fs: Clear ffs_eventfd in ffs_data_clear. + CVE-2021-46934: (unk) i2c: validate user data in compat ioctl + CVE-2021-46935: (unk) binder: fix async_free_space accounting for empty parcels + CVE-2021-46936: (unk) net: fix use-after-free in tw_timer_handler + CVE-2021-46938: (unk) dm rq: fix double free of blk_mq_tag_set in dev remove after table load fails + CVE-2021-46939: (unk) tracing: Restructure trace_clock_global() to never block + CVE-2021-46941: (unk) usb: dwc3: core: Do core softreset when switch mode + CVE-2021-46943: (unk) media: staging/intel-ipu3: Fix set_fmt error handling + CVE-2021-46944: (unk) media: staging/intel-ipu3: Fix memory leak in imu_fmt + CVE-2021-46950: (unk) md/raid1: properly indicate failure when ending a failed write request + CVE-2021-46951: (unk) tpm: efi: Use local variable for calculating final log size + CVE-2021-46952: (unk) NFS: fs_context: validate UDP retrans to prevent shift out-of-bounds + CVE-2021-46953: (unk) ACPI: GTDT: Don't corrupt interrupt mappings on watchdow probe failure + CVE-2021-46955: (unk) openvswitch: fix stack OOB read while fragmenting IPv4 packets + CVE-2021-46959: (unk) spi: Fix use-after-free with devm_spi_alloc_* + CVE-2021-46960: (unk) cifs: Return correct error code from smb2_get_enc_key + CVE-2021-46961: (unk) irqchip/gic-v3: Do not enable irqs when handling spurious interrups + CVE-2021-46962: (unk) mmc: uniphier-sd: Fix a resource leak in the remove function + CVE-2021-46965: (unk) mtd: physmap: physmap-bt1-rom: Fix unintentional stack access + CVE-2021-46969: (unk) bus: mhi: core: Fix invalid error returning in mhi_queue + CVE-2021-46970: (unk) bus: mhi: pci_generic: Remove WQ_MEM_RECLAIM flag from state workqueue + CVE-2021-46974: (unk) bpf: Fix masking negation logic upon negative dst register + CVE-2021-46982: (unk) f2fs: compress: fix race condition of overwrite vs truncate + CVE-2021-46984: (unk) kyber: fix out of bounds access when preempted + CVE-2021-46988: (unk) userfaultfd: release page in error path to avoid BUG_ON + CVE-2021-46989: (unk) hfsplus: prevent corruption in shrinking truncate + CVE-2021-46991: (unk) i40e: Fix use-after-free in i40e_client_subtask() + CVE-2021-46992: (unk) netfilter: nftables: avoid overflows in nft_hash_buckets() + CVE-2021-46993: (unk) sched: Fix out-of-bound access in uclamp + CVE-2021-46998: (unk) ethernet:enic: Fix a use after free bug in enic_hard_start_xmit + CVE-2021-47004: (unk) f2fs: fix to avoid touching checkpointed data in get_victim() + CVE-2021-47005: (unk) PCI: endpoint: Fix NULL pointer dereference for ->get_features() + CVE-2021-47006: (unk) ARM: 9064/1: hw_breakpoint: Do not directly check the event's overflow_handler hook + CVE-2021-47010: (unk) net: Only allow init netns to set default tcp cong to a restricted algo + CVE-2021-47012: (unk) RDMA/siw: Fix a use after free in siw_alloc_mr + CVE-2021-47013: (unk) net:emac/emac-mac: Fix a use after free in emac_mac_tx_buf_send + CVE-2021-47015: (unk) bnxt_en: Fix RX consumer index logic in the error path. + CVE-2021-47016: (unk) m68k: mvme147,mvme16x: Don't wipe PCC timer config bits + CVE-2021-47020: (unk) soundwire: stream: fix memory leak in stream config error path + CVE-2021-47024: (unk) vsock/virtio: free queued packets when closing socket + CVE-2021-47028: (unk) mt76: mt7915: fix txrate reporting + CVE-2021-47034: (unk) powerpc/64s: Fix pte update for kernel memory on radix + CVE-2021-47041: (unk) nvmet-tcp: fix incorrect locking in state_change sk callback + CVE-2021-47046: (unk) drm/amd/display: Fix off by one in hdmi_14_process_transaction() + CVE-2021-47049: (unk) Drivers: hv: vmbus: Use after free in __vmbus_open() + CVE-2021-47051: (unk) spi: fsl-lpspi: Fix PM reference leak in lpspi_prepare_xfer_hardware() + CVE-2021-47052: (unk) crypto: sa2ul - Fix memory leak of rxd + CVE-2021-47054: (unk) bus: qcom: Put child node before return + CVE-2021-47056: (unk) crypto: qat - ADF_STATUS_PF_RUNNING should be set after adf_dev_init + CVE-2021-47059: (unk) crypto: sun8i-ss - fix result memory leak on error path + CVE-2021-47063: (unk) drm: bridge/panel: Cleanup connector on bridge detach + CVE-2021-47065: (unk) rtw88: Fix array overrun in rtw_get_tx_power_params() + CVE-2021-47070: (unk) uio_hv_generic: Fix another memory leak in error handling paths + CVE-2021-47071: (unk) uio_hv_generic: Fix a memory leak in error handling paths + CVE-2021-47073: (unk) platform/x86: dell-smbios-wmi: Fix oops on rmmod dell_smbios + CVE-2021-47074: (unk) nvme-loop: fix memory leak in nvme_loop_create_ctrl() + CVE-2021-47075: (unk) nvmet: fix memory leak in nvmet_alloc_ctrl() + CVE-2021-47076: (unk) RDMA/rxe: Return CQE error if invalid lkey was supplied + CVE-2021-47077: (unk) scsi: qedf: Add pointer checks in qedf_update_link_speed() + CVE-2021-47078: (unk) RDMA/rxe: Clear all QP fields if creation failed + CVE-2021-47082: (unk) tun: avoid double free in tun_free_netdev + CVE-2021-47083: (unk) pinctrl: mediatek: fix global-out-of-bounds issue + CVE-2021-47086: (unk) phonet/pep: refuse to enable an unbound pipe + CVE-2021-47100: (unk) ipmi: Fix UAF when uninstall ipmi_si and ipmi_msghandler module + CVE-2021-47101: (unk) asix: fix uninit-value in asix_mdio_read() + CVE-2021-47103: (unk) inet: fully convert sk->sk_rx_dst to RCU rules + CVE-2021-47109: (unk) neighbour: allow NUD_NOARP entries to be forced GCed + CVE-2021-47110: (unk) x86/kvm: Disable kvmclock on all CPUs on shutdown + CVE-2021-47112: (unk) x86/kvm: Teardown PV features on boot CPU as well + CVE-2021-47113: (unk) btrfs: abort in rename_exchange if we fail to insert the second ref + CVE-2021-47114: (unk) ocfs2: fix data corruption by fallocate + CVE-2021-47116: (unk) ext4: fix memory leak in ext4_mb_init_backend on error path. + CVE-2021-47117: (unk) ext4: fix bug on in ext4_es_cache_extent as ext4_split_extent_at failed + CVE-2021-47118: (unk) pid: take a reference when initializing `cad_pid` + CVE-2021-47119: (unk) ext4: fix memory leak in ext4_fill_super + CVE-2021-47120: (unk) HID: magicmouse: fix NULL-deref on disconnect + CVE-2021-47121: (unk) net: caif: fix memory leak in cfusbl_device_notify + CVE-2021-47122: (unk) net: caif: fix memory leak in caif_device_notify + CVE-2021-47124: (unk) io_uring: fix link timeout refs + CVE-2021-47125: (unk) sch_htb: fix refcount leak in htb_parent_to_leaf_offload + CVE-2021-47126: (unk) ipv6: Fix KASAN: slab-out-of-bounds Read in fib6_nh_flush_exceptions + CVE-2021-47128: (unk) bpf, lockdown, audit: Fix buggy SELinux lockdown permission checks + CVE-2021-47129: (unk) netfilter: nft_ct: skip expectations for confirmed conntrack + CVE-2021-47131: (unk) net/tls: Fix use-after-free after the TLS device goes down and up + CVE-2021-47133: (unk) HID: amd_sfh: Fix memory leak in amd_sfh_work + CVE-2021-47135: (unk) mt76: mt7921: fix possible AOOB issue in mt7921_mcu_tx_rate_report + CVE-2021-47136: (unk) net: zero-initialize tc skb extension on allocation + CVE-2021-47137: (unk) net: lantiq: fix memory corruption in RX ring + CVE-2021-47138: (unk) cxgb4: avoid accessing registers when clearing filters + CVE-2021-47140: (unk) iommu/amd: Clear DMA ops when switching domain + CVE-2021-47141: (unk) gve: Add NULL pointer checks when freeing irqs. + CVE-2021-47142: (unk) drm/amdgpu: Fix a use-after-free + CVE-2021-47143: (unk) net/smc: remove device from smcd_dev_list after failed device_add() + CVE-2021-47144: (unk) drm/amd/amdgpu: fix refcount leak + CVE-2021-47145: (unk) btrfs: do not BUG_ON in link_to_fixup_dir + CVE-2021-47146: (unk) mld: fix panic in mld_newpack() + CVE-2021-47147: (unk) ptp: ocp: Fix a resource leak in an error handling path + CVE-2021-47149: (unk) net: fujitsu: fix potential null-ptr-deref + CVE-2021-47150: (unk) net: fec: fix the potential memory leak in fec_enet_init() + CVE-2021-47151: (unk) interconnect: qcom: bcm-voter: add a missing of_node_put() + CVE-2021-47153: (unk) i2c: i801: Don't generate an interrupt on bus reset + CVE-2021-47158: (unk) net: dsa: sja1105: add error handling in sja1105_setup() + CVE-2021-47159: (unk) net: dsa: fix a crash if ->get_sset_count() fails + CVE-2021-47160: (unk) net: dsa: mt7530: fix VLAN traffic leaks + CVE-2021-47161: (unk) spi: spi-fsl-dspi: Fix a resource leak in an error handling path + CVE-2021-47162: (unk) tipc: skb_linearize the head skb when reassembling msgs + CVE-2021-47163: (unk) tipc: wait and exit until all work queues are done + CVE-2021-47165: (unk) drm/meson: fix shutdown crash when component not probed + CVE-2021-47166: (unk) NFS: Don't corrupt the value of pg_bytes_written in nfs_do_recoalesce() + CVE-2021-47167: (unk) NFS: Fix an Oopsable condition in __nfs_pageio_add_request() + CVE-2021-47168: (unk) NFS: fix an incorrect limit in filelayout_decode_layout() + CVE-2021-47169: (unk) serial: rp2: use 'request_firmware' instead of 'request_firmware_nowait' + CVE-2021-47170: (unk) USB: usbfs: Don't WARN about excessively large memory allocations + CVE-2021-47171: (unk) net: usb: fix memory leak in smsc75xx_bind + CVE-2021-47172: (unk) iio: adc: ad7124: Fix potential overflow due to non sequential channel numbers + CVE-2021-47173: (unk) misc/uss720: fix memory leak in uss720_probe + CVE-2021-47175: (unk) net/sched: fq_pie: fix OOB access in the traffic path + CVE-2021-47177: (unk) iommu/vt-d: Fix sysfs leak in alloc_iommu() + CVE-2021-47179: (unk) NFSv4: Fix a NULL pointer dereference in pnfs_mark_matching_lsegs_return() + CVE-2021-47180: (unk) NFC: nci: fix memory leak in nci_allocate_device CVE-2022-0001: (unk) x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE CVE-2022-0002: (unk) x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE CVE-2022-0168: (unk) cifs: fix NULL ptr dereference in smb2_ioctl_query_info() @@ -742,6 +884,10 @@ Outstanding CVEs: CVE-2022-47929: (unk) net: sched: disallow noqueue for qdisc classes CVE-2022-47946: (unk) io_uring: kill sqo_dead and sqo submission halting CVE-2022-48619: (unk) Input: add bounds checking to input_set_capability() + CVE-2022-48626: (unk) moxart: fix potential use-after-free on remove path + CVE-2022-48627: (unk) vt: fix memory overlapping when deleting chars in the buffer + CVE-2022-48628: (unk) ceph: drop messages from MDS when unmounting + CVE-2022-48629: (unk) crypto: qcom-rng - ensure buffer for generate is completely filled CVE-2023-0045: (unk) x86/bugs: Flush IBP in ib_prctl_set() CVE-2023-0047: (unk) mm, oom: do not trigger out_of_memory from the #PF CVE-2023-0160: (unk) bpf, sockmap: fix deadlocks in the sockhash and sockmap @@ -815,6 +961,7 @@ Outstanding CVEs: CVE-2023-28328: (unk) media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer() CVE-2023-28466: (unk) net: tls: fix possible race condition between do_tls_getsockopt_conf() and do_tls_setsockopt_conf() CVE-2023-2860: (unk) ipv6: sr: fix out-of-bounds read when setting HMAC data. + CVE-2023-28746: (unk) x86/mmio: Disable KVM mitigation when X86_FEATURE_CLEAR_CPU_BUF is set CVE-2023-28772: (unk) seq_buf: Fix overflow in seq_buf_putmem_hex() CVE-2023-2985: (unk) fs: hfsplus: fix UAF issue in hfsplus_put_super CVE-2023-3006: (unk) arm64: Add AMPERE1 to the Spectre-BHB affected list @@ -890,7 +1037,7 @@ Outstanding CVEs: CVE-2023-4623: (unk) net/sched: sch_hfsc: Ensure inner classes have fsc curve CVE-2023-46343: (unk) nfc: nci: fix possible NULL pointer dereference in send_acknowledge() CVE-2023-46838: (unk) xen-netback: don't produce zero-size SKB frags - CVE-2023-47233: (unk) + CVE-2023-47233: (unk) wifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach CVE-2023-4881: (unk) netfilter: nftables: exthdr: fix 4-byte stack OOB write CVE-2023-4921: (unk) net: sched: sch_qfq: Fix UAF in qfq_dequeue() CVE-2023-50431: (unk) accel/habanalabs: fix information leak in sec_attest_info() @@ -915,18 +1062,115 @@ Outstanding CVEs: CVE-2023-52449: (unk) mtd: Fix gluebi NULL pointer dereference caused by ftl notifier CVE-2023-52451: (unk) powerpc/pseries/memhp: Fix access beyond end of drmem array CVE-2023-52454: (unk) nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length - CVE-2023-52456: (unk) serial: imx: fix tx statemachine deadlock - CVE-2023-52457: (unk) serial: 8250: omap: Don't skip resource freeing if pm_runtime_resume_and_get() failed CVE-2023-52458: (unk) block: add check that partition length needs to be aligned with block size CVE-2023-52464: (unk) EDAC/thunderx: Fix possible out-of-bounds string access + CVE-2023-52469: (unk) drivers/amd/pm: fix a use-after-free in kv_parse_power_table + CVE-2023-52470: (unk) drm/radeon: check the alloc_workqueue return value in radeon_crtc_init() + CVE-2023-52474: (unk) IB/hfi1: Fix bugs with non-PAGE_SIZE-end multi-iovec user SDMA requests + CVE-2023-52475: (unk) Input: powermate - fix use-after-free in powermate_config_complete + CVE-2023-52476: (unk) perf/x86/lbr: Filter vsyscall addresses + CVE-2023-52477: (unk) usb: hub: Guard against accesses to uninitialized BOS descriptors + CVE-2023-52478: (unk) HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect + CVE-2023-52479: (unk) ksmbd: fix uaf in smb20_oplock_break_ack + CVE-2023-52480: (unk) ksmbd: fix race condition between session lookup and expire + CVE-2023-52481: (unk) arm64: errata: Add Cortex-A520 speculative unprivileged load workaround + CVE-2023-52482: (unk) x86/srso: Add SRSO mitigation for Hygon processors + CVE-2023-52484: (unk) iommu/arm-smmu-v3: Fix soft lockup triggered by arm_smmu_mm_invalidate_range + CVE-2023-52485: (unk) drm/amd/display: Wake DMCUB before sending a command + CVE-2023-52486: (unk) drm: Don't unref the same fb many times by mistake due to deadlock handling + CVE-2023-52488: (unk) serial: sc16is7xx: convert from _raw_ to _noinc_ regmap functions for FIFO + CVE-2023-52489: (unk) mm/sparsemem: fix race in accessing memory_section->usage + CVE-2023-52491: (unk) media: mtk-jpeg: Fix use after free bug due to error path handling in mtk_jpeg_dec_device_run + CVE-2023-52497: (unk) erofs: fix lz4 inplace decompression + CVE-2023-52498: (unk) PM: sleep: Fix possible deadlocks in core system-wide PM code + CVE-2023-52500: (unk) scsi: pm80xx: Avoid leaking tags when processing OPC_INB_SET_CONTROLLER_CONFIG command + CVE-2023-52501: (unk) ring-buffer: Do not attempt to read past "commit" + CVE-2023-52502: (unk) net: nfc: fix races in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn() + CVE-2023-52504: (unk) x86/alternatives: Disable KASAN in apply_alternatives() + CVE-2023-52506: (unk) LoongArch: Set all reserved memblocks on Node#0 at initialization + CVE-2023-52507: (unk) nfc: nci: assert requested protocol is valid + CVE-2023-52508: (unk) nvme-fc: Prevent null pointer dereference in nvme_fc_io_getuuid() + CVE-2023-52509: (unk) ravb: Fix use-after-free issue in ravb_tx_timeout_work() + CVE-2023-52510: (unk) ieee802154: ca8210: Fix a potential UAF in ca8210_probe + CVE-2023-52511: (unk) spi: sun6i: reduce DMA RX transfer width to single byte + CVE-2023-52513: (unk) RDMA/siw: Fix connection failure handling + CVE-2023-52515: (unk) RDMA/srp: Do not call scsi_done() from srp_abort() + CVE-2023-52516: (unk) dma-debug: don't call __dma_entry_alloc_check_leak() under free_entries_lock + CVE-2023-52517: (unk) spi: sun6i: fix race between DMA RX transfer completion and RX FIFO drain + CVE-2023-52519: (unk) HID: intel-ish-hid: ipc: Disable and reenable ACPI GPE bit + CVE-2023-52522: (unk) net: fix possible store tearing in neigh_periodic_work() + CVE-2023-52527: (unk) ipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data() + CVE-2023-52528: (unk) net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg + CVE-2023-52530: (unk) wifi: mac80211: fix potential key use-after-free + CVE-2023-52531: (unk) wifi: iwlwifi: mvm: Fix a memory corruption issue + CVE-2023-52532: (unk) net: mana: Fix TX CQE error handling + CVE-2023-52559: (unk) iommu/vt-d: Avoid memory allocation in iommu_suspend() + CVE-2023-52561: (unk) arm64: dts: qcom: sdm845-db845c: Mark cont splash memory region as reserved + CVE-2023-52563: (unk) drm/meson: fix memory leak on ->hpd_notify callback + CVE-2023-52565: (unk) media: uvcvideo: Fix OOB read + CVE-2023-52566: (unk) nilfs2: fix potential use after free in nilfs_gccache_submit_read_data() + CVE-2023-52568: (unk) x86/sgx: Resolves SECS reclaim vs. page fault for EAUG race + CVE-2023-52569: (unk) btrfs: remove BUG() after failure to insert delayed dir index item + CVE-2023-52571: (unk) power: supply: rk817: Fix node refcount leak + CVE-2023-52572: (unk) cifs: Fix UAF in cifs_demultiplex_thread() + CVE-2023-52573: (unk) net: rds: Fix possible NULL-pointer dereference + CVE-2023-52574: (unk) team: fix null-ptr-deref when team device type is changed + CVE-2023-52578: (unk) net: bridge: use DEV_STATS_INC() + CVE-2023-52583: (unk) ceph: fix deadlock or deadcode of misusing dget() + CVE-2023-52584: (unk) spmi: mediatek: Fix UAF on device remove + CVE-2023-52585: (unk) drm/amdgpu: Fix possible NULL dereference in amdgpu_ras_query_error_status_helper() + CVE-2023-52586: (unk) drm/msm/dpu: Add mutex lock in control vblank irq + CVE-2023-52587: (unk) IB/ipoib: Fix mcast list locking + CVE-2023-52588: (unk) f2fs: fix to tag gcing flag on page during block migration + CVE-2023-52589: (unk) media: rkisp1: Fix IRQ disable race issue + CVE-2023-52590: (unk) ocfs2: Avoid touching renamed directory if parent does not change + CVE-2023-52591: (unk) reiserfs: Avoid touching renamed directory if parent does not change + CVE-2023-52593: (unk) wifi: wfx: fix possible NULL pointer dereference in wfx_set_mfp_ap() + CVE-2023-52594: (unk) wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus() + CVE-2023-52595: (unk) wifi: rt2x00: restart beacon queue when hardware reset + CVE-2023-52596: (unk) sysctl: Fix out of bounds access for empty sysctl registers + CVE-2023-52597: (unk) KVM: s390: fix setting of fpc register + CVE-2023-52598: (unk) s390/ptrace: handle setting of fpc register correctly + CVE-2023-52599: (unk) jfs: fix array-index-out-of-bounds in diNewExt + CVE-2023-52600: (unk) jfs: fix uaf in jfs_evict_inode + CVE-2023-52601: (unk) jfs: fix array-index-out-of-bounds in dbAdjTree + CVE-2023-52602: (unk) jfs: fix slab-out-of-bounds Read in dtSearch + CVE-2023-52603: (unk) UBSAN: array-index-out-of-bounds in dtSplitRoot + CVE-2023-52604: (unk) FS:JFS:UBSAN:array-index-out-of-bounds in dbAdjTree + CVE-2023-52606: (unk) powerpc/lib: Validate size for vector operations + CVE-2023-52607: (unk) powerpc/mm: Fix null-pointer dereference in pgtable_cache_add + CVE-2023-52609: (unk) binder: fix race between mmput() and do_exit() + CVE-2023-52610: (unk) net/sched: act_ct: fix skb leak and crash on ooo frags + CVE-2023-52612: (unk) crypto: scomp - fix req->dst buffer overflow + CVE-2023-52614: (unk) PM / devfreq: Fix buffer overflow in trans_stat_show + CVE-2023-52615: (unk) hwrng: core - Fix page fault dead lock on mmap-ed hwrng + CVE-2023-52617: (unk) PCI: switchtec: Fix stdev_release() crash after surprise hot remove + CVE-2023-52618: (unk) block/rnbd-srv: Check for unlikely string overflow + CVE-2023-52619: (unk) pstore/ram: Fix crash when setting number of cpus to an odd number + CVE-2023-52620: (unk) netfilter: nf_tables: disallow timeout for anonymous sets + CVE-2023-52621: (unk) bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers + CVE-2023-52622: (unk) ext4: avoid online resizing failures due to oversized flex bg + CVE-2023-52623: (unk) SUNRPC: Fix a suspicious RCU usage warning + CVE-2023-52624: (unk) drm/amd/display: Wake DMCUB before executing GPINT commands + CVE-2023-52625: (unk) drm/amd/display: Refactor DMCUB enter/exit idle interface + CVE-2023-52628: (unk) netfilter: nftables: exthdr: fix 4-byte stack OOB write + CVE-2023-52629: (unk) sh: push-switch: Reorder cleanup operations to avoid use-after-free bug + CVE-2023-52632: (unk) drm/amdkfd: Fix lock dependency warning with srcu + CVE-2023-52633: (unk) um: time-travel: fix time corruption + CVE-2023-52634: (unk) drm/amd/display: Fix disable_otg_wa logic + CVE-2023-52635: (unk) PM / devfreq: Synchronize devfreq_monitor_[start/stop] + CVE-2023-52638: (unk) can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock + CVE-2023-52639: (unk) KVM: s390: vsie: fix race during shadow creation + CVE-2023-52640: (unk) fs/ntfs3: Fix oob in ntfs_listxattr + CVE-2023-52641: (unk) fs/ntfs3: Add NULL ptr dereference checking at the end of attr_allocate_frame() CVE-2023-5717: (unk) perf: Disallow mis-matched inherited group reads CVE-2023-6040: (unk) netfilter: nf_tables: Reject tables of unsupported family CVE-2023-6121: (unk) nvmet: nul-terminate the NQNs passed in the connect command CVE-2023-6240: (unk) - CVE-2023-6270: (unk) - CVE-2023-6356: (unk) + CVE-2023-6270: (unk) aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts + CVE-2023-6356: (unk) nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length CVE-2023-6535: (unk) - CVE-2023-6536: (unk) + CVE-2023-6536: (unk) nvmet-tcp: fix a crash in nvmet_req_complete() CVE-2023-6546: (unk) tty: n_gsm: fix the UAF caused by race condition in gsm_cleanup_mux CVE-2023-6560: (unk) io_uring: don't allow discontig pages for IORING_SETUP_NO_MMAP CVE-2023-6606: (unk) smb: client: fix OOB in smbCalcSize() @@ -934,7 +1178,7 @@ Outstanding CVEs: CVE-2023-6915: (unk) ida: Fix crash in ida_free when the bitmap is empty CVE-2023-6931: (unk) perf: Fix perf_event_validate_size() CVE-2023-6932: (unk) ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet - CVE-2023-7042: (unk) + CVE-2023-7042: (unk) wifi: ath10k: fix NULL pointer dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev() CVE-2023-7192: (unk) netfilter: ctnetlink: fix possible refcount leak in ctnetlink_create_conntrack() CVE-2024-0340: (unk) vhost: use kzalloc() instead of kmalloc() followed by memset() CVE-2024-0564: (unk) @@ -943,15 +1187,16 @@ Outstanding CVEs: CVE-2024-0607: (unk) netfilter: nf_tables: fix pointer math issue in nft_byteorder_eval() CVE-2024-0646: (unk) net: tls, update curr on splice as well CVE-2024-0775: (unk) ext4: improve error recovery code paths in __ext4_remount() - CVE-2024-0841: (unk) + CVE-2024-0841: (unk) fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super CVE-2024-1086: (unk) netfilter: nf_tables: reject QUEUE/DROP verdict parameters CVE-2024-1151: (unk) net: openvswitch: limit the number of recursions from action sets CVE-2024-1312: (unk) mm: lock_vma_under_rcu() must check vma->anon_vma under vma lock CVE-2024-21803: (unk) - CVE-2024-22099: (unk) + CVE-2024-2193: (unk) + CVE-2024-22099: (unk) Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security CVE-2024-22386: (unk) - CVE-2024-23196: (unk) - CVE-2024-23307: (unk) + CVE-2024-23196: (unk) ALSA: hda: fix a possible null-pointer dereference due to data race in snd_hdac_regmap_sync() + CVE-2024-23307: (unk) md/raid5: fix atomicity violation in raid5_cache_count CVE-2024-23848: (unk) CVE-2024-23849: (unk) net/rds: Fix UBSAN: array-index-out-of-bounds in rds_cmsg_recv CVE-2024-23851: (unk) dm: limit the number of targets and parameter size area @@ -960,7 +1205,7 @@ Outstanding CVEs: CVE-2024-24858: (unk) CVE-2024-24859: (unk) CVE-2024-24860: (unk) Bluetooth: Fix atomicity violation in {min,max}_key_size_set - CVE-2024-24861: (unk) + CVE-2024-24861: (unk) media: xc4000: Fix atomicity violation in xc4000_get_frequency CVE-2024-24864: (unk) CVE-2024-25739: (unk) CVE-2024-25740: (unk) @@ -969,13 +1214,119 @@ Outstanding CVEs: CVE-2024-26584: (unk) net: tls: handle backlogging of crypto requests CVE-2024-26585: (unk) tls: fix race between tx work scheduling and socket close CVE-2024-26586: (unk) mlxsw: spectrum_acl_tcam: Fix stack corruption - CVE-2024-26587: (unk) net: netdevsim: don't try to destroy PHC on VFs - CVE-2024-26588: (unk) LoongArch: BPF: Prevent out-of-bounds memory access CVE-2024-26589: (unk) bpf: Reject variable offset alu on PTR_TO_FLOW_KEYS - CVE-2024-26591: (unk) bpf: Fix re-attachment branch in bpf_tracing_prog_attach CVE-2024-26592: (unk) ksmbd: fix UAF issue in ksmbd_tcp_new_connection() CVE-2024-26593: (unk) i2c: i801: Fix block process call transactions CVE-2024-26594: (unk) ksmbd: validate mech token in session setup CVE-2024-26595: (unk) mlxsw: spectrum_acl_tcam: Fix NULL pointer dereference in error path CVE-2024-26597: (unk) net: qualcomm: rmnet: fix global oob in rmnet_policy CVE-2024-26598: (unk) KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache + CVE-2024-26600: (unk) phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP + CVE-2024-26602: (unk) sched/membarrier: reduce the ability to hammer on sys_membarrier + CVE-2024-26606: (unk) binder: signal epoll threads of self-work + CVE-2024-26607: (unk) drm/bridge: sii902x: Fix probing race issue + CVE-2024-26614: (unk) tcp: make sure init the accept_queue's spinlocks once + CVE-2024-26615: (unk) net/smc: fix illegal rmb_desc access in SMC-D connection dump + CVE-2024-26622: (unk) tomoyo: fix UAF write bug in tomoyo_write_control() + CVE-2024-26623: (unk) pds_core: Prevent race issues involving the adminq + CVE-2024-26625: (unk) llc: call sock_orphan() at release time + CVE-2024-26627: (unk) scsi: core: Move scsi_host_busy() out of host lock for waking up EH handler + CVE-2024-26633: (unk) ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim() + CVE-2024-26635: (unk) llc: Drop support for ETH_P_TR_802_2. + CVE-2024-26636: (unk) llc: make llc_ui_sendmsg() more robust against bonding changes + CVE-2024-26640: (unk) tcp: add sanity checks to rx zerocopy + CVE-2024-26641: (unk) ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv() + CVE-2024-26642: (unk) netfilter: nf_tables: disallow anonymous set with timeout flag + CVE-2024-26644: (unk) btrfs: don't abort filesystem when attempting to snapshot deleted subvolume + CVE-2024-26645: (unk) tracing: Ensure visibility when inserting an element into tracing_map + CVE-2024-26646: (unk) thermal: intel: hfi: Add syscore callbacks for system-wide PM + CVE-2024-26647: (unk) drm/amd/display: Fix late derefrence 'dsc' check in 'link_set_dsc_pps_packet()' + CVE-2024-26648: (unk) drm/amd/display: Fix variable deferencing before NULL check in edp_setup_replay() + CVE-2024-26650: (unk) platform/x86: p2sb: Allow p2sb_bar() calls during PCI device probe + CVE-2024-26651: (unk) sr9800: Add check for usbnet_get_endpoints + CVE-2024-26654: (unk) ALSA: sh: aica: reorder cleanup operations to avoid UAF bugs + CVE-2024-26655: (unk) Fix memory leak in posix_clock_open() + CVE-2024-26656: (unk) drm/amdgpu: fix use-after-free bug + CVE-2024-26658: (unk) bcachefs: grab s_umount only if snapshotting + CVE-2024-26659: (unk) xhci: handle isoc Babble and Buffer Overrun events properly + CVE-2024-26663: (unk) tipc: Check the bearer type before calling tipc_udp_nl_bearer_add() + CVE-2024-26664: (unk) hwmon: (coretemp) Fix out-of-bounds memory access + CVE-2024-26668: (unk) netfilter: nft_limit: reject configurations that cause integer overflow + CVE-2024-26669: (unk) net/sched: flower: Fix chain template offload + CVE-2024-26671: (unk) blk-mq: fix IO hang from sbitmap wakeup race + CVE-2024-26672: (unk) drm/amdgpu: Fix variable 'mca_funcs' dereferenced before NULL check in 'amdgpu_mca_smu_get_mca_entry()' + CVE-2024-26673: (unk) netfilter: nft_ct: sanitize layer 3 and 4 protocol number in custom expectations + CVE-2024-26675: (unk) ppp_async: limit MRU to 64K + CVE-2024-26676: (unk) af_unix: Call kfree_skb() for dead unix_(sk)->oob_skb in GC. + CVE-2024-26677: (unk) rxrpc: Fix delayed ACKs to not set the reference serial number + CVE-2024-26679: (unk) inet: read sk->sk_family once in inet_recv_error() + CVE-2024-26685: (unk) nilfs2: fix potential bug in end_buffer_async_write + CVE-2024-26686: (unk) fs/proc: do_task_stat: use sig->stats_lock to gather the threads/children stats + CVE-2024-26687: (unk) xen/events: close evtchn after mapping cleanup + CVE-2024-26688: (unk) fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super + CVE-2024-26689: (unk) ceph: prevent use-after-free in encode_cap_msg() + CVE-2024-26691: (unk) KVM: arm64: Fix circular locking dependency + CVE-2024-26696: (unk) nilfs2: fix hang in nilfs_lookup_dirty_data_buffers() + CVE-2024-26697: (unk) nilfs2: fix data corruption in dsync block recovery for small block sizes + CVE-2024-26699: (unk) drm/amd/display: Fix array-index-out-of-bounds in dcn35_clkmgr + CVE-2024-26700: (unk) drm/amd/display: Fix MST Null Ptr for RV + CVE-2024-26702: (unk) iio: magnetometer: rm3100: add boundary check for the value read from RM3100_REG_TMRC + CVE-2024-26704: (unk) ext4: fix double-free of blocks due to wrong extents moved_len + CVE-2024-26706: (unk) parisc: Fix random data corruption from exception handler + CVE-2024-26713: (unk) powerpc/pseries/iommu: Fix iommu initialisation during DLPAR add + CVE-2024-26715: (unk) usb: dwc3: gadget: Fix NULL pointer dereference in dwc3_gadget_suspend + CVE-2024-26719: (unk) nouveau: offload fence uevents work to workqueue + CVE-2024-26720: (unk) mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again + CVE-2024-26726: (unk) btrfs: don't drop extent_map for free space inode on write error + CVE-2024-26733: (unk) arp: Prevent overflow in arp_req_get(). + CVE-2024-26735: (unk) ipv6: sr: fix possible use-after-free and null-ptr-deref + CVE-2024-26736: (unk) afs: Increase buffer size in afs_update_volume_status() + CVE-2024-26738: (unk) powerpc/pseries/iommu: DLPAR add doesn't completely initialize pci_controller + CVE-2024-26739: (unk) net/sched: act_mirred: don't override retval if we already lost the skb + CVE-2024-26740: (unk) net/sched: act_mirred: use the backlog for mirred ingress + CVE-2024-26743: (unk) RDMA/qedr: Fix qedr_create_user_qp error flow + CVE-2024-26744: (unk) RDMA/srpt: Support specifying the srpt_service_guid parameter + CVE-2024-26745: (unk) powerpc/pseries/iommu: IOMMU table is not initialized for kdump over SR-IOV + CVE-2024-26747: (unk) usb: roles: fix NULL pointer issue when put module's reference + CVE-2024-26748: (unk) usb: cdns3: fix memory double free when handle zero packet + CVE-2024-26751: (unk) ARM: ep93xx: Add terminator to gpiod_lookup_table + CVE-2024-26752: (unk) l2tp: pass correct message length to ip6_append_data + CVE-2024-26754: (unk) gtp: fix use-after-free and null-ptr-deref in gtp_genl_dump_pdp() + CVE-2024-26756: (unk) md: Don't register sync_thread for reshape directly + CVE-2024-26757: (unk) md: Don't ignore read-only array in md_check_recovery() + CVE-2024-26758: (unk) md: Don't ignore suspended array in md_check_recovery() + CVE-2024-26759: (unk) mm/swap: fix race when skipping swapcache + CVE-2024-26763: (unk) dm-crypt: don't modify the data when using authenticated encryption + CVE-2024-26764: (unk) fs/aio: Restrict kiocb_set_cancel_fn() to I/O submitted via libaio + CVE-2024-26765: (unk) LoongArch: Disable IRQ before init_fn() for nonboot CPUs + CVE-2024-26766: (unk) IB/hfi1: Fix sdma.h tx->num_descs off-by-one error + CVE-2024-26767: (unk) drm/amd/display: fixed integer types and null check locations + CVE-2024-26768: (unk) LoongArch: Change acpi_core_pic[NR_CPUS] to acpi_core_pic[MAX_CORE_PIC] + CVE-2024-26769: (unk) nvmet-fc: avoid deadlock on delete association path + CVE-2024-26770: (unk) HID: nvidia-shield: Add missing null pointer checks to LED initialization + CVE-2024-26771: (unk) dmaengine: ti: edma: Add some null pointer checks to the edma_probe + CVE-2024-26772: (unk) ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal() + CVE-2024-26773: (unk) ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found() + CVE-2024-26774: (unk) ext4: avoid dividing by 0 in mb_update_avg_fragment_size() when block bitmap corrupt + CVE-2024-26775: (unk) aoe: avoid potential deadlock at set_capacity + CVE-2024-26776: (unk) spi: hisi-sfc-v3xx: Return IRQ_NONE if no interrupts were detected + CVE-2024-26777: (unk) fbdev: sis: Error out if pixclock equals zero + CVE-2024-26778: (unk) fbdev: savage: Error out if pixclock equals zero + CVE-2024-26779: (unk) wifi: mac80211: fix race condition on enabling fast-xmit + CVE-2024-26784: (unk) pmdomain: arm: Fix NULL dereference on scmi_perf_domain removal + CVE-2024-26787: (unk) mmc: mmci: stm32: fix DMA API overlapping mappings warning + CVE-2024-26788: (unk) dmaengine: fsl-qdma: init irq after reg initialization + CVE-2024-26789: (unk) crypto: arm64/neonbs - fix out-of-bounds access on short input + CVE-2024-26790: (unk) dmaengine: fsl-qdma: fix SoC may hang on 16 byte unaligned read + CVE-2024-26791: (unk) btrfs: dev-replace: properly validate device names + CVE-2024-26793: (unk) gtp: fix use-after-free and null-ptr-deref in gtp_newlink() + CVE-2024-26797: (unk) drm/amd/display: Prevent potential buffer overflow in map_hw_resources + CVE-2024-26798: (unk) fbcon: always restore the old font data in fbcon_do_set_font() + CVE-2024-26801: (unk) Bluetooth: Avoid potential use-after-free in hci_error_reset + CVE-2024-26802: (unk) stmmac: Clear variable when destroying workqueue + CVE-2024-26803: (unk) net: veth: clear GRO when clearing XDP even when down + CVE-2024-26804: (unk) net: ip_tunnel: prevent perpetual headroom growth + CVE-2024-26805: (unk) netlink: Fix kernel-infoleak-after-free in __skb_datagram_iter + CVE-2024-26806: (unk) spi: cadence-qspi: remove system-wide suspend helper calls from runtime PM hooks + CVE-2024-26808: (unk) netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain + CVE-2024-26809: (unk) netfilter: nft_set_pipapo: release elements in clone only from destroy path diff --git a/data/5.4/5.4_CVEs.txt b/data/5.4/5.4_CVEs.txt index 0bb80021a..1f34fd3b2 100644 --- a/data/5.4/5.4_CVEs.txt +++ b/data/5.4/5.4_CVEs.txt @@ -79,6 +79,7 @@ CVE-2019-20636: Fixed with 5.4.12 CVE-2019-20794: Fix unknown CVE-2019-20810: Fixed with 5.4.48 CVE-2019-20812: Fixed with 5.4.7 +CVE-2019-25162: Fixed with 5.4.211 CVE-2019-3016: Fixed with 5.4.19 CVE-2020-0009: Fixed with 5.4.23 CVE-2020-0041: Fixed with 5.4.4 @@ -244,6 +245,14 @@ CVE-2020-36558: Fixed with 5.4.23 CVE-2020-36691: Fix not seen in stream CVE-2020-36694: Fixed with 5.4.86 CVE-2020-36766: Fixed with 5.4.62 +CVE-2020-36775: Fixed with 5.4.189 +CVE-2020-36777: Fixed with 5.4.118 +CVE-2020-36780: Fixed with 5.4.119 +CVE-2020-36781: Fix not seen in stream +CVE-2020-36782: Fixed with 5.4.119 +CVE-2020-36783: Fixed with 5.4.119 +CVE-2020-36784: Fix not seen in stream +CVE-2020-36787: Fixed with 5.4.119 CVE-2020-3702: Fixed with 5.4.143 CVE-2020-4788: Fixed with 5.4.79 CVE-2020-8428: Fixed with 5.4.16 @@ -412,6 +421,144 @@ CVE-2021-45469: Fixed with 5.4.169 CVE-2021-45485: Fixed with 5.4.133 CVE-2021-45486: Fixed with 5.4.119 CVE-2021-45868: Fixed with 5.4.160 +CVE-2021-46904: Fixed with 5.4.112 +CVE-2021-46906: Fixed with 5.4.127 +CVE-2021-46908: Fix not seen in stream +CVE-2021-46909: Fixed with 5.4.114 +CVE-2021-46915: Fixed with 5.4.114 +CVE-2021-46921: Fixed with 5.4.115 +CVE-2021-46924: Fixed with 5.4.170 +CVE-2021-46925: Fix not seen in stream +CVE-2021-46926: Fix not seen in stream +CVE-2021-46928: Fix not seen in stream +CVE-2021-46929: Fixed with 5.4.170 +CVE-2021-46930: Fixed with 5.4.170 +CVE-2021-46932: Fixed with 5.4.170 +CVE-2021-46933: Fixed with 5.4.170 +CVE-2021-46934: Fixed with 5.4.170 +CVE-2021-46935: Fixed with 5.4.170 +CVE-2021-46936: Fixed with 5.4.170 +CVE-2021-46938: Fixed with 5.4.118 +CVE-2021-46939: Fixed with 5.4.118 +CVE-2021-46941: Fix not seen in stream +CVE-2021-46943: Fixed with 5.4.118 +CVE-2021-46944: Fixed with 5.4.118 +CVE-2021-46950: Fixed with 5.4.118 +CVE-2021-46951: Fixed with 5.4.118 +CVE-2021-46952: Fix not seen in stream +CVE-2021-46953: Fixed with 5.4.118 +CVE-2021-46955: Fixed with 5.4.118 +CVE-2021-46956: Fixed with 5.4.118 +CVE-2021-46959: Fix not seen in stream +CVE-2021-46960: Fixed with 5.4.118 +CVE-2021-46961: Fixed with 5.4.118 +CVE-2021-46962: Fixed with 5.4.118 +CVE-2021-46965: Fix not seen in stream +CVE-2021-46966: Fixed with 5.4.118 +CVE-2021-46969: Fix not seen in stream +CVE-2021-46970: Fix not seen in stream +CVE-2021-46971: Fixed with 5.4.117 +CVE-2021-46974: Fixed with 5.4.117 +CVE-2021-46981: Fixed with 5.4.120 +CVE-2021-46982: Fix not seen in stream +CVE-2021-46984: Fixed with 5.4.120 +CVE-2021-46988: Fixed with 5.4.120 +CVE-2021-46989: Fixed with 5.4.120 +CVE-2021-46991: Fixed with 5.4.120 +CVE-2021-46992: Fixed with 5.4.120 +CVE-2021-46993: Fixed with 5.4.120 +CVE-2021-46998: Fixed with 5.4.120 +CVE-2021-47004: Fix not seen in stream +CVE-2021-47005: Fix not seen in stream +CVE-2021-47006: Fixed with 5.4.120 +CVE-2021-47010: Fixed with 5.4.119 +CVE-2021-47012: Fixed with 5.4.119 +CVE-2021-47013: Fixed with 5.4.119 +CVE-2021-47015: Fixed with 5.4.119 +CVE-2021-47016: Fixed with 5.4.119 +CVE-2021-47020: Fixed with 5.4.119 +CVE-2021-47024: Fix not seen in stream +CVE-2021-47028: Fix not seen in stream +CVE-2021-47034: Fixed with 5.4.119 +CVE-2021-47041: Fixed with 5.4.119 +CVE-2021-47046: Fix not seen in stream +CVE-2021-47049: Fix not seen in stream +CVE-2021-47051: Fixed with 5.4.119 +CVE-2021-47052: Fix not seen in stream +CVE-2021-47054: Fixed with 5.4.119 +CVE-2021-47056: Fixed with 5.4.119 +CVE-2021-47059: Fix not seen in stream +CVE-2021-47063: Fix not seen in stream +CVE-2021-47065: Fixed with 5.4.119 +CVE-2021-47070: Fix not seen in stream +CVE-2021-47071: Fixed with 5.4.122 +CVE-2021-47073: Fixed with 5.4.122 +CVE-2021-47074: Fix not seen in stream +CVE-2021-47075: Fix not seen in stream +CVE-2021-47076: Fix not seen in stream +CVE-2021-47077: Fix not seen in stream +CVE-2021-47078: Fixed with 5.4.122 +CVE-2021-47082: Fixed with 5.4.240 +CVE-2021-47083: Fixed with 5.4.169 +CVE-2021-47086: Fixed with 5.4.169 +CVE-2021-47095: Fixed with 5.4.169 +CVE-2021-47100: Fixed with 5.4.169 +CVE-2021-47101: Fix not seen in stream +CVE-2021-47103: Fixed with 5.4.220 +CVE-2021-47109: Fixed with 5.4.125 +CVE-2021-47110: Fixed with 5.4.125 +CVE-2021-47112: Fixed with 5.4.125 +CVE-2021-47113: Fix not seen in stream +CVE-2021-47114: Fixed with 5.4.125 +CVE-2021-47116: Fix not seen in stream +CVE-2021-47117: Fixed with 5.4.125 +CVE-2021-47118: Fixed with 5.4.125 +CVE-2021-47119: Fix not seen in stream +CVE-2021-47120: Fixed with 5.4.125 +CVE-2021-47121: Fixed with 5.4.125 +CVE-2021-47122: Fixed with 5.4.125 +CVE-2021-47124: Fix not seen in stream +CVE-2021-47125: Fix not seen in stream +CVE-2021-47126: Fixed with 5.4.125 +CVE-2021-47128: Fix not seen in stream +CVE-2021-47129: Fixed with 5.4.125 +CVE-2021-47131: Fix not seen in stream +CVE-2021-47133: Fix not seen in stream +CVE-2021-47135: Fix not seen in stream +CVE-2021-47136: Fix not seen in stream +CVE-2021-47137: Fixed with 5.4.124 +CVE-2021-47138: Fixed with 5.4.124 +CVE-2021-47140: Fix not seen in stream +CVE-2021-47141: Fixed with 5.4.124 +CVE-2021-47142: Fixed with 5.4.124 +CVE-2021-47143: Fix not seen in stream +CVE-2021-47144: Fixed with 5.4.124 +CVE-2021-47145: Fixed with 5.4.124 +CVE-2021-47146: Fixed with 5.4.124 +CVE-2021-47147: Fix not seen in stream +CVE-2021-47149: Fixed with 5.4.124 +CVE-2021-47150: Fixed with 5.4.124 +CVE-2021-47151: Fix not seen in stream +CVE-2021-47153: Fixed with 5.4.124 +CVE-2021-47158: Fix not seen in stream +CVE-2021-47159: Fixed with 5.4.124 +CVE-2021-47160: Fixed with 5.4.124 +CVE-2021-47161: Fixed with 5.4.124 +CVE-2021-47162: Fixed with 5.4.124 +CVE-2021-47163: Fixed with 5.4.124 +CVE-2021-47165: Fixed with 5.4.124 +CVE-2021-47166: Fixed with 5.4.124 +CVE-2021-47167: Fixed with 5.4.124 +CVE-2021-47168: Fixed with 5.4.124 +CVE-2021-47169: Fixed with 5.4.124 +CVE-2021-47170: Fixed with 5.4.124 +CVE-2021-47171: Fixed with 5.4.124 +CVE-2021-47172: Fixed with 5.4.124 +CVE-2021-47173: Fixed with 5.4.124 +CVE-2021-47175: Fix not seen in stream +CVE-2021-47177: Fixed with 5.4.124 +CVE-2021-47179: Fixed with 5.4.124 +CVE-2021-47180: Fixed with 5.4.123 CVE-2022-0001: Fixed with 5.4.184 CVE-2022-0002: Fixed with 5.4.184 CVE-2022-0168: Fix not seen in stream @@ -634,6 +781,10 @@ CVE-2022-47520: Fix not seen in stream CVE-2022-47929: Fixed with 5.4.229 CVE-2022-47946: Fix not seen in stream CVE-2022-48619: Fixed with 5.4.196 +CVE-2022-48626: Fixed with 5.4.179 +CVE-2022-48627: Fix not seen in stream +CVE-2022-48628: Fix not seen in stream +CVE-2022-48629: Fixed with 5.4.187 CVE-2023-0045: Fixed with 5.4.229 CVE-2023-0047: Fixed with 5.4.160 CVE-2023-0160: Fixed with 5.4.243 @@ -708,6 +859,7 @@ CVE-2023-28327: Fixed with 5.4.227 CVE-2023-28328: Fixed with 5.4.229 CVE-2023-28466: Fixed with 5.4.240 CVE-2023-2860: Fixed with 5.4.213 +CVE-2023-28746: Fix not seen in stream CVE-2023-28772: Fixed with 5.4.133 CVE-2023-2985: Fixed with 5.4.235 CVE-2023-3006: Fixed with 5.4.253 @@ -783,7 +935,7 @@ CVE-2023-4622: Fix not seen in stream CVE-2023-4623: Fixed with 5.4.257 CVE-2023-46343: Fixed with 5.4.259 CVE-2023-46838: Fixed with 5.4.268 -CVE-2023-47233: Fix unknown +CVE-2023-47233: Fix not seen in stream CVE-2023-4881: Fix not seen in stream CVE-2023-4921: Fixed with 5.4.257 CVE-2023-50431: Fix not seen in stream @@ -808,18 +960,116 @@ CVE-2023-52448: Fixed with 5.4.268 CVE-2023-52449: Fixed with 5.4.268 CVE-2023-52451: Fixed with 5.4.268 CVE-2023-52454: Fixed with 5.4.268 -CVE-2023-52456: Fix not seen in stream -CVE-2023-52457: Fixed with 5.4.268 CVE-2023-52458: Fix not seen in stream CVE-2023-52464: Fixed with 5.4.268 +CVE-2023-52469: Fixed with 5.4.268 +CVE-2023-52470: Fixed with 5.4.268 +CVE-2023-52474: Fix not seen in stream +CVE-2023-52475: Fixed with 5.4.259 +CVE-2023-52476: Fix not seen in stream +CVE-2023-52477: Fixed with 5.4.259 +CVE-2023-52478: Fixed with 5.4.259 +CVE-2023-52479: Fix not seen in stream +CVE-2023-52480: Fix not seen in stream +CVE-2023-52481: Fix not seen in stream +CVE-2023-52482: Fix not seen in stream +CVE-2023-52484: Fix not seen in stream +CVE-2023-52485: Fix not seen in stream +CVE-2023-52486: Fixed with 5.4.269 +CVE-2023-52488: Fix not seen in stream +CVE-2023-52489: Fix not seen in stream +CVE-2023-52491: Fix not seen in stream +CVE-2023-52497: Fix not seen in stream +CVE-2023-52498: Fix not seen in stream +CVE-2023-52500: Fix not seen in stream +CVE-2023-52501: Fix not seen in stream +CVE-2023-52502: Fixed with 5.4.259 +CVE-2023-52504: Fixed with 5.4.270 +CVE-2023-52506: Fix not seen in stream +CVE-2023-52507: Fixed with 5.4.259 +CVE-2023-52508: Fix not seen in stream +CVE-2023-52509: Fixed with 5.4.259 +CVE-2023-52510: Fixed with 5.4.259 +CVE-2023-52511: Fix not seen in stream +CVE-2023-52513: Fixed with 5.4.258 +CVE-2023-52515: Fix not seen in stream +CVE-2023-52516: Fix not seen in stream +CVE-2023-52517: Fix not seen in stream +CVE-2023-52519: Fix not seen in stream +CVE-2023-52522: Fixed with 5.4.258 +CVE-2023-52527: Fixed with 5.4.258 +CVE-2023-52528: Fixed with 5.4.258 +CVE-2023-52530: Fix not seen in stream +CVE-2023-52531: Fix not seen in stream +CVE-2023-52532: Fix not seen in stream +CVE-2023-52559: Fix not seen in stream +CVE-2023-52561: Fix not seen in stream +CVE-2023-52563: Fix not seen in stream +CVE-2023-52565: Fix not seen in stream +CVE-2023-52566: Fixed with 5.4.258 +CVE-2023-52568: Fix not seen in stream +CVE-2023-52569: Fix not seen in stream +CVE-2023-52571: Fix not seen in stream +CVE-2023-52572: Fix not seen in stream +CVE-2023-52573: Fixed with 5.4.258 +CVE-2023-52574: Fixed with 5.4.258 +CVE-2023-52578: Fixed with 5.4.258 +CVE-2023-52583: Fixed with 5.4.269 +CVE-2023-52584: Fix not seen in stream +CVE-2023-52585: Fix not seen in stream +CVE-2023-52586: Fix not seen in stream +CVE-2023-52587: Fixed with 5.4.269 +CVE-2023-52588: Fix not seen in stream +CVE-2023-52589: Fix not seen in stream +CVE-2023-52590: Fix not seen in stream +CVE-2023-52591: Fix not seen in stream +CVE-2023-52593: Fix not seen in stream +CVE-2023-52594: Fixed with 5.4.269 +CVE-2023-52595: Fixed with 5.4.269 +CVE-2023-52596: Fix not seen in stream +CVE-2023-52597: Fixed with 5.4.269 +CVE-2023-52598: Fixed with 5.4.269 +CVE-2023-52599: Fixed with 5.4.269 +CVE-2023-52600: Fixed with 5.4.269 +CVE-2023-52601: Fixed with 5.4.269 +CVE-2023-52602: Fixed with 5.4.269 +CVE-2023-52603: Fixed with 5.4.269 +CVE-2023-52604: Fixed with 5.4.269 +CVE-2023-52606: Fixed with 5.4.269 +CVE-2023-52607: Fixed with 5.4.269 +CVE-2023-52609: Fixed with 5.4.268 +CVE-2023-52610: Fix not seen in stream +CVE-2023-52612: Fixed with 5.4.268 +CVE-2023-52614: Fix not seen in stream +CVE-2023-52615: Fixed with 5.4.269 +CVE-2023-52617: Fixed with 5.4.269 +CVE-2023-52618: Fix not seen in stream +CVE-2023-52619: Fixed with 5.4.269 +CVE-2023-52620: Fix not seen in stream +CVE-2023-52621: Fix not seen in stream +CVE-2023-52622: Fixed with 5.4.269 +CVE-2023-52623: Fixed with 5.4.269 +CVE-2023-52624: Fix not seen in stream +CVE-2023-52625: Fix not seen in stream +CVE-2023-52628: Fix not seen in stream +CVE-2023-52629: Fix not seen in stream +CVE-2023-52632: Fix not seen in stream +CVE-2023-52633: Fix not seen in stream +CVE-2023-52634: Fix not seen in stream +CVE-2023-52635: Fix not seen in stream +CVE-2023-52637: Fixed with 5.4.269 +CVE-2023-52638: Fix not seen in stream +CVE-2023-52639: Fix not seen in stream +CVE-2023-52640: Fix not seen in stream +CVE-2023-52641: Fix not seen in stream CVE-2023-5717: Fixed with 5.4.259 CVE-2023-6040: Fixed with 5.4.267 CVE-2023-6121: Fixed with 5.4.263 CVE-2023-6240: Fix unknown -CVE-2023-6270: Fix unknown -CVE-2023-6356: Fix unknown +CVE-2023-6270: Fixed with 5.4.273 +CVE-2023-6356: Fixed with 5.4.268 CVE-2023-6535: Fix unknown -CVE-2023-6536: Fix unknown +CVE-2023-6536: Fixed with 5.4.268 CVE-2023-6546: Fix not seen in stream CVE-2023-6560: Fix not seen in stream CVE-2023-6606: Fixed with 5.4.266 @@ -827,7 +1077,7 @@ CVE-2023-6610: Fix not seen in stream CVE-2023-6915: Fixed with 5.4.268 CVE-2023-6931: Fixed with 5.4.264 CVE-2023-6932: Fixed with 5.4.263 -CVE-2023-7042: Fix unknown +CVE-2023-7042: Fixed with 5.4.273 CVE-2023-7192: Fixed with 5.4.235 CVE-2024-0340: Fixed with 5.4.269 CVE-2024-0564: Fix unknown @@ -836,15 +1086,16 @@ CVE-2024-0584: Fixed with 5.4.263 CVE-2024-0607: Fixed with 5.4.269 CVE-2024-0646: Fixed with 5.4.267 CVE-2024-0775: Fixed with 5.4.243 -CVE-2024-0841: Fix unknown +CVE-2024-0841: Fixed with 5.4.271 CVE-2024-1086: Fixed with 5.4.269 CVE-2024-1151: Fix not seen in stream CVE-2024-1312: Fix not seen in stream CVE-2024-21803: Fix unknown -CVE-2024-22099: Fix unknown +CVE-2024-2193: Fix unknown +CVE-2024-22099: Fixed with 5.4.273 CVE-2024-22386: Fix unknown -CVE-2024-23196: Fix unknown -CVE-2024-23307: Fix unknown +CVE-2024-23196: Fixed with 5.4.255 +CVE-2024-23307: Fix not seen in stream CVE-2024-23848: Fix unknown CVE-2024-23849: Fixed with 5.4.269 CVE-2024-23851: Fix not seen in stream @@ -853,7 +1104,7 @@ CVE-2024-24857: Fix unknown CVE-2024-24858: Fix unknown CVE-2024-24859: Fix unknown CVE-2024-24860: Fix not seen in stream -CVE-2024-24861: Fix unknown +CVE-2024-24861: Fix not seen in stream CVE-2024-24864: Fix unknown CVE-2024-25739: Fix unknown CVE-2024-25740: Fix unknown @@ -862,13 +1113,123 @@ CVE-2024-25744: Fix not seen in stream CVE-2024-26584: Fix not seen in stream CVE-2024-26585: Fix not seen in stream CVE-2024-26586: Fix not seen in stream -CVE-2024-26587: Fix not seen in stream -CVE-2024-26588: Fix not seen in stream CVE-2024-26589: Fix not seen in stream -CVE-2024-26591: Fix not seen in stream CVE-2024-26592: Fix not seen in stream CVE-2024-26593: Fixed with 5.4.269 CVE-2024-26594: Fix not seen in stream CVE-2024-26595: Fix not seen in stream CVE-2024-26597: Fixed with 5.4.268 CVE-2024-26598: Fixed with 5.4.269 +CVE-2024-26600: Fixed with 5.4.269 +CVE-2024-26602: Fixed with 5.4.269 +CVE-2024-26606: Fixed with 5.4.269 +CVE-2024-26607: Fix not seen in stream +CVE-2024-26614: Fix not seen in stream +CVE-2024-26615: Fixed with 5.4.269 +CVE-2024-26622: Fix not seen in stream +CVE-2024-26623: Fix not seen in stream +CVE-2024-26625: Fixed with 5.4.269 +CVE-2024-26627: Fix not seen in stream +CVE-2024-26633: Fixed with 5.4.268 +CVE-2024-26635: Fixed with 5.4.269 +CVE-2024-26636: Fixed with 5.4.269 +CVE-2024-26640: Fix not seen in stream +CVE-2024-26641: Fix not seen in stream +CVE-2024-26642: Fix not seen in stream +CVE-2024-26644: Fix not seen in stream +CVE-2024-26645: Fixed with 5.4.269 +CVE-2024-26646: Fix not seen in stream +CVE-2024-26647: Fix not seen in stream +CVE-2024-26648: Fix not seen in stream +CVE-2024-26650: Fix not seen in stream +CVE-2024-26651: Fixed with 5.4.273 +CVE-2024-26654: Fix not seen in stream +CVE-2024-26655: Fix not seen in stream +CVE-2024-26656: Fix not seen in stream +CVE-2024-26658: Fix not seen in stream +CVE-2024-26659: Fix not seen in stream +CVE-2024-26663: Fixed with 5.4.269 +CVE-2024-26664: Fixed with 5.4.269 +CVE-2024-26668: Fix not seen in stream +CVE-2024-26669: Fix not seen in stream +CVE-2024-26671: Fixed with 5.4.269 +CVE-2024-26672: Fix not seen in stream +CVE-2024-26673: Fixed with 5.4.269 +CVE-2024-26675: Fixed with 5.4.269 +CVE-2024-26676: Fix not seen in stream +CVE-2024-26677: Fix not seen in stream +CVE-2024-26679: Fixed with 5.4.269 +CVE-2024-26684: Fixed with 5.4.269 +CVE-2024-26685: Fixed with 5.4.269 +CVE-2024-26686: Fix not seen in stream +CVE-2024-26687: Fix not seen in stream +CVE-2024-26688: Fixed with 5.4.271 +CVE-2024-26689: Fix not seen in stream +CVE-2024-26691: Fix not seen in stream +CVE-2024-26696: Fixed with 5.4.269 +CVE-2024-26697: Fixed with 5.4.269 +CVE-2024-26699: Fix not seen in stream +CVE-2024-26700: Fix not seen in stream +CVE-2024-26702: Fixed with 5.4.269 +CVE-2024-26704: Fixed with 5.4.269 +CVE-2024-26706: Fix not seen in stream +CVE-2024-26712: Fix not seen in stream +CVE-2024-26713: Fix not seen in stream +CVE-2024-26715: Fix not seen in stream +CVE-2024-26719: Fix not seen in stream +CVE-2024-26720: Fixed with 5.4.269 +CVE-2024-26726: Fix not seen in stream +CVE-2024-26733: Fix not seen in stream +CVE-2024-26735: Fixed with 5.4.270 +CVE-2024-26736: Fixed with 5.4.270 +CVE-2024-26738: Fix not seen in stream +CVE-2024-26739: Fix not seen in stream +CVE-2024-26740: Fix not seen in stream +CVE-2024-26743: Fix not seen in stream +CVE-2024-26744: Fix not seen in stream +CVE-2024-26745: Fix not seen in stream +CVE-2024-26747: Fix not seen in stream +CVE-2024-26748: Fixed with 5.4.270 +CVE-2024-26749: Fixed with 5.4.270 +CVE-2024-26751: Fixed with 5.4.270 +CVE-2024-26752: Fixed with 5.4.270 +CVE-2024-26754: Fixed with 5.4.270 +CVE-2024-26756: Fix not seen in stream +CVE-2024-26757: Fix not seen in stream +CVE-2024-26758: Fix not seen in stream +CVE-2024-26759: Fix not seen in stream +CVE-2024-26763: Fixed with 5.4.270 +CVE-2024-26764: Fixed with 5.4.270 +CVE-2024-26765: Fix not seen in stream +CVE-2024-26766: Fixed with 5.4.270 +CVE-2024-26767: Fix not seen in stream +CVE-2024-26768: Fix not seen in stream +CVE-2024-26769: Fix not seen in stream +CVE-2024-26770: Fix not seen in stream +CVE-2024-26771: Fix not seen in stream +CVE-2024-26772: Fixed with 5.4.270 +CVE-2024-26773: Fixed with 5.4.270 +CVE-2024-26774: Fix not seen in stream +CVE-2024-26775: Fix not seen in stream +CVE-2024-26776: Fix not seen in stream +CVE-2024-26777: Fixed with 5.4.270 +CVE-2024-26778: Fixed with 5.4.270 +CVE-2024-26779: Fixed with 5.4.270 +CVE-2024-26784: Fix not seen in stream +CVE-2024-26787: Fix not seen in stream +CVE-2024-26788: Fixed with 5.4.271 +CVE-2024-26789: Fix not seen in stream +CVE-2024-26790: Fixed with 5.4.271 +CVE-2024-26791: Fixed with 5.4.271 +CVE-2024-26793: Fixed with 5.4.271 +CVE-2024-26795: Fix not seen in stream +CVE-2024-26797: Fix not seen in stream +CVE-2024-26798: Fix not seen in stream +CVE-2024-26801: Fixed with 5.4.271 +CVE-2024-26802: Fix not seen in stream +CVE-2024-26803: Fix not seen in stream +CVE-2024-26804: Fixed with 5.4.271 +CVE-2024-26805: Fixed with 5.4.271 +CVE-2024-26806: Fix not seen in stream +CVE-2024-26808: Fix not seen in stream +CVE-2024-26809: Fix not seen in stream diff --git a/data/5.4/5.4_security.txt b/data/5.4/5.4_security.txt index f51242fb9..e5096ce88 100644 --- a/data/5.4/5.4_security.txt +++ b/data/5.4/5.4_security.txt @@ -407,6 +407,7 @@ CVEs fixed in 5.4.112: CVE-2020-25672: 404daa4d62a364623b48349eb73a18579edf51ac nfc: fix memory leak in llcp_sock_connect() CVE-2020-25673: aa0cff2e075152d474b0b01233ac0adfcfc0c0db nfc: Avoid endless loops caused by repeated llcp_sock_connect() CVE-2021-3659: 38ea2b3ed00fb4632a706f2c796d6aa4a884f573 net: mac802154: Fix general protection fault + CVE-2021-46904: 4a2933c88399c0ebc738db39bbce3ae89786d723 net: hso: fix null-ptr-deref during tty device unregistration CVEs fixed in 5.4.113: CVE-2021-0937: cc59b872f2e1995b8cc819b9445c1198bfe83b2d netfilter: x_tables: fix compat match/target pad out-of-bound write @@ -414,25 +415,77 @@ CVEs fixed in 5.4.113: CVEs fixed in 5.4.114: CVE-2021-23133: 6180d2274b17fc0473fb0764d3417c0bddb99b2e net/sctp: fix race condition in sctp_destroy_sock + CVE-2021-46909: 871b569a3e67f570df9f5ba195444dc7c621293b ARM: footbridge: fix PCI interrupt mapping + CVE-2021-46915: 01fb1626b620cb37a65ad08e0f626489e8f042ef netfilter: nft_limit: avoid possible divide error in nft_limit_init + +CVEs fixed in 5.4.115: + CVE-2021-46921: 82808cc026811fbc3ecf0c0b267a12a339eead56 locking/qrwlock: Fix ordering in queued_write_lock_slowpath() CVEs fixed in 5.4.117: CVE-2021-31829: 53e0db429b37a32b8fc706d0d90eb4583ad13848 bpf: Fix masking negation logic upon negative dst register + CVE-2021-46971: b246759284d6a2bc5b6f1009caeeb3abce2ec9ff perf/core: Fix unconditional security_locked_down() call + CVE-2021-46974: 53e0db429b37a32b8fc706d0d90eb4583ad13848 bpf: Fix masking negation logic upon negative dst register CVEs fixed in 5.4.118: + CVE-2020-36777: 9185b3b1c143b8da409c19ac5a785aa18d67a81b media: dvbdev: Fix memory leak in dvb_media_device_free() CVE-2021-3506: 27a130638406815eba083c632ee083f0c5e688c2 f2fs: fix to avoid out-of-bounds memory access + CVE-2021-46938: a992a283c0b77d0a7c2c348add0e6a21fb1dab67 dm rq: fix double free of blk_mq_tag_set in dev remove after table load fails + CVE-2021-46939: c64da3294a7d59a4bf6874c664c13be892f15f44 tracing: Restructure trace_clock_global() to never block + CVE-2021-46943: a03fb1e8a110658215a4cefc3e2ad53279e496a6 media: staging/intel-ipu3: Fix set_fmt error handling + CVE-2021-46944: ff792ae52005c85a2d829c153e08d99a356e007d media: staging/intel-ipu3: Fix memory leak in imu_fmt + CVE-2021-46950: 6920cef604fa57f9409e3960413e9cc11f5c5a40 md/raid1: properly indicate failure when ending a failed write request + CVE-2021-46951: 2f12258b5224cfaa808c54fd29345f3c1cbfca76 tpm: efi: Use local variable for calculating final log size + CVE-2021-46953: 504632a3577a049dd9bb7aabae5b4476f9c586b4 ACPI: GTDT: Don't corrupt interrupt mappings on watchdow probe failure + CVE-2021-46955: 490ad0a2390442d0a7b8c00972a83dbb09cab142 openvswitch: fix stack OOB read while fragmenting IPv4 packets + CVE-2021-46956: 310efc95c72c13faf855c692d19cd4d054d827c8 virtiofs: fix memory leak in virtio_fs_probe() + CVE-2021-46960: 93f3339b22ba17e66f0808737467b70ba087eaec cifs: Return correct error code from smb2_get_enc_key + CVE-2021-46961: e7ea8e46e3b777be26aa855fe07778c415f24926 irqchip/gic-v3: Do not enable irqs when handling spurious interrups + CVE-2021-46962: 0d8941b9b2d3e7b3481fdf43b1a6189d162175b7 mmc: uniphier-sd: Fix a resource leak in the remove function + CVE-2021-46966: 72814a94c38a33239793f7622cec6ace1e540c4b ACPI: custom_method: fix potential use-after-free issue CVEs fixed in 5.4.119: + CVE-2020-36780: 7e1764312440c5df9dfe6b436035a03673b0c1b9 i2c: sprd: fix reference leak when pm_runtime_get_sync fails + CVE-2020-36782: 815859cb1d2302e74f11bf6894bceace9ca9eb4a i2c: imx-lpi2c: fix reference leak when pm_runtime_get_sync fails + CVE-2020-36783: 4734c4b1d9573c9d20bbc46cf37dde095ee011b8 i2c: img-scb: fix reference leak when pm_runtime_get_sync fails + CVE-2020-36787: 1dc1d30ac101bb8335d9852de2107af60c2580e7 media: aspeed: fix clock handling logic CVE-2021-32399: eeec325c9944b4427f482018d00b737220c31fd9 bluetooth: eliminate the potential race condition when removing the HCI controller CVE-2021-33034: 3a826ffa80d5c73ad7338fd98ace9c5b53844968 Bluetooth: verify AMP hci_chan before amp_destroy CVE-2021-45486: fee81285bd09ec2080ce2cbb5063aad0e58eb272 inet: use bigger hash table for IP ID generation + CVE-2021-47010: 9884f745108f7d25b189bbcd6754e284fb29ab68 net: Only allow init netns to set default tcp cong to a restricted algo + CVE-2021-47012: 30b9e92d0b5e5d5dc1101ab856c17009537cbca4 RDMA/siw: Fix a use after free in siw_alloc_mr + CVE-2021-47013: 55fcdd1258faaecca74b91b88cc0921f9edd775d net:emac/emac-mac: Fix a use after free in emac_mac_tx_buf_send + CVE-2021-47015: b1523e4ba293b2a32d9fabaf70c1dcaa6e3e2847 bnxt_en: Fix RX consumer index logic in the error path. + CVE-2021-47016: f6a90818a32058fca62cda3a2027a6a2364e1878 m68k: mvme147,mvme16x: Don't wipe PCC timer config bits + CVE-2021-47020: 870533403ffa28ff63e173045fc5369365642002 soundwire: stream: fix memory leak in stream config error path + CVE-2021-47034: 73f9dccb29e4f82574bec2765c0090cdb0404301 powerpc/64s: Fix pte update for kernel memory on radix + CVE-2021-47041: 999d606a820c36ae9b9e9611360c8b3d8d4bb777 nvmet-tcp: fix incorrect locking in state_change sk callback + CVE-2021-47051: 4a01ad002d2e03c399af536562693752af7c81b1 spi: fsl-lpspi: Fix PM reference leak in lpspi_prepare_xfer_hardware() + CVE-2021-47054: 3a76ec28824c01b57aa1f0927841d75e4f167cb8 bus: qcom: Put child node before return + CVE-2021-47056: 05ec8192ee4bfdf2a8894a68350dac9f1a155fa6 crypto: qat - ADF_STATUS_PF_RUNNING should be set after adf_dev_init + CVE-2021-47065: 6b5aa0cf321c25f41e09a61c83ee4dc7ab9549cb rtw88: Fix array overrun in rtw_get_tx_power_params() CVEs fixed in 5.4.120: CVE-2021-4157: 89862bd77e9cf511628eb7a97fe7f8d246192eec pNFS/flexfiles: fix incorrect size check in decode_nfs_fh() + CVE-2021-46981: 1c4962df938891af9ab4775f5224ef8601764107 nbd: Fix NULL pointer in flush_workqueue + CVE-2021-46984: 0b6b4b90b74c27bea968c214d820ba4254b903a5 kyber: fix out of bounds access when preempted + CVE-2021-46988: b3f1731c6d7fbc1ebe3ed8eff6d6bec56d76ff43 userfaultfd: release page in error path to avoid BUG_ON + CVE-2021-46989: c451a6bafb5f422197d31536f82116aed132b72c hfsplus: prevent corruption in shrinking truncate + CVE-2021-46991: d718c15a2bf9ae082d5ae4d177fb19ef23cb4132 i40e: Fix use-after-free in i40e_client_subtask() + CVE-2021-46992: c77e2ef18167ad334e27610ced9a7f6af5ec1787 netfilter: nftables: avoid overflows in nft_hash_buckets() + CVE-2021-46993: 687f523c134b7f0bd040ee1230f6d17990d54172 sched: Fix out-of-bound access in uclamp + CVE-2021-46998: f7f6f07774091a6ddd98500b85386c3c6afb30d3 ethernet:enic: Fix a use after free bug in enic_hard_start_xmit + CVE-2021-47006: 3ed8832aeaa9a37b0fc386bb72ff604352567c80 ARM: 9064/1: hw_breakpoint: Do not directly check the event's overflow_handler hook CVEs fixed in 5.4.122: CVE-2020-26555: f97257cde764ad6979a7dbeb460b9fb69276342e Bluetooth: SMP: Fail if remote and local public keys are identical CVE-2020-26558: f97257cde764ad6979a7dbeb460b9fb69276342e Bluetooth: SMP: Fail if remote and local public keys are identical CVE-2021-0129: f97257cde764ad6979a7dbeb460b9fb69276342e Bluetooth: SMP: Fail if remote and local public keys are identical + CVE-2021-47071: cdd91637d4ef33e2be19a8e16e72e7d00c996d76 uio_hv_generic: Fix a memory leak in error handling paths + CVE-2021-47073: 6fa78a6b9a3beb676a010dc489c1257f7e432525 platform/x86: dell-smbios-wmi: Fix oops on rmmod dell_smbios + CVE-2021-47078: a62225d951d77eb20208fed8fc199e0c9b1df08b RDMA/rxe: Clear all QP fields if creation failed + +CVEs fixed in 5.4.123: + CVE-2021-47180: af2a4426baf71163c0c354580ae98c7888a9aba7 NFC: nci: fix memory leak in nci_allocate_device CVEs fixed in 5.4.124: CVE-2020-24586: 14f29a67f40496c832ca9fe8502e03b10cca6e59 mac80211: prevent mixed key and fragment cache attacks @@ -444,12 +497,52 @@ CVEs fixed in 5.4.124: CVE-2020-26147: b90cf214e2bbb3f0a25d19937807238f646d1d72 mac80211: assure all fragments are encrypted CVE-2021-33098: cf20c704a26eb763daf6bfb10369a4f11fef2d9a ixgbe: fix large MTU request from VF CVE-2021-34981: fe201316ac36c48fc3cb2891dfdc8ab68058734d Bluetooth: cmtp: fix file refcount when cmtp_attach_device fails + CVE-2021-47137: 8bb1077448d43a871ed667520763e3b9f9b7975d net: lantiq: fix memory corruption in RX ring + CVE-2021-47138: 0bf49b3c8d8b3a43ce09f1b2db70e5484d31fcdf cxgb4: avoid accessing registers when clearing filters + CVE-2021-47141: 821149ee88c206fa37e79c1868cc270518484876 gve: Add NULL pointer checks when freeing irqs. + CVE-2021-47142: 7398c2aab4da960761ec182d04d6d5abbb4a226e drm/amdgpu: Fix a use-after-free + CVE-2021-47144: dde2656e0bbb2ac7d83a7bd95a8d5c3c95bbc009 drm/amd/amdgpu: fix refcount leak + CVE-2021-47145: 0ed102453aa1cd12fefde8f6b60b9519b0b1f003 btrfs: do not BUG_ON in link_to_fixup_dir + CVE-2021-47146: 37d697759958d111439080bab7e14d2b0e7b39f5 mld: fix panic in mld_newpack() + CVE-2021-47149: 22049c3d40f08facd1867548716a484dad6b3251 net: fujitsu: fix potential null-ptr-deref + CVE-2021-47150: 20255d41ac560397b6a07d8d87dcc5e2efc7672a net: fec: fix the potential memory leak in fec_enet_init() + CVE-2021-47153: 04cc05e3716ae31b17ecdab7bc55c8170def1b8b i2c: i801: Don't generate an interrupt on bus reset + CVE-2021-47159: ce5355f140a7987011388c7e30c4f8fbe180d3e8 net: dsa: fix a crash if ->get_sset_count() fails + CVE-2021-47160: 4fe4e1f48ba119bdbc7c897c83b04ba0d08f5488 net: dsa: mt7530: fix VLAN traffic leaks + CVE-2021-47161: 15d1cc4b4b585f9a2ce72c52cca004d5d735bdf1 spi: spi-fsl-dspi: Fix a resource leak in an error handling path + CVE-2021-47162: 64d17ec9f1ded042c4b188d15734f33486ed9966 tipc: skb_linearize the head skb when reassembling msgs + CVE-2021-47163: d1f76dfadaf8f47ed1753f97dbcbd41c16215ffa tipc: wait and exit until all work queues are done + CVE-2021-47165: 4ce2bf20b4a6e307e114847d60b2bf40a6a1fac0 drm/meson: fix shutdown crash when component not probed + CVE-2021-47166: 785917316b25685c9b3a2a88f933139f2de75e33 NFS: Don't corrupt the value of pg_bytes_written in nfs_do_recoalesce() + CVE-2021-47167: 1fc5f4eb9d31268ac3ce152d74ad5501ad24ca3e NFS: Fix an Oopsable condition in __nfs_pageio_add_request() + CVE-2021-47168: e411df81cd862ef3d5b878120b2a2fef0ca9cdb1 NFS: fix an incorrect limit in filelayout_decode_layout() + CVE-2021-47169: 915452f40e2f495e187276c4407a4f567ec2307e serial: rp2: use 'request_firmware' instead of 'request_firmware_nowait' + CVE-2021-47170: 2c835fede13e03f2743a333e4370b5ed2db91e83 USB: usbfs: Don't WARN about excessively large memory allocations + CVE-2021-47171: b95fb96e6339e34694dd578fb6bde3575b01af17 net: usb: fix memory leak in smsc75xx_bind + CVE-2021-47172: f49149964d2423fb618fb6b755bb1eaa431cca2c iio: adc: ad7124: Fix potential overflow due to non sequential channel numbers + CVE-2021-47173: 36b5ff1db1a4ef4fdbc2bae364344279f033ad88 misc/uss720: fix memory leak in uss720_probe + CVE-2021-47177: 044bbe8b92ab4e542de7f6c93c88ea65cccd8e29 iommu/vt-d: Fix sysfs leak in alloc_iommu() + CVE-2021-47179: aba3c7795f51717ae316f3566442dee7cc3eeccb NFSv4: Fix a NULL pointer dereference in pnfs_mark_matching_lsegs_return() CVEs fixed in 5.4.125: CVE-2021-3564: 8d3d0ac73a4a1d31e3d4f7c068312aba78470166 Bluetooth: fix the erroneous flush_work() order CVE-2021-3573: b6f97555c71f78288682bc967121572f10715c89 Bluetooth: use correct lock to prevent UAF of hdev object CVE-2021-3587: 5d4c4b06ed9fb7a69d0b2e2a73fc73226d25ab70 nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect CVE-2021-38208: 5d4c4b06ed9fb7a69d0b2e2a73fc73226d25ab70 nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect + CVE-2021-47109: d99029e6aab62aef0a0251588b2867e77e83b137 neighbour: allow NUD_NOARP entries to be forced GCed + CVE-2021-47110: 9084fe1b3572664ad276f427dce575f580c9799a x86/kvm: Disable kvmclock on all CPUs on shutdown + CVE-2021-47112: 7620a669111b52f224d006dea9e1e688e2d62c54 x86/kvm: Teardown PV features on boot CPU as well + CVE-2021-47114: cc2edb99ea606a45182b5ea38cc8f4e583aa0774 ocfs2: fix data corruption by fallocate + CVE-2021-47117: 920697b004e49cb026e2e15fe91be065bf0741b7 ext4: fix bug on in ext4_es_cache_extent as ext4_split_extent_at failed + CVE-2021-47118: 2cd6eedfa6344f5ef5c3dac3aee57a39b5b46dff pid: take a reference when initializing `cad_pid` + CVE-2021-47120: 368c5d45a87e1bcc7f1e98e0c255c37b7b12c5d6 HID: magicmouse: fix NULL-deref on disconnect + CVE-2021-47121: 4d94f530cd24c85aede6e72b8923f371b45d6886 net: caif: fix memory leak in cfusbl_device_notify + CVE-2021-47122: f52f4fd67264c70cd0b4ba326962ebe12d9cba94 net: caif: fix memory leak in caif_device_notify + CVE-2021-47126: 7ba7fa78a92dc410b6f93ed73075ab669c3a0b59 ipv6: Fix KASAN: slab-out-of-bounds Read in fib6_nh_flush_exceptions + CVE-2021-47129: da8d31e80ff425f5a65dab7060d5c4aba749e562 netfilter: nft_ct: skip expectations for confirmed conntrack + +CVEs fixed in 5.4.127: + CVE-2021-46906: 7f5a4b24cdbd7372770a02f23e347d7d9a9ac8f1 HID: usbhid: fix info leak in hid_submit_ctrl CVEs fixed in 5.4.128: CVE-2021-34693: c297559a2a2a6b6f0de61ed333a978a118b0e660 can: bcm: fix infoleak in struct bcm_msg_head @@ -581,10 +674,22 @@ CVEs fixed in 5.4.168: CVEs fixed in 5.4.169: CVE-2021-45469: b0406b5ef4e2c4fb21d9e7d5c36a0453b4279e9b f2fs: fix to do sanity check on last xattr entry in __f2fs_setxattr() + CVE-2021-47083: f373298e1bf0c6ea097c0bcc558dc43ad53e421f pinctrl: mediatek: fix global-out-of-bounds issue + CVE-2021-47086: 48c76fc53582e7f13c1e0b11c916e503256c4d0b phonet/pep: refuse to enable an unbound pipe + CVE-2021-47095: 8efd6a3391f7b0b19fb0c38e50add06ca30c94af ipmi: ssif: initialize ssif_info->client early + CVE-2021-47100: 992649b8b16843d27eb39ceea5f9cf85ffb50a18 ipmi: Fix UAF when uninstall ipmi_si and ipmi_msghandler module CVE-2022-1195: a5c6a13e9056d87805ba3042c208fbd4164ad22b hamradio: improve the incomplete fix to avoid NPD CVEs fixed in 5.4.170: CVE-2021-44733: 940e68e57ab69248fabba5889e615305789db8a7 tee: handle lookup of shm with reference count 0 + CVE-2021-46924: 1cd4063dbc91cf7965d73a6a3855e2028cd4613b NFC: st21nfca: Fix memory leak in device probe and remove + CVE-2021-46929: 831de271452b87657fcf8d715ee20519b79caef5 sctp: use call_rcu to free endpoint + CVE-2021-46930: 585e2b244dda7ea733274e4b8fa27853d625d3bf usb: mtu3: fix list_head check warning + CVE-2021-46932: 975774ea7528b489930b76a77ffc4d5379b95ff2 Input: appletouch - initialize work before device registration + CVE-2021-46933: 240fc586e83d645912accce081a48aa63a45f6ee usb: gadget: f_fs: Clear ffs_eventfd in ffs_data_clear. + CVE-2021-46934: 9e4a3f47eff476097e0c7faac04d1831fc70237d i2c: validate user data in compat ioctl + CVE-2021-46935: 103b16a8c51f96d5fe063022869ea906c256e5da binder: fix async_free_space accounting for empty parcels + CVE-2021-46936: fe5838c22b986c1190f1dce9aa09bf6a491c1a69 net: fix use-after-free in tw_timer_handler CVE-2022-20154: 831de271452b87657fcf8d715ee20519b79caef5 sctp: use call_rcu to free endpoint CVE-2023-23006: db484d35a9482d21a7f36da4dfc7a68aa2e9e1d6 net/mlx5: DR, Fix NULL vs IS_ERR checking in dr_domain_init_resources @@ -618,6 +723,7 @@ CVEs fixed in 5.4.177: CVEs fixed in 5.4.179: CVE-2022-0435: d692e3406e052dbf9f6d9da0cba36cb763272529 tipc: improve size validations for received domain records CVE-2022-0487: 3a0a7ec5574b510b067cfc734b8bdb6564b31d4e moxart: fix potential use-after-free on remove path + CVE-2022-48626: 3a0a7ec5574b510b067cfc734b8bdb6564b31d4e moxart: fix potential use-after-free on remove path CVEs fixed in 5.4.180: CVE-2022-25258: 38fd68f55a7ef57fb9cc3102ac65d1ac474a1a18 USB: gadget: validate interface OS descriptor requests @@ -656,6 +762,7 @@ CVEs fixed in 5.4.187: CVE-2022-20158: 268dcf1f7b3193bc446ec3d14e08a240e9561e4d net/packet: fix slab-out-of-bounds access in packet_recvmsg() CVE-2022-20368: 268dcf1f7b3193bc446ec3d14e08a240e9561e4d net/packet: fix slab-out-of-bounds access in packet_recvmsg() CVE-2022-3107: b01e2df5fbf68719dfb8e766c1ca6089234144c2 hv_netvsc: Add check for kvmalloc_array + CVE-2022-48629: 184f7bd08ce56f003530fc19f160d54e75bf5c9d crypto: qcom-rng - ensure buffer for generate is completely filled CVEs fixed in 5.4.188: CVE-2022-1016: 06f0ff82c70241a766a811ae1acf07d6e2734dcb netfilter: nf_tables: initialize registers in nft_do_chain() @@ -664,6 +771,7 @@ CVEs fixed in 5.4.188: CVE-2022-28356: 572f9a0d3f3feb8bd3422e88ad71882bc034b3ff llc: fix netdevice reference leaks in llc_ui_bind() CVEs fixed in 5.4.189: + CVE-2020-36775: 0478ccdc8ea016de1ebaf6fe6da0275c2b258c5b f2fs: fix to avoid potential deadlock CVE-2021-4197: 691a0fd625e06c138f7662286a87ffba48773f34 cgroup: Use open-time credentials for process migraton perm checks CVE-2022-1158: 1553126eccf4fad17afaeaed08db9e5944aa2d55 KVM: x86/mmu: do compare-and-exchange of gPTE via the user address CVE-2022-1198: 28c8fd84bea13cbf238d7b19d392de2fcc31331c drivers: hamradio: 6pack: fix UAF bug caused by mod_timer() @@ -765,6 +873,7 @@ CVEs fixed in 5.4.210: CVE-2022-26373: f2f41ef0352db9679bfae250d7a44b3113f3a3cc x86/speculation: Add RSB VM Exit protections CVEs fixed in 5.4.211: + CVE-2019-25162: 871a1e94929a27bf6e2cd99523865c840bbc2d87 i2c: Fix a potential use after free CVE-2022-1679: e9e21206b8ea62220b486310c61277e7ebfe7cec ath9k: fix use-after-free in ath9k_hif_usb_rx_cb CVE-2022-20422: 04549063d5701976034d8c2bfda3d3a8cbf0409f arm64: fix oops in concurrently setting insn_emulation sysctls CVE-2022-2153: 8cdba919acefdd6fea5dd2b77a119f54fb88ce11 KVM: x86: Avoid theoretical NULL pointer dereference in kvm_irq_delivery_to_apic_fast() @@ -814,6 +923,7 @@ CVEs fixed in 5.4.219: CVE-2022-42719: 0cb5be43dc4b79da010522f79a06fa56f944d3cd wifi: mac80211: fix MBSSID parsing use-after-free CVEs fixed in 5.4.220: + CVE-2021-47103: c3bb4a7e8cbc984e1cdac0fe6af60e880214ed6e inet: fully convert sk->sk_rx_dst to RCU rules CVE-2022-2602: 04df9719df1865f6770af9bc7880874af0e594b2 io_uring/af_unix: defer registered files gc to io_uring release CVE-2022-3535: 72c0d361940aec02d114d6f8f351147b85190464 net: mvpp2: fix mvpp2 debugfs leak CVE-2022-3542: 71e0ab5b7598d88001762fddbfeb331543c62841 bnx2x: fix potential memory leak in bnx2x_tpa_stop() @@ -907,6 +1017,7 @@ CVEs fixed in 5.4.238: CVEs fixed in 5.4.240: CVE-2021-33631: 14b6ad56df25c3a4a50cfbc0638e176577a9fce9 ext4: fix kernel BUG in 'ext4_write_inline_data_end()' + CVE-2021-47082: 0c0e566f0387490d16f166808c72e9c772027681 tun: avoid double free in tun_free_netdev CVE-2022-4744: 0c0e566f0387490d16f166808c72e9c772027681 tun: avoid double free in tun_free_netdev CVE-2023-0590: 0f5c0e0a4c0b081e5f959578a8e56c7921e63a2d net: sched: fix race condition in qdisc_graft() CVE-2023-1670: a07ec453e86abbd14e2d06d59367b4dd11437358 xirc2ps_cs: Fix use after free bug in xirc2ps_detach @@ -996,6 +1107,7 @@ CVEs fixed in 5.4.255: CVE-2023-3772: 8046beb890ebc83c5820188c650073e1c6066e67 xfrm: add NULL check in xfrm_update_ae_params CVE-2023-39194: 373848d51fde9138cdc539b1d97dc6b301cc04d5 net: xfrm: Fix xfrm_address_filter OOB read CVE-2023-51042: c6059af6bf5ed436b4aa5229e8113bd2546322d4 drm/amdgpu: Fix potential fence use-after-free v2 + CVE-2024-23196: 109f0aaa0b8838a88af9125b79579023539300a7 ALSA: hda: fix a possible null-pointer dereference due to data race in snd_hdac_regmap_sync() CVEs fixed in 5.4.257: CVE-2023-39189: a44602888bbe89d9dd89cb84baed2e356aba7436 netfilter: nfnetlink_osf: avoid OOB read @@ -1011,10 +1123,25 @@ CVEs fixed in 5.4.257: CVEs fixed in 5.4.258: CVE-2023-31085: c6d358387632a6d45b3e5d4c310cfec1bde59423 ubi: Refuse attaching if mtd's erasesize is 0 CVE-2023-42754: 810fd23d9715474aa27997584e8fc9396ef3cb67 ipv4: fix null-deref in ipv4_link_failure + CVE-2023-52513: 6e26812e289b374c17677d238164a5a8f5770594 RDMA/siw: Fix connection failure handling + CVE-2023-52522: 95eabb075a5902f4c0834ab1fb12dc35730c05af net: fix possible store tearing in neigh_periodic_work() + CVE-2023-52527: 1fc793d68d50dee4782ef2e808913d5dd880bcc6 ipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data() + CVE-2023-52528: 310f1c92f65ad905b7e81fe14de82d979ebbd825 net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg + CVE-2023-52566: 193b5a1c6c67c36b430989dc063fe7ea4e200a33 nilfs2: fix potential use after free in nilfs_gccache_submit_read_data() + CVE-2023-52573: 812da2a08dc5cc75fb71e29083ea20904510ac7a net: rds: Fix possible NULL-pointer dereference + CVE-2023-52574: c5f6478686bb45f453031594ae19b6c9723a780d team: fix null-ptr-deref when team device type is changed + CVE-2023-52578: ad8d39c7b437fcdab7208a6a56c093d222c008d5 net: bridge: use DEV_STATS_INC() CVEs fixed in 5.4.259: CVE-2023-35827: 65d34cfd4e347054eb4193bc95d9da7eaa72dee5 ravb: Fix use-after-free issue in ravb_tx_timeout_work() CVE-2023-46343: 76050b0cc5a72e0c7493287b7e18e1cb9e3c4612 nfc: nci: fix possible NULL pointer dereference in send_acknowledge() + CVE-2023-52475: 5aa514100aaf59868d745196258269a16737c7bd Input: powermate - fix use-after-free in powermate_config_complete + CVE-2023-52477: 6ad3e9fd3632106696692232bf7ff88b9f7e1bc3 usb: hub: Guard against accesses to uninitialized BOS descriptors + CVE-2023-52478: cd0e2bf7fb22fe9b989c59c42dca06367fd10e6b HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect + CVE-2023-52502: 7adcf014bda16cdbf804af5c164d94d5d025db2d net: nfc: fix races in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn() + CVE-2023-52507: 95733ea130e35ef9ec5949a5908dde3feaba92cb nfc: nci: assert requested protocol is valid + CVE-2023-52509: 65d34cfd4e347054eb4193bc95d9da7eaa72dee5 ravb: Fix use-after-free issue in ravb_tx_timeout_work() + CVE-2023-52510: 85c2857ef90041f567ce98722c1c342c4d31f4bc ieee802154: ca8210: Fix a potential UAF in ca8210_probe CVE-2023-5717: 7252c8b981853bb8930de44fab924f947362683f perf: Disallow mis-matched inherited group reads CVEs fixed in 5.4.260: @@ -1054,19 +1181,102 @@ CVEs fixed in 5.4.268: CVE-2023-52449: 1bf4fe14e97cda621522eb2f28b0a4e87c5b0745 mtd: Fix gluebi NULL pointer dereference caused by ftl notifier CVE-2023-52451: 9b5f03500bc5b083c0df696d7dd169d7ef3dd0c7 powerpc/pseries/memhp: Fix access beyond end of drmem array CVE-2023-52454: ee5e7632e981673f42a50ade25e71e612e543d9d nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length - CVE-2023-52457: b502fb43f7fb55aaf07f6092ab44657595214b93 serial: 8250: omap: Don't skip resource freeing if pm_runtime_resume_and_get() failed CVE-2023-52464: 5da3b6e7196f0b4f3728e4e25eb20233a9ddfaf6 EDAC/thunderx: Fix possible out-of-bounds string access + CVE-2023-52469: 8b55b06e737feb2a645b0293ea27e38418876d63 drivers/amd/pm: fix a use-after-free in kv_parse_power_table + CVE-2023-52470: 5d12c5d75f7c78b83a738025947651ec5c95b4d4 drm/radeon: check the alloc_workqueue return value in radeon_crtc_init() + CVE-2023-52609: 252a2a5569eb9f8d16428872cc24dea1ac0bb097 binder: fix race between mmput() and do_exit() + CVE-2023-52612: e0e3f4a18784182cfe34e20c00eca11e78d53e76 crypto: scomp - fix req->dst buffer overflow + CVE-2023-6356: ee5e7632e981673f42a50ade25e71e612e543d9d nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length + CVE-2023-6536: 9638beb4e10ac116c6a4fc13315e9c3608055ac0 nvmet-tcp: fix a crash in nvmet_req_complete() CVE-2023-6915: ef7152f8705fed11796641d7644acc3c950b5967 ida: Fix crash in ida_free when the bitmap is empty CVE-2024-26597: 02467ab8b404d80429107588e0f3425cf5fcd2e5 net: qualcomm: rmnet: fix global oob in rmnet_policy + CVE-2024-26633: 3f15ba3dc14e6ee002ea01b4faddc3d49200377c ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim() CVEs fixed in 5.4.269: CVE-2023-52435: cd1022eaf87be8e6151435bd4df4c242c347e083 net: prevent mss overflow in skb_segment() + CVE-2023-52486: 9dd334a8245011ace45e53298175c7b659edb3e7 drm: Don't unref the same fb many times by mistake due to deadlock handling + CVE-2023-52583: 6ab4fd508fad942f1f1ba940492f2735e078e980 ceph: fix deadlock or deadcode of misusing dget() + CVE-2023-52587: 615e3adc2042b7be4ad122a043fc9135e6342c90 IB/ipoib: Fix mcast list locking + CVE-2023-52594: f11f0fd1ad6c11ae7856d4325fe9d05059767225 wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus() + CVE-2023-52595: e1f113b57ddd18274d7c83618deca25cc880bc48 wifi: rt2x00: restart beacon queue when hardware reset + CVE-2023-52597: 5e63c9ae8055109d805aacdaf2a4fe2c3b371ba1 KVM: s390: fix setting of fpc register + CVE-2023-52598: 6d0822f2cc9b153bf2df49a84599195a2e0d21a8 s390/ptrace: handle setting of fpc register correctly + CVE-2023-52599: de6a91aed1e0b1a23e9c11e7d7557f088eeeb017 jfs: fix array-index-out-of-bounds in diNewExt + CVE-2023-52600: 93df0a2a0b3cde2d7ab3a52ed46ea1d6d4aaba5f jfs: fix uaf in jfs_evict_inode + CVE-2023-52601: 3f8217c323fd6ecd6829a0c3ae7ac3f14eac368e jfs: fix array-index-out-of-bounds in dbAdjTree + CVE-2023-52602: 1b9d6828589d57f94a23fb1c46112cda39d7efdb jfs: fix slab-out-of-bounds Read in dtSearch + CVE-2023-52603: fd3486a893778770557649fe28afa5e463d4ed07 UBSAN: array-index-out-of-bounds in dtSplitRoot + CVE-2023-52604: 98f9537fe61b8382b3cc5dd97347531698517c56 FS:JFS:UBSAN:array-index-out-of-bounds in dbAdjTree + CVE-2023-52606: 0580f4403ad33f379eef865c2a6fe94de37febdf powerpc/lib: Validate size for vector operations + CVE-2023-52607: f6781add1c311c17eff43e14c786004bbacf901e powerpc/mm: Fix null-pointer dereference in pgtable_cache_add + CVE-2023-52615: 5030d4c798863ccb266563201b341a099e8cdd48 hwrng: core - Fix page fault dead lock on mmap-ed hwrng + CVE-2023-52617: d8c293549946ee5078ed0ab77793cec365559355 PCI: switchtec: Fix stdev_release() crash after surprise hot remove + CVE-2023-52619: e9f6ac50890104fdf8194f2865680689239d30fb pstore/ram: Fix crash when setting number of cpus to an odd number + CVE-2023-52622: b183fe8702e78bba3dcef8e7193cab6898abee07 ext4: avoid online resizing failures due to oversized flex bg + CVE-2023-52623: 7a96d85bf196c170dcf1b47a82e9bb97cca69aa6 SUNRPC: Fix a suspicious RCU usage warning + CVE-2023-52637: 08de58abedf6e69396e1207e4f99ef8904b2b532 can: j1939: Fix UAF in j1939_sk_match_filter during setsockopt(SO_J1939_FILTER) CVE-2024-0340: 88c7e1e7a6b82d38ff82ca446862f3d5de34192a vhost: use kzalloc() instead of kmalloc() followed by memset() CVE-2024-0607: 25b42be4e067e107a2559266b54bf07fa5b094fb netfilter: nf_tables: fix pointer math issue in nft_byteorder_eval() CVE-2024-1086: 4e66422f1b56149761dc76030e6345d1cca6f869 netfilter: nf_tables: reject QUEUE/DROP verdict parameters CVE-2024-23849: a37ae111db5e0f7e3d6b692056c30e3e0f6f79cd net/rds: Fix UBSAN: array-index-out-of-bounds in rds_cmsg_recv CVE-2024-26593: d074d5ff5ae77b18300e5079c6bda6342a4d44b7 i2c: i801: Fix block process call transactions CVE-2024-26598: d04acadb6490aa3314f9c9e087691e55de153b88 KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache + CVE-2024-26600: 8398d8d735ee93a04fb9e9f490e8cacd737e3bf5 phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP + CVE-2024-26602: 2441a64070b85c14eecc3728cc87e883f953f265 sched/membarrier: reduce the ability to hammer on sys_membarrier + CVE-2024-26606: 42beab162dcee1e691ee4934292d51581c29df61 binder: signal epoll threads of self-work + CVE-2024-26615: 1fea9969b81c67d0cb1611d1b8b7d19049d937be net/smc: fix illegal rmb_desc access in SMC-D connection dump + CVE-2024-26625: 64babb17e8150771c58575d8f93a35c5296b499f llc: call sock_orphan() at release time + CVE-2024-26635: b8e8838f82f332ae80c643dbb1ca4418d0628097 llc: Drop support for ETH_P_TR_802_2. + CVE-2024-26636: b643d0defcbacd7fe548bc65c3e4e6f17dc5eb2d llc: make llc_ui_sendmsg() more robust against bonding changes + CVE-2024-26645: dad9b28f675ed99b4dec261db2a397efeb80b74c tracing: Ensure visibility when inserting an element into tracing_map + CVE-2024-26663: 6f70f0b412458c622a12d4292782c8e92e210c2f tipc: Check the bearer type before calling tipc_udp_nl_bearer_add() + CVE-2024-26664: 1eb74c00c9c3b13cb65e508c5d5a2f11afb96b8b hwmon: (coretemp) Fix out-of-bounds memory access + CVE-2024-26671: ecd7744a1446eb02ccc63e493e2eb6ede4ef1e10 blk-mq: fix IO hang from sbitmap wakeup race + CVE-2024-26673: f549f340c91f08b938d60266e792ff7748dae483 netfilter: nft_ct: sanitize layer 3 and 4 protocol number in custom expectations + CVE-2024-26675: 56fae81633ccee307cfcb032f706bf1863a56982 ppp_async: limit MRU to 64K + CVE-2024-26679: 5993f121fbc01dc2d734f0ff2628009b258fb1dd inet: read sk->sk_family once in inet_recv_error() + CVE-2024-26684: e9837c83befb5b852fa76425dde98a87b737df00 net: stmmac: xgmac: fix handling of DPP safety error for DMA channels + CVE-2024-26685: d31c8721e816eff5ca6573cc487754f357c093cd nilfs2: fix potential bug in end_buffer_async_write + CVE-2024-26696: 862ee4422c38be5c249844a684b00d0dbe9d1e46 nilfs2: fix hang in nilfs_lookup_dirty_data_buffers() + CVE-2024-26697: a6efe6dbaaf504f5b3f8a5c3f711fe54e7dda0ba nilfs2: fix data corruption in dsync block recovery for small block sizes + CVE-2024-26702: 7200170e88e3ec54d9e9c63f07514c3cead11481 iio: magnetometer: rm3100: add boundary check for the value read from RM3100_REG_TMRC + CVE-2024-26704: afbcad9ae7d6d11608399188f03a837451b6b3a1 ext4: fix double-free of blocks due to wrong extents moved_len + CVE-2024-26720: 1f12e4b3284d6c863f272eb2de0d4248ed211cf4 mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again + +CVEs fixed in 5.4.270: + CVE-2023-52504: 3770c38cd6a60494da29ac2da73ff8156440a2d1 x86/alternatives: Disable KASAN in apply_alternatives() + CVE-2024-26735: 82831e3ff76ef09fb184eb93b79a3eb3fb284f1d ipv6: sr: fix possible use-after-free and null-ptr-deref + CVE-2024-26736: 5c27d85a69fa16a08813ba37ddfb4bbc9a1ed6b5 afs: Increase buffer size in afs_update_volume_status() + CVE-2024-26748: aad6132ae6e4809e375431f8defd1521985e44e7 usb: cdns3: fix memory double free when handle zero packet + CVE-2024-26749: cfa9abb5570c489dabf6f7fb3a066cc576fc8824 usb: cdns3: fixed memory use after free at cdns3_gadget_ep_disable() + CVE-2024-26751: 999a8bb70da2946336327b4480824d1691cae1fa ARM: ep93xx: Add terminator to gpiod_lookup_table + CVE-2024-26752: c1d3a84a67db910ce28a871273c992c3d7f9efb5 l2tp: pass correct message length to ip6_append_data + CVE-2024-26754: f8cbd1791900b5d96466eede8e9439a5b9ca4de7 gtp: fix use-after-free and null-ptr-deref in gtp_genl_dump_pdp() + CVE-2024-26763: 0dccbb93538fe89a86c6de31d4b1c8c560848eaa dm-crypt: don't modify the data when using authenticated encryption + CVE-2024-26764: b4eea7a05ee0ab5ab0514421e6ba8c5d249cf942 fs/aio: Restrict kiocb_set_cancel_fn() to I/O submitted via libaio + CVE-2024-26766: 5833024a9856f454a964a198c63a57e59e07baf5 IB/hfi1: Fix sdma.h tx->num_descs off-by-one error + CVE-2024-26772: 6b92b1bc16d691c95b152c6dbf027ad64315668d ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal() + CVE-2024-26773: 260fc96283c0f594de18a1b045faf6d8fb42874d ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found() + CVE-2024-26777: 6db07619d173765bd8622d63809cbfe361f04207 fbdev: sis: Error out if pixclock equals zero + CVE-2024-26778: 84dce0f6a4cc5b7bfd7242ef9290db8ac1dd77ff fbdev: savage: Error out if pixclock equals zero + CVE-2024-26779: 85720b69aef177318f4a18efbcc4302228a340e5 wifi: mac80211: fix race condition on enabling fast-xmit + +CVEs fixed in 5.4.271: + CVE-2024-0841: 1dde8ef4b7a749ae1bc73617c91775631d167557 fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super + CVE-2024-26688: 1dde8ef4b7a749ae1bc73617c91775631d167557 fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super + CVE-2024-26788: 3cc5fb824c2125aa3740d905b3e5b378c8a09478 dmaengine: fsl-qdma: init irq after reg initialization + CVE-2024-26790: 518d78b4fac68cac29a263554d7f3b19da99d0da dmaengine: fsl-qdma: fix SoC may hang on 16 byte unaligned read + CVE-2024-26791: c6652e20d7d783d060fe5f987eac7b5cabe31311 btrfs: dev-replace: properly validate device names + CVE-2024-26793: ec92aa2cab6f0048f10d6aa4f025c5885cb1a1b6 gtp: fix use-after-free and null-ptr-deref in gtp_newlink() + CVE-2024-26801: 98fb98fd37e42fd4ce13ff657ea64503e24b6090 Bluetooth: Avoid potential use-after-free in hci_error_reset + CVE-2024-26804: f81e94d2dcd2397137edcb8b85f4c5bed5d22383 net: ip_tunnel: prevent perpetual headroom growth + CVE-2024-26805: 9ae51361da43270f4ba0eb924427a07e87e48777 netlink: Fix kernel-infoleak-after-free in __skb_datagram_iter + +CVEs fixed in 5.4.273: + CVE-2023-6270: 1a54aa506b3b2f31496731039e49778f54eee881 aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts + CVE-2023-7042: 88a9dffaec779504ab3680d33cf677741c029420 wifi: ath10k: fix NULL pointer dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev() + CVE-2024-22099: 5f369efd9d963c1f711a06c9b8baf9f5ce616d85 Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security + CVE-2024-26651: 8a8b6a24684bc278036c3f159f7b3a31ad89546a sr9800: Add check for usbnet_get_endpoints Outstanding CVEs: CVE-2005-3660: (unk) @@ -1126,6 +1336,8 @@ Outstanding CVEs: CVE-2020-36313: (unk) KVM: Fix out of range accesses to memslots CVE-2020-36385: (unk) RDMA/ucma: Rework ucma_migrate_id() to avoid races with destroy CVE-2020-36691: (unk) netlink: limit recursion depth in policy validation + CVE-2020-36781: (unk) i2c: imx: fix reference leak when pm_runtime_get_sync fails + CVE-2020-36784: (unk) i2c: cadence: fix reference leak when pm_runtime_get_sync fails CVE-2021-0399: (unk) CVE-2021-0929: (unk) staging/android/ion: delete dma_buf->kmap/unmap implemenation CVE-2021-20177: (unk) netfilter: add and use nf_hook_slow_list() @@ -1146,6 +1358,48 @@ Outstanding CVEs: CVE-2021-4148: (unk) mm: khugepaged: skip huge page collapse for special files CVE-2021-4150: (unk) block: fix incorrect references to disk objects CVE-2021-4218: (unk) sysctl: pass kernel pointers to ->proc_handler + CVE-2021-46908: (unk) bpf: Use correct permission flag for mixed signed bounds arithmetic + CVE-2021-46925: (unk) net/smc: fix kernel panic caused by race of smc_sock + CVE-2021-46926: (unk) ALSA: hda: intel-sdw-acpi: harden detection of controller + CVE-2021-46928: (unk) parisc: Clear stale IIR value on instruction access rights trap + CVE-2021-46941: (unk) usb: dwc3: core: Do core softreset when switch mode + CVE-2021-46952: (unk) NFS: fs_context: validate UDP retrans to prevent shift out-of-bounds + CVE-2021-46959: (unk) spi: Fix use-after-free with devm_spi_alloc_* + CVE-2021-46965: (unk) mtd: physmap: physmap-bt1-rom: Fix unintentional stack access + CVE-2021-46969: (unk) bus: mhi: core: Fix invalid error returning in mhi_queue + CVE-2021-46970: (unk) bus: mhi: pci_generic: Remove WQ_MEM_RECLAIM flag from state workqueue + CVE-2021-46982: (unk) f2fs: compress: fix race condition of overwrite vs truncate + CVE-2021-47004: (unk) f2fs: fix to avoid touching checkpointed data in get_victim() + CVE-2021-47005: (unk) PCI: endpoint: Fix NULL pointer dereference for ->get_features() + CVE-2021-47024: (unk) vsock/virtio: free queued packets when closing socket + CVE-2021-47028: (unk) mt76: mt7915: fix txrate reporting + CVE-2021-47046: (unk) drm/amd/display: Fix off by one in hdmi_14_process_transaction() + CVE-2021-47049: (unk) Drivers: hv: vmbus: Use after free in __vmbus_open() + CVE-2021-47052: (unk) crypto: sa2ul - Fix memory leak of rxd + CVE-2021-47059: (unk) crypto: sun8i-ss - fix result memory leak on error path + CVE-2021-47063: (unk) drm: bridge/panel: Cleanup connector on bridge detach + CVE-2021-47070: (unk) uio_hv_generic: Fix another memory leak in error handling paths + CVE-2021-47074: (unk) nvme-loop: fix memory leak in nvme_loop_create_ctrl() + CVE-2021-47075: (unk) nvmet: fix memory leak in nvmet_alloc_ctrl() + CVE-2021-47076: (unk) RDMA/rxe: Return CQE error if invalid lkey was supplied + CVE-2021-47077: (unk) scsi: qedf: Add pointer checks in qedf_update_link_speed() + CVE-2021-47101: (unk) asix: fix uninit-value in asix_mdio_read() + CVE-2021-47113: (unk) btrfs: abort in rename_exchange if we fail to insert the second ref + CVE-2021-47116: (unk) ext4: fix memory leak in ext4_mb_init_backend on error path. + CVE-2021-47119: (unk) ext4: fix memory leak in ext4_fill_super + CVE-2021-47124: (unk) io_uring: fix link timeout refs + CVE-2021-47125: (unk) sch_htb: fix refcount leak in htb_parent_to_leaf_offload + CVE-2021-47128: (unk) bpf, lockdown, audit: Fix buggy SELinux lockdown permission checks + CVE-2021-47131: (unk) net/tls: Fix use-after-free after the TLS device goes down and up + CVE-2021-47133: (unk) HID: amd_sfh: Fix memory leak in amd_sfh_work + CVE-2021-47135: (unk) mt76: mt7921: fix possible AOOB issue in mt7921_mcu_tx_rate_report + CVE-2021-47136: (unk) net: zero-initialize tc skb extension on allocation + CVE-2021-47140: (unk) iommu/amd: Clear DMA ops when switching domain + CVE-2021-47143: (unk) net/smc: remove device from smcd_dev_list after failed device_add() + CVE-2021-47147: (unk) ptp: ocp: Fix a resource leak in an error handling path + CVE-2021-47151: (unk) interconnect: qcom: bcm-voter: add a missing of_node_put() + CVE-2021-47158: (unk) net: dsa: sja1105: add error handling in sja1105_setup() + CVE-2021-47175: (unk) net/sched: fq_pie: fix OOB access in the traffic path CVE-2022-0168: (unk) cifs: fix NULL ptr dereference in smb2_ioctl_query_info() CVE-2022-0382: (unk) net ticp:fix a kernel-infoleak in __tipc_sendmsg() CVE-2022-0400: (unk) @@ -1198,6 +1452,8 @@ Outstanding CVEs: CVE-2022-45885: (unk) CVE-2022-47520: (unk) wifi: wilc1000: validate pairwise and authentication suite offsets CVE-2022-47946: (unk) io_uring: kill sqo_dead and sqo submission halting + CVE-2022-48627: (unk) vt: fix memory overlapping when deleting chars in the buffer + CVE-2022-48628: (unk) ceph: drop messages from MDS when unmounting CVE-2023-0240: (unk) io_uring: COW io_identity on mismatch CVE-2023-0386: (unk) ovl: fail on invalid uid/gid mapping at copy up CVE-2023-0597: (unk) x86/mm: Randomize per-cpu entry area @@ -1217,6 +1473,7 @@ Outstanding CVEs: CVE-2023-23004: (unk) malidp: Fix NULL vs IS_ERR() checking CVE-2023-23039: (unk) CVE-2023-26242: (unk) + CVE-2023-28746: (unk) x86/mmio: Disable KVM mitigation when X86_FEATURE_CLEAR_CPU_BUF is set CVE-2023-31081: (unk) CVE-2023-31082: (unk) CVE-2023-31083: (unk) Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO @@ -1231,34 +1488,86 @@ Outstanding CVEs: CVE-2023-4133: (unk) cxgb4: fix use after free bugs caused by circular dependency problem CVE-2023-4134: (unk) Input: cyttsp4_core - change del_timer_sync() to timer_shutdown_sync() CVE-2023-4622: (unk) unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES - CVE-2023-47233: (unk) + CVE-2023-47233: (unk) wifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach CVE-2023-4881: (unk) netfilter: nftables: exthdr: fix 4-byte stack OOB write CVE-2023-50431: (unk) accel/habanalabs: fix information leak in sec_attest_info() CVE-2023-51779: (unk) Bluetooth: af_bluetooth: Fix Use-After-Free in bt_sock_recvmsg CVE-2023-52429: (unk) dm: limit the number of targets and parameter size area CVE-2023-52434: (unk) smb: client: fix potential OOBs in smb2_parse_contexts() CVE-2023-52442: (unk) ksmbd: validate session id and tree id in compound request - CVE-2023-52456: (unk) serial: imx: fix tx statemachine deadlock CVE-2023-52458: (unk) block: add check that partition length needs to be aligned with block size + CVE-2023-52474: (unk) IB/hfi1: Fix bugs with non-PAGE_SIZE-end multi-iovec user SDMA requests + CVE-2023-52476: (unk) perf/x86/lbr: Filter vsyscall addresses + CVE-2023-52479: (unk) ksmbd: fix uaf in smb20_oplock_break_ack + CVE-2023-52480: (unk) ksmbd: fix race condition between session lookup and expire + CVE-2023-52481: (unk) arm64: errata: Add Cortex-A520 speculative unprivileged load workaround + CVE-2023-52482: (unk) x86/srso: Add SRSO mitigation for Hygon processors + CVE-2023-52484: (unk) iommu/arm-smmu-v3: Fix soft lockup triggered by arm_smmu_mm_invalidate_range + CVE-2023-52485: (unk) drm/amd/display: Wake DMCUB before sending a command + CVE-2023-52488: (unk) serial: sc16is7xx: convert from _raw_ to _noinc_ regmap functions for FIFO + CVE-2023-52489: (unk) mm/sparsemem: fix race in accessing memory_section->usage + CVE-2023-52491: (unk) media: mtk-jpeg: Fix use after free bug due to error path handling in mtk_jpeg_dec_device_run + CVE-2023-52497: (unk) erofs: fix lz4 inplace decompression + CVE-2023-52498: (unk) PM: sleep: Fix possible deadlocks in core system-wide PM code + CVE-2023-52500: (unk) scsi: pm80xx: Avoid leaking tags when processing OPC_INB_SET_CONTROLLER_CONFIG command + CVE-2023-52501: (unk) ring-buffer: Do not attempt to read past "commit" + CVE-2023-52506: (unk) LoongArch: Set all reserved memblocks on Node#0 at initialization + CVE-2023-52508: (unk) nvme-fc: Prevent null pointer dereference in nvme_fc_io_getuuid() + CVE-2023-52511: (unk) spi: sun6i: reduce DMA RX transfer width to single byte + CVE-2023-52515: (unk) RDMA/srp: Do not call scsi_done() from srp_abort() + CVE-2023-52516: (unk) dma-debug: don't call __dma_entry_alloc_check_leak() under free_entries_lock + CVE-2023-52517: (unk) spi: sun6i: fix race between DMA RX transfer completion and RX FIFO drain + CVE-2023-52519: (unk) HID: intel-ish-hid: ipc: Disable and reenable ACPI GPE bit + CVE-2023-52530: (unk) wifi: mac80211: fix potential key use-after-free + CVE-2023-52531: (unk) wifi: iwlwifi: mvm: Fix a memory corruption issue + CVE-2023-52532: (unk) net: mana: Fix TX CQE error handling + CVE-2023-52559: (unk) iommu/vt-d: Avoid memory allocation in iommu_suspend() + CVE-2023-52561: (unk) arm64: dts: qcom: sdm845-db845c: Mark cont splash memory region as reserved + CVE-2023-52563: (unk) drm/meson: fix memory leak on ->hpd_notify callback + CVE-2023-52565: (unk) media: uvcvideo: Fix OOB read + CVE-2023-52568: (unk) x86/sgx: Resolves SECS reclaim vs. page fault for EAUG race + CVE-2023-52569: (unk) btrfs: remove BUG() after failure to insert delayed dir index item + CVE-2023-52571: (unk) power: supply: rk817: Fix node refcount leak + CVE-2023-52572: (unk) cifs: Fix UAF in cifs_demultiplex_thread() + CVE-2023-52584: (unk) spmi: mediatek: Fix UAF on device remove + CVE-2023-52585: (unk) drm/amdgpu: Fix possible NULL dereference in amdgpu_ras_query_error_status_helper() + CVE-2023-52586: (unk) drm/msm/dpu: Add mutex lock in control vblank irq + CVE-2023-52588: (unk) f2fs: fix to tag gcing flag on page during block migration + CVE-2023-52589: (unk) media: rkisp1: Fix IRQ disable race issue + CVE-2023-52590: (unk) ocfs2: Avoid touching renamed directory if parent does not change + CVE-2023-52591: (unk) reiserfs: Avoid touching renamed directory if parent does not change + CVE-2023-52593: (unk) wifi: wfx: fix possible NULL pointer dereference in wfx_set_mfp_ap() + CVE-2023-52596: (unk) sysctl: Fix out of bounds access for empty sysctl registers + CVE-2023-52610: (unk) net/sched: act_ct: fix skb leak and crash on ooo frags + CVE-2023-52614: (unk) PM / devfreq: Fix buffer overflow in trans_stat_show + CVE-2023-52618: (unk) block/rnbd-srv: Check for unlikely string overflow + CVE-2023-52620: (unk) netfilter: nf_tables: disallow timeout for anonymous sets + CVE-2023-52621: (unk) bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers + CVE-2023-52624: (unk) drm/amd/display: Wake DMCUB before executing GPINT commands + CVE-2023-52625: (unk) drm/amd/display: Refactor DMCUB enter/exit idle interface + CVE-2023-52628: (unk) netfilter: nftables: exthdr: fix 4-byte stack OOB write + CVE-2023-52629: (unk) sh: push-switch: Reorder cleanup operations to avoid use-after-free bug + CVE-2023-52632: (unk) drm/amdkfd: Fix lock dependency warning with srcu + CVE-2023-52633: (unk) um: time-travel: fix time corruption + CVE-2023-52634: (unk) drm/amd/display: Fix disable_otg_wa logic + CVE-2023-52635: (unk) PM / devfreq: Synchronize devfreq_monitor_[start/stop] + CVE-2023-52638: (unk) can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock + CVE-2023-52639: (unk) KVM: s390: vsie: fix race during shadow creation + CVE-2023-52640: (unk) fs/ntfs3: Fix oob in ntfs_listxattr + CVE-2023-52641: (unk) fs/ntfs3: Add NULL ptr dereference checking at the end of attr_allocate_frame() CVE-2023-6240: (unk) - CVE-2023-6270: (unk) - CVE-2023-6356: (unk) CVE-2023-6535: (unk) - CVE-2023-6536: (unk) CVE-2023-6546: (unk) tty: n_gsm: fix the UAF caused by race condition in gsm_cleanup_mux CVE-2023-6560: (unk) io_uring: don't allow discontig pages for IORING_SETUP_NO_MMAP CVE-2023-6610: (unk) smb: client: fix potential OOB in smb2_dump_detail() - CVE-2023-7042: (unk) CVE-2024-0564: (unk) CVE-2024-0565: (unk) smb: client: fix OOB in receive_encrypted_standard() - CVE-2024-0841: (unk) CVE-2024-1151: (unk) net: openvswitch: limit the number of recursions from action sets CVE-2024-1312: (unk) mm: lock_vma_under_rcu() must check vma->anon_vma under vma lock CVE-2024-21803: (unk) - CVE-2024-22099: (unk) + CVE-2024-2193: (unk) CVE-2024-22386: (unk) - CVE-2024-23196: (unk) - CVE-2024-23307: (unk) + CVE-2024-23307: (unk) md/raid5: fix atomicity violation in raid5_cache_count CVE-2024-23848: (unk) CVE-2024-23851: (unk) dm: limit the number of targets and parameter size area CVE-2024-24855: (unk) scsi: lpfc: Fix a possible data race in lpfc_unregister_fcf_rescan() @@ -1266,7 +1575,7 @@ Outstanding CVEs: CVE-2024-24858: (unk) CVE-2024-24859: (unk) CVE-2024-24860: (unk) Bluetooth: Fix atomicity violation in {min,max}_key_size_set - CVE-2024-24861: (unk) + CVE-2024-24861: (unk) media: xc4000: Fix atomicity violation in xc4000_get_frequency CVE-2024-24864: (unk) CVE-2024-25739: (unk) CVE-2024-25740: (unk) @@ -1275,10 +1584,74 @@ Outstanding CVEs: CVE-2024-26584: (unk) net: tls: handle backlogging of crypto requests CVE-2024-26585: (unk) tls: fix race between tx work scheduling and socket close CVE-2024-26586: (unk) mlxsw: spectrum_acl_tcam: Fix stack corruption - CVE-2024-26587: (unk) net: netdevsim: don't try to destroy PHC on VFs - CVE-2024-26588: (unk) LoongArch: BPF: Prevent out-of-bounds memory access CVE-2024-26589: (unk) bpf: Reject variable offset alu on PTR_TO_FLOW_KEYS - CVE-2024-26591: (unk) bpf: Fix re-attachment branch in bpf_tracing_prog_attach CVE-2024-26592: (unk) ksmbd: fix UAF issue in ksmbd_tcp_new_connection() CVE-2024-26594: (unk) ksmbd: validate mech token in session setup CVE-2024-26595: (unk) mlxsw: spectrum_acl_tcam: Fix NULL pointer dereference in error path + CVE-2024-26607: (unk) drm/bridge: sii902x: Fix probing race issue + CVE-2024-26614: (unk) tcp: make sure init the accept_queue's spinlocks once + CVE-2024-26622: (unk) tomoyo: fix UAF write bug in tomoyo_write_control() + CVE-2024-26623: (unk) pds_core: Prevent race issues involving the adminq + CVE-2024-26627: (unk) scsi: core: Move scsi_host_busy() out of host lock for waking up EH handler + CVE-2024-26640: (unk) tcp: add sanity checks to rx zerocopy + CVE-2024-26641: (unk) ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv() + CVE-2024-26642: (unk) netfilter: nf_tables: disallow anonymous set with timeout flag + CVE-2024-26644: (unk) btrfs: don't abort filesystem when attempting to snapshot deleted subvolume + CVE-2024-26646: (unk) thermal: intel: hfi: Add syscore callbacks for system-wide PM + CVE-2024-26647: (unk) drm/amd/display: Fix late derefrence 'dsc' check in 'link_set_dsc_pps_packet()' + CVE-2024-26648: (unk) drm/amd/display: Fix variable deferencing before NULL check in edp_setup_replay() + CVE-2024-26650: (unk) platform/x86: p2sb: Allow p2sb_bar() calls during PCI device probe + CVE-2024-26654: (unk) ALSA: sh: aica: reorder cleanup operations to avoid UAF bugs + CVE-2024-26655: (unk) Fix memory leak in posix_clock_open() + CVE-2024-26656: (unk) drm/amdgpu: fix use-after-free bug + CVE-2024-26658: (unk) bcachefs: grab s_umount only if snapshotting + CVE-2024-26659: (unk) xhci: handle isoc Babble and Buffer Overrun events properly + CVE-2024-26668: (unk) netfilter: nft_limit: reject configurations that cause integer overflow + CVE-2024-26669: (unk) net/sched: flower: Fix chain template offload + CVE-2024-26672: (unk) drm/amdgpu: Fix variable 'mca_funcs' dereferenced before NULL check in 'amdgpu_mca_smu_get_mca_entry()' + CVE-2024-26676: (unk) af_unix: Call kfree_skb() for dead unix_(sk)->oob_skb in GC. + CVE-2024-26677: (unk) rxrpc: Fix delayed ACKs to not set the reference serial number + CVE-2024-26686: (unk) fs/proc: do_task_stat: use sig->stats_lock to gather the threads/children stats + CVE-2024-26687: (unk) xen/events: close evtchn after mapping cleanup + CVE-2024-26689: (unk) ceph: prevent use-after-free in encode_cap_msg() + CVE-2024-26691: (unk) KVM: arm64: Fix circular locking dependency + CVE-2024-26699: (unk) drm/amd/display: Fix array-index-out-of-bounds in dcn35_clkmgr + CVE-2024-26700: (unk) drm/amd/display: Fix MST Null Ptr for RV + CVE-2024-26706: (unk) parisc: Fix random data corruption from exception handler + CVE-2024-26712: (unk) powerpc/kasan: Fix addr error caused by page alignment + CVE-2024-26713: (unk) powerpc/pseries/iommu: Fix iommu initialisation during DLPAR add + CVE-2024-26715: (unk) usb: dwc3: gadget: Fix NULL pointer dereference in dwc3_gadget_suspend + CVE-2024-26719: (unk) nouveau: offload fence uevents work to workqueue + CVE-2024-26726: (unk) btrfs: don't drop extent_map for free space inode on write error + CVE-2024-26733: (unk) arp: Prevent overflow in arp_req_get(). + CVE-2024-26738: (unk) powerpc/pseries/iommu: DLPAR add doesn't completely initialize pci_controller + CVE-2024-26739: (unk) net/sched: act_mirred: don't override retval if we already lost the skb + CVE-2024-26740: (unk) net/sched: act_mirred: use the backlog for mirred ingress + CVE-2024-26743: (unk) RDMA/qedr: Fix qedr_create_user_qp error flow + CVE-2024-26744: (unk) RDMA/srpt: Support specifying the srpt_service_guid parameter + CVE-2024-26745: (unk) powerpc/pseries/iommu: IOMMU table is not initialized for kdump over SR-IOV + CVE-2024-26747: (unk) usb: roles: fix NULL pointer issue when put module's reference + CVE-2024-26756: (unk) md: Don't register sync_thread for reshape directly + CVE-2024-26757: (unk) md: Don't ignore read-only array in md_check_recovery() + CVE-2024-26758: (unk) md: Don't ignore suspended array in md_check_recovery() + CVE-2024-26759: (unk) mm/swap: fix race when skipping swapcache + CVE-2024-26765: (unk) LoongArch: Disable IRQ before init_fn() for nonboot CPUs + CVE-2024-26767: (unk) drm/amd/display: fixed integer types and null check locations + CVE-2024-26768: (unk) LoongArch: Change acpi_core_pic[NR_CPUS] to acpi_core_pic[MAX_CORE_PIC] + CVE-2024-26769: (unk) nvmet-fc: avoid deadlock on delete association path + CVE-2024-26770: (unk) HID: nvidia-shield: Add missing null pointer checks to LED initialization + CVE-2024-26771: (unk) dmaengine: ti: edma: Add some null pointer checks to the edma_probe + CVE-2024-26774: (unk) ext4: avoid dividing by 0 in mb_update_avg_fragment_size() when block bitmap corrupt + CVE-2024-26775: (unk) aoe: avoid potential deadlock at set_capacity + CVE-2024-26776: (unk) spi: hisi-sfc-v3xx: Return IRQ_NONE if no interrupts were detected + CVE-2024-26784: (unk) pmdomain: arm: Fix NULL dereference on scmi_perf_domain removal + CVE-2024-26787: (unk) mmc: mmci: stm32: fix DMA API overlapping mappings warning + CVE-2024-26789: (unk) crypto: arm64/neonbs - fix out-of-bounds access on short input + CVE-2024-26795: (unk) riscv: Sparse-Memory/vmemmap out-of-bounds fix + CVE-2024-26797: (unk) drm/amd/display: Prevent potential buffer overflow in map_hw_resources + CVE-2024-26798: (unk) fbcon: always restore the old font data in fbcon_do_set_font() + CVE-2024-26802: (unk) stmmac: Clear variable when destroying workqueue + CVE-2024-26803: (unk) net: veth: clear GRO when clearing XDP even when down + CVE-2024-26806: (unk) spi: cadence-qspi: remove system-wide suspend helper calls from runtime PM hooks + CVE-2024-26808: (unk) netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain + CVE-2024-26809: (unk) netfilter: nft_set_pipapo: release elements in clone only from destroy path diff --git a/data/5.5/5.5_CVEs.txt b/data/5.5/5.5_CVEs.txt index 74c637c8c..b170be441 100644 --- a/data/5.5/5.5_CVEs.txt +++ b/data/5.5/5.5_CVEs.txt @@ -39,6 +39,7 @@ CVE-2019-19770: Fix not seen in stream CVE-2019-19814: Fix unknown CVE-2019-20794: Fix unknown CVE-2019-20810: Fix not seen in stream +CVE-2019-25162: Fix not seen in stream CVE-2019-3016: Fixed with 5.5.3 CVE-2020-0009: Fixed with 5.5.7 CVE-2020-0110: Fixed with 5.5.7 @@ -196,6 +197,14 @@ CVE-2020-36558: Fixed with 5.5.7 CVE-2020-36691: Fix not seen in stream CVE-2020-36694: Fix not seen in stream CVE-2020-36766: Fix not seen in stream +CVE-2020-36775: Fix not seen in stream +CVE-2020-36777: Fix not seen in stream +CVE-2020-36780: Fix not seen in stream +CVE-2020-36781: Fix not seen in stream +CVE-2020-36782: Fix not seen in stream +CVE-2020-36783: Fix not seen in stream +CVE-2020-36784: Fix not seen in stream +CVE-2020-36787: Fix not seen in stream CVE-2020-3702: Fix not seen in stream CVE-2020-4788: Fix not seen in stream CVE-2020-8428: Fixed with 5.5 @@ -370,6 +379,153 @@ CVE-2021-45469: Fix not seen in stream CVE-2021-45485: Fix not seen in stream CVE-2021-45486: Fix not seen in stream CVE-2021-45868: Fix not seen in stream +CVE-2021-46904: Fix not seen in stream +CVE-2021-46906: Fix not seen in stream +CVE-2021-46908: Fix not seen in stream +CVE-2021-46909: Fix not seen in stream +CVE-2021-46915: Fix not seen in stream +CVE-2021-46921: Fix not seen in stream +CVE-2021-46924: Fix not seen in stream +CVE-2021-46925: Fix not seen in stream +CVE-2021-46926: Fix not seen in stream +CVE-2021-46928: Fix not seen in stream +CVE-2021-46929: Fix not seen in stream +CVE-2021-46930: Fix not seen in stream +CVE-2021-46932: Fix not seen in stream +CVE-2021-46933: Fix not seen in stream +CVE-2021-46934: Fix not seen in stream +CVE-2021-46935: Fix not seen in stream +CVE-2021-46936: Fix not seen in stream +CVE-2021-46938: Fix not seen in stream +CVE-2021-46939: Fix not seen in stream +CVE-2021-46941: Fix not seen in stream +CVE-2021-46943: Fix not seen in stream +CVE-2021-46944: Fix not seen in stream +CVE-2021-46950: Fix not seen in stream +CVE-2021-46951: Fix not seen in stream +CVE-2021-46952: Fix not seen in stream +CVE-2021-46953: Fix not seen in stream +CVE-2021-46955: Fix not seen in stream +CVE-2021-46956: Fix not seen in stream +CVE-2021-46959: Fix not seen in stream +CVE-2021-46960: Fix not seen in stream +CVE-2021-46961: Fix not seen in stream +CVE-2021-46962: Fix not seen in stream +CVE-2021-46963: Fix not seen in stream +CVE-2021-46965: Fix not seen in stream +CVE-2021-46966: Fix not seen in stream +CVE-2021-46969: Fix not seen in stream +CVE-2021-46970: Fix not seen in stream +CVE-2021-46971: Fix not seen in stream +CVE-2021-46974: Fix not seen in stream +CVE-2021-46977: Fix not seen in stream +CVE-2021-46981: Fix not seen in stream +CVE-2021-46982: Fix not seen in stream +CVE-2021-46984: Fix not seen in stream +CVE-2021-46988: Fix not seen in stream +CVE-2021-46989: Fix not seen in stream +CVE-2021-46991: Fix not seen in stream +CVE-2021-46992: Fix not seen in stream +CVE-2021-46993: Fix not seen in stream +CVE-2021-46994: Fix not seen in stream +CVE-2021-46998: Fix not seen in stream +CVE-2021-47001: Fix not seen in stream +CVE-2021-47004: Fix not seen in stream +CVE-2021-47005: Fix not seen in stream +CVE-2021-47006: Fix not seen in stream +CVE-2021-47010: Fix not seen in stream +CVE-2021-47012: Fix not seen in stream +CVE-2021-47013: Fix not seen in stream +CVE-2021-47015: Fix not seen in stream +CVE-2021-47016: Fix not seen in stream +CVE-2021-47018: Fix not seen in stream +CVE-2021-47020: Fix not seen in stream +CVE-2021-47024: Fix not seen in stream +CVE-2021-47028: Fix not seen in stream +CVE-2021-47034: Fix not seen in stream +CVE-2021-47041: Fix not seen in stream +CVE-2021-47043: Fix not seen in stream +CVE-2021-47046: Fix not seen in stream +CVE-2021-47049: Fix not seen in stream +CVE-2021-47051: Fix not seen in stream +CVE-2021-47052: Fix not seen in stream +CVE-2021-47054: Fix not seen in stream +CVE-2021-47056: Fix not seen in stream +CVE-2021-47059: Fix not seen in stream +CVE-2021-47063: Fix not seen in stream +CVE-2021-47065: Fix not seen in stream +CVE-2021-47067: Fix not seen in stream +CVE-2021-47070: Fix not seen in stream +CVE-2021-47071: Fix not seen in stream +CVE-2021-47073: Fix not seen in stream +CVE-2021-47074: Fix not seen in stream +CVE-2021-47075: Fix not seen in stream +CVE-2021-47076: Fix not seen in stream +CVE-2021-47077: Fix not seen in stream +CVE-2021-47078: Fix not seen in stream +CVE-2021-47082: Fix not seen in stream +CVE-2021-47083: Fix not seen in stream +CVE-2021-47086: Fix not seen in stream +CVE-2021-47095: Fix not seen in stream +CVE-2021-47100: Fix not seen in stream +CVE-2021-47101: Fix not seen in stream +CVE-2021-47103: Fix not seen in stream +CVE-2021-47105: Fix not seen in stream +CVE-2021-47109: Fix not seen in stream +CVE-2021-47110: Fix not seen in stream +CVE-2021-47111: Fix not seen in stream +CVE-2021-47112: Fix not seen in stream +CVE-2021-47113: Fix not seen in stream +CVE-2021-47114: Fix not seen in stream +CVE-2021-47116: Fix not seen in stream +CVE-2021-47117: Fix not seen in stream +CVE-2021-47118: Fix not seen in stream +CVE-2021-47119: Fix not seen in stream +CVE-2021-47120: Fix not seen in stream +CVE-2021-47121: Fix not seen in stream +CVE-2021-47122: Fix not seen in stream +CVE-2021-47124: Fix not seen in stream +CVE-2021-47125: Fix not seen in stream +CVE-2021-47126: Fix not seen in stream +CVE-2021-47128: Fix not seen in stream +CVE-2021-47129: Fix not seen in stream +CVE-2021-47131: Fix not seen in stream +CVE-2021-47133: Fix not seen in stream +CVE-2021-47135: Fix not seen in stream +CVE-2021-47136: Fix not seen in stream +CVE-2021-47137: Fix not seen in stream +CVE-2021-47138: Fix not seen in stream +CVE-2021-47140: Fix not seen in stream +CVE-2021-47141: Fix not seen in stream +CVE-2021-47142: Fix not seen in stream +CVE-2021-47143: Fix not seen in stream +CVE-2021-47144: Fix not seen in stream +CVE-2021-47145: Fix not seen in stream +CVE-2021-47146: Fix not seen in stream +CVE-2021-47147: Fix not seen in stream +CVE-2021-47149: Fix not seen in stream +CVE-2021-47150: Fix not seen in stream +CVE-2021-47151: Fix not seen in stream +CVE-2021-47153: Fix not seen in stream +CVE-2021-47158: Fix not seen in stream +CVE-2021-47159: Fix not seen in stream +CVE-2021-47160: Fix not seen in stream +CVE-2021-47161: Fix not seen in stream +CVE-2021-47162: Fix not seen in stream +CVE-2021-47163: Fix not seen in stream +CVE-2021-47165: Fix not seen in stream +CVE-2021-47166: Fix not seen in stream +CVE-2021-47167: Fix not seen in stream +CVE-2021-47168: Fix not seen in stream +CVE-2021-47169: Fix not seen in stream +CVE-2021-47170: Fix not seen in stream +CVE-2021-47171: Fix not seen in stream +CVE-2021-47172: Fix not seen in stream +CVE-2021-47173: Fix not seen in stream +CVE-2021-47175: Fix not seen in stream +CVE-2021-47177: Fix not seen in stream +CVE-2021-47179: Fix not seen in stream +CVE-2021-47180: Fix not seen in stream CVE-2022-0001: Fix not seen in stream CVE-2022-0002: Fix not seen in stream CVE-2022-0168: Fix not seen in stream @@ -594,6 +750,10 @@ CVE-2022-47520: Fix not seen in stream CVE-2022-47929: Fix not seen in stream CVE-2022-47946: Fix not seen in stream CVE-2022-48619: Fix not seen in stream +CVE-2022-48626: Fix not seen in stream +CVE-2022-48627: Fix not seen in stream +CVE-2022-48628: Fix not seen in stream +CVE-2022-48629: Fix not seen in stream CVE-2023-0045: Fix not seen in stream CVE-2023-0047: Fix not seen in stream CVE-2023-0160: Fix not seen in stream @@ -669,6 +829,7 @@ CVE-2023-28327: Fix not seen in stream CVE-2023-28328: Fix not seen in stream CVE-2023-28466: Fix not seen in stream CVE-2023-2860: Fix not seen in stream +CVE-2023-28746: Fix not seen in stream CVE-2023-28772: Fix not seen in stream CVE-2023-2985: Fix not seen in stream CVE-2023-3006: Fix not seen in stream @@ -744,7 +905,7 @@ CVE-2023-4622: Fix not seen in stream CVE-2023-4623: Fix not seen in stream CVE-2023-46343: Fix not seen in stream CVE-2023-46838: Fix not seen in stream -CVE-2023-47233: Fix unknown +CVE-2023-47233: Fix not seen in stream CVE-2023-4881: Fix not seen in stream CVE-2023-4921: Fix not seen in stream CVE-2023-50431: Fix not seen in stream @@ -769,18 +930,116 @@ CVE-2023-52448: Fix not seen in stream CVE-2023-52449: Fix not seen in stream CVE-2023-52451: Fix not seen in stream CVE-2023-52454: Fix not seen in stream -CVE-2023-52456: Fix not seen in stream -CVE-2023-52457: Fix not seen in stream CVE-2023-52458: Fix not seen in stream CVE-2023-52464: Fix not seen in stream +CVE-2023-52469: Fix not seen in stream +CVE-2023-52470: Fix not seen in stream +CVE-2023-52474: Fix not seen in stream +CVE-2023-52475: Fix not seen in stream +CVE-2023-52476: Fix not seen in stream +CVE-2023-52477: Fix not seen in stream +CVE-2023-52478: Fix not seen in stream +CVE-2023-52479: Fix not seen in stream +CVE-2023-52480: Fix not seen in stream +CVE-2023-52481: Fix not seen in stream +CVE-2023-52482: Fix not seen in stream +CVE-2023-52484: Fix not seen in stream +CVE-2023-52485: Fix not seen in stream +CVE-2023-52486: Fix not seen in stream +CVE-2023-52488: Fix not seen in stream +CVE-2023-52489: Fix not seen in stream +CVE-2023-52491: Fix not seen in stream +CVE-2023-52497: Fix not seen in stream +CVE-2023-52498: Fix not seen in stream +CVE-2023-52500: Fix not seen in stream +CVE-2023-52501: Fix not seen in stream +CVE-2023-52502: Fix not seen in stream +CVE-2023-52504: Fix not seen in stream +CVE-2023-52506: Fix not seen in stream +CVE-2023-52507: Fix not seen in stream +CVE-2023-52508: Fix not seen in stream +CVE-2023-52509: Fix not seen in stream +CVE-2023-52510: Fix not seen in stream +CVE-2023-52511: Fix not seen in stream +CVE-2023-52513: Fix not seen in stream +CVE-2023-52515: Fix not seen in stream +CVE-2023-52516: Fix not seen in stream +CVE-2023-52517: Fix not seen in stream +CVE-2023-52519: Fix not seen in stream +CVE-2023-52522: Fix not seen in stream +CVE-2023-52527: Fix not seen in stream +CVE-2023-52528: Fix not seen in stream +CVE-2023-52530: Fix not seen in stream +CVE-2023-52531: Fix not seen in stream +CVE-2023-52532: Fix not seen in stream +CVE-2023-52559: Fix not seen in stream +CVE-2023-52561: Fix not seen in stream +CVE-2023-52563: Fix not seen in stream +CVE-2023-52565: Fix not seen in stream +CVE-2023-52566: Fix not seen in stream +CVE-2023-52568: Fix not seen in stream +CVE-2023-52569: Fix not seen in stream +CVE-2023-52571: Fix not seen in stream +CVE-2023-52572: Fix not seen in stream +CVE-2023-52573: Fix not seen in stream +CVE-2023-52574: Fix not seen in stream +CVE-2023-52578: Fix not seen in stream +CVE-2023-52583: Fix not seen in stream +CVE-2023-52584: Fix not seen in stream +CVE-2023-52585: Fix not seen in stream +CVE-2023-52586: Fix not seen in stream +CVE-2023-52587: Fix not seen in stream +CVE-2023-52588: Fix not seen in stream +CVE-2023-52589: Fix not seen in stream +CVE-2023-52590: Fix not seen in stream +CVE-2023-52591: Fix not seen in stream +CVE-2023-52593: Fix not seen in stream +CVE-2023-52594: Fix not seen in stream +CVE-2023-52595: Fix not seen in stream +CVE-2023-52596: Fix not seen in stream +CVE-2023-52597: Fix not seen in stream +CVE-2023-52598: Fix not seen in stream +CVE-2023-52599: Fix not seen in stream +CVE-2023-52600: Fix not seen in stream +CVE-2023-52601: Fix not seen in stream +CVE-2023-52602: Fix not seen in stream +CVE-2023-52603: Fix not seen in stream +CVE-2023-52604: Fix not seen in stream +CVE-2023-52606: Fix not seen in stream +CVE-2023-52607: Fix not seen in stream +CVE-2023-52609: Fix not seen in stream +CVE-2023-52610: Fix not seen in stream +CVE-2023-52612: Fix not seen in stream +CVE-2023-52614: Fix not seen in stream +CVE-2023-52615: Fix not seen in stream +CVE-2023-52617: Fix not seen in stream +CVE-2023-52618: Fix not seen in stream +CVE-2023-52619: Fix not seen in stream +CVE-2023-52620: Fix not seen in stream +CVE-2023-52621: Fix not seen in stream +CVE-2023-52622: Fix not seen in stream +CVE-2023-52623: Fix not seen in stream +CVE-2023-52624: Fix not seen in stream +CVE-2023-52625: Fix not seen in stream +CVE-2023-52628: Fix not seen in stream +CVE-2023-52629: Fix not seen in stream +CVE-2023-52632: Fix not seen in stream +CVE-2023-52633: Fix not seen in stream +CVE-2023-52634: Fix not seen in stream +CVE-2023-52635: Fix not seen in stream +CVE-2023-52637: Fix not seen in stream +CVE-2023-52638: Fix not seen in stream +CVE-2023-52639: Fix not seen in stream +CVE-2023-52640: Fix not seen in stream +CVE-2023-52641: Fix not seen in stream CVE-2023-5717: Fix not seen in stream CVE-2023-6040: Fix not seen in stream CVE-2023-6121: Fix not seen in stream CVE-2023-6240: Fix unknown -CVE-2023-6270: Fix unknown -CVE-2023-6356: Fix unknown +CVE-2023-6270: Fix not seen in stream +CVE-2023-6356: Fix not seen in stream CVE-2023-6535: Fix unknown -CVE-2023-6536: Fix unknown +CVE-2023-6536: Fix not seen in stream CVE-2023-6546: Fix not seen in stream CVE-2023-6560: Fix not seen in stream CVE-2023-6606: Fix not seen in stream @@ -788,7 +1047,7 @@ CVE-2023-6610: Fix not seen in stream CVE-2023-6915: Fix not seen in stream CVE-2023-6931: Fix not seen in stream CVE-2023-6932: Fix not seen in stream -CVE-2023-7042: Fix unknown +CVE-2023-7042: Fix not seen in stream CVE-2023-7192: Fix not seen in stream CVE-2024-0340: Fix not seen in stream CVE-2024-0564: Fix unknown @@ -798,15 +1057,16 @@ CVE-2024-0607: Fix not seen in stream CVE-2024-0641: Fix not seen in stream CVE-2024-0646: Fix not seen in stream CVE-2024-0775: Fix not seen in stream -CVE-2024-0841: Fix unknown +CVE-2024-0841: Fix not seen in stream CVE-2024-1086: Fix not seen in stream CVE-2024-1151: Fix not seen in stream CVE-2024-1312: Fix not seen in stream CVE-2024-21803: Fix unknown -CVE-2024-22099: Fix unknown +CVE-2024-2193: Fix unknown +CVE-2024-22099: Fix not seen in stream CVE-2024-22386: Fix unknown -CVE-2024-23196: Fix unknown -CVE-2024-23307: Fix unknown +CVE-2024-23196: Fix not seen in stream +CVE-2024-23307: Fix not seen in stream CVE-2024-23848: Fix unknown CVE-2024-23849: Fix not seen in stream CVE-2024-23851: Fix not seen in stream @@ -815,7 +1075,7 @@ CVE-2024-24857: Fix unknown CVE-2024-24858: Fix unknown CVE-2024-24859: Fix unknown CVE-2024-24860: Fix not seen in stream -CVE-2024-24861: Fix unknown +CVE-2024-24861: Fix not seen in stream CVE-2024-24864: Fix unknown CVE-2024-25739: Fix unknown CVE-2024-25740: Fix unknown @@ -824,13 +1084,125 @@ CVE-2024-25744: Fix not seen in stream CVE-2024-26584: Fix not seen in stream CVE-2024-26585: Fix not seen in stream CVE-2024-26586: Fix not seen in stream -CVE-2024-26587: Fix not seen in stream -CVE-2024-26588: Fix not seen in stream CVE-2024-26589: Fix not seen in stream -CVE-2024-26591: Fix not seen in stream CVE-2024-26592: Fix not seen in stream CVE-2024-26593: Fix not seen in stream CVE-2024-26594: Fix not seen in stream CVE-2024-26595: Fix not seen in stream CVE-2024-26597: Fix not seen in stream CVE-2024-26598: Fix not seen in stream +CVE-2024-26600: Fix not seen in stream +CVE-2024-26602: Fix not seen in stream +CVE-2024-26606: Fix not seen in stream +CVE-2024-26607: Fix not seen in stream +CVE-2024-26610: Fix not seen in stream +CVE-2024-26614: Fix not seen in stream +CVE-2024-26615: Fix not seen in stream +CVE-2024-26622: Fix not seen in stream +CVE-2024-26623: Fix not seen in stream +CVE-2024-26625: Fix not seen in stream +CVE-2024-26627: Fix not seen in stream +CVE-2024-26633: Fix not seen in stream +CVE-2024-26635: Fix not seen in stream +CVE-2024-26636: Fix not seen in stream +CVE-2024-26640: Fix not seen in stream +CVE-2024-26641: Fix not seen in stream +CVE-2024-26642: Fix not seen in stream +CVE-2024-26644: Fix not seen in stream +CVE-2024-26645: Fix not seen in stream +CVE-2024-26646: Fix not seen in stream +CVE-2024-26647: Fix not seen in stream +CVE-2024-26648: Fix not seen in stream +CVE-2024-26650: Fix not seen in stream +CVE-2024-26651: Fix not seen in stream +CVE-2024-26654: Fix not seen in stream +CVE-2024-26655: Fix not seen in stream +CVE-2024-26656: Fix not seen in stream +CVE-2024-26658: Fix not seen in stream +CVE-2024-26659: Fix not seen in stream +CVE-2024-26663: Fix not seen in stream +CVE-2024-26664: Fix not seen in stream +CVE-2024-26668: Fix not seen in stream +CVE-2024-26669: Fix not seen in stream +CVE-2024-26671: Fix not seen in stream +CVE-2024-26672: Fix not seen in stream +CVE-2024-26673: Fix not seen in stream +CVE-2024-26675: Fix not seen in stream +CVE-2024-26676: Fix not seen in stream +CVE-2024-26677: Fix not seen in stream +CVE-2024-26679: Fix not seen in stream +CVE-2024-26680: Fix not seen in stream +CVE-2024-26684: Fix not seen in stream +CVE-2024-26685: Fix not seen in stream +CVE-2024-26686: Fix not seen in stream +CVE-2024-26687: Fix not seen in stream +CVE-2024-26688: Fix not seen in stream +CVE-2024-26689: Fix not seen in stream +CVE-2024-26691: Fix not seen in stream +CVE-2024-26696: Fix not seen in stream +CVE-2024-26697: Fix not seen in stream +CVE-2024-26699: Fix not seen in stream +CVE-2024-26700: Fix not seen in stream +CVE-2024-26702: Fix not seen in stream +CVE-2024-26704: Fix not seen in stream +CVE-2024-26706: Fix not seen in stream +CVE-2024-26712: Fix not seen in stream +CVE-2024-26713: Fix not seen in stream +CVE-2024-26715: Fix not seen in stream +CVE-2024-26719: Fix not seen in stream +CVE-2024-26720: Fix not seen in stream +CVE-2024-26726: Fix not seen in stream +CVE-2024-26733: Fix not seen in stream +CVE-2024-26735: Fix not seen in stream +CVE-2024-26736: Fix not seen in stream +CVE-2024-26738: Fix not seen in stream +CVE-2024-26739: Fix not seen in stream +CVE-2024-26740: Fix not seen in stream +CVE-2024-26743: Fix not seen in stream +CVE-2024-26744: Fix not seen in stream +CVE-2024-26745: Fix not seen in stream +CVE-2024-26747: Fix not seen in stream +CVE-2024-26748: Fix not seen in stream +CVE-2024-26749: Fix not seen in stream +CVE-2024-26751: Fix not seen in stream +CVE-2024-26752: Fix not seen in stream +CVE-2024-26754: Fix not seen in stream +CVE-2024-26756: Fix not seen in stream +CVE-2024-26757: Fix not seen in stream +CVE-2024-26758: Fix not seen in stream +CVE-2024-26759: Fix not seen in stream +CVE-2024-26763: Fix not seen in stream +CVE-2024-26764: Fix not seen in stream +CVE-2024-26765: Fix not seen in stream +CVE-2024-26766: Fix not seen in stream +CVE-2024-26767: Fix not seen in stream +CVE-2024-26768: Fix not seen in stream +CVE-2024-26769: Fix not seen in stream +CVE-2024-26770: Fix not seen in stream +CVE-2024-26771: Fix not seen in stream +CVE-2024-26772: Fix not seen in stream +CVE-2024-26773: Fix not seen in stream +CVE-2024-26774: Fix not seen in stream +CVE-2024-26775: Fix not seen in stream +CVE-2024-26776: Fix not seen in stream +CVE-2024-26777: Fix not seen in stream +CVE-2024-26778: Fix not seen in stream +CVE-2024-26779: Fix not seen in stream +CVE-2024-26784: Fix not seen in stream +CVE-2024-26787: Fix not seen in stream +CVE-2024-26788: Fix not seen in stream +CVE-2024-26789: Fix not seen in stream +CVE-2024-26790: Fix not seen in stream +CVE-2024-26791: Fix not seen in stream +CVE-2024-26793: Fix not seen in stream +CVE-2024-26795: Fix not seen in stream +CVE-2024-26797: Fix not seen in stream +CVE-2024-26798: Fix not seen in stream +CVE-2024-26801: Fix not seen in stream +CVE-2024-26802: Fix not seen in stream +CVE-2024-26803: Fix not seen in stream +CVE-2024-26804: Fix not seen in stream +CVE-2024-26805: Fix not seen in stream +CVE-2024-26806: Fix not seen in stream +CVE-2024-26808: Fix not seen in stream +CVE-2024-26809: Fix not seen in stream diff --git a/data/5.5/5.5_security.txt b/data/5.5/5.5_security.txt index 326e72523..0116147ed 100644 --- a/data/5.5/5.5_security.txt +++ b/data/5.5/5.5_security.txt @@ -109,6 +109,7 @@ Outstanding CVEs: CVE-2019-19814: (unk) CVE-2019-20794: (unk) CVE-2019-20810: (unk) media: go7007: fix a miss of snd_card_free + CVE-2019-25162: (unk) i2c: Fix a potential use after free CVE-2020-0255: (unk) selinux: properly handle multiple messages in selinux_netlink_send() CVE-2020-0347: (unk) CVE-2020-0423: (unk) binder: fix UAF when releasing todo list @@ -240,6 +241,14 @@ Outstanding CVEs: CVE-2020-36691: (unk) netlink: limit recursion depth in policy validation CVE-2020-36694: (unk) netfilter: x_tables: Switch synchronization to RCU CVE-2020-36766: (unk) cec-api: prevent leaking memory through hole in structure + CVE-2020-36775: (unk) f2fs: fix to avoid potential deadlock + CVE-2020-36777: (unk) media: dvbdev: Fix memory leak in dvb_media_device_free() + CVE-2020-36780: (unk) i2c: sprd: fix reference leak when pm_runtime_get_sync fails + CVE-2020-36781: (unk) i2c: imx: fix reference leak when pm_runtime_get_sync fails + CVE-2020-36782: (unk) i2c: imx-lpi2c: fix reference leak when pm_runtime_get_sync fails + CVE-2020-36783: (unk) i2c: img-scb: fix reference leak when pm_runtime_get_sync fails + CVE-2020-36784: (unk) i2c: cadence: fix reference leak when pm_runtime_get_sync fails + CVE-2020-36787: (unk) media: aspeed: fix clock handling logic CVE-2020-3702: (unk) ath: Use safer key clearing with key cache entries CVE-2020-4788: (unk) powerpc/64s: flush L1D on kernel entry CVE-2020-8694: (unk) powercap: restrict energy meter to root access @@ -405,6 +414,153 @@ Outstanding CVEs: CVE-2021-45485: (unk) ipv6: use prandom_u32() for ID generation CVE-2021-45486: (unk) inet: use bigger hash table for IP ID generation CVE-2021-45868: (unk) quota: check block number when reading the block in quota file + CVE-2021-46904: (unk) net: hso: fix null-ptr-deref during tty device unregistration + CVE-2021-46906: (unk) HID: usbhid: fix info leak in hid_submit_ctrl + CVE-2021-46908: (unk) bpf: Use correct permission flag for mixed signed bounds arithmetic + CVE-2021-46909: (unk) ARM: footbridge: fix PCI interrupt mapping + CVE-2021-46915: (unk) netfilter: nft_limit: avoid possible divide error in nft_limit_init + CVE-2021-46921: (unk) locking/qrwlock: Fix ordering in queued_write_lock_slowpath() + CVE-2021-46924: (unk) NFC: st21nfca: Fix memory leak in device probe and remove + CVE-2021-46925: (unk) net/smc: fix kernel panic caused by race of smc_sock + CVE-2021-46926: (unk) ALSA: hda: intel-sdw-acpi: harden detection of controller + CVE-2021-46928: (unk) parisc: Clear stale IIR value on instruction access rights trap + CVE-2021-46929: (unk) sctp: use call_rcu to free endpoint + CVE-2021-46930: (unk) usb: mtu3: fix list_head check warning + CVE-2021-46932: (unk) Input: appletouch - initialize work before device registration + CVE-2021-46933: (unk) usb: gadget: f_fs: Clear ffs_eventfd in ffs_data_clear. + CVE-2021-46934: (unk) i2c: validate user data in compat ioctl + CVE-2021-46935: (unk) binder: fix async_free_space accounting for empty parcels + CVE-2021-46936: (unk) net: fix use-after-free in tw_timer_handler + CVE-2021-46938: (unk) dm rq: fix double free of blk_mq_tag_set in dev remove after table load fails + CVE-2021-46939: (unk) tracing: Restructure trace_clock_global() to never block + CVE-2021-46941: (unk) usb: dwc3: core: Do core softreset when switch mode + CVE-2021-46943: (unk) media: staging/intel-ipu3: Fix set_fmt error handling + CVE-2021-46944: (unk) media: staging/intel-ipu3: Fix memory leak in imu_fmt + CVE-2021-46950: (unk) md/raid1: properly indicate failure when ending a failed write request + CVE-2021-46951: (unk) tpm: efi: Use local variable for calculating final log size + CVE-2021-46952: (unk) NFS: fs_context: validate UDP retrans to prevent shift out-of-bounds + CVE-2021-46953: (unk) ACPI: GTDT: Don't corrupt interrupt mappings on watchdow probe failure + CVE-2021-46955: (unk) openvswitch: fix stack OOB read while fragmenting IPv4 packets + CVE-2021-46956: (unk) virtiofs: fix memory leak in virtio_fs_probe() + CVE-2021-46959: (unk) spi: Fix use-after-free with devm_spi_alloc_* + CVE-2021-46960: (unk) cifs: Return correct error code from smb2_get_enc_key + CVE-2021-46961: (unk) irqchip/gic-v3: Do not enable irqs when handling spurious interrups + CVE-2021-46962: (unk) mmc: uniphier-sd: Fix a resource leak in the remove function + CVE-2021-46963: (unk) scsi: qla2xxx: Fix crash in qla2xxx_mqueuecommand() + CVE-2021-46965: (unk) mtd: physmap: physmap-bt1-rom: Fix unintentional stack access + CVE-2021-46966: (unk) ACPI: custom_method: fix potential use-after-free issue + CVE-2021-46969: (unk) bus: mhi: core: Fix invalid error returning in mhi_queue + CVE-2021-46970: (unk) bus: mhi: pci_generic: Remove WQ_MEM_RECLAIM flag from state workqueue + CVE-2021-46971: (unk) perf/core: Fix unconditional security_locked_down() call + CVE-2021-46974: (unk) bpf: Fix masking negation logic upon negative dst register + CVE-2021-46977: (unk) KVM: VMX: Disable preemption when probing user return MSRs + CVE-2021-46981: (unk) nbd: Fix NULL pointer in flush_workqueue + CVE-2021-46982: (unk) f2fs: compress: fix race condition of overwrite vs truncate + CVE-2021-46984: (unk) kyber: fix out of bounds access when preempted + CVE-2021-46988: (unk) userfaultfd: release page in error path to avoid BUG_ON + CVE-2021-46989: (unk) hfsplus: prevent corruption in shrinking truncate + CVE-2021-46991: (unk) i40e: Fix use-after-free in i40e_client_subtask() + CVE-2021-46992: (unk) netfilter: nftables: avoid overflows in nft_hash_buckets() + CVE-2021-46993: (unk) sched: Fix out-of-bound access in uclamp + CVE-2021-46994: (unk) can: mcp251x: fix resume from sleep before interface was brought up + CVE-2021-46998: (unk) ethernet:enic: Fix a use after free bug in enic_hard_start_xmit + CVE-2021-47001: (unk) xprtrdma: Fix cwnd update ordering + CVE-2021-47004: (unk) f2fs: fix to avoid touching checkpointed data in get_victim() + CVE-2021-47005: (unk) PCI: endpoint: Fix NULL pointer dereference for ->get_features() + CVE-2021-47006: (unk) ARM: 9064/1: hw_breakpoint: Do not directly check the event's overflow_handler hook + CVE-2021-47010: (unk) net: Only allow init netns to set default tcp cong to a restricted algo + CVE-2021-47012: (unk) RDMA/siw: Fix a use after free in siw_alloc_mr + CVE-2021-47013: (unk) net:emac/emac-mac: Fix a use after free in emac_mac_tx_buf_send + CVE-2021-47015: (unk) bnxt_en: Fix RX consumer index logic in the error path. + CVE-2021-47016: (unk) m68k: mvme147,mvme16x: Don't wipe PCC timer config bits + CVE-2021-47018: (unk) powerpc/64: Fix the definition of the fixmap area + CVE-2021-47020: (unk) soundwire: stream: fix memory leak in stream config error path + CVE-2021-47024: (unk) vsock/virtio: free queued packets when closing socket + CVE-2021-47028: (unk) mt76: mt7915: fix txrate reporting + CVE-2021-47034: (unk) powerpc/64s: Fix pte update for kernel memory on radix + CVE-2021-47041: (unk) nvmet-tcp: fix incorrect locking in state_change sk callback + CVE-2021-47043: (unk) media: venus: core: Fix some resource leaks in the error path of 'venus_probe()' + CVE-2021-47046: (unk) drm/amd/display: Fix off by one in hdmi_14_process_transaction() + CVE-2021-47049: (unk) Drivers: hv: vmbus: Use after free in __vmbus_open() + CVE-2021-47051: (unk) spi: fsl-lpspi: Fix PM reference leak in lpspi_prepare_xfer_hardware() + CVE-2021-47052: (unk) crypto: sa2ul - Fix memory leak of rxd + CVE-2021-47054: (unk) bus: qcom: Put child node before return + CVE-2021-47056: (unk) crypto: qat - ADF_STATUS_PF_RUNNING should be set after adf_dev_init + CVE-2021-47059: (unk) crypto: sun8i-ss - fix result memory leak on error path + CVE-2021-47063: (unk) drm: bridge/panel: Cleanup connector on bridge detach + CVE-2021-47065: (unk) rtw88: Fix array overrun in rtw_get_tx_power_params() + CVE-2021-47067: (unk) soc/tegra: regulators: Fix locking up when voltage-spread is out of range + CVE-2021-47070: (unk) uio_hv_generic: Fix another memory leak in error handling paths + CVE-2021-47071: (unk) uio_hv_generic: Fix a memory leak in error handling paths + CVE-2021-47073: (unk) platform/x86: dell-smbios-wmi: Fix oops on rmmod dell_smbios + CVE-2021-47074: (unk) nvme-loop: fix memory leak in nvme_loop_create_ctrl() + CVE-2021-47075: (unk) nvmet: fix memory leak in nvmet_alloc_ctrl() + CVE-2021-47076: (unk) RDMA/rxe: Return CQE error if invalid lkey was supplied + CVE-2021-47077: (unk) scsi: qedf: Add pointer checks in qedf_update_link_speed() + CVE-2021-47078: (unk) RDMA/rxe: Clear all QP fields if creation failed + CVE-2021-47082: (unk) tun: avoid double free in tun_free_netdev + CVE-2021-47083: (unk) pinctrl: mediatek: fix global-out-of-bounds issue + CVE-2021-47086: (unk) phonet/pep: refuse to enable an unbound pipe + CVE-2021-47095: (unk) ipmi: ssif: initialize ssif_info->client early + CVE-2021-47100: (unk) ipmi: Fix UAF when uninstall ipmi_si and ipmi_msghandler module + CVE-2021-47101: (unk) asix: fix uninit-value in asix_mdio_read() + CVE-2021-47103: (unk) inet: fully convert sk->sk_rx_dst to RCU rules + CVE-2021-47105: (unk) ice: xsk: return xsk buffers back to pool when cleaning the ring + CVE-2021-47109: (unk) neighbour: allow NUD_NOARP entries to be forced GCed + CVE-2021-47110: (unk) x86/kvm: Disable kvmclock on all CPUs on shutdown + CVE-2021-47111: (unk) xen-netback: take a reference to the RX task thread + CVE-2021-47112: (unk) x86/kvm: Teardown PV features on boot CPU as well + CVE-2021-47113: (unk) btrfs: abort in rename_exchange if we fail to insert the second ref + CVE-2021-47114: (unk) ocfs2: fix data corruption by fallocate + CVE-2021-47116: (unk) ext4: fix memory leak in ext4_mb_init_backend on error path. + CVE-2021-47117: (unk) ext4: fix bug on in ext4_es_cache_extent as ext4_split_extent_at failed + CVE-2021-47118: (unk) pid: take a reference when initializing `cad_pid` + CVE-2021-47119: (unk) ext4: fix memory leak in ext4_fill_super + CVE-2021-47120: (unk) HID: magicmouse: fix NULL-deref on disconnect + CVE-2021-47121: (unk) net: caif: fix memory leak in cfusbl_device_notify + CVE-2021-47122: (unk) net: caif: fix memory leak in caif_device_notify + CVE-2021-47124: (unk) io_uring: fix link timeout refs + CVE-2021-47125: (unk) sch_htb: fix refcount leak in htb_parent_to_leaf_offload + CVE-2021-47126: (unk) ipv6: Fix KASAN: slab-out-of-bounds Read in fib6_nh_flush_exceptions + CVE-2021-47128: (unk) bpf, lockdown, audit: Fix buggy SELinux lockdown permission checks + CVE-2021-47129: (unk) netfilter: nft_ct: skip expectations for confirmed conntrack + CVE-2021-47131: (unk) net/tls: Fix use-after-free after the TLS device goes down and up + CVE-2021-47133: (unk) HID: amd_sfh: Fix memory leak in amd_sfh_work + CVE-2021-47135: (unk) mt76: mt7921: fix possible AOOB issue in mt7921_mcu_tx_rate_report + CVE-2021-47136: (unk) net: zero-initialize tc skb extension on allocation + CVE-2021-47137: (unk) net: lantiq: fix memory corruption in RX ring + CVE-2021-47138: (unk) cxgb4: avoid accessing registers when clearing filters + CVE-2021-47140: (unk) iommu/amd: Clear DMA ops when switching domain + CVE-2021-47141: (unk) gve: Add NULL pointer checks when freeing irqs. + CVE-2021-47142: (unk) drm/amdgpu: Fix a use-after-free + CVE-2021-47143: (unk) net/smc: remove device from smcd_dev_list after failed device_add() + CVE-2021-47144: (unk) drm/amd/amdgpu: fix refcount leak + CVE-2021-47145: (unk) btrfs: do not BUG_ON in link_to_fixup_dir + CVE-2021-47146: (unk) mld: fix panic in mld_newpack() + CVE-2021-47147: (unk) ptp: ocp: Fix a resource leak in an error handling path + CVE-2021-47149: (unk) net: fujitsu: fix potential null-ptr-deref + CVE-2021-47150: (unk) net: fec: fix the potential memory leak in fec_enet_init() + CVE-2021-47151: (unk) interconnect: qcom: bcm-voter: add a missing of_node_put() + CVE-2021-47153: (unk) i2c: i801: Don't generate an interrupt on bus reset + CVE-2021-47158: (unk) net: dsa: sja1105: add error handling in sja1105_setup() + CVE-2021-47159: (unk) net: dsa: fix a crash if ->get_sset_count() fails + CVE-2021-47160: (unk) net: dsa: mt7530: fix VLAN traffic leaks + CVE-2021-47161: (unk) spi: spi-fsl-dspi: Fix a resource leak in an error handling path + CVE-2021-47162: (unk) tipc: skb_linearize the head skb when reassembling msgs + CVE-2021-47163: (unk) tipc: wait and exit until all work queues are done + CVE-2021-47165: (unk) drm/meson: fix shutdown crash when component not probed + CVE-2021-47166: (unk) NFS: Don't corrupt the value of pg_bytes_written in nfs_do_recoalesce() + CVE-2021-47167: (unk) NFS: Fix an Oopsable condition in __nfs_pageio_add_request() + CVE-2021-47168: (unk) NFS: fix an incorrect limit in filelayout_decode_layout() + CVE-2021-47169: (unk) serial: rp2: use 'request_firmware' instead of 'request_firmware_nowait' + CVE-2021-47170: (unk) USB: usbfs: Don't WARN about excessively large memory allocations + CVE-2021-47171: (unk) net: usb: fix memory leak in smsc75xx_bind + CVE-2021-47172: (unk) iio: adc: ad7124: Fix potential overflow due to non sequential channel numbers + CVE-2021-47173: (unk) misc/uss720: fix memory leak in uss720_probe + CVE-2021-47175: (unk) net/sched: fq_pie: fix OOB access in the traffic path + CVE-2021-47177: (unk) iommu/vt-d: Fix sysfs leak in alloc_iommu() + CVE-2021-47179: (unk) NFSv4: Fix a NULL pointer dereference in pnfs_mark_matching_lsegs_return() + CVE-2021-47180: (unk) NFC: nci: fix memory leak in nci_allocate_device CVE-2022-0001: (unk) x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE CVE-2022-0002: (unk) x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE CVE-2022-0168: (unk) cifs: fix NULL ptr dereference in smb2_ioctl_query_info() @@ -628,6 +784,10 @@ Outstanding CVEs: CVE-2022-47929: (unk) net: sched: disallow noqueue for qdisc classes CVE-2022-47946: (unk) io_uring: kill sqo_dead and sqo submission halting CVE-2022-48619: (unk) Input: add bounds checking to input_set_capability() + CVE-2022-48626: (unk) moxart: fix potential use-after-free on remove path + CVE-2022-48627: (unk) vt: fix memory overlapping when deleting chars in the buffer + CVE-2022-48628: (unk) ceph: drop messages from MDS when unmounting + CVE-2022-48629: (unk) crypto: qcom-rng - ensure buffer for generate is completely filled CVE-2023-0045: (unk) x86/bugs: Flush IBP in ib_prctl_set() CVE-2023-0047: (unk) mm, oom: do not trigger out_of_memory from the #PF CVE-2023-0160: (unk) bpf, sockmap: fix deadlocks in the sockhash and sockmap @@ -703,6 +863,7 @@ Outstanding CVEs: CVE-2023-28328: (unk) media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer() CVE-2023-28466: (unk) net: tls: fix possible race condition between do_tls_getsockopt_conf() and do_tls_setsockopt_conf() CVE-2023-2860: (unk) ipv6: sr: fix out-of-bounds read when setting HMAC data. + CVE-2023-28746: (unk) x86/mmio: Disable KVM mitigation when X86_FEATURE_CLEAR_CPU_BUF is set CVE-2023-28772: (unk) seq_buf: Fix overflow in seq_buf_putmem_hex() CVE-2023-2985: (unk) fs: hfsplus: fix UAF issue in hfsplus_put_super CVE-2023-3006: (unk) arm64: Add AMPERE1 to the Spectre-BHB affected list @@ -778,7 +939,7 @@ Outstanding CVEs: CVE-2023-4623: (unk) net/sched: sch_hfsc: Ensure inner classes have fsc curve CVE-2023-46343: (unk) nfc: nci: fix possible NULL pointer dereference in send_acknowledge() CVE-2023-46838: (unk) xen-netback: don't produce zero-size SKB frags - CVE-2023-47233: (unk) + CVE-2023-47233: (unk) wifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach CVE-2023-4881: (unk) netfilter: nftables: exthdr: fix 4-byte stack OOB write CVE-2023-4921: (unk) net: sched: sch_qfq: Fix UAF in qfq_dequeue() CVE-2023-50431: (unk) accel/habanalabs: fix information leak in sec_attest_info() @@ -803,18 +964,116 @@ Outstanding CVEs: CVE-2023-52449: (unk) mtd: Fix gluebi NULL pointer dereference caused by ftl notifier CVE-2023-52451: (unk) powerpc/pseries/memhp: Fix access beyond end of drmem array CVE-2023-52454: (unk) nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length - CVE-2023-52456: (unk) serial: imx: fix tx statemachine deadlock - CVE-2023-52457: (unk) serial: 8250: omap: Don't skip resource freeing if pm_runtime_resume_and_get() failed CVE-2023-52458: (unk) block: add check that partition length needs to be aligned with block size CVE-2023-52464: (unk) EDAC/thunderx: Fix possible out-of-bounds string access + CVE-2023-52469: (unk) drivers/amd/pm: fix a use-after-free in kv_parse_power_table + CVE-2023-52470: (unk) drm/radeon: check the alloc_workqueue return value in radeon_crtc_init() + CVE-2023-52474: (unk) IB/hfi1: Fix bugs with non-PAGE_SIZE-end multi-iovec user SDMA requests + CVE-2023-52475: (unk) Input: powermate - fix use-after-free in powermate_config_complete + CVE-2023-52476: (unk) perf/x86/lbr: Filter vsyscall addresses + CVE-2023-52477: (unk) usb: hub: Guard against accesses to uninitialized BOS descriptors + CVE-2023-52478: (unk) HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect + CVE-2023-52479: (unk) ksmbd: fix uaf in smb20_oplock_break_ack + CVE-2023-52480: (unk) ksmbd: fix race condition between session lookup and expire + CVE-2023-52481: (unk) arm64: errata: Add Cortex-A520 speculative unprivileged load workaround + CVE-2023-52482: (unk) x86/srso: Add SRSO mitigation for Hygon processors + CVE-2023-52484: (unk) iommu/arm-smmu-v3: Fix soft lockup triggered by arm_smmu_mm_invalidate_range + CVE-2023-52485: (unk) drm/amd/display: Wake DMCUB before sending a command + CVE-2023-52486: (unk) drm: Don't unref the same fb many times by mistake due to deadlock handling + CVE-2023-52488: (unk) serial: sc16is7xx: convert from _raw_ to _noinc_ regmap functions for FIFO + CVE-2023-52489: (unk) mm/sparsemem: fix race in accessing memory_section->usage + CVE-2023-52491: (unk) media: mtk-jpeg: Fix use after free bug due to error path handling in mtk_jpeg_dec_device_run + CVE-2023-52497: (unk) erofs: fix lz4 inplace decompression + CVE-2023-52498: (unk) PM: sleep: Fix possible deadlocks in core system-wide PM code + CVE-2023-52500: (unk) scsi: pm80xx: Avoid leaking tags when processing OPC_INB_SET_CONTROLLER_CONFIG command + CVE-2023-52501: (unk) ring-buffer: Do not attempt to read past "commit" + CVE-2023-52502: (unk) net: nfc: fix races in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn() + CVE-2023-52504: (unk) x86/alternatives: Disable KASAN in apply_alternatives() + CVE-2023-52506: (unk) LoongArch: Set all reserved memblocks on Node#0 at initialization + CVE-2023-52507: (unk) nfc: nci: assert requested protocol is valid + CVE-2023-52508: (unk) nvme-fc: Prevent null pointer dereference in nvme_fc_io_getuuid() + CVE-2023-52509: (unk) ravb: Fix use-after-free issue in ravb_tx_timeout_work() + CVE-2023-52510: (unk) ieee802154: ca8210: Fix a potential UAF in ca8210_probe + CVE-2023-52511: (unk) spi: sun6i: reduce DMA RX transfer width to single byte + CVE-2023-52513: (unk) RDMA/siw: Fix connection failure handling + CVE-2023-52515: (unk) RDMA/srp: Do not call scsi_done() from srp_abort() + CVE-2023-52516: (unk) dma-debug: don't call __dma_entry_alloc_check_leak() under free_entries_lock + CVE-2023-52517: (unk) spi: sun6i: fix race between DMA RX transfer completion and RX FIFO drain + CVE-2023-52519: (unk) HID: intel-ish-hid: ipc: Disable and reenable ACPI GPE bit + CVE-2023-52522: (unk) net: fix possible store tearing in neigh_periodic_work() + CVE-2023-52527: (unk) ipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data() + CVE-2023-52528: (unk) net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg + CVE-2023-52530: (unk) wifi: mac80211: fix potential key use-after-free + CVE-2023-52531: (unk) wifi: iwlwifi: mvm: Fix a memory corruption issue + CVE-2023-52532: (unk) net: mana: Fix TX CQE error handling + CVE-2023-52559: (unk) iommu/vt-d: Avoid memory allocation in iommu_suspend() + CVE-2023-52561: (unk) arm64: dts: qcom: sdm845-db845c: Mark cont splash memory region as reserved + CVE-2023-52563: (unk) drm/meson: fix memory leak on ->hpd_notify callback + CVE-2023-52565: (unk) media: uvcvideo: Fix OOB read + CVE-2023-52566: (unk) nilfs2: fix potential use after free in nilfs_gccache_submit_read_data() + CVE-2023-52568: (unk) x86/sgx: Resolves SECS reclaim vs. page fault for EAUG race + CVE-2023-52569: (unk) btrfs: remove BUG() after failure to insert delayed dir index item + CVE-2023-52571: (unk) power: supply: rk817: Fix node refcount leak + CVE-2023-52572: (unk) cifs: Fix UAF in cifs_demultiplex_thread() + CVE-2023-52573: (unk) net: rds: Fix possible NULL-pointer dereference + CVE-2023-52574: (unk) team: fix null-ptr-deref when team device type is changed + CVE-2023-52578: (unk) net: bridge: use DEV_STATS_INC() + CVE-2023-52583: (unk) ceph: fix deadlock or deadcode of misusing dget() + CVE-2023-52584: (unk) spmi: mediatek: Fix UAF on device remove + CVE-2023-52585: (unk) drm/amdgpu: Fix possible NULL dereference in amdgpu_ras_query_error_status_helper() + CVE-2023-52586: (unk) drm/msm/dpu: Add mutex lock in control vblank irq + CVE-2023-52587: (unk) IB/ipoib: Fix mcast list locking + CVE-2023-52588: (unk) f2fs: fix to tag gcing flag on page during block migration + CVE-2023-52589: (unk) media: rkisp1: Fix IRQ disable race issue + CVE-2023-52590: (unk) ocfs2: Avoid touching renamed directory if parent does not change + CVE-2023-52591: (unk) reiserfs: Avoid touching renamed directory if parent does not change + CVE-2023-52593: (unk) wifi: wfx: fix possible NULL pointer dereference in wfx_set_mfp_ap() + CVE-2023-52594: (unk) wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus() + CVE-2023-52595: (unk) wifi: rt2x00: restart beacon queue when hardware reset + CVE-2023-52596: (unk) sysctl: Fix out of bounds access for empty sysctl registers + CVE-2023-52597: (unk) KVM: s390: fix setting of fpc register + CVE-2023-52598: (unk) s390/ptrace: handle setting of fpc register correctly + CVE-2023-52599: (unk) jfs: fix array-index-out-of-bounds in diNewExt + CVE-2023-52600: (unk) jfs: fix uaf in jfs_evict_inode + CVE-2023-52601: (unk) jfs: fix array-index-out-of-bounds in dbAdjTree + CVE-2023-52602: (unk) jfs: fix slab-out-of-bounds Read in dtSearch + CVE-2023-52603: (unk) UBSAN: array-index-out-of-bounds in dtSplitRoot + CVE-2023-52604: (unk) FS:JFS:UBSAN:array-index-out-of-bounds in dbAdjTree + CVE-2023-52606: (unk) powerpc/lib: Validate size for vector operations + CVE-2023-52607: (unk) powerpc/mm: Fix null-pointer dereference in pgtable_cache_add + CVE-2023-52609: (unk) binder: fix race between mmput() and do_exit() + CVE-2023-52610: (unk) net/sched: act_ct: fix skb leak and crash on ooo frags + CVE-2023-52612: (unk) crypto: scomp - fix req->dst buffer overflow + CVE-2023-52614: (unk) PM / devfreq: Fix buffer overflow in trans_stat_show + CVE-2023-52615: (unk) hwrng: core - Fix page fault dead lock on mmap-ed hwrng + CVE-2023-52617: (unk) PCI: switchtec: Fix stdev_release() crash after surprise hot remove + CVE-2023-52618: (unk) block/rnbd-srv: Check for unlikely string overflow + CVE-2023-52619: (unk) pstore/ram: Fix crash when setting number of cpus to an odd number + CVE-2023-52620: (unk) netfilter: nf_tables: disallow timeout for anonymous sets + CVE-2023-52621: (unk) bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers + CVE-2023-52622: (unk) ext4: avoid online resizing failures due to oversized flex bg + CVE-2023-52623: (unk) SUNRPC: Fix a suspicious RCU usage warning + CVE-2023-52624: (unk) drm/amd/display: Wake DMCUB before executing GPINT commands + CVE-2023-52625: (unk) drm/amd/display: Refactor DMCUB enter/exit idle interface + CVE-2023-52628: (unk) netfilter: nftables: exthdr: fix 4-byte stack OOB write + CVE-2023-52629: (unk) sh: push-switch: Reorder cleanup operations to avoid use-after-free bug + CVE-2023-52632: (unk) drm/amdkfd: Fix lock dependency warning with srcu + CVE-2023-52633: (unk) um: time-travel: fix time corruption + CVE-2023-52634: (unk) drm/amd/display: Fix disable_otg_wa logic + CVE-2023-52635: (unk) PM / devfreq: Synchronize devfreq_monitor_[start/stop] + CVE-2023-52637: (unk) can: j1939: Fix UAF in j1939_sk_match_filter during setsockopt(SO_J1939_FILTER) + CVE-2023-52638: (unk) can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock + CVE-2023-52639: (unk) KVM: s390: vsie: fix race during shadow creation + CVE-2023-52640: (unk) fs/ntfs3: Fix oob in ntfs_listxattr + CVE-2023-52641: (unk) fs/ntfs3: Add NULL ptr dereference checking at the end of attr_allocate_frame() CVE-2023-5717: (unk) perf: Disallow mis-matched inherited group reads CVE-2023-6040: (unk) netfilter: nf_tables: Reject tables of unsupported family CVE-2023-6121: (unk) nvmet: nul-terminate the NQNs passed in the connect command CVE-2023-6240: (unk) - CVE-2023-6270: (unk) - CVE-2023-6356: (unk) + CVE-2023-6270: (unk) aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts + CVE-2023-6356: (unk) nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length CVE-2023-6535: (unk) - CVE-2023-6536: (unk) + CVE-2023-6536: (unk) nvmet-tcp: fix a crash in nvmet_req_complete() CVE-2023-6546: (unk) tty: n_gsm: fix the UAF caused by race condition in gsm_cleanup_mux CVE-2023-6560: (unk) io_uring: don't allow discontig pages for IORING_SETUP_NO_MMAP CVE-2023-6606: (unk) smb: client: fix OOB in smbCalcSize() @@ -822,7 +1081,7 @@ Outstanding CVEs: CVE-2023-6915: (unk) ida: Fix crash in ida_free when the bitmap is empty CVE-2023-6931: (unk) perf: Fix perf_event_validate_size() CVE-2023-6932: (unk) ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet - CVE-2023-7042: (unk) + CVE-2023-7042: (unk) wifi: ath10k: fix NULL pointer dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev() CVE-2023-7192: (unk) netfilter: ctnetlink: fix possible refcount leak in ctnetlink_create_conntrack() CVE-2024-0340: (unk) vhost: use kzalloc() instead of kmalloc() followed by memset() CVE-2024-0564: (unk) @@ -832,15 +1091,16 @@ Outstanding CVEs: CVE-2024-0641: (unk) tipc: fix a potential deadlock on &tx->lock CVE-2024-0646: (unk) net: tls, update curr on splice as well CVE-2024-0775: (unk) ext4: improve error recovery code paths in __ext4_remount() - CVE-2024-0841: (unk) + CVE-2024-0841: (unk) fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super CVE-2024-1086: (unk) netfilter: nf_tables: reject QUEUE/DROP verdict parameters CVE-2024-1151: (unk) net: openvswitch: limit the number of recursions from action sets CVE-2024-1312: (unk) mm: lock_vma_under_rcu() must check vma->anon_vma under vma lock CVE-2024-21803: (unk) - CVE-2024-22099: (unk) + CVE-2024-2193: (unk) + CVE-2024-22099: (unk) Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security CVE-2024-22386: (unk) - CVE-2024-23196: (unk) - CVE-2024-23307: (unk) + CVE-2024-23196: (unk) ALSA: hda: fix a possible null-pointer dereference due to data race in snd_hdac_regmap_sync() + CVE-2024-23307: (unk) md/raid5: fix atomicity violation in raid5_cache_count CVE-2024-23848: (unk) CVE-2024-23849: (unk) net/rds: Fix UBSAN: array-index-out-of-bounds in rds_cmsg_recv CVE-2024-23851: (unk) dm: limit the number of targets and parameter size area @@ -849,7 +1109,7 @@ Outstanding CVEs: CVE-2024-24858: (unk) CVE-2024-24859: (unk) CVE-2024-24860: (unk) Bluetooth: Fix atomicity violation in {min,max}_key_size_set - CVE-2024-24861: (unk) + CVE-2024-24861: (unk) media: xc4000: Fix atomicity violation in xc4000_get_frequency CVE-2024-24864: (unk) CVE-2024-25739: (unk) CVE-2024-25740: (unk) @@ -858,13 +1118,125 @@ Outstanding CVEs: CVE-2024-26584: (unk) net: tls: handle backlogging of crypto requests CVE-2024-26585: (unk) tls: fix race between tx work scheduling and socket close CVE-2024-26586: (unk) mlxsw: spectrum_acl_tcam: Fix stack corruption - CVE-2024-26587: (unk) net: netdevsim: don't try to destroy PHC on VFs - CVE-2024-26588: (unk) LoongArch: BPF: Prevent out-of-bounds memory access CVE-2024-26589: (unk) bpf: Reject variable offset alu on PTR_TO_FLOW_KEYS - CVE-2024-26591: (unk) bpf: Fix re-attachment branch in bpf_tracing_prog_attach CVE-2024-26592: (unk) ksmbd: fix UAF issue in ksmbd_tcp_new_connection() CVE-2024-26593: (unk) i2c: i801: Fix block process call transactions CVE-2024-26594: (unk) ksmbd: validate mech token in session setup CVE-2024-26595: (unk) mlxsw: spectrum_acl_tcam: Fix NULL pointer dereference in error path CVE-2024-26597: (unk) net: qualcomm: rmnet: fix global oob in rmnet_policy CVE-2024-26598: (unk) KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache + CVE-2024-26600: (unk) phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP + CVE-2024-26602: (unk) sched/membarrier: reduce the ability to hammer on sys_membarrier + CVE-2024-26606: (unk) binder: signal epoll threads of self-work + CVE-2024-26607: (unk) drm/bridge: sii902x: Fix probing race issue + CVE-2024-26610: (unk) wifi: iwlwifi: fix a memory corruption + CVE-2024-26614: (unk) tcp: make sure init the accept_queue's spinlocks once + CVE-2024-26615: (unk) net/smc: fix illegal rmb_desc access in SMC-D connection dump + CVE-2024-26622: (unk) tomoyo: fix UAF write bug in tomoyo_write_control() + CVE-2024-26623: (unk) pds_core: Prevent race issues involving the adminq + CVE-2024-26625: (unk) llc: call sock_orphan() at release time + CVE-2024-26627: (unk) scsi: core: Move scsi_host_busy() out of host lock for waking up EH handler + CVE-2024-26633: (unk) ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim() + CVE-2024-26635: (unk) llc: Drop support for ETH_P_TR_802_2. + CVE-2024-26636: (unk) llc: make llc_ui_sendmsg() more robust against bonding changes + CVE-2024-26640: (unk) tcp: add sanity checks to rx zerocopy + CVE-2024-26641: (unk) ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv() + CVE-2024-26642: (unk) netfilter: nf_tables: disallow anonymous set with timeout flag + CVE-2024-26644: (unk) btrfs: don't abort filesystem when attempting to snapshot deleted subvolume + CVE-2024-26645: (unk) tracing: Ensure visibility when inserting an element into tracing_map + CVE-2024-26646: (unk) thermal: intel: hfi: Add syscore callbacks for system-wide PM + CVE-2024-26647: (unk) drm/amd/display: Fix late derefrence 'dsc' check in 'link_set_dsc_pps_packet()' + CVE-2024-26648: (unk) drm/amd/display: Fix variable deferencing before NULL check in edp_setup_replay() + CVE-2024-26650: (unk) platform/x86: p2sb: Allow p2sb_bar() calls during PCI device probe + CVE-2024-26651: (unk) sr9800: Add check for usbnet_get_endpoints + CVE-2024-26654: (unk) ALSA: sh: aica: reorder cleanup operations to avoid UAF bugs + CVE-2024-26655: (unk) Fix memory leak in posix_clock_open() + CVE-2024-26656: (unk) drm/amdgpu: fix use-after-free bug + CVE-2024-26658: (unk) bcachefs: grab s_umount only if snapshotting + CVE-2024-26659: (unk) xhci: handle isoc Babble and Buffer Overrun events properly + CVE-2024-26663: (unk) tipc: Check the bearer type before calling tipc_udp_nl_bearer_add() + CVE-2024-26664: (unk) hwmon: (coretemp) Fix out-of-bounds memory access + CVE-2024-26668: (unk) netfilter: nft_limit: reject configurations that cause integer overflow + CVE-2024-26669: (unk) net/sched: flower: Fix chain template offload + CVE-2024-26671: (unk) blk-mq: fix IO hang from sbitmap wakeup race + CVE-2024-26672: (unk) drm/amdgpu: Fix variable 'mca_funcs' dereferenced before NULL check in 'amdgpu_mca_smu_get_mca_entry()' + CVE-2024-26673: (unk) netfilter: nft_ct: sanitize layer 3 and 4 protocol number in custom expectations + CVE-2024-26675: (unk) ppp_async: limit MRU to 64K + CVE-2024-26676: (unk) af_unix: Call kfree_skb() for dead unix_(sk)->oob_skb in GC. + CVE-2024-26677: (unk) rxrpc: Fix delayed ACKs to not set the reference serial number + CVE-2024-26679: (unk) inet: read sk->sk_family once in inet_recv_error() + CVE-2024-26680: (unk) net: atlantic: Fix DMA mapping for PTP hwts ring + CVE-2024-26684: (unk) net: stmmac: xgmac: fix handling of DPP safety error for DMA channels + CVE-2024-26685: (unk) nilfs2: fix potential bug in end_buffer_async_write + CVE-2024-26686: (unk) fs/proc: do_task_stat: use sig->stats_lock to gather the threads/children stats + CVE-2024-26687: (unk) xen/events: close evtchn after mapping cleanup + CVE-2024-26688: (unk) fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super + CVE-2024-26689: (unk) ceph: prevent use-after-free in encode_cap_msg() + CVE-2024-26691: (unk) KVM: arm64: Fix circular locking dependency + CVE-2024-26696: (unk) nilfs2: fix hang in nilfs_lookup_dirty_data_buffers() + CVE-2024-26697: (unk) nilfs2: fix data corruption in dsync block recovery for small block sizes + CVE-2024-26699: (unk) drm/amd/display: Fix array-index-out-of-bounds in dcn35_clkmgr + CVE-2024-26700: (unk) drm/amd/display: Fix MST Null Ptr for RV + CVE-2024-26702: (unk) iio: magnetometer: rm3100: add boundary check for the value read from RM3100_REG_TMRC + CVE-2024-26704: (unk) ext4: fix double-free of blocks due to wrong extents moved_len + CVE-2024-26706: (unk) parisc: Fix random data corruption from exception handler + CVE-2024-26712: (unk) powerpc/kasan: Fix addr error caused by page alignment + CVE-2024-26713: (unk) powerpc/pseries/iommu: Fix iommu initialisation during DLPAR add + CVE-2024-26715: (unk) usb: dwc3: gadget: Fix NULL pointer dereference in dwc3_gadget_suspend + CVE-2024-26719: (unk) nouveau: offload fence uevents work to workqueue + CVE-2024-26720: (unk) mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again + CVE-2024-26726: (unk) btrfs: don't drop extent_map for free space inode on write error + CVE-2024-26733: (unk) arp: Prevent overflow in arp_req_get(). + CVE-2024-26735: (unk) ipv6: sr: fix possible use-after-free and null-ptr-deref + CVE-2024-26736: (unk) afs: Increase buffer size in afs_update_volume_status() + CVE-2024-26738: (unk) powerpc/pseries/iommu: DLPAR add doesn't completely initialize pci_controller + CVE-2024-26739: (unk) net/sched: act_mirred: don't override retval if we already lost the skb + CVE-2024-26740: (unk) net/sched: act_mirred: use the backlog for mirred ingress + CVE-2024-26743: (unk) RDMA/qedr: Fix qedr_create_user_qp error flow + CVE-2024-26744: (unk) RDMA/srpt: Support specifying the srpt_service_guid parameter + CVE-2024-26745: (unk) powerpc/pseries/iommu: IOMMU table is not initialized for kdump over SR-IOV + CVE-2024-26747: (unk) usb: roles: fix NULL pointer issue when put module's reference + CVE-2024-26748: (unk) usb: cdns3: fix memory double free when handle zero packet + CVE-2024-26749: (unk) usb: cdns3: fixed memory use after free at cdns3_gadget_ep_disable() + CVE-2024-26751: (unk) ARM: ep93xx: Add terminator to gpiod_lookup_table + CVE-2024-26752: (unk) l2tp: pass correct message length to ip6_append_data + CVE-2024-26754: (unk) gtp: fix use-after-free and null-ptr-deref in gtp_genl_dump_pdp() + CVE-2024-26756: (unk) md: Don't register sync_thread for reshape directly + CVE-2024-26757: (unk) md: Don't ignore read-only array in md_check_recovery() + CVE-2024-26758: (unk) md: Don't ignore suspended array in md_check_recovery() + CVE-2024-26759: (unk) mm/swap: fix race when skipping swapcache + CVE-2024-26763: (unk) dm-crypt: don't modify the data when using authenticated encryption + CVE-2024-26764: (unk) fs/aio: Restrict kiocb_set_cancel_fn() to I/O submitted via libaio + CVE-2024-26765: (unk) LoongArch: Disable IRQ before init_fn() for nonboot CPUs + CVE-2024-26766: (unk) IB/hfi1: Fix sdma.h tx->num_descs off-by-one error + CVE-2024-26767: (unk) drm/amd/display: fixed integer types and null check locations + CVE-2024-26768: (unk) LoongArch: Change acpi_core_pic[NR_CPUS] to acpi_core_pic[MAX_CORE_PIC] + CVE-2024-26769: (unk) nvmet-fc: avoid deadlock on delete association path + CVE-2024-26770: (unk) HID: nvidia-shield: Add missing null pointer checks to LED initialization + CVE-2024-26771: (unk) dmaengine: ti: edma: Add some null pointer checks to the edma_probe + CVE-2024-26772: (unk) ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal() + CVE-2024-26773: (unk) ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found() + CVE-2024-26774: (unk) ext4: avoid dividing by 0 in mb_update_avg_fragment_size() when block bitmap corrupt + CVE-2024-26775: (unk) aoe: avoid potential deadlock at set_capacity + CVE-2024-26776: (unk) spi: hisi-sfc-v3xx: Return IRQ_NONE if no interrupts were detected + CVE-2024-26777: (unk) fbdev: sis: Error out if pixclock equals zero + CVE-2024-26778: (unk) fbdev: savage: Error out if pixclock equals zero + CVE-2024-26779: (unk) wifi: mac80211: fix race condition on enabling fast-xmit + CVE-2024-26784: (unk) pmdomain: arm: Fix NULL dereference on scmi_perf_domain removal + CVE-2024-26787: (unk) mmc: mmci: stm32: fix DMA API overlapping mappings warning + CVE-2024-26788: (unk) dmaengine: fsl-qdma: init irq after reg initialization + CVE-2024-26789: (unk) crypto: arm64/neonbs - fix out-of-bounds access on short input + CVE-2024-26790: (unk) dmaengine: fsl-qdma: fix SoC may hang on 16 byte unaligned read + CVE-2024-26791: (unk) btrfs: dev-replace: properly validate device names + CVE-2024-26793: (unk) gtp: fix use-after-free and null-ptr-deref in gtp_newlink() + CVE-2024-26795: (unk) riscv: Sparse-Memory/vmemmap out-of-bounds fix + CVE-2024-26797: (unk) drm/amd/display: Prevent potential buffer overflow in map_hw_resources + CVE-2024-26798: (unk) fbcon: always restore the old font data in fbcon_do_set_font() + CVE-2024-26801: (unk) Bluetooth: Avoid potential use-after-free in hci_error_reset + CVE-2024-26802: (unk) stmmac: Clear variable when destroying workqueue + CVE-2024-26803: (unk) net: veth: clear GRO when clearing XDP even when down + CVE-2024-26804: (unk) net: ip_tunnel: prevent perpetual headroom growth + CVE-2024-26805: (unk) netlink: Fix kernel-infoleak-after-free in __skb_datagram_iter + CVE-2024-26806: (unk) spi: cadence-qspi: remove system-wide suspend helper calls from runtime PM hooks + CVE-2024-26808: (unk) netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain + CVE-2024-26809: (unk) netfilter: nft_set_pipapo: release elements in clone only from destroy path diff --git a/data/5.6/5.6_CVEs.txt b/data/5.6/5.6_CVEs.txt index 9ecff0c40..219651afe 100644 --- a/data/5.6/5.6_CVEs.txt +++ b/data/5.6/5.6_CVEs.txt @@ -34,6 +34,7 @@ CVE-2019-19462: Fixed with 5.6.17 CVE-2019-19770: Fix not seen in stream CVE-2019-19814: Fix unknown CVE-2019-20794: Fix unknown +CVE-2019-25162: Fix not seen in stream CVE-2020-0255: Fixed with 5.6.11 CVE-2020-0347: Fix unknown CVE-2020-0423: Fix not seen in stream @@ -174,6 +175,16 @@ CVE-2020-36557: Fixed with 5.6.2 CVE-2020-36691: Fix not seen in stream CVE-2020-36694: Fix not seen in stream CVE-2020-36766: Fix not seen in stream +CVE-2020-36775: Fixed with 5.6.7 +CVE-2020-36777: Fix not seen in stream +CVE-2020-36778: Fix not seen in stream +CVE-2020-36779: Fix not seen in stream +CVE-2020-36780: Fix not seen in stream +CVE-2020-36781: Fix not seen in stream +CVE-2020-36782: Fix not seen in stream +CVE-2020-36783: Fix not seen in stream +CVE-2020-36784: Fix not seen in stream +CVE-2020-36787: Fix not seen in stream CVE-2020-3702: Fix not seen in stream CVE-2020-4788: Fix not seen in stream CVE-2020-8694: Fix not seen in stream @@ -343,6 +354,159 @@ CVE-2021-45469: Fix not seen in stream CVE-2021-45485: Fix not seen in stream CVE-2021-45486: Fix not seen in stream CVE-2021-45868: Fix not seen in stream +CVE-2021-46904: Fix not seen in stream +CVE-2021-46906: Fix not seen in stream +CVE-2021-46908: Fix not seen in stream +CVE-2021-46909: Fix not seen in stream +CVE-2021-46915: Fix not seen in stream +CVE-2021-46919: Fix not seen in stream +CVE-2021-46920: Fix not seen in stream +CVE-2021-46921: Fix not seen in stream +CVE-2021-46924: Fix not seen in stream +CVE-2021-46925: Fix not seen in stream +CVE-2021-46926: Fix not seen in stream +CVE-2021-46928: Fix not seen in stream +CVE-2021-46929: Fix not seen in stream +CVE-2021-46930: Fix not seen in stream +CVE-2021-46932: Fix not seen in stream +CVE-2021-46933: Fix not seen in stream +CVE-2021-46934: Fix not seen in stream +CVE-2021-46935: Fix not seen in stream +CVE-2021-46936: Fix not seen in stream +CVE-2021-46938: Fix not seen in stream +CVE-2021-46939: Fix not seen in stream +CVE-2021-46941: Fix not seen in stream +CVE-2021-46943: Fix not seen in stream +CVE-2021-46944: Fix not seen in stream +CVE-2021-46950: Fix not seen in stream +CVE-2021-46951: Fix not seen in stream +CVE-2021-46952: Fix not seen in stream +CVE-2021-46953: Fix not seen in stream +CVE-2021-46955: Fix not seen in stream +CVE-2021-46956: Fix not seen in stream +CVE-2021-46959: Fix not seen in stream +CVE-2021-46960: Fix not seen in stream +CVE-2021-46961: Fix not seen in stream +CVE-2021-46962: Fix not seen in stream +CVE-2021-46963: Fix not seen in stream +CVE-2021-46965: Fix not seen in stream +CVE-2021-46966: Fix not seen in stream +CVE-2021-46969: Fix not seen in stream +CVE-2021-46970: Fix not seen in stream +CVE-2021-46971: Fix not seen in stream +CVE-2021-46974: Fix not seen in stream +CVE-2021-46977: Fix not seen in stream +CVE-2021-46981: Fix not seen in stream +CVE-2021-46982: Fix not seen in stream +CVE-2021-46984: Fix not seen in stream +CVE-2021-46988: Fix not seen in stream +CVE-2021-46989: Fix not seen in stream +CVE-2021-46991: Fix not seen in stream +CVE-2021-46992: Fix not seen in stream +CVE-2021-46993: Fix not seen in stream +CVE-2021-46994: Fix not seen in stream +CVE-2021-46998: Fix not seen in stream +CVE-2021-47001: Fix not seen in stream +CVE-2021-47004: Fix not seen in stream +CVE-2021-47005: Fix not seen in stream +CVE-2021-47006: Fix not seen in stream +CVE-2021-47010: Fix not seen in stream +CVE-2021-47012: Fix not seen in stream +CVE-2021-47013: Fix not seen in stream +CVE-2021-47015: Fix not seen in stream +CVE-2021-47016: Fix not seen in stream +CVE-2021-47018: Fix not seen in stream +CVE-2021-47020: Fix not seen in stream +CVE-2021-47024: Fix not seen in stream +CVE-2021-47028: Fix not seen in stream +CVE-2021-47034: Fix not seen in stream +CVE-2021-47035: Fix not seen in stream +CVE-2021-47036: Fix not seen in stream +CVE-2021-47041: Fix not seen in stream +CVE-2021-47043: Fix not seen in stream +CVE-2021-47046: Fix not seen in stream +CVE-2021-47049: Fix not seen in stream +CVE-2021-47051: Fix not seen in stream +CVE-2021-47052: Fix not seen in stream +CVE-2021-47054: Fix not seen in stream +CVE-2021-47056: Fix not seen in stream +CVE-2021-47059: Fix not seen in stream +CVE-2021-47063: Fix not seen in stream +CVE-2021-47065: Fix not seen in stream +CVE-2021-47067: Fix not seen in stream +CVE-2021-47069: Fix not seen in stream +CVE-2021-47070: Fix not seen in stream +CVE-2021-47071: Fix not seen in stream +CVE-2021-47073: Fix not seen in stream +CVE-2021-47074: Fix not seen in stream +CVE-2021-47075: Fix not seen in stream +CVE-2021-47076: Fix not seen in stream +CVE-2021-47077: Fix not seen in stream +CVE-2021-47078: Fix not seen in stream +CVE-2021-47082: Fix not seen in stream +CVE-2021-47083: Fix not seen in stream +CVE-2021-47086: Fix not seen in stream +CVE-2021-47095: Fix not seen in stream +CVE-2021-47100: Fix not seen in stream +CVE-2021-47101: Fix not seen in stream +CVE-2021-47103: Fix not seen in stream +CVE-2021-47105: Fix not seen in stream +CVE-2021-47109: Fix not seen in stream +CVE-2021-47110: Fix not seen in stream +CVE-2021-47111: Fix not seen in stream +CVE-2021-47112: Fix not seen in stream +CVE-2021-47113: Fix not seen in stream +CVE-2021-47114: Fix not seen in stream +CVE-2021-47116: Fix not seen in stream +CVE-2021-47117: Fix not seen in stream +CVE-2021-47118: Fix not seen in stream +CVE-2021-47119: Fix not seen in stream +CVE-2021-47120: Fix not seen in stream +CVE-2021-47121: Fix not seen in stream +CVE-2021-47122: Fix not seen in stream +CVE-2021-47124: Fix not seen in stream +CVE-2021-47125: Fix not seen in stream +CVE-2021-47126: Fix not seen in stream +CVE-2021-47128: Fix not seen in stream +CVE-2021-47129: Fix not seen in stream +CVE-2021-47131: Fix not seen in stream +CVE-2021-47133: Fix not seen in stream +CVE-2021-47135: Fix not seen in stream +CVE-2021-47136: Fix not seen in stream +CVE-2021-47137: Fix not seen in stream +CVE-2021-47138: Fix not seen in stream +CVE-2021-47139: Fix not seen in stream +CVE-2021-47140: Fix not seen in stream +CVE-2021-47141: Fix not seen in stream +CVE-2021-47142: Fix not seen in stream +CVE-2021-47143: Fix not seen in stream +CVE-2021-47144: Fix not seen in stream +CVE-2021-47145: Fix not seen in stream +CVE-2021-47146: Fix not seen in stream +CVE-2021-47147: Fix not seen in stream +CVE-2021-47149: Fix not seen in stream +CVE-2021-47150: Fix not seen in stream +CVE-2021-47151: Fix not seen in stream +CVE-2021-47153: Fix not seen in stream +CVE-2021-47158: Fix not seen in stream +CVE-2021-47159: Fix not seen in stream +CVE-2021-47160: Fix not seen in stream +CVE-2021-47161: Fix not seen in stream +CVE-2021-47162: Fix not seen in stream +CVE-2021-47163: Fix not seen in stream +CVE-2021-47165: Fix not seen in stream +CVE-2021-47166: Fix not seen in stream +CVE-2021-47167: Fix not seen in stream +CVE-2021-47168: Fix not seen in stream +CVE-2021-47169: Fix not seen in stream +CVE-2021-47170: Fix not seen in stream +CVE-2021-47171: Fix not seen in stream +CVE-2021-47172: Fix not seen in stream +CVE-2021-47173: Fix not seen in stream +CVE-2021-47175: Fix not seen in stream +CVE-2021-47177: Fix not seen in stream +CVE-2021-47179: Fix not seen in stream +CVE-2021-47180: Fix not seen in stream CVE-2022-0001: Fix not seen in stream CVE-2022-0002: Fix not seen in stream CVE-2022-0168: Fix not seen in stream @@ -569,6 +733,10 @@ CVE-2022-47520: Fix not seen in stream CVE-2022-47929: Fix not seen in stream CVE-2022-47946: Fix not seen in stream CVE-2022-48619: Fix not seen in stream +CVE-2022-48626: Fix not seen in stream +CVE-2022-48627: Fix not seen in stream +CVE-2022-48628: Fix not seen in stream +CVE-2022-48629: Fix not seen in stream CVE-2023-0045: Fix not seen in stream CVE-2023-0047: Fix not seen in stream CVE-2023-0160: Fix not seen in stream @@ -647,6 +815,7 @@ CVE-2023-28327: Fix not seen in stream CVE-2023-28328: Fix not seen in stream CVE-2023-28466: Fix not seen in stream CVE-2023-2860: Fix not seen in stream +CVE-2023-28746: Fix not seen in stream CVE-2023-28772: Fix not seen in stream CVE-2023-2985: Fix not seen in stream CVE-2023-3006: Fix not seen in stream @@ -725,7 +894,7 @@ CVE-2023-4622: Fix not seen in stream CVE-2023-4623: Fix not seen in stream CVE-2023-46343: Fix not seen in stream CVE-2023-46838: Fix not seen in stream -CVE-2023-47233: Fix unknown +CVE-2023-47233: Fix not seen in stream CVE-2023-4881: Fix not seen in stream CVE-2023-4921: Fix not seen in stream CVE-2023-50431: Fix not seen in stream @@ -750,18 +919,119 @@ CVE-2023-52448: Fix not seen in stream CVE-2023-52449: Fix not seen in stream CVE-2023-52451: Fix not seen in stream CVE-2023-52454: Fix not seen in stream -CVE-2023-52456: Fix not seen in stream -CVE-2023-52457: Fix not seen in stream CVE-2023-52458: Fix not seen in stream CVE-2023-52464: Fix not seen in stream +CVE-2023-52469: Fix not seen in stream +CVE-2023-52470: Fix not seen in stream +CVE-2023-52474: Fix not seen in stream +CVE-2023-52475: Fix not seen in stream +CVE-2023-52476: Fix not seen in stream +CVE-2023-52477: Fix not seen in stream +CVE-2023-52478: Fix not seen in stream +CVE-2023-52479: Fix not seen in stream +CVE-2023-52480: Fix not seen in stream +CVE-2023-52481: Fix not seen in stream +CVE-2023-52482: Fix not seen in stream +CVE-2023-52484: Fix not seen in stream +CVE-2023-52485: Fix not seen in stream +CVE-2023-52486: Fix not seen in stream +CVE-2023-52488: Fix not seen in stream +CVE-2023-52489: Fix not seen in stream +CVE-2023-52491: Fix not seen in stream +CVE-2023-52492: Fix not seen in stream +CVE-2023-52497: Fix not seen in stream +CVE-2023-52498: Fix not seen in stream +CVE-2023-52500: Fix not seen in stream +CVE-2023-52501: Fix not seen in stream +CVE-2023-52502: Fix not seen in stream +CVE-2023-52503: Fix not seen in stream +CVE-2023-52504: Fix not seen in stream +CVE-2023-52506: Fix not seen in stream +CVE-2023-52507: Fix not seen in stream +CVE-2023-52508: Fix not seen in stream +CVE-2023-52509: Fix not seen in stream +CVE-2023-52510: Fix not seen in stream +CVE-2023-52511: Fix not seen in stream +CVE-2023-52513: Fix not seen in stream +CVE-2023-52515: Fix not seen in stream +CVE-2023-52516: Fix not seen in stream +CVE-2023-52517: Fix not seen in stream +CVE-2023-52519: Fix not seen in stream +CVE-2023-52522: Fix not seen in stream +CVE-2023-52527: Fix not seen in stream +CVE-2023-52528: Fix not seen in stream +CVE-2023-52530: Fix not seen in stream +CVE-2023-52531: Fix not seen in stream +CVE-2023-52532: Fix not seen in stream +CVE-2023-52559: Fix not seen in stream +CVE-2023-52561: Fix not seen in stream +CVE-2023-52563: Fix not seen in stream +CVE-2023-52565: Fix not seen in stream +CVE-2023-52566: Fix not seen in stream +CVE-2023-52568: Fix not seen in stream +CVE-2023-52569: Fix not seen in stream +CVE-2023-52571: Fix not seen in stream +CVE-2023-52572: Fix not seen in stream +CVE-2023-52573: Fix not seen in stream +CVE-2023-52574: Fix not seen in stream +CVE-2023-52578: Fix not seen in stream +CVE-2023-52583: Fix not seen in stream +CVE-2023-52584: Fix not seen in stream +CVE-2023-52585: Fix not seen in stream +CVE-2023-52586: Fix not seen in stream +CVE-2023-52587: Fix not seen in stream +CVE-2023-52588: Fix not seen in stream +CVE-2023-52589: Fix not seen in stream +CVE-2023-52590: Fix not seen in stream +CVE-2023-52591: Fix not seen in stream +CVE-2023-52593: Fix not seen in stream +CVE-2023-52594: Fix not seen in stream +CVE-2023-52595: Fix not seen in stream +CVE-2023-52596: Fix not seen in stream +CVE-2023-52597: Fix not seen in stream +CVE-2023-52598: Fix not seen in stream +CVE-2023-52599: Fix not seen in stream +CVE-2023-52600: Fix not seen in stream +CVE-2023-52601: Fix not seen in stream +CVE-2023-52602: Fix not seen in stream +CVE-2023-52603: Fix not seen in stream +CVE-2023-52604: Fix not seen in stream +CVE-2023-52606: Fix not seen in stream +CVE-2023-52607: Fix not seen in stream +CVE-2023-52609: Fix not seen in stream +CVE-2023-52610: Fix not seen in stream +CVE-2023-52612: Fix not seen in stream +CVE-2023-52614: Fix not seen in stream +CVE-2023-52615: Fix not seen in stream +CVE-2023-52617: Fix not seen in stream +CVE-2023-52618: Fix not seen in stream +CVE-2023-52619: Fix not seen in stream +CVE-2023-52620: Fix not seen in stream +CVE-2023-52621: Fix not seen in stream +CVE-2023-52622: Fix not seen in stream +CVE-2023-52623: Fix not seen in stream +CVE-2023-52624: Fix not seen in stream +CVE-2023-52625: Fix not seen in stream +CVE-2023-52627: Fix not seen in stream +CVE-2023-52628: Fix not seen in stream +CVE-2023-52629: Fix not seen in stream +CVE-2023-52632: Fix not seen in stream +CVE-2023-52633: Fix not seen in stream +CVE-2023-52634: Fix not seen in stream +CVE-2023-52635: Fix not seen in stream +CVE-2023-52637: Fix not seen in stream +CVE-2023-52638: Fix not seen in stream +CVE-2023-52639: Fix not seen in stream +CVE-2023-52640: Fix not seen in stream +CVE-2023-52641: Fix not seen in stream CVE-2023-5717: Fix not seen in stream CVE-2023-6040: Fix not seen in stream CVE-2023-6121: Fix not seen in stream CVE-2023-6240: Fix unknown -CVE-2023-6270: Fix unknown -CVE-2023-6356: Fix unknown +CVE-2023-6270: Fix not seen in stream +CVE-2023-6356: Fix not seen in stream CVE-2023-6535: Fix unknown -CVE-2023-6536: Fix unknown +CVE-2023-6536: Fix not seen in stream CVE-2023-6546: Fix not seen in stream CVE-2023-6560: Fix not seen in stream CVE-2023-6606: Fix not seen in stream @@ -770,7 +1040,7 @@ CVE-2023-6817: Fix not seen in stream CVE-2023-6915: Fix not seen in stream CVE-2023-6931: Fix not seen in stream CVE-2023-6932: Fix not seen in stream -CVE-2023-7042: Fix unknown +CVE-2023-7042: Fix not seen in stream CVE-2023-7192: Fix not seen in stream CVE-2024-0340: Fix not seen in stream CVE-2024-0564: Fix unknown @@ -780,15 +1050,16 @@ CVE-2024-0607: Fix not seen in stream CVE-2024-0641: Fix not seen in stream CVE-2024-0646: Fix not seen in stream CVE-2024-0775: Fix not seen in stream -CVE-2024-0841: Fix unknown +CVE-2024-0841: Fix not seen in stream CVE-2024-1086: Fix not seen in stream CVE-2024-1151: Fix not seen in stream CVE-2024-1312: Fix not seen in stream CVE-2024-21803: Fix unknown -CVE-2024-22099: Fix unknown +CVE-2024-2193: Fix unknown +CVE-2024-22099: Fix not seen in stream CVE-2024-22386: Fix unknown -CVE-2024-23196: Fix unknown -CVE-2024-23307: Fix unknown +CVE-2024-23196: Fix not seen in stream +CVE-2024-23307: Fix not seen in stream CVE-2024-23848: Fix unknown CVE-2024-23849: Fix not seen in stream CVE-2024-23851: Fix not seen in stream @@ -797,7 +1068,7 @@ CVE-2024-24857: Fix unknown CVE-2024-24858: Fix unknown CVE-2024-24859: Fix unknown CVE-2024-24860: Fix not seen in stream -CVE-2024-24861: Fix unknown +CVE-2024-24861: Fix not seen in stream CVE-2024-24864: Fix unknown CVE-2024-25739: Fix unknown CVE-2024-25740: Fix unknown @@ -806,13 +1077,126 @@ CVE-2024-25744: Fix not seen in stream CVE-2024-26584: Fix not seen in stream CVE-2024-26585: Fix not seen in stream CVE-2024-26586: Fix not seen in stream -CVE-2024-26587: Fix not seen in stream -CVE-2024-26588: Fix not seen in stream CVE-2024-26589: Fix not seen in stream -CVE-2024-26591: Fix not seen in stream CVE-2024-26592: Fix not seen in stream CVE-2024-26593: Fix not seen in stream CVE-2024-26594: Fix not seen in stream CVE-2024-26595: Fix not seen in stream CVE-2024-26597: Fix not seen in stream CVE-2024-26598: Fix not seen in stream +CVE-2024-26600: Fix not seen in stream +CVE-2024-26602: Fix not seen in stream +CVE-2024-26606: Fix not seen in stream +CVE-2024-26607: Fix not seen in stream +CVE-2024-26610: Fix not seen in stream +CVE-2024-26614: Fix not seen in stream +CVE-2024-26615: Fix not seen in stream +CVE-2024-26622: Fix not seen in stream +CVE-2024-26623: Fix not seen in stream +CVE-2024-26625: Fix not seen in stream +CVE-2024-26627: Fix not seen in stream +CVE-2024-26633: Fix not seen in stream +CVE-2024-26635: Fix not seen in stream +CVE-2024-26636: Fix not seen in stream +CVE-2024-26640: Fix not seen in stream +CVE-2024-26641: Fix not seen in stream +CVE-2024-26642: Fix not seen in stream +CVE-2024-26644: Fix not seen in stream +CVE-2024-26645: Fix not seen in stream +CVE-2024-26646: Fix not seen in stream +CVE-2024-26647: Fix not seen in stream +CVE-2024-26648: Fix not seen in stream +CVE-2024-26650: Fix not seen in stream +CVE-2024-26651: Fix not seen in stream +CVE-2024-26654: Fix not seen in stream +CVE-2024-26655: Fix not seen in stream +CVE-2024-26656: Fix not seen in stream +CVE-2024-26658: Fix not seen in stream +CVE-2024-26659: Fix not seen in stream +CVE-2024-26663: Fix not seen in stream +CVE-2024-26664: Fix not seen in stream +CVE-2024-26668: Fix not seen in stream +CVE-2024-26669: Fix not seen in stream +CVE-2024-26671: Fix not seen in stream +CVE-2024-26672: Fix not seen in stream +CVE-2024-26673: Fix not seen in stream +CVE-2024-26675: Fix not seen in stream +CVE-2024-26676: Fix not seen in stream +CVE-2024-26677: Fix not seen in stream +CVE-2024-26679: Fix not seen in stream +CVE-2024-26680: Fix not seen in stream +CVE-2024-26684: Fix not seen in stream +CVE-2024-26685: Fix not seen in stream +CVE-2024-26686: Fix not seen in stream +CVE-2024-26687: Fix not seen in stream +CVE-2024-26688: Fix not seen in stream +CVE-2024-26689: Fix not seen in stream +CVE-2024-26691: Fix not seen in stream +CVE-2024-26696: Fix not seen in stream +CVE-2024-26697: Fix not seen in stream +CVE-2024-26699: Fix not seen in stream +CVE-2024-26700: Fix not seen in stream +CVE-2024-26702: Fix not seen in stream +CVE-2024-26704: Fix not seen in stream +CVE-2024-26706: Fix not seen in stream +CVE-2024-26712: Fix not seen in stream +CVE-2024-26713: Fix not seen in stream +CVE-2024-26715: Fix not seen in stream +CVE-2024-26719: Fix not seen in stream +CVE-2024-26720: Fix not seen in stream +CVE-2024-26726: Fix not seen in stream +CVE-2024-26733: Fix not seen in stream +CVE-2024-26735: Fix not seen in stream +CVE-2024-26736: Fix not seen in stream +CVE-2024-26738: Fix not seen in stream +CVE-2024-26739: Fix not seen in stream +CVE-2024-26740: Fix not seen in stream +CVE-2024-26743: Fix not seen in stream +CVE-2024-26744: Fix not seen in stream +CVE-2024-26745: Fix not seen in stream +CVE-2024-26747: Fix not seen in stream +CVE-2024-26748: Fix not seen in stream +CVE-2024-26749: Fix not seen in stream +CVE-2024-26751: Fix not seen in stream +CVE-2024-26752: Fix not seen in stream +CVE-2024-26754: Fix not seen in stream +CVE-2024-26756: Fix not seen in stream +CVE-2024-26757: Fix not seen in stream +CVE-2024-26758: Fix not seen in stream +CVE-2024-26759: Fix not seen in stream +CVE-2024-26763: Fix not seen in stream +CVE-2024-26764: Fix not seen in stream +CVE-2024-26765: Fix not seen in stream +CVE-2024-26766: Fix not seen in stream +CVE-2024-26767: Fix not seen in stream +CVE-2024-26768: Fix not seen in stream +CVE-2024-26769: Fix not seen in stream +CVE-2024-26770: Fix not seen in stream +CVE-2024-26771: Fix not seen in stream +CVE-2024-26772: Fix not seen in stream +CVE-2024-26773: Fix not seen in stream +CVE-2024-26774: Fix not seen in stream +CVE-2024-26775: Fix not seen in stream +CVE-2024-26776: Fix not seen in stream +CVE-2024-26777: Fix not seen in stream +CVE-2024-26778: Fix not seen in stream +CVE-2024-26779: Fix not seen in stream +CVE-2024-26782: Fix not seen in stream +CVE-2024-26784: Fix not seen in stream +CVE-2024-26787: Fix not seen in stream +CVE-2024-26788: Fix not seen in stream +CVE-2024-26789: Fix not seen in stream +CVE-2024-26790: Fix not seen in stream +CVE-2024-26791: Fix not seen in stream +CVE-2024-26793: Fix not seen in stream +CVE-2024-26795: Fix not seen in stream +CVE-2024-26797: Fix not seen in stream +CVE-2024-26798: Fix not seen in stream +CVE-2024-26801: Fix not seen in stream +CVE-2024-26802: Fix not seen in stream +CVE-2024-26803: Fix not seen in stream +CVE-2024-26804: Fix not seen in stream +CVE-2024-26805: Fix not seen in stream +CVE-2024-26806: Fix not seen in stream +CVE-2024-26808: Fix not seen in stream +CVE-2024-26809: Fix not seen in stream diff --git a/data/5.6/5.6_security.txt b/data/5.6/5.6_security.txt index 687e4403d..71fcd6409 100644 --- a/data/5.6/5.6_security.txt +++ b/data/5.6/5.6_security.txt @@ -26,6 +26,7 @@ CVEs fixed in 5.6.5: CVEs fixed in 5.6.7: CVE-2020-12659: 98d3c852e63b49129515dd18c875999efaf8530a xsk: Add missing check on user supplied headroom size + CVE-2020-36775: 8e8542437bb4070423c9754d5ba270ffdbae8c8d f2fs: fix to avoid potential deadlock CVEs fixed in 5.6.8: CVE-2020-11884: 8a0e9d7867f59ca8067775fdaddb49aec8353268 s390/mm: fix page table upgrade vs 2ndary address mode accesses @@ -98,6 +99,7 @@ Outstanding CVEs: CVE-2019-19770: (unk) blktrace: fix debugfs use after free CVE-2019-19814: (unk) CVE-2019-20794: (unk) + CVE-2019-25162: (unk) i2c: Fix a potential use after free CVE-2020-0347: (unk) CVE-2020-0423: (unk) binder: fix UAF when releasing todo list CVE-2020-0465: (unk) HID: core: Sanitize event code and type when mapping input @@ -211,6 +213,15 @@ Outstanding CVEs: CVE-2020-36691: (unk) netlink: limit recursion depth in policy validation CVE-2020-36694: (unk) netfilter: x_tables: Switch synchronization to RCU CVE-2020-36766: (unk) cec-api: prevent leaking memory through hole in structure + CVE-2020-36777: (unk) media: dvbdev: Fix memory leak in dvb_media_device_free() + CVE-2020-36778: (unk) i2c: xiic: fix reference leak when pm_runtime_get_sync fails + CVE-2020-36779: (unk) i2c: stm32f7: fix reference leak when pm_runtime_get_sync fails + CVE-2020-36780: (unk) i2c: sprd: fix reference leak when pm_runtime_get_sync fails + CVE-2020-36781: (unk) i2c: imx: fix reference leak when pm_runtime_get_sync fails + CVE-2020-36782: (unk) i2c: imx-lpi2c: fix reference leak when pm_runtime_get_sync fails + CVE-2020-36783: (unk) i2c: img-scb: fix reference leak when pm_runtime_get_sync fails + CVE-2020-36784: (unk) i2c: cadence: fix reference leak when pm_runtime_get_sync fails + CVE-2020-36787: (unk) media: aspeed: fix clock handling logic CVE-2020-3702: (unk) ath: Use safer key clearing with key cache entries CVE-2020-4788: (unk) powerpc/64s: flush L1D on kernel entry CVE-2020-8694: (unk) powercap: restrict energy meter to root access @@ -377,6 +388,159 @@ Outstanding CVEs: CVE-2021-45485: (unk) ipv6: use prandom_u32() for ID generation CVE-2021-45486: (unk) inet: use bigger hash table for IP ID generation CVE-2021-45868: (unk) quota: check block number when reading the block in quota file + CVE-2021-46904: (unk) net: hso: fix null-ptr-deref during tty device unregistration + CVE-2021-46906: (unk) HID: usbhid: fix info leak in hid_submit_ctrl + CVE-2021-46908: (unk) bpf: Use correct permission flag for mixed signed bounds arithmetic + CVE-2021-46909: (unk) ARM: footbridge: fix PCI interrupt mapping + CVE-2021-46915: (unk) netfilter: nft_limit: avoid possible divide error in nft_limit_init + CVE-2021-46919: (unk) dmaengine: idxd: fix wq size store permission state + CVE-2021-46920: (unk) dmaengine: idxd: Fix clobbering of SWERR overflow bit on writeback + CVE-2021-46921: (unk) locking/qrwlock: Fix ordering in queued_write_lock_slowpath() + CVE-2021-46924: (unk) NFC: st21nfca: Fix memory leak in device probe and remove + CVE-2021-46925: (unk) net/smc: fix kernel panic caused by race of smc_sock + CVE-2021-46926: (unk) ALSA: hda: intel-sdw-acpi: harden detection of controller + CVE-2021-46928: (unk) parisc: Clear stale IIR value on instruction access rights trap + CVE-2021-46929: (unk) sctp: use call_rcu to free endpoint + CVE-2021-46930: (unk) usb: mtu3: fix list_head check warning + CVE-2021-46932: (unk) Input: appletouch - initialize work before device registration + CVE-2021-46933: (unk) usb: gadget: f_fs: Clear ffs_eventfd in ffs_data_clear. + CVE-2021-46934: (unk) i2c: validate user data in compat ioctl + CVE-2021-46935: (unk) binder: fix async_free_space accounting for empty parcels + CVE-2021-46936: (unk) net: fix use-after-free in tw_timer_handler + CVE-2021-46938: (unk) dm rq: fix double free of blk_mq_tag_set in dev remove after table load fails + CVE-2021-46939: (unk) tracing: Restructure trace_clock_global() to never block + CVE-2021-46941: (unk) usb: dwc3: core: Do core softreset when switch mode + CVE-2021-46943: (unk) media: staging/intel-ipu3: Fix set_fmt error handling + CVE-2021-46944: (unk) media: staging/intel-ipu3: Fix memory leak in imu_fmt + CVE-2021-46950: (unk) md/raid1: properly indicate failure when ending a failed write request + CVE-2021-46951: (unk) tpm: efi: Use local variable for calculating final log size + CVE-2021-46952: (unk) NFS: fs_context: validate UDP retrans to prevent shift out-of-bounds + CVE-2021-46953: (unk) ACPI: GTDT: Don't corrupt interrupt mappings on watchdow probe failure + CVE-2021-46955: (unk) openvswitch: fix stack OOB read while fragmenting IPv4 packets + CVE-2021-46956: (unk) virtiofs: fix memory leak in virtio_fs_probe() + CVE-2021-46959: (unk) spi: Fix use-after-free with devm_spi_alloc_* + CVE-2021-46960: (unk) cifs: Return correct error code from smb2_get_enc_key + CVE-2021-46961: (unk) irqchip/gic-v3: Do not enable irqs when handling spurious interrups + CVE-2021-46962: (unk) mmc: uniphier-sd: Fix a resource leak in the remove function + CVE-2021-46963: (unk) scsi: qla2xxx: Fix crash in qla2xxx_mqueuecommand() + CVE-2021-46965: (unk) mtd: physmap: physmap-bt1-rom: Fix unintentional stack access + CVE-2021-46966: (unk) ACPI: custom_method: fix potential use-after-free issue + CVE-2021-46969: (unk) bus: mhi: core: Fix invalid error returning in mhi_queue + CVE-2021-46970: (unk) bus: mhi: pci_generic: Remove WQ_MEM_RECLAIM flag from state workqueue + CVE-2021-46971: (unk) perf/core: Fix unconditional security_locked_down() call + CVE-2021-46974: (unk) bpf: Fix masking negation logic upon negative dst register + CVE-2021-46977: (unk) KVM: VMX: Disable preemption when probing user return MSRs + CVE-2021-46981: (unk) nbd: Fix NULL pointer in flush_workqueue + CVE-2021-46982: (unk) f2fs: compress: fix race condition of overwrite vs truncate + CVE-2021-46984: (unk) kyber: fix out of bounds access when preempted + CVE-2021-46988: (unk) userfaultfd: release page in error path to avoid BUG_ON + CVE-2021-46989: (unk) hfsplus: prevent corruption in shrinking truncate + CVE-2021-46991: (unk) i40e: Fix use-after-free in i40e_client_subtask() + CVE-2021-46992: (unk) netfilter: nftables: avoid overflows in nft_hash_buckets() + CVE-2021-46993: (unk) sched: Fix out-of-bound access in uclamp + CVE-2021-46994: (unk) can: mcp251x: fix resume from sleep before interface was brought up + CVE-2021-46998: (unk) ethernet:enic: Fix a use after free bug in enic_hard_start_xmit + CVE-2021-47001: (unk) xprtrdma: Fix cwnd update ordering + CVE-2021-47004: (unk) f2fs: fix to avoid touching checkpointed data in get_victim() + CVE-2021-47005: (unk) PCI: endpoint: Fix NULL pointer dereference for ->get_features() + CVE-2021-47006: (unk) ARM: 9064/1: hw_breakpoint: Do not directly check the event's overflow_handler hook + CVE-2021-47010: (unk) net: Only allow init netns to set default tcp cong to a restricted algo + CVE-2021-47012: (unk) RDMA/siw: Fix a use after free in siw_alloc_mr + CVE-2021-47013: (unk) net:emac/emac-mac: Fix a use after free in emac_mac_tx_buf_send + CVE-2021-47015: (unk) bnxt_en: Fix RX consumer index logic in the error path. + CVE-2021-47016: (unk) m68k: mvme147,mvme16x: Don't wipe PCC timer config bits + CVE-2021-47018: (unk) powerpc/64: Fix the definition of the fixmap area + CVE-2021-47020: (unk) soundwire: stream: fix memory leak in stream config error path + CVE-2021-47024: (unk) vsock/virtio: free queued packets when closing socket + CVE-2021-47028: (unk) mt76: mt7915: fix txrate reporting + CVE-2021-47034: (unk) powerpc/64s: Fix pte update for kernel memory on radix + CVE-2021-47035: (unk) iommu/vt-d: Remove WO permissions on second-level paging entries + CVE-2021-47036: (unk) udp: skip L4 aggregation for UDP tunnel packets + CVE-2021-47041: (unk) nvmet-tcp: fix incorrect locking in state_change sk callback + CVE-2021-47043: (unk) media: venus: core: Fix some resource leaks in the error path of 'venus_probe()' + CVE-2021-47046: (unk) drm/amd/display: Fix off by one in hdmi_14_process_transaction() + CVE-2021-47049: (unk) Drivers: hv: vmbus: Use after free in __vmbus_open() + CVE-2021-47051: (unk) spi: fsl-lpspi: Fix PM reference leak in lpspi_prepare_xfer_hardware() + CVE-2021-47052: (unk) crypto: sa2ul - Fix memory leak of rxd + CVE-2021-47054: (unk) bus: qcom: Put child node before return + CVE-2021-47056: (unk) crypto: qat - ADF_STATUS_PF_RUNNING should be set after adf_dev_init + CVE-2021-47059: (unk) crypto: sun8i-ss - fix result memory leak on error path + CVE-2021-47063: (unk) drm: bridge/panel: Cleanup connector on bridge detach + CVE-2021-47065: (unk) rtw88: Fix array overrun in rtw_get_tx_power_params() + CVE-2021-47067: (unk) soc/tegra: regulators: Fix locking up when voltage-spread is out of range + CVE-2021-47069: (unk) ipc/mqueue, msg, sem: avoid relying on a stack reference past its expiry + CVE-2021-47070: (unk) uio_hv_generic: Fix another memory leak in error handling paths + CVE-2021-47071: (unk) uio_hv_generic: Fix a memory leak in error handling paths + CVE-2021-47073: (unk) platform/x86: dell-smbios-wmi: Fix oops on rmmod dell_smbios + CVE-2021-47074: (unk) nvme-loop: fix memory leak in nvme_loop_create_ctrl() + CVE-2021-47075: (unk) nvmet: fix memory leak in nvmet_alloc_ctrl() + CVE-2021-47076: (unk) RDMA/rxe: Return CQE error if invalid lkey was supplied + CVE-2021-47077: (unk) scsi: qedf: Add pointer checks in qedf_update_link_speed() + CVE-2021-47078: (unk) RDMA/rxe: Clear all QP fields if creation failed + CVE-2021-47082: (unk) tun: avoid double free in tun_free_netdev + CVE-2021-47083: (unk) pinctrl: mediatek: fix global-out-of-bounds issue + CVE-2021-47086: (unk) phonet/pep: refuse to enable an unbound pipe + CVE-2021-47095: (unk) ipmi: ssif: initialize ssif_info->client early + CVE-2021-47100: (unk) ipmi: Fix UAF when uninstall ipmi_si and ipmi_msghandler module + CVE-2021-47101: (unk) asix: fix uninit-value in asix_mdio_read() + CVE-2021-47103: (unk) inet: fully convert sk->sk_rx_dst to RCU rules + CVE-2021-47105: (unk) ice: xsk: return xsk buffers back to pool when cleaning the ring + CVE-2021-47109: (unk) neighbour: allow NUD_NOARP entries to be forced GCed + CVE-2021-47110: (unk) x86/kvm: Disable kvmclock on all CPUs on shutdown + CVE-2021-47111: (unk) xen-netback: take a reference to the RX task thread + CVE-2021-47112: (unk) x86/kvm: Teardown PV features on boot CPU as well + CVE-2021-47113: (unk) btrfs: abort in rename_exchange if we fail to insert the second ref + CVE-2021-47114: (unk) ocfs2: fix data corruption by fallocate + CVE-2021-47116: (unk) ext4: fix memory leak in ext4_mb_init_backend on error path. + CVE-2021-47117: (unk) ext4: fix bug on in ext4_es_cache_extent as ext4_split_extent_at failed + CVE-2021-47118: (unk) pid: take a reference when initializing `cad_pid` + CVE-2021-47119: (unk) ext4: fix memory leak in ext4_fill_super + CVE-2021-47120: (unk) HID: magicmouse: fix NULL-deref on disconnect + CVE-2021-47121: (unk) net: caif: fix memory leak in cfusbl_device_notify + CVE-2021-47122: (unk) net: caif: fix memory leak in caif_device_notify + CVE-2021-47124: (unk) io_uring: fix link timeout refs + CVE-2021-47125: (unk) sch_htb: fix refcount leak in htb_parent_to_leaf_offload + CVE-2021-47126: (unk) ipv6: Fix KASAN: slab-out-of-bounds Read in fib6_nh_flush_exceptions + CVE-2021-47128: (unk) bpf, lockdown, audit: Fix buggy SELinux lockdown permission checks + CVE-2021-47129: (unk) netfilter: nft_ct: skip expectations for confirmed conntrack + CVE-2021-47131: (unk) net/tls: Fix use-after-free after the TLS device goes down and up + CVE-2021-47133: (unk) HID: amd_sfh: Fix memory leak in amd_sfh_work + CVE-2021-47135: (unk) mt76: mt7921: fix possible AOOB issue in mt7921_mcu_tx_rate_report + CVE-2021-47136: (unk) net: zero-initialize tc skb extension on allocation + CVE-2021-47137: (unk) net: lantiq: fix memory corruption in RX ring + CVE-2021-47138: (unk) cxgb4: avoid accessing registers when clearing filters + CVE-2021-47139: (unk) net: hns3: put off calling register_netdev() until client initialize complete + CVE-2021-47140: (unk) iommu/amd: Clear DMA ops when switching domain + CVE-2021-47141: (unk) gve: Add NULL pointer checks when freeing irqs. + CVE-2021-47142: (unk) drm/amdgpu: Fix a use-after-free + CVE-2021-47143: (unk) net/smc: remove device from smcd_dev_list after failed device_add() + CVE-2021-47144: (unk) drm/amd/amdgpu: fix refcount leak + CVE-2021-47145: (unk) btrfs: do not BUG_ON in link_to_fixup_dir + CVE-2021-47146: (unk) mld: fix panic in mld_newpack() + CVE-2021-47147: (unk) ptp: ocp: Fix a resource leak in an error handling path + CVE-2021-47149: (unk) net: fujitsu: fix potential null-ptr-deref + CVE-2021-47150: (unk) net: fec: fix the potential memory leak in fec_enet_init() + CVE-2021-47151: (unk) interconnect: qcom: bcm-voter: add a missing of_node_put() + CVE-2021-47153: (unk) i2c: i801: Don't generate an interrupt on bus reset + CVE-2021-47158: (unk) net: dsa: sja1105: add error handling in sja1105_setup() + CVE-2021-47159: (unk) net: dsa: fix a crash if ->get_sset_count() fails + CVE-2021-47160: (unk) net: dsa: mt7530: fix VLAN traffic leaks + CVE-2021-47161: (unk) spi: spi-fsl-dspi: Fix a resource leak in an error handling path + CVE-2021-47162: (unk) tipc: skb_linearize the head skb when reassembling msgs + CVE-2021-47163: (unk) tipc: wait and exit until all work queues are done + CVE-2021-47165: (unk) drm/meson: fix shutdown crash when component not probed + CVE-2021-47166: (unk) NFS: Don't corrupt the value of pg_bytes_written in nfs_do_recoalesce() + CVE-2021-47167: (unk) NFS: Fix an Oopsable condition in __nfs_pageio_add_request() + CVE-2021-47168: (unk) NFS: fix an incorrect limit in filelayout_decode_layout() + CVE-2021-47169: (unk) serial: rp2: use 'request_firmware' instead of 'request_firmware_nowait' + CVE-2021-47170: (unk) USB: usbfs: Don't WARN about excessively large memory allocations + CVE-2021-47171: (unk) net: usb: fix memory leak in smsc75xx_bind + CVE-2021-47172: (unk) iio: adc: ad7124: Fix potential overflow due to non sequential channel numbers + CVE-2021-47173: (unk) misc/uss720: fix memory leak in uss720_probe + CVE-2021-47175: (unk) net/sched: fq_pie: fix OOB access in the traffic path + CVE-2021-47177: (unk) iommu/vt-d: Fix sysfs leak in alloc_iommu() + CVE-2021-47179: (unk) NFSv4: Fix a NULL pointer dereference in pnfs_mark_matching_lsegs_return() + CVE-2021-47180: (unk) NFC: nci: fix memory leak in nci_allocate_device CVE-2022-0001: (unk) x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE CVE-2022-0002: (unk) x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE CVE-2022-0168: (unk) cifs: fix NULL ptr dereference in smb2_ioctl_query_info() @@ -603,6 +767,10 @@ Outstanding CVEs: CVE-2022-47929: (unk) net: sched: disallow noqueue for qdisc classes CVE-2022-47946: (unk) io_uring: kill sqo_dead and sqo submission halting CVE-2022-48619: (unk) Input: add bounds checking to input_set_capability() + CVE-2022-48626: (unk) moxart: fix potential use-after-free on remove path + CVE-2022-48627: (unk) vt: fix memory overlapping when deleting chars in the buffer + CVE-2022-48628: (unk) ceph: drop messages from MDS when unmounting + CVE-2022-48629: (unk) crypto: qcom-rng - ensure buffer for generate is completely filled CVE-2023-0045: (unk) x86/bugs: Flush IBP in ib_prctl_set() CVE-2023-0047: (unk) mm, oom: do not trigger out_of_memory from the #PF CVE-2023-0160: (unk) bpf, sockmap: fix deadlocks in the sockhash and sockmap @@ -681,6 +849,7 @@ Outstanding CVEs: CVE-2023-28328: (unk) media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer() CVE-2023-28466: (unk) net: tls: fix possible race condition between do_tls_getsockopt_conf() and do_tls_setsockopt_conf() CVE-2023-2860: (unk) ipv6: sr: fix out-of-bounds read when setting HMAC data. + CVE-2023-28746: (unk) x86/mmio: Disable KVM mitigation when X86_FEATURE_CLEAR_CPU_BUF is set CVE-2023-28772: (unk) seq_buf: Fix overflow in seq_buf_putmem_hex() CVE-2023-2985: (unk) fs: hfsplus: fix UAF issue in hfsplus_put_super CVE-2023-3006: (unk) arm64: Add AMPERE1 to the Spectre-BHB affected list @@ -759,7 +928,7 @@ Outstanding CVEs: CVE-2023-4623: (unk) net/sched: sch_hfsc: Ensure inner classes have fsc curve CVE-2023-46343: (unk) nfc: nci: fix possible NULL pointer dereference in send_acknowledge() CVE-2023-46838: (unk) xen-netback: don't produce zero-size SKB frags - CVE-2023-47233: (unk) + CVE-2023-47233: (unk) wifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach CVE-2023-4881: (unk) netfilter: nftables: exthdr: fix 4-byte stack OOB write CVE-2023-4921: (unk) net: sched: sch_qfq: Fix UAF in qfq_dequeue() CVE-2023-50431: (unk) accel/habanalabs: fix information leak in sec_attest_info() @@ -784,18 +953,119 @@ Outstanding CVEs: CVE-2023-52449: (unk) mtd: Fix gluebi NULL pointer dereference caused by ftl notifier CVE-2023-52451: (unk) powerpc/pseries/memhp: Fix access beyond end of drmem array CVE-2023-52454: (unk) nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length - CVE-2023-52456: (unk) serial: imx: fix tx statemachine deadlock - CVE-2023-52457: (unk) serial: 8250: omap: Don't skip resource freeing if pm_runtime_resume_and_get() failed CVE-2023-52458: (unk) block: add check that partition length needs to be aligned with block size CVE-2023-52464: (unk) EDAC/thunderx: Fix possible out-of-bounds string access + CVE-2023-52469: (unk) drivers/amd/pm: fix a use-after-free in kv_parse_power_table + CVE-2023-52470: (unk) drm/radeon: check the alloc_workqueue return value in radeon_crtc_init() + CVE-2023-52474: (unk) IB/hfi1: Fix bugs with non-PAGE_SIZE-end multi-iovec user SDMA requests + CVE-2023-52475: (unk) Input: powermate - fix use-after-free in powermate_config_complete + CVE-2023-52476: (unk) perf/x86/lbr: Filter vsyscall addresses + CVE-2023-52477: (unk) usb: hub: Guard against accesses to uninitialized BOS descriptors + CVE-2023-52478: (unk) HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect + CVE-2023-52479: (unk) ksmbd: fix uaf in smb20_oplock_break_ack + CVE-2023-52480: (unk) ksmbd: fix race condition between session lookup and expire + CVE-2023-52481: (unk) arm64: errata: Add Cortex-A520 speculative unprivileged load workaround + CVE-2023-52482: (unk) x86/srso: Add SRSO mitigation for Hygon processors + CVE-2023-52484: (unk) iommu/arm-smmu-v3: Fix soft lockup triggered by arm_smmu_mm_invalidate_range + CVE-2023-52485: (unk) drm/amd/display: Wake DMCUB before sending a command + CVE-2023-52486: (unk) drm: Don't unref the same fb many times by mistake due to deadlock handling + CVE-2023-52488: (unk) serial: sc16is7xx: convert from _raw_ to _noinc_ regmap functions for FIFO + CVE-2023-52489: (unk) mm/sparsemem: fix race in accessing memory_section->usage + CVE-2023-52491: (unk) media: mtk-jpeg: Fix use after free bug due to error path handling in mtk_jpeg_dec_device_run + CVE-2023-52492: (unk) dmaengine: fix NULL pointer in channel unregistration function + CVE-2023-52497: (unk) erofs: fix lz4 inplace decompression + CVE-2023-52498: (unk) PM: sleep: Fix possible deadlocks in core system-wide PM code + CVE-2023-52500: (unk) scsi: pm80xx: Avoid leaking tags when processing OPC_INB_SET_CONTROLLER_CONFIG command + CVE-2023-52501: (unk) ring-buffer: Do not attempt to read past "commit" + CVE-2023-52502: (unk) net: nfc: fix races in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn() + CVE-2023-52503: (unk) tee: amdtee: fix use-after-free vulnerability in amdtee_close_session + CVE-2023-52504: (unk) x86/alternatives: Disable KASAN in apply_alternatives() + CVE-2023-52506: (unk) LoongArch: Set all reserved memblocks on Node#0 at initialization + CVE-2023-52507: (unk) nfc: nci: assert requested protocol is valid + CVE-2023-52508: (unk) nvme-fc: Prevent null pointer dereference in nvme_fc_io_getuuid() + CVE-2023-52509: (unk) ravb: Fix use-after-free issue in ravb_tx_timeout_work() + CVE-2023-52510: (unk) ieee802154: ca8210: Fix a potential UAF in ca8210_probe + CVE-2023-52511: (unk) spi: sun6i: reduce DMA RX transfer width to single byte + CVE-2023-52513: (unk) RDMA/siw: Fix connection failure handling + CVE-2023-52515: (unk) RDMA/srp: Do not call scsi_done() from srp_abort() + CVE-2023-52516: (unk) dma-debug: don't call __dma_entry_alloc_check_leak() under free_entries_lock + CVE-2023-52517: (unk) spi: sun6i: fix race between DMA RX transfer completion and RX FIFO drain + CVE-2023-52519: (unk) HID: intel-ish-hid: ipc: Disable and reenable ACPI GPE bit + CVE-2023-52522: (unk) net: fix possible store tearing in neigh_periodic_work() + CVE-2023-52527: (unk) ipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data() + CVE-2023-52528: (unk) net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg + CVE-2023-52530: (unk) wifi: mac80211: fix potential key use-after-free + CVE-2023-52531: (unk) wifi: iwlwifi: mvm: Fix a memory corruption issue + CVE-2023-52532: (unk) net: mana: Fix TX CQE error handling + CVE-2023-52559: (unk) iommu/vt-d: Avoid memory allocation in iommu_suspend() + CVE-2023-52561: (unk) arm64: dts: qcom: sdm845-db845c: Mark cont splash memory region as reserved + CVE-2023-52563: (unk) drm/meson: fix memory leak on ->hpd_notify callback + CVE-2023-52565: (unk) media: uvcvideo: Fix OOB read + CVE-2023-52566: (unk) nilfs2: fix potential use after free in nilfs_gccache_submit_read_data() + CVE-2023-52568: (unk) x86/sgx: Resolves SECS reclaim vs. page fault for EAUG race + CVE-2023-52569: (unk) btrfs: remove BUG() after failure to insert delayed dir index item + CVE-2023-52571: (unk) power: supply: rk817: Fix node refcount leak + CVE-2023-52572: (unk) cifs: Fix UAF in cifs_demultiplex_thread() + CVE-2023-52573: (unk) net: rds: Fix possible NULL-pointer dereference + CVE-2023-52574: (unk) team: fix null-ptr-deref when team device type is changed + CVE-2023-52578: (unk) net: bridge: use DEV_STATS_INC() + CVE-2023-52583: (unk) ceph: fix deadlock or deadcode of misusing dget() + CVE-2023-52584: (unk) spmi: mediatek: Fix UAF on device remove + CVE-2023-52585: (unk) drm/amdgpu: Fix possible NULL dereference in amdgpu_ras_query_error_status_helper() + CVE-2023-52586: (unk) drm/msm/dpu: Add mutex lock in control vblank irq + CVE-2023-52587: (unk) IB/ipoib: Fix mcast list locking + CVE-2023-52588: (unk) f2fs: fix to tag gcing flag on page during block migration + CVE-2023-52589: (unk) media: rkisp1: Fix IRQ disable race issue + CVE-2023-52590: (unk) ocfs2: Avoid touching renamed directory if parent does not change + CVE-2023-52591: (unk) reiserfs: Avoid touching renamed directory if parent does not change + CVE-2023-52593: (unk) wifi: wfx: fix possible NULL pointer dereference in wfx_set_mfp_ap() + CVE-2023-52594: (unk) wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus() + CVE-2023-52595: (unk) wifi: rt2x00: restart beacon queue when hardware reset + CVE-2023-52596: (unk) sysctl: Fix out of bounds access for empty sysctl registers + CVE-2023-52597: (unk) KVM: s390: fix setting of fpc register + CVE-2023-52598: (unk) s390/ptrace: handle setting of fpc register correctly + CVE-2023-52599: (unk) jfs: fix array-index-out-of-bounds in diNewExt + CVE-2023-52600: (unk) jfs: fix uaf in jfs_evict_inode + CVE-2023-52601: (unk) jfs: fix array-index-out-of-bounds in dbAdjTree + CVE-2023-52602: (unk) jfs: fix slab-out-of-bounds Read in dtSearch + CVE-2023-52603: (unk) UBSAN: array-index-out-of-bounds in dtSplitRoot + CVE-2023-52604: (unk) FS:JFS:UBSAN:array-index-out-of-bounds in dbAdjTree + CVE-2023-52606: (unk) powerpc/lib: Validate size for vector operations + CVE-2023-52607: (unk) powerpc/mm: Fix null-pointer dereference in pgtable_cache_add + CVE-2023-52609: (unk) binder: fix race between mmput() and do_exit() + CVE-2023-52610: (unk) net/sched: act_ct: fix skb leak and crash on ooo frags + CVE-2023-52612: (unk) crypto: scomp - fix req->dst buffer overflow + CVE-2023-52614: (unk) PM / devfreq: Fix buffer overflow in trans_stat_show + CVE-2023-52615: (unk) hwrng: core - Fix page fault dead lock on mmap-ed hwrng + CVE-2023-52617: (unk) PCI: switchtec: Fix stdev_release() crash after surprise hot remove + CVE-2023-52618: (unk) block/rnbd-srv: Check for unlikely string overflow + CVE-2023-52619: (unk) pstore/ram: Fix crash when setting number of cpus to an odd number + CVE-2023-52620: (unk) netfilter: nf_tables: disallow timeout for anonymous sets + CVE-2023-52621: (unk) bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers + CVE-2023-52622: (unk) ext4: avoid online resizing failures due to oversized flex bg + CVE-2023-52623: (unk) SUNRPC: Fix a suspicious RCU usage warning + CVE-2023-52624: (unk) drm/amd/display: Wake DMCUB before executing GPINT commands + CVE-2023-52625: (unk) drm/amd/display: Refactor DMCUB enter/exit idle interface + CVE-2023-52627: (unk) iio: adc: ad7091r: Allow users to configure device events + CVE-2023-52628: (unk) netfilter: nftables: exthdr: fix 4-byte stack OOB write + CVE-2023-52629: (unk) sh: push-switch: Reorder cleanup operations to avoid use-after-free bug + CVE-2023-52632: (unk) drm/amdkfd: Fix lock dependency warning with srcu + CVE-2023-52633: (unk) um: time-travel: fix time corruption + CVE-2023-52634: (unk) drm/amd/display: Fix disable_otg_wa logic + CVE-2023-52635: (unk) PM / devfreq: Synchronize devfreq_monitor_[start/stop] + CVE-2023-52637: (unk) can: j1939: Fix UAF in j1939_sk_match_filter during setsockopt(SO_J1939_FILTER) + CVE-2023-52638: (unk) can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock + CVE-2023-52639: (unk) KVM: s390: vsie: fix race during shadow creation + CVE-2023-52640: (unk) fs/ntfs3: Fix oob in ntfs_listxattr + CVE-2023-52641: (unk) fs/ntfs3: Add NULL ptr dereference checking at the end of attr_allocate_frame() CVE-2023-5717: (unk) perf: Disallow mis-matched inherited group reads CVE-2023-6040: (unk) netfilter: nf_tables: Reject tables of unsupported family CVE-2023-6121: (unk) nvmet: nul-terminate the NQNs passed in the connect command CVE-2023-6240: (unk) - CVE-2023-6270: (unk) - CVE-2023-6356: (unk) + CVE-2023-6270: (unk) aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts + CVE-2023-6356: (unk) nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length CVE-2023-6535: (unk) - CVE-2023-6536: (unk) + CVE-2023-6536: (unk) nvmet-tcp: fix a crash in nvmet_req_complete() CVE-2023-6546: (unk) tty: n_gsm: fix the UAF caused by race condition in gsm_cleanup_mux CVE-2023-6560: (unk) io_uring: don't allow discontig pages for IORING_SETUP_NO_MMAP CVE-2023-6606: (unk) smb: client: fix OOB in smbCalcSize() @@ -804,7 +1074,7 @@ Outstanding CVEs: CVE-2023-6915: (unk) ida: Fix crash in ida_free when the bitmap is empty CVE-2023-6931: (unk) perf: Fix perf_event_validate_size() CVE-2023-6932: (unk) ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet - CVE-2023-7042: (unk) + CVE-2023-7042: (unk) wifi: ath10k: fix NULL pointer dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev() CVE-2023-7192: (unk) netfilter: ctnetlink: fix possible refcount leak in ctnetlink_create_conntrack() CVE-2024-0340: (unk) vhost: use kzalloc() instead of kmalloc() followed by memset() CVE-2024-0564: (unk) @@ -814,15 +1084,16 @@ Outstanding CVEs: CVE-2024-0641: (unk) tipc: fix a potential deadlock on &tx->lock CVE-2024-0646: (unk) net: tls, update curr on splice as well CVE-2024-0775: (unk) ext4: improve error recovery code paths in __ext4_remount() - CVE-2024-0841: (unk) + CVE-2024-0841: (unk) fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super CVE-2024-1086: (unk) netfilter: nf_tables: reject QUEUE/DROP verdict parameters CVE-2024-1151: (unk) net: openvswitch: limit the number of recursions from action sets CVE-2024-1312: (unk) mm: lock_vma_under_rcu() must check vma->anon_vma under vma lock CVE-2024-21803: (unk) - CVE-2024-22099: (unk) + CVE-2024-2193: (unk) + CVE-2024-22099: (unk) Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security CVE-2024-22386: (unk) - CVE-2024-23196: (unk) - CVE-2024-23307: (unk) + CVE-2024-23196: (unk) ALSA: hda: fix a possible null-pointer dereference due to data race in snd_hdac_regmap_sync() + CVE-2024-23307: (unk) md/raid5: fix atomicity violation in raid5_cache_count CVE-2024-23848: (unk) CVE-2024-23849: (unk) net/rds: Fix UBSAN: array-index-out-of-bounds in rds_cmsg_recv CVE-2024-23851: (unk) dm: limit the number of targets and parameter size area @@ -831,7 +1102,7 @@ Outstanding CVEs: CVE-2024-24858: (unk) CVE-2024-24859: (unk) CVE-2024-24860: (unk) Bluetooth: Fix atomicity violation in {min,max}_key_size_set - CVE-2024-24861: (unk) + CVE-2024-24861: (unk) media: xc4000: Fix atomicity violation in xc4000_get_frequency CVE-2024-24864: (unk) CVE-2024-25739: (unk) CVE-2024-25740: (unk) @@ -840,13 +1111,126 @@ Outstanding CVEs: CVE-2024-26584: (unk) net: tls: handle backlogging of crypto requests CVE-2024-26585: (unk) tls: fix race between tx work scheduling and socket close CVE-2024-26586: (unk) mlxsw: spectrum_acl_tcam: Fix stack corruption - CVE-2024-26587: (unk) net: netdevsim: don't try to destroy PHC on VFs - CVE-2024-26588: (unk) LoongArch: BPF: Prevent out-of-bounds memory access CVE-2024-26589: (unk) bpf: Reject variable offset alu on PTR_TO_FLOW_KEYS - CVE-2024-26591: (unk) bpf: Fix re-attachment branch in bpf_tracing_prog_attach CVE-2024-26592: (unk) ksmbd: fix UAF issue in ksmbd_tcp_new_connection() CVE-2024-26593: (unk) i2c: i801: Fix block process call transactions CVE-2024-26594: (unk) ksmbd: validate mech token in session setup CVE-2024-26595: (unk) mlxsw: spectrum_acl_tcam: Fix NULL pointer dereference in error path CVE-2024-26597: (unk) net: qualcomm: rmnet: fix global oob in rmnet_policy CVE-2024-26598: (unk) KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache + CVE-2024-26600: (unk) phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP + CVE-2024-26602: (unk) sched/membarrier: reduce the ability to hammer on sys_membarrier + CVE-2024-26606: (unk) binder: signal epoll threads of self-work + CVE-2024-26607: (unk) drm/bridge: sii902x: Fix probing race issue + CVE-2024-26610: (unk) wifi: iwlwifi: fix a memory corruption + CVE-2024-26614: (unk) tcp: make sure init the accept_queue's spinlocks once + CVE-2024-26615: (unk) net/smc: fix illegal rmb_desc access in SMC-D connection dump + CVE-2024-26622: (unk) tomoyo: fix UAF write bug in tomoyo_write_control() + CVE-2024-26623: (unk) pds_core: Prevent race issues involving the adminq + CVE-2024-26625: (unk) llc: call sock_orphan() at release time + CVE-2024-26627: (unk) scsi: core: Move scsi_host_busy() out of host lock for waking up EH handler + CVE-2024-26633: (unk) ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim() + CVE-2024-26635: (unk) llc: Drop support for ETH_P_TR_802_2. + CVE-2024-26636: (unk) llc: make llc_ui_sendmsg() more robust against bonding changes + CVE-2024-26640: (unk) tcp: add sanity checks to rx zerocopy + CVE-2024-26641: (unk) ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv() + CVE-2024-26642: (unk) netfilter: nf_tables: disallow anonymous set with timeout flag + CVE-2024-26644: (unk) btrfs: don't abort filesystem when attempting to snapshot deleted subvolume + CVE-2024-26645: (unk) tracing: Ensure visibility when inserting an element into tracing_map + CVE-2024-26646: (unk) thermal: intel: hfi: Add syscore callbacks for system-wide PM + CVE-2024-26647: (unk) drm/amd/display: Fix late derefrence 'dsc' check in 'link_set_dsc_pps_packet()' + CVE-2024-26648: (unk) drm/amd/display: Fix variable deferencing before NULL check in edp_setup_replay() + CVE-2024-26650: (unk) platform/x86: p2sb: Allow p2sb_bar() calls during PCI device probe + CVE-2024-26651: (unk) sr9800: Add check for usbnet_get_endpoints + CVE-2024-26654: (unk) ALSA: sh: aica: reorder cleanup operations to avoid UAF bugs + CVE-2024-26655: (unk) Fix memory leak in posix_clock_open() + CVE-2024-26656: (unk) drm/amdgpu: fix use-after-free bug + CVE-2024-26658: (unk) bcachefs: grab s_umount only if snapshotting + CVE-2024-26659: (unk) xhci: handle isoc Babble and Buffer Overrun events properly + CVE-2024-26663: (unk) tipc: Check the bearer type before calling tipc_udp_nl_bearer_add() + CVE-2024-26664: (unk) hwmon: (coretemp) Fix out-of-bounds memory access + CVE-2024-26668: (unk) netfilter: nft_limit: reject configurations that cause integer overflow + CVE-2024-26669: (unk) net/sched: flower: Fix chain template offload + CVE-2024-26671: (unk) blk-mq: fix IO hang from sbitmap wakeup race + CVE-2024-26672: (unk) drm/amdgpu: Fix variable 'mca_funcs' dereferenced before NULL check in 'amdgpu_mca_smu_get_mca_entry()' + CVE-2024-26673: (unk) netfilter: nft_ct: sanitize layer 3 and 4 protocol number in custom expectations + CVE-2024-26675: (unk) ppp_async: limit MRU to 64K + CVE-2024-26676: (unk) af_unix: Call kfree_skb() for dead unix_(sk)->oob_skb in GC. + CVE-2024-26677: (unk) rxrpc: Fix delayed ACKs to not set the reference serial number + CVE-2024-26679: (unk) inet: read sk->sk_family once in inet_recv_error() + CVE-2024-26680: (unk) net: atlantic: Fix DMA mapping for PTP hwts ring + CVE-2024-26684: (unk) net: stmmac: xgmac: fix handling of DPP safety error for DMA channels + CVE-2024-26685: (unk) nilfs2: fix potential bug in end_buffer_async_write + CVE-2024-26686: (unk) fs/proc: do_task_stat: use sig->stats_lock to gather the threads/children stats + CVE-2024-26687: (unk) xen/events: close evtchn after mapping cleanup + CVE-2024-26688: (unk) fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super + CVE-2024-26689: (unk) ceph: prevent use-after-free in encode_cap_msg() + CVE-2024-26691: (unk) KVM: arm64: Fix circular locking dependency + CVE-2024-26696: (unk) nilfs2: fix hang in nilfs_lookup_dirty_data_buffers() + CVE-2024-26697: (unk) nilfs2: fix data corruption in dsync block recovery for small block sizes + CVE-2024-26699: (unk) drm/amd/display: Fix array-index-out-of-bounds in dcn35_clkmgr + CVE-2024-26700: (unk) drm/amd/display: Fix MST Null Ptr for RV + CVE-2024-26702: (unk) iio: magnetometer: rm3100: add boundary check for the value read from RM3100_REG_TMRC + CVE-2024-26704: (unk) ext4: fix double-free of blocks due to wrong extents moved_len + CVE-2024-26706: (unk) parisc: Fix random data corruption from exception handler + CVE-2024-26712: (unk) powerpc/kasan: Fix addr error caused by page alignment + CVE-2024-26713: (unk) powerpc/pseries/iommu: Fix iommu initialisation during DLPAR add + CVE-2024-26715: (unk) usb: dwc3: gadget: Fix NULL pointer dereference in dwc3_gadget_suspend + CVE-2024-26719: (unk) nouveau: offload fence uevents work to workqueue + CVE-2024-26720: (unk) mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again + CVE-2024-26726: (unk) btrfs: don't drop extent_map for free space inode on write error + CVE-2024-26733: (unk) arp: Prevent overflow in arp_req_get(). + CVE-2024-26735: (unk) ipv6: sr: fix possible use-after-free and null-ptr-deref + CVE-2024-26736: (unk) afs: Increase buffer size in afs_update_volume_status() + CVE-2024-26738: (unk) powerpc/pseries/iommu: DLPAR add doesn't completely initialize pci_controller + CVE-2024-26739: (unk) net/sched: act_mirred: don't override retval if we already lost the skb + CVE-2024-26740: (unk) net/sched: act_mirred: use the backlog for mirred ingress + CVE-2024-26743: (unk) RDMA/qedr: Fix qedr_create_user_qp error flow + CVE-2024-26744: (unk) RDMA/srpt: Support specifying the srpt_service_guid parameter + CVE-2024-26745: (unk) powerpc/pseries/iommu: IOMMU table is not initialized for kdump over SR-IOV + CVE-2024-26747: (unk) usb: roles: fix NULL pointer issue when put module's reference + CVE-2024-26748: (unk) usb: cdns3: fix memory double free when handle zero packet + CVE-2024-26749: (unk) usb: cdns3: fixed memory use after free at cdns3_gadget_ep_disable() + CVE-2024-26751: (unk) ARM: ep93xx: Add terminator to gpiod_lookup_table + CVE-2024-26752: (unk) l2tp: pass correct message length to ip6_append_data + CVE-2024-26754: (unk) gtp: fix use-after-free and null-ptr-deref in gtp_genl_dump_pdp() + CVE-2024-26756: (unk) md: Don't register sync_thread for reshape directly + CVE-2024-26757: (unk) md: Don't ignore read-only array in md_check_recovery() + CVE-2024-26758: (unk) md: Don't ignore suspended array in md_check_recovery() + CVE-2024-26759: (unk) mm/swap: fix race when skipping swapcache + CVE-2024-26763: (unk) dm-crypt: don't modify the data when using authenticated encryption + CVE-2024-26764: (unk) fs/aio: Restrict kiocb_set_cancel_fn() to I/O submitted via libaio + CVE-2024-26765: (unk) LoongArch: Disable IRQ before init_fn() for nonboot CPUs + CVE-2024-26766: (unk) IB/hfi1: Fix sdma.h tx->num_descs off-by-one error + CVE-2024-26767: (unk) drm/amd/display: fixed integer types and null check locations + CVE-2024-26768: (unk) LoongArch: Change acpi_core_pic[NR_CPUS] to acpi_core_pic[MAX_CORE_PIC] + CVE-2024-26769: (unk) nvmet-fc: avoid deadlock on delete association path + CVE-2024-26770: (unk) HID: nvidia-shield: Add missing null pointer checks to LED initialization + CVE-2024-26771: (unk) dmaengine: ti: edma: Add some null pointer checks to the edma_probe + CVE-2024-26772: (unk) ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal() + CVE-2024-26773: (unk) ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found() + CVE-2024-26774: (unk) ext4: avoid dividing by 0 in mb_update_avg_fragment_size() when block bitmap corrupt + CVE-2024-26775: (unk) aoe: avoid potential deadlock at set_capacity + CVE-2024-26776: (unk) spi: hisi-sfc-v3xx: Return IRQ_NONE if no interrupts were detected + CVE-2024-26777: (unk) fbdev: sis: Error out if pixclock equals zero + CVE-2024-26778: (unk) fbdev: savage: Error out if pixclock equals zero + CVE-2024-26779: (unk) wifi: mac80211: fix race condition on enabling fast-xmit + CVE-2024-26782: (unk) mptcp: fix double-free on socket dismantle + CVE-2024-26784: (unk) pmdomain: arm: Fix NULL dereference on scmi_perf_domain removal + CVE-2024-26787: (unk) mmc: mmci: stm32: fix DMA API overlapping mappings warning + CVE-2024-26788: (unk) dmaengine: fsl-qdma: init irq after reg initialization + CVE-2024-26789: (unk) crypto: arm64/neonbs - fix out-of-bounds access on short input + CVE-2024-26790: (unk) dmaengine: fsl-qdma: fix SoC may hang on 16 byte unaligned read + CVE-2024-26791: (unk) btrfs: dev-replace: properly validate device names + CVE-2024-26793: (unk) gtp: fix use-after-free and null-ptr-deref in gtp_newlink() + CVE-2024-26795: (unk) riscv: Sparse-Memory/vmemmap out-of-bounds fix + CVE-2024-26797: (unk) drm/amd/display: Prevent potential buffer overflow in map_hw_resources + CVE-2024-26798: (unk) fbcon: always restore the old font data in fbcon_do_set_font() + CVE-2024-26801: (unk) Bluetooth: Avoid potential use-after-free in hci_error_reset + CVE-2024-26802: (unk) stmmac: Clear variable when destroying workqueue + CVE-2024-26803: (unk) net: veth: clear GRO when clearing XDP even when down + CVE-2024-26804: (unk) net: ip_tunnel: prevent perpetual headroom growth + CVE-2024-26805: (unk) netlink: Fix kernel-infoleak-after-free in __skb_datagram_iter + CVE-2024-26806: (unk) spi: cadence-qspi: remove system-wide suspend helper calls from runtime PM hooks + CVE-2024-26808: (unk) netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain + CVE-2024-26809: (unk) netfilter: nft_set_pipapo: release elements in clone only from destroy path diff --git a/data/5.7/5.7_CVEs.txt b/data/5.7/5.7_CVEs.txt index 25ce01030..f02b9fb29 100644 --- a/data/5.7/5.7_CVEs.txt +++ b/data/5.7/5.7_CVEs.txt @@ -31,6 +31,7 @@ CVE-2019-19462: Fixed with 5.7.1 CVE-2019-19770: Fixed with 5.7.16 CVE-2019-19814: Fix unknown CVE-2019-20794: Fix unknown +CVE-2019-25162: Fix not seen in stream CVE-2020-0347: Fix unknown CVE-2020-0423: Fix not seen in stream CVE-2020-0465: Fix not seen in stream @@ -153,6 +154,15 @@ CVE-2020-36516: Fix not seen in stream CVE-2020-36691: Fix not seen in stream CVE-2020-36694: Fix not seen in stream CVE-2020-36766: Fix not seen in stream +CVE-2020-36777: Fix not seen in stream +CVE-2020-36778: Fix not seen in stream +CVE-2020-36779: Fix not seen in stream +CVE-2020-36780: Fix not seen in stream +CVE-2020-36781: Fix not seen in stream +CVE-2020-36782: Fix not seen in stream +CVE-2020-36783: Fix not seen in stream +CVE-2020-36784: Fix not seen in stream +CVE-2020-36787: Fix not seen in stream CVE-2020-3702: Fix not seen in stream CVE-2020-4788: Fix not seen in stream CVE-2020-8694: Fix not seen in stream @@ -327,6 +337,168 @@ CVE-2021-45485: Fix not seen in stream CVE-2021-45486: Fix not seen in stream CVE-2021-45868: Fix not seen in stream CVE-2021-46283: Fix not seen in stream +CVE-2021-46904: Fix not seen in stream +CVE-2021-46906: Fix not seen in stream +CVE-2021-46908: Fix not seen in stream +CVE-2021-46909: Fix not seen in stream +CVE-2021-46911: Fix not seen in stream +CVE-2021-46912: Fix not seen in stream +CVE-2021-46913: Fix not seen in stream +CVE-2021-46915: Fix not seen in stream +CVE-2021-46919: Fix not seen in stream +CVE-2021-46920: Fix not seen in stream +CVE-2021-46921: Fix not seen in stream +CVE-2021-46924: Fix not seen in stream +CVE-2021-46925: Fix not seen in stream +CVE-2021-46926: Fix not seen in stream +CVE-2021-46928: Fix not seen in stream +CVE-2021-46929: Fix not seen in stream +CVE-2021-46930: Fix not seen in stream +CVE-2021-46931: Fix not seen in stream +CVE-2021-46932: Fix not seen in stream +CVE-2021-46933: Fix not seen in stream +CVE-2021-46934: Fix not seen in stream +CVE-2021-46935: Fix not seen in stream +CVE-2021-46936: Fix not seen in stream +CVE-2021-46938: Fix not seen in stream +CVE-2021-46939: Fix not seen in stream +CVE-2021-46941: Fix not seen in stream +CVE-2021-46943: Fix not seen in stream +CVE-2021-46944: Fix not seen in stream +CVE-2021-46950: Fix not seen in stream +CVE-2021-46951: Fix not seen in stream +CVE-2021-46952: Fix not seen in stream +CVE-2021-46953: Fix not seen in stream +CVE-2021-46955: Fix not seen in stream +CVE-2021-46956: Fix not seen in stream +CVE-2021-46958: Fix not seen in stream +CVE-2021-46959: Fix not seen in stream +CVE-2021-46960: Fix not seen in stream +CVE-2021-46961: Fix not seen in stream +CVE-2021-46962: Fix not seen in stream +CVE-2021-46963: Fix not seen in stream +CVE-2021-46965: Fix not seen in stream +CVE-2021-46966: Fix not seen in stream +CVE-2021-46969: Fix not seen in stream +CVE-2021-46970: Fix not seen in stream +CVE-2021-46971: Fix not seen in stream +CVE-2021-46974: Fix not seen in stream +CVE-2021-46977: Fix not seen in stream +CVE-2021-46981: Fix not seen in stream +CVE-2021-46982: Fix not seen in stream +CVE-2021-46984: Fix not seen in stream +CVE-2021-46988: Fix not seen in stream +CVE-2021-46989: Fix not seen in stream +CVE-2021-46991: Fix not seen in stream +CVE-2021-46992: Fix not seen in stream +CVE-2021-46993: Fix not seen in stream +CVE-2021-46994: Fix not seen in stream +CVE-2021-46998: Fix not seen in stream +CVE-2021-46999: Fix not seen in stream +CVE-2021-47001: Fix not seen in stream +CVE-2021-47004: Fix not seen in stream +CVE-2021-47005: Fix not seen in stream +CVE-2021-47006: Fix not seen in stream +CVE-2021-47010: Fix not seen in stream +CVE-2021-47012: Fix not seen in stream +CVE-2021-47013: Fix not seen in stream +CVE-2021-47015: Fix not seen in stream +CVE-2021-47016: Fix not seen in stream +CVE-2021-47018: Fix not seen in stream +CVE-2021-47020: Fix not seen in stream +CVE-2021-47024: Fix not seen in stream +CVE-2021-47028: Fix not seen in stream +CVE-2021-47034: Fix not seen in stream +CVE-2021-47035: Fix not seen in stream +CVE-2021-47036: Fix not seen in stream +CVE-2021-47038: Fix not seen in stream +CVE-2021-47041: Fix not seen in stream +CVE-2021-47043: Fix not seen in stream +CVE-2021-47046: Fix not seen in stream +CVE-2021-47049: Fix not seen in stream +CVE-2021-47051: Fix not seen in stream +CVE-2021-47052: Fix not seen in stream +CVE-2021-47054: Fix not seen in stream +CVE-2021-47056: Fix not seen in stream +CVE-2021-47059: Fix not seen in stream +CVE-2021-47063: Fix not seen in stream +CVE-2021-47065: Fix not seen in stream +CVE-2021-47067: Fix not seen in stream +CVE-2021-47069: Fix not seen in stream +CVE-2021-47070: Fix not seen in stream +CVE-2021-47071: Fix not seen in stream +CVE-2021-47073: Fix not seen in stream +CVE-2021-47074: Fix not seen in stream +CVE-2021-47075: Fix not seen in stream +CVE-2021-47076: Fix not seen in stream +CVE-2021-47077: Fix not seen in stream +CVE-2021-47078: Fix not seen in stream +CVE-2021-47082: Fix not seen in stream +CVE-2021-47083: Fix not seen in stream +CVE-2021-47086: Fix not seen in stream +CVE-2021-47095: Fix not seen in stream +CVE-2021-47100: Fix not seen in stream +CVE-2021-47101: Fix not seen in stream +CVE-2021-47103: Fix not seen in stream +CVE-2021-47105: Fix not seen in stream +CVE-2021-47109: Fix not seen in stream +CVE-2021-47110: Fix not seen in stream +CVE-2021-47111: Fix not seen in stream +CVE-2021-47112: Fix not seen in stream +CVE-2021-47113: Fix not seen in stream +CVE-2021-47114: Fix not seen in stream +CVE-2021-47116: Fix not seen in stream +CVE-2021-47117: Fix not seen in stream +CVE-2021-47118: Fix not seen in stream +CVE-2021-47119: Fix not seen in stream +CVE-2021-47120: Fix not seen in stream +CVE-2021-47121: Fix not seen in stream +CVE-2021-47122: Fix not seen in stream +CVE-2021-47124: Fix not seen in stream +CVE-2021-47125: Fix not seen in stream +CVE-2021-47126: Fix not seen in stream +CVE-2021-47128: Fix not seen in stream +CVE-2021-47129: Fix not seen in stream +CVE-2021-47131: Fix not seen in stream +CVE-2021-47133: Fix not seen in stream +CVE-2021-47135: Fix not seen in stream +CVE-2021-47136: Fix not seen in stream +CVE-2021-47137: Fix not seen in stream +CVE-2021-47138: Fix not seen in stream +CVE-2021-47139: Fix not seen in stream +CVE-2021-47140: Fix not seen in stream +CVE-2021-47141: Fix not seen in stream +CVE-2021-47142: Fix not seen in stream +CVE-2021-47143: Fix not seen in stream +CVE-2021-47144: Fix not seen in stream +CVE-2021-47145: Fix not seen in stream +CVE-2021-47146: Fix not seen in stream +CVE-2021-47147: Fix not seen in stream +CVE-2021-47149: Fix not seen in stream +CVE-2021-47150: Fix not seen in stream +CVE-2021-47151: Fix not seen in stream +CVE-2021-47152: Fix not seen in stream +CVE-2021-47153: Fix not seen in stream +CVE-2021-47158: Fix not seen in stream +CVE-2021-47159: Fix not seen in stream +CVE-2021-47160: Fix not seen in stream +CVE-2021-47161: Fix not seen in stream +CVE-2021-47162: Fix not seen in stream +CVE-2021-47163: Fix not seen in stream +CVE-2021-47165: Fix not seen in stream +CVE-2021-47166: Fix not seen in stream +CVE-2021-47167: Fix not seen in stream +CVE-2021-47168: Fix not seen in stream +CVE-2021-47169: Fix not seen in stream +CVE-2021-47170: Fix not seen in stream +CVE-2021-47171: Fix not seen in stream +CVE-2021-47172: Fix not seen in stream +CVE-2021-47173: Fix not seen in stream +CVE-2021-47174: Fix not seen in stream +CVE-2021-47175: Fix not seen in stream +CVE-2021-47177: Fix not seen in stream +CVE-2021-47179: Fix not seen in stream +CVE-2021-47180: Fix not seen in stream CVE-2022-0001: Fix not seen in stream CVE-2022-0002: Fix not seen in stream CVE-2022-0168: Fix not seen in stream @@ -563,6 +735,10 @@ CVE-2022-47521: Fix not seen in stream CVE-2022-47929: Fix not seen in stream CVE-2022-47946: Fix not seen in stream CVE-2022-48619: Fix not seen in stream +CVE-2022-48626: Fix not seen in stream +CVE-2022-48627: Fix not seen in stream +CVE-2022-48628: Fix not seen in stream +CVE-2022-48629: Fix not seen in stream CVE-2023-0045: Fix not seen in stream CVE-2023-0047: Fix not seen in stream CVE-2023-0160: Fix not seen in stream @@ -645,6 +821,7 @@ CVE-2023-28327: Fix not seen in stream CVE-2023-28328: Fix not seen in stream CVE-2023-28466: Fix not seen in stream CVE-2023-2860: Fix not seen in stream +CVE-2023-28746: Fix not seen in stream CVE-2023-28772: Fix not seen in stream CVE-2023-2985: Fix not seen in stream CVE-2023-3006: Fix not seen in stream @@ -725,7 +902,7 @@ CVE-2023-4622: Fix not seen in stream CVE-2023-4623: Fix not seen in stream CVE-2023-46343: Fix not seen in stream CVE-2023-46838: Fix not seen in stream -CVE-2023-47233: Fix unknown +CVE-2023-47233: Fix not seen in stream CVE-2023-4732: Fix not seen in stream CVE-2023-4881: Fix not seen in stream CVE-2023-4921: Fix not seen in stream @@ -751,19 +928,122 @@ CVE-2023-52448: Fix not seen in stream CVE-2023-52449: Fix not seen in stream CVE-2023-52451: Fix not seen in stream CVE-2023-52454: Fix not seen in stream -CVE-2023-52456: Fix not seen in stream -CVE-2023-52457: Fix not seen in stream CVE-2023-52458: Fix not seen in stream CVE-2023-52464: Fix not seen in stream +CVE-2023-52469: Fix not seen in stream +CVE-2023-52470: Fix not seen in stream +CVE-2023-52474: Fix not seen in stream +CVE-2023-52475: Fix not seen in stream +CVE-2023-52476: Fix not seen in stream +CVE-2023-52477: Fix not seen in stream +CVE-2023-52478: Fix not seen in stream +CVE-2023-52479: Fix not seen in stream +CVE-2023-52480: Fix not seen in stream +CVE-2023-52481: Fix not seen in stream +CVE-2023-52482: Fix not seen in stream +CVE-2023-52484: Fix not seen in stream +CVE-2023-52485: Fix not seen in stream +CVE-2023-52486: Fix not seen in stream +CVE-2023-52488: Fix not seen in stream +CVE-2023-52489: Fix not seen in stream +CVE-2023-52491: Fix not seen in stream +CVE-2023-52492: Fix not seen in stream +CVE-2023-52493: Fix not seen in stream +CVE-2023-52497: Fix not seen in stream +CVE-2023-52498: Fix not seen in stream +CVE-2023-52500: Fix not seen in stream +CVE-2023-52501: Fix not seen in stream +CVE-2023-52502: Fix not seen in stream +CVE-2023-52503: Fix not seen in stream +CVE-2023-52504: Fix not seen in stream +CVE-2023-52506: Fix not seen in stream +CVE-2023-52507: Fix not seen in stream +CVE-2023-52508: Fix not seen in stream +CVE-2023-52509: Fix not seen in stream +CVE-2023-52510: Fix not seen in stream +CVE-2023-52511: Fix not seen in stream +CVE-2023-52513: Fix not seen in stream +CVE-2023-52515: Fix not seen in stream +CVE-2023-52516: Fix not seen in stream +CVE-2023-52517: Fix not seen in stream +CVE-2023-52519: Fix not seen in stream +CVE-2023-52522: Fix not seen in stream +CVE-2023-52527: Fix not seen in stream +CVE-2023-52528: Fix not seen in stream +CVE-2023-52530: Fix not seen in stream +CVE-2023-52531: Fix not seen in stream +CVE-2023-52532: Fix not seen in stream +CVE-2023-52559: Fix not seen in stream +CVE-2023-52561: Fix not seen in stream +CVE-2023-52563: Fix not seen in stream +CVE-2023-52565: Fix not seen in stream +CVE-2023-52566: Fix not seen in stream +CVE-2023-52568: Fix not seen in stream +CVE-2023-52569: Fix not seen in stream +CVE-2023-52571: Fix not seen in stream +CVE-2023-52572: Fix not seen in stream +CVE-2023-52573: Fix not seen in stream +CVE-2023-52574: Fix not seen in stream +CVE-2023-52578: Fix not seen in stream +CVE-2023-52583: Fix not seen in stream +CVE-2023-52584: Fix not seen in stream +CVE-2023-52585: Fix not seen in stream +CVE-2023-52586: Fix not seen in stream +CVE-2023-52587: Fix not seen in stream +CVE-2023-52588: Fix not seen in stream +CVE-2023-52589: Fix not seen in stream +CVE-2023-52590: Fix not seen in stream +CVE-2023-52591: Fix not seen in stream +CVE-2023-52593: Fix not seen in stream +CVE-2023-52594: Fix not seen in stream +CVE-2023-52595: Fix not seen in stream +CVE-2023-52596: Fix not seen in stream +CVE-2023-52597: Fix not seen in stream +CVE-2023-52598: Fix not seen in stream +CVE-2023-52599: Fix not seen in stream +CVE-2023-52600: Fix not seen in stream +CVE-2023-52601: Fix not seen in stream +CVE-2023-52602: Fix not seen in stream +CVE-2023-52603: Fix not seen in stream +CVE-2023-52604: Fix not seen in stream +CVE-2023-52606: Fix not seen in stream +CVE-2023-52607: Fix not seen in stream +CVE-2023-52608: Fix not seen in stream +CVE-2023-52609: Fix not seen in stream +CVE-2023-52610: Fix not seen in stream +CVE-2023-52612: Fix not seen in stream +CVE-2023-52614: Fix not seen in stream +CVE-2023-52615: Fix not seen in stream +CVE-2023-52617: Fix not seen in stream +CVE-2023-52618: Fix not seen in stream +CVE-2023-52619: Fix not seen in stream +CVE-2023-52620: Fix not seen in stream +CVE-2023-52621: Fix not seen in stream +CVE-2023-52622: Fix not seen in stream +CVE-2023-52623: Fix not seen in stream +CVE-2023-52624: Fix not seen in stream +CVE-2023-52625: Fix not seen in stream +CVE-2023-52627: Fix not seen in stream +CVE-2023-52628: Fix not seen in stream +CVE-2023-52629: Fix not seen in stream +CVE-2023-52632: Fix not seen in stream +CVE-2023-52633: Fix not seen in stream +CVE-2023-52634: Fix not seen in stream +CVE-2023-52635: Fix not seen in stream +CVE-2023-52637: Fix not seen in stream +CVE-2023-52638: Fix not seen in stream +CVE-2023-52639: Fix not seen in stream +CVE-2023-52640: Fix not seen in stream +CVE-2023-52641: Fix not seen in stream CVE-2023-5717: Fix not seen in stream CVE-2023-6040: Fix not seen in stream CVE-2023-6121: Fix not seen in stream CVE-2023-6176: Fix not seen in stream CVE-2023-6240: Fix unknown -CVE-2023-6270: Fix unknown -CVE-2023-6356: Fix unknown +CVE-2023-6270: Fix not seen in stream +CVE-2023-6356: Fix not seen in stream CVE-2023-6535: Fix unknown -CVE-2023-6536: Fix unknown +CVE-2023-6536: Fix not seen in stream CVE-2023-6546: Fix not seen in stream CVE-2023-6560: Fix not seen in stream CVE-2023-6606: Fix not seen in stream @@ -772,7 +1052,7 @@ CVE-2023-6817: Fix not seen in stream CVE-2023-6915: Fix not seen in stream CVE-2023-6931: Fix not seen in stream CVE-2023-6932: Fix not seen in stream -CVE-2023-7042: Fix unknown +CVE-2023-7042: Fix not seen in stream CVE-2023-7192: Fix not seen in stream CVE-2024-0340: Fix not seen in stream CVE-2024-0564: Fix unknown @@ -782,15 +1062,16 @@ CVE-2024-0607: Fix not seen in stream CVE-2024-0641: Fix not seen in stream CVE-2024-0646: Fix not seen in stream CVE-2024-0775: Fix not seen in stream -CVE-2024-0841: Fix unknown +CVE-2024-0841: Fix not seen in stream CVE-2024-1086: Fix not seen in stream CVE-2024-1151: Fix not seen in stream CVE-2024-1312: Fix not seen in stream CVE-2024-21803: Fix unknown -CVE-2024-22099: Fix unknown +CVE-2024-2193: Fix unknown +CVE-2024-22099: Fix not seen in stream CVE-2024-22386: Fix unknown -CVE-2024-23196: Fix unknown -CVE-2024-23307: Fix unknown +CVE-2024-23196: Fix not seen in stream +CVE-2024-23307: Fix not seen in stream CVE-2024-23848: Fix unknown CVE-2024-23849: Fix not seen in stream CVE-2024-23851: Fix not seen in stream @@ -799,7 +1080,7 @@ CVE-2024-24857: Fix unknown CVE-2024-24858: Fix unknown CVE-2024-24859: Fix unknown CVE-2024-24860: Fix not seen in stream -CVE-2024-24861: Fix unknown +CVE-2024-24861: Fix not seen in stream CVE-2024-24864: Fix unknown CVE-2024-25739: Fix unknown CVE-2024-25740: Fix unknown @@ -809,13 +1090,126 @@ CVE-2024-26583: Fix not seen in stream CVE-2024-26584: Fix not seen in stream CVE-2024-26585: Fix not seen in stream CVE-2024-26586: Fix not seen in stream -CVE-2024-26587: Fix not seen in stream -CVE-2024-26588: Fix not seen in stream CVE-2024-26589: Fix not seen in stream -CVE-2024-26591: Fix not seen in stream CVE-2024-26592: Fix not seen in stream CVE-2024-26593: Fix not seen in stream CVE-2024-26594: Fix not seen in stream CVE-2024-26595: Fix not seen in stream CVE-2024-26597: Fix not seen in stream CVE-2024-26598: Fix not seen in stream +CVE-2024-26600: Fix not seen in stream +CVE-2024-26602: Fix not seen in stream +CVE-2024-26606: Fix not seen in stream +CVE-2024-26607: Fix not seen in stream +CVE-2024-26610: Fix not seen in stream +CVE-2024-26614: Fix not seen in stream +CVE-2024-26615: Fix not seen in stream +CVE-2024-26622: Fix not seen in stream +CVE-2024-26623: Fix not seen in stream +CVE-2024-26625: Fix not seen in stream +CVE-2024-26627: Fix not seen in stream +CVE-2024-26633: Fix not seen in stream +CVE-2024-26635: Fix not seen in stream +CVE-2024-26636: Fix not seen in stream +CVE-2024-26640: Fix not seen in stream +CVE-2024-26641: Fix not seen in stream +CVE-2024-26642: Fix not seen in stream +CVE-2024-26644: Fix not seen in stream +CVE-2024-26645: Fix not seen in stream +CVE-2024-26646: Fix not seen in stream +CVE-2024-26647: Fix not seen in stream +CVE-2024-26648: Fix not seen in stream +CVE-2024-26650: Fix not seen in stream +CVE-2024-26651: Fix not seen in stream +CVE-2024-26654: Fix not seen in stream +CVE-2024-26655: Fix not seen in stream +CVE-2024-26656: Fix not seen in stream +CVE-2024-26658: Fix not seen in stream +CVE-2024-26659: Fix not seen in stream +CVE-2024-26663: Fix not seen in stream +CVE-2024-26664: Fix not seen in stream +CVE-2024-26668: Fix not seen in stream +CVE-2024-26669: Fix not seen in stream +CVE-2024-26671: Fix not seen in stream +CVE-2024-26672: Fix not seen in stream +CVE-2024-26673: Fix not seen in stream +CVE-2024-26675: Fix not seen in stream +CVE-2024-26676: Fix not seen in stream +CVE-2024-26677: Fix not seen in stream +CVE-2024-26679: Fix not seen in stream +CVE-2024-26680: Fix not seen in stream +CVE-2024-26684: Fix not seen in stream +CVE-2024-26685: Fix not seen in stream +CVE-2024-26686: Fix not seen in stream +CVE-2024-26687: Fix not seen in stream +CVE-2024-26688: Fix not seen in stream +CVE-2024-26689: Fix not seen in stream +CVE-2024-26691: Fix not seen in stream +CVE-2024-26696: Fix not seen in stream +CVE-2024-26697: Fix not seen in stream +CVE-2024-26699: Fix not seen in stream +CVE-2024-26700: Fix not seen in stream +CVE-2024-26702: Fix not seen in stream +CVE-2024-26704: Fix not seen in stream +CVE-2024-26706: Fix not seen in stream +CVE-2024-26712: Fix not seen in stream +CVE-2024-26713: Fix not seen in stream +CVE-2024-26715: Fix not seen in stream +CVE-2024-26719: Fix not seen in stream +CVE-2024-26720: Fix not seen in stream +CVE-2024-26726: Fix not seen in stream +CVE-2024-26733: Fix not seen in stream +CVE-2024-26735: Fix not seen in stream +CVE-2024-26736: Fix not seen in stream +CVE-2024-26738: Fix not seen in stream +CVE-2024-26739: Fix not seen in stream +CVE-2024-26740: Fix not seen in stream +CVE-2024-26743: Fix not seen in stream +CVE-2024-26744: Fix not seen in stream +CVE-2024-26745: Fix not seen in stream +CVE-2024-26747: Fix not seen in stream +CVE-2024-26748: Fix not seen in stream +CVE-2024-26749: Fix not seen in stream +CVE-2024-26751: Fix not seen in stream +CVE-2024-26752: Fix not seen in stream +CVE-2024-26754: Fix not seen in stream +CVE-2024-26756: Fix not seen in stream +CVE-2024-26757: Fix not seen in stream +CVE-2024-26758: Fix not seen in stream +CVE-2024-26759: Fix not seen in stream +CVE-2024-26763: Fix not seen in stream +CVE-2024-26764: Fix not seen in stream +CVE-2024-26765: Fix not seen in stream +CVE-2024-26766: Fix not seen in stream +CVE-2024-26767: Fix not seen in stream +CVE-2024-26768: Fix not seen in stream +CVE-2024-26769: Fix not seen in stream +CVE-2024-26770: Fix not seen in stream +CVE-2024-26771: Fix not seen in stream +CVE-2024-26772: Fix not seen in stream +CVE-2024-26773: Fix not seen in stream +CVE-2024-26774: Fix not seen in stream +CVE-2024-26775: Fix not seen in stream +CVE-2024-26776: Fix not seen in stream +CVE-2024-26777: Fix not seen in stream +CVE-2024-26778: Fix not seen in stream +CVE-2024-26779: Fix not seen in stream +CVE-2024-26782: Fix not seen in stream +CVE-2024-26784: Fix not seen in stream +CVE-2024-26787: Fix not seen in stream +CVE-2024-26788: Fix not seen in stream +CVE-2024-26789: Fix not seen in stream +CVE-2024-26790: Fix not seen in stream +CVE-2024-26791: Fix not seen in stream +CVE-2024-26793: Fix not seen in stream +CVE-2024-26795: Fix not seen in stream +CVE-2024-26797: Fix not seen in stream +CVE-2024-26798: Fix not seen in stream +CVE-2024-26801: Fix not seen in stream +CVE-2024-26802: Fix not seen in stream +CVE-2024-26803: Fix not seen in stream +CVE-2024-26804: Fix not seen in stream +CVE-2024-26805: Fix not seen in stream +CVE-2024-26806: Fix not seen in stream +CVE-2024-26808: Fix not seen in stream +CVE-2024-26809: Fix not seen in stream diff --git a/data/5.7/5.7_security.txt b/data/5.7/5.7_security.txt index 58a8226ce..10bee1e68 100644 --- a/data/5.7/5.7_security.txt +++ b/data/5.7/5.7_security.txt @@ -98,6 +98,7 @@ Outstanding CVEs: CVE-2019-19449: (unk) f2fs: fix to do sanity check on segment/section count CVE-2019-19814: (unk) CVE-2019-20794: (unk) + CVE-2019-25162: (unk) i2c: Fix a potential use after free CVE-2020-0347: (unk) CVE-2020-0423: (unk) binder: fix UAF when releasing todo list CVE-2020-0465: (unk) HID: core: Sanitize event code and type when mapping input @@ -190,6 +191,15 @@ Outstanding CVEs: CVE-2020-36691: (unk) netlink: limit recursion depth in policy validation CVE-2020-36694: (unk) netfilter: x_tables: Switch synchronization to RCU CVE-2020-36766: (unk) cec-api: prevent leaking memory through hole in structure + CVE-2020-36777: (unk) media: dvbdev: Fix memory leak in dvb_media_device_free() + CVE-2020-36778: (unk) i2c: xiic: fix reference leak when pm_runtime_get_sync fails + CVE-2020-36779: (unk) i2c: stm32f7: fix reference leak when pm_runtime_get_sync fails + CVE-2020-36780: (unk) i2c: sprd: fix reference leak when pm_runtime_get_sync fails + CVE-2020-36781: (unk) i2c: imx: fix reference leak when pm_runtime_get_sync fails + CVE-2020-36782: (unk) i2c: imx-lpi2c: fix reference leak when pm_runtime_get_sync fails + CVE-2020-36783: (unk) i2c: img-scb: fix reference leak when pm_runtime_get_sync fails + CVE-2020-36784: (unk) i2c: cadence: fix reference leak when pm_runtime_get_sync fails + CVE-2020-36787: (unk) media: aspeed: fix clock handling logic CVE-2020-3702: (unk) ath: Use safer key clearing with key cache entries CVE-2020-4788: (unk) powerpc/64s: flush L1D on kernel entry CVE-2020-8694: (unk) powercap: restrict energy meter to root access @@ -362,6 +372,168 @@ Outstanding CVEs: CVE-2021-45486: (unk) inet: use bigger hash table for IP ID generation CVE-2021-45868: (unk) quota: check block number when reading the block in quota file CVE-2021-46283: (unk) netfilter: nf_tables: initialize set before expression setup + CVE-2021-46904: (unk) net: hso: fix null-ptr-deref during tty device unregistration + CVE-2021-46906: (unk) HID: usbhid: fix info leak in hid_submit_ctrl + CVE-2021-46908: (unk) bpf: Use correct permission flag for mixed signed bounds arithmetic + CVE-2021-46909: (unk) ARM: footbridge: fix PCI interrupt mapping + CVE-2021-46911: (unk) ch_ktls: Fix kernel panic + CVE-2021-46912: (unk) net: Make tcp_allowed_congestion_control readonly in non-init netns + CVE-2021-46913: (unk) netfilter: nftables: clone set element expression template + CVE-2021-46915: (unk) netfilter: nft_limit: avoid possible divide error in nft_limit_init + CVE-2021-46919: (unk) dmaengine: idxd: fix wq size store permission state + CVE-2021-46920: (unk) dmaengine: idxd: Fix clobbering of SWERR overflow bit on writeback + CVE-2021-46921: (unk) locking/qrwlock: Fix ordering in queued_write_lock_slowpath() + CVE-2021-46924: (unk) NFC: st21nfca: Fix memory leak in device probe and remove + CVE-2021-46925: (unk) net/smc: fix kernel panic caused by race of smc_sock + CVE-2021-46926: (unk) ALSA: hda: intel-sdw-acpi: harden detection of controller + CVE-2021-46928: (unk) parisc: Clear stale IIR value on instruction access rights trap + CVE-2021-46929: (unk) sctp: use call_rcu to free endpoint + CVE-2021-46930: (unk) usb: mtu3: fix list_head check warning + CVE-2021-46931: (unk) net/mlx5e: Wrap the tx reporter dump callback to extract the sq + CVE-2021-46932: (unk) Input: appletouch - initialize work before device registration + CVE-2021-46933: (unk) usb: gadget: f_fs: Clear ffs_eventfd in ffs_data_clear. + CVE-2021-46934: (unk) i2c: validate user data in compat ioctl + CVE-2021-46935: (unk) binder: fix async_free_space accounting for empty parcels + CVE-2021-46936: (unk) net: fix use-after-free in tw_timer_handler + CVE-2021-46938: (unk) dm rq: fix double free of blk_mq_tag_set in dev remove after table load fails + CVE-2021-46939: (unk) tracing: Restructure trace_clock_global() to never block + CVE-2021-46941: (unk) usb: dwc3: core: Do core softreset when switch mode + CVE-2021-46943: (unk) media: staging/intel-ipu3: Fix set_fmt error handling + CVE-2021-46944: (unk) media: staging/intel-ipu3: Fix memory leak in imu_fmt + CVE-2021-46950: (unk) md/raid1: properly indicate failure when ending a failed write request + CVE-2021-46951: (unk) tpm: efi: Use local variable for calculating final log size + CVE-2021-46952: (unk) NFS: fs_context: validate UDP retrans to prevent shift out-of-bounds + CVE-2021-46953: (unk) ACPI: GTDT: Don't corrupt interrupt mappings on watchdow probe failure + CVE-2021-46955: (unk) openvswitch: fix stack OOB read while fragmenting IPv4 packets + CVE-2021-46956: (unk) virtiofs: fix memory leak in virtio_fs_probe() + CVE-2021-46958: (unk) btrfs: fix race between transaction aborts and fsyncs leading to use-after-free + CVE-2021-46959: (unk) spi: Fix use-after-free with devm_spi_alloc_* + CVE-2021-46960: (unk) cifs: Return correct error code from smb2_get_enc_key + CVE-2021-46961: (unk) irqchip/gic-v3: Do not enable irqs when handling spurious interrups + CVE-2021-46962: (unk) mmc: uniphier-sd: Fix a resource leak in the remove function + CVE-2021-46963: (unk) scsi: qla2xxx: Fix crash in qla2xxx_mqueuecommand() + CVE-2021-46965: (unk) mtd: physmap: physmap-bt1-rom: Fix unintentional stack access + CVE-2021-46966: (unk) ACPI: custom_method: fix potential use-after-free issue + CVE-2021-46969: (unk) bus: mhi: core: Fix invalid error returning in mhi_queue + CVE-2021-46970: (unk) bus: mhi: pci_generic: Remove WQ_MEM_RECLAIM flag from state workqueue + CVE-2021-46971: (unk) perf/core: Fix unconditional security_locked_down() call + CVE-2021-46974: (unk) bpf: Fix masking negation logic upon negative dst register + CVE-2021-46977: (unk) KVM: VMX: Disable preemption when probing user return MSRs + CVE-2021-46981: (unk) nbd: Fix NULL pointer in flush_workqueue + CVE-2021-46982: (unk) f2fs: compress: fix race condition of overwrite vs truncate + CVE-2021-46984: (unk) kyber: fix out of bounds access when preempted + CVE-2021-46988: (unk) userfaultfd: release page in error path to avoid BUG_ON + CVE-2021-46989: (unk) hfsplus: prevent corruption in shrinking truncate + CVE-2021-46991: (unk) i40e: Fix use-after-free in i40e_client_subtask() + CVE-2021-46992: (unk) netfilter: nftables: avoid overflows in nft_hash_buckets() + CVE-2021-46993: (unk) sched: Fix out-of-bound access in uclamp + CVE-2021-46994: (unk) can: mcp251x: fix resume from sleep before interface was brought up + CVE-2021-46998: (unk) ethernet:enic: Fix a use after free bug in enic_hard_start_xmit + CVE-2021-46999: (unk) sctp: do asoc update earlier in sctp_sf_do_dupcook_a + CVE-2021-47001: (unk) xprtrdma: Fix cwnd update ordering + CVE-2021-47004: (unk) f2fs: fix to avoid touching checkpointed data in get_victim() + CVE-2021-47005: (unk) PCI: endpoint: Fix NULL pointer dereference for ->get_features() + CVE-2021-47006: (unk) ARM: 9064/1: hw_breakpoint: Do not directly check the event's overflow_handler hook + CVE-2021-47010: (unk) net: Only allow init netns to set default tcp cong to a restricted algo + CVE-2021-47012: (unk) RDMA/siw: Fix a use after free in siw_alloc_mr + CVE-2021-47013: (unk) net:emac/emac-mac: Fix a use after free in emac_mac_tx_buf_send + CVE-2021-47015: (unk) bnxt_en: Fix RX consumer index logic in the error path. + CVE-2021-47016: (unk) m68k: mvme147,mvme16x: Don't wipe PCC timer config bits + CVE-2021-47018: (unk) powerpc/64: Fix the definition of the fixmap area + CVE-2021-47020: (unk) soundwire: stream: fix memory leak in stream config error path + CVE-2021-47024: (unk) vsock/virtio: free queued packets when closing socket + CVE-2021-47028: (unk) mt76: mt7915: fix txrate reporting + CVE-2021-47034: (unk) powerpc/64s: Fix pte update for kernel memory on radix + CVE-2021-47035: (unk) iommu/vt-d: Remove WO permissions on second-level paging entries + CVE-2021-47036: (unk) udp: skip L4 aggregation for UDP tunnel packets + CVE-2021-47038: (unk) Bluetooth: avoid deadlock between hci_dev->lock and socket lock + CVE-2021-47041: (unk) nvmet-tcp: fix incorrect locking in state_change sk callback + CVE-2021-47043: (unk) media: venus: core: Fix some resource leaks in the error path of 'venus_probe()' + CVE-2021-47046: (unk) drm/amd/display: Fix off by one in hdmi_14_process_transaction() + CVE-2021-47049: (unk) Drivers: hv: vmbus: Use after free in __vmbus_open() + CVE-2021-47051: (unk) spi: fsl-lpspi: Fix PM reference leak in lpspi_prepare_xfer_hardware() + CVE-2021-47052: (unk) crypto: sa2ul - Fix memory leak of rxd + CVE-2021-47054: (unk) bus: qcom: Put child node before return + CVE-2021-47056: (unk) crypto: qat - ADF_STATUS_PF_RUNNING should be set after adf_dev_init + CVE-2021-47059: (unk) crypto: sun8i-ss - fix result memory leak on error path + CVE-2021-47063: (unk) drm: bridge/panel: Cleanup connector on bridge detach + CVE-2021-47065: (unk) rtw88: Fix array overrun in rtw_get_tx_power_params() + CVE-2021-47067: (unk) soc/tegra: regulators: Fix locking up when voltage-spread is out of range + CVE-2021-47069: (unk) ipc/mqueue, msg, sem: avoid relying on a stack reference past its expiry + CVE-2021-47070: (unk) uio_hv_generic: Fix another memory leak in error handling paths + CVE-2021-47071: (unk) uio_hv_generic: Fix a memory leak in error handling paths + CVE-2021-47073: (unk) platform/x86: dell-smbios-wmi: Fix oops on rmmod dell_smbios + CVE-2021-47074: (unk) nvme-loop: fix memory leak in nvme_loop_create_ctrl() + CVE-2021-47075: (unk) nvmet: fix memory leak in nvmet_alloc_ctrl() + CVE-2021-47076: (unk) RDMA/rxe: Return CQE error if invalid lkey was supplied + CVE-2021-47077: (unk) scsi: qedf: Add pointer checks in qedf_update_link_speed() + CVE-2021-47078: (unk) RDMA/rxe: Clear all QP fields if creation failed + CVE-2021-47082: (unk) tun: avoid double free in tun_free_netdev + CVE-2021-47083: (unk) pinctrl: mediatek: fix global-out-of-bounds issue + CVE-2021-47086: (unk) phonet/pep: refuse to enable an unbound pipe + CVE-2021-47095: (unk) ipmi: ssif: initialize ssif_info->client early + CVE-2021-47100: (unk) ipmi: Fix UAF when uninstall ipmi_si and ipmi_msghandler module + CVE-2021-47101: (unk) asix: fix uninit-value in asix_mdio_read() + CVE-2021-47103: (unk) inet: fully convert sk->sk_rx_dst to RCU rules + CVE-2021-47105: (unk) ice: xsk: return xsk buffers back to pool when cleaning the ring + CVE-2021-47109: (unk) neighbour: allow NUD_NOARP entries to be forced GCed + CVE-2021-47110: (unk) x86/kvm: Disable kvmclock on all CPUs on shutdown + CVE-2021-47111: (unk) xen-netback: take a reference to the RX task thread + CVE-2021-47112: (unk) x86/kvm: Teardown PV features on boot CPU as well + CVE-2021-47113: (unk) btrfs: abort in rename_exchange if we fail to insert the second ref + CVE-2021-47114: (unk) ocfs2: fix data corruption by fallocate + CVE-2021-47116: (unk) ext4: fix memory leak in ext4_mb_init_backend on error path. + CVE-2021-47117: (unk) ext4: fix bug on in ext4_es_cache_extent as ext4_split_extent_at failed + CVE-2021-47118: (unk) pid: take a reference when initializing `cad_pid` + CVE-2021-47119: (unk) ext4: fix memory leak in ext4_fill_super + CVE-2021-47120: (unk) HID: magicmouse: fix NULL-deref on disconnect + CVE-2021-47121: (unk) net: caif: fix memory leak in cfusbl_device_notify + CVE-2021-47122: (unk) net: caif: fix memory leak in caif_device_notify + CVE-2021-47124: (unk) io_uring: fix link timeout refs + CVE-2021-47125: (unk) sch_htb: fix refcount leak in htb_parent_to_leaf_offload + CVE-2021-47126: (unk) ipv6: Fix KASAN: slab-out-of-bounds Read in fib6_nh_flush_exceptions + CVE-2021-47128: (unk) bpf, lockdown, audit: Fix buggy SELinux lockdown permission checks + CVE-2021-47129: (unk) netfilter: nft_ct: skip expectations for confirmed conntrack + CVE-2021-47131: (unk) net/tls: Fix use-after-free after the TLS device goes down and up + CVE-2021-47133: (unk) HID: amd_sfh: Fix memory leak in amd_sfh_work + CVE-2021-47135: (unk) mt76: mt7921: fix possible AOOB issue in mt7921_mcu_tx_rate_report + CVE-2021-47136: (unk) net: zero-initialize tc skb extension on allocation + CVE-2021-47137: (unk) net: lantiq: fix memory corruption in RX ring + CVE-2021-47138: (unk) cxgb4: avoid accessing registers when clearing filters + CVE-2021-47139: (unk) net: hns3: put off calling register_netdev() until client initialize complete + CVE-2021-47140: (unk) iommu/amd: Clear DMA ops when switching domain + CVE-2021-47141: (unk) gve: Add NULL pointer checks when freeing irqs. + CVE-2021-47142: (unk) drm/amdgpu: Fix a use-after-free + CVE-2021-47143: (unk) net/smc: remove device from smcd_dev_list after failed device_add() + CVE-2021-47144: (unk) drm/amd/amdgpu: fix refcount leak + CVE-2021-47145: (unk) btrfs: do not BUG_ON in link_to_fixup_dir + CVE-2021-47146: (unk) mld: fix panic in mld_newpack() + CVE-2021-47147: (unk) ptp: ocp: Fix a resource leak in an error handling path + CVE-2021-47149: (unk) net: fujitsu: fix potential null-ptr-deref + CVE-2021-47150: (unk) net: fec: fix the potential memory leak in fec_enet_init() + CVE-2021-47151: (unk) interconnect: qcom: bcm-voter: add a missing of_node_put() + CVE-2021-47152: (unk) mptcp: fix data stream corruption + CVE-2021-47153: (unk) i2c: i801: Don't generate an interrupt on bus reset + CVE-2021-47158: (unk) net: dsa: sja1105: add error handling in sja1105_setup() + CVE-2021-47159: (unk) net: dsa: fix a crash if ->get_sset_count() fails + CVE-2021-47160: (unk) net: dsa: mt7530: fix VLAN traffic leaks + CVE-2021-47161: (unk) spi: spi-fsl-dspi: Fix a resource leak in an error handling path + CVE-2021-47162: (unk) tipc: skb_linearize the head skb when reassembling msgs + CVE-2021-47163: (unk) tipc: wait and exit until all work queues are done + CVE-2021-47165: (unk) drm/meson: fix shutdown crash when component not probed + CVE-2021-47166: (unk) NFS: Don't corrupt the value of pg_bytes_written in nfs_do_recoalesce() + CVE-2021-47167: (unk) NFS: Fix an Oopsable condition in __nfs_pageio_add_request() + CVE-2021-47168: (unk) NFS: fix an incorrect limit in filelayout_decode_layout() + CVE-2021-47169: (unk) serial: rp2: use 'request_firmware' instead of 'request_firmware_nowait' + CVE-2021-47170: (unk) USB: usbfs: Don't WARN about excessively large memory allocations + CVE-2021-47171: (unk) net: usb: fix memory leak in smsc75xx_bind + CVE-2021-47172: (unk) iio: adc: ad7124: Fix potential overflow due to non sequential channel numbers + CVE-2021-47173: (unk) misc/uss720: fix memory leak in uss720_probe + CVE-2021-47174: (unk) netfilter: nft_set_pipapo_avx2: Add irq_fpu_usable() check, fallback to non-AVX2 version + CVE-2021-47175: (unk) net/sched: fq_pie: fix OOB access in the traffic path + CVE-2021-47177: (unk) iommu/vt-d: Fix sysfs leak in alloc_iommu() + CVE-2021-47179: (unk) NFSv4: Fix a NULL pointer dereference in pnfs_mark_matching_lsegs_return() + CVE-2021-47180: (unk) NFC: nci: fix memory leak in nci_allocate_device CVE-2022-0001: (unk) x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE CVE-2022-0002: (unk) x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE CVE-2022-0168: (unk) cifs: fix NULL ptr dereference in smb2_ioctl_query_info() @@ -597,6 +769,10 @@ Outstanding CVEs: CVE-2022-47929: (unk) net: sched: disallow noqueue for qdisc classes CVE-2022-47946: (unk) io_uring: kill sqo_dead and sqo submission halting CVE-2022-48619: (unk) Input: add bounds checking to input_set_capability() + CVE-2022-48626: (unk) moxart: fix potential use-after-free on remove path + CVE-2022-48627: (unk) vt: fix memory overlapping when deleting chars in the buffer + CVE-2022-48628: (unk) ceph: drop messages from MDS when unmounting + CVE-2022-48629: (unk) crypto: qcom-rng - ensure buffer for generate is completely filled CVE-2023-0045: (unk) x86/bugs: Flush IBP in ib_prctl_set() CVE-2023-0047: (unk) mm, oom: do not trigger out_of_memory from the #PF CVE-2023-0160: (unk) bpf, sockmap: fix deadlocks in the sockhash and sockmap @@ -679,6 +855,7 @@ Outstanding CVEs: CVE-2023-28328: (unk) media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer() CVE-2023-28466: (unk) net: tls: fix possible race condition between do_tls_getsockopt_conf() and do_tls_setsockopt_conf() CVE-2023-2860: (unk) ipv6: sr: fix out-of-bounds read when setting HMAC data. + CVE-2023-28746: (unk) x86/mmio: Disable KVM mitigation when X86_FEATURE_CLEAR_CPU_BUF is set CVE-2023-28772: (unk) seq_buf: Fix overflow in seq_buf_putmem_hex() CVE-2023-2985: (unk) fs: hfsplus: fix UAF issue in hfsplus_put_super CVE-2023-3006: (unk) arm64: Add AMPERE1 to the Spectre-BHB affected list @@ -759,7 +936,7 @@ Outstanding CVEs: CVE-2023-4623: (unk) net/sched: sch_hfsc: Ensure inner classes have fsc curve CVE-2023-46343: (unk) nfc: nci: fix possible NULL pointer dereference in send_acknowledge() CVE-2023-46838: (unk) xen-netback: don't produce zero-size SKB frags - CVE-2023-47233: (unk) + CVE-2023-47233: (unk) wifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach CVE-2023-4732: (unk) mm/userfaultfd: fix uffd-wp special cases for fork() CVE-2023-4881: (unk) netfilter: nftables: exthdr: fix 4-byte stack OOB write CVE-2023-4921: (unk) net: sched: sch_qfq: Fix UAF in qfq_dequeue() @@ -785,19 +962,122 @@ Outstanding CVEs: CVE-2023-52449: (unk) mtd: Fix gluebi NULL pointer dereference caused by ftl notifier CVE-2023-52451: (unk) powerpc/pseries/memhp: Fix access beyond end of drmem array CVE-2023-52454: (unk) nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length - CVE-2023-52456: (unk) serial: imx: fix tx statemachine deadlock - CVE-2023-52457: (unk) serial: 8250: omap: Don't skip resource freeing if pm_runtime_resume_and_get() failed CVE-2023-52458: (unk) block: add check that partition length needs to be aligned with block size CVE-2023-52464: (unk) EDAC/thunderx: Fix possible out-of-bounds string access + CVE-2023-52469: (unk) drivers/amd/pm: fix a use-after-free in kv_parse_power_table + CVE-2023-52470: (unk) drm/radeon: check the alloc_workqueue return value in radeon_crtc_init() + CVE-2023-52474: (unk) IB/hfi1: Fix bugs with non-PAGE_SIZE-end multi-iovec user SDMA requests + CVE-2023-52475: (unk) Input: powermate - fix use-after-free in powermate_config_complete + CVE-2023-52476: (unk) perf/x86/lbr: Filter vsyscall addresses + CVE-2023-52477: (unk) usb: hub: Guard against accesses to uninitialized BOS descriptors + CVE-2023-52478: (unk) HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect + CVE-2023-52479: (unk) ksmbd: fix uaf in smb20_oplock_break_ack + CVE-2023-52480: (unk) ksmbd: fix race condition between session lookup and expire + CVE-2023-52481: (unk) arm64: errata: Add Cortex-A520 speculative unprivileged load workaround + CVE-2023-52482: (unk) x86/srso: Add SRSO mitigation for Hygon processors + CVE-2023-52484: (unk) iommu/arm-smmu-v3: Fix soft lockup triggered by arm_smmu_mm_invalidate_range + CVE-2023-52485: (unk) drm/amd/display: Wake DMCUB before sending a command + CVE-2023-52486: (unk) drm: Don't unref the same fb many times by mistake due to deadlock handling + CVE-2023-52488: (unk) serial: sc16is7xx: convert from _raw_ to _noinc_ regmap functions for FIFO + CVE-2023-52489: (unk) mm/sparsemem: fix race in accessing memory_section->usage + CVE-2023-52491: (unk) media: mtk-jpeg: Fix use after free bug due to error path handling in mtk_jpeg_dec_device_run + CVE-2023-52492: (unk) dmaengine: fix NULL pointer in channel unregistration function + CVE-2023-52493: (unk) bus: mhi: host: Drop chan lock before queuing buffers + CVE-2023-52497: (unk) erofs: fix lz4 inplace decompression + CVE-2023-52498: (unk) PM: sleep: Fix possible deadlocks in core system-wide PM code + CVE-2023-52500: (unk) scsi: pm80xx: Avoid leaking tags when processing OPC_INB_SET_CONTROLLER_CONFIG command + CVE-2023-52501: (unk) ring-buffer: Do not attempt to read past "commit" + CVE-2023-52502: (unk) net: nfc: fix races in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn() + CVE-2023-52503: (unk) tee: amdtee: fix use-after-free vulnerability in amdtee_close_session + CVE-2023-52504: (unk) x86/alternatives: Disable KASAN in apply_alternatives() + CVE-2023-52506: (unk) LoongArch: Set all reserved memblocks on Node#0 at initialization + CVE-2023-52507: (unk) nfc: nci: assert requested protocol is valid + CVE-2023-52508: (unk) nvme-fc: Prevent null pointer dereference in nvme_fc_io_getuuid() + CVE-2023-52509: (unk) ravb: Fix use-after-free issue in ravb_tx_timeout_work() + CVE-2023-52510: (unk) ieee802154: ca8210: Fix a potential UAF in ca8210_probe + CVE-2023-52511: (unk) spi: sun6i: reduce DMA RX transfer width to single byte + CVE-2023-52513: (unk) RDMA/siw: Fix connection failure handling + CVE-2023-52515: (unk) RDMA/srp: Do not call scsi_done() from srp_abort() + CVE-2023-52516: (unk) dma-debug: don't call __dma_entry_alloc_check_leak() under free_entries_lock + CVE-2023-52517: (unk) spi: sun6i: fix race between DMA RX transfer completion and RX FIFO drain + CVE-2023-52519: (unk) HID: intel-ish-hid: ipc: Disable and reenable ACPI GPE bit + CVE-2023-52522: (unk) net: fix possible store tearing in neigh_periodic_work() + CVE-2023-52527: (unk) ipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data() + CVE-2023-52528: (unk) net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg + CVE-2023-52530: (unk) wifi: mac80211: fix potential key use-after-free + CVE-2023-52531: (unk) wifi: iwlwifi: mvm: Fix a memory corruption issue + CVE-2023-52532: (unk) net: mana: Fix TX CQE error handling + CVE-2023-52559: (unk) iommu/vt-d: Avoid memory allocation in iommu_suspend() + CVE-2023-52561: (unk) arm64: dts: qcom: sdm845-db845c: Mark cont splash memory region as reserved + CVE-2023-52563: (unk) drm/meson: fix memory leak on ->hpd_notify callback + CVE-2023-52565: (unk) media: uvcvideo: Fix OOB read + CVE-2023-52566: (unk) nilfs2: fix potential use after free in nilfs_gccache_submit_read_data() + CVE-2023-52568: (unk) x86/sgx: Resolves SECS reclaim vs. page fault for EAUG race + CVE-2023-52569: (unk) btrfs: remove BUG() after failure to insert delayed dir index item + CVE-2023-52571: (unk) power: supply: rk817: Fix node refcount leak + CVE-2023-52572: (unk) cifs: Fix UAF in cifs_demultiplex_thread() + CVE-2023-52573: (unk) net: rds: Fix possible NULL-pointer dereference + CVE-2023-52574: (unk) team: fix null-ptr-deref when team device type is changed + CVE-2023-52578: (unk) net: bridge: use DEV_STATS_INC() + CVE-2023-52583: (unk) ceph: fix deadlock or deadcode of misusing dget() + CVE-2023-52584: (unk) spmi: mediatek: Fix UAF on device remove + CVE-2023-52585: (unk) drm/amdgpu: Fix possible NULL dereference in amdgpu_ras_query_error_status_helper() + CVE-2023-52586: (unk) drm/msm/dpu: Add mutex lock in control vblank irq + CVE-2023-52587: (unk) IB/ipoib: Fix mcast list locking + CVE-2023-52588: (unk) f2fs: fix to tag gcing flag on page during block migration + CVE-2023-52589: (unk) media: rkisp1: Fix IRQ disable race issue + CVE-2023-52590: (unk) ocfs2: Avoid touching renamed directory if parent does not change + CVE-2023-52591: (unk) reiserfs: Avoid touching renamed directory if parent does not change + CVE-2023-52593: (unk) wifi: wfx: fix possible NULL pointer dereference in wfx_set_mfp_ap() + CVE-2023-52594: (unk) wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus() + CVE-2023-52595: (unk) wifi: rt2x00: restart beacon queue when hardware reset + CVE-2023-52596: (unk) sysctl: Fix out of bounds access for empty sysctl registers + CVE-2023-52597: (unk) KVM: s390: fix setting of fpc register + CVE-2023-52598: (unk) s390/ptrace: handle setting of fpc register correctly + CVE-2023-52599: (unk) jfs: fix array-index-out-of-bounds in diNewExt + CVE-2023-52600: (unk) jfs: fix uaf in jfs_evict_inode + CVE-2023-52601: (unk) jfs: fix array-index-out-of-bounds in dbAdjTree + CVE-2023-52602: (unk) jfs: fix slab-out-of-bounds Read in dtSearch + CVE-2023-52603: (unk) UBSAN: array-index-out-of-bounds in dtSplitRoot + CVE-2023-52604: (unk) FS:JFS:UBSAN:array-index-out-of-bounds in dbAdjTree + CVE-2023-52606: (unk) powerpc/lib: Validate size for vector operations + CVE-2023-52607: (unk) powerpc/mm: Fix null-pointer dereference in pgtable_cache_add + CVE-2023-52608: (unk) firmware: arm_scmi: Check mailbox/SMT channel for consistency + CVE-2023-52609: (unk) binder: fix race between mmput() and do_exit() + CVE-2023-52610: (unk) net/sched: act_ct: fix skb leak and crash on ooo frags + CVE-2023-52612: (unk) crypto: scomp - fix req->dst buffer overflow + CVE-2023-52614: (unk) PM / devfreq: Fix buffer overflow in trans_stat_show + CVE-2023-52615: (unk) hwrng: core - Fix page fault dead lock on mmap-ed hwrng + CVE-2023-52617: (unk) PCI: switchtec: Fix stdev_release() crash after surprise hot remove + CVE-2023-52618: (unk) block/rnbd-srv: Check for unlikely string overflow + CVE-2023-52619: (unk) pstore/ram: Fix crash when setting number of cpus to an odd number + CVE-2023-52620: (unk) netfilter: nf_tables: disallow timeout for anonymous sets + CVE-2023-52621: (unk) bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers + CVE-2023-52622: (unk) ext4: avoid online resizing failures due to oversized flex bg + CVE-2023-52623: (unk) SUNRPC: Fix a suspicious RCU usage warning + CVE-2023-52624: (unk) drm/amd/display: Wake DMCUB before executing GPINT commands + CVE-2023-52625: (unk) drm/amd/display: Refactor DMCUB enter/exit idle interface + CVE-2023-52627: (unk) iio: adc: ad7091r: Allow users to configure device events + CVE-2023-52628: (unk) netfilter: nftables: exthdr: fix 4-byte stack OOB write + CVE-2023-52629: (unk) sh: push-switch: Reorder cleanup operations to avoid use-after-free bug + CVE-2023-52632: (unk) drm/amdkfd: Fix lock dependency warning with srcu + CVE-2023-52633: (unk) um: time-travel: fix time corruption + CVE-2023-52634: (unk) drm/amd/display: Fix disable_otg_wa logic + CVE-2023-52635: (unk) PM / devfreq: Synchronize devfreq_monitor_[start/stop] + CVE-2023-52637: (unk) can: j1939: Fix UAF in j1939_sk_match_filter during setsockopt(SO_J1939_FILTER) + CVE-2023-52638: (unk) can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock + CVE-2023-52639: (unk) KVM: s390: vsie: fix race during shadow creation + CVE-2023-52640: (unk) fs/ntfs3: Fix oob in ntfs_listxattr + CVE-2023-52641: (unk) fs/ntfs3: Add NULL ptr dereference checking at the end of attr_allocate_frame() CVE-2023-5717: (unk) perf: Disallow mis-matched inherited group reads CVE-2023-6040: (unk) netfilter: nf_tables: Reject tables of unsupported family CVE-2023-6121: (unk) nvmet: nul-terminate the NQNs passed in the connect command CVE-2023-6176: (unk) net/tls: do not free tls_rec on async operation in bpf_exec_tx_verdict() CVE-2023-6240: (unk) - CVE-2023-6270: (unk) - CVE-2023-6356: (unk) + CVE-2023-6270: (unk) aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts + CVE-2023-6356: (unk) nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length CVE-2023-6535: (unk) - CVE-2023-6536: (unk) + CVE-2023-6536: (unk) nvmet-tcp: fix a crash in nvmet_req_complete() CVE-2023-6546: (unk) tty: n_gsm: fix the UAF caused by race condition in gsm_cleanup_mux CVE-2023-6560: (unk) io_uring: don't allow discontig pages for IORING_SETUP_NO_MMAP CVE-2023-6606: (unk) smb: client: fix OOB in smbCalcSize() @@ -806,7 +1086,7 @@ Outstanding CVEs: CVE-2023-6915: (unk) ida: Fix crash in ida_free when the bitmap is empty CVE-2023-6931: (unk) perf: Fix perf_event_validate_size() CVE-2023-6932: (unk) ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet - CVE-2023-7042: (unk) + CVE-2023-7042: (unk) wifi: ath10k: fix NULL pointer dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev() CVE-2023-7192: (unk) netfilter: ctnetlink: fix possible refcount leak in ctnetlink_create_conntrack() CVE-2024-0340: (unk) vhost: use kzalloc() instead of kmalloc() followed by memset() CVE-2024-0564: (unk) @@ -816,15 +1096,16 @@ Outstanding CVEs: CVE-2024-0641: (unk) tipc: fix a potential deadlock on &tx->lock CVE-2024-0646: (unk) net: tls, update curr on splice as well CVE-2024-0775: (unk) ext4: improve error recovery code paths in __ext4_remount() - CVE-2024-0841: (unk) + CVE-2024-0841: (unk) fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super CVE-2024-1086: (unk) netfilter: nf_tables: reject QUEUE/DROP verdict parameters CVE-2024-1151: (unk) net: openvswitch: limit the number of recursions from action sets CVE-2024-1312: (unk) mm: lock_vma_under_rcu() must check vma->anon_vma under vma lock CVE-2024-21803: (unk) - CVE-2024-22099: (unk) + CVE-2024-2193: (unk) + CVE-2024-22099: (unk) Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security CVE-2024-22386: (unk) - CVE-2024-23196: (unk) - CVE-2024-23307: (unk) + CVE-2024-23196: (unk) ALSA: hda: fix a possible null-pointer dereference due to data race in snd_hdac_regmap_sync() + CVE-2024-23307: (unk) md/raid5: fix atomicity violation in raid5_cache_count CVE-2024-23848: (unk) CVE-2024-23849: (unk) net/rds: Fix UBSAN: array-index-out-of-bounds in rds_cmsg_recv CVE-2024-23851: (unk) dm: limit the number of targets and parameter size area @@ -833,7 +1114,7 @@ Outstanding CVEs: CVE-2024-24858: (unk) CVE-2024-24859: (unk) CVE-2024-24860: (unk) Bluetooth: Fix atomicity violation in {min,max}_key_size_set - CVE-2024-24861: (unk) + CVE-2024-24861: (unk) media: xc4000: Fix atomicity violation in xc4000_get_frequency CVE-2024-24864: (unk) CVE-2024-25739: (unk) CVE-2024-25740: (unk) @@ -843,13 +1124,126 @@ Outstanding CVEs: CVE-2024-26584: (unk) net: tls: handle backlogging of crypto requests CVE-2024-26585: (unk) tls: fix race between tx work scheduling and socket close CVE-2024-26586: (unk) mlxsw: spectrum_acl_tcam: Fix stack corruption - CVE-2024-26587: (unk) net: netdevsim: don't try to destroy PHC on VFs - CVE-2024-26588: (unk) LoongArch: BPF: Prevent out-of-bounds memory access CVE-2024-26589: (unk) bpf: Reject variable offset alu on PTR_TO_FLOW_KEYS - CVE-2024-26591: (unk) bpf: Fix re-attachment branch in bpf_tracing_prog_attach CVE-2024-26592: (unk) ksmbd: fix UAF issue in ksmbd_tcp_new_connection() CVE-2024-26593: (unk) i2c: i801: Fix block process call transactions CVE-2024-26594: (unk) ksmbd: validate mech token in session setup CVE-2024-26595: (unk) mlxsw: spectrum_acl_tcam: Fix NULL pointer dereference in error path CVE-2024-26597: (unk) net: qualcomm: rmnet: fix global oob in rmnet_policy CVE-2024-26598: (unk) KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache + CVE-2024-26600: (unk) phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP + CVE-2024-26602: (unk) sched/membarrier: reduce the ability to hammer on sys_membarrier + CVE-2024-26606: (unk) binder: signal epoll threads of self-work + CVE-2024-26607: (unk) drm/bridge: sii902x: Fix probing race issue + CVE-2024-26610: (unk) wifi: iwlwifi: fix a memory corruption + CVE-2024-26614: (unk) tcp: make sure init the accept_queue's spinlocks once + CVE-2024-26615: (unk) net/smc: fix illegal rmb_desc access in SMC-D connection dump + CVE-2024-26622: (unk) tomoyo: fix UAF write bug in tomoyo_write_control() + CVE-2024-26623: (unk) pds_core: Prevent race issues involving the adminq + CVE-2024-26625: (unk) llc: call sock_orphan() at release time + CVE-2024-26627: (unk) scsi: core: Move scsi_host_busy() out of host lock for waking up EH handler + CVE-2024-26633: (unk) ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim() + CVE-2024-26635: (unk) llc: Drop support for ETH_P_TR_802_2. + CVE-2024-26636: (unk) llc: make llc_ui_sendmsg() more robust against bonding changes + CVE-2024-26640: (unk) tcp: add sanity checks to rx zerocopy + CVE-2024-26641: (unk) ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv() + CVE-2024-26642: (unk) netfilter: nf_tables: disallow anonymous set with timeout flag + CVE-2024-26644: (unk) btrfs: don't abort filesystem when attempting to snapshot deleted subvolume + CVE-2024-26645: (unk) tracing: Ensure visibility when inserting an element into tracing_map + CVE-2024-26646: (unk) thermal: intel: hfi: Add syscore callbacks for system-wide PM + CVE-2024-26647: (unk) drm/amd/display: Fix late derefrence 'dsc' check in 'link_set_dsc_pps_packet()' + CVE-2024-26648: (unk) drm/amd/display: Fix variable deferencing before NULL check in edp_setup_replay() + CVE-2024-26650: (unk) platform/x86: p2sb: Allow p2sb_bar() calls during PCI device probe + CVE-2024-26651: (unk) sr9800: Add check for usbnet_get_endpoints + CVE-2024-26654: (unk) ALSA: sh: aica: reorder cleanup operations to avoid UAF bugs + CVE-2024-26655: (unk) Fix memory leak in posix_clock_open() + CVE-2024-26656: (unk) drm/amdgpu: fix use-after-free bug + CVE-2024-26658: (unk) bcachefs: grab s_umount only if snapshotting + CVE-2024-26659: (unk) xhci: handle isoc Babble and Buffer Overrun events properly + CVE-2024-26663: (unk) tipc: Check the bearer type before calling tipc_udp_nl_bearer_add() + CVE-2024-26664: (unk) hwmon: (coretemp) Fix out-of-bounds memory access + CVE-2024-26668: (unk) netfilter: nft_limit: reject configurations that cause integer overflow + CVE-2024-26669: (unk) net/sched: flower: Fix chain template offload + CVE-2024-26671: (unk) blk-mq: fix IO hang from sbitmap wakeup race + CVE-2024-26672: (unk) drm/amdgpu: Fix variable 'mca_funcs' dereferenced before NULL check in 'amdgpu_mca_smu_get_mca_entry()' + CVE-2024-26673: (unk) netfilter: nft_ct: sanitize layer 3 and 4 protocol number in custom expectations + CVE-2024-26675: (unk) ppp_async: limit MRU to 64K + CVE-2024-26676: (unk) af_unix: Call kfree_skb() for dead unix_(sk)->oob_skb in GC. + CVE-2024-26677: (unk) rxrpc: Fix delayed ACKs to not set the reference serial number + CVE-2024-26679: (unk) inet: read sk->sk_family once in inet_recv_error() + CVE-2024-26680: (unk) net: atlantic: Fix DMA mapping for PTP hwts ring + CVE-2024-26684: (unk) net: stmmac: xgmac: fix handling of DPP safety error for DMA channels + CVE-2024-26685: (unk) nilfs2: fix potential bug in end_buffer_async_write + CVE-2024-26686: (unk) fs/proc: do_task_stat: use sig->stats_lock to gather the threads/children stats + CVE-2024-26687: (unk) xen/events: close evtchn after mapping cleanup + CVE-2024-26688: (unk) fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super + CVE-2024-26689: (unk) ceph: prevent use-after-free in encode_cap_msg() + CVE-2024-26691: (unk) KVM: arm64: Fix circular locking dependency + CVE-2024-26696: (unk) nilfs2: fix hang in nilfs_lookup_dirty_data_buffers() + CVE-2024-26697: (unk) nilfs2: fix data corruption in dsync block recovery for small block sizes + CVE-2024-26699: (unk) drm/amd/display: Fix array-index-out-of-bounds in dcn35_clkmgr + CVE-2024-26700: (unk) drm/amd/display: Fix MST Null Ptr for RV + CVE-2024-26702: (unk) iio: magnetometer: rm3100: add boundary check for the value read from RM3100_REG_TMRC + CVE-2024-26704: (unk) ext4: fix double-free of blocks due to wrong extents moved_len + CVE-2024-26706: (unk) parisc: Fix random data corruption from exception handler + CVE-2024-26712: (unk) powerpc/kasan: Fix addr error caused by page alignment + CVE-2024-26713: (unk) powerpc/pseries/iommu: Fix iommu initialisation during DLPAR add + CVE-2024-26715: (unk) usb: dwc3: gadget: Fix NULL pointer dereference in dwc3_gadget_suspend + CVE-2024-26719: (unk) nouveau: offload fence uevents work to workqueue + CVE-2024-26720: (unk) mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again + CVE-2024-26726: (unk) btrfs: don't drop extent_map for free space inode on write error + CVE-2024-26733: (unk) arp: Prevent overflow in arp_req_get(). + CVE-2024-26735: (unk) ipv6: sr: fix possible use-after-free and null-ptr-deref + CVE-2024-26736: (unk) afs: Increase buffer size in afs_update_volume_status() + CVE-2024-26738: (unk) powerpc/pseries/iommu: DLPAR add doesn't completely initialize pci_controller + CVE-2024-26739: (unk) net/sched: act_mirred: don't override retval if we already lost the skb + CVE-2024-26740: (unk) net/sched: act_mirred: use the backlog for mirred ingress + CVE-2024-26743: (unk) RDMA/qedr: Fix qedr_create_user_qp error flow + CVE-2024-26744: (unk) RDMA/srpt: Support specifying the srpt_service_guid parameter + CVE-2024-26745: (unk) powerpc/pseries/iommu: IOMMU table is not initialized for kdump over SR-IOV + CVE-2024-26747: (unk) usb: roles: fix NULL pointer issue when put module's reference + CVE-2024-26748: (unk) usb: cdns3: fix memory double free when handle zero packet + CVE-2024-26749: (unk) usb: cdns3: fixed memory use after free at cdns3_gadget_ep_disable() + CVE-2024-26751: (unk) ARM: ep93xx: Add terminator to gpiod_lookup_table + CVE-2024-26752: (unk) l2tp: pass correct message length to ip6_append_data + CVE-2024-26754: (unk) gtp: fix use-after-free and null-ptr-deref in gtp_genl_dump_pdp() + CVE-2024-26756: (unk) md: Don't register sync_thread for reshape directly + CVE-2024-26757: (unk) md: Don't ignore read-only array in md_check_recovery() + CVE-2024-26758: (unk) md: Don't ignore suspended array in md_check_recovery() + CVE-2024-26759: (unk) mm/swap: fix race when skipping swapcache + CVE-2024-26763: (unk) dm-crypt: don't modify the data when using authenticated encryption + CVE-2024-26764: (unk) fs/aio: Restrict kiocb_set_cancel_fn() to I/O submitted via libaio + CVE-2024-26765: (unk) LoongArch: Disable IRQ before init_fn() for nonboot CPUs + CVE-2024-26766: (unk) IB/hfi1: Fix sdma.h tx->num_descs off-by-one error + CVE-2024-26767: (unk) drm/amd/display: fixed integer types and null check locations + CVE-2024-26768: (unk) LoongArch: Change acpi_core_pic[NR_CPUS] to acpi_core_pic[MAX_CORE_PIC] + CVE-2024-26769: (unk) nvmet-fc: avoid deadlock on delete association path + CVE-2024-26770: (unk) HID: nvidia-shield: Add missing null pointer checks to LED initialization + CVE-2024-26771: (unk) dmaengine: ti: edma: Add some null pointer checks to the edma_probe + CVE-2024-26772: (unk) ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal() + CVE-2024-26773: (unk) ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found() + CVE-2024-26774: (unk) ext4: avoid dividing by 0 in mb_update_avg_fragment_size() when block bitmap corrupt + CVE-2024-26775: (unk) aoe: avoid potential deadlock at set_capacity + CVE-2024-26776: (unk) spi: hisi-sfc-v3xx: Return IRQ_NONE if no interrupts were detected + CVE-2024-26777: (unk) fbdev: sis: Error out if pixclock equals zero + CVE-2024-26778: (unk) fbdev: savage: Error out if pixclock equals zero + CVE-2024-26779: (unk) wifi: mac80211: fix race condition on enabling fast-xmit + CVE-2024-26782: (unk) mptcp: fix double-free on socket dismantle + CVE-2024-26784: (unk) pmdomain: arm: Fix NULL dereference on scmi_perf_domain removal + CVE-2024-26787: (unk) mmc: mmci: stm32: fix DMA API overlapping mappings warning + CVE-2024-26788: (unk) dmaengine: fsl-qdma: init irq after reg initialization + CVE-2024-26789: (unk) crypto: arm64/neonbs - fix out-of-bounds access on short input + CVE-2024-26790: (unk) dmaengine: fsl-qdma: fix SoC may hang on 16 byte unaligned read + CVE-2024-26791: (unk) btrfs: dev-replace: properly validate device names + CVE-2024-26793: (unk) gtp: fix use-after-free and null-ptr-deref in gtp_newlink() + CVE-2024-26795: (unk) riscv: Sparse-Memory/vmemmap out-of-bounds fix + CVE-2024-26797: (unk) drm/amd/display: Prevent potential buffer overflow in map_hw_resources + CVE-2024-26798: (unk) fbcon: always restore the old font data in fbcon_do_set_font() + CVE-2024-26801: (unk) Bluetooth: Avoid potential use-after-free in hci_error_reset + CVE-2024-26802: (unk) stmmac: Clear variable when destroying workqueue + CVE-2024-26803: (unk) net: veth: clear GRO when clearing XDP even when down + CVE-2024-26804: (unk) net: ip_tunnel: prevent perpetual headroom growth + CVE-2024-26805: (unk) netlink: Fix kernel-infoleak-after-free in __skb_datagram_iter + CVE-2024-26806: (unk) spi: cadence-qspi: remove system-wide suspend helper calls from runtime PM hooks + CVE-2024-26808: (unk) netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain + CVE-2024-26809: (unk) netfilter: nft_set_pipapo: release elements in clone only from destroy path diff --git a/data/5.8/5.8_CVEs.txt b/data/5.8/5.8_CVEs.txt index 434de1089..8bb04f400 100644 --- a/data/5.8/5.8_CVEs.txt +++ b/data/5.8/5.8_CVEs.txt @@ -30,6 +30,7 @@ CVE-2019-19449: Fix not seen in stream CVE-2019-19770: Fixed with 5.8.2 CVE-2019-19814: Fix unknown CVE-2019-20794: Fix unknown +CVE-2019-25162: Fix not seen in stream CVE-2020-0347: Fix unknown CVE-2020-0423: Fixed with 5.8.17 CVE-2020-0465: Fixed with 5.8.7 @@ -129,6 +130,17 @@ CVE-2020-36387: Fixed with 5.8.2 CVE-2020-36516: Fix not seen in stream CVE-2020-36694: Fix not seen in stream CVE-2020-36766: Fixed with 5.8.6 +CVE-2020-36776: Fix not seen in stream +CVE-2020-36777: Fix not seen in stream +CVE-2020-36778: Fix not seen in stream +CVE-2020-36779: Fix not seen in stream +CVE-2020-36780: Fix not seen in stream +CVE-2020-36781: Fix not seen in stream +CVE-2020-36782: Fix not seen in stream +CVE-2020-36783: Fix not seen in stream +CVE-2020-36784: Fix not seen in stream +CVE-2020-36785: Fix not seen in stream +CVE-2020-36787: Fix not seen in stream CVE-2020-3702: Fix not seen in stream CVE-2020-4788: Fix not seen in stream CVE-2020-8694: Fix not seen in stream @@ -306,6 +318,182 @@ CVE-2021-45485: Fix not seen in stream CVE-2021-45486: Fix not seen in stream CVE-2021-45868: Fix not seen in stream CVE-2021-46283: Fix not seen in stream +CVE-2021-46904: Fix not seen in stream +CVE-2021-46906: Fix not seen in stream +CVE-2021-46908: Fix not seen in stream +CVE-2021-46909: Fix not seen in stream +CVE-2021-46911: Fix not seen in stream +CVE-2021-46912: Fix not seen in stream +CVE-2021-46913: Fix not seen in stream +CVE-2021-46915: Fix not seen in stream +CVE-2021-46917: Fix not seen in stream +CVE-2021-46919: Fix not seen in stream +CVE-2021-46920: Fix not seen in stream +CVE-2021-46921: Fix not seen in stream +CVE-2021-46924: Fix not seen in stream +CVE-2021-46925: Fix not seen in stream +CVE-2021-46926: Fix not seen in stream +CVE-2021-46928: Fix not seen in stream +CVE-2021-46929: Fix not seen in stream +CVE-2021-46930: Fix not seen in stream +CVE-2021-46931: Fix not seen in stream +CVE-2021-46932: Fix not seen in stream +CVE-2021-46933: Fix not seen in stream +CVE-2021-46934: Fix not seen in stream +CVE-2021-46935: Fix not seen in stream +CVE-2021-46936: Fix not seen in stream +CVE-2021-46938: Fix not seen in stream +CVE-2021-46939: Fix not seen in stream +CVE-2021-46941: Fix not seen in stream +CVE-2021-46943: Fix not seen in stream +CVE-2021-46944: Fix not seen in stream +CVE-2021-46950: Fix not seen in stream +CVE-2021-46951: Fix not seen in stream +CVE-2021-46952: Fix not seen in stream +CVE-2021-46953: Fix not seen in stream +CVE-2021-46955: Fix not seen in stream +CVE-2021-46956: Fix not seen in stream +CVE-2021-46958: Fix not seen in stream +CVE-2021-46959: Fix not seen in stream +CVE-2021-46960: Fix not seen in stream +CVE-2021-46961: Fix not seen in stream +CVE-2021-46962: Fix not seen in stream +CVE-2021-46963: Fix not seen in stream +CVE-2021-46965: Fix not seen in stream +CVE-2021-46966: Fix not seen in stream +CVE-2021-46967: Fix not seen in stream +CVE-2021-46969: Fix not seen in stream +CVE-2021-46970: Fix not seen in stream +CVE-2021-46971: Fix not seen in stream +CVE-2021-46972: Fix not seen in stream +CVE-2021-46973: Fix not seen in stream +CVE-2021-46974: Fix not seen in stream +CVE-2021-46976: Fix not seen in stream +CVE-2021-46977: Fix not seen in stream +CVE-2021-46980: Fix not seen in stream +CVE-2021-46981: Fix not seen in stream +CVE-2021-46982: Fix not seen in stream +CVE-2021-46984: Fix not seen in stream +CVE-2021-46988: Fix not seen in stream +CVE-2021-46989: Fix not seen in stream +CVE-2021-46991: Fix not seen in stream +CVE-2021-46992: Fix not seen in stream +CVE-2021-46993: Fix not seen in stream +CVE-2021-46994: Fix not seen in stream +CVE-2021-46998: Fix not seen in stream +CVE-2021-46999: Fix not seen in stream +CVE-2021-47000: Fix not seen in stream +CVE-2021-47001: Fix not seen in stream +CVE-2021-47004: Fix not seen in stream +CVE-2021-47005: Fix not seen in stream +CVE-2021-47006: Fix not seen in stream +CVE-2021-47007: Fix not seen in stream +CVE-2021-47010: Fix not seen in stream +CVE-2021-47012: Fix not seen in stream +CVE-2021-47013: Fix not seen in stream +CVE-2021-47014: Fix not seen in stream +CVE-2021-47015: Fix not seen in stream +CVE-2021-47016: Fix not seen in stream +CVE-2021-47017: Fix not seen in stream +CVE-2021-47018: Fix not seen in stream +CVE-2021-47020: Fix not seen in stream +CVE-2021-47024: Fix not seen in stream +CVE-2021-47026: Fix not seen in stream +CVE-2021-47028: Fix not seen in stream +CVE-2021-47034: Fix not seen in stream +CVE-2021-47035: Fix not seen in stream +CVE-2021-47036: Fix not seen in stream +CVE-2021-47038: Fix not seen in stream +CVE-2021-47040: Fix not seen in stream +CVE-2021-47041: Fix not seen in stream +CVE-2021-47043: Fix not seen in stream +CVE-2021-47046: Fix not seen in stream +CVE-2021-47049: Fix not seen in stream +CVE-2021-47051: Fix not seen in stream +CVE-2021-47052: Fix not seen in stream +CVE-2021-47054: Fix not seen in stream +CVE-2021-47056: Fix not seen in stream +CVE-2021-47059: Fix not seen in stream +CVE-2021-47063: Fix not seen in stream +CVE-2021-47065: Fix not seen in stream +CVE-2021-47067: Fix not seen in stream +CVE-2021-47069: Fix not seen in stream +CVE-2021-47070: Fix not seen in stream +CVE-2021-47071: Fix not seen in stream +CVE-2021-47073: Fix not seen in stream +CVE-2021-47074: Fix not seen in stream +CVE-2021-47075: Fix not seen in stream +CVE-2021-47076: Fix not seen in stream +CVE-2021-47077: Fix not seen in stream +CVE-2021-47078: Fix not seen in stream +CVE-2021-47082: Fix not seen in stream +CVE-2021-47083: Fix not seen in stream +CVE-2021-47086: Fix not seen in stream +CVE-2021-47095: Fix not seen in stream +CVE-2021-47100: Fix not seen in stream +CVE-2021-47101: Fix not seen in stream +CVE-2021-47103: Fix not seen in stream +CVE-2021-47105: Fix not seen in stream +CVE-2021-47109: Fix not seen in stream +CVE-2021-47110: Fix not seen in stream +CVE-2021-47111: Fix not seen in stream +CVE-2021-47112: Fix not seen in stream +CVE-2021-47113: Fix not seen in stream +CVE-2021-47114: Fix not seen in stream +CVE-2021-47116: Fix not seen in stream +CVE-2021-47117: Fix not seen in stream +CVE-2021-47118: Fix not seen in stream +CVE-2021-47119: Fix not seen in stream +CVE-2021-47120: Fix not seen in stream +CVE-2021-47121: Fix not seen in stream +CVE-2021-47122: Fix not seen in stream +CVE-2021-47124: Fix not seen in stream +CVE-2021-47125: Fix not seen in stream +CVE-2021-47126: Fix not seen in stream +CVE-2021-47128: Fix not seen in stream +CVE-2021-47129: Fix not seen in stream +CVE-2021-47130: Fix not seen in stream +CVE-2021-47131: Fix not seen in stream +CVE-2021-47133: Fix not seen in stream +CVE-2021-47135: Fix not seen in stream +CVE-2021-47136: Fix not seen in stream +CVE-2021-47137: Fix not seen in stream +CVE-2021-47138: Fix not seen in stream +CVE-2021-47139: Fix not seen in stream +CVE-2021-47140: Fix not seen in stream +CVE-2021-47141: Fix not seen in stream +CVE-2021-47142: Fix not seen in stream +CVE-2021-47143: Fix not seen in stream +CVE-2021-47144: Fix not seen in stream +CVE-2021-47145: Fix not seen in stream +CVE-2021-47146: Fix not seen in stream +CVE-2021-47147: Fix not seen in stream +CVE-2021-47149: Fix not seen in stream +CVE-2021-47150: Fix not seen in stream +CVE-2021-47151: Fix not seen in stream +CVE-2021-47152: Fix not seen in stream +CVE-2021-47153: Fix not seen in stream +CVE-2021-47158: Fix not seen in stream +CVE-2021-47159: Fix not seen in stream +CVE-2021-47160: Fix not seen in stream +CVE-2021-47161: Fix not seen in stream +CVE-2021-47162: Fix not seen in stream +CVE-2021-47163: Fix not seen in stream +CVE-2021-47164: Fix not seen in stream +CVE-2021-47165: Fix not seen in stream +CVE-2021-47166: Fix not seen in stream +CVE-2021-47167: Fix not seen in stream +CVE-2021-47168: Fix not seen in stream +CVE-2021-47169: Fix not seen in stream +CVE-2021-47170: Fix not seen in stream +CVE-2021-47171: Fix not seen in stream +CVE-2021-47172: Fix not seen in stream +CVE-2021-47173: Fix not seen in stream +CVE-2021-47174: Fix not seen in stream +CVE-2021-47175: Fix not seen in stream +CVE-2021-47177: Fix not seen in stream +CVE-2021-47179: Fix not seen in stream +CVE-2021-47180: Fix not seen in stream CVE-2022-0001: Fix not seen in stream CVE-2022-0002: Fix not seen in stream CVE-2022-0168: Fix not seen in stream @@ -547,6 +735,10 @@ CVE-2022-47521: Fix not seen in stream CVE-2022-47929: Fix not seen in stream CVE-2022-47946: Fix not seen in stream CVE-2022-48619: Fix not seen in stream +CVE-2022-48626: Fix not seen in stream +CVE-2022-48627: Fix not seen in stream +CVE-2022-48628: Fix not seen in stream +CVE-2022-48629: Fix not seen in stream CVE-2023-0045: Fix not seen in stream CVE-2023-0047: Fix not seen in stream CVE-2023-0160: Fix not seen in stream @@ -630,6 +822,7 @@ CVE-2023-28328: Fix not seen in stream CVE-2023-28410: Fix not seen in stream CVE-2023-28466: Fix not seen in stream CVE-2023-2860: Fix not seen in stream +CVE-2023-28746: Fix not seen in stream CVE-2023-28772: Fix not seen in stream CVE-2023-2898: Fix not seen in stream CVE-2023-2985: Fix not seen in stream @@ -712,7 +905,7 @@ CVE-2023-4622: Fix not seen in stream CVE-2023-4623: Fix not seen in stream CVE-2023-46343: Fix not seen in stream CVE-2023-46838: Fix not seen in stream -CVE-2023-47233: Fix unknown +CVE-2023-47233: Fix not seen in stream CVE-2023-4732: Fix not seen in stream CVE-2023-4881: Fix not seen in stream CVE-2023-4921: Fix not seen in stream @@ -738,20 +931,123 @@ CVE-2023-52448: Fix not seen in stream CVE-2023-52449: Fix not seen in stream CVE-2023-52451: Fix not seen in stream CVE-2023-52454: Fix not seen in stream -CVE-2023-52456: Fix not seen in stream -CVE-2023-52457: Fix not seen in stream CVE-2023-52458: Fix not seen in stream CVE-2023-52463: Fix not seen in stream CVE-2023-52464: Fix not seen in stream +CVE-2023-52469: Fix not seen in stream +CVE-2023-52470: Fix not seen in stream +CVE-2023-52474: Fix not seen in stream +CVE-2023-52475: Fix not seen in stream +CVE-2023-52476: Fix not seen in stream +CVE-2023-52477: Fix not seen in stream +CVE-2023-52478: Fix not seen in stream +CVE-2023-52479: Fix not seen in stream +CVE-2023-52480: Fix not seen in stream +CVE-2023-52481: Fix not seen in stream +CVE-2023-52482: Fix not seen in stream +CVE-2023-52484: Fix not seen in stream +CVE-2023-52485: Fix not seen in stream +CVE-2023-52486: Fix not seen in stream +CVE-2023-52488: Fix not seen in stream +CVE-2023-52489: Fix not seen in stream +CVE-2023-52491: Fix not seen in stream +CVE-2023-52492: Fix not seen in stream +CVE-2023-52493: Fix not seen in stream +CVE-2023-52497: Fix not seen in stream +CVE-2023-52498: Fix not seen in stream +CVE-2023-52500: Fix not seen in stream +CVE-2023-52501: Fix not seen in stream +CVE-2023-52502: Fix not seen in stream +CVE-2023-52503: Fix not seen in stream +CVE-2023-52504: Fix not seen in stream +CVE-2023-52506: Fix not seen in stream +CVE-2023-52507: Fix not seen in stream +CVE-2023-52508: Fix not seen in stream +CVE-2023-52509: Fix not seen in stream +CVE-2023-52510: Fix not seen in stream +CVE-2023-52511: Fix not seen in stream +CVE-2023-52513: Fix not seen in stream +CVE-2023-52515: Fix not seen in stream +CVE-2023-52516: Fix not seen in stream +CVE-2023-52517: Fix not seen in stream +CVE-2023-52519: Fix not seen in stream +CVE-2023-52522: Fix not seen in stream +CVE-2023-52527: Fix not seen in stream +CVE-2023-52528: Fix not seen in stream +CVE-2023-52530: Fix not seen in stream +CVE-2023-52531: Fix not seen in stream +CVE-2023-52532: Fix not seen in stream +CVE-2023-52559: Fix not seen in stream +CVE-2023-52561: Fix not seen in stream +CVE-2023-52563: Fix not seen in stream +CVE-2023-52565: Fix not seen in stream +CVE-2023-52566: Fix not seen in stream +CVE-2023-52568: Fix not seen in stream +CVE-2023-52569: Fix not seen in stream +CVE-2023-52571: Fix not seen in stream +CVE-2023-52572: Fix not seen in stream +CVE-2023-52573: Fix not seen in stream +CVE-2023-52574: Fix not seen in stream +CVE-2023-52578: Fix not seen in stream +CVE-2023-52583: Fix not seen in stream +CVE-2023-52584: Fix not seen in stream +CVE-2023-52585: Fix not seen in stream +CVE-2023-52586: Fix not seen in stream +CVE-2023-52587: Fix not seen in stream +CVE-2023-52588: Fix not seen in stream +CVE-2023-52589: Fix not seen in stream +CVE-2023-52590: Fix not seen in stream +CVE-2023-52591: Fix not seen in stream +CVE-2023-52593: Fix not seen in stream +CVE-2023-52594: Fix not seen in stream +CVE-2023-52595: Fix not seen in stream +CVE-2023-52596: Fix not seen in stream +CVE-2023-52597: Fix not seen in stream +CVE-2023-52598: Fix not seen in stream +CVE-2023-52599: Fix not seen in stream +CVE-2023-52600: Fix not seen in stream +CVE-2023-52601: Fix not seen in stream +CVE-2023-52602: Fix not seen in stream +CVE-2023-52603: Fix not seen in stream +CVE-2023-52604: Fix not seen in stream +CVE-2023-52606: Fix not seen in stream +CVE-2023-52607: Fix not seen in stream +CVE-2023-52608: Fix not seen in stream +CVE-2023-52609: Fix not seen in stream +CVE-2023-52610: Fix not seen in stream +CVE-2023-52612: Fix not seen in stream +CVE-2023-52614: Fix not seen in stream +CVE-2023-52615: Fix not seen in stream +CVE-2023-52617: Fix not seen in stream +CVE-2023-52618: Fix not seen in stream +CVE-2023-52619: Fix not seen in stream +CVE-2023-52620: Fix not seen in stream +CVE-2023-52621: Fix not seen in stream +CVE-2023-52622: Fix not seen in stream +CVE-2023-52623: Fix not seen in stream +CVE-2023-52624: Fix not seen in stream +CVE-2023-52625: Fix not seen in stream +CVE-2023-52627: Fix not seen in stream +CVE-2023-52628: Fix not seen in stream +CVE-2023-52629: Fix not seen in stream +CVE-2023-52632: Fix not seen in stream +CVE-2023-52633: Fix not seen in stream +CVE-2023-52634: Fix not seen in stream +CVE-2023-52635: Fix not seen in stream +CVE-2023-52637: Fix not seen in stream +CVE-2023-52638: Fix not seen in stream +CVE-2023-52639: Fix not seen in stream +CVE-2023-52640: Fix not seen in stream +CVE-2023-52641: Fix not seen in stream CVE-2023-5717: Fix not seen in stream CVE-2023-6040: Fix not seen in stream CVE-2023-6121: Fix not seen in stream CVE-2023-6176: Fix not seen in stream CVE-2023-6240: Fix unknown -CVE-2023-6270: Fix unknown -CVE-2023-6356: Fix unknown +CVE-2023-6270: Fix not seen in stream +CVE-2023-6356: Fix not seen in stream CVE-2023-6535: Fix unknown -CVE-2023-6536: Fix unknown +CVE-2023-6536: Fix not seen in stream CVE-2023-6546: Fix not seen in stream CVE-2023-6560: Fix not seen in stream CVE-2023-6606: Fix not seen in stream @@ -760,7 +1056,7 @@ CVE-2023-6817: Fix not seen in stream CVE-2023-6915: Fix not seen in stream CVE-2023-6931: Fix not seen in stream CVE-2023-6932: Fix not seen in stream -CVE-2023-7042: Fix unknown +CVE-2023-7042: Fix not seen in stream CVE-2023-7192: Fix not seen in stream CVE-2024-0340: Fix not seen in stream CVE-2024-0564: Fix unknown @@ -770,15 +1066,16 @@ CVE-2024-0607: Fix not seen in stream CVE-2024-0641: Fix not seen in stream CVE-2024-0646: Fix not seen in stream CVE-2024-0775: Fix not seen in stream -CVE-2024-0841: Fix unknown +CVE-2024-0841: Fix not seen in stream CVE-2024-1086: Fix not seen in stream CVE-2024-1151: Fix not seen in stream CVE-2024-1312: Fix not seen in stream CVE-2024-21803: Fix unknown -CVE-2024-22099: Fix unknown +CVE-2024-2193: Fix unknown +CVE-2024-22099: Fix not seen in stream CVE-2024-22386: Fix unknown -CVE-2024-23196: Fix unknown -CVE-2024-23307: Fix unknown +CVE-2024-23196: Fix not seen in stream +CVE-2024-23307: Fix not seen in stream CVE-2024-23848: Fix unknown CVE-2024-23849: Fix not seen in stream CVE-2024-23851: Fix not seen in stream @@ -787,7 +1084,7 @@ CVE-2024-24857: Fix unknown CVE-2024-24858: Fix unknown CVE-2024-24859: Fix unknown CVE-2024-24860: Fix not seen in stream -CVE-2024-24861: Fix unknown +CVE-2024-24861: Fix not seen in stream CVE-2024-24864: Fix unknown CVE-2024-25739: Fix unknown CVE-2024-25740: Fix unknown @@ -797,13 +1094,127 @@ CVE-2024-26583: Fix not seen in stream CVE-2024-26584: Fix not seen in stream CVE-2024-26585: Fix not seen in stream CVE-2024-26586: Fix not seen in stream -CVE-2024-26587: Fix not seen in stream -CVE-2024-26588: Fix not seen in stream CVE-2024-26589: Fix not seen in stream -CVE-2024-26591: Fix not seen in stream CVE-2024-26592: Fix not seen in stream CVE-2024-26593: Fix not seen in stream CVE-2024-26594: Fix not seen in stream CVE-2024-26595: Fix not seen in stream CVE-2024-26597: Fix not seen in stream CVE-2024-26598: Fix not seen in stream +CVE-2024-26600: Fix not seen in stream +CVE-2024-26602: Fix not seen in stream +CVE-2024-26606: Fix not seen in stream +CVE-2024-26607: Fix not seen in stream +CVE-2024-26610: Fix not seen in stream +CVE-2024-26614: Fix not seen in stream +CVE-2024-26615: Fix not seen in stream +CVE-2024-26622: Fix not seen in stream +CVE-2024-26623: Fix not seen in stream +CVE-2024-26625: Fix not seen in stream +CVE-2024-26627: Fix not seen in stream +CVE-2024-26633: Fix not seen in stream +CVE-2024-26635: Fix not seen in stream +CVE-2024-26636: Fix not seen in stream +CVE-2024-26640: Fix not seen in stream +CVE-2024-26641: Fix not seen in stream +CVE-2024-26642: Fix not seen in stream +CVE-2024-26644: Fix not seen in stream +CVE-2024-26645: Fix not seen in stream +CVE-2024-26646: Fix not seen in stream +CVE-2024-26647: Fix not seen in stream +CVE-2024-26648: Fix not seen in stream +CVE-2024-26650: Fix not seen in stream +CVE-2024-26651: Fix not seen in stream +CVE-2024-26654: Fix not seen in stream +CVE-2024-26655: Fix not seen in stream +CVE-2024-26656: Fix not seen in stream +CVE-2024-26658: Fix not seen in stream +CVE-2024-26659: Fix not seen in stream +CVE-2024-26663: Fix not seen in stream +CVE-2024-26664: Fix not seen in stream +CVE-2024-26668: Fix not seen in stream +CVE-2024-26669: Fix not seen in stream +CVE-2024-26671: Fix not seen in stream +CVE-2024-26672: Fix not seen in stream +CVE-2024-26673: Fix not seen in stream +CVE-2024-26675: Fix not seen in stream +CVE-2024-26676: Fix not seen in stream +CVE-2024-26677: Fix not seen in stream +CVE-2024-26679: Fix not seen in stream +CVE-2024-26680: Fix not seen in stream +CVE-2024-26684: Fix not seen in stream +CVE-2024-26685: Fix not seen in stream +CVE-2024-26686: Fix not seen in stream +CVE-2024-26687: Fix not seen in stream +CVE-2024-26688: Fix not seen in stream +CVE-2024-26689: Fix not seen in stream +CVE-2024-26691: Fix not seen in stream +CVE-2024-26696: Fix not seen in stream +CVE-2024-26697: Fix not seen in stream +CVE-2024-26698: Fix not seen in stream +CVE-2024-26699: Fix not seen in stream +CVE-2024-26700: Fix not seen in stream +CVE-2024-26702: Fix not seen in stream +CVE-2024-26704: Fix not seen in stream +CVE-2024-26706: Fix not seen in stream +CVE-2024-26712: Fix not seen in stream +CVE-2024-26713: Fix not seen in stream +CVE-2024-26715: Fix not seen in stream +CVE-2024-26719: Fix not seen in stream +CVE-2024-26720: Fix not seen in stream +CVE-2024-26726: Fix not seen in stream +CVE-2024-26733: Fix not seen in stream +CVE-2024-26735: Fix not seen in stream +CVE-2024-26736: Fix not seen in stream +CVE-2024-26738: Fix not seen in stream +CVE-2024-26739: Fix not seen in stream +CVE-2024-26740: Fix not seen in stream +CVE-2024-26743: Fix not seen in stream +CVE-2024-26744: Fix not seen in stream +CVE-2024-26745: Fix not seen in stream +CVE-2024-26747: Fix not seen in stream +CVE-2024-26748: Fix not seen in stream +CVE-2024-26749: Fix not seen in stream +CVE-2024-26751: Fix not seen in stream +CVE-2024-26752: Fix not seen in stream +CVE-2024-26754: Fix not seen in stream +CVE-2024-26756: Fix not seen in stream +CVE-2024-26757: Fix not seen in stream +CVE-2024-26758: Fix not seen in stream +CVE-2024-26759: Fix not seen in stream +CVE-2024-26763: Fix not seen in stream +CVE-2024-26764: Fix not seen in stream +CVE-2024-26765: Fix not seen in stream +CVE-2024-26766: Fix not seen in stream +CVE-2024-26767: Fix not seen in stream +CVE-2024-26768: Fix not seen in stream +CVE-2024-26769: Fix not seen in stream +CVE-2024-26770: Fix not seen in stream +CVE-2024-26771: Fix not seen in stream +CVE-2024-26772: Fix not seen in stream +CVE-2024-26773: Fix not seen in stream +CVE-2024-26774: Fix not seen in stream +CVE-2024-26775: Fix not seen in stream +CVE-2024-26776: Fix not seen in stream +CVE-2024-26777: Fix not seen in stream +CVE-2024-26778: Fix not seen in stream +CVE-2024-26779: Fix not seen in stream +CVE-2024-26782: Fix not seen in stream +CVE-2024-26784: Fix not seen in stream +CVE-2024-26787: Fix not seen in stream +CVE-2024-26788: Fix not seen in stream +CVE-2024-26789: Fix not seen in stream +CVE-2024-26790: Fix not seen in stream +CVE-2024-26791: Fix not seen in stream +CVE-2024-26793: Fix not seen in stream +CVE-2024-26795: Fix not seen in stream +CVE-2024-26797: Fix not seen in stream +CVE-2024-26798: Fix not seen in stream +CVE-2024-26801: Fix not seen in stream +CVE-2024-26802: Fix not seen in stream +CVE-2024-26803: Fix not seen in stream +CVE-2024-26804: Fix not seen in stream +CVE-2024-26805: Fix not seen in stream +CVE-2024-26806: Fix not seen in stream +CVE-2024-26808: Fix not seen in stream +CVE-2024-26809: Fix not seen in stream diff --git a/data/5.8/5.8_security.txt b/data/5.8/5.8_security.txt index 935663e84..8fdc58819 100644 --- a/data/5.8/5.8_security.txt +++ b/data/5.8/5.8_security.txt @@ -107,6 +107,7 @@ Outstanding CVEs: CVE-2019-19449: (unk) f2fs: fix to do sanity check on segment/section count CVE-2019-19814: (unk) CVE-2019-20794: (unk) + CVE-2019-25162: (unk) i2c: Fix a potential use after free CVE-2020-0347: (unk) CVE-2020-10708: (unk) CVE-2020-11725: (unk) @@ -172,6 +173,17 @@ Outstanding CVEs: CVE-2020-36385: (unk) RDMA/ucma: Rework ucma_migrate_id() to avoid races with destroy CVE-2020-36516: (unk) ipv4: avoid using shared IP generator for connected sockets CVE-2020-36694: (unk) netfilter: x_tables: Switch synchronization to RCU + CVE-2020-36776: (unk) thermal/drivers/cpufreq_cooling: Fix slab OOB issue + CVE-2020-36777: (unk) media: dvbdev: Fix memory leak in dvb_media_device_free() + CVE-2020-36778: (unk) i2c: xiic: fix reference leak when pm_runtime_get_sync fails + CVE-2020-36779: (unk) i2c: stm32f7: fix reference leak when pm_runtime_get_sync fails + CVE-2020-36780: (unk) i2c: sprd: fix reference leak when pm_runtime_get_sync fails + CVE-2020-36781: (unk) i2c: imx: fix reference leak when pm_runtime_get_sync fails + CVE-2020-36782: (unk) i2c: imx-lpi2c: fix reference leak when pm_runtime_get_sync fails + CVE-2020-36783: (unk) i2c: img-scb: fix reference leak when pm_runtime_get_sync fails + CVE-2020-36784: (unk) i2c: cadence: fix reference leak when pm_runtime_get_sync fails + CVE-2020-36785: (unk) media: atomisp: Fix use after free in atomisp_alloc_css_stat_bufs() + CVE-2020-36787: (unk) media: aspeed: fix clock handling logic CVE-2020-3702: (unk) ath: Use safer key clearing with key cache entries CVE-2020-4788: (unk) powerpc/64s: flush L1D on kernel entry CVE-2020-8694: (unk) powercap: restrict energy meter to root access @@ -341,6 +353,182 @@ Outstanding CVEs: CVE-2021-45486: (unk) inet: use bigger hash table for IP ID generation CVE-2021-45868: (unk) quota: check block number when reading the block in quota file CVE-2021-46283: (unk) netfilter: nf_tables: initialize set before expression setup + CVE-2021-46904: (unk) net: hso: fix null-ptr-deref during tty device unregistration + CVE-2021-46906: (unk) HID: usbhid: fix info leak in hid_submit_ctrl + CVE-2021-46908: (unk) bpf: Use correct permission flag for mixed signed bounds arithmetic + CVE-2021-46909: (unk) ARM: footbridge: fix PCI interrupt mapping + CVE-2021-46911: (unk) ch_ktls: Fix kernel panic + CVE-2021-46912: (unk) net: Make tcp_allowed_congestion_control readonly in non-init netns + CVE-2021-46913: (unk) netfilter: nftables: clone set element expression template + CVE-2021-46915: (unk) netfilter: nft_limit: avoid possible divide error in nft_limit_init + CVE-2021-46917: (unk) dmaengine: idxd: fix wq cleanup of WQCFG registers + CVE-2021-46919: (unk) dmaengine: idxd: fix wq size store permission state + CVE-2021-46920: (unk) dmaengine: idxd: Fix clobbering of SWERR overflow bit on writeback + CVE-2021-46921: (unk) locking/qrwlock: Fix ordering in queued_write_lock_slowpath() + CVE-2021-46924: (unk) NFC: st21nfca: Fix memory leak in device probe and remove + CVE-2021-46925: (unk) net/smc: fix kernel panic caused by race of smc_sock + CVE-2021-46926: (unk) ALSA: hda: intel-sdw-acpi: harden detection of controller + CVE-2021-46928: (unk) parisc: Clear stale IIR value on instruction access rights trap + CVE-2021-46929: (unk) sctp: use call_rcu to free endpoint + CVE-2021-46930: (unk) usb: mtu3: fix list_head check warning + CVE-2021-46931: (unk) net/mlx5e: Wrap the tx reporter dump callback to extract the sq + CVE-2021-46932: (unk) Input: appletouch - initialize work before device registration + CVE-2021-46933: (unk) usb: gadget: f_fs: Clear ffs_eventfd in ffs_data_clear. + CVE-2021-46934: (unk) i2c: validate user data in compat ioctl + CVE-2021-46935: (unk) binder: fix async_free_space accounting for empty parcels + CVE-2021-46936: (unk) net: fix use-after-free in tw_timer_handler + CVE-2021-46938: (unk) dm rq: fix double free of blk_mq_tag_set in dev remove after table load fails + CVE-2021-46939: (unk) tracing: Restructure trace_clock_global() to never block + CVE-2021-46941: (unk) usb: dwc3: core: Do core softreset when switch mode + CVE-2021-46943: (unk) media: staging/intel-ipu3: Fix set_fmt error handling + CVE-2021-46944: (unk) media: staging/intel-ipu3: Fix memory leak in imu_fmt + CVE-2021-46950: (unk) md/raid1: properly indicate failure when ending a failed write request + CVE-2021-46951: (unk) tpm: efi: Use local variable for calculating final log size + CVE-2021-46952: (unk) NFS: fs_context: validate UDP retrans to prevent shift out-of-bounds + CVE-2021-46953: (unk) ACPI: GTDT: Don't corrupt interrupt mappings on watchdow probe failure + CVE-2021-46955: (unk) openvswitch: fix stack OOB read while fragmenting IPv4 packets + CVE-2021-46956: (unk) virtiofs: fix memory leak in virtio_fs_probe() + CVE-2021-46958: (unk) btrfs: fix race between transaction aborts and fsyncs leading to use-after-free + CVE-2021-46959: (unk) spi: Fix use-after-free with devm_spi_alloc_* + CVE-2021-46960: (unk) cifs: Return correct error code from smb2_get_enc_key + CVE-2021-46961: (unk) irqchip/gic-v3: Do not enable irqs when handling spurious interrups + CVE-2021-46962: (unk) mmc: uniphier-sd: Fix a resource leak in the remove function + CVE-2021-46963: (unk) scsi: qla2xxx: Fix crash in qla2xxx_mqueuecommand() + CVE-2021-46965: (unk) mtd: physmap: physmap-bt1-rom: Fix unintentional stack access + CVE-2021-46966: (unk) ACPI: custom_method: fix potential use-after-free issue + CVE-2021-46967: (unk) vhost-vdpa: fix vm_flags for virtqueue doorbell mapping + CVE-2021-46969: (unk) bus: mhi: core: Fix invalid error returning in mhi_queue + CVE-2021-46970: (unk) bus: mhi: pci_generic: Remove WQ_MEM_RECLAIM flag from state workqueue + CVE-2021-46971: (unk) perf/core: Fix unconditional security_locked_down() call + CVE-2021-46972: (unk) ovl: fix leaked dentry + CVE-2021-46973: (unk) net: qrtr: Avoid potential use after free in MHI send + CVE-2021-46974: (unk) bpf: Fix masking negation logic upon negative dst register + CVE-2021-46976: (unk) drm/i915: Fix crash in auto_retire + CVE-2021-46977: (unk) KVM: VMX: Disable preemption when probing user return MSRs + CVE-2021-46980: (unk) usb: typec: ucsi: Retrieve all the PDOs instead of just the first 4 + CVE-2021-46981: (unk) nbd: Fix NULL pointer in flush_workqueue + CVE-2021-46982: (unk) f2fs: compress: fix race condition of overwrite vs truncate + CVE-2021-46984: (unk) kyber: fix out of bounds access when preempted + CVE-2021-46988: (unk) userfaultfd: release page in error path to avoid BUG_ON + CVE-2021-46989: (unk) hfsplus: prevent corruption in shrinking truncate + CVE-2021-46991: (unk) i40e: Fix use-after-free in i40e_client_subtask() + CVE-2021-46992: (unk) netfilter: nftables: avoid overflows in nft_hash_buckets() + CVE-2021-46993: (unk) sched: Fix out-of-bound access in uclamp + CVE-2021-46994: (unk) can: mcp251x: fix resume from sleep before interface was brought up + CVE-2021-46998: (unk) ethernet:enic: Fix a use after free bug in enic_hard_start_xmit + CVE-2021-46999: (unk) sctp: do asoc update earlier in sctp_sf_do_dupcook_a + CVE-2021-47000: (unk) ceph: fix inode leak on getattr error in __fh_to_dentry + CVE-2021-47001: (unk) xprtrdma: Fix cwnd update ordering + CVE-2021-47004: (unk) f2fs: fix to avoid touching checkpointed data in get_victim() + CVE-2021-47005: (unk) PCI: endpoint: Fix NULL pointer dereference for ->get_features() + CVE-2021-47006: (unk) ARM: 9064/1: hw_breakpoint: Do not directly check the event's overflow_handler hook + CVE-2021-47007: (unk) f2fs: fix panic during f2fs_resize_fs() + CVE-2021-47010: (unk) net: Only allow init netns to set default tcp cong to a restricted algo + CVE-2021-47012: (unk) RDMA/siw: Fix a use after free in siw_alloc_mr + CVE-2021-47013: (unk) net:emac/emac-mac: Fix a use after free in emac_mac_tx_buf_send + CVE-2021-47014: (unk) net/sched: act_ct: fix wild memory access when clearing fragments + CVE-2021-47015: (unk) bnxt_en: Fix RX consumer index logic in the error path. + CVE-2021-47016: (unk) m68k: mvme147,mvme16x: Don't wipe PCC timer config bits + CVE-2021-47017: (unk) ath10k: Fix a use after free in ath10k_htc_send_bundle + CVE-2021-47018: (unk) powerpc/64: Fix the definition of the fixmap area + CVE-2021-47020: (unk) soundwire: stream: fix memory leak in stream config error path + CVE-2021-47024: (unk) vsock/virtio: free queued packets when closing socket + CVE-2021-47026: (unk) RDMA/rtrs-clt: destroy sysfs after removing session from active list + CVE-2021-47028: (unk) mt76: mt7915: fix txrate reporting + CVE-2021-47034: (unk) powerpc/64s: Fix pte update for kernel memory on radix + CVE-2021-47035: (unk) iommu/vt-d: Remove WO permissions on second-level paging entries + CVE-2021-47036: (unk) udp: skip L4 aggregation for UDP tunnel packets + CVE-2021-47038: (unk) Bluetooth: avoid deadlock between hci_dev->lock and socket lock + CVE-2021-47040: (unk) io_uring: fix overflows checks in provide buffers + CVE-2021-47041: (unk) nvmet-tcp: fix incorrect locking in state_change sk callback + CVE-2021-47043: (unk) media: venus: core: Fix some resource leaks in the error path of 'venus_probe()' + CVE-2021-47046: (unk) drm/amd/display: Fix off by one in hdmi_14_process_transaction() + CVE-2021-47049: (unk) Drivers: hv: vmbus: Use after free in __vmbus_open() + CVE-2021-47051: (unk) spi: fsl-lpspi: Fix PM reference leak in lpspi_prepare_xfer_hardware() + CVE-2021-47052: (unk) crypto: sa2ul - Fix memory leak of rxd + CVE-2021-47054: (unk) bus: qcom: Put child node before return + CVE-2021-47056: (unk) crypto: qat - ADF_STATUS_PF_RUNNING should be set after adf_dev_init + CVE-2021-47059: (unk) crypto: sun8i-ss - fix result memory leak on error path + CVE-2021-47063: (unk) drm: bridge/panel: Cleanup connector on bridge detach + CVE-2021-47065: (unk) rtw88: Fix array overrun in rtw_get_tx_power_params() + CVE-2021-47067: (unk) soc/tegra: regulators: Fix locking up when voltage-spread is out of range + CVE-2021-47069: (unk) ipc/mqueue, msg, sem: avoid relying on a stack reference past its expiry + CVE-2021-47070: (unk) uio_hv_generic: Fix another memory leak in error handling paths + CVE-2021-47071: (unk) uio_hv_generic: Fix a memory leak in error handling paths + CVE-2021-47073: (unk) platform/x86: dell-smbios-wmi: Fix oops on rmmod dell_smbios + CVE-2021-47074: (unk) nvme-loop: fix memory leak in nvme_loop_create_ctrl() + CVE-2021-47075: (unk) nvmet: fix memory leak in nvmet_alloc_ctrl() + CVE-2021-47076: (unk) RDMA/rxe: Return CQE error if invalid lkey was supplied + CVE-2021-47077: (unk) scsi: qedf: Add pointer checks in qedf_update_link_speed() + CVE-2021-47078: (unk) RDMA/rxe: Clear all QP fields if creation failed + CVE-2021-47082: (unk) tun: avoid double free in tun_free_netdev + CVE-2021-47083: (unk) pinctrl: mediatek: fix global-out-of-bounds issue + CVE-2021-47086: (unk) phonet/pep: refuse to enable an unbound pipe + CVE-2021-47095: (unk) ipmi: ssif: initialize ssif_info->client early + CVE-2021-47100: (unk) ipmi: Fix UAF when uninstall ipmi_si and ipmi_msghandler module + CVE-2021-47101: (unk) asix: fix uninit-value in asix_mdio_read() + CVE-2021-47103: (unk) inet: fully convert sk->sk_rx_dst to RCU rules + CVE-2021-47105: (unk) ice: xsk: return xsk buffers back to pool when cleaning the ring + CVE-2021-47109: (unk) neighbour: allow NUD_NOARP entries to be forced GCed + CVE-2021-47110: (unk) x86/kvm: Disable kvmclock on all CPUs on shutdown + CVE-2021-47111: (unk) xen-netback: take a reference to the RX task thread + CVE-2021-47112: (unk) x86/kvm: Teardown PV features on boot CPU as well + CVE-2021-47113: (unk) btrfs: abort in rename_exchange if we fail to insert the second ref + CVE-2021-47114: (unk) ocfs2: fix data corruption by fallocate + CVE-2021-47116: (unk) ext4: fix memory leak in ext4_mb_init_backend on error path. + CVE-2021-47117: (unk) ext4: fix bug on in ext4_es_cache_extent as ext4_split_extent_at failed + CVE-2021-47118: (unk) pid: take a reference when initializing `cad_pid` + CVE-2021-47119: (unk) ext4: fix memory leak in ext4_fill_super + CVE-2021-47120: (unk) HID: magicmouse: fix NULL-deref on disconnect + CVE-2021-47121: (unk) net: caif: fix memory leak in cfusbl_device_notify + CVE-2021-47122: (unk) net: caif: fix memory leak in caif_device_notify + CVE-2021-47124: (unk) io_uring: fix link timeout refs + CVE-2021-47125: (unk) sch_htb: fix refcount leak in htb_parent_to_leaf_offload + CVE-2021-47126: (unk) ipv6: Fix KASAN: slab-out-of-bounds Read in fib6_nh_flush_exceptions + CVE-2021-47128: (unk) bpf, lockdown, audit: Fix buggy SELinux lockdown permission checks + CVE-2021-47129: (unk) netfilter: nft_ct: skip expectations for confirmed conntrack + CVE-2021-47130: (unk) nvmet: fix freeing unallocated p2pmem + CVE-2021-47131: (unk) net/tls: Fix use-after-free after the TLS device goes down and up + CVE-2021-47133: (unk) HID: amd_sfh: Fix memory leak in amd_sfh_work + CVE-2021-47135: (unk) mt76: mt7921: fix possible AOOB issue in mt7921_mcu_tx_rate_report + CVE-2021-47136: (unk) net: zero-initialize tc skb extension on allocation + CVE-2021-47137: (unk) net: lantiq: fix memory corruption in RX ring + CVE-2021-47138: (unk) cxgb4: avoid accessing registers when clearing filters + CVE-2021-47139: (unk) net: hns3: put off calling register_netdev() until client initialize complete + CVE-2021-47140: (unk) iommu/amd: Clear DMA ops when switching domain + CVE-2021-47141: (unk) gve: Add NULL pointer checks when freeing irqs. + CVE-2021-47142: (unk) drm/amdgpu: Fix a use-after-free + CVE-2021-47143: (unk) net/smc: remove device from smcd_dev_list after failed device_add() + CVE-2021-47144: (unk) drm/amd/amdgpu: fix refcount leak + CVE-2021-47145: (unk) btrfs: do not BUG_ON in link_to_fixup_dir + CVE-2021-47146: (unk) mld: fix panic in mld_newpack() + CVE-2021-47147: (unk) ptp: ocp: Fix a resource leak in an error handling path + CVE-2021-47149: (unk) net: fujitsu: fix potential null-ptr-deref + CVE-2021-47150: (unk) net: fec: fix the potential memory leak in fec_enet_init() + CVE-2021-47151: (unk) interconnect: qcom: bcm-voter: add a missing of_node_put() + CVE-2021-47152: (unk) mptcp: fix data stream corruption + CVE-2021-47153: (unk) i2c: i801: Don't generate an interrupt on bus reset + CVE-2021-47158: (unk) net: dsa: sja1105: add error handling in sja1105_setup() + CVE-2021-47159: (unk) net: dsa: fix a crash if ->get_sset_count() fails + CVE-2021-47160: (unk) net: dsa: mt7530: fix VLAN traffic leaks + CVE-2021-47161: (unk) spi: spi-fsl-dspi: Fix a resource leak in an error handling path + CVE-2021-47162: (unk) tipc: skb_linearize the head skb when reassembling msgs + CVE-2021-47163: (unk) tipc: wait and exit until all work queues are done + CVE-2021-47164: (unk) net/mlx5e: Fix null deref accessing lag dev + CVE-2021-47165: (unk) drm/meson: fix shutdown crash when component not probed + CVE-2021-47166: (unk) NFS: Don't corrupt the value of pg_bytes_written in nfs_do_recoalesce() + CVE-2021-47167: (unk) NFS: Fix an Oopsable condition in __nfs_pageio_add_request() + CVE-2021-47168: (unk) NFS: fix an incorrect limit in filelayout_decode_layout() + CVE-2021-47169: (unk) serial: rp2: use 'request_firmware' instead of 'request_firmware_nowait' + CVE-2021-47170: (unk) USB: usbfs: Don't WARN about excessively large memory allocations + CVE-2021-47171: (unk) net: usb: fix memory leak in smsc75xx_bind + CVE-2021-47172: (unk) iio: adc: ad7124: Fix potential overflow due to non sequential channel numbers + CVE-2021-47173: (unk) misc/uss720: fix memory leak in uss720_probe + CVE-2021-47174: (unk) netfilter: nft_set_pipapo_avx2: Add irq_fpu_usable() check, fallback to non-AVX2 version + CVE-2021-47175: (unk) net/sched: fq_pie: fix OOB access in the traffic path + CVE-2021-47177: (unk) iommu/vt-d: Fix sysfs leak in alloc_iommu() + CVE-2021-47179: (unk) NFSv4: Fix a NULL pointer dereference in pnfs_mark_matching_lsegs_return() + CVE-2021-47180: (unk) NFC: nci: fix memory leak in nci_allocate_device CVE-2022-0001: (unk) x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE CVE-2022-0002: (unk) x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE CVE-2022-0168: (unk) cifs: fix NULL ptr dereference in smb2_ioctl_query_info() @@ -581,6 +769,10 @@ Outstanding CVEs: CVE-2022-47929: (unk) net: sched: disallow noqueue for qdisc classes CVE-2022-47946: (unk) io_uring: kill sqo_dead and sqo submission halting CVE-2022-48619: (unk) Input: add bounds checking to input_set_capability() + CVE-2022-48626: (unk) moxart: fix potential use-after-free on remove path + CVE-2022-48627: (unk) vt: fix memory overlapping when deleting chars in the buffer + CVE-2022-48628: (unk) ceph: drop messages from MDS when unmounting + CVE-2022-48629: (unk) crypto: qcom-rng - ensure buffer for generate is completely filled CVE-2023-0045: (unk) x86/bugs: Flush IBP in ib_prctl_set() CVE-2023-0047: (unk) mm, oom: do not trigger out_of_memory from the #PF CVE-2023-0160: (unk) bpf, sockmap: fix deadlocks in the sockhash and sockmap @@ -664,6 +856,7 @@ Outstanding CVEs: CVE-2023-28410: (unk) drm/i915/gem: add missing boundary check in vm_access CVE-2023-28466: (unk) net: tls: fix possible race condition between do_tls_getsockopt_conf() and do_tls_setsockopt_conf() CVE-2023-2860: (unk) ipv6: sr: fix out-of-bounds read when setting HMAC data. + CVE-2023-28746: (unk) x86/mmio: Disable KVM mitigation when X86_FEATURE_CLEAR_CPU_BUF is set CVE-2023-28772: (unk) seq_buf: Fix overflow in seq_buf_putmem_hex() CVE-2023-2898: (unk) f2fs: fix to avoid NULL pointer dereference f2fs_write_end_io() CVE-2023-2985: (unk) fs: hfsplus: fix UAF issue in hfsplus_put_super @@ -746,7 +939,7 @@ Outstanding CVEs: CVE-2023-4623: (unk) net/sched: sch_hfsc: Ensure inner classes have fsc curve CVE-2023-46343: (unk) nfc: nci: fix possible NULL pointer dereference in send_acknowledge() CVE-2023-46838: (unk) xen-netback: don't produce zero-size SKB frags - CVE-2023-47233: (unk) + CVE-2023-47233: (unk) wifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach CVE-2023-4732: (unk) mm/userfaultfd: fix uffd-wp special cases for fork() CVE-2023-4881: (unk) netfilter: nftables: exthdr: fix 4-byte stack OOB write CVE-2023-4921: (unk) net: sched: sch_qfq: Fix UAF in qfq_dequeue() @@ -772,20 +965,123 @@ Outstanding CVEs: CVE-2023-52449: (unk) mtd: Fix gluebi NULL pointer dereference caused by ftl notifier CVE-2023-52451: (unk) powerpc/pseries/memhp: Fix access beyond end of drmem array CVE-2023-52454: (unk) nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length - CVE-2023-52456: (unk) serial: imx: fix tx statemachine deadlock - CVE-2023-52457: (unk) serial: 8250: omap: Don't skip resource freeing if pm_runtime_resume_and_get() failed CVE-2023-52458: (unk) block: add check that partition length needs to be aligned with block size CVE-2023-52463: (unk) efivarfs: force RO when remounting if SetVariable is not supported CVE-2023-52464: (unk) EDAC/thunderx: Fix possible out-of-bounds string access + CVE-2023-52469: (unk) drivers/amd/pm: fix a use-after-free in kv_parse_power_table + CVE-2023-52470: (unk) drm/radeon: check the alloc_workqueue return value in radeon_crtc_init() + CVE-2023-52474: (unk) IB/hfi1: Fix bugs with non-PAGE_SIZE-end multi-iovec user SDMA requests + CVE-2023-52475: (unk) Input: powermate - fix use-after-free in powermate_config_complete + CVE-2023-52476: (unk) perf/x86/lbr: Filter vsyscall addresses + CVE-2023-52477: (unk) usb: hub: Guard against accesses to uninitialized BOS descriptors + CVE-2023-52478: (unk) HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect + CVE-2023-52479: (unk) ksmbd: fix uaf in smb20_oplock_break_ack + CVE-2023-52480: (unk) ksmbd: fix race condition between session lookup and expire + CVE-2023-52481: (unk) arm64: errata: Add Cortex-A520 speculative unprivileged load workaround + CVE-2023-52482: (unk) x86/srso: Add SRSO mitigation for Hygon processors + CVE-2023-52484: (unk) iommu/arm-smmu-v3: Fix soft lockup triggered by arm_smmu_mm_invalidate_range + CVE-2023-52485: (unk) drm/amd/display: Wake DMCUB before sending a command + CVE-2023-52486: (unk) drm: Don't unref the same fb many times by mistake due to deadlock handling + CVE-2023-52488: (unk) serial: sc16is7xx: convert from _raw_ to _noinc_ regmap functions for FIFO + CVE-2023-52489: (unk) mm/sparsemem: fix race in accessing memory_section->usage + CVE-2023-52491: (unk) media: mtk-jpeg: Fix use after free bug due to error path handling in mtk_jpeg_dec_device_run + CVE-2023-52492: (unk) dmaengine: fix NULL pointer in channel unregistration function + CVE-2023-52493: (unk) bus: mhi: host: Drop chan lock before queuing buffers + CVE-2023-52497: (unk) erofs: fix lz4 inplace decompression + CVE-2023-52498: (unk) PM: sleep: Fix possible deadlocks in core system-wide PM code + CVE-2023-52500: (unk) scsi: pm80xx: Avoid leaking tags when processing OPC_INB_SET_CONTROLLER_CONFIG command + CVE-2023-52501: (unk) ring-buffer: Do not attempt to read past "commit" + CVE-2023-52502: (unk) net: nfc: fix races in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn() + CVE-2023-52503: (unk) tee: amdtee: fix use-after-free vulnerability in amdtee_close_session + CVE-2023-52504: (unk) x86/alternatives: Disable KASAN in apply_alternatives() + CVE-2023-52506: (unk) LoongArch: Set all reserved memblocks on Node#0 at initialization + CVE-2023-52507: (unk) nfc: nci: assert requested protocol is valid + CVE-2023-52508: (unk) nvme-fc: Prevent null pointer dereference in nvme_fc_io_getuuid() + CVE-2023-52509: (unk) ravb: Fix use-after-free issue in ravb_tx_timeout_work() + CVE-2023-52510: (unk) ieee802154: ca8210: Fix a potential UAF in ca8210_probe + CVE-2023-52511: (unk) spi: sun6i: reduce DMA RX transfer width to single byte + CVE-2023-52513: (unk) RDMA/siw: Fix connection failure handling + CVE-2023-52515: (unk) RDMA/srp: Do not call scsi_done() from srp_abort() + CVE-2023-52516: (unk) dma-debug: don't call __dma_entry_alloc_check_leak() under free_entries_lock + CVE-2023-52517: (unk) spi: sun6i: fix race between DMA RX transfer completion and RX FIFO drain + CVE-2023-52519: (unk) HID: intel-ish-hid: ipc: Disable and reenable ACPI GPE bit + CVE-2023-52522: (unk) net: fix possible store tearing in neigh_periodic_work() + CVE-2023-52527: (unk) ipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data() + CVE-2023-52528: (unk) net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg + CVE-2023-52530: (unk) wifi: mac80211: fix potential key use-after-free + CVE-2023-52531: (unk) wifi: iwlwifi: mvm: Fix a memory corruption issue + CVE-2023-52532: (unk) net: mana: Fix TX CQE error handling + CVE-2023-52559: (unk) iommu/vt-d: Avoid memory allocation in iommu_suspend() + CVE-2023-52561: (unk) arm64: dts: qcom: sdm845-db845c: Mark cont splash memory region as reserved + CVE-2023-52563: (unk) drm/meson: fix memory leak on ->hpd_notify callback + CVE-2023-52565: (unk) media: uvcvideo: Fix OOB read + CVE-2023-52566: (unk) nilfs2: fix potential use after free in nilfs_gccache_submit_read_data() + CVE-2023-52568: (unk) x86/sgx: Resolves SECS reclaim vs. page fault for EAUG race + CVE-2023-52569: (unk) btrfs: remove BUG() after failure to insert delayed dir index item + CVE-2023-52571: (unk) power: supply: rk817: Fix node refcount leak + CVE-2023-52572: (unk) cifs: Fix UAF in cifs_demultiplex_thread() + CVE-2023-52573: (unk) net: rds: Fix possible NULL-pointer dereference + CVE-2023-52574: (unk) team: fix null-ptr-deref when team device type is changed + CVE-2023-52578: (unk) net: bridge: use DEV_STATS_INC() + CVE-2023-52583: (unk) ceph: fix deadlock or deadcode of misusing dget() + CVE-2023-52584: (unk) spmi: mediatek: Fix UAF on device remove + CVE-2023-52585: (unk) drm/amdgpu: Fix possible NULL dereference in amdgpu_ras_query_error_status_helper() + CVE-2023-52586: (unk) drm/msm/dpu: Add mutex lock in control vblank irq + CVE-2023-52587: (unk) IB/ipoib: Fix mcast list locking + CVE-2023-52588: (unk) f2fs: fix to tag gcing flag on page during block migration + CVE-2023-52589: (unk) media: rkisp1: Fix IRQ disable race issue + CVE-2023-52590: (unk) ocfs2: Avoid touching renamed directory if parent does not change + CVE-2023-52591: (unk) reiserfs: Avoid touching renamed directory if parent does not change + CVE-2023-52593: (unk) wifi: wfx: fix possible NULL pointer dereference in wfx_set_mfp_ap() + CVE-2023-52594: (unk) wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus() + CVE-2023-52595: (unk) wifi: rt2x00: restart beacon queue when hardware reset + CVE-2023-52596: (unk) sysctl: Fix out of bounds access for empty sysctl registers + CVE-2023-52597: (unk) KVM: s390: fix setting of fpc register + CVE-2023-52598: (unk) s390/ptrace: handle setting of fpc register correctly + CVE-2023-52599: (unk) jfs: fix array-index-out-of-bounds in diNewExt + CVE-2023-52600: (unk) jfs: fix uaf in jfs_evict_inode + CVE-2023-52601: (unk) jfs: fix array-index-out-of-bounds in dbAdjTree + CVE-2023-52602: (unk) jfs: fix slab-out-of-bounds Read in dtSearch + CVE-2023-52603: (unk) UBSAN: array-index-out-of-bounds in dtSplitRoot + CVE-2023-52604: (unk) FS:JFS:UBSAN:array-index-out-of-bounds in dbAdjTree + CVE-2023-52606: (unk) powerpc/lib: Validate size for vector operations + CVE-2023-52607: (unk) powerpc/mm: Fix null-pointer dereference in pgtable_cache_add + CVE-2023-52608: (unk) firmware: arm_scmi: Check mailbox/SMT channel for consistency + CVE-2023-52609: (unk) binder: fix race between mmput() and do_exit() + CVE-2023-52610: (unk) net/sched: act_ct: fix skb leak and crash on ooo frags + CVE-2023-52612: (unk) crypto: scomp - fix req->dst buffer overflow + CVE-2023-52614: (unk) PM / devfreq: Fix buffer overflow in trans_stat_show + CVE-2023-52615: (unk) hwrng: core - Fix page fault dead lock on mmap-ed hwrng + CVE-2023-52617: (unk) PCI: switchtec: Fix stdev_release() crash after surprise hot remove + CVE-2023-52618: (unk) block/rnbd-srv: Check for unlikely string overflow + CVE-2023-52619: (unk) pstore/ram: Fix crash when setting number of cpus to an odd number + CVE-2023-52620: (unk) netfilter: nf_tables: disallow timeout for anonymous sets + CVE-2023-52621: (unk) bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers + CVE-2023-52622: (unk) ext4: avoid online resizing failures due to oversized flex bg + CVE-2023-52623: (unk) SUNRPC: Fix a suspicious RCU usage warning + CVE-2023-52624: (unk) drm/amd/display: Wake DMCUB before executing GPINT commands + CVE-2023-52625: (unk) drm/amd/display: Refactor DMCUB enter/exit idle interface + CVE-2023-52627: (unk) iio: adc: ad7091r: Allow users to configure device events + CVE-2023-52628: (unk) netfilter: nftables: exthdr: fix 4-byte stack OOB write + CVE-2023-52629: (unk) sh: push-switch: Reorder cleanup operations to avoid use-after-free bug + CVE-2023-52632: (unk) drm/amdkfd: Fix lock dependency warning with srcu + CVE-2023-52633: (unk) um: time-travel: fix time corruption + CVE-2023-52634: (unk) drm/amd/display: Fix disable_otg_wa logic + CVE-2023-52635: (unk) PM / devfreq: Synchronize devfreq_monitor_[start/stop] + CVE-2023-52637: (unk) can: j1939: Fix UAF in j1939_sk_match_filter during setsockopt(SO_J1939_FILTER) + CVE-2023-52638: (unk) can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock + CVE-2023-52639: (unk) KVM: s390: vsie: fix race during shadow creation + CVE-2023-52640: (unk) fs/ntfs3: Fix oob in ntfs_listxattr + CVE-2023-52641: (unk) fs/ntfs3: Add NULL ptr dereference checking at the end of attr_allocate_frame() CVE-2023-5717: (unk) perf: Disallow mis-matched inherited group reads CVE-2023-6040: (unk) netfilter: nf_tables: Reject tables of unsupported family CVE-2023-6121: (unk) nvmet: nul-terminate the NQNs passed in the connect command CVE-2023-6176: (unk) net/tls: do not free tls_rec on async operation in bpf_exec_tx_verdict() CVE-2023-6240: (unk) - CVE-2023-6270: (unk) - CVE-2023-6356: (unk) + CVE-2023-6270: (unk) aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts + CVE-2023-6356: (unk) nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length CVE-2023-6535: (unk) - CVE-2023-6536: (unk) + CVE-2023-6536: (unk) nvmet-tcp: fix a crash in nvmet_req_complete() CVE-2023-6546: (unk) tty: n_gsm: fix the UAF caused by race condition in gsm_cleanup_mux CVE-2023-6560: (unk) io_uring: don't allow discontig pages for IORING_SETUP_NO_MMAP CVE-2023-6606: (unk) smb: client: fix OOB in smbCalcSize() @@ -794,7 +1090,7 @@ Outstanding CVEs: CVE-2023-6915: (unk) ida: Fix crash in ida_free when the bitmap is empty CVE-2023-6931: (unk) perf: Fix perf_event_validate_size() CVE-2023-6932: (unk) ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet - CVE-2023-7042: (unk) + CVE-2023-7042: (unk) wifi: ath10k: fix NULL pointer dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev() CVE-2023-7192: (unk) netfilter: ctnetlink: fix possible refcount leak in ctnetlink_create_conntrack() CVE-2024-0340: (unk) vhost: use kzalloc() instead of kmalloc() followed by memset() CVE-2024-0564: (unk) @@ -804,15 +1100,16 @@ Outstanding CVEs: CVE-2024-0641: (unk) tipc: fix a potential deadlock on &tx->lock CVE-2024-0646: (unk) net: tls, update curr on splice as well CVE-2024-0775: (unk) ext4: improve error recovery code paths in __ext4_remount() - CVE-2024-0841: (unk) + CVE-2024-0841: (unk) fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super CVE-2024-1086: (unk) netfilter: nf_tables: reject QUEUE/DROP verdict parameters CVE-2024-1151: (unk) net: openvswitch: limit the number of recursions from action sets CVE-2024-1312: (unk) mm: lock_vma_under_rcu() must check vma->anon_vma under vma lock CVE-2024-21803: (unk) - CVE-2024-22099: (unk) + CVE-2024-2193: (unk) + CVE-2024-22099: (unk) Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security CVE-2024-22386: (unk) - CVE-2024-23196: (unk) - CVE-2024-23307: (unk) + CVE-2024-23196: (unk) ALSA: hda: fix a possible null-pointer dereference due to data race in snd_hdac_regmap_sync() + CVE-2024-23307: (unk) md/raid5: fix atomicity violation in raid5_cache_count CVE-2024-23848: (unk) CVE-2024-23849: (unk) net/rds: Fix UBSAN: array-index-out-of-bounds in rds_cmsg_recv CVE-2024-23851: (unk) dm: limit the number of targets and parameter size area @@ -821,7 +1118,7 @@ Outstanding CVEs: CVE-2024-24858: (unk) CVE-2024-24859: (unk) CVE-2024-24860: (unk) Bluetooth: Fix atomicity violation in {min,max}_key_size_set - CVE-2024-24861: (unk) + CVE-2024-24861: (unk) media: xc4000: Fix atomicity violation in xc4000_get_frequency CVE-2024-24864: (unk) CVE-2024-25739: (unk) CVE-2024-25740: (unk) @@ -831,13 +1128,127 @@ Outstanding CVEs: CVE-2024-26584: (unk) net: tls: handle backlogging of crypto requests CVE-2024-26585: (unk) tls: fix race between tx work scheduling and socket close CVE-2024-26586: (unk) mlxsw: spectrum_acl_tcam: Fix stack corruption - CVE-2024-26587: (unk) net: netdevsim: don't try to destroy PHC on VFs - CVE-2024-26588: (unk) LoongArch: BPF: Prevent out-of-bounds memory access CVE-2024-26589: (unk) bpf: Reject variable offset alu on PTR_TO_FLOW_KEYS - CVE-2024-26591: (unk) bpf: Fix re-attachment branch in bpf_tracing_prog_attach CVE-2024-26592: (unk) ksmbd: fix UAF issue in ksmbd_tcp_new_connection() CVE-2024-26593: (unk) i2c: i801: Fix block process call transactions CVE-2024-26594: (unk) ksmbd: validate mech token in session setup CVE-2024-26595: (unk) mlxsw: spectrum_acl_tcam: Fix NULL pointer dereference in error path CVE-2024-26597: (unk) net: qualcomm: rmnet: fix global oob in rmnet_policy CVE-2024-26598: (unk) KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache + CVE-2024-26600: (unk) phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP + CVE-2024-26602: (unk) sched/membarrier: reduce the ability to hammer on sys_membarrier + CVE-2024-26606: (unk) binder: signal epoll threads of self-work + CVE-2024-26607: (unk) drm/bridge: sii902x: Fix probing race issue + CVE-2024-26610: (unk) wifi: iwlwifi: fix a memory corruption + CVE-2024-26614: (unk) tcp: make sure init the accept_queue's spinlocks once + CVE-2024-26615: (unk) net/smc: fix illegal rmb_desc access in SMC-D connection dump + CVE-2024-26622: (unk) tomoyo: fix UAF write bug in tomoyo_write_control() + CVE-2024-26623: (unk) pds_core: Prevent race issues involving the adminq + CVE-2024-26625: (unk) llc: call sock_orphan() at release time + CVE-2024-26627: (unk) scsi: core: Move scsi_host_busy() out of host lock for waking up EH handler + CVE-2024-26633: (unk) ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim() + CVE-2024-26635: (unk) llc: Drop support for ETH_P_TR_802_2. + CVE-2024-26636: (unk) llc: make llc_ui_sendmsg() more robust against bonding changes + CVE-2024-26640: (unk) tcp: add sanity checks to rx zerocopy + CVE-2024-26641: (unk) ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv() + CVE-2024-26642: (unk) netfilter: nf_tables: disallow anonymous set with timeout flag + CVE-2024-26644: (unk) btrfs: don't abort filesystem when attempting to snapshot deleted subvolume + CVE-2024-26645: (unk) tracing: Ensure visibility when inserting an element into tracing_map + CVE-2024-26646: (unk) thermal: intel: hfi: Add syscore callbacks for system-wide PM + CVE-2024-26647: (unk) drm/amd/display: Fix late derefrence 'dsc' check in 'link_set_dsc_pps_packet()' + CVE-2024-26648: (unk) drm/amd/display: Fix variable deferencing before NULL check in edp_setup_replay() + CVE-2024-26650: (unk) platform/x86: p2sb: Allow p2sb_bar() calls during PCI device probe + CVE-2024-26651: (unk) sr9800: Add check for usbnet_get_endpoints + CVE-2024-26654: (unk) ALSA: sh: aica: reorder cleanup operations to avoid UAF bugs + CVE-2024-26655: (unk) Fix memory leak in posix_clock_open() + CVE-2024-26656: (unk) drm/amdgpu: fix use-after-free bug + CVE-2024-26658: (unk) bcachefs: grab s_umount only if snapshotting + CVE-2024-26659: (unk) xhci: handle isoc Babble and Buffer Overrun events properly + CVE-2024-26663: (unk) tipc: Check the bearer type before calling tipc_udp_nl_bearer_add() + CVE-2024-26664: (unk) hwmon: (coretemp) Fix out-of-bounds memory access + CVE-2024-26668: (unk) netfilter: nft_limit: reject configurations that cause integer overflow + CVE-2024-26669: (unk) net/sched: flower: Fix chain template offload + CVE-2024-26671: (unk) blk-mq: fix IO hang from sbitmap wakeup race + CVE-2024-26672: (unk) drm/amdgpu: Fix variable 'mca_funcs' dereferenced before NULL check in 'amdgpu_mca_smu_get_mca_entry()' + CVE-2024-26673: (unk) netfilter: nft_ct: sanitize layer 3 and 4 protocol number in custom expectations + CVE-2024-26675: (unk) ppp_async: limit MRU to 64K + CVE-2024-26676: (unk) af_unix: Call kfree_skb() for dead unix_(sk)->oob_skb in GC. + CVE-2024-26677: (unk) rxrpc: Fix delayed ACKs to not set the reference serial number + CVE-2024-26679: (unk) inet: read sk->sk_family once in inet_recv_error() + CVE-2024-26680: (unk) net: atlantic: Fix DMA mapping for PTP hwts ring + CVE-2024-26684: (unk) net: stmmac: xgmac: fix handling of DPP safety error for DMA channels + CVE-2024-26685: (unk) nilfs2: fix potential bug in end_buffer_async_write + CVE-2024-26686: (unk) fs/proc: do_task_stat: use sig->stats_lock to gather the threads/children stats + CVE-2024-26687: (unk) xen/events: close evtchn after mapping cleanup + CVE-2024-26688: (unk) fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super + CVE-2024-26689: (unk) ceph: prevent use-after-free in encode_cap_msg() + CVE-2024-26691: (unk) KVM: arm64: Fix circular locking dependency + CVE-2024-26696: (unk) nilfs2: fix hang in nilfs_lookup_dirty_data_buffers() + CVE-2024-26697: (unk) nilfs2: fix data corruption in dsync block recovery for small block sizes + CVE-2024-26698: (unk) hv_netvsc: Fix race condition between netvsc_probe and netvsc_remove + CVE-2024-26699: (unk) drm/amd/display: Fix array-index-out-of-bounds in dcn35_clkmgr + CVE-2024-26700: (unk) drm/amd/display: Fix MST Null Ptr for RV + CVE-2024-26702: (unk) iio: magnetometer: rm3100: add boundary check for the value read from RM3100_REG_TMRC + CVE-2024-26704: (unk) ext4: fix double-free of blocks due to wrong extents moved_len + CVE-2024-26706: (unk) parisc: Fix random data corruption from exception handler + CVE-2024-26712: (unk) powerpc/kasan: Fix addr error caused by page alignment + CVE-2024-26713: (unk) powerpc/pseries/iommu: Fix iommu initialisation during DLPAR add + CVE-2024-26715: (unk) usb: dwc3: gadget: Fix NULL pointer dereference in dwc3_gadget_suspend + CVE-2024-26719: (unk) nouveau: offload fence uevents work to workqueue + CVE-2024-26720: (unk) mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again + CVE-2024-26726: (unk) btrfs: don't drop extent_map for free space inode on write error + CVE-2024-26733: (unk) arp: Prevent overflow in arp_req_get(). + CVE-2024-26735: (unk) ipv6: sr: fix possible use-after-free and null-ptr-deref + CVE-2024-26736: (unk) afs: Increase buffer size in afs_update_volume_status() + CVE-2024-26738: (unk) powerpc/pseries/iommu: DLPAR add doesn't completely initialize pci_controller + CVE-2024-26739: (unk) net/sched: act_mirred: don't override retval if we already lost the skb + CVE-2024-26740: (unk) net/sched: act_mirred: use the backlog for mirred ingress + CVE-2024-26743: (unk) RDMA/qedr: Fix qedr_create_user_qp error flow + CVE-2024-26744: (unk) RDMA/srpt: Support specifying the srpt_service_guid parameter + CVE-2024-26745: (unk) powerpc/pseries/iommu: IOMMU table is not initialized for kdump over SR-IOV + CVE-2024-26747: (unk) usb: roles: fix NULL pointer issue when put module's reference + CVE-2024-26748: (unk) usb: cdns3: fix memory double free when handle zero packet + CVE-2024-26749: (unk) usb: cdns3: fixed memory use after free at cdns3_gadget_ep_disable() + CVE-2024-26751: (unk) ARM: ep93xx: Add terminator to gpiod_lookup_table + CVE-2024-26752: (unk) l2tp: pass correct message length to ip6_append_data + CVE-2024-26754: (unk) gtp: fix use-after-free and null-ptr-deref in gtp_genl_dump_pdp() + CVE-2024-26756: (unk) md: Don't register sync_thread for reshape directly + CVE-2024-26757: (unk) md: Don't ignore read-only array in md_check_recovery() + CVE-2024-26758: (unk) md: Don't ignore suspended array in md_check_recovery() + CVE-2024-26759: (unk) mm/swap: fix race when skipping swapcache + CVE-2024-26763: (unk) dm-crypt: don't modify the data when using authenticated encryption + CVE-2024-26764: (unk) fs/aio: Restrict kiocb_set_cancel_fn() to I/O submitted via libaio + CVE-2024-26765: (unk) LoongArch: Disable IRQ before init_fn() for nonboot CPUs + CVE-2024-26766: (unk) IB/hfi1: Fix sdma.h tx->num_descs off-by-one error + CVE-2024-26767: (unk) drm/amd/display: fixed integer types and null check locations + CVE-2024-26768: (unk) LoongArch: Change acpi_core_pic[NR_CPUS] to acpi_core_pic[MAX_CORE_PIC] + CVE-2024-26769: (unk) nvmet-fc: avoid deadlock on delete association path + CVE-2024-26770: (unk) HID: nvidia-shield: Add missing null pointer checks to LED initialization + CVE-2024-26771: (unk) dmaengine: ti: edma: Add some null pointer checks to the edma_probe + CVE-2024-26772: (unk) ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal() + CVE-2024-26773: (unk) ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found() + CVE-2024-26774: (unk) ext4: avoid dividing by 0 in mb_update_avg_fragment_size() when block bitmap corrupt + CVE-2024-26775: (unk) aoe: avoid potential deadlock at set_capacity + CVE-2024-26776: (unk) spi: hisi-sfc-v3xx: Return IRQ_NONE if no interrupts were detected + CVE-2024-26777: (unk) fbdev: sis: Error out if pixclock equals zero + CVE-2024-26778: (unk) fbdev: savage: Error out if pixclock equals zero + CVE-2024-26779: (unk) wifi: mac80211: fix race condition on enabling fast-xmit + CVE-2024-26782: (unk) mptcp: fix double-free on socket dismantle + CVE-2024-26784: (unk) pmdomain: arm: Fix NULL dereference on scmi_perf_domain removal + CVE-2024-26787: (unk) mmc: mmci: stm32: fix DMA API overlapping mappings warning + CVE-2024-26788: (unk) dmaengine: fsl-qdma: init irq after reg initialization + CVE-2024-26789: (unk) crypto: arm64/neonbs - fix out-of-bounds access on short input + CVE-2024-26790: (unk) dmaengine: fsl-qdma: fix SoC may hang on 16 byte unaligned read + CVE-2024-26791: (unk) btrfs: dev-replace: properly validate device names + CVE-2024-26793: (unk) gtp: fix use-after-free and null-ptr-deref in gtp_newlink() + CVE-2024-26795: (unk) riscv: Sparse-Memory/vmemmap out-of-bounds fix + CVE-2024-26797: (unk) drm/amd/display: Prevent potential buffer overflow in map_hw_resources + CVE-2024-26798: (unk) fbcon: always restore the old font data in fbcon_do_set_font() + CVE-2024-26801: (unk) Bluetooth: Avoid potential use-after-free in hci_error_reset + CVE-2024-26802: (unk) stmmac: Clear variable when destroying workqueue + CVE-2024-26803: (unk) net: veth: clear GRO when clearing XDP even when down + CVE-2024-26804: (unk) net: ip_tunnel: prevent perpetual headroom growth + CVE-2024-26805: (unk) netlink: Fix kernel-infoleak-after-free in __skb_datagram_iter + CVE-2024-26806: (unk) spi: cadence-qspi: remove system-wide suspend helper calls from runtime PM hooks + CVE-2024-26808: (unk) netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain + CVE-2024-26809: (unk) netfilter: nft_set_pipapo: release elements in clone only from destroy path diff --git a/data/5.9/5.9_CVEs.txt b/data/5.9/5.9_CVEs.txt index ac424bee5..32ffa1ea1 100644 --- a/data/5.9/5.9_CVEs.txt +++ b/data/5.9/5.9_CVEs.txt @@ -28,6 +28,7 @@ CVE-2019-19378: Fix unknown CVE-2019-19449: Fix not seen in stream CVE-2019-19814: Fix unknown CVE-2019-20794: Fix unknown +CVE-2019-25162: Fix not seen in stream CVE-2020-0347: Fix unknown CVE-2020-0423: Fixed with 5.9.2 CVE-2020-10708: Fix unknown @@ -102,6 +103,17 @@ CVE-2020-36322: Fix not seen in stream CVE-2020-36385: Fix not seen in stream CVE-2020-36516: Fix not seen in stream CVE-2020-36694: Fix not seen in stream +CVE-2020-36776: Fix not seen in stream +CVE-2020-36777: Fix not seen in stream +CVE-2020-36778: Fix not seen in stream +CVE-2020-36779: Fix not seen in stream +CVE-2020-36780: Fix not seen in stream +CVE-2020-36781: Fix not seen in stream +CVE-2020-36782: Fix not seen in stream +CVE-2020-36783: Fix not seen in stream +CVE-2020-36784: Fix not seen in stream +CVE-2020-36785: Fix not seen in stream +CVE-2020-36787: Fix not seen in stream CVE-2020-3702: Fix not seen in stream CVE-2020-4788: Fixed with 5.9.10 CVE-2020-8694: Fixed with 5.9.8 @@ -275,6 +287,190 @@ CVE-2021-45485: Fix not seen in stream CVE-2021-45486: Fix not seen in stream CVE-2021-45868: Fix not seen in stream CVE-2021-46283: Fix not seen in stream +CVE-2021-46904: Fix not seen in stream +CVE-2021-46906: Fix not seen in stream +CVE-2021-46908: Fix not seen in stream +CVE-2021-46909: Fix not seen in stream +CVE-2021-46911: Fix not seen in stream +CVE-2021-46912: Fix not seen in stream +CVE-2021-46913: Fix not seen in stream +CVE-2021-46914: Fix not seen in stream +CVE-2021-46915: Fix not seen in stream +CVE-2021-46917: Fix not seen in stream +CVE-2021-46919: Fix not seen in stream +CVE-2021-46920: Fix not seen in stream +CVE-2021-46921: Fix not seen in stream +CVE-2021-46924: Fix not seen in stream +CVE-2021-46925: Fix not seen in stream +CVE-2021-46926: Fix not seen in stream +CVE-2021-46928: Fix not seen in stream +CVE-2021-46929: Fix not seen in stream +CVE-2021-46930: Fix not seen in stream +CVE-2021-46931: Fix not seen in stream +CVE-2021-46932: Fix not seen in stream +CVE-2021-46933: Fix not seen in stream +CVE-2021-46934: Fix not seen in stream +CVE-2021-46935: Fix not seen in stream +CVE-2021-46936: Fix not seen in stream +CVE-2021-46938: Fix not seen in stream +CVE-2021-46939: Fix not seen in stream +CVE-2021-46941: Fix not seen in stream +CVE-2021-46943: Fix not seen in stream +CVE-2021-46944: Fix not seen in stream +CVE-2021-46950: Fix not seen in stream +CVE-2021-46951: Fix not seen in stream +CVE-2021-46952: Fix not seen in stream +CVE-2021-46953: Fix not seen in stream +CVE-2021-46955: Fix not seen in stream +CVE-2021-46956: Fix not seen in stream +CVE-2021-46958: Fix not seen in stream +CVE-2021-46959: Fix not seen in stream +CVE-2021-46960: Fix not seen in stream +CVE-2021-46961: Fix not seen in stream +CVE-2021-46962: Fix not seen in stream +CVE-2021-46963: Fix not seen in stream +CVE-2021-46965: Fix not seen in stream +CVE-2021-46966: Fix not seen in stream +CVE-2021-46967: Fix not seen in stream +CVE-2021-46969: Fix not seen in stream +CVE-2021-46970: Fix not seen in stream +CVE-2021-46971: Fix not seen in stream +CVE-2021-46972: Fix not seen in stream +CVE-2021-46973: Fix not seen in stream +CVE-2021-46974: Fix not seen in stream +CVE-2021-46976: Fix not seen in stream +CVE-2021-46977: Fix not seen in stream +CVE-2021-46980: Fix not seen in stream +CVE-2021-46981: Fix not seen in stream +CVE-2021-46982: Fix not seen in stream +CVE-2021-46983: Fix not seen in stream +CVE-2021-46984: Fix not seen in stream +CVE-2021-46987: Fix not seen in stream +CVE-2021-46988: Fix not seen in stream +CVE-2021-46989: Fix not seen in stream +CVE-2021-46991: Fix not seen in stream +CVE-2021-46992: Fix not seen in stream +CVE-2021-46993: Fix not seen in stream +CVE-2021-46994: Fix not seen in stream +CVE-2021-46998: Fix not seen in stream +CVE-2021-46999: Fix not seen in stream +CVE-2021-47000: Fix not seen in stream +CVE-2021-47001: Fix not seen in stream +CVE-2021-47004: Fix not seen in stream +CVE-2021-47005: Fix not seen in stream +CVE-2021-47006: Fix not seen in stream +CVE-2021-47007: Fix not seen in stream +CVE-2021-47010: Fix not seen in stream +CVE-2021-47012: Fix not seen in stream +CVE-2021-47013: Fix not seen in stream +CVE-2021-47014: Fix not seen in stream +CVE-2021-47015: Fix not seen in stream +CVE-2021-47016: Fix not seen in stream +CVE-2021-47017: Fix not seen in stream +CVE-2021-47018: Fix not seen in stream +CVE-2021-47020: Fix not seen in stream +CVE-2021-47024: Fix not seen in stream +CVE-2021-47026: Fix not seen in stream +CVE-2021-47028: Fix not seen in stream +CVE-2021-47034: Fix not seen in stream +CVE-2021-47035: Fix not seen in stream +CVE-2021-47036: Fix not seen in stream +CVE-2021-47038: Fix not seen in stream +CVE-2021-47040: Fix not seen in stream +CVE-2021-47041: Fix not seen in stream +CVE-2021-47043: Fix not seen in stream +CVE-2021-47046: Fix not seen in stream +CVE-2021-47049: Fix not seen in stream +CVE-2021-47050: Fix not seen in stream +CVE-2021-47051: Fix not seen in stream +CVE-2021-47052: Fix not seen in stream +CVE-2021-47054: Fix not seen in stream +CVE-2021-47055: Fix not seen in stream +CVE-2021-47056: Fix not seen in stream +CVE-2021-47059: Fix not seen in stream +CVE-2021-47060: Fix not seen in stream +CVE-2021-47061: Fix not seen in stream +CVE-2021-47063: Fix not seen in stream +CVE-2021-47065: Fix not seen in stream +CVE-2021-47067: Fix not seen in stream +CVE-2021-47069: Fix not seen in stream +CVE-2021-47070: Fix not seen in stream +CVE-2021-47071: Fix not seen in stream +CVE-2021-47073: Fix not seen in stream +CVE-2021-47074: Fix not seen in stream +CVE-2021-47075: Fix not seen in stream +CVE-2021-47076: Fix not seen in stream +CVE-2021-47077: Fix not seen in stream +CVE-2021-47078: Fix not seen in stream +CVE-2021-47082: Fix not seen in stream +CVE-2021-47083: Fix not seen in stream +CVE-2021-47086: Fix not seen in stream +CVE-2021-47093: Fix not seen in stream +CVE-2021-47095: Fix not seen in stream +CVE-2021-47100: Fix not seen in stream +CVE-2021-47101: Fix not seen in stream +CVE-2021-47103: Fix not seen in stream +CVE-2021-47105: Fix not seen in stream +CVE-2021-47109: Fix not seen in stream +CVE-2021-47110: Fix not seen in stream +CVE-2021-47111: Fix not seen in stream +CVE-2021-47112: Fix not seen in stream +CVE-2021-47113: Fix not seen in stream +CVE-2021-47114: Fix not seen in stream +CVE-2021-47116: Fix not seen in stream +CVE-2021-47117: Fix not seen in stream +CVE-2021-47118: Fix not seen in stream +CVE-2021-47119: Fix not seen in stream +CVE-2021-47120: Fix not seen in stream +CVE-2021-47121: Fix not seen in stream +CVE-2021-47122: Fix not seen in stream +CVE-2021-47124: Fix not seen in stream +CVE-2021-47125: Fix not seen in stream +CVE-2021-47126: Fix not seen in stream +CVE-2021-47128: Fix not seen in stream +CVE-2021-47129: Fix not seen in stream +CVE-2021-47130: Fix not seen in stream +CVE-2021-47131: Fix not seen in stream +CVE-2021-47133: Fix not seen in stream +CVE-2021-47135: Fix not seen in stream +CVE-2021-47136: Fix not seen in stream +CVE-2021-47137: Fix not seen in stream +CVE-2021-47138: Fix not seen in stream +CVE-2021-47139: Fix not seen in stream +CVE-2021-47140: Fix not seen in stream +CVE-2021-47141: Fix not seen in stream +CVE-2021-47142: Fix not seen in stream +CVE-2021-47143: Fix not seen in stream +CVE-2021-47144: Fix not seen in stream +CVE-2021-47145: Fix not seen in stream +CVE-2021-47146: Fix not seen in stream +CVE-2021-47147: Fix not seen in stream +CVE-2021-47149: Fix not seen in stream +CVE-2021-47150: Fix not seen in stream +CVE-2021-47151: Fix not seen in stream +CVE-2021-47152: Fix not seen in stream +CVE-2021-47153: Fix not seen in stream +CVE-2021-47158: Fix not seen in stream +CVE-2021-47159: Fix not seen in stream +CVE-2021-47160: Fix not seen in stream +CVE-2021-47161: Fix not seen in stream +CVE-2021-47162: Fix not seen in stream +CVE-2021-47163: Fix not seen in stream +CVE-2021-47164: Fix not seen in stream +CVE-2021-47165: Fix not seen in stream +CVE-2021-47166: Fix not seen in stream +CVE-2021-47167: Fix not seen in stream +CVE-2021-47168: Fix not seen in stream +CVE-2021-47169: Fix not seen in stream +CVE-2021-47170: Fix not seen in stream +CVE-2021-47171: Fix not seen in stream +CVE-2021-47172: Fix not seen in stream +CVE-2021-47173: Fix not seen in stream +CVE-2021-47174: Fix not seen in stream +CVE-2021-47175: Fix not seen in stream +CVE-2021-47177: Fix not seen in stream +CVE-2021-47179: Fix not seen in stream +CVE-2021-47180: Fix not seen in stream CVE-2022-0001: Fix not seen in stream CVE-2022-0002: Fix not seen in stream CVE-2022-0168: Fix not seen in stream @@ -519,6 +715,10 @@ CVE-2022-47521: Fix not seen in stream CVE-2022-47929: Fix not seen in stream CVE-2022-47946: Fix not seen in stream CVE-2022-48619: Fix not seen in stream +CVE-2022-48626: Fix not seen in stream +CVE-2022-48627: Fix not seen in stream +CVE-2022-48628: Fix not seen in stream +CVE-2022-48629: Fix not seen in stream CVE-2023-0045: Fix not seen in stream CVE-2023-0047: Fix not seen in stream CVE-2023-0160: Fix not seen in stream @@ -602,6 +802,7 @@ CVE-2023-28328: Fix not seen in stream CVE-2023-28410: Fix not seen in stream CVE-2023-28466: Fix not seen in stream CVE-2023-2860: Fix not seen in stream +CVE-2023-28746: Fix not seen in stream CVE-2023-28772: Fix not seen in stream CVE-2023-2898: Fix not seen in stream CVE-2023-2985: Fix not seen in stream @@ -689,7 +890,7 @@ CVE-2023-4622: Fix not seen in stream CVE-2023-4623: Fix not seen in stream CVE-2023-46343: Fix not seen in stream CVE-2023-46838: Fix not seen in stream -CVE-2023-47233: Fix unknown +CVE-2023-47233: Fix not seen in stream CVE-2023-4732: Fix not seen in stream CVE-2023-4881: Fix not seen in stream CVE-2023-4921: Fix not seen in stream @@ -718,19 +919,124 @@ CVE-2023-52449: Fix not seen in stream CVE-2023-52451: Fix not seen in stream CVE-2023-52454: Fix not seen in stream CVE-2023-52456: Fix not seen in stream -CVE-2023-52457: Fix not seen in stream CVE-2023-52458: Fix not seen in stream CVE-2023-52463: Fix not seen in stream CVE-2023-52464: Fix not seen in stream +CVE-2023-52467: Fix not seen in stream +CVE-2023-52469: Fix not seen in stream +CVE-2023-52470: Fix not seen in stream +CVE-2023-52474: Fix not seen in stream +CVE-2023-52475: Fix not seen in stream +CVE-2023-52476: Fix not seen in stream +CVE-2023-52477: Fix not seen in stream +CVE-2023-52478: Fix not seen in stream +CVE-2023-52479: Fix not seen in stream +CVE-2023-52480: Fix not seen in stream +CVE-2023-52481: Fix not seen in stream +CVE-2023-52482: Fix not seen in stream +CVE-2023-52484: Fix not seen in stream +CVE-2023-52485: Fix not seen in stream +CVE-2023-52486: Fix not seen in stream +CVE-2023-52488: Fix not seen in stream +CVE-2023-52489: Fix not seen in stream +CVE-2023-52491: Fix not seen in stream +CVE-2023-52492: Fix not seen in stream +CVE-2023-52493: Fix not seen in stream +CVE-2023-52497: Fix not seen in stream +CVE-2023-52498: Fix not seen in stream +CVE-2023-52500: Fix not seen in stream +CVE-2023-52501: Fix not seen in stream +CVE-2023-52502: Fix not seen in stream +CVE-2023-52503: Fix not seen in stream +CVE-2023-52504: Fix not seen in stream +CVE-2023-52506: Fix not seen in stream +CVE-2023-52507: Fix not seen in stream +CVE-2023-52508: Fix not seen in stream +CVE-2023-52509: Fix not seen in stream +CVE-2023-52510: Fix not seen in stream +CVE-2023-52511: Fix not seen in stream +CVE-2023-52513: Fix not seen in stream +CVE-2023-52515: Fix not seen in stream +CVE-2023-52516: Fix not seen in stream +CVE-2023-52517: Fix not seen in stream +CVE-2023-52519: Fix not seen in stream +CVE-2023-52522: Fix not seen in stream +CVE-2023-52527: Fix not seen in stream +CVE-2023-52528: Fix not seen in stream +CVE-2023-52530: Fix not seen in stream +CVE-2023-52531: Fix not seen in stream +CVE-2023-52532: Fix not seen in stream +CVE-2023-52559: Fix not seen in stream +CVE-2023-52561: Fix not seen in stream +CVE-2023-52563: Fix not seen in stream +CVE-2023-52565: Fix not seen in stream +CVE-2023-52566: Fix not seen in stream +CVE-2023-52568: Fix not seen in stream +CVE-2023-52569: Fix not seen in stream +CVE-2023-52571: Fix not seen in stream +CVE-2023-52572: Fix not seen in stream +CVE-2023-52573: Fix not seen in stream +CVE-2023-52574: Fix not seen in stream +CVE-2023-52578: Fix not seen in stream +CVE-2023-52583: Fix not seen in stream +CVE-2023-52584: Fix not seen in stream +CVE-2023-52585: Fix not seen in stream +CVE-2023-52586: Fix not seen in stream +CVE-2023-52587: Fix not seen in stream +CVE-2023-52588: Fix not seen in stream +CVE-2023-52589: Fix not seen in stream +CVE-2023-52590: Fix not seen in stream +CVE-2023-52591: Fix not seen in stream +CVE-2023-52593: Fix not seen in stream +CVE-2023-52594: Fix not seen in stream +CVE-2023-52595: Fix not seen in stream +CVE-2023-52596: Fix not seen in stream +CVE-2023-52597: Fix not seen in stream +CVE-2023-52598: Fix not seen in stream +CVE-2023-52599: Fix not seen in stream +CVE-2023-52600: Fix not seen in stream +CVE-2023-52601: Fix not seen in stream +CVE-2023-52602: Fix not seen in stream +CVE-2023-52603: Fix not seen in stream +CVE-2023-52604: Fix not seen in stream +CVE-2023-52606: Fix not seen in stream +CVE-2023-52607: Fix not seen in stream +CVE-2023-52608: Fix not seen in stream +CVE-2023-52609: Fix not seen in stream +CVE-2023-52610: Fix not seen in stream +CVE-2023-52612: Fix not seen in stream +CVE-2023-52614: Fix not seen in stream +CVE-2023-52615: Fix not seen in stream +CVE-2023-52617: Fix not seen in stream +CVE-2023-52618: Fix not seen in stream +CVE-2023-52619: Fix not seen in stream +CVE-2023-52620: Fix not seen in stream +CVE-2023-52621: Fix not seen in stream +CVE-2023-52622: Fix not seen in stream +CVE-2023-52623: Fix not seen in stream +CVE-2023-52624: Fix not seen in stream +CVE-2023-52625: Fix not seen in stream +CVE-2023-52627: Fix not seen in stream +CVE-2023-52628: Fix not seen in stream +CVE-2023-52629: Fix not seen in stream +CVE-2023-52632: Fix not seen in stream +CVE-2023-52633: Fix not seen in stream +CVE-2023-52634: Fix not seen in stream +CVE-2023-52635: Fix not seen in stream +CVE-2023-52637: Fix not seen in stream +CVE-2023-52638: Fix not seen in stream +CVE-2023-52639: Fix not seen in stream +CVE-2023-52640: Fix not seen in stream +CVE-2023-52641: Fix not seen in stream CVE-2023-5717: Fix not seen in stream CVE-2023-6040: Fix not seen in stream CVE-2023-6121: Fix not seen in stream CVE-2023-6176: Fix not seen in stream CVE-2023-6240: Fix unknown -CVE-2023-6270: Fix unknown -CVE-2023-6356: Fix unknown +CVE-2023-6270: Fix not seen in stream +CVE-2023-6356: Fix not seen in stream CVE-2023-6535: Fix unknown -CVE-2023-6536: Fix unknown +CVE-2023-6536: Fix not seen in stream CVE-2023-6546: Fix not seen in stream CVE-2023-6560: Fix not seen in stream CVE-2023-6606: Fix not seen in stream @@ -739,7 +1045,7 @@ CVE-2023-6817: Fix not seen in stream CVE-2023-6915: Fix not seen in stream CVE-2023-6931: Fix not seen in stream CVE-2023-6932: Fix not seen in stream -CVE-2023-7042: Fix unknown +CVE-2023-7042: Fix not seen in stream CVE-2023-7192: Fix not seen in stream CVE-2024-0340: Fix not seen in stream CVE-2024-0564: Fix unknown @@ -749,15 +1055,16 @@ CVE-2024-0607: Fix not seen in stream CVE-2024-0641: Fix not seen in stream CVE-2024-0646: Fix not seen in stream CVE-2024-0775: Fix not seen in stream -CVE-2024-0841: Fix unknown +CVE-2024-0841: Fix not seen in stream CVE-2024-1086: Fix not seen in stream CVE-2024-1151: Fix not seen in stream CVE-2024-1312: Fix not seen in stream CVE-2024-21803: Fix unknown -CVE-2024-22099: Fix unknown +CVE-2024-2193: Fix unknown +CVE-2024-22099: Fix not seen in stream CVE-2024-22386: Fix unknown -CVE-2024-23196: Fix unknown -CVE-2024-23307: Fix unknown +CVE-2024-23196: Fix not seen in stream +CVE-2024-23307: Fix not seen in stream CVE-2024-23848: Fix unknown CVE-2024-23849: Fix not seen in stream CVE-2024-23850: Fix not seen in stream @@ -767,7 +1074,7 @@ CVE-2024-24857: Fix unknown CVE-2024-24858: Fix unknown CVE-2024-24859: Fix unknown CVE-2024-24860: Fix not seen in stream -CVE-2024-24861: Fix unknown +CVE-2024-24861: Fix not seen in stream CVE-2024-24864: Fix unknown CVE-2024-25739: Fix unknown CVE-2024-25740: Fix unknown @@ -777,13 +1084,133 @@ CVE-2024-26583: Fix not seen in stream CVE-2024-26584: Fix not seen in stream CVE-2024-26585: Fix not seen in stream CVE-2024-26586: Fix not seen in stream -CVE-2024-26587: Fix not seen in stream -CVE-2024-26588: Fix not seen in stream CVE-2024-26589: Fix not seen in stream -CVE-2024-26591: Fix not seen in stream CVE-2024-26592: Fix not seen in stream CVE-2024-26593: Fix not seen in stream CVE-2024-26594: Fix not seen in stream CVE-2024-26595: Fix not seen in stream CVE-2024-26597: Fix not seen in stream CVE-2024-26598: Fix not seen in stream +CVE-2024-26600: Fix not seen in stream +CVE-2024-26602: Fix not seen in stream +CVE-2024-26606: Fix not seen in stream +CVE-2024-26607: Fix not seen in stream +CVE-2024-26610: Fix not seen in stream +CVE-2024-26614: Fix not seen in stream +CVE-2024-26615: Fix not seen in stream +CVE-2024-26622: Fix not seen in stream +CVE-2024-26623: Fix not seen in stream +CVE-2024-26625: Fix not seen in stream +CVE-2024-26627: Fix not seen in stream +CVE-2024-26633: Fix not seen in stream +CVE-2024-26635: Fix not seen in stream +CVE-2024-26636: Fix not seen in stream +CVE-2024-26640: Fix not seen in stream +CVE-2024-26641: Fix not seen in stream +CVE-2024-26642: Fix not seen in stream +CVE-2024-26644: Fix not seen in stream +CVE-2024-26645: Fix not seen in stream +CVE-2024-26646: Fix not seen in stream +CVE-2024-26647: Fix not seen in stream +CVE-2024-26648: Fix not seen in stream +CVE-2024-26650: Fix not seen in stream +CVE-2024-26651: Fix not seen in stream +CVE-2024-26654: Fix not seen in stream +CVE-2024-26655: Fix not seen in stream +CVE-2024-26656: Fix not seen in stream +CVE-2024-26658: Fix not seen in stream +CVE-2024-26659: Fix not seen in stream +CVE-2024-26661: Fix not seen in stream +CVE-2024-26662: Fix not seen in stream +CVE-2024-26663: Fix not seen in stream +CVE-2024-26664: Fix not seen in stream +CVE-2024-26665: Fix not seen in stream +CVE-2024-26668: Fix not seen in stream +CVE-2024-26669: Fix not seen in stream +CVE-2024-26671: Fix not seen in stream +CVE-2024-26672: Fix not seen in stream +CVE-2024-26673: Fix not seen in stream +CVE-2024-26675: Fix not seen in stream +CVE-2024-26676: Fix not seen in stream +CVE-2024-26677: Fix not seen in stream +CVE-2024-26679: Fix not seen in stream +CVE-2024-26680: Fix not seen in stream +CVE-2024-26684: Fix not seen in stream +CVE-2024-26685: Fix not seen in stream +CVE-2024-26686: Fix not seen in stream +CVE-2024-26687: Fix not seen in stream +CVE-2024-26688: Fix not seen in stream +CVE-2024-26689: Fix not seen in stream +CVE-2024-26691: Fix not seen in stream +CVE-2024-26696: Fix not seen in stream +CVE-2024-26697: Fix not seen in stream +CVE-2024-26698: Fix not seen in stream +CVE-2024-26699: Fix not seen in stream +CVE-2024-26700: Fix not seen in stream +CVE-2024-26702: Fix not seen in stream +CVE-2024-26704: Fix not seen in stream +CVE-2024-26706: Fix not seen in stream +CVE-2024-26707: Fix not seen in stream +CVE-2024-26712: Fix not seen in stream +CVE-2024-26713: Fix not seen in stream +CVE-2024-26715: Fix not seen in stream +CVE-2024-26718: Fix not seen in stream +CVE-2024-26719: Fix not seen in stream +CVE-2024-26720: Fix not seen in stream +CVE-2024-26726: Fix not seen in stream +CVE-2024-26727: Fix not seen in stream +CVE-2024-26733: Fix not seen in stream +CVE-2024-26735: Fix not seen in stream +CVE-2024-26736: Fix not seen in stream +CVE-2024-26738: Fix not seen in stream +CVE-2024-26739: Fix not seen in stream +CVE-2024-26740: Fix not seen in stream +CVE-2024-26743: Fix not seen in stream +CVE-2024-26744: Fix not seen in stream +CVE-2024-26745: Fix not seen in stream +CVE-2024-26747: Fix not seen in stream +CVE-2024-26748: Fix not seen in stream +CVE-2024-26749: Fix not seen in stream +CVE-2024-26751: Fix not seen in stream +CVE-2024-26752: Fix not seen in stream +CVE-2024-26754: Fix not seen in stream +CVE-2024-26756: Fix not seen in stream +CVE-2024-26757: Fix not seen in stream +CVE-2024-26758: Fix not seen in stream +CVE-2024-26759: Fix not seen in stream +CVE-2024-26763: Fix not seen in stream +CVE-2024-26764: Fix not seen in stream +CVE-2024-26765: Fix not seen in stream +CVE-2024-26766: Fix not seen in stream +CVE-2024-26767: Fix not seen in stream +CVE-2024-26768: Fix not seen in stream +CVE-2024-26769: Fix not seen in stream +CVE-2024-26770: Fix not seen in stream +CVE-2024-26771: Fix not seen in stream +CVE-2024-26772: Fix not seen in stream +CVE-2024-26773: Fix not seen in stream +CVE-2024-26774: Fix not seen in stream +CVE-2024-26775: Fix not seen in stream +CVE-2024-26776: Fix not seen in stream +CVE-2024-26777: Fix not seen in stream +CVE-2024-26778: Fix not seen in stream +CVE-2024-26779: Fix not seen in stream +CVE-2024-26782: Fix not seen in stream +CVE-2024-26784: Fix not seen in stream +CVE-2024-26787: Fix not seen in stream +CVE-2024-26788: Fix not seen in stream +CVE-2024-26789: Fix not seen in stream +CVE-2024-26790: Fix not seen in stream +CVE-2024-26791: Fix not seen in stream +CVE-2024-26793: Fix not seen in stream +CVE-2024-26795: Fix not seen in stream +CVE-2024-26797: Fix not seen in stream +CVE-2024-26798: Fix not seen in stream +CVE-2024-26801: Fix not seen in stream +CVE-2024-26802: Fix not seen in stream +CVE-2024-26803: Fix not seen in stream +CVE-2024-26804: Fix not seen in stream +CVE-2024-26805: Fix not seen in stream +CVE-2024-26806: Fix not seen in stream +CVE-2024-26808: Fix not seen in stream +CVE-2024-26809: Fix not seen in stream diff --git a/data/5.9/5.9_security.txt b/data/5.9/5.9_security.txt index 082a82acd..7cbcbc735 100644 --- a/data/5.9/5.9_security.txt +++ b/data/5.9/5.9_security.txt @@ -92,6 +92,7 @@ Outstanding CVEs: CVE-2019-19449: (unk) f2fs: fix to do sanity check on segment/section count CVE-2019-19814: (unk) CVE-2019-20794: (unk) + CVE-2019-25162: (unk) i2c: Fix a potential use after free CVE-2020-0347: (unk) CVE-2020-10708: (unk) CVE-2020-11725: (unk) @@ -138,6 +139,17 @@ Outstanding CVEs: CVE-2020-36385: (unk) RDMA/ucma: Rework ucma_migrate_id() to avoid races with destroy CVE-2020-36516: (unk) ipv4: avoid using shared IP generator for connected sockets CVE-2020-36694: (unk) netfilter: x_tables: Switch synchronization to RCU + CVE-2020-36776: (unk) thermal/drivers/cpufreq_cooling: Fix slab OOB issue + CVE-2020-36777: (unk) media: dvbdev: Fix memory leak in dvb_media_device_free() + CVE-2020-36778: (unk) i2c: xiic: fix reference leak when pm_runtime_get_sync fails + CVE-2020-36779: (unk) i2c: stm32f7: fix reference leak when pm_runtime_get_sync fails + CVE-2020-36780: (unk) i2c: sprd: fix reference leak when pm_runtime_get_sync fails + CVE-2020-36781: (unk) i2c: imx: fix reference leak when pm_runtime_get_sync fails + CVE-2020-36782: (unk) i2c: imx-lpi2c: fix reference leak when pm_runtime_get_sync fails + CVE-2020-36783: (unk) i2c: img-scb: fix reference leak when pm_runtime_get_sync fails + CVE-2020-36784: (unk) i2c: cadence: fix reference leak when pm_runtime_get_sync fails + CVE-2020-36785: (unk) media: atomisp: Fix use after free in atomisp_alloc_css_stat_bufs() + CVE-2020-36787: (unk) media: aspeed: fix clock handling logic CVE-2020-3702: (unk) ath: Use safer key clearing with key cache entries CVE-2021-0129: (unk) Bluetooth: SMP: Fail if remote and local public keys are identical CVE-2021-0399: (unk) @@ -305,6 +317,190 @@ Outstanding CVEs: CVE-2021-45486: (unk) inet: use bigger hash table for IP ID generation CVE-2021-45868: (unk) quota: check block number when reading the block in quota file CVE-2021-46283: (unk) netfilter: nf_tables: initialize set before expression setup + CVE-2021-46904: (unk) net: hso: fix null-ptr-deref during tty device unregistration + CVE-2021-46906: (unk) HID: usbhid: fix info leak in hid_submit_ctrl + CVE-2021-46908: (unk) bpf: Use correct permission flag for mixed signed bounds arithmetic + CVE-2021-46909: (unk) ARM: footbridge: fix PCI interrupt mapping + CVE-2021-46911: (unk) ch_ktls: Fix kernel panic + CVE-2021-46912: (unk) net: Make tcp_allowed_congestion_control readonly in non-init netns + CVE-2021-46913: (unk) netfilter: nftables: clone set element expression template + CVE-2021-46914: (unk) ixgbe: fix unbalanced device enable/disable in suspend/resume + CVE-2021-46915: (unk) netfilter: nft_limit: avoid possible divide error in nft_limit_init + CVE-2021-46917: (unk) dmaengine: idxd: fix wq cleanup of WQCFG registers + CVE-2021-46919: (unk) dmaengine: idxd: fix wq size store permission state + CVE-2021-46920: (unk) dmaengine: idxd: Fix clobbering of SWERR overflow bit on writeback + CVE-2021-46921: (unk) locking/qrwlock: Fix ordering in queued_write_lock_slowpath() + CVE-2021-46924: (unk) NFC: st21nfca: Fix memory leak in device probe and remove + CVE-2021-46925: (unk) net/smc: fix kernel panic caused by race of smc_sock + CVE-2021-46926: (unk) ALSA: hda: intel-sdw-acpi: harden detection of controller + CVE-2021-46928: (unk) parisc: Clear stale IIR value on instruction access rights trap + CVE-2021-46929: (unk) sctp: use call_rcu to free endpoint + CVE-2021-46930: (unk) usb: mtu3: fix list_head check warning + CVE-2021-46931: (unk) net/mlx5e: Wrap the tx reporter dump callback to extract the sq + CVE-2021-46932: (unk) Input: appletouch - initialize work before device registration + CVE-2021-46933: (unk) usb: gadget: f_fs: Clear ffs_eventfd in ffs_data_clear. + CVE-2021-46934: (unk) i2c: validate user data in compat ioctl + CVE-2021-46935: (unk) binder: fix async_free_space accounting for empty parcels + CVE-2021-46936: (unk) net: fix use-after-free in tw_timer_handler + CVE-2021-46938: (unk) dm rq: fix double free of blk_mq_tag_set in dev remove after table load fails + CVE-2021-46939: (unk) tracing: Restructure trace_clock_global() to never block + CVE-2021-46941: (unk) usb: dwc3: core: Do core softreset when switch mode + CVE-2021-46943: (unk) media: staging/intel-ipu3: Fix set_fmt error handling + CVE-2021-46944: (unk) media: staging/intel-ipu3: Fix memory leak in imu_fmt + CVE-2021-46950: (unk) md/raid1: properly indicate failure when ending a failed write request + CVE-2021-46951: (unk) tpm: efi: Use local variable for calculating final log size + CVE-2021-46952: (unk) NFS: fs_context: validate UDP retrans to prevent shift out-of-bounds + CVE-2021-46953: (unk) ACPI: GTDT: Don't corrupt interrupt mappings on watchdow probe failure + CVE-2021-46955: (unk) openvswitch: fix stack OOB read while fragmenting IPv4 packets + CVE-2021-46956: (unk) virtiofs: fix memory leak in virtio_fs_probe() + CVE-2021-46958: (unk) btrfs: fix race between transaction aborts and fsyncs leading to use-after-free + CVE-2021-46959: (unk) spi: Fix use-after-free with devm_spi_alloc_* + CVE-2021-46960: (unk) cifs: Return correct error code from smb2_get_enc_key + CVE-2021-46961: (unk) irqchip/gic-v3: Do not enable irqs when handling spurious interrups + CVE-2021-46962: (unk) mmc: uniphier-sd: Fix a resource leak in the remove function + CVE-2021-46963: (unk) scsi: qla2xxx: Fix crash in qla2xxx_mqueuecommand() + CVE-2021-46965: (unk) mtd: physmap: physmap-bt1-rom: Fix unintentional stack access + CVE-2021-46966: (unk) ACPI: custom_method: fix potential use-after-free issue + CVE-2021-46967: (unk) vhost-vdpa: fix vm_flags for virtqueue doorbell mapping + CVE-2021-46969: (unk) bus: mhi: core: Fix invalid error returning in mhi_queue + CVE-2021-46970: (unk) bus: mhi: pci_generic: Remove WQ_MEM_RECLAIM flag from state workqueue + CVE-2021-46971: (unk) perf/core: Fix unconditional security_locked_down() call + CVE-2021-46972: (unk) ovl: fix leaked dentry + CVE-2021-46973: (unk) net: qrtr: Avoid potential use after free in MHI send + CVE-2021-46974: (unk) bpf: Fix masking negation logic upon negative dst register + CVE-2021-46976: (unk) drm/i915: Fix crash in auto_retire + CVE-2021-46977: (unk) KVM: VMX: Disable preemption when probing user return MSRs + CVE-2021-46980: (unk) usb: typec: ucsi: Retrieve all the PDOs instead of just the first 4 + CVE-2021-46981: (unk) nbd: Fix NULL pointer in flush_workqueue + CVE-2021-46982: (unk) f2fs: compress: fix race condition of overwrite vs truncate + CVE-2021-46983: (unk) nvmet-rdma: Fix NULL deref when SEND is completed with error + CVE-2021-46984: (unk) kyber: fix out of bounds access when preempted + CVE-2021-46987: (unk) btrfs: fix deadlock when cloning inline extents and using qgroups + CVE-2021-46988: (unk) userfaultfd: release page in error path to avoid BUG_ON + CVE-2021-46989: (unk) hfsplus: prevent corruption in shrinking truncate + CVE-2021-46991: (unk) i40e: Fix use-after-free in i40e_client_subtask() + CVE-2021-46992: (unk) netfilter: nftables: avoid overflows in nft_hash_buckets() + CVE-2021-46993: (unk) sched: Fix out-of-bound access in uclamp + CVE-2021-46994: (unk) can: mcp251x: fix resume from sleep before interface was brought up + CVE-2021-46998: (unk) ethernet:enic: Fix a use after free bug in enic_hard_start_xmit + CVE-2021-46999: (unk) sctp: do asoc update earlier in sctp_sf_do_dupcook_a + CVE-2021-47000: (unk) ceph: fix inode leak on getattr error in __fh_to_dentry + CVE-2021-47001: (unk) xprtrdma: Fix cwnd update ordering + CVE-2021-47004: (unk) f2fs: fix to avoid touching checkpointed data in get_victim() + CVE-2021-47005: (unk) PCI: endpoint: Fix NULL pointer dereference for ->get_features() + CVE-2021-47006: (unk) ARM: 9064/1: hw_breakpoint: Do not directly check the event's overflow_handler hook + CVE-2021-47007: (unk) f2fs: fix panic during f2fs_resize_fs() + CVE-2021-47010: (unk) net: Only allow init netns to set default tcp cong to a restricted algo + CVE-2021-47012: (unk) RDMA/siw: Fix a use after free in siw_alloc_mr + CVE-2021-47013: (unk) net:emac/emac-mac: Fix a use after free in emac_mac_tx_buf_send + CVE-2021-47014: (unk) net/sched: act_ct: fix wild memory access when clearing fragments + CVE-2021-47015: (unk) bnxt_en: Fix RX consumer index logic in the error path. + CVE-2021-47016: (unk) m68k: mvme147,mvme16x: Don't wipe PCC timer config bits + CVE-2021-47017: (unk) ath10k: Fix a use after free in ath10k_htc_send_bundle + CVE-2021-47018: (unk) powerpc/64: Fix the definition of the fixmap area + CVE-2021-47020: (unk) soundwire: stream: fix memory leak in stream config error path + CVE-2021-47024: (unk) vsock/virtio: free queued packets when closing socket + CVE-2021-47026: (unk) RDMA/rtrs-clt: destroy sysfs after removing session from active list + CVE-2021-47028: (unk) mt76: mt7915: fix txrate reporting + CVE-2021-47034: (unk) powerpc/64s: Fix pte update for kernel memory on radix + CVE-2021-47035: (unk) iommu/vt-d: Remove WO permissions on second-level paging entries + CVE-2021-47036: (unk) udp: skip L4 aggregation for UDP tunnel packets + CVE-2021-47038: (unk) Bluetooth: avoid deadlock between hci_dev->lock and socket lock + CVE-2021-47040: (unk) io_uring: fix overflows checks in provide buffers + CVE-2021-47041: (unk) nvmet-tcp: fix incorrect locking in state_change sk callback + CVE-2021-47043: (unk) media: venus: core: Fix some resource leaks in the error path of 'venus_probe()' + CVE-2021-47046: (unk) drm/amd/display: Fix off by one in hdmi_14_process_transaction() + CVE-2021-47049: (unk) Drivers: hv: vmbus: Use after free in __vmbus_open() + CVE-2021-47050: (unk) memory: renesas-rpc-if: fix possible NULL pointer dereference of resource + CVE-2021-47051: (unk) spi: fsl-lpspi: Fix PM reference leak in lpspi_prepare_xfer_hardware() + CVE-2021-47052: (unk) crypto: sa2ul - Fix memory leak of rxd + CVE-2021-47054: (unk) bus: qcom: Put child node before return + CVE-2021-47055: (unk) mtd: require write permissions for locking and badblock ioctls + CVE-2021-47056: (unk) crypto: qat - ADF_STATUS_PF_RUNNING should be set after adf_dev_init + CVE-2021-47059: (unk) crypto: sun8i-ss - fix result memory leak on error path + CVE-2021-47060: (unk) KVM: Stop looking for coalesced MMIO zones if the bus is destroyed + CVE-2021-47061: (unk) KVM: Destroy I/O bus devices on unregister failure _after_ sync'ing SRCU + CVE-2021-47063: (unk) drm: bridge/panel: Cleanup connector on bridge detach + CVE-2021-47065: (unk) rtw88: Fix array overrun in rtw_get_tx_power_params() + CVE-2021-47067: (unk) soc/tegra: regulators: Fix locking up when voltage-spread is out of range + CVE-2021-47069: (unk) ipc/mqueue, msg, sem: avoid relying on a stack reference past its expiry + CVE-2021-47070: (unk) uio_hv_generic: Fix another memory leak in error handling paths + CVE-2021-47071: (unk) uio_hv_generic: Fix a memory leak in error handling paths + CVE-2021-47073: (unk) platform/x86: dell-smbios-wmi: Fix oops on rmmod dell_smbios + CVE-2021-47074: (unk) nvme-loop: fix memory leak in nvme_loop_create_ctrl() + CVE-2021-47075: (unk) nvmet: fix memory leak in nvmet_alloc_ctrl() + CVE-2021-47076: (unk) RDMA/rxe: Return CQE error if invalid lkey was supplied + CVE-2021-47077: (unk) scsi: qedf: Add pointer checks in qedf_update_link_speed() + CVE-2021-47078: (unk) RDMA/rxe: Clear all QP fields if creation failed + CVE-2021-47082: (unk) tun: avoid double free in tun_free_netdev + CVE-2021-47083: (unk) pinctrl: mediatek: fix global-out-of-bounds issue + CVE-2021-47086: (unk) phonet/pep: refuse to enable an unbound pipe + CVE-2021-47093: (unk) platform/x86: intel_pmc_core: fix memleak on registration failure + CVE-2021-47095: (unk) ipmi: ssif: initialize ssif_info->client early + CVE-2021-47100: (unk) ipmi: Fix UAF when uninstall ipmi_si and ipmi_msghandler module + CVE-2021-47101: (unk) asix: fix uninit-value in asix_mdio_read() + CVE-2021-47103: (unk) inet: fully convert sk->sk_rx_dst to RCU rules + CVE-2021-47105: (unk) ice: xsk: return xsk buffers back to pool when cleaning the ring + CVE-2021-47109: (unk) neighbour: allow NUD_NOARP entries to be forced GCed + CVE-2021-47110: (unk) x86/kvm: Disable kvmclock on all CPUs on shutdown + CVE-2021-47111: (unk) xen-netback: take a reference to the RX task thread + CVE-2021-47112: (unk) x86/kvm: Teardown PV features on boot CPU as well + CVE-2021-47113: (unk) btrfs: abort in rename_exchange if we fail to insert the second ref + CVE-2021-47114: (unk) ocfs2: fix data corruption by fallocate + CVE-2021-47116: (unk) ext4: fix memory leak in ext4_mb_init_backend on error path. + CVE-2021-47117: (unk) ext4: fix bug on in ext4_es_cache_extent as ext4_split_extent_at failed + CVE-2021-47118: (unk) pid: take a reference when initializing `cad_pid` + CVE-2021-47119: (unk) ext4: fix memory leak in ext4_fill_super + CVE-2021-47120: (unk) HID: magicmouse: fix NULL-deref on disconnect + CVE-2021-47121: (unk) net: caif: fix memory leak in cfusbl_device_notify + CVE-2021-47122: (unk) net: caif: fix memory leak in caif_device_notify + CVE-2021-47124: (unk) io_uring: fix link timeout refs + CVE-2021-47125: (unk) sch_htb: fix refcount leak in htb_parent_to_leaf_offload + CVE-2021-47126: (unk) ipv6: Fix KASAN: slab-out-of-bounds Read in fib6_nh_flush_exceptions + CVE-2021-47128: (unk) bpf, lockdown, audit: Fix buggy SELinux lockdown permission checks + CVE-2021-47129: (unk) netfilter: nft_ct: skip expectations for confirmed conntrack + CVE-2021-47130: (unk) nvmet: fix freeing unallocated p2pmem + CVE-2021-47131: (unk) net/tls: Fix use-after-free after the TLS device goes down and up + CVE-2021-47133: (unk) HID: amd_sfh: Fix memory leak in amd_sfh_work + CVE-2021-47135: (unk) mt76: mt7921: fix possible AOOB issue in mt7921_mcu_tx_rate_report + CVE-2021-47136: (unk) net: zero-initialize tc skb extension on allocation + CVE-2021-47137: (unk) net: lantiq: fix memory corruption in RX ring + CVE-2021-47138: (unk) cxgb4: avoid accessing registers when clearing filters + CVE-2021-47139: (unk) net: hns3: put off calling register_netdev() until client initialize complete + CVE-2021-47140: (unk) iommu/amd: Clear DMA ops when switching domain + CVE-2021-47141: (unk) gve: Add NULL pointer checks when freeing irqs. + CVE-2021-47142: (unk) drm/amdgpu: Fix a use-after-free + CVE-2021-47143: (unk) net/smc: remove device from smcd_dev_list after failed device_add() + CVE-2021-47144: (unk) drm/amd/amdgpu: fix refcount leak + CVE-2021-47145: (unk) btrfs: do not BUG_ON in link_to_fixup_dir + CVE-2021-47146: (unk) mld: fix panic in mld_newpack() + CVE-2021-47147: (unk) ptp: ocp: Fix a resource leak in an error handling path + CVE-2021-47149: (unk) net: fujitsu: fix potential null-ptr-deref + CVE-2021-47150: (unk) net: fec: fix the potential memory leak in fec_enet_init() + CVE-2021-47151: (unk) interconnect: qcom: bcm-voter: add a missing of_node_put() + CVE-2021-47152: (unk) mptcp: fix data stream corruption + CVE-2021-47153: (unk) i2c: i801: Don't generate an interrupt on bus reset + CVE-2021-47158: (unk) net: dsa: sja1105: add error handling in sja1105_setup() + CVE-2021-47159: (unk) net: dsa: fix a crash if ->get_sset_count() fails + CVE-2021-47160: (unk) net: dsa: mt7530: fix VLAN traffic leaks + CVE-2021-47161: (unk) spi: spi-fsl-dspi: Fix a resource leak in an error handling path + CVE-2021-47162: (unk) tipc: skb_linearize the head skb when reassembling msgs + CVE-2021-47163: (unk) tipc: wait and exit until all work queues are done + CVE-2021-47164: (unk) net/mlx5e: Fix null deref accessing lag dev + CVE-2021-47165: (unk) drm/meson: fix shutdown crash when component not probed + CVE-2021-47166: (unk) NFS: Don't corrupt the value of pg_bytes_written in nfs_do_recoalesce() + CVE-2021-47167: (unk) NFS: Fix an Oopsable condition in __nfs_pageio_add_request() + CVE-2021-47168: (unk) NFS: fix an incorrect limit in filelayout_decode_layout() + CVE-2021-47169: (unk) serial: rp2: use 'request_firmware' instead of 'request_firmware_nowait' + CVE-2021-47170: (unk) USB: usbfs: Don't WARN about excessively large memory allocations + CVE-2021-47171: (unk) net: usb: fix memory leak in smsc75xx_bind + CVE-2021-47172: (unk) iio: adc: ad7124: Fix potential overflow due to non sequential channel numbers + CVE-2021-47173: (unk) misc/uss720: fix memory leak in uss720_probe + CVE-2021-47174: (unk) netfilter: nft_set_pipapo_avx2: Add irq_fpu_usable() check, fallback to non-AVX2 version + CVE-2021-47175: (unk) net/sched: fq_pie: fix OOB access in the traffic path + CVE-2021-47177: (unk) iommu/vt-d: Fix sysfs leak in alloc_iommu() + CVE-2021-47179: (unk) NFSv4: Fix a NULL pointer dereference in pnfs_mark_matching_lsegs_return() + CVE-2021-47180: (unk) NFC: nci: fix memory leak in nci_allocate_device CVE-2022-0001: (unk) x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE CVE-2022-0002: (unk) x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE CVE-2022-0168: (unk) cifs: fix NULL ptr dereference in smb2_ioctl_query_info() @@ -549,6 +745,10 @@ Outstanding CVEs: CVE-2022-47929: (unk) net: sched: disallow noqueue for qdisc classes CVE-2022-47946: (unk) io_uring: kill sqo_dead and sqo submission halting CVE-2022-48619: (unk) Input: add bounds checking to input_set_capability() + CVE-2022-48626: (unk) moxart: fix potential use-after-free on remove path + CVE-2022-48627: (unk) vt: fix memory overlapping when deleting chars in the buffer + CVE-2022-48628: (unk) ceph: drop messages from MDS when unmounting + CVE-2022-48629: (unk) crypto: qcom-rng - ensure buffer for generate is completely filled CVE-2023-0045: (unk) x86/bugs: Flush IBP in ib_prctl_set() CVE-2023-0047: (unk) mm, oom: do not trigger out_of_memory from the #PF CVE-2023-0160: (unk) bpf, sockmap: fix deadlocks in the sockhash and sockmap @@ -632,6 +832,7 @@ Outstanding CVEs: CVE-2023-28410: (unk) drm/i915/gem: add missing boundary check in vm_access CVE-2023-28466: (unk) net: tls: fix possible race condition between do_tls_getsockopt_conf() and do_tls_setsockopt_conf() CVE-2023-2860: (unk) ipv6: sr: fix out-of-bounds read when setting HMAC data. + CVE-2023-28746: (unk) x86/mmio: Disable KVM mitigation when X86_FEATURE_CLEAR_CPU_BUF is set CVE-2023-28772: (unk) seq_buf: Fix overflow in seq_buf_putmem_hex() CVE-2023-2898: (unk) f2fs: fix to avoid NULL pointer dereference f2fs_write_end_io() CVE-2023-2985: (unk) fs: hfsplus: fix UAF issue in hfsplus_put_super @@ -719,7 +920,7 @@ Outstanding CVEs: CVE-2023-4623: (unk) net/sched: sch_hfsc: Ensure inner classes have fsc curve CVE-2023-46343: (unk) nfc: nci: fix possible NULL pointer dereference in send_acknowledge() CVE-2023-46838: (unk) xen-netback: don't produce zero-size SKB frags - CVE-2023-47233: (unk) + CVE-2023-47233: (unk) wifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach CVE-2023-4732: (unk) mm/userfaultfd: fix uffd-wp special cases for fork() CVE-2023-4881: (unk) netfilter: nftables: exthdr: fix 4-byte stack OOB write CVE-2023-4921: (unk) net: sched: sch_qfq: Fix UAF in qfq_dequeue() @@ -748,19 +949,124 @@ Outstanding CVEs: CVE-2023-52451: (unk) powerpc/pseries/memhp: Fix access beyond end of drmem array CVE-2023-52454: (unk) nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length CVE-2023-52456: (unk) serial: imx: fix tx statemachine deadlock - CVE-2023-52457: (unk) serial: 8250: omap: Don't skip resource freeing if pm_runtime_resume_and_get() failed CVE-2023-52458: (unk) block: add check that partition length needs to be aligned with block size CVE-2023-52463: (unk) efivarfs: force RO when remounting if SetVariable is not supported CVE-2023-52464: (unk) EDAC/thunderx: Fix possible out-of-bounds string access + CVE-2023-52467: (unk) mfd: syscon: Fix null pointer dereference in of_syscon_register() + CVE-2023-52469: (unk) drivers/amd/pm: fix a use-after-free in kv_parse_power_table + CVE-2023-52470: (unk) drm/radeon: check the alloc_workqueue return value in radeon_crtc_init() + CVE-2023-52474: (unk) IB/hfi1: Fix bugs with non-PAGE_SIZE-end multi-iovec user SDMA requests + CVE-2023-52475: (unk) Input: powermate - fix use-after-free in powermate_config_complete + CVE-2023-52476: (unk) perf/x86/lbr: Filter vsyscall addresses + CVE-2023-52477: (unk) usb: hub: Guard against accesses to uninitialized BOS descriptors + CVE-2023-52478: (unk) HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect + CVE-2023-52479: (unk) ksmbd: fix uaf in smb20_oplock_break_ack + CVE-2023-52480: (unk) ksmbd: fix race condition between session lookup and expire + CVE-2023-52481: (unk) arm64: errata: Add Cortex-A520 speculative unprivileged load workaround + CVE-2023-52482: (unk) x86/srso: Add SRSO mitigation for Hygon processors + CVE-2023-52484: (unk) iommu/arm-smmu-v3: Fix soft lockup triggered by arm_smmu_mm_invalidate_range + CVE-2023-52485: (unk) drm/amd/display: Wake DMCUB before sending a command + CVE-2023-52486: (unk) drm: Don't unref the same fb many times by mistake due to deadlock handling + CVE-2023-52488: (unk) serial: sc16is7xx: convert from _raw_ to _noinc_ regmap functions for FIFO + CVE-2023-52489: (unk) mm/sparsemem: fix race in accessing memory_section->usage + CVE-2023-52491: (unk) media: mtk-jpeg: Fix use after free bug due to error path handling in mtk_jpeg_dec_device_run + CVE-2023-52492: (unk) dmaengine: fix NULL pointer in channel unregistration function + CVE-2023-52493: (unk) bus: mhi: host: Drop chan lock before queuing buffers + CVE-2023-52497: (unk) erofs: fix lz4 inplace decompression + CVE-2023-52498: (unk) PM: sleep: Fix possible deadlocks in core system-wide PM code + CVE-2023-52500: (unk) scsi: pm80xx: Avoid leaking tags when processing OPC_INB_SET_CONTROLLER_CONFIG command + CVE-2023-52501: (unk) ring-buffer: Do not attempt to read past "commit" + CVE-2023-52502: (unk) net: nfc: fix races in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn() + CVE-2023-52503: (unk) tee: amdtee: fix use-after-free vulnerability in amdtee_close_session + CVE-2023-52504: (unk) x86/alternatives: Disable KASAN in apply_alternatives() + CVE-2023-52506: (unk) LoongArch: Set all reserved memblocks on Node#0 at initialization + CVE-2023-52507: (unk) nfc: nci: assert requested protocol is valid + CVE-2023-52508: (unk) nvme-fc: Prevent null pointer dereference in nvme_fc_io_getuuid() + CVE-2023-52509: (unk) ravb: Fix use-after-free issue in ravb_tx_timeout_work() + CVE-2023-52510: (unk) ieee802154: ca8210: Fix a potential UAF in ca8210_probe + CVE-2023-52511: (unk) spi: sun6i: reduce DMA RX transfer width to single byte + CVE-2023-52513: (unk) RDMA/siw: Fix connection failure handling + CVE-2023-52515: (unk) RDMA/srp: Do not call scsi_done() from srp_abort() + CVE-2023-52516: (unk) dma-debug: don't call __dma_entry_alloc_check_leak() under free_entries_lock + CVE-2023-52517: (unk) spi: sun6i: fix race between DMA RX transfer completion and RX FIFO drain + CVE-2023-52519: (unk) HID: intel-ish-hid: ipc: Disable and reenable ACPI GPE bit + CVE-2023-52522: (unk) net: fix possible store tearing in neigh_periodic_work() + CVE-2023-52527: (unk) ipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data() + CVE-2023-52528: (unk) net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg + CVE-2023-52530: (unk) wifi: mac80211: fix potential key use-after-free + CVE-2023-52531: (unk) wifi: iwlwifi: mvm: Fix a memory corruption issue + CVE-2023-52532: (unk) net: mana: Fix TX CQE error handling + CVE-2023-52559: (unk) iommu/vt-d: Avoid memory allocation in iommu_suspend() + CVE-2023-52561: (unk) arm64: dts: qcom: sdm845-db845c: Mark cont splash memory region as reserved + CVE-2023-52563: (unk) drm/meson: fix memory leak on ->hpd_notify callback + CVE-2023-52565: (unk) media: uvcvideo: Fix OOB read + CVE-2023-52566: (unk) nilfs2: fix potential use after free in nilfs_gccache_submit_read_data() + CVE-2023-52568: (unk) x86/sgx: Resolves SECS reclaim vs. page fault for EAUG race + CVE-2023-52569: (unk) btrfs: remove BUG() after failure to insert delayed dir index item + CVE-2023-52571: (unk) power: supply: rk817: Fix node refcount leak + CVE-2023-52572: (unk) cifs: Fix UAF in cifs_demultiplex_thread() + CVE-2023-52573: (unk) net: rds: Fix possible NULL-pointer dereference + CVE-2023-52574: (unk) team: fix null-ptr-deref when team device type is changed + CVE-2023-52578: (unk) net: bridge: use DEV_STATS_INC() + CVE-2023-52583: (unk) ceph: fix deadlock or deadcode of misusing dget() + CVE-2023-52584: (unk) spmi: mediatek: Fix UAF on device remove + CVE-2023-52585: (unk) drm/amdgpu: Fix possible NULL dereference in amdgpu_ras_query_error_status_helper() + CVE-2023-52586: (unk) drm/msm/dpu: Add mutex lock in control vblank irq + CVE-2023-52587: (unk) IB/ipoib: Fix mcast list locking + CVE-2023-52588: (unk) f2fs: fix to tag gcing flag on page during block migration + CVE-2023-52589: (unk) media: rkisp1: Fix IRQ disable race issue + CVE-2023-52590: (unk) ocfs2: Avoid touching renamed directory if parent does not change + CVE-2023-52591: (unk) reiserfs: Avoid touching renamed directory if parent does not change + CVE-2023-52593: (unk) wifi: wfx: fix possible NULL pointer dereference in wfx_set_mfp_ap() + CVE-2023-52594: (unk) wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus() + CVE-2023-52595: (unk) wifi: rt2x00: restart beacon queue when hardware reset + CVE-2023-52596: (unk) sysctl: Fix out of bounds access for empty sysctl registers + CVE-2023-52597: (unk) KVM: s390: fix setting of fpc register + CVE-2023-52598: (unk) s390/ptrace: handle setting of fpc register correctly + CVE-2023-52599: (unk) jfs: fix array-index-out-of-bounds in diNewExt + CVE-2023-52600: (unk) jfs: fix uaf in jfs_evict_inode + CVE-2023-52601: (unk) jfs: fix array-index-out-of-bounds in dbAdjTree + CVE-2023-52602: (unk) jfs: fix slab-out-of-bounds Read in dtSearch + CVE-2023-52603: (unk) UBSAN: array-index-out-of-bounds in dtSplitRoot + CVE-2023-52604: (unk) FS:JFS:UBSAN:array-index-out-of-bounds in dbAdjTree + CVE-2023-52606: (unk) powerpc/lib: Validate size for vector operations + CVE-2023-52607: (unk) powerpc/mm: Fix null-pointer dereference in pgtable_cache_add + CVE-2023-52608: (unk) firmware: arm_scmi: Check mailbox/SMT channel for consistency + CVE-2023-52609: (unk) binder: fix race between mmput() and do_exit() + CVE-2023-52610: (unk) net/sched: act_ct: fix skb leak and crash on ooo frags + CVE-2023-52612: (unk) crypto: scomp - fix req->dst buffer overflow + CVE-2023-52614: (unk) PM / devfreq: Fix buffer overflow in trans_stat_show + CVE-2023-52615: (unk) hwrng: core - Fix page fault dead lock on mmap-ed hwrng + CVE-2023-52617: (unk) PCI: switchtec: Fix stdev_release() crash after surprise hot remove + CVE-2023-52618: (unk) block/rnbd-srv: Check for unlikely string overflow + CVE-2023-52619: (unk) pstore/ram: Fix crash when setting number of cpus to an odd number + CVE-2023-52620: (unk) netfilter: nf_tables: disallow timeout for anonymous sets + CVE-2023-52621: (unk) bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers + CVE-2023-52622: (unk) ext4: avoid online resizing failures due to oversized flex bg + CVE-2023-52623: (unk) SUNRPC: Fix a suspicious RCU usage warning + CVE-2023-52624: (unk) drm/amd/display: Wake DMCUB before executing GPINT commands + CVE-2023-52625: (unk) drm/amd/display: Refactor DMCUB enter/exit idle interface + CVE-2023-52627: (unk) iio: adc: ad7091r: Allow users to configure device events + CVE-2023-52628: (unk) netfilter: nftables: exthdr: fix 4-byte stack OOB write + CVE-2023-52629: (unk) sh: push-switch: Reorder cleanup operations to avoid use-after-free bug + CVE-2023-52632: (unk) drm/amdkfd: Fix lock dependency warning with srcu + CVE-2023-52633: (unk) um: time-travel: fix time corruption + CVE-2023-52634: (unk) drm/amd/display: Fix disable_otg_wa logic + CVE-2023-52635: (unk) PM / devfreq: Synchronize devfreq_monitor_[start/stop] + CVE-2023-52637: (unk) can: j1939: Fix UAF in j1939_sk_match_filter during setsockopt(SO_J1939_FILTER) + CVE-2023-52638: (unk) can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock + CVE-2023-52639: (unk) KVM: s390: vsie: fix race during shadow creation + CVE-2023-52640: (unk) fs/ntfs3: Fix oob in ntfs_listxattr + CVE-2023-52641: (unk) fs/ntfs3: Add NULL ptr dereference checking at the end of attr_allocate_frame() CVE-2023-5717: (unk) perf: Disallow mis-matched inherited group reads CVE-2023-6040: (unk) netfilter: nf_tables: Reject tables of unsupported family CVE-2023-6121: (unk) nvmet: nul-terminate the NQNs passed in the connect command CVE-2023-6176: (unk) net/tls: do not free tls_rec on async operation in bpf_exec_tx_verdict() CVE-2023-6240: (unk) - CVE-2023-6270: (unk) - CVE-2023-6356: (unk) + CVE-2023-6270: (unk) aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts + CVE-2023-6356: (unk) nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length CVE-2023-6535: (unk) - CVE-2023-6536: (unk) + CVE-2023-6536: (unk) nvmet-tcp: fix a crash in nvmet_req_complete() CVE-2023-6546: (unk) tty: n_gsm: fix the UAF caused by race condition in gsm_cleanup_mux CVE-2023-6560: (unk) io_uring: don't allow discontig pages for IORING_SETUP_NO_MMAP CVE-2023-6606: (unk) smb: client: fix OOB in smbCalcSize() @@ -769,7 +1075,7 @@ Outstanding CVEs: CVE-2023-6915: (unk) ida: Fix crash in ida_free when the bitmap is empty CVE-2023-6931: (unk) perf: Fix perf_event_validate_size() CVE-2023-6932: (unk) ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet - CVE-2023-7042: (unk) + CVE-2023-7042: (unk) wifi: ath10k: fix NULL pointer dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev() CVE-2023-7192: (unk) netfilter: ctnetlink: fix possible refcount leak in ctnetlink_create_conntrack() CVE-2024-0340: (unk) vhost: use kzalloc() instead of kmalloc() followed by memset() CVE-2024-0564: (unk) @@ -779,15 +1085,16 @@ Outstanding CVEs: CVE-2024-0641: (unk) tipc: fix a potential deadlock on &tx->lock CVE-2024-0646: (unk) net: tls, update curr on splice as well CVE-2024-0775: (unk) ext4: improve error recovery code paths in __ext4_remount() - CVE-2024-0841: (unk) + CVE-2024-0841: (unk) fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super CVE-2024-1086: (unk) netfilter: nf_tables: reject QUEUE/DROP verdict parameters CVE-2024-1151: (unk) net: openvswitch: limit the number of recursions from action sets CVE-2024-1312: (unk) mm: lock_vma_under_rcu() must check vma->anon_vma under vma lock CVE-2024-21803: (unk) - CVE-2024-22099: (unk) + CVE-2024-2193: (unk) + CVE-2024-22099: (unk) Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security CVE-2024-22386: (unk) - CVE-2024-23196: (unk) - CVE-2024-23307: (unk) + CVE-2024-23196: (unk) ALSA: hda: fix a possible null-pointer dereference due to data race in snd_hdac_regmap_sync() + CVE-2024-23307: (unk) md/raid5: fix atomicity violation in raid5_cache_count CVE-2024-23848: (unk) CVE-2024-23849: (unk) net/rds: Fix UBSAN: array-index-out-of-bounds in rds_cmsg_recv CVE-2024-23850: (unk) btrfs: do not ASSERT() if the newly created subvolume already got read @@ -797,7 +1104,7 @@ Outstanding CVEs: CVE-2024-24858: (unk) CVE-2024-24859: (unk) CVE-2024-24860: (unk) Bluetooth: Fix atomicity violation in {min,max}_key_size_set - CVE-2024-24861: (unk) + CVE-2024-24861: (unk) media: xc4000: Fix atomicity violation in xc4000_get_frequency CVE-2024-24864: (unk) CVE-2024-25739: (unk) CVE-2024-25740: (unk) @@ -807,13 +1114,133 @@ Outstanding CVEs: CVE-2024-26584: (unk) net: tls: handle backlogging of crypto requests CVE-2024-26585: (unk) tls: fix race between tx work scheduling and socket close CVE-2024-26586: (unk) mlxsw: spectrum_acl_tcam: Fix stack corruption - CVE-2024-26587: (unk) net: netdevsim: don't try to destroy PHC on VFs - CVE-2024-26588: (unk) LoongArch: BPF: Prevent out-of-bounds memory access CVE-2024-26589: (unk) bpf: Reject variable offset alu on PTR_TO_FLOW_KEYS - CVE-2024-26591: (unk) bpf: Fix re-attachment branch in bpf_tracing_prog_attach CVE-2024-26592: (unk) ksmbd: fix UAF issue in ksmbd_tcp_new_connection() CVE-2024-26593: (unk) i2c: i801: Fix block process call transactions CVE-2024-26594: (unk) ksmbd: validate mech token in session setup CVE-2024-26595: (unk) mlxsw: spectrum_acl_tcam: Fix NULL pointer dereference in error path CVE-2024-26597: (unk) net: qualcomm: rmnet: fix global oob in rmnet_policy CVE-2024-26598: (unk) KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache + CVE-2024-26600: (unk) phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP + CVE-2024-26602: (unk) sched/membarrier: reduce the ability to hammer on sys_membarrier + CVE-2024-26606: (unk) binder: signal epoll threads of self-work + CVE-2024-26607: (unk) drm/bridge: sii902x: Fix probing race issue + CVE-2024-26610: (unk) wifi: iwlwifi: fix a memory corruption + CVE-2024-26614: (unk) tcp: make sure init the accept_queue's spinlocks once + CVE-2024-26615: (unk) net/smc: fix illegal rmb_desc access in SMC-D connection dump + CVE-2024-26622: (unk) tomoyo: fix UAF write bug in tomoyo_write_control() + CVE-2024-26623: (unk) pds_core: Prevent race issues involving the adminq + CVE-2024-26625: (unk) llc: call sock_orphan() at release time + CVE-2024-26627: (unk) scsi: core: Move scsi_host_busy() out of host lock for waking up EH handler + CVE-2024-26633: (unk) ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim() + CVE-2024-26635: (unk) llc: Drop support for ETH_P_TR_802_2. + CVE-2024-26636: (unk) llc: make llc_ui_sendmsg() more robust against bonding changes + CVE-2024-26640: (unk) tcp: add sanity checks to rx zerocopy + CVE-2024-26641: (unk) ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv() + CVE-2024-26642: (unk) netfilter: nf_tables: disallow anonymous set with timeout flag + CVE-2024-26644: (unk) btrfs: don't abort filesystem when attempting to snapshot deleted subvolume + CVE-2024-26645: (unk) tracing: Ensure visibility when inserting an element into tracing_map + CVE-2024-26646: (unk) thermal: intel: hfi: Add syscore callbacks for system-wide PM + CVE-2024-26647: (unk) drm/amd/display: Fix late derefrence 'dsc' check in 'link_set_dsc_pps_packet()' + CVE-2024-26648: (unk) drm/amd/display: Fix variable deferencing before NULL check in edp_setup_replay() + CVE-2024-26650: (unk) platform/x86: p2sb: Allow p2sb_bar() calls during PCI device probe + CVE-2024-26651: (unk) sr9800: Add check for usbnet_get_endpoints + CVE-2024-26654: (unk) ALSA: sh: aica: reorder cleanup operations to avoid UAF bugs + CVE-2024-26655: (unk) Fix memory leak in posix_clock_open() + CVE-2024-26656: (unk) drm/amdgpu: fix use-after-free bug + CVE-2024-26658: (unk) bcachefs: grab s_umount only if snapshotting + CVE-2024-26659: (unk) xhci: handle isoc Babble and Buffer Overrun events properly + CVE-2024-26661: (unk) drm/amd/display: Add NULL test for 'timing generator' in 'dcn21_set_pipe()' + CVE-2024-26662: (unk) drm/amd/display: Fix 'panel_cntl' could be null in 'dcn21_set_backlight_level()' + CVE-2024-26663: (unk) tipc: Check the bearer type before calling tipc_udp_nl_bearer_add() + CVE-2024-26664: (unk) hwmon: (coretemp) Fix out-of-bounds memory access + CVE-2024-26665: (unk) tunnels: fix out of bounds access when building IPv6 PMTU error + CVE-2024-26668: (unk) netfilter: nft_limit: reject configurations that cause integer overflow + CVE-2024-26669: (unk) net/sched: flower: Fix chain template offload + CVE-2024-26671: (unk) blk-mq: fix IO hang from sbitmap wakeup race + CVE-2024-26672: (unk) drm/amdgpu: Fix variable 'mca_funcs' dereferenced before NULL check in 'amdgpu_mca_smu_get_mca_entry()' + CVE-2024-26673: (unk) netfilter: nft_ct: sanitize layer 3 and 4 protocol number in custom expectations + CVE-2024-26675: (unk) ppp_async: limit MRU to 64K + CVE-2024-26676: (unk) af_unix: Call kfree_skb() for dead unix_(sk)->oob_skb in GC. + CVE-2024-26677: (unk) rxrpc: Fix delayed ACKs to not set the reference serial number + CVE-2024-26679: (unk) inet: read sk->sk_family once in inet_recv_error() + CVE-2024-26680: (unk) net: atlantic: Fix DMA mapping for PTP hwts ring + CVE-2024-26684: (unk) net: stmmac: xgmac: fix handling of DPP safety error for DMA channels + CVE-2024-26685: (unk) nilfs2: fix potential bug in end_buffer_async_write + CVE-2024-26686: (unk) fs/proc: do_task_stat: use sig->stats_lock to gather the threads/children stats + CVE-2024-26687: (unk) xen/events: close evtchn after mapping cleanup + CVE-2024-26688: (unk) fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super + CVE-2024-26689: (unk) ceph: prevent use-after-free in encode_cap_msg() + CVE-2024-26691: (unk) KVM: arm64: Fix circular locking dependency + CVE-2024-26696: (unk) nilfs2: fix hang in nilfs_lookup_dirty_data_buffers() + CVE-2024-26697: (unk) nilfs2: fix data corruption in dsync block recovery for small block sizes + CVE-2024-26698: (unk) hv_netvsc: Fix race condition between netvsc_probe and netvsc_remove + CVE-2024-26699: (unk) drm/amd/display: Fix array-index-out-of-bounds in dcn35_clkmgr + CVE-2024-26700: (unk) drm/amd/display: Fix MST Null Ptr for RV + CVE-2024-26702: (unk) iio: magnetometer: rm3100: add boundary check for the value read from RM3100_REG_TMRC + CVE-2024-26704: (unk) ext4: fix double-free of blocks due to wrong extents moved_len + CVE-2024-26706: (unk) parisc: Fix random data corruption from exception handler + CVE-2024-26707: (unk) net: hsr: remove WARN_ONCE() in send_hsr_supervision_frame() + CVE-2024-26712: (unk) powerpc/kasan: Fix addr error caused by page alignment + CVE-2024-26713: (unk) powerpc/pseries/iommu: Fix iommu initialisation during DLPAR add + CVE-2024-26715: (unk) usb: dwc3: gadget: Fix NULL pointer dereference in dwc3_gadget_suspend + CVE-2024-26718: (unk) dm-crypt, dm-verity: disable tasklets + CVE-2024-26719: (unk) nouveau: offload fence uevents work to workqueue + CVE-2024-26720: (unk) mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again + CVE-2024-26726: (unk) btrfs: don't drop extent_map for free space inode on write error + CVE-2024-26727: (unk) btrfs: do not ASSERT() if the newly created subvolume already got read + CVE-2024-26733: (unk) arp: Prevent overflow in arp_req_get(). + CVE-2024-26735: (unk) ipv6: sr: fix possible use-after-free and null-ptr-deref + CVE-2024-26736: (unk) afs: Increase buffer size in afs_update_volume_status() + CVE-2024-26738: (unk) powerpc/pseries/iommu: DLPAR add doesn't completely initialize pci_controller + CVE-2024-26739: (unk) net/sched: act_mirred: don't override retval if we already lost the skb + CVE-2024-26740: (unk) net/sched: act_mirred: use the backlog for mirred ingress + CVE-2024-26743: (unk) RDMA/qedr: Fix qedr_create_user_qp error flow + CVE-2024-26744: (unk) RDMA/srpt: Support specifying the srpt_service_guid parameter + CVE-2024-26745: (unk) powerpc/pseries/iommu: IOMMU table is not initialized for kdump over SR-IOV + CVE-2024-26747: (unk) usb: roles: fix NULL pointer issue when put module's reference + CVE-2024-26748: (unk) usb: cdns3: fix memory double free when handle zero packet + CVE-2024-26749: (unk) usb: cdns3: fixed memory use after free at cdns3_gadget_ep_disable() + CVE-2024-26751: (unk) ARM: ep93xx: Add terminator to gpiod_lookup_table + CVE-2024-26752: (unk) l2tp: pass correct message length to ip6_append_data + CVE-2024-26754: (unk) gtp: fix use-after-free and null-ptr-deref in gtp_genl_dump_pdp() + CVE-2024-26756: (unk) md: Don't register sync_thread for reshape directly + CVE-2024-26757: (unk) md: Don't ignore read-only array in md_check_recovery() + CVE-2024-26758: (unk) md: Don't ignore suspended array in md_check_recovery() + CVE-2024-26759: (unk) mm/swap: fix race when skipping swapcache + CVE-2024-26763: (unk) dm-crypt: don't modify the data when using authenticated encryption + CVE-2024-26764: (unk) fs/aio: Restrict kiocb_set_cancel_fn() to I/O submitted via libaio + CVE-2024-26765: (unk) LoongArch: Disable IRQ before init_fn() for nonboot CPUs + CVE-2024-26766: (unk) IB/hfi1: Fix sdma.h tx->num_descs off-by-one error + CVE-2024-26767: (unk) drm/amd/display: fixed integer types and null check locations + CVE-2024-26768: (unk) LoongArch: Change acpi_core_pic[NR_CPUS] to acpi_core_pic[MAX_CORE_PIC] + CVE-2024-26769: (unk) nvmet-fc: avoid deadlock on delete association path + CVE-2024-26770: (unk) HID: nvidia-shield: Add missing null pointer checks to LED initialization + CVE-2024-26771: (unk) dmaengine: ti: edma: Add some null pointer checks to the edma_probe + CVE-2024-26772: (unk) ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal() + CVE-2024-26773: (unk) ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found() + CVE-2024-26774: (unk) ext4: avoid dividing by 0 in mb_update_avg_fragment_size() when block bitmap corrupt + CVE-2024-26775: (unk) aoe: avoid potential deadlock at set_capacity + CVE-2024-26776: (unk) spi: hisi-sfc-v3xx: Return IRQ_NONE if no interrupts were detected + CVE-2024-26777: (unk) fbdev: sis: Error out if pixclock equals zero + CVE-2024-26778: (unk) fbdev: savage: Error out if pixclock equals zero + CVE-2024-26779: (unk) wifi: mac80211: fix race condition on enabling fast-xmit + CVE-2024-26782: (unk) mptcp: fix double-free on socket dismantle + CVE-2024-26784: (unk) pmdomain: arm: Fix NULL dereference on scmi_perf_domain removal + CVE-2024-26787: (unk) mmc: mmci: stm32: fix DMA API overlapping mappings warning + CVE-2024-26788: (unk) dmaengine: fsl-qdma: init irq after reg initialization + CVE-2024-26789: (unk) crypto: arm64/neonbs - fix out-of-bounds access on short input + CVE-2024-26790: (unk) dmaengine: fsl-qdma: fix SoC may hang on 16 byte unaligned read + CVE-2024-26791: (unk) btrfs: dev-replace: properly validate device names + CVE-2024-26793: (unk) gtp: fix use-after-free and null-ptr-deref in gtp_newlink() + CVE-2024-26795: (unk) riscv: Sparse-Memory/vmemmap out-of-bounds fix + CVE-2024-26797: (unk) drm/amd/display: Prevent potential buffer overflow in map_hw_resources + CVE-2024-26798: (unk) fbcon: always restore the old font data in fbcon_do_set_font() + CVE-2024-26801: (unk) Bluetooth: Avoid potential use-after-free in hci_error_reset + CVE-2024-26802: (unk) stmmac: Clear variable when destroying workqueue + CVE-2024-26803: (unk) net: veth: clear GRO when clearing XDP even when down + CVE-2024-26804: (unk) net: ip_tunnel: prevent perpetual headroom growth + CVE-2024-26805: (unk) netlink: Fix kernel-infoleak-after-free in __skb_datagram_iter + CVE-2024-26806: (unk) spi: cadence-qspi: remove system-wide suspend helper calls from runtime PM hooks + CVE-2024-26808: (unk) netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain + CVE-2024-26809: (unk) netfilter: nft_set_pipapo: release elements in clone only from destroy path diff --git a/data/6.0/6.0_CVEs.txt b/data/6.0/6.0_CVEs.txt index 3f5eecc0a..8b194b5ab 100644 --- a/data/6.0/6.0_CVEs.txt +++ b/data/6.0/6.0_CVEs.txt @@ -151,6 +151,7 @@ CVE-2022-48423: Fixed with 6.0.17 CVE-2022-48424: Fixed with 6.0.17 CVE-2022-48425: Fix not seen in stream CVE-2022-48502: Fix not seen in stream +CVE-2022-48628: Fix not seen in stream CVE-2023-0045: Fixed with 6.0.19 CVE-2023-0160: Fix not seen in stream CVE-2023-0179: Fix not seen in stream @@ -235,6 +236,7 @@ CVE-2023-26607: Fixed with 6.0.10 CVE-2023-28327: Fixed with 6.0.13 CVE-2023-28328: Fixed with 6.0.16 CVE-2023-28466: Fix not seen in stream +CVE-2023-28746: Fix not seen in stream CVE-2023-28866: Fix not seen in stream CVE-2023-2898: Fix not seen in stream CVE-2023-2985: Fix not seen in stream @@ -348,7 +350,7 @@ CVE-2023-46343: Fix not seen in stream CVE-2023-46813: Fix not seen in stream CVE-2023-46838: Fix not seen in stream CVE-2023-46862: Fix not seen in stream -CVE-2023-47233: Fix unknown +CVE-2023-47233: Fix not seen in stream CVE-2023-4881: Fix not seen in stream CVE-2023-4921: Fix not seen in stream CVE-2023-50431: Fix not seen in stream @@ -381,20 +383,142 @@ CVE-2023-52451: Fix not seen in stream CVE-2023-52452: Fix not seen in stream CVE-2023-52454: Fix not seen in stream CVE-2023-52456: Fix not seen in stream -CVE-2023-52457: Fix not seen in stream CVE-2023-52458: Fix not seen in stream CVE-2023-52462: Fix not seen in stream CVE-2023-52463: Fix not seen in stream CVE-2023-52464: Fix not seen in stream +CVE-2023-52467: Fix not seen in stream +CVE-2023-52469: Fix not seen in stream +CVE-2023-52470: Fix not seen in stream +CVE-2023-52474: Fix not seen in stream +CVE-2023-52475: Fix not seen in stream +CVE-2023-52476: Fix not seen in stream +CVE-2023-52477: Fix not seen in stream +CVE-2023-52478: Fix not seen in stream +CVE-2023-52479: Fix not seen in stream +CVE-2023-52480: Fix not seen in stream +CVE-2023-52481: Fix not seen in stream +CVE-2023-52482: Fix not seen in stream +CVE-2023-52483: Fix not seen in stream +CVE-2023-52484: Fix not seen in stream +CVE-2023-52485: Fix not seen in stream +CVE-2023-52486: Fix not seen in stream +CVE-2023-52488: Fix not seen in stream +CVE-2023-52489: Fix not seen in stream +CVE-2023-52491: Fix not seen in stream +CVE-2023-52492: Fix not seen in stream +CVE-2023-52493: Fix not seen in stream +CVE-2023-52494: Fix not seen in stream +CVE-2023-52497: Fix not seen in stream +CVE-2023-52498: Fix not seen in stream +CVE-2023-52499: Fix not seen in stream +CVE-2023-52500: Fix not seen in stream +CVE-2023-52501: Fix not seen in stream +CVE-2023-52502: Fix not seen in stream +CVE-2023-52503: Fix not seen in stream +CVE-2023-52504: Fix not seen in stream +CVE-2023-52505: Fix not seen in stream +CVE-2023-52506: Fix not seen in stream +CVE-2023-52507: Fix not seen in stream +CVE-2023-52508: Fix not seen in stream +CVE-2023-52509: Fix not seen in stream +CVE-2023-52510: Fix not seen in stream +CVE-2023-52511: Fix not seen in stream +CVE-2023-52512: Fix not seen in stream +CVE-2023-52513: Fix not seen in stream +CVE-2023-52515: Fix not seen in stream +CVE-2023-52516: Fix not seen in stream +CVE-2023-52517: Fix not seen in stream +CVE-2023-52518: Fix not seen in stream +CVE-2023-52519: Fix not seen in stream +CVE-2023-52520: Fix not seen in stream +CVE-2023-52522: Fix not seen in stream +CVE-2023-52523: Fix not seen in stream +CVE-2023-52527: Fix not seen in stream +CVE-2023-52528: Fix not seen in stream +CVE-2023-52529: Fix not seen in stream +CVE-2023-52530: Fix not seen in stream +CVE-2023-52531: Fix not seen in stream +CVE-2023-52532: Fix not seen in stream +CVE-2023-52559: Fix not seen in stream +CVE-2023-52560: Fix not seen in stream +CVE-2023-52561: Fix not seen in stream +CVE-2023-52562: Fix not seen in stream +CVE-2023-52563: Fix not seen in stream +CVE-2023-52565: Fix not seen in stream +CVE-2023-52566: Fix not seen in stream +CVE-2023-52568: Fix not seen in stream +CVE-2023-52569: Fix not seen in stream +CVE-2023-52571: Fix not seen in stream +CVE-2023-52572: Fix not seen in stream +CVE-2023-52573: Fix not seen in stream +CVE-2023-52574: Fix not seen in stream +CVE-2023-52576: Fix not seen in stream +CVE-2023-52578: Fix not seen in stream +CVE-2023-52580: Fix not seen in stream +CVE-2023-52582: Fix not seen in stream +CVE-2023-52583: Fix not seen in stream +CVE-2023-52584: Fix not seen in stream +CVE-2023-52585: Fix not seen in stream +CVE-2023-52586: Fix not seen in stream +CVE-2023-52587: Fix not seen in stream +CVE-2023-52588: Fix not seen in stream +CVE-2023-52589: Fix not seen in stream +CVE-2023-52590: Fix not seen in stream +CVE-2023-52591: Fix not seen in stream +CVE-2023-52593: Fix not seen in stream +CVE-2023-52594: Fix not seen in stream +CVE-2023-52595: Fix not seen in stream +CVE-2023-52596: Fix not seen in stream +CVE-2023-52597: Fix not seen in stream +CVE-2023-52598: Fix not seen in stream +CVE-2023-52599: Fix not seen in stream +CVE-2023-52600: Fix not seen in stream +CVE-2023-52601: Fix not seen in stream +CVE-2023-52602: Fix not seen in stream +CVE-2023-52603: Fix not seen in stream +CVE-2023-52604: Fix not seen in stream +CVE-2023-52606: Fix not seen in stream +CVE-2023-52607: Fix not seen in stream +CVE-2023-52608: Fix not seen in stream +CVE-2023-52609: Fix not seen in stream +CVE-2023-52610: Fix not seen in stream +CVE-2023-52612: Fix not seen in stream +CVE-2023-52614: Fix not seen in stream +CVE-2023-52615: Fix not seen in stream +CVE-2023-52616: Fix not seen in stream +CVE-2023-52617: Fix not seen in stream +CVE-2023-52618: Fix not seen in stream +CVE-2023-52619: Fix not seen in stream +CVE-2023-52620: Fix not seen in stream +CVE-2023-52621: Fix not seen in stream +CVE-2023-52622: Fix not seen in stream +CVE-2023-52623: Fix not seen in stream +CVE-2023-52624: Fix not seen in stream +CVE-2023-52625: Fix not seen in stream +CVE-2023-52627: Fix not seen in stream +CVE-2023-52628: Fix not seen in stream +CVE-2023-52629: Fix not seen in stream +CVE-2023-52630: Fix not seen in stream +CVE-2023-52631: Fix not seen in stream +CVE-2023-52632: Fix not seen in stream +CVE-2023-52633: Fix not seen in stream +CVE-2023-52634: Fix not seen in stream +CVE-2023-52635: Fix not seen in stream +CVE-2023-52637: Fix not seen in stream +CVE-2023-52638: Fix not seen in stream +CVE-2023-52639: Fix not seen in stream +CVE-2023-52640: Fix not seen in stream +CVE-2023-52641: Fix not seen in stream CVE-2023-5717: Fix not seen in stream CVE-2023-6039: Fix not seen in stream CVE-2023-6121: Fix not seen in stream CVE-2023-6176: Fix not seen in stream CVE-2023-6240: Fix unknown -CVE-2023-6270: Fix unknown -CVE-2023-6356: Fix unknown +CVE-2023-6270: Fix not seen in stream +CVE-2023-6356: Fix not seen in stream CVE-2023-6535: Fix unknown -CVE-2023-6536: Fix unknown +CVE-2023-6536: Fix not seen in stream CVE-2023-6546: Fix not seen in stream CVE-2023-6560: Fix not seen in stream CVE-2023-6606: Fix not seen in stream @@ -404,7 +528,7 @@ CVE-2023-6817: Fix not seen in stream CVE-2023-6915: Fix not seen in stream CVE-2023-6931: Fix not seen in stream CVE-2023-6932: Fix not seen in stream -CVE-2023-7042: Fix unknown +CVE-2023-7042: Fix not seen in stream CVE-2023-7192: Fix not seen in stream CVE-2024-0340: Fix not seen in stream CVE-2024-0564: Fix unknown @@ -415,17 +539,18 @@ CVE-2024-0639: Fix not seen in stream CVE-2024-0641: Fix not seen in stream CVE-2024-0646: Fix not seen in stream CVE-2024-0775: Fix not seen in stream -CVE-2024-0841: Fix unknown +CVE-2024-0841: Fix not seen in stream CVE-2024-1085: Fix not seen in stream CVE-2024-1086: Fix not seen in stream CVE-2024-1151: Fix not seen in stream CVE-2024-1312: Fix not seen in stream CVE-2024-21803: Fix unknown -CVE-2024-22099: Fix unknown +CVE-2024-2193: Fix unknown +CVE-2024-22099: Fix not seen in stream CVE-2024-22386: Fix unknown CVE-2024-22705: Fix not seen in stream -CVE-2024-23196: Fix unknown -CVE-2024-23307: Fix unknown +CVE-2024-23196: Fix not seen in stream +CVE-2024-23307: Fix not seen in stream CVE-2024-23848: Fix unknown CVE-2024-23849: Fix not seen in stream CVE-2024-23850: Fix not seen in stream @@ -435,7 +560,7 @@ CVE-2024-24857: Fix unknown CVE-2024-24858: Fix unknown CVE-2024-24859: Fix unknown CVE-2024-24860: Fix not seen in stream -CVE-2024-24861: Fix unknown +CVE-2024-24861: Fix not seen in stream CVE-2024-24864: Fix unknown CVE-2024-25739: Fix unknown CVE-2024-25740: Fix unknown @@ -446,8 +571,6 @@ CVE-2024-26583: Fix not seen in stream CVE-2024-26584: Fix not seen in stream CVE-2024-26585: Fix not seen in stream CVE-2024-26586: Fix not seen in stream -CVE-2024-26587: Fix not seen in stream -CVE-2024-26588: Fix not seen in stream CVE-2024-26589: Fix not seen in stream CVE-2024-26590: Fix not seen in stream CVE-2024-26591: Fix not seen in stream @@ -458,3 +581,148 @@ CVE-2024-26595: Fix not seen in stream CVE-2024-26597: Fix not seen in stream CVE-2024-26598: Fix not seen in stream CVE-2024-26599: Fix not seen in stream +CVE-2024-26600: Fix not seen in stream +CVE-2024-26601: Fix not seen in stream +CVE-2024-26602: Fix not seen in stream +CVE-2024-26603: Fix not seen in stream +CVE-2024-26606: Fix not seen in stream +CVE-2024-26607: Fix not seen in stream +CVE-2024-26608: Fix not seen in stream +CVE-2024-26610: Fix not seen in stream +CVE-2024-26612: Fix not seen in stream +CVE-2024-26614: Fix not seen in stream +CVE-2024-26615: Fix not seen in stream +CVE-2024-26620: Fix not seen in stream +CVE-2024-26622: Fix not seen in stream +CVE-2024-26623: Fix not seen in stream +CVE-2024-26625: Fix not seen in stream +CVE-2024-26627: Fix not seen in stream +CVE-2024-26629: Fix not seen in stream +CVE-2024-26631: Fix not seen in stream +CVE-2024-26632: Fix not seen in stream +CVE-2024-26633: Fix not seen in stream +CVE-2024-26635: Fix not seen in stream +CVE-2024-26636: Fix not seen in stream +CVE-2024-26638: Fix not seen in stream +CVE-2024-26640: Fix not seen in stream +CVE-2024-26641: Fix not seen in stream +CVE-2024-26642: Fix not seen in stream +CVE-2024-26644: Fix not seen in stream +CVE-2024-26645: Fix not seen in stream +CVE-2024-26646: Fix not seen in stream +CVE-2024-26647: Fix not seen in stream +CVE-2024-26648: Fix not seen in stream +CVE-2024-26650: Fix not seen in stream +CVE-2024-26651: Fix not seen in stream +CVE-2024-26654: Fix not seen in stream +CVE-2024-26655: Fix not seen in stream +CVE-2024-26656: Fix not seen in stream +CVE-2024-26658: Fix not seen in stream +CVE-2024-26659: Fix not seen in stream +CVE-2024-26660: Fix not seen in stream +CVE-2024-26661: Fix not seen in stream +CVE-2024-26662: Fix not seen in stream +CVE-2024-26663: Fix not seen in stream +CVE-2024-26664: Fix not seen in stream +CVE-2024-26665: Fix not seen in stream +CVE-2024-26667: Fix not seen in stream +CVE-2024-26668: Fix not seen in stream +CVE-2024-26669: Fix not seen in stream +CVE-2024-26671: Fix not seen in stream +CVE-2024-26672: Fix not seen in stream +CVE-2024-26673: Fix not seen in stream +CVE-2024-26675: Fix not seen in stream +CVE-2024-26676: Fix not seen in stream +CVE-2024-26677: Fix not seen in stream +CVE-2024-26679: Fix not seen in stream +CVE-2024-26680: Fix not seen in stream +CVE-2024-26681: Fix not seen in stream +CVE-2024-26684: Fix not seen in stream +CVE-2024-26685: Fix not seen in stream +CVE-2024-26686: Fix not seen in stream +CVE-2024-26687: Fix not seen in stream +CVE-2024-26688: Fix not seen in stream +CVE-2024-26689: Fix not seen in stream +CVE-2024-26691: Fix not seen in stream +CVE-2024-26695: Fix not seen in stream +CVE-2024-26696: Fix not seen in stream +CVE-2024-26697: Fix not seen in stream +CVE-2024-26698: Fix not seen in stream +CVE-2024-26699: Fix not seen in stream +CVE-2024-26700: Fix not seen in stream +CVE-2024-26702: Fix not seen in stream +CVE-2024-26704: Fix not seen in stream +CVE-2024-26706: Fix not seen in stream +CVE-2024-26707: Fix not seen in stream +CVE-2024-26712: Fix not seen in stream +CVE-2024-26713: Fix not seen in stream +CVE-2024-26714: Fix not seen in stream +CVE-2024-26715: Fix not seen in stream +CVE-2024-26717: Fix not seen in stream +CVE-2024-26718: Fix not seen in stream +CVE-2024-26719: Fix not seen in stream +CVE-2024-26720: Fix not seen in stream +CVE-2024-26726: Fix not seen in stream +CVE-2024-26727: Fix not seen in stream +CVE-2024-26733: Fix not seen in stream +CVE-2024-26735: Fix not seen in stream +CVE-2024-26736: Fix not seen in stream +CVE-2024-26737: Fix not seen in stream +CVE-2024-26738: Fix not seen in stream +CVE-2024-26739: Fix not seen in stream +CVE-2024-26740: Fix not seen in stream +CVE-2024-26742: Fix not seen in stream +CVE-2024-26743: Fix not seen in stream +CVE-2024-26744: Fix not seen in stream +CVE-2024-26745: Fix not seen in stream +CVE-2024-26747: Fix not seen in stream +CVE-2024-26748: Fix not seen in stream +CVE-2024-26749: Fix not seen in stream +CVE-2024-26751: Fix not seen in stream +CVE-2024-26752: Fix not seen in stream +CVE-2024-26753: Fix not seen in stream +CVE-2024-26754: Fix not seen in stream +CVE-2024-26756: Fix not seen in stream +CVE-2024-26757: Fix not seen in stream +CVE-2024-26758: Fix not seen in stream +CVE-2024-26759: Fix not seen in stream +CVE-2024-26760: Fix not seen in stream +CVE-2024-26761: Fix not seen in stream +CVE-2024-26763: Fix not seen in stream +CVE-2024-26764: Fix not seen in stream +CVE-2024-26765: Fix not seen in stream +CVE-2024-26766: Fix not seen in stream +CVE-2024-26767: Fix not seen in stream +CVE-2024-26768: Fix not seen in stream +CVE-2024-26769: Fix not seen in stream +CVE-2024-26770: Fix not seen in stream +CVE-2024-26771: Fix not seen in stream +CVE-2024-26772: Fix not seen in stream +CVE-2024-26773: Fix not seen in stream +CVE-2024-26774: Fix not seen in stream +CVE-2024-26775: Fix not seen in stream +CVE-2024-26776: Fix not seen in stream +CVE-2024-26777: Fix not seen in stream +CVE-2024-26778: Fix not seen in stream +CVE-2024-26779: Fix not seen in stream +CVE-2024-26782: Fix not seen in stream +CVE-2024-26783: Fix not seen in stream +CVE-2024-26784: Fix not seen in stream +CVE-2024-26787: Fix not seen in stream +CVE-2024-26788: Fix not seen in stream +CVE-2024-26789: Fix not seen in stream +CVE-2024-26790: Fix not seen in stream +CVE-2024-26791: Fix not seen in stream +CVE-2024-26793: Fix not seen in stream +CVE-2024-26795: Fix not seen in stream +CVE-2024-26797: Fix not seen in stream +CVE-2024-26798: Fix not seen in stream +CVE-2024-26799: Fix not seen in stream +CVE-2024-26801: Fix not seen in stream +CVE-2024-26802: Fix not seen in stream +CVE-2024-26803: Fix not seen in stream +CVE-2024-26804: Fix not seen in stream +CVE-2024-26805: Fix not seen in stream +CVE-2024-26806: Fix not seen in stream +CVE-2024-26808: Fix not seen in stream +CVE-2024-26809: Fix not seen in stream diff --git a/data/6.0/6.0_security.txt b/data/6.0/6.0_security.txt index 8e9f0b781..e6ed6c711 100644 --- a/data/6.0/6.0_security.txt +++ b/data/6.0/6.0_security.txt @@ -207,6 +207,7 @@ Outstanding CVEs: CVE-2022-4842: (unk) fs/ntfs3: Fix attr_punch_hole() null pointer derenference CVE-2022-48425: (unk) fs/ntfs3: Validate MFT flags before replaying logs CVE-2022-48502: (unk) fs/ntfs3: Check fields while reading + CVE-2022-48628: (unk) ceph: drop messages from MDS when unmounting CVE-2023-0160: (unk) bpf, sockmap: fix deadlocks in the sockhash and sockmap CVE-2023-0179: (unk) netfilter: nft_payload: incorrect arithmetics when fetching VLAN header bits CVE-2023-0266: (unk) ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF @@ -272,6 +273,7 @@ Outstanding CVEs: CVE-2023-2640: (unk) CVE-2023-26545: (unk) net: mpls: fix stale pointer if allocation fails during device rename CVE-2023-28466: (unk) net: tls: fix possible race condition between do_tls_getsockopt_conf() and do_tls_setsockopt_conf() + CVE-2023-28746: (unk) x86/mmio: Disable KVM mitigation when X86_FEATURE_CLEAR_CPU_BUF is set CVE-2023-28866: (unk) Bluetooth: HCI: Fix global-out-of-bounds CVE-2023-2898: (unk) f2fs: fix to avoid NULL pointer dereference f2fs_write_end_io() CVE-2023-2985: (unk) fs: hfsplus: fix UAF issue in hfsplus_put_super @@ -382,7 +384,7 @@ Outstanding CVEs: CVE-2023-46813: (unk) x86/sev: Check for user-space IOIO pointing to kernel space CVE-2023-46838: (unk) xen-netback: don't produce zero-size SKB frags CVE-2023-46862: (unk) io_uring/fdinfo: lock SQ thread while retrieving thread cpu/pid - CVE-2023-47233: (unk) + CVE-2023-47233: (unk) wifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach CVE-2023-4881: (unk) netfilter: nftables: exthdr: fix 4-byte stack OOB write CVE-2023-4921: (unk) net: sched: sch_qfq: Fix UAF in qfq_dequeue() CVE-2023-50431: (unk) accel/habanalabs: fix information leak in sec_attest_info() @@ -415,20 +417,142 @@ Outstanding CVEs: CVE-2023-52452: (unk) bpf: Fix accesses to uninit stack slots CVE-2023-52454: (unk) nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length CVE-2023-52456: (unk) serial: imx: fix tx statemachine deadlock - CVE-2023-52457: (unk) serial: 8250: omap: Don't skip resource freeing if pm_runtime_resume_and_get() failed CVE-2023-52458: (unk) block: add check that partition length needs to be aligned with block size CVE-2023-52462: (unk) bpf: fix check for attempt to corrupt spilled pointer CVE-2023-52463: (unk) efivarfs: force RO when remounting if SetVariable is not supported CVE-2023-52464: (unk) EDAC/thunderx: Fix possible out-of-bounds string access + CVE-2023-52467: (unk) mfd: syscon: Fix null pointer dereference in of_syscon_register() + CVE-2023-52469: (unk) drivers/amd/pm: fix a use-after-free in kv_parse_power_table + CVE-2023-52470: (unk) drm/radeon: check the alloc_workqueue return value in radeon_crtc_init() + CVE-2023-52474: (unk) IB/hfi1: Fix bugs with non-PAGE_SIZE-end multi-iovec user SDMA requests + CVE-2023-52475: (unk) Input: powermate - fix use-after-free in powermate_config_complete + CVE-2023-52476: (unk) perf/x86/lbr: Filter vsyscall addresses + CVE-2023-52477: (unk) usb: hub: Guard against accesses to uninitialized BOS descriptors + CVE-2023-52478: (unk) HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect + CVE-2023-52479: (unk) ksmbd: fix uaf in smb20_oplock_break_ack + CVE-2023-52480: (unk) ksmbd: fix race condition between session lookup and expire + CVE-2023-52481: (unk) arm64: errata: Add Cortex-A520 speculative unprivileged load workaround + CVE-2023-52482: (unk) x86/srso: Add SRSO mitigation for Hygon processors + CVE-2023-52483: (unk) mctp: perform route lookups under a RCU read-side lock + CVE-2023-52484: (unk) iommu/arm-smmu-v3: Fix soft lockup triggered by arm_smmu_mm_invalidate_range + CVE-2023-52485: (unk) drm/amd/display: Wake DMCUB before sending a command + CVE-2023-52486: (unk) drm: Don't unref the same fb many times by mistake due to deadlock handling + CVE-2023-52488: (unk) serial: sc16is7xx: convert from _raw_ to _noinc_ regmap functions for FIFO + CVE-2023-52489: (unk) mm/sparsemem: fix race in accessing memory_section->usage + CVE-2023-52491: (unk) media: mtk-jpeg: Fix use after free bug due to error path handling in mtk_jpeg_dec_device_run + CVE-2023-52492: (unk) dmaengine: fix NULL pointer in channel unregistration function + CVE-2023-52493: (unk) bus: mhi: host: Drop chan lock before queuing buffers + CVE-2023-52494: (unk) bus: mhi: host: Add alignment check for event ring read pointer + CVE-2023-52497: (unk) erofs: fix lz4 inplace decompression + CVE-2023-52498: (unk) PM: sleep: Fix possible deadlocks in core system-wide PM code + CVE-2023-52499: (unk) powerpc/47x: Fix 47x syscall return crash + CVE-2023-52500: (unk) scsi: pm80xx: Avoid leaking tags when processing OPC_INB_SET_CONTROLLER_CONFIG command + CVE-2023-52501: (unk) ring-buffer: Do not attempt to read past "commit" + CVE-2023-52502: (unk) net: nfc: fix races in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn() + CVE-2023-52503: (unk) tee: amdtee: fix use-after-free vulnerability in amdtee_close_session + CVE-2023-52504: (unk) x86/alternatives: Disable KASAN in apply_alternatives() + CVE-2023-52505: (unk) phy: lynx-28g: serialize concurrent phy_set_mode_ext() calls to shared registers + CVE-2023-52506: (unk) LoongArch: Set all reserved memblocks on Node#0 at initialization + CVE-2023-52507: (unk) nfc: nci: assert requested protocol is valid + CVE-2023-52508: (unk) nvme-fc: Prevent null pointer dereference in nvme_fc_io_getuuid() + CVE-2023-52509: (unk) ravb: Fix use-after-free issue in ravb_tx_timeout_work() + CVE-2023-52510: (unk) ieee802154: ca8210: Fix a potential UAF in ca8210_probe + CVE-2023-52511: (unk) spi: sun6i: reduce DMA RX transfer width to single byte + CVE-2023-52512: (unk) pinctrl: nuvoton: wpcm450: fix out of bounds write + CVE-2023-52513: (unk) RDMA/siw: Fix connection failure handling + CVE-2023-52515: (unk) RDMA/srp: Do not call scsi_done() from srp_abort() + CVE-2023-52516: (unk) dma-debug: don't call __dma_entry_alloc_check_leak() under free_entries_lock + CVE-2023-52517: (unk) spi: sun6i: fix race between DMA RX transfer completion and RX FIFO drain + CVE-2023-52518: (unk) Bluetooth: hci_codec: Fix leaking content of local_codecs + CVE-2023-52519: (unk) HID: intel-ish-hid: ipc: Disable and reenable ACPI GPE bit + CVE-2023-52520: (unk) platform/x86: think-lmi: Fix reference leak + CVE-2023-52522: (unk) net: fix possible store tearing in neigh_periodic_work() + CVE-2023-52523: (unk) bpf, sockmap: Reject sk_msg egress redirects to non-TCP sockets + CVE-2023-52527: (unk) ipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data() + CVE-2023-52528: (unk) net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg + CVE-2023-52529: (unk) HID: sony: Fix a potential memory leak in sony_probe() + CVE-2023-52530: (unk) wifi: mac80211: fix potential key use-after-free + CVE-2023-52531: (unk) wifi: iwlwifi: mvm: Fix a memory corruption issue + CVE-2023-52532: (unk) net: mana: Fix TX CQE error handling + CVE-2023-52559: (unk) iommu/vt-d: Avoid memory allocation in iommu_suspend() + CVE-2023-52560: (unk) mm/damon/vaddr-test: fix memory leak in damon_do_test_apply_three_regions() + CVE-2023-52561: (unk) arm64: dts: qcom: sdm845-db845c: Mark cont splash memory region as reserved + CVE-2023-52562: (unk) mm/slab_common: fix slab_caches list corruption after kmem_cache_destroy() + CVE-2023-52563: (unk) drm/meson: fix memory leak on ->hpd_notify callback + CVE-2023-52565: (unk) media: uvcvideo: Fix OOB read + CVE-2023-52566: (unk) nilfs2: fix potential use after free in nilfs_gccache_submit_read_data() + CVE-2023-52568: (unk) x86/sgx: Resolves SECS reclaim vs. page fault for EAUG race + CVE-2023-52569: (unk) btrfs: remove BUG() after failure to insert delayed dir index item + CVE-2023-52571: (unk) power: supply: rk817: Fix node refcount leak + CVE-2023-52572: (unk) cifs: Fix UAF in cifs_demultiplex_thread() + CVE-2023-52573: (unk) net: rds: Fix possible NULL-pointer dereference + CVE-2023-52574: (unk) team: fix null-ptr-deref when team device type is changed + CVE-2023-52576: (unk) x86/mm, kexec, ima: Use memblock_free_late() from ima_free_kexec_buffer() + CVE-2023-52578: (unk) net: bridge: use DEV_STATS_INC() + CVE-2023-52580: (unk) net/core: Fix ETH_P_1588 flow dissector + CVE-2023-52582: (unk) netfs: Only call folio_start_fscache() one time for each folio + CVE-2023-52583: (unk) ceph: fix deadlock or deadcode of misusing dget() + CVE-2023-52584: (unk) spmi: mediatek: Fix UAF on device remove + CVE-2023-52585: (unk) drm/amdgpu: Fix possible NULL dereference in amdgpu_ras_query_error_status_helper() + CVE-2023-52586: (unk) drm/msm/dpu: Add mutex lock in control vblank irq + CVE-2023-52587: (unk) IB/ipoib: Fix mcast list locking + CVE-2023-52588: (unk) f2fs: fix to tag gcing flag on page during block migration + CVE-2023-52589: (unk) media: rkisp1: Fix IRQ disable race issue + CVE-2023-52590: (unk) ocfs2: Avoid touching renamed directory if parent does not change + CVE-2023-52591: (unk) reiserfs: Avoid touching renamed directory if parent does not change + CVE-2023-52593: (unk) wifi: wfx: fix possible NULL pointer dereference in wfx_set_mfp_ap() + CVE-2023-52594: (unk) wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus() + CVE-2023-52595: (unk) wifi: rt2x00: restart beacon queue when hardware reset + CVE-2023-52596: (unk) sysctl: Fix out of bounds access for empty sysctl registers + CVE-2023-52597: (unk) KVM: s390: fix setting of fpc register + CVE-2023-52598: (unk) s390/ptrace: handle setting of fpc register correctly + CVE-2023-52599: (unk) jfs: fix array-index-out-of-bounds in diNewExt + CVE-2023-52600: (unk) jfs: fix uaf in jfs_evict_inode + CVE-2023-52601: (unk) jfs: fix array-index-out-of-bounds in dbAdjTree + CVE-2023-52602: (unk) jfs: fix slab-out-of-bounds Read in dtSearch + CVE-2023-52603: (unk) UBSAN: array-index-out-of-bounds in dtSplitRoot + CVE-2023-52604: (unk) FS:JFS:UBSAN:array-index-out-of-bounds in dbAdjTree + CVE-2023-52606: (unk) powerpc/lib: Validate size for vector operations + CVE-2023-52607: (unk) powerpc/mm: Fix null-pointer dereference in pgtable_cache_add + CVE-2023-52608: (unk) firmware: arm_scmi: Check mailbox/SMT channel for consistency + CVE-2023-52609: (unk) binder: fix race between mmput() and do_exit() + CVE-2023-52610: (unk) net/sched: act_ct: fix skb leak and crash on ooo frags + CVE-2023-52612: (unk) crypto: scomp - fix req->dst buffer overflow + CVE-2023-52614: (unk) PM / devfreq: Fix buffer overflow in trans_stat_show + CVE-2023-52615: (unk) hwrng: core - Fix page fault dead lock on mmap-ed hwrng + CVE-2023-52616: (unk) crypto: lib/mpi - Fix unexpected pointer access in mpi_ec_init + CVE-2023-52617: (unk) PCI: switchtec: Fix stdev_release() crash after surprise hot remove + CVE-2023-52618: (unk) block/rnbd-srv: Check for unlikely string overflow + CVE-2023-52619: (unk) pstore/ram: Fix crash when setting number of cpus to an odd number + CVE-2023-52620: (unk) netfilter: nf_tables: disallow timeout for anonymous sets + CVE-2023-52621: (unk) bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers + CVE-2023-52622: (unk) ext4: avoid online resizing failures due to oversized flex bg + CVE-2023-52623: (unk) SUNRPC: Fix a suspicious RCU usage warning + CVE-2023-52624: (unk) drm/amd/display: Wake DMCUB before executing GPINT commands + CVE-2023-52625: (unk) drm/amd/display: Refactor DMCUB enter/exit idle interface + CVE-2023-52627: (unk) iio: adc: ad7091r: Allow users to configure device events + CVE-2023-52628: (unk) netfilter: nftables: exthdr: fix 4-byte stack OOB write + CVE-2023-52629: (unk) sh: push-switch: Reorder cleanup operations to avoid use-after-free bug + CVE-2023-52630: (unk) blk-iocost: Fix an UBSAN shift-out-of-bounds warning + CVE-2023-52631: (unk) fs/ntfs3: Fix an NULL dereference bug + CVE-2023-52632: (unk) drm/amdkfd: Fix lock dependency warning with srcu + CVE-2023-52633: (unk) um: time-travel: fix time corruption + CVE-2023-52634: (unk) drm/amd/display: Fix disable_otg_wa logic + CVE-2023-52635: (unk) PM / devfreq: Synchronize devfreq_monitor_[start/stop] + CVE-2023-52637: (unk) can: j1939: Fix UAF in j1939_sk_match_filter during setsockopt(SO_J1939_FILTER) + CVE-2023-52638: (unk) can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock + CVE-2023-52639: (unk) KVM: s390: vsie: fix race during shadow creation + CVE-2023-52640: (unk) fs/ntfs3: Fix oob in ntfs_listxattr + CVE-2023-52641: (unk) fs/ntfs3: Add NULL ptr dereference checking at the end of attr_allocate_frame() CVE-2023-5717: (unk) perf: Disallow mis-matched inherited group reads CVE-2023-6039: (unk) net: usb: lan78xx: reorder cleanup operations to avoid UAF bugs CVE-2023-6121: (unk) nvmet: nul-terminate the NQNs passed in the connect command CVE-2023-6176: (unk) net/tls: do not free tls_rec on async operation in bpf_exec_tx_verdict() CVE-2023-6240: (unk) - CVE-2023-6270: (unk) - CVE-2023-6356: (unk) + CVE-2023-6270: (unk) aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts + CVE-2023-6356: (unk) nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length CVE-2023-6535: (unk) - CVE-2023-6536: (unk) + CVE-2023-6536: (unk) nvmet-tcp: fix a crash in nvmet_req_complete() CVE-2023-6546: (unk) tty: n_gsm: fix the UAF caused by race condition in gsm_cleanup_mux CVE-2023-6560: (unk) io_uring: don't allow discontig pages for IORING_SETUP_NO_MMAP CVE-2023-6606: (unk) smb: client: fix OOB in smbCalcSize() @@ -438,7 +562,7 @@ Outstanding CVEs: CVE-2023-6915: (unk) ida: Fix crash in ida_free when the bitmap is empty CVE-2023-6931: (unk) perf: Fix perf_event_validate_size() CVE-2023-6932: (unk) ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet - CVE-2023-7042: (unk) + CVE-2023-7042: (unk) wifi: ath10k: fix NULL pointer dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev() CVE-2023-7192: (unk) netfilter: ctnetlink: fix possible refcount leak in ctnetlink_create_conntrack() CVE-2024-0340: (unk) vhost: use kzalloc() instead of kmalloc() followed by memset() CVE-2024-0564: (unk) @@ -449,17 +573,18 @@ Outstanding CVEs: CVE-2024-0641: (unk) tipc: fix a potential deadlock on &tx->lock CVE-2024-0646: (unk) net: tls, update curr on splice as well CVE-2024-0775: (unk) ext4: improve error recovery code paths in __ext4_remount() - CVE-2024-0841: (unk) + CVE-2024-0841: (unk) fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super CVE-2024-1085: (unk) netfilter: nf_tables: check if catch-all set element is active in next generation CVE-2024-1086: (unk) netfilter: nf_tables: reject QUEUE/DROP verdict parameters CVE-2024-1151: (unk) net: openvswitch: limit the number of recursions from action sets CVE-2024-1312: (unk) mm: lock_vma_under_rcu() must check vma->anon_vma under vma lock CVE-2024-21803: (unk) - CVE-2024-22099: (unk) + CVE-2024-2193: (unk) + CVE-2024-22099: (unk) Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security CVE-2024-22386: (unk) CVE-2024-22705: (unk) ksmbd: fix slab-out-of-bounds in smb_strndup_from_utf16() - CVE-2024-23196: (unk) - CVE-2024-23307: (unk) + CVE-2024-23196: (unk) ALSA: hda: fix a possible null-pointer dereference due to data race in snd_hdac_regmap_sync() + CVE-2024-23307: (unk) md/raid5: fix atomicity violation in raid5_cache_count CVE-2024-23848: (unk) CVE-2024-23849: (unk) net/rds: Fix UBSAN: array-index-out-of-bounds in rds_cmsg_recv CVE-2024-23850: (unk) btrfs: do not ASSERT() if the newly created subvolume already got read @@ -469,7 +594,7 @@ Outstanding CVEs: CVE-2024-24858: (unk) CVE-2024-24859: (unk) CVE-2024-24860: (unk) Bluetooth: Fix atomicity violation in {min,max}_key_size_set - CVE-2024-24861: (unk) + CVE-2024-24861: (unk) media: xc4000: Fix atomicity violation in xc4000_get_frequency CVE-2024-24864: (unk) CVE-2024-25739: (unk) CVE-2024-25740: (unk) @@ -480,8 +605,6 @@ Outstanding CVEs: CVE-2024-26584: (unk) net: tls: handle backlogging of crypto requests CVE-2024-26585: (unk) tls: fix race between tx work scheduling and socket close CVE-2024-26586: (unk) mlxsw: spectrum_acl_tcam: Fix stack corruption - CVE-2024-26587: (unk) net: netdevsim: don't try to destroy PHC on VFs - CVE-2024-26588: (unk) LoongArch: BPF: Prevent out-of-bounds memory access CVE-2024-26589: (unk) bpf: Reject variable offset alu on PTR_TO_FLOW_KEYS CVE-2024-26590: (unk) erofs: fix inconsistent per-file compression format CVE-2024-26591: (unk) bpf: Fix re-attachment branch in bpf_tracing_prog_attach @@ -492,3 +615,148 @@ Outstanding CVEs: CVE-2024-26597: (unk) net: qualcomm: rmnet: fix global oob in rmnet_policy CVE-2024-26598: (unk) KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache CVE-2024-26599: (unk) pwm: Fix out-of-bounds access in of_pwm_single_xlate() + CVE-2024-26600: (unk) phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP + CVE-2024-26601: (unk) ext4: regenerate buddy after block freeing failed if under fc replay + CVE-2024-26602: (unk) sched/membarrier: reduce the ability to hammer on sys_membarrier + CVE-2024-26603: (unk) x86/fpu: Stop relying on userspace for info to fault in xsave buffer + CVE-2024-26606: (unk) binder: signal epoll threads of self-work + CVE-2024-26607: (unk) drm/bridge: sii902x: Fix probing race issue + CVE-2024-26608: (unk) ksmbd: fix global oob in ksmbd_nl_policy + CVE-2024-26610: (unk) wifi: iwlwifi: fix a memory corruption + CVE-2024-26612: (unk) netfs, fscache: Prevent Oops in fscache_put_cache() + CVE-2024-26614: (unk) tcp: make sure init the accept_queue's spinlocks once + CVE-2024-26615: (unk) net/smc: fix illegal rmb_desc access in SMC-D connection dump + CVE-2024-26620: (unk) s390/vfio-ap: always filter entire AP matrix + CVE-2024-26622: (unk) tomoyo: fix UAF write bug in tomoyo_write_control() + CVE-2024-26623: (unk) pds_core: Prevent race issues involving the adminq + CVE-2024-26625: (unk) llc: call sock_orphan() at release time + CVE-2024-26627: (unk) scsi: core: Move scsi_host_busy() out of host lock for waking up EH handler + CVE-2024-26629: (unk) nfsd: fix RELEASE_LOCKOWNER + CVE-2024-26631: (unk) ipv6: mcast: fix data-race in ipv6_mc_down / mld_ifc_work + CVE-2024-26632: (unk) block: Fix iterating over an empty bio with bio_for_each_folio_all + CVE-2024-26633: (unk) ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim() + CVE-2024-26635: (unk) llc: Drop support for ETH_P_TR_802_2. + CVE-2024-26636: (unk) llc: make llc_ui_sendmsg() more robust against bonding changes + CVE-2024-26638: (unk) nbd: always initialize struct msghdr completely + CVE-2024-26640: (unk) tcp: add sanity checks to rx zerocopy + CVE-2024-26641: (unk) ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv() + CVE-2024-26642: (unk) netfilter: nf_tables: disallow anonymous set with timeout flag + CVE-2024-26644: (unk) btrfs: don't abort filesystem when attempting to snapshot deleted subvolume + CVE-2024-26645: (unk) tracing: Ensure visibility when inserting an element into tracing_map + CVE-2024-26646: (unk) thermal: intel: hfi: Add syscore callbacks for system-wide PM + CVE-2024-26647: (unk) drm/amd/display: Fix late derefrence 'dsc' check in 'link_set_dsc_pps_packet()' + CVE-2024-26648: (unk) drm/amd/display: Fix variable deferencing before NULL check in edp_setup_replay() + CVE-2024-26650: (unk) platform/x86: p2sb: Allow p2sb_bar() calls during PCI device probe + CVE-2024-26651: (unk) sr9800: Add check for usbnet_get_endpoints + CVE-2024-26654: (unk) ALSA: sh: aica: reorder cleanup operations to avoid UAF bugs + CVE-2024-26655: (unk) Fix memory leak in posix_clock_open() + CVE-2024-26656: (unk) drm/amdgpu: fix use-after-free bug + CVE-2024-26658: (unk) bcachefs: grab s_umount only if snapshotting + CVE-2024-26659: (unk) xhci: handle isoc Babble and Buffer Overrun events properly + CVE-2024-26660: (unk) drm/amd/display: Implement bounds check for stream encoder creation in DCN301 + CVE-2024-26661: (unk) drm/amd/display: Add NULL test for 'timing generator' in 'dcn21_set_pipe()' + CVE-2024-26662: (unk) drm/amd/display: Fix 'panel_cntl' could be null in 'dcn21_set_backlight_level()' + CVE-2024-26663: (unk) tipc: Check the bearer type before calling tipc_udp_nl_bearer_add() + CVE-2024-26664: (unk) hwmon: (coretemp) Fix out-of-bounds memory access + CVE-2024-26665: (unk) tunnels: fix out of bounds access when building IPv6 PMTU error + CVE-2024-26667: (unk) drm/msm/dpu: check for valid hw_pp in dpu_encoder_helper_phys_cleanup + CVE-2024-26668: (unk) netfilter: nft_limit: reject configurations that cause integer overflow + CVE-2024-26669: (unk) net/sched: flower: Fix chain template offload + CVE-2024-26671: (unk) blk-mq: fix IO hang from sbitmap wakeup race + CVE-2024-26672: (unk) drm/amdgpu: Fix variable 'mca_funcs' dereferenced before NULL check in 'amdgpu_mca_smu_get_mca_entry()' + CVE-2024-26673: (unk) netfilter: nft_ct: sanitize layer 3 and 4 protocol number in custom expectations + CVE-2024-26675: (unk) ppp_async: limit MRU to 64K + CVE-2024-26676: (unk) af_unix: Call kfree_skb() for dead unix_(sk)->oob_skb in GC. + CVE-2024-26677: (unk) rxrpc: Fix delayed ACKs to not set the reference serial number + CVE-2024-26679: (unk) inet: read sk->sk_family once in inet_recv_error() + CVE-2024-26680: (unk) net: atlantic: Fix DMA mapping for PTP hwts ring + CVE-2024-26681: (unk) netdevsim: avoid potential loop in nsim_dev_trap_report_work() + CVE-2024-26684: (unk) net: stmmac: xgmac: fix handling of DPP safety error for DMA channels + CVE-2024-26685: (unk) nilfs2: fix potential bug in end_buffer_async_write + CVE-2024-26686: (unk) fs/proc: do_task_stat: use sig->stats_lock to gather the threads/children stats + CVE-2024-26687: (unk) xen/events: close evtchn after mapping cleanup + CVE-2024-26688: (unk) fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super + CVE-2024-26689: (unk) ceph: prevent use-after-free in encode_cap_msg() + CVE-2024-26691: (unk) KVM: arm64: Fix circular locking dependency + CVE-2024-26695: (unk) crypto: ccp - Fix null pointer dereference in __sev_platform_shutdown_locked + CVE-2024-26696: (unk) nilfs2: fix hang in nilfs_lookup_dirty_data_buffers() + CVE-2024-26697: (unk) nilfs2: fix data corruption in dsync block recovery for small block sizes + CVE-2024-26698: (unk) hv_netvsc: Fix race condition between netvsc_probe and netvsc_remove + CVE-2024-26699: (unk) drm/amd/display: Fix array-index-out-of-bounds in dcn35_clkmgr + CVE-2024-26700: (unk) drm/amd/display: Fix MST Null Ptr for RV + CVE-2024-26702: (unk) iio: magnetometer: rm3100: add boundary check for the value read from RM3100_REG_TMRC + CVE-2024-26704: (unk) ext4: fix double-free of blocks due to wrong extents moved_len + CVE-2024-26706: (unk) parisc: Fix random data corruption from exception handler + CVE-2024-26707: (unk) net: hsr: remove WARN_ONCE() in send_hsr_supervision_frame() + CVE-2024-26712: (unk) powerpc/kasan: Fix addr error caused by page alignment + CVE-2024-26713: (unk) powerpc/pseries/iommu: Fix iommu initialisation during DLPAR add + CVE-2024-26714: (unk) interconnect: qcom: sc8180x: Mark CO0 BCM keepalive + CVE-2024-26715: (unk) usb: dwc3: gadget: Fix NULL pointer dereference in dwc3_gadget_suspend + CVE-2024-26717: (unk) HID: i2c-hid-of: fix NULL-deref on failed power up + CVE-2024-26718: (unk) dm-crypt, dm-verity: disable tasklets + CVE-2024-26719: (unk) nouveau: offload fence uevents work to workqueue + CVE-2024-26720: (unk) mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again + CVE-2024-26726: (unk) btrfs: don't drop extent_map for free space inode on write error + CVE-2024-26727: (unk) btrfs: do not ASSERT() if the newly created subvolume already got read + CVE-2024-26733: (unk) arp: Prevent overflow in arp_req_get(). + CVE-2024-26735: (unk) ipv6: sr: fix possible use-after-free and null-ptr-deref + CVE-2024-26736: (unk) afs: Increase buffer size in afs_update_volume_status() + CVE-2024-26737: (unk) bpf: Fix racing between bpf_timer_cancel_and_free and bpf_timer_cancel + CVE-2024-26738: (unk) powerpc/pseries/iommu: DLPAR add doesn't completely initialize pci_controller + CVE-2024-26739: (unk) net/sched: act_mirred: don't override retval if we already lost the skb + CVE-2024-26740: (unk) net/sched: act_mirred: use the backlog for mirred ingress + CVE-2024-26742: (unk) scsi: smartpqi: Fix disable_managed_interrupts + CVE-2024-26743: (unk) RDMA/qedr: Fix qedr_create_user_qp error flow + CVE-2024-26744: (unk) RDMA/srpt: Support specifying the srpt_service_guid parameter + CVE-2024-26745: (unk) powerpc/pseries/iommu: IOMMU table is not initialized for kdump over SR-IOV + CVE-2024-26747: (unk) usb: roles: fix NULL pointer issue when put module's reference + CVE-2024-26748: (unk) usb: cdns3: fix memory double free when handle zero packet + CVE-2024-26749: (unk) usb: cdns3: fixed memory use after free at cdns3_gadget_ep_disable() + CVE-2024-26751: (unk) ARM: ep93xx: Add terminator to gpiod_lookup_table + CVE-2024-26752: (unk) l2tp: pass correct message length to ip6_append_data + CVE-2024-26753: (unk) crypto: virtio/akcipher - Fix stack overflow on memcpy + CVE-2024-26754: (unk) gtp: fix use-after-free and null-ptr-deref in gtp_genl_dump_pdp() + CVE-2024-26756: (unk) md: Don't register sync_thread for reshape directly + CVE-2024-26757: (unk) md: Don't ignore read-only array in md_check_recovery() + CVE-2024-26758: (unk) md: Don't ignore suspended array in md_check_recovery() + CVE-2024-26759: (unk) mm/swap: fix race when skipping swapcache + CVE-2024-26760: (unk) scsi: target: pscsi: Fix bio_put() for error case + CVE-2024-26761: (unk) cxl/pci: Fix disabling memory if DVSEC CXL Range does not match a CFMWS window + CVE-2024-26763: (unk) dm-crypt: don't modify the data when using authenticated encryption + CVE-2024-26764: (unk) fs/aio: Restrict kiocb_set_cancel_fn() to I/O submitted via libaio + CVE-2024-26765: (unk) LoongArch: Disable IRQ before init_fn() for nonboot CPUs + CVE-2024-26766: (unk) IB/hfi1: Fix sdma.h tx->num_descs off-by-one error + CVE-2024-26767: (unk) drm/amd/display: fixed integer types and null check locations + CVE-2024-26768: (unk) LoongArch: Change acpi_core_pic[NR_CPUS] to acpi_core_pic[MAX_CORE_PIC] + CVE-2024-26769: (unk) nvmet-fc: avoid deadlock on delete association path + CVE-2024-26770: (unk) HID: nvidia-shield: Add missing null pointer checks to LED initialization + CVE-2024-26771: (unk) dmaengine: ti: edma: Add some null pointer checks to the edma_probe + CVE-2024-26772: (unk) ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal() + CVE-2024-26773: (unk) ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found() + CVE-2024-26774: (unk) ext4: avoid dividing by 0 in mb_update_avg_fragment_size() when block bitmap corrupt + CVE-2024-26775: (unk) aoe: avoid potential deadlock at set_capacity + CVE-2024-26776: (unk) spi: hisi-sfc-v3xx: Return IRQ_NONE if no interrupts were detected + CVE-2024-26777: (unk) fbdev: sis: Error out if pixclock equals zero + CVE-2024-26778: (unk) fbdev: savage: Error out if pixclock equals zero + CVE-2024-26779: (unk) wifi: mac80211: fix race condition on enabling fast-xmit + CVE-2024-26782: (unk) mptcp: fix double-free on socket dismantle + CVE-2024-26783: (unk) mm/vmscan: fix a bug calling wakeup_kswapd() with a wrong zone index + CVE-2024-26784: (unk) pmdomain: arm: Fix NULL dereference on scmi_perf_domain removal + CVE-2024-26787: (unk) mmc: mmci: stm32: fix DMA API overlapping mappings warning + CVE-2024-26788: (unk) dmaengine: fsl-qdma: init irq after reg initialization + CVE-2024-26789: (unk) crypto: arm64/neonbs - fix out-of-bounds access on short input + CVE-2024-26790: (unk) dmaengine: fsl-qdma: fix SoC may hang on 16 byte unaligned read + CVE-2024-26791: (unk) btrfs: dev-replace: properly validate device names + CVE-2024-26793: (unk) gtp: fix use-after-free and null-ptr-deref in gtp_newlink() + CVE-2024-26795: (unk) riscv: Sparse-Memory/vmemmap out-of-bounds fix + CVE-2024-26797: (unk) drm/amd/display: Prevent potential buffer overflow in map_hw_resources + CVE-2024-26798: (unk) fbcon: always restore the old font data in fbcon_do_set_font() + CVE-2024-26799: (unk) ASoC: qcom: Fix uninitialized pointer dmactl + CVE-2024-26801: (unk) Bluetooth: Avoid potential use-after-free in hci_error_reset + CVE-2024-26802: (unk) stmmac: Clear variable when destroying workqueue + CVE-2024-26803: (unk) net: veth: clear GRO when clearing XDP even when down + CVE-2024-26804: (unk) net: ip_tunnel: prevent perpetual headroom growth + CVE-2024-26805: (unk) netlink: Fix kernel-infoleak-after-free in __skb_datagram_iter + CVE-2024-26806: (unk) spi: cadence-qspi: remove system-wide suspend helper calls from runtime PM hooks + CVE-2024-26808: (unk) netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain + CVE-2024-26809: (unk) netfilter: nft_set_pipapo: release elements in clone only from destroy path diff --git a/data/6.1/6.1_CVEs.txt b/data/6.1/6.1_CVEs.txt index 09b7b1800..6d871ffdb 100644 --- a/data/6.1/6.1_CVEs.txt +++ b/data/6.1/6.1_CVEs.txt @@ -104,6 +104,7 @@ CVE-2022-48423: Fixed with 6.1.3 CVE-2022-48424: Fixed with 6.1.3 CVE-2022-48425: Fixed with 6.1.33 CVE-2022-48502: Fixed with 6.1.40 +CVE-2022-48628: Fixed with 6.1.56 CVE-2023-0045: Fixed with 6.1.5 CVE-2023-0160: Fixed with 6.1.28 CVE-2023-0179: Fixed with 6.1.7 @@ -157,7 +158,7 @@ CVE-2023-2156: Fixed with 6.1.26 CVE-2023-2162: Fixed with 6.1.11 CVE-2023-2163: Fixed with 6.1.26 CVE-2023-2166: Fixed with 6.1 -CVE-2023-2176: Fix not seen in stream +CVE-2023-2176: Fixed with 6.1.81 CVE-2023-2194: Fixed with 6.1.22 CVE-2023-2235: Fixed with 6.1.21 CVE-2023-2248: Fixed with 6.1.26 @@ -180,6 +181,7 @@ CVE-2023-26606: Fixed with 6.1.2 CVE-2023-28327: Fixed with 6.1 CVE-2023-28328: Fixed with 6.1.2 CVE-2023-28466: Fixed with 6.1.20 +CVE-2023-28746: Fixed with 6.1.82 CVE-2023-28866: Fixed with 6.1.22 CVE-2023-2898: Fixed with 6.1.39 CVE-2023-2985: Fixed with 6.1.16 @@ -292,7 +294,7 @@ CVE-2023-46343: Fixed with 6.1.60 CVE-2023-46813: Fixed with 6.1.60 CVE-2023-46838: Fixed with 6.1.75 CVE-2023-46862: Fixed with 6.1.61 -CVE-2023-47233: Fix unknown +CVE-2023-47233: Fixed with 6.1.84 CVE-2023-4881: Fixed with 6.1.54 CVE-2023-4921: Fixed with 6.1.54 CVE-2023-50431: Fixed with 6.1.75 @@ -330,17 +332,142 @@ CVE-2023-52458: Fixed with 6.1.75 CVE-2023-52462: Fixed with 6.1.75 CVE-2023-52463: Fixed with 6.1.75 CVE-2023-52464: Fixed with 6.1.75 +CVE-2023-52467: Fixed with 6.1.75 +CVE-2023-52469: Fixed with 6.1.75 +CVE-2023-52470: Fixed with 6.1.75 +CVE-2023-52474: Fixed with 6.1.28 +CVE-2023-52475: Fixed with 6.1.59 +CVE-2023-52476: Fixed with 6.1.59 +CVE-2023-52477: Fixed with 6.1.59 +CVE-2023-52478: Fixed with 6.1.59 +CVE-2023-52479: Fixed with 6.1.57 +CVE-2023-52480: Fixed with 6.1.57 +CVE-2023-52481: Fixed with 6.1.57 +CVE-2023-52482: Fixed with 6.1.56 +CVE-2023-52483: Fixed with 6.1.59 +CVE-2023-52484: Fixed with 6.1.56 +CVE-2023-52485: Fix not seen in stream +CVE-2023-52486: Fixed with 6.1.76 +CVE-2023-52488: Fixed with 6.1.76 +CVE-2023-52489: Fixed with 6.1.76 +CVE-2023-52491: Fixed with 6.1.76 +CVE-2023-52492: Fixed with 6.1.76 +CVE-2023-52493: Fixed with 6.1.76 +CVE-2023-52494: Fixed with 6.1.76 +CVE-2023-52497: Fixed with 6.1.76 +CVE-2023-52498: Fixed with 6.1.76 +CVE-2023-52499: Fixed with 6.1.59 +CVE-2023-52500: Fixed with 6.1.56 +CVE-2023-52501: Fixed with 6.1.56 +CVE-2023-52502: Fixed with 6.1.59 +CVE-2023-52503: Fixed with 6.1.59 +CVE-2023-52504: Fixed with 6.1.59 +CVE-2023-52505: Fixed with 6.1.59 +CVE-2023-52506: Fixed with 6.1.56 +CVE-2023-52507: Fixed with 6.1.59 +CVE-2023-52508: Fixed with 6.1.56 +CVE-2023-52509: Fixed with 6.1.59 +CVE-2023-52510: Fixed with 6.1.59 +CVE-2023-52511: Fixed with 6.1.56 +CVE-2023-52512: Fixed with 6.1.59 +CVE-2023-52513: Fixed with 6.1.57 +CVE-2023-52515: Fixed with 6.1.57 +CVE-2023-52516: Fixed with 6.1.56 +CVE-2023-52517: Fixed with 6.1.56 +CVE-2023-52518: Fixed with 6.1.57 +CVE-2023-52519: Fixed with 6.1.57 +CVE-2023-52520: Fixed with 6.1.59 +CVE-2023-52522: Fixed with 6.1.57 +CVE-2023-52523: Fixed with 6.1.57 +CVE-2023-52526: Fixed with 6.1.57 +CVE-2023-52527: Fixed with 6.1.57 +CVE-2023-52528: Fixed with 6.1.57 +CVE-2023-52529: Fixed with 6.1.57 +CVE-2023-52530: Fixed with 6.1.57 +CVE-2023-52531: Fixed with 6.1.57 +CVE-2023-52532: Fixed with 6.1.59 +CVE-2023-52559: Fixed with 6.1.57 +CVE-2023-52560: Fixed with 6.1.56 +CVE-2023-52561: Fixed with 6.1.56 +CVE-2023-52562: Fixed with 6.1.56 +CVE-2023-52563: Fixed with 6.1.56 +CVE-2023-52565: Fixed with 6.1.56 +CVE-2023-52566: Fixed with 6.1.56 +CVE-2023-52568: Fixed with 6.1.56 +CVE-2023-52569: Fixed with 6.1.56 +CVE-2023-52570: Fixed with 6.1.56 +CVE-2023-52571: Fixed with 6.1.56 +CVE-2023-52572: Fixed with 6.1.56 +CVE-2023-52573: Fixed with 6.1.56 +CVE-2023-52574: Fixed with 6.1.56 +CVE-2023-52576: Fixed with 6.1.56 +CVE-2023-52578: Fixed with 6.1.56 +CVE-2023-52580: Fixed with 6.1.56 +CVE-2023-52582: Fixed with 6.1.56 +CVE-2023-52583: Fixed with 6.1.77 +CVE-2023-52584: Fixed with 6.1.77 +CVE-2023-52585: Fix not seen in stream +CVE-2023-52586: Fix not seen in stream +CVE-2023-52587: Fixed with 6.1.77 +CVE-2023-52588: Fixed with 6.1.77 +CVE-2023-52589: Fixed with 6.1.77 +CVE-2023-52590: Fix not seen in stream +CVE-2023-52591: Fix not seen in stream +CVE-2023-52593: Fixed with 6.1.77 +CVE-2023-52594: Fixed with 6.1.77 +CVE-2023-52595: Fixed with 6.1.77 +CVE-2023-52596: Fix not seen in stream +CVE-2023-52597: Fixed with 6.1.77 +CVE-2023-52598: Fixed with 6.1.77 +CVE-2023-52599: Fixed with 6.1.77 +CVE-2023-52600: Fixed with 6.1.77 +CVE-2023-52601: Fixed with 6.1.77 +CVE-2023-52602: Fixed with 6.1.77 +CVE-2023-52603: Fixed with 6.1.77 +CVE-2023-52604: Fixed with 6.1.77 +CVE-2023-52606: Fixed with 6.1.77 +CVE-2023-52607: Fixed with 6.1.77 +CVE-2023-52608: Fixed with 6.1.76 +CVE-2023-52609: Fixed with 6.1.75 +CVE-2023-52610: Fixed with 6.1.75 +CVE-2023-52612: Fixed with 6.1.75 +CVE-2023-52614: Fixed with 6.1.76 +CVE-2023-52615: Fixed with 6.1.76 +CVE-2023-52616: Fixed with 6.1.79 +CVE-2023-52617: Fixed with 6.1.77 +CVE-2023-52618: Fixed with 6.1.77 +CVE-2023-52619: Fixed with 6.1.77 +CVE-2023-52620: Fixed with 6.1.81 +CVE-2023-52621: Fixed with 6.1.77 +CVE-2023-52622: Fixed with 6.1.77 +CVE-2023-52623: Fixed with 6.1.77 +CVE-2023-52624: Fix not seen in stream +CVE-2023-52625: Fix not seen in stream +CVE-2023-52627: Fixed with 6.1.76 +CVE-2023-52628: Fixed with 6.1.54 +CVE-2023-52629: Fix not seen in stream +CVE-2023-52630: Fixed with 6.1.78 +CVE-2023-52631: Fixed with 6.1.78 +CVE-2023-52632: Fixed with 6.1.77 +CVE-2023-52633: Fixed with 6.1.77 +CVE-2023-52634: Fix not seen in stream +CVE-2023-52635: Fixed with 6.1.77 +CVE-2023-52637: Fixed with 6.1.79 +CVE-2023-52638: Fixed with 6.1.79 +CVE-2023-52639: Fixed with 6.1.82 +CVE-2023-52640: Fixed with 6.1.80 +CVE-2023-52641: Fixed with 6.1.80 CVE-2023-5345: Fixed with 6.1.56 CVE-2023-5717: Fixed with 6.1.60 CVE-2023-6039: Fix not seen in stream CVE-2023-6121: Fixed with 6.1.65 CVE-2023-6176: Fixed with 6.1.54 CVE-2023-6240: Fix unknown -CVE-2023-6270: Fix unknown -CVE-2023-6356: Fix unknown +CVE-2023-6270: Fixed with 6.1.83 +CVE-2023-6356: Fixed with 6.1.75 CVE-2023-6531: Fixed with 6.1.68 CVE-2023-6535: Fix unknown -CVE-2023-6536: Fix unknown +CVE-2023-6536: Fixed with 6.1.75 CVE-2023-6546: Fixed with 6.1.47 CVE-2023-6560: Fix not seen in stream CVE-2023-6606: Fixed with 6.1.70 @@ -350,7 +477,7 @@ CVE-2023-6817: Fixed with 6.1.68 CVE-2023-6915: Fixed with 6.1.74 CVE-2023-6931: Fixed with 6.1.68 CVE-2023-6932: Fixed with 6.1.66 -CVE-2023-7042: Fix unknown +CVE-2023-7042: Fixed with 6.1.83 CVE-2023-7192: Fixed with 6.1.18 CVE-2024-0340: Fixed with 6.1.78 CVE-2024-0564: Fix unknown @@ -361,17 +488,18 @@ CVE-2024-0639: Fixed with 6.1.39 CVE-2024-0641: Fixed with 6.1.57 CVE-2024-0646: Fixed with 6.1.69 CVE-2024-0775: Fixed with 6.1.29 -CVE-2024-0841: Fix unknown +CVE-2024-0841: Fixed with 6.1.79 CVE-2024-1085: Fixed with 6.1.75 CVE-2024-1086: Fixed with 6.1.76 CVE-2024-1151: Fixed with 6.1.79 CVE-2024-1312: Fix not seen in stream CVE-2024-21803: Fix unknown -CVE-2024-22099: Fix unknown +CVE-2024-2193: Fix unknown +CVE-2024-22099: Fixed with 6.1.83 CVE-2024-22386: Fix unknown CVE-2024-22705: Fixed with 6.1.71 -CVE-2024-23196: Fix unknown -CVE-2024-23307: Fix unknown +CVE-2024-23196: Fixed with 6.1.47 +CVE-2024-23307: Fixed with 6.1.84 CVE-2024-23848: Fix unknown CVE-2024-23849: Fixed with 6.1.76 CVE-2024-23850: Fixed with 6.1.79 @@ -381,7 +509,7 @@ CVE-2024-24857: Fix unknown CVE-2024-24858: Fix unknown CVE-2024-24859: Fix unknown CVE-2024-24860: Fixed with 6.1.75 -CVE-2024-24861: Fix unknown +CVE-2024-24861: Fixed with 6.1.84 CVE-2024-24864: Fix unknown CVE-2024-25739: Fix unknown CVE-2024-25740: Fix unknown @@ -389,13 +517,12 @@ CVE-2024-25741: Fix unknown CVE-2024-25744: Fixed with 6.1.68 CVE-2024-26582: Fixed with 6.1.79 CVE-2024-26583: Fixed with 6.1.79 -CVE-2024-26584: Fix not seen in stream -CVE-2024-26585: Fix not seen in stream +CVE-2024-26584: Fixed with 6.1.84 +CVE-2024-26585: Fixed with 6.1.84 CVE-2024-26586: Fixed with 6.1.79 -CVE-2024-26587: Fix not seen in stream CVE-2024-26588: Fixed with 6.1.75 CVE-2024-26589: Fixed with 6.1.75 -CVE-2024-26590: Fix not seen in stream +CVE-2024-26590: Fixed with 6.1.80 CVE-2024-26591: Fixed with 6.1.75 CVE-2024-26592: Fixed with 6.1.75 CVE-2024-26593: Fixed with 6.1.79 @@ -405,3 +532,150 @@ CVE-2024-26596: Fix not seen in stream CVE-2024-26597: Fixed with 6.1.75 CVE-2024-26598: Fixed with 6.1.75 CVE-2024-26599: Fixed with 6.1.75 +CVE-2024-26600: Fixed with 6.1.78 +CVE-2024-26601: Fixed with 6.1.78 +CVE-2024-26602: Fixed with 6.1.79 +CVE-2024-26603: Fixed with 6.1.79 +CVE-2024-26606: Fixed with 6.1.79 +CVE-2024-26607: Fixed with 6.1.76 +CVE-2024-26608: Fixed with 6.1.76 +CVE-2024-26610: Fixed with 6.1.76 +CVE-2024-26612: Fixed with 6.1.76 +CVE-2024-26614: Fixed with 6.1.76 +CVE-2024-26615: Fixed with 6.1.76 +CVE-2024-26620: Fixed with 6.1.76 +CVE-2024-26622: Fixed with 6.1.81 +CVE-2024-26623: Fix not seen in stream +CVE-2024-26625: Fixed with 6.1.77 +CVE-2024-26627: Fixed with 6.1.77 +CVE-2024-26629: Fixed with 6.1.79 +CVE-2024-26631: Fixed with 6.1.75 +CVE-2024-26632: Fixed with 6.1.75 +CVE-2024-26633: Fixed with 6.1.75 +CVE-2024-26635: Fixed with 6.1.76 +CVE-2024-26636: Fixed with 6.1.76 +CVE-2024-26638: Fixed with 6.1.76 +CVE-2024-26640: Fixed with 6.1.77 +CVE-2024-26641: Fixed with 6.1.77 +CVE-2024-26642: Fixed with 6.1.84 +CVE-2024-26644: Fixed with 6.1.76 +CVE-2024-26645: Fixed with 6.1.76 +CVE-2024-26646: Fixed with 6.1.76 +CVE-2024-26647: Fix not seen in stream +CVE-2024-26648: Fix not seen in stream +CVE-2024-26650: Fixed with 6.1.76 +CVE-2024-26651: Fixed with 6.1.83 +CVE-2024-26654: Fixed with 6.1.84 +CVE-2024-26655: Fix not seen in stream +CVE-2024-26656: Fix not seen in stream +CVE-2024-26658: Fix not seen in stream +CVE-2024-26659: Fixed with 6.1.82 +CVE-2024-26660: Fixed with 6.1.78 +CVE-2024-26661: Fix not seen in stream +CVE-2024-26662: Fix not seen in stream +CVE-2024-26663: Fixed with 6.1.78 +CVE-2024-26664: Fixed with 6.1.78 +CVE-2024-26665: Fixed with 6.1.78 +CVE-2024-26667: Fixed with 6.1.78 +CVE-2024-26668: Fixed with 6.1.76 +CVE-2024-26669: Fix not seen in stream +CVE-2024-26671: Fixed with 6.1.77 +CVE-2024-26672: Fix not seen in stream +CVE-2024-26673: Fixed with 6.1.77 +CVE-2024-26675: Fixed with 6.1.78 +CVE-2024-26676: Fixed with 6.1.78 +CVE-2024-26677: Fix not seen in stream +CVE-2024-26679: Fixed with 6.1.78 +CVE-2024-26680: Fixed with 6.1.78 +CVE-2024-26681: Fixed with 6.1.78 +CVE-2024-26684: Fixed with 6.1.78 +CVE-2024-26685: Fixed with 6.1.79 +CVE-2024-26686: Fixed with 6.1.82 +CVE-2024-26687: Fixed with 6.1.81 +CVE-2024-26688: Fixed with 6.1.79 +CVE-2024-26689: Fixed with 6.1.79 +CVE-2024-26691: Fix not seen in stream +CVE-2024-26695: Fixed with 6.1.79 +CVE-2024-26696: Fixed with 6.1.79 +CVE-2024-26697: Fixed with 6.1.79 +CVE-2024-26698: Fixed with 6.1.79 +CVE-2024-26699: Fix not seen in stream +CVE-2024-26700: Fixed with 6.1.82 +CVE-2024-26702: Fixed with 6.1.79 +CVE-2024-26704: Fixed with 6.1.79 +CVE-2024-26706: Fixed with 6.1.79 +CVE-2024-26707: Fixed with 6.1.79 +CVE-2024-26712: Fixed with 6.1.79 +CVE-2024-26713: Fix not seen in stream +CVE-2024-26714: Fixed with 6.1.79 +CVE-2024-26715: Fixed with 6.1.79 +CVE-2024-26717: Fixed with 6.1.79 +CVE-2024-26718: Fixed with 6.1.79 +CVE-2024-26719: Fix not seen in stream +CVE-2024-26720: Fixed with 6.1.79 +CVE-2024-26723: Fixed with 6.1.79 +CVE-2024-26726: Fixed with 6.1.79 +CVE-2024-26727: Fixed with 6.1.79 +CVE-2024-26733: Fixed with 6.1.80 +CVE-2024-26735: Fixed with 6.1.80 +CVE-2024-26736: Fixed with 6.1.80 +CVE-2024-26737: Fixed with 6.1.80 +CVE-2024-26738: Fix not seen in stream +CVE-2024-26739: Fix not seen in stream +CVE-2024-26740: Fix not seen in stream +CVE-2024-26741: Fixed with 6.1.80 +CVE-2024-26742: Fixed with 6.1.80 +CVE-2024-26743: Fixed with 6.1.80 +CVE-2024-26744: Fixed with 6.1.80 +CVE-2024-26745: Fixed with 6.1.81 +CVE-2024-26747: Fixed with 6.1.80 +CVE-2024-26748: Fixed with 6.1.80 +CVE-2024-26749: Fixed with 6.1.80 +CVE-2024-26751: Fixed with 6.1.80 +CVE-2024-26752: Fixed with 6.1.80 +CVE-2024-26753: Fixed with 6.1.80 +CVE-2024-26754: Fixed with 6.1.80 +CVE-2024-26756: Fix not seen in stream +CVE-2024-26757: Fix not seen in stream +CVE-2024-26758: Fix not seen in stream +CVE-2024-26759: Fixed with 6.1.80 +CVE-2024-26760: Fixed with 6.1.80 +CVE-2024-26761: Fixed with 6.1.80 +CVE-2024-26763: Fixed with 6.1.80 +CVE-2024-26764: Fixed with 6.1.80 +CVE-2024-26765: Fixed with 6.1.80 +CVE-2024-26766: Fixed with 6.1.80 +CVE-2024-26767: Fix not seen in stream +CVE-2024-26768: Fix not seen in stream +CVE-2024-26769: Fixed with 6.1.80 +CVE-2024-26770: Fix not seen in stream +CVE-2024-26771: Fixed with 6.1.80 +CVE-2024-26772: Fixed with 6.1.80 +CVE-2024-26773: Fixed with 6.1.80 +CVE-2024-26774: Fixed with 6.1.80 +CVE-2024-26775: Fixed with 6.1.80 +CVE-2024-26776: Fixed with 6.1.80 +CVE-2024-26777: Fixed with 6.1.80 +CVE-2024-26778: Fixed with 6.1.80 +CVE-2024-26779: Fixed with 6.1.80 +CVE-2024-26782: Fixed with 6.1.81 +CVE-2024-26783: Fix not seen in stream +CVE-2024-26784: Fix not seen in stream +CVE-2024-26787: Fixed with 6.1.81 +CVE-2024-26788: Fixed with 6.1.81 +CVE-2024-26789: Fixed with 6.1.81 +CVE-2024-26790: Fixed with 6.1.81 +CVE-2024-26791: Fixed with 6.1.81 +CVE-2024-26793: Fixed with 6.1.81 +CVE-2024-26795: Fixed with 6.1.81 +CVE-2024-26797: Fix not seen in stream +CVE-2024-26798: Fixed with 6.1.81 +CVE-2024-26799: Fix not seen in stream +CVE-2024-26801: Fixed with 6.1.81 +CVE-2024-26802: Fixed with 6.1.81 +CVE-2024-26803: Fixed with 6.1.81 +CVE-2024-26804: Fixed with 6.1.81 +CVE-2024-26805: Fixed with 6.1.81 +CVE-2024-26806: Fix not seen in stream +CVE-2024-26808: Fixed with 6.1.76 +CVE-2024-26809: Fixed with 6.1.83 diff --git a/data/6.1/6.1_security.txt b/data/6.1/6.1_security.txt index ba5163e74..81bf0b918 100644 --- a/data/6.1/6.1_security.txt +++ b/data/6.1/6.1_security.txt @@ -153,6 +153,7 @@ CVEs fixed in 6.1.28: CVE-2023-35826: 2cdc8f729d953143b3bbdc56841bb6800752de7f media: cedrus: fix use after free bug in cedrus_remove due to race condition CVE-2023-35828: df2380520926bdbc264cffab0f45da9a21f304c8 usb: gadget: udc: renesas_usb3: Fix use after free bug in renesas_usb3_remove due to race condition CVE-2023-35829: 6a17add9c61030683b9c1fc86878f00a2d318a95 media: rkvdec: fix use after free bug in rkvdec_remove + CVE-2023-52474: dce59b5443700fbd0d2433ec6e4d4cf063448844 IB/hfi1: Fix bugs with non-PAGE_SIZE-end multi-iovec user SDMA requests CVEs fixed in 6.1.29: CVE-2023-32247: 1fc8a2b14ef5223f8e0b95faba2ee0a6e4d0f99d ksmbd: destroy expired sessions @@ -258,6 +259,7 @@ CVEs fixed in 6.1.47: CVE-2023-4569: 00ea7eb1c69eec91cdf9259f0e427c56e7999fcd netfilter: nf_tables: deactivate catchall elements in next generation CVE-2023-51042: dd0b3b367c3839e439f36af908b39c98929a5e54 drm/amdgpu: Fix potential fence use-after-free v2 CVE-2023-6546: 31311a9a4baae0ad47c85e448af21b2120344ff0 tty: n_gsm: fix the UAF caused by race condition in gsm_cleanup_mux + CVE-2024-23196: cdd412b528dee6e0851c4735d6676ec138da13a4 ALSA: hda: fix a possible null-pointer dereference due to data race in snd_hdac_regmap_sync() CVEs fixed in 6.1.50: CVE-2022-36402: 115f2ccd3a998fe7247f59f8fb5feffc878bcbb7 drm/vmwgfx: Fix shader stage validation @@ -281,26 +283,86 @@ CVEs fixed in 6.1.54: CVE-2023-39189: 7bb8d52b4271be7527b6e3120ae6ce4c6cdf6e34 netfilter: nfnetlink_osf: avoid OOB read CVE-2023-4881: d9ebfc0f21377690837ebbd119e679243e0099cc netfilter: nftables: exthdr: fix 4-byte stack OOB write CVE-2023-4921: a18349dc8d916a64d7c93f05da98953e3386d8e9 net: sched: sch_qfq: Fix UAF in qfq_dequeue() + CVE-2023-52628: d9ebfc0f21377690837ebbd119e679243e0099cc netfilter: nftables: exthdr: fix 4-byte stack OOB write CVE-2023-6176: 7f4116c6f98412a6e29ace6d6a7b41ebb4e8a392 net/tls: do not free tls_rec on async operation in bpf_exec_tx_verdict() CVEs fixed in 6.1.55: CVE-2023-42755: b93aeb6352b0229e3c5ca5ca4ff015b015aff33c net/sched: Retire rsvp classifier CVEs fixed in 6.1.56: + CVE-2022-48628: 89744b64914426cbabceb3d8a149176b5dafdfb5 ceph: drop messages from MDS when unmounting CVE-2023-4244: 41113aa5698ad7a82635bcb747d483e4458d518d netfilter: nf_tables: fix GC transaction races with netns and netlink event exit path CVE-2023-42754: 2712545e535d7a2e4c53b9c9658a9c88c6055862 ipv4: fix null-deref in ipv4_link_failure CVE-2023-4563: 59dab3bf0b8fc08eb802721c0532f13dd89209b8 netfilter: nf_tables: don't skip expired elements during walk CVE-2023-5197: 9af8bb2afea3705b58fe930f97a39322f46e5b8b netfilter: nf_tables: disallow rule removal from chain binding + CVE-2023-52482: 6ce2f297a7168274547d0b5aea6c7c16268b8a96 x86/srso: Add SRSO mitigation for Hygon processors + CVE-2023-52484: f90f4c562003ac3d3b135c5a40a5383313f27264 iommu/arm-smmu-v3: Fix soft lockup triggered by arm_smmu_mm_invalidate_range + CVE-2023-52500: 2259e1901b2d8c0e8538fc99e77de443b939e749 scsi: pm80xx: Avoid leaking tags when processing OPC_INB_SET_CONTROLLER_CONFIG command + CVE-2023-52501: b08a4938229dbb530a35c41b83002a1457c6ff49 ring-buffer: Do not attempt to read past "commit" + CVE-2023-52506: f105e893a8edd48bdf4bef9fef845a9ff402f737 LoongArch: Set all reserved memblocks on Node#0 at initialization + CVE-2023-52508: be90c9e29dd59b7d19a73297a1590ff3ec1d22ea nvme-fc: Prevent null pointer dereference in nvme_fc_io_getuuid() + CVE-2023-52511: e15bb292b24630ee832bfc7fd616bd72c7682bbb spi: sun6i: reduce DMA RX transfer width to single byte + CVE-2023-52516: be8f49029eca3efbad0d74dbff3cb9129994ffab dma-debug: don't call __dma_entry_alloc_check_leak() under free_entries_lock + CVE-2023-52517: 36b29974a7ad2ff604c24ad348f940506c7b1209 spi: sun6i: fix race between DMA RX transfer completion and RX FIFO drain + CVE-2023-52560: 9a4fe81a8644b717d57d81ce5849e16583b13fe8 mm/damon/vaddr-test: fix memory leak in damon_do_test_apply_three_regions() + CVE-2023-52561: dc1ab6577475b0460ba4261cd9caec37bd62ca0b arm64: dts: qcom: sdm845-db845c: Mark cont splash memory region as reserved + CVE-2023-52562: a5569bb187521432f509b69dda7d29f78b2d38b0 mm/slab_common: fix slab_caches list corruption after kmem_cache_destroy() + CVE-2023-52563: ee335e0094add7fc2c7034e0534e1920d61d2078 drm/meson: fix memory leak on ->hpd_notify callback + CVE-2023-52565: 09635bf4cdd4adf2160198a6041bcc7ca46c0558 media: uvcvideo: Fix OOB read + CVE-2023-52566: 980663f1d189eedafd18d80053d9cf3e2ceb5c8c nilfs2: fix potential use after free in nilfs_gccache_submit_read_data() + CVE-2023-52568: 811ba2ef0cb6402672e64ba1419d6ef95aa3405d x86/sgx: Resolves SECS reclaim vs. page fault for EAUG race + CVE-2023-52569: 39c4a9522db0072570d602e9b365119e17fb9f4f btrfs: remove BUG() after failure to insert delayed dir index item + CVE-2023-52570: c01b2e0ee22ef8b4dd7509a93aecc0ac0826bae4 vfio/mdev: Fix a null-ptr-deref bug for mdev_unregister_parent() + CVE-2023-52571: fe6406238d5a24e9fb0286c71edd67b99d8db58d power: supply: rk817: Fix node refcount leak + CVE-2023-52572: 908b3b5e97d25e879de3d1f172a255665491c2c3 cifs: Fix UAF in cifs_demultiplex_thread() + CVE-2023-52573: 51fa66024a5eabf270164f2dc82a48ffb35a12e9 net: rds: Fix possible NULL-pointer dereference + CVE-2023-52574: 2f0acb0736ecc3eb85dc80ad2790d634dcb10b58 team: fix null-ptr-deref when team device type is changed + CVE-2023-52576: eef16bfdb212da60f5144689f2967fb25b051a2b x86/mm, kexec, ima: Use memblock_free_late() from ima_free_kexec_buffer() + CVE-2023-52578: 89f9f20b1cbd36d99d5a248a4bf8d11d4fd049a2 net: bridge: use DEV_STATS_INC() + CVE-2023-52580: 488ea2a3e2666022f79abfdd7d12e8305fc27a40 net/core: Fix ETH_P_1588 flow dissector + CVE-2023-52582: df9950d37df113db59495fa09d060754366a2b7c netfs: Only call folio_start_fscache() one time for each folio CVE-2023-5345: f555a508087ab8210b4658120ac6413d6fe2b4c7 fs/smb/client: Reset password pointer to NULL CVEs fixed in 6.1.57: CVE-2023-31085: 91aeb418b9175d09fc858f0fdf01988cbf990c5d ubi: Refuse attaching if mtd's erasesize is 0 CVE-2023-34324: a4cc925e2e12c3bbffb0860acdb9f9c1abde47dd xen/events: replace evtchn_rwlock with RCU CVE-2023-5158: 3a72decd6b49ff11a894aabd4d9b3025f046fe61 vringh: don't use vringh_kiov_advance() in vringh_iov_xfer() + CVE-2023-52479: 8226ffc759ea59f10067b9acdf7f94bae1c69930 ksmbd: fix uaf in smb20_oplock_break_ack + CVE-2023-52480: a2ca5fd3dbcc665e1169044fa0c9e3eba779202b ksmbd: fix race condition between session lookup and expire + CVE-2023-52481: 6e3ae2927b432a3b7c8374f14dbc1bd9ebe4372c arm64: errata: Add Cortex-A520 speculative unprivileged load workaround + CVE-2023-52513: 5cf38e638e5d01b68f9133968a85e8b3fd1ecf2f RDMA/siw: Fix connection failure handling + CVE-2023-52515: 2b298f9181582270d5e95774e5a6c7a7fb5b1206 RDMA/srp: Do not call scsi_done() from srp_abort() + CVE-2023-52518: 626535077ba9dc110787540d1fe24881094c15a1 Bluetooth: hci_codec: Fix leaking content of local_codecs + CVE-2023-52519: cdcc04e844a2d22d9d25cef1e8e504a174ea9f8f HID: intel-ish-hid: ipc: Disable and reenable ACPI GPE bit + CVE-2023-52522: f82aac8162871e87027692b36af335a2375d4580 net: fix possible store tearing in neigh_periodic_work() + CVE-2023-52523: b8f97e47b6fb84fcf2f5a22e725eefb6cf5070c2 bpf, sockmap: Reject sk_msg egress redirects to non-TCP sockets + CVE-2023-52526: 6a5a8f0a9740f865693d5aa97a42cc4504538e18 erofs: fix memory leak of LZMA global compressed deduplication + CVE-2023-52527: f6a7182179c0ed788e3755ee2ed18c888ddcc33f ipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data() + CVE-2023-52528: 9ffc5018020fe646795a8dc1203224b8f776dc09 net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg + CVE-2023-52529: f237b17611fa3501f43f12d1cb64323e10fdcb4f HID: sony: Fix a potential memory leak in sony_probe() + CVE-2023-52530: 2f4e16e39e4f5e78248dd9e51276a83203950b36 wifi: mac80211: fix potential key use-after-free + CVE-2023-52531: 6b3223449c959a8be94a1f042288059e40fcccb0 wifi: iwlwifi: mvm: Fix a memory corruption issue + CVE-2023-52559: c12ef025add77ca3a0902e8719d552b6d47b4282 iommu/vt-d: Avoid memory allocation in iommu_suspend() CVE-2024-0641: 143e72757a902abcecd5f487553f44dc19a56cfc tipc: fix a potential deadlock on &tx->lock CVEs fixed in 6.1.59: CVE-2023-35827: 6f6fa8061f756aedb93af12a8a5d3cf659127965 ravb: Fix use-after-free issue in ravb_tx_timeout_work() + CVE-2023-52475: 2efe67c581a2a6122b328d4bb6f21b3f36f40d46 Input: powermate - fix use-after-free in powermate_config_complete + CVE-2023-52476: 3863989497652488a50f00e96de4331e5efabc6c perf/x86/lbr: Filter vsyscall addresses + CVE-2023-52477: fb9895ab9533534335fa83d70344b397ac862c81 usb: hub: Guard against accesses to uninitialized BOS descriptors + CVE-2023-52478: fd72ac9556a473fc7daf54efb6ca8a97180d621d HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect + CVE-2023-52483: 1db0724a01b558feb1ecae551782add1951a114a mctp: perform route lookups under a RCU read-side lock + CVE-2023-52499: 8ac2689502f986a46f4221e239d4ff2897f1ccb3 powerpc/47x: Fix 47x syscall return crash + CVE-2023-52502: e4f2611f07c87b3ddb57c4b9e8efcd1e330fc3dc net: nfc: fix races in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn() + CVE-2023-52503: 60c3e7a00db954947c265b55099c21b216f2a05c tee: amdtee: fix use-after-free vulnerability in amdtee_close_session + CVE-2023-52504: 5b784489c8158518bf7a466bb3cc045b0fb66b4b x86/alternatives: Disable KASAN in apply_alternatives() + CVE-2023-52505: 6f901f8448c6b25ed843796b114471d2a3fc5dfb phy: lynx-28g: serialize concurrent phy_set_mode_ext() calls to shared registers + CVE-2023-52507: 853dda54ba59ea70d5580a298b7ede4707826848 nfc: nci: assert requested protocol is valid + CVE-2023-52509: 6f6fa8061f756aedb93af12a8a5d3cf659127965 ravb: Fix use-after-free issue in ravb_tx_timeout_work() + CVE-2023-52510: 217efe32a45249eb07dcd7197e8403de98345e66 ieee802154: ca8210: Fix a potential UAF in ca8210_probe + CVE-2023-52512: 6c18c386fd13dbb3ff31a1086dabb526780d9bda pinctrl: nuvoton: wpcm450: fix out of bounds write + CVE-2023-52520: af21c9119a37cecb7ff27ce0c2f3cf721e9d0ec4 platform/x86: think-lmi: Fix reference leak + CVE-2023-52532: b67d7b1bfc46d05c1a58b172516454698e8d5004 net: mana: Fix TX CQE error handling CVEs fixed in 6.1.60: CVE-2023-46343: d7dbdbe3800a908eecd4975c31be47dd45e2104a nfc: nci: fix possible NULL pointer dereference in send_acknowledge() @@ -372,6 +434,14 @@ CVEs fixed in 6.1.75: CVE-2023-52462: fc3e3c50a0a4cac1463967c110686189e4a59104 bpf: fix check for attempt to corrupt spilled pointer CVE-2023-52463: d4a9aa7db574a0da64307729cc031fb68597aa8b efivarfs: force RO when remounting if SetVariable is not supported CVE-2023-52464: 9dbac9fdae6e3b411fc4c3fca3bf48f70609c398 EDAC/thunderx: Fix possible out-of-bounds string access + CVE-2023-52467: 527e8c5f3d00299822612c495d5adf1f8f43c001 mfd: syscon: Fix null pointer dereference in of_syscon_register() + CVE-2023-52469: 35fa2394d26e919f63600ce631e6aefc95ec2706 drivers/amd/pm: fix a use-after-free in kv_parse_power_table + CVE-2023-52470: c4ff55408187f2595066967047363ca84e76db85 drm/radeon: check the alloc_workqueue return value in radeon_crtc_init() + CVE-2023-52609: 6696f76c32ff67fec26823fc2df46498e70d9bf3 binder: fix race between mmput() and do_exit() + CVE-2023-52610: 0b5b831122fc3789fff75be433ba3e4dd7b779d4 net/sched: act_ct: fix skb leak and crash on ooo frags + CVE-2023-52612: 4df0c942d04a67df174195ad8082f6e30e7f71a5 crypto: scomp - fix req->dst buffer overflow + CVE-2023-6356: 2871aa407007f6f531fae181ad252486e022df42 nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length + CVE-2023-6536: 83ccd15717ee2b6143df72df39685f0c832e3451 nvmet-tcp: fix a crash in nvmet_req_complete() CVE-2024-1085: a372f1d01bc11aa85773a02353cd01aaf16dc18e netfilter: nf_tables: check if catch-all set element is active in next generation CVE-2024-24860: 96860d9ad462db61f4eeb09934235c38eab655c4 Bluetooth: Fix atomicity violation in {min,max}_key_size_set CVE-2024-26588: 4631c2dd69d928bca396f9f58baeddf85e14ced5 LoongArch: BPF: Prevent out-of-bounds memory access @@ -382,18 +452,104 @@ CVEs fixed in 6.1.75: CVE-2024-26597: ee1dc3bf86f2df777038506b139371a9add02534 net: qualcomm: rmnet: fix global oob in rmnet_policy CVE-2024-26598: dba788e25f05209adf2b0175eb1691dc89fb1ba6 KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache CVE-2024-26599: 7b85554c7c2aee91171e038e4d5442ffa130b282 pwm: Fix out-of-bounds access in of_pwm_single_xlate() + CVE-2024-26631: 380540bb06bb1d1b12bdc947d1b8f56cda6b5663 ipv6: mcast: fix data-race in ipv6_mc_down / mld_ifc_work + CVE-2024-26632: c6350b5cb78e9024c49eaee6fdb914ad2903a5fe block: Fix iterating over an empty bio with bio_for_each_folio_all + CVE-2024-26633: 62a1fedeb14c7ac0947ef33fadbabd35ed2400a2 ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim() CVEs fixed in 6.1.76: + CVE-2023-52486: 62f2e79cf9f4f47cc9dea9cebdf58d9f7b5695e0 drm: Don't unref the same fb many times by mistake due to deadlock handling + CVE-2023-52488: 416b10d2817c94db86829fb92ad43ce7d002c573 serial: sc16is7xx: convert from _raw_ to _noinc_ regmap functions for FIFO + CVE-2023-52489: 68ed9e33324021e9d6b798e9db00ca3093d2012a mm/sparsemem: fix race in accessing memory_section->usage + CVE-2023-52491: 9fec4db7fff54d9b0306a332bab31eac47eeb5f6 media: mtk-jpeg: Fix use after free bug due to error path handling in mtk_jpeg_dec_device_run + CVE-2023-52492: 2ab32986a0b9e329eb7f8f04dd57cc127f797c08 dmaengine: fix NULL pointer in channel unregistration function + CVE-2023-52493: 3c5ec66b4b3f6816f3a6161538672e389e537690 bus: mhi: host: Drop chan lock before queuing buffers + CVE-2023-52494: 2df39ac8f813860f79782807c3f7acff40b3c551 bus: mhi: host: Add alignment check for event ring read pointer + CVE-2023-52497: 33bf23c9940dbd3a22aad7f0cda4c84ed5701847 erofs: fix lz4 inplace decompression + CVE-2023-52498: e1c9d32c98309ae764893a481552d3f99d46cb34 PM: sleep: Fix possible deadlocks in core system-wide PM code + CVE-2023-52608: 7f95f6997f4fdd17abec3200cae45420a5489350 firmware: arm_scmi: Check mailbox/SMT channel for consistency + CVE-2023-52614: 8a7729cda2dd276d7a3994638038fb89035b6f2c PM / devfreq: Fix buffer overflow in trans_stat_show + CVE-2023-52615: aa8aa16ed9adf1df05bb339d588cf485a011839e hwrng: core - Fix page fault dead lock on mmap-ed hwrng + CVE-2023-52627: 137568aa540a9f587c48ff7d4c51cdba08cfe9a4 iio: adc: ad7091r: Allow users to configure device events CVE-2024-1086: 8e34430e33b8a80bc014f3efe29cac76bc30a4b4 netfilter: nf_tables: reject QUEUE/DROP verdict parameters CVE-2024-23849: 71024928b3f71ce4529426f8692943205c58d30b net/rds: Fix UBSAN: array-index-out-of-bounds in rds_cmsg_recv + CVE-2024-26607: e0f83c234ea7a3dec1f84e5d02caa1c51664a076 drm/bridge: sii902x: Fix probing race issue + CVE-2024-26608: 2c939c74ef0b74e99b92e32edc2a59f9b9ca3d5a ksmbd: fix global oob in ksmbd_nl_policy + CVE-2024-26610: aa2cc9363926991ba74411e3aa0a0ea82c1ffe32 wifi: iwlwifi: fix a memory corruption + CVE-2024-26612: 82a9bc343ba019665d3ddc1d9a180bf0e0390cf3 netfs, fscache: Prevent Oops in fscache_put_cache() + CVE-2024-26614: b1e0a68a0cd2a83259c444f638b417a8fffc6855 tcp: make sure init the accept_queue's spinlocks once + CVE-2024-26615: 6994dba06321e3c48fdad0ba796a063d9d82183a net/smc: fix illegal rmb_desc access in SMC-D connection dump + CVE-2024-26620: d6b8d034b576f406af920a7bee81606c027b24c6 s390/vfio-ap: always filter entire AP matrix + CVE-2024-26635: 660c3053d992b68fee893a0e9ec9159228cffdc6 llc: Drop support for ETH_P_TR_802_2. + CVE-2024-26636: 6d53b813ff8b177f86f149c2f744442681f720e4 llc: make llc_ui_sendmsg() more robust against bonding changes + CVE-2024-26638: d9c54763e5cdbbd3f81868597fe8aca3c96e6387 nbd: always initialize struct msghdr completely + CVE-2024-26644: 6e6bca99e8d88d989a7cde4c064abea552d5219b btrfs: don't abort filesystem when attempting to snapshot deleted subvolume + CVE-2024-26645: f4f7e696db0274ff560482cc52eddbf0551d4b7a tracing: Ensure visibility when inserting an element into tracing_map + CVE-2024-26646: 28f010dc50df0f7987c04112114fcfa7e0803566 thermal: intel: hfi: Add syscore callbacks for system-wide PM + CVE-2024-26650: 2841631a03652f32b595c563695d0461072e0de4 platform/x86: p2sb: Allow p2sb_bar() calls during PCI device probe + CVE-2024-26668: bc6e242bb74e2ae616bfd2b250682b738e781c9b netfilter: nft_limit: reject configurations that cause integer overflow + CVE-2024-26808: af149a46890e8285d1618bd68b8d159bdb87fdb3 netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain + +CVEs fixed in 6.1.77: + CVE-2023-52583: 7f2649c94264d00df6b6ac27161e9f4372a3450e ceph: fix deadlock or deadcode of misusing dget() + CVE-2023-52584: 521f28eedd6b14228c46e3b81e3bf9b90c2818d8 spmi: mediatek: Fix UAF on device remove + CVE-2023-52587: 5108a2dc2db5630fb6cd58b8be80a0c134bc310a IB/ipoib: Fix mcast list locking + CVE-2023-52588: 7c972c89457511007dfc933814c06786905e515c f2fs: fix to tag gcing flag on page during block migration + CVE-2023-52589: bf808f58681cab64c81cd814551814fd34e540fe media: rkisp1: Fix IRQ disable race issue + CVE-2023-52593: 574dcd3126aa2eed75437137843f254b1190dd03 wifi: wfx: fix possible NULL pointer dereference in wfx_set_mfp_ap() + CVE-2023-52594: 25c6f49ef59b7a9b80a3f7ab9e95268a1b01a234 wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus() + CVE-2023-52595: 739b3ccd9486dff04af95f9a890846d088a84957 wifi: rt2x00: restart beacon queue when hardware reset + CVE-2023-52597: 0671f42a9c1084db10d68ac347d08dbf6689ecb3 KVM: s390: fix setting of fpc register + CVE-2023-52598: 7a4d6481fbdd661f9e40e95febb95e3dee82bad3 s390/ptrace: handle setting of fpc register correctly + CVE-2023-52599: 3537f92cd22c672db97fae6997481e678ad14641 jfs: fix array-index-out-of-bounds in diNewExt + CVE-2023-52600: 32e8f2d95528d45828c613417cb2827d866cbdce jfs: fix uaf in jfs_evict_inode + CVE-2023-52601: 70780914cb57e2ba711e0ac1b677aaaa75103603 jfs: fix array-index-out-of-bounds in dbAdjTree + CVE-2023-52602: cab0c265ba182fd266c2aa3c69d7e40640a7f612 jfs: fix slab-out-of-bounds Read in dtSearch + CVE-2023-52603: e4cbc857d75d4e22a1f75446e7480b1f305d8d60 UBSAN: array-index-out-of-bounds in dtSplitRoot + CVE-2023-52604: 42f433785f108893de0dd5260bafb85d7d51db03 FS:JFS:UBSAN:array-index-out-of-bounds in dbAdjTree + CVE-2023-52606: abd26515d4b767ba48241eea77b28ce0872aef3e powerpc/lib: Validate size for vector operations + CVE-2023-52607: d482d61025e303a2bef3733a011b6b740215cfa1 powerpc/mm: Fix null-pointer dereference in pgtable_cache_add + CVE-2023-52617: 1d83c85922647758c1f1e4806a4c5c3cf591a20a PCI: switchtec: Fix stdev_release() crash after surprise hot remove + CVE-2023-52618: af7bbdac89739e2e7380387fda598848d3b7010f block/rnbd-srv: Check for unlikely string overflow + CVE-2023-52619: 75b0f71b26b3ad833c5c0670109c0af6e021e86a pstore/ram: Fix crash when setting number of cpus to an odd number + CVE-2023-52621: d6d6fe4bb105595118f12abeed4a7bdd450853f3 bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers + CVE-2023-52622: 6d2cbf517dcabc093159cf138ad5712c9c7fa954 ext4: avoid online resizing failures due to oversized flex bg + CVE-2023-52623: e8ca3e73301e23e8c0ac0ce2e6bac4545cd776e0 SUNRPC: Fix a suspicious RCU usage warning + CVE-2023-52632: b602f098f716723fa5c6c96a486e0afba83b7b94 drm/amdkfd: Fix lock dependency warning with srcu + CVE-2023-52633: 4f7dad73df4cdb2b7042103d3922745d040ad025 um: time-travel: fix time corruption + CVE-2023-52635: 31569995fc65007b73a3fff605ec2b3401b435e9 PM / devfreq: Synchronize devfreq_monitor_[start/stop] + CVE-2024-26625: 9c333d9891f34cea8af1b229dc754552304c8eee llc: call sock_orphan() at release time + CVE-2024-26627: db6338f45971b4285ea368432a84033690eaf53c scsi: core: Move scsi_host_busy() out of host lock for waking up EH handler + CVE-2024-26640: b383d4ea272fe5795877506dcce5aad1f6330e5e tcp: add sanity checks to rx zerocopy + CVE-2024-26641: d54e4da98bbfa8c257bdca94c49652d81d18a4d8 ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv() + CVE-2024-26671: 1d9c777d3e70bdc57dddf7a14a80059d65919e56 blk-mq: fix IO hang from sbitmap wakeup race + CVE-2024-26673: 0f501dae16b7099e69ee9b0d5c70b8f40fd30e98 netfilter: nft_ct: sanitize layer 3 and 4 protocol number in custom expectations CVEs fixed in 6.1.78: + CVE-2023-52630: e5dc63f01e027721c29f82069f7e97e2149fa131 blk-iocost: Fix an UBSAN shift-out-of-bounds warning + CVE-2023-52631: ec1bedd797588fe38fc11cba26d77bb1d9b194c6 fs/ntfs3: Fix an NULL dereference bug CVE-2024-0340: 4675661672e3730597babf97c4e9593a775c8917 vhost: use kzalloc() instead of kmalloc() followed by memset() + CVE-2024-26600: 0430bfcd46657d9116a26cd377f112cbc40826a4 phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP + CVE-2024-26601: 78327acd4cdc4a1601af718b781eece577b6b7d4 ext4: regenerate buddy after block freeing failed if under fc replay + CVE-2024-26660: efdd665ce1a1634b8c1dad5e7f6baaef3e131d0a drm/amd/display: Implement bounds check for stream encoder creation in DCN301 + CVE-2024-26663: 3d3a5b31b43515b5752ff282702ca546ec3e48b6 tipc: Check the bearer type before calling tipc_udp_nl_bearer_add() + CVE-2024-26664: 9bce69419271eb8b2b3ab467387cb59c99d80deb hwmon: (coretemp) Fix out-of-bounds memory access + CVE-2024-26665: e37cde7a5716466ff2a76f7f27f0a29b05b9a732 tunnels: fix out of bounds access when building IPv6 PMTU error + CVE-2024-26667: fb8bfc6ea3cd8c5ac3d35711d064e2f6646aec17 drm/msm/dpu: check for valid hw_pp in dpu_encoder_helper_phys_cleanup + CVE-2024-26675: 4e2c4846b2507f6dfc9bea72b7567c2693a82a16 ppp_async: limit MRU to 64K + CVE-2024-26676: e0e09186d8821ad59806115d347ea32efa43ca4b af_unix: Call kfree_skb() for dead unix_(sk)->oob_skb in GC. + CVE-2024-26679: 54538752216bf89ee88d47ad07802063a498c299 inet: read sk->sk_family once in inet_recv_error() + CVE-2024-26680: 466ceebe48cbba3f4506f165fca7111f9eb8bb12 net: atlantic: Fix DMA mapping for PTP hwts ring + CVE-2024-26681: 0193e0660cc6689c794794b471492923cfd7bfbc netdevsim: avoid potential loop in nsim_dev_trap_report_work() + CVE-2024-26684: e42ff0844fe418c7d03a14f9f90e1b91ba119591 net: stmmac: xgmac: fix handling of DPP safety error for DMA channels CVEs fixed in 6.1.79: CVE-2023-52429: c5d83ac2bf6ca668a39ffb1a576899a66153ba19 dm: limit the number of targets and parameter size area CVE-2023-52434: 1ae3c59355dc9882e09c020afe8ffbd895ad0f29 smb: client: fix potential OOBs in smb2_parse_contexts() CVE-2023-52435: 989b0ff35fe5fc9652ee5bafbe8483db6f27b137 net: prevent mss overflow in skb_segment() + CVE-2023-52616: bb44477d4506e52785693a39f03cdc6a2c5e8598 crypto: lib/mpi - Fix unexpected pointer access in mpi_ec_init + CVE-2023-52637: 4dd684d4bb3cd5454e0bf6e2a1bdfbd5c9c872ed can: j1939: Fix UAF in j1939_sk_match_filter during setsockopt(SO_J1939_FILTER) + CVE-2023-52638: aedda066d717a0b4335d7e0a00b2e3a61e40afcf can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock + CVE-2024-0841: 2e2c07104b4904aed1389a59b25799b95a85b5b9 fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super CVE-2024-1151: 65ded4eb220695909eee657758e824fc30f0b561 net: openvswitch: limit the number of recursions from action sets CVE-2024-23850: 66b317a2fc45b2ef66527ee3f8fa08fb5beab88d btrfs: do not ASSERT() if the newly created subvolume already got read CVE-2024-23851: c5d83ac2bf6ca668a39ffb1a576899a66153ba19 dm: limit the number of targets and parameter size area @@ -401,6 +557,111 @@ CVEs fixed in 6.1.79: CVE-2024-26583: 7a3ca06d04d589deec81f56229a9a9d62352ce01 tls: fix race between async notify and socket close CVE-2024-26586: 6fd24675188d354b1cad47462969afa2ab09d819 mlxsw: spectrum_acl_tcam: Fix stack corruption CVE-2024-26593: 491528935c9c48bf341d8b40eabc6c4fc5df6f2c i2c: i801: Fix block process call transactions + CVE-2024-26602: 24ec7504a08a67247fbe798d1de995208a8c128a sched/membarrier: reduce the ability to hammer on sys_membarrier + CVE-2024-26603: 627339cccdc9166792ecf96bc3c9f711a60ce996 x86/fpu: Stop relying on userspace for info to fault in xsave buffer + CVE-2024-26606: 90e09c016d72b91e76de25f71c7b93d94cc3c769 binder: signal epoll threads of self-work + CVE-2024-26629: e4cf8941664cae2f89f0189c29fe2ce8c6be0d03 nfsd: fix RELEASE_LOCKOWNER + CVE-2024-26685: 6589f0f72f8edd1fa11adce4eedbd3615f2e78ab nilfs2: fix potential bug in end_buffer_async_write + CVE-2024-26688: 2e2c07104b4904aed1389a59b25799b95a85b5b9 fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super + CVE-2024-26689: f3f98d7d84b31828004545e29fd7262b9f444139 ceph: prevent use-after-free in encode_cap_msg() + CVE-2024-26695: 8731fe001a60581794ed9cf65da8cd304846a6fb crypto: ccp - Fix null pointer dereference in __sev_platform_shutdown_locked + CVE-2024-26696: 8494ba2c9ea00a54d5b50e69b22c55a8958bce32 nilfs2: fix hang in nilfs_lookup_dirty_data_buffers() + CVE-2024-26697: 9c9c68d64fd3284f7097ed6ae057c8441f39fcd3 nilfs2: fix data corruption in dsync block recovery for small block sizes + CVE-2024-26698: 48a8ccccffbae10c91d31fc872db5c31aba07518 hv_netvsc: Fix race condition between netvsc_probe and netvsc_remove + CVE-2024-26702: 176256ff8abff29335ecff905a09fb49e8dcf513 iio: magnetometer: rm3100: add boundary check for the value read from RM3100_REG_TMRC + CVE-2024-26704: 185eab30486ba3e7bf8b9c2e049c79a06ffd2bc1 ext4: fix double-free of blocks due to wrong extents moved_len + CVE-2024-26706: 23027309b099ffc4efca5477009a11dccbdae592 parisc: Fix random data corruption from exception handler + CVE-2024-26707: 56440799fc4621c279df16176f83a995d056023a net: hsr: remove WARN_ONCE() in send_hsr_supervision_frame() + CVE-2024-26712: 0c09912dd8387e228afcc5e34ac5d79b1e3a1058 powerpc/kasan: Fix addr error caused by page alignment + CVE-2024-26714: 6616d3c4f8284a7b3ef978c916566bd240cea1c7 interconnect: qcom: sc8180x: Mark CO0 BCM keepalive + CVE-2024-26715: 57e2e42ccd3cd6183228269715ed032f44536751 usb: dwc3: gadget: Fix NULL pointer dereference in dwc3_gadget_suspend + CVE-2024-26717: d7d7a0e3b6f5adc45f23667cbb919e99093a5b5c HID: i2c-hid-of: fix NULL-deref on failed power up + CVE-2024-26718: 30884a44e0cedc3dfda8c22432f3ba4078ec2d94 dm-crypt, dm-verity: disable tasklets + CVE-2024-26720: 16b1025eaa8fc223ab4273ece20d1c3a4211a95d mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again + CVE-2024-26723: b9357489c46c7a43999964628db8b47d3a1f8672 lan966x: Fix crash when adding interface under a lag + CVE-2024-26726: 02f2b95b00bf57d20320ee168b30fb7f3db8e555 btrfs: don't drop extent_map for free space inode on write error + CVE-2024-26727: 66b317a2fc45b2ef66527ee3f8fa08fb5beab88d btrfs: do not ASSERT() if the newly created subvolume already got read + +CVEs fixed in 6.1.80: + CVE-2023-52640: 6ed6cdbe88334ca3430c5aee7754dc4597498dfb fs/ntfs3: Fix oob in ntfs_listxattr + CVE-2023-52641: 50545eb6cd5f7ff852a01fa29b7372524ef948cc fs/ntfs3: Add NULL ptr dereference checking at the end of attr_allocate_frame() + CVE-2024-26590: 47467e04816cb297905c0f09bc2d11ef865942d9 erofs: fix inconsistent per-file compression format + CVE-2024-26733: f119f2325ba70cbfdec701000dcad4d88805d5b0 arp: Prevent overflow in arp_req_get(). + CVE-2024-26735: 8391b9b651cfdf80ab0f1dc4a489f9d67386e197 ipv6: sr: fix possible use-after-free and null-ptr-deref + CVE-2024-26736: e8530b170e464017203e3b8c6c49af6e916aece1 afs: Increase buffer size in afs_update_volume_status() + CVE-2024-26737: addf5e297e6cbf5341f9c07720693ca9ba0057b5 bpf: Fix racing between bpf_timer_cancel_and_free and bpf_timer_cancel + CVE-2024-26741: 729bc77af438a6e67914c97f6f3d3af8f72c0131 dccp/tcp: Unhash sk from ehash for tb2 alloc failure after check_estalblished(). + CVE-2024-26742: 3c31b18a8dd8b7bf36af1cd723d455853b8f94fe scsi: smartpqi: Fix disable_managed_interrupts + CVE-2024-26743: 7f31a244c753aacf40b71d01f03ca6742f81bbbc RDMA/qedr: Fix qedr_create_user_qp error flow + CVE-2024-26744: aee4dcfe17219fe60f2821923adea98549060af8 RDMA/srpt: Support specifying the srpt_service_guid parameter + CVE-2024-26747: 0158216805ca7e498d07de38840d2732166ae5fa usb: roles: fix NULL pointer issue when put module's reference + CVE-2024-26748: 9a52b694b066f299d8b9800854a8503457a8b64c usb: cdns3: fix memory double free when handle zero packet + CVE-2024-26749: 2134e9906e17b1e5284300fab547869ebacfd7d9 usb: cdns3: fixed memory use after free at cdns3_gadget_ep_disable() + CVE-2024-26751: 786f089086b505372fb3f4f008d57e7845fff0d8 ARM: ep93xx: Add terminator to gpiod_lookup_table + CVE-2024-26752: 13cd1daeea848614e585b2c6ecc11ca9c8ab2500 l2tp: pass correct message length to ip6_append_data + CVE-2024-26753: 62f361bfea60c6afc3df09c1ad4152e6507f6f47 crypto: virtio/akcipher - Fix stack overflow on memcpy + CVE-2024-26754: 3963f16cc7643b461271989b712329520374ad2a gtp: fix use-after-free and null-ptr-deref in gtp_genl_dump_pdp() + CVE-2024-26759: 2dedda77d4493f3e92e414b272bfa60f1f51ed95 mm/swap: fix race when skipping swapcache + CVE-2024-26760: f49b20fd0134da84a6bd8108f9e73c077b7d6231 scsi: target: pscsi: Fix bio_put() for error case + CVE-2024-26761: 031217128990d7f0ab8c46db1afb3cf1e075fd29 cxl/pci: Fix disabling memory if DVSEC CXL Range does not match a CFMWS window + CVE-2024-26763: e08c2a8d27e989f0f5b0888792643027d7e691e6 dm-crypt: don't modify the data when using authenticated encryption + CVE-2024-26764: 18f614369def2a11a52f569fe0f910b199d13487 fs/aio: Restrict kiocb_set_cancel_fn() to I/O submitted via libaio + CVE-2024-26765: a262b78dd085dbe9b3c75dc1d9c4cd102b110b53 LoongArch: Disable IRQ before init_fn() for nonboot CPUs + CVE-2024-26766: 52dc9a7a573dbf778625a0efca0fca55489f084b IB/hfi1: Fix sdma.h tx->num_descs off-by-one error + CVE-2024-26769: 9e6987f8937a7bd7516aa52f25cb7e12c0c92ee8 nvmet-fc: avoid deadlock on delete association path + CVE-2024-26771: 9d508c897153ae8dd79303f7f035f078139f6b49 dmaengine: ti: edma: Add some null pointer checks to the edma_probe + CVE-2024-26772: d639102f4cbd4cb65d1225dba3b9265596aab586 ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal() + CVE-2024-26773: f97e75fa4e12b0aa0224e83fcbda8853ac2adf36 ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found() + CVE-2024-26774: 8b40eb2e716b503f7a4e1090815a17b1341b2150 ext4: avoid dividing by 0 in mb_update_avg_fragment_size() when block bitmap corrupt + CVE-2024-26775: 2d623c94fbba3554f4446ba6f3c764994e8b0d26 aoe: avoid potential deadlock at set_capacity + CVE-2024-26776: f19361d570c67e7e014896fa2dacd7d721bf0aa8 spi: hisi-sfc-v3xx: Return IRQ_NONE if no interrupts were detected + CVE-2024-26777: f329523f6a65c3bbce913ad35473d83a319d5d99 fbdev: sis: Error out if pixclock equals zero + CVE-2024-26778: 070398d32c5f3ab0e890374904ad94551c76aec4 fbdev: savage: Error out if pixclock equals zero + CVE-2024-26779: eb39bb548bf974acad7bd6780fe11f9e6652d696 wifi: mac80211: fix race condition on enabling fast-xmit + +CVEs fixed in 6.1.81: + CVE-2023-2176: 88067197e97af3fcb104dd86030f788ec1b32fdb RDMA/core: Refactor rdma_bind_addr + CVE-2023-52620: b7be6c737a179a76901c872f6b4c1d00552d9a1b netfilter: nf_tables: disallow timeout for anonymous sets + CVE-2024-26622: 3bfe04c1273d30b866f4c7c238331ed3b08e5824 tomoyo: fix UAF write bug in tomoyo_write_control() + CVE-2024-26687: 585a344af6bcac222608a158fc2830ff02712af5 xen/events: close evtchn after mapping cleanup + CVE-2024-26745: 7eb95e0af5c9c2e6fad50356eaf32d216d0e7bc3 powerpc/pseries/iommu: IOMMU table is not initialized for kdump over SR-IOV + CVE-2024-26782: d93fd40c62397326046902a2c5cb75af50882a85 mptcp: fix double-free on socket dismantle + CVE-2024-26787: 70af82bb9c897faa25a44e4181f36c60312b71ef mmc: mmci: stm32: fix DMA API overlapping mappings warning + CVE-2024-26788: 474d521da890b3e3585335fb80a6044cb2553d99 dmaengine: fsl-qdma: init irq after reg initialization + CVE-2024-26789: 034e2d70b5c7f578200ad09955aeb2aa65d1164a crypto: arm64/neonbs - fix out-of-bounds access on short input + CVE-2024-26790: 237ecf1afe6c22534fa43abdf2bf0b0f52de0aaa dmaengine: fsl-qdma: fix SoC may hang on 16 byte unaligned read + CVE-2024-26791: f590040ce2b712177306b03c2a63b16f7d48d3c8 btrfs: dev-replace: properly validate device names + CVE-2024-26793: abd32d7f5c0294c1b2454c5a3b13b18446bac627 gtp: fix use-after-free and null-ptr-deref in gtp_newlink() + CVE-2024-26795: 8310080799b40fd9f2a8b808c657269678c149af riscv: Sparse-Memory/vmemmap out-of-bounds fix + CVE-2024-26798: 2f91a96b892fab2f2543b4a55740c5bee36b1a6b fbcon: always restore the old font data in fbcon_do_set_font() + CVE-2024-26801: 45085686b9559bfbe3a4f41d3d695a520668f5e1 Bluetooth: Avoid potential use-after-free in hci_error_reset + CVE-2024-26802: 17ccd9798fe0beda3db212cfa3ebe373f605cbd6 stmmac: Clear variable when destroying workqueue + CVE-2024-26803: 7985d73961bbb4e726c1be7b9cd26becc7be8325 net: veth: clear GRO when clearing XDP even when down + CVE-2024-26804: ab63de24ebea36fe73ac7121738595d704b66d96 net: ip_tunnel: prevent perpetual headroom growth + CVE-2024-26805: 0b27bf4c494d61e5663baa34c3edd7ccebf0ea44 netlink: Fix kernel-infoleak-after-free in __skb_datagram_iter + +CVEs fixed in 6.1.82: + CVE-2023-28746: 8b5760939db9c49c03b9e19f6c485a8812f48d83 x86/mmio: Disable KVM mitigation when X86_FEATURE_CLEAR_CPU_BUF is set + CVE-2023-52639: 5df3b81a567eb565029563f26f374ae3803a1dfc KVM: s390: vsie: fix race during shadow creation + CVE-2024-26659: 2e3ec80ea7ba58bbb210e83b5a0afefee7c171d3 xhci: handle isoc Babble and Buffer Overrun events properly + CVE-2024-26686: cf4b8c39b9a0bd81c47afc7ef62914a62dd5ec4d fs/proc: do_task_stat: use sig->stats_lock to gather the threads/children stats + CVE-2024-26700: 01d992088dce3945f70f49f34b0b911c5213c238 drm/amd/display: Fix MST Null Ptr for RV + +CVEs fixed in 6.1.83: + CVE-2023-6270: 74ca3ef68d2f449bc848c0a814cefc487bf755fa aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts + CVE-2023-7042: 90f089d77e38db1c48629f111f3c8c336be1bc38 wifi: ath10k: fix NULL pointer dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev() + CVE-2024-22099: 567c0411dc3b424fc7bd1e6109726d7ba32d4f73 Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security + CVE-2024-26651: 9c402819620a842cbfe39359a3ddfaac9adc8384 sr9800: Add check for usbnet_get_endpoints + CVE-2024-26809: 5ad233dc731ab64cdc47b84a5c1f78fff6c024af netfilter: nft_set_pipapo: release elements in clone only from destroy path + +CVEs fixed in 6.1.84: + CVE-2023-47233: 0b812f706fd7090be74812101114a0e165b36744 wifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach + CVE-2024-23307: 9477cfeb300823461b44223a7d5fac26a31df4fe md/raid5: fix atomicity violation in raid5_cache_count + CVE-2024-24861: 09c1be4d581d3356159abcc5a8a7a6c5f1bf1e77 media: xc4000: Fix atomicity violation in xc4000_get_frequency + CVE-2024-26584: cd1bbca03f3c1d845ce274c0d0a66de8e5929f72 net: tls: handle backlogging of crypto requests + CVE-2024-26585: 196f198ca6fce04ba6ce262f5a0e4d567d7d219d tls: fix race between tx work scheduling and socket close + CVE-2024-26642: 72c1efe3f247a581667b7d368fff3bd9a03cd57a netfilter: nf_tables: disallow anonymous set with timeout flag + CVE-2024-26654: 9d66ae0e7bb78b54e1e0525456c6b54e1d132046 ALSA: sh: aica: reorder cleanup operations to avoid UAF bugs Outstanding CVEs: CVE-2005-3660: (unk) @@ -483,7 +744,6 @@ Outstanding CVEs: CVE-2023-20941: (unk) CVE-2023-21264: (unk) KVM: arm64: Prevent unconditional donation of unmapped regions from the host CVE-2023-21400: (unk) - CVE-2023-2176: (unk) RDMA/core: Refactor rdma_bind_addr CVE-2023-23005: (unk) mm/demotion: fix NULL vs IS_ERR checking in memory_tier_init CVE-2023-23039: (unk) CVE-2023-26242: (unk) @@ -501,37 +761,63 @@ Outstanding CVEs: CVE-2023-4133: (unk) cxgb4: fix use after free bugs caused by circular dependency problem CVE-2023-4134: (unk) Input: cyttsp4_core - change del_timer_sync() to timer_shutdown_sync() CVE-2023-4622: (unk) unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES - CVE-2023-47233: (unk) CVE-2023-52452: (unk) bpf: Fix accesses to uninit stack slots + CVE-2023-52485: (unk) drm/amd/display: Wake DMCUB before sending a command + CVE-2023-52585: (unk) drm/amdgpu: Fix possible NULL dereference in amdgpu_ras_query_error_status_helper() + CVE-2023-52586: (unk) drm/msm/dpu: Add mutex lock in control vblank irq + CVE-2023-52590: (unk) ocfs2: Avoid touching renamed directory if parent does not change + CVE-2023-52591: (unk) reiserfs: Avoid touching renamed directory if parent does not change + CVE-2023-52596: (unk) sysctl: Fix out of bounds access for empty sysctl registers + CVE-2023-52624: (unk) drm/amd/display: Wake DMCUB before executing GPINT commands + CVE-2023-52625: (unk) drm/amd/display: Refactor DMCUB enter/exit idle interface + CVE-2023-52629: (unk) sh: push-switch: Reorder cleanup operations to avoid use-after-free bug + CVE-2023-52634: (unk) drm/amd/display: Fix disable_otg_wa logic CVE-2023-6039: (unk) net: usb: lan78xx: reorder cleanup operations to avoid UAF bugs CVE-2023-6240: (unk) - CVE-2023-6270: (unk) - CVE-2023-6356: (unk) CVE-2023-6535: (unk) - CVE-2023-6536: (unk) CVE-2023-6560: (unk) io_uring: don't allow discontig pages for IORING_SETUP_NO_MMAP - CVE-2023-7042: (unk) CVE-2024-0564: (unk) - CVE-2024-0841: (unk) CVE-2024-1312: (unk) mm: lock_vma_under_rcu() must check vma->anon_vma under vma lock CVE-2024-21803: (unk) - CVE-2024-22099: (unk) + CVE-2024-2193: (unk) CVE-2024-22386: (unk) - CVE-2024-23196: (unk) - CVE-2024-23307: (unk) CVE-2024-23848: (unk) CVE-2024-24855: (unk) scsi: lpfc: Fix a possible data race in lpfc_unregister_fcf_rescan() CVE-2024-24857: (unk) CVE-2024-24858: (unk) CVE-2024-24859: (unk) - CVE-2024-24861: (unk) CVE-2024-24864: (unk) CVE-2024-25739: (unk) CVE-2024-25740: (unk) CVE-2024-25741: (unk) - CVE-2024-26584: (unk) net: tls: handle backlogging of crypto requests - CVE-2024-26585: (unk) tls: fix race between tx work scheduling and socket close - CVE-2024-26587: (unk) net: netdevsim: don't try to destroy PHC on VFs - CVE-2024-26590: (unk) erofs: fix inconsistent per-file compression format CVE-2024-26595: (unk) mlxsw: spectrum_acl_tcam: Fix NULL pointer dereference in error path CVE-2024-26596: (unk) net: dsa: fix netdev_priv() dereference before check on non-DSA netdevice events + CVE-2024-26623: (unk) pds_core: Prevent race issues involving the adminq + CVE-2024-26647: (unk) drm/amd/display: Fix late derefrence 'dsc' check in 'link_set_dsc_pps_packet()' + CVE-2024-26648: (unk) drm/amd/display: Fix variable deferencing before NULL check in edp_setup_replay() + CVE-2024-26655: (unk) Fix memory leak in posix_clock_open() + CVE-2024-26656: (unk) drm/amdgpu: fix use-after-free bug + CVE-2024-26658: (unk) bcachefs: grab s_umount only if snapshotting + CVE-2024-26661: (unk) drm/amd/display: Add NULL test for 'timing generator' in 'dcn21_set_pipe()' + CVE-2024-26662: (unk) drm/amd/display: Fix 'panel_cntl' could be null in 'dcn21_set_backlight_level()' + CVE-2024-26669: (unk) net/sched: flower: Fix chain template offload + CVE-2024-26672: (unk) drm/amdgpu: Fix variable 'mca_funcs' dereferenced before NULL check in 'amdgpu_mca_smu_get_mca_entry()' + CVE-2024-26677: (unk) rxrpc: Fix delayed ACKs to not set the reference serial number + CVE-2024-26691: (unk) KVM: arm64: Fix circular locking dependency + CVE-2024-26699: (unk) drm/amd/display: Fix array-index-out-of-bounds in dcn35_clkmgr + CVE-2024-26713: (unk) powerpc/pseries/iommu: Fix iommu initialisation during DLPAR add + CVE-2024-26719: (unk) nouveau: offload fence uevents work to workqueue + CVE-2024-26738: (unk) powerpc/pseries/iommu: DLPAR add doesn't completely initialize pci_controller + CVE-2024-26739: (unk) net/sched: act_mirred: don't override retval if we already lost the skb + CVE-2024-26740: (unk) net/sched: act_mirred: use the backlog for mirred ingress + CVE-2024-26756: (unk) md: Don't register sync_thread for reshape directly + CVE-2024-26757: (unk) md: Don't ignore read-only array in md_check_recovery() + CVE-2024-26758: (unk) md: Don't ignore suspended array in md_check_recovery() + CVE-2024-26767: (unk) drm/amd/display: fixed integer types and null check locations + CVE-2024-26768: (unk) LoongArch: Change acpi_core_pic[NR_CPUS] to acpi_core_pic[MAX_CORE_PIC] + CVE-2024-26770: (unk) HID: nvidia-shield: Add missing null pointer checks to LED initialization + CVE-2024-26783: (unk) mm/vmscan: fix a bug calling wakeup_kswapd() with a wrong zone index + CVE-2024-26784: (unk) pmdomain: arm: Fix NULL dereference on scmi_perf_domain removal + CVE-2024-26797: (unk) drm/amd/display: Prevent potential buffer overflow in map_hw_resources + CVE-2024-26799: (unk) ASoC: qcom: Fix uninitialized pointer dmactl + CVE-2024-26806: (unk) spi: cadence-qspi: remove system-wide suspend helper calls from runtime PM hooks diff --git a/data/6.2/6.2_CVEs.txt b/data/6.2/6.2_CVEs.txt index 5110c8d9c..8f26a52da 100644 --- a/data/6.2/6.2_CVEs.txt +++ b/data/6.2/6.2_CVEs.txt @@ -80,6 +80,7 @@ CVE-2022-45886: Fix not seen in stream CVE-2022-45887: Fix not seen in stream CVE-2022-45919: Fix not seen in stream CVE-2022-48425: Fix not seen in stream +CVE-2022-48628: Fix not seen in stream CVE-2023-0160: Fixed with 6.2.15 CVE-2023-0459: Fixed with 6.2.1 CVE-2023-1032: Fixed with 6.2.3 @@ -128,6 +129,7 @@ CVE-2023-26242: Fix unknown CVE-2023-2640: Fix unknown CVE-2023-26545: Fixed with 6.2 CVE-2023-28466: Fixed with 6.2.7 +CVE-2023-28746: Fix not seen in stream CVE-2023-28866: Fixed with 6.2.9 CVE-2023-2898: Fix not seen in stream CVE-2023-2985: Fixed with 6.2.3 @@ -237,7 +239,7 @@ CVE-2023-46343: Fix not seen in stream CVE-2023-46813: Fix not seen in stream CVE-2023-46838: Fix not seen in stream CVE-2023-46862: Fix not seen in stream -CVE-2023-47233: Fix unknown +CVE-2023-47233: Fix not seen in stream CVE-2023-4881: Fix not seen in stream CVE-2023-4921: Fix not seen in stream CVE-2023-50431: Fix not seen in stream @@ -278,6 +280,131 @@ CVE-2023-52458: Fix not seen in stream CVE-2023-52462: Fix not seen in stream CVE-2023-52463: Fix not seen in stream CVE-2023-52464: Fix not seen in stream +CVE-2023-52467: Fix not seen in stream +CVE-2023-52469: Fix not seen in stream +CVE-2023-52470: Fix not seen in stream +CVE-2023-52474: Fixed with 6.2.15 +CVE-2023-52475: Fix not seen in stream +CVE-2023-52476: Fix not seen in stream +CVE-2023-52477: Fix not seen in stream +CVE-2023-52478: Fix not seen in stream +CVE-2023-52479: Fix not seen in stream +CVE-2023-52480: Fix not seen in stream +CVE-2023-52481: Fix not seen in stream +CVE-2023-52482: Fix not seen in stream +CVE-2023-52483: Fix not seen in stream +CVE-2023-52484: Fix not seen in stream +CVE-2023-52485: Fix not seen in stream +CVE-2023-52486: Fix not seen in stream +CVE-2023-52488: Fix not seen in stream +CVE-2023-52489: Fix not seen in stream +CVE-2023-52491: Fix not seen in stream +CVE-2023-52492: Fix not seen in stream +CVE-2023-52493: Fix not seen in stream +CVE-2023-52494: Fix not seen in stream +CVE-2023-52497: Fix not seen in stream +CVE-2023-52498: Fix not seen in stream +CVE-2023-52499: Fix not seen in stream +CVE-2023-52500: Fix not seen in stream +CVE-2023-52501: Fix not seen in stream +CVE-2023-52502: Fix not seen in stream +CVE-2023-52503: Fix not seen in stream +CVE-2023-52504: Fix not seen in stream +CVE-2023-52505: Fix not seen in stream +CVE-2023-52506: Fix not seen in stream +CVE-2023-52507: Fix not seen in stream +CVE-2023-52508: Fix not seen in stream +CVE-2023-52509: Fix not seen in stream +CVE-2023-52510: Fix not seen in stream +CVE-2023-52511: Fix not seen in stream +CVE-2023-52512: Fix not seen in stream +CVE-2023-52513: Fix not seen in stream +CVE-2023-52515: Fix not seen in stream +CVE-2023-52516: Fix not seen in stream +CVE-2023-52517: Fix not seen in stream +CVE-2023-52518: Fix not seen in stream +CVE-2023-52519: Fix not seen in stream +CVE-2023-52520: Fix not seen in stream +CVE-2023-52522: Fix not seen in stream +CVE-2023-52523: Fix not seen in stream +CVE-2023-52526: Fix not seen in stream +CVE-2023-52527: Fix not seen in stream +CVE-2023-52528: Fix not seen in stream +CVE-2023-52529: Fix not seen in stream +CVE-2023-52530: Fix not seen in stream +CVE-2023-52531: Fix not seen in stream +CVE-2023-52532: Fix not seen in stream +CVE-2023-52559: Fix not seen in stream +CVE-2023-52560: Fix not seen in stream +CVE-2023-52561: Fix not seen in stream +CVE-2023-52562: Fix not seen in stream +CVE-2023-52563: Fix not seen in stream +CVE-2023-52565: Fix not seen in stream +CVE-2023-52566: Fix not seen in stream +CVE-2023-52568: Fix not seen in stream +CVE-2023-52569: Fix not seen in stream +CVE-2023-52570: Fix not seen in stream +CVE-2023-52571: Fix not seen in stream +CVE-2023-52572: Fix not seen in stream +CVE-2023-52573: Fix not seen in stream +CVE-2023-52574: Fix not seen in stream +CVE-2023-52576: Fix not seen in stream +CVE-2023-52578: Fix not seen in stream +CVE-2023-52580: Fix not seen in stream +CVE-2023-52582: Fix not seen in stream +CVE-2023-52583: Fix not seen in stream +CVE-2023-52584: Fix not seen in stream +CVE-2023-52585: Fix not seen in stream +CVE-2023-52586: Fix not seen in stream +CVE-2023-52587: Fix not seen in stream +CVE-2023-52588: Fix not seen in stream +CVE-2023-52589: Fix not seen in stream +CVE-2023-52590: Fix not seen in stream +CVE-2023-52591: Fix not seen in stream +CVE-2023-52593: Fix not seen in stream +CVE-2023-52594: Fix not seen in stream +CVE-2023-52595: Fix not seen in stream +CVE-2023-52596: Fix not seen in stream +CVE-2023-52597: Fix not seen in stream +CVE-2023-52598: Fix not seen in stream +CVE-2023-52599: Fix not seen in stream +CVE-2023-52600: Fix not seen in stream +CVE-2023-52601: Fix not seen in stream +CVE-2023-52602: Fix not seen in stream +CVE-2023-52603: Fix not seen in stream +CVE-2023-52604: Fix not seen in stream +CVE-2023-52606: Fix not seen in stream +CVE-2023-52607: Fix not seen in stream +CVE-2023-52608: Fix not seen in stream +CVE-2023-52609: Fix not seen in stream +CVE-2023-52610: Fix not seen in stream +CVE-2023-52612: Fix not seen in stream +CVE-2023-52614: Fix not seen in stream +CVE-2023-52615: Fix not seen in stream +CVE-2023-52616: Fix not seen in stream +CVE-2023-52617: Fix not seen in stream +CVE-2023-52618: Fix not seen in stream +CVE-2023-52619: Fix not seen in stream +CVE-2023-52620: Fix not seen in stream +CVE-2023-52621: Fix not seen in stream +CVE-2023-52622: Fix not seen in stream +CVE-2023-52623: Fix not seen in stream +CVE-2023-52624: Fix not seen in stream +CVE-2023-52625: Fix not seen in stream +CVE-2023-52627: Fix not seen in stream +CVE-2023-52628: Fix not seen in stream +CVE-2023-52629: Fix not seen in stream +CVE-2023-52630: Fix not seen in stream +CVE-2023-52631: Fix not seen in stream +CVE-2023-52632: Fix not seen in stream +CVE-2023-52633: Fix not seen in stream +CVE-2023-52634: Fix not seen in stream +CVE-2023-52635: Fix not seen in stream +CVE-2023-52637: Fix not seen in stream +CVE-2023-52638: Fix not seen in stream +CVE-2023-52639: Fix not seen in stream +CVE-2023-52640: Fix not seen in stream +CVE-2023-52641: Fix not seen in stream CVE-2023-5345: Fix not seen in stream CVE-2023-5633: Fix not seen in stream CVE-2023-5717: Fix not seen in stream @@ -287,11 +414,11 @@ CVE-2023-6121: Fix not seen in stream CVE-2023-6176: Fix not seen in stream CVE-2023-6238: Fix unknown CVE-2023-6240: Fix unknown -CVE-2023-6270: Fix unknown -CVE-2023-6356: Fix unknown +CVE-2023-6270: Fix not seen in stream +CVE-2023-6356: Fix not seen in stream CVE-2023-6531: Fix not seen in stream CVE-2023-6535: Fix unknown -CVE-2023-6536: Fix unknown +CVE-2023-6536: Fix not seen in stream CVE-2023-6546: Fix not seen in stream CVE-2023-6560: Fix not seen in stream CVE-2023-6606: Fix not seen in stream @@ -301,7 +428,7 @@ CVE-2023-6817: Fix not seen in stream CVE-2023-6915: Fix not seen in stream CVE-2023-6931: Fix not seen in stream CVE-2023-6932: Fix not seen in stream -CVE-2023-7042: Fix unknown +CVE-2023-7042: Fix not seen in stream CVE-2023-7192: Fixed with 6.2.5 CVE-2024-0340: Fix not seen in stream CVE-2024-0443: Fix not seen in stream @@ -313,17 +440,18 @@ CVE-2024-0639: Fix not seen in stream CVE-2024-0641: Fix not seen in stream CVE-2024-0646: Fix not seen in stream CVE-2024-0775: Fixed with 6.2.16 -CVE-2024-0841: Fix unknown +CVE-2024-0841: Fix not seen in stream CVE-2024-1085: Fix not seen in stream CVE-2024-1086: Fix not seen in stream CVE-2024-1151: Fix not seen in stream CVE-2024-1312: Fix not seen in stream CVE-2024-21803: Fix unknown -CVE-2024-22099: Fix unknown +CVE-2024-2193: Fix unknown +CVE-2024-22099: Fix not seen in stream CVE-2024-22386: Fix unknown CVE-2024-22705: Fix not seen in stream -CVE-2024-23196: Fix unknown -CVE-2024-23307: Fix unknown +CVE-2024-23196: Fix not seen in stream +CVE-2024-23307: Fix not seen in stream CVE-2024-23848: Fix unknown CVE-2024-23849: Fix not seen in stream CVE-2024-23850: Fix not seen in stream @@ -333,7 +461,7 @@ CVE-2024-24857: Fix unknown CVE-2024-24858: Fix unknown CVE-2024-24859: Fix unknown CVE-2024-24860: Fix not seen in stream -CVE-2024-24861: Fix unknown +CVE-2024-24861: Fix not seen in stream CVE-2024-24864: Fix unknown CVE-2024-25739: Fix unknown CVE-2024-25740: Fix unknown @@ -344,7 +472,6 @@ CVE-2024-26583: Fix not seen in stream CVE-2024-26584: Fix not seen in stream CVE-2024-26585: Fix not seen in stream CVE-2024-26586: Fix not seen in stream -CVE-2024-26587: Fix not seen in stream CVE-2024-26588: Fix not seen in stream CVE-2024-26589: Fix not seen in stream CVE-2024-26590: Fix not seen in stream @@ -357,3 +484,152 @@ CVE-2024-26596: Fix not seen in stream CVE-2024-26597: Fix not seen in stream CVE-2024-26598: Fix not seen in stream CVE-2024-26599: Fix not seen in stream +CVE-2024-26600: Fix not seen in stream +CVE-2024-26601: Fix not seen in stream +CVE-2024-26602: Fix not seen in stream +CVE-2024-26603: Fix not seen in stream +CVE-2024-26606: Fix not seen in stream +CVE-2024-26607: Fix not seen in stream +CVE-2024-26608: Fix not seen in stream +CVE-2024-26610: Fix not seen in stream +CVE-2024-26612: Fix not seen in stream +CVE-2024-26614: Fix not seen in stream +CVE-2024-26615: Fix not seen in stream +CVE-2024-26620: Fix not seen in stream +CVE-2024-26622: Fix not seen in stream +CVE-2024-26623: Fix not seen in stream +CVE-2024-26625: Fix not seen in stream +CVE-2024-26627: Fix not seen in stream +CVE-2024-26629: Fix not seen in stream +CVE-2024-26631: Fix not seen in stream +CVE-2024-26632: Fix not seen in stream +CVE-2024-26633: Fix not seen in stream +CVE-2024-26635: Fix not seen in stream +CVE-2024-26636: Fix not seen in stream +CVE-2024-26638: Fix not seen in stream +CVE-2024-26640: Fix not seen in stream +CVE-2024-26641: Fix not seen in stream +CVE-2024-26642: Fix not seen in stream +CVE-2024-26644: Fix not seen in stream +CVE-2024-26645: Fix not seen in stream +CVE-2024-26646: Fix not seen in stream +CVE-2024-26647: Fix not seen in stream +CVE-2024-26648: Fix not seen in stream +CVE-2024-26650: Fix not seen in stream +CVE-2024-26651: Fix not seen in stream +CVE-2024-26654: Fix not seen in stream +CVE-2024-26655: Fix not seen in stream +CVE-2024-26656: Fix not seen in stream +CVE-2024-26658: Fix not seen in stream +CVE-2024-26659: Fix not seen in stream +CVE-2024-26660: Fix not seen in stream +CVE-2024-26661: Fix not seen in stream +CVE-2024-26662: Fix not seen in stream +CVE-2024-26663: Fix not seen in stream +CVE-2024-26664: Fix not seen in stream +CVE-2024-26665: Fix not seen in stream +CVE-2024-26667: Fix not seen in stream +CVE-2024-26668: Fix not seen in stream +CVE-2024-26669: Fix not seen in stream +CVE-2024-26671: Fix not seen in stream +CVE-2024-26672: Fix not seen in stream +CVE-2024-26673: Fix not seen in stream +CVE-2024-26675: Fix not seen in stream +CVE-2024-26676: Fix not seen in stream +CVE-2024-26677: Fix not seen in stream +CVE-2024-26679: Fix not seen in stream +CVE-2024-26680: Fix not seen in stream +CVE-2024-26681: Fix not seen in stream +CVE-2024-26684: Fix not seen in stream +CVE-2024-26685: Fix not seen in stream +CVE-2024-26686: Fix not seen in stream +CVE-2024-26687: Fix not seen in stream +CVE-2024-26688: Fix not seen in stream +CVE-2024-26689: Fix not seen in stream +CVE-2024-26691: Fix not seen in stream +CVE-2024-26695: Fix not seen in stream +CVE-2024-26696: Fix not seen in stream +CVE-2024-26697: Fix not seen in stream +CVE-2024-26698: Fix not seen in stream +CVE-2024-26699: Fix not seen in stream +CVE-2024-26700: Fix not seen in stream +CVE-2024-26702: Fix not seen in stream +CVE-2024-26704: Fix not seen in stream +CVE-2024-26706: Fix not seen in stream +CVE-2024-26707: Fix not seen in stream +CVE-2024-26708: Fix not seen in stream +CVE-2024-26711: Fix not seen in stream +CVE-2024-26712: Fix not seen in stream +CVE-2024-26713: Fix not seen in stream +CVE-2024-26714: Fix not seen in stream +CVE-2024-26715: Fix not seen in stream +CVE-2024-26717: Fix not seen in stream +CVE-2024-26718: Fix not seen in stream +CVE-2024-26719: Fix not seen in stream +CVE-2024-26720: Fix not seen in stream +CVE-2024-26723: Fix not seen in stream +CVE-2024-26726: Fix not seen in stream +CVE-2024-26727: Fix not seen in stream +CVE-2024-26733: Fix not seen in stream +CVE-2024-26735: Fix not seen in stream +CVE-2024-26736: Fix not seen in stream +CVE-2024-26737: Fix not seen in stream +CVE-2024-26738: Fix not seen in stream +CVE-2024-26739: Fix not seen in stream +CVE-2024-26740: Fix not seen in stream +CVE-2024-26741: Fix not seen in stream +CVE-2024-26742: Fix not seen in stream +CVE-2024-26743: Fix not seen in stream +CVE-2024-26744: Fix not seen in stream +CVE-2024-26745: Fix not seen in stream +CVE-2024-26747: Fix not seen in stream +CVE-2024-26748: Fix not seen in stream +CVE-2024-26749: Fix not seen in stream +CVE-2024-26751: Fix not seen in stream +CVE-2024-26752: Fix not seen in stream +CVE-2024-26753: Fix not seen in stream +CVE-2024-26754: Fix not seen in stream +CVE-2024-26756: Fix not seen in stream +CVE-2024-26757: Fix not seen in stream +CVE-2024-26758: Fix not seen in stream +CVE-2024-26759: Fix not seen in stream +CVE-2024-26760: Fix not seen in stream +CVE-2024-26761: Fix not seen in stream +CVE-2024-26763: Fix not seen in stream +CVE-2024-26764: Fix not seen in stream +CVE-2024-26765: Fix not seen in stream +CVE-2024-26766: Fixed with 6.2.3 +CVE-2024-26767: Fix not seen in stream +CVE-2024-26768: Fix not seen in stream +CVE-2024-26769: Fix not seen in stream +CVE-2024-26770: Fix not seen in stream +CVE-2024-26771: Fix not seen in stream +CVE-2024-26772: Fix not seen in stream +CVE-2024-26773: Fix not seen in stream +CVE-2024-26774: Fix not seen in stream +CVE-2024-26775: Fix not seen in stream +CVE-2024-26776: Fix not seen in stream +CVE-2024-26777: Fix not seen in stream +CVE-2024-26778: Fix not seen in stream +CVE-2024-26779: Fix not seen in stream +CVE-2024-26782: Fix not seen in stream +CVE-2024-26783: Fix not seen in stream +CVE-2024-26784: Fix not seen in stream +CVE-2024-26787: Fix not seen in stream +CVE-2024-26788: Fix not seen in stream +CVE-2024-26789: Fix not seen in stream +CVE-2024-26790: Fix not seen in stream +CVE-2024-26791: Fix not seen in stream +CVE-2024-26793: Fix not seen in stream +CVE-2024-26795: Fix not seen in stream +CVE-2024-26797: Fix not seen in stream +CVE-2024-26798: Fix not seen in stream +CVE-2024-26799: Fix not seen in stream +CVE-2024-26801: Fix not seen in stream +CVE-2024-26802: Fix not seen in stream +CVE-2024-26803: Fix not seen in stream +CVE-2024-26804: Fix not seen in stream +CVE-2024-26805: Fix not seen in stream +CVE-2024-26806: Fix not seen in stream +CVE-2024-26808: Fix not seen in stream +CVE-2024-26809: Fix not seen in stream diff --git a/data/6.2/6.2_security.txt b/data/6.2/6.2_security.txt index 3b37189f1..d6665b2e6 100644 --- a/data/6.2/6.2_security.txt +++ b/data/6.2/6.2_security.txt @@ -23,6 +23,7 @@ CVEs fixed in 6.2.3: CVE-2023-3355: abadeef9a82f86e6668759259adbcf8be6f44a9b drm/msm/gem: Add check for kmalloc CVE-2023-39191: 720d2504791a93becde81c335abcea2f42d066a7 bpf: Fix state pruning for STACK_DYNPTR stack slots CVE-2023-45863: e6ca1549afb2b495e61a8fb53ae942193ef823e0 kobject: Fix slab-out-of-bounds in fill_kobj_path() + CVE-2024-26766: 0ef9594936d1f078e8599a1cf683b052df2bec00 IB/hfi1: Fix sdma.h tx->num_descs off-by-one error CVEs fixed in 6.2.5: CVE-2023-1829: 372ae77cf11d11fb118cbe2d37def9dd5f826abd net/sched: Retire tcindex classifier @@ -82,6 +83,7 @@ CVEs fixed in 6.2.15: CVE-2023-35826: a858e35c62966761cc2bed2e4123cf68d7df546c media: cedrus: fix use after free bug in cedrus_remove due to race condition CVE-2023-35828: 1029639643c326396ce8e07a9f52ce7165c021c3 usb: gadget: udc: renesas_usb3: Fix use after free bug in renesas_usb3_remove due to race condition CVE-2023-35829: 26f55569eeb045db9fceda0a5523521c2e76d8aa media: rkvdec: fix use after free bug in rkvdec_remove + CVE-2023-52474: c76cb8f4bdf26d04cfa5485a93ce297dba5e6a80 IB/hfi1: Fix bugs with non-PAGE_SIZE-end multi-iovec user SDMA requests CVEs fixed in 6.2.16: CVE-2023-32247: 750a2d772e9d9ff377fd32e3b6797bf2cd847a7a ksmbd: destroy expired sessions @@ -173,6 +175,7 @@ Outstanding CVEs: CVE-2022-45887: (unk) media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb() CVE-2022-45919: (unk) media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221 CVE-2022-48425: (unk) fs/ntfs3: Validate MFT flags before replaying logs + CVE-2022-48628: (unk) ceph: drop messages from MDS when unmounting CVE-2023-1192: (unk) fs/ntfs3: Validate MFT flags before replaying logs CVE-2023-1193: (unk) ksmbd: delete asynchronous work from list CVE-2023-1194: (unk) ksmbd: fix out-of-bound read in parse_lease_state() @@ -191,6 +194,7 @@ Outstanding CVEs: CVE-2023-25775: (unk) RDMA/irdma: Prevent zero-length STAG registration CVE-2023-26242: (unk) CVE-2023-2640: (unk) + CVE-2023-28746: (unk) x86/mmio: Disable KVM mitigation when X86_FEATURE_CLEAR_CPU_BUF is set CVE-2023-2898: (unk) f2fs: fix to avoid NULL pointer dereference f2fs_write_end_io() CVE-2023-3090: (unk) ipvlan:Fix out-of-bounds caused by unclear skb->cb CVE-2023-31081: (unk) @@ -267,7 +271,7 @@ Outstanding CVEs: CVE-2023-46813: (unk) x86/sev: Check for user-space IOIO pointing to kernel space CVE-2023-46838: (unk) xen-netback: don't produce zero-size SKB frags CVE-2023-46862: (unk) io_uring/fdinfo: lock SQ thread while retrieving thread cpu/pid - CVE-2023-47233: (unk) + CVE-2023-47233: (unk) wifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach CVE-2023-4881: (unk) netfilter: nftables: exthdr: fix 4-byte stack OOB write CVE-2023-4921: (unk) net: sched: sch_qfq: Fix UAF in qfq_dequeue() CVE-2023-50431: (unk) accel/habanalabs: fix information leak in sec_attest_info() @@ -308,6 +312,130 @@ Outstanding CVEs: CVE-2023-52462: (unk) bpf: fix check for attempt to corrupt spilled pointer CVE-2023-52463: (unk) efivarfs: force RO when remounting if SetVariable is not supported CVE-2023-52464: (unk) EDAC/thunderx: Fix possible out-of-bounds string access + CVE-2023-52467: (unk) mfd: syscon: Fix null pointer dereference in of_syscon_register() + CVE-2023-52469: (unk) drivers/amd/pm: fix a use-after-free in kv_parse_power_table + CVE-2023-52470: (unk) drm/radeon: check the alloc_workqueue return value in radeon_crtc_init() + CVE-2023-52475: (unk) Input: powermate - fix use-after-free in powermate_config_complete + CVE-2023-52476: (unk) perf/x86/lbr: Filter vsyscall addresses + CVE-2023-52477: (unk) usb: hub: Guard against accesses to uninitialized BOS descriptors + CVE-2023-52478: (unk) HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect + CVE-2023-52479: (unk) ksmbd: fix uaf in smb20_oplock_break_ack + CVE-2023-52480: (unk) ksmbd: fix race condition between session lookup and expire + CVE-2023-52481: (unk) arm64: errata: Add Cortex-A520 speculative unprivileged load workaround + CVE-2023-52482: (unk) x86/srso: Add SRSO mitigation for Hygon processors + CVE-2023-52483: (unk) mctp: perform route lookups under a RCU read-side lock + CVE-2023-52484: (unk) iommu/arm-smmu-v3: Fix soft lockup triggered by arm_smmu_mm_invalidate_range + CVE-2023-52485: (unk) drm/amd/display: Wake DMCUB before sending a command + CVE-2023-52486: (unk) drm: Don't unref the same fb many times by mistake due to deadlock handling + CVE-2023-52488: (unk) serial: sc16is7xx: convert from _raw_ to _noinc_ regmap functions for FIFO + CVE-2023-52489: (unk) mm/sparsemem: fix race in accessing memory_section->usage + CVE-2023-52491: (unk) media: mtk-jpeg: Fix use after free bug due to error path handling in mtk_jpeg_dec_device_run + CVE-2023-52492: (unk) dmaengine: fix NULL pointer in channel unregistration function + CVE-2023-52493: (unk) bus: mhi: host: Drop chan lock before queuing buffers + CVE-2023-52494: (unk) bus: mhi: host: Add alignment check for event ring read pointer + CVE-2023-52497: (unk) erofs: fix lz4 inplace decompression + CVE-2023-52498: (unk) PM: sleep: Fix possible deadlocks in core system-wide PM code + CVE-2023-52499: (unk) powerpc/47x: Fix 47x syscall return crash + CVE-2023-52500: (unk) scsi: pm80xx: Avoid leaking tags when processing OPC_INB_SET_CONTROLLER_CONFIG command + CVE-2023-52501: (unk) ring-buffer: Do not attempt to read past "commit" + CVE-2023-52502: (unk) net: nfc: fix races in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn() + CVE-2023-52503: (unk) tee: amdtee: fix use-after-free vulnerability in amdtee_close_session + CVE-2023-52504: (unk) x86/alternatives: Disable KASAN in apply_alternatives() + CVE-2023-52505: (unk) phy: lynx-28g: serialize concurrent phy_set_mode_ext() calls to shared registers + CVE-2023-52506: (unk) LoongArch: Set all reserved memblocks on Node#0 at initialization + CVE-2023-52507: (unk) nfc: nci: assert requested protocol is valid + CVE-2023-52508: (unk) nvme-fc: Prevent null pointer dereference in nvme_fc_io_getuuid() + CVE-2023-52509: (unk) ravb: Fix use-after-free issue in ravb_tx_timeout_work() + CVE-2023-52510: (unk) ieee802154: ca8210: Fix a potential UAF in ca8210_probe + CVE-2023-52511: (unk) spi: sun6i: reduce DMA RX transfer width to single byte + CVE-2023-52512: (unk) pinctrl: nuvoton: wpcm450: fix out of bounds write + CVE-2023-52513: (unk) RDMA/siw: Fix connection failure handling + CVE-2023-52515: (unk) RDMA/srp: Do not call scsi_done() from srp_abort() + CVE-2023-52516: (unk) dma-debug: don't call __dma_entry_alloc_check_leak() under free_entries_lock + CVE-2023-52517: (unk) spi: sun6i: fix race between DMA RX transfer completion and RX FIFO drain + CVE-2023-52518: (unk) Bluetooth: hci_codec: Fix leaking content of local_codecs + CVE-2023-52519: (unk) HID: intel-ish-hid: ipc: Disable and reenable ACPI GPE bit + CVE-2023-52520: (unk) platform/x86: think-lmi: Fix reference leak + CVE-2023-52522: (unk) net: fix possible store tearing in neigh_periodic_work() + CVE-2023-52523: (unk) bpf, sockmap: Reject sk_msg egress redirects to non-TCP sockets + CVE-2023-52526: (unk) erofs: fix memory leak of LZMA global compressed deduplication + CVE-2023-52527: (unk) ipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data() + CVE-2023-52528: (unk) net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg + CVE-2023-52529: (unk) HID: sony: Fix a potential memory leak in sony_probe() + CVE-2023-52530: (unk) wifi: mac80211: fix potential key use-after-free + CVE-2023-52531: (unk) wifi: iwlwifi: mvm: Fix a memory corruption issue + CVE-2023-52532: (unk) net: mana: Fix TX CQE error handling + CVE-2023-52559: (unk) iommu/vt-d: Avoid memory allocation in iommu_suspend() + CVE-2023-52560: (unk) mm/damon/vaddr-test: fix memory leak in damon_do_test_apply_three_regions() + CVE-2023-52561: (unk) arm64: dts: qcom: sdm845-db845c: Mark cont splash memory region as reserved + CVE-2023-52562: (unk) mm/slab_common: fix slab_caches list corruption after kmem_cache_destroy() + CVE-2023-52563: (unk) drm/meson: fix memory leak on ->hpd_notify callback + CVE-2023-52565: (unk) media: uvcvideo: Fix OOB read + CVE-2023-52566: (unk) nilfs2: fix potential use after free in nilfs_gccache_submit_read_data() + CVE-2023-52568: (unk) x86/sgx: Resolves SECS reclaim vs. page fault for EAUG race + CVE-2023-52569: (unk) btrfs: remove BUG() after failure to insert delayed dir index item + CVE-2023-52570: (unk) vfio/mdev: Fix a null-ptr-deref bug for mdev_unregister_parent() + CVE-2023-52571: (unk) power: supply: rk817: Fix node refcount leak + CVE-2023-52572: (unk) cifs: Fix UAF in cifs_demultiplex_thread() + CVE-2023-52573: (unk) net: rds: Fix possible NULL-pointer dereference + CVE-2023-52574: (unk) team: fix null-ptr-deref when team device type is changed + CVE-2023-52576: (unk) x86/mm, kexec, ima: Use memblock_free_late() from ima_free_kexec_buffer() + CVE-2023-52578: (unk) net: bridge: use DEV_STATS_INC() + CVE-2023-52580: (unk) net/core: Fix ETH_P_1588 flow dissector + CVE-2023-52582: (unk) netfs: Only call folio_start_fscache() one time for each folio + CVE-2023-52583: (unk) ceph: fix deadlock or deadcode of misusing dget() + CVE-2023-52584: (unk) spmi: mediatek: Fix UAF on device remove + CVE-2023-52585: (unk) drm/amdgpu: Fix possible NULL dereference in amdgpu_ras_query_error_status_helper() + CVE-2023-52586: (unk) drm/msm/dpu: Add mutex lock in control vblank irq + CVE-2023-52587: (unk) IB/ipoib: Fix mcast list locking + CVE-2023-52588: (unk) f2fs: fix to tag gcing flag on page during block migration + CVE-2023-52589: (unk) media: rkisp1: Fix IRQ disable race issue + CVE-2023-52590: (unk) ocfs2: Avoid touching renamed directory if parent does not change + CVE-2023-52591: (unk) reiserfs: Avoid touching renamed directory if parent does not change + CVE-2023-52593: (unk) wifi: wfx: fix possible NULL pointer dereference in wfx_set_mfp_ap() + CVE-2023-52594: (unk) wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus() + CVE-2023-52595: (unk) wifi: rt2x00: restart beacon queue when hardware reset + CVE-2023-52596: (unk) sysctl: Fix out of bounds access for empty sysctl registers + CVE-2023-52597: (unk) KVM: s390: fix setting of fpc register + CVE-2023-52598: (unk) s390/ptrace: handle setting of fpc register correctly + CVE-2023-52599: (unk) jfs: fix array-index-out-of-bounds in diNewExt + CVE-2023-52600: (unk) jfs: fix uaf in jfs_evict_inode + CVE-2023-52601: (unk) jfs: fix array-index-out-of-bounds in dbAdjTree + CVE-2023-52602: (unk) jfs: fix slab-out-of-bounds Read in dtSearch + CVE-2023-52603: (unk) UBSAN: array-index-out-of-bounds in dtSplitRoot + CVE-2023-52604: (unk) FS:JFS:UBSAN:array-index-out-of-bounds in dbAdjTree + CVE-2023-52606: (unk) powerpc/lib: Validate size for vector operations + CVE-2023-52607: (unk) powerpc/mm: Fix null-pointer dereference in pgtable_cache_add + CVE-2023-52608: (unk) firmware: arm_scmi: Check mailbox/SMT channel for consistency + CVE-2023-52609: (unk) binder: fix race between mmput() and do_exit() + CVE-2023-52610: (unk) net/sched: act_ct: fix skb leak and crash on ooo frags + CVE-2023-52612: (unk) crypto: scomp - fix req->dst buffer overflow + CVE-2023-52614: (unk) PM / devfreq: Fix buffer overflow in trans_stat_show + CVE-2023-52615: (unk) hwrng: core - Fix page fault dead lock on mmap-ed hwrng + CVE-2023-52616: (unk) crypto: lib/mpi - Fix unexpected pointer access in mpi_ec_init + CVE-2023-52617: (unk) PCI: switchtec: Fix stdev_release() crash after surprise hot remove + CVE-2023-52618: (unk) block/rnbd-srv: Check for unlikely string overflow + CVE-2023-52619: (unk) pstore/ram: Fix crash when setting number of cpus to an odd number + CVE-2023-52620: (unk) netfilter: nf_tables: disallow timeout for anonymous sets + CVE-2023-52621: (unk) bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers + CVE-2023-52622: (unk) ext4: avoid online resizing failures due to oversized flex bg + CVE-2023-52623: (unk) SUNRPC: Fix a suspicious RCU usage warning + CVE-2023-52624: (unk) drm/amd/display: Wake DMCUB before executing GPINT commands + CVE-2023-52625: (unk) drm/amd/display: Refactor DMCUB enter/exit idle interface + CVE-2023-52627: (unk) iio: adc: ad7091r: Allow users to configure device events + CVE-2023-52628: (unk) netfilter: nftables: exthdr: fix 4-byte stack OOB write + CVE-2023-52629: (unk) sh: push-switch: Reorder cleanup operations to avoid use-after-free bug + CVE-2023-52630: (unk) blk-iocost: Fix an UBSAN shift-out-of-bounds warning + CVE-2023-52631: (unk) fs/ntfs3: Fix an NULL dereference bug + CVE-2023-52632: (unk) drm/amdkfd: Fix lock dependency warning with srcu + CVE-2023-52633: (unk) um: time-travel: fix time corruption + CVE-2023-52634: (unk) drm/amd/display: Fix disable_otg_wa logic + CVE-2023-52635: (unk) PM / devfreq: Synchronize devfreq_monitor_[start/stop] + CVE-2023-52637: (unk) can: j1939: Fix UAF in j1939_sk_match_filter during setsockopt(SO_J1939_FILTER) + CVE-2023-52638: (unk) can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock + CVE-2023-52639: (unk) KVM: s390: vsie: fix race during shadow creation + CVE-2023-52640: (unk) fs/ntfs3: Fix oob in ntfs_listxattr + CVE-2023-52641: (unk) fs/ntfs3: Add NULL ptr dereference checking at the end of attr_allocate_frame() CVE-2023-5345: (unk) fs/smb/client: Reset password pointer to NULL CVE-2023-5633: (unk) drm/vmwgfx: Keep a gem reference to user bos in surfaces CVE-2023-5717: (unk) perf: Disallow mis-matched inherited group reads @@ -317,11 +445,11 @@ Outstanding CVEs: CVE-2023-6176: (unk) net/tls: do not free tls_rec on async operation in bpf_exec_tx_verdict() CVE-2023-6238: (unk) CVE-2023-6240: (unk) - CVE-2023-6270: (unk) - CVE-2023-6356: (unk) + CVE-2023-6270: (unk) aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts + CVE-2023-6356: (unk) nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length CVE-2023-6531: (unk) io_uring/af_unix: disable sending io_uring over sockets CVE-2023-6535: (unk) - CVE-2023-6536: (unk) + CVE-2023-6536: (unk) nvmet-tcp: fix a crash in nvmet_req_complete() CVE-2023-6546: (unk) tty: n_gsm: fix the UAF caused by race condition in gsm_cleanup_mux CVE-2023-6560: (unk) io_uring: don't allow discontig pages for IORING_SETUP_NO_MMAP CVE-2023-6606: (unk) smb: client: fix OOB in smbCalcSize() @@ -331,7 +459,7 @@ Outstanding CVEs: CVE-2023-6915: (unk) ida: Fix crash in ida_free when the bitmap is empty CVE-2023-6931: (unk) perf: Fix perf_event_validate_size() CVE-2023-6932: (unk) ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet - CVE-2023-7042: (unk) + CVE-2023-7042: (unk) wifi: ath10k: fix NULL pointer dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev() CVE-2024-0340: (unk) vhost: use kzalloc() instead of kmalloc() followed by memset() CVE-2024-0443: (unk) blk-cgroup: Flush stats before releasing blkcg_gq CVE-2024-0564: (unk) @@ -341,17 +469,18 @@ Outstanding CVEs: CVE-2024-0639: (unk) sctp: fix potential deadlock on &net->sctp.addr_wq_lock CVE-2024-0641: (unk) tipc: fix a potential deadlock on &tx->lock CVE-2024-0646: (unk) net: tls, update curr on splice as well - CVE-2024-0841: (unk) + CVE-2024-0841: (unk) fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super CVE-2024-1085: (unk) netfilter: nf_tables: check if catch-all set element is active in next generation CVE-2024-1086: (unk) netfilter: nf_tables: reject QUEUE/DROP verdict parameters CVE-2024-1151: (unk) net: openvswitch: limit the number of recursions from action sets CVE-2024-1312: (unk) mm: lock_vma_under_rcu() must check vma->anon_vma under vma lock CVE-2024-21803: (unk) - CVE-2024-22099: (unk) + CVE-2024-2193: (unk) + CVE-2024-22099: (unk) Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security CVE-2024-22386: (unk) CVE-2024-22705: (unk) ksmbd: fix slab-out-of-bounds in smb_strndup_from_utf16() - CVE-2024-23196: (unk) - CVE-2024-23307: (unk) + CVE-2024-23196: (unk) ALSA: hda: fix a possible null-pointer dereference due to data race in snd_hdac_regmap_sync() + CVE-2024-23307: (unk) md/raid5: fix atomicity violation in raid5_cache_count CVE-2024-23848: (unk) CVE-2024-23849: (unk) net/rds: Fix UBSAN: array-index-out-of-bounds in rds_cmsg_recv CVE-2024-23850: (unk) btrfs: do not ASSERT() if the newly created subvolume already got read @@ -361,7 +490,7 @@ Outstanding CVEs: CVE-2024-24858: (unk) CVE-2024-24859: (unk) CVE-2024-24860: (unk) Bluetooth: Fix atomicity violation in {min,max}_key_size_set - CVE-2024-24861: (unk) + CVE-2024-24861: (unk) media: xc4000: Fix atomicity violation in xc4000_get_frequency CVE-2024-24864: (unk) CVE-2024-25739: (unk) CVE-2024-25740: (unk) @@ -372,7 +501,6 @@ Outstanding CVEs: CVE-2024-26584: (unk) net: tls: handle backlogging of crypto requests CVE-2024-26585: (unk) tls: fix race between tx work scheduling and socket close CVE-2024-26586: (unk) mlxsw: spectrum_acl_tcam: Fix stack corruption - CVE-2024-26587: (unk) net: netdevsim: don't try to destroy PHC on VFs CVE-2024-26588: (unk) LoongArch: BPF: Prevent out-of-bounds memory access CVE-2024-26589: (unk) bpf: Reject variable offset alu on PTR_TO_FLOW_KEYS CVE-2024-26590: (unk) erofs: fix inconsistent per-file compression format @@ -385,3 +513,151 @@ Outstanding CVEs: CVE-2024-26597: (unk) net: qualcomm: rmnet: fix global oob in rmnet_policy CVE-2024-26598: (unk) KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache CVE-2024-26599: (unk) pwm: Fix out-of-bounds access in of_pwm_single_xlate() + CVE-2024-26600: (unk) phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP + CVE-2024-26601: (unk) ext4: regenerate buddy after block freeing failed if under fc replay + CVE-2024-26602: (unk) sched/membarrier: reduce the ability to hammer on sys_membarrier + CVE-2024-26603: (unk) x86/fpu: Stop relying on userspace for info to fault in xsave buffer + CVE-2024-26606: (unk) binder: signal epoll threads of self-work + CVE-2024-26607: (unk) drm/bridge: sii902x: Fix probing race issue + CVE-2024-26608: (unk) ksmbd: fix global oob in ksmbd_nl_policy + CVE-2024-26610: (unk) wifi: iwlwifi: fix a memory corruption + CVE-2024-26612: (unk) netfs, fscache: Prevent Oops in fscache_put_cache() + CVE-2024-26614: (unk) tcp: make sure init the accept_queue's spinlocks once + CVE-2024-26615: (unk) net/smc: fix illegal rmb_desc access in SMC-D connection dump + CVE-2024-26620: (unk) s390/vfio-ap: always filter entire AP matrix + CVE-2024-26622: (unk) tomoyo: fix UAF write bug in tomoyo_write_control() + CVE-2024-26623: (unk) pds_core: Prevent race issues involving the adminq + CVE-2024-26625: (unk) llc: call sock_orphan() at release time + CVE-2024-26627: (unk) scsi: core: Move scsi_host_busy() out of host lock for waking up EH handler + CVE-2024-26629: (unk) nfsd: fix RELEASE_LOCKOWNER + CVE-2024-26631: (unk) ipv6: mcast: fix data-race in ipv6_mc_down / mld_ifc_work + CVE-2024-26632: (unk) block: Fix iterating over an empty bio with bio_for_each_folio_all + CVE-2024-26633: (unk) ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim() + CVE-2024-26635: (unk) llc: Drop support for ETH_P_TR_802_2. + CVE-2024-26636: (unk) llc: make llc_ui_sendmsg() more robust against bonding changes + CVE-2024-26638: (unk) nbd: always initialize struct msghdr completely + CVE-2024-26640: (unk) tcp: add sanity checks to rx zerocopy + CVE-2024-26641: (unk) ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv() + CVE-2024-26642: (unk) netfilter: nf_tables: disallow anonymous set with timeout flag + CVE-2024-26644: (unk) btrfs: don't abort filesystem when attempting to snapshot deleted subvolume + CVE-2024-26645: (unk) tracing: Ensure visibility when inserting an element into tracing_map + CVE-2024-26646: (unk) thermal: intel: hfi: Add syscore callbacks for system-wide PM + CVE-2024-26647: (unk) drm/amd/display: Fix late derefrence 'dsc' check in 'link_set_dsc_pps_packet()' + CVE-2024-26648: (unk) drm/amd/display: Fix variable deferencing before NULL check in edp_setup_replay() + CVE-2024-26650: (unk) platform/x86: p2sb: Allow p2sb_bar() calls during PCI device probe + CVE-2024-26651: (unk) sr9800: Add check for usbnet_get_endpoints + CVE-2024-26654: (unk) ALSA: sh: aica: reorder cleanup operations to avoid UAF bugs + CVE-2024-26655: (unk) Fix memory leak in posix_clock_open() + CVE-2024-26656: (unk) drm/amdgpu: fix use-after-free bug + CVE-2024-26658: (unk) bcachefs: grab s_umount only if snapshotting + CVE-2024-26659: (unk) xhci: handle isoc Babble and Buffer Overrun events properly + CVE-2024-26660: (unk) drm/amd/display: Implement bounds check for stream encoder creation in DCN301 + CVE-2024-26661: (unk) drm/amd/display: Add NULL test for 'timing generator' in 'dcn21_set_pipe()' + CVE-2024-26662: (unk) drm/amd/display: Fix 'panel_cntl' could be null in 'dcn21_set_backlight_level()' + CVE-2024-26663: (unk) tipc: Check the bearer type before calling tipc_udp_nl_bearer_add() + CVE-2024-26664: (unk) hwmon: (coretemp) Fix out-of-bounds memory access + CVE-2024-26665: (unk) tunnels: fix out of bounds access when building IPv6 PMTU error + CVE-2024-26667: (unk) drm/msm/dpu: check for valid hw_pp in dpu_encoder_helper_phys_cleanup + CVE-2024-26668: (unk) netfilter: nft_limit: reject configurations that cause integer overflow + CVE-2024-26669: (unk) net/sched: flower: Fix chain template offload + CVE-2024-26671: (unk) blk-mq: fix IO hang from sbitmap wakeup race + CVE-2024-26672: (unk) drm/amdgpu: Fix variable 'mca_funcs' dereferenced before NULL check in 'amdgpu_mca_smu_get_mca_entry()' + CVE-2024-26673: (unk) netfilter: nft_ct: sanitize layer 3 and 4 protocol number in custom expectations + CVE-2024-26675: (unk) ppp_async: limit MRU to 64K + CVE-2024-26676: (unk) af_unix: Call kfree_skb() for dead unix_(sk)->oob_skb in GC. + CVE-2024-26677: (unk) rxrpc: Fix delayed ACKs to not set the reference serial number + CVE-2024-26679: (unk) inet: read sk->sk_family once in inet_recv_error() + CVE-2024-26680: (unk) net: atlantic: Fix DMA mapping for PTP hwts ring + CVE-2024-26681: (unk) netdevsim: avoid potential loop in nsim_dev_trap_report_work() + CVE-2024-26684: (unk) net: stmmac: xgmac: fix handling of DPP safety error for DMA channels + CVE-2024-26685: (unk) nilfs2: fix potential bug in end_buffer_async_write + CVE-2024-26686: (unk) fs/proc: do_task_stat: use sig->stats_lock to gather the threads/children stats + CVE-2024-26687: (unk) xen/events: close evtchn after mapping cleanup + CVE-2024-26688: (unk) fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super + CVE-2024-26689: (unk) ceph: prevent use-after-free in encode_cap_msg() + CVE-2024-26691: (unk) KVM: arm64: Fix circular locking dependency + CVE-2024-26695: (unk) crypto: ccp - Fix null pointer dereference in __sev_platform_shutdown_locked + CVE-2024-26696: (unk) nilfs2: fix hang in nilfs_lookup_dirty_data_buffers() + CVE-2024-26697: (unk) nilfs2: fix data corruption in dsync block recovery for small block sizes + CVE-2024-26698: (unk) hv_netvsc: Fix race condition between netvsc_probe and netvsc_remove + CVE-2024-26699: (unk) drm/amd/display: Fix array-index-out-of-bounds in dcn35_clkmgr + CVE-2024-26700: (unk) drm/amd/display: Fix MST Null Ptr for RV + CVE-2024-26702: (unk) iio: magnetometer: rm3100: add boundary check for the value read from RM3100_REG_TMRC + CVE-2024-26704: (unk) ext4: fix double-free of blocks due to wrong extents moved_len + CVE-2024-26706: (unk) parisc: Fix random data corruption from exception handler + CVE-2024-26707: (unk) net: hsr: remove WARN_ONCE() in send_hsr_supervision_frame() + CVE-2024-26708: (unk) mptcp: really cope with fastopen race + CVE-2024-26711: (unk) iio: adc: ad4130: zero-initialize clock init data + CVE-2024-26712: (unk) powerpc/kasan: Fix addr error caused by page alignment + CVE-2024-26713: (unk) powerpc/pseries/iommu: Fix iommu initialisation during DLPAR add + CVE-2024-26714: (unk) interconnect: qcom: sc8180x: Mark CO0 BCM keepalive + CVE-2024-26715: (unk) usb: dwc3: gadget: Fix NULL pointer dereference in dwc3_gadget_suspend + CVE-2024-26717: (unk) HID: i2c-hid-of: fix NULL-deref on failed power up + CVE-2024-26718: (unk) dm-crypt, dm-verity: disable tasklets + CVE-2024-26719: (unk) nouveau: offload fence uevents work to workqueue + CVE-2024-26720: (unk) mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again + CVE-2024-26723: (unk) lan966x: Fix crash when adding interface under a lag + CVE-2024-26726: (unk) btrfs: don't drop extent_map for free space inode on write error + CVE-2024-26727: (unk) btrfs: do not ASSERT() if the newly created subvolume already got read + CVE-2024-26733: (unk) arp: Prevent overflow in arp_req_get(). + CVE-2024-26735: (unk) ipv6: sr: fix possible use-after-free and null-ptr-deref + CVE-2024-26736: (unk) afs: Increase buffer size in afs_update_volume_status() + CVE-2024-26737: (unk) bpf: Fix racing between bpf_timer_cancel_and_free and bpf_timer_cancel + CVE-2024-26738: (unk) powerpc/pseries/iommu: DLPAR add doesn't completely initialize pci_controller + CVE-2024-26739: (unk) net/sched: act_mirred: don't override retval if we already lost the skb + CVE-2024-26740: (unk) net/sched: act_mirred: use the backlog for mirred ingress + CVE-2024-26741: (unk) dccp/tcp: Unhash sk from ehash for tb2 alloc failure after check_estalblished(). + CVE-2024-26742: (unk) scsi: smartpqi: Fix disable_managed_interrupts + CVE-2024-26743: (unk) RDMA/qedr: Fix qedr_create_user_qp error flow + CVE-2024-26744: (unk) RDMA/srpt: Support specifying the srpt_service_guid parameter + CVE-2024-26745: (unk) powerpc/pseries/iommu: IOMMU table is not initialized for kdump over SR-IOV + CVE-2024-26747: (unk) usb: roles: fix NULL pointer issue when put module's reference + CVE-2024-26748: (unk) usb: cdns3: fix memory double free when handle zero packet + CVE-2024-26749: (unk) usb: cdns3: fixed memory use after free at cdns3_gadget_ep_disable() + CVE-2024-26751: (unk) ARM: ep93xx: Add terminator to gpiod_lookup_table + CVE-2024-26752: (unk) l2tp: pass correct message length to ip6_append_data + CVE-2024-26753: (unk) crypto: virtio/akcipher - Fix stack overflow on memcpy + CVE-2024-26754: (unk) gtp: fix use-after-free and null-ptr-deref in gtp_genl_dump_pdp() + CVE-2024-26756: (unk) md: Don't register sync_thread for reshape directly + CVE-2024-26757: (unk) md: Don't ignore read-only array in md_check_recovery() + CVE-2024-26758: (unk) md: Don't ignore suspended array in md_check_recovery() + CVE-2024-26759: (unk) mm/swap: fix race when skipping swapcache + CVE-2024-26760: (unk) scsi: target: pscsi: Fix bio_put() for error case + CVE-2024-26761: (unk) cxl/pci: Fix disabling memory if DVSEC CXL Range does not match a CFMWS window + CVE-2024-26763: (unk) dm-crypt: don't modify the data when using authenticated encryption + CVE-2024-26764: (unk) fs/aio: Restrict kiocb_set_cancel_fn() to I/O submitted via libaio + CVE-2024-26765: (unk) LoongArch: Disable IRQ before init_fn() for nonboot CPUs + CVE-2024-26767: (unk) drm/amd/display: fixed integer types and null check locations + CVE-2024-26768: (unk) LoongArch: Change acpi_core_pic[NR_CPUS] to acpi_core_pic[MAX_CORE_PIC] + CVE-2024-26769: (unk) nvmet-fc: avoid deadlock on delete association path + CVE-2024-26770: (unk) HID: nvidia-shield: Add missing null pointer checks to LED initialization + CVE-2024-26771: (unk) dmaengine: ti: edma: Add some null pointer checks to the edma_probe + CVE-2024-26772: (unk) ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal() + CVE-2024-26773: (unk) ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found() + CVE-2024-26774: (unk) ext4: avoid dividing by 0 in mb_update_avg_fragment_size() when block bitmap corrupt + CVE-2024-26775: (unk) aoe: avoid potential deadlock at set_capacity + CVE-2024-26776: (unk) spi: hisi-sfc-v3xx: Return IRQ_NONE if no interrupts were detected + CVE-2024-26777: (unk) fbdev: sis: Error out if pixclock equals zero + CVE-2024-26778: (unk) fbdev: savage: Error out if pixclock equals zero + CVE-2024-26779: (unk) wifi: mac80211: fix race condition on enabling fast-xmit + CVE-2024-26782: (unk) mptcp: fix double-free on socket dismantle + CVE-2024-26783: (unk) mm/vmscan: fix a bug calling wakeup_kswapd() with a wrong zone index + CVE-2024-26784: (unk) pmdomain: arm: Fix NULL dereference on scmi_perf_domain removal + CVE-2024-26787: (unk) mmc: mmci: stm32: fix DMA API overlapping mappings warning + CVE-2024-26788: (unk) dmaengine: fsl-qdma: init irq after reg initialization + CVE-2024-26789: (unk) crypto: arm64/neonbs - fix out-of-bounds access on short input + CVE-2024-26790: (unk) dmaengine: fsl-qdma: fix SoC may hang on 16 byte unaligned read + CVE-2024-26791: (unk) btrfs: dev-replace: properly validate device names + CVE-2024-26793: (unk) gtp: fix use-after-free and null-ptr-deref in gtp_newlink() + CVE-2024-26795: (unk) riscv: Sparse-Memory/vmemmap out-of-bounds fix + CVE-2024-26797: (unk) drm/amd/display: Prevent potential buffer overflow in map_hw_resources + CVE-2024-26798: (unk) fbcon: always restore the old font data in fbcon_do_set_font() + CVE-2024-26799: (unk) ASoC: qcom: Fix uninitialized pointer dmactl + CVE-2024-26801: (unk) Bluetooth: Avoid potential use-after-free in hci_error_reset + CVE-2024-26802: (unk) stmmac: Clear variable when destroying workqueue + CVE-2024-26803: (unk) net: veth: clear GRO when clearing XDP even when down + CVE-2024-26804: (unk) net: ip_tunnel: prevent perpetual headroom growth + CVE-2024-26805: (unk) netlink: Fix kernel-infoleak-after-free in __skb_datagram_iter + CVE-2024-26806: (unk) spi: cadence-qspi: remove system-wide suspend helper calls from runtime PM hooks + CVE-2024-26808: (unk) netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain + CVE-2024-26809: (unk) netfilter: nft_set_pipapo: release elements in clone only from destroy path diff --git a/data/6.3/6.3_CVEs.txt b/data/6.3/6.3_CVEs.txt index 373484460..2caa127a9 100644 --- a/data/6.3/6.3_CVEs.txt +++ b/data/6.3/6.3_CVEs.txt @@ -78,6 +78,7 @@ CVE-2022-45886: Fixed with 6.3.7 CVE-2022-45887: Fixed with 6.3.7 CVE-2022-45919: Fixed with 6.3.7 CVE-2022-48425: Fixed with 6.3.4 +CVE-2022-48628: Fix not seen in stream CVE-2023-0160: Fixed with 6.3.2 CVE-2023-1192: Fixed with 6.3.4 CVE-2023-1194: Fixed with 6.3.8 @@ -102,6 +103,7 @@ CVE-2023-25775: Fix not seen in stream CVE-2023-2598: Fixed with 6.3.2 CVE-2023-26242: Fix unknown CVE-2023-2640: Fix unknown +CVE-2023-28746: Fix not seen in stream CVE-2023-2898: Fix not seen in stream CVE-2023-3090: Fixed with 6.3.4 CVE-2023-31081: Fix unknown @@ -200,7 +202,7 @@ CVE-2023-46343: Fix not seen in stream CVE-2023-46813: Fix not seen in stream CVE-2023-46838: Fix not seen in stream CVE-2023-46862: Fix not seen in stream -CVE-2023-47233: Fix unknown +CVE-2023-47233: Fix not seen in stream CVE-2023-4881: Fix not seen in stream CVE-2023-4921: Fix not seen in stream CVE-2023-50431: Fix not seen in stream @@ -241,6 +243,133 @@ CVE-2023-52458: Fix not seen in stream CVE-2023-52462: Fix not seen in stream CVE-2023-52463: Fix not seen in stream CVE-2023-52464: Fix not seen in stream +CVE-2023-52467: Fix not seen in stream +CVE-2023-52469: Fix not seen in stream +CVE-2023-52470: Fix not seen in stream +CVE-2023-52474: Fixed with 6.3.2 +CVE-2023-52475: Fix not seen in stream +CVE-2023-52476: Fix not seen in stream +CVE-2023-52477: Fix not seen in stream +CVE-2023-52478: Fix not seen in stream +CVE-2023-52479: Fix not seen in stream +CVE-2023-52480: Fix not seen in stream +CVE-2023-52481: Fix not seen in stream +CVE-2023-52482: Fix not seen in stream +CVE-2023-52483: Fix not seen in stream +CVE-2023-52484: Fix not seen in stream +CVE-2023-52485: Fix not seen in stream +CVE-2023-52486: Fix not seen in stream +CVE-2023-52488: Fix not seen in stream +CVE-2023-52489: Fix not seen in stream +CVE-2023-52490: Fix not seen in stream +CVE-2023-52491: Fix not seen in stream +CVE-2023-52492: Fix not seen in stream +CVE-2023-52493: Fix not seen in stream +CVE-2023-52494: Fix not seen in stream +CVE-2023-52495: Fix not seen in stream +CVE-2023-52497: Fix not seen in stream +CVE-2023-52498: Fix not seen in stream +CVE-2023-52499: Fix not seen in stream +CVE-2023-52500: Fix not seen in stream +CVE-2023-52501: Fix not seen in stream +CVE-2023-52502: Fix not seen in stream +CVE-2023-52503: Fix not seen in stream +CVE-2023-52504: Fix not seen in stream +CVE-2023-52505: Fix not seen in stream +CVE-2023-52506: Fix not seen in stream +CVE-2023-52507: Fix not seen in stream +CVE-2023-52508: Fix not seen in stream +CVE-2023-52509: Fix not seen in stream +CVE-2023-52510: Fix not seen in stream +CVE-2023-52511: Fix not seen in stream +CVE-2023-52512: Fix not seen in stream +CVE-2023-52513: Fix not seen in stream +CVE-2023-52515: Fix not seen in stream +CVE-2023-52516: Fix not seen in stream +CVE-2023-52517: Fix not seen in stream +CVE-2023-52518: Fix not seen in stream +CVE-2023-52519: Fix not seen in stream +CVE-2023-52520: Fix not seen in stream +CVE-2023-52522: Fix not seen in stream +CVE-2023-52523: Fix not seen in stream +CVE-2023-52526: Fix not seen in stream +CVE-2023-52527: Fix not seen in stream +CVE-2023-52528: Fix not seen in stream +CVE-2023-52529: Fix not seen in stream +CVE-2023-52530: Fix not seen in stream +CVE-2023-52531: Fix not seen in stream +CVE-2023-52532: Fix not seen in stream +CVE-2023-52559: Fix not seen in stream +CVE-2023-52560: Fix not seen in stream +CVE-2023-52561: Fix not seen in stream +CVE-2023-52562: Fix not seen in stream +CVE-2023-52563: Fix not seen in stream +CVE-2023-52565: Fix not seen in stream +CVE-2023-52566: Fix not seen in stream +CVE-2023-52568: Fix not seen in stream +CVE-2023-52569: Fix not seen in stream +CVE-2023-52570: Fix not seen in stream +CVE-2023-52571: Fix not seen in stream +CVE-2023-52572: Fix not seen in stream +CVE-2023-52573: Fix not seen in stream +CVE-2023-52574: Fix not seen in stream +CVE-2023-52576: Fix not seen in stream +CVE-2023-52578: Fix not seen in stream +CVE-2023-52580: Fix not seen in stream +CVE-2023-52582: Fix not seen in stream +CVE-2023-52583: Fix not seen in stream +CVE-2023-52584: Fix not seen in stream +CVE-2023-52585: Fix not seen in stream +CVE-2023-52586: Fix not seen in stream +CVE-2023-52587: Fix not seen in stream +CVE-2023-52588: Fix not seen in stream +CVE-2023-52589: Fix not seen in stream +CVE-2023-52590: Fix not seen in stream +CVE-2023-52591: Fix not seen in stream +CVE-2023-52593: Fix not seen in stream +CVE-2023-52594: Fix not seen in stream +CVE-2023-52595: Fix not seen in stream +CVE-2023-52596: Fix not seen in stream +CVE-2023-52597: Fix not seen in stream +CVE-2023-52598: Fix not seen in stream +CVE-2023-52599: Fix not seen in stream +CVE-2023-52600: Fix not seen in stream +CVE-2023-52601: Fix not seen in stream +CVE-2023-52602: Fix not seen in stream +CVE-2023-52603: Fix not seen in stream +CVE-2023-52604: Fix not seen in stream +CVE-2023-52606: Fix not seen in stream +CVE-2023-52607: Fix not seen in stream +CVE-2023-52608: Fix not seen in stream +CVE-2023-52609: Fix not seen in stream +CVE-2023-52610: Fix not seen in stream +CVE-2023-52612: Fix not seen in stream +CVE-2023-52614: Fix not seen in stream +CVE-2023-52615: Fix not seen in stream +CVE-2023-52616: Fix not seen in stream +CVE-2023-52617: Fix not seen in stream +CVE-2023-52618: Fix not seen in stream +CVE-2023-52619: Fix not seen in stream +CVE-2023-52620: Fix not seen in stream +CVE-2023-52621: Fix not seen in stream +CVE-2023-52622: Fix not seen in stream +CVE-2023-52623: Fix not seen in stream +CVE-2023-52624: Fix not seen in stream +CVE-2023-52625: Fix not seen in stream +CVE-2023-52627: Fix not seen in stream +CVE-2023-52628: Fix not seen in stream +CVE-2023-52629: Fix not seen in stream +CVE-2023-52630: Fix not seen in stream +CVE-2023-52631: Fix not seen in stream +CVE-2023-52632: Fix not seen in stream +CVE-2023-52633: Fix not seen in stream +CVE-2023-52634: Fix not seen in stream +CVE-2023-52635: Fix not seen in stream +CVE-2023-52637: Fix not seen in stream +CVE-2023-52638: Fix not seen in stream +CVE-2023-52639: Fix not seen in stream +CVE-2023-52640: Fix not seen in stream +CVE-2023-52641: Fix not seen in stream CVE-2023-5345: Fix not seen in stream CVE-2023-5633: Fix not seen in stream CVE-2023-5717: Fix not seen in stream @@ -250,11 +379,11 @@ CVE-2023-6121: Fix not seen in stream CVE-2023-6176: Fix not seen in stream CVE-2023-6238: Fix unknown CVE-2023-6240: Fix unknown -CVE-2023-6270: Fix unknown -CVE-2023-6356: Fix unknown +CVE-2023-6270: Fix not seen in stream +CVE-2023-6356: Fix not seen in stream CVE-2023-6531: Fix not seen in stream CVE-2023-6535: Fix unknown -CVE-2023-6536: Fix unknown +CVE-2023-6536: Fix not seen in stream CVE-2023-6546: Fix not seen in stream CVE-2023-6560: Fix not seen in stream CVE-2023-6606: Fix not seen in stream @@ -264,7 +393,7 @@ CVE-2023-6817: Fix not seen in stream CVE-2023-6915: Fix not seen in stream CVE-2023-6931: Fix not seen in stream CVE-2023-6932: Fix not seen in stream -CVE-2023-7042: Fix unknown +CVE-2023-7042: Fix not seen in stream CVE-2024-0340: Fix not seen in stream CVE-2024-0443: Fixed with 6.3.9 CVE-2024-0564: Fix unknown @@ -275,17 +404,18 @@ CVE-2024-0639: Fix not seen in stream CVE-2024-0641: Fix not seen in stream CVE-2024-0646: Fix not seen in stream CVE-2024-0775: Fixed with 6.3.3 -CVE-2024-0841: Fix unknown +CVE-2024-0841: Fix not seen in stream CVE-2024-1085: Fix not seen in stream CVE-2024-1086: Fix not seen in stream CVE-2024-1151: Fix not seen in stream CVE-2024-1312: Fix not seen in stream CVE-2024-21803: Fix unknown -CVE-2024-22099: Fix unknown +CVE-2024-2193: Fix unknown +CVE-2024-22099: Fix not seen in stream CVE-2024-22386: Fix unknown CVE-2024-22705: Fix not seen in stream -CVE-2024-23196: Fix unknown -CVE-2024-23307: Fix unknown +CVE-2024-23196: Fix not seen in stream +CVE-2024-23307: Fix not seen in stream CVE-2024-23848: Fix unknown CVE-2024-23849: Fix not seen in stream CVE-2024-23850: Fix not seen in stream @@ -295,7 +425,7 @@ CVE-2024-24857: Fix unknown CVE-2024-24858: Fix unknown CVE-2024-24859: Fix unknown CVE-2024-24860: Fix not seen in stream -CVE-2024-24861: Fix unknown +CVE-2024-24861: Fix not seen in stream CVE-2024-24864: Fix unknown CVE-2024-25739: Fix unknown CVE-2024-25740: Fix unknown @@ -306,7 +436,6 @@ CVE-2024-26583: Fix not seen in stream CVE-2024-26584: Fix not seen in stream CVE-2024-26585: Fix not seen in stream CVE-2024-26586: Fix not seen in stream -CVE-2024-26587: Fix not seen in stream CVE-2024-26588: Fix not seen in stream CVE-2024-26589: Fix not seen in stream CVE-2024-26590: Fix not seen in stream @@ -319,3 +448,155 @@ CVE-2024-26596: Fix not seen in stream CVE-2024-26597: Fix not seen in stream CVE-2024-26598: Fix not seen in stream CVE-2024-26599: Fix not seen in stream +CVE-2024-26600: Fix not seen in stream +CVE-2024-26601: Fix not seen in stream +CVE-2024-26602: Fix not seen in stream +CVE-2024-26603: Fix not seen in stream +CVE-2024-26606: Fix not seen in stream +CVE-2024-26607: Fix not seen in stream +CVE-2024-26608: Fix not seen in stream +CVE-2024-26610: Fix not seen in stream +CVE-2024-26612: Fix not seen in stream +CVE-2024-26614: Fix not seen in stream +CVE-2024-26615: Fix not seen in stream +CVE-2024-26620: Fix not seen in stream +CVE-2024-26622: Fix not seen in stream +CVE-2024-26623: Fix not seen in stream +CVE-2024-26625: Fix not seen in stream +CVE-2024-26627: Fix not seen in stream +CVE-2024-26629: Fix not seen in stream +CVE-2024-26631: Fix not seen in stream +CVE-2024-26632: Fix not seen in stream +CVE-2024-26633: Fix not seen in stream +CVE-2024-26635: Fix not seen in stream +CVE-2024-26636: Fix not seen in stream +CVE-2024-26638: Fix not seen in stream +CVE-2024-26640: Fix not seen in stream +CVE-2024-26641: Fix not seen in stream +CVE-2024-26642: Fix not seen in stream +CVE-2024-26644: Fix not seen in stream +CVE-2024-26645: Fix not seen in stream +CVE-2024-26646: Fix not seen in stream +CVE-2024-26647: Fix not seen in stream +CVE-2024-26648: Fix not seen in stream +CVE-2024-26649: Fix not seen in stream +CVE-2024-26650: Fix not seen in stream +CVE-2024-26651: Fix not seen in stream +CVE-2024-26654: Fix not seen in stream +CVE-2024-26655: Fix not seen in stream +CVE-2024-26656: Fix not seen in stream +CVE-2024-26658: Fix not seen in stream +CVE-2024-26659: Fix not seen in stream +CVE-2024-26660: Fix not seen in stream +CVE-2024-26661: Fix not seen in stream +CVE-2024-26662: Fix not seen in stream +CVE-2024-26663: Fix not seen in stream +CVE-2024-26664: Fix not seen in stream +CVE-2024-26665: Fix not seen in stream +CVE-2024-26667: Fix not seen in stream +CVE-2024-26668: Fix not seen in stream +CVE-2024-26669: Fix not seen in stream +CVE-2024-26671: Fix not seen in stream +CVE-2024-26672: Fix not seen in stream +CVE-2024-26673: Fix not seen in stream +CVE-2024-26675: Fix not seen in stream +CVE-2024-26676: Fix not seen in stream +CVE-2024-26677: Fix not seen in stream +CVE-2024-26679: Fix not seen in stream +CVE-2024-26680: Fix not seen in stream +CVE-2024-26681: Fix not seen in stream +CVE-2024-26684: Fix not seen in stream +CVE-2024-26685: Fix not seen in stream +CVE-2024-26686: Fix not seen in stream +CVE-2024-26687: Fix not seen in stream +CVE-2024-26688: Fix not seen in stream +CVE-2024-26689: Fix not seen in stream +CVE-2024-26691: Fix not seen in stream +CVE-2024-26692: Fix not seen in stream +CVE-2024-26695: Fix not seen in stream +CVE-2024-26696: Fix not seen in stream +CVE-2024-26697: Fix not seen in stream +CVE-2024-26698: Fix not seen in stream +CVE-2024-26699: Fix not seen in stream +CVE-2024-26700: Fix not seen in stream +CVE-2024-26702: Fix not seen in stream +CVE-2024-26704: Fix not seen in stream +CVE-2024-26706: Fix not seen in stream +CVE-2024-26707: Fix not seen in stream +CVE-2024-26708: Fix not seen in stream +CVE-2024-26711: Fix not seen in stream +CVE-2024-26712: Fix not seen in stream +CVE-2024-26713: Fix not seen in stream +CVE-2024-26714: Fix not seen in stream +CVE-2024-26715: Fix not seen in stream +CVE-2024-26717: Fix not seen in stream +CVE-2024-26718: Fix not seen in stream +CVE-2024-26719: Fix not seen in stream +CVE-2024-26720: Fix not seen in stream +CVE-2024-26723: Fix not seen in stream +CVE-2024-26726: Fix not seen in stream +CVE-2024-26727: Fix not seen in stream +CVE-2024-26733: Fix not seen in stream +CVE-2024-26734: Fix not seen in stream +CVE-2024-26735: Fix not seen in stream +CVE-2024-26736: Fix not seen in stream +CVE-2024-26737: Fix not seen in stream +CVE-2024-26738: Fix not seen in stream +CVE-2024-26739: Fix not seen in stream +CVE-2024-26740: Fix not seen in stream +CVE-2024-26741: Fix not seen in stream +CVE-2024-26742: Fix not seen in stream +CVE-2024-26743: Fix not seen in stream +CVE-2024-26744: Fix not seen in stream +CVE-2024-26745: Fix not seen in stream +CVE-2024-26747: Fix not seen in stream +CVE-2024-26748: Fix not seen in stream +CVE-2024-26749: Fix not seen in stream +CVE-2024-26751: Fix not seen in stream +CVE-2024-26752: Fix not seen in stream +CVE-2024-26753: Fix not seen in stream +CVE-2024-26754: Fix not seen in stream +CVE-2024-26756: Fix not seen in stream +CVE-2024-26757: Fix not seen in stream +CVE-2024-26758: Fix not seen in stream +CVE-2024-26759: Fix not seen in stream +CVE-2024-26760: Fix not seen in stream +CVE-2024-26761: Fix not seen in stream +CVE-2024-26763: Fix not seen in stream +CVE-2024-26764: Fix not seen in stream +CVE-2024-26765: Fix not seen in stream +CVE-2024-26766: Fix not seen in stream +CVE-2024-26767: Fix not seen in stream +CVE-2024-26768: Fix not seen in stream +CVE-2024-26769: Fix not seen in stream +CVE-2024-26770: Fix not seen in stream +CVE-2024-26771: Fix not seen in stream +CVE-2024-26772: Fix not seen in stream +CVE-2024-26773: Fix not seen in stream +CVE-2024-26774: Fix not seen in stream +CVE-2024-26775: Fix not seen in stream +CVE-2024-26776: Fix not seen in stream +CVE-2024-26777: Fix not seen in stream +CVE-2024-26778: Fix not seen in stream +CVE-2024-26779: Fix not seen in stream +CVE-2024-26782: Fix not seen in stream +CVE-2024-26783: Fix not seen in stream +CVE-2024-26784: Fix not seen in stream +CVE-2024-26787: Fix not seen in stream +CVE-2024-26788: Fix not seen in stream +CVE-2024-26789: Fix not seen in stream +CVE-2024-26790: Fix not seen in stream +CVE-2024-26791: Fix not seen in stream +CVE-2024-26793: Fix not seen in stream +CVE-2024-26795: Fix not seen in stream +CVE-2024-26797: Fix not seen in stream +CVE-2024-26798: Fix not seen in stream +CVE-2024-26799: Fix not seen in stream +CVE-2024-26801: Fix not seen in stream +CVE-2024-26802: Fix not seen in stream +CVE-2024-26803: Fix not seen in stream +CVE-2024-26804: Fix not seen in stream +CVE-2024-26805: Fix not seen in stream +CVE-2024-26806: Fix not seen in stream +CVE-2024-26808: Fix not seen in stream +CVE-2024-26809: Fix not seen in stream diff --git a/data/6.3/6.3_security.txt b/data/6.3/6.3_security.txt index 39883a237..cc573cd4c 100644 --- a/data/6.3/6.3_security.txt +++ b/data/6.3/6.3_security.txt @@ -33,6 +33,7 @@ CVEs fixed in 6.3.2: CVE-2023-35826: 565c863bd982584aa4393f7bdb345dbccb3ad488 media: cedrus: fix use after free bug in cedrus_remove due to race condition CVE-2023-35828: 231598b40a070a6bf780c0df1ff5ae3e57102900 usb: gadget: udc: renesas_usb3: Fix use after free bug in renesas_usb3_remove due to race condition CVE-2023-35829: 2115e94838adc9d1e7b75043c9f26abcc910f6fb media: rkvdec: fix use after free bug in rkvdec_remove + CVE-2023-52474: 7e6010f79b58f45b204cf18aa58f4b73c3f30adc IB/hfi1: Fix bugs with non-PAGE_SIZE-end multi-iovec user SDMA requests CVEs fixed in 6.3.3: CVE-2023-34256: be7b6374a2ee8a59c1ff5addcbe25ebc1b4efd9f ext4: avoid a potential slab-out-of-bounds in ext4_group_desc_csum @@ -164,6 +165,7 @@ Outstanding CVEs: CVE-2022-4543: (unk) CVE-2022-45884: (unk) CVE-2022-45885: (unk) + CVE-2022-48628: (unk) ceph: drop messages from MDS when unmounting CVE-2023-1206: (unk) tcp: Reduce chance of collisions in inet6_hashfn(). CVE-2023-1476: (unk) CVE-2023-20569: (unk) x86/bugs: Increase the x86 bugs vector size to two u32s @@ -175,6 +177,7 @@ Outstanding CVEs: CVE-2023-25775: (unk) RDMA/irdma: Prevent zero-length STAG registration CVE-2023-26242: (unk) CVE-2023-2640: (unk) + CVE-2023-28746: (unk) x86/mmio: Disable KVM mitigation when X86_FEATURE_CLEAR_CPU_BUF is set CVE-2023-2898: (unk) f2fs: fix to avoid NULL pointer dereference f2fs_write_end_io() CVE-2023-31081: (unk) CVE-2023-31082: (unk) @@ -230,7 +233,7 @@ Outstanding CVEs: CVE-2023-46813: (unk) x86/sev: Check for user-space IOIO pointing to kernel space CVE-2023-46838: (unk) xen-netback: don't produce zero-size SKB frags CVE-2023-46862: (unk) io_uring/fdinfo: lock SQ thread while retrieving thread cpu/pid - CVE-2023-47233: (unk) + CVE-2023-47233: (unk) wifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach CVE-2023-4881: (unk) netfilter: nftables: exthdr: fix 4-byte stack OOB write CVE-2023-4921: (unk) net: sched: sch_qfq: Fix UAF in qfq_dequeue() CVE-2023-50431: (unk) accel/habanalabs: fix information leak in sec_attest_info() @@ -271,6 +274,132 @@ Outstanding CVEs: CVE-2023-52462: (unk) bpf: fix check for attempt to corrupt spilled pointer CVE-2023-52463: (unk) efivarfs: force RO when remounting if SetVariable is not supported CVE-2023-52464: (unk) EDAC/thunderx: Fix possible out-of-bounds string access + CVE-2023-52467: (unk) mfd: syscon: Fix null pointer dereference in of_syscon_register() + CVE-2023-52469: (unk) drivers/amd/pm: fix a use-after-free in kv_parse_power_table + CVE-2023-52470: (unk) drm/radeon: check the alloc_workqueue return value in radeon_crtc_init() + CVE-2023-52475: (unk) Input: powermate - fix use-after-free in powermate_config_complete + CVE-2023-52476: (unk) perf/x86/lbr: Filter vsyscall addresses + CVE-2023-52477: (unk) usb: hub: Guard against accesses to uninitialized BOS descriptors + CVE-2023-52478: (unk) HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect + CVE-2023-52479: (unk) ksmbd: fix uaf in smb20_oplock_break_ack + CVE-2023-52480: (unk) ksmbd: fix race condition between session lookup and expire + CVE-2023-52481: (unk) arm64: errata: Add Cortex-A520 speculative unprivileged load workaround + CVE-2023-52482: (unk) x86/srso: Add SRSO mitigation for Hygon processors + CVE-2023-52483: (unk) mctp: perform route lookups under a RCU read-side lock + CVE-2023-52484: (unk) iommu/arm-smmu-v3: Fix soft lockup triggered by arm_smmu_mm_invalidate_range + CVE-2023-52485: (unk) drm/amd/display: Wake DMCUB before sending a command + CVE-2023-52486: (unk) drm: Don't unref the same fb many times by mistake due to deadlock handling + CVE-2023-52488: (unk) serial: sc16is7xx: convert from _raw_ to _noinc_ regmap functions for FIFO + CVE-2023-52489: (unk) mm/sparsemem: fix race in accessing memory_section->usage + CVE-2023-52490: (unk) mm: migrate: fix getting incorrect page mapping during page migration + CVE-2023-52491: (unk) media: mtk-jpeg: Fix use after free bug due to error path handling in mtk_jpeg_dec_device_run + CVE-2023-52492: (unk) dmaengine: fix NULL pointer in channel unregistration function + CVE-2023-52493: (unk) bus: mhi: host: Drop chan lock before queuing buffers + CVE-2023-52494: (unk) bus: mhi: host: Add alignment check for event ring read pointer + CVE-2023-52495: (unk) soc: qcom: pmic_glink_altmode: fix port sanity check + CVE-2023-52497: (unk) erofs: fix lz4 inplace decompression + CVE-2023-52498: (unk) PM: sleep: Fix possible deadlocks in core system-wide PM code + CVE-2023-52499: (unk) powerpc/47x: Fix 47x syscall return crash + CVE-2023-52500: (unk) scsi: pm80xx: Avoid leaking tags when processing OPC_INB_SET_CONTROLLER_CONFIG command + CVE-2023-52501: (unk) ring-buffer: Do not attempt to read past "commit" + CVE-2023-52502: (unk) net: nfc: fix races in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn() + CVE-2023-52503: (unk) tee: amdtee: fix use-after-free vulnerability in amdtee_close_session + CVE-2023-52504: (unk) x86/alternatives: Disable KASAN in apply_alternatives() + CVE-2023-52505: (unk) phy: lynx-28g: serialize concurrent phy_set_mode_ext() calls to shared registers + CVE-2023-52506: (unk) LoongArch: Set all reserved memblocks on Node#0 at initialization + CVE-2023-52507: (unk) nfc: nci: assert requested protocol is valid + CVE-2023-52508: (unk) nvme-fc: Prevent null pointer dereference in nvme_fc_io_getuuid() + CVE-2023-52509: (unk) ravb: Fix use-after-free issue in ravb_tx_timeout_work() + CVE-2023-52510: (unk) ieee802154: ca8210: Fix a potential UAF in ca8210_probe + CVE-2023-52511: (unk) spi: sun6i: reduce DMA RX transfer width to single byte + CVE-2023-52512: (unk) pinctrl: nuvoton: wpcm450: fix out of bounds write + CVE-2023-52513: (unk) RDMA/siw: Fix connection failure handling + CVE-2023-52515: (unk) RDMA/srp: Do not call scsi_done() from srp_abort() + CVE-2023-52516: (unk) dma-debug: don't call __dma_entry_alloc_check_leak() under free_entries_lock + CVE-2023-52517: (unk) spi: sun6i: fix race between DMA RX transfer completion and RX FIFO drain + CVE-2023-52518: (unk) Bluetooth: hci_codec: Fix leaking content of local_codecs + CVE-2023-52519: (unk) HID: intel-ish-hid: ipc: Disable and reenable ACPI GPE bit + CVE-2023-52520: (unk) platform/x86: think-lmi: Fix reference leak + CVE-2023-52522: (unk) net: fix possible store tearing in neigh_periodic_work() + CVE-2023-52523: (unk) bpf, sockmap: Reject sk_msg egress redirects to non-TCP sockets + CVE-2023-52526: (unk) erofs: fix memory leak of LZMA global compressed deduplication + CVE-2023-52527: (unk) ipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data() + CVE-2023-52528: (unk) net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg + CVE-2023-52529: (unk) HID: sony: Fix a potential memory leak in sony_probe() + CVE-2023-52530: (unk) wifi: mac80211: fix potential key use-after-free + CVE-2023-52531: (unk) wifi: iwlwifi: mvm: Fix a memory corruption issue + CVE-2023-52532: (unk) net: mana: Fix TX CQE error handling + CVE-2023-52559: (unk) iommu/vt-d: Avoid memory allocation in iommu_suspend() + CVE-2023-52560: (unk) mm/damon/vaddr-test: fix memory leak in damon_do_test_apply_three_regions() + CVE-2023-52561: (unk) arm64: dts: qcom: sdm845-db845c: Mark cont splash memory region as reserved + CVE-2023-52562: (unk) mm/slab_common: fix slab_caches list corruption after kmem_cache_destroy() + CVE-2023-52563: (unk) drm/meson: fix memory leak on ->hpd_notify callback + CVE-2023-52565: (unk) media: uvcvideo: Fix OOB read + CVE-2023-52566: (unk) nilfs2: fix potential use after free in nilfs_gccache_submit_read_data() + CVE-2023-52568: (unk) x86/sgx: Resolves SECS reclaim vs. page fault for EAUG race + CVE-2023-52569: (unk) btrfs: remove BUG() after failure to insert delayed dir index item + CVE-2023-52570: (unk) vfio/mdev: Fix a null-ptr-deref bug for mdev_unregister_parent() + CVE-2023-52571: (unk) power: supply: rk817: Fix node refcount leak + CVE-2023-52572: (unk) cifs: Fix UAF in cifs_demultiplex_thread() + CVE-2023-52573: (unk) net: rds: Fix possible NULL-pointer dereference + CVE-2023-52574: (unk) team: fix null-ptr-deref when team device type is changed + CVE-2023-52576: (unk) x86/mm, kexec, ima: Use memblock_free_late() from ima_free_kexec_buffer() + CVE-2023-52578: (unk) net: bridge: use DEV_STATS_INC() + CVE-2023-52580: (unk) net/core: Fix ETH_P_1588 flow dissector + CVE-2023-52582: (unk) netfs: Only call folio_start_fscache() one time for each folio + CVE-2023-52583: (unk) ceph: fix deadlock or deadcode of misusing dget() + CVE-2023-52584: (unk) spmi: mediatek: Fix UAF on device remove + CVE-2023-52585: (unk) drm/amdgpu: Fix possible NULL dereference in amdgpu_ras_query_error_status_helper() + CVE-2023-52586: (unk) drm/msm/dpu: Add mutex lock in control vblank irq + CVE-2023-52587: (unk) IB/ipoib: Fix mcast list locking + CVE-2023-52588: (unk) f2fs: fix to tag gcing flag on page during block migration + CVE-2023-52589: (unk) media: rkisp1: Fix IRQ disable race issue + CVE-2023-52590: (unk) ocfs2: Avoid touching renamed directory if parent does not change + CVE-2023-52591: (unk) reiserfs: Avoid touching renamed directory if parent does not change + CVE-2023-52593: (unk) wifi: wfx: fix possible NULL pointer dereference in wfx_set_mfp_ap() + CVE-2023-52594: (unk) wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus() + CVE-2023-52595: (unk) wifi: rt2x00: restart beacon queue when hardware reset + CVE-2023-52596: (unk) sysctl: Fix out of bounds access for empty sysctl registers + CVE-2023-52597: (unk) KVM: s390: fix setting of fpc register + CVE-2023-52598: (unk) s390/ptrace: handle setting of fpc register correctly + CVE-2023-52599: (unk) jfs: fix array-index-out-of-bounds in diNewExt + CVE-2023-52600: (unk) jfs: fix uaf in jfs_evict_inode + CVE-2023-52601: (unk) jfs: fix array-index-out-of-bounds in dbAdjTree + CVE-2023-52602: (unk) jfs: fix slab-out-of-bounds Read in dtSearch + CVE-2023-52603: (unk) UBSAN: array-index-out-of-bounds in dtSplitRoot + CVE-2023-52604: (unk) FS:JFS:UBSAN:array-index-out-of-bounds in dbAdjTree + CVE-2023-52606: (unk) powerpc/lib: Validate size for vector operations + CVE-2023-52607: (unk) powerpc/mm: Fix null-pointer dereference in pgtable_cache_add + CVE-2023-52608: (unk) firmware: arm_scmi: Check mailbox/SMT channel for consistency + CVE-2023-52609: (unk) binder: fix race between mmput() and do_exit() + CVE-2023-52610: (unk) net/sched: act_ct: fix skb leak and crash on ooo frags + CVE-2023-52612: (unk) crypto: scomp - fix req->dst buffer overflow + CVE-2023-52614: (unk) PM / devfreq: Fix buffer overflow in trans_stat_show + CVE-2023-52615: (unk) hwrng: core - Fix page fault dead lock on mmap-ed hwrng + CVE-2023-52616: (unk) crypto: lib/mpi - Fix unexpected pointer access in mpi_ec_init + CVE-2023-52617: (unk) PCI: switchtec: Fix stdev_release() crash after surprise hot remove + CVE-2023-52618: (unk) block/rnbd-srv: Check for unlikely string overflow + CVE-2023-52619: (unk) pstore/ram: Fix crash when setting number of cpus to an odd number + CVE-2023-52620: (unk) netfilter: nf_tables: disallow timeout for anonymous sets + CVE-2023-52621: (unk) bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers + CVE-2023-52622: (unk) ext4: avoid online resizing failures due to oversized flex bg + CVE-2023-52623: (unk) SUNRPC: Fix a suspicious RCU usage warning + CVE-2023-52624: (unk) drm/amd/display: Wake DMCUB before executing GPINT commands + CVE-2023-52625: (unk) drm/amd/display: Refactor DMCUB enter/exit idle interface + CVE-2023-52627: (unk) iio: adc: ad7091r: Allow users to configure device events + CVE-2023-52628: (unk) netfilter: nftables: exthdr: fix 4-byte stack OOB write + CVE-2023-52629: (unk) sh: push-switch: Reorder cleanup operations to avoid use-after-free bug + CVE-2023-52630: (unk) blk-iocost: Fix an UBSAN shift-out-of-bounds warning + CVE-2023-52631: (unk) fs/ntfs3: Fix an NULL dereference bug + CVE-2023-52632: (unk) drm/amdkfd: Fix lock dependency warning with srcu + CVE-2023-52633: (unk) um: time-travel: fix time corruption + CVE-2023-52634: (unk) drm/amd/display: Fix disable_otg_wa logic + CVE-2023-52635: (unk) PM / devfreq: Synchronize devfreq_monitor_[start/stop] + CVE-2023-52637: (unk) can: j1939: Fix UAF in j1939_sk_match_filter during setsockopt(SO_J1939_FILTER) + CVE-2023-52638: (unk) can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock + CVE-2023-52639: (unk) KVM: s390: vsie: fix race during shadow creation + CVE-2023-52640: (unk) fs/ntfs3: Fix oob in ntfs_listxattr + CVE-2023-52641: (unk) fs/ntfs3: Add NULL ptr dereference checking at the end of attr_allocate_frame() CVE-2023-5345: (unk) fs/smb/client: Reset password pointer to NULL CVE-2023-5633: (unk) drm/vmwgfx: Keep a gem reference to user bos in surfaces CVE-2023-5717: (unk) perf: Disallow mis-matched inherited group reads @@ -280,11 +409,11 @@ Outstanding CVEs: CVE-2023-6176: (unk) net/tls: do not free tls_rec on async operation in bpf_exec_tx_verdict() CVE-2023-6238: (unk) CVE-2023-6240: (unk) - CVE-2023-6270: (unk) - CVE-2023-6356: (unk) + CVE-2023-6270: (unk) aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts + CVE-2023-6356: (unk) nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length CVE-2023-6531: (unk) io_uring/af_unix: disable sending io_uring over sockets CVE-2023-6535: (unk) - CVE-2023-6536: (unk) + CVE-2023-6536: (unk) nvmet-tcp: fix a crash in nvmet_req_complete() CVE-2023-6546: (unk) tty: n_gsm: fix the UAF caused by race condition in gsm_cleanup_mux CVE-2023-6560: (unk) io_uring: don't allow discontig pages for IORING_SETUP_NO_MMAP CVE-2023-6606: (unk) smb: client: fix OOB in smbCalcSize() @@ -294,7 +423,7 @@ Outstanding CVEs: CVE-2023-6915: (unk) ida: Fix crash in ida_free when the bitmap is empty CVE-2023-6931: (unk) perf: Fix perf_event_validate_size() CVE-2023-6932: (unk) ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet - CVE-2023-7042: (unk) + CVE-2023-7042: (unk) wifi: ath10k: fix NULL pointer dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev() CVE-2024-0340: (unk) vhost: use kzalloc() instead of kmalloc() followed by memset() CVE-2024-0564: (unk) CVE-2024-0565: (unk) smb: client: fix OOB in receive_encrypted_standard() @@ -303,17 +432,18 @@ Outstanding CVEs: CVE-2024-0639: (unk) sctp: fix potential deadlock on &net->sctp.addr_wq_lock CVE-2024-0641: (unk) tipc: fix a potential deadlock on &tx->lock CVE-2024-0646: (unk) net: tls, update curr on splice as well - CVE-2024-0841: (unk) + CVE-2024-0841: (unk) fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super CVE-2024-1085: (unk) netfilter: nf_tables: check if catch-all set element is active in next generation CVE-2024-1086: (unk) netfilter: nf_tables: reject QUEUE/DROP verdict parameters CVE-2024-1151: (unk) net: openvswitch: limit the number of recursions from action sets CVE-2024-1312: (unk) mm: lock_vma_under_rcu() must check vma->anon_vma under vma lock CVE-2024-21803: (unk) - CVE-2024-22099: (unk) + CVE-2024-2193: (unk) + CVE-2024-22099: (unk) Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security CVE-2024-22386: (unk) CVE-2024-22705: (unk) ksmbd: fix slab-out-of-bounds in smb_strndup_from_utf16() - CVE-2024-23196: (unk) - CVE-2024-23307: (unk) + CVE-2024-23196: (unk) ALSA: hda: fix a possible null-pointer dereference due to data race in snd_hdac_regmap_sync() + CVE-2024-23307: (unk) md/raid5: fix atomicity violation in raid5_cache_count CVE-2024-23848: (unk) CVE-2024-23849: (unk) net/rds: Fix UBSAN: array-index-out-of-bounds in rds_cmsg_recv CVE-2024-23850: (unk) btrfs: do not ASSERT() if the newly created subvolume already got read @@ -323,7 +453,7 @@ Outstanding CVEs: CVE-2024-24858: (unk) CVE-2024-24859: (unk) CVE-2024-24860: (unk) Bluetooth: Fix atomicity violation in {min,max}_key_size_set - CVE-2024-24861: (unk) + CVE-2024-24861: (unk) media: xc4000: Fix atomicity violation in xc4000_get_frequency CVE-2024-24864: (unk) CVE-2024-25739: (unk) CVE-2024-25740: (unk) @@ -334,7 +464,6 @@ Outstanding CVEs: CVE-2024-26584: (unk) net: tls: handle backlogging of crypto requests CVE-2024-26585: (unk) tls: fix race between tx work scheduling and socket close CVE-2024-26586: (unk) mlxsw: spectrum_acl_tcam: Fix stack corruption - CVE-2024-26587: (unk) net: netdevsim: don't try to destroy PHC on VFs CVE-2024-26588: (unk) LoongArch: BPF: Prevent out-of-bounds memory access CVE-2024-26589: (unk) bpf: Reject variable offset alu on PTR_TO_FLOW_KEYS CVE-2024-26590: (unk) erofs: fix inconsistent per-file compression format @@ -347,3 +476,155 @@ Outstanding CVEs: CVE-2024-26597: (unk) net: qualcomm: rmnet: fix global oob in rmnet_policy CVE-2024-26598: (unk) KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache CVE-2024-26599: (unk) pwm: Fix out-of-bounds access in of_pwm_single_xlate() + CVE-2024-26600: (unk) phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP + CVE-2024-26601: (unk) ext4: regenerate buddy after block freeing failed if under fc replay + CVE-2024-26602: (unk) sched/membarrier: reduce the ability to hammer on sys_membarrier + CVE-2024-26603: (unk) x86/fpu: Stop relying on userspace for info to fault in xsave buffer + CVE-2024-26606: (unk) binder: signal epoll threads of self-work + CVE-2024-26607: (unk) drm/bridge: sii902x: Fix probing race issue + CVE-2024-26608: (unk) ksmbd: fix global oob in ksmbd_nl_policy + CVE-2024-26610: (unk) wifi: iwlwifi: fix a memory corruption + CVE-2024-26612: (unk) netfs, fscache: Prevent Oops in fscache_put_cache() + CVE-2024-26614: (unk) tcp: make sure init the accept_queue's spinlocks once + CVE-2024-26615: (unk) net/smc: fix illegal rmb_desc access in SMC-D connection dump + CVE-2024-26620: (unk) s390/vfio-ap: always filter entire AP matrix + CVE-2024-26622: (unk) tomoyo: fix UAF write bug in tomoyo_write_control() + CVE-2024-26623: (unk) pds_core: Prevent race issues involving the adminq + CVE-2024-26625: (unk) llc: call sock_orphan() at release time + CVE-2024-26627: (unk) scsi: core: Move scsi_host_busy() out of host lock for waking up EH handler + CVE-2024-26629: (unk) nfsd: fix RELEASE_LOCKOWNER + CVE-2024-26631: (unk) ipv6: mcast: fix data-race in ipv6_mc_down / mld_ifc_work + CVE-2024-26632: (unk) block: Fix iterating over an empty bio with bio_for_each_folio_all + CVE-2024-26633: (unk) ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim() + CVE-2024-26635: (unk) llc: Drop support for ETH_P_TR_802_2. + CVE-2024-26636: (unk) llc: make llc_ui_sendmsg() more robust against bonding changes + CVE-2024-26638: (unk) nbd: always initialize struct msghdr completely + CVE-2024-26640: (unk) tcp: add sanity checks to rx zerocopy + CVE-2024-26641: (unk) ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv() + CVE-2024-26642: (unk) netfilter: nf_tables: disallow anonymous set with timeout flag + CVE-2024-26644: (unk) btrfs: don't abort filesystem when attempting to snapshot deleted subvolume + CVE-2024-26645: (unk) tracing: Ensure visibility when inserting an element into tracing_map + CVE-2024-26646: (unk) thermal: intel: hfi: Add syscore callbacks for system-wide PM + CVE-2024-26647: (unk) drm/amd/display: Fix late derefrence 'dsc' check in 'link_set_dsc_pps_packet()' + CVE-2024-26648: (unk) drm/amd/display: Fix variable deferencing before NULL check in edp_setup_replay() + CVE-2024-26649: (unk) drm/amdgpu: Fix the null pointer when load rlc firmware + CVE-2024-26650: (unk) platform/x86: p2sb: Allow p2sb_bar() calls during PCI device probe + CVE-2024-26651: (unk) sr9800: Add check for usbnet_get_endpoints + CVE-2024-26654: (unk) ALSA: sh: aica: reorder cleanup operations to avoid UAF bugs + CVE-2024-26655: (unk) Fix memory leak in posix_clock_open() + CVE-2024-26656: (unk) drm/amdgpu: fix use-after-free bug + CVE-2024-26658: (unk) bcachefs: grab s_umount only if snapshotting + CVE-2024-26659: (unk) xhci: handle isoc Babble and Buffer Overrun events properly + CVE-2024-26660: (unk) drm/amd/display: Implement bounds check for stream encoder creation in DCN301 + CVE-2024-26661: (unk) drm/amd/display: Add NULL test for 'timing generator' in 'dcn21_set_pipe()' + CVE-2024-26662: (unk) drm/amd/display: Fix 'panel_cntl' could be null in 'dcn21_set_backlight_level()' + CVE-2024-26663: (unk) tipc: Check the bearer type before calling tipc_udp_nl_bearer_add() + CVE-2024-26664: (unk) hwmon: (coretemp) Fix out-of-bounds memory access + CVE-2024-26665: (unk) tunnels: fix out of bounds access when building IPv6 PMTU error + CVE-2024-26667: (unk) drm/msm/dpu: check for valid hw_pp in dpu_encoder_helper_phys_cleanup + CVE-2024-26668: (unk) netfilter: nft_limit: reject configurations that cause integer overflow + CVE-2024-26669: (unk) net/sched: flower: Fix chain template offload + CVE-2024-26671: (unk) blk-mq: fix IO hang from sbitmap wakeup race + CVE-2024-26672: (unk) drm/amdgpu: Fix variable 'mca_funcs' dereferenced before NULL check in 'amdgpu_mca_smu_get_mca_entry()' + CVE-2024-26673: (unk) netfilter: nft_ct: sanitize layer 3 and 4 protocol number in custom expectations + CVE-2024-26675: (unk) ppp_async: limit MRU to 64K + CVE-2024-26676: (unk) af_unix: Call kfree_skb() for dead unix_(sk)->oob_skb in GC. + CVE-2024-26677: (unk) rxrpc: Fix delayed ACKs to not set the reference serial number + CVE-2024-26679: (unk) inet: read sk->sk_family once in inet_recv_error() + CVE-2024-26680: (unk) net: atlantic: Fix DMA mapping for PTP hwts ring + CVE-2024-26681: (unk) netdevsim: avoid potential loop in nsim_dev_trap_report_work() + CVE-2024-26684: (unk) net: stmmac: xgmac: fix handling of DPP safety error for DMA channels + CVE-2024-26685: (unk) nilfs2: fix potential bug in end_buffer_async_write + CVE-2024-26686: (unk) fs/proc: do_task_stat: use sig->stats_lock to gather the threads/children stats + CVE-2024-26687: (unk) xen/events: close evtchn after mapping cleanup + CVE-2024-26688: (unk) fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super + CVE-2024-26689: (unk) ceph: prevent use-after-free in encode_cap_msg() + CVE-2024-26691: (unk) KVM: arm64: Fix circular locking dependency + CVE-2024-26692: (unk) smb: Fix regression in writes when non-standard maximum write size negotiated + CVE-2024-26695: (unk) crypto: ccp - Fix null pointer dereference in __sev_platform_shutdown_locked + CVE-2024-26696: (unk) nilfs2: fix hang in nilfs_lookup_dirty_data_buffers() + CVE-2024-26697: (unk) nilfs2: fix data corruption in dsync block recovery for small block sizes + CVE-2024-26698: (unk) hv_netvsc: Fix race condition between netvsc_probe and netvsc_remove + CVE-2024-26699: (unk) drm/amd/display: Fix array-index-out-of-bounds in dcn35_clkmgr + CVE-2024-26700: (unk) drm/amd/display: Fix MST Null Ptr for RV + CVE-2024-26702: (unk) iio: magnetometer: rm3100: add boundary check for the value read from RM3100_REG_TMRC + CVE-2024-26704: (unk) ext4: fix double-free of blocks due to wrong extents moved_len + CVE-2024-26706: (unk) parisc: Fix random data corruption from exception handler + CVE-2024-26707: (unk) net: hsr: remove WARN_ONCE() in send_hsr_supervision_frame() + CVE-2024-26708: (unk) mptcp: really cope with fastopen race + CVE-2024-26711: (unk) iio: adc: ad4130: zero-initialize clock init data + CVE-2024-26712: (unk) powerpc/kasan: Fix addr error caused by page alignment + CVE-2024-26713: (unk) powerpc/pseries/iommu: Fix iommu initialisation during DLPAR add + CVE-2024-26714: (unk) interconnect: qcom: sc8180x: Mark CO0 BCM keepalive + CVE-2024-26715: (unk) usb: dwc3: gadget: Fix NULL pointer dereference in dwc3_gadget_suspend + CVE-2024-26717: (unk) HID: i2c-hid-of: fix NULL-deref on failed power up + CVE-2024-26718: (unk) dm-crypt, dm-verity: disable tasklets + CVE-2024-26719: (unk) nouveau: offload fence uevents work to workqueue + CVE-2024-26720: (unk) mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again + CVE-2024-26723: (unk) lan966x: Fix crash when adding interface under a lag + CVE-2024-26726: (unk) btrfs: don't drop extent_map for free space inode on write error + CVE-2024-26727: (unk) btrfs: do not ASSERT() if the newly created subvolume already got read + CVE-2024-26733: (unk) arp: Prevent overflow in arp_req_get(). + CVE-2024-26734: (unk) devlink: fix possible use-after-free and memory leaks in devlink_init() + CVE-2024-26735: (unk) ipv6: sr: fix possible use-after-free and null-ptr-deref + CVE-2024-26736: (unk) afs: Increase buffer size in afs_update_volume_status() + CVE-2024-26737: (unk) bpf: Fix racing between bpf_timer_cancel_and_free and bpf_timer_cancel + CVE-2024-26738: (unk) powerpc/pseries/iommu: DLPAR add doesn't completely initialize pci_controller + CVE-2024-26739: (unk) net/sched: act_mirred: don't override retval if we already lost the skb + CVE-2024-26740: (unk) net/sched: act_mirred: use the backlog for mirred ingress + CVE-2024-26741: (unk) dccp/tcp: Unhash sk from ehash for tb2 alloc failure after check_estalblished(). + CVE-2024-26742: (unk) scsi: smartpqi: Fix disable_managed_interrupts + CVE-2024-26743: (unk) RDMA/qedr: Fix qedr_create_user_qp error flow + CVE-2024-26744: (unk) RDMA/srpt: Support specifying the srpt_service_guid parameter + CVE-2024-26745: (unk) powerpc/pseries/iommu: IOMMU table is not initialized for kdump over SR-IOV + CVE-2024-26747: (unk) usb: roles: fix NULL pointer issue when put module's reference + CVE-2024-26748: (unk) usb: cdns3: fix memory double free when handle zero packet + CVE-2024-26749: (unk) usb: cdns3: fixed memory use after free at cdns3_gadget_ep_disable() + CVE-2024-26751: (unk) ARM: ep93xx: Add terminator to gpiod_lookup_table + CVE-2024-26752: (unk) l2tp: pass correct message length to ip6_append_data + CVE-2024-26753: (unk) crypto: virtio/akcipher - Fix stack overflow on memcpy + CVE-2024-26754: (unk) gtp: fix use-after-free and null-ptr-deref in gtp_genl_dump_pdp() + CVE-2024-26756: (unk) md: Don't register sync_thread for reshape directly + CVE-2024-26757: (unk) md: Don't ignore read-only array in md_check_recovery() + CVE-2024-26758: (unk) md: Don't ignore suspended array in md_check_recovery() + CVE-2024-26759: (unk) mm/swap: fix race when skipping swapcache + CVE-2024-26760: (unk) scsi: target: pscsi: Fix bio_put() for error case + CVE-2024-26761: (unk) cxl/pci: Fix disabling memory if DVSEC CXL Range does not match a CFMWS window + CVE-2024-26763: (unk) dm-crypt: don't modify the data when using authenticated encryption + CVE-2024-26764: (unk) fs/aio: Restrict kiocb_set_cancel_fn() to I/O submitted via libaio + CVE-2024-26765: (unk) LoongArch: Disable IRQ before init_fn() for nonboot CPUs + CVE-2024-26766: (unk) IB/hfi1: Fix sdma.h tx->num_descs off-by-one error + CVE-2024-26767: (unk) drm/amd/display: fixed integer types and null check locations + CVE-2024-26768: (unk) LoongArch: Change acpi_core_pic[NR_CPUS] to acpi_core_pic[MAX_CORE_PIC] + CVE-2024-26769: (unk) nvmet-fc: avoid deadlock on delete association path + CVE-2024-26770: (unk) HID: nvidia-shield: Add missing null pointer checks to LED initialization + CVE-2024-26771: (unk) dmaengine: ti: edma: Add some null pointer checks to the edma_probe + CVE-2024-26772: (unk) ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal() + CVE-2024-26773: (unk) ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found() + CVE-2024-26774: (unk) ext4: avoid dividing by 0 in mb_update_avg_fragment_size() when block bitmap corrupt + CVE-2024-26775: (unk) aoe: avoid potential deadlock at set_capacity + CVE-2024-26776: (unk) spi: hisi-sfc-v3xx: Return IRQ_NONE if no interrupts were detected + CVE-2024-26777: (unk) fbdev: sis: Error out if pixclock equals zero + CVE-2024-26778: (unk) fbdev: savage: Error out if pixclock equals zero + CVE-2024-26779: (unk) wifi: mac80211: fix race condition on enabling fast-xmit + CVE-2024-26782: (unk) mptcp: fix double-free on socket dismantle + CVE-2024-26783: (unk) mm/vmscan: fix a bug calling wakeup_kswapd() with a wrong zone index + CVE-2024-26784: (unk) pmdomain: arm: Fix NULL dereference on scmi_perf_domain removal + CVE-2024-26787: (unk) mmc: mmci: stm32: fix DMA API overlapping mappings warning + CVE-2024-26788: (unk) dmaengine: fsl-qdma: init irq after reg initialization + CVE-2024-26789: (unk) crypto: arm64/neonbs - fix out-of-bounds access on short input + CVE-2024-26790: (unk) dmaengine: fsl-qdma: fix SoC may hang on 16 byte unaligned read + CVE-2024-26791: (unk) btrfs: dev-replace: properly validate device names + CVE-2024-26793: (unk) gtp: fix use-after-free and null-ptr-deref in gtp_newlink() + CVE-2024-26795: (unk) riscv: Sparse-Memory/vmemmap out-of-bounds fix + CVE-2024-26797: (unk) drm/amd/display: Prevent potential buffer overflow in map_hw_resources + CVE-2024-26798: (unk) fbcon: always restore the old font data in fbcon_do_set_font() + CVE-2024-26799: (unk) ASoC: qcom: Fix uninitialized pointer dmactl + CVE-2024-26801: (unk) Bluetooth: Avoid potential use-after-free in hci_error_reset + CVE-2024-26802: (unk) stmmac: Clear variable when destroying workqueue + CVE-2024-26803: (unk) net: veth: clear GRO when clearing XDP even when down + CVE-2024-26804: (unk) net: ip_tunnel: prevent perpetual headroom growth + CVE-2024-26805: (unk) netlink: Fix kernel-infoleak-after-free in __skb_datagram_iter + CVE-2024-26806: (unk) spi: cadence-qspi: remove system-wide suspend helper calls from runtime PM hooks + CVE-2024-26808: (unk) netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain + CVE-2024-26809: (unk) netfilter: nft_set_pipapo: release elements in clone only from destroy path diff --git a/data/6.4/6.4_CVEs.txt b/data/6.4/6.4_CVEs.txt index c90e69159..526b8a20c 100644 --- a/data/6.4/6.4_CVEs.txt +++ b/data/6.4/6.4_CVEs.txt @@ -71,6 +71,7 @@ CVE-2022-41848: Fix unknown CVE-2022-4543: Fix unknown CVE-2022-45884: Fix unknown CVE-2022-45885: Fix unknown +CVE-2022-48628: Fix not seen in stream CVE-2023-1206: Fixed with 6.4.8 CVE-2023-1476: Fix unknown CVE-2023-20569: Fixed with 6.4.9 @@ -82,6 +83,7 @@ CVE-2023-23039: Fix unknown CVE-2023-25775: Fixed with 6.4.16 CVE-2023-26242: Fix unknown CVE-2023-2640: Fix unknown +CVE-2023-28746: Fix not seen in stream CVE-2023-2898: Fixed with 6.4.4 CVE-2023-31081: Fix unknown CVE-2023-31082: Fix unknown @@ -148,7 +150,7 @@ CVE-2023-46343: Fix not seen in stream CVE-2023-46813: Fix not seen in stream CVE-2023-46838: Fix not seen in stream CVE-2023-46862: Fix not seen in stream -CVE-2023-47233: Fix unknown +CVE-2023-47233: Fix not seen in stream CVE-2023-4881: Fix not seen in stream CVE-2023-4921: Fix not seen in stream CVE-2023-50431: Fix not seen in stream @@ -189,6 +191,136 @@ CVE-2023-52458: Fix not seen in stream CVE-2023-52462: Fix not seen in stream CVE-2023-52463: Fix not seen in stream CVE-2023-52464: Fix not seen in stream +CVE-2023-52467: Fix not seen in stream +CVE-2023-52468: Fix not seen in stream +CVE-2023-52469: Fix not seen in stream +CVE-2023-52470: Fix not seen in stream +CVE-2023-52473: Fix not seen in stream +CVE-2023-52475: Fix not seen in stream +CVE-2023-52476: Fix not seen in stream +CVE-2023-52477: Fix not seen in stream +CVE-2023-52478: Fix not seen in stream +CVE-2023-52479: Fix not seen in stream +CVE-2023-52480: Fix not seen in stream +CVE-2023-52481: Fix not seen in stream +CVE-2023-52482: Fix not seen in stream +CVE-2023-52483: Fix not seen in stream +CVE-2023-52484: Fix not seen in stream +CVE-2023-52485: Fix not seen in stream +CVE-2023-52486: Fix not seen in stream +CVE-2023-52488: Fix not seen in stream +CVE-2023-52489: Fix not seen in stream +CVE-2023-52490: Fix not seen in stream +CVE-2023-52491: Fix not seen in stream +CVE-2023-52492: Fix not seen in stream +CVE-2023-52493: Fix not seen in stream +CVE-2023-52494: Fix not seen in stream +CVE-2023-52495: Fix not seen in stream +CVE-2023-52497: Fix not seen in stream +CVE-2023-52498: Fix not seen in stream +CVE-2023-52499: Fix not seen in stream +CVE-2023-52500: Fix not seen in stream +CVE-2023-52501: Fix not seen in stream +CVE-2023-52502: Fix not seen in stream +CVE-2023-52503: Fix not seen in stream +CVE-2023-52504: Fix not seen in stream +CVE-2023-52505: Fix not seen in stream +CVE-2023-52506: Fix not seen in stream +CVE-2023-52507: Fix not seen in stream +CVE-2023-52508: Fix not seen in stream +CVE-2023-52509: Fix not seen in stream +CVE-2023-52510: Fix not seen in stream +CVE-2023-52511: Fix not seen in stream +CVE-2023-52512: Fix not seen in stream +CVE-2023-52513: Fix not seen in stream +CVE-2023-52515: Fix not seen in stream +CVE-2023-52516: Fix not seen in stream +CVE-2023-52517: Fix not seen in stream +CVE-2023-52518: Fix not seen in stream +CVE-2023-52519: Fix not seen in stream +CVE-2023-52520: Fix not seen in stream +CVE-2023-52522: Fix not seen in stream +CVE-2023-52523: Fix not seen in stream +CVE-2023-52526: Fix not seen in stream +CVE-2023-52527: Fix not seen in stream +CVE-2023-52528: Fix not seen in stream +CVE-2023-52529: Fix not seen in stream +CVE-2023-52530: Fix not seen in stream +CVE-2023-52531: Fix not seen in stream +CVE-2023-52532: Fix not seen in stream +CVE-2023-52559: Fix not seen in stream +CVE-2023-52560: Fix not seen in stream +CVE-2023-52561: Fix not seen in stream +CVE-2023-52562: Fix not seen in stream +CVE-2023-52563: Fix not seen in stream +CVE-2023-52565: Fix not seen in stream +CVE-2023-52566: Fix not seen in stream +CVE-2023-52567: Fix not seen in stream +CVE-2023-52568: Fix not seen in stream +CVE-2023-52569: Fix not seen in stream +CVE-2023-52570: Fix not seen in stream +CVE-2023-52571: Fix not seen in stream +CVE-2023-52572: Fix not seen in stream +CVE-2023-52573: Fix not seen in stream +CVE-2023-52574: Fix not seen in stream +CVE-2023-52576: Fix not seen in stream +CVE-2023-52578: Fix not seen in stream +CVE-2023-52580: Fix not seen in stream +CVE-2023-52582: Fix not seen in stream +CVE-2023-52583: Fix not seen in stream +CVE-2023-52584: Fix not seen in stream +CVE-2023-52585: Fix not seen in stream +CVE-2023-52586: Fix not seen in stream +CVE-2023-52587: Fix not seen in stream +CVE-2023-52588: Fix not seen in stream +CVE-2023-52589: Fix not seen in stream +CVE-2023-52590: Fix not seen in stream +CVE-2023-52591: Fix not seen in stream +CVE-2023-52593: Fix not seen in stream +CVE-2023-52594: Fix not seen in stream +CVE-2023-52595: Fix not seen in stream +CVE-2023-52596: Fix not seen in stream +CVE-2023-52597: Fix not seen in stream +CVE-2023-52598: Fix not seen in stream +CVE-2023-52599: Fix not seen in stream +CVE-2023-52600: Fix not seen in stream +CVE-2023-52601: Fix not seen in stream +CVE-2023-52602: Fix not seen in stream +CVE-2023-52603: Fix not seen in stream +CVE-2023-52604: Fix not seen in stream +CVE-2023-52606: Fix not seen in stream +CVE-2023-52607: Fix not seen in stream +CVE-2023-52608: Fix not seen in stream +CVE-2023-52609: Fix not seen in stream +CVE-2023-52610: Fix not seen in stream +CVE-2023-52611: Fix not seen in stream +CVE-2023-52612: Fix not seen in stream +CVE-2023-52614: Fix not seen in stream +CVE-2023-52615: Fix not seen in stream +CVE-2023-52616: Fix not seen in stream +CVE-2023-52617: Fix not seen in stream +CVE-2023-52618: Fix not seen in stream +CVE-2023-52619: Fix not seen in stream +CVE-2023-52620: Fixed with 6.4 +CVE-2023-52621: Fix not seen in stream +CVE-2023-52622: Fix not seen in stream +CVE-2023-52623: Fix not seen in stream +CVE-2023-52624: Fix not seen in stream +CVE-2023-52625: Fix not seen in stream +CVE-2023-52627: Fix not seen in stream +CVE-2023-52628: Fix not seen in stream +CVE-2023-52629: Fix not seen in stream +CVE-2023-52630: Fix not seen in stream +CVE-2023-52631: Fix not seen in stream +CVE-2023-52632: Fix not seen in stream +CVE-2023-52633: Fix not seen in stream +CVE-2023-52634: Fix not seen in stream +CVE-2023-52635: Fix not seen in stream +CVE-2023-52637: Fix not seen in stream +CVE-2023-52638: Fix not seen in stream +CVE-2023-52639: Fix not seen in stream +CVE-2023-52640: Fix not seen in stream +CVE-2023-52641: Fix not seen in stream CVE-2023-5345: Fix not seen in stream CVE-2023-5633: Fix not seen in stream CVE-2023-5717: Fix not seen in stream @@ -198,11 +330,11 @@ CVE-2023-6121: Fix not seen in stream CVE-2023-6176: Fix not seen in stream CVE-2023-6238: Fix unknown CVE-2023-6240: Fix unknown -CVE-2023-6270: Fix unknown -CVE-2023-6356: Fix unknown +CVE-2023-6270: Fix not seen in stream +CVE-2023-6356: Fix not seen in stream CVE-2023-6531: Fix not seen in stream CVE-2023-6535: Fix unknown -CVE-2023-6536: Fix unknown +CVE-2023-6536: Fix not seen in stream CVE-2023-6546: Fixed with 6.4.12 CVE-2023-6560: Fix not seen in stream CVE-2023-6606: Fix not seen in stream @@ -212,7 +344,7 @@ CVE-2023-6817: Fix not seen in stream CVE-2023-6915: Fix not seen in stream CVE-2023-6931: Fix not seen in stream CVE-2023-6932: Fix not seen in stream -CVE-2023-7042: Fix unknown +CVE-2023-7042: Fix not seen in stream CVE-2024-0564: Fix unknown CVE-2024-0565: Fix not seen in stream CVE-2024-0582: Fix not seen in stream @@ -221,17 +353,18 @@ CVE-2024-0607: Fix not seen in stream CVE-2024-0639: Fixed with 6.4.4 CVE-2024-0641: Fix not seen in stream CVE-2024-0646: Fix not seen in stream -CVE-2024-0841: Fix unknown +CVE-2024-0841: Fix not seen in stream CVE-2024-1085: Fix not seen in stream CVE-2024-1086: Fix not seen in stream CVE-2024-1151: Fix not seen in stream CVE-2024-1312: Fixed with 6.4.10 CVE-2024-21803: Fix unknown -CVE-2024-22099: Fix unknown +CVE-2024-2193: Fix unknown +CVE-2024-22099: Fix not seen in stream CVE-2024-22386: Fix unknown CVE-2024-22705: Fix not seen in stream -CVE-2024-23196: Fix unknown -CVE-2024-23307: Fix unknown +CVE-2024-23196: Fixed with 6.4.12 +CVE-2024-23307: Fix not seen in stream CVE-2024-23848: Fix unknown CVE-2024-23849: Fix not seen in stream CVE-2024-23850: Fix not seen in stream @@ -241,7 +374,7 @@ CVE-2024-24857: Fix unknown CVE-2024-24858: Fix unknown CVE-2024-24859: Fix unknown CVE-2024-24860: Fix not seen in stream -CVE-2024-24861: Fix unknown +CVE-2024-24861: Fix not seen in stream CVE-2024-24864: Fix unknown CVE-2024-25739: Fix unknown CVE-2024-25740: Fix unknown @@ -252,7 +385,6 @@ CVE-2024-26583: Fix not seen in stream CVE-2024-26584: Fix not seen in stream CVE-2024-26585: Fix not seen in stream CVE-2024-26586: Fix not seen in stream -CVE-2024-26587: Fix not seen in stream CVE-2024-26588: Fix not seen in stream CVE-2024-26589: Fix not seen in stream CVE-2024-26590: Fix not seen in stream @@ -265,3 +397,163 @@ CVE-2024-26596: Fix not seen in stream CVE-2024-26597: Fix not seen in stream CVE-2024-26598: Fix not seen in stream CVE-2024-26599: Fix not seen in stream +CVE-2024-26600: Fix not seen in stream +CVE-2024-26601: Fix not seen in stream +CVE-2024-26602: Fix not seen in stream +CVE-2024-26603: Fix not seen in stream +CVE-2024-26606: Fix not seen in stream +CVE-2024-26607: Fix not seen in stream +CVE-2024-26608: Fix not seen in stream +CVE-2024-26610: Fix not seen in stream +CVE-2024-26612: Fix not seen in stream +CVE-2024-26614: Fix not seen in stream +CVE-2024-26615: Fix not seen in stream +CVE-2024-26616: Fix not seen in stream +CVE-2024-26620: Fix not seen in stream +CVE-2024-26622: Fix not seen in stream +CVE-2024-26623: Fix not seen in stream +CVE-2024-26625: Fix not seen in stream +CVE-2024-26627: Fix not seen in stream +CVE-2024-26629: Fix not seen in stream +CVE-2024-26631: Fix not seen in stream +CVE-2024-26632: Fix not seen in stream +CVE-2024-26633: Fix not seen in stream +CVE-2024-26635: Fix not seen in stream +CVE-2024-26636: Fix not seen in stream +CVE-2024-26638: Fix not seen in stream +CVE-2024-26640: Fix not seen in stream +CVE-2024-26641: Fix not seen in stream +CVE-2024-26642: Fix not seen in stream +CVE-2024-26644: Fix not seen in stream +CVE-2024-26645: Fix not seen in stream +CVE-2024-26646: Fix not seen in stream +CVE-2024-26647: Fix not seen in stream +CVE-2024-26648: Fix not seen in stream +CVE-2024-26649: Fix not seen in stream +CVE-2024-26650: Fix not seen in stream +CVE-2024-26651: Fix not seen in stream +CVE-2024-26652: Fix not seen in stream +CVE-2024-26654: Fix not seen in stream +CVE-2024-26655: Fix not seen in stream +CVE-2024-26656: Fix not seen in stream +CVE-2024-26658: Fix not seen in stream +CVE-2024-26659: Fix not seen in stream +CVE-2024-26660: Fix not seen in stream +CVE-2024-26661: Fix not seen in stream +CVE-2024-26662: Fix not seen in stream +CVE-2024-26663: Fix not seen in stream +CVE-2024-26664: Fix not seen in stream +CVE-2024-26665: Fix not seen in stream +CVE-2024-26667: Fix not seen in stream +CVE-2024-26668: Fix not seen in stream +CVE-2024-26669: Fix not seen in stream +CVE-2024-26671: Fix not seen in stream +CVE-2024-26672: Fix not seen in stream +CVE-2024-26673: Fix not seen in stream +CVE-2024-26674: Fix not seen in stream +CVE-2024-26675: Fix not seen in stream +CVE-2024-26676: Fix not seen in stream +CVE-2024-26677: Fix not seen in stream +CVE-2024-26679: Fix not seen in stream +CVE-2024-26680: Fix not seen in stream +CVE-2024-26681: Fix not seen in stream +CVE-2024-26684: Fix not seen in stream +CVE-2024-26685: Fix not seen in stream +CVE-2024-26686: Fix not seen in stream +CVE-2024-26687: Fix not seen in stream +CVE-2024-26688: Fix not seen in stream +CVE-2024-26689: Fix not seen in stream +CVE-2024-26691: Fix not seen in stream +CVE-2024-26692: Fix not seen in stream +CVE-2024-26693: Fix not seen in stream +CVE-2024-26694: Fix not seen in stream +CVE-2024-26695: Fix not seen in stream +CVE-2024-26696: Fix not seen in stream +CVE-2024-26697: Fix not seen in stream +CVE-2024-26698: Fix not seen in stream +CVE-2024-26699: Fix not seen in stream +CVE-2024-26700: Fix not seen in stream +CVE-2024-26702: Fix not seen in stream +CVE-2024-26704: Fix not seen in stream +CVE-2024-26706: Fix not seen in stream +CVE-2024-26707: Fix not seen in stream +CVE-2024-26708: Fix not seen in stream +CVE-2024-26711: Fix not seen in stream +CVE-2024-26712: Fix not seen in stream +CVE-2024-26713: Fix not seen in stream +CVE-2024-26714: Fix not seen in stream +CVE-2024-26715: Fix not seen in stream +CVE-2024-26717: Fix not seen in stream +CVE-2024-26718: Fix not seen in stream +CVE-2024-26719: Fix not seen in stream +CVE-2024-26720: Fix not seen in stream +CVE-2024-26723: Fix not seen in stream +CVE-2024-26726: Fix not seen in stream +CVE-2024-26727: Fix not seen in stream +CVE-2024-26731: Fix not seen in stream +CVE-2024-26733: Fix not seen in stream +CVE-2024-26734: Fix not seen in stream +CVE-2024-26735: Fix not seen in stream +CVE-2024-26736: Fix not seen in stream +CVE-2024-26737: Fix not seen in stream +CVE-2024-26738: Fix not seen in stream +CVE-2024-26739: Fix not seen in stream +CVE-2024-26740: Fix not seen in stream +CVE-2024-26741: Fix not seen in stream +CVE-2024-26742: Fix not seen in stream +CVE-2024-26743: Fix not seen in stream +CVE-2024-26744: Fix not seen in stream +CVE-2024-26745: Fix not seen in stream +CVE-2024-26746: Fix not seen in stream +CVE-2024-26747: Fix not seen in stream +CVE-2024-26748: Fix not seen in stream +CVE-2024-26749: Fix not seen in stream +CVE-2024-26751: Fix not seen in stream +CVE-2024-26752: Fix not seen in stream +CVE-2024-26753: Fix not seen in stream +CVE-2024-26754: Fix not seen in stream +CVE-2024-26756: Fix not seen in stream +CVE-2024-26757: Fix not seen in stream +CVE-2024-26758: Fix not seen in stream +CVE-2024-26759: Fix not seen in stream +CVE-2024-26760: Fix not seen in stream +CVE-2024-26761: Fix not seen in stream +CVE-2024-26763: Fix not seen in stream +CVE-2024-26764: Fix not seen in stream +CVE-2024-26765: Fix not seen in stream +CVE-2024-26766: Fix not seen in stream +CVE-2024-26767: Fix not seen in stream +CVE-2024-26768: Fix not seen in stream +CVE-2024-26769: Fix not seen in stream +CVE-2024-26770: Fix not seen in stream +CVE-2024-26771: Fix not seen in stream +CVE-2024-26772: Fix not seen in stream +CVE-2024-26773: Fix not seen in stream +CVE-2024-26774: Fix not seen in stream +CVE-2024-26775: Fix not seen in stream +CVE-2024-26776: Fix not seen in stream +CVE-2024-26777: Fix not seen in stream +CVE-2024-26778: Fix not seen in stream +CVE-2024-26779: Fix not seen in stream +CVE-2024-26782: Fix not seen in stream +CVE-2024-26783: Fix not seen in stream +CVE-2024-26784: Fix not seen in stream +CVE-2024-26787: Fix not seen in stream +CVE-2024-26788: Fix not seen in stream +CVE-2024-26789: Fix not seen in stream +CVE-2024-26790: Fix not seen in stream +CVE-2024-26791: Fix not seen in stream +CVE-2024-26793: Fix not seen in stream +CVE-2024-26795: Fix not seen in stream +CVE-2024-26797: Fix not seen in stream +CVE-2024-26798: Fix not seen in stream +CVE-2024-26799: Fix not seen in stream +CVE-2024-26801: Fix not seen in stream +CVE-2024-26802: Fix not seen in stream +CVE-2024-26803: Fix not seen in stream +CVE-2024-26804: Fix not seen in stream +CVE-2024-26805: Fix not seen in stream +CVE-2024-26806: Fix not seen in stream +CVE-2024-26807: Fix not seen in stream +CVE-2024-26808: Fix not seen in stream +CVE-2024-26809: Fix not seen in stream diff --git a/data/6.4/6.4_security.txt b/data/6.4/6.4_security.txt index 8b3d9a44d..a646b511d 100644 --- a/data/6.4/6.4_security.txt +++ b/data/6.4/6.4_security.txt @@ -5,6 +5,7 @@ CVEs fixed in 6.4: CVE-2023-3865: 5fe7f7b78290638806211046a99f031ff26164e1 ksmbd: fix out-of-bound read in smb2_write CVE-2023-3866: 5005bcb4219156f1bf7587b185080ec1da08518e ksmbd: validate session id and tree id in the compound request CVE-2023-4610: 71c3ad65fabec9620d3f548b2da948c79c7ad9d5 Revert "mm: vmscan: make global slab shrink lockless" + CVE-2023-52620: e26d3009efda338f19016df4175f354a9bd0a4ab netfilter: nf_tables: disallow timeout for anonymous sets CVEs fixed in 6.4.1: CVE-2023-3269: b11fa3d22ac0fbc0bfaa740b3b3669d43ec48503 mm: introduce new 'lock_mm_and_find_vma()' page fault helper @@ -71,6 +72,7 @@ CVEs fixed in 6.4.12: CVE-2023-4569: 83ff16e449a675e215125d97a2c4a7f097d291d0 netfilter: nf_tables: deactivate catchall elements in next generation CVE-2023-51042: f5db29ce2502c4fc8a33ed7989950ba43875e322 drm/amdgpu: Fix potential fence use-after-free v2 CVE-2023-6546: f40e70d7f40bd44ecf6f35b946a899e59744fbe1 tty: n_gsm: fix the UAF caused by race condition in gsm_cleanup_mux + CVE-2024-23196: b32e40379e5b2814de0c4bc199edc2d82317dc07 ALSA: hda: fix a possible null-pointer dereference due to data race in snd_hdac_regmap_sync() CVEs fixed in 6.4.13: CVE-2022-36402: 5574b0cbb493f3b3cbb2c381e8e1dac52a70213f drm/vmwgfx: Fix shader stage validation @@ -162,12 +164,14 @@ Outstanding CVEs: CVE-2022-4543: (unk) CVE-2022-45884: (unk) CVE-2022-45885: (unk) + CVE-2022-48628: (unk) ceph: drop messages from MDS when unmounting CVE-2023-1476: (unk) CVE-2023-20941: (unk) CVE-2023-21400: (unk) CVE-2023-23039: (unk) CVE-2023-26242: (unk) CVE-2023-2640: (unk) + CVE-2023-28746: (unk) x86/mmio: Disable KVM mitigation when X86_FEATURE_CLEAR_CPU_BUF is set CVE-2023-31081: (unk) CVE-2023-31082: (unk) CVE-2023-31083: (unk) Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO @@ -187,7 +191,7 @@ Outstanding CVEs: CVE-2023-46813: (unk) x86/sev: Check for user-space IOIO pointing to kernel space CVE-2023-46838: (unk) xen-netback: don't produce zero-size SKB frags CVE-2023-46862: (unk) io_uring/fdinfo: lock SQ thread while retrieving thread cpu/pid - CVE-2023-47233: (unk) + CVE-2023-47233: (unk) wifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach CVE-2023-4881: (unk) netfilter: nftables: exthdr: fix 4-byte stack OOB write CVE-2023-4921: (unk) net: sched: sch_qfq: Fix UAF in qfq_dequeue() CVE-2023-50431: (unk) accel/habanalabs: fix information leak in sec_attest_info() @@ -223,6 +227,135 @@ Outstanding CVEs: CVE-2023-52462: (unk) bpf: fix check for attempt to corrupt spilled pointer CVE-2023-52463: (unk) efivarfs: force RO when remounting if SetVariable is not supported CVE-2023-52464: (unk) EDAC/thunderx: Fix possible out-of-bounds string access + CVE-2023-52467: (unk) mfd: syscon: Fix null pointer dereference in of_syscon_register() + CVE-2023-52468: (unk) class: fix use-after-free in class_register() + CVE-2023-52469: (unk) drivers/amd/pm: fix a use-after-free in kv_parse_power_table + CVE-2023-52470: (unk) drm/radeon: check the alloc_workqueue return value in radeon_crtc_init() + CVE-2023-52473: (unk) thermal: core: Fix NULL pointer dereference in zone registration error path + CVE-2023-52475: (unk) Input: powermate - fix use-after-free in powermate_config_complete + CVE-2023-52476: (unk) perf/x86/lbr: Filter vsyscall addresses + CVE-2023-52477: (unk) usb: hub: Guard against accesses to uninitialized BOS descriptors + CVE-2023-52478: (unk) HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect + CVE-2023-52479: (unk) ksmbd: fix uaf in smb20_oplock_break_ack + CVE-2023-52480: (unk) ksmbd: fix race condition between session lookup and expire + CVE-2023-52481: (unk) arm64: errata: Add Cortex-A520 speculative unprivileged load workaround + CVE-2023-52482: (unk) x86/srso: Add SRSO mitigation for Hygon processors + CVE-2023-52483: (unk) mctp: perform route lookups under a RCU read-side lock + CVE-2023-52484: (unk) iommu/arm-smmu-v3: Fix soft lockup triggered by arm_smmu_mm_invalidate_range + CVE-2023-52485: (unk) drm/amd/display: Wake DMCUB before sending a command + CVE-2023-52486: (unk) drm: Don't unref the same fb many times by mistake due to deadlock handling + CVE-2023-52488: (unk) serial: sc16is7xx: convert from _raw_ to _noinc_ regmap functions for FIFO + CVE-2023-52489: (unk) mm/sparsemem: fix race in accessing memory_section->usage + CVE-2023-52490: (unk) mm: migrate: fix getting incorrect page mapping during page migration + CVE-2023-52491: (unk) media: mtk-jpeg: Fix use after free bug due to error path handling in mtk_jpeg_dec_device_run + CVE-2023-52492: (unk) dmaengine: fix NULL pointer in channel unregistration function + CVE-2023-52493: (unk) bus: mhi: host: Drop chan lock before queuing buffers + CVE-2023-52494: (unk) bus: mhi: host: Add alignment check for event ring read pointer + CVE-2023-52495: (unk) soc: qcom: pmic_glink_altmode: fix port sanity check + CVE-2023-52497: (unk) erofs: fix lz4 inplace decompression + CVE-2023-52498: (unk) PM: sleep: Fix possible deadlocks in core system-wide PM code + CVE-2023-52499: (unk) powerpc/47x: Fix 47x syscall return crash + CVE-2023-52500: (unk) scsi: pm80xx: Avoid leaking tags when processing OPC_INB_SET_CONTROLLER_CONFIG command + CVE-2023-52501: (unk) ring-buffer: Do not attempt to read past "commit" + CVE-2023-52502: (unk) net: nfc: fix races in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn() + CVE-2023-52503: (unk) tee: amdtee: fix use-after-free vulnerability in amdtee_close_session + CVE-2023-52504: (unk) x86/alternatives: Disable KASAN in apply_alternatives() + CVE-2023-52505: (unk) phy: lynx-28g: serialize concurrent phy_set_mode_ext() calls to shared registers + CVE-2023-52506: (unk) LoongArch: Set all reserved memblocks on Node#0 at initialization + CVE-2023-52507: (unk) nfc: nci: assert requested protocol is valid + CVE-2023-52508: (unk) nvme-fc: Prevent null pointer dereference in nvme_fc_io_getuuid() + CVE-2023-52509: (unk) ravb: Fix use-after-free issue in ravb_tx_timeout_work() + CVE-2023-52510: (unk) ieee802154: ca8210: Fix a potential UAF in ca8210_probe + CVE-2023-52511: (unk) spi: sun6i: reduce DMA RX transfer width to single byte + CVE-2023-52512: (unk) pinctrl: nuvoton: wpcm450: fix out of bounds write + CVE-2023-52513: (unk) RDMA/siw: Fix connection failure handling + CVE-2023-52515: (unk) RDMA/srp: Do not call scsi_done() from srp_abort() + CVE-2023-52516: (unk) dma-debug: don't call __dma_entry_alloc_check_leak() under free_entries_lock + CVE-2023-52517: (unk) spi: sun6i: fix race between DMA RX transfer completion and RX FIFO drain + CVE-2023-52518: (unk) Bluetooth: hci_codec: Fix leaking content of local_codecs + CVE-2023-52519: (unk) HID: intel-ish-hid: ipc: Disable and reenable ACPI GPE bit + CVE-2023-52520: (unk) platform/x86: think-lmi: Fix reference leak + CVE-2023-52522: (unk) net: fix possible store tearing in neigh_periodic_work() + CVE-2023-52523: (unk) bpf, sockmap: Reject sk_msg egress redirects to non-TCP sockets + CVE-2023-52526: (unk) erofs: fix memory leak of LZMA global compressed deduplication + CVE-2023-52527: (unk) ipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data() + CVE-2023-52528: (unk) net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg + CVE-2023-52529: (unk) HID: sony: Fix a potential memory leak in sony_probe() + CVE-2023-52530: (unk) wifi: mac80211: fix potential key use-after-free + CVE-2023-52531: (unk) wifi: iwlwifi: mvm: Fix a memory corruption issue + CVE-2023-52532: (unk) net: mana: Fix TX CQE error handling + CVE-2023-52559: (unk) iommu/vt-d: Avoid memory allocation in iommu_suspend() + CVE-2023-52560: (unk) mm/damon/vaddr-test: fix memory leak in damon_do_test_apply_three_regions() + CVE-2023-52561: (unk) arm64: dts: qcom: sdm845-db845c: Mark cont splash memory region as reserved + CVE-2023-52562: (unk) mm/slab_common: fix slab_caches list corruption after kmem_cache_destroy() + CVE-2023-52563: (unk) drm/meson: fix memory leak on ->hpd_notify callback + CVE-2023-52565: (unk) media: uvcvideo: Fix OOB read + CVE-2023-52566: (unk) nilfs2: fix potential use after free in nilfs_gccache_submit_read_data() + CVE-2023-52567: (unk) serial: 8250_port: Check IRQ data before use + CVE-2023-52568: (unk) x86/sgx: Resolves SECS reclaim vs. page fault for EAUG race + CVE-2023-52569: (unk) btrfs: remove BUG() after failure to insert delayed dir index item + CVE-2023-52570: (unk) vfio/mdev: Fix a null-ptr-deref bug for mdev_unregister_parent() + CVE-2023-52571: (unk) power: supply: rk817: Fix node refcount leak + CVE-2023-52572: (unk) cifs: Fix UAF in cifs_demultiplex_thread() + CVE-2023-52573: (unk) net: rds: Fix possible NULL-pointer dereference + CVE-2023-52574: (unk) team: fix null-ptr-deref when team device type is changed + CVE-2023-52576: (unk) x86/mm, kexec, ima: Use memblock_free_late() from ima_free_kexec_buffer() + CVE-2023-52578: (unk) net: bridge: use DEV_STATS_INC() + CVE-2023-52580: (unk) net/core: Fix ETH_P_1588 flow dissector + CVE-2023-52582: (unk) netfs: Only call folio_start_fscache() one time for each folio + CVE-2023-52583: (unk) ceph: fix deadlock or deadcode of misusing dget() + CVE-2023-52584: (unk) spmi: mediatek: Fix UAF on device remove + CVE-2023-52585: (unk) drm/amdgpu: Fix possible NULL dereference in amdgpu_ras_query_error_status_helper() + CVE-2023-52586: (unk) drm/msm/dpu: Add mutex lock in control vblank irq + CVE-2023-52587: (unk) IB/ipoib: Fix mcast list locking + CVE-2023-52588: (unk) f2fs: fix to tag gcing flag on page during block migration + CVE-2023-52589: (unk) media: rkisp1: Fix IRQ disable race issue + CVE-2023-52590: (unk) ocfs2: Avoid touching renamed directory if parent does not change + CVE-2023-52591: (unk) reiserfs: Avoid touching renamed directory if parent does not change + CVE-2023-52593: (unk) wifi: wfx: fix possible NULL pointer dereference in wfx_set_mfp_ap() + CVE-2023-52594: (unk) wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus() + CVE-2023-52595: (unk) wifi: rt2x00: restart beacon queue when hardware reset + CVE-2023-52596: (unk) sysctl: Fix out of bounds access for empty sysctl registers + CVE-2023-52597: (unk) KVM: s390: fix setting of fpc register + CVE-2023-52598: (unk) s390/ptrace: handle setting of fpc register correctly + CVE-2023-52599: (unk) jfs: fix array-index-out-of-bounds in diNewExt + CVE-2023-52600: (unk) jfs: fix uaf in jfs_evict_inode + CVE-2023-52601: (unk) jfs: fix array-index-out-of-bounds in dbAdjTree + CVE-2023-52602: (unk) jfs: fix slab-out-of-bounds Read in dtSearch + CVE-2023-52603: (unk) UBSAN: array-index-out-of-bounds in dtSplitRoot + CVE-2023-52604: (unk) FS:JFS:UBSAN:array-index-out-of-bounds in dbAdjTree + CVE-2023-52606: (unk) powerpc/lib: Validate size for vector operations + CVE-2023-52607: (unk) powerpc/mm: Fix null-pointer dereference in pgtable_cache_add + CVE-2023-52608: (unk) firmware: arm_scmi: Check mailbox/SMT channel for consistency + CVE-2023-52609: (unk) binder: fix race between mmput() and do_exit() + CVE-2023-52610: (unk) net/sched: act_ct: fix skb leak and crash on ooo frags + CVE-2023-52611: (unk) wifi: rtw88: sdio: Honor the host max_req_size in the RX path + CVE-2023-52612: (unk) crypto: scomp - fix req->dst buffer overflow + CVE-2023-52614: (unk) PM / devfreq: Fix buffer overflow in trans_stat_show + CVE-2023-52615: (unk) hwrng: core - Fix page fault dead lock on mmap-ed hwrng + CVE-2023-52616: (unk) crypto: lib/mpi - Fix unexpected pointer access in mpi_ec_init + CVE-2023-52617: (unk) PCI: switchtec: Fix stdev_release() crash after surprise hot remove + CVE-2023-52618: (unk) block/rnbd-srv: Check for unlikely string overflow + CVE-2023-52619: (unk) pstore/ram: Fix crash when setting number of cpus to an odd number + CVE-2023-52621: (unk) bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers + CVE-2023-52622: (unk) ext4: avoid online resizing failures due to oversized flex bg + CVE-2023-52623: (unk) SUNRPC: Fix a suspicious RCU usage warning + CVE-2023-52624: (unk) drm/amd/display: Wake DMCUB before executing GPINT commands + CVE-2023-52625: (unk) drm/amd/display: Refactor DMCUB enter/exit idle interface + CVE-2023-52627: (unk) iio: adc: ad7091r: Allow users to configure device events + CVE-2023-52628: (unk) netfilter: nftables: exthdr: fix 4-byte stack OOB write + CVE-2023-52629: (unk) sh: push-switch: Reorder cleanup operations to avoid use-after-free bug + CVE-2023-52630: (unk) blk-iocost: Fix an UBSAN shift-out-of-bounds warning + CVE-2023-52631: (unk) fs/ntfs3: Fix an NULL dereference bug + CVE-2023-52632: (unk) drm/amdkfd: Fix lock dependency warning with srcu + CVE-2023-52633: (unk) um: time-travel: fix time corruption + CVE-2023-52634: (unk) drm/amd/display: Fix disable_otg_wa logic + CVE-2023-52635: (unk) PM / devfreq: Synchronize devfreq_monitor_[start/stop] + CVE-2023-52637: (unk) can: j1939: Fix UAF in j1939_sk_match_filter during setsockopt(SO_J1939_FILTER) + CVE-2023-52638: (unk) can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock + CVE-2023-52639: (unk) KVM: s390: vsie: fix race during shadow creation + CVE-2023-52640: (unk) fs/ntfs3: Fix oob in ntfs_listxattr + CVE-2023-52641: (unk) fs/ntfs3: Add NULL ptr dereference checking at the end of attr_allocate_frame() CVE-2023-5345: (unk) fs/smb/client: Reset password pointer to NULL CVE-2023-5633: (unk) drm/vmwgfx: Keep a gem reference to user bos in surfaces CVE-2023-5717: (unk) perf: Disallow mis-matched inherited group reads @@ -231,11 +364,11 @@ Outstanding CVEs: CVE-2023-6176: (unk) net/tls: do not free tls_rec on async operation in bpf_exec_tx_verdict() CVE-2023-6238: (unk) CVE-2023-6240: (unk) - CVE-2023-6270: (unk) - CVE-2023-6356: (unk) + CVE-2023-6270: (unk) aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts + CVE-2023-6356: (unk) nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length CVE-2023-6531: (unk) io_uring/af_unix: disable sending io_uring over sockets CVE-2023-6535: (unk) - CVE-2023-6536: (unk) + CVE-2023-6536: (unk) nvmet-tcp: fix a crash in nvmet_req_complete() CVE-2023-6560: (unk) io_uring: don't allow discontig pages for IORING_SETUP_NO_MMAP CVE-2023-6606: (unk) smb: client: fix OOB in smbCalcSize() CVE-2023-6610: (unk) smb: client: fix potential OOB in smb2_dump_detail() @@ -244,7 +377,7 @@ Outstanding CVEs: CVE-2023-6915: (unk) ida: Fix crash in ida_free when the bitmap is empty CVE-2023-6931: (unk) perf: Fix perf_event_validate_size() CVE-2023-6932: (unk) ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet - CVE-2023-7042: (unk) + CVE-2023-7042: (unk) wifi: ath10k: fix NULL pointer dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev() CVE-2024-0564: (unk) CVE-2024-0565: (unk) smb: client: fix OOB in receive_encrypted_standard() CVE-2024-0582: (unk) io_uring/kbuf: defer release of mapped buffer rings @@ -252,16 +385,16 @@ Outstanding CVEs: CVE-2024-0607: (unk) netfilter: nf_tables: fix pointer math issue in nft_byteorder_eval() CVE-2024-0641: (unk) tipc: fix a potential deadlock on &tx->lock CVE-2024-0646: (unk) net: tls, update curr on splice as well - CVE-2024-0841: (unk) + CVE-2024-0841: (unk) fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super CVE-2024-1085: (unk) netfilter: nf_tables: check if catch-all set element is active in next generation CVE-2024-1086: (unk) netfilter: nf_tables: reject QUEUE/DROP verdict parameters CVE-2024-1151: (unk) net: openvswitch: limit the number of recursions from action sets CVE-2024-21803: (unk) - CVE-2024-22099: (unk) + CVE-2024-2193: (unk) + CVE-2024-22099: (unk) Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security CVE-2024-22386: (unk) CVE-2024-22705: (unk) ksmbd: fix slab-out-of-bounds in smb_strndup_from_utf16() - CVE-2024-23196: (unk) - CVE-2024-23307: (unk) + CVE-2024-23307: (unk) md/raid5: fix atomicity violation in raid5_cache_count CVE-2024-23848: (unk) CVE-2024-23849: (unk) net/rds: Fix UBSAN: array-index-out-of-bounds in rds_cmsg_recv CVE-2024-23850: (unk) btrfs: do not ASSERT() if the newly created subvolume already got read @@ -271,7 +404,7 @@ Outstanding CVEs: CVE-2024-24858: (unk) CVE-2024-24859: (unk) CVE-2024-24860: (unk) Bluetooth: Fix atomicity violation in {min,max}_key_size_set - CVE-2024-24861: (unk) + CVE-2024-24861: (unk) media: xc4000: Fix atomicity violation in xc4000_get_frequency CVE-2024-24864: (unk) CVE-2024-25739: (unk) CVE-2024-25740: (unk) @@ -282,7 +415,6 @@ Outstanding CVEs: CVE-2024-26584: (unk) net: tls: handle backlogging of crypto requests CVE-2024-26585: (unk) tls: fix race between tx work scheduling and socket close CVE-2024-26586: (unk) mlxsw: spectrum_acl_tcam: Fix stack corruption - CVE-2024-26587: (unk) net: netdevsim: don't try to destroy PHC on VFs CVE-2024-26588: (unk) LoongArch: BPF: Prevent out-of-bounds memory access CVE-2024-26589: (unk) bpf: Reject variable offset alu on PTR_TO_FLOW_KEYS CVE-2024-26590: (unk) erofs: fix inconsistent per-file compression format @@ -295,3 +427,163 @@ Outstanding CVEs: CVE-2024-26597: (unk) net: qualcomm: rmnet: fix global oob in rmnet_policy CVE-2024-26598: (unk) KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache CVE-2024-26599: (unk) pwm: Fix out-of-bounds access in of_pwm_single_xlate() + CVE-2024-26600: (unk) phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP + CVE-2024-26601: (unk) ext4: regenerate buddy after block freeing failed if under fc replay + CVE-2024-26602: (unk) sched/membarrier: reduce the ability to hammer on sys_membarrier + CVE-2024-26603: (unk) x86/fpu: Stop relying on userspace for info to fault in xsave buffer + CVE-2024-26606: (unk) binder: signal epoll threads of self-work + CVE-2024-26607: (unk) drm/bridge: sii902x: Fix probing race issue + CVE-2024-26608: (unk) ksmbd: fix global oob in ksmbd_nl_policy + CVE-2024-26610: (unk) wifi: iwlwifi: fix a memory corruption + CVE-2024-26612: (unk) netfs, fscache: Prevent Oops in fscache_put_cache() + CVE-2024-26614: (unk) tcp: make sure init the accept_queue's spinlocks once + CVE-2024-26615: (unk) net/smc: fix illegal rmb_desc access in SMC-D connection dump + CVE-2024-26616: (unk) btrfs: scrub: avoid use-after-free when chunk length is not 64K aligned + CVE-2024-26620: (unk) s390/vfio-ap: always filter entire AP matrix + CVE-2024-26622: (unk) tomoyo: fix UAF write bug in tomoyo_write_control() + CVE-2024-26623: (unk) pds_core: Prevent race issues involving the adminq + CVE-2024-26625: (unk) llc: call sock_orphan() at release time + CVE-2024-26627: (unk) scsi: core: Move scsi_host_busy() out of host lock for waking up EH handler + CVE-2024-26629: (unk) nfsd: fix RELEASE_LOCKOWNER + CVE-2024-26631: (unk) ipv6: mcast: fix data-race in ipv6_mc_down / mld_ifc_work + CVE-2024-26632: (unk) block: Fix iterating over an empty bio with bio_for_each_folio_all + CVE-2024-26633: (unk) ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim() + CVE-2024-26635: (unk) llc: Drop support for ETH_P_TR_802_2. + CVE-2024-26636: (unk) llc: make llc_ui_sendmsg() more robust against bonding changes + CVE-2024-26638: (unk) nbd: always initialize struct msghdr completely + CVE-2024-26640: (unk) tcp: add sanity checks to rx zerocopy + CVE-2024-26641: (unk) ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv() + CVE-2024-26642: (unk) netfilter: nf_tables: disallow anonymous set with timeout flag + CVE-2024-26644: (unk) btrfs: don't abort filesystem when attempting to snapshot deleted subvolume + CVE-2024-26645: (unk) tracing: Ensure visibility when inserting an element into tracing_map + CVE-2024-26646: (unk) thermal: intel: hfi: Add syscore callbacks for system-wide PM + CVE-2024-26647: (unk) drm/amd/display: Fix late derefrence 'dsc' check in 'link_set_dsc_pps_packet()' + CVE-2024-26648: (unk) drm/amd/display: Fix variable deferencing before NULL check in edp_setup_replay() + CVE-2024-26649: (unk) drm/amdgpu: Fix the null pointer when load rlc firmware + CVE-2024-26650: (unk) platform/x86: p2sb: Allow p2sb_bar() calls during PCI device probe + CVE-2024-26651: (unk) sr9800: Add check for usbnet_get_endpoints + CVE-2024-26652: (unk) net: pds_core: Fix possible double free in error handling path + CVE-2024-26654: (unk) ALSA: sh: aica: reorder cleanup operations to avoid UAF bugs + CVE-2024-26655: (unk) Fix memory leak in posix_clock_open() + CVE-2024-26656: (unk) drm/amdgpu: fix use-after-free bug + CVE-2024-26658: (unk) bcachefs: grab s_umount only if snapshotting + CVE-2024-26659: (unk) xhci: handle isoc Babble and Buffer Overrun events properly + CVE-2024-26660: (unk) drm/amd/display: Implement bounds check for stream encoder creation in DCN301 + CVE-2024-26661: (unk) drm/amd/display: Add NULL test for 'timing generator' in 'dcn21_set_pipe()' + CVE-2024-26662: (unk) drm/amd/display: Fix 'panel_cntl' could be null in 'dcn21_set_backlight_level()' + CVE-2024-26663: (unk) tipc: Check the bearer type before calling tipc_udp_nl_bearer_add() + CVE-2024-26664: (unk) hwmon: (coretemp) Fix out-of-bounds memory access + CVE-2024-26665: (unk) tunnels: fix out of bounds access when building IPv6 PMTU error + CVE-2024-26667: (unk) drm/msm/dpu: check for valid hw_pp in dpu_encoder_helper_phys_cleanup + CVE-2024-26668: (unk) netfilter: nft_limit: reject configurations that cause integer overflow + CVE-2024-26669: (unk) net/sched: flower: Fix chain template offload + CVE-2024-26671: (unk) blk-mq: fix IO hang from sbitmap wakeup race + CVE-2024-26672: (unk) drm/amdgpu: Fix variable 'mca_funcs' dereferenced before NULL check in 'amdgpu_mca_smu_get_mca_entry()' + CVE-2024-26673: (unk) netfilter: nft_ct: sanitize layer 3 and 4 protocol number in custom expectations + CVE-2024-26674: (unk) x86/lib: Revert to _ASM_EXTABLE_UA() for {get,put}_user() fixups + CVE-2024-26675: (unk) ppp_async: limit MRU to 64K + CVE-2024-26676: (unk) af_unix: Call kfree_skb() for dead unix_(sk)->oob_skb in GC. + CVE-2024-26677: (unk) rxrpc: Fix delayed ACKs to not set the reference serial number + CVE-2024-26679: (unk) inet: read sk->sk_family once in inet_recv_error() + CVE-2024-26680: (unk) net: atlantic: Fix DMA mapping for PTP hwts ring + CVE-2024-26681: (unk) netdevsim: avoid potential loop in nsim_dev_trap_report_work() + CVE-2024-26684: (unk) net: stmmac: xgmac: fix handling of DPP safety error for DMA channels + CVE-2024-26685: (unk) nilfs2: fix potential bug in end_buffer_async_write + CVE-2024-26686: (unk) fs/proc: do_task_stat: use sig->stats_lock to gather the threads/children stats + CVE-2024-26687: (unk) xen/events: close evtchn after mapping cleanup + CVE-2024-26688: (unk) fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super + CVE-2024-26689: (unk) ceph: prevent use-after-free in encode_cap_msg() + CVE-2024-26691: (unk) KVM: arm64: Fix circular locking dependency + CVE-2024-26692: (unk) smb: Fix regression in writes when non-standard maximum write size negotiated + CVE-2024-26693: (unk) wifi: iwlwifi: mvm: fix a crash when we run out of stations + CVE-2024-26694: (unk) wifi: iwlwifi: fix double-free bug + CVE-2024-26695: (unk) crypto: ccp - Fix null pointer dereference in __sev_platform_shutdown_locked + CVE-2024-26696: (unk) nilfs2: fix hang in nilfs_lookup_dirty_data_buffers() + CVE-2024-26697: (unk) nilfs2: fix data corruption in dsync block recovery for small block sizes + CVE-2024-26698: (unk) hv_netvsc: Fix race condition between netvsc_probe and netvsc_remove + CVE-2024-26699: (unk) drm/amd/display: Fix array-index-out-of-bounds in dcn35_clkmgr + CVE-2024-26700: (unk) drm/amd/display: Fix MST Null Ptr for RV + CVE-2024-26702: (unk) iio: magnetometer: rm3100: add boundary check for the value read from RM3100_REG_TMRC + CVE-2024-26704: (unk) ext4: fix double-free of blocks due to wrong extents moved_len + CVE-2024-26706: (unk) parisc: Fix random data corruption from exception handler + CVE-2024-26707: (unk) net: hsr: remove WARN_ONCE() in send_hsr_supervision_frame() + CVE-2024-26708: (unk) mptcp: really cope with fastopen race + CVE-2024-26711: (unk) iio: adc: ad4130: zero-initialize clock init data + CVE-2024-26712: (unk) powerpc/kasan: Fix addr error caused by page alignment + CVE-2024-26713: (unk) powerpc/pseries/iommu: Fix iommu initialisation during DLPAR add + CVE-2024-26714: (unk) interconnect: qcom: sc8180x: Mark CO0 BCM keepalive + CVE-2024-26715: (unk) usb: dwc3: gadget: Fix NULL pointer dereference in dwc3_gadget_suspend + CVE-2024-26717: (unk) HID: i2c-hid-of: fix NULL-deref on failed power up + CVE-2024-26718: (unk) dm-crypt, dm-verity: disable tasklets + CVE-2024-26719: (unk) nouveau: offload fence uevents work to workqueue + CVE-2024-26720: (unk) mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again + CVE-2024-26723: (unk) lan966x: Fix crash when adding interface under a lag + CVE-2024-26726: (unk) btrfs: don't drop extent_map for free space inode on write error + CVE-2024-26727: (unk) btrfs: do not ASSERT() if the newly created subvolume already got read + CVE-2024-26731: (unk) bpf, sockmap: Fix NULL pointer dereference in sk_psock_verdict_data_ready() + CVE-2024-26733: (unk) arp: Prevent overflow in arp_req_get(). + CVE-2024-26734: (unk) devlink: fix possible use-after-free and memory leaks in devlink_init() + CVE-2024-26735: (unk) ipv6: sr: fix possible use-after-free and null-ptr-deref + CVE-2024-26736: (unk) afs: Increase buffer size in afs_update_volume_status() + CVE-2024-26737: (unk) bpf: Fix racing between bpf_timer_cancel_and_free and bpf_timer_cancel + CVE-2024-26738: (unk) powerpc/pseries/iommu: DLPAR add doesn't completely initialize pci_controller + CVE-2024-26739: (unk) net/sched: act_mirred: don't override retval if we already lost the skb + CVE-2024-26740: (unk) net/sched: act_mirred: use the backlog for mirred ingress + CVE-2024-26741: (unk) dccp/tcp: Unhash sk from ehash for tb2 alloc failure after check_estalblished(). + CVE-2024-26742: (unk) scsi: smartpqi: Fix disable_managed_interrupts + CVE-2024-26743: (unk) RDMA/qedr: Fix qedr_create_user_qp error flow + CVE-2024-26744: (unk) RDMA/srpt: Support specifying the srpt_service_guid parameter + CVE-2024-26745: (unk) powerpc/pseries/iommu: IOMMU table is not initialized for kdump over SR-IOV + CVE-2024-26746: (unk) dmaengine: idxd: Ensure safe user copy of completion record + CVE-2024-26747: (unk) usb: roles: fix NULL pointer issue when put module's reference + CVE-2024-26748: (unk) usb: cdns3: fix memory double free when handle zero packet + CVE-2024-26749: (unk) usb: cdns3: fixed memory use after free at cdns3_gadget_ep_disable() + CVE-2024-26751: (unk) ARM: ep93xx: Add terminator to gpiod_lookup_table + CVE-2024-26752: (unk) l2tp: pass correct message length to ip6_append_data + CVE-2024-26753: (unk) crypto: virtio/akcipher - Fix stack overflow on memcpy + CVE-2024-26754: (unk) gtp: fix use-after-free and null-ptr-deref in gtp_genl_dump_pdp() + CVE-2024-26756: (unk) md: Don't register sync_thread for reshape directly + CVE-2024-26757: (unk) md: Don't ignore read-only array in md_check_recovery() + CVE-2024-26758: (unk) md: Don't ignore suspended array in md_check_recovery() + CVE-2024-26759: (unk) mm/swap: fix race when skipping swapcache + CVE-2024-26760: (unk) scsi: target: pscsi: Fix bio_put() for error case + CVE-2024-26761: (unk) cxl/pci: Fix disabling memory if DVSEC CXL Range does not match a CFMWS window + CVE-2024-26763: (unk) dm-crypt: don't modify the data when using authenticated encryption + CVE-2024-26764: (unk) fs/aio: Restrict kiocb_set_cancel_fn() to I/O submitted via libaio + CVE-2024-26765: (unk) LoongArch: Disable IRQ before init_fn() for nonboot CPUs + CVE-2024-26766: (unk) IB/hfi1: Fix sdma.h tx->num_descs off-by-one error + CVE-2024-26767: (unk) drm/amd/display: fixed integer types and null check locations + CVE-2024-26768: (unk) LoongArch: Change acpi_core_pic[NR_CPUS] to acpi_core_pic[MAX_CORE_PIC] + CVE-2024-26769: (unk) nvmet-fc: avoid deadlock on delete association path + CVE-2024-26770: (unk) HID: nvidia-shield: Add missing null pointer checks to LED initialization + CVE-2024-26771: (unk) dmaengine: ti: edma: Add some null pointer checks to the edma_probe + CVE-2024-26772: (unk) ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal() + CVE-2024-26773: (unk) ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found() + CVE-2024-26774: (unk) ext4: avoid dividing by 0 in mb_update_avg_fragment_size() when block bitmap corrupt + CVE-2024-26775: (unk) aoe: avoid potential deadlock at set_capacity + CVE-2024-26776: (unk) spi: hisi-sfc-v3xx: Return IRQ_NONE if no interrupts were detected + CVE-2024-26777: (unk) fbdev: sis: Error out if pixclock equals zero + CVE-2024-26778: (unk) fbdev: savage: Error out if pixclock equals zero + CVE-2024-26779: (unk) wifi: mac80211: fix race condition on enabling fast-xmit + CVE-2024-26782: (unk) mptcp: fix double-free on socket dismantle + CVE-2024-26783: (unk) mm/vmscan: fix a bug calling wakeup_kswapd() with a wrong zone index + CVE-2024-26784: (unk) pmdomain: arm: Fix NULL dereference on scmi_perf_domain removal + CVE-2024-26787: (unk) mmc: mmci: stm32: fix DMA API overlapping mappings warning + CVE-2024-26788: (unk) dmaengine: fsl-qdma: init irq after reg initialization + CVE-2024-26789: (unk) crypto: arm64/neonbs - fix out-of-bounds access on short input + CVE-2024-26790: (unk) dmaengine: fsl-qdma: fix SoC may hang on 16 byte unaligned read + CVE-2024-26791: (unk) btrfs: dev-replace: properly validate device names + CVE-2024-26793: (unk) gtp: fix use-after-free and null-ptr-deref in gtp_newlink() + CVE-2024-26795: (unk) riscv: Sparse-Memory/vmemmap out-of-bounds fix + CVE-2024-26797: (unk) drm/amd/display: Prevent potential buffer overflow in map_hw_resources + CVE-2024-26798: (unk) fbcon: always restore the old font data in fbcon_do_set_font() + CVE-2024-26799: (unk) ASoC: qcom: Fix uninitialized pointer dmactl + CVE-2024-26801: (unk) Bluetooth: Avoid potential use-after-free in hci_error_reset + CVE-2024-26802: (unk) stmmac: Clear variable when destroying workqueue + CVE-2024-26803: (unk) net: veth: clear GRO when clearing XDP even when down + CVE-2024-26804: (unk) net: ip_tunnel: prevent perpetual headroom growth + CVE-2024-26805: (unk) netlink: Fix kernel-infoleak-after-free in __skb_datagram_iter + CVE-2024-26806: (unk) spi: cadence-qspi: remove system-wide suspend helper calls from runtime PM hooks + CVE-2024-26807: (unk) spi: cadence-qspi: fix pointer reference in runtime PM hooks + CVE-2024-26808: (unk) netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain + CVE-2024-26809: (unk) netfilter: nft_set_pipapo: release elements in clone only from destroy path diff --git a/data/6.5/6.5_CVEs.txt b/data/6.5/6.5_CVEs.txt index 85f0ec8cc..606397338 100644 --- a/data/6.5/6.5_CVEs.txt +++ b/data/6.5/6.5_CVEs.txt @@ -70,6 +70,7 @@ CVE-2022-41848: Fix unknown CVE-2022-4543: Fix unknown CVE-2022-45884: Fix unknown CVE-2022-45885: Fix unknown +CVE-2022-48628: Fixed with 6.5.6 CVE-2023-1476: Fix unknown CVE-2023-20941: Fix unknown CVE-2023-21400: Fix unknown @@ -77,6 +78,7 @@ CVE-2023-23039: Fix unknown CVE-2023-25775: Fixed with 6.5.3 CVE-2023-26242: Fix unknown CVE-2023-2640: Fix unknown +CVE-2023-28746: Fix not seen in stream CVE-2023-31081: Fix unknown CVE-2023-31082: Fix unknown CVE-2023-31083: Fix not seen in stream @@ -103,7 +105,7 @@ CVE-2023-46343: Fixed with 6.5.9 CVE-2023-46813: Fixed with 6.5.9 CVE-2023-46838: Fix not seen in stream CVE-2023-46862: Fixed with 6.5.10 -CVE-2023-47233: Fix unknown +CVE-2023-47233: Fix not seen in stream CVE-2023-4881: Fixed with 6.5.4 CVE-2023-4921: Fixed with 6.5.4 CVE-2023-50431: Fix not seen in stream @@ -141,6 +143,142 @@ CVE-2023-52458: Fix not seen in stream CVE-2023-52462: Fix not seen in stream CVE-2023-52463: Fix not seen in stream CVE-2023-52464: Fix not seen in stream +CVE-2023-52465: Fix not seen in stream +CVE-2023-52467: Fix not seen in stream +CVE-2023-52468: Fix not seen in stream +CVE-2023-52469: Fix not seen in stream +CVE-2023-52470: Fix not seen in stream +CVE-2023-52472: Fix not seen in stream +CVE-2023-52473: Fix not seen in stream +CVE-2023-52475: Fixed with 6.5.8 +CVE-2023-52476: Fixed with 6.5.8 +CVE-2023-52477: Fixed with 6.5.8 +CVE-2023-52478: Fixed with 6.5.8 +CVE-2023-52479: Fixed with 6.5.7 +CVE-2023-52480: Fixed with 6.5.7 +CVE-2023-52481: Fixed with 6.5.7 +CVE-2023-52482: Fixed with 6.5.6 +CVE-2023-52483: Fixed with 6.5.8 +CVE-2023-52484: Fixed with 6.5.6 +CVE-2023-52485: Fix not seen in stream +CVE-2023-52486: Fix not seen in stream +CVE-2023-52487: Fix not seen in stream +CVE-2023-52488: Fix not seen in stream +CVE-2023-52489: Fix not seen in stream +CVE-2023-52490: Fix not seen in stream +CVE-2023-52491: Fix not seen in stream +CVE-2023-52492: Fix not seen in stream +CVE-2023-52493: Fix not seen in stream +CVE-2023-52494: Fix not seen in stream +CVE-2023-52495: Fix not seen in stream +CVE-2023-52497: Fix not seen in stream +CVE-2023-52498: Fix not seen in stream +CVE-2023-52499: Fixed with 6.5.8 +CVE-2023-52500: Fixed with 6.5.6 +CVE-2023-52501: Fixed with 6.5.6 +CVE-2023-52502: Fixed with 6.5.8 +CVE-2023-52503: Fixed with 6.5.8 +CVE-2023-52504: Fixed with 6.5.8 +CVE-2023-52505: Fixed with 6.5.8 +CVE-2023-52506: Fixed with 6.5.6 +CVE-2023-52507: Fixed with 6.5.8 +CVE-2023-52508: Fixed with 6.5.6 +CVE-2023-52509: Fixed with 6.5.8 +CVE-2023-52510: Fixed with 6.5.8 +CVE-2023-52511: Fixed with 6.5.6 +CVE-2023-52512: Fixed with 6.5.8 +CVE-2023-52513: Fixed with 6.5.7 +CVE-2023-52515: Fixed with 6.5.7 +CVE-2023-52516: Fixed with 6.5.6 +CVE-2023-52517: Fixed with 6.5.6 +CVE-2023-52518: Fixed with 6.5.7 +CVE-2023-52519: Fixed with 6.5.7 +CVE-2023-52520: Fixed with 6.5.8 +CVE-2023-52522: Fixed with 6.5.7 +CVE-2023-52523: Fixed with 6.5.7 +CVE-2023-52524: Fixed with 6.5.7 +CVE-2023-52526: Fixed with 6.5.7 +CVE-2023-52527: Fixed with 6.5.7 +CVE-2023-52528: Fixed with 6.5.7 +CVE-2023-52529: Fixed with 6.5.7 +CVE-2023-52530: Fixed with 6.5.7 +CVE-2023-52531: Fixed with 6.5.7 +CVE-2023-52532: Fixed with 6.5.7 +CVE-2023-52559: Fixed with 6.5.7 +CVE-2023-52560: Fixed with 6.5.6 +CVE-2023-52561: Fixed with 6.5.6 +CVE-2023-52562: Fixed with 6.5.6 +CVE-2023-52563: Fixed with 6.5.6 +CVE-2023-52564: Fixed with 6.5.6 +CVE-2023-52565: Fixed with 6.5.6 +CVE-2023-52566: Fixed with 6.5.6 +CVE-2023-52567: Fixed with 6.5.6 +CVE-2023-52568: Fixed with 6.5.6 +CVE-2023-52569: Fixed with 6.5.6 +CVE-2023-52570: Fixed with 6.5.6 +CVE-2023-52571: Fixed with 6.5.6 +CVE-2023-52572: Fixed with 6.5.6 +CVE-2023-52573: Fixed with 6.5.6 +CVE-2023-52574: Fixed with 6.5.6 +CVE-2023-52575: Fixed with 6.5.6 +CVE-2023-52576: Fixed with 6.5.6 +CVE-2023-52578: Fixed with 6.5.6 +CVE-2023-52580: Fixed with 6.5.6 +CVE-2023-52581: Fixed with 6.5.6 +CVE-2023-52582: Fixed with 6.5.6 +CVE-2023-52583: Fix not seen in stream +CVE-2023-52584: Fix not seen in stream +CVE-2023-52585: Fix not seen in stream +CVE-2023-52586: Fix not seen in stream +CVE-2023-52587: Fix not seen in stream +CVE-2023-52588: Fix not seen in stream +CVE-2023-52589: Fix not seen in stream +CVE-2023-52590: Fix not seen in stream +CVE-2023-52591: Fix not seen in stream +CVE-2023-52593: Fix not seen in stream +CVE-2023-52594: Fix not seen in stream +CVE-2023-52595: Fix not seen in stream +CVE-2023-52596: Fix not seen in stream +CVE-2023-52597: Fix not seen in stream +CVE-2023-52598: Fix not seen in stream +CVE-2023-52599: Fix not seen in stream +CVE-2023-52600: Fix not seen in stream +CVE-2023-52601: Fix not seen in stream +CVE-2023-52602: Fix not seen in stream +CVE-2023-52603: Fix not seen in stream +CVE-2023-52604: Fix not seen in stream +CVE-2023-52606: Fix not seen in stream +CVE-2023-52607: Fix not seen in stream +CVE-2023-52608: Fix not seen in stream +CVE-2023-52609: Fix not seen in stream +CVE-2023-52610: Fix not seen in stream +CVE-2023-52611: Fix not seen in stream +CVE-2023-52612: Fix not seen in stream +CVE-2023-52614: Fix not seen in stream +CVE-2023-52615: Fix not seen in stream +CVE-2023-52616: Fix not seen in stream +CVE-2023-52617: Fix not seen in stream +CVE-2023-52618: Fix not seen in stream +CVE-2023-52619: Fix not seen in stream +CVE-2023-52621: Fix not seen in stream +CVE-2023-52622: Fix not seen in stream +CVE-2023-52623: Fix not seen in stream +CVE-2023-52624: Fix not seen in stream +CVE-2023-52625: Fix not seen in stream +CVE-2023-52627: Fix not seen in stream +CVE-2023-52628: Fixed with 6.5.4 +CVE-2023-52629: Fixed with 6.5.4 +CVE-2023-52630: Fix not seen in stream +CVE-2023-52631: Fix not seen in stream +CVE-2023-52632: Fix not seen in stream +CVE-2023-52633: Fix not seen in stream +CVE-2023-52634: Fix not seen in stream +CVE-2023-52635: Fix not seen in stream +CVE-2023-52637: Fix not seen in stream +CVE-2023-52638: Fix not seen in stream +CVE-2023-52639: Fix not seen in stream +CVE-2023-52640: Fix not seen in stream +CVE-2023-52641: Fix not seen in stream CVE-2023-5345: Fixed with 6.5.6 CVE-2023-5633: Fixed with 6.5.8 CVE-2023-5717: Fixed with 6.5.9 @@ -149,11 +287,11 @@ CVE-2023-6121: Fix not seen in stream CVE-2023-6176: Fixed with 6.5.4 CVE-2023-6238: Fix unknown CVE-2023-6240: Fix unknown -CVE-2023-6270: Fix unknown -CVE-2023-6356: Fix unknown +CVE-2023-6270: Fix not seen in stream +CVE-2023-6356: Fix not seen in stream CVE-2023-6531: Fix not seen in stream CVE-2023-6535: Fix unknown -CVE-2023-6536: Fix unknown +CVE-2023-6536: Fix not seen in stream CVE-2023-6560: Fix not seen in stream CVE-2023-6606: Fix not seen in stream CVE-2023-6610: Fix not seen in stream @@ -162,7 +300,7 @@ CVE-2023-6817: Fix not seen in stream CVE-2023-6915: Fix not seen in stream CVE-2023-6931: Fix not seen in stream CVE-2023-6932: Fix not seen in stream -CVE-2023-7042: Fix unknown +CVE-2023-7042: Fix not seen in stream CVE-2024-0193: Fix not seen in stream CVE-2024-0564: Fix unknown CVE-2024-0565: Fix not seen in stream @@ -171,16 +309,16 @@ CVE-2024-0584: Fix not seen in stream CVE-2024-0607: Fixed with 6.5.13 CVE-2024-0641: Fixed with 6.5.7 CVE-2024-0646: Fix not seen in stream -CVE-2024-0841: Fix unknown +CVE-2024-0841: Fix not seen in stream CVE-2024-1085: Fix not seen in stream CVE-2024-1086: Fix not seen in stream CVE-2024-1151: Fix not seen in stream CVE-2024-21803: Fix unknown -CVE-2024-22099: Fix unknown +CVE-2024-2193: Fix unknown +CVE-2024-22099: Fix not seen in stream CVE-2024-22386: Fix unknown CVE-2024-22705: Fix not seen in stream -CVE-2024-23196: Fix unknown -CVE-2024-23307: Fix unknown +CVE-2024-23307: Fix not seen in stream CVE-2024-23848: Fix unknown CVE-2024-23849: Fix not seen in stream CVE-2024-23850: Fix not seen in stream @@ -189,7 +327,7 @@ CVE-2024-24857: Fix unknown CVE-2024-24858: Fix unknown CVE-2024-24859: Fix unknown CVE-2024-24860: Fix not seen in stream -CVE-2024-24861: Fix unknown +CVE-2024-24861: Fix not seen in stream CVE-2024-24864: Fix unknown CVE-2024-25739: Fix unknown CVE-2024-25740: Fix unknown @@ -201,7 +339,6 @@ CVE-2024-26583: Fix not seen in stream CVE-2024-26584: Fix not seen in stream CVE-2024-26585: Fix not seen in stream CVE-2024-26586: Fix not seen in stream -CVE-2024-26587: Fix not seen in stream CVE-2024-26588: Fix not seen in stream CVE-2024-26589: Fix not seen in stream CVE-2024-26590: Fix not seen in stream @@ -214,3 +351,169 @@ CVE-2024-26596: Fix not seen in stream CVE-2024-26597: Fix not seen in stream CVE-2024-26598: Fix not seen in stream CVE-2024-26599: Fix not seen in stream +CVE-2024-26600: Fix not seen in stream +CVE-2024-26601: Fix not seen in stream +CVE-2024-26602: Fix not seen in stream +CVE-2024-26603: Fix not seen in stream +CVE-2024-26606: Fix not seen in stream +CVE-2024-26607: Fix not seen in stream +CVE-2024-26608: Fix not seen in stream +CVE-2024-26610: Fix not seen in stream +CVE-2024-26612: Fix not seen in stream +CVE-2024-26614: Fix not seen in stream +CVE-2024-26615: Fix not seen in stream +CVE-2024-26616: Fix not seen in stream +CVE-2024-26618: Fix not seen in stream +CVE-2024-26620: Fix not seen in stream +CVE-2024-26622: Fix not seen in stream +CVE-2024-26623: Fix not seen in stream +CVE-2024-26625: Fix not seen in stream +CVE-2024-26627: Fix not seen in stream +CVE-2024-26629: Fix not seen in stream +CVE-2024-26630: Fix not seen in stream +CVE-2024-26631: Fix not seen in stream +CVE-2024-26632: Fix not seen in stream +CVE-2024-26633: Fix not seen in stream +CVE-2024-26635: Fix not seen in stream +CVE-2024-26636: Fix not seen in stream +CVE-2024-26638: Fix not seen in stream +CVE-2024-26640: Fix not seen in stream +CVE-2024-26641: Fix not seen in stream +CVE-2024-26642: Fix not seen in stream +CVE-2024-26643: Fix not seen in stream +CVE-2024-26644: Fix not seen in stream +CVE-2024-26645: Fix not seen in stream +CVE-2024-26646: Fix not seen in stream +CVE-2024-26647: Fix not seen in stream +CVE-2024-26648: Fix not seen in stream +CVE-2024-26649: Fix not seen in stream +CVE-2024-26650: Fix not seen in stream +CVE-2024-26651: Fix not seen in stream +CVE-2024-26652: Fix not seen in stream +CVE-2024-26654: Fix not seen in stream +CVE-2024-26655: Fix not seen in stream +CVE-2024-26656: Fix not seen in stream +CVE-2024-26658: Fix not seen in stream +CVE-2024-26659: Fix not seen in stream +CVE-2024-26660: Fix not seen in stream +CVE-2024-26661: Fix not seen in stream +CVE-2024-26662: Fix not seen in stream +CVE-2024-26663: Fix not seen in stream +CVE-2024-26664: Fix not seen in stream +CVE-2024-26665: Fix not seen in stream +CVE-2024-26666: Fix not seen in stream +CVE-2024-26667: Fix not seen in stream +CVE-2024-26668: Fix not seen in stream +CVE-2024-26669: Fix not seen in stream +CVE-2024-26671: Fix not seen in stream +CVE-2024-26672: Fix not seen in stream +CVE-2024-26673: Fix not seen in stream +CVE-2024-26674: Fix not seen in stream +CVE-2024-26675: Fix not seen in stream +CVE-2024-26676: Fix not seen in stream +CVE-2024-26677: Fix not seen in stream +CVE-2024-26679: Fix not seen in stream +CVE-2024-26680: Fix not seen in stream +CVE-2024-26681: Fix not seen in stream +CVE-2024-26684: Fix not seen in stream +CVE-2024-26685: Fix not seen in stream +CVE-2024-26686: Fix not seen in stream +CVE-2024-26687: Fix not seen in stream +CVE-2024-26688: Fix not seen in stream +CVE-2024-26689: Fix not seen in stream +CVE-2024-26691: Fix not seen in stream +CVE-2024-26692: Fix not seen in stream +CVE-2024-26693: Fix not seen in stream +CVE-2024-26694: Fix not seen in stream +CVE-2024-26695: Fix not seen in stream +CVE-2024-26696: Fix not seen in stream +CVE-2024-26697: Fix not seen in stream +CVE-2024-26698: Fix not seen in stream +CVE-2024-26699: Fix not seen in stream +CVE-2024-26700: Fix not seen in stream +CVE-2024-26702: Fix not seen in stream +CVE-2024-26703: Fix not seen in stream +CVE-2024-26704: Fix not seen in stream +CVE-2024-26706: Fix not seen in stream +CVE-2024-26707: Fix not seen in stream +CVE-2024-26708: Fix not seen in stream +CVE-2024-26711: Fix not seen in stream +CVE-2024-26712: Fix not seen in stream +CVE-2024-26713: Fix not seen in stream +CVE-2024-26714: Fix not seen in stream +CVE-2024-26715: Fix not seen in stream +CVE-2024-26716: Fix not seen in stream +CVE-2024-26717: Fix not seen in stream +CVE-2024-26718: Fix not seen in stream +CVE-2024-26719: Fix not seen in stream +CVE-2024-26720: Fix not seen in stream +CVE-2024-26723: Fix not seen in stream +CVE-2024-26726: Fix not seen in stream +CVE-2024-26727: Fix not seen in stream +CVE-2024-26731: Fix not seen in stream +CVE-2024-26733: Fix not seen in stream +CVE-2024-26734: Fix not seen in stream +CVE-2024-26735: Fix not seen in stream +CVE-2024-26736: Fix not seen in stream +CVE-2024-26737: Fix not seen in stream +CVE-2024-26738: Fix not seen in stream +CVE-2024-26739: Fix not seen in stream +CVE-2024-26740: Fix not seen in stream +CVE-2024-26741: Fix not seen in stream +CVE-2024-26742: Fix not seen in stream +CVE-2024-26743: Fix not seen in stream +CVE-2024-26744: Fix not seen in stream +CVE-2024-26745: Fix not seen in stream +CVE-2024-26746: Fix not seen in stream +CVE-2024-26747: Fix not seen in stream +CVE-2024-26748: Fix not seen in stream +CVE-2024-26749: Fix not seen in stream +CVE-2024-26751: Fix not seen in stream +CVE-2024-26752: Fix not seen in stream +CVE-2024-26753: Fix not seen in stream +CVE-2024-26754: Fix not seen in stream +CVE-2024-26756: Fix not seen in stream +CVE-2024-26757: Fix not seen in stream +CVE-2024-26758: Fix not seen in stream +CVE-2024-26759: Fix not seen in stream +CVE-2024-26760: Fix not seen in stream +CVE-2024-26761: Fix not seen in stream +CVE-2024-26763: Fix not seen in stream +CVE-2024-26764: Fix not seen in stream +CVE-2024-26765: Fix not seen in stream +CVE-2024-26766: Fix not seen in stream +CVE-2024-26767: Fix not seen in stream +CVE-2024-26768: Fix not seen in stream +CVE-2024-26769: Fix not seen in stream +CVE-2024-26770: Fix not seen in stream +CVE-2024-26771: Fix not seen in stream +CVE-2024-26772: Fix not seen in stream +CVE-2024-26773: Fix not seen in stream +CVE-2024-26774: Fix not seen in stream +CVE-2024-26775: Fix not seen in stream +CVE-2024-26776: Fix not seen in stream +CVE-2024-26777: Fix not seen in stream +CVE-2024-26778: Fix not seen in stream +CVE-2024-26779: Fix not seen in stream +CVE-2024-26782: Fix not seen in stream +CVE-2024-26783: Fix not seen in stream +CVE-2024-26784: Fix not seen in stream +CVE-2024-26787: Fix not seen in stream +CVE-2024-26788: Fix not seen in stream +CVE-2024-26789: Fix not seen in stream +CVE-2024-26790: Fix not seen in stream +CVE-2024-26791: Fix not seen in stream +CVE-2024-26793: Fix not seen in stream +CVE-2024-26795: Fix not seen in stream +CVE-2024-26797: Fix not seen in stream +CVE-2024-26798: Fix not seen in stream +CVE-2024-26799: Fix not seen in stream +CVE-2024-26801: Fix not seen in stream +CVE-2024-26802: Fix not seen in stream +CVE-2024-26803: Fix not seen in stream +CVE-2024-26804: Fix not seen in stream +CVE-2024-26805: Fix not seen in stream +CVE-2024-26806: Fix not seen in stream +CVE-2024-26807: Fix not seen in stream +CVE-2024-26808: Fix not seen in stream +CVE-2024-26809: Fix not seen in stream diff --git a/data/6.5/6.5_security.txt b/data/6.5/6.5_security.txt index c6c33cc52..78cdec08a 100644 --- a/data/6.5/6.5_security.txt +++ b/data/6.5/6.5_security.txt @@ -21,22 +21,88 @@ CVEs fixed in 6.5.4: CVE-2023-4881: c8f292322ff16b9a2272a67de396c09a50e09dce netfilter: nftables: exthdr: fix 4-byte stack OOB write CVE-2023-4921: e5471b82c36396e809817cb988dfc4bce0a688cb net: sched: sch_qfq: Fix UAF in qfq_dequeue() CVE-2023-52433: e3213ff99a355cda811b41e8dbb3472d13167a3a netfilter: nft_set_rbtree: skip sync GC for new elements in this transaction + CVE-2023-52628: c8f292322ff16b9a2272a67de396c09a50e09dce netfilter: nftables: exthdr: fix 4-byte stack OOB write + CVE-2023-52629: 610dbd8ac271aa36080aac50b928d700ee3fe4de sh: push-switch: Reorder cleanup operations to avoid use-after-free bug CVE-2023-6176: 74aecad5da19004ccf6321fd397d14b10756622a net/tls: do not free tls_rec on async operation in bpf_exec_tx_verdict() CVEs fixed in 6.5.6: + CVE-2022-48628: 47f82395f04a976d4fa97de7f2acffa1c1096571 ceph: drop messages from MDS when unmounting CVE-2023-42754: cda20fcddf53f0f959641c8ef4d50ab87ffa5124 ipv4: fix null-deref in ipv4_link_failure CVE-2023-42756: 20a93d402b6fe6757e14b0eeb400dfac8b8aa3ad netfilter: ipset: Fix race between IPSET_CMD_CREATE and IPSET_CMD_SWAP CVE-2023-5197: 13f385f99147b4445a1ff151fabd44c12d366ab0 netfilter: nf_tables: disallow rule removal from chain binding + CVE-2023-52482: cf43b304b6952b549d58feabc342807b334f03d4 x86/srso: Add SRSO mitigation for Hygon processors + CVE-2023-52484: 3283a1bce9bbc978059f790b84f3c10c32492429 iommu/arm-smmu-v3: Fix soft lockup triggered by arm_smmu_mm_invalidate_range + CVE-2023-52500: 22e6d783a33015bcdf0979015e4eac603912bea7 scsi: pm80xx: Avoid leaking tags when processing OPC_INB_SET_CONTROLLER_CONFIG command + CVE-2023-52501: 75fc9e99b3a71006720ad1e029db11a4b5c32d4a ring-buffer: Do not attempt to read past "commit" + CVE-2023-52506: 19878758accf6b2788091a771d9f9fee7bab11ab LoongArch: Set all reserved memblocks on Node#0 at initialization + CVE-2023-52508: dd46b3ac7322baf3772b33b29726e94f98289db7 nvme-fc: Prevent null pointer dereference in nvme_fc_io_getuuid() + CVE-2023-52511: b3c21c9c7289692f4019f163c3b06d8bdf78b355 spi: sun6i: reduce DMA RX transfer width to single byte + CVE-2023-52516: fe2b811a02c3244ebf6059039e4a9e715e26a9e3 dma-debug: don't call __dma_entry_alloc_check_leak() under free_entries_lock + CVE-2023-52517: 4e149d524678431638ff378ef6025e4e89b71097 spi: sun6i: fix race between DMA RX transfer completion and RX FIFO drain + CVE-2023-52560: 6b522001693aa113d97a985abc5f6932972e8e86 mm/damon/vaddr-test: fix memory leak in damon_do_test_apply_three_regions() + CVE-2023-52561: 82dacd0ca0d9640723824026d6fdf773c02de1d2 arm64: dts: qcom: sdm845-db845c: Mark cont splash memory region as reserved + CVE-2023-52562: 51988be187b041e5355245957b0b9751fa382e0d mm/slab_common: fix slab_caches list corruption after kmem_cache_destroy() + CVE-2023-52563: 43b63e088887a8b82750e16762f77100ffa76cba drm/meson: fix memory leak on ->hpd_notify callback + CVE-2023-52564: 2bff660e0ff349dee84dc4f6f6d10da4497f5b28 Revert "tty: n_gsm: fix UAF in gsm_cleanup_mux" + CVE-2023-52565: 8bcf70d787f7d53a3b85ad394f926cfef3eed023 media: uvcvideo: Fix OOB read + CVE-2023-52566: 28df4646ad8b433340772edc90ca709cdefc53e2 nilfs2: fix potential use after free in nilfs_gccache_submit_read_data() + CVE-2023-52567: 3345cc5f02f1fb4c4dcb114706f2210d879ab933 serial: 8250_port: Check IRQ data before use + CVE-2023-52568: 1348f7f15d7c7798456856bee74a4235c2da994e x86/sgx: Resolves SECS reclaim vs. page fault for EAUG race + CVE-2023-52569: d10fd53393cc5de4b9cf1a4b8f9984f0a037aa51 btrfs: remove BUG() after failure to insert delayed dir index item + CVE-2023-52570: 52093779b1830ac184a23848d971f06404cf513e vfio/mdev: Fix a null-ptr-deref bug for mdev_unregister_parent() + CVE-2023-52571: 70326b46b6a043f7e7404b2ff678b033c06d6577 power: supply: rk817: Fix node refcount leak + CVE-2023-52572: 76569e3819e0bb59fc19b1b8688b017e627c268a cifs: Fix UAF in cifs_demultiplex_thread() + CVE-2023-52573: 069ac51c37a6f07a51f7134d8c34289075786a35 net: rds: Fix possible NULL-pointer dereference + CVE-2023-52574: cac50d9f5d876be32cb9aa21c74018468900284d team: fix null-ptr-deref when team device type is changed + CVE-2023-52575: e3cb8b2c391b1f287eb76df4ba37880f4ea56d8a x86/srso: Fix SBPB enablement for spec_rstack_overflow=off + CVE-2023-52576: d2dfbc0e3b7a04c2d941421a958dc31c897fb204 x86/mm, kexec, ima: Use memblock_free_late() from ima_free_kexec_buffer() + CVE-2023-52578: f2ef4cb4d418fa64fe73eb84d10cc5c0e52e00fa net: bridge: use DEV_STATS_INC() + CVE-2023-52580: 48e105a2a1a10adc21c0ae717969f5e8e990ba48 net/core: Fix ETH_P_1588 flow dissector + CVE-2023-52581: 4aea243b6853d06c1d160a9955b759189aa02b14 netfilter: nf_tables: fix memleak when more than 255 elements expired + CVE-2023-52582: d9f5537479d4ec97ea92ff24e81a517d5772581a netfs: Only call folio_start_fscache() one time for each folio CVE-2023-5345: 0c116005af551e9cf437a9ec8c80204c2d4b1b53 fs/smb/client: Reset password pointer to NULL CVEs fixed in 6.5.7: CVE-2023-31085: 87b9858e404069817cd4b31830e0a1b9b3d183c4 ubi: Refuse attaching if mtd's erasesize is 0 CVE-2023-34324: 76b33722e2d2336a6e2a7d9eacbbb8988478cf98 xen/events: replace evtchn_rwlock with RCU CVE-2023-5158: 0bf2b9c2f3545ffce5720de61c33fc171c0e480a vringh: don't use vringh_kiov_advance() in vringh_iov_xfer() + CVE-2023-52479: d5b0e9d3563e7e314a850e81f42b2ef6f39882f9 ksmbd: fix uaf in smb20_oplock_break_ack + CVE-2023-52480: 18ced78b0ebccc2d16f426143dc56ab3aad666be ksmbd: fix race condition between session lookup and expire + CVE-2023-52481: 32b0a4ffcaea44a00a61e40c0d1bcc50362aee25 arm64: errata: Add Cortex-A520 speculative unprivileged load workaround + CVE-2023-52513: eeafc50a77f6a783c2c44e7ec3674a7b693e06f8 RDMA/siw: Fix connection failure handling + CVE-2023-52515: 05a10b316adaac1f322007ca9a0383b410d759cc RDMA/srp: Do not call scsi_done() from srp_abort() + CVE-2023-52518: eea5a8f0c3b7c884d2351e75fbdd0a3d7def5ae1 Bluetooth: hci_codec: Fix leaking content of local_codecs + CVE-2023-52519: 60fb3f054c99608ddb1f2466c07108da6292951e HID: intel-ish-hid: ipc: Disable and reenable ACPI GPE bit + CVE-2023-52522: a75152d233370362eebedb2643592e7c883cc9fc net: fix possible store tearing in neigh_periodic_work() + CVE-2023-52523: ded6e448028f0f91b6af35985afca01fa02a9089 bpf, sockmap: Reject sk_msg egress redirects to non-TCP sockets + CVE-2023-52524: 29c16c2bf5866326d5fbc4a537b3997fcac23391 net: nfc: llcp: Add lock when modifying device list + CVE-2023-52526: c955751cbf864cf2055117dd3fe7f780d2a57b56 erofs: fix memory leak of LZMA global compressed deduplication + CVE-2023-52527: fe80658c08e3001c80c5533cd41abfbb0e0e28fd ipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data() + CVE-2023-52528: 4931e80da9463b03bfe42be54a9a19f213b0f76d net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg + CVE-2023-52529: f566efa7de1e35e6523f4acbaf85068a540be07d HID: sony: Fix a potential memory leak in sony_probe() + CVE-2023-52530: 65c72a7201704574dace708cbc96a8f367b1491d wifi: mac80211: fix potential key use-after-free + CVE-2023-52531: f06cdd8d4ba5252986f51f80cc30263636397128 wifi: iwlwifi: mvm: Fix a memory corruption issue + CVE-2023-52532: a910e0f6304726da30a212feecec65cb97ff7a80 net: mana: Fix TX CQE error handling + CVE-2023-52559: 496c591f0b389eb782f36d9d4c2564b9a865eed0 iommu/vt-d: Avoid memory allocation in iommu_suspend() CVE-2024-0641: aa1a21681b94f59c67ca56601e05dc1573ecb6cb tipc: fix a potential deadlock on &tx->lock CVEs fixed in 6.5.8: CVE-2023-35827: 105abd68ad8f781985113aee2e92e0702b133705 ravb: Fix use-after-free issue in ravb_tx_timeout_work() + CVE-2023-52475: e528b1b9d60743e0b26224e3fe7aa74c24b8b2f8 Input: powermate - fix use-after-free in powermate_config_complete + CVE-2023-52476: f71edacbd4f99c0e12fe4a4007ab4d687d0688db perf/x86/lbr: Filter vsyscall addresses + CVE-2023-52477: 136f69a04e71ba3458d137aec3bb2ce1232c0289 usb: hub: Guard against accesses to uninitialized BOS descriptors + CVE-2023-52478: f7b2c7d9831af99369fe8ad9b2a68d78942f414e HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect + CVE-2023-52483: 2405f64a95a7a094eb24cba9bcfaffd1ea264de4 mctp: perform route lookups under a RCU read-side lock + CVE-2023-52499: 70f6756ad96dd70177dddcfac2fe4bd4bb320746 powerpc/47x: Fix 47x syscall return crash + CVE-2023-52502: d1af8a39cf839d93c8967fdd858f6bbdc3e4a15c net: nfc: fix races in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn() + CVE-2023-52503: 1c95574350cd63bc3c5c2fa06658010768f2a0ce tee: amdtee: fix use-after-free vulnerability in amdtee_close_session + CVE-2023-52504: cd287cc208dfe6bd6da98e7f88e723209242c9b4 x86/alternatives: Disable KASAN in apply_alternatives() + CVE-2023-52505: c2d7c79898b427d263c64a4841987eec131f2d4e phy: lynx-28g: serialize concurrent phy_set_mode_ext() calls to shared registers + CVE-2023-52507: 6584eba7688dcf999542778b07f63828c21521da nfc: nci: assert requested protocol is valid + CVE-2023-52509: 105abd68ad8f781985113aee2e92e0702b133705 ravb: Fix use-after-free issue in ravb_tx_timeout_work() + CVE-2023-52510: becf5c147198f4345243c5df0c4f035415491640 ieee802154: ca8210: Fix a potential UAF in ca8210_probe + CVE-2023-52512: c9d7cac0fd27c74dd368e80dc4b5d0f9f2e13cf8 pinctrl: nuvoton: wpcm450: fix out of bounds write + CVE-2023-52520: c6e3023579de8d33256771ac0745239029e81106 platform/x86: think-lmi: Fix reference leak CVE-2023-5633: 1474b39f961703d0bb33833a6d6b112826839781 drm/vmwgfx: Keep a gem reference to user bos in surfaces CVEs fixed in 6.5.9: @@ -130,6 +196,7 @@ Outstanding CVEs: CVE-2023-23039: (unk) CVE-2023-26242: (unk) CVE-2023-2640: (unk) + CVE-2023-28746: (unk) x86/mmio: Disable KVM mitigation when X86_FEATURE_CLEAR_CPU_BUF is set CVE-2023-31081: (unk) CVE-2023-31082: (unk) CVE-2023-31083: (unk) Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO @@ -139,7 +206,7 @@ Outstanding CVEs: CVE-2023-37454: (unk) CVE-2023-4010: (unk) CVE-2023-46838: (unk) xen-netback: don't produce zero-size SKB frags - CVE-2023-47233: (unk) + CVE-2023-47233: (unk) wifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach CVE-2023-50431: (unk) accel/habanalabs: fix information leak in sec_attest_info() CVE-2023-51779: (unk) Bluetooth: af_bluetooth: Fix Use-After-Free in bt_sock_recvmsg CVE-2023-51780: (unk) atm: Fix Use-After-Free in do_vcc_ioctl @@ -170,14 +237,85 @@ Outstanding CVEs: CVE-2023-52462: (unk) bpf: fix check for attempt to corrupt spilled pointer CVE-2023-52463: (unk) efivarfs: force RO when remounting if SetVariable is not supported CVE-2023-52464: (unk) EDAC/thunderx: Fix possible out-of-bounds string access + CVE-2023-52465: (unk) power: supply: Fix null pointer dereference in smb2_probe + CVE-2023-52467: (unk) mfd: syscon: Fix null pointer dereference in of_syscon_register() + CVE-2023-52468: (unk) class: fix use-after-free in class_register() + CVE-2023-52469: (unk) drivers/amd/pm: fix a use-after-free in kv_parse_power_table + CVE-2023-52470: (unk) drm/radeon: check the alloc_workqueue return value in radeon_crtc_init() + CVE-2023-52472: (unk) crypto: rsa - add a check for allocation failure + CVE-2023-52473: (unk) thermal: core: Fix NULL pointer dereference in zone registration error path + CVE-2023-52485: (unk) drm/amd/display: Wake DMCUB before sending a command + CVE-2023-52486: (unk) drm: Don't unref the same fb many times by mistake due to deadlock handling + CVE-2023-52487: (unk) net/mlx5e: Fix peer flow lists handling + CVE-2023-52488: (unk) serial: sc16is7xx: convert from _raw_ to _noinc_ regmap functions for FIFO + CVE-2023-52489: (unk) mm/sparsemem: fix race in accessing memory_section->usage + CVE-2023-52490: (unk) mm: migrate: fix getting incorrect page mapping during page migration + CVE-2023-52491: (unk) media: mtk-jpeg: Fix use after free bug due to error path handling in mtk_jpeg_dec_device_run + CVE-2023-52492: (unk) dmaengine: fix NULL pointer in channel unregistration function + CVE-2023-52493: (unk) bus: mhi: host: Drop chan lock before queuing buffers + CVE-2023-52494: (unk) bus: mhi: host: Add alignment check for event ring read pointer + CVE-2023-52495: (unk) soc: qcom: pmic_glink_altmode: fix port sanity check + CVE-2023-52497: (unk) erofs: fix lz4 inplace decompression + CVE-2023-52498: (unk) PM: sleep: Fix possible deadlocks in core system-wide PM code + CVE-2023-52583: (unk) ceph: fix deadlock or deadcode of misusing dget() + CVE-2023-52584: (unk) spmi: mediatek: Fix UAF on device remove + CVE-2023-52585: (unk) drm/amdgpu: Fix possible NULL dereference in amdgpu_ras_query_error_status_helper() + CVE-2023-52586: (unk) drm/msm/dpu: Add mutex lock in control vblank irq + CVE-2023-52587: (unk) IB/ipoib: Fix mcast list locking + CVE-2023-52588: (unk) f2fs: fix to tag gcing flag on page during block migration + CVE-2023-52589: (unk) media: rkisp1: Fix IRQ disable race issue + CVE-2023-52590: (unk) ocfs2: Avoid touching renamed directory if parent does not change + CVE-2023-52591: (unk) reiserfs: Avoid touching renamed directory if parent does not change + CVE-2023-52593: (unk) wifi: wfx: fix possible NULL pointer dereference in wfx_set_mfp_ap() + CVE-2023-52594: (unk) wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus() + CVE-2023-52595: (unk) wifi: rt2x00: restart beacon queue when hardware reset + CVE-2023-52596: (unk) sysctl: Fix out of bounds access for empty sysctl registers + CVE-2023-52597: (unk) KVM: s390: fix setting of fpc register + CVE-2023-52598: (unk) s390/ptrace: handle setting of fpc register correctly + CVE-2023-52599: (unk) jfs: fix array-index-out-of-bounds in diNewExt + CVE-2023-52600: (unk) jfs: fix uaf in jfs_evict_inode + CVE-2023-52601: (unk) jfs: fix array-index-out-of-bounds in dbAdjTree + CVE-2023-52602: (unk) jfs: fix slab-out-of-bounds Read in dtSearch + CVE-2023-52603: (unk) UBSAN: array-index-out-of-bounds in dtSplitRoot + CVE-2023-52604: (unk) FS:JFS:UBSAN:array-index-out-of-bounds in dbAdjTree + CVE-2023-52606: (unk) powerpc/lib: Validate size for vector operations + CVE-2023-52607: (unk) powerpc/mm: Fix null-pointer dereference in pgtable_cache_add + CVE-2023-52608: (unk) firmware: arm_scmi: Check mailbox/SMT channel for consistency + CVE-2023-52609: (unk) binder: fix race between mmput() and do_exit() + CVE-2023-52610: (unk) net/sched: act_ct: fix skb leak and crash on ooo frags + CVE-2023-52611: (unk) wifi: rtw88: sdio: Honor the host max_req_size in the RX path + CVE-2023-52612: (unk) crypto: scomp - fix req->dst buffer overflow + CVE-2023-52614: (unk) PM / devfreq: Fix buffer overflow in trans_stat_show + CVE-2023-52615: (unk) hwrng: core - Fix page fault dead lock on mmap-ed hwrng + CVE-2023-52616: (unk) crypto: lib/mpi - Fix unexpected pointer access in mpi_ec_init + CVE-2023-52617: (unk) PCI: switchtec: Fix stdev_release() crash after surprise hot remove + CVE-2023-52618: (unk) block/rnbd-srv: Check for unlikely string overflow + CVE-2023-52619: (unk) pstore/ram: Fix crash when setting number of cpus to an odd number + CVE-2023-52621: (unk) bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers + CVE-2023-52622: (unk) ext4: avoid online resizing failures due to oversized flex bg + CVE-2023-52623: (unk) SUNRPC: Fix a suspicious RCU usage warning + CVE-2023-52624: (unk) drm/amd/display: Wake DMCUB before executing GPINT commands + CVE-2023-52625: (unk) drm/amd/display: Refactor DMCUB enter/exit idle interface + CVE-2023-52627: (unk) iio: adc: ad7091r: Allow users to configure device events + CVE-2023-52630: (unk) blk-iocost: Fix an UBSAN shift-out-of-bounds warning + CVE-2023-52631: (unk) fs/ntfs3: Fix an NULL dereference bug + CVE-2023-52632: (unk) drm/amdkfd: Fix lock dependency warning with srcu + CVE-2023-52633: (unk) um: time-travel: fix time corruption + CVE-2023-52634: (unk) drm/amd/display: Fix disable_otg_wa logic + CVE-2023-52635: (unk) PM / devfreq: Synchronize devfreq_monitor_[start/stop] + CVE-2023-52637: (unk) can: j1939: Fix UAF in j1939_sk_match_filter during setsockopt(SO_J1939_FILTER) + CVE-2023-52638: (unk) can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock + CVE-2023-52639: (unk) KVM: s390: vsie: fix race during shadow creation + CVE-2023-52640: (unk) fs/ntfs3: Fix oob in ntfs_listxattr + CVE-2023-52641: (unk) fs/ntfs3: Add NULL ptr dereference checking at the end of attr_allocate_frame() CVE-2023-6121: (unk) nvmet: nul-terminate the NQNs passed in the connect command CVE-2023-6238: (unk) CVE-2023-6240: (unk) - CVE-2023-6270: (unk) - CVE-2023-6356: (unk) + CVE-2023-6270: (unk) aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts + CVE-2023-6356: (unk) nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length CVE-2023-6531: (unk) io_uring/af_unix: disable sending io_uring over sockets CVE-2023-6535: (unk) - CVE-2023-6536: (unk) + CVE-2023-6536: (unk) nvmet-tcp: fix a crash in nvmet_req_complete() CVE-2023-6560: (unk) io_uring: don't allow discontig pages for IORING_SETUP_NO_MMAP CVE-2023-6606: (unk) smb: client: fix OOB in smbCalcSize() CVE-2023-6610: (unk) smb: client: fix potential OOB in smb2_dump_detail() @@ -186,23 +324,23 @@ Outstanding CVEs: CVE-2023-6915: (unk) ida: Fix crash in ida_free when the bitmap is empty CVE-2023-6931: (unk) perf: Fix perf_event_validate_size() CVE-2023-6932: (unk) ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet - CVE-2023-7042: (unk) + CVE-2023-7042: (unk) wifi: ath10k: fix NULL pointer dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev() CVE-2024-0193: (unk) netfilter: nf_tables: skip set commit for deleted/destroyed sets CVE-2024-0564: (unk) CVE-2024-0565: (unk) smb: client: fix OOB in receive_encrypted_standard() CVE-2024-0582: (unk) io_uring/kbuf: defer release of mapped buffer rings CVE-2024-0584: (unk) ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet CVE-2024-0646: (unk) net: tls, update curr on splice as well - CVE-2024-0841: (unk) + CVE-2024-0841: (unk) fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super CVE-2024-1085: (unk) netfilter: nf_tables: check if catch-all set element is active in next generation CVE-2024-1086: (unk) netfilter: nf_tables: reject QUEUE/DROP verdict parameters CVE-2024-1151: (unk) net: openvswitch: limit the number of recursions from action sets CVE-2024-21803: (unk) - CVE-2024-22099: (unk) + CVE-2024-2193: (unk) + CVE-2024-22099: (unk) Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security CVE-2024-22386: (unk) CVE-2024-22705: (unk) ksmbd: fix slab-out-of-bounds in smb_strndup_from_utf16() - CVE-2024-23196: (unk) - CVE-2024-23307: (unk) + CVE-2024-23307: (unk) md/raid5: fix atomicity violation in raid5_cache_count CVE-2024-23848: (unk) CVE-2024-23849: (unk) net/rds: Fix UBSAN: array-index-out-of-bounds in rds_cmsg_recv CVE-2024-23850: (unk) btrfs: do not ASSERT() if the newly created subvolume already got read @@ -211,7 +349,7 @@ Outstanding CVEs: CVE-2024-24858: (unk) CVE-2024-24859: (unk) CVE-2024-24860: (unk) Bluetooth: Fix atomicity violation in {min,max}_key_size_set - CVE-2024-24861: (unk) + CVE-2024-24861: (unk) media: xc4000: Fix atomicity violation in xc4000_get_frequency CVE-2024-24864: (unk) CVE-2024-25739: (unk) CVE-2024-25740: (unk) @@ -223,7 +361,6 @@ Outstanding CVEs: CVE-2024-26584: (unk) net: tls: handle backlogging of crypto requests CVE-2024-26585: (unk) tls: fix race between tx work scheduling and socket close CVE-2024-26586: (unk) mlxsw: spectrum_acl_tcam: Fix stack corruption - CVE-2024-26587: (unk) net: netdevsim: don't try to destroy PHC on VFs CVE-2024-26588: (unk) LoongArch: BPF: Prevent out-of-bounds memory access CVE-2024-26589: (unk) bpf: Reject variable offset alu on PTR_TO_FLOW_KEYS CVE-2024-26590: (unk) erofs: fix inconsistent per-file compression format @@ -236,3 +373,169 @@ Outstanding CVEs: CVE-2024-26597: (unk) net: qualcomm: rmnet: fix global oob in rmnet_policy CVE-2024-26598: (unk) KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache CVE-2024-26599: (unk) pwm: Fix out-of-bounds access in of_pwm_single_xlate() + CVE-2024-26600: (unk) phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP + CVE-2024-26601: (unk) ext4: regenerate buddy after block freeing failed if under fc replay + CVE-2024-26602: (unk) sched/membarrier: reduce the ability to hammer on sys_membarrier + CVE-2024-26603: (unk) x86/fpu: Stop relying on userspace for info to fault in xsave buffer + CVE-2024-26606: (unk) binder: signal epoll threads of self-work + CVE-2024-26607: (unk) drm/bridge: sii902x: Fix probing race issue + CVE-2024-26608: (unk) ksmbd: fix global oob in ksmbd_nl_policy + CVE-2024-26610: (unk) wifi: iwlwifi: fix a memory corruption + CVE-2024-26612: (unk) netfs, fscache: Prevent Oops in fscache_put_cache() + CVE-2024-26614: (unk) tcp: make sure init the accept_queue's spinlocks once + CVE-2024-26615: (unk) net/smc: fix illegal rmb_desc access in SMC-D connection dump + CVE-2024-26616: (unk) btrfs: scrub: avoid use-after-free when chunk length is not 64K aligned + CVE-2024-26618: (unk) arm64/sme: Always exit sme_alloc() early with existing storage + CVE-2024-26620: (unk) s390/vfio-ap: always filter entire AP matrix + CVE-2024-26622: (unk) tomoyo: fix UAF write bug in tomoyo_write_control() + CVE-2024-26623: (unk) pds_core: Prevent race issues involving the adminq + CVE-2024-26625: (unk) llc: call sock_orphan() at release time + CVE-2024-26627: (unk) scsi: core: Move scsi_host_busy() out of host lock for waking up EH handler + CVE-2024-26629: (unk) nfsd: fix RELEASE_LOCKOWNER + CVE-2024-26630: (unk) mm: cachestat: fix folio read-after-free in cache walk + CVE-2024-26631: (unk) ipv6: mcast: fix data-race in ipv6_mc_down / mld_ifc_work + CVE-2024-26632: (unk) block: Fix iterating over an empty bio with bio_for_each_folio_all + CVE-2024-26633: (unk) ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim() + CVE-2024-26635: (unk) llc: Drop support for ETH_P_TR_802_2. + CVE-2024-26636: (unk) llc: make llc_ui_sendmsg() more robust against bonding changes + CVE-2024-26638: (unk) nbd: always initialize struct msghdr completely + CVE-2024-26640: (unk) tcp: add sanity checks to rx zerocopy + CVE-2024-26641: (unk) ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv() + CVE-2024-26642: (unk) netfilter: nf_tables: disallow anonymous set with timeout flag + CVE-2024-26643: (unk) netfilter: nf_tables: mark set as dead when unbinding anonymous set with timeout + CVE-2024-26644: (unk) btrfs: don't abort filesystem when attempting to snapshot deleted subvolume + CVE-2024-26645: (unk) tracing: Ensure visibility when inserting an element into tracing_map + CVE-2024-26646: (unk) thermal: intel: hfi: Add syscore callbacks for system-wide PM + CVE-2024-26647: (unk) drm/amd/display: Fix late derefrence 'dsc' check in 'link_set_dsc_pps_packet()' + CVE-2024-26648: (unk) drm/amd/display: Fix variable deferencing before NULL check in edp_setup_replay() + CVE-2024-26649: (unk) drm/amdgpu: Fix the null pointer when load rlc firmware + CVE-2024-26650: (unk) platform/x86: p2sb: Allow p2sb_bar() calls during PCI device probe + CVE-2024-26651: (unk) sr9800: Add check for usbnet_get_endpoints + CVE-2024-26652: (unk) net: pds_core: Fix possible double free in error handling path + CVE-2024-26654: (unk) ALSA: sh: aica: reorder cleanup operations to avoid UAF bugs + CVE-2024-26655: (unk) Fix memory leak in posix_clock_open() + CVE-2024-26656: (unk) drm/amdgpu: fix use-after-free bug + CVE-2024-26658: (unk) bcachefs: grab s_umount only if snapshotting + CVE-2024-26659: (unk) xhci: handle isoc Babble and Buffer Overrun events properly + CVE-2024-26660: (unk) drm/amd/display: Implement bounds check for stream encoder creation in DCN301 + CVE-2024-26661: (unk) drm/amd/display: Add NULL test for 'timing generator' in 'dcn21_set_pipe()' + CVE-2024-26662: (unk) drm/amd/display: Fix 'panel_cntl' could be null in 'dcn21_set_backlight_level()' + CVE-2024-26663: (unk) tipc: Check the bearer type before calling tipc_udp_nl_bearer_add() + CVE-2024-26664: (unk) hwmon: (coretemp) Fix out-of-bounds memory access + CVE-2024-26665: (unk) tunnels: fix out of bounds access when building IPv6 PMTU error + CVE-2024-26666: (unk) wifi: mac80211: fix RCU use in TDLS fast-xmit + CVE-2024-26667: (unk) drm/msm/dpu: check for valid hw_pp in dpu_encoder_helper_phys_cleanup + CVE-2024-26668: (unk) netfilter: nft_limit: reject configurations that cause integer overflow + CVE-2024-26669: (unk) net/sched: flower: Fix chain template offload + CVE-2024-26671: (unk) blk-mq: fix IO hang from sbitmap wakeup race + CVE-2024-26672: (unk) drm/amdgpu: Fix variable 'mca_funcs' dereferenced before NULL check in 'amdgpu_mca_smu_get_mca_entry()' + CVE-2024-26673: (unk) netfilter: nft_ct: sanitize layer 3 and 4 protocol number in custom expectations + CVE-2024-26674: (unk) x86/lib: Revert to _ASM_EXTABLE_UA() for {get,put}_user() fixups + CVE-2024-26675: (unk) ppp_async: limit MRU to 64K + CVE-2024-26676: (unk) af_unix: Call kfree_skb() for dead unix_(sk)->oob_skb in GC. + CVE-2024-26677: (unk) rxrpc: Fix delayed ACKs to not set the reference serial number + CVE-2024-26679: (unk) inet: read sk->sk_family once in inet_recv_error() + CVE-2024-26680: (unk) net: atlantic: Fix DMA mapping for PTP hwts ring + CVE-2024-26681: (unk) netdevsim: avoid potential loop in nsim_dev_trap_report_work() + CVE-2024-26684: (unk) net: stmmac: xgmac: fix handling of DPP safety error for DMA channels + CVE-2024-26685: (unk) nilfs2: fix potential bug in end_buffer_async_write + CVE-2024-26686: (unk) fs/proc: do_task_stat: use sig->stats_lock to gather the threads/children stats + CVE-2024-26687: (unk) xen/events: close evtchn after mapping cleanup + CVE-2024-26688: (unk) fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super + CVE-2024-26689: (unk) ceph: prevent use-after-free in encode_cap_msg() + CVE-2024-26691: (unk) KVM: arm64: Fix circular locking dependency + CVE-2024-26692: (unk) smb: Fix regression in writes when non-standard maximum write size negotiated + CVE-2024-26693: (unk) wifi: iwlwifi: mvm: fix a crash when we run out of stations + CVE-2024-26694: (unk) wifi: iwlwifi: fix double-free bug + CVE-2024-26695: (unk) crypto: ccp - Fix null pointer dereference in __sev_platform_shutdown_locked + CVE-2024-26696: (unk) nilfs2: fix hang in nilfs_lookup_dirty_data_buffers() + CVE-2024-26697: (unk) nilfs2: fix data corruption in dsync block recovery for small block sizes + CVE-2024-26698: (unk) hv_netvsc: Fix race condition between netvsc_probe and netvsc_remove + CVE-2024-26699: (unk) drm/amd/display: Fix array-index-out-of-bounds in dcn35_clkmgr + CVE-2024-26700: (unk) drm/amd/display: Fix MST Null Ptr for RV + CVE-2024-26702: (unk) iio: magnetometer: rm3100: add boundary check for the value read from RM3100_REG_TMRC + CVE-2024-26703: (unk) tracing/timerlat: Move hrtimer_init to timerlat_fd open() + CVE-2024-26704: (unk) ext4: fix double-free of blocks due to wrong extents moved_len + CVE-2024-26706: (unk) parisc: Fix random data corruption from exception handler + CVE-2024-26707: (unk) net: hsr: remove WARN_ONCE() in send_hsr_supervision_frame() + CVE-2024-26708: (unk) mptcp: really cope with fastopen race + CVE-2024-26711: (unk) iio: adc: ad4130: zero-initialize clock init data + CVE-2024-26712: (unk) powerpc/kasan: Fix addr error caused by page alignment + CVE-2024-26713: (unk) powerpc/pseries/iommu: Fix iommu initialisation during DLPAR add + CVE-2024-26714: (unk) interconnect: qcom: sc8180x: Mark CO0 BCM keepalive + CVE-2024-26715: (unk) usb: dwc3: gadget: Fix NULL pointer dereference in dwc3_gadget_suspend + CVE-2024-26716: (unk) usb: core: Prevent null pointer dereference in update_port_device_state + CVE-2024-26717: (unk) HID: i2c-hid-of: fix NULL-deref on failed power up + CVE-2024-26718: (unk) dm-crypt, dm-verity: disable tasklets + CVE-2024-26719: (unk) nouveau: offload fence uevents work to workqueue + CVE-2024-26720: (unk) mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again + CVE-2024-26723: (unk) lan966x: Fix crash when adding interface under a lag + CVE-2024-26726: (unk) btrfs: don't drop extent_map for free space inode on write error + CVE-2024-26727: (unk) btrfs: do not ASSERT() if the newly created subvolume already got read + CVE-2024-26731: (unk) bpf, sockmap: Fix NULL pointer dereference in sk_psock_verdict_data_ready() + CVE-2024-26733: (unk) arp: Prevent overflow in arp_req_get(). + CVE-2024-26734: (unk) devlink: fix possible use-after-free and memory leaks in devlink_init() + CVE-2024-26735: (unk) ipv6: sr: fix possible use-after-free and null-ptr-deref + CVE-2024-26736: (unk) afs: Increase buffer size in afs_update_volume_status() + CVE-2024-26737: (unk) bpf: Fix racing between bpf_timer_cancel_and_free and bpf_timer_cancel + CVE-2024-26738: (unk) powerpc/pseries/iommu: DLPAR add doesn't completely initialize pci_controller + CVE-2024-26739: (unk) net/sched: act_mirred: don't override retval if we already lost the skb + CVE-2024-26740: (unk) net/sched: act_mirred: use the backlog for mirred ingress + CVE-2024-26741: (unk) dccp/tcp: Unhash sk from ehash for tb2 alloc failure after check_estalblished(). + CVE-2024-26742: (unk) scsi: smartpqi: Fix disable_managed_interrupts + CVE-2024-26743: (unk) RDMA/qedr: Fix qedr_create_user_qp error flow + CVE-2024-26744: (unk) RDMA/srpt: Support specifying the srpt_service_guid parameter + CVE-2024-26745: (unk) powerpc/pseries/iommu: IOMMU table is not initialized for kdump over SR-IOV + CVE-2024-26746: (unk) dmaengine: idxd: Ensure safe user copy of completion record + CVE-2024-26747: (unk) usb: roles: fix NULL pointer issue when put module's reference + CVE-2024-26748: (unk) usb: cdns3: fix memory double free when handle zero packet + CVE-2024-26749: (unk) usb: cdns3: fixed memory use after free at cdns3_gadget_ep_disable() + CVE-2024-26751: (unk) ARM: ep93xx: Add terminator to gpiod_lookup_table + CVE-2024-26752: (unk) l2tp: pass correct message length to ip6_append_data + CVE-2024-26753: (unk) crypto: virtio/akcipher - Fix stack overflow on memcpy + CVE-2024-26754: (unk) gtp: fix use-after-free and null-ptr-deref in gtp_genl_dump_pdp() + CVE-2024-26756: (unk) md: Don't register sync_thread for reshape directly + CVE-2024-26757: (unk) md: Don't ignore read-only array in md_check_recovery() + CVE-2024-26758: (unk) md: Don't ignore suspended array in md_check_recovery() + CVE-2024-26759: (unk) mm/swap: fix race when skipping swapcache + CVE-2024-26760: (unk) scsi: target: pscsi: Fix bio_put() for error case + CVE-2024-26761: (unk) cxl/pci: Fix disabling memory if DVSEC CXL Range does not match a CFMWS window + CVE-2024-26763: (unk) dm-crypt: don't modify the data when using authenticated encryption + CVE-2024-26764: (unk) fs/aio: Restrict kiocb_set_cancel_fn() to I/O submitted via libaio + CVE-2024-26765: (unk) LoongArch: Disable IRQ before init_fn() for nonboot CPUs + CVE-2024-26766: (unk) IB/hfi1: Fix sdma.h tx->num_descs off-by-one error + CVE-2024-26767: (unk) drm/amd/display: fixed integer types and null check locations + CVE-2024-26768: (unk) LoongArch: Change acpi_core_pic[NR_CPUS] to acpi_core_pic[MAX_CORE_PIC] + CVE-2024-26769: (unk) nvmet-fc: avoid deadlock on delete association path + CVE-2024-26770: (unk) HID: nvidia-shield: Add missing null pointer checks to LED initialization + CVE-2024-26771: (unk) dmaengine: ti: edma: Add some null pointer checks to the edma_probe + CVE-2024-26772: (unk) ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal() + CVE-2024-26773: (unk) ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found() + CVE-2024-26774: (unk) ext4: avoid dividing by 0 in mb_update_avg_fragment_size() when block bitmap corrupt + CVE-2024-26775: (unk) aoe: avoid potential deadlock at set_capacity + CVE-2024-26776: (unk) spi: hisi-sfc-v3xx: Return IRQ_NONE if no interrupts were detected + CVE-2024-26777: (unk) fbdev: sis: Error out if pixclock equals zero + CVE-2024-26778: (unk) fbdev: savage: Error out if pixclock equals zero + CVE-2024-26779: (unk) wifi: mac80211: fix race condition on enabling fast-xmit + CVE-2024-26782: (unk) mptcp: fix double-free on socket dismantle + CVE-2024-26783: (unk) mm/vmscan: fix a bug calling wakeup_kswapd() with a wrong zone index + CVE-2024-26784: (unk) pmdomain: arm: Fix NULL dereference on scmi_perf_domain removal + CVE-2024-26787: (unk) mmc: mmci: stm32: fix DMA API overlapping mappings warning + CVE-2024-26788: (unk) dmaengine: fsl-qdma: init irq after reg initialization + CVE-2024-26789: (unk) crypto: arm64/neonbs - fix out-of-bounds access on short input + CVE-2024-26790: (unk) dmaengine: fsl-qdma: fix SoC may hang on 16 byte unaligned read + CVE-2024-26791: (unk) btrfs: dev-replace: properly validate device names + CVE-2024-26793: (unk) gtp: fix use-after-free and null-ptr-deref in gtp_newlink() + CVE-2024-26795: (unk) riscv: Sparse-Memory/vmemmap out-of-bounds fix + CVE-2024-26797: (unk) drm/amd/display: Prevent potential buffer overflow in map_hw_resources + CVE-2024-26798: (unk) fbcon: always restore the old font data in fbcon_do_set_font() + CVE-2024-26799: (unk) ASoC: qcom: Fix uninitialized pointer dmactl + CVE-2024-26801: (unk) Bluetooth: Avoid potential use-after-free in hci_error_reset + CVE-2024-26802: (unk) stmmac: Clear variable when destroying workqueue + CVE-2024-26803: (unk) net: veth: clear GRO when clearing XDP even when down + CVE-2024-26804: (unk) net: ip_tunnel: prevent perpetual headroom growth + CVE-2024-26805: (unk) netlink: Fix kernel-infoleak-after-free in __skb_datagram_iter + CVE-2024-26806: (unk) spi: cadence-qspi: remove system-wide suspend helper calls from runtime PM hooks + CVE-2024-26807: (unk) spi: cadence-qspi: fix pointer reference in runtime PM hooks + CVE-2024-26808: (unk) netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain + CVE-2024-26809: (unk) netfilter: nft_set_pipapo: release elements in clone only from destroy path diff --git a/data/6.6/6.6_CVEs.txt b/data/6.6/6.6_CVEs.txt index 8589243a6..9a80893b1 100644 --- a/data/6.6/6.6_CVEs.txt +++ b/data/6.6/6.6_CVEs.txt @@ -75,6 +75,7 @@ CVE-2023-21400: Fix unknown CVE-2023-23039: Fix unknown CVE-2023-26242: Fix unknown CVE-2023-2640: Fix unknown +CVE-2023-28746: Fixed with 6.6.22 CVE-2023-31081: Fix unknown CVE-2023-31082: Fix unknown CVE-2023-32629: Fix unknown @@ -84,7 +85,7 @@ CVE-2023-37454: Fix unknown CVE-2023-4010: Fix unknown CVE-2023-46838: Fixed with 6.6.14 CVE-2023-46862: Fixed with 6.6 -CVE-2023-47233: Fix unknown +CVE-2023-47233: Fixed with 6.6.24 CVE-2023-50431: Fixed with 6.6.14 CVE-2023-51779: Fixed with 6.6.9 CVE-2023-51780: Fixed with 6.6.8 @@ -116,16 +117,89 @@ CVE-2023-52459: Fixed with 6.6.14 CVE-2023-52462: Fixed with 6.6.14 CVE-2023-52463: Fixed with 6.6.14 CVE-2023-52464: Fixed with 6.6.14 +CVE-2023-52465: Fixed with 6.6.14 +CVE-2023-52467: Fixed with 6.6.14 +CVE-2023-52468: Fixed with 6.6.14 +CVE-2023-52469: Fixed with 6.6.14 +CVE-2023-52470: Fixed with 6.6.14 +CVE-2023-52472: Fixed with 6.6.14 +CVE-2023-52473: Fixed with 6.6.14 +CVE-2023-52485: Fix not seen in stream +CVE-2023-52486: Fixed with 6.6.15 +CVE-2023-52487: Fixed with 6.6.15 +CVE-2023-52488: Fixed with 6.6.15 +CVE-2023-52489: Fixed with 6.6.15 +CVE-2023-52490: Fixed with 6.6.15 +CVE-2023-52491: Fixed with 6.6.15 +CVE-2023-52492: Fixed with 6.6.15 +CVE-2023-52493: Fixed with 6.6.15 +CVE-2023-52494: Fixed with 6.6.15 +CVE-2023-52495: Fixed with 6.6.15 +CVE-2023-52497: Fixed with 6.6.15 +CVE-2023-52498: Fixed with 6.6.15 +CVE-2023-52583: Fixed with 6.6.16 +CVE-2023-52584: Fixed with 6.6.16 +CVE-2023-52585: Fix not seen in stream +CVE-2023-52586: Fix not seen in stream +CVE-2023-52587: Fixed with 6.6.16 +CVE-2023-52588: Fixed with 6.6.16 +CVE-2023-52589: Fixed with 6.6.16 +CVE-2023-52590: Fix not seen in stream +CVE-2023-52591: Fixed with 6.6.16 +CVE-2023-52593: Fixed with 6.6.16 +CVE-2023-52594: Fixed with 6.6.16 +CVE-2023-52595: Fixed with 6.6.16 +CVE-2023-52596: Fixed with 6.6.16 +CVE-2023-52597: Fixed with 6.6.16 +CVE-2023-52598: Fixed with 6.6.16 +CVE-2023-52599: Fixed with 6.6.16 +CVE-2023-52600: Fixed with 6.6.16 +CVE-2023-52601: Fixed with 6.6.16 +CVE-2023-52602: Fixed with 6.6.16 +CVE-2023-52603: Fixed with 6.6.16 +CVE-2023-52604: Fixed with 6.6.16 +CVE-2023-52606: Fixed with 6.6.16 +CVE-2023-52607: Fixed with 6.6.16 +CVE-2023-52608: Fixed with 6.6.15 +CVE-2023-52609: Fixed with 6.6.14 +CVE-2023-52610: Fixed with 6.6.14 +CVE-2023-52611: Fixed with 6.6.14 +CVE-2023-52612: Fixed with 6.6.14 +CVE-2023-52613: Fixed with 6.6.14 +CVE-2023-52614: Fixed with 6.6.15 +CVE-2023-52615: Fixed with 6.6.15 +CVE-2023-52616: Fixed with 6.6.15 +CVE-2023-52617: Fixed with 6.6.16 +CVE-2023-52618: Fixed with 6.6.16 +CVE-2023-52619: Fixed with 6.6.16 +CVE-2023-52621: Fixed with 6.6.16 +CVE-2023-52622: Fixed with 6.6.16 +CVE-2023-52623: Fixed with 6.6.16 +CVE-2023-52624: Fix not seen in stream +CVE-2023-52625: Fix not seen in stream +CVE-2023-52627: Fixed with 6.6.15 +CVE-2023-52630: Fixed with 6.6.17 +CVE-2023-52631: Fixed with 6.6.17 +CVE-2023-52632: Fixed with 6.6.16 +CVE-2023-52633: Fixed with 6.6.16 +CVE-2023-52634: Fix not seen in stream +CVE-2023-52635: Fixed with 6.6.16 +CVE-2023-52636: Fixed with 6.6.17 +CVE-2023-52637: Fixed with 6.6.18 +CVE-2023-52638: Fixed with 6.6.18 +CVE-2023-52639: Fixed with 6.6.22 +CVE-2023-52640: Fixed with 6.6.19 +CVE-2023-52641: Fixed with 6.6.19 CVE-2023-6111: Fixed with 6.6.3 CVE-2023-6121: Fixed with 6.6.4 CVE-2023-6200: Fixed with 6.6.9 CVE-2023-6238: Fix unknown CVE-2023-6240: Fix unknown -CVE-2023-6270: Fix unknown -CVE-2023-6356: Fix unknown +CVE-2023-6270: Fixed with 6.6.23 +CVE-2023-6356: Fixed with 6.6.14 CVE-2023-6531: Fixed with 6.6.7 CVE-2023-6535: Fix unknown -CVE-2023-6536: Fix unknown +CVE-2023-6536: Fixed with 6.6.14 CVE-2023-6560: Fixed with 6.6.5 CVE-2023-6606: Fixed with 6.6.9 CVE-2023-6610: Fixed with 6.6.13 @@ -134,7 +208,7 @@ CVE-2023-6817: Fixed with 6.6.7 CVE-2023-6915: Fixed with 6.6.13 CVE-2023-6931: Fixed with 6.6.7 CVE-2023-6932: Fixed with 6.6.5 -CVE-2023-7042: Fix unknown +CVE-2023-7042: Fixed with 6.6.23 CVE-2024-0193: Fixed with 6.6.10 CVE-2024-0564: Fix unknown CVE-2024-0565: Fixed with 6.6.8 @@ -142,16 +216,16 @@ CVE-2024-0582: Fixed with 6.6.5 CVE-2024-0584: Fixed with 6.6.5 CVE-2024-0607: Fixed with 6.6.3 CVE-2024-0646: Fixed with 6.6.7 -CVE-2024-0841: Fix unknown +CVE-2024-0841: Fixed with 6.6.18 CVE-2024-1085: Fixed with 6.6.14 CVE-2024-1086: Fixed with 6.6.15 CVE-2024-1151: Fixed with 6.6.18 CVE-2024-21803: Fix unknown -CVE-2024-22099: Fix unknown +CVE-2024-2193: Fix unknown +CVE-2024-22099: Fixed with 6.6.23 CVE-2024-22386: Fix unknown CVE-2024-22705: Fixed with 6.6.10 -CVE-2024-23196: Fix unknown -CVE-2024-23307: Fix unknown +CVE-2024-23307: Fixed with 6.6.24 CVE-2024-23848: Fix unknown CVE-2024-23849: Fixed with 6.6.15 CVE-2024-23850: Fixed with 6.6.18 @@ -160,7 +234,7 @@ CVE-2024-24857: Fix unknown CVE-2024-24858: Fix unknown CVE-2024-24859: Fix unknown CVE-2024-24860: Fixed with 6.6.14 -CVE-2024-24861: Fix unknown +CVE-2024-24861: Fixed with 6.6.24 CVE-2024-24864: Fix unknown CVE-2024-25739: Fix unknown CVE-2024-25740: Fix unknown @@ -185,3 +259,179 @@ CVE-2024-26596: Fix not seen in stream CVE-2024-26597: Fixed with 6.6.14 CVE-2024-26598: Fixed with 6.6.14 CVE-2024-26599: Fixed with 6.6.14 +CVE-2024-26600: Fixed with 6.6.17 +CVE-2024-26601: Fixed with 6.6.17 +CVE-2024-26602: Fixed with 6.6.18 +CVE-2024-26603: Fixed with 6.6.18 +CVE-2024-26604: Fixed with 6.6.18 +CVE-2024-26606: Fixed with 6.6.18 +CVE-2024-26607: Fixed with 6.6.15 +CVE-2024-26608: Fixed with 6.6.15 +CVE-2024-26610: Fixed with 6.6.15 +CVE-2024-26611: Fixed with 6.6.15 +CVE-2024-26612: Fixed with 6.6.15 +CVE-2024-26614: Fixed with 6.6.15 +CVE-2024-26615: Fixed with 6.6.15 +CVE-2024-26616: Fixed with 6.6.15 +CVE-2024-26618: Fixed with 6.6.15 +CVE-2024-26620: Fixed with 6.6.15 +CVE-2024-26622: Fixed with 6.6.21 +CVE-2024-26623: Fixed with 6.6.16 +CVE-2024-26625: Fixed with 6.6.16 +CVE-2024-26627: Fixed with 6.6.16 +CVE-2024-26629: Fixed with 6.6.15 +CVE-2024-26630: Fixed with 6.6.21 +CVE-2024-26631: Fixed with 6.6.14 +CVE-2024-26632: Fixed with 6.6.14 +CVE-2024-26633: Fixed with 6.6.14 +CVE-2024-26634: Fixed with 6.6.15 +CVE-2024-26635: Fixed with 6.6.15 +CVE-2024-26636: Fixed with 6.6.15 +CVE-2024-26638: Fixed with 6.6.15 +CVE-2024-26640: Fixed with 6.6.16 +CVE-2024-26641: Fixed with 6.6.16 +CVE-2024-26642: Fixed with 6.6.24 +CVE-2024-26643: Fixed with 6.6.24 +CVE-2024-26644: Fixed with 6.6.15 +CVE-2024-26645: Fixed with 6.6.15 +CVE-2024-26646: Fixed with 6.6.15 +CVE-2024-26647: Fixed with 6.6.15 +CVE-2024-26648: Fixed with 6.6.15 +CVE-2024-26649: Fixed with 6.6.15 +CVE-2024-26650: Fixed with 6.6.15 +CVE-2024-26651: Fixed with 6.6.23 +CVE-2024-26652: Fixed with 6.6.22 +CVE-2024-26654: Fixed with 6.6.24 +CVE-2024-26655: Fix not seen in stream +CVE-2024-26656: Fixed with 6.6.24 +CVE-2024-26658: Fix not seen in stream +CVE-2024-26659: Fixed with 6.6.17 +CVE-2024-26660: Fixed with 6.6.17 +CVE-2024-26661: Fixed with 6.6.17 +CVE-2024-26662: Fixed with 6.6.17 +CVE-2024-26663: Fixed with 6.6.17 +CVE-2024-26664: Fixed with 6.6.17 +CVE-2024-26665: Fixed with 6.6.17 +CVE-2024-26666: Fixed with 6.6.17 +CVE-2024-26667: Fixed with 6.6.17 +CVE-2024-26668: Fixed with 6.6.15 +CVE-2024-26669: Fixed with 6.6.15 +CVE-2024-26670: Fixed with 6.6.15 +CVE-2024-26671: Fixed with 6.6.16 +CVE-2024-26672: Fix not seen in stream +CVE-2024-26673: Fixed with 6.6.16 +CVE-2024-26674: Fixed with 6.6.17 +CVE-2024-26675: Fixed with 6.6.17 +CVE-2024-26676: Fixed with 6.6.17 +CVE-2024-26677: Fixed with 6.6.17 +CVE-2024-26679: Fixed with 6.6.17 +CVE-2024-26680: Fixed with 6.6.17 +CVE-2024-26681: Fixed with 6.6.17 +CVE-2024-26684: Fixed with 6.6.17 +CVE-2024-26685: Fixed with 6.6.18 +CVE-2024-26686: Fix not seen in stream +CVE-2024-26687: Fixed with 6.6.19 +CVE-2024-26688: Fixed with 6.6.18 +CVE-2024-26689: Fixed with 6.6.18 +CVE-2024-26690: Fixed with 6.6.18 +CVE-2024-26691: Fixed with 6.6.18 +CVE-2024-26692: Fixed with 6.6.18 +CVE-2024-26693: Fixed with 6.6.18 +CVE-2024-26694: Fixed with 6.6.18 +CVE-2024-26695: Fixed with 6.6.18 +CVE-2024-26696: Fixed with 6.6.18 +CVE-2024-26697: Fixed with 6.6.18 +CVE-2024-26698: Fixed with 6.6.18 +CVE-2024-26699: Fix not seen in stream +CVE-2024-26700: Fixed with 6.6.18 +CVE-2024-26702: Fixed with 6.6.18 +CVE-2024-26703: Fixed with 6.6.18 +CVE-2024-26704: Fixed with 6.6.18 +CVE-2024-26705: Fixed with 6.6.18 +CVE-2024-26706: Fixed with 6.6.18 +CVE-2024-26707: Fixed with 6.6.18 +CVE-2024-26708: Fixed with 6.6.18 +CVE-2024-26711: Fixed with 6.6.18 +CVE-2024-26712: Fixed with 6.6.18 +CVE-2024-26713: Fixed with 6.6.18 +CVE-2024-26714: Fixed with 6.6.18 +CVE-2024-26715: Fixed with 6.6.18 +CVE-2024-26716: Fixed with 6.6.18 +CVE-2024-26717: Fixed with 6.6.18 +CVE-2024-26718: Fixed with 6.6.18 +CVE-2024-26719: Fixed with 6.6.18 +CVE-2024-26720: Fixed with 6.6.18 +CVE-2024-26723: Fixed with 6.6.18 +CVE-2024-26726: Fixed with 6.6.18 +CVE-2024-26727: Fixed with 6.6.18 +CVE-2024-26730: Fixed with 6.6.19 +CVE-2024-26731: Fixed with 6.6.19 +CVE-2024-26733: Fixed with 6.6.19 +CVE-2024-26734: Fixed with 6.6.19 +CVE-2024-26735: Fixed with 6.6.19 +CVE-2024-26736: Fixed with 6.6.19 +CVE-2024-26737: Fixed with 6.6.19 +CVE-2024-26738: Fixed with 6.6.19 +CVE-2024-26739: Fixed with 6.6.19 +CVE-2024-26740: Fixed with 6.6.19 +CVE-2024-26741: Fixed with 6.6.19 +CVE-2024-26742: Fixed with 6.6.19 +CVE-2024-26743: Fixed with 6.6.19 +CVE-2024-26744: Fixed with 6.6.19 +CVE-2024-26745: Fixed with 6.6.21 +CVE-2024-26746: Fixed with 6.6.21 +CVE-2024-26747: Fixed with 6.6.19 +CVE-2024-26748: Fixed with 6.6.19 +CVE-2024-26749: Fixed with 6.6.19 +CVE-2024-26751: Fixed with 6.6.19 +CVE-2024-26752: Fixed with 6.6.19 +CVE-2024-26753: Fixed with 6.6.19 +CVE-2024-26754: Fixed with 6.6.19 +CVE-2024-26756: Fix not seen in stream +CVE-2024-26757: Fix not seen in stream +CVE-2024-26758: Fix not seen in stream +CVE-2024-26759: Fixed with 6.6.19 +CVE-2024-26760: Fixed with 6.6.19 +CVE-2024-26761: Fixed with 6.6.19 +CVE-2024-26763: Fixed with 6.6.19 +CVE-2024-26764: Fixed with 6.6.19 +CVE-2024-26765: Fixed with 6.6.19 +CVE-2024-26766: Fixed with 6.6.19 +CVE-2024-26767: Fixed with 6.6.19 +CVE-2024-26768: Fixed with 6.6.19 +CVE-2024-26769: Fixed with 6.6.19 +CVE-2024-26770: Fixed with 6.6.19 +CVE-2024-26771: Fixed with 6.6.19 +CVE-2024-26772: Fixed with 6.6.19 +CVE-2024-26773: Fixed with 6.6.19 +CVE-2024-26774: Fixed with 6.6.19 +CVE-2024-26775: Fixed with 6.6.19 +CVE-2024-26776: Fixed with 6.6.19 +CVE-2024-26777: Fixed with 6.6.19 +CVE-2024-26778: Fixed with 6.6.19 +CVE-2024-26779: Fixed with 6.6.19 +CVE-2024-26782: Fixed with 6.6.21 +CVE-2024-26783: Fixed with 6.6.22 +CVE-2024-26784: Fix not seen in stream +CVE-2024-26785: Fix not seen in stream +CVE-2024-26786: Fixed with 6.6.21 +CVE-2024-26787: Fixed with 6.6.21 +CVE-2024-26788: Fixed with 6.6.21 +CVE-2024-26789: Fixed with 6.6.21 +CVE-2024-26790: Fixed with 6.6.21 +CVE-2024-26791: Fixed with 6.6.21 +CVE-2024-26793: Fixed with 6.6.21 +CVE-2024-26795: Fixed with 6.6.21 +CVE-2024-26796: Fixed with 6.6.21 +CVE-2024-26797: Fix not seen in stream +CVE-2024-26798: Fixed with 6.6.21 +CVE-2024-26799: Fixed with 6.6.21 +CVE-2024-26801: Fixed with 6.6.21 +CVE-2024-26802: Fixed with 6.6.21 +CVE-2024-26803: Fixed with 6.6.21 +CVE-2024-26804: Fixed with 6.6.21 +CVE-2024-26805: Fixed with 6.6.21 +CVE-2024-26806: Fix not seen in stream +CVE-2024-26807: Fixed with 6.6.21 +CVE-2024-26808: Fixed with 6.6.15 +CVE-2024-26809: Fixed with 6.6.23 diff --git a/data/6.6/6.6_security.txt b/data/6.6/6.6_security.txt index bc84ab789..049da0480 100644 --- a/data/6.6/6.6_security.txt +++ b/data/6.6/6.6_security.txt @@ -72,6 +72,20 @@ CVEs fixed in 6.6.14: CVE-2023-52462: 8dc15b0670594543c356567a1a45b0182ec63174 bpf: fix check for attempt to corrupt spilled pointer CVE-2023-52463: 0049fe7e4a85849bdd778cdb72e51a791ff3d737 efivarfs: force RO when remounting if SetVariable is not supported CVE-2023-52464: e1c86511241588efffaa49556196f09a498d5057 EDAC/thunderx: Fix possible out-of-bounds string access + CVE-2023-52465: e2717302fbc20f148bcda362facee0444b949a3a power: supply: Fix null pointer dereference in smb2_probe + CVE-2023-52467: 3ef1130deee98997275904d9bfc37af75e1e906c mfd: syscon: Fix null pointer dereference in of_syscon_register() + CVE-2023-52468: b57196a5ec5e4c0ffecde8348b085b778c7dce04 class: fix use-after-free in class_register() + CVE-2023-52469: 95084632a65d5c0d682a83b55935560bdcd2a1e3 drivers/amd/pm: fix a use-after-free in kv_parse_power_table + CVE-2023-52470: 0b813a6a0087451cb702b6eb841f10856f49d088 drm/radeon: check the alloc_workqueue return value in radeon_crtc_init() + CVE-2023-52472: 2831f4d3bfa68e64c5f83e96688be779c87b3511 crypto: rsa - add a check for allocation failure + CVE-2023-52473: 335176dd8ebaca6493807dceea33c478305667fa thermal: core: Fix NULL pointer dereference in zone registration error path + CVE-2023-52609: 67f16bf2cc1698fd50e01ee8a2becc5a8e6d3a3e binder: fix race between mmput() and do_exit() + CVE-2023-52610: 73f7da5fd124f2cda9161e2e46114915e6e82e97 net/sched: act_ct: fix skb leak and crash on ooo frags + CVE-2023-52611: 5b5ddf21b978ec315cab9d9e7e6ac7374791a8c7 wifi: rtw88: sdio: Honor the host max_req_size in the RX path + CVE-2023-52612: 7d9e5bed036a7f9e2062a137e97e3c1e77fb8759 crypto: scomp - fix req->dst buffer overflow + CVE-2023-52613: 70481755ed77400e783200e2d022e5fea16060ce drivers/thermal/loongson2_thermal: Fix incorrect PTR_ERR() judgment + CVE-2023-6356: 24e05760186dc070d3db190ca61efdbce23afc88 nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length + CVE-2023-6536: 2f00fd8d50a7d5eedc85e62efdc1a29213168998 nvmet-tcp: fix a crash in nvmet_req_complete() CVE-2024-1085: 7baa33837ee2473eb0afd9755e29a25cd3771eac netfilter: nf_tables: check if catch-all set element is active in next generation CVE-2024-24860: f56e715ef1c19c42c6aa6cb9280947dea13aab2e Bluetooth: Fix atomicity violation in {min,max}_key_size_set CVE-2024-26586: 2f5e1565740490706332c06f36211d4ce0f88e62 mlxsw: spectrum_acl_tcam: Fix stack corruption @@ -86,16 +100,125 @@ CVEs fixed in 6.6.14: CVE-2024-26597: c4734535034672f59f2652e1e0058c490da62a5c net: qualcomm: rmnet: fix global oob in rmnet_policy CVE-2024-26598: 65b201bf3e9af1b0254243a5881390eda56f72d1 KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache CVE-2024-26599: e5f2b4b62977fb6c2efcbc5779e0c9dce18215f7 pwm: Fix out-of-bounds access in of_pwm_single_xlate() + CVE-2024-26631: 3cc283fd16fba72e2cefe3a6f48d7a36b0438900 ipv6: mcast: fix data-race in ipv6_mc_down / mld_ifc_work + CVE-2024-26632: a6bd8182137a12d22d3f2cee463271bdcb491659 block: Fix iterating over an empty bio with bio_for_each_folio_all + CVE-2024-26633: 687c5d52fe53e602e76826dbd4d7af412747e183 ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim() CVEs fixed in 6.6.15: + CVE-2023-52486: d7afdf360f4ac142832b098b4de974e867cc063c drm: Don't unref the same fb many times by mistake due to deadlock handling + CVE-2023-52487: 74cec142f89bf85c6c99c5db957da9f663f9f16f net/mlx5e: Fix peer flow lists handling + CVE-2023-52488: 084c24e788d9cf29c55564de368bf5284f2bb5db serial: sc16is7xx: convert from _raw_ to _noinc_ regmap functions for FIFO + CVE-2023-52489: 70064241f2229f7ba7b9599a98f68d9142e81a97 mm/sparsemem: fix race in accessing memory_section->usage + CVE-2023-52490: 9128bfbc5c80d8f4874dd0a0424d1f5fb010df1b mm: migrate: fix getting incorrect page mapping during page migration + CVE-2023-52491: 8254d54d00eb6cdb8367399c7f912eb8d354ecd7 media: mtk-jpeg: Fix use after free bug due to error path handling in mtk_jpeg_dec_device_run + CVE-2023-52492: 7f0ccfad2031eddcc510caf4e57f2d4aa2d8a50b dmaengine: fix NULL pointer in channel unregistration function + CVE-2023-52493: eaefb9464031215d63c0a8a7e2bfaa00736aa17e bus: mhi: host: Drop chan lock before queuing buffers + CVE-2023-52494: a9ebfc405fe1be145f414eafadcbf09506082010 bus: mhi: host: Add alignment check for event ring read pointer + CVE-2023-52495: 532a5557da6892a6b2d5793052e1bce1f4c9e177 soc: qcom: pmic_glink_altmode: fix port sanity check + CVE-2023-52497: f36d200a80a3ca025532ed60dd1ac21b620e14ae erofs: fix lz4 inplace decompression + CVE-2023-52498: e681e29d1f59a04ef773296e4bebb17b1b79f8fe PM: sleep: Fix possible deadlocks in core system-wide PM code + CVE-2023-52608: 9b5e1b93c83ee5fc9f5d7bd2d45b421bd87774a2 firmware: arm_scmi: Check mailbox/SMT channel for consistency + CVE-2023-52614: a979f56aa4b93579cf0e4265ae04d7e9300fd3e8 PM / devfreq: Fix buffer overflow in trans_stat_show + CVE-2023-52615: ecabe8cd456d3bf81e92c53b074732f3140f170d hwrng: core - Fix page fault dead lock on mmap-ed hwrng + CVE-2023-52616: 7ebf812b7019fd2d4d5a7ca45ef4bf3a6f4bda0a crypto: lib/mpi - Fix unexpected pointer access in mpi_ec_init + CVE-2023-52627: 89c4e63324e208a23098f7fb15c00487cecbfed2 iio: adc: ad7091r: Allow users to configure device events CVE-2024-1086: 6653118b176a00915125521c6572ae8e507621db netfilter: nf_tables: reject QUEUE/DROP verdict parameters CVE-2024-23849: 7a73190ea557e7f26914b0fe04c1f57a96cb771f net/rds: Fix UBSAN: array-index-out-of-bounds in rds_cmsg_recv + CVE-2024-26607: 56f96cf6eb11a1c2d594367c3becbfb06a855ec1 drm/bridge: sii902x: Fix probing race issue + CVE-2024-26608: 9863a53100f47652755545c2bd43e14a1855104d ksmbd: fix global oob in ksmbd_nl_policy + CVE-2024-26610: 870171899d75d43e3d14360f3a4850e90a9c289b wifi: iwlwifi: fix a memory corruption + CVE-2024-26611: 82ee4781b8200e44669a354140d5c6bd966b8768 xsk: fix usage of multi-buffer BPF helpers for ZC XDP + CVE-2024-26612: 1c45256e599061021e2c848952e50f406457e448 netfs, fscache: Prevent Oops in fscache_put_cache() + CVE-2024-26614: 168e7e599860654876c2a1102a82610285c02f02 tcp: make sure init the accept_queue's spinlocks once + CVE-2024-26615: a164c2922675d7051805cdaf2b07daffe44f20d9 net/smc: fix illegal rmb_desc access in SMC-D connection dump + CVE-2024-26616: 642b9c520ef2f104277ad1f902f8526edbe087fb btrfs: scrub: avoid use-after-free when chunk length is not 64K aligned + CVE-2024-26618: 569156e4fa347237f8fa2a7e935d860109c55ac4 arm64/sme: Always exit sme_alloc() early with existing storage + CVE-2024-26620: c69d821197611678533fb3eb784fc823b921349a s390/vfio-ap: always filter entire AP matrix + CVE-2024-26629: b7d2eee1f53899b53f069bba3a59a419fc3d331b nfsd: fix RELEASE_LOCKOWNER + CVE-2024-26634: e855dded4b70d1975ee7b9fed0c700391e3c8ea6 net: fix removing a namespace with conflicting altnames + CVE-2024-26635: f1f34a515fb1e25e85dee94f781e7869ae351fb8 llc: Drop support for ETH_P_TR_802_2. + CVE-2024-26636: cafd3ad3fe03ef4d6632747be9ee15dc0029db4b llc: make llc_ui_sendmsg() more robust against bonding changes + CVE-2024-26638: 1960f2b534da1e6c65fb96f9e98bda773495f406 nbd: always initialize struct msghdr completely + CVE-2024-26644: ec794a7528199e1be6d47bec03f4755aa75df256 btrfs: don't abort filesystem when attempting to snapshot deleted subvolume + CVE-2024-26645: a1eebe76e187dbe11ca299f8dbb6e45d5b1889e7 tracing: Ensure visibility when inserting an element into tracing_map + CVE-2024-26646: 019ccc66d56a696a4dfee3bfa2f04d0a7c3d89ee thermal: intel: hfi: Add syscore callbacks for system-wide PM + CVE-2024-26647: 6aa5ede6665122f4c8abce3c6eba06b49e54d25c drm/amd/display: Fix late derefrence 'dsc' check in 'link_set_dsc_pps_packet()' + CVE-2024-26648: 22ae604aea14756954e1c00ae653e34d2afd2935 drm/amd/display: Fix variable deferencing before NULL check in edp_setup_replay() + CVE-2024-26649: 8b5bacce2d13dbe648f0bfd3f738ecce8db4978c drm/amdgpu: Fix the null pointer when load rlc firmware + CVE-2024-26650: 847e1eb30e269a094da046c08273abe3f3361cf2 platform/x86: p2sb: Allow p2sb_bar() calls during PCI device probe + CVE-2024-26668: 9882495d02ecc490604f747437a40626dc9160d0 netfilter: nft_limit: reject configurations that cause integer overflow + CVE-2024-26669: 9ed46144cff3598a5cf79955630e795ff9af5b97 net/sched: flower: Fix chain template offload + CVE-2024-26670: 58eb5c07f41704464b9acc09ab0707b6769db6c0 arm64: entry: fix ARM64_WORKAROUND_SPECULATIVE_UNPRIV_LOAD + CVE-2024-26808: e5888acbf1a3d8d021990ce6c6061fd5b2bb21b4 netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain + +CVEs fixed in 6.6.16: + CVE-2023-52583: 196b87e5c00ce021e164a5de0f0d04f4116a9160 ceph: fix deadlock or deadcode of misusing dget() + CVE-2023-52584: f8dcafcb54632536684336161da8bdd52120f95e spmi: mediatek: Fix UAF on device remove + CVE-2023-52587: 342258fb46d66c1b4c7e2c3717ac01e10c03cf18 IB/ipoib: Fix mcast list locking + CVE-2023-52588: 417b8a91f4e8831cadaf85c3f15c6991c1f54dde f2fs: fix to tag gcing flag on page during block migration + CVE-2023-52589: fab483438342984f2a315fe13c882a80f0f7e545 media: rkisp1: Fix IRQ disable race issue + CVE-2023-52591: 17e1361cb91dc1325834da95d2ab532959d2debc reiserfs: Avoid touching renamed directory if parent does not change + CVE-2023-52593: 9ab224744a47363f74ea29c6894c405e3bcf5132 wifi: wfx: fix possible NULL pointer dereference in wfx_set_mfp_ap() + CVE-2023-52594: e4f4bac7d3b64eb75f70cd3345712de6f68a215d wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus() + CVE-2023-52595: 04cfe4a5da57ab9358cdfadea22bcb37324aaf83 wifi: rt2x00: restart beacon queue when hardware reset + CVE-2023-52596: 15893975e9e382f8294ea8d926f08dc2d8d39ede sysctl: Fix out of bounds access for empty sysctl registers + CVE-2023-52597: c87d7d910775a025e230fd6359b60627e392460f KVM: s390: fix setting of fpc register + CVE-2023-52598: 02c6bbfb08bad78dd014e24c7b893723c15ec7a1 s390/ptrace: handle setting of fpc register correctly + CVE-2023-52599: 6996d43b14486f4a6655b10edc541ada1b580b4b jfs: fix array-index-out-of-bounds in diNewExt + CVE-2023-52600: 1696d6d7d4a1b373e96428d0fe1166bd7c3c795e jfs: fix uaf in jfs_evict_inode + CVE-2023-52601: 2e16a1389b5a7983b45cb2aa20b0e3f0ee364d6c jfs: fix array-index-out-of-bounds in dbAdjTree + CVE-2023-52602: 7110650b85dd2f1cee819acd1345a9013a1a62f7 jfs: fix slab-out-of-bounds Read in dtSearch + CVE-2023-52603: edff092a59260bf0b0a2eba219cb3da6372c2f9f UBSAN: array-index-out-of-bounds in dtSplitRoot + CVE-2023-52604: 6a44065dd604972ec1fbcccbdc4a70d266a89cdd FS:JFS:UBSAN:array-index-out-of-bounds in dbAdjTree + CVE-2023-52606: 28b8ba8eebf26f66d9f2df4ba550b6b3b136082c powerpc/lib: Validate size for vector operations + CVE-2023-52607: 145febd85c3bcc5c74d87ef9a598fc7d9122d532 powerpc/mm: Fix null-pointer dereference in pgtable_cache_add + CVE-2023-52617: 0233b836312e39a3c763fb53512b3fa455b473b3 PCI: switchtec: Fix stdev_release() crash after surprise hot remove + CVE-2023-52618: 5b9ea86e662035a886ccb5c76d56793cba618827 block/rnbd-srv: Check for unlikely string overflow + CVE-2023-52619: 0593cfd321df9001142a9d2c58d4144917dff7ee pstore/ram: Fix crash when setting number of cpus to an odd number + CVE-2023-52621: 483cb92334cd7f1d5387dccc0ab5d595d27a669d bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers + CVE-2023-52622: 8b1413dbfe49646eda2c00c0f1144ee9d3368e0c ext4: avoid online resizing failures due to oversized flex bg + CVE-2023-52623: 69c7eeb4f622c2a28da965f970f982db171f3dc6 SUNRPC: Fix a suspicious RCU usage warning + CVE-2023-52632: 752312f6a79440086ac0f9b08d7776870037323c drm/amdkfd: Fix lock dependency warning with srcu + CVE-2023-52633: de3e9d8e8d1ae0a4d301109d1ec140796901306c um: time-travel: fix time corruption + CVE-2023-52635: 0aedb319ef3ed39e9e5a7b7726c8264ca627bbd9 PM / devfreq: Synchronize devfreq_monitor_[start/stop] + CVE-2024-26623: 22cd6046eb2148b18990257505834dd45c672a1b pds_core: Prevent race issues involving the adminq + CVE-2024-26625: 3151051b787f7cd7e3329ea0016eb9113c248812 llc: call sock_orphan() at release time + CVE-2024-26627: 65ead8468c21c2676d4d06f50b46beffdea69df1 scsi: core: Move scsi_host_busy() out of host lock for waking up EH handler + CVE-2024-26640: d15cc0f66884ef2bed28c7ccbb11c102aa3a0760 tcp: add sanity checks to rx zerocopy + CVE-2024-26641: 350a6640fac4b53564ec20aa3f4a0922cb0ba5e6 ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv() + CVE-2024-26671: 6d8b01624a2540336a32be91f25187a433af53a0 blk-mq: fix IO hang from sbitmap wakeup race + CVE-2024-26673: cfe3550ea5df292c9e2d608e8c4560032391847e netfilter: nft_ct: sanitize layer 3 and 4 protocol number in custom expectations CVEs fixed in 6.6.17: + CVE-2023-52630: 27b216130e64651e76ed583742a1b4e4d08a67c3 blk-iocost: Fix an UBSAN shift-out-of-bounds warning + CVE-2023-52631: fb7bcd1722bc9bc55160378f5f99c01198fd14a7 fs/ntfs3: Fix an NULL dereference bug + CVE-2023-52636: da9c33a70f095d5d55c36d0bfeba969e31de08ae libceph: just wait for more data to be available on the socket CVE-2024-26581: b734f7a47aeb32a5ba298e4ccc16bb0c52b6dbf7 netfilter: nft_set_rbtree: skip end interval element from gc + CVE-2024-26600: 14ef61594a5a286ae0d493b8acbf9eac46fd04c4 phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP + CVE-2024-26601: ea42d6cffb0dd27a417f410b9d0011e9859328cb ext4: regenerate buddy after block freeing failed if under fc replay + CVE-2024-26659: f5e7ffa9269a448a720e21f1ed1384d118298c97 xhci: handle isoc Babble and Buffer Overrun events properly + CVE-2024-26660: cd9bd10c59e3c1446680514fd3097c5b00d3712d drm/amd/display: Implement bounds check for stream encoder creation in DCN301 + CVE-2024-26661: 3f3c237a706580326d3b7a1b97697e5031ca4667 drm/amd/display: Add NULL test for 'timing generator' in 'dcn21_set_pipe()' + CVE-2024-26662: 2e150ccea13129eb048679114808eb9770443e4d drm/amd/display: Fix 'panel_cntl' could be null in 'dcn21_set_backlight_level()' + CVE-2024-26663: 888e3524be87f3df9fa3c083484e4b62b3e3bb59 tipc: Check the bearer type before calling tipc_udp_nl_bearer_add() + CVE-2024-26664: 853a6503c586a71abf27e60a7f8c4fb28092976d hwmon: (coretemp) Fix out-of-bounds memory access + CVE-2024-26665: 510c869ffa4068c5f19ff4df51d1e2f3a30aaac1 tunnels: fix out of bounds access when building IPv6 PMTU error + CVE-2024-26666: fc3432ae8232ff4025e7c55012dd88db0e3d18eb wifi: mac80211: fix RCU use in TDLS fast-xmit + CVE-2024-26667: 79592a6e7bdc1d05460c95f891f5e5263a107af8 drm/msm/dpu: check for valid hw_pp in dpu_encoder_helper_phys_cleanup + CVE-2024-26674: 2aed1b6c33afd8599d01c6532bbecb829480a674 x86/lib: Revert to _ASM_EXTABLE_UA() for {get,put}_user() fixups + CVE-2024-26675: 7e5ef49670766c9742ffcd9cead7cdb018268719 ppp_async: limit MRU to 64K + CVE-2024-26676: b74aa9ce13d02b7fd37c5325b99854f91b9b4276 af_unix: Call kfree_skb() for dead unix_(sk)->oob_skb in GC. + CVE-2024-26677: 200cb50b9e154434470c8969d32474d38475acc2 rxrpc: Fix delayed ACKs to not set the reference serial number + CVE-2024-26679: 4a5e31bdd3c1702b520506d9cf8c41085f75c7f2 inet: read sk->sk_family once in inet_recv_error() + CVE-2024-26680: 004fe5b7f59286a926a45e0cafc7870e9cdddd56 net: atlantic: Fix DMA mapping for PTP hwts ring + CVE-2024-26681: 6eecddd9c3c8d6e3a097531cdc6d500335b35e46 netdevsim: avoid potential loop in nsim_dev_trap_report_work() + CVE-2024-26684: 7e0ff50131e9d1aa507be8e670d38e9300a5f5bf net: stmmac: xgmac: fix handling of DPP safety error for DMA channels CVEs fixed in 6.6.18: CVE-2023-52429: 438d19492b7f002334573bae43276297eb234c80 dm: limit the number of targets and parameter size area + CVE-2023-52637: f84e7534457dcd7835be743517c35378bb4e7c50 can: j1939: Fix UAF in j1939_sk_match_filter during setsockopt(SO_J1939_FILTER) + CVE-2023-52638: 26dfe112ec2e95fe0099681f6aec33da13c2dd8e can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock + CVE-2024-0841: 13c5a9fb07105557a1fa9efdb4f23d7ef30b7274 fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super CVE-2024-1151: 5eeb2a9eaa5bc6e0aa655ac72a931b78f8f9b365 net: openvswitch: limit the number of recursions from action sets CVE-2024-23850: 833775656d447c545133a744a0ed1e189ce61430 btrfs: do not ASSERT() if the newly created subvolume already got read CVE-2024-23851: 438d19492b7f002334573bae43276297eb234c80 dm: limit the number of targets and parameter size area @@ -104,6 +227,135 @@ CVEs fixed in 6.6.18: CVE-2024-26584: 13eca403876bbea3716e82cdfe6f1e6febb38754 net: tls: handle backlogging of crypto requests CVE-2024-26585: 6db22d6c7a6dc914b12c0469b94eb639b6a8a146 tls: fix race between tx work scheduling and socket close CVE-2024-26593: 6be99c51829b24c914cef5bff6164877178e84d9 i2c: i801: Fix block process call transactions + CVE-2024-26602: b6a2a9cbb67545c825ec95f06adb7ff300a2ad71 sched/membarrier: reduce the ability to hammer on sys_membarrier + CVE-2024-26603: b2479ab426cef7ab79a13005650eff956223ced2 x86/fpu: Stop relying on userspace for info to fault in xsave buffer + CVE-2024-26604: 7f414d306320f837cc3df96cf52161cb8290fb1b Revert "kobject: Remove redundant checks for whether ktype is NULL" + CVE-2024-26606: a7ae586f6f6024f490b8546c8c84670f96bb9b68 binder: signal epoll threads of self-work + CVE-2024-26685: 2c3bdba00283a6c7a5b19481a59a730f46063803 nilfs2: fix potential bug in end_buffer_async_write + CVE-2024-26688: 13c5a9fb07105557a1fa9efdb4f23d7ef30b7274 fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super + CVE-2024-26689: ae20db45e482303a20e56f2db667a9d9c54ac7e7 ceph: prevent use-after-free in encode_cap_msg() + CVE-2024-26690: 9680b2ab54ba8d72581100e8c45471306101836e net: stmmac: protect updates of 64-bit statistics counters + CVE-2024-26691: 3d16cebf01127f459dcfeb79ed77bd68b124c228 KVM: arm64: Fix circular locking dependency + CVE-2024-26692: 4145ccff546ea868428b3e0fe6818c6261b574a9 smb: Fix regression in writes when non-standard maximum write size negotiated + CVE-2024-26693: 00f4eb31b8193f6070ce24df636883f9c104ca95 wifi: iwlwifi: mvm: fix a crash when we run out of stations + CVE-2024-26694: ab9d4bb9a1892439b3123fc52b19e32b9cdf80ad wifi: iwlwifi: fix double-free bug + CVE-2024-26695: 88aa493f393d2ee38ac140e1f6ac1881346e85d4 crypto: ccp - Fix null pointer dereference in __sev_platform_shutdown_locked + CVE-2024-26696: ea5ddbc11613b55e5128c85f57b08f907abd9b28 nilfs2: fix hang in nilfs_lookup_dirty_data_buffers() + CVE-2024-26697: 2e1480538ef60bfee5473dfe02b1ecbaf1a4aa0d nilfs2: fix data corruption in dsync block recovery for small block sizes + CVE-2024-26698: 22a77c0f5b8233237731df3288d067af51a2fd7b hv_netvsc: Fix race condition between netvsc_probe and netvsc_remove + CVE-2024-26700: 7407c61f43b66e90ad127d0cdd13cbc9d87141a5 drm/amd/display: Fix MST Null Ptr for RV + CVE-2024-26702: 1d8c67e94e9e977603473a543d4f322cf2c4aa01 iio: magnetometer: rm3100: add boundary check for the value read from RM3100_REG_TMRC + CVE-2024-26703: 5f703935fdb559642d85b2088442ee55a557ae6d tracing/timerlat: Move hrtimer_init to timerlat_fd open() + CVE-2024-26704: 2883940b19c38d5884c8626483811acf4d7e148f ext4: fix double-free of blocks due to wrong extents moved_len + CVE-2024-26705: 54944f45470af5965fb9c28cf962ec30f38a8f5b parisc: BTLB: Fix crash when setting up BTLB at CPU bringup + CVE-2024-26706: fa69a8063f8b27f3c7434a0d4f464a76a62f24d2 parisc: Fix random data corruption from exception handler + CVE-2024-26707: 923dea2a7ea9e1ef5ac4031fba461c1cc92e32b8 net: hsr: remove WARN_ONCE() in send_hsr_supervision_frame() + CVE-2024-26708: 4bfe217e075d04e63c092df9d40c608e598c2ef2 mptcp: really cope with fastopen race + CVE-2024-26711: 0e0dab37750926d4fb0144edb1c1ea0612fea273 iio: adc: ad4130: zero-initialize clock init data + CVE-2024-26712: 0516c06b19dc64807c10e01bb99b552bdf2d7dbe powerpc/kasan: Fix addr error caused by page alignment + CVE-2024-26713: 0040386b0b7187bd9c9665ac8b6dad93420bce79 powerpc/pseries/iommu: Fix iommu initialisation during DLPAR add + CVE-2024-26714: d8e36ff40cf9dadb135f3a97341c02c9a7afcc43 interconnect: qcom: sc8180x: Mark CO0 BCM keepalive + CVE-2024-26715: c7ebd8149ee519d27232e6e4940e9c02071b568b usb: dwc3: gadget: Fix NULL pointer dereference in dwc3_gadget_suspend + CVE-2024-26716: ed85777c640cf9e6920bb1b60ed8cd48e1f4d873 usb: core: Prevent null pointer dereference in update_port_device_state + CVE-2024-26717: 4cad91344a62536a2949873bad6365fbb6232776 HID: i2c-hid-of: fix NULL-deref on failed power up + CVE-2024-26718: 5735a2671ffb70ea29ca83969fe01316ee2ed6fc dm-crypt, dm-verity: disable tasklets + CVE-2024-26719: cc0037fa592d56e4abb9c7d1c52c4d2dc25cd906 nouveau: offload fence uevents work to workqueue + CVE-2024-26720: ec18ec230301583395576915d274b407743d8f6c mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again + CVE-2024-26723: 48fae67d837488c87379f0c9f27df7391718477c lan966x: Fix crash when adding interface under a lag + CVE-2024-26726: 7bddf18f474f166c19f91b2baf67bf7c5eda03f7 btrfs: don't drop extent_map for free space inode on write error + CVE-2024-26727: 833775656d447c545133a744a0ed1e189ce61430 btrfs: do not ASSERT() if the newly created subvolume already got read + +CVEs fixed in 6.6.19: + CVE-2023-52640: 52fff5799e3d1b5803ecd2f5f19c13c65f4f7b23 fs/ntfs3: Fix oob in ntfs_listxattr + CVE-2023-52641: 947c3f3d31ea185ddc8e7f198873f17d36deb24c fs/ntfs3: Add NULL ptr dereference checking at the end of attr_allocate_frame() + CVE-2024-26687: 20980195ec8d2e41653800c45c8c367fa1b1f2b4 xen/events: close evtchn after mapping cleanup + CVE-2024-26730: f006c45a3ea424f8f6c8e4b9283bc245ce2a4d0f hwmon: (nct6775) Fix access to temperature configuration registers + CVE-2024-26731: 9b099ed46dcaf1403c531ff02c3d7400fa37fa26 bpf, sockmap: Fix NULL pointer dereference in sk_psock_verdict_data_ready() + CVE-2024-26733: a3f2c083cb575d80a7627baf3339e78fedccbb91 arp: Prevent overflow in arp_req_get(). + CVE-2024-26734: 919092bd5482b7070ae66d1daef73b600738f3a2 devlink: fix possible use-after-free and memory leaks in devlink_init() + CVE-2024-26735: 9e02973dbc6a91e40aa4f5d87b8c47446fbfce44 ipv6: sr: fix possible use-after-free and null-ptr-deref + CVE-2024-26736: 6e6065dd25b661420fac19c34282b6c626fcd35e afs: Increase buffer size in afs_update_volume_status() + CVE-2024-26737: 8327ed12e8ebc5436bfaa1786c49988894f9c8a6 bpf: Fix racing between bpf_timer_cancel_and_free and bpf_timer_cancel + CVE-2024-26738: b8315b2e25b4e68e42fcb74630f824b9a5067765 powerpc/pseries/iommu: DLPAR add doesn't completely initialize pci_controller + CVE-2024-26739: 28cdbbd38a4413b8eff53399b3f872fd4e80db9d net/sched: act_mirred: don't override retval if we already lost the skb + CVE-2024-26740: 7c787888d164689da8b1b115f3ef562c1e843af4 net/sched: act_mirred: use the backlog for mirred ingress + CVE-2024-26741: 334a8348b2df26526f3298848ad6864285592caf dccp/tcp: Unhash sk from ehash for tb2 alloc failure after check_estalblished(). + CVE-2024-26742: 4f5b15c15e6016efb3e14582d02cc4ddf57227df scsi: smartpqi: Fix disable_managed_interrupts + CVE-2024-26743: 95175dda017cd4982cd47960536fa1de003d3298 RDMA/qedr: Fix qedr_create_user_qp error flow + CVE-2024-26744: fe2a73d57319feab4b3b175945671ce43492172f RDMA/srpt: Support specifying the srpt_service_guid parameter + CVE-2024-26747: 4b45829440b1b208948b39cc71f77a37a2536734 usb: roles: fix NULL pointer issue when put module's reference + CVE-2024-26748: 70e8038813f9d3e72df966748ebbc40efe466019 usb: cdns3: fix memory double free when handle zero packet + CVE-2024-26749: 29e42e1578a10c611b3f1a38f3229b2d664b5d16 usb: cdns3: fixed memory use after free at cdns3_gadget_ep_disable() + CVE-2024-26751: 97ba7c1f9c0a2401e644760d857b2386aa895997 ARM: ep93xx: Add terminator to gpiod_lookup_table + CVE-2024-26752: 804bd8650a3a2bf3432375f8c97d5049d845ce56 l2tp: pass correct message length to ip6_append_data + CVE-2024-26753: b0365460e945e1117b47cf7329d86de752daff63 crypto: virtio/akcipher - Fix stack overflow on memcpy + CVE-2024-26754: ba6b8b02a3314e62571a540efa96560888c5f03e gtp: fix use-after-free and null-ptr-deref in gtp_genl_dump_pdp() + CVE-2024-26759: 305152314df82b22cf9b181f3dc5fc411002079a mm/swap: fix race when skipping swapcache + CVE-2024-26760: 4ebc079f0c7dcda1270843ab0f38ab4edb8f7921 scsi: target: pscsi: Fix bio_put() for error case + CVE-2024-26761: 2cc1a530ab31c65b52daf3cb5d0883c8b614ea69 cxl/pci: Fix disabling memory if DVSEC CXL Range does not match a CFMWS window + CVE-2024-26763: 64ba01a365980755732972523600a961c4266b75 dm-crypt: don't modify the data when using authenticated encryption + CVE-2024-26764: e7e23fc5d5fe422827c9a43ecb579448f73876c7 fs/aio: Restrict kiocb_set_cancel_fn() to I/O submitted via libaio + CVE-2024-26765: dffdf7c783ef291eef38a5a0037584fd1a7fa464 LoongArch: Disable IRQ before init_fn() for nonboot CPUs + CVE-2024-26766: a2fef1d81becf4ff60e1a249477464eae3c3bc2a IB/hfi1: Fix sdma.h tx->num_descs off-by-one error + CVE-2024-26767: 71783d1ff65204d69207fd156d4b2eb1d3882375 drm/amd/display: fixed integer types and null check locations + CVE-2024-26768: 88e189bd16e5889e44a41b3309558ebab78b9280 LoongArch: Change acpi_core_pic[NR_CPUS] to acpi_core_pic[MAX_CORE_PIC] + CVE-2024-26769: eaf0971fdabf2a93c1429dc6bedf3bbe85dffa30 nvmet-fc: avoid deadlock on delete association path + CVE-2024-26770: 83527a13740f57b45f162e3af4c7db4b88521100 HID: nvidia-shield: Add missing null pointer checks to LED initialization + CVE-2024-26771: 7b24760f3a3c7ae1a176d343136b6c25174b7b27 dmaengine: ti: edma: Add some null pointer checks to the edma_probe + CVE-2024-26772: d3bbe77a76bc52e9d4d0a120f1509be36e25c916 ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal() + CVE-2024-26773: 0184747b552d6b5a14db3b7fcc3b792ce64dedd1 ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found() + CVE-2024-26774: f32d2a745b02123258026e105a008f474f896d6a ext4: avoid dividing by 0 in mb_update_avg_fragment_size() when block bitmap corrupt + CVE-2024-26775: 673629018ba04906899dcb631beec34d871f709c aoe: avoid potential deadlock at set_capacity + CVE-2024-26776: d637b5118274701e8448f35953877daf04df18b4 spi: hisi-sfc-v3xx: Return IRQ_NONE if no interrupts were detected + CVE-2024-26777: 99f1abc34a6dde248d2219d64aa493c76bbdd9eb fbdev: sis: Error out if pixclock equals zero + CVE-2024-26778: bc3c2e58d73b28b9a8789fca84778ee165a72d13 fbdev: savage: Error out if pixclock equals zero + CVE-2024-26779: 54b79d8786964e2f840e8a2ec4a9f9a50f3d4954 wifi: mac80211: fix race condition on enabling fast-xmit + +CVEs fixed in 6.6.21: + CVE-2024-26622: 2caa605079488da9601099fbda460cfc1702839f tomoyo: fix UAF write bug in tomoyo_write_control() + CVE-2024-26630: ba60fdf75e89ea762bb617be578dc47f27655117 mm: cachestat: fix folio read-after-free in cache walk + CVE-2024-26745: d4d1e4b1513d975961de7bb4f75e450a92d65ebf powerpc/pseries/iommu: IOMMU table is not initialized for kdump over SR-IOV + CVE-2024-26746: 5e3022ea42e490a36ec6f2cfa6fc603deb0bace4 dmaengine: idxd: Ensure safe user copy of completion record + CVE-2024-26782: ce0809ada38dca8d6d41bb57ab40494855c30582 mptcp: fix double-free on socket dismantle + CVE-2024-26786: f1fb745ee0a6fe43f1d84ec369c7e6af2310fda9 iommufd: Fix iopt_access_list_id overwrite bug + CVE-2024-26787: 176e66269f0de327375fc0ea51c12c2f5a97e4c4 mmc: mmci: stm32: fix DMA API overlapping mappings warning + CVE-2024-26788: a69c8bbb946936ac4eb6a6ae1e849435aa8d947d dmaengine: fsl-qdma: init irq after reg initialization + CVE-2024-26789: 1291d278b5574819a7266568ce4c28bce9438705 crypto: arm64/neonbs - fix out-of-bounds access on short input + CVE-2024-26790: 5b696e9c388251f1c7373be92293769a489fd367 dmaengine: fsl-qdma: fix SoC may hang on 16 byte unaligned read + CVE-2024-26791: b1690ced4d2d8b28868811fb81cd33eee5aefee1 btrfs: dev-replace: properly validate device names + CVE-2024-26793: 93dd420bc41531c9a31498b9538ca83ba6ec191e gtp: fix use-after-free and null-ptr-deref in gtp_newlink() + CVE-2024-26795: a278d5c60f21aa15d540abb2f2da6e6d795c3e6e riscv: Sparse-Memory/vmemmap out-of-bounds fix + CVE-2024-26796: e0d17ee872cf8d0f51cc561329b8e1a0aa792bbb drivers: perf: ctr_get_width function for legacy is not defined + CVE-2024-26798: 73a6bd68a1342f3a44cac9dffad81ad6a003e520 fbcon: always restore the old font data in fbcon_do_set_font() + CVE-2024-26799: 99adc8b4d2f38bf0d06483ec845bc48f60c3f8cf ASoC: qcom: Fix uninitialized pointer dmactl + CVE-2024-26801: 2ab9a19d896f5a0dd386e1f001c5309bc35f433b Bluetooth: Avoid potential use-after-free in hci_error_reset + CVE-2024-26802: 699b103e48ce32d03fc86c35b37ee8ae4288c7e3 stmmac: Clear variable when destroying workqueue + CVE-2024-26803: 16edf51f33f52dff70ed455bc40a6cc443c04664 net: veth: clear GRO when clearing XDP even when down + CVE-2024-26804: a0a1db40b23e8ff86dea2786c5ea1470bb23ecb9 net: ip_tunnel: prevent perpetual headroom growth + CVE-2024-26805: d3ada42e534a83b618bbc1e490d23bf0fdae4736 netlink: Fix kernel-infoleak-after-free in __skb_datagram_iter + CVE-2024-26807: 03f1573c9587029730ca68503f5062105b122f61 spi: cadence-qspi: fix pointer reference in runtime PM hooks + +CVEs fixed in 6.6.22: + CVE-2023-28746: c35ca0968de41952af2ad7d22881e4a7c6e1b145 x86/mmio: Disable KVM mitigation when X86_FEATURE_CLEAR_CPU_BUF is set + CVE-2023-52639: f5572c0323cf8b4f1f0618178648a25b8fb8a380 KVM: s390: vsie: fix race during shadow creation + CVE-2024-26652: 995f802abff209514ac2ee03b96224237646cec3 net: pds_core: Fix possible double free in error handling path + CVE-2024-26783: d6159bd4c00594249e305bfe02304c67c506264e mm/vmscan: fix a bug calling wakeup_kswapd() with a wrong zone index + +CVEs fixed in 6.6.23: + CVE-2023-6270: eb48680b0255a9e8a9bdc93d6a55b11c31262e62 aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts + CVE-2023-7042: 10a342fa2fe4c4dd22f2c8fe917d3b1929582076 wifi: ath10k: fix NULL pointer dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev() + CVE-2024-22099: 3ead59bafad05f2967ae2438c0528d53244cfde5 Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security + CVE-2024-26651: e39a3a14eafcf17f03c037290b78c8f483529028 sr9800: Add check for usbnet_get_endpoints + CVE-2024-26809: ff90050771412b91e928093ccd8736ae680063c2 netfilter: nft_set_pipapo: release elements in clone only from destroy path + +CVEs fixed in 6.6.24: + CVE-2023-47233: 190794848e2b9d15de92d502b6ac652806904f5a wifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach + CVE-2024-23307: 8ec4a68a25a231e2303716a0aba8ff1413d47c87 md/raid5: fix atomicity violation in raid5_cache_count + CVE-2024-24861: dc5e4f240473b64f7b2f24424e96c92435ebd8d7 media: xc4000: Fix atomicity violation in xc4000_get_frequency + CVE-2024-26642: c0c2176d1814b92ea4c8e7eb7c9cd94cd99c1b12 netfilter: nf_tables: disallow anonymous set with timeout flag + CVE-2024-26643: b2d6f9a5b1cf968f1eaa71085ceeb09c2cb276b1 netfilter: nf_tables: mark set as dead when unbinding anonymous set with timeout + CVE-2024-26654: 61d4787692c1fccdc268ffa7a891f9c149f50901 ALSA: sh: aica: reorder cleanup operations to avoid UAF bugs + CVE-2024-26656: e87e08c94c9541b4e18c4c13f2f605935f512605 drm/amdgpu: fix use-after-free bug Outstanding CVEs: CVE-2005-3660: (unk) @@ -190,28 +442,38 @@ Outstanding CVEs: CVE-2023-3640: (unk) CVE-2023-37454: (unk) CVE-2023-4010: (unk) - CVE-2023-47233: (unk) + CVE-2023-52485: (unk) drm/amd/display: Wake DMCUB before sending a command + CVE-2023-52585: (unk) drm/amdgpu: Fix possible NULL dereference in amdgpu_ras_query_error_status_helper() + CVE-2023-52586: (unk) drm/msm/dpu: Add mutex lock in control vblank irq + CVE-2023-52590: (unk) ocfs2: Avoid touching renamed directory if parent does not change + CVE-2023-52624: (unk) drm/amd/display: Wake DMCUB before executing GPINT commands + CVE-2023-52625: (unk) drm/amd/display: Refactor DMCUB enter/exit idle interface + CVE-2023-52634: (unk) drm/amd/display: Fix disable_otg_wa logic CVE-2023-6238: (unk) CVE-2023-6240: (unk) - CVE-2023-6270: (unk) - CVE-2023-6356: (unk) CVE-2023-6535: (unk) - CVE-2023-6536: (unk) - CVE-2023-7042: (unk) CVE-2024-0564: (unk) - CVE-2024-0841: (unk) CVE-2024-21803: (unk) - CVE-2024-22099: (unk) + CVE-2024-2193: (unk) CVE-2024-22386: (unk) - CVE-2024-23196: (unk) - CVE-2024-23307: (unk) CVE-2024-23848: (unk) CVE-2024-24857: (unk) CVE-2024-24858: (unk) CVE-2024-24859: (unk) - CVE-2024-24861: (unk) CVE-2024-24864: (unk) CVE-2024-25739: (unk) CVE-2024-25740: (unk) CVE-2024-25741: (unk) CVE-2024-26596: (unk) net: dsa: fix netdev_priv() dereference before check on non-DSA netdevice events + CVE-2024-26655: (unk) Fix memory leak in posix_clock_open() + CVE-2024-26658: (unk) bcachefs: grab s_umount only if snapshotting + CVE-2024-26672: (unk) drm/amdgpu: Fix variable 'mca_funcs' dereferenced before NULL check in 'amdgpu_mca_smu_get_mca_entry()' + CVE-2024-26686: (unk) fs/proc: do_task_stat: use sig->stats_lock to gather the threads/children stats + CVE-2024-26699: (unk) drm/amd/display: Fix array-index-out-of-bounds in dcn35_clkmgr + CVE-2024-26756: (unk) md: Don't register sync_thread for reshape directly + CVE-2024-26757: (unk) md: Don't ignore read-only array in md_check_recovery() + CVE-2024-26758: (unk) md: Don't ignore suspended array in md_check_recovery() + CVE-2024-26784: (unk) pmdomain: arm: Fix NULL dereference on scmi_perf_domain removal + CVE-2024-26785: (unk) iommufd: Fix protection fault in iommufd_test_syz_conv_iova + CVE-2024-26797: (unk) drm/amd/display: Prevent potential buffer overflow in map_hw_resources + CVE-2024-26806: (unk) spi: cadence-qspi: remove system-wide suspend helper calls from runtime PM hooks diff --git a/data/6.7/6.7_CVEs.txt b/data/6.7/6.7_CVEs.txt index 5686674d6..e077d760f 100644 --- a/data/6.7/6.7_CVEs.txt +++ b/data/6.7/6.7_CVEs.txt @@ -75,6 +75,7 @@ CVE-2023-21400: Fix unknown CVE-2023-23039: Fix unknown CVE-2023-26242: Fix unknown CVE-2023-2640: Fix unknown +CVE-2023-28746: Fixed with 6.7.10 CVE-2023-31081: Fix unknown CVE-2023-31082: Fix unknown CVE-2023-32629: Fix unknown @@ -83,7 +84,7 @@ CVE-2023-3640: Fix unknown CVE-2023-37454: Fix unknown CVE-2023-4010: Fix unknown CVE-2023-46838: Fixed with 6.7.2 -CVE-2023-47233: Fix unknown +CVE-2023-47233: Fixed with 6.7.12 CVE-2023-50431: Fixed with 6.7.2 CVE-2023-52429: Fixed with 6.7.6 CVE-2023-52436: Fixed with 6.7.1 @@ -111,24 +112,99 @@ CVE-2023-52461: Fixed with 6.7.2 CVE-2023-52462: Fixed with 6.7.2 CVE-2023-52463: Fixed with 6.7.2 CVE-2023-52464: Fixed with 6.7.2 +CVE-2023-52465: Fixed with 6.7.2 +CVE-2023-52467: Fixed with 6.7.2 +CVE-2023-52468: Fixed with 6.7.2 +CVE-2023-52469: Fixed with 6.7.2 +CVE-2023-52470: Fixed with 6.7.2 +CVE-2023-52471: Fixed with 6.7.2 +CVE-2023-52472: Fixed with 6.7.2 +CVE-2023-52473: Fixed with 6.7.2 +CVE-2023-52485: Fixed with 6.7.3 +CVE-2023-52486: Fixed with 6.7.3 +CVE-2023-52487: Fixed with 6.7.3 +CVE-2023-52488: Fixed with 6.7.3 +CVE-2023-52489: Fixed with 6.7.3 +CVE-2023-52490: Fixed with 6.7.3 +CVE-2023-52491: Fixed with 6.7.3 +CVE-2023-52492: Fixed with 6.7.3 +CVE-2023-52493: Fixed with 6.7.3 +CVE-2023-52494: Fixed with 6.7.3 +CVE-2023-52495: Fixed with 6.7.3 +CVE-2023-52497: Fixed with 6.7.3 +CVE-2023-52498: Fixed with 6.7.3 +CVE-2023-52583: Fixed with 6.7.4 +CVE-2023-52584: Fixed with 6.7.4 +CVE-2023-52585: Fixed with 6.7.4 +CVE-2023-52586: Fixed with 6.7.4 +CVE-2023-52587: Fixed with 6.7.4 +CVE-2023-52588: Fixed with 6.7.4 +CVE-2023-52589: Fixed with 6.7.4 +CVE-2023-52590: Fixed with 6.7.4 +CVE-2023-52591: Fixed with 6.7.4 +CVE-2023-52593: Fixed with 6.7.4 +CVE-2023-52594: Fixed with 6.7.4 +CVE-2023-52595: Fixed with 6.7.4 +CVE-2023-52596: Fixed with 6.7.4 +CVE-2023-52597: Fixed with 6.7.4 +CVE-2023-52598: Fixed with 6.7.4 +CVE-2023-52599: Fixed with 6.7.4 +CVE-2023-52600: Fixed with 6.7.4 +CVE-2023-52601: Fixed with 6.7.4 +CVE-2023-52602: Fixed with 6.7.4 +CVE-2023-52603: Fixed with 6.7.4 +CVE-2023-52604: Fixed with 6.7.4 +CVE-2023-52606: Fixed with 6.7.4 +CVE-2023-52607: Fixed with 6.7.4 +CVE-2023-52608: Fixed with 6.7.3 +CVE-2023-52609: Fixed with 6.7.2 +CVE-2023-52610: Fixed with 6.7.2 +CVE-2023-52611: Fixed with 6.7.2 +CVE-2023-52612: Fixed with 6.7.2 +CVE-2023-52613: Fixed with 6.7.2 +CVE-2023-52614: Fixed with 6.7.3 +CVE-2023-52615: Fixed with 6.7.3 +CVE-2023-52616: Fixed with 6.7.3 +CVE-2023-52617: Fixed with 6.7.4 +CVE-2023-52618: Fixed with 6.7.4 +CVE-2023-52619: Fixed with 6.7.4 +CVE-2023-52621: Fixed with 6.7.4 +CVE-2023-52622: Fixed with 6.7.4 +CVE-2023-52623: Fixed with 6.7.4 +CVE-2023-52624: Fixed with 6.7.3 +CVE-2023-52625: Fixed with 6.7.3 +CVE-2023-52626: Fixed with 6.7.3 +CVE-2023-52627: Fixed with 6.7.3 +CVE-2023-52630: Fixed with 6.7.5 +CVE-2023-52631: Fixed with 6.7.5 +CVE-2023-52632: Fixed with 6.7.4 +CVE-2023-52633: Fixed with 6.7.4 +CVE-2023-52634: Fixed with 6.7.4 +CVE-2023-52635: Fixed with 6.7.4 +CVE-2023-52636: Fixed with 6.7.5 +CVE-2023-52637: Fixed with 6.7.6 +CVE-2023-52638: Fixed with 6.7.6 +CVE-2023-52639: Fixed with 6.7.6 +CVE-2023-52640: Fixed with 6.7.7 +CVE-2023-52641: Fixed with 6.7.7 CVE-2023-6238: Fix unknown CVE-2023-6240: Fix unknown -CVE-2023-6270: Fix unknown -CVE-2023-6356: Fix unknown +CVE-2023-6270: Fixed with 6.7.11 +CVE-2023-6356: Fixed with 6.7.2 CVE-2023-6535: Fix unknown -CVE-2023-6536: Fix unknown -CVE-2023-7042: Fix unknown +CVE-2023-6536: Fixed with 6.7.2 +CVE-2023-7042: Fixed with 6.7.11 CVE-2024-0193: Fixed with 6.7 CVE-2024-0564: Fix unknown -CVE-2024-0841: Fix unknown +CVE-2024-0841: Fixed with 6.7.6 CVE-2024-1085: Fixed with 6.7.2 CVE-2024-1086: Fixed with 6.7.3 CVE-2024-1151: Fixed with 6.7.6 CVE-2024-21803: Fix unknown -CVE-2024-22099: Fix unknown +CVE-2024-2193: Fix unknown +CVE-2024-22099: Fixed with 6.7.11 CVE-2024-22386: Fix unknown -CVE-2024-23196: Fix unknown -CVE-2024-23307: Fix unknown +CVE-2024-23307: Fixed with 6.7.12 CVE-2024-23848: Fix unknown CVE-2024-23849: Fixed with 6.7.3 CVE-2024-23850: Fixed with 6.7.6 @@ -137,7 +213,7 @@ CVE-2024-24857: Fix unknown CVE-2024-24858: Fix unknown CVE-2024-24859: Fix unknown CVE-2024-24860: Fixed with 6.7.2 -CVE-2024-24861: Fix unknown +CVE-2024-24861: Fixed with 6.7.12 CVE-2024-24864: Fix unknown CVE-2024-25739: Fix unknown CVE-2024-25740: Fix unknown @@ -161,3 +237,199 @@ CVE-2024-26596: Fixed with 6.7.2 CVE-2024-26597: Fixed with 6.7.2 CVE-2024-26598: Fixed with 6.7.2 CVE-2024-26599: Fixed with 6.7.2 +CVE-2024-26600: Fixed with 6.7.5 +CVE-2024-26601: Fixed with 6.7.5 +CVE-2024-26602: Fixed with 6.7.6 +CVE-2024-26603: Fixed with 6.7.6 +CVE-2024-26604: Fixed with 6.7.6 +CVE-2024-26605: Fixed with 6.7.5 +CVE-2024-26606: Fixed with 6.7.6 +CVE-2024-26607: Fixed with 6.7.3 +CVE-2024-26608: Fixed with 6.7.3 +CVE-2024-26610: Fixed with 6.7.3 +CVE-2024-26611: Fixed with 6.7.3 +CVE-2024-26612: Fixed with 6.7.3 +CVE-2024-26614: Fixed with 6.7.3 +CVE-2024-26615: Fixed with 6.7.3 +CVE-2024-26616: Fixed with 6.7.3 +CVE-2024-26617: Fixed with 6.7.3 +CVE-2024-26618: Fixed with 6.7.3 +CVE-2024-26619: Fixed with 6.7.3 +CVE-2024-26620: Fixed with 6.7.3 +CVE-2024-26621: Fixed with 6.7.6 +CVE-2024-26622: Fixed with 6.7.9 +CVE-2024-26623: Fixed with 6.7.4 +CVE-2024-26625: Fixed with 6.7.4 +CVE-2024-26627: Fixed with 6.7.4 +CVE-2024-26629: Fixed with 6.7.3 +CVE-2024-26630: Fixed with 6.7.9 +CVE-2024-26631: Fixed with 6.7.2 +CVE-2024-26632: Fixed with 6.7.2 +CVE-2024-26633: Fixed with 6.7.2 +CVE-2024-26634: Fixed with 6.7.3 +CVE-2024-26635: Fixed with 6.7.3 +CVE-2024-26636: Fixed with 6.7.3 +CVE-2024-26637: Fixed with 6.7.3 +CVE-2024-26638: Fixed with 6.7.3 +CVE-2024-26640: Fixed with 6.7.4 +CVE-2024-26641: Fixed with 6.7.4 +CVE-2024-26642: Fixed with 6.7.12 +CVE-2024-26643: Fixed with 6.7.12 +CVE-2024-26644: Fixed with 6.7.3 +CVE-2024-26645: Fixed with 6.7.3 +CVE-2024-26646: Fixed with 6.7.3 +CVE-2024-26647: Fixed with 6.7.3 +CVE-2024-26648: Fixed with 6.7.3 +CVE-2024-26649: Fixed with 6.7.3 +CVE-2024-26650: Fixed with 6.7.3 +CVE-2024-26651: Fixed with 6.7.11 +CVE-2024-26652: Fixed with 6.7.10 +CVE-2024-26653: Fixed with 6.7.12 +CVE-2024-26654: Fixed with 6.7.12 +CVE-2024-26655: Fixed with 6.7.12 +CVE-2024-26656: Fixed with 6.7.12 +CVE-2024-26657: Fixed with 6.7.12 +CVE-2024-26658: Fixed with 6.7.5 +CVE-2024-26659: Fixed with 6.7.5 +CVE-2024-26660: Fixed with 6.7.5 +CVE-2024-26661: Fixed with 6.7.5 +CVE-2024-26662: Fixed with 6.7.5 +CVE-2024-26663: Fixed with 6.7.5 +CVE-2024-26664: Fixed with 6.7.5 +CVE-2024-26665: Fixed with 6.7.5 +CVE-2024-26666: Fixed with 6.7.5 +CVE-2024-26667: Fixed with 6.7.5 +CVE-2024-26668: Fixed with 6.7.3 +CVE-2024-26669: Fixed with 6.7.3 +CVE-2024-26670: Fixed with 6.7.3 +CVE-2024-26671: Fixed with 6.7.4 +CVE-2024-26672: Fixed with 6.7.4 +CVE-2024-26673: Fixed with 6.7.4 +CVE-2024-26674: Fixed with 6.7.5 +CVE-2024-26675: Fixed with 6.7.5 +CVE-2024-26676: Fixed with 6.7.5 +CVE-2024-26677: Fixed with 6.7.5 +CVE-2024-26678: Fixed with 6.7.5 +CVE-2024-26679: Fixed with 6.7.5 +CVE-2024-26680: Fixed with 6.7.5 +CVE-2024-26681: Fixed with 6.7.5 +CVE-2024-26682: Fixed with 6.7.5 +CVE-2024-26683: Fixed with 6.7.5 +CVE-2024-26684: Fixed with 6.7.5 +CVE-2024-26685: Fixed with 6.7.6 +CVE-2024-26686: Fixed with 6.7.6 +CVE-2024-26687: Fixed with 6.7.6 +CVE-2024-26688: Fixed with 6.7.6 +CVE-2024-26689: Fixed with 6.7.6 +CVE-2024-26690: Fixed with 6.7.6 +CVE-2024-26691: Fixed with 6.7.6 +CVE-2024-26692: Fixed with 6.7.6 +CVE-2024-26693: Fixed with 6.7.6 +CVE-2024-26694: Fixed with 6.7.6 +CVE-2024-26695: Fixed with 6.7.6 +CVE-2024-26696: Fixed with 6.7.6 +CVE-2024-26697: Fixed with 6.7.6 +CVE-2024-26698: Fixed with 6.7.6 +CVE-2024-26699: Fixed with 6.7.6 +CVE-2024-26700: Fixed with 6.7.6 +CVE-2024-26702: Fixed with 6.7.6 +CVE-2024-26703: Fixed with 6.7.6 +CVE-2024-26704: Fixed with 6.7.6 +CVE-2024-26705: Fixed with 6.7.6 +CVE-2024-26706: Fixed with 6.7.6 +CVE-2024-26707: Fixed with 6.7.6 +CVE-2024-26708: Fixed with 6.7.6 +CVE-2024-26709: Fixed with 6.7.6 +CVE-2024-26711: Fixed with 6.7.6 +CVE-2024-26712: Fixed with 6.7.6 +CVE-2024-26713: Fixed with 6.7.6 +CVE-2024-26714: Fixed with 6.7.6 +CVE-2024-26715: Fixed with 6.7.6 +CVE-2024-26716: Fixed with 6.7.6 +CVE-2024-26717: Fixed with 6.7.6 +CVE-2024-26718: Fixed with 6.7.6 +CVE-2024-26719: Fixed with 6.7.6 +CVE-2024-26720: Fixed with 6.7.6 +CVE-2024-26721: Fixed with 6.7.6 +CVE-2024-26722: Fixed with 6.7.6 +CVE-2024-26723: Fixed with 6.7.6 +CVE-2024-26724: Fixed with 6.7.6 +CVE-2024-26725: Fixed with 6.7.6 +CVE-2024-26726: Fixed with 6.7.6 +CVE-2024-26727: Fixed with 6.7.6 +CVE-2024-26728: Fixed with 6.7.7 +CVE-2024-26729: Fixed with 6.7.7 +CVE-2024-26730: Fixed with 6.7.7 +CVE-2024-26731: Fixed with 6.7.7 +CVE-2024-26732: Fixed with 6.7.7 +CVE-2024-26733: Fixed with 6.7.7 +CVE-2024-26734: Fixed with 6.7.7 +CVE-2024-26735: Fixed with 6.7.7 +CVE-2024-26736: Fixed with 6.7.7 +CVE-2024-26737: Fixed with 6.7.7 +CVE-2024-26738: Fixed with 6.7.7 +CVE-2024-26739: Fixed with 6.7.7 +CVE-2024-26740: Fixed with 6.7.7 +CVE-2024-26741: Fixed with 6.7.7 +CVE-2024-26742: Fixed with 6.7.7 +CVE-2024-26743: Fixed with 6.7.7 +CVE-2024-26744: Fixed with 6.7.7 +CVE-2024-26745: Fixed with 6.7.9 +CVE-2024-26746: Fixed with 6.7.9 +CVE-2024-26747: Fixed with 6.7.7 +CVE-2024-26748: Fixed with 6.7.7 +CVE-2024-26749: Fixed with 6.7.7 +CVE-2024-26751: Fixed with 6.7.7 +CVE-2024-26752: Fixed with 6.7.7 +CVE-2024-26753: Fixed with 6.7.7 +CVE-2024-26754: Fixed with 6.7.7 +CVE-2024-26755: Fixed with 6.7.7 +CVE-2024-26756: Fixed with 6.7.7 +CVE-2024-26757: Fixed with 6.7.7 +CVE-2024-26758: Fixed with 6.7.7 +CVE-2024-26759: Fixed with 6.7.7 +CVE-2024-26760: Fixed with 6.7.7 +CVE-2024-26761: Fixed with 6.7.7 +CVE-2024-26762: Fixed with 6.7.7 +CVE-2024-26763: Fixed with 6.7.7 +CVE-2024-26764: Fixed with 6.7.7 +CVE-2024-26765: Fixed with 6.7.7 +CVE-2024-26766: Fixed with 6.7.7 +CVE-2024-26767: Fixed with 6.7.7 +CVE-2024-26768: Fixed with 6.7.7 +CVE-2024-26769: Fixed with 6.7.7 +CVE-2024-26770: Fixed with 6.7.7 +CVE-2024-26771: Fixed with 6.7.7 +CVE-2024-26772: Fixed with 6.7.7 +CVE-2024-26773: Fixed with 6.7.7 +CVE-2024-26774: Fixed with 6.7.7 +CVE-2024-26775: Fixed with 6.7.7 +CVE-2024-26776: Fixed with 6.7.7 +CVE-2024-26777: Fixed with 6.7.7 +CVE-2024-26778: Fixed with 6.7.7 +CVE-2024-26779: Fixed with 6.7.7 +CVE-2024-26782: Fixed with 6.7.9 +CVE-2024-26783: Fixed with 6.7.9 +CVE-2024-26784: Fixed with 6.7.9 +CVE-2024-26785: Fixed with 6.7.9 +CVE-2024-26786: Fixed with 6.7.9 +CVE-2024-26787: Fixed with 6.7.9 +CVE-2024-26788: Fixed with 6.7.9 +CVE-2024-26789: Fixed with 6.7.9 +CVE-2024-26790: Fixed with 6.7.9 +CVE-2024-26791: Fixed with 6.7.9 +CVE-2024-26793: Fixed with 6.7.9 +CVE-2024-26795: Fixed with 6.7.9 +CVE-2024-26796: Fixed with 6.7.9 +CVE-2024-26797: Fixed with 6.7.9 +CVE-2024-26798: Fixed with 6.7.9 +CVE-2024-26799: Fixed with 6.7.9 +CVE-2024-26801: Fixed with 6.7.9 +CVE-2024-26802: Fixed with 6.7.9 +CVE-2024-26803: Fixed with 6.7.9 +CVE-2024-26804: Fixed with 6.7.9 +CVE-2024-26805: Fixed with 6.7.9 +CVE-2024-26806: Fixed with 6.7.9 +CVE-2024-26807: Fixed with 6.7.9 +CVE-2024-26808: Fixed with 6.7.3 +CVE-2024-26809: Fixed with 6.7.11 diff --git a/data/6.7/6.7_security.txt b/data/6.7/6.7_security.txt index 4abdc0cd9..ee2c09210 100644 --- a/data/6.7/6.7_security.txt +++ b/data/6.7/6.7_security.txt @@ -32,6 +32,21 @@ CVEs fixed in 6.7.2: CVE-2023-52462: 40617d45ea05535105e202a8a819e388a2b1f036 bpf: fix check for attempt to corrupt spilled pointer CVE-2023-52463: d4a714873db0866cc471521114eeac4a5072d548 efivarfs: force RO when remounting if SetVariable is not supported CVE-2023-52464: 426fae93c01dffa379225eb2bd4d3cdc42c6eec5 EDAC/thunderx: Fix possible out-of-bounds string access + CVE-2023-52465: bd3d2ec447ede9da822addf3960a5f4275e3ae76 power: supply: Fix null pointer dereference in smb2_probe + CVE-2023-52467: 7f2c410ac470959b88e03dadd94b7a0b71df7973 mfd: syscon: Fix null pointer dereference in of_syscon_register() + CVE-2023-52468: 0f1486dafca3398c4c46b9f6e6452fa27e73b559 class: fix use-after-free in class_register() + CVE-2023-52469: 3426f059eacc33ecc676b0d66539297e1cfafd02 drivers/amd/pm: fix a use-after-free in kv_parse_power_table + CVE-2023-52470: fb2d8bc9b5e55848b8a7c3c028e2ee8d49f28f97 drm/radeon: check the alloc_workqueue return value in radeon_crtc_init() + CVE-2023-52471: 3cd9b9bee33f39f6c6d52360fe381b89a7b12695 ice: Fix some null pointer dereference issues in ice_ptp.c + CVE-2023-52472: 95ad8b6879e2e49d02e3bfc0e1fb46421633fe2a crypto: rsa - add a check for allocation failure + CVE-2023-52473: 02871710b93058eb1249d5847c0b2d1c2c3c98ae thermal: core: Fix NULL pointer dereference in zone registration error path + CVE-2023-52609: 77d210e8db4d61d43b2d16df66b1ec46fad2ee01 binder: fix race between mmput() and do_exit() + CVE-2023-52610: f5346df0591d10bc948761ca854b1fae6d2ef441 net/sched: act_ct: fix skb leak and crash on ooo frags + CVE-2023-52611: 0e9ffff72a0674cd6656314dbd99cdd2123a3030 wifi: rtw88: sdio: Honor the host max_req_size in the RX path + CVE-2023-52612: 71c6670f9f032ec67d8f4e3f8db4646bf5a62883 crypto: scomp - fix req->dst buffer overflow + CVE-2023-52613: 6010a9fc14eb1feab5cafd84422001134fe8ec58 drivers/thermal/loongson2_thermal: Fix incorrect PTR_ERR() judgment + CVE-2023-6356: 70154e8d015c9b4fb56c1a2ef1fc8b83d45c7f68 nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length + CVE-2023-6536: c32d355f507fa81cf23aaa4dd4150e696cb8ebaf nvmet-tcp: fix a crash in nvmet_req_complete() CVE-2024-1085: 7e0f5f8ae3e5f17e367f7040ade7a467f1f0e3b9 netfilter: nf_tables: check if catch-all set element is active in next generation CVE-2024-24860: d1c6a77d6d48215ba723f910eaabdb6e60d21a37 Bluetooth: Fix atomicity violation in {min,max}_key_size_set CVE-2024-26586: a361c2c1da5dbb13ca67601cf961ab3ad68af383 mlxsw: spectrum_acl_tcam: Fix stack corruption @@ -47,16 +62,143 @@ CVEs fixed in 6.7.2: CVE-2024-26597: 17d06a5c44d8fd2e8e61bac295b09153496f87e1 net: qualcomm: rmnet: fix global oob in rmnet_policy CVE-2024-26598: dd3956a1b3dd11f46488c928cb890d6937d1ca80 KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache CVE-2024-26599: bae45b7ebb31984b63b13c3519fd724b3ce92123 pwm: Fix out-of-bounds access in of_pwm_single_xlate() + CVE-2024-26631: 3bb5849675ae1d592929798a2b37ea450879c855 ipv6: mcast: fix data-race in ipv6_mc_down / mld_ifc_work + CVE-2024-26632: ca3ede3f5893e2d26d4dbdef1eec28a8487fafde block: Fix iterating over an empty bio with bio_for_each_folio_all + CVE-2024-26633: ba8d904c274268b18ef3dc11d3ca7b24a96cb087 ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim() CVEs fixed in 6.7.3: + CVE-2023-52485: 303197775a97416b62d4da69280d0c120a20e009 drm/amd/display: Wake DMCUB before sending a command + CVE-2023-52486: bfd0feb1b109cb63b87fdcd00122603787c75a1a drm: Don't unref the same fb many times by mistake due to deadlock handling + CVE-2023-52487: e24d6f5a7f2d95a98a46257a5a5a5381d572894f net/mlx5e: Fix peer flow lists handling + CVE-2023-52488: aa7cb4787698add9367b19f7afc667662c9bdb23 serial: sc16is7xx: convert from _raw_ to _noinc_ regmap functions for FIFO + CVE-2023-52489: 3a01daace71b521563c38bbbf874e14c3e58adb7 mm/sparsemem: fix race in accessing memory_section->usage + CVE-2023-52490: 3889a418b6eb9a1113fb989aaadecf2f64964767 mm: migrate: fix getting incorrect page mapping during page migration + CVE-2023-52491: 6e2f37022f0fc0893da4d85a0500c9d547fffd4c media: mtk-jpeg: Fix use after free bug due to error path handling in mtk_jpeg_dec_device_run + CVE-2023-52492: 9263fd2a63487c6d04cbb7b74a48fb12e1e352d0 dmaengine: fix NULL pointer in channel unregistration function + CVE-2023-52493: b8eff20d87092e14cac976d057cb0aea2f1d0830 bus: mhi: host: Drop chan lock before queuing buffers + CVE-2023-52494: ecf8320111822a1ae5d5fc512953eab46d543d0b bus: mhi: host: Add alignment check for event ring read pointer + CVE-2023-52495: d26edf4ee3672cc9828f2a3ffae34086a712574d soc: qcom: pmic_glink_altmode: fix port sanity check + CVE-2023-52497: bffc4cc334c5bb31ded54bc3cfd651735a3cb79e erofs: fix lz4 inplace decompression + CVE-2023-52498: 9bd3dce27b01c51295b60e1433e1dadfb16649f7 PM: sleep: Fix possible deadlocks in core system-wide PM code + CVE-2023-52608: 12dc4217f16551d6dee9cbefc23fdb5659558cda firmware: arm_scmi: Check mailbox/SMT channel for consistency + CVE-2023-52614: eaef4650fa2050147ca25fd7ee43bc0082e03c87 PM / devfreq: Fix buffer overflow in trans_stat_show + CVE-2023-52615: 6822a14271786150e178869f1495cc03e74c5029 hwrng: core - Fix page fault dead lock on mmap-ed hwrng + CVE-2023-52616: 7abdfd45a650c714d5ebab564bb1b988f14d9b49 crypto: lib/mpi - Fix unexpected pointer access in mpi_ec_init + CVE-2023-52624: 2ef98c6d753a744e333b7e34b9cf687040fba57d drm/amd/display: Wake DMCUB before executing GPINT commands + CVE-2023-52625: 820c3870c491946a78950cdf961bf40e28c1025f drm/amd/display: Refactor DMCUB enter/exit idle interface + CVE-2023-52626: 33cdeae8c6fb58cc445f859b67c014dc9f60b4e0 net/mlx5e: Fix operation precedence bug in port timestamping napi_poll context + CVE-2023-52627: 55aca2ce91a63740278502066beaddbd841af9c6 iio: adc: ad7091r: Allow users to configure device events CVE-2024-1086: f05a497e7bc8851eeeb3a58da180ba469efebb05 netfilter: nf_tables: reject QUEUE/DROP verdict parameters CVE-2024-23849: 0b787c2dea15e7a2828fa3a74a5447df4ed57711 net/rds: Fix UBSAN: array-index-out-of-bounds in rds_cmsg_recv + CVE-2024-26607: 2a4c6af7934a7b4c304542c38fee35e09cc1770c drm/bridge: sii902x: Fix probing race issue + CVE-2024-26608: 6993328a4cd62a24df254b587c0796a4a1eecc95 ksmbd: fix global oob in ksmbd_nl_policy + CVE-2024-26610: f32a81999d0b8e5ce60afb5f6a3dd7241c17dd67 wifi: iwlwifi: fix a memory corruption + CVE-2024-26611: 5cd781f7216f980207af09c5e0e1bb1eda284540 xsk: fix usage of multi-buffer BPF helpers for ZC XDP + CVE-2024-26612: 4200ad3e46ce50f410fdda302745489441bc70f0 netfs, fscache: Prevent Oops in fscache_put_cache() + CVE-2024-26614: 3982fe726a63fb3de6005e534e2ac8ca7e0aca2a tcp: make sure init the accept_queue's spinlocks once + CVE-2024-26615: 8f3f9186e5bb96a9c9654c41653210e3ea7e48a6 net/smc: fix illegal rmb_desc access in SMC-D connection dump + CVE-2024-26616: 34de0f04684ec00c093a0455648be055f0e8e24f btrfs: scrub: avoid use-after-free when chunk length is not 64K aligned + CVE-2024-26617: 05509adf297924f51e1493aa86f9fcde1433ed80 fs/proc/task_mmu: move mmu notification mechanism inside mm lock + CVE-2024-26618: 814af6b4e6000e574e74d92197190edf07cc3680 arm64/sme: Always exit sme_alloc() early with existing storage + CVE-2024-26619: 2fa79badf4bfeffda6b5032cf62b828486ec9a99 riscv: Fix module loading free order + CVE-2024-26620: cdd134d56138302976685e6c7bc4755450b3880e s390/vfio-ap: always filter entire AP matrix + CVE-2024-26629: 8f5b860de87039b007e84a28a5eefc888154e098 nfsd: fix RELEASE_LOCKOWNER + CVE-2024-26634: 8072699aa9e67d1727692cfb3c347263bb627fb9 net: fix removing a namespace with conflicting altnames + CVE-2024-26635: df57fc2f2abf548aa889a36ab0bdcc94a75399dc llc: Drop support for ETH_P_TR_802_2. + CVE-2024-26636: c451c008f563d56d5e676c9dcafae565fcad84bb llc: make llc_ui_sendmsg() more robust against bonding changes + CVE-2024-26637: aa74ce30a8a40d19a4256de4ae5322e71344a274 wifi: ath11k: rely on mac80211 debugfs handling for vif + CVE-2024-26638: b0028f333420a65a53a63978522db680b37379dd nbd: always initialize struct msghdr completely + CVE-2024-26644: d8680b722f0ff6d7a01ddacc1844e0d52354d6ff btrfs: don't abort filesystem when attempting to snapshot deleted subvolume + CVE-2024-26645: bf4aeff7da85c3becd39fb73bac94122331c30fb tracing: Ensure visibility when inserting an element into tracing_map + CVE-2024-26646: c9d6d63b6c03afaa6f185df249af693a7939577c thermal: intel: hfi: Add syscore callbacks for system-wide PM + CVE-2024-26647: cf656fc7276e5b3709a81bc9d9639459be2b2647 drm/amd/display: Fix late derefrence 'dsc' check in 'link_set_dsc_pps_packet()' + CVE-2024-26648: c02d257c654191ecda1dc1af6875d527e85310e7 drm/amd/display: Fix variable deferencing before NULL check in edp_setup_replay() + CVE-2024-26649: d3887448486caeef9687fb5dfebd4ff91e0f25aa drm/amdgpu: Fix the null pointer when load rlc firmware + CVE-2024-26650: d281ac9a987c553d93211b90fd4fe97d8eca32cd platform/x86: p2sb: Allow p2sb_bar() calls during PCI device probe + CVE-2024-26668: 00c2c29aa36d1d1827c51a3720e9f893a22c7c6a netfilter: nft_limit: reject configurations that cause integer overflow + CVE-2024-26669: c04709b2cc99ae31c346f79f0211752d7b74df01 net/sched: flower: Fix chain template offload + CVE-2024-26670: baa0aaac16432019651e0d60c41cd34a0c3c3477 arm64: entry: fix ARM64_WORKAROUND_SPECULATIVE_UNPRIV_LOAD + CVE-2024-26808: 36a0a80f32209238469deb481967d777a3d539ee netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain + +CVEs fixed in 6.7.4: + CVE-2023-52583: 76cb2aa3421fee4fde706dec41b1344bc0a9ad67 ceph: fix deadlock or deadcode of misusing dget() + CVE-2023-52584: 9a3881b1f07db1bb55cb0108e6f05cfd027eaf2e spmi: mediatek: Fix UAF on device remove + CVE-2023-52585: 195a6289282e039024ad30ba66e6f94a4d0fbe49 drm/amdgpu: Fix possible NULL dereference in amdgpu_ras_query_error_status_helper() + CVE-2023-52586: 14f109bf74dd67e1d0469fed859c8e506b0df53f drm/msm/dpu: Add mutex lock in control vblank irq + CVE-2023-52587: 7c7bd4d561e9dc6f5b7df9e184974915f6701a89 IB/ipoib: Fix mcast list locking + CVE-2023-52588: b8094c0f1aae329b1c60a275a780d6c2c9ff7aa3 f2fs: fix to tag gcing flag on page during block migration + CVE-2023-52589: 7bb1a2822aa2c2de4e09bf7c56dd93bd532f1fa7 media: rkisp1: Fix IRQ disable race issue + CVE-2023-52590: de940cede3c41624e2de27f805b490999f419df9 ocfs2: Avoid touching renamed directory if parent does not change + CVE-2023-52591: c04c162f82ac403917780eb6d1654694455d4e7c reiserfs: Avoid touching renamed directory if parent does not change + CVE-2023-52593: 3739121443f5114c6bcf6d841a5124deb006b878 wifi: wfx: fix possible NULL pointer dereference in wfx_set_mfp_ap() + CVE-2023-52594: be609c7002dd4504b15b069cb7582f4c778548d1 wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus() + CVE-2023-52595: fdb580ed05df8973aa5149cafa598c64bebcd0cb wifi: rt2x00: restart beacon queue when hardware reset + CVE-2023-52596: 2ae7081bc10123b187e36a4f3a8e53768de31489 sysctl: Fix out of bounds access for empty sysctl registers + CVE-2023-52597: 2823db0010c400e4b2b12d02aa5d0d3ecb15d7c7 KVM: s390: fix setting of fpc register + CVE-2023-52598: bdce67df7f12fb0409fbc604ce7c4254703f56d4 s390/ptrace: handle setting of fpc register correctly + CVE-2023-52599: 5a6660139195f5e2fbbda459eeecb8788f3885fe jfs: fix array-index-out-of-bounds in diNewExt + CVE-2023-52600: bacdaa04251382d7efd4f09f9a0686bfcc297e2e jfs: fix uaf in jfs_evict_inode + CVE-2023-52601: fc67a2e18f4c4e3f07e9f9ae463da24530470e73 jfs: fix array-index-out-of-bounds in dbAdjTree + CVE-2023-52602: bff9d4078a232c01e42e9377d005fb2f4d31a472 jfs: fix slab-out-of-bounds Read in dtSearch + CVE-2023-52603: 6e2902ecc77e9760a9fc447f56d598383e2372d2 UBSAN: array-index-out-of-bounds in dtSplitRoot + CVE-2023-52604: 59342822276f753e49d27ef5eebffbba990572b9 FS:JFS:UBSAN:array-index-out-of-bounds in dbAdjTree + CVE-2023-52606: 848e1d7fd710900397e1d0e7584680c1c04e3afd powerpc/lib: Validate size for vector operations + CVE-2023-52607: ffd29dc45bc0355393859049f6becddc3ed08f74 powerpc/mm: Fix null-pointer dereference in pgtable_cache_add + CVE-2023-52617: e129c7fa7070fbce57feb0bfc5eaa65eef44b693 PCI: switchtec: Fix stdev_release() crash after surprise hot remove + CVE-2023-52618: a2c6206f18104fba7f887bf4dbbfe4c41adc4339 block/rnbd-srv: Check for unlikely string overflow + CVE-2023-52619: cd40e43f870cf21726b22487a95ed223790b3542 pstore/ram: Fix crash when setting number of cpus to an odd number + CVE-2023-52621: c7f1b6146f4a46d727c0d046284c28b6882c6304 bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers + CVE-2023-52622: dc3e0f55bec4410f3d74352c4a7c79f518088ee2 ext4: avoid online resizing failures due to oversized flex bg + CVE-2023-52623: 8f860c8407470baff2beb9982ad6b172c94f1d0a SUNRPC: Fix a suspicious RCU usage warning + CVE-2023-52632: 1556c242e64cdffe58736aa650b0b395854fe4d4 drm/amdkfd: Fix lock dependency warning with srcu + CVE-2023-52633: b427f55e9d4185f6f17cc1e3296eb8d0c4425283 um: time-travel: fix time corruption + CVE-2023-52634: ce29728ef6485a367934cc100249c66dd3cde5b6 drm/amd/display: Fix disable_otg_wa logic + CVE-2023-52635: ae815e2fdc284ab31651d52460698bd89c0fce22 PM / devfreq: Synchronize devfreq_monitor_[start/stop] + CVE-2024-26623: 5939feb63ea1f011027576c64b68b681cbad31ca pds_core: Prevent race issues involving the adminq + CVE-2024-26625: 8e51f084b5716653f19e291ed5f026791d4b3ed4 llc: call sock_orphan() at release time + CVE-2024-26627: 07e3ca0f17f579491b5f54e9ed05173d6c1d6fcb scsi: core: Move scsi_host_busy() out of host lock for waking up EH handler + CVE-2024-26640: 1b8adcc0e2c584fec778add7777fe28e20781e60 tcp: add sanity checks to rx zerocopy + CVE-2024-26641: c835df3bcc14858ae9b27315dd7de76370b94f3a ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv() + CVE-2024-26671: f1bc0d8163f8ee84a8d5affdf624cfad657df1d2 blk-mq: fix IO hang from sbitmap wakeup race + CVE-2024-26672: 7b5d58c07024516c0e81b95e98f37710cf402c53 drm/amdgpu: Fix variable 'mca_funcs' dereferenced before NULL check in 'amdgpu_mca_smu_get_mca_entry()' + CVE-2024-26673: 38cc1605338d99205a263707f4dde76408d3e0e8 netfilter: nft_ct: sanitize layer 3 and 4 protocol number in custom expectations CVEs fixed in 6.7.5: + CVE-2023-52630: cd33b330cb21675189e747953845f5c3689e4912 blk-iocost: Fix an UBSAN shift-out-of-bounds warning + CVE-2023-52631: 686820fe141ea0220fc6fdfc7e5694f915cf64b2 fs/ntfs3: Fix an NULL dereference bug + CVE-2023-52636: bd9442e553ab8bf74b8be3b3c0a43bf4af4dc9b8 libceph: just wait for more data to be available on the socket CVE-2024-26581: 6eb14441f10602fa1cf691da9d685718b68b78a9 netfilter: nft_set_rbtree: skip end interval element from gc + CVE-2024-26600: 396e17af6761b3cc9e6e4ca94b4de7f642bfece1 phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP + CVE-2024-26601: 6b0d48647935e4b8c7b75d1eccb9043fcd4ee581 ext4: regenerate buddy after block freeing failed if under fc replay + CVE-2024-26605: ef90508574d7af48420bdc5f7b9a4f1cdd26bc70 PCI/ASPM: Fix deadlock when enabling ASPM + CVE-2024-26658: 5b41d3fd04c6757b9c2a60a0c5b2609cae9999df bcachefs: grab s_umount only if snapshotting + CVE-2024-26659: 418456c0ce56209610523f21734c5612ee634134 xhci: handle isoc Babble and Buffer Overrun events properly + CVE-2024-26660: a938eab9586eea31cfd129a507f552efae14d738 drm/amd/display: Implement bounds check for stream encoder creation in DCN301 + CVE-2024-26661: 39f24c08363af1cd945abad84e3c87fd3e3c845a drm/amd/display: Add NULL test for 'timing generator' in 'dcn21_set_pipe()' + CVE-2024-26662: 0c863cab0e9173f8b6c7bc328bee3b8625f131b5 drm/amd/display: Fix 'panel_cntl' could be null in 'dcn21_set_backlight_level()' + CVE-2024-26663: 0cd331dfd6023640c9669d0592bc0fd491205f87 tipc: Check the bearer type before calling tipc_udp_nl_bearer_add() + CVE-2024-26664: 3a7753bda55985dc26fae17795cb10d825453ad1 hwmon: (coretemp) Fix out-of-bounds memory access + CVE-2024-26665: 7dc9feb8b1705cf00de20563b6bc4831f4c99dab tunnels: fix out of bounds access when building IPv6 PMTU error + CVE-2024-26666: c255c3b653c6e8b52ac658c305e2fece2825f7ad wifi: mac80211: fix RCU use in TDLS fast-xmit + CVE-2024-26667: eb4f56f3ff5799ca754ae6d811803a63fe25a4a2 drm/msm/dpu: check for valid hw_pp in dpu_encoder_helper_phys_cleanup + CVE-2024-26674: 2da241c5ed78d0978228a1150735539fe1a60eca x86/lib: Revert to _ASM_EXTABLE_UA() for {get,put}_user() fixups + CVE-2024-26675: 210d938f963dddc543b07e66a79b7d8d4bd00bd8 ppp_async: limit MRU to 64K + CVE-2024-26676: 82ae47c5c3a6b27fdc0f9e83c1499cb439c56140 af_unix: Call kfree_skb() for dead unix_(sk)->oob_skb in GC. + CVE-2024-26677: 63719f490e6a89896e9a463d2b45e8203eab23ae rxrpc: Fix delayed ACKs to not set the reference serial number + CVE-2024-26678: 4adeeff8c12321cd453412a659c3c0eeb9bb2397 x86/efistub: Use 1:1 file:memory mapping for PE/COFF .compat section + CVE-2024-26679: 307fa8a75ab7423fa5c73573ec3d192de5027830 inet: read sk->sk_family once in inet_recv_error() + CVE-2024-26680: e42e334c645575be5432adee224975d4f536fdb1 net: atlantic: Fix DMA mapping for PTP hwts ring + CVE-2024-26681: d91964cdada76740811b7c621239f9c407820dbc netdevsim: avoid potential loop in nsim_dev_trap_report_work() + CVE-2024-26682: ea88bde8e3fefbe4268f6991375dd629895a090a wifi: mac80211: improve CSA/ECSA connection refusal + CVE-2024-26683: ce112c941c2b172afba3e913a90c380647d53975 wifi: cfg80211: detect stuck ECSA element in probe resp + CVE-2024-26684: 3b48c9e258c8691c2f093ee07b1ea3764caaa1b2 net: stmmac: xgmac: fix handling of DPP safety error for DMA channels CVEs fixed in 6.7.6: CVE-2023-52429: cd70175481f63af31901dd463e44386f033c3f4c dm: limit the number of targets and parameter size area + CVE-2023-52637: fc74b9cb789cae061bbca7b203a3842e059f6b5d can: j1939: Fix UAF in j1939_sk_match_filter during setsockopt(SO_J1939_FILTER) + CVE-2023-52638: 559b6322f9480bff68cfa98d108991e945a4f284 can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock + CVE-2023-52639: 28bb27824f25f36e5f80229a358d66ee09244082 KVM: s390: vsie: fix race during shadow creation + CVE-2024-0841: ec78418801ef7b0c22cd6a30145ec480dd48db39 fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super CVE-2024-1151: da05eb129c0208ef907420480c5859083408dc2c net: openvswitch: limit the number of recursions from action sets CVE-2024-23850: 5a172344bfdabb46458e03708735d7b1a918c468 btrfs: do not ASSERT() if the newly created subvolume already got read CVE-2024-23851: cd70175481f63af31901dd463e44386f033c3f4c dm: limit the number of targets and parameter size area @@ -65,6 +207,157 @@ CVEs fixed in 6.7.6: CVE-2024-26584: ab6397f072e5097f267abf5cb08a8004e6b17694 net: tls: handle backlogging of crypto requests CVE-2024-26585: e327ed60bff4a991cd7a709c47c4f0c5b4a4fd57 tls: fix race between tx work scheduling and socket close CVE-2024-26593: 609c7c1cc976e740d0fed4dbeec688b3ecb5dce2 i2c: i801: Fix block process call transactions + CVE-2024-26602: c5b2063c65d05e79fad8029324581d86cfba7eea sched/membarrier: reduce the ability to hammer on sys_membarrier + CVE-2024-26603: 627e28cbb65564e55008315d9e02fbb90478beda x86/fpu: Stop relying on userspace for info to fault in xsave buffer + CVE-2024-26604: b746d52ce7bcac325a2fa264216ead85b7fbbfaa Revert "kobject: Remove redundant checks for whether ktype is NULL" + CVE-2024-26606: 93b372c39c40cbf179e56621e6bc48240943af69 binder: signal epoll threads of self-work + CVE-2024-26621: 7432376c913381c5f24d373a87ff629bbde94b47 mm: huge_memory: don't force huge page alignment on 32 bit + CVE-2024-26685: 626daab3811b772086aef1bf8eed3ffe6f523eff nilfs2: fix potential bug in end_buffer_async_write + CVE-2024-26686: 27978243f165b44e342f28f449b91327944ea071 fs/proc: do_task_stat: use sig->stats_lock to gather the threads/children stats + CVE-2024-26687: 9be71aa12afa91dfe457b3fb4a444c42b1ee036b xen/events: close evtchn after mapping cleanup + CVE-2024-26688: ec78418801ef7b0c22cd6a30145ec480dd48db39 fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super + CVE-2024-26689: 7958c1bf5b03c6f1f58e724dbdec93f8f60b96fc ceph: prevent use-after-free in encode_cap_msg() + CVE-2024-26690: e6af0f082a4b87b99ad033003be2a904a1791b3f net: stmmac: protect updates of 64-bit statistics counters + CVE-2024-26691: 3ab1c40a1e915e350d9181a4603af393141970cc KVM: arm64: Fix circular locking dependency + CVE-2024-26692: 63c35afd50e28b49c5b75542045a8c42b696dab9 smb: Fix regression in writes when non-standard maximum write size negotiated + CVE-2024-26693: c12f0f4d4caf23b1bfdc2602b6b70d56bdcd6aa7 wifi: iwlwifi: mvm: fix a crash when we run out of stations + CVE-2024-26694: d24eb9a27bea8fe5237fa71be274391d9d51eff2 wifi: iwlwifi: fix double-free bug + CVE-2024-26695: b5909f197f3b26aebedca7d8ac7b688fd993a266 crypto: ccp - Fix null pointer dereference in __sev_platform_shutdown_locked + CVE-2024-26696: e38585401d464578d30f5868ff4ca54475c34f7d nilfs2: fix hang in nilfs_lookup_dirty_data_buffers() + CVE-2024-26697: 2000016bab499074e6248ea85aeea7dd762355d9 nilfs2: fix data corruption in dsync block recovery for small block sizes + CVE-2024-26698: 0e8875de9dad12805ff66e92cd5edea6a421f1cd hv_netvsc: Fix race condition between netvsc_probe and netvsc_remove + CVE-2024-26699: ca400d8e0c1c9d79c08dfb6b7f966e26c8cae7fb drm/amd/display: Fix array-index-out-of-bounds in dcn35_clkmgr + CVE-2024-26700: 5cd7185d2db76c42a9b7e69adad9591d9fca093f drm/amd/display: Fix MST Null Ptr for RV + CVE-2024-26702: 57d05dbbcd0b3dc0c252103b43012eef5d6430d1 iio: magnetometer: rm3100: add boundary check for the value read from RM3100_REG_TMRC + CVE-2024-26703: 2354d29986ebd138f89c2b73fecf8237e0a4ad6b tracing/timerlat: Move hrtimer_init to timerlat_fd open() + CVE-2024-26704: 559ddacb90da1d8786dd8ec4fd76bbfa404eaef6 ext4: fix double-free of blocks due to wrong extents moved_len + CVE-2024-26705: aa52be55276614d33f22fbe7da36c40d6432d10b parisc: BTLB: Fix crash when setting up BTLB at CPU bringup + CVE-2024-26706: ce31d79aa1f13a2345791f84935281a2c194e003 parisc: Fix random data corruption from exception handler + CVE-2024-26707: 547545e50c913861219947ce490c68a1776b9b51 net: hsr: remove WARN_ONCE() in send_hsr_supervision_frame() + CVE-2024-26708: e158fb9679d15a2317ec13b4f6301bd26265df2f mptcp: really cope with fastopen race + CVE-2024-26709: c90fdea9cac9eb419fc266e75d625cb60c8f7f6c powerpc/iommu: Fix the missing iommu_group_put() during platform domain attach + CVE-2024-26711: 02876e2df02f8b17a593d77a0a7879a8109b27e1 iio: adc: ad4130: zero-initialize clock init data + CVE-2024-26712: 70ef2ba1f4286b2b73675aeb424b590c92d57b25 powerpc/kasan: Fix addr error caused by page alignment + CVE-2024-26713: 12b55cfdd3ab91c70cc945cf8b5f45984ea0abf1 powerpc/pseries/iommu: Fix iommu initialisation during DLPAR add + CVE-2024-26714: 7a3a70dd08e4b7dffc2f86f2c68fc3812804b9d0 interconnect: qcom: sc8180x: Mark CO0 BCM keepalive + CVE-2024-26715: 36695d5eeeefe5a64b47d0336e7c8fc144e78182 usb: dwc3: gadget: Fix NULL pointer dereference in dwc3_gadget_suspend + CVE-2024-26716: 465b545d1d7ef282192ddd4439b08279bdb13f6f usb: core: Prevent null pointer dereference in update_port_device_state + CVE-2024-26717: e28d6b63aeecbda450935fb58db0e682ea8212d3 HID: i2c-hid-of: fix NULL-deref on failed power up + CVE-2024-26718: 0c45a20cbe68bc4d681734f5c03891124a274257 dm-crypt, dm-verity: disable tasklets + CVE-2024-26719: 985d053f7633d8b539ab1531738d538efac678a9 nouveau: offload fence uevents work to workqueue + CVE-2024-26720: 65977bed167a92e87085e757fffa5798f7314c9f mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again + CVE-2024-26721: ff5999fb03f467e1e7159f0ddb199c787f7512b9 drm/i915/dsc: Fix the macro that calculates DSCC_/DSCA_ PPS reg address + CVE-2024-26722: ed5b8b735369b40d6c1f8ef3e62d369f74b4c491 ASoC: rt5645: Fix deadlock in rt5645_jack_detect_work() + CVE-2024-26723: 2a492f01228b7d091dfe38974ef40dccf8f9f2f1 lan966x: Fix crash when adding interface under a lag + CVE-2024-26724: 1596126ea50228f0ed96697bae4e9368fda02c56 net/mlx5: DPLL, Fix possible use after free after delayed work timer triggers + CVE-2024-26725: 087739cbd0d0b87b6cec2c0799436ac66e24acc8 dpll: fix possible deadlock during netlink dump operation + CVE-2024-26726: a4b7741c8302e28073bfc6dd1c2e73598e5e535e btrfs: don't drop extent_map for free space inode on write error + CVE-2024-26727: 5a172344bfdabb46458e03708735d7b1a918c468 btrfs: do not ASSERT() if the newly created subvolume already got read + +CVEs fixed in 6.7.7: + CVE-2023-52640: 0830c5cf19bdec50d0ede4755ddc463663deb21c fs/ntfs3: Fix oob in ntfs_listxattr + CVE-2023-52641: 847b68f58c212f0439c5a8101b3841f32caffccd fs/ntfs3: Add NULL ptr dereference checking at the end of attr_allocate_frame() + CVE-2024-26728: 2d392f7268a1a9bfbd98c831f0f4c964e59aa145 drm/amd/display: fix null-pointer dereference on edid reading + CVE-2024-26729: 351080ba3414c96afff0f1338b4aeb2983195b80 drm/amd/display: Fix potential null pointer dereference in dc_dmub_srv + CVE-2024-26730: c196387820c9214c5ceaff56d77303c82514b8b1 hwmon: (nct6775) Fix access to temperature configuration registers + CVE-2024-26731: d61608a4e394f23e0dca099df9eb8e555453d949 bpf, sockmap: Fix NULL pointer dereference in sk_psock_verdict_data_ready() + CVE-2024-26732: 897f75e2cde8a5f9f7529b55249af1fa4248c83b net: implement lockless setsockopt(SO_PEEK_OFF) + CVE-2024-26733: 3ab0d6f8289ba8402ca95a9fc61a34909d5e1f3a arp: Prevent overflow in arp_req_get(). + CVE-2024-26734: e91d3561e28d7665f4f837880501dc8755f635a9 devlink: fix possible use-after-free and memory leaks in devlink_init() + CVE-2024-26735: 02b08db594e8218cfbc0e4680d4331b457968a9b ipv6: sr: fix possible use-after-free and null-ptr-deref + CVE-2024-26736: d34a5e57632bb5ff825196ddd9a48ca403626dfa afs: Increase buffer size in afs_update_volume_status() + CVE-2024-26737: 7d80a9e745fa5b47da3bca001f186c02485c7c33 bpf: Fix racing between bpf_timer_cancel_and_free and bpf_timer_cancel + CVE-2024-26738: 46e36ebd5e00a148b67ed77c1d31675996f77c25 powerpc/pseries/iommu: DLPAR add doesn't completely initialize pci_controller + CVE-2024-26739: f4e294bbdca8ac8757db436fc82214f3882fc7e7 net/sched: act_mirred: don't override retval if we already lost the skb + CVE-2024-26740: 60ddea1600bc476e0f5e02bce0e29a460ccbf0be net/sched: act_mirred: use the backlog for mirred ingress + CVE-2024-26741: f8c4a6b850882bc47aaa864b720c7a2ee3102f39 dccp/tcp: Unhash sk from ehash for tb2 alloc failure after check_estalblished(). + CVE-2024-26742: b9433b25cb06c415c9cb24782599649a406c8d6d scsi: smartpqi: Fix disable_managed_interrupts + CVE-2024-26743: bab8875c06ebda5e01c5c4cab30022aed85c14e6 RDMA/qedr: Fix qedr_create_user_qp error flow + CVE-2024-26744: c99a827d3cff9f84e1cb997b7cc6386d107aa74d RDMA/srpt: Support specifying the srpt_service_guid parameter + CVE-2024-26747: 01f82de440f2ab07c259b7573371e1c42e5565db usb: roles: fix NULL pointer issue when put module's reference + CVE-2024-26748: 92d20406a3d4ff3e8be667c79209dc9ed31df5b3 usb: cdns3: fix memory double free when handle zero packet + CVE-2024-26749: 9a07244f614bc417de527b799da779dcae780b5d usb: cdns3: fixed memory use after free at cdns3_gadget_ep_disable() + CVE-2024-26751: 6abe0895b63c20de06685c8544b908c7e413efa8 ARM: ep93xx: Add terminator to gpiod_lookup_table + CVE-2024-26752: 83340c66b498e49353530e41542500fc8a4782d6 l2tp: pass correct message length to ip6_append_data + CVE-2024-26753: ef1e47d50324e232d2da484fe55a54274eeb9bc1 crypto: virtio/akcipher - Fix stack overflow on memcpy + CVE-2024-26754: 5013bd54d283eda5262c9ae3bcc966d01daf8576 gtp: fix use-after-free and null-ptr-deref in gtp_genl_dump_pdp() + CVE-2024-26755: 60d6130d0ac1d883ed93c2a1e10aadb60967fd48 md: Don't suspend the array for interrupted reshape + CVE-2024-26756: 13b520fb62b772e408f9b79c5fe18ad414e90417 md: Don't register sync_thread for reshape directly + CVE-2024-26757: 2ea169c5a0b1134d573d07fc27a16f327ad0e7d3 md: Don't ignore read-only array in md_check_recovery() + CVE-2024-26758: a55f0d6179a19c6b982e2dc344d58c98647a3be0 md: Don't ignore suspended array in md_check_recovery() + CVE-2024-26759: d183a4631acfc7af955c02a02e739cec15f5234d mm/swap: fix race when skipping swapcache + CVE-2024-26760: 1cfe9489fb563e9a0c9cdc5ca68257a44428c2ec scsi: target: pscsi: Fix bio_put() for error case + CVE-2024-26761: 3a3181a71935774bda2398451256d7441426420b cxl/pci: Fix disabling memory if DVSEC CXL Range does not match a CFMWS window + CVE-2024-26762: 21e5e84f3f63fdf44e49642a6e45cd895e921a84 cxl/pci: Skip to handle RAS errors if CXL.mem device is detached + CVE-2024-26763: d9e3763a505e50ba3bd22846f2a8db99429fb857 dm-crypt: don't modify the data when using authenticated encryption + CVE-2024-26764: 1dc7d74fe456944a9b1c57bd776280249f441ac6 fs/aio: Restrict kiocb_set_cancel_fn() to I/O submitted via libaio + CVE-2024-26765: 8bf2ca8c60712af288b88ba80f8e4df4573d923f LoongArch: Disable IRQ before init_fn() for nonboot CPUs + CVE-2024-26766: 9034a1bec35e9f725315a3bb6002ef39666114d9 IB/hfi1: Fix sdma.h tx->num_descs off-by-one error + CVE-2024-26767: beea9ab9080cd2ef46296070bb327af066ee09d7 drm/amd/display: fixed integer types and null check locations + CVE-2024-26768: 0f6810e39898af2d2cabd9313e4dbc945fb5dfdd LoongArch: Change acpi_core_pic[NR_CPUS] to acpi_core_pic[MAX_CORE_PIC] + CVE-2024-26769: 1d86f79287206deec36d63b89c741cf542b6cadd nvmet-fc: avoid deadlock on delete association path + CVE-2024-26770: e71cc4a1e584293deafff1a7dea614b0210d0443 HID: nvidia-shield: Add missing null pointer checks to LED initialization + CVE-2024-26771: f2a5e30d1e9a629de6179fa23923a318d5feb29e dmaengine: ti: edma: Add some null pointer checks to the edma_probe + CVE-2024-26772: 21dbe20589c7f48e9c5d336ce6402bcebfa6d76a ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal() + CVE-2024-26773: a2576ae9a35c078e488f2c573e9e6821d651fbbe ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found() + CVE-2024-26774: 8cf9cc602cfb40085967c0d140e32691c8b71cf3 ext4: avoid dividing by 0 in mb_update_avg_fragment_size() when block bitmap corrupt + CVE-2024-26775: 19a77b27163820f793b4d022979ffdca8f659b77 aoe: avoid potential deadlock at set_capacity + CVE-2024-26776: e4168ac25b4bd378bd7dda322d589482a136c1fd spi: hisi-sfc-v3xx: Return IRQ_NONE if no interrupts were detected + CVE-2024-26777: 1d11dd3ea5d039c7da089f309f39c4cd363b924b fbdev: sis: Error out if pixclock equals zero + CVE-2024-26778: a9ca4e80d23474f90841251f4ac0d941fa337a01 fbdev: savage: Error out if pixclock equals zero + CVE-2024-26779: 281280276b70c822f55ce15b661f6d1d3228aaa9 wifi: mac80211: fix race condition on enabling fast-xmit + +CVEs fixed in 6.7.9: + CVE-2024-26622: 6edefe1b6c29a9932f558a898968a9fcbeec5711 tomoyo: fix UAF write bug in tomoyo_write_control() + CVE-2024-26630: fe7e008e0ce728252e4ec652cceebcc62211657c mm: cachestat: fix folio read-after-free in cache walk + CVE-2024-26745: 5da6d306f315344af1ca2eff4bd9b10b130f0c28 powerpc/pseries/iommu: IOMMU table is not initialized for kdump over SR-IOV + CVE-2024-26746: bb71e040323175e18c233a9afef32ba14fa64eb7 dmaengine: idxd: Ensure safe user copy of completion record + CVE-2024-26782: 85933e80d077c9ae2227226beb86c22f464059cc mptcp: fix double-free on socket dismantle + CVE-2024-26783: bdd21eed8b72f9e28d6c279f6db258e090c79080 mm/vmscan: fix a bug calling wakeup_kswapd() with a wrong zone index + CVE-2024-26784: f6aaf131e4d4a9a26040ecc018eb70ab8b3d355d pmdomain: arm: Fix NULL dereference on scmi_perf_domain removal + CVE-2024-26785: fc719ecbca45c9c046640d72baddba3d83e0bc0b iommufd: Fix protection fault in iommufd_test_syz_conv_iova + CVE-2024-26786: 9526a46cc0c378d381560279bea9aa34c84298a0 iommufd: Fix iopt_access_list_id overwrite bug + CVE-2024-26787: d610a307225951929b9dff807788439454476f85 mmc: mmci: stm32: fix DMA API overlapping mappings warning + CVE-2024-26788: 677102a930643c31f1b4c512b041407058bdfef8 dmaengine: fsl-qdma: init irq after reg initialization + CVE-2024-26789: 9e8ecd4908b53941ab6f0f51584ab80c6c6606c4 crypto: arm64/neonbs - fix out-of-bounds access on short input + CVE-2024-26790: ad2f8920c314e0a2d9e984fc94b729eca3cda471 dmaengine: fsl-qdma: fix SoC may hang on 16 byte unaligned read + CVE-2024-26791: 343eecb4ff49a7b1cc1dfe86958a805cf2341cfb btrfs: dev-replace: properly validate device names + CVE-2024-26793: 5366969a19a8a0d2ffb3d27ef6e8905e5e4216f8 gtp: fix use-after-free and null-ptr-deref in gtp_newlink() + CVE-2024-26795: 2a1728c15ec4f45ed9248ae22f626541c179bfbe riscv: Sparse-Memory/vmemmap out-of-bounds fix + CVE-2024-26796: e4f50e85de5a6b21dfdc0d7ca435eba4f62935c3 drivers: perf: ctr_get_width function for legacy is not defined + CVE-2024-26797: 50a6302cf881f67f1410461a68fe9eabd00ff31d drm/amd/display: Prevent potential buffer overflow in map_hw_resources + CVE-2024-26798: a2c881413dcc5d801bdc9535e51270cc88cb9cd8 fbcon: always restore the old font data in fbcon_do_set_font() + CVE-2024-26799: d5a7726e6ea62d447b79ab5baeb537ea6bdb225b ASoC: qcom: Fix uninitialized pointer dmactl + CVE-2024-26801: dd594cdc24f2e48dab441732e6dfcafd6b0711d1 Bluetooth: Avoid potential use-after-free in hci_error_reset + CVE-2024-26802: f72cf22dccc94038cbbaa1029cb575bf52e5cbc8 stmmac: Clear variable when destroying workqueue + CVE-2024-26803: 8f7a3894e58e6f5d5815533cfde60e3838947941 net: veth: clear GRO when clearing XDP even when down + CVE-2024-26804: 049d7989c67e8dd50f07a2096dbafdb41331fb9b net: ip_tunnel: prevent perpetual headroom growth + CVE-2024-26805: 59fc3e3d049e39e7d0d271f20dd5fb47c57faf1d netlink: Fix kernel-infoleak-after-free in __skb_datagram_iter + CVE-2024-26806: 041562ebc4759c9932b59a06527f8753b86da365 spi: cadence-qspi: remove system-wide suspend helper calls from runtime PM hooks + CVE-2024-26807: 34e1d5c4407c78de0e3473e1fbf8fb74dbe66d03 spi: cadence-qspi: fix pointer reference in runtime PM hooks + +CVEs fixed in 6.7.10: + CVE-2023-28746: 18867a204511d032c2a6ed083461a10905061fac x86/mmio: Disable KVM mitigation when X86_FEATURE_CLEAR_CPU_BUF is set + CVE-2024-26652: ffda0e962f270b3ec937660afd15b685263232d3 net: pds_core: Fix possible double free in error handling path + +CVEs fixed in 6.7.11: + CVE-2023-6270: 079cba4f4e307c69878226fdf5228c20aa1c969c aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts + CVE-2023-7042: db755cf93f5895bbac491d27a8e2fe04c5f9ae4a wifi: ath10k: fix NULL pointer dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev() + CVE-2024-22099: 5f9fe302dd3a9bbc50f4888464c1773f45166bfd Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security + CVE-2024-26651: efba65777f98457773c5b65e3135c6132d3b015f sr9800: Add check for usbnet_get_endpoints + CVE-2024-26809: 821e28d5b506e6a73ccc367ff792bd894050d48b netfilter: nft_set_pipapo: release elements in clone only from destroy path + +CVEs fixed in 6.7.12: + CVE-2023-47233: 6678a1e7d896c00030b31491690e8ddc9a90767a wifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach + CVE-2024-23307: 1191f9391105e49115715e55030476849f6f6da5 md/raid5: fix atomicity violation in raid5_cache_count + CVE-2024-24861: b0864de231dece0f7226b909521bebc86105743a media: xc4000: Fix atomicity violation in xc4000_get_frequency + CVE-2024-26642: 8e07c16695583a66e81f67ce4c46e94dece47ba7 netfilter: nf_tables: disallow anonymous set with timeout flag + CVE-2024-26643: 5224afbc30c3ca9ba23e752f0f138729b2c48dd8 netfilter: nf_tables: mark set as dead when unbinding anonymous set with timeout + CVE-2024-26653: 420babea4f1881a7c4ea22a8e218b8c6895d3f21 usb: misc: ljca: Fix double free in error handling path + CVE-2024-26654: e955e8a7f38a856fc6534ba4e6bffd4d5cc80ac3 ALSA: sh: aica: reorder cleanup operations to avoid UAF bugs + CVE-2024-26655: a88649b49523e8cbe95254440d803e38c19d2341 Fix memory leak in posix_clock_open() + CVE-2024-26656: af054a5fb24a144f99895afce9519d709891894c drm/amdgpu: fix use-after-free bug + CVE-2024-26657: 74cd204c7afe498aa9dcc3ebf0ecac53d477a429 drm/sched: fix null-ptr-deref in init entity Outstanding CVEs: CVE-2005-3660: (unk) @@ -151,26 +444,17 @@ Outstanding CVEs: CVE-2023-3640: (unk) CVE-2023-37454: (unk) CVE-2023-4010: (unk) - CVE-2023-47233: (unk) CVE-2023-6238: (unk) CVE-2023-6240: (unk) - CVE-2023-6270: (unk) - CVE-2023-6356: (unk) CVE-2023-6535: (unk) - CVE-2023-6536: (unk) - CVE-2023-7042: (unk) CVE-2024-0564: (unk) - CVE-2024-0841: (unk) CVE-2024-21803: (unk) - CVE-2024-22099: (unk) + CVE-2024-2193: (unk) CVE-2024-22386: (unk) - CVE-2024-23196: (unk) - CVE-2024-23307: (unk) CVE-2024-23848: (unk) CVE-2024-24857: (unk) CVE-2024-24858: (unk) CVE-2024-24859: (unk) - CVE-2024-24861: (unk) CVE-2024-24864: (unk) CVE-2024-25739: (unk) CVE-2024-25740: (unk) diff --git a/data/CVEs.txt b/data/CVEs.txt index c62d5e97f..844a71aa0 100644 --- a/data/CVEs.txt +++ b/data/CVEs.txt @@ -1485,6 +1485,8 @@ CVE-2019-2214: ec74136ded792deed80780a2f8baf3521eeb72f9 - a56587065094fd96eb4c2b CVE-2019-2215: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - f5cb779ba16334b45ba8946d6bfa6d9834d1527f (v2.6.12-rc2 to v4.16-rc1) CVE-2019-25044: 47cdee29ef9d94e485eb08f962c74943023a5271 - c3e2219216c92919a6bd1711f340f5faa98695e6 (v5.2-rc3 to v5.2-rc4) CVE-2019-25045: 6a53b7593233ab9e4f96873ebacc0f653a55c3e1 - dbb2483b2a46fbaf833cfb5deb5ed9cace9c7399 (v4.15-rc6 to v5.1) +CVE-2019-25160: 446fda4f26822b2d42ab3396aafcedf38a9ff2b6 - 5578de4834fe0f2a34fedc7374be691443396d1f (v2.6.19-rc1 to v5.0) +CVE-2019-25162: 611e12ea0f121a31d9e9c4ce2a18a77abc2f28d6 - e4c72c06c367758a14f227c847f9d623f1994ecf (v4.3-rc1 to v6.0-rc1) CVE-2019-3016: 0b9f6c4615c993d2b552e0d2bd1ade49b56e5beb - 8c6de56a42e0c657955e12b882a81ef07d1d073e (v4.10-rc1 to v5.6-rc1) CVE-2019-3459: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - 7c9cbd0b5e38a1672fcd137894ace3b042dfbf69 (v2.6.12-rc2 to v5.1-rc1) CVE-2019-3460: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - af3d5d1c87664a4f150fcf3534c6567cb19909b0 (v2.6.12-rc2 to v5.1-rc1) @@ -1721,6 +1723,19 @@ CVE-2020-36558: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - 6cd1ed50efd8826129857 CVE-2020-36691: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - 7690aa1cdf7c4565ad6b013b324c28b685505e24 (v2.6.12-rc2 to v5.8-rc1) CVE-2020-36694: 80055dab5de0c8677bc148c4717ddfc753a9148e - cc00bcaa589914096edef7fb87ca5cee4a166b5c (v4.15-rc1 to v5.10) CVE-2020-36766: ca684386e6e21ba1511061f71577cdb6c3f2b3d3 - 6c42227c3467549ddc65efe99c869021d2f4a570 (v4.8-rc1 to v5.9-rc1) +CVE-2020-36775: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - df77fbd8c5b222c680444801ffd20e8bbc90a56e (v2.6.12-rc2 to v5.7-rc1) +CVE-2020-36776: 371a3bc79c11b707d7a1b7a2c938dc3cc042fffb - 34ab17cc6c2c1ac93d7e5d53bb972df9a968f085 (v5.8-rc4 to v5.13-rc1) +CVE-2020-36777: 0230d60e4661d9ced6fb0b9a30f182ebdafbba7a - bf9a40ae8d722f281a2721779595d6df1c33a0bf (v4.5-rc1 to v5.13-rc1) +CVE-2020-36778: 10b17004a74c384c6f410af355b0d6d7a168f613 - a85c5c7a3aa8041777ff691400b4046e56149fd3 (v5.6-rc1 to v5.13-rc1) +CVE-2020-36779: ea6dd25deeb5b797a145be7f860e3085e7d104c3 - 2c662660ce2bd3b09dae21a9a9ac9395e1e6c00b (v5.6-rc1 to v5.13-rc1) +CVE-2020-36780: (n/a) - 3a4f326463117cee3adcb72999ca34a9aaafda93 (unk to v5.13-rc1) +CVE-2020-36781: (n/a) - 47ff617217ca6a13194fcb35c6c3a0c57c080693 (unk to v5.13-rc1) +CVE-2020-36782: 13d6eb20fc79a1e606307256dad4098375539a09 - 278e5bbdb9a94fa063c0f9bcde2479d0b8042462 (v4.16-rc1 to v5.13-rc1) +CVE-2020-36783: 93222bd9b966105f43418fd336654ad10045783a - 223125e37af8a641ea4a09747a6a52172fc4b903 (v4.15-rc1 to v5.13-rc1) +CVE-2020-36784: 7fa32329ca03148fb2c07b4ef3247b8fc0488d6a - 23ceb8462dc6f4b4decdb5536a7e5fc477cdf0b6 (v4.5-rc1 to v5.13-rc1) +CVE-2020-36785: ad85094b293e40e7a2f831b0311a389d952ebd5e - ba11bbf303fafb33989e95473e409f6ab412b18d (v5.8-rc1 to v5.13-rc1) +CVE-2020-36786: 9289cdf399922a1bd801a8cd946a79581c00a380 - 6045b01dd0e3cd3759eafe7f290ed04c957500b1 (v5.10-rc1 to v5.13-rc1) +CVE-2020-36787: d2b4387f3bdf016e266d23cf657465f557721488 - 3536169f8531c2c5b153921dc7d1ac9fd570cda7 (v5.0-rc1 to v5.13-rc1) CVE-2020-3702: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - 56c5485c9e444c2e85e11694b6c44f1338fc20fd (v2.6.12-rc2 to v5.12-rc1-dontuse) CVE-2020-4788: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - f79643787e0a0762d2409b7b8334e83f22d85695 (v2.6.12-rc2 to v5.10-rc5) CVE-2020-7053: 1acfc104cdf8a3408f0e83b4115d4419c6315005 - 7dc40713618c884bf07c030d1ab1f47a9dc1f310 (v4.14-rc1 to v5.2-rc1) @@ -1965,6 +1980,273 @@ CVE-2021-45485: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - 62f20e068ccc50d6ab66f CVE-2021-45486: 73f156a6e8c1074ac6327e0abd1169e95eb66463 - aa6dd211e4b1dde9d5dc25d699d35f789ae7eeba (v3.16-rc1 to v5.13-rc1) CVE-2021-45868: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - 9bf3d20331295b1ecb81f4ed9ef358c51699a050 (v2.6.12-rc2 to v5.16-rc1) CVE-2021-46283: 65038428b2c6c5be79d3f78a6b79c0cdc3a58a41 - ad9f151e560b016b6ad3280b48e42fa11e1a5440 (v5.7-rc1 to v5.13-rc7) +CVE-2021-46904: 72dc1c096c7051a48ab1dbb12f71976656b55eb5 - 8a12f8836145ffe37e9c8733dce18c22fb668b66 (v2.6.27-rc1 to v5.12-rc7) +CVE-2021-46905: 8a12f8836145ffe37e9c8733dce18c22fb668b66 - 2ad5692db72874f02b9ad551d26345437ea4f7f3 (v5.12-rc7 to v5.13-rc1) +CVE-2021-46906: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - 6be388f4a35d2ce5ef7dbf635a8964a5da7f799f (v2.6.12-rc2 to v5.13-rc5) +CVE-2021-46908: (n/a) - 9601148392520e2e134936e76788fc2a6371e7be (unk to v5.12-rc8) +CVE-2021-46909: 30fdfb929e82450bbf3d0e0aba56efbc29b52b52 - 30e3b4f256b4e366a61658c294f6a21b8626dda7 (v4.13-rc1 to v5.12-rc8) +CVE-2021-46910: 2a15ba82fa6ca3f35502b3060f22118a938d2889 - d624833f5984d484c5e3196f34b926f9e71dafee (v5.11-rc1 to v5.12-rc8) +CVE-2021-46911: 5a4b9fe7fece62ecab6fb28fe92362f83b41c33e - 1a73e427b824133940c2dd95ebe26b6dce1cbf10 (v5.7-rc1 to v5.12-rc8) +CVE-2021-46912: 9cb8e048e5d93825ec5e8dfb5b8df4987ea25745 - 97684f0970f6e112926de631fdd98d9693c7e5c1 (v5.7-rc1 to v5.12-rc8) +CVE-2021-46913: 4094445229760d0d31a4190dfe88fe815c9fc34e - 4d8f9065830e526c83199186c5f56a6514f457d2 (v5.7-rc1 to v5.12-rc8) +CVE-2021-46914: 6f82b25587354ce7c9c42e0b53d8b0770b900847 - debb9df311582c83fe369baa35fa4b92e8a9c58a (v5.9-rc1 to v5.12-rc8) +CVE-2021-46915: c26844eda9d4fdbd266660e3b3de2d0270e3a1ed - b895bdf5d643b6feb7c60856326dd4feb6981560 (v4.13 to v5.12-rc8) +CVE-2021-46916: b02e5a0ebb172c8276cea3151942aac681f7a4a6 - 31166efb1cee348eb6314e9c0095d84cbeb66b9d (v5.11-rc1 to v5.12-rc8) +CVE-2021-46917: da32b28c95a79e399e18c03f8178f41aec9c66e4 - ea9aadc06a9f10ad20a90edc0a484f1147d88a7a (v5.8-rc6 to v5.12-rc8) +CVE-2021-46918: 8e50d392652f20616a136165dff516b86baf5e49 - 6df0e6c57dfc064af330071f372f11aa8c584997 (v5.11-rc1 to v5.12-rc8) +CVE-2021-46919: c52ca478233c172b2d322b5241d6279a8661cbba - 0fff71c5a311e1264988179f7dcc217fda15fadd (v5.6-rc1 to v5.12-rc8) +CVE-2021-46920: bfe1d56091c1a404b3d4ce7e9809d745fc4453bb - ea941ac294d75d0ace50797aebf0056f6f8f7a7f (v5.6-rc1 to v5.12-rc8) +CVE-2021-46921: b519b56e378ee82caf9b079b04f5db87dedc3251 - 84a24bf8c52e66b7ac89ada5e3cfbe72d65c1896 (v4.15-rc1 to v5.12) +CVE-2021-46922: 8c657a0590de585b1115847c17b34a58025f2f4b - 9d5171eab462a63e2fbebfccf6026e92be018f20 (v5.12-rc1-dontuse to v5.12) +CVE-2021-46923: 9caccd41541a6f7d6279928d9f971f6642c361af - 012e332286e2bb9f6ac77d195f17e74b2963d663 (v5.12-rc1-dontuse to v5.16-rc8) +CVE-2021-46924: 68957303f44a501af5cf37913208a2acaa6bcdf1 - 1b9dadba502234eea7244879b8d5d126bfaf9f0c (v3.16-rc1 to v5.16-rc8) +CVE-2021-46925: 5f08318f617b05b6ee389d8bd174c7af921ebf19 - 349d43127dac00c15231e8ffbcaabd70f7b0e544 (v4.11-rc1 to v5.16-rc8) +CVE-2021-46926: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - 385f287f9853da402d94278e59f594501c1d1dad (v2.6.12-rc2 to v5.16-rc7) +CVE-2021-46927: 5b78ed24e8ec48602c1d6f5a188e58d000c81e2b - 3a0152b219523227c2a62a0a122cf99608287176 (v5.15-rc1 to v5.16-rc8) +CVE-2021-46928: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - 484730e5862f6b872dca13840bed40fd7c60fa26 (v2.6.12-rc2 to v5.16-rc7) +CVE-2021-46929: d25adbeb0cdb860fb39e09cdd025e9cfc954c5ab - 5ec7d18d1813a5bead0b495045606c93873aecbb (v4.14-rc1 to v5.16-rc8) +CVE-2021-46930: 83374e035b6286731c5aa617844c7b724294c2a7 - 8c313e3bfd9adae8d5c4ba1cc696dcbc86fbf9bf (v5.2-rc1 to v5.16-rc8) +CVE-2021-46931: 5f29458b77d51c104554575b73184c243930aa87 - 918fc3855a6507a200e9cf22c20be852c0982687 (v5.7-rc1 to v5.16-rc8) +CVE-2021-46932: 5a6eb676d3bc4d7a6feab200a92437b62ad298da - 9f3ccdc3f6ef10084ceb3a47df0961bec6196fd0 (v2.6.23-rc1 to v5.16-rc8) +CVE-2021-46933: 5e33f6fdf735cda1d4580fe6f1878da05718fe73 - b1e0887379422975f237d43d8839b751a6bcf154 (v4.0-rc1 to v5.16-rc8) +CVE-2021-46934: 7d5cb45655f2e9e37ef75d18f50c0072ef14a38b - bb436283e25aaf1533ce061605d23a9564447bdf (v4.15-rc1 to v5.16-rc8) +CVE-2021-46935: 74310e06be4d74dcf67cd108366710dee5c576d5 - cfd0d84ba28c18b531648c9d4a35ecca89ad9901 (v4.14-rc1 to v5.16-rc8) +CVE-2021-46936: 61a7e26028b94805fd686a6dc9dbd9941f8f19b0 - e22e45fc9e41bf9fcc1e92cfb78eb92786728ef0 (v2.6.27-rc1 to v5.16-rc8) +CVE-2021-46937: 4bc05954d0076655cfaf6f0135585bdc20cd6b11 - ebb3f994dd92f8fb4d70c7541091216c1e10cb71 (v5.15-rc1 to v5.16-rc8) +CVE-2021-46938: 1c357a1e86a4227a6b6059f2de118ae47659cebc - 8e947c8f4a5620df77e43c9c75310dc510250166 (v4.6-rc1 to v5.13-rc1) +CVE-2021-46939: (n/a) - aafe104aa9096827a429bc1358f8260ee565b7cc (unk to v5.13-rc1) +CVE-2021-46940: 9972d5d84d76982606806b2ce887f70c2f8ba60a - 13a779de4175df602366d129e41782ad7168cef0 (v5.10-rc4 to v5.13-rc1) +CVE-2021-46941: 41ce1456e1dbbc7355d0fcc10cf7c337c13def24 - f88359e1588b85cf0e8209ab7d6620085f3441d9 (v4.12-rc1 to v5.13-rc1) +CVE-2021-46942: 37d1e2e3642e2380750d7f35279180826f29660e - 734551df6f9bedfbefcd113ede665945e9de0b99 (v5.12-rc1-dontuse to v5.13-rc1) +CVE-2021-46943: 6d5f26f2e045f2377b524516194657c00efbbce8 - ad91849996f9dd79741a961fd03585a683b08356 (v5.2-rc1 to v5.13-rc1) +CVE-2021-46944: 6d5f26f2e045f2377b524516194657c00efbbce8 - 3630901933afba1d16c462b04d569b7576339223 (v5.2-rc1 to v5.13-rc1) +CVE-2021-46945: 014c9caa29d3a44e0de695c99ef18bec3e887d52 - ac2f7ca51b0929461ea49918f27c11b680f28995 (v5.11-rc1 to v5.13-rc1) +CVE-2021-46947: e26ca4b535820b1445dcef3c0f82b3fb5b45108b - 99ba0ea616aabdc8e26259fd722503e012199a76 (v5.12-rc1-dontuse to v5.13-rc1) +CVE-2021-46948: 12804793b17c0e19115a90d98f2f3df0cb79e233 - 83b09a1807415608b387c7bc748d329fefc5617e (v5.10-rc1 to v5.13-rc1) +CVE-2021-46949: 12804793b17c0e19115a90d98f2f3df0cb79e233 - 5b1faa92289b53cad654123ed2bc8e10f6ddd4ac (v5.10-rc1 to v5.13-rc1) +CVE-2021-46950: (n/a) - 2417b9869b81882ab90fd5ed1081a1cb2d4db1dd (unk to v5.13-rc1) +CVE-2021-46951: (n/a) - 48cff270b037022e37835d93361646205ca25101 (unk to v5.13-rc1) +CVE-2021-46952: (n/a) - c09f11ef35955785f92369e25819bf0629df2e59 (unk to v5.13-rc1) +CVE-2021-46953: ca9ae5ec4ef0ed13833b03297ab319676965492c - 1ecd5b129252249b9bc03d7645a7bda512747277 (v4.12-rc1 to v5.13-rc1) +CVE-2021-46954: c129412f74e99b609f0a8e95fc3915af1fd40f34 - 31fe34a0118e0acc958c802e830ad5d37ef6b1d3 (v5.11-rc1 to v5.13-rc1) +CVE-2021-46955: d52e5a7e7ca49457dd31fc8b42fb7c0d58a31221 - 7c0ea5930c1c211931819d83cfb157bff1539a4c (v4.16-rc7 to v5.13-rc1) +CVE-2021-46956: a62a8ef9d97da23762a588592c8b8eb50a8deb6a - c79c5e0178922a9e092ec8fed026750f39dcaef4 (v5.4-rc1 to v5.13-rc1) +CVE-2021-46957: c22b0bcb1dd024cb9caad9230e3a387d8b061df5 - b1ebaa0e1318494a7637099a26add50509e37964 (v5.12-rc1-dontuse to v5.13-rc1) +CVE-2021-46958: ef67963dac255b293e19815ea3d440567be4626f - 061dde8245356d8864d29e25207aa4daa0be4d3c (v5.7-rc4 to v5.13-rc1) +CVE-2021-46959: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - 794aaf01444d4e765e2b067cba01cc69c1c68ed9 (v2.6.12-rc2 to v5.13-rc1) +CVE-2021-46960: 61cfac6f267dabcf2740a7ec8a0295833b28b5f5 - 83728cbf366e334301091d5b808add468ab46b27 (v4.11-rc1 to v5.13-rc1) +CVE-2021-46961: 3f1f3234bc2db1c16b9818b9a15a5d58ad45251c - a97709f563a078e259bf0861cd259aa60332890a (v5.1-rc1 to v5.13-rc1) +CVE-2021-46962: (n/a) - e29c84857e2d51aa017ce04284b962742fb97d9e (unk to v5.13-rc1) +CVE-2021-46963: af2a0c51b1205327f55a7e82e530403ae1d42cbb - 6641df81ab799f28a5d564f860233dd26cca0d93 (v5.5-rc1 to v5.13-rc1) +CVE-2021-46964: a6dcfe08487e5e83b6b4214c959a9577a9ed2d9f - f02d4086a8f36a0e1aaebf559b54cf24a177a486 (v5.11-rc1 to v5.13-rc1) +CVE-2021-46965: (n/a) - 683313993dbe1651c7aa00bb42a041d70e914925 (unk to v5.13-rc1) +CVE-2021-46966: 03d1571d9513369c17e6848476763ebbd10ec2cb - e483bb9a991bdae29a0caa4b3a6d002c968f94aa (v5.4-rc1 to v5.13-rc1) +CVE-2021-46967: ddd89d0a059d8e9740c75a97e0efe9bf07ee51f9 - 3a3e0fad16d40a2aa68ddf7eea4acdf48b22dd44 (v5.8-rc1 to v5.13-rc1) +CVE-2021-46968: 29c2680fd2bf3862ff5cf2957f198512493156f9 - 70fac8088cfad9f3b379c9082832b4d7532c16c2 (v5.10-rc3 to v5.13-rc1) +CVE-2021-46969: (n/a) - 0ecc1c70dcd32c0f081b173a1a5d89952686f271 (unk to v5.13-rc1) +CVE-2021-46970: (n/a) - 0fccbf0a3b690b162f53b13ed8bc442ea33437dc (unk to v5.13-rc1) +CVE-2021-46971: b0c8fdc7fdb77586c3d1937050925b960743306e - 08ef1af4de5fe7de9c6d69f1e22e51b66e385d9b (v5.4-rc1 to v5.13-rc1) +CVE-2021-46972: 6815f479ca90ee7fd2e28b2a420f796b974155fe - eaab1d45cdb4bb0c846bd23c3d666d5b90af7b41 (v5.8-rc1 to v5.13-rc1) +CVE-2021-46973: 6e728f321393b1fce9e1c2c3e55f9f7c15991321 - 47a017f33943278570c072bc71681809b2567b3a (v5.8-rc1 to v5.13-rc1) +CVE-2021-46974: 979d63d50c0c0f7bc537bf821e056cc9fe5abd38 - b9b34ddbe2076ade359cd5ce7537d5ed019e9807 (v5.0-rc1 to v5.13-rc1) +CVE-2021-46976: 229007e02d697b0662f85378aae53531b0dfea05 - 402be8a101190969fc7ff122d07e262df86e132b (v5.8-rc1 to v5.13-rc2) +CVE-2021-46977: 4be5341026246870818e28b53202b001426a5aec - 5104d7ffcf24749939bea7fdb5378d186473f890 (v5.5-rc1 to v5.13-rc2) +CVE-2021-46978: f2c7ef3ba9556d62a7e2bb23b563c6510007d55c - f5c7e8425f18fdb9bdb7d13340651d7876890329 (v5.11-rc3 to v5.13-rc2) +CVE-2021-46979: 8dedcc3eee3aceb37832176f0a1b03d5687acda3 - 901f84de0e16bde10a72d7eb2f2eb73fcde8fa1a (v5.11-rc1 to v5.13-rc2) +CVE-2021-46980: 992a60ed0d5e312ce9a485c9e12097ac82ae4b3e - 1f4642b72be79757f050924a9b9673b6a02034bc (v5.8-rc1 to v5.13-rc2) +CVE-2021-46981: e9e006f5fcf2bab59149cb38a48a4817c1b538b4 - 79ebe9110fa458d58f1fceb078e2068d7ad37390 (v5.4-rc1 to v5.13-rc2) +CVE-2021-46982: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - a949dc5f2c5cfe0c910b664650f45371254c0744 (v2.6.12-rc2 to v5.13-rc2) +CVE-2021-46983: ca0f1a8055be2a04073af435dc68419334481638 - 8cc365f9559b86802afc0208389f5c8d46b4ad61 (v5.9-rc1 to v5.13-rc2) +CVE-2021-46984: a6088845c2bf754d6cb2572b484180680b037804 - efed9a3337e341bd0989161b97453b52567bc59d (v4.18-rc1 to v5.13-rc2) +CVE-2021-46985: eb50aaf960e3bedfef79063411ffd670da94b84b - 0c8bd174f0fc131bc9dfab35cd8784f59045da87 (v5.12-rc5 to v5.13-rc2) +CVE-2021-46986: e81a7018d93a7de31a3f121c9a7eecd0a5ec58b0 - bb9c74a5bd1462499fe5ccb1e3c5ac40dcfa9139 (v5.10-rc1 to v5.13-rc2) +CVE-2021-46987: c53e9653605dbf708f5be02902de51831be4b009 - f9baa501b4fd6962257853d46ddffbc21f27e344 (v5.9-rc1 to v5.13-rc2) +CVE-2021-46988: cb658a453b9327ce96ce5222c24d162b5b65b564 - 7ed9d238c7dbb1fdb63ad96a6184985151b0171c (v4.11-rc1 to v5.13-rc2) +CVE-2021-46989: 31651c607151f1034cfb57e5a78678bea54c362b - c3187cf32216313fb316084efac4dab3a8459b1d (v4.19-rc1 to v5.13-rc2) +CVE-2021-46990: f79643787e0a0762d2409b7b8334e83f22d85695 - aec86b052df6541cc97c5fca44e5934cbea4963b (v5.10-rc5 to v5.13-rc2) +CVE-2021-46991: 7b0b1a6d0ac983ce1928432285d0222d4fb7c38b - 38318f23a7ef86a8b1862e5e8078c4de121960c3 (v4.16-rc1 to v5.13-rc1) +CVE-2021-46992: 0ed6389c483dc77cdbdd48de0ca7ce41723dd667 - a54754ec9891830ba548e2010c889e3c8146e449 (v4.9-rc1 to v5.13-rc1) +CVE-2021-46993: 69842cba9ace84849bb9b8edcdf2cefccd97901c - 6d2f8909a5fabb73fe2a63918117943986c39b6c (v5.3-rc1 to v5.13-rc1) +CVE-2021-46994: 8ce8c0abcba314e1fe954a1840f6568bf5aef2ef - 03c427147b2d3e503af258711af4fc792b89b0af (v5.5-rc1 to v5.13-rc1) +CVE-2021-46995: cf8ee6de2543a0fa6d9471ddbb7216464a9681a1 - 4cc7faa406975b460aa674606291dea197c1210c (v5.12-rc1-dontuse to v5.13-rc1) +CVE-2021-46996: b131c96496b369c7b14125e7c50e89ac7cec8051 - 85dfd816fabfc16e71786eda0a33a7046688b5b0 (v5.10-rc1 to v5.13-rc1) +CVE-2021-46997: 23529049c68423820487304f244144e0d576e85a - 4d6a38da8e79e94cbd1344aa90876f0f805db705 (v5.10-rc7 to v5.13-rc1) +CVE-2021-46998: fb7516d42478ebc8e2f00efb76ef96f7b68fd8d3 - 643001b47adc844ae33510c4bb93c236667008a3 (v4.16-rc1 to v5.13-rc1) +CVE-2021-46999: 145cb2f7177d94bc54563ed26027e952ee0ae03c - 35b4f24415c854cd718ccdf38dbea6297f010aae (v5.7-rc3 to v5.13-rc1) +CVE-2021-47000: 878dabb64117406abd40977b87544d05bb3031fc - 1775c7ddacfcea29051c67409087578f8f4d751b (v5.8-rc1 to v5.13-rc1) +CVE-2021-47001: 2ae50ad68cd79224198b525f7bd645c9da98b6ff - 35d8b10a25884050bb3b0149b62c3818ec59f77c (v5.5-rc1 to v5.13-rc1) +CVE-2021-47002: 5191955d6fc65e6d4efe8f4f10a6028298f57281 - b9f83ffaa0c096b4c832a43964fe6bff3acffe10 (v5.11-rc1 to v5.13-rc1) +CVE-2021-47003: 89e3becd8f821e507052e012d2559dcda59f538e - 28ac8e03c43dfc6a703aa420d18222540b801120 (v5.11 to v5.13-rc1) +CVE-2021-47004: 4354994f097d068a894aa1a0860da54571df3582 - 61461fc921b756ae16e64243f72af2bfc2e620db (v4.20-rc1 to v5.13-rc1) +CVE-2021-47005: 2c04c5b8eef797dca99699cfb55ff42dd3c12c23 - 6613bc2301ba291a1c5a90e1dc24cf3edf223c03 (v5.1-rc1 to v5.13-rc1) +CVE-2021-47006: 1879445dfa7bbd6fe21b09c5cc72f4934798afed - a506bd5756290821a4314f502b4bafc2afcf5260 (v4.7-rc1 to v5.13-rc1) +CVE-2021-47007: b4b10061ef98c583bcf82a4200703fbaa98c18dc - 3ab0598e6d860ef49d029943ba80f627c15c15d6 (v5.8-rc1 to v5.13-rc1) +CVE-2021-47008: f1c6366e304328de301be362eca905a3503ff33b - a3ba26ecfb569f4aa3f867e80c02aa65f20aadad (v5.11-rc1 to v5.13-rc1) +CVE-2021-47009: 5df16caada3fba3b21cb09b85cdedf99507f4ec1 - 83a775d5f9bfda95b1c295f95a3a041a40c7f321 (v5.12-rc1-dontuse to v5.13-rc2) +CVE-2021-47010: 6670e152447732ba90626f36dfc015a13fbf150e - 8d432592f30fcc34ef5a10aac4887b4897884493 (v4.15-rc1 to v5.13-rc1) +CVE-2021-47011: 3de7d4f25a7438f09fef4e71ef111f1805cd8e7c - 9f38f03ae8d5f57371b71aa6b4275765b65454fd (v5.11-rc5 to v5.13-rc1) +CVE-2021-47012: 2251334dcac9eb337575d8767e2a6a7e81848f7f - 3093ee182f01689b89e9f8797b321603e5de4f63 (v5.3-rc1 to v5.13-rc1) +CVE-2021-47013: b9b17debc69d27cd55e21ee51a5ba7fc50a426cf - 6d72e7c767acbbdd44ebc7d89c6690b405b32b57 (v4.9-rc1 to v5.13-rc1) +CVE-2021-47014: ae372cb1750f6c95370f92fe5f5620e0954663ba - f77bd544a6bbe69aa50d9ed09f13494cf36ff806 (v5.8-rc7 to v5.13-rc1) +CVE-2021-47015: a1b0e4e684e9c300b9e759b46cb7a0147e61ddff - bbd6f0a948139970f4a615dff189d9a503681a39 (v5.1-rc5 to v5.13-rc1) +CVE-2021-47016: 7529b90d051e4629884771ba2b1d3a87d2c6a9d7 - 43262178c043032e7c42d00de44c818ba05f9967 (v5.2-rc1 to v5.13-rc1) +CVE-2021-47017: c8334512f3dd1b94844baca629f9bedca4271593 - 8392df5d7e0b6a7d21440da1fc259f9938f4dec3 (v5.8-rc1 to v5.13-rc1) +CVE-2021-47018: 265c3491c4bc8d40587996d6ee2f447a7ccfb4f3 - 9ccba66d4d2aff9a3909aa77d57ea8b7cc166f3c (v5.5-rc1 to v5.13-rc1) +CVE-2021-47019: ffa1bf97425bd511b105ce769976e20a845a71e9 - fe3fccde8870764ba3e60610774bd7bc9f8faeff (v5.12-rc1-dontuse to v5.13-rc1) +CVE-2021-47020: 89e590535f32d4bc548bcf266f3b046e50942f6d - 48f17f96a81763c7c8bf5500460a359b9939359f (v4.18-rc1 to v5.13-rc1) +CVE-2021-47021: f285dfb98562e8380101095d168910df1d07d8be - e9d32af478cfc3744a45245c0b126738af4b3ac4 (v5.12-rc1-dontuse to v5.13-rc1) +CVE-2021-47022: a6275e934605646ef81b02d8d1164f21343149c9 - 8ab31da7b89f71c4c2defcca989fab7b42f87d71 (v5.12-rc1-dontuse to v5.13-rc1) +CVE-2021-47023: 501ef3066c89d7f9045315e1be58749cf9e6814d - 333980481b99edb24ebd5d1a53af70a15d9146de (v5.10-rc1 to v5.13-rc1) +CVE-2021-47024: ac03046ece2b158ebd204dfc4896fd9f39f0e6c8 - 8432b8114957235f42e070a16118a7f750de9d39 (v5.2-rc2 to v5.13-rc1) +CVE-2021-47025: c0b57581b73be7b43f39e0dff201c93413f6a668 - b34ea31fe013569d42b7e8681ef3f717f77c5b72 (v5.12-rc1-dontuse to v5.13-rc1) +CVE-2021-47026: 6a98d71daea186247005099758af549e6afdd244 - 7f4a8592ff29f19c5a2ca549d0973821319afaad (v5.8-rc1 to v5.13-rc1) +CVE-2021-47027: 5c14a5f944b91371961548b1907802f74a4d2e5c - e230f0c44f011f3270680a506b19b7e84c5e8923 (v5.12-rc1-dontuse to v5.13-rc1) +CVE-2021-47028: (n/a) - f43b941fd61003659a3f0e039595e5e525917aa8 (unk to v5.13-rc1) +CVE-2021-47029: d0e274af2f2e44b9d496f5d2c0431fdd2ea76fb8 - c996f0346e40e3b1ac2ebaf0681df898fb157f60 (v5.12-rc1-dontuse to v5.13-rc1) +CVE-2021-47030: d2bf7959d9c0f631ef860edaf834d55773fdedff - 49cc85059a2cb656f96ff3693f891e8fe8f669a9 (v5.12-rc1-dontuse to v5.13-rc1) +CVE-2021-47031: 1c099ab44727c8e42fe4de4d91b53cec3ef02860 - 782b3e86ea970e899f8e723db9f64708a15ca30e (v5.12-rc1-dontuse to v5.13-rc1) +CVE-2021-47032: 27d5c528a7ca08dcd44877fdd9fc08b76630bf77 - 7dcf3c04f0aca746517a77433b33d40868ca4749 (v5.10-rc1 to v5.13-rc1) +CVE-2021-47033: 27d5c528a7ca08dcd44877fdd9fc08b76630bf77 - ebee7885bb12a8fe2c2f9bac87dbd87a05b645f9 (v5.10-rc1 to v5.13-rc1) +CVE-2021-47034: f1cb8f9beba8699dd1b4518418191499e53f7b17 - b8b2f37cf632434456182e9002d63cbc4cccc50c (v4.18-rc1 to v5.13-rc1) +CVE-2021-47035: b802d070a52a1565b47daaa808872cfbd4a17b01 - eea53c5816889ee8b64544fa2e9311a81184ff9c (v5.6-rc1 to v5.13-rc1) +CVE-2021-47036: 9fd1ff5d2ac7181844735806b0a703c942365291 - 18f25dc399901426dff61e676ba603ff52c666f7 (v5.6-rc1 to v5.13-rc1) +CVE-2021-47037: 520a1c396d1966b64884d8e0176a580150d5a09e - 96fadf7e8ff49fdb74754801228942b67c3eeebd (v5.10-rc1 to v5.13-rc1) +CVE-2021-47038: eab2404ba798a8efda2a970f44071c3406d94e57 - 17486960d79b900c45e0bb8fbcac0262848582ba (v5.7-rc1 to v5.13-rc1) +CVE-2021-47039: bf9c0538e485b591a2ee02d9adb8a99db4be5a2a - 1ffec389a6431782a8a28805830b6fae9bf00af1 (v5.11-rc1 to v5.13-rc1) +CVE-2021-47040: efe68c1ca8f49e8c06afd74b699411bfbb8ba1ff - 38134ada0ceea3e848fe993263c0ff6207fd46e7 (v5.8-rc1 to v5.13-rc1) +CVE-2021-47041: 872d26a391da92ed8f0c0f5cb5fef428067b7f30 - b5332a9f3f3d884a1b646ce155e664cc558c1722 (v5.0-rc1 to v5.13-rc1) +CVE-2021-47042: 3a00c04212d1cfe1426338b78f4ead623508c874 - 616cf23b6cf40ad6f03ffbddfa1b6c4eb68d8ae1 (v5.12-rc1-dontuse to v5.13-rc1) +CVE-2021-47043: 32f0a6ddc8c98a1aade2bf3d07c79d5d2c6ceb9a - 5a465c5391a856a0c1e9554964d660676c35d1b2 (v5.5-rc1 to v5.13-rc1) +CVE-2021-47044: 5a7f555904671c0737819fe4d19bd6143de3f6c0 - 39a2a6eb5c9b66ea7c8055026303b3aa681b49a5 (v5.10-rc1 to v5.13-rc1) +CVE-2021-47045: 4430f7fd09ecb037570119e0aacbf0c17b8f98b2 - 8dd1c125f7f838abad009b64bff5f0a11afe3cb6 (v5.11-rc1 to v5.13-rc1) +CVE-2021-47046: (n/a) - 8e6fafd5a22e7a2eb216f5510db7aab54cc545c1 (unk to v5.13-rc1) +CVE-2021-47047: 1c26372e5aa9e53391a1f8fe0dc7cd93a7e5ba9e - 126bdb606fd2802454e6048caef1be3e25dd121e (v5.10-rc1 to v5.13-rc1) +CVE-2021-47048: 1c26372e5aa9e53391a1f8fe0dc7cd93a7e5ba9e - a2c5bedb2d55dd27c642c7b9fb6886d7ad7bdb58 (v5.10-rc1 to v5.13-rc1) +CVE-2021-47049: 6f3d791f300618caf82a2be0c27456edd76d5164 - 3e9bf43f7f7a46f21ec071cb47be92d0874c48da (v4.14-rc1 to v5.13-rc1) +CVE-2021-47050: ca7d8b980b67f133317525c4273e144116ee1ae5 - 59e27d7c94aa02da039b000d33c304c179395801 (v5.9-rc1 to v5.13-rc1) +CVE-2021-47051: 944c01a889d97dc08e1b71f4ed868f4023fd6034 - a03675497970a93fcf25d81d9d92a59c2d7377a7 (v5.2-rc1 to v5.13-rc1) +CVE-2021-47052: (n/a) - 854b7737199848a91f6adfa0a03cf6f0c46c86e8 (unk to v5.13-rc1) +CVE-2021-47053: d9b45418a91773b7672e4c60037a28074b495c6d - 50274b01ac1689b1a3f6bc4b5b3dbf361a55dd3a (v5.10-rc1 to v5.13-rc1) +CVE-2021-47054: 335a127548081322bd2b294d715418648912f20c - ac6ad7c2a862d682bb584a4bc904d89fa7721af8 (v4.9-rc1 to v5.13-rc1) +CVE-2021-47055: f7e6b19bc76471ba03725fe58e0c218a3d6266c3 - 1e97743fd180981bef5f01402342bb54bf1c6366 (v5.9-rc1 to v5.13-rc1) +CVE-2021-47056: 25c6ffb249f612c56a48ce48a3887adf57b8f4bd - 8609f5cfdc872fc3a462efa6a3eca5cb1e2f6446 (v4.7-rc1 to v5.13-rc1) +CVE-2021-47057: ac2614d721dea2ff273af19c6c5d508d58a2bb3e - 98b5ef3e97b16eaeeedb936f8bda3594ff84a70e (v5.10-rc1 to v5.13-rc1) +CVE-2021-47058: cffa4b2122f5f3e53cf3d529bbc74651f95856d5 - e41a962f82e7afb5b1ee644f48ad0b3aee656268 (v5.11-rc3 to v5.13-rc1) +CVE-2021-47059: (n/a) - 1dbc6a1e25be8575d6c4114d1d2b841a796507f7 (unk to v5.13-rc1) +CVE-2021-47060: f65886606c2d3b562716de030706dfe1bea4ed5e - 5d3c4c79384af06e3c8e25b7770b6247496b4417 (v5.9-rc5 to v5.13-rc1) +CVE-2021-47061: f65886606c2d3b562716de030706dfe1bea4ed5e - 2ee3757424be7c1cd1d0bbfa6db29a7edd82a250 (v5.9-rc5 to v5.13-rc1) +CVE-2021-47062: ad73109ae7ec30d5bfb76be108e304f9f0af4829 - c36b16d29f3af5f32fc1b2a3401bf48f71cabee1 (v5.11-rc1 to v5.13-rc1) +CVE-2021-47063: 13dfc0540a575b47b2d640b093ac16e9e09474f6 - 4d906839d321c2efbf3fed4bc31ffd9ff55b75c0 (v4.13-rc1 to v5.13-rc1) +CVE-2021-47064: 27d5c528a7ca08dcd44877fdd9fc08b76630bf77 - b4403cee6400c5f679e9c4a82b91d61aa961eccf (v5.10-rc1 to v5.13-rc1) +CVE-2021-47065: (n/a) - 2ff25985ea9ccc6c9af2c77b0b49045adcc62e0e (unk to v5.13-rc1) +CVE-2021-47066: 29bcff787a2593b2126cfaff612c0b4e560022e9 - ceaf2966ab082bbc4d26516f97b3ca8a676e2af8 (v5.10-rc1 to v5.13-rc1) +CVE-2021-47067: 783807436f363e5b1ad4d43ba7debbedfcadbb99 - ef85bb582c41524e9e68dfdbde48e519dac4ab3d (v5.5-rc1 to v5.13-rc1) +CVE-2021-47068: c33b1cc62ac05c1dbb1cdafe2eb66da01c76ca8d - c61760e6940dd4039a7f5e84a6afc9cdbf4d82b6 (v5.12-rc7 to v5.13-rc1) +CVE-2021-47069: c5b2cbdbdac563f46ecd5e187253ab1abbd6fc04 - a11ddb37bf367e6b5239b95ca759e5389bb46048 (v5.6-rc1 to v5.13-rc3) +CVE-2021-47070: (n/a) - 0b0226be3a52dadd965644bc52a807961c2c26df (unk to v5.13-rc3) +CVE-2021-47071: cdfa835c6e5e87d145f9f632b58843de97509f2b - 3ee098f96b8b6c1a98f7f97915f8873164e6af9d (v4.20-rc1 to v5.13-rc3) +CVE-2021-47072: 64d6b281ba4db044c946158387c74e1149b9487e - 54a40fc3a1da21b52dbf19f72fdc27a2ec740760 (v5.12-rc1-dontuse to v5.13-rc3) +CVE-2021-47073: 1a258e670434f404a4500b65ba1afea2c2b29bba - 3a53587423d25c87af4b4126a806a0575104b45e (v4.15-rc1 to v5.13-rc3) +CVE-2021-47074: 3a85a5de29ea779634ddfd768059e06196687aba - 03504e3b54cc8118cc26c064e60a0b00c2308708 (v4.8-rc1 to v5.13-rc3) +CVE-2021-47075: (n/a) - fec356a61aa3d3a66416b4321f1279e09e0f256f (unk to v5.13-rc3) +CVE-2021-47076: (n/a) - dc07628bd2bbc1da768e265192c28ebd301f509d (unk to v5.13-rc3) +CVE-2021-47077: 61d8658b4a435eac729966cc94cdda077a8df5cd - 73578af92a0fae6609b955fcc9113e50e413c80f (v4.11-rc1 to v5.13-rc3) +CVE-2021-47078: 8700e3e7c4857d28ebaa824509934556da0b3e76 - 67f29896fdc83298eed5a6576ff8f9873f709228 (v4.8-rc1 to v5.13-rc3) +CVE-2021-47079: ff36b0d953dc4cbc40a72945920ff8e805f1b0da - ff67dbd554b2aaa22be933eced32610ff90209dd (v5.12-rc1-dontuse to v5.13-rc3) +CVE-2021-47080: 9f85cbe50aa044a46f0a22fda323fa27b80c82da - 54d87913f147a983589923c7f651f97de9af5be1 (v5.10-rc1 to v5.13-rc3) +CVE-2021-47081: 423815bf02e257091d5337be5c63b57fc29e4254 - 115726c5d312b462c9d9931ea42becdfa838a076 (v5.12-rc1-dontuse to v5.13-rc3) +CVE-2021-47082: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - 158b515f703e75e7d68289bf4d98c664e1d632df (v2.6.12-rc2 to v5.16-rc7) +CVE-2021-47083: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - 2d5446da5acecf9c67db1c9d55ae2c3e5de01f8d (v2.6.12-rc2 to v5.16-rc7) +CVE-2021-47086: bdb6e697b2a76c541960b86ab8fda88f3de1adf2 - 75a2f31520095600f650597c0ac41f48b5ba0068 (v3.3-rc1 to v5.16-rc7) +CVE-2021-47087: ec185dd3ab257dc2a60953fdf1b6622f524cc5b7 - 18549bf4b21c739a9def39f27dcac53e27286ab5 (v5.14-rc5 to v5.16-rc7) +CVE-2021-47088: 4bc05954d0076655cfaf6f0135585bdc20cd6b11 - 34796417964b8d0aef45a99cf6c2d20cebe33733 (v5.15-rc1 to v5.16-rc7) +CVE-2021-47089: 0ce20dd840897b12ae70869c69f1ba34d6d16965 - 0129ab1f268b6cf88825eae819b9b84aa0a85634 (v5.12-rc1-dontuse to v5.16-rc7) +CVE-2021-47090: b94e02822debdf0cc473556aad7dcc859f216653 - 2a57d83c78f889bf3f54eede908d0643c40d5418 (v5.10-rc1 to v5.16-rc7) +CVE-2021-47091: 295b02c4be74bebf988593b8322369513fcecf68 - 87a270625a89fc841f1a7e21aae6176543d8385c (v5.10-rc1 to v5.16-rc7) +CVE-2021-47092: c8607e4a086fae05efe5bffb47c5199c65e7216e - a80dfc025924024d2c61a4c1b8ef62b2fce76a04 (v5.15-rc4 to v5.16-rc7) +CVE-2021-47093: 938835aa903ae19ad62805134f79bbcf20fc3bea - 26a8b09437804fabfb1db080d676b96c0de68e7c (v5.9 to v5.16-rc7) +CVE-2021-47094: faaf05b00aecdb347ffd1d763d024394ec0329f8 - 3a0f64de479cae75effb630a2e0a237ca0d0623c (v5.10-rc1 to v5.16-rc7) +CVE-2021-47095: c4436c9149c5d2bc0c49ab57ec85c75ea1c4d61c - 34f35f8f14bc406efc06ee4ff73202c6fd245d15 (v5.4-rc1 to v5.16-rc7) +CVE-2021-47096: 09d23174402da0f10e98da2c61bb5ac8e7d79fdd - 39a8fc4971a00d22536aeb7d446ee4a97810611b (v5.15-rc4 to v5.16-rc7) +CVE-2021-47097: e4c9062717feda88900b566463228d1c4910af6d - 1d72d9f960ccf1052a0630a68c3d358791dbdaaa (v5.11-rc1 to v5.16-rc7) +CVE-2021-47098: b50aa49638c7e12abf4ecc483f4e928c5cccc1b0 - 55840b9eae5367b5d5b29619dc2fb7e4596dba46 (v5.14-rc1 to v5.16-rc7) +CVE-2021-47099: d3256efd8e8b234a6251e4d4580bd2c3c31fdc4c - 9695b7de5b4760ed22132aca919570c0190cb0ce (v5.13-rc1 to v5.16-rc7) +CVE-2021-47100: b2cfd8ab4add53c2070367bfee2f5b738f51698d - ffb76a86f8096a8206be03b14adda6092e18e275 (v4.15-rc1 to v5.16-rc7) +CVE-2021-47101: (n/a) - 8035b1a2a37a29d8c717ef84fca8fe7278bc9f03 (unk to v5.16-rc7) +CVE-2021-47102: 3d5048cc54bd250cfbb358c37fcc011135977887 - 2efc2256febf214e7b2bdaa21fe6c3c3146acdcb (v5.14-rc1 to v5.16-rc7) +CVE-2021-47103: (n/a) - 8f905c0e7354ef261360fb7535ea079b1082c105 (unk to v5.16-rc7) +CVE-2021-47104: d39bf40e55e666b5905fdbd46a0dced030ce87be - bee90911e0138c76ee67458ac0d58b38a3190f65 (v5.15 to v5.16-rc7) +CVE-2021-47105: 2d4238f5569722197612656163d824098208519c - afe8a3ba85ec2a6b6849367e25c06a2f8e0ddd05 (v5.5-rc1 to v5.16-rc7) +CVE-2021-47106: aaa31047a6d25da0fa101da1ed544e1247949b40 - 0f7d9b31ce7abdbb29bf018131ac920c9f698518 (v5.13-rc1 to v5.16-rc7) +CVE-2021-47107: f5dcccd647da513a89f3b6ca392b0c1eb050b9fc - 53b1119a6e5028b125f431a0116ba73510d82a72 (v5.13-rc1 to v5.16-rc7) +CVE-2021-47108: 41ca9caaae0bfc959b22dbcd59d88a7107707e17 - 3b8e19a0aa3933a785be9f1541afd8d398c4ec69 (v5.14-rc1 to v5.16-rc7) +CVE-2021-47109: 58956317c8de52009d1a38a721474c24aef74fe7 - 7a6b1ab7475fd6478eeaf5c9d1163e7a18125c8f (v5.0-rc1 to v5.13-rc7) +CVE-2021-47110: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - c02027b5742b5aa804ef08a4a9db433295533046 (v2.6.12-rc2 to v5.13-rc2) +CVE-2021-47111: 2ac061ce97f413bfbbdd768f7d2e0fda2e8170df - 107866a8eb0b664675a260f1ba0655010fac1e08 (v5.5-rc1 to v5.13-rc6) +CVE-2021-47112: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - 8b79feffeca28c5459458fe78676b081e87c93a4 (v2.6.12-rc2 to v5.13-rc2) +CVE-2021-47113: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - dc09ef3562726cd520c8338c1640872a60187af5 (v2.6.12-rc2 to v5.13-rc5) +CVE-2021-47114: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - 6bba4471f0cc1296fe3c2089b9e52442d3074b2e (v2.6.12-rc2 to v5.13-rc5) +CVE-2021-47116: (n/a) - a8867f4e3809050571c98de7a2d465aff5e4daf5 (unk to v5.13-rc5) +CVE-2021-47117: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - 082cd4ec240b8734a82a89ffb890216ac98fec68 (v2.6.12-rc2 to v5.13-rc5) +CVE-2021-47118: 9ec52099e4b8678a60e9f93e41ad87885d64f3e6 - 0711f0d7050b9e07c44bc159bbc64ac0a1022c7f (v2.6.19-rc1 to v5.13-rc5) +CVE-2021-47119: ce40733ce93de402ed629762f0e912d9af187cef - afd09b617db3786b6ef3dc43e28fe728cfea84df (v2.6.25-rc1 to v5.13-rc5) +CVE-2021-47120: 9d7b18668956c411a422d04c712994c5fdb23a4b - 4b4f6cecca446abcb686c6e6c451d4f1ec1a7497 (v4.20-rc1 to v5.13-rc5) +CVE-2021-47121: 7ad65bf68d705b445ef10b77ab50dab22be185ee - 7f5d86669fa4d485523ddb1d212e0a2d90bd62bb (v3.3-rc1 to v5.13-rc5) +CVE-2021-47122: 7c18d2205ea76eef9674e59e1ecae4f332a53e9e - b53558a950a89824938e9811eddfc8efcd94e1bb (v3.3-rc1 to v5.13-rc5) +CVE-2021-47123: 90cd7e424969d29aff653333b4dcb4e2e199d791 - 447c19f3b5074409c794b350b10306e1da1ef4ba (v5.11-rc1 to v5.13-rc2) +CVE-2021-47124: (n/a) - a298232ee6b9a1d5d732aa497ff8be0d45b5bd82 (unk to v5.13-rc2) +CVE-2021-47125: (n/a) - 944d671d5faa0d78980a3da5c0f04960ef1ad893 (unk to v5.13-rc5) +CVE-2021-47126: f88d8ea67fbdbac7a64bfa6ed9a2ba27bb822f74 - 821bbf79fe46a8b1d18aa456e8ed0a3c208c3754 (v5.3-rc1 to v5.13-rc5) +CVE-2021-47127: c7a219048e459cf99c6fec0f7c1e42414e9e6202 - e102db780e1c14f10c70dafa7684af22a745b51d (v5.12-rc1-dontuse to v5.13-rc5) +CVE-2021-47128: (n/a) - ff40e51043af63715ab413995ff46996ecf9583f (unk to v5.13-rc5) +CVE-2021-47129: 857b46027d6f91150797295752581b7155b9d0e1 - 1710eb913bdcda3917f44d383c32de6bdabfc836 (v5.3-rc1 to v5.13-rc5) +CVE-2021-47130: c6e3f13398123a008cd2ee28f93510b113a32791 - bcd9a0797d73eeff659582f23277e7ab6e5f18f3 (v5.8-rc1 to v5.13-rc5) +CVE-2021-47131: (n/a) - c55dcdd435aa6c6ad6ccac0a4c636d010ee367a4 (unk to v5.13-rc5) +CVE-2021-47132: 64b9cea7a0afe579dd2682f1f1c04f2e4e72fd25 - b5941f066b4ca331db225a976dae1d6ca8cf0ae3 (v5.12-rc1-dontuse to v5.13-rc5) +CVE-2021-47133: (n/a) - 5ad755fd2b326aa2bc8910b0eb351ee6aece21b1 (unk to v5.13-rc5) +CVE-2021-47134: b91540d52a08b65eb6a2b09132e1bd54fa82754c - 668a84c1bfb2b3fd5a10847825a854d63fac7baa (v5.10-rc1 to v5.13-rc5) +CVE-2021-47135: (n/a) - d874e6c06952382897d35bf4094193cd44ae91bd (unk to v5.13-rc5) +CVE-2021-47136: (n/a) - 9453d45ecb6c2199d72e73c993e9d98677a2801b (unk to v5.13-rc4) +CVE-2021-47137: (n/a) - c7718ee96dbc2f9c5fc3b578abdf296dd44b9c20 (unk to v5.13-rc4) +CVE-2021-47138: b1a79360ee862f8ada4798ad2346fa45bb41b527 - 88c380df84fbd03f9b137c2b9d0a44b9f2f553b0 (v5.2-rc1 to v5.13-rc4) +CVE-2021-47139: 08a100689d4baf296d6898c687ea8d005da8d234 - a289a7e5c1d49b7d47df9913c1cc81fb48fab613 (v5.6-rc1 to v5.13-rc4) +CVE-2021-47140: (n/a) - d6177a6556f853785867e2ec6d5b7f4906f0d809 (unk to v5.13-rc4) +CVE-2021-47141: 893ce44df56580fb878ca5af9c4a5fd87567da50 - 5218e919c8d06279884aa0baf76778a6817d5b93 (v5.3-rc1 to v5.13-rc4) +CVE-2021-47142: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - 1e5c37385097c35911b0f8a0c67ffd10ee1af9a2 (v2.6.12-rc2 to v5.13-rc3) +CVE-2021-47143: (n/a) - 444d7be9532dcfda8e0385226c862fd7e986f607 (unk to v5.13-rc4) +CVE-2021-47144: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - fa7e6abc75f3d491bc561734312d065dc9dc2a77 (v2.6.12-rc2 to v5.13-rc3) +CVE-2021-47145: (n/a) - 91df99a6eb50d5a1bc70fff4a09a0b7ae6aab96d (unk to v5.13-rc3) +CVE-2021-47146: (n/a) - 020ef930b826d21c5446fdc9db80fd72a791bc21 (unk to v5.13-rc4) +CVE-2021-47147: (n/a) - 9c1bb37f8cad5e2ee1933fa1da9a6baa7876a8e4 (unk to v5.13-rc4) +CVE-2021-47148: 81a4362016e7d8b17031fe1aa43cdb58a7f0f163 - e5cc361e21648b75f935f9571d4003aaee480214 (v5.12-rc1-dontuse to v5.13-rc4) +CVE-2021-47149: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - 52202be1cd996cde6e8969a128dc27ee45a7cb5e (v2.6.12-rc2 to v5.13-rc3) +CVE-2021-47150: 59d0f746564495c7f54526674deabfcf101236a1 - 619fee9eb13b5d29e4267cb394645608088c28a8 (v3.18-rc1 to v5.13-rc4) +CVE-2021-47151: (n/a) - a00593737f8bac2c9e97b696e7ff84a4446653e8 (unk to v5.13-rc4) +CVE-2021-47152: 18b683bff89d46ace55f12d00c0440d44d6160c4 - 29249eac5225429b898f278230a6ca2baa1ae154 (v5.7-rc1 to v5.13-rc4) +CVE-2021-47153: 636752bcb5177a301d0266270661581de8624828 - e4d8716c3dcec47f1557024add24e1f3c09eb24b (v3.6-rc1 to v5.13-rc4) +CVE-2021-47158: (n/a) - cec279a898a3b004411682f212215ccaea1cd0fb (unk to v5.13-rc4) +CVE-2021-47159: badf3ada60ab8f76f9488dc8f5c0c57f70682f5a - a269333fa5c0c8e53c92b5a28a6076a28cde3e83 (v4.7-rc1 to v5.13-rc4) +CVE-2021-47160: (n/a) - 474a2ddaa192777522a7499784f1d60691cd831a (unk to v5.13-rc4) +CVE-2021-47161: 90ba37033cb94207e97c4ced9be575770438213b - 680ec0549a055eb464dce6ffb4bfb736ef87236e (v4.10-rc1 to v5.13-rc4) +CVE-2021-47162: 45c8b7b175ceb2d542e0fe15247377bf3bce29ec - b7df21cf1b79ab7026f545e7bf837bd5750ac026 (v4.3 to v5.13-rc4) +CVE-2021-47163: d0f91938bede204a343473792529e0db7d599836 - 04c26faa51d1e2fe71cf13c45791f5174c37f986 (v4.1-rc1 to v5.13-rc4) +CVE-2021-47164: 7e51891a237f9ea319f53f9beb83afb0077d88e6 - 83026d83186bc48bb41ee4872f339b83f31dfc55 (v5.8-rc1 to v5.13-rc4) +CVE-2021-47165: (n/a) - 7cfc4ea78fc103ea51ecbacd9236abb5b1c490d2 (unk to v5.13-rc4) +CVE-2021-47166: a7d42ddb3099727f58366fa006f850a219cce6c8 - 0d0ea309357dea0d85a82815f02157eb7fcda39f (v4.0-rc1 to v5.13-rc4) +CVE-2021-47167: a7d42ddb3099727f58366fa006f850a219cce6c8 - 56517ab958b7c11030e626250c00b9b1a24b41eb (v4.0-rc1 to v5.13-rc4) +CVE-2021-47168: 16b374ca439fb406e46e071f75428f5b033056f8 - 769b01ea68b6c49dc3cde6adf7e53927dacbd3a8 (v2.6.37-rc1 to v5.13-rc4) +CVE-2021-47169: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - 016002848c82eeb5d460489ce392d91fe18c475c (v2.6.12-rc2 to v5.13-rc4) +CVE-2021-47170: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - 4f2629ea67e7225c3fd292c7fe4f5b3c9d6392de (v2.6.12-rc2 to v5.13-rc4) +CVE-2021-47171: d0cad871703b898a442e4049c532ec39168e5b57 - 46a8b29c6306d8bbfd92b614ef65a47c900d8e70 (v2.6.34-rc2 to v5.13-rc4) +CVE-2021-47172: (n/a) - f2a772c51206b0c3f262e4f6a3812c89a650191b (unk to v5.13-rc4) +CVE-2021-47173: (n/a) - dcb4b8ad6a448532d8b681b5d1a7036210b622de (unk to v5.13-rc4) +CVE-2021-47174: 7400b063969bdca4a06cd97f1294d765c8eecbe1 - f0b3d338064e1fe7531f0d2977e35f3b334abfb4 (v5.7-rc1 to v5.13-rc4) +CVE-2021-47175: (n/a) - e70f7a11876a1a788ceadf75e9e5f7af2c868680 (unk to v5.13-rc4) +CVE-2021-47176: b72949328869dfd45f6452c2410647afd7db5f1a - c0c8a8397fa8a74d04915f4d3d28cb4a5d401427 (v5.11-rc1 to v5.13-rc4) +CVE-2021-47177: 39ab9555c24110671f8dc671311a26e5c985b592 - 0ee74d5a48635c848c20f152d0d488bf84641304 (v4.11-rc1 to v5.13-rc4) +CVE-2021-47178: 1526d9f10c6184031e42afad0adbdde1213e8ad1 - 70ca3c57ff914113f681e657634f7fbfa68e1ad1 (v5.11-rc1 to v5.13-rc4) +CVE-2021-47179: (n/a) - a421d218603ffa822a0b8045055c03eae394a7eb (unk to v5.13-rc4) +CVE-2021-47180: (n/a) - e0652f8bb44d6294eeeac06d703185357f25d50b (unk to v5.13-rc4) CVE-2022-0001: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - d45476d9832409371537013ebdd8dc1a7781f97a (v2.6.12-rc2 to v5.17-rc8) CVE-2022-0002: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - d45476d9832409371537013ebdd8dc1a7781f97a (v2.6.12-rc2 to v5.17-rc8) CVE-2022-0168: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - d6f5e358452479fa8a773b5c6ccc9e4ec5a20880 (v2.6.12-rc2 to v5.18-rc1) @@ -2290,6 +2572,11 @@ CVE-2022-48424: 12dad495eaab95e0bb784c43869073617c513ea4 - 4f1dc7d9756e66f3f8768 CVE-2022-48425: 12dad495eaab95e0bb784c43869073617c513ea4 - 98bea253aa28ad8be2ce565a9ca21beb4a9419e5 (v5.15-rc1 to v6.4-rc1) CVE-2022-48502: f7464060f7ab9a2424428008f0ee9f1e267e410f - 0e8235d28f3a0e9eda9f02ff67ee566d5f42b66b (v5.15-rc1 to v6.2-rc1) CVE-2022-48619: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - 409353cbe9fe48f6bc196114c442b1cff05a39bc (v2.6.12-rc2 to v5.18-rc1) +CVE-2022-48626: (n/a) - bd2db32e7c3e35bd4d9b8bbff689434a50893546 (unk to v5.17-rc4) +CVE-2022-48627: 81732c3b2fede049a692e58a7ceabb6d18ffb18c - 39cdb68c64d84e71a4a717000b6e5de208ee60cc (v3.7-rc1 to v5.19-rc7) +CVE-2022-48628: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - e3dfcab2080dc1f9a4b09cc1327361bc2845bfcd (v2.6.12-rc2 to v6.6-rc1) +CVE-2022-48629: ceec5f5b59882b871a722ca4d49b767a09a4bde9 - a680b1832ced3b5fa7c93484248fd221ea0d614b (v4.19-rc1 to v5.17) +CVE-2022-48630: a680b1832ced3b5fa7c93484248fd221ea0d614b - 16287397ec5c08aa58db6acf7dbc55470d78087d (v5.17 to v5.18) CVE-2023-0030: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - 729eba3355674f2d9524629b73683ba1d1cd3f10 (v2.6.12-rc2 to v5.0-rc1) CVE-2023-0045: 9137bb27e60e554dab694eafa4cca241fa3a694f - a664ec9158eeddd75121d39c9a0758016097fa96 (v4.20-rc5 to v6.2-rc3) CVE-2023-0047: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - 60e2793d440a3ec95abb5d6d4fc034a4b480472d (v2.6.12-rc2 to v5.16-rc1) @@ -2412,6 +2699,7 @@ CVE-2023-28410: 9f909e215fea0652023b9ed09d3d7bfe10386423 - 661412e301e2ca86799aa CVE-2023-28464: 0f00cd322d22d4441de51aa80bcce5bb6a8cbb44 - 5dc7d23e167e2882ef118456ceccd57873e876d8 (v6.3-rc1 to v6.3-rc7) CVE-2023-28466: 3c4d7559159bfe1e3b94df3a657b2cda3a34e218 - 49c47cc21b5b7a3d8deb18fc57b0aa2ab1286962 (v4.13-rc1 to v6.3-rc2) CVE-2023-2860: 4f4853dc1c9c1994f6f756eabdcc25374ff271d9 - 84a53580c5d2138c7361c7c3eea5b31827e63b35 (v4.10-rc1 to v6.0-rc5) +CVE-2023-28746: (n/a) - e95df4ec0c0c9791941f112db699fae794b9862a (unk to v6.9-rc1) CVE-2023-28772: 5e3ca0ec76fce92daa4eed0d02de9c79b1fe3920 - d3b16034a24a112bb83aeb669ac5b9b01f744bb7 (v2.6.27-rc1 to v5.14-rc1) CVE-2023-28866: d0b137062b2de75b264b84143d21c98abc5f5ad2 - bce56405201111807cc8e4f47c6de3e10b17c1ac (v5.17-rc1 to v6.3-rc4) CVE-2023-2898: b4b10061ef98c583bcf82a4200703fbaa98c18dc - d8189834d4348ae608083e1f1f53792cfcc2a9bc (v5.8-rc1 to v6.5-rc1) @@ -2551,7 +2839,7 @@ CVE-2023-46343: 391d8a2da787257aeaf952c974405b53926e3fb3 - 7937609cd387246aed994 CVE-2023-46813: 597cfe48212a3f110ab0f918bf59791f453e65b7 - 63e44bc52047f182601e7817da969a105aa1f721 (v5.10-rc1 to v6.6-rc7) CVE-2023-46838: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - c7ec4f2d684e17d69bbdd7c4324db0ef5daac26a (v2.6.12-rc2 to v6.8-rc2) CVE-2023-46862: dbbe9c642411c359ad0a0e32442eb2e11d3811b5 - 7644b1a1c9a7ae8ab99175989bfc8676055edb46 (v5.10-rc1 to v6.6) -CVE-2023-47233: e756af5b30b008f6ffcfebf8ad0b477f6f225b62 - (n/a) (v3.7-rc1 to unk) +CVE-2023-47233: e756af5b30b008f6ffcfebf8ad0b477f6f225b62 - 0f7352557a35ab7888bc7831411ec8a3cbe20d78 (v3.7-rc1 to v6.9-rc1) CVE-2023-4732: 5a281062af1d43d3f3956a6b429c2d727bc92603 - 8f34f1eac3820fc2722e5159acceb22545b30b0d (v5.7-rc1 to v5.14-rc1) CVE-2023-4881: 49499c3e6e18b7677a63316f3ff54a16533dc28f - fd94d9dadee58e09b49075240fe83423eb1dcd36 (v4.1-rc1 to v6.6-rc1) CVE-2023-4921: 462dbc9101acd38e92eda93c0726857517a24bbd - 8fc134fee27f2263988ae38920bc03da416b03d8 (v3.8-rc1 to v6.6-rc1) @@ -2570,7 +2858,7 @@ CVE-2023-52340: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - af6d10345ca76670c1b7c CVE-2023-52429: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - bd504bcfec41a503b32054da5472904b404341a4 (v2.6.12-rc2 to v6.8-rc3) CVE-2023-52433: f6c383b8c31a - 2ee52ae94baabf7ee09cf2a8d854b990dac5d0e4 (v6.5-rc6 to v6.6-rc1) CVE-2023-52434: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - af1689a9b7701d9907dfc84d2a4b57c4bc907144 (v2.6.12-rc2 to v6.7-rc6) -CVE-2023-52435: (n/a) - 23d05d563b7e7b0314e65c8e882bc27eac2da8e7 (unk to v6.7-rc6) +CVE-2023-52435: 3953c46c3ac7eef31a9935427371c6f54a22f1ba - 23d05d563b7e7b0314e65c8e882bc27eac2da8e7 (v4.8-rc1 to v6.7-rc6) CVE-2023-52436: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - e26b6d39270f5eab0087453d9b544189a38c8564 (v2.6.12-rc2 to v6.8-rc1) CVE-2023-52438: dd2283f2605e - 3f489c2067c5824528212b0fc18b28d51332d906 (v4.20-rc1 to v6.8-rc1) CVE-2023-52439: 57c5f4df0a5a - 0c9ae0b8605078eafc3bea053cc78791e97ba2e2 (v4.18-rc5 to v6.8-rc1) @@ -2590,15 +2878,159 @@ CVE-2023-52452: 01f810ace9ed3 - 6b4a64bafd107e521c01eec3453ce94a3fb38529 (v5.12- CVE-2023-52453: d9a871e4a143047d1d84a606772af319f11516f9 - be12ad45e15b5ee0e2526a50266ba1d295d26a88 (v6.2-rc1 to v6.8-rc1) CVE-2023-52454: 872d26a391da92ed8f0c0f5cb5fef428067b7f30 - efa56305908ba20de2104f1b8508c6a7401833be (v5.0-rc1 to v6.8-rc1) CVE-2023-52455: a5bf3cfce8cb77d9d24613ab52d520896f83dd48 - bb57f6705960bebeb832142ce9abf43220c3eab1 (v6.3-rc1 to v6.8-rc1) -CVE-2023-52456: (n/a) - 78d60dae9a0c9f09aa3d6477c94047df2fe6f7b0 (unk to v6.8-rc1) -CVE-2023-52457: (n/a) - ad90d0358bd3b4554f243a425168fc7cebe7d04e (unk to v6.8-rc1) -CVE-2023-52458: (n/a) - 6f64f866aa1ae6975c95d805ed51d7e9433a0016 (unk to v6.8-rc1) +CVE-2023-52456: cb1a609236096c278ecbfb7be678a693a70283f1 - 78d60dae9a0c9f09aa3d6477c94047df2fe6f7b0 (v5.9-rc1 to v6.8-rc1) +CVE-2023-52457: e3f0c638f428fd66b5871154b62706772045f91a - ad90d0358bd3b4554f243a425168fc7cebe7d04e (v6.1-rc6 to v6.8-rc1) +CVE-2023-52458: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - 6f64f866aa1ae6975c95d805ed51d7e9433a0016 (v2.6.12-rc2 to v6.8-rc1) CVE-2023-52459: 28a1295795d85a25f2e7dd391c43969e95fcb341 - 3de6ee94aae701fa949cd3b5df6b6a440ddfb8f2 (v6.6-rc1 to v6.8-rc1) CVE-2023-52460: 7966f319c66d9468623c6a6a017ecbc0dd79be75 - b719a9c15d52d4f56bdea8241a5d90fd9197ce99 (v6.7-rc1 to v6.8-rc1) CVE-2023-52461: 56e449603f0ac580700621a356d35d5716a62ce5 - 2bbe6ab2be53858507f11f99f856846d04765ae3 (v6.7-rc1 to v6.8-rc1) CVE-2023-52462: 27113c59b6d0a587b29ae72d4ff3f832f58b0651 - ab125ed3ec1c10ccc36bc98c7a4256ad114a3dae (v5.16-rc1 to v6.8-rc1) CVE-2023-52463: f88814cc2578c121e6edef686365036db72af0ed - 0e8d2444168dd519fea501599d150e62718ed2fe (v5.8-rc7 to v6.8-rc1) CVE-2023-52464: 41003396f932d7f027725c7acebb6a7caa41dc3e - 475c58e1a471e9b873e3e39958c64a2d278275c8 (v4.12-rc1 to v6.8-rc1) +CVE-2023-52465: 8648aeb5d7b70e13264ff5f444f22081d37d4670 - 88f04bc3e737155e13caddf0ba8ed19db87f0212 (v6.5-rc1 to v6.8-rc1) +CVE-2023-52467: e15d7f2b81d2e7d93115d46fa931b366c1cdebc2 - 41673c66b3d0c09915698fec5c13b24336f18dd1 (v5.9-rc1 to v6.8-rc1) +CVE-2023-52468: dcfbb67e48a2becfce7990386e985b9c45098ee5 - 93ec4a3b76404bce01bd5c9032bef5df6feb1d62 (v6.4-rc1 to v6.8-rc1) +CVE-2023-52469: a2e73f56fa6282481927ec43aa9362c03c2e2104 - 28dd788382c43b330480f57cd34cde0840896743 (v4.2-rc1 to v6.8-rc1) +CVE-2023-52470: fa7f517cb26eb1a1a1f0baffcced39f6c3ec3337 - 7a2464fac80d42f6f8819fed97a553e9c2f43310 (v3.16-rc1 to v6.8-rc1) +CVE-2023-52471: d938a8cca88a5f02f523f95fe3d2d1214f4b4a8d - 3027e7b15b02d2d37e3f82d6b8404f6d37e3b8cf (v6.7-rc1 to v6.8-rc1) +CVE-2023-52472: 6637e11e4ad22ff03183da0dbd36d65c98b81cf7 - d872ca165cb67112f2841ef9c37d51ef7e63d1e4 (v6.5-rc1 to v6.8-rc1) +CVE-2023-52473: 3d439b1a2ad36c8b4ea151c8de25309d60d17407 - 04e6ccfc93c5a1aa1d75a537cf27e418895e20ea (v6.4-rc1 to v6.8-rc1) +CVE-2023-52474: 7be85676f1d13c77a7e0c72e04903bfd39580d4f - 00cbce5cbf88459cd1aa1d60d0f1df15477df127 (v4.14-rc1 to v6.4-rc1) +CVE-2023-52475: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - 5c15c60e7be615f05a45cd905093a54b11f461bc (v2.6.12-rc2 to v6.6-rc6) +CVE-2023-52476: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - e53899771a02f798d436655efbd9d4b46c0f9265 (v2.6.12-rc2 to v6.6-rc6) +CVE-2023-52477: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - f74a7afc224acd5e922c7a2e52244d891bbe44ee (v2.6.12-rc2 to v6.6-rc6) +CVE-2023-52478: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - dac501397b9d81e4782232c39f94f4307b137452 (v2.6.12-rc2 to v6.6-rc6) +CVE-2023-52479: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - c69813471a1ec081a0b9bf0c6bd7e8afd818afce (v2.6.12-rc2 to v6.6-rc5) +CVE-2023-52480: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - 53ff5cf89142b978b1a5ca8dc4d4425e6a09745f (v2.6.12-rc2 to v6.6-rc5) +CVE-2023-52481: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - 471470bc7052d28ce125901877dd10e4c048e513 (v2.6.12-rc2 to v6.6-rc5) +CVE-2023-52482: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - a5ef7d68cea1344cf524f04981c2b3f80bedbb0d (v2.6.12-rc2 to v6.6-rc4) +CVE-2023-52483: 889b7da23abf92faf34491df95733bda63639e32 - 5093bbfc10ab6636b32728e35813cbd79feb063c (v5.15-rc1 to v6.6-rc6) +CVE-2023-52484: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - d5afb4b47e13161b3f33904d45110f9e6463bad6 (v2.6.12-rc2 to v6.6-rc5) +CVE-2023-52485: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - 8892780834ae294bc3697c7d0e056d7743900b39 (v2.6.12-rc2 to v6.8-rc1) +CVE-2023-52486: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - cb4daf271302d71a6b9a7c01bd0b6d76febd8f0c (v2.6.12-rc2 to v6.8-rc1) +CVE-2023-52487: 9be6c21fdcf8a7ec48262bb76f78c17ac2761ac6 - d76fdd31f953ac5046555171620f2562715e9b71 (v6.5-rc1 to v6.8-rc2) +CVE-2023-52488: dfeae619d781dee61666d5551b93ba3be755a86b - dbf4ab821804df071c8b566d9813083125e6d97b (v3.16-rc1 to v6.8-rc1) +CVE-2023-52489: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - 5ec8e8ea8b7783fab150cf86404fc38cb4db8800 (v2.6.12-rc2 to v6.8-rc1) +CVE-2023-52490: 64c8902ed4418317cd416c566f896bd4a92b2efc - d1adb25df7111de83b64655a80b5a135adbded61 (v6.3-rc1 to v6.8-rc1) +CVE-2023-52491: b2f0d2724ba477d326e9d654d4db1c93e98f8b93 - 206c857dd17d4d026de85866f1b5f0969f2a109e (v4.12-rc1 to v6.8-rc1) +CVE-2023-52492: d2fb0a0438384fee08a418025f743913020033ce - f5c24d94512f1b288262beda4d3dcb9629222fc7 (v5.6-rc1 to v6.8-rc1) +CVE-2023-52493: 1d3173a3bae7039b765a0956e3e4bf846dbaacb8 - 01bd694ac2f682fb8017e16148b928482bc8fa4b (v5.7-rc1 to v6.8-rc1) +CVE-2023-52494: ec32332df7645e0ba463a08d483fe97665167071 - eff9704f5332a13b08fbdbe0f84059c9e7051d5f (v5.13-rc1 to v6.8-rc1) +CVE-2023-52495: 080b4e24852b1d5b66929f69344e6c3eeb963941 - c4fb7d2eac9ff9bfc35a2e4d40c7169a332416e0 (v6.3-rc1 to v6.8-rc1) +CVE-2023-52497: 0ffd71bcc3a03ebb3551661a36052488369c4de9 - 3c12466b6b7bf1e56f9b32c366a3d83d87afb4de (v5.3-rc1 to v6.8-rc1) +CVE-2023-52498: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - 7839d0078e0d5e6cc2fa0b0dfbee71de74f1e557 (v2.6.12-rc2 to v6.8-rc1) +CVE-2023-52499: 6f76a01173ccaa363739f913394d4e138d92d718 - f0eee815babed70a749d2496a7678be5b45b4c14 (v5.12-rc1-dontuse to v6.6-rc6) +CVE-2023-52500: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - c13e7331745852d0dd7c35eabbe181cbd5b01172 (v2.6.12-rc2 to v6.6-rc2) +CVE-2023-52501: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - 95a404bd60af6c4d9d8db01ad14fe8957ece31ca (v2.6.12-rc2 to v6.6-rc2) +CVE-2023-52502: 8f50020ed9b81ba909ce9573f9d05263cdebf502 - 31c07dffafce914c1d1543c135382a11ff058d93 (v3.6-rc1 to v6.6-rc6) +CVE-2023-52503: 757cc3e9ff1d72d014096399d6e2bf03974d9da1 - f4384b3e54ea813868bb81a861bf5b2406e15d8f (v5.6-rc1 to v6.6-rc6) +CVE-2023-52504: 6657fca06e3ffab8d0b3f9d8b397f5ee498952d7 - d35652a5fc9944784f6f50a5c979518ff8dacf61 (v4.17-rc1 to v6.6-rc6) +CVE-2023-52505: 8f73b37cf3fbda67ea1e579c3b5785da4e7aa2e3 - 139ad1143151a07be93bf741d4ea7c89e59f89ce (v5.18-rc1 to v6.6-rc6) +CVE-2023-52506: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - b795fb9f5861ee256070d59e33130980a01fadd7 (v2.6.12-rc2 to v6.6-rc3) +CVE-2023-52507: 6a2968aaf50c7a22fced77a5e24aa636281efca8 - 354a6e707e29cb0c007176ee5b8db8be7bd2dee0 (v3.2-rc1 to v6.6-rc6) +CVE-2023-52508: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - 8ae5b3a685dc59a8cf7ccfe0e850999ba9727a3c (v2.6.12-rc2 to v6.6-rc2) +CVE-2023-52509: (n/a) - 3971442870713de527684398416970cf025b4f89 (unk to v6.6-rc6) +CVE-2023-52510: ded845a781a578dfb0b5b2c138e5a067aa3b1242 - f990874b1c98fe8e57ee9385669f501822979258 (v4.12-rc1 to v6.6-rc6) +CVE-2023-52511: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - 171f8a49f212e87a8b04087568e1b3d132e36a18 (v2.6.12-rc2 to v6.6-rc1) +CVE-2023-52512: a1d1e0e3d80a870cc37a6c064994b89e963d2b58 - 87d315a34133edcb29c4cadbf196ec6c30dfd47b (v5.18-rc1 to v6.6-rc6) +CVE-2023-52513: 6c52fdc244b5ccc468006fd65a504d4ee33743c7 - 53a3f777049771496f791504e7dc8ef017cba590 (v5.3-rc1 to v6.6-rc5) +CVE-2023-52515: d8536670916a685df116b5c2cb256573fd25e4e3 - e193b7955dfad68035b983a0011f4ef3590c85eb (v3.7-rc1 to v6.6-rc5) +CVE-2023-52516: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - fb5a4315591dae307a65fc246ca80b5159d296e1 (v2.6.12-rc2 to v6.6-rc1) +CVE-2023-52517: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - 1f11f4202caf5710204d334fe63392052783876d (v2.6.12-rc2 to v6.6-rc1) +CVE-2023-52518: 8961987f3f5fa2f2618e72304d013c8dd5e604a6 - b938790e70540bf4f2e653dcd74b232494d06c8f (v5.16-rc1 to v6.6-rc5) +CVE-2023-52519: (n/a) - 8f02139ad9a7e6e5c05712f8c1501eebed8eacfd (unk to v6.6-rc5) +CVE-2023-52520: 1bcad8e510b27ad843315ab2c27ccf459e3acded - 528ab3e605cabf2f9c9bd5944d3bfe15f6e94f81 (v5.14-rc1 to v6.6-rc5) +CVE-2023-52522: 767e97e1e0db0d0f3152cd2f3bd3403596aedbad - 25563b581ba3a1f263a00e8c9a97f5e7363be6fd (v2.6.37-rc1 to v6.6-rc5) +CVE-2023-52523: 122e6c79efe1c25816118aca9cfabe54e99c2432 - b80e31baa43614e086a9d29dc1151932b1bd7fc5 (v5.13-rc1 to v6.6-rc5) +CVE-2023-52524: 6709d4b7bc2e079241fdef15d1160581c5261c10 - dfc7f7a988dad34c3bf4c053124fb26aa6c5f916 (v6.5-rc1 to v6.6-rc5) +CVE-2023-52525: 11958528161731c58e105b501ed60b83a91ea941 - aef7a0300047e7b4707ea0411dc9597cba108fc8 (v6.6-rc1 to v6.6-rc5) +CVE-2023-52526: 5c2a64252c5dc4cfe78e5b2a531c118894e3d155 - 75a5221630fe5aa3fedba7a06be618db0f79ba1e (v6.1-rc1 to v6.6-rc5) +CVE-2023-52527: a32e0eec7042b21ccb52896cf715e3e2641fed93 - 9d4c75800f61e5d75c1659ba201b6c0c7ead3070 (v3.5-rc1 to v6.6-rc5) +CVE-2023-52528: d0cad871703b898a442e4049c532ec39168e5b57 - e9c65989920f7c28775ec4e0c11b483910fb67b8 (v2.6.34-rc2 to v6.6-rc5) +CVE-2023-52529: fb1a79a6b6e1223ddb18f12aa35e36f832da2290 - e1cd4004cde7c9b694bbdd8def0e02288ee58c74 (v5.14-rc1 to v6.6-rc5) +CVE-2023-52530: fdf7cb4185b60c68e1a75e61691c4afdc15dea0e - 31db78a4923ef5e2008f2eed321811ca79e7f71b (v4.14-rc6 to v6.6-rc5) +CVE-2023-52531: 8ca151b568b67a7b72dcfc6ee6ea7c107ddd795c - 8ba438ef3cacc4808a63ed0ce24d4f0942cfe55d (v3.9-rc1 to v6.6-rc5) +CVE-2023-52532: (n/a) - b2b000069a4c307b09548dc2243f31f3ca0eac9c (unk to v6.6-rc5) +CVE-2023-52559: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - 59df44bfb0ca4c3ee1f1c3c5d0ee8e314844799e (v2.6.12-rc2 to v6.6-rc5) +CVE-2023-52560: 9f86d624292c238203b3687cdb870a2cde1a6f9b - 45120b15743fa7c0aa53d5db6dfb4c8f87be4abd (v5.16-rc5 to v6.6-rc4) +CVE-2023-52561: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - 110e70fccce4f22b53986ae797d665ffb1950aa6 (v2.6.12-rc2 to v6.6-rc1) +CVE-2023-52562: 0495e337b7039191dfce6e03f5f830454b1fae6b - 46a9ea6681907a3be6b6b0d43776dccc62cad6cf (v6.0-rc4 to v6.6-rc4) +CVE-2023-52563: (n/a) - 099f0af9d98231bb74956ce92508e87cbcb896be (unk to v6.6-rc3) +CVE-2023-52564: 9b9c8195f3f0d74a826077fc1c01b9ee74907239 - 29346e217b8ab8a52889b88f00b268278d6b7668 (v6.5-rc4 to v6.6-rc4) +CVE-2023-52565: (n/a) - 41ebaa5e0eebea4c3bac96b72f9f8ae0d77c0bdb (unk to v6.6-rc3) +CVE-2023-52566: (n/a) - 7ee29facd8a9c5a26079148e36bcf07141b3a6bc (unk to v6.6-rc4) +CVE-2023-52567: 0ba9e3a13c6adfa99e32b2576d20820ab10ad48a - cce7fc8b29961b64fadb1ce398dc5ff32a79643b (v6.4-rc1 to v6.6-rc4) +CVE-2023-52568: (n/a) - c6c2adcba50c2622ed25ba5d5e7f05f584711358 (unk to v6.6-rc4) +CVE-2023-52569: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - 2c58c3931ede7cd08cbecf1f1a4acaf0a04a41a9 (v2.6.12-rc2 to v6.6-rc2) +CVE-2023-52570: da44c340c4fe9d9653ae84fa6a60f406bafcffce - c777b11d34e0f47dbbc4b018ef65ad030f2b283a (v6.1-rc1 to v6.6-rc4) +CVE-2023-52571: (n/a) - 488ef44c068e79752dba8eda0b75f524f111a695 (unk to v6.6-rc4) +CVE-2023-52572: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - d527f51331cace562393a8038d870b3e9916686f (v2.6.12-rc2 to v6.6-rc3) +CVE-2023-52573: fd261ce6a30e01ad67c416e2c67e263024b3a6f9 - f1d95df0f31048f1c59092648997686e3f7d9478 (v5.1-rc1 to v6.6-rc3) +CVE-2023-52574: (n/a) - 492032760127251e5540a5716a70996bacf2a3fd (unk to v6.6-rc3) +CVE-2023-52575: fb3bd914b3ec28f5fb697ac55c4846ac2d542855 - 01b057b2f4cc2d905a0bd92195657dbd9a7005ab (v6.5-rc6 to v6.6-rc3) +CVE-2023-52576: fee3ff99bc67604fba77f19da0106f3ec52b1956 - 34cf99c250d5cd2530b93a57b0de31d3aaf8685b (v5.13-rc1 to v6.6-rc3) +CVE-2023-52577: 977ad86c2a1bcaf58f01ab98df5cc145083c489c - 6af289746a636f71f4c0535a9801774118486c7a (v6.6-rc1 to v6.6-rc3) +CVE-2023-52578: 1c29fc4989bc2a3838b2837adc12b8aeb0feeede - 44bdb313da57322c9b3c108eb66981c6ec6509f4 (v2.6.17-rc4 to v6.6-rc3) +CVE-2023-52580: 4f1cc51f34886d645cd3e8fc2915cc9b7a55c3b6 - 75ad80ed88a182ab2ad5513e448cf07b403af5c3 (v5.12-rc1-dontuse to v6.6-rc3) +CVE-2023-52581: 5f68718b34a531a556f2f50300ead2862278da26 - cf5000a7787cbc10341091d37245a42c119d26c5 (v6.5-rc6 to v6.6-rc3) +CVE-2023-52582: 3d3c95046742e4eebaa4b891b0b01cbbed94ebbd - df1c357f25d808e30b216188330e708e09e1a412 (v5.13-rc1 to v6.6-rc3) +CVE-2023-52583: (n/a) - b493ad718b1f0357394d2cdecbf00a44a36fa085 (unk to v6.8-rc1) +CVE-2023-52584: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - e821d50ab5b956ed0effa49faaf29912fd4106d9 (v2.6.12-rc2 to v6.8-rc1) +CVE-2023-52585: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - b8d55a90fd55b767c25687747e2b24abd1ef8680 (v2.6.12-rc2 to v6.8-rc1) +CVE-2023-52586: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - 45284ff733e4caf6c118aae5131eb7e7cf3eea5a (v2.6.12-rc2 to v6.8-rc1) +CVE-2023-52587: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - 4f973e211b3b1c6d36f7c6a19239d258856749f9 (v2.6.12-rc2 to v6.8-rc1) +CVE-2023-52588: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - 4961acdd65c956e97c1a000c82d91a8c1cdbe44b (v2.6.12-rc2 to v6.8-rc1) +CVE-2023-52589: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - 870565f063a58576e8a4529f122cac4325c6b395 (v2.6.12-rc2 to v6.8-rc1) +CVE-2023-52590: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - 9d618d19b29c2943527e3a43da0a35aea91062fc (v2.6.12-rc2 to v6.8-rc1) +CVE-2023-52591: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - 49db9b1b86a82448dfaf3fcfefcf678dee56c8ed (v2.6.12-rc2 to v6.8-rc1) +CVE-2023-52593: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - fe0a7776d4d19e613bb8dd80fe2d78ae49e8b49d (v2.6.12-rc2 to v6.8-rc1) +CVE-2023-52594: 27876a29de221186c9d5883e5fe5f6da18ef9a45 - 2adc886244dff60f948497b59affb6c6ebb3c348 (v3.0-rc1 to v6.8-rc1) +CVE-2023-52595: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - a11d965a218f0cd95b13fe44d0bcd8a20ce134a8 (v2.6.12-rc2 to v6.8-rc1) +CVE-2023-52596: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - 315552310c7de92baea4e570967066569937a843 (v2.6.12-rc2 to v6.8-rc1) +CVE-2023-52597: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - b988b1bb0053c0dcd26187d29ef07566a565cf55 (v2.6.12-rc2 to v6.8-rc1) +CVE-2023-52598: (n/a) - 8b13601d19c541158a6e18b278c00ba69ae37829 (unk to v6.8-rc1) +CVE-2023-52599: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - 49f9637aafa6e63ba686c13cb8549bf5e6920402 (v2.6.12-rc2 to v6.8-rc1) +CVE-2023-52600: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - e0e1958f4c365e380b17ccb35617345b31ef7bf3 (v2.6.12-rc2 to v6.8-rc1) +CVE-2023-52601: (n/a) - 74ecdda68242b174920fe7c6133a856fb7d8559b (unk to v6.8-rc1) +CVE-2023-52602: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - fa5492ee89463a7590a1449358002ff7ef63529f (v2.6.12-rc2 to v6.8-rc1) +CVE-2023-52603: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - 27e56f59bab5ddafbcfe69ad7a4a6ea1279c1b16 (v2.6.12-rc2 to v6.8-rc1) +CVE-2023-52604: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - 9862ec7ac1cbc6eb5ee4a045b5d5b8edbb2f7e68 (v2.6.12-rc2 to v6.8-rc1) +CVE-2023-52606: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - 8f9abaa6d7de0a70fc68acaedce290c1f96e2e59 (v2.6.12-rc2 to v6.8-rc1) +CVE-2023-52607: a0668cdc154e54bf0c85182e0535eea237d53146 - f46c8a75263f97bda13c739ba1c90aced0d3b071 (v2.6.33-rc1 to v6.8-rc1) +CVE-2023-52608: 5c8a47a5a91d4d6e185f758d61997613d9c5d6ac - 437a310b22244d4e0b78665c3042e5d1c0f45306 (v5.7-rc1 to v6.8-rc2) +CVE-2023-52609: (n/a) - 9a9ab0d963621d9d12199df9817e66982582d5a5 (unk to v6.8-rc1) +CVE-2023-52610: b57dc7c13ea90e09ae15f821d2583fa0231b4935 - 3f14b377d01d8357eba032b4cabc8c1149b458b6 (v5.3-rc1 to v6.8-rc1) +CVE-2023-52611: 65371a3f14e73979958aea0db1e3bb456a296149 - 00384f565a91c08c4bedae167f749b093d10e3fe (v6.4-rc1 to v6.8-rc1) +CVE-2023-52612: 1ab53a77b772bf7369464a0e4fa6fd6499acf8f1 - 744e1885922a9943458954cfea917b31064b4131 (v4.10-rc1 to v6.8-rc1) +CVE-2023-52613: e7e3a7c35791fe7a70997883fb8ada5866a40f4d - 15ef92e9c41124ee9d88b01208364f3fe1f45f84 (v6.6-rc1 to v6.8-rc1) +CVE-2023-52614: (n/a) - 08e23d05fa6dc4fc13da0ccf09defdd4bbc92ff4 (unk to v6.8-rc1) +CVE-2023-52615: 9996508b3353063f2d6c48c1a28a84543d72d70b - 78aafb3884f6bc6636efcc1760c891c8500b9922 (v2.6.33-rc1 to v6.8-rc1) +CVE-2023-52616: d58bb7e55a8a65894cc02f27c3e2bf9403e7c40f - ba3c5574203034781ac4231acf117da917efcd2a (v5.10-rc1 to v6.8-rc1) +CVE-2023-52617: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - df25461119d987b8c81d232cfe4411e91dcabe66 (v2.6.12-rc2 to v6.8-rc1) +CVE-2023-52618: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - 9e4bf6a08d1e127bcc4bd72557f2dfafc6bc7f41 (v2.6.12-rc2 to v6.8-rc1) +CVE-2023-52619: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - d49270a04623ce3c0afddbf3e984cb245aa48e9c (v2.6.12-rc2 to v6.8-rc1) +CVE-2023-52620: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - e26d3009efda338f19016df4175f354a9bd0a4ab (v2.6.12-rc2 to v6.4) +CVE-2023-52621: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - 169410eba271afc9f0fb476d996795aa26770c6d (v2.6.12-rc2 to v6.8-rc1) +CVE-2023-52622: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - 5d1935ac02ca5aee364a449a35e2977ea84509b0 (v2.6.12-rc2 to v6.8-rc1) +CVE-2023-52623: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - 31b62908693c90d4d07db597e685d9f25a120073 (v2.6.12-rc2 to v6.8-rc1) +CVE-2023-52624: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - e5ffd1263dd5b44929c676171802e7b6af483f21 (v2.6.12-rc2 to v6.8-rc1) +CVE-2023-52625: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - 8e57c06bf4b0f51a4d6958e15e1a99c9520d00fa (v2.6.12-rc2 to v6.8-rc1) +CVE-2023-52626: 92214be5979c0961a471b7eaaaeacab41bdf456c - 3876638b2c7ebb2c9d181de1191db0de8cac143a (v6.7-rc2 to v6.8-rc2) +CVE-2023-52627: ca69300173b642ba64118200172171ea5967b6c5 - 020e71c7ffc25dfe29ed9be6c2d39af7bd7f661f (v5.6-rc1 to v6.8-rc1) +CVE-2023-52628: 49499c3e6e18b7677a63316f3ff54a16533dc28f - fd94d9dadee58e09b49075240fe83423eb1dcd36 (v4.1-rc1 to v6.6-rc1) +CVE-2023-52629: 9f5e8eee5cfe1328660c71812d87c2a67bda389f - 246f80a0b17f8f582b2c0996db02998239057c65 (v2.6.20-rc1 to v6.6-rc1) +CVE-2023-52630: 5160a5a53c0c4ae3708959d9465ea43ad5d90542 - 2a427b49d02995ea4a6ff93a1432c40fa4d36821 (v5.10-rc1 to v6.8-rc4) +CVE-2023-52631: be71b5cba2e6485e8959da7a9f9a44461a1bb074 - b2dd7b953c25ffd5912dda17e980e7168bebcf6c (v5.15-rc1 to v6.8-rc4) +CVE-2023-52632: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - 2a9de42e8d3c82c6990d226198602be44f43f340 (v2.6.12-rc2 to v6.8-rc1) +CVE-2023-52633: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - abe4eaa8618bb36c2b33e9cdde0499296a23448c (v2.6.12-rc2 to v6.8-rc1) +CVE-2023-52634: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - 2ce156482a6fef349d2eba98e5070c412d3af662 (v2.6.12-rc2 to v6.8-rc1) +CVE-2023-52635: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - aed5ed595960c6d301dcd4ed31aeaa7a8054c0c6 (v2.6.12-rc2 to v6.8-rc1) +CVE-2023-52636: d396f89db39a2f259e2125ca43b4c31bb65afcad - 8e46a2d068c92a905d01cbb018b00d66991585ab (v6.6-rc1 to v6.8-rc4) +CVE-2023-52637: 9d71dd0c70099914fcd063135da3c580865e924c - efe7cf828039aedb297c1f9920b638fffee6aabc (v5.4-rc1 to v6.8-rc5) +CVE-2023-52638: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - 6cdedc18ba7b9dacc36466e27e3267d201948c8d (v2.6.12-rc2 to v6.8-rc5) +CVE-2023-52639: (n/a) - fe752331d4b361d43cfd0b89534b4b2176057c32 (unk to v6.8-rc4) +CVE-2023-52640: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - 731ab1f9828800df871c5a7ab9ffe965317d3f15 (v2.6.12-rc2 to v6.8-rc4) +CVE-2023-52641: (n/a) - aaab47f204aaf47838241d57bf8662c8840de60a (unk to v6.8-rc4) CVE-2023-5345: a4e430c8c8ba96be8c6ec4f2eb108bb8bcbee069 - e6e43b8aa7cd3c3af686caf0c2e11819a886d705 (v6.1-rc1 to v6.6-rc4) CVE-2023-5633: a950b989ea29ab3b38ea7f6e3d2540700a3c54e8 - 91398b413d03660fd5828f7b4abc64e884b98069 (v6.2 to v6.6-rc6) CVE-2023-5717: fa8c269353d560b7c28119ad7617029f92e40b15 - 32671e3799ca2e4590773fd0e63aaa4229e50c06 (v4.4-rc1 to v6.6-rc7) @@ -2611,11 +3043,11 @@ CVE-2023-6176: 635d9398178659d8ddba79dd061f9451cec0b4d1 - cfaa80c91f6f99b9342b65 CVE-2023-6200: 3dec89b14d37ee635e772636dad3f09f78f1ab87 - dade3f6a1e4e35a5ae916d5e78b3229ec34c78ec (v6.6-rc1 to v6.7-rc7) CVE-2023-6238: 855b7717f44b13e0990aa5ad36bbf9aa35051516 - (n/a) (v6.2-rc1 to unk) CVE-2023-6240: (n/a) - (n/a) (unk to unk) -CVE-2023-6270: (n/a) - (n/a) (unk to unk) -CVE-2023-6356: (n/a) - (n/a) (unk to unk) +CVE-2023-6270: (n/a) - f98364e926626c678fb4b9004b75cacf92ff0662 (unk to v6.9-rc1) +CVE-2023-6356: (n/a) - efa56305908ba20de2104f1b8508c6a7401833be (unk to v6.8-rc1) CVE-2023-6531: 0091bfc81741b8d3aeb3b7ab8636f911b2de6e80 - 705318a99a138c29a512a72c3e0043b3cd7f55f4 (v6.1-rc1 to v6.7-rc5) CVE-2023-6535: (n/a) - (n/a) (unk to unk) -CVE-2023-6536: (n/a) - (n/a) (unk to unk) +CVE-2023-6536: (n/a) - 0849a5441358cef02586fb2d60f707c0db195628 (unk to v6.8-rc1) CVE-2023-6546: e1eaea46bb4020b38a141b84f88565d4603f8dd0 - 3c4f8333b582487a2d1e02171f1465531cde53e3 (v2.6.35-rc1 to v6.5-rc7) CVE-2023-6560: 2b188cc1bb857a9d4701ae59aa7768b5124e262e - 820d070feb668aab5bc9413c285a1dda2a70e076 (v5.1-rc1 to v6.7-rc4) CVE-2023-6606: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - b35858b3786ddbb56e1c35138ba25d6adf8d0bef (v2.6.12-rc2 to v6.7-rc7) @@ -2626,7 +3058,7 @@ CVE-2023-6817: 3c4287f62044a90e73a561aa05fc46e62da173da - 317eb9685095678f2c9f5a CVE-2023-6915: 72dba584b695d8bc8c1a50ed54ad4cba7c62314d - af73483f4e8b6f5c68c9aa63257bdd929a9c194a (v2.6.23-rc1 to v6.7-rc7) CVE-2023-6931: a723968c0ed36db676478c3d26078f13484fe01c - 382c27f4ed28f803b1f1473ac2d8db0afc795a1b (v4.3-rc4 to v6.7-rc5) CVE-2023-6932: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - e2b706c691905fe78468c361aaabc719d0a496f1 (v2.6.12-rc2 to v6.7-rc4) -CVE-2023-7042: 5e3dd157d7e70f0e3cea3f2573ed69fb156a19d5 - (n/a) (v3.11-rc1 to unk) +CVE-2023-7042: 5e3dd157d7e70f0e3cea3f2573ed69fb156a19d5 - ad25ee36f00172f7d53242dc77c69fff7ced0755 (v3.11-rc1 to v6.9-rc1) CVE-2023-7192: 7d367e06688dc7a2cc98c2ace04e1296e1d987e2 - ac4893980bbe79ce383daf9a0885666a30fe4c83 (v3.3-rc6 to v6.3-rc1) CVE-2024-0193: 5f68718b34a531a556f2f50300ead2862278da26 - 7315dc1e122c85ffdfc8defffbb8f8b616c2eb1a (v6.5-rc6 to v6.7) CVE-2024-0340: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - 4d8df0f5f79f747d75a7d356d9b9ea40a4e4c8a9 (v2.6.12-rc2 to v6.4-rc6) @@ -2641,27 +3073,28 @@ CVE-2024-0639: 34e5b01186858b36c4d7c87e1a025071e8e2401f - 6feb37b3b06e9049e20dcf CVE-2024-0641: fc1b6d6de2208774efd2a20bf0daddb02d18b1e0 - 08e50cf071847323414df0835109b6f3560d44f5 (v5.5-rc1 to v6.6-rc5) CVE-2024-0646: d829e9c4112b52f4f00195900fd4c685f61365ab - c5a595000e2677e865a39f249c056bc05d6e55fd (v4.20-rc1 to v6.7-rc5) CVE-2024-0775: 7c319d328505b7781b65238ae9f53293b5ee0ca8 - 4c0b4818b1f636bc96359f7817a2d8bab6370162 (v3.6-rc1 to v6.4-rc2) -CVE-2024-0841: 32021982a324dce93b4ae00c06213bf45fb319c8 - (n/a) (v5.1-rc1 to unk) +CVE-2024-0841: 32021982a324dce93b4ae00c06213bf45fb319c8 - 79d72c68c58784a3e1cd2378669d51bfd0cb7498 (v5.1-rc1 to v6.8-rc4) CVE-2024-1085: aaa31047a6d25da0fa101da1ed544e1247949b40 - b1db244ffd041a49ecc9618e8feb6b5c1afcdaa7 (v5.13-rc1 to v6.8-rc1) CVE-2024-1086: e0abdadcc6e113ed2e22c85b350074487095875b - f342de4e2f33e0e39165d8639387aa6c19dff660 (v3.15-rc1 to v6.8-rc2) CVE-2024-1151: 798c166173ffb50128993641fcf791df51bed48e - 6e2f90d31fe09f2b852de25125ca875aabd81367 (v4.12-rc1 to v6.8-rc5) CVE-2024-1312: 6c21e066f9256ea1df6f88768f6ae1080b7cf509 - 657b5146955eba331e01b9a6ae89ce2e716ba306 (CVE Caused by Backporting) CVE-2024-21803: (n/a) - (n/a) (unk to unk) -CVE-2024-22099: (n/a) - (n/a) (unk to unk) +CVE-2024-2193: (n/a) - (n/a) (unk to unk) +CVE-2024-22099: (n/a) - 2535b848fa0f42ddff3e5255cf5e742c9b77bb26 (unk to v6.8-rc7) CVE-2024-22386: (n/a) - (n/a) (unk to unk) CVE-2024-22705: e2f34481b24db2fd634b5edb0a5bd0e4d38cc6e9 - d10c77873ba1e9e6b91905018e29e196fd5f863d (v5.15-rc1 to v6.7-rc8) -CVE-2024-23196: (n/a) - (n/a) (unk to unk) -CVE-2024-23307: edbe83ab4c27ea6669eb57adb5ed7eaec1118ceb - (n/a) (v4.1-rc1 to unk) +CVE-2024-23196: (n/a) - 1f4a08fed450db87fbb5ff5105354158bdbe1a22 (unk to v6.5-rc1) +CVE-2024-23307: edbe83ab4c27ea6669eb57adb5ed7eaec1118ceb - dfd2bf436709b2bccb78c2dda550dde93700efa7 (v4.1-rc1 to v6.9-rc1) CVE-2024-23848: (n/a) - (n/a) (unk to unk) CVE-2024-23849: 3289025aedc018f8fd9d0e37fb9efa0c6d531ffa - 13e788deb7348cc88df34bed736c3b3b9927ea52 (v4.11-rc1 to v6.8-rc2) CVE-2024-23850: 2dfb1e43f57dd3aeaa66f7cf05d068db2d4c8788 - e03ee2fe873eb68c1f9ba5112fee70303ebf9dfb (v5.9-rc1 to v6.8-rc4) -CVE-2024-23851: (n/a) - bd504bcfec41a503b32054da5472904b404341a4 (unk to v6.8-rc3) +CVE-2024-23851: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - bd504bcfec41a503b32054da5472904b404341a4 (v2.6.12-rc2 to v6.8-rc3) CVE-2024-24855: ecfd03c6a99ad98fea5cb75ec83cd9945adff8d9 - 0e881c0a4b6146b7e856735226208f48251facd8 (v2.6.34-rc1 to v6.5-rc2) CVE-2024-24857: 31ad169148df2252a774c73c504aff43bfa4b656 - (n/a) (v3.16-rc1 to unk) CVE-2024-24858: 4e70c7e71c5f9cf11013628ab5a0ced449b1c7b2 - (n/a) (v3.13-rc1 to unk) CVE-2024-24859: 04837f6447c7f3ef114cda1ad761822dedbff8cf - (n/a) (v2.6.18-rc1 to unk) CVE-2024-24860: 2fd36558f02c0606768929fc77671716680d01c2 - da9065caa594d19b26e1a030fd0cc27bd365d685 (v4.2-rc1 to v6.8-rc1) -CVE-2024-24861: (n/a) - (n/a) (unk to unk) +CVE-2024-24861: (n/a) - 36d503ad547d1c75758a6fcdbec2806f1b6aeb41 (unk to v6.9-rc1) CVE-2024-24864: (n/a) - (n/a) (unk to unk) CVE-2024-25739: 801c135ce73d5df1caf3eca35b66a10824ae0707 - (n/a) (v2.6.22-rc1 to unk) CVE-2024-25740: (n/a) - (n/a) (unk to unk) @@ -2670,14 +3103,14 @@ CVE-2024-25744: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - b82a8dbd3d2f4563156f7 CVE-2024-26581: f718863aca469a109895cb855e6b81fff4827d71 - 60c0c230c6f046da536d3df8b39a20b9a9fd6af0 (v6.5-rc4 to v6.8-rc4) CVE-2024-26582: fd31f3996af2 - 32b55c5ff9103b8508c1e04bfa5a08c64e7a925f (v6.0-rc1 to v6.8-rc5) CVE-2024-26583: 0cada33241d9de205522e3858b18e506ca5cce2c - aec7961916f3f9e88766e2688992da6980f11b8d (v5.7 to v6.8-rc5) -CVE-2024-26584: (n/a) - 8590541473188741055d27b955db0777569438e3 (unk to v6.8-rc5) +CVE-2024-26584: a54667f6728c - 8590541473188741055d27b955db0777569438e3 (v4.16-rc1 to v6.8-rc5) CVE-2024-26585: a42055e8d2c3 - e01e3934a1b2d122919f73bc6ddbe1cdafc4bbdb (v4.20-rc1 to v6.8-rc5) CVE-2024-26586: c3ab435466d5 - 483ae90d8f976f8339cf81066312e1329f2d3706 (v4.19-rc1 to v6.8-rc1) -CVE-2024-26587: (n/a) - ea937f77208323d35ffe2f8d8fc81b00118bfcda (unk to v6.8-rc1) -CVE-2024-26588: (n/a) - 36a87385e31c9343af9a4756598e704741250a67 (unk to v6.8-rc1) +CVE-2024-26587: b63e78fca889e07931ec8f259701718a24e5052e - ea937f77208323d35ffe2f8d8fc81b00118bfcda (v6.6-rc1 to v6.8-rc1) +CVE-2024-26588: bbfddb904df6f82a5948687a2d57766216b9bc0f - 36a87385e31c9343af9a4756598e704741250a67 (v6.1-rc3 to v6.8-rc1) CVE-2024-26589: d58e468b1112 - 22c7fa171a02d310e3a3f6ed46a698ca8a0060ed (v4.20-rc1 to v6.8-rc1) CVE-2024-26590: 8f89926290c4 - 118a8cf504d7dfa519562d000f423ee3ca75d2c4 (v5.16-rc1 to v6.8-rc1) -CVE-2024-26591: (n/a) - 715d82ba636cb3629a6e18a33bb9dbe53f9936ee (unk to v6.8-rc1) +CVE-2024-26591: f3a95075549e0e5c36db922caf86847db7a35403 - 715d82ba636cb3629a6e18a33bb9dbe53f9936ee (v5.13-rc1 to v6.8-rc1) CVE-2024-26592: (n/a) - 38d20c62903d669693a1869aa68c4dd5674e2544 (unk to v6.8-rc1) CVE-2024-26593: 315cd67c9453 - c1c9d0f6f7f1dbf29db996bd8e166242843a5f21 (v5.3-rc1 to v6.8-rc5) CVE-2024-26594: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - 92e470163d96df8db6c4fa0f484e4a229edb903d (v2.6.12-rc2 to v6.8-rc1) @@ -2686,3 +3119,208 @@ CVE-2024-26596: 4c3f80d22b2eca911143ce656fa45c4699ff5bf4 - 844f104790bd69c2e4dbb CVE-2024-26597: 14452ca3b5ce304fb2fea96dbc9ca1e4e7978551 - b33fb5b801c6db408b774a68e7c8722796b59ecc (v4.17-rc1 to v6.8-rc1) CVE-2024-26598: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - ad362fe07fecf0aba839ff2cc59a3617bd42c33f (v2.6.12-rc2 to v6.8-rc1) CVE-2024-26599: 3ab7b6ac5d829e60c3b89d415811ff1c9f358c8e - a297d07b9a1e4fb8cda25a4a2363a507d294b7c9 (v5.17-rc1 to v6.8-rc1) +CVE-2024-26600: 657b306a7bdfca4ae1514b533a0e7c3c6d26dbc6 - 7104ba0f1958adb250319e68a15eff89ec4fd36d (v3.7-rc1 to v6.8-rc3) +CVE-2024-26601: 6bd97bf273bdb4944904e57480f6545bca48ad77 - c9b528c35795b711331ed36dc3dbee90d5812d4e (v5.11-rc1 to v6.8-rc3) +CVE-2024-26602: 22e4ebb975822833b083533035233d128b30e98f - 944d5fe50f3f03daacfea16300e656a1691c4a23 (v4.14-rc1 to v6.8-rc6) +CVE-2024-26603: fcb3635f5018e53024c6be3c3213737f469f74ff - d877550eaf2dc9090d782864c96939397a3c6835 (v5.14-rc1 to v6.8-rc4) +CVE-2024-26604: 1b28cb81dab7c1eedc6034206f4e8d644046ad31 - 3ca8fbabcceb8bfe44f7f50640092fd8f1de375c (v6.6-rc1 to v6.8-rc5) +CVE-2024-26605: f93e71aea6c60ebff8adbd8941e678302d377869 - 1e560864159d002b453da42bd2c13a1805515a20 (v6.7 to v6.8-rc3) +CVE-2024-26606: 457b9a6f09f011ebcb9b52cc203a6331a6fc2de7 - 97830f3c3088638ff90b20dfba2eb4d487bf14d7 (v2.6.29-rc1 to v6.8-rc3) +CVE-2024-26607: 21d808405fe49028036932dd969920f4fee4f481 - 08ac6f132dd77e40f786d8af51140c96c6d739c9 (v5.0-rc1 to v6.8-rc2) +CVE-2024-26608: 0626e6641f6b467447c81dd7678a69c66f7746cf - ebeae8adf89d9a82359f6659b1663d09beec2faa (v5.15-rc1 to v6.8-rc2) +CVE-2024-26610: cf29c5b66b9f83939367d90679eb68cdfa2f0356 - cf4a0d840ecc72fcf16198d5e9c505ab7d5a5e4d (v5.5-rc1 to v6.8-rc2) +CVE-2024-26611: 24ea50127ecf0efe819c1f6230add27abc6ca9d9 - c5114710c8ce86b8317e9b448f4fd15c711c2a82 (v6.6-rc1 to v6.8-rc2) +CVE-2024-26612: 9549332df4ed4e761a1d41c83f2c25d28bb22431 - 3be0b3ed1d76c6703b9ee482b55f7e01c369cc68 (v5.17-rc1 to v6.8-rc2) +CVE-2024-26614: fff1f3001cc58b5064a0f1154a7ac09b76f29c44 - 198bc90e0e734e5f98c3d2833e8390cac3df61b2 (v4.4-rc1 to v6.8-rc2) +CVE-2024-26615: 4b1b7d3b30a6d32ac1a1dcede284e76ef8a8542d - dbc153fd3c142909e564bb256da087e13fbf239c (v4.19-rc1 to v6.8-rc2) +CVE-2024-26616: e02ee89baa66c40e1002cf8b09141fce7265e0f5 - f546c4282673497a06ecb6190b50ae7f6c85b02f (v6.4-rc1 to v6.8-rc2) +CVE-2024-26617: 52526ca7fdb905a768a93f8faa418e9b988fc34b - 4cccb6221cae6d020270606b9e52b1678fc8b71a (v6.7-rc1 to v6.8-rc1) +CVE-2024-26618: 5d0a8d2fba50e9c07cde4aad7fba28c008b07a5b - dc7eb8755797ed41a0d1b5c0c39df3c8f401b3d9 (v6.5-rc7 to v6.8-rc1) +CVE-2024-26619: d8792a5734b0f3e58b898c2e2f910bfac48e9ee3 - 78996eee79ebdfe8b6f0e54cb6dcc792d5129291 (v6.7-rc5 to v6.8-rc1) +CVE-2024-26620: 48cae940c31d2407d860d87c41d5f9871c0521db - 850fb7fa8c684a4c6bf0e4b6978f4ddcc5d43d11 (v6.0-rc1 to v6.8-rc1) +CVE-2024-26621: efa7df3e3bb5da8e6abbe37727417f32a37fba47 - 4ef9ad19e17676b9ef071309bc62020e2373705d (v6.7 to v6.8-rc3) +CVE-2024-26622: (n/a) - 2f03fc340cac9ea1dc63cbf8c93dd2eb0f227815 (unk to v6.8-rc7) +CVE-2024-26623: (n/a) - 7e82a8745b951b1e794cc780d46f3fbee5e93447 (unk to v6.8-rc3) +CVE-2024-26625: (n/a) - aa2b2eb3934859904c287bf5434647ba72e14c1c (unk to v6.8-rc3) +CVE-2024-26626: bb7403655b3c3eb245d0ee330047cd3e20b3c4af - e622502c310f1069fd9f41cd38210553115f610a (v6.8-rc1 to v6.8-rc3) +CVE-2024-26627: (n/a) - 4373534a9850627a2695317944898eb1283a2db0 (unk to v6.8-rc3) +CVE-2024-26629: ce3c4ad7f4ce5db7b4f08a1e237d8dd94b39180b - edcf9725150e42beeca42d085149f4c88fa97afd (v5.19-rc1 to v6.8-rc2) +CVE-2024-26630: cf264e1329fb0307e044f7675849f9f38b44c11a - 3a75cb05d53f4a6823a32deb078de1366954a804 (v6.5-rc1 to v6.8-rc7) +CVE-2024-26631: 2d9a93b4902be6a5504b5941dd15e9cd776aadca - 2e7ef287f07c74985f1bf2858bedc62bd9ebf155 (v5.13-rc1 to v6.8-rc1) +CVE-2024-26632: 640d1930bef4f87ec8d8d2b05f0f6edc1dfcf662 - 7bed6f3d08b7af27b7015da8dc3acf2b9c1f21d7 (v5.17-rc1 to v6.8-rc1) +CVE-2024-26633: (n/a) - d375b98e0248980681e5e56b712026174d617198 (unk to v6.8-rc1) +CVE-2024-26634: 7663d522099ecc464512164e660bc771b2ff7b64 - d09486a04f5da0a812c26217213b89a3b1acf836 (v6.6-rc7 to v6.8-rc2) +CVE-2024-26635: (n/a) - e3f9bed9bee261e3347131764e42aeedf1ffea61 (unk to v6.8-rc2) +CVE-2024-26636: (n/a) - dad555c816a50c6a6a8a86be1f9177673918c647 (unk to v6.8-rc2) +CVE-2024-26637: 0a3d898ee9a8303d5b3982b97ef0703919c3ea76 - 556857aa1d0855aba02b1c63bc52b91ec63fc2cc (v6.7 to v6.8-rc2) +CVE-2024-26638: f94fd25cb0aaf77fd7453f31c5d394a1a68ecf60 - 78fbb92af27d0982634116c7a31065f24d092826 (v5.19-rc1 to v6.8-rc1) +CVE-2024-26639: 5ec8e8ea8b7783fab150cf86404fc38cb4db8800 - f6564fce256a3944aa1bc76cb3c40e792d97c1eb (v6.8-rc1 to v6.8-rc3) +CVE-2024-26640: 93ab6cc69162775201587cc9da00d5016dc890e2 - 577e4432f3ac810049cb7e6b71f4d96ec7c6e894 (v4.18-rc1 to v6.8-rc3) +CVE-2024-26641: 0d3c703a9d1723c7707e0680019ac8ff5922db42 - 8d975c15c0cd744000ca386247432d57b21f9df0 (v4.7-rc1 to v6.8-rc3) +CVE-2024-26642: 761da2935d6e18d178582dbdf315a3a458555505 - 16603605b667b70da974bea8216c93e7db043bf1 (v4.1-rc1 to v6.8) +CVE-2024-26643: 5f68718b34a531a556f2f50300ead2862278da26 - 552705a3650bbf46a22b1adedc1b04181490fc36 (v6.5-rc6 to v6.8) +CVE-2024-26644: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - 7081929ab2572920e94d70be3d332e5c9f97095a (v2.6.12-rc2 to v6.8-rc2) +CVE-2024-26645: c193707dde77ace92a649cd59a17e105e2fbeaef - 2b44760609e9eaafc9d234a6883d042fc21132a7 (v4.17-rc1 to v6.8-rc2) +CVE-2024-26646: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - 97566d09fd02d2ab329774bb89a2cdf2267e86d9 (v2.6.12-rc2 to v6.8-rc1) +CVE-2024-26647: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - 3bb9b1f958c3d986ed90a3ff009f1e77e9553207 (v2.6.12-rc2 to v6.8-rc1) +CVE-2024-26648: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - 7073934f5d73f8b53308963cee36f0d389ea857c (v2.6.12-rc2 to v6.8-rc1) +CVE-2024-26649: 3da9b71563cbb7281875adab1d7c4132679da987 - bc03c02cc1991a066b23e69bbcc0f66e8f1f7453 (v6.3-rc1 to v6.8-rc1) +CVE-2024-26650: (n/a) - 5913320eb0b3ec88158cfcb0fa5e996bf4ef681b (unk to v6.8-rc2) +CVE-2024-26651: (n/a) - 07161b2416f740a2cb87faa5566873f401440a61 (unk to v6.9-rc1) +CVE-2024-26652: 4569cce43bc61e4cdd76597a1cf9b608846c18cc - ba18deddd6d502da71fd6b6143c53042271b82bd (v6.4-rc1 to v6.8) +CVE-2024-26653: acd6199f195d6de814ac4090ce0864a613b1580e - 7c9631969287a5366bc8e39cd5abff154b35fb80 (v6.7-rc1 to v6.9-rc2) +CVE-2024-26654: (n/a) - 051e0840ffa8ab25554d6b14b62c9ab9e4901457 (unk to v6.9-rc2) +CVE-2024-26655: (n/a) - 5b4cdd9c5676559b8a7c944ac5269b914b8c0bb8 (unk to v6.9-rc2) +CVE-2024-26656: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - 22207fd5c80177b860279653d017474b2812af5e (v2.6.12-rc2 to v6.9-rc1) +CVE-2024-26657: 56e449603f0ac580700621a356d35d5716a62ce5 - f34e8bb7d6c6626933fe993e03ed59ae85e16abb (v6.7-rc1 to v6.9-rc2) +CVE-2024-26658: (n/a) - 2acc59dd88d27ad69b66ded80df16c042b04eeec (unk to v6.8-rc1) +CVE-2024-26659: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - 7c4650ded49e5b88929ecbbb631efb8b0838e811 (v2.6.12-rc2 to v6.8-rc3) +CVE-2024-26660: 3a83e4e64bb1522ddac67ffc787d1c38291e1a65 - 58fca355ad37dcb5f785d9095db5f748b79c5dc2 (v5.11-rc1 to v6.8-rc4) +CVE-2024-26661: 474ac4a875ca6fea3fc5183d3ad22ef7523dca53 - 66951d98d9bf45ba25acf37fe0747253fafdf298 (v5.9-rc1 to v6.8-rc4) +CVE-2024-26662: 474ac4a875ca6fea3fc5183d3ad22ef7523dca53 - e96fddb32931d007db12b1fce9b5e8e4c080401b (v5.9-rc1 to v6.8-rc4) +CVE-2024-26663: ef20cd4dd1633987bcf46ac34ace2c8af212361f - 3871aa01e1a779d866fa9dfdd5a836f342f4eb87 (v4.9-rc1 to v6.8-rc4) +CVE-2024-26664: (n/a) - 4e440abc894585a34c2904a32cd54af1742311b3 (unk to v6.8-rc4) +CVE-2024-26665: 4cb47a8644cc9eb8ec81190a50e79e6530d0297f - d75abeec401f8c86b470e7028a13fcdc87e5dd06 (v5.9-rc1 to v6.8-rc4) +CVE-2024-26666: 8cc07265b69141f8ed9597d0f27185239c241c80 - 9480adfe4e0f0319b9da04b44e4eebd5ad07e0cd (v6.5-rc1 to v6.8-rc4) +CVE-2024-26667: ae4d721ce10057a4aa9f0d253e0d460518a9ef75 - 7f3d03c48b1eb6bc45ab20ca98b8b11be25f9f52 (v5.19-rc1 to v6.8-rc4) +CVE-2024-26668: d2168e849ebf617b2b7feae44c0c0baf739cb610 - c9d9eb9c53d37cdebbad56b91e40baf42d5a97aa (v4.3-rc1 to v6.8-rc2) +CVE-2024-26669: bbf73830cd48cff1599811d4f69c7cfd49c7b869 - 32f2a0afa95fae0d1ceec2ff06e0e816939964b8 (v5.1-rc1 to v6.8-rc2) +CVE-2024-26670: 471470bc7052d28ce125901877dd10e4c048e513 - 832dd634bd1b4e3bbe9f10b9c9ba5db6f6f2b97f (v6.6-rc5 to v6.8-rc1) +CVE-2024-26671: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - 5266caaf5660529e3da53004b8b7174cab6374ed (v2.6.12-rc2 to v6.8-rc1) +CVE-2024-26672: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - 4f32504a2f85a7b40fe149436881381f48e9c0c0 (v2.6.12-rc2 to v6.8-rc1) +CVE-2024-26673: 857b46027d6f91150797295752581b7155b9d0e1 - 8059918a1377f2f1fff06af4f5a4ed3d5acd6bc4 (v5.3-rc1 to v6.8-rc3) +CVE-2024-26674: b19b74bc99b1501a550f4448d04d59b946dc617a - 8eed4e00a370b37b4e5985ed983dccedd555ea9d (v6.4-rc1 to v6.8-rc4) +CVE-2024-26675: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - cb88cb53badb8aeb3955ad6ce80b07b598e310b8 (v2.6.12-rc2 to v6.8-rc4) +CVE-2024-26676: (n/a) - 1279f9d9dec2d7462823a18c29ad61359e0a007d (unk to v6.8-rc4) +CVE-2024-26677: (n/a) - e7870cf13d20f56bfc19f9c3e89707c69cf104ef (unk to v6.8-rc4) +CVE-2024-26678: 3e3eabe26dc88692d34cf76ca0e0dd331481cc15 - 1ad55cecf22f05f1c884adf63cc09d3c3e609ebf (v6.7-rc1 to v6.8-rc4) +CVE-2024-26679: f4713a3dfad045d46afcb9c2a7d0bba288920ed4 - eef00a82c568944f113f2de738156ac591bbd5cd (v3.18-rc7 to v6.8-rc4) +CVE-2024-26680: 94ad94558b0fbf18dd6fb0987540af1693157556 - 2e7d3b67630dfd8f178c41fa2217aa00e79a5887 (v5.5-rc1 to v6.8-rc4) +CVE-2024-26681: 012ec02ae4410207f796a9b280a60b80b6cc790a - ba5e1272142d051dcc57ca1d3225ad8a089f9858 (v6.0-rc1 to v6.8-rc4) +CVE-2024-26682: c09c4f31998bac6d73508e38812518aceb069b68 - 35e2385dbe787936c793d70755a5177d267a40aa (v6.7-rc1 to v6.8-rc4) +CVE-2024-26683: c09c4f31998bac6d73508e38812518aceb069b68 - 177fbbcb4ed6b306c1626a277fac3fb1c495a4c7 (v6.7-rc1 to v6.8-rc4) +CVE-2024-26684: 56e58d6c8a5640eb708e85866e9d243d0357ee54 - 46eba193d04f8bd717e525eb4110f3c46c12aec3 (v5.4-rc1 to v6.8-rc4) +CVE-2024-26685: 7f42ec3941560f0902fe3671e36f2c20ffd3af0a - 5bc09b397cbf1221f8a8aacb1152650c9195b02b (v3.12-rc4 to v6.8-rc4) +CVE-2024-26686: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - 7601df8031fd67310af891897ef6cc0df4209305 (v2.6.12-rc2 to v6.8-rc4) +CVE-2024-26687: d46a78b05c0e37f76ddf4a7a67bf0b6c68bada55 - fa765c4b4aed2d64266b694520ecb025c862c5a9 (v2.6.37-rc1 to v6.8-rc5) +CVE-2024-26688: 32021982a324dce93b4ae00c06213bf45fb319c8 - 79d72c68c58784a3e1cd2378669d51bfd0cb7498 (v5.1-rc1 to v6.8-rc4) +CVE-2024-26689: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - cda4672da1c26835dcbd7aec2bfed954eda9b5ef (v2.6.12-rc2 to v6.8-rc4) +CVE-2024-26690: 133466c3bbe171f826294161db203f7670bb30c8 - 38cc3c6dcc09dc3a1800b5ec22aef643ca11eab8 (v6.6-rc1 to v6.8-rc4) +CVE-2024-26691: (n/a) - 10c02aad111df02088d1a81792a709f6a7eca6cc (unk to v6.8-rc5) +CVE-2024-26692: d08089f649a0cfb2099c8551ac47eef0cc23fdf2 - 4860abb91f3d7fbaf8147d54782149bb1fc45892 (v6.3-rc1 to v6.8-rc5) +CVE-2024-26693: 57974a55d995468a9a476e24693eb741c649b25f - b7198383ef2debe748118996f627452281cf27d7 (v6.4-rc1 to v6.8-rc5) +CVE-2024-26694: 5e31b3df86ec6fbb925eee77fe2c450099c61dff - 353d321f63f7dbfc9ef58498cc732c9fe886a596 (v6.4-rc1 to v6.8-rc4) +CVE-2024-26695: 1b05ece0c931536c0a38a9385e243a7962e933f6 - ccb88e9549e7cfd8bcd511c538f437e20026e983 (v6.0-rc1 to v6.8-rc4) +CVE-2024-26696: 1d1d1a767206fbe5d4c69493b7e6d2a8d08cc0a0 - 38296afe3c6ee07319e01bb249aa4bb47c07b534 (v3.9-rc1 to v6.8-rc4) +CVE-2024-26697: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - 67b8bcbaed4777871bb0dcc888fb02a614a98ab1 (v2.6.12-rc2 to v6.8-rc4) +CVE-2024-26698: ac5047671758ad4be9f93898247b3a8b6dfde4c7 - e0526ec5360a48ad3ab2e26e802b0532302a7e11 (v5.8-rc1 to v6.8-rc3) +CVE-2024-26699: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - 46806e59a87790760870d216f54951a5b4d545bc (v2.6.12-rc2 to v6.8-rc5) +CVE-2024-26700: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - e6a7df96facdcf5b1f71eb3ec26f2f9f6ad61e57 (v2.6.12-rc2 to v6.8-rc4) +CVE-2024-26702: 121354b2eceb2669ebdffa76b105ad6c03413966 - 792595bab4925aa06532a14dd256db523eb4fa5e (v5.0-rc1 to v6.8-rc5) +CVE-2024-26703: e88ed227f639ebcb31ed4e5b88756b47d904584b - 1389358bb008e7625942846e9f03554319b7fecc (v6.5-rc1 to v6.8-rc3) +CVE-2024-26704: fcf6b1b729bcd23f2b49a84fb33ffbb44712ee6a - 55583e899a5357308274601364741a83e78d6ac4 (v3.18-rc2 to v6.8-rc3) +CVE-2024-26705: e5ef93d02d6c9cc3a14e7348481c9e41a528caa1 - 913b9d443a0180cf0de3548f1ab3149378998486 (v6.6-rc2 to v6.8-rc3) +CVE-2024-26706: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - 8b1d72395635af45410b66cc4c4ab37a12c4a831 (v2.6.12-rc2 to v6.8-rc3) +CVE-2024-26707: 121c33b07b3127f501b366bc23d2a590e2f2b8ef - 37e8c97e539015637cb920d3e6f1e404f707a06e (v5.9-rc1 to v6.8-rc3) +CVE-2024-26708: 1e777f39b4d75e599a3aac8e0f67d739474f198c - 337cebbd850f94147cee05252778f8f78b8c337f (v6.2-rc1 to v6.8-rc5) +CVE-2024-26709: a8ca9fc9134c1a43e6d4db7ff59496bbd7075def - 0846dd77c8349ec92ca0079c9c71d130f34cb192 (v6.7-rc1 to v6.8-rc5) +CVE-2024-26710: 18f14afe281648e31ed35c9ad2fcb724c4838ad9 - f1acb109505d983779bbb7e20a1ee6244d2b5736 (v6.8-rc1 to v6.8-rc5) +CVE-2024-26711: 62094060cf3acaf52e277457d807ea753269b89e - a22b0a2be69a36511cb5b37d948b651ddf7debf3 (v6.2-rc1 to v6.8-rc5) +CVE-2024-26712: 663c0c9496a69f80011205ba3194049bcafd681d - 4a7aee96200ad281a5cc4cf5c7a2e2a49d2b97b0 (v5.4-rc1 to v6.8-rc5) +CVE-2024-26713: (n/a) - ed8b94f6e0acd652ce69bd69d678a0c769172df8 (unk to v6.8-rc5) +CVE-2024-26714: 9c8c6bac1ae86f6902baa938101902fb3a0a100b - 85e985a4f46e462a37f1875cb74ed380e7c0c2e0 (v5.15-rc1 to v6.8-rc5) +CVE-2024-26715: 9772b47a4c2916d645c551228b6085ea24acbe5d - 61a348857e869432e6a920ad8ea9132e8d44c316 (v4.6-rc5 to v6.8-rc3) +CVE-2024-26716: 83cb2604f641cecadc275ca18adbba4bf262320f - 12783c0b9e2c7915a50d5ec829630ff2da50472c (v6.5-rc1 to v6.8-rc3) +CVE-2024-26717: b33752c300232d7f95dd9a4353947d0c9e6a0e52 - 00aab7dcb2267f2aef59447602f34501efe1a07f (v5.12-rc1-dontuse to v6.8-rc3) +CVE-2024-26718: 39d42fa96ba1b7d2544db3f8ed5da8fb0d5cb877 - 0a9bab391e336489169b95cb0d4553d921302189 (v5.9-rc1 to v6.8-rc3) +CVE-2024-26719: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - 39126abc5e20611579602f03b66627d7cd1422f0 (v2.6.12-rc2 to v6.8-rc3) +CVE-2024-26720: f6789593d5cea42a4ecb1cbeab6a23ade5ebbba7 - 9319b647902cbd5cc884ac08a8a6d54ce111fc78 (v3.16 to v6.8-rc3) +CVE-2024-26721: bd077259d0a9c9bf453e7e9751bf41f1996e6585 - 962ac2dce56bb3aad1f82a4bbe3ada57a020287c (v6.7-rc1 to v6.8-rc5) +CVE-2024-26722: cdba4301adda7c60a2064bf808e48fccd352aaa9 - 6ef5d5b92f7117b324efaac72b3db27ae8bb3082 (v6.7-rc5 to v6.8-rc5) +CVE-2024-26723: cabc9d49333df72fe0f6d58bdcf9057ba341e701 - 15faa1f67ab405d47789d4702f587ec7df7ef03e (v6.1-rc1 to v6.8-rc5) +CVE-2024-26724: 496fd0a26bbf73b6b12407ee4fbe5ff49d659a6d - aa1eec2f546f2afa8c98ec41e5d8ee488165d685 (v6.7-rc1 to v6.8-rc5) +CVE-2024-26725: 9d71b54b65b1fb6c0d3a6c5c88ba9b915c783fbc - 53c0441dd2c44ee93fddb5473885fd41e4bc2361 (v6.7-rc1 to v6.8-rc5) +CVE-2024-26726: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - 5571e41ec6e56e35f34ae9f5b3a335ef510e0ade (v2.6.12-rc2 to v6.8-rc5) +CVE-2024-26727: 2dfb1e43f57dd3aeaa66f7cf05d068db2d4c8788 - e03ee2fe873eb68c1f9ba5112fee70303ebf9dfb (v5.9-rc1 to v6.8-rc4) +CVE-2024-26728: 0e859faf8670a78ce206977dcf1a31a0231e9ca5 - 9671761792156f2339627918bafcd713a8a6f777 (v6.7-rc1 to v6.8-rc6) +CVE-2024-26729: 028bac5834495f4f4036bf8b3206fcdafe99a393 - d2b48f340d9e4a8fbeb1cdc84cd8da6ad143a907 (v6.7-rc1 to v6.8-rc6) +CVE-2024-26730: b7f1f7b2523a6a4382f12fe953380b847b80e09d - d56e460e19ea8382f813eb489730248ec8d7eb73 (v6.6-rc1 to v6.8-rc6) +CVE-2024-26731: 6df7f764cd3cf5a03a4a47b23be47e57e41fcd85 - 4cd12c6065dfcdeba10f49949bffcf383b3952d8 (v6.4-rc4 to v6.8-rc6) +CVE-2024-26732: 859051dd165ec6cc915f0f2114699021144fd249 - 56667da7399eb19af857e30f41bea89aa6fa812c (v6.7-rc1 to v6.8-rc6) +CVE-2024-26733: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - a7d6027790acea24446ddd6632d394096c0f4667 (v2.6.12-rc2 to v6.8-rc6) +CVE-2024-26734: 687125b5799cd5120437fa455cfccbe8537916ff - def689fc26b9a9622d2e2cb0c4933dd3b1c8071c (v6.3-rc1 to v6.8-rc6) +CVE-2024-26735: 915d7e5e5930b4f01d0971d93b9b25ed17d221aa - 5559cea2d5aa3018a5f00dd2aca3427ba09b386b (v4.10-rc1 to v6.8-rc6) +CVE-2024-26736: d2ddc776a4581d900fc3bdc7803b403daae64d88 - 6ea38e2aeb72349cad50e38899b0ba6fbcb2af3d (v4.15-rc1 to v6.8-rc6) +CVE-2024-26737: b00628b1c7d595ae5b544e059c27b1f5828314b4 - 0281b919e175bb9c3128bd3872ac2903e9436e3f (v5.15-rc1 to v6.8-rc6) +CVE-2024-26738: (n/a) - a5c57fd2e9bd1c8ea8613a8f94fd0be5eccbf321 (unk to v6.8-rc6) +CVE-2024-26739: (n/a) - 166c2c8a6a4dc2e4ceba9e10cfe81c3e469e3210 (unk to v6.8-rc6) +CVE-2024-26740: 53592b3640019f2834701093e38272fdfd367ad8 - 52f671db18823089a02f07efc04efdb2272ddc17 (v4.10-rc1 to v6.8-rc6) +CVE-2024-26741: 28044fc1d4953b07acec0da4d2fc4784c57ea6fb - 66b60b0c8c4a163b022a9f0ad6769b0fd3dc662f (v6.1-rc1 to v6.8-rc6) +CVE-2024-26742: cf15c3e734e8d25de7b4d9170f5a69ace633a583 - 5761eb9761d2d5fe8248a9b719efc4d8baf1f24a (v6.0-rc1 to v6.8-rc6) +CVE-2024-26743: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - 5ba4e6d5863c53e937f49932dee0ecb004c65928 (v2.6.12-rc2 to v6.8-rc6) +CVE-2024-26744: a42d985bd5b234da8b61347a78dc3057bf7bb94d - fdfa083549de5d50ebf7f6811f33757781e838c0 (v3.3-rc1 to v6.8-rc6) +CVE-2024-26745: (n/a) - 09a3c1e46142199adcee372a420b024b4fc61051 (unk to v6.8-rc7) +CVE-2024-26746: c2f156bf168fb42cd6ecd0a8e2204dbe542b8516 - d3ea125df37dc37972d581b74a5d3785c3f283ab (v6.4-rc1 to v6.8-rc7) +CVE-2024-26747: 5c54fcac9a9de559b444ac63ec3cd82f1d157a0b - 1c9be13846c0b2abc2480602f8ef421360e1ad9e (v4.19-rc6 to v6.8-rc6) +CVE-2024-26748: (n/a) - 5fd9e45f1ebcd57181358af28506e8a661a260b3 (unk to v6.8-rc6) +CVE-2024-26749: 7733f6c32e36ff9d7adadf40001039bf219b1cbe - cd45f99034b0c8c9cb346dd0d6407a95ca3d36f6 (v5.4-rc1 to v6.8-rc6) +CVE-2024-26750: 25236c91b5ab4a26a56ba2e79b8060cf4e047839 - aa82ac51d63328714645c827775d64dbfd9941f3 (v6.8-rc5 to v6.8-rc6) +CVE-2024-26751: b2e63555592f81331c8da3afaa607d8cf83e8138 - fdf87a0dc26d0550c60edc911cda42f9afec3557 (v4.15-rc1 to v6.8-rc6) +CVE-2024-26752: (n/a) - 359e54a93ab43d32ee1bff3c2f9f10cb9f6b6e79 (unk to v6.8-rc6) +CVE-2024-26753: 59ca6c93387d325e96577d8bd4c23c78c1491c11 - c0ec2a712daf133d9996a8a1b7ee2d4996080363 (v5.18-rc1 to v6.8-rc6) +CVE-2024-26754: 459aa660eb1d8ce67080da1983bb81d716aa5a69 - 136cfaca22567a03bbb3bf53a43d8cb5748b80ec (v4.7-rc1 to v6.8-rc6) +CVE-2024-26755: bc08041b32abe6c9824f78735bac22018eabfc06 - 9e46c70e829bddc24e04f963471e9983a11598b7 (v6.7-rc1 to v6.8-rc6) +CVE-2024-26756: f67055780caac6a99f43834795c43acf99eba6a6 - ad39c08186f8a0f221337985036ba86731d6aafe (v2.6.17-rc1 to v6.8-rc6) +CVE-2024-26757: ecbfb9f118bce49f571675929160e4ecef91cc8a - 55a48ad2db64737f7ffc0407634218cc6e4c513b (v4.8-rc1 to v6.8-rc6) +CVE-2024-26758: 68866e425be2ef2664aa5c691bb3ab789736acf5 - 1baae052cccd08daf9a9d64c3f959d8cdb689757 (v3.0-rc4 to v6.8-rc6) +CVE-2024-26759: (n/a) - 13ddaf26be324a7f951891ecd9ccd04466d27458 (unk to v6.8-rc6) +CVE-2024-26760: 066ff571011d8416e903d3d4f1f41e0b5eb91e1d - de959094eb2197636f7c803af0943cb9d3b35804 (v5.19-rc1 to v6.8-rc6) +CVE-2024-26761: 34e37b4c432cd0f1842b352fde4b8878b4166888 - 0cab687205986491302cd2e440ef1d253031c221 (v5.19-rc1 to v6.8-rc6) +CVE-2024-26762: 6ac07883dbb5f60f7bc56a13b7a84a382aa9c1ab - eef5c7b28dbecd6b141987a96db6c54e49828102 (v6.7-rc1 to v6.8-rc6) +CVE-2024-26763: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - 50c70240097ce41fe6bce6478b80478281e4d0f7 (v2.6.12-rc2 to v6.8-rc6) +CVE-2024-26764: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - b820de741ae48ccf50dd95e297889c286ff4f760 (v2.6.12-rc2 to v6.8-rc6) +CVE-2024-26765: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - 1001db6c42e4012b55e5ee19405490f23e033b5a (v2.6.12-rc2 to v6.8-rc6) +CVE-2024-26766: (n/a) - e6f57c6881916df39db7d95981a8ad2b9c3458d6 (unk to v6.8-rc6) +CVE-2024-26767: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - 0484e05d048b66d01d1f3c1d2306010bb57d8738 (v2.6.12-rc2 to v6.8-rc5) +CVE-2024-26768: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - 4551b30525cf3d2f026b92401ffe241eb04dfebe (v2.6.12-rc2 to v6.8-rc4) +CVE-2024-26769: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - 710c69dbaccdac312e32931abcb8499c1525d397 (v2.6.12-rc2 to v6.8-rc3) +CVE-2024-26770: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - b6eda11c44dc89a681e1c105f0f4660e69b1e183 (v2.6.12-rc2 to v6.8-rc3) +CVE-2024-26771: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - 6e2276203ac9ff10fc76917ec9813c660f627369 (v2.6.12-rc2 to v6.8-rc3) +CVE-2024-26772: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - 832698373a25950942c04a512daa652c18a9b513 (v2.6.12-rc2 to v6.8-rc3) +CVE-2024-26773: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - 4530b3660d396a646aad91a787b6ab37cf604b53 (v2.6.12-rc2 to v6.8-rc3) +CVE-2024-26774: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - 993bf0f4c393b3667830918f9247438a8f6fdb5b (v2.6.12-rc2 to v6.8-rc3) +CVE-2024-26775: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - e169bd4fb2b36c4b2bee63c35c740c85daeb2e86 (v2.6.12-rc2 to v6.8-rc2) +CVE-2024-26776: (n/a) - de8b6e1c231a95abf95ad097b993d34b31458ec9 (unk to v6.8-rc2) +CVE-2024-26777: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - e421946be7d9bf545147bea8419ef8239cb7ca52 (v2.6.12-rc2 to v6.8-rc2) +CVE-2024-26778: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - 04e5eac8f3ab2ff52fa191c187a46d4fdbc1e288 (v2.6.12-rc2 to v6.8-rc2) +CVE-2024-26779: (n/a) - bcbc84af1183c8cf3d1ca9b78540c2185cd85e7f (unk to v6.8-rc2) +CVE-2024-26780: 1279f9d9dec2d7462823a18c29ad61359e0a007d - 25236c91b5ab4a26a56ba2e79b8060cf4e047839 (v6.8-rc4 to v6.8-rc5) +CVE-2024-26781: b8adb69a7d29c2d33eb327bca66476fb6066516b - d6a9608af9a75d13243d217f6ce1e30e57d56ffe (v6.8-rc6 to v6.8-rc7) +CVE-2024-26782: cf7da0d66cc1a2a19fc5930bb746ffbb2d4cd1be - 10048689def7e40a4405acda16fdc6477d4ecc5c (v5.6-rc1 to v6.8-rc7) +CVE-2024-26783: c574bbe917036c8968b984c82c7b13194fe5ce98 - 2774f256e7c0219e2b0a0894af1c76bdabc4f974 (v5.18-rc1 to v6.8-rc7) +CVE-2024-26784: (n/a) - eb5555d422d0fc325e1574a7353d3c616f82d8b5 (unk to v6.8-rc7) +CVE-2024-26785: 9227da7816dd1a42e20d41e2244cb63c205477ca - cf7c2789822db8b5efa34f5ebcf1621bc0008d48 (v6.6-rc1 to v6.8-rc7) +CVE-2024-26786: 9227da7816dd1a42e20d41e2244cb63c205477ca - aeb004c0cd6958e910123a1607634401009c9539 (v6.6-rc1 to v6.8-rc7) +CVE-2024-26787: 46b723dd867d599420fb640c0eaf2a866ef721d4 - 6b1ba3f9040be5efc4396d86c9752cdc564730be (v4.20-rc1 to v6.8-rc7) +CVE-2024-26788: b092529e0aa09829a6404424ce167bf3ce3235e2 - 87a39071e0b639f45e05d296cc0538eef44ec0bd (v5.1-rc1 to v6.8-rc7) +CVE-2024-26789: (n/a) - 1c0cf6d19690141002889d72622b90fc01562ce4 (unk to v6.8-rc7) +CVE-2024-26790: b092529e0aa09829a6404424ce167bf3ce3235e2 - 9d739bccf261dd93ec1babf82f5c5d71dd4caa3e (v5.1-rc1 to v6.8-rc7) +CVE-2024-26791: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - 9845664b9ee47ce7ee7ea93caf47d39a9d4552c4 (v2.6.12-rc2 to v6.8-rc7) +CVE-2024-26792: e03ee2fe873eb68c1f9ba5112fee70303ebf9dfb - e2b54eaf28df0c978626c9736b94f003b523b451 (v6.8-rc4 to v6.8-rc7) +CVE-2024-26793: (n/a) - 616d82c3cfa2a2146dd7e3ae47bda7e877ee549e (unk to v6.8-rc7) +CVE-2024-26794: b0ad381fa7690244802aed119b478b4bdafc31dd - a1a4a9ca77f143c00fce69c1239887ff8b813bec (v6.8-rc6 to v6.8-rc7) +CVE-2024-26795: d95f1a542c3df396137afa217ef9bd39cb8931ca - a11dd49dcb9376776193e15641f84fcc1e5980c9 (v5.4-rc1 to v6.8-rc7) +CVE-2024-26796: cc4c07c89aada16229084eeb93895c95b7eabaa3 - 682dc133f83e0194796e6ea72eb642df1c03dfbe (v6.6-rc1 to v6.8-rc7) +CVE-2024-26797: (n/a) - 0f8ca019544a252d1afb468ce840c6dcbac73af4 (unk to v6.8-rc7) +CVE-2024-26798: (n/a) - 00d6a284fcf3fad1b7e1b5bc3cd87cbfb60ce03f (unk to v6.8-rc7) +CVE-2024-26799: b81af585ea54ee9f749391e594ee9cbd44061eae - 1382d8b55129875b2e07c4d2a7ebc790183769ee (v5.18-rc1 to v6.8-rc7) +CVE-2024-26800: 8590541473188741055d27b955db0777569438e3 - 13114dc5543069f7b97991e3b79937b6da05f5b0 (v6.8-rc5 to v6.8-rc7) +CVE-2024-26801: c7741d16a57cbf97eebe53f27e8216b1ff20e20c - 2449007d3f73b2842c9734f45f0aadb522daf592 (v4.0-rc1 to v6.8-rc7) +CVE-2024-26802: (n/a) - 8af411bbba1f457c33734795f024d0ef26d0963f (unk to v6.8-rc7) +CVE-2024-26803: (n/a) - fe9f801355f0b47668419f30f1fac1cf4539e736 (unk to v6.8-rc7) +CVE-2024-26804: 243aad830e8a4cdda261626fbaeddde16b08d04a - 5ae1e9922bbdbaeb9cfbe91085ab75927488ac0f (v2.6.34-rc3 to v6.8-rc7) +CVE-2024-26805: 1853c949646005b5959c483becde86608f548f24 - 661779e1fcafe1b74b3f3fe8e980c1e207fea1fd (v4.3-rc3 to v6.8-rc7) +CVE-2024-26806: (n/a) - 959043afe53ae80633e810416cee6076da6e91c6 (unk to v6.8-rc7) +CVE-2024-26807: 2087e85bb66ee3652dafe732bb9b9b896229eafc - 32ce3bb57b6b402de2aec1012511e7ac4e7449dc (v6.4-rc1 to v6.8-rc7) +CVE-2024-26808: (n/a) - 01acb2e8666a6529697141a6017edbf206921913 (unk to v6.8-rc2) +CVE-2024-26809: (n/a) - b0e256f3dd2ba6532f37c5c22e07cb07a36031ee (unk to v6.9-rc1) diff --git a/data/cmts.json b/data/cmts.json index 2e4eed26b..8664512af 100644 --- a/data/cmts.json +++ b/data/cmts.json @@ -2,6 +2,7 @@ "0024d8ad1639e32d717445c69ca813fd19c2a91c": "v3.9-rc1", "0031c41be5c529f8329e327b63cde92ba1284842": "v2.6.34-rc7", "00374d9b6d9f932802b55181be9831aa948e5b7c": "v6.5-rc7", + "00384f565a91c08c4bedae167f749b093d10e3fe": "v6.8-rc1", "003a3e1d60b0bb5cfb4feffb05a2083db2346364": "v4.2-rc1", "003b686ace820ce2d635a83f10f2d7f9c147dabc": "v5.2-rc1", "0048b4837affd153897ed1222283492070027aa9": "v4.3-rc1", @@ -9,24 +10,40 @@ "005145378c9ad7575a01b6ce1ba118fb427f583a": "v4.11-rc1", "008ca35f6e87be1d60b6af3d1ae247c6d5c2531d": "v5.18-rc1", "0091bfc81741b8d3aeb3b7ab8636f911b2de6e80": "v6.1-rc1", + "00aab7dcb2267f2aef59447602f34501efe1a07f": "v6.8-rc3", "00b4492686e0497fdb924a9d4c8f6f99377e176c": "v6.1-rc1", "00b5f37189d24ac3ed46cb7f11742094778c46ce": "v5.18-rc1", + "00cbce5cbf88459cd1aa1d60d0f1df15477df127": "v6.4-rc1", + "00d6a284fcf3fad1b7e1b5bc3cd87cbfb60ce03f": "v6.8-rc7", "0113d9c9d1ccc07f5a3710dac4aa24b6d711278c": "v6.6-rc3", + "0129ab1f268b6cf88825eae819b9b84aa0a85634": "v5.16-rc7", + "012e332286e2bb9f6ac77d195f17e74b2963d663": "v5.16-rc8", + "012ec02ae4410207f796a9b280a60b80b6cc790a": "v6.0-rc1", "01310bb7c9c98752cc763b36532fab028e0f8f81": "v4.20-rc3", "01330d7288e0050c5aaabc558059ff91589e67cd": "v4.5-rc1", "0143fc5e9f6f5aad4764801015bc8d4b4a278200": "v3.6-rc1", + "014c9caa29d3a44e0de695c99ef18bec3e887d52": "v5.11-rc1", "0152dfee235e87660f52a117fc9f70dc55956bb4": "v6.1-rc1", + "016002848c82eeb5d460489ce392d91fe18c475c": "v5.13-rc4", "017c59c042d01fc84cae7a8ea475861e702c77ab": "v4.9-rc1", "017c73a34a661a861712f7cc1393a123e5b2208c": "v6.6-rc5", "0185604c2d82c560dab2f2933a18f797e74ab5a8": "v4.4-rc7", "0185846975339a5c348373aa450a977f5242366b": "v6.3-rc1", + "01acb2e8666a6529697141a6017edbf206921913": "v6.8-rc2", + "01b057b2f4cc2d905a0bd92195657dbd9a7005ab": "v6.6-rc3", + "01bd694ac2f682fb8017e16148b928482bc8fa4b": "v6.8-rc1", "01c846f9539c194c7a6e34af036b1115b8ed822a": "v3.17-rc1", "01ca667133d019edc9f0a1f70a272447c84ec41f": "v5.1-rc4", "01ea173e103edd5ec41acec65b9261b87e123fc2": "v5.12-rc1-dontuse", "01f810ace9ed3": "v5.12-rc1-dontuse", + "020e71c7ffc25dfe29ed9be6c2d39af7bd7f661f": "v6.8-rc1", + "020ef930b826d21c5446fdc9db80fd72a791bc21": "v5.13-rc4", "0217ed2848e8538bcf9172d97ed2eeb4a26041bb": "v5.12-rc5", + "0230d60e4661d9ced6fb0b9a30f182ebdafbba7a": "v4.5-rc1", "027ef6c87853b0a9df53175063028edb4950d476": "v3.7-rc1", + "0281b919e175bb9c3128bd3872ac2903e9436e3f": "v6.8-rc6", "028a41e89383e1208dff1afe3e260b8cb6d3431c": "v4.1-rc1", + "028bac5834495f4f4036bf8b3206fcdafe99a393": "v6.7-rc1", "029f7f3b8701cc7aca8bdb31f0c7edd6a479e357": "v4.5-rc1", "02a4d923e4400a36d340ea12d8058f69ebf3a383": "v6.3-rc4", "02e1a114fdb71e59ee6770294166c30d437bf86a": "v6.0-rc1", @@ -39,8 +56,11 @@ "0336e04a6520bdaefdb0769d2a70084fa52e81ed": "v5.2-rc1", "034ae28b56f13dc1f2beb3fa294b455f57ede9cb": "v6.2-rc1", "034faeb9ef390d58239e1dce748143f6b35a0d9b": "v3.13-rc1", + "03504e3b54cc8118cc26c064e60a0b00c2308708": "v5.13-rc3", "0361a28d3f9a4315a100c7b37ba0b55cfe15fe07": "v2.6.30-rc1", + "03c427147b2d3e503af258711af4fc792b89b0af": "v5.13-rc1", "03c8efc1ffeb6b82a22c1af8dd908af349563314": "v2.6.38-rc1", + "03d1571d9513369c17e6848476763ebbd10ec2cb": "v5.4-rc1", "03dab869b7b239c4e013ec82aea22e181e441cfc": "v4.9-rc3", "03f36e885fc26cb0ea299fb6df5171a51e814548": "v2.6.24-rc2", "040757f738e13caaa9c5078bca79aa97e11dde88": "v4.11-rc2", @@ -48,12 +68,15 @@ "045a31b95509c8f25f5f04ec5e0dec5cd09f2c5f": "v5.17-rc1", "045c7a3f53d9403b62d396b6d051c4be5044cdb4": "v4.11-rc7", "04837f6447c7f3ef114cda1ad761822dedbff8cf": "v2.6.18-rc1", + "0484e05d048b66d01d1f3c1d2306010bb57d8738": "v6.8-rc5", + "0495e337b7039191dfce6e03f5f830454b1fae6b": "v6.0-rc4", "0496f56065e00f6c3bfcefc4f9b5419847e4a8b5": "v4.2-rc1", "049c4e13714ecbca567b4d5f6d563f05d431c80e": "v5.13-rc4", "04aa64375f48a5d430b5550d9271f8428883e550": "v6.1-rc8", "04b5d028f50ff05a8f9ae049ee71f8fdfcf1f5de": "v2.6.30-rc2", "04bcef2a83f40c6db24222b27a52892cba39dffb": "v2.6.33-rc4", "04bf464a5dfd9ade0dda918e44366c2c61fce80b": "v4.1-rc7", + "04c26faa51d1e2fe71cf13c45791f5174c37f986": "v5.13-rc4", "04c2a47ffb13c29778e2a14e414ad4cb5a5db4b5": "v5.17-rc3", "04c4f2ee3f68c9a4bf1653d15f1a9a435ae33f7a": "v5.12-rc8", "04c55383fa5689357bcdd2c8036725a55ed632bc": "v6.4-rc7", @@ -61,12 +84,15 @@ "04d4fbca1017c11381e7d82acea21dd741e748bc": "v3.6-rc3", "04d80663f67ccef893061b49ec8a42ff7045ae84": "v5.17-rc1", "04dc715e24d0": "v4.11-rc1", + "04e5eac8f3ab2ff52fa191c187a46d4fdbc1e288": "v6.8-rc2", + "04e6ccfc93c5a1aa1d75a537cf27e418895e20ea": "v6.8-rc1", "04f25edb48c441fc278ecc154c270f16966cbb90": "v5.3-rc1", "04f5866e41fb70690e28397487d8bd8eea7d712a": "v5.1-rc6", "04f81f0154e4bf002be6f4d85668ce1257efa4d9": "v4.0-rc1", "050d91c03b28ca479df13dfb02bcd2c60dd6a878": "v6.6-rc1", "050fad7c4534c13c8eb1d9c2ba66012e014773cb": "v4.17-rc7", "051ae669e4505abbe05165bebf6be7922de11f41": "v6.1-rc8", + "051e0840ffa8ab25554d6b14b62c9ab9e4901457": "v6.9-rc2", "051ff581ce70e822729e9474941f3c206cbf7436": "v4.6-rc1", "054623105728b06852f077299e2bf1bf3d5f2b0b": "v4.1-rc1", "054a3ef683a176a509cc9b37f762029aae942495": "v6.2-rc1", @@ -88,15 +114,19 @@ "05fe58fdc10df9ebea04c0eaed57adc47af5c184": "v2.6.30-rc1", "060423bfdee3f8bc6e2c1bac97de24d5415e2bc4": "v5.3", "0614e2b73768b502fc32a75349823356d98aae2c": "v5.4-rc1", + "061dde8245356d8864d29e25207aa4daa0be4d3c": "v5.13-rc1", "0625b4ba1a5d4703c7fb01c497bd6c156908af00": "v4.19-rc1", "0626e6641f6b467447c81dd7678a69c66f7746cf": "v5.15-rc1", "06615d11cc78162dfd5116efb71f29eb29502d37": "v6.3-rc4", + "066ff571011d8416e903d3d4f1f41e0b5eb91e1d": "v5.19-rc1", "06b6a1cf6e776426766298d055bb3991957d90a7": "v3.6-rc1", "06bd3c36a733ac27962fea7d6f47168841376824": "v4.7-rc1", "06c8173eb92bbfc03a0fe8bb64315857d0badd06": "v4.0-rc3", "06ce521af9558814b8606c0476c54497cf83a653": "v4.11-rc1", "06deeec77a5a689cc94b21a8a91a76e42176685d": "v4.10-rc1", "06e7e776ca4d36547e503279aeff996cbb292c16": "v4.15-rc8", + "0711f0d7050b9e07c44bc159bbc64ac0a1022c7f": "v5.13-rc5", + "07161b2416f740a2cb87faa5566873f401440a61": "v6.9-rc1", "0720a06a7518c9d0c0125bd5d1f3b6264c55c3dd": "v3.3-rc1", "073931017b49d9458aa351605b43a7e34598caef": "v4.9-rc1", "073c516ff73557a8f7315066856c04b50383ac34": "v4.11-rc8", @@ -113,22 +143,33 @@ "07f12b26e21ab359261bf75cfcb424fdc7daeb6d": "v5.0", "07f2c7ab6f8d0a7e7c5764c4e6cc9c52951b9d9c": "v4.16-rc1", "07f4d9d74a04aa7c72c5dae0ef97565f28f17b92": "v3.16-rc2", + "080b4e24852b1d5b66929f69344e6c3eeb963941": "v6.3-rc1", + "082cd4ec240b8734a82a89ffb890216ac98fec68": "v5.13-rc5", + "0846dd77c8349ec92ca0079c9c71d130f34cb192": "v6.8-rc5", + "0849a5441358cef02586fb2d60f707c0db195628": "v6.8-rc1", "086ba77a6db00ed858ff07451bedee197df868c9": "v3.18-rc3", "088aaf17aa79300cab14dbee2569c58cfafd7d6e": "v5.1-rc6", "0896b752302662909b52895bd7f601136001069d": "v2.6.15-rc1", "08999b2489b4c9b939d7483dbd03702ee4576d96": "v5.17-rc8", "089bc0143f489bd3a4578bdff5f4ca68fb26f341": "v4.12-rc7", + "08a100689d4baf296d6898c687ea8d005da8d234": "v5.6-rc1", + "08ac6f132dd77e40f786d8af51140c96c6d739c9": "v6.8-rc2", "08dff7b7d629807dbb1f398c68dd9cd58dd657a1": "v3.6-rc1", + "08e23d05fa6dc4fc13da0ccf09defdd4bbc92ff4": "v6.8-rc1", "08e50cf071847323414df0835109b6f3560d44f5": "v6.6-rc5", + "08ef1af4de5fe7de9c6d69f1e22e51b66e385d9b": "v5.13-rc1", "09184ae9b5756cc469db6fd1d1cfdcffbf627c2d": "v5.17-rc1", "091c12e1f50cce93b1af90e56cad88787ec86dfb": "v5.3-rc1", "0926f91083f34d047abc74f1ca4fa6a9c161f7db": "v2.6.37-rc1", "095f1fc4ebf36c64fddf9b6db29b1ab5517378e6": "v2.6.26-rc1", "096cdc6f52225835ff503f987a0d68ef770bb78e": "v4.7-rc7", "096fe9eaea40a17e125569f9e657e34cdb6d73bd": "v4.4-rc3", + "099f0af9d98231bb74956ce92508e87cbcb896be": "v6.6-rc3", + "09a3c1e46142199adcee372a420b024b4fc61051": "v6.8-rc7", "09ba3bc9dd150457c506e4661380a6183af651c1": "v5.1-rc1", "09cce60bddd6461a93a5bf434265a47827d1bc6f": "v6.4-rc5", "09ccfd238e5a0e670d8178cf50180ea81ae09ae1": "v4.4-rc6", + "09d23174402da0f10e98da2c61bb5ac8e7d79fdd": "v5.15-rc4", "0a0b98734479aa5b3c671d5190e86273372cab95": "v4.17-rc5", "0a14842f5a3c0e88a1e59fac5c3025db39721f74": "v3.0-rc1", "0a1d52994d440e21def1c2174932410b4f2a98a1": "v5.0", @@ -136,12 +177,14 @@ "0a27a14a62921b438bb6f33772690d345a089be6": "v2.6.22-rc1", "0a2f661b6c21815a7fa60e30babe975fee8e73c6": "v5.4-rc8", "0a38c17a21a0965b4853211afa1d3e85428e6170": "v4.8-rc1", + "0a3d898ee9a8303d5b3982b97ef0703919c3ea76": "v6.7", "0a515a06c5ebfa46fee3ac519e418f801e718da4": "v5.16-rc6", "0a54917c3fc295cb61f3fb52373c173fd3b69f48": "v2.6.37-rc6", "0a6e77784f490912d81b92cfd48424541c04691e": "v4.19-rc1", "0a771f7b266b02d262900c75f1e175c7fe76fec2": "v6.5-rc4", "0a944e8a6c66ca04c7afbaa17e22bf208a8b37f0": "v5.2-rc2", "0a9ab9bdb3e891762553f667066190c1d22ad62b": "v3.8-rc6", + "0a9bab391e336489169b95cb0d4553d921302189": "v6.8-rc3", "0a9cd0a80ac559357c6a90d26c55270ed752aa26": "v3.12-rc2", "0aaa81377c5a01f686bcdb8c7a6929a7bf330c68": "v5.0-rc3", "0aaba41b58bc5f3074c0c0a6136b9500b5e29e19": "v4.15-rc1", @@ -152,6 +195,7 @@ "0ae3eb7b4611207e140e9772398b9f88b72d6839": "v5.12-rc1-dontuse", "0aea86a2176c22647a5b683768f858d880d5e05b": "v3.7-rc1", "0aec4867dca149e2049e8439b76bd82ad9dac52c": "v2.6.14-rc5", + "0b0226be3a52dadd965644bc52a807961c2c26df": "v5.13-rc3", "0b0509508beff65c1d50541861bc0d4973487dc5": "v5.2-rc1", "0b074ab7fc0d575247b9cc9f93bb7e007ca38840": "v5.2-rc3", "0b29669c065f60501e7289e1950fa2a618962358": "v2.6.24-rc6", @@ -163,6 +207,7 @@ "0b99d58902dd82fa51216eb8e0d6ddd8c43e90e4": "v3.12-rc1", "0b9f6c4615c993d2b552e0d2bd1ade49b56e5beb": "v4.10-rc1", "0ba002bc4393dcfae031fc707b11c094b46a5048": "v4.16-rc1", + "0ba9e3a13c6adfa99e32b2576d20820ab10ad48a": "v6.4-rc1", "0baa57d8dc32db78369d8b5176ef56c5e2e18ab3": "v4.4-rc1", "0bd82f5f6355775fbaf7d3c664432ce1b862be1e": "v2.6.38-rc1", "0bf54fcd95042bd178cb25368422cf4474fc8492": "v4.8-rc1", @@ -177,15 +222,20 @@ "0c5dc070ff3d6246d22ddd931f23a6266249e3db": "v5.14-rc1", "0c692d07842a67d9aa6b8266a80e4ac460a5c1a2": "v3.14-rc1", "0c7aecd4bde4b7302cd41986d3a29e4f0b0ed218": "v4.0-rc1", + "0c8bd174f0fc131bc9dfab35cd8784f59045da87": "v5.13-rc2", "0c9acb1af77a3cb8707e43f45b72c95266903cee": "v5.5-rc1", "0c9ae0b8605078eafc3bea053cc78791e97ba2e2": "v6.8-rc1", + "0cab687205986491302cd2e440ef1d253031c221": "v6.8-rc6", "0cada33241d9de205522e3858b18e506ca5cce2c": "v5.7", "0cdfa9e6f0915e3d243e2393bfa8a22e12d553b0": "v6.1-rc8", + "0ce20dd840897b12ae70869c69f1ba34d6d16965": "v5.12-rc1-dontuse", "0d01da6afc5402f60325c5da31b22f7d56689b49": "v5.3-rc1", "0d07c0ec4381f630c801539c79ad8dcc627f6e4a": "v5.10", "0d0826019e529f21c84687521d03f60cd241ca7d": "v3.18-rc1", "0d0e2d032811280b927650ff3c15fe5020e82533": "v6.1-rc4", "0d0e57697f162da4aa218b5feafe614fb666db07": "v4.12-rc1", + "0d0ea309357dea0d85a82815f02157eb7fcda39f": "v5.13-rc4", + "0d3c703a9d1723c7707e0680019ac8ff5922db42": "v4.7-rc1", "0d46748c3f874defbbbf98bcf40c7b18964abbc0": "v2.6.28-rc1", "0d4837fdb796f99369cf7691d33de1b856bcaf1f": "v5.19-rc1", "0d62e9dd6da45bbf0f33a8617afc5fe774c8f45f": "v4.3-rc1", @@ -204,6 +254,7 @@ "0e5d5ae837c8ce04d2ddb874ec5f920118bd9d31": "v6.1-rc1", "0e62395da2bd5166d7c9e14cbc7503b256a34cb0": "v5.5-rc1", "0e8235d28f3a0e9eda9f02ff67ee566d5f42b66b": "v6.2-rc1", + "0e859faf8670a78ce206977dcf1a31a0231e9ca5": "v6.7-rc1", "0e881c0a4b6146b7e856735226208f48251facd8": "v6.5-rc2", "0e8d2444168dd519fea501599d150e62718ed2fe": "v6.8-rc1", "0e94682b73bfa6c44c98af7a26771c9c08c055d5": "v5.2-rc1", @@ -211,7 +262,10 @@ "0ea1ec713f04bdfac343c9702b21cd3a7c711826": "v3.13-rc1", "0eab121ef8750a5c8637d51534d5e9143fb0633f": "v4.9", "0ebc1064e4874d5987722a2ddbc18f94aa53b211": "v6.5-rc4", + "0ecc1c70dcd32c0f081b173a1a5d89952686f271": "v5.13-rc1", "0ed554fd769a19ea8464bb83e9ac201002ef74ad": "v6.2-rc1", + "0ed6389c483dc77cdbdd48de0ca7ce41723dd667": "v4.9-rc1", + "0ee74d5a48635c848c20f152d0d488bf84641304": "v5.13-rc4", "0efe125cfb99e6773a7434f3463f7c2fa28f3a43": "v6.0-rc5", "0f00cd322d22d4441de51aa80bcce5bb6a8cbb44": "v6.3-rc1", "0f12156dff2862ac54235fc72703f18770769042": "v5.15-rc1", @@ -221,15 +275,23 @@ "0f2ff82e11c86c05d051cae32b58226392d33bbf": "v4.10-rc6", "0f3912fd934cdfd03d93f2dc6f064099795bf638": "v4.8-rc1", "0f4f199443faca715523b0659aa536251d8b978f": "v5.4-rc4", + "0f7352557a35ab7888bc7831411ec8a3cbe20d78": "v6.9-rc1", + "0f7d9b31ce7abdbb29bf018131ac920c9f698518": "v5.16-rc7", "0f886ca12765d20124bd06291c82951fd49a33be": "v4.6-rc1", "0f8ab89e825f8c9f1c84c558ad7e2e4006aee0d3": "v2.6.21-rc2", + "0f8ca019544a252d1afb468ce840c6dcbac73af4": "v6.8-rc7", "0f923e07124df069ba68d8bb12324398f4b6b709": "v5.14-rc7", "0fa3ecd87848c9c93c2c828ef4c3a8ca36ce46c7": "v4.18-rc4", "0fae3bf018d97b210051c8797a49d66d31071847": "v4.1-rc8", "0fb375fb9b93b7d822debc6a734052337ccfdb1f": "v2.6.14-rc3", "0fb6bd06e06792469acc15bbe427361b56ada528": "v3.12-rc2", "0fc1a726f897acfa774b17eeb62b38480d1c9ea0": "v5.10-rc1", + "0fccbf0a3b690b162f53b13ed8bc442ea33437dc": "v5.13-rc1", "0fd08a34e8e3b67ec9bd8287ac0facf8374b844a": "v5.16-rc7", + "0ffd71bcc3a03ebb3551661a36052488369c4de9": "v5.3-rc1", + "0fff71c5a311e1264988179f7dcc217fda15fadd": "v5.12-rc8", + "1001db6c42e4012b55e5ee19405490f23e033b5a": "v6.8-rc6", + "10048689def7e40a4405acda16fdc6477d4ecc5c": "v6.8-rc7", "1033990ac5b2ab6cee93734cb6d301aa3a35bcaa": "v5.2-rc1", "103f6112f253017d7062cd74d17f4a514ed4485c": "v4.6-rc5", "1045ba77a5962a22bce7777678ef46714107ea63": "v4.11-rc1", @@ -237,28 +299,40 @@ "105cd17a866017b45f3c45901b394c711c97bf40": "v5.14-rc2", "107866a8eb0b664675a260f1ba0655010fac1e08": "v5.13-rc6", "109f6e39fa07c48f580125f531f46cb7c245b528": "v2.6.36-rc1", + "10b17004a74c384c6f410af355b0d6d7a168f613": "v5.6-rc1", "10bf4e83167cc68595b85fd73bb91e8f2c086e36": "v5.13-rc1", + "10c02aad111df02088d1a81792a709f6a7eca6cc": "v6.8-rc5", "10d2bb2e6b1d8c4576c56a748f697dbeb8388899": "v5.12-rc5", "10d91611f426d4bafd2a83d966c36da811b2f7ad": "v5.2-rc1", "10db10d144c0248f285242f79daf6b9de6b00a62": "v2.6.28-rc1", "10eec60ce79187686e052092e5383c99b4420a20": "v4.8-rc1", "1109c00547fc66df45b9ff923544be4c1e1bec13": "v3.18-rc1", + "110e70fccce4f22b53986ae797d665ffb1950aa6": "v6.6-rc1", "112e66017bff7f2837030f34c2bc19501e9212d5": "v6.3-rc3", "113630b581d6d423998d2113a8e892ed6e6af6f9": "v4.10-rc1", "1137b5e2529a8f5ca8ee709288ecba3e68044df2": "v4.14-rc7", + "115726c5d312b462c9d9931ea42becdfa838a076": "v5.13-rc3", "115bb1ffa54c3934f3617bdd4e4dfc68b11e1e69": "v2.6.37-rc1", "1165affd484889d4986cf3b724318935a0b120d8": "v5.12-rc7", "117166efb1ee8f13c38f9e96b258f16d4923f888": "v4.18-rc1", "118a8cf504d7dfa519562d000f423ee3ca75d2c4": "v6.8-rc1", + "11958528161731c58e105b501ed60b83a91ea941": "v6.6-rc1", "11980c2ac4ccfad21a5f8ee9e12059f1e687bb40": "v3.3-rc1", "11eeef41d5f63c7d2f7fdfcc733eb7fb137cc384": "v2.6.31-rc1", "11f3710417d026ea2f4fcf362d866342c5274185": "v4.6-rc1", "1202cdd665315c525b5237e96e0bedc76d7e754f": "v6.1-rc1", + "121354b2eceb2669ebdffa76b105ad6c03413966": "v5.0-rc1", "12176503366885edd542389eed3aaf94be163fdb": "v3.7-rc3", + "121c33b07b3127f501b366bc23d2a590e2f2b8ef": "v5.9-rc1", + "122e6c79efe1c25816118aca9cfabe54e99c2432": "v5.13-rc1", "1240eb93f0616b21c675416516ff3d74798fdc97": "v6.4-rc7", "124751d5e63c823092060074bd0abaae61aaa9c4": "v4.14-rc5", "124d3b7041f9a0ca7c43a6293e1cae4576c32fd5": "v2.6.25-rc1", + "126bdb606fd2802454e6048caef1be3e25dd121e": "v5.13-rc1", "126f40298446a82116e1f92a1aaf72b8c8228fae": "v4.8-rc1", + "12783c0b9e2c7915a50d5ec829630ff2da50472c": "v6.8-rc3", + "1279f9d9dec2d7462823a18c29ad61359e0a007d": "v6.8-rc4", + "12804793b17c0e19115a90d98f2f3df0cb79e233": "v5.10-rc1", "1280c27f8e29acf4af2da914e80ec27c3dbd5c01": "v3.8-rc1", "128394eff343fc6d2f32172f03e24829539c5835": "v4.10-rc1", "128c66429247add5128c03dc1e144ca56f05a4e2": "v5.5-rc1", @@ -276,25 +350,37 @@ "130056275ade730e7a79c110212c8815202773ee": "v4.5-rc6", "13054abbaa4f1fd4e6f3b4b63439ec033b4c8035": "v5.0-rc6", "13100a72f40f5748a04017e0ab3df4cf27c809ef": "v4.7-rc1", + "13114dc5543069f7b97991e3b79937b6da05f5b0": "v6.8-rc7", + "133466c3bbe171f826294161db203f7670bb30c8": "v6.6-rc1", "134fca9063ad4851de767d1768180e5dede9a881": "v5.2-rc1", + "136cfaca22567a03bbb3bf53a43d8cb5748b80ec": "v6.8-rc6", "137f7df8cead00688524c82360930845396b8a21": "v3.15-rc1", + "1382d8b55129875b2e07c4d2a7ebc790183769ee": "v6.8-rc7", + "1389358bb008e7625942846e9f03554319b7fecc": "v6.8-rc3", "1399c59fa92984836db90538cf92397fe7caaa57": "v5.4-rc4", + "139ad1143151a07be93bf741d4ea7c89e59f89ce": "v6.6-rc6", + "13a779de4175df602366d129e41782ad7168cef0": "v5.13-rc1", "13ac695e7ea16cb27b804fadf2ff569dbcab6af1": "v4.5-rc1", "13bf9fbff0e5e099e2b6f003a0ab8ae145436309": "v4.11", "13c4a90119d28cfcb6b5bdd820c233b86c2b0237": "v4.3-rc1", "13d2b4d11d69a92574a55bfd985cfb0ca77aebdc": "v3.8", "13d518074a952d33d47c428419693f63389547e9": "v3.4-rc5", + "13d6eb20fc79a1e606307256dad4098375539a09": "v4.16-rc1", + "13ddaf26be324a7f951891ecd9ccd04466d27458": "v6.8-rc6", + "13dfc0540a575b47b2d640b093ac16e9e09474f6": "v4.13-rc1", "13e788deb7348cc88df34bed736c3b3b9927ea52": "v6.8-rc2", "13ec7f10b87f5fc04c4ccbd491c94c7980236a74": "v5.2-rc6", "140623410536905fa6ab737b625decfde6c64a72": "v4.8-rc1", "14431aa0c5a443d13d24e6f865a8838f97dab973": "v2.6.29-rc1", "14452ca3b5ce304fb2fea96dbc9ca1e4e7978551": "v4.17-rc1", + "145cb2f7177d94bc54563ed26027e952ee0ae03c": "v5.7-rc3", "146aa8b1453bd8f1ff2304ffb71b4ee0eb9acdcc": "v4.4-rc1", "146cc8a17a3b4996f6805ee5c080e7101277c410": "v4.10-rc4", "14abdfae508228a7307f7491b5c4215ae70c6542": "v6.5", "14fbbc8297728e880070f7b077b3301a8c698ef9": "v5.12-rc3", "15122ee2c515a253b0c66a3e618bc7ebe35105eb": "v4.16-rc3", "15133f6e67d8d646d0744336b4daa3135452cb0d": "v2.6.37-rc1", + "1526d9f10c6184031e42afad0adbdde1213e8ad1": "v5.11-rc1", "15303ba5d1cd9b28d03a980456c0978c0ea3b208": "v4.16-rc1", "15342f930ebebcfe36f2415049736a77d7d2e045": "v5.19-rc1", "153695d36ead0ccc4d0256953c751cabf673e621": "v6.1-rc3", @@ -308,35 +394,47 @@ "15bdab959c9bb909c0317480dd9b35748a8f7887": "v2.6.17-rc1", "15cf0b82271b1823fb02ab8c377badba614d95d5": "v5.18-rc5", "15d3042a937c13f5d9244241c7a9c8416ff6e82a": "v4.13-rc1", + "15ef92e9c41124ee9d88b01208364f3fe1f45f84": "v6.8-rc1", + "15faa1f67ab405d47789d4702f587ec7df7ef03e": "v6.8-rc5", "15fab63e1e57be9fdb5eec1bbc5916e9825e9acb": "v5.1-rc5", "15fe076edea787807a7cdc168df832544b58eba6": "v4.15-rc2", "161f873b89136eb1e69477c847d5a5033239d9ba": "v4.1-rc7", + "16287397ec5c08aa58db6acf7dbc55470d78087d": "v5.18", "162a7e7500f9664636e649ba59defe541b7c2c60": "v3.0-rc1", "162f98dea487206d9ab79fc12ed64700667a894d": "v4.6-rc5", "16306a61d3b7c433c7a127ec6224867b88ece687": "v5.0-rc1", "163ae1c6ad6299b19e22b4a35d5ab24a89791a98": "v4.8-rc6", "1642a3945e223a922312fab2401ecdf58b3825b9": "v6.1-rc1", "1651333b09743887bc2dd3d158a11853a2be3fe7": "v2.6.39-rc1", + "16603605b667b70da974bea8216c93e7db043bf1": "v6.8", "16615be18cadf53ee6f8a4f0bdd647f0753421b1": "v2.6.24-rc1", + "166c2c8a6a4dc2e4ceba9e10cfe81c3e469e3210": "v6.8-rc6", "1680939e9ecf7764fba8689cfb3429c2fe2bb23c": "v5.19-rc1", "168a2f776b9762f4021421008512dd7ab7474df1": "v5.18-rc3", "1692cf434ba13ee212495b5af795b6a07e986ce4": "v6.8-rc1", + "169410eba271afc9f0fb476d996795aa26770c6d": "v6.8-rc1", "16981742717b04644a41052570fb502682a315d2": "v5.5-rc2", "16ae16c6e5616c084168740990fc508bda6655d4": "v4.9-rc7", "16ae56d7e0528559bf8dc9070e3bfd8ba3de80df": "v6.1-rc7", "16b304f3404f8e0243d5ee2b70b68767b7b59b2b": "v3.12-rc1", + "16b374ca439fb406e46e071f75428f5b033056f8": "v2.6.37-rc1", "16c8d2df7ec0eed31b7d3b61cb13206a7fb930cc": "v5.15-rc2", "16ce101db85db694a91380aa4c89b25530871d33": "v6.1-rc1", "16d51a590a8ce3befb1308e0e7ab77f3b661af33": "v5.3-rc2", "16e5726269611b71c930054ffe9b858c1cea88eb": "v3.2-rc1", + "1710eb913bdcda3917f44d383c32de6bdabfc836": "v5.13-rc5", + "171f8a49f212e87a8b04087568e1b3d132e36a18": "v6.6-rc1", "17266ee939849cb095ed7dd9edbec4162172226b": "v4.19-rc1", "1728137b33c00d5a2b5110ed7aafb42e7c32e4a1": "v6.5-rc1", "1728ab54b4be94aed89276eeb8e750a345659765": "v5.11-rc1", + "17486960d79b900c45e0bb8fbcac0262848582ba": "v5.13-rc1", "174ab544e3bc0b0c944b8e642618203dd0c2ecdf": "v5.0-rc1", "1756d7994ad85c2479af6ae5a9750b92324685af": "v5.16", "175e476b8cdf2a4de7432583b49c871345e4f8a1": "v5.12-rc5", "17743798d81238ab13050e8e2833699b54e15467": "v5.9-rc4", "1775826ceec51187aa868406585799b7e76ffa7d": "v2.6.26-rc1", + "1775c7ddacfcea29051c67409087578f8f4d751b": "v5.13-rc1", + "177fbbcb4ed6b306c1626a277fac3fb1c495a4c7": "v6.8-rc4", "17839856fd588f4ab6b789f482ed3ffd7c403e1f": "v5.8-rc1", "17926a79320afa9b95df6b977b40cca6d8713cea": "v2.6.22-rc1", "179d1c5602997fef5a940c6ddcf31212cbfebd14": "v4.15-rc5", @@ -355,18 +453,24 @@ "18319498fdd4cdf8c1c2c48cd432863b1f915d6f": "v5.15-rc1", "183b9b592a622a7719ee38e275fd7ff3aaf74d0d": "v2.6.28-rc1", "184b89044fb6e2a74611dafa69b1dce0d98612c6": "v2.6.35-rc1", + "1853c949646005b5959c483becde86608f548f24": "v4.3-rc3", + "18549bf4b21c739a9def39f27dcac53e27286ab5": "v5.16-rc7", "18741986a4b1dc4b1f171634c4191abc3b0fa023": "v3.14-rc3", "1876bb923c98c605eca69f0bfe295f7b5f5eba28": "v2.6.31-rc1", + "1879445dfa7bbd6fe21b09c5cc72f4934798afed": "v4.7-rc1", "187fe84067bd377047cfcb7f2bbc7c9dc12d290c": "v4.2-rc1", "188c517a050ec5b123e72cab76ea213721e5bd9d": "v3.7-rc1", "189b0ddc245139af81198d1a3637cac74f96e13a": "v5.19-rc1", "189ff16722ee36ced4d2a2469d4ab65a8fee4198": "v6.7-rc6", + "18b683bff89d46ace55f12d00c0440d44d6160c4": "v5.7-rc1", "18bba1843fc7f264f58c9345d00827d082f9c558": "v6.2-rc4", "18cb261afd7bf50134e5ccacc5ec91ea16efadd4": "v5.9-rc1", "18dd6470c2d14d10f5a2dd926925dc80dbd3abfd": "v4.19-rc1", "18e2f61db3b708e0a22ccc403cb6ab2203d6faab": "v3.9-rc1", "18e3b739fdc826481c6a1335ce0c5b19b3d415da": "v4.3-rc1", "18ec54fdd6d18d92025af097cd042a75cf0ea24c": "v5.3-rc4", + "18f14afe281648e31ed35c9ad2fcb724c4838ad9": "v6.8-rc1", + "18f25dc399901426dff61e676ba603ff52c666f7": "v5.13-rc1", "18f39e7be0121317550d03e267e3ebd4dbfbb3ce": "v3.17-rc2", "18fc25c94eadc52a42c025125af24657a93638c0": "v3.13-rc4", "193e87143c290ec16838f5368adc0e0bc94eb931": "v4.10-rc1", @@ -375,6 +479,7 @@ "196d67593439b03088913227093e374235596e33": "v3.8-rc1", "197c949e7798fbf28cfadc69d9ca0c2abbf93191": "v4.5-rc1", "197e7e521384a23b9e585178f3f11c9fa08274b9": "v4.13-rc6", + "198bc90e0e734e5f98c3d2833e8390cac3df61b2": "v6.8-rc2", "1995266727fa8143897e89b55f5d3c79aa828420": "v4.15", "1998cc048901109a29924380b8e91bc049b32951": "v3.9-rc1", "19b61392c5a852b4e8a0bf35aecb969983c5932d": "v5.5-rc6", @@ -386,17 +491,23 @@ "19fad20d15a6494f47f85d869f00b11343ee5c78": "v5.1-rc7", "1a0b9d89c62ddf0aed12798686fe452e7e97de42": "v2.6.33-rc1", "1a1a143daf84db95dd7212086042004a3abb7bc2": "v3.19-rc1", + "1a258e670434f404a4500b65ba1afea2c2b29bba": "v4.15-rc1", "1a48e2ac034d47ed843081c4523b63c46b46888b": "v3.5-rc1", "1a5d5e5d51e75a5bca67dadbcea8c841934b7b85": "v4.19-rc1", + "1a73e427b824133940c2dd95ebe26b6dce1cbf10": "v5.12-rc8", "1a7b12f69a9434a766e77c43d113826f0413b032": "v4.19-rc1", "1a87334239757b69eb9885979c32bbf871b3ec88": "v3.7-rc1", "1aa561b1a4c0ae2a9a9b9c21a84b5ca66b4775d8": "v5.9-rc1", "1aa7a5735a41418d8e01fa7c9565eb2657e2ea3f": "v4.17-rc7", + "1ab53a77b772bf7369464a0e4fa6fd6499acf8f1": "v4.10-rc1", "1acb8f2a7a9f10543868ddd737e37424d5c36cf4": "v5.4-rc2", "1acfc104cdf8a3408f0e83b4115d4419c6315005": "v4.14-rc1", + "1ad55cecf22f05f1c884adf63cc09d3c3e609ebf": "v6.8-rc4", "1afc56794e03229fa53cfa3c5012704d226e1dec": "v3.6-rc1", + "1b05ece0c931536c0a38a9385e243a7962e933f6": "v6.0-rc1", "1b1499a817c90fd1ce9453a2c98d2a01cca0e775": "v5.15-rc6", "1b15d2e5b8077670b1e6a33250a0d9577efff4a5": "v3.16-rc1", + "1b28cb81dab7c1eedc6034206f4e8d644046ad31": "v6.6-rc1", "1b2b03f8e514e4f68e293846ba511a948b80243c": "v2.6.27-rc1", "1b42f017415b46c317e71d41c34ec088417a1883": "v5.4-rc8", "1b50b8a371e90a5e110f466e4ac02cf6b5f681de": "v2.6.23-rc1", @@ -405,21 +516,30 @@ "1b66e94e6b9995323190f31c51d8e1a6f516627e": "v3.16-rc1", "1b93a88431470ea0b943157999084d9c7e6e3bd3": "v5.7-rc1", "1b976fc6d684e3282914cdbe7a8d68fdce19095c": "v5.5-rc1", + "1b9dadba502234eea7244879b8d5d126bfaf9f0c": "v5.16-rc8", "1ba5bf993c6a3142e18e68ea6452b347f9cb5635": "v4.8-rc7", + "1baae052cccd08daf9a9d64c3f959d8cdb689757": "v6.8-rc6", "1bb57e940e1958e40d51f2078f50c3a96a9b2d75": "v3.4-rc6", + "1bcad8e510b27ad843315ab2c27ccf459e3acded": "v5.14-rc1", "1bdc76aea1159a750846c2fc98e404403eb7d51c": "v4.8-rc1", "1be7107fbe18eed3e319a6c3e83c78254b693acb": "v4.12-rc6", "1be7f75d1668d6296b80bf35dcf6762393530afc": "v4.4-rc1", "1be9a950c646c9092fb3618197f7b6bfb50e82aa": "v3.16", "1bfad99ab42569807d0ca1698449cae5e8c0334a": "v4.3-rc1", "1bff51ea59a9afb67d2dd78518ab0582a54a472c": "v5.16-rc1", + "1c099ab44727c8e42fe4de4d91b53cec3ef02860": "v5.12-rc1-dontuse", + "1c0cf6d19690141002889d72622b90fc01562ce4": "v6.8-rc7", "1c0edc3633b56000e18d82fc241e3995ca18a69e": "v4.14-rc6", "1c109fabbd51863475cd12ac206bdd249aee35af": "v4.8-rc7", "1c1bcf2d3ea061613119b534f57507c377df20f9": "v6.4-rc6", "1c22e0295a5eb571c27b53c7371f95699ef705ff": "v6.7-rc3", + "1c26372e5aa9e53391a1f8fe0dc7cd93a7e5ba9e": "v5.10-rc1", + "1c29fc4989bc2a3838b2837adc12b8aeb0feeede": "v2.6.17-rc4", + "1c357a1e86a4227a6b6059f2de118ae47659cebc": "v4.6-rc1", "1c668e1c0a0f74472469cd514f40c9012b324c31": "v5.12-rc4", "1c728719a4da6e654afb9cc047164755072ed7c9": "v5.11-rc1", "1c885808e45601b2b6f68b30ac1d999e10b6f606": "v4.10-rc1", + "1c9be13846c0b2abc2480602f8ef421360e1ad9e": "v6.8-rc6", "1c9e8def43a3452e7af658b340f5f4f4ecde5c38": "v4.11-rc1", "1cb3db1cf383a3c7dbda1aa0ce748b0958759947": "v5.14-rc2", "1cc5ef91d2ff94d2bf2de3b3585423e8a1051cb6": "v5.9-rc7", @@ -428,13 +548,17 @@ "1d0f3ce83200edc5d43723c77c62b09ad6560294": "v2.6.33-rc1", "1d10eb2f156f5fc83cf6c7ce60441592e66eadb3": "v4.0-rc1", "1d147bfa64293b2723c4fec50922168658e613ba": "v3.14-rc6", + "1d1d1a767206fbe5d4c69493b7e6d2a8d08cc0a0": "v3.9-rc1", "1d24eb4815d1e0e8b451ecc546645f8ef1176d4f": "v2.6.38-rc1", + "1d3173a3bae7039b765a0956e3e4bf846dbaacb8": "v5.7-rc1", "1d3ff0950e2b40dc861b1739029649d03f591820": "v5.1-rc4", "1d5d48523900a4b0f25d6b52f1a93c84bd671186": "v4.3-rc1", "1d605416fb7175e1adf094251466caa52093b413": "v5.7", + "1d72d9f960ccf1052a0630a68c3d358791dbdaaa": "v5.16-rc7", "1d85a299c4db57c55e0229615132c964d17aa765": "v5.4-rc8", "1d8d80b4e4ff641eefa5250cba324dfa5861a9f1": "v5.3-rc1", "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2": "v2.6.12-rc2", + "1dbc6a1e25be8575d6c4114d1d2b841a796507f7": "v5.13-rc1", "1df2ae31c724e57be9d7ac00d78db8a5dabdd050": "v3.5-rc5", "1df79cb3bae754e4a42240f9851ed82549a44f1a": "v4.14-rc6", "1e08ec4a130e2745d96df169e67c58df98a07311": "v3.7-rc1", @@ -443,23 +567,31 @@ "1e2bd517c108816220f262d7954b697af03b5f9c": "v3.10-rc5", "1e38da300e1e395a15048b0af1e5305bd91402f6": "v4.11-rc1", "1e3921471354244f70fe268586ff94a97a6dd4df": "v4.14-rc8", + "1e560864159d002b453da42bd2c13a1805515a20": "v6.8-rc3", "1e58252e334dc3f3756f424a157d1b7484464c40": "v5.5-rc3", + "1e5c37385097c35911b0f8a0c67ffd10ee1af9a2": "v5.13-rc3", "1e65b81a90df50bf450193065cc9073b706b8dda": "v3.18-rc1", "1e6fa5216a0e59ef02e8b6b40d553238a3b81d49": "v5.10-rc1", "1e7126b4a86ad69e870099fb6b922a3b6e29598b": "v4.15-rc1", "1e7417c188d0a83fb385ba2dbe35fd2563f2b6f3": "v6.5-rc5", + "1e777f39b4d75e599a3aac8e0f67d739474f198c": "v6.2-rc1", "1e866afd4bcdd01a70a5eddb4371158d3035ce03": "v6.1-rc1", "1e87a2456b0227ca4ab881e19a11bb99d164e792": "v3.12-rc1", + "1e97743fd180981bef5f01402342bb54bf1c6366": "v5.13-rc1", "1e98ffea5a8935ec040ab72299e349cb44b8defd": "v4.16-rc1", "1e9ac114c4428fdb7ff4635b45d4f46017e8916f": "v6.3-rc4", "1ebb71143758f45dc0fa76e2f48429e13b16d110": "v4.10-rc4", "1ebb7cc6a58321a4b22c4c9097b4651b0ab859d0": "v3.12-rc1", + "1ecd5b129252249b9bc03d7645a7bda512747277": "v5.13-rc1", "1ee0a224bc9aad1de496c795f96bc6ba2c394811": "v3.8-rc5", "1ef6f7c9390ff5308c940ff8d0a53533a4673ad9": "v5.10-rc1", + "1f11f4202caf5710204d334fe63392052783876d": "v6.6-rc1", "1f1ea6c2d9d8c0be9ec56454b05315273b5de8ce": "v3.6-rc6", "1f23a56a46b81de50eb8b898f06296ca06720a99": "v4.20-rc1", "1f3e2e97c003f80c4b087092b225c8787ff91e4d": "v5.15-rc6", "1f461dcdd296eecedaffffc6bae2bfa90bd7eb89": "v4.6-rc1", + "1f4642b72be79757f050924a9b9673b6a02034bc": "v5.13-rc2", + "1f4a08fed450db87fbb5ff5105354158bdbe1a22": "v6.5-rc1", "1f522509c77a5dea8dc384b735314f03908a6415": "v2.6.35-rc1", "1f65ea411cc7b6ff128d82a3493d7b5648054e6f": "v6.1-rc3", "1f7c51660034091dc134fcc534b7f1fa86a6e823": "v3.18-rc1", @@ -469,12 +601,15 @@ "1fc29bacedeabb278080e31bb9c1ecb49f143c3b": "v3.10-rc5", "1fd819ecb90cc9b822cd84d3056ddba315d3340f": "v3.14-rc7", "1ffb3c40ffb5c51bc39736409b11816c4260218e": "v4.9-rc7", + "1ffec389a6431782a8a28805830b6fae9bf00af1": "v5.13-rc1", "201f99f170df14ba52ea4c52847779042b7a623b": "v3.12", "20224d715a882210428ea62bba93f1bc4a0afe23": "v5.11-rc1", "20401d1058f3f841f35a594ac2fc1293710e55b9": "v5.15-rc1", "2056a782f8e7e65fd4bfd027506b4ce1c5e9ccd4": "v2.6.17-rc1", "206204a1162b995e2185275167b22468c00d6b36": "v3.16-rc3", + "206c857dd17d4d026de85866f1b5f0969f2a109e": "v6.8-rc1", "20714bfef84d3e690c9c6f8e9cd46543b5ae1eed": "v3.8-rc1", + "2087e85bb66ee3652dafe732bb9b9b896229eafc": "v6.4-rc1", "20aedafdf4926e7a957f8b302a18c8fb75c7e332": "v5.1-rc1", "20b2aff4bc15bda809f994761d5719827d66c0b4": "v5.17-rc1", "20c40794eb85ea29852d7bc37c55713802a543d6": "v5.12-rc3", @@ -492,21 +627,27 @@ "219ca39427bf6c46c4e1473493e33bc00635e99b": "v3.18-rc1", "21a87d88c2253350e115029f14fe2a10a7e6c856": "v6.1-rc1", "21b5944350052d2583e82dd59b19a9ba94a007f0": "v4.15-rc5", + "21d808405fe49028036932dd969920f4fee4f481": "v5.0-rc1", "21da57a23125a072e6ab2bb6c9bea5e02e01d1f5": "v4.19-rc1", "21e726c4a3625a1038e97795b7aad97109ba7e19": "v3.17-rc1", "21f8aaee0c62708654988ce092838aa7df4d25d8": "v3.14-rc6", "22076557b07c12086eeb16b8ce2b0b735f7a27e7": "v4.17-rc6", "221c5eb2338232f7340386de1c43decc32682e58": "v5.1-rc1", + "22207fd5c80177b860279653d017474b2812af5e": "v6.9-rc1", "2225e79b9b0370bc179f44756bee809b5e7b4d06": "v4.1-rc1", + "223125e37af8a641ea4a09747a6a52172fc4b903": "v5.13-rc1", "223b02d923ecd7c84cf9780bb3686f455d279279": "v3.15-rc1", + "2251334dcac9eb337575d8767e2a6a7e81848f7f": "v5.3-rc1", "2256c1c51e98d4eb2063a7f84f9ea783fda95f7f": "v3.12-rc1", "226fae124b2dac217ea5436060d623ff3385bc34": "v6.2-rc7", "2287a51ba822384834dafc1c798453375d1107c7": "v5.15-rc1", "2289adbfa559050d2a38bcd9caac1c18b800e928": "v5.5-rc1", + "229007e02d697b0662f85378aae53531b0dfea05": "v5.8-rc1", "22a677661f5624539d394f681276171f92d714df": "v4.11-rc1", "22c7652cdaa8cd33ce78bacceb4e826a3f795873": "v5.2-rc1", "22c7fa171a02d310e3a3f6ed46a698ca8a0060ed": "v6.8-rc1", "22cf8419f1319ff87ec759d0ebdff4cbafaee832": "v5.8-rc4", + "22e4ebb975822833b083533035233d128b30e98f": "v4.14-rc1", "22ed903eee23a5b174e240f1cdfa9acf393a5210": "v6.4-rc1", "22f6b4d34fcf039c63a94e7670e0da24f8575a5a": "v4.8-rc7", "22fe5b0439dd53643fd6f4c582c46c6dba0fde53": "v5.5-rc1", @@ -515,6 +656,7 @@ "233295130e53c8dfe6dbef3f52634c3f7e44cd6a": "v5.10-rc1", "234f3ce485d54017f15cf5e0699cff4100121601": "v3.18-rc2", "23528bb21ee2c9b27f3feddd77a2a3351a8df148": "v4.8-rc1", + "23529049c68423820487304f244144e0d576e85a": "v5.10-rc7", "23567fd052a9abb6d67fe8e7a9ccdd9800a540f2": "v4.5-rc1", "236db47c2b3b69464d50c695ab2ddd516cf64520": "v2.6.35-rc1", "237bbd29f7a049d310d907f4b2716a7feef9abf3": "v4.14-rc3", @@ -524,6 +666,7 @@ "23b133bdc452aa441fcb9b82cbf6dd05cfd342d0": "v4.0-rc1", "23c20ecd44750dd42e5fd53285a17ca8d8a9b0a3": "v3.7-rc1", "23c8a812dc3c621009e4f0e5342aa4e2ede1ceaa": "v4.6", + "23ceb8462dc6f4b4decdb5536a7e5fc477cdf0b6": "v5.13-rc1", "23d05d563b7e7b0314e65c8e882bc27eac2da8e7": "v6.7-rc6", "23d2b94043ca8835bd1e67749020e839f396a1c2": "v5.15-rc1", "23da9588037ecdd4901db76a5b79a42b529c4ec3": "v5.1-rc3", @@ -533,32 +676,42 @@ "2406a307ac7ddfd7effeeaff6947149ec6a95b4e": "v5.6-rc1", "24138933b97b055d486e8064b4a1721702442a9b": "v6.5-rc6", "241699cd72a8489c9446ae3910ddd243e9b9061b": "v4.9-rc1", + "2417b9869b81882ab90fd5ed1081a1cb2d4db1dd": "v5.13-rc1", "2423496af35d94a87156b063ea5cedffc10a70a1": "v4.12-rc2", "2433c8f094a008895e66f25bd1773cdb01c91d01": "v3.12-rc4", + "243aad830e8a4cdda261626fbaeddde16b08d04a": "v2.6.34-rc3", + "2449007d3f73b2842c9734f45f0aadb522daf592": "v6.8-rc7", "244d00b5dd4755f8df892c86cab35fb2cfd4f14b": "v5.17-rc8", "245500d853e9f20036cec7df4f6984ece4c6bf26": "v5.10-rc1", "24669e58477e2752c1fbca9c1c988e9dd0d79d15": "v3.6-rc1", "246c320a8cfe0b11d81a4af38fa9985ef0cc9a4c": "v5.8-rc7", + "246f80a0b17f8f582b2c0996db02998239057c65": "v6.6-rc1", "24b9bf43e93e0edd89072da51cf1fab95fc69dec": "v3.14-rc7", "24d7275ce2791829953ed4e72f68277ceb2571c6": "v5.17-rc4", "24e227896bbf003165e006732dccb3516f87f88e": "v6.4-rc6", "24e5c40130c29bed0fbfbcc9c23613ae6ffc4c0a": "v2.6.27-rc1", "24e90b9e34f9e039f56b5f25f6e6eb92cdd8f4b3": "v6.7-rc6", + "24ea50127ecf0efe819c1f6230add27abc6ca9d9": "v6.6-rc1", "24f6008564183aa120d07c03d9289519c2fe02af": "v5.17-rc3", "2507e6ab7a9a440773be476141a255934468c5ef": "v5.3", "250c6c49e3b68756b14983c076183568636e2bde": "v4.16-rc5", "251e22abde21833b3d29577e4d8c7aaccd650eee": "v4.7-rc1", + "25236c91b5ab4a26a56ba2e79b8060cf4e047839": "v6.8-rc5", + "2535b848fa0f42ddff3e5255cf5e742c9b77bb26": "v6.8-rc7", "253f4911f297b83745938b7f2c5649b94730b002": "v4.7-rc1", "2555283eb40df89945557273121e9393ef9b542b": "v6.0-rc4", + "25563b581ba3a1f263a00e8c9a97f5e7363be6fd": "v6.6-rc5", "2568a7e0832ee30b0a351016d03062ab4e0e0a3f": "v6.1-rc1", "256a90ed9e46b270bbc4e15ef05216ff049c3721": "v4.20-rc1", "256df2f3879efdb2e9808bdb1b54b16fbb11fa38": "v2.6.36-rc1", "257b5358b32f17e0603b6ff57b13610b0e02348f": "v2.6.36-rc1", "25c150ac103a4ebeed0319994c742a90634ddf18": "v6.4-rc1", + "25c6ffb249f612c56a48ce48a3887adf57b8f4bd": "v4.7-rc1", "25fdd5933e4c0f5fe2ea5cd59994f8ac5fbe90ef": "v4.19-rc1", "2638fd0f92d4397884fd991d8f4925cb3f081901": "v4.11-rc7", "263b4509ec4d47e0da3e753f85a39ea12d1eff24": "v3.14-rc1", "265b4da82dbf5df04bee5a5d46b7474b1aaf326a": "v6.3-rc1", + "265c3491c4bc8d40587996d6ee2f447a7ccfb4f3": "v5.5-rc1", "265e60a170d0a0ecfc2d20490134ed2c48dd45ab": "v4.14-rc5", "26634c4b1868323f49f8cd24c3493b57819867fd": "v3.10-rc1", "2665abfd757fb35a241c6f0b1ebf620e3ffb36fb": "v5.5-rc1", @@ -566,6 +719,7 @@ "2677d20677314101293e6da0094ede7b5526d2b1": "v4.17-rc7", "26896f01467a28651f7a536143fe5ac8449d4041": "v5.9-rc1", "2690d97ade05c5325cbf7c72b94b90d265659886": "v3.13-rc8", + "26a8b09437804fabfb1db080d676b96c0de68e7c": "v5.16-rc7", "26b5b874aff5659a7e26e5b1997e3df2c41fa7fd": "v4.18-rc4", "26b87c7881006311828bb0ab271a551a62dcceb4": "v3.18-rc1", "26bef1318adc1b3a530ecc807ef99346db2aa8b0": "v3.13", @@ -580,9 +734,15 @@ "273ec51dd7ceaa76e038875d85061ec856d8905e": "v2.6.30-rc1", "27463ad99f738ed93c7c8b3e2e5bc8c4853a2ff2": "v4.13-rc1", "276bdb82dedb290511467a5a4fdbe9f0b52dce6f": "v3.6-rc3", + "2774f256e7c0219e2b0a0894af1c76bdabc4f974": "v6.8-rc7", "2777e654371dd4207a3a7f4fb5fa39550053a080": "v5.2-rc1", + "27876a29de221186c9d5883e5fe5f6da18ef9a45": "v3.0-rc1", + "278e5bbdb9a94fa063c0f9bcde2479d0b8042462": "v5.13-rc1", "27ae357fa82be5ab73b2ef8d39dcb8ca2563483a": "v4.17-rc5", "27d461333459d282ffa4a2bdb6b215a59d493a8f": "v5.5-rc1", + "27d5c528a7ca08dcd44877fdd9fc08b76630bf77": "v5.10-rc1", + "27e56f59bab5ddafbcfe69ad7a4a6ea1279c1b16": "v6.8-rc1", + "28044fc1d4953b07acec0da4d2fc4784c57ea6fb": "v6.1-rc1", "280a8ab81733da8bc442253c700a52c4c0886ffd": "v6.4-rc3", "2811ebac2521ceac84f2bdae402455baa6a7fb47": "v3.12-rc4", "282a4b71816b6076029017a7bab3a9dcee12a920": "v6.2-rc1", @@ -592,14 +752,19 @@ "2896900e22f8212606a1837d89a6bbce314ceeda": "v5.12", "2896c93811e39d63a4d9b63ccf12a8fbc226e5e4": "v5.11-rc4", "28a1295795d85a25f2e7dd391c43969e95fcb341": "v6.6-rc1", + "28ac8e03c43dfc6a703aa420d18222540b801120": "v5.13-rc1", "28d76df18f0ad5bcf5fa48510b225f0ed262a99b": "v5.5-rc7", "28d82dc1c4edbc352129f97f4ca22624d1fe61de": "v3.3-rc1", + "28dd788382c43b330480f57cd34cde0840896743": "v6.8-rc1", "28ebeb8db77035e058a510ce9bd17c2b9a009dba": "v5.8-rc3", "28f5a8a7c033cbf3e32277f4cc9c6afd74f05300": "v4.15-rc1", "28fb4e59a47d7f1f0c7a26d2ed3a671c26158536": "v4.18-rc1", "2908d778ab3e244900c310974e1fc1c69066e450": "v2.6.19-rc1", "291bd20d5d88814a73d43b55b9428feab2f28094": "v5.11-rc1", + "29249eac5225429b898f278230a6ca2baa1ae154": "v5.13-rc4", + "29346e217b8ab8a52889b88f00b268278d6b7668": "v6.6-rc4", "294f2fc6da27620a506e6c050241655459ccd6bd": "v5.7-rc1", + "295b02c4be74bebf988593b8322369513fcecf68": "v5.10-rc1", "295dc39d941dc2ae53d5c170365af4c9d5c16212": "v3.16-rc7", "297502abb32e225fb23801fcdb0e4f6f8e17099a": "v3.12-rc2", "297a6961ffb8ff4dc66c9fbf53b924bd1dda05d5": "v4.16-rc1", @@ -608,32 +773,43 @@ "299d7572e46f98534033a9e65973f13ad1ce9047": "v4.14-rc5", "29b0589a865b6f66d141d79b2dd1373e4e50fe17": "v6.3-rc1", "29bc22ac5e5bc63275e850f0c8fc549e3d0e306b": "v5.16-rc1", + "29bcff787a2593b2126cfaff612c0b4e560022e9": "v5.10-rc1", + "29c2680fd2bf3862ff5cf2957f198512493156f9": "v5.10-rc3", "29cd13cfd7624726d9e6becbae9aa419ef35af7f": "v5.4-rc6", "29cd8ae0e1a39e239a3a7b67da1986add1199fc0": "v3.9-rc3", "29d3c1c8dfe752c01b7115ecd5a3142b232a38e1": "v5.4-rc1", "29eb31542787e1019208a2e1047bb7c76c069536": "v5.17-rc2", "29fa6825463c97e5157284db80107d1bfac5d77b": "v3.19-rc1", "2a017fd82c5402b3c8df5e3d6e5165d9e6147dc1": "v5.3-rc1", + "2a15ba82fa6ca3f35502b3060f22118a938d2889": "v5.11-rc1", "2a2336f8228292b8197f4187e54b0748903e6645": "v2.6.28-rc1", "2a285686c109816ba71a00b9278262cf02648258": "v3.15-rc1", "2a2f11c227bdf292b3a2900ad04139d301b56ac4": "v2.6.20-rc5", "2a3f7221acddfe1caa9ff09b3a8158c39b2fdeac": "v5.1-rc6", + "2a427b49d02995ea4a6ff93a1432c40fa4d36821": "v6.8-rc4", + "2a57d83c78f889bf3f54eede908d0643c40d5418": "v5.16-rc7", "2a69c450083db164596c75c0f5b4d9c4c0e18eba": "v6.5-rc1", "2a8859f373b0a86f0ece8ec8312607eacf12485d": "v5.18-rc1", + "2a9de42e8d3c82c6990d226198602be44f43f340": "v6.8-rc1", "2aa362c49c314a98fb9aebbd7760a461667bac05": "v3.7-rc1", "2ac061ce97f413bfbbdd768f7d2e0fda2e8170df": "v5.5-rc1", "2ac863719e518ae1a8f328849e64ea26a222f079": "v3.2-rc1", + "2acc59dd88d27ad69b66ded80df16c042b04eeec": "v6.8-rc1", "2acf923e38fb6a4ce0c57115decbb38d334902ac": "v2.6.36-rc1", "2ad3e17ebf94b7b7f3f64c050ff168f9915345eb": "v5.6-rc4", + "2ad5692db72874f02b9ad551d26345437ea4f7f3": "v5.13-rc1", "2ad7bf3638411cb547f2823df08166c13ab04269": "v3.19-rc1", + "2adc886244dff60f948497b59affb6c6ebb3c348": "v6.8-rc1", "2add87a95068d6457d4e5824d0417d39007665a4": "v2.6.12-rc5", "2ae0f17df1cd52aafd1ab0415ea1f1dd56dc0e2a": "v4.10-rc1", + "2ae50ad68cd79224198b525f7bd645c9da98b6ff": "v5.5-rc1", "2b09d5d364986f724f17001ccfe4126b9b43a0be": "v6.2-rc7", "2b0a576d15e0e14751f00f9c87e46bad27f217e7": "v3.9-rc1", "2b1299322016731d56807aa49254a5ea3080b6b3": "v6.0-rc1", "2b13d06c9584b4eb773f1e80bbaedab9a1c344e1": "v3.12-rc7", "2b17c400aeb44daf041627722581ade527bb3c1d": "v5.13-rc4", "2b188cc1bb857a9d4701ae59aa7768b5124e262e": "v5.1-rc1", + "2b44760609e9eaafc9d234a6883d042fc21132a7": "v6.8-rc2", "2b6867c2ce76c596676bec7d2d525af525fdc6e2": "v4.11-rc6", "2b7e8665b4ff51c034c55df3cff76518d1a9ee3a": "v4.13-rc7", "2b82032c34ec40515d3c45c36cd1961f37977de8": "v2.6.29-rc1", @@ -646,29 +822,36 @@ "2bbe6ab2be53858507f11f99f856846d04765ae3": "v6.8-rc1", "2bc780499aa33311ec0f3e42624dfaa7be0ade5e": "v2.6.26-rc1", "2c02d41d71f90a5168391b6a5f2954112ba2307c": "v6.2-rc3", + "2c04c5b8eef797dca99699cfb55ff42dd3c12c23": "v5.1-rc1", "2c10b61421a28e95a46ab489fd56c0f442ff6952": "v6.2", "2c1f6951a8a82e6de0d82b1158b5e493fc6c54ab": "v4.6-rc6", "2c212e1baedcd782b2535a3f86bc491977677c0e": "v5.17-rc4", "2c2bf01136971c33e3b3fabce23925f372c1017e": "v3.10-rc1", "2c4306f719b083d17df2963bc761777576b8ad1b": "v4.17-rc4", "2c5816b4beccc8ba709144539f6fdd764f8fa49c": "v4.4-rc5", + "2c58c3931ede7cd08cbecf1f1a4acaf0a04a41a9": "v6.6-rc2", "2c653d0ee2ae78ff3a174cc877a057c8afac7069": "v4.13-rc1", + "2c662660ce2bd3b09dae21a9a9ac9395e1e6c00b": "v5.13-rc1", "2ca13a4cc56c920a6c9fc8ee45d02bccacd7f46c": "v5.11-rc1", "2ca39528c01a933f6689cd6505ce65bd6d68a530": "v3.9-rc3", "2ca492e22cb70a001749377506bd22eb06f60ecc": "v4.9-rc1", "2cb33cac622afde897aa02d3dcd9fbba8bae839e": "v3.11-rc1", "2cb80187ba065d7decad7c6614e35e07aec8a974": "v4.14", + "2ce156482a6fef349d2eba98e5070c412d3af662": "v6.8-rc1", "2ceb76f734e37833824b7fab6af17c999eb48d2b": "v6.3-rc6", "2d07dc79fe04a43d82a346ced6bbf07bdb523f1b": "v4.2-rc1", "2d2699d984924890f6dac8cf51c3b6311f56816c": "v2.6.22-rc1", "2d281d8196e38dd3a4ee9af26621ddde8329f269": "v3.13-rc1", "2d3916f3189172d5c69d33065c3c21119fe539fc": "v5.17-rc7", "2d3a8e2deddea6c89961c422ec0c5b851e648c14": "v5.8-rc2", + "2d4238f5569722197612656163d824098208519c": "v5.5-rc1", "2d45a02d0166caf2627fe91897c6ffc3b19514c4": "v4.2-rc1", "2d53139f31626bad6f8983d8e519ddde2cbba921": "v3.16-rc1", + "2d5446da5acecf9c67db1c9d55ae2c3e5de01f8d": "v5.16-rc7", "2d6a0e9de03ee658a9adc3bfb2f0ca55dff1e478": "v4.10-rc8", "2d6fbfe733f35c6b355c216644e08e149c61b271": "v3.9-rc7", "2d8a041b7bfe1097af21441cb77d6af95f4f4680": "v3.6-rc3", + "2d9a93b4902be6a5504b5941dd15e9cd776aadca": "v5.13-rc1", "2da424b0773cea3db47e1e81db71eeebde8269d4": "v3.4-rc1", "2dc705a9930b4806250fbf5a76e55266e59389f2": "v4.10-rc6", "2dcab598484185dea7ec22219c76dcdd59e3cb90": "v4.10-rc8", @@ -686,12 +869,17 @@ "2e4e6a17af35be359cc8f1c924f8f198fbd478cc": "v2.6.16-rc1", "2e54154b9f27262efd0cb4f903cc7d5ad1fe9628": "v6.5-rc1", "2e7682ebfc750177a4944eeb56e97a3f05734528": "v5.2-rc1", + "2e7d3b67630dfd8f178c41fa2217aa00e79a5887": "v6.8-rc4", "2e7eab81425ad6c875f2ed47c0ce01e78afc38a5": "v6.2-rc1", + "2e7ef287f07c74985f1bf2858bedc62bd9ebf155": "v6.8-rc1", "2e83b79b2d6c78bf1b4aa227938a214dcbddc83f": "v4.6-rc1", "2e90ca68b0d2f5548804f22f0dd61145516171e3": "v5.6-rc4", "2ec220e27f5040aec1e88901c1b6ea3d135787ad": "v2.6.29-rc1", + "2ee3757424be7c1cd1d0bbfa6db29a7edd82a250": "v5.13-rc1", "2ee52ae94baabf7ee09cf2a8d854b990dac5d0e4": "v6.6-rc1", "2ee824026288eb7068e6327c5f34b8ddbea74094": "v4.19-rc1", + "2efc2256febf214e7b2bdaa21fe6c3c3146acdcb": "v5.16-rc7", + "2f03fc340cac9ea1dc63cbf8c93dd2eb0f227815": "v6.8-rc7", "2f1a6be12ab6c8470d5776e68644726c94257c54": "v6.3-rc5", "2f2aa13724d56829d910b2fa8e80c502d388f106": "v5.7-rc1", "2f2d0088eb93db5c649d2a5e34a3800a8a935fc5": "v4.15-rc4", @@ -704,11 +892,13 @@ "2fcf4876ada8a293d3b92a1033b8b990a7c613d3": "v5.10-rc1", "2fd36558f02c0606768929fc77671716680d01c2": "v4.2-rc1", "2febc839133280d5a5e8e1179c94ea674489dae2": "v3.18-rc2", + "2ff25985ea9ccc6c9af2c77b0b49045adcc62e0e": "v5.13-rc1", "2ff4bed7fee72ba1abfcff5f11ae8f8e570353f2": "v6.2-rc1", "3010a0663fd949d122eca0561b06b0a9453f7866": "v4.16-rc4", "3015f3d2a3cd9614294025849d3ed89fd2f3a7f5": "v3.7-rc5", "30210947a343b6b3ca13adc9bfc88e1543e16dd5": "v6.4-rc1", "3021ad9a4f009265e6063e617fb91306980af16c": "v4.5-rc1", + "3027e7b15b02d2d37e3f82d6b8404f6d37e3b8cf": "v6.8-rc1", "302d3deb20682a076e1ab551821cacfdc81c5e4f": "v4.7-rc1", "3037933448f60f9acb705997eae62013ecb81e0d": "v6.3", "303911cfc5b95d33687d9046133ff184cf5043ff": "v5.3-rc5", @@ -716,6 +906,7 @@ "30572418b445d85fcfe6c8fe84c947d2606767d8": "v4.11-rc2", "307c8de2b02344805ebead3440d8feed28f2f010": "v5.19-rc6", "307f2fb95e9b96b3577916e73d92e104f8f26494": "v3.11-rc1", + "3093ee182f01689b89e9f8797b321603e5de4f63": "v5.13-rc1", "309795f4bec2d69cd507a631f82065c2198a0825": "v2.6.35-rc1", "30a46a4647fd1df9cf52e43bf467f0d9265096ca": "v4.7-rc7", "30a61ddf8117c26ac5b295e1233eaa9629a94ca3": "v4.12-rc1", @@ -724,7 +915,10 @@ "30b678d844af3305cda5953467005cebb5d7b687": "v3.6-rc2", "30cf57da176cca80f11df0d9b7f71581fe601389": "v6.4-rc1", "30e29a9a2bc6a4888335a6ede968b75cd329657a": "v5.15-rc5", + "30e3b4f256b4e366a61658c294f6a21b8626dda7": "v5.12-rc8", "30f7ea1c2b5f5fb7462c5ae44fe2e40cb2d6a474": "v4.4-rc1", + "30fdfb929e82450bbf3d0e0aba56efbc29b52b52": "v4.13-rc1", + "31166efb1cee348eb6314e9c0095d84cbeb66b9d": "v5.12-rc8", "31185df7e2b1d2fa1de4900247a12d7b9c7087eb": "v5.17-rc8", "3118a4f652c7b12c752f3222af0447008f9b2368": "v3.9-rc4", "314001f0bf927015e459c9d387d62a231fe93af3": "v5.15-rc1", @@ -732,14 +926,20 @@ "3148bf041d169a083aa31bd69bedd5bfb7ffe215": "v3.2-rc1", "3151527ee007b73a0ebd296010f1c0454a919c7d": "v3.9-rc5", "315409b0098fb2651d86553f0436b70502b29bb2": "v4.19-rc1", + "315552310c7de92baea4e570967066569937a843": "v6.8-rc1", "315cd67c9453": "v5.3-rc1", + "31651c607151f1034cfb57e5a78678bea54c362b": "v4.19-rc1", "316ec154810960052d4586b634156c54d0778f74": "v5.7-rc4", "317eb9685095678f2c9f5a8189de698c5354316a": "v6.7-rc5", "318aaf34f1179b39fa9c30fa0f3288b645beee39": "v4.16-rc7", "3194c6870158e305dac2af52f83681e9cb67280f": "v4.4-rc1", "31978b5cc66b8ba8a7e8eef60b12395d41b7b890": "v3.13-rc4", "31ad169148df2252a774c73c504aff43bfa4b656": "v3.16-rc1", + "31b62908693c90d4d07db597e685d9f25a120073": "v6.8-rc1", + "31c07dffafce914c1d1543c135382a11ff058d93": "v6.6-rc6", + "31db78a4923ef5e2008f2eed321811ca79e7f71b": "v6.6-rc5", "31e0456de5be379b10fea0fa94a681057114a96e": "v5.2-rc3", + "31fe34a0118e0acc958c802e830ad5d37ef6b1d3": "v5.13-rc1", "32021982a324dce93b4ae00c06213bf45fb319c8": "v5.1-rc1", "320b2b8de12698082609ebbc1a17165727f4c893": "v2.6.36-rc1", "321027c1fe77f892f4ea07846aeae08cefbbb290": "v4.10-rc4", @@ -754,11 +954,17 @@ "32a4f5ecd7381f30ae3bb36dea77a150ba68af2e": "v4.19-rc1", "32b55c5ff9103b8508c1e04bfa5a08c64e7a925f": "v6.8-rc5", "32c231164b762dddefa13af5a0101032c70b50ef": "v4.9-rc7", + "32ce3bb57b6b402de2aec1012511e7ac4e7449dc": "v6.8-rc7", "32d43cd391bacb5f0814c2624399a5dad3501d09": "v4.16-rc7", "32e9f56a96d8d0f23cb2aeb2a3cd18d40393e787": "v5.16-rc1", "32ecc75ded72e0425713a7ffe2050fef6e54e564": "v4.12-rc1", + "32f0a6ddc8c98a1aade2bf3d07c79d5d2c6ceb9a": "v5.5-rc1", + "32f2a0afa95fae0d1ceec2ff06e0e816939964b8": "v6.8-rc2", + "333980481b99edb24ebd5d1a53af70a15d9146de": "v5.13-rc1", "3347acc6fcd4ee71ad18a9ff9d9dac176b517329": "v5.10-rc4", "335178d5429c4cee61b58f4ac80688f556630818": "v5.5-rc7", + "335a127548081322bd2b294d715418648912f20c": "v4.9-rc1", + "337cebbd850f94147cee05252778f8f78b8c337f": "v6.8-rc5", "33842cedfc33ee907b2a702f321a26f7c0bf0aaa": "v3.1-rc1", "338c7dbadd2671189cec7faf64c84d01071b3f96": "v3.13-rc4", "338f977f4eb441e69bb9a46eaa0ac715c931a67f": "v3.14-rc3", @@ -772,18 +978,27 @@ "3450121997ce872eb7f1248417225827ea249710": "v5.2", "345023b0db315648ccc3c1a36aee88304a8b4d91": "v5.12-rc1-dontuse", "345c0dbf3a30872d9b204db96b5857cd00808cae": "v5.2-rc1", + "34796417964b8d0aef45a99cf6c2d20cebe33733": "v5.16-rc7", + "349d43127dac00c15231e8ffbcaabd70f7b0e544": "v5.16-rc8", + "34ab17cc6c2c1ac93d7e5d53bb972df9a968f085": "v5.13-rc1", "34b2cef20f19c87999fff3da4071e66937db9644": "v4.10-rc8", "34b3be18a04ecdc610aae4c48e5d1b799d8689f6": "v5.4-rc3", "34b88a68f26a75e4fded796f1a49c40f82234b7d": "v4.6-rc1", "34beb21594519ce64a55a498c2fe7d567bc1ca20": "v5.9-rc7", + "34cf99c250d5cd2530b93a57b0de31d3aaf8685b": "v6.6-rc3", "34d2f9bf189c36ef8642cf6b64e80dfb756d888f": "v2.6.34-rc1", + "34e37b4c432cd0f1842b352fde4b8878b4166888": "v5.19-rc1", "34e5b01186858b36c4d7c87e1a025071e8e2401f": "v5.13-rc1", + "34f35f8f14bc406efc06ee4ff73202c6fd245d15": "v5.16-rc7", "350a5c4dd2452ea999cc5e1d4a8dbf12de2f97ef": "v5.12-rc5", "350b8bdd689cd2ab2c67c8a86a0be86cfa0751a7": "v3.17-rc2", "353050be4c19e102178ccc05988101887c25ae53": "v5.16-rc2", "35306eb23814444bd4021f8a1c3047d3cb0c8b2b": "v5.15-rc4", + "3536169f8531c2c5b153921dc7d1ac9fd570cda7": "v5.13-rc1", "353c0956a618a07ba4bbe7ad00ff29fe70e8412a": "v5.0-rc6", + "353d321f63f7dbfc9ef58498cc732c9fe886a596": "v6.8-rc4", "353f7988dd8413c47718f7ca79c030b6fb62cfe5": "v5.19-rc8", + "354a6e707e29cb0c007176ee5b8db8be7bd2dee0": "v6.6-rc6", "35538d7822e86cb38015c21bb708a433f8814af0": "v4.9-rc1", "35556bed836f8dc07ac55f69c8d17dce3e7f0e25": "v5.9-rc4", "3557baabf28088f49bdf72a048fd33ab62e205b1": "v2.6.23-rc1", @@ -795,14 +1010,19 @@ "3573e22cfecaac83f82ef4f6847d90e466fc8e10": "v3.16-rc1", "357b40a18b04c699da1d45608436e9b76b50e251": "v2.6.12-rc3", "3592aaeb80290bda0f2cf0b5456c97bfc638b192": "v3.6-rc3", + "359e54a93ab43d32ee1bff3c2f9f10cb9f6b6e79": "v6.8-rc6", "35a79a63517981a8aea395497c548776347deda8": "v5.4-rc5", + "35b4f24415c854cd718ccdf38dbea6297f010aae": "v5.13-rc1", "35c55c9877f8de0ab129fa1a309271d0ecc868b9": "v4.8-rc1", "35c55fc156d85a396a975fc17636f560fc02fd65": "v4.14", "35d2969ea3c7d32aee78066b1f3cf61a0d935a4e": "v5.16-rc1", + "35d8b10a25884050bb3b0149b62c3818ec59f77c": "v5.13-rc1", + "35e2385dbe787936c793d70755a5177d267a40aa": "v6.8-rc4", "35fc4cd34426c242ab015ef280853b7bff101f48": "v5.11-rc4", "36274ab8c596f1240c606bb514da329add2a1bcd": "v4.11-rc6", "362bca57f5d78220f8b5907b875961af9436e229": "v4.15-rc3", "362e4e49abe53e89d87455dfcd7c1bbaf08a839d": "v3.1-rc8", + "3630901933afba1d16c462b04d569b7576339223": "v5.13-rc1", "363a5328f4b0517e59572118ccfb7c626d81dca9": "v6.1-rc4", "363b02dab09b3226f3bd1420dad9c72b79a42a76": "v4.14-rc6", "364dbdf3b6c31a4a5fb7a6d479e7aafb4a7a10b6": "v2.6.38-rc1", @@ -813,6 +1033,7 @@ "36a6503feddadbbad415fb3891e80f94c10a9b21": "v4.9-rc1", "36a87385e31c9343af9a4756598e704741250a67": "v6.8-rc1", "36cf515b9bbe298e1ce7384620f0d4ec45ad3328": "v4.12-rc1", + "36d503ad547d1c75758a6fcdbec2806f1b6aeb41": "v6.9-rc1", "36d5fe6a000790f56039afe26834265db0a3ad4c": "v3.14", "36e4ad0316c017d5b271378ed9a1c9a4b77fab5f": "v4.8-rc1", "3701cd390fd731ee7ae8b8006246c8db82c72bea": "v6.7-rc5", @@ -820,6 +1041,7 @@ "3703f53b99e4a7c373ce3568dd3f91f175ebb626": "v4.9-rc1", "37086bfdc737ea6f66bf68dcf16757004d68e1e1": "v5.12-rc1-dontuse", "3712b42d4b1bec29a4232a6673bf2e6dcc5faa68": "v2.6.27-rc1", + "371a3bc79c11b707d7a1b7a2c938dc3cc042fffb": "v5.8-rc4", "372e3147df7016ebeaa372939e8774a1292db558": "v4.14-rc1", "373c4557d2aa362702c4c2d41288fb1e54990b7c": "v4.15-rc1", "375637bc524952f1122ea22caf5a8f1fecad8228": "v4.7-rc1", @@ -833,49 +1055,75 @@ "37bd22420f856fcd976989f1d4f1f7ad28e1fcac": "v5.8", "37cb11acf1f72a007a85894a6dd2ec93932bde46": "v4.16-rc1", "37cb28ec7d3a36a5bace7063a3dba633ab110f8b": "v5.15-rc4", + "37d1e2e3642e2380750d7f35279180826f29660e": "v5.12-rc1-dontuse", + "37e8c97e539015637cb920d3e6f1e404f707a06e": "v6.8-rc3", "3812c8c8f3953921ef18544110dafc3505c1ac62": "v3.12-rc1", + "38134ada0ceea3e848fe993263c0ff6207fd46e7": "v5.13-rc1", + "38296afe3c6ee07319e01bb249aa4bb47c07b534": "v6.8-rc4", "382c27f4ed28f803b1f1473ac2d8db0afc795a1b": "v6.7-rc5", + "38318f23a7ef86a8b1862e5e8078c4de121960c3": "v5.13-rc1", "38327424b40bcebe2de92d07312c89360ac9229a": "v4.7-rc4", "3840c5b78803b2b6cc1ff820100a74a092c40cbb": "v5.4-rc3", "384632e67e0829deb8015ee6ad916b180049d252": "v4.14-rc4", "385097a3675749cbc9e97c085c0e5dfe4269ca51": "v5.2-rc6", "385aee965b4e4c36551c362a334378d2985b722a": "v4.12-rc1", + "385f287f9853da402d94278e59f594501c1d1dad": "v5.16-rc7", "3864d33943b4a76c6e64616280e98d2410b1190f": "v5.2-rc3", "386e4fb6962b9f248a80f8870aea0870ca603e89": "v5.19-rc4", + "3871aa01e1a779d866fa9dfdd5a836f342f4eb87": "v6.8-rc4", "38740a5b87d53ceb89eb2c970150f6e94e00373a": "v4.6-rc5", + "3876638b2c7ebb2c9d181de1191db0de8cac143a": "v6.8-rc2", "38907e124088b2f5b176acdf3d89926c09d3206a": "v5.10-rc1", "389305b2aa68723c754f88d9dbd268a400e10664": "v4.19-rc1", "38ab012f109caf10f471db1adf284e620dd8d701": "v4.20-rc5", + "38cc3c6dcc09dc3a1800b5ec22aef643ca11eab8": "v6.8-rc4", "38d20c62903d669693a1869aa68c4dd5674e2544": "v6.8-rc1", "38ea1eac7d88072bbffb630e2b3db83ca649b826": "v5.17-rc4", "38fa5479b41376dc9d7f57e71c83514285a25ca0": "v5.19-rc6", "390031c942116d4733310f0684beb8db19885fe6": "v5.18-rc1", + "39126abc5e20611579602f03b66627d7cd1422f0": "v6.8-rc3", "391d8a2da787257aeaf952c974405b53926e3fb3": "v3.11-rc1", "3921120e757f9167f3fcd3a1781239824471b14d": "v2.6.37-rc1", "39279cc3d2704cfbf9c35dcb5bdd392159ae4625": "v2.6.29-rc1", "3935ccc14d2c68488bd96448fc073da48eaeebf0": "v4.9-rc1", "394f56fe480140877304d342dec46d50dc823d46": "v3.19-rc4", + "3953c46c3ac7eef31a9935427371c6f54a22f1ba": "v4.8-rc1", "395cacb5f1a0a290f1ae9ca4692c400d2b57a705": "v4.16-rc1", "39675f7a7c7e7702f7d5341f1e0d01db746543a0": "v4.18-rc6", "3971442870713de527684398416970cf025b4f89": "v6.6-rc6", "39a0526fb3f7d93433d146304278477eb463f8af": "v4.6-rc1", + "39a2a6eb5c9b66ea7c8055026303b3aa681b49a5": "v5.13-rc1", + "39a8fc4971a00d22536aeb7d446ee4a97810611b": "v5.16-rc7", + "39ab9555c24110671f8dc671311a26e5c985b592": "v4.11-rc1", + "39cdb68c64d84e71a4a717000b6e5de208ee60cc": "v5.19-rc7", "39d170b3cb62ba98567f5c4f40c27b5864b304e5": "v5.4-rc1", + "39d42fa96ba1b7d2544db3f8ed5da8fb0d5cb877": "v5.9-rc1", "39d637af5aa7577f655c58b9e55587566c63a0af": "v4.7-rc1", "39e72bf96f5847ba87cc5bd7a3ce0fed813dc9ad": "v5.5-rc1", "39facfa01c9fc64f90233d1734882f0a0cafe36a": "v4.19-rc1", + "3a00c04212d1cfe1426338b78f4ead623508c874": "v5.12-rc1-dontuse", + "3a0152b219523227c2a62a0a122cf99608287176": "v5.16-rc8", "3a07327d10a09379315c844c63f27941f5081e0a": "v6.2-rc1", + "3a0f64de479cae75effb630a2e0a237ca0d0623c": "v5.16-rc7", "3a22e9ac71585bcb7667e44641f1bbb25295f0ce": "v5.10-rc1", "3a359798b176183ef09efb7a3dc59abad1cc7104": "v5.4-rc1", + "3a3e0fad16d40a2aa68ddf7eea4acdf48b22dd44": "v5.13-rc1", "3a4b77cd47bb837b8557595ec7425f281f2ca1fe": "v4.10-rc1", "3a4d44b6162555070194e486ff6b3799a8d323a2": "v4.13-rc1", "3a4d5c94e959359ece6d6b55045c3f046677f55c": "v2.6.34-rc1", + "3a4f326463117cee3adcb72999ca34a9aaafda93": "v5.13-rc1", "3a50597de8635cd05133bd12c95681c82fe7b878": "v3.8-rc1", + "3a53587423d25c87af4b4126a806a0575104b45e": "v5.13-rc3", "3a732b46736cd8a29092e4b0b1a9ba83e672bf89": "v6.1-rc1", + "3a75cb05d53f4a6823a32deb078de1366954a804": "v6.8-rc7", + "3a83e4e64bb1522ddac67ffc787d1c38291e1a65": "v5.11-rc1", + "3a85a5de29ea779634ddfd768059e06196687aba": "v4.8-rc1", "3a87177eb14113bbe8cd95a276af2c412eced6ac": "v4.16-rc1", "3a8b0677fc6180a467e26cc32ce6b0c09a32f9bb": "v4.14-rc1", "3a9b153c5591548612c3955c9600a98150c81875": "v5.6-rc1", "3a9b557f44ea8f216aab515a7db20e23f0eb51b9": "v6.3-rc6", "3aa02cb664c5fb1042958c8d1aa8c35055a2ebc4": "v4.7-rc1", + "3ab0598e6d860ef49d029943ba80f627c15c15d6": "v5.13-rc1", "3ab7b6ac5d829e60c3b89d415811ff1c9f358c8e": "v5.17-rc1", "3ac00a2ab69b34189942afa9e862d5170cdcb018": "v6.4-rc1", "3ac6487e584a1eb54071dbe1212e05b884136704": "v5.18", @@ -892,10 +1140,14 @@ "3b56496865f9f7d9bcb2f93b44c63f274f08e3b6": "v3.14-rc1", "3b82a4db8eaccce735dffd50b4d4e1578099b8e8": "v4.16-rc7", "3b8cc6298724021da845f2f9fd7dd4b6829a6817": "v6.2-rc1", + "3b8e19a0aa3933a785be9f1541afd8d398c4ec69": "v5.16-rc7", "3ba880a12df5aa4488c18281701b5b1bc3d4531a": "v5.17-rc1", "3bb2a01caa813d3a1845d378bbe4169ef280d394": "v6.3-rc1", + "3bb9b1f958c3d986ed90a3ff009f1e77e9553207": "v6.8-rc1", "3bcd6c7eaa53b56c3f584da46a1f7652e759d0e5": "v6.1-rc7", + "3be0b3ed1d76c6703b9ee482b55f7e01c369cc68": "v6.8-rc2", "3c0c5cfdcd4d69ffc4b9c0907cec99039f30a50a": "v3.6-rc3", + "3c12466b6b7bf1e56f9b32c366a3d83d87afb4de": "v6.8-rc1", "3c4287f62044a90e73a561aa05fc46e62da173da": "v5.6-rc1", "3c4d7559159bfe1e3b94df3a657b2cda3a34e218": "v4.13-rc1", "3c4e0dff2095c579b142d5a0693257f1c58b4804": "v5.10-rc3", @@ -904,6 +1156,7 @@ "3c9fa24ca7c9c47605672916491f79e8ccacb9e6": "v4.18-rc1", "3ca44c16b0dcc764b641ee4ac226909f5c421aa3": "v5.8-rc1", "3ca8138f014a913f98e6ef40e939868e1e9ea876": "v4.4-rc5", + "3ca8fbabcceb8bfe44f7f50640092fd8f1de375c": "v6.8-rc5", "3cb989501c2688cacbb7dc4b0d353faf838f53a1": "v3.13-rc1", "3ccdcee28415c4226de05438b4d89eb5514edf73": "v5.17-rc1", "3ce424e45411cf5a13105e0386b6ecf6eeb4f66f": "v4.7-rc1", @@ -918,13 +1171,18 @@ "3d32aaa7e66d5c1479a3c31d6c2c5d45dd0d3b89": "v6.4-rc1", "3d32e4dbe71374a6780eaf51d719d76f9a9bf22f": "v3.18-rc2", "3d3925ff6433f98992685a9679613a2cc97f3ce2": "v5.18-rc1", + "3d3c95046742e4eebaa4b891b0b01cbbed94ebbd": "v5.13-rc1", + "3d439b1a2ad36c8b4ea151c8de25309d60d17407": "v6.4-rc1", "3d4405226d27b3a215e4d03cfa51f536244e5de7": "v3.15-rc7", + "3d5048cc54bd250cfbb358c37fcc011135977887": "v5.14-rc1", "3d6368ef580a4dff012960834bba4e28d3c1430c": "v2.6.30-rc1", "3d713e0e382e6fcfb4bba1501645b66c129ad60b": "v3.17-rc1", "3d932ee27e852e4904647f15b64dedca51187ad7": "v4.16-rc1", "3d94a4a8373bf5f45cf5f939e88b8354dbf2311b": "v5.5-rc3", + "3da9b71563cbb7281875adab1d7c4132679da987": "v6.3-rc1", "3db09e762dc79584a69c10d74a6b98f89a9979f8": "v5.18-rc4", "3de6ee94aae701fa949cd3b5df6b6a440ddfb8f2": "v6.8-rc1", + "3de7d4f25a7438f09fef4e71ef111f1805cd8e7c": "v5.11-rc5", "3de81b758853f0b29c61e246679d20b513c4cfec": "v4.9-rc8", "3dec89b14d37ee635e772636dad3f09f78f1ab87": "v6.6-rc1", "3df0411e132ee74a87aa13142dfd2b190275332e": "v6.5-rc4", @@ -936,16 +1194,21 @@ "3e256b8f8dfa309a80b5dece388d85d9a9801a29": "v3.1-rc1", "3e30148c3d524a9c1c63ca28261bc24c457eb07a": "v2.6.13-rc1", "3e337087c3b5805fe0b8a46ba622a962880b5d64": "v6.5-rc2", + "3e3eabe26dc88692d34cf76ca0e0dd331481cc15": "v6.7-rc1", "3e493173b7841259a08c5c8e5cbe90adb349da7e": "v5.3", "3e4c56d41eef5595035872a2ec5a483f42e8917f": "v4.15-rc1", "3e4f574857eebce60bb56d7524f3f9eaa2a126d0": "v3.8-rc1", "3e5048495c8569bfdd552750e0315973c61e7c93": "v2.6.30-rc1", "3e8b9bfa110896f95d602d8c98d5f9d67e41d78c": "v5.4-rc1", + "3e9bf43f7f7a46f21ec071cb47be92d0874c48da": "v5.13-rc1", "3e9e0c5c764704218c0960ffdb139de075afaadf": "v5.6-rc1", "3eb450367d0823226515ee24712ed08eccb33eb9": "v5.1-rc1", "3ebba796fa251d042be42b929a2d916ee5c34a49": "v5.12-rc2", + "3ee098f96b8b6c1a98f7f97915f8873164e6af9d": "v5.13-rc3", "3ef0eb0db4bf92c6d2510fe5c4dc51852746f206": "v3.9-rc1", + "3f14b377d01d8357eba032b4cabc8c1149b458b6": "v6.8-rc1", "3f190e3aec212fc8c61e202c51400afa7384d4bc": "v4.11-rc1", + "3f1f3234bc2db1c16b9818b9a15a5d58ad45251c": "v5.1-rc1", "3f3b442b5ad2455507c9bfdacf39a3792eb3a6d0": "v5.15-rc1", "3f3c8b8c4b2a34776c3470142a7c8baafcda6eb0": "v3.3-rc1", "3f4093e2bf4673f218c0bf17d8362337c400e77b": "v6.0-rc1", @@ -961,11 +1224,13 @@ "4017eb91a9e79bbb5d14868c207436f4a6a0af50": "v5.10-rc1", "401ca24fb34aee0cedf9c4fef361e533224f15a1": "v3.7-rc1", "401e7e88d4ef80188ffa07095ac00456f901b8c4": "v5.1-rc1", + "402be8a101190969fc7ff122d07e262df86e132b": "v5.13-rc2", "40413955ee265a5e42f710940ec78f5450d49149": "v4.13-rc5", "4071bf121d59944d5cd2238de0642f3d7995a997": "v5.18-rc6", "407ecd1bd726f240123f704620d46e285ff30dd9": "v5.16-rc6", "408fb0e5aa7fda0059db282ff58c3b2a4278baa0": "v4.4-rc6", "409353cbe9fe48f6bc196114c442b1cff05a39bc": "v5.18-rc1", + "4094445229760d0d31a4190dfe88fe815c9fc34e": "v5.7-rc1", "40a82917b1d3a8aecedee6b64949795b75359731": "v3.12-rc1", "40d8abdee806d496a60ee607a6d01b1cd7fabaf0": "v4.7-rc1", "41003396f932d7f027725c7acebb6a7caa41dc3e": "v4.12-rc1", @@ -977,16 +1242,21 @@ "414ee50b3a111983056b1a828fac08f9e8fbc7e9": "v3.2-rc1", "415e3d3e90ce9e18727e8843ae343eda5a58fad6": "v4.5-rc4", "41672c0c24a62699d20aab53b98d843b16483053": "v5.2-rc1", + "41673c66b3d0c09915698fec5c13b24336f18dd1": "v6.8-rc1", "4172385b0c9ac366dcab78eda48c26814b87ed1a": "v6.4-rc3", "4180bf1b655a791a0a6ef93a2ffffc762722c782": "v4.19-rc1", "41bdc78544b8a93a9c6814b8bbbfef966272abbe": "v3.19-rc1", + "41ca9caaae0bfc959b22dbcd59d88a7107707e17": "v5.14-rc1", + "41ce1456e1dbbc7355d0fcc10cf7c337c13def24": "v4.12-rc1", "41df7f6d43723deb7364340b44bc5d94bf717456": "v3.12-rc2", + "41ebaa5e0eebea4c3bac96b72f9f8ae0d77c0bdb": "v6.6-rc3", "41ef4eb8eef8d06bc1399e7b00c940d771554711": "v3.10-rc1", "41fd1cb6151439b205ac7611883d85ae14250172": "v6.1-rc2", "4206d3aa1978e44f58bfa4e1c9d8d35cbf19c187": "v2.6.25-rc1", "421221234ada41b4a9f0beeb08e30b07388bd4bd": "v5.15-rc1", "42288cb44c4b5fff7653bc392b583a2b8bd6a8c0": "v5.16-rc5", "423400e64d377c0d8a2459795420681177e51e74": "v4.11-rc1", + "423815bf02e257091d5337be5c63b57fc29e4254": "v5.12-rc1-dontuse", "423ce8caab7ea2b13f4a29ce0839369528aafaeb": "v3.4-rc1", "425aa0e1d01513437668fa3d4a971168bbaa8515": "v5.2-rc3", "425f53aaf76cce77b3bedd8ed4902bc94ed254ff": "v3.15-rc1", @@ -1001,13 +1271,17 @@ "42d84c8490f9f0931786f1623191fcab397c3d64": "v5.6-rc4", "42dbaa5a057736bf8b5c22aa42dbe975bf1080e5": "v2.6.30-rc1", "42dceae2819b5ac6fc9a0d414ae05a8960e2a1d9": "v3.3-rc1", + "43262178c043032e7c42d00de44c818ba05f9967": "v5.13-rc1", "433f4ba1904100da65a311033f17a9bf586b287e": "v5.5-rc1", "433fc58e6bf2c8bd97e57153ed28e64fd78207b8": "v4.8-rc1", "4342306f0f0d5ff4315a204d315c1b51b914fca5": "v5.15-rc1", + "4354994f097d068a894aa1a0860da54571df3582": "v4.20-rc1", "43622021d2e2b82ea03d883926605bdd0525e1d1": "v3.12-rc1", + "4373534a9850627a2695317944898eb1283a2db0": "v6.8-rc3", "4374f256ce8182019353c0c639bb8d0695b4c941": "v4.15-rc5", "43761473c254b45883a64441dd0bc85a42f3645c": "v4.8-rc1", "4379bf8bd70b5de6bba7d53015b0c36c57a634ee": "v5.12-rc1-dontuse", + "437a310b22244d4e0b78665c3042e5d1c0f45306": "v6.8-rc2", "43838a23a05fbd13e47d750d3dfd77001536dd33": "v4.17-rc2", "4397f04575c44e1440ec2e49b6302785c95fd2f8": "v4.15-rc6", "43a6684519ab0a6c52024b5e253224": "v4.11-rc6", @@ -1016,27 +1290,39 @@ "43ec16f1450f4936025a9bdf1a273affdb9732c1": "v6.4-rc1", "44234adcdce38f83c56e05f808ce656175b4beeb": "v2.6.33-rc1", "443064cb0b1fb4569fe0a71209da7625129fb760": "v4.15-rc8", + "4430f7fd09ecb037570119e0aacbf0c17b8f98b2": "v5.11-rc1", "443c1228d50518f3c550e1fef490a2c9d9246ce7": "v2.6.32-rc1", "443d61d1fa9faa60ef925513d83742902390100f": "v6.4-rc3", "4442dc8a92b8f9ad8ee9e7f8438f4c04c03a22dc": "v3.14-rc1", "4447bb33f09444920a8f1d89e1540137429351b6": "v2.6.33-rc1", + "444d7be9532dcfda8e0385226c862fd7e986f607": "v5.13-rc4", "44526bedc2ff8fcd58552e3c5bae928524b6f13c": "v5.12-rc1-dontuse", "445409602c09219767c06497c0dc2285eac244ed": "v2.6.33-rc1", "4463523bef98ff827a89cf8219db7dfac4350241": "v3.7-rc1", + "446fda4f26822b2d42ab3396aafcedf38a9ff2b6": "v2.6.19-rc1", "4473710df1f8779c59b33737eeaa151596907761": "v4.12-rc1", + "447c19f3b5074409c794b350b10306e1da1ef4ba": "v5.13-rc2", "4491001c2e0fa69efbb748c96ec96b100a5cdb7e": "v5.19-rc6", + "44bdb313da57322c9b3c108eb66981c6ec6509f4": "v6.6-rc3", "44efc269db7929f6275a1fa927ef082e533ecde0": "v5.4-rc3", + "45120b15743fa7c0aa53d5db6dfb4c8f87be4abd": "v6.6-rc4", "451a2886b6bf90e2fb378f7c46c655450fb96e81": "v4.1-rc1", + "45284ff733e4caf6c118aae5131eb7e7cf3eea5a": "v6.8-rc1", + "4530b3660d396a646aad91a787b6ab37cf604b53": "v6.8-rc3", "453393369dc9806d2455151e329c599684762428": "v5.1-rc6", "454d5d882c7e412b840e3c99010fe81a9862f6fb": "v4.4-rc6", + "4551b30525cf3d2f026b92401ffe241eb04dfebe": "v6.8-rc4", "4562236b3bc0a28aeb6ee93b2d8a849a4c4e1c7c": "v4.15-rc1", + "4569cce43bc61e4cdd76597a1cf9b608846c18cc": "v6.4-rc1", "457b9a6f09f011ebcb9b52cc203a6331a6fc2de7": "v2.6.29-rc1", "457f44363a8894135c85b7a9afd2bd8196db24ab": "v5.8-rc1", "458e279f861d3f61796894cd158b780765a1569f": "v6.2-rc6", + "459aa660eb1d8ce67080da1983bb81d716aa5a69": "v4.7-rc1", "45a2966fd64147518dc5bca25f447bd0fb5359ac": "v5.15-rc1", "45af1d7aae7d5520d2858f8517a1342646f015db": "v6.2-rc1", "45bf39f8df7f05efb83b302c65ae3b9bc92b7065": "v6.3-rc1", "45c1380358b12bf2d1db20a5874e9544f56b34ab": "v5.4-rc7", + "45c8b7b175ceb2d542e0fe15247377bf3bce29ec": "v4.3", "45e093ae2830cd1264677d47ff9a95a71f5d9f9c": "v4.7-rc1", "45f05def5c44c806f094709f1c9b03dcecdd54f0": "v4.19-rc1", "45f6fad84cc305103b28d73482b344d7f5b76f39": "v4.4-rc4", @@ -1045,17 +1331,26 @@ "462dbc9101acd38e92eda93c0726857517a24bbd": "v3.8-rc1", "46612b751c4941c5c0472ddf04027e877ae5990f": "v5.1-rc1", "467fa15356acfb7b2efa38839c3e76caa4e6e0ea": "v4.3-rc1", + "46806e59a87790760870d216f54951a5b4d545bc": "v6.8-rc5", "4683f42fde3977bdb4e8a09622788cc8b5313778": "v3.9-rc7", "468f6eafa6c44cb2c5d8aad35e12f06c240a812a": "v4.15-rc5", + "46a8b29c6306d8bbfd92b614ef65a47c900d8e70": "v5.13-rc4", + "46a9ea6681907a3be6b6b0d43776dccc62cad6cf": "v6.6-rc4", + "46b723dd867d599420fb640c0eaf2a866ef721d4": "v4.20-rc1", "46c116b920ebec58031f0a78c5ea9599b0d2a371": "v5.19-rc1", "46e624b95c36d729bdf24010fff11d16f6fe94fa": "v2.6.33-rc1", + "46eba193d04f8bd717e525eb4110f3c46c12aec3": "v6.8-rc4", "46f8a29272e51b6df7393d58fc5cb8967397ef2b": "v6.0", "470502de5bdb1ed0def643a4458593a40b8f6b66": "v5.1-rc1", "47057abde515155a4fee53038e7772d6b387e0aa": "v4.10-rc1", "470ee20e069a6d05ae549f7d0ef2bdbcee6a81b2": "v6.0-rc1", + "471470bc7052d28ce125901877dd10e4c048e513": "v6.6-rc5", "4738c1db1593687713869fa69e733eebc7b0d6d8": "v2.6.26-rc1", + "474a2ddaa192777522a7499784f1d60691cd831a": "v5.13-rc4", + "474ac4a875ca6fea3fc5183d3ad22ef7523dca53": "v5.9-rc1", "475c58e1a471e9b873e3e39958c64a2d278275c8": "v6.8-rc1", "47677e51e2a4040c204d7971a5103592600185b1": "v3.15-rc1", + "47a017f33943278570c072bc71681809b2567b3a": "v5.13-rc1", "47abea041f897d64dbd5777f0cf7745148f85d75": "v6.0-rc3", "47b0c2e4c220f2251fd8dcfbb44479819c715e15": "v6.1-rc7", "47bb117911b051bbc90764a8bff96543cbd2005f": "v5.1-rc1", @@ -1064,33 +1359,47 @@ "47d902b90a32a42a3d33aef3a02170fc6f70aa23": "v4.12-rc1", "47f2d97d38816aaca94c9b6961c6eff1cfcd0bd6": "v3.6-rc1", "47f86834bbd4193139d61d659bebf9ab9d691e37": "v2.6.26-rc1", + "47ff617217ca6a13194fcb35c6c3a0c57c080693": "v5.13-rc1", "481221775d53d6215a6e5e9ce1cce6d2b4ab9a46": "v5.16-rc6", "483ae90d8f976f8339cf81066312e1329f2d3706": "v6.8-rc1", + "484730e5862f6b872dca13840bed40fd7c60fa26": "v5.16-rc7", "485b06aadb933190f4bc44e006076bc27a23f205": "v5.7-rc1", "485e71e8fb6356c08c7fc6bcce4bf02c9a9a663f": "v4.7-rc5", + "4860abb91f3d7fbaf8147d54782149bb1fc45892": "v6.8-rc5", + "488ef44c068e79752dba8eda0b75f524f111a695": "v6.6-rc4", "48900cb6af4282fa0fb6ff4d72a81aa3dadb5c39": "v4.2-rc7", "4898e640caf03fdbaf2122d5a33949bf3e4a5b34": "v3.11-rc1", "48a4ff1c7bb5a32d2e396b03132d20d552c0eca7": "v4.15-rc4", "48a992727d82cb7db076fa15d372178743b1f4cd": "v4.9", "48b0ae046ee96eac999839f6d26c624b8c93ed66": "v5.11-rc1", "48bd024b8a40d73ad6b086de2615738da0c7004f": "v5.8-rc1", + "48cae940c31d2407d860d87c41d5f9871c0521db": "v6.0-rc1", + "48cff270b037022e37835d93361646205ca25101": "v5.13-rc1", "48e876a20e79566f1736413d4f42dc66f3ab2f16": "v4.15-rc1", + "48f17f96a81763c7c8bf5500460a359b9939359f": "v5.13-rc1", "4910280503f3af2857d5aa77e35b22d93a8960a8": "v4.17-rc1", + "492032760127251e5540a5716a70996bacf2a3fd": "v6.6-rc3", "492855939bdb59c6f947b0b5b44af9ad82b7e38c": "v5.1-rc4", "4943ba16bbc2db05115707b3ff7b4874e9e3c560": "v3.19-rc1", "49499c3e6e18b7677a63316f3ff54a16533dc28f": "v4.1-rc1", + "4961acdd65c956e97c1a000c82d91a8c1cdbe44b": "v6.8-rc1", "4969c06a0d83c9c3dc50b8efcdc8eeedfce896f6": "v5.3-rc1", + "496fd0a26bbf73b6b12407ee4fbe5ff49d659a6d": "v6.7-rc1", "4971613c1639d8e5f102c4e797c3bf8f83a5a69e": "v4.14-rc4", "497de07d89c1410d76a15bec2bb41f24a2a89f31": "v4.10-rc4", "499350a5a6e7512d9ed369ed63a4244b6536f4f8": "v4.12-rc3", "49c47cc21b5b7a3d8deb18fc57b0aa2ab1286962": "v6.3-rc2", + "49cc85059a2cb656f96ff3693f891e8fe8f669a9": "v5.13-rc1", "49d31c2f389acfe83417083e1208422b4091cd9e": "v4.13-rc1", + "49db9b1b86a82448dfaf3fcfefcf678dee56c8ed": "v6.8-rc1", "49f4d8b93ccf9454284b6f524b96c66d8d7fbccc": "v3.8-rc1", + "49f9637aafa6e63ba686c13cb8549bf5e6920402": "v6.8-rc1", "4a184233f21645cf0b719366210ed445d1024d72": "v3.9-rc7", "4a2b5fddd53b80efcb3266ee36e23b8de28e761a": "v2.6.28-rc1", "4a491b1ab11ca0556d2fda1ff1301e862a2d44c4": "v4.16-rc1", "4a61648af68f5ba4884f0e3b494ee1cabc4b6620": "v6.2-rc3", "4a625ceee8a0ab0273534cb6b432ce6b331db5ee": "v6.2-rc1", + "4a7aee96200ad281a5cc4cf5c7a2e2a49d2b97b0": "v6.8-rc5", "4a90f09b20f4622dcbff1f0e1e6bae1704f8ad8c": "v2.6.28-rc1", "4a9800c81d2f34afb66b4b42e0330ae8298019a2": "v5.19-rc1", "4a9d46a9fe14401f21df69cea97c62396d5fb053": "v5.4-rc1", @@ -1107,10 +1416,12 @@ "4afa5f9617927453ac04b24b584f6c718dfb4f45": "v4.4-rc1", "4b081ce0d830b684fdf967abc3696d1261387254": "v6.6-rc1", "4b08a8f1bd8cb4541c93ec170027b4d0782dab52": "v3.11-rc7", + "4b1b7d3b30a6d32ac1a1dcede284e76ef8a8542d": "v4.19-rc1", "4b2c53d93a4bc9d52cc0ec354629cfc9dc217f93": "v5.11-rc1", "4b380c42f7d00a395feede754f0bc2292eebe6e5": "v4.15-rc4", "4b394a232df78414442778b02ca4a388d947d059": "v4.9-rc1", "4b41a9d0fe3db5f91078a380f62f0572c3ecf2dd": "v5.18-rc1", + "4b4f6cecca446abcb686c6e6c451d4f1ec1a7497": "v5.13-rc5", "4b51dae96731c9d82f5634e75ac7ffd3b9c1b060": "v3.6-rc1", "4b5db93e7f2afbdfe3b78e37879a85290187e6f1": "v5.12-rc7", "4b6184336ebb5c8dc1eae7f7ab46ee608a748b05": "v4.4-rc1", @@ -1119,7 +1430,9 @@ "4b855078601fc422dbac3059f2215e776f49780f": "v3.16-rc1", "4b8feff251da3d7058b5779e21b33a85c686b974": "v3.17-rc1", "4ba66093bdc6316cd2fe48e74a54bfc29599322f": "v4.12-rc1", + "4bc05954d0076655cfaf6f0135585bdc20cd6b11": "v5.15-rc1", "4bdab43323b459900578b200a4b8cf9713ac8fab": "v2.6.36-rc5", + "4be5341026246870818e28b53202b001426a5aec": "v5.5-rc1", "4becb7ee5b3d2829ed7b9261a245a77d5b7de902": "v5.7-rc5", "4bedf9eee016286c835e3d8fa981ddece5338795": "v6.4", "4c03b862b12f980456f9de92db6d508a4999b788": "v4.10", @@ -1135,6 +1448,10 @@ "4c8cf31885f69e86be0b5b9e6677a26797365e1d": "v5.7-rc1", "4c905f6740a365464e91467aa50916555b28213d": "v5.18-rc1", "4caae58406f8ceb741603eee460d79bacca9b1b5": "v5.19-rc1", + "4cb47a8644cc9eb8ec81190a50e79e6530d0297f": "v5.9-rc1", + "4cc7faa406975b460aa674606291dea197c1210c": "v5.13-rc1", + "4cccb6221cae6d020270606b9e52b1678fc8b71a": "v6.8-rc1", + "4cd12c6065dfcdeba10f49949bffcf383b3952d8": "v6.8-rc6", "4cdf507d54525842dfd9f6313fdafba039084046": "v3.18-rc1", "4ce001abafafe77e5dd943d1480fc9f87894e96f": "v2.6.32-rc1", "4cf46b67eb6de94532c1bea11d2479d085229d0e": "v2.6.33-rc1", @@ -1146,10 +1463,13 @@ "4d56304e5827c8cc8cc18c75343d283af7c4825c": "v6.4-rc5", "4d63adfe12dd9cb61ed8badb4d798955399048c2": "v4.15-rc1", "4d6636498c41891d0482a914dd570343a838ad79": "v5.4-rc7", + "4d6a38da8e79e94cbd1344aa90876f0f805db705": "v5.13-rc1", "4d6fa57b4dab0d77f4d8e9d9c73d1e63f6fe8fee": "v4.11", "4d7ea8ee90e42fc75995f6fb24032d3233314528": "v5.12-rc1-dontuse", "4d8df0f5f79f747d75a7d356d9b9ea40a4e4c8a9": "v6.4-rc6", "4d8df8cbb9156b0a0ab3f802b80cb5db57acc0bf": "v5.8-rc1", + "4d8f9065830e526c83199186c5f56a6514f457d2": "v5.12-rc8", + "4d906839d321c2efbf3fed4bc31ffd9ff55b75c0": "v5.13-rc1", "4d97f7d53da7dc830dbf416a3d2a6778d267ae68": "v4.19-rc1", "4db66499df91b9398435e2dbee0e42cd6df0bc27": "v4.14-rc1", "4db67e808640e3934d82ce61ee8e2e89fd877ba8": "v3.7-rc1", @@ -1165,6 +1485,7 @@ "4e19d6b65fb4fc42e352ce9883649e049da14743": "v5.3-rc1", "4e2024624e678f0ebb916e6192bd23c1f9fdf696": "v3.19-rc3", "4e3c51f4e805291b057d12f5dda5aeb50a538dc4": "v6.1-rc7", + "4e440abc894585a34c2904a32cd54af1742311b3": "v6.8-rc4", "4e484b3e969b52effd95c17f7a86f39208b2ccf4": "v5.17-rc1", "4e6c3df4d729f85997cbf276bfa8ffd8579b8e77": "v4.8-rc1", "4e70c7e71c5f9cf11013628ab5a0ced449b1c7b2": "v3.13-rc1", @@ -1180,18 +1501,23 @@ "4edbe133f851c9e3a2f2a1db367e826b01e72594": "v5.3-rc1", "4edbe1d7bcffcd6269f3b5eb63f710393ff2ec7a": "v5.12-rc5", "4ef1b2869447411ad3ef91ad7d4891a83c1a509a": "v4.11-rc4", + "4ef9ad19e17676b9ef071309bc62020e2373705d": "v6.8-rc3", "4efbc454ba68def5ef285b26ebfcfdb605b52755": "v3.14-rc4", "4f0414e54e4d1893c6f08260693f8ef84c929293": "v4.5-rc1", "4f04351888a83e595571de672e0a4a8b74f4fb31": "v6.4-rc2", "4f11ada10d0ad3fd53e2bd67806351de63a4f9c3": "v6.2-rc6", "4f134b89a24b965991e7c345b9a4591821f7c2a6": "v5.10-rc7", "4f16f7ff3bc02f6e1845677235fea157bdc0e59c": "v4.16-rc1", + "4f1cc51f34886d645cd3e8fc2915cc9b7a55c3b6": "v5.12-rc1-dontuse", "4f1dc7d9756e66f3f876839ea174df2e656b7f79": "v6.2-rc1", + "4f2629ea67e7225c3fd292c7fe4f5b3c9d6392de": "v5.13-rc4", + "4f32504a2f85a7b40fe149436881381f48e9c0c0": "v6.8-rc1", "4f3882177240a1f55e45a3d241d3121341bead78": "v5.5-rc6", "4f4853dc1c9c1994f6f756eabdcc25374ff271d9": "v4.10-rc1", "4f57f06ce2186c31c3da52386125dc57b1cd6f96": "v5.18-rc1", "4f5d33f4f798b1c6d92b613f0087f639d9836971": "v6.0-rc1", "4f7019c7eb33967eb87766e0e4602b5576873680": "v5.15", + "4f973e211b3b1c6d36f7c6a19239d258856749f9": "v6.8-rc1", "4f98186848707f530669238d90e0562d92a78aab": "v5.17-rc3", "4f996e234dad488e5d9ba0858bc1bae12eff82c3": "v4.7-rc4", "4fb8b5aa2a1126783ae00bae544d6f3c519408ef": "v5.7-rc1", @@ -1201,17 +1527,22 @@ "5005bcb4219156f1bf7587b185080ec1da08518e": "v6.4", "500a373d731ac506612db12631ec21295c1ff360": "v5.10-rc1", "50145474f6ef4a9c19205b173da6264a644c7489": "v5.9-rc6", + "501ef3066c89d7f9045315e1be58749cf9e6814d": "v5.10-rc1", "50220dead1650609206efe91f0cc116132d59b3f": "v4.6-rc1", "5023b14cf4df4d22e1a80738167f3438c9e62e5f": "v5.2-rc1", + "50274b01ac1689b1a3f6bc4b5b3dbf361a55dd3a": "v5.13-rc1", "502e95c6678505474f1056480310cd9382bacbac": "v4.1-rc1", "504a10d9e46bc37b23d0a1ae2f28973c8516e636": "v6.4-rc2", "50535249f624d0072cd885bcdce4e4b6fb770160": "v5.12-rc5", "505ce0630ad5d31185695f8a29dde8d29f28faa7": "v6.6-rc7", "505d9dcb0f7ddf9d075e729523a33d38642ae680": "v5.15-rc4", + "5093bbfc10ab6636b32728e35813cbd79feb063c": "v6.6-rc6", + "50c70240097ce41fe6bce6478b80478281e4d0f7": "v6.8-rc6", "50d0a7aea4809cef87979d4669911276aa23b71f": "v6.4-rc1", "50d5c8d8e938e3c4c0d21db9fc7d64282dc7be20": "v3.12-rc1", "50d88758a3f9787cbdbdbc030560b815721eab4b": "v2.6.30-rc1", "50e7044535537b2a54c7ab798cd34c7f6d900bd2": "v4.17-rc1", + "5104d7ffcf24749939bea7fdb5378d186473f890": "v5.13-rc2", "5106dd6e74ab6c94daac1c357094f11e6934b36f": "v5.18-rc2", "51093254bf879bc9ce96590400a87897c7498463": "v4.6-rc1", "511885d7061eda3eb1faf3f57dcc936ff75863f1": "v5.4-rc1", @@ -1222,6 +1553,7 @@ "5146f95df782b0ac61abde36567e718692725c89": "v4.20", "514c7dca85a0bf40be984dab0b477403a6db901f": "v4.19-rc1", "515ad530795c118f012539ed76d02bacfd426d89": "v6.5-rc2", + "5160a5a53c0c4ae3708959d9465ea43ad5d90542": "v5.10-rc1", "517a281338322ff8293f988771c98aaa7205e457": "v6.4-rc3", "5191955d6fc65e6d4efe8f4f10a6028298f57281": "v5.11-rc1", "51925fb3c5c9": "v4.1-rc1", @@ -1236,12 +1568,19 @@ "51f3baad7de943780ce0c17bd7975df567dd6e14": "v4.12-rc1", "51f6b410fc220d8a5a4fae00ebfd8243b6c11d4e": "v4.20-rc1", "520778042ccca019f3ffa136dd0ca565c486cedd": "v5.19-rc1", + "520a1c396d1966b64884d8e0176a580150d5a09e": "v5.10-rc1", + "5218e919c8d06279884aa0baf76778a6817d5b93": "v5.13-rc4", + "52202be1cd996cde6e8969a128dc27ee45a7cb5e": "v5.13-rc3", "522b1d69219d8f083173819fde04f994aa051a98": "v6.5-rc4", "5233252fce714053f0151680933571a2da9cbfb4": "v4.4-rc6", "52400ba946759af28442dee6265c5c0180ac7122": "v2.6.31-rc1", + "52526ca7fdb905a768a93f8faa418e9b988fc34b": "v6.7-rc1", + "5266caaf5660529e3da53004b8b7174cab6374ed": "v6.8-rc1", + "528ab3e605cabf2f9c9bd5944d3bfe15f6e94f81": "v6.6-rc5", "52c479697c9b73f628140dcdfcd39ea302d05482": "v5.9-rc2", "52e8c38001d8ef0ca07ef428e480cd4a35e46abf": "v4.18-rc1", "52ebea749aaed195245701a8f90a23d672c7a933": "v4.2-rc1", + "52f671db18823089a02f07efc04efdb2272ddc17": "v6.8-rc6", "52feb444a90304eb13c03115bb9758101dbb9254": "v3.8-rc1", "5320918b9a87865223fd6b228e530bf30bc64d9d": "v3.4-rc1", "5329722057d41aebc31e391907a501feaa42f7d9": "v5.11-rc1", @@ -1252,9 +1591,13 @@ "53592b3640019f2834701093e38272fdfd367ad8": "v4.10-rc1", "536bb492d39bb6c080c92f31e8a55fe9934f452b": "v6.5-rc4", "537a50574175a2b68b0612ffb48cb044a394c7b4": "v4.13-rc1", + "53a3f777049771496f791504e7dc8ef017cba590": "v6.6-rc5", "53a712bae5dd919521a58d7bad773b949358add0": "v5.2-rc1", + "53b1119a6e5028b125f431a0116ba73510d82a72": "v5.16-rc7", "53b381b3abeb86f12787a6c40fee9b2f71edc23b": "v3.9-rc1", + "53c0441dd2c44ee93fddb5473885fd41e4bc2361": "v6.8-rc5", "53edb549565f55ccd0bdf43be3d66ce4c2d48b28": "v6.8-rc1", + "53ff5cf89142b978b1a5ca8dc4d4425e6a09745f": "v6.6-rc5", "53ffa6a9f83b2170c60591da1ead8791d5a42e81": "v6.2-rc1", "5429c9dbc9025f9a166f64e22e3a69c94fd5b29b": "v5.16-rc1", "542db01579fbb7ea7d1f7bb9ddcef1559df660b2": "v3.11-rc1", @@ -1265,26 +1608,36 @@ "548acf19234dbda5a52d5a8e7e205af46e9da840": "v4.6-rc1", "54a20552e1eae07aa240fa370a0293e006b5faed": "v4.4-rc1", "54a217887a7b658e2650c3feff22756ab80c7339": "v3.15", + "54a40fc3a1da21b52dbf19f72fdc27a2ec740760": "v5.13-rc3", "54a611b605901c7d5d05b6b8f5d04a6ceb0962aa": "v6.1-rc1", "54c9de89895e0a36047fcc4ae754ea5b8655fb9d": "v5.10-rc1", "54d198d5019dd98b9bcb9099a389608d7e2cccad": "v5.2-rc1", "54d5ca871e72f2bb172ec9323497f01cd5091ec7": "v4.6", "54d83fc74aa9ec72794373cb47432c5f7fb1a309": "v4.6-rc2", + "54d87913f147a983589923c7f651f97de9af5be1": "v5.13-rc3", "54dbc15172375641ef03399e8f911d7165eb90fb": "v4.5-rc1", "54e200ab40fc14c863bcc80a51e20b7906608fce": "v5.8-rc1", "54e45702b648b7c0000e90b3e9b890e367e16ea8": "v6.2-rc1", "54ffccbf053b5b6ca4f6e45094b942fab92a25fc": "v5.10-rc7", "5519541d5a5f19893546883547e2f0f2e5934df7": "v3.0-rc1", + "552705a3650bbf46a22b1adedc1b04181490fc36": "v6.8", "5535be3099717646781ce1540cf725965d680e7b": "v6.0-rc3", "554086d85e71f30abe46fc014fea31929a7c6a8a": "v3.16-rc3", "55484c45dbeca2eec7642932ec3f60f8a2d4bdbf": "v2.6.33-rc1", + "55583e899a5357308274601364741a83e78d6ac4": "v6.8-rc3", + "5559cea2d5aa3018a5f00dd2aca3427ba09b386b": "v6.8-rc6", "55667441c84fa5e0911a0aac44fb059c15ba6da2": "v5.4-rc6", + "556857aa1d0855aba02b1c63bc52b91ec63fc2cc": "v6.8-rc2", + "5571e41ec6e56e35f34ae9f5b3a335ef510e0ade": "v6.8-rc5", "55749769fe608fa3f4a075e42e89d237c8e37637": "v5.17-rc1", + "5578de4834fe0f2a34fedc7374be691443396d1f": "v5.0", "557c0c6e7df8e14a46bd7560d193fa5bbc00a858": "v4.6-rc1", "557d19675a470bb0a98beccec38c5dc3735c20fa": "v6.2-rc1", + "55840b9eae5367b5d5b29619dc2fb7e4596dba46": "v5.16-rc7", "5593473a1e6c743764b08e3b6071cb43b5cfa6c4": "v5.18-rc3", "5593523f968bc86d42a035c6df47d5e0979b5ace": "v4.10-rc8", "559c36c5a8d730c49ef805a72b213d3bba155cc8": "v6.0-rc7", + "55a48ad2db64737f7ffc0407634218cc6e4c513b": "v6.8-rc6", "55a8210c9e7d21ff2644809699765796d4bfb200": "v6.8-rc1", "55dd6f93076bb82aa8911191125418dcfcbf2c9b": "v3.16-rc1", "55e8c8eb2c7b6bf30e99423ccfe7ca032f498f59": "v5.7-rc1", @@ -1294,6 +1647,8 @@ "5615968a70845157adaffc11062c997d045339ee": "v2.6.31-rc1", "56441f3c8e5bd45aab10dd9f8c505dd4bec03b0d": "v4.4-rc6", "5649645d725c73df4302428ee4e02c869248b4c5": "v4.12-rc5", + "56517ab958b7c11030e626250c00b9b1a24b41eb": "v5.13-rc4", + "56667da7399eb19af857e30f41bea89aa6fa812c": "v6.8-rc6", "567320c46a60a3c39b69aa1df802d753817a3f86": "v6.7-rc7", "5678de3f15010b9022ee45673f33bcfc71d47b60": "v3.15-rc2", "56897b217a1d0a91c9920cb418d6b3fe922f590a": "v5.1-rc1", @@ -1303,10 +1658,14 @@ "56c5812623f95313f6a46fbf0beee7fa17c68bbf": "v5.13-rc1", "56cd26b618855c9af48c8301aa6754ced8dd0beb": "v5.2-rc1", "56e449603f0ac580700621a356d35d5716a62ce5": "v6.7-rc1", + "56e58d6c8a5640eb708e85866e9d243d0357ee54": "v5.4-rc1", "570d0176296f0d17c4b5ab206ad4a4bc027b863b": "v4.7-rc1", "5738a09d58d5ad2871f1f9a42bf6a3aa9ece5b3c": "v4.4-rc4", "574823bfab82d9d8fa47f422778043fbb4b4f50e": "v5.0-rc1", + "5761eb9761d2d5fe8248a9b719efc4d8baf1f24a": "v6.8-rc6", + "577e4432f3ac810049cb7e6b71f4d96ec7c6e894": "v6.8-rc3", "57861b432bda77f8bfafda2fb6f5a922d5f3aef1": "v2.6.22-rc1", + "57974a55d995468a9a476e24693eb741c649b25f": "v6.4-rc1", "579db9d45cb4e8e7cedff9e6079331a1e2ea9f5d": "v4.16-rc1", "57b8015e07a70301e9ec9f324db1a8b73b5a1e2b": "v3.10-rc1", "57bc3d3ae8c14df3ceb4e17d26ddf9eeab304581": "v5.17-rc4", @@ -1327,19 +1686,26 @@ "5872331b3d91820e14716632ebb56b1399b34fe1": "v5.9-rc2", "588afcc1c0e45358159090d95bf7b246fb67565f": "v4.5-rc1", "588f7d39b3592a36fb7702ae3b8bdd9be4621e2f": "v5.2-rc6", + "58956317c8de52009d1a38a721474c24aef74fe7": "v5.0-rc1", "58990d1ff3f7896ee341030e9a7c2e4002570683": "v4.18-rc1", "58bdd544e2933a21a51eecf17c3f5f94038261b5": "v5.0", "58ccd2d31e502c37e108b285bf3d343eb00c235b": "v5.1-rc4", "58d19b19cd99b438541eea4cdbf5c171900b25e5": "v4.6-rc1", + "58fca355ad37dcb5f785d9095db5f748b79c5dc2": "v6.8-rc4", "58fd55e838276a0c13d1dc7c387f90f25063cbf3": "v4.15-rc1", "5901b6be885e2c9a30fd94803b846b3d33e351dd": "v3.7-rc1", "590232a7150674b2036291eaefce085f3f9659c8": "v2.6.14-rc3", + "5913320eb0b3ec88158cfcb0fa5e996bf4ef681b": "v6.8-rc2", "592acbf16821288ecdc4192c47e3774a4c48bb64": "v5.2-rc1", "594cc251fdd0d231d342d88b2fdff4bc42fb0690": "v5.0-rc1", "59643d1535eb220668692a5359de22545af579f6": "v4.7-rc1", "597cfe48212a3f110ab0f918bf59791f453e65b7": "v5.10-rc1", "59c4bd853abcea95eccc167a7d7fd5f1a5f47b98": "v5.5-rc1", "59c816c1f24df0204e01851431d3bab3eb76719c": "v4.0-rc1", + "59ca6c93387d325e96577d8bd4c23c78c1491c11": "v5.18-rc1", + "59d0f746564495c7f54526674deabfcf101236a1": "v3.18-rc1", + "59df44bfb0ca4c3ee1f1c3c5d0ee8e314844799e": "v6.6-rc5", + "59e27d7c94aa02da039b000d33c304c179395801": "v5.13-rc1", "59e5791f59dd83e8aa72a4e74217eabb6e8cfd90": "v6.8-rc1", "59f8b0bf3c12598cf4a5b333b0287774dbbdbe1f": "v2.6.37-rc1", "5a07975ad0a36708c6b0a5b9fea1ff811d0b0c1f": "v4.6-rc3", @@ -1347,43 +1713,62 @@ "5a25ba1677ab8d63890016a8c1bca68a3e0fbc7d": "v2.6.19-rc1", "5a264285ed1cd32e26d9de4f3c8c6855e467fd63": "v5.12-rc1", "5a281062af1d43d3f3956a6b429c2d727bc92603": "v5.7-rc1", + "5a465c5391a856a0c1e9554964d660676c35d1b2": "v5.13-rc1", + "5a4b9fe7fece62ecab6fb28fe92362f83b41c33e": "v5.7-rc1", "5a52a7acf7e2a812d2852342992cee3dc22ad25d": "v4.12-rc1", + "5a6eb676d3bc4d7a6feab200a92437b62ad298da": "v2.6.23-rc1", "5a7203947a1d9b6f3a00a39fda08c2466489555f": "v3.11-rc1", + "5a7f555904671c0737819fe4d19bd6143de3f6c0": "v5.10-rc1", "5abda7a16698d4d1f47af1168d8fa2c640116b4a": "v6.4-rc1", + "5ad755fd2b326aa2bc8910b0eb351ee6aece21b1": "v5.13-rc5", + "5ae1e9922bbdbaeb9cfbe91085ab75927488ac0f": "v6.8-rc7", "5ae94c0d2f0bed41d6718be743985d61b7f5c47d": "v3.9-rc7", "5af08640795b2b9a940c9266c0260455377ae262": "v5.9", "5af10dfd0afc559bb4b0f7e3e8227a1578333995": "v4.13-rc5", "5afa7898ab7a0ec9c28556a91df714bf3c2f725e": "v5.15", "5b029a32cfe4600f5e10e36b41778506b90fd4de": "v5.14", "5b0bbee4732cbd58aa98213d4c11a366356bba3d": "v5.7-rc4", + "5b1faa92289b53cad654123ed2bc8e10f6ddd4ac": "v5.13-rc1", "5b423f6a40a0327f9d40bc8b97ce9be266f74368": "v3.6-rc5", "5b435de0d786869c95d1962121af0d7df2542009": "v3.2-rc1", + "5b4cdd9c5676559b8a7c944ac5269b914b8c0bb8": "v6.9-rc2", "5b6698b0e4a37053de35cc24ee695b98a7eb712b": "v3.19-rc3", "5b6c7e5c44349b29c614e1b61f80c6849fc72ccf": "v5.19-rc1", + "5b78ed24e8ec48602c1d6f5a188e58d000c81e2b": "v5.15-rc1", "5b9fbeb75b6a98955f628e205ac26689bcb1383e": "v5.9", + "5ba4e6d5863c53e937f49932dee0ecb004c65928": "v6.8-rc6", "5bbbbe32a43199c2b9ea5ea66fab6241c64beb51": "v4.15-rc1", + "5bc09b397cbf1221f8a8aacb1152650c9195b02b": "v6.8-rc4", "5bfbe3ad5840d941b89bcac54b821ba14f50a0ba": "v4.20-rc5", "5bfea2d9b17f1034a68147a8b03b9789af5700f9": "v5.8-rc1", "5c099c4fdc438014d5893629e70a8ba934433ee8": "v6.2-rc1", + "5c14a5f944b91371961548b1907802f74a4d2e5c": "v5.12-rc1-dontuse", + "5c15c60e7be615f05a45cd905093a54b11f461bc": "v6.6-rc6", "5c17c861a357e9458001f021a7afa7aab9937439": "v4.5-rc2", + "5c2a64252c5dc4cfe78e5b2a531c118894e3d155": "v6.1-rc1", "5c3462cfd123b341c9d3c947c1a2bab373f1697f": "v5.10-rc1", "5c36b99add5c3212b6cdb97cc206e1e3e0fa1e3c": "v3.8-rc1", "5c3c48ac6bf56367c4e89f6453cd2d61e50375bd": "v3.12-rc1", "5c455c5ab332773464d02ba17015acdca198f03d": "v5.11-rc1", "5c4c8c9544099bb9043a10a5318130a943e32fc3": "v5.13-rc1", + "5c54fcac9a9de559b444ac63ec3cd82f1d157a0b": "v4.19-rc6", "5c6e5b60aae4347223f176966455010a5715b863": "v4.8-rc1", "5c7fb56e5e3f7035dd798a8e1adee639f87043e5": "v4.5-rc1", "5c835bb142d4013c2ab24bff5ae9f6709a39cbcf": "v5.19-rc7", + "5c8a47a5a91d4d6e185f758d61997613d9c5d6ac": "v5.7-rc1", "5c911beff20aa8639e7a1f28988736c13e03ed54": "v5.8-rc1", "5c919412fe61c35947816fdbd5f7bd09fe0dd073": "v4.5-rc1", "5cadd4bb1d7fc9ab201ac14620d1a478357e4ebd": "v5.17-rc8", "5cec2d2e5839f9c0fec319c523a911e0a7fd299f": "v5.1-rc3", "5d069dbe8aaf2a197142558b6fb2978189ba3454": "v5.11-rc1", + "5d0a8d2fba50e9c07cde4aad7fba28c008b07a5b": "v6.5-rc7", "5d176f751ee3c6eededd984ad409bff201f436a7": "v4.9-rc1", + "5d1935ac02ca5aee364a449a35e2977ea84509b0": "v6.8-rc1", "5d26a105b5a73e5635eae0629b42fa0a90e07b7b": "v3.19-rc1", "5d2bd7009f306c82afddd1ca4d9763ad8473c216": "v3.7-rc1", "5d2be1422e02ccd697ccfcd45c85b4a26e6178e2": "v4.7-rc3", "5d2e73a5f80a5b5aff3caf1ec6d39b5b3f54b26e": "v5.3-rc1", + "5d3c4c79384af06e3c8e25b7770b6247496b4417": "v5.13-rc1", "5d407b071dc369c26a38398326ee2be53651cfe4": "v4.19-rc4", "5d41ce29e3b91ef305f88d23f72b3359de329cec": "v4.9-rc6", "5d4f98a28c7d334091c1b7744f48a1acdd2a4ae0": "v2.6.31-rc1", @@ -1394,9 +1779,12 @@ "5dc7d23e167e2882ef118456ceccd57873e876d8": "v6.3-rc7", "5dd0a57cf38eeb8b6be1d9c3df9add2f5756d974": "v4.16-rc1", "5de5b6ecf97a021f29403aa272cb4e03318ef586": "v5.9-rc1", + "5df16caada3fba3b21cb09b85cdedf99507f4ec1": "v5.12-rc1-dontuse", "5e2424708da7207087934c5c75211e8584d553a0": "v6.5-rc7", "5e2f30b756a37bd80c5b0471d0e10d769ab2eb9a": "v4.14-rc1", "5e31275cc997f8ec5d9e8d65fe9840ebed89db19": "v6.4-rc1", + "5e31b3df86ec6fbb925eee77fe2c450099c61dff": "v6.4-rc1", + "5e33f6fdf735cda1d4580fe6f1878da05718fe73": "v4.0-rc1", "5e3ca0ec76fce92daa4eed0d02de9c79b1fe3920": "v2.6.27-rc1", "5e3cc1ee1405a7eb3487ed24f786dec01b4cbe1f": "v5.1-rc1", "5e3dd157d7e70f0e3cea3f2573ed69fb156a19d5": "v3.11-rc1", @@ -1408,10 +1796,13 @@ "5eaf563e53294d6696e651466697eb9d491f3946": "v3.8-rc1", "5ec0811d30378ae104f250bfc9b3640242d81e3f": "v4.6-rc7", "5ec7d18d1813a5bead0b495045606c93873aecbb": "v5.16-rc8", + "5ec8e8ea8b7783fab150cf86404fc38cb4db8800": "v6.8-rc1", "5eda3550a3cc1987a495e9f85e5998a76d15a0aa": "v3.9-rc1", "5edabca9d4cff7f1f2b68f0bac55ef99d9798ba4": "v4.10", "5eeb2ca02a2f6084fc57ae5c244a38baab07033a": "v4.16-rc3", "5f00110f7273f9ff04ac69a5f85bb535a4fd0987": "v3.9-rc1", + "5f08318f617b05b6ee389d8bd174c7af921ebf19": "v4.11-rc1", + "5f29458b77d51c104554575b73184c243930aa87": "v5.7-rc1", "5f2f97656ada8d811d3c1bef503ced266fcd53a0": "v4.12-rc7", "5f3e2bf008c2221478101ee72f5cb4654b9fc363": "v5.2-rc6", "5f409e20b794565e2d60ad333e79334630a6c798": "v5.2-rc1", @@ -1423,6 +1814,7 @@ "5f936e19cc0ef97dbe3a56e9498922ad5ba1edef": "v4.19-rc1", "5f94c1741bdc7a336553122036e8a779e616ccbf": "v2.6.27-rc1", "5f9562ebe710c307adc5f666bf1a2162ee7977c0": "v5.16-rc6", + "5fd9e45f1ebcd57181358af28506e8a661a260b3": "v6.8-rc6", "5fe7f7b78290638806211046a99f031ff26164e1": "v6.4", "60085c3d009b0df252547adb336d1ccca5ce52ec": "v3.9-rc7", "600ddd6825543962fb807884169e57b580dba208": "v3.19-rc7", @@ -1432,6 +1824,7 @@ "602adf400201636e95c3fed9f31fba54a3d7e844": "v2.6.37-rc1", "6032046ec4b70176d247a71836186d47b25d1684": "v5.16-rc7", "604326b41a6fb9b4a78b6179335decee0365cd8c": "v4.20-rc1", + "6045b01dd0e3cd3759eafe7f290ed04c957500b1": "v5.13-rc1", "604c499cbbcc3d5fe5fb8d53306aa0fae1990109": "v3.11-rc3", "60545d0d4610b02e55f65d141c95b18ccf855b6e": "v3.11-rc1", "606142af57dad981b78707234cfbd15f9f7b7125": "v4.11-rc2", @@ -1446,17 +1839,27 @@ "610bfc6bc99bc83680d190ebc69359a05fc7f605": "v3.13-rc1", "610f8f5a7baf998e70a61c63e53869b676d9b04c": "v5.15-rc6", "611792920925fb088ddccbe2783c7f92fdfb6b64": "v6.2-rc7", + "611e12ea0f121a31d9e9c4ce2a18a77abc2f28d6": "v4.3-rc1", "613317bd212c585c20796c10afe5daaa95d4b0a1": "v4.5-rc4", "6134041bef0aeb9cb7c8a8daf045b44513cd8396": "v3.15-rc1", + "61461fc921b756ae16e64243f72af2bfc2e620db": "v5.13-rc1", "6160968cee8b90a5dd95318d716e31d7775c4ef3": "v3.11-rc5", + "616cf23b6cf40ad6f03ffbddfa1b6c4eb68d8ae1": "v5.13-rc1", + "616d82c3cfa2a2146dd7e3ae47bda7e877ee549e": "v6.8-rc7", + "619fee9eb13b5d29e4267cb394645608088c28a8": "v5.13-rc4", + "61a348857e869432e6a920ad8ea9132e8d44c316": "v6.8-rc3", + "61a7e26028b94805fd686a6dc9dbd9941f8f19b0": "v2.6.27-rc1", "61a96113de51e1f8f43ac98cbeadb54e60045905": "v3.6-rc1", "61b91eb33a69c3be11b259c5ea484505cd79f883": "v6.1-rc1", "61c1b44a21d70d4783db02198fbf68b132f4953c": "v5.19-rc1", "61c9fed41638249f8b6ca5345064eb1beb50179f": "v2.6.17-rc5", "61cf93700fe6359552848ed5e3becba6cd760efa": "v5.12-rc3", + "61cfac6f267dabcf2740a7ec8a0295833b28b5f5": "v4.11-rc1", + "61d8658b4a435eac729966cc94cdda077a8df5cd": "v4.11-rc1", "61ea0c0ba904a55f55317d850c1072ff7835ac92": "v3.13-rc1", "61f5d698cc97600e813ca5cf8e449b1ea1c11492": "v4.5-rc1", "61fad6816fc10fb8793a925d5c1256d1c3db0cd2": "v5.6", + "62094060cf3acaf52e277457d807ea753269b89e": "v6.2-rc1", "6217e5ede23285ddfee10d2e4ba0cc2d4c046205": "v3.17-rc1", "621b5060e823301d0cba4cb52a7ee3491922d291": "v3.14-rc6", "62229de19ff2b7f3e0ebf4d48ad99061127d0281": "v4.15-rc1", @@ -1477,6 +1880,7 @@ "635682a14427d241bab7bbdeebb48a7d7b91638e": "v4.3-rc4", "635d9398178659d8ddba79dd061f9451cec0b4d1": "v5.7-rc7", "635f545a7e8be7596b9b2b6a43cab6bbd5a88e43": "v4.15-rc4", + "636752bcb5177a301d0266270661581de8624828": "v3.6-rc1", "6377f787aeb945cae7abbb6474798de129e1f3ac": "v5.1-rc1", "638164a2718f337ea224b747cf5977ef143166a4": "v4.14-rc5", "6397fac4915ab3002dc15aae751455da1a852f25": "v4.15-rc1", @@ -1488,21 +1892,28 @@ "63e44bc52047f182601e7817da969a105aa1f721": "v6.6-rc7", "63ed1aab3d40aa61aaa66819bdce9377ac7f40fa": "v5.18-rc1", "6402939ec86eaf226c8b8ae00ed983936b164908": "v5.4-rc2", + "640d1930bef4f87ec8d8d2b05f0f6edc1dfcf662": "v5.17-rc1", + "643001b47adc844ae33510c4bb93c236667008a3": "v5.13-rc1", "643a16a0eb1d6ac23744bb6e90a00fc21148a9dc": "v6.2-rc1", "644595f89620ba8446cc555be336d24a34464950": "v3.4-rc1", "645a3c40ca3d40cc32b4b5972bf2620f2eb5dba6": "v5.17-rc1", "647bf3d8a8e5777319da92af672289b2a6c4dc66": "v4.10-rc8", "649c15c7691e9b13cbe9bf6c65c365350e056067": "v6.3-rc2", "64b875f7ac8a5d60a4e191479299e931ee949b67": "v4.10-rc1", + "64b9cea7a0afe579dd2682f1f1c04f2e4e72fd25": "v5.12-rc1-dontuse", "64beba0558fce7b59e9a8a7afd77290e82a22163": "v5.0-rc1", "64c70b1cf43de158282bc1675918d503e5b15cc1": "v2.6.23-rc1", + "64c8902ed4418317cd416c566f896bd4a92b2efc": "v6.3-rc1", "64d4ce892383b2ad6d782e080d25502f91bf2a38": "v5.5-rc3", + "64d6b281ba4db044c946158387c74e1149b9487e": "v5.12-rc1-dontuse", "64dd153c83743af81f20924c6343652d731eeecb": "v3.2-rc1", "64e6bbfff52db4bf6785fab9cffab850b2de6870": "v5.11-rc3", "65038428b2c6c5be79d3f78a6b79c0cdc3a58a41": "v5.7-rc1", "65117f1aa1b2d145fd5ca376bde642794d0aae1b": "v4.7-rc1", + "65371a3f14e73979958aea0db1e3bb456a296149": "v6.4-rc1", "654b404f2a222f918af9b0cd18ad469d0c941a8e": "v4.11-rc2", "657831ffc38e30092a2d5f03d385d710eb88b09a": "v4.12-rc1", + "657b306a7bdfca4ae1514b533a0e7c3c6d26dbc6": "v3.7-rc1", "657b5146955eba331e01b9a6ae89ce2e716ba306": "v6.5-rc4", "657eb17d87852c42b55c4b06d5425baa08b2ddb3": "v3.13-rc7", "659643f7d81432189c2c87230e2feee4c75c14c1": "v4.10-rc1", @@ -1513,10 +1924,20 @@ "65d8fc777f6dcfee12785c057a6b57f679641c90": "v4.6-rc1", "65eea8edc315589d6c993cf12dbb5d0e9ef1fe4e": "v4.19-rc5", "65f3324f4b6fed78b8761c3b74615ecf0ffa81fa": "v5.17", + "6613bc2301ba291a1c5a90e1dc24cf3edf223c03": "v5.13-rc1", "661412e301e2ca86799aa4f400d1cf0bd38c57c6": "v5.19-rc1", + "661779e1fcafe1b74b3f3fe8e980c1e207fea1fd": "v6.8-rc7", "662ca437e714caaab855b12415d6ffd815985bc0": "v3.12-rc2", + "6637e11e4ad22ff03183da0dbd36d65c98b81cf7": "v6.5-rc1", + "663c0c9496a69f80011205ba3194049bcafd681d": "v5.4-rc1", + "6641df81ab799f28a5d564f860233dd26cca0d93": "v5.13-rc1", "66450a21f99636af4fafac2afd33f1a40631bc3a": "v3.10-rc1", + "6657fca06e3ffab8d0b3f9d8b397f5ee498952d7": "v4.17-rc1", + "6670e152447732ba90626f36dfc015a13fbf150e": "v4.15-rc1", "667121ace9dbafb368618dbabcf07901c962ddac": "v4.9-rc4", + "668a84c1bfb2b3fd5a10847825a854d63fac7baa": "v5.13-rc5", + "66951d98d9bf45ba25acf37fe0747253fafdf298": "v6.8-rc4", + "66b60b0c8c4a163b022a9f0ad6769b0fd3dc662f": "v6.8-rc6", "66d42ed8b25b64eb63111a2b8582c5afc8bf1105": "v5.9-rc7", "66e3531b33ee51dad17c463b4d9c9f52e341503d": "v5.17-rc8", "6709d4b7bc2e079241fdef15d1160581c5261c10": "v6.5-rc1", @@ -1527,25 +1948,34 @@ "67a2e213e7e937c41c52ab5bc46bf3f4de469f6e": "v4.3-rc7", "67b0503db9c29b04eadfeede6bebbfe5ddad94ef": "v4.11-rc4", "67b67e365f07d6dc70f3bb266af3268bac0a4836": "v2.6.37-rc1", + "67b8bcbaed4777871bb0dcc888fb02a614a98ab1": "v6.8-rc4", "67d7d8ad99beccd9fe92d585b87f1760dc9018e3": "v6.0-rc1", "67de956ff5dc1d4f321e16cfbd63f5be3b691b43": "v3.5-rc6", "67f0d6d9883c13174669f88adac4f0ee656cc16a": "v5.14-rc3", "67f1aee6f45059fd6b0f5b0ecb2c97ad0451f6b3": "v4.5-rc1", + "67f29896fdc83298eed5a6576ff8f9873f709228": "v5.13-rc3", "67f93df79aeefc3add4e4b31a752600f834236e2": "v4.16-rc7", "68035c80e129c4cfec659aac4180354530b26527": "v5.6-rc1", "680d04e0ba7e926233e3b9cee59125ce181f66ba": "v3.9-rc7", + "680ec0549a055eb464dce6ffb4bfb736ef87236e": "v5.13-rc4", + "6815f479ca90ee7fd2e28b2a420f796b974155fe": "v5.8-rc1", "6817ae225cd650fb1c3295d769298c38b1eba818": "v3.17-rc3", "681c1615f8914451cfd432ad30e2f307b6490542": "v5.14-rc1", "681fef8380eb818c0b845fca5d2ab1dcbab114ee": "v4.7-rc1", "6829e274a623187c24f7cfc0e3d35f25d087fcc5": "v4.1-rc2", + "682dc133f83e0194796e6ea72eb642df1c03dfbe": "v6.8-rc7", + "683313993dbe1651c7aa00bb42a041d70e914925": "v5.13-rc1", "683412ccf61294d727ead4a73d97397396e69a6b": "v5.18-rc4", "6845667146a28c09b5dfc401c1ad112374087944": "v5.17-rc1", "68501df92d116b760777a2cfda314789f926476f": "v5.4-rc2", "6859d49475d4f32abe640372117e4b687906e6b6": "v2.6.25-rc1", + "687125b5799cd5120437fa455cfccbe8537916ff": "v6.3-rc1", "687cb0884a714ff484d038e9190edc874edcf146": "v4.15-rc2", "688078e7f36c293dae25b338ddc9e0a2790f6e06": "v5.5-rc1", "6884c6c4bd09fb35b79a3967d15821cdfcbe77a3": "v5.0-rc1", + "68866e425be2ef2664aa5c691bb3ab789736acf5": "v3.0-rc4", "688e8128b7a92df982709a4137ea4588d16f24aa": "v5.12-rc2", + "68957303f44a501af5cf37913208a2acaa6bcdf1": "v3.16-rc1", "68a81291ff6650f3ff409ebfc58ef97dfe85a2e4": "v3.8-rc1", "68ab61084de3220e2fb0a698c890ba91decddc85": "v3.19-rc1", "68c0bdff7ac903421f224e080499c51cd5287f97": "v2.6.33-rc1", @@ -1558,6 +1988,7 @@ "6934da9238da947628be83635e365df41064b09b": "v4.4-rc1", "69664cf16af4f31cd54d77948a4baf9c7e0ca7b9": "v2.6.26-rc1", "696e1a48b1a1b01edad542a1ef293665864a4dd0": "v6.2-rc5", + "69842cba9ace84849bb9b8edcdf2cefccd97901c": "v5.3-rc1", "6994eefb0053799d2e07cd140df6c2ea106c41ee": "v5.2", "69ae4f6aac1578575126319d3f55550e7e440449": "v5.2-rc6", "69c433ed2ecd2d3264efd7afec4439524b319121": "v3.18-rc2", @@ -1572,14 +2003,18 @@ "6a53b7593233ab9e4f96873ebacc0f653a55c3e1": "v4.15-rc6", "6a7228d90d42bcacfe38786756ba62762b91c20a": "v4.17-rc3", "6a76f8c0ab19f215af2a3442870eeb5f0e81998d": "v3.9-rc7", + "6a98d71daea186247005099758af549e6afdd244": "v5.8-rc1", "6ab55ec0a938c7f943a4edba3d6514f775983887": "v6.0-rc4", + "6ac07883dbb5f60f7bc56a13b7a84a382aa9c1ab": "v6.7-rc1", "6ac93117ab009d3901ed5d3d0f79056eb5fc0afd": "v4.11-rc1", "6acb47d1a318e5b3b7115354ebc4ea060c59d3a1": "v4.20-rc1", "6ae746711263bd6da45f709fdb9f12e4f57e22bd": "v4.19-rc1", "6aeb75e6adfaed16e58780309613a578fe1ee90b": "v4.12-rc2", + "6af289746a636f71f4c0535a9801774118486c7a": "v6.6-rc3", "6af3aa57a0984e061f61308fe181a9a12359fecc": "v5.4-rc4", "6b06314c47e141031be043539900d80d2c7ba10f": "v5.1-rc1", "6b1775f26a2da2b05a6dc8ec2b5d14e9a4701a1a": "v5.17-rc8", + "6b1ba3f9040be5efc4396d86c9752cdc564730be": "v6.8-rc7", "6b1e6cc7855b09a0a9bfa1d9f30172ba366f161c": "v4.8-rc1", "6b4a64bafd107e521c01eec3453ce94a3fb38529": "v6.8-rc1", "6b4afdd794783fe515b50838aa36591e3feea990": "v3.15-rc1", @@ -1594,7 +2029,10 @@ "6b8d9117ccb4f81b1244aafa7bc70ef8fa45fc49": "v3.19-rc7", "6b9ad1c742bf227b1005a41d8baa315b747e3e8d": "v4.13-rc1", "6bb69c9b69c315200ddc2bc79aee14c0184cf5b2": "v4.6-rc1", + "6bba4471f0cc1296fe3c2089b9e52442d3074b2e": "v5.13-rc5", "6bc235a2e24a5ef677daee3fd4f74f6cd643e23c": "v2.6.37-rc1", + "6bd97bf273bdb4944904e57480f6545bca48ad77": "v5.11-rc1", + "6be388f4a35d2ce5ef7dbf635a8964a5da7f799f": "v5.13-rc5", "6bf92d70e690b7ff12b24f4bfff5e5434d019b82": "v5.18-rc2", "6bf9e4bd6a277840d3fe8c5d5d530a1fbd3db592": "v5.2-rc1", "6c21e066f9256ea1df6f88768f6ae1080b7cf509": "v6.5-rc4", @@ -1605,6 +2043,7 @@ "6c4841c2b6c32a134f9f36e5e08857138cc12b10": "v2.6.19-rc3", "6c493f8b28c6744995e92801a20dca192635dd22": "v3.5-rc1", "6c4e976785011dfbe461821d0bfc58cfd60eac56": "v4.12-rc1", + "6c52fdc244b5ccc468006fd65a504d4ee33743c7": "v5.3-rc1", "6c5aa6fc4defc2a0977a2c59e4710d50fa1e834c": "v5.9-rc1", "6c85501f2fabcfc4fc6ed976543d252c4eaf4be9": "v4.14-rc3", "6c8991f41546c3c472503dff1ea9daaddf9331c2": "v5.5-rc1", @@ -1612,6 +2051,7 @@ "6cc03e8aa36c51f3b26a0d21a3c4ce2809c842ac": "v5.4-rc1", "6cd1ed50efd88261298577cd92a14f2768eddeeb": "v5.6-rc3", "6cd88243c7e03845a450795e134b488fc2afb736": "v5.19-rc2", + "6cdedc18ba7b9dacc36466e27e3267d201948c8d": "v6.8-rc5", "6ce59025f1182125e75c8d121daf44056b65dd1f": "v5.1-rc2", "6cf97230cd5f36b7665099083272595c55d72be7": "v5.3-rc1", "6cffd79504ce040f460831030d3069fa1c99bb71": "v5.1-rc1", @@ -1622,38 +2062,50 @@ "6d19628f539fccf899298ff02ee4c73e4bf6df3f": "v5.13-rc1", "6d1c0f3d28f98ea2736128ed3e46821496dc3a8c": "v5.14-rc1", "6d2e21dc4db3933db65293552ecc1ede26febeca": "v6.2-rc1", + "6d2f8909a5fabb73fe2a63918117943986c39b6c": "v5.13-rc1", "6d390e4b5d48ec03bb87e63cf0a2bff5f4e116da": "v5.6-rc5", "6d4472d7bec39917b54e4e80245784ea5d60ce49": "v5.3-rc4", "6d5c9e79b726cc473d40e9cb60976dbe8e669624": "v6.2-rc1", + "6d5f26f2e045f2377b524516194657c00efbbce8": "v5.2-rc1", "6d67b0290b4b84c477e6a2fc6e005e174d3c7786": "v5.6-rc3", + "6d72e7c767acbbdd44ebc7d89c6690b405b32b57": "v5.13-rc1", "6d816e088c359866f9867057e04f244c608c42fe": "v5.9-rc1", "6d8c50dcb029872b298eea68cc6209c866fd3e14": "v4.18-rc1", "6daca13d2e72bedaaacfc08f873114c9307d5aea": "v4.19-rc1", "6db7199407ca56f55bc0832fb124e1ad216ea57b": "v3.1-rc1", "6dcd5d7a7a29c1e4b8016a06aed78cd650cd8c27": "v5.5-rc1", "6dee930f6f6776d1e5a7edf542c6863b47d9f078": "v5.18-rc1", + "6df0e6c57dfc064af330071f372f11aa8c584997": "v5.12-rc8", + "6df7f764cd3cf5a03a4a47b23be47e57e41fcd85": "v6.4-rc4", "6e1acfa387b9ff82cfc7db8cc3b6959221a95851": "v5.18-rc1", + "6e2276203ac9ff10fc76917ec9813c660f627369": "v6.8-rc3", "6e2f90d31fe09f2b852de25125ca875aabd81367": "v6.8-rc5", "6e41e2257f1094acc37618bf6c856115374c6922": "v5.3-rc1", "6e601a53566d84e1ffd25e7b6fe0b6894ffd79c0": "v3.9-rc1", "6e6fddc78323533be570873abb728b7e0ba7e024": "v4.18-rc6", + "6e728f321393b1fce9e1c2c3e55f9f7c15991321": "v5.8-rc1", "6e8280b958c5d7edc514cf347a800b23b7732b2b": "v6.2-rc1", "6e8ab72a812396996035a37e5ca4b3b99b5d214b": "v4.18-rc4", "6e977eaa8280e957b87904b536661550f2a6b3e8": "v5.18-rc1", + "6ea38e2aeb72349cad50e38899b0ba6fbcb2af3d": "v6.8-rc6", "6ea8d958a2c95a1d514015d4e29ba21a8c0a1a91": "v4.15-rc2", "6eaf41e87a223ae6f8e7a28d6e78384ad7e407f8": "v6.5-rc3", "6ec82562ffc6f297d0de36d65776cff8e5704867": "v2.6.34", "6ee50c8e262a0f0693dad264c3c99e30e6442a56": "v5.10-rc7", + "6ef5d5b92f7117b324efaac72b3db27ae8bb3082": "v6.8-rc5", "6f092343855a71e03b8d209815d8c45bf3a27fcd": "v3.13-rc1", "6f23ee1fefdc1f80bd8a3ab04a1c41ab2dec14c9": "v2.6.21-rc1", "6f24f892871acc47b40dd594c63606a17c714f77": "v3.4-rc6", + "6f3d791f300618caf82a2be0c27456edd76d5164": "v4.14-rc1", "6f3ef5c25cc762687a7341c18cbea5af54461407": "v5.4-rc6", "6f442be2fb22be02cafa606f1769fa1e6f894441": "v3.18-rc6", "6f489a966fbeb0da63d45c2c66a8957eab604bf6": "v6.5-rc1", "6f49f46b187df34539f1e5df2469b8a541897700": "v3.7-rc1", "6f64f866aa1ae6975c95d805ed51d7e9433a0016": "v6.8-rc1", + "6f76a01173ccaa363739f913394d4e138d92d718": "v5.12-rc1-dontuse", "6f78193ee9ea5575180d4462f0f7273a22dd5057": "v4.4-rc1", "6f7b0a2a5c0fb03be7c25bd1745baa50582348ef": "v3.6-rc2", + "6f82b25587354ce7c9c42e0b53d8b0770b900847": "v5.9-rc1", "6fb05e0dd32e566facb96ea61a48c7488daa5ac3": "v4.13-rc1", "6fb392b1a63ae36c31f62bc3fc8630b49d602b62": "v3.13-rc1", "6fcca0fa48118e6d63733eb4644c6cd880c15b8f": "v5.6-rc2", @@ -1668,12 +2120,18 @@ "705318a99a138c29a512a72c3e0043b3cd7f55f4": "v6.7-rc5", "7053aee26a3548ebaba046ae2e52396ccf56ac6c": "v3.14-rc1", "705c7091262d02b09eb686c24491de61bf42fdb2": "v4.14-rc1", + "7073934f5d73f8b53308963cee36f0d389ea857c": "v6.8-rc1", "70789d7052239992824628db8133de08dc78e593": "v2.6.36-rc4", + "7081929ab2572920e94d70be3d332e5c9f97095a": "v6.8-rc2", "70834d3070c3f3015ab5c05176d54bd4a0100546": "v3.4-rc1", "70aacfe66136809d7f080f89c492c278298719f4": "v5.12-rc2", + "70ca3c57ff914113f681e657634f7fbfa68e1ad1": "v5.13-rc4", "70cd94e60c733e3afc18b0e6aab789c13b5571da": "v4.16-rc1", "70f3aac964ae2bc9a0a1d5d65a62e258591ade18": "v4.12-rc1", + "70fac8088cfad9f3b379c9082832b4d7532c16c2": "v5.13-rc1", "70feee0e1ef331b22cc51f383d532a0d043fbdcc": "v4.12-rc4", + "7104ba0f1958adb250319e68a15eff89ec4fd36d": "v6.8-rc3", + "710c69dbaccdac312e32931abcb8499c1525d397": "v6.8-rc3", "71105998845fb012937332fe2e806d443c09e026": "v4.14-rc5", "71171ac8eb34ce7fe6b3267dce27c313ab3cb3ac": "v5.17-rc8", "711bdde6a884354ddae8da2fcb495b2a9364cc90": "v4.2-rc1", @@ -1709,9 +2167,12 @@ "72dba584b695d8bc8c1a50ed54ad4cba7c62314d": "v2.6.23-rc1", "72dc1c096c7051a48ab1dbb12f71976656b55eb5": "v2.6.27-rc1", "7315dc1e122c85ffdfc8defffbb8f8b616c2eb1a": "v6.7", + "731ab1f9828800df871c5a7ab9ffe965317d3f15": "v6.8-rc4", "73223e4e2e3867ebf033a5a8eb2e5df0158ccc99": "v4.13-rc6", "732d41c545bb359cbb8c94698bdc1f8bcf82279c": "v5.10-rc1", + "734551df6f9bedfbefcd113ede665945e9de0b99": "v5.13-rc1", "734942cc4ea6478eed125af258da1bdbb4afe578": "v4.13-rc1", + "73578af92a0fae6609b955fcc9113e50e413c80f": "v5.13-rc3", "736bb9577407d3556d81c3c3cd57581cd3ae10ea": "v4.0-rc1", "737223fbca3b1c91feb947c7f571b35749b743b6": "v3.10-rc1", "739790605705ddcf18f21782b9c99ad7d53a8c11": "v6.2-rc5", @@ -1721,9 +2182,12 @@ "73e487fdb75f8abf230968dbf73a3dc3b16808d3": "v2.6.18-rc1", "73f156a6e8c1074ac6327e0abd1169e95eb66463": "v3.16-rc1", "73fa0d10d077d9521ee2dace2307ae2c9a965336": "v3.6-rc1", + "7400b063969bdca4a06cd97f1294d765c8eecbe1": "v5.7-rc1", "742ab6df974ae8384a2dd213db1a3a06cf6d8936": "v5.19-rc7", + "74310e06be4d74dcf67cd108366710dee5c576d5": "v4.14-rc1", "7433b6d2afd512d04398c73aa984d1e285be125b": "v6.6-rc3", "744692dc059845b2a3022119871846e74d4f6e11": "v2.6.34-rc1", + "744e1885922a9943458954cfea917b31064b4131": "v6.8-rc1", "74675a58507e769beee7d949dbed788af3c4139d": "v2.6.31-rc1", "7490b008d123f9bd781f51ad86b543aed49f6200": "v4.2-rc1", "749494b6bdbbaf0899aa1c62a1ad74cd747bce47": "v4.11-rc1", @@ -1731,23 +2195,34 @@ "74e19ef0ff8061ef55957c3abd71614ef0f42f47": "v6.3-rc1", "74e7e1efdad45580cc3839f2a155174cf158f9b5": "v6.1", "74e98eb085889b0d2d4908f59f6e00026063014f": "v4.3-rc1", + "74ecdda68242b174920fe7c6133a856fb7d8559b": "v6.8-rc1", "74f75a0cb7033918eb0fa4a50df25091ac75c16e": "v2.6.37-rc1", + "7529b90d051e4629884771ba2b1d3a87d2c6a9d7": "v5.2-rc1", "75333d48f92256a0dec91dbf07835e804fc411c0": "v6.2-rc1", "7549ae3e81cc45908cbeee54a52b24f247fb0a2d": "v2.6.32-rc1", "756d17ee7ee4fbc8238bdf97100af63e6ac441ef": "v2.6.33-rc1", "7574fcdbdcb335763b6b322f6928dc0fd5730451": "v5.12-rc7", + "757cc3e9ff1d72d014096399d6e2bf03974d9da1": "v5.6-rc1", "7588dbcebcbf0193ab5b76987396d0254270b04a": "v6.5-rc6", "759c01142a5d0f364a462346168a56de28a80f52": "v4.5-rc1", + "75a2f31520095600f650597c0ac41f48b5ba0068": "v5.16-rc7", "75a493e60ac4bbe2e977e7129d6d8cbb0dd236be": "v3.11-rc1", + "75a5221630fe5aa3fedba7a06be618db0f79ba1e": "v6.6-rc5", + "75ad80ed88a182ab2ad5513e448cf07b403af5c3": "v6.6-rc3", "75b0cea7bf307f362057cc778efe89af4c615354": "v5.8-rc3", "75e5b4849b81e19e9efe1654b30d7f3151c33c2c": "v5.17-rc4", "75ff39ccc1bd5d3c455b6822ab09e533c551f758": "v4.7", + "7601df8031fd67310af891897ef6cc0df4209305": "v6.8-rc4", + "761da2935d6e18d178582dbdf315a3a458555505": "v4.1-rc1", "7625ee981af166ddb569e2e6c0006e2af471326f": "v4.13-rc1", "7644b1a1c9a7ae8ab99175989bfc8676055edb46": "v6.6", "764f4eb6846f5475f1244767d24d25dd86528a4a": "v5.18-rc1", + "7663d522099ecc464512164e660bc771b2ff7b64": "v6.6-rc7", + "767e97e1e0db0d0f3152cd2f3bd3403596aedbad": "v2.6.37-rc1", "768d612f79822d30a1e7d132a4d4b05337ce42ec": "v6.6-rc1", "7690aa1cdf7c4565ad6b013b324c28b685505e24": "v5.8-rc1", "7694a7de22c53a312ea98960fcafc6ec62046531": "v5.16", + "769b01ea68b6c49dc3cde6adf7e53927dacbd3a8": "v5.13-rc4", "76ca8da989c7d97a7f76c75d475fe95a584439d7": "v6.3-rc1", "76cc404bfdc0d419c720de4daaf2584542734f42": "v4.4-rc8", "76d56d4ab4f2a9e4f085c7d77172194ddaccf7d2": "v4.19-rc1", @@ -1760,6 +2235,7 @@ "772439717dbf703b39990be58d8d4e3e4ad0598a": "v4.17-rc7", "77245f1c3c6495521f6a3af082696ee2f8ce3921": "v6.5-rc6", "77260807d1170a8cf35dbb06e07461a655f67eee": "v4.18-rc4", + "7733f6c32e36ff9d7adadf40001039bf219b1cbe": "v5.4-rc1", "77377064c3a94911339f13ce113b3abf265e06da": "v5.10-rc1", "775c5033a0d164622d9d10dd0f0a5531639ed3ed": "v5.12-rc4", "776617db78c6d208780e7c69d4d68d1fa82913de": "v6.4-rc1", @@ -1780,19 +2256,27 @@ "7814b6ec6d0d63444abdb49554166c8cfcbd063e": "v4.3-rc1", "781fca5b104693bc9242199cc47c690dcaf6a4cb": "v4.19-rc1", "78214e81a1bf43740ce89bb5efda78eac2f8ef83": "v3.12-rc2", + "782b3e86ea970e899f8e723db9f64708a15ca30e": "v5.13-rc1", + "783807436f363e5b1ad4d43ba7debbedfcadbb99": "v5.5-rc1", + "7839d0078e0d5e6cc2fa0b0dfbee71de74f1e557": "v6.8-rc1", "786de92b3cb26012d3d0f00ee37adf14527f35c4": "v4.14-rc4", "7892032cfe67f4bde6fc2ee967e45a8fbaf33756": "v4.10-rc8", + "78996eee79ebdfe8b6f0e54cb6dcc792d5129291": "v6.8-rc1", "78a861b9495920f8609dee5b670dacbff09d359f": "v6.0-rc1", + "78aafb3884f6bc6636efcc1760c891c8500b9922": "v6.8-rc1", "78beef629fd95be4ed853b2d37b832f766bd96ca": "v5.4-rc1", "78c9c4dfbf8c04883941445a195276bb4bb92c76": "v4.19-rc1", "78d60dae9a0c9f09aa3d6477c94047df2fe6f7b0": "v6.8-rc1", + "78fbb92af27d0982634116c7a31065f24d092826": "v6.8-rc1", "791f3465c4afde02d7f16cf7424ca87070b69396": "v5.17-rc1", "792039c73cf176c8e39a6e8beef2c94ff46522ed": "v3.6-rc3", + "792595bab4925aa06532a14dd256db523eb4fa5e": "v6.8-rc5", "7926aff5c57b577ab0f43364ff0c59d968f6a414": "v4.10-rc8", "7932c0bd7740f4cd2aa168d3ce0199e7af7d72d5": "v4.2-rc5", "7937609cd387246aed994e81aa4fa951358fba41": "v6.6-rc7", "7938d61591d33394a21bdd7797a245b65428f44c": "v5.17-rc2", "79462ad02e861803b3840cc782248c7359451cd9": "v4.4-rc6", + "794aaf01444d4e765e2b067cba01cc69c1c68ed9": "v5.13-rc1", "794b4bc292f5d31739d89c0202c54e7dc9bc3add": "v4.12-rc5", "79549c6dfda0603dba9a70a53467ce62d9335c33": "v3.4-rc3", "7966f319c66d9468623c6a6a017ecbc0dd79be75": "v6.7-rc1", @@ -1802,22 +2286,28 @@ "7992c18810e568b95c869b227137a2215702a805": "v4.19-rc1", "79c9ce57eb2d5f1497546a3946b4ae21b6fdc438": "v4.6-rc6", "79d5b4c3cd809c770d4bf9812635647016c56011": "v3.6-rc1", + "79d72c68c58784a3e1cd2378669d51bfd0cb7498": "v6.8-rc4", "79dc7e3f1cd323be4c81aa1a94faa1b3ed987fb2": "v4.9-rc8", "79e1ad148c844f5c8b9d76b36b26e3886dca95ae": "v4.15-rc1", "79e48650320e6fba48369fccf13fd045315b19b8": "v4.6", + "79ebe9110fa458d58f1fceb078e2068d7ad37390": "v5.13-rc2", "7a0a48ddf63bc9944b9690c6fa043ea4305f7f79": "v4.15-rc1", + "7a2464fac80d42f6f8819fed97a553e9c2f43310": "v6.8-rc1", "7a2af766af15887754f7f7a0869b4603b390876a": "v4.14-rc1", "7a3e97b0dc4bbac2ba7803564ab0057722689921": "v3.4-rc1", "7a3ef208e662f4b63d43a23f61a64a129c525bbc": "v3.19-rc4", "7a62ed61367b8fd01bae1e18e30602c25060d824": "v6.1-rc1", + "7a6b1ab7475fd6478eeaf5c9d1163e7a18125c8f": "v5.13-rc7", "7a7b5df84b6b4e5d599c7289526eed96541a0654": "v4.10-rc7", "7a9cdebdcc17e426fb5287e4a82db1dfe86339b2": "v4.19-rc4", + "7ad65bf68d705b445ef10b77ab50dab22be185ee": "v3.3-rc1", "7ada876a8703f23befbb20a7465a702ee39b1704": "v2.6.37-rc1", "7aed44babc7f97e82b38e9a68515e699692cc100": "v6.6-rc5", "7af4cc3fa158ff1dda6e7451c7e6afa6b0bb85cb": "v2.6.14-rc1", "7b07f8eb75aa3097cdfd4f6eac3da49db787381d": "v3.6-rc3", "7b08cf62b1239a4322427d677ea9363f0ab677c6": "v5.14-rc1", "7b09c2d052db4b4ad0b27b97918b46a7746966fa": "v5.4-rc1", + "7b0b1a6d0ac983ce1928432285d0222d4fb7c38b": "v4.16-rc1", "7b0e827c6970e8ca77c60ae87592204c39e41245": "v4.18-rc1", "7b26e4e2119d0c5ede1282b22ce2af22835ff4b5": "v4.20-rc1", "7b2a64c96ad53c4299f7e6ddf8c2f99cb48940a9": "v2.6.39-rc1", @@ -1835,11 +2325,16 @@ "7bdb157cdebbf95a1cd94ed2e01b338714075d00": "v5.10-rc3", "7be3248f313930ff3d3436d4e9ddbe9fccc1f541": "v5.16-rc1", "7be74942f184fdfba34ddd19a0d995deb34d4a03": "v5.9-rc5", + "7be85676f1d13c77a7e0c72e04903bfd39580d4f": "v4.14-rc1", + "7bed6f3d08b7af27b7015da8dc3acf2b9c1f21d7": "v6.8-rc1", "7c00ffa314bf0fb0e23858bbebad33b48b6abbb9": "v2.6.13-rc1", "7c03e2cda4a584cadc398e8f6641ca9988a39d52": "v5.11-rc1", "7c051267931a9be9c6620cc17b362bc6ee6dedc8": "v4.7-rc1", + "7c0ea5930c1c211931819d83cfb157bff1539a4c": "v5.13-rc1", + "7c18d2205ea76eef9674e59e1ecae4f332a53e9e": "v3.3-rc1", "7c319d328505b7781b65238ae9f53293b5ee0ca8": "v3.6-rc1", "7c38a551bda1b7adea7e98e5c6786f5bee7100b8": "v5.18-rc1", + "7c4650ded49e5b88929ecbbb631efb8b0838e811": "v6.8-rc3", "7c4a5b89a0b5a57a64b601775b296abf77a9fe97": "v6.3-rc1", "7c657876b63cb1d8a2ec06f8fc6c37bb8412e66c": "v2.6.14-rc1", "7c693f54c873691a4b7da05c7e0f74e67745d144": "v5.19-rc7", @@ -1847,11 +2342,13 @@ "7c80f9e4a588f1925b07134bb2e3689335f6c6d8": "v4.14-rc5", "7c94e1c157a227837b04f02f5edeff8301410ba2": "v3.18-rc1", "7c9524d929648935bac2bbb4c20437df8f9c3f42": "v6.1-rc4", + "7c9631969287a5366bc8e39cd5abff154b35fb80": "v6.9-rc2", "7c9bc0983f890ed9782e755a0e070930cd979333": "v4.15-rc1", "7c9cbd0b5e38a1672fcd137894ace3b042dfbf69": "v5.1-rc1", "7caac62ed598a196d6ddf8d9c121e12e082cac3a": "v5.3", "7cc765a67d8e04ef7d772425ca5a2a1e2b894c15": "v4.20-rc5", "7cccf0725cf7402514e09c52b089430005798b7f": "v4.18-rc1", + "7cfc4ea78fc103ea51ecbacd9236abb5b1c490d2": "v5.13-rc4", "7d0a06586b2686ba80c4a2da5f91cb10ffbea736": "v5.3-rc7", "7d11f77f84b27cef452cee332f4e469503084737": "v4.15-rc8", "7d267278a9ece963d77eefec61630223fce08c6c": "v4.4-rc4", @@ -1859,6 +2356,7 @@ "7d3baf0afa3aa9102d6a521a8e4c41888bb79882": "v5.16-rc6", "7d3e91a89b7adbc2831334def9e494dd9892f9af": "v3.8-rc1", "7d5145d8eb2b9791533ffe4dc003b129b9696c48": "v3.8-rc7", + "7d5cb45655f2e9e37ef75d18f50c0072ef14a38b": "v4.15-rc1", "7d67af2c013402537385dae343a2d0f6a4cb3bfd": "v5.7-rc1", "7d7402642eaf385aef0772eff5a35e34fc4995d7": "v4.1-rc1", "7d928a2b14eede1f333db7b7b684c57f7fa7f456": "v2.6.19-rc1", @@ -1866,28 +2364,38 @@ "7da413a18583baaf35dd4a8eb414fa410367d7f2": "v5.5-rc1", "7dac4a1726a9c64a517d595c40e95e2d0d135f6f": "v4.17-rc1", "7dc40713618c884bf07c030d1ab1f47a9dc1f310": "v5.2-rc1", + "7dcf3c04f0aca746517a77433b33d40868ca4749": "v5.13-rc1", "7de249964f5578e67b99699c5f0b405738d820a2": "v4.8-rc2", "7df3e59c3d1df4f87fe874c7956ef7a3d2f4d5fb": "v4.9-rc3", "7e01e7ad746b": "v4.2-rc1", "7e0438f83dc769465ee663bb5dcf8cc154940712": "v5.18-rc1", "7e09f7d5c790278ab98e5f2c22307ebe8ad6e8ba": "v4.14-rc1", "7e24969022cbd61ddc586f14824fc205661bb124": "v5.9-rc4", + "7e51891a237f9ea319f53f9beb83afb0077d88e6": "v5.8-rc1", "7e5d7753956b374516530e156c5e8aa19652398d": "v3.19-rc1", "7e62a699aafbd97928f19a8356d719b71b0e151c": "v4.10-rc1", "7e6bc1f6cabcd30aba0b11219d8e01b952eacbb6": "v5.19-rc6", "7e70cb4978507cf31d76b90e4cfb4c28cad87f0c": "v2.6.38-rc1", + "7e82a8745b951b1e794cc780d46f3fbee5e93447": "v6.8-rc3", "7e84e1c7566a1df470a9e1f49d3db2ce311261a4": "v5.10-rc1", "7e97cfed9929eaabc41829c395eb0d1350fccb9d": "v6.0-rc1", "7ec02f5ac8a5be5a3f20611731243dc5e1d9ba10": "v5.17-rc4", "7ed9abfe8e9f62384f9b11c9fca19e551dbec5bd": "v5.11-rc1", + "7ed9d238c7dbb1fdb63ad96a6184985151b0171c": "v5.13-rc2", + "7ee29facd8a9c5a26079148e36bcf07141b3a6bc": "v6.6-rc4", "7f14c7227f342d9932f9b918893c8814f86d2a0d": "v5.17-rc6", + "7f3d03c48b1eb6bc45ab20ca98b8b11be25f9f52": "v6.8-rc4", "7f3dc0088b98533f17128058fac73cd8b2752ef1": "v4.15-rc6", + "7f42ec3941560f0902fe3671e36f2c20ffd3af0a": "v3.12-rc4", + "7f4a8592ff29f19c5a2ca549d0973821319afaad": "v5.13-rc1", "7f582b248d0a86bae5788c548d7bb5bca6f7691a": "v4.17-rc7", "7f5c6d4f665bb57a19a34ce1fb16cc708c04f219": "v3.0-rc1", + "7f5d86669fa4d485523ddb1d212e0a2d90bd62bb": "v5.13-rc5", "7f7ccc2ccc2e70c6054685f5e3522efa81556830": "v4.17-rc6", "7f821fc9c77a9b01fe7b1d6e72717b33d8d64142": "v4.4-rc3", "7f84ff68be05ec7a5d2acf8fdc734fe5897af48f": "v5.2-rc1", "7f98639def42a676998d734b381af6c0e64d7791": "v2.6.35-rc1", + "7fa32329ca03148fb2c07b4ef3247b8fc0488d6a": "v4.5-rc1", "7fafcfdf6377b18b2a726ea554d6e593ba44349f": "v4.17-rc1", "7fb57a019f94ea0c1290c39b8da753be155af41c": "v3.3-rc1", "7fc3b7c2981bbd1047916ade327beccb90994eee": "v5.17-rc2", @@ -1900,6 +2408,8 @@ "801c135ce73d5df1caf3eca35b66a10824ae0707": "v2.6.22-rc1", "801ebf1043ae7b182588554cc9b9ad3c14bc2ab5": "v5.3-rc1", "8033426e6bdb2690d302872ac1e1fadaec1a5581": "v3.12-rc1", + "8035b1a2a37a29d8c717ef84fca8fe7278bc9f03": "v5.16-rc7", + "8059918a1377f2f1fff06af4f5a4ed3d5acd6bc4": "v6.8-rc3", "80765597bc587feae8dbc8ce97a0f32e12a6e625": "v4.17-rc1", "80c802f3073e84c956846e921e8a0b02dfa3755f": "v2.6.35-rc1", "80c9abaabf4283f7cf4a0b3597cd302506635b7f": "v2.6.21-rc1", @@ -1911,10 +2421,12 @@ "8148a73c9901a8794a50f950083c00ccf97d43b3": "v4.6-rc7", "814fb7bb7db5433757d76f4c4502c96fc53b0b5e": "v4.14-rc3", "815f0ddb346c196018d4d8f8f55c12b83da1de3f": "v4.19-rc1", + "81732c3b2fede049a692e58a7ceabb6d18ffb18c": "v3.7-rc1", "8176cced706b5e5d15887584150764894e94e02f": "v3.9-rc8", "817b8b9c5396d2b2d92311b46719aad5d3339dbe": "v5.17-rc5", "8188a18ee2e48c9a7461139838048363bfce3fef": "v5.4-rc4", "819b23f1c501b17b9694325471789e6b5cc2d0d2": "v4.18-rc4", + "81a4362016e7d8b17031fe1aa43cdb58a7f0f163": "v5.12-rc1-dontuse", "81a6a5cdd2c5cd70874b88afe524ab09e9e869af": "v2.6.24-rc1", "81b74ac68c28fddb3589ad5d4d5e587baf4bb781": "v5.1-rc2", "81cdb259fb6d8c1c4ecfeea389ff5a73c07f5755": "v4.9-rc7", @@ -1924,6 +2436,7 @@ "8205d5d98ef7f155de211f5e2eb6ca03d95a5a60": "v5.3-rc8", "820d070feb668aab5bc9413c285a1dda2a70e076": "v6.7-rc4", "820f9f147dcce2602eefd9b575bbbd9ea14f0953": "v4.1-rc1", + "821bbf79fe46a8b1d18aa456e8ed0a3c208c3754": "v5.13-rc5", "82262a46627bebb0febcc26664746c25cef08563": "v3.16-rc2", "824d4f64c20093275f72fc8101394d75ff6a249e": "v6.0-rc1", "82727018b0d33d188e9916bcf76f18387484cb04": "v3.13-rc1", @@ -1933,31 +2446,42 @@ "82e61c3909db51d91b9d3e2071557b6435018b80": "v5.10-rc2", "82ed4db499b8598f16f8871261bff088d6b0597f": "v4.11-rc1", "82f2341c94d270421f383641b7cd670e474db56b": "v4.11-rc2", + "83026d83186bc48bb41ee4872f339b83f31dfc55": "v5.13-rc4", "8310b77b48c5558c140e7a57a702e7819e62f04e": "v5.12-rc2", "8310ca94075e784bbb06593cd6c068ee6b6e4ca6": "v5.18-rc1", "8310d48b125d19fcd9521d83b8293e63eb1646aa": "v4.10-rc6", + "832698373a25950942c04a512daa652c18a9b513": "v6.8-rc3", "832d11c5cd076abc0aa1eaf7be96c81d1a59ce41": "v2.6.29-rc1", + "832dd634bd1b4e3bbe9f10b9c9ba5db6f6f2b97f": "v6.8-rc1", + "83374e035b6286731c5aa617844c7b724294c2a7": "v5.2-rc1", "833b45de69a6016c4b0cebe6765d526a31a81580": "v5.4-rc2", "834328a8493079d15f30866ace42489463f52571": "v3.7-rc3", "834e772c8db0c6a275d75315d90aba4ebbb1e249": "v4.20-rc6", "8358b02bf67d3a5d8a825070e1aa73f25fb2e4c7": "v4.6-rc6", + "83728cbf366e334301091d5b808add468ab46b27": "v5.13-rc1", "837830a4b439bfeb86c70b0115c280377c84714b": "v5.9-rc1", "837f08fdecbe4b2ffc7725624342e73b886665a8": "v4.17-rc1", "83912d6d55be10d65b5268d1871168b9ebe1ec4b": "v5.16-rc7", + "8392df5d7e0b6a7d21440da1fc259f9938f4dec3": "v5.13-rc1", "839db3d10a5ba792d6533b8bb3380f52ac877344": "v3.8-rc1", + "83a775d5f9bfda95b1c295f95a3a041a40c7f321": "v5.13-rc2", + "83b09a1807415608b387c7bc748d329fefc5617e": "v5.13-rc1", "83c6f2390040f188cc25b270b4befeb5628c1aee": "v5.7-rc3", + "83cb2604f641cecadc275ca18adbba4bf262320f": "v6.5-rc1", "83eaddab4378db256d00d295bda6ca997cd13a52": "v4.12-rc2", "83f1b4ba917db5dc5a061a44b3403ddb6e783494": "v3.9-rc8", "83f40318dab00e3298a1f6d0b12ac025e84e478d": "v3.5-rc1", "8404663f81d212918ff85f493649a7991209fa04": "v3.6-rc6", "8409cca7056113bee3236cb6a8e4d8d4d1eef102": "v2.6.39-rc1", "8423f0b6d513b259fdab9c9bf4aaa6188d054c2d": "v6.0-rc5", + "8432b8114957235f42e070a16118a7f750de9d39": "v5.13-rc1", "844817e47eef14141cf59b8d5ac08dd11c0a9189": "v3.17-rc3", "844f104790bd69c2e4dbb9ee3eba46fde1fcea7b": "v6.8-rc1", "84823ff80f7403752b59e00bb198724100dc611c": "v5.6-rc4", "848440544b41fbe21f36072ee7dc7c3c59ce62e2": "v4.14-rc1", "849151dd5481bc8acb1d287a299b5d6a4ca9f1c3": "v3.17-rc4", "8494057ab5e40df590ef6ef7d66324d3ae33356b": "v4.0-rc7", + "84a24bf8c52e66b7ac89ada5e3cfbe72d65c1896": "v5.12", "84a53580c5d2138c7361c7c3eea5b31827e63b35": "v6.0-rc5", "84ac7260236a49c79eede91617700174c2c19b0c": "v4.9-rc8", "84c4e1f89fefe70554da0ab33be72c9be7994379": "v5.1-rc1", @@ -1967,24 +2491,32 @@ "84ecc2f6eb1cb12e6d44818f94fa49b50f06e6ac": "v5.3-rc1", "84fee97a026ca085f08381054513f9e24689a303": "v2.6.38-rc1", "850bb6f23b93c04ce1e4509a87fa607dc17d97c1": "v2.6.36-rc1", + "850fb7fa8c684a4c6bf0e4b6978f4ddcc5d43d11": "v6.8-rc1", "8520f38099ccfdac2147a0852f84ee7a8ee5e197": "v2.6.28-rc1", "852b6d57dc7fa378019786fa84727036e56839ea": "v3.10-rc1", "853acf7caf10b828102d92d05b5c101666a6142b": "v5.4-rc1", "853bc26a7ea39e354b9f8889ae7ad1492ffa28d2": "v4.15-rc1", "853eab68afc80f59f36bbdeb715e5c88c501e680": "v5.8-rc6", + "854b7737199848a91f6adfa0a03cf6f0c46c86e8": "v5.13-rc1", "854e8bb1aa06c578c2c9145fa6bfe3680ef63b23": "v3.18-rc2", "855b7717f44b13e0990aa5ad36bbf9aa35051516": "v6.2-rc1", "8572cea1461a006bce1d06c0c4b0575869125fa4": "v5.4-rc1", "857a26222ff75eecf7d701ef0e91e4fbf6efa663": "v4.19-rc1", + "857b46027d6f91150797295752581b7155b9d0e1": "v5.3-rc1", + "859051dd165ec6cc915f0f2114699021144fd249": "v6.7-rc1", "8590541473188741055d27b955db0777569438e3": "v6.8-rc5", "85ac30fa2e24f628e9f4f9344460f4015d33fd7d": "v5.4-rc6", "85cb73ff9b74785a7fc752875d7f0fe17ca3ea7c": "v4.12", "85dfb745ee40232876663ae206cba35f24ab2a40": "v3.9-rc6", + "85dfd816fabfc16e71786eda0a33a7046688b5b0": "v5.13-rc1", "85e4ea1049c70fb99de5c6057e835d151fb647da": "v5.19-rc6", + "85e985a4f46e462a37f1875cb74ed380e7c0c2e0": "v6.8-rc5", "85f02d6c856b9f3a0acf5219de6e32f58b9778eb": "v6.0-rc2", "85f1bd9a7b5a79d5baa8bf44af19658f7bf77bfa": "v4.13-rc5", + "8609f5cfdc872fc3a462efa6a3eca5cb1e2f6446": "v5.13-rc1", "8610c7c6e3bd647ff98d21c8bc0580e77bc2f8b3": "v5.7-rc1", "864745d291b5ba80ea0bd0edcbe67273de368836": "v3.6-rc7", + "8648aeb5d7b70e13264ff5f444f22081d37d4670": "v6.5-rc1", "864e5c090749448e879e86bec06ee396aa2c19c5": "v4.20-rc1", "86741ec25462": "v4.10-rc1", "86741ec25462e4c8cdce6df2f41ead05568c7d5e": "v4.10-rc1", @@ -1996,6 +2528,7 @@ "86f44fcec22ce2979507742bc53db8400e454f46": "v6.0-rc1", "8700af2cc18c919b2a83e74e0479038fd113c15d": "v5.17-rc6", "8700e3e7c4857d28ebaa824509934556da0b3e76": "v4.8-rc1", + "870565f063a58576e8a4529f122cac4325c6b395": "v6.8-rc1", "870aaff92e959e29d40f9cfdb5ed06ba2fc2dae0": "v5.17-rc1", "871997bc9e423f05c7da7c9178e62dde5df2a7f8": "v5.12-rc1", "872844ddb9e44a49b759ae3e34250fefbab656f2": "v3.8-rc1", @@ -2004,8 +2537,12 @@ "876673364161da50eed6b472d746ef88242b2368": "v6.8-rc1", "876f123b8956b455a89a172b905f9ecbb6fc5b67": "v5.7-rc1", "87797fad6cce28ec9be3c13f031776ff4f104cfc": "v6.6-rc6", + "878dabb64117406abd40977b87544d05bb3031fc": "v5.8-rc1", + "87a270625a89fc841f1a7e21aae6176543d8385c": "v5.16-rc7", + "87a39071e0b639f45e05d296cc0538eef44ec0bd": "v6.8-rc7", "87b5a5c209405cb6b57424cdfa226a6dbd349232": "v6.5-rc3", "87c8331fcf72e501c3a3c0cdc5c9391ec72f7cf2": "v3.4-rc1", + "87d315a34133edcb29c4cadbf196ec6c30dfd47b": "v6.6-rc6", "87fec0514f613f8ac43c01b0bc0bc7072c5d10ae": "v3.13-rc1", "880a3a5325489a143269a8e172e7563ebf9897bc": "v4.17-rc1", "8821f5dc187bdf16cfb32ef5aa8c3035273fa79a": "v3.12-rc2", @@ -2019,11 +2556,17 @@ "886e44c9298a6b428ae046e2fa092ca52e822e6a": "v5.17", "8877243beafa7c6bfc42022cbfdf9e39b25bd4fa": "v6.8-rc1", "887bfc546097fbe8071dac13b2fef73b77920899": "v6.2-rc1", + "8892780834ae294bc3697c7d0e056d7743900b39": "v6.8-rc1", + "889b7da23abf92faf34491df95733bda63639e32": "v5.15-rc1", "88af8bbe4ef781031ad3370847553f3b42ba0076": "v3.10-rc1", + "88c380df84fbd03f9b137c2b9d0a44b9f2f553b0": "v5.13-rc4", + "88f04bc3e737155e13caddf0ba8ed19db87f0212": "v6.8-rc1", "8913336a7e8d56e984109a3137d6c0e3362596a4": "v2.6.27-rc1", "8914a595110a6eca69a5e275b323f5d09e18f4f9": "v4.16-rc1", + "893ce44df56580fb878ca5af9c4a5fd87567da50": "v5.3-rc1", "893e26e61d04eac974ded0c11e1647b335c8cb7b": "v4.11-rc1", "895a5e96dbd6386c8e78e5b78e067dcc67b7f0ab": "v5.1-rc1", + "8961987f3f5fa2f2618e72304d013c8dd5e604a6": "v5.16-rc1", "8974eb588283b7d44a7c91fa09fcbaf380339f3a": "v6.5-rc6", "89c22d8c3b278212eef6a8cc66b570bc840a6f5a": "v4.2-rc4", "89c2b3b74918200e46699338d7bcc19b1ea12110": "v5.15-rc1", @@ -2031,8 +2574,11 @@ "89c8a4984fc98e625517bfe5083342d77ee35811": "v4.13-rc1", "89d7ae34cdda4195809a5a987f697a517a2a3177": "v3.5", "89e1f7d4c66d85f42c3d52ea3866eb10cadf6153": "v3.6-rc1", + "89e3becd8f821e507052e012d2559dcda59f538e": "v5.11", + "89e590535f32d4bc548bcf266f3b046e50942f6d": "v4.18-rc1", "89eaefb61dc9170237d95b844dd357338fc7225d": "v3.4-rc1", "89f3594d0de58e8a57d92d497dea9fee3d4b9cda": "v5.17-rc1", + "8a12f8836145ffe37e9c8733dce18c22fb668b66": "v5.12-rc7", "8a2b307c21d4b290e3cbe33f768f194286d07c23": "v4.18-rc1", "8a34b0ae8778f6b42ed38857486b769a224e2536": "v3.10-rc1", "8a4c3926889e7bf226e9f0254e7eface1f85f312": "v4.8-rc1", @@ -2040,72 +2586,103 @@ "8a5e5e02fc83aaf67053ab53b359af08c6c49aaf": "v4.3-rc1", "8a6e231766bdd2e1d228a14af89e36dc190be3a6": "v3.7-rc1", "8aa9ebccae87621d997707e4f25e53fddd7e30e4": "v5.2-rc1", + "8ab31da7b89f71c4c2defcca989fab7b42f87d71": "v5.13-rc1", "8abee9566b7e8eecf566c4daf6be062a27369890": "v5.8-rc1", "8ad2850f44831919f63f0e58d7203e65d5b3914c": "v3.16-rc1", + "8ae5b3a685dc59a8cf7ccfe0e850999ba9727a3c": "v6.6-rc2", + "8af411bbba1f457c33734795f024d0ef26d0963f": "v6.8-rc7", "8afa13a0583f94c14607e3041c02f068ac8fb628": "v5.17-rc1", "8b01fc86b9f425899f8a3a8fc1c47d73c2c20543": "v4.1-rc1", + "8b13601d19c541158a6e18b278c00ba69ae37829": "v6.8-rc1", "8b13eddfdf04cbfa561725cfc42d6868fe896f56": "v3.19-rc1", + "8b1d72395635af45410b66cc4c4ab37a12c4a831": "v6.8-rc3", "8b51dc7291473093c821195c4b6af85fadedbc2f": "v5.3", "8b74d439e1697110c5e5c600643e823eb1dd0762": "v4.10", + "8b79feffeca28c5459458fe78676b081e87c93a4": "v5.13-rc2", "8b8a321ff72c785ed5e8b4cf6eda20b35d427390": "v4.4", "8b8addf891de8a00e4d39fc32f93f7c5eb8feceb": "v4.6-rc1", + "8ba438ef3cacc4808a63ed0ce24d4f0942cfe55d": "v6.6-rc5", "8ba8682107ee2ca3347354e018865d8e1967c5f4": "v4.7-rc7", "8bdb3a2d7df48b861972c4bfb58490853a228f51": "v2.6.24-rc1", "8c209e6782ca0e3046803fc04a5ac01c8c10437a": "v2.6.30-rc1", "8c21c54a53ab21842f5050fa090f26b03c0313d6": "v6.0-rc1", + "8c313e3bfd9adae8d5c4ba1cc696dcbc86fbf9bf": "v5.16-rc8", "8c55dedb795be8ec0cf488f98c03a1c2176f7fb1": "v5.4-rc6", + "8c657a0590de585b1115847c17b34a58025f2f4b": "v5.12-rc1-dontuse", "8c6de56a42e0c657955e12b882a81ef07d1d073e": "v5.6-rc1", "8c710f75256bb3cf05ac7b1672c82b92c43f3d28": "v6.3-rc1", "8c7188b23474cca017b3ef354c4a58456f68303a": "v4.4-rc4", "8c75d585b931ac874fbe4ee5a8f1811d20c2817f": "v5.16-rc1", + "8ca151b568b67a7b72dcfc6ee6ea7c107ddd795c": "v3.9-rc1", "8ca86f1639ec5890d400fff9211aca22d0a392eb": "v4.16-rc3", "8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b": "v5.14-rc3", "8cb861e9e3c9a55099ad3d08e1a3b653d29c33ca": "v5.19-rc3", + "8cc07265b69141f8ed9597d0f27185239c241c80": "v6.5-rc1", + "8cc365f9559b86802afc0208389f5c8d46b4ad61": "v5.13-rc2", "8cdb5240ec5928b20490a2bb34cb87e9a5f40226": "v4.18-rc4", "8ce39eb5a67aee25d9f05b40b673c95b23502e3e": "v5.4-rc1", + "8ce8c0abcba314e1fe954a1840f6568bf5aef2ef": "v5.5-rc1", "8d0207652cbe27d1f962050737848e5ad4671958": "v3.16-rc1", "8d037973d48c026224ab285e6a06985ccac6f7bf": "v6.3-rc1", "8d0c2d10dd72c5292eda7a06231056a4c972e4cc": "v3.9-rc3", "8d1e72250c847fa96498ec029891de4dc638a5ba": "v3.12", "8d2451f4994fa60a57617282bab91b98266a00b1": "v5.1-rc1", + "8d432592f30fcc34ef5a10aac4887b4897884493": "v5.13-rc1", "8d4a2ec1e0b41b0cf9a0c5cd4511da7f8e4f3de2": "v4.6-rc4", "8d62fdebdaf9b866c7e236a8f5cfe90e6dba5773": "v2.6.22-rc7", "8d7f6690cedb83456edd41c9bd583783f0703bf0": "v3.14-rc3", "8d86e373b0ef52d091ced9583ffbb33ad2771576": "v5.11-rc1", + "8d975c15c0cd744000ca386247432d57b21f9df0": "v6.8-rc3", "8daaa83145ef1f0a146680618328dbbd0fa76939": "v3.1-rc1", "8dd014adfea6f173c1ef6378f7e5e7924866c923": "v2.6.36-rc1", + "8dd1c125f7f838abad009b64bff5f0a11afe3cb6": "v5.13-rc1", + "8dedcc3eee3aceb37832176f0a1b03d5687acda3": "v5.11-rc1", "8dfbcc4351a0b6d2f2d77f367552f48ffefafe18": "v4.6-rc1", "8e1278444446fc97778a5e5c99bca1ce0bbc5ec9": "v5.19-rc2", "8e20cf2bce122ce9262d6034ee5d5b76fbb92f96": "v4.4-rc6", "8e2d61e0aed2b7c4ecb35844fe07e0b2b762dee4": "v4.3-rc3", "8e3fbf870481eb53b2d3a322d1fc395ad8b367ed": "v3.13-rc7", + "8e46a2d068c92a905d01cbb018b00d66991585ab": "v6.8-rc4", "8e4b5eae5decd9dfe5a4ee369c22028f90ab4c44": "v4.17-rc1", + "8e50d392652f20616a136165dff516b86baf5e49": "v5.11-rc1", + "8e57c06bf4b0f51a4d6958e15e1a99c9520d00fa": "v6.8-rc1", "8e591cb7204739efa8e15967ea334eb367039dde": "v3.10-rc1", + "8e6fafd5a22e7a2eb216f5510db7aab54cc545c1": "v5.13-rc1", "8e75f7a7a00461ef6d91797a60b606367f6e344d": "v4.14-rc1", + "8e947c8f4a5620df77e43c9c75310dc510250166": "v5.13-rc1", "8e96a87c5431c256feb65bcfc5aec92d9f7839b6": "v4.7-rc6", "8e9faa15469ed7c7467423db4c62aeed3ff4cae3": "v4.10-rc7", + "8eed4e00a370b37b4e5985ed983dccedd555ea9d": "v6.8-rc4", "8ef874bfc7296fa206eea2ad1e8a426f576bf6f6": "v3.3-rc1", "8f014550dfb114cc7f42a517d20d2cf887a0b771": "v5.12-rc1-dontuse", + "8f02139ad9a7e6e5c05712f8c1501eebed8eacfd": "v6.6-rc5", "8f0541186e9ad1b62accc9519cc2b7a7240272a7": "v6.0-rc1", "8f34f1eac3820fc2722e5159acceb22545b30b0d": "v5.14-rc1", "8f363b77ee4fbf7c3bbcf5ec2c5ca482d396d664": "v3.7-rc4", "8f3fafc9c2f0ece10832c25f7ffcb07c97a32ad4": "v4.19-rc2", "8f44c9a41386729fea410e688959ddaa9d51be7c": "v4.13-rc1", + "8f50020ed9b81ba909ce9573f9d05263cdebf502": "v3.6-rc1", "8f5624629105589bcc23d0e51cc01bd8103d09a5": "v4.14", "8f659a03a0ba9289b9aeb9b4470e6fb263d6f483": "v4.15-rc4", + "8f73b37cf3fbda67ea1e579c3b5785da4e7aa2e3": "v5.18-rc1", "8f840e47f190cbe61a96945c13e9551048d42cef": "v4.7-rc1", "8f89926290c4": "v5.16-rc1", + "8f905c0e7354ef261360fb7535ea079b1082c105": "v5.16-rc7", + "8f9abaa6d7de0a70fc68acaedce290c1f96e2e59": "v6.8-rc1", "8f9c469348487844328e162db57112f7d347c49f": "v5.0-rc3", "8fb5debc5fcd450470cdd789c2d80ef95ebb8cf4": "v4.11-rc1", "8fc134fee27f2263988ae38920bc03da416b03d8": "v6.6-rc1", "8feb69c7bd89513be80eb19198d48f154b254021": "v4.13-rc1", "8ff590903d5fc7f5a0a988c38267a3d08e6393a2": "v2.6.38-rc1", "8fff105e13041e49b82f92eef034f363a6b1c071": "v4.1-rc1", + "901f84de0e16bde10a72d7eb2f2eb73fcde8fa1a": "v5.13-rc2", "90563b198e4c6674c63672fae1923da467215f45": "v3.9-rc5", "9056d6489f5a41cfbb67f719d2c0ce61ead72d9f": "v5.17-rc1", "9060cb719e61b685ec0102574e10337fa5f445ea": "v5.0-rc8", + "90ba37033cb94207e97c4ced9be575770438213b": "v4.10-rc1", "90bfdeef83f1d6c696039b6a917190dcbbad3220": "v5.10-rc3", "90cbed5247439a966b645b34eb0a2e037836ea8e": "v6.4-rc2", + "90cd7e424969d29aff653333b4dcb4e2e199d791": "v5.11-rc1", "90db10434b163e46da413d34db8d0e77404cc645": "v4.11-rc5", "90e33d45940793def6f773b2d528e9f3c84ffdc7": "v4.15-rc1", "90e5b3462efa37b8bba82d7c4e63683856e188af": "v6.5-rc7", @@ -2119,16 +2696,23 @@ "91291e9998d208370eb8156c760691b873bd7522": "v4.19-rc1", "9137bb27e60e554dab694eafa4cca241fa3a694f": "v4.20-rc5", "91398b413d03660fd5828f7b4abc64e884b98069": "v6.6-rc6", + "913b9d443a0180cf0de3548f1ab3149378998486": "v6.8-rc3", + "915d7e5e5930b4f01d0971d93b9b25ed17d221aa": "v4.10-rc1", "916a27901de01446bcf57ecca4783f6cff493309": "v4.15-rc4", "916e4cf46d0204806c062c8c6c4d1f633852c5b6": "v3.14-rc6", "9174adbee4a9a49d0139f5d71969852b36720809": "v3.8-rc5", "918698d5c2b50433714d2042f55b55b090faa167": "v5.10-rc1", + "918fc3855a6507a200e9cf22c20be852c0982687": "v5.16-rc8", "919f4ebc598701670e80e31573a58f1f2d2bf918": "v5.12-rc2", "91b0abe36a7b2b3b02d7500925a5f8455334f0e5": "v3.15-rc1", + "91df99a6eb50d5a1bc70fff4a09a0b7ae6aab96d": "v5.13-rc3", "91f79c43d1b54d7154b118860d81b39bad07dfff": "v3.16-rc1", "92117d8443bc5afacc8d5ba82e541946310f106e": "v4.6-rc7", "921ca574cd382142add8b12d0a7117f495510de5": "v5.11-rc1", + "92214be5979c0961a471b7eaaaeacab41bdf456c": "v6.7-rc2", + "9227da7816dd1a42e20d41e2244cb63c205477ca": "v6.6-rc1", "9263412501022fecef844907129ee2513b5a89de": "v2.6.39-rc1", + "9289cdf399922a1bd801a8cd946a79581c00a380": "v5.10-rc1", "929473ea05db455ad88cdc081f2adc556b8dc48f": "v3.8-rc4", "92964c79b357efd980812c4de5c1fd2ec8bb5520": "v4.7-rc1", "92d34134193e5b129dc24f8d79cb9196626e8d7a": "v4.18-rc2", @@ -2137,33 +2721,44 @@ "92ee3c60ec9fe64404dc035e7c41277d74aa26cb": "v5.18-rc1", "92f28d973cce45ef5823209aab3138eb45d8b349": "v3.9-rc5", "92fbb6d1296f81f41f65effd7f5f8c0f74943d15": "v6.3-rc4", + "9319b647902cbd5cc884ac08a8a6d54ce111fc78": "v6.8-rc3", + "93222bd9b966105f43418fd336654ad10045783a": "v4.15-rc1", "9330986c03006ab1d33d243b7cfe598a7a3c1baa": "v5.16-rc1", "93340e10b9c5fc86730d149636e0aa8b47bb5a34": "v6.3-rc1", "93362fa47fe98b62e4a34ab408c4a418432e7939": "v4.10-rc4", "9344a972961d1a6d2c04d9008b13617bcb6ec2ef": "v3.6-rc3", "935d8aabd4331f47a89c3e1daa5779d23cf244ee": "v3.9-rc7", "9380afd6df70e24eacbdbde33afc6a3950965d22": "v5.12-rc3", + "938835aa903ae19ad62805134f79bbcf20fc3bea": "v5.9", "93995bf4af2c5a99e2a87f0cd5ce547d31eb7630": "v6.7-rc1", "9399f0c51489ae8c16d6559b82a452fdc1895e91": "v4.0-rc1", "93a2001bdfd5376c3dc2158653034c20392d15c5": "v4.7-rc5", + "93ab6cc69162775201587cc9da00d5016dc890e2": "v4.18-rc1", "93c303d2045b30572d8d5e74d3ad80692acfebbe": "v4.18-rc1", "93c647643b48f0131f02e45da3bd367d80443291": "v4.15-rc4", "93c660ca40b5d2f7c1b1626e955a8e9fa30e0749": "v6.2-rc1", "93e2be344a7db169b7119de21ac1bf253b8c6907": "v6.1-rc1", + "93ec4a3b76404bce01bd5c9032bef5df6feb1d62": "v6.8-rc1", "94034c40ab4a3fcf581fbc7f8fdf4e29943c4a24": "v5.13-rc4", "942080643bce061c3dd9d5718d3b745dcb39a8bc": "v3.19-rc1", "9426bbc6de99b8649d897b94e8f5916b58195643": "v4.17-rc1", "9446edb9a1740989cf6c20daf7510fb9a23be14a": "v3.12-rc2", "944c01a889d97dc08e1b71f4ed868f4023fd6034": "v5.2-rc1", + "944d5fe50f3f03daacfea16300e656a1691c4a23": "v6.8-rc6", + "944d671d5faa0d78980a3da5c0f04960ef1ad893": "v5.13-rc5", "9453264ef58638ce8976121ac44c07a3ef375983": "v5.6-rc1", + "9453d45ecb6c2199d72e73c993e9d98677a2801b": "v5.13-rc4", "946e51f2bf37f1656916eb75bd0742ba33983c28": "v3.19-rc1", + "9480adfe4e0f0319b9da04b44e4eebd5ad07e0cd": "v6.8-rc4", "949dd0104c496fa7c14991a23c03c62e44637e71": "v5.10-rc4", + "94ad94558b0fbf18dd6fb0987540af1693157556": "v5.5-rc1", "94f1bb15bed84ad6c893916b7e7b9db6f1d7eec6": "v4.2-rc1", "94f9cd81436c85d8c3a318ba92e236ede73752fc": "v4.4-rc1", "950336ba3e4a1ffd2ca60d29f6ef386dd2c7351d": "v4.6-rc1", "951b6a0717db97ce420547222647bcc40bf1eacd": "v4.2-rc1", "952fc18ef9ec707ebdc16c0786ec360295e5ff15": "v3.6-rc1", "95389b08d93d5c06ec63ab49bd732b0069b7c35e": "v3.17-rc5", + "9549332df4ed4e761a1d41c83f2c25d28bb22431": "v5.17-rc1", "9561a7ade0c205bc2ee035a2ac880478dcc1a024": "v4.10-rc1", "956421fbb74c3a6261903f3836c0740187cf038b": "v4.0-rc3", "9566d6742852c527bf5af38af5cbb878dad75705": "v3.17-rc1", @@ -2171,6 +2766,8 @@ "958bee14d0718ca7a5002c0f48a099d1d345812a": "v3.16-rc1", "958cf2e273f0": "v6.2-rc1", "9590232bb4f4cc824f3425a6e1349afbe6d6d2b7": "v4.6-rc1", + "959043afe53ae80633e810416cee6076da6e91c6": "v6.8-rc7", + "95a404bd60af6c4d9d8db01ad14fe8957ece31ca": "v6.6-rc2", "95a762e2c8c942780948091f8f2a4f32fce1ac6f": "v4.15-rc5", "95baa60a0da80a0143e3ddd4d3725758b4513825": "v5.2-rc3", "95d78c28b5a85bacbc29b8dba7c04babb9b0d467": "v4.14-rc5", @@ -2179,27 +2776,36 @@ "95ee62083cb6453e056562d91f597552021e6ae7": "v3.12-rc2", "9601148392520e2e134936e76788fc2a6371e7be": "v5.12-rc8", "96051572c819194c37a8367624b285be10297eca": "v3.6-rc1", + "962ac2dce56bb3aad1f82a4bbe3ada57a020287c": "v6.8-rc5", "963030817060e4f109be1993b9ae8f81dbf5e11a": "v2.6.31-rc5", "96398560f26aa07e8f2969d73c8197e6a6d10407": "v6.2-rc4", "96442e42429e5f268ab97a3586c7694a3acc55a7": "v3.8-rc1", "96518518cc417bb0a8c80b9fb736202e28acdf96": "v3.13-rc1", "965a7d72e798eb7af0aa67210e37cf7ecd1c9cad": "v5.13-rc4", "966031f340185eddd05affcf72b740549f056348": "v4.15-rc6", + "9671761792156f2339627918bafcd713a8a6f777": "v6.8-rc6", "9674da8759df0d6c0d24e1ede6e2a1acdef91e3c": "v3.11-rc1", "967c9cca2cc50569efc65945325c173cecba83bd": "v4.12-rc1", + "9695b7de5b4760ed22132aca919570c0190cb0ce": "v5.16-rc7", "969d1b180d987c2be02de890d0fff0f66a0e80de": "v4.14-rc1", "96aa1b22bd6bb9fccf62f6261f390ed6f3e7967f": "v5.8-rc1", "96b340406724d87e4621284ebac5e059d67b2194": "v3.12-rc7", "96b3d28bf4b00f62fc8386ff5d487d1830793a3d": "v3.14-rc7", "96c5c6e6a5b6db592acae039fed54b5c8844cd35": "v5.4-rc1", "96ca579a1ecc943b75beba58bebb0356f6cc4b51": "v4.14-rc5", + "96fadf7e8ff49fdb74754801228942b67c3eeebd": "v5.13-rc1", "9705acd63b125dee8b15c705216d7186daea4625": "v4.2-rc2", "9709674e68646cee5a24e3000b3558d25412203a": "v3.16-rc1", "97113eb39fa7972722ff490b947d8af023e1f6a2": "v5.14-rc1", "9720b4bc76a83807c68e00c62bfba575251bb73e": "v2.6.39-rc1", "973c096f6a85e5b5f2a295126ba6928d9a6afd45": "v5.9-rc6", + "97566d09fd02d2ab329774bb89a2cdf2267e86d9": "v6.8-rc1", "9764c02fcbad40001fd3f63558d918e4d519bb75": "v4.14-rc2", + "97684f0970f6e112926de631fdd98d9693c7e5c1": "v5.12-rc8", + "9772b47a4c2916d645c551228b6085ea24acbe5d": "v4.6-rc5", "97774672573ac4355bd12cf84b202555c1131b69": "v2.6.39-rc1", + "977ad86c2a1bcaf58f01ab98df5cc145083c489c": "v6.6-rc1", + "97830f3c3088638ff90b20dfba2eb4d487bf14d7": "v6.8-rc3", "979a6e28dd969a2222545001f79566b4bfaf06c0": "v5.15-rc1", "979d63d50c0c0f7bc537bf821e056cc9fe5abd38": "v5.0-rc1", "979e0d74651ba5aa533277f2a6423d0f982fb6f6": "v3.14-rc6", @@ -2212,20 +2818,28 @@ "9824dfae5741275473a23a7ed5756c7b6efacc9d": "v4.19-rc5", "983d8e60f50806f90534cc5373d0ce867e5aaf79": "v5.16", "9842df62004f366b9fed2423e24df10542ee0dc5": "v4.7-rc1", + "9845664b9ee47ce7ee7ea93caf47d39a9d4552c4": "v6.8-rc7", "9850cf4a8908886370b1f15aacf83d291f098c72": "v3.18-rc1", + "9862ec7ac1cbc6eb5ee4a045b5d5b8edbb2f7e68": "v6.8-rc1", + "98b5ef3e97b16eaeeedb936f8bda3594ff84a70e": "v5.13-rc1", "98bea253aa28ad8be2ce565a9ca21beb4a9419e5": "v6.4-rc1", "98da7d08850fb8bdeb395d6368ed15753304aa0c": "v4.12-rc7", "98e4da8ca301e062d79ae168c67e56f3c3de3ce4": "v3.8-rc1", "9903e41ae1f5d50c93f268ca3304d4d7c64b9311": "v4.16-rc7", "99253eb750fda6a644d5188fb26c43bad8d5a745": "v4.11-rc1", + "992a60ed0d5e312ce9a485c9e12097ac82ae4b3e": "v5.8-rc1", "9933e113c2e87a9f46a40fde8dafbf801dca1ab9": "v4.12-rc3", + "993bf0f4c393b3667830918f9247438a8f6fdb5b": "v6.8-rc3", "994b78327458ea14a1743196ee0560c73ace37f3": "v4.3-rc1", "9955ac47f4ba1c95ecb6092aeaefb40a22e99268": "v3.10-rc4", "99665d07218345647875fea9ad4979bbe297c104": "v4.12-rc1", + "9972d5d84d76982606806b2ce887f70c2f8ba60a": "v5.10-rc4", "998912346c0da53a6dbb71fab3a138586b596b30": "v5.7-rc1", + "9996508b3353063f2d6c48c1a28a84543d72d70b": "v2.6.33-rc1", "999b874f4aa39b7abf45662ff0900f943ddb2d02": "v2.6.32-rc1", "99a63d36cb3ed5ca3aa6fcb64cffbeaf3b0fb164": "v5.19", "99a83db5a605137424e1efe29dc0573d6a5b6316": "v5.19-rc3", + "99ba0ea616aabdc8e26259fd722503e012199a76": "v5.13-rc1", "99c23da0eed4fd20cae8243f2b51e10e66aa0951": "v5.16-rc1", "99c6fa2511d8a683e61468be91b83f85452115fa": "v4.15-rc8", "99cb0dbd47a15d395bf3faa78dc122bc5efe3fc0": "v5.4-rc1", @@ -2239,6 +2853,7 @@ "9a59b62fd88196844cee5fff851bee2cfd7afb6e": "v4.5-rc1", "9a5cbce421a283e6aea3c4007f141735bf9da8c3": "v4.1-rc1", "9a7adcf5c6dea63d2e47e6f6d2f7a6c9f48b9337": "v3.0-rc1", + "9a9ab0d963621d9d12199df9817e66982582d5a5": "v6.8-rc1", "9aa422ad326634b76309e8ff342c246800621216": "v5.17-rc4", "9aacdd354d197ad64685941b36d28ea20ab88757": "v4.5-rc1", "9ab4233dd08036fe34a89c7dc6f47a8bf2eb29eb": "v3.5-rc6", @@ -2256,15 +2871,18 @@ "9b54d816e00425c3a517514e0d677bb3cec49258": "v4.11-rc1", "9b57da0630c9fd36ed7a20fc0f98dc82cc0777fa": "v4.9-rc8", "9b6e6a8334d56354853f9c255d1395c2ba570e0a": "v4.2-rc3", + "9b9c8195f3f0d74a826077fc1c01b9ee74907239": "v6.5-rc4", "9bac3d6d548e5cc925570b263f35b70a00a00ffd": "v4.1-rc1", "9bb5d40cd93c9dd4be74834b1dcb1ba03629716b": "v3.10-rc7", "9bbfceea12a8f145097a27d7c7267af25893c060": "v5.4-rc6", "9bc3047374d5bec163e83e743709e23753376f0c": "v6.5-rc5", "9bd8212f981ea6375911fe055382ad7529be5b28": "v4.1-rc1", + "9be6c21fdcf8a7ec48262bb76f78c17ac2761ac6": "v6.5-rc1", "9bf292bfca94694a721449e3fd752493856710f6": "v4.7-rc1", "9bf3d20331295b1ecb81f4ed9ef358c51699a050": "v5.16-rc1", "9bfe5ded054b8e28a94c78580f233d6879a00146": "v4.19-rc1", "9c0530e898f384c5d279bfcebd8bb17af1105873": "v5.4-rc3", + "9c1bb37f8cad5e2ee1933fa1da9a6baa7876a8e4": "v5.13-rc4", "9c33663af9ad115f90c076a1828129a3fbadea98": "v6.6-rc1", "9c5137aedd112f78a968bdd2325de2ea06df46c0": "v5.12-rc1-dontuse", "9c52057c698fb96f8f07e7a4bcf4801a092bda89": "v3.8-rc1", @@ -2273,16 +2891,25 @@ "9c6ba456711687b794dcf285856fc14e2c76074f": "v4.6-rc1", "9c6d778800b921bde3bff3cff5003d1650f942d1": "v6.0-rc4", "9c824b6a172c8d44a6b037946bae90127c969b1b": "v3.18-rc1", + "9c8c6bac1ae86f6902baa938101902fb3a0a100b": "v5.15-rc1", "9ca9fb24d5febccea354089c41f96a8ad0d853f8": "v6.0-rc1", + "9caccd41541a6f7d6279928d9f971f6642c361af": "v5.12-rc1-dontuse", "9cae36a094e7e9d6e5fe8b6dcd4642138b3eb0c7": "v5.19-rc1", "9cb636b5f6a8cc6d1b50809ec8f8d33ae0c84c95": "v6.0-rc5", + "9cb8e048e5d93825ec5e8dfb5b8df4987ea25745": "v5.7-rc1", "9cbee358687edf0359e29ac683ec25835134f059": "v3.5-rc1", "9cc02ede696272c5271a401e4f27c262359bc2f6": "v5.19-rc5", + "9ccba66d4d2aff9a3909aa77d57ea8b7cc166f3c": "v5.13-rc1", "9d2231c5d74e13b2a0546fee6737ee4446017903": "v5.17-rc6", "9d47964bfd471f0dd4c89f28556aec68bffa0020": "v4.9-rc1", + "9d4c75800f61e5d75c1659ba201b6c0c7ead3070": "v6.6-rc5", + "9d5171eab462a63e2fbebfccf6026e92be018f20": "v5.12", "9d538fa60bad4f7b23193c89e843797a1cf71ef3": "v4.14-rc4", + "9d618d19b29c2943527e3a43da0a35aea91062fc": "v6.8-rc1", "9d71b54b65b1fb6c0d3a6c5c88ba9b915c783fbc": "v6.7-rc1", "9d71dd0c70099914fcd063135da3c580865e924c": "v5.4-rc1", + "9d739bccf261dd93ec1babf82f5c5d71dd4caa3e": "v6.8-rc7", + "9d7b18668956c411a422d04c712994c5fdb23a4b": "v4.20-rc1", "9d94c04c0db024922e886c9fd429659f22f48ea4": "v6.1-rc7", "9dc956b2c8523aed39d1e6508438be9fea28c8fc": "v4.19-rc1", "9dd78194a3722fa6712192cdd4f7032d45112a9a": "v5.17-rc8", @@ -2293,6 +2920,8 @@ "9e2dcf72023d1447f09c47d77c99b0c49659e5ce": "v2.6.34-rc1", "9e368259ad988356c4c95150fafd1a06af095d98": "v4.20-rc5", "9e3f7a29694049edd728e2400ab57ad7553e5aa9": "v4.9-rc6", + "9e46c70e829bddc24e04f963471e9983a11598b7": "v6.8-rc6", + "9e4bf6a08d1e127bcc4bd72557f2dfafc6bc7f41": "v6.8-rc1", "9e7fef9521e73ca8afd7da9e58c14654b02dfad8": "v5.18", "9e8910257397372633e74b333ef891f20c800ee4": "v3.12-rc1", "9ea0106a7a3d8116860712e3f17cd52ce99f6707": "v6.0-rc3", @@ -2301,29 +2930,39 @@ "9ea9b9c48387edc101d56349492ad9c0492ff78d": "v5.15-rc1", "9eac1904d3364254d622bf2c771c4f85cd435fc2": "v5.12-rc1-dontuse", "9eaf183af741e3d8393eb571ac8aec9ee7d6530e": "v5.8-rc1", + "9ec52099e4b8678a60e9f93e41ad87885d64f3e6": "v2.6.19-rc1", "9ec7671603573ede31207eb5b0b3e1aa211b2854": "v2.6.31-rc1", "9ef8d83e8e25d5f1811b3a38eb1484f85f64296c": "v6.4-rc1", "9efd23297cca530bb35e1848665805d3fcdd7889": "v6.0-rc5", "9f00b2e7cf241fa389733d41b615efdaa2cb0f5b": "v3.11-rc1", "9f0f3ebeda47a5518817f33c40f6d3ea9c0275b8": "v4.12-rc1", "9f1f1a2dab38d4ce87a13565cf4dc1b73bef3a5f": "v5.3-rc1", + "9f38f03ae8d5f57371b71aa6b4275765b65454fd": "v5.13-rc1", + "9f3ccdc3f6ef10084ceb3a47df0961bec6196fd0": "v5.16-rc8", "9f46c187e2e680ecd9de7983e4d081c3391acc76": "v5.18", "9f5af546e6acc30f075828cb58c7f09665033967": "v4.13-rc4", + "9f5e8eee5cfe1328660c71812d87c2a67bda389f": "v2.6.20-rc1", "9f645bcc566a1e9f921bdae7528a01ced5bc3713": "v4.18-rc1", "9f775ead5e570e7e19015b9e4e2f3dd6e71a5935": "v4.14-rc4", "9f79b78ef74436c7507bac6bfb7b8b989263bccb": "v5.4-rc2", "9f7d653b67aed2d92540fbb0a8adaf32fcf352ae": "v3.1-rc1", "9f7fec0ba89108b9385f1b9fb167861224912a4a": "v5.4-rc1", "9f834ec18defc369d73ccf9e87a2790bfa05bf46": "v4.8-rc5", + "9f85cbe50aa044a46f0a22fda323fa27b80c82da": "v5.10-rc1", + "9f86d624292c238203b3687cdb870a2cde1a6f9b": "v5.16-rc5", "9f909e215fea0652023b9ed09d3d7bfe10386423": "v5.8-rc1", "9fa2dd946743ae6f30dc4830da19147bf100a7f2": "v5.9-rc4", "9fa492cdc160cd27ce1046cb36f47d3b2b1efa21": "v2.6.19-rc1", "9fbfabfda25d8774c5a08634fdd2da000a924890": "v5.15-rc7", + "9fd1ff5d2ac7181844735806b0a703c942365291": "v5.6-rc1", "9fd75b66b8f68498454d685dc4ba13192ae069b0": "v5.18-rc1", "9ff05123e3bfbb1d2b68ba1d9bf1f7d1dffc1453": "v2.6.30-rc1", + "a00593737f8bac2c9e97b696e7ff84a4446653e8": "v5.13-rc4", "a00df2caffed3883c341d5685f830434312e4a43": "v5.15-rc1", + "a03675497970a93fcf25d81d9d92a59c2d7377a7": "v5.13-rc1", "a03ffcf873fe0f2565386ca8ef832144c42e67fa": "v3.2-rc7", "a06247c6804f1a7c86a2e5398a4c1f1db1471848": "v5.17-rc2", + "a0668cdc154e54bf0c85182e0535eea237d53146": "v2.6.33-rc1", "a07b4970f464f13640e28e16dad6cfa33647cc99": "v4.8-rc1", "a08d3b3b99efd509133946056531cdf8f3a0c09b": "v3.14-rc5", "a096ccca6e503a5c575717ff8a36ace27510ab0a": "v6.3-rc1", @@ -2340,30 +2979,42 @@ "a1078e821b605813b63bf6bca414a85f804d5c66": "v5.3-rc1", "a10feaf8c464c3f9cfdd3a8a7ce17e1c0d498da1": "v5.4-rc1", "a117dacde0288f3ec60b6e5bcedae8fa37ee0dfc": "v3.6-rc1", + "a11d965a218f0cd95b13fe44d0bcd8a20ce134a8": "v6.8-rc1", + "a11dd49dcb9376776193e15641f84fcc1e5980c9": "v6.8-rc7", + "a11ddb37bf367e6b5239b95ca759e5389bb46048": "v5.13-rc3", "a134f083e79fb4c3d0a925691e732c56911b4326": "v4.1-rc2", "a1480dcc3c706e309a88884723446f2e84fedd5b": "v3.18-rc1", "a1616a5ac99ede5d605047a9012481ce7ff18b16": "v5.2-rc1", "a1854fae1414dd8edfff4857fd26c3e355d43e19": "v4.17-rc1", "a19ceb56cbd1e1beff3e9cf6042e1f31f6487aa6": "v2.6.21-rc1", + "a1a4a9ca77f143c00fce69c1239887ff8b813bec": "v6.8-rc7", + "a1b0e4e684e9c300b9e759b46cb7a0147e61ddff": "v5.1-rc5", "a1b14d27ed0965838350f1377ff97c93ee383492": "v4.5-rc4", + "a1d1e0e3d80a870cc37a6c064994b89e963d2b58": "v5.18-rc1", "a21b7f0cff1906a93a0130b74713b15a0b36481d": "v5.3", + "a22b0a2be69a36511cb5b37d948b651ddf7debf3": "v6.8-rc5", "a23740ec43ba022dbfd139d0fe3eff193216272b": "v5.5-rc1", "a246b4d547708f33ff4d4b9a7a5dbac741dc89d8": "v5.7-rc1", "a24fa22ce22ae302b3bf8f7008896d52d5d57b8d": "v4.12-rc7", + "a269333fa5c0c8e53c92b5a28a6076a28cde3e83": "v5.13-rc4", "a26a35e9019fd70bf3cf647dcfdae87abc7bacea": "v6.1-rc7", "a27a94c2b0c727517c17cf2ca3a9f7291caadfbc": "v4.20-rc1", "a282a2f10539dce2aa619e71e1817570d557fc97": "v6.5-rc2", "a2855afc7ee88475e8feb16840b23f787bfc994d": "v5.12-rc1-dontuse", + "a289a7e5c1d49b7d47df9913c1cc81fb48fab613": "v5.13-rc4", "a28ebea2adc4a2bef5989a5a181ec238f59fbcad": "v4.8-rc2", "a295aef603e109a47af355477326bd41151765b6": "v5.15-rc5", "a2965c7be0522eaa18808684b7b82b248515511b": "v6.2-rc3", "a297d07b9a1e4fb8cda25a4a2363a507d294b7c9": "v6.8-rc1", + "a298232ee6b9a1d5d732aa497ff8be0d45b5bd82": "v5.13-rc2", "a2b9e6c1a35afcc0973acb72e591c714e78885ff": "v3.18-rc1", "a2c118bfab8bc6b8bb213abfc35201e441693d55": "v3.9-rc4", + "a2c5bedb2d55dd27c642c7b9fb6886d7ad7bdb58": "v5.13-rc1", "a2c60d42d97cdbeee3c7371cd3502fca77f07d39": "v3.12-rc1", "a2cdd07488e666aa93a49a3fc9c9b1299e27ef3c": "v5.5-rc1", "a2d859e3fc97e79d907761550dbc03ff1b36479c": "v5.15-rc6", "a2e2725541fad72416326798c2d7fa4dafb7d337": "v2.6.33-rc1", + "a2e73f56fa6282481927ec43aa9362c03c2e2104": "v4.2-rc1", "a2ec905d1e160a33b2e210e45ad30445ef26ce0e": "v5.8", "a2f18db0c68fec96631c10cad9384c196e9008ac": "v3.19-rc5", "a309c7194e8a2f8bd4539b9449917913f6c2cd50": "v6.2-rc4", @@ -2380,6 +3031,7 @@ "a399b29dfbaaaf91162b2dc5a5875dd51bbfa2a1": "v3.13-rc1", "a39ee449f96a2cd44ce056d8a0a112211a9b1a1f": "v3.14", "a3a8784454692dd72e5d5d34dcdab17b4420e74c": "v3.19-rc4", + "a3ba26ecfb569f4aa3f867e80c02aa65f20aadad": "v5.13-rc1", "a3c2c4f6d8bcd473a7016db93da4f10b3f10f25f": "v3.7-rc1", "a3c54931199565930d6d84f4c3456f6440aefd41": "v3.16-rc1", "a3e23f719f5c4a38ffb3d30c8d7632a4ed8ccd9e": "v5.1-rc3", @@ -2387,7 +3039,9 @@ "a4176ec356c73a46c07c181c6d04039fafa34a9f": "v5.1-rc1", "a42055e8d2c3": "v4.20-rc1", "a42055e8d2c30d4decfc13ce943d09c7b9dad221": "v4.20-rc1", + "a421d218603ffa822a0b8045055c03eae394a7eb": "v5.13-rc4", "a4270d6795b0580287453ea55974d948393e66ef": "v5.2-rc3", + "a42d985bd5b234da8b61347a78dc3057bf7bb94d": "v3.3-rc1", "a42dd7efd934888833c01199dbd21b242100ee92": "v2.6.32-rc1", "a430c9166312e1aa3d80bce32374233bdbfeba32": "v3.18-rc2", "a43bdc376deab5fff1ceb93dca55bcab8dbdc1d6": "v6.8-rc1", @@ -2407,23 +3061,31 @@ "a4f2473d39eb72915d37d65bdd8dd734c7ee4f8a": "v3.15-rc1", "a4ffc152198efba2ed9e6eac0eb97f17bfebce85": "v3.4-rc1", "a501ab75e7624d133a5a3c7ec010687c8b961d23": "v5.19-rc7", + "a506bd5756290821a4314f502b4bafc2afcf5260": "v5.13-rc1", "a50829479f58416a013a4ccca791336af3c584c7": "v4.14-rc7", "a50e233c50dbc881abaa0e4070789064e8d12d70": "v3.15-rc1", "a53046291020ec41e09181396c1e829287b48d47": "v5.18-rc1", "a53d1202aef122894b6e46116a92174a9123db5d": "v5.14-rc1", + "a54667f6728c": "v4.16-rc1", + "a54754ec9891830ba548e2010c889e3c8146e449": "v5.13-rc1", "a54988113985ca22e414e132054f234fc8a92604": "v5.3-rc1", "a54c4613dac1500b40e4ab55199f7c51f028e848": "v5.15-rc1", "a5598bd9c087dc0efc250a5221e5d0e6f584ee88": "v3.9-rc7", "a56587065094fd96eb4c2b5ad65571daad32156d": "v5.3-rc2", "a58d9166a756a0f4a6618e4f593232593d6df134": "v5.12-rc6", "a5bf3cfce8cb77d9d24613ab52d520896f83dd48": "v6.3-rc1", + "a5c57fd2e9bd1c8ea8613a8f94fd0be5eccbf321": "v6.8-rc6", "a5cc68f3d63306d0d288f31edfc2ae6ef8ecd887": "v3.10", "a5ec6ae161d72f01411169a938fa5f8baea16e8f": "v4.15-rc5", + "a5ef7d68cea1344cf524f04981c2b3f80bedbb0d": "v6.6-rc4", "a5f596830e27e15f7a0ecd6be55e433d776986d8": "v4.16-rc6", + "a6088845c2bf754d6cb2572b484180680b037804": "v4.18-rc1", "a60b890f607dc6d7806afc0dc8666577faf40bb4": "v4.14-rc1", "a612769774a30e4fc143c4cb6395c12573415660": "v4.7", "a6138db815df5ee542d848318e5dae681590fccd": "v3.17-rc1", "a61ea561c87139992fe32afdee48a6f6b85d824a": "v5.18-rc1", + "a6275e934605646ef81b02d8d1164f21343149c9": "v5.12-rc1-dontuse", + "a62a8ef9d97da23762a588592c8b8eb50a8deb6a": "v5.4-rc1", "a642fc305053cc1c6e47e4f4df327895747ab485": "v3.18-rc2", "a65120bae4b7425a39c5783aa3d4fc29677eef0e": "v5.2-rc1", "a657182a5c5150cdfacb6640aad1d2712571a409": "v6.0-rc4", @@ -2432,6 +3094,8 @@ "a6686f2f382b13f8a7253401a66690c3633b6a74": "v3.1-rc1", "a66f1efcf748febea7758c4c3c8b5bc5294949ef": "v6.2-rc5", "a67adb997419fb53540d4a4f79c6471c60bc69b6": "v3.8-rc5", + "a680b1832ced3b5fa7c93484248fd221ea0d614b": "v5.17", + "a6dcfe08487e5e83b6b4214c959a9577a9ed2d9f": "v5.11-rc1", "a6e544b0a88b53114bfa5a57e21b7be7a8dfc9d0": "v4.3-rc1", "a6ecfb39ba9d7316057cea823b196b734f6b18ca": "v5.14-rc3", "a70b52ec1aaeaf60f4739edb1b422827cb6f3893": "v3.5-rc1", @@ -2444,19 +3108,27 @@ "a7b2df76b42bdd026e3106cf2ba97db41345a177": "v5.5-rc1", "a7b75c5a8c41445f33efb663887ff5f5c3b4454b": "v5.9-rc1", "a7c41b4687f5902af70cd559806990930c8a307b": "v5.19-rc1", + "a7d42ddb3099727f58366fa006f850a219cce6c8": "v4.0-rc1", + "a7d6027790acea24446ddd6632d394096c0f4667": "v6.8-rc6", "a7ec7a4193a2eb3b5341243fc0b621c1ac9e4ec4": "v4.19-rc1", + "a80dfc025924024d2c61a4c1b8ef62b2fce76a04": "v5.16-rc7", "a8318c13e79badb92bc6640704a64cc022a6eb97": "v5.3-rc8", "a841178445bb72a3d566b4e6ab9d19e9b002eb47": "v4.2-rc1", "a846738f8c3788d846ed1f587270d2f2e3d32432": "v5.12-rc6", "a848c4f15ab6d5d405dbee7de5da71839b2bf35e": "v5.15-rc1", + "a85c5c7a3aa8041777ff691400b4046e56149fd3": "v5.13-rc1", "a86c61812637c7dd0c57e29880cffd477b62f2e7": "v2.6.19-rc2", "a87938b2e246b81b4fb713edb371a9fa3c5c3c86": "v4.1-rc1", + "a8867f4e3809050571c98de7a2d465aff5e4daf5": "v5.13-rc5", "a8b33654b1e3b0c74d4a1fed041c9aae50b3c427": "v3.12", "a8c4d76a8dd4fb9666fc8919a703d85fb8f44ed8": "v5.13-rc4", + "a8ca9fc9134c1a43e6d4db7ff59496bbd7075def": "v6.7-rc1", "a8f97366452ed491d13cf1e44241bc0b5740b1f0": "v4.15-rc2", "a8fe58cec351c25e09c393bf46117c0c47b5a17c": "v4.6-rc1", + "a949dc5f2c5cfe0c910b664650f45371254c0744": "v5.13-rc2", "a950b989ea29ab3b38ea7f6e3d2540700a3c54e8": "v6.2", "a963a37d384d71ad43b3e9e79d68d42fbe0901f3": "v3.10", + "a97709f563a078e259bf0861cd259aa60332890a": "v5.13-rc1", "a97e21923b421993258e8487f2a5700c1ba3897f": "v3.14-rc1", "a992b8a4682f119ae035a01b40d4d0665c4a2875": "v5.19-rc3", "a9bb7e620efdfd29b6d1c238041173e411670996": "v4.5-rc1", @@ -2464,18 +3136,23 @@ "a9ed4a6560b8562b7e2e2bed9527e88001f7b682": "v5.9-rc2", "a9f07790a4b2250f0140e9a61c7f842fd9b618c7": "v6.8-rc1", "aa184e8671f0f911fc2fb3f68cd506e4d7838faa": "v5.18", + "aa1eec2f546f2afa8c98ec41e5d8ee488165d685": "v6.8-rc5", + "aa2b2eb3934859904c287bf5434647ba72e14c1c": "v6.8-rc3", "aa43477b040251f451db0d844073ac00a8ab66ee": "v5.17-rc1", "aa5873e96271611ae55586f65e49ea1fab90cb88": "v2.6.36-rc1", "aa6dd211e4b1dde9d5dc25d699d35f789ae7eeba": "v5.13-rc1", "aa6f8dcbab473f3a3c7454b74caa46d36cdc5d13": "v5.17-rc8", "aa7253c2393f6dcd6a1468b0792f6da76edad917": "v6.0-rc1", + "aa82ac51d63328714645c827775d64dbfd9941f3": "v6.8-rc6", "aa838896d87af561a33ecefea1caa4c15a68bc47": "v5.10-rc1", "aa93d1fee85c890a34f2510a310e55ee76a27848": "v4.7", "aa9c2669626ca7e5e5bab28e6caeb583fd40099b": "v3.11-rc1", "aa9f7d5172fac9bf1f09e678c35e287a40a7b7dd": "v5.7-rc1", "aaa31047a6d25da0fa101da1ed544e1247949b40": "v5.13-rc1", + "aaab47f204aaf47838241d57bf8662c8840de60a": "v6.8-rc4", "aac453635549699c13a84ea1456d5b0e574ef855": "v4.6-rc1", "aacff892cbd5c6b1904a3906219548a65018d750": "v3.8-rc1", + "aafe104aa9096827a429bc1358f8260ee565b7cc": "v5.13-rc1", "ab125ed3ec1c10ccc36bc98c7a4256ad114a3dae": "v6.8-rc1", "ab33d5071de7a33616842882c11b5eb52a6c26a1": "v2.6.17-rc1", "ab519a011caa5ec47d992cb8a4fc8e7af9b9e3f8": "v2.6.33-rc1", @@ -2486,17 +3163,24 @@ "abafbc551fddede3e0a08dee1dcde08fc0eb8476": "v5.8-rc1", "abcc506a9a71976a8b4c9bf3ee6efd13229c1e19": "v6.4-rc1", "abd39c6ded9db53aa44c2540092bdd5fb6590fa8": "v4.18-rc1", + "abe4eaa8618bb36c2b33e9cdde0499296a23448c": "v6.8-rc1", "abf492e7b3ae74873688cf9960283853a3054471": "v2.6.34-rc1", "abfaf0eee97925905e742aa3b0b72e04a918fa9e": "v5.17-rc1", + "ac03046ece2b158ebd204dfc4896fd9f39f0e6c8": "v5.2-rc2", "ac1e516d5a4c56bf0cb4a3dfc0672f689131cfd4": "v5.1-rc6", + "ac2614d721dea2ff273af19c6c5d508d58a2bb3e": "v5.10-rc1", "ac27a0ec112a089f1a5102bc8dffc79c8c815571": "v2.6.19-rc2", + "ac2f7ca51b0929461ea49918f27c11b680f28995": "v5.13-rc1", "ac4893980bbe79ce383daf9a0885666a30fe4c83": "v6.3-rc1", + "ac5047671758ad4be9f93898247b3a8b6dfde4c7": "v5.8-rc1", "ac60778b87e45576d7bfdbd6f53df902654e6f09": "v6.0-rc1", "ac64115a66c18c01745bbd3c47a36b124e5fd8c0": "v4.14-rc7", + "ac6ad7c2a862d682bb584a4bc904d89fa7721af8": "v5.13-rc1", "ac6e780070e30e4c35bd395acfe9191e6268bdd3": "v4.9-rc6", "ac751efa6a0d70f2c9daef5c7e3a92270f5c2dff": "v2.6.38-rc3", "ac795161c93699d600db16c1a8cc23a65a1eceaf": "v5.17-rc2", "ac902c112d90a89e59916f751c2745f4dbdbb4bd": "v3.16-rc2", + "acd6199f195d6de814ac4090ce0864a613b1580e": "v6.7-rc1", "ace7f46ba5fde7273207c7122b0650ceb72510e0": "v4.10-rc1", "aced3ce57cd37b5ca332bcacd370d01f5a8c5371": "v5.13-rc4", "acf69c946233259ab4d64f8869d4037a198c7f06": "v5.9-rc4", @@ -2504,31 +3188,43 @@ "acff81ec2c79492b180fade3c2894425cd35a545": "v4.4-rc4", "ad0d1a058eac46503edbc510d1ce44c5df8e0c91": "v4.4-rc5", "ad0f75e5f57ccbceec13274e1e242f2b5a6397ed": "v5.8-rc5", + "ad25ee36f00172f7d53242dc77c69fff7ced0755": "v6.9-rc1", "ad362fe07fecf0aba839ff2cc59a3617bd42c33f": "v6.8-rc1", + "ad39c08186f8a0f221337985036ba86731d6aafe": "v6.8-rc6", "ad3e14d7c5268c2e24477c6ef54bbdf88add5d36": "v3.17-rc2", "ad4e02d5081d9da38b5b91886e5fa71f0505d607": "v3.18-rc1", "ad5d07f4a9cd671233ae20983848874731102c08": "v5.12-rc3", "ad608fbcf166fec809e402d548761768f602702c": "v4.19-rc7", "ad67b74d2469d9b82aaa572d76474c95bc484d57": "v4.15-rc2", "ad6f939ab193750cc94a265f58e007fb598c97b7": "v4.0-rc1", + "ad73109ae7ec30d5bfb76be108e304f9f0af4829": "v5.11-rc1", "ad7f402ae4f466647c3a669b8a6f3e5d4271c84a": "v6.1", + "ad85094b293e40e7a2f831b0311a389d952ebd5e": "v5.8-rc1", "ad90d0358bd3b4554f243a425168fc7cebe7d04e": "v6.8-rc1", + "ad91849996f9dd79741a961fd03585a683b08356": "v5.13-rc1", "ad9d24c9429e2159d1e279dc3a83191ccb4daf1d": "v5.13-rc7", "ad9f151e560b016b6ad3280b48e42fa11e1a5440": "v5.13-rc7", "adb4f11e0a8f4e29900adb2b7af28b6bbd5c1fa4": "v4.13-rc6", "ae08ce0021087a5d812d2714fb2a326ef9f8c450": "v3.10-rc1", "ae2e1aad3e48e495878d9f149e437a308bfdaefa": "v5.7-rc1", + "ae372cb1750f6c95370f92fe5f5620e0954663ba": "v5.8-rc7", + "ae4d721ce10057a4aa9f0d253e0d460518a9ef75": "v5.19-rc1", "ae6650163c66a7eff1acd6eb8b0f752dcfa8eba5": "v4.15-rc8", "ae7a2a3fb6f8b784c2752863f4f1f20c656f76fb": "v3.6-rc1", "ae7b4e1f213aa659aedf9c6ecad0bf5f0476e1e2": "v3.12-rc1", "ae926051d7eb8f80dba9513db70d2e2fc8385d3a": "v3.4-rc1", + "aeb004c0cd6958e910123a1607634401009c9539": "v6.8-rc7", "aebe9f4639b13a1f4e9a6b42cdd2e38c617b442d": "v6.1-rc1", "aec7961916f3f9e88766e2688992da6980f11b8d": "v6.8-rc5", + "aec86b052df6541cc97c5fca44e5934cbea4963b": "v5.13-rc2", + "aed5ed595960c6d301dcd4ed31aeaa7a8054c0c6": "v6.8-rc1", "aee69d78dec0ffdf82e35d57c626e80dddc314d5": "v4.12-rc1", + "aef7a0300047e7b4707ea0411dc9597cba108fc8": "v6.6-rc5", "af133ade9a40794a37104ecbcc2827c0ea373a3c": "v5.6-rc2", "af1689a9b7701d9907dfc84d2a4b57c4bc907144": "v6.7-rc6", "af1bae5497b98cb99d6b0492e6981f060420a00c": "v4.8-rc1", "af22a610bc38508d5ea760507d31be6b6983dfa8": "v4.12-rc1", + "af2a0c51b1205327f55a7e82e530403ae1d42cbb": "v5.5-rc1", "af356afa010f3cd2c8b8fcc3bce90f7a7b7ec02a": "v2.6.32-rc1", "af368027a49a751d6ff4ee9e3f9961f35bb4fede": "v4.5-rc1", "af3d5d1c87664a4f150fcf3534c6567cb19909b0": "v5.1-rc1", @@ -2541,32 +3237,45 @@ "af81858172cc0f3da81946aab919c26e4b364efc": "v2.6.33-rc1", "af9b028e270fda6fb812d70d17d902297df1ceb5": "v4.3-rc1", "afca6c5b2595fc44383919fba740c194b0b76aff": "v4.18-rc1", + "afd09b617db3786b6ef3dc43e28fe728cfea84df": "v5.13-rc5", "afd2daa26c7abd734d78bd274fc6c59a15e61063": "v5.13-rc1", + "afe8a3ba85ec2a6b6849367e25c06a2f8e0ddd05": "v5.16-rc7", "aff063e266cbf4754021d8e5d16ee418560906fd": "v3.8-rc1", "aff2299e0d81b26304ccc6a1ec0170e437f38efc": "v5.16-rc1", "b005255e12a311d2c87ea70a7c7b192b2187c22c": "v3.14-rc1", + "b00628b1c7d595ae5b544e059c27b1f5828314b4": "v5.15-rc1", "b0188d4dbe5f4285372dd033acf7c92a97006629": "v2.6.23-rc1", + "b02e5a0ebb172c8276cea3151942aac681f7a4a6": "v5.11-rc1", "b03c9f9fdc37dab81ea04d5dacdc5995d4c224c2": "v4.14-rc1", "b04c46190219a4f845e46a459e3102137b7f6cac": "v3.15-rc2", "b04e75a4a8a81887386a0d2dbf605a48e779d2a0": "v6.0-rc1", "b0576ade3aaf24b376ea1a4406ae138e2a22b0c0": "v6.2-rc7", "b0841eefd9693827afb9888235e26ddd098f9cef": "v5.3-rc8", + "b092529e0aa09829a6404424ce167bf3ce3235e2": "v5.1-rc1", "b0a873ebbf87bf38bf70b5e39a7cadc96099fa13": "v2.6.37-rc1", + "b0ad381fa7690244802aed119b478b4bdafc31dd": "v6.8-rc6", + "b0c8fdc7fdb77586c3d1937050925b960743306e": "v5.4-rc1", "b0de59b5733d18b0d1974a060860a8b5c1b36a2e": "v3.9-rc1", "b0e0e1f83de31aa0428c38b692c590cc0ecd3f03": "v4.4-rc1", + "b0e256f3dd2ba6532f37c5c22e07cb07a36031ee": "v6.9-rc1", "b102f0c522cf668c8382c56a4f771b37d011cda2": "v5.6-rc6", "b126bd6bcd6710aa984104e979a5c930f44561b4": "v5.12-rc1-dontuse", "b12fece4c64857e5fab4290bf01b2e0317a88456": "v6.2-rc5", + "b131c96496b369c7b14125e7c50e89ac7cec8051": "v5.10-rc1", "b166a20b07382b8bc1dcee2a448715c9c2c81b5b": "v5.12-rc8", "b1765e7afe8710ef4366dc722cc5bd487eb07973": "v3.15-rc1", + "b19b74bc99b1501a550f4448d04d59b946dc617a": "v6.4-rc1", "b1a2cd50c0357f243b7435a732b4e62ba3157a2e": "v6.1-rc4", "b1a5983f56e371046dcf164f90bfaf704d2b89f6": "v5.17-rc6", + "b1a79360ee862f8ada4798ad2346fa45bb41b527": "v5.2-rc1", "b1ae6dc41eaaa98bb75671e0f3665bfda248c3e7": "v5.17-rc1", "b1bb5b49373b61bf9d2c73a4d30058ba6f069e4c": "v4.1-rc7", "b1bd5cba3306691c771d558e94baa73e8b0b96b7": "v5.13-rc6", "b1cb7372fa822af6c06c8045963571d13ad6348b": "v4.15-rc1", "b1d18a7574d0df5eb4117c14742baf8bc2b9bb74": "v5.18-rc1", "b1db244ffd041a49ecc9618e8feb6b5c1afcdaa7": "v6.8-rc1", + "b1e0887379422975f237d43d8839b751a6bcf154": "v5.16-rc8", + "b1ebaa0e1318494a7637099a26add50509e37964": "v5.13-rc1", "b2157399cc9898260d6031c5bfe45fe137c1fbe7": "v4.15-rc8", "b21c60a4edd22e26fbebe7dd7078349a8cfa7273": "v3.3-rc1", "b228a94066406b6c456321d69643b0d7ce11cfa6": "v4.14-rc4", @@ -2582,15 +3291,22 @@ "b29c457a6511435960115c0f548c4360d5f4801d": "v5.12-rc8", "b29fcfb54cd70caca5b11c80d8d238854938884a": "v5.17-rc1", "b2a4df200d570b2c33a57e1ebfa5896e4bc81b69": "v3.13-rc1", + "b2b000069a4c307b09548dc2243f31f3ca0eac9c": "v6.6-rc5", + "b2cfd8ab4add53c2070367bfee2f5b738f51698d": "v4.15-rc1", "b2d03cabe2b2e150ff5a381731ea0355459be09f": "v6.1-rc1", "b2d057560b8107c633b39aabe517ff9d93f285e3": "v5.18-rc6", + "b2dd7b953c25ffd5912dda17e980e7168bebcf6c": "v6.8-rc4", "b2e0d98705e60e45bbb3c0032c48824ad7ae0704": "v3.8-rc1", + "b2e63555592f81331c8da3afaa607d8cf83e8138": "v4.15-rc1", + "b2f0d2724ba477d326e9d654d4db1c93e98f8b93": "v4.12-rc1", "b2f37aead1b82a770c48b5d583f35ec22aabb61e": "v5.16-rc7", "b3190df628617c7a4f188a9465aeabe1f5761933": "v2.6.36-rc1", "b31ff3cdf540110da4572e3e29bd172087af65cc": "v4.14-rc1", "b32a7dc8aef1882fbf983eb354837488cc9d54dc": "v4.15-rc4", + "b33752c300232d7f95dd9a4353947d0c9e6a0e52": "v5.12-rc1-dontuse", "b33fb5b801c6db408b774a68e7c8722796b59ecc": "v6.8-rc1", "b348d7dddb6c4fbfc810b7a0626e8ec9e29f7cbb": "v4.6-rc3", + "b34ea31fe013569d42b7e8681ef3f717f77c5b72": "v5.13-rc1", "b35858b3786ddbb56e1c35138ba25d6adf8d0bef": "v6.7-rc7", "b35a0f4dd544eaa6162b6d2f13a2557a121ae5fd": "v5.16", "b35cc8225845112a616e3a2266d2fde5ab13d3ab": "v3.7-rc1", @@ -2613,24 +3329,32 @@ "b42db0860e13067fcc7cbfba3966c9e652668bbc": "v4.17-rc4", "b43d1f9f7067c6759b1051e8ecb84e82cef569fe": "v5.5-rc3", "b43f9acbb8942b05252be83ac25a81cec70cc192": "v6.1-rc1", + "b4403cee6400c5f679e9c4a82b91d61aa961eccf": "v5.13-rc1", "b4487b93545214a9db8cbf32e86411677b0cca21": "v5.9-rc1", "b463a6f744a263fccd7da14db1afdc880371a280": "v2.6.37-rc1", "b46a0bf78ad7b150ef5910da83859f7f5a514ffd": "v5.0-rc5", "b46acd6a6a627d876898e1c84d3f84902264b445": "v5.15-rc1", "b4789b8e6be3151a955ade74872822f30e8cd914": "v3.13-rc1", "b48c24c2d710cf34810c555dcef883a3d35a9c08": "v5.14-rc1", + "b493ad718b1f0357394d2cdecbf00a44a36fa085": "v6.8-rc1", "b49a0e69a7b1a68c8d3f64097d06dabb770fec96": "v5.15-rc1", "b4a1b4f5047e4f54e194681125c74c0aa64d637d": "v4.4-rc8", "b4b10061ef98c583bcf82a4200703fbaa98c18dc": "v5.8-rc1", "b4b814fec1a5a849383f7b3886b654a13abbda7d": "v5.4-rc4", "b4e00444cab4c3f3fec876dc0cccc8cbb0d1a948": "v5.10-rc3", "b4f34d8d9d26b2428fa7cf7c8f97690a297978e6": "v3.10-rc1", + "b50aa49638c7e12abf4ecc483f4e928c5cccc1b0": "v5.14-rc1", + "b519b56e378ee82caf9b079b04f5db87dedc3251": "v4.15-rc1", "b52fe2dbb3e655eb1483000adfab68a219549e13": "v5.17-rc1", + "b5332a9f3f3d884a1b646ce155e664cc558c1722": "v5.13-rc1", + "b53558a950a89824938e9811eddfc8efcd94e1bb": "v5.13-rc5", "b53767719b6cd8789392ea3e7e2eb7b8906898f0": "v2.6.24-rc1", "b550a32e60a4941994b437a8d662432a486235a5": "v4.12-rc1", "b561275d633bcd8e0e8055ab86f1a13df75a0269": "v5.18-rc5", "b57a55e2200ede754e4dc9cce4ba9402544b9365": "v5.1-rc6", + "b57dc7c13ea90e09ae15f821d2583fa0231b4935": "v5.3-rc1", "b593b6f1b4921700c00394d35e098259e3d04913": "v5.9-rc1", + "b5941f066b4ca331db225a976dae1d6ca8cf0ae3": "v5.13-rc5", "b5a663aa426f4884c71cd8580adae73f33570f0d": "v4.5-rc1", "b5a8ffcae4103a9d823ea3aa3a761f65779fbe2a": "v4.16-rc1", "b5dba59e0cf7e2cc4d3b3b1ac5fe81ddf21959eb": "v5.6-rc1", @@ -2640,6 +3364,7 @@ "b60fe990c6b07ef6d4df67bc0530c7c90a62623a": "v5.4-rc1", "b61798130f1be5bff08712308126c2d7ebe390ef": "v4.13-rc1", "b61901024776b25ce7b8edc31bb1757c7382a88e": "v2.6.21-rc2", + "b63e78fca889e07931ec8f259701718a24e5052e": "v6.6-rc1", "b65235f6e102354ccafda601eaa1c5bef5284d21": "v6.6-rc7", "b66db53f8d85f6e8ce1b2b827d3fb3b0f0bf64c6": "v4.10-rc1", "b67fbebd4cf980aecbcc750e1462128bffe8ae15": "v5.19-rc8", @@ -2647,20 +3372,30 @@ "b6878d9e03043695dbf3fa1caa6dfc09db225b16": "v4.2-rc6", "b69040d8e39f20d5215a03502a8e8b4c6ab78395": "v3.18-rc1", "b6a2fea39318e43fee84fa7b0b90d68bed92d2ba": "v2.6.23-rc1", + "b6eda11c44dc89a681e1c105f0f4660e69b1e183": "v6.8-rc3", "b70261a288ea4d2f4ac7cd04be08a9f0f2de4f4d": "v5.6-rc1", "b71812168571fa55e44cdd0254471331b9c4c4c6": "v4.16-rc5", + "b7198383ef2debe748118996f627452281cf27d7": "v6.8-rc5", "b719a9c15d52d4f56bdea8241a5d90fd9197ce99": "v6.8-rc1", "b7236e21d55ff9008737621c84dd8ee6c37c7c6d": "v4.2-rc1", + "b72949328869dfd45f6452c2410647afd7db5f1a": "v5.11-rc1", "b7321e81fc369abe353cf094d4f0dc2fe11ab95f": "v4.11-rc2", "b75cd218274e01d026dc5240e86fdeb44bbed0c8": "v5.19-rc6", "b772b9dc63df0ca8a750ceac9ab356376022f0b6": "v4.3-rc1", "b77413446408fdd256599daf00d5be72b5f3e7c6": "v5.11-rc4", + "b795fb9f5861ee256070d59e33130980a01fadd7": "v6.6-rc3", "b799207e1e1816b09e7a5920fbb2d5fcf6edd681": "v4.19-rc7", "b7a584598aea7ca73140cb87b40319944dd3393f": "v4.6-rc1", "b7c81f80246fac44077166f3e07103affe6db8ff": "v5.18-rc6", "b7cc176c9eb3aa6989ac099efd8bdd6d0eaa784a": "v2.6.24-rc1", + "b7df21cf1b79ab7026f545e7bf837bd5750ac026": "v5.13-rc4", + "b7f1f7b2523a6a4382f12fe953380b847b80e09d": "v6.6-rc1", + "b802d070a52a1565b47daaa808872cfbd4a17b01": "v5.6-rc1", "b805d78d300bcf2c83d6df7da0c818b0fee41427": "v5.1", "b80b829e9e2c1b3f7aae34855e04d8f6ecaf13c8": "v6.5-rc5", + "b80e31baa43614e086a9d29dc1151932b1bd7fc5": "v6.6-rc5", + "b81af585ea54ee9f749391e594ee9cbd44061eae": "v5.18-rc1", + "b820de741ae48ccf50dd95e297889c286ff4f760": "v6.8-rc6", "b82a8dbd3d2f4563156f7150c6f2ecab6e960b30": "v6.7-rc5", "b844f0ecbc5626ec26cfc70cb144a4c9b85dc3f2": "v4.6-rc1", "b854b4ee66437e6e1622fda90529c814978cb4ca": "v6.1-rc1", @@ -2672,22 +3407,30 @@ "b86e33075ed1909d8002745b56ecf73b833db143": "v4.11-rc1", "b870e73a56c4cccbec33224233eaf295839f228c": "v6.2-rc5", "b892bf75b2034e0e4af23da9a276160b8ad26c15": "v3.14-rc1", + "b895bdf5d643b6feb7c60856326dd4feb6981560": "v5.12-rc8", "b8a8684502a0fc852afa0056c6bb2a9273f6fcc0": "v3.15-rc1", + "b8adb69a7d29c2d33eb327bca66476fb6066516b": "v6.8-rc6", + "b8b2f37cf632434456182e9002d63cbc4cccc50c": "v5.13-rc1", "b8c06ad4d67db56ed6bdfb685c134da74e92a2c7": "v5.13-rc1", "b8c75e4a1b325ea0a9433fa8834be97b5836b946": "v6.4-rc3", "b8d17e7d93d2beb89e4f34c59996376b8b544792": "v5.5-rc1", + "b8d55a90fd55b767c25687747e2b24abd1ef8680": "v6.8-rc1", "b8e51a6a9db94bc1fb18ae831b3dab106b5a4b5f": "v5.4-rc6", "b8f2c21db390273c3eaf0e5308faeaeb1e233840": "v3.8-rc6", "b901b252b6cf5cecc612059ccf05d974a9085c58": "v4.19-rc1", "b90cd6f2b905905fb42671009dc0e27c310a16ae": "v4.20-rc1", "b9149729ebdcfce63f853aa54a404c6a8f6ebbf3": "v3.8-rc7", + "b91540d52a08b65eb6a2b09132e1bd54fa82754c": "v5.10-rc1", "b91ee4aa2a2199ba4d4650706c272985a5a32d80": "v5.4-rc1", "b922f622592af76b57cbc566eaeccda0b31a3496": "v5.16-rc2", "b9258a2cece4ec1f020715fe3554bc2e360f6264": "v5.7-rc1", + "b938790e70540bf4f2e653dcd74b232494d06c8f": "v6.6-rc5", "b945245297416a3c68ed12f2ada1c7162f5f73fd": "v4.18-rc1", + "b94e02822debdf0cc473556aad7dcc859f216653": "v5.10-rc1", "b951f9dc7f25fc1e39aafda5edb4b47b38285d9f": "v3.17-rc2", "b963a22e6d1a266a67e9eecc88134713fd54775c": "v3.13-rc4", "b97bf3fd8f6a16966d4f18983b2c40993ff937d4": "v2.6.16-rc1", + "b988b1bb0053c0dcd26187d29ef07566a565cf55": "v6.8-rc1", "b98b0bc8c431e3ceb4b26b0dfc8db509518fb290": "v4.9-rc8", "b98e762e3d71e893b221f871825dc64694cfb258": "v5.11-rc6", "b9a41d21dceadf8104812626ef85dc56ee8a60ed": "v4.15-rc1", @@ -2699,30 +3442,44 @@ "b9dc6f65bc5e232d1c05fe34b5daadc7e8bbf1fb": "v4.10-rc4", "b9dd46188edc2f0d1f37328637860bb65a771124": "v4.12-rc1", "b9e146d8eb3b9ecae5086d373b50fa0c1f3e7f0f": "v3.9-rc8", + "b9f83ffaa0c096b4c832a43964fe6bff3acffe10": "v5.13-rc1", + "ba11bbf303fafb33989e95473e409f6ab412b18d": "v5.13-rc1", + "ba18deddd6d502da71fd6b6143c53042271b82bd": "v6.8", "ba38c27eb93e2d36bf940ca65c145f6e2aaa6d5c": "v4.11-rc1", + "ba3c5574203034781ac4231acf117da917efcd2a": "v6.8-rc1", "ba480dd4db9f1798541eb2d1c423fc95feee8d36": "v4.19-rc1", "ba59fb0273076637f0add4311faa990a5eec27c0": "v5.0-rc6", + "ba5e1272142d051dcc57ca1d3225ad8a089f9858": "v6.8-rc4", "ba5e770c9698782bc203bbf5cf3b36a77720bdbe": "v6.4-rc1", "ba953a9d89a00c078b85f4b190bc1dde66fe16b5": "v6.0-rc3", "bad8e64fb19d3a0de5e564d9a7271c31bd684369": "v5.9-rc1", + "badf3ada60ab8f76f9488dc8f5c0c57f70682f5a": "v4.7-rc1", "baff42ab1494528907bf4d5870359e31711746ae": "v2.6.34-rc4", "bb1fceca22492109be12640d49f5ea5a544c6bb4": "v4.8-rc5", "bb3d48dcf86a97dc25fe9fc2c11938e19cb4399a": "v4.18-rc1", + "bb436283e25aaf1533ce061605d23a9564447bdf": "v5.16-rc8", "bb4785551f64e18b2c8bb15a3bd2b22f5ebf624d": "v3.4-rc1", "bb57f6705960bebeb832142ce9abf43220c3eab1": "v6.8-rc1", "bb5ed01cd2428cd25b1c88a3a9cba87055eb289f": "v6.6-rc1", "bb646cdb12e75d82258c2f2e7746d5952d3e321a": "v4.5-rc1", "bb6aeba736ba9fd4d9569eec4bc3f7aecb42162a": "v4.9-rc1", "bb6d73d9add68ad270888db327514384dfa44958": "v6.6-rc1", + "bb7403655b3c3eb245d0ee330047cd3e20b3c4af": "v6.8-rc1", "bb7f0f989ca7de1153bd128a40a71709e339fa03": "v4.15-rc5", "bb81b2ddfa194b6d12761a350b5b5985cecae0a9": "v2.6.32-rc1", "bb8b81e396f7afbe7c50d789e2107512274d2a35": "v5.11-rc7", + "bb9c74a5bd1462499fe5ccb1e3c5ac40dcfa9139": "v5.13-rc2", "bba1dc0b55ac": "v5.9-rc1", "bbd0d59809f923ea2b540cbd781b32110e249f6e": "v2.6.24-rc1", + "bbd6f0a948139970f4a615dff189d9a503681a39": "v5.13-rc1", "bbe692e349e2a1edf3fe0a29a0e05899c9c94d51": "v5.5-rc1", "bbeb97464eefc65f506084fd9f18f21653e01137": "v5.10-rc1", "bbf26183b7a6236ba602f4d6a2f7cade35bba043": "v4.14-rc4", + "bbf73830cd48cff1599811d4f69c7cfd49c7b869": "v5.1-rc1", + "bbfddb904df6f82a5948687a2d57766216b9bc0f": "v6.1-rc3", + "bc03c02cc1991a066b23e69bbcc0f66e8f1f7453": "v6.8-rc1", "bc07c2c6e9ed125d362af0214b6313dca180cb08": "v3.16-rc1", + "bc08041b32abe6c9824f78735bac22018eabfc06": "v6.7-rc1", "bc0bdc5afaa740d782fbf936aaeebd65e5c2921d": "v5.15-rc4", "bc0c4d1e176eeb614dc8734fc3ace34292771f11": "v5.7-rc3", "bc2a9408fa65195288b41751016c36fd00a75a85": "v3.9-rc1", @@ -2731,18 +3488,21 @@ "bc890a60247171294acc0bd67d211fa4b88d40ba": "v4.18-rc4", "bc895e8b2a64e502fbba72748d59618272052a8b": "v5.11-rc5", "bc8a76a152c5f9ef3b48104154a65a68a8b76946": "v5.5-rc7", + "bcbc84af1183c8cf3d1ca9b78540c2185cd85e7f": "v6.8-rc2", "bcbde0d449eda7afa8f63280b165c8300dbd00e2": "v3.11-rc1", "bcc2c9c3fff859e0eb019fe6fec26f9b8eba795c": "v3.5-rc4", "bcca852027e5878aec911a347407ecc88d6fff7f": "v6.1-rc1", "bcd0f93353326954817a4f9fa55ec57fb38acbb0": "v5.16-rc6", "bcd53f858d87f52843cc87764b283999126a50d6": "v3.19-rc6", "bcd70260ef56e0aee8a4fc6cd214a419900b0765": "v6.1", + "bcd9a0797d73eeff659582f23277e7ab6e5f18f3": "v5.13-rc5", "bce1305c0ece3dc549663605e567655dd701752c": "v5.9-rc4", "bce56405201111807cc8e4f47c6de3e10b17c1ac": "v6.3-rc4", "bce9332220bd677d83b19d21502776ad555a0e73": "v6.1", "bceaa90240b6019ed73b49965eac7d167610be69": "v3.13-rc1", "bcf3b67d16a4c8ffae0aa79de5853435e683945c": "v5.1-rc1", "bcf85fcedfdd17911982a3e3564fcfec7b01eebd": "v5.9-rc2", + "bd077259d0a9c9bf453e7e9751bf41f1996e6585": "v6.7-rc1", "bd1060a1d67128bb8fbe2e1384c518912cbe54e7": "v4.5-rc1", "bd239704295c66196e6b77c5717ec4aec076ddd5": "v4.15-rc1", "bd23a7269834dc7c1f93e83535d16ebc44b75eba": "v4.18-rc1", @@ -2755,6 +3515,7 @@ "bd7a3fe770ebd8391d1c7d072ff88e9e76d063eb": "v4.14-rc4", "bd97120fc3d1a11f3124c7c9ba1d91f51829eb85": "v3.7-rc8", "bdabad3e363d825ddf9679dd431cca0b2c30f881": "v4.7-rc1", + "bdb6e697b2a76c541960b86ab8fda88f3de1adf2": "v3.3-rc1", "bdc1c5fac982845a58d28690cdb56db8c88a530d": "v6.4-rc4", "bdcd81707973cf8aa9305337166f8ee842a050d4": "v3.2-rc1", "bdcf0a423ea1c40bbb40e7ee483b50fc8aa3d758": "v4.15-rc4", @@ -2775,6 +3536,7 @@ "be8de49bea505e7777a69ef63d60e02ac1712683": "v6.2", "beb39db59d14990e401e235faf66a6b9b31240b0": "v4.1-rc7", "becfd1f37544798cbdfd788f32c827160fab98c1": "v2.6.39-rc1", + "bee90911e0138c76ee67458ac0d58b38a3190f65": "v5.16-rc7", "bf118a342f10dafe44b14451a1392c3254629a1f": "v3.3-rc1", "bf2a9a39639b8b51377905397a5005f444e9a892": "v2.6.28-rc1", "bf33f87dd04c371ea33feb821b60d63d754e3124": "v4.11-rc5", @@ -2783,16 +3545,20 @@ "bf53d4687b8f3f6b752f091eb85f62369a515dfd": "v5.9-rc1", "bf5a755f5e9186406bbf50f4087100af5bd68e40": "v3.14-rc1", "bf911e985d6bbaa328c20c3e05f4eb03de11fdd6": "v4.9-rc4", + "bf9a40ae8d722f281a2721779595d6df1c33a0bf": "v5.13-rc1", + "bf9c0538e485b591a2ee02d9adb8a99db4be5a2a": "v5.11-rc1", "bfa76d49576599a4b9f9b7a71f23d73d6dcff735": "v3.19", "bfad7c2d40332be6a1d7a89660bceb0f6ea1d73a": "v3.14-rc1", "bfc81a8bc18e3c4ba0cbaa7666ff76be2f998991": "v4.14-rc4", "bfd0a56b90005f8c8a004baf407ad90045c2b11e": "v3.12-rc1", "bfd6e6e6c5d2ee43a3d9902b36e01fc7527ebb27": "v5.5-rc1", + "bfe1d56091c1a404b3d4ce7e9809d745fc4453bb": "v5.6-rc1", "bfe4037e722ec672c9dafd5730d9132afeeb76e9": "v4.19-rc1", "bfedb589252c01fa505ac9f6f2a3d5d68d707ef4": "v4.10-rc1", "c0019b7db1d7ac62c711cda6b357a659d46428fe": "v5.16-rc2", "c004804dceee9ca384d97d9857ea2e2795c2651d": "v5.2-rc1", "c008ba5bdc9fa830e1a349b20b0be5a137bdef7a": "v3.19-rc1", + "c02027b5742b5aa804ef08a4a9db433295533046": "v5.13-rc2", "c0371da6047abd261bc483c744dbc7d81a116172": "v3.19-rc1", "c03aa9f6e1f938618e6db2e23afef0574efeeb65": "v3.17-rc5", "c03b04dcdba1da39903e23cc4d072abf8f68f2dd": "v5.5-rc1", @@ -2803,21 +3569,29 @@ "c09440f7dcb304002dfced8c0fea289eb25f2da0": "v4.6-rc1", "c095508770aebf1b9218e77026e48345d719b17c": "v4.15-rc8", "c09581a52765a85f19fc35340127396d5e3379cc": "v5.2-rc2", + "c09c4f31998bac6d73508e38812518aceb069b68": "v6.7-rc1", + "c09f11ef35955785f92369e25819bf0629df2e59": "v5.13-rc1", "c0a333d842ef67ac04adc72ff79dc1ccc3dca4ed": "v5.4-rc7", "c0b33bdc5b8d9c1120dece660480d4dd86b817ee": "v2.6.38-rc1", + "c0b57581b73be7b43f39e0dff201c93413f6a668": "v5.12-rc1-dontuse", "c0c77d8fb787cfe0c3fca689c2a30d1dad4eaba7": "v4.18-rc1", + "c0c8a8397fa8a74d04915f4d3d28cb4a5d401427": "v5.13-rc4", "c0ca3d70e8d3cf81e2255a217f7ca402f5ed0862": "v4.8-rc1", "c0cfa2d8a788fcf45df5bf4070ab2474c88d543a": "v5.5-rc1", + "c0ec2a712daf133d9996a8a1b7ee2d4996080363": "v6.8-rc6", "c0efd232929c2cd87238de2cccdaf4e845be5b0c": "v2.6.26-rc9", "c0f5ecee4e741667b2493c742b60b6218d40b3aa": "v3.9-rc3", "c0f71bbb810237a38734607ca4599632f7f5d47f": "v4.16-rc1", "c113187d38ff85dc302a1bb55864b203ebb2ba10": "v4.16-rc5", "c11c7bfd213495784b22ef82a69b6489f8d0092f": "v4.18-rc1", + "c129412f74e99b609f0a8e95fc3915af1fd40f34": "v5.11-rc1", "c12b395a46646bab69089ce7016ac78177f6001f": "v3.7-rc1", "c131187db2d3fa2f8bf32fdf4e9a4ef805168467": "v4.15-rc1", + "c13e7331745852d0dd7c35eabbe181cbd5b01172": "v6.6-rc2", "c15471f79506830f80eca0e7fe09b8213953ab5f": "v4.6-rc1", "c156633f1353264634135dea86ffcae74f2122fc": "v4.2-rc1", "c1592a89942e9678f7d9c8030efa777c0d57edab": "v6.4-rc1", + "c193707dde77ace92a649cd59a17e105e2fbeaef": "v4.17-rc1", "c1a281e34dae41379af86b95592a5ae8e9e3af67": "v4.1-rc1", "c1aabdf379bc2feeb0df7057ed5bad96f492133e": "v3.2-rc1", "c1ac539ed43f273cd4d92bf7350ffd783b920184": "v3.4-rc3", @@ -2830,11 +3604,13 @@ "c1f6e3c818dd734c30f6a7eeebf232ba2cf3181d": "v5.7-rc6", "c1fa0768a8713b135848f78fd43ffc208d8ded70": "v4.14-rc2", "c215e9397b00b3045a668120ed7dbd89f2866e74": "v4.19-rc1", + "c22b0bcb1dd024cb9caad9230e3a387d8b061df5": "v5.12-rc1-dontuse", "c2349758acf1874e4c2b93fe41d072336f1a31d0": "v3.13-rc7", "c24968734abfed81c8f93dc5f44a7b7a9aecadfa": "v6.0-rc1", "c2508ec5a58db67093f4fb8bf89a9a7c53a109e9": "v6.5-rc1", "c25b2ae136039ffa820c26138ed4a5e5f3ab3841": "v5.17-rc1", "c25c210f590e7a37eecd865d84f97d1f40e39786": "v5.12-rc1-dontuse", + "c26844eda9d4fdbd266660e3b3de2d0270e3a1ed": "v4.13", "c278c253f3d992c6994d08aa0efb2b6806ca396f": "v4.5-rc6", "c27927e372f0785f3303e8fad94b85945e2c97b7": "v4.13-rc5", "c27a3e4d667fdcad3db7b104f75659478e0c68d8": "v3.17-rc5", @@ -2847,13 +3623,16 @@ "c2c737a0461e61a34676bd0bd1bc1a70a1b4e396": "v3.12-rc1", "c2dd5146e9fe1f22c77c1b011adf84eea0245806": "v4.20", "c2eecefec5df1306eafce28ccdf1ca159a552ecc": "v5.19-rc1", + "c2f156bf168fb42cd6ecd0a8e2204dbe542b8516": "v6.4-rc1", "c300aa64ddf57d9c5d9c898a64b36877345dd4a9": "v3.9-rc4", "c301f0981fdd3fd1ffac6836b423c4d7a8e0eb63": "v6.7-rc2", "c3021629a0d820247ee12b6c5192a1d5380e21c6": "v2.6.35-rc1", "c30707be128e952ca2ba77417cb5509e254a4aac": "v3.14-rc1", + "c3187cf32216313fb316084efac4dab3a8459b1d": "v5.13-rc2", "c319b4d76b9e583a5d88d6bf190e079c4e43213d": "v3.0-rc1", "c33b1cc62ac05c1dbb1cdafe2eb66da01c76ca8d": "v5.12-rc7", "c364df2489b8ef2f5e3159b1dff1ff1fdb16040d": "v5.13-rc7", + "c36b16d29f3af5f32fc1b2a3401bf48f71cabee1": "v5.13-rc1", "c37e9e013469521d9adb932d17a1795c139b36db": "v4.18-rc4", "c392cbecd8eca4c53f2bf508731257d9d0a21c2d": "v6.7-rc4", "c3ab435466d5": "v4.19-rc1", @@ -2863,6 +3642,7 @@ "c3e2219216c92919a6bd1711f340f5faa98695e6": "v5.2-rc4", "c40a2c8817e42273a4627c48c884b805475a733f": "v4.4-rc1", "c40f7d74c741a907cfaeb73a7697081881c497d0": "v5.0-rc1", + "c4436c9149c5d2bc0c49ab57ec85c75ea1c4d61c": "v5.4-rc1", "c444eb564fb16645c172d550359cb3d75fe8a040": "v5.8-rc1", "c486682ae1e2b149add22f44cf413b3103e3ef39": "v5.13-rc1", "c4a3e0a529ab3e65223e81681c7c6b1bc188fa58": "v2.6.14-rc4", @@ -2871,22 +3651,29 @@ "c4d66343a46a4931d6a547042198896e4fd1c592": "v5.1-rc1", "c4e490cf148e85ead0d1b1c2caaba833f1d5b29f": "v4.10-rc4", "c4eb1f403243fc7bbb7de644db8587c03de36da6": "v5.14-rc6", + "c4fb7d2eac9ff9bfc35a2e4d40c7169a332416e0": "v6.8-rc1", "c50ac050811d6485616a193eb0f37bfbd191cc89": "v3.5-rc1", + "c5114710c8ce86b8317e9b448f4fd15c711c2a82": "v6.8-rc2", "c518adafa39f37858697ac9309c6cf1805581446": "v5.11-rc7", "c51ce49735c183ef2592db70f918ee698716276b": "v3.5-rc1", "c52873e5a1ef72f845526d9f6a50704433f9c625": "v5.3-rc5", + "c52ca478233c172b2d322b5241d6279a8661cbba": "v5.6-rc1", "c53432030d86429dc9fe5adc3d68cb9d1343b0b2": "v4.10-rc1", + "c53e9653605dbf708f5be02902de51831be4b009": "v5.9-rc1", "c54419321455631079c7d6e60bc732dd0c5914c5": "v3.10-rc1", "c547dbf55d5f8cf615ccc0e7265e98db27d3fb8b": "v3.12-rc7", "c54d481d71c6849e044690d3960aaebc730224cc": "v5.7-rc7", "c54def7bd64d7c0b6993336abcffb8444795bf38": "v3.17-rc3", "c55aee1bf0e6b6feec8b2927b43f7a09a6d5f754": "v4.6-rc3", + "c55dcdd435aa6c6ad6ccac0a4c636d010ee367a4": "v5.13-rc5", "c56e022c0a27142b7b59ae6bdf45f86bf4b298a1": "v6.4-rc1", + "c574bbe917036c8968b984c82c7b13194fe5ce98": "v5.18-rc1", "c575b7eeb89f94356997abd62d6d5a0590e259b7": "v4.18-rc1", "c58b84ee467bfd08b39fbda56757ba19ac50980a": "v4.9-rc4", "c58d6c93680f28ac58984af61d0a7ebf4319c241": "v4.5-rc6", "c5a595000e2677e865a39f249c056bc05d6e55fd": "v6.7-rc5", "c5a7591172100269e426cf630da0f2dc8138a206": "v3.17-rc1", + "c5b2cbdbdac563f46ecd5e187253ab1abbd6fc04": "v5.6-rc1", "c5c77ba18ea66aa05441c71e38473efb787705a4": "v4.2-rc1", "c5fa7b3cf3cb22e4ac60485fc2dc187fe012910f": "v3.11-rc1", "c611589b4259ed63b9b77be6872b1ce07ec0ac16": "v6.5-rc7", @@ -2898,17 +3685,25 @@ "c6688ef9f29762e65bce325ef4acd6c675806366": "v4.15-rc4", "c66ac9db8d4ad9994a02b3e933ea2ccc643e1fe5": "v2.6.38-rc1", "c68cfb718c8f97b7f7a50ed66be5feb42d0c8988": "v5.1-rc1", + "c69813471a1ec081a0b9bf0c6bd7e8afd818afce": "v6.6-rc5", + "c6c2adcba50c2622ed25ba5d5e7f05f584711358": "v6.6-rc4", + "c6e3f13398123a008cd2ee28f93510b113a32791": "v5.8-rc1", "c700525fcc06b05adfea78039de02628af79e07a": "v5.17", "c70222752228a62135cee3409dccefd494a24646": "v5.18-rc1", "c7084edc3f6d67750f50d4183134c4fb5712a5c8": "v5.1-rc4", "c73be61cede5882f9605a852414db559c0ebedfd": "v5.8-rc1", "c7559663e42f4294ffe31fe159da6b6a66b35d61": "v3.11-rc1", "c7630a4b932af254d61947a3a7e3831de92c7fb5": "v2.6.22-rc1", + "c7718ee96dbc2f9c5fc3b578abdf296dd44b9c20": "v5.13-rc4", "c771d683a62e5d36bc46036f5c07f4f5bb7dda61": "v3.18-rc2", + "c7741d16a57cbf97eebe53f27e8216b1ff20e20c": "v4.0-rc1", + "c777b11d34e0f47dbbc4b018ef65ad030f2b283a": "v6.6-rc4", "c77a4b9cffb6215a15196ec499490d116dfad181": "v3.9-rc7", "c780e86dd48ef6467a1146cf7d0fe1e05a635039": "v5.6-rc4", "c784e5249e773689e38d2bc1749f08b986621a26": "v5.11-rc1", "c799d519bf088c0c5deb481b0190990417ace1bc": "v4.11-rc1", + "c79c5e0178922a9e092ec8fed026750f39dcaef4": "v5.13-rc1", + "c7a219048e459cf99c6fec0f7c1e42414e9e6202": "v5.12-rc1-dontuse", "c7aa12252f5142b9eee2f6e34ca8870a8e7e048c": "v3.6-rc1", "c7ac8679bec9397afe8918f788cbcef88c38da54": "v3.1-rc1", "c7ce4f60ac199fb3521c5fcd64da21cee801ec2b": "v4.7-rc1", @@ -2918,7 +3713,9 @@ "c7ec4f2d684e17d69bbdd7c4324db0ef5daac26a": "v6.8-rc2", "c7ed6d0183d5ea9bc31bcaeeba4070bd62546471": "v5.4-rc6", "c826cb7dfce80512c26c984350077a25046bd215": "v2.6.39-rc1", + "c8334512f3dd1b94844baca629f9bedca4271593": "v5.8-rc1", "c8401dda2f0a00cd25c0af6a95ed50e478d25de4": "v4.12-rc7", + "c8607e4a086fae05efe5bffb47c5199c65e7216e": "v5.15-rc4", "c88507fbad8055297c1d1e21e599f46960cbee39": "v3.14-rc7", "c88547a8119e3b581318ab65e9b72f27f23e641d": "v3.15-rc1", "c88e739b1fad662240e99ecbd0bdaac871717987": "v3.11-rc1", @@ -2938,20 +3735,28 @@ "c947459979c6c9c8aff9c9b5027b31dbf8055106": "v4.8-rc1", "c993ee0f9f81caf5767a50d1faeba39a0dc82af2": "v5.17-rc8", "c995efd5a740d9cbafbf58bde4973e8b50b4d761": "v4.15-rc9", + "c996f0346e40e3b1ac2ebaf0681df898fb157f60": "v5.13-rc1", "c9b37458e95629b1d1171457afdcc1bf1eb7881d": "v3.12-rc1", + "c9b528c35795b711331ed36dc3dbee90d5812d4e": "v6.8-rc3", "c9b92530a723ac5ef8e352885a1862b18f31b2f5": "v3.7-rc1", + "c9d9eb9c53d37cdebbad56b91e40baf42d5a97aa": "v6.8-rc2", "c9f838d104fed6f2f61d68164712e3204bf5271b": "v4.11-rc8", "c9fbd7bbc23dbdd73364be4d045e5d3612cf6e82": "v4.18-rc1", "ca06197382bde0a3bc20215595d1c9ce20c6e341": "v5.7-rc1", + "ca0f1a8055be2a04073af435dc68419334481638": "v5.9-rc1", "ca22da2fbd693b54dc8e3b7b54ccc9f7e9ba3640": "v6.3-rc1", "ca4463bf8438b403596edd0ec961ca0d4fbe0220": "v5.7-rc1", "ca4da5dd1f99fe9c59f1709fb43e818b18ad20e0": "v4.2-rc5", "ca4ef4574f1ee5252e2cd365f8f5d5bafd048f32": "v4.11-rc1", "ca58fbe06c54795f00db79e447f94c2028d30124": "v5.5-rc1", "ca684386e6e21ba1511061f71577cdb6c3f2b3d3": "v4.8-rc1", + "ca69300173b642ba64118200172171ea5967b6c5": "v5.6-rc1", "ca72d88378b2f2444d3ec145dd442d449d3fefbc": "v5.2-rc7", "ca7a03c4175366a92cee0ccc4fec0038c3266e26": "v5.4-rc1", + "ca7d8b980b67f133317525c4273e144116ee1ae5": "v5.9-rc1", + "ca9ae5ec4ef0ed13833b03297ab319676965492c": "v4.12-rc1", "caa4b35b4317d5147b3ab0fbdc9c075c7d2e9c12": "v6.2-rc3", + "cabc9d49333df72fe0f6d58bdcf9057ba341e701": "v6.1-rc1", "cabfb3680f78981d26c078a26e5c748531257ebb": "v4.11-rc1", "cac2661c53f35cbe651bef9b07026a5a05ab8ce0": "v4.11-rc1", "cac5818c25d0423bda73e2b6997404ed0a7ed9e3": "v4.20-rc1", @@ -2962,14 +3767,18 @@ "caf3ef7468f7534771b5c44cd8dbd6f7f87c2cbd": "v6.5-rc2", "cb090e64cf25602b9adaf32d5dfc9c8bec493cd1": "v6.3-rc3", "cb17ed29a7a5fea8c9bf70e8a05757d71650e025": "v5.9-rc1", + "cb1a609236096c278ecbfb7be678a693a70283f1": "v5.9-rc1", "cb1ce2ef387b01686469487edd45994872d52d73": "v3.17-rc1", "cb222aed03d798fc074be55e59d9a112338ee784": "v5.5-rc6", "cb2595c1393b4a5211534e6f0a0fbad369e21ad8": "v4.18-rc1", "cb3232138e37129e88240a98a1d2aba2187ff57c": "v4.5-rc2", "cb3e9864cdbe35ff6378966660edbcbac955fe17": "v6.2-rc4", + "cb4daf271302d71a6b9a7c01bd0b6d76febd8f0c": "v6.8-rc1", "cb59e840838193957a84ad22f7e1465a06a7c10c": "v2.6.12-rc3", "cb5e1b81304e089ee3ca948db4d29f71902eb575": "v5.12-rc1-dontuse", + "cb658a453b9327ce96ce5222c24d162b5b65b564": "v4.11-rc1", "cb66ddd156203daefb8d71158036b27b0e2caf63": "v5.1-rc4", + "cb88cb53badb8aeb3955ad6ce80b07b598e310b8": "v6.8-rc4", "cb94a02e7494c001fa8b5a4c5e16693fafd98530": "v5.16-rc1", "cbb4be652d374f64661137756b8f357a1827d6a4": "v4.3-rc3", "cbbaa2727aa3ae9e0a844803da7cef7fd3b94f2b": "v5.5-rc1", @@ -2985,12 +3794,15 @@ "cc255c76c70f7a87d97939621eae04b600d9f4a1": "v4.19-rc1", "cc25b994acfbc901429da682d0f73c190e960206": "v4.4-rc1", "cc2d58634e0f489d28b5564c05abc69930b4d920": "v4.16-rc1", + "cc4c07c89aada16229084eeb93895c95b7eabaa3": "v6.6-rc1", "cc503c1b43e002e3f1fed70f46d947e2bf349bb6": "v2.6.25-rc1", "cc7a0bb058b85ea03db87169c60c7cfdd5d34678": "v5.12-rc4", "cc8f7fe1f5eab010191aa4570f27641876fa1267": "v5.17-rc5", "cc9b17ad29ecaa20bfe426a8d4dbfb94b13ff1cc": "v3.5-rc1", + "ccb88e9549e7cfd8bcd511c538f437e20026e983": "v6.8-rc4", "ccbf035ae5de4c535160fc99f73feb44cc55b534": "v2.6.32-rc1", "ccd5b3235180eef3cfec337df1c8554ab151b5cc": "v4.13-rc7", + "cce7fc8b29961b64fadb1ce398dc5ff32a79643b": "v6.6-rc4", "ccec44563b18a0ce90e2d4f332784b3cb25c8e9c": "v4.5", "ccf45b18ce89f598c69a0c945ced1635013fc0b1": "v4.20-rc1", "ccf7abb93af09ad0868ae9033d1ca8108bdaec82": "v4.10-rc8", @@ -2998,20 +3810,26 @@ "cd1a677cad994021b19665ed476aea63f5d54f31": "v5.11-rc1", "cd21d99e595ec1d8721e1058dcdd4f1f7de1d793": "v6.1-rc8", "cd33c830448baf7b1e94da72eca069e3e1d050c9": "v5.8-rc1", + "cd45f99034b0c8c9cb346dd0d6407a95ca3d36f6": "v6.8-rc6", "cd4a40174b71acd021877341684d8bb1dc8ea4ae": "v4.1-rc1", "cd63f3cf1d59b7ad8419eba1cac8f9126e79cc43": "v4.13-rc4", "cd667ce24796700e1a0e6e7528efc61c96ff832e": "v2.6.32-rc1", "cd9e9808d18fe7107c306f6e71c8be7230ee42b4": "v4.4-rc1", + "cda4672da1c26835dcbd7aec2bfed954eda9b5ef": "v6.8-rc4", + "cdba4301adda7c60a2064bf808e48fccd352aaa9": "v6.7-rc5", "cde93be45a8a90d8c264c776fab63487b5038a65": "v4.3-rc1", "cdeb5d7d890e14f3b70e8087e745c4a6a7d9f337": "v5.15-rc6", "cdec9cb5167ab1113ba9c58e395f664d9d3f9acb": "v3.3-rc1", + "cdfa835c6e5e87d145f9f632b58843de97509f2b": "v4.20-rc1", "ce07d891a0891d3c0d0c2d73d577490486b809e1": "v4.1-rc1", "ce0887ac96d35c7105090e166bb0807dc0a0e838": "v5.6-rc1", "ce18d171cb7368557e6498a3ce111d7d3dc03e4d": "v5.4-rc1", "ce1e7989d989e36ee3b032d46aab28b7d5e30428": "v4.5-rc1", "ce33e64c1788912976b61314b56935abd4bc97ef": "v6.3-rc1", "ce3aba43599f0b50adbebff133df8d08a3d5fffe": "v5.14-rc1", + "ce3c4ad7f4ce5db7b4f08a1e237d8dd94b39180b": "v5.19-rc1", "ce3fd194fcc6fbdc00ce095a852f22df97baa401": "v4.17-rc1", + "ce40733ce93de402ed629762f0e912d9af187cef": "v2.6.25-rc1", "ce40cd3fc7fa40a6119e5fe6c0f2bc0eb4541009": "v4.2-rc1", "ce683e5f9d045e5d67d1312a42b359cb2ab2a13c": "v4.7-rc1", "ce72a16fa705f960ca2352e95a7c5f4801475e75": "v4.13-rc1", @@ -3019,37 +3837,55 @@ "cea0f0e7ea54753c3265dc77f605a6dad1912cfc": "v2.6.20-rc4", "cea4dcfdad926a27a18e188720efe0f2c9403456": "v3.10-rc4", "ceabee6c59943bdd5e1da1a6a20dc7ee5f8113a2": "v5.1-rc3", + "ceaf2966ab082bbc4d26516f97b3ca8a676e2af8": "v5.13-rc1", + "cec279a898a3b004411682f212215ccaea1cd0fb": "v5.13-rc4", "cec8f96e49d9be372fdb0c3836dcf31ec71e457e": "v4.7-rc1", "ced39002f5ea736b716ae233fb68b26d59783912": "v3.4-rc1", + "ceec5f5b59882b871a722ca4d49b767a09a4bde9": "v4.19-rc1", "cef31d9af908243421258f1df35a4a644604efbe": "v4.15-rc4", "cefa91b2332d7009bc0be5d951d6cbbf349f90f8": "v5.18-rc4", "cefc7ca46235f01d5233e3abd4b79452af01d9e9": "v5.14-rc1", "cf01fb9985e8deb25ccf0ea54d916b8871ae0e62": "v4.11-rc6", "cf124db566e6b036b8bcbe8decbed740bdfac8c6": "v4.12-rc6", "cf137b3ea49a04e0c843b12674afa4b1d23e827f": "v5.11-rc1", + "cf15c3e734e8d25de7b4d9170f5a69ace633a583": "v6.0-rc1", + "cf264e1329fb0307e044f7675849f9f38b44c11a": "v6.5-rc1", + "cf29c5b66b9f83939367d90679eb68cdfa2f0356": "v5.5-rc1", + "cf4a0d840ecc72fcf16198d5e9c505ab7d5a5e4d": "v6.8-rc2", + "cf5000a7787cbc10341091d37245a42c119d26c5": "v6.6-rc3", "cf6531d98190fa2cf92a6d8bbc8af0a4740a223c": "v6.0-rc1", + "cf7c2789822db8b5efa34f5ebcf1621bc0008d48": "v6.8-rc7", + "cf7da0d66cc1a2a19fc5930bb746ffbb2d4cd1be": "v5.6-rc1", "cf872776fc84128bb779ce2b83a37c884c3203ae": "v3.13-rc5", + "cf8ee6de2543a0fa6d9471ddbb7216464a9681a1": "v5.12-rc1-dontuse", "cf970c002d270c36202bd5b9c2804d3097a52da0": "v3.13-rc1", "cf9a6784f7c1b5ee2b9159a1246e327c331c5697": "v4.5-rc1", "cfa39381173d5f969daf43582c95ad679189cbc9": "v5.0-rc6", "cfaa80c91f6f99b9342b6557f0f0e1143e434066": "v6.6-rc2", "cfb8da8f69b81d367b766888e83ec0483a31bf01": "v2.6.37-rc1", + "cfd0d84ba28c18b531648c9d4a35ecca89ad9901": "v5.16-rc8", "cfdda9d764362ab77b11a410bb928400e6520d57": "v2.6.35-rc1", "cff109768b2d9c03095848f4cd4b0754117262aa": "v3.8-rc1", + "cffa4b2122f5f3e53cf3d529bbc74651f95856d5": "v5.11-rc3", "cffb78b0e0b3a30b059b27a1d97500cf6464efa9": "v3.11-rc1", "d00d8da5869a2608e97cfede094dfc5e11462a46": "v5.14-rc1", "d021c344051af91f42c5ba9fdedc176740cbd238": "v3.9-rc1", "d02ba2a6110c530a32926af8ad441111774d2893": "v4.16-rc5", "d03032af511c56d3c1580fa4f54f6285f650e638": "v2.6.28-rc1", "d049f74f2dbe71354d43d393ac3a188947811348": "v3.13-rc1", + "d08089f649a0cfb2099c8551ac47eef0cc23fdf2": "v6.3-rc1", "d08e973a77d128b25e01a08c34d89593fdf222da": "v3.16-rc1", + "d09486a04f5da0a812c26217213b89a3b1acf836": "v6.8-rc2", "d0b137062b2de75b264b84143d21c98abc5f5ad2": "v5.17-rc1", "d0be8347c623e0ac4202a1d4e0373882821f56b0": "v5.19", "d0c7feaf87678371c2c09b3709400be416b2dc62": "v5.7-rc1", + "d0cad871703b898a442e4049c532ec39168e5b57": "v2.6.34-rc2", "d0cb50185ae942b03c4327be322055d622dc79f6": "v5.5", "d0d51a97063db4704a5ef6bc978dddab1636a306": "v6.1-rc1", "d0d62baa7f505bd4c59cd169692ff07ec49dde37": "v5.14-rc1", + "d0e274af2f2e44b9d496f5d2c0431fdd2ea76fb8": "v5.12-rc1-dontuse", "d0e2c7de92c7f2b3d355ad76b0bb9fc43d1beb87": "v5.9-rc1", + "d0f91938bede204a343473792529e0db7d599836": "v4.1-rc1", "d0febd81ae77a0e13717f1412ff9589e43fc4f8b": "v5.7-rc1", "d10c77873ba1e9e6b91905018e29e196fd5f863d": "v6.7-rc8", "d10d1b9ac97b96dd9183944d30b1664bdbb5fbf6": "v3.7-rc1", @@ -3065,6 +3901,7 @@ "d18dcfe9860e842f394e37ba01ca9440ab2178f4": "v6.2-rc5", "d199fab63c11998a602205f7ee7ff7c05c97164b": "v4.10", "d1a890fa37f27d6aca3abc6e25e4148efc3223a6": "v2.6.32-rc5", + "d1adb25df7111de83b64655a80b5a135adbded61": "v6.8-rc1", "d1c263a031e876ac3ca5223c728e4d98ed50b3c0": "v5.11-rc1", "d1d788302e8c76e5138dfa61f4a5eee4f72a748f": "v2.6.37-rc5", "d1e7fd6462ca9fc76650fbe6ca800e35b24267da": "v5.7-rc1", @@ -3072,6 +3909,7 @@ "d1fd836dcf00d2028c700c7e44d2c23404062c90": "v4.1-rc1", "d203b0fd863a2261e5d00b97f3d060c4c2a6db71": "v5.13-rc7", "d214c7537bbf2f247991fb65b3420b0b3d712c67": "v2.6.29-rc1", + "d2168e849ebf617b2b7feae44c0c0baf739cb610": "v4.3-rc1", "d21b0be246bf3bbf569e6e239f56abb529c7154e": "v4.19-rc1", "d25adbeb0cdb860fb39e09cdd025e9cfc954c5ab": "v4.14-rc1", "d26a9559403c7c3ec3b430f5825bc22c3d40abdb": "v4.14-rc1", @@ -3079,42 +3917,62 @@ "d26d6504f23e803824e8ebd14e52d4fc0a0b09cb": "v3.9-rc7", "d270453a0d9ec10bb8a802a142fb1b3601a83098": "v5.18-rc6", "d29216842a85c7970c536108e093963f02714498": "v4.9-rc1", + "d2b4387f3bdf016e266d23cf657465f557721488": "v5.0-rc1", + "d2b48f340d9e4a8fbeb1cdc84cd8da6ad143a907": "v6.8-rc6", "d2b4b97933f5adacfba42dc3b9200d0e21fbe2c4": "v4.16-rc1", "d2b9d2a5ad5ef04ff978c9923d19730cb05efd55": "v4.4-rc3", + "d2bf7959d9c0f631ef860edaf834d55773fdedff": "v5.12-rc1-dontuse", + "d2ddc776a4581d900fc3bdc7803b403daae64d88": "v4.15-rc1", "d2e4c1e6c2947269346054ac8937ccfe9e0bcc6b": "v5.5-rc1", "d2f007dbe7e4c9583eea6eb04d60001e85c6f1bd": "v4.20-rc2", + "d2fb0a0438384fee08a418025f743913020033ce": "v5.6-rc1", "d2ffed5185df9d8d9ccd150e4340e3b6f96a8381": "v4.17-rc3", "d3217b15a19a4779c39b212358a5c71d725822ee": "v3.16-rc1", + "d3256efd8e8b234a6251e4d4580bd2c3c31fdc4c": "v5.13-rc1", "d325dc6eb763c10f591c239550b8c7e5466a5d09": "v6.1-rc1", + "d35652a5fc9944784f6f50a5c979518ff8dacf61": "v6.6-rc6", "d3623099d3509fa68fa28235366049dd3156c63a": "v3.15-rc1", + "d375b98e0248980681e5e56b712026174d617198": "v6.8-rc1", "d39083234c60519724c6ed59509a2129fd2aed41": "v5.5-rc1", + "d396f89db39a2f259e2125ca43b4c31bb65afcad": "v6.6-rc1", + "d39bf40e55e666b5905fdbd46a0dced030ce87be": "v5.15", "d3b0ffa1d75d5305ebe34735598993afbb8a869": "v5.5-rc1", "d3b0ffa1d75d5305ebe34735598993afbb8a869d": "v5.5-rc1", "d3b16034a24a112bb83aeb669ac5b9b01f744bb7": "v5.14-rc1", "d3b6372c5881cb54925212abb62c521df8ba4809": "v5.17-rc8", "d3bd7413e0ca40b60cf60d4003246d067cafdeda": "v5.0-rc3", + "d3ea125df37dc37972d581b74a5d3785c3f283ab": "v6.8-rc7", "d4122754442799187d5d537a9c039a49a67e57f1": "v5.10-rc5", "d42334578eba1390859012ebb91e1e556d51db49": "v6.5-rc5", "d443d93864726ad68c0a741d1e7b03934a9af143": "v5.19-rc1", "d45476d9832409371537013ebdd8dc1a7781f97a": "v5.17-rc8", + "d46a78b05c0e37f76ddf4a7a67bf0b6c68bada55": "v2.6.37-rc1", "d4726d7700688835f4784d3b94de6fff2cbe16c2": "v5.19-rc1", "d475f942b1dd6a897dac3ad4ed98d6994b275378": "v3.11-rc1", + "d49270a04623ce3c0afddbf3e984cb245aa48e9c": "v6.8-rc1", "d4932f9e81ae7a7bf3c3967e48373909b9c98ee5": "v3.18-rc1", "d4b09acf924b84bae77cad090a9d108e70b43643": "v5.0-rc1", "d4c54919ed86302094c0ca7d48a8cbd4ee753e92": "v3.15", "d4fdf8ba0e5808ba9ad6b44337783bd9935e0982": "v4.13-rc1", "d50dde5a10f305253cbc3855307f608f8a3c5f73": "v3.14-rc1", + "d527f51331cace562393a8038d870b3e9916686f": "v6.6-rc3", "d52c9750f150111dc7f73e4036f6948b20c9f8c3": "v4.10-rc1", + "d52e5a7e7ca49457dd31fc8b42fb7c0d58a31221": "v4.16-rc7", "d5361233e9ab920e135819f73dd8466355f1fddd": "v5.18-rc2", "d5410ac7b0baeca91cf73ff5241d35998ecc8c9e": "v6.0-rc1", "d5468d7afaa9c9e961e150f0455a14a9f4872a98": "v4.6-rc6", "d558023207e008a4476a3b7bb8706b2a2bf5d84f": "v3.13-rc1", "d563131ef23cbc756026f839a82598c8445bc45f": "v5.5-rc1", + "d56e460e19ea8382f813eb489730248ec8d7eb73": "v6.8-rc6", + "d58bb7e55a8a65894cc02f27c3e2bf9403e7c40f": "v5.10-rc1", "d58e468b1112": "v4.20-rc1", "d59d51f088014f25c2562de59b9abff4f42a7468": "v4.15-rc3", + "d5afb4b47e13161b3f33904d45110f9e6463bad6": "v6.6-rc5", "d5b1a78a772f1e31a94f8babfa964152ec5e9aa5": "v4.5-rc1", "d5e0d0f607a7a029c6563a0470d88255c89a8d11": "v3.9-rc7", "d5f9023fa61ee8b94f37a93f08e94b136cf1e463": "v5.14-rc1", + "d6177a6556f853785867e2ec6d5b7f4906f0d809": "v5.13-rc4", + "d624833f5984d484c5e3196f34b926f9e71dafee": "v5.12-rc8", "d646960f7986fefb460a2b062d5ccc8ccfeacc3a": "v3.3-rc1", "d64696905554e919321e31afc210606653b8f6a4": "v5.14-rc1", "d64a1f574a2957b4bcb06452d36cc1c6bf16e9fc": "v5.3-rc1", @@ -3122,6 +3980,7 @@ "d661684cf6820331feae71146c35da83d794467e": "v3.11", "d66d6c3152e8d5a6db42a56bf7ae1c6cae87ba48": "v4.3-rc1", "d67ae825a59d639e4d8b82413af84d854617a87e": "v4.0-rc1", + "d6a9608af9a75d13243d217f6ce1e30e57d56ffe": "v6.8-rc7", "d6d86830705f173fca6087a3e67ceaf68db80523": "v5.16", "d6de3097592b7ae7f8e233a4dafb088e2aa8170f": "v2.6.25-rc1", "d6ea83ec6864e9297fa8b00ec3dae183413a90e3": "v3.5-rc1", @@ -3129,7 +3988,9 @@ "d6fefa1105dacc8a742cdcf2f4bfb501c9e61349": "v6.3-rc1", "d71fa5c9763c24dd997a2fa4feb7a13a95bab42c": "v5.10-rc1", "d740269867021faf4ce38a449353d2b986c34a67": "v3.8-rc1", + "d75abeec401f8c86b470e7028a13fcdc87e5dd06": "v6.8-rc4", "d76c68109f37cb85b243a1cf0f40313afd2bae68": "v4.15-rc7", + "d76fdd31f953ac5046555171620f2562715e9b71": "v6.8-rc2", "d785a773bed966a75ca1f11d108ae1897189975b": "v5.19-rc6", "d7cce01504a0ccb95b5007d846560cfccbc1947f": "v4.8-rc1", "d80b64ff297e40c2b6f7d7abc1b3eba70d22a068": "v5.6-rc4", @@ -3139,17 +4000,25 @@ "d8316f3991d207fe32881a9ac20241be8fa2bad0": "v3.14", "d839f0811a31322c087a859c2b181e2383daa7be": "v6.3-rc1", "d84f4f992cbd76e8f39c488cf0c5d123843923b1": "v2.6.29-rc1", + "d8536670916a685df116b5c2cb256573fd25e4e3": "v3.7-rc1", "d8647b79c3b7e223ac051439d165bc8e7bbb832f": "v2.6.39-rc1", + "d872ca165cb67112f2841ef9c37d51ef7e63d1e4": "v6.8-rc1", + "d874e6c06952382897d35bf4094193cd44ae91bd": "v5.13-rc5", + "d877550eaf2dc9090d782864c96939397a3c6835": "v6.8-rc4", + "d8792a5734b0f3e58b898c2e2f910bfac48e9ee3": "v6.7-rc5", "d8861bab48b6c1fc3cdbcab8ff9d1eaea43afe7f": "v5.12-rc3", "d88d05a9e0b6d9356e97129d4ff9942d765f46ea": "v5.12-rc4", "d8ba61ba58c88d5207c1ba2f7d9a2280e7d03be9": "v4.16-rc7", "d8e0420603cf1ce9cb459c00ea0b7337de41b968": "v2.6.37-rc1", "d9092f52d7e61dd1557f2db2400ddb430e85937e": "v4.9-rc4", "d920abd1e7c4884f9ecd0749d1921b7ab19ddfbd": "v6.6-rc7", + "d938a8cca88a5f02f523f95fe3d2d1214f4b4a8d": "v6.7-rc1", "d945cb9cce20ac7143c2de8d88b187f62db99bdc": "v2.6.31-rc3", "d94ba80ebbea17f036cecb104398fbcd788aa742": "v3.0-rc1", + "d95f1a542c3df396137afa217ef9bd39cb8931ca": "v5.4-rc1", "d974baa398f34393db76be45f7d4d04fbdbb4a0a": "v3.18-rc1", "d9a871e4a143047d1d84a606772af319f11516f9": "v6.2-rc1", + "d9b45418a91773b7672e4c60037a28074b495c6d": "v5.10-rc1", "d9b8d8e19b073096d3609bbd60f82148d128b555": "v3.10-rc1", "d9d4b1e46d9543a82c23f6df03f4ad697dab361b": "v5.4-rc6", "d9e31d17ceba5f0736f5a34bbc236239cd42b420": "v2.6.35-rc1", @@ -3160,13 +4029,17 @@ "da0342a3aa0357795224e6283df86444e1117168": "v6.0-rc4", "da214a475f8bd1d3e9e7a19ddfeb4d1617551bab": "v5.19-rc1", "da2311a6385c3b499da2ed5d9be59ce331fa93e9": "v5.5-rc3", + "da32b28c95a79e399e18c03f8178f41aec9c66e4": "v5.8-rc6", "da4458bda237aa0cb1688f6c359477f203788f6a": "v2.6.30-rc1", + "da44c340c4fe9d9653ae84fa6a60f406bafcffce": "v6.1-rc1", "da5c0f119203ad9728920456a0f52a6d850c01cd": "v5.18-rc6", "da9065caa594d19b26e1a030fd0cc27bd365d685": "v6.8-rc1", "da99466ac243f15fbba65bd261bfc75ffa1532b6": "v5.3-rc1", "daac07156b330b18eb5071aec4b3ddca1c377f2c": "v5.3-rc5", "dab6cf55f81a6e16b8147aed9a843e1691dcd318": "v3.16-rc7", + "dac501397b9d81e4782232c39f94f4307b137452": "v6.6-rc6", "dad48e73127ba10279ea33e6dbc8d3905c4d31c0": "v4.13-rc1", + "dad555c816a50c6a6a8a86be1f9177673918c647": "v6.8-rc2", "dad5ab0db8deac535d03e3fe3d8f2892173fa6a4": "v4.13-rc2", "dade3f6a1e4e35a5ae916d5e78b3229ec34c78ec": "v6.7-rc7", "db1312dd95488b5e6ff362ff66fcf953a46b1821": "v6.0-rc1", @@ -3182,12 +4055,19 @@ "dbb50887c8f619fc5c3489783ebc3122bc134a31": "v4.8-rc5", "dbbe2ad02e9df26e372f38cc3e70dab9222c832e": "v5.8-rc1", "dbbe9c642411c359ad0a0e32442eb2e11d3811b5": "v5.10-rc1", + "dbc153fd3c142909e564bb256da087e13fbf239c": "v6.8-rc2", "dbcc7d57bffc0c8cac9dac11bec548597d59a6a5": "v5.12-rc4", "dbe245cdf5189e88d680379ed13901356628b650": "v6.5-rc1", "dbe836576f12743a7d2d170ad4ad4fd324c4d47a": "v6.5-rc1", + "dbf4ab821804df071c8b566d9813083125e6d97b": "v6.8-rc1", + "dc07628bd2bbc1da768e265192c28ebd301f509d": "v5.13-rc3", + "dc09ef3562726cd520c8338c1640872a60187af5": "v5.13-rc5", "dc5698e80cf724770283e10414054662bdf6ccfa": "v4.2-rc1", + "dc7eb8755797ed41a0d1b5c0c39df3c8f401b3d9": "v6.8-rc1", "dc99f600698dcac69b8f56dda9a8a00d645c5ffc": "v3.1-rc1", + "dcb4b8ad6a448532d8b681b5d1a7036210b622de": "v5.13-rc4", "dcde237319e626d1ec3c9d8b7613032f0fd4663a": "v5.6-rc3", + "dcfbb67e48a2becfce7990386e985b9c45098ee5": "v6.4-rc1", "dd2283f2605e": "v4.20-rc1", "dd2283f2605e3b3e9c61bcae844b34f2afa4813f": "v4.20-rc1", "dd42bf1197144ede075a9d4793123f7689e164bc": "v4.5-rc1", @@ -3200,33 +4080,47 @@ "dd9cfe236f95bbda9ceb5a4ca419b9fb574c95f9": "v3.12-rc1", "ddbaf13e3609442b64abb931ac21527772d87980": "v2.6.24-rc1", "ddbd89deb7d32b1fbb879f48d68fda1a8ac58e8e": "v5.17-rc6", + "ddd89d0a059d8e9740c75a97e0efe9bf07ee51f9": "v5.8-rc1", "ddf0322db79c5984dc1a1db890f946dd19b7d6d9": "v5.7-rc1", "de1e0c40aceb9d5bff09c3a3b97b2f1b178af53f": "v3.11-rc1", "de53fd7aedb100f03e5d2231cfce0e4993282425": "v5.4-rc1", "de5494af4815a4c9328536c72741229b7de88e7f": "v5.15-rc1", "de5df63228fcfbd5bb7fd883774c18fec9e61f12": "v3.18-rc1", "de76e695a5ce19c121ba7e246b45f258be678a75": "v2.6.19-rc5", + "de8b6e1c231a95abf95ad097b993d34b31458ec9": "v6.8-rc2", + "de959094eb2197636f7c803af0943cb9d3b35804": "v6.8-rc6", "de9f869616dd95e95c00bdd6b0fcd3421e8a4323": "v5.2-rc4", "dea37a97265588da604c6ba80160a287b72c7bfd": "v5.2-rc1", + "debb9df311582c83fe369baa35fa4b92e8a9c58a": "v5.12-rc8", "dec214d00e0d78a08b947d7dccdfdb84407a9f4d": "v4.13-rc1", "ded845a781a578dfb0b5b2c138e5a067aa3b1242": "v4.12-rc1", "ded85b0c0edd8f45fec88783d7555a5b982449c1": "v6.8-rc1", "ded89912156b1a47d940a0c954c43afbabd0c42c": "v4.8-rc7", "dee1f973ca341c266229faa5a1a5bb268bed3531": "v3.7-rc3", + "def689fc26b9a9622d2e2cb0c4933dd3b1c8071c": "v6.8-rc6", + "df1c357f25d808e30b216188330e708e09e1a412": "v6.6-rc3", + "df25461119d987b8c81d232cfe4411e91dcabe66": "v6.8-rc1", "df453700e8d81b1bdafdf684365ee2b9431fb702": "v5.2-rc1", "df4d92549f23e1c037e83323aff58a21b3de7fe0": "v3.19-rc7", + "df77fbd8c5b222c680444801ffd20e8bbc90a56e": "v5.7-rc1", "df7e40425813c50cd252e6f5e348a81ef1acae56": "v4.17-rc1", "df80cd9b28b9ebaa284a41df611dbf3a2d05ca74": "v4.14-rc6", "dfa73c17d55b921e1d4e154976de35317e43a93a": "v6.5-rc7", "dfb4357da6ddbdf57d583ba64361c9d792b0e0b1": "v4.11-rc1", + "dfc7f7a988dad34c3bf4c053124fb26aa6c5f916": "v6.6-rc5", "dfcb9f4f99f1e9a49e43398a7bfbf56927544af1": "v4.11-rc1", "dfd0743f1d9ea76931510ed150334d571fbab49d": "v5.16-rc7", + "dfd2bf436709b2bccb78c2dda550dde93700efa7": "v6.9-rc1", + "dfeae619d781dee61666d5551b93ba3be755a86b": "v3.16-rc1", "e01e3934a1b2d122919f73bc6ddbe1cdafc4bbdb": "v6.8-rc5", "e022c2f07ae52bfbd92faa273db0db2f34eb28e8": "v2.6.29-rc1", + "e02ee89baa66c40e1002cf8b09141fce7265e0f5": "v6.4-rc1", "e02f0d3970404bfea385b6edb86f2d936db0ea2b": "v6.0-rc3", "e03ee2fe873eb68c1f9ba5112fee70303ebf9dfb": "v6.8-rc4", + "e0526ec5360a48ad3ab2e26e802b0532302a7e11": "v6.8-rc3", "e0535ce58b92d7baf0b33284a6c4f8f0338f943e": "v4.11-rc8", "e05df3b115e7308afbca652769b54e4549fcc723": "v3.8-rc1", + "e0652f8bb44d6294eeeac06d703185357f25d50b": "v5.13-rc4", "e088a685eae94a0607b8f7b99949a0e14d748813": "v4.17-rc1", "e09463f220ca9a1a1ecfda84fcda658f99a1f12a": "v4.18-rc4", "e09e28671cda63e6308b31798b997639120e2a21": "v4.12-rc1", @@ -3236,9 +4130,11 @@ "e0c9c0afd2fc958ffa34b697972721d81df8a56f": "v4.1-rc1", "e0cf75deab8155334c8228eb7f097b15127d0a49": "v4.8-rc4", "e0d3bafd02586cfde286c320f56906fd9fa8d256": "v2.6.30-rc1", + "e0e1958f4c365e380b17ccb35617345b31ef7bf3": "v6.8-rc1", "e0e29b683d6784ef59bbc914eac85a04b650e63c": "v3.10-rc6", "e0e3cea46d31d23dc40df0a49a7a2c04fe8edfea": "v3.6-rc3", "e0f911c81e93fc23fe1a4fb0318ff1c3b1c9027f": "v4.15-rc1", + "e102db780e1c14f10c70dafa7684af22a745b51d": "v5.13-rc5", "e11e0455c0d7d3d62276a0c55d9dfbc16779d691": "v3.9-rc7", "e126ba97dba9edeb6fafa3665b5f8497fc9cdf8c": "v3.11-rc1", "e12d7a46f65ae4b7d58a5e0c1cbfa825cf8d830d": "v6.2-rc5", @@ -3246,20 +4142,30 @@ "e13e02a3c68d899169c78d9a18689bd73491d59a": "v2.6.39-rc1", "e149ed2b805fefdccf7ccdfc19eca22fdd4514ac": "v3.19-rc1", "e159332b9af4b04d882dbcfe1bb0117f0a6d4b58": "v3.19-rc3", + "e15d7f2b81d2e7d93115d46fa931b366c1cdebc2": "v5.9-rc1", + "e169bd4fb2b36c4b2bee63c35c740c85daeb2e86": "v6.8-rc2", "e16b859872b87650bb55b12cca5a5fcdc49c1442": "v5.18-rc3", "e192be9d9a30555aae2ca1dc3aad37cba484cd4a": "v4.8-rc1", + "e193b7955dfad68035b983a0011f4ef3590c85eb": "v6.6-rc5", + "e1cd4004cde7c9b694bbdd8def0e02288ee58c74": "v6.6-rc5", "e1eaea46bb4020b38a141b84f88565d4603f8dd0": "v2.6.35-rc1", "e1f32190cf7ddd55778b460e7d44af3f76529698": "v5.5-rc1", "e20cf8d3f1f763ad28a9cb3b41305b8a8a42653e": "v5.0-rc1", + "e22e45fc9e41bf9fcc1e92cfb78eb92786728ef0": "v5.16-rc8", "e230a4455ac3e9b112f0367d1b8e255e141afae0": "v6.0-rc4", + "e230f0c44f011f3270680a506b19b7e84c5e8923": "v5.13-rc1", "e237ec37ec154564f8690c5bd1795339955eeef9": "v3.19-rc3", "e2412c07f8f3040593dfb88207865a3cd58680c0": "v5.2-rc4", "e24c745272072fd2abe55209f1949b7b7ee602a7": "v2.6.33-rc1", "e25a89f743b18c029bfbe5e1663ae0c7190912b0": "v5.18-rc1", "e26b6d39270f5eab0087453d9b544189a38c8564": "v6.8-rc1", + "e26ca4b535820b1445dcef3c0f82b3fb5b45108b": "v5.12-rc1-dontuse", + "e26d3009efda338f19016df4175f354a9bd0a4ab": "v6.4", + "e29c84857e2d51aa017ce04284b962742fb97d9e": "v5.13-rc1", "e2a1256b17b16f9b9adf1b6fea56819e7b68e463": "v5.18-rc2", "e2b19125e94124daaeda1ddcf9b85b04575ad86f": "v2.6.39-rc1", "e2b3b35eb9896f26c98b9a2c047d9111638059a2": "v4.16-rc1", + "e2b54eaf28df0c978626c9736b94f003b523b451": "v6.8-rc7", "e2b706c691905fe78468c361aaabc719d0a496f1": "v6.7-rc4", "e2ca90c276e1fc410d7cd3c1a4eee245ec902a20": "v3.9-rc2", "e2cb6b891ad2b8caa9131e3be70f45243df82a80": "v5.13-rc1", @@ -3276,24 +4182,38 @@ "e37e43a497d5a8b7c0cc1736d56986f432c394c9": "v4.9-rc1", "e39d200fa5bf5b94a0948db0dae44c1b73b84a56": "v4.15-rc5", "e3b914bc7eb6bcecc5b597ee6e31fc40442c291f": "v4.12-rc1", + "e3dfcab2080dc1f9a4b09cc1327361bc2845bfcd": "v6.6-rc1", + "e3f0c638f428fd66b5871154b62706772045f91a": "v6.1-rc6", + "e3f9bed9bee261e3347131764e42aeedf1ffea61": "v6.8-rc2", "e40607cbe270a9e8360907cb1e62ddf0736e4864": "v3.18-rc5", + "e41a962f82e7afb5b1ee644f48ad0b3aee656268": "v5.13-rc1", + "e421946be7d9bf545147bea8419ef8239cb7ca52": "v6.8-rc2", "e4571b8c5e9ffa1e85c0c671995bd4dcc5c75091": "v5.15-rc1", "e461fcb194172b3f709e0b478d2ac1bdac7ab9a3": "v3.11-rc1", "e48354ce078c079996f89d715dfa44814b4eba01": "v3.1-rc1", + "e483bb9a991bdae29a0caa4b3a6d002c968f94aa": "v5.13-rc1", "e494c2f995d6181d6e29c4927d68e0f295ecf75b": "v4.19-rc1", + "e4c72c06c367758a14f227c847f9d623f1994ecf": "v6.0-rc1", + "e4c9062717feda88900b566463228d1c4910af6d": "v5.11-rc1", "e4d4d456436bfb2fe412ee2cd489f7658449b098": "v5.12-rc7", + "e4d8716c3dcec47f1557024add24e1f3c09eb24b": "v5.13-rc4", "e4e38121507a27d2ccc4b28d9e7fc4818a12c44c": "v3.15-rc1", "e4f2379db6c6823c5d4a4c2c912df00c65de51d7": "v3.11-rc1", "e4f3aa2e1e67bb48dfbaaf1cad59013d5a5bc276": "v4.20-rc1", "e50293ef9775c5f1cf3fcc093037dd6a8c5684ea": "v4.4-rc6", "e50b9b9e8610d47b7c22529443e45a16b1ea3a15": "v6.3", "e50e5129f384ae282adebfb561189cdb19b81cee": "v4.13-rc1", + "e53899771a02f798d436655efbd9d4b46c0f9265": "v6.6-rc6", "e5497d766adb92bcbd1fa4a147e188f84f34b20a": "v3.1-rc1", "e54ad7f1ee263ffa5a2de9c609d58dfa27b21cd9": "v4.7-rc3", "e5be15c63804": "v2.6.26-rc1", + "e5cc361e21648b75f935f9571d4003aaee480214": "v5.13-rc4", "e5d82a7360d124ae1a38c2a5eac92ba49b125191": "v5.3-rc1", "e5e884b42639c74b5b57dc277909915c0aefc8bb": "v5.5", + "e5ef93d02d6c9cc3a14e7348481c9e41a528caa1": "v6.6-rc2", "e5ff215941d59f8ae6bf58f6428dc5c26745a612": "v2.6.27-rc1", + "e5ffd1263dd5b44929c676171802e7b6af483f21": "v6.8-rc1", + "e622502c310f1069fd9f41cd38210553115f610a": "v6.8-rc3", "e66eded8309ebf679d3d3c1f5820d1f2ca332c71": "v3.9-rc3", "e677edbcabee849bfdd43f1602bccbecf736a646": "v5.18-rc2", "e682adf021be796940be6cc10c07be7f7398c220": "v3.14-rc1", @@ -3302,36 +4222,49 @@ "e69dbd4619e7674c1679cba49afd9dd9ac347eef": "v5.4-rc1", "e6a21a14106d9718aa4f8e115b1e474888eeba44": "v5.18-rc1", "e6a623460e5fc960ac3ee9f946d3106233fd28d8": "v3.15-rc6", + "e6a7df96facdcf5b1f71eb3ec26f2f9f6ad61e57": "v6.8-rc4", "e6afc8ace6dd5cef5e812f26c72579da8806f5ac": "v4.7-rc1", "e6bd18f57aad1a2d1ef40e646d03ed0f2515c9e3": "v4.6-rc6", "e6cf91b7b47ff82b624bdfe2fdcde32bb52e71dd": "v6.2-rc5", "e6e43b8aa7cd3c3af686caf0c2e11819a886d705": "v6.6-rc4", + "e6f57c6881916df39db7d95981a8ad2b9c3458d6": "v6.8-rc6", "e6f77540c067b48dee10f1e33678415bfcc89017": "v4.14-rc1", "e6f95ec8db312491235b4f06343fbd991a82ce20": "v2.6.35-rc1", + "e70f7a11876a1a788ceadf75e9e5f7af2c868680": "v5.13-rc4", "e72436bc3a5206f95bb384e741154166ddb3202e": "v5.8-rc1", "e756af5b30b008f6ffcfebf8ad0b477f6f225b62": "v3.7-rc1", "e785fa0a164aa11001cba931367c7f94ffaff888": "v4.14-rc2", + "e7870cf13d20f56bfc19f9c3e89707c69cf104ef": "v6.8-rc4", "e7af6307a8a54f0b873960b32b6a644f2d0fbd97": "v5.4-rc7", "e7e0c3e26587749b62d17b9dd0532874186c77f7": "v4.6-rc6", "e7e11f99564222d82f0ce84bd521e57d78a6b678": "v4.11-rc6", + "e7e3a7c35791fe7a70997883fb8ada5866a40f4d": "v6.6-rc1", "e8180dcaa8470ceca21109f143876fdcd9fe050a": "v3.10-rc5", + "e81a7018d93a7de31a3f121c9a7eecd0a5ec58b0": "v5.10-rc1", + "e821d50ab5b956ed0effa49faaf29912fd4106d9": "v6.8-rc1", "e82edcc75c4e2389a3d7223c4ef1737bd9a07e5d": "v5.17-rc1", "e860d2c904d1a9f38a24eb44c9f34b8f915a6ea3": "v4.14-rc1", "e86ee2d44b44056243da17c120ad258717cedf9b": "v4.18-rc1", "e88b2c6e5a4d9ce30d75391e4d950da74bb2bd90": "v5.11", + "e88ed227f639ebcb31ed4e5b88756b47d904584b": "v6.5-rc1", "e89e9cf539a28df7d0eb1d0a545368e9920b34ac": "v2.6.15-rc1", "e8c66efbfe3a2e3cbc573f2474a3d51690f1b857": "v4.20-rc1", "e8d20c3ded59a092532513c9bd030d1ea66f5f44": "v6.3-rc4", "e8d5f92b8d30bb4ade76494490c3c065e12411b1": "v5.10-rc1", "e8ef967a54f401ac5e8637b7f7f8bddb006144c4": "v2.6.29-rc1", + "e95df4ec0c0c9791941f112db699fae794b9862a": "v6.9-rc1", + "e96fddb32931d007db12b1fce9b5e8e4c080401b": "v6.8-rc4", "e97f852fd4561e77721bb9a4e0ea9d98305b1e93": "v4.20-rc5", "e99476497687ef9e850748fe6d232264f30bc8f9": "v6.6-rc1", "e994b2f0fb9229aeff5eea9541320bd7b2ca8714": "v4.4-rc1", "e9b61f19858a5d6c42ce2298cf138279375d0d9b": "v4.5-rc1", "e9be9d5e76e34872f0c37d72e25bc27fe9e2c54c": "v3.18-rc2", + "e9c65989920f7c28775ec4e0c11b483910fb67b8": "v6.6-rc5", "e9c6a182649f4259db704ae15a91ac820e63b0ca": "v3.12-rc6", + "e9d32af478cfc3744a45245c0b126738af4b3ac4": "v5.13-rc1", "e9d8b2c2968499c1f96563e6522c56958d5a1d0d": "v3.15-rc1", "e9da0b56fe27206b49f39805f7dcda8a89379062": "v5.17-rc6", + "e9e006f5fcf2bab59149cb38a48a4817c1b538b4": "v5.4-rc1", "e9f57ebcba563e0cd532926cab83c92bb4d79360": "v4.5-rc1", "ea010070d0a7497253d5a6f919f6dd107450b31a": "v4.20", "ea04efee7635c9120d015dcdeeeb6988130cb67a": "v4.14-rc6", @@ -3341,13 +4274,18 @@ "ea3d7209ca01da209cda6f0dea8be9cc4b7a933b": "v4.5-rc1", "ea4f1009408efb4989a0f139b70fb338e7f687d0": "v6.3-rc7", "ea6789980fdaa610d7eb63602c746bf6ec70cd2b": "v4.14-rc7", + "ea6dd25deeb5b797a145be7f860e3085e7d104c3": "v5.6-rc1", "ea702b80e0bbb2448e201472127288beb82ca2fe": "v3.8-rc3", "ea75080110a4c1fa011b0a73cb8f42227143ee3e": "v5.6-rc2", "ea937f77208323d35ffe2f8d8fc81b00118bfcda": "v6.8-rc1", + "ea941ac294d75d0ace50797aebf0056f6f8f7a7f": "v5.12-rc8", "ea9a4a8b0e5a34eca6613e39d21be879d92ecff5": "v2.6.23-rc1", + "ea9aadc06a9f10ad20a90edc0a484f1147d88a7a": "v5.12-rc8", "ea9b9907b82a09bd1a708004454f7065de77c5b0": "v2.6.26-rc1", + "eaab1d45cdb4bb0c846bd23c3d666d5b90af7b41": "v5.13-rc1", "eab09532d40090698b05a07c1c87f39fdbc5fab5": "v4.13-rc1", "eab098246625e91c1cbd6e8f75b09e4c9c28a9fc": "v5.12-rc1-dontuse", + "eab2404ba798a8efda2a970f44071c3406d94e57": "v5.7-rc1", "eaba3b28401f50e22d64351caa8afe8d29509f27": "v5.12-rc1", "eac616557050737a8d6ef6fe0322d0980ff0ffde": "v5.1-rc1", "ead16e53c2f0ed946d82d4037c630e2f60f4ab69": "v5.3-rc4", @@ -3357,19 +4295,26 @@ "eb1231f73c4d7dc26db55e08c070e6526eaf7ee5": "v5.13-rc1", "eb178619f930fa2ba2348de332a1ff1c66a31424": "v3.8-rc6", "eb4b248e152d3ecf189b9d32c04961360dbd938a": "v4.19-rc1", + "eb50aaf960e3bedfef79063411ffd670da94b84b": "v5.12-rc5", + "eb5555d422d0fc325e1574a7353d3c616f82d8b5": "v6.8-rc7", "eb66ae030829605d61fbef1909ce310e29f78821": "v4.19", "eb6f13eb9f812f5812ed5d14f241309da369dee6": "v2.6.25-rc1", "eb70e5ab8f95a81283623c03d2c99dfc59fcb319": "v3.5-rc1", + "ebb3f994dd92f8fb4d70c7541091216c1e10cb71": "v5.16-rc8", "ebc08a6f47ee76ecad8e9f26c26e6ec9b46ca659": "v2.6.34-rc1", "ebda44da44f6f309d302522b049f43d6f829f7aa": "v6.1-rc2", "ebe48d368e97d007bfeb76fcb065d6cfc4c96645": "v5.17-rc8", "ebe909e0fdb34b980c5cf636c495e4f0bb0dfda8": "v4.3-rc1", + "ebeae8adf89d9a82359f6659b1663d09beec2faa": "v6.8-rc2", + "ebee7885bb12a8fe2c2f9bac87dbd87a05b645f9": "v5.13-rc1", "ebfdfeeae8c01fcb2b3b74ffaf03876e20835d2d": "v5.9-rc1", "ec011fe847347b40c60fdb5085f65227762e2e08": "v3.13-rc1", "ec0223ec48a90cb605244b45f7c62de856403729": "v3.14-rc6", "ec0994e48ea2aebf62ff08376227f3a9ccf46262": "v2.6.34-rc2", "ec0d215f9420564fc8286dcf93d2d068bb53a07e": "v2.6.26-rc9", "ec13b1d6f0a0457312e615335ce8ceb07da50a11": "v4.2-rc1", + "ec185dd3ab257dc2a60953fdf1b6622f524cc5b7": "v5.14-rc5", + "ec32332df7645e0ba463a08d483fe97665167071": "v5.13-rc1", "ec400ddeff200b068ddc6c70f7321f49ecf32ed5": "v3.9-rc1", "ec4eb8a86ade4d22633e1da2a7d85a846b7d1798": "v5.18-rc2", "ec5efe7946280d1e84603389a1030ccec0a767ae": "v3.2-rc1", @@ -3380,6 +4325,7 @@ "ec98ea7070e94cc25a422ec97d1421e28d97b7ee": "v5.12-rc2", "eca94432934fe5f141d084f2e36ee2c0e614cc04": "v5.2", "ecaaab5649781c5a0effdaf298a925063020500e": "v4.15-rc4", + "ecbfb9f118bce49f571675929160e4ecef91cc8a": "v4.8-rc1", "eccb4422cf97a4b0daf97b3f3d68044514fea7bd": "v4.18-rc1", "ecd1735f14d6ac868ae5d8b7a2bf193fa11f388b": "v5.18-rc1", "ecd7918745234e423dd87fcc0c077da557909720": "v3.6-rc7", @@ -3393,12 +4339,14 @@ "ed6473ddc704a2005b9900ca08e236ebb2d8540a": "v4.12-rc1", "ed6fe9d614fc1bca95eb8c0ccd0e92db00ef9d5d": "v3.6-rc5", "ed713e2bc093239ccd380c2ce8ae9e4162f5c037": "v5.19-rc1", + "ed8b94f6e0acd652ce69bd69d678a0c769172df8": "v6.8-rc5", "ed9be64eefe26d7d8b0b5b9fa3ffdf425d87a01f": "v5.12-rc1-dontuse", "eda98796aff0d9bf41094b06811f5def3b4c333c": "v4.4-rc1", "edbd58be15a957f6a760c4a514cd475217eb97fd": "v4.13", "edbe83ab4c27ea6669eb57adb5ed7eaec1118ceb": "v4.1-rc1", "edc4746f253d907d048de680a621e121517f484b": "v5.4-rc3", "edc666e2ff9ec2e4e9510f1127c68c22cffc93f6": "v2.6.19-rc2", + "edcf9725150e42beeca42d085149f4c88fa97afd": "v6.8-rc2", "eddb7732119d53400f48a02536a84c509692faa8": "v5.10-rc1", "edf410cb74dc612fd47ef5be319c5a0bcd6e6ccd": "v5.18", "edfbbf388f293d70bf4b7c0bc38774d05e6f711a": "v3.16-rc3", @@ -3417,30 +4365,42 @@ "ee89cbc2d48150c7c0e9f2aaac00afde99af098c": "v3.1-rc1", "ee8f844e3c5a73b999edf733df1c529d6503ec2f": "v4.11-rc8", "ee9c4e681ec4f58e42a83cb0c22a0289ade1aacf": "v4.12-rc5", + "eea53c5816889ee8b64544fa2e9311a81184ff9c": "v5.13-rc1", "eead1c2ea2509fd754c6da893a94f0e69e83ebe4": "v5.7-rc6", "eeaf06ac1a5584e41cf289f8351e446bb131374b": "v5.1-rc1", "eec04ea119691e65227a97ce53c0da6b9b74b0b7": "v6.7-rc6", "eee5cc2702929fd41cce28058dc6d6717f723f87": "v3.13-rc1", + "eef00a82c568944f113f2de738156ac591bbd5cd": "v6.8-rc4", + "eef5c7b28dbecd6b141987a96db6c54e49828102": "v6.8-rc6", "ef0579b64e93188710d48667cb5e014926af9f1b": "v4.11-rc8", + "ef20cd4dd1633987bcf46ac34ace2c8af212361f": "v4.9-rc1", "ef299cc3fa1a9e1288665a9fdc8bff55629fd359": "v5.6", "ef2b02d3e617cb0400eedf2668f86215e1b0e6af": "v2.6.23-rc7", "ef3313e84acbf349caecae942ab3ab731471f1a1": "v3.9-rc7", "ef38de9217a04c9077629a24652689d8fdb4c6c6": "v5.18-rc5", "ef61eb43ada6c1d6b94668f0f514e4c268093ff3": "v5.1", + "ef67963dac255b293e19815ea3d440567be4626f": "v5.7-rc4", "ef834f7836ec0502f49f20bbc42f1240577a9c83": "v3.18-rc1", "ef85b67385436ddc1998f45f1d6a210f935b3388": "v4.10-rc1", + "ef85bb582c41524e9e68dfdbde48e519dac4ab3d": "v5.13-rc1", "ef87dbe7614341c2e7bfe8d32fcb7028cc97442c": "v3.15-rc5", "efa56305908ba20de2104f1b8508c6a7401833be": "v6.8-rc1", + "efa7df3e3bb5da8e6abbe37727417f32a37fba47": "v6.7", "efa9ace68e487ddd29c2b4d6dd23242158f1f607": "v5.3-rc1", "efc644048ecde54f016011fe10110addd0de348f": "v4.4-rc1", "efe4186e6a1b54bf38b9e05450d43b0da1fd7739": "v5.17-rc6", + "efe68c1ca8f49e8c06afd74b699411bfbb8ba1ff": "v5.8-rc1", + "efe7cf828039aedb297c1f9920b638fffee6aabc": "v6.8-rc5", "efeb7dfea8ee10cdec11b6b6ba4e405edbe75809": "v6.8-rc1", + "efed9a3337e341bd0989161b97453b52567bc59d": "v5.13-rc2", "eff73de2b1600ad8230692f00bc0ab49b166512a": "v5.3-rc1", + "eff9704f5332a13b08fbdbe0f84059c9e7051d5f": "v6.8-rc1", "effda4dd97e878ab83336bec7411cc41b5cc6d37": "v5.2-rc1", "f00432063db1a0db484e85193eccc6845435b80e": "v5.18-rc2", "f00cdc6df7d7cfcabb5b740911e6788cb0802bdb": "v3.16-rc3", "f024ee098476a3e620232e4a78cfac505f121245": "v4.8-rc1", "f026bc29a8e093edfbb2a77700454b285c97e8ad": "v4.14-rc1", + "f02d4086a8f36a0e1aaebf559b54cf24a177a486": "v5.13-rc1", "f043bfc98c193c284e2cd768fefabe18ac2fed9b": "v4.14-rc5", "f04d51404f51947d3feabf2518495ba5aa3bb2c4": "v3.11-rc1", "f05819df10d7b09f6d1eb6f8534a8f68e5a4fe61": "v4.3-rc7", @@ -3449,10 +4409,12 @@ "f09444639099584bc4784dfcd85ada67c6f33e0f": "v4.11-rc1", "f0992098cadb4c9c6a00703b66cafe604e178fea": "v5.10-rc7", "f0a96d1aafd8964e1f9955c830a3e5cb3c60a90f": "v6.4-rc3", + "f0b3d338064e1fe7531f0d2977e35f3b334abfb4": "v5.13-rc4", "f0c3b5093addc8bfe9fe3a5b01acb7ec7969eafa": "v3.11-rc1", "f0d1762554014ce0ae347b9f0d088f2c157c8c72": "v5.1-rc4", "f0d1bec9d58d4c038d0ac958c9af82be6eb18045": "v3.16-rc1", "f0ec1aaf54caddd21c259aea8b2ecfbde4ee4fb9": "v2.6.19-rc4", + "f0eee815babed70a749d2496a7678be5b45b4c14": "v6.6-rc6", "f106eee10038c2ee5b6056aaf3f6d5229be6dcdd": "v2.6.35-rc1", "f1082dd31fe461d482d69da2a8eccfeb7bf07ac2": "v5.18-rc1", "f1174f77b50c94eecaa658fdc56fa69b421de4b8": "v4.14-rc1", @@ -3467,13 +4429,20 @@ "f19b00da8ed37db4e3891fe534fcf3a605a0e562": "v3.10-rc1", "f19d5870cbf72d4cb2a8e1f749dff97af99b071e": "v3.8-rc1", "f1a411873c85b642f13b01f21b534c2bab81fc1b": "v6.4-rc6", + "f1acb109505d983779bbb7e20a1ee6244d2b5736": "v6.8-rc5", + "f1c6366e304328de301be362eca905a3503ff33b": "v5.11-rc1", + "f1cb8f9beba8699dd1b4518418191499e53f7b17": "v4.18-rc1", "f1ce3986baa62cffc3c5be156994de87524bab99": "v5.13-rc1", + "f1d95df0f31048f1c59092648997686e3f7d9478": "v6.6-rc3", "f1e255d60ae66a9f672ff9a207ee6cd8e33d2679": "v4.18-rc5", "f227e3ec3b5cad859ad15666874405e8c1bbc1d4": "v5.8", "f232326f6966cf2a1d1db7bc917a4ce5f9f55f76": "v5.12-rc5", "f26967b9f7a830e228bb13fb41bd516ddd9d789d": "v5.19-rc1", "f2815633504b442ca0b0605c16bf3d88a3a0fcea": "v3.9-rc4", + "f285dfb98562e8380101095d168910df1d07d8be": "v5.12-rc1-dontuse", "f28cd2af22a0c134e4aa1c64a70f70d815d473fb": "v5.1-rc4", + "f2a772c51206b0c3f262e4f6a3812c89a650191b": "v5.13-rc4", + "f2c7ef3ba9556d62a7e2bb23b563c6510007d55c": "v5.11-rc3", "f2d67fec0b43edce8c416101cdc52e71145b5fef": "v5.7-rc1", "f2e323ec96077642d397bb1c355def536d489d16": "v3.18-rc1", "f2e5ddcc0d12f9c4c7b254358ad245c9dddce13b": "v3.12-rc7", @@ -3486,12 +4455,14 @@ "f31a9f7c71691569359fa7fb8b0acaa44bce0324": "v3.17-rc1", "f3277cbfba763cd2826396521b9296de67cf1bbc": "v5.10-rc1", "f342de4e2f33e0e39165d8639387aa6c19dff660": "v6.8-rc2", + "f34e8bb7d6c6626933fe993e03ed59ae85e16abb": "v6.9-rc2", "f3554aeb991214cbfafd17d55e2bfddb50282e32": "v5.3-rc1", "f3747379accba8e95d70cec0eae0582c8c182050": "v3.19-rc6", "f384796c40dc55b3dba25e0ee9c1afd98c6d24d1": "v4.17-rc1", "f38a7b75267f1fb240a8178cbcb16d66dd37aac8": "v4.16-rc1", "f3951a3709ff50990bf3e188c27d346792103432": "v4.4-rc1", "f3a2181e16f1dcbf5446ed43f6b5d9f56c459f85": "v5.6-rc1", + "f3a95075549e0e5c36db922caf86847db7a35403": "v5.13-rc1", "f3b59291a69d0b734be1fc8be489fef2dd846d3d": "v3.8-rc1", "f3d3342602f8bcbf37d7c46641cb9bca7618eb1c": "v3.13-rc1", "f3e775962ccbc62bd93f2200b82db88af05d0137": "v3.17-rc1", @@ -3500,12 +4471,16 @@ "f4124500c2c13eb1208c6143b3f6d469709dea10": "v3.15-rc1", "f428fe4a04cc339166c8bbd489789760de3a0cee": "v4.15-rc8", "f4351a199cc120ff9d59e06d02e8657d08e6cc46": "v5.0-rc2", + "f4384b3e54ea813868bb81a861bf5b2406e15d8f": "v6.6-rc6", + "f43b941fd61003659a3f0e039595e5e525917aa8": "v5.13-rc1", "f43bfaeddc79effbf3d0fcb53ca477cca66f3db8": "v4.6-rc5", "f43f39958beb206b53292801e216d9b8a660f087": "v4.20-rc3", "f443fd5af5dbd531f880d3645d5dd36976cf087f": "v6.5-rc6", "f44d04e696feaf13d192d942c4f14ad2e117065a": "v5.9-rc5", "f458d039db7e8518041db4169d657407e3217008": "v5.6-rc1", "f45db2b909c7e76f35850e78f017221f30282b8e": "v5.8-rc1", + "f46c8a75263f97bda13c739ba1c90aced0d3b071": "v6.8-rc1", + "f4713a3dfad045d46afcb9c2a7d0bba288920ed4": "v3.18-rc7", "f484a794e4ee2a9ce61f52a78e810ac45f3fe3b3": "v6.2-rc6", "f48da8b14d04ca87ffcffe68829afd45f926ec6a": "v3.18-rc3", "f48e91e87e67b56bef63393d1a02c6e22c1d7078": "v4.12-rc2", @@ -3516,14 +4491,18 @@ "f538d4da8d521746ca5ebf8c1a8105eb49bfb45e": "v2.6.15-rc1", "f53dc67c5e7babafe239b93a11678b0e05bead51": "v2.6.25-rc1", "f5449e74802c1112dea984aec8af7a33c4516af1": "v5.10-rc1", + "f546c4282673497a06ecb6190b50ae7f6c85b02f": "v6.8-rc2", "f54e18f1b831c92f6512d2eedb224cd63d607d3d": "v3.19-rc1", "f5527fffff3f002b0a6b376163613b82f69de073": "v4.9-rc7", "f5563318ff1bde15b10e736e97ffce13be08bc1a": "v3.12-rc7", "f56e65dff6ad52395ef45738799b4fb70ff43376": "v5.10-rc1", "f5a2b3ffb7af4b6ae5b905850a1a6bad82b268b9": "v5.3-rc1", "f5bbbbe4d63577026f908a809f22f5fd5a90ea1f": "v4.19-rc1", + "f5c24d94512f1b288262beda4d3dcb9629222fc7": "v6.8-rc1", "f5c779b7ddbda30866cf2a27c63e34158f858c73": "v6.4-rc1", + "f5c7e8425f18fdb9bdb7d13340651d7876890329": "v5.13-rc2", "f5cb779ba16334b45ba8946d6bfa6d9834d1527f": "v4.16-rc1", + "f5dcccd647da513a89f3b6ca392b0c1eb050b9fc": "v5.13-rc1", "f5e81d1117501546b7be050c5fbafa6efd2c722c": "v5.14-rc4", "f5ea110044fa858925a880b4fa9f551bfa2dfc38": "v3.10-rc1", "f60a85cad677c4f9bb4cadd764f1d106c38c7cf8": "v5.12-rc5", @@ -3535,7 +4514,10 @@ "f644bc449b37cc32d3ce7b36a88073873aa21bd5": "v5.13-rc7", "f647d7c155f069c1a068030255c300663516420e": "v3.19-rc1", "f6505fbabc426b9e293da5bb702ace2eb1ccf87d": "v4.2-rc1", + "f6564fce256a3944aa1bc76cb3c40e792d97c1eb": "v6.8-rc3", "f65886606c2d3b562716de030706dfe1bea4ed5e": "v5.9-rc5", + "f67055780caac6a99f43834795c43acf99eba6a6": "v2.6.17-rc1", + "f6789593d5cea42a4ecb1cbeab6a23ade5ebbba7": "v3.16", "f67b15037a7a50c57f72e69a6d59941ad90a0f0f": "v4.16", "f680b6e6062e": "v6.2-rc1", "f69bcbf3b4c4b333dcd7a48eaf868bf0c88edab5": "v3.13-rc1", @@ -3555,11 +4537,14 @@ "f718863aca469a109895cb855e6b81fff4827d71": "v6.5-rc4", "f71f01394f742fc4558b3f9f4c7ef4c4cf3b07c8": "v5.18-rc6", "f7464060f7ab9a2424428008f0ee9f1e267e410f": "v5.15-rc1", + "f74a7afc224acd5e922c7a2e52244d891bbe44ee": "v6.6-rc6", "f753a68980cf4b59a80fe677619da2b1804f526d": "v6.2-rc8", + "f77bd544a6bbe69aa50d9ed09f13494cf36ff806": "v5.13-rc1", "f78146b0f9230765c6315b2e14f56112513389ad": "v3.5-rc1", "f79643787e0a0762d2409b7b8334e83f22d85695": "v5.10-rc5", "f7a1337f0d29b98733c8824e165fca3371d7d4fd": "v5.4-rc7", "f7d8a19f9a056a05c5c509fa65af472a322abfee": "v5.15-rc7", + "f7e6b19bc76471ba03725fe58e0c218a3d6266c3": "v5.9-rc1", "f7ed45be3ba524e06a6d933f0517dc7ad2d06703": "v3.9-rc1", "f81f5b2db8692ff1d2d5f4db1fde58e67aa976a3": "v4.9-rc1", "f83baa0cb6cfc92ebaf7f9d3a99d7e34f2e77a8a": "v5.16-rc5", @@ -3568,8 +4553,10 @@ "f856567b930dfcdbc3323261bf77240ccdde01f5": "v3.12", "f85daf0e725358be78dfd208dea5fd665d8cb901": "v5.19-rc8", "f87904c075515f3e1d8f4a7115869d3b914674fd": "v6.0-rc3", + "f88359e1588b85cf0e8209ab7d6620085f3441d9": "v5.13-rc1", "f88649721268999bdff09777847080a52004f691": "v3.16-rc3", "f88814cc2578c121e6edef686365036db72af0ed": "v5.8-rc7", + "f88d8ea67fbdbac7a64bfa6ed9a2ba27bb822f74": "v5.3-rc1", "f88eb7c0d002a67ef31aeb7850b42ff69abc46dc": "v5.4-rc2", "f8942e07a3db9d82e8fb11d3d494876b8bae9ff9": "v2.6.37-rc1", "f8a00cef17206ecd1b30d3d9f99e10d9fa707aa7": "v4.19-rc7", @@ -3578,12 +4565,17 @@ "f90cf6079bf67988f8b1ad1ade70fc89d0080905": "v5.10-rc1", "f91072ed1b7283b13ca57fcfbece5a3b92726143": "v5.10-rc1", "f92363d12359498f9a9960511de1a550f0ec41c2": "v3.8-rc1", + "f93e71aea6c60ebff8adbd8941e678302d377869": "v6.7", "f94b47c6bde624d6c07f43054087607c52054a95": "v5.19-rc1", + "f94fd25cb0aaf77fd7453f31c5d394a1a68ecf60": "v5.19-rc1", "f95bdb700bc6bb74e1199b1f5f90c613e152cfa7": "v6.4-rc1", "f980f9c31a923e9040dee0bc679a5f5b09e61f40": "v5.10-rc1", + "f98364e926626c678fb4b9004b75cacf92ff0662": "v6.9-rc1", + "f990874b1c98fe8e57ee9385669f501822979258": "v6.6-rc6", "f991af3daabaecff34684fd51fac80319d1baad1": "v4.13-rc1", "f9929ef6a2a55f03aac61248c6a3a987b8546f2a": "v5.17-rc4", "f9b62f9843c7b0afdaecabbcebf1dbba18599408": "v6.1-rc8", + "f9baa501b4fd6962257853d46ddffbc21f27e344": "v5.13-rc2", "f9bf6c03eca1077cae8de0e6d86427656fa42a9b": "v6.1-rc1", "f9d87929d451d3e649699d0f1d74f71f77ad38f5": "v5.17-rc2", "fa00c437eef8dc2e7b25f8cd868cfa405fcc2bb3": "v4.8-rc3", @@ -3593,19 +4585,27 @@ "fa3a5a1880c91bb92594ad42dfe9eedad7996b86": "v5.4-rc8", "fa3d315a4ce2c0891cdde262562e710d95fba19e": "v3.0-rc1", "fa40d9734a57bcbfa79a280189799f76c88f7bb0": "v5.15", + "fa5492ee89463a7590a1449358002ff7ef63529f": "v6.8-rc1", + "fa765c4b4aed2d64266b694520ecb025c862c5a9": "v6.8-rc5", + "fa7e6abc75f3d491bc561734312d065dc9dc2a77": "v5.13-rc3", "fa7f517cb26eb1a1a1f0baffcced39f6c3ec3337": "v3.16-rc1", "fa8c269353d560b7c28119ad7617029f92e40b15": "v4.4-rc1", "faa775c41d655a4786e9d53cb075a77bb5a75f66": "v5.16-rc1", + "faaf05b00aecdb347ffd1d763d024394ec0329f8": "v5.10-rc1", "faaf946a7d5b79194358437150f34ab4c66bfe21": "v3.6-rc1", "fac35ba763ed07ba93154c95ffc0c4a55023707f": "v6.1-rc1", "fac8e0f579695a3ecbc4d3cac369139d7f819971": "v4.6-rc1", "fb09692e71f13af7298eb603a1975850b1c7a8d8": "v3.9-rc1", "fb18802a338b36f675a388fc03d2aa504a0d0899": "v5.12-rc1-dontuse", + "fb1a79a6b6e1223ddb18f12aa35e36f832da2290": "v5.14-rc1", "fb1d9738ca053ea8afa5e86af6463155f983b01c": "v2.6.33-rc1", "fb24771faf72a2fd62b3b6287af3c610c3ec9cf1": "v6.0-rc1", + "fb3bd914b3ec28f5fb697ac55c4846ac2d542855": "v6.5-rc6", "fb4554c2232e44d595920f4d5c66cf8f7d13f9bc": "v5.18", + "fb5a4315591dae307a65fc246ca80b5159d296e1": "v6.6-rc1", "fb5be6a7b4863ecc44963bb80ca614584b6c7817": "v5.4-rc7", "fb73974172ffaaf57a7c42f35424d9aece1a5af6": "v5.7-rc4", + "fb7516d42478ebc8e2f00efb76ef96f7b68fd8d3": "v4.16-rc1", "fb9987d0f748c983bb795a86f47522313f701a08": "v2.6.35-rc1", "fbd40ea0180a2d328c5adc61414dc8bab9335ce2": "v4.6-rc1", "fbe0e839d1e22d88810f3ee3e2f1479be4c0aa4a": "v4.15-rc9", @@ -3625,14 +4625,17 @@ "fc739a058d99c9297ef6bfd923b809d85855b9a9": "v5.4-rc3", "fc9bbca8f650e5f738af8806317c0a041a48ae4a": "v3.9-rc8", "fcb323cc53e29d9cc696d606bb42736b32dd9825": "v5.5-rc1", + "fcb3635f5018e53024c6be3c3213737f469f74ff": "v5.14-rc1", "fcb48454c23c5679d1a2e252f127642e91b05cbe": "v5.10-rc5", "fcd91dd449867c6bfe56a81cabba76b829fd05cd": "v4.9-rc4", "fcd95807fb61e67d602610e7ff7129ed769e9fee": "v2.6.35-rc1", "fcdf445ff42f036d22178b49cf64e92d527c1330": "v5.3-rc1", "fce466eab7ac6baa9d2dcd88abcf945be3d4a089": "v4.19-rc1", + "fcf6b1b729bcd23f2b49a84fb33ffbb44712ee6a": "v3.18-rc2", "fd0815f632c24878e325821943edccc7fde947a2": "v6.3-rc3", "fd19a3d195be23e8d9d0d66576b96ea25eea8323": "v4.3-rc1", "fd19d3b45164466a4adce7cbff448ba9189e1427": "v4.14-rc5", + "fd261ce6a30e01ad67c416e2c67e263024b3a6f9": "v5.1-rc1", "fd3040b9394c58bcedb83554bcf1a073021d6b36": "v5.19-rc1", "fd31f3996af2": "v6.0-rc1", "fd3858554b62c3af6b7664b5c58ad864c87116c9": "v2.6.19-rc1", @@ -3648,26 +4651,40 @@ "fdf5af0daf8019cec2396cdef8fb042d80fe71fa": "v3.3-rc1", "fdf7cb4185b60c68e1a75e61691c4afdc15dea0e": "v4.14-rc6", "fdf82a7856b32d905c39afc85e34364491e46346": "v4.19-rc1", + "fdf87a0dc26d0550c60edc911cda42f9afec3557": "v6.8-rc6", + "fdfa083549de5d50ebf7f6811f33757781e838c0": "v6.8-rc6", + "fe0a7776d4d19e613bb8dd80fe2d78ae49e8b49d": "v6.8-rc1", + "fe3fccde8870764ba3e60610774bd7bc9f8faeff": "v5.13-rc1", "fe415186b43df0db1f17fa3a46275fd92107fe71": "v5.16-rc7", "fe685aabf7c8c9f138e5ea900954d295bf229175": "v3.6-rc1", + "fe752331d4b361d43cfd0b89534b4b2176057c32": "v6.8-rc4", "fe77ba6f4f97690baa4c756611a07f3cc033f6ae": "v2.6.13-rc1", "fe8222406c8277a21172479d3a8283d31c209028": "v2.6.38-rc1", "fe9c842695e26d8116b61b80bfb905356f07834b": "v4.16-rc3", + "fe9f801355f0b47668419f30f1fac1cf4539e736": "v6.8-rc7", + "fec356a61aa3d3a66416b4321f1279e09e0f256f": "v5.13-rc3", "fecf31ee395b0295f2d7260aa29946b7605f7c85": "v5.19-rc1", "fed1755b118147721f2c87b37b9d66e62c39b668": "v5.11-rc1", "fee060cd52d69c114b62d1a2948ea9648b5131f9": "v5.19-rc1", + "fee3ff99bc67604fba77f19da0106f3ec52b1956": "v5.13-rc1", "ff002b30181d30cdfbca316dadd099c3ca0d739c": "v5.6-rc2", "ff05d4b45dd89b922578dac497dcabf57cf771c6": "v6.1-rc1", "ff0a3a7d52ff7282dbd183e7fc29a1fe386b0c30": "v6.5-rc1", "ff2047fb755d4415ec3c70ac799889371151796d": "v5.12-rc1-dontuse", "ff2bb89335daec6053b5ac778369f7f72b931142": "v4.7-rc1", "ff33299ec8bb80cdcc073ad9c506bd79bb2ed20b": "v6.6-rc1", + "ff36b0d953dc4cbc40a72945920ff8e805f1b0da": "v5.12-rc1-dontuse", + "ff40e51043af63715ab413995ff46996ecf9583f": "v5.13-rc5", "ff4dd73dd2b4806419f8ff65cbce11d5019548d0": "v4.11-rc1", + "ff67dbd554b2aaa22be933eced32610ff90209dd": "v5.13-rc3", "ff8376ade4f668130385839cef586a0990f8ef87": "v5.18-rc1", "ffa0160a103917defd5d9c097ae0455a59166e03": "v4.5-rc1", + "ffa1bf97425bd511b105ce769976e20a845a71e9": "v5.12-rc1-dontuse", + "ffb76a86f8096a8206be03b14adda6092e18e275": "v5.16-rc7", "ffc8b30866879ed9ba62bd0a86fecdbd51cd3d19": "v3.11-rc1", "ffd980f976e7fd666c2e61bf8ab35107efd11828": "v2.6.25-rc1", "ffdde5932042600c6807d46c1550b28b0db6a3bc": "v5.5-rc1", "ffe2a22562444720b05bdfeb999c03e810d84cbb": "v6.2-rc7", + "fff1f3001cc58b5064a0f1154a7ac09b76f29c44": "v4.4-rc1", "fffb0b52d5258554c645c966c6cbef7de50b851d": "v6.3-rc7" } \ No newline at end of file diff --git a/data/kernel_cves.json b/data/kernel_cves.json index ff2436f7d..28c64342b 100644 --- a/data/kernel_cves.json +++ b/data/kernel_cves.json @@ -52999,6 +52999,40 @@ "Ubuntu": "https://ubuntu.com/security/CVE-2019-25045" } }, + "CVE-2019-25160": { + "affected_versions": "v2.6.19-rc1 to v5.0", + "breaks": "446fda4f26822b2d42ab3396aafcedf38a9ff2b6", + "cmt_msg": "netlabel: fix out-of-bounds memory accesses", + "fixes": "5578de4834fe0f2a34fedc7374be691443396d1f", + "last_affected_version": "5.-1", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetlabel: fix out-of-bounds memory accesses\n\nThere are two array out-of-bounds memory accesses, one in\ncipso_v4_map_lvl_valid(), the other in netlbl_bitmap_walk(). Both\nerrors are embarassingly simple, and the fixes are straightforward.\n\nAs a FYI for anyone backporting this patch to kernels prior to v4.8,\nyou'll want to apply the netlbl_bitmap_walk() patch to\ncipso_v4_bitmap_walk() as netlbl_bitmap_walk() doesn't exist before\nLinux v4.8.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2019-25160", + "ExploitDB": "https://www.exploit-db.com/search?cve=2019-25160", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2019-25160", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2019-25160", + "SUSE": "https://www.suse.com/security/cve/CVE-2019-25160", + "Ubuntu": "https://ubuntu.com/security/CVE-2019-25160" + } + }, + "CVE-2019-25162": { + "affected_versions": "v4.3-rc1 to v6.0-rc1", + "breaks": "611e12ea0f121a31d9e9c4ce2a18a77abc2f28d6", + "cmt_msg": "i2c: Fix a potential use after free", + "fixes": "e4c72c06c367758a14f227c847f9d623f1994ecf", + "last_affected_version": "5.18.17", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\ni2c: Fix a potential use after free\n\nFree the adap structure only after we are done using it.\nThis patch just moves the put_device() down a bit to avoid the\nuse after free.\n\n[wsa: added comment to the code, added Fixes tag]", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2019-25162", + "ExploitDB": "https://www.exploit-db.com/search?cve=2019-25162", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2019-25162", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2019-25162", + "SUSE": "https://www.suse.com/security/cve/CVE-2019-25162", + "Ubuntu": "https://ubuntu.com/security/CVE-2019-25162" + } + }, "CVE-2019-3016": { "affected_versions": "v4.10-rc1 to v5.6-rc1", "breaks": "0b9f6c4615c993d2b552e0d2bd1ade49b56e5beb", @@ -62201,6 +62235,227 @@ "Ubuntu": "https://ubuntu.com/security/CVE-2020-36766" } }, + "CVE-2020-36775": { + "affected_versions": "v2.6.12-rc2 to v5.7-rc1", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "f2fs: fix to avoid potential deadlock", + "fixes": "df77fbd8c5b222c680444801ffd20e8bbc90a56e", + "last_affected_version": "5.6.6", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nf2fs: fix to avoid potential deadlock\n\nUsing f2fs_trylock_op() in f2fs_write_compressed_pages() to avoid potential\ndeadlock like we did in f2fs_write_single_data_page().", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2020-36775", + "ExploitDB": "https://www.exploit-db.com/search?cve=2020-36775", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2020-36775", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2020-36775", + "SUSE": "https://www.suse.com/security/cve/CVE-2020-36775", + "Ubuntu": "https://ubuntu.com/security/CVE-2020-36775" + } + }, + "CVE-2020-36776": { + "affected_versions": "v5.8-rc4 to v5.13-rc1", + "breaks": "371a3bc79c11b707d7a1b7a2c938dc3cc042fffb", + "cmt_msg": "thermal/drivers/cpufreq_cooling: Fix slab OOB issue", + "fixes": "34ab17cc6c2c1ac93d7e5d53bb972df9a968f085", + "last_affected_version": "5.12.2", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nthermal/drivers/cpufreq_cooling: Fix slab OOB issue\n\nSlab OOB issue is scanned by KASAN in cpu_power_to_freq().\nIf power is limited below the power of OPP0 in EM table,\nit will cause slab out-of-bound issue with negative array\nindex.\n\nReturn the lowest frequency if limited power cannot found\na suitable OPP in EM table to fix this issue.\n\nBacktrace:\n[] die+0x104/0x5ac\n[] bug_handler+0x64/0xd0\n[] brk_handler+0x160/0x258\n[] do_debug_exception+0x248/0x3f0\n[] el1_dbg+0x14/0xbc\n[] __kasan_report+0x1dc/0x1e0\n[] kasan_report+0x10/0x20\n[] __asan_report_load8_noabort+0x18/0x28\n[] cpufreq_power2state+0x180/0x43c\n[] power_actor_set_power+0x114/0x1d4\n[] allocate_power+0xaec/0xde0\n[] power_allocator_throttle+0x3ec/0x5a4\n[] handle_thermal_trip+0x160/0x294\n[] thermal_zone_device_check+0xe4/0x154\n[] process_one_work+0x5e4/0xe28\n[] worker_thread+0xa4c/0xfac\n[] kthread+0x33c/0x358\n[] ret_from_fork+0xc/0x18", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2020-36776", + "ExploitDB": "https://www.exploit-db.com/search?cve=2020-36776", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2020-36776", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2020-36776", + "SUSE": "https://www.suse.com/security/cve/CVE-2020-36776", + "Ubuntu": "https://ubuntu.com/security/CVE-2020-36776" + } + }, + "CVE-2020-36777": { + "affected_versions": "v4.5-rc1 to v5.13-rc1", + "breaks": "0230d60e4661d9ced6fb0b9a30f182ebdafbba7a", + "cmt_msg": "media: dvbdev: Fix memory leak in dvb_media_device_free()", + "fixes": "bf9a40ae8d722f281a2721779595d6df1c33a0bf", + "last_affected_version": "5.12.2", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: dvbdev: Fix memory leak in dvb_media_device_free()\n\ndvb_media_device_free() is leaking memory. Free `dvbdev->adapter->conn`\nbefore setting it to NULL, as documented in include/media/media-device.h:\n\"The media_entity instance itself must be freed explicitly by the driver\nif required.\"", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2020-36777", + "ExploitDB": "https://www.exploit-db.com/search?cve=2020-36777", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2020-36777", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2020-36777", + "SUSE": "https://www.suse.com/security/cve/CVE-2020-36777", + "Ubuntu": "https://ubuntu.com/security/CVE-2020-36777" + } + }, + "CVE-2020-36778": { + "affected_versions": "v5.6-rc1 to v5.13-rc1", + "breaks": "10b17004a74c384c6f410af355b0d6d7a168f613", + "cmt_msg": "i2c: xiic: fix reference leak when pm_runtime_get_sync fails", + "fixes": "a85c5c7a3aa8041777ff691400b4046e56149fd3", + "last_affected_version": "5.12.3", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\ni2c: xiic: fix reference leak when pm_runtime_get_sync fails\n\nThe PM reference count is not expected to be incremented on\nreturn in xiic_xfer and xiic_i2c_remove.\n\nHowever, pm_runtime_get_sync will increment the PM reference\ncount even failed. Forgetting to putting operation will result\nin a reference leak here.\n\nReplace it with pm_runtime_resume_and_get to keep usage\ncounter balanced.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2020-36778", + "ExploitDB": "https://www.exploit-db.com/search?cve=2020-36778", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2020-36778", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2020-36778", + "SUSE": "https://www.suse.com/security/cve/CVE-2020-36778", + "Ubuntu": "https://ubuntu.com/security/CVE-2020-36778" + } + }, + "CVE-2020-36779": { + "affected_versions": "v5.6-rc1 to v5.13-rc1", + "breaks": "ea6dd25deeb5b797a145be7f860e3085e7d104c3", + "cmt_msg": "i2c: stm32f7: fix reference leak when pm_runtime_get_sync fails", + "fixes": "2c662660ce2bd3b09dae21a9a9ac9395e1e6c00b", + "last_affected_version": "5.12.3", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\ni2c: stm32f7: fix reference leak when pm_runtime_get_sync fails\n\nThe PM reference count is not expected to be incremented on\nreturn in these stm32f7_i2c_xx serious functions.\n\nHowever, pm_runtime_get_sync will increment the PM reference\ncount even failed. Forgetting to putting operation will result\nin a reference leak here.\n\nReplace it with pm_runtime_resume_and_get to keep usage\ncounter balanced.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2020-36779", + "ExploitDB": "https://www.exploit-db.com/search?cve=2020-36779", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2020-36779", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2020-36779", + "SUSE": "https://www.suse.com/security/cve/CVE-2020-36779", + "Ubuntu": "https://ubuntu.com/security/CVE-2020-36779" + } + }, + "CVE-2020-36780": { + "affected_versions": "unk to v5.13-rc1", + "breaks": "", + "cmt_msg": "i2c: sprd: fix reference leak when pm_runtime_get_sync fails", + "fixes": "3a4f326463117cee3adcb72999ca34a9aaafda93", + "last_affected_version": "5.12.3", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\ni2c: sprd: fix reference leak when pm_runtime_get_sync fails\n\nThe PM reference count is not expected to be incremented on\nreturn in sprd_i2c_master_xfer() and sprd_i2c_remove().\n\nHowever, pm_runtime_get_sync will increment the PM reference\ncount even failed. Forgetting to putting operation will result\nin a reference leak here.\n\nReplace it with pm_runtime_resume_and_get to keep usage\ncounter balanced.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2020-36780", + "ExploitDB": "https://www.exploit-db.com/search?cve=2020-36780", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2020-36780", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2020-36780", + "SUSE": "https://www.suse.com/security/cve/CVE-2020-36780", + "Ubuntu": "https://ubuntu.com/security/CVE-2020-36780" + } + }, + "CVE-2020-36781": { + "affected_versions": "unk to v5.13-rc1", + "breaks": "", + "cmt_msg": "i2c: imx: fix reference leak when pm_runtime_get_sync fails", + "fixes": "47ff617217ca6a13194fcb35c6c3a0c57c080693", + "last_affected_version": "5.12.3", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\ni2c: imx: fix reference leak when pm_runtime_get_sync fails\n\nIn i2c_imx_xfer() and i2c_imx_remove(), the pm reference count\nis not expected to be incremented on return.\n\nHowever, pm_runtime_get_sync will increment pm reference count\neven failed. Forgetting to putting operation will result in a\nreference leak here.\n\nReplace it with pm_runtime_resume_and_get to keep usage\ncounter balanced.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2020-36781", + "ExploitDB": "https://www.exploit-db.com/search?cve=2020-36781", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2020-36781", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2020-36781", + "SUSE": "https://www.suse.com/security/cve/CVE-2020-36781", + "Ubuntu": "https://ubuntu.com/security/CVE-2020-36781" + } + }, + "CVE-2020-36782": { + "affected_versions": "v4.16-rc1 to v5.13-rc1", + "breaks": "13d6eb20fc79a1e606307256dad4098375539a09", + "cmt_msg": "i2c: imx-lpi2c: fix reference leak when pm_runtime_get_sync fails", + "fixes": "278e5bbdb9a94fa063c0f9bcde2479d0b8042462", + "last_affected_version": "5.12.3", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\ni2c: imx-lpi2c: fix reference leak when pm_runtime_get_sync fails\n\nThe PM reference count is not expected to be incremented on\nreturn in lpi2c_imx_master_enable.\n\nHowever, pm_runtime_get_sync will increment the PM reference\ncount even failed. Forgetting to putting operation will result\nin a reference leak here.\n\nReplace it with pm_runtime_resume_and_get to keep usage\ncounter balanced.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2020-36782", + "ExploitDB": "https://www.exploit-db.com/search?cve=2020-36782", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2020-36782", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2020-36782", + "SUSE": "https://www.suse.com/security/cve/CVE-2020-36782", + "Ubuntu": "https://ubuntu.com/security/CVE-2020-36782" + } + }, + "CVE-2020-36783": { + "affected_versions": "v4.15-rc1 to v5.13-rc1", + "breaks": "93222bd9b966105f43418fd336654ad10045783a", + "cmt_msg": "i2c: img-scb: fix reference leak when pm_runtime_get_sync fails", + "fixes": "223125e37af8a641ea4a09747a6a52172fc4b903", + "last_affected_version": "5.12.3", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\ni2c: img-scb: fix reference leak when pm_runtime_get_sync fails\n\nThe PM reference count is not expected to be incremented on\nreturn in functions img_i2c_xfer and img_i2c_init.\n\nHowever, pm_runtime_get_sync will increment the PM reference\ncount even failed. Forgetting to putting operation will result\nin a reference leak here.\n\nReplace it with pm_runtime_resume_and_get to keep usage\ncounter balanced.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2020-36783", + "ExploitDB": "https://www.exploit-db.com/search?cve=2020-36783", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2020-36783", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2020-36783", + "SUSE": "https://www.suse.com/security/cve/CVE-2020-36783", + "Ubuntu": "https://ubuntu.com/security/CVE-2020-36783" + } + }, + "CVE-2020-36784": { + "affected_versions": "v4.5-rc1 to v5.13-rc1", + "breaks": "7fa32329ca03148fb2c07b4ef3247b8fc0488d6a", + "cmt_msg": "i2c: cadence: fix reference leak when pm_runtime_get_sync fails", + "fixes": "23ceb8462dc6f4b4decdb5536a7e5fc477cdf0b6", + "last_affected_version": "5.12.3", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\ni2c: cadence: fix reference leak when pm_runtime_get_sync fails\n\nThe PM reference count is not expected to be incremented on\nreturn in functions cdns_i2c_master_xfer and cdns_reg_slave.\n\nHowever, pm_runtime_get_sync will increment pm usage counter\neven failed. Forgetting to putting operation will result in a\nreference leak here.\n\nReplace it with pm_runtime_resume_and_get to keep usage\ncounter balanced.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2020-36784", + "ExploitDB": "https://www.exploit-db.com/search?cve=2020-36784", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2020-36784", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2020-36784", + "SUSE": "https://www.suse.com/security/cve/CVE-2020-36784", + "Ubuntu": "https://ubuntu.com/security/CVE-2020-36784" + } + }, + "CVE-2020-36785": { + "affected_versions": "v5.8-rc1 to v5.13-rc1", + "breaks": "ad85094b293e40e7a2f831b0311a389d952ebd5e", + "cmt_msg": "media: atomisp: Fix use after free in atomisp_alloc_css_stat_bufs()", + "fixes": "ba11bbf303fafb33989e95473e409f6ab412b18d", + "last_affected_version": "5.12.3", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: atomisp: Fix use after free in atomisp_alloc_css_stat_bufs()\n\nThe \"s3a_buf\" is freed along with all the other items on the\n\"asd->s3a_stats\" list. It leads to a double free and a use after free.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2020-36785", + "ExploitDB": "https://www.exploit-db.com/search?cve=2020-36785", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2020-36785", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2020-36785", + "SUSE": "https://www.suse.com/security/cve/CVE-2020-36785", + "Ubuntu": "https://ubuntu.com/security/CVE-2020-36785" + } + }, + "CVE-2020-36786": { + "affected_versions": "v5.10-rc1 to v5.13-rc1", + "breaks": "9289cdf399922a1bd801a8cd946a79581c00a380", + "cmt_msg": "media: [next] staging: media: atomisp: fix memory leak of object flash", + "fixes": "6045b01dd0e3cd3759eafe7f290ed04c957500b1", + "last_affected_version": "5.12.3", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: [next] staging: media: atomisp: fix memory leak of object flash\n\nIn the case where the call to lm3554_platform_data_func returns an\nerror there is a memory leak on the error return path of object\nflash. Fix this by adding an error return path that will free\nflash and rename labels fail2 to fail3 and fail1 to fail2.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2020-36786", + "ExploitDB": "https://www.exploit-db.com/search?cve=2020-36786", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2020-36786", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2020-36786", + "SUSE": "https://www.suse.com/security/cve/CVE-2020-36786", + "Ubuntu": "https://ubuntu.com/security/CVE-2020-36786" + } + }, + "CVE-2020-36787": { + "affected_versions": "v5.0-rc1 to v5.13-rc1", + "breaks": "d2b4387f3bdf016e266d23cf657465f557721488", + "cmt_msg": "media: aspeed: fix clock handling logic", + "fixes": "3536169f8531c2c5b153921dc7d1ac9fd570cda7", + "last_affected_version": "5.12.3", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: aspeed: fix clock handling logic\n\nVideo engine uses eclk and vclk for its clock sources and its reset\ncontrol is coupled with eclk so the current clock enabling sequence works\nlike below.\n\n Enable eclk\n De-assert Video Engine reset\n 10ms delay\n Enable vclk\n\nIt introduces improper reset on the Video Engine hardware and eventually\nthe hardware generates unexpected DMA memory transfers that can corrupt\nmemory region in random and sporadic patterns. This issue is observed\nvery rarely on some specific AST2500 SoCs but it causes a critical\nkernel panic with making a various shape of signature so it's extremely\nhard to debug. Moreover, the issue is observed even when the video\nengine is not actively used because udevd turns on the video engine\nhardware for a short time to make a query in every boot.\n\nTo fix this issue, this commit changes the clock handling logic to make\nthe reset de-assertion triggered after enabling both eclk and vclk. Also,\nit adds clk_unprepare call for a case when probe fails.\n\nclk: ast2600: fix reset settings for eclk and vclk\nVideo engine reset setting should be coupled with eclk to match it\nwith the setting for previous Aspeed SoCs which is defined in\nclk-aspeed.c since all Aspeed SoCs are sharing a single video engine\ndriver. Also, reset bit 6 is defined as 'Video Engine' reset in\ndatasheet so it should be de-asserted when eclk is enabled. This\ncommit fixes the setting.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2020-36787", + "ExploitDB": "https://www.exploit-db.com/search?cve=2020-36787", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2020-36787", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2020-36787", + "SUSE": "https://www.suse.com/security/cve/CVE-2020-36787", + "Ubuntu": "https://ubuntu.com/security/CVE-2020-36787" + } + }, "CVE-2020-3702": { "affected_versions": "v2.6.12-rc2 to v5.12-rc1-dontuse", "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", @@ -70822,8 +71077,8 @@ "cwe": "Out-of-bounds Write", "fixes": "35d2969ea3c7d32aee78066b1f3cf61a0d935a4e", "last_affected_version": "5.15.0", - "last_modified": "2023-12-06", - "nvd_text": "A heap-based buffer overflow flaw was found in the Linux kernel FireDTV media card driver, where the user calls the CA_SEND_MSG ioctl. This flaw allows a local user of the host machine to crash the system or escalate privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", + "last_modified": "2024-04-09", + "nvd_text": "The firewire subsystem in the Linux kernel through 5.14.13 has a buffer overflow related to drivers/media/firewire/firedtv-avc.c and drivers/media/firewire/firedtv-ci.c, because avc_ca_pmt mishandles bounds checking.", "ref_urls": { "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-42739", "ExploitDB": "https://www.exploit-db.com/search?cve=2021-42739", @@ -71513,452 +71768,4990 @@ "Ubuntu": "https://ubuntu.com/security/CVE-2021-46283" } }, - "CVE-2022-0001": { - "affected_versions": "v2.6.12-rc2 to v5.17-rc8", - "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", - "cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE", - "cvss2": { - "Access Complexity": "Low", - "Access Vector": "Local Access", - "Authentication": "None", - "Availability Impact": "None", - "Confidentiality Impact": "Partial", - "Integrity Impact": "None", - "raw": "AV:L/AC:L/Au:N/C:P/I:N/A:N", - "score": 2.1 - }, - "cvss3": { - "Attack Complexity": "Low", - "Attack Vector": "Local", - "Availability": "None", - "Confidentiality": "High", - "Integrity": "None", - "Privileges Required": "Low", - "Scope": "Changed", - "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", - "score": 6.5 - }, - "cwe": "Unspecified", - "fixes": "d45476d9832409371537013ebdd8dc1a7781f97a", - "last_affected_version": "5.16.13", - "last_modified": "2023-12-06", - "nvd_text": "Non-transparent sharing of branch predictor selectors between contexts in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.", + "CVE-2021-46904": { + "affected_versions": "v2.6.27-rc1 to v5.12-rc7", + "breaks": "72dc1c096c7051a48ab1dbb12f71976656b55eb5", + "cmt_msg": "net: hso: fix null-ptr-deref during tty device unregistration", + "fixes": "8a12f8836145ffe37e9c8733dce18c22fb668b66", + "last_affected_version": "5.11.13", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: hso: fix null-ptr-deref during tty device unregistration\n\nMultiple ttys try to claim the same the minor number causing a double\nunregistration of the same device. The first unregistration succeeds\nbut the next one results in a null-ptr-deref.\n\nThe get_free_serial_index() function returns an available minor number\nbut doesn't assign it immediately. The assignment is done by the caller\nlater. But before this assignment, calls to get_free_serial_index()\nwould return the same minor number.\n\nFix this by modifying get_free_serial_index to assign the minor number\nimmediately after one is found to be and rename it to obtain_minor()\nto better reflect what it does. Similary, rename set_serial_by_index()\nto release_minor() and modify it to free up the minor number of the\ngiven hso_serial. Every obtain_minor() should have corresponding\nrelease_minor() call.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-0001", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-0001", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-0001", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-0001", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-0001", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-0001" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-46904", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-46904", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-46904", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-46904", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-46904", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-46904" } }, - "CVE-2022-0002": { - "affected_versions": "v2.6.12-rc2 to v5.17-rc8", + "CVE-2021-46905": { + "affected_versions": "v5.12-rc7 to v5.13-rc1", + "breaks": "8a12f8836145ffe37e9c8733dce18c22fb668b66", + "cmt_msg": "net: hso: fix NULL-deref on disconnect regression", + "fixes": "2ad5692db72874f02b9ad551d26345437ea4f7f3", + "last_affected_version": "5.12.0", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: hso: fix NULL-deref on disconnect regression\n\nCommit 8a12f8836145 (\"net: hso: fix null-ptr-deref during tty device\nunregistration\") fixed the racy minor allocation reported by syzbot, but\nintroduced an unconditional NULL-pointer dereference on every disconnect\ninstead.\n\nSpecifically, the serial device table must no longer be accessed after\nthe minor has been released by hso_serial_tty_unregister().", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-46905", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-46905", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-46905", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-46905", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-46905", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-46905" + } + }, + "CVE-2021-46906": { + "affected_versions": "v2.6.12-rc2 to v5.13-rc5", "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", - "cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE", - "cvss2": { - "Access Complexity": "Low", - "Access Vector": "Local Access", - "Authentication": "None", - "Availability Impact": "None", - "Confidentiality Impact": "Partial", - "Integrity Impact": "None", - "raw": "AV:L/AC:L/Au:N/C:P/I:N/A:N", - "score": 2.1 - }, - "cvss3": { - "Attack Complexity": "Low", - "Attack Vector": "Local", - "Availability": "None", - "Confidentiality": "High", - "Integrity": "None", - "Privileges Required": "Low", - "Scope": "Changed", - "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", - "score": 6.5 - }, - "cwe": "Unspecified", - "fixes": "d45476d9832409371537013ebdd8dc1a7781f97a", - "last_affected_version": "5.16.13", - "last_modified": "2023-12-06", - "nvd_text": "Non-transparent sharing of branch predictor within a context in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.", + "cmt_msg": "HID: usbhid: fix info leak in hid_submit_ctrl", + "fixes": "6be388f4a35d2ce5ef7dbf635a8964a5da7f799f", + "last_affected_version": "5.12.11", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nHID: usbhid: fix info leak in hid_submit_ctrl\n\nIn hid_submit_ctrl(), the way of calculating the report length doesn't\ntake into account that report->size can be zero. When running the\nsyzkaller reproducer, a report of size 0 causes hid_submit_ctrl) to\ncalculate transfer_buffer_length as 16384. When this urb is passed to\nthe usb core layer, KMSAN reports an info leak of 16384 bytes.\n\nTo fix this, first modify hid_report_len() to account for the zero\nreport size case by using DIV_ROUND_UP for the division. Then, call it\nfrom hid_submit_ctrl().", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-0002", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-0002", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-0002", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-0002", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-0002", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-0002" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-46906", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-46906", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-46906", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-46906", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-46906", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-46906" } }, - "CVE-2022-0168": { - "affected_versions": "v2.6.12-rc2 to v5.18-rc1", - "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", - "cmt_msg": "cifs: fix NULL ptr dereference in smb2_ioctl_query_info()", - "cvss3": { - "Attack Complexity": "Low", - "Attack Vector": "Local", - "Availability": "High", - "Confidentiality": "None", - "Integrity": "None", - "Privileges Required": "High", - "Scope": "Unchanged", - "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", - "score": 4.4 - }, - "cwe": "NULL Pointer Dereference", - "fixes": "d6f5e358452479fa8a773b5c6ccc9e4ec5a20880", - "last_affected_version": "5.17.1", - "last_modified": "2023-12-06", - "nvd_text": "A denial of service (DOS) issue was found in the Linux kernel\u2019s smb2_ioctl_query_info function in the fs/cifs/smb2ops.c Common Internet File System (CIFS) due to an incorrect return from the memdup_user function. This flaw allows a local, privileged (CAP_SYS_ADMIN) attacker to crash the system.", + "CVE-2021-46908": { + "affected_versions": "unk to v5.12-rc8", + "breaks": "", + "cmt_msg": "bpf: Use correct permission flag for mixed signed bounds arithmetic", + "fixes": "9601148392520e2e134936e76788fc2a6371e7be", + "last_affected_version": "5.11.15", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Use correct permission flag for mixed signed bounds arithmetic\n\nWe forbid adding unknown scalars with mixed signed bounds due to the\nspectre v1 masking mitigation. Hence this also needs bypass_spec_v1\nflag instead of allow_ptr_leaks.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-46908", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-46908", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-46908", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-46908", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-46908", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-46908" + } + }, + "CVE-2021-46909": { + "affected_versions": "v4.13-rc1 to v5.12-rc8", + "breaks": "30fdfb929e82450bbf3d0e0aba56efbc29b52b52", + "cmt_msg": "ARM: footbridge: fix PCI interrupt mapping", + "fixes": "30e3b4f256b4e366a61658c294f6a21b8626dda7", + "last_affected_version": "5.11.15", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nARM: footbridge: fix PCI interrupt mapping\n\nSince commit 30fdfb929e82 (\"PCI: Add a call to pci_assign_irq() in\npci_device_probe()\"), the PCI code will call the IRQ mapping function\nwhenever a PCI driver is probed. If these are marked as __init, this\ncauses an oops if a PCI driver is loaded or bound after the kernel has\ninitialised.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-46909", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-46909", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-46909", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-46909", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-46909", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-46909" + } + }, + "CVE-2021-46910": { + "affected_versions": "v5.11-rc1 to v5.12-rc8", + "breaks": "2a15ba82fa6ca3f35502b3060f22118a938d2889", + "cmt_msg": "ARM: 9063/1: mm: reduce maximum number of CPUs if DEBUG_KMAP_LOCAL is enabled", + "fixes": "d624833f5984d484c5e3196f34b926f9e71dafee", + "last_affected_version": "5.11.15", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nARM: 9063/1: mm: reduce maximum number of CPUs if DEBUG_KMAP_LOCAL is enabled\n\nThe debugging code for kmap_local() doubles the number of per-CPU fixmap\nslots allocated for kmap_local(), in order to use half of them as guard\nregions. This causes the fixmap region to grow downwards beyond the start\nof its reserved window if the supported number of CPUs is large, and collide\nwith the newly added virtual DT mapping right below it, which is obviously\nnot good.\n\nOne manifestation of this is EFI boot on a kernel built with NR_CPUS=32\nand CONFIG_DEBUG_KMAP_LOCAL=y, which may pass the FDT in highmem, resulting\nin block entries below the fixmap region that the fixmap code misidentifies\nas fixmap table entries, and subsequently tries to dereference using a\nphys-to-virt translation that is only valid for lowmem. This results in a\ncryptic splat such as the one below.\n\n ftrace: allocating 45548 entries in 89 pages\n 8<--- cut here ---\n Unable to handle kernel paging request at virtual address fc6006f0\n pgd = (ptrval)\n [fc6006f0] *pgd=80000040207003, *pmd=00000000\n Internal error: Oops: a06 [#1] SMP ARM\n Modules linked in:\n CPU: 0 PID: 0 Comm: swapper Not tainted 5.11.0+ #382\n Hardware name: Generic DT based system\n PC is at cpu_ca15_set_pte_ext+0x24/0x30\n LR is at __set_fixmap+0xe4/0x118\n pc : [] lr : [] psr: 400000d3\n sp : c1601ed8 ip : 00400000 fp : 00800000\n r10: 0000071f r9 : 00421000 r8 : 00c00000\n r7 : 00c00000 r6 : 0000071f r5 : ffade000 r4 : 4040171f\n r3 : 00c00000 r2 : 4040171f r1 : c041ac78 r0 : fc6006f0\n Flags: nZcv IRQs off FIQs off Mode SVC_32 ISA ARM Segment none\n Control: 30c5387d Table: 40203000 DAC: 00000001\n Process swapper (pid: 0, stack limit = 0x(ptrval))\n\nSo let's limit CONFIG_NR_CPUS to 16 when CONFIG_DEBUG_KMAP_LOCAL=y. Also,\nfix the BUILD_BUG_ON() check that was supposed to catch this, by checking\nwhether the region grows below the start address rather than above the end\naddress.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-46910", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-46910", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-46910", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-46910", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-46910", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-46910" + } + }, + "CVE-2021-46911": { + "affected_versions": "v5.7-rc1 to v5.12-rc8", + "breaks": "5a4b9fe7fece62ecab6fb28fe92362f83b41c33e", + "cmt_msg": "ch_ktls: Fix kernel panic", + "fixes": "1a73e427b824133940c2dd95ebe26b6dce1cbf10", + "last_affected_version": "5.11.15", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nch_ktls: Fix kernel panic\n\nTaking page refcount is not ideal and causes kernel panic\nsometimes. It's better to take tx_ctx lock for the complete\nskb transmit, to avoid page cleanup if ACK received in middle.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-46911", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-46911", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-46911", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-46911", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-46911", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-46911" + } + }, + "CVE-2021-46912": { + "affected_versions": "v5.7-rc1 to v5.12-rc8", + "breaks": "9cb8e048e5d93825ec5e8dfb5b8df4987ea25745", + "cmt_msg": "net: Make tcp_allowed_congestion_control readonly in non-init netns", + "fixes": "97684f0970f6e112926de631fdd98d9693c7e5c1", + "last_affected_version": "5.11.15", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: Make tcp_allowed_congestion_control readonly in non-init netns\n\nCurrently, tcp_allowed_congestion_control is global and writable;\nwriting to it in any net namespace will leak into all other net\nnamespaces.\n\ntcp_available_congestion_control and tcp_allowed_congestion_control are\nthe only sysctls in ipv4_net_table (the per-netns sysctl table) with a\nNULL data pointer; their handlers (proc_tcp_available_congestion_control\nand proc_allowed_congestion_control) have no other way of referencing a\nstruct net. Thus, they operate globally.\n\nBecause ipv4_net_table does not use designated initializers, there is no\neasy way to fix up this one \"bad\" table entry. However, the data pointer\nupdating logic shouldn't be applied to NULL pointers anyway, so we\ninstead force these entries to be read-only.\n\nThese sysctls used to exist in ipv4_table (init-net only), but they were\nmoved to the per-net ipv4_net_table, presumably without realizing that\ntcp_allowed_congestion_control was writable and thus introduced a leak.\n\nBecause the intent of that commit was only to know (i.e. read) \"which\ncongestion algorithms are available or allowed\", this read-only solution\nshould be sufficient.\n\nThe logic added in recent commit\n31c4d2f160eb: (\"net: Ensure net namespace isolation of sysctls\")\ndoes not and cannot check for NULL data pointers, because\nother table entries (e.g. /proc/sys/net/netfilter/nf_log/) have\n.data=NULL but use other methods (.extra2) to access the struct net.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-46912", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-46912", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-46912", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-46912", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-46912", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-46912" + } + }, + "CVE-2021-46913": { + "affected_versions": "v5.7-rc1 to v5.12-rc8", + "breaks": "4094445229760d0d31a4190dfe88fe815c9fc34e", + "cmt_msg": "netfilter: nftables: clone set element expression template", + "fixes": "4d8f9065830e526c83199186c5f56a6514f457d2", + "last_affected_version": "5.11.15", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nftables: clone set element expression template\n\nmemcpy() breaks when using connlimit in set elements. Use\nnft_expr_clone() to initialize the connlimit expression list, otherwise\nconnlimit garbage collector crashes when walking on the list head copy.\n\n[ 493.064656] Workqueue: events_power_efficient nft_rhash_gc [nf_tables]\n[ 493.064685] RIP: 0010:find_or_evict+0x5a/0x90 [nf_conncount]\n[ 493.064694] Code: 2b 43 40 83 f8 01 77 0d 48 c7 c0 f5 ff ff ff 44 39 63 3c 75 df 83 6d 18 01 48 8b 43 08 48 89 de 48 8b 13 48 8b 3d ee 2f 00 00 <48> 89 42 08 48 89 10 48 b8 00 01 00 00 00 00 ad de 48 89 03 48 83\n[ 493.064699] RSP: 0018:ffffc90000417dc0 EFLAGS: 00010297\n[ 493.064704] RAX: 0000000000000000 RBX: ffff888134f38410 RCX: 0000000000000000\n[ 493.064708] RDX: 0000000000000000 RSI: ffff888134f38410 RDI: ffff888100060cc0\n[ 493.064711] RBP: ffff88812ce594a8 R08: ffff888134f38438 R09: 00000000ebb9025c\n[ 493.064714] R10: ffffffff8219f838 R11: 0000000000000017 R12: 0000000000000001\n[ 493.064718] R13: ffffffff82146740 R14: ffff888134f38410 R15: 0000000000000000\n[ 493.064721] FS: 0000000000000000(0000) GS:ffff88840e440000(0000) knlGS:0000000000000000\n[ 493.064725] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 493.064729] CR2: 0000000000000008 CR3: 00000001330aa002 CR4: 00000000001706e0\n[ 493.064733] Call Trace:\n[ 493.064737] nf_conncount_gc_list+0x8f/0x150 [nf_conncount]\n[ 493.064746] nft_rhash_gc+0x106/0x390 [nf_tables]", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-0168", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-0168", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-0168", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-0168", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-0168", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-0168" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-46913", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-46913", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-46913", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-46913", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-46913", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-46913" } }, - "CVE-2022-0171": { - "affected_versions": "v5.10-rc1 to v5.18-rc4", - "breaks": "f980f9c31a923e9040dee0bc679a5f5b09e61f40", - "cmt_msg": "KVM: SEV: add cache flush to solve SEV cache incoherency issues", - "cvss3": { - "Attack Complexity": "Low", - "Attack Vector": "Local", - "Availability": "High", - "Confidentiality": "None", - "Integrity": "None", - "Privileges Required": "Low", - "Scope": "Unchanged", - "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", - "score": 5.5 - }, - "cwe": "Incomplete Cleanup", - "fixes": "683412ccf61294d727ead4a73d97397396e69a6b", - "last_affected_version": "5.15.69", - "last_modified": "2023-12-06", - "nvd_text": "A flaw was found in the Linux kernel. The existing KVM SEV API has a vulnerability that allows a non-root (host) user-level application to crash the host kernel by creating a confidential guest VM instance in AMD CPU that supports Secure Encrypted Virtualization (SEV).", + "CVE-2021-46914": { + "affected_versions": "v5.9-rc1 to v5.12-rc8", + "breaks": "6f82b25587354ce7c9c42e0b53d8b0770b900847", + "cmt_msg": "ixgbe: fix unbalanced device enable/disable in suspend/resume", + "fixes": "debb9df311582c83fe369baa35fa4b92e8a9c58a", + "last_affected_version": "5.11.15", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nixgbe: fix unbalanced device enable/disable in suspend/resume\n\npci_disable_device() called in __ixgbe_shutdown() decreases\ndev->enable_cnt by 1. pci_enable_device_mem() which increases\ndev->enable_cnt by 1, was removed from ixgbe_resume() in commit\n6f82b2558735 (\"ixgbe: use generic power management\"). This caused\nunbalanced increase/decrease. So add pci_enable_device_mem() back.\n\nFix the following call trace.\n\n ixgbe 0000:17:00.1: disabling already-disabled device\n Call Trace:\n __ixgbe_shutdown+0x10a/0x1e0 [ixgbe]\n ixgbe_suspend+0x32/0x70 [ixgbe]\n pci_pm_suspend+0x87/0x160\n ? pci_pm_freeze+0xd0/0xd0\n dpm_run_callback+0x42/0x170\n __device_suspend+0x114/0x460\n async_suspend+0x1f/0xa0\n async_run_entry_fn+0x3c/0xf0\n process_one_work+0x1dd/0x410\n worker_thread+0x34/0x3f0\n ? cancel_delayed_work+0x90/0x90\n kthread+0x14c/0x170\n ? kthread_park+0x90/0x90\n ret_from_fork+0x1f/0x30", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-46914", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-46914", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-46914", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-46914", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-46914", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-46914" + } + }, + "CVE-2021-46915": { + "affected_versions": "v4.13 to v5.12-rc8", + "breaks": "c26844eda9d4fdbd266660e3b3de2d0270e3a1ed", + "cmt_msg": "netfilter: nft_limit: avoid possible divide error in nft_limit_init", + "fixes": "b895bdf5d643b6feb7c60856326dd4feb6981560", + "last_affected_version": "5.11.15", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nft_limit: avoid possible divide error in nft_limit_init\n\ndiv_u64() divides u64 by u32.\n\nnft_limit_init() wants to divide u64 by u64, use the appropriate\nmath function (div64_u64)\n\ndivide error: 0000 [#1] PREEMPT SMP KASAN\nCPU: 1 PID: 8390 Comm: syz-executor188 Not tainted 5.12.0-rc4-syzkaller #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011\nRIP: 0010:div_u64_rem include/linux/math64.h:28 [inline]\nRIP: 0010:div_u64 include/linux/math64.h:127 [inline]\nRIP: 0010:nft_limit_init+0x2a2/0x5e0 net/netfilter/nft_limit.c:85\nCode: ef 4c 01 eb 41 0f 92 c7 48 89 de e8 38 a5 22 fa 4d 85 ff 0f 85 97 02 00 00 e8 ea 9e 22 fa 4c 0f af f3 45 89 ed 31 d2 4c 89 f0 <49> f7 f5 49 89 c6 e8 d3 9e 22 fa 48 8d 7d 48 48 b8 00 00 00 00 00\nRSP: 0018:ffffc90009447198 EFLAGS: 00010246\nRAX: 0000000000000000 RBX: 0000200000000000 RCX: 0000000000000000\nRDX: 0000000000000000 RSI: ffffffff875152e6 RDI: 0000000000000003\nRBP: ffff888020f80908 R08: 0000200000000000 R09: 0000000000000000\nR10: ffffffff875152d8 R11: 0000000000000000 R12: ffffc90009447270\nR13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000\nFS: 000000000097a300(0000) GS:ffff8880b9d00000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00000000200001c4 CR3: 0000000026a52000 CR4: 00000000001506e0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n nf_tables_newexpr net/netfilter/nf_tables_api.c:2675 [inline]\n nft_expr_init+0x145/0x2d0 net/netfilter/nf_tables_api.c:2713\n nft_set_elem_expr_alloc+0x27/0x280 net/netfilter/nf_tables_api.c:5160\n nf_tables_newset+0x1997/0x3150 net/netfilter/nf_tables_api.c:4321\n nfnetlink_rcv_batch+0x85a/0x21b0 net/netfilter/nfnetlink.c:456\n nfnetlink_rcv_skb_batch net/netfilter/nfnetlink.c:580 [inline]\n nfnetlink_rcv+0x3af/0x420 net/netfilter/nfnetlink.c:598\n netlink_unicast_kernel net/netlink/af_netlink.c:1312 [inline]\n netlink_unicast+0x533/0x7d0 net/netlink/af_netlink.c:1338\n netlink_sendmsg+0x856/0xd90 net/netlink/af_netlink.c:1927\n sock_sendmsg_nosec net/socket.c:654 [inline]\n sock_sendmsg+0xcf/0x120 net/socket.c:674\n ____sys_sendmsg+0x6e8/0x810 net/socket.c:2350\n ___sys_sendmsg+0xf3/0x170 net/socket.c:2404\n __sys_sendmsg+0xe5/0x1b0 net/socket.c:2433\n do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46\n entry_SYSCALL_64_after_hwframe+0x44/0xae", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-46915", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-46915", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-46915", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-46915", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-46915", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-46915" + } + }, + "CVE-2021-46916": { + "affected_versions": "v5.11-rc1 to v5.12-rc8", + "breaks": "b02e5a0ebb172c8276cea3151942aac681f7a4a6", + "cmt_msg": "ixgbe: Fix NULL pointer dereference in ethtool loopback test", + "fixes": "31166efb1cee348eb6314e9c0095d84cbeb66b9d", + "last_affected_version": "5.11.15", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nixgbe: Fix NULL pointer dereference in ethtool loopback test\n\nThe ixgbe driver currently generates a NULL pointer dereference when\nperforming the ethtool loopback test. This is due to the fact that there\nisn't a q_vector associated with the test ring when it is setup as\ninterrupts are not normally added to the test rings.\n\nTo address this I have added code that will check for a q_vector before\nreturning a napi_id value. If a q_vector is not present it will return a\nvalue of 0.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-46916", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-46916", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-46916", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-46916", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-46916", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-46916" + } + }, + "CVE-2021-46917": { + "affected_versions": "v5.8-rc6 to v5.12-rc8", + "breaks": "da32b28c95a79e399e18c03f8178f41aec9c66e4", + "cmt_msg": "dmaengine: idxd: fix wq cleanup of WQCFG registers", + "fixes": "ea9aadc06a9f10ad20a90edc0a484f1147d88a7a", + "last_affected_version": "5.11.15", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndmaengine: idxd: fix wq cleanup of WQCFG registers\n\nA pre-release silicon erratum workaround where wq reset does not clear\nWQCFG registers was leaked into upstream code. Use wq reset command\ninstead of blasting the MMIO region. This also address an issue where\nwe clobber registers in future devices.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-46917", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-46917", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-46917", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-46917", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-46917", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-46917" + } + }, + "CVE-2021-46918": { + "affected_versions": "v5.11-rc1 to v5.12-rc8", + "breaks": "8e50d392652f20616a136165dff516b86baf5e49", + "cmt_msg": "dmaengine: idxd: clear MSIX permission entry on shutdown", + "fixes": "6df0e6c57dfc064af330071f372f11aa8c584997", + "last_affected_version": "5.11.15", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndmaengine: idxd: clear MSIX permission entry on shutdown\n\nAdd disabling/clearing of MSIX permission entries on device shutdown to\nmirror the enabling of the MSIX entries on probe. Current code left the\nMSIX enabled and the pasid entries still programmed at device shutdown.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-46918", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-46918", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-46918", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-46918", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-46918", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-46918" + } + }, + "CVE-2021-46919": { + "affected_versions": "v5.6-rc1 to v5.12-rc8", + "breaks": "c52ca478233c172b2d322b5241d6279a8661cbba", + "cmt_msg": "dmaengine: idxd: fix wq size store permission state", + "fixes": "0fff71c5a311e1264988179f7dcc217fda15fadd", + "last_affected_version": "5.11.15", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndmaengine: idxd: fix wq size store permission state\n\nWQ size can only be changed when the device is disabled. Current code\nallows change when device is enabled but wq is disabled. Change the check\nto detect device state.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-46919", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-46919", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-46919", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-46919", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-46919", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-46919" + } + }, + "CVE-2021-46920": { + "affected_versions": "v5.6-rc1 to v5.12-rc8", + "breaks": "bfe1d56091c1a404b3d4ce7e9809d745fc4453bb", + "cmt_msg": "dmaengine: idxd: Fix clobbering of SWERR overflow bit on writeback", + "fixes": "ea941ac294d75d0ace50797aebf0056f6f8f7a7f", + "last_affected_version": "5.11.15", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndmaengine: idxd: Fix clobbering of SWERR overflow bit on writeback\n\nCurrent code blindly writes over the SWERR and the OVERFLOW bits. Write\nback the bits actually read instead so the driver avoids clobbering the\nOVERFLOW bit that comes after the register is read.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-46920", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-46920", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-46920", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-46920", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-46920", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-46920" + } + }, + "CVE-2021-46921": { + "affected_versions": "v4.15-rc1 to v5.12", + "breaks": "b519b56e378ee82caf9b079b04f5db87dedc3251", + "cmt_msg": "locking/qrwlock: Fix ordering in queued_write_lock_slowpath()", + "fixes": "84a24bf8c52e66b7ac89ada5e3cfbe72d65c1896", + "last_affected_version": "5.11", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nlocking/qrwlock: Fix ordering in queued_write_lock_slowpath()\n\nWhile this code is executed with the wait_lock held, a reader can\nacquire the lock without holding wait_lock. The writer side loops\nchecking the value with the atomic_cond_read_acquire(), but only truly\nacquires the lock when the compare-and-exchange is completed\nsuccessfully which isn\u2019t ordered. This exposes the window between the\nacquire and the cmpxchg to an A-B-A problem which allows reads\nfollowing the lock acquisition to observe values speculatively before\nthe write lock is truly acquired.\n\nWe've seen a problem in epoll where the reader does a xchg while\nholding the read lock, but the writer can see a value change out from\nunder it.\n\n Writer | Reader\n --------------------------------------------------------------------------------\n ep_scan_ready_list() |\n |- write_lock_irq() |\n |- queued_write_lock_slowpath() |\n\t|- atomic_cond_read_acquire() |\n\t\t\t\t | read_lock_irqsave(&ep->lock, flags);\n --> (observes value before unlock) | chain_epi_lockless()\n | | epi->next = xchg(&ep->ovflist, epi);\n | | read_unlock_irqrestore(&ep->lock, flags);\n | |\n | atomic_cmpxchg_relaxed() |\n |-- READ_ONCE(ep->ovflist); |\n\nA core can order the read of the ovflist ahead of the\natomic_cmpxchg_relaxed(). Switching the cmpxchg to use acquire\nsemantics addresses this issue at which point the atomic_cond_read can\nbe switched to use relaxed semantics.\n\n[peterz: use try_cmpxchg()]", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-46921", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-46921", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-46921", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-46921", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-46921", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-46921" + } + }, + "CVE-2021-46922": { + "affected_versions": "v5.12-rc1-dontuse to v5.12", + "breaks": "8c657a0590de585b1115847c17b34a58025f2f4b", + "cmt_msg": "KEYS: trusted: Fix TPM reservation for seal/unseal", + "fixes": "9d5171eab462a63e2fbebfccf6026e92be018f20", + "last_affected_version": "5.11", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nKEYS: trusted: Fix TPM reservation for seal/unseal\n\nThe original patch 8c657a0590de (\"KEYS: trusted: Reserve TPM for seal\nand unseal operations\") was correct on the mailing list:\n\nhttps://lore.kernel.org/linux-integrity/20210128235621.127925-4-jarkko@kernel.org/\n\nBut somehow got rebased so that the tpm_try_get_ops() in\ntpm2_seal_trusted() got lost. This causes an imbalanced put of the\nTPM ops and causes oopses on TIS based hardware.\n\nThis fix puts back the lost tpm_try_get_ops()", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-46922", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-46922", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-46922", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-46922", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-46922", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-46922" + } + }, + "CVE-2021-46923": { + "affected_versions": "v5.12-rc1-dontuse to v5.16-rc8", + "breaks": "9caccd41541a6f7d6279928d9f971f6642c361af", + "cmt_msg": "fs/mount_setattr: always cleanup mount_kattr", + "fixes": "012e332286e2bb9f6ac77d195f17e74b2963d663", + "last_affected_version": "5.15.12", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfs/mount_setattr: always cleanup mount_kattr\n\nMake sure that finish_mount_kattr() is called after mount_kattr was\nsuccesfully built in both the success and failure case to prevent\nleaking any references we took when we built it. We returned early if\npath lookup failed thereby risking to leak an additional reference we\ntook when building mount_kattr when an idmapped mount was requested.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-46923", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-46923", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-46923", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-46923", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-46923", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-46923" + } + }, + "CVE-2021-46924": { + "affected_versions": "v3.16-rc1 to v5.16-rc8", + "breaks": "68957303f44a501af5cf37913208a2acaa6bcdf1", + "cmt_msg": "NFC: st21nfca: Fix memory leak in device probe and remove", + "fixes": "1b9dadba502234eea7244879b8d5d126bfaf9f0c", + "last_affected_version": "5.15.12", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nNFC: st21nfca: Fix memory leak in device probe and remove\n\n'phy->pending_skb' is alloced when device probe, but forgot to free\nin the error handling path and remove path, this cause memory leak\nas follows:\n\nunreferenced object 0xffff88800bc06800 (size 512):\n comm \"8\", pid 11775, jiffies 4295159829 (age 9.032s)\n hex dump (first 32 bytes):\n 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................\n 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................\n backtrace:\n [<00000000d66c09ce>] __kmalloc_node_track_caller+0x1ed/0x450\n [<00000000c93382b3>] kmalloc_reserve+0x37/0xd0\n [<000000005fea522c>] __alloc_skb+0x124/0x380\n [<0000000019f29f9a>] st21nfca_hci_i2c_probe+0x170/0x8f2\n\nFix it by freeing 'pending_skb' in error and remove.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-46924", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-46924", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-46924", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-46924", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-46924", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-46924" + } + }, + "CVE-2021-46925": { + "affected_versions": "v4.11-rc1 to v5.16-rc8", + "breaks": "5f08318f617b05b6ee389d8bd174c7af921ebf19", + "cmt_msg": "net/smc: fix kernel panic caused by race of smc_sock", + "fixes": "349d43127dac00c15231e8ffbcaabd70f7b0e544", + "last_affected_version": "5.15.12", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/smc: fix kernel panic caused by race of smc_sock\n\nA crash occurs when smc_cdc_tx_handler() tries to access smc_sock\nbut smc_release() has already freed it.\n\n[ 4570.695099] BUG: unable to handle page fault for address: 000000002eae9e88\n[ 4570.696048] #PF: supervisor write access in kernel mode\n[ 4570.696728] #PF: error_code(0x0002) - not-present page\n[ 4570.697401] PGD 0 P4D 0\n[ 4570.697716] Oops: 0002 [#1] PREEMPT SMP NOPTI\n[ 4570.698228] CPU: 0 PID: 0 Comm: swapper/0 Not tainted 5.16.0-rc4+ #111\n[ 4570.699013] Hardware name: Alibaba Cloud Alibaba Cloud ECS, BIOS 8c24b4c 04/0\n[ 4570.699933] RIP: 0010:_raw_spin_lock+0x1a/0x30\n<...>\n[ 4570.711446] Call Trace:\n[ 4570.711746] \n[ 4570.711992] smc_cdc_tx_handler+0x41/0xc0\n[ 4570.712470] smc_wr_tx_tasklet_fn+0x213/0x560\n[ 4570.712981] ? smc_cdc_tx_dismisser+0x10/0x10\n[ 4570.713489] tasklet_action_common.isra.17+0x66/0x140\n[ 4570.714083] __do_softirq+0x123/0x2f4\n[ 4570.714521] irq_exit_rcu+0xc4/0xf0\n[ 4570.714934] common_interrupt+0xba/0xe0\n\nThough smc_cdc_tx_handler() checked the existence of smc connection,\nsmc_release() may have already dismissed and released the smc socket\nbefore smc_cdc_tx_handler() further visits it.\n\nsmc_cdc_tx_handler() |smc_release()\nif (!conn) |\n |\n |smc_cdc_tx_dismiss_slots()\n | smc_cdc_tx_dismisser()\n |\n |sock_put(&smc->sk) <- last sock_put,\n | smc_sock freed\nbh_lock_sock(&smc->sk) (panic) |\n\nTo make sure we won't receive any CDC messages after we free the\nsmc_sock, add a refcount on the smc_connection for inflight CDC\nmessage(posted to the QP but haven't received related CQE), and\ndon't release the smc_connection until all the inflight CDC messages\nhaven been done, for both success or failed ones.\n\nUsing refcount on CDC messages brings another problem: when the link\nis going to be destroyed, smcr_link_clear() will reset the QP, which\nthen remove all the pending CQEs related to the QP in the CQ. To make\nsure all the CQEs will always come back so the refcount on the\nsmc_connection can always reach 0, smc_ib_modify_qp_reset() was replaced\nby smc_ib_modify_qp_error().\nAnd remove the timeout in smc_wr_tx_wait_no_pending_sends() since we\nneed to wait for all pending WQEs done, or we may encounter use-after-\nfree when handling CQEs.\n\nFor IB device removal routine, we need to wait for all the QPs on that\ndevice been destroyed before we can destroy CQs on the device, or\nthe refcount on smc_connection won't reach 0 and smc_sock cannot be\nreleased.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-0171", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-0171", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-0171", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-0171", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-0171", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-0171" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-46925", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-46925", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-46925", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-46925", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-46925", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-46925" } }, - "CVE-2022-0185": { - "affected_versions": "v5.1-rc1 to v5.17-rc1", - "breaks": "3e1aeb00e6d132efc151dacc062b38269bc9eccc", - "cmt_msg": "vfs: fs_context: fix up param length parsing in legacy_parse_param", - "cvss2": { - "Access Complexity": "Low", - "Access Vector": "Local Access", - "Authentication": "None", - "Availability Impact": "Complete", - "Confidentiality Impact": "Complete", - "Integrity Impact": "Complete", - "raw": "AV:L/AC:L/Au:N/C:C/I:C/A:C", - "score": 7.2 - }, - "cvss3": { - "Attack Complexity": "Low", - "Attack Vector": "Local", - "Availability": "High", - "Confidentiality": "High", - "Integrity": "High", - "Privileges Required": "None", - "Scope": "Unchanged", - "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", - "score": 8.4 - }, - "cwe": "Integer Overflow or Wraparound", - "fixes": "722d94847de29310e8aa03fcbdb41fc92c521756", - "last_affected_version": "5.16.1", - "last_modified": "2023-12-06", - "nvd_text": "A heap-based buffer overflow flaw was found in the way the legacy_parse_param function in the Filesystem Context functionality of the Linux kernel verified the supplied parameters length. An unprivileged (in case of unprivileged user namespaces enabled, otherwise needs namespaced CAP_SYS_ADMIN privilege) local user able to open a filesystem that does not support the Filesystem Context API (and thus fallbacks to legacy handling) could use this flaw to escalate their privileges on the system.", + "CVE-2021-46926": { + "affected_versions": "v2.6.12-rc2 to v5.16-rc7", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "ALSA: hda: intel-sdw-acpi: harden detection of controller", + "fixes": "385f287f9853da402d94278e59f594501c1d1dad", + "last_affected_version": "5.15.12", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: hda: intel-sdw-acpi: harden detection of controller\n\nThe existing code currently sets a pointer to an ACPI handle before\nchecking that it's actually a SoundWire controller. This can lead to\nissues where the graph walk continues and eventually fails, but the\npointer was set already.\n\nThis patch changes the logic so that the information provided to\nthe caller is set when a controller is found.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-46926", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-46926", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-46926", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-46926", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-46926", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-46926" + } + }, + "CVE-2021-46927": { + "affected_versions": "v5.15-rc1 to v5.16-rc8", + "breaks": "5b78ed24e8ec48602c1d6f5a188e58d000c81e2b", + "cmt_msg": "nitro_enclaves: Use get_user_pages_unlocked() call to handle mmap assert", + "fixes": "3a0152b219523227c2a62a0a122cf99608287176", + "last_affected_version": "5.15.12", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnitro_enclaves: Use get_user_pages_unlocked() call to handle mmap assert\n\nAfter commit 5b78ed24e8ec (\"mm/pagemap: add mmap_assert_locked()\nannotations to find_vma*()\"), the call to get_user_pages() will trigger\nthe mmap assert.\n\nstatic inline void mmap_assert_locked(struct mm_struct *mm)\n{\n\tlockdep_assert_held(&mm->mmap_lock);\n\tVM_BUG_ON_MM(!rwsem_is_locked(&mm->mmap_lock), mm);\n}\n\n[ 62.521410] kernel BUG at include/linux/mmap_lock.h:156!\n...........................................................\n[ 62.538938] RIP: 0010:find_vma+0x32/0x80\n...........................................................\n[ 62.605889] Call Trace:\n[ 62.608502] \n[ 62.610956] ? lock_timer_base+0x61/0x80\n[ 62.614106] find_extend_vma+0x19/0x80\n[ 62.617195] __get_user_pages+0x9b/0x6a0\n[ 62.620356] __gup_longterm_locked+0x42d/0x450\n[ 62.623721] ? finish_wait+0x41/0x80\n[ 62.626748] ? __kmalloc+0x178/0x2f0\n[ 62.629768] ne_set_user_memory_region_ioctl.isra.0+0x225/0x6a0 [nitro_enclaves]\n[ 62.635776] ne_enclave_ioctl+0x1cf/0x6d7 [nitro_enclaves]\n[ 62.639541] __x64_sys_ioctl+0x82/0xb0\n[ 62.642620] do_syscall_64+0x3b/0x90\n[ 62.645642] entry_SYSCALL_64_after_hwframe+0x44/0xae\n\nUse get_user_pages_unlocked() when setting the enclave memory regions.\nThat's a similar pattern as mmap_read_lock() used together with\nget_user_pages().", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-0185", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-0185", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-0185", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-0185", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-0185", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-0185" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-46927", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-46927", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-46927", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-46927", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-46927", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-46927" } }, - "CVE-2022-0264": { - "affected_versions": "v5.12-rc1-dontuse to v5.16-rc6", - "breaks": "37086bfdc737ea6f66bf68dcf16757004d68e1e1", - "cmt_msg": "bpf: Fix kernel address leakage in atomic fetch", - "cvss2": { - "Access Complexity": "Low", - "Access Vector": "Local Access", - "Authentication": "None", - "Availability Impact": "None", - "Confidentiality Impact": "Partial", - "Integrity Impact": "None", - "raw": "AV:L/AC:L/Au:N/C:P/I:N/A:N", - "score": 2.1 - }, - "cvss3": { - "Attack Complexity": "Low", - "Attack Vector": "Local", - "Availability": "None", - "Confidentiality": "High", - "Integrity": "None", - "Privileges Required": "Low", - "Scope": "Unchanged", - "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", - "score": 5.5 - }, - "cwe": "Improper Handling of Exceptional Conditions", - "fixes": "7d3baf0afa3aa9102d6a521a8e4c41888bb79882", - "last_affected_version": "5.15.10", - "last_modified": "2023-12-06", - "nvd_text": "A vulnerability was found in the Linux kernel's eBPF verifier when handling internal data structures. Internal memory locations could be returned to userspace. A local attacker with the permissions to insert eBPF code to the kernel can use this to leak internal kernel memory details defeating some of the exploit mitigations in place for the kernel. This flaws affects kernel versions < v5.16-rc6", + "CVE-2021-46928": { + "affected_versions": "v2.6.12-rc2 to v5.16-rc7", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "parisc: Clear stale IIR value on instruction access rights trap", + "fixes": "484730e5862f6b872dca13840bed40fd7c60fa26", + "last_affected_version": "5.15.12", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nparisc: Clear stale IIR value on instruction access rights trap\n\nWhen a trap 7 (Instruction access rights) occurs, this means the CPU\ncouldn't execute an instruction due to missing execute permissions on\nthe memory region. In this case it seems the CPU didn't even fetched\nthe instruction from memory and thus did not store it in the cr19 (IIR)\nregister before calling the trap handler. So, the trap handler will find\nsome random old stale value in cr19.\n\nThis patch simply overwrites the stale IIR value with a constant magic\n\"bad food\" value (0xbaadf00d), in the hope people don't start to try to\nunderstand the various random IIR values in trap 7 dumps.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-0264", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-0264", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-0264", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-0264", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-0264", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-0264" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-46928", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-46928", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-46928", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-46928", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-46928", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-46928" } }, - "CVE-2022-0286": { - "affected_versions": "v5.9-rc1 to v5.14-rc2", - "breaks": "18cb261afd7bf50134e5ccacc5ec91ea16efadd4", - "cmt_msg": "bonding: fix null dereference in bond_ipsec_add_sa()", - "cvss2": { - "Access Complexity": "Low", - "Access Vector": "Local Access", - "Authentication": "None", - "Availability Impact": "Partial", - "Confidentiality Impact": "None", - "Integrity Impact": "None", - "raw": "AV:L/AC:L/Au:N/C:N/I:N/A:P", - "score": 2.1 - }, - "cvss3": { - "Attack Complexity": "Low", - "Attack Vector": "Local", - "Availability": "High", - "Confidentiality": "None", - "Integrity": "None", - "Privileges Required": "Low", - "Scope": "Unchanged", - "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", - "score": 5.5 - }, - "cwe": "NULL Pointer Dereference", - "fixes": "105cd17a866017b45f3c45901b394c711c97bf40", - "last_affected_version": "5.13.5", - "last_modified": "2023-12-06", - "nvd_text": "A flaw was found in the Linux kernel. A null pointer dereference in bond_ipsec_add_sa() may lead to local denial of service.", + "CVE-2021-46929": { + "affected_versions": "v4.14-rc1 to v5.16-rc8", + "breaks": "d25adbeb0cdb860fb39e09cdd025e9cfc954c5ab", + "cmt_msg": "sctp: use call_rcu to free endpoint", + "fixes": "5ec7d18d1813a5bead0b495045606c93873aecbb", + "last_affected_version": "5.15.12", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsctp: use call_rcu to free endpoint\n\nThis patch is to delay the endpoint free by calling call_rcu() to fix\nanother use-after-free issue in sctp_sock_dump():\n\n BUG: KASAN: use-after-free in __lock_acquire+0x36d9/0x4c20\n Call Trace:\n __lock_acquire+0x36d9/0x4c20 kernel/locking/lockdep.c:3218\n lock_acquire+0x1ed/0x520 kernel/locking/lockdep.c:3844\n __raw_spin_lock_bh include/linux/spinlock_api_smp.h:135 [inline]\n _raw_spin_lock_bh+0x31/0x40 kernel/locking/spinlock.c:168\n spin_lock_bh include/linux/spinlock.h:334 [inline]\n __lock_sock+0x203/0x350 net/core/sock.c:2253\n lock_sock_nested+0xfe/0x120 net/core/sock.c:2774\n lock_sock include/net/sock.h:1492 [inline]\n sctp_sock_dump+0x122/0xb20 net/sctp/diag.c:324\n sctp_for_each_transport+0x2b5/0x370 net/sctp/socket.c:5091\n sctp_diag_dump+0x3ac/0x660 net/sctp/diag.c:527\n __inet_diag_dump+0xa8/0x140 net/ipv4/inet_diag.c:1049\n inet_diag_dump+0x9b/0x110 net/ipv4/inet_diag.c:1065\n netlink_dump+0x606/0x1080 net/netlink/af_netlink.c:2244\n __netlink_dump_start+0x59a/0x7c0 net/netlink/af_netlink.c:2352\n netlink_dump_start include/linux/netlink.h:216 [inline]\n inet_diag_handler_cmd+0x2ce/0x3f0 net/ipv4/inet_diag.c:1170\n __sock_diag_cmd net/core/sock_diag.c:232 [inline]\n sock_diag_rcv_msg+0x31d/0x410 net/core/sock_diag.c:263\n netlink_rcv_skb+0x172/0x440 net/netlink/af_netlink.c:2477\n sock_diag_rcv+0x2a/0x40 net/core/sock_diag.c:274\n\nThis issue occurs when asoc is peeled off and the old sk is freed after\ngetting it by asoc->base.sk and before calling lock_sock(sk).\n\nTo prevent the sk free, as a holder of the sk, ep should be alive when\ncalling lock_sock(). This patch uses call_rcu() and moves sock_put and\nep free into sctp_endpoint_destroy_rcu(), so that it's safe to try to\nhold the ep under rcu_read_lock in sctp_transport_traverse_process().\n\nIf sctp_endpoint_hold() returns true, it means this ep is still alive\nand we have held it and can continue to dump it; If it returns false,\nit means this ep is dead and can be freed after rcu_read_unlock, and\nwe should skip it.\n\nIn sctp_sock_dump(), after locking the sk, if this ep is different from\ntsp->asoc->ep, it means during this dumping, this asoc was peeled off\nbefore calling lock_sock(), and the sk should be skipped; If this ep is\nthe same with tsp->asoc->ep, it means no peeloff happens on this asoc,\nand due to lock_sock, no peeloff will happen either until release_sock.\n\nNote that delaying endpoint free won't delay the port release, as the\nport release happens in sctp_endpoint_destroy() before calling call_rcu().\nAlso, freeing endpoint by call_rcu() makes it safe to access the sk by\nasoc->base.sk in sctp_assocs_seq_show() and sctp_rcv().\n\nThanks Jones to bring this issue up.\n\nv1->v2:\n - improve the changelog.\n - add kfree(ep) into sctp_endpoint_destroy_rcu(), as Jakub noticed.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-46929", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-46929", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-46929", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-46929", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-46929", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-46929" + } + }, + "CVE-2021-46930": { + "affected_versions": "v5.2-rc1 to v5.16-rc8", + "breaks": "83374e035b6286731c5aa617844c7b724294c2a7", + "cmt_msg": "usb: mtu3: fix list_head check warning", + "fixes": "8c313e3bfd9adae8d5c4ba1cc696dcbc86fbf9bf", + "last_affected_version": "5.15.12", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: mtu3: fix list_head check warning\n\nThis is caused by uninitialization of list_head.\n\nBUG: KASAN: use-after-free in __list_del_entry_valid+0x34/0xe4\n\nCall trace:\ndump_backtrace+0x0/0x298\nshow_stack+0x24/0x34\ndump_stack+0x130/0x1a8\nprint_address_description+0x88/0x56c\n__kasan_report+0x1b8/0x2a0\nkasan_report+0x14/0x20\n__asan_load8+0x9c/0xa0\n__list_del_entry_valid+0x34/0xe4\nmtu3_req_complete+0x4c/0x300 [mtu3]\nmtu3_gadget_stop+0x168/0x448 [mtu3]\nusb_gadget_unregister_driver+0x204/0x3a0\nunregister_gadget_item+0x44/0xa4", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-46930", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-46930", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-46930", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-46930", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-46930", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-46930" + } + }, + "CVE-2021-46931": { + "affected_versions": "v5.7-rc1 to v5.16-rc8", + "breaks": "5f29458b77d51c104554575b73184c243930aa87", + "cmt_msg": "net/mlx5e: Wrap the tx reporter dump callback to extract the sq", + "fixes": "918fc3855a6507a200e9cf22c20be852c0982687", + "last_affected_version": "5.15.12", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5e: Wrap the tx reporter dump callback to extract the sq\n\nFunction mlx5e_tx_reporter_dump_sq() casts its void * argument to struct\nmlx5e_txqsq *, but in TX-timeout-recovery flow the argument is actually\nof type struct mlx5e_tx_timeout_ctx *.\n\n mlx5_core 0000:08:00.1 enp8s0f1: TX timeout detected\n mlx5_core 0000:08:00.1 enp8s0f1: TX timeout on queue: 1, SQ: 0x11ec, CQ: 0x146d, SQ Cons: 0x0 SQ Prod: 0x1, usecs since last trans: 21565000\n BUG: stack guard page was hit at 0000000093f1a2de (stack is 00000000b66ea0dc..000000004d932dae)\n kernel stack overflow (page fault): 0000 [#1] SMP NOPTI\n CPU: 5 PID: 95 Comm: kworker/u20:1 Tainted: G W OE 5.13.0_mlnx #1\n Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014\n Workqueue: mlx5e mlx5e_tx_timeout_work [mlx5_core]\n RIP: 0010:mlx5e_tx_reporter_dump_sq+0xd3/0x180\n [mlx5_core]\n Call Trace:\n mlx5e_tx_reporter_dump+0x43/0x1c0 [mlx5_core]\n devlink_health_do_dump.part.91+0x71/0xd0\n devlink_health_report+0x157/0x1b0\n mlx5e_reporter_tx_timeout+0xb9/0xf0 [mlx5_core]\n ? mlx5e_tx_reporter_err_cqe_recover+0x1d0/0x1d0\n [mlx5_core]\n ? mlx5e_health_queue_dump+0xd0/0xd0 [mlx5_core]\n ? update_load_avg+0x19b/0x550\n ? set_next_entity+0x72/0x80\n ? pick_next_task_fair+0x227/0x340\n ? finish_task_switch+0xa2/0x280\n mlx5e_tx_timeout_work+0x83/0xb0 [mlx5_core]\n process_one_work+0x1de/0x3a0\n worker_thread+0x2d/0x3c0\n ? process_one_work+0x3a0/0x3a0\n kthread+0x115/0x130\n ? kthread_park+0x90/0x90\n ret_from_fork+0x1f/0x30\n --[ end trace 51ccabea504edaff ]---\n RIP: 0010:mlx5e_tx_reporter_dump_sq+0xd3/0x180\n PKRU: 55555554\n Kernel panic - not syncing: Fatal exception\n Kernel Offset: disabled\n end Kernel panic - not syncing: Fatal exception\n\nTo fix this bug add a wrapper for mlx5e_tx_reporter_dump_sq() which\nextracts the sq from struct mlx5e_tx_timeout_ctx and set it as the\nTX-timeout-recovery flow dump callback.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-46931", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-46931", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-46931", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-46931", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-46931", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-46931" + } + }, + "CVE-2021-46932": { + "affected_versions": "v2.6.23-rc1 to v5.16-rc8", + "breaks": "5a6eb676d3bc4d7a6feab200a92437b62ad298da", + "cmt_msg": "Input: appletouch - initialize work before device registration", + "fixes": "9f3ccdc3f6ef10084ceb3a47df0961bec6196fd0", + "last_affected_version": "5.15.12", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nInput: appletouch - initialize work before device registration\n\nSyzbot has reported warning in __flush_work(). This warning is caused by\nwork->func == NULL, which means missing work initialization.\n\nThis may happen, since input_dev->close() calls\ncancel_work_sync(&dev->work), but dev->work initalization happens _after_\ninput_register_device() call.\n\nSo this patch moves dev->work initialization before registering input\ndevice", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-46932", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-46932", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-46932", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-46932", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-46932", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-46932" + } + }, + "CVE-2021-46933": { + "affected_versions": "v4.0-rc1 to v5.16-rc8", + "breaks": "5e33f6fdf735cda1d4580fe6f1878da05718fe73", + "cmt_msg": "usb: gadget: f_fs: Clear ffs_eventfd in ffs_data_clear.", + "fixes": "b1e0887379422975f237d43d8839b751a6bcf154", + "last_affected_version": "5.15.12", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: gadget: f_fs: Clear ffs_eventfd in ffs_data_clear.\n\nffs_data_clear is indirectly called from both ffs_fs_kill_sb and\nffs_ep0_release, so it ends up being called twice when userland closes ep0\nand then unmounts f_fs.\nIf userland provided an eventfd along with function's USB descriptors, it\nends up calling eventfd_ctx_put as many times, causing a refcount\nunderflow.\nNULL-ify ffs_eventfd to prevent these extraneous eventfd_ctx_put calls.\n\nAlso, set epfiles to NULL right after de-allocating it, for readability.\n\nFor completeness, ffs_data_clear actually ends up being called thrice, the\nlast call being before the whole ffs structure gets freed, so when this\nspecific sequence happens there is a second underflow happening (but not\nbeing reported):\n\n/sys/kernel/debug/tracing# modprobe usb_f_fs\n/sys/kernel/debug/tracing# echo ffs_data_clear > set_ftrace_filter\n/sys/kernel/debug/tracing# echo function > current_tracer\n/sys/kernel/debug/tracing# echo 1 > tracing_on\n(setup gadget, run and kill function userland process, teardown gadget)\n/sys/kernel/debug/tracing# echo 0 > tracing_on\n/sys/kernel/debug/tracing# cat trace\n smartcard-openp-436 [000] ..... 1946.208786: ffs_data_clear <-ffs_data_closed\n smartcard-openp-431 [000] ..... 1946.279147: ffs_data_clear <-ffs_data_closed\n smartcard-openp-431 [000] .n... 1946.905512: ffs_data_clear <-ffs_data_put\n\nWarning output corresponding to above trace:\n[ 1946.284139] WARNING: CPU: 0 PID: 431 at lib/refcount.c:28 refcount_warn_saturate+0x110/0x15c\n[ 1946.293094] refcount_t: underflow; use-after-free.\n[ 1946.298164] Modules linked in: usb_f_ncm(E) u_ether(E) usb_f_fs(E) hci_uart(E) btqca(E) btrtl(E) btbcm(E) btintel(E) bluetooth(E) nls_ascii(E) nls_cp437(E) vfat(E) fat(E) bcm2835_v4l2(CE) bcm2835_mmal_vchiq(CE) videobuf2_vmalloc(E) videobuf2_memops(E) sha512_generic(E) videobuf2_v4l2(E) sha512_arm(E) videobuf2_common(E) videodev(E) cpufreq_dt(E) snd_bcm2835(CE) brcmfmac(E) mc(E) vc4(E) ctr(E) brcmutil(E) snd_soc_core(E) snd_pcm_dmaengine(E) drbg(E) snd_pcm(E) snd_timer(E) snd(E) soundcore(E) drm_kms_helper(E) cec(E) ansi_cprng(E) rc_core(E) syscopyarea(E) raspberrypi_cpufreq(E) sysfillrect(E) sysimgblt(E) cfg80211(E) max17040_battery(OE) raspberrypi_hwmon(E) fb_sys_fops(E) regmap_i2c(E) ecdh_generic(E) rfkill(E) ecc(E) bcm2835_rng(E) rng_core(E) vchiq(CE) leds_gpio(E) libcomposite(E) fuse(E) configfs(E) ip_tables(E) x_tables(E) autofs4(E) ext4(E) crc16(E) mbcache(E) jbd2(E) crc32c_generic(E) sdhci_iproc(E) sdhci_pltfm(E) sdhci(E)\n[ 1946.399633] CPU: 0 PID: 431 Comm: smartcard-openp Tainted: G C OE 5.15.0-1-rpi #1 Debian 5.15.3-1\n[ 1946.417950] Hardware name: BCM2835\n[ 1946.425442] Backtrace:\n[ 1946.432048] [] (dump_backtrace) from [] (show_stack+0x20/0x24)\n[ 1946.448226] r7:00000009 r6:0000001c r5:c04a948c r4:c0a64e2c\n[ 1946.458412] [] (show_stack) from [] (dump_stack+0x28/0x30)\n[ 1946.470380] [] (dump_stack) from [] (__warn+0xe8/0x154)\n[ 1946.482067] r5:c04a948c r4:c0a71dc8\n[ 1946.490184] [] (__warn) from [] (warn_slowpath_fmt+0xa0/0xe4)\n[ 1946.506758] r7:00000009 r6:0000001c r5:c0a71dc8 r4:c0a71e04\n[ 1946.517070] [] (warn_slowpath_fmt) from [] (refcount_warn_saturate+0x110/0x15c)\n[ 1946.535309] r8:c0100224 r7:c0dfcb84 r6:ffffffff r5:c3b84c00 r4:c24a17c0\n[ 1946.546708] [] (refcount_warn_saturate) from [] (eventfd_ctx_put+0x48/0x74)\n[ 1946.564476] [] (eventfd_ctx_put) from [] (ffs_data_clear+0xd0/0x118 [usb_f_fs])\n[ 1946.582664] r5:c3b84c00 r4:c2695b00\n[ 1946.590668] [] (ffs_data_clear [usb_f_fs]) from [] (ffs_data_closed+0x9c/0x150 [usb_f_fs])\n[ 1946.609608] r5:bf54d014 r4:c2695b00\n[ 1946.617522] [] (ffs_data_closed [usb_f_fs]) from [] (ffs_fs_kill_sb+0x2c/0x30 [usb_f_fs])\n[ 1946.636217] r7:c0dfcb\n---truncated---", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-46933", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-46933", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-46933", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-46933", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-46933", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-46933" + } + }, + "CVE-2021-46934": { + "affected_versions": "v4.15-rc1 to v5.16-rc8", + "breaks": "7d5cb45655f2e9e37ef75d18f50c0072ef14a38b", + "cmt_msg": "i2c: validate user data in compat ioctl", + "fixes": "bb436283e25aaf1533ce061605d23a9564447bdf", + "last_affected_version": "5.15.12", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\ni2c: validate user data in compat ioctl\n\nWrong user data may cause warning in i2c_transfer(), ex: zero msgs.\nUserspace should not be able to trigger warnings, so this patch adds\nvalidation checks for user data in compact ioctl to prevent reported\nwarnings", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-0286", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-0286", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-0286", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-0286", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-0286", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-0286" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-46934", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-46934", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-46934", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-46934", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-46934", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-46934" } }, - "CVE-2022-0322": { - "affected_versions": "v4.11-rc1 to v5.15-rc6", - "breaks": "cc16f00f6529aa2378f2b949a6f68e9dc6dec363", - "cmt_msg": "sctp: account stream padding length for reconf chunk", - "cvss2": { - "Access Complexity": "Low", - "Access Vector": "Local Access", - "Authentication": "None", - "Availability Impact": "Partial", - "Confidentiality Impact": "None", - "Integrity Impact": "None", - "raw": "AV:L/AC:L/Au:N/C:N/I:N/A:P", - "score": 2.1 - }, - "cvss3": { - "Attack Complexity": "Low", - "Attack Vector": "Local", - "Availability": "High", - "Confidentiality": "None", - "Integrity": "None", - "Privileges Required": "Low", - "Scope": "Unchanged", - "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", - "score": 5.5 - }, - "cwe": "Incorrect Type Conversion or Cast", - "fixes": "a2d859e3fc97e79d907761550dbc03ff1b36479c", - "last_affected_version": "5.14.13", - "last_modified": "2023-12-06", - "nvd_text": "A flaw was found in the sctp_make_strreset_req function in net/sctp/sm_make_chunk.c in the SCTP network protocol in the Linux kernel with a local user privilege access. In this flaw, an attempt to use more buffer than is allocated triggers a BUG_ON issue, leading to a denial of service (DOS).", + "CVE-2021-46935": { + "affected_versions": "v4.14-rc1 to v5.16-rc8", + "breaks": "74310e06be4d74dcf67cd108366710dee5c576d5", + "cmt_msg": "binder: fix async_free_space accounting for empty parcels", + "fixes": "cfd0d84ba28c18b531648c9d4a35ecca89ad9901", + "last_affected_version": "5.15.12", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbinder: fix async_free_space accounting for empty parcels\n\nIn 4.13, commit 74310e06be4d (\"android: binder: Move buffer out of area shared with user space\")\nfixed a kernel structure visibility issue. As part of that patch,\nsizeof(void *) was used as the buffer size for 0-length data payloads so\nthe driver could detect abusive clients sending 0-length asynchronous\ntransactions to a server by enforcing limits on async_free_size.\n\nUnfortunately, on the \"free\" side, the accounting of async_free_space\ndid not add the sizeof(void *) back. The result was that up to 8-bytes of\nasync_free_space were leaked on every async transaction of 8-bytes or\nless. These small transactions are uncommon, so this accounting issue\nhas gone undetected for several years.\n\nThe fix is to use \"buffer_size\" (the allocated buffer size) instead of\n\"size\" (the logical buffer size) when updating the async_free_space\nduring the free operation. These are the same except for this\ncorner case of asynchronous transactions with payloads < 8 bytes.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-46935", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-46935", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-46935", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-46935", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-46935", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-46935" + } + }, + "CVE-2021-46936": { + "affected_versions": "v2.6.27-rc1 to v5.16-rc8", + "breaks": "61a7e26028b94805fd686a6dc9dbd9941f8f19b0", + "cmt_msg": "net: fix use-after-free in tw_timer_handler", + "fixes": "e22e45fc9e41bf9fcc1e92cfb78eb92786728ef0", + "last_affected_version": "5.15.12", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: fix use-after-free in tw_timer_handler\n\nA real world panic issue was found as follow in Linux 5.4.\n\n BUG: unable to handle page fault for address: ffffde49a863de28\n PGD 7e6fe62067 P4D 7e6fe62067 PUD 7e6fe63067 PMD f51e064067 PTE 0\n RIP: 0010:tw_timer_handler+0x20/0x40\n Call Trace:\n \n call_timer_fn+0x2b/0x120\n run_timer_softirq+0x1ef/0x450\n __do_softirq+0x10d/0x2b8\n irq_exit+0xc7/0xd0\n smp_apic_timer_interrupt+0x68/0x120\n apic_timer_interrupt+0xf/0x20\n\nThis issue was also reported since 2017 in the thread [1],\nunfortunately, the issue was still can be reproduced after fixing\nDCCP.\n\nThe ipv4_mib_exit_net is called before tcp_sk_exit_batch when a net\nnamespace is destroyed since tcp_sk_ops is registered befrore\nipv4_mib_ops, which means tcp_sk_ops is in the front of ipv4_mib_ops\nin the list of pernet_list. There will be a use-after-free on\nnet->mib.net_statistics in tw_timer_handler after ipv4_mib_exit_net\nif there are some inflight time-wait timers.\n\nThis bug is not introduced by commit f2bf415cfed7 (\"mib: add net to\nNET_ADD_STATS_BH\") since the net_statistics is a global variable\ninstead of dynamic allocation and freeing. Actually, commit\n61a7e26028b9 (\"mib: put net statistics on struct net\") introduces\nthe bug since it put net statistics on struct net and free it when\nnet namespace is destroyed.\n\nMoving init_ipv4_mibs() to the front of tcp_init() to fix this bug\nand replace pr_crit() with panic() since continuing is meaningless\nwhen init_ipv4_mibs() fails.\n\n[1] https://groups.google.com/g/syzkaller/c/p1tn-_Kc6l4/m/smuL_FMAAgAJ?pli=1", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-46936", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-46936", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-46936", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-46936", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-46936", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-46936" + } + }, + "CVE-2021-46937": { + "affected_versions": "v5.15-rc1 to v5.16-rc8", + "breaks": "4bc05954d0076655cfaf6f0135585bdc20cd6b11", + "cmt_msg": "mm/damon/dbgfs: fix 'struct pid' leaks in 'dbgfs_target_ids_write()'", + "fixes": "ebb3f994dd92f8fb4d70c7541091216c1e10cb71", + "last_affected_version": "5.15.12", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm/damon/dbgfs: fix 'struct pid' leaks in 'dbgfs_target_ids_write()'\n\nDAMON debugfs interface increases the reference counts of 'struct pid's\nfor targets from the 'target_ids' file write callback\n('dbgfs_target_ids_write()'), but decreases the counts only in DAMON\nmonitoring termination callback ('dbgfs_before_terminate()').\n\nTherefore, when 'target_ids' file is repeatedly written without DAMON\nmonitoring start/termination, the reference count is not decreased and\ntherefore memory for the 'struct pid' cannot be freed. This commit\nfixes this issue by decreasing the reference counts when 'target_ids' is\nwritten.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-46937", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-46937", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-46937", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-46937", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-46937", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-46937" + } + }, + "CVE-2021-46938": { + "affected_versions": "v4.6-rc1 to v5.13-rc1", + "breaks": "1c357a1e86a4227a6b6059f2de118ae47659cebc", + "cmt_msg": "dm rq: fix double free of blk_mq_tag_set in dev remove after table load fails", + "fixes": "8e947c8f4a5620df77e43c9c75310dc510250166", + "last_affected_version": "5.12.2", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndm rq: fix double free of blk_mq_tag_set in dev remove after table load fails\n\nWhen loading a device-mapper table for a request-based mapped device,\nand the allocation/initialization of the blk_mq_tag_set for the device\nfails, a following device remove will cause a double free.\n\nE.g. (dmesg):\n device-mapper: core: Cannot initialize queue for request-based dm-mq mapped device\n device-mapper: ioctl: unable to set up device queue for new table.\n Unable to handle kernel pointer dereference in virtual kernel address space\n Failing address: 0305e098835de000 TEID: 0305e098835de803\n Fault in home space mode while using kernel ASCE.\n AS:000000025efe0007 R3:0000000000000024\n Oops: 0038 ilc:3 [#1] SMP\n Modules linked in: ... lots of modules ...\n Supported: Yes, External\n CPU: 0 PID: 7348 Comm: multipathd Kdump: loaded Tainted: G W X 5.3.18-53-default #1 SLE15-SP3\n Hardware name: IBM 8561 T01 7I2 (LPAR)\n Krnl PSW : 0704e00180000000 000000025e368eca (kfree+0x42/0x330)\n R:0 T:1 IO:1 EX:1 Key:0 M:1 W:0 P:0 AS:3 CC:2 PM:0 RI:0 EA:3\n Krnl GPRS: 000000000000004a 000000025efe5230 c1773200d779968d 0000000000000000\n 000000025e520270 000000025e8d1b40 0000000000000003 00000007aae10000\n 000000025e5202a2 0000000000000001 c1773200d779968d 0305e098835de640\n 00000007a8170000 000003ff80138650 000000025e5202a2 000003e00396faa8\n Krnl Code: 000000025e368eb8: c4180041e100 lgrl %r1,25eba50b8\n 000000025e368ebe: ecba06b93a55 risbg %r11,%r10,6,185,58\n #000000025e368ec4: e3b010000008 ag %r11,0(%r1)\n >000000025e368eca: e310b0080004 lg %r1,8(%r11)\n 000000025e368ed0: a7110001 tmll %r1,1\n 000000025e368ed4: a7740129 brc 7,25e369126\n 000000025e368ed8: e320b0080004 lg %r2,8(%r11)\n 000000025e368ede: b904001b lgr %r1,%r11\n Call Trace:\n [<000000025e368eca>] kfree+0x42/0x330\n [<000000025e5202a2>] blk_mq_free_tag_set+0x72/0xb8\n [<000003ff801316a8>] dm_mq_cleanup_mapped_device+0x38/0x50 [dm_mod]\n [<000003ff80120082>] free_dev+0x52/0xd0 [dm_mod]\n [<000003ff801233f0>] __dm_destroy+0x150/0x1d0 [dm_mod]\n [<000003ff8012bb9a>] dev_remove+0x162/0x1c0 [dm_mod]\n [<000003ff8012a988>] ctl_ioctl+0x198/0x478 [dm_mod]\n [<000003ff8012ac8a>] dm_ctl_ioctl+0x22/0x38 [dm_mod]\n [<000000025e3b11ee>] ksys_ioctl+0xbe/0xe0\n [<000000025e3b127a>] __s390x_sys_ioctl+0x2a/0x40\n [<000000025e8c15ac>] system_call+0xd8/0x2c8\n Last Breaking-Event-Address:\n [<000000025e52029c>] blk_mq_free_tag_set+0x6c/0xb8\n Kernel panic - not syncing: Fatal exception: panic_on_oops\n\nWhen allocation/initialization of the blk_mq_tag_set fails in\ndm_mq_init_request_queue(), it is uninitialized/freed, but the pointer\nis not reset to NULL; so when dev_remove() later gets into\ndm_mq_cleanup_mapped_device() it sees the pointer and tries to\nuninitialize and free it again.\n\nFix this by setting the pointer to NULL in dm_mq_init_request_queue()\nerror-handling. Also set it to NULL in dm_mq_cleanup_mapped_device().", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-0322", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-0322", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-0322", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-0322", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-0322", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-0322" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-46938", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-46938", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-46938", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-46938", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-46938", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-46938" } }, - "CVE-2022-0330": { - "affected_versions": "v2.6.12-rc2 to v5.17-rc2", - "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", - "cmt_msg": "drm/i915: Flush TLBs before releasing backing store", - "cvss2": { - "Access Complexity": "Low", - "Access Vector": "Local Access", - "Authentication": "None", - "Availability Impact": "Partial", - "Confidentiality Impact": "Partial", - "Integrity Impact": "Partial", - "raw": "AV:L/AC:L/Au:N/C:P/I:P/A:P", - "score": 4.6 - }, - "cvss3": { - "Attack Complexity": "Low", - "Attack Vector": "Local", - "Availability": "High", - "Confidentiality": "High", - "Integrity": "High", - "Privileges Required": "Low", - "Scope": "Unchanged", - "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", - "score": 7.8 - }, - "cwe": "Improper Preservation of Permissions", - "fixes": "7938d61591d33394a21bdd7797a245b65428f44c", - "last_affected_version": "5.16.3", - "last_modified": "2023-12-06", - "nvd_text": "A random memory access flaw was found in the Linux kernel's GPU i915 kernel driver functionality in the way a user may run malicious code on the GPU. This flaw allows a local user to crash the system or escalate their privileges on the system.", + "CVE-2021-46939": { + "affected_versions": "unk to v5.13-rc1", + "breaks": "", + "cmt_msg": "tracing: Restructure trace_clock_global() to never block", + "fixes": "aafe104aa9096827a429bc1358f8260ee565b7cc", + "last_affected_version": "5.12.2", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntracing: Restructure trace_clock_global() to never block\n\nIt was reported that a fix to the ring buffer recursion detection would\ncause a hung machine when performing suspend / resume testing. The\nfollowing backtrace was extracted from debugging that case:\n\nCall Trace:\n trace_clock_global+0x91/0xa0\n __rb_reserve_next+0x237/0x460\n ring_buffer_lock_reserve+0x12a/0x3f0\n trace_buffer_lock_reserve+0x10/0x50\n __trace_graph_return+0x1f/0x80\n trace_graph_return+0xb7/0xf0\n ? trace_clock_global+0x91/0xa0\n ftrace_return_to_handler+0x8b/0xf0\n ? pv_hash+0xa0/0xa0\n return_to_handler+0x15/0x30\n ? ftrace_graph_caller+0xa0/0xa0\n ? trace_clock_global+0x91/0xa0\n ? __rb_reserve_next+0x237/0x460\n ? ring_buffer_lock_reserve+0x12a/0x3f0\n ? trace_event_buffer_lock_reserve+0x3c/0x120\n ? trace_event_buffer_reserve+0x6b/0xc0\n ? trace_event_raw_event_device_pm_callback_start+0x125/0x2d0\n ? dpm_run_callback+0x3b/0xc0\n ? pm_ops_is_empty+0x50/0x50\n ? platform_get_irq_byname_optional+0x90/0x90\n ? trace_device_pm_callback_start+0x82/0xd0\n ? dpm_run_callback+0x49/0xc0\n\nWith the following RIP:\n\nRIP: 0010:native_queued_spin_lock_slowpath+0x69/0x200\n\nSince the fix to the recursion detection would allow a single recursion to\nhappen while tracing, this lead to the trace_clock_global() taking a spin\nlock and then trying to take it again:\n\nring_buffer_lock_reserve() {\n trace_clock_global() {\n arch_spin_lock() {\n queued_spin_lock_slowpath() {\n /* lock taken */\n (something else gets traced by function graph tracer)\n ring_buffer_lock_reserve() {\n trace_clock_global() {\n arch_spin_lock() {\n queued_spin_lock_slowpath() {\n /* DEAD LOCK! */\n\nTracing should *never* block, as it can lead to strange lockups like the\nabove.\n\nRestructure the trace_clock_global() code to instead of simply taking a\nlock to update the recorded \"prev_time\" simply use it, as two events\nhappening on two different CPUs that calls this at the same time, really\ndoesn't matter which one goes first. Use a trylock to grab the lock for\nupdating the prev_time, and if it fails, simply try again the next time.\nIf it failed to be taken, that means something else is already updating\nit.\n\n\nBugzilla: https://bugzilla.kernel.org/show_bug.cgi?id=212761", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-46939", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-46939", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-46939", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-46939", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-46939", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-46939" + } + }, + "CVE-2021-46940": { + "affected_versions": "v5.10-rc4 to v5.13-rc1", + "breaks": "9972d5d84d76982606806b2ce887f70c2f8ba60a", + "cmt_msg": "tools/power turbostat: Fix offset overflow issue in index converting", + "fixes": "13a779de4175df602366d129e41782ad7168cef0", + "last_affected_version": "5.12.2", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntools/power turbostat: Fix offset overflow issue in index converting\n\nThe idx_to_offset() function returns type int (32-bit signed), but\nMSR_PKG_ENERGY_STAT is u32 and would be interpreted as a negative number.\nThe end result is that it hits the if (offset < 0) check in update_msr_sum()\nwhich prevents the timer callback from updating the stat in the background when\nlong durations are used. The similar issue exists in offset_to_idx() and\nupdate_msr_sum(). Fix this issue by converting the 'int' to 'off_t' accordingly.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-46940", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-46940", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-46940", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-46940", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-46940", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-46940" + } + }, + "CVE-2021-46941": { + "affected_versions": "v4.12-rc1 to v5.13-rc1", + "breaks": "41ce1456e1dbbc7355d0fcc10cf7c337c13def24", + "cmt_msg": "usb: dwc3: core: Do core softreset when switch mode", + "fixes": "f88359e1588b85cf0e8209ab7d6620085f3441d9", + "last_affected_version": "5.12.2", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: dwc3: core: Do core softreset when switch mode\n\n\nAccording to the programming guide, to switch mode for DRD controller,\nthe driver needs to do the following.\n\nTo switch from device to host:\n1. Reset controller with GCTL.CoreSoftReset\n2. Set GCTL.PrtCapDir(host mode)\n3. Reset the host with USBCMD.HCRESET\n4. Then follow up with the initializing host registers sequence\n\nTo switch from host to device:\n1. Reset controller with GCTL.CoreSoftReset\n2. Set GCTL.PrtCapDir(device mode)\n3. Reset the device with DCTL.CSftRst\n4. Then follow up with the initializing registers sequence\n\nCurrently we're missing step 1) to do GCTL.CoreSoftReset and step 3) of\nswitching from host to device. John Stult reported a lockup issue seen\nwith HiKey960 platform without these steps[1]. Similar issue is observed\nwith Ferry's testing platform[2].\n\nSo, apply the required steps along with some fixes to Yu Chen's and John\nStultz's version. The main fixes to their versions are the missing wait\nfor clocks synchronization before clearing GCTL.CoreSoftReset and only\napply DCTL.CSftRst when switching from host to device.\n\n[1] https://lore.kernel.org/linux-usb/20210108015115.27920-1-john.stultz@linaro.org/\n[2] https://lore.kernel.org/linux-usb/0ba7a6ba-e6a7-9cd4-0695-64fc927e01f1@gmail.com/", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-0330", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-0330", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-0330", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-0330", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-0330", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-0330" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-46941", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-46941", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-46941", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-46941", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-46941", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-46941" } }, - "CVE-2022-0382": { - "affected_versions": "v2.6.12-rc2 to v5.16", - "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", - "cmt_msg": "net ticp:fix a kernel-infoleak in __tipc_sendmsg()", - "cvss2": { - "Access Complexity": "Low", - "Access Vector": "Local Access", - "Authentication": "None", - "Availability Impact": "None", - "Confidentiality Impact": "Partial", - "Integrity Impact": "None", - "raw": "AV:L/AC:L/Au:N/C:P/I:N/A:N", - "score": 2.1 - }, - "cvss3": { - "Attack Complexity": "Low", - "Attack Vector": "Local", - "Availability": "None", - "Confidentiality": "High", - "Integrity": "None", - "Privileges Required": "Low", - "Scope": "Unchanged", - "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", - "score": 5.5 - }, - "cwe": "Missing Initialization of Resource", - "fixes": "d6d86830705f173fca6087a3e67ceaf68db80523", - "last_affected_version": "5.15", - "last_modified": "2023-12-06", - "nvd_text": "An information leak flaw was found due to uninitialized memory in the Linux kernel's TIPC protocol subsystem, in the way a user sends a TIPC datagram to one or more destinations. This flaw allows a local user to read some kernel memory. This issue is limited to no more than 7 bytes, and the user cannot control what is read. This flaw affects the Linux kernel versions prior to 5.17-rc1.", + "CVE-2021-46942": { + "affected_versions": "v5.12-rc1-dontuse to v5.13-rc1", + "breaks": "37d1e2e3642e2380750d7f35279180826f29660e", + "cmt_msg": "io_uring: fix shared sqpoll cancellation hangs", + "fixes": "734551df6f9bedfbefcd113ede665945e9de0b99", + "last_affected_version": "5.12.2", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nio_uring: fix shared sqpoll cancellation hangs\n\n[ 736.982891] INFO: task iou-sqp-4294:4295 blocked for more than 122 seconds.\n[ 736.982897] Call Trace:\n[ 736.982901] schedule+0x68/0xe0\n[ 736.982903] io_uring_cancel_sqpoll+0xdb/0x110\n[ 736.982908] io_sqpoll_cancel_cb+0x24/0x30\n[ 736.982911] io_run_task_work_head+0x28/0x50\n[ 736.982913] io_sq_thread+0x4e3/0x720\n\nWe call io_uring_cancel_sqpoll() one by one for each ctx either in\nsq_thread() itself or via task works, and it's intended to cancel all\nrequests of a specified context. However the function uses per-task\ncounters to track the number of inflight requests, so it counts more\nrequests than available via currect io_uring ctx and goes to sleep for\nthem to appear (e.g. from IRQ), that will never happen.\n\nCancel a bit more than before, i.e. all ctxs that share sqpoll\nand continue to use shared counters. Don't forget that we should not\nremove ctx from the list before running that task_work sqpoll-cancel,\notherwise the function wouldn't be able to find the context and will\nhang.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-46942", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-46942", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-46942", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-46942", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-46942", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-46942" + } + }, + "CVE-2021-46943": { + "affected_versions": "v5.2-rc1 to v5.13-rc1", + "breaks": "6d5f26f2e045f2377b524516194657c00efbbce8", + "cmt_msg": "media: staging/intel-ipu3: Fix set_fmt error handling", + "fixes": "ad91849996f9dd79741a961fd03585a683b08356", + "last_affected_version": "5.12.2", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: staging/intel-ipu3: Fix set_fmt error handling\n\nIf there in an error during a set_fmt, do not overwrite the previous\nsizes with the invalid config.\n\nWithout this patch, v4l2-compliance ends up allocating 4GiB of RAM and\ncausing the following OOPs\n\n[ 38.662975] ipu3-imgu 0000:00:05.0: swiotlb buffer is full (sz: 4096 bytes)\n[ 38.662980] DMA: Out of SW-IOMMU space for 4096 bytes at device 0000:00:05.0\n[ 38.663010] general protection fault: 0000 [#1] PREEMPT SMP", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-46943", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-46943", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-46943", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-46943", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-46943", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-46943" + } + }, + "CVE-2021-46944": { + "affected_versions": "v5.2-rc1 to v5.13-rc1", + "breaks": "6d5f26f2e045f2377b524516194657c00efbbce8", + "cmt_msg": "media: staging/intel-ipu3: Fix memory leak in imu_fmt", + "fixes": "3630901933afba1d16c462b04d569b7576339223", + "last_affected_version": "5.12.2", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: staging/intel-ipu3: Fix memory leak in imu_fmt\n\nWe are losing the reference to an allocated memory if try. Change the\norder of the check to avoid that.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-46944", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-46944", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-46944", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-46944", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-46944", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-46944" + } + }, + "CVE-2021-46945": { + "affected_versions": "v5.11-rc1 to v5.13-rc1", + "breaks": "014c9caa29d3a44e0de695c99ef18bec3e887d52", + "cmt_msg": "ext4: always panic when errors=panic is specified", + "fixes": "ac2f7ca51b0929461ea49918f27c11b680f28995", + "last_affected_version": "5.12.2", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: always panic when errors=panic is specified\n\nBefore commit 014c9caa29d3 (\"ext4: make ext4_abort() use\n__ext4_error()\"), the following series of commands would trigger a\npanic:\n\n1. mount /dev/sda -o ro,errors=panic test\n2. mount /dev/sda -o remount,abort test\n\nAfter commit 014c9caa29d3, remounting a file system using the test\nmount option \"abort\" will no longer trigger a panic. This commit will\nrestore the behaviour immediately before commit 014c9caa29d3.\n(However, note that the Linux kernel's behavior has not been\nconsistent; some previous kernel versions, including 5.4 and 4.19\nsimilarly did not panic after using the mount option \"abort\".)\n\nThis also makes a change to long-standing behaviour; namely, the\nfollowing series commands will now cause a panic, when previously it\ndid not:\n\n1. mount /dev/sda -o ro,errors=panic test\n2. echo test > /sys/fs/ext4/sda/trigger_fs_error\n\nHowever, this makes ext4's behaviour much more consistent, so this is\na good thing.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-0382", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-0382", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-0382", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-0382", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-0382", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-0382" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-46945", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-46945", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-46945", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-46945", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-46945", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-46945" } }, - "CVE-2022-0400": { - "affected_versions": "unk to unk", - "breaks": "", - "cvss3": { - "Attack Complexity": "Low", - "Attack Vector": "Network", - "Availability": "High", - "Confidentiality": "None", - "Integrity": "None", - "Privileges Required": "None", - "Scope": "Unchanged", - "User Interaction": "None", - "raw": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", - "score": 7.5 - }, - "cwe": "Out-of-bounds Read", - "fixes": "", - "last_modified": "2023-12-06", - "nvd_text": "An out-of-bounds read vulnerability was discovered in linux kernel in the smc protocol stack, causing remote dos.", + "CVE-2021-46947": { + "affected_versions": "v5.12-rc1-dontuse to v5.13-rc1", + "breaks": "e26ca4b535820b1445dcef3c0f82b3fb5b45108b", + "cmt_msg": "sfc: adjust efx->xdp_tx_queue_count with the real number of initialized queues", + "fixes": "99ba0ea616aabdc8e26259fd722503e012199a76", + "last_affected_version": "5.12.2", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsfc: adjust efx->xdp_tx_queue_count with the real number of initialized queues\n\nefx->xdp_tx_queue_count is initially initialized to num_possible_cpus() and is\nlater used to allocate and traverse efx->xdp_tx_queues lookup array. However,\nwe may end up not initializing all the array slots with real queues during\nprobing. This results, for example, in a NULL pointer dereference, when running\n\"# ethtool -S \", similar to below\n\n[2570283.664955][T4126959] BUG: kernel NULL pointer dereference, address: 00000000000000f8\n[2570283.681283][T4126959] #PF: supervisor read access in kernel mode\n[2570283.695678][T4126959] #PF: error_code(0x0000) - not-present page\n[2570283.710013][T4126959] PGD 0 P4D 0\n[2570283.721649][T4126959] Oops: 0000 [#1] SMP PTI\n[2570283.734108][T4126959] CPU: 23 PID: 4126959 Comm: ethtool Tainted: G O 5.10.20-cloudflare-2021.3.1 #1\n[2570283.752641][T4126959] Hardware name: \n[2570283.781408][T4126959] RIP: 0010:efx_ethtool_get_stats+0x2ca/0x330 [sfc]\n[2570283.796073][T4126959] Code: 00 85 c0 74 39 48 8b 95 a8 0f 00 00 48 85 d2 74 2d 31 c0 eb 07 48 8b 95 a8 0f 00 00 48 63 c8 49 83 c4 08 83 c0 01 48 8b 14 ca <48> 8b 92 f8 00 00 00 49 89 54 24 f8 39 85 a0 0f 00 00 77 d7 48 8b\n[2570283.831259][T4126959] RSP: 0018:ffffb79a77657ce8 EFLAGS: 00010202\n[2570283.845121][T4126959] RAX: 0000000000000019 RBX: ffffb799cd0c9280 RCX: 0000000000000018\n[2570283.860872][T4126959] RDX: 0000000000000000 RSI: ffff96dd970ce000 RDI: 0000000000000005\n[2570283.876525][T4126959] RBP: ffff96dd86f0a000 R08: ffff96dd970ce480 R09: 000000000000005f\n[2570283.892014][T4126959] R10: ffffb799cd0c9fff R11: ffffb799cd0c9000 R12: ffffb799cd0c94f8\n[2570283.907406][T4126959] R13: ffffffffc11b1090 R14: ffff96dd970ce000 R15: ffffffffc11cd66c\n[2570283.922705][T4126959] FS: 00007fa7723f8740(0000) GS:ffff96f51fac0000(0000) knlGS:0000000000000000\n[2570283.938848][T4126959] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[2570283.952524][T4126959] CR2: 00000000000000f8 CR3: 0000001a73e6e006 CR4: 00000000007706e0\n[2570283.967529][T4126959] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n[2570283.982400][T4126959] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n[2570283.997308][T4126959] PKRU: 55555554\n[2570284.007649][T4126959] Call Trace:\n[2570284.017598][T4126959] dev_ethtool+0x1832/0x2830\n\nFix this by adjusting efx->xdp_tx_queue_count after probing to reflect the true\nvalue of initialized slots in efx->xdp_tx_queues.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-0400", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-0400", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-0400", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-0400", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-0400", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-0400" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-46947", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-46947", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-46947", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-46947", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-46947", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-46947" } }, - "CVE-2022-0433": { - "affected_versions": "v5.16-rc1 to v5.17-rc1", - "breaks": "9330986c03006ab1d33d243b7cfe598a7a3c1baa", - "cmt_msg": "bpf: Add missing map_get_next_key method to bloom filter map.", - "cvss2": { - "Access Complexity": "Low", - "Access Vector": "Local Access", - "Authentication": "None", - "Availability Impact": "Complete", - "Confidentiality Impact": "None", - "Integrity Impact": "None", - "raw": "AV:L/AC:L/Au:N/C:N/I:N/A:C", - "score": 4.9 - }, - "cvss3": { - "Attack Complexity": "Low", - "Attack Vector": "Local", - "Availability": "High", - "Confidentiality": "None", - "Integrity": "None", - "Privileges Required": "Low", - "Scope": "Unchanged", - "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", - "score": 5.5 - }, - "cwe": "NULL Pointer Dereference", - "fixes": "3ccdcee28415c4226de05438b4d89eb5514edf73", - "last_affected_version": "5.16.2", - "last_modified": "2023-12-06", - "nvd_text": "A NULL pointer dereference flaw was found in the Linux kernel's BPF subsystem in the way a user triggers the map_get_next_key function of the BPF bloom filter. This flaw allows a local user to crash the system. This flaw affects Linux kernel versions prior to 5.17-rc1.", + "CVE-2021-46948": { + "affected_versions": "v5.10-rc1 to v5.13-rc1", + "breaks": "12804793b17c0e19115a90d98f2f3df0cb79e233", + "cmt_msg": "sfc: farch: fix TX queue lookup in TX event handling", + "fixes": "83b09a1807415608b387c7bc748d329fefc5617e", + "last_affected_version": "5.12.2", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsfc: farch: fix TX queue lookup in TX event handling\n\nWe're starting from a TXQ label, not a TXQ type, so\n efx_channel_get_tx_queue() is inappropriate (and could return NULL,\n leading to panics).", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-0433", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-0433", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-0433", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-0433", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-0433", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-0433" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-46948", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-46948", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-46948", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-46948", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-46948", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-46948" + } + }, + "CVE-2021-46949": { + "affected_versions": "v5.10-rc1 to v5.13-rc1", + "breaks": "12804793b17c0e19115a90d98f2f3df0cb79e233", + "cmt_msg": "sfc: farch: fix TX queue lookup in TX flush done handling", + "fixes": "5b1faa92289b53cad654123ed2bc8e10f6ddd4ac", + "last_affected_version": "5.12.2", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsfc: farch: fix TX queue lookup in TX flush done handling\n\nWe're starting from a TXQ instance number ('qid'), not a TXQ type, so\n efx_get_tx_queue() is inappropriate (and could return NULL, leading\n to panics).", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-46949", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-46949", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-46949", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-46949", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-46949", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-46949" + } + }, + "CVE-2021-46950": { + "affected_versions": "unk to v5.13-rc1", + "breaks": "", + "cmt_msg": "md/raid1: properly indicate failure when ending a failed write request", + "fixes": "2417b9869b81882ab90fd5ed1081a1cb2d4db1dd", + "last_affected_version": "5.12.2", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmd/raid1: properly indicate failure when ending a failed write request\n\nThis patch addresses a data corruption bug in raid1 arrays using bitmaps.\nWithout this fix, the bitmap bits for the failed I/O end up being cleared.\n\nSince we are in the failure leg of raid1_end_write_request, the request\neither needs to be retried (R1BIO_WriteError) or failed (R1BIO_Degraded).", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-46950", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-46950", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-46950", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-46950", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-46950", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-46950" + } + }, + "CVE-2021-46951": { + "affected_versions": "unk to v5.13-rc1", + "breaks": "", + "cmt_msg": "tpm: efi: Use local variable for calculating final log size", + "fixes": "48cff270b037022e37835d93361646205ca25101", + "last_affected_version": "5.12.2", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntpm: efi: Use local variable for calculating final log size\n\nWhen tpm_read_log_efi is called multiple times, which happens when\none loads and unloads a TPM2 driver multiple times, then the global\nvariable efi_tpm_final_log_size will at some point become a negative\nnumber due to the subtraction of final_events_preboot_size occurring\neach time. Use a local variable to avoid this integer underflow.\n\nThe following issue is now resolved:\n\nMar 8 15:35:12 hibinst kernel: Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 0.0.0 02/06/2015\nMar 8 15:35:12 hibinst kernel: Workqueue: tpm-vtpm vtpm_proxy_work [tpm_vtpm_proxy]\nMar 8 15:35:12 hibinst kernel: RIP: 0010:__memcpy+0x12/0x20\nMar 8 15:35:12 hibinst kernel: Code: 00 b8 01 00 00 00 85 d2 74 0a c7 05 44 7b ef 00 0f 00 00 00 c3 cc cc cc 66 66 90 66 90 48 89 f8 48 89 d1 48 c1 e9 03 83 e2 07 48 a5 89 d1 f3 a4 c3 66 0f 1f 44 00 00 48 89 f8 48 89 d1 f3 a4\nMar 8 15:35:12 hibinst kernel: RSP: 0018:ffff9ac4c0fcfde0 EFLAGS: 00010206\nMar 8 15:35:12 hibinst kernel: RAX: ffff88f878cefed5 RBX: ffff88f878ce9000 RCX: 1ffffffffffffe0f\nMar 8 15:35:12 hibinst kernel: RDX: 0000000000000003 RSI: ffff9ac4c003bff9 RDI: ffff88f878cf0e4d\nMar 8 15:35:12 hibinst kernel: RBP: ffff9ac4c003b000 R08: 0000000000001000 R09: 000000007e9d6073\nMar 8 15:35:12 hibinst kernel: R10: ffff9ac4c003b000 R11: ffff88f879ad3500 R12: 0000000000000ed5\nMar 8 15:35:12 hibinst kernel: R13: ffff88f878ce9760 R14: 0000000000000002 R15: ffff88f77de7f018\nMar 8 15:35:12 hibinst kernel: FS: 0000000000000000(0000) GS:ffff88f87bd00000(0000) knlGS:0000000000000000\nMar 8 15:35:12 hibinst kernel: CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nMar 8 15:35:12 hibinst kernel: CR2: ffff9ac4c003c000 CR3: 00000001785a6004 CR4: 0000000000060ee0\nMar 8 15:35:12 hibinst kernel: Call Trace:\nMar 8 15:35:12 hibinst kernel: tpm_read_log_efi+0x152/0x1a7\nMar 8 15:35:12 hibinst kernel: tpm_bios_log_setup+0xc8/0x1c0\nMar 8 15:35:12 hibinst kernel: tpm_chip_register+0x8f/0x260\nMar 8 15:35:12 hibinst kernel: vtpm_proxy_work+0x16/0x60 [tpm_vtpm_proxy]\nMar 8 15:35:12 hibinst kernel: process_one_work+0x1b4/0x370\nMar 8 15:35:12 hibinst kernel: worker_thread+0x53/0x3e0\nMar 8 15:35:12 hibinst kernel: ? process_one_work+0x370/0x370", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-46951", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-46951", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-46951", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-46951", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-46951", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-46951" + } + }, + "CVE-2021-46952": { + "affected_versions": "unk to v5.13-rc1", + "breaks": "", + "cmt_msg": "NFS: fs_context: validate UDP retrans to prevent shift out-of-bounds", + "fixes": "c09f11ef35955785f92369e25819bf0629df2e59", + "last_affected_version": "5.12.2", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nNFS: fs_context: validate UDP retrans to prevent shift out-of-bounds\n\nFix shift out-of-bounds in xprt_calc_majortimeo(). This is caused\nby a garbage timeout (retrans) mount option being passed to nfs mount,\nin this case from syzkaller.\n\nIf the protocol is XPRT_TRANSPORT_UDP, then 'retrans' is a shift\nvalue for a 64-bit long integer, so 'retrans' cannot be >= 64.\nIf it is >= 64, fail the mount and return an error.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-46952", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-46952", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-46952", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-46952", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-46952", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-46952" + } + }, + "CVE-2021-46953": { + "affected_versions": "v4.12-rc1 to v5.13-rc1", + "breaks": "ca9ae5ec4ef0ed13833b03297ab319676965492c", + "cmt_msg": "ACPI: GTDT: Don't corrupt interrupt mappings on watchdow probe failure", + "fixes": "1ecd5b129252249b9bc03d7645a7bda512747277", + "last_affected_version": "5.12.2", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nACPI: GTDT: Don't corrupt interrupt mappings on watchdow probe failure\n\nWhen failing the driver probe because of invalid firmware properties,\nthe GTDT driver unmaps the interrupt that it mapped earlier.\n\nHowever, it never checks whether the mapping of the interrupt actially\nsucceeded. Even more, should the firmware report an illegal interrupt\nnumber that overlaps with the GIC SGI range, this can result in an\nIPI being unmapped, and subsequent fireworks (as reported by Dann\nFrazier).\n\nRework the driver to have a slightly saner behaviour and actually\ncheck whether the interrupt has been mapped before unmapping things.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-46953", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-46953", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-46953", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-46953", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-46953", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-46953" + } + }, + "CVE-2021-46954": { + "affected_versions": "v5.11-rc1 to v5.13-rc1", + "breaks": "c129412f74e99b609f0a8e95fc3915af1fd40f34", + "cmt_msg": "net/sched: sch_frag: fix stack OOB read while fragmenting IPv4 packets", + "fixes": "31fe34a0118e0acc958c802e830ad5d37ef6b1d3", + "last_affected_version": "5.12.2", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: sch_frag: fix stack OOB read while fragmenting IPv4 packets\n\nwhen 'act_mirred' tries to fragment IPv4 packets that had been previously\nre-assembled using 'act_ct', splats like the following can be observed on\nkernels built with KASAN:\n\n BUG: KASAN: stack-out-of-bounds in ip_do_fragment+0x1b03/0x1f60\n Read of size 1 at addr ffff888147009574 by task ping/947\n\n CPU: 0 PID: 947 Comm: ping Not tainted 5.12.0-rc6+ #418\n Hardware name: Red Hat KVM, BIOS 1.11.1-4.module+el8.1.0+4066+0f1aadab 04/01/2014\n Call Trace:\n \n dump_stack+0x92/0xc1\n print_address_description.constprop.7+0x1a/0x150\n kasan_report.cold.13+0x7f/0x111\n ip_do_fragment+0x1b03/0x1f60\n sch_fragment+0x4bf/0xe40\n tcf_mirred_act+0xc3d/0x11a0 [act_mirred]\n tcf_action_exec+0x104/0x3e0\n fl_classify+0x49a/0x5e0 [cls_flower]\n tcf_classify_ingress+0x18a/0x820\n __netif_receive_skb_core+0xae7/0x3340\n __netif_receive_skb_one_core+0xb6/0x1b0\n process_backlog+0x1ef/0x6c0\n __napi_poll+0xaa/0x500\n net_rx_action+0x702/0xac0\n __do_softirq+0x1e4/0x97f\n do_softirq+0x71/0x90\n \n __local_bh_enable_ip+0xdb/0xf0\n ip_finish_output2+0x760/0x2120\n ip_do_fragment+0x15a5/0x1f60\n __ip_finish_output+0x4c2/0xea0\n ip_output+0x1ca/0x4d0\n ip_send_skb+0x37/0xa0\n raw_sendmsg+0x1c4b/0x2d00\n sock_sendmsg+0xdb/0x110\n __sys_sendto+0x1d7/0x2b0\n __x64_sys_sendto+0xdd/0x1b0\n do_syscall_64+0x33/0x40\n entry_SYSCALL_64_after_hwframe+0x44/0xae\n RIP: 0033:0x7f82e13853eb\n Code: 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 f3 0f 1e fa 48 8d 05 75 42 2c 00 41 89 ca 8b 00 85 c0 75 14 b8 2c 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 75 c3 0f 1f 40 00 41 57 4d 89 c7 41 56 41 89\n RSP: 002b:00007ffe01fad888 EFLAGS: 00000246 ORIG_RAX: 000000000000002c\n RAX: ffffffffffffffda RBX: 00005571aac13700 RCX: 00007f82e13853eb\n RDX: 0000000000002330 RSI: 00005571aac13700 RDI: 0000000000000003\n RBP: 0000000000002330 R08: 00005571aac10500 R09: 0000000000000010\n R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffe01faefb0\n R13: 00007ffe01fad890 R14: 00007ffe01fad980 R15: 00005571aac0f0a0\n\n The buggy address belongs to the page:\n page:000000001dff2e03 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x147009\n flags: 0x17ffffc0001000(reserved)\n raw: 0017ffffc0001000 ffffea00051c0248 ffffea00051c0248 0000000000000000\n raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000\n page dumped because: kasan: bad access detected\n\n Memory state around the buggy address:\n ffff888147009400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00\n ffff888147009480: f1 f1 f1 f1 04 f2 f2 f2 f2 f2 f2 f2 00 00 00 00\n >ffff888147009500: 00 00 00 00 00 00 00 00 00 00 f2 f2 f2 f2 f2 f2\n ^\n ffff888147009580: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00\n ffff888147009600: 00 00 00 00 00 00 00 00 00 00 00 00 00 f2 f2 f2\n\nfor IPv4 packets, sch_fragment() uses a temporary struct dst_entry. Then,\nin the following call graph:\n\n ip_do_fragment()\n ip_skb_dst_mtu()\n ip_dst_mtu_maybe_forward()\n ip_mtu_locked()\n\nthe pointer to struct dst_entry is used as pointer to struct rtable: this\nturns the access to struct members like rt_mtu_locked into an OOB read in\nthe stack. Fix this changing the temporary variable used for IPv4 packets\nin sch_fragment(), similarly to what is done for IPv6 few lines below.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-46954", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-46954", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-46954", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-46954", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-46954", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-46954" + } + }, + "CVE-2021-46955": { + "affected_versions": "v4.16-rc7 to v5.13-rc1", + "breaks": "d52e5a7e7ca49457dd31fc8b42fb7c0d58a31221", + "cmt_msg": "openvswitch: fix stack OOB read while fragmenting IPv4 packets", + "fixes": "7c0ea5930c1c211931819d83cfb157bff1539a4c", + "last_affected_version": "5.12.2", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nopenvswitch: fix stack OOB read while fragmenting IPv4 packets\n\nrunning openvswitch on kernels built with KASAN, it's possible to see the\nfollowing splat while testing fragmentation of IPv4 packets:\n\n BUG: KASAN: stack-out-of-bounds in ip_do_fragment+0x1b03/0x1f60\n Read of size 1 at addr ffff888112fc713c by task handler2/1367\n\n CPU: 0 PID: 1367 Comm: handler2 Not tainted 5.12.0-rc6+ #418\n Hardware name: Red Hat KVM, BIOS 1.11.1-4.module+el8.1.0+4066+0f1aadab 04/01/2014\n Call Trace:\n dump_stack+0x92/0xc1\n print_address_description.constprop.7+0x1a/0x150\n kasan_report.cold.13+0x7f/0x111\n ip_do_fragment+0x1b03/0x1f60\n ovs_fragment+0x5bf/0x840 [openvswitch]\n do_execute_actions+0x1bd5/0x2400 [openvswitch]\n ovs_execute_actions+0xc8/0x3d0 [openvswitch]\n ovs_packet_cmd_execute+0xa39/0x1150 [openvswitch]\n genl_family_rcv_msg_doit.isra.15+0x227/0x2d0\n genl_rcv_msg+0x287/0x490\n netlink_rcv_skb+0x120/0x380\n genl_rcv+0x24/0x40\n netlink_unicast+0x439/0x630\n netlink_sendmsg+0x719/0xbf0\n sock_sendmsg+0xe2/0x110\n ____sys_sendmsg+0x5ba/0x890\n ___sys_sendmsg+0xe9/0x160\n __sys_sendmsg+0xd3/0x170\n do_syscall_64+0x33/0x40\n entry_SYSCALL_64_after_hwframe+0x44/0xae\n RIP: 0033:0x7f957079db07\n Code: c3 66 90 41 54 41 89 d4 55 48 89 f5 53 89 fb 48 83 ec 10 e8 eb ec ff ff 44 89 e2 48 89 ee 89 df 41 89 c0 b8 2e 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 35 44 89 c7 48 89 44 24 08 e8 24 ed ff ff 48\n RSP: 002b:00007f956ce35a50 EFLAGS: 00000293 ORIG_RAX: 000000000000002e\n RAX: ffffffffffffffda RBX: 0000000000000019 RCX: 00007f957079db07\n RDX: 0000000000000000 RSI: 00007f956ce35ae0 RDI: 0000000000000019\n RBP: 00007f956ce35ae0 R08: 0000000000000000 R09: 00007f9558006730\n R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000\n R13: 00007f956ce37308 R14: 00007f956ce35f80 R15: 00007f956ce35ae0\n\n The buggy address belongs to the page:\n page:00000000af2a1d93 refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x112fc7\n flags: 0x17ffffc0000000()\n raw: 0017ffffc0000000 0000000000000000 dead000000000122 0000000000000000\n raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000\n page dumped because: kasan: bad access detected\n\n addr ffff888112fc713c is located in stack of task handler2/1367 at offset 180 in frame:\n ovs_fragment+0x0/0x840 [openvswitch]\n\n this frame has 2 objects:\n [32, 144) 'ovs_dst'\n [192, 424) 'ovs_rt'\n\n Memory state around the buggy address:\n ffff888112fc7000: f3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00\n ffff888112fc7080: 00 f1 f1 f1 f1 00 00 00 00 00 00 00 00 00 00 00\n >ffff888112fc7100: 00 00 00 f2 f2 f2 f2 f2 f2 00 00 00 00 00 00 00\n ^\n ffff888112fc7180: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00\n ffff888112fc7200: 00 00 00 00 00 00 f2 f2 f2 00 00 00 00 00 00 00\n\nfor IPv4 packets, ovs_fragment() uses a temporary struct dst_entry. Then,\nin the following call graph:\n\n ip_do_fragment()\n ip_skb_dst_mtu()\n ip_dst_mtu_maybe_forward()\n ip_mtu_locked()\n\nthe pointer to struct dst_entry is used as pointer to struct rtable: this\nturns the access to struct members like rt_mtu_locked into an OOB read in\nthe stack. Fix this changing the temporary variable used for IPv4 packets\nin ovs_fragment(), similarly to what is done for IPv6 few lines below.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-46955", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-46955", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-46955", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-46955", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-46955", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-46955" + } + }, + "CVE-2021-46956": { + "affected_versions": "v5.4-rc1 to v5.13-rc1", + "breaks": "a62a8ef9d97da23762a588592c8b8eb50a8deb6a", + "cmt_msg": "virtiofs: fix memory leak in virtio_fs_probe()", + "fixes": "c79c5e0178922a9e092ec8fed026750f39dcaef4", + "last_affected_version": "5.12.2", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvirtiofs: fix memory leak in virtio_fs_probe()\n\nWhen accidentally passing twice the same tag to qemu, kmemleak ended up\nreporting a memory leak in virtiofs. Also, looking at the log I saw the\nfollowing error (that's when I realised the duplicated tag):\n\n virtiofs: probe of virtio5 failed with error -17\n\nHere's the kmemleak log for reference:\n\nunreferenced object 0xffff888103d47800 (size 1024):\n comm \"systemd-udevd\", pid 118, jiffies 4294893780 (age 18.340s)\n hex dump (first 32 bytes):\n 00 00 00 00 ad 4e ad de ff ff ff ff 00 00 00 00 .....N..........\n ff ff ff ff ff ff ff ff 80 90 02 a0 ff ff ff ff ................\n backtrace:\n [<000000000ebb87c1>] virtio_fs_probe+0x171/0x7ae [virtiofs]\n [<00000000f8aca419>] virtio_dev_probe+0x15f/0x210\n [<000000004d6baf3c>] really_probe+0xea/0x430\n [<00000000a6ceeac8>] device_driver_attach+0xa8/0xb0\n [<00000000196f47a7>] __driver_attach+0x98/0x140\n [<000000000b20601d>] bus_for_each_dev+0x7b/0xc0\n [<00000000399c7b7f>] bus_add_driver+0x11b/0x1f0\n [<0000000032b09ba7>] driver_register+0x8f/0xe0\n [<00000000cdd55998>] 0xffffffffa002c013\n [<000000000ea196a2>] do_one_initcall+0x64/0x2e0\n [<0000000008f727ce>] do_init_module+0x5c/0x260\n [<000000003cdedab6>] __do_sys_finit_module+0xb5/0x120\n [<00000000ad2f48c6>] do_syscall_64+0x33/0x40\n [<00000000809526b5>] entry_SYSCALL_64_after_hwframe+0x44/0xae", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-46956", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-46956", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-46956", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-46956", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-46956", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-46956" + } + }, + "CVE-2021-46957": { + "affected_versions": "v5.12-rc1-dontuse to v5.13-rc1", + "breaks": "c22b0bcb1dd024cb9caad9230e3a387d8b061df5", + "cmt_msg": "riscv/kprobe: fix kernel panic when invoking sys_read traced by kprobe", + "fixes": "b1ebaa0e1318494a7637099a26add50509e37964", + "last_affected_version": "5.12.2", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nriscv/kprobe: fix kernel panic when invoking sys_read traced by kprobe\n\nThe execution of sys_read end up hitting a BUG_ON() in __find_get_block\nafter installing kprobe at sys_read, the BUG message like the following:\n\n[ 65.708663] ------------[ cut here ]------------\n[ 65.709987] kernel BUG at fs/buffer.c:1251!\n[ 65.711283] Kernel BUG [#1]\n[ 65.712032] Modules linked in:\n[ 65.712925] CPU: 0 PID: 51 Comm: sh Not tainted 5.12.0-rc4 #1\n[ 65.714407] Hardware name: riscv-virtio,qemu (DT)\n[ 65.715696] epc : __find_get_block+0x218/0x2c8\n[ 65.716835] ra : __getblk_gfp+0x1c/0x4a\n[ 65.717831] epc : ffffffe00019f11e ra : ffffffe00019f56a sp : ffffffe002437930\n[ 65.719553] gp : ffffffe000f06030 tp : ffffffe0015abc00 t0 : ffffffe00191e038\n[ 65.721290] t1 : ffffffe00191e038 t2 : 000000000000000a s0 : ffffffe002437960\n[ 65.723051] s1 : ffffffe00160ad00 a0 : ffffffe00160ad00 a1 : 000000000000012a\n[ 65.724772] a2 : 0000000000000400 a3 : 0000000000000008 a4 : 0000000000000040\n[ 65.726545] a5 : 0000000000000000 a6 : ffffffe00191e000 a7 : 0000000000000000\n[ 65.728308] s2 : 000000000000012a s3 : 0000000000000400 s4 : 0000000000000008\n[ 65.730049] s5 : 000000000000006c s6 : ffffffe00240f800 s7 : ffffffe000f080a8\n[ 65.731802] s8 : 0000000000000001 s9 : 000000000000012a s10: 0000000000000008\n[ 65.733516] s11: 0000000000000008 t3 : 00000000000003ff t4 : 000000000000000f\n[ 65.734434] t5 : 00000000000003ff t6 : 0000000000040000\n[ 65.734613] status: 0000000000000100 badaddr: 0000000000000000 cause: 0000000000000003\n[ 65.734901] Call Trace:\n[ 65.735076] [] __find_get_block+0x218/0x2c8\n[ 65.735417] [] __ext4_get_inode_loc+0xb2/0x2f6\n[ 65.735618] [] ext4_get_inode_loc+0x3a/0x8a\n[ 65.735802] [] ext4_reserve_inode_write+0x2e/0x8c\n[ 65.735999] [] __ext4_mark_inode_dirty+0x4c/0x18e\n[ 65.736208] [] ext4_dirty_inode+0x46/0x66\n[ 65.736387] [] __mark_inode_dirty+0x12c/0x3da\n[ 65.736576] [] touch_atime+0x146/0x150\n[ 65.736748] [] filemap_read+0x234/0x246\n[ 65.736920] [] generic_file_read_iter+0xc0/0x114\n[ 65.737114] [] ext4_file_read_iter+0x42/0xea\n[ 65.737310] [] new_sync_read+0xe2/0x15a\n[ 65.737483] [] vfs_read+0xca/0xf2\n[ 65.737641] [] ksys_read+0x5e/0xc8\n[ 65.737816] [] sys_read+0xe/0x16\n[ 65.737973] [] ret_from_syscall+0x0/0x2\n[ 65.738858] ---[ end trace fe93f985456c935d ]---\n\nA simple reproducer looks like:\n\techo 'p:myprobe sys_read fd=%a0 buf=%a1 count=%a2' > /sys/kernel/debug/tracing/kprobe_events\n\techo 1 > /sys/kernel/debug/tracing/events/kprobes/myprobe/enable\n\tcat /sys/kernel/debug/tracing/trace\n\nHere's what happens to hit that BUG_ON():\n\n1) After installing kprobe at entry of sys_read, the first instruction\n is replaced by 'ebreak' instruction on riscv64 platform.\n\n2) Once kernel reach the 'ebreak' instruction at the entry of sys_read,\n it trap into the riscv breakpoint handler, where it do something to\n setup for coming single-step of origin instruction, including backup\n the 'sstatus' in pt_regs, followed by disable interrupt during single\n stepping via clear 'SIE' bit of 'sstatus' in pt_regs.\n\n3) Then kernel restore to the instruction slot contains two instructions,\n one is original instruction at entry of sys_read, the other is 'ebreak'.\n Here it trigger a 'Instruction page fault' exception (value at 'scause'\n is '0xc'), if PF is not filled into PageTabe for that slot yet.\n\n4) Again kernel trap into page fault exception handler, where it choose\n different policy according to the state of running kprobe. Because\n afte 2) the state is KPROBE_HIT_SS, so kernel reset the current kp\n---truncated---", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-46957", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-46957", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-46957", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-46957", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-46957", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-46957" + } + }, + "CVE-2021-46958": { + "affected_versions": "v5.7-rc4 to v5.13-rc1", + "breaks": "ef67963dac255b293e19815ea3d440567be4626f", + "cmt_msg": "btrfs: fix race between transaction aborts and fsyncs leading to use-after-free", + "fixes": "061dde8245356d8864d29e25207aa4daa0be4d3c", + "last_affected_version": "5.12.2", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: fix race between transaction aborts and fsyncs leading to use-after-free\n\nThere is a race between a task aborting a transaction during a commit,\na task doing an fsync and the transaction kthread, which leads to an\nuse-after-free of the log root tree. When this happens, it results in a\nstack trace like the following:\n\n BTRFS info (device dm-0): forced readonly\n BTRFS warning (device dm-0): Skipping commit of aborted transaction.\n BTRFS: error (device dm-0) in cleanup_transaction:1958: errno=-5 IO failure\n BTRFS warning (device dm-0): lost page write due to IO error on /dev/mapper/error-test (-5)\n BTRFS warning (device dm-0): Skipping commit of aborted transaction.\n BTRFS warning (device dm-0): direct IO failed ino 261 rw 0,0 sector 0xa4e8 len 4096 err no 10\n BTRFS error (device dm-0): error writing primary super block to device 1\n BTRFS warning (device dm-0): direct IO failed ino 261 rw 0,0 sector 0x12e000 len 4096 err no 10\n BTRFS warning (device dm-0): direct IO failed ino 261 rw 0,0 sector 0x12e008 len 4096 err no 10\n BTRFS warning (device dm-0): direct IO failed ino 261 rw 0,0 sector 0x12e010 len 4096 err no 10\n BTRFS: error (device dm-0) in write_all_supers:4110: errno=-5 IO failure (1 errors while writing supers)\n BTRFS: error (device dm-0) in btrfs_sync_log:3308: errno=-5 IO failure\n general protection fault, probably for non-canonical address 0x6b6b6b6b6b6b6b68: 0000 [#1] PREEMPT SMP DEBUG_PAGEALLOC PTI\n CPU: 2 PID: 2458471 Comm: fsstress Not tainted 5.12.0-rc5-btrfs-next-84 #1\n Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014\n RIP: 0010:__mutex_lock+0x139/0xa40\n Code: c0 74 19 (...)\n RSP: 0018:ffff9f18830d7b00 EFLAGS: 00010202\n RAX: 6b6b6b6b6b6b6b68 RBX: 0000000000000001 RCX: 0000000000000002\n RDX: ffffffffb9c54d13 RSI: 0000000000000000 RDI: 0000000000000000\n RBP: ffff9f18830d7bc0 R08: 0000000000000000 R09: 0000000000000000\n R10: ffff9f18830d7be0 R11: 0000000000000001 R12: ffff8c6cd199c040\n R13: ffff8c6c95821358 R14: 00000000fffffffb R15: ffff8c6cbcf01358\n FS: 00007fa9140c2b80(0000) GS:ffff8c6fac600000(0000) knlGS:0000000000000000\n CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 00007fa913d52000 CR3: 000000013d2b4003 CR4: 0000000000370ee0\n DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n Call Trace:\n ? __btrfs_handle_fs_error+0xde/0x146 [btrfs]\n ? btrfs_sync_log+0x7c1/0xf20 [btrfs]\n ? btrfs_sync_log+0x7c1/0xf20 [btrfs]\n btrfs_sync_log+0x7c1/0xf20 [btrfs]\n btrfs_sync_file+0x40c/0x580 [btrfs]\n do_fsync+0x38/0x70\n __x64_sys_fsync+0x10/0x20\n do_syscall_64+0x33/0x80\n entry_SYSCALL_64_after_hwframe+0x44/0xae\n RIP: 0033:0x7fa9142a55c3\n Code: 8b 15 09 (...)\n RSP: 002b:00007fff26278d48 EFLAGS: 00000246 ORIG_RAX: 000000000000004a\n RAX: ffffffffffffffda RBX: 0000563c83cb4560 RCX: 00007fa9142a55c3\n RDX: 00007fff26278cb0 RSI: 00007fff26278cb0 RDI: 0000000000000005\n RBP: 0000000000000005 R08: 0000000000000001 R09: 00007fff26278d5c\n R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000340\n R13: 00007fff26278de0 R14: 00007fff26278d96 R15: 0000563c83ca57c0\n Modules linked in: btrfs dm_zero dm_snapshot dm_thin_pool (...)\n ---[ end trace ee2f1b19327d791d ]---\n\nThe steps that lead to this crash are the following:\n\n1) We are at transaction N;\n\n2) We have two tasks with a transaction handle attached to transaction N.\n Task A and Task B. Task B is doing an fsync;\n\n3) Task B is at btrfs_sync_log(), and has saved fs_info->log_root_tree\n into a local variable named 'log_root_tree' at the top of\n btrfs_sync_log(). Task B is about to call write_all_supers(), but\n before that...\n\n4) Task A calls btrfs_commit_transaction(), and after it sets the\n transaction state to TRANS_STATE_COMMIT_START, an error happens before\n it w\n---truncated---", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-46958", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-46958", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-46958", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-46958", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-46958", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-46958" + } + }, + "CVE-2021-46959": { + "affected_versions": "v2.6.12-rc2 to v5.13-rc1", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "spi: Fix use-after-free with devm_spi_alloc_*", + "fixes": "794aaf01444d4e765e2b067cba01cc69c1c68ed9", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nspi: Fix use-after-free with devm_spi_alloc_*\n\nWe can't rely on the contents of the devres list during\nspi_unregister_controller(), as the list is already torn down at the\ntime we perform devres_find() for devm_spi_release_controller. This\ncauses devices registered with devm_spi_alloc_{master,slave}() to be\nmistakenly identified as legacy, non-devm managed devices and have their\nreference counters decremented below 0.\n\n------------[ cut here ]------------\nWARNING: CPU: 1 PID: 660 at lib/refcount.c:28 refcount_warn_saturate+0x108/0x174\n[] (refcount_warn_saturate) from [] (kobject_put+0x90/0x98)\n[] (kobject_put) from [] (put_device+0x20/0x24)\n r4:b6700140\n[] (put_device) from [] (devm_spi_release_controller+0x3c/0x40)\n[] (devm_spi_release_controller) from [] (release_nodes+0x84/0xc4)\n r5:b6700180 r4:b6700100\n[] (release_nodes) from [] (devres_release_all+0x5c/0x60)\n r8:b1638c54 r7:b117ad94 r6:b1638c10 r5:b117ad94 r4:b163dc10\n[] (devres_release_all) from [] (__device_release_driver+0x144/0x1ec)\n r5:b117ad94 r4:b163dc10\n[] (__device_release_driver) from [] (device_driver_detach+0x84/0xa0)\n r9:00000000 r8:00000000 r7:b117ad94 r6:b163dc54 r5:b1638c10 r4:b163dc10\n[] (device_driver_detach) from [] (unbind_store+0xe4/0xf8)\n\nInstead, determine the devm allocation state as a flag on the\ncontroller which is guaranteed to be stable during cleanup.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-46959", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-46959", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-46959", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-46959", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-46959", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-46959" + } + }, + "CVE-2021-46960": { + "affected_versions": "v4.11-rc1 to v5.13-rc1", + "breaks": "61cfac6f267dabcf2740a7ec8a0295833b28b5f5", + "cmt_msg": "cifs: Return correct error code from smb2_get_enc_key", + "fixes": "83728cbf366e334301091d5b808add468ab46b27", + "last_affected_version": "5.12.2", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncifs: Return correct error code from smb2_get_enc_key\n\nAvoid a warning if the error percolates back up:\n\n[440700.376476] CIFS VFS: \\\\otters.example.com crypt_message: Could not get encryption key\n[440700.386947] ------------[ cut here ]------------\n[440700.386948] err = 1\n[440700.386977] WARNING: CPU: 11 PID: 2733 at /build/linux-hwe-5.4-p6lk6L/linux-hwe-5.4-5.4.0/lib/errseq.c:74 errseq_set+0x5c/0x70\n...\n[440700.397304] CPU: 11 PID: 2733 Comm: tar Tainted: G OE 5.4.0-70-generic #78~18.04.1-Ubuntu\n...\n[440700.397334] Call Trace:\n[440700.397346] __filemap_set_wb_err+0x1a/0x70\n[440700.397419] cifs_writepages+0x9c7/0xb30 [cifs]\n[440700.397426] do_writepages+0x4b/0xe0\n[440700.397444] __filemap_fdatawrite_range+0xcb/0x100\n[440700.397455] filemap_write_and_wait+0x42/0xa0\n[440700.397486] cifs_setattr+0x68b/0xf30 [cifs]\n[440700.397493] notify_change+0x358/0x4a0\n[440700.397500] utimes_common+0xe9/0x1c0\n[440700.397510] do_utimes+0xc5/0x150\n[440700.397520] __x64_sys_utimensat+0x88/0xd0", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-46960", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-46960", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-46960", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-46960", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-46960", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-46960" + } + }, + "CVE-2021-46961": { + "affected_versions": "v5.1-rc1 to v5.13-rc1", + "breaks": "3f1f3234bc2db1c16b9818b9a15a5d58ad45251c", + "cmt_msg": "irqchip/gic-v3: Do not enable irqs when handling spurious interrups", + "fixes": "a97709f563a078e259bf0861cd259aa60332890a", + "last_affected_version": "5.12.2", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nirqchip/gic-v3: Do not enable irqs when handling spurious interrups\n\nWe triggered the following error while running our 4.19 kernel\nwith the pseudo-NMI patches backported to it:\n\n[ 14.816231] ------------[ cut here ]------------\n[ 14.816231] kernel BUG at irq.c:99!\n[ 14.816232] Internal error: Oops - BUG: 0 [#1] SMP\n[ 14.816232] Process swapper/0 (pid: 0, stack limit = 0x(____ptrval____))\n[ 14.816233] CPU: 0 PID: 0 Comm: swapper/0 Tainted: G O 4.19.95.aarch64 #14\n[ 14.816233] Hardware name: evb (DT)\n[ 14.816234] pstate: 80400085 (Nzcv daIf +PAN -UAO)\n[ 14.816234] pc : asm_nmi_enter+0x94/0x98\n[ 14.816235] lr : asm_nmi_enter+0x18/0x98\n[ 14.816235] sp : ffff000008003c50\n[ 14.816235] pmr_save: 00000070\n[ 14.816237] x29: ffff000008003c50 x28: ffff0000095f56c0\n[ 14.816238] x27: 0000000000000000 x26: ffff000008004000\n[ 14.816239] x25: 00000000015e0000 x24: ffff8008fb916000\n[ 14.816240] x23: 0000000020400005 x22: ffff0000080817cc\n[ 14.816241] x21: ffff000008003da0 x20: 0000000000000060\n[ 14.816242] x19: 00000000000003ff x18: ffffffffffffffff\n[ 14.816243] x17: 0000000000000008 x16: 003d090000000000\n[ 14.816244] x15: ffff0000095ea6c8 x14: ffff8008fff5ab40\n[ 14.816244] x13: ffff8008fff58b9d x12: 0000000000000000\n[ 14.816245] x11: ffff000008c8a200 x10: 000000008e31fca5\n[ 14.816246] x9 : ffff000008c8a208 x8 : 000000000000000f\n[ 14.816247] x7 : 0000000000000004 x6 : ffff8008fff58b9e\n[ 14.816248] x5 : 0000000000000000 x4 : 0000000080000000\n[ 14.816249] x3 : 0000000000000000 x2 : 0000000080000000\n[ 14.816250] x1 : 0000000000120000 x0 : ffff0000095f56c0\n[ 14.816251] Call trace:\n[ 14.816251] asm_nmi_enter+0x94/0x98\n[ 14.816251] el1_irq+0x8c/0x180 (IRQ C)\n[ 14.816252] gic_handle_irq+0xbc/0x2e4\n[ 14.816252] el1_irq+0xcc/0x180 (IRQ B)\n[ 14.816253] arch_timer_handler_virt+0x38/0x58\n[ 14.816253] handle_percpu_devid_irq+0x90/0x240\n[ 14.816253] generic_handle_irq+0x34/0x50\n[ 14.816254] __handle_domain_irq+0x68/0xc0\n[ 14.816254] gic_handle_irq+0xf8/0x2e4\n[ 14.816255] el1_irq+0xcc/0x180 (IRQ A)\n[ 14.816255] arch_cpu_idle+0x34/0x1c8\n[ 14.816255] default_idle_call+0x24/0x44\n[ 14.816256] do_idle+0x1d0/0x2c8\n[ 14.816256] cpu_startup_entry+0x28/0x30\n[ 14.816256] rest_init+0xb8/0xc8\n[ 14.816257] start_kernel+0x4c8/0x4f4\n[ 14.816257] Code: 940587f1 d5384100 b9401001 36a7fd01 (d4210000)\n[ 14.816258] Modules linked in: start_dp(O) smeth(O)\n[ 15.103092] ---[ end trace 701753956cb14aa8 ]---\n[ 15.103093] Kernel panic - not syncing: Fatal exception in interrupt\n[ 15.103099] SMP: stopping secondary CPUs\n[ 15.103100] Kernel Offset: disabled\n[ 15.103100] CPU features: 0x36,a2400218\n[ 15.103100] Memory Limit: none\n\nwhich is cause by a 'BUG_ON(in_nmi())' in nmi_enter().\n\nFrom the call trace, we can find three interrupts (noted A, B, C above):\ninterrupt (A) is preempted by (B), which is further interrupted by (C).\n\nSubsequent investigations show that (B) results in nmi_enter() being\ncalled, but that it actually is a spurious interrupt. Furthermore,\ninterrupts are reenabled in the context of (B), and (C) fires with\nNMI priority. We end-up with a nested NMI situation, something\nwe definitely do not want to (and cannot) handle.\n\nThe bug here is that spurious interrupts should never result in any\nstate change, and we should just return to the interrupted context.\nMoving the handling of spurious interrupts as early as possible in\nthe GICv3 handler fixes this issue.\n\n[maz: rewrote commit message, corrected Fixes: tag]", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-46961", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-46961", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-46961", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-46961", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-46961", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-46961" + } + }, + "CVE-2021-46962": { + "affected_versions": "unk to v5.13-rc1", + "breaks": "", + "cmt_msg": "mmc: uniphier-sd: Fix a resource leak in the remove function", + "fixes": "e29c84857e2d51aa017ce04284b962742fb97d9e", + "last_affected_version": "5.12.2", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmmc: uniphier-sd: Fix a resource leak in the remove function\n\nA 'tmio_mmc_host_free()' call is missing in the remove function, in order\nto balance a 'tmio_mmc_host_alloc()' call in the probe.\nThis is done in the error handling path of the probe, but not in the remove\nfunction.\n\nAdd the missing call.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-46962", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-46962", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-46962", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-46962", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-46962", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-46962" + } + }, + "CVE-2021-46963": { + "affected_versions": "v5.5-rc1 to v5.13-rc1", + "breaks": "af2a0c51b1205327f55a7e82e530403ae1d42cbb", + "cmt_msg": "scsi: qla2xxx: Fix crash in qla2xxx_mqueuecommand()", + "fixes": "6641df81ab799f28a5d564f860233dd26cca0d93", + "last_affected_version": "5.12.2", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: qla2xxx: Fix crash in qla2xxx_mqueuecommand()\n\n RIP: 0010:kmem_cache_free+0xfa/0x1b0\n Call Trace:\n qla2xxx_mqueuecommand+0x2b5/0x2c0 [qla2xxx]\n scsi_queue_rq+0x5e2/0xa40\n __blk_mq_try_issue_directly+0x128/0x1d0\n blk_mq_request_issue_directly+0x4e/0xb0\n\nFix incorrect call to free srb in qla2xxx_mqueuecommand(), as srb is now\nallocated by upper layers. This fixes smatch warning of srb unintended\nfree.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-46963", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-46963", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-46963", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-46963", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-46963", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-46963" + } + }, + "CVE-2021-46964": { + "affected_versions": "v5.11-rc1 to v5.13-rc1", + "breaks": "a6dcfe08487e5e83b6b4214c959a9577a9ed2d9f", + "cmt_msg": "scsi: qla2xxx: Reserve extra IRQ vectors", + "fixes": "f02d4086a8f36a0e1aaebf559b54cf24a177a486", + "last_affected_version": "5.12.2", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: qla2xxx: Reserve extra IRQ vectors\n\nCommit a6dcfe08487e (\"scsi: qla2xxx: Limit interrupt vectors to number of\nCPUs\") lowers the number of allocated MSI-X vectors to the number of CPUs.\n\nThat breaks vector allocation assumptions in qla83xx_iospace_config(),\nqla24xx_enable_msix() and qla2x00_iospace_config(). Either of the functions\ncomputes maximum number of qpairs as:\n\n ha->max_qpairs = ha->msix_count - 1 (MB interrupt) - 1 (default\n response queue) - 1 (ATIO, in dual or pure target mode)\n\nmax_qpairs is set to zero in case of two CPUs and initiator mode. The\nnumber is then used to allocate ha->queue_pair_map inside\nqla2x00_alloc_queues(). No allocation happens and ha->queue_pair_map is\nleft NULL but the driver thinks there are queue pairs available.\n\nqla2xxx_queuecommand() tries to find a qpair in the map and crashes:\n\n if (ha->mqenable) {\n uint32_t tag;\n uint16_t hwq;\n struct qla_qpair *qpair = NULL;\n\n tag = blk_mq_unique_tag(cmd->request);\n hwq = blk_mq_unique_tag_to_hwq(tag);\n qpair = ha->queue_pair_map[hwq]; # <- HERE\n\n if (qpair)\n return qla2xxx_mqueuecommand(host, cmd, qpair);\n }\n\n BUG: kernel NULL pointer dereference, address: 0000000000000000\n #PF: supervisor read access in kernel mode\n #PF: error_code(0x0000) - not-present page\n PGD 0 P4D 0\n Oops: 0000 [#1] SMP PTI\n CPU: 0 PID: 72 Comm: kworker/u4:3 Tainted: G W 5.10.0-rc1+ #25\n Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.0.0-prebuilt.qemu-project.org 04/01/2014\n Workqueue: scsi_wq_7 fc_scsi_scan_rport [scsi_transport_fc]\n RIP: 0010:qla2xxx_queuecommand+0x16b/0x3f0 [qla2xxx]\n Call Trace:\n scsi_queue_rq+0x58c/0xa60\n blk_mq_dispatch_rq_list+0x2b7/0x6f0\n ? __sbitmap_get_word+0x2a/0x80\n __blk_mq_sched_dispatch_requests+0xb8/0x170\n blk_mq_sched_dispatch_requests+0x2b/0x50\n __blk_mq_run_hw_queue+0x49/0xb0\n __blk_mq_delay_run_hw_queue+0xfb/0x150\n blk_mq_sched_insert_request+0xbe/0x110\n blk_execute_rq+0x45/0x70\n __scsi_execute+0x10e/0x250\n scsi_probe_and_add_lun+0x228/0xda0\n __scsi_scan_target+0xf4/0x620\n ? __pm_runtime_resume+0x4f/0x70\n scsi_scan_target+0x100/0x110\n fc_scsi_scan_rport+0xa1/0xb0 [scsi_transport_fc]\n process_one_work+0x1ea/0x3b0\n worker_thread+0x28/0x3b0\n ? process_one_work+0x3b0/0x3b0\n kthread+0x112/0x130\n ? kthread_park+0x80/0x80\n ret_from_fork+0x22/0x30\n\nThe driver should allocate enough vectors to provide every CPU it's own HW\nqueue and still handle reserved (MB, RSP, ATIO) interrupts.\n\nThe change fixes the crash on dual core VM and prevents unbalanced QP\nallocation where nr_hw_queues is two less than the number of CPUs.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-46964", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-46964", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-46964", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-46964", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-46964", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-46964" + } + }, + "CVE-2021-46965": { + "affected_versions": "unk to v5.13-rc1", + "breaks": "", + "cmt_msg": "mtd: physmap: physmap-bt1-rom: Fix unintentional stack access", + "fixes": "683313993dbe1651c7aa00bb42a041d70e914925", + "last_affected_version": "5.12.2", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmtd: physmap: physmap-bt1-rom: Fix unintentional stack access\n\nCast &data to (char *) in order to avoid unintentionally accessing\nthe stack.\n\nNotice that data is of type u32, so any increment to &data\nwill be in the order of 4-byte chunks, and this piece of code\nis actually intended to be a byte offset.\n\nAddresses-Coverity-ID: 1497765 (\"Out-of-bounds access\")", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-46965", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-46965", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-46965", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-46965", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-46965", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-46965" + } + }, + "CVE-2021-46966": { + "affected_versions": "v5.4-rc1 to v5.13-rc1", + "breaks": "03d1571d9513369c17e6848476763ebbd10ec2cb", + "cmt_msg": "ACPI: custom_method: fix potential use-after-free issue", + "fixes": "e483bb9a991bdae29a0caa4b3a6d002c968f94aa", + "last_affected_version": "5.12.2", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nACPI: custom_method: fix potential use-after-free issue\n\nIn cm_write(), buf is always freed when reaching the end of the\nfunction. If the requested count is less than table.length, the\nallocated buffer will be freed but subsequent calls to cm_write() will\nstill try to access it.\n\nRemove the unconditional kfree(buf) at the end of the function and\nset the buf to NULL in the -EINVAL error path to match the rest of\nfunction.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-46966", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-46966", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-46966", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-46966", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-46966", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-46966" + } + }, + "CVE-2021-46967": { + "affected_versions": "v5.8-rc1 to v5.13-rc1", + "breaks": "ddd89d0a059d8e9740c75a97e0efe9bf07ee51f9", + "cmt_msg": "vhost-vdpa: fix vm_flags for virtqueue doorbell mapping", + "fixes": "3a3e0fad16d40a2aa68ddf7eea4acdf48b22dd44", + "last_affected_version": "5.12.2", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvhost-vdpa: fix vm_flags for virtqueue doorbell mapping\n\nThe virtqueue doorbell is usually implemented via registeres but we\ndon't provide the necessary vma->flags like VM_PFNMAP. This may cause\nseveral issues e.g when userspace tries to map the doorbell via vhost\nIOTLB, kernel may panic due to the page is not backed by page\nstructure. This patch fixes this by setting the necessary\nvm_flags. With this patch, try to map doorbell via IOTLB will fail\nwith bad address.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-46967", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-46967", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-46967", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-46967", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-46967", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-46967" + } + }, + "CVE-2021-46968": { + "affected_versions": "v5.10-rc3 to v5.13-rc1", + "breaks": "29c2680fd2bf3862ff5cf2957f198512493156f9", + "cmt_msg": "s390/zcrypt: fix zcard and zqueue hot-unplug memleak", + "fixes": "70fac8088cfad9f3b379c9082832b4d7532c16c2", + "last_affected_version": "5.12.2", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\ns390/zcrypt: fix zcard and zqueue hot-unplug memleak\n\nTests with kvm and a kmemdebug kernel showed, that on hot unplug the\nzcard and zqueue structs for the unplugged card or queue are not\nproperly freed because of a mismatch with get/put for the embedded\nkref counter.\n\nThis fix now adjusts the handling of the kref counters. With init the\nkref counter starts with 1. This initial value needs to drop to zero\nwith the unregister of the card or queue to trigger the release and\nfree the object.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-46968", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-46968", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-46968", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-46968", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-46968", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-46968" + } + }, + "CVE-2021-46969": { + "affected_versions": "unk to v5.13-rc1", + "breaks": "", + "cmt_msg": "bus: mhi: core: Fix invalid error returning in mhi_queue", + "fixes": "0ecc1c70dcd32c0f081b173a1a5d89952686f271", + "last_affected_version": "5.12.2", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbus: mhi: core: Fix invalid error returning in mhi_queue\n\nmhi_queue returns an error when the doorbell is not accessible in\nthe current state. This can happen when the device is in non M0\nstate, like M3, and needs to be waken-up prior ringing the DB. This\ncase is managed earlier by triggering an asynchronous M3 exit via\ncontroller resume/suspend callbacks, that in turn will cause M0\ntransition and DB update.\n\nSo, since it's not an error but just delaying of doorbell update, there\nis no reason to return an error.\n\nThis also fixes a use after free error for skb case, indeed a caller\nqueuing skb will try to free the skb if the queueing fails, but in\nthat case queueing has been done.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-46969", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-46969", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-46969", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-46969", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-46969", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-46969" + } + }, + "CVE-2021-46970": { + "affected_versions": "unk to v5.13-rc1", + "breaks": "", + "cmt_msg": "bus: mhi: pci_generic: Remove WQ_MEM_RECLAIM flag from state workqueue", + "fixes": "0fccbf0a3b690b162f53b13ed8bc442ea33437dc", + "last_affected_version": "5.12.2", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbus: mhi: pci_generic: Remove WQ_MEM_RECLAIM flag from state workqueue\n\nA recent change created a dedicated workqueue for the state-change work\nwith WQ_HIGHPRI (no strong reason for that) and WQ_MEM_RECLAIM flags,\nbut the state-change work (mhi_pm_st_worker) does not guarantee forward\nprogress under memory pressure, and will even wait on various memory\nallocations when e.g. creating devices, loading firmware, etc... The\nwork is then not part of a memory reclaim path...\n\nMoreover, this causes a warning in check_flush_dependency() since we end\nup in code that flushes a non-reclaim workqueue:\n\n[ 40.969601] workqueue: WQ_MEM_RECLAIM mhi_hiprio_wq:mhi_pm_st_worker [mhi] is flushing !WQ_MEM_RECLAIM events_highpri:flush_backlog\n[ 40.969612] WARNING: CPU: 4 PID: 158 at kernel/workqueue.c:2607 check_flush_dependency+0x11c/0x140\n[ 40.969733] Call Trace:\n[ 40.969740] __flush_work+0x97/0x1d0\n[ 40.969745] ? wake_up_process+0x15/0x20\n[ 40.969749] ? insert_work+0x70/0x80\n[ 40.969750] ? __queue_work+0x14a/0x3e0\n[ 40.969753] flush_work+0x10/0x20\n[ 40.969756] rollback_registered_many+0x1c9/0x510\n[ 40.969759] unregister_netdevice_queue+0x94/0x120\n[ 40.969761] unregister_netdev+0x1d/0x30\n[ 40.969765] mhi_net_remove+0x1a/0x40 [mhi_net]\n[ 40.969770] mhi_driver_remove+0x124/0x250 [mhi]\n[ 40.969776] device_release_driver_internal+0xf0/0x1d0\n[ 40.969778] device_release_driver+0x12/0x20\n[ 40.969782] bus_remove_device+0xe1/0x150\n[ 40.969786] device_del+0x17b/0x3e0\n[ 40.969791] mhi_destroy_device+0x9a/0x100 [mhi]\n[ 40.969796] ? mhi_unmap_single_use_bb+0x50/0x50 [mhi]\n[ 40.969799] device_for_each_child+0x5e/0xa0\n[ 40.969804] mhi_pm_st_worker+0x921/0xf50 [mhi]", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-46970", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-46970", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-46970", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-46970", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-46970", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-46970" + } + }, + "CVE-2021-46971": { + "affected_versions": "v5.4-rc1 to v5.13-rc1", + "breaks": "b0c8fdc7fdb77586c3d1937050925b960743306e", + "cmt_msg": "perf/core: Fix unconditional security_locked_down() call", + "fixes": "08ef1af4de5fe7de9c6d69f1e22e51b66e385d9b", + "last_affected_version": "5.12.1", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nperf/core: Fix unconditional security_locked_down() call\n\nCurrently, the lockdown state is queried unconditionally, even though\nits result is used only if the PERF_SAMPLE_REGS_INTR bit is set in\nattr.sample_type. While that doesn't matter in case of the Lockdown LSM,\nit causes trouble with the SELinux's lockdown hook implementation.\n\nSELinux implements the locked_down hook with a check whether the current\ntask's type has the corresponding \"lockdown\" class permission\n(\"integrity\" or \"confidentiality\") allowed in the policy. This means\nthat calling the hook when the access control decision would be ignored\ngenerates a bogus permission check and audit record.\n\nFix this by checking sample_type first and only calling the hook when\nits result would be honored.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-46971", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-46971", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-46971", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-46971", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-46971", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-46971" + } + }, + "CVE-2021-46972": { + "affected_versions": "v5.8-rc1 to v5.13-rc1", + "breaks": "6815f479ca90ee7fd2e28b2a420f796b974155fe", + "cmt_msg": "ovl: fix leaked dentry", + "fixes": "eaab1d45cdb4bb0c846bd23c3d666d5b90af7b41", + "last_affected_version": "5.12.1", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\novl: fix leaked dentry\n\nSince commit 6815f479ca90 (\"ovl: use only uppermetacopy state in\novl_lookup()\"), overlayfs doesn't put temporary dentry when there is a\nmetacopy error, which leads to dentry leaks when shutting down the related\nsuperblock:\n\n overlayfs: refusing to follow metacopy origin for (/file0)\n ...\n BUG: Dentry (____ptrval____){i=3f33,n=file3} still in use (1) [unmount of overlay overlay]\n ...\n WARNING: CPU: 1 PID: 432 at umount_check.cold+0x107/0x14d\n CPU: 1 PID: 432 Comm: unmount-overlay Not tainted 5.12.0-rc5 #1\n ...\n RIP: 0010:umount_check.cold+0x107/0x14d\n ...\n Call Trace:\n d_walk+0x28c/0x950\n ? dentry_lru_isolate+0x2b0/0x2b0\n ? __kasan_slab_free+0x12/0x20\n do_one_tree+0x33/0x60\n shrink_dcache_for_umount+0x78/0x1d0\n generic_shutdown_super+0x70/0x440\n kill_anon_super+0x3e/0x70\n deactivate_locked_super+0xc4/0x160\n deactivate_super+0xfa/0x140\n cleanup_mnt+0x22e/0x370\n __cleanup_mnt+0x1a/0x30\n task_work_run+0x139/0x210\n do_exit+0xb0c/0x2820\n ? __kasan_check_read+0x1d/0x30\n ? find_held_lock+0x35/0x160\n ? lock_release+0x1b6/0x660\n ? mm_update_next_owner+0xa20/0xa20\n ? reacquire_held_locks+0x3f0/0x3f0\n ? __sanitizer_cov_trace_const_cmp4+0x22/0x30\n do_group_exit+0x135/0x380\n __do_sys_exit_group.isra.0+0x20/0x20\n __x64_sys_exit_group+0x3c/0x50\n do_syscall_64+0x45/0x70\n entry_SYSCALL_64_after_hwframe+0x44/0xae\n ...\n VFS: Busy inodes after unmount of overlay. Self-destruct in 5 seconds. Have a nice day...\n\nThis fix has been tested with a syzkaller reproducer.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-46972", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-46972", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-46972", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-46972", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-46972", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-46972" + } + }, + "CVE-2021-46973": { + "affected_versions": "v5.8-rc1 to v5.13-rc1", + "breaks": "6e728f321393b1fce9e1c2c3e55f9f7c15991321", + "cmt_msg": "net: qrtr: Avoid potential use after free in MHI send", + "fixes": "47a017f33943278570c072bc71681809b2567b3a", + "last_affected_version": "5.12.1", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: qrtr: Avoid potential use after free in MHI send\n\nIt is possible that the MHI ul_callback will be invoked immediately\nfollowing the queueing of the skb for transmission, leading to the\ncallback decrementing the refcount of the associated sk and freeing the\nskb.\n\nAs such the dereference of skb and the increment of the sk refcount must\nhappen before the skb is queued, to avoid the skb to be used after free\nand potentially the sk to drop its last refcount..", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-46973", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-46973", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-46973", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-46973", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-46973", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-46973" + } + }, + "CVE-2021-46974": { + "affected_versions": "v5.0-rc1 to v5.13-rc1", + "breaks": "979d63d50c0c0f7bc537bf821e056cc9fe5abd38", + "cmt_msg": "bpf: Fix masking negation logic upon negative dst register", + "fixes": "b9b34ddbe2076ade359cd5ce7537d5ed019e9807", + "last_affected_version": "5.12.1", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Fix masking negation logic upon negative dst register\n\nThe negation logic for the case where the off_reg is sitting in the\ndst register is not correct given then we cannot just invert the add\nto a sub or vice versa. As a fix, perform the final bitwise and-op\nunconditionally into AX from the off_reg, then move the pointer from\nthe src to dst and finally use AX as the source for the original\npointer arithmetic operation such that the inversion yields a correct\nresult. The single non-AX mov in between is possible given constant\nblinding is retaining it as it's not an immediate based operation.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-46974", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-46974", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-46974", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-46974", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-46974", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-46974" + } + }, + "CVE-2021-46976": { + "affected_versions": "v5.8-rc1 to v5.13-rc2", + "breaks": "229007e02d697b0662f85378aae53531b0dfea05", + "cmt_msg": "drm/i915: Fix crash in auto_retire", + "fixes": "402be8a101190969fc7ff122d07e262df86e132b", + "last_affected_version": "5.12.4", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/i915: Fix crash in auto_retire\n\nThe retire logic uses the 2 lower bits of the pointer to the retire\nfunction to store flags. However, the auto_retire function is not\nguaranteed to be aligned to a multiple of 4, which causes crashes as\nwe jump to the wrong address, for example like this:\n\n2021-04-24T18:03:53.804300Z WARNING kernel: [ 516.876901] invalid opcode: 0000 [#1] PREEMPT SMP NOPTI\n2021-04-24T18:03:53.804310Z WARNING kernel: [ 516.876906] CPU: 7 PID: 146 Comm: kworker/u16:6 Tainted: G U 5.4.105-13595-g3cd84167b2df #1\n2021-04-24T18:03:53.804311Z WARNING kernel: [ 516.876907] Hardware name: Google Volteer2/Volteer2, BIOS Google_Volteer2.13672.76.0 02/22/2021\n2021-04-24T18:03:53.804312Z WARNING kernel: [ 516.876911] Workqueue: events_unbound active_work\n2021-04-24T18:03:53.804313Z WARNING kernel: [ 516.876914] RIP: 0010:auto_retire+0x1/0x20\n2021-04-24T18:03:53.804314Z WARNING kernel: [ 516.876916] Code: e8 01 f2 ff ff eb 02 31 db 48 89 d8 5b 5d c3 0f 1f 44 00 00 55 48 89 e5 f0 ff 87 c8 00 00 00 0f 88 ab 47 4a 00 31 c0 5d c3 0f <1f> 44 00 00 55 48 89 e5 f0 ff 8f c8 00 00 00 0f 88 9a 47 4a 00 74\n2021-04-24T18:03:53.804319Z WARNING kernel: [ 516.876918] RSP: 0018:ffff9b4d809fbe38 EFLAGS: 00010286\n2021-04-24T18:03:53.804320Z WARNING kernel: [ 516.876919] RAX: 0000000000000007 RBX: ffff927915079600 RCX: 0000000000000007\n2021-04-24T18:03:53.804320Z WARNING kernel: [ 516.876921] RDX: ffff9b4d809fbe40 RSI: 0000000000000286 RDI: ffff927915079600\n2021-04-24T18:03:53.804321Z WARNING kernel: [ 516.876922] RBP: ffff9b4d809fbe68 R08: 8080808080808080 R09: fefefefefefefeff\n2021-04-24T18:03:53.804321Z WARNING kernel: [ 516.876924] R10: 0000000000000010 R11: ffffffff92e44bd8 R12: ffff9279150796a0\n2021-04-24T18:03:53.804322Z WARNING kernel: [ 516.876925] R13: ffff92791c368180 R14: ffff927915079640 R15: 000000001c867605\n2021-04-24T18:03:53.804323Z WARNING kernel: [ 516.876926] FS: 0000000000000000(0000) GS:ffff92791ffc0000(0000) knlGS:0000000000000000\n2021-04-24T18:03:53.804323Z WARNING kernel: [ 516.876928] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n2021-04-24T18:03:53.804324Z WARNING kernel: [ 516.876929] CR2: 0000239514955000 CR3: 00000007f82da001 CR4: 0000000000760ee0\n2021-04-24T18:03:53.804325Z WARNING kernel: [ 516.876930] PKRU: 55555554\n2021-04-24T18:03:53.804325Z WARNING kernel: [ 516.876931] Call Trace:\n2021-04-24T18:03:53.804326Z WARNING kernel: [ 516.876935] __active_retire+0x77/0xcf\n2021-04-24T18:03:53.804326Z WARNING kernel: [ 516.876939] process_one_work+0x1da/0x394\n2021-04-24T18:03:53.804327Z WARNING kernel: [ 516.876941] worker_thread+0x216/0x375\n2021-04-24T18:03:53.804327Z WARNING kernel: [ 516.876944] kthread+0x147/0x156\n2021-04-24T18:03:53.804335Z WARNING kernel: [ 516.876946] ? pr_cont_work+0x58/0x58\n2021-04-24T18:03:53.804335Z WARNING kernel: [ 516.876948] ? kthread_blkcg+0x2e/0x2e\n2021-04-24T18:03:53.804336Z WARNING kernel: [ 516.876950] ret_from_fork+0x1f/0x40\n2021-04-24T18:03:53.804336Z WARNING kernel: [ 516.876952] Modules linked in: cdc_mbim cdc_ncm cdc_wdm xt_cgroup rfcomm cmac algif_hash algif_skcipher af_alg xt_MASQUERADE uinput snd_soc_rt5682_sdw snd_soc_rt5682 snd_soc_max98373_sdw snd_soc_max98373 snd_soc_rl6231 regmap_sdw snd_soc_sof_sdw snd_soc_hdac_hdmi snd_soc_dmic snd_hda_codec_hdmi snd_sof_pci snd_sof_intel_hda_common intel_ipu6_psys snd_sof_xtensa_dsp soundwire_intel soundwire_generic_allocation soundwire_cadence snd_sof_intel_hda snd_sof snd_soc_hdac_hda snd_soc_acpi_intel_match snd_soc_acpi snd_hda_ext_core soundwire_bus snd_hda_intel snd_intel_dspcfg snd_hda_codec snd_hwdep snd_hda_core intel_ipu6_isys videobuf2_dma_contig videobuf2_v4l2 videobuf2_common videobuf2_memops mei_hdcp intel_ipu6 ov2740 ov8856 at24 sx9310 dw9768 v4l2_fwnode cros_ec_typec intel_pmc_mux roles acpi_als typec fuse iio_trig_sysfs cros_ec_light_prox cros_ec_lid_angle cros_ec_sensors cros\n---truncated---", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-46976", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-46976", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-46976", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-46976", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-46976", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-46976" + } + }, + "CVE-2021-46977": { + "affected_versions": "v5.5-rc1 to v5.13-rc2", + "breaks": "4be5341026246870818e28b53202b001426a5aec", + "cmt_msg": "KVM: VMX: Disable preemption when probing user return MSRs", + "fixes": "5104d7ffcf24749939bea7fdb5378d186473f890", + "last_affected_version": "5.12.4", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: VMX: Disable preemption when probing user return MSRs\n\nDisable preemption when probing a user return MSR via RDSMR/WRMSR. If\nthe MSR holds a different value per logical CPU, the WRMSR could corrupt\nthe host's value if KVM is preempted between the RDMSR and WRMSR, and\nthen rescheduled on a different CPU.\n\nOpportunistically land the helper in common x86, SVM will use the helper\nin a future commit.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-46977", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-46977", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-46977", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-46977", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-46977", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-46977" + } + }, + "CVE-2021-46978": { + "affected_versions": "v5.11-rc3 to v5.13-rc2", + "breaks": "f2c7ef3ba9556d62a7e2bb23b563c6510007d55c", + "cmt_msg": "KVM: nVMX: Always make an attempt to map eVMCS after migration", + "fixes": "f5c7e8425f18fdb9bdb7d13340651d7876890329", + "last_affected_version": "5.12.4", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: nVMX: Always make an attempt to map eVMCS after migration\n\nWhen enlightened VMCS is in use and nested state is migrated with\nvmx_get_nested_state()/vmx_set_nested_state() KVM can't map evmcs\npage right away: evmcs gpa is not 'struct kvm_vmx_nested_state_hdr'\nand we can't read it from VP assist page because userspace may decide\nto restore HV_X64_MSR_VP_ASSIST_PAGE after restoring nested state\n(and QEMU, for example, does exactly that). To make sure eVMCS is\nmapped /vmx_set_nested_state() raises KVM_REQ_GET_NESTED_STATE_PAGES\nrequest.\n\nCommit f2c7ef3ba955 (\"KVM: nSVM: cancel KVM_REQ_GET_NESTED_STATE_PAGES\non nested vmexit\") added KVM_REQ_GET_NESTED_STATE_PAGES clearing to\nnested_vmx_vmexit() to make sure MSR permission bitmap is not switched\nwhen an immediate exit from L2 to L1 happens right after migration (caused\nby a pending event, for example). Unfortunately, in the exact same\nsituation we still need to have eVMCS mapped so\nnested_sync_vmcs12_to_shadow() reflects changes in VMCS12 to eVMCS.\n\nAs a band-aid, restore nested_get_evmcs_page() when clearing\nKVM_REQ_GET_NESTED_STATE_PAGES in nested_vmx_vmexit(). The 'fix' is far\nfrom being ideal as we can't easily propagate possible failures and even if\nwe could, this is most likely already too late to do so. The whole\n'KVM_REQ_GET_NESTED_STATE_PAGES' idea for mapping eVMCS after migration\nseems to be fragile as we diverge too much from the 'native' path when\nvmptr loading happens on vmx_set_nested_state().", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-46978", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-46978", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-46978", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-46978", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-46978", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-46978" + } + }, + "CVE-2021-46979": { + "affected_versions": "v5.11-rc1 to v5.13-rc2", + "breaks": "8dedcc3eee3aceb37832176f0a1b03d5687acda3", + "cmt_msg": "iio: core: fix ioctl handlers removal", + "fixes": "901f84de0e16bde10a72d7eb2f2eb73fcde8fa1a", + "last_affected_version": "5.12.4", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\niio: core: fix ioctl handlers removal\n\nCurrently ioctl handlers are removed twice. For the first time during\niio_device_unregister() then later on inside\niio_device_unregister_eventset() and iio_buffers_free_sysfs_and_mask().\nDouble free leads to kernel panic.\n\nFix this by not touching ioctl handlers list directly but rather\nletting code responsible for registration call the matching cleanup\nroutine itself.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-46979", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-46979", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-46979", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-46979", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-46979", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-46979" + } + }, + "CVE-2021-46980": { + "affected_versions": "v5.8-rc1 to v5.13-rc2", + "breaks": "992a60ed0d5e312ce9a485c9e12097ac82ae4b3e", + "cmt_msg": "usb: typec: ucsi: Retrieve all the PDOs instead of just the first 4", + "fixes": "1f4642b72be79757f050924a9b9673b6a02034bc", + "last_affected_version": "5.12.4", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: typec: ucsi: Retrieve all the PDOs instead of just the first 4\n\ncommit 4dbc6a4ef06d (\"usb: typec: ucsi: save power data objects\nin PD mode\") introduced retrieval of the PDOs when connected to a\nPD-capable source. But only the first 4 PDOs are received since\nthat is the maximum number that can be fetched at a time given the\nMESSAGE_IN length limitation (16 bytes). However, as per the PD spec\na connected source may advertise up to a maximum of 7 PDOs.\n\nIf such a source is connected it's possible the PPM could have\nnegotiated a power contract with one of the PDOs at index greater\nthan 4, and would be reflected in the request data object's (RDO)\nobject position field. This would result in an out-of-bounds access\nwhen the rdo_index() is used to index into the src_pdos array in\nucsi_psy_get_voltage_now().\n\nWith the help of the UBSAN -fsanitize=array-bounds checker enabled\nthis exact issue is revealed when connecting to a PD source adapter\nthat advertise 5 PDOs and the PPM enters a contract having selected\nthe 5th one.\n\n[ 151.545106][ T70] Unexpected kernel BRK exception at EL1\n[ 151.545112][ T70] Internal error: BRK handler: f2005512 [#1] PREEMPT SMP\n...\n[ 151.545499][ T70] pc : ucsi_psy_get_prop+0x208/0x20c\n[ 151.545507][ T70] lr : power_supply_show_property+0xc0/0x328\n...\n[ 151.545542][ T70] Call trace:\n[ 151.545544][ T70] ucsi_psy_get_prop+0x208/0x20c\n[ 151.545546][ T70] power_supply_uevent+0x1a4/0x2f0\n[ 151.545550][ T70] dev_uevent+0x200/0x384\n[ 151.545555][ T70] kobject_uevent_env+0x1d4/0x7e8\n[ 151.545557][ T70] power_supply_changed_work+0x174/0x31c\n[ 151.545562][ T70] process_one_work+0x244/0x6f0\n[ 151.545564][ T70] worker_thread+0x3e0/0xa64\n\nWe can resolve this by instead retrieving and storing up to the\nmaximum of 7 PDOs in the con->src_pdos array. This would involve\ntwo calls to the GET_PDOS command.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-46980", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-46980", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-46980", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-46980", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-46980", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-46980" + } + }, + "CVE-2021-46981": { + "affected_versions": "v5.4-rc1 to v5.13-rc2", + "breaks": "e9e006f5fcf2bab59149cb38a48a4817c1b538b4", + "cmt_msg": "nbd: Fix NULL pointer in flush_workqueue", + "fixes": "79ebe9110fa458d58f1fceb078e2068d7ad37390", + "last_affected_version": "5.12.4", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnbd: Fix NULL pointer in flush_workqueue\n\nOpen /dev/nbdX first, the config_refs will be 1 and\nthe pointers in nbd_device are still null. Disconnect\n/dev/nbdX, then reference a null recv_workq. The\nprotection by config_refs in nbd_genl_disconnect is useless.\n\n[ 656.366194] BUG: kernel NULL pointer dereference, address: 0000000000000020\n[ 656.368943] #PF: supervisor write access in kernel mode\n[ 656.369844] #PF: error_code(0x0002) - not-present page\n[ 656.370717] PGD 10cc87067 P4D 10cc87067 PUD 1074b4067 PMD 0\n[ 656.371693] Oops: 0002 [#1] SMP\n[ 656.372242] CPU: 5 PID: 7977 Comm: nbd-client Not tainted 5.11.0-rc5-00040-g76c057c84d28 #1\n[ 656.373661] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS ?-20190727_073836-buildvm-ppc64le-16.ppc.fedoraproject.org-3.fc31 04/01/2014\n[ 656.375904] RIP: 0010:mutex_lock+0x29/0x60\n[ 656.376627] Code: 00 0f 1f 44 00 00 55 48 89 fd 48 83 05 6f d7 fe 08 01 e8 7a c3 ff ff 48 83 05 6a d7 fe 08 01 31 c0 65 48 8b 14 25 00 6d 01 00 48 0f b1 55 d\n[ 656.378934] RSP: 0018:ffffc900005eb9b0 EFLAGS: 00010246\n[ 656.379350] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000\n[ 656.379915] RDX: ffff888104cf2600 RSI: ffffffffaae8f452 RDI: 0000000000000020\n[ 656.380473] RBP: 0000000000000020 R08: 0000000000000000 R09: ffff88813bd6b318\n[ 656.381039] R10: 00000000000000c7 R11: fefefefefefefeff R12: ffff888102710b40\n[ 656.381599] R13: ffffc900005eb9e0 R14: ffffffffb2930680 R15: ffff88810770ef00\n[ 656.382166] FS: 00007fdf117ebb40(0000) GS:ffff88813bd40000(0000) knlGS:0000000000000000\n[ 656.382806] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 656.383261] CR2: 0000000000000020 CR3: 0000000100c84000 CR4: 00000000000006e0\n[ 656.383819] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n[ 656.384370] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n[ 656.384927] Call Trace:\n[ 656.385111] flush_workqueue+0x92/0x6c0\n[ 656.385395] nbd_disconnect_and_put+0x81/0xd0\n[ 656.385716] nbd_genl_disconnect+0x125/0x2a0\n[ 656.386034] genl_family_rcv_msg_doit.isra.0+0x102/0x1b0\n[ 656.386422] genl_rcv_msg+0xfc/0x2b0\n[ 656.386685] ? nbd_ioctl+0x490/0x490\n[ 656.386954] ? genl_family_rcv_msg_doit.isra.0+0x1b0/0x1b0\n[ 656.387354] netlink_rcv_skb+0x62/0x180\n[ 656.387638] genl_rcv+0x34/0x60\n[ 656.387874] netlink_unicast+0x26d/0x590\n[ 656.388162] netlink_sendmsg+0x398/0x6c0\n[ 656.388451] ? netlink_rcv_skb+0x180/0x180\n[ 656.388750] ____sys_sendmsg+0x1da/0x320\n[ 656.389038] ? ____sys_recvmsg+0x130/0x220\n[ 656.389334] ___sys_sendmsg+0x8e/0xf0\n[ 656.389605] ? ___sys_recvmsg+0xa2/0xf0\n[ 656.389889] ? handle_mm_fault+0x1671/0x21d0\n[ 656.390201] __sys_sendmsg+0x6d/0xe0\n[ 656.390464] __x64_sys_sendmsg+0x23/0x30\n[ 656.390751] do_syscall_64+0x45/0x70\n[ 656.391017] entry_SYSCALL_64_after_hwframe+0x44/0xa9\n\nTo fix it, just add if (nbd->recv_workq) to nbd_disconnect_and_put().", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-46981", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-46981", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-46981", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-46981", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-46981", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-46981" + } + }, + "CVE-2021-46982": { + "affected_versions": "v2.6.12-rc2 to v5.13-rc2", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "f2fs: compress: fix race condition of overwrite vs truncate", + "fixes": "a949dc5f2c5cfe0c910b664650f45371254c0744", + "last_affected_version": "5.12.4", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nf2fs: compress: fix race condition of overwrite vs truncate\n\npos_fsstress testcase complains a panic as belew:\n\n------------[ cut here ]------------\nkernel BUG at fs/f2fs/compress.c:1082!\ninvalid opcode: 0000 [#1] SMP PTI\nCPU: 4 PID: 2753477 Comm: kworker/u16:2 Tainted: G OE 5.12.0-rc1-custom #1\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.14.0-2 04/01/2014\nWorkqueue: writeback wb_workfn (flush-252:16)\nRIP: 0010:prepare_compress_overwrite+0x4c0/0x760 [f2fs]\nCall Trace:\n f2fs_prepare_compress_overwrite+0x5f/0x80 [f2fs]\n f2fs_write_cache_pages+0x468/0x8a0 [f2fs]\n f2fs_write_data_pages+0x2a4/0x2f0 [f2fs]\n do_writepages+0x38/0xc0\n __writeback_single_inode+0x44/0x2a0\n writeback_sb_inodes+0x223/0x4d0\n __writeback_inodes_wb+0x56/0xf0\n wb_writeback+0x1dd/0x290\n wb_workfn+0x309/0x500\n process_one_work+0x220/0x3c0\n worker_thread+0x53/0x420\n kthread+0x12f/0x150\n ret_from_fork+0x22/0x30\n\nThe root cause is truncate() may race with overwrite as below,\nso that one reference count left in page can not guarantee the\npage attaching in mapping tree all the time, after truncation,\nlater find_lock_page() may return NULL pointer.\n\n- prepare_compress_overwrite\n - f2fs_pagecache_get_page\n - unlock_page\n\t\t\t\t\t- f2fs_setattr\n\t\t\t\t\t - truncate_setsize\n\t\t\t\t\t - truncate_inode_page\n\t\t\t\t\t - delete_from_page_cache\n - find_lock_page\n\nFix this by avoiding referencing updated page.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-46982", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-46982", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-46982", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-46982", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-46982", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-46982" + } + }, + "CVE-2021-46983": { + "affected_versions": "v5.9-rc1 to v5.13-rc2", + "breaks": "ca0f1a8055be2a04073af435dc68419334481638", + "cmt_msg": "nvmet-rdma: Fix NULL deref when SEND is completed with error", + "fixes": "8cc365f9559b86802afc0208389f5c8d46b4ad61", + "last_affected_version": "5.12.4", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvmet-rdma: Fix NULL deref when SEND is completed with error\n\nWhen running some traffic and taking down the link on peer, a\nretry counter exceeded error is received. This leads to\nnvmet_rdma_error_comp which tried accessing the cq_context to\nobtain the queue. The cq_context is no longer valid after the\nfix to use shared CQ mechanism and should be obtained similar\nto how it is obtained in other functions from the wc->qp.\n\n[ 905.786331] nvmet_rdma: SEND for CQE 0x00000000e3337f90 failed with status transport retry counter exceeded (12).\n[ 905.832048] BUG: unable to handle kernel NULL pointer dereference at 0000000000000048\n[ 905.839919] PGD 0 P4D 0\n[ 905.842464] Oops: 0000 1 SMP NOPTI\n[ 905.846144] CPU: 13 PID: 1557 Comm: kworker/13:1H Kdump: loaded Tainted: G OE --------- - - 4.18.0-304.el8.x86_64 #1\n[ 905.872135] RIP: 0010:nvmet_rdma_error_comp+0x5/0x1b [nvmet_rdma]\n[ 905.878259] Code: 19 4f c0 e8 89 b3 a5 f6 e9 5b e0 ff ff 0f b7 75 14 4c 89 ea 48 c7 c7 08 1a 4f c0 e8 71 b3 a5 f6 e9 4b e0 ff ff 0f 1f 44 00 00 <48> 8b 47 48 48 85 c0 74 08 48 89 c7 e9 98 bf 49 00 e9 c3 e3 ff ff\n[ 905.897135] RSP: 0018:ffffab601c45fe28 EFLAGS: 00010246\n[ 905.902387] RAX: 0000000000000065 RBX: ffff9e729ea2f800 RCX: 0000000000000000\n[ 905.909558] RDX: 0000000000000000 RSI: ffff9e72df9567c8 RDI: 0000000000000000\n[ 905.916731] RBP: ffff9e729ea2b400 R08: 000000000000074d R09: 0000000000000074\n[ 905.923903] R10: 0000000000000000 R11: ffffab601c45fcc0 R12: 0000000000000010\n[ 905.931074] R13: 0000000000000000 R14: 0000000000000010 R15: ffff9e729ea2f400\n[ 905.938247] FS: 0000000000000000(0000) GS:ffff9e72df940000(0000) knlGS:0000000000000000\n[ 905.938249] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 905.950067] nvmet_rdma: SEND for CQE 0x00000000c7356cca failed with status transport retry counter exceeded (12).\n[ 905.961855] CR2: 0000000000000048 CR3: 000000678d010004 CR4: 00000000007706e0\n[ 905.961855] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n[ 905.961856] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n[ 905.961857] PKRU: 55555554\n[ 906.010315] Call Trace:\n[ 906.012778] __ib_process_cq+0x89/0x170 [ib_core]\n[ 906.017509] ib_cq_poll_work+0x26/0x80 [ib_core]\n[ 906.022152] process_one_work+0x1a7/0x360\n[ 906.026182] ? create_worker+0x1a0/0x1a0\n[ 906.030123] worker_thread+0x30/0x390\n[ 906.033802] ? create_worker+0x1a0/0x1a0\n[ 906.037744] kthread+0x116/0x130\n[ 906.040988] ? kthread_flush_work_fn+0x10/0x10\n[ 906.045456] ret_from_fork+0x1f/0x40", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-46983", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-46983", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-46983", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-46983", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-46983", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-46983" + } + }, + "CVE-2021-46984": { + "affected_versions": "v4.18-rc1 to v5.13-rc2", + "breaks": "a6088845c2bf754d6cb2572b484180680b037804", + "cmt_msg": "kyber: fix out of bounds access when preempted", + "fixes": "efed9a3337e341bd0989161b97453b52567bc59d", + "last_affected_version": "5.12.4", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nkyber: fix out of bounds access when preempted\n\n__blk_mq_sched_bio_merge() gets the ctx and hctx for the current CPU and\npasses the hctx to ->bio_merge(). kyber_bio_merge() then gets the ctx\nfor the current CPU again and uses that to get the corresponding Kyber\ncontext in the passed hctx. However, the thread may be preempted between\nthe two calls to blk_mq_get_ctx(), and the ctx returned the second time\nmay no longer correspond to the passed hctx. This \"works\" accidentally\nmost of the time, but it can cause us to read garbage if the second ctx\ncame from an hctx with more ctx's than the first one (i.e., if\nctx->index_hw[hctx->type] > hctx->nr_ctx).\n\nThis manifested as this UBSAN array index out of bounds error reported\nby Jakub:\n\nUBSAN: array-index-out-of-bounds in ../kernel/locking/qspinlock.c:130:9\nindex 13106 is out of range for type 'long unsigned int [128]'\nCall Trace:\n dump_stack+0xa4/0xe5\n ubsan_epilogue+0x5/0x40\n __ubsan_handle_out_of_bounds.cold.13+0x2a/0x34\n queued_spin_lock_slowpath+0x476/0x480\n do_raw_spin_lock+0x1c2/0x1d0\n kyber_bio_merge+0x112/0x180\n blk_mq_submit_bio+0x1f5/0x1100\n submit_bio_noacct+0x7b0/0x870\n submit_bio+0xc2/0x3a0\n btrfs_map_bio+0x4f0/0x9d0\n btrfs_submit_data_bio+0x24e/0x310\n submit_one_bio+0x7f/0xb0\n submit_extent_page+0xc4/0x440\n __extent_writepage_io+0x2b8/0x5e0\n __extent_writepage+0x28d/0x6e0\n extent_write_cache_pages+0x4d7/0x7a0\n extent_writepages+0xa2/0x110\n do_writepages+0x8f/0x180\n __writeback_single_inode+0x99/0x7f0\n writeback_sb_inodes+0x34e/0x790\n __writeback_inodes_wb+0x9e/0x120\n wb_writeback+0x4d2/0x660\n wb_workfn+0x64d/0xa10\n process_one_work+0x53a/0xa80\n worker_thread+0x69/0x5b0\n kthread+0x20b/0x240\n ret_from_fork+0x1f/0x30\n\nOnly Kyber uses the hctx, so fix it by passing the request_queue to\n->bio_merge() instead. BFQ and mq-deadline just use that, and Kyber can\nmap the queues itself to avoid the mismatch.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-46984", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-46984", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-46984", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-46984", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-46984", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-46984" + } + }, + "CVE-2021-46985": { + "affected_versions": "v5.12-rc5 to v5.13-rc2", + "breaks": "eb50aaf960e3bedfef79063411ffd670da94b84b", + "cmt_msg": "ACPI: scan: Fix a memory leak in an error handling path", + "fixes": "0c8bd174f0fc131bc9dfab35cd8784f59045da87", + "last_affected_version": "5.12.4", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nACPI: scan: Fix a memory leak in an error handling path\n\nIf 'acpi_device_set_name()' fails, we must free\n'acpi_device_bus_id->bus_id' or there is a (potential) memory leak.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-46985", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-46985", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-46985", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-46985", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-46985", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-46985" + } + }, + "CVE-2021-46986": { + "affected_versions": "v5.10-rc1 to v5.13-rc2", + "breaks": "e81a7018d93a7de31a3f121c9a7eecd0a5ec58b0", + "cmt_msg": "usb: dwc3: gadget: Free gadget structure only after freeing endpoints", + "fixes": "bb9c74a5bd1462499fe5ccb1e3c5ac40dcfa9139", + "last_affected_version": "5.12.4", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: dwc3: gadget: Free gadget structure only after freeing endpoints\n\nAs part of commit e81a7018d93a (\"usb: dwc3: allocate gadget structure\ndynamically\") the dwc3_gadget_release() was added which will free\nthe dwc->gadget structure upon the device's removal when\nusb_del_gadget_udc() is called in dwc3_gadget_exit().\n\nHowever, simply freeing the gadget results a dangling pointer\nsituation: the endpoints created in dwc3_gadget_init_endpoints()\nhave their dep->endpoint.ep_list members chained off the list_head\nanchored at dwc->gadget->ep_list. Thus when dwc->gadget is freed,\nthe first dwc3_ep in the list now has a dangling prev pointer and\nlikewise for the next pointer of the dwc3_ep at the tail of the list.\nThe dwc3_gadget_free_endpoints() that follows will result in a\nuse-after-free when it calls list_del().\n\nThis was caught by enabling KASAN and performing a driver unbind.\nThe recent commit 568262bf5492 (\"usb: dwc3: core: Add shutdown\ncallback for dwc3\") also exposes this as a panic during shutdown.\n\nThere are a few possibilities to fix this. One could be to perform\na list_del() of the gadget->ep_list itself which removes it from\nthe rest of the dwc3_ep chain.\n\nAnother approach is what this patch does, by splitting up the\nusb_del_gadget_udc() call into its separate \"del\" and \"put\"\ncomponents. This allows dwc3_gadget_free_endpoints() to be\ncalled before the gadget is finally freed with usb_put_gadget().", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-46986", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-46986", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-46986", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-46986", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-46986", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-46986" + } + }, + "CVE-2021-46987": { + "affected_versions": "v5.9-rc1 to v5.13-rc2", + "breaks": "c53e9653605dbf708f5be02902de51831be4b009", + "cmt_msg": "btrfs: fix deadlock when cloning inline extents and using qgroups", + "fixes": "f9baa501b4fd6962257853d46ddffbc21f27e344", + "last_affected_version": "5.12.4", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: fix deadlock when cloning inline extents and using qgroups\n\nThere are a few exceptional cases where cloning an inline extent needs to\ncopy the inline extent data into a page of the destination inode.\n\nWhen this happens, we end up starting a transaction while having a dirty\npage for the destination inode and while having the range locked in the\ndestination's inode iotree too. Because when reserving metadata space\nfor a transaction we may need to flush existing delalloc in case there is\nnot enough free space, we have a mechanism in place to prevent a deadlock,\nwhich was introduced in commit 3d45f221ce627d (\"btrfs: fix deadlock when\ncloning inline extent and low on free metadata space\").\n\nHowever when using qgroups, a transaction also reserves metadata qgroup\nspace, which can also result in flushing delalloc in case there is not\nenough available space at the moment. When this happens we deadlock, since\nflushing delalloc requires locking the file range in the inode's iotree\nand the range was already locked at the very beginning of the clone\noperation, before attempting to start the transaction.\n\nWhen this issue happens, stack traces like the following are reported:\n\n [72747.556262] task:kworker/u81:9 state:D stack: 0 pid: 225 ppid: 2 flags:0x00004000\n [72747.556268] Workqueue: writeback wb_workfn (flush-btrfs-1142)\n [72747.556271] Call Trace:\n [72747.556273] __schedule+0x296/0x760\n [72747.556277] schedule+0x3c/0xa0\n [72747.556279] io_schedule+0x12/0x40\n [72747.556284] __lock_page+0x13c/0x280\n [72747.556287] ? generic_file_readonly_mmap+0x70/0x70\n [72747.556325] extent_write_cache_pages+0x22a/0x440 [btrfs]\n [72747.556331] ? __set_page_dirty_nobuffers+0xe7/0x160\n [72747.556358] ? set_extent_buffer_dirty+0x5e/0x80 [btrfs]\n [72747.556362] ? update_group_capacity+0x25/0x210\n [72747.556366] ? cpumask_next_and+0x1a/0x20\n [72747.556391] extent_writepages+0x44/0xa0 [btrfs]\n [72747.556394] do_writepages+0x41/0xd0\n [72747.556398] __writeback_single_inode+0x39/0x2a0\n [72747.556403] writeback_sb_inodes+0x1ea/0x440\n [72747.556407] __writeback_inodes_wb+0x5f/0xc0\n [72747.556410] wb_writeback+0x235/0x2b0\n [72747.556414] ? get_nr_inodes+0x35/0x50\n [72747.556417] wb_workfn+0x354/0x490\n [72747.556420] ? newidle_balance+0x2c5/0x3e0\n [72747.556424] process_one_work+0x1aa/0x340\n [72747.556426] worker_thread+0x30/0x390\n [72747.556429] ? create_worker+0x1a0/0x1a0\n [72747.556432] kthread+0x116/0x130\n [72747.556435] ? kthread_park+0x80/0x80\n [72747.556438] ret_from_fork+0x1f/0x30\n\n [72747.566958] Workqueue: btrfs-flush_delalloc btrfs_work_helper [btrfs]\n [72747.566961] Call Trace:\n [72747.566964] __schedule+0x296/0x760\n [72747.566968] ? finish_wait+0x80/0x80\n [72747.566970] schedule+0x3c/0xa0\n [72747.566995] wait_extent_bit.constprop.68+0x13b/0x1c0 [btrfs]\n [72747.566999] ? finish_wait+0x80/0x80\n [72747.567024] lock_extent_bits+0x37/0x90 [btrfs]\n [72747.567047] btrfs_invalidatepage+0x299/0x2c0 [btrfs]\n [72747.567051] ? find_get_pages_range_tag+0x2cd/0x380\n [72747.567076] __extent_writepage+0x203/0x320 [btrfs]\n [72747.567102] extent_write_cache_pages+0x2bb/0x440 [btrfs]\n [72747.567106] ? update_load_avg+0x7e/0x5f0\n [72747.567109] ? enqueue_entity+0xf4/0x6f0\n [72747.567134] extent_writepages+0x44/0xa0 [btrfs]\n [72747.567137] ? enqueue_task_fair+0x93/0x6f0\n [72747.567140] do_writepages+0x41/0xd0\n [72747.567144] __filemap_fdatawrite_range+0xc7/0x100\n [72747.567167] btrfs_run_delalloc_work+0x17/0x40 [btrfs]\n [72747.567195] btrfs_work_helper+0xc2/0x300 [btrfs]\n [72747.567200] process_one_work+0x1aa/0x340\n [72747.567202] worker_thread+0x30/0x390\n [72747.567205] ? create_worker+0x1a0/0x1a0\n [72747.567208] kthread+0x116/0x130\n [72747.567211] ? kthread_park+0x80/0x80\n [72747.567214] ret_from_fork+0x1f/0x30\n\n [72747.569686] task:fsstress state:D stack: \n---truncated---", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-46987", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-46987", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-46987", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-46987", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-46987", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-46987" + } + }, + "CVE-2021-46988": { + "affected_versions": "v4.11-rc1 to v5.13-rc2", + "breaks": "cb658a453b9327ce96ce5222c24d162b5b65b564", + "cmt_msg": "userfaultfd: release page in error path to avoid BUG_ON", + "fixes": "7ed9d238c7dbb1fdb63ad96a6184985151b0171c", + "last_affected_version": "5.12.4", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nuserfaultfd: release page in error path to avoid BUG_ON\n\nConsider the following sequence of events:\n\n1. Userspace issues a UFFD ioctl, which ends up calling into\n shmem_mfill_atomic_pte(). We successfully account the blocks, we\n shmem_alloc_page(), but then the copy_from_user() fails. We return\n -ENOENT. We don't release the page we allocated.\n2. Our caller detects this error code, tries the copy_from_user() after\n dropping the mmap_lock, and retries, calling back into\n shmem_mfill_atomic_pte().\n3. Meanwhile, let's say another process filled up the tmpfs being used.\n4. So shmem_mfill_atomic_pte() fails to account blocks this time, and\n immediately returns - without releasing the page.\n\nThis triggers a BUG_ON in our caller, which asserts that the page\nshould always be consumed, unless -ENOENT is returned.\n\nTo fix this, detect if we have such a \"dangling\" page when accounting\nfails, and if so, release it before returning.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-46988", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-46988", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-46988", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-46988", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-46988", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-46988" + } + }, + "CVE-2021-46989": { + "affected_versions": "v4.19-rc1 to v5.13-rc2", + "breaks": "31651c607151f1034cfb57e5a78678bea54c362b", + "cmt_msg": "hfsplus: prevent corruption in shrinking truncate", + "fixes": "c3187cf32216313fb316084efac4dab3a8459b1d", + "last_affected_version": "5.12.4", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nhfsplus: prevent corruption in shrinking truncate\n\nI believe there are some issues introduced by commit 31651c607151\n(\"hfsplus: avoid deadlock on file truncation\")\n\nHFS+ has extent records which always contains 8 extents. In case the\nfirst extent record in catalog file gets full, new ones are allocated from\nextents overflow file.\n\nIn case shrinking truncate happens to middle of an extent record which\nlocates in extents overflow file, the logic in hfsplus_file_truncate() was\nchanged so that call to hfs_brec_remove() is not guarded any more.\n\nRight action would be just freeing the extents that exceed the new size\ninside extent record by calling hfsplus_free_extents(), and then check if\nthe whole extent record should be removed. However since the guard\n(blk_cnt > start) is now after the call to hfs_brec_remove(), this has\nunfortunate effect that the last matching extent record is removed\nunconditionally.\n\nTo reproduce this issue, create a file which has at least 10 extents, and\nthen perform shrinking truncate into middle of the last extent record, so\nthat the number of remaining extents is not under or divisible by 8. This\ncauses the last extent record (8 extents) to be removed totally instead of\ntruncating into middle of it. Thus this causes corruption, and lost data.\n\nFix for this is simply checking if the new truncated end is below the\nstart of this extent record, making it safe to remove the full extent\nrecord. However call to hfs_brec_remove() can't be moved to it's previous\nplace since we're dropping ->tree_lock and it can cause a race condition\nand the cached info being invalidated possibly corrupting the node data.\n\nAnother issue is related to this one. When entering into the block\n(blk_cnt > start) we are not holding the ->tree_lock. We break out from\nthe loop not holding the lock, but hfs_find_exit() does unlock it. Not\nsure if it's possible for someone else to take the lock under our feet,\nbut it can cause hard to debug errors and premature unlocking. Even if\nthere's no real risk of it, the locking should still always be kept in\nbalance. Thus taking the lock now just before the check.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-46989", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-46989", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-46989", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-46989", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-46989", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-46989" + } + }, + "CVE-2021-46990": { + "affected_versions": "v5.10-rc5 to v5.13-rc2", + "breaks": "f79643787e0a0762d2409b7b8334e83f22d85695", + "cmt_msg": "powerpc/64s: Fix crashes when toggling entry flush barrier", + "fixes": "aec86b052df6541cc97c5fca44e5934cbea4963b", + "last_affected_version": "5.12.4", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\npowerpc/64s: Fix crashes when toggling entry flush barrier\n\nThe entry flush mitigation can be enabled/disabled at runtime via a\ndebugfs file (entry_flush), which causes the kernel to patch itself to\nenable/disable the relevant mitigations.\n\nHowever depending on which mitigation we're using, it may not be safe to\ndo that patching while other CPUs are active. For example the following\ncrash:\n\n sleeper[15639]: segfault (11) at c000000000004c20 nip c000000000004c20 lr c000000000004c20\n\nShows that we returned to userspace with a corrupted LR that points into\nthe kernel, due to executing the partially patched call to the fallback\nentry flush (ie. we missed the LR restore).\n\nFix it by doing the patching under stop machine. The CPUs that aren't\ndoing the patching will be spinning in the core of the stop machine\nlogic. That is currently sufficient for our purposes, because none of\nthe patching we do is to that code or anywhere in the vicinity.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-46990", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-46990", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-46990", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-46990", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-46990", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-46990" + } + }, + "CVE-2021-46991": { + "affected_versions": "v4.16-rc1 to v5.13-rc1", + "breaks": "7b0b1a6d0ac983ce1928432285d0222d4fb7c38b", + "cmt_msg": "i40e: Fix use-after-free in i40e_client_subtask()", + "fixes": "38318f23a7ef86a8b1862e5e8078c4de121960c3", + "last_affected_version": "5.12.4", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\ni40e: Fix use-after-free in i40e_client_subtask()\n\nCurrently the call to i40e_client_del_instance frees the object\npf->cinst, however pf->cinst->lan_info is being accessed after\nthe free. Fix this by adding the missing return.\n\nAddresses-Coverity: (\"Read from pointer after free\")", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-46991", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-46991", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-46991", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-46991", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-46991", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-46991" + } + }, + "CVE-2021-46992": { + "affected_versions": "v4.9-rc1 to v5.13-rc1", + "breaks": "0ed6389c483dc77cdbdd48de0ca7ce41723dd667", + "cmt_msg": "netfilter: nftables: avoid overflows in nft_hash_buckets()", + "fixes": "a54754ec9891830ba548e2010c889e3c8146e449", + "last_affected_version": "5.12.4", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nftables: avoid overflows in nft_hash_buckets()\n\nNumber of buckets being stored in 32bit variables, we have to\nensure that no overflows occur in nft_hash_buckets()\n\nsyzbot injected a size == 0x40000000 and reported:\n\nUBSAN: shift-out-of-bounds in ./include/linux/log2.h:57:13\nshift exponent 64 is too large for 64-bit type 'long unsigned int'\nCPU: 1 PID: 29539 Comm: syz-executor.4 Not tainted 5.12.0-rc7-syzkaller #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011\nCall Trace:\n __dump_stack lib/dump_stack.c:79 [inline]\n dump_stack+0x141/0x1d7 lib/dump_stack.c:120\n ubsan_epilogue+0xb/0x5a lib/ubsan.c:148\n __ubsan_handle_shift_out_of_bounds.cold+0xb1/0x181 lib/ubsan.c:327\n __roundup_pow_of_two include/linux/log2.h:57 [inline]\n nft_hash_buckets net/netfilter/nft_set_hash.c:411 [inline]\n nft_hash_estimate.cold+0x19/0x1e net/netfilter/nft_set_hash.c:652\n nft_select_set_ops net/netfilter/nf_tables_api.c:3586 [inline]\n nf_tables_newset+0xe62/0x3110 net/netfilter/nf_tables_api.c:4322\n nfnetlink_rcv_batch+0xa09/0x24b0 net/netfilter/nfnetlink.c:488\n nfnetlink_rcv_skb_batch net/netfilter/nfnetlink.c:612 [inline]\n nfnetlink_rcv+0x3af/0x420 net/netfilter/nfnetlink.c:630\n netlink_unicast_kernel net/netlink/af_netlink.c:1312 [inline]\n netlink_unicast+0x533/0x7d0 net/netlink/af_netlink.c:1338\n netlink_sendmsg+0x856/0xd90 net/netlink/af_netlink.c:1927\n sock_sendmsg_nosec net/socket.c:654 [inline]\n sock_sendmsg+0xcf/0x120 net/socket.c:674\n ____sys_sendmsg+0x6e8/0x810 net/socket.c:2350\n ___sys_sendmsg+0xf3/0x170 net/socket.c:2404\n __sys_sendmsg+0xe5/0x1b0 net/socket.c:2433\n do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-46992", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-46992", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-46992", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-46992", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-46992", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-46992" + } + }, + "CVE-2021-46993": { + "affected_versions": "v5.3-rc1 to v5.13-rc1", + "breaks": "69842cba9ace84849bb9b8edcdf2cefccd97901c", + "cmt_msg": "sched: Fix out-of-bound access in uclamp", + "fixes": "6d2f8909a5fabb73fe2a63918117943986c39b6c", + "last_affected_version": "5.12.4", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsched: Fix out-of-bound access in uclamp\n\nUtil-clamp places tasks in different buckets based on their clamp values\nfor performance reasons. However, the size of buckets is currently\ncomputed using a rounding division, which can lead to an off-by-one\nerror in some configurations.\n\nFor instance, with 20 buckets, the bucket size will be 1024/20=51. A\ntask with a clamp of 1024 will be mapped to bucket id 1024/51=20. Sadly,\ncorrect indexes are in range [0,19], hence leading to an out of bound\nmemory access.\n\nClamp the bucket id to fix the issue.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-46993", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-46993", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-46993", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-46993", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-46993", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-46993" + } + }, + "CVE-2021-46994": { + "affected_versions": "v5.5-rc1 to v5.13-rc1", + "breaks": "8ce8c0abcba314e1fe954a1840f6568bf5aef2ef", + "cmt_msg": "can: mcp251x: fix resume from sleep before interface was brought up", + "fixes": "03c427147b2d3e503af258711af4fc792b89b0af", + "last_affected_version": "5.12.4", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncan: mcp251x: fix resume from sleep before interface was brought up\n\nSince 8ce8c0abcba3 the driver queues work via priv->restart_work when\nresuming after suspend, even when the interface was not previously\nenabled. This causes a null dereference error as the workqueue is only\nallocated and initialized in mcp251x_open().\n\nTo fix this we move the workqueue init to mcp251x_can_probe() as there\nis no reason to do it later and repeat it whenever mcp251x_open() is\ncalled.\n\n[mkl: fix error handling in mcp251x_stop()]", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-46994", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-46994", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-46994", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-46994", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-46994", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-46994" + } + }, + "CVE-2021-46995": { + "affected_versions": "v5.12-rc1-dontuse to v5.13-rc1", + "breaks": "cf8ee6de2543a0fa6d9471ddbb7216464a9681a1", + "cmt_msg": "can: mcp251xfd: mcp251xfd_probe(): fix an error pointer dereference in probe", + "fixes": "4cc7faa406975b460aa674606291dea197c1210c", + "last_affected_version": "5.12.4", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncan: mcp251xfd: mcp251xfd_probe(): fix an error pointer dereference in probe\n\nWhen we converted this code to use dev_err_probe() we accidentally\nremoved a return. It means that if devm_clk_get() it will lead to an\nOops when we call clk_get_rate() on the next line.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-46995", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-46995", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-46995", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-46995", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-46995", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-46995" + } + }, + "CVE-2021-46996": { + "affected_versions": "v5.10-rc1 to v5.13-rc1", + "breaks": "b131c96496b369c7b14125e7c50e89ac7cec8051", + "cmt_msg": "netfilter: nftables: Fix a memleak from userdata error path in new objects", + "fixes": "85dfd816fabfc16e71786eda0a33a7046688b5b0", + "last_affected_version": "5.12.4", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nftables: Fix a memleak from userdata error path in new objects\n\nRelease object name if userdata allocation fails.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-46996", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-46996", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-46996", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-46996", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-46996", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-46996" + } + }, + "CVE-2021-46997": { + "affected_versions": "v5.10-rc7 to v5.13-rc1", + "breaks": "23529049c68423820487304f244144e0d576e85a", + "cmt_msg": "arm64: entry: always set GIC_PRIO_PSR_I_SET during entry", + "fixes": "4d6a38da8e79e94cbd1344aa90876f0f805db705", + "last_affected_version": "5.12.4", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\narm64: entry: always set GIC_PRIO_PSR_I_SET during entry\n\nZenghui reports that booting a kernel with \"irqchip.gicv3_pseudo_nmi=1\"\non the command line hits a warning during kernel entry, due to the way\nwe manipulate the PMR.\n\nEarly in the entry sequence, we call lockdep_hardirqs_off() to inform\nlockdep that interrupts have been masked (as the HW sets DAIF wqhen\nentering an exception). Architecturally PMR_EL1 is not affected by\nexception entry, and we don't set GIC_PRIO_PSR_I_SET in the PMR early in\nthe exception entry sequence, so early in exception entry the PMR can\nindicate that interrupts are unmasked even though they are masked by\nDAIF.\n\nIf DEBUG_LOCKDEP is selected, lockdep_hardirqs_off() will check that\ninterrupts are masked, before we set GIC_PRIO_PSR_I_SET in any of the\nexception entry paths, and hence lockdep_hardirqs_off() will WARN() that\nsomething is amiss.\n\nWe can avoid this by consistently setting GIC_PRIO_PSR_I_SET during\nexception entry so that kernel code sees a consistent environment. We\nmust also update local_daif_inherit() to undo this, as currently only\ntouches DAIF. For other paths, local_daif_restore() will update both\nDAIF and the PMR. With this done, we can remove the existing special\ncases which set this later in the entry code.\n\nWe always use (GIC_PRIO_IRQON | GIC_PRIO_PSR_I_SET) for consistency with\nlocal_daif_save(), as this will warn if it ever encounters\n(GIC_PRIO_IRQOFF | GIC_PRIO_PSR_I_SET), and never sets this itself. This\nmatches the gic_prio_kentry_setup that we have to retain for\nret_to_user.\n\nThe original splat from Zenghui's report was:\n\n| DEBUG_LOCKS_WARN_ON(!irqs_disabled())\n| WARNING: CPU: 3 PID: 125 at kernel/locking/lockdep.c:4258 lockdep_hardirqs_off+0xd4/0xe8\n| Modules linked in:\n| CPU: 3 PID: 125 Comm: modprobe Tainted: G W 5.12.0-rc8+ #463\n| Hardware name: QEMU KVM Virtual Machine, BIOS 0.0.0 02/06/2015\n| pstate: 604003c5 (nZCv DAIF +PAN -UAO -TCO BTYPE=--)\n| pc : lockdep_hardirqs_off+0xd4/0xe8\n| lr : lockdep_hardirqs_off+0xd4/0xe8\n| sp : ffff80002a39bad0\n| pmr_save: 000000e0\n| x29: ffff80002a39bad0 x28: ffff0000de214bc0\n| x27: ffff0000de1c0400 x26: 000000000049b328\n| x25: 0000000000406f30 x24: ffff0000de1c00a0\n| x23: 0000000020400005 x22: ffff8000105f747c\n| x21: 0000000096000044 x20: 0000000000498ef9\n| x19: ffff80002a39bc88 x18: ffffffffffffffff\n| x17: 0000000000000000 x16: ffff800011c61eb0\n| x15: ffff800011700a88 x14: 0720072007200720\n| x13: 0720072007200720 x12: 0720072007200720\n| x11: 0720072007200720 x10: 0720072007200720\n| x9 : ffff80002a39bad0 x8 : ffff80002a39bad0\n| x7 : ffff8000119f0800 x6 : c0000000ffff7fff\n| x5 : ffff8000119f07a8 x4 : 0000000000000001\n| x3 : 9bcdab23f2432800 x2 : ffff800011730538\n| x1 : 9bcdab23f2432800 x0 : 0000000000000000\n| Call trace:\n| lockdep_hardirqs_off+0xd4/0xe8\n| enter_from_kernel_mode.isra.5+0x7c/0xa8\n| el1_abort+0x24/0x100\n| el1_sync_handler+0x80/0xd0\n| el1_sync+0x6c/0x100\n| __arch_clear_user+0xc/0x90\n| load_elf_binary+0x9fc/0x1450\n| bprm_execve+0x404/0x880\n| kernel_execve+0x180/0x188\n| call_usermodehelper_exec_async+0xdc/0x158\n| ret_from_fork+0x10/0x18", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-46997", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-46997", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-46997", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-46997", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-46997", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-46997" + } + }, + "CVE-2021-46998": { + "affected_versions": "v4.16-rc1 to v5.13-rc1", + "breaks": "fb7516d42478ebc8e2f00efb76ef96f7b68fd8d3", + "cmt_msg": "ethernet:enic: Fix a use after free bug in enic_hard_start_xmit", + "fixes": "643001b47adc844ae33510c4bb93c236667008a3", + "last_affected_version": "5.12.4", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nethernet:enic: Fix a use after free bug in enic_hard_start_xmit\n\nIn enic_hard_start_xmit, it calls enic_queue_wq_skb(). Inside\nenic_queue_wq_skb, if some error happens, the skb will be freed\nby dev_kfree_skb(skb). But the freed skb is still used in\nskb_tx_timestamp(skb).\n\nMy patch makes enic_queue_wq_skb() return error and goto spin_unlock()\nincase of error. The solution is provided by Govind.\nSee https://lkml.org/lkml/2021/4/30/961.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-46998", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-46998", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-46998", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-46998", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-46998", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-46998" + } + }, + "CVE-2021-46999": { + "affected_versions": "v5.7-rc3 to v5.13-rc1", + "breaks": "145cb2f7177d94bc54563ed26027e952ee0ae03c", + "cmt_msg": "sctp: do asoc update earlier in sctp_sf_do_dupcook_a", + "fixes": "35b4f24415c854cd718ccdf38dbea6297f010aae", + "last_affected_version": "5.12.4", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsctp: do asoc update earlier in sctp_sf_do_dupcook_a\n\nThere's a panic that occurs in a few of envs, the call trace is as below:\n\n [] general protection fault, ... 0x29acd70f1000a: 0000 [#1] SMP PTI\n [] RIP: 0010:sctp_ulpevent_notify_peer_addr_change+0x4b/0x1fa [sctp]\n [] sctp_assoc_control_transport+0x1b9/0x210 [sctp]\n [] sctp_do_8_2_transport_strike.isra.16+0x15c/0x220 [sctp]\n [] sctp_cmd_interpreter.isra.21+0x1231/0x1a10 [sctp]\n [] sctp_do_sm+0xc3/0x2a0 [sctp]\n [] sctp_generate_timeout_event+0x81/0xf0 [sctp]\n\nThis is caused by a transport use-after-free issue. When processing a\nduplicate COOKIE-ECHO chunk in sctp_sf_do_dupcook_a(), both COOKIE-ACK\nand SHUTDOWN chunks are allocated with the transort from the new asoc.\nHowever, later in the sideeffect machine, the old asoc is used to send\nthem out and old asoc's shutdown_last_sent_to is set to the transport\nthat SHUTDOWN chunk attached to in sctp_cmd_setup_t2(), which actually\nbelongs to the new asoc. After the new_asoc is freed and the old asoc\nT2 timeout, the old asoc's shutdown_last_sent_to that is already freed\nwould be accessed in sctp_sf_t2_timer_expire().\n\nThanks Alexander and Jere for helping dig into this issue.\n\nTo fix it, this patch is to do the asoc update first, then allocate\nthe COOKIE-ACK and SHUTDOWN chunks with the 'updated' old asoc. This\nwould make more sense, as a chunk from an asoc shouldn't be sent out\nwith another asoc. We had fixed quite a few issues caused by this.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-46999", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-46999", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-46999", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-46999", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-46999", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-46999" + } + }, + "CVE-2021-47000": { + "affected_versions": "v5.8-rc1 to v5.13-rc1", + "breaks": "878dabb64117406abd40977b87544d05bb3031fc", + "cmt_msg": "ceph: fix inode leak on getattr error in __fh_to_dentry", + "fixes": "1775c7ddacfcea29051c67409087578f8f4d751b", + "last_affected_version": "5.12.4", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nceph: fix inode leak on getattr error in __fh_to_dentry", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47000", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47000", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47000", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47000", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47000", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47000" + } + }, + "CVE-2021-47001": { + "affected_versions": "v5.5-rc1 to v5.13-rc1", + "breaks": "2ae50ad68cd79224198b525f7bd645c9da98b6ff", + "cmt_msg": "xprtrdma: Fix cwnd update ordering", + "fixes": "35d8b10a25884050bb3b0149b62c3818ec59f77c", + "last_affected_version": "5.12.4", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nxprtrdma: Fix cwnd update ordering\n\nAfter a reconnect, the reply handler is opening the cwnd (and thus\nenabling more RPC Calls to be sent) /before/ rpcrdma_post_recvs()\ncan post enough Receive WRs to receive their replies. This causes an\nRNR and the new connection is lost immediately.\n\nThe race is most clearly exposed when KASAN and disconnect injection\nare enabled. This slows down rpcrdma_rep_create() enough to allow\nthe send side to post a bunch of RPC Calls before the Receive\ncompletion handler can invoke ib_post_recv().", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47001", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47001", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47001", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47001", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47001", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47001" + } + }, + "CVE-2021-47002": { + "affected_versions": "v5.11-rc1 to v5.13-rc1", + "breaks": "5191955d6fc65e6d4efe8f4f10a6028298f57281", + "cmt_msg": "SUNRPC: Fix null pointer dereference in svc_rqst_free()", + "fixes": "b9f83ffaa0c096b4c832a43964fe6bff3acffe10", + "last_affected_version": "5.12.4", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nSUNRPC: Fix null pointer dereference in svc_rqst_free()\n\nWhen alloc_pages_node() returns null in svc_rqst_alloc(), the\nnull rq_scratch_page pointer will be dereferenced when calling\nput_page() in svc_rqst_free(). Fix it by adding a null check.\n\nAddresses-Coverity: (\"Dereference after null check\")", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47002", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47002", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47002", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47002", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47002", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47002" + } + }, + "CVE-2021-47003": { + "affected_versions": "v5.11 to v5.13-rc1", + "breaks": "89e3becd8f821e507052e012d2559dcda59f538e", + "cmt_msg": "dmaengine: idxd: Fix potential null dereference on pointer status", + "fixes": "28ac8e03c43dfc6a703aa420d18222540b801120", + "last_affected_version": "5.12.4", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndmaengine: idxd: Fix potential null dereference on pointer status\n\nThere are calls to idxd_cmd_exec that pass a null status pointer however\na recent commit has added an assignment to *status that can end up\nwith a null pointer dereference. The function expects a null status\npointer sometimes as there is a later assignment to *status where\nstatus is first null checked. Fix the issue by null checking status\nbefore making the assignment.\n\nAddresses-Coverity: (\"Explicit null dereferenced\")", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47003", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47003", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47003", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47003", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47003", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47003" + } + }, + "CVE-2021-47004": { + "affected_versions": "v4.20-rc1 to v5.13-rc1", + "breaks": "4354994f097d068a894aa1a0860da54571df3582", + "cmt_msg": "f2fs: fix to avoid touching checkpointed data in get_victim()", + "fixes": "61461fc921b756ae16e64243f72af2bfc2e620db", + "last_affected_version": "5.12.4", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nf2fs: fix to avoid touching checkpointed data in get_victim()\n\nIn CP disabling mode, there are two issues when using LFS or SSR | AT_SSR\nmode to select victim:\n\n1. LFS is set to find source section during GC, the victim should have\nno checkpointed data, since after GC, section could not be set free for\nreuse.\n\nPreviously, we only check valid chpt blocks in current segment rather\nthan section, fix it.\n\n2. SSR | AT_SSR are set to find target segment for writes which can be\nfully filled by checkpointed and newly written blocks, we should never\nselect such segment, otherwise it can cause panic or data corruption\nduring allocation, potential case is described as below:\n\n a) target segment has 'n' (n < 512) ckpt valid blocks\n b) GC migrates 'n' valid blocks to other segment (segment is still\n in dirty list)\n c) GC migrates '512 - n' blocks to target segment (segment has 'n'\n cp_vblocks and '512 - n' vblocks)\n d) If GC selects target segment via {AT,}SSR allocator, however there\n is no free space in targe segment.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47004", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47004", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47004", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47004", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47004", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47004" + } + }, + "CVE-2021-47005": { + "affected_versions": "v5.1-rc1 to v5.13-rc1", + "breaks": "2c04c5b8eef797dca99699cfb55ff42dd3c12c23", + "cmt_msg": "PCI: endpoint: Fix NULL pointer dereference for ->get_features()", + "fixes": "6613bc2301ba291a1c5a90e1dc24cf3edf223c03", + "last_affected_version": "5.12.4", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nPCI: endpoint: Fix NULL pointer dereference for ->get_features()\n\nget_features ops of pci_epc_ops may return NULL, causing NULL pointer\ndereference in pci_epf_test_alloc_space function. Let us add a check for\npci_epc_feature pointer in pci_epf_test_bind before we access it to avoid\nany such NULL pointer dereference and return -ENOTSUPP in case\npci_epc_feature is not found.\n\nWhen the patch is not applied and EPC features is not implemented in the\nplatform driver, we see the following dump due to kernel NULL pointer\ndereference.\n\nCall trace:\n pci_epf_test_bind+0xf4/0x388\n pci_epf_bind+0x3c/0x80\n pci_epc_epf_link+0xa8/0xcc\n configfs_symlink+0x1a4/0x48c\n vfs_symlink+0x104/0x184\n do_symlinkat+0x80/0xd4\n __arm64_sys_symlinkat+0x1c/0x24\n el0_svc_common.constprop.3+0xb8/0x170\n el0_svc_handler+0x70/0x88\n el0_svc+0x8/0x640\nCode: d2800581 b9403ab9 f9404ebb 8b394f60 (f9400400)\n---[ end trace a438e3c5a24f9df0 ]---", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47005", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47005", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47005", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47005", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47005", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47005" + } + }, + "CVE-2021-47006": { + "affected_versions": "v4.7-rc1 to v5.13-rc1", + "breaks": "1879445dfa7bbd6fe21b09c5cc72f4934798afed", + "cmt_msg": "ARM: 9064/1: hw_breakpoint: Do not directly check the event's overflow_handler hook", + "fixes": "a506bd5756290821a4314f502b4bafc2afcf5260", + "last_affected_version": "5.12.4", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nARM: 9064/1: hw_breakpoint: Do not directly check the event's overflow_handler hook\n\nThe commit 1879445dfa7b (\"perf/core: Set event's default\n::overflow_handler()\") set a default event->overflow_handler in\nperf_event_alloc(), and replace the check event->overflow_handler with\nis_default_overflow_handler(), but one is missing.\n\nCurrently, the bp->overflow_handler can not be NULL. As a result,\nenable_single_step() is always not invoked.\n\nComments from Zhen Lei:\n\n https://patchwork.kernel.org/project/linux-arm-kernel/patch/20210207105934.2001-1-thunder.leizhen@huawei.com/", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47006", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47006", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47006", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47006", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47006", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47006" + } + }, + "CVE-2021-47007": { + "affected_versions": "v5.8-rc1 to v5.13-rc1", + "breaks": "b4b10061ef98c583bcf82a4200703fbaa98c18dc", + "cmt_msg": "f2fs: fix panic during f2fs_resize_fs()", + "fixes": "3ab0598e6d860ef49d029943ba80f627c15c15d6", + "last_affected_version": "5.12.4", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nf2fs: fix panic during f2fs_resize_fs()\n\nf2fs_resize_fs() hangs in below callstack with testcase:\n- mkfs 16GB image & mount image\n- dd 8GB fileA\n- dd 8GB fileB\n- sync\n- rm fileA\n- sync\n- resize filesystem to 8GB\n\nkernel BUG at segment.c:2484!\nCall Trace:\n allocate_segment_by_default+0x92/0xf0 [f2fs]\n f2fs_allocate_data_block+0x44b/0x7e0 [f2fs]\n do_write_page+0x5a/0x110 [f2fs]\n f2fs_outplace_write_data+0x55/0x100 [f2fs]\n f2fs_do_write_data_page+0x392/0x850 [f2fs]\n move_data_page+0x233/0x320 [f2fs]\n do_garbage_collect+0x14d9/0x1660 [f2fs]\n free_segment_range+0x1f7/0x310 [f2fs]\n f2fs_resize_fs+0x118/0x330 [f2fs]\n __f2fs_ioctl+0x487/0x3680 [f2fs]\n __x64_sys_ioctl+0x8e/0xd0\n do_syscall_64+0x33/0x80\n entry_SYSCALL_64_after_hwframe+0x44/0xa9\n\nThe root cause is we forgot to check that whether we have enough space\nin resized filesystem to store all valid blocks in before-resizing\nfilesystem, then allocator will run out-of-space during block migration\nin free_segment_range().", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47007", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47007", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47007", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47007", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47007", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47007" + } + }, + "CVE-2021-47008": { + "affected_versions": "v5.11-rc1 to v5.13-rc1", + "breaks": "f1c6366e304328de301be362eca905a3503ff33b", + "cmt_msg": "KVM: SVM: Make sure GHCB is mapped before updating", + "fixes": "a3ba26ecfb569f4aa3f867e80c02aa65f20aadad", + "last_affected_version": "5.12.4", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: SVM: Make sure GHCB is mapped before updating\n\nAccess to the GHCB is mainly in the VMGEXIT path and it is known that the\nGHCB will be mapped. But there are two paths where it is possible the GHCB\nmight not be mapped.\n\nThe sev_vcpu_deliver_sipi_vector() routine will update the GHCB to inform\nthe caller of the AP Reset Hold NAE event that a SIPI has been delivered.\nHowever, if a SIPI is performed without a corresponding AP Reset Hold,\nthen the GHCB might not be mapped (depending on the previous VMEXIT),\nwhich will result in a NULL pointer dereference.\n\nThe svm_complete_emulated_msr() routine will update the GHCB to inform\nthe caller of a RDMSR/WRMSR operation about any errors. While it is likely\nthat the GHCB will be mapped in this situation, add a safe guard\nin this path to be certain a NULL pointer dereference is not encountered.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47008", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47008", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47008", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47008", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47008", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47008" + } + }, + "CVE-2021-47009": { + "affected_versions": "v5.12-rc1-dontuse to v5.13-rc2", + "breaks": "5df16caada3fba3b21cb09b85cdedf99507f4ec1", + "cmt_msg": "KEYS: trusted: Fix memory leak on object td", + "fixes": "83a775d5f9bfda95b1c295f95a3a041a40c7f321", + "last_affected_version": "5.12.4", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nKEYS: trusted: Fix memory leak on object td\n\nTwo error return paths are neglecting to free allocated object td,\ncausing a memory leak. Fix this by returning via the error return\npath that securely kfree's td.\n\nFixes clang scan-build warning:\nsecurity/keys/trusted-keys/trusted_tpm1.c:496:10: warning: Potential\nmemory leak [unix.Malloc]", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47009", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47009", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47009", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47009", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47009", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47009" + } + }, + "CVE-2021-47010": { + "affected_versions": "v4.15-rc1 to v5.13-rc1", + "breaks": "6670e152447732ba90626f36dfc015a13fbf150e", + "cmt_msg": "net: Only allow init netns to set default tcp cong to a restricted algo", + "fixes": "8d432592f30fcc34ef5a10aac4887b4897884493", + "last_affected_version": "5.12.3", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: Only allow init netns to set default tcp cong to a restricted algo\n\ntcp_set_default_congestion_control() is netns-safe in that it writes\nto &net->ipv4.tcp_congestion_control, but it also sets\nca->flags |= TCP_CONG_NON_RESTRICTED which is not namespaced.\nThis has the unintended side-effect of changing the global\nnet.ipv4.tcp_allowed_congestion_control sysctl, despite the fact that it\nis read-only: 97684f0970f6 (\"net: Make tcp_allowed_congestion_control\nreadonly in non-init netns\")\n\nResolve this netns \"leak\" by only allowing the init netns to set the\ndefault algorithm to one that is restricted. This restriction could be\nremoved if tcp_allowed_congestion_control were namespace-ified in the\nfuture.\n\nThis bug was uncovered with\nhttps://github.com/JonathonReinhart/linux-netns-sysctl-verify", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47010", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47010", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47010", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47010", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47010", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47010" + } + }, + "CVE-2021-47011": { + "affected_versions": "v5.11-rc5 to v5.13-rc1", + "breaks": "3de7d4f25a7438f09fef4e71ef111f1805cd8e7c", + "cmt_msg": "mm: memcontrol: slab: fix obtain a reference to a freeing memcg", + "fixes": "9f38f03ae8d5f57371b71aa6b4275765b65454fd", + "last_affected_version": "5.12.3", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm: memcontrol: slab: fix obtain a reference to a freeing memcg\n\nPatch series \"Use obj_cgroup APIs to charge kmem pages\", v5.\n\nSince Roman's series \"The new cgroup slab memory controller\" applied.\nAll slab objects are charged with the new APIs of obj_cgroup. The new\nAPIs introduce a struct obj_cgroup to charge slab objects. It prevents\nlong-living objects from pinning the original memory cgroup in the\nmemory. But there are still some corner objects (e.g. allocations\nlarger than order-1 page on SLUB) which are not charged with the new\nAPIs. Those objects (include the pages which are allocated from buddy\nallocator directly) are charged as kmem pages which still hold a\nreference to the memory cgroup.\n\nE.g. We know that the kernel stack is charged as kmem pages because the\nsize of the kernel stack can be greater than 2 pages (e.g. 16KB on\nx86_64 or arm64). If we create a thread (suppose the thread stack is\ncharged to memory cgroup A) and then move it from memory cgroup A to\nmemory cgroup B. Because the kernel stack of the thread hold a\nreference to the memory cgroup A. The thread can pin the memory cgroup\nA in the memory even if we remove the cgroup A. If we want to see this\nscenario by using the following script. We can see that the system has\nadded 500 dying cgroups (This is not a real world issue, just a script\nto show that the large kmallocs are charged as kmem pages which can pin\nthe memory cgroup in the memory).\n\n\t#!/bin/bash\n\n\tcat /proc/cgroups | grep memory\n\n\tcd /sys/fs/cgroup/memory\n\techo 1 > memory.move_charge_at_immigrate\n\n\tfor i in range{1..500}\n\tdo\n\t\tmkdir kmem_test\n\t\techo $$ > kmem_test/cgroup.procs\n\t\tsleep 3600 &\n\t\techo $$ > cgroup.procs\n\t\techo `cat kmem_test/cgroup.procs` > cgroup.procs\n\t\trmdir kmem_test\n\tdone\n\n\tcat /proc/cgroups | grep memory\n\nThis patchset aims to make those kmem pages to drop the reference to\nmemory cgroup by using the APIs of obj_cgroup. Finally, we can see that\nthe number of the dying cgroups will not increase if we run the above test\nscript.\n\nThis patch (of 7):\n\nThe rcu_read_lock/unlock only can guarantee that the memcg will not be\nfreed, but it cannot guarantee the success of css_get (which is in the\nrefill_stock when cached memcg changed) to memcg.\n\n rcu_read_lock()\n memcg = obj_cgroup_memcg(old)\n __memcg_kmem_uncharge(memcg)\n refill_stock(memcg)\n if (stock->cached != memcg)\n // css_get can change the ref counter from 0 back to 1.\n css_get(&memcg->css)\n rcu_read_unlock()\n\nThis fix is very like the commit:\n\n eefbfa7fd678 (\"mm: memcg/slab: fix use after free in obj_cgroup_charge\")\n\nFix this by holding a reference to the memcg which is passed to the\n__memcg_kmem_uncharge() before calling __memcg_kmem_uncharge().", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47011", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47011", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47011", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47011", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47011", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47011" + } + }, + "CVE-2021-47012": { + "affected_versions": "v5.3-rc1 to v5.13-rc1", + "breaks": "2251334dcac9eb337575d8767e2a6a7e81848f7f", + "cmt_msg": "RDMA/siw: Fix a use after free in siw_alloc_mr", + "fixes": "3093ee182f01689b89e9f8797b321603e5de4f63", + "last_affected_version": "5.12.3", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/siw: Fix a use after free in siw_alloc_mr\n\nOur code analyzer reported a UAF.\n\nIn siw_alloc_mr(), it calls siw_mr_add_mem(mr,..). In the implementation of\nsiw_mr_add_mem(), mem is assigned to mr->mem and then mem is freed via\nkfree(mem) if xa_alloc_cyclic() failed. Here, mr->mem still point to a\nfreed object. After, the execution continue up to the err_out branch of\nsiw_alloc_mr, and the freed mr->mem is used in siw_mr_drop_mem(mr).\n\nMy patch moves \"mr->mem = mem\" behind the if (xa_alloc_cyclic(..)<0) {}\nsection, to avoid the uaf.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47012", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47012", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47012", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47012", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47012", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47012" + } + }, + "CVE-2021-47013": { + "affected_versions": "v4.9-rc1 to v5.13-rc1", + "breaks": "b9b17debc69d27cd55e21ee51a5ba7fc50a426cf", + "cmt_msg": "net:emac/emac-mac: Fix a use after free in emac_mac_tx_buf_send", + "fixes": "6d72e7c767acbbdd44ebc7d89c6690b405b32b57", + "last_affected_version": "5.12.3", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet:emac/emac-mac: Fix a use after free in emac_mac_tx_buf_send\n\nIn emac_mac_tx_buf_send, it calls emac_tx_fill_tpd(..,skb,..).\nIf some error happens in emac_tx_fill_tpd(), the skb will be freed via\ndev_kfree_skb(skb) in error branch of emac_tx_fill_tpd().\nBut the freed skb is still used via skb->len by netdev_sent_queue(,skb->len).\n\nAs i observed that emac_tx_fill_tpd() haven't modified the value of skb->len,\nthus my patch assigns skb->len to 'len' before the possible free and\nuse 'len' instead of skb->len later.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47013", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47013", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47013", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47013", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47013", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47013" + } + }, + "CVE-2021-47014": { + "affected_versions": "v5.8-rc7 to v5.13-rc1", + "breaks": "ae372cb1750f6c95370f92fe5f5620e0954663ba", + "cmt_msg": "net/sched: act_ct: fix wild memory access when clearing fragments", + "fixes": "f77bd544a6bbe69aa50d9ed09f13494cf36ff806", + "last_affected_version": "5.12.3", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: act_ct: fix wild memory access when clearing fragments\n\nwhile testing re-assembly/re-fragmentation using act_ct, it's possible to\nobserve a crash like the following one:\n\n KASAN: maybe wild-memory-access in range [0x0001000000000448-0x000100000000044f]\n CPU: 50 PID: 0 Comm: swapper/50 Tainted: G S 5.12.0-rc7+ #424\n Hardware name: Dell Inc. PowerEdge R730/072T6D, BIOS 2.4.3 01/17/2017\n RIP: 0010:inet_frag_rbtree_purge+0x50/0xc0\n Code: 00 fc ff df 48 89 c3 31 ed 48 89 df e8 a9 7a 38 ff 4c 89 fe 48 89 df 49 89 c6 e8 5b 3a 38 ff 48 8d 7b 40 48 89 f8 48 c1 e8 03 <42> 80 3c 20 00 75 59 48 8d bb d0 00 00 00 4c 8b 6b 40 48 89 f8 48\n RSP: 0018:ffff888c31449db8 EFLAGS: 00010203\n RAX: 0000200000000089 RBX: 000100000000040e RCX: ffffffff989eb960\n RDX: 0000000000000140 RSI: ffffffff97cfb977 RDI: 000100000000044e\n RBP: 0000000000000900 R08: 0000000000000000 R09: ffffed1186289350\n R10: 0000000000000003 R11: ffffed1186289350 R12: dffffc0000000000\n R13: 000100000000040e R14: 0000000000000000 R15: ffff888155e02160\n FS: 0000000000000000(0000) GS:ffff888c31440000(0000) knlGS:0000000000000000\n CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 00005600cb70a5b8 CR3: 0000000a2c014005 CR4: 00000000003706e0\n DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n Call Trace:\n \n inet_frag_destroy+0xa9/0x150\n call_timer_fn+0x2d/0x180\n run_timer_softirq+0x4fe/0xe70\n __do_softirq+0x197/0x5a0\n irq_exit_rcu+0x1de/0x200\n sysvec_apic_timer_interrupt+0x6b/0x80\n \n\nwhen act_ct temporarily stores an IP fragment, restoring the skb qdisc cb\nresults in putting random data in FRAG_CB(), and this causes those \"wild\"\nmemory accesses later, when the rbtree is purged. Never overwrite the skb\ncb in case tcf_ct_handle_fragments() returns -EINPROGRESS.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47014", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47014", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47014", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47014", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47014", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47014" + } + }, + "CVE-2021-47015": { + "affected_versions": "v5.1-rc5 to v5.13-rc1", + "breaks": "a1b0e4e684e9c300b9e759b46cb7a0147e61ddff", + "cmt_msg": "bnxt_en: Fix RX consumer index logic in the error path.", + "fixes": "bbd6f0a948139970f4a615dff189d9a503681a39", + "last_affected_version": "5.12.3", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbnxt_en: Fix RX consumer index logic in the error path.\n\nIn bnxt_rx_pkt(), the RX buffers are expected to complete in order.\nIf the RX consumer index indicates an out of order buffer completion,\nit means we are hitting a hardware bug and the driver will abort all\nremaining RX packets and reset the RX ring. The RX consumer index\nthat we pass to bnxt_discard_rx() is not correct. We should be\npassing the current index (tmp_raw_cons) instead of the old index\n(raw_cons). This bug can cause us to be at the wrong index when\ntrying to abort the next RX packet. It can crash like this:\n\n #0 [ffff9bbcdf5c39a8] machine_kexec at ffffffff9b05e007\n #1 [ffff9bbcdf5c3a00] __crash_kexec at ffffffff9b111232\n #2 [ffff9bbcdf5c3ad0] panic at ffffffff9b07d61e\n #3 [ffff9bbcdf5c3b50] oops_end at ffffffff9b030978\n #4 [ffff9bbcdf5c3b78] no_context at ffffffff9b06aaf0\n #5 [ffff9bbcdf5c3bd8] __bad_area_nosemaphore at ffffffff9b06ae2e\n #6 [ffff9bbcdf5c3c28] bad_area_nosemaphore at ffffffff9b06af24\n #7 [ffff9bbcdf5c3c38] __do_page_fault at ffffffff9b06b67e\n #8 [ffff9bbcdf5c3cb0] do_page_fault at ffffffff9b06bb12\n #9 [ffff9bbcdf5c3ce0] page_fault at ffffffff9bc015c5\n [exception RIP: bnxt_rx_pkt+237]\n RIP: ffffffffc0259cdd RSP: ffff9bbcdf5c3d98 RFLAGS: 00010213\n RAX: 000000005dd8097f RBX: ffff9ba4cb11b7e0 RCX: ffffa923cf6e9000\n RDX: 0000000000000fff RSI: 0000000000000627 RDI: 0000000000001000\n RBP: ffff9bbcdf5c3e60 R8: 0000000000420003 R9: 000000000000020d\n R10: ffffa923cf6ec138 R11: ffff9bbcdf5c3e83 R12: ffff9ba4d6f928c0\n R13: ffff9ba4cac28080 R14: ffff9ba4cb11b7f0 R15: ffff9ba4d5a30000\n ORIG_RAX: ffffffffffffffff CS: 0010 SS: 0018", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47015", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47015", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47015", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47015", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47015", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47015" + } + }, + "CVE-2021-47016": { + "affected_versions": "v5.2-rc1 to v5.13-rc1", + "breaks": "7529b90d051e4629884771ba2b1d3a87d2c6a9d7", + "cmt_msg": "m68k: mvme147,mvme16x: Don't wipe PCC timer config bits", + "fixes": "43262178c043032e7c42d00de44c818ba05f9967", + "last_affected_version": "5.12.3", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nm68k: mvme147,mvme16x: Don't wipe PCC timer config bits\n\nDon't clear the timer 1 configuration bits when clearing the interrupt flag\nand counter overflow. As Michael reported, \"This results in no timer\ninterrupts being delivered after the first. Initialization then hangs\nin calibrate_delay as the jiffies counter is not updated.\"\n\nOn mvme16x, enable the timer after requesting the irq, consistent with\nmvme147.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47016", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47016", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47016", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47016", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47016", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47016" + } + }, + "CVE-2021-47017": { + "affected_versions": "v5.8-rc1 to v5.13-rc1", + "breaks": "c8334512f3dd1b94844baca629f9bedca4271593", + "cmt_msg": "ath10k: Fix a use after free in ath10k_htc_send_bundle", + "fixes": "8392df5d7e0b6a7d21440da1fc259f9938f4dec3", + "last_affected_version": "5.12.3", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nath10k: Fix a use after free in ath10k_htc_send_bundle\n\nIn ath10k_htc_send_bundle, the bundle_skb could be freed by\ndev_kfree_skb_any(bundle_skb). But the bundle_skb is used later\nby bundle_skb->len.\n\nAs skb_len = bundle_skb->len, my patch replaces bundle_skb->len to\nskb_len after the bundle_skb was freed.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47017", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47017", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47017", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47017", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47017", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47017" + } + }, + "CVE-2021-47018": { + "affected_versions": "v5.5-rc1 to v5.13-rc1", + "breaks": "265c3491c4bc8d40587996d6ee2f447a7ccfb4f3", + "cmt_msg": "powerpc/64: Fix the definition of the fixmap area", + "fixes": "9ccba66d4d2aff9a3909aa77d57ea8b7cc166f3c", + "last_affected_version": "5.12.3", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\npowerpc/64: Fix the definition of the fixmap area\n\nAt the time being, the fixmap area is defined at the top of\nthe address space or just below KASAN.\n\nThis definition is not valid for PPC64.\n\nFor PPC64, use the top of the I/O space.\n\nBecause of circular dependencies, it is not possible to include\nasm/fixmap.h in asm/book3s/64/pgtable.h , so define a fixed size\nAREA at the top of the I/O space for fixmap and ensure during\nbuild that the size is big enough.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47018", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47018", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47018", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47018", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47018", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47018" + } + }, + "CVE-2021-47019": { + "affected_versions": "v5.12-rc1-dontuse to v5.13-rc1", + "breaks": "ffa1bf97425bd511b105ce769976e20a845a71e9", + "cmt_msg": "mt76: mt7921: fix possible invalid register access", + "fixes": "fe3fccde8870764ba3e60610774bd7bc9f8faeff", + "last_affected_version": "5.12.3", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmt76: mt7921: fix possible invalid register access\n\nDisable the interrupt and synchronze for the pending irq handlers to ensure\nthe irq tasklet is not being scheduled after the suspend to avoid the\npossible invalid register access acts when the host pcie controller is\nsuspended.\n\n[17932.910534] mt7921e 0000:01:00.0: pci_pm_suspend+0x0/0x22c returned 0 after 21375 usecs\n[17932.910590] pcieport 0000:00:00.0: calling pci_pm_suspend+0x0/0x22c @ 18565, parent: pci0000:00\n[17932.910602] pcieport 0000:00:00.0: pci_pm_suspend+0x0/0x22c returned 0 after 8 usecs\n[17932.910671] mtk-pcie 11230000.pcie: calling platform_pm_suspend+0x0/0x60 @ 22783, parent: soc\n[17932.910674] mtk-pcie 11230000.pcie: platform_pm_suspend+0x0/0x60 returned 0 after 0 usecs\n\n...\n\n17933.615352] x1 : 00000000000d4200 x0 : ffffff8269ca2300\n[17933.620666] Call trace:\n[17933.623127] mt76_mmio_rr+0x28/0xf0 [mt76]\n[17933.627234] mt7921_rr+0x38/0x44 [mt7921e]\n[17933.631339] mt7921_irq_tasklet+0x54/0x1d8 [mt7921e]\n[17933.636309] tasklet_action_common+0x12c/0x16c\n[17933.640754] tasklet_action+0x24/0x2c\n[17933.644418] __do_softirq+0x16c/0x344\n[17933.648082] irq_exit+0xa8/0xac\n[17933.651224] scheduler_ipi+0xd4/0x148\n[17933.654890] handle_IPI+0x164/0x2d4\n[17933.658379] gic_handle_irq+0x140/0x178\n[17933.662216] el1_irq+0xb8/0x180\n[17933.665361] cpuidle_enter_state+0xf8/0x204\n[17933.669544] cpuidle_enter+0x38/0x4c\n[17933.673122] do_idle+0x1a4/0x2a8\n[17933.676352] cpu_startup_entry+0x24/0x28\n[17933.680276] rest_init+0xd4/0xe0\n[17933.683508] arch_call_rest_init+0x10/0x18\n[17933.687606] start_kernel+0x340/0x3b4\n[17933.691279] Code: aa0003f5 d503201f f953eaa8 8b344108 (b9400113)\n[17933.697373] ---[ end trace a24b8e26ffbda3c5 ]---\n[17933.767846] Kernel panic - not syncing: Fatal exception in interrupt", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47019", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47019", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47019", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47019", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47019", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47019" + } + }, + "CVE-2021-47020": { + "affected_versions": "v4.18-rc1 to v5.13-rc1", + "breaks": "89e590535f32d4bc548bcf266f3b046e50942f6d", + "cmt_msg": "soundwire: stream: fix memory leak in stream config error path", + "fixes": "48f17f96a81763c7c8bf5500460a359b9939359f", + "last_affected_version": "5.12.3", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsoundwire: stream: fix memory leak in stream config error path\n\nWhen stream config is failed, master runtime will release all\nslave runtime in the slave_rt_list, but slave runtime is not\nadded to the list at this time. This patch frees slave runtime\nin the config error path to fix the memory leak.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47020", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47020", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47020", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47020", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47020", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47020" + } + }, + "CVE-2021-47021": { + "affected_versions": "v5.12-rc1-dontuse to v5.13-rc1", + "breaks": "f285dfb98562e8380101095d168910df1d07d8be", + "cmt_msg": "mt76: mt7915: fix memleak when mt7915_unregister_device()", + "fixes": "e9d32af478cfc3744a45245c0b126738af4b3ac4", + "last_affected_version": "5.12.3", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmt76: mt7915: fix memleak when mt7915_unregister_device()\n\nmt7915_tx_token_put() should get call before mt76_free_pending_txwi().", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47021", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47021", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47021", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47021", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47021", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47021" + } + }, + "CVE-2021-47022": { + "affected_versions": "v5.12-rc1-dontuse to v5.13-rc1", + "breaks": "a6275e934605646ef81b02d8d1164f21343149c9", + "cmt_msg": "mt76: mt7615: fix memleak when mt7615_unregister_device()", + "fixes": "8ab31da7b89f71c4c2defcca989fab7b42f87d71", + "last_affected_version": "5.12.3", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmt76: mt7615: fix memleak when mt7615_unregister_device()\n\nmt7615_tx_token_put() should get call before mt76_free_pending_txwi().", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47022", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47022", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47022", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47022", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47022", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47022" + } + }, + "CVE-2021-47023": { + "affected_versions": "v5.10-rc1 to v5.13-rc1", + "breaks": "501ef3066c89d7f9045315e1be58749cf9e6814d", + "cmt_msg": "net: marvell: prestera: fix port event handling on init", + "fixes": "333980481b99edb24ebd5d1a53af70a15d9146de", + "last_affected_version": "5.12.3", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: marvell: prestera: fix port event handling on init\n\nFor some reason there might be a crash during ports creation if port\nevents are handling at the same time because fw may send initial\nport event with down state.\n\nThe crash points to cancel_delayed_work() which is called when port went\nis down. Currently I did not find out the real cause of the issue, so\nfixed it by cancel port stats work only if previous port's state was up\n& runnig.\n\nThe following is the crash which can be triggered:\n\n[ 28.311104] Unable to handle kernel paging request at virtual address\n000071775f776600\n[ 28.319097] Mem abort info:\n[ 28.321914] ESR = 0x96000004\n[ 28.324996] EC = 0x25: DABT (current EL), IL = 32 bits\n[ 28.330350] SET = 0, FnV = 0\n[ 28.333430] EA = 0, S1PTW = 0\n[ 28.336597] Data abort info:\n[ 28.339499] ISV = 0, ISS = 0x00000004\n[ 28.343362] CM = 0, WnR = 0\n[ 28.346354] user pgtable: 4k pages, 48-bit VAs, pgdp=0000000100bf7000\n[ 28.352842] [000071775f776600] pgd=0000000000000000,\np4d=0000000000000000\n[ 28.359695] Internal error: Oops: 96000004 [#1] PREEMPT SMP\n[ 28.365310] Modules linked in: prestera_pci(+) prestera\nuio_pdrv_genirq\n[ 28.372005] CPU: 0 PID: 1291 Comm: kworker/0:1H Not tainted\n5.11.0-rc4 #1\n[ 28.378846] Hardware name: DNI AmazonGo1 A7040 board (DT)\n[ 28.384283] Workqueue: prestera_fw_wq prestera_fw_evt_work_fn\n[prestera_pci]\n[ 28.391413] pstate: 60000085 (nZCv daIf -PAN -UAO -TCO BTYPE=--)\n[ 28.397468] pc : get_work_pool+0x48/0x60\n[ 28.401442] lr : try_to_grab_pending+0x6c/0x1b0\n[ 28.406018] sp : ffff80001391bc60\n[ 28.409358] x29: ffff80001391bc60 x28: 0000000000000000\n[ 28.414725] x27: ffff000104fc8b40 x26: ffff80001127de88\n[ 28.420089] x25: 0000000000000000 x24: ffff000106119760\n[ 28.425452] x23: ffff00010775dd60 x22: ffff00010567e000\n[ 28.430814] x21: 0000000000000000 x20: ffff80001391bcb0\n[ 28.436175] x19: ffff00010775deb8 x18: 00000000000000c0\n[ 28.441537] x17: 0000000000000000 x16: 000000008d9b0e88\n[ 28.446898] x15: 0000000000000001 x14: 00000000000002ba\n[ 28.452261] x13: 80a3002c00000002 x12: 00000000000005f4\n[ 28.457622] x11: 0000000000000030 x10: 000000000000000c\n[ 28.462985] x9 : 000000000000000c x8 : 0000000000000030\n[ 28.468346] x7 : ffff800014400000 x6 : ffff000106119758\n[ 28.473708] x5 : 0000000000000003 x4 : ffff00010775dc60\n[ 28.479068] x3 : 0000000000000000 x2 : 0000000000000060\n[ 28.484429] x1 : 000071775f776600 x0 : ffff00010775deb8\n[ 28.489791] Call trace:\n[ 28.492259] get_work_pool+0x48/0x60\n[ 28.495874] cancel_delayed_work+0x38/0xb0\n[ 28.500011] prestera_port_handle_event+0x90/0xa0 [prestera]\n[ 28.505743] prestera_evt_recv+0x98/0xe0 [prestera]\n[ 28.510683] prestera_fw_evt_work_fn+0x180/0x228 [prestera_pci]\n[ 28.516660] process_one_work+0x1e8/0x360\n[ 28.520710] worker_thread+0x44/0x480\n[ 28.524412] kthread+0x154/0x160\n[ 28.527670] ret_from_fork+0x10/0x38\n[ 28.531290] Code: a8c17bfd d50323bf d65f03c0 9278dc21 (f9400020)\n[ 28.537429] ---[ end trace 5eced933df3a080b ]---", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47023", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47023", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47023", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47023", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47023", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47023" + } + }, + "CVE-2021-47024": { + "affected_versions": "v5.2-rc2 to v5.13-rc1", + "breaks": "ac03046ece2b158ebd204dfc4896fd9f39f0e6c8", + "cmt_msg": "vsock/virtio: free queued packets when closing socket", + "fixes": "8432b8114957235f42e070a16118a7f750de9d39", + "last_affected_version": "5.12.3", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvsock/virtio: free queued packets when closing socket\n\nAs reported by syzbot [1], there is a memory leak while closing the\nsocket. We partially solved this issue with commit ac03046ece2b\n(\"vsock/virtio: free packets during the socket release\"), but we\nforgot to drain the RX queue when the socket is definitely closed by\nthe scheduled work.\n\nTo avoid future issues, let's use the new virtio_transport_remove_sock()\nto drain the RX queue before removing the socket from the af_vsock lists\ncalling vsock_remove_sock().\n\n[1] https://syzkaller.appspot.com/bug?extid=24452624fc4c571eedd9", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47024", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47024", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47024", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47024", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47024", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47024" + } + }, + "CVE-2021-47025": { + "affected_versions": "v5.12-rc1-dontuse to v5.13-rc1", + "breaks": "c0b57581b73be7b43f39e0dff201c93413f6a668", + "cmt_msg": "iommu/mediatek: Always enable the clk on resume", + "fixes": "b34ea31fe013569d42b7e8681ef3f717f77c5b72", + "last_affected_version": "5.12.3", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\niommu/mediatek: Always enable the clk on resume\n\nIn mtk_iommu_runtime_resume always enable the clk, even\nif m4u_dom is null. Otherwise the 'suspend' cb might\ndisable the clk which is already disabled causing the warning:\n\n[ 1.586104] infra_m4u already disabled\n[ 1.586133] WARNING: CPU: 0 PID: 121 at drivers/clk/clk.c:952 clk_core_disable+0xb0/0xb8\n[ 1.594391] mtk-iommu 10205000.iommu: bound 18001000.larb (ops mtk_smi_larb_component_ops)\n[ 1.598108] Modules linked in:\n[ 1.598114] CPU: 0 PID: 121 Comm: kworker/0:2 Not tainted 5.12.0-rc5 #69\n[ 1.609246] mtk-iommu 10205000.iommu: bound 14027000.larb (ops mtk_smi_larb_component_ops)\n[ 1.617487] Hardware name: Google Elm (DT)\n[ 1.617491] Workqueue: pm pm_runtime_work\n[ 1.620545] mtk-iommu 10205000.iommu: bound 19001000.larb (ops mtk_smi_larb_component_ops)\n\n[ 1.627229] pstate: 60000085 (nZCv daIf -PAN -UAO -TCO BTYPE=--)\n[ 1.659297] pc : clk_core_disable+0xb0/0xb8\n[ 1.663475] lr : clk_core_disable+0xb0/0xb8\n[ 1.667652] sp : ffff800011b9bbe0\n[ 1.670959] x29: ffff800011b9bbe0 x28: 0000000000000000\n[ 1.676267] x27: ffff800011448000 x26: ffff8000100cfd98\n[ 1.681574] x25: ffff800011b9bd48 x24: 0000000000000000\n[ 1.686882] x23: 0000000000000000 x22: ffff8000106fad90\n[ 1.692189] x21: 000000000000000a x20: ffff0000c0048500\n[ 1.697496] x19: ffff0000c0048500 x18: ffffffffffffffff\n[ 1.702804] x17: 0000000000000000 x16: 0000000000000000\n[ 1.708112] x15: ffff800011460300 x14: fffffffffffe0000\n[ 1.713420] x13: ffff8000114602d8 x12: 0720072007200720\n[ 1.718727] x11: 0720072007200720 x10: 0720072007200720\n[ 1.724035] x9 : ffff800011b9bbe0 x8 : ffff800011b9bbe0\n[ 1.729342] x7 : 0000000000000009 x6 : ffff8000114b8328\n[ 1.734649] x5 : 0000000000000000 x4 : 0000000000000000\n[ 1.739956] x3 : 00000000ffffffff x2 : ffff800011460298\n[ 1.745263] x1 : 1af1d7de276f4500 x0 : 0000000000000000\n[ 1.750572] Call trace:\n[ 1.753010] clk_core_disable+0xb0/0xb8\n[ 1.756840] clk_core_disable_lock+0x24/0x40\n[ 1.761105] clk_disable+0x20/0x30\n[ 1.764501] mtk_iommu_runtime_suspend+0x88/0xa8\n[ 1.769114] pm_generic_runtime_suspend+0x2c/0x48\n[ 1.773815] __rpm_callback+0xe0/0x178\n[ 1.777559] rpm_callback+0x24/0x88\n[ 1.781041] rpm_suspend+0xdc/0x470\n[ 1.784523] rpm_idle+0x12c/0x170\n[ 1.787831] pm_runtime_work+0xa8/0xc0\n[ 1.791573] process_one_work+0x1e8/0x360\n[ 1.795580] worker_thread+0x44/0x478\n[ 1.799237] kthread+0x150/0x158\n[ 1.802460] ret_from_fork+0x10/0x30\n[ 1.806034] ---[ end trace 82402920ef64573b ]---\n[ 1.810728] ------------[ cut here ]------------\n\nIn addition, we now don't need to enable the clock from the\nfunction mtk_iommu_hw_init since it is already enabled by the resume.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47025", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47025", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47025", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47025", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47025", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47025" + } + }, + "CVE-2021-47026": { + "affected_versions": "v5.8-rc1 to v5.13-rc1", + "breaks": "6a98d71daea186247005099758af549e6afdd244", + "cmt_msg": "RDMA/rtrs-clt: destroy sysfs after removing session from active list", + "fixes": "7f4a8592ff29f19c5a2ca549d0973821319afaad", + "last_affected_version": "5.12.3", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/rtrs-clt: destroy sysfs after removing session from active list\n\nA session can be removed dynamically by sysfs interface \"remove_path\" that\neventually calls rtrs_clt_remove_path_from_sysfs function. The current\nrtrs_clt_remove_path_from_sysfs first removes the sysfs interfaces and\nfrees sess->stats object. Second it removes the session from the active\nlist.\n\nTherefore some functions could access non-connected session and access the\nfreed sess->stats object even-if they check the session status before\naccessing the session.\n\nFor instance rtrs_clt_request and get_next_path_min_inflight check the\nsession status and try to send IO to the session. The session status\ncould be changed when they are trying to send IO but they could not catch\nthe change and update the statistics information in sess->stats object,\nand generate use-after-free problem.\n(see: \"RDMA/rtrs-clt: Check state of the rtrs_clt_sess before reading its\nstats\")\n\nThis patch changes the rtrs_clt_remove_path_from_sysfs to remove the\nsession from the active session list and then destroy the sysfs\ninterfaces.\n\nEach function still should check the session status because closing or\nerror recovery paths can change the status.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47026", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47026", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47026", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47026", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47026", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47026" + } + }, + "CVE-2021-47027": { + "affected_versions": "v5.12-rc1-dontuse to v5.13-rc1", + "breaks": "5c14a5f944b91371961548b1907802f74a4d2e5c", + "cmt_msg": "mt76: mt7921: fix kernel crash when the firmware fails to download", + "fixes": "e230f0c44f011f3270680a506b19b7e84c5e8923", + "last_affected_version": "5.12.3", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmt76: mt7921: fix kernel crash when the firmware fails to download\n\nFix kernel crash when the firmware is missing or fails to download.\n\n[ 9.444758] kernel BUG at drivers/pci/msi.c:375!\n[ 9.449363] Internal error: Oops - BUG: 0 [#1] PREEMPT SMP\n[ 9.501033] pstate: a0400009 (NzCv daif +PAN -UAO)\n[ 9.505814] pc : free_msi_irqs+0x180/0x184\n[ 9.509897] lr : free_msi_irqs+0x40/0x184\n[ 9.513893] sp : ffffffc015193870\n[ 9.517194] x29: ffffffc015193870 x28: 00000000f0e94fa2\n[ 9.522492] x27: 0000000000000acd x26: 000000000000009a\n[ 9.527790] x25: ffffffc0152cee58 x24: ffffffdbb383e0d8\n[ 9.533087] x23: ffffffdbb38628d0 x22: 0000000000040200\n[ 9.538384] x21: ffffff8cf7de7318 x20: ffffff8cd65a2480\n[ 9.543681] x19: ffffff8cf7de7000 x18: 0000000000000000\n[ 9.548979] x17: ffffff8cf9ca03b4 x16: ffffffdc13ad9a34\n[ 9.554277] x15: 0000000000000000 x14: 0000000000080800\n[ 9.559575] x13: ffffff8cd65a2980 x12: 0000000000000000\n[ 9.564873] x11: ffffff8cfa45d820 x10: ffffff8cfa45d6d0\n[ 9.570171] x9 : 0000000000000040 x8 : ffffff8ccef1b780\n[ 9.575469] x7 : aaaaaaaaaaaaaaaa x6 : 0000000000000000\n[ 9.580766] x5 : ffffffdc13824900 x4 : ffffff8ccefe0000\n[ 9.586063] x3 : 0000000000000000 x2 : 0000000000000000\n[ 9.591362] x1 : 0000000000000125 x0 : ffffff8ccefe0000\n[ 9.596660] Call trace:\n[ 9.599095] free_msi_irqs+0x180/0x184\n[ 9.602831] pci_disable_msi+0x100/0x130\n[ 9.606740] pci_free_irq_vectors+0x24/0x30\n[ 9.610915] mt7921_pci_probe+0xbc/0x250 [mt7921e]\n[ 9.615693] pci_device_probe+0xd4/0x14c\n[ 9.619604] really_probe+0x134/0x2ec\n[ 9.623252] driver_probe_device+0x64/0xfc\n[ 9.627335] device_driver_attach+0x4c/0x6c\n[ 9.631506] __driver_attach+0xac/0xc0\n[ 9.635243] bus_for_each_dev+0x8c/0xd4\n[ 9.639066] driver_attach+0x2c/0x38\n[ 9.642628] bus_add_driver+0xfc/0x1d0\n[ 9.646365] driver_register+0x64/0xf8\n[ 9.650101] __pci_register_driver+0x6c/0x7c\n[ 9.654360] init_module+0x28/0xfdc [mt7921e]\n[ 9.658704] do_one_initcall+0x13c/0x2d0\n[ 9.662615] do_init_module+0x58/0x1e8\n[ 9.666351] load_module+0xd80/0xeb4\n[ 9.669912] __arm64_sys_finit_module+0xa8/0xe0\n[ 9.674430] el0_svc_common+0xa4/0x16c\n[ 9.678168] el0_svc_compat_handler+0x2c/0x40\n[ 9.682511] el0_svc_compat+0x8/0x10\n[ 9.686076] Code: a94257f6 f9400bf7 a8c47bfd d65f03c0 (d4210000)\n[ 9.692155] ---[ end trace 7621f966afbf0a29 ]---\n[ 9.697385] Kernel panic - not syncing: Fatal exception\n[ 9.702599] SMP: stopping secondary CPUs\n[ 9.706549] Kernel Offset: 0x1c03600000 from 0xffffffc010000000\n[ 9.712456] PHYS_OFFSET: 0xfffffff440000000\n[ 9.716625] CPU features: 0x080026,2a80aa18\n[ 9.720795] Memory Limit: none", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47027", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47027", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47027", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47027", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47027", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47027" + } + }, + "CVE-2021-47028": { + "affected_versions": "unk to v5.13-rc1", + "breaks": "", + "cmt_msg": "mt76: mt7915: fix txrate reporting", + "fixes": "f43b941fd61003659a3f0e039595e5e525917aa8", + "last_affected_version": "5.12.3", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmt76: mt7915: fix txrate reporting\n\nProperly check rate_info to fix unexpected reporting.\n\n[ 1215.161863] Call trace:\n[ 1215.164307] cfg80211_calculate_bitrate+0x124/0x200 [cfg80211]\n[ 1215.170139] ieee80211s_update_metric+0x80/0xc0 [mac80211]\n[ 1215.175624] ieee80211_tx_status_ext+0x508/0x838 [mac80211]\n[ 1215.181190] mt7915_mcu_get_rx_rate+0x28c/0x8d0 [mt7915e]\n[ 1215.186580] mt7915_mac_tx_free+0x324/0x7c0 [mt7915e]\n[ 1215.191623] mt7915_queue_rx_skb+0xa8/0xd0 [mt7915e]\n[ 1215.196582] mt76_dma_cleanup+0x7b0/0x11d0 [mt76]\n[ 1215.201276] __napi_poll+0x38/0xf8\n[ 1215.204668] napi_workfn+0x40/0x80\n[ 1215.208062] process_one_work+0x1fc/0x390\n[ 1215.212062] worker_thread+0x48/0x4d0\n[ 1215.215715] kthread+0x120/0x128\n[ 1215.218935] ret_from_fork+0x10/0x1c", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47028", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47028", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47028", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47028", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47028", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47028" + } + }, + "CVE-2021-47029": { + "affected_versions": "v5.12-rc1-dontuse to v5.13-rc1", + "breaks": "d0e274af2f2e44b9d496f5d2c0431fdd2ea76fb8", + "cmt_msg": "mt76: connac: fix kernel warning adding monitor interface", + "fixes": "c996f0346e40e3b1ac2ebaf0681df898fb157f60", + "last_affected_version": "5.12.3", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmt76: connac: fix kernel warning adding monitor interface\n\nFix the following kernel warning adding a monitor interface in\nmt76_connac_mcu_uni_add_dev routine.\n\n[ 507.984882] ------------[ cut here ]------------\n[ 507.989515] WARNING: CPU: 1 PID: 3017 at mt76_connac_mcu_uni_add_dev+0x178/0x190 [mt76_connac_lib]\n[ 508.059379] CPU: 1 PID: 3017 Comm: ifconfig Not tainted 5.4.98 #0\n[ 508.065461] Hardware name: MT7622_MT7531 RFB (DT)\n[ 508.070156] pstate: 80000005 (Nzcv daif -PAN -UAO)\n[ 508.074939] pc : mt76_connac_mcu_uni_add_dev+0x178/0x190 [mt76_connac_lib]\n[ 508.081806] lr : mt7921_eeprom_init+0x1288/0x1cb8 [mt7921e]\n[ 508.087367] sp : ffffffc013a33930\n[ 508.090671] x29: ffffffc013a33930 x28: ffffff801e628ac0\n[ 508.095973] x27: ffffff801c7f1200 x26: ffffff801c7eb008\n[ 508.101275] x25: ffffff801c7eaef0 x24: ffffff801d025610\n[ 508.106577] x23: ffffff801d022990 x22: ffffff801d024de8\n[ 508.111879] x21: ffffff801d0226a0 x20: ffffff801c7eaee8\n[ 508.117181] x19: ffffff801d0226a0 x18: 000000005d00b000\n[ 508.122482] x17: 00000000ffffffff x16: 0000000000000000\n[ 508.127785] x15: 0000000000000080 x14: ffffff801d704000\n[ 508.133087] x13: 0000000000000040 x12: 0000000000000002\n[ 508.138389] x11: 000000000000000c x10: 0000000000000000\n[ 508.143691] x9 : 0000000000000020 x8 : 0000000000000001\n[ 508.148992] x7 : 0000000000000000 x6 : 0000000000000000\n[ 508.154294] x5 : ffffff801c7eaee8 x4 : 0000000000000006\n[ 508.159596] x3 : 0000000000000001 x2 : 0000000000000000\n[ 508.164898] x1 : ffffff801c7eac08 x0 : ffffff801d0226a0\n[ 508.170200] Call trace:\n[ 508.172640] mt76_connac_mcu_uni_add_dev+0x178/0x190 [mt76_connac_lib]\n[ 508.179159] mt7921_eeprom_init+0x1288/0x1cb8 [mt7921e]\n[ 508.184394] drv_add_interface+0x34/0x88 [mac80211]\n[ 508.189271] ieee80211_add_virtual_monitor+0xe0/0xb48 [mac80211]\n[ 508.195277] ieee80211_do_open+0x86c/0x918 [mac80211]\n[ 508.200328] ieee80211_do_open+0x900/0x918 [mac80211]\n[ 508.205372] __dev_open+0xcc/0x150\n[ 508.208763] __dev_change_flags+0x134/0x198\n[ 508.212937] dev_change_flags+0x20/0x60\n[ 508.216764] devinet_ioctl+0x3e8/0x748\n[ 508.220503] inet_ioctl+0x1e4/0x350\n[ 508.223983] sock_do_ioctl+0x48/0x2a0\n[ 508.227635] sock_ioctl+0x310/0x4f8\n[ 508.231116] do_vfs_ioctl+0xa4/0xac0\n[ 508.234681] ksys_ioctl+0x44/0x90\n[ 508.237985] __arm64_sys_ioctl+0x1c/0x48\n[ 508.241901] el0_svc_common.constprop.1+0x7c/0x100\n[ 508.246681] el0_svc_handler+0x18/0x20\n[ 508.250421] el0_svc+0x8/0x1c8\n[ 508.253465] ---[ end trace c7b90fee13d72c39 ]---\n[ 508.261278] ------------[ cut here ]------------", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47029", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47029", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47029", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47029", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47029", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47029" + } + }, + "CVE-2021-47030": { + "affected_versions": "v5.12-rc1-dontuse to v5.13-rc1", + "breaks": "d2bf7959d9c0f631ef860edaf834d55773fdedff", + "cmt_msg": "mt76: mt7615: fix memory leak in mt7615_coredump_work", + "fixes": "49cc85059a2cb656f96ff3693f891e8fe8f669a9", + "last_affected_version": "5.12.3", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmt76: mt7615: fix memory leak in mt7615_coredump_work\n\nSimilar to the issue fixed in mt7921_coredump_work, fix a possible memory\nleak in mt7615_coredump_work routine.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47030", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47030", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47030", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47030", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47030", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47030" + } + }, + "CVE-2021-47031": { + "affected_versions": "v5.12-rc1-dontuse to v5.13-rc1", + "breaks": "1c099ab44727c8e42fe4de4d91b53cec3ef02860", + "cmt_msg": "mt76: mt7921: fix memory leak in mt7921_coredump_work", + "fixes": "782b3e86ea970e899f8e723db9f64708a15ca30e", + "last_affected_version": "5.12.3", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmt76: mt7921: fix memory leak in mt7921_coredump_work\n\nFix possible memory leak in mt7921_coredump_work.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47031", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47031", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47031", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47031", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47031", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47031" + } + }, + "CVE-2021-47032": { + "affected_versions": "v5.10-rc1 to v5.13-rc1", + "breaks": "27d5c528a7ca08dcd44877fdd9fc08b76630bf77", + "cmt_msg": "mt76: mt7915: fix tx skb dma unmap", + "fixes": "7dcf3c04f0aca746517a77433b33d40868ca4749", + "last_affected_version": "5.12.3", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmt76: mt7915: fix tx skb dma unmap\n\nThe first pointer in the txp needs to be unmapped as well, otherwise it will\nleak DMA mapping entries", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47032", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47032", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47032", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47032", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47032", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47032" + } + }, + "CVE-2021-47033": { + "affected_versions": "v5.10-rc1 to v5.13-rc1", + "breaks": "27d5c528a7ca08dcd44877fdd9fc08b76630bf77", + "cmt_msg": "mt76: mt7615: fix tx skb dma unmap", + "fixes": "ebee7885bb12a8fe2c2f9bac87dbd87a05b645f9", + "last_affected_version": "5.12.3", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmt76: mt7615: fix tx skb dma unmap\n\nThe first pointer in the txp needs to be unmapped as well, otherwise it will\nleak DMA mapping entries", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47033", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47033", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47033", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47033", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47033", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47033" + } + }, + "CVE-2021-47034": { + "affected_versions": "v4.18-rc1 to v5.13-rc1", + "breaks": "f1cb8f9beba8699dd1b4518418191499e53f7b17", + "cmt_msg": "powerpc/64s: Fix pte update for kernel memory on radix", + "fixes": "b8b2f37cf632434456182e9002d63cbc4cccc50c", + "last_affected_version": "5.12.3", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\npowerpc/64s: Fix pte update for kernel memory on radix\n\nWhen adding a PTE a ptesync is needed to order the update of the PTE\nwith subsequent accesses otherwise a spurious fault may be raised.\n\nradix__set_pte_at() does not do this for performance gains. For\nnon-kernel memory this is not an issue as any faults of this kind are\ncorrected by the page fault handler. For kernel memory these faults\nare not handled. The current solution is that there is a ptesync in\nflush_cache_vmap() which should be called when mapping from the\nvmalloc region.\n\nHowever, map_kernel_page() does not call flush_cache_vmap(). This is\ntroublesome in particular for code patching with Strict RWX on radix.\nIn do_patch_instruction() the page frame that contains the instruction\nto be patched is mapped and then immediately patched. With no ordering\nor synchronization between setting up the PTE and writing to the page\nit is possible for faults.\n\nAs the code patching is done using __put_user_asm_goto() the resulting\nfault is obscured - but using a normal store instead it can be seen:\n\n BUG: Unable to handle kernel data access on write at 0xc008000008f24a3c\n Faulting instruction address: 0xc00000000008bd74\n Oops: Kernel access of bad area, sig: 11 [#1]\n LE PAGE_SIZE=64K MMU=Radix SMP NR_CPUS=2048 NUMA PowerNV\n Modules linked in: nop_module(PO+) [last unloaded: nop_module]\n CPU: 4 PID: 757 Comm: sh Tainted: P O 5.10.0-rc5-01361-ge3c1b78c8440-dirty #43\n NIP: c00000000008bd74 LR: c00000000008bd50 CTR: c000000000025810\n REGS: c000000016f634a0 TRAP: 0300 Tainted: P O (5.10.0-rc5-01361-ge3c1b78c8440-dirty)\n MSR: 9000000000009033 CR: 44002884 XER: 00000000\n CFAR: c00000000007c68c DAR: c008000008f24a3c DSISR: 42000000 IRQMASK: 1\n\nThis results in the kind of issue reported here:\n https://lore.kernel.org/linuxppc-dev/15AC5B0E-A221-4B8C-9039-FA96B8EF7C88@lca.pw/\n\nChris Riedl suggested a reliable way to reproduce the issue:\n $ mount -t debugfs none /sys/kernel/debug\n $ (while true; do echo function > /sys/kernel/debug/tracing/current_tracer ; echo nop > /sys/kernel/debug/tracing/current_tracer ; done) &\n\nTurning ftrace on and off does a large amount of code patching which\nin usually less then 5min will crash giving a trace like:\n\n ftrace-powerpc: (____ptrval____): replaced (4b473b11) != old (60000000)\n ------------[ ftrace bug ]------------\n ftrace failed to modify\n [] napi_busy_loop+0xc/0x390\n actual: 11:3b:47:4b\n Setting ftrace call site to call ftrace function\n ftrace record flags: 80000001\n (1)\n expected tramp: c00000000006c96c\n ------------[ cut here ]------------\n WARNING: CPU: 4 PID: 809 at kernel/trace/ftrace.c:2065 ftrace_bug+0x28c/0x2e8\n Modules linked in: nop_module(PO-) [last unloaded: nop_module]\n CPU: 4 PID: 809 Comm: sh Tainted: P O 5.10.0-rc5-01360-gf878ccaf250a #1\n NIP: c00000000024f334 LR: c00000000024f330 CTR: c0000000001a5af0\n REGS: c000000004c8b760 TRAP: 0700 Tainted: P O (5.10.0-rc5-01360-gf878ccaf250a)\n MSR: 900000000282b033 CR: 28008848 XER: 20040000\n CFAR: c0000000001a9c98 IRQMASK: 0\n GPR00: c00000000024f330 c000000004c8b9f0 c000000002770600 0000000000000022\n GPR04: 00000000ffff7fff c000000004c8b6d0 0000000000000027 c0000007fe9bcdd8\n GPR08: 0000000000000023 ffffffffffffffd8 0000000000000027 c000000002613118\n GPR12: 0000000000008000 c0000007fffdca00 0000000000000000 0000000000000000\n GPR16: 0000000023ec37c5 0000000000000000 0000000000000000 0000000000000008\n GPR20: c000000004c8bc90 c0000000027a2d20 c000000004c8bcd0 c000000002612fe8\n GPR24: 0000000000000038 0000000000000030 0000000000000028 0000000000000020\n GPR28: c000000000ff1b68 c000000000bf8e5c c00000000312f700 c000000000fbb9b0\n NIP ftrace_bug+0x28c/0x2e8\n LR ftrace_bug+0x288/0x2e8\n Call T\n---truncated---", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47034", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47034", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47034", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47034", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47034", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47034" + } + }, + "CVE-2021-47035": { + "affected_versions": "v5.6-rc1 to v5.13-rc1", + "breaks": "b802d070a52a1565b47daaa808872cfbd4a17b01", + "cmt_msg": "iommu/vt-d: Remove WO permissions on second-level paging entries", + "fixes": "eea53c5816889ee8b64544fa2e9311a81184ff9c", + "last_affected_version": "5.12.3", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\niommu/vt-d: Remove WO permissions on second-level paging entries\n\nWhen the first level page table is used for IOVA translation, it only\nsupports Read-Only and Read-Write permissions. The Write-Only permission\nis not supported as the PRESENT bit (implying Read permission) should\nalways set. When using second level, we still give separate permissions\nthat allows WriteOnly which seems inconsistent and awkward. We want to\nhave consistent behavior. After moving to 1st level, we don't want things\nto work sometimes, and break if we use 2nd level for the same mappings.\nHence remove this configuration.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47035", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47035", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47035", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47035", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47035", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47035" + } + }, + "CVE-2021-47036": { + "affected_versions": "v5.6-rc1 to v5.13-rc1", + "breaks": "9fd1ff5d2ac7181844735806b0a703c942365291", + "cmt_msg": "udp: skip L4 aggregation for UDP tunnel packets", + "fixes": "18f25dc399901426dff61e676ba603ff52c666f7", + "last_affected_version": "5.12.3", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nudp: skip L4 aggregation for UDP tunnel packets\n\nIf NETIF_F_GRO_FRAGLIST or NETIF_F_GRO_UDP_FWD are enabled, and there\nare UDP tunnels available in the system, udp_gro_receive() could end-up\ndoing L4 aggregation (either SKB_GSO_UDP_L4 or SKB_GSO_FRAGLIST) at\nthe outer UDP tunnel level for packets effectively carrying and UDP\ntunnel header.\n\nThat could cause inner protocol corruption. If e.g. the relevant\npackets carry a vxlan header, different vxlan ids will be ignored/\naggregated to the same GSO packet. Inner headers will be ignored, too,\nso that e.g. TCP over vxlan push packets will be held in the GRO\nengine till the next flush, etc.\n\nJust skip the SKB_GSO_UDP_L4 and SKB_GSO_FRAGLIST code path if the\ncurrent packet could land in a UDP tunnel, and let udp_gro_receive()\ndo GRO via udp_sk(sk)->gro_receive.\n\nThe check implemented in this patch is broader than what is strictly\nneeded, as the existing UDP tunnel could be e.g. configured on top of\na different device: we could end-up skipping GRO at-all for some packets.\n\nAnyhow, that is a very thin corner case and covering it will add quite\na bit of complexity.\n\nv1 -> v2:\n - hopefully clarify the commit message", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47036", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47036", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47036", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47036", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47036", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47036" + } + }, + "CVE-2021-47037": { + "affected_versions": "v5.10-rc1 to v5.13-rc1", + "breaks": "520a1c396d1966b64884d8e0176a580150d5a09e", + "cmt_msg": "ASoC: q6afe-clocks: fix reprobing of the driver", + "fixes": "96fadf7e8ff49fdb74754801228942b67c3eeebd", + "last_affected_version": "5.12.3", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: q6afe-clocks: fix reprobing of the driver\n\nQ6afe-clocks driver can get reprobed. For example if the APR services\nare restarted after the firmware crash. However currently Q6afe-clocks\ndriver will oops because hw.init will get cleared during first _probe\ncall. Rewrite the driver to fill the clock data at runtime rather than\nusing big static array of clocks.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47037", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47037", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47037", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47037", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47037", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47037" + } + }, + "CVE-2021-47038": { + "affected_versions": "v5.7-rc1 to v5.13-rc1", + "breaks": "eab2404ba798a8efda2a970f44071c3406d94e57", + "cmt_msg": "Bluetooth: avoid deadlock between hci_dev->lock and socket lock", + "fixes": "17486960d79b900c45e0bb8fbcac0262848582ba", + "last_affected_version": "5.12.3", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: avoid deadlock between hci_dev->lock and socket lock\n\nCommit eab2404ba798 (\"Bluetooth: Add BT_PHY socket option\") added a\ndependency between socket lock and hci_dev->lock that could lead to\ndeadlock.\n\nIt turns out that hci_conn_get_phy() is not in any way relying on hdev\nbeing immutable during the runtime of this function, neither does it even\nlook at any of the members of hdev, and as such there is no need to hold\nthat lock.\n\nThis fixes the lockdep splat below:\n\n ======================================================\n WARNING: possible circular locking dependency detected\n 5.12.0-rc1-00026-g73d464503354 #10 Not tainted\n ------------------------------------------------------\n bluetoothd/1118 is trying to acquire lock:\n ffff8f078383c078 (&hdev->lock){+.+.}-{3:3}, at: hci_conn_get_phy+0x1c/0x150 [bluetooth]\n\n but task is already holding lock:\n ffff8f07e831d920 (sk_lock-AF_BLUETOOTH-BTPROTO_L2CAP){+.+.}-{0:0}, at: l2cap_sock_getsockopt+0x8b/0x610\n\n which lock already depends on the new lock.\n\n the existing dependency chain (in reverse order) is:\n\n -> #3 (sk_lock-AF_BLUETOOTH-BTPROTO_L2CAP){+.+.}-{0:0}:\n lock_sock_nested+0x72/0xa0\n l2cap_sock_ready_cb+0x18/0x70 [bluetooth]\n l2cap_config_rsp+0x27a/0x520 [bluetooth]\n l2cap_sig_channel+0x658/0x1330 [bluetooth]\n l2cap_recv_frame+0x1ba/0x310 [bluetooth]\n hci_rx_work+0x1cc/0x640 [bluetooth]\n process_one_work+0x244/0x5f0\n worker_thread+0x3c/0x380\n kthread+0x13e/0x160\n ret_from_fork+0x22/0x30\n\n -> #2 (&chan->lock#2/1){+.+.}-{3:3}:\n __mutex_lock+0xa3/0xa10\n l2cap_chan_connect+0x33a/0x940 [bluetooth]\n l2cap_sock_connect+0x141/0x2a0 [bluetooth]\n __sys_connect+0x9b/0xc0\n __x64_sys_connect+0x16/0x20\n do_syscall_64+0x33/0x80\n entry_SYSCALL_64_after_hwframe+0x44/0xae\n\n -> #1 (&conn->chan_lock){+.+.}-{3:3}:\n __mutex_lock+0xa3/0xa10\n l2cap_chan_connect+0x322/0x940 [bluetooth]\n l2cap_sock_connect+0x141/0x2a0 [bluetooth]\n __sys_connect+0x9b/0xc0\n __x64_sys_connect+0x16/0x20\n do_syscall_64+0x33/0x80\n entry_SYSCALL_64_after_hwframe+0x44/0xae\n\n -> #0 (&hdev->lock){+.+.}-{3:3}:\n __lock_acquire+0x147a/0x1a50\n lock_acquire+0x277/0x3d0\n __mutex_lock+0xa3/0xa10\n hci_conn_get_phy+0x1c/0x150 [bluetooth]\n l2cap_sock_getsockopt+0x5a9/0x610 [bluetooth]\n __sys_getsockopt+0xcc/0x200\n __x64_sys_getsockopt+0x20/0x30\n do_syscall_64+0x33/0x80\n entry_SYSCALL_64_after_hwframe+0x44/0xae\n\n other info that might help us debug this:\n\n Chain exists of:\n &hdev->lock --> &chan->lock#2/1 --> sk_lock-AF_BLUETOOTH-BTPROTO_L2CAP\n\n Possible unsafe locking scenario:\n\n CPU0 CPU1\n ---- ----\n lock(sk_lock-AF_BLUETOOTH-BTPROTO_L2CAP);\n lock(&chan->lock#2/1);\n lock(sk_lock-AF_BLUETOOTH-BTPROTO_L2CAP);\n lock(&hdev->lock);\n\n *** DEADLOCK ***\n\n 1 lock held by bluetoothd/1118:\n #0: ffff8f07e831d920 (sk_lock-AF_BLUETOOTH-BTPROTO_L2CAP){+.+.}-{0:0}, at: l2cap_sock_getsockopt+0x8b/0x610 [bluetooth]\n\n stack backtrace:\n CPU: 3 PID: 1118 Comm: bluetoothd Not tainted 5.12.0-rc1-00026-g73d464503354 #10\n Hardware name: LENOVO 20K5S22R00/20K5S22R00, BIOS R0IET38W (1.16 ) 05/31/2017\n Call Trace:\n dump_stack+0x7f/0xa1\n check_noncircular+0x105/0x120\n ? __lock_acquire+0x147a/0x1a50\n __lock_acquire+0x147a/0x1a50\n lock_acquire+0x277/0x3d0\n ? hci_conn_get_phy+0x1c/0x150 [bluetooth]\n ? __lock_acquire+0x2e1/0x1a50\n ? lock_is_held_type+0xb4/0x120\n ? hci_conn_get_phy+0x1c/0x150 [bluetooth]\n __mutex_lock+0xa3/0xa10\n ? hci_conn_get_phy+0x1c/0x150 [bluetooth]\n ? lock_acquire+0x277/0x3d0\n ? mark_held_locks+0x49/0x70\n ? mark_held_locks+0x49/0x70\n ? hci_conn_get_phy+0x1c/0x150 [bluetooth]\n hci_conn_get_phy+0x\n---truncated---", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47038", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47038", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47038", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47038", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47038", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47038" + } + }, + "CVE-2021-47039": { + "affected_versions": "v5.11-rc1 to v5.13-rc1", + "breaks": "bf9c0538e485b591a2ee02d9adb8a99db4be5a2a", + "cmt_msg": "ataflop: potential out of bounds in do_format()", + "fixes": "1ffec389a6431782a8a28805830b6fae9bf00af1", + "last_affected_version": "5.12.3", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nataflop: potential out of bounds in do_format()\n\nThe function uses \"type\" as an array index:\n\n\tq = unit[drive].disk[type]->queue;\n\nUnfortunately the bounds check on \"type\" isn't done until later in the\nfunction. Fix this by moving the bounds check to the start.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47039", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47039", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47039", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47039", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47039", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47039" + } + }, + "CVE-2021-47040": { + "affected_versions": "v5.8-rc1 to v5.13-rc1", + "breaks": "efe68c1ca8f49e8c06afd74b699411bfbb8ba1ff", + "cmt_msg": "io_uring: fix overflows checks in provide buffers", + "fixes": "38134ada0ceea3e848fe993263c0ff6207fd46e7", + "last_affected_version": "5.12.3", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nio_uring: fix overflows checks in provide buffers\n\nColin reported before possible overflow and sign extension problems in\nio_provide_buffers_prep(). As Linus pointed out previous attempt did nothing\nuseful, see d81269fecb8ce (\"io_uring: fix provide_buffers sign extension\").\n\nDo that with help of check__overflow helpers. And fix struct\nio_provide_buf::len type, as it doesn't make much sense to keep it\nsigned.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47040", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47040", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47040", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47040", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47040", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47040" + } + }, + "CVE-2021-47041": { + "affected_versions": "v5.0-rc1 to v5.13-rc1", + "breaks": "872d26a391da92ed8f0c0f5cb5fef428067b7f30", + "cmt_msg": "nvmet-tcp: fix incorrect locking in state_change sk callback", + "fixes": "b5332a9f3f3d884a1b646ce155e664cc558c1722", + "last_affected_version": "5.12.3", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvmet-tcp: fix incorrect locking in state_change sk callback\n\nWe are not changing anything in the TCP connection state so\nwe should not take a write_lock but rather a read lock.\n\nThis caused a deadlock when running nvmet-tcp and nvme-tcp\non the same system, where state_change callbacks on the\nhost and on the controller side have causal relationship\nand made lockdep report on this with blktests:\n\n================================\nWARNING: inconsistent lock state\n5.12.0-rc3 #1 Tainted: G I\n--------------------------------\ninconsistent {IN-SOFTIRQ-W} -> {SOFTIRQ-ON-R} usage.\nnvme/1324 [HC0[0]:SC0[0]:HE1:SE1] takes:\nffff888363151000 (clock-AF_INET){++-?}-{2:2}, at: nvme_tcp_state_change+0x21/0x150 [nvme_tcp]\n{IN-SOFTIRQ-W} state was registered at:\n __lock_acquire+0x79b/0x18d0\n lock_acquire+0x1ca/0x480\n _raw_write_lock_bh+0x39/0x80\n nvmet_tcp_state_change+0x21/0x170 [nvmet_tcp]\n tcp_fin+0x2a8/0x780\n tcp_data_queue+0xf94/0x1f20\n tcp_rcv_established+0x6ba/0x1f00\n tcp_v4_do_rcv+0x502/0x760\n tcp_v4_rcv+0x257e/0x3430\n ip_protocol_deliver_rcu+0x69/0x6a0\n ip_local_deliver_finish+0x1e2/0x2f0\n ip_local_deliver+0x1a2/0x420\n ip_rcv+0x4fb/0x6b0\n __netif_receive_skb_one_core+0x162/0x1b0\n process_backlog+0x1ff/0x770\n __napi_poll.constprop.0+0xa9/0x5c0\n net_rx_action+0x7b3/0xb30\n __do_softirq+0x1f0/0x940\n do_softirq+0xa1/0xd0\n __local_bh_enable_ip+0xd8/0x100\n ip_finish_output2+0x6b7/0x18a0\n __ip_queue_xmit+0x706/0x1aa0\n __tcp_transmit_skb+0x2068/0x2e20\n tcp_write_xmit+0xc9e/0x2bb0\n __tcp_push_pending_frames+0x92/0x310\n inet_shutdown+0x158/0x300\n __nvme_tcp_stop_queue+0x36/0x270 [nvme_tcp]\n nvme_tcp_stop_queue+0x87/0xb0 [nvme_tcp]\n nvme_tcp_teardown_admin_queue+0x69/0xe0 [nvme_tcp]\n nvme_do_delete_ctrl+0x100/0x10c [nvme_core]\n nvme_sysfs_delete.cold+0x8/0xd [nvme_core]\n kernfs_fop_write_iter+0x2c7/0x460\n new_sync_write+0x36c/0x610\n vfs_write+0x5c0/0x870\n ksys_write+0xf9/0x1d0\n do_syscall_64+0x33/0x40\n entry_SYSCALL_64_after_hwframe+0x44/0xae\nirq event stamp: 10687\nhardirqs last enabled at (10687): [] _raw_spin_unlock_irqrestore+0x2d/0x40\nhardirqs last disabled at (10686): [] _raw_spin_lock_irqsave+0x68/0x90\nsoftirqs last enabled at (10684): [] __do_softirq+0x608/0x940\nsoftirqs last disabled at (10649): [] do_softirq+0xa1/0xd0\n\nother info that might help us debug this:\n Possible unsafe locking scenario:\n\n CPU0\n ----\n lock(clock-AF_INET);\n \n lock(clock-AF_INET);\n\n *** DEADLOCK ***\n\n5 locks held by nvme/1324:\n #0: ffff8884a01fe470 (sb_writers#4){.+.+}-{0:0}, at: ksys_write+0xf9/0x1d0\n #1: ffff8886e435c090 (&of->mutex){+.+.}-{3:3}, at: kernfs_fop_write_iter+0x216/0x460\n #2: ffff888104d90c38 (kn->active#255){++++}-{0:0}, at: kernfs_remove_self+0x22d/0x330\n #3: ffff8884634538d0 (&queue->queue_lock){+.+.}-{3:3}, at: nvme_tcp_stop_queue+0x52/0xb0 [nvme_tcp]\n #4: ffff888363150d30 (sk_lock-AF_INET){+.+.}-{0:0}, at: inet_shutdown+0x59/0x300\n\nstack backtrace:\nCPU: 26 PID: 1324 Comm: nvme Tainted: G I 5.12.0-rc3 #1\nHardware name: Dell Inc. PowerEdge R640/06NR82, BIOS 2.10.0 11/12/2020\nCall Trace:\n dump_stack+0x93/0xc2\n mark_lock_irq.cold+0x2c/0xb3\n ? verify_lock_unused+0x390/0x390\n ? stack_trace_consume_entry+0x160/0x160\n ? lock_downgrade+0x100/0x100\n ? save_trace+0x88/0x5e0\n ? _raw_spin_unlock_irqrestore+0x2d/0x40\n mark_lock+0x530/0x1470\n ? mark_lock_irq+0x1d10/0x1d10\n ? enqueue_timer+0x660/0x660\n mark_usage+0x215/0x2a0\n __lock_acquire+0x79b/0x18d0\n ? tcp_schedule_loss_probe.part.0+0x38c/0x520\n lock_acquire+0x1ca/0x480\n ? nvme_tcp_state_change+0x21/0x150 [nvme_tcp]\n ? rcu_read_unlock+0x40/0x40\n ? tcp_mtu_probe+0x1ae0/0x1ae0\n ? kmalloc_reserve+0xa0/0xa0\n ? sysfs_file_ops+0x170/0x170\n _raw_read_lock+0x3d/0xa0\n ? nvme_tcp_state_change+0x21/0x150 [nvme_tcp]\n nvme_tcp_state_change+0x21/0x150 [nvme_tcp]\n ? sysfs_file_ops\n---truncated---", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47041", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47041", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47041", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47041", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47041", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47041" + } + }, + "CVE-2021-47042": { + "affected_versions": "v5.12-rc1-dontuse to v5.13-rc1", + "breaks": "3a00c04212d1cfe1426338b78f4ead623508c874", + "cmt_msg": "drm/amd/display: Free local data after use", + "fixes": "616cf23b6cf40ad6f03ffbddfa1b6c4eb68d8ae1", + "last_affected_version": "5.12.3", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Free local data after use\n\nFixes the following memory leak in dc_link_construct():\n\nunreferenced object 0xffffa03e81471400 (size 1024):\ncomm \"amd_module_load\", pid 2486, jiffies 4294946026 (age 10.544s)\nhex dump (first 32 bytes):\n00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................\n00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................\nbacktrace:\n[<000000000bdf5c4a>] kmem_cache_alloc_trace+0x30a/0x4a0\n[<00000000e7c59f0e>] link_create+0xce/0xac0 [amdgpu]\n[<000000002fb6c072>] dc_create+0x370/0x720 [amdgpu]\n[<000000000094d1f3>] amdgpu_dm_init+0x18e/0x17a0 [amdgpu]\n[<00000000bec048fd>] dm_hw_init+0x12/0x20 [amdgpu]\n[<00000000a2bb7cf6>] amdgpu_device_init+0x1463/0x1e60 [amdgpu]\n[<0000000032d3bb13>] amdgpu_driver_load_kms+0x5b/0x330 [amdgpu]\n[<00000000a27834f9>] amdgpu_pci_probe+0x192/0x280 [amdgpu]\n[<00000000fec7d291>] local_pci_probe+0x47/0xa0\n[<0000000055dbbfa7>] pci_device_probe+0xe3/0x180\n[<00000000815da970>] really_probe+0x1c4/0x4e0\n[<00000000b4b6974b>] driver_probe_device+0x62/0x150\n[<000000000f9ecc61>] device_driver_attach+0x58/0x60\n[<000000000f65c843>] __driver_attach+0xd6/0x150\n[<000000002f5e3683>] bus_for_each_dev+0x6a/0xc0\n[<00000000a1cfc897>] driver_attach+0x1e/0x20", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47042", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47042", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47042", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47042", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47042", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47042" + } + }, + "CVE-2021-47043": { + "affected_versions": "v5.5-rc1 to v5.13-rc1", + "breaks": "32f0a6ddc8c98a1aade2bf3d07c79d5d2c6ceb9a", + "cmt_msg": "media: venus: core: Fix some resource leaks in the error path of 'venus_probe()'", + "fixes": "5a465c5391a856a0c1e9554964d660676c35d1b2", + "last_affected_version": "5.12.3", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: venus: core: Fix some resource leaks in the error path of 'venus_probe()'\n\nIf an error occurs after a successful 'of_icc_get()' call, it must be\nundone.\n\nUse 'devm_of_icc_get()' instead of 'of_icc_get()' to avoid the leak.\nUpdate the remove function accordingly and axe the now unneeded\n'icc_put()' calls.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47043", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47043", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47043", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47043", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47043", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47043" + } + }, + "CVE-2021-47044": { + "affected_versions": "v5.10-rc1 to v5.13-rc1", + "breaks": "5a7f555904671c0737819fe4d19bd6143de3f6c0", + "cmt_msg": "sched/fair: Fix shift-out-of-bounds in load_balance()", + "fixes": "39a2a6eb5c9b66ea7c8055026303b3aa681b49a5", + "last_affected_version": "5.12.3", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsched/fair: Fix shift-out-of-bounds in load_balance()\n\nSyzbot reported a handful of occurrences where an sd->nr_balance_failed can\ngrow to much higher values than one would expect.\n\nA successful load_balance() resets it to 0; a failed one increments\nit. Once it gets to sd->cache_nice_tries + 3, this *should* trigger an\nactive balance, which will either set it to sd->cache_nice_tries+1 or reset\nit to 0. However, in case the to-be-active-balanced task is not allowed to\nrun on env->dst_cpu, then the increment is done without any further\nmodification.\n\nThis could then be repeated ad nauseam, and would explain the absurdly high\nvalues reported by syzbot (86, 149). VincentG noted there is value in\nletting sd->cache_nice_tries grow, so the shift itself should be\nfixed. That means preventing:\n\n \"\"\"\n If the value of the right operand is negative or is greater than or equal\n to the width of the promoted left operand, the behavior is undefined.\n \"\"\"\n\nThus we need to cap the shift exponent to\n BITS_PER_TYPE(typeof(lefthand)) - 1.\n\nI had a look around for other similar cases via coccinelle:\n\n @expr@\n position pos;\n expression E1;\n expression E2;\n @@\n (\n E1 >> E2@pos\n |\n E1 >> E2@pos\n )\n\n @cst depends on expr@\n position pos;\n expression expr.E1;\n constant cst;\n @@\n (\n E1 >> cst@pos\n |\n E1 << cst@pos\n )\n\n @script:python depends on !cst@\n pos << expr.pos;\n exp << expr.E2;\n @@\n # Dirty hack to ignore constexpr\n if exp.upper() != exp:\n coccilib.report.print_report(pos[0], \"Possible UB shift here\")\n\nThe only other match in kernel/sched is rq_clock_thermal() which employs\nsched_thermal_decay_shift, and that exponent is already capped to 10, so\nthat one is fine.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47044", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47044", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47044", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47044", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47044", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47044" + } + }, + "CVE-2021-47045": { + "affected_versions": "v5.11-rc1 to v5.13-rc1", + "breaks": "4430f7fd09ecb037570119e0aacbf0c17b8f98b2", + "cmt_msg": "scsi: lpfc: Fix null pointer dereference in lpfc_prep_els_iocb()", + "fixes": "8dd1c125f7f838abad009b64bff5f0a11afe3cb6", + "last_affected_version": "5.12.3", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: lpfc: Fix null pointer dereference in lpfc_prep_els_iocb()\n\nIt is possible to call lpfc_issue_els_plogi() passing a did for which no\nmatching ndlp is found. A call is then made to lpfc_prep_els_iocb() with a\nnull pointer to a lpfc_nodelist structure resulting in a null pointer\ndereference.\n\nFix by returning an error status if no valid ndlp is found. Fix up comments\nregarding ndlp reference counting.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47045", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47045", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47045", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47045", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47045", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47045" + } + }, + "CVE-2021-47046": { + "affected_versions": "unk to v5.13-rc1", + "breaks": "", + "cmt_msg": "drm/amd/display: Fix off by one in hdmi_14_process_transaction()", + "fixes": "8e6fafd5a22e7a2eb216f5510db7aab54cc545c1", + "last_affected_version": "5.12.3", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Fix off by one in hdmi_14_process_transaction()\n\nThe hdcp_i2c_offsets[] array did not have an entry for\nHDCP_MESSAGE_ID_WRITE_CONTENT_STREAM_TYPE so it led to an off by one\nread overflow. I added an entry and copied the 0x0 value for the offset\nfrom similar code in drivers/gpu/drm/amd/display/modules/hdcp/hdcp_ddc.c.\n\nI also declared several of these arrays as having HDCP_MESSAGE_ID_MAX\nentries. This doesn't change the code, but it's just a belt and\nsuspenders approach to try future proof the code.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47046", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47046", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47046", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47046", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47046", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47046" + } + }, + "CVE-2021-47047": { + "affected_versions": "v5.10-rc1 to v5.13-rc1", + "breaks": "1c26372e5aa9e53391a1f8fe0dc7cd93a7e5ba9e", + "cmt_msg": "spi: spi-zynqmp-gqspi: return -ENOMEM if dma_map_single fails", + "fixes": "126bdb606fd2802454e6048caef1be3e25dd121e", + "last_affected_version": "5.12.3", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nspi: spi-zynqmp-gqspi: return -ENOMEM if dma_map_single fails\n\nThe spi controller supports 44-bit address space on AXI in DMA mode,\nso set dma_addr_t width to 44-bit to avoid using a swiotlb mapping.\nIn addition, if dma_map_single fails, it should return immediately\ninstead of continuing doing the DMA operation which bases on invalid\naddress.\n\nThis fixes the following crash which occurs in reading a big block\nfrom flash:\n\n[ 123.633577] zynqmp-qspi ff0f0000.spi: swiotlb buffer is full (sz: 4194304 bytes), total 32768 (slots), used 0 (slots)\n[ 123.644230] zynqmp-qspi ff0f0000.spi: ERR:rxdma:memory not mapped\n[ 123.784625] Unable to handle kernel paging request at virtual address 00000000003fffc0\n[ 123.792536] Mem abort info:\n[ 123.795313] ESR = 0x96000145\n[ 123.798351] EC = 0x25: DABT (current EL), IL = 32 bits\n[ 123.803655] SET = 0, FnV = 0\n[ 123.806693] EA = 0, S1PTW = 0\n[ 123.809818] Data abort info:\n[ 123.812683] ISV = 0, ISS = 0x00000145\n[ 123.816503] CM = 1, WnR = 1\n[ 123.819455] user pgtable: 4k pages, 48-bit VAs, pgdp=0000000805047000\n[ 123.825887] [00000000003fffc0] pgd=0000000803b45003, p4d=0000000803b45003, pud=0000000000000000\n[ 123.834586] Internal error: Oops: 96000145 [#1] PREEMPT SMP", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47047", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47047", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47047", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47047", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47047", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47047" + } + }, + "CVE-2021-47048": { + "affected_versions": "v5.10-rc1 to v5.13-rc1", + "breaks": "1c26372e5aa9e53391a1f8fe0dc7cd93a7e5ba9e", + "cmt_msg": "spi: spi-zynqmp-gqspi: fix use-after-free in zynqmp_qspi_exec_op", + "fixes": "a2c5bedb2d55dd27c642c7b9fb6886d7ad7bdb58", + "last_affected_version": "5.12.3", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nspi: spi-zynqmp-gqspi: fix use-after-free in zynqmp_qspi_exec_op\n\nWhen handling op->addr, it is using the buffer \"tmpbuf\" which has been\nfreed. This will trigger a use-after-free KASAN warning. Let's use\ntemporary variables to store op->addr.val and op->cmd.opcode to fix\nthis issue.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47048", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47048", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47048", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47048", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47048", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47048" + } + }, + "CVE-2021-47049": { + "affected_versions": "v4.14-rc1 to v5.13-rc1", + "breaks": "6f3d791f300618caf82a2be0c27456edd76d5164", + "cmt_msg": "Drivers: hv: vmbus: Use after free in __vmbus_open()", + "fixes": "3e9bf43f7f7a46f21ec071cb47be92d0874c48da", + "last_affected_version": "5.12.3", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nDrivers: hv: vmbus: Use after free in __vmbus_open()\n\nThe \"open_info\" variable is added to the &vmbus_connection.chn_msg_list,\nbut the error handling frees \"open_info\" without removing it from the\nlist. This will result in a use after free. First remove it from the\nlist, and then free it.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47049", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47049", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47049", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47049", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47049", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47049" + } + }, + "CVE-2021-47050": { + "affected_versions": "v5.9-rc1 to v5.13-rc1", + "breaks": "ca7d8b980b67f133317525c4273e144116ee1ae5", + "cmt_msg": "memory: renesas-rpc-if: fix possible NULL pointer dereference of resource", + "fixes": "59e27d7c94aa02da039b000d33c304c179395801", + "last_affected_version": "5.12.3", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmemory: renesas-rpc-if: fix possible NULL pointer dereference of resource\n\nThe platform_get_resource_byname() can return NULL which would be\nimmediately dereferenced by resource_size(). Instead dereference it\nafter validating the resource.\n\nAddresses-Coverity: Dereference null return value", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47050", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47050", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47050", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47050", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47050", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47050" + } + }, + "CVE-2021-47051": { + "affected_versions": "v5.2-rc1 to v5.13-rc1", + "breaks": "944c01a889d97dc08e1b71f4ed868f4023fd6034", + "cmt_msg": "spi: fsl-lpspi: Fix PM reference leak in lpspi_prepare_xfer_hardware()", + "fixes": "a03675497970a93fcf25d81d9d92a59c2d7377a7", + "last_affected_version": "5.12.3", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nspi: fsl-lpspi: Fix PM reference leak in lpspi_prepare_xfer_hardware()\n\npm_runtime_get_sync will increment pm usage counter even it failed.\nForgetting to putting operation will result in reference leak here.\nFix it by replacing it with pm_runtime_resume_and_get to keep usage\ncounter balanced.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47051", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47051", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47051", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47051", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47051", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47051" + } + }, + "CVE-2021-47052": { + "affected_versions": "unk to v5.13-rc1", + "breaks": "", + "cmt_msg": "crypto: sa2ul - Fix memory leak of rxd", + "fixes": "854b7737199848a91f6adfa0a03cf6f0c46c86e8", + "last_affected_version": "5.12.3", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: sa2ul - Fix memory leak of rxd\n\nThere are two error return paths that are not freeing rxd and causing\nmemory leaks. Fix these.\n\nAddresses-Coverity: (\"Resource leak\")", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47052", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47052", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47052", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47052", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47052", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47052" + } + }, + "CVE-2021-47053": { + "affected_versions": "v5.10-rc1 to v5.13-rc1", + "breaks": "d9b45418a91773b7672e4c60037a28074b495c6d", + "cmt_msg": "crypto: sun8i-ss - Fix memory leak of pad", + "fixes": "50274b01ac1689b1a3f6bc4b5b3dbf361a55dd3a", + "last_affected_version": "5.12.3", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: sun8i-ss - Fix memory leak of pad\n\nIt appears there are several failure return paths that don't seem\nto be free'ing pad. Fix these.\n\nAddresses-Coverity: (\"Resource leak\")", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47053", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47053", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47053", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47053", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47053", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47053" + } + }, + "CVE-2021-47054": { + "affected_versions": "v4.9-rc1 to v5.13-rc1", + "breaks": "335a127548081322bd2b294d715418648912f20c", + "cmt_msg": "bus: qcom: Put child node before return", + "fixes": "ac6ad7c2a862d682bb584a4bc904d89fa7721af8", + "last_affected_version": "5.12.3", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbus: qcom: Put child node before return\n\nPut child node before return to fix potential reference count leak.\nGenerally, the reference count of child is incremented and decremented\nautomatically in the macro for_each_available_child_of_node() and should\nbe decremented manually if the loop is broken in loop body.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47054", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47054", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47054", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47054", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47054", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47054" + } + }, + "CVE-2021-47055": { + "affected_versions": "v5.9-rc1 to v5.13-rc1", + "breaks": "f7e6b19bc76471ba03725fe58e0c218a3d6266c3", + "cmt_msg": "mtd: require write permissions for locking and badblock ioctls", + "fixes": "1e97743fd180981bef5f01402342bb54bf1c6366", + "last_affected_version": "5.12.3", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmtd: require write permissions for locking and badblock ioctls\n\nMEMLOCK, MEMUNLOCK and OTPLOCK modify protection bits. Thus require\nwrite permission. Depending on the hardware MEMLOCK might even be\nwrite-once, e.g. for SPI-NOR flashes with their WP# tied to GND. OTPLOCK\nis always write-once.\n\nMEMSETBADBLOCK modifies the bad block table.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47055", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47055", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47055", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47055", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47055", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47055" + } + }, + "CVE-2021-47056": { + "affected_versions": "v4.7-rc1 to v5.13-rc1", + "breaks": "25c6ffb249f612c56a48ce48a3887adf57b8f4bd", + "cmt_msg": "crypto: qat - ADF_STATUS_PF_RUNNING should be set after adf_dev_init", + "fixes": "8609f5cfdc872fc3a462efa6a3eca5cb1e2f6446", + "last_affected_version": "5.12.3", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: qat - ADF_STATUS_PF_RUNNING should be set after adf_dev_init\n\nADF_STATUS_PF_RUNNING is (only) used and checked by adf_vf2pf_shutdown()\nbefore calling adf_iov_putmsg()->mutex_lock(vf2pf_lock), however the\nvf2pf_lock is initialized in adf_dev_init(), which can fail and when it\nfail, the vf2pf_lock is either not initialized or destroyed, a subsequent\nuse of vf2pf_lock will cause issue.\nTo fix this issue, only set this flag if adf_dev_init() returns 0.\n\n[ 7.178404] BUG: KASAN: user-memory-access in __mutex_lock.isra.0+0x1ac/0x7c0\n[ 7.180345] Call Trace:\n[ 7.182576] mutex_lock+0xc9/0xd0\n[ 7.183257] adf_iov_putmsg+0x118/0x1a0 [intel_qat]\n[ 7.183541] adf_vf2pf_shutdown+0x4d/0x7b [intel_qat]\n[ 7.183834] adf_dev_shutdown+0x172/0x2b0 [intel_qat]\n[ 7.184127] adf_probe+0x5e9/0x600 [qat_dh895xccvf]", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47056", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47056", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47056", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47056", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47056", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47056" + } + }, + "CVE-2021-47057": { + "affected_versions": "v5.10-rc1 to v5.13-rc1", + "breaks": "ac2614d721dea2ff273af19c6c5d508d58a2bb3e", + "cmt_msg": "crypto: sun8i-ss - Fix memory leak of object d when dma_iv fails to map", + "fixes": "98b5ef3e97b16eaeeedb936f8bda3594ff84a70e", + "last_affected_version": "5.12.3", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: sun8i-ss - Fix memory leak of object d when dma_iv fails to map\n\nIn the case where the dma_iv mapping fails, the return error path leaks\nthe memory allocated to object d. Fix this by adding a new error return\nlabel and jumping to this to ensure d is free'd before the return.\n\nAddresses-Coverity: (\"Resource leak\")", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47057", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47057", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47057", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47057", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47057", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47057" + } + }, + "CVE-2021-47058": { + "affected_versions": "v5.11-rc3 to v5.13-rc1", + "breaks": "cffa4b2122f5f3e53cf3d529bbc74651f95856d5", + "cmt_msg": "regmap: set debugfs_name to NULL after it is freed", + "fixes": "e41a962f82e7afb5b1ee644f48ad0b3aee656268", + "last_affected_version": "5.12.3", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nregmap: set debugfs_name to NULL after it is freed\n\nThere is a upstream commit cffa4b2122f5(\"regmap:debugfs:\nFix a memory leak when calling regmap_attach_dev\") that\nadds a if condition when create name for debugfs_name.\nWith below function invoking logical, debugfs_name is\nfreed in regmap_debugfs_exit(), but it is not created again\nbecause of the if condition introduced by above commit.\nregmap_reinit_cache()\n\tregmap_debugfs_exit()\n\t...\n\tregmap_debugfs_init()\nSo, set debugfs_name to NULL after it is freed.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47058", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47058", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47058", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47058", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47058", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47058" + } + }, + "CVE-2021-47059": { + "affected_versions": "unk to v5.13-rc1", + "breaks": "", + "cmt_msg": "crypto: sun8i-ss - fix result memory leak on error path", + "fixes": "1dbc6a1e25be8575d6c4114d1d2b841a796507f7", + "last_affected_version": "5.12.3", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: sun8i-ss - fix result memory leak on error path\n\nThis patch fixes a memory leak on an error path.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47059", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47059", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47059", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47059", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47059", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47059" + } + }, + "CVE-2021-47060": { + "affected_versions": "v5.9-rc5 to v5.13-rc1", + "breaks": "f65886606c2d3b562716de030706dfe1bea4ed5e", + "cmt_msg": "KVM: Stop looking for coalesced MMIO zones if the bus is destroyed", + "fixes": "5d3c4c79384af06e3c8e25b7770b6247496b4417", + "last_affected_version": "5.12.3", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: Stop looking for coalesced MMIO zones if the bus is destroyed\n\nAbort the walk of coalesced MMIO zones if kvm_io_bus_unregister_dev()\nfails to allocate memory for the new instance of the bus. If it can't\ninstantiate a new bus, unregister_dev() destroys all devices _except_ the\ntarget device. But, it doesn't tell the caller that it obliterated the\nbus and invoked the destructor for all devices that were on the bus. In\nthe coalesced MMIO case, this can result in a deleted list entry\ndereference due to attempting to continue iterating on coalesced_zones\nafter future entries (in the walk) have been deleted.\n\nOpportunistically add curly braces to the for-loop, which encompasses\nmany lines but sneaks by without braces due to the guts being a single\nif statement.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47060", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47060", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47060", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47060", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47060", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47060" + } + }, + "CVE-2021-47061": { + "affected_versions": "v5.9-rc5 to v5.13-rc1", + "breaks": "f65886606c2d3b562716de030706dfe1bea4ed5e", + "cmt_msg": "KVM: Destroy I/O bus devices on unregister failure _after_ sync'ing SRCU", + "fixes": "2ee3757424be7c1cd1d0bbfa6db29a7edd82a250", + "last_affected_version": "5.12.3", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: Destroy I/O bus devices on unregister failure _after_ sync'ing SRCU\n\nIf allocating a new instance of an I/O bus fails when unregistering a\ndevice, wait to destroy the device until after all readers are guaranteed\nto see the new null bus. Destroying devices before the bus is nullified\ncould lead to use-after-free since readers expect the devices on their\nreference of the bus to remain valid.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47061", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47061", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47061", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47061", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47061", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47061" + } + }, + "CVE-2021-47062": { + "affected_versions": "v5.11-rc1 to v5.13-rc1", + "breaks": "ad73109ae7ec30d5bfb76be108e304f9f0af4829", + "cmt_msg": "KVM: SVM: Use online_vcpus, not created_vcpus, to iterate over vCPUs", + "fixes": "c36b16d29f3af5f32fc1b2a3401bf48f71cabee1", + "last_affected_version": "5.12.3", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: SVM: Use online_vcpus, not created_vcpus, to iterate over vCPUs\n\nUse the kvm_for_each_vcpu() helper to iterate over vCPUs when encrypting\nVMSAs for SEV, which effectively switches to use online_vcpus instead of\ncreated_vcpus. This fixes a possible null-pointer dereference as\ncreated_vcpus does not guarantee a vCPU exists, since it is updated at\nthe very beginning of KVM_CREATE_VCPU. created_vcpus exists to allow the\nbulk of vCPU creation to run in parallel, while still correctly\nrestricting the max number of max vCPUs.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47062", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47062", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47062", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47062", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47062", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47062" + } + }, + "CVE-2021-47063": { + "affected_versions": "v4.13-rc1 to v5.13-rc1", + "breaks": "13dfc0540a575b47b2d640b093ac16e9e09474f6", + "cmt_msg": "drm: bridge/panel: Cleanup connector on bridge detach", + "fixes": "4d906839d321c2efbf3fed4bc31ffd9ff55b75c0", + "last_affected_version": "5.12.3", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm: bridge/panel: Cleanup connector on bridge detach\n\nIf we don't call drm_connector_cleanup() manually in\npanel_bridge_detach(), the connector will be cleaned up with the other\nDRM objects in the call to drm_mode_config_cleanup(). However, since our\ndrm_connector is devm-allocated, by the time drm_mode_config_cleanup()\nwill be called, our connector will be long gone. Therefore, the\nconnector must be cleaned up when the bridge is detached to avoid\nuse-after-free conditions.\n\nv2: Cleanup connector only if it was created\n\nv3: Add FIXME\n\nv4: (Use connector->dev) directly in if() block", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47063", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47063", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47063", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47063", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47063", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47063" + } + }, + "CVE-2021-47064": { + "affected_versions": "v5.10-rc1 to v5.13-rc1", + "breaks": "27d5c528a7ca08dcd44877fdd9fc08b76630bf77", + "cmt_msg": "mt76: fix potential DMA mapping leak", + "fixes": "b4403cee6400c5f679e9c4a82b91d61aa961eccf", + "last_affected_version": "5.12.3", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmt76: fix potential DMA mapping leak\n\nWith buf uninitialized in mt76_dma_tx_queue_skb_raw, its field skip_unmap\ncould potentially inherit a non-zero value from stack garbage.\nIf this happens, it will cause DMA mappings for MCU command frames to not be\nunmapped after completion", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47064", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47064", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47064", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47064", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47064", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47064" + } + }, + "CVE-2021-47065": { + "affected_versions": "unk to v5.13-rc1", + "breaks": "", + "cmt_msg": "rtw88: Fix array overrun in rtw_get_tx_power_params()", + "fixes": "2ff25985ea9ccc6c9af2c77b0b49045adcc62e0e", + "last_affected_version": "5.12.3", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nrtw88: Fix array overrun in rtw_get_tx_power_params()\n\nUsing a kernel with the Undefined Behaviour Sanity Checker (UBSAN) enabled, the\nfollowing array overrun is logged:\n\n================================================================================\nUBSAN: array-index-out-of-bounds in /home/finger/wireless-drivers-next/drivers/net/wireless/realtek/rtw88/phy.c:1789:34\nindex 5 is out of range for type 'u8 [5]'\nCPU: 2 PID: 84 Comm: kworker/u16:3 Tainted: G O 5.12.0-rc5-00086-gd88bba47038e-dirty #651\nHardware name: TOSHIBA TECRA A50-A/TECRA A50-A, BIOS Version 4.50 09/29/2014\nWorkqueue: phy0 ieee80211_scan_work [mac80211]\nCall Trace:\n dump_stack+0x64/0x7c\n ubsan_epilogue+0x5/0x40\n __ubsan_handle_out_of_bounds.cold+0x43/0x48\n rtw_get_tx_power_params+0x83a/drivers/net/wireless/realtek/rtw88/0xad0 [rtw_core]\n ? rtw_pci_read16+0x20/0x20 [rtw_pci]\n ? check_hw_ready+0x50/0x90 [rtw_core]\n rtw_phy_get_tx_power_index+0x4d/0xd0 [rtw_core]\n rtw_phy_set_tx_power_level+0xee/0x1b0 [rtw_core]\n rtw_set_channel+0xab/0x110 [rtw_core]\n rtw_ops_config+0x87/0xc0 [rtw_core]\n ieee80211_hw_config+0x9d/0x130 [mac80211]\n ieee80211_scan_state_set_channel+0x81/0x170 [mac80211]\n ieee80211_scan_work+0x19f/0x2a0 [mac80211]\n process_one_work+0x1dd/0x3a0\n worker_thread+0x49/0x330\n ? rescuer_thread+0x3a0/0x3a0\n kthread+0x134/0x150\n ? kthread_create_worker_on_cpu+0x70/0x70\n ret_from_fork+0x22/0x30\n================================================================================\n\nThe statement where an array is being overrun is shown in the following snippet:\n\n\tif (rate <= DESC_RATE11M)\n\t\ttx_power = pwr_idx_2g->cck_base[group];\n\telse\n====>\t\ttx_power = pwr_idx_2g->bw40_base[group];\n\nThe associated arrays are defined in main.h as follows:\n\nstruct rtw_2g_txpwr_idx {\n\tu8 cck_base[6];\n\tu8 bw40_base[5];\n\tstruct rtw_2g_1s_pwr_idx_diff ht_1s_diff;\n\tstruct rtw_2g_ns_pwr_idx_diff ht_2s_diff;\n\tstruct rtw_2g_ns_pwr_idx_diff ht_3s_diff;\n\tstruct rtw_2g_ns_pwr_idx_diff ht_4s_diff;\n};\n\nThe problem arises because the value of group is 5 for channel 14. The trivial\nincrease in the dimension of bw40_base fails as this struct must match the layout of\nefuse. The fix is to add the rate as an argument to rtw_get_channel_group() and set\nthe group for channel 14 to 4 if rate <= DESC_RATE11M.\n\nThis patch fixes commit fa6dfe6bff24 (\"rtw88: resolve order of tx power setting routines\")", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47065", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47065", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47065", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47065", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47065", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47065" + } + }, + "CVE-2021-47066": { + "affected_versions": "v5.10-rc1 to v5.13-rc1", + "breaks": "29bcff787a2593b2126cfaff612c0b4e560022e9", + "cmt_msg": "async_xor: increase src_offs when dropping destination page", + "fixes": "ceaf2966ab082bbc4d26516f97b3ca8a676e2af8", + "last_affected_version": "5.12.3", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nasync_xor: increase src_offs when dropping destination page\n\nNow we support sharing one page if PAGE_SIZE is not equal stripe size. To\nsupport this, it needs to support calculating xor value with different\noffsets for each r5dev. One offset array is used to record those offsets.\n\nIn RMW mode, parity page is used as a source page. It sets\nASYNC_TX_XOR_DROP_DST before calculating xor value in ops_run_prexor5.\nSo it needs to add src_list and src_offs at the same time. Now it only\nneeds src_list. So the xor value which is calculated is wrong. It can\ncause data corruption problem.\n\nI can reproduce this problem 100% on a POWER8 machine. The steps are:\n\n mdadm -CR /dev/md0 -l5 -n3 /dev/sdb1 /dev/sdc1 /dev/sdd1 --size=3G\n mkfs.xfs /dev/md0\n mount /dev/md0 /mnt/test\n mount: /mnt/test: mount(2) system call failed: Structure needs cleaning.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47066", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47066", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47066", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47066", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47066", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47066" + } + }, + "CVE-2021-47067": { + "affected_versions": "v5.5-rc1 to v5.13-rc1", + "breaks": "783807436f363e5b1ad4d43ba7debbedfcadbb99", + "cmt_msg": "soc/tegra: regulators: Fix locking up when voltage-spread is out of range", + "fixes": "ef85bb582c41524e9e68dfdbde48e519dac4ab3d", + "last_affected_version": "5.12.3", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsoc/tegra: regulators: Fix locking up when voltage-spread is out of range\n\nFix voltage coupler lockup which happens when voltage-spread is out\nof range due to a bug in the code. The max-spread requirement shall be\naccounted when CPU regulator doesn't have consumers. This problem is\nobserved on Tegra30 Ouya game console once system-wide DVFS is enabled\nin a device-tree.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47067", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47067", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47067", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47067", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47067", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47067" + } + }, + "CVE-2021-47068": { + "affected_versions": "v5.12-rc7 to v5.13-rc1", + "breaks": "c33b1cc62ac05c1dbb1cdafe2eb66da01c76ca8d", + "cmt_msg": "net/nfc: fix use-after-free llcp_sock_bind/connect", + "fixes": "c61760e6940dd4039a7f5e84a6afc9cdbf4d82b6", + "last_affected_version": "5.12.3", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/nfc: fix use-after-free llcp_sock_bind/connect\n\nCommits 8a4cd82d (\"nfc: fix refcount leak in llcp_sock_connect()\")\nand c33b1cc62 (\"nfc: fix refcount leak in llcp_sock_bind()\")\nfixed a refcount leak bug in bind/connect but introduced a\nuse-after-free if the same local is assigned to 2 different sockets.\n\nThis can be triggered by the following simple program:\n int sock1 = socket( AF_NFC, SOCK_STREAM, NFC_SOCKPROTO_LLCP );\n int sock2 = socket( AF_NFC, SOCK_STREAM, NFC_SOCKPROTO_LLCP );\n memset( &addr, 0, sizeof(struct sockaddr_nfc_llcp) );\n addr.sa_family = AF_NFC;\n addr.nfc_protocol = NFC_PROTO_NFC_DEP;\n bind( sock1, (struct sockaddr*) &addr, sizeof(struct sockaddr_nfc_llcp) )\n bind( sock2, (struct sockaddr*) &addr, sizeof(struct sockaddr_nfc_llcp) )\n close(sock1);\n close(sock2);\n\nFix this by assigning NULL to llcp_sock->local after calling\nnfc_llcp_local_put.\n\nThis addresses CVE-2021-23134.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47068", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47068", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47068", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47068", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47068", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47068" + } + }, + "CVE-2021-47069": { + "affected_versions": "v5.6-rc1 to v5.13-rc3", + "breaks": "c5b2cbdbdac563f46ecd5e187253ab1abbd6fc04", + "cmt_msg": "ipc/mqueue, msg, sem: avoid relying on a stack reference past its expiry", + "fixes": "a11ddb37bf367e6b5239b95ca759e5389bb46048", + "last_affected_version": "5.12.6", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipc/mqueue, msg, sem: avoid relying on a stack reference past its expiry\n\ndo_mq_timedreceive calls wq_sleep with a stack local address. The\nsender (do_mq_timedsend) uses this address to later call pipelined_send.\n\nThis leads to a very hard to trigger race where a do_mq_timedreceive\ncall might return and leave do_mq_timedsend to rely on an invalid\naddress, causing the following crash:\n\n RIP: 0010:wake_q_add_safe+0x13/0x60\n Call Trace:\n __x64_sys_mq_timedsend+0x2a9/0x490\n do_syscall_64+0x80/0x680\n entry_SYSCALL_64_after_hwframe+0x44/0xa9\n RIP: 0033:0x7f5928e40343\n\nThe race occurs as:\n\n1. do_mq_timedreceive calls wq_sleep with the address of `struct\n ext_wait_queue` on function stack (aliased as `ewq_addr` here) - it\n holds a valid `struct ext_wait_queue *` as long as the stack has not\n been overwritten.\n\n2. `ewq_addr` gets added to info->e_wait_q[RECV].list in wq_add, and\n do_mq_timedsend receives it via wq_get_first_waiter(info, RECV) to call\n __pipelined_op.\n\n3. Sender calls __pipelined_op::smp_store_release(&this->state,\n STATE_READY). Here is where the race window begins. (`this` is\n `ewq_addr`.)\n\n4. If the receiver wakes up now in do_mq_timedreceive::wq_sleep, it\n will see `state == STATE_READY` and break.\n\n5. do_mq_timedreceive returns, and `ewq_addr` is no longer guaranteed\n to be a `struct ext_wait_queue *` since it was on do_mq_timedreceive's\n stack. (Although the address may not get overwritten until another\n function happens to touch it, which means it can persist around for an\n indefinite time.)\n\n6. do_mq_timedsend::__pipelined_op() still believes `ewq_addr` is a\n `struct ext_wait_queue *`, and uses it to find a task_struct to pass to\n the wake_q_add_safe call. In the lucky case where nothing has\n overwritten `ewq_addr` yet, `ewq_addr->task` is the right task_struct.\n In the unlucky case, __pipelined_op::wake_q_add_safe gets handed a\n bogus address as the receiver's task_struct causing the crash.\n\ndo_mq_timedsend::__pipelined_op() should not dereference `this` after\nsetting STATE_READY, as the receiver counterpart is now free to return.\nChange __pipelined_op to call wake_q_add_safe on the receiver's\ntask_struct returned by get_task_struct, instead of dereferencing `this`\nwhich sits on the receiver's stack.\n\nAs Manfred pointed out, the race potentially also exists in\nipc/msg.c::expunge_all and ipc/sem.c::wake_up_sem_queue_prepare. Fix\nthose in the same way.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47069", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47069", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47069", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47069", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47069", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47069" + } + }, + "CVE-2021-47070": { + "affected_versions": "unk to v5.13-rc3", + "breaks": "", + "cmt_msg": "uio_hv_generic: Fix another memory leak in error handling paths", + "fixes": "0b0226be3a52dadd965644bc52a807961c2c26df", + "last_affected_version": "5.12.6", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nuio_hv_generic: Fix another memory leak in error handling paths\n\nMemory allocated by 'vmbus_alloc_ring()' at the beginning of the probe\nfunction is never freed in the error handling path.\n\nAdd the missing 'vmbus_free_ring()' call.\n\nNote that it is already freed in the .remove function.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47070", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47070", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47070", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47070", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47070", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47070" + } + }, + "CVE-2021-47071": { + "affected_versions": "v4.20-rc1 to v5.13-rc3", + "breaks": "cdfa835c6e5e87d145f9f632b58843de97509f2b", + "cmt_msg": "uio_hv_generic: Fix a memory leak in error handling paths", + "fixes": "3ee098f96b8b6c1a98f7f97915f8873164e6af9d", + "last_affected_version": "5.12.6", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nuio_hv_generic: Fix a memory leak in error handling paths\n\nIf 'vmbus_establish_gpadl()' fails, the (recv|send)_gpadl will not be\nupdated and 'hv_uio_cleanup()' in the error handling path will not be\nable to free the corresponding buffer.\n\nIn such a case, we need to free the buffer explicitly.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47071", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47071", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47071", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47071", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47071", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47071" + } + }, + "CVE-2021-47072": { + "affected_versions": "v5.12-rc1-dontuse to v5.13-rc3", + "breaks": "64d6b281ba4db044c946158387c74e1149b9487e", + "cmt_msg": "btrfs: fix removed dentries still existing after log is synced", + "fixes": "54a40fc3a1da21b52dbf19f72fdc27a2ec740760", + "last_affected_version": "5.12.6", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: fix removed dentries still existing after log is synced\n\nWhen we move one inode from one directory to another and both the inode\nand its previous parent directory were logged before, we are not supposed\nto have the dentry for the old parent if we have a power failure after the\nlog is synced. Only the new dentry is supposed to exist.\n\nGenerally this works correctly, however there is a scenario where this is\nnot currently working, because the old parent of the file/directory that\nwas moved is not authoritative for a range that includes the dir index and\ndir item keys of the old dentry. This case is better explained with the\nfollowing example and reproducer:\n\n # The test requires a very specific layout of keys and items in the\n # fs/subvolume btree to trigger the bug. So we want to make sure that\n # on whatever platform we are, we have the same leaf/node size.\n #\n # Currently in btrfs the node/leaf size can not be smaller than the page\n # size (but it can be greater than the page size). So use the largest\n # supported node/leaf size (64K).\n\n $ mkfs.btrfs -f -n 65536 /dev/sdc\n $ mount /dev/sdc /mnt\n\n # \"testdir\" is inode 257.\n $ mkdir /mnt/testdir\n $ chmod 755 /mnt/testdir\n\n # Create several empty files to have the directory \"testdir\" with its\n # items spread over several leaves (7 in this case).\n $ for ((i = 1; i <= 1200; i++)); do\n echo -n > /mnt/testdir/file$i\n done\n\n # Create our test directory \"dira\", inode number 1458, which gets all\n # its items in leaf 7.\n #\n # The BTRFS_DIR_ITEM_KEY item for inode 257 (\"testdir\") that points to\n # the entry named \"dira\" is in leaf 2, while the BTRFS_DIR_INDEX_KEY\n # item that points to that entry is in leaf 3.\n #\n # For this particular filesystem node size (64K), file count and file\n # names, we endup with the directory entry items from inode 257 in\n # leaves 2 and 3, as previously mentioned - what matters for triggering\n # the bug exercised by this test case is that those items are not placed\n # in leaf 1, they must be placed in a leaf different from the one\n # containing the inode item for inode 257.\n #\n # The corresponding BTRFS_DIR_ITEM_KEY and BTRFS_DIR_INDEX_KEY items for\n # the parent inode (257) are the following:\n #\n # item 460 key (257 DIR_ITEM 3724298081) itemoff 48344 itemsize 34\n # location key (1458 INODE_ITEM 0) type DIR\n # transid 6 data_len 0 name_len 4\n # name: dira\n #\n # and:\n #\n # item 771 key (257 DIR_INDEX 1202) itemoff 36673 itemsize 34\n # location key (1458 INODE_ITEM 0) type DIR\n # transid 6 data_len 0 name_len 4\n # name: dira\n\n $ mkdir /mnt/testdir/dira\n\n # Make sure everything done so far is durably persisted.\n $ sync\n\n # Now do a change to inode 257 (\"testdir\") that does not result in\n # COWing leaves 2 and 3 - the leaves that contain the directory items\n # pointing to inode 1458 (directory \"dira\").\n #\n # Changing permissions, the owner/group, updating or adding a xattr,\n # etc, will not change (COW) leaves 2 and 3. So for the sake of\n # simplicity change the permissions of inode 257, which results in\n # updating its inode item and therefore change (COW) only leaf 1.\n\n $ chmod 700 /mnt/testdir\n\n # Now fsync directory inode 257.\n #\n # Since only the first leaf was changed/COWed, we log the inode item of\n # inode 257 and only the dentries found in the first leaf, all have a\n # key type of BTRFS_DIR_ITEM_KEY, and no keys of type\n # BTRFS_DIR_INDEX_KEY, because they sort after the former type and none\n # exist in the first leaf.\n #\n # We also log 3 items that represent ranges for dir items and dir\n # indexes for which the log is authoritative:\n #\n # 1) a key of type BTRFS_DIR_LOG_ITEM_KEY, which indicates the log is\n # authoritative for all BTRFS_DIR_ITEM_KEY keys that have an offset\n # in the range [0, 2285968570] (the offset here is th\n---truncated---", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47072", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47072", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47072", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47072", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47072", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47072" + } + }, + "CVE-2021-47073": { + "affected_versions": "v4.15-rc1 to v5.13-rc3", + "breaks": "1a258e670434f404a4500b65ba1afea2c2b29bba", + "cmt_msg": "platform/x86: dell-smbios-wmi: Fix oops on rmmod dell_smbios", + "fixes": "3a53587423d25c87af4b4126a806a0575104b45e", + "last_affected_version": "5.12.6", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nplatform/x86: dell-smbios-wmi: Fix oops on rmmod dell_smbios\n\ninit_dell_smbios_wmi() only registers the dell_smbios_wmi_driver on systems\nwhere the Dell WMI interface is supported. While exit_dell_smbios_wmi()\nunregisters it unconditionally, this leads to the following oops:\n\n[ 175.722921] ------------[ cut here ]------------\n[ 175.722925] Unexpected driver unregister!\n[ 175.722939] WARNING: CPU: 1 PID: 3630 at drivers/base/driver.c:194 driver_unregister+0x38/0x40\n...\n[ 175.723089] Call Trace:\n[ 175.723094] cleanup_module+0x5/0xedd [dell_smbios]\n...\n[ 175.723148] ---[ end trace 064c34e1ad49509d ]---\n\nMake the unregister happen on the same condition the register happens\nto fix this.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47073", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47073", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47073", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47073", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47073", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47073" + } + }, + "CVE-2021-47074": { + "affected_versions": "v4.8-rc1 to v5.13-rc3", + "breaks": "3a85a5de29ea779634ddfd768059e06196687aba", + "cmt_msg": "nvme-loop: fix memory leak in nvme_loop_create_ctrl()", + "fixes": "03504e3b54cc8118cc26c064e60a0b00c2308708", + "last_affected_version": "5.12.6", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvme-loop: fix memory leak in nvme_loop_create_ctrl()\n\nWhen creating loop ctrl in nvme_loop_create_ctrl(), if nvme_init_ctrl()\nfails, the loop ctrl should be freed before jumping to the \"out\" label.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47074", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47074", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47074", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47074", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47074", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47074" + } + }, + "CVE-2021-47075": { + "affected_versions": "unk to v5.13-rc3", + "breaks": "", + "cmt_msg": "nvmet: fix memory leak in nvmet_alloc_ctrl()", + "fixes": "fec356a61aa3d3a66416b4321f1279e09e0f256f", + "last_affected_version": "5.12.6", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvmet: fix memory leak in nvmet_alloc_ctrl()\n\nWhen creating ctrl in nvmet_alloc_ctrl(), if the cntlid_min is larger\nthan cntlid_max of the subsystem, and jumps to the\n\"out_free_changed_ns_list\" label, but the ctrl->sqs lack of be freed.\nFix this by jumping to the \"out_free_sqs\" label.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47075", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47075", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47075", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47075", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47075", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47075" + } + }, + "CVE-2021-47076": { + "affected_versions": "unk to v5.13-rc3", + "breaks": "", + "cmt_msg": "RDMA/rxe: Return CQE error if invalid lkey was supplied", + "fixes": "dc07628bd2bbc1da768e265192c28ebd301f509d", + "last_affected_version": "5.12.6", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/rxe: Return CQE error if invalid lkey was supplied\n\nRXE is missing update of WQE status in LOCAL_WRITE failures. This caused\nthe following kernel panic if someone sent an atomic operation with an\nexplicitly wrong lkey.\n\n[leonro@vm ~]$ mkt test\ntest_atomic_invalid_lkey (tests.test_atomic.AtomicTest) ...\n WARNING: CPU: 5 PID: 263 at drivers/infiniband/sw/rxe/rxe_comp.c:740 rxe_completer+0x1a6d/0x2e30 [rdma_rxe]\n Modules linked in: crc32_generic rdma_rxe ip6_udp_tunnel udp_tunnel rdma_ucm rdma_cm ib_umad ib_ipoib iw_cm ib_cm mlx5_ib ib_uverbs ib_core mlx5_core ptp pps_core\n CPU: 5 PID: 263 Comm: python3 Not tainted 5.13.0-rc1+ #2936\n Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014\n RIP: 0010:rxe_completer+0x1a6d/0x2e30 [rdma_rxe]\n Code: 03 0f 8e 65 0e 00 00 3b 93 10 06 00 00 0f 84 82 0a 00 00 4c 89 ff 4c 89 44 24 38 e8 2d 74 a9 e1 4c 8b 44 24 38 e9 1c f5 ff ff <0f> 0b e9 0c e8 ff ff b8 05 00 00 00 41 bf 05 00 00 00 e9 ab e7 ff\n RSP: 0018:ffff8880158af090 EFLAGS: 00010246\n RAX: 0000000000000000 RBX: ffff888016a78000 RCX: ffffffffa0cf1652\n RDX: 1ffff9200004b442 RSI: 0000000000000004 RDI: ffffc9000025a210\n RBP: dffffc0000000000 R08: 00000000ffffffea R09: ffff88801617740b\n R10: ffffed1002c2ee81 R11: 0000000000000007 R12: ffff88800f3b63e8\n R13: ffff888016a78008 R14: ffffc9000025a180 R15: 000000000000000c\n FS: 00007f88b622a740(0000) GS:ffff88806d540000(0000) knlGS:0000000000000000\n CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 00007f88b5a1fa10 CR3: 000000000d848004 CR4: 0000000000370ea0\n DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n Call Trace:\n rxe_do_task+0x130/0x230 [rdma_rxe]\n rxe_rcv+0xb11/0x1df0 [rdma_rxe]\n rxe_loopback+0x157/0x1e0 [rdma_rxe]\n rxe_responder+0x5532/0x7620 [rdma_rxe]\n rxe_do_task+0x130/0x230 [rdma_rxe]\n rxe_rcv+0x9c8/0x1df0 [rdma_rxe]\n rxe_loopback+0x157/0x1e0 [rdma_rxe]\n rxe_requester+0x1efd/0x58c0 [rdma_rxe]\n rxe_do_task+0x130/0x230 [rdma_rxe]\n rxe_post_send+0x998/0x1860 [rdma_rxe]\n ib_uverbs_post_send+0xd5f/0x1220 [ib_uverbs]\n ib_uverbs_write+0x847/0xc80 [ib_uverbs]\n vfs_write+0x1c5/0x840\n ksys_write+0x176/0x1d0\n do_syscall_64+0x3f/0x80\n entry_SYSCALL_64_after_hwframe+0x44/0xae", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47076", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47076", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47076", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47076", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47076", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47076" + } + }, + "CVE-2021-47077": { + "affected_versions": "v4.11-rc1 to v5.13-rc3", + "breaks": "61d8658b4a435eac729966cc94cdda077a8df5cd", + "cmt_msg": "scsi: qedf: Add pointer checks in qedf_update_link_speed()", + "fixes": "73578af92a0fae6609b955fcc9113e50e413c80f", + "last_affected_version": "5.12.6", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: qedf: Add pointer checks in qedf_update_link_speed()\n\nThe following trace was observed:\n\n [ 14.042059] Call Trace:\n [ 14.042061] \n [ 14.042068] qedf_link_update+0x144/0x1f0 [qedf]\n [ 14.042117] qed_link_update+0x5c/0x80 [qed]\n [ 14.042135] qed_mcp_handle_link_change+0x2d2/0x410 [qed]\n [ 14.042155] ? qed_set_ptt+0x70/0x80 [qed]\n [ 14.042170] ? qed_set_ptt+0x70/0x80 [qed]\n [ 14.042186] ? qed_rd+0x13/0x40 [qed]\n [ 14.042205] qed_mcp_handle_events+0x437/0x690 [qed]\n [ 14.042221] ? qed_set_ptt+0x70/0x80 [qed]\n [ 14.042239] qed_int_sp_dpc+0x3a6/0x3e0 [qed]\n [ 14.042245] tasklet_action_common.isra.14+0x5a/0x100\n [ 14.042250] __do_softirq+0xe4/0x2f8\n [ 14.042253] irq_exit+0xf7/0x100\n [ 14.042255] do_IRQ+0x7f/0xd0\n [ 14.042257] common_interrupt+0xf/0xf\n [ 14.042259] \n\nAPI qedf_link_update() is getting called from QED but by that time\nshost_data is not initialised. This results in a NULL pointer dereference\nwhen we try to dereference shost_data while updating supported_speeds.\n\nAdd a NULL pointer check before dereferencing shost_data.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47077", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47077", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47077", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47077", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47077", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47077" + } + }, + "CVE-2021-47078": { + "affected_versions": "v4.8-rc1 to v5.13-rc3", + "breaks": "8700e3e7c4857d28ebaa824509934556da0b3e76", + "cmt_msg": "RDMA/rxe: Clear all QP fields if creation failed", + "fixes": "67f29896fdc83298eed5a6576ff8f9873f709228", + "last_affected_version": "5.12.6", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/rxe: Clear all QP fields if creation failed\n\nrxe_qp_do_cleanup() relies on valid pointer values in QP for the properly\ncreated ones, but in case rxe_qp_from_init() failed it was filled with\ngarbage and caused tot the following error.\n\n refcount_t: underflow; use-after-free.\n WARNING: CPU: 1 PID: 12560 at lib/refcount.c:28 refcount_warn_saturate+0x1d1/0x1e0 lib/refcount.c:28\n Modules linked in:\n CPU: 1 PID: 12560 Comm: syz-executor.4 Not tainted 5.12.0-syzkaller #0\n Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011\n RIP: 0010:refcount_warn_saturate+0x1d1/0x1e0 lib/refcount.c:28\n Code: e9 db fe ff ff 48 89 df e8 2c c2 ea fd e9 8a fe ff ff e8 72 6a a7 fd 48 c7 c7 e0 b2 c1 89 c6 05 dc 3a e6 09 01 e8 ee 74 fb 04 <0f> 0b e9 af fe ff ff 0f 1f 84 00 00 00 00 00 41 56 41 55 41 54 55\n RSP: 0018:ffffc900097ceba8 EFLAGS: 00010286\n RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000\n RDX: 0000000000040000 RSI: ffffffff815bb075 RDI: fffff520012f9d67\n RBP: 0000000000000003 R08: 0000000000000000 R09: 0000000000000000\n R10: ffffffff815b4eae R11: 0000000000000000 R12: ffff8880322a4800\n R13: ffff8880322a4940 R14: ffff888033044e00 R15: 0000000000000000\n FS: 00007f6eb2be3700(0000) GS:ffff8880b9d00000(0000) knlGS:0000000000000000\n CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 00007fdbe5d41000 CR3: 000000001d181000 CR4: 00000000001506e0\n DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n Call Trace:\n __refcount_sub_and_test include/linux/refcount.h:283 [inline]\n __refcount_dec_and_test include/linux/refcount.h:315 [inline]\n refcount_dec_and_test include/linux/refcount.h:333 [inline]\n kref_put include/linux/kref.h:64 [inline]\n rxe_qp_do_cleanup+0x96f/0xaf0 drivers/infiniband/sw/rxe/rxe_qp.c:805\n execute_in_process_context+0x37/0x150 kernel/workqueue.c:3327\n rxe_elem_release+0x9f/0x180 drivers/infiniband/sw/rxe/rxe_pool.c:391\n kref_put include/linux/kref.h:65 [inline]\n rxe_create_qp+0x2cd/0x310 drivers/infiniband/sw/rxe/rxe_verbs.c:425\n _ib_create_qp drivers/infiniband/core/core_priv.h:331 [inline]\n ib_create_named_qp+0x2ad/0x1370 drivers/infiniband/core/verbs.c:1231\n ib_create_qp include/rdma/ib_verbs.h:3644 [inline]\n create_mad_qp+0x177/0x2d0 drivers/infiniband/core/mad.c:2920\n ib_mad_port_open drivers/infiniband/core/mad.c:3001 [inline]\n ib_mad_init_device+0xd6f/0x1400 drivers/infiniband/core/mad.c:3092\n add_client_context+0x405/0x5e0 drivers/infiniband/core/device.c:717\n enable_device_and_get+0x1cd/0x3b0 drivers/infiniband/core/device.c:1331\n ib_register_device drivers/infiniband/core/device.c:1413 [inline]\n ib_register_device+0x7c7/0xa50 drivers/infiniband/core/device.c:1365\n rxe_register_device+0x3d5/0x4a0 drivers/infiniband/sw/rxe/rxe_verbs.c:1147\n rxe_add+0x12fe/0x16d0 drivers/infiniband/sw/rxe/rxe.c:247\n rxe_net_add+0x8c/0xe0 drivers/infiniband/sw/rxe/rxe_net.c:503\n rxe_newlink drivers/infiniband/sw/rxe/rxe.c:269 [inline]\n rxe_newlink+0xb7/0xe0 drivers/infiniband/sw/rxe/rxe.c:250\n nldev_newlink+0x30e/0x550 drivers/infiniband/core/nldev.c:1555\n rdma_nl_rcv_msg+0x36d/0x690 drivers/infiniband/core/netlink.c:195\n rdma_nl_rcv_skb drivers/infiniband/core/netlink.c:239 [inline]\n rdma_nl_rcv+0x2ee/0x430 drivers/infiniband/core/netlink.c:259\n netlink_unicast_kernel net/netlink/af_netlink.c:1312 [inline]\n netlink_unicast+0x533/0x7d0 net/netlink/af_netlink.c:1338\n netlink_sendmsg+0x856/0xd90 net/netlink/af_netlink.c:1927\n sock_sendmsg_nosec net/socket.c:654 [inline]\n sock_sendmsg+0xcf/0x120 net/socket.c:674\n ____sys_sendmsg+0x6e8/0x810 net/socket.c:2350\n ___sys_sendmsg+0xf3/0x170 net/socket.c:2404\n __sys_sendmsg+0xe5/0x1b0 net/socket.c:2433\n do_syscall_64+0x3a/0xb0 arch/x86/entry/common.c:47\n entry_SYSCALL_64_after_hwframe+0\n---truncated---", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47078", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47078", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47078", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47078", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47078", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47078" + } + }, + "CVE-2021-47079": { + "affected_versions": "v5.12-rc1-dontuse to v5.13-rc3", + "breaks": "ff36b0d953dc4cbc40a72945920ff8e805f1b0da", + "cmt_msg": "platform/x86: ideapad-laptop: fix a NULL pointer dereference", + "fixes": "ff67dbd554b2aaa22be933eced32610ff90209dd", + "last_affected_version": "5.12.6", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nplatform/x86: ideapad-laptop: fix a NULL pointer dereference\n\nThe third parameter of dytc_cql_command should not be NULL since it will\nbe dereferenced immediately.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47079", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47079", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47079", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47079", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47079", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47079" + } + }, + "CVE-2021-47080": { + "affected_versions": "v5.10-rc1 to v5.13-rc3", + "breaks": "9f85cbe50aa044a46f0a22fda323fa27b80c82da", + "cmt_msg": "RDMA/core: Prevent divide-by-zero error triggered by the user", + "fixes": "54d87913f147a983589923c7f651f97de9af5be1", + "last_affected_version": "5.12.6", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/core: Prevent divide-by-zero error triggered by the user\n\nThe user_entry_size is supplied by the user and later used as a\ndenominator to calculate number of entries. The zero supplied by the user\nwill trigger the following divide-by-zero error:\n\n divide error: 0000 [#1] SMP KASAN PTI\n CPU: 4 PID: 497 Comm: c_repro Not tainted 5.13.0-rc1+ #281\n Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014\n RIP: 0010:ib_uverbs_handler_UVERBS_METHOD_QUERY_GID_TABLE+0x1b1/0x510\n Code: 87 59 03 00 00 e8 9f ab 1e ff 48 8d bd a8 00 00 00 e8 d3 70 41 ff 44 0f b7 b5 a8 00 00 00 e8 86 ab 1e ff 31 d2 4c 89 f0 31 ff <49> f7 f5 48 89 d6 48 89 54 24 10 48 89 04 24 e8 1b ad 1e ff 48 8b\n RSP: 0018:ffff88810416f828 EFLAGS: 00010246\n RAX: 0000000000000008 RBX: 1ffff1102082df09 RCX: ffffffff82183f3d\n RDX: 0000000000000000 RSI: ffff888105f2da00 RDI: 0000000000000000\n RBP: ffff88810416fa98 R08: 0000000000000001 R09: ffffed102082df5f\n R10: ffff88810416faf7 R11: ffffed102082df5e R12: 0000000000000000\n R13: 0000000000000000 R14: 0000000000000008 R15: ffff88810416faf0\n FS: 00007f5715efa740(0000) GS:ffff88811a700000(0000) knlGS:0000000000000000\n CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 0000000020000840 CR3: 000000010c2e0001 CR4: 0000000000370ea0\n DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n Call Trace:\n ? ib_uverbs_handler_UVERBS_METHOD_INFO_HANDLES+0x4b0/0x4b0\n ib_uverbs_cmd_verbs+0x1546/0x1940\n ib_uverbs_ioctl+0x186/0x240\n __x64_sys_ioctl+0x38a/0x1220\n do_syscall_64+0x3f/0x80\n entry_SYSCALL_64_after_hwframe+0x44/0xae", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47080", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47080", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47080", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47080", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47080", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47080" + } + }, + "CVE-2021-47081": { + "affected_versions": "v5.12-rc1-dontuse to v5.13-rc3", + "breaks": "423815bf02e257091d5337be5c63b57fc29e4254", + "cmt_msg": "habanalabs/gaudi: Fix a potential use after free in gaudi_memset_device_memory", + "fixes": "115726c5d312b462c9d9931ea42becdfa838a076", + "last_affected_version": "5.12.6", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nhabanalabs/gaudi: Fix a potential use after free in gaudi_memset_device_memory\n\nOur code analyzer reported a uaf.\n\nIn gaudi_memset_device_memory, cb is get via hl_cb_kernel_create()\nwith 2 refcount.\nIf hl_cs_allocate_job() failed, the execution runs into release_cb\nbranch. One ref of cb is dropped by hl_cb_put(cb) and could be freed\nif other thread also drops one ref. Then cb is used by cb->id later,\nwhich is a potential uaf.\n\nMy patch add a variable 'id' to accept the value of cb->id before the\nhl_cb_put(cb) is called, to avoid the potential uaf.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47081", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47081", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47081", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47081", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47081", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47081" + } + }, + "CVE-2021-47082": { + "affected_versions": "v2.6.12-rc2 to v5.16-rc7", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "tun: avoid double free in tun_free_netdev", + "fixes": "158b515f703e75e7d68289bf4d98c664e1d632df", + "last_affected_version": "5.15.11", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntun: avoid double free in tun_free_netdev\n\nAvoid double free in tun_free_netdev() by moving the\ndev->tstats and tun->security allocs to a new ndo_init routine\n(tun_net_init()) that will be called by register_netdevice().\nndo_init is paired with the desctructor (tun_free_netdev()),\nso if there's an error in register_netdevice() the destructor\nwill handle the frees.\n\nBUG: KASAN: double-free or invalid-free in selinux_tun_dev_free_security+0x1a/0x20 security/selinux/hooks.c:5605\n\nCPU: 0 PID: 25750 Comm: syz-executor416 Not tainted 5.16.0-rc2-syzk #1\nHardware name: Red Hat KVM, BIOS\nCall Trace:\n\n__dump_stack lib/dump_stack.c:88 [inline]\ndump_stack_lvl+0x89/0xb5 lib/dump_stack.c:106\nprint_address_description.constprop.9+0x28/0x160 mm/kasan/report.c:247\nkasan_report_invalid_free+0x55/0x80 mm/kasan/report.c:372\n____kasan_slab_free mm/kasan/common.c:346 [inline]\n__kasan_slab_free+0x107/0x120 mm/kasan/common.c:374\nkasan_slab_free include/linux/kasan.h:235 [inline]\nslab_free_hook mm/slub.c:1723 [inline]\nslab_free_freelist_hook mm/slub.c:1749 [inline]\nslab_free mm/slub.c:3513 [inline]\nkfree+0xac/0x2d0 mm/slub.c:4561\nselinux_tun_dev_free_security+0x1a/0x20 security/selinux/hooks.c:5605\nsecurity_tun_dev_free_security+0x4f/0x90 security/security.c:2342\ntun_free_netdev+0xe6/0x150 drivers/net/tun.c:2215\nnetdev_run_todo+0x4df/0x840 net/core/dev.c:10627\nrtnl_unlock+0x13/0x20 net/core/rtnetlink.c:112\n__tun_chr_ioctl+0x80c/0x2870 drivers/net/tun.c:3302\ntun_chr_ioctl+0x2f/0x40 drivers/net/tun.c:3311\nvfs_ioctl fs/ioctl.c:51 [inline]\n__do_sys_ioctl fs/ioctl.c:874 [inline]\n__se_sys_ioctl fs/ioctl.c:860 [inline]\n__x64_sys_ioctl+0x19d/0x220 fs/ioctl.c:860\ndo_syscall_x64 arch/x86/entry/common.c:50 [inline]\ndo_syscall_64+0x3a/0x80 arch/x86/entry/common.c:80\nentry_SYSCALL_64_after_hwframe+0x44/0xae", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47082", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47082", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47082", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47082", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47082", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47082" + } + }, + "CVE-2021-47083": { + "affected_versions": "v2.6.12-rc2 to v5.16-rc7", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "pinctrl: mediatek: fix global-out-of-bounds issue", + "fixes": "2d5446da5acecf9c67db1c9d55ae2c3e5de01f8d", + "last_affected_version": "5.15.11", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\npinctrl: mediatek: fix global-out-of-bounds issue\n\nWhen eint virtual eint number is greater than gpio number,\nit maybe produce 'desc[eint_n]' size globle-out-of-bounds issue.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47083", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47083", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47083", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47083", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47083", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47083" + } + }, + "CVE-2021-47086": { + "affected_versions": "v3.3-rc1 to v5.16-rc7", + "breaks": "bdb6e697b2a76c541960b86ab8fda88f3de1adf2", + "cmt_msg": "phonet/pep: refuse to enable an unbound pipe", + "fixes": "75a2f31520095600f650597c0ac41f48b5ba0068", + "last_affected_version": "5.15.11", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nphonet/pep: refuse to enable an unbound pipe\n\nThis ioctl() implicitly assumed that the socket was already bound to\na valid local socket name, i.e. Phonet object. If the socket was not\nbound, two separate problems would occur:\n\n1) We'd send an pipe enablement request with an invalid source object.\n2) Later socket calls could BUG on the socket unexpectedly being\n connected yet not bound to a valid object.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47086", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47086", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47086", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47086", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47086", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47086" + } + }, + "CVE-2021-47087": { + "affected_versions": "v5.14-rc5 to v5.16-rc7", + "breaks": "ec185dd3ab257dc2a60953fdf1b6622f524cc5b7", + "cmt_msg": "tee: optee: Fix incorrect page free bug", + "fixes": "18549bf4b21c739a9def39f27dcac53e27286ab5", + "last_affected_version": "5.15.11", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntee: optee: Fix incorrect page free bug\n\nPointer to the allocated pages (struct page *page) has already\nprogressed towards the end of allocation. It is incorrect to perform\n__free_pages(page, order) using this pointer as we would free any\narbitrary pages. Fix this by stop modifying the page pointer.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47087", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47087", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47087", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47087", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47087", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47087" + } + }, + "CVE-2021-47088": { + "affected_versions": "v5.15-rc1 to v5.16-rc7", + "breaks": "4bc05954d0076655cfaf6f0135585bdc20cd6b11", + "cmt_msg": "mm/damon/dbgfs: protect targets destructions with kdamond_lock", + "fixes": "34796417964b8d0aef45a99cf6c2d20cebe33733", + "last_affected_version": "5.15.11", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm/damon/dbgfs: protect targets destructions with kdamond_lock\n\nDAMON debugfs interface iterates current monitoring targets in\n'dbgfs_target_ids_read()' while holding the corresponding\n'kdamond_lock'. However, it also destructs the monitoring targets in\n'dbgfs_before_terminate()' without holding the lock. This can result in\na use_after_free bug. This commit avoids the race by protecting the\ndestruction with the corresponding 'kdamond_lock'.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47088", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47088", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47088", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47088", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47088", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47088" + } + }, + "CVE-2021-47089": { + "affected_versions": "v5.12-rc1-dontuse to v5.16-rc7", + "breaks": "0ce20dd840897b12ae70869c69f1ba34d6d16965", + "cmt_msg": "kfence: fix memory leak when cat kfence objects", + "fixes": "0129ab1f268b6cf88825eae819b9b84aa0a85634", + "last_affected_version": "5.15.11", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nkfence: fix memory leak when cat kfence objects\n\nHulk robot reported a kmemleak problem:\n\n unreferenced object 0xffff93d1d8cc02e8 (size 248):\n comm \"cat\", pid 23327, jiffies 4624670141 (age 495992.217s)\n hex dump (first 32 bytes):\n 00 40 85 19 d4 93 ff ff 00 10 00 00 00 00 00 00 .@..............\n 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................\n backtrace:\n seq_open+0x2a/0x80\n full_proxy_open+0x167/0x1e0\n do_dentry_open+0x1e1/0x3a0\n path_openat+0x961/0xa20\n do_filp_open+0xae/0x120\n do_sys_openat2+0x216/0x2f0\n do_sys_open+0x57/0x80\n do_syscall_64+0x33/0x40\n entry_SYSCALL_64_after_hwframe+0x44/0xa9\n unreferenced object 0xffff93d419854000 (size 4096):\n comm \"cat\", pid 23327, jiffies 4624670141 (age 495992.217s)\n hex dump (first 32 bytes):\n 6b 66 65 6e 63 65 2d 23 32 35 30 3a 20 30 78 30 kfence-#250: 0x0\n 30 30 30 30 30 30 30 37 35 34 62 64 61 31 32 2d 0000000754bda12-\n backtrace:\n seq_read_iter+0x313/0x440\n seq_read+0x14b/0x1a0\n full_proxy_read+0x56/0x80\n vfs_read+0xa5/0x1b0\n ksys_read+0xa0/0xf0\n do_syscall_64+0x33/0x40\n entry_SYSCALL_64_after_hwframe+0x44/0xa9\n\nI find that we can easily reproduce this problem with the following\ncommands:\n\n\tcat /sys/kernel/debug/kfence/objects\n\techo scan > /sys/kernel/debug/kmemleak\n\tcat /sys/kernel/debug/kmemleak\n\nThe leaked memory is allocated in the stack below:\n\n do_syscall_64\n do_sys_open\n do_dentry_open\n full_proxy_open\n seq_open ---> alloc seq_file\n vfs_read\n full_proxy_read\n seq_read\n seq_read_iter\n traverse ---> alloc seq_buf\n\nAnd it should have been released in the following process:\n\n do_syscall_64\n syscall_exit_to_user_mode\n exit_to_user_mode_prepare\n task_work_run\n ____fput\n __fput\n full_proxy_release ---> free here\n\nHowever, the release function corresponding to file_operations is not\nimplemented in kfence. As a result, a memory leak occurs. Therefore,\nthe solution to this problem is to implement the corresponding release\nfunction.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47089", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47089", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47089", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47089", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47089", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47089" + } + }, + "CVE-2021-47090": { + "affected_versions": "v5.10-rc1 to v5.16-rc7", + "breaks": "b94e02822debdf0cc473556aad7dcc859f216653", + "cmt_msg": "mm/hwpoison: clear MF_COUNT_INCREASED before retrying get_any_page()", + "fixes": "2a57d83c78f889bf3f54eede908d0643c40d5418", + "last_affected_version": "5.15.11", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm/hwpoison: clear MF_COUNT_INCREASED before retrying get_any_page()\n\nHulk Robot reported a panic in put_page_testzero() when testing\nmadvise() with MADV_SOFT_OFFLINE. The BUG() is triggered when retrying\nget_any_page(). This is because we keep MF_COUNT_INCREASED flag in\nsecond try but the refcnt is not increased.\n\n page dumped because: VM_BUG_ON_PAGE(page_ref_count(page) == 0)\n ------------[ cut here ]------------\n kernel BUG at include/linux/mm.h:737!\n invalid opcode: 0000 [#1] PREEMPT SMP\n CPU: 5 PID: 2135 Comm: sshd Tainted: G B 5.16.0-rc6-dirty #373\n Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.13.0-1ubuntu1.1 04/01/2014\n RIP: release_pages+0x53f/0x840\n Call Trace:\n free_pages_and_swap_cache+0x64/0x80\n tlb_flush_mmu+0x6f/0x220\n unmap_page_range+0xe6c/0x12c0\n unmap_single_vma+0x90/0x170\n unmap_vmas+0xc4/0x180\n exit_mmap+0xde/0x3a0\n mmput+0xa3/0x250\n do_exit+0x564/0x1470\n do_group_exit+0x3b/0x100\n __do_sys_exit_group+0x13/0x20\n __x64_sys_exit_group+0x16/0x20\n do_syscall_64+0x34/0x80\n entry_SYSCALL_64_after_hwframe+0x44/0xae\n Modules linked in:\n ---[ end trace e99579b570fe0649 ]---\n RIP: 0010:release_pages+0x53f/0x840", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47090", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47090", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47090", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47090", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47090", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47090" + } + }, + "CVE-2021-47091": { + "affected_versions": "v5.10-rc1 to v5.16-rc7", + "breaks": "295b02c4be74bebf988593b8322369513fcecf68", + "cmt_msg": "mac80211: fix locking in ieee80211_start_ap error path", + "fixes": "87a270625a89fc841f1a7e21aae6176543d8385c", + "last_affected_version": "5.15.11", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmac80211: fix locking in ieee80211_start_ap error path\n\nWe need to hold the local->mtx to release the channel context,\nas even encoded by the lockdep_assert_held() there. Fix it.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47091", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47091", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47091", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47091", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47091", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47091" + } + }, + "CVE-2021-47092": { + "affected_versions": "v5.15-rc4 to v5.16-rc7", + "breaks": "c8607e4a086fae05efe5bffb47c5199c65e7216e", + "cmt_msg": "KVM: VMX: Always clear vmx->fail on emulation_required", + "fixes": "a80dfc025924024d2c61a4c1b8ef62b2fce76a04", + "last_affected_version": "5.15.11", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: VMX: Always clear vmx->fail on emulation_required\n\nRevert a relatively recent change that set vmx->fail if the vCPU is in L2\nand emulation_required is true, as that behavior is completely bogus.\nSetting vmx->fail and synthesizing a VM-Exit is contradictory and wrong:\n\n (a) it's impossible to have both a VM-Fail and VM-Exit\n (b) vmcs.EXIT_REASON is not modified on VM-Fail\n (c) emulation_required refers to guest state and guest state checks are\n always VM-Exits, not VM-Fails.\n\nFor KVM specifically, emulation_required is handled before nested exits\nin __vmx_handle_exit(), thus setting vmx->fail has no immediate effect,\ni.e. KVM calls into handle_invalid_guest_state() and vmx->fail is ignored.\nSetting vmx->fail can ultimately result in a WARN in nested_vmx_vmexit()\nfiring when tearing down the VM as KVM never expects vmx->fail to be set\nwhen L2 is active, KVM always reflects those errors into L1.\n\n ------------[ cut here ]------------\n WARNING: CPU: 0 PID: 21158 at arch/x86/kvm/vmx/nested.c:4548\n nested_vmx_vmexit+0x16bd/0x17e0\n arch/x86/kvm/vmx/nested.c:4547\n Modules linked in:\n CPU: 0 PID: 21158 Comm: syz-executor.1 Not tainted 5.16.0-rc3-syzkaller #0\n Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011\n RIP: 0010:nested_vmx_vmexit+0x16bd/0x17e0 arch/x86/kvm/vmx/nested.c:4547\n Code: <0f> 0b e9 2e f8 ff ff e8 57 b3 5d 00 0f 0b e9 00 f1 ff ff 89 e9 80\n Call Trace:\n vmx_leave_nested arch/x86/kvm/vmx/nested.c:6220 [inline]\n nested_vmx_free_vcpu+0x83/0xc0 arch/x86/kvm/vmx/nested.c:330\n vmx_free_vcpu+0x11f/0x2a0 arch/x86/kvm/vmx/vmx.c:6799\n kvm_arch_vcpu_destroy+0x6b/0x240 arch/x86/kvm/x86.c:10989\n kvm_vcpu_destroy+0x29/0x90 arch/x86/kvm/../../../virt/kvm/kvm_main.c:441\n kvm_free_vcpus arch/x86/kvm/x86.c:11426 [inline]\n kvm_arch_destroy_vm+0x3ef/0x6b0 arch/x86/kvm/x86.c:11545\n kvm_destroy_vm arch/x86/kvm/../../../virt/kvm/kvm_main.c:1189 [inline]\n kvm_put_kvm+0x751/0xe40 arch/x86/kvm/../../../virt/kvm/kvm_main.c:1220\n kvm_vcpu_release+0x53/0x60 arch/x86/kvm/../../../virt/kvm/kvm_main.c:3489\n __fput+0x3fc/0x870 fs/file_table.c:280\n task_work_run+0x146/0x1c0 kernel/task_work.c:164\n exit_task_work include/linux/task_work.h:32 [inline]\n do_exit+0x705/0x24f0 kernel/exit.c:832\n do_group_exit+0x168/0x2d0 kernel/exit.c:929\n get_signal+0x1740/0x2120 kernel/signal.c:2852\n arch_do_signal_or_restart+0x9c/0x730 arch/x86/kernel/signal.c:868\n handle_signal_work kernel/entry/common.c:148 [inline]\n exit_to_user_mode_loop kernel/entry/common.c:172 [inline]\n exit_to_user_mode_prepare+0x191/0x220 kernel/entry/common.c:207\n __syscall_exit_to_user_mode_work kernel/entry/common.c:289 [inline]\n syscall_exit_to_user_mode+0x2e/0x70 kernel/entry/common.c:300\n do_syscall_64+0x53/0xd0 arch/x86/entry/common.c:86\n entry_SYSCALL_64_after_hwframe+0x44/0xae", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47092", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47092", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47092", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47092", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47092", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47092" + } + }, + "CVE-2021-47093": { + "affected_versions": "v5.9 to v5.16-rc7", + "breaks": "938835aa903ae19ad62805134f79bbcf20fc3bea", + "cmt_msg": "platform/x86: intel_pmc_core: fix memleak on registration failure", + "fixes": "26a8b09437804fabfb1db080d676b96c0de68e7c", + "last_affected_version": "5.15.11", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nplatform/x86: intel_pmc_core: fix memleak on registration failure\n\nIn case device registration fails during module initialisation, the\nplatform device structure needs to be freed using platform_device_put()\nto properly free all resources (e.g. the device name).", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47093", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47093", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47093", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47093", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47093", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47093" + } + }, + "CVE-2021-47094": { + "affected_versions": "v5.10-rc1 to v5.16-rc7", + "breaks": "faaf05b00aecdb347ffd1d763d024394ec0329f8", + "cmt_msg": "KVM: x86/mmu: Don't advance iterator after restart due to yielding", + "fixes": "3a0f64de479cae75effb630a2e0a237ca0d0623c", + "last_affected_version": "5.15.11", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: x86/mmu: Don't advance iterator after restart due to yielding\n\nAfter dropping mmu_lock in the TDP MMU, restart the iterator during\ntdp_iter_next() and do not advance the iterator. Advancing the iterator\nresults in skipping the top-level SPTE and all its children, which is\nfatal if any of the skipped SPTEs were not visited before yielding.\n\nWhen zapping all SPTEs, i.e. when min_level == root_level, restarting the\niter and then invoking tdp_iter_next() is always fatal if the current gfn\nhas as a valid SPTE, as advancing the iterator results in try_step_side()\nskipping the current gfn, which wasn't visited before yielding.\n\nSprinkle WARNs on iter->yielded being true in various helpers that are\noften used in conjunction with yielding, and tag the helper with\n__must_check to reduce the probabily of improper usage.\n\nFailing to zap a top-level SPTE manifests in one of two ways. If a valid\nSPTE is skipped by both kvm_tdp_mmu_zap_all() and kvm_tdp_mmu_put_root(),\nthe shadow page will be leaked and KVM will WARN accordingly.\n\n WARNING: CPU: 1 PID: 3509 at arch/x86/kvm/mmu/tdp_mmu.c:46 [kvm]\n RIP: 0010:kvm_mmu_uninit_tdp_mmu+0x3e/0x50 [kvm]\n Call Trace:\n \n kvm_arch_destroy_vm+0x130/0x1b0 [kvm]\n kvm_destroy_vm+0x162/0x2a0 [kvm]\n kvm_vcpu_release+0x34/0x60 [kvm]\n __fput+0x82/0x240\n task_work_run+0x5c/0x90\n do_exit+0x364/0xa10\n ? futex_unqueue+0x38/0x60\n do_group_exit+0x33/0xa0\n get_signal+0x155/0x850\n arch_do_signal_or_restart+0xed/0x750\n exit_to_user_mode_prepare+0xc5/0x120\n syscall_exit_to_user_mode+0x1d/0x40\n do_syscall_64+0x48/0xc0\n entry_SYSCALL_64_after_hwframe+0x44/0xae\n\nIf kvm_tdp_mmu_zap_all() skips a gfn/SPTE but that SPTE is then zapped by\nkvm_tdp_mmu_put_root(), KVM triggers a use-after-free in the form of\nmarking a struct page as dirty/accessed after it has been put back on the\nfree list. This directly triggers a WARN due to encountering a page with\npage_count() == 0, but it can also lead to data corruption and additional\nerrors in the kernel.\n\n WARNING: CPU: 7 PID: 1995658 at arch/x86/kvm/../../../virt/kvm/kvm_main.c:171\n RIP: 0010:kvm_is_zone_device_pfn.part.0+0x9e/0xd0 [kvm]\n Call Trace:\n \n kvm_set_pfn_dirty+0x120/0x1d0 [kvm]\n __handle_changed_spte+0x92e/0xca0 [kvm]\n __handle_changed_spte+0x63c/0xca0 [kvm]\n __handle_changed_spte+0x63c/0xca0 [kvm]\n __handle_changed_spte+0x63c/0xca0 [kvm]\n zap_gfn_range+0x549/0x620 [kvm]\n kvm_tdp_mmu_put_root+0x1b6/0x270 [kvm]\n mmu_free_root_page+0x219/0x2c0 [kvm]\n kvm_mmu_free_roots+0x1b4/0x4e0 [kvm]\n kvm_mmu_unload+0x1c/0xa0 [kvm]\n kvm_arch_destroy_vm+0x1f2/0x5c0 [kvm]\n kvm_put_kvm+0x3b1/0x8b0 [kvm]\n kvm_vcpu_release+0x4e/0x70 [kvm]\n __fput+0x1f7/0x8c0\n task_work_run+0xf8/0x1a0\n do_exit+0x97b/0x2230\n do_group_exit+0xda/0x2a0\n get_signal+0x3be/0x1e50\n arch_do_signal_or_restart+0x244/0x17f0\n exit_to_user_mode_prepare+0xcb/0x120\n syscall_exit_to_user_mode+0x1d/0x40\n do_syscall_64+0x4d/0x90\n entry_SYSCALL_64_after_hwframe+0x44/0xae\n\nNote, the underlying bug existed even before commit 1af4a96025b3 (\"KVM:\nx86/mmu: Yield in TDU MMU iter even if no SPTES changed\") moved calls to\ntdp_mmu_iter_cond_resched() to the beginning of loops, as KVM could still\nincorrectly advance past a top-level entry when yielding on a lower-level\nentry. But with respect to leaking shadow pages, the bug was introduced\nby yielding before processing the current gfn.\n\nAlternatively, tdp_mmu_iter_cond_resched() could simply fall through, or\ncallers could jump to their \"retry\" label. The downside of that approach\nis that tdp_mmu_iter_cond_resched() _must_ be called before anything else\nin the loop, and there's no easy way to enfornce that requirement.\n\nIdeally, KVM would handling the cond_resched() fully within the iterator\nmacro (the code is actually quite clean) and avoid this entire class of\nbugs, but that is extremely difficult do wh\n---truncated---", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47094", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47094", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47094", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47094", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47094", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47094" + } + }, + "CVE-2021-47095": { + "affected_versions": "v5.4-rc1 to v5.16-rc7", + "breaks": "c4436c9149c5d2bc0c49ab57ec85c75ea1c4d61c", + "cmt_msg": "ipmi: ssif: initialize ssif_info->client early", + "fixes": "34f35f8f14bc406efc06ee4ff73202c6fd245d15", + "last_affected_version": "5.15.11", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipmi: ssif: initialize ssif_info->client early\n\nDuring probe ssif_info->client is dereferenced in error path. However,\nit is set when some of the error checking has already been done. This\ncauses following kernel crash if an error path is taken:\n\n[ 30.645593][ T674] ipmi_ssif 0-000e: ipmi_ssif: Not probing, Interface already present\n[ 30.657616][ T674] Unable to handle kernel NULL pointer dereference at virtual address 0000000000000088\n...\n[ 30.657723][ T674] pc : __dev_printk+0x28/0xa0\n[ 30.657732][ T674] lr : _dev_err+0x7c/0xa0\n...\n[ 30.657772][ T674] Call trace:\n[ 30.657775][ T674] __dev_printk+0x28/0xa0\n[ 30.657778][ T674] _dev_err+0x7c/0xa0\n[ 30.657781][ T674] ssif_probe+0x548/0x900 [ipmi_ssif 62ce4b08badc1458fd896206d9ef69a3c31f3d3e]\n[ 30.657791][ T674] i2c_device_probe+0x37c/0x3c0\n...\n\nInitialize ssif_info->client before any error path can be taken. Clear\ni2c_client data in the error path to prevent the dangling pointer from\nleaking.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47095", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47095", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47095", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47095", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47095", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47095" + } + }, + "CVE-2021-47096": { + "affected_versions": "v5.15-rc4 to v5.16-rc7", + "breaks": "09d23174402da0f10e98da2c61bb5ac8e7d79fdd", + "cmt_msg": "ALSA: rawmidi - fix the uninitalized user_pversion", + "fixes": "39a8fc4971a00d22536aeb7d446ee4a97810611b", + "last_affected_version": "5.15.11", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: rawmidi - fix the uninitalized user_pversion\n\nThe user_pversion was uninitialized for the user space file structure\nin the open function, because the file private structure use\nkmalloc for the allocation.\n\nThe kernel ALSA sequencer code clears the file structure, so no additional\nfixes are required.\n\nBugLink: https://github.com/alsa-project/alsa-lib/issues/178", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47096", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47096", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47096", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47096", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47096", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47096" + } + }, + "CVE-2021-47097": { + "affected_versions": "v5.11-rc1 to v5.16-rc7", + "breaks": "e4c9062717feda88900b566463228d1c4910af6d", + "cmt_msg": "Input: elantech - fix stack out of bound access in elantech_change_report_id()", + "fixes": "1d72d9f960ccf1052a0630a68c3d358791dbdaaa", + "last_affected_version": "5.15.11", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nInput: elantech - fix stack out of bound access in elantech_change_report_id()\n\nThe array param[] in elantech_change_report_id() must be at least 3\nbytes, because elantech_read_reg_params() is calling ps2_command() with\nPSMOUSE_CMD_GETINFO, that is going to access 3 bytes from param[], but\nit's defined in the stack as an array of 2 bytes, therefore we have a\npotential stack out-of-bounds access here, also confirmed by KASAN:\n\n[ 6.512374] BUG: KASAN: stack-out-of-bounds in __ps2_command+0x372/0x7e0\n[ 6.512397] Read of size 1 at addr ffff8881024d77c2 by task kworker/2:1/118\n\n[ 6.512416] CPU: 2 PID: 118 Comm: kworker/2:1 Not tainted 5.13.0-22-generic #22+arighi20211110\n[ 6.512428] Hardware name: LENOVO 20T8000QGE/20T8000QGE, BIOS R1AET32W (1.08 ) 08/14/2020\n[ 6.512436] Workqueue: events_long serio_handle_event\n[ 6.512453] Call Trace:\n[ 6.512462] show_stack+0x52/0x58\n[ 6.512474] dump_stack+0xa1/0xd3\n[ 6.512487] print_address_description.constprop.0+0x1d/0x140\n[ 6.512502] ? __ps2_command+0x372/0x7e0\n[ 6.512516] __kasan_report.cold+0x7d/0x112\n[ 6.512527] ? _raw_write_lock_irq+0x20/0xd0\n[ 6.512539] ? __ps2_command+0x372/0x7e0\n[ 6.512552] kasan_report+0x3c/0x50\n[ 6.512564] __asan_load1+0x6a/0x70\n[ 6.512575] __ps2_command+0x372/0x7e0\n[ 6.512589] ? ps2_drain+0x240/0x240\n[ 6.512601] ? dev_printk_emit+0xa2/0xd3\n[ 6.512612] ? dev_vprintk_emit+0xc5/0xc5\n[ 6.512621] ? __kasan_check_write+0x14/0x20\n[ 6.512634] ? mutex_lock+0x8f/0xe0\n[ 6.512643] ? __mutex_lock_slowpath+0x20/0x20\n[ 6.512655] ps2_command+0x52/0x90\n[ 6.512670] elantech_ps2_command+0x4f/0xc0 [psmouse]\n[ 6.512734] elantech_change_report_id+0x1e6/0x256 [psmouse]\n[ 6.512799] ? elantech_report_trackpoint.constprop.0.cold+0xd/0xd [psmouse]\n[ 6.512863] ? ps2_command+0x7f/0x90\n[ 6.512877] elantech_query_info.cold+0x6bd/0x9ed [psmouse]\n[ 6.512943] ? elantech_setup_ps2+0x460/0x460 [psmouse]\n[ 6.513005] ? psmouse_reset+0x69/0xb0 [psmouse]\n[ 6.513064] ? psmouse_attr_set_helper+0x2a0/0x2a0 [psmouse]\n[ 6.513122] ? phys_pmd_init+0x30e/0x521\n[ 6.513137] elantech_init+0x8a/0x200 [psmouse]\n[ 6.513200] ? elantech_init_ps2+0xf0/0xf0 [psmouse]\n[ 6.513249] ? elantech_query_info+0x440/0x440 [psmouse]\n[ 6.513296] ? synaptics_send_cmd+0x60/0x60 [psmouse]\n[ 6.513342] ? elantech_query_info+0x440/0x440 [psmouse]\n[ 6.513388] ? psmouse_try_protocol+0x11e/0x170 [psmouse]\n[ 6.513432] psmouse_extensions+0x65d/0x6e0 [psmouse]\n[ 6.513476] ? psmouse_try_protocol+0x170/0x170 [psmouse]\n[ 6.513519] ? mutex_unlock+0x22/0x40\n[ 6.513526] ? ps2_command+0x7f/0x90\n[ 6.513536] ? psmouse_probe+0xa3/0xf0 [psmouse]\n[ 6.513580] psmouse_switch_protocol+0x27d/0x2e0 [psmouse]\n[ 6.513624] psmouse_connect+0x272/0x530 [psmouse]\n[ 6.513669] serio_driver_probe+0x55/0x70\n[ 6.513679] really_probe+0x190/0x720\n[ 6.513689] driver_probe_device+0x160/0x1f0\n[ 6.513697] device_driver_attach+0x119/0x130\n[ 6.513705] ? device_driver_attach+0x130/0x130\n[ 6.513713] __driver_attach+0xe7/0x1a0\n[ 6.513720] ? device_driver_attach+0x130/0x130\n[ 6.513728] bus_for_each_dev+0xfb/0x150\n[ 6.513738] ? subsys_dev_iter_exit+0x10/0x10\n[ 6.513748] ? _raw_write_unlock_bh+0x30/0x30\n[ 6.513757] driver_attach+0x2d/0x40\n[ 6.513764] serio_handle_event+0x199/0x3d0\n[ 6.513775] process_one_work+0x471/0x740\n[ 6.513785] worker_thread+0x2d2/0x790\n[ 6.513794] ? process_one_work+0x740/0x740\n[ 6.513802] kthread+0x1b4/0x1e0\n[ 6.513809] ? set_kthread_struct+0x80/0x80\n[ 6.513816] ret_from_fork+0x22/0x30\n\n[ 6.513832] The buggy address belongs to the page:\n[ 6.513838] page:00000000bc35e189 refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024d7\n[ 6.513847] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff)\n[ 6.513860] raw: 0\n---truncated---", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47097", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47097", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47097", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47097", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47097", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47097" + } + }, + "CVE-2021-47098": { + "affected_versions": "v5.14-rc1 to v5.16-rc7", + "breaks": "b50aa49638c7e12abf4ecc483f4e928c5cccc1b0", + "cmt_msg": "hwmon: (lm90) Prevent integer overflow/underflow in hysteresis calculations", + "fixes": "55840b9eae5367b5d5b29619dc2fb7e4596dba46", + "last_affected_version": "5.15.11", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nhwmon: (lm90) Prevent integer overflow/underflow in hysteresis calculations\n\nCommit b50aa49638c7 (\"hwmon: (lm90) Prevent integer underflows of\ntemperature calculations\") addressed a number of underflow situations\nwhen writing temperature limits. However, it missed one situation, seen\nwhen an attempt is made to set the hysteresis value to MAX_LONG and the\ncritical temperature limit is negative.\n\nUse clamp_val() when setting the hysteresis temperature to ensure that\nthe provided value can never overflow or underflow.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47098", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47098", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47098", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47098", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47098", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47098" + } + }, + "CVE-2021-47099": { + "affected_versions": "v5.13-rc1 to v5.16-rc7", + "breaks": "d3256efd8e8b234a6251e4d4580bd2c3c31fdc4c", + "cmt_msg": "veth: ensure skb entering GRO are not cloned.", + "fixes": "9695b7de5b4760ed22132aca919570c0190cb0ce", + "last_affected_version": "5.15.11", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nveth: ensure skb entering GRO are not cloned.\n\nAfter commit d3256efd8e8b (\"veth: allow enabling NAPI even without XDP\"),\nif GRO is enabled on a veth device and TSO is disabled on the peer\ndevice, TCP skbs will go through the NAPI callback. If there is no XDP\nprogram attached, the veth code does not perform any share check, and\nshared/cloned skbs could enter the GRO engine.\n\nIgnat reported a BUG triggered later-on due to the above condition:\n\n[ 53.970529][ C1] kernel BUG at net/core/skbuff.c:3574!\n[ 53.981755][ C1] invalid opcode: 0000 [#1] PREEMPT SMP KASAN PTI\n[ 53.982634][ C1] CPU: 1 PID: 19 Comm: ksoftirqd/1 Not tainted 5.16.0-rc5+ #25\n[ 53.982634][ C1] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 0.0.0 02/06/2015\n[ 53.982634][ C1] RIP: 0010:skb_shift+0x13ef/0x23b0\n[ 53.982634][ C1] Code: ea 03 0f b6 04 02 48 89 fa 83 e2 07 38 d0\n7f 08 84 c0 0f 85 41 0c 00 00 41 80 7f 02 00 4d 8d b5 d0 00 00 00 0f\n85 74 f5 ff ff <0f> 0b 4d 8d 77 20 be 04 00 00 00 4c 89 44 24 78 4c 89\nf7 4c 89 8c\n[ 53.982634][ C1] RSP: 0018:ffff8881008f7008 EFLAGS: 00010246\n[ 53.982634][ C1] RAX: 0000000000000000 RBX: ffff8881180b4c80 RCX: 0000000000000000\n[ 53.982634][ C1] RDX: 0000000000000002 RSI: ffff8881180b4d3c RDI: ffff88810bc9cac2\n[ 53.982634][ C1] RBP: ffff8881008f70b8 R08: ffff8881180b4cf4 R09: ffff8881180b4cf0\n[ 53.982634][ C1] R10: ffffed1022999e5c R11: 0000000000000002 R12: 0000000000000590\n[ 53.982634][ C1] R13: ffff88810f940c80 R14: ffff88810f940d50 R15: ffff88810bc9cac0\n[ 53.982634][ C1] FS: 0000000000000000(0000) GS:ffff888235880000(0000) knlGS:0000000000000000\n[ 53.982634][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 53.982634][ C1] CR2: 00007ff5f9b86680 CR3: 0000000108ce8004 CR4: 0000000000170ee0\n[ 53.982634][ C1] Call Trace:\n[ 53.982634][ C1] \n[ 53.982634][ C1] tcp_sacktag_walk+0xaba/0x18e0\n[ 53.982634][ C1] tcp_sacktag_write_queue+0xe7b/0x3460\n[ 53.982634][ C1] tcp_ack+0x2666/0x54b0\n[ 53.982634][ C1] tcp_rcv_established+0x4d9/0x20f0\n[ 53.982634][ C1] tcp_v4_do_rcv+0x551/0x810\n[ 53.982634][ C1] tcp_v4_rcv+0x22ed/0x2ed0\n[ 53.982634][ C1] ip_protocol_deliver_rcu+0x96/0xaf0\n[ 53.982634][ C1] ip_local_deliver_finish+0x1e0/0x2f0\n[ 53.982634][ C1] ip_sublist_rcv_finish+0x211/0x440\n[ 53.982634][ C1] ip_list_rcv_finish.constprop.0+0x424/0x660\n[ 53.982634][ C1] ip_list_rcv+0x2c8/0x410\n[ 53.982634][ C1] __netif_receive_skb_list_core+0x65c/0x910\n[ 53.982634][ C1] netif_receive_skb_list_internal+0x5f9/0xcb0\n[ 53.982634][ C1] napi_complete_done+0x188/0x6e0\n[ 53.982634][ C1] gro_cell_poll+0x10c/0x1d0\n[ 53.982634][ C1] __napi_poll+0xa1/0x530\n[ 53.982634][ C1] net_rx_action+0x567/0x1270\n[ 53.982634][ C1] __do_softirq+0x28a/0x9ba\n[ 53.982634][ C1] run_ksoftirqd+0x32/0x60\n[ 53.982634][ C1] smpboot_thread_fn+0x559/0x8c0\n[ 53.982634][ C1] kthread+0x3b9/0x490\n[ 53.982634][ C1] ret_from_fork+0x22/0x30\n[ 53.982634][ C1] \n\nAddress the issue by skipping the GRO stage for shared or cloned skbs.\nTo reduce the chance of OoO, try to unclone the skbs before giving up.\n\nv1 -> v2:\n - use avoid skb_copy and fallback to netif_receive_skb - Eric", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47099", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47099", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47099", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47099", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47099", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47099" + } + }, + "CVE-2021-47100": { + "affected_versions": "v4.15-rc1 to v5.16-rc7", + "breaks": "b2cfd8ab4add53c2070367bfee2f5b738f51698d", + "cmt_msg": "ipmi: Fix UAF when uninstall ipmi_si and ipmi_msghandler module", + "fixes": "ffb76a86f8096a8206be03b14adda6092e18e275", + "last_affected_version": "5.15.11", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipmi: Fix UAF when uninstall ipmi_si and ipmi_msghandler module\n\nHi,\n\nWhen testing install and uninstall of ipmi_si.ko and ipmi_msghandler.ko,\nthe system crashed.\n\nThe log as follows:\n[ 141.087026] BUG: unable to handle kernel paging request at ffffffffc09b3a5a\n[ 141.087241] PGD 8fe4c0d067 P4D 8fe4c0d067 PUD 8fe4c0f067 PMD 103ad89067 PTE 0\n[ 141.087464] Oops: 0010 [#1] SMP NOPTI\n[ 141.087580] CPU: 67 PID: 668 Comm: kworker/67:1 Kdump: loaded Not tainted 4.18.0.x86_64 #47\n[ 141.088009] Workqueue: events 0xffffffffc09b3a40\n[ 141.088009] RIP: 0010:0xffffffffc09b3a5a\n[ 141.088009] Code: Bad RIP value.\n[ 141.088009] RSP: 0018:ffffb9094e2c3e88 EFLAGS: 00010246\n[ 141.088009] RAX: 0000000000000000 RBX: ffff9abfdb1f04a0 RCX: 0000000000000000\n[ 141.088009] RDX: 0000000000000000 RSI: 0000000000000246 RDI: 0000000000000246\n[ 141.088009] RBP: 0000000000000000 R08: ffff9abfffee3cb8 R09: 00000000000002e1\n[ 141.088009] R10: ffffb9094cb73d90 R11: 00000000000f4240 R12: ffff9abfffee8700\n[ 141.088009] R13: 0000000000000000 R14: ffff9abfdb1f04a0 R15: ffff9abfdb1f04a8\n[ 141.088009] FS: 0000000000000000(0000) GS:ffff9abfffec0000(0000) knlGS:0000000000000000\n[ 141.088009] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 141.088009] CR2: ffffffffc09b3a30 CR3: 0000008fe4c0a001 CR4: 00000000007606e0\n[ 141.088009] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n[ 141.088009] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n[ 141.088009] PKRU: 55555554\n[ 141.088009] Call Trace:\n[ 141.088009] ? process_one_work+0x195/0x390\n[ 141.088009] ? worker_thread+0x30/0x390\n[ 141.088009] ? process_one_work+0x390/0x390\n[ 141.088009] ? kthread+0x10d/0x130\n[ 141.088009] ? kthread_flush_work_fn+0x10/0x10\n[ 141.088009] ? ret_from_fork+0x35/0x40] BUG: unable to handle kernel paging request at ffffffffc0b28a5a\n[ 200.223240] PGD 97fe00d067 P4D 97fe00d067 PUD 97fe00f067 PMD a580cbf067 PTE 0\n[ 200.223464] Oops: 0010 [#1] SMP NOPTI\n[ 200.223579] CPU: 63 PID: 664 Comm: kworker/63:1 Kdump: loaded Not tainted 4.18.0.x86_64 #46\n[ 200.224008] Workqueue: events 0xffffffffc0b28a40\n[ 200.224008] RIP: 0010:0xffffffffc0b28a5a\n[ 200.224008] Code: Bad RIP value.\n[ 200.224008] RSP: 0018:ffffbf3c8e2a3e88 EFLAGS: 00010246\n[ 200.224008] RAX: 0000000000000000 RBX: ffffa0799ad6bca0 RCX: 0000000000000000\n[ 200.224008] RDX: 0000000000000000 RSI: 0000000000000246 RDI: 0000000000000246\n[ 200.224008] RBP: 0000000000000000 R08: ffff9fe43fde3cb8 R09: 00000000000000d5\n[ 200.224008] R10: ffffbf3c8cb53d90 R11: 00000000000f4240 R12: ffff9fe43fde8700\n[ 200.224008] R13: 0000000000000000 R14: ffffa0799ad6bca0 R15: ffffa0799ad6bca8\n[ 200.224008] FS: 0000000000000000(0000) GS:ffff9fe43fdc0000(0000) knlGS:0000000000000000\n[ 200.224008] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 200.224008] CR2: ffffffffc0b28a30 CR3: 00000097fe00a002 CR4: 00000000007606e0\n[ 200.224008] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n[ 200.224008] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n[ 200.224008] PKRU: 55555554\n[ 200.224008] Call Trace:\n[ 200.224008] ? process_one_work+0x195/0x390\n[ 200.224008] ? worker_thread+0x30/0x390\n[ 200.224008] ? process_one_work+0x390/0x390\n[ 200.224008] ? kthread+0x10d/0x130\n[ 200.224008] ? kthread_flush_work_fn+0x10/0x10\n[ 200.224008] ? ret_from_fork+0x35/0x40\n[ 200.224008] kernel fault(0x1) notification starting on CPU 63\n[ 200.224008] kernel fault(0x1) notification finished on CPU 63\n[ 200.224008] CR2: ffffffffc0b28a5a\n[ 200.224008] ---[ end trace c82a412d93f57412 ]---\n\nThe reason is as follows:\nT1: rmmod ipmi_si.\n ->ipmi_unregister_smi()\n -> ipmi_bmc_unregister()\n -> __ipmi_bmc_unregister()\n -> kref_put(&bmc->usecount, cleanup_bmc_device);\n -> schedule_work(&bmc->remove_work);\n\nT2: rmmod ipmi_msghandl\n---truncated---", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47100", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47100", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47100", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47100", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47100", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47100" + } + }, + "CVE-2021-47101": { + "affected_versions": "unk to v5.16-rc7", + "breaks": "", + "cmt_msg": "asix: fix uninit-value in asix_mdio_read()", + "fixes": "8035b1a2a37a29d8c717ef84fca8fe7278bc9f03", + "last_affected_version": "5.15.11", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nasix: fix uninit-value in asix_mdio_read()\n\nasix_read_cmd() may read less than sizeof(smsr) bytes and in this case\nsmsr will be uninitialized.\n\nFail log:\nBUG: KMSAN: uninit-value in asix_check_host_enable drivers/net/usb/asix_common.c:82 [inline]\nBUG: KMSAN: uninit-value in asix_check_host_enable drivers/net/usb/asix_common.c:82 [inline] drivers/net/usb/asix_common.c:497\nBUG: KMSAN: uninit-value in asix_mdio_read+0x3c1/0xb00 drivers/net/usb/asix_common.c:497 drivers/net/usb/asix_common.c:497\n asix_check_host_enable drivers/net/usb/asix_common.c:82 [inline]\n asix_check_host_enable drivers/net/usb/asix_common.c:82 [inline] drivers/net/usb/asix_common.c:497\n asix_mdio_read+0x3c1/0xb00 drivers/net/usb/asix_common.c:497 drivers/net/usb/asix_common.c:497", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47101", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47101", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47101", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47101", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47101", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47101" + } + }, + "CVE-2021-47102": { + "affected_versions": "v5.14-rc1 to v5.16-rc7", + "breaks": "3d5048cc54bd250cfbb358c37fcc011135977887", + "cmt_msg": "net: marvell: prestera: fix incorrect structure access", + "fixes": "2efc2256febf214e7b2bdaa21fe6c3c3146acdcb", + "last_affected_version": "5.15.11", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: marvell: prestera: fix incorrect structure access\n\nIn line:\n\tupper = info->upper_dev;\nWe access upper_dev field, which is related only for particular events\n(e.g. event == NETDEV_CHANGEUPPER). So, this line cause invalid memory\naccess for another events,\nwhen ptr is not netdev_notifier_changeupper_info.\n\nThe KASAN logs are as follows:\n\n[ 30.123165] BUG: KASAN: stack-out-of-bounds in prestera_netdev_port_event.constprop.0+0x68/0x538 [prestera]\n[ 30.133336] Read of size 8 at addr ffff80000cf772b0 by task udevd/778\n[ 30.139866]\n[ 30.141398] CPU: 0 PID: 778 Comm: udevd Not tainted 5.16.0-rc3 #6\n[ 30.147588] Hardware name: DNI AmazonGo1 A7040 board (DT)\n[ 30.153056] Call trace:\n[ 30.155547] dump_backtrace+0x0/0x2c0\n[ 30.159320] show_stack+0x18/0x30\n[ 30.162729] dump_stack_lvl+0x68/0x84\n[ 30.166491] print_address_description.constprop.0+0x74/0x2b8\n[ 30.172346] kasan_report+0x1e8/0x250\n[ 30.176102] __asan_load8+0x98/0xe0\n[ 30.179682] prestera_netdev_port_event.constprop.0+0x68/0x538 [prestera]\n[ 30.186847] prestera_netdev_event_handler+0x1b4/0x1c0 [prestera]\n[ 30.193313] raw_notifier_call_chain+0x74/0xa0\n[ 30.197860] call_netdevice_notifiers_info+0x68/0xc0\n[ 30.202924] register_netdevice+0x3cc/0x760\n[ 30.207190] register_netdev+0x24/0x50\n[ 30.211015] prestera_device_register+0x8a0/0xba0 [prestera]", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47102", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47102", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47102", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47102", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47102", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47102" + } + }, + "CVE-2021-47103": { + "affected_versions": "unk to v5.16-rc7", + "breaks": "", + "cmt_msg": "inet: fully convert sk->sk_rx_dst to RCU rules", + "fixes": "8f905c0e7354ef261360fb7535ea079b1082c105", + "last_affected_version": "5.15.11", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\ninet: fully convert sk->sk_rx_dst to RCU rules\n\nsyzbot reported various issues around early demux,\none being included in this changelog [1]\n\nsk->sk_rx_dst is using RCU protection without clearly\ndocumenting it.\n\nAnd following sequences in tcp_v4_do_rcv()/tcp_v6_do_rcv()\nare not following standard RCU rules.\n\n[a] dst_release(dst);\n[b] sk->sk_rx_dst = NULL;\n\nThey look wrong because a delete operation of RCU protected\npointer is supposed to clear the pointer before\nthe call_rcu()/synchronize_rcu() guarding actual memory freeing.\n\nIn some cases indeed, dst could be freed before [b] is done.\n\nWe could cheat by clearing sk_rx_dst before calling\ndst_release(), but this seems the right time to stick\nto standard RCU annotations and debugging facilities.\n\n[1]\nBUG: KASAN: use-after-free in dst_check include/net/dst.h:470 [inline]\nBUG: KASAN: use-after-free in tcp_v4_early_demux+0x95b/0x960 net/ipv4/tcp_ipv4.c:1792\nRead of size 2 at addr ffff88807f1cb73a by task syz-executor.5/9204\n\nCPU: 0 PID: 9204 Comm: syz-executor.5 Not tainted 5.16.0-rc5-syzkaller #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011\nCall Trace:\n \n __dump_stack lib/dump_stack.c:88 [inline]\n dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106\n print_address_description.constprop.0.cold+0x8d/0x320 mm/kasan/report.c:247\n __kasan_report mm/kasan/report.c:433 [inline]\n kasan_report.cold+0x83/0xdf mm/kasan/report.c:450\n dst_check include/net/dst.h:470 [inline]\n tcp_v4_early_demux+0x95b/0x960 net/ipv4/tcp_ipv4.c:1792\n ip_rcv_finish_core.constprop.0+0x15de/0x1e80 net/ipv4/ip_input.c:340\n ip_list_rcv_finish.constprop.0+0x1b2/0x6e0 net/ipv4/ip_input.c:583\n ip_sublist_rcv net/ipv4/ip_input.c:609 [inline]\n ip_list_rcv+0x34e/0x490 net/ipv4/ip_input.c:644\n __netif_receive_skb_list_ptype net/core/dev.c:5508 [inline]\n __netif_receive_skb_list_core+0x549/0x8e0 net/core/dev.c:5556\n __netif_receive_skb_list net/core/dev.c:5608 [inline]\n netif_receive_skb_list_internal+0x75e/0xd80 net/core/dev.c:5699\n gro_normal_list net/core/dev.c:5853 [inline]\n gro_normal_list net/core/dev.c:5849 [inline]\n napi_complete_done+0x1f1/0x880 net/core/dev.c:6590\n virtqueue_napi_complete drivers/net/virtio_net.c:339 [inline]\n virtnet_poll+0xca2/0x11b0 drivers/net/virtio_net.c:1557\n __napi_poll+0xaf/0x440 net/core/dev.c:7023\n napi_poll net/core/dev.c:7090 [inline]\n net_rx_action+0x801/0xb40 net/core/dev.c:7177\n __do_softirq+0x29b/0x9c2 kernel/softirq.c:558\n invoke_softirq kernel/softirq.c:432 [inline]\n __irq_exit_rcu+0x123/0x180 kernel/softirq.c:637\n irq_exit_rcu+0x5/0x20 kernel/softirq.c:649\n common_interrupt+0x52/0xc0 arch/x86/kernel/irq.c:240\n asm_common_interrupt+0x1e/0x40 arch/x86/include/asm/idtentry.h:629\nRIP: 0033:0x7f5e972bfd57\nCode: 39 d1 73 14 0f 1f 80 00 00 00 00 48 8b 50 f8 48 83 e8 08 48 39 ca 77 f3 48 39 c3 73 3e 48 89 13 48 8b 50 f8 48 89 38 49 8b 0e <48> 8b 3e 48 83 c3 08 48 83 c6 08 eb bc 48 39 d1 72 9e 48 39 d0 73\nRSP: 002b:00007fff8a413210 EFLAGS: 00000283\nRAX: 00007f5e97108990 RBX: 00007f5e97108338 RCX: ffffffff81d3aa45\nRDX: ffffffff81d3aa45 RSI: 00007f5e97108340 RDI: ffffffff81d3aa45\nRBP: 00007f5e97107eb8 R08: 00007f5e97108d88 R09: 0000000093c2e8d9\nR10: 0000000000000000 R11: 0000000000000000 R12: 00007f5e97107eb0\nR13: 00007f5e97108338 R14: 00007f5e97107ea8 R15: 0000000000000019\n \n\nAllocated by task 13:\n kasan_save_stack+0x1e/0x50 mm/kasan/common.c:38\n kasan_set_track mm/kasan/common.c:46 [inline]\n set_alloc_info mm/kasan/common.c:434 [inline]\n __kasan_slab_alloc+0x90/0xc0 mm/kasan/common.c:467\n kasan_slab_alloc include/linux/kasan.h:259 [inline]\n slab_post_alloc_hook mm/slab.h:519 [inline]\n slab_alloc_node mm/slub.c:3234 [inline]\n slab_alloc mm/slub.c:3242 [inline]\n kmem_cache_alloc+0x202/0x3a0 mm/slub.c:3247\n dst_alloc+0x146/0x1f0 net/core/dst.c:92\n rt_dst_alloc+0x73/0x430 net/ipv4/route.c:1613\n ip_route_input_slow+0x1817/0x3a20 net/ipv4/route.c:234\n---truncated---", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47103", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47103", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47103", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47103", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47103", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47103" + } + }, + "CVE-2021-47104": { + "affected_versions": "v5.15 to v5.16-rc7", + "breaks": "d39bf40e55e666b5905fdbd46a0dced030ce87be", + "cmt_msg": "IB/qib: Fix memory leak in qib_user_sdma_queue_pkts()", + "fixes": "bee90911e0138c76ee67458ac0d58b38a3190f65", + "last_affected_version": "5.15.11", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nIB/qib: Fix memory leak in qib_user_sdma_queue_pkts()\n\nThe wrong goto label was used for the error case and missed cleanup of the\npkt allocation.\n\nAddresses-Coverity-ID: 1493352 (\"Resource leak\")", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47104", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47104", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47104", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47104", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47104", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47104" + } + }, + "CVE-2021-47105": { + "affected_versions": "v5.5-rc1 to v5.16-rc7", + "breaks": "2d4238f5569722197612656163d824098208519c", + "cmt_msg": "ice: xsk: return xsk buffers back to pool when cleaning the ring", + "fixes": "afe8a3ba85ec2a6b6849367e25c06a2f8e0ddd05", + "last_affected_version": "5.15.11", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nice: xsk: return xsk buffers back to pool when cleaning the ring\n\nCurrently we only NULL the xdp_buff pointer in the internal SW ring but\nwe never give it back to the xsk buffer pool. This means that buffers\ncan be leaked out of the buff pool and never be used again.\n\nAdd missing xsk_buff_free() call to the routine that is supposed to\nclean the entries that are left in the ring so that these buffers in the\numem can be used by other sockets.\n\nAlso, only go through the space that is actually left to be cleaned\ninstead of a whole ring.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47105", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47105", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47105", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47105", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47105", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47105" + } + }, + "CVE-2021-47106": { + "affected_versions": "v5.13-rc1 to v5.16-rc7", + "breaks": "aaa31047a6d25da0fa101da1ed544e1247949b40", + "cmt_msg": "netfilter: nf_tables: fix use-after-free in nft_set_catchall_destroy()", + "fixes": "0f7d9b31ce7abdbb29bf018131ac920c9f698518", + "last_affected_version": "5.15.11", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_tables: fix use-after-free in nft_set_catchall_destroy()\n\nWe need to use list_for_each_entry_safe() iterator\nbecause we can not access @catchall after kfree_rcu() call.\n\nsyzbot reported:\n\nBUG: KASAN: use-after-free in nft_set_catchall_destroy net/netfilter/nf_tables_api.c:4486 [inline]\nBUG: KASAN: use-after-free in nft_set_destroy net/netfilter/nf_tables_api.c:4504 [inline]\nBUG: KASAN: use-after-free in nft_set_destroy+0x3fd/0x4f0 net/netfilter/nf_tables_api.c:4493\nRead of size 8 at addr ffff8880716e5b80 by task syz-executor.3/8871\n\nCPU: 1 PID: 8871 Comm: syz-executor.3 Not tainted 5.16.0-rc5-syzkaller #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011\nCall Trace:\n \n __dump_stack lib/dump_stack.c:88 [inline]\n dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106\n print_address_description.constprop.0.cold+0x8d/0x2ed mm/kasan/report.c:247\n __kasan_report mm/kasan/report.c:433 [inline]\n kasan_report.cold+0x83/0xdf mm/kasan/report.c:450\n nft_set_catchall_destroy net/netfilter/nf_tables_api.c:4486 [inline]\n nft_set_destroy net/netfilter/nf_tables_api.c:4504 [inline]\n nft_set_destroy+0x3fd/0x4f0 net/netfilter/nf_tables_api.c:4493\n __nft_release_table+0x79f/0xcd0 net/netfilter/nf_tables_api.c:9626\n nft_rcv_nl_event+0x4f8/0x670 net/netfilter/nf_tables_api.c:9688\n notifier_call_chain+0xb5/0x200 kernel/notifier.c:83\n blocking_notifier_call_chain kernel/notifier.c:318 [inline]\n blocking_notifier_call_chain+0x67/0x90 kernel/notifier.c:306\n netlink_release+0xcb6/0x1dd0 net/netlink/af_netlink.c:788\n __sock_release+0xcd/0x280 net/socket.c:649\n sock_close+0x18/0x20 net/socket.c:1314\n __fput+0x286/0x9f0 fs/file_table.c:280\n task_work_run+0xdd/0x1a0 kernel/task_work.c:164\n tracehook_notify_resume include/linux/tracehook.h:189 [inline]\n exit_to_user_mode_loop kernel/entry/common.c:175 [inline]\n exit_to_user_mode_prepare+0x27e/0x290 kernel/entry/common.c:207\n __syscall_exit_to_user_mode_work kernel/entry/common.c:289 [inline]\n syscall_exit_to_user_mode+0x19/0x60 kernel/entry/common.c:300\n do_syscall_64+0x42/0xb0 arch/x86/entry/common.c:86\n entry_SYSCALL_64_after_hwframe+0x44/0xae\nRIP: 0033:0x7f75fbf28adb\nCode: 0f 05 48 3d 00 f0 ff ff 77 45 c3 0f 1f 40 00 48 83 ec 18 89 7c 24 0c e8 63 fc ff ff 8b 7c 24 0c 41 89 c0 b8 03 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 35 44 89 c7 89 44 24 0c e8 a1 fc ff ff 8b 44\nRSP: 002b:00007ffd8da7ec10 EFLAGS: 00000293 ORIG_RAX: 0000000000000003\nRAX: 0000000000000000 RBX: 0000000000000004 RCX: 00007f75fbf28adb\nRDX: 00007f75fc08e828 RSI: ffffffffffffffff RDI: 0000000000000003\nRBP: 00007f75fc08a960 R08: 0000000000000000 R09: 00007f75fc08e830\nR10: 00007ffd8da7ed10 R11: 0000000000000293 R12: 00000000002067c3\nR13: 00007ffd8da7ed10 R14: 00007f75fc088f60 R15: 0000000000000032\n \n\nAllocated by task 8886:\n kasan_save_stack+0x1e/0x50 mm/kasan/common.c:38\n kasan_set_track mm/kasan/common.c:46 [inline]\n set_alloc_info mm/kasan/common.c:434 [inline]\n ____kasan_kmalloc mm/kasan/common.c:513 [inline]\n ____kasan_kmalloc mm/kasan/common.c:472 [inline]\n __kasan_kmalloc+0xa6/0xd0 mm/kasan/common.c:522\n kasan_kmalloc include/linux/kasan.h:269 [inline]\n kmem_cache_alloc_trace+0x1ea/0x4a0 mm/slab.c:3575\n kmalloc include/linux/slab.h:590 [inline]\n nft_setelem_catchall_insert net/netfilter/nf_tables_api.c:5544 [inline]\n nft_setelem_insert net/netfilter/nf_tables_api.c:5562 [inline]\n nft_add_set_elem+0x232e/0x2f40 net/netfilter/nf_tables_api.c:5936\n nf_tables_newsetelem+0x6ff/0xbb0 net/netfilter/nf_tables_api.c:6032\n nfnetlink_rcv_batch+0x1710/0x25f0 net/netfilter/nfnetlink.c:513\n nfnetlink_rcv_skb_batch net/netfilter/nfnetlink.c:634 [inline]\n nfnetlink_rcv+0x3af/0x420 net/netfilter/nfnetlink.c:652\n netlink_unicast_kernel net/netlink/af_netlink.c:1319 [inline]\n netlink_unicast+0x533/0x7d0 net/netlink/af_netlink.c:1345\n netlink_sendmsg+0x904/0xdf0 net/netlink/af_netlink.c:1921\n sock_sendmsg_nosec net/\n---truncated---", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47106", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47106", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47106", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47106", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47106", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47106" + } + }, + "CVE-2021-47107": { + "affected_versions": "v5.13-rc1 to v5.16-rc7", + "breaks": "f5dcccd647da513a89f3b6ca392b0c1eb050b9fc", + "cmt_msg": "NFSD: Fix READDIR buffer overflow", + "fixes": "53b1119a6e5028b125f431a0116ba73510d82a72", + "last_affected_version": "5.15.11", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nNFSD: Fix READDIR buffer overflow\n\nIf a client sends a READDIR count argument that is too small (say,\nzero), then the buffer size calculation in the new init_dirlist\nhelper functions results in an underflow, allowing the XDR stream\nfunctions to write beyond the actual buffer.\n\nThis calculation has always been suspect. NFSD has never sanity-\nchecked the READDIR count argument, but the old entry encoders\nmanaged the problem correctly.\n\nWith the commits below, entry encoding changed, exposing the\nunderflow to the pointer arithmetic in xdr_reserve_space().\n\nModern NFS clients attempt to retrieve as much data as possible\nfor each READDIR request. Also, we have no unit tests that\nexercise the behavior of READDIR at the lower bound of @count\nvalues. Thus this case was missed during testing.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47107", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47107", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47107", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47107", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47107", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47107" + } + }, + "CVE-2021-47108": { + "affected_versions": "v5.14-rc1 to v5.16-rc7", + "breaks": "41ca9caaae0bfc959b22dbcd59d88a7107707e17", + "cmt_msg": "drm/mediatek: hdmi: Perform NULL pointer check for mtk_hdmi_conf", + "fixes": "3b8e19a0aa3933a785be9f1541afd8d398c4ec69", + "last_affected_version": "5.15.11", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/mediatek: hdmi: Perform NULL pointer check for mtk_hdmi_conf\n\nIn commit 41ca9caaae0b\n(\"drm/mediatek: hdmi: Add check for CEA modes only\") a check\nfor CEA modes was added to function mtk_hdmi_bridge_mode_valid()\nin order to address possible issues on MT8167;\nmoreover, with commit c91026a938c2\n(\"drm/mediatek: hdmi: Add optional limit on maximal HDMI mode clock\")\nanother similar check was introduced.\n\nUnfortunately though, at the time of writing, MT8173 does not provide\nany mtk_hdmi_conf structure and this is crashing the kernel with NULL\npointer upon entering mtk_hdmi_bridge_mode_valid(), which happens as\nsoon as a HDMI cable gets plugged in.\n\nTo fix this regression, add a NULL pointer check for hdmi->conf in the\nsaid function, restoring HDMI functionality and avoiding NULL pointer\nkernel panics.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47108", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47108", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47108", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47108", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47108", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47108" + } + }, + "CVE-2021-47109": { + "affected_versions": "v5.0-rc1 to v5.13-rc7", + "breaks": "58956317c8de52009d1a38a721474c24aef74fe7", + "cmt_msg": "neighbour: allow NUD_NOARP entries to be forced GCed", + "fixes": "7a6b1ab7475fd6478eeaf5c9d1163e7a18125c8f", + "last_affected_version": "5.12.9", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nneighbour: allow NUD_NOARP entries to be forced GCed\n\nIFF_POINTOPOINT interfaces use NUD_NOARP entries for IPv6. It's possible to\nfill up the neighbour table with enough entries that it will overflow for\nvalid connections after that.\n\nThis behaviour is more prevalent after commit 58956317c8de (\"neighbor:\nImprove garbage collection\") is applied, as it prevents removal from\nentries that are not NUD_FAILED, unless they are more than 5s old.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47109", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47109", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47109", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47109", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47109", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47109" + } + }, + "CVE-2021-47110": { + "affected_versions": "v2.6.12-rc2 to v5.13-rc2", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "x86/kvm: Disable kvmclock on all CPUs on shutdown", + "fixes": "c02027b5742b5aa804ef08a4a9db433295533046", + "last_affected_version": "5.12.9", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nx86/kvm: Disable kvmclock on all CPUs on shutdown\n\nCurrenly, we disable kvmclock from machine_shutdown() hook and this\nonly happens for boot CPU. We need to disable it for all CPUs to\nguard against memory corruption e.g. on restore from hibernate.\n\nNote, writing '0' to kvmclock MSR doesn't clear memory location, it\njust prevents hypervisor from updating the location so for the short\nwhile after write and while CPU is still alive, the clock remains usable\nand correct so we don't need to switch to some other clocksource.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47110", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47110", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47110", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47110", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47110", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47110" + } + }, + "CVE-2021-47111": { + "affected_versions": "v5.5-rc1 to v5.13-rc6", + "breaks": "2ac061ce97f413bfbbdd768f7d2e0fda2e8170df", + "cmt_msg": "xen-netback: take a reference to the RX task thread", + "fixes": "107866a8eb0b664675a260f1ba0655010fac1e08", + "last_affected_version": "5.12.9", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nxen-netback: take a reference to the RX task thread\n\nDo this in order to prevent the task from being freed if the thread\nreturns (which can be triggered by the frontend) before the call to\nkthread_stop done as part of the backend tear down. Not taking the\nreference will lead to a use-after-free in that scenario. Such\nreference was taken before but dropped as part of the rework done in\n2ac061ce97f4.\n\nReintroduce the reference taking and add a comment this time\nexplaining why it's needed.\n\nThis is XSA-374 / CVE-2021-28691.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47111", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47111", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47111", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47111", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47111", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47111" + } + }, + "CVE-2021-47112": { + "affected_versions": "v2.6.12-rc2 to v5.13-rc2", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "x86/kvm: Teardown PV features on boot CPU as well", + "fixes": "8b79feffeca28c5459458fe78676b081e87c93a4", + "last_affected_version": "5.12.9", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nx86/kvm: Teardown PV features on boot CPU as well\n\nVarious PV features (Async PF, PV EOI, steal time) work through memory\nshared with hypervisor and when we restore from hibernation we must\nproperly teardown all these features to make sure hypervisor doesn't\nwrite to stale locations after we jump to the previously hibernated kernel\n(which can try to place anything there). For secondary CPUs the job is\nalready done by kvm_cpu_down_prepare(), register syscore ops to do\nthe same for boot CPU.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47112", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47112", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47112", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47112", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47112", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47112" + } + }, + "CVE-2021-47113": { + "affected_versions": "v2.6.12-rc2 to v5.13-rc5", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "btrfs: abort in rename_exchange if we fail to insert the second ref", + "fixes": "dc09ef3562726cd520c8338c1640872a60187af5", + "last_affected_version": "5.12.9", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: abort in rename_exchange if we fail to insert the second ref\n\nError injection stress uncovered a problem where we'd leave a dangling\ninode ref if we failed during a rename_exchange. This happens because\nwe insert the inode ref for one side of the rename, and then for the\nother side. If this second inode ref insert fails we'll leave the first\none dangling and leave a corrupt file system behind. Fix this by\naborting if we did the insert for the first inode ref.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47113", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47113", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47113", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47113", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47113", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47113" + } + }, + "CVE-2021-47114": { + "affected_versions": "v2.6.12-rc2 to v5.13-rc5", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "ocfs2: fix data corruption by fallocate", + "fixes": "6bba4471f0cc1296fe3c2089b9e52442d3074b2e", + "last_affected_version": "5.12.9", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nocfs2: fix data corruption by fallocate\n\nWhen fallocate punches holes out of inode size, if original isize is in\nthe middle of last cluster, then the part from isize to the end of the\ncluster will be zeroed with buffer write, at that time isize is not yet\nupdated to match the new size, if writeback is kicked in, it will invoke\nocfs2_writepage()->block_write_full_page() where the pages out of inode\nsize will be dropped. That will cause file corruption. Fix this by\nzero out eof blocks when extending the inode size.\n\nRunning the following command with qemu-image 4.2.1 can get a corrupted\ncoverted image file easily.\n\n qemu-img convert -p -t none -T none -f qcow2 $qcow_image \\\n -O qcow2 -o compat=1.1 $qcow_image.conv\n\nThe usage of fallocate in qemu is like this, it first punches holes out\nof inode size, then extend the inode size.\n\n fallocate(11, FALLOC_FL_KEEP_SIZE|FALLOC_FL_PUNCH_HOLE, 2276196352, 65536) = 0\n fallocate(11, 0, 2276196352, 65536) = 0\n\nv1: https://www.spinics.net/lists/linux-fsdevel/msg193999.html\nv2: https://lore.kernel.org/linux-fsdevel/20210525093034.GB4112@quack2.suse.cz/T/", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47114", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47114", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47114", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47114", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47114", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47114" + } + }, + "CVE-2021-47116": { + "affected_versions": "unk to v5.13-rc5", + "breaks": "", + "cmt_msg": "ext4: fix memory leak in ext4_mb_init_backend on error path.", + "fixes": "a8867f4e3809050571c98de7a2d465aff5e4daf5", + "last_affected_version": "5.12.9", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: fix memory leak in ext4_mb_init_backend on error path.\n\nFix a memory leak discovered by syzbot when a file system is corrupted\nwith an illegally large s_log_groups_per_flex.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47116", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47116", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47116", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47116", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47116", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47116" + } + }, + "CVE-2021-47117": { + "affected_versions": "v2.6.12-rc2 to v5.13-rc5", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "ext4: fix bug on in ext4_es_cache_extent as ext4_split_extent_at failed", + "fixes": "082cd4ec240b8734a82a89ffb890216ac98fec68", + "last_affected_version": "5.12.9", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: fix bug on in ext4_es_cache_extent as ext4_split_extent_at failed\n\nWe got follow bug_on when run fsstress with injecting IO fault:\n[130747.323114] kernel BUG at fs/ext4/extents_status.c:762!\n[130747.323117] Internal error: Oops - BUG: 0 [#1] SMP\n......\n[130747.334329] Call trace:\n[130747.334553] ext4_es_cache_extent+0x150/0x168 [ext4]\n[130747.334975] ext4_cache_extents+0x64/0xe8 [ext4]\n[130747.335368] ext4_find_extent+0x300/0x330 [ext4]\n[130747.335759] ext4_ext_map_blocks+0x74/0x1178 [ext4]\n[130747.336179] ext4_map_blocks+0x2f4/0x5f0 [ext4]\n[130747.336567] ext4_mpage_readpages+0x4a8/0x7a8 [ext4]\n[130747.336995] ext4_readpage+0x54/0x100 [ext4]\n[130747.337359] generic_file_buffered_read+0x410/0xae8\n[130747.337767] generic_file_read_iter+0x114/0x190\n[130747.338152] ext4_file_read_iter+0x5c/0x140 [ext4]\n[130747.338556] __vfs_read+0x11c/0x188\n[130747.338851] vfs_read+0x94/0x150\n[130747.339110] ksys_read+0x74/0xf0\n\nThis patch's modification is according to Jan Kara's suggestion in:\nhttps://patchwork.ozlabs.org/project/linux-ext4/patch/20210428085158.3728201-1-yebin10@huawei.com/\n\"I see. Now I understand your patch. Honestly, seeing how fragile is trying\nto fix extent tree after split has failed in the middle, I would probably\ngo even further and make sure we fix the tree properly in case of ENOSPC\nand EDQUOT (those are easily user triggerable). Anything else indicates a\nHW problem or fs corruption so I'd rather leave the extent tree as is and\ndon't try to fix it (which also means we will not create overlapping\nextents).\"", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47117", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47117", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47117", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47117", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47117", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47117" + } + }, + "CVE-2021-47118": { + "affected_versions": "v2.6.19-rc1 to v5.13-rc5", + "breaks": "9ec52099e4b8678a60e9f93e41ad87885d64f3e6", + "cmt_msg": "pid: take a reference when initializing `cad_pid`", + "fixes": "0711f0d7050b9e07c44bc159bbc64ac0a1022c7f", + "last_affected_version": "5.12.9", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\npid: take a reference when initializing `cad_pid`\n\nDuring boot, kernel_init_freeable() initializes `cad_pid` to the init\ntask's struct pid. Later on, we may change `cad_pid` via a sysctl, and\nwhen this happens proc_do_cad_pid() will increment the refcount on the\nnew pid via get_pid(), and will decrement the refcount on the old pid\nvia put_pid(). As we never called get_pid() when we initialized\n`cad_pid`, we decrement a reference we never incremented, can therefore\nfree the init task's struct pid early. As there can be dangling\nreferences to the struct pid, we can later encounter a use-after-free\n(e.g. when delivering signals).\n\nThis was spotted when fuzzing v5.13-rc3 with Syzkaller, but seems to\nhave been around since the conversion of `cad_pid` to struct pid in\ncommit 9ec52099e4b8 (\"[PATCH] replace cad_pid by a struct pid\") from the\npre-KASAN stone age of v2.6.19.\n\nFix this by getting a reference to the init task's struct pid when we\nassign it to `cad_pid`.\n\nFull KASAN splat below.\n\n ==================================================================\n BUG: KASAN: use-after-free in ns_of_pid include/linux/pid.h:153 [inline]\n BUG: KASAN: use-after-free in task_active_pid_ns+0xc0/0xc8 kernel/pid.c:509\n Read of size 4 at addr ffff23794dda0004 by task syz-executor.0/273\n\n CPU: 1 PID: 273 Comm: syz-executor.0 Not tainted 5.12.0-00001-g9aef892b2d15 #1\n Hardware name: linux,dummy-virt (DT)\n Call trace:\n ns_of_pid include/linux/pid.h:153 [inline]\n task_active_pid_ns+0xc0/0xc8 kernel/pid.c:509\n do_notify_parent+0x308/0xe60 kernel/signal.c:1950\n exit_notify kernel/exit.c:682 [inline]\n do_exit+0x2334/0x2bd0 kernel/exit.c:845\n do_group_exit+0x108/0x2c8 kernel/exit.c:922\n get_signal+0x4e4/0x2a88 kernel/signal.c:2781\n do_signal arch/arm64/kernel/signal.c:882 [inline]\n do_notify_resume+0x300/0x970 arch/arm64/kernel/signal.c:936\n work_pending+0xc/0x2dc\n\n Allocated by task 0:\n slab_post_alloc_hook+0x50/0x5c0 mm/slab.h:516\n slab_alloc_node mm/slub.c:2907 [inline]\n slab_alloc mm/slub.c:2915 [inline]\n kmem_cache_alloc+0x1f4/0x4c0 mm/slub.c:2920\n alloc_pid+0xdc/0xc00 kernel/pid.c:180\n copy_process+0x2794/0x5e18 kernel/fork.c:2129\n kernel_clone+0x194/0x13c8 kernel/fork.c:2500\n kernel_thread+0xd4/0x110 kernel/fork.c:2552\n rest_init+0x44/0x4a0 init/main.c:687\n arch_call_rest_init+0x1c/0x28\n start_kernel+0x520/0x554 init/main.c:1064\n 0x0\n\n Freed by task 270:\n slab_free_hook mm/slub.c:1562 [inline]\n slab_free_freelist_hook+0x98/0x260 mm/slub.c:1600\n slab_free mm/slub.c:3161 [inline]\n kmem_cache_free+0x224/0x8e0 mm/slub.c:3177\n put_pid.part.4+0xe0/0x1a8 kernel/pid.c:114\n put_pid+0x30/0x48 kernel/pid.c:109\n proc_do_cad_pid+0x190/0x1b0 kernel/sysctl.c:1401\n proc_sys_call_handler+0x338/0x4b0 fs/proc/proc_sysctl.c:591\n proc_sys_write+0x34/0x48 fs/proc/proc_sysctl.c:617\n call_write_iter include/linux/fs.h:1977 [inline]\n new_sync_write+0x3ac/0x510 fs/read_write.c:518\n vfs_write fs/read_write.c:605 [inline]\n vfs_write+0x9c4/0x1018 fs/read_write.c:585\n ksys_write+0x124/0x240 fs/read_write.c:658\n __do_sys_write fs/read_write.c:670 [inline]\n __se_sys_write fs/read_write.c:667 [inline]\n __arm64_sys_write+0x78/0xb0 fs/read_write.c:667\n __invoke_syscall arch/arm64/kernel/syscall.c:37 [inline]\n invoke_syscall arch/arm64/kernel/syscall.c:49 [inline]\n el0_svc_common.constprop.1+0x16c/0x388 arch/arm64/kernel/syscall.c:129\n do_el0_svc+0xf8/0x150 arch/arm64/kernel/syscall.c:168\n el0_svc+0x28/0x38 arch/arm64/kernel/entry-common.c:416\n el0_sync_handler+0x134/0x180 arch/arm64/kernel/entry-common.c:432\n el0_sync+0x154/0x180 arch/arm64/kernel/entry.S:701\n\n The buggy address belongs to the object at ffff23794dda0000\n which belongs to the cache pid of size 224\n The buggy address is located 4 bytes inside of\n 224-byte region [ff\n---truncated---", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47118", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47118", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47118", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47118", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47118", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47118" + } + }, + "CVE-2021-47119": { + "affected_versions": "v2.6.25-rc1 to v5.13-rc5", + "breaks": "ce40733ce93de402ed629762f0e912d9af187cef", + "cmt_msg": "ext4: fix memory leak in ext4_fill_super", + "fixes": "afd09b617db3786b6ef3dc43e28fe728cfea84df", + "last_affected_version": "5.12.17", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: fix memory leak in ext4_fill_super\n\nBuffer head references must be released before calling kill_bdev();\notherwise the buffer head (and its page referenced by b_data) will not\nbe freed by kill_bdev, and subsequently that bh will be leaked.\n\nIf blocksizes differ, sb_set_blocksize() will kill current buffers and\npage cache by using kill_bdev(). And then super block will be reread\nagain but using correct blocksize this time. sb_set_blocksize() didn't\nfully free superblock page and buffer head, and being busy, they were\nnot freed and instead leaked.\n\nThis can easily be reproduced by calling an infinite loop of:\n\n systemctl start .mount, and\n systemctl stop .mount\n\n... since systemd creates a cgroup for each slice which it mounts, and\nthe bh leak get amplified by a dying memory cgroup that also never\ngets freed, and memory consumption is much more easily noticed.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47119", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47119", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47119", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47119", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47119", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47119" + } + }, + "CVE-2021-47120": { + "affected_versions": "v4.20-rc1 to v5.13-rc5", + "breaks": "9d7b18668956c411a422d04c712994c5fdb23a4b", + "cmt_msg": "HID: magicmouse: fix NULL-deref on disconnect", + "fixes": "4b4f6cecca446abcb686c6e6c451d4f1ec1a7497", + "last_affected_version": "5.12.9", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nHID: magicmouse: fix NULL-deref on disconnect\n\nCommit 9d7b18668956 (\"HID: magicmouse: add support for Apple Magic\nTrackpad 2\") added a sanity check for an Apple trackpad but returned\nsuccess instead of -ENODEV when the check failed. This means that the\nremove callback will dereference the never-initialised driver data\npointer when the driver is later unbound (e.g. on USB disconnect).", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47120", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47120", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47120", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47120", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47120", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47120" + } + }, + "CVE-2021-47121": { + "affected_versions": "v3.3-rc1 to v5.13-rc5", + "breaks": "7ad65bf68d705b445ef10b77ab50dab22be185ee", + "cmt_msg": "net: caif: fix memory leak in cfusbl_device_notify", + "fixes": "7f5d86669fa4d485523ddb1d212e0a2d90bd62bb", + "last_affected_version": "5.12.9", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: caif: fix memory leak in cfusbl_device_notify\n\nIn case of caif_enroll_dev() fail, allocated\nlink_support won't be assigned to the corresponding\nstructure. So simply free allocated pointer in case\nof error.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47121", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47121", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47121", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47121", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47121", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47121" + } + }, + "CVE-2021-47122": { + "affected_versions": "v3.3-rc1 to v5.13-rc5", + "breaks": "7c18d2205ea76eef9674e59e1ecae4f332a53e9e", + "cmt_msg": "net: caif: fix memory leak in caif_device_notify", + "fixes": "b53558a950a89824938e9811eddfc8efcd94e1bb", + "last_affected_version": "5.12.9", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: caif: fix memory leak in caif_device_notify\n\nIn case of caif_enroll_dev() fail, allocated\nlink_support won't be assigned to the corresponding\nstructure. So simply free allocated pointer in case\nof error", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47122", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47122", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47122", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47122", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47122", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47122" + } + }, + "CVE-2021-47123": { + "affected_versions": "v5.11-rc1 to v5.13-rc2", + "breaks": "90cd7e424969d29aff653333b4dcb4e2e199d791", + "cmt_msg": "io_uring: fix ltout double free on completion race", + "fixes": "447c19f3b5074409c794b350b10306e1da1ef4ba", + "last_affected_version": "5.12.9", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nio_uring: fix ltout double free on completion race\n\nAlways remove linked timeout on io_link_timeout_fn() from the master\nrequest link list, otherwise we may get use-after-free when first\nio_link_timeout_fn() puts linked timeout in the fail path, and then\nwill be found and put on master's free.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47123", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47123", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47123", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47123", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47123", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47123" + } + }, + "CVE-2021-47124": { + "affected_versions": "unk to v5.13-rc2", + "breaks": "", + "cmt_msg": "io_uring: fix link timeout refs", + "fixes": "a298232ee6b9a1d5d732aa497ff8be0d45b5bd82", + "last_affected_version": "5.12.18", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nio_uring: fix link timeout refs\n\nWARNING: CPU: 0 PID: 10242 at lib/refcount.c:28 refcount_warn_saturate+0x15b/0x1a0 lib/refcount.c:28\nRIP: 0010:refcount_warn_saturate+0x15b/0x1a0 lib/refcount.c:28\nCall Trace:\n __refcount_sub_and_test include/linux/refcount.h:283 [inline]\n __refcount_dec_and_test include/linux/refcount.h:315 [inline]\n refcount_dec_and_test include/linux/refcount.h:333 [inline]\n io_put_req fs/io_uring.c:2140 [inline]\n io_queue_linked_timeout fs/io_uring.c:6300 [inline]\n __io_queue_sqe+0xbef/0xec0 fs/io_uring.c:6354\n io_submit_sqe fs/io_uring.c:6534 [inline]\n io_submit_sqes+0x2bbd/0x7c50 fs/io_uring.c:6660\n __do_sys_io_uring_enter fs/io_uring.c:9240 [inline]\n __se_sys_io_uring_enter+0x256/0x1d60 fs/io_uring.c:9182\n\nio_link_timeout_fn() should put only one reference of the linked timeout\nrequest, however in case of racing with the master request's completion\nfirst io_req_complete() puts one and then io_put_req_deferred() is\ncalled.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47124", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47124", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47124", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47124", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47124", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47124" + } + }, + "CVE-2021-47125": { + "affected_versions": "unk to v5.13-rc5", + "breaks": "", + "cmt_msg": "sch_htb: fix refcount leak in htb_parent_to_leaf_offload", + "fixes": "944d671d5faa0d78980a3da5c0f04960ef1ad893", + "last_affected_version": "5.12.9", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsch_htb: fix refcount leak in htb_parent_to_leaf_offload\n\nThe commit ae81feb7338c (\"sch_htb: fix null pointer dereference\non a null new_q\") fixes a NULL pointer dereference bug, but it\nis not correct.\n\nBecause htb_graft_helper properly handles the case when new_q\nis NULL, and after the previous patch by skipping this call\nwhich creates an inconsistency : dev_queue->qdisc will still\npoint to the old qdisc, but cl->parent->leaf.q will point to\nthe new one (which will be noop_qdisc, because new_q was NULL).\nThe code is based on an assumption that these two pointers are\nthe same, so it can lead to refcount leaks.\n\nThe correct fix is to add a NULL pointer check to protect\nqdisc_refcount_inc inside htb_parent_to_leaf_offload.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47125", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47125", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47125", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47125", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47125", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47125" + } + }, + "CVE-2021-47126": { + "affected_versions": "v5.3-rc1 to v5.13-rc5", + "breaks": "f88d8ea67fbdbac7a64bfa6ed9a2ba27bb822f74", + "cmt_msg": "ipv6: Fix KASAN: slab-out-of-bounds Read in fib6_nh_flush_exceptions", + "fixes": "821bbf79fe46a8b1d18aa456e8ed0a3c208c3754", + "last_affected_version": "5.12.9", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv6: Fix KASAN: slab-out-of-bounds Read in fib6_nh_flush_exceptions\n\nReported by syzbot:\nHEAD commit: 90c911ad Merge tag 'fixes' of git://git.kernel.org/pub/scm..\ngit tree: git://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git master\ndashboard link: https://syzkaller.appspot.com/bug?extid=123aa35098fd3c000eb7\ncompiler: Debian clang version 11.0.1-2\n\n==================================================================\nBUG: KASAN: slab-out-of-bounds in fib6_nh_get_excptn_bucket net/ipv6/route.c:1604 [inline]\nBUG: KASAN: slab-out-of-bounds in fib6_nh_flush_exceptions+0xbd/0x360 net/ipv6/route.c:1732\nRead of size 8 at addr ffff8880145c78f8 by task syz-executor.4/17760\n\nCPU: 0 PID: 17760 Comm: syz-executor.4 Not tainted 5.12.0-rc8-syzkaller #0\nCall Trace:\n \n __dump_stack lib/dump_stack.c:79 [inline]\n dump_stack+0x202/0x31e lib/dump_stack.c:120\n print_address_description+0x5f/0x3b0 mm/kasan/report.c:232\n __kasan_report mm/kasan/report.c:399 [inline]\n kasan_report+0x15c/0x200 mm/kasan/report.c:416\n fib6_nh_get_excptn_bucket net/ipv6/route.c:1604 [inline]\n fib6_nh_flush_exceptions+0xbd/0x360 net/ipv6/route.c:1732\n fib6_nh_release+0x9a/0x430 net/ipv6/route.c:3536\n fib6_info_destroy_rcu+0xcb/0x1c0 net/ipv6/ip6_fib.c:174\n rcu_do_batch kernel/rcu/tree.c:2559 [inline]\n rcu_core+0x8f6/0x1450 kernel/rcu/tree.c:2794\n __do_softirq+0x372/0x7a6 kernel/softirq.c:345\n invoke_softirq kernel/softirq.c:221 [inline]\n __irq_exit_rcu+0x22c/0x260 kernel/softirq.c:422\n irq_exit_rcu+0x5/0x20 kernel/softirq.c:434\n sysvec_apic_timer_interrupt+0x91/0xb0 arch/x86/kernel/apic/apic.c:1100\n \n asm_sysvec_apic_timer_interrupt+0x12/0x20 arch/x86/include/asm/idtentry.h:632\nRIP: 0010:lock_acquire+0x1f6/0x720 kernel/locking/lockdep.c:5515\nCode: f6 84 24 a1 00 00 00 02 0f 85 8d 02 00 00 f7 c3 00 02 00 00 49 bd 00 00 00 00 00 fc ff df 74 01 fb 48 c7 44 24 40 0e 36 e0 45 <4b> c7 44 3d 00 00 00 00 00 4b c7 44 3d 09 00 00 00 00 43 c7 44 3d\nRSP: 0018:ffffc90009e06560 EFLAGS: 00000206\nRAX: 1ffff920013c0cc0 RBX: 0000000000000246 RCX: dffffc0000000000\nRDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000\nRBP: ffffc90009e066e0 R08: dffffc0000000000 R09: fffffbfff1f992b1\nR10: fffffbfff1f992b1 R11: 0000000000000000 R12: 0000000000000000\nR13: dffffc0000000000 R14: 0000000000000000 R15: 1ffff920013c0cb4\n rcu_lock_acquire+0x2a/0x30 include/linux/rcupdate.h:267\n rcu_read_lock include/linux/rcupdate.h:656 [inline]\n ext4_get_group_info+0xea/0x340 fs/ext4/ext4.h:3231\n ext4_mb_prefetch+0x123/0x5d0 fs/ext4/mballoc.c:2212\n ext4_mb_regular_allocator+0x8a5/0x28f0 fs/ext4/mballoc.c:2379\n ext4_mb_new_blocks+0xc6e/0x24f0 fs/ext4/mballoc.c:4982\n ext4_ext_map_blocks+0x2be3/0x7210 fs/ext4/extents.c:4238\n ext4_map_blocks+0xab3/0x1cb0 fs/ext4/inode.c:638\n ext4_getblk+0x187/0x6c0 fs/ext4/inode.c:848\n ext4_bread+0x2a/0x1c0 fs/ext4/inode.c:900\n ext4_append+0x1a4/0x360 fs/ext4/namei.c:67\n ext4_init_new_dir+0x337/0xa10 fs/ext4/namei.c:2768\n ext4_mkdir+0x4b8/0xc00 fs/ext4/namei.c:2814\n vfs_mkdir+0x45b/0x640 fs/namei.c:3819\n ovl_do_mkdir fs/overlayfs/overlayfs.h:161 [inline]\n ovl_mkdir_real+0x53/0x1a0 fs/overlayfs/dir.c:146\n ovl_create_real+0x280/0x490 fs/overlayfs/dir.c:193\n ovl_workdir_create+0x425/0x600 fs/overlayfs/super.c:788\n ovl_make_workdir+0xed/0x1140 fs/overlayfs/super.c:1355\n ovl_get_workdir fs/overlayfs/super.c:1492 [inline]\n ovl_fill_super+0x39ee/0x5370 fs/overlayfs/super.c:2035\n mount_nodev+0x52/0xe0 fs/super.c:1413\n legacy_get_tree+0xea/0x180 fs/fs_context.c:592\n vfs_get_tree+0x86/0x270 fs/super.c:1497\n do_new_mount fs/namespace.c:2903 [inline]\n path_mount+0x196f/0x2be0 fs/namespace.c:3233\n do_mount fs/namespace.c:3246 [inline]\n __do_sys_mount fs/namespace.c:3454 [inline]\n __se_sys_mount+0x2f9/0x3b0 fs/namespace.c:3431\n do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46\n entry_SYSCALL_64_after_hwframe+0x44/0xae\nRIP: 0033:0x4665f9\nCode: ff ff c3 66 2e 0f 1f 84 \n---truncated---", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47126", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47126", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47126", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47126", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47126", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47126" + } + }, + "CVE-2021-47127": { + "affected_versions": "v5.12-rc1-dontuse to v5.13-rc5", + "breaks": "c7a219048e459cf99c6fec0f7c1e42414e9e6202", + "cmt_msg": "ice: track AF_XDP ZC enabled queues in bitmap", + "fixes": "e102db780e1c14f10c70dafa7684af22a745b51d", + "last_affected_version": "5.12.9", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nice: track AF_XDP ZC enabled queues in bitmap\n\nCommit c7a219048e45 (\"ice: Remove xsk_buff_pool from VSI structure\")\nsilently introduced a regression and broke the Tx side of AF_XDP in copy\nmode. xsk_pool on ice_ring is set only based on the existence of the XDP\nprog on the VSI which in turn picks ice_clean_tx_irq_zc to be executed.\nThat is not something that should happen for copy mode as it should use\nthe regular data path ice_clean_tx_irq.\n\nThis results in a following splat when xdpsock is run in txonly or l2fwd\nscenarios in copy mode:\n\n\n[ 106.050195] BUG: kernel NULL pointer dereference, address: 0000000000000030\n[ 106.057269] #PF: supervisor read access in kernel mode\n[ 106.062493] #PF: error_code(0x0000) - not-present page\n[ 106.067709] PGD 0 P4D 0\n[ 106.070293] Oops: 0000 [#1] PREEMPT SMP NOPTI\n[ 106.074721] CPU: 61 PID: 0 Comm: swapper/61 Not tainted 5.12.0-rc2+ #45\n[ 106.081436] Hardware name: Intel Corporation S2600WFT/S2600WFT, BIOS SE5C620.86B.02.01.0008.031920191559 03/19/2019\n[ 106.092027] RIP: 0010:xp_raw_get_dma+0x36/0x50\n[ 106.096551] Code: 74 14 48 b8 ff ff ff ff ff ff 00 00 48 21 f0 48 c1 ee 30 48 01 c6 48 8b 87 90 00 00 00 48 89 f2 81 e6 ff 0f 00 00 48 c1 ea 0c <48> 8b 04 d0 48 83 e0 fe 48 01 f0 c3 66 66 2e 0f 1f 84 00 00 00 00\n[ 106.115588] RSP: 0018:ffffc9000d694e50 EFLAGS: 00010206\n[ 106.120893] RAX: 0000000000000000 RBX: ffff88984b8c8a00 RCX: ffff889852581800\n[ 106.128137] RDX: 0000000000000006 RSI: 0000000000000000 RDI: ffff88984cd8b800\n[ 106.135383] RBP: ffff888123b50001 R08: ffff889896800000 R09: 0000000000000800\n[ 106.142628] R10: 0000000000000000 R11: ffffffff826060c0 R12: 00000000000000ff\n[ 106.149872] R13: 0000000000000000 R14: 0000000000000040 R15: ffff888123b50018\n[ 106.157117] FS: 0000000000000000(0000) GS:ffff8897e0f40000(0000) knlGS:0000000000000000\n[ 106.165332] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 106.171163] CR2: 0000000000000030 CR3: 000000000560a004 CR4: 00000000007706e0\n[ 106.178408] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n[ 106.185653] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n[ 106.192898] PKRU: 55555554\n[ 106.195653] Call Trace:\n[ 106.198143] \n[ 106.200196] ice_clean_tx_irq_zc+0x183/0x2a0 [ice]\n[ 106.205087] ice_napi_poll+0x3e/0x590 [ice]\n[ 106.209356] __napi_poll+0x2a/0x160\n[ 106.212911] net_rx_action+0xd6/0x200\n[ 106.216634] __do_softirq+0xbf/0x29b\n[ 106.220274] irq_exit_rcu+0x88/0xc0\n[ 106.223819] common_interrupt+0x7b/0xa0\n[ 106.227719] \n[ 106.229857] asm_common_interrupt+0x1e/0x40\n\n\nFix this by introducing the bitmap of queues that are zero-copy enabled,\nwhere each bit, corresponding to a queue id that xsk pool is being\nconfigured on, will be set/cleared within ice_xsk_pool_{en,dis}able and\nchecked within ice_xsk_pool(). The latter is a function used for\ndeciding which napi poll routine is executed.\nIdea is being taken from our other drivers such as i40e and ixgbe.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47127", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47127", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47127", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47127", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47127", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47127" + } + }, + "CVE-2021-47128": { + "affected_versions": "unk to v5.13-rc5", + "breaks": "", + "cmt_msg": "bpf, lockdown, audit: Fix buggy SELinux lockdown permission checks", + "fixes": "ff40e51043af63715ab413995ff46996ecf9583f", + "last_affected_version": "5.12.9", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf, lockdown, audit: Fix buggy SELinux lockdown permission checks\n\nCommit 59438b46471a (\"security,lockdown,selinux: implement SELinux lockdown\")\nadded an implementation of the locked_down LSM hook to SELinux, with the aim\nto restrict which domains are allowed to perform operations that would breach\nlockdown. This is indirectly also getting audit subsystem involved to report\nevents. The latter is problematic, as reported by Ondrej and Serhei, since it\ncan bring down the whole system via audit:\n\n 1) The audit events that are triggered due to calls to security_locked_down()\n can OOM kill a machine, see below details [0].\n\n 2) It also seems to be causing a deadlock via avc_has_perm()/slow_avc_audit()\n when trying to wake up kauditd, for example, when using trace_sched_switch()\n tracepoint, see details in [1]. Triggering this was not via some hypothetical\n corner case, but with existing tools like runqlat & runqslower from bcc, for\n example, which make use of this tracepoint. Rough call sequence goes like:\n\n rq_lock(rq) -> -------------------------+\n trace_sched_switch() -> |\n bpf_prog_xyz() -> +-> deadlock\n selinux_lockdown() -> |\n audit_log_end() -> |\n wake_up_interruptible() -> |\n try_to_wake_up() -> |\n rq_lock(rq) --------------+\n\nWhat's worse is that the intention of 59438b46471a to further restrict lockdown\nsettings for specific applications in respect to the global lockdown policy is\ncompletely broken for BPF. The SELinux policy rule for the current lockdown check\nlooks something like this:\n\n allow : lockdown { };\n\nHowever, this doesn't match with the 'current' task where the security_locked_down()\nis executed, example: httpd does a syscall. There is a tracing program attached\nto the syscall which triggers a BPF program to run, which ends up doing a\nbpf_probe_read_kernel{,_str}() helper call. The selinux_lockdown() hook does\nthe permission check against 'current', that is, httpd in this example. httpd\nhas literally zero relation to this tracing program, and it would be nonsensical\nhaving to write an SELinux policy rule against httpd to let the tracing helper\npass. The policy in this case needs to be against the entity that is installing\nthe BPF program. For example, if bpftrace would generate a histogram of syscall\ncounts by user space application:\n\n bpftrace -e 'tracepoint:raw_syscalls:sys_enter { @[comm] = count(); }'\n\nbpftrace would then go and generate a BPF program from this internally. One way\nof doing it [for the sake of the example] could be to call bpf_get_current_task()\nhelper and then access current->comm via one of bpf_probe_read_kernel{,_str}()\nhelpers. So the program itself has nothing to do with httpd or any other random\napp doing a syscall here. The BPF program _explicitly initiated_ the lockdown\ncheck. The allow/deny policy belongs in the context of bpftrace: meaning, you\nwant to grant bpftrace access to use these helpers, but other tracers on the\nsystem like my_random_tracer _not_.\n\nTherefore fix all three issues at the same time by taking a completely different\napproach for the security_locked_down() hook, that is, move the check into the\nprogram verification phase where we actually retrieve the BPF func proto. This\nalso reliably gets the task (current) that is trying to install the BPF tracing\nprogram, e.g. bpftrace/bcc/perf/systemtap/etc, and it also fixes the OOM since\nwe're moving this out of the BPF helper's fast-path which can be called several\nmillions of times per second.\n\nThe check is then also in line with other security_locked_down() hooks in the\nsystem where the enforcement is performed at open/load time, for example,\nopen_kcore() for /proc/kcore access or module_sig_check() for module signatures\njust to pick f\n---truncated---", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47128", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47128", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47128", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47128", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47128", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47128" + } + }, + "CVE-2021-47129": { + "affected_versions": "v5.3-rc1 to v5.13-rc5", + "breaks": "857b46027d6f91150797295752581b7155b9d0e1", + "cmt_msg": "netfilter: nft_ct: skip expectations for confirmed conntrack", + "fixes": "1710eb913bdcda3917f44d383c32de6bdabfc836", + "last_affected_version": "5.12.9", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nft_ct: skip expectations for confirmed conntrack\n\nnft_ct_expect_obj_eval() calls nf_ct_ext_add() for a confirmed\nconntrack entry. However, nf_ct_ext_add() can only be called for\n!nf_ct_is_confirmed().\n\n[ 1825.349056] WARNING: CPU: 0 PID: 1279 at net/netfilter/nf_conntrack_extend.c:48 nf_ct_xt_add+0x18e/0x1a0 [nf_conntrack]\n[ 1825.351391] RIP: 0010:nf_ct_ext_add+0x18e/0x1a0 [nf_conntrack]\n[ 1825.351493] Code: 41 5c 41 5d 41 5e 41 5f c3 41 bc 0a 00 00 00 e9 15 ff ff ff ba 09 00 00 00 31 f6 4c 89 ff e8 69 6c 3d e9 eb 96 45 31 ed eb cd <0f> 0b e9 b1 fe ff ff e8 86 79 14 e9 eb bf 0f 1f 40 00 0f 1f 44 00\n[ 1825.351721] RSP: 0018:ffffc90002e1f1e8 EFLAGS: 00010202\n[ 1825.351790] RAX: 000000000000000e RBX: ffff88814f5783c0 RCX: ffffffffc0e4f887\n[ 1825.351881] RDX: dffffc0000000000 RSI: 0000000000000008 RDI: ffff88814f578440\n[ 1825.351971] RBP: 0000000000000000 R08: 0000000000000000 R09: ffff88814f578447\n[ 1825.352060] R10: ffffed1029eaf088 R11: 0000000000000001 R12: ffff88814f578440\n[ 1825.352150] R13: ffff8882053f3a00 R14: 0000000000000000 R15: 0000000000000a20\n[ 1825.352240] FS: 00007f992261c900(0000) GS:ffff889faec00000(0000) knlGS:0000000000000000\n[ 1825.352343] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 1825.352417] CR2: 000056070a4d1158 CR3: 000000015efe0000 CR4: 0000000000350ee0\n[ 1825.352508] Call Trace:\n[ 1825.352544] nf_ct_helper_ext_add+0x10/0x60 [nf_conntrack]\n[ 1825.352641] nft_ct_expect_obj_eval+0x1b8/0x1e0 [nft_ct]\n[ 1825.352716] nft_do_chain+0x232/0x850 [nf_tables]\n\nAdd the ct helper extension only for unconfirmed conntrack. Skip rule\nevaluation if the ct helper extension does not exist. Thus, you can\nonly create expectations from the first packet.\n\nIt should be possible to remove this limitation by adding a new action\nto attach a generic ct helper to the first packet. Then, use this ct\nhelper extension from follow up packets to create the ct expectation.\n\nWhile at it, add a missing check to skip the template conntrack too\nand remove check for IPCT_UNTRACK which is implicit to !ct.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47129", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47129", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47129", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47129", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47129", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47129" + } + }, + "CVE-2021-47130": { + "affected_versions": "v5.8-rc1 to v5.13-rc5", + "breaks": "c6e3f13398123a008cd2ee28f93510b113a32791", + "cmt_msg": "nvmet: fix freeing unallocated p2pmem", + "fixes": "bcd9a0797d73eeff659582f23277e7ab6e5f18f3", + "last_affected_version": "5.12.9", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvmet: fix freeing unallocated p2pmem\n\nIn case p2p device was found but the p2p pool is empty, the nvme target\nis still trying to free the sgl from the p2p pool instead of the\nregular sgl pool and causing a crash (BUG() is called). Instead, assign\nthe p2p_dev for the request only if it was allocated from p2p pool.\n\nThis is the crash that was caused:\n\n[Sun May 30 19:13:53 2021] ------------[ cut here ]------------\n[Sun May 30 19:13:53 2021] kernel BUG at lib/genalloc.c:518!\n[Sun May 30 19:13:53 2021] invalid opcode: 0000 [#1] SMP PTI\n...\n[Sun May 30 19:13:53 2021] kernel BUG at lib/genalloc.c:518!\n...\n[Sun May 30 19:13:53 2021] RIP: 0010:gen_pool_free_owner+0xa8/0xb0\n...\n[Sun May 30 19:13:53 2021] Call Trace:\n[Sun May 30 19:13:53 2021] ------------[ cut here ]------------\n[Sun May 30 19:13:53 2021] pci_free_p2pmem+0x2b/0x70\n[Sun May 30 19:13:53 2021] pci_p2pmem_free_sgl+0x4f/0x80\n[Sun May 30 19:13:53 2021] nvmet_req_free_sgls+0x1e/0x80 [nvmet]\n[Sun May 30 19:13:53 2021] kernel BUG at lib/genalloc.c:518!\n[Sun May 30 19:13:53 2021] nvmet_rdma_release_rsp+0x4e/0x1f0 [nvmet_rdma]\n[Sun May 30 19:13:53 2021] nvmet_rdma_send_done+0x1c/0x60 [nvmet_rdma]", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47130", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47130", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47130", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47130", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47130", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47130" + } + }, + "CVE-2021-47131": { + "affected_versions": "unk to v5.13-rc5", + "breaks": "", + "cmt_msg": "net/tls: Fix use-after-free after the TLS device goes down and up", + "fixes": "c55dcdd435aa6c6ad6ccac0a4c636d010ee367a4", + "last_affected_version": "5.12.9", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/tls: Fix use-after-free after the TLS device goes down and up\n\nWhen a netdev with active TLS offload goes down, tls_device_down is\ncalled to stop the offload and tear down the TLS context. However, the\nsocket stays alive, and it still points to the TLS context, which is now\ndeallocated. If a netdev goes up, while the connection is still active,\nand the data flow resumes after a number of TCP retransmissions, it will\nlead to a use-after-free of the TLS context.\n\nThis commit addresses this bug by keeping the context alive until its\nnormal destruction, and implements the necessary fallbacks, so that the\nconnection can resume in software (non-offloaded) kTLS mode.\n\nOn the TX side tls_sw_fallback is used to encrypt all packets. The RX\nside already has all the necessary fallbacks, because receiving\nnon-decrypted packets is supported. The thing needed on the RX side is\nto block resync requests, which are normally produced after receiving\nnon-decrypted packets.\n\nThe necessary synchronization is implemented for a graceful teardown:\nfirst the fallbacks are deployed, then the driver resources are released\n(it used to be possible to have a tls_dev_resync after tls_dev_del).\n\nA new flag called TLS_RX_DEV_DEGRADED is added to indicate the fallback\nmode. It's used to skip the RX resync logic completely, as it becomes\nuseless, and some objects may be released (for example, resync_async,\nwhich is allocated and freed by the driver).", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47131", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47131", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47131", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47131", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47131", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47131" + } + }, + "CVE-2021-47132": { + "affected_versions": "v5.12-rc1-dontuse to v5.13-rc5", + "breaks": "64b9cea7a0afe579dd2682f1f1c04f2e4e72fd25", + "cmt_msg": "mptcp: fix sk_forward_memory corruption on retransmission", + "fixes": "b5941f066b4ca331db225a976dae1d6ca8cf0ae3", + "last_affected_version": "5.12.9", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmptcp: fix sk_forward_memory corruption on retransmission\n\nMPTCP sk_forward_memory handling is a bit special, as such field\nis protected by the msk socket spin_lock, instead of the plain\nsocket lock.\n\nCurrently we have a code path updating such field without handling\nthe relevant lock:\n\n__mptcp_retrans() -> __mptcp_clean_una_wakeup()\n\nSeveral helpers in __mptcp_clean_una_wakeup() will update\nsk_forward_alloc, possibly causing such field corruption, as reported\nby Matthieu.\n\nAddress the issue providing and using a new variant of blamed function\nwhich explicitly acquires the msk spin lock.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47132", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47132", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47132", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47132", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47132", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47132" + } + }, + "CVE-2021-47133": { + "affected_versions": "unk to v5.13-rc5", + "breaks": "", + "cmt_msg": "HID: amd_sfh: Fix memory leak in amd_sfh_work", + "fixes": "5ad755fd2b326aa2bc8910b0eb351ee6aece21b1", + "last_affected_version": "5.12.9", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nHID: amd_sfh: Fix memory leak in amd_sfh_work\n\nKmemleak tool detected a memory leak in the amd_sfh driver.\n\n====================\nunreferenced object 0xffff88810228ada0 (size 32):\n comm \"insmod\", pid 3968, jiffies 4295056001 (age 775.792s)\n hex dump (first 32 bytes):\n 00 20 73 1f 81 88 ff ff 00 01 00 00 00 00 ad de . s.............\n 22 01 00 00 00 00 ad de 01 00 02 00 00 00 00 00 \"...............\n backtrace:\n [<000000007b4c8799>] kmem_cache_alloc_trace+0x163/0x4f0\n [<0000000005326893>] amd_sfh_get_report+0xa4/0x1d0 [amd_sfh]\n [<000000002a9e5ec4>] amdtp_hid_request+0x62/0x80 [amd_sfh]\n [<00000000b8a95807>] sensor_hub_get_feature+0x145/0x270 [hid_sensor_hub]\n [<00000000fda054ee>] hid_sensor_parse_common_attributes+0x215/0x460 [hid_sensor_iio_common]\n [<0000000021279ecf>] hid_accel_3d_probe+0xff/0x4a0 [hid_sensor_accel_3d]\n [<00000000915760ce>] platform_probe+0x6a/0xd0\n [<0000000060258a1f>] really_probe+0x192/0x620\n [<00000000fa812f2d>] driver_probe_device+0x14a/0x1d0\n [<000000005e79f7fd>] __device_attach_driver+0xbd/0x110\n [<0000000070d15018>] bus_for_each_drv+0xfd/0x160\n [<0000000013a3c312>] __device_attach+0x18b/0x220\n [<000000008c7b4afc>] device_initial_probe+0x13/0x20\n [<00000000e6e99665>] bus_probe_device+0xfe/0x120\n [<00000000833fa90b>] device_add+0x6a6/0xe00\n [<00000000fa901078>] platform_device_add+0x180/0x380\n====================\n\nThe fix is to freeing request_list entry once the processed entry is\nremoved from the request_list.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47133", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47133", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47133", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47133", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47133", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47133" + } + }, + "CVE-2021-47134": { + "affected_versions": "v5.10-rc1 to v5.13-rc5", + "breaks": "b91540d52a08b65eb6a2b09132e1bd54fa82754c", + "cmt_msg": "efi/fdt: fix panic when no valid fdt found", + "fixes": "668a84c1bfb2b3fd5a10847825a854d63fac7baa", + "last_affected_version": "5.12.9", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nefi/fdt: fix panic when no valid fdt found\n\nsetup_arch() would invoke efi_init()->efi_get_fdt_params(). If no\nvalid fdt found then initial_boot_params will be null. So we\nshould stop further fdt processing here. I encountered this\nissue on risc-v.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47134", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47134", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47134", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47134", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47134", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47134" + } + }, + "CVE-2021-47135": { + "affected_versions": "unk to v5.13-rc5", + "breaks": "", + "cmt_msg": "mt76: mt7921: fix possible AOOB issue in mt7921_mcu_tx_rate_report", + "fixes": "d874e6c06952382897d35bf4094193cd44ae91bd", + "last_affected_version": "5.12.9", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmt76: mt7921: fix possible AOOB issue in mt7921_mcu_tx_rate_report\n\nFix possible array out of bound access in mt7921_mcu_tx_rate_report.\nRemove unnecessary varibable in mt7921_mcu_tx_rate_report", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47135", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47135", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47135", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47135", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47135", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47135" + } + }, + "CVE-2021-47136": { + "affected_versions": "unk to v5.13-rc4", + "breaks": "", + "cmt_msg": "net: zero-initialize tc skb extension on allocation", + "fixes": "9453d45ecb6c2199d72e73c993e9d98677a2801b", + "last_affected_version": "5.12.8", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: zero-initialize tc skb extension on allocation\n\nFunction skb_ext_add() doesn't initialize created skb extension with any\nvalue and leaves it up to the user. However, since extension of type\nTC_SKB_EXT originally contained only single value tc_skb_ext->chain its\nusers used to just assign the chain value without setting whole extension\nmemory to zero first. This assumption changed when TC_SKB_EXT extension was\nextended with additional fields but not all users were updated to\ninitialize the new fields which leads to use of uninitialized memory\nafterwards. UBSAN log:\n\n[ 778.299821] UBSAN: invalid-load in net/openvswitch/flow.c:899:28\n[ 778.301495] load of value 107 is not a valid value for type '_Bool'\n[ 778.303215] CPU: 0 PID: 0 Comm: swapper/0 Not tainted 5.12.0-rc7+ #2\n[ 778.304933] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014\n[ 778.307901] Call Trace:\n[ 778.308680] \n[ 778.309358] dump_stack+0xbb/0x107\n[ 778.310307] ubsan_epilogue+0x5/0x40\n[ 778.311167] __ubsan_handle_load_invalid_value.cold+0x43/0x48\n[ 778.312454] ? memset+0x20/0x40\n[ 778.313230] ovs_flow_key_extract.cold+0xf/0x14 [openvswitch]\n[ 778.314532] ovs_vport_receive+0x19e/0x2e0 [openvswitch]\n[ 778.315749] ? ovs_vport_find_upcall_portid+0x330/0x330 [openvswitch]\n[ 778.317188] ? create_prof_cpu_mask+0x20/0x20\n[ 778.318220] ? arch_stack_walk+0x82/0xf0\n[ 778.319153] ? secondary_startup_64_no_verify+0xb0/0xbb\n[ 778.320399] ? stack_trace_save+0x91/0xc0\n[ 778.321362] ? stack_trace_consume_entry+0x160/0x160\n[ 778.322517] ? lock_release+0x52e/0x760\n[ 778.323444] netdev_frame_hook+0x323/0x610 [openvswitch]\n[ 778.324668] ? ovs_netdev_get_vport+0xe0/0xe0 [openvswitch]\n[ 778.325950] __netif_receive_skb_core+0x771/0x2db0\n[ 778.327067] ? lock_downgrade+0x6e0/0x6f0\n[ 778.328021] ? lock_acquire+0x565/0x720\n[ 778.328940] ? generic_xdp_tx+0x4f0/0x4f0\n[ 778.329902] ? inet_gro_receive+0x2a7/0x10a0\n[ 778.330914] ? lock_downgrade+0x6f0/0x6f0\n[ 778.331867] ? udp4_gro_receive+0x4c4/0x13e0\n[ 778.332876] ? lock_release+0x52e/0x760\n[ 778.333808] ? dev_gro_receive+0xcc8/0x2380\n[ 778.334810] ? lock_downgrade+0x6f0/0x6f0\n[ 778.335769] __netif_receive_skb_list_core+0x295/0x820\n[ 778.336955] ? process_backlog+0x780/0x780\n[ 778.337941] ? mlx5e_rep_tc_netdevice_event_unregister+0x20/0x20 [mlx5_core]\n[ 778.339613] ? seqcount_lockdep_reader_access.constprop.0+0xa7/0xc0\n[ 778.341033] ? kvm_clock_get_cycles+0x14/0x20\n[ 778.342072] netif_receive_skb_list_internal+0x5f5/0xcb0\n[ 778.343288] ? __kasan_kmalloc+0x7a/0x90\n[ 778.344234] ? mlx5e_handle_rx_cqe_mpwrq+0x9e0/0x9e0 [mlx5_core]\n[ 778.345676] ? mlx5e_xmit_xdp_frame_mpwqe+0x14d0/0x14d0 [mlx5_core]\n[ 778.347140] ? __netif_receive_skb_list_core+0x820/0x820\n[ 778.348351] ? mlx5e_post_rx_mpwqes+0xa6/0x25d0 [mlx5_core]\n[ 778.349688] ? napi_gro_flush+0x26c/0x3c0\n[ 778.350641] napi_complete_done+0x188/0x6b0\n[ 778.351627] mlx5e_napi_poll+0x373/0x1b80 [mlx5_core]\n[ 778.352853] __napi_poll+0x9f/0x510\n[ 778.353704] ? mlx5_flow_namespace_set_mode+0x260/0x260 [mlx5_core]\n[ 778.355158] net_rx_action+0x34c/0xa40\n[ 778.356060] ? napi_threaded_poll+0x3d0/0x3d0\n[ 778.357083] ? sched_clock_cpu+0x18/0x190\n[ 778.358041] ? __common_interrupt+0x8e/0x1a0\n[ 778.359045] __do_softirq+0x1ce/0x984\n[ 778.359938] __irq_exit_rcu+0x137/0x1d0\n[ 778.360865] irq_exit_rcu+0xa/0x20\n[ 778.361708] common_interrupt+0x80/0xa0\n[ 778.362640] \n[ 778.363212] asm_common_interrupt+0x1e/0x40\n[ 778.364204] RIP: 0010:native_safe_halt+0xe/0x10\n[ 778.365273] Code: 4f ff ff ff 4c 89 e7 e8 50 3f 40 fe e9 dc fe ff ff 48 89 df e8 43 3f 40 fe eb 90 cc e9 07 00 00 00 0f 00 2d 74 05 62 00 fb f4 90 e9 07 00 00 00 0f 00 2d 64 05 62 00 f4 c3 cc cc 0f 1f 44 00\n[ 778.369355] RSP: 0018:ffffffff84407e48 EFLAGS: 00000246\n[ 778.370570] RAX\n---truncated---", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47136", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47136", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47136", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47136", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47136", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47136" + } + }, + "CVE-2021-47137": { + "affected_versions": "unk to v5.13-rc4", + "breaks": "", + "cmt_msg": "net: lantiq: fix memory corruption in RX ring", + "fixes": "c7718ee96dbc2f9c5fc3b578abdf296dd44b9c20", + "last_affected_version": "5.12.8", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: lantiq: fix memory corruption in RX ring\n\nIn a situation where memory allocation or dma mapping fails, an\ninvalid address is programmed into the descriptor. This can lead\nto memory corruption. If the memory allocation fails, DMA should\nreuse the previous skb and mapping and drop the packet. This patch\nalso increments rx drop counter.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47137", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47137", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47137", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47137", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47137", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47137" + } + }, + "CVE-2021-47138": { + "affected_versions": "v5.2-rc1 to v5.13-rc4", + "breaks": "b1a79360ee862f8ada4798ad2346fa45bb41b527", + "cmt_msg": "cxgb4: avoid accessing registers when clearing filters", + "fixes": "88c380df84fbd03f9b137c2b9d0a44b9f2f553b0", + "last_affected_version": "5.12.8", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncxgb4: avoid accessing registers when clearing filters\n\nHardware register having the server TID base can contain\ninvalid values when adapter is in bad state (for example,\ndue to AER fatal error). Reading these invalid values in the\nregister can lead to out-of-bound memory access. So, fix\nby using the saved server TID base when clearing filters.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47138", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47138", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47138", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47138", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47138", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47138" + } + }, + "CVE-2021-47139": { + "affected_versions": "v5.6-rc1 to v5.13-rc4", + "breaks": "08a100689d4baf296d6898c687ea8d005da8d234", + "cmt_msg": "net: hns3: put off calling register_netdev() until client initialize complete", + "fixes": "a289a7e5c1d49b7d47df9913c1cc81fb48fab613", + "last_affected_version": "5.12.8", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: hns3: put off calling register_netdev() until client initialize complete\n\nCurrently, the netdevice is registered before client initializing\ncomplete. So there is a timewindow between netdevice available\nand usable. In this case, if user try to change the channel number\nor ring param, it may cause the hns3_set_rx_cpu_rmap() being called\ntwice, and report bug.\n\n[47199.416502] hns3 0000:35:00.0 eth1: set channels: tqp_num=1, rxfh=0\n[47199.430340] hns3 0000:35:00.0 eth1: already uninitialized\n[47199.438554] hns3 0000:35:00.0: rss changes from 4 to 1\n[47199.511854] hns3 0000:35:00.0: Channels changed, rss_size from 4 to 1, tqps from 4 to 1\n[47200.163524] ------------[ cut here ]------------\n[47200.171674] kernel BUG at lib/cpu_rmap.c:142!\n[47200.177847] Internal error: Oops - BUG: 0 [#1] PREEMPT SMP\n[47200.185259] Modules linked in: hclge(+) hns3(-) hns3_cae(O) hns_roce_hw_v2 hnae3 vfio_iommu_type1 vfio_pci vfio_virqfd vfio pv680_mii(O) [last unloaded: hclge]\n[47200.205912] CPU: 1 PID: 8260 Comm: ethtool Tainted: G O 5.11.0-rc3+ #1\n[47200.215601] Hardware name: , xxxxxx 02/04/2021\n[47200.223052] pstate: 60400009 (nZCv daif +PAN -UAO -TCO BTYPE=--)\n[47200.230188] pc : cpu_rmap_add+0x38/0x40\n[47200.237472] lr : irq_cpu_rmap_add+0x84/0x140\n[47200.243291] sp : ffff800010e93a30\n[47200.247295] x29: ffff800010e93a30 x28: ffff082100584880\n[47200.254155] x27: 0000000000000000 x26: 0000000000000000\n[47200.260712] x25: 0000000000000000 x24: 0000000000000004\n[47200.267241] x23: ffff08209ba03000 x22: ffff08209ba038c0\n[47200.273789] x21: 000000000000003f x20: ffff0820e2bc1680\n[47200.280400] x19: ffff0820c970ec80 x18: 00000000000000c0\n[47200.286944] x17: 0000000000000000 x16: ffffb43debe4a0d0\n[47200.293456] x15: fffffc2082990600 x14: dead000000000122\n[47200.300059] x13: ffffffffffffffff x12: 000000000000003e\n[47200.306606] x11: ffff0820815b8080 x10: ffff53e411988000\n[47200.313171] x9 : 0000000000000000 x8 : ffff0820e2bc1700\n[47200.319682] x7 : 0000000000000000 x6 : 000000000000003f\n[47200.326170] x5 : 0000000000000040 x4 : ffff800010e93a20\n[47200.332656] x3 : 0000000000000004 x2 : ffff0820c970ec80\n[47200.339168] x1 : ffff0820e2bc1680 x0 : 0000000000000004\n[47200.346058] Call trace:\n[47200.349324] cpu_rmap_add+0x38/0x40\n[47200.354300] hns3_set_rx_cpu_rmap+0x6c/0xe0 [hns3]\n[47200.362294] hns3_reset_notify_init_enet+0x1cc/0x340 [hns3]\n[47200.370049] hns3_change_channels+0x40/0xb0 [hns3]\n[47200.376770] hns3_set_channels+0x12c/0x2a0 [hns3]\n[47200.383353] ethtool_set_channels+0x140/0x250\n[47200.389772] dev_ethtool+0x714/0x23d0\n[47200.394440] dev_ioctl+0x4cc/0x640\n[47200.399277] sock_do_ioctl+0x100/0x2a0\n[47200.404574] sock_ioctl+0x28c/0x470\n[47200.409079] __arm64_sys_ioctl+0xb4/0x100\n[47200.415217] el0_svc_common.constprop.0+0x84/0x210\n[47200.422088] do_el0_svc+0x28/0x34\n[47200.426387] el0_svc+0x28/0x70\n[47200.431308] el0_sync_handler+0x1a4/0x1b0\n[47200.436477] el0_sync+0x174/0x180\n[47200.441562] Code: 11000405 79000c45 f8247861 d65f03c0 (d4210000)\n[47200.448869] ---[ end trace a01efe4ce42e5f34 ]---\n\nThe process is like below:\nexcuting hns3_client_init\n|\nregister_netdev()\n| hns3_set_channels()\n| |\nhns3_set_rx_cpu_rmap() hns3_reset_notify_uninit_enet()\n| |\n| quit without calling function\n| hns3_free_rx_cpu_rmap for flag\n| HNS3_NIC_STATE_INITED is unset.\n| |\n| hns3_reset_notify_init_enet()\n| |\nset HNS3_NIC_STATE_INITED call hns3_set_rx_cpu_rmap()-- crash\n\nFix it by calling register_netdev() at the end of function\nhns3_client_init().", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47139", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47139", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47139", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47139", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47139", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47139" + } + }, + "CVE-2021-47140": { + "affected_versions": "unk to v5.13-rc4", + "breaks": "", + "cmt_msg": "iommu/amd: Clear DMA ops when switching domain", + "fixes": "d6177a6556f853785867e2ec6d5b7f4906f0d809", + "last_affected_version": "5.12.8", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\niommu/amd: Clear DMA ops when switching domain\n\nSince commit 08a27c1c3ecf (\"iommu: Add support to change default domain\nof an iommu group\") a user can switch a device between IOMMU and direct\nDMA through sysfs. This doesn't work for AMD IOMMU at the moment because\ndev->dma_ops is not cleared when switching from a DMA to an identity\nIOMMU domain. The DMA layer thus attempts to use the dma-iommu ops on an\nidentity domain, causing an oops:\n\n # echo 0000:00:05.0 > /sys/sys/bus/pci/drivers/e1000e/unbind\n # echo identity > /sys/bus/pci/devices/0000:00:05.0/iommu_group/type\n # echo 0000:00:05.0 > /sys/sys/bus/pci/drivers/e1000e/bind\n ...\n BUG: kernel NULL pointer dereference, address: 0000000000000028\n ...\n Call Trace:\n iommu_dma_alloc\n e1000e_setup_tx_resources\n e1000e_open\n\nSince iommu_change_dev_def_domain() calls probe_finalize() again, clear\nthe dma_ops there like Vt-d does.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47140", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47140", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47140", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47140", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47140", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47140" + } + }, + "CVE-2021-47141": { + "affected_versions": "v5.3-rc1 to v5.13-rc4", + "breaks": "893ce44df56580fb878ca5af9c4a5fd87567da50", + "cmt_msg": "gve: Add NULL pointer checks when freeing irqs.", + "fixes": "5218e919c8d06279884aa0baf76778a6817d5b93", + "last_affected_version": "5.12.8", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\ngve: Add NULL pointer checks when freeing irqs.\n\nWhen freeing notification blocks, we index priv->msix_vectors.\nIf we failed to allocate priv->msix_vectors (see abort_with_msix_vectors)\nthis could lead to a NULL pointer dereference if the driver is unloaded.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47141", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47141", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47141", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47141", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47141", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47141" + } + }, + "CVE-2021-47142": { + "affected_versions": "v2.6.12-rc2 to v5.13-rc3", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "drm/amdgpu: Fix a use-after-free", + "fixes": "1e5c37385097c35911b0f8a0c67ffd10ee1af9a2", + "last_affected_version": "5.12.8", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdgpu: Fix a use-after-free\n\nlooks like we forget to set ttm->sg to NULL.\nHit panic below\n\n[ 1235.844104] general protection fault, probably for non-canonical address 0x6b6b6b6b6b6b7b4b: 0000 [#1] SMP DEBUG_PAGEALLOC NOPTI\n[ 1235.989074] Call Trace:\n[ 1235.991751] sg_free_table+0x17/0x20\n[ 1235.995667] amdgpu_ttm_backend_unbind.cold+0x4d/0xf7 [amdgpu]\n[ 1236.002288] amdgpu_ttm_backend_destroy+0x29/0x130 [amdgpu]\n[ 1236.008464] ttm_tt_destroy+0x1e/0x30 [ttm]\n[ 1236.013066] ttm_bo_cleanup_memtype_use+0x51/0xa0 [ttm]\n[ 1236.018783] ttm_bo_release+0x262/0xa50 [ttm]\n[ 1236.023547] ttm_bo_put+0x82/0xd0 [ttm]\n[ 1236.027766] amdgpu_bo_unref+0x26/0x50 [amdgpu]\n[ 1236.032809] amdgpu_amdkfd_gpuvm_alloc_memory_of_gpu+0x7aa/0xd90 [amdgpu]\n[ 1236.040400] kfd_ioctl_alloc_memory_of_gpu+0xe2/0x330 [amdgpu]\n[ 1236.046912] kfd_ioctl+0x463/0x690 [amdgpu]", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47142", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47142", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47142", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47142", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47142", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47142" + } + }, + "CVE-2021-47143": { + "affected_versions": "unk to v5.13-rc4", + "breaks": "", + "cmt_msg": "net/smc: remove device from smcd_dev_list after failed device_add()", + "fixes": "444d7be9532dcfda8e0385226c862fd7e986f607", + "last_affected_version": "5.12.8", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/smc: remove device from smcd_dev_list after failed device_add()\n\nIf the device_add() for a smcd_dev fails, there's no cleanup step that\nrolls back the earlier list_add(). The device subsequently gets freed,\nand we end up with a corrupted list.\n\nAdd some error handling that removes the device from the list.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47143", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47143", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47143", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47143", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47143", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47143" + } + }, + "CVE-2021-47144": { + "affected_versions": "v2.6.12-rc2 to v5.13-rc3", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "drm/amd/amdgpu: fix refcount leak", + "fixes": "fa7e6abc75f3d491bc561734312d065dc9dc2a77", + "last_affected_version": "5.12.8", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/amdgpu: fix refcount leak\n\n[Why]\nthe gem object rfb->base.obj[0] is get according to num_planes\nin amdgpufb_create, but is not put according to num_planes\n\n[How]\nput rfb->base.obj[0] in amdgpu_fbdev_destroy according to num_planes", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47144", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47144", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47144", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47144", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47144", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47144" + } + }, + "CVE-2021-47145": { + "affected_versions": "unk to v5.13-rc3", + "breaks": "", + "cmt_msg": "btrfs: do not BUG_ON in link_to_fixup_dir", + "fixes": "91df99a6eb50d5a1bc70fff4a09a0b7ae6aab96d", + "last_affected_version": "5.12.8", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: do not BUG_ON in link_to_fixup_dir\n\nWhile doing error injection testing I got the following panic\n\n kernel BUG at fs/btrfs/tree-log.c:1862!\n invalid opcode: 0000 [#1] SMP NOPTI\n CPU: 1 PID: 7836 Comm: mount Not tainted 5.13.0-rc1+ #305\n Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.13.0-2.fc32 04/01/2014\n RIP: 0010:link_to_fixup_dir+0xd5/0xe0\n RSP: 0018:ffffb5800180fa30 EFLAGS: 00010216\n RAX: fffffffffffffffb RBX: 00000000fffffffb RCX: ffff8f595287faf0\n RDX: ffffb5800180fa37 RSI: ffff8f5954978800 RDI: 0000000000000000\n RBP: ffff8f5953af9450 R08: 0000000000000019 R09: 0000000000000001\n R10: 000151f408682970 R11: 0000000120021001 R12: ffff8f5954978800\n R13: ffff8f595287faf0 R14: ffff8f5953c77dd0 R15: 0000000000000065\n FS: 00007fc5284c8c40(0000) GS:ffff8f59bbd00000(0000) knlGS:0000000000000000\n CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 00007fc5287f47c0 CR3: 000000011275e002 CR4: 0000000000370ee0\n Call Trace:\n replay_one_buffer+0x409/0x470\n ? btree_read_extent_buffer_pages+0xd0/0x110\n walk_up_log_tree+0x157/0x1e0\n walk_log_tree+0xa6/0x1d0\n btrfs_recover_log_trees+0x1da/0x360\n ? replay_one_extent+0x7b0/0x7b0\n open_ctree+0x1486/0x1720\n btrfs_mount_root.cold+0x12/0xea\n ? __kmalloc_track_caller+0x12f/0x240\n legacy_get_tree+0x24/0x40\n vfs_get_tree+0x22/0xb0\n vfs_kern_mount.part.0+0x71/0xb0\n btrfs_mount+0x10d/0x380\n ? vfs_parse_fs_string+0x4d/0x90\n legacy_get_tree+0x24/0x40\n vfs_get_tree+0x22/0xb0\n path_mount+0x433/0xa10\n __x64_sys_mount+0xe3/0x120\n do_syscall_64+0x3d/0x80\n entry_SYSCALL_64_after_hwframe+0x44/0xae\n\nWe can get -EIO or any number of legitimate errors from\nbtrfs_search_slot(), panicing here is not the appropriate response. The\nerror path for this code handles errors properly, simply return the\nerror.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47145", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47145", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47145", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47145", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47145", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47145" + } + }, + "CVE-2021-47146": { + "affected_versions": "unk to v5.13-rc4", + "breaks": "", + "cmt_msg": "mld: fix panic in mld_newpack()", + "fixes": "020ef930b826d21c5446fdc9db80fd72a791bc21", + "last_affected_version": "5.12.8", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmld: fix panic in mld_newpack()\n\nmld_newpack() doesn't allow to allocate high order page,\nonly order-0 allocation is allowed.\nIf headroom size is too large, a kernel panic could occur in skb_put().\n\nTest commands:\n ip netns del A\n ip netns del B\n ip netns add A\n ip netns add B\n ip link add veth0 type veth peer name veth1\n ip link set veth0 netns A\n ip link set veth1 netns B\n\n ip netns exec A ip link set lo up\n ip netns exec A ip link set veth0 up\n ip netns exec A ip -6 a a 2001:db8:0::1/64 dev veth0\n ip netns exec B ip link set lo up\n ip netns exec B ip link set veth1 up\n ip netns exec B ip -6 a a 2001:db8:0::2/64 dev veth1\n for i in {1..99}\n do\n let A=$i-1\n ip netns exec A ip link add ip6gre$i type ip6gre \\\n\tlocal 2001:db8:$A::1 remote 2001:db8:$A::2 encaplimit 100\n ip netns exec A ip -6 a a 2001:db8:$i::1/64 dev ip6gre$i\n ip netns exec A ip link set ip6gre$i up\n\n ip netns exec B ip link add ip6gre$i type ip6gre \\\n\tlocal 2001:db8:$A::2 remote 2001:db8:$A::1 encaplimit 100\n ip netns exec B ip -6 a a 2001:db8:$i::2/64 dev ip6gre$i\n ip netns exec B ip link set ip6gre$i up\n done\n\nSplat looks like:\nkernel BUG at net/core/skbuff.c:110!\ninvalid opcode: 0000 [#1] SMP DEBUG_PAGEALLOC KASAN PTI\nCPU: 0 PID: 7 Comm: kworker/0:1 Not tainted 5.12.0+ #891\nWorkqueue: ipv6_addrconf addrconf_dad_work\nRIP: 0010:skb_panic+0x15d/0x15f\nCode: 92 fe 4c 8b 4c 24 10 53 8b 4d 70 45 89 e0 48 c7 c7 00 ae 79 83\n41 57 41 56 41 55 48 8b 54 24 a6 26 f9 ff <0f> 0b 48 8b 6c 24 20 89\n34 24 e8 4a 4e 92 fe 8b 34 24 48 c7 c1 20\nRSP: 0018:ffff88810091f820 EFLAGS: 00010282\nRAX: 0000000000000089 RBX: ffff8881086e9000 RCX: 0000000000000000\nRDX: 0000000000000089 RSI: 0000000000000008 RDI: ffffed1020123efb\nRBP: ffff888005f6eac0 R08: ffffed1022fc0031 R09: ffffed1022fc0031\nR10: ffff888117e00187 R11: ffffed1022fc0030 R12: 0000000000000028\nR13: ffff888008284eb0 R14: 0000000000000ed8 R15: 0000000000000ec0\nFS: 0000000000000000(0000) GS:ffff888117c00000(0000)\nknlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007f8b801c5640 CR3: 0000000033c2c006 CR4: 00000000003706f0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n ? ip6_mc_hdr.isra.26.constprop.46+0x12a/0x600\n ? ip6_mc_hdr.isra.26.constprop.46+0x12a/0x600\n skb_put.cold.104+0x22/0x22\n ip6_mc_hdr.isra.26.constprop.46+0x12a/0x600\n ? rcu_read_lock_sched_held+0x91/0xc0\n mld_newpack+0x398/0x8f0\n ? ip6_mc_hdr.isra.26.constprop.46+0x600/0x600\n ? lock_contended+0xc40/0xc40\n add_grhead.isra.33+0x280/0x380\n add_grec+0x5ca/0xff0\n ? mld_sendpack+0xf40/0xf40\n ? lock_downgrade+0x690/0x690\n mld_send_initial_cr.part.34+0xb9/0x180\n ipv6_mc_dad_complete+0x15d/0x1b0\n addrconf_dad_completed+0x8d2/0xbb0\n ? lock_downgrade+0x690/0x690\n ? addrconf_rs_timer+0x660/0x660\n ? addrconf_dad_work+0x73c/0x10e0\n addrconf_dad_work+0x73c/0x10e0\n\nAllowing high order page allocation could fix this problem.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47146", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47146", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47146", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47146", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47146", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47146" + } + }, + "CVE-2021-47147": { + "affected_versions": "unk to v5.13-rc4", + "breaks": "", + "cmt_msg": "ptp: ocp: Fix a resource leak in an error handling path", + "fixes": "9c1bb37f8cad5e2ee1933fa1da9a6baa7876a8e4", + "last_affected_version": "5.12.8", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nptp: ocp: Fix a resource leak in an error handling path\n\nIf an error occurs after a successful 'pci_ioremap_bar()' call, it must be\nundone by a corresponding 'pci_iounmap()' call, as already done in the\nremove function.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47147", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47147", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47147", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47147", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47147", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47147" + } + }, + "CVE-2021-47148": { + "affected_versions": "v5.12-rc1-dontuse to v5.13-rc4", + "breaks": "81a4362016e7d8b17031fe1aa43cdb58a7f0f163", + "cmt_msg": "octeontx2-pf: fix a buffer overflow in otx2_set_rxfh_context()", + "fixes": "e5cc361e21648b75f935f9571d4003aaee480214", + "last_affected_version": "5.12.8", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nocteontx2-pf: fix a buffer overflow in otx2_set_rxfh_context()\n\nThis function is called from ethtool_set_rxfh() and \"*rss_context\"\ncomes from the user. Add some bounds checking to prevent memory\ncorruption.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47148", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47148", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47148", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47148", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47148", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47148" + } + }, + "CVE-2021-47149": { + "affected_versions": "v2.6.12-rc2 to v5.13-rc3", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "net: fujitsu: fix potential null-ptr-deref", + "fixes": "52202be1cd996cde6e8969a128dc27ee45a7cb5e", + "last_affected_version": "5.12.8", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: fujitsu: fix potential null-ptr-deref\n\nIn fmvj18x_get_hwinfo(), if ioremap fails there will be NULL pointer\nderef. To fix this, check the return value of ioremap and return -1\nto the caller in case of failure.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47149", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47149", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47149", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47149", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47149", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47149" + } + }, + "CVE-2021-47150": { + "affected_versions": "v3.18-rc1 to v5.13-rc4", + "breaks": "59d0f746564495c7f54526674deabfcf101236a1", + "cmt_msg": "net: fec: fix the potential memory leak in fec_enet_init()", + "fixes": "619fee9eb13b5d29e4267cb394645608088c28a8", + "last_affected_version": "5.12.8", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: fec: fix the potential memory leak in fec_enet_init()\n\nIf the memory allocated for cbd_base is failed, it should\nfree the memory allocated for the queues, otherwise it causes\nmemory leak.\n\nAnd if the memory allocated for the queues is failed, it can\nreturn error directly.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47150", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47150", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47150", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47150", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47150", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47150" + } + }, + "CVE-2021-47151": { + "affected_versions": "unk to v5.13-rc4", + "breaks": "", + "cmt_msg": "interconnect: qcom: bcm-voter: add a missing of_node_put()", + "fixes": "a00593737f8bac2c9e97b696e7ff84a4446653e8", + "last_affected_version": "5.12.8", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\ninterconnect: qcom: bcm-voter: add a missing of_node_put()\n\nAdd a missing of_node_put() in of_bcm_voter_get() to avoid the\nreference leak.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47151", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47151", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47151", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47151", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47151", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47151" + } + }, + "CVE-2021-47152": { + "affected_versions": "v5.7-rc1 to v5.13-rc4", + "breaks": "18b683bff89d46ace55f12d00c0440d44d6160c4", + "cmt_msg": "mptcp: fix data stream corruption", + "fixes": "29249eac5225429b898f278230a6ca2baa1ae154", + "last_affected_version": "5.12.8", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmptcp: fix data stream corruption\n\nMaxim reported several issues when forcing a TCP transparent proxy\nto use the MPTCP protocol for the inbound connections. He also\nprovided a clean reproducer.\n\nThe problem boils down to 'mptcp_frag_can_collapse_to()' assuming\nthat only MPTCP will use the given page_frag.\n\nIf others - e.g. the plain TCP protocol - allocate page fragments,\nwe can end-up re-using already allocated memory for mptcp_data_frag.\n\nFix the issue ensuring that the to-be-expanded data fragment is\nlocated at the current page frag end.\n\nv1 -> v2:\n - added missing fixes tag (Mat)", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47152", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47152", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47152", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47152", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47152", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47152" + } + }, + "CVE-2021-47153": { + "affected_versions": "v3.6-rc1 to v5.13-rc4", + "breaks": "636752bcb5177a301d0266270661581de8624828", + "cmt_msg": "i2c: i801: Don't generate an interrupt on bus reset", + "fixes": "e4d8716c3dcec47f1557024add24e1f3c09eb24b", + "last_affected_version": "5.12.8", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\ni2c: i801: Don't generate an interrupt on bus reset\n\nNow that the i2c-i801 driver supports interrupts, setting the KILL bit\nin a attempt to recover from a timed out transaction triggers an\ninterrupt. Unfortunately, the interrupt handler (i801_isr) is not\nprepared for this situation and will try to process the interrupt as\nif it was signaling the end of a successful transaction. In the case\nof a block transaction, this can result in an out-of-range memory\naccess.\n\nThis condition was reproduced several times by syzbot:\nhttps://syzkaller.appspot.com/bug?extid=ed71512d469895b5b34e\nhttps://syzkaller.appspot.com/bug?extid=8c8dedc0ba9e03f6c79e\nhttps://syzkaller.appspot.com/bug?extid=c8ff0b6d6c73d81b610e\nhttps://syzkaller.appspot.com/bug?extid=33f6c360821c399d69eb\nhttps://syzkaller.appspot.com/bug?extid=be15dc0b1933f04b043a\nhttps://syzkaller.appspot.com/bug?extid=b4d3fd1dfd53e90afd79\n\nSo disable interrupts while trying to reset the bus. Interrupts will\nbe enabled again for the following transaction.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47153", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47153", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47153", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47153", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47153", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47153" + } + }, + "CVE-2021-47158": { + "affected_versions": "unk to v5.13-rc4", + "breaks": "", + "cmt_msg": "net: dsa: sja1105: add error handling in sja1105_setup()", + "fixes": "cec279a898a3b004411682f212215ccaea1cd0fb", + "last_affected_version": "5.12.8", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: dsa: sja1105: add error handling in sja1105_setup()\n\nIf any of sja1105_static_config_load(), sja1105_clocking_setup() or\nsja1105_devlink_setup() fails, we can't just return in the middle of\nsja1105_setup() or memory will leak. Add a cleanup path.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47158", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47158", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47158", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47158", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47158", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47158" + } + }, + "CVE-2021-47159": { + "affected_versions": "v4.7-rc1 to v5.13-rc4", + "breaks": "badf3ada60ab8f76f9488dc8f5c0c57f70682f5a", + "cmt_msg": "net: dsa: fix a crash if ->get_sset_count() fails", + "fixes": "a269333fa5c0c8e53c92b5a28a6076a28cde3e83", + "last_affected_version": "5.12.8", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: dsa: fix a crash if ->get_sset_count() fails\n\nIf ds->ops->get_sset_count() fails then it \"count\" is a negative error\ncode such as -EOPNOTSUPP. Because \"i\" is an unsigned int, the negative\nerror code is type promoted to a very high value and the loop will\ncorrupt memory until the system crashes.\n\nFix this by checking for error codes and changing the type of \"i\" to\njust int.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47159", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47159", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47159", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47159", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47159", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47159" + } + }, + "CVE-2021-47160": { + "affected_versions": "unk to v5.13-rc4", + "breaks": "", + "cmt_msg": "net: dsa: mt7530: fix VLAN traffic leaks", + "fixes": "474a2ddaa192777522a7499784f1d60691cd831a", + "last_affected_version": "5.12.8", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: dsa: mt7530: fix VLAN traffic leaks\n\nPCR_MATRIX field was set to all 1's when VLAN filtering is enabled, but\nwas not reset when it is disabled, which may cause traffic leaks:\n\n\tip link add br0 type bridge vlan_filtering 1\n\tip link add br1 type bridge vlan_filtering 1\n\tip link set swp0 master br0\n\tip link set swp1 master br1\n\tip link set br0 type bridge vlan_filtering 0\n\tip link set br1 type bridge vlan_filtering 0\n\t# traffic in br0 and br1 will start leaking to each other\n\nAs port_bridge_{add,del} have set up PCR_MATRIX properly, remove the\nPCR_MATRIX write from mt7530_port_set_vlan_aware.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47160", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47160", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47160", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47160", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47160", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47160" + } + }, + "CVE-2021-47161": { + "affected_versions": "v4.10-rc1 to v5.13-rc4", + "breaks": "90ba37033cb94207e97c4ced9be575770438213b", + "cmt_msg": "spi: spi-fsl-dspi: Fix a resource leak in an error handling path", + "fixes": "680ec0549a055eb464dce6ffb4bfb736ef87236e", + "last_affected_version": "5.12.8", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nspi: spi-fsl-dspi: Fix a resource leak in an error handling path\n\n'dspi_request_dma()' should be undone by a 'dspi_release_dma()' call in the\nerror handling path of the probe function, as already done in the remove\nfunction", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47161", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47161", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47161", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47161", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47161", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47161" + } + }, + "CVE-2021-47162": { + "affected_versions": "v4.3 to v5.13-rc4", + "breaks": "45c8b7b175ceb2d542e0fe15247377bf3bce29ec", + "cmt_msg": "tipc: skb_linearize the head skb when reassembling msgs", + "fixes": "b7df21cf1b79ab7026f545e7bf837bd5750ac026", + "last_affected_version": "5.12.8", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntipc: skb_linearize the head skb when reassembling msgs\n\nIt's not a good idea to append the frag skb to a skb's frag_list if\nthe frag_list already has skbs from elsewhere, such as this skb was\ncreated by pskb_copy() where the frag_list was cloned (all the skbs\nin it were skb_get'ed) and shared by multiple skbs.\n\nHowever, the new appended frag skb should have been only seen by the\ncurrent skb. Otherwise, it will cause use after free crashes as this\nappended frag skb are seen by multiple skbs but it only got skb_get\ncalled once.\n\nThe same thing happens with a skb updated by pskb_may_pull() with a\nskb_cloned skb. Li Shuang has reported quite a few crashes caused\nby this when doing testing over macvlan devices:\n\n [] kernel BUG at net/core/skbuff.c:1970!\n [] Call Trace:\n [] skb_clone+0x4d/0xb0\n [] macvlan_broadcast+0xd8/0x160 [macvlan]\n [] macvlan_process_broadcast+0x148/0x150 [macvlan]\n [] process_one_work+0x1a7/0x360\n [] worker_thread+0x30/0x390\n\n [] kernel BUG at mm/usercopy.c:102!\n [] Call Trace:\n [] __check_heap_object+0xd3/0x100\n [] __check_object_size+0xff/0x16b\n [] simple_copy_to_iter+0x1c/0x30\n [] __skb_datagram_iter+0x7d/0x310\n [] __skb_datagram_iter+0x2a5/0x310\n [] skb_copy_datagram_iter+0x3b/0x90\n [] tipc_recvmsg+0x14a/0x3a0 [tipc]\n [] ____sys_recvmsg+0x91/0x150\n [] ___sys_recvmsg+0x7b/0xc0\n\n [] kernel BUG at mm/slub.c:305!\n [] Call Trace:\n [] \n [] kmem_cache_free+0x3ff/0x400\n [] __netif_receive_skb_core+0x12c/0xc40\n [] ? kmem_cache_alloc+0x12e/0x270\n [] netif_receive_skb_internal+0x3d/0xb0\n [] ? get_rx_page_info+0x8e/0xa0 [be2net]\n [] be_poll+0x6ef/0xd00 [be2net]\n [] ? irq_exit+0x4f/0x100\n [] net_rx_action+0x149/0x3b0\n\n ...\n\nThis patch is to fix it by linearizing the head skb if it has frag_list\nset in tipc_buf_append(). Note that we choose to do this before calling\nskb_unshare(), as __skb_linearize() will avoid skb_copy(). Also, we can\nnot just drop the frag_list either as the early time.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47162", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47162", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47162", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47162", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47162", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47162" + } + }, + "CVE-2021-47163": { + "affected_versions": "v4.1-rc1 to v5.13-rc4", + "breaks": "d0f91938bede204a343473792529e0db7d599836", + "cmt_msg": "tipc: wait and exit until all work queues are done", + "fixes": "04c26faa51d1e2fe71cf13c45791f5174c37f986", + "last_affected_version": "5.12.8", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntipc: wait and exit until all work queues are done\n\nOn some host, a crash could be triggered simply by repeating these\ncommands several times:\n\n # modprobe tipc\n # tipc bearer enable media udp name UDP1 localip 127.0.0.1\n # rmmod tipc\n\n [] BUG: unable to handle kernel paging request at ffffffffc096bb00\n [] Workqueue: events 0xffffffffc096bb00\n [] Call Trace:\n [] ? process_one_work+0x1a7/0x360\n [] ? worker_thread+0x30/0x390\n [] ? create_worker+0x1a0/0x1a0\n [] ? kthread+0x116/0x130\n [] ? kthread_flush_work_fn+0x10/0x10\n [] ? ret_from_fork+0x35/0x40\n\nWhen removing the TIPC module, the UDP tunnel sock will be delayed to\nrelease in a work queue as sock_release() can't be done in rtnl_lock().\nIf the work queue is schedule to run after the TIPC module is removed,\nkernel will crash as the work queue function cleanup_beareri() code no\nlonger exists when trying to invoke it.\n\nTo fix it, this patch introduce a member wq_count in tipc_net to track\nthe numbers of work queues in schedule, and wait and exit until all\nwork queues are done in tipc_exit_net().", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47163", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47163", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47163", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47163", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47163", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47163" + } + }, + "CVE-2021-47164": { + "affected_versions": "v5.8-rc1 to v5.13-rc4", + "breaks": "7e51891a237f9ea319f53f9beb83afb0077d88e6", + "cmt_msg": "net/mlx5e: Fix null deref accessing lag dev", + "fixes": "83026d83186bc48bb41ee4872f339b83f31dfc55", + "last_affected_version": "5.12.8", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5e: Fix null deref accessing lag dev\n\nIt could be the lag dev is null so stop processing the event.\nIn bond_enslave() the active/backup slave being set before setting the\nupper dev so first event is without an upper dev.\nAfter setting the upper dev with bond_master_upper_dev_link() there is\na second event and in that event we have an upper dev.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47164", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47164", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47164", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47164", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47164", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47164" + } + }, + "CVE-2021-47165": { + "affected_versions": "unk to v5.13-rc4", + "breaks": "", + "cmt_msg": "drm/meson: fix shutdown crash when component not probed", + "fixes": "7cfc4ea78fc103ea51ecbacd9236abb5b1c490d2", + "last_affected_version": "5.12.8", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/meson: fix shutdown crash when component not probed\n\nWhen main component is not probed, by example when the dw-hdmi module is\nnot loaded yet or in probe defer, the following crash appears on shutdown:\n\nUnable to handle kernel NULL pointer dereference at virtual address 0000000000000038\n...\npc : meson_drv_shutdown+0x24/0x50\nlr : platform_drv_shutdown+0x20/0x30\n...\nCall trace:\nmeson_drv_shutdown+0x24/0x50\nplatform_drv_shutdown+0x20/0x30\ndevice_shutdown+0x158/0x360\nkernel_restart_prepare+0x38/0x48\nkernel_restart+0x18/0x68\n__do_sys_reboot+0x224/0x250\n__arm64_sys_reboot+0x24/0x30\n...\n\nSimply check if the priv struct has been allocated before using it.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47165", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47165", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47165", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47165", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47165", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47165" + } + }, + "CVE-2021-47166": { + "affected_versions": "v4.0-rc1 to v5.13-rc4", + "breaks": "a7d42ddb3099727f58366fa006f850a219cce6c8", + "cmt_msg": "NFS: Don't corrupt the value of pg_bytes_written in nfs_do_recoalesce()", + "fixes": "0d0ea309357dea0d85a82815f02157eb7fcda39f", + "last_affected_version": "5.12.8", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nNFS: Don't corrupt the value of pg_bytes_written in nfs_do_recoalesce()\n\nThe value of mirror->pg_bytes_written should only be updated after a\nsuccessful attempt to flush out the requests on the list.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47166", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47166", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47166", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47166", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47166", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47166" + } + }, + "CVE-2021-47167": { + "affected_versions": "v4.0-rc1 to v5.13-rc4", + "breaks": "a7d42ddb3099727f58366fa006f850a219cce6c8", + "cmt_msg": "NFS: Fix an Oopsable condition in __nfs_pageio_add_request()", + "fixes": "56517ab958b7c11030e626250c00b9b1a24b41eb", + "last_affected_version": "5.12.8", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nNFS: Fix an Oopsable condition in __nfs_pageio_add_request()\n\nEnsure that nfs_pageio_error_cleanup() resets the mirror array contents,\nso that the structure reflects the fact that it is now empty.\nAlso change the test in nfs_pageio_do_add_request() to be more robust by\nchecking whether or not the list is empty rather than relying on the\nvalue of pg_count.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47167", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47167", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47167", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47167", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47167", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47167" + } + }, + "CVE-2021-47168": { + "affected_versions": "v2.6.37-rc1 to v5.13-rc4", + "breaks": "16b374ca439fb406e46e071f75428f5b033056f8", + "cmt_msg": "NFS: fix an incorrect limit in filelayout_decode_layout()", + "fixes": "769b01ea68b6c49dc3cde6adf7e53927dacbd3a8", + "last_affected_version": "5.12.8", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nNFS: fix an incorrect limit in filelayout_decode_layout()\n\nThe \"sizeof(struct nfs_fh)\" is two bytes too large and could lead to\nmemory corruption. It should be NFS_MAXFHSIZE because that's the size\nof the ->data[] buffer.\n\nI reversed the size of the arguments to put the variable on the left.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47168", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47168", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47168", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47168", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47168", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47168" + } + }, + "CVE-2021-47169": { + "affected_versions": "v2.6.12-rc2 to v5.13-rc4", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "serial: rp2: use 'request_firmware' instead of 'request_firmware_nowait'", + "fixes": "016002848c82eeb5d460489ce392d91fe18c475c", + "last_affected_version": "5.12.8", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nserial: rp2: use 'request_firmware' instead of 'request_firmware_nowait'\n\nIn 'rp2_probe', the driver registers 'rp2_uart_interrupt' then calls\n'rp2_fw_cb' through 'request_firmware_nowait'. In 'rp2_fw_cb', if the\nfirmware don't exists, function just return without initializing ports\nof 'rp2_card'. But now the interrupt handler function has been\nregistered, and when an interrupt comes, 'rp2_uart_interrupt' may access\nthose ports then causing NULL pointer dereference or other bugs.\n\nBecause the driver does some initialization work in 'rp2_fw_cb', in\norder to make the driver ready to handle interrupts, 'request_firmware'\nshould be used instead of asynchronous 'request_firmware_nowait'.\n\nThis report reveals it:\n\nINFO: trying to register non-static key.\nthe code is fine but needs lockdep annotation.\nturning off the locking correctness validator.\nCPU: 2 PID: 0 Comm: swapper/2 Not tainted 4.19.177-gdba4159c14ef-dirty #45\nHardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.12.0-59-\ngc9ba5276e321-prebuilt.qemu.org 04/01/2014\nCall Trace:\n \n __dump_stack lib/dump_stack.c:77 [inline]\n dump_stack+0xec/0x156 lib/dump_stack.c:118\n assign_lock_key kernel/locking/lockdep.c:727 [inline]\n register_lock_class+0x14e5/0x1ba0 kernel/locking/lockdep.c:753\n __lock_acquire+0x187/0x3750 kernel/locking/lockdep.c:3303\n lock_acquire+0x124/0x340 kernel/locking/lockdep.c:3907\n __raw_spin_lock include/linux/spinlock_api_smp.h:142 [inline]\n _raw_spin_lock+0x32/0x50 kernel/locking/spinlock.c:144\n spin_lock include/linux/spinlock.h:329 [inline]\n rp2_ch_interrupt drivers/tty/serial/rp2.c:466 [inline]\n rp2_asic_interrupt.isra.9+0x15d/0x990 drivers/tty/serial/rp2.c:493\n rp2_uart_interrupt+0x49/0xe0 drivers/tty/serial/rp2.c:504\n __handle_irq_event_percpu+0xfb/0x770 kernel/irq/handle.c:149\n handle_irq_event_percpu+0x79/0x150 kernel/irq/handle.c:189\n handle_irq_event+0xac/0x140 kernel/irq/handle.c:206\n handle_fasteoi_irq+0x232/0x5c0 kernel/irq/chip.c:725\n generic_handle_irq_desc include/linux/irqdesc.h:155 [inline]\n handle_irq+0x230/0x3a0 arch/x86/kernel/irq_64.c:87\n do_IRQ+0xa7/0x1e0 arch/x86/kernel/irq.c:247\n common_interrupt+0xf/0xf arch/x86/entry/entry_64.S:670\n \nRIP: 0010:native_safe_halt+0x28/0x30 arch/x86/include/asm/irqflags.h:61\nCode: 00 00 55 be 04 00 00 00 48 c7 c7 00 c2 2f 8c 48 89 e5 e8 fb 31 e7 f8\n8b 05 75 af 8d 03 85 c0 7e 07 0f 00 2d 8a 61 65 00 fb f4 <5d> c3 90 90 90\n90 90 90 0f 1f 44 00 00 55 48 89 e5 41 57 41 56 41\nRSP: 0018:ffff88806b71fcc8 EFLAGS: 00000246 ORIG_RAX: ffffffffffffffde\nRAX: 0000000000000000 RBX: ffffffff8bde7e48 RCX: ffffffff88a21285\nRDX: 0000000000000000 RSI: 0000000000000004 RDI: ffffffff8c2fc200\nRBP: ffff88806b71fcc8 R08: fffffbfff185f840 R09: fffffbfff185f840\nR10: 0000000000000001 R11: fffffbfff185f840 R12: 0000000000000002\nR13: ffffffff8bea18a0 R14: 0000000000000000 R15: 0000000000000000\n arch_safe_halt arch/x86/include/asm/paravirt.h:94 [inline]\n default_idle+0x6f/0x360 arch/x86/kernel/process.c:557\n arch_cpu_idle+0xf/0x20 arch/x86/kernel/process.c:548\n default_idle_call+0x3b/0x60 kernel/sched/idle.c:93\n cpuidle_idle_call kernel/sched/idle.c:153 [inline]\n do_idle+0x2ab/0x3c0 kernel/sched/idle.c:263\n cpu_startup_entry+0xcb/0xe0 kernel/sched/idle.c:369\n start_secondary+0x3b8/0x4e0 arch/x86/kernel/smpboot.c:271\n secondary_startup_64+0xa4/0xb0 arch/x86/kernel/head_64.S:243\nBUG: unable to handle kernel NULL pointer dereference at 0000000000000010\nPGD 8000000056d27067 P4D 8000000056d27067 PUD 56d28067 PMD 0\nOops: 0000 [#1] PREEMPT SMP KASAN PTI\nCPU: 2 PID: 0 Comm: swapper/2 Not tainted 4.19.177-gdba4159c14ef-dirty #45\nHardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.12.0-59-\ngc9ba5276e321-prebuilt.qemu.org 04/01/2014\nRIP: 0010:readl arch/x86/include/asm/io.h:59 [inline]\nRIP: 0010:rp2_ch_interrupt drivers/tty/serial/rp2.c:472 [inline]\nRIP: 0010:rp2_asic_interrupt.isra.9+0x181/0x990 drivers/tty/serial/rp2.c:\n493\nCo\n---truncated---", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47169", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47169", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47169", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47169", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47169", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47169" + } + }, + "CVE-2021-47170": { + "affected_versions": "v2.6.12-rc2 to v5.13-rc4", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "USB: usbfs: Don't WARN about excessively large memory allocations", + "fixes": "4f2629ea67e7225c3fd292c7fe4f5b3c9d6392de", + "last_affected_version": "5.12.8", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nUSB: usbfs: Don't WARN about excessively large memory allocations\n\nSyzbot found that the kernel generates a WARNing if the user tries to\nsubmit a bulk transfer through usbfs with a buffer that is way too\nlarge. This isn't a bug in the kernel; it's merely an invalid request\nfrom the user and the usbfs code does handle it correctly.\n\nIn theory the same thing can happen with async transfers, or with the\npacket descriptor table for isochronous transfers.\n\nTo prevent the MM subsystem from complaining about these bad\nallocation requests, add the __GFP_NOWARN flag to the kmalloc calls\nfor these buffers.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47170", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47170", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47170", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47170", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47170", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47170" + } + }, + "CVE-2021-47171": { + "affected_versions": "v2.6.34-rc2 to v5.13-rc4", + "breaks": "d0cad871703b898a442e4049c532ec39168e5b57", + "cmt_msg": "net: usb: fix memory leak in smsc75xx_bind", + "fixes": "46a8b29c6306d8bbfd92b614ef65a47c900d8e70", + "last_affected_version": "5.12.8", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: usb: fix memory leak in smsc75xx_bind\n\nSyzbot reported memory leak in smsc75xx_bind().\nThe problem was is non-freed memory in case of\nerrors after memory allocation.\n\nbacktrace:\n [] kmalloc include/linux/slab.h:556 [inline]\n [] kzalloc include/linux/slab.h:686 [inline]\n [] smsc75xx_bind+0x7a/0x334 drivers/net/usb/smsc75xx.c:1460\n [] usbnet_probe+0x3b6/0xc30 drivers/net/usb/usbnet.c:1728", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47171", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47171", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47171", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47171", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47171", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47171" + } + }, + "CVE-2021-47172": { + "affected_versions": "unk to v5.13-rc4", + "breaks": "", + "cmt_msg": "iio: adc: ad7124: Fix potential overflow due to non sequential channel numbers", + "fixes": "f2a772c51206b0c3f262e4f6a3812c89a650191b", + "last_affected_version": "5.12.8", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\niio: adc: ad7124: Fix potential overflow due to non sequential channel numbers\n\nChannel numbering must start at 0 and then not have any holes, or\nit is possible to overflow the available storage. Note this bug was\nintroduced as part of a fix to ensure we didn't rely on the ordering\nof child nodes. So we need to support arbitrary ordering but they all\nneed to be there somewhere.\n\nNote I hit this when using qemu to test the rest of this series.\nArguably this isn't the best fix, but it is probably the most minimal\noption for backporting etc.\n\nAlexandru's sign-off is here because he carried this patch in a larger\nset that Jonathan then applied.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47172", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47172", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47172", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47172", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47172", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47172" + } + }, + "CVE-2021-47173": { + "affected_versions": "unk to v5.13-rc4", + "breaks": "", + "cmt_msg": "misc/uss720: fix memory leak in uss720_probe", + "fixes": "dcb4b8ad6a448532d8b681b5d1a7036210b622de", + "last_affected_version": "5.12.8", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmisc/uss720: fix memory leak in uss720_probe\n\nuss720_probe forgets to decrease the refcount of usbdev in uss720_probe.\nFix this by decreasing the refcount of usbdev by usb_put_dev.\n\nBUG: memory leak\nunreferenced object 0xffff888101113800 (size 2048):\n comm \"kworker/0:1\", pid 7, jiffies 4294956777 (age 28.870s)\n hex dump (first 32 bytes):\n ff ff ff ff 31 00 00 00 00 00 00 00 00 00 00 00 ....1...........\n 00 00 00 00 00 00 00 00 00 00 00 00 03 00 00 00 ................\n backtrace:\n [] kmalloc include/linux/slab.h:554 [inline]\n [] kzalloc include/linux/slab.h:684 [inline]\n [] usb_alloc_dev+0x32/0x450 drivers/usb/core/usb.c:582\n [] hub_port_connect drivers/usb/core/hub.c:5129 [inline]\n [] hub_port_connect_change drivers/usb/core/hub.c:5363 [inline]\n [] port_event drivers/usb/core/hub.c:5509 [inline]\n [] hub_event+0x1171/0x20c0 drivers/usb/core/hub.c:5591\n [] process_one_work+0x2c9/0x600 kernel/workqueue.c:2275\n [] worker_thread+0x59/0x5d0 kernel/workqueue.c:2421\n [] kthread+0x178/0x1b0 kernel/kthread.c:292\n [] ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:294", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47173", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47173", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47173", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47173", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47173", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47173" + } + }, + "CVE-2021-47174": { + "affected_versions": "v5.7-rc1 to v5.13-rc4", + "breaks": "7400b063969bdca4a06cd97f1294d765c8eecbe1", + "cmt_msg": "netfilter: nft_set_pipapo_avx2: Add irq_fpu_usable() check, fallback to non-AVX2 version", + "fixes": "f0b3d338064e1fe7531f0d2977e35f3b334abfb4", + "last_affected_version": "5.12.8", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nft_set_pipapo_avx2: Add irq_fpu_usable() check, fallback to non-AVX2 version\n\nArturo reported this backtrace:\n\n[709732.358791] WARNING: CPU: 3 PID: 456 at arch/x86/kernel/fpu/core.c:128 kernel_fpu_begin_mask+0xae/0xe0\n[709732.358793] Modules linked in: binfmt_misc nft_nat nft_chain_nat nf_nat nft_counter nft_ct nf_tables nf_conntrack_netlink nfnetlink 8021q garp stp mrp llc vrf intel_rapl_msr intel_rapl_common skx_edac nfit libnvdimm ipmi_ssif x86_pkg_temp_thermal intel_powerclamp coretemp crc32_pclmul mgag200 ghash_clmulni_intel drm_kms_helper cec aesni_intel drm libaes crypto_simd cryptd glue_helper mei_me dell_smbios iTCO_wdt evdev intel_pmc_bxt iTCO_vendor_support dcdbas pcspkr rapl dell_wmi_descriptor wmi_bmof sg i2c_algo_bit watchdog mei acpi_ipmi ipmi_si button nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 ipmi_devintf ipmi_msghandler ip_tables x_tables autofs4 ext4 crc16 mbcache jbd2 dm_mod raid10 raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx xor sd_mod t10_pi crc_t10dif crct10dif_generic raid6_pq libcrc32c crc32c_generic raid1 raid0 multipath linear md_mod ahci libahci tg3 libata xhci_pci libphy xhci_hcd ptp usbcore crct10dif_pclmul crct10dif_common bnxt_en crc32c_intel scsi_mod\n[709732.358941] pps_core i2c_i801 lpc_ich i2c_smbus wmi usb_common\n[709732.358957] CPU: 3 PID: 456 Comm: jbd2/dm-0-8 Not tainted 5.10.0-0.bpo.5-amd64 #1 Debian 5.10.24-1~bpo10+1\n[709732.358959] Hardware name: Dell Inc. PowerEdge R440/04JN2K, BIOS 2.9.3 09/23/2020\n[709732.358964] RIP: 0010:kernel_fpu_begin_mask+0xae/0xe0\n[709732.358969] Code: ae 54 24 04 83 e3 01 75 38 48 8b 44 24 08 65 48 33 04 25 28 00 00 00 75 33 48 83 c4 10 5b c3 65 8a 05 5e 21 5e 76 84 c0 74 92 <0f> 0b eb 8e f0 80 4f 01 40 48 81 c7 00 14 00 00 e8 dd fb ff ff eb\n[709732.358972] RSP: 0018:ffffbb9700304740 EFLAGS: 00010202\n[709732.358976] RAX: 0000000000000001 RBX: 0000000000000003 RCX: 0000000000000001\n[709732.358979] RDX: ffffbb9700304970 RSI: ffff922fe1952e00 RDI: 0000000000000003\n[709732.358981] RBP: ffffbb9700304970 R08: ffff922fc868a600 R09: ffff922fc711e462\n[709732.358984] R10: 000000000000005f R11: ffff922ff0b27180 R12: ffffbb9700304960\n[709732.358987] R13: ffffbb9700304b08 R14: ffff922fc664b6c8 R15: ffff922fc664b660\n[709732.358990] FS: 0000000000000000(0000) GS:ffff92371fec0000(0000) knlGS:0000000000000000\n[709732.358993] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[709732.358996] CR2: 0000557a6655bdd0 CR3: 000000026020a001 CR4: 00000000007706e0\n[709732.358999] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n[709732.359001] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n[709732.359003] PKRU: 55555554\n[709732.359005] Call Trace:\n[709732.359009] \n[709732.359035] nft_pipapo_avx2_lookup+0x4c/0x1cba [nf_tables]\n[709732.359046] ? sched_clock+0x5/0x10\n[709732.359054] ? sched_clock_cpu+0xc/0xb0\n[709732.359061] ? record_times+0x16/0x80\n[709732.359068] ? plist_add+0xc1/0x100\n[709732.359073] ? psi_group_change+0x47/0x230\n[709732.359079] ? skb_clone+0x4d/0xb0\n[709732.359085] ? enqueue_task_rt+0x22b/0x310\n[709732.359098] ? bnxt_start_xmit+0x1e8/0xaf0 [bnxt_en]\n[709732.359102] ? packet_rcv+0x40/0x4a0\n[709732.359121] nft_lookup_eval+0x59/0x160 [nf_tables]\n[709732.359133] nft_do_chain+0x350/0x500 [nf_tables]\n[709732.359152] ? nft_lookup_eval+0x59/0x160 [nf_tables]\n[709732.359163] ? nft_do_chain+0x364/0x500 [nf_tables]\n[709732.359172] ? fib4_rule_action+0x6d/0x80\n[709732.359178] ? fib_rules_lookup+0x107/0x250\n[709732.359184] nft_nat_do_chain+0x8a/0xf2 [nft_chain_nat]\n[709732.359193] nf_nat_inet_fn+0xea/0x210 [nf_nat]\n[709732.359202] nf_nat_ipv4_out+0x14/0xa0 [nf_nat]\n[709732.359207] nf_hook_slow+0x44/0xc0\n[709732.359214] ip_output+0xd2/0x100\n[709732.359221] ? __ip_finish_output+0x210/0x210\n[709732.359226] ip_forward+0x37d/0x4a0\n[709732.359232] ? ip4_key_hashfn+0xb0/0xb0\n[709732.359238] ip_subli\n---truncated---", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47174", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47174", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47174", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47174", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47174", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47174" + } + }, + "CVE-2021-47175": { + "affected_versions": "unk to v5.13-rc4", + "breaks": "", + "cmt_msg": "net/sched: fq_pie: fix OOB access in the traffic path", + "fixes": "e70f7a11876a1a788ceadf75e9e5f7af2c868680", + "last_affected_version": "5.12.8", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: fq_pie: fix OOB access in the traffic path\n\nthe following script:\n\n # tc qdisc add dev eth0 handle 0x1 root fq_pie flows 2\n # tc qdisc add dev eth0 clsact\n # tc filter add dev eth0 egress matchall action skbedit priority 0x10002\n # ping 192.0.2.2 -I eth0 -c2 -w1 -q\n\nproduces the following splat:\n\n BUG: KASAN: slab-out-of-bounds in fq_pie_qdisc_enqueue+0x1314/0x19d0 [sch_fq_pie]\n Read of size 4 at addr ffff888171306924 by task ping/942\n\n CPU: 3 PID: 942 Comm: ping Not tainted 5.12.0+ #441\n Hardware name: Red Hat KVM, BIOS 1.11.1-4.module+el8.1.0+4066+0f1aadab 04/01/2014\n Call Trace:\n dump_stack+0x92/0xc1\n print_address_description.constprop.7+0x1a/0x150\n kasan_report.cold.13+0x7f/0x111\n fq_pie_qdisc_enqueue+0x1314/0x19d0 [sch_fq_pie]\n __dev_queue_xmit+0x1034/0x2b10\n ip_finish_output2+0xc62/0x2120\n __ip_finish_output+0x553/0xea0\n ip_output+0x1ca/0x4d0\n ip_send_skb+0x37/0xa0\n raw_sendmsg+0x1c4b/0x2d00\n sock_sendmsg+0xdb/0x110\n __sys_sendto+0x1d7/0x2b0\n __x64_sys_sendto+0xdd/0x1b0\n do_syscall_64+0x3c/0x80\n entry_SYSCALL_64_after_hwframe+0x44/0xae\n RIP: 0033:0x7fe69735c3eb\n Code: 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 f3 0f 1e fa 48 8d 05 75 42 2c 00 41 89 ca 8b 00 85 c0 75 14 b8 2c 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 75 c3 0f 1f 40 00 41 57 4d 89 c7 41 56 41 89\n RSP: 002b:00007fff06d7fb38 EFLAGS: 00000246 ORIG_RAX: 000000000000002c\n RAX: ffffffffffffffda RBX: 000055e961413700 RCX: 00007fe69735c3eb\n RDX: 0000000000000040 RSI: 000055e961413700 RDI: 0000000000000003\n RBP: 0000000000000040 R08: 000055e961410500 R09: 0000000000000010\n R10: 0000000000000000 R11: 0000000000000246 R12: 00007fff06d81260\n R13: 00007fff06d7fb40 R14: 00007fff06d7fc30 R15: 000055e96140f0a0\n\n Allocated by task 917:\n kasan_save_stack+0x19/0x40\n __kasan_kmalloc+0x7f/0xa0\n __kmalloc_node+0x139/0x280\n fq_pie_init+0x555/0x8e8 [sch_fq_pie]\n qdisc_create+0x407/0x11b0\n tc_modify_qdisc+0x3c2/0x17e0\n rtnetlink_rcv_msg+0x346/0x8e0\n netlink_rcv_skb+0x120/0x380\n netlink_unicast+0x439/0x630\n netlink_sendmsg+0x719/0xbf0\n sock_sendmsg+0xe2/0x110\n ____sys_sendmsg+0x5ba/0x890\n ___sys_sendmsg+0xe9/0x160\n __sys_sendmsg+0xd3/0x170\n do_syscall_64+0x3c/0x80\n entry_SYSCALL_64_after_hwframe+0x44/0xae\n\n The buggy address belongs to the object at ffff888171306800\n which belongs to the cache kmalloc-256 of size 256\n The buggy address is located 36 bytes to the right of\n 256-byte region [ffff888171306800, ffff888171306900)\n The buggy address belongs to the page:\n page:00000000bcfb624e refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x171306\n head:00000000bcfb624e order:1 compound_mapcount:0\n flags: 0x17ffffc0010200(slab|head|node=0|zone=2|lastcpupid=0x1fffff)\n raw: 0017ffffc0010200 dead000000000100 dead000000000122 ffff888100042b40\n raw: 0000000000000000 0000000000100010 00000001ffffffff 0000000000000000\n page dumped because: kasan: bad access detected\n\n Memory state around the buggy address:\n ffff888171306800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00\n ffff888171306880: 00 00 00 00 00 00 00 00 00 00 00 00 fc fc fc fc\n >ffff888171306900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n ^\n ffff888171306980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n ffff888171306a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb\n\nfix fq_pie traffic path to avoid selecting 'q->flows + q->flows_cnt' as a\nvalid flow: it's an address beyond the allocated memory.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47175", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47175", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47175", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47175", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47175", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47175" + } + }, + "CVE-2021-47176": { + "affected_versions": "v5.11-rc1 to v5.13-rc4", + "breaks": "b72949328869dfd45f6452c2410647afd7db5f1a", + "cmt_msg": "s390/dasd: add missing discipline function", + "fixes": "c0c8a8397fa8a74d04915f4d3d28cb4a5d401427", + "last_affected_version": "5.12.8", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\ns390/dasd: add missing discipline function\n\nFix crash with illegal operation exception in dasd_device_tasklet.\nCommit b72949328869 (\"s390/dasd: Prepare for additional path event handling\")\nrenamed the verify_path function for ECKD but not for FBA and DIAG.\nThis leads to a panic when the path verification function is called for a\nFBA or DIAG device.\n\nFix by defining a wrapper function for dasd_generic_verify_path().", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47176", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47176", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47176", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47176", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47176", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47176" + } + }, + "CVE-2021-47177": { + "affected_versions": "v4.11-rc1 to v5.13-rc4", + "breaks": "39ab9555c24110671f8dc671311a26e5c985b592", + "cmt_msg": "iommu/vt-d: Fix sysfs leak in alloc_iommu()", + "fixes": "0ee74d5a48635c848c20f152d0d488bf84641304", + "last_affected_version": "5.12.8", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\niommu/vt-d: Fix sysfs leak in alloc_iommu()\n\niommu_device_sysfs_add() is called before, so is has to be cleaned on subsequent\nerrors.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47177", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47177", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47177", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47177", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47177", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47177" + } + }, + "CVE-2021-47178": { + "affected_versions": "v5.11-rc1 to v5.13-rc4", + "breaks": "1526d9f10c6184031e42afad0adbdde1213e8ad1", + "cmt_msg": "scsi: target: core: Avoid smp_processor_id() in preemptible code", + "fixes": "70ca3c57ff914113f681e657634f7fbfa68e1ad1", + "last_affected_version": "5.12.8", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: target: core: Avoid smp_processor_id() in preemptible code\n\nThe BUG message \"BUG: using smp_processor_id() in preemptible [00000000]\ncode\" was observed for TCMU devices with kernel config DEBUG_PREEMPT.\n\nThe message was observed when blktests block/005 was run on TCMU devices\nwith fileio backend or user:zbc backend [1]. The commit 1130b499b4a7\n(\"scsi: target: tcm_loop: Use LIO wq cmd submission helper\") triggered the\nsymptom. The commit modified work queue to handle commands and changed\n'current->nr_cpu_allowed' at smp_processor_id() call.\n\nThe message was also observed at system shutdown when TCMU devices were not\ncleaned up [2]. The function smp_processor_id() was called in SCSI host\nwork queue for abort handling, and triggered the BUG message. This symptom\nwas observed regardless of the commit 1130b499b4a7 (\"scsi: target:\ntcm_loop: Use LIO wq cmd submission helper\").\n\nTo avoid the preemptible code check at smp_processor_id(), get CPU ID with\nraw_smp_processor_id() instead. The CPU ID is used for performance\nimprovement then thread move to other CPU will not affect the code.\n\n[1]\n\n[ 56.468103] run blktests block/005 at 2021-05-12 14:16:38\n[ 57.369473] check_preemption_disabled: 85 callbacks suppressed\n[ 57.369480] BUG: using smp_processor_id() in preemptible [00000000] code: fio/1511\n[ 57.369506] BUG: using smp_processor_id() in preemptible [00000000] code: fio/1510\n[ 57.369512] BUG: using smp_processor_id() in preemptible [00000000] code: fio/1506\n[ 57.369552] caller is __target_init_cmd+0x157/0x170 [target_core_mod]\n[ 57.369606] CPU: 4 PID: 1506 Comm: fio Not tainted 5.13.0-rc1+ #34\n[ 57.369613] Hardware name: System manufacturer System Product Name/PRIME Z270-A, BIOS 1302 03/15/2018\n[ 57.369617] Call Trace:\n[ 57.369621] BUG: using smp_processor_id() in preemptible [00000000] code: fio/1507\n[ 57.369628] dump_stack+0x6d/0x89\n[ 57.369642] check_preemption_disabled+0xc8/0xd0\n[ 57.369628] caller is __target_init_cmd+0x157/0x170 [target_core_mod]\n[ 57.369655] __target_init_cmd+0x157/0x170 [target_core_mod]\n[ 57.369695] target_init_cmd+0x76/0x90 [target_core_mod]\n[ 57.369732] tcm_loop_queuecommand+0x109/0x210 [tcm_loop]\n[ 57.369744] scsi_queue_rq+0x38e/0xc40\n[ 57.369761] __blk_mq_try_issue_directly+0x109/0x1c0\n[ 57.369779] blk_mq_try_issue_directly+0x43/0x90\n[ 57.369790] blk_mq_submit_bio+0x4e5/0x5d0\n[ 57.369812] submit_bio_noacct+0x46e/0x4e0\n[ 57.369830] __blkdev_direct_IO_simple+0x1a3/0x2d0\n[ 57.369859] ? set_init_blocksize.isra.0+0x60/0x60\n[ 57.369880] generic_file_read_iter+0x89/0x160\n[ 57.369898] blkdev_read_iter+0x44/0x60\n[ 57.369906] new_sync_read+0x102/0x170\n[ 57.369929] vfs_read+0xd4/0x160\n[ 57.369941] __x64_sys_pread64+0x6e/0xa0\n[ 57.369946] ? lockdep_hardirqs_on+0x79/0x100\n[ 57.369958] do_syscall_64+0x3a/0x70\n[ 57.369965] entry_SYSCALL_64_after_hwframe+0x44/0xae\n[ 57.369973] RIP: 0033:0x7f7ed4c1399f\n[ 57.369979] Code: 08 89 3c 24 48 89 4c 24 18 e8 7d f3 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 11 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 cd f3 ff ff 48 8b\n[ 57.369983] RSP: 002b:00007ffd7918c580 EFLAGS: 00000293 ORIG_RAX: 0000000000000011\n[ 57.369990] RAX: ffffffffffffffda RBX: 00000000015b4540 RCX: 00007f7ed4c1399f\n[ 57.369993] RDX: 0000000000001000 RSI: 00000000015de000 RDI: 0000000000000009\n[ 57.369996] RBP: 00000000015b4540 R08: 0000000000000000 R09: 0000000000000001\n[ 57.369999] R10: 0000000000e5c000 R11: 0000000000000293 R12: 00007f7eb5269a70\n[ 57.370002] R13: 0000000000000000 R14: 0000000000001000 R15: 00000000015b4568\n[ 57.370031] CPU: 7 PID: 1507 Comm: fio Not tainted 5.13.0-rc1+ #34\n[ 57.370036] Hardware name: System manufacturer System Product Name/PRIME Z270-A, BIOS 1302 03/15/2018\n[ 57.370039] Call Trace:\n[ 57.370045] dump_stack+0x6d/0x89\n[ 57.370056] ch\n---truncated---", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47178", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47178", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47178", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47178", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47178", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47178" + } + }, + "CVE-2021-47179": { + "affected_versions": "unk to v5.13-rc4", + "breaks": "", + "cmt_msg": "NFSv4: Fix a NULL pointer dereference in pnfs_mark_matching_lsegs_return()", + "fixes": "a421d218603ffa822a0b8045055c03eae394a7eb", + "last_affected_version": "5.12.8", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nNFSv4: Fix a NULL pointer dereference in pnfs_mark_matching_lsegs_return()\n\nCommit de144ff4234f changes _pnfs_return_layout() to call\npnfs_mark_matching_lsegs_return() passing NULL as the struct\npnfs_layout_range argument. Unfortunately,\npnfs_mark_matching_lsegs_return() doesn't check if we have a value here\nbefore dereferencing it, causing an oops.\n\nI'm able to hit this crash consistently when running connectathon basic\ntests on NFS v4.1/v4.2 against Ontap.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47179", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47179", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47179", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47179", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47179", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47179" + } + }, + "CVE-2021-47180": { + "affected_versions": "unk to v5.13-rc4", + "breaks": "", + "cmt_msg": "NFC: nci: fix memory leak in nci_allocate_device", + "fixes": "e0652f8bb44d6294eeeac06d703185357f25d50b", + "last_affected_version": "5.12.7", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nNFC: nci: fix memory leak in nci_allocate_device\n\nnfcmrvl_disconnect fails to free the hci_dev field in struct nci_dev.\nFix this by freeing hci_dev in nci_free_device.\n\nBUG: memory leak\nunreferenced object 0xffff888111ea6800 (size 1024):\n comm \"kworker/1:0\", pid 19, jiffies 4294942308 (age 13.580s)\n hex dump (first 32 bytes):\n 00 00 00 00 00 00 00 00 00 60 fd 0c 81 88 ff ff .........`......\n 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................\n backtrace:\n [<000000004bc25d43>] kmalloc include/linux/slab.h:552 [inline]\n [<000000004bc25d43>] kzalloc include/linux/slab.h:682 [inline]\n [<000000004bc25d43>] nci_hci_allocate+0x21/0xd0 net/nfc/nci/hci.c:784\n [<00000000c59cff92>] nci_allocate_device net/nfc/nci/core.c:1170 [inline]\n [<00000000c59cff92>] nci_allocate_device+0x10b/0x160 net/nfc/nci/core.c:1132\n [<00000000006e0a8e>] nfcmrvl_nci_register_dev+0x10a/0x1c0 drivers/nfc/nfcmrvl/main.c:153\n [<000000004da1b57e>] nfcmrvl_probe+0x223/0x290 drivers/nfc/nfcmrvl/usb.c:345\n [<00000000d506aed9>] usb_probe_interface+0x177/0x370 drivers/usb/core/driver.c:396\n [<00000000bc632c92>] really_probe+0x159/0x4a0 drivers/base/dd.c:554\n [<00000000f5009125>] driver_probe_device+0x84/0x100 drivers/base/dd.c:740\n [<000000000ce658ca>] __device_attach_driver+0xee/0x110 drivers/base/dd.c:846\n [<000000007067d05f>] bus_for_each_drv+0xb7/0x100 drivers/base/bus.c:431\n [<00000000f8e13372>] __device_attach+0x122/0x250 drivers/base/dd.c:914\n [<000000009cf68860>] bus_probe_device+0xc6/0xe0 drivers/base/bus.c:491\n [<00000000359c965a>] device_add+0x5be/0xc30 drivers/base/core.c:3109\n [<00000000086e4bd3>] usb_set_configuration+0x9d9/0xb90 drivers/usb/core/message.c:2164\n [<00000000ca036872>] usb_generic_driver_probe+0x8c/0xc0 drivers/usb/core/generic.c:238\n [<00000000d40d36f6>] usb_probe_device+0x5c/0x140 drivers/usb/core/driver.c:293\n [<00000000bc632c92>] really_probe+0x159/0x4a0 drivers/base/dd.c:554", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2021-47180", + "ExploitDB": "https://www.exploit-db.com/search?cve=2021-47180", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2021-47180", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2021-47180", + "SUSE": "https://www.suse.com/security/cve/CVE-2021-47180", + "Ubuntu": "https://ubuntu.com/security/CVE-2021-47180" + } + }, + "CVE-2022-0001": { + "affected_versions": "v2.6.12-rc2 to v5.17-rc8", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE", + "cvss2": { + "Access Complexity": "Low", + "Access Vector": "Local Access", + "Authentication": "None", + "Availability Impact": "None", + "Confidentiality Impact": "Partial", + "Integrity Impact": "None", + "raw": "AV:L/AC:L/Au:N/C:P/I:N/A:N", + "score": 2.1 + }, + "cvss3": { + "Attack Complexity": "Low", + "Attack Vector": "Local", + "Availability": "None", + "Confidentiality": "High", + "Integrity": "None", + "Privileges Required": "Low", + "Scope": "Changed", + "User Interaction": "None", + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", + "score": 6.5 + }, + "cwe": "Unspecified", + "fixes": "d45476d9832409371537013ebdd8dc1a7781f97a", + "last_affected_version": "5.16.13", + "last_modified": "2023-12-06", + "nvd_text": "Non-transparent sharing of branch predictor selectors between contexts in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-0001", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-0001", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-0001", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-0001", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-0001", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-0001" + } + }, + "CVE-2022-0002": { + "affected_versions": "v2.6.12-rc2 to v5.17-rc8", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE", + "cvss2": { + "Access Complexity": "Low", + "Access Vector": "Local Access", + "Authentication": "None", + "Availability Impact": "None", + "Confidentiality Impact": "Partial", + "Integrity Impact": "None", + "raw": "AV:L/AC:L/Au:N/C:P/I:N/A:N", + "score": 2.1 + }, + "cvss3": { + "Attack Complexity": "Low", + "Attack Vector": "Local", + "Availability": "None", + "Confidentiality": "High", + "Integrity": "None", + "Privileges Required": "Low", + "Scope": "Changed", + "User Interaction": "None", + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", + "score": 6.5 + }, + "cwe": "Unspecified", + "fixes": "d45476d9832409371537013ebdd8dc1a7781f97a", + "last_affected_version": "5.16.13", + "last_modified": "2023-12-06", + "nvd_text": "Non-transparent sharing of branch predictor within a context in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-0002", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-0002", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-0002", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-0002", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-0002", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-0002" + } + }, + "CVE-2022-0168": { + "affected_versions": "v2.6.12-rc2 to v5.18-rc1", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "cifs: fix NULL ptr dereference in smb2_ioctl_query_info()", + "cvss3": { + "Attack Complexity": "Low", + "Attack Vector": "Local", + "Availability": "High", + "Confidentiality": "None", + "Integrity": "None", + "Privileges Required": "High", + "Scope": "Unchanged", + "User Interaction": "None", + "raw": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "score": 4.4 + }, + "cwe": "NULL Pointer Dereference", + "fixes": "d6f5e358452479fa8a773b5c6ccc9e4ec5a20880", + "last_affected_version": "5.17.1", + "last_modified": "2023-12-06", + "nvd_text": "A denial of service (DOS) issue was found in the Linux kernel\u2019s smb2_ioctl_query_info function in the fs/cifs/smb2ops.c Common Internet File System (CIFS) due to an incorrect return from the memdup_user function. This flaw allows a local, privileged (CAP_SYS_ADMIN) attacker to crash the system.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-0168", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-0168", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-0168", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-0168", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-0168", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-0168" + } + }, + "CVE-2022-0171": { + "affected_versions": "v5.10-rc1 to v5.18-rc4", + "breaks": "f980f9c31a923e9040dee0bc679a5f5b09e61f40", + "cmt_msg": "KVM: SEV: add cache flush to solve SEV cache incoherency issues", + "cvss3": { + "Attack Complexity": "Low", + "Attack Vector": "Local", + "Availability": "High", + "Confidentiality": "None", + "Integrity": "None", + "Privileges Required": "Low", + "Scope": "Unchanged", + "User Interaction": "None", + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "score": 5.5 + }, + "cwe": "Incomplete Cleanup", + "fixes": "683412ccf61294d727ead4a73d97397396e69a6b", + "last_affected_version": "5.15.69", + "last_modified": "2023-12-06", + "nvd_text": "A flaw was found in the Linux kernel. The existing KVM SEV API has a vulnerability that allows a non-root (host) user-level application to crash the host kernel by creating a confidential guest VM instance in AMD CPU that supports Secure Encrypted Virtualization (SEV).", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-0171", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-0171", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-0171", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-0171", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-0171", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-0171" + } + }, + "CVE-2022-0185": { + "affected_versions": "v5.1-rc1 to v5.17-rc1", + "breaks": "3e1aeb00e6d132efc151dacc062b38269bc9eccc", + "cmt_msg": "vfs: fs_context: fix up param length parsing in legacy_parse_param", + "cvss2": { + "Access Complexity": "Low", + "Access Vector": "Local Access", + "Authentication": "None", + "Availability Impact": "Complete", + "Confidentiality Impact": "Complete", + "Integrity Impact": "Complete", + "raw": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "score": 7.2 + }, + "cvss3": { + "Attack Complexity": "Low", + "Attack Vector": "Local", + "Availability": "High", + "Confidentiality": "High", + "Integrity": "High", + "Privileges Required": "None", + "Scope": "Unchanged", + "User Interaction": "None", + "raw": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "score": 8.4 + }, + "cwe": "Integer Overflow or Wraparound", + "fixes": "722d94847de29310e8aa03fcbdb41fc92c521756", + "last_affected_version": "5.16.1", + "last_modified": "2023-12-06", + "nvd_text": "A heap-based buffer overflow flaw was found in the way the legacy_parse_param function in the Filesystem Context functionality of the Linux kernel verified the supplied parameters length. An unprivileged (in case of unprivileged user namespaces enabled, otherwise needs namespaced CAP_SYS_ADMIN privilege) local user able to open a filesystem that does not support the Filesystem Context API (and thus fallbacks to legacy handling) could use this flaw to escalate their privileges on the system.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-0185", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-0185", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-0185", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-0185", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-0185", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-0185" + } + }, + "CVE-2022-0264": { + "affected_versions": "v5.12-rc1-dontuse to v5.16-rc6", + "breaks": "37086bfdc737ea6f66bf68dcf16757004d68e1e1", + "cmt_msg": "bpf: Fix kernel address leakage in atomic fetch", + "cvss2": { + "Access Complexity": "Low", + "Access Vector": "Local Access", + "Authentication": "None", + "Availability Impact": "None", + "Confidentiality Impact": "Partial", + "Integrity Impact": "None", + "raw": "AV:L/AC:L/Au:N/C:P/I:N/A:N", + "score": 2.1 + }, + "cvss3": { + "Attack Complexity": "Low", + "Attack Vector": "Local", + "Availability": "None", + "Confidentiality": "High", + "Integrity": "None", + "Privileges Required": "Low", + "Scope": "Unchanged", + "User Interaction": "None", + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "score": 5.5 + }, + "cwe": "Improper Handling of Exceptional Conditions", + "fixes": "7d3baf0afa3aa9102d6a521a8e4c41888bb79882", + "last_affected_version": "5.15.10", + "last_modified": "2023-12-06", + "nvd_text": "A vulnerability was found in the Linux kernel's eBPF verifier when handling internal data structures. Internal memory locations could be returned to userspace. A local attacker with the permissions to insert eBPF code to the kernel can use this to leak internal kernel memory details defeating some of the exploit mitigations in place for the kernel. This flaws affects kernel versions < v5.16-rc6", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-0264", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-0264", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-0264", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-0264", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-0264", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-0264" + } + }, + "CVE-2022-0286": { + "affected_versions": "v5.9-rc1 to v5.14-rc2", + "breaks": "18cb261afd7bf50134e5ccacc5ec91ea16efadd4", + "cmt_msg": "bonding: fix null dereference in bond_ipsec_add_sa()", + "cvss2": { + "Access Complexity": "Low", + "Access Vector": "Local Access", + "Authentication": "None", + "Availability Impact": "Partial", + "Confidentiality Impact": "None", + "Integrity Impact": "None", + "raw": "AV:L/AC:L/Au:N/C:N/I:N/A:P", + "score": 2.1 + }, + "cvss3": { + "Attack Complexity": "Low", + "Attack Vector": "Local", + "Availability": "High", + "Confidentiality": "None", + "Integrity": "None", + "Privileges Required": "Low", + "Scope": "Unchanged", + "User Interaction": "None", + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "score": 5.5 + }, + "cwe": "NULL Pointer Dereference", + "fixes": "105cd17a866017b45f3c45901b394c711c97bf40", + "last_affected_version": "5.13.5", + "last_modified": "2023-12-06", + "nvd_text": "A flaw was found in the Linux kernel. A null pointer dereference in bond_ipsec_add_sa() may lead to local denial of service.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-0286", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-0286", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-0286", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-0286", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-0286", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-0286" + } + }, + "CVE-2022-0322": { + "affected_versions": "v4.11-rc1 to v5.15-rc6", + "breaks": "cc16f00f6529aa2378f2b949a6f68e9dc6dec363", + "cmt_msg": "sctp: account stream padding length for reconf chunk", + "cvss2": { + "Access Complexity": "Low", + "Access Vector": "Local Access", + "Authentication": "None", + "Availability Impact": "Partial", + "Confidentiality Impact": "None", + "Integrity Impact": "None", + "raw": "AV:L/AC:L/Au:N/C:N/I:N/A:P", + "score": 2.1 + }, + "cvss3": { + "Attack Complexity": "Low", + "Attack Vector": "Local", + "Availability": "High", + "Confidentiality": "None", + "Integrity": "None", + "Privileges Required": "Low", + "Scope": "Unchanged", + "User Interaction": "None", + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "score": 5.5 + }, + "cwe": "Incorrect Type Conversion or Cast", + "fixes": "a2d859e3fc97e79d907761550dbc03ff1b36479c", + "last_affected_version": "5.14.13", + "last_modified": "2023-12-06", + "nvd_text": "A flaw was found in the sctp_make_strreset_req function in net/sctp/sm_make_chunk.c in the SCTP network protocol in the Linux kernel with a local user privilege access. In this flaw, an attempt to use more buffer than is allocated triggers a BUG_ON issue, leading to a denial of service (DOS).", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-0322", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-0322", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-0322", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-0322", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-0322", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-0322" + } + }, + "CVE-2022-0330": { + "affected_versions": "v2.6.12-rc2 to v5.17-rc2", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "drm/i915: Flush TLBs before releasing backing store", + "cvss2": { + "Access Complexity": "Low", + "Access Vector": "Local Access", + "Authentication": "None", + "Availability Impact": "Partial", + "Confidentiality Impact": "Partial", + "Integrity Impact": "Partial", + "raw": "AV:L/AC:L/Au:N/C:P/I:P/A:P", + "score": 4.6 + }, + "cvss3": { + "Attack Complexity": "Low", + "Attack Vector": "Local", + "Availability": "High", + "Confidentiality": "High", + "Integrity": "High", + "Privileges Required": "Low", + "Scope": "Unchanged", + "User Interaction": "None", + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 7.8 + }, + "cwe": "Improper Preservation of Permissions", + "fixes": "7938d61591d33394a21bdd7797a245b65428f44c", + "last_affected_version": "5.16.3", + "last_modified": "2023-12-06", + "nvd_text": "A random memory access flaw was found in the Linux kernel's GPU i915 kernel driver functionality in the way a user may run malicious code on the GPU. This flaw allows a local user to crash the system or escalate their privileges on the system.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-0330", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-0330", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-0330", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-0330", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-0330", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-0330" + } + }, + "CVE-2022-0382": { + "affected_versions": "v2.6.12-rc2 to v5.16", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "net ticp:fix a kernel-infoleak in __tipc_sendmsg()", + "cvss2": { + "Access Complexity": "Low", + "Access Vector": "Local Access", + "Authentication": "None", + "Availability Impact": "None", + "Confidentiality Impact": "Partial", + "Integrity Impact": "None", + "raw": "AV:L/AC:L/Au:N/C:P/I:N/A:N", + "score": 2.1 + }, + "cvss3": { + "Attack Complexity": "Low", + "Attack Vector": "Local", + "Availability": "None", + "Confidentiality": "High", + "Integrity": "None", + "Privileges Required": "Low", + "Scope": "Unchanged", + "User Interaction": "None", + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "score": 5.5 + }, + "cwe": "Missing Initialization of Resource", + "fixes": "d6d86830705f173fca6087a3e67ceaf68db80523", + "last_affected_version": "5.15", + "last_modified": "2023-12-06", + "nvd_text": "An information leak flaw was found due to uninitialized memory in the Linux kernel's TIPC protocol subsystem, in the way a user sends a TIPC datagram to one or more destinations. This flaw allows a local user to read some kernel memory. This issue is limited to no more than 7 bytes, and the user cannot control what is read. This flaw affects the Linux kernel versions prior to 5.17-rc1.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-0382", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-0382", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-0382", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-0382", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-0382", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-0382" + } + }, + "CVE-2022-0400": { + "affected_versions": "unk to unk", + "breaks": "", + "cvss3": { + "Attack Complexity": "Low", + "Attack Vector": "Network", + "Availability": "High", + "Confidentiality": "None", + "Integrity": "None", + "Privileges Required": "None", + "Scope": "Unchanged", + "User Interaction": "None", + "raw": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "score": 7.5 + }, + "cwe": "Out-of-bounds Read", + "fixes": "", + "last_modified": "2023-12-06", + "nvd_text": "An out-of-bounds read vulnerability was discovered in linux kernel in the smc protocol stack, causing remote dos.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-0400", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-0400", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-0400", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-0400", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-0400", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-0400" + } + }, + "CVE-2022-0433": { + "affected_versions": "v5.16-rc1 to v5.17-rc1", + "breaks": "9330986c03006ab1d33d243b7cfe598a7a3c1baa", + "cmt_msg": "bpf: Add missing map_get_next_key method to bloom filter map.", + "cvss2": { + "Access Complexity": "Low", + "Access Vector": "Local Access", + "Authentication": "None", + "Availability Impact": "Complete", + "Confidentiality Impact": "None", + "Integrity Impact": "None", + "raw": "AV:L/AC:L/Au:N/C:N/I:N/A:C", + "score": 4.9 + }, + "cvss3": { + "Attack Complexity": "Low", + "Attack Vector": "Local", + "Availability": "High", + "Confidentiality": "None", + "Integrity": "None", + "Privileges Required": "Low", + "Scope": "Unchanged", + "User Interaction": "None", + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "score": 5.5 + }, + "cwe": "NULL Pointer Dereference", + "fixes": "3ccdcee28415c4226de05438b4d89eb5514edf73", + "last_affected_version": "5.16.2", + "last_modified": "2023-12-06", + "nvd_text": "A NULL pointer dereference flaw was found in the Linux kernel's BPF subsystem in the way a user triggers the map_get_next_key function of the BPF bloom filter. This flaw allows a local user to crash the system. This flaw affects Linux kernel versions prior to 5.17-rc1.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-0433", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-0433", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-0433", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-0433", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-0433", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-0433" } }, "CVE-2022-0435": { @@ -71967,44 +76760,1166 @@ "cmt_msg": "tipc: improve size validations for received domain records", "cvss2": { "Access Complexity": "Low", - "Access Vector": "Network Accessible", - "Authentication": "Single", + "Access Vector": "Network Accessible", + "Authentication": "Single", + "Availability Impact": "Complete", + "Confidentiality Impact": "Complete", + "Integrity Impact": "Complete", + "raw": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "score": 9.0 + }, + "cvss3": { + "Attack Complexity": "Low", + "Attack Vector": "Network", + "Availability": "High", + "Confidentiality": "High", + "Integrity": "High", + "Privileges Required": "Low", + "Scope": "Unchanged", + "User Interaction": "None", + "raw": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 8.8 + }, + "cwe": "Out-of-bounds Write", + "fixes": "9aa422ad326634b76309e8ff342c246800621216", + "last_affected_version": "5.16.8", + "last_modified": "2023-12-06", + "nvd_text": "A stack overflow flaw was found in the Linux kernel's TIPC protocol functionality in the way a user sends a packet with malicious content where the number of domain member nodes is higher than the 64 allowed. This flaw allows a remote user to crash the system or possibly escalate their privileges if they have access to the TIPC network.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-0435", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-0435", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-0435", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-0435", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-0435", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-0435" + } + }, + "CVE-2022-0480": { + "affected_versions": "v2.6.12-rc2 to v5.15-rc1", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "memcg: enable accounting for file lock caches", + "cvss3": { + "Attack Complexity": "Low", + "Attack Vector": "Local", + "Availability": "High", + "Confidentiality": "None", + "Integrity": "None", + "Privileges Required": "Low", + "Scope": "Unchanged", + "User Interaction": "None", + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "score": 5.5 + }, + "cwe": "Allocation of Resources Without Limits or Throttling", + "fixes": "0f12156dff2862ac54235fc72703f18770769042", + "last_modified": "2023-12-06", + "nvd_text": "A flaw was found in the filelock_init in fs/locks.c function in the Linux kernel. This issue can lead to host memory exhaustion due to memcg not limiting the number of Portable Operating System Interface (POSIX) file locks.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-0480", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-0480", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-0480", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-0480", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-0480", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-0480" + } + }, + "CVE-2022-0487": { + "affected_versions": "v3.16-rc1 to v5.17-rc4", + "breaks": "1b66e94e6b9995323190f31c51d8e1a6f516627e", + "cmt_msg": "moxart: fix potential use-after-free on remove path", + "cvss2": { + "Access Complexity": "Low", + "Access Vector": "Local Access", + "Authentication": "None", + "Availability Impact": "None", + "Confidentiality Impact": "Partial", + "Integrity Impact": "None", + "raw": "AV:L/AC:L/Au:N/C:P/I:N/A:N", + "score": 2.1 + }, + "cvss3": { + "Attack Complexity": "Low", + "Attack Vector": "Local", + "Availability": "None", + "Confidentiality": "High", + "Integrity": "None", + "Privileges Required": "Low", + "Scope": "Unchanged", + "User Interaction": "None", + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "score": 5.5 + }, + "cwe": "Use After Free", + "fixes": "bd2db32e7c3e35bd4d9b8bbff689434a50893546", + "last_affected_version": "5.16.8", + "last_modified": "2023-12-06", + "nvd_text": "A use-after-free vulnerability was found in rtsx_usb_ms_drv_remove in drivers/memstick/host/rtsx_usb_ms.c in memstick in the Linux kernel. In this flaw, a local attacker with a user privilege may impact system Confidentiality. This flaw affects kernel versions prior to 5.14 rc1.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-0487", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-0487", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-0487", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-0487", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-0487", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-0487" + } + }, + "CVE-2022-0492": { + "affected_versions": "v2.6.24-rc1 to v5.17-rc3", + "breaks": "81a6a5cdd2c5cd70874b88afe524ab09e9e869af", + "cmt_msg": "cgroup-v1: Require capabilities to set release_agent", + "cvss2": { + "Access Complexity": "Medium", + "Access Vector": "Local Access", + "Authentication": "None", + "Availability Impact": "Complete", + "Confidentiality Impact": "Complete", + "Integrity Impact": "Complete", + "raw": "AV:L/AC:M/Au:N/C:C/I:C/A:C", + "score": 6.9 + }, + "cvss3": { + "Attack Complexity": "Low", + "Attack Vector": "Local", + "Availability": "High", + "Confidentiality": "High", + "Integrity": "High", + "Privileges Required": "Low", + "Scope": "Unchanged", + "User Interaction": "None", + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 7.8 + }, + "cwe": "Improper Authentication", + "fixes": "24f6008564183aa120d07c03d9289519c2fe02af", + "last_affected_version": "5.16.5", + "last_modified": "2023-12-06", + "nvd_text": "A vulnerability was found in the Linux kernel\u2019s cgroup_release_agent_write in the kernel/cgroup/cgroup-v1.c function. This flaw, under certain circumstances, allows the use of the cgroups v1 release_agent feature to escalate privileges and bypass the namespace isolation unexpectedly.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-0492", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-0492", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-0492", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-0492", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-0492", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-0492" + } + }, + "CVE-2022-0494": { + "affected_versions": "v2.6.12-rc2 to v5.17-rc5", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "block-map: add __GFP_ZERO flag for alloc_page in function bio_copy_kern", + "cvss2": { + "Access Complexity": "Low", + "Access Vector": "Local Access", + "Authentication": "None", + "Availability Impact": "None", + "Confidentiality Impact": "Complete", + "Integrity Impact": "None", + "raw": "AV:L/AC:L/Au:N/C:C/I:N/A:N", + "score": 4.9 + }, + "cvss3": { + "Attack Complexity": "Low", + "Attack Vector": "Local", + "Availability": "None", + "Confidentiality": "High", + "Integrity": "None", + "Privileges Required": "High", + "Scope": "Unchanged", + "User Interaction": "None", + "raw": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "score": 4.4 + }, + "cwe": "Exposure of Sensitive Information to an Unauthorized Actor", + "fixes": "cc8f7fe1f5eab010191aa4570f27641876fa1267", + "last_affected_version": "5.16.12", + "last_modified": "2023-12-06", + "nvd_text": "A kernel information leak flaw was identified in the scsi_ioctl function in drivers/scsi/scsi_ioctl.c in the Linux kernel. This flaw allows a local attacker with a special user privilege (CAP_SYS_ADMIN or CAP_SYS_RAWIO) to create issues with confidentiality.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-0494", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-0494", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-0494", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-0494", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-0494", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-0494" + } + }, + "CVE-2022-0500": { + "affected_versions": "v5.10-rc1 to v5.17-rc1", + "breaks": "63d9b80dcf2c67bc5ade61cbbaa09d7af21f43f1", + "cmt_msg": "bpf: Introduce MEM_RDONLY flag", + "cvss2": { + "Access Complexity": "Low", + "Access Vector": "Local Access", + "Authentication": "None", + "Availability Impact": "Complete", + "Confidentiality Impact": "Complete", + "Integrity Impact": "Complete", + "raw": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "score": 7.2 + }, + "cvss3": { + "Attack Complexity": "Low", + "Attack Vector": "Local", + "Availability": "High", + "Confidentiality": "High", + "Integrity": "High", + "Privileges Required": "Low", + "Scope": "Unchanged", + "User Interaction": "None", + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 7.8 + }, + "cwe": "Improper Restriction of Operations within the Bounds of a Memory Buffer", + "fixes": "20b2aff4bc15bda809f994761d5719827d66c0b4", + "last_affected_version": "5.16.10", + "last_modified": "2023-12-06", + "nvd_text": "A flaw was found in unrestricted eBPF usage by the BPF_BTF_LOAD, leading to a possible out-of-bounds memory write in the Linux kernel\u2019s BPF subsystem due to the way a user loads BTF. This flaw allows a local user to crash or escalate their privileges on the system.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-0500", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-0500", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-0500", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-0500", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-0500", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-0500" + } + }, + "CVE-2022-0516": { + "affected_versions": "v5.7-rc1 to v5.17-rc4", + "breaks": "19e1227768863a1469797c13ef8fea1af7beac2c", + "cmt_msg": "KVM: s390: Return error on SIDA memop on normal guest", + "cvss2": { + "Access Complexity": "Low", + "Access Vector": "Local Access", + "Authentication": "None", + "Availability Impact": "Partial", + "Confidentiality Impact": "Partial", + "Integrity Impact": "Partial", + "raw": "AV:L/AC:L/Au:N/C:P/I:P/A:P", + "score": 4.6 + }, + "cvss3": { + "Attack Complexity": "Low", + "Attack Vector": "Local", + "Availability": "High", + "Confidentiality": "High", + "Integrity": "High", + "Privileges Required": "Low", + "Scope": "Unchanged", + "User Interaction": "None", + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 7.8 + }, + "cwe": "Unspecified", + "fixes": "2c212e1baedcd782b2535a3f86bc491977677c0e", + "last_affected_version": "5.16.8", + "last_modified": "2023-12-06", + "nvd_text": "A vulnerability was found in kvm_s390_guest_sida_op in the arch/s390/kvm/kvm-s390.c function in KVM for s390 in the Linux kernel. This flaw allows a local attacker with a normal user privilege to obtain unauthorized memory write access. This flaw affects Linux kernel versions prior to 5.17-rc4.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-0516", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-0516", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-0516", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-0516", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-0516", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-0516" + } + }, + "CVE-2022-0617": { + "affected_versions": "v4.2-rc1 to v5.17-rc2", + "breaks": "52ebea749aaed195245701a8f90a23d672c7a933", + "cmt_msg": "udf: Fix NULL ptr deref when converting from inline format", + "cvss2": { + "Access Complexity": "Low", + "Access Vector": "Local Access", + "Authentication": "None", + "Availability Impact": "Complete", + "Confidentiality Impact": "None", + "Integrity Impact": "None", + "raw": "AV:L/AC:L/Au:N/C:N/I:N/A:C", + "score": 4.9 + }, + "cvss3": { + "Attack Complexity": "Low", + "Attack Vector": "Local", + "Availability": "High", + "Confidentiality": "None", + "Integrity": "None", + "Privileges Required": "Low", + "Scope": "Unchanged", + "User Interaction": "None", + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "score": 5.5 + }, + "cwe": "NULL Pointer Dereference", + "fixes": "7fc3b7c2981bbd1047916ade327beccb90994eee", + "last_affected_version": "5.16.4", + "last_modified": "2023-12-06", + "nvd_text": "A flaw null pointer dereference in the Linux kernel UDF file system functionality was found in the way user triggers udf_file_write_iter function for the malicious UDF image. A local user could use this flaw to crash the system. Actual from Linux kernel 4.2-rc1 till 5.17-rc2.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-0617", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-0617", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-0617", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-0617", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-0617", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-0617" + } + }, + "CVE-2022-0644": { + "affected_versions": "v4.6-rc1 to v5.15-rc7", + "breaks": "b844f0ecbc5626ec26cfc70cb144a4c9b85dc3f2", + "cmt_msg": "vfs: check fd has read access in kernel_read_file_from_fd()", + "fixes": "032146cda85566abcd1c4884d9d23e4e30a07e9a", + "last_affected_version": "5.14.14", + "last_modified": "2023-12-06", + "nvd_text": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-0644", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-0644", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-0644", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-0644", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-0644", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-0644" + }, + "rejected": true + }, + "CVE-2022-0646": { + "affected_versions": "v5.17-rc1 to v5.17-rc5", + "breaks": "7bd9890f3d74e96f0e1a898f68decfc711de3001", + "cvss2": { + "Access Complexity": "Low", + "Access Vector": "Local Access", + "Authentication": "None", + "Availability Impact": "Complete", + "Confidentiality Impact": "Complete", + "Integrity Impact": "Complete", + "raw": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "score": 7.2 + }, + "cvss3": { + "Attack Complexity": "Low", + "Attack Vector": "Local", + "Availability": "High", + "Confidentiality": "High", + "Integrity": "High", + "Privileges Required": "Low", + "Scope": "Unchanged", + "User Interaction": "None", + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 7.8 + }, + "cwe": "Use After Free", + "fixes": "6c342ce2239c182c2428ce5a44cb32330434ae6e", + "last_modified": "2023-12-06", + "nvd_text": "A flaw use after free in the Linux kernel Management Component Transport Protocol (MCTP) subsystem was found in the way user triggers cancel_work_sync after the unregister_netdev during removing device. A local user could use this flaw to crash the system or escalate their privileges on the system. It is actual from Linux Kernel 5.17-rc1 (when mctp-serial.c introduced) till 5.17-rc5.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-0646", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-0646", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-0646", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-0646", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-0646", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-0646" + } + }, + "CVE-2022-0742": { + "affected_versions": "v5.13-rc1 to v5.17-rc7", + "breaks": "f185de28d9ae6c978135993769352e523ee8df06", + "cmt_msg": "ipv6: fix skb drops in igmp6_event_query() and igmp6_event_report()", + "cvss2": { + "Access Complexity": "Low", + "Access Vector": "Network Accessible", + "Authentication": "None", + "Availability Impact": "Complete", + "Confidentiality Impact": "None", + "Integrity Impact": "None", + "raw": "AV:N/AC:L/Au:N/C:N/I:N/A:C", + "score": 7.8 + }, + "cvss3": { + "Attack Complexity": "Low", + "Attack Vector": "Network", + "Availability": "High", + "Confidentiality": "None", + "Integrity": "None", + "Privileges Required": "None", + "Scope": "Unchanged", + "User Interaction": "None", + "raw": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "score": 7.5 + }, + "cwe": "Missing Release of Memory after Effective Lifetime", + "fixes": "2d3916f3189172d5c69d33065c3c21119fe539fc", + "last_affected_version": "5.16.12", + "last_modified": "2023-12-06", + "nvd_text": "Memory leak in icmp6 implementation in Linux Kernel 5.13+ allows a remote attacker to DoS a host by making it go out-of-memory via icmp6 packets of type 130 or 131. We recommend upgrading past commit 2d3916f3189172d5c69d33065c3c21119fe539fc.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-0742", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-0742", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-0742", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-0742", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-0742", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-0742" + } + }, + "CVE-2022-0812": { + "affected_versions": "v4.7-rc1 to v5.8-rc6", + "breaks": "302d3deb20682a076e1ab551821cacfdc81c5e4f", + "cmt_msg": "xprtrdma: fix incorrect header size calculations", + "cvss3": { + "Attack Complexity": "Low", + "Attack Vector": "Network", + "Availability": "None", + "Confidentiality": "Low", + "Integrity": "None", + "Privileges Required": "Low", + "Scope": "Unchanged", + "User Interaction": "None", + "raw": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "score": 4.3 + }, + "cwe": "Unspecified", + "fixes": "912288442cb2f431bf3c8cb097a5de83bc6dbac1", + "last_affected_version": "5.7.9", + "last_modified": "2023-12-06", + "nvd_text": "An information leak flaw was found in NFS over RDMA in the net/sunrpc/xprtrdma/rpc_rdma.c in the Linux Kernel. This flaw allows an attacker with normal user privileges to leak kernel information.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-0812", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-0812", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-0812", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-0812", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-0812", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-0812" + } + }, + "CVE-2022-0847": { + "affected_versions": "v5.8-rc1 to v5.17-rc6", + "breaks": "f6dd975583bd8ce088400648fd9819e4691c8958", + "cmt_msg": "lib/iov_iter: initialize \"flags\" in new pipe_buffer", + "cvss2": { + "Access Complexity": "Low", + "Access Vector": "Local Access", + "Authentication": "None", + "Availability Impact": "Complete", + "Confidentiality Impact": "Complete", + "Integrity Impact": "Complete", + "raw": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "score": 7.2 + }, + "cvss3": { + "Attack Complexity": "Low", + "Attack Vector": "Local", + "Availability": "High", + "Confidentiality": "High", + "Integrity": "High", + "Privileges Required": "Low", + "Scope": "Unchanged", + "User Interaction": "None", + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 7.8 + }, + "cwe": "Improper Initialization", + "fixes": "9d2231c5d74e13b2a0546fee6737ee4446017903", + "last_affected_version": "5.16.10", + "last_modified": "2023-12-06", + "name": "Dirty Pipe", + "nvd_text": "A flaw was found in the way the \"flags\" member of the new pipe buffer structure was lacking proper initialization in copy_page_to_iter_pipe and push_pipe functions in the Linux kernel and could thus contain stale values. An unprivileged local user could use this flaw to write to pages in the page cache backed by read only files and as such escalate their privileges on the system.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-0847", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-0847", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-0847", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-0847", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-0847", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-0847" + } + }, + "CVE-2022-0850": { + "affected_versions": "v2.6.19-rc2 to v5.14-rc1", + "breaks": "a86c61812637c7dd0c57e29880cffd477b62f2e7", + "cmt_msg": "ext4: fix kernel infoleak via ext4_extent_header", + "cvss3": { + "Attack Complexity": "Low", + "Attack Vector": "Local", + "Availability": "High", + "Confidentiality": "High", + "Integrity": "None", + "Privileges Required": "Low", + "Scope": "Unchanged", + "User Interaction": "None", + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", + "score": 7.1 + }, + "cwe": "Unspecified", + "fixes": "ce3aba43599f0b50adbebff133df8d08a3d5fffe", + "last_affected_version": "5.13.1", + "last_modified": "2023-12-06", + "nvd_text": "A vulnerability was found in linux kernel, where an information leak occurs via ext4_extent_header to userspace.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-0850", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-0850", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-0850", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-0850", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-0850", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-0850" + } + }, + "CVE-2022-0854": { + "affected_versions": "v5.17-rc6 to v5.17-rc8", + "breaks": "ddbd89deb7d32b1fbb879f48d68fda1a8ac58e8e", + "cmt_msg": "swiotlb: rework \"fix info leak with DMA_FROM_DEVICE\"", + "cvss2": { + "Access Complexity": "Low", + "Access Vector": "Local Access", + "Authentication": "None", + "Availability Impact": "None", + "Confidentiality Impact": "Partial", + "Integrity Impact": "None", + "raw": "AV:L/AC:L/Au:N/C:P/I:N/A:N", + "score": 2.1 + }, + "cvss3": { + "Attack Complexity": "Low", + "Attack Vector": "Local", + "Availability": "None", + "Confidentiality": "High", + "Integrity": "None", + "Privileges Required": "Low", + "Scope": "Unchanged", + "User Interaction": "None", + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "score": 5.5 + }, + "cwe": "Missing Release of Memory after Effective Lifetime", + "fixes": "aa6f8dcbab473f3a3c7454b74caa46d36cdc5d13", + "last_affected_version": "5.16.14", + "last_modified": "2023-12-06", + "nvd_text": "A memory leak flaw was found in the Linux kernel\u2019s DMA subsystem, in the way a user calls DMA_FROM_DEVICE. This flaw allows a local user to read random memory from the kernel space.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-0854", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-0854", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-0854", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-0854", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-0854", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-0854" + } + }, + "CVE-2022-0995": { + "affected_versions": "v5.8-rc1 to v5.17-rc8", + "breaks": "c73be61cede5882f9605a852414db559c0ebedfd", + "cmt_msg": "watch_queue: Fix filter limit check", + "cvss2": { + "Access Complexity": "Low", + "Access Vector": "Local Access", + "Authentication": "None", + "Availability Impact": "Complete", + "Confidentiality Impact": "Complete", + "Integrity Impact": "Complete", + "raw": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "score": 7.2 + }, + "cvss3": { + "Attack Complexity": "Low", + "Attack Vector": "Local", + "Availability": "High", + "Confidentiality": "High", + "Integrity": "High", + "Privileges Required": "Low", + "Scope": "Unchanged", + "User Interaction": "None", + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 7.8 + }, + "cwe": "Out-of-bounds Write", + "fixes": "c993ee0f9f81caf5767a50d1faeba39a0dc82af2", + "last_affected_version": "5.16.14", + "last_modified": "2023-12-06", + "nvd_text": "An out-of-bounds (OOB) memory write flaw was found in the Linux kernel\u2019s watch_queue event notification subsystem. This flaw can overwrite parts of the kernel state, potentially allowing a local user to gain privileged access or cause a denial of service on the system.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-0995", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-0995", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-0995", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-0995", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-0995", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-0995" + } + }, + "CVE-2022-0998": { + "affected_versions": "v5.7-rc1 to v5.17-rc1", + "breaks": "4c8cf31885f69e86be0b5b9e6677a26797365e1d", + "cmt_msg": "vdpa: clean up get_config_size ret value handling", + "cvss2": { + "Access Complexity": "Low", + "Access Vector": "Local Access", + "Authentication": "None", "Availability Impact": "Complete", "Confidentiality Impact": "Complete", "Integrity Impact": "Complete", - "raw": "AV:N/AC:L/Au:S/C:C/I:C/A:C", - "score": 9.0 + "raw": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "score": 7.2 + }, + "cvss3": { + "Attack Complexity": "Low", + "Attack Vector": "Local", + "Availability": "High", + "Confidentiality": "High", + "Integrity": "High", + "Privileges Required": "Low", + "Scope": "Unchanged", + "User Interaction": "None", + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 7.8 + }, + "cwe": "Integer Overflow or Wraparound", + "fixes": "870aaff92e959e29d40f9cfdb5ed06ba2fc2dae0", + "last_modified": "2023-12-06", + "nvd_text": "An integer overflow flaw was found in the Linux kernel\u2019s virtio device driver code in the way a user triggers the vhost_vdpa_config_validate function. This flaw allows a local user to crash or potentially escalate their privileges on the system.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-0998", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-0998", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-0998", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-0998", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-0998", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-0998" + } + }, + "CVE-2022-1011": { + "affected_versions": "v2.6.35-rc1 to v5.17-rc8", + "breaks": "c3021629a0d820247ee12b6c5192a1d5380e21c6", + "cmt_msg": "fuse: fix pipe buffer lifetime for direct_io", + "cvss2": { + "Access Complexity": "Low", + "Access Vector": "Local Access", + "Authentication": "None", + "Availability Impact": "Partial", + "Confidentiality Impact": "Partial", + "Integrity Impact": "Partial", + "raw": "AV:L/AC:L/Au:N/C:P/I:P/A:P", + "score": 4.6 + }, + "cvss3": { + "Attack Complexity": "Low", + "Attack Vector": "Local", + "Availability": "High", + "Confidentiality": "High", + "Integrity": "High", + "Privileges Required": "Low", + "Scope": "Unchanged", + "User Interaction": "None", + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 7.8 + }, + "cwe": "Use After Free", + "fixes": "0c4bcfdecb1ac0967619ee7ff44871d93c08c909", + "last_affected_version": "5.16.14", + "last_modified": "2023-12-06", + "nvd_text": "A use-after-free flaw was found in the Linux kernel\u2019s FUSE filesystem in the way a user triggers write(). This flaw allows a local user to gain unauthorized access to data from the FUSE filesystem, resulting in privilege escalation.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-1011", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-1011", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-1011", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-1011", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-1011", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-1011" + } + }, + "CVE-2022-1012": { + "affected_versions": "v2.6.12-rc2 to v5.18-rc6", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "secure_seq: use the 64 bits of the siphash for port offset calculation", + "cvss3": { + "Attack Complexity": "Low", + "Attack Vector": "Network", + "Availability": "High", + "Confidentiality": "Low", + "Integrity": "None", + "Privileges Required": "None", + "Scope": "Unchanged", + "User Interaction": "None", + "raw": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H", + "score": 8.2 + }, + "cwe": "Missing Release of Memory after Effective Lifetime", + "fixes": "b2d057560b8107c633b39aabe517ff9d93f285e3", + "last_affected_version": "5.17.8", + "last_modified": "2023-12-06", + "nvd_text": "A memory leak problem was found in the TCP source port generation algorithm in net/ipv4/tcp.c due to the small table perturb size. This flaw may allow an attacker to information leak and may cause a denial of service problem.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-1012", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-1012", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-1012", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-1012", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-1012", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-1012" + } + }, + "CVE-2022-1015": { + "affected_versions": "v5.12-rc1-dontuse to v5.18-rc1", + "breaks": "345023b0db315648ccc3c1a36aee88304a8b4d91", + "cmt_msg": "netfilter: nf_tables: validate registers coming from userspace.", + "cvss2": { + "Access Complexity": "Low", + "Access Vector": "Local Access", + "Authentication": "None", + "Availability Impact": "Partial", + "Confidentiality Impact": "Partial", + "Integrity Impact": "Partial", + "raw": "AV:L/AC:L/Au:N/C:P/I:P/A:P", + "score": 4.6 + }, + "cvss3": { + "Attack Complexity": "Low", + "Attack Vector": "Local", + "Availability": "High", + "Confidentiality": "Low", + "Integrity": "Low", + "Privileges Required": "Low", + "Scope": "Unchanged", + "User Interaction": "None", + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H", + "score": 6.6 + }, + "cwe": "Out-of-bounds Write", + "fixes": "6e1acfa387b9ff82cfc7db8cc3b6959221a95851", + "last_affected_version": "5.17.0", + "last_modified": "2023-12-06", + "nvd_text": "A flaw was found in the Linux kernel in linux/net/netfilter/nf_tables_api.c of the netfilter subsystem. This flaw allows a local user to cause an out-of-bounds write issue.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-1015", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-1015", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-1015", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-1015", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-1015", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-1015" + } + }, + "CVE-2022-1016": { + "affected_versions": "v3.13-rc1 to v5.18-rc1", + "breaks": "96518518cc417bb0a8c80b9fb736202e28acdf96", + "cmt_msg": "netfilter: nf_tables: initialize registers in nft_do_chain()", + "cvss3": { + "Attack Complexity": "Low", + "Attack Vector": "Local", + "Availability": "None", + "Confidentiality": "High", + "Integrity": "None", + "Privileges Required": "Low", + "Scope": "Unchanged", + "User Interaction": "None", + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "score": 5.5 + }, + "cwe": "Use After Free", + "fixes": "4c905f6740a365464e91467aa50916555b28213d", + "last_affected_version": "5.17.0", + "last_modified": "2023-12-06", + "nvd_text": "A flaw was found in the Linux kernel in net/netfilter/nf_tables_core.c:nft_do_chain, which can cause a use-after-free. This issue needs to handle 'return' with proper preconditions, as it can lead to a kernel information leak problem caused by a local, unprivileged attacker.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-1016", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-1016", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-1016", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-1016", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-1016", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-1016" + } + }, + "CVE-2022-1043": { + "affected_versions": "v5.12-rc3 to v5.14-rc7", + "breaks": "61cf93700fe6359552848ed5e3becba6cd760efa", + "cmt_msg": "io_uring: fix xa_alloc_cycle() error return value check", + "cvss3": { + "Attack Complexity": "Low", + "Attack Vector": "Local", + "Availability": "High", + "Confidentiality": "High", + "Integrity": "High", + "Privileges Required": "Low", + "Scope": "Changed", + "User Interaction": "None", + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "score": 8.8 + }, + "cwe": "Use After Free", + "fixes": "a30f895ad3239f45012e860d4f94c1a388b36d14", + "last_affected_version": "5.13.12", + "last_modified": "2023-12-06", + "nvd_text": "A flaw was found in the Linux kernel\u2019s io_uring implementation. This flaw allows an attacker with a local account to corrupt system memory, crash the system or escalate privileges.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-1043", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-1043", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-1043", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-1043", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-1043", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-1043" + } + }, + "CVE-2022-1048": { + "affected_versions": "v2.6.12-rc2 to v5.18-rc1", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "ALSA: pcm: Fix races among concurrent hw_params and hw_free calls", + "cvss2": { + "Access Complexity": "Medium", + "Access Vector": "Local Access", + "Authentication": "None", + "Availability Impact": "Complete", + "Confidentiality Impact": "Complete", + "Integrity Impact": "Complete", + "raw": "AV:L/AC:M/Au:N/C:C/I:C/A:C", + "score": 6.9 + }, + "cvss3": { + "Attack Complexity": "High", + "Attack Vector": "Local", + "Availability": "High", + "Confidentiality": "High", + "Integrity": "High", + "Privileges Required": "Low", + "Scope": "Unchanged", + "User Interaction": "None", + "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 7.0 + }, + "cwe": "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')", + "fixes": "92ee3c60ec9fe64404dc035e7c41277d74aa26cb", + "last_affected_version": "5.17.0", + "last_modified": "2023-12-06", + "nvd_text": "A use-after-free flaw was found in the Linux kernel\u2019s sound subsystem in the way a user triggers concurrent calls of PCM hw_params. The hw_free ioctls or similar race condition happens inside ALSA PCM for other ioctls. This flaw allows a local user to crash or potentially escalate their privileges on the system.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-1048", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-1048", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-1048", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-1048", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-1048", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-1048" + } + }, + "CVE-2022-1055": { + "affected_versions": "v5.1-rc1 to v5.17-rc3", + "breaks": "470502de5bdb1ed0def643a4458593a40b8f6b66", + "cmt_msg": "net: sched: fix use-after-free in tc_new_tfilter()", + "cvss2": { + "Access Complexity": "Low", + "Access Vector": "Local Access", + "Authentication": "None", + "Availability Impact": "Partial", + "Confidentiality Impact": "Partial", + "Integrity Impact": "Partial", + "raw": "AV:L/AC:L/Au:N/C:P/I:P/A:P", + "score": 4.6 + }, + "cvss3": { + "Attack Complexity": "Low", + "Attack Vector": "Local", + "Availability": "High", + "Confidentiality": "High", + "Integrity": "High", + "Privileges Required": "Low", + "Scope": "Unchanged", + "User Interaction": "None", + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 7.8 + }, + "cwe": "Use After Free", + "fixes": "04c2a47ffb13c29778e2a14e414ad4cb5a5db4b5", + "last_affected_version": "5.16.5", + "last_modified": "2023-12-06", + "nvd_text": "A use-after-free exists in the Linux Kernel in tc_new_tfilter that could allow a local attacker to gain privilege escalation. The exploit requires unprivileged user namespaces. We recommend upgrading past commit 04c2a47ffb13c29778e2a14e414ad4cb5a5db4b5", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-1055", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-1055", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-1055", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-1055", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-1055", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-1055" + } + }, + "CVE-2022-1116": { + "affected_versions": "unk to unk", + "backport": true, + "breaks": "cac68d12c531aa3010509a5a55a5dfd18dedaa80", + "cvss2": { + "Access Complexity": "Low", + "Access Vector": "Local Access", + "Authentication": "None", + "Availability Impact": "Complete", + "Confidentiality Impact": "Complete", + "Integrity Impact": "Complete", + "raw": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "score": 7.2 + }, + "cvss3": { + "Attack Complexity": "Low", + "Attack Vector": "Local", + "Availability": "High", + "Confidentiality": "High", + "Integrity": "High", + "Privileges Required": "Low", + "Scope": "Unchanged", + "User Interaction": "None", + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 7.8 + }, + "cwe": "Integer Overflow or Wraparound", + "fixes": "1a623d361ffe5cecd4244a02f449528416360038", + "last_modified": "2023-12-06", + "nvd_text": "Integer Overflow or Wraparound vulnerability in io_uring of Linux Kernel allows local attacker to cause memory corruption and escalate privileges to root. This issue affects: Linux Kernel versions prior to 5.4.189; version 5.4.24 and later versions.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-1116", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-1116", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-1116", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-1116", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-1116", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-1116" + } + }, + "CVE-2022-1158": { + "affected_versions": "v5.2-rc1 to v5.18-rc1", + "breaks": "bd53cb35a3e9adb73a834a36586e9ad80e877767", + "cmt_msg": "KVM: x86/mmu: do compare-and-exchange of gPTE via the user address", + "cvss3": { + "Attack Complexity": "Low", + "Attack Vector": "Local", + "Availability": "High", + "Confidentiality": "High", + "Integrity": "High", + "Privileges Required": "Low", + "Scope": "Unchanged", + "User Interaction": "None", + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 7.8 + }, + "cwe": "Use After Free", + "fixes": "2a8859f373b0a86f0ece8ec8312607eacf12485d", + "last_affected_version": "5.17.1", + "last_modified": "2023-12-06", + "nvd_text": "A flaw was found in KVM. When updating a guest's page table entry, vm_pgoff was improperly used as the offset to get the page's pfn. As vaddr and vm_pgoff are controllable by user-mode processes, this flaw allows unprivileged local users on the host to write outside the userspace region and potentially corrupt the kernel, resulting in a denial of service condition.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-1158", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-1158", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-1158", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-1158", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-1158", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-1158" + } + }, + "CVE-2022-1184": { + "affected_versions": "v2.6.12-rc2 to v5.19-rc1", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "ext4: verify dir block before splitting it", + "cvss3": { + "Attack Complexity": "Low", + "Attack Vector": "Local", + "Availability": "High", + "Confidentiality": "None", + "Integrity": "None", + "Privileges Required": "Low", + "Scope": "Unchanged", + "User Interaction": "None", + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "score": 5.5 + }, + "cwe": "Use After Free", + "fixes": "46c116b920ebec58031f0a78c5ea9599b0d2a371", + "last_affected_version": "5.18.2", + "last_modified": "2023-12-06", + "nvd_text": "A use-after-free flaw was found in fs/ext4/namei.c:dx_insert_block() in the Linux kernel\u2019s filesystem sub-component. This flaw allows a local attacker with a user privilege to cause a denial of service.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-1184", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-1184", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-1184", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-1184", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-1184", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-1184" + } + }, + "CVE-2022-1195": { + "affected_versions": "v2.6.12-rc2 to v5.16-rc7", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "hamradio: improve the incomplete fix to avoid NPD", + "cvss2": { + "Access Complexity": "Low", + "Access Vector": "Local Access", + "Authentication": "None", + "Availability Impact": "Partial", + "Confidentiality Impact": "None", + "Integrity Impact": "None", + "raw": "AV:L/AC:L/Au:N/C:N/I:N/A:P", + "score": 2.1 + }, + "cvss3": { + "Attack Complexity": "Low", + "Attack Vector": "Local", + "Availability": "High", + "Confidentiality": "None", + "Integrity": "None", + "Privileges Required": "Low", + "Scope": "Unchanged", + "User Interaction": "None", + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "score": 5.5 + }, + "cwe": "Use After Free", + "fixes": "b2f37aead1b82a770c48b5d583f35ec22aabb61e", + "last_affected_version": "5.15.11", + "last_modified": "2023-12-06", + "nvd_text": "A use-after-free vulnerability was found in the Linux kernel in drivers/net/hamradio. This flaw allows a local attacker with a user privilege to cause a denial of service (DOS) when the mkiss or sixpack device is detached and reclaim resources early.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-1195", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-1195", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-1195", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-1195", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-1195", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-1195" + } + }, + "CVE-2022-1198": { + "affected_versions": "v2.6.12-rc2 to v5.17-rc6", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "drivers: hamradio: 6pack: fix UAF bug caused by mod_timer()", + "cvss3": { + "Attack Complexity": "Low", + "Attack Vector": "Local", + "Availability": "High", + "Confidentiality": "None", + "Integrity": "None", + "Privileges Required": "Low", + "Scope": "Unchanged", + "User Interaction": "None", + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "score": 5.5 + }, + "cwe": "Use After Free", + "fixes": "efe4186e6a1b54bf38b9e05450d43b0da1fd7739", + "last_affected_version": "5.16.14", + "last_modified": "2023-12-06", + "nvd_text": "A use-after-free vulnerabilitity was discovered in drivers/net/hamradio/6pack.c of linux that allows an attacker to crash linux kernel by simulating ax25 device using 6pack driver from user space.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-1198", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-1198", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-1198", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-1198", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-1198", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-1198" + } + }, + "CVE-2022-1199": { + "affected_versions": "v2.6.12-rc2 to v5.17-rc8", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "ax25: Fix NULL pointer dereference in ax25_kill_by_device", + "cvss3": { + "Attack Complexity": "Low", + "Attack Vector": "Network", + "Availability": "High", + "Confidentiality": "None", + "Integrity": "None", + "Privileges Required": "None", + "Scope": "Unchanged", + "User Interaction": "None", + "raw": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "score": 7.5 + }, + "cwe": "NULL Pointer Dereference", + "fixes": "71171ac8eb34ce7fe6b3267dce27c313ab3cb3ac", + "last_affected_version": "5.16.14", + "last_modified": "2023-12-06", + "nvd_text": "A flaw was found in the Linux kernel. This flaw allows an attacker to crash the Linux kernel by simulating amateur radio from the user space, resulting in a null-ptr-deref vulnerability and a use-after-free vulnerability.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-1199", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-1199", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-1199", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-1199", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-1199", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-1199" + } + }, + "CVE-2022-1204": { + "affected_versions": "v2.6.12-rc2 to v5.18-rc1", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "ax25: Fix refcount leaks caused by ax25_cb_del()", + "cvss3": { + "Attack Complexity": "Low", + "Attack Vector": "Local", + "Availability": "High", + "Confidentiality": "None", + "Integrity": "None", + "Privileges Required": "Low", + "Scope": "Unchanged", + "User Interaction": "None", + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "score": 5.5 }, + "cwe": "Use After Free", + "fixes": "9fd75b66b8f68498454d685dc4ba13192ae069b0", + "last_affected_version": "5.17.1", + "last_modified": "2023-12-06", + "nvd_text": "A use-after-free flaw was found in the Linux kernel\u2019s Amateur Radio AX.25 protocol functionality in the way a user connects with the protocol. This flaw allows a local user to crash the system.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-1204", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-1204", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-1204", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-1204", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-1204", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-1204" + } + }, + "CVE-2022-1205": { + "affected_versions": "v5.17-rc4 to v5.18-rc1", + "breaks": "7ec02f5ac8a5be5a3f20611731243dc5e1d9ba10", + "cmt_msg": "ax25: Fix NULL pointer dereferences in ax25 timers", "cvss3": { - "Attack Complexity": "Low", - "Attack Vector": "Network", + "Attack Complexity": "High", + "Attack Vector": "Local", + "Availability": "High", + "Confidentiality": "None", + "Integrity": "None", + "Privileges Required": "Low", + "Scope": "Unchanged", + "User Interaction": "None", + "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", + "score": 4.7 + }, + "cwe": "NULL Pointer Dereference", + "fixes": "fc6d01ff9ef03b66d4a3a23b46fc3c3d8cf92009", + "last_affected_version": "5.17.1", + "last_modified": "2023-12-06", + "nvd_text": "A NULL pointer dereference flaw was found in the Linux kernel\u2019s Amateur Radio AX.25 protocol functionality in the way a user connects with the protocol. This flaw allows a local user to crash the system.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-1205", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-1205", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-1205", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-1205", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-1205", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-1205" + } + }, + "CVE-2022-1247": { + "affected_versions": "unk to unk", + "breaks": "", + "cvss3": { + "Attack Complexity": "High", + "Attack Vector": "Local", "Availability": "High", "Confidentiality": "High", "Integrity": "High", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", - "score": 8.8 + "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 7.0 }, - "cwe": "Out-of-bounds Write", - "fixes": "9aa422ad326634b76309e8ff342c246800621216", - "last_affected_version": "5.16.8", + "cwe": "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')", + "fixes": "", "last_modified": "2023-12-06", - "nvd_text": "A stack overflow flaw was found in the Linux kernel's TIPC protocol functionality in the way a user sends a packet with malicious content where the number of domain member nodes is higher than the 64 allowed. This flaw allows a remote user to crash the system or possibly escalate their privileges if they have access to the TIPC network.", + "nvd_text": "An issue found in linux-kernel that leads to a race condition in rose_connect(). The rose driver uses rose_neigh->use to represent how many objects are using the rose_neigh. When a user wants to delete a rose_route via rose_ioctl(), the rose driver calls rose_del_node() and removes neighbours only if their \u201ccount\u201d and \u201cuse\u201d are zero.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-0435", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-0435", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-0435", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-0435", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-0435", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-0435" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-1247", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-1247", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-1247", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-1247", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-1247", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-1247" } }, - "CVE-2022-0480": { - "affected_versions": "v2.6.12-rc2 to v5.15-rc1", + "CVE-2022-1263": { + "affected_versions": "v2.6.12-rc2 to v5.18-rc3", "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", - "cmt_msg": "memcg: enable accounting for file lock caches", + "cmt_msg": "KVM: avoid NULL pointer dereference in kvm_dirty_ring_push", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", @@ -72017,75 +77932,435 @@ "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "score": 5.5 }, - "cwe": "Allocation of Resources Without Limits or Throttling", - "fixes": "0f12156dff2862ac54235fc72703f18770769042", + "cwe": "NULL Pointer Dereference", + "fixes": "5593473a1e6c743764b08e3b6071cb43b5cfa6c4", + "last_affected_version": "5.17.2", "last_modified": "2023-12-06", - "nvd_text": "A flaw was found in the filelock_init in fs/locks.c function in the Linux kernel. This issue can lead to host memory exhaustion due to memcg not limiting the number of Portable Operating System Interface (POSIX) file locks.", + "nvd_text": "A NULL pointer dereference issue was found in KVM when releasing a vCPU with dirty ring support enabled. This flaw allows an unprivileged local attacker on the host to issue specific ioctl calls, causing a kernel oops condition that results in a denial of service.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-0480", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-0480", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-0480", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-0480", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-0480", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-0480" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-1263", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-1263", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-1263", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-1263", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-1263", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-1263" } }, - "CVE-2022-0487": { - "affected_versions": "v3.16-rc1 to v5.17-rc4", - "breaks": "1b66e94e6b9995323190f31c51d8e1a6f516627e", - "cmt_msg": "moxart: fix potential use-after-free on remove path", + "CVE-2022-1280": { + "affected_versions": "v2.6.12-rc2 to v5.15-rc1", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "drm: avoid circular locks in drm_mode_getconnector", + "cvss2": { + "Access Complexity": "Medium", + "Access Vector": "Local Access", + "Authentication": "None", + "Availability Impact": "Partial", + "Confidentiality Impact": "Partial", + "Integrity Impact": "None", + "raw": "AV:L/AC:M/Au:N/C:P/I:N/A:P", + "score": 3.3 + }, + "cvss3": { + "Attack Complexity": "High", + "Attack Vector": "Local", + "Availability": "High", + "Confidentiality": "High", + "Integrity": "None", + "Privileges Required": "Low", + "Scope": "Unchanged", + "User Interaction": "None", + "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H", + "score": 6.3 + }, + "cwe": "Use After Free", + "fixes": "869e76f7a918f010bd4518d58886969b1f642a04", + "last_modified": "2023-12-06", + "nvd_text": "A use-after-free vulnerability was found in drm_lease_held in drivers/gpu/drm/drm_lease.c in the Linux kernel due to a race problem. This flaw allows a local user privilege attacker to cause a denial of service (DoS) or a kernel information leak.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-1280", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-1280", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-1280", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-1280", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-1280", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-1280" + } + }, + "CVE-2022-1353": { + "affected_versions": "v2.6.12-rc2 to v5.17", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "af_key: add __GFP_ZERO flag for compose_sadb_supported in function pfkey_register", "cvss2": { "Access Complexity": "Low", "Access Vector": "Local Access", "Authentication": "None", - "Availability Impact": "None", + "Availability Impact": "Partial", "Confidentiality Impact": "Partial", "Integrity Impact": "None", - "raw": "AV:L/AC:L/Au:N/C:P/I:N/A:N", - "score": 2.1 + "raw": "AV:L/AC:L/Au:N/C:P/I:N/A:P", + "score": 3.6 }, "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", - "Availability": "None", + "Availability": "High", "Confidentiality": "High", "Integrity": "None", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", + "score": 7.1 + }, + "cwe": "Unspecified", + "fixes": "9a564bccb78a76740ea9d75a259942df8143d02c", + "last_affected_version": "5.16", + "last_modified": "2023-12-06", + "nvd_text": "A vulnerability was found in the pfkey_register function in net/key/af_key.c in the Linux kernel. This flaw allows a local, unprivileged user to gain access to kernel memory, leading to a system crash or a leak of internal kernel information.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-1353", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-1353", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-1353", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-1353", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-1353", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-1353" + } + }, + "CVE-2022-1419": { + "affected_versions": "v4.1-rc1 to v5.6-rc2", + "breaks": "502e95c6678505474f1056480310cd9382bacbac", + "cmt_msg": "drm/vgem: Close use-after-free race in vgem_gem_create", + "cvss2": { + "Access Complexity": "Low", + "Access Vector": "Local Access", + "Authentication": "None", + "Availability Impact": "Partial", + "Confidentiality Impact": "Partial", + "Integrity Impact": "Partial", + "raw": "AV:L/AC:L/Au:N/C:P/I:P/A:P", + "score": 4.6 + }, + "cvss3": { + "Attack Complexity": "Low", + "Attack Vector": "Local", + "Availability": "High", + "Confidentiality": "High", + "Integrity": "High", + "Privileges Required": "Low", + "Scope": "Unchanged", + "User Interaction": "None", + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 7.8 + }, + "cwe": "Use After Free", + "fixes": "4b848f20eda5974020f043ca14bacf7a7e634fc8", + "last_affected_version": "5.5.4", + "last_modified": "2023-12-06", + "nvd_text": "The root cause of this vulnerability is that the ioctl$DRM_IOCTL_MODE_DESTROY_DUMB can decrease refcount of *drm_vgem_gem_object *(created in *vgem_gem_dumb_create*) concurrently, and *vgem_gem_dumb_create *will access the freed drm_vgem_gem_object.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-1419", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-1419", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-1419", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-1419", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-1419", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-1419" + } + }, + "CVE-2022-1462": { + "affected_versions": "v2.6.12-rc2 to v5.19-rc7", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "tty: use new tty_insert_flip_string_and_push_buffer() in pty_write()", + "cvss2": { + "Access Complexity": "Medium", + "Access Vector": "Local Access", + "Authentication": "None", + "Availability Impact": "Partial", + "Confidentiality Impact": "Partial", + "Integrity Impact": "None", + "raw": "AV:L/AC:M/Au:N/C:P/I:N/A:P", + "score": 3.3 + }, + "cvss3": { + "Attack Complexity": "High", + "Attack Vector": "Local", + "Availability": "High", + "Confidentiality": "High", + "Integrity": "None", + "Privileges Required": "Low", + "Scope": "Unchanged", + "User Interaction": "None", + "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H", + "score": 6.3 + }, + "cwe": "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')", + "fixes": "a501ab75e7624d133a5a3c7ec010687c8b961d23", + "last_affected_version": "5.18.12", + "last_modified": "2023-12-06", + "nvd_text": "An out-of-bounds read flaw was found in the Linux kernel\u2019s TeleTYpe subsystem. The issue occurs in how a user triggers a race condition using ioctls TIOCSPTLCK and TIOCGPTPEER and TIOCSTI and TCXONC with leakage of memory in the flush_to_ldisc function. This flaw allows a local user to crash the system or read unauthorized random data from memory.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-1462", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-1462", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-1462", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-1462", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-1462", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-1462" + } + }, + "CVE-2022-1508": { + "affected_versions": "v5.11-rc1 to v5.15-rc1", + "breaks": "632546c4b5a4dad8e3ac456406c65c0db9a0b570", + "cmt_msg": "io_uring: reexpand under-reexpanded iters", + "cvss3": { + "Attack Complexity": "Low", + "Attack Vector": "Local", + "Availability": "High", + "Confidentiality": "Low", + "Integrity": "None", + "Privileges Required": "Low", + "Scope": "Unchanged", + "User Interaction": "None", + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H", + "score": 6.1 + }, + "cwe": "Out-of-bounds Read", + "fixes": "89c2b3b74918200e46699338d7bcc19b1ea12110", + "last_modified": "2024-01-15", + "nvd_text": "An out-of-bounds read flaw was found in the Linux kernel\u2019s io_uring module in the way a user triggers the io_read() function with some special parameters. This flaw allows a local user to read some memory out of bounds.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-1508", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-1508", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-1508", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-1508", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-1508", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-1508" + } + }, + "CVE-2022-1516": { + "affected_versions": "v5.7-rc5 to v5.18-rc1", + "breaks": "4becb7ee5b3d2829ed7b9261a245a77d5b7de902", + "cmt_msg": "net/x25: Fix null-ptr-deref caused by x25_disconnect", + "cvss2": { + "Access Complexity": "Low", + "Access Vector": "Local Access", + "Authentication": "None", + "Availability Impact": "Complete", + "Confidentiality Impact": "None", + "Integrity Impact": "None", + "raw": "AV:L/AC:L/Au:N/C:N/I:N/A:C", + "score": 4.9 + }, + "cvss3": { + "Attack Complexity": "Low", + "Attack Vector": "Local", + "Availability": "High", + "Confidentiality": "None", + "Integrity": "None", + "Privileges Required": "Low", + "Scope": "Unchanged", + "User Interaction": "None", + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "score": 5.5 }, "cwe": "Use After Free", - "fixes": "bd2db32e7c3e35bd4d9b8bbff689434a50893546", - "last_affected_version": "5.16.8", + "fixes": "7781607938c8371d4c2b243527430241c62e39c2", + "last_affected_version": "5.17.1", "last_modified": "2023-12-06", - "nvd_text": "A use-after-free vulnerability was found in rtsx_usb_ms_drv_remove in drivers/memstick/host/rtsx_usb_ms.c in memstick in the Linux kernel. In this flaw, a local attacker with a user privilege may impact system Confidentiality. This flaw affects kernel versions prior to 5.14 rc1.", + "nvd_text": "A NULL pointer dereference flaw was found in the Linux kernel\u2019s X.25 set of standardized network protocols functionality in the way a user terminates their session using a simulated Ethernet card and continued usage of this connection. This flaw allows a local user to crash the system.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-0487", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-0487", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-0487", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-0487", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-0487", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-0487" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-1516", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-1516", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-1516", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-1516", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-1516", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-1516" + } + }, + "CVE-2022-1651": { + "affected_versions": "v5.12-rc1-dontuse to v5.18-rc1", + "breaks": "9c5137aedd112f78a968bdd2325de2ea06df46c0", + "cmt_msg": "virt: acrn: fix a memory leak in acrn_dev_ioctl()", + "cvss3": { + "Attack Complexity": "Low", + "Attack Vector": "Local", + "Availability": "High", + "Confidentiality": "High", + "Integrity": "None", + "Privileges Required": "Low", + "Scope": "Unchanged", + "User Interaction": "None", + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", + "score": 7.1 + }, + "cwe": "Missing Release of Memory after Effective Lifetime", + "fixes": "ecd1735f14d6ac868ae5d8b7a2bf193fa11f388b", + "last_affected_version": "5.17.1", + "last_modified": "2023-12-06", + "nvd_text": "A memory leak flaw was found in the Linux kernel in acrn_dev_ioctl in the drivers/virt/acrn/hsm.c function in how the ACRN Device Model emulates virtual NICs in VM. This flaw allows a local privileged attacker to leak unauthorized kernel information, causing a denial of service.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-1651", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-1651", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-1651", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-1651", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-1651", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-1651" + } + }, + "CVE-2022-1652": { + "affected_versions": "v2.6.12-rc2 to v5.18-rc6", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "floppy: use a statically allocated error counter", + "cvss2": { + "Access Complexity": "Low", + "Access Vector": "Local Access", + "Authentication": "None", + "Availability Impact": "Complete", + "Confidentiality Impact": "Complete", + "Integrity Impact": "Complete", + "raw": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "score": 7.2 + }, + "cvss3": { + "Attack Complexity": "Low", + "Attack Vector": "Local", + "Availability": "High", + "Confidentiality": "High", + "Integrity": "High", + "Privileges Required": "Low", + "Scope": "Unchanged", + "User Interaction": "None", + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 7.8 + }, + "cwe": "Use After Free", + "fixes": "f71f01394f742fc4558b3f9f4c7ef4c4cf3b07c8", + "last_affected_version": "5.17.9", + "last_modified": "2023-12-06", + "nvd_text": "Linux Kernel could allow a local attacker to execute arbitrary code on the system, caused by a concurrency use-after-free flaw in the bad_flp_intr function. By executing a specially-crafted program, an attacker could exploit this vulnerability to execute arbitrary code or cause a denial of service condition on the system.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-1652", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-1652", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-1652", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-1652", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-1652", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-1652" + } + }, + "CVE-2022-1671": { + "affected_versions": "v5.11-rc1 to v5.18-rc1", + "breaks": "12da59fcab5a05d01773e7cb413b8b8f3bb4e334", + "cmt_msg": "rxrpc: fix some null-ptr-deref bugs in server_key.c", + "cvss3": { + "Attack Complexity": "Low", + "Attack Vector": "Local", + "Availability": "High", + "Confidentiality": "High", + "Integrity": "None", + "Privileges Required": "Low", + "Scope": "Unchanged", + "User Interaction": "None", + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", + "score": 7.1 + }, + "cwe": "NULL Pointer Dereference", + "fixes": "ff8376ade4f668130385839cef586a0990f8ef87", + "last_affected_version": "5.17.1", + "last_modified": "2023-12-06", + "nvd_text": "A NULL pointer dereference flaw was found in rxrpc_preparse_s in net/rxrpc/server_key.c in the Linux kernel. This flaw allows a local attacker to crash the system or leak internal kernel information.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-1671", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-1671", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-1671", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-1671", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-1671", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-1671" + } + }, + "CVE-2022-1678": { + "affected_versions": "v4.18-rc1 to v4.20-rc1", + "alt_msg": "tcp: fix possible socket leaks in internal pacing mode", + "breaks": "73a6bab5aa2a83cb7df85805e08bc03b4065aea7", + "cmt_msg": "tcp: optimize tcp internal pacing", + "cvss2": { + "Access Complexity": "Low", + "Access Vector": "Network Accessible", + "Authentication": "None", + "Availability Impact": "Partial", + "Confidentiality Impact": "None", + "Integrity Impact": "None", + "raw": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "score": 5.0 + }, + "cvss3": { + "Attack Complexity": "Low", + "Attack Vector": "Network", + "Availability": "High", + "Confidentiality": "None", + "Integrity": "None", + "Privileges Required": "None", + "Scope": "Unchanged", + "User Interaction": "None", + "raw": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "score": 7.5 + }, + "cwe": "Unspecified", + "fixes": "864e5c090749448e879e86bec06ee396aa2c19c5", + "last_affected_version": "4.19.227", + "last_modified": "2023-12-06", + "nvd_text": "An issue was discovered in the Linux Kernel from 4.18 to 4.19, an improper update of sock reference in TCP pacing can lead to memory/netns leak, which can be used by remote clients.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-1678", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-1678", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-1678", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-1678", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-1678", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-1678" + } + }, + "CVE-2022-1679": { + "affected_versions": "v2.6.35-rc1 to v6.0-rc1", + "breaks": "fb9987d0f748c983bb795a86f47522313f701a08", + "cmt_msg": "ath9k: fix use-after-free in ath9k_hif_usb_rx_cb", + "cvss2": { + "Access Complexity": "Low", + "Access Vector": "Local Access", + "Authentication": "None", + "Availability Impact": "Complete", + "Confidentiality Impact": "Complete", + "Integrity Impact": "Complete", + "raw": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "score": 7.2 + }, + "cvss3": { + "Attack Complexity": "Low", + "Attack Vector": "Local", + "Availability": "High", + "Confidentiality": "High", + "Integrity": "High", + "Privileges Required": "Low", + "Scope": "Unchanged", + "User Interaction": "None", + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 7.8 + }, + "cwe": "Use After Free", + "fixes": "0ac4827f78c7ffe8eef074bc010e7e34bc22f533", + "last_affected_version": "5.19.1", + "last_modified": "2023-12-06", + "nvd_text": "A use-after-free flaw was found in the Linux kernel\u2019s Atheros wireless adapter driver in the way a user forces the ath9k_htc_wait_for_target function to fail with some input messages. This flaw allows a local user to crash or potentially escalate their privileges on the system.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-1679", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-1679", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-1679", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-1679", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-1679", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-1679" } }, - "CVE-2022-0492": { - "affected_versions": "v2.6.24-rc1 to v5.17-rc3", - "breaks": "81a6a5cdd2c5cd70874b88afe524ab09e9e869af", - "cmt_msg": "cgroup-v1: Require capabilities to set release_agent", - "cvss2": { - "Access Complexity": "Medium", - "Access Vector": "Local Access", - "Authentication": "None", - "Availability Impact": "Complete", - "Confidentiality Impact": "Complete", - "Integrity Impact": "Complete", - "raw": "AV:L/AC:M/Au:N/C:C/I:C/A:C", - "score": 6.9 - }, + "CVE-2022-1729": { + "affected_versions": "v4.0-rc1 to v5.18", + "breaks": "f63a8daa5812afef4f06c962351687e1ff9ccb2b", + "cmt_msg": "perf: Fix sys_perf_event_open() race against self", "cvss3": { - "Attack Complexity": "Low", + "Attack Complexity": "High", "Attack Vector": "Local", "Availability": "High", "Confidentiality": "High", @@ -72093,67 +78368,69 @@ "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", - "score": 7.8 + "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 7.0 }, - "cwe": "Improper Authentication", - "fixes": "24f6008564183aa120d07c03d9289519c2fe02af", - "last_affected_version": "5.16.5", + "cwe": "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')", + "fixes": "3ac6487e584a1eb54071dbe1212e05b884136704", + "last_affected_version": "5.17", "last_modified": "2023-12-06", - "nvd_text": "A vulnerability was found in the Linux kernel\u2019s cgroup_release_agent_write in the kernel/cgroup/cgroup-v1.c function. This flaw, under certain circumstances, allows the use of the cgroups v1 release_agent feature to escalate privileges and bypass the namespace isolation unexpectedly.", + "nvd_text": "A race condition was found the Linux kernel in perf_event_open() which can be exploited by an unprivileged user to gain root privileges. The bug allows to build several exploit primitives such as kernel address information leak, arbitrary execution, etc.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-0492", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-0492", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-0492", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-0492", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-0492", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-0492" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-1729", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-1729", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-1729", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-1729", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-1729", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-1729" } }, - "CVE-2022-0494": { - "affected_versions": "v2.6.12-rc2 to v5.17-rc5", - "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", - "cmt_msg": "block-map: add __GFP_ZERO flag for alloc_page in function bio_copy_kern", + "CVE-2022-1734": { + "affected_versions": "v4.4-rc1 to v5.18-rc6", + "breaks": "3194c6870158e305dac2af52f83681e9cb67280f", + "cmt_msg": "nfc: nfcmrvl: main: reorder destructive operations in nfcmrvl_nci_unregister_dev to avoid bugs", "cvss2": { - "Access Complexity": "Low", + "Access Complexity": "Medium", "Access Vector": "Local Access", "Authentication": "None", - "Availability Impact": "None", - "Confidentiality Impact": "Complete", - "Integrity Impact": "None", - "raw": "AV:L/AC:L/Au:N/C:C/I:N/A:N", - "score": 4.9 + "Availability Impact": "Partial", + "Confidentiality Impact": "Partial", + "Integrity Impact": "Partial", + "raw": "AV:L/AC:M/Au:N/C:P/I:P/A:P", + "score": 4.4 }, "cvss3": { - "Attack Complexity": "Low", + "Attack Complexity": "High", "Attack Vector": "Local", - "Availability": "None", + "Availability": "High", "Confidentiality": "High", - "Integrity": "None", - "Privileges Required": "High", + "Integrity": "High", + "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", - "score": 4.4 + "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 7.0 }, - "cwe": "Exposure of Sensitive Information to an Unauthorized Actor", - "fixes": "cc8f7fe1f5eab010191aa4570f27641876fa1267", - "last_affected_version": "5.16.12", + "cwe": "Use After Free", + "fixes": "d270453a0d9ec10bb8a802a142fb1b3601a83098", + "last_affected_version": "5.17.6", "last_modified": "2023-12-06", - "nvd_text": "A kernel information leak flaw was identified in the scsi_ioctl function in drivers/scsi/scsi_ioctl.c in the Linux kernel. This flaw allows a local attacker with a special user privilege (CAP_SYS_ADMIN or CAP_SYS_RAWIO) to create issues with confidentiality.", + "nvd_text": "A flaw in Linux Kernel found in nfcmrvl_nci_unregister_dev() in drivers/nfc/nfcmrvl/main.c can lead to use after free both read or write when non synchronized between cleanup routine and firmware download routine.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-0494", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-0494", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-0494", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-0494", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-0494", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-0494" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-1734", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-1734", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-1734", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-1734", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-1734", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-1734" } }, - "CVE-2022-0500": { - "affected_versions": "v5.10-rc1 to v5.17-rc1", - "breaks": "63d9b80dcf2c67bc5ade61cbbaa09d7af21f43f1", - "cmt_msg": "bpf: Introduce MEM_RDONLY flag", + "CVE-2022-1786": { + "affected_versions": "v5.10-rc1 to v5.12-rc1-dontuse", + "alt_msg": "io_uring: always use original task when preparing req identity", + "backport": true, + "breaks": "500a373d731ac506612db12631ec21295c1ff360", + "cmt_msg": "io_uring: remove io_identity", "cvss2": { "Access Complexity": "Low", "Access Vector": "Local Access", @@ -72176,73 +78453,91 @@ "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "score": 7.8 }, - "cwe": "Improper Restriction of Operations within the Bounds of a Memory Buffer", - "fixes": "20b2aff4bc15bda809f994761d5719827d66c0b4", - "last_affected_version": "5.16.10", - "last_modified": "2023-12-06", - "nvd_text": "A flaw was found in unrestricted eBPF usage by the BPF_BTF_LOAD, leading to a possible out-of-bounds memory write in the Linux kernel\u2019s BPF subsystem due to the way a user loads BTF. This flaw allows a local user to crash or escalate their privileges on the system.", + "cwe": "Use After Free", + "fixes": "4379bf8bd70b5de6bba7d53015b0c36c57a634ee", + "last_affected_version": "5.10.116", + "last_modified": "2024-01-12", + "nvd_text": "A use-after-free flaw was found in the Linux kernel\u2019s io_uring subsystem in the way a user sets up a ring with IORING_SETUP_IOPOLL with more than one task completing submissions on this ring. This flaw allows a local user to crash or escalate their privileges on the system.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-0500", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-0500", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-0500", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-0500", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-0500", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-0500" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-1786", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-1786", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-1786", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-1786", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-1786", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-1786" } }, - "CVE-2022-0516": { - "affected_versions": "v5.7-rc1 to v5.17-rc4", - "breaks": "19e1227768863a1469797c13ef8fea1af7beac2c", - "cmt_msg": "KVM: s390: Return error on SIDA memop on normal guest", + "CVE-2022-1789": { + "affected_versions": "v4.19-rc1 to v5.18", + "breaks": "eb4b248e152d3ecf189b9d32c04961360dbd938a", + "cmt_msg": "KVM: x86/mmu: fix NULL pointer dereference on guest INVPCID", "cvss2": { - "Access Complexity": "Low", + "Access Complexity": "Medium", "Access Vector": "Local Access", "Authentication": "None", - "Availability Impact": "Partial", - "Confidentiality Impact": "Partial", - "Integrity Impact": "Partial", - "raw": "AV:L/AC:L/Au:N/C:P/I:P/A:P", - "score": 4.6 + "Availability Impact": "Complete", + "Confidentiality Impact": "Complete", + "Integrity Impact": "Complete", + "raw": "AV:L/AC:M/Au:N/C:C/I:C/A:C", + "score": 6.9 }, "cvss3": { "Attack Complexity": "Low", - "Attack Vector": "Local", + "Attack Vector": "Physical", "Availability": "High", "Confidentiality": "High", "Integrity": "High", - "Privileges Required": "Low", + "Privileges Required": "None", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", - "score": 7.8 + "raw": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "score": 6.8 }, - "cwe": "Unspecified", - "fixes": "2c212e1baedcd782b2535a3f86bc491977677c0e", - "last_affected_version": "5.16.8", + "cwe": "NULL Pointer Dereference", + "fixes": "9f46c187e2e680ecd9de7983e4d081c3391acc76", + "last_affected_version": "5.17", "last_modified": "2023-12-06", - "nvd_text": "A vulnerability was found in kvm_s390_guest_sida_op in the arch/s390/kvm/kvm-s390.c function in KVM for s390 in the Linux kernel. This flaw allows a local attacker with a normal user privilege to obtain unauthorized memory write access. This flaw affects Linux kernel versions prior to 5.17-rc4.", + "nvd_text": "With shadow paging enabled, the INVPCID instruction results in a call to kvm_mmu_invpcid_gva. If INVPCID is executed with CR0.PG=0, the invlpg callback is not set and the result is a NULL pointer dereference.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-0516", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-0516", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-0516", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-0516", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-0516", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-0516" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-1789", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-1789", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-1789", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-1789", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-1789", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-1789" } }, - "CVE-2022-0617": { - "affected_versions": "v4.2-rc1 to v5.17-rc2", - "breaks": "52ebea749aaed195245701a8f90a23d672c7a933", - "cmt_msg": "udf: Fix NULL ptr deref when converting from inline format", + "CVE-2022-1836": { + "affected_versions": "unk to v5.18-rc5", + "breaks": "", + "cmt_msg": "floppy: disable FDRAWCMD by default", + "fixes": "233087ca063686964a53c829d547c7571e3f67bf", + "last_affected_version": "5.17.5", + "last_modified": "2023-12-06", + "nvd_text": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2022-33981. Reason: This candidate is a reservation duplicate of CVE-2022-33981. Notes: All CVE users should reference CVE-2022-33981 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-1836", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-1836", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-1836", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-1836", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-1836", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-1836" + }, + "rejected": true + }, + "CVE-2022-1852": { + "affected_versions": "v5.12-rc1-dontuse to v5.19-rc1", + "breaks": "4aa2691dcbd38ce1c461188799d863398dd2865d", + "cmt_msg": "KVM: x86: avoid calling x86 emulator without a decoded instruction", "cvss2": { "Access Complexity": "Low", "Access Vector": "Local Access", "Authentication": "None", - "Availability Impact": "Complete", + "Availability Impact": "Partial", "Confidentiality Impact": "None", "Integrity Impact": "None", - "raw": "AV:L/AC:L/Au:N/C:N/I:N/A:C", - "score": 4.9 + "raw": "AV:L/AC:L/Au:N/C:N/I:N/A:P", + "score": 2.1 }, "cvss3": { "Attack Complexity": "Low", @@ -72257,40 +78552,23 @@ "score": 5.5 }, "cwe": "NULL Pointer Dereference", - "fixes": "7fc3b7c2981bbd1047916ade327beccb90994eee", - "last_affected_version": "5.16.4", + "fixes": "fee060cd52d69c114b62d1a2948ea9648b5131f9", + "last_affected_version": "5.18.1", "last_modified": "2023-12-06", - "nvd_text": "A flaw null pointer dereference in the Linux kernel UDF file system functionality was found in the way user triggers udf_file_write_iter function for the malicious UDF image. A local user could use this flaw to crash the system. Actual from Linux kernel 4.2-rc1 till 5.17-rc2.", + "nvd_text": "A NULL pointer dereference flaw was found in the Linux kernel\u2019s KVM module, which can lead to a denial of service in the x86_emulate_insn in arch/x86/kvm/emulate.c. This flaw occurs while executing an illegal instruction in guest in the Intel CPU.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-0617", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-0617", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-0617", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-0617", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-0617", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-0617" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-1852", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-1852", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-1852", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-1852", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-1852", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-1852" } }, - "CVE-2022-0644": { - "affected_versions": "v4.6-rc1 to v5.15-rc7", - "breaks": "b844f0ecbc5626ec26cfc70cb144a4c9b85dc3f2", - "cmt_msg": "vfs: check fd has read access in kernel_read_file_from_fd()", - "fixes": "032146cda85566abcd1c4884d9d23e4e30a07e9a", - "last_affected_version": "5.14.14", - "last_modified": "2023-12-06", - "nvd_text": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none", - "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-0644", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-0644", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-0644", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-0644", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-0644", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-0644" - }, - "rejected": true - }, - "CVE-2022-0646": { - "affected_versions": "v5.17-rc1 to v5.17-rc5", - "breaks": "7bd9890f3d74e96f0e1a898f68decfc711de3001", + "CVE-2022-1882": { + "affected_versions": "v5.17-rc8 to v5.19-rc8", + "breaks": "db8facfc9fafacefe8a835416a6b77c838088f8b", + "cmt_msg": "watchqueue: make sure to serialize 'wqueue->defunct' properly", "cvss2": { "Access Complexity": "Low", "Access Vector": "Local Access", @@ -72314,92 +78592,63 @@ "score": 7.8 }, "cwe": "Use After Free", - "fixes": "6c342ce2239c182c2428ce5a44cb32330434ae6e", + "fixes": "353f7988dd8413c47718f7ca79c030b6fb62cfe5", + "last_affected_version": "5.18.14", "last_modified": "2023-12-06", - "nvd_text": "A flaw use after free in the Linux kernel Management Component Transport Protocol (MCTP) subsystem was found in the way user triggers cancel_work_sync after the unregister_netdev during removing device. A local user could use this flaw to crash the system or escalate their privileges on the system. It is actual from Linux Kernel 5.17-rc1 (when mctp-serial.c introduced) till 5.17-rc5.", + "nvd_text": "A use-after-free flaw was found in the Linux kernel\u2019s pipes functionality in how a user performs manipulations with the pipe post_one_notification() after free_pipe_info() that is already called. This flaw allows a local user to crash or potentially escalate their privileges on the system.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-0646", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-0646", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-0646", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-0646", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-0646", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-0646" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-1882", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-1882", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-1882", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-1882", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-1882", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-1882" } }, - "CVE-2022-0742": { - "affected_versions": "v5.13-rc1 to v5.17-rc7", - "breaks": "f185de28d9ae6c978135993769352e523ee8df06", - "cmt_msg": "ipv6: fix skb drops in igmp6_event_query() and igmp6_event_report()", + "CVE-2022-1943": { + "affected_versions": "v5.15-rc1 to v5.18-rc7", + "breaks": "979a6e28dd969a2222545001f79566b4bfaf06c0", + "cmt_msg": "udf: Avoid using stale lengthOfImpUse", "cvss2": { "Access Complexity": "Low", - "Access Vector": "Network Accessible", + "Access Vector": "Local Access", "Authentication": "None", "Availability Impact": "Complete", - "Confidentiality Impact": "None", - "Integrity Impact": "None", - "raw": "AV:N/AC:L/Au:N/C:N/I:N/A:C", - "score": 7.8 + "Confidentiality Impact": "Complete", + "Integrity Impact": "Complete", + "raw": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "score": 7.2 }, "cvss3": { "Attack Complexity": "Low", - "Attack Vector": "Network", + "Attack Vector": "Local", "Availability": "High", - "Confidentiality": "None", - "Integrity": "None", - "Privileges Required": "None", - "Scope": "Unchanged", - "User Interaction": "None", - "raw": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", - "score": 7.5 - }, - "cwe": "Missing Release of Memory after Effective Lifetime", - "fixes": "2d3916f3189172d5c69d33065c3c21119fe539fc", - "last_affected_version": "5.16.12", - "last_modified": "2023-12-06", - "nvd_text": "Memory leak in icmp6 implementation in Linux Kernel 5.13+ allows a remote attacker to DoS a host by making it go out-of-memory via icmp6 packets of type 130 or 131. We recommend upgrading past commit 2d3916f3189172d5c69d33065c3c21119fe539fc.", - "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-0742", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-0742", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-0742", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-0742", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-0742", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-0742" - } - }, - "CVE-2022-0812": { - "affected_versions": "v4.7-rc1 to v5.8-rc6", - "breaks": "302d3deb20682a076e1ab551821cacfdc81c5e4f", - "cmt_msg": "xprtrdma: fix incorrect header size calculations", - "cvss3": { - "Attack Complexity": "Low", - "Attack Vector": "Network", - "Availability": "None", - "Confidentiality": "Low", - "Integrity": "None", + "Confidentiality": "High", + "Integrity": "High", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", - "score": 4.3 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 7.8 }, - "cwe": "Unspecified", - "fixes": "912288442cb2f431bf3c8cb097a5de83bc6dbac1", - "last_affected_version": "5.7.9", + "cwe": "Out-of-bounds Write", + "fixes": "c1ad35dd0548ce947d97aaf92f7f2f9a202951cf", + "last_affected_version": "5.17.7", "last_modified": "2023-12-06", - "nvd_text": "An information leak flaw was found in NFS over RDMA in the net/sunrpc/xprtrdma/rpc_rdma.c in the Linux Kernel. This flaw allows an attacker with normal user privileges to leak kernel information.", + "nvd_text": "A flaw out of bounds memory write in the Linux kernel UDF file system functionality was found in the way user triggers some file operation which triggers udf_write_fi(). A local user could use this flaw to crash the system or potentially", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-0812", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-0812", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-0812", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-0812", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-0812", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-0812" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-1943", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-1943", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-1943", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-1943", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-1943", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-1943" } }, - "CVE-2022-0847": { - "affected_versions": "v5.8-rc1 to v5.17-rc6", - "breaks": "f6dd975583bd8ce088400648fd9819e4691c8958", - "cmt_msg": "lib/iov_iter: initialize \"flags\" in new pipe_buffer", + "CVE-2022-1966": { + "affected_versions": "unk to v5.19-rc1", + "breaks": "", + "cmt_msg": "netfilter: nf_tables: disallow non-stateful expression in sets earlier", "cvss2": { "Access Complexity": "Low", "Access Vector": "Local Access", @@ -72422,25 +78671,43 @@ "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "score": 7.8 }, - "cwe": "Improper Initialization", - "fixes": "9d2231c5d74e13b2a0546fee6737ee4446017903", - "last_affected_version": "5.16.10", + "cwe": "Use After Free", + "fixes": "520778042ccca019f3ffa136dd0ca565c486cedd", + "last_affected_version": "5.18.1", "last_modified": "2023-12-06", - "name": "Dirty Pipe", - "nvd_text": "A flaw was found in the way the \"flags\" member of the new pipe buffer structure was lacking proper initialization in copy_page_to_iter_pipe and push_pipe functions in the Linux kernel and could thus contain stale values. An unprivileged local user could use this flaw to write to pages in the page cache backed by read only files and as such escalate their privileges on the system.", + "nvd_text": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2022-32250. Reason: This candidate is a duplicate of CVE-2022-32250. Notes: All CVE users should reference CVE-2022-32250 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-0847", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-0847", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-0847", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-0847", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-0847", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-0847" - } + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-1966", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-1966", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-1966", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-1966", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-1966", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-1966" + }, + "rejected": true }, - "CVE-2022-0850": { - "affected_versions": "v2.6.19-rc2 to v5.14-rc1", - "breaks": "a86c61812637c7dd0c57e29880cffd477b62f2e7", - "cmt_msg": "ext4: fix kernel infoleak via ext4_extent_header", + "CVE-2022-1972": { + "affected_versions": "v5.6-rc1 to v5.19-rc1", + "breaks": "f3a2181e16f1dcbf5446ed43f6b5d9f56c459f85", + "cmt_msg": "netfilter: nf_tables: sanitize nft_set_desc_concat_parse()", + "fixes": "fecf31ee395b0295f2d7260aa29946b7605f7c85", + "last_affected_version": "5.18.1", + "last_modified": "2023-12-06", + "nvd_text": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2022-2078. Reason: This candidate is a reservation duplicate of CVE-2022-2078. Notes: All CVE users should reference CVE-2022-2078 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-1972", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-1972", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-1972", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-1972", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-1972", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-1972" + }, + "rejected": true + }, + "CVE-2022-1973": { + "affected_versions": "v5.15-rc1 to v5.19-rc1", + "breaks": "b46acd6a6a627d876898e1c84d3f84902264b445", + "cmt_msg": "fs/ntfs3: Fix invalid free in log_replay", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", @@ -72453,74 +78720,84 @@ "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", "score": 7.1 }, - "cwe": "Unspecified", - "fixes": "ce3aba43599f0b50adbebff133df8d08a3d5fffe", - "last_affected_version": "5.13.1", + "cwe": "Use After Free", + "fixes": "f26967b9f7a830e228bb13fb41bd516ddd9d789d", + "last_affected_version": "5.18.2", "last_modified": "2023-12-06", - "nvd_text": "A vulnerability was found in linux kernel, where an information leak occurs via ext4_extent_header to userspace.", + "nvd_text": "A use-after-free flaw was found in the Linux kernel in log_replay in fs/ntfs3/fslog.c in the NTFS journal. This flaw allows a local attacker to crash the system and leads to a kernel information leak problem.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-0850", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-0850", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-0850", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-0850", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-0850", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-0850" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-1973", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-1973", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-1973", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-1973", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-1973", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-1973" } }, - "CVE-2022-0854": { - "affected_versions": "v5.17-rc6 to v5.17-rc8", - "breaks": "ddbd89deb7d32b1fbb879f48d68fda1a8ac58e8e", - "cmt_msg": "swiotlb: rework \"fix info leak with DMA_FROM_DEVICE\"", - "cvss2": { - "Access Complexity": "Low", - "Access Vector": "Local Access", - "Authentication": "None", - "Availability Impact": "None", - "Confidentiality Impact": "Partial", - "Integrity Impact": "None", - "raw": "AV:L/AC:L/Au:N/C:P/I:N/A:N", - "score": 2.1 - }, + "CVE-2022-1974": { + "affected_versions": "v3.1-rc1 to v5.18-rc6", + "breaks": "3e256b8f8dfa309a80b5dece388d85d9a9801a29", + "cmt_msg": "nfc: replace improper check device_is_registered() in netlink related functions", "cvss3": { - "Attack Complexity": "Low", + "Attack Complexity": "High", "Attack Vector": "Local", "Availability": "None", "Confidentiality": "High", "Integrity": "None", - "Privileges Required": "Low", + "Privileges Required": "High", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", - "score": 5.5 + "raw": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N", + "score": 4.1 }, - "cwe": "Missing Release of Memory after Effective Lifetime", - "fixes": "aa6f8dcbab473f3a3c7454b74caa46d36cdc5d13", - "last_affected_version": "5.16.14", + "cwe": "Use After Free", + "fixes": "da5c0f119203ad9728920456a0f52a6d850c01cd", + "last_affected_version": "5.17.6", "last_modified": "2023-12-06", - "nvd_text": "A memory leak flaw was found in the Linux kernel\u2019s DMA subsystem, in the way a user calls DMA_FROM_DEVICE. This flaw allows a local user to read random memory from the kernel space.", + "nvd_text": "A use-after-free flaw was found in the Linux kernel's NFC core functionality due to a race condition between kobject creation and delete. This vulnerability allows a local attacker with CAP_NET_ADMIN privilege to leak kernel information.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-0854", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-0854", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-0854", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-0854", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-0854", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-0854" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-1974", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-1974", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-1974", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-1974", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-1974", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-1974" } }, - "CVE-2022-0995": { - "affected_versions": "v5.8-rc1 to v5.17-rc8", - "breaks": "c73be61cede5882f9605a852414db559c0ebedfd", - "cmt_msg": "watch_queue: Fix filter limit check", - "cvss2": { - "Access Complexity": "Low", - "Access Vector": "Local Access", - "Authentication": "None", - "Availability Impact": "Complete", - "Confidentiality Impact": "Complete", - "Integrity Impact": "Complete", - "raw": "AV:L/AC:L/Au:N/C:C/I:C/A:C", - "score": 7.2 + "CVE-2022-1975": { + "affected_versions": "v3.11-rc1 to v5.18-rc6", + "breaks": "9674da8759df0d6c0d24e1ede6e2a1acdef91e3c", + "cmt_msg": "NFC: netlink: fix sleep in atomic bug when firmware download timeout", + "cvss3": { + "Attack Complexity": "Low", + "Attack Vector": "Local", + "Availability": "High", + "Confidentiality": "None", + "Integrity": "None", + "Privileges Required": "Low", + "Scope": "Unchanged", + "User Interaction": "None", + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "score": 5.5 }, + "cwe": "Unspecified", + "fixes": "4071bf121d59944d5cd2238de0642f3d7995a997", + "last_affected_version": "5.17.6", + "last_modified": "2023-12-06", + "nvd_text": "There is a sleep-in-atomic bug in /net/nfc/netlink.c that allows an attacker to crash the Linux kernel by simulating a nfc device from user-space.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-1975", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-1975", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-1975", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-1975", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-1975", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-1975" + } + }, + "CVE-2022-1976": { + "affected_versions": "v5.18-rc2 to v5.19-rc1", + "breaks": "d5361233e9ab920e135819f73dd8466355f1fddd", + "cmt_msg": "io_uring: reinstate the inflight tracking", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", @@ -72533,24 +78810,24 @@ "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "score": 7.8 }, - "cwe": "Out-of-bounds Write", - "fixes": "c993ee0f9f81caf5767a50d1faeba39a0dc82af2", - "last_affected_version": "5.16.14", + "cwe": "Use After Free", + "fixes": "9cae36a094e7e9d6e5fe8b6dcd4642138b3eb0c7", + "last_affected_version": "5.18.5", "last_modified": "2023-12-06", - "nvd_text": "An out-of-bounds (OOB) memory write flaw was found in the Linux kernel\u2019s watch_queue event notification subsystem. This flaw can overwrite parts of the kernel state, potentially allowing a local user to gain privileged access or cause a denial of service on the system.", + "nvd_text": "A flaw was found in the Linux kernel\u2019s implementation of IO-URING. This flaw allows an attacker with local executable permission to create a string of requests that can cause a use-after-free flaw within the kernel. This issue leads to memory corruption and possible privilege escalation.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-0995", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-0995", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-0995", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-0995", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-0995", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-0995" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-1976", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-1976", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-1976", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-1976", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-1976", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-1976" } }, - "CVE-2022-0998": { - "affected_versions": "v5.7-rc1 to v5.17-rc1", - "breaks": "4c8cf31885f69e86be0b5b9e6677a26797365e1d", - "cmt_msg": "vdpa: clean up get_config_size ret value handling", + "CVE-2022-1998": { + "affected_versions": "v5.13-rc7 to v5.17-rc3", + "breaks": "f644bc449b37cc32d3ce7b36a88073873aa21bd5", + "cmt_msg": "fanotify: Fix stale file descriptor in copy_event_to_user()", "cvss2": { "Access Complexity": "Low", "Access Vector": "Local Access", @@ -72573,202 +78850,233 @@ "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "score": 7.8 }, - "cwe": "Integer Overflow or Wraparound", - "fixes": "870aaff92e959e29d40f9cfdb5ed06ba2fc2dae0", + "cwe": "Use After Free", + "fixes": "ee12595147ac1fbfb5bcb23837e26dd58d94b15d", + "last_affected_version": "5.16.5", "last_modified": "2023-12-06", - "nvd_text": "An integer overflow flaw was found in the Linux kernel\u2019s virtio device driver code in the way a user triggers the vhost_vdpa_config_validate function. This flaw allows a local user to crash or potentially escalate their privileges on the system.", + "nvd_text": "A use after free in the Linux kernel File System notify functionality was found in the way user triggers copy_info_records_to_user() call to fail in copy_event_to_user(). A local user could use this flaw to crash the system or potentially escalate their privileges on the system.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-0998", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-0998", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-0998", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-0998", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-0998", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-0998" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-1998", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-1998", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-1998", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-1998", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-1998", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-1998" } }, - "CVE-2022-1011": { - "affected_versions": "v2.6.35-rc1 to v5.17-rc8", - "breaks": "c3021629a0d820247ee12b6c5192a1d5380e21c6", - "cmt_msg": "fuse: fix pipe buffer lifetime for direct_io", + "CVE-2022-20008": { + "affected_versions": "v4.16-rc1 to v5.17-rc5", + "breaks": "81196976ed946cbf36bb41ddda402853c7df7cfa", + "cmt_msg": "mmc: block: fix read single on recovery logic", "cvss2": { "Access Complexity": "Low", "Access Vector": "Local Access", "Authentication": "None", - "Availability Impact": "Partial", + "Availability Impact": "None", "Confidentiality Impact": "Partial", - "Integrity Impact": "Partial", - "raw": "AV:L/AC:L/Au:N/C:P/I:P/A:P", - "score": 4.6 + "Integrity Impact": "None", + "raw": "AV:L/AC:L/Au:N/C:P/I:N/A:N", + "score": 2.1 }, "cvss3": { "Attack Complexity": "Low", - "Attack Vector": "Local", - "Availability": "High", + "Attack Vector": "Physical", + "Availability": "None", "Confidentiality": "High", - "Integrity": "High", - "Privileges Required": "Low", + "Integrity": "None", + "Privileges Required": "None", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", - "score": 7.8 + "raw": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "score": 4.6 }, - "cwe": "Use After Free", - "fixes": "0c4bcfdecb1ac0967619ee7ff44871d93c08c909", - "last_affected_version": "5.16.14", + "cwe": "Use of Uninitialized Resource", + "fixes": "54309fde1a352ad2674ebba004a79f7d20b9f037", + "last_affected_version": "5.16.10", "last_modified": "2023-12-06", - "nvd_text": "A use-after-free flaw was found in the Linux kernel\u2019s FUSE filesystem in the way a user triggers write(). This flaw allows a local user to gain unauthorized access to data from the FUSE filesystem, resulting in privilege escalation.", + "nvd_text": "In mmc_blk_read_single of block.c, there is a possible way to read kernel heap memory due to uninitialized data. This could lead to local information disclosure if reading from an SD card that triggers errors, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-216481035References: Upstream kernel", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-1011", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-1011", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-1011", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-1011", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-1011", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-1011" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-20008", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-20008", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-20008", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-20008", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-20008", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-20008" } }, - "CVE-2022-1012": { - "affected_versions": "v2.6.12-rc2 to v5.18-rc6", + "CVE-2022-20132": { + "affected_versions": "v2.6.12-rc2 to v5.16-rc5", "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", - "cmt_msg": "secure_seq: use the 64 bits of the siphash for port offset calculation", + "cmt_msg": "HID: add hid_is_usb() function to make it simpler for USB detection", + "cvss2": { + "Access Complexity": "Low", + "Access Vector": "Local Access", + "Authentication": "None", + "Availability Impact": "None", + "Confidentiality Impact": "Complete", + "Integrity Impact": "None", + "raw": "AV:L/AC:L/Au:N/C:C/I:N/A:N", + "score": 4.9 + }, "cvss3": { "Attack Complexity": "Low", - "Attack Vector": "Network", - "Availability": "High", - "Confidentiality": "Low", + "Attack Vector": "Physical", + "Availability": "None", + "Confidentiality": "High", "Integrity": "None", "Privileges Required": "None", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H", - "score": 8.2 + "raw": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "score": 4.6 }, - "cwe": "Missing Release of Memory after Effective Lifetime", - "fixes": "b2d057560b8107c633b39aabe517ff9d93f285e3", - "last_affected_version": "5.17.8", + "cwe": "Out-of-bounds Read", + "fixes": "f83baa0cb6cfc92ebaf7f9d3a99d7e34f2e77a8a", + "last_affected_version": "5.15.7", "last_modified": "2023-12-06", - "nvd_text": "A memory leak problem was found in the TCP source port generation algorithm in net/ipv4/tcp.c due to the small table perturb size. This flaw may allow an attacker to information leak and may cause a denial of service problem.", + "nvd_text": "In lg_probe and related functions of hid-lg.c and other USB HID files, there is a possible out of bounds read due to improper input validation. This could lead to local information disclosure if a malicious USB HID device were plugged in, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-188677105References: Upstream kernel", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-1012", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-1012", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-1012", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-1012", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-1012", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-1012" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-20132", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-20132", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-20132", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-20132", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-20132", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-20132" } }, - "CVE-2022-1015": { - "affected_versions": "v5.12-rc1-dontuse to v5.18-rc1", - "breaks": "345023b0db315648ccc3c1a36aee88304a8b4d91", - "cmt_msg": "netfilter: nf_tables: validate registers coming from userspace.", + "CVE-2022-20141": { + "affected_versions": "v2.6.12-rc2 to v5.15-rc1", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "igmp: Add ip_mc_list lock in ip_check_mc_rcu", "cvss2": { - "Access Complexity": "Low", + "Access Complexity": "Medium", "Access Vector": "Local Access", "Authentication": "None", - "Availability Impact": "Partial", - "Confidentiality Impact": "Partial", - "Integrity Impact": "Partial", - "raw": "AV:L/AC:L/Au:N/C:P/I:P/A:P", - "score": 4.6 + "Availability Impact": "Complete", + "Confidentiality Impact": "Complete", + "Integrity Impact": "Complete", + "raw": "AV:L/AC:M/Au:N/C:C/I:C/A:C", + "score": 6.9 }, "cvss3": { - "Attack Complexity": "Low", + "Attack Complexity": "High", "Attack Vector": "Local", "Availability": "High", - "Confidentiality": "Low", - "Integrity": "Low", + "Confidentiality": "High", + "Integrity": "High", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H", - "score": 6.6 + "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 7.0 }, - "cwe": "Out-of-bounds Write", - "fixes": "6e1acfa387b9ff82cfc7db8cc3b6959221a95851", - "last_affected_version": "5.17.0", + "cwe": "Improper Locking", + "fixes": "23d2b94043ca8835bd1e67749020e839f396a1c2", + "last_affected_version": "5.14.2", "last_modified": "2023-12-06", - "nvd_text": "A flaw was found in the Linux kernel in linux/net/netfilter/nf_tables_api.c of the netfilter subsystem. This flaw allows a local user to cause an out-of-bounds write issue.", + "nvd_text": "In ip_check_mc_rcu of igmp.c, there is a possible use after free due to improper locking. This could lead to local escalation of privilege when opening and closing inet sockets with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-112551163References: Upstream kernel", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-1015", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-1015", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-1015", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-1015", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-1015", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-1015" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-20141", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-20141", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-20141", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-20141", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-20141", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-20141" } }, - "CVE-2022-1016": { - "affected_versions": "v3.13-rc1 to v5.18-rc1", - "breaks": "96518518cc417bb0a8c80b9fb736202e28acdf96", - "cmt_msg": "netfilter: nf_tables: initialize registers in nft_do_chain()", + "CVE-2022-20148": { + "affected_versions": "v2.6.12-rc2 to v5.16-rc1", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "f2fs: fix UAF in f2fs_available_free_memory", + "cvss2": { + "Access Complexity": "Medium", + "Access Vector": "Local Access", + "Authentication": "None", + "Availability Impact": "Complete", + "Confidentiality Impact": "Complete", + "Integrity Impact": "Complete", + "raw": "AV:L/AC:M/Au:N/C:C/I:C/A:C", + "score": 6.9 + }, "cvss3": { - "Attack Complexity": "Low", + "Attack Complexity": "High", "Attack Vector": "Local", - "Availability": "None", + "Availability": "High", "Confidentiality": "High", - "Integrity": "None", - "Privileges Required": "Low", + "Integrity": "High", + "Privileges Required": "High", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", - "score": 5.5 + "raw": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", + "score": 6.4 }, - "cwe": "Use After Free", - "fixes": "4c905f6740a365464e91467aa50916555b28213d", - "last_affected_version": "5.17.0", + "cwe": "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')", + "fixes": "5429c9dbc9025f9a166f64e22e3a69c94fd5b29b", + "last_affected_version": "5.15.2", "last_modified": "2023-12-06", - "nvd_text": "A flaw was found in the Linux kernel in net/netfilter/nf_tables_core.c:nft_do_chain, which can cause a use-after-free. This issue needs to handle 'return' with proper preconditions, as it can lead to a kernel information leak problem caused by a local, unprivileged attacker.", + "nvd_text": "In TBD of TBD, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege in the kernel with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-219513976References: Upstream kernel", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-1016", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-1016", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-1016", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-1016", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-1016", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-1016" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-20148", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-20148", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-20148", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-20148", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-20148", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-20148" } }, - "CVE-2022-1043": { - "affected_versions": "v5.12-rc3 to v5.14-rc7", - "breaks": "61cf93700fe6359552848ed5e3becba6cd760efa", - "cmt_msg": "io_uring: fix xa_alloc_cycle() error return value check", + "CVE-2022-20153": { + "affected_versions": "v5.12-rc1-dontuse to v5.13-rc1", + "breaks": "cb5e1b81304e089ee3ca948db4d29f71902eb575", + "cmt_msg": "io_uring: return back safer resurrect", + "cvss2": { + "Access Complexity": "Low", + "Access Vector": "Local Access", + "Authentication": "None", + "Availability Impact": "Complete", + "Confidentiality Impact": "Complete", + "Integrity Impact": "Complete", + "raw": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "score": 7.2 + }, "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", "Confidentiality": "High", "Integrity": "High", - "Privileges Required": "Low", - "Scope": "Changed", + "Privileges Required": "High", + "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", - "score": 8.8 + "raw": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "score": 6.7 }, "cwe": "Use After Free", - "fixes": "a30f895ad3239f45012e860d4f94c1a388b36d14", - "last_affected_version": "5.13.12", + "fixes": "f70865db5ff35f5ed0c7e9ef63e7cca3d4947f04", + "last_affected_version": "5.10.106", "last_modified": "2023-12-06", - "nvd_text": "A flaw was found in the Linux kernel\u2019s io_uring implementation. This flaw allows an attacker with a local account to corrupt system memory, crash the system or escalate privileges.", + "nvd_text": "In rcu_cblist_dequeue of rcu_segcblist.c, there is a possible use-after-free due to improper locking. This could lead to local escalation of privilege in the kernel with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-222091980References: Upstream kernel", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-1043", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-1043", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-1043", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-1043", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-1043", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-1043" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-20153", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-20153", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-20153", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-20153", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-20153", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-20153" } }, - "CVE-2022-1048": { - "affected_versions": "v2.6.12-rc2 to v5.18-rc1", - "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", - "cmt_msg": "ALSA: pcm: Fix races among concurrent hw_params and hw_free calls", + "CVE-2022-20154": { + "affected_versions": "v4.14-rc1 to v5.16-rc8", + "breaks": "d25adbeb0cdb860fb39e09cdd025e9cfc954c5ab", + "cmt_msg": "sctp: use call_rcu to free endpoint", "cvss2": { "Access Complexity": "Medium", "Access Vector": "Local Access", "Authentication": "None", - "Availability Impact": "Complete", - "Confidentiality Impact": "Complete", - "Integrity Impact": "Complete", - "raw": "AV:L/AC:M/Au:N/C:C/I:C/A:C", - "score": 6.9 + "Availability Impact": "Partial", + "Confidentiality Impact": "Partial", + "Integrity Impact": "Partial", + "raw": "AV:L/AC:M/Au:N/C:P/I:P/A:P", + "score": 4.4 }, "cvss3": { "Attack Complexity": "High", @@ -72776,30 +79084,60 @@ "Availability": "High", "Confidentiality": "High", "Integrity": "High", - "Privileges Required": "Low", + "Privileges Required": "High", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", - "score": 7.0 + "raw": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", + "score": 6.4 }, "cwe": "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')", - "fixes": "92ee3c60ec9fe64404dc035e7c41277d74aa26cb", - "last_affected_version": "5.17.0", + "fixes": "5ec7d18d1813a5bead0b495045606c93873aecbb", + "last_affected_version": "5.15.12", "last_modified": "2023-12-06", - "nvd_text": "A use-after-free flaw was found in the Linux kernel\u2019s sound subsystem in the way a user triggers concurrent calls of PCM hw_params. The hw_free ioctls or similar race condition happens inside ALSA PCM for other ioctls. This flaw allows a local user to crash or potentially escalate their privileges on the system.", + "nvd_text": "In lock_sock_nested of sock.c, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-174846563References: Upstream kernel", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-1048", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-1048", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-1048", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-1048", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-1048", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-1048" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-20154", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-20154", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-20154", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-20154", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-20154", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-20154" } }, - "CVE-2022-1055": { - "affected_versions": "v5.1-rc1 to v5.17-rc3", - "breaks": "470502de5bdb1ed0def643a4458593a40b8f6b66", - "cmt_msg": "net: sched: fix use-after-free in tc_new_tfilter()", + "CVE-2022-20158": { + "affected_versions": "v2.6.14-rc3 to v5.17", + "breaks": "0fb375fb9b93b7d822debc6a734052337ccfdb1f", + "cmt_msg": "net/packet: fix slab-out-of-bounds access in packet_recvmsg()", + "cvss3": { + "Attack Complexity": "Low", + "Attack Vector": "Local", + "Availability": "High", + "Confidentiality": "High", + "Integrity": "High", + "Privileges Required": "High", + "Scope": "Unchanged", + "User Interaction": "None", + "raw": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "score": 6.7 + }, + "cwe": "Use After Free", + "fixes": "c700525fcc06b05adfea78039de02628af79e07a", + "last_affected_version": "5.16", + "last_modified": "2023-12-06", + "nvd_text": "In bdi_put and bdi_unregister of backing-dev.c, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-182815710References: Upstream kernel", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-20158", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-20158", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-20158", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-20158", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-20158", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-20158" + } + }, + "CVE-2022-20166": { + "affected_versions": "v2.6.12-rc2 to v5.10-rc1", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "drivers core: Use sysfs_emit and sysfs_emit_at for show(device *...) functions", "cvss2": { "Access Complexity": "Low", "Access Vector": "Local Access", @@ -72816,40 +79154,29 @@ "Availability": "High", "Confidentiality": "High", "Integrity": "High", - "Privileges Required": "Low", + "Privileges Required": "High", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", - "score": 7.8 + "raw": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "score": 6.7 }, - "cwe": "Use After Free", - "fixes": "04c2a47ffb13c29778e2a14e414ad4cb5a5db4b5", - "last_affected_version": "5.16.5", + "cwe": "Out-of-bounds Write", + "fixes": "aa838896d87af561a33ecefea1caa4c15a68bc47", "last_modified": "2023-12-06", - "nvd_text": "A use-after-free exists in the Linux Kernel in tc_new_tfilter that could allow a local attacker to gain privilege escalation. The exploit requires unprivileged user namespaces. We recommend upgrading past commit 04c2a47ffb13c29778e2a14e414ad4cb5a5db4b5", + "nvd_text": "In various methods of kernel base drivers, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-182388481References: Upstream kernel", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-1055", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-1055", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-1055", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-1055", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-1055", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-1055" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-20166", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-20166", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-20166", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-20166", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-20166", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-20166" } }, - "CVE-2022-1116": { - "affected_versions": "unk to unk", - "backport": true, - "breaks": "cac68d12c531aa3010509a5a55a5dfd18dedaa80", - "cvss2": { - "Access Complexity": "Low", - "Access Vector": "Local Access", - "Authentication": "None", - "Availability Impact": "Complete", - "Confidentiality Impact": "Complete", - "Integrity Impact": "Complete", - "raw": "AV:L/AC:L/Au:N/C:C/I:C/A:C", - "score": 7.2 - }, + "CVE-2022-20368": { + "affected_versions": "v2.6.14-rc3 to v5.17", + "breaks": "0fb375fb9b93b7d822debc6a734052337ccfdb1f", + "cmt_msg": "net/packet: fix slab-out-of-bounds access in packet_recvmsg()", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", @@ -72862,244 +79189,268 @@ "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "score": 7.8 }, - "cwe": "Integer Overflow or Wraparound", - "fixes": "1a623d361ffe5cecd4244a02f449528416360038", + "cwe": "Unspecified", + "fixes": "c700525fcc06b05adfea78039de02628af79e07a", + "last_affected_version": "5.16", "last_modified": "2023-12-06", - "nvd_text": "Integer Overflow or Wraparound vulnerability in io_uring of Linux Kernel allows local attacker to cause memory corruption and escalate privileges to root. This issue affects: Linux Kernel versions prior to 5.4.189; version 5.4.24 and later versions.", + "nvd_text": "Product: AndroidVersions: Android kernelAndroid ID: A-224546354References: Upstream kernel", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-1116", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-1116", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-1116", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-1116", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-1116", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-1116" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-20368", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-20368", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-20368", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-20368", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-20368", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-20368" } }, - "CVE-2022-1158": { - "affected_versions": "v5.2-rc1 to v5.18-rc1", - "breaks": "bd53cb35a3e9adb73a834a36586e9ad80e877767", - "cmt_msg": "KVM: x86/mmu: do compare-and-exchange of gPTE via the user address", + "CVE-2022-20369": { + "affected_versions": "v2.6.35-rc1 to v5.18-rc1", + "breaks": "7f98639def42a676998d734b381af6c0e64d7791", + "cmt_msg": "media: v4l2-mem2mem: Apply DST_QUEUE_OFF_BASE on MMAP buffers across ioctls", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", "Confidentiality": "High", "Integrity": "High", - "Privileges Required": "Low", + "Privileges Required": "High", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", - "score": 7.8 + "raw": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "score": 6.7 }, - "cwe": "Use After Free", - "fixes": "2a8859f373b0a86f0ece8ec8312607eacf12485d", + "cwe": "Out-of-bounds Write", + "fixes": "8310ca94075e784bbb06593cd6c068ee6b6e4ca6", "last_affected_version": "5.17.1", "last_modified": "2023-12-06", - "nvd_text": "A flaw was found in KVM. When updating a guest's page table entry, vm_pgoff was improperly used as the offset to get the page's pfn. As vaddr and vm_pgoff are controllable by user-mode processes, this flaw allows unprivileged local users on the host to write outside the userspace region and potentially corrupt the kernel, resulting in a denial of service condition.", + "nvd_text": "In v4l2_m2m_querybuf of v4l2-mem2mem.c, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-223375145References: Upstream kernel", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-1158", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-1158", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-1158", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-1158", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-1158", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-1158" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-20369", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-20369", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-20369", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-20369", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-20369", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-20369" } }, - "CVE-2022-1184": { - "affected_versions": "v2.6.12-rc2 to v5.19-rc1", - "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", - "cmt_msg": "ext4: verify dir block before splitting it", + "CVE-2022-20409": { + "affected_versions": "v5.10-rc1 to v5.12-rc1-dontuse", + "breaks": "5c3462cfd123b341c9d3c947c1a2bab373f1697f", + "cmt_msg": "io_uring: remove io_identity", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", - "Confidentiality": "None", - "Integrity": "None", - "Privileges Required": "Low", + "Confidentiality": "High", + "Integrity": "High", + "Privileges Required": "High", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", - "score": 5.5 + "raw": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "score": 6.7 }, "cwe": "Use After Free", - "fixes": "46c116b920ebec58031f0a78c5ea9599b0d2a371", - "last_affected_version": "5.18.2", + "fixes": "4379bf8bd70b5de6bba7d53015b0c36c57a634ee", "last_modified": "2023-12-06", - "nvd_text": "A use-after-free flaw was found in fs/ext4/namei.c:dx_insert_block() in the Linux kernel\u2019s filesystem sub-component. This flaw allows a local attacker with a user privilege to cause a denial of service.", + "nvd_text": "In io_identity_cow of io_uring.c, there is a possible way to corrupt memory due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-238177383References: Upstream kernel", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-1184", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-1184", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-1184", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-1184", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-1184", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-1184" - } - }, - "CVE-2022-1195": { - "affected_versions": "v2.6.12-rc2 to v5.16-rc7", - "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", - "cmt_msg": "hamradio: improve the incomplete fix to avoid NPD", - "cvss2": { - "Access Complexity": "Low", - "Access Vector": "Local Access", - "Authentication": "None", - "Availability Impact": "Partial", - "Confidentiality Impact": "None", - "Integrity Impact": "None", - "raw": "AV:L/AC:L/Au:N/C:N/I:N/A:P", - "score": 2.1 - }, + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-20409", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-20409", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-20409", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-20409", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-20409", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-20409" + } + }, + "CVE-2022-20421": { + "affected_versions": "v4.14-rc1 to v6.0-rc4", + "breaks": "a60b890f607dc6d7806afc0dc8666577faf40bb4", + "cmt_msg": "binder: fix UAF of ref->proc caused by race condition", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", - "Confidentiality": "None", - "Integrity": "None", + "Confidentiality": "High", + "Integrity": "High", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", - "score": 5.5 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 7.8 }, "cwe": "Use After Free", - "fixes": "b2f37aead1b82a770c48b5d583f35ec22aabb61e", - "last_affected_version": "5.15.11", + "fixes": "a0e44c64b6061dda7e00b7c458e4523e2331b739", + "last_affected_version": "5.19.7", "last_modified": "2023-12-06", - "nvd_text": "A use-after-free vulnerability was found in the Linux kernel in drivers/net/hamradio. This flaw allows a local attacker with a user privilege to cause a denial of service (DOS) when the mkiss or sixpack device is detached and reclaim resources early.", + "nvd_text": "In binder_inc_ref_for_node of binder.c, there is a possible way to corrupt memory due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-239630375References: Upstream kernel", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-1195", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-1195", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-1195", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-1195", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-1195", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-1195" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-20421", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-20421", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-20421", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-20421", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-20421", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-20421" } }, - "CVE-2022-1198": { - "affected_versions": "v2.6.12-rc2 to v5.17-rc6", - "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", - "cmt_msg": "drivers: hamradio: 6pack: fix UAF bug caused by mod_timer()", + "CVE-2022-20422": { + "affected_versions": "v3.19-rc1 to v6.0-rc1", + "breaks": "587064b610c703f259317d00dc37bf6d40f4fc74", + "cmt_msg": "arm64: fix oops in concurrently setting insn_emulation sysctls", "cvss3": { - "Attack Complexity": "Low", + "Attack Complexity": "High", "Attack Vector": "Local", "Availability": "High", - "Confidentiality": "None", - "Integrity": "None", + "Confidentiality": "High", + "Integrity": "High", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", - "score": 5.5 + "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 7.0 }, - "cwe": "Use After Free", - "fixes": "efe4186e6a1b54bf38b9e05450d43b0da1fd7739", - "last_affected_version": "5.16.14", + "cwe": "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')", + "fixes": "af483947d472eccb79e42059276c4deed76f99a6", + "last_affected_version": "5.19.1", "last_modified": "2023-12-06", - "nvd_text": "A use-after-free vulnerabilitity was discovered in drivers/net/hamradio/6pack.c of linux that allows an attacker to crash linux kernel by simulating ax25 device using 6pack driver from user space.", + "nvd_text": "In emulation_proc_handler of armv8_deprecated.c, there is a possible way to corrupt memory due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-237540956References: Upstream kernel", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-1198", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-1198", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-1198", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-1198", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-1198", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-1198" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-20422", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-20422", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-20422", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-20422", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-20422", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-20422" } }, - "CVE-2022-1199": { - "affected_versions": "v2.6.12-rc2 to v5.17-rc8", - "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", - "cmt_msg": "ax25: Fix NULL pointer dereference in ax25_kill_by_device", + "CVE-2022-20423": { + "affected_versions": "v5.17-rc4 to v5.17", + "breaks": "38ea1eac7d88072bbffb630e2b3db83ca649b826", + "cmt_msg": "usb: gadget: rndis: prevent integer overflow in rndis_set_response()", "cvss3": { "Attack Complexity": "Low", - "Attack Vector": "Network", - "Availability": "High", - "Confidentiality": "None", + "Attack Vector": "Physical", + "Availability": "None", + "Confidentiality": "High", "Integrity": "None", "Privileges Required": "None", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", - "score": 7.5 + "raw": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "score": 4.6 }, - "cwe": "NULL Pointer Dereference", - "fixes": "71171ac8eb34ce7fe6b3267dce27c313ab3cb3ac", - "last_affected_version": "5.16.14", + "cwe": "Integer Overflow or Wraparound", + "fixes": "65f3324f4b6fed78b8761c3b74615ecf0ffa81fa", + "last_affected_version": "5.16", "last_modified": "2023-12-06", - "nvd_text": "A flaw was found in the Linux kernel. This flaw allows an attacker to crash the Linux kernel by simulating amateur radio from the user space, resulting in a null-ptr-deref vulnerability and a use-after-free vulnerability.", + "nvd_text": "In rndis_set_response of rndis.c, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege if a malicious USB device is attached with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-239842288References: Upstream kernel", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-1199", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-1199", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-1199", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-1199", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-1199", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-1199" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-20423", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-20423", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-20423", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-20423", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-20423", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-20423" } }, - "CVE-2022-1204": { - "affected_versions": "v2.6.12-rc2 to v5.18-rc1", + "CVE-2022-20424": { + "affected_versions": "unk to v5.12-rc1-dontuse", + "breaks": "", + "cmt_msg": "io_uring: remove io_identity", + "fixes": "4379bf8bd70b5de6bba7d53015b0c36c57a634ee", + "last_modified": "2023-12-06", + "nvd_text": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-20424", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-20424", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-20424", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-20424", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-20424", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-20424" + }, + "rejected": true + }, + "CVE-2022-20565": { + "affected_versions": "v2.6.12-rc2 to v5.9-rc4", "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", - "cmt_msg": "ax25: Fix refcount leaks caused by ax25_cb_del()", + "cmt_msg": "HID: core: Correctly handle ReportSize being zero", + "fixes": "bce1305c0ece3dc549663605e567655dd701752c", + "last_affected_version": "5.8.6", + "last_modified": "2022-12-08", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-20565", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-20565", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-20565", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-20565", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-20565", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-20565" + } + }, + "CVE-2022-20566": { + "affected_versions": "v2.6.12-rc2 to v5.19", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free caused by l2cap_chan_put", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", - "Confidentiality": "None", - "Integrity": "None", + "Confidentiality": "High", + "Integrity": "High", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", - "score": 5.5 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 7.8 }, "cwe": "Use After Free", - "fixes": "9fd75b66b8f68498454d685dc4ba13192ae069b0", - "last_affected_version": "5.17.1", + "fixes": "d0be8347c623e0ac4202a1d4e0373882821f56b0", + "last_affected_version": "5.18.15", "last_modified": "2023-12-06", - "nvd_text": "A use-after-free flaw was found in the Linux kernel\u2019s Amateur Radio AX.25 protocol functionality in the way a user connects with the protocol. This flaw allows a local user to crash the system.", + "nvd_text": "In l2cap_chan_put of l2cap_core, there is a possible use after free due to improper locking. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-165329981References: Upstream kernel", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-1204", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-1204", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-1204", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-1204", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-1204", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-1204" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-20566", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-20566", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-20566", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-20566", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-20566", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-20566" } }, - "CVE-2022-1205": { - "affected_versions": "v5.17-rc4 to v5.18-rc1", - "breaks": "7ec02f5ac8a5be5a3f20611731243dc5e1d9ba10", - "cmt_msg": "ax25: Fix NULL pointer dereferences in ax25 timers", + "CVE-2022-20567": { + "affected_versions": "v4.15-rc1 to v4.16-rc5", + "breaks": "ee40fb2e1eb5bc0ddd3f2f83c6e39a454ef5a741", + "cmt_msg": "l2tp: fix race in pppol2tp_release with session object destroy", "cvss3": { "Attack Complexity": "High", "Attack Vector": "Local", "Availability": "High", - "Confidentiality": "None", - "Integrity": "None", - "Privileges Required": "Low", + "Confidentiality": "High", + "Integrity": "High", + "Privileges Required": "High", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", - "score": 4.7 + "raw": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", + "score": 6.4 }, - "cwe": "NULL Pointer Dereference", - "fixes": "fc6d01ff9ef03b66d4a3a23b46fc3c3d8cf92009", - "last_affected_version": "5.17.1", + "cwe": "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')", + "fixes": "d02ba2a6110c530a32926af8ad441111774d2893", + "last_affected_version": "4.15.7", "last_modified": "2023-12-06", - "nvd_text": "A NULL pointer dereference flaw was found in the Linux kernel\u2019s Amateur Radio AX.25 protocol functionality in the way a user connects with the protocol. This flaw allows a local user to crash the system.", + "nvd_text": "In pppol2tp_create of l2tp_ppp.c, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-186777253References: Upstream kernel", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-1205", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-1205", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-1205", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-1205", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-1205", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-1205" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-20567", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-20567", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-20567", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-20567", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-20567", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-20567" } }, - "CVE-2022-1247": { - "affected_versions": "unk to unk", - "breaks": "", + "CVE-2022-20568": { + "affected_versions": "v5.7-rc4 to v5.12-rc1-dontuse", + "breaks": "5b0bbee4732cbd58aa98213d4c11a366356bba3d", + "cmt_msg": "Merge tag 'io_uring-worker.v3-2021-02-25' of git://git.kernel.dk/linux-block", "cvss3": { - "Attack Complexity": "High", + "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", "Confidentiality": "High", @@ -73107,254 +79458,302 @@ "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", - "score": 7.0 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 7.8 }, - "cwe": "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')", - "fixes": "", + "cwe": "Use After Free", + "fixes": "5695e51619745d4fe3ec2506a2f0cd982c5e27a4", "last_modified": "2023-12-06", - "nvd_text": "An issue found in linux-kernel that leads to a race condition in rose_connect(). The rose driver uses rose_neigh->use to represent how many objects are using the rose_neigh. When a user wants to delete a rose_route via rose_ioctl(), the rose driver calls rose_del_node() and removes neighbours only if their \u201ccount\u201d and \u201cuse\u201d are zero.", + "nvd_text": "In (TBD) of (TBD), there is a possible way to corrupt kernel memory due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-220738351References: Upstream kernel", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-1247", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-1247", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-1247", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-1247", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-1247", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-1247" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-20568", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-20568", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-20568", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-20568", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-20568", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-20568" } }, - "CVE-2022-1263": { - "affected_versions": "v2.6.12-rc2 to v5.18-rc3", - "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", - "cmt_msg": "KVM: avoid NULL pointer dereference in kvm_dirty_ring_push", + "CVE-2022-20572": { + "affected_versions": "v3.4-rc1 to v5.19-rc1", + "breaks": "a4ffc152198efba2ed9e6eac0eb97f17bfebce85", + "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", - "Confidentiality": "None", - "Integrity": "None", - "Privileges Required": "Low", + "Confidentiality": "High", + "Integrity": "High", + "Privileges Required": "High", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", - "score": 5.5 + "raw": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "score": 6.7 }, - "cwe": "NULL Pointer Dereference", - "fixes": "5593473a1e6c743764b08e3b6071cb43b5cfa6c4", - "last_affected_version": "5.17.2", + "cwe": "Incorrect Authorization", + "fixes": "4caae58406f8ceb741603eee460d79bacca9b1b5", + "last_affected_version": "5.18.1", "last_modified": "2023-12-06", - "nvd_text": "A NULL pointer dereference issue was found in KVM when releasing a vCPU with dirty ring support enabled. This flaw allows an unprivileged local attacker on the host to issue specific ioctl calls, causing a kernel oops condition that results in a denial of service.", + "nvd_text": "In verity_target of dm-verity-target.c, there is a possible way to modify read-only files due to a missing permission check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-234475629References: Upstream kernel", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-1263", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-1263", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-1263", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-1263", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-1263", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-1263" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-20572", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-20572", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-20572", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-20572", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-20572", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-20572" } }, - "CVE-2022-1280": { - "affected_versions": "v2.6.12-rc2 to v5.15-rc1", - "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", - "cmt_msg": "drm: avoid circular locks in drm_mode_getconnector", + "CVE-2022-2078": { + "affected_versions": "v5.6-rc1 to v5.19-rc1", + "breaks": "f3a2181e16f1dcbf5446ed43f6b5d9f56c459f85", + "cmt_msg": "netfilter: nf_tables: sanitize nft_set_desc_concat_parse()", "cvss2": { - "Access Complexity": "Medium", + "Access Complexity": "Low", "Access Vector": "Local Access", "Authentication": "None", "Availability Impact": "Partial", - "Confidentiality Impact": "Partial", + "Confidentiality Impact": "None", "Integrity Impact": "None", - "raw": "AV:L/AC:M/Au:N/C:P/I:N/A:P", - "score": 3.3 + "raw": "AV:L/AC:L/Au:N/C:N/I:N/A:P", + "score": 2.1 }, "cvss3": { - "Attack Complexity": "High", + "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", - "Confidentiality": "High", + "Confidentiality": "None", "Integrity": "None", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H", - "score": 6.3 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "score": 5.5 }, - "cwe": "Use After Free", - "fixes": "869e76f7a918f010bd4518d58886969b1f642a04", + "cwe": "Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')", + "fixes": "fecf31ee395b0295f2d7260aa29946b7605f7c85", + "last_affected_version": "5.18.1", "last_modified": "2023-12-06", - "nvd_text": "A use-after-free vulnerability was found in drm_lease_held in drivers/gpu/drm/drm_lease.c in the Linux kernel due to a race problem. This flaw allows a local user privilege attacker to cause a denial of service (DoS) or a kernel information leak.", + "nvd_text": "A vulnerability was found in the Linux kernel's nft_set_desc_concat_parse() function .This flaw allows an attacker to trigger a buffer overflow via nft_set_desc_concat_parse() , causing a denial of service and possibly to run code.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-1280", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-1280", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-1280", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-1280", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-1280", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-1280" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-2078", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-2078", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-2078", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-2078", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-2078", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-2078" } }, - "CVE-2022-1353": { - "affected_versions": "v2.6.12-rc2 to v5.17", + "CVE-2022-21123": { + "affected_versions": "v2.6.12-rc2 to v5.19-rc3", "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", - "cmt_msg": "af_key: add __GFP_ZERO flag for compose_sadb_supported in function pfkey_register", + "cmt_msg": "x86/speculation/mmio: Add mitigation for Processor MMIO Stale Data", "cvss2": { "Access Complexity": "Low", "Access Vector": "Local Access", "Authentication": "None", - "Availability Impact": "Partial", + "Availability Impact": "None", "Confidentiality Impact": "Partial", "Integrity Impact": "None", - "raw": "AV:L/AC:L/Au:N/C:P/I:N/A:P", - "score": 3.6 + "raw": "AV:L/AC:L/Au:N/C:P/I:N/A:N", + "score": 2.1 }, "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", - "Availability": "High", + "Availability": "None", "Confidentiality": "High", "Integrity": "None", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", - "score": 7.1 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "score": 5.5 }, - "cwe": "Unspecified", - "fixes": "9a564bccb78a76740ea9d75a259942df8143d02c", - "last_affected_version": "5.16", + "cwe": "Incomplete Cleanup", + "fixes": "8cb861e9e3c9a55099ad3d08e1a3b653d29c33ca", + "last_affected_version": "5.18.4", "last_modified": "2023-12-06", - "nvd_text": "A vulnerability was found in the pfkey_register function in net/key/af_key.c in the Linux kernel. This flaw allows a local, unprivileged user to gain access to kernel memory, leading to a system crash or a leak of internal kernel information.", + "nvd_text": "Incomplete cleanup of multi-core shared buffers for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-1353", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-1353", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-1353", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-1353", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-1353", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-1353" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-21123", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-21123", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-21123", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-21123", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-21123", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-21123" } }, - "CVE-2022-1419": { - "affected_versions": "v4.1-rc1 to v5.6-rc2", - "breaks": "502e95c6678505474f1056480310cd9382bacbac", - "cmt_msg": "drm/vgem: Close use-after-free race in vgem_gem_create", + "CVE-2022-21125": { + "affected_versions": "v2.6.12-rc2 to v5.19-rc3", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "x86/speculation/mmio: Reuse SRBDS mitigation for SBDS", "cvss2": { "Access Complexity": "Low", "Access Vector": "Local Access", "Authentication": "None", - "Availability Impact": "Partial", + "Availability Impact": "None", "Confidentiality Impact": "Partial", - "Integrity Impact": "Partial", - "raw": "AV:L/AC:L/Au:N/C:P/I:P/A:P", - "score": 4.6 + "Integrity Impact": "None", + "raw": "AV:L/AC:L/Au:N/C:P/I:N/A:N", + "score": 2.1 }, "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", - "Availability": "High", + "Availability": "None", "Confidentiality": "High", - "Integrity": "High", + "Integrity": "None", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", - "score": 7.8 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "score": 5.5 }, - "cwe": "Use After Free", - "fixes": "4b848f20eda5974020f043ca14bacf7a7e634fc8", - "last_affected_version": "5.5.4", + "cwe": "Incomplete Cleanup", + "fixes": "a992b8a4682f119ae035a01b40d4d0665c4a2875", + "last_affected_version": "5.18.4", "last_modified": "2023-12-06", - "nvd_text": "The root cause of this vulnerability is that the ioctl$DRM_IOCTL_MODE_DESTROY_DUMB can decrease refcount of *drm_vgem_gem_object *(created in *vgem_gem_dumb_create*) concurrently, and *vgem_gem_dumb_create *will access the freed drm_vgem_gem_object.", + "nvd_text": "Incomplete cleanup of microarchitectural fill buffers on some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-1419", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-1419", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-1419", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-1419", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-1419", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-1419" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-21125", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-21125", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-21125", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-21125", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-21125", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-21125" } }, - "CVE-2022-1462": { - "affected_versions": "v2.6.12-rc2 to v5.19-rc7", + "CVE-2022-21166": { + "affected_versions": "v2.6.12-rc2 to v5.19-rc3", "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", - "cmt_msg": "tty: use new tty_insert_flip_string_and_push_buffer() in pty_write()", + "cmt_msg": "x86/speculation/mmio: Enable CPU Fill buffer clearing on idle", "cvss2": { - "Access Complexity": "Medium", + "Access Complexity": "Low", "Access Vector": "Local Access", "Authentication": "None", - "Availability Impact": "Partial", + "Availability Impact": "None", "Confidentiality Impact": "Partial", "Integrity Impact": "None", - "raw": "AV:L/AC:M/Au:N/C:P/I:N/A:P", - "score": 3.3 + "raw": "AV:L/AC:L/Au:N/C:P/I:N/A:N", + "score": 2.1 }, "cvss3": { - "Attack Complexity": "High", + "Attack Complexity": "Low", "Attack Vector": "Local", - "Availability": "High", + "Availability": "None", "Confidentiality": "High", "Integrity": "None", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H", - "score": 6.3 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "score": 5.5 }, - "cwe": "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')", - "fixes": "a501ab75e7624d133a5a3c7ec010687c8b961d23", - "last_affected_version": "5.18.12", + "cwe": "Incomplete Cleanup", + "fixes": "99a83db5a605137424e1efe29dc0573d6a5b6316", + "last_affected_version": "5.18.4", "last_modified": "2023-12-06", - "nvd_text": "An out-of-bounds read flaw was found in the Linux kernel\u2019s TeleTYpe subsystem. The issue occurs in how a user triggers a race condition using ioctls TIOCSPTLCK and TIOCGPTPEER and TIOCSTI and TCXONC with leakage of memory in the flush_to_ldisc function. This flaw allows a local user to crash the system or read unauthorized random data from memory.", + "nvd_text": "Incomplete cleanup in specific special register write operations for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-1462", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-1462", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-1462", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-1462", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-1462", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-1462" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-21166", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-21166", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-21166", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-21166", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-21166", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-21166" } }, - "CVE-2022-1508": { - "affected_versions": "v5.11-rc1 to v5.15-rc1", - "breaks": "632546c4b5a4dad8e3ac456406c65c0db9a0b570", - "cmt_msg": "io_uring: reexpand under-reexpanded iters", + "CVE-2022-21385": { + "affected_versions": "v2.6.12-rc2 to v4.20", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "net/rds: fix warn in rds_message_alloc_sgs", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", - "Confidentiality": "Low", + "Confidentiality": "None", "Integrity": "None", - "Privileges Required": "Low", + "Privileges Required": "None", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H", - "score": 6.1 + "raw": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "score": 6.2 }, - "cwe": "Out-of-bounds Read", - "fixes": "89c2b3b74918200e46699338d7bcc19b1ea12110", - "last_modified": "2024-01-15", - "nvd_text": "An out-of-bounds read flaw was found in the Linux kernel\u2019s io_uring module in the way a user triggers the io_read() function with some special parameters. This flaw allows a local user to read some memory out of bounds.", + "cwe": "Unspecified", + "fixes": "ea010070d0a7497253d5a6f919f6dd107450b31a", + "last_affected_version": "4.19", + "last_modified": "2023-12-06", + "nvd_text": "A flaw in net_rds_alloc_sgs() in Oracle Linux kernels allows unprivileged local users to crash the machine. CVSS 3.1 Base Score 6.2 (Availability impacts). CVSS Vector (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-21385", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-21385", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-21385", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-21385", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-21385", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-21385" + } + }, + "CVE-2022-21499": { + "affected_versions": "v2.6.12-rc2 to v5.19-rc1", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "lockdown: also lock down previous kgdb use", + "cvss2": { + "Access Complexity": "Low", + "Access Vector": "Local Access", + "Authentication": "None", + "Availability Impact": "Partial", + "Confidentiality Impact": "Partial", + "Integrity Impact": "Partial", + "raw": "AV:L/AC:L/Au:N/C:P/I:P/A:P", + "score": 4.6 + }, + "cvss3": { + "Attack Complexity": "Low", + "Attack Vector": "Local", + "Availability": "High", + "Confidentiality": "High", + "Integrity": "High", + "Privileges Required": "High", + "Scope": "Unchanged", + "User Interaction": "None", + "raw": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "score": 6.7 + }, + "cwe": "Out-of-bounds Write", + "fixes": "eadb2f47a3ced5c64b23b90fd2a3463f63726066", + "last_affected_version": "5.18.0", + "last_modified": "2023-12-06", + "nvd_text": "KGDB and KDB allow read and write access to kernel memory, and thus should be restricted during lockdown. An attacker with access to a serial port could trigger the debugger so it is important that the debugger respect the lockdown mode when/if it is triggered. CVSS 3.1 Base Score 6.7 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H).", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-1508", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-1508", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-1508", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-1508", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-1508", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-1508" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-21499", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-21499", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-21499", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-21499", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-21499", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-21499" } }, - "CVE-2022-1516": { - "affected_versions": "v5.7-rc5 to v5.18-rc1", - "breaks": "4becb7ee5b3d2829ed7b9261a245a77d5b7de902", - "cmt_msg": "net/x25: Fix null-ptr-deref caused by x25_disconnect", - "cvss2": { - "Access Complexity": "Low", - "Access Vector": "Local Access", - "Authentication": "None", - "Availability Impact": "Complete", - "Confidentiality Impact": "None", - "Integrity Impact": "None", - "raw": "AV:L/AC:L/Au:N/C:N/I:N/A:C", - "score": 4.9 - }, + "CVE-2022-21505": { + "affected_versions": "v5.4-rc1 to v5.19-rc8", + "breaks": "29d3c1c8dfe752c01b7115ecd5a3142b232a38e1", + "cmt_msg": "lockdown: Fix kexec lockdown bypass with ima policy", + "fixes": "543ce63b664e2c2f9533d089a4664b559c3e6b5b", + "last_affected_version": "5.18.14", + "last_modified": "2022-08-04", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-21505", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-21505", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-21505", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-21505", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-21505", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-21505" + } + }, + "CVE-2022-2153": { + "affected_versions": "v3.7-rc1 to v5.18-rc1", + "breaks": "1e08ec4a130e2745d96df169e67c58df98a07311", + "cmt_msg": "KVM: x86: Avoid theoretical NULL pointer dereference in kvm_irq_delivery_to_apic_fast()", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", @@ -73367,64 +79766,70 @@ "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "score": 5.5 }, - "cwe": "Use After Free", - "fixes": "7781607938c8371d4c2b243527430241c62e39c2", + "cwe": "NULL Pointer Dereference", + "fixes": "00b5f37189d24ac3ed46cb7f11742094778c46ce", "last_affected_version": "5.17.1", "last_modified": "2023-12-06", - "nvd_text": "A NULL pointer dereference flaw was found in the Linux kernel\u2019s X.25 set of standardized network protocols functionality in the way a user terminates their session using a simulated Ethernet card and continued usage of this connection. This flaw allows a local user to crash the system.", + "nvd_text": "A flaw was found in the Linux kernel\u2019s KVM when attempting to set a SynIC IRQ. This issue makes it possible for a misbehaving VMM to write to SYNIC/STIMER MSRs, causing a NULL pointer dereference. This flaw allows an unprivileged local attacker on the host to issue specific ioctl calls, causing a kernel oops condition that results in a denial of service.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-1516", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-1516", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-1516", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-1516", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-1516", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-1516" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-2153", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-2153", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-2153", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-2153", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-2153", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-2153" } }, - "CVE-2022-1651": { - "affected_versions": "v5.12-rc1-dontuse to v5.18-rc1", - "breaks": "9c5137aedd112f78a968bdd2325de2ea06df46c0", - "cmt_msg": "virt: acrn: fix a memory leak in acrn_dev_ioctl()", + "CVE-2022-2196": { + "affected_versions": "v5.8-rc1 to v6.2-rc1", + "breaks": "5c911beff20aa8639e7a1f28988736c13e03ed54", + "cmt_msg": "KVM: VMX: Execute IBPB on emulated VM-exit when guest has IBRS", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", "Confidentiality": "High", - "Integrity": "None", + "Integrity": "High", "Privileges Required": "Low", - "Scope": "Unchanged", + "Scope": "Changed", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", - "score": 7.1 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "score": 8.8 }, - "cwe": "Missing Release of Memory after Effective Lifetime", - "fixes": "ecd1735f14d6ac868ae5d8b7a2bf193fa11f388b", - "last_affected_version": "5.17.1", + "cwe": "Insecure Default Initialization of Resource", + "fixes": "2e7eab81425ad6c875f2ed47c0ce01e78afc38a5", + "last_affected_version": "6.1.13", "last_modified": "2023-12-06", - "nvd_text": "A memory leak flaw was found in the Linux kernel in acrn_dev_ioctl in the drivers/virt/acrn/hsm.c function in how the ACRN Device Model emulates virtual NICs in VM. This flaw allows a local privileged attacker to leak unauthorized kernel information, causing a denial of service.", + "nvd_text": "A regression exists in the Linux Kernel within KVM: nVMX that allowed for speculative execution attacks.\u00a0L2 can carry out Spectre v2 attacks on L1 due to L1 thinking it doesn't need retpolines or IBPB\u00a0after running L2 due to KVM (L0) advertising eIBRS support to L1. An attacker at L2 with code execution can execute code on an indirect branch on the host machine. We recommend upgrading to Kernel 6.2 or past commit\u00a02e7eab81425a\n", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-1651", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-1651", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-1651", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-1651", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-1651", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-1651" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-2196", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-2196", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-2196", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-2196", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-2196", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-2196" } }, - "CVE-2022-1652": { - "affected_versions": "v2.6.12-rc2 to v5.18-rc6", - "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", - "cmt_msg": "floppy: use a statically allocated error counter", - "cvss2": { - "Access Complexity": "Low", - "Access Vector": "Local Access", - "Authentication": "None", - "Availability Impact": "Complete", - "Confidentiality Impact": "Complete", - "Integrity Impact": "Complete", - "raw": "AV:L/AC:L/Au:N/C:C/I:C/A:C", - "score": 7.2 + "CVE-2022-2209": { + "affected_versions": "unk to unk", + "breaks": "", + "fixes": "", + "last_modified": "2023-12-06", + "nvd_text": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. Reason: This CVE has been rejected as it was incorrectly assigned. All references and descriptions in this candidate have been removed to prevent accidental usage", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-2209", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-2209", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-2209", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-2209", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-2209", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-2209" }, + "rejected": true + }, + "CVE-2022-22942": { + "affected_versions": "v4.14-rc1 to v5.17-rc2", + "breaks": "c906965dee22d5e95d0651759ba107b420212a9f", + "cmt_msg": "drm/vmwgfx: Fix stale file descriptors on failed usercopy", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", @@ -73437,107 +79842,115 @@ "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "score": 7.8 }, - "cwe": "Use After Free", - "fixes": "f71f01394f742fc4558b3f9f4c7ef4c4cf3b07c8", - "last_affected_version": "5.17.9", - "last_modified": "2023-12-06", - "nvd_text": "Linux Kernel could allow a local attacker to execute arbitrary code on the system, caused by a concurrency use-after-free flaw in the bad_flp_intr function. By executing a specially-crafted program, an attacker could exploit this vulnerability to execute arbitrary code or cause a denial of service condition on the system.", + "fixes": "a0f90c8815706981c483a652a6aefca51a5e191c", + "last_affected_version": "5.16.3", + "last_modified": "2023-12-27", + "nvd_text": "The vmwgfx driver contains a local privilege escalation vulnerability that allows unprivileged users to gain access to files opened by other processes on the system through a dangling 'file' pointer.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-1652", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-1652", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-1652", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-1652", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-1652", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-1652" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-22942", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-22942", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-22942", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-22942", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-22942", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-22942" } }, - "CVE-2022-1671": { - "affected_versions": "v5.11-rc1 to v5.18-rc1", - "breaks": "12da59fcab5a05d01773e7cb413b8b8f3bb4e334", - "cmt_msg": "rxrpc: fix some null-ptr-deref bugs in server_key.c", + "CVE-2022-23036": { + "affected_versions": "v2.6.12-rc2 to v5.17-rc8", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()", + "cvss2": { + "Access Complexity": "Medium", + "Access Vector": "Local Access", + "Authentication": "None", + "Availability Impact": "Partial", + "Confidentiality Impact": "Partial", + "Integrity Impact": "Partial", + "raw": "AV:L/AC:M/Au:N/C:P/I:P/A:P", + "score": 4.4 + }, "cvss3": { - "Attack Complexity": "Low", + "Attack Complexity": "High", "Attack Vector": "Local", "Availability": "High", "Confidentiality": "High", - "Integrity": "None", + "Integrity": "High", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", - "score": 7.1 + "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 7.0 }, - "cwe": "NULL Pointer Dereference", - "fixes": "ff8376ade4f668130385839cef586a0990f8ef87", - "last_affected_version": "5.17.1", + "cwe": "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')", + "fixes": "6b1775f26a2da2b05a6dc8ec2b5d14e9a4701a1a", + "last_affected_version": "5.16.13", "last_modified": "2023-12-06", - "nvd_text": "A NULL pointer dereference flaw was found in rxrpc_preparse_s in net/rxrpc/server_key.c in the Linux kernel. This flaw allows a local attacker to crash the system or leak internal kernel information.", + "nvd_text": "Linux PV device frontends vulnerable to attacks by backends T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Several Linux PV device frontends are using the grant table interfaces for removing access rights of the backends in ways being subject to race conditions, resulting in potential data leaks, data corruption by malicious backends, and denial of service triggered by malicious backends: blkfront, netfront, scsifront and the gntalloc driver are testing whether a grant reference is still in use. If this is not the case, they assume that a following removal of the granted access will always succeed, which is not true in case the backend has mapped the granted page between those two operations. As a result the backend can keep access to the memory page of the guest no matter how the page will be used after the frontend I/O has finished. The xenbus driver has a similar problem, as it doesn't check the success of removing the granted access of a shared ring buffer. blkfront: CVE-2022-23036 netfront: CVE-2022-23037 scsifront: CVE-2022-23038 gntalloc: CVE-2022-23039 xenbus: CVE-2022-23040 blkfront, netfront, scsifront, usbfront, dmabuf, xenbus, 9p, kbdfront, and pvcalls are using a functionality to delay freeing a grant reference until it is no longer in use, but the freeing of the related data page is not synchronized with dropping the granted access. As a result the backend can keep access to the memory page even after it has been freed and then re-used for a different purpose. CVE-2022-23041 netfront will fail a BUG_ON() assertion if it fails to revoke access in the rx path. This will result in a Denial of Service (DoS) situation of the guest which can be triggered by the backend. CVE-2022-23042", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-1671", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-1671", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-1671", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-1671", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-1671", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-1671" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-23036", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-23036", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-23036", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-23036", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-23036", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-23036" } }, - "CVE-2022-1678": { - "affected_versions": "v4.18-rc1 to v4.20-rc1", - "alt_msg": "tcp: fix possible socket leaks in internal pacing mode", - "breaks": "73a6bab5aa2a83cb7df85805e08bc03b4065aea7", - "cmt_msg": "tcp: optimize tcp internal pacing", + "CVE-2022-23037": { + "affected_versions": "v2.6.12-rc2 to v5.17-rc8", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "xen/netfront: don't use gnttab_query_foreign_access() for mapped status", "cvss2": { - "Access Complexity": "Low", - "Access Vector": "Network Accessible", + "Access Complexity": "Medium", + "Access Vector": "Local Access", "Authentication": "None", "Availability Impact": "Partial", - "Confidentiality Impact": "None", - "Integrity Impact": "None", - "raw": "AV:N/AC:L/Au:N/C:N/I:N/A:P", - "score": 5.0 + "Confidentiality Impact": "Partial", + "Integrity Impact": "Partial", + "raw": "AV:L/AC:M/Au:N/C:P/I:P/A:P", + "score": 4.4 }, "cvss3": { - "Attack Complexity": "Low", - "Attack Vector": "Network", + "Attack Complexity": "High", + "Attack Vector": "Local", "Availability": "High", - "Confidentiality": "None", - "Integrity": "None", - "Privileges Required": "None", + "Confidentiality": "High", + "Integrity": "High", + "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", - "score": 7.5 + "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 7.0 }, - "cwe": "Unspecified", - "fixes": "864e5c090749448e879e86bec06ee396aa2c19c5", - "last_affected_version": "4.19.227", + "cwe": "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')", + "fixes": "31185df7e2b1d2fa1de4900247a12d7b9c7087eb", + "last_affected_version": "5.16.13", "last_modified": "2023-12-06", - "nvd_text": "An issue was discovered in the Linux Kernel from 4.18 to 4.19, an improper update of sock reference in TCP pacing can lead to memory/netns leak, which can be used by remote clients.", + "nvd_text": "Linux PV device frontends vulnerable to attacks by backends T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Several Linux PV device frontends are using the grant table interfaces for removing access rights of the backends in ways being subject to race conditions, resulting in potential data leaks, data corruption by malicious backends, and denial of service triggered by malicious backends: blkfront, netfront, scsifront and the gntalloc driver are testing whether a grant reference is still in use. If this is not the case, they assume that a following removal of the granted access will always succeed, which is not true in case the backend has mapped the granted page between those two operations. As a result the backend can keep access to the memory page of the guest no matter how the page will be used after the frontend I/O has finished. The xenbus driver has a similar problem, as it doesn't check the success of removing the granted access of a shared ring buffer. blkfront: CVE-2022-23036 netfront: CVE-2022-23037 scsifront: CVE-2022-23038 gntalloc: CVE-2022-23039 xenbus: CVE-2022-23040 blkfront, netfront, scsifront, usbfront, dmabuf, xenbus, 9p, kbdfront, and pvcalls are using a functionality to delay freeing a grant reference until it is no longer in use, but the freeing of the related data page is not synchronized with dropping the granted access. As a result the backend can keep access to the memory page even after it has been freed and then re-used for a different purpose. CVE-2022-23041 netfront will fail a BUG_ON() assertion if it fails to revoke access in the rx path. This will result in a Denial of Service (DoS) situation of the guest which can be triggered by the backend. CVE-2022-23042", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-1678", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-1678", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-1678", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-1678", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-1678", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-1678" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-23037", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-23037", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-23037", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-23037", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-23037", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-23037" } }, - "CVE-2022-1679": { - "affected_versions": "v2.6.35-rc1 to v6.0-rc1", - "breaks": "fb9987d0f748c983bb795a86f47522313f701a08", - "cmt_msg": "ath9k: fix use-after-free in ath9k_hif_usb_rx_cb", + "CVE-2022-23038": { + "affected_versions": "v2.6.12-rc2 to v5.17-rc8", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()", "cvss2": { - "Access Complexity": "Low", + "Access Complexity": "Medium", "Access Vector": "Local Access", "Authentication": "None", - "Availability Impact": "Complete", - "Confidentiality Impact": "Complete", - "Integrity Impact": "Complete", - "raw": "AV:L/AC:L/Au:N/C:C/I:C/A:C", - "score": 7.2 + "Availability Impact": "Partial", + "Confidentiality Impact": "Partial", + "Integrity Impact": "Partial", + "raw": "AV:L/AC:M/Au:N/C:P/I:P/A:P", + "score": 4.4 }, "cvss3": { - "Attack Complexity": "Low", + "Attack Complexity": "High", "Attack Vector": "Local", "Availability": "High", "Confidentiality": "High", @@ -73545,27 +79958,37 @@ "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", - "score": 7.8 + "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 7.0 }, - "cwe": "Use After Free", - "fixes": "0ac4827f78c7ffe8eef074bc010e7e34bc22f533", - "last_affected_version": "5.19.1", + "cwe": "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')", + "fixes": "6b1775f26a2da2b05a6dc8ec2b5d14e9a4701a1a", + "last_affected_version": "5.16.13", "last_modified": "2023-12-06", - "nvd_text": "A use-after-free flaw was found in the Linux kernel\u2019s Atheros wireless adapter driver in the way a user forces the ath9k_htc_wait_for_target function to fail with some input messages. This flaw allows a local user to crash or potentially escalate their privileges on the system.", + "nvd_text": "Linux PV device frontends vulnerable to attacks by backends T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Several Linux PV device frontends are using the grant table interfaces for removing access rights of the backends in ways being subject to race conditions, resulting in potential data leaks, data corruption by malicious backends, and denial of service triggered by malicious backends: blkfront, netfront, scsifront and the gntalloc driver are testing whether a grant reference is still in use. If this is not the case, they assume that a following removal of the granted access will always succeed, which is not true in case the backend has mapped the granted page between those two operations. As a result the backend can keep access to the memory page of the guest no matter how the page will be used after the frontend I/O has finished. The xenbus driver has a similar problem, as it doesn't check the success of removing the granted access of a shared ring buffer. blkfront: CVE-2022-23036 netfront: CVE-2022-23037 scsifront: CVE-2022-23038 gntalloc: CVE-2022-23039 xenbus: CVE-2022-23040 blkfront, netfront, scsifront, usbfront, dmabuf, xenbus, 9p, kbdfront, and pvcalls are using a functionality to delay freeing a grant reference until it is no longer in use, but the freeing of the related data page is not synchronized with dropping the granted access. As a result the backend can keep access to the memory page even after it has been freed and then re-used for a different purpose. CVE-2022-23041 netfront will fail a BUG_ON() assertion if it fails to revoke access in the rx path. This will result in a Denial of Service (DoS) situation of the guest which can be triggered by the backend. CVE-2022-23042", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-1679", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-1679", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-1679", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-1679", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-1679", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-1679" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-23038", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-23038", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-23038", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-23038", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-23038", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-23038" } }, - "CVE-2022-1729": { - "affected_versions": "v4.0-rc1 to v5.18", - "breaks": "f63a8daa5812afef4f06c962351687e1ff9ccb2b", - "cmt_msg": "perf: Fix sys_perf_event_open() race against self", + "CVE-2022-23039": { + "affected_versions": "v2.6.12-rc2 to v5.17-rc8", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "xen/gntalloc: don't use gnttab_query_foreign_access()", + "cvss2": { + "Access Complexity": "Medium", + "Access Vector": "Local Access", + "Authentication": "None", + "Availability Impact": "Partial", + "Confidentiality Impact": "Partial", + "Integrity Impact": "Partial", + "raw": "AV:L/AC:M/Au:N/C:P/I:P/A:P", + "score": 4.4 + }, "cvss3": { "Attack Complexity": "High", "Attack Vector": "Local", @@ -73579,23 +80002,23 @@ "score": 7.0 }, "cwe": "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')", - "fixes": "3ac6487e584a1eb54071dbe1212e05b884136704", - "last_affected_version": "5.17", + "fixes": "d3b6372c5881cb54925212abb62c521df8ba4809", + "last_affected_version": "5.16.13", "last_modified": "2023-12-06", - "nvd_text": "A race condition was found the Linux kernel in perf_event_open() which can be exploited by an unprivileged user to gain root privileges. The bug allows to build several exploit primitives such as kernel address information leak, arbitrary execution, etc.", + "nvd_text": "Linux PV device frontends vulnerable to attacks by backends T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Several Linux PV device frontends are using the grant table interfaces for removing access rights of the backends in ways being subject to race conditions, resulting in potential data leaks, data corruption by malicious backends, and denial of service triggered by malicious backends: blkfront, netfront, scsifront and the gntalloc driver are testing whether a grant reference is still in use. If this is not the case, they assume that a following removal of the granted access will always succeed, which is not true in case the backend has mapped the granted page between those two operations. As a result the backend can keep access to the memory page of the guest no matter how the page will be used after the frontend I/O has finished. The xenbus driver has a similar problem, as it doesn't check the success of removing the granted access of a shared ring buffer. blkfront: CVE-2022-23036 netfront: CVE-2022-23037 scsifront: CVE-2022-23038 gntalloc: CVE-2022-23039 xenbus: CVE-2022-23040 blkfront, netfront, scsifront, usbfront, dmabuf, xenbus, 9p, kbdfront, and pvcalls are using a functionality to delay freeing a grant reference until it is no longer in use, but the freeing of the related data page is not synchronized with dropping the granted access. As a result the backend can keep access to the memory page even after it has been freed and then re-used for a different purpose. CVE-2022-23041 netfront will fail a BUG_ON() assertion if it fails to revoke access in the rx path. This will result in a Denial of Service (DoS) situation of the guest which can be triggered by the backend. CVE-2022-23042", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-1729", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-1729", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-1729", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-1729", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-1729", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-1729" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-23039", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-23039", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-23039", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-23039", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-23039", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-23039" } }, - "CVE-2022-1734": { - "affected_versions": "v4.4-rc1 to v5.18-rc6", - "breaks": "3194c6870158e305dac2af52f83681e9cb67280f", - "cmt_msg": "nfc: nfcmrvl: main: reorder destructive operations in nfcmrvl_nci_unregister_dev to avoid bugs", + "CVE-2022-23040": { + "affected_versions": "v2.6.12-rc2 to v5.17-rc8", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "xen/xenbus: don't let xenbus_grant_ring() remove grants in error case", "cvss2": { "Access Complexity": "Medium", "Access Vector": "Local Access", @@ -73618,38 +80041,36 @@ "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "score": 7.0 }, - "cwe": "Use After Free", - "fixes": "d270453a0d9ec10bb8a802a142fb1b3601a83098", - "last_affected_version": "5.17.6", + "cwe": "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')", + "fixes": "3777ea7bac3113005b7180e6b9dadf16d19a5827", + "last_affected_version": "5.16.13", "last_modified": "2023-12-06", - "nvd_text": "A flaw in Linux Kernel found in nfcmrvl_nci_unregister_dev() in drivers/nfc/nfcmrvl/main.c can lead to use after free both read or write when non synchronized between cleanup routine and firmware download routine.", + "nvd_text": "Linux PV device frontends vulnerable to attacks by backends T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Several Linux PV device frontends are using the grant table interfaces for removing access rights of the backends in ways being subject to race conditions, resulting in potential data leaks, data corruption by malicious backends, and denial of service triggered by malicious backends: blkfront, netfront, scsifront and the gntalloc driver are testing whether a grant reference is still in use. If this is not the case, they assume that a following removal of the granted access will always succeed, which is not true in case the backend has mapped the granted page between those two operations. As a result the backend can keep access to the memory page of the guest no matter how the page will be used after the frontend I/O has finished. The xenbus driver has a similar problem, as it doesn't check the success of removing the granted access of a shared ring buffer. blkfront: CVE-2022-23036 netfront: CVE-2022-23037 scsifront: CVE-2022-23038 gntalloc: CVE-2022-23039 xenbus: CVE-2022-23040 blkfront, netfront, scsifront, usbfront, dmabuf, xenbus, 9p, kbdfront, and pvcalls are using a functionality to delay freeing a grant reference until it is no longer in use, but the freeing of the related data page is not synchronized with dropping the granted access. As a result the backend can keep access to the memory page even after it has been freed and then re-used for a different purpose. CVE-2022-23041 netfront will fail a BUG_ON() assertion if it fails to revoke access in the rx path. This will result in a Denial of Service (DoS) situation of the guest which can be triggered by the backend. CVE-2022-23042", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-1734", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-1734", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-1734", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-1734", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-1734", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-1734" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-23040", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-23040", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-23040", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-23040", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-23040", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-23040" } }, - "CVE-2022-1786": { - "affected_versions": "v5.10-rc1 to v5.12-rc1-dontuse", - "alt_msg": "io_uring: always use original task when preparing req identity", - "backport": true, - "breaks": "500a373d731ac506612db12631ec21295c1ff360", - "cmt_msg": "io_uring: remove io_identity", + "CVE-2022-23041": { + "affected_versions": "v4.12-rc1 to v5.17-rc8", + "breaks": "71ebd71921e451f0f942ddfe85d01e31ddc6eb88", + "cmt_msg": "xen/9p: use alloc/free_pages_exact()", "cvss2": { - "Access Complexity": "Low", + "Access Complexity": "Medium", "Access Vector": "Local Access", "Authentication": "None", - "Availability Impact": "Complete", - "Confidentiality Impact": "Complete", - "Integrity Impact": "Complete", - "raw": "AV:L/AC:L/Au:N/C:C/I:C/A:C", - "score": 7.2 + "Availability Impact": "Partial", + "Confidentiality Impact": "Partial", + "Integrity Impact": "Partial", + "raw": "AV:L/AC:M/Au:N/C:P/I:P/A:P", + "score": 4.4 }, "cvss3": { - "Attack Complexity": "Low", + "Attack Complexity": "High", "Attack Vector": "Local", "Availability": "High", "Confidentiality": "High", @@ -73657,94 +80078,106 @@ "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", - "score": 7.8 + "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 7.0 }, - "cwe": "Use After Free", - "fixes": "4379bf8bd70b5de6bba7d53015b0c36c57a634ee", - "last_affected_version": "5.10.116", - "last_modified": "2024-01-12", - "nvd_text": "A use-after-free flaw was found in the Linux kernel\u2019s io_uring subsystem in the way a user sets up a ring with IORING_SETUP_IOPOLL with more than one task completing submissions on this ring. This flaw allows a local user to crash or escalate their privileges on the system.", + "cwe": "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')", + "fixes": "5cadd4bb1d7fc9ab201ac14620d1a478357e4ebd", + "last_affected_version": "5.16.13", + "last_modified": "2023-12-06", + "nvd_text": "Linux PV device frontends vulnerable to attacks by backends T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Several Linux PV device frontends are using the grant table interfaces for removing access rights of the backends in ways being subject to race conditions, resulting in potential data leaks, data corruption by malicious backends, and denial of service triggered by malicious backends: blkfront, netfront, scsifront and the gntalloc driver are testing whether a grant reference is still in use. If this is not the case, they assume that a following removal of the granted access will always succeed, which is not true in case the backend has mapped the granted page between those two operations. As a result the backend can keep access to the memory page of the guest no matter how the page will be used after the frontend I/O has finished. The xenbus driver has a similar problem, as it doesn't check the success of removing the granted access of a shared ring buffer. blkfront: CVE-2022-23036 netfront: CVE-2022-23037 scsifront: CVE-2022-23038 gntalloc: CVE-2022-23039 xenbus: CVE-2022-23040 blkfront, netfront, scsifront, usbfront, dmabuf, xenbus, 9p, kbdfront, and pvcalls are using a functionality to delay freeing a grant reference until it is no longer in use, but the freeing of the related data page is not synchronized with dropping the granted access. As a result the backend can keep access to the memory page even after it has been freed and then re-used for a different purpose. CVE-2022-23041 netfront will fail a BUG_ON() assertion if it fails to revoke access in the rx path. This will result in a Denial of Service (DoS) situation of the guest which can be triggered by the backend. CVE-2022-23042", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-1786", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-1786", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-1786", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-1786", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-1786", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-1786" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-23041", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-23041", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-23041", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-23041", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-23041", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-23041" } }, - "CVE-2022-1789": { - "affected_versions": "v4.19-rc1 to v5.18", - "breaks": "eb4b248e152d3ecf189b9d32c04961360dbd938a", - "cmt_msg": "KVM: x86/mmu: fix NULL pointer dereference on guest INVPCID", + "CVE-2022-23042": { + "affected_versions": "v2.6.12-rc2 to v5.17-rc8", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "xen/netfront: react properly to failing gnttab_end_foreign_access_ref()", "cvss2": { "Access Complexity": "Medium", "Access Vector": "Local Access", "Authentication": "None", - "Availability Impact": "Complete", - "Confidentiality Impact": "Complete", - "Integrity Impact": "Complete", - "raw": "AV:L/AC:M/Au:N/C:C/I:C/A:C", - "score": 6.9 + "Availability Impact": "Partial", + "Confidentiality Impact": "Partial", + "Integrity Impact": "Partial", + "raw": "AV:L/AC:M/Au:N/C:P/I:P/A:P", + "score": 4.4 }, "cvss3": { - "Attack Complexity": "Low", - "Attack Vector": "Physical", + "Attack Complexity": "High", + "Attack Vector": "Local", "Availability": "High", "Confidentiality": "High", "Integrity": "High", - "Privileges Required": "None", + "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", - "score": 6.8 + "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 7.0 }, - "cwe": "NULL Pointer Dereference", - "fixes": "9f46c187e2e680ecd9de7983e4d081c3391acc76", - "last_affected_version": "5.17", + "cwe": "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')", + "fixes": "66e3531b33ee51dad17c463b4d9c9f52e341503d", + "last_affected_version": "5.16.13", "last_modified": "2023-12-06", - "nvd_text": "With shadow paging enabled, the INVPCID instruction results in a call to kvm_mmu_invpcid_gva. If INVPCID is executed with CR0.PG=0, the invlpg callback is not set and the result is a NULL pointer dereference.", + "nvd_text": "Linux PV device frontends vulnerable to attacks by backends T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Several Linux PV device frontends are using the grant table interfaces for removing access rights of the backends in ways being subject to race conditions, resulting in potential data leaks, data corruption by malicious backends, and denial of service triggered by malicious backends: blkfront, netfront, scsifront and the gntalloc driver are testing whether a grant reference is still in use. If this is not the case, they assume that a following removal of the granted access will always succeed, which is not true in case the backend has mapped the granted page between those two operations. As a result the backend can keep access to the memory page of the guest no matter how the page will be used after the frontend I/O has finished. The xenbus driver has a similar problem, as it doesn't check the success of removing the granted access of a shared ring buffer. blkfront: CVE-2022-23036 netfront: CVE-2022-23037 scsifront: CVE-2022-23038 gntalloc: CVE-2022-23039 xenbus: CVE-2022-23040 blkfront, netfront, scsifront, usbfront, dmabuf, xenbus, 9p, kbdfront, and pvcalls are using a functionality to delay freeing a grant reference until it is no longer in use, but the freeing of the related data page is not synchronized with dropping the granted access. As a result the backend can keep access to the memory page even after it has been freed and then re-used for a different purpose. CVE-2022-23041 netfront will fail a BUG_ON() assertion if it fails to revoke access in the rx path. This will result in a Denial of Service (DoS) situation of the guest which can be triggered by the backend. CVE-2022-23042", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-1789", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-1789", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-1789", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-1789", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-1789", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-1789" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-23042", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-23042", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-23042", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-23042", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-23042", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-23042" } }, - "CVE-2022-1836": { - "affected_versions": "unk to v5.18-rc5", - "breaks": "", - "cmt_msg": "floppy: disable FDRAWCMD by default", - "fixes": "233087ca063686964a53c829d547c7571e3f67bf", - "last_affected_version": "5.17.5", + "CVE-2022-2308": { + "affected_versions": "v5.15-rc1 to v6.0", + "breaks": "c8a6153b6c59d95c0e091f053f6f180952ade91e", + "cmt_msg": "vduse: prevent uninitialized memory accesses", + "cvss3": { + "Attack Complexity": "Low", + "Attack Vector": "Local", + "Availability": "None", + "Confidentiality": "High", + "Integrity": "None", + "Privileges Required": "Low", + "Scope": "Changed", + "User Interaction": "None", + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", + "score": 6.5 + }, + "cwe": "Use of Uninitialized Resource", + "fixes": "46f8a29272e51b6df7393d58fc5cb8967397ef2b", + "last_affected_version": "6.-1", "last_modified": "2023-12-06", - "nvd_text": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2022-33981. Reason: This candidate is a reservation duplicate of CVE-2022-33981. Notes: All CVE users should reference CVE-2022-33981 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage", + "nvd_text": "A flaw was found in vDPA with VDUSE backend. There are currently no checks in VDUSE kernel driver to ensure the size of the device config space is in line with the features advertised by the VDUSE userspace application. In case of a mismatch, Virtio drivers config read helpers do not initialize the memory indirectly passed to vduse_vdpa_get_config() returning uninitialized memory from the stack. This could cause undefined behavior or data leaks in Virtio drivers.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-1836", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-1836", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-1836", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-1836", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-1836", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-1836" - }, - "rejected": true - }, - "CVE-2022-1852": { - "affected_versions": "v5.12-rc1-dontuse to v5.19-rc1", - "breaks": "4aa2691dcbd38ce1c461188799d863398dd2865d", - "cmt_msg": "KVM: x86: avoid calling x86 emulator without a decoded instruction", + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-2308", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-2308", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-2308", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-2308", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-2308", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-2308" + } + }, + "CVE-2022-2318": { + "affected_versions": "v2.6.12-rc2 to v5.19-rc5", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "net: rose: fix UAF bugs caused by timer handler", "cvss2": { "Access Complexity": "Low", "Access Vector": "Local Access", "Authentication": "None", - "Availability Impact": "Partial", + "Availability Impact": "Complete", "Confidentiality Impact": "None", "Integrity Impact": "None", - "raw": "AV:L/AC:L/Au:N/C:N/I:N/A:P", - "score": 2.1 + "raw": "AV:L/AC:L/Au:N/C:N/I:N/A:C", + "score": 4.9 }, "cvss3": { "Attack Complexity": "Low", @@ -73758,24 +80191,24 @@ "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "score": 5.5 }, - "cwe": "NULL Pointer Dereference", - "fixes": "fee060cd52d69c114b62d1a2948ea9648b5131f9", - "last_affected_version": "5.18.1", + "cwe": "Use After Free", + "fixes": "9cc02ede696272c5271a401e4f27c262359bc2f6", + "last_affected_version": "5.18.9", "last_modified": "2023-12-06", - "nvd_text": "A NULL pointer dereference flaw was found in the Linux kernel\u2019s KVM module, which can lead to a denial of service in the x86_emulate_insn in arch/x86/kvm/emulate.c. This flaw occurs while executing an illegal instruction in guest in the Intel CPU.", + "nvd_text": "There are use-after-free vulnerabilities caused by timer handler in net/rose/rose_timer.c of linux that allow attackers to crash linux kernel without any privileges.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-1852", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-1852", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-1852", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-1852", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-1852", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-1852" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-2318", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-2318", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-2318", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-2318", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-2318", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-2318" } }, - "CVE-2022-1882": { - "affected_versions": "v5.17-rc8 to v5.19-rc8", - "breaks": "db8facfc9fafacefe8a835416a6b77c838088f8b", - "cmt_msg": "watchqueue: make sure to serialize 'wqueue->defunct' properly", + "CVE-2022-23222": { + "affected_versions": "v2.6.12-rc2 to v5.17-rc1", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "bpf: Replace PTR_TO_XXX_OR_NULL with PTR_TO_XXX | PTR_MAYBE_NULL", "cvss2": { "Access Complexity": "Low", "Access Vector": "Local Access", @@ -73798,34 +80231,24 @@ "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "score": 7.8 }, - "cwe": "Use After Free", - "fixes": "353f7988dd8413c47718f7ca79c030b6fb62cfe5", - "last_affected_version": "5.18.14", + "cwe": "NULL Pointer Dereference", + "fixes": "c25b2ae136039ffa820c26138ed4a5e5f3ab3841", + "last_affected_version": "5.16.10", "last_modified": "2023-12-06", - "nvd_text": "A use-after-free flaw was found in the Linux kernel\u2019s pipes functionality in how a user performs manipulations with the pipe post_one_notification() after free_pipe_info() that is already called. This flaw allows a local user to crash or potentially escalate their privileges on the system.", + "nvd_text": "kernel/bpf/verifier.c in the Linux kernel through 5.15.14 allows local users to gain privileges because of the availability of pointer arithmetic via certain *_OR_NULL pointer types.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-1882", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-1882", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-1882", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-1882", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-1882", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-1882" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-23222", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-23222", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-23222", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-23222", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-23222", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-23222" } }, - "CVE-2022-1943": { - "affected_versions": "v5.15-rc1 to v5.18-rc7", - "breaks": "979a6e28dd969a2222545001f79566b4bfaf06c0", - "cmt_msg": "udf: Avoid using stale lengthOfImpUse", - "cvss2": { - "Access Complexity": "Low", - "Access Vector": "Local Access", - "Authentication": "None", - "Availability Impact": "Complete", - "Confidentiality Impact": "Complete", - "Integrity Impact": "Complete", - "raw": "AV:L/AC:L/Au:N/C:C/I:C/A:C", - "score": 7.2 - }, + "CVE-2022-2327": { + "affected_versions": "v5.1-rc1 to v5.12-rc1-dontuse", + "breaks": "2b188cc1bb857a9d4701ae59aa7768b5124e262e", + "cmt_msg": "io_uring: remove any grabbing of context", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", @@ -73838,212 +80261,158 @@ "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "score": 7.8 }, - "cwe": "Out-of-bounds Write", - "fixes": "c1ad35dd0548ce947d97aaf92f7f2f9a202951cf", - "last_affected_version": "5.17.7", - "last_modified": "2023-12-06", - "nvd_text": "A flaw out of bounds memory write in the Linux kernel UDF file system functionality was found in the way user triggers some file operation which triggers udf_write_fi(). A local user could use this flaw to crash the system or potentially", + "cwe": "Double Free", + "fixes": "44526bedc2ff8fcd58552e3c5bae928524b6f13c", + "last_modified": "2024-01-12", + "nvd_text": "io_uring use work_flags to determine which identity need to grab from the calling process to make sure it is consistent with the calling process when executing IORING_OP. Some operations are missing some types, which can lead to incorrect reference counts which can then lead to a double free. We recommend upgrading the kernel past commit df3f3bb5059d20ef094d6b2f0256c4bf4127a859", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-1943", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-1943", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-1943", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-1943", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-1943", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-1943" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-2327", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-2327", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-2327", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-2327", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-2327", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-2327" } }, - "CVE-2022-1966": { - "affected_versions": "unk to v5.19-rc1", - "breaks": "", - "cmt_msg": "netfilter: nf_tables: disallow non-stateful expression in sets earlier", - "cvss2": { - "Access Complexity": "Low", - "Access Vector": "Local Access", - "Authentication": "None", - "Availability Impact": "Complete", - "Confidentiality Impact": "Complete", - "Integrity Impact": "Complete", - "raw": "AV:L/AC:L/Au:N/C:C/I:C/A:C", - "score": 7.2 - }, + "CVE-2022-2380": { + "affected_versions": "v2.6.12-rc2 to v5.18-rc1", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "video: fbdev: sm712fb: Fix crash in smtcfb_read()", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", - "Confidentiality": "High", - "Integrity": "High", + "Confidentiality": "None", + "Integrity": "None", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", - "score": 7.8 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "score": 5.5 }, - "cwe": "Use After Free", - "fixes": "520778042ccca019f3ffa136dd0ca565c486cedd", - "last_affected_version": "5.18.1", + "cwe": "Out-of-bounds Write", + "fixes": "bd771cf5c4254511cc4abb88f3dab3bd58bdf8e8", + "last_affected_version": "5.17.1", "last_modified": "2023-12-06", - "nvd_text": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2022-32250. Reason: This candidate is a duplicate of CVE-2022-32250. Notes: All CVE users should reference CVE-2022-32250 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.", + "nvd_text": "The Linux kernel was found vulnerable out of bounds memory access in the drivers/video/fbdev/sm712fb.c:smtcfb_read() function. The vulnerability could result in local attackers being able to crash the kernel.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-1966", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-1966", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-1966", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-1966", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-1966", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-1966" - }, - "rejected": true + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-2380", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-2380", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-2380", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-2380", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-2380", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-2380" + } }, - "CVE-2022-1972": { - "affected_versions": "v5.6-rc1 to v5.19-rc1", - "breaks": "f3a2181e16f1dcbf5446ed43f6b5d9f56c459f85", - "cmt_msg": "netfilter: nf_tables: sanitize nft_set_desc_concat_parse()", - "fixes": "fecf31ee395b0295f2d7260aa29946b7605f7c85", - "last_affected_version": "5.18.1", + "CVE-2022-23816": { + "affected_versions": "unk to v5.19-rc7", + "breaks": "", + "cmt_msg": "x86/kvm/vmx: Make noinstr clean", + "fixes": "742ab6df974ae8384a2dd213db1a3a06cf6d8936", + "last_affected_version": "5.18.13", "last_modified": "2023-12-06", - "nvd_text": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2022-2078. Reason: This candidate is a reservation duplicate of CVE-2022-2078. Notes: All CVE users should reference CVE-2022-2078 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage", + "nvd_text": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate is unused by its CNA. Notes: none.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-1972", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-1972", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-1972", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-1972", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-1972", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-1972" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-23816", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-23816", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-23816", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-23816", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-23816", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-23816" }, "rejected": true }, - "CVE-2022-1973": { - "affected_versions": "v5.15-rc1 to v5.19-rc1", - "breaks": "b46acd6a6a627d876898e1c84d3f84902264b445", - "cmt_msg": "fs/ntfs3: Fix invalid free in log_replay", + "CVE-2022-23825": { + "affected_versions": "unk to unk", + "breaks": "", + "cvss2": { + "Access Complexity": "Low", + "Access Vector": "Local Access", + "Authentication": "None", + "Availability Impact": "None", + "Confidentiality Impact": "Partial", + "Integrity Impact": "None", + "raw": "AV:L/AC:L/Au:N/C:P/I:N/A:N", + "score": 2.1 + }, "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", - "Availability": "High", + "Availability": "None", "Confidentiality": "High", "Integrity": "None", "Privileges Required": "Low", - "Scope": "Unchanged", + "Scope": "Changed", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", - "score": 7.1 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", + "score": 6.5 }, - "cwe": "Use After Free", - "fixes": "f26967b9f7a830e228bb13fb41bd516ddd9d789d", - "last_affected_version": "5.18.2", + "cwe": "Exposure of Resource to Wrong Sphere", + "fixes": "", "last_modified": "2023-12-06", - "nvd_text": "A use-after-free flaw was found in the Linux kernel in log_replay in fs/ntfs3/fslog.c in the NTFS journal. This flaw allows a local attacker to crash the system and leads to a kernel information leak problem.", + "nvd_text": "Aliases in the branch predictor may cause some AMD processors to predict the wrong branch type potentially leading to information disclosure.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-1973", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-1973", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-1973", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-1973", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-1973", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-1973" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-23825", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-23825", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-23825", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-23825", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-23825", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-23825" } }, - "CVE-2022-1974": { - "affected_versions": "v3.1-rc1 to v5.18-rc6", - "breaks": "3e256b8f8dfa309a80b5dece388d85d9a9801a29", - "cmt_msg": "nfc: replace improper check device_is_registered() in netlink related functions", + "CVE-2022-23960": { + "affected_versions": "v2.6.12-rc2 to v5.17-rc8", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "ARM: report Spectre v2 status through sysfs", + "cvss2": { + "Access Complexity": "Medium", + "Access Vector": "Local Access", + "Authentication": "None", + "Availability Impact": "None", + "Confidentiality Impact": "Partial", + "Integrity Impact": "None", + "raw": "AV:L/AC:M/Au:N/C:P/I:N/A:N", + "score": 1.9 + }, "cvss3": { "Attack Complexity": "High", "Attack Vector": "Local", "Availability": "None", "Confidentiality": "High", "Integrity": "None", - "Privileges Required": "High", - "Scope": "Unchanged", - "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N", - "score": 4.1 - }, - "cwe": "Use After Free", - "fixes": "da5c0f119203ad9728920456a0f52a6d850c01cd", - "last_affected_version": "5.17.6", - "last_modified": "2023-12-06", - "nvd_text": "A use-after-free flaw was found in the Linux kernel's NFC core functionality due to a race condition between kobject creation and delete. This vulnerability allows a local attacker with CAP_NET_ADMIN privilege to leak kernel information.", - "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-1974", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-1974", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-1974", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-1974", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-1974", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-1974" - } - }, - "CVE-2022-1975": { - "affected_versions": "v3.11-rc1 to v5.18-rc6", - "breaks": "9674da8759df0d6c0d24e1ede6e2a1acdef91e3c", - "cmt_msg": "NFC: netlink: fix sleep in atomic bug when firmware download timeout", - "cvss3": { - "Attack Complexity": "Low", - "Attack Vector": "Local", - "Availability": "High", - "Confidentiality": "None", - "Integrity": "None", "Privileges Required": "Low", - "Scope": "Unchanged", + "Scope": "Changed", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", - "score": 5.5 + "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", + "score": 5.6 }, "cwe": "Unspecified", - "fixes": "4071bf121d59944d5cd2238de0642f3d7995a997", - "last_affected_version": "5.17.6", - "last_modified": "2023-12-06", - "nvd_text": "There is a sleep-in-atomic bug in /net/nfc/netlink.c that allows an attacker to crash the Linux kernel by simulating a nfc device from user-space.", - "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-1975", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-1975", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-1975", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-1975", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-1975", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-1975" - } - }, - "CVE-2022-1976": { - "affected_versions": "v5.18-rc2 to v5.19-rc1", - "breaks": "d5361233e9ab920e135819f73dd8466355f1fddd", - "cmt_msg": "io_uring: reinstate the inflight tracking", - "cvss3": { - "Attack Complexity": "Low", - "Attack Vector": "Local", - "Availability": "High", - "Confidentiality": "High", - "Integrity": "High", - "Privileges Required": "Low", - "Scope": "Unchanged", - "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", - "score": 7.8 - }, - "cwe": "Use After Free", - "fixes": "9cae36a094e7e9d6e5fe8b6dcd4642138b3eb0c7", - "last_affected_version": "5.18.5", + "fixes": "9dd78194a3722fa6712192cdd4f7032d45112a9a", + "last_affected_version": "5.16.13", "last_modified": "2023-12-06", - "nvd_text": "A flaw was found in the Linux kernel\u2019s implementation of IO-URING. This flaw allows an attacker with local executable permission to create a string of requests that can cause a use-after-free flaw within the kernel. This issue leads to memory corruption and possible privilege escalation.", + "nvd_text": "Certain Arm Cortex and Neoverse processors through 2022-03-08 do not properly restrict cache speculation, aka Spectre-BHB. An attacker can leverage the shared branch history in the Branch History Buffer (BHB) to influence mispredicted branches. Then, cache allocation can allow the attacker to obtain sensitive information.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-1976", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-1976", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-1976", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-1976", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-1976", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-1976" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-23960", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-23960", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-23960", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-23960", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-23960", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-23960" } }, - "CVE-2022-1998": { - "affected_versions": "v5.13-rc7 to v5.17-rc3", - "breaks": "f644bc449b37cc32d3ce7b36a88073873aa21bd5", - "cmt_msg": "fanotify: Fix stale file descriptor in copy_event_to_user()", + "CVE-2022-24122": { + "affected_versions": "v5.14-rc1 to v5.17-rc2", + "breaks": "d64696905554e919321e31afc210606653b8f6a4", + "cmt_msg": "ucount: Make get_ucount a safe get_user replacement", "cvss2": { - "Access Complexity": "Low", + "Access Complexity": "Medium", "Access Vector": "Local Access", "Authentication": "None", "Availability Impact": "Complete", "Confidentiality Impact": "Complete", "Integrity Impact": "Complete", - "raw": "AV:L/AC:L/Au:N/C:C/I:C/A:C", - "score": 7.2 + "raw": "AV:L/AC:M/Au:N/C:C/I:C/A:C", + "score": 6.9 }, "cvss3": { "Attack Complexity": "Low", @@ -74058,155 +80427,145 @@ "score": 7.8 }, "cwe": "Use After Free", - "fixes": "ee12595147ac1fbfb5bcb23837e26dd58d94b15d", - "last_affected_version": "5.16.5", + "fixes": "f9d87929d451d3e649699d0f1d74f71f77ad38f5", + "last_affected_version": "5.15.18", "last_modified": "2023-12-06", - "nvd_text": "A use after free in the Linux kernel File System notify functionality was found in the way user triggers copy_info_records_to_user() call to fail in copy_event_to_user(). A local user could use this flaw to crash the system or potentially escalate their privileges on the system.", + "nvd_text": "kernel/ucount.c in the Linux kernel 5.14 through 5.16.4, when unprivileged user namespaces are enabled, allows a use-after-free and privilege escalation because a ucounts object can outlive its namespace.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-1998", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-1998", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-1998", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-1998", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-1998", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-1998" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-24122", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-24122", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-24122", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-24122", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-24122", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-24122" } }, - "CVE-2022-20008": { - "affected_versions": "v4.16-rc1 to v5.17-rc5", - "breaks": "81196976ed946cbf36bb41ddda402853c7df7cfa", - "cmt_msg": "mmc: block: fix read single on recovery logic", + "CVE-2022-24448": { + "affected_versions": "v3.6-rc1 to v5.17-rc2", + "breaks": "0dd2b474d0b69d58859399b1df7fdc699ea005d4", + "cmt_msg": "NFSv4: Handle case where the lookup of a directory fails", "cvss2": { - "Access Complexity": "Low", + "Access Complexity": "Medium", "Access Vector": "Local Access", "Authentication": "None", "Availability Impact": "None", "Confidentiality Impact": "Partial", "Integrity Impact": "None", - "raw": "AV:L/AC:L/Au:N/C:P/I:N/A:N", - "score": 2.1 + "raw": "AV:L/AC:M/Au:N/C:P/I:N/A:N", + "score": 1.9 }, "cvss3": { "Attack Complexity": "Low", - "Attack Vector": "Physical", + "Attack Vector": "Local", "Availability": "None", - "Confidentiality": "High", + "Confidentiality": "Low", "Integrity": "None", - "Privileges Required": "None", + "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", - "score": 4.6 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "score": 3.3 }, - "cwe": "Use of Uninitialized Resource", - "fixes": "54309fde1a352ad2674ebba004a79f7d20b9f037", - "last_affected_version": "5.16.10", + "cwe": "Missing Initialization of Resource", + "fixes": "ac795161c93699d600db16c1a8cc23a65a1eceaf", + "last_affected_version": "5.16.4", "last_modified": "2023-12-06", - "nvd_text": "In mmc_blk_read_single of block.c, there is a possible way to read kernel heap memory due to uninitialized data. This could lead to local information disclosure if reading from an SD card that triggers errors, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-216481035References: Upstream kernel", + "nvd_text": "An issue was discovered in fs/nfs/dir.c in the Linux kernel before 5.16.5. If an application sets the O_DIRECTORY flag, and tries to open a regular file, nfs_atomic_open() performs a regular lookup. If a regular file is found, ENOTDIR should occur, but the server instead returns uninitialized data in the file descriptor.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-20008", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-20008", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-20008", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-20008", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-20008", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-20008" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-24448", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-24448", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-24448", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-24448", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-24448", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-24448" } }, - "CVE-2022-20132": { - "affected_versions": "v2.6.12-rc2 to v5.16-rc5", + "CVE-2022-24958": { + "affected_versions": "v2.6.12-rc2 to v5.17-rc1", "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", - "cmt_msg": "HID: add hid_is_usb() function to make it simpler for USB detection", + "cmt_msg": "usb: gadget: don't release an existing dev->buf", "cvss2": { "Access Complexity": "Low", "Access Vector": "Local Access", "Authentication": "None", - "Availability Impact": "None", - "Confidentiality Impact": "Complete", - "Integrity Impact": "None", - "raw": "AV:L/AC:L/Au:N/C:C/I:N/A:N", - "score": 4.9 + "Availability Impact": "Partial", + "Confidentiality Impact": "Partial", + "Integrity Impact": "Partial", + "raw": "AV:L/AC:L/Au:N/C:P/I:P/A:P", + "score": 4.6 }, "cvss3": { "Attack Complexity": "Low", - "Attack Vector": "Physical", - "Availability": "None", + "Attack Vector": "Local", + "Availability": "High", "Confidentiality": "High", - "Integrity": "None", - "Privileges Required": "None", + "Integrity": "High", + "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", - "score": 4.6 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 7.8 }, - "cwe": "Out-of-bounds Read", - "fixes": "f83baa0cb6cfc92ebaf7f9d3a99d7e34f2e77a8a", - "last_affected_version": "5.15.7", + "cwe": "Release of Invalid Pointer or Reference", + "fixes": "89f3594d0de58e8a57d92d497dea9fee3d4b9cda", + "last_affected_version": "5.16.12", "last_modified": "2023-12-06", - "nvd_text": "In lg_probe and related functions of hid-lg.c and other USB HID files, there is a possible out of bounds read due to improper input validation. This could lead to local information disclosure if a malicious USB HID device were plugged in, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-188677105References: Upstream kernel", + "nvd_text": "drivers/usb/gadget/legacy/inode.c in the Linux kernel through 5.16.8 mishandles dev->buf release.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-20132", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-20132", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-20132", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-20132", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-20132", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-20132" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-24958", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-24958", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-24958", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-24958", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-24958", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-24958" } }, - "CVE-2022-20141": { - "affected_versions": "v2.6.12-rc2 to v5.15-rc1", - "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", - "cmt_msg": "igmp: Add ip_mc_list lock in ip_check_mc_rcu", + "CVE-2022-24959": { + "affected_versions": "v4.19-rc7 to v5.17-rc2", + "breaks": "0781168e23a2fc8dceb989f11fc5b39b3ccacc35", + "cmt_msg": "yam: fix a memory leak in yam_siocdevprivate()", "cvss2": { - "Access Complexity": "Medium", + "Access Complexity": "Low", "Access Vector": "Local Access", "Authentication": "None", - "Availability Impact": "Complete", - "Confidentiality Impact": "Complete", - "Integrity Impact": "Complete", - "raw": "AV:L/AC:M/Au:N/C:C/I:C/A:C", - "score": 6.9 + "Availability Impact": "Partial", + "Confidentiality Impact": "None", + "Integrity Impact": "None", + "raw": "AV:L/AC:L/Au:N/C:N/I:N/A:P", + "score": 2.1 }, "cvss3": { - "Attack Complexity": "High", + "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", - "Confidentiality": "High", - "Integrity": "High", + "Confidentiality": "None", + "Integrity": "None", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", - "score": 7.0 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "score": 5.5 }, - "cwe": "Improper Locking", - "fixes": "23d2b94043ca8835bd1e67749020e839f396a1c2", - "last_affected_version": "5.14.2", + "cwe": "Missing Release of Memory after Effective Lifetime", + "fixes": "29eb31542787e1019208a2e1047bb7c76c069536", + "last_affected_version": "5.16.4", "last_modified": "2023-12-06", - "nvd_text": "In ip_check_mc_rcu of igmp.c, there is a possible use after free due to improper locking. This could lead to local escalation of privilege when opening and closing inet sockets with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-112551163References: Upstream kernel", + "nvd_text": "An issue was discovered in the Linux kernel before 5.16.5. There is a memory leak in yam_siocdevprivate in drivers/net/hamradio/yam.c.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-20141", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-20141", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-20141", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-20141", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-20141", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-20141" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-24959", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-24959", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-24959", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-24959", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-24959", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-24959" } }, - "CVE-2022-20148": { - "affected_versions": "v2.6.12-rc2 to v5.16-rc1", - "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", - "cmt_msg": "f2fs: fix UAF in f2fs_available_free_memory", - "cvss2": { - "Access Complexity": "Medium", - "Access Vector": "Local Access", - "Authentication": "None", - "Availability Impact": "Complete", - "Confidentiality Impact": "Complete", - "Integrity Impact": "Complete", - "raw": "AV:L/AC:M/Au:N/C:C/I:C/A:C", - "score": 6.9 - }, + "CVE-2022-2503": { + "affected_versions": "v3.4-rc1 to v5.19-rc1", + "breaks": "a4ffc152198efba2ed9e6eac0eb97f17bfebce85", + "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag", "cvss3": { - "Attack Complexity": "High", + "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", "Confidentiality": "High", @@ -74214,67 +80573,66 @@ "Privileges Required": "High", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", - "score": 6.4 + "raw": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "score": 6.7 }, - "cwe": "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')", - "fixes": "5429c9dbc9025f9a166f64e22e3a69c94fd5b29b", - "last_affected_version": "5.15.2", + "cwe": "Improper Authentication", + "fixes": "4caae58406f8ceb741603eee460d79bacca9b1b5", + "last_affected_version": "5.18.1", "last_modified": "2023-12-06", - "nvd_text": "In TBD of TBD, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege in the kernel with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-219513976References: Upstream kernel", + "nvd_text": "Dm-verity is used for extending root-of-trust to root filesystems. LoadPin builds on this property to restrict module/firmware loads to just the trusted root filesystem. Device-mapper table reloads currently allow users with root privileges to switch out the target with an equivalent dm-linear target and bypass verification till reboot. This allows root to bypass LoadPin and can be used to load untrusted and unverified kernel modules and firmware, which implies arbitrary kernel execution and persistence for peripherals that do not verify firmware updates. We recommend upgrading past commit 4caae58406f8ceb741603eee460d79bacca9b1b5", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-20148", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-20148", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-20148", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-20148", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-20148", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-20148" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-2503", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-2503", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-2503", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-2503", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-2503", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-2503" } }, - "CVE-2022-20153": { - "affected_versions": "v5.12-rc1-dontuse to v5.13-rc1", - "breaks": "cb5e1b81304e089ee3ca948db4d29f71902eb575", - "cmt_msg": "io_uring: return back safer resurrect", + "CVE-2022-25258": { + "affected_versions": "v3.16-rc1 to v5.17-rc4", + "breaks": "37a3a533429ef9b3cc9f15a656c19623f0e88df7", + "cmt_msg": "USB: gadget: validate interface OS descriptor requests", "cvss2": { "Access Complexity": "Low", "Access Vector": "Local Access", "Authentication": "None", "Availability Impact": "Complete", - "Confidentiality Impact": "Complete", - "Integrity Impact": "Complete", - "raw": "AV:L/AC:L/Au:N/C:C/I:C/A:C", - "score": 7.2 + "Confidentiality Impact": "None", + "Integrity Impact": "None", + "raw": "AV:L/AC:L/Au:N/C:N/I:N/A:C", + "score": 4.9 }, "cvss3": { "Attack Complexity": "Low", - "Attack Vector": "Local", + "Attack Vector": "Physical", "Availability": "High", - "Confidentiality": "High", - "Integrity": "High", - "Privileges Required": "High", + "Confidentiality": "None", + "Integrity": "None", + "Privileges Required": "None", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", - "score": 6.7 + "raw": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "score": 4.6 }, - "cwe": "Use After Free", - "fixes": "f70865db5ff35f5ed0c7e9ef63e7cca3d4947f04", - "last_affected_version": "5.10.106", + "cwe": "NULL Pointer Dereference", + "fixes": "75e5b4849b81e19e9efe1654b30d7f3151c33c2c", + "last_affected_version": "5.16.9", "last_modified": "2023-12-06", - "nvd_text": "In rcu_cblist_dequeue of rcu_segcblist.c, there is a possible use-after-free due to improper locking. This could lead to local escalation of privilege in the kernel with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-222091980References: Upstream kernel", + "nvd_text": "An issue was discovered in drivers/usb/gadget/composite.c in the Linux kernel before 5.16.10. The USB Gadget subsystem lacks certain validation of interface OS descriptor requests (ones with a large array index and ones associated with NULL function pointer retrieval). Memory corruption might occur.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-20153", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-20153", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-20153", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-20153", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-20153", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-20153" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-25258", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-25258", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-25258", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-25258", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-25258", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-25258" } }, - "CVE-2022-20154": { - "affected_versions": "v4.14-rc1 to v5.16-rc8", - "breaks": "d25adbeb0cdb860fb39e09cdd025e9cfc954c5ab", - "cmt_msg": "sctp: use call_rcu to free endpoint", + "CVE-2022-25265": { + "affected_versions": "unk to unk", + "breaks": "", "cvss2": { "Access Complexity": "Medium", "Access Vector": "Local Access", @@ -74286,74 +80644,83 @@ "score": 4.4 }, "cvss3": { - "Attack Complexity": "High", + "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", "Confidentiality": "High", "Integrity": "High", - "Privileges Required": "High", + "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", - "score": 6.4 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 7.8 }, - "cwe": "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')", - "fixes": "5ec7d18d1813a5bead0b495045606c93873aecbb", - "last_affected_version": "5.15.12", + "cwe": "Improper Control of Dynamically-Managed Code Resources", + "fixes": "", "last_modified": "2023-12-06", - "nvd_text": "In lock_sock_nested of sock.c, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-174846563References: Upstream kernel", + "nvd_text": "In the Linux kernel through 5.16.10, certain binary files may have the exec-all attribute if they were built in approximately 2003 (e.g., with GCC 3.2.2 and Linux kernel 2.4.20). This can cause execution of bytes located in supposedly non-executable regions of a file.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-20154", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-20154", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-20154", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-20154", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-20154", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-20154" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-25265", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-25265", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-25265", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-25265", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-25265", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-25265" } }, - "CVE-2022-20158": { - "affected_versions": "v2.6.14-rc3 to v5.17", - "breaks": "0fb375fb9b93b7d822debc6a734052337ccfdb1f", - "cmt_msg": "net/packet: fix slab-out-of-bounds access in packet_recvmsg()", + "CVE-2022-25375": { + "affected_versions": "v2.6.12-rc2 to v5.17-rc4", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "usb: gadget: rndis: check size of RNDIS_MSG_SET command", + "cvss2": { + "Access Complexity": "Low", + "Access Vector": "Local Access", + "Authentication": "None", + "Availability Impact": "None", + "Confidentiality Impact": "Partial", + "Integrity Impact": "None", + "raw": "AV:L/AC:L/Au:N/C:P/I:N/A:N", + "score": 2.1 + }, "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", - "Availability": "High", + "Availability": "None", "Confidentiality": "High", - "Integrity": "High", - "Privileges Required": "High", + "Integrity": "None", + "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", - "score": 6.7 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "score": 5.5 }, - "cwe": "Use After Free", - "fixes": "c700525fcc06b05adfea78039de02628af79e07a", - "last_affected_version": "5.16", + "cwe": "Exposure of Resource to Wrong Sphere", + "fixes": "38ea1eac7d88072bbffb630e2b3db83ca649b826", + "last_affected_version": "5.16.9", "last_modified": "2023-12-06", - "nvd_text": "In bdi_put and bdi_unregister of backing-dev.c, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-182815710References: Upstream kernel", + "nvd_text": "An issue was discovered in drivers/usb/gadget/function/rndis.c in the Linux kernel before 5.16.10. The RNDIS USB gadget lacks validation of the size of the RNDIS_MSG_SET command. Attackers can obtain sensitive information from kernel memory.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-20158", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-20158", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-20158", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-20158", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-20158", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-20158" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-25375", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-25375", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-25375", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-25375", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-25375", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-25375" } }, - "CVE-2022-20166": { - "affected_versions": "v2.6.12-rc2 to v5.10-rc1", - "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", - "cmt_msg": "drivers core: Use sysfs_emit and sysfs_emit_at for show(device *...) functions", + "CVE-2022-25636": { + "affected_versions": "v5.4-rc1 to v5.17-rc6", + "breaks": "be2861dc36d77ff3778979b9c3c79ada4affa131", + "cmt_msg": "netfilter: nf_tables_offload: incorrect flow offload action array size", "cvss2": { - "Access Complexity": "Low", + "Access Complexity": "Medium", "Access Vector": "Local Access", "Authentication": "None", - "Availability Impact": "Partial", - "Confidentiality Impact": "Partial", - "Integrity Impact": "Partial", - "raw": "AV:L/AC:L/Au:N/C:P/I:P/A:P", - "score": 4.6 + "Availability Impact": "Complete", + "Confidentiality Impact": "Complete", + "Integrity Impact": "Complete", + "raw": "AV:L/AC:M/Au:N/C:C/I:C/A:C", + "score": 6.9 }, "cvss3": { "Attack Complexity": "Low", @@ -74361,29 +80728,30 @@ "Availability": "High", "Confidentiality": "High", "Integrity": "High", - "Privileges Required": "High", + "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", - "score": 6.7 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 7.8 }, - "cwe": "Out-of-bounds Write", - "fixes": "aa838896d87af561a33ecefea1caa4c15a68bc47", + "cwe": "Improper Privilege Management", + "fixes": "b1a5983f56e371046dcf164f90bfaf704d2b89f6", + "last_affected_version": "5.16.11", "last_modified": "2023-12-06", - "nvd_text": "In various methods of kernel base drivers, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-182388481References: Upstream kernel", + "nvd_text": "net/netfilter/nf_dup_netdev.c in the Linux kernel 5.4 through 5.6.10 allows local users to gain privileges because of a heap out-of-bounds write. This is related to nf_tables_offload.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-20166", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-20166", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-20166", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-20166", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-20166", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-20166" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-25636", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-25636", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-25636", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-25636", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-25636", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-25636" } }, - "CVE-2022-20368": { - "affected_versions": "v2.6.14-rc3 to v5.17", - "breaks": "0fb375fb9b93b7d822debc6a734052337ccfdb1f", - "cmt_msg": "net/packet: fix slab-out-of-bounds access in packet_recvmsg()", + "CVE-2022-2585": { + "affected_versions": "v5.7-rc1 to v6.0-rc1", + "breaks": "55e8c8eb2c7b6bf30e99423ccfe7ca032f498f59", + "cmt_msg": "posix-cpu-timers: Cleanup CPU timers before freeing them during exec", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", @@ -74396,85 +80764,83 @@ "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "score": 7.8 }, - "cwe": "Unspecified", - "fixes": "c700525fcc06b05adfea78039de02628af79e07a", - "last_affected_version": "5.16", - "last_modified": "2023-12-06", - "nvd_text": "Product: AndroidVersions: Android kernelAndroid ID: A-224546354References: Upstream kernel", + "fixes": "e362359ace6f87c201531872486ff295df306d13", + "last_affected_version": "5.19.1", + "last_modified": "2024-02-02", + "nvd_text": "It was discovered that when exec'ing from a non-leader thread, armed POSIX CPU timers would be left on a list but freed, leading to a use-after-free.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-20368", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-20368", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-20368", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-20368", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-20368", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-20368" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-2585", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-2585", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-2585", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-2585", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-2585", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-2585" } }, - "CVE-2022-20369": { - "affected_versions": "v2.6.35-rc1 to v5.18-rc1", - "breaks": "7f98639def42a676998d734b381af6c0e64d7791", - "cmt_msg": "media: v4l2-mem2mem: Apply DST_QUEUE_OFF_BASE on MMAP buffers across ioctls", + "CVE-2022-2586": { + "affected_versions": "v3.16-rc1 to v6.0-rc1", + "breaks": "958bee14d0718ca7a5002c0f48a099d1d345812a", + "cmt_msg": "netfilter: nf_tables: do not allow SET_ID to refer to another table", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", "Confidentiality": "High", "Integrity": "High", - "Privileges Required": "High", + "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", - "score": 6.7 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 7.8 }, - "cwe": "Out-of-bounds Write", - "fixes": "8310ca94075e784bbb06593cd6c068ee6b6e4ca6", - "last_affected_version": "5.17.1", - "last_modified": "2023-12-06", - "nvd_text": "In v4l2_m2m_querybuf of v4l2-mem2mem.c, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-223375145References: Upstream kernel", + "fixes": "470ee20e069a6d05ae549f7d0ef2bdbcee6a81b2", + "last_affected_version": "5.19.1", + "last_modified": "2024-01-12", + "nvd_text": "It was discovered that a nft object or expression could reference a nft set on a different nft table, leading to a use-after-free once that table was deleted.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-20369", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-20369", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-20369", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-20369", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-20369", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-20369" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-2586", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-2586", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-2586", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-2586", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-2586", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-2586" } }, - "CVE-2022-20409": { - "affected_versions": "v5.10-rc1 to v5.12-rc1-dontuse", - "breaks": "5c3462cfd123b341c9d3c947c1a2bab373f1697f", - "cmt_msg": "io_uring: remove io_identity", + "CVE-2022-2588": { + "affected_versions": "v2.6.12-rc2 to v6.0-rc1", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "net_sched: cls_route: remove from list when handle is 0", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", "Confidentiality": "High", "Integrity": "High", - "Privileges Required": "High", + "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", - "score": 6.7 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 7.8 }, - "cwe": "Use After Free", - "fixes": "4379bf8bd70b5de6bba7d53015b0c36c57a634ee", - "last_modified": "2023-12-06", - "nvd_text": "In io_identity_cow of io_uring.c, there is a possible way to corrupt memory due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-238177383References: Upstream kernel", + "fixes": "9ad36309e2719a884f946678e0296be10f0bb4c1", + "last_affected_version": "5.19.1", + "last_modified": "2024-01-12", + "nvd_text": "It was discovered that the cls_route filter implementation in the Linux kernel would not remove an old filter from the hashtable before freeing it if its handle had the value 0.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-20409", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-20409", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-20409", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-20409", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-20409", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-20409" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-2588", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-2588", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-2588", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-2588", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-2588", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-2588" } }, - "CVE-2022-20421": { - "affected_versions": "v4.14-rc1 to v6.0-rc4", - "breaks": "a60b890f607dc6d7806afc0dc8666577faf40bb4", - "cmt_msg": "binder: fix UAF of ref->proc caused by race condition", + "CVE-2022-2590": { + "affected_versions": "v5.16-rc1 to v6.0-rc3", + "breaks": "9ae0f87d009ca6c4aab2882641ddfc319727e3db", + "cmt_msg": "mm/gup: fix FOLL_FORCE COW security issue and remove FOLL_COW", "cvss3": { - "Attack Complexity": "Low", + "Attack Complexity": "High", "Attack Vector": "Local", "Availability": "High", "Confidentiality": "High", @@ -74482,27 +80848,27 @@ "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", - "score": 7.8 + "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 7.0 }, - "cwe": "Use After Free", - "fixes": "a0e44c64b6061dda7e00b7c458e4523e2331b739", - "last_affected_version": "5.19.7", + "cwe": "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')", + "fixes": "5535be3099717646781ce1540cf725965d680e7b", + "last_affected_version": "5.19.5", "last_modified": "2023-12-06", - "nvd_text": "In binder_inc_ref_for_node of binder.c, there is a possible way to corrupt memory due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-239630375References: Upstream kernel", + "nvd_text": "A race condition was found in the way the Linux kernel's memory subsystem handled the copy-on-write (COW) breakage of private read-only shared memory mappings. This flaw allows an unprivileged, local user to gain write access to read-only memory mappings, increasing their privileges on the system.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-20421", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-20421", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-20421", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-20421", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-20421", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-20421" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-2590", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-2590", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-2590", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-2590", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-2590", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-2590" } }, - "CVE-2022-20422": { - "affected_versions": "v3.19-rc1 to v6.0-rc1", - "breaks": "587064b610c703f259317d00dc37bf6d40f4fc74", - "cmt_msg": "arm64: fix oops in concurrently setting insn_emulation sysctls", + "CVE-2022-2602": { + "affected_versions": "v5.1-rc1 to v6.1-rc1", + "breaks": "6b06314c47e141031be043539900d80d2c7ba10f", + "cmt_msg": "io_uring/af_unix: defer registered files gc to io_uring release", "cvss3": { "Attack Complexity": "High", "Attack Vector": "Local", @@ -74515,147 +80881,133 @@ "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "score": 7.0 }, - "cwe": "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')", - "fixes": "af483947d472eccb79e42059276c4deed76f99a6", - "last_affected_version": "5.19.1", - "last_modified": "2023-12-06", - "nvd_text": "In emulation_proc_handler of armv8_deprecated.c, there is a possible way to corrupt memory due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-237540956References: Upstream kernel", + "fixes": "0091bfc81741b8d3aeb3b7ab8636f911b2de6e80", + "last_affected_version": "6.0.2", + "last_modified": "2024-01-12", + "nvd_text": "io_uring UAF, Unix SCM garbage collection", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-20422", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-20422", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-20422", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-20422", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-20422", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-20422" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-2602", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-2602", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-2602", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-2602", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-2602", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-2602" } }, - "CVE-2022-20423": { - "affected_versions": "v5.17-rc4 to v5.17", - "breaks": "38ea1eac7d88072bbffb630e2b3db83ca649b826", - "cmt_msg": "usb: gadget: rndis: prevent integer overflow in rndis_set_response()", + "CVE-2022-26365": { + "affected_versions": "v2.6.12-rc2 to v5.19-rc6", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "xen/blkfront: fix leaking data in shared pages", + "cvss2": { + "Access Complexity": "Low", + "Access Vector": "Local Access", + "Authentication": "None", + "Availability Impact": "Partial", + "Confidentiality Impact": "Partial", + "Integrity Impact": "None", + "raw": "AV:L/AC:L/Au:N/C:P/I:N/A:P", + "score": 3.6 + }, "cvss3": { "Attack Complexity": "Low", - "Attack Vector": "Physical", - "Availability": "None", + "Attack Vector": "Local", + "Availability": "High", "Confidentiality": "High", "Integrity": "None", - "Privileges Required": "None", + "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", - "score": 4.6 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", + "score": 7.1 }, - "cwe": "Integer Overflow or Wraparound", - "fixes": "65f3324f4b6fed78b8761c3b74615ecf0ffa81fa", - "last_affected_version": "5.16", - "last_modified": "2023-12-06", - "nvd_text": "In rndis_set_response of rndis.c, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege if a malicious USB device is attached with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-239842288References: Upstream kernel", - "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-20423", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-20423", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-20423", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-20423", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-20423", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-20423" - } - }, - "CVE-2022-20424": { - "affected_versions": "unk to v5.12-rc1-dontuse", - "breaks": "", - "cmt_msg": "io_uring: remove io_identity", - "fixes": "4379bf8bd70b5de6bba7d53015b0c36c57a634ee", + "cwe": "Exposure of Sensitive Information to an Unauthorized Actor", + "fixes": "2f446ffe9d737e9a844b97887919c4fda18246e7", + "last_affected_version": "5.18.9", "last_modified": "2023-12-06", - "nvd_text": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.", - "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-20424", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-20424", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-20424", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-20424", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-20424", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-20424" - }, - "rejected": true - }, - "CVE-2022-20565": { - "affected_versions": "v2.6.12-rc2 to v5.9-rc4", - "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", - "cmt_msg": "HID: core: Correctly handle ReportSize being zero", - "fixes": "bce1305c0ece3dc549663605e567655dd701752c", - "last_affected_version": "5.8.6", - "last_modified": "2022-12-08", + "nvd_text": "Linux disk/nic frontends data leaks T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Linux Block and Network PV device frontends don't zero memory regions before sharing them with the backend (CVE-2022-26365, CVE-2022-33740). Additionally the granularity of the grant table doesn't allow sharing less than a 4K page, leading to unrelated data residing in the same 4K page as data shared with a backend being accessible by such backend (CVE-2022-33741, CVE-2022-33742).", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-20565", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-20565", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-20565", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-20565", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-20565", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-20565" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-26365", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-26365", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-26365", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-26365", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-26365", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-26365" } }, - "CVE-2022-20566": { - "affected_versions": "v2.6.12-rc2 to v5.19", + "CVE-2022-26373": { + "affected_versions": "v2.6.12-rc2 to v6.0-rc1", "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", - "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free caused by l2cap_chan_put", + "cmt_msg": "x86/speculation: Add RSB VM Exit protections", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", - "Availability": "High", + "Availability": "None", "Confidentiality": "High", - "Integrity": "High", + "Integrity": "None", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", - "score": 7.8 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "score": 5.5 }, - "cwe": "Use After Free", - "fixes": "d0be8347c623e0ac4202a1d4e0373882821f56b0", - "last_affected_version": "5.18.15", + "cwe": "Unspecified", + "fixes": "2b1299322016731d56807aa49254a5ea3080b6b3", + "last_affected_version": "5.19.0", "last_modified": "2023-12-06", - "nvd_text": "In l2cap_chan_put of l2cap_core, there is a possible use after free due to improper locking. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-165329981References: Upstream kernel", + "nvd_text": "Non-transparent sharing of return predictor targets between contexts in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-20566", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-20566", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-20566", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-20566", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-20566", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-20566" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-26373", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-26373", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-26373", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-26373", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-26373", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-26373" } }, - "CVE-2022-20567": { - "affected_versions": "v4.15-rc1 to v4.16-rc5", - "breaks": "ee40fb2e1eb5bc0ddd3f2f83c6e39a454ef5a741", - "cmt_msg": "l2tp: fix race in pppol2tp_release with session object destroy", + "CVE-2022-2639": { + "affected_versions": "v5.1-rc4 to v5.18-rc4", + "breaks": "f28cd2af22a0c134e4aa1c64a70f70d815d473fb", + "cmt_msg": "openvswitch: fix OOB access in reserve_sfa_size()", "cvss3": { - "Attack Complexity": "High", + "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", "Confidentiality": "High", "Integrity": "High", - "Privileges Required": "High", + "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", - "score": 6.4 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 7.8 }, - "cwe": "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')", - "fixes": "d02ba2a6110c530a32926af8ad441111774d2893", - "last_affected_version": "4.15.7", + "cwe": "Out-of-bounds Write", + "fixes": "cefa91b2332d7009bc0be5d951d6cbbf349f90f8", + "last_affected_version": "5.17.4", "last_modified": "2023-12-06", - "nvd_text": "In pppol2tp_create of l2tp_ppp.c, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-186777253References: Upstream kernel", + "nvd_text": "An integer coercion error was found in the openvswitch kernel module. Given a sufficiently large number of actions, while copying and reserving memory for a new action of a new flow, the reserve_sfa_size() function does not return -EMSGSIZE as expected, potentially leading to an out-of-bounds write access. This flaw allows a local user to crash or potentially escalate their privileges on the system.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-20567", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-20567", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-20567", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-20567", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-20567", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-20567" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-2639", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-2639", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-2639", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-2639", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-2639", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-2639" } }, - "CVE-2022-20568": { - "affected_versions": "v5.7-rc4 to v5.12-rc1-dontuse", - "breaks": "5b0bbee4732cbd58aa98213d4c11a366356bba3d", - "cmt_msg": "Merge tag 'io_uring-worker.v3-2021-02-25' of git://git.kernel.dk/linux-block", + "CVE-2022-26490": { + "affected_versions": "v4.0-rc1 to v5.17-rc1", + "breaks": "26fc6c7f02cb26c39c4733de3dbc3c0646fc1074", + "cmt_msg": "nfc: st21nfca: Fix potential buffer overflows in EVT_TRANSACTION", + "cvss2": { + "Access Complexity": "Low", + "Access Vector": "Local Access", + "Authentication": "None", + "Availability Impact": "Partial", + "Confidentiality Impact": "Partial", + "Integrity Impact": "Partial", + "raw": "AV:L/AC:L/Au:N/C:P/I:P/A:P", + "score": 4.6 + }, "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", @@ -74668,53 +81020,53 @@ "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "score": 7.8 }, - "cwe": "Use After Free", - "fixes": "5695e51619745d4fe3ec2506a2f0cd982c5e27a4", + "cwe": "Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')", + "fixes": "4fbcc1a4cb20fe26ad0225679c536c80f1648221", + "last_affected_version": "5.16.17", "last_modified": "2023-12-06", - "nvd_text": "In (TBD) of (TBD), there is a possible way to corrupt kernel memory due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-220738351References: Upstream kernel", + "nvd_text": "st21nfca_connectivity_event_received in drivers/nfc/st21nfca/se.c in the Linux kernel through 5.16.12 has EVT_TRANSACTION buffer overflows because of untrusted length parameters.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-20568", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-20568", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-20568", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-20568", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-20568", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-20568" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-26490", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-26490", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-26490", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-26490", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-26490", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-26490" } }, - "CVE-2022-20572": { - "affected_versions": "v3.4-rc1 to v5.19-rc1", - "breaks": "a4ffc152198efba2ed9e6eac0eb97f17bfebce85", - "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag", + "CVE-2022-2663": { + "affected_versions": "v2.6.20-rc1 to v6.0-rc5", + "breaks": "869f37d8e48f3911eb70f38a994feaa8f8380008", + "cmt_msg": "netfilter: nf_conntrack_irc: Fix forged IP logic", "cvss3": { "Attack Complexity": "Low", - "Attack Vector": "Local", - "Availability": "High", - "Confidentiality": "High", - "Integrity": "High", - "Privileges Required": "High", + "Attack Vector": "Network", + "Availability": "None", + "Confidentiality": "None", + "Integrity": "Low", + "Privileges Required": "None", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", - "score": 6.7 + "raw": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "score": 5.3 }, - "cwe": "Incorrect Authorization", - "fixes": "4caae58406f8ceb741603eee460d79bacca9b1b5", - "last_affected_version": "5.18.1", + "cwe": "Improper Restriction of Communication Channel to Intended Endpoints", + "fixes": "0efe125cfb99e6773a7434f3463f7c2fa28f3a43", + "last_affected_version": "5.19.8", "last_modified": "2023-12-06", - "nvd_text": "In verity_target of dm-verity-target.c, there is a possible way to modify read-only files due to a missing permission check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-234475629References: Upstream kernel", + "nvd_text": "An issue was found in the Linux kernel in nf_conntrack_irc where the message handling can be confused and incorrectly matches the message. A firewall may be able to be bypassed when users are using unencrypted IRC with nf_conntrack_irc configured.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-20572", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-20572", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-20572", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-20572", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-20572", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-20572" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-2663", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-2663", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-2663", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-2663", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-2663", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-2663" } }, - "CVE-2022-2078": { - "affected_versions": "v5.6-rc1 to v5.19-rc1", - "breaks": "f3a2181e16f1dcbf5446ed43f6b5d9f56c459f85", - "cmt_msg": "netfilter: nf_tables: sanitize nft_set_desc_concat_parse()", + "CVE-2022-26878": { + "affected_versions": "v5.13-rc1 to unk", + "breaks": "afd2daa26c7abd734d78bd274fc6c59a15e61063", "cvss2": { "Access Complexity": "Low", "Access Vector": "Local Access", @@ -74737,24 +81089,23 @@ "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "score": 5.5 }, - "cwe": "Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')", - "fixes": "fecf31ee395b0295f2d7260aa29946b7605f7c85", - "last_affected_version": "5.18.1", + "cwe": "Missing Release of Resource after Effective Lifetime", + "fixes": "ad7cb5f6fa5f7ea37208c98a9457dd98025a89ca", "last_modified": "2023-12-06", - "nvd_text": "A vulnerability was found in the Linux kernel's nft_set_desc_concat_parse() function .This flaw allows an attacker to trigger a buffer overflow via nft_set_desc_concat_parse() , causing a denial of service and possibly to run code.", + "nvd_text": "drivers/bluetooth/virtio_bt.c in the Linux kernel before 5.16.3 has a memory leak (socket buffers have memory allocated but not freed).", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-2078", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-2078", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-2078", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-2078", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-2078", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-2078" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-26878", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-26878", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-26878", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-26878", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-26878", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-26878" } }, - "CVE-2022-21123": { - "affected_versions": "v2.6.12-rc2 to v5.19-rc3", - "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", - "cmt_msg": "x86/speculation/mmio: Add mitigation for Processor MMIO Stale Data", + "CVE-2022-26966": { + "affected_versions": "v3.12-rc1 to v5.17-rc6", + "breaks": "c9b37458e95629b1d1171457afdcc1bf1eb7881d", + "cmt_msg": "sr9700: sanity check for packet length", "cvss2": { "Access Complexity": "Low", "Access Vector": "Local Access", @@ -74777,34 +81128,134 @@ "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "score": 5.5 }, - "cwe": "Incomplete Cleanup", - "fixes": "8cb861e9e3c9a55099ad3d08e1a3b653d29c33ca", - "last_affected_version": "5.18.4", + "cwe": "Unspecified", + "fixes": "e9da0b56fe27206b49f39805f7dcda8a89379062", + "last_affected_version": "5.16.11", "last_modified": "2023-12-06", - "nvd_text": "Incomplete cleanup of multi-core shared buffers for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", + "nvd_text": "An issue was discovered in the Linux kernel before 5.16.12. drivers/net/usb/sr9700.c allows attackers to obtain sensitive information from heap memory via crafted frame lengths from a device.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-21123", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-21123", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-21123", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-21123", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-21123", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-21123" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-26966", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-26966", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-26966", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-26966", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-26966", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-26966" } }, - "CVE-2022-21125": { - "affected_versions": "v2.6.12-rc2 to v5.19-rc3", - "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", - "cmt_msg": "x86/speculation/mmio: Reuse SRBDS mitigation for SBDS", + "CVE-2022-27223": { + "affected_versions": "v3.18-rc1 to v5.17-rc6", + "breaks": "1f7c51660034091dc134fcc534b7f1fa86a6e823", + "cmt_msg": "USB: gadget: validate endpoint index for xilinx udc", + "cvss2": { + "Access Complexity": "Low", + "Access Vector": "Network Accessible", + "Authentication": "Single", + "Availability Impact": "Partial", + "Confidentiality Impact": "Partial", + "Integrity Impact": "Partial", + "raw": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "score": 6.5 + }, + "cvss3": { + "Attack Complexity": "Low", + "Attack Vector": "Network", + "Availability": "High", + "Confidentiality": "High", + "Integrity": "High", + "Privileges Required": "Low", + "Scope": "Unchanged", + "User Interaction": "None", + "raw": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 8.8 + }, + "cwe": "Improper Validation of Array Index", + "fixes": "7f14c7227f342d9932f9b918893c8814f86d2a0d", + "last_affected_version": "5.16.11", + "last_modified": "2023-12-06", + "nvd_text": "In drivers/usb/gadget/udc/udc-xilinx.c in the Linux kernel before 5.16.12, the endpoint index is not validated and might be manipulated by the host for out-of-array access.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-27223", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-27223", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-27223", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-27223", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-27223", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-27223" + } + }, + "CVE-2022-27666": { + "affected_versions": "v4.11-rc1 to v5.17-rc8", + "breaks": "cac2661c53f35cbe651bef9b07026a5a05ab8ce0", + "cmt_msg": "esp: Fix possible buffer overflow in ESP transformation", "cvss2": { "Access Complexity": "Low", "Access Vector": "Local Access", "Authentication": "None", - "Availability Impact": "None", + "Availability Impact": "Partial", "Confidentiality Impact": "Partial", - "Integrity Impact": "None", - "raw": "AV:L/AC:L/Au:N/C:P/I:N/A:N", - "score": 2.1 + "Integrity Impact": "Partial", + "raw": "AV:L/AC:L/Au:N/C:P/I:P/A:P", + "score": 4.6 + }, + "cvss3": { + "Attack Complexity": "Low", + "Attack Vector": "Local", + "Availability": "High", + "Confidentiality": "High", + "Integrity": "High", + "Privileges Required": "Low", + "Scope": "Unchanged", + "User Interaction": "None", + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 7.8 + }, + "cwe": "Out-of-bounds Write", + "fixes": "ebe48d368e97d007bfeb76fcb065d6cfc4c96645", + "last_affected_version": "5.16.14", + "last_modified": "2023-12-06", + "nvd_text": "A heap buffer overflow flaw was found in IPsec ESP transformation code in net/ipv4/esp4.c and net/ipv6/esp6.c. This flaw allows a local attacker with a normal user privilege to overwrite kernel heap objects and may cause a local privilege escalation threat.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-27666", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-27666", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-27666", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-27666", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-27666", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-27666" + } + }, + "CVE-2022-27672": { + "affected_versions": "v2.6.12-rc2 to v6.2", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "x86/speculation: Identify processors vulnerable to SMT RSB predictions", + "cvss3": { + "Attack Complexity": "High", + "Attack Vector": "Local", + "Availability": "None", + "Confidentiality": "High", + "Integrity": "None", + "Privileges Required": "Low", + "Scope": "Unchanged", + "User Interaction": "None", + "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", + "score": 4.7 }, + "cwe": "Unspecified", + "fixes": "be8de49bea505e7777a69ef63d60e02ac1712683", + "last_affected_version": "6.1", + "last_modified": "2023-12-06", + "nvd_text": "\nWhen SMT is enabled, certain AMD processors may speculatively execute instructions using a target\nfrom the sibling thread after an SMT mode switch potentially resulting in information disclosure.\n\n\n", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-27672", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-27672", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-27672", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-27672", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-27672", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-27672" + } + }, + "CVE-2022-2785": { + "affected_versions": "v5.18-rc1 to v6.0-rc1", + "breaks": "b1d18a7574d0df5eb4117c14742baf8bc2b9bb74", + "cmt_msg": "bpf: Disallow bpf programs call prog_run command.", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", @@ -74817,150 +81268,154 @@ "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "score": 5.5 }, - "cwe": "Incomplete Cleanup", - "fixes": "a992b8a4682f119ae035a01b40d4d0665c4a2875", - "last_affected_version": "5.18.4", + "cwe": "Out-of-bounds Read", + "fixes": "86f44fcec22ce2979507742bc53db8400e454f46", + "last_affected_version": "5.19.3", "last_modified": "2023-12-06", - "nvd_text": "Incomplete cleanup of microarchitectural fill buffers on some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", + "nvd_text": "There exists an arbitrary memory read within the Linux Kernel BPF - Constants provided to fill pointers in structs passed in to bpf_sys_bpf are not verified and can point anywhere, including memory not owned by BPF. An attacker with CAP_BPF can arbitrarily read memory from anywhere on the system. We recommend upgrading past commit 86f44fcec22c", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-21125", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-21125", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-21125", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-21125", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-21125", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-21125" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-2785", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-2785", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-2785", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-2785", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-2785", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-2785" } }, - "CVE-2022-21166": { - "affected_versions": "v2.6.12-rc2 to v5.19-rc3", - "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", - "cmt_msg": "x86/speculation/mmio: Enable CPU Fill buffer clearing on idle", + "CVE-2022-27950": { + "affected_versions": "v5.15-rc1 to v5.17-rc5", + "breaks": "fbf42729d0e91332e8ce75a1ecce08b8a2dab9c1", + "cmt_msg": "HID: elo: fix memory leak in elo_probe", "cvss2": { "Access Complexity": "Low", "Access Vector": "Local Access", "Authentication": "None", - "Availability Impact": "None", - "Confidentiality Impact": "Partial", + "Availability Impact": "Partial", + "Confidentiality Impact": "None", "Integrity Impact": "None", - "raw": "AV:L/AC:L/Au:N/C:P/I:N/A:N", + "raw": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "score": 2.1 }, "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", - "Availability": "None", - "Confidentiality": "High", + "Availability": "High", + "Confidentiality": "None", "Integrity": "None", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "score": 5.5 }, - "cwe": "Incomplete Cleanup", - "fixes": "99a83db5a605137424e1efe29dc0573d6a5b6316", - "last_affected_version": "5.18.4", + "cwe": "Missing Release of Memory after Effective Lifetime", + "fixes": "817b8b9c5396d2b2d92311b46719aad5d3339dbe", + "last_affected_version": "5.16.10", "last_modified": "2023-12-06", - "nvd_text": "Incomplete cleanup in specific special register write operations for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", + "nvd_text": "In drivers/hid/hid-elo.c in the Linux kernel before 5.16.11, a memory leak exists for a certain hid_parse error condition.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-21166", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-21166", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-21166", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-21166", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-21166", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-21166" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-27950", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-27950", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-27950", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-27950", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-27950", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-27950" } }, - "CVE-2022-21385": { - "affected_versions": "v2.6.12-rc2 to v4.20", + "CVE-2022-28356": { + "affected_versions": "v2.6.12-rc2 to v5.18-rc1", "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", - "cmt_msg": "net/rds: fix warn in rds_message_alloc_sgs", + "cmt_msg": "llc: fix netdevice reference leaks in llc_ui_bind()", + "cvss2": { + "Access Complexity": "Low", + "Access Vector": "Local Access", + "Authentication": "None", + "Availability Impact": "Partial", + "Confidentiality Impact": "None", + "Integrity Impact": "None", + "raw": "AV:L/AC:L/Au:N/C:N/I:N/A:P", + "score": 2.1 + }, "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", "Confidentiality": "None", "Integrity": "None", - "Privileges Required": "None", + "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", - "score": 6.2 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "score": 5.5 }, "cwe": "Unspecified", - "fixes": "ea010070d0a7497253d5a6f919f6dd107450b31a", - "last_affected_version": "4.19", + "fixes": "764f4eb6846f5475f1244767d24d25dd86528a4a", + "last_affected_version": "5.17.0", "last_modified": "2023-12-06", - "nvd_text": "A flaw in net_rds_alloc_sgs() in Oracle Linux kernels allows unprivileged local users to crash the machine. CVSS 3.1 Base Score 6.2 (Availability impacts). CVSS Vector (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)", + "nvd_text": "In the Linux kernel before 5.17.1, a refcount leak bug was found in net/llc/af_llc.c.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-21385", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-21385", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-21385", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-21385", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-21385", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-21385" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-28356", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-28356", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-28356", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-28356", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-28356", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-28356" } }, - "CVE-2022-21499": { - "affected_versions": "v2.6.12-rc2 to v5.19-rc1", - "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", - "cmt_msg": "lockdown: also lock down previous kgdb use", + "CVE-2022-28388": { + "affected_versions": "v3.9-rc1 to v5.18-rc1", + "breaks": "0024d8ad1639e32d717445c69ca813fd19c2a91c", + "cmt_msg": "can: usb_8dev: usb_8dev_start_xmit(): fix double dev_kfree_skb() in error path", "cvss2": { "Access Complexity": "Low", "Access Vector": "Local Access", "Authentication": "None", "Availability Impact": "Partial", - "Confidentiality Impact": "Partial", - "Integrity Impact": "Partial", - "raw": "AV:L/AC:L/Au:N/C:P/I:P/A:P", - "score": 4.6 + "Confidentiality Impact": "None", + "Integrity Impact": "None", + "raw": "AV:L/AC:L/Au:N/C:N/I:N/A:P", + "score": 2.1 }, "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", - "Confidentiality": "High", - "Integrity": "High", - "Privileges Required": "High", + "Confidentiality": "None", + "Integrity": "None", + "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", - "score": 6.7 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "score": 5.5 }, - "cwe": "Out-of-bounds Write", - "fixes": "eadb2f47a3ced5c64b23b90fd2a3463f63726066", - "last_affected_version": "5.18.0", + "cwe": "Double Free", + "fixes": "3d3925ff6433f98992685a9679613a2cc97f3ce2", + "last_affected_version": "5.17.1", "last_modified": "2023-12-06", - "nvd_text": "KGDB and KDB allow read and write access to kernel memory, and thus should be restricted during lockdown. An attacker with access to a serial port could trigger the debugger so it is important that the debugger respect the lockdown mode when/if it is triggered. CVSS 3.1 Base Score 6.7 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H).", - "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-21499", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-21499", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-21499", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-21499", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-21499", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-21499" - } - }, - "CVE-2022-21505": { - "affected_versions": "v5.4-rc1 to v5.19-rc8", - "breaks": "29d3c1c8dfe752c01b7115ecd5a3142b232a38e1", - "cmt_msg": "lockdown: Fix kexec lockdown bypass with ima policy", - "fixes": "543ce63b664e2c2f9533d089a4664b559c3e6b5b", - "last_affected_version": "5.18.14", - "last_modified": "2022-08-04", + "nvd_text": "usb_8dev_start_xmit in drivers/net/can/usb/usb_8dev.c in the Linux kernel through 5.17.1 has a double free.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-21505", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-21505", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-21505", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-21505", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-21505", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-21505" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-28388", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-28388", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-28388", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-28388", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-28388", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-28388" } }, - "CVE-2022-2153": { - "affected_versions": "v3.7-rc1 to v5.18-rc1", - "breaks": "1e08ec4a130e2745d96df169e67c58df98a07311", - "cmt_msg": "KVM: x86: Avoid theoretical NULL pointer dereference in kvm_irq_delivery_to_apic_fast()", + "CVE-2022-28389": { + "affected_versions": "v4.12-rc1 to v5.18-rc1", + "breaks": "51f3baad7de943780ce0c17bd7975df567dd6e14", + "cmt_msg": "can: mcba_usb: mcba_usb_start_xmit(): fix double dev_kfree_skb in error path", + "cvss2": { + "Access Complexity": "Low", + "Access Vector": "Local Access", + "Authentication": "None", + "Availability Impact": "Partial", + "Confidentiality Impact": "None", + "Integrity Impact": "None", + "raw": "AV:L/AC:L/Au:N/C:N/I:N/A:P", + "score": 2.1 + }, "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", @@ -74973,24 +81428,34 @@ "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "score": 5.5 }, - "cwe": "NULL Pointer Dereference", - "fixes": "00b5f37189d24ac3ed46cb7f11742094778c46ce", + "cwe": "Double Free", + "fixes": "04c9b00ba83594a29813d6b1fb8fdc93a3915174", "last_affected_version": "5.17.1", "last_modified": "2023-12-06", - "nvd_text": "A flaw was found in the Linux kernel\u2019s KVM when attempting to set a SynIC IRQ. This issue makes it possible for a misbehaving VMM to write to SYNIC/STIMER MSRs, causing a NULL pointer dereference. This flaw allows an unprivileged local attacker on the host to issue specific ioctl calls, causing a kernel oops condition that results in a denial of service.", + "nvd_text": "mcba_usb_start_xmit in drivers/net/can/usb/mcba_usb.c in the Linux kernel through 5.17.1 has a double free.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-2153", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-2153", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-2153", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-2153", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-2153", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-2153" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-28389", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-28389", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-28389", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-28389", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-28389", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-28389" } }, - "CVE-2022-2196": { - "affected_versions": "v5.8-rc1 to v6.2-rc1", - "breaks": "5c911beff20aa8639e7a1f28988736c13e03ed54", - "cmt_msg": "KVM: VMX: Execute IBPB on emulated VM-exit when guest has IBRS", + "CVE-2022-28390": { + "affected_versions": "v2.6.32-rc1 to v5.18-rc1", + "breaks": "702171adeed3607ee9603ec30ce081411e36ae42", + "cmt_msg": "can: ems_usb: ems_usb_start_xmit(): fix double dev_kfree_skb() in error path", + "cvss2": { + "Access Complexity": "Low", + "Access Vector": "Local Access", + "Authentication": "None", + "Availability Impact": "Partial", + "Confidentiality Impact": "Partial", + "Integrity Impact": "Partial", + "raw": "AV:L/AC:L/Au:N/C:P/I:P/A:P", + "score": 4.6 + }, "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", @@ -74998,83 +81463,68 @@ "Confidentiality": "High", "Integrity": "High", "Privileges Required": "Low", - "Scope": "Changed", + "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", - "score": 8.8 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 7.8 }, - "cwe": "Insecure Default Initialization of Resource", - "fixes": "2e7eab81425ad6c875f2ed47c0ce01e78afc38a5", - "last_affected_version": "6.1.13", - "last_modified": "2023-12-06", - "nvd_text": "A regression exists in the Linux Kernel within KVM: nVMX that allowed for speculative execution attacks.\u00a0L2 can carry out Spectre v2 attacks on L1 due to L1 thinking it doesn't need retpolines or IBPB\u00a0after running L2 due to KVM (L0) advertising eIBRS support to L1. An attacker at L2 with code execution can execute code on an indirect branch on the host machine. We recommend upgrading to Kernel 6.2 or past commit\u00a02e7eab81425a\n", - "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-2196", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-2196", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-2196", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-2196", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-2196", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-2196" - } - }, - "CVE-2022-2209": { - "affected_versions": "unk to unk", - "breaks": "", - "fixes": "", + "cwe": "Double Free", + "fixes": "c70222752228a62135cee3409dccefd494a24646", + "last_affected_version": "5.17.1", "last_modified": "2023-12-06", - "nvd_text": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. Reason: This CVE has been rejected as it was incorrectly assigned. All references and descriptions in this candidate have been removed to prevent accidental usage", + "nvd_text": "ems_usb_start_xmit in drivers/net/can/usb/ems_usb.c in the Linux kernel through 5.17.1 has a double free.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-2209", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-2209", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-2209", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-2209", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-2209", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-2209" - }, - "rejected": true - }, - "CVE-2022-22942": { - "affected_versions": "v4.14-rc1 to v5.17-rc2", - "breaks": "c906965dee22d5e95d0651759ba107b420212a9f", - "cmt_msg": "drm/vmwgfx: Fix stale file descriptors on failed usercopy", + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-28390", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-28390", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-28390", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-28390", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-28390", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-28390" + } + }, + "CVE-2022-2873": { + "affected_versions": "v5.11-rc1 to v5.19-rc1", + "breaks": "5e9a97b1f4491b8b65874901ad084348fcaba327", + "cmt_msg": "i2c: ismt: prevent memory corruption in ismt_access()", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", - "Confidentiality": "High", - "Integrity": "High", + "Confidentiality": "None", + "Integrity": "None", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", - "score": 7.8 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "score": 5.5 }, - "fixes": "a0f90c8815706981c483a652a6aefca51a5e191c", - "last_affected_version": "5.16.3", - "last_modified": "2023-12-27", - "nvd_text": "The vmwgfx driver contains a local privilege escalation vulnerability that allows unprivileged users to gain access to files opened by other processes on the system through a dangling 'file' pointer.", + "cwe": "Incorrect Calculation of Buffer Size", + "fixes": "690b2549b19563ec5ad53e5c82f6a944d910086e", + "last_affected_version": "5.18.1", + "last_modified": "2023-12-06", + "nvd_text": "An out-of-bounds memory access flaw was found in the Linux kernel Intel\u2019s iSMT SMBus host controller driver in the way a user triggers the I2C_SMBUS_BLOCK_DATA (with the ioctl I2C_SMBUS) with malicious input data. This flaw allows a local user to crash the system.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-22942", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-22942", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-22942", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-22942", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-22942", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-22942" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-2873", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-2873", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-2873", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-2873", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-2873", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-2873" } }, - "CVE-2022-23036": { - "affected_versions": "v2.6.12-rc2 to v5.17-rc8", - "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", - "cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()", + "CVE-2022-28796": { + "affected_versions": "v5.17-rc3 to v5.18-rc1", + "breaks": "4f98186848707f530669238d90e0562d92a78aab", + "cmt_msg": "jbd2: fix use-after-free of transaction_t race", "cvss2": { "Access Complexity": "Medium", "Access Vector": "Local Access", "Authentication": "None", - "Availability Impact": "Partial", - "Confidentiality Impact": "Partial", - "Integrity Impact": "Partial", - "raw": "AV:L/AC:M/Au:N/C:P/I:P/A:P", - "score": 4.4 + "Availability Impact": "Complete", + "Confidentiality Impact": "Complete", + "Integrity Impact": "Complete", + "raw": "AV:L/AC:M/Au:N/C:C/I:C/A:C", + "score": 6.9 }, "cvss3": { "Attack Complexity": "High", @@ -75088,36 +81538,36 @@ "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "score": 7.0 }, - "cwe": "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')", - "fixes": "6b1775f26a2da2b05a6dc8ec2b5d14e9a4701a1a", - "last_affected_version": "5.16.13", + "cwe": "Use After Free", + "fixes": "cc16eecae687912238ee6efbff71ad31e2bc414e", + "last_affected_version": "5.17.0", "last_modified": "2023-12-06", - "nvd_text": "Linux PV device frontends vulnerable to attacks by backends T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Several Linux PV device frontends are using the grant table interfaces for removing access rights of the backends in ways being subject to race conditions, resulting in potential data leaks, data corruption by malicious backends, and denial of service triggered by malicious backends: blkfront, netfront, scsifront and the gntalloc driver are testing whether a grant reference is still in use. If this is not the case, they assume that a following removal of the granted access will always succeed, which is not true in case the backend has mapped the granted page between those two operations. As a result the backend can keep access to the memory page of the guest no matter how the page will be used after the frontend I/O has finished. The xenbus driver has a similar problem, as it doesn't check the success of removing the granted access of a shared ring buffer. blkfront: CVE-2022-23036 netfront: CVE-2022-23037 scsifront: CVE-2022-23038 gntalloc: CVE-2022-23039 xenbus: CVE-2022-23040 blkfront, netfront, scsifront, usbfront, dmabuf, xenbus, 9p, kbdfront, and pvcalls are using a functionality to delay freeing a grant reference until it is no longer in use, but the freeing of the related data page is not synchronized with dropping the granted access. As a result the backend can keep access to the memory page even after it has been freed and then re-used for a different purpose. CVE-2022-23041 netfront will fail a BUG_ON() assertion if it fails to revoke access in the rx path. This will result in a Denial of Service (DoS) situation of the guest which can be triggered by the backend. CVE-2022-23042", + "nvd_text": "jbd2_journal_wait_updates in fs/jbd2/transaction.c in the Linux kernel before 5.17.1 has a use-after-free caused by a transaction_t race condition.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-23036", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-23036", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-23036", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-23036", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-23036", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-23036" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-28796", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-28796", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-28796", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-28796", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-28796", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-28796" } }, - "CVE-2022-23037": { - "affected_versions": "v2.6.12-rc2 to v5.17-rc8", - "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", - "cmt_msg": "xen/netfront: don't use gnttab_query_foreign_access() for mapped status", + "CVE-2022-28893": { + "affected_versions": "v5.1-rc1 to v5.18-rc2", + "breaks": "a73881c96d73ee72b7dbbd38a6eeef66182a8ef7", + "cmt_msg": "SUNRPC: Ensure we flush any closed sockets before xs_xprt_free()", "cvss2": { - "Access Complexity": "Medium", + "Access Complexity": "Low", "Access Vector": "Local Access", "Authentication": "None", - "Availability Impact": "Partial", - "Confidentiality Impact": "Partial", - "Integrity Impact": "Partial", - "raw": "AV:L/AC:M/Au:N/C:P/I:P/A:P", - "score": 4.4 + "Availability Impact": "Complete", + "Confidentiality Impact": "Complete", + "Integrity Impact": "Complete", + "raw": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "score": 7.2 }, "cvss3": { - "Attack Complexity": "High", + "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", "Confidentiality": "High", @@ -75125,79 +81575,69 @@ "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", - "score": 7.0 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 7.8 }, - "cwe": "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')", - "fixes": "31185df7e2b1d2fa1de4900247a12d7b9c7087eb", - "last_affected_version": "5.16.13", + "cwe": "Use After Free", + "fixes": "f00432063db1a0db484e85193eccc6845435b80e", + "last_affected_version": "5.17.2", "last_modified": "2023-12-06", - "nvd_text": "Linux PV device frontends vulnerable to attacks by backends T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Several Linux PV device frontends are using the grant table interfaces for removing access rights of the backends in ways being subject to race conditions, resulting in potential data leaks, data corruption by malicious backends, and denial of service triggered by malicious backends: blkfront, netfront, scsifront and the gntalloc driver are testing whether a grant reference is still in use. If this is not the case, they assume that a following removal of the granted access will always succeed, which is not true in case the backend has mapped the granted page between those two operations. As a result the backend can keep access to the memory page of the guest no matter how the page will be used after the frontend I/O has finished. The xenbus driver has a similar problem, as it doesn't check the success of removing the granted access of a shared ring buffer. blkfront: CVE-2022-23036 netfront: CVE-2022-23037 scsifront: CVE-2022-23038 gntalloc: CVE-2022-23039 xenbus: CVE-2022-23040 blkfront, netfront, scsifront, usbfront, dmabuf, xenbus, 9p, kbdfront, and pvcalls are using a functionality to delay freeing a grant reference until it is no longer in use, but the freeing of the related data page is not synchronized with dropping the granted access. As a result the backend can keep access to the memory page even after it has been freed and then re-used for a different purpose. CVE-2022-23041 netfront will fail a BUG_ON() assertion if it fails to revoke access in the rx path. This will result in a Denial of Service (DoS) situation of the guest which can be triggered by the backend. CVE-2022-23042", + "nvd_text": "The SUNRPC subsystem in the Linux kernel through 5.17.2 can call xs_xprt_free before ensuring that sockets are in the intended state.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-23037", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-23037", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-23037", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-23037", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-23037", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-23037" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-28893", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-28893", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-28893", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-28893", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-28893", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-28893" } }, - "CVE-2022-23038": { - "affected_versions": "v2.6.12-rc2 to v5.17-rc8", - "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", - "cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()", - "cvss2": { - "Access Complexity": "Medium", - "Access Vector": "Local Access", - "Authentication": "None", - "Availability Impact": "Partial", - "Confidentiality Impact": "Partial", - "Integrity Impact": "Partial", - "raw": "AV:L/AC:M/Au:N/C:P/I:P/A:P", - "score": 4.4 - }, + "CVE-2022-2905": { + "affected_versions": "v5.5-rc1 to v6.0-rc4", + "breaks": "d2e4c1e6c2947269346054ac8937ccfe9e0bcc6b", + "cmt_msg": "bpf: Don't use tnum_range on array range checking for poke descriptors", "cvss3": { - "Attack Complexity": "High", + "Attack Complexity": "Low", "Attack Vector": "Local", - "Availability": "High", + "Availability": "None", "Confidentiality": "High", - "Integrity": "High", + "Integrity": "None", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", - "score": 7.0 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "score": 5.5 }, - "cwe": "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')", - "fixes": "6b1775f26a2da2b05a6dc8ec2b5d14e9a4701a1a", - "last_affected_version": "5.16.13", + "cwe": "Out-of-bounds Read", + "fixes": "a657182a5c5150cdfacb6640aad1d2712571a409", + "last_affected_version": "5.19.5", "last_modified": "2023-12-06", - "nvd_text": "Linux PV device frontends vulnerable to attacks by backends T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Several Linux PV device frontends are using the grant table interfaces for removing access rights of the backends in ways being subject to race conditions, resulting in potential data leaks, data corruption by malicious backends, and denial of service triggered by malicious backends: blkfront, netfront, scsifront and the gntalloc driver are testing whether a grant reference is still in use. If this is not the case, they assume that a following removal of the granted access will always succeed, which is not true in case the backend has mapped the granted page between those two operations. As a result the backend can keep access to the memory page of the guest no matter how the page will be used after the frontend I/O has finished. The xenbus driver has a similar problem, as it doesn't check the success of removing the granted access of a shared ring buffer. blkfront: CVE-2022-23036 netfront: CVE-2022-23037 scsifront: CVE-2022-23038 gntalloc: CVE-2022-23039 xenbus: CVE-2022-23040 blkfront, netfront, scsifront, usbfront, dmabuf, xenbus, 9p, kbdfront, and pvcalls are using a functionality to delay freeing a grant reference until it is no longer in use, but the freeing of the related data page is not synchronized with dropping the granted access. As a result the backend can keep access to the memory page even after it has been freed and then re-used for a different purpose. CVE-2022-23041 netfront will fail a BUG_ON() assertion if it fails to revoke access in the rx path. This will result in a Denial of Service (DoS) situation of the guest which can be triggered by the backend. CVE-2022-23042", + "nvd_text": "An out-of-bounds memory read flaw was found in the Linux kernel's BPF subsystem in how a user calls the bpf_tail_call function with a key larger than the max_entries of the map. This flaw allows a local user to gain unauthorized access to data.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-23038", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-23038", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-23038", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-23038", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-23038", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-23038" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-2905", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-2905", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-2905", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-2905", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-2905", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-2905" } }, - "CVE-2022-23039": { - "affected_versions": "v2.6.12-rc2 to v5.17-rc8", - "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", - "cmt_msg": "xen/gntalloc: don't use gnttab_query_foreign_access()", + "CVE-2022-29156": { + "affected_versions": "v5.12-rc1-dontuse to v5.17-rc6", + "breaks": "eab098246625e91c1cbd6e8f75b09e4c9c28a9fc", + "cmt_msg": "RDMA/rtrs-clt: Fix possible double free in error case", "cvss2": { - "Access Complexity": "Medium", + "Access Complexity": "Low", "Access Vector": "Local Access", "Authentication": "None", - "Availability Impact": "Partial", - "Confidentiality Impact": "Partial", - "Integrity Impact": "Partial", - "raw": "AV:L/AC:M/Au:N/C:P/I:P/A:P", - "score": 4.4 + "Availability Impact": "Complete", + "Confidentiality Impact": "Complete", + "Integrity Impact": "Complete", + "raw": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "score": 7.2 }, "cvss3": { - "Attack Complexity": "High", + "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", "Confidentiality": "High", @@ -75205,39 +81645,29 @@ "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", - "score": 7.0 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 7.8 }, - "cwe": "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')", - "fixes": "d3b6372c5881cb54925212abb62c521df8ba4809", - "last_affected_version": "5.16.13", + "cwe": "Double Free", + "fixes": "8700af2cc18c919b2a83e74e0479038fd113c15d", + "last_affected_version": "5.16.11", "last_modified": "2023-12-06", - "nvd_text": "Linux PV device frontends vulnerable to attacks by backends T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Several Linux PV device frontends are using the grant table interfaces for removing access rights of the backends in ways being subject to race conditions, resulting in potential data leaks, data corruption by malicious backends, and denial of service triggered by malicious backends: blkfront, netfront, scsifront and the gntalloc driver are testing whether a grant reference is still in use. If this is not the case, they assume that a following removal of the granted access will always succeed, which is not true in case the backend has mapped the granted page between those two operations. As a result the backend can keep access to the memory page of the guest no matter how the page will be used after the frontend I/O has finished. The xenbus driver has a similar problem, as it doesn't check the success of removing the granted access of a shared ring buffer. blkfront: CVE-2022-23036 netfront: CVE-2022-23037 scsifront: CVE-2022-23038 gntalloc: CVE-2022-23039 xenbus: CVE-2022-23040 blkfront, netfront, scsifront, usbfront, dmabuf, xenbus, 9p, kbdfront, and pvcalls are using a functionality to delay freeing a grant reference until it is no longer in use, but the freeing of the related data page is not synchronized with dropping the granted access. As a result the backend can keep access to the memory page even after it has been freed and then re-used for a different purpose. CVE-2022-23041 netfront will fail a BUG_ON() assertion if it fails to revoke access in the rx path. This will result in a Denial of Service (DoS) situation of the guest which can be triggered by the backend. CVE-2022-23042", + "nvd_text": "drivers/infiniband/ulp/rtrs/rtrs-clt.c in the Linux kernel before 5.16.12 has a double free related to rtrs_clt_dev_release.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-23039", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-23039", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-23039", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-23039", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-23039", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-23039" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-29156", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-29156", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-29156", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-29156", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-29156", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-29156" } }, - "CVE-2022-23040": { - "affected_versions": "v2.6.12-rc2 to v5.17-rc8", - "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", - "cmt_msg": "xen/xenbus: don't let xenbus_grant_ring() remove grants in error case", - "cvss2": { - "Access Complexity": "Medium", - "Access Vector": "Local Access", - "Authentication": "None", - "Availability Impact": "Partial", - "Confidentiality Impact": "Partial", - "Integrity Impact": "Partial", - "raw": "AV:L/AC:M/Au:N/C:P/I:P/A:P", - "score": 4.4 - }, + "CVE-2022-2938": { + "affected_versions": "v5.2-rc1 to v5.17-rc2", + "breaks": "0e94682b73bfa6c44c98af7a26771c9c08c055d5", + "cmt_msg": "psi: Fix uaf issue when psi trigger is destroyed while being polled", "cvss3": { - "Attack Complexity": "High", + "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", "Confidentiality": "High", @@ -75245,39 +81675,39 @@ "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", - "score": 7.0 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 7.8 }, - "cwe": "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')", - "fixes": "3777ea7bac3113005b7180e6b9dadf16d19a5827", - "last_affected_version": "5.16.13", + "cwe": "Use After Free", + "fixes": "a06247c6804f1a7c86a2e5398a4c1f1db1471848", + "last_affected_version": "5.16.4", "last_modified": "2023-12-06", - "nvd_text": "Linux PV device frontends vulnerable to attacks by backends T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Several Linux PV device frontends are using the grant table interfaces for removing access rights of the backends in ways being subject to race conditions, resulting in potential data leaks, data corruption by malicious backends, and denial of service triggered by malicious backends: blkfront, netfront, scsifront and the gntalloc driver are testing whether a grant reference is still in use. If this is not the case, they assume that a following removal of the granted access will always succeed, which is not true in case the backend has mapped the granted page between those two operations. As a result the backend can keep access to the memory page of the guest no matter how the page will be used after the frontend I/O has finished. The xenbus driver has a similar problem, as it doesn't check the success of removing the granted access of a shared ring buffer. blkfront: CVE-2022-23036 netfront: CVE-2022-23037 scsifront: CVE-2022-23038 gntalloc: CVE-2022-23039 xenbus: CVE-2022-23040 blkfront, netfront, scsifront, usbfront, dmabuf, xenbus, 9p, kbdfront, and pvcalls are using a functionality to delay freeing a grant reference until it is no longer in use, but the freeing of the related data page is not synchronized with dropping the granted access. As a result the backend can keep access to the memory page even after it has been freed and then re-used for a different purpose. CVE-2022-23041 netfront will fail a BUG_ON() assertion if it fails to revoke access in the rx path. This will result in a Denial of Service (DoS) situation of the guest which can be triggered by the backend. CVE-2022-23042", + "nvd_text": "A flaw was found in the Linux kernel's implementation of Pressure Stall Information. While the feature is disabled by default, it could allow an attacker to crash the system or have other memory-corruption side effects.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-23040", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-23040", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-23040", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-23040", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-23040", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-23040" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-2938", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-2938", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-2938", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-2938", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-2938", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-2938" } }, - "CVE-2022-23041": { - "affected_versions": "v4.12-rc1 to v5.17-rc8", - "breaks": "71ebd71921e451f0f942ddfe85d01e31ddc6eb88", - "cmt_msg": "xen/9p: use alloc/free_pages_exact()", + "CVE-2022-29581": { + "affected_versions": "v4.14 to v5.18-rc4", + "breaks": "35c55fc156d85a396a975fc17636f560fc02fd65", + "cmt_msg": "net/sched: cls_u32: fix netns refcount changes in u32_change()", "cvss2": { - "Access Complexity": "Medium", + "Access Complexity": "Low", "Access Vector": "Local Access", "Authentication": "None", - "Availability Impact": "Partial", - "Confidentiality Impact": "Partial", - "Integrity Impact": "Partial", - "raw": "AV:L/AC:M/Au:N/C:P/I:P/A:P", - "score": 4.4 + "Availability Impact": "Complete", + "Confidentiality Impact": "Complete", + "Integrity Impact": "Complete", + "raw": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "score": 7.2 }, "cvss3": { - "Attack Complexity": "High", + "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", "Confidentiality": "High", @@ -75285,36 +81715,36 @@ "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", - "score": 7.0 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 7.8 }, - "cwe": "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')", - "fixes": "5cadd4bb1d7fc9ab201ac14620d1a478357e4ebd", - "last_affected_version": "5.16.13", + "cwe": "Unspecified", + "fixes": "3db09e762dc79584a69c10d74a6b98f89a9979f8", + "last_affected_version": "5.17.4", "last_modified": "2023-12-06", - "nvd_text": "Linux PV device frontends vulnerable to attacks by backends T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Several Linux PV device frontends are using the grant table interfaces for removing access rights of the backends in ways being subject to race conditions, resulting in potential data leaks, data corruption by malicious backends, and denial of service triggered by malicious backends: blkfront, netfront, scsifront and the gntalloc driver are testing whether a grant reference is still in use. If this is not the case, they assume that a following removal of the granted access will always succeed, which is not true in case the backend has mapped the granted page between those two operations. As a result the backend can keep access to the memory page of the guest no matter how the page will be used after the frontend I/O has finished. The xenbus driver has a similar problem, as it doesn't check the success of removing the granted access of a shared ring buffer. blkfront: CVE-2022-23036 netfront: CVE-2022-23037 scsifront: CVE-2022-23038 gntalloc: CVE-2022-23039 xenbus: CVE-2022-23040 blkfront, netfront, scsifront, usbfront, dmabuf, xenbus, 9p, kbdfront, and pvcalls are using a functionality to delay freeing a grant reference until it is no longer in use, but the freeing of the related data page is not synchronized with dropping the granted access. As a result the backend can keep access to the memory page even after it has been freed and then re-used for a different purpose. CVE-2022-23041 netfront will fail a BUG_ON() assertion if it fails to revoke access in the rx path. This will result in a Denial of Service (DoS) situation of the guest which can be triggered by the backend. CVE-2022-23042", + "nvd_text": "Improper Update of Reference Count vulnerability in net/sched of Linux Kernel allows local attacker to cause privilege escalation to root. This issue affects: Linux Kernel versions prior to 5.18; version 4.14 and later versions.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-23041", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-23041", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-23041", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-23041", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-23041", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-23041" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-29581", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-29581", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-29581", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-29581", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-29581", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-29581" } }, - "CVE-2022-23042": { - "affected_versions": "v2.6.12-rc2 to v5.17-rc8", - "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", - "cmt_msg": "xen/netfront: react properly to failing gnttab_end_foreign_access_ref()", + "CVE-2022-29582": { + "affected_versions": "v5.5-rc1 to v5.18-rc2", + "breaks": "2665abfd757fb35a241c6f0b1ebf620e3ffb36fb", + "cmt_msg": "io_uring: fix race between timeout flush and removal", "cvss2": { "Access Complexity": "Medium", "Access Vector": "Local Access", "Authentication": "None", - "Availability Impact": "Partial", - "Confidentiality Impact": "Partial", - "Integrity Impact": "Partial", - "raw": "AV:L/AC:M/Au:N/C:P/I:P/A:P", - "score": 4.4 + "Availability Impact": "Complete", + "Confidentiality Impact": "Complete", + "Integrity Impact": "Complete", + "raw": "AV:L/AC:M/Au:N/C:C/I:C/A:C", + "score": 6.9 }, "cvss3": { "Attack Complexity": "High", @@ -75328,104 +81758,82 @@ "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "score": 7.0 }, - "cwe": "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')", - "fixes": "66e3531b33ee51dad17c463b4d9c9f52e341503d", - "last_affected_version": "5.16.13", + "cwe": "Use After Free", + "fixes": "e677edbcabee849bfdd43f1602bccbecf736a646", + "last_affected_version": "5.17.2", "last_modified": "2023-12-06", - "nvd_text": "Linux PV device frontends vulnerable to attacks by backends T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Several Linux PV device frontends are using the grant table interfaces for removing access rights of the backends in ways being subject to race conditions, resulting in potential data leaks, data corruption by malicious backends, and denial of service triggered by malicious backends: blkfront, netfront, scsifront and the gntalloc driver are testing whether a grant reference is still in use. If this is not the case, they assume that a following removal of the granted access will always succeed, which is not true in case the backend has mapped the granted page between those two operations. As a result the backend can keep access to the memory page of the guest no matter how the page will be used after the frontend I/O has finished. The xenbus driver has a similar problem, as it doesn't check the success of removing the granted access of a shared ring buffer. blkfront: CVE-2022-23036 netfront: CVE-2022-23037 scsifront: CVE-2022-23038 gntalloc: CVE-2022-23039 xenbus: CVE-2022-23040 blkfront, netfront, scsifront, usbfront, dmabuf, xenbus, 9p, kbdfront, and pvcalls are using a functionality to delay freeing a grant reference until it is no longer in use, but the freeing of the related data page is not synchronized with dropping the granted access. As a result the backend can keep access to the memory page even after it has been freed and then re-used for a different purpose. CVE-2022-23041 netfront will fail a BUG_ON() assertion if it fails to revoke access in the rx path. This will result in a Denial of Service (DoS) situation of the guest which can be triggered by the backend. CVE-2022-23042", + "nvd_text": "In the Linux kernel before 5.17.3, fs/io_uring.c has a use-after-free due to a race condition in io_uring timeouts. This can be triggered by a local user who has no access to any user namespace; however, the race condition perhaps can only be exploited infrequently.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-23042", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-23042", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-23042", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-23042", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-23042", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-23042" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-29582", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-29582", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-29582", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-29582", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-29582", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-29582" } }, - "CVE-2022-2308": { - "affected_versions": "v5.15-rc1 to v6.0", - "breaks": "c8a6153b6c59d95c0e091f053f6f180952ade91e", - "cmt_msg": "vduse: prevent uninitialized memory accesses", + "CVE-2022-2959": { + "affected_versions": "v5.8-rc1 to v5.19-rc1", + "breaks": "c73be61cede5882f9605a852414db559c0ebedfd", + "cmt_msg": "pipe: Fix missing lock in pipe_resize_ring()", "cvss3": { - "Attack Complexity": "Low", + "Attack Complexity": "High", "Attack Vector": "Local", - "Availability": "None", + "Availability": "High", "Confidentiality": "High", - "Integrity": "None", + "Integrity": "High", "Privileges Required": "Low", - "Scope": "Changed", + "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", - "score": 6.5 + "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 7.0 }, - "cwe": "Use of Uninitialized Resource", - "fixes": "46f8a29272e51b6df7393d58fc5cb8967397ef2b", - "last_affected_version": "6.-1", + "cwe": "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')", + "fixes": "189b0ddc245139af81198d1a3637cac74f96e13a", + "last_affected_version": "5.18.1", "last_modified": "2023-12-06", - "nvd_text": "A flaw was found in vDPA with VDUSE backend. There are currently no checks in VDUSE kernel driver to ensure the size of the device config space is in line with the features advertised by the VDUSE userspace application. In case of a mismatch, Virtio drivers config read helpers do not initialize the memory indirectly passed to vduse_vdpa_get_config() returning uninitialized memory from the stack. This could cause undefined behavior or data leaks in Virtio drivers.", + "nvd_text": "A race condition was found in the Linux kernel's watch queue due to a missing lock in pipe_resize_ring(). The specific flaw exists within the handling of pipe buffers. The issue results from the lack of proper locking when performing operations on an object. This flaw allows a local user to crash the system or escalate their privileges on the system.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-2308", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-2308", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-2308", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-2308", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-2308", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-2308" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-2959", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-2959", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-2959", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-2959", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-2959", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-2959" } }, - "CVE-2022-2318": { - "affected_versions": "v2.6.12-rc2 to v5.19-rc5", - "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", - "cmt_msg": "net: rose: fix UAF bugs caused by timer handler", - "cvss2": { - "Access Complexity": "Low", - "Access Vector": "Local Access", - "Authentication": "None", - "Availability Impact": "Complete", - "Confidentiality Impact": "None", - "Integrity Impact": "None", - "raw": "AV:L/AC:L/Au:N/C:N/I:N/A:C", - "score": 4.9 - }, + "CVE-2022-2961": { + "affected_versions": "unk to unk", + "breaks": "", "cvss3": { - "Attack Complexity": "Low", + "Attack Complexity": "High", "Attack Vector": "Local", "Availability": "High", - "Confidentiality": "None", - "Integrity": "None", + "Confidentiality": "High", + "Integrity": "High", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", - "score": 5.5 + "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 7.0 }, "cwe": "Use After Free", - "fixes": "9cc02ede696272c5271a401e4f27c262359bc2f6", - "last_affected_version": "5.18.9", + "fixes": "", "last_modified": "2023-12-06", - "nvd_text": "There are use-after-free vulnerabilities caused by timer handler in net/rose/rose_timer.c of linux that allow attackers to crash linux kernel without any privileges.", + "nvd_text": "A use-after-free flaw was found in the Linux kernel\u2019s PLP Rose functionality in the way a user triggers a race condition by calling bind while simultaneously triggering the rose_bind() function. This flaw allows a local user to crash or potentially escalate their privileges on the system.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-2318", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-2318", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-2318", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-2318", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-2318", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-2318" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-2961", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-2961", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-2961", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-2961", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-2961", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-2961" } }, - "CVE-2022-23222": { - "affected_versions": "v2.6.12-rc2 to v5.17-rc1", - "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", - "cmt_msg": "bpf: Replace PTR_TO_XXX_OR_NULL with PTR_TO_XXX | PTR_MAYBE_NULL", - "cvss2": { - "Access Complexity": "Low", - "Access Vector": "Local Access", - "Authentication": "None", - "Availability Impact": "Complete", - "Confidentiality Impact": "Complete", - "Integrity Impact": "Complete", - "raw": "AV:L/AC:L/Au:N/C:C/I:C/A:C", - "score": 7.2 - }, + "CVE-2022-2964": { + "affected_versions": "v3.9-rc2 to v5.17-rc4", + "breaks": "e2ca90c276e1fc410d7cd3c1a4eee245ec902a20", + "cmt_msg": "net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", @@ -75438,24 +81846,24 @@ "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "score": 7.8 }, - "cwe": "NULL Pointer Dereference", - "fixes": "c25b2ae136039ffa820c26138ed4a5e5f3ab3841", - "last_affected_version": "5.16.10", + "cwe": "Out-of-bounds Write", + "fixes": "57bc3d3ae8c14df3ceb4e17d26ddf9eeab304581", + "last_affected_version": "5.16.9", "last_modified": "2023-12-06", - "nvd_text": "kernel/bpf/verifier.c in the Linux kernel through 5.15.14 allows local users to gain privileges because of the availability of pointer arithmetic via certain *_OR_NULL pointer types.", + "nvd_text": "A flaw was found in the Linux kernel\u2019s driver for the ASIX AX88179_178A-based USB 2.0/3.0 Gigabit Ethernet Devices. The vulnerability contains multiple out-of-bounds reads and possible out-of-bounds writes.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-23222", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-23222", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-23222", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-23222", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-23222", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-23222" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-2964", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-2964", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-2964", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-2964", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-2964", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-2964" } }, - "CVE-2022-2327": { - "affected_versions": "v5.1-rc1 to v5.12-rc1-dontuse", - "breaks": "2b188cc1bb857a9d4701ae59aa7768b5124e262e", - "cmt_msg": "io_uring: remove any grabbing of context", + "CVE-2022-2977": { + "affected_versions": "v4.12-rc1 to v5.18-rc1", + "breaks": "fdc915f7f71939ad5a3dda3389b8d2d7a7c5ee66", + "cmt_msg": "tpm: fix reference counting for struct tpm_chip", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", @@ -75468,70 +81876,54 @@ "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "score": 7.8 }, - "cwe": "Double Free", - "fixes": "44526bedc2ff8fcd58552e3c5bae928524b6f13c", - "last_modified": "2024-01-12", - "nvd_text": "io_uring use work_flags to determine which identity need to grab from the calling process to make sure it is consistent with the calling process when executing IORING_OP. Some operations are missing some types, which can lead to incorrect reference counts which can then lead to a double free. We recommend upgrading the kernel past commit df3f3bb5059d20ef094d6b2f0256c4bf4127a859", + "cwe": "Use After Free", + "fixes": "7e0438f83dc769465ee663bb5dcf8cc154940712", + "last_affected_version": "5.17.0", + "last_modified": "2023-12-06", + "nvd_text": "A flaw was found in the Linux kernel implementation of proxied virtualized TPM devices. On a system where virtualized TPM devices are configured (this is not the default) a local attacker can create a use-after-free and create a situation where it may be possible to escalate privileges on the system.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-2327", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-2327", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-2327", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-2327", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-2327", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-2327" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-2977", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-2977", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-2977", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-2977", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-2977", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-2977" } }, - "CVE-2022-2380": { - "affected_versions": "v2.6.12-rc2 to v5.18-rc1", + "CVE-2022-2978": { + "affected_versions": "v2.6.12-rc2 to v6.1-rc1", "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", - "cmt_msg": "video: fbdev: sm712fb: Fix crash in smtcfb_read()", + "cmt_msg": "fs: fix UAF/GPF bug in nilfs_mdt_destroy", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", - "Confidentiality": "None", - "Integrity": "None", + "Confidentiality": "High", + "Integrity": "High", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", - "score": 5.5 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 7.8 }, - "cwe": "Out-of-bounds Write", - "fixes": "bd771cf5c4254511cc4abb88f3dab3bd58bdf8e8", - "last_affected_version": "5.17.1", + "cwe": "Use After Free", + "fixes": "2e488f13755ffbb60f307e991b27024716a33b29", + "last_affected_version": "6.0.0", "last_modified": "2023-12-06", - "nvd_text": "The Linux kernel was found vulnerable out of bounds memory access in the drivers/video/fbdev/sm712fb.c:smtcfb_read() function. The vulnerability could result in local attackers being able to crash the kernel.", + "nvd_text": "A flaw use after free in the Linux kernel NILFS file system was found in the way user triggers function security_inode_alloc to fail with following call to function nilfs_mdt_destroy. A local user could use this flaw to crash the system or potentially escalate their privileges on the system.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-2380", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-2380", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-2380", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-2380", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-2380", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-2380" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-2978", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-2978", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-2978", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-2978", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-2978", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-2978" } }, - "CVE-2022-23816": { - "affected_versions": "unk to v5.19-rc7", - "breaks": "", + "CVE-2022-29900": { + "affected_versions": "v2.6.12-rc2 to v5.19-rc7", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", "cmt_msg": "x86/kvm/vmx: Make noinstr clean", - "fixes": "742ab6df974ae8384a2dd213db1a3a06cf6d8936", - "last_affected_version": "5.18.13", - "last_modified": "2023-12-06", - "nvd_text": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate is unused by its CNA. Notes: none.", - "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-23816", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-23816", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-23816", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-23816", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-23816", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-23816" - }, - "rejected": true - }, - "CVE-2022-23825": { - "affected_versions": "unk to unk", - "breaks": "", "cvss2": { "Access Complexity": "Low", "Access Vector": "Local Access", @@ -75554,23 +81946,24 @@ "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "score": 6.5 }, - "cwe": "Exposure of Resource to Wrong Sphere", - "fixes": "", + "cwe": "Exposure of Sensitive Information to an Unauthorized Actor", + "fixes": "742ab6df974ae8384a2dd213db1a3a06cf6d8936", + "last_affected_version": "5.18.13", "last_modified": "2023-12-06", - "nvd_text": "Aliases in the branch predictor may cause some AMD processors to predict the wrong branch type potentially leading to information disclosure.", + "nvd_text": "Mis-trained branch predictions for return instructions may allow arbitrary speculative code execution under certain microarchitecture-dependent conditions.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-23825", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-23825", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-23825", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-23825", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-23825", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-23825" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-29900", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-29900", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-29900", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-29900", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-29900", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-29900" } }, - "CVE-2022-23960": { - "affected_versions": "v2.6.12-rc2 to v5.17-rc8", + "CVE-2022-29901": { + "affected_versions": "v2.6.12-rc2 to v5.19-rc7", "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", - "cmt_msg": "ARM: report Spectre v2 status through sysfs", + "cmt_msg": "x86/kvm/vmx: Make noinstr clean", "cvss2": { "Access Complexity": "Medium", "Access Vector": "Local Access", @@ -75582,7 +81975,7 @@ "score": 1.9 }, "cvss3": { - "Attack Complexity": "High", + "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "None", "Confidentiality": "High", @@ -75590,116 +81983,135 @@ "Privileges Required": "Low", "Scope": "Changed", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", - "score": 5.6 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", + "score": 6.5 }, - "cwe": "Unspecified", - "fixes": "9dd78194a3722fa6712192cdd4f7032d45112a9a", - "last_affected_version": "5.16.13", + "cwe": "Exposure of Resource to Wrong Sphere", + "fixes": "742ab6df974ae8384a2dd213db1a3a06cf6d8936", + "last_affected_version": "5.18.13", "last_modified": "2023-12-06", - "nvd_text": "Certain Arm Cortex and Neoverse processors through 2022-03-08 do not properly restrict cache speculation, aka Spectre-BHB. An attacker can leverage the shared branch history in the Branch History Buffer (BHB) to influence mispredicted branches. Then, cache allocation can allow the attacker to obtain sensitive information.", + "nvd_text": "Intel microprocessor generations 6 to 8 are affected by a new Spectre variant that is able to bypass their retpoline mitigation in the kernel to leak arbitrary data. An attacker with unprivileged user access can hijack return instructions to achieve arbitrary speculative code execution under certain microarchitecture-dependent conditions.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-23960", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-23960", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-23960", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-23960", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-23960", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-23960" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-29901", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-29901", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-29901", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-29901", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-29901", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-29901" } }, - "CVE-2022-24122": { - "affected_versions": "v5.14-rc1 to v5.17-rc2", - "breaks": "d64696905554e919321e31afc210606653b8f6a4", - "cmt_msg": "ucount: Make get_ucount a safe get_user replacement", - "cvss2": { - "Access Complexity": "Medium", - "Access Vector": "Local Access", - "Authentication": "None", - "Availability Impact": "Complete", - "Confidentiality Impact": "Complete", - "Integrity Impact": "Complete", - "raw": "AV:L/AC:M/Au:N/C:C/I:C/A:C", - "score": 6.9 - }, + "CVE-2022-2991": { + "affected_versions": "v4.4-rc1 to v5.15-rc1", + "breaks": "cd9e9808d18fe7107c306f6e71c8be7230ee42b4", + "cmt_msg": "remove the lightnvm subsystem", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", "Confidentiality": "High", "Integrity": "High", - "Privileges Required": "Low", + "Privileges Required": "High", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", - "score": 7.8 + "raw": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "score": 6.7 }, - "cwe": "Use After Free", - "fixes": "f9d87929d451d3e649699d0f1d74f71f77ad38f5", - "last_affected_version": "5.15.18", + "cwe": "Out-of-bounds Write", + "fixes": "9ea9b9c48387edc101d56349492ad9c0492ff78d", "last_modified": "2023-12-06", - "nvd_text": "kernel/ucount.c in the Linux kernel 5.14 through 5.16.4, when unprivileged user namespaces are enabled, allows a use-after-free and privilege escalation because a ucounts object can outlive its namespace.", + "nvd_text": "A heap-based buffer overflow was found in the Linux kernel's LightNVM subsystem. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. This vulnerability allows a local attacker to escalate privileges and execute arbitrary code in the context of the kernel. The attacker must first obtain the ability to execute high-privileged code on the target system to exploit this vulnerability.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-24122", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-24122", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-24122", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-24122", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-24122", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-24122" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-2991", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-2991", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-2991", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-2991", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-2991", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-2991" } }, - "CVE-2022-24448": { - "affected_versions": "v3.6-rc1 to v5.17-rc2", - "breaks": "0dd2b474d0b69d58859399b1df7fdc699ea005d4", - "cmt_msg": "NFSv4: Handle case where the lookup of a directory fails", + "CVE-2022-29968": { + "affected_versions": "v5.16-rc1 to v5.18-rc5", + "breaks": "3e08773c3841e9db7a520908cc2b136a77d275ff", + "cmt_msg": "io_uring: fix uninitialized field in rw io_kiocb", "cvss2": { - "Access Complexity": "Medium", + "Access Complexity": "Low", "Access Vector": "Local Access", "Authentication": "None", - "Availability Impact": "None", + "Availability Impact": "Partial", "Confidentiality Impact": "Partial", - "Integrity Impact": "None", - "raw": "AV:L/AC:M/Au:N/C:P/I:N/A:N", - "score": 1.9 + "Integrity Impact": "Partial", + "raw": "AV:L/AC:L/Au:N/C:P/I:P/A:P", + "score": 4.6 }, "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", - "Availability": "None", - "Confidentiality": "Low", - "Integrity": "None", + "Availability": "High", + "Confidentiality": "High", + "Integrity": "High", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", - "score": 3.3 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 7.8 }, "cwe": "Missing Initialization of Resource", - "fixes": "ac795161c93699d600db16c1a8cc23a65a1eceaf", - "last_affected_version": "5.16.4", + "fixes": "32452a3eb8b64e01e2be717f518c0be046975b9d", + "last_affected_version": "5.17.5", "last_modified": "2023-12-06", - "nvd_text": "An issue was discovered in fs/nfs/dir.c in the Linux kernel before 5.16.5. If an application sets the O_DIRECTORY flag, and tries to open a regular file, nfs_atomic_open() performs a regular lookup. If a regular file is found, ENOTDIR should occur, but the server instead returns uninitialized data in the file descriptor.", + "nvd_text": "An issue was discovered in the Linux kernel through 5.17.5. io_rw_init_file in fs/io_uring.c lacks initialization of kiocb->private.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-24448", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-24448", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-24448", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-24448", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-24448", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-24448" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-29968", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-29968", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-29968", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-29968", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-29968", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-29968" } }, - "CVE-2022-24958": { - "affected_versions": "v2.6.12-rc2 to v5.17-rc1", + "CVE-2022-3028": { + "affected_versions": "v2.6.12-rc2 to v6.0-rc3", "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", - "cmt_msg": "usb: gadget: don't release an existing dev->buf", + "cmt_msg": "af_key: Do not call xfrm_probe_algs in parallel", + "cvss3": { + "Attack Complexity": "High", + "Attack Vector": "Local", + "Availability": "High", + "Confidentiality": "High", + "Integrity": "High", + "Privileges Required": "Low", + "Scope": "Unchanged", + "User Interaction": "None", + "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 7.0 + }, + "cwe": "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')", + "fixes": "ba953a9d89a00c078b85f4b190bc1dde66fe16b5", + "last_affected_version": "5.19.5", + "last_modified": "2023-12-06", + "nvd_text": "A race condition was found in the Linux kernel's IP framework for transforming packets (XFRM subsystem) when multiple calls to xfrm_probe_algs occurred simultaneously. This flaw could allow a local attacker to potentially trigger an out-of-bounds write or leak kernel heap memory by performing an out-of-bounds read and copying it into a socket.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3028", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3028", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-3028", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-3028", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-3028", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-3028" + } + }, + "CVE-2022-30594": { + "affected_versions": "v4.3-rc1 to v5.18-rc1", + "breaks": "13c4a90119d28cfcb6b5bdd820c233b86c2b0237", + "cmt_msg": "ptrace: Check PTRACE_O_SUSPEND_SECCOMP permission on PTRACE_SEIZE", "cvss2": { - "Access Complexity": "Low", + "Access Complexity": "Medium", "Access Vector": "Local Access", "Authentication": "None", "Availability Impact": "Partial", "Confidentiality Impact": "Partial", "Integrity Impact": "Partial", - "raw": "AV:L/AC:L/Au:N/C:P/I:P/A:P", - "score": 4.6 + "raw": "AV:L/AC:M/Au:N/C:P/I:P/A:P", + "score": 4.4 }, "cvss3": { "Attack Complexity": "Low", @@ -75713,34 +82125,24 @@ "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "score": 7.8 }, - "cwe": "Release of Invalid Pointer or Reference", - "fixes": "89f3594d0de58e8a57d92d497dea9fee3d4b9cda", - "last_affected_version": "5.16.12", + "cwe": "Incorrect Default Permissions", + "fixes": "ee1fee900537b5d9560e9f937402de5ddc8412f3", + "last_affected_version": "5.17.1", "last_modified": "2023-12-06", - "nvd_text": "drivers/usb/gadget/legacy/inode.c in the Linux kernel through 5.16.8 mishandles dev->buf release.", + "nvd_text": "The Linux kernel before 5.17.2 mishandles seccomp permissions. The PTRACE_SEIZE code path allows attackers to bypass intended restrictions on setting the PT_SUSPEND_SECCOMP flag.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-24958", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-24958", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-24958", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-24958", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-24958", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-24958" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-30594", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-30594", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-30594", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-30594", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-30594", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-30594" } }, - "CVE-2022-24959": { - "affected_versions": "v4.19-rc7 to v5.17-rc2", - "breaks": "0781168e23a2fc8dceb989f11fc5b39b3ccacc35", - "cmt_msg": "yam: fix a memory leak in yam_siocdevprivate()", - "cvss2": { - "Access Complexity": "Low", - "Access Vector": "Local Access", - "Authentication": "None", - "Availability Impact": "Partial", - "Confidentiality Impact": "None", - "Integrity Impact": "None", - "raw": "AV:L/AC:L/Au:N/C:N/I:N/A:P", - "score": 2.1 - }, + "CVE-2022-3061": { + "affected_versions": "v3.4-rc1 to v5.18-rc5", + "breaks": "5350c65f4f15bbc111ffa629130d3f32cdd4ccf6", + "cmt_msg": "video: fbdev: i740fb: Error out if 'pixclock' equals zero", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", @@ -75753,103 +82155,84 @@ "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "score": 5.5 }, - "cwe": "Missing Release of Memory after Effective Lifetime", - "fixes": "29eb31542787e1019208a2e1047bb7c76c069536", - "last_affected_version": "5.16.4", + "cwe": "Divide By Zero", + "fixes": "15cf0b82271b1823fb02ab8c377badba614d95d5", + "last_affected_version": "5.15.69", "last_modified": "2023-12-06", - "nvd_text": "An issue was discovered in the Linux kernel before 5.16.5. There is a memory leak in yam_siocdevprivate in drivers/net/hamradio/yam.c.", + "nvd_text": "Found Linux Kernel flaw in the i740 driver. The Userspace program could pass any values to the driver through ioctl() interface. The driver doesn't check the value of 'pixclock', so it may cause a divide by zero error.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-24959", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-24959", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-24959", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-24959", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-24959", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-24959" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3061", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3061", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-3061", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-3061", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-3061", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-3061" } }, - "CVE-2022-2503": { - "affected_versions": "v3.4-rc1 to v5.19-rc1", - "breaks": "a4ffc152198efba2ed9e6eac0eb97f17bfebce85", - "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag", + "CVE-2022-3077": { + "affected_versions": "v5.11-rc1 to v5.19-rc1", + "breaks": "5e9a97b1f4491b8b65874901ad084348fcaba327", + "cmt_msg": "i2c: ismt: prevent memory corruption in ismt_access()", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", - "Confidentiality": "High", - "Integrity": "High", - "Privileges Required": "High", + "Confidentiality": "None", + "Integrity": "None", + "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", - "score": 6.7 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "score": 5.5 }, - "cwe": "Improper Authentication", - "fixes": "4caae58406f8ceb741603eee460d79bacca9b1b5", + "cwe": "Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')", + "fixes": "690b2549b19563ec5ad53e5c82f6a944d910086e", "last_affected_version": "5.18.1", "last_modified": "2023-12-06", - "nvd_text": "Dm-verity is used for extending root-of-trust to root filesystems. LoadPin builds on this property to restrict module/firmware loads to just the trusted root filesystem. Device-mapper table reloads currently allow users with root privileges to switch out the target with an equivalent dm-linear target and bypass verification till reboot. This allows root to bypass LoadPin and can be used to load untrusted and unverified kernel modules and firmware, which implies arbitrary kernel execution and persistence for peripherals that do not verify firmware updates. We recommend upgrading past commit 4caae58406f8ceb741603eee460d79bacca9b1b5", + "nvd_text": "A buffer overflow vulnerability was found in the Linux kernel Intel\u2019s iSMT SMBus host controller driver in the way it handled the I2C_SMBUS_BLOCK_PROC_CALL case (via the ioctl I2C_SMBUS) with malicious input data. This flaw could allow a local user to crash the system.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-2503", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-2503", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-2503", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-2503", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-2503", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-2503" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3077", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3077", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-3077", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-3077", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-3077", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-3077" } }, - "CVE-2022-25258": { - "affected_versions": "v3.16-rc1 to v5.17-rc4", - "breaks": "37a3a533429ef9b3cc9f15a656c19623f0e88df7", - "cmt_msg": "USB: gadget: validate interface OS descriptor requests", - "cvss2": { - "Access Complexity": "Low", - "Access Vector": "Local Access", - "Authentication": "None", - "Availability Impact": "Complete", - "Confidentiality Impact": "None", - "Integrity Impact": "None", - "raw": "AV:L/AC:L/Au:N/C:N/I:N/A:C", - "score": 4.9 - }, + "CVE-2022-3078": { + "affected_versions": "v5.10-rc1 to v5.18-rc1", + "breaks": "f90cf6079bf67988f8b1ad1ade70fc89d0080905", + "cmt_msg": "media: vidtv: Check for null return of vzalloc", "cvss3": { "Attack Complexity": "Low", - "Attack Vector": "Physical", + "Attack Vector": "Local", "Availability": "High", "Confidentiality": "None", "Integrity": "None", - "Privileges Required": "None", + "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", - "score": 4.6 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "score": 5.5 }, "cwe": "NULL Pointer Dereference", - "fixes": "75e5b4849b81e19e9efe1654b30d7f3151c33c2c", - "last_affected_version": "5.16.9", + "fixes": "e6a21a14106d9718aa4f8e115b1e474888eeba44", + "last_affected_version": "5.17.1", "last_modified": "2023-12-06", - "nvd_text": "An issue was discovered in drivers/usb/gadget/composite.c in the Linux kernel before 5.16.10. The USB Gadget subsystem lacks certain validation of interface OS descriptor requests (ones with a large array index and ones associated with NULL function pointer retrieval). Memory corruption might occur.", + "nvd_text": "An issue was discovered in the Linux kernel through 5.16-rc6. There is a lack of check after calling vzalloc() and lack of free after allocation in drivers/media/test-drivers/vidtv/vidtv_s302m.c.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-25258", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-25258", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-25258", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-25258", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-25258", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-25258" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3078", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3078", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-3078", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-3078", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-3078", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-3078" } }, - "CVE-2022-25265": { - "affected_versions": "unk to unk", - "breaks": "", - "cvss2": { - "Access Complexity": "Medium", - "Access Vector": "Local Access", - "Authentication": "None", - "Availability Impact": "Partial", - "Confidentiality Impact": "Partial", - "Integrity Impact": "Partial", - "raw": "AV:L/AC:M/Au:N/C:P/I:P/A:P", - "score": 4.4 - }, + "CVE-2022-3103": { + "affected_versions": "v6.0-rc1 to v6.0-rc3", + "breaks": "78a861b9495920f8609dee5b670dacbff09d359f", + "cmt_msg": "io_uring: fix off-by-one in sync cancelation file check", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", @@ -75862,319 +82245,381 @@ "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "score": 7.8 }, - "cwe": "Improper Control of Dynamically-Managed Code Resources", - "fixes": "", + "cwe": "Off-by-one Error", + "fixes": "47abea041f897d64dbd5777f0cf7745148f85d75", "last_modified": "2023-12-06", - "nvd_text": "In the Linux kernel through 5.16.10, certain binary files may have the exec-all attribute if they were built in approximately 2003 (e.g., with GCC 3.2.2 and Linux kernel 2.4.20). This can cause execution of bytes located in supposedly non-executable regions of a file.", + "nvd_text": "off-by-one in io_uring module.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-25265", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-25265", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-25265", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-25265", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-25265", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-25265" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3103", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3103", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-3103", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-3103", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-3103", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-3103" } }, - "CVE-2022-25375": { - "affected_versions": "v2.6.12-rc2 to v5.17-rc4", - "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", - "cmt_msg": "usb: gadget: rndis: check size of RNDIS_MSG_SET command", - "cvss2": { - "Access Complexity": "Low", - "Access Vector": "Local Access", - "Authentication": "None", - "Availability Impact": "None", - "Confidentiality Impact": "Partial", - "Integrity Impact": "None", - "raw": "AV:L/AC:L/Au:N/C:P/I:N/A:N", - "score": 2.1 + "CVE-2022-3104": { + "affected_versions": "v5.7-rc1 to v5.19-rc1", + "breaks": "ae2e1aad3e48e495878d9f149e437a308bfdaefa", + "cmt_msg": "lkdtm/bugs: Check for the NULL pointer after calling kmalloc", + "cvss3": { + "Attack Complexity": "Low", + "Attack Vector": "Local", + "Availability": "High", + "Confidentiality": "None", + "Integrity": "None", + "Privileges Required": "Low", + "Scope": "Unchanged", + "User Interaction": "None", + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "score": 5.5 }, + "cwe": "NULL Pointer Dereference", + "fixes": "4a9800c81d2f34afb66b4b42e0330ae8298019a2", + "last_affected_version": "5.18.3", + "last_modified": "2023-12-06", + "nvd_text": "An issue was discovered in the Linux kernel through 5.16-rc6. lkdtm_ARRAY_BOUNDS in drivers/misc/lkdtm/bugs.c lacks check of the return value of kmalloc() and will cause the null pointer dereference.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3104", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3104", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-3104", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-3104", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-3104", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-3104" + } + }, + "CVE-2022-3105": { + "affected_versions": "v5.0-rc1 to v5.16", + "breaks": "6884c6c4bd09fb35b79a3967d15821cdfcbe77a3", + "cmt_msg": "RDMA/uverbs: Check for null return of kmalloc_array", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", - "Availability": "None", - "Confidentiality": "High", + "Availability": "High", + "Confidentiality": "None", "Integrity": "None", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "score": 5.5 }, - "cwe": "Exposure of Resource to Wrong Sphere", - "fixes": "38ea1eac7d88072bbffb630e2b3db83ca649b826", - "last_affected_version": "5.16.9", + "cwe": "NULL Pointer Dereference", + "fixes": "7694a7de22c53a312ea98960fcafc6ec62046531", + "last_affected_version": "5.15", "last_modified": "2023-12-06", - "nvd_text": "An issue was discovered in drivers/usb/gadget/function/rndis.c in the Linux kernel before 5.16.10. The RNDIS USB gadget lacks validation of the size of the RNDIS_MSG_SET command. Attackers can obtain sensitive information from kernel memory.", + "nvd_text": "An issue was discovered in the Linux kernel through 5.16-rc6. uapi_finalize in drivers/infiniband/core/uverbs_uapi.c lacks check of kmalloc_array().", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3105", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3105", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-3105", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-3105", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-3105", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-3105" + } + }, + "CVE-2022-3106": { + "affected_versions": "v5.9-rc1 to v5.16-rc6", + "breaks": "b593b6f1b4921700c00394d35e098259e3d04913", + "cmt_msg": "sfc_ef100: potential dereference of null pointer", + "cvss3": { + "Attack Complexity": "Low", + "Attack Vector": "Local", + "Availability": "High", + "Confidentiality": "None", + "Integrity": "None", + "Privileges Required": "Low", + "Scope": "Unchanged", + "User Interaction": "None", + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "score": 5.5 + }, + "cwe": "NULL Pointer Dereference", + "fixes": "407ecd1bd726f240123f704620d46e285ff30dd9", + "last_affected_version": "5.15.10", + "last_modified": "2023-12-06", + "nvd_text": "An issue was discovered in the Linux kernel through 5.16-rc6. ef100_update_stats in drivers/net/ethernet/sfc/ef100_nic.c lacks check of the return value of kmalloc().", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3106", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3106", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-3106", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-3106", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-3106", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-3106" + } + }, + "CVE-2022-3107": { + "affected_versions": "v4.19-rc1 to v5.17", + "breaks": "6ae746711263bd6da45f709fdb9f12e4f57e22bd", + "cmt_msg": "hv_netvsc: Add check for kvmalloc_array", + "cvss3": { + "Attack Complexity": "Low", + "Attack Vector": "Local", + "Availability": "High", + "Confidentiality": "None", + "Integrity": "None", + "Privileges Required": "Low", + "Scope": "Unchanged", + "User Interaction": "None", + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "score": 5.5 + }, + "cwe": "NULL Pointer Dereference", + "fixes": "886e44c9298a6b428ae046e2fa092ca52e822e6a", + "last_affected_version": "5.16", + "last_modified": "2023-12-06", + "nvd_text": "An issue was discovered in the Linux kernel through 5.16-rc6. netvsc_get_ethtool_stats in drivers/net/hyperv/netvsc_drv.c lacks check of the return value of kvmalloc_array() and will cause the null pointer dereference.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-25375", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-25375", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-25375", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-25375", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-25375", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-25375" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3107", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3107", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-3107", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-3107", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-3107", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-3107" } }, - "CVE-2022-25636": { - "affected_versions": "v5.4-rc1 to v5.17-rc6", - "breaks": "be2861dc36d77ff3778979b9c3c79ada4affa131", - "cmt_msg": "netfilter: nf_tables_offload: incorrect flow offload action array size", - "cvss2": { - "Access Complexity": "Medium", - "Access Vector": "Local Access", - "Authentication": "None", - "Availability Impact": "Complete", - "Confidentiality Impact": "Complete", - "Integrity Impact": "Complete", - "raw": "AV:L/AC:M/Au:N/C:C/I:C/A:C", - "score": 6.9 - }, + "CVE-2022-3108": { + "affected_versions": "v4.16-rc1 to v5.17-rc1", + "breaks": "3a87177eb14113bbe8cd95a276af2c412eced6ac", + "cmt_msg": "drm/amdkfd: Check for null pointer after calling kmemdup", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", - "Confidentiality": "High", - "Integrity": "High", + "Confidentiality": "None", + "Integrity": "None", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", - "score": 7.8 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "score": 5.5 }, - "cwe": "Improper Privilege Management", - "fixes": "b1a5983f56e371046dcf164f90bfaf704d2b89f6", - "last_affected_version": "5.16.11", + "cwe": "Unchecked Return Value", + "fixes": "abfaf0eee97925905e742aa3b0b72e04a918fa9e", + "last_affected_version": "5.16.2", "last_modified": "2023-12-06", - "nvd_text": "net/netfilter/nf_dup_netdev.c in the Linux kernel 5.4 through 5.6.10 allows local users to gain privileges because of a heap out-of-bounds write. This is related to nf_tables_offload.", + "nvd_text": "An issue was discovered in the Linux kernel through 5.16-rc6. kfd_parse_subtype_iolink in drivers/gpu/drm/amd/amdkfd/kfd_crat.c lacks check of the return value of kmemdup().", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-25636", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-25636", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-25636", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-25636", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-25636", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-25636" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3108", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3108", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-3108", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-3108", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-3108", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-3108" } }, - "CVE-2022-2585": { - "affected_versions": "v5.7-rc1 to v6.0-rc1", - "breaks": "55e8c8eb2c7b6bf30e99423ccfe7ca032f498f59", - "cmt_msg": "posix-cpu-timers: Cleanup CPU timers before freeing them during exec", + "CVE-2022-3110": { + "affected_versions": "v5.15-rc1 to v5.19-rc1", + "breaks": "15865124feed880978b79839c756ef6cbb4ec6b3", + "cmt_msg": "staging: r8188eu: add check for kzalloc", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", - "Confidentiality": "High", - "Integrity": "High", + "Confidentiality": "None", + "Integrity": "None", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", - "score": 7.8 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "score": 5.5 }, - "fixes": "e362359ace6f87c201531872486ff295df306d13", - "last_affected_version": "5.19.1", - "last_modified": "2024-02-02", - "nvd_text": "It was discovered that when exec'ing from a non-leader thread, armed POSIX CPU timers would be left on a list but freed, leading to a use-after-free.", + "cwe": "NULL Pointer Dereference", + "fixes": "f94b47c6bde624d6c07f43054087607c52054a95", + "last_affected_version": "5.18.3", + "last_modified": "2023-12-06", + "nvd_text": "An issue was discovered in the Linux kernel through 5.16-rc6. _rtw_init_xmit_priv in drivers/staging/r8188eu/core/rtw_xmit.c lacks check of the return value of rtw_alloc_hwxmits() and will cause the null pointer dereference.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-2585", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-2585", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-2585", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-2585", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-2585", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-2585" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3110", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3110", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-3110", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-3110", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-3110", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-3110" } }, - "CVE-2022-2586": { - "affected_versions": "v3.16-rc1 to v6.0-rc1", - "breaks": "958bee14d0718ca7a5002c0f48a099d1d345812a", - "cmt_msg": "netfilter: nf_tables: do not allow SET_ID to refer to another table", + "CVE-2022-3111": { + "affected_versions": "v2.6.29-rc1 to v5.18-rc1", + "breaks": "14431aa0c5a443d13d24e6f865a8838f97dab973", + "cmt_msg": "power: supply: wm8350-power: Add missing free in free_charger_irq", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", - "Confidentiality": "High", - "Integrity": "High", + "Confidentiality": "None", + "Integrity": "None", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", - "score": 7.8 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "score": 5.5 }, - "fixes": "470ee20e069a6d05ae549f7d0ef2bdbcee6a81b2", - "last_affected_version": "5.19.1", - "last_modified": "2024-01-12", - "nvd_text": "It was discovered that a nft object or expression could reference a nft set on a different nft table, leading to a use-after-free once that table was deleted.", + "cwe": "NULL Pointer Dereference", + "fixes": "6dee930f6f6776d1e5a7edf542c6863b47d9f078", + "last_affected_version": "5.17.1", + "last_modified": "2023-12-06", + "nvd_text": "An issue was discovered in the Linux kernel through 5.16-rc6. free_charger_irq() in drivers/power/supply/wm8350_power.c lacks free of WM8350_IRQ_CHG_FAST_RDY, which is registered in wm8350_init_charger().", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-2586", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-2586", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-2586", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-2586", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-2586", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-2586" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3111", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3111", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-3111", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-3111", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-3111", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-3111" } }, - "CVE-2022-2588": { - "affected_versions": "v2.6.12-rc2 to v6.0-rc1", - "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", - "cmt_msg": "net_sched: cls_route: remove from list when handle is 0", + "CVE-2022-3112": { + "affected_versions": "v5.7-rc1 to v5.18-rc1", + "breaks": "876f123b8956b455a89a172b905f9ecbb6fc5b67", + "cmt_msg": "media: meson: vdec: potential dereference of null pointer", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", - "Confidentiality": "High", - "Integrity": "High", + "Confidentiality": "None", + "Integrity": "None", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", - "score": 7.8 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "score": 5.5 }, - "fixes": "9ad36309e2719a884f946678e0296be10f0bb4c1", - "last_affected_version": "5.19.1", - "last_modified": "2024-01-12", - "nvd_text": "It was discovered that the cls_route filter implementation in the Linux kernel would not remove an old filter from the hashtable before freeing it if its handle had the value 0.", + "cwe": "NULL Pointer Dereference", + "fixes": "c8c80c996182239ff9b05eda4db50184cf3b2e99", + "last_affected_version": "5.17.1", + "last_modified": "2023-12-06", + "nvd_text": "An issue was discovered in the Linux kernel through 5.16-rc6. amvdec_set_canvases in drivers/staging/media/meson/vdec/vdec_helpers.c lacks check of the return value of kzalloc() and will cause the null pointer dereference.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-2588", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-2588", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-2588", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-2588", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-2588", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-2588" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3112", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3112", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-3112", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-3112", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-3112", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-3112" } }, - "CVE-2022-2590": { - "affected_versions": "v5.16-rc1 to v6.0-rc3", - "breaks": "9ae0f87d009ca6c4aab2882641ddfc319727e3db", - "cmt_msg": "mm/gup: fix FOLL_FORCE COW security issue and remove FOLL_COW", + "CVE-2022-3113": { + "affected_versions": "v5.10-rc6 to v5.18-rc1", + "breaks": "46233e91fa24a91bffca0680b1c55282ba601918", + "cmt_msg": "media: mtk-vcodec: potential dereference of null pointer", "cvss3": { - "Attack Complexity": "High", + "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", - "Confidentiality": "High", - "Integrity": "High", + "Confidentiality": "None", + "Integrity": "None", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", - "score": 7.0 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "score": 5.5 }, - "cwe": "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')", - "fixes": "5535be3099717646781ce1540cf725965d680e7b", - "last_affected_version": "5.19.5", + "cwe": "NULL Pointer Dereference", + "fixes": "e25a89f743b18c029bfbe5e1663ae0c7190912b0", + "last_affected_version": "5.17.1", "last_modified": "2023-12-06", - "nvd_text": "A race condition was found in the way the Linux kernel's memory subsystem handled the copy-on-write (COW) breakage of private read-only shared memory mappings. This flaw allows an unprivileged, local user to gain write access to read-only memory mappings, increasing their privileges on the system.", + "nvd_text": "An issue was discovered in the Linux kernel through 5.16-rc6. mtk_vcodec_fw_vpu_init in drivers/media/platform/mtk-vcodec/mtk_vcodec_fw_vpu.c lacks check of the return value of devm_kzalloc() and will cause the null pointer dereference.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-2590", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-2590", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-2590", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-2590", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-2590", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-2590" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3113", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3113", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-3113", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-3113", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-3113", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-3113" } }, - "CVE-2022-2602": { - "affected_versions": "v5.1-rc1 to v6.1-rc1", - "breaks": "6b06314c47e141031be043539900d80d2c7ba10f", - "cmt_msg": "io_uring/af_unix: defer registered files gc to io_uring release", + "CVE-2022-3114": { + "affected_versions": "v5.13-rc1 to v5.19-rc1", + "breaks": "379c9a24cc239000b1dec53db02fe17a86947423", + "cmt_msg": "clk: imx: Add check for kcalloc", "cvss3": { - "Attack Complexity": "High", + "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", - "Confidentiality": "High", - "Integrity": "High", + "Confidentiality": "None", + "Integrity": "None", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", - "score": 7.0 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "score": 5.5 }, - "fixes": "0091bfc81741b8d3aeb3b7ab8636f911b2de6e80", - "last_affected_version": "6.0.2", - "last_modified": "2024-01-12", - "nvd_text": "io_uring UAF, Unix SCM garbage collection", + "cwe": "NULL Pointer Dereference", + "fixes": "ed713e2bc093239ccd380c2ce8ae9e4162f5c037", + "last_modified": "2023-12-06", + "nvd_text": "An issue was discovered in the Linux kernel through 5.16-rc6. imx_register_uart_clocks in drivers/clk/imx/clk.c lacks check of the return value of kcalloc() and will cause the null pointer dereference.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-2602", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-2602", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-2602", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-2602", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-2602", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-2602" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3114", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3114", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-3114", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-3114", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-3114", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-3114" } }, - "CVE-2022-26365": { - "affected_versions": "v2.6.12-rc2 to v5.19-rc6", - "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", - "cmt_msg": "xen/blkfront: fix leaking data in shared pages", - "cvss2": { - "Access Complexity": "Low", - "Access Vector": "Local Access", - "Authentication": "None", - "Availability Impact": "Partial", - "Confidentiality Impact": "Partial", - "Integrity Impact": "None", - "raw": "AV:L/AC:L/Au:N/C:P/I:N/A:P", - "score": 3.6 - }, + "CVE-2022-3115": { + "affected_versions": "v4.12-rc1 to v5.19-rc1", + "breaks": "99665d07218345647875fea9ad4979bbe297c104", + "cmt_msg": "drm: mali-dp: potential dereference of null pointer", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", - "Confidentiality": "High", + "Confidentiality": "None", "Integrity": "None", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", - "score": 7.1 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "score": 5.5 }, - "cwe": "Exposure of Sensitive Information to an Unauthorized Actor", - "fixes": "2f446ffe9d737e9a844b97887919c4fda18246e7", - "last_affected_version": "5.18.9", + "cwe": "NULL Pointer Dereference", + "fixes": "73c3ed7495c67b8fbdc31cf58e6ca8757df31a33", + "last_affected_version": "5.18.2", "last_modified": "2023-12-06", - "nvd_text": "Linux disk/nic frontends data leaks T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Linux Block and Network PV device frontends don't zero memory regions before sharing them with the backend (CVE-2022-26365, CVE-2022-33740). Additionally the granularity of the grant table doesn't allow sharing less than a 4K page, leading to unrelated data residing in the same 4K page as data shared with a backend being accessible by such backend (CVE-2022-33741, CVE-2022-33742).", + "nvd_text": "An issue was discovered in the Linux kernel through 5.16-rc6. malidp_crtc_reset in drivers/gpu/drm/arm/malidp_crtc.c lacks check of the return value of kzalloc() and will cause the null pointer dereference.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-26365", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-26365", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-26365", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-26365", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-26365", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-26365" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3115", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3115", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-3115", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-3115", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-3115", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-3115" } }, - "CVE-2022-26373": { - "affected_versions": "v2.6.12-rc2 to v6.0-rc1", + "CVE-2022-3169": { + "affected_versions": "v2.6.12-rc2 to v6.1-rc1", "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", - "cmt_msg": "x86/speculation: Add RSB VM Exit protections", + "cmt_msg": "nvme: ensure subsystem reset is single threaded", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", - "Availability": "None", - "Confidentiality": "High", + "Availability": "High", + "Confidentiality": "None", "Integrity": "None", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "score": 5.5 }, - "cwe": "Unspecified", - "fixes": "2b1299322016731d56807aa49254a5ea3080b6b3", - "last_affected_version": "5.19.0", + "cwe": "Improper Input Validation", + "fixes": "1e866afd4bcdd01a70a5eddb4371158d3035ce03", + "last_affected_version": "6.0.9", "last_modified": "2023-12-06", - "nvd_text": "Non-transparent sharing of return predictor targets between contexts in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.", + "nvd_text": "A flaw was found in the Linux kernel. A denial of service flaw may occur if there is a consecutive request of the NVME_IOCTL_RESET and the NVME_IOCTL_SUBSYS_RESET through the device file of the driver, resulting in a PCIe link disconnect.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-26373", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-26373", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-26373", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-26373", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-26373", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-26373" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3169", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3169", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-3169", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-3169", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-3169", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-3169" } }, - "CVE-2022-2639": { - "affected_versions": "v5.1-rc4 to v5.18-rc4", - "breaks": "f28cd2af22a0c134e4aa1c64a70f70d815d473fb", - "cmt_msg": "openvswitch: fix OOB access in reserve_sfa_size()", + "CVE-2022-3170": { + "affected_versions": "v6.0-rc1 to v6.0-rc4", + "breaks": "c27e1efb61c545f36c450ef60862df9251d239a4", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", @@ -76187,34 +82632,23 @@ "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "score": 7.8 }, - "cwe": "Out-of-bounds Write", - "fixes": "cefa91b2332d7009bc0be5d951d6cbbf349f90f8", - "last_affected_version": "5.17.4", + "cwe": "Out-of-bounds Read", + "fixes": "6ab55ec0a938c7f943a4edba3d6514f775983887", "last_modified": "2023-12-06", - "nvd_text": "An integer coercion error was found in the openvswitch kernel module. Given a sufficiently large number of actions, while copying and reserving memory for a new action of a new flow, the reserve_sfa_size() function does not return -EMSGSIZE as expected, potentially leading to an out-of-bounds write access. This flaw allows a local user to crash or potentially escalate their privileges on the system.", + "nvd_text": "An out-of-bounds access issue was found in the Linux kernel sound subsystem. It could occur when the 'id->name' provided by the user did not end with '\\0'. A privileged local user could pass a specially crafted name through ioctl() interface and crash the system or potentially escalate their privileges on the system.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-2639", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-2639", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-2639", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-2639", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-2639", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-2639" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3170", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3170", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-3170", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-3170", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-3170", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-3170" } }, - "CVE-2022-26490": { - "affected_versions": "v4.0-rc1 to v5.17-rc1", - "breaks": "26fc6c7f02cb26c39c4733de3dbc3c0646fc1074", - "cmt_msg": "nfc: st21nfca: Fix potential buffer overflows in EVT_TRANSACTION", - "cvss2": { - "Access Complexity": "Low", - "Access Vector": "Local Access", - "Authentication": "None", - "Availability Impact": "Partial", - "Confidentiality Impact": "Partial", - "Integrity Impact": "Partial", - "raw": "AV:L/AC:L/Au:N/C:P/I:P/A:P", - "score": 4.6 - }, + "CVE-2022-3176": { + "affected_versions": "v5.1-rc1 to v5.17-rc1", + "breaks": "221c5eb2338232f7340386de1c43decc32682e58", + "cmt_msg": "io_uring: fix UAF due to missing POLLFREE handling", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", @@ -76227,92 +82661,94 @@ "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "score": 7.8 }, - "cwe": "Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')", - "fixes": "4fbcc1a4cb20fe26ad0225679c536c80f1648221", - "last_affected_version": "5.16.17", + "cwe": "Use After Free", + "fixes": "791f3465c4afde02d7f16cf7424ca87070b69396", + "last_affected_version": "5.15.64", "last_modified": "2023-12-06", - "nvd_text": "st21nfca_connectivity_event_received in drivers/nfc/st21nfca/se.c in the Linux kernel through 5.16.12 has EVT_TRANSACTION buffer overflows because of untrusted length parameters.", + "nvd_text": "There exists a use-after-free in io_uring in the Linux kernel. Signalfd_poll() and binder_poll() use a waitqueue whose lifetime is the current task. It will send a POLLFREE notification to all waiters before the queue is freed. Unfortunately, the io_uring poll doesn't handle POLLFREE. This allows a use-after-free to occur if a signalfd or binder fd is polled with io_uring poll, and the waitqueue gets freed. We recommend upgrading past commit fc78b2fc21f10c4c9c4d5d659a685710ffa63659", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-26490", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-26490", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-26490", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-26490", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-26490", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-26490" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3176", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3176", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-3176", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-3176", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-3176", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-3176" } }, - "CVE-2022-2663": { - "affected_versions": "v2.6.20-rc1 to v6.0-rc5", - "breaks": "869f37d8e48f3911eb70f38a994feaa8f8380008", - "cmt_msg": "netfilter: nf_conntrack_irc: Fix forged IP logic", + "CVE-2022-3202": { + "affected_versions": "v2.6.12-rc2 to v5.18-rc1", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "jfs: prevent NULL deref in diFree", "cvss3": { "Attack Complexity": "Low", - "Attack Vector": "Network", - "Availability": "None", - "Confidentiality": "None", - "Integrity": "Low", - "Privileges Required": "None", + "Attack Vector": "Local", + "Availability": "High", + "Confidentiality": "High", + "Integrity": "None", + "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", - "score": 5.3 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", + "score": 7.1 }, - "cwe": "Improper Restriction of Communication Channel to Intended Endpoints", - "fixes": "0efe125cfb99e6773a7434f3463f7c2fa28f3a43", - "last_affected_version": "5.19.8", + "cwe": "NULL Pointer Dereference", + "fixes": "a53046291020ec41e09181396c1e829287b48d47", + "last_affected_version": "5.17.2", "last_modified": "2023-12-06", - "nvd_text": "An issue was found in the Linux kernel in nf_conntrack_irc where the message handling can be confused and incorrectly matches the message. A firewall may be able to be bypassed when users are using unencrypted IRC with nf_conntrack_irc configured.", + "nvd_text": "A NULL pointer dereference flaw in diFree in fs/jfs/inode.c in Journaled File System (JFS)in the Linux kernel. This could allow a local attacker to crash the system or leak kernel internal information.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-2663", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-2663", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-2663", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-2663", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-2663", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-2663" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3202", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3202", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-3202", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-3202", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-3202", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-3202" } }, - "CVE-2022-26878": { - "affected_versions": "v5.13-rc1 to unk", - "breaks": "afd2daa26c7abd734d78bd274fc6c59a15e61063", + "CVE-2022-32250": { + "affected_versions": "v4.1-rc1 to v5.19-rc1", + "breaks": "0b2d8a7b638b5034d2d68f6add8af94daaa1d4cd", + "cmt_msg": "netfilter: nf_tables: disallow non-stateful expression in sets earlier", "cvss2": { "Access Complexity": "Low", "Access Vector": "Local Access", "Authentication": "None", - "Availability Impact": "Partial", - "Confidentiality Impact": "None", - "Integrity Impact": "None", - "raw": "AV:L/AC:L/Au:N/C:N/I:N/A:P", - "score": 2.1 + "Availability Impact": "Complete", + "Confidentiality Impact": "Complete", + "Integrity Impact": "Complete", + "raw": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "score": 7.2 }, "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", - "Confidentiality": "None", - "Integrity": "None", + "Confidentiality": "High", + "Integrity": "High", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", - "score": 5.5 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 7.8 }, - "cwe": "Missing Release of Resource after Effective Lifetime", - "fixes": "ad7cb5f6fa5f7ea37208c98a9457dd98025a89ca", + "cwe": "Use After Free", + "fixes": "520778042ccca019f3ffa136dd0ca565c486cedd", + "last_affected_version": "5.18.1", "last_modified": "2023-12-06", - "nvd_text": "drivers/bluetooth/virtio_bt.c in the Linux kernel before 5.16.3 has a memory leak (socket buffers have memory allocated but not freed).", + "nvd_text": "net/netfilter/nf_tables_api.c in the Linux kernel through 5.18.1 allows a local user (able to create user/net namespaces) to escalate privileges to root because an incorrect NFT_STATEFUL_EXPR check leads to a use-after-free.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-26878", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-26878", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-26878", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-26878", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-26878", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-26878" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-32250", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-32250", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-32250", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-32250", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-32250", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-32250" } }, - "CVE-2022-26966": { - "affected_versions": "v3.12-rc1 to v5.17-rc6", - "breaks": "c9b37458e95629b1d1171457afdcc1bf1eb7881d", - "cmt_msg": "sr9700: sanity check for packet length", + "CVE-2022-32296": { + "affected_versions": "v2.6.12-rc2 to v5.18-rc6", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "tcp: increase source port perturb table to 2^16", "cvss2": { "Access Complexity": "Low", "Access Vector": "Local Access", @@ -76327,72 +82763,90 @@ "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "None", - "Confidentiality": "High", + "Confidentiality": "Low", "Integrity": "None", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", - "score": 5.5 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "score": 3.3 + }, + "cwe": "Observable Discrepancy", + "fixes": "4c2c8f03a5ab7cb04ec64724d7d176d00bcc91e5", + "last_affected_version": "5.17.8", + "last_modified": "2023-12-06", + "nvd_text": "The Linux kernel before 5.17.9 allows TCP servers to identify clients by observing what source ports are used. This occurs because of use of Algorithm 4 (\"Double-Hash Port Selection Algorithm\") of RFC 6056.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-32296", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-32296", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-32296", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-32296", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-32296", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-32296" + } + }, + "CVE-2022-3238": { + "affected_versions": "v5.15-rc6 to unk", + "breaks": "610f8f5a7baf998e70a61c63e53869b676d9b04c", + "cvss3": { + "Attack Complexity": "Low", + "Attack Vector": "Local", + "Availability": "High", + "Confidentiality": "High", + "Integrity": "High", + "Privileges Required": "Low", + "Scope": "Unchanged", + "User Interaction": "None", + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 7.8 }, - "cwe": "Unspecified", - "fixes": "e9da0b56fe27206b49f39805f7dcda8a89379062", - "last_affected_version": "5.16.11", + "cwe": "Double Free", + "fixes": "", "last_modified": "2023-12-06", - "nvd_text": "An issue was discovered in the Linux kernel before 5.16.12. drivers/net/usb/sr9700.c allows attackers to obtain sensitive information from heap memory via crafted frame lengths from a device.", + "nvd_text": "A double-free flaw was found in the Linux kernel\u2019s NTFS3 subsystem in how a user triggers remount and umount simultaneously. This flaw allows a local user to crash or potentially escalate their privileges on the system.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-26966", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-26966", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-26966", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-26966", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-26966", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-26966" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3238", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3238", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-3238", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-3238", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-3238", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-3238" } }, - "CVE-2022-27223": { - "affected_versions": "v3.18-rc1 to v5.17-rc6", - "breaks": "1f7c51660034091dc134fcc534b7f1fa86a6e823", - "cmt_msg": "USB: gadget: validate endpoint index for xilinx udc", - "cvss2": { - "Access Complexity": "Low", - "Access Vector": "Network Accessible", - "Authentication": "Single", - "Availability Impact": "Partial", - "Confidentiality Impact": "Partial", - "Integrity Impact": "Partial", - "raw": "AV:N/AC:L/Au:S/C:P/I:P/A:P", - "score": 6.5 - }, + "CVE-2022-3239": { + "affected_versions": "v3.15-rc1 to v5.18-rc1", + "breaks": "47677e51e2a4040c204d7971a5103592600185b1", + "cmt_msg": "media: em28xx: initialize refcount before kref_get", "cvss3": { "Attack Complexity": "Low", - "Attack Vector": "Network", + "Attack Vector": "Local", "Availability": "High", "Confidentiality": "High", "Integrity": "High", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", - "score": 8.8 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 7.8 }, - "cwe": "Improper Validation of Array Index", - "fixes": "7f14c7227f342d9932f9b918893c8814f86d2a0d", - "last_affected_version": "5.16.11", + "cwe": "Use After Free", + "fixes": "c08eadca1bdfa099e20a32f8fa4b52b2f672236d", + "last_affected_version": "5.17.1", "last_modified": "2023-12-06", - "nvd_text": "In drivers/usb/gadget/udc/udc-xilinx.c in the Linux kernel before 5.16.12, the endpoint index is not validated and might be manipulated by the host for out-of-array access.", + "nvd_text": "A flaw use after free in the Linux kernel video4linux driver was found in the way user triggers em28xx_usb_probe() for the Empia 28xx based TV cards. A local user could use this flaw to crash the system or potentially escalate their privileges on the system.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-27223", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-27223", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-27223", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-27223", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-27223", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-27223" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3239", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3239", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-3239", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-3239", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-3239", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-3239" } }, - "CVE-2022-27666": { - "affected_versions": "v4.11-rc1 to v5.17-rc8", - "breaks": "cac2661c53f35cbe651bef9b07026a5a05ab8ce0", - "cmt_msg": "esp: Fix possible buffer overflow in ESP transformation", + "CVE-2022-32981": { + "affected_versions": "v3.13-rc1 to v5.19-rc2", + "breaks": "87fec0514f613f8ac43c01b0bc0bc7072c5d10ae", + "cmt_msg": "powerpc/32: Fix overread/overwrite of thread_struct via ptrace", "cvss2": { "Access Complexity": "Low", "Access Vector": "Local Access", @@ -76415,94 +82869,54 @@ "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "score": 7.8 }, - "cwe": "Out-of-bounds Write", - "fixes": "ebe48d368e97d007bfeb76fcb065d6cfc4c96645", - "last_affected_version": "5.16.14", + "cwe": "Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')", + "fixes": "8e1278444446fc97778a5e5c99bca1ce0bbc5ec9", + "last_affected_version": "5.18.3", "last_modified": "2023-12-06", - "nvd_text": "A heap buffer overflow flaw was found in IPsec ESP transformation code in net/ipv4/esp4.c and net/ipv6/esp6.c. This flaw allows a local attacker with a normal user privilege to overwrite kernel heap objects and may cause a local privilege escalation threat.", + "nvd_text": "An issue was discovered in the Linux kernel through 5.18.3 on powerpc 32-bit platforms. There is a buffer overflow in ptrace PEEKUSER and POKEUSER (aka PEEKUSR and POKEUSR) when accessing floating point registers.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-27666", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-27666", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-27666", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-27666", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-27666", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-27666" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-32981", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-32981", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-32981", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-32981", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-32981", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-32981" } }, - "CVE-2022-27672": { - "affected_versions": "v2.6.12-rc2 to v6.2", + "CVE-2022-3303": { + "affected_versions": "v2.6.12-rc2 to v6.0-rc5", "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", - "cmt_msg": "x86/speculation: Identify processors vulnerable to SMT RSB predictions", + "cmt_msg": "ALSA: pcm: oss: Fix race at SNDCTL_DSP_SYNC", "cvss3": { "Attack Complexity": "High", "Attack Vector": "Local", - "Availability": "None", - "Confidentiality": "High", + "Availability": "High", + "Confidentiality": "None", "Integrity": "None", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", + "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "score": 4.7 }, - "cwe": "Unspecified", - "fixes": "be8de49bea505e7777a69ef63d60e02ac1712683", - "last_affected_version": "6.1", - "last_modified": "2023-12-06", - "nvd_text": "\nWhen SMT is enabled, certain AMD processors may speculatively execute instructions using a target\nfrom the sibling thread after an SMT mode switch potentially resulting in information disclosure.\n\n\n", - "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-27672", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-27672", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-27672", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-27672", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-27672", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-27672" - } - }, - "CVE-2022-2785": { - "affected_versions": "v5.18-rc1 to v6.0-rc1", - "breaks": "b1d18a7574d0df5eb4117c14742baf8bc2b9bb74", - "cmt_msg": "bpf: Disallow bpf programs call prog_run command.", - "cvss3": { - "Attack Complexity": "Low", - "Attack Vector": "Local", - "Availability": "None", - "Confidentiality": "High", - "Integrity": "None", - "Privileges Required": "Low", - "Scope": "Unchanged", - "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", - "score": 5.5 - }, - "cwe": "Out-of-bounds Read", - "fixes": "86f44fcec22ce2979507742bc53db8400e454f46", - "last_affected_version": "5.19.3", + "cwe": "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')", + "fixes": "8423f0b6d513b259fdab9c9bf4aaa6188d054c2d", + "last_affected_version": "5.19.8", "last_modified": "2023-12-06", - "nvd_text": "There exists an arbitrary memory read within the Linux Kernel BPF - Constants provided to fill pointers in structs passed in to bpf_sys_bpf are not verified and can point anywhere, including memory not owned by BPF. An attacker with CAP_BPF can arbitrarily read memory from anywhere on the system. We recommend upgrading past commit 86f44fcec22c", + "nvd_text": "A race condition flaw was found in the Linux kernel sound subsystem due to improper locking. It could lead to a NULL pointer dereference while handling the SNDCTL_DSP_SYNC ioctl. A privileged local user (root or member of the audio group) could use this flaw to crash the system, resulting in a denial of service condition", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-2785", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-2785", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-2785", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-2785", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-2785", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-2785" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3303", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3303", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-3303", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-3303", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-3303", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-3303" } }, - "CVE-2022-27950": { - "affected_versions": "v5.15-rc1 to v5.17-rc5", - "breaks": "fbf42729d0e91332e8ce75a1ecce08b8a2dab9c1", - "cmt_msg": "HID: elo: fix memory leak in elo_probe", - "cvss2": { - "Access Complexity": "Low", - "Access Vector": "Local Access", - "Authentication": "None", - "Availability Impact": "Partial", - "Confidentiality Impact": "None", - "Integrity Impact": "None", - "raw": "AV:L/AC:L/Au:N/C:N/I:N/A:P", - "score": 2.1 - }, + "CVE-2022-3344": { + "affected_versions": "v2.6.12-rc2 to v6.1-rc7", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "KVM: x86: nSVM: harden svm_free_nested against freeing vmcb02 while still in use", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", @@ -76515,144 +82929,144 @@ "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "score": 5.5 }, - "cwe": "Missing Release of Memory after Effective Lifetime", - "fixes": "817b8b9c5396d2b2d92311b46719aad5d3339dbe", - "last_affected_version": "5.16.10", + "cwe": "Expected Behavior Violation", + "fixes": "16ae56d7e0528559bf8dc9070e3bfd8ba3de80df", + "last_affected_version": "6.0.10", "last_modified": "2023-12-06", - "nvd_text": "In drivers/hid/hid-elo.c in the Linux kernel before 5.16.11, a memory leak exists for a certain hid_parse error condition.", + "nvd_text": "A flaw was found in the KVM's AMD nested virtualization (SVM). A malicious L1 guest could purposely fail to intercept the shutdown of a cooperative nested guest (L2), possibly leading to a page fault and kernel panic in the host (L0).", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-27950", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-27950", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-27950", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-27950", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-27950", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-27950" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3344", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3344", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-3344", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-3344", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-3344", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-3344" } }, - "CVE-2022-28356": { - "affected_versions": "v2.6.12-rc2 to v5.18-rc1", + "CVE-2022-33740": { + "affected_versions": "v2.6.12-rc2 to v5.19-rc6", "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", - "cmt_msg": "llc: fix netdevice reference leaks in llc_ui_bind()", + "cmt_msg": "xen/netfront: fix leaking data in shared pages", "cvss2": { "Access Complexity": "Low", "Access Vector": "Local Access", "Authentication": "None", "Availability Impact": "Partial", - "Confidentiality Impact": "None", + "Confidentiality Impact": "Partial", "Integrity Impact": "None", - "raw": "AV:L/AC:L/Au:N/C:N/I:N/A:P", - "score": 2.1 + "raw": "AV:L/AC:L/Au:N/C:P/I:N/A:P", + "score": 3.6 }, "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", - "Confidentiality": "None", + "Confidentiality": "High", "Integrity": "None", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", - "score": 5.5 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", + "score": 7.1 }, - "cwe": "Unspecified", - "fixes": "764f4eb6846f5475f1244767d24d25dd86528a4a", - "last_affected_version": "5.17.0", + "cwe": "Exposure of Sensitive Information to an Unauthorized Actor", + "fixes": "307c8de2b02344805ebead3440d8feed28f2f010", + "last_affected_version": "5.18.9", "last_modified": "2023-12-06", - "nvd_text": "In the Linux kernel before 5.17.1, a refcount leak bug was found in net/llc/af_llc.c.", + "nvd_text": "Linux disk/nic frontends data leaks T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Linux Block and Network PV device frontends don't zero memory regions before sharing them with the backend (CVE-2022-26365, CVE-2022-33740). Additionally the granularity of the grant table doesn't allow sharing less than a 4K page, leading to unrelated data residing in the same 4K page as data shared with a backend being accessible by such backend (CVE-2022-33741, CVE-2022-33742).", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-28356", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-28356", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-28356", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-28356", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-28356", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-28356" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-33740", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-33740", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-33740", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-33740", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-33740", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-33740" } }, - "CVE-2022-28388": { - "affected_versions": "v3.9-rc1 to v5.18-rc1", - "breaks": "0024d8ad1639e32d717445c69ca813fd19c2a91c", - "cmt_msg": "can: usb_8dev: usb_8dev_start_xmit(): fix double dev_kfree_skb() in error path", + "CVE-2022-33741": { + "affected_versions": "v2.6.12-rc2 to v5.19-rc6", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "xen/netfront: force data bouncing when backend is untrusted", "cvss2": { "Access Complexity": "Low", "Access Vector": "Local Access", "Authentication": "None", "Availability Impact": "Partial", - "Confidentiality Impact": "None", + "Confidentiality Impact": "Partial", "Integrity Impact": "None", - "raw": "AV:L/AC:L/Au:N/C:N/I:N/A:P", - "score": 2.1 + "raw": "AV:L/AC:L/Au:N/C:P/I:N/A:P", + "score": 3.6 }, "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", - "Confidentiality": "None", + "Confidentiality": "High", "Integrity": "None", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", - "score": 5.5 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", + "score": 7.1 }, - "cwe": "Double Free", - "fixes": "3d3925ff6433f98992685a9679613a2cc97f3ce2", - "last_affected_version": "5.17.1", + "cwe": "Exposure of Sensitive Information to an Unauthorized Actor", + "fixes": "4491001c2e0fa69efbb748c96ec96b100a5cdb7e", + "last_affected_version": "5.18.9", "last_modified": "2023-12-06", - "nvd_text": "usb_8dev_start_xmit in drivers/net/can/usb/usb_8dev.c in the Linux kernel through 5.17.1 has a double free.", + "nvd_text": "Linux disk/nic frontends data leaks T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Linux Block and Network PV device frontends don't zero memory regions before sharing them with the backend (CVE-2022-26365, CVE-2022-33740). Additionally the granularity of the grant table doesn't allow sharing less than a 4K page, leading to unrelated data residing in the same 4K page as data shared with a backend being accessible by such backend (CVE-2022-33741, CVE-2022-33742).", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-28388", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-28388", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-28388", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-28388", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-28388", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-28388" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-33741", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-33741", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-33741", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-33741", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-33741", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-33741" } }, - "CVE-2022-28389": { - "affected_versions": "v4.12-rc1 to v5.18-rc1", - "breaks": "51f3baad7de943780ce0c17bd7975df567dd6e14", - "cmt_msg": "can: mcba_usb: mcba_usb_start_xmit(): fix double dev_kfree_skb in error path", + "CVE-2022-33742": { + "affected_versions": "v2.6.12-rc2 to v5.19-rc6", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "xen/blkfront: force data bouncing when backend is untrusted", "cvss2": { "Access Complexity": "Low", "Access Vector": "Local Access", "Authentication": "None", "Availability Impact": "Partial", - "Confidentiality Impact": "None", + "Confidentiality Impact": "Partial", "Integrity Impact": "None", - "raw": "AV:L/AC:L/Au:N/C:N/I:N/A:P", - "score": 2.1 + "raw": "AV:L/AC:L/Au:N/C:P/I:N/A:P", + "score": 3.6 }, "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", - "Confidentiality": "None", + "Confidentiality": "High", "Integrity": "None", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", - "score": 5.5 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", + "score": 7.1 }, - "cwe": "Double Free", - "fixes": "04c9b00ba83594a29813d6b1fb8fdc93a3915174", - "last_affected_version": "5.17.1", + "cwe": "Exposure of Sensitive Information to an Unauthorized Actor", + "fixes": "2400617da7eebf9167d71a46122828bc479d64c9", + "last_affected_version": "5.18.9", "last_modified": "2023-12-06", - "nvd_text": "mcba_usb_start_xmit in drivers/net/can/usb/mcba_usb.c in the Linux kernel through 5.17.1 has a double free.", + "nvd_text": "Linux disk/nic frontends data leaks T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Linux Block and Network PV device frontends don't zero memory regions before sharing them with the backend (CVE-2022-26365, CVE-2022-33740). Additionally the granularity of the grant table doesn't allow sharing less than a 4K page, leading to unrelated data residing in the same 4K page as data shared with a backend being accessible by such backend (CVE-2022-33741, CVE-2022-33742).", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-28389", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-28389", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-28389", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-28389", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-28389", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-28389" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-33742", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-33742", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-33742", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-33742", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-33742", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-33742" } }, - "CVE-2022-28390": { - "affected_versions": "v2.6.32-rc1 to v5.18-rc1", - "breaks": "702171adeed3607ee9603ec30ce081411e36ae42", - "cmt_msg": "can: ems_usb: ems_usb_start_xmit(): fix double dev_kfree_skb() in error path", + "CVE-2022-33743": { + "affected_versions": "v5.9-rc1 to v5.19-rc6", + "breaks": "6c5aa6fc4defc2a0977a2c59e4710d50fa1e834c", + "cmt_msg": "xen-netfront: restore __skb_queue_tail() positioning in xennet_get_responses()", "cvss2": { "Access Complexity": "Low", "Access Vector": "Local Access", @@ -76675,26 +83089,36 @@ "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "score": 7.8 }, - "cwe": "Double Free", - "fixes": "c70222752228a62135cee3409dccefd494a24646", - "last_affected_version": "5.17.1", + "cwe": "Unspecified", + "fixes": "f63c2c2032c2e3caad9add3b82cc6e91c376fd26", + "last_affected_version": "5.18.9", "last_modified": "2023-12-06", - "nvd_text": "ems_usb_start_xmit in drivers/net/can/usb/ems_usb.c in the Linux kernel through 5.17.1 has a double free.", + "nvd_text": "network backend may cause Linux netfront to use freed SKBs While adding logic to support XDP (eXpress Data Path), a code label was moved in a way allowing for SKBs having references (pointers) retained for further processing to nevertheless be freed.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-28390", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-28390", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-28390", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-28390", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-28390", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-28390" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-33743", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-33743", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-33743", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-33743", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-33743", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-33743" } }, - "CVE-2022-2873": { - "affected_versions": "v5.11-rc1 to v5.19-rc1", - "breaks": "5e9a97b1f4491b8b65874901ad084348fcaba327", - "cmt_msg": "i2c: ismt: prevent memory corruption in ismt_access()", + "CVE-2022-33744": { + "affected_versions": "v2.6.12-rc2 to v5.19-rc6", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "xen/arm: Fix race in RB-tree based P2M accounting", + "cvss2": { + "Access Complexity": "Medium", + "Access Vector": "Local Access", + "Authentication": "None", + "Availability Impact": "Partial", + "Confidentiality Impact": "None", + "Integrity Impact": "None", + "raw": "AV:L/AC:M/Au:N/C:N/I:N/A:P", + "score": 1.9 + }, "cvss3": { - "Attack Complexity": "Low", + "Attack Complexity": "High", "Attack Vector": "Local", "Availability": "High", "Confidentiality": "None", @@ -76702,77 +83126,67 @@ "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", - "score": 5.5 + "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", + "score": 4.7 }, - "cwe": "Incorrect Calculation of Buffer Size", - "fixes": "690b2549b19563ec5ad53e5c82f6a944d910086e", - "last_affected_version": "5.18.1", + "cwe": "Unspecified", + "fixes": "b75cd218274e01d026dc5240e86fdeb44bbed0c8", + "last_affected_version": "5.18.9", "last_modified": "2023-12-06", - "nvd_text": "An out-of-bounds memory access flaw was found in the Linux kernel Intel\u2019s iSMT SMBus host controller driver in the way a user triggers the I2C_SMBUS_BLOCK_DATA (with the ioctl I2C_SMBUS) with malicious input data. This flaw allows a local user to crash the system.", + "nvd_text": "Arm guests can cause Dom0 DoS via PV devices When mapping pages of guests on Arm, dom0 is using an rbtree to keep track of the foreign mappings. Updating of that rbtree is not always done completely with the related lock held, resulting in a small race window, which can be used by unprivileged guests via PV devices to cause inconsistencies of the rbtree. These inconsistencies can lead to Denial of Service (DoS) of dom0, e.g. by causing crashes or the inability to perform further mappings of other guests' memory pages.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-2873", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-2873", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-2873", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-2873", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-2873", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-2873" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-33744", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-33744", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-33744", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-33744", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-33744", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-33744" } }, - "CVE-2022-28796": { - "affected_versions": "v5.17-rc3 to v5.18-rc1", - "breaks": "4f98186848707f530669238d90e0562d92a78aab", - "cmt_msg": "jbd2: fix use-after-free of transaction_t race", + "CVE-2022-33981": { + "affected_versions": "v2.6.12-rc2 to v5.18-rc5", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "floppy: disable FDRAWCMD by default", "cvss2": { - "Access Complexity": "Medium", + "Access Complexity": "Low", "Access Vector": "Local Access", "Authentication": "None", - "Availability Impact": "Complete", - "Confidentiality Impact": "Complete", - "Integrity Impact": "Complete", - "raw": "AV:L/AC:M/Au:N/C:C/I:C/A:C", - "score": 6.9 + "Availability Impact": "Partial", + "Confidentiality Impact": "None", + "Integrity Impact": "None", + "raw": "AV:L/AC:L/Au:N/C:N/I:N/A:P", + "score": 2.1 }, "cvss3": { - "Attack Complexity": "High", + "Attack Complexity": "Low", "Attack Vector": "Local", - "Availability": "High", - "Confidentiality": "High", - "Integrity": "High", + "Availability": "Low", + "Confidentiality": "None", + "Integrity": "None", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", - "score": 7.0 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", + "score": 3.3 }, "cwe": "Use After Free", - "fixes": "cc16eecae687912238ee6efbff71ad31e2bc414e", - "last_affected_version": "5.17.0", + "fixes": "233087ca063686964a53c829d547c7571e3f67bf", + "last_affected_version": "5.17.5", "last_modified": "2023-12-06", - "nvd_text": "jbd2_journal_wait_updates in fs/jbd2/transaction.c in the Linux kernel before 5.17.1 has a use-after-free caused by a transaction_t race condition.", + "nvd_text": "drivers/block/floppy.c in the Linux kernel before 5.17.6 is vulnerable to a denial of service, because of a concurrency use-after-free flaw after deallocating raw_cmd in the raw_cmd_ioctl function.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-28796", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-28796", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-28796", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-28796", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-28796", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-28796" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-33981", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-33981", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-33981", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-33981", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-33981", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-33981" } }, - "CVE-2022-28893": { - "affected_versions": "v5.1-rc1 to v5.18-rc2", - "breaks": "a73881c96d73ee72b7dbbd38a6eeef66182a8ef7", - "cmt_msg": "SUNRPC: Ensure we flush any closed sockets before xs_xprt_free()", - "cvss2": { - "Access Complexity": "Low", - "Access Vector": "Local Access", - "Authentication": "None", - "Availability Impact": "Complete", - "Confidentiality Impact": "Complete", - "Integrity Impact": "Complete", - "raw": "AV:L/AC:L/Au:N/C:C/I:C/A:C", - "score": 7.2 - }, + "CVE-2022-3424": { + "affected_versions": "v2.6.33-rc1 to v6.2-rc1", + "breaks": "55484c45dbeca2eec7642932ec3f60f8a2d4bdbf", + "cmt_msg": "misc: sgi-gru: fix use-after-free error in gru_set_context_option, gru_fault and gru_handle_user_call_os", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", @@ -76785,124 +83199,133 @@ "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "score": 7.8 }, - "cwe": "Use After Free", - "fixes": "f00432063db1a0db484e85193eccc6845435b80e", - "last_affected_version": "5.17.2", + "fixes": "643a16a0eb1d6ac23744bb6e90a00fc21148a9dc", + "last_affected_version": "6.1.1", "last_modified": "2023-12-06", - "nvd_text": "The SUNRPC subsystem in the Linux kernel through 5.17.2 can call xs_xprt_free before ensuring that sockets are in the intended state.", + "nvd_text": "A use-after-free flaw was found in the Linux kernel\u2019s SGI GRU driver in the way the first gru_file_unlocked_ioctl function is called by the user, where a fail pass occurs in the gru_check_chiplet_assignment function. This flaw allows a local user to crash or potentially escalate their privileges on the system.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-28893", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-28893", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-28893", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-28893", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-28893", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-28893" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3424", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3424", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-3424", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-3424", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-3424", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-3424" } }, - "CVE-2022-2905": { - "affected_versions": "v5.5-rc1 to v6.0-rc4", - "breaks": "d2e4c1e6c2947269346054ac8937ccfe9e0bcc6b", - "cmt_msg": "bpf: Don't use tnum_range on array range checking for poke descriptors", + "CVE-2022-3435": { + "affected_versions": "v5.18-rc2 to v6.1-rc1", + "breaks": "6bf92d70e690b7ff12b24f4bfff5e5434d019b82", + "cmt_msg": "ipv4: Handle attempt to delete multipath route when fib_info contains an nh reference", "cvss3": { "Attack Complexity": "Low", - "Attack Vector": "Local", + "Attack Vector": "Network", "Availability": "None", - "Confidentiality": "High", + "Confidentiality": "Low", "Integrity": "None", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", - "score": 5.5 + "raw": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "score": 4.3 }, - "cwe": "Out-of-bounds Read", - "fixes": "a657182a5c5150cdfacb6640aad1d2712571a409", - "last_affected_version": "5.19.5", + "cwe": "Improper Restriction of Operations within the Bounds of a Memory Buffer", + "fixes": "61b91eb33a69c3be11b259c5ea484505cd79f883", + "last_affected_version": "6.0.11", "last_modified": "2023-12-06", - "nvd_text": "An out-of-bounds memory read flaw was found in the Linux kernel's BPF subsystem in how a user calls the bpf_tail_call function with a key larger than the max_entries of the map. This flaw allows a local user to gain unauthorized access to data.", + "nvd_text": "A vulnerability classified as problematic has been found in Linux Kernel. This affects the function fib_nh_match of the file net/ipv4/fib_semantics.c of the component IPv4 Handler. The manipulation leads to out-of-bounds read. It is possible to initiate the attack remotely. It is recommended to apply a patch to fix this issue. The identifier VDB-210357 was assigned to this vulnerability.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-2905", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-2905", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-2905", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-2905", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-2905", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-2905" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3435", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3435", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-3435", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-3435", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-3435", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-3435" } - }, - "CVE-2022-29156": { - "affected_versions": "v5.12-rc1-dontuse to v5.17-rc6", - "breaks": "eab098246625e91c1cbd6e8f75b09e4c9c28a9fc", - "cmt_msg": "RDMA/rtrs-clt: Fix possible double free in error case", + }, + "CVE-2022-34494": { + "affected_versions": "v5.13-rc1 to v5.19-rc1", + "breaks": "c486682ae1e2b149add22f44cf413b3103e3ef39", + "cmt_msg": "rpmsg: virtio: Fix possible double free in rpmsg_virtio_add_ctrl_dev()", "cvss2": { "Access Complexity": "Low", "Access Vector": "Local Access", "Authentication": "None", "Availability Impact": "Complete", - "Confidentiality Impact": "Complete", - "Integrity Impact": "Complete", - "raw": "AV:L/AC:L/Au:N/C:C/I:C/A:C", - "score": 7.2 + "Confidentiality Impact": "None", + "Integrity Impact": "None", + "raw": "AV:L/AC:L/Au:N/C:N/I:N/A:C", + "score": 4.9 }, "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", - "Confidentiality": "High", - "Integrity": "High", + "Confidentiality": "None", + "Integrity": "None", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", - "score": 7.8 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "score": 5.5 }, "cwe": "Double Free", - "fixes": "8700af2cc18c919b2a83e74e0479038fd113c15d", - "last_affected_version": "5.16.11", + "fixes": "1680939e9ecf7764fba8689cfb3429c2fe2bb23c", + "last_affected_version": "5.18.3", "last_modified": "2023-12-06", - "nvd_text": "drivers/infiniband/ulp/rtrs/rtrs-clt.c in the Linux kernel before 5.16.12 has a double free related to rtrs_clt_dev_release.", + "nvd_text": "rpmsg_virtio_add_ctrl_dev in drivers/rpmsg/virtio_rpmsg_bus.c in the Linux kernel before 5.18.4 has a double free.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-29156", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-29156", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-29156", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-29156", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-29156", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-29156" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-34494", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-34494", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-34494", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-34494", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-34494", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-34494" } }, - "CVE-2022-2938": { - "affected_versions": "v5.2-rc1 to v5.17-rc2", - "breaks": "0e94682b73bfa6c44c98af7a26771c9c08c055d5", - "cmt_msg": "psi: Fix uaf issue when psi trigger is destroyed while being polled", + "CVE-2022-34495": { + "affected_versions": "v5.13-rc1 to v5.19-rc1", + "breaks": "c486682ae1e2b149add22f44cf413b3103e3ef39", + "cmt_msg": "rpmsg: virtio: Fix possible double free in rpmsg_probe()", + "cvss2": { + "Access Complexity": "Low", + "Access Vector": "Local Access", + "Authentication": "None", + "Availability Impact": "Complete", + "Confidentiality Impact": "None", + "Integrity Impact": "None", + "raw": "AV:L/AC:L/Au:N/C:N/I:N/A:C", + "score": 4.9 + }, "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", - "Confidentiality": "High", - "Integrity": "High", + "Confidentiality": "None", + "Integrity": "None", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", - "score": 7.8 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "score": 5.5 }, - "cwe": "Use After Free", - "fixes": "a06247c6804f1a7c86a2e5398a4c1f1db1471848", - "last_affected_version": "5.16.4", + "cwe": "Double Free", + "fixes": "c2eecefec5df1306eafce28ccdf1ca159a552ecc", + "last_affected_version": "5.18.3", "last_modified": "2023-12-06", - "nvd_text": "A flaw was found in the Linux kernel's implementation of Pressure Stall Information. While the feature is disabled by default, it could allow an attacker to crash the system or have other memory-corruption side effects.", + "nvd_text": "rpmsg_probe in drivers/rpmsg/virtio_rpmsg_bus.c in the Linux kernel before 5.18.4 has a double free.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-2938", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-2938", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-2938", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-2938", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-2938", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-2938" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-34495", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-34495", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-34495", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-34495", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-34495", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-34495" } }, - "CVE-2022-29581": { - "affected_versions": "v4.14 to v5.18-rc4", - "breaks": "35c55fc156d85a396a975fc17636f560fc02fd65", - "cmt_msg": "net/sched: cls_u32: fix netns refcount changes in u32_change()", + "CVE-2022-34918": { + "affected_versions": "v4.1-rc1 to v5.19-rc6", + "breaks": "7d7402642eaf385aef0772eff5a35e34fc4995d7", + "cmt_msg": "netfilter: nf_tables: stricter validation of element data", "cvss2": { "Access Complexity": "Low", "Access Vector": "Local Access", @@ -76925,64 +83348,54 @@ "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "score": 7.8 }, - "cwe": "Unspecified", - "fixes": "3db09e762dc79584a69c10d74a6b98f89a9979f8", - "last_affected_version": "5.17.4", + "cwe": "Access of Resource Using Incompatible Type ('Type Confusion')", + "fixes": "7e6bc1f6cabcd30aba0b11219d8e01b952eacbb6", + "last_affected_version": "5.18.10", "last_modified": "2023-12-06", - "nvd_text": "Improper Update of Reference Count vulnerability in net/sched of Linux Kernel allows local attacker to cause privilege escalation to root. This issue affects: Linux Kernel versions prior to 5.18; version 4.14 and later versions.", + "nvd_text": "An issue was discovered in the Linux kernel through 5.18.9. A type confusion bug in nft_set_elem_init (leading to a buffer overflow) could be used by a local attacker to escalate privileges, a different vulnerability than CVE-2022-32250. (The attacker can obtain root access, but must start with an unprivileged user namespace to obtain CAP_NET_ADMIN access.) This can be fixed in nft_setelem_parse_data in net/netfilter/nf_tables_api.c.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-29581", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-29581", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-29581", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-29581", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-29581", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-29581" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-34918", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-34918", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-34918", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-34918", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-34918", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-34918" } }, - "CVE-2022-29582": { - "affected_versions": "v5.5-rc1 to v5.18-rc2", - "breaks": "2665abfd757fb35a241c6f0b1ebf620e3ffb36fb", - "cmt_msg": "io_uring: fix race between timeout flush and removal", - "cvss2": { - "Access Complexity": "Medium", - "Access Vector": "Local Access", - "Authentication": "None", - "Availability Impact": "Complete", - "Confidentiality Impact": "Complete", - "Integrity Impact": "Complete", - "raw": "AV:L/AC:M/Au:N/C:C/I:C/A:C", - "score": 6.9 - }, + "CVE-2022-3521": { + "affected_versions": "v4.6-rc1 to v6.1-rc1", + "breaks": "ab7ac4eb9832e32a09f4e8042705484d2fb0aad3", + "cmt_msg": "kcm: avoid potential race in kcm_tx_work", "cvss3": { "Attack Complexity": "High", "Attack Vector": "Local", - "Availability": "High", - "Confidentiality": "High", - "Integrity": "High", + "Availability": "Low", + "Confidentiality": "None", + "Integrity": "None", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", - "score": 7.0 + "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L", + "score": 2.5 }, - "cwe": "Use After Free", - "fixes": "e677edbcabee849bfdd43f1602bccbecf736a646", - "last_affected_version": "5.17.2", + "cwe": "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')", + "fixes": "ec7eede369fe5b0d085ac51fdbb95184f87bfc6c", + "last_affected_version": "6.0.9", "last_modified": "2023-12-06", - "nvd_text": "In the Linux kernel before 5.17.3, fs/io_uring.c has a use-after-free due to a race condition in io_uring timeouts. This can be triggered by a local user who has no access to any user namespace; however, the race condition perhaps can only be exploited infrequently.", + "nvd_text": "A vulnerability has been found in Linux Kernel and classified as problematic. This vulnerability affects the function kcm_tx_work of the file net/kcm/kcmsock.c of the component kcm. The manipulation leads to race condition. It is recommended to apply a patch to fix this issue. VDB-211018 is the identifier assigned to this vulnerability.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-29582", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-29582", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-29582", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-29582", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-29582", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-29582" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3521", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3521", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-3521", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-3521", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-3521", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-3521" } }, - "CVE-2022-2959": { - "affected_versions": "v5.8-rc1 to v5.19-rc1", - "breaks": "c73be61cede5882f9605a852414db559c0ebedfd", - "cmt_msg": "pipe: Fix missing lock in pipe_resize_ring()", + "CVE-2022-3522": { + "affected_versions": "v2.6.12-rc2 to v6.1-rc1", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "mm/hugetlb: use hugetlb_pte_stable in migration race check", "cvss3": { "Attack Complexity": "High", "Attack Vector": "Local", @@ -76996,330 +83409,223 @@ "score": 7.0 }, "cwe": "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')", - "fixes": "189b0ddc245139af81198d1a3637cac74f96e13a", - "last_affected_version": "5.18.1", + "fixes": "f9bf6c03eca1077cae8de0e6d86427656fa42a9b", "last_modified": "2023-12-06", - "nvd_text": "A race condition was found in the Linux kernel's watch queue due to a missing lock in pipe_resize_ring(). The specific flaw exists within the handling of pipe buffers. The issue results from the lack of proper locking when performing operations on an object. This flaw allows a local user to crash the system or escalate their privileges on the system.", + "nvd_text": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-2959", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-2959", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-2959", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-2959", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-2959", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-2959" - } + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3522", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3522", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-3522", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-3522", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-3522", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-3522" + }, + "rejected": true }, - "CVE-2022-2961": { - "affected_versions": "unk to unk", - "breaks": "", + "CVE-2022-3523": { + "affected_versions": "v2.6.12-rc2 to v6.1-rc1", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "mm/memory.c: fix race when faulting a device private page", "cvss3": { "Attack Complexity": "High", - "Attack Vector": "Local", + "Attack Vector": "Network", "Availability": "High", - "Confidentiality": "High", - "Integrity": "High", + "Confidentiality": "None", + "Integrity": "None", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", - "score": 7.0 + "raw": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", + "score": 5.3 }, "cwe": "Use After Free", - "fixes": "", + "fixes": "16ce101db85db694a91380aa4c89b25530871d33", "last_modified": "2023-12-06", - "nvd_text": "A use-after-free flaw was found in the Linux kernel\u2019s PLP Rose functionality in the way a user triggers a race condition by calling bind while simultaneously triggering the rose_bind() function. This flaw allows a local user to crash or potentially escalate their privileges on the system.", + "nvd_text": "A vulnerability was found in Linux Kernel. It has been classified as problematic. Affected is an unknown function of the file mm/memory.c of the component Driver Handler. The manipulation leads to use after free. It is possible to launch the attack remotely. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211020.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-2961", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-2961", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-2961", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-2961", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-2961", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-2961" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3523", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3523", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-3523", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-3523", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-3523", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-3523" } }, - "CVE-2022-2964": { - "affected_versions": "v3.9-rc2 to v5.17-rc4", - "breaks": "e2ca90c276e1fc410d7cd3c1a4eee245ec902a20", - "cmt_msg": "net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup", + "CVE-2022-3524": { + "affected_versions": "v2.6.12-rc2 to v6.1-rc1", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "tcp/udp: Fix memory leak in ipv6_renew_options().", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", - "Confidentiality": "High", - "Integrity": "High", + "Confidentiality": "None", + "Integrity": "None", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", - "score": 7.8 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "score": 5.5 }, - "cwe": "Out-of-bounds Write", - "fixes": "57bc3d3ae8c14df3ceb4e17d26ddf9eeab304581", - "last_affected_version": "5.16.9", + "cwe": "Improper Resource Shutdown or Release", + "fixes": "3c52c6bb831f6335c176a0fc7214e26f43adbd11", + "last_affected_version": "6.0.6", "last_modified": "2023-12-06", - "nvd_text": "A flaw was found in the Linux kernel\u2019s driver for the ASIX AX88179_178A-based USB 2.0/3.0 Gigabit Ethernet Devices. The vulnerability contains multiple out-of-bounds reads and possible out-of-bounds writes.", + "nvd_text": "A vulnerability was found in Linux Kernel. It has been declared as problematic. Affected by this vulnerability is the function ipv6_renew_options of the component IPv6 Handler. The manipulation leads to memory leak. The attack can be launched remotely. It is recommended to apply a patch to fix this issue. The identifier VDB-211021 was assigned to this vulnerability.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-2964", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-2964", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-2964", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-2964", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-2964", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-2964" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3524", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3524", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-3524", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-3524", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-3524", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-3524" } }, - "CVE-2022-2977": { - "affected_versions": "v4.12-rc1 to v5.18-rc1", - "breaks": "fdc915f7f71939ad5a3dda3389b8d2d7a7c5ee66", - "cmt_msg": "tpm: fix reference counting for struct tpm_chip", + "CVE-2022-3526": { + "affected_versions": "v5.13-rc1 to v5.18-rc3", + "breaks": "427f0c8c194b22edcafef1b0a42995ddc5c2227d", + "cmt_msg": "macvlan: Fix leaking skb in source mode with nodst option", "cvss3": { "Attack Complexity": "Low", - "Attack Vector": "Local", + "Attack Vector": "Network", "Availability": "High", - "Confidentiality": "High", - "Integrity": "High", - "Privileges Required": "Low", + "Confidentiality": "None", + "Integrity": "None", + "Privileges Required": "None", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", - "score": 7.8 + "raw": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "score": 7.5 }, - "cwe": "Use After Free", - "fixes": "7e0438f83dc769465ee663bb5dcf8cc154940712", - "last_affected_version": "5.17.0", + "cwe": "Missing Release of Memory after Effective Lifetime", + "fixes": "e16b859872b87650bb55b12cca5a5fcdc49c1442", + "last_affected_version": "5.17.3", "last_modified": "2023-12-06", - "nvd_text": "A flaw was found in the Linux kernel implementation of proxied virtualized TPM devices. On a system where virtualized TPM devices are configured (this is not the default) a local attacker can create a use-after-free and create a situation where it may be possible to escalate privileges on the system.", + "nvd_text": "A vulnerability classified as problematic was found in Linux Kernel. This vulnerability affects the function macvlan_handle_frame of the file drivers/net/macvlan.c of the component skb. The manipulation leads to memory leak. The attack can be initiated remotely. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211024.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-2977", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-2977", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-2977", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-2977", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-2977", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-2977" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3526", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3526", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-3526", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-3526", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-3526", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-3526" } }, - "CVE-2022-2978": { - "affected_versions": "v2.6.12-rc2 to v6.1-rc1", - "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", - "cmt_msg": "fs: fix UAF/GPF bug in nilfs_mdt_destroy", - "cvss3": { - "Attack Complexity": "Low", - "Attack Vector": "Local", - "Availability": "High", - "Confidentiality": "High", - "Integrity": "High", - "Privileges Required": "Low", - "Scope": "Unchanged", - "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", - "score": 7.8 - }, - "cwe": "Use After Free", - "fixes": "2e488f13755ffbb60f307e991b27024716a33b29", - "last_affected_version": "6.0.0", + "CVE-2022-3531": { + "affected_versions": "v5.19-rc1 to v6.2-rc1", + "breaks": "5b6c7e5c44349b29c614e1b61f80c6849fc72ccf", + "cmt_msg": "selftest/bpf: Fix memory leak in kprobe_multi_test", + "fixes": "6d2e21dc4db3933db65293552ecc1ede26febeca", + "last_affected_version": "6.1.1", "last_modified": "2023-12-06", - "nvd_text": "A flaw use after free in the Linux kernel NILFS file system was found in the way user triggers function security_inode_alloc to fail with following call to function nilfs_mdt_destroy. A local user could use this flaw to crash the system or potentially escalate their privileges on the system.", + "nvd_text": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-2978", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-2978", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-2978", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-2978", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-2978", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-2978" - } - }, - "CVE-2022-29900": { - "affected_versions": "v2.6.12-rc2 to v5.19-rc7", - "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", - "cmt_msg": "x86/kvm/vmx: Make noinstr clean", - "cvss2": { - "Access Complexity": "Low", - "Access Vector": "Local Access", - "Authentication": "None", - "Availability Impact": "None", - "Confidentiality Impact": "Partial", - "Integrity Impact": "None", - "raw": "AV:L/AC:L/Au:N/C:P/I:N/A:N", - "score": 2.1 - }, - "cvss3": { - "Attack Complexity": "Low", - "Attack Vector": "Local", - "Availability": "None", - "Confidentiality": "High", - "Integrity": "None", - "Privileges Required": "Low", - "Scope": "Changed", - "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", - "score": 6.5 + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3531", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3531", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-3531", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-3531", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-3531", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-3531" }, - "cwe": "Exposure of Sensitive Information to an Unauthorized Actor", - "fixes": "742ab6df974ae8384a2dd213db1a3a06cf6d8936", - "last_affected_version": "5.18.13", - "last_modified": "2023-12-06", - "nvd_text": "Mis-trained branch predictions for return instructions may allow arbitrary speculative code execution under certain microarchitecture-dependent conditions.", - "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-29900", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-29900", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-29900", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-29900", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-29900", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-29900" - } + "rejected": true }, - "CVE-2022-29901": { - "affected_versions": "v2.6.12-rc2 to v5.19-rc7", - "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", - "cmt_msg": "x86/kvm/vmx: Make noinstr clean", - "cvss2": { - "Access Complexity": "Medium", - "Access Vector": "Local Access", - "Authentication": "None", - "Availability Impact": "None", - "Confidentiality Impact": "Partial", - "Integrity Impact": "None", - "raw": "AV:L/AC:M/Au:N/C:P/I:N/A:N", - "score": 1.9 - }, - "cvss3": { - "Attack Complexity": "Low", - "Attack Vector": "Local", - "Availability": "None", - "Confidentiality": "High", - "Integrity": "None", - "Privileges Required": "Low", - "Scope": "Changed", - "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", - "score": 6.5 - }, - "cwe": "Exposure of Resource to Wrong Sphere", - "fixes": "742ab6df974ae8384a2dd213db1a3a06cf6d8936", - "last_affected_version": "5.18.13", + "CVE-2022-3532": { + "affected_versions": "v6.1-rc1 to v6.2-rc1", + "breaks": "1642a3945e223a922312fab2401ecdf58b3825b9", + "cmt_msg": "selftests/bpf: Fix memory leak caused by not destroying skeleton", + "fixes": "6e8280b958c5d7edc514cf347a800b23b7732b2b", + "last_affected_version": "6.1.1", "last_modified": "2023-12-06", - "nvd_text": "Intel microprocessor generations 6 to 8 are affected by a new Spectre variant that is able to bypass their retpoline mitigation in the kernel to leak arbitrary data. An attacker with unprivileged user access can hijack return instructions to achieve arbitrary speculative code execution under certain microarchitecture-dependent conditions.", + "nvd_text": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-29901", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-29901", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-29901", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-29901", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-29901", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-29901" - } - }, - "CVE-2022-2991": { - "affected_versions": "v4.4-rc1 to v5.15-rc1", - "breaks": "cd9e9808d18fe7107c306f6e71c8be7230ee42b4", - "cmt_msg": "remove the lightnvm subsystem", - "cvss3": { - "Attack Complexity": "Low", - "Attack Vector": "Local", - "Availability": "High", - "Confidentiality": "High", - "Integrity": "High", - "Privileges Required": "High", - "Scope": "Unchanged", - "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", - "score": 6.7 + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3532", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3532", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-3532", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-3532", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-3532", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-3532" }, - "cwe": "Out-of-bounds Write", - "fixes": "9ea9b9c48387edc101d56349492ad9c0492ff78d", - "last_modified": "2023-12-06", - "nvd_text": "A heap-based buffer overflow was found in the Linux kernel's LightNVM subsystem. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. This vulnerability allows a local attacker to escalate privileges and execute arbitrary code in the context of the kernel. The attacker must first obtain the ability to execute high-privileged code on the target system to exploit this vulnerability.", - "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-2991", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-2991", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-2991", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-2991", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-2991", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-2991" - } + "rejected": true }, - "CVE-2022-29968": { - "affected_versions": "v5.16-rc1 to v5.18-rc5", - "breaks": "3e08773c3841e9db7a520908cc2b136a77d275ff", - "cmt_msg": "io_uring: fix uninitialized field in rw io_kiocb", - "cvss2": { - "Access Complexity": "Low", - "Access Vector": "Local Access", - "Authentication": "None", - "Availability Impact": "Partial", - "Confidentiality Impact": "Partial", - "Integrity Impact": "Partial", - "raw": "AV:L/AC:L/Au:N/C:P/I:P/A:P", - "score": 4.6 - }, + "CVE-2022-3533": { + "affected_versions": "unk to unk", + "breaks": "", "cvss3": { "Attack Complexity": "Low", - "Attack Vector": "Local", + "Attack Vector": "Adjacent", "Availability": "High", - "Confidentiality": "High", - "Integrity": "High", + "Confidentiality": "None", + "Integrity": "None", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", - "score": 7.8 + "raw": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "score": 5.7 }, - "cwe": "Missing Initialization of Resource", - "fixes": "32452a3eb8b64e01e2be717f518c0be046975b9d", - "last_affected_version": "5.17.5", + "fixes": "", "last_modified": "2023-12-06", - "nvd_text": "An issue was discovered in the Linux kernel through 5.17.5. io_rw_init_file in fs/io_uring.c lacks initialization of kiocb->private.", + "nvd_text": "A vulnerability was found in Linux Kernel. It has been rated as problematic. This issue affects the function parse_usdt_arg of the file tools/lib/bpf/usdt.c of the component BPF. The manipulation of the argument reg_name leads to memory leak. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-211031.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-29968", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-29968", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-29968", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-29968", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-29968", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-29968" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3533", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3533", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-3533", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-3533", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-3533", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-3533" } }, - "CVE-2022-3028": { - "affected_versions": "v2.6.12-rc2 to v6.0-rc3", - "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", - "cmt_msg": "af_key: Do not call xfrm_probe_algs in parallel", + "CVE-2022-3534": { + "affected_versions": "unk to v6.2-rc1", + "breaks": "", + "cmt_msg": "libbpf: Fix use-after-free in btf_dump_name_dups", "cvss3": { - "Attack Complexity": "High", - "Attack Vector": "Local", + "Attack Complexity": "Low", + "Attack Vector": "Adjacent", "Availability": "High", "Confidentiality": "High", "Integrity": "High", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", - "score": 7.0 + "raw": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 8.0 }, - "cwe": "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')", - "fixes": "ba953a9d89a00c078b85f4b190bc1dde66fe16b5", - "last_affected_version": "5.19.5", + "cwe": "Use After Free", + "fixes": "93c660ca40b5d2f7c1b1626e955a8e9fa30e0749", + "last_affected_version": "6.1.1", "last_modified": "2023-12-06", - "nvd_text": "A race condition was found in the Linux kernel's IP framework for transforming packets (XFRM subsystem) when multiple calls to xfrm_probe_algs occurred simultaneously. This flaw could allow a local attacker to potentially trigger an out-of-bounds write or leak kernel heap memory by performing an out-of-bounds read and copying it into a socket.", + "nvd_text": "A vulnerability classified as critical has been found in Linux Kernel. Affected is the function btf_dump_name_dups of the file tools/lib/bpf/btf_dump.c of the component libbpf. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211032.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3028", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3028", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-3028", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-3028", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-3028", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-3028" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3534", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3534", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-3534", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-3534", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-3534", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-3534" } }, - "CVE-2022-30594": { - "affected_versions": "v4.3-rc1 to v5.18-rc1", - "breaks": "13c4a90119d28cfcb6b5bdd820c233b86c2b0237", - "cmt_msg": "ptrace: Check PTRACE_O_SUSPEND_SECCOMP permission on PTRACE_SEIZE", - "cvss2": { - "Access Complexity": "Medium", - "Access Vector": "Local Access", - "Authentication": "None", - "Availability Impact": "Partial", - "Confidentiality Impact": "Partial", - "Integrity Impact": "Partial", - "raw": "AV:L/AC:M/Au:N/C:P/I:P/A:P", - "score": 4.4 + "CVE-2022-3535": { + "affected_versions": "v4.19-rc1 to v6.1-rc1", + "breaks": "21da57a23125a072e6ab2bb6c9bea5e02e01d1f5", + "cmt_msg": "net: mvpp2: fix mvpp2 debugfs leak", + "fixes": "0152dfee235e87660f52a117fc9f70dc55956bb4", + "last_affected_version": "6.0.2", + "last_modified": "2023-12-06", + "nvd_text": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3535", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3535", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-3535", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-3535", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-3535", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-3535" }, + "rejected": true + }, + "CVE-2022-3541": { + "affected_versions": "v5.19-rc1 to v6.1-rc1", + "breaks": "fd3040b9394c58bcedb83554bcf1a073021d6b36", + "cmt_msg": "eth: sp7021: fix use after free bug in spl2sw_nvmem_get_mac_address", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", @@ -77332,24 +83638,42 @@ "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "score": 7.8 }, - "cwe": "Incorrect Default Permissions", - "fixes": "ee1fee900537b5d9560e9f937402de5ddc8412f3", - "last_affected_version": "5.17.1", + "cwe": "Improper Restriction of Operations within the Bounds of a Memory Buffer", + "fixes": "12aece8b01507a2d357a1861f470e83621fbb6f2", + "last_affected_version": "6.0.2", "last_modified": "2023-12-06", - "nvd_text": "The Linux kernel before 5.17.2 mishandles seccomp permissions. The PTRACE_SEIZE code path allows attackers to bypass intended restrictions on setting the PT_SUSPEND_SECCOMP flag.", + "nvd_text": "A vulnerability classified as critical has been found in Linux Kernel. This affects the function spl2sw_nvmem_get_mac_address of the file drivers/net/ethernet/sunplus/spl2sw_driver.c of the component BPF. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier VDB-211041 was assigned to this vulnerability.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-30594", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-30594", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-30594", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-30594", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-30594", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-30594" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3541", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3541", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-3541", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-3541", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-3541", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-3541" } }, - "CVE-2022-3061": { - "affected_versions": "v3.4-rc1 to v5.18-rc5", - "breaks": "5350c65f4f15bbc111ffa629130d3f32cdd4ccf6", - "cmt_msg": "video: fbdev: i740fb: Error out if 'pixclock' equals zero", + "CVE-2022-3542": { + "affected_versions": "v3.16-rc6 to v6.1-rc1", + "breaks": "07b0f00964def8af9321cfd6c4a7e84f6362f728", + "cmt_msg": "bnx2x: fix potential memory leak in bnx2x_tpa_stop()", + "fixes": "b43f9acbb8942b05252be83ac25a81cec70cc192", + "last_affected_version": "6.0.2", + "last_modified": "2023-12-06", + "nvd_text": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3542", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3542", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-3542", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-3542", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-3542", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-3542" + }, + "rejected": true + }, + "CVE-2022-3543": { + "affected_versions": "v5.15-rc1 to v6.1-rc1", + "breaks": "314001f0bf927015e459c9d387d62a231fe93af3", + "cmt_msg": "af_unix: Fix memory leaks of the whole sk due to OOB skb.", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", @@ -77362,24 +83686,23 @@ "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "score": 5.5 }, - "cwe": "Divide By Zero", - "fixes": "15cf0b82271b1823fb02ab8c377badba614d95d5", - "last_affected_version": "5.15.69", + "cwe": "Improper Resource Shutdown or Release", + "fixes": "7a62ed61367b8fd01bae1e18e30602c25060d824", + "last_affected_version": "6.0.2", "last_modified": "2023-12-06", - "nvd_text": "Found Linux Kernel flaw in the i740 driver. The Userspace program could pass any values to the driver through ioctl() interface. The driver doesn't check the value of 'pixclock', so it may cause a divide by zero error.", + "nvd_text": "A vulnerability, which was classified as problematic, has been found in Linux Kernel. This issue affects the function unix_sock_destructor/unix_release_sock of the file net/unix/af_unix.c of the component BPF. The manipulation leads to memory leak. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-211043.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3061", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3061", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-3061", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-3061", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-3061", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-3061" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3543", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3543", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-3543", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-3543", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-3543", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-3543" } }, - "CVE-2022-3077": { - "affected_versions": "v5.11-rc1 to v5.19-rc1", - "breaks": "5e9a97b1f4491b8b65874901ad084348fcaba327", - "cmt_msg": "i2c: ismt: prevent memory corruption in ismt_access()", + "CVE-2022-3544": { + "affected_versions": "v5.18-rc1 to unk", + "breaks": "a61ea561c87139992fe32afdee48a6f6b85d824a", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", @@ -77392,54 +83715,83 @@ "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "score": 5.5 }, - "cwe": "Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')", - "fixes": "690b2549b19563ec5ad53e5c82f6a944d910086e", - "last_affected_version": "5.18.1", + "cwe": "Improper Resource Shutdown or Release", + "fixes": "damon/sysfs: fix possible memleak on damon_sysfs_add_target", "last_modified": "2023-12-06", - "nvd_text": "A buffer overflow vulnerability was found in the Linux kernel Intel\u2019s iSMT SMBus host controller driver in the way it handled the I2C_SMBUS_BLOCK_PROC_CALL case (via the ioctl I2C_SMBUS) with malicious input data. This flaw could allow a local user to crash the system.", + "nvd_text": "A vulnerability, which was classified as problematic, was found in Linux Kernel. Affected is the function damon_sysfs_add_target of the file mm/damon/sysfs.c of the component Netfilter. The manipulation leads to memory leak. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211044.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3077", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3077", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-3077", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-3077", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-3077", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-3077" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3544", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3544", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-3544", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-3544", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-3544", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-3544" } }, - "CVE-2022-3078": { - "affected_versions": "v5.10-rc1 to v5.18-rc1", - "breaks": "f90cf6079bf67988f8b1ad1ade70fc89d0080905", - "cmt_msg": "media: vidtv: Check for null return of vzalloc", + "CVE-2022-3545": { + "affected_versions": "v2.6.12-rc2 to v6.0-rc1", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "nfp: fix use-after-free in area_cache_get()", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", - "Confidentiality": "None", - "Integrity": "None", + "Confidentiality": "High", + "Integrity": "High", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", - "score": 5.5 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 7.8 }, - "cwe": "NULL Pointer Dereference", - "fixes": "e6a21a14106d9718aa4f8e115b1e474888eeba44", - "last_affected_version": "5.17.1", + "cwe": "Improper Restriction of Operations within the Bounds of a Memory Buffer", + "fixes": "02e1a114fdb71e59ee6770294166c30d437bf86a", + "last_affected_version": "5.15.83", "last_modified": "2023-12-06", - "nvd_text": "An issue was discovered in the Linux kernel through 5.16-rc6. There is a lack of check after calling vzalloc() and lack of free after allocation in drivers/media/test-drivers/vidtv/vidtv_s302m.c.", + "nvd_text": "A vulnerability has been found in Linux Kernel and classified as critical. Affected by this vulnerability is the function area_cache_get of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier VDB-211045 was assigned to this vulnerability.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3078", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3078", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-3078", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-3078", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-3078", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-3078" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3545", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3545", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-3545", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-3545", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-3545", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-3545" } }, - "CVE-2022-3103": { - "affected_versions": "v6.0-rc1 to v6.0-rc3", - "breaks": "78a861b9495920f8609dee5b670dacbff09d359f", - "cmt_msg": "io_uring: fix off-by-one in sync cancelation file check", + "CVE-2022-3564": { + "affected_versions": "v3.6-rc1 to v6.1-rc4", + "breaks": "4b51dae96731c9d82f5634e75ac7ffd3b9c1b060", + "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free caused by l2cap_reassemble_sdu", + "cvss3": { + "Attack Complexity": "High", + "Attack Vector": "Adjacent", + "Availability": "High", + "Confidentiality": "High", + "Integrity": "High", + "Privileges Required": "Low", + "Scope": "Unchanged", + "User Interaction": "None", + "raw": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 7.1 + }, + "cwe": "Improper Restriction of Operations within the Bounds of a Memory Buffer", + "fixes": "3aff8aaca4e36dc8b17eaa011684881a80238966", + "last_affected_version": "6.0.7", + "last_modified": "2023-12-06", + "nvd_text": "A vulnerability classified as critical was found in Linux Kernel. Affected by this vulnerability is the function l2cap_reassemble_sdu of the file net/bluetooth/l2cap_core.c of the component Bluetooth. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-211087.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3564", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3564", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-3564", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-3564", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-3564", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-3564" + } + }, + "CVE-2022-3565": { + "affected_versions": "v2.6.27-rc1 to v6.1-rc1", + "breaks": "3712b42d4b1bec29a4232a6673bf2e6dcc5faa68", + "cmt_msg": "mISDN: fix use-after-free bugs in l1oip timer handlers", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", @@ -77452,83 +83804,112 @@ "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "score": 7.8 }, - "cwe": "Off-by-one Error", - "fixes": "47abea041f897d64dbd5777f0cf7745148f85d75", + "cwe": "Improper Restriction of Operations within the Bounds of a Memory Buffer", + "fixes": "2568a7e0832ee30b0a351016d03062ab4e0e0a3f", + "last_affected_version": "6.0.2", "last_modified": "2023-12-06", - "nvd_text": "off-by-one in io_uring module.", + "nvd_text": "A vulnerability, which was classified as critical, has been found in Linux Kernel. Affected by this issue is the function del_timer of the file drivers/isdn/mISDN/l1oip_core.c of the component Bluetooth. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211088.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3103", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3103", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-3103", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-3103", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-3103", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-3103" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3565", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3565", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-3565", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-3565", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-3565", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-3565" } }, - "CVE-2022-3104": { - "affected_versions": "v5.7-rc1 to v5.19-rc1", - "breaks": "ae2e1aad3e48e495878d9f149e437a308bfdaefa", - "cmt_msg": "lkdtm/bugs: Check for the NULL pointer after calling kmalloc", + "CVE-2022-3566": { + "affected_versions": "v2.6.12-rc2 to v6.1-rc1", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "tcp: Fix data races around icsk->icsk_af_ops.", "cvss3": { - "Attack Complexity": "Low", - "Attack Vector": "Local", + "Attack Complexity": "High", + "Attack Vector": "Adjacent", "Availability": "High", - "Confidentiality": "None", - "Integrity": "None", + "Confidentiality": "High", + "Integrity": "High", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", - "score": 5.5 + "raw": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 7.1 }, - "cwe": "NULL Pointer Dereference", - "fixes": "4a9800c81d2f34afb66b4b42e0330ae8298019a2", - "last_affected_version": "5.18.3", + "cwe": "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')", + "fixes": "f49cd2f4d6170d27a2c61f1fecb03d8a70c91f57", "last_modified": "2023-12-06", - "nvd_text": "An issue was discovered in the Linux kernel through 5.16-rc6. lkdtm_ARRAY_BOUNDS in drivers/misc/lkdtm/bugs.c lacks check of the return value of kmalloc() and will cause the null pointer dereference.", + "nvd_text": "A vulnerability, which was classified as problematic, was found in Linux Kernel. This affects the function tcp_getsockopt/tcp_setsockopt of the component TCP Handler. The manipulation leads to race condition. It is recommended to apply a patch to fix this issue. The identifier VDB-211089 was assigned to this vulnerability.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3104", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3104", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-3104", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-3104", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-3104", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-3104" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3566", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3566", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-3566", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-3566", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-3566", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-3566" } }, - "CVE-2022-3105": { - "affected_versions": "v5.0-rc1 to v5.16", - "breaks": "6884c6c4bd09fb35b79a3967d15821cdfcbe77a3", - "cmt_msg": "RDMA/uverbs: Check for null return of kmalloc_array", + "CVE-2022-3567": { + "affected_versions": "v2.6.12-rc2 to v6.1-rc1", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "ipv6: Fix data races around sk->sk_prot.", + "cvss3": { + "Attack Complexity": "High", + "Attack Vector": "Adjacent", + "Availability": "High", + "Confidentiality": "Low", + "Integrity": "Low", + "Privileges Required": "None", + "Scope": "Unchanged", + "User Interaction": "None", + "raw": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H", + "score": 6.4 + }, + "cwe": "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')", + "fixes": "364f997b5cfe1db0d63a390fe7c801fa2b3115f6", + "last_modified": "2023-12-06", + "nvd_text": "A vulnerability has been found in Linux Kernel and classified as problematic. This vulnerability affects the function inet6_stream_ops/inet6_dgram_ops of the component IPv6 Handler. The manipulation leads to race condition. It is recommended to apply a patch to fix this issue. VDB-211090 is the identifier assigned to this vulnerability.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3567", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3567", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-3567", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-3567", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-3567", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-3567" + } + }, + "CVE-2022-3577": { + "affected_versions": "v4.20-rc1 to v5.19-rc1", + "breaks": "256a90ed9e46b270bbc4e15ef05216ff049c3721", + "cmt_msg": "HID: bigben: fix slab-out-of-bounds Write in bigben_probe", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", - "Confidentiality": "None", - "Integrity": "None", + "Confidentiality": "High", + "Integrity": "High", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", - "score": 5.5 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 7.8 }, - "cwe": "NULL Pointer Dereference", - "fixes": "7694a7de22c53a312ea98960fcafc6ec62046531", - "last_affected_version": "5.15", + "cwe": "Out-of-bounds Write", + "fixes": "fc4ef9d5724973193bfa5ebed181dba6de3a56db", + "last_affected_version": "5.18.2", "last_modified": "2023-12-06", - "nvd_text": "An issue was discovered in the Linux kernel through 5.16-rc6. uapi_finalize in drivers/infiniband/core/uverbs_uapi.c lacks check of kmalloc_array().", + "nvd_text": "An out-of-bounds memory write flaw was found in the Linux kernel\u2019s Kid-friendly Wired Controller driver. This flaw allows a local user to crash or potentially escalate their privileges on the system. It is in bigben_probe of drivers/hid/hid-bigbenff.c. The reason is incorrect assumption - bigben devices all have inputs. However, malicious devices can break this assumption, leaking to out-of-bound write.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3105", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3105", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-3105", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-3105", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-3105", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-3105" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3577", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3577", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-3577", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-3577", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-3577", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-3577" } }, - "CVE-2022-3106": { - "affected_versions": "v5.9-rc1 to v5.16-rc6", - "breaks": "b593b6f1b4921700c00394d35e098259e3d04913", - "cmt_msg": "sfc_ef100: potential dereference of null pointer", + "CVE-2022-3586": { + "affected_versions": "v2.6.39-rc1 to v6.0-rc5", + "breaks": "e13e02a3c68d899169c78d9a18689bd73491d59a", + "cmt_msg": "sch_sfb: Don't assume the skb is still around after enqueueing to child", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", @@ -77541,54 +83922,55 @@ "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "score": 5.5 }, - "cwe": "NULL Pointer Dereference", - "fixes": "407ecd1bd726f240123f704620d46e285ff30dd9", - "last_affected_version": "5.15.10", + "cwe": "Use After Free", + "fixes": "9efd23297cca530bb35e1848665805d3fcdd7889", + "last_affected_version": "5.19.8", "last_modified": "2023-12-06", - "nvd_text": "An issue was discovered in the Linux kernel through 5.16-rc6. ef100_update_stats in drivers/net/ethernet/sfc/ef100_nic.c lacks check of the return value of kmalloc().", + "nvd_text": "A flaw was found in the Linux kernel\u2019s networking code. A use-after-free was found in the way the sch_sfb enqueue function used the socket buffer (SKB) cb field after the same SKB had been enqueued (and freed) into a child qdisc. This flaw allows a local, unprivileged user to crash the system, causing a denial of service.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3106", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3106", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-3106", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-3106", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-3106", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-3106" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3586", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3586", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-3586", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-3586", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-3586", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-3586" } }, - "CVE-2022-3107": { - "affected_versions": "v4.19-rc1 to v5.17", - "breaks": "6ae746711263bd6da45f709fdb9f12e4f57e22bd", - "cmt_msg": "hv_netvsc: Add check for kvmalloc_array", + "CVE-2022-3594": { + "affected_versions": "v3.12-rc1 to v6.1-rc1", + "breaks": "40a82917b1d3a8aecedee6b64949795b75359731", + "cmt_msg": "r8152: Rate limit overflow messages", "cvss3": { "Attack Complexity": "Low", - "Attack Vector": "Local", - "Availability": "High", + "Attack Vector": "Network", + "Availability": "Low", "Confidentiality": "None", "Integrity": "None", - "Privileges Required": "Low", + "Privileges Required": "None", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", - "score": 5.5 + "raw": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "score": 5.3 }, - "cwe": "NULL Pointer Dereference", - "fixes": "886e44c9298a6b428ae046e2fa092ca52e822e6a", - "last_affected_version": "5.16", + "cwe": "Improper Resource Shutdown or Release", + "fixes": "93e2be344a7db169b7119de21ac1bf253b8c6907", + "last_affected_version": "6.0.2", "last_modified": "2023-12-06", - "nvd_text": "An issue was discovered in the Linux kernel through 5.16-rc6. netvsc_get_ethtool_stats in drivers/net/hyperv/netvsc_drv.c lacks check of the return value of kvmalloc_array() and will cause the null pointer dereference.", + "nvd_text": "A vulnerability was found in Linux Kernel. It has been declared as problematic. Affected by this vulnerability is the function intr_callback of the file drivers/net/usb/r8152.c of the component BPF. The manipulation leads to logging of excessive data. The attack can be launched remotely. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-211363.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3107", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3107", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-3107", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-3107", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-3107", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-3107" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3594", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3594", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-3594", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-3594", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-3594", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-3594" } }, - "CVE-2022-3108": { - "affected_versions": "v4.16-rc1 to v5.17-rc1", - "breaks": "3a87177eb14113bbe8cd95a276af2c412eced6ac", - "cmt_msg": "drm/amdkfd: Check for null pointer after calling kmemdup", + "CVE-2022-3595": { + "affected_versions": "unk to v6.1-rc1", + "backport": true, + "breaks": "a4e430c8c8ba96be8c6ec4f2eb108bb8bcbee069", + "cmt_msg": "cifs: fix double-fault crash during ntlmssp", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", @@ -77601,24 +83983,23 @@ "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "score": 5.5 }, - "cwe": "Unchecked Return Value", - "fixes": "abfaf0eee97925905e742aa3b0b72e04a918fa9e", - "last_affected_version": "5.16.2", + "cwe": "Double Free", + "fixes": "b854b4ee66437e6e1622fda90529c814978cb4ca", + "last_affected_version": "6.0.15", "last_modified": "2023-12-06", - "nvd_text": "An issue was discovered in the Linux kernel through 5.16-rc6. kfd_parse_subtype_iolink in drivers/gpu/drm/amd/amdkfd/kfd_crat.c lacks check of the return value of kmemdup().", + "nvd_text": "A vulnerability was found in Linux Kernel. It has been rated as problematic. Affected by this issue is the function sess_free_buffer of the file fs/cifs/sess.c of the component CIFS Handler. The manipulation leads to double free. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211364.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3108", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3108", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-3108", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-3108", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-3108", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-3108" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3595", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3595", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-3595", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-3595", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-3595", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-3595" } }, - "CVE-2022-3110": { - "affected_versions": "v5.15-rc1 to v5.19-rc1", - "breaks": "15865124feed880978b79839c756ef6cbb4ec6b3", - "cmt_msg": "staging: r8188eu: add check for kzalloc", + "CVE-2022-3606": { + "affected_versions": "unk to unk", + "breaks": "", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", @@ -77631,372 +84012,374 @@ "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "score": 5.5 }, - "cwe": "NULL Pointer Dereference", - "fixes": "f94b47c6bde624d6c07f43054087607c52054a95", - "last_affected_version": "5.18.3", + "fixes": "", "last_modified": "2023-12-06", - "nvd_text": "An issue was discovered in the Linux kernel through 5.16-rc6. _rtw_init_xmit_priv in drivers/staging/r8188eu/core/rtw_xmit.c lacks check of the return value of rtw_alloc_hwxmits() and will cause the null pointer dereference.", + "nvd_text": "A vulnerability was found in Linux Kernel. It has been classified as problematic. This affects the function find_prog_by_sec_insn of the file tools/lib/bpf/libbpf.c of the component BPF. The manipulation leads to null pointer dereference. It is recommended to apply a patch to fix this issue. The identifier VDB-211749 was assigned to this vulnerability.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3110", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3110", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-3110", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-3110", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-3110", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-3110" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3606", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3606", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-3606", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-3606", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-3606", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-3606" } }, - "CVE-2022-3111": { - "affected_versions": "v2.6.29-rc1 to v5.18-rc1", - "breaks": "14431aa0c5a443d13d24e6f865a8838f97dab973", - "cmt_msg": "power: supply: wm8350-power: Add missing free in free_charger_irq", + "CVE-2022-36123": { + "affected_versions": "v2.6.12-rc2 to v5.19-rc6", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "x86: Clear .brk area at early boot", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", - "Confidentiality": "None", - "Integrity": "None", + "Confidentiality": "High", + "Integrity": "High", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", - "score": 5.5 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 7.8 }, - "cwe": "NULL Pointer Dereference", - "fixes": "6dee930f6f6776d1e5a7edf542c6863b47d9f078", - "last_affected_version": "5.17.1", + "cwe": "Unspecified", + "fixes": "38fa5479b41376dc9d7f57e71c83514285a25ca0", + "last_affected_version": "5.18.12", "last_modified": "2023-12-06", - "nvd_text": "An issue was discovered in the Linux kernel through 5.16-rc6. free_charger_irq() in drivers/power/supply/wm8350_power.c lacks free of WM8350_IRQ_CHG_FAST_RDY, which is registered in wm8350_init_charger().", + "nvd_text": "The Linux kernel before 5.18.13 lacks a certain clear operation for the block starting symbol (.bss). This allows Xen PV guest OS users to cause a denial of service or gain privileges.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3111", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3111", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-3111", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-3111", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-3111", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-3111" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-36123", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-36123", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-36123", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-36123", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-36123", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-36123" } }, - "CVE-2022-3112": { - "affected_versions": "v5.7-rc1 to v5.18-rc1", - "breaks": "876f123b8956b455a89a172b905f9ecbb6fc5b67", - "cmt_msg": "media: meson: vdec: potential dereference of null pointer", + "CVE-2022-3619": { + "affected_versions": "v5.12-rc1-dontuse to v6.1-rc4", + "breaks": "4d7ea8ee90e42fc75995f6fb24032d3233314528", + "cmt_msg": "Bluetooth: L2CAP: Fix memory leak in vhci_write", "cvss3": { "Attack Complexity": "Low", - "Attack Vector": "Local", - "Availability": "High", + "Attack Vector": "Adjacent", + "Availability": "Low", "Confidentiality": "None", "Integrity": "None", - "Privileges Required": "Low", + "Privileges Required": "None", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", - "score": 5.5 + "raw": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "score": 4.3 }, - "cwe": "NULL Pointer Dereference", - "fixes": "c8c80c996182239ff9b05eda4db50184cf3b2e99", - "last_affected_version": "5.17.1", + "cwe": "Missing Release of Memory after Effective Lifetime", + "fixes": "7c9524d929648935bac2bbb4c20437df8f9c3f42", + "last_affected_version": "6.0.7", "last_modified": "2023-12-06", - "nvd_text": "An issue was discovered in the Linux kernel through 5.16-rc6. amvdec_set_canvases in drivers/staging/media/meson/vdec/vdec_helpers.c lacks check of the return value of kzalloc() and will cause the null pointer dereference.", + "nvd_text": "A vulnerability has been found in Linux Kernel and classified as problematic. This vulnerability affects the function l2cap_recv_acldata of the file net/bluetooth/l2cap_core.c of the component Bluetooth. The manipulation leads to memory leak. It is recommended to apply a patch to fix this issue. VDB-211918 is the identifier assigned to this vulnerability.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3112", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3112", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-3112", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-3112", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-3112", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-3112" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3619", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3619", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-3619", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-3619", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-3619", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-3619" } }, - "CVE-2022-3113": { - "affected_versions": "v5.10-rc6 to v5.18-rc1", - "breaks": "46233e91fa24a91bffca0680b1c55282ba601918", - "cmt_msg": "media: mtk-vcodec: potential dereference of null pointer", + "CVE-2022-3621": { + "affected_versions": "v2.6.30-rc1 to v6.1-rc1", + "breaks": "05fe58fdc10df9ebea04c0eaed57adc47af5c184", + "cmt_msg": "nilfs2: fix NULL pointer dereference at nilfs_bmap_lookup_at_level()", "cvss3": { "Attack Complexity": "Low", - "Attack Vector": "Local", + "Attack Vector": "Network", "Availability": "High", "Confidentiality": "None", "Integrity": "None", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", - "score": 5.5 + "raw": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "score": 6.5 }, "cwe": "NULL Pointer Dereference", - "fixes": "e25a89f743b18c029bfbe5e1663ae0c7190912b0", - "last_affected_version": "5.17.1", + "fixes": "21a87d88c2253350e115029f14fe2a10a7e6c856", + "last_affected_version": "6.0.1", "last_modified": "2023-12-06", - "nvd_text": "An issue was discovered in the Linux kernel through 5.16-rc6. mtk_vcodec_fw_vpu_init in drivers/media/platform/mtk-vcodec/mtk_vcodec_fw_vpu.c lacks check of the return value of devm_kzalloc() and will cause the null pointer dereference.", + "nvd_text": "A vulnerability was found in Linux Kernel. It has been classified as problematic. Affected is the function nilfs_bmap_lookup_at_level of the file fs/nilfs2/inode.c of the component nilfs2. The manipulation leads to null pointer dereference. It is possible to launch the attack remotely. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211920.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3113", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3113", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-3113", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-3113", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-3113", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-3113" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3621", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3621", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-3621", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-3621", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-3621", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-3621" } }, - "CVE-2022-3114": { - "affected_versions": "v5.13-rc1 to v5.19-rc1", - "breaks": "379c9a24cc239000b1dec53db02fe17a86947423", - "cmt_msg": "clk: imx: Add check for kcalloc", + "CVE-2022-3623": { + "affected_versions": "v5.1-rc1 to v6.1-rc1", + "breaks": "5480280d3f2d11d47f9be59d49b20a8d7d1b33e8", + "cmt_msg": "mm/hugetlb: fix races when looking up a CONT-PTE/PMD size hugetlb page", "cvss3": { - "Attack Complexity": "Low", - "Attack Vector": "Local", + "Attack Complexity": "High", + "Attack Vector": "Network", "Availability": "High", - "Confidentiality": "None", - "Integrity": "None", + "Confidentiality": "High", + "Integrity": "High", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", - "score": 5.5 + "raw": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 7.5 }, - "cwe": "NULL Pointer Dereference", - "fixes": "ed713e2bc093239ccd380c2ce8ae9e4162f5c037", + "cwe": "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')", + "fixes": "fac35ba763ed07ba93154c95ffc0c4a55023707f", + "last_affected_version": "6.0.2", "last_modified": "2023-12-06", - "nvd_text": "An issue was discovered in the Linux kernel through 5.16-rc6. imx_register_uart_clocks in drivers/clk/imx/clk.c lacks check of the return value of kcalloc() and will cause the null pointer dereference.", + "nvd_text": "A vulnerability was found in Linux Kernel. It has been declared as problematic. Affected by this vulnerability is the function follow_page_pte of the file mm/gup.c of the component BPF. The manipulation leads to race condition. The attack can be launched remotely. It is recommended to apply a patch to fix this issue. The identifier VDB-211921 was assigned to this vulnerability.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3114", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3114", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-3114", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-3114", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-3114", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-3114" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3623", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3623", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-3623", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-3623", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-3623", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-3623" } }, - "CVE-2022-3115": { - "affected_versions": "v4.12-rc1 to v5.19-rc1", - "breaks": "99665d07218345647875fea9ad4979bbe297c104", - "cmt_msg": "drm: mali-dp: potential dereference of null pointer", + "CVE-2022-3624": { + "affected_versions": "unk to v6.0-rc1", + "backport": true, + "breaks": "d5410ac7b0baeca91cf73ff5241d35998ecc8c9e", + "cmt_msg": "bonding: fix reference count leak in balance-alb mode", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", - "Availability": "High", + "Availability": "Low", "Confidentiality": "None", "Integrity": "None", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", - "score": 5.5 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", + "score": 3.3 }, - "cwe": "NULL Pointer Dereference", - "fixes": "73c3ed7495c67b8fbdc31cf58e6ca8757df31a33", - "last_affected_version": "5.18.2", + "cwe": "Missing Release of Memory after Effective Lifetime", + "fixes": "4f5d33f4f798b1c6d92b613f0087f639d9836971", "last_modified": "2023-12-06", - "nvd_text": "An issue was discovered in the Linux kernel through 5.16-rc6. malidp_crtc_reset in drivers/gpu/drm/arm/malidp_crtc.c lacks check of the return value of kzalloc() and will cause the null pointer dereference.", + "nvd_text": "A vulnerability was found in Linux Kernel and classified as problematic. Affected by this issue is the function rlb_arp_xmit of the file drivers/net/bonding/bond_alb.c of the component IPsec. The manipulation leads to memory leak. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211928.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3115", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3115", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-3115", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-3115", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-3115", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-3115" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3624", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3624", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-3624", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-3624", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-3624", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-3624" } }, - "CVE-2022-3169": { - "affected_versions": "v2.6.12-rc2 to v6.1-rc1", - "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", - "cmt_msg": "nvme: ensure subsystem reset is single threaded", + "CVE-2022-3625": { + "affected_versions": "v4.19-rc1 to v6.0-rc1", + "breaks": "45f05def5c44c806f094709f1c9b03dcecdd54f0", + "cmt_msg": "devlink: Fix use-after-free after a failed reload", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", - "Confidentiality": "None", - "Integrity": "None", + "Confidentiality": "High", + "Integrity": "High", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", - "score": 5.5 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 7.8 }, - "cwe": "Improper Input Validation", - "fixes": "1e866afd4bcdd01a70a5eddb4371158d3035ce03", - "last_affected_version": "6.0.9", + "cwe": "Improper Restriction of Operations within the Bounds of a Memory Buffer", + "fixes": "6b4db2e528f650c7fb712961aac36455468d5902", + "last_affected_version": "5.19.3", "last_modified": "2023-12-06", - "nvd_text": "A flaw was found in the Linux kernel. A denial of service flaw may occur if there is a consecutive request of the NVME_IOCTL_RESET and the NVME_IOCTL_SUBSYS_RESET through the device file of the driver, resulting in a PCIe link disconnect.", + "nvd_text": "A vulnerability was found in Linux Kernel. It has been classified as critical. This affects the function devlink_param_set/devlink_param_get of the file net/core/devlink.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier VDB-211929 was assigned to this vulnerability.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3169", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3169", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-3169", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-3169", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-3169", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-3169" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3625", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3625", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-3625", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-3625", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-3625", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-3625" } }, - "CVE-2022-3170": { - "affected_versions": "v6.0-rc1 to v6.0-rc4", - "breaks": "c27e1efb61c545f36c450ef60862df9251d239a4", + "CVE-2022-3628": { + "affected_versions": "v3.8-rc1 to v6.1-rc5", + "breaks": "5c36b99add5c3212b6cdb97cc206e1e3e0fa1e3c", + "cmt_msg": "wifi: brcmfmac: Fix potential buffer overflow in brcmf_fweh_event_worker()", "cvss3": { "Attack Complexity": "Low", - "Attack Vector": "Local", + "Attack Vector": "Physical", "Availability": "High", "Confidentiality": "High", "Integrity": "High", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", - "score": 7.8 + "raw": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 6.6 }, - "cwe": "Out-of-bounds Read", - "fixes": "6ab55ec0a938c7f943a4edba3d6514f775983887", + "cwe": "Improper Restriction of Operations within the Bounds of a Memory Buffer", + "fixes": "6788ba8aed4e28e90f72d68a9d794e34eac17295", + "last_affected_version": "6.0.7", "last_modified": "2023-12-06", - "nvd_text": "An out-of-bounds access issue was found in the Linux kernel sound subsystem. It could occur when the 'id->name' provided by the user did not end with '\\0'. A privileged local user could pass a specially crafted name through ioctl() interface and crash the system or potentially escalate their privileges on the system.", + "nvd_text": "A buffer overflow flaw was found in the Linux kernel Broadcom Full MAC Wi-Fi driver. This issue occurs when a user connects to a malicious USB device. This can allow a local user to crash the system or escalate their privileges.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3170", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3170", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-3170", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-3170", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-3170", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-3170" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3628", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3628", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-3628", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-3628", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-3628", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-3628" } }, - "CVE-2022-3176": { - "affected_versions": "v5.1-rc1 to v5.17-rc1", - "breaks": "221c5eb2338232f7340386de1c43decc32682e58", - "cmt_msg": "io_uring: fix UAF due to missing POLLFREE handling", + "CVE-2022-36280": { + "affected_versions": "v3.2-rc1 to v6.2-rc1", + "breaks": "2ac863719e518ae1a8f328849e64ea26a222f079", + "cmt_msg": "drm/vmwgfx: Validate the box size for the snooped cursor", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", - "Confidentiality": "High", - "Integrity": "High", + "Confidentiality": "None", + "Integrity": "None", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", - "score": 7.8 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "score": 5.5 }, - "cwe": "Use After Free", - "fixes": "791f3465c4afde02d7f16cf7424ca87070b69396", - "last_affected_version": "5.15.64", + "cwe": "Out-of-bounds Write", + "fixes": "4cf949c7fafe21e085a4ee386bb2dade9067316e", + "last_affected_version": "6.1.3", "last_modified": "2023-12-06", - "nvd_text": "There exists a use-after-free in io_uring in the Linux kernel. Signalfd_poll() and binder_poll() use a waitqueue whose lifetime is the current task. It will send a POLLFREE notification to all waiters before the queue is freed. Unfortunately, the io_uring poll doesn't handle POLLFREE. This allows a use-after-free to occur if a signalfd or binder fd is polled with io_uring poll, and the waitqueue gets freed. We recommend upgrading past commit fc78b2fc21f10c4c9c4d5d659a685710ffa63659", + "nvd_text": "An out-of-bounds(OOB) memory access vulnerability was found in vmwgfx driver in drivers/gpu/vmxgfx/vmxgfx_kms.c in GPU component in the Linux kernel with device file '/dev/dri/renderD128 (or Dxxx)'. This flaw allows a local attacker with a user account on the system to gain privilege, causing a denial of service(DoS).", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3176", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3176", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-3176", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-3176", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-3176", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-3176" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-36280", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-36280", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-36280", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-36280", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-36280", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-36280" } }, - "CVE-2022-3202": { - "affected_versions": "v2.6.12-rc2 to v5.18-rc1", - "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", - "cmt_msg": "jfs: prevent NULL deref in diFree", + "CVE-2022-3629": { + "affected_versions": "v3.9-rc1 to v6.0-rc1", + "breaks": "d021c344051af91f42c5ba9fdedc176740cbd238", + "cmt_msg": "vsock: Fix memory leak in vsock_connect()", + "cvss2": { + "Access Complexity": "High", + "Access Vector": "Adjacent Network", + "Authentication": "Single", + "Availability Impact": "Partial", + "Confidentiality Impact": "None", + "Integrity Impact": "None", + "raw": "AV:A/AC:H/Au:S/C:N/I:N/A:P", + "score": 1.4 + }, "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", - "Availability": "High", - "Confidentiality": "High", + "Availability": "Low", + "Confidentiality": "None", "Integrity": "None", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", - "score": 7.1 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", + "score": 3.3 }, - "cwe": "NULL Pointer Dereference", - "fixes": "a53046291020ec41e09181396c1e829287b48d47", - "last_affected_version": "5.17.2", + "cwe": "Improper Resource Shutdown or Release", + "fixes": "7e97cfed9929eaabc41829c395eb0d1350fccb9d", + "last_affected_version": "5.19.3", "last_modified": "2023-12-06", - "nvd_text": "A NULL pointer dereference flaw in diFree in fs/jfs/inode.c in Journaled File System (JFS)in the Linux kernel. This could allow a local attacker to crash the system or leak kernel internal information.", + "nvd_text": "A vulnerability was found in Linux Kernel. It has been declared as problematic. This vulnerability affects the function vsock_connect of the file net/vmw_vsock/af_vsock.c. The manipulation leads to memory leak. The complexity of an attack is rather high. The exploitation appears to be difficult. It is recommended to apply a patch to fix this issue. VDB-211930 is the identifier assigned to this vulnerability.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3202", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3202", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-3202", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-3202", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-3202", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-3202" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3629", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3629", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-3629", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-3629", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-3629", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-3629" } }, - "CVE-2022-32250": { - "affected_versions": "v4.1-rc1 to v5.19-rc1", - "breaks": "0b2d8a7b638b5034d2d68f6add8af94daaa1d4cd", - "cmt_msg": "netfilter: nf_tables: disallow non-stateful expression in sets earlier", - "cvss2": { - "Access Complexity": "Low", - "Access Vector": "Local Access", - "Authentication": "None", - "Availability Impact": "Complete", - "Confidentiality Impact": "Complete", - "Integrity Impact": "Complete", - "raw": "AV:L/AC:L/Au:N/C:C/I:C/A:C", - "score": 7.2 - }, + "CVE-2022-3630": { + "affected_versions": "v5.19-rc6 to v6.0-rc1", + "breaks": "85e4ea1049c70fb99de5c6057e835d151fb647da", + "cmt_msg": "fscache: don't leak cookie access refs if invalidation is in progress or failed", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", - "Confidentiality": "High", - "Integrity": "High", + "Confidentiality": "None", + "Integrity": "None", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", - "score": 7.8 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "score": 5.5 }, - "cwe": "Use After Free", - "fixes": "520778042ccca019f3ffa136dd0ca565c486cedd", - "last_affected_version": "5.18.1", - "last_modified": "2023-12-06", - "nvd_text": "net/netfilter/nf_tables_api.c in the Linux kernel through 5.18.1 allows a local user (able to create user/net namespaces) to escalate privileges to root because an incorrect NFT_STATEFUL_EXPR check leads to a use-after-free.", + "cwe": "Missing Release of Memory after Effective Lifetime", + "fixes": "fb24771faf72a2fd62b3b6287af3c610c3ec9cf1", + "last_affected_version": "5.19.3", + "last_modified": "2023-12-27", + "nvd_text": "A vulnerability was found in Linux Kernel. It has been rated as problematic. This issue affects some unknown processing of the file fs/fscache/cookie.c of the component IPsec. The manipulation leads to memory leak. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-211931.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-32250", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-32250", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-32250", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-32250", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-32250", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-32250" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3630", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3630", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-3630", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-3630", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-3630", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-3630" } }, - "CVE-2022-32296": { - "affected_versions": "v2.6.12-rc2 to v5.18-rc6", - "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", - "cmt_msg": "tcp: increase source port perturb table to 2^16", + "CVE-2022-3633": { + "affected_versions": "v5.4-rc1 to v6.0-rc1", + "breaks": "9d71dd0c70099914fcd063135da3c580865e924c", + "cmt_msg": "can: j1939: j1939_session_destroy(): fix memory leak of skbs", "cvss2": { "Access Complexity": "Low", - "Access Vector": "Local Access", - "Authentication": "None", - "Availability Impact": "None", - "Confidentiality Impact": "Partial", + "Access Vector": "Adjacent Network", + "Authentication": "Single", + "Availability Impact": "Partial", + "Confidentiality Impact": "None", "Integrity Impact": "None", - "raw": "AV:L/AC:L/Au:N/C:P/I:N/A:N", - "score": 2.1 + "raw": "AV:A/AC:L/Au:S/C:N/I:N/A:P", + "score": 2.7 }, "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", - "Availability": "None", - "Confidentiality": "Low", + "Availability": "Low", + "Confidentiality": "None", "Integrity": "None", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "score": 3.3 }, - "cwe": "Observable Discrepancy", - "fixes": "4c2c8f03a5ab7cb04ec64724d7d176d00bcc91e5", - "last_affected_version": "5.17.8", + "cwe": "Improper Resource Shutdown or Release", + "fixes": "8c21c54a53ab21842f5050fa090f26b03c0313d6", + "last_affected_version": "5.15.62", "last_modified": "2023-12-06", - "nvd_text": "The Linux kernel before 5.17.9 allows TCP servers to identify clients by observing what source ports are used. This occurs because of use of Algorithm 4 (\"Double-Hash Port Selection Algorithm\") of RFC 6056.", + "nvd_text": "A vulnerability classified as problematic has been found in Linux Kernel. Affected is the function j1939_session_destroy of the file net/can/j1939/transport.c. The manipulation leads to memory leak. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211932.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-32296", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-32296", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-32296", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-32296", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-32296", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-32296" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3633", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3633", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-3633", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-3633", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-3633", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-3633" } }, - "CVE-2022-3238": { - "affected_versions": "v5.15-rc6 to unk", - "breaks": "610f8f5a7baf998e70a61c63e53869b676d9b04c", + "CVE-2022-3635": { + "affected_versions": "v2.6.12-rc2 to v6.0-rc1", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "atm: idt77252: fix use-after-free bugs caused by tst_timer", "cvss3": { - "Attack Complexity": "Low", + "Attack Complexity": "High", "Attack Vector": "Local", "Availability": "High", "Confidentiality": "High", @@ -78004,26 +84387,28 @@ "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", - "score": 7.8 + "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 7.0 }, - "cwe": "Double Free", - "fixes": "", + "cwe": "Improper Restriction of Operations within the Bounds of a Memory Buffer", + "fixes": "3f4093e2bf4673f218c0bf17d8362337c400e77b", + "last_affected_version": "5.19.3", "last_modified": "2023-12-06", - "nvd_text": "A double-free flaw was found in the Linux kernel\u2019s NTFS3 subsystem in how a user triggers remount and umount simultaneously. This flaw allows a local user to crash or potentially escalate their privileges on the system.", + "nvd_text": "A vulnerability, which was classified as critical, has been found in Linux Kernel. Affected by this issue is the function tst_timer of the file drivers/atm/idt77252.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. VDB-211934 is the identifier assigned to this vulnerability.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3238", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3238", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-3238", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-3238", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-3238", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-3238" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3635", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3635", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-3635", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-3635", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-3635", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-3635" } }, - "CVE-2022-3239": { - "affected_versions": "v3.15-rc1 to v5.18-rc1", - "breaks": "47677e51e2a4040c204d7971a5103592600185b1", - "cmt_msg": "media: em28xx: initialize refcount before kref_get", + "CVE-2022-3636": { + "affected_versions": "unk to v5.19-rc1", + "backport": true, + "breaks": "33fc42de33278b2b3ec6f3390512987bc29a62b7", + "cmt_msg": "net: ethernet: mtk_eth_soc: use after free in __mtk_ppe_check_skb()", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", @@ -78037,65 +84422,54 @@ "score": 7.8 }, "cwe": "Use After Free", - "fixes": "c08eadca1bdfa099e20a32f8fa4b52b2f672236d", - "last_affected_version": "5.17.1", + "fixes": "17a5f6a78dc7b8db385de346092d7d9f9dc24df6", "last_modified": "2023-12-06", - "nvd_text": "A flaw use after free in the Linux kernel video4linux driver was found in the way user triggers em28xx_usb_probe() for the Empia 28xx based TV cards. A local user could use this flaw to crash the system or potentially escalate their privileges on the system.", + "nvd_text": "A vulnerability, which was classified as critical, was found in Linux Kernel. This affects the function __mtk_ppe_check_skb of the file drivers/net/ethernet/mediatek/mtk_ppe.c of the component Ethernet Handler. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-211935.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3239", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3239", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-3239", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-3239", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-3239", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-3239" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3636", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3636", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-3636", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-3636", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-3636", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-3636" } }, - "CVE-2022-32981": { - "affected_versions": "v3.13-rc1 to v5.19-rc2", - "breaks": "87fec0514f613f8ac43c01b0bc0bc7072c5d10ae", - "cmt_msg": "powerpc/32: Fix overread/overwrite of thread_struct via ptrace", - "cvss2": { - "Access Complexity": "Low", - "Access Vector": "Local Access", - "Authentication": "None", - "Availability Impact": "Partial", - "Confidentiality Impact": "Partial", - "Integrity Impact": "Partial", - "raw": "AV:L/AC:L/Au:N/C:P/I:P/A:P", - "score": 4.6 - }, + "CVE-2022-3640": { + "affected_versions": "v5.19 to v6.1-rc4", + "breaks": "d0be8347c623e0ac4202a1d4e0373882821f56b0", + "cmt_msg": "Bluetooth: L2CAP: fix use-after-free in l2cap_conn_del()", "cvss3": { "Attack Complexity": "Low", - "Attack Vector": "Local", + "Attack Vector": "Adjacent", "Availability": "High", "Confidentiality": "High", "Integrity": "High", - "Privileges Required": "Low", + "Privileges Required": "None", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", - "score": 7.8 + "raw": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "score": 8.8 }, - "cwe": "Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')", - "fixes": "8e1278444446fc97778a5e5c99bca1ce0bbc5ec9", - "last_affected_version": "5.18.3", + "cwe": "Improper Restriction of Operations within the Bounds of a Memory Buffer", + "fixes": "0d0e2d032811280b927650ff3c15fe5020e82533", + "last_affected_version": "6.0.7", "last_modified": "2023-12-06", - "nvd_text": "An issue was discovered in the Linux kernel through 5.18.3 on powerpc 32-bit platforms. There is a buffer overflow in ptrace PEEKUSER and POKEUSER (aka PEEKUSR and POKEUSR) when accessing floating point registers.", + "nvd_text": "A vulnerability, which was classified as critical, was found in Linux Kernel. Affected is the function l2cap_conn_del of the file net/bluetooth/l2cap_core.c of the component Bluetooth. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211944.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-32981", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-32981", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-32981", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-32981", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-32981", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-32981" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3640", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3640", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-3640", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-3640", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-3640", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-3640" } }, - "CVE-2022-3303": { - "affected_versions": "v2.6.12-rc2 to v6.0-rc5", - "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", - "cmt_msg": "ALSA: pcm: oss: Fix race at SNDCTL_DSP_SYNC", + "CVE-2022-36402": { + "affected_versions": "v4.3-rc1 to v6.5", + "breaks": "d80efd5cb3dec16a8d1aea9b8a4a7921972dba65", + "cmt_msg": "drm/vmwgfx: Fix shader stage validation", "cvss3": { - "Attack Complexity": "High", + "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", "Confidentiality": "None", @@ -78103,27 +84477,43 @@ "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", - "score": 4.7 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "score": 5.5 }, - "cwe": "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')", - "fixes": "8423f0b6d513b259fdab9c9bf4aaa6188d054c2d", - "last_affected_version": "5.19.8", + "cwe": "Integer Overflow or Wraparound", + "fixes": "14abdfae508228a7307f7491b5c4215ae70c6542", + "last_affected_version": "6.4", + "last_modified": "2024-02-02", + "nvd_text": "An integer overflow vulnerability was found in vmwgfx driver in drivers/gpu/vmxgfx/vmxgfx_execbuf.c in GPU component of Linux kernel with device file '/dev/dri/renderD128 (or Dxxx)'. This flaw allows a local attacker with a user account on the system to gain privilege, causing a denial of service(DoS).", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-36402", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-36402", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-36402", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-36402", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-36402", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-36402" + } + }, + "CVE-2022-3642": { + "affected_versions": "unk to unk", + "breaks": "", + "fixes": "", "last_modified": "2023-12-06", - "nvd_text": "A race condition flaw was found in the Linux kernel sound subsystem due to improper locking. It could lead to a NULL pointer dereference while handling the SNDCTL_DSP_SYNC ioctl. A privileged local user (root or member of the audio group) could use this flaw to crash the system, resulting in a denial of service condition", + "nvd_text": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3303", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3303", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-3303", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-3303", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-3303", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-3303" - } + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3642", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3642", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-3642", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-3642", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-3642", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-3642" + }, + "rejected": true }, - "CVE-2022-3344": { - "affected_versions": "v2.6.12-rc2 to v6.1-rc7", - "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", - "cmt_msg": "KVM: x86: nSVM: harden svm_free_nested against freeing vmcb02 while still in use", + "CVE-2022-3643": { + "affected_versions": "v3.19-rc1 to v6.1", + "breaks": "7e5d7753956b374516530e156c5e8aa19652398d", + "cmt_msg": "xen/netback: Ensure protocol headers don't fall in the non-linear area", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", @@ -78131,201 +84521,151 @@ "Confidentiality": "None", "Integrity": "None", "Privileges Required": "Low", - "Scope": "Unchanged", + "Scope": "Changed", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", - "score": 5.5 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", + "score": 6.5 }, - "cwe": "Expected Behavior Violation", - "fixes": "16ae56d7e0528559bf8dc9070e3bfd8ba3de80df", - "last_affected_version": "6.0.10", + "cwe": "Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')", + "fixes": "ad7f402ae4f466647c3a669b8a6f3e5d4271c84a", + "last_affected_version": "6.0", "last_modified": "2023-12-06", - "nvd_text": "A flaw was found in the KVM's AMD nested virtualization (SVM). A malicious L1 guest could purposely fail to intercept the shutdown of a cooperative nested guest (L2), possibly leading to a page fault and kernel panic in the host (L0).", + "nvd_text": "Guests can trigger NIC interface reset/abort/crash via netback It is possible for a guest to trigger a NIC interface reset/abort/crash in a Linux based network backend by sending certain kinds of packets. It appears to be an (unwritten?) assumption in the rest of the Linux network stack that packet protocol headers are all contained within the linear section of the SKB and some NICs behave badly if this is not the case. This has been reported to occur with Cisco (enic) and Broadcom NetXtrem II BCM5780 (bnx2x) though it may be an issue with other NICs/drivers as well. In case the frontend is sending requests with split headers, netback will forward those violating above mentioned assumption to the networking core, resulting in said misbehavior.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3344", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3344", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-3344", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-3344", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-3344", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-3344" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3643", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3643", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-3643", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-3643", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-3643", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-3643" } }, - "CVE-2022-33740": { - "affected_versions": "v2.6.12-rc2 to v5.19-rc6", - "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", - "cmt_msg": "xen/netfront: fix leaking data in shared pages", - "cvss2": { - "Access Complexity": "Low", - "Access Vector": "Local Access", - "Authentication": "None", - "Availability Impact": "Partial", - "Confidentiality Impact": "Partial", - "Integrity Impact": "None", - "raw": "AV:L/AC:L/Au:N/C:P/I:N/A:P", - "score": 3.6 - }, + "CVE-2022-3646": { + "affected_versions": "v2.6.30-rc1 to v6.1-rc1", + "breaks": "9ff05123e3bfbb1d2b68ba1d9bf1f7d1dffc1453", + "cmt_msg": "nilfs2: fix leak of nilfs_root in case of writer thread creation failure", "cvss3": { "Attack Complexity": "Low", - "Attack Vector": "Local", - "Availability": "High", - "Confidentiality": "High", + "Attack Vector": "Network", + "Availability": "Low", + "Confidentiality": "None", "Integrity": "None", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", - "score": 7.1 + "raw": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", + "score": 4.3 }, - "cwe": "Exposure of Sensitive Information to an Unauthorized Actor", - "fixes": "307c8de2b02344805ebead3440d8feed28f2f010", - "last_affected_version": "5.18.9", + "cwe": "Improper Resource Shutdown or Release", + "fixes": "d0d51a97063db4704a5ef6bc978dddab1636a306", + "last_affected_version": "6.0.1", "last_modified": "2023-12-06", - "nvd_text": "Linux disk/nic frontends data leaks T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Linux Block and Network PV device frontends don't zero memory regions before sharing them with the backend (CVE-2022-26365, CVE-2022-33740). Additionally the granularity of the grant table doesn't allow sharing less than a 4K page, leading to unrelated data residing in the same 4K page as data shared with a backend being accessible by such backend (CVE-2022-33741, CVE-2022-33742).", + "nvd_text": "A vulnerability, which was classified as problematic, has been found in Linux Kernel. This issue affects the function nilfs_attach_log_writer of the file fs/nilfs2/segment.c of the component BPF. The manipulation leads to memory leak. The attack may be initiated remotely. It is recommended to apply a patch to fix this issue. The identifier VDB-211961 was assigned to this vulnerability.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-33740", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-33740", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-33740", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-33740", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-33740", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-33740" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3646", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3646", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-3646", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-3646", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-3646", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-3646" } }, - "CVE-2022-33741": { - "affected_versions": "v2.6.12-rc2 to v5.19-rc6", + "CVE-2022-3649": { + "affected_versions": "v2.6.12-rc2 to v6.1-rc1", "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", - "cmt_msg": "xen/netfront: force data bouncing when backend is untrusted", - "cvss2": { - "Access Complexity": "Low", - "Access Vector": "Local Access", - "Authentication": "None", - "Availability Impact": "Partial", - "Confidentiality Impact": "Partial", - "Integrity Impact": "None", - "raw": "AV:L/AC:L/Au:N/C:P/I:N/A:P", - "score": 3.6 - }, + "cmt_msg": "nilfs2: fix use-after-free bug of struct nilfs_root", "cvss3": { - "Attack Complexity": "Low", + "Attack Complexity": "High", "Attack Vector": "Local", "Availability": "High", "Confidentiality": "High", - "Integrity": "None", + "Integrity": "High", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", - "score": 7.1 + "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 7.0 }, - "cwe": "Exposure of Sensitive Information to an Unauthorized Actor", - "fixes": "4491001c2e0fa69efbb748c96ec96b100a5cdb7e", - "last_affected_version": "5.18.9", + "cwe": "Improper Restriction of Operations within the Bounds of a Memory Buffer", + "fixes": "d325dc6eb763c10f591c239550b8c7e5466a5d09", + "last_affected_version": "6.0.1", "last_modified": "2023-12-06", - "nvd_text": "Linux disk/nic frontends data leaks T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Linux Block and Network PV device frontends don't zero memory regions before sharing them with the backend (CVE-2022-26365, CVE-2022-33740). Additionally the granularity of the grant table doesn't allow sharing less than a 4K page, leading to unrelated data residing in the same 4K page as data shared with a backend being accessible by such backend (CVE-2022-33741, CVE-2022-33742).", + "nvd_text": "A vulnerability was found in Linux Kernel. It has been classified as problematic. Affected is the function nilfs_new_inode of the file fs/nilfs2/inode.c of the component BPF. The manipulation leads to use after free. It is possible to launch the attack remotely. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211992.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-33741", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-33741", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-33741", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-33741", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-33741", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-33741" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3649", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3649", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-3649", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-3649", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-3649", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-3649" } }, - "CVE-2022-33742": { - "affected_versions": "v2.6.12-rc2 to v5.19-rc6", - "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", - "cmt_msg": "xen/blkfront: force data bouncing when backend is untrusted", - "cvss2": { - "Access Complexity": "Low", - "Access Vector": "Local Access", - "Authentication": "None", - "Availability Impact": "Partial", - "Confidentiality Impact": "Partial", - "Integrity Impact": "None", - "raw": "AV:L/AC:L/Au:N/C:P/I:N/A:P", - "score": 3.6 - }, + "CVE-2022-36879": { + "affected_versions": "v2.6.35-rc1 to v5.19-rc8", + "breaks": "80c802f3073e84c956846e921e8a0b02dfa3755f", + "cmt_msg": "xfrm: xfrm_policy: fix a possible double xfrm_pols_put() in xfrm_bundle_lookup()", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", - "Confidentiality": "High", + "Confidentiality": "None", "Integrity": "None", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", - "score": 7.1 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "score": 5.5 }, - "cwe": "Exposure of Sensitive Information to an Unauthorized Actor", - "fixes": "2400617da7eebf9167d71a46122828bc479d64c9", - "last_affected_version": "5.18.9", + "cwe": "Unspecified", + "fixes": "f85daf0e725358be78dfd208dea5fd665d8cb901", + "last_affected_version": "5.18.14", "last_modified": "2023-12-06", - "nvd_text": "Linux disk/nic frontends data leaks T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Linux Block and Network PV device frontends don't zero memory regions before sharing them with the backend (CVE-2022-26365, CVE-2022-33740). Additionally the granularity of the grant table doesn't allow sharing less than a 4K page, leading to unrelated data residing in the same 4K page as data shared with a backend being accessible by such backend (CVE-2022-33741, CVE-2022-33742).", + "nvd_text": "An issue was discovered in the Linux kernel through 5.18.14. xfrm_expand_policies in net/xfrm/xfrm_policy.c can cause a refcount to be dropped twice.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-33742", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-33742", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-33742", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-33742", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-33742", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-33742" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-36879", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-36879", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-36879", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-36879", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-36879", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-36879" } }, - "CVE-2022-33743": { - "affected_versions": "v5.9-rc1 to v5.19-rc6", - "breaks": "6c5aa6fc4defc2a0977a2c59e4710d50fa1e834c", - "cmt_msg": "xen-netfront: restore __skb_queue_tail() positioning in xennet_get_responses()", - "cvss2": { - "Access Complexity": "Low", - "Access Vector": "Local Access", - "Authentication": "None", - "Availability Impact": "Partial", - "Confidentiality Impact": "Partial", - "Integrity Impact": "Partial", - "raw": "AV:L/AC:L/Au:N/C:P/I:P/A:P", - "score": 4.6 - }, + "CVE-2022-36946": { + "affected_versions": "v2.6.14-rc1 to v5.19", + "breaks": "7af4cc3fa158ff1dda6e7451c7e6afa6b0bb85cb", + "cmt_msg": "netfilter: nf_queue: do not allow packet truncation below transport header offset", "cvss3": { "Attack Complexity": "Low", - "Attack Vector": "Local", + "Attack Vector": "Network", "Availability": "High", - "Confidentiality": "High", - "Integrity": "High", - "Privileges Required": "Low", + "Confidentiality": "None", + "Integrity": "None", + "Privileges Required": "None", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", - "score": 7.8 + "raw": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "score": 7.5 }, "cwe": "Unspecified", - "fixes": "f63c2c2032c2e3caad9add3b82cc6e91c376fd26", - "last_affected_version": "5.18.9", + "fixes": "99a63d36cb3ed5ca3aa6fcb64cffbeaf3b0fb164", + "last_affected_version": "5.18", "last_modified": "2023-12-06", - "nvd_text": "network backend may cause Linux netfront to use freed SKBs While adding logic to support XDP (eXpress Data Path), a code label was moved in a way allowing for SKBs having references (pointers) retained for further processing to nevertheless be freed.", + "nvd_text": "nfqnl_mangle in net/netfilter/nfnetlink_queue.c in the Linux kernel through 5.18.14 allows remote attackers to cause a denial of service (panic) because, in the case of an nf_queue verdict with a one-byte nfta_payload attribute, an skb_pull can encounter a negative skb->len.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-33743", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-33743", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-33743", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-33743", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-33743", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-33743" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-36946", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-36946", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-36946", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-36946", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-36946", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-36946" } }, - "CVE-2022-33744": { - "affected_versions": "v2.6.12-rc2 to v5.19-rc6", - "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", - "cmt_msg": "xen/arm: Fix race in RB-tree based P2M accounting", - "cvss2": { - "Access Complexity": "Medium", - "Access Vector": "Local Access", - "Authentication": "None", - "Availability Impact": "Partial", - "Confidentiality Impact": "None", - "Integrity Impact": "None", - "raw": "AV:L/AC:M/Au:N/C:N/I:N/A:P", - "score": 1.9 - }, + "CVE-2022-3707": { + "affected_versions": "v4.19-rc1 to v6.2-rc3", + "breaks": "b901b252b6cf5cecc612059ccf05d974a9085c58", + "cmt_msg": "drm/i915/gvt: fix double free bug in split_2MB_gtt_entry", "cvss3": { - "Attack Complexity": "High", + "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", "Confidentiality": "None", @@ -78333,178 +84673,145 @@ "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", - "score": 4.7 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "score": 5.5 }, - "cwe": "Unspecified", - "fixes": "b75cd218274e01d026dc5240e86fdeb44bbed0c8", - "last_affected_version": "5.18.9", + "fixes": "4a61648af68f5ba4884f0e3b494ee1cabc4b6620", + "last_affected_version": "6.1.4", "last_modified": "2023-12-06", - "nvd_text": "Arm guests can cause Dom0 DoS via PV devices When mapping pages of guests on Arm, dom0 is using an rbtree to keep track of the foreign mappings. Updating of that rbtree is not always done completely with the related lock held, resulting in a small race window, which can be used by unprivileged guests via PV devices to cause inconsistencies of the rbtree. These inconsistencies can lead to Denial of Service (DoS) of dom0, e.g. by causing crashes or the inability to perform further mappings of other guests' memory pages.", + "nvd_text": "A double-free memory flaw was found in the Linux kernel. The Intel GVT-g graphics driver triggers VGA card system resource overload, causing a fail in the intel_gvt_dma_map_guest_page function. This issue could allow a local user to crash the system.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-33744", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-33744", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-33744", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-33744", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-33744", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-33744" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3707", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3707", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-3707", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-3707", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-3707", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-3707" } }, - "CVE-2022-33981": { - "affected_versions": "v2.6.12-rc2 to v5.18-rc5", - "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", - "cmt_msg": "floppy: disable FDRAWCMD by default", - "cvss2": { - "Access Complexity": "Low", - "Access Vector": "Local Access", - "Authentication": "None", - "Availability Impact": "Partial", - "Confidentiality Impact": "None", - "Integrity Impact": "None", - "raw": "AV:L/AC:L/Au:N/C:N/I:N/A:P", - "score": 2.1 - }, + "CVE-2022-38096": { + "affected_versions": "unk to unk", + "breaks": "", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", - "Availability": "Low", + "Availability": "High", "Confidentiality": "None", "Integrity": "None", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", - "score": 3.3 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "score": 5.5 }, - "cwe": "Use After Free", - "fixes": "233087ca063686964a53c829d547c7571e3f67bf", - "last_affected_version": "5.17.5", + "cwe": "NULL Pointer Dereference", + "fixes": "", "last_modified": "2023-12-06", - "nvd_text": "drivers/block/floppy.c in the Linux kernel before 5.17.6 is vulnerable to a denial of service, because of a concurrency use-after-free flaw after deallocating raw_cmd in the raw_cmd_ioctl function.", + "nvd_text": "A NULL pointer dereference vulnerability was found in vmwgfx driver in drivers/gpu/vmxgfx/vmxgfx_execbuf.c in GPU component of Linux kernel with device file '/dev/dri/renderD128 (or Dxxx)'. This flaw allows a local attacker with a user account on the system to gain privilege, causing a denial of service(DoS).", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-33981", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-33981", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-33981", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-33981", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-33981", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-33981" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-38096", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-38096", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-38096", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-38096", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-38096", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-38096" } }, - "CVE-2022-3424": { - "affected_versions": "v2.6.33-rc1 to v6.2-rc1", - "breaks": "55484c45dbeca2eec7642932ec3f60f8a2d4bdbf", - "cmt_msg": "misc: sgi-gru: fix use-after-free error in gru_set_context_option, gru_fault and gru_handle_user_call_os", + "CVE-2022-38457": { + "affected_versions": "v4.20-rc1 to v6.2-rc4", + "breaks": "e8c66efbfe3a2e3cbc573f2474a3d51690f1b857", + "cmt_msg": "drm/vmwgfx: Remove rcu locks from user resources", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", - "Confidentiality": "High", - "Integrity": "High", + "Confidentiality": "None", + "Integrity": "None", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", - "score": 7.8 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "score": 5.5 }, - "fixes": "643a16a0eb1d6ac23744bb6e90a00fc21148a9dc", - "last_affected_version": "6.1.1", + "cwe": "Use After Free", + "fixes": "a309c7194e8a2f8bd4539b9449917913f6c2cd50", + "last_affected_version": "6.1.6", "last_modified": "2023-12-06", - "nvd_text": "A use-after-free flaw was found in the Linux kernel\u2019s SGI GRU driver in the way the first gru_file_unlocked_ioctl function is called by the user, where a fail pass occurs in the gru_check_chiplet_assignment function. This flaw allows a local user to crash or potentially escalate their privileges on the system.", + "nvd_text": "A use-after-free(UAF) vulnerability was found in function 'vmw_cmd_res_check' in drivers/gpu/vmxgfx/vmxgfx_execbuf.c in Linux kernel's vmwgfx driver with device file '/dev/dri/renderD128 (or Dxxx)'. This flaw allows a local attacker with a user account on the system to gain privilege, causing a denial of service(DoS).", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3424", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3424", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-3424", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-3424", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-3424", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-3424" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-38457", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-38457", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-38457", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-38457", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-38457", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-38457" } }, - "CVE-2022-3435": { - "affected_versions": "v5.18-rc2 to v6.1-rc1", - "breaks": "6bf92d70e690b7ff12b24f4bfff5e5434d019b82", - "cmt_msg": "ipv4: Handle attempt to delete multipath route when fib_info contains an nh reference", + "CVE-2022-3903": { + "affected_versions": "v2.6.12-rc2 to v6.1-rc2", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "media: mceusb: Use new usb_control_msg_*() routines", "cvss3": { "Attack Complexity": "Low", - "Attack Vector": "Network", - "Availability": "None", - "Confidentiality": "Low", + "Attack Vector": "Physical", + "Availability": "High", + "Confidentiality": "None", "Integrity": "None", - "Privileges Required": "Low", + "Privileges Required": "None", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", - "score": 4.3 + "raw": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "score": 4.6 }, - "cwe": "Improper Restriction of Operations within the Bounds of a Memory Buffer", - "fixes": "61b91eb33a69c3be11b259c5ea484505cd79f883", - "last_affected_version": "6.0.11", + "cwe": "Access of Resource Using Incompatible Type ('Type Confusion')", + "fixes": "41fd1cb6151439b205ac7611883d85ae14250172", "last_modified": "2023-12-06", - "nvd_text": "A vulnerability classified as problematic has been found in Linux Kernel. This affects the function fib_nh_match of the file net/ipv4/fib_semantics.c of the component IPv4 Handler. The manipulation leads to out-of-bounds read. It is possible to initiate the attack remotely. It is recommended to apply a patch to fix this issue. The identifier VDB-210357 was assigned to this vulnerability.", + "nvd_text": "An incorrect read request flaw was found in the Infrared Transceiver USB driver in the Linux kernel. This issue occurs when a user attaches a malicious USB device. A local user could use this flaw to starve the resources, causing denial of service or potentially crashing the system.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3435", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3435", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-3435", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-3435", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-3435", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-3435" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3903", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3903", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-3903", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-3903", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-3903", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-3903" } }, - "CVE-2022-34494": { - "affected_versions": "v5.13-rc1 to v5.19-rc1", - "breaks": "c486682ae1e2b149add22f44cf413b3103e3ef39", - "cmt_msg": "rpmsg: virtio: Fix possible double free in rpmsg_virtio_add_ctrl_dev()", - "cvss2": { - "Access Complexity": "Low", - "Access Vector": "Local Access", - "Authentication": "None", - "Availability Impact": "Complete", - "Confidentiality Impact": "None", - "Integrity Impact": "None", - "raw": "AV:L/AC:L/Au:N/C:N/I:N/A:C", - "score": 4.9 - }, + "CVE-2022-3910": { + "affected_versions": "v5.18 to v6.0-rc6", + "breaks": "aa184e8671f0f911fc2fb3f68cd506e4d7838faa", + "cmt_msg": "io_uring/msg_ring: check file type before putting", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", - "Confidentiality": "None", - "Integrity": "None", + "Confidentiality": "High", + "Integrity": "High", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", - "score": 5.5 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 7.8 }, - "cwe": "Double Free", - "fixes": "1680939e9ecf7764fba8689cfb3429c2fe2bb23c", - "last_affected_version": "5.18.3", + "cwe": "Unspecified", + "fixes": "fc7222c3a9f56271fba02aabbfbae999042f1679", + "last_affected_version": "5.19.10", "last_modified": "2023-12-06", - "nvd_text": "rpmsg_virtio_add_ctrl_dev in drivers/rpmsg/virtio_rpmsg_bus.c in the Linux kernel before 5.18.4 has a double free.", + "nvd_text": "Use After Free vulnerability in Linux Kernel allows Privilege Escalation. An improper Update of Reference Count in io_uring leads to Use-After-Free and Local Privilege Escalation.\nWhen io_msg_ring was invoked with a fixed file, it called io_fput_file() which improperly decreased its reference count (leading to Use-After-Free and Local Privilege Escalation). Fixed files are permanently registered to the ring, and should not be put separately.\n\nWe recommend upgrading past commit https://github.com/torvalds/linux/commit/fc7222c3a9f56271fba02aabbfbae999042f1679 https://github.com/torvalds/linux/commit/fc7222c3a9f56271fba02aabbfbae999042f1679 \n", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-34494", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-34494", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-34494", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-34494", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-34494", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-34494" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3910", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3910", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-3910", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-3910", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-3910", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-3910" } }, - "CVE-2022-34495": { - "affected_versions": "v5.13-rc1 to v5.19-rc1", - "breaks": "c486682ae1e2b149add22f44cf413b3103e3ef39", - "cmt_msg": "rpmsg: virtio: Fix possible double free in rpmsg_probe()", - "cvss2": { - "Access Complexity": "Low", - "Access Vector": "Local Access", - "Authentication": "None", - "Availability Impact": "Complete", - "Confidentiality Impact": "None", - "Integrity Impact": "None", - "raw": "AV:L/AC:L/Au:N/C:N/I:N/A:C", - "score": 4.9 - }, + "CVE-2022-39188": { + "affected_versions": "v2.6.12-rc2 to v5.19-rc8", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "mmu_gather: Force tlb-flush VM_PFNMAP vmas", "cvss3": { - "Attack Complexity": "Low", + "Attack Complexity": "High", "Attack Vector": "Local", "Availability": "High", "Confidentiality": "None", @@ -78512,37 +84819,26 @@ "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", - "score": 5.5 + "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", + "score": 4.7 }, - "cwe": "Double Free", - "fixes": "c2eecefec5df1306eafce28ccdf1ca159a552ecc", - "last_affected_version": "5.18.3", + "cwe": "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')", + "fixes": "b67fbebd4cf980aecbcc750e1462128bffe8ae15", "last_modified": "2023-12-06", - "nvd_text": "rpmsg_probe in drivers/rpmsg/virtio_rpmsg_bus.c in the Linux kernel before 5.18.4 has a double free.", + "nvd_text": "An issue was discovered in include/asm-generic/tlb.h in the Linux kernel before 5.19. Because of a race condition (unmap_mapping_range versus munmap), a device driver can free a page while it still has stale TLB entries. This only occurs in situations with VM_PFNMAP VMAs.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-34495", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-34495", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-34495", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-34495", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-34495", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-34495" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-39188", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-39188", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-39188", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-39188", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-39188", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-39188" } }, - "CVE-2022-34918": { - "affected_versions": "v4.1-rc1 to v5.19-rc6", - "breaks": "7d7402642eaf385aef0772eff5a35e34fc4995d7", - "cmt_msg": "netfilter: nf_tables: stricter validation of element data", - "cvss2": { - "Access Complexity": "Low", - "Access Vector": "Local Access", - "Authentication": "None", - "Availability Impact": "Complete", - "Confidentiality Impact": "Complete", - "Integrity Impact": "Complete", - "raw": "AV:L/AC:L/Au:N/C:C/I:C/A:C", - "score": 7.2 - }, + "CVE-2022-39189": { + "affected_versions": "v4.16-rc1 to v5.19-rc2", + "breaks": "f38a7b75267f1fb240a8178cbcb16d66dd37aac8", + "cmt_msg": "KVM: x86: do not report a vCPU as preempted outside instruction boundaries", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", @@ -78555,56 +84851,56 @@ "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "score": 7.8 }, - "cwe": "Access of Resource Using Incompatible Type ('Type Confusion')", - "fixes": "7e6bc1f6cabcd30aba0b11219d8e01b952eacbb6", - "last_affected_version": "5.18.10", + "cwe": "Unspecified", + "fixes": "6cd88243c7e03845a450795e134b488fc2afb736", + "last_affected_version": "5.18.16", "last_modified": "2023-12-06", - "nvd_text": "An issue was discovered in the Linux kernel through 5.18.9. A type confusion bug in nft_set_elem_init (leading to a buffer overflow) could be used by a local attacker to escalate privileges, a different vulnerability than CVE-2022-32250. (The attacker can obtain root access, but must start with an unprivileged user namespace to obtain CAP_NET_ADMIN access.) This can be fixed in nft_setelem_parse_data in net/netfilter/nf_tables_api.c.", + "nvd_text": "An issue was discovered the x86 KVM subsystem in the Linux kernel before 5.18.17. Unprivileged guest users can compromise the guest kernel because TLB flush operations are mishandled in certain KVM_VCPU_PREEMPTED situations.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-34918", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-34918", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-34918", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-34918", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-34918", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-34918" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-39189", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-39189", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-39189", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-39189", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-39189", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-39189" } }, - "CVE-2022-3521": { - "affected_versions": "v4.6-rc1 to v6.1-rc1", - "breaks": "ab7ac4eb9832e32a09f4e8042705484d2fb0aad3", - "cmt_msg": "kcm: avoid potential race in kcm_tx_work", + "CVE-2022-39190": { + "affected_versions": "v5.9-rc1 to v6.0-rc3", + "breaks": "d0e2c7de92c7f2b3d355ad76b0bb9fc43d1beb87", + "cmt_msg": "netfilter: nf_tables: disallow binding to already bound chain", "cvss3": { - "Attack Complexity": "High", + "Attack Complexity": "Low", "Attack Vector": "Local", - "Availability": "Low", + "Availability": "High", "Confidentiality": "None", "Integrity": "None", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L", - "score": 2.5 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "score": 5.5 }, - "cwe": "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')", - "fixes": "ec7eede369fe5b0d085ac51fdbb95184f87bfc6c", - "last_affected_version": "6.0.9", + "cwe": "Unspecified", + "fixes": "e02f0d3970404bfea385b6edb86f2d936db0ea2b", + "last_affected_version": "5.19.5", "last_modified": "2023-12-06", - "nvd_text": "A vulnerability has been found in Linux Kernel and classified as problematic. This vulnerability affects the function kcm_tx_work of the file net/kcm/kcmsock.c of the component kcm. The manipulation leads to race condition. It is recommended to apply a patch to fix this issue. VDB-211018 is the identifier assigned to this vulnerability.", + "nvd_text": "An issue was discovered in net/netfilter/nf_tables_api.c in the Linux kernel before 5.19.6. A denial of service can occur upon binding to an already bound chain.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3521", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3521", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-3521", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-3521", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-3521", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-3521" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-39190", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-39190", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-39190", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-39190", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-39190", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-39190" } }, - "CVE-2022-3522": { - "affected_versions": "v2.6.12-rc2 to v6.1-rc1", - "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", - "cmt_msg": "mm/hugetlb: use hugetlb_pte_stable in migration race check", + "CVE-2022-3977": { + "affected_versions": "v5.18-rc1 to v6.1-rc1", + "breaks": "63ed1aab3d40aa61aaa66819bdce9377ac7f40fa", + "cmt_msg": "mctp: prevent double key removal and unref", "cvss3": { - "Attack Complexity": "High", + "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", "Confidentiality": "High", @@ -78612,56 +84908,57 @@ "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", - "score": 7.0 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 7.8 }, - "cwe": "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')", - "fixes": "f9bf6c03eca1077cae8de0e6d86427656fa42a9b", + "cwe": "Use After Free", + "fixes": "3a732b46736cd8a29092e4b0b1a9ba83e672bf89", + "last_affected_version": "6.0.1", "last_modified": "2023-12-06", - "nvd_text": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.", + "nvd_text": "A use-after-free flaw was found in the Linux kernel MCTP (Management Component Transport Protocol) functionality. This issue occurs when a user simultaneously calls DROPTAG ioctl and socket close happens, which could allow a local user to crash the system or potentially escalate their privileges on the system.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3522", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3522", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-3522", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-3522", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-3522", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-3522" - }, - "rejected": true + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3977", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3977", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-3977", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-3977", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-3977", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-3977" + } }, - "CVE-2022-3523": { - "affected_versions": "v2.6.12-rc2 to v6.1-rc1", - "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", - "cmt_msg": "mm/memory.c: fix race when faulting a device private page", + "CVE-2022-39842": { + "affected_versions": "v2.6.38-rc1 to v5.19-rc4", + "breaks": "364dbdf3b6c31a4a5fb7a6d479e7aafb4a7a10b6", + "cmt_msg": "video: fbdev: pxa3xx-gcu: Fix integer overflow in pxa3xx_gcu_write", "cvss3": { - "Attack Complexity": "High", - "Attack Vector": "Network", + "Attack Complexity": "Low", + "Attack Vector": "Local", "Availability": "High", "Confidentiality": "None", - "Integrity": "None", + "Integrity": "Low", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", - "score": 5.3 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H", + "score": 6.1 }, - "cwe": "Use After Free", - "fixes": "16ce101db85db694a91380aa4c89b25530871d33", + "cwe": "Integer Overflow or Wraparound", + "fixes": "a09d2d00af53b43c6f11e6ab3cb58443c2cac8a7", + "last_affected_version": "5.15.69", "last_modified": "2023-12-06", - "nvd_text": "A vulnerability was found in Linux Kernel. It has been classified as problematic. Affected is an unknown function of the file mm/memory.c of the component Driver Handler. The manipulation leads to use after free. It is possible to launch the attack remotely. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211020.", + "nvd_text": "An issue was discovered in the Linux kernel before 5.19. In pxa3xx_gcu_write in drivers/video/fbdev/pxa3xx-gcu.c, the count parameter has a type conflict of size_t versus int, causing an integer overflow and bypassing the size check. After that, because it is used as the third argument to copy_from_user(), a heap overflow may occur. NOTE: the original discoverer disputes that the overflow can actually happen.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3523", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3523", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-3523", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-3523", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-3523", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-3523" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-39842", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-39842", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-39842", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-39842", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-39842", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-39842" } }, - "CVE-2022-3524": { - "affected_versions": "v2.6.12-rc2 to v6.1-rc1", - "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", - "cmt_msg": "tcp/udp: Fix memory leak in ipv6_renew_options().", + "CVE-2022-40133": { + "affected_versions": "v4.20-rc1 to v6.2-rc4", + "breaks": "e8c66efbfe3a2e3cbc573f2474a3d51690f1b857", + "cmt_msg": "drm/vmwgfx: Remove rcu locks from user resources", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", @@ -78674,165 +84971,112 @@ "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "score": 5.5 }, - "cwe": "Improper Resource Shutdown or Release", - "fixes": "3c52c6bb831f6335c176a0fc7214e26f43adbd11", - "last_affected_version": "6.0.6", + "cwe": "Use After Free", + "fixes": "a309c7194e8a2f8bd4539b9449917913f6c2cd50", + "last_affected_version": "6.1.6", "last_modified": "2023-12-06", - "nvd_text": "A vulnerability was found in Linux Kernel. It has been declared as problematic. Affected by this vulnerability is the function ipv6_renew_options of the component IPv6 Handler. The manipulation leads to memory leak. The attack can be launched remotely. It is recommended to apply a patch to fix this issue. The identifier VDB-211021 was assigned to this vulnerability.", + "nvd_text": "A use-after-free(UAF) vulnerability was found in function 'vmw_execbuf_tie_context' in drivers/gpu/vmxgfx/vmxgfx_execbuf.c in Linux kernel's vmwgfx driver with device file '/dev/dri/renderD128 (or Dxxx)'. This flaw allows a local attacker with a user account on the system to gain privilege, causing a denial of service(DoS).", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3524", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3524", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-3524", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-3524", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-3524", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-3524" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-40133", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-40133", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-40133", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-40133", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-40133", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-40133" } }, - "CVE-2022-3526": { - "affected_versions": "v5.13-rc1 to v5.18-rc3", - "breaks": "427f0c8c194b22edcafef1b0a42995ddc5c2227d", - "cmt_msg": "macvlan: Fix leaking skb in source mode with nodst option", + "CVE-2022-40307": { + "affected_versions": "v4.7-rc1 to v6.0-rc5", + "breaks": "65117f1aa1b2d145fd5ca376bde642794d0aae1b", + "cmt_msg": "efi: capsule-loader: Fix use-after-free in efi_capsule_write", "cvss3": { - "Attack Complexity": "Low", - "Attack Vector": "Network", + "Attack Complexity": "High", + "Attack Vector": "Local", "Availability": "High", "Confidentiality": "None", "Integrity": "None", - "Privileges Required": "None", + "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", - "score": 7.5 + "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", + "score": 4.7 }, - "cwe": "Missing Release of Memory after Effective Lifetime", - "fixes": "e16b859872b87650bb55b12cca5a5fcdc49c1442", - "last_affected_version": "5.17.3", + "cwe": "Use After Free", + "fixes": "9cb636b5f6a8cc6d1b50809ec8f8d33ae0c84c95", + "last_affected_version": "5.19.8", "last_modified": "2023-12-06", - "nvd_text": "A vulnerability classified as problematic was found in Linux Kernel. This vulnerability affects the function macvlan_handle_frame of the file drivers/net/macvlan.c of the component skb. The manipulation leads to memory leak. The attack can be initiated remotely. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211024.", + "nvd_text": "An issue was discovered in the Linux kernel through 5.19.8. drivers/firmware/efi/capsule-loader.c has a race condition with a resultant use-after-free.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3526", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3526", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-3526", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-3526", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-3526", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-3526" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-40307", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-40307", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-40307", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-40307", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-40307", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-40307" } }, - "CVE-2022-3531": { - "affected_versions": "v5.19-rc1 to v6.2-rc1", - "breaks": "5b6c7e5c44349b29c614e1b61f80c6849fc72ccf", - "cmt_msg": "selftest/bpf: Fix memory leak in kprobe_multi_test", - "fixes": "6d2e21dc4db3933db65293552ecc1ede26febeca", - "last_affected_version": "6.1.1", - "last_modified": "2023-12-06", - "nvd_text": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.", - "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3531", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3531", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-3531", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-3531", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-3531", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-3531" - }, - "rejected": true - }, - "CVE-2022-3532": { - "affected_versions": "v6.1-rc1 to v6.2-rc1", - "breaks": "1642a3945e223a922312fab2401ecdf58b3825b9", - "cmt_msg": "selftests/bpf: Fix memory leak caused by not destroying skeleton", - "fixes": "6e8280b958c5d7edc514cf347a800b23b7732b2b", - "last_affected_version": "6.1.1", - "last_modified": "2023-12-06", - "nvd_text": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.", - "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3532", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3532", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-3532", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-3532", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-3532", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-3532" - }, - "rejected": true - }, - "CVE-2022-3533": { - "affected_versions": "unk to unk", - "breaks": "", + "CVE-2022-40476": { + "affected_versions": "v5.19-rc1 to v5.19-rc4", + "breaks": "9cae36a094e7e9d6e5fe8b6dcd4642138b3eb0c7", "cvss3": { "Attack Complexity": "Low", - "Attack Vector": "Adjacent", + "Attack Vector": "Local", "Availability": "High", "Confidentiality": "None", "Integrity": "None", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", - "score": 5.7 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "score": 5.5 }, - "fixes": "", + "cwe": "NULL Pointer Dereference", + "fixes": "386e4fb6962b9f248a80f8870aea0870ca603e89", "last_modified": "2023-12-06", - "nvd_text": "A vulnerability was found in Linux Kernel. It has been rated as problematic. This issue affects the function parse_usdt_arg of the file tools/lib/bpf/usdt.c of the component BPF. The manipulation of the argument reg_name leads to memory leak. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-211031.", + "nvd_text": "A null pointer dereference issue was discovered in fs/io_uring.c in the Linux kernel before 5.15.62. A local user could use this flaw to crash the system or potentially cause a denial of service.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3533", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3533", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-3533", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-3533", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-3533", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-3533" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-40476", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-40476", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-40476", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-40476", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-40476", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-40476" } }, - "CVE-2022-3534": { - "affected_versions": "unk to v6.2-rc1", - "breaks": "", - "cmt_msg": "libbpf: Fix use-after-free in btf_dump_name_dups", + "CVE-2022-40768": { + "affected_versions": "v2.6.19-rc1 to v6.1-rc1", + "breaks": "5a25ba1677ab8d63890016a8c1bca68a3e0fbc7d", + "cmt_msg": "scsi: stex: Properly zero out the passthrough command structure", "cvss3": { "Attack Complexity": "Low", - "Attack Vector": "Adjacent", - "Availability": "High", + "Attack Vector": "Local", + "Availability": "None", "Confidentiality": "High", - "Integrity": "High", + "Integrity": "None", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", - "score": 8.0 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "score": 5.5 }, - "cwe": "Use After Free", - "fixes": "93c660ca40b5d2f7c1b1626e955a8e9fa30e0749", - "last_affected_version": "6.1.1", + "cwe": "Exposure of Resource to Wrong Sphere", + "fixes": "6022f210461fef67e6e676fd8544ca02d1bcfa7a", + "last_affected_version": "6.0.1", "last_modified": "2023-12-06", - "nvd_text": "A vulnerability classified as critical has been found in Linux Kernel. Affected is the function btf_dump_name_dups of the file tools/lib/bpf/btf_dump.c of the component libbpf. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211032.", + "nvd_text": "drivers/scsi/stex.c in the Linux kernel through 5.19.9 allows local users to obtain sensitive information from kernel memory because stex_queuecommand_lck lacks a memset for the PASSTHRU_CMD case.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3534", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3534", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-3534", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-3534", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-3534", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-3534" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-40768", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-40768", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-40768", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-40768", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-40768", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-40768" } }, - "CVE-2022-3535": { - "affected_versions": "v4.19-rc1 to v6.1-rc1", - "breaks": "21da57a23125a072e6ab2bb6c9bea5e02e01d1f5", - "cmt_msg": "net: mvpp2: fix mvpp2 debugfs leak", - "fixes": "0152dfee235e87660f52a117fc9f70dc55956bb4", - "last_affected_version": "6.0.2", - "last_modified": "2023-12-06", - "nvd_text": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.", - "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3535", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3535", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-3535", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-3535", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-3535", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-3535" - }, - "rejected": true - }, - "CVE-2022-3541": { - "affected_versions": "v5.19-rc1 to v6.1-rc1", - "breaks": "fd3040b9394c58bcedb83554bcf1a073021d6b36", - "cmt_msg": "eth: sp7021: fix use after free bug in spl2sw_nvmem_get_mac_address", + "CVE-2022-4095": { + "affected_versions": "v2.6.37-rc1 to v6.0-rc4", + "breaks": "2865d42c78a9121caad52cb02d1fbb7f5cdbc4ef", + "cmt_msg": "staging: rtl8712: fix use after free bugs", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", @@ -78845,71 +85089,52 @@ "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "score": 7.8 }, - "cwe": "Improper Restriction of Operations within the Bounds of a Memory Buffer", - "fixes": "12aece8b01507a2d357a1861f470e83621fbb6f2", - "last_affected_version": "6.0.2", + "fixes": "e230a4455ac3e9b112f0367d1b8e255e141afae0", + "last_affected_version": "5.19.7", "last_modified": "2023-12-06", - "nvd_text": "A vulnerability classified as critical has been found in Linux Kernel. This affects the function spl2sw_nvmem_get_mac_address of the file drivers/net/ethernet/sunplus/spl2sw_driver.c of the component BPF. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier VDB-211041 was assigned to this vulnerability.", + "nvd_text": "A use-after-free flaw was found in Linux kernel before 5.19.2. This issue occurs in cmd_hdl_filter in drivers/staging/rtl8712/rtl8712_cmd.c, allowing an attacker to launch a local denial of service attack and gain escalation of privileges.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3541", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3541", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-3541", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-3541", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-3541", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-3541" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-4095", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-4095", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-4095", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-4095", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-4095", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-4095" } }, - "CVE-2022-3542": { - "affected_versions": "v3.16-rc6 to v6.1-rc1", - "breaks": "07b0f00964def8af9321cfd6c4a7e84f6362f728", - "cmt_msg": "bnx2x: fix potential memory leak in bnx2x_tpa_stop()", - "fixes": "b43f9acbb8942b05252be83ac25a81cec70cc192", - "last_affected_version": "6.0.2", - "last_modified": "2023-12-06", - "nvd_text": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.", - "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3542", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3542", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-3542", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-3542", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-3542", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-3542" - }, - "rejected": true - }, - "CVE-2022-3543": { - "affected_versions": "v5.15-rc1 to v6.1-rc1", - "breaks": "314001f0bf927015e459c9d387d62a231fe93af3", - "cmt_msg": "af_unix: Fix memory leaks of the whole sk due to OOB skb.", + "CVE-2022-40982": { + "affected_versions": "v2.6.12-rc2 to v6.5-rc6", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "x86/speculation: Add Gather Data Sampling mitigation", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", - "Availability": "High", - "Confidentiality": "None", + "Availability": "None", + "Confidentiality": "High", "Integrity": "None", "Privileges Required": "Low", - "Scope": "Unchanged", + "Scope": "Changed", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", - "score": 5.5 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", + "score": 6.5 }, - "cwe": "Improper Resource Shutdown or Release", - "fixes": "7a62ed61367b8fd01bae1e18e30602c25060d824", - "last_affected_version": "6.0.2", + "fixes": "8974eb588283b7d44a7c91fa09fcbaf380339f3a", + "last_affected_version": "6.4.8", "last_modified": "2023-12-06", - "nvd_text": "A vulnerability, which was classified as problematic, has been found in Linux Kernel. This issue affects the function unix_sock_destructor/unix_release_sock of the file net/unix/af_unix.c of the component BPF. The manipulation leads to memory leak. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-211043.", + "nvd_text": "Information exposure through microarchitectural state after transient execution in certain vector execution units for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3543", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3543", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-3543", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-3543", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-3543", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-3543" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-40982", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-40982", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-40982", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-40982", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-40982", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-40982" } }, - "CVE-2022-3544": { - "affected_versions": "v5.18-rc1 to unk", - "breaks": "a61ea561c87139992fe32afdee48a6f6b85d824a", + "CVE-2022-41218": { + "affected_versions": "v2.6.22-rc1 to v6.2-rc1", + "breaks": "57861b432bda77f8bfafda2fb6f5a922d5f3aef1", + "cmt_msg": "media: dvb-core: Fix UAF due to refcount races at releasing", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", @@ -78922,171 +85147,143 @@ "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "score": 5.5 }, - "cwe": "Improper Resource Shutdown or Release", - "fixes": "damon/sysfs: fix possible memleak on damon_sysfs_add_target", + "cwe": "Use After Free", + "fixes": "fd3d91ab1c6ab0628fe642dd570b56302c30a792", + "last_affected_version": "6.1.3", "last_modified": "2023-12-06", - "nvd_text": "A vulnerability, which was classified as problematic, was found in Linux Kernel. Affected is the function damon_sysfs_add_target of the file mm/damon/sysfs.c of the component Netfilter. The manipulation leads to memory leak. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211044.", + "nvd_text": "In drivers/media/dvb-core/dmxdev.c in the Linux kernel through 5.19.10, there is a use-after-free caused by refcount races, affecting dvb_demux_open and dvb_dmxdev_release.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3544", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3544", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-3544", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-3544", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-3544", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-3544" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-41218", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-41218", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-41218", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-41218", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-41218", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-41218" } }, - "CVE-2022-3545": { - "affected_versions": "v2.6.12-rc2 to v6.0-rc1", + "CVE-2022-41222": { + "affected_versions": "v2.6.12-rc2 to v5.14-rc1", "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", - "cmt_msg": "nfp: fix use-after-free in area_cache_get()", - "cvss3": { - "Attack Complexity": "Low", - "Attack Vector": "Local", - "Availability": "High", - "Confidentiality": "High", - "Integrity": "High", - "Privileges Required": "Low", - "Scope": "Unchanged", - "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", - "score": 7.8 - }, - "cwe": "Improper Restriction of Operations within the Bounds of a Memory Buffer", - "fixes": "02e1a114fdb71e59ee6770294166c30d437bf86a", - "last_affected_version": "5.15.83", - "last_modified": "2023-12-06", - "nvd_text": "A vulnerability has been found in Linux Kernel and classified as critical. Affected by this vulnerability is the function area_cache_get of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier VDB-211045 was assigned to this vulnerability.", - "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3545", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3545", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-3545", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-3545", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-3545", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-3545" - } - }, - "CVE-2022-3564": { - "affected_versions": "v3.6-rc1 to v6.1-rc4", - "breaks": "4b51dae96731c9d82f5634e75ac7ffd3b9c1b060", - "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free caused by l2cap_reassemble_sdu", + "cmt_msg": "mm/mremap: hold the rmap lock in write mode when moving page table entries.", "cvss3": { "Attack Complexity": "High", - "Attack Vector": "Adjacent", + "Attack Vector": "Local", "Availability": "High", "Confidentiality": "High", "Integrity": "High", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", - "score": 7.1 + "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 7.0 }, - "cwe": "Improper Restriction of Operations within the Bounds of a Memory Buffer", - "fixes": "3aff8aaca4e36dc8b17eaa011684881a80238966", - "last_affected_version": "6.0.7", + "cwe": "Use After Free", + "fixes": "97113eb39fa7972722ff490b947d8af023e1f6a2", + "last_affected_version": "5.13.2", "last_modified": "2023-12-06", - "nvd_text": "A vulnerability classified as critical was found in Linux Kernel. Affected by this vulnerability is the function l2cap_reassemble_sdu of the file net/bluetooth/l2cap_core.c of the component Bluetooth. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-211087.", + "nvd_text": "mm/mremap.c in the Linux kernel before 5.13.3 has a use-after-free via a stale TLB because an rmap lock is not held during a PUD move.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3564", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3564", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-3564", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-3564", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-3564", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-3564" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-41222", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-41222", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-41222", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-41222", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-41222", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-41222" } }, - "CVE-2022-3565": { - "affected_versions": "v2.6.27-rc1 to v6.1-rc1", - "breaks": "3712b42d4b1bec29a4232a6673bf2e6dcc5faa68", - "cmt_msg": "mISDN: fix use-after-free bugs in l1oip timer handlers", + "CVE-2022-4127": { + "affected_versions": "v5.19-rc1 to v5.19-rc6", + "breaks": "a7c41b4687f5902af70cd559806990930c8a307b", + "cmt_msg": "io_uring: check that we have a file table when allocating update slots", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", - "Confidentiality": "High", - "Integrity": "High", + "Confidentiality": "None", + "Integrity": "None", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", - "score": 7.8 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "score": 5.5 }, - "cwe": "Improper Restriction of Operations within the Bounds of a Memory Buffer", - "fixes": "2568a7e0832ee30b0a351016d03062ab4e0e0a3f", - "last_affected_version": "6.0.2", + "cwe": "NULL Pointer Dereference", + "fixes": "d785a773bed966a75ca1f11d108ae1897189975b", "last_modified": "2023-12-06", - "nvd_text": "A vulnerability, which was classified as critical, has been found in Linux Kernel. Affected by this issue is the function del_timer of the file drivers/isdn/mISDN/l1oip_core.c of the component Bluetooth. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211088.", + "nvd_text": "A NULL pointer dereference issue was discovered in the Linux kernel in io_files_update_with_index_alloc. A local user could use this flaw to potentially crash the system causing a denial of service.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3565", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3565", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-3565", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-3565", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-3565", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-3565" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-4127", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-4127", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-4127", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-4127", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-4127", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-4127" } }, - "CVE-2022-3566": { - "affected_versions": "v2.6.12-rc2 to v6.1-rc1", - "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", - "cmt_msg": "tcp: Fix data races around icsk->icsk_af_ops.", + "CVE-2022-4128": { + "affected_versions": "v5.17-rc1 to v5.19-rc7", + "breaks": "b29fcfb54cd70caca5b11c80d8d238854938884a", + "cmt_msg": "mptcp: fix subflow traversal at disconnect time", "cvss3": { - "Attack Complexity": "High", - "Attack Vector": "Adjacent", + "Attack Complexity": "Low", + "Attack Vector": "Local", "Availability": "High", - "Confidentiality": "High", - "Integrity": "High", + "Confidentiality": "None", + "Integrity": "None", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", - "score": 7.1 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "score": 5.5 }, - "cwe": "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')", - "fixes": "f49cd2f4d6170d27a2c61f1fecb03d8a70c91f57", + "cwe": "NULL Pointer Dereference", + "fixes": "5c835bb142d4013c2ab24bff5ae9f6709a39cbcf", + "last_affected_version": "5.18.12", "last_modified": "2023-12-06", - "nvd_text": "A vulnerability, which was classified as problematic, was found in Linux Kernel. This affects the function tcp_getsockopt/tcp_setsockopt of the component TCP Handler. The manipulation leads to race condition. It is recommended to apply a patch to fix this issue. The identifier VDB-211089 was assigned to this vulnerability.", + "nvd_text": "A NULL pointer dereference issue was discovered in the Linux kernel in the MPTCP protocol when traversing the subflow list at disconnect time. A local user could use this flaw to potentially crash the system causing a denial of service.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3566", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3566", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-3566", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-3566", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-3566", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-3566" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-4128", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-4128", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-4128", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-4128", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-4128", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-4128" } }, - "CVE-2022-3567": { - "affected_versions": "v2.6.12-rc2 to v6.1-rc1", - "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", - "cmt_msg": "ipv6: Fix data races around sk->sk_prot.", + "CVE-2022-4129": { + "affected_versions": "v2.6.23-rc1 to v6.1-rc6", + "breaks": "3557baabf28088f49bdf72a048fd33ab62e205b1", + "cmt_msg": "l2tp: Serialize access to sk_user_data with sk_callback_lock", "cvss3": { - "Attack Complexity": "High", - "Attack Vector": "Adjacent", + "Attack Complexity": "Low", + "Attack Vector": "Local", "Availability": "High", - "Confidentiality": "Low", - "Integrity": "Low", - "Privileges Required": "None", + "Confidentiality": "None", + "Integrity": "None", + "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H", - "score": 6.4 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "score": 5.5 }, "cwe": "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')", - "fixes": "364f997b5cfe1db0d63a390fe7c801fa2b3115f6", + "fixes": "b68777d54fac21fc833ec26ea1a2a84f975ab035", + "last_affected_version": "5.15.90", "last_modified": "2023-12-06", - "nvd_text": "A vulnerability has been found in Linux Kernel and classified as problematic. This vulnerability affects the function inet6_stream_ops/inet6_dgram_ops of the component IPv6 Handler. The manipulation leads to race condition. It is recommended to apply a patch to fix this issue. VDB-211090 is the identifier assigned to this vulnerability.", + "nvd_text": "A flaw was found in the Linux kernel's Layer 2 Tunneling Protocol (L2TP). A missing lock when clearing sk_user_data can lead to a race condition and NULL pointer dereference. A local user could use this flaw to potentially crash the system causing a denial of service.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3567", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3567", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-3567", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-3567", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-3567", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-3567" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-4129", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-4129", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-4129", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-4129", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-4129", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-4129" } }, - "CVE-2022-3577": { - "affected_versions": "v4.20-rc1 to v5.19-rc1", - "breaks": "256a90ed9e46b270bbc4e15ef05216ff049c3721", - "cmt_msg": "HID: bigben: fix slab-out-of-bounds Write in bigben_probe", + "CVE-2022-4139": { + "affected_versions": "v5.17-rc2 to v6.1-rc8", + "breaks": "7938d61591d33394a21bdd7797a245b65428f44c", + "cmt_msg": "drm/i915: fix TLB invalidation for Gen12 video and compute engines", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", @@ -79099,116 +85296,113 @@ "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "score": 7.8 }, - "cwe": "Out-of-bounds Write", - "fixes": "fc4ef9d5724973193bfa5ebed181dba6de3a56db", - "last_affected_version": "5.18.2", + "fixes": "04aa64375f48a5d430b5550d9271f8428883e550", + "last_affected_version": "6.0.10", "last_modified": "2023-12-06", - "nvd_text": "An out-of-bounds memory write flaw was found in the Linux kernel\u2019s Kid-friendly Wired Controller driver. This flaw allows a local user to crash or potentially escalate their privileges on the system. It is in bigben_probe of drivers/hid/hid-bigbenff.c. The reason is incorrect assumption - bigben devices all have inputs. However, malicious devices can break this assumption, leaking to out-of-bound write.", + "nvd_text": "An incorrect TLB flush issue was found in the Linux kernel\u2019s GPU i915 kernel driver, potentially leading to random memory corruption or data leaks. This flaw could allow a local user to crash the system or escalate their privileges on the system.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3577", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3577", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-3577", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-3577", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-3577", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-3577" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-4139", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-4139", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-4139", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-4139", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-4139", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-4139" } }, - "CVE-2022-3586": { - "affected_versions": "v2.6.39-rc1 to v6.0-rc5", - "breaks": "e13e02a3c68d899169c78d9a18689bd73491d59a", - "cmt_msg": "sch_sfb: Don't assume the skb is still around after enqueueing to child", + "CVE-2022-41674": { + "affected_versions": "v5.1-rc1 to v6.1-rc1", + "breaks": "0b8fb8235be8be99a197e8d948fc0a2df8dc261a", + "cmt_msg": "wifi: cfg80211: fix u8 overflow in cfg80211_update_notlisted_nontrans()", "cvss3": { "Attack Complexity": "Low", - "Attack Vector": "Local", + "Attack Vector": "Adjacent", "Availability": "High", - "Confidentiality": "None", + "Confidentiality": "High", "Integrity": "None", - "Privileges Required": "Low", + "Privileges Required": "None", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", - "score": 5.5 + "raw": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", + "score": 8.1 }, - "cwe": "Use After Free", - "fixes": "9efd23297cca530bb35e1848665805d3fcdd7889", - "last_affected_version": "5.19.8", + "cwe": "Out-of-bounds Write", + "fixes": "aebe9f4639b13a1f4e9a6b42cdd2e38c617b442d", + "last_affected_version": "6.0.1", "last_modified": "2023-12-06", - "nvd_text": "A flaw was found in the Linux kernel\u2019s networking code. A use-after-free was found in the way the sch_sfb enqueue function used the socket buffer (SKB) cb field after the same SKB had been enqueued (and freed) into a child qdisc. This flaw allows a local, unprivileged user to crash the system, causing a denial of service.", + "nvd_text": "An issue was discovered in the Linux kernel before 5.19.16. Attackers able to inject WLAN frames could cause a buffer overflow in the ieee80211_bss_info_update function in net/mac80211/scan.c.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3586", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3586", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-3586", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-3586", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-3586", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-3586" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-41674", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-41674", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-41674", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-41674", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-41674", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-41674" } }, - "CVE-2022-3594": { - "affected_versions": "v3.12-rc1 to v6.1-rc1", - "breaks": "40a82917b1d3a8aecedee6b64949795b75359731", - "cmt_msg": "r8152: Rate limit overflow messages", + "CVE-2022-41848": { + "affected_versions": "unk to unk", + "breaks": "", "cvss3": { - "Attack Complexity": "Low", - "Attack Vector": "Network", - "Availability": "Low", + "Attack Complexity": "High", + "Attack Vector": "Physical", + "Availability": "High", "Confidentiality": "None", "Integrity": "None", "Privileges Required": "None", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", - "score": 5.3 + "raw": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", + "score": 4.2 }, - "cwe": "Improper Resource Shutdown or Release", - "fixes": "93e2be344a7db169b7119de21ac1bf253b8c6907", - "last_affected_version": "6.0.2", + "cwe": "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')", + "fixes": "", "last_modified": "2023-12-06", - "nvd_text": "A vulnerability was found in Linux Kernel. It has been declared as problematic. Affected by this vulnerability is the function intr_callback of the file drivers/net/usb/r8152.c of the component BPF. The manipulation leads to logging of excessive data. The attack can be launched remotely. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-211363.", + "nvd_text": "drivers/char/pcmcia/synclink_cs.c in the Linux kernel through 5.19.12 has a race condition and resultant use-after-free if a physically proximate attacker removes a PCMCIA device while calling ioctl, aka a race condition between mgslpc_ioctl and mgslpc_detach.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3594", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3594", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-3594", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-3594", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-3594", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-3594" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-41848", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-41848", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-41848", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-41848", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-41848", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-41848" } }, - "CVE-2022-3595": { - "affected_versions": "unk to v6.1-rc1", - "backport": true, - "breaks": "a4e430c8c8ba96be8c6ec4f2eb108bb8bcbee069", - "cmt_msg": "cifs: fix double-fault crash during ntlmssp", + "CVE-2022-41849": { + "affected_versions": "v2.6.12-rc2 to v6.1-rc1", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "fbdev: smscufx: Fix use-after-free in ufx_ops_open()", "cvss3": { - "Attack Complexity": "Low", - "Attack Vector": "Local", + "Attack Complexity": "High", + "Attack Vector": "Physical", "Availability": "High", "Confidentiality": "None", "Integrity": "None", - "Privileges Required": "Low", + "Privileges Required": "None", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", - "score": 5.5 + "raw": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", + "score": 4.2 }, - "cwe": "Double Free", - "fixes": "b854b4ee66437e6e1622fda90529c814978cb4ca", - "last_affected_version": "6.0.15", + "cwe": "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')", + "fixes": "5610bcfe8693c02e2e4c8b31427f1bdbdecc839c", + "last_affected_version": "6.0.2", "last_modified": "2023-12-06", - "nvd_text": "A vulnerability was found in Linux Kernel. It has been rated as problematic. Affected by this issue is the function sess_free_buffer of the file fs/cifs/sess.c of the component CIFS Handler. The manipulation leads to double free. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211364.", + "nvd_text": "drivers/video/fbdev/smscufx.c in the Linux kernel through 5.19.12 has a race condition and resultant use-after-free if a physically proximate attacker removes a USB device while calling open(), aka a race condition between ufx_ops_open and ufx_usb_disconnect.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3595", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3595", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-3595", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-3595", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-3595", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-3595" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-41849", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-41849", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-41849", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-41849", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-41849", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-41849" } }, - "CVE-2022-3606": { - "affected_versions": "unk to unk", - "breaks": "", + "CVE-2022-41850": { + "affected_versions": "v2.6.12-rc2 to v6.1-rc1", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "HID: roccat: Fix use-after-free in roccat_read()", "cvss3": { - "Attack Complexity": "Low", + "Attack Complexity": "High", "Attack Vector": "Local", "Availability": "High", "Confidentiality": "None", @@ -79216,305 +85410,296 @@ "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", - "score": 5.5 + "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", + "score": 4.7 }, - "fixes": "", - "last_modified": "2023-12-06", - "nvd_text": "A vulnerability was found in Linux Kernel. It has been classified as problematic. This affects the function find_prog_by_sec_insn of the file tools/lib/bpf/libbpf.c of the component BPF. The manipulation leads to null pointer dereference. It is recommended to apply a patch to fix this issue. The identifier VDB-211749 was assigned to this vulnerability.", + "cwe": "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')", + "fixes": "cacdb14b1c8d3804a3a7d31773bc7569837b71a4", + "last_affected_version": "6.0.2", + "last_modified": "2024-04-06", + "nvd_text": "roccat_report_event in drivers/hid/hid-roccat.c in the Linux kernel through 5.19.12 has a race condition and resultant use-after-free in certain situations where a report is received while copying a report->value is in progress.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3606", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3606", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-3606", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-3606", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-3606", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-3606" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-41850", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-41850", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-41850", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-41850", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-41850", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-41850" } }, - "CVE-2022-36123": { - "affected_versions": "v2.6.12-rc2 to v5.19-rc6", + "CVE-2022-41858": { + "affected_versions": "v2.6.12-rc2 to v5.18-rc2", "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", - "cmt_msg": "x86: Clear .brk area at early boot", + "cmt_msg": "drivers: net: slip: fix NPD bug in sl_tx_timeout()", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", "Confidentiality": "High", - "Integrity": "High", + "Integrity": "None", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", - "score": 7.8 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", + "score": 7.1 }, - "cwe": "Unspecified", - "fixes": "38fa5479b41376dc9d7f57e71c83514285a25ca0", - "last_affected_version": "5.18.12", + "cwe": "Use After Free", + "fixes": "ec4eb8a86ade4d22633e1da2a7d85a846b7d1798", + "last_affected_version": "5.17.3", "last_modified": "2023-12-06", - "nvd_text": "The Linux kernel before 5.18.13 lacks a certain clear operation for the block starting symbol (.bss). This allows Xen PV guest OS users to cause a denial of service or gain privileges.", + "nvd_text": "A flaw was found in the Linux kernel. A NULL pointer dereference may occur while a slip driver is in progress to detach in sl_tx_timeout in drivers/net/slip/slip.c. This issue could allow an attacker to crash the system or leak internal kernel information.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-36123", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-36123", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-36123", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-36123", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-36123", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-36123" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-41858", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-41858", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-41858", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-41858", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-41858", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-41858" } }, - "CVE-2022-3619": { - "affected_versions": "v5.12-rc1-dontuse to v6.1-rc4", - "breaks": "4d7ea8ee90e42fc75995f6fb24032d3233314528", - "cmt_msg": "Bluetooth: L2CAP: Fix memory leak in vhci_write", + "CVE-2022-42328": { + "affected_versions": "v5.16-rc7 to v6.1", + "breaks": "be81992f9086b230623ae3ebbc85ecee4d00a3d3", + "cmt_msg": "xen/netback: don't call kfree_skb() with interrupts disabled", "cvss3": { "Attack Complexity": "Low", - "Attack Vector": "Adjacent", - "Availability": "Low", + "Attack Vector": "Local", + "Availability": "High", "Confidentiality": "None", "Integrity": "None", - "Privileges Required": "None", + "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", - "score": 4.3 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "score": 5.5 }, - "cwe": "Missing Release of Memory after Effective Lifetime", - "fixes": "7c9524d929648935bac2bbb4c20437df8f9c3f42", - "last_affected_version": "6.0.7", + "cwe": "Improper Locking", + "fixes": "74e7e1efdad45580cc3839f2a155174cf158f9b5", + "last_affected_version": "6.0", "last_modified": "2023-12-06", - "nvd_text": "A vulnerability has been found in Linux Kernel and classified as problematic. This vulnerability affects the function l2cap_recv_acldata of the file net/bluetooth/l2cap_core.c of the component Bluetooth. The manipulation leads to memory leak. It is recommended to apply a patch to fix this issue. VDB-211918 is the identifier assigned to this vulnerability.", + "nvd_text": "Guests can trigger deadlock in Linux netback driver T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] The patch for XSA-392 introduced another issue which might result in a deadlock when trying to free the SKB of a packet dropped due to the XSA-392 handling (CVE-2022-42328). Additionally when dropping packages for other reasons the same deadlock could occur in case of netpoll being active for the interface the xen-netback driver is connected to (CVE-2022-42329).", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3619", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3619", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-3619", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-3619", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-3619", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-3619" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-42328", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-42328", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-42328", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-42328", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-42328", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-42328" } }, - "CVE-2022-3621": { - "affected_versions": "v2.6.30-rc1 to v6.1-rc1", - "breaks": "05fe58fdc10df9ebea04c0eaed57adc47af5c184", - "cmt_msg": "nilfs2: fix NULL pointer dereference at nilfs_bmap_lookup_at_level()", + "CVE-2022-42329": { + "affected_versions": "v5.16-rc7 to v6.1", + "breaks": "be81992f9086b230623ae3ebbc85ecee4d00a3d3", + "cmt_msg": "xen/netback: don't call kfree_skb() with interrupts disabled", "cvss3": { "Attack Complexity": "Low", - "Attack Vector": "Network", + "Attack Vector": "Local", "Availability": "High", "Confidentiality": "None", "Integrity": "None", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", - "score": 6.5 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "score": 5.5 }, - "cwe": "NULL Pointer Dereference", - "fixes": "21a87d88c2253350e115029f14fe2a10a7e6c856", - "last_affected_version": "6.0.1", + "cwe": "Improper Locking", + "fixes": "74e7e1efdad45580cc3839f2a155174cf158f9b5", + "last_affected_version": "6.0", "last_modified": "2023-12-06", - "nvd_text": "A vulnerability was found in Linux Kernel. It has been classified as problematic. Affected is the function nilfs_bmap_lookup_at_level of the file fs/nilfs2/inode.c of the component nilfs2. The manipulation leads to null pointer dereference. It is possible to launch the attack remotely. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211920.", + "nvd_text": "Guests can trigger deadlock in Linux netback driver T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] The patch for XSA-392 introduced another issue which might result in a deadlock when trying to free the SKB of a packet dropped due to the XSA-392 handling (CVE-2022-42328). Additionally when dropping packages for other reasons the same deadlock could occur in case of netpoll being active for the interface the xen-netback driver is connected to (CVE-2022-42329).", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3621", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3621", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-3621", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-3621", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-3621", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-3621" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-42329", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-42329", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-42329", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-42329", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-42329", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-42329" } }, - "CVE-2022-3623": { - "affected_versions": "v5.1-rc1 to v6.1-rc1", - "breaks": "5480280d3f2d11d47f9be59d49b20a8d7d1b33e8", - "cmt_msg": "mm/hugetlb: fix races when looking up a CONT-PTE/PMD size hugetlb page", + "CVE-2022-42432": { + "affected_versions": "v5.2-rc1 to v6.0-rc7", + "breaks": "22c7652cdaa8cd33ce78bacceb4e826a3f795873", + "cmt_msg": "netfilter: nfnetlink_osf: fix possible bogus match in nf_osf_find()", "cvss3": { - "Attack Complexity": "High", - "Attack Vector": "Network", - "Availability": "High", + "Attack Complexity": "Low", + "Attack Vector": "Local", + "Availability": "None", "Confidentiality": "High", - "Integrity": "High", - "Privileges Required": "Low", + "Integrity": "None", + "Privileges Required": "High", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", - "score": 7.5 + "raw": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "score": 4.4 }, - "cwe": "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')", - "fixes": "fac35ba763ed07ba93154c95ffc0c4a55023707f", - "last_affected_version": "6.0.2", + "fixes": "559c36c5a8d730c49ef805a72b213d3bba155cc8", + "last_affected_version": "5.19.11", "last_modified": "2023-12-06", - "nvd_text": "A vulnerability was found in Linux Kernel. It has been declared as problematic. Affected by this vulnerability is the function follow_page_pte of the file mm/gup.c of the component BPF. The manipulation leads to race condition. The attack can be launched remotely. It is recommended to apply a patch to fix this issue. The identifier VDB-211921 was assigned to this vulnerability.", + "nvd_text": "This vulnerability allows local attackers to disclose sensitive information on affected installations of the Linux Kernel 6.0-rc2. An attacker must first obtain the ability to execute high-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the nft_osf_eval function. The issue results from the lack of proper initialization of memory prior to accessing it. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the kernel. Was ZDI-CAN-18540.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3623", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3623", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-3623", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-3623", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-3623", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-3623" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-42432", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-42432", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-42432", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-42432", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-42432", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-42432" } }, - "CVE-2022-3624": { - "affected_versions": "unk to v6.0-rc1", - "backport": true, - "breaks": "d5410ac7b0baeca91cf73ff5241d35998ecc8c9e", - "cmt_msg": "bonding: fix reference count leak in balance-alb mode", + "CVE-2022-4269": { + "affected_versions": "v4.10-rc1 to v6.3-rc1", + "breaks": "53592b3640019f2834701093e38272fdfd367ad8", + "cmt_msg": "act_mirred: use the backlog for nested calls to mirred ingress", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", - "Availability": "Low", + "Availability": "High", "Confidentiality": "None", "Integrity": "None", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", - "score": 3.3 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "score": 5.5 }, - "cwe": "Missing Release of Memory after Effective Lifetime", - "fixes": "4f5d33f4f798b1c6d92b613f0087f639d9836971", + "cwe": "Deadlock", + "fixes": "ca22da2fbd693b54dc8e3b7b54ccc9f7e9ba3640", + "last_affected_version": "6.2.8", "last_modified": "2023-12-06", - "nvd_text": "A vulnerability was found in Linux Kernel and classified as problematic. Affected by this issue is the function rlb_arp_xmit of the file drivers/net/bonding/bond_alb.c of the component IPsec. The manipulation leads to memory leak. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211928.", + "nvd_text": "A flaw was found in the Linux kernel Traffic Control (TC) subsystem. Using a specific networking configuration (redirecting egress packets to ingress using TC action \"mirred\") a local unprivileged user could trigger a CPU soft lockup (ABBA deadlock) when the transport protocol in use (TCP or SCTP) does a retransmission, resulting in a denial of service condition.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3624", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3624", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-3624", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-3624", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-3624", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-3624" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-4269", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-4269", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-4269", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-4269", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-4269", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-4269" } }, - "CVE-2022-3625": { - "affected_versions": "v4.19-rc1 to v6.0-rc1", - "breaks": "45f05def5c44c806f094709f1c9b03dcecdd54f0", - "cmt_msg": "devlink: Fix use-after-free after a failed reload", + "CVE-2022-42703": { + "affected_versions": "v3.19-rc4 to v6.0-rc4", + "breaks": "7a3ef208e662f4b63d43a23f61a64a129c525bbc", + "cmt_msg": "mm/rmap: Fix anon_vma->degree ambiguity leading to double-reuse", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", - "Confidentiality": "High", - "Integrity": "High", + "Confidentiality": "None", + "Integrity": "None", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", - "score": 7.8 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "score": 5.5 }, - "cwe": "Improper Restriction of Operations within the Bounds of a Memory Buffer", - "fixes": "6b4db2e528f650c7fb712961aac36455468d5902", - "last_affected_version": "5.19.3", + "cwe": "Use After Free", + "fixes": "2555283eb40df89945557273121e9393ef9b542b", + "last_affected_version": "5.19.6", "last_modified": "2023-12-06", - "nvd_text": "A vulnerability was found in Linux Kernel. It has been classified as critical. This affects the function devlink_param_set/devlink_param_get of the file net/core/devlink.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier VDB-211929 was assigned to this vulnerability.", + "nvd_text": "mm/rmap.c in the Linux kernel before 5.19.7 has a use-after-free related to leaf anon_vma double reuse.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3625", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3625", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-3625", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-3625", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-3625", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-3625" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-42703", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-42703", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-42703", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-42703", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-42703", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-42703" } }, - "CVE-2022-3628": { - "affected_versions": "v3.8-rc1 to v6.1-rc5", - "breaks": "5c36b99add5c3212b6cdb97cc206e1e3e0fa1e3c", - "cmt_msg": "wifi: brcmfmac: Fix potential buffer overflow in brcmf_fweh_event_worker()", + "CVE-2022-42719": { + "affected_versions": "v5.2-rc1 to v6.1-rc1", + "breaks": "5023b14cf4df4d22e1a80738167f3438c9e62e5f", + "cmt_msg": "wifi: mac80211: fix MBSSID parsing use-after-free", "cvss3": { "Attack Complexity": "Low", - "Attack Vector": "Physical", + "Attack Vector": "Adjacent", "Availability": "High", "Confidentiality": "High", "Integrity": "High", - "Privileges Required": "Low", + "Privileges Required": "None", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", - "score": 6.6 + "raw": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "score": 8.8 }, - "cwe": "Improper Restriction of Operations within the Bounds of a Memory Buffer", - "fixes": "6788ba8aed4e28e90f72d68a9d794e34eac17295", - "last_affected_version": "6.0.7", + "cwe": "Use After Free", + "fixes": "ff05d4b45dd89b922578dac497dcabf57cf771c6", + "last_affected_version": "6.0.1", "last_modified": "2023-12-06", - "nvd_text": "A buffer overflow flaw was found in the Linux kernel Broadcom Full MAC Wi-Fi driver. This issue occurs when a user connects to a malicious USB device. This can allow a local user to crash the system or escalate their privileges.", + "nvd_text": "A use-after-free in the mac80211 stack when parsing a multi-BSSID element in the Linux kernel 5.2 through 5.19.x before 5.19.16 could be used by attackers (able to inject WLAN frames) to crash the kernel and potentially execute code.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3628", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3628", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-3628", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-3628", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-3628", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-3628" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-42719", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-42719", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-42719", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-42719", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-42719", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-42719" } }, - "CVE-2022-36280": { - "affected_versions": "v3.2-rc1 to v6.2-rc1", - "breaks": "2ac863719e518ae1a8f328849e64ea26a222f079", - "cmt_msg": "drm/vmwgfx: Validate the box size for the snooped cursor", + "CVE-2022-42720": { + "affected_versions": "v5.1-rc1 to v6.1-rc1", + "breaks": "a3584f56de1c808d4383a275b4a74467b19e5645", + "cmt_msg": "wifi: cfg80211: fix BSS refcounting bugs", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", - "Confidentiality": "None", - "Integrity": "None", + "Confidentiality": "High", + "Integrity": "High", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", - "score": 5.5 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 7.8 }, - "cwe": "Out-of-bounds Write", - "fixes": "4cf949c7fafe21e085a4ee386bb2dade9067316e", - "last_affected_version": "6.1.3", + "cwe": "Use After Free", + "fixes": "0b7808818cb9df6680f98996b8e9a439fa7bcc2f", + "last_affected_version": "6.0.1", "last_modified": "2023-12-06", - "nvd_text": "An out-of-bounds(OOB) memory access vulnerability was found in vmwgfx driver in drivers/gpu/vmxgfx/vmxgfx_kms.c in GPU component in the Linux kernel with device file '/dev/dri/renderD128 (or Dxxx)'. This flaw allows a local attacker with a user account on the system to gain privilege, causing a denial of service(DoS).", + "nvd_text": "Various refcounting bugs in the multi-BSS handling in the mac80211 stack in the Linux kernel 5.1 through 5.19.x before 5.19.16 could be used by local attackers (able to inject WLAN frames) to trigger use-after-free conditions to potentially execute code.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-36280", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-36280", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-36280", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-36280", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-36280", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-36280" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-42720", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-42720", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-42720", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-42720", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-42720", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-42720" } }, - "CVE-2022-3629": { - "affected_versions": "v3.9-rc1 to v6.0-rc1", - "breaks": "d021c344051af91f42c5ba9fdedc176740cbd238", - "cmt_msg": "vsock: Fix memory leak in vsock_connect()", - "cvss2": { - "Access Complexity": "High", - "Access Vector": "Adjacent Network", - "Authentication": "Single", - "Availability Impact": "Partial", - "Confidentiality Impact": "None", - "Integrity Impact": "None", - "raw": "AV:A/AC:H/Au:S/C:N/I:N/A:P", - "score": 1.4 - }, + "CVE-2022-42721": { + "affected_versions": "v5.1-rc1 to v6.1-rc1", + "breaks": "0b8fb8235be8be99a197e8d948fc0a2df8dc261a", + "cmt_msg": "wifi: cfg80211: avoid nontransmitted BSS list corruption", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", - "Availability": "Low", + "Availability": "High", "Confidentiality": "None", "Integrity": "None", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", - "score": 3.3 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "score": 5.5 }, - "cwe": "Improper Resource Shutdown or Release", - "fixes": "7e97cfed9929eaabc41829c395eb0d1350fccb9d", - "last_affected_version": "5.19.3", + "cwe": "Loop with Unreachable Exit Condition ('Infinite Loop')", + "fixes": "bcca852027e5878aec911a347407ecc88d6fff7f", + "last_affected_version": "6.0.1", "last_modified": "2023-12-06", - "nvd_text": "A vulnerability was found in Linux Kernel. It has been declared as problematic. This vulnerability affects the function vsock_connect of the file net/vmw_vsock/af_vsock.c. The manipulation leads to memory leak. The complexity of an attack is rather high. The exploitation appears to be difficult. It is recommended to apply a patch to fix this issue. VDB-211930 is the identifier assigned to this vulnerability.", + "nvd_text": "A list management bug in BSS handling in the mac80211 stack in the Linux kernel 5.1 through 5.19.x before 5.19.16 could be used by local attackers (able to inject WLAN frames) to corrupt a linked list and, in turn, potentially execute code.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3629", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3629", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-3629", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-3629", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-3629", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-3629" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-42721", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-42721", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-42721", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-42721", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-42721", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-42721" } }, - "CVE-2022-3630": { - "affected_versions": "v5.19-rc6 to v6.0-rc1", - "breaks": "85e4ea1049c70fb99de5c6057e835d151fb647da", - "cmt_msg": "fscache: don't leak cookie access refs if invalidation is in progress or failed", + "CVE-2022-42722": { + "affected_versions": "v5.8-rc1 to v6.1-rc1", + "breaks": "9eaf183af741e3d8393eb571ac8aec9ee7d6530e", + "cmt_msg": "wifi: mac80211: fix crash in beacon protection for P2P-device", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", @@ -79527,290 +85712,349 @@ "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "score": 5.5 }, - "cwe": "Missing Release of Memory after Effective Lifetime", - "fixes": "fb24771faf72a2fd62b3b6287af3c610c3ec9cf1", - "last_affected_version": "5.19.3", - "last_modified": "2023-12-27", - "nvd_text": "A vulnerability was found in Linux Kernel. It has been rated as problematic. This issue affects some unknown processing of the file fs/fscache/cookie.c of the component IPsec. The manipulation leads to memory leak. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-211931.", + "cwe": "NULL Pointer Dereference", + "fixes": "b2d03cabe2b2e150ff5a381731ea0355459be09f", + "last_affected_version": "6.0.1", + "last_modified": "2023-12-06", + "nvd_text": "In the Linux kernel 5.8 through 5.19.x before 5.19.16, local attackers able to inject WLAN frames into the mac80211 stack could cause a NULL pointer dereference denial-of-service attack against the beacon protection of P2P devices.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3630", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3630", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-3630", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-3630", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-3630", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-3630" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-42722", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-42722", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-42722", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-42722", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-42722", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-42722" } }, - "CVE-2022-3633": { - "affected_versions": "v5.4-rc1 to v6.0-rc1", - "breaks": "9d71dd0c70099914fcd063135da3c580865e924c", - "cmt_msg": "can: j1939: j1939_session_destroy(): fix memory leak of skbs", - "cvss2": { - "Access Complexity": "Low", - "Access Vector": "Adjacent Network", - "Authentication": "Single", - "Availability Impact": "Partial", - "Confidentiality Impact": "None", - "Integrity Impact": "None", - "raw": "AV:A/AC:L/Au:S/C:N/I:N/A:P", - "score": 2.7 - }, + "CVE-2022-42895": { + "affected_versions": "v2.6.12-rc2 to v6.1-rc4", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "Bluetooth: L2CAP: Fix attempting to access uninitialized memory", "cvss3": { "Attack Complexity": "Low", - "Attack Vector": "Local", - "Availability": "Low", - "Confidentiality": "None", + "Attack Vector": "Adjacent", + "Availability": "None", + "Confidentiality": "High", "Integrity": "None", - "Privileges Required": "Low", + "Privileges Required": "None", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", - "score": 3.3 + "raw": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "score": 6.5 }, - "cwe": "Improper Resource Shutdown or Release", - "fixes": "8c21c54a53ab21842f5050fa090f26b03c0313d6", - "last_affected_version": "5.15.62", + "cwe": "Access of Uninitialized Pointer", + "fixes": "b1a2cd50c0357f243b7435a732b4e62ba3157a2e", + "last_affected_version": "6.0.7", "last_modified": "2023-12-06", - "nvd_text": "A vulnerability classified as problematic has been found in Linux Kernel. Affected is the function j1939_session_destroy of the file net/can/j1939/transport.c. The manipulation leads to memory leak. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211932.", + "nvd_text": "There is an infoleak vulnerability in the Linux kernel's net/bluetooth/l2cap_core.c's l2cap_parse_conf_req function which can be used to leak kernel pointers remotely.\nWe recommend upgrading past commit\u00a0 https://github.com/torvalds/linux/commit/b1a2cd50c0357f243b7435a732b4e62ba3157a2e https://www.google.com/url \n\n", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3633", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3633", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-3633", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-3633", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-3633", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-3633" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-42895", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-42895", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-42895", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-42895", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-42895", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-42895" } }, - "CVE-2022-3635": { - "affected_versions": "v2.6.12-rc2 to v6.0-rc1", + "CVE-2022-42896": { + "affected_versions": "v2.6.12-rc2 to v6.1-rc4", "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", - "cmt_msg": "atm: idt77252: fix use-after-free bugs caused by tst_timer", + "cmt_msg": "Bluetooth: L2CAP: Fix accepting connection request for invalid SPSM", "cvss3": { - "Attack Complexity": "High", - "Attack Vector": "Local", + "Attack Complexity": "Low", + "Attack Vector": "Adjacent", "Availability": "High", "Confidentiality": "High", "Integrity": "High", - "Privileges Required": "Low", + "Privileges Required": "None", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", - "score": 7.0 + "raw": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "score": 8.8 }, - "cwe": "Improper Restriction of Operations within the Bounds of a Memory Buffer", - "fixes": "3f4093e2bf4673f218c0bf17d8362337c400e77b", - "last_affected_version": "5.19.3", + "cwe": "Use After Free", + "fixes": "711f8c3fb3db61897080468586b970c87c61d9e4", + "last_affected_version": "6.0.7", "last_modified": "2023-12-06", - "nvd_text": "A vulnerability, which was classified as critical, has been found in Linux Kernel. Affected by this issue is the function tst_timer of the file drivers/atm/idt77252.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. VDB-211934 is the identifier assigned to this vulnerability.", + "nvd_text": "There are use-after-free vulnerabilities in the Linux kernel's net/bluetooth/l2cap_core.c's l2cap_connect and l2cap_le_connect_req functions which may allow code execution and leaking kernel memory (respectively) remotely via Bluetooth.\u00a0A remote attacker could execute code leaking kernel memory via Bluetooth if within proximity of the victim.\n\nWe recommend upgrading past commit\u00a0 https://www.google.com/url https://github.com/torvalds/linux/commit/711f8c3fb3db61897080468586b970c87c61d9e4 https://www.google.com/url \n\n", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3635", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3635", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-3635", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-3635", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-3635", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-3635" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-42896", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-42896", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-42896", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-42896", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-42896", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-42896" } }, - "CVE-2022-3636": { - "affected_versions": "unk to v5.19-rc1", - "backport": true, - "breaks": "33fc42de33278b2b3ec6f3390512987bc29a62b7", - "cmt_msg": "net: ethernet: mtk_eth_soc: use after free in __mtk_ppe_check_skb()", + "CVE-2022-43750": { + "affected_versions": "v2.6.21-rc1 to v6.1-rc1", + "breaks": "6f23ee1fefdc1f80bd8a3ab04a1c41ab2dec14c9", + "cmt_msg": "usb: mon: make mmapped memory read only", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", "Confidentiality": "High", "Integrity": "High", - "Privileges Required": "Low", + "Privileges Required": "High", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", - "score": 7.8 + "raw": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "score": 6.7 }, - "cwe": "Use After Free", - "fixes": "17a5f6a78dc7b8db385de346092d7d9f9dc24df6", + "cwe": "Out-of-bounds Write", + "fixes": "a659daf63d16aa883be42f3f34ff84235c302198", + "last_affected_version": "6.0.0", "last_modified": "2023-12-06", - "nvd_text": "A vulnerability, which was classified as critical, was found in Linux Kernel. This affects the function __mtk_ppe_check_skb of the file drivers/net/ethernet/mediatek/mtk_ppe.c of the component Ethernet Handler. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-211935.", + "nvd_text": "drivers/usb/mon/mon_bin.c in usbmon in the Linux kernel before 5.19.15 and 6.x before 6.0.1 allows a user-space client to corrupt the monitor's internal memory.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3636", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3636", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-3636", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-3636", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-3636", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-3636" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-43750", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-43750", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-43750", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-43750", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-43750", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-43750" } }, - "CVE-2022-3640": { - "affected_versions": "v5.19 to v6.1-rc4", - "breaks": "d0be8347c623e0ac4202a1d4e0373882821f56b0", - "cmt_msg": "Bluetooth: L2CAP: fix use-after-free in l2cap_conn_del()", + "CVE-2022-4378": { + "affected_versions": "v5.8-rc1 to v6.1", + "breaks": "32927393dc1ccd60fb2bdc05b9e8e88753761469", + "cmt_msg": "proc: proc_skip_spaces() shouldn't think it is working on C strings", "cvss3": { "Attack Complexity": "Low", - "Attack Vector": "Adjacent", + "Attack Vector": "Local", "Availability": "High", "Confidentiality": "High", "Integrity": "High", - "Privileges Required": "None", + "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", - "score": 8.8 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 7.8 }, - "cwe": "Improper Restriction of Operations within the Bounds of a Memory Buffer", - "fixes": "0d0e2d032811280b927650ff3c15fe5020e82533", - "last_affected_version": "6.0.7", + "cwe": "Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')", + "fixes": "bce9332220bd677d83b19d21502776ad555a0e73", + "last_affected_version": "6.0", "last_modified": "2023-12-06", - "nvd_text": "A vulnerability, which was classified as critical, was found in Linux Kernel. Affected is the function l2cap_conn_del of the file net/bluetooth/l2cap_core.c of the component Bluetooth. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211944.", + "nvd_text": "A stack overflow flaw was found in the Linux kernel's SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3640", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3640", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-3640", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-3640", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-3640", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-3640" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-4378", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-4378", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-4378", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-4378", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-4378", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-4378" } }, - "CVE-2022-36402": { - "affected_versions": "v4.3-rc1 to v6.5", - "breaks": "d80efd5cb3dec16a8d1aea9b8a4a7921972dba65", - "cmt_msg": "drm/vmwgfx: Fix shader stage validation", + "CVE-2022-4379": { + "affected_versions": "v5.6-rc1 to v6.2-rc1", + "breaks": "ce0887ac96d35c7105090e166bb0807dc0a0e838", + "cmt_msg": "NFSD: fix use-after-free in __nfs42_ssc_open()", "cvss3": { "Attack Complexity": "Low", - "Attack Vector": "Local", + "Attack Vector": "Network", "Availability": "High", "Confidentiality": "None", "Integrity": "None", - "Privileges Required": "Low", + "Privileges Required": "None", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", - "score": 5.5 + "raw": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "score": 7.5 }, - "cwe": "Integer Overflow or Wraparound", - "fixes": "14abdfae508228a7307f7491b5c4215ae70c6542", - "last_affected_version": "6.4", - "last_modified": "2024-02-02", - "nvd_text": "An integer overflow vulnerability was found in vmwgfx driver in drivers/gpu/vmxgfx/vmxgfx_execbuf.c in GPU component of Linux kernel with device file '/dev/dri/renderD128 (or Dxxx)'. This flaw allows a local attacker with a user account on the system to gain privilege, causing a denial of service(DoS).", + "cwe": "Use After Free", + "fixes": "75333d48f92256a0dec91dbf07835e804fc411c0", + "last_affected_version": "6.1.2", + "last_modified": "2023-12-06", + "nvd_text": "A use-after-free vulnerability was found in __nfs42_ssc_open() in fs/nfs/nfs4file.c in the Linux kernel. This flaw allows an attacker to conduct a remote denial", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-36402", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-36402", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-36402", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-36402", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-36402", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-36402" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-4379", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-4379", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-4379", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-4379", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-4379", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-4379" } }, - "CVE-2022-3642": { - "affected_versions": "unk to unk", - "breaks": "", - "fixes": "", + "CVE-2022-4382": { + "affected_versions": "v5.3-rc1 to v6.2-rc5", + "breaks": "e5d82a7360d124ae1a38c2a5eac92ba49b125191", + "cmt_msg": "USB: gadgetfs: Fix race between mounting and unmounting", + "cvss3": { + "Attack Complexity": "High", + "Attack Vector": "Physical", + "Availability": "High", + "Confidentiality": "High", + "Integrity": "High", + "Privileges Required": "None", + "Scope": "Unchanged", + "User Interaction": "None", + "raw": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "score": 6.4 + }, + "cwe": "Use After Free", + "fixes": "d18dcfe9860e842f394e37ba01ca9440ab2178f4", + "last_affected_version": "6.1.7", "last_modified": "2023-12-06", - "nvd_text": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.", + "nvd_text": "A use-after-free flaw caused by a race among the superblock operations in the gadgetfs Linux driver was found. It could be triggered by yanking out a device that is running the gadgetfs side.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3642", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3642", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-3642", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-3642", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-3642", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-3642" - }, - "rejected": true + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-4382", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-4382", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-4382", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-4382", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-4382", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-4382" + } }, - "CVE-2022-3643": { - "affected_versions": "v3.19-rc1 to v6.1", - "breaks": "7e5d7753956b374516530e156c5e8aa19652398d", - "cmt_msg": "xen/netback: Ensure protocol headers don't fall in the non-linear area", + "CVE-2022-43945": { + "affected_versions": "v5.11-rc1 to v6.1-rc1", + "breaks": "5191955d6fc65e6d4efe8f4f10a6028298f57281", + "cmt_msg": "NFSD: Protect against send buffer overflow in NFSv2 READDIR", "cvss3": { "Attack Complexity": "Low", - "Attack Vector": "Local", + "Attack Vector": "Network", "Availability": "High", "Confidentiality": "None", "Integrity": "None", - "Privileges Required": "Low", - "Scope": "Changed", + "Privileges Required": "None", + "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", - "score": 6.5 + "raw": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "score": 7.5 }, - "cwe": "Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')", - "fixes": "ad7f402ae4f466647c3a669b8a6f3e5d4271c84a", - "last_affected_version": "6.0", + "cwe": "Allocation of Resources Without Limits or Throttling", + "fixes": "00b4492686e0497fdb924a9d4c8f6f99377e176c", + "last_affected_version": "6.0.2", "last_modified": "2023-12-06", - "nvd_text": "Guests can trigger NIC interface reset/abort/crash via netback It is possible for a guest to trigger a NIC interface reset/abort/crash in a Linux based network backend by sending certain kinds of packets. It appears to be an (unwritten?) assumption in the rest of the Linux network stack that packet protocol headers are all contained within the linear section of the SKB and some NICs behave badly if this is not the case. This has been reported to occur with Cisco (enic) and Broadcom NetXtrem II BCM5780 (bnx2x) though it may be an issue with other NICs/drivers as well. In case the frontend is sending requests with split headers, netback will forward those violating above mentioned assumption to the networking core, resulting in said misbehavior.", + "nvd_text": "The Linux kernel NFSD implementation prior to versions 5.19.17 and 6.0.2 are vulnerable to buffer overflow. NFSD tracks the number of pages held by each NFSD thread by combining the receive and send buffers of a remote procedure call (RPC) into a single array of pages. A client can force the send buffer to shrink by sending an RPC message over TCP with garbage data added at the end of the message. The RPC message with garbage data is still correctly formed according to the specification and is passed forward to handlers. Vulnerable code in NFSD is not expecting the oversized request and writes beyond the allocated buffer space. CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3643", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3643", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-3643", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-3643", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-3643", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-3643" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-43945", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-43945", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-43945", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-43945", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-43945", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-43945" } }, - "CVE-2022-3646": { - "affected_versions": "v2.6.30-rc1 to v6.1-rc1", - "breaks": "9ff05123e3bfbb1d2b68ba1d9bf1f7d1dffc1453", - "cmt_msg": "nilfs2: fix leak of nilfs_root in case of writer thread creation failure", + "CVE-2022-44032": { + "affected_versions": "v2.6.12-rc2 to v6.4-rc1", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "char: pcmcia: remove all the drivers", "cvss3": { - "Attack Complexity": "Low", - "Attack Vector": "Network", - "Availability": "Low", - "Confidentiality": "None", - "Integrity": "None", - "Privileges Required": "Low", + "Attack Complexity": "High", + "Attack Vector": "Physical", + "Availability": "High", + "Confidentiality": "High", + "Integrity": "High", + "Privileges Required": "None", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", - "score": 4.3 + "raw": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "score": 6.4 }, - "cwe": "Improper Resource Shutdown or Release", - "fixes": "d0d51a97063db4704a5ef6bc978dddab1636a306", - "last_affected_version": "6.0.1", + "cwe": "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')", + "fixes": "9b12f050c76f090cc6d0aebe0ef76fed79ec3f15", "last_modified": "2023-12-06", - "nvd_text": "A vulnerability, which was classified as problematic, has been found in Linux Kernel. This issue affects the function nilfs_attach_log_writer of the file fs/nilfs2/segment.c of the component BPF. The manipulation leads to memory leak. The attack may be initiated remotely. It is recommended to apply a patch to fix this issue. The identifier VDB-211961 was assigned to this vulnerability.", + "nvd_text": "An issue was discovered in the Linux kernel through 6.0.6. drivers/char/pcmcia/cm4000_cs.c has a race condition and resultant use-after-free if a physically proximate attacker removes a PCMCIA device while calling open(), aka a race condition between cmm_open() and cm4000_detach().", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3646", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3646", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-3646", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-3646", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-3646", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-3646" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-44032", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-44032", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-44032", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-44032", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-44032", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-44032" } }, - "CVE-2022-3649": { - "affected_versions": "v2.6.12-rc2 to v6.1-rc1", + "CVE-2022-44033": { + "affected_versions": "v2.6.12-rc2 to v6.4-rc1", "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", - "cmt_msg": "nilfs2: fix use-after-free bug of struct nilfs_root", + "cmt_msg": "char: pcmcia: remove all the drivers", "cvss3": { "Attack Complexity": "High", - "Attack Vector": "Local", + "Attack Vector": "Physical", + "Availability": "High", + "Confidentiality": "High", + "Integrity": "High", + "Privileges Required": "None", + "Scope": "Unchanged", + "User Interaction": "None", + "raw": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "score": 6.4 + }, + "cwe": "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')", + "fixes": "9b12f050c76f090cc6d0aebe0ef76fed79ec3f15", + "last_modified": "2023-12-06", + "nvd_text": "An issue was discovered in the Linux kernel through 6.0.6. drivers/char/pcmcia/cm4040_cs.c has a race condition and resultant use-after-free if a physically proximate attacker removes a PCMCIA device while calling open(), aka a race condition between cm4040_open() and reader_detach().", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-44033", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-44033", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-44033", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-44033", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-44033", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-44033" + } + }, + "CVE-2022-44034": { + "affected_versions": "v4.10-rc1 to v6.4-rc1", + "breaks": "f2ed287bcc9073d8edbf6561c389b282163edc78", + "cmt_msg": "char: pcmcia: remove all the drivers", + "cvss3": { + "Attack Complexity": "High", + "Attack Vector": "Physical", "Availability": "High", "Confidentiality": "High", "Integrity": "High", + "Privileges Required": "None", + "Scope": "Unchanged", + "User Interaction": "None", + "raw": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "score": 6.4 + }, + "cwe": "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')", + "fixes": "9b12f050c76f090cc6d0aebe0ef76fed79ec3f15", + "last_modified": "2023-12-06", + "nvd_text": "An issue was discovered in the Linux kernel through 6.0.6. drivers/char/pcmcia/scr24x_cs.c has a race condition and resultant use-after-free if a physically proximate attacker removes a PCMCIA device while calling open(), aka a race condition between scr24x_open() and scr24x_remove().", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-44034", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-44034", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-44034", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-44034", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-44034", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-44034" + } + }, + "CVE-2022-4543": { + "affected_versions": "unk to unk", + "breaks": "", + "cvss3": { + "Attack Complexity": "Low", + "Attack Vector": "Local", + "Availability": "None", + "Confidentiality": "High", + "Integrity": "None", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", - "score": 7.0 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "score": 5.5 }, - "cwe": "Improper Restriction of Operations within the Bounds of a Memory Buffer", - "fixes": "d325dc6eb763c10f591c239550b8c7e5466a5d09", - "last_affected_version": "6.0.1", + "cwe": "Exposure of Sensitive Information to an Unauthorized Actor", + "fixes": "", "last_modified": "2023-12-06", - "nvd_text": "A vulnerability was found in Linux Kernel. It has been classified as problematic. Affected is the function nilfs_new_inode of the file fs/nilfs2/inode.c of the component BPF. The manipulation leads to use after free. It is possible to launch the attack remotely. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211992.", + "nvd_text": "A flaw named \"EntryBleed\" was found in the Linux Kernel Page Table Isolation (KPTI). This issue could allow a local attacker to leak KASLR base via prefetch side-channels based on TLB timing for Intel systems.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3649", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3649", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-3649", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-3649", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-3649", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-3649" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-4543", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-4543", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-4543", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-4543", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-4543", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-4543" } }, - "CVE-2022-36879": { - "affected_versions": "v2.6.35-rc1 to v5.19-rc8", - "breaks": "80c802f3073e84c956846e921e8a0b02dfa3755f", - "cmt_msg": "xfrm: xfrm_policy: fix a possible double xfrm_pols_put() in xfrm_bundle_lookup()", + "CVE-2022-45869": { + "affected_versions": "v5.12-rc1-dontuse to v6.1-rc7", + "breaks": "a2855afc7ee88475e8feb16840b23f787bfc994d", + "cmt_msg": "KVM: x86/mmu: Fix race condition in direct_page_fault", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", @@ -79823,113 +86067,112 @@ "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "score": 5.5 }, - "cwe": "Unspecified", - "fixes": "f85daf0e725358be78dfd208dea5fd665d8cb901", - "last_affected_version": "5.18.14", + "cwe": "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')", + "fixes": "47b0c2e4c220f2251fd8dcfbb44479819c715e15", + "last_affected_version": "6.0.10", "last_modified": "2023-12-06", - "nvd_text": "An issue was discovered in the Linux kernel through 5.18.14. xfrm_expand_policies in net/xfrm/xfrm_policy.c can cause a refcount to be dropped twice.", + "nvd_text": "A race condition in the x86 KVM subsystem in the Linux kernel through 6.1-rc6 allows guest OS users to cause a denial of service (host OS crash or host OS memory corruption) when nested virtualisation and the TDP MMU are enabled.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-36879", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-36879", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-36879", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-36879", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-36879", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-36879" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-45869", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-45869", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-45869", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-45869", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-45869", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-45869" } }, - "CVE-2022-36946": { - "affected_versions": "v2.6.14-rc1 to v5.19", - "breaks": "7af4cc3fa158ff1dda6e7451c7e6afa6b0bb85cb", - "cmt_msg": "netfilter: nf_queue: do not allow packet truncation below transport header offset", + "CVE-2022-45884": { + "affected_versions": "v2.6.21-rc2 to unk", + "breaks": "b61901024776b25ce7b8edc31bb1757c7382a88e", "cvss3": { - "Attack Complexity": "Low", - "Attack Vector": "Network", + "Attack Complexity": "High", + "Attack Vector": "Local", "Availability": "High", - "Confidentiality": "None", - "Integrity": "None", - "Privileges Required": "None", + "Confidentiality": "High", + "Integrity": "High", + "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", - "score": 7.5 + "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 7.0 }, - "cwe": "Unspecified", - "fixes": "99a63d36cb3ed5ca3aa6fcb64cffbeaf3b0fb164", - "last_affected_version": "5.18", + "cwe": "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')", + "fixes": "", "last_modified": "2023-12-06", - "nvd_text": "nfqnl_mangle in net/netfilter/nfnetlink_queue.c in the Linux kernel through 5.18.14 allows remote attackers to cause a denial of service (panic) because, in the case of an nf_queue verdict with a one-byte nfta_payload attribute, an skb_pull can encounter a negative skb->len.", + "nvd_text": "An issue was discovered in the Linux kernel through 6.0.9. drivers/media/dvb-core/dvbdev.c has a use-after-free, related to dvb_register_device dynamically allocating fops.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-36946", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-36946", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-36946", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-36946", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-36946", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-36946" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-45884", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-45884", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-45884", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-45884", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-45884", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-45884" } }, - "CVE-2022-3707": { - "affected_versions": "v4.19-rc1 to v6.2-rc3", - "breaks": "b901b252b6cf5cecc612059ccf05d974a9085c58", - "cmt_msg": "drm/i915/gvt: fix double free bug in split_2MB_gtt_entry", + "CVE-2022-45885": { + "affected_versions": "unk to unk", + "breaks": "", "cvss3": { - "Attack Complexity": "Low", + "Attack Complexity": "High", "Attack Vector": "Local", "Availability": "High", - "Confidentiality": "None", - "Integrity": "None", + "Confidentiality": "High", + "Integrity": "High", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", - "score": 5.5 + "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 7.0 }, - "fixes": "4a61648af68f5ba4884f0e3b494ee1cabc4b6620", - "last_affected_version": "6.1.4", + "cwe": "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')", + "fixes": "", "last_modified": "2023-12-06", - "nvd_text": "A double-free memory flaw was found in the Linux kernel. The Intel GVT-g graphics driver triggers VGA card system resource overload, causing a fail in the intel_gvt_dma_map_guest_page function. This issue could allow a local user to crash the system.", + "nvd_text": "An issue was discovered in the Linux kernel through 6.0.9. drivers/media/dvb-core/dvb_frontend.c has a race condition that can cause a use-after-free when a device is disconnected.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3707", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3707", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-3707", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-3707", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-3707", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-3707" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-45885", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-45885", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-45885", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-45885", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-45885", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-45885" } }, - "CVE-2022-38096": { - "affected_versions": "unk to unk", - "breaks": "", + "CVE-2022-45886": { + "affected_versions": "v2.6.12-rc2 to v6.4-rc3", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "media: dvb-core: Fix use-after-free due on race condition at dvb_net", "cvss3": { - "Attack Complexity": "Low", + "Attack Complexity": "High", "Attack Vector": "Local", "Availability": "High", - "Confidentiality": "None", - "Integrity": "None", + "Confidentiality": "High", + "Integrity": "High", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", - "score": 5.5 + "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 7.0 }, - "cwe": "NULL Pointer Dereference", - "fixes": "", + "cwe": "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')", + "fixes": "4172385b0c9ac366dcab78eda48c26814b87ed1a", + "last_affected_version": "6.3.6", "last_modified": "2023-12-06", - "nvd_text": "A NULL pointer dereference vulnerability was found in vmwgfx driver in drivers/gpu/vmxgfx/vmxgfx_execbuf.c in GPU component of Linux kernel with device file '/dev/dri/renderD128 (or Dxxx)'. This flaw allows a local attacker with a user account on the system to gain privilege, causing a denial of service(DoS).", + "nvd_text": "An issue was discovered in the Linux kernel through 6.0.9. drivers/media/dvb-core/dvb_net.c has a .disconnect versus dvb_device_open race condition that leads to a use-after-free.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-38096", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-38096", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-38096", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-38096", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-38096", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-38096" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-45886", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-45886", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-45886", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-45886", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-45886", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-45886" } }, - "CVE-2022-38457": { - "affected_versions": "v4.20-rc1 to v6.2-rc4", - "breaks": "e8c66efbfe3a2e3cbc573f2474a3d51690f1b857", - "cmt_msg": "drm/vmwgfx: Remove rcu locks from user resources", + "CVE-2022-45887": { + "affected_versions": "v2.6.12-rc2 to v6.4-rc3", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb()", "cvss3": { - "Attack Complexity": "Low", + "Attack Complexity": "High", "Attack Vector": "Local", "Availability": "High", "Confidentiality": "None", @@ -79937,56 +86180,86 @@ "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", - "score": 5.5 + "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", + "score": 4.7 }, - "cwe": "Use After Free", - "fixes": "a309c7194e8a2f8bd4539b9449917913f6c2cd50", - "last_affected_version": "6.1.6", + "cwe": "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')", + "fixes": "517a281338322ff8293f988771c98aaa7205e457", + "last_affected_version": "6.3.6", "last_modified": "2023-12-06", - "nvd_text": "A use-after-free(UAF) vulnerability was found in function 'vmw_cmd_res_check' in drivers/gpu/vmxgfx/vmxgfx_execbuf.c in Linux kernel's vmwgfx driver with device file '/dev/dri/renderD128 (or Dxxx)'. This flaw allows a local attacker with a user account on the system to gain privilege, causing a denial of service(DoS).", + "nvd_text": "An issue was discovered in the Linux kernel through 6.0.9. drivers/media/usb/ttusb-dec/ttusb_dec.c has a memory leak because of the lack of a dvb_frontend_detach call.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-38457", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-38457", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-38457", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-38457", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-38457", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-38457" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-45887", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-45887", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-45887", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-45887", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-45887", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-45887" } }, - "CVE-2022-3903": { - "affected_versions": "v2.6.12-rc2 to v6.1-rc2", - "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", - "cmt_msg": "media: mceusb: Use new usb_control_msg_*() routines", + "CVE-2022-45888": { + "affected_versions": "v5.14-rc1 to v6.2-rc1", + "breaks": "a53d1202aef122894b6e46116a92174a9123db5d", + "cmt_msg": "char: xillybus: Prevent use-after-free due to race condition", "cvss3": { - "Attack Complexity": "Low", + "Attack Complexity": "High", "Attack Vector": "Physical", "Availability": "High", - "Confidentiality": "None", - "Integrity": "None", + "Confidentiality": "High", + "Integrity": "High", "Privileges Required": "None", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", - "score": 4.6 + "raw": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "score": 6.4 }, - "cwe": "Access of Resource Using Incompatible Type ('Type Confusion')", - "fixes": "41fd1cb6151439b205ac7611883d85ae14250172", + "cwe": "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')", + "fixes": "282a4b71816b6076029017a7bab3a9dcee12a920", "last_modified": "2023-12-06", - "nvd_text": "An incorrect read request flaw was found in the Infrared Transceiver USB driver in the Linux kernel. This issue occurs when a user attaches a malicious USB device. A local user could use this flaw to starve the resources, causing denial of service or potentially crashing the system.", + "nvd_text": "An issue was discovered in the Linux kernel through 6.0.9. drivers/char/xillybus/xillyusb.c has a race condition and use-after-free during physical removal of a USB device.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3903", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3903", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-3903", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-3903", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-3903", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-3903" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-45888", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-45888", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-45888", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-45888", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-45888", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-45888" } }, - "CVE-2022-3910": { - "affected_versions": "v5.18 to v6.0-rc6", - "breaks": "aa184e8671f0f911fc2fb3f68cd506e4d7838faa", - "cmt_msg": "io_uring/msg_ring: check file type before putting", + "CVE-2022-45919": { + "affected_versions": "v2.6.12-rc2 to v6.4-rc3", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221", + "cvss3": { + "Attack Complexity": "High", + "Attack Vector": "Local", + "Availability": "High", + "Confidentiality": "High", + "Integrity": "High", + "Privileges Required": "Low", + "Scope": "Unchanged", + "User Interaction": "None", + "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 7.0 + }, + "cwe": "Use After Free", + "fixes": "280a8ab81733da8bc442253c700a52c4c0886ffd", + "last_affected_version": "6.3.6", + "last_modified": "2023-12-06", + "nvd_text": "An issue was discovered in the Linux kernel through 6.0.10. In drivers/media/dvb-core/dvb_ca_en50221.c, a use-after-free can occur is there is a disconnect after an open, because of the lack of a wait_event.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-45919", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-45919", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-45919", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-45919", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-45919", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-45919" + } + }, + "CVE-2022-45934": { + "affected_versions": "v2.6.12-rc2 to v6.1", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "Bluetooth: L2CAP: Fix u8 overflow", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", @@ -79999,26 +86272,26 @@ "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "score": 7.8 }, - "cwe": "Unspecified", - "fixes": "fc7222c3a9f56271fba02aabbfbae999042f1679", - "last_affected_version": "5.19.10", + "cwe": "Integer Overflow or Wraparound", + "fixes": "bcd70260ef56e0aee8a4fc6cd214a419900b0765", + "last_affected_version": "6.0", "last_modified": "2023-12-06", - "nvd_text": "Use After Free vulnerability in Linux Kernel allows Privilege Escalation. An improper Update of Reference Count in io_uring leads to Use-After-Free and Local Privilege Escalation.\nWhen io_msg_ring was invoked with a fixed file, it called io_fput_file() which improperly decreased its reference count (leading to Use-After-Free and Local Privilege Escalation). Fixed files are permanently registered to the ring, and should not be put separately.\n\nWe recommend upgrading past commit https://github.com/torvalds/linux/commit/fc7222c3a9f56271fba02aabbfbae999042f1679 https://github.com/torvalds/linux/commit/fc7222c3a9f56271fba02aabbfbae999042f1679 \n", + "nvd_text": "An issue was discovered in the Linux kernel through 6.0.10. l2cap_config_req in net/bluetooth/l2cap_core.c has an integer wraparound via L2CAP_CONF_REQ packets.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3910", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3910", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-3910", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-3910", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-3910", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-3910" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-45934", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-45934", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-45934", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-45934", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-45934", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-45934" } }, - "CVE-2022-39188": { - "affected_versions": "v2.6.12-rc2 to v5.19-rc8", + "CVE-2022-4662": { + "affected_versions": "v2.6.12-rc2 to v6.0-rc4", "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", - "cmt_msg": "mmu_gather: Force tlb-flush VM_PFNMAP vmas", + "cmt_msg": "USB: core: Prevent nested device-reset calls", "cvss3": { - "Attack Complexity": "High", + "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", "Confidentiality": "None", @@ -80026,26 +86299,27 @@ "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", - "score": 4.7 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "score": 5.5 }, - "cwe": "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')", - "fixes": "b67fbebd4cf980aecbcc750e1462128bffe8ae15", + "cwe": "Non-exit on Failed Initialization", + "fixes": "9c6d778800b921bde3bff3cff5003d1650f942d1", + "last_affected_version": "5.19.7", "last_modified": "2023-12-06", - "nvd_text": "An issue was discovered in include/asm-generic/tlb.h in the Linux kernel before 5.19. Because of a race condition (unmap_mapping_range versus munmap), a device driver can free a page while it still has stale TLB entries. This only occurs in situations with VM_PFNMAP VMAs.", + "nvd_text": "A flaw incorrect access control in the Linux kernel USB core subsystem was found in the way user attaches usb device. A local user could use this flaw to crash the system.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-39188", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-39188", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-39188", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-39188", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-39188", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-39188" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-4662", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-4662", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-4662", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-4662", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-4662", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-4662" } }, - "CVE-2022-39189": { - "affected_versions": "v4.16-rc1 to v5.19-rc2", - "breaks": "f38a7b75267f1fb240a8178cbcb16d66dd37aac8", - "cmt_msg": "KVM: x86: do not report a vCPU as preempted outside instruction boundaries", + "CVE-2022-4696": { + "affected_versions": "v5.10-rc1 to v5.12-rc1-dontuse", + "breaks": "0f203765880c4416675726be558b65da4a7604e2", + "cmt_msg": "io_uring: remove any grabbing of context", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", @@ -80058,54 +86332,52 @@ "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "score": 7.8 }, - "cwe": "Unspecified", - "fixes": "6cd88243c7e03845a450795e134b488fc2afb736", - "last_affected_version": "5.18.16", + "cwe": "Use After Free", + "fixes": "44526bedc2ff8fcd58552e3c5bae928524b6f13c", "last_modified": "2023-12-06", - "nvd_text": "An issue was discovered the x86 KVM subsystem in the Linux kernel before 5.18.17. Unprivileged guest users can compromise the guest kernel because TLB flush operations are mishandled in certain KVM_VCPU_PREEMPTED situations.", + "nvd_text": "There exists a use-after-free vulnerability in the Linux kernel through io_uring and the\u00a0IORING_OP_SPLICE operation. If\u00a0IORING_OP_SPLICE is\u00a0missing the IO_WQ_WORK_FILES flag, which signals that the operation won't use current->nsproxy, so its reference counter is not increased. This assumption is not always true as calling io_splice on specific files will call the get_uts function which will use current->nsproxy leading to invalidly decreasing its reference counter later causing the use-after-free vulnerability. We recommend upgrading to version 5.10.160 or above\n", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-39189", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-39189", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-39189", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-39189", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-39189", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-39189" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-4696", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-4696", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-4696", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-4696", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-4696", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-4696" } }, - "CVE-2022-39190": { - "affected_versions": "v5.9-rc1 to v6.0-rc3", - "breaks": "d0e2c7de92c7f2b3d355ad76b0bb9fc43d1beb87", - "cmt_msg": "netfilter: nf_tables: disallow binding to already bound chain", + "CVE-2022-4744": { + "affected_versions": "v2.6.12-rc2 to v5.16-rc7", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "tun: avoid double free in tun_free_netdev", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", - "Confidentiality": "None", - "Integrity": "None", + "Confidentiality": "High", + "Integrity": "High", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", - "score": 5.5 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 7.8 }, - "cwe": "Unspecified", - "fixes": "e02f0d3970404bfea385b6edb86f2d936db0ea2b", - "last_affected_version": "5.19.5", + "fixes": "158b515f703e75e7d68289bf4d98c664e1d632df", + "last_affected_version": "5.15.11", "last_modified": "2023-12-06", - "nvd_text": "An issue was discovered in net/netfilter/nf_tables_api.c in the Linux kernel before 5.19.6. A denial of service can occur upon binding to an already bound chain.", + "nvd_text": "A double-free flaw was found in the Linux kernel\u2019s TUN/TAP device driver functionality in how a user registers the device when the register_netdevice function fails (NETDEV_REGISTER notifier). This flaw allows a local user to crash or potentially escalate their privileges on the system.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-39190", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-39190", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-39190", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-39190", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-39190", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-39190" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-4744", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-4744", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-4744", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-4744", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-4744", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-4744" } }, - "CVE-2022-3977": { - "affected_versions": "v5.18-rc1 to v6.1-rc1", - "breaks": "63ed1aab3d40aa61aaa66819bdce9377ac7f40fa", - "cmt_msg": "mctp: prevent double key removal and unref", + "CVE-2022-47518": { + "affected_versions": "v5.7-rc1 to v6.1-rc8", + "breaks": "4fb8b5aa2a1126783ae00bae544d6f3c519408ef", + "cmt_msg": "wifi: wilc1000: validate number of channels", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", @@ -80118,113 +86390,114 @@ "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "score": 7.8 }, - "cwe": "Use After Free", - "fixes": "3a732b46736cd8a29092e4b0b1a9ba83e672bf89", - "last_affected_version": "6.0.1", + "cwe": "Out-of-bounds Write", + "fixes": "0cdfa9e6f0915e3d243e2393bfa8a22e12d553b0", + "last_affected_version": "6.0.10", "last_modified": "2023-12-06", - "nvd_text": "A use-after-free flaw was found in the Linux kernel MCTP (Management Component Transport Protocol) functionality. This issue occurs when a user simultaneously calls DROPTAG ioctl and socket close happens, which could allow a local user to crash the system or potentially escalate their privileges on the system.", + "nvd_text": "An issue was discovered in the Linux kernel before 6.0.11. Missing validation of the number of channels in drivers/net/wireless/microchip/wilc1000/cfg80211.c in the WILC1000 wireless driver can trigger a heap-based buffer overflow when copying the list of operating channels from Wi-Fi management frames.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-3977", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-3977", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-3977", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-3977", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-3977", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-3977" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-47518", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-47518", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-47518", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-47518", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-47518", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-47518" } }, - "CVE-2022-39842": { - "affected_versions": "v2.6.38-rc1 to v5.19-rc4", - "breaks": "364dbdf3b6c31a4a5fb7a6d479e7aafb4a7a10b6", - "cmt_msg": "video: fbdev: pxa3xx-gcu: Fix integer overflow in pxa3xx_gcu_write", + "CVE-2022-47519": { + "affected_versions": "v5.7-rc1 to v6.1-rc8", + "breaks": "4fb8b5aa2a1126783ae00bae544d6f3c519408ef", + "cmt_msg": "wifi: wilc1000: validate length of IEEE80211_P2P_ATTR_OPER_CHANNEL attribute", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", - "Confidentiality": "None", - "Integrity": "Low", + "Confidentiality": "High", + "Integrity": "High", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H", - "score": 6.1 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 7.8 }, - "cwe": "Integer Overflow or Wraparound", - "fixes": "a09d2d00af53b43c6f11e6ab3cb58443c2cac8a7", - "last_affected_version": "5.15.69", + "cwe": "Out-of-bounds Write", + "fixes": "051ae669e4505abbe05165bebf6be7922de11f41", + "last_affected_version": "6.0.10", "last_modified": "2023-12-06", - "nvd_text": "An issue was discovered in the Linux kernel before 5.19. In pxa3xx_gcu_write in drivers/video/fbdev/pxa3xx-gcu.c, the count parameter has a type conflict of size_t versus int, causing an integer overflow and bypassing the size check. After that, because it is used as the third argument to copy_from_user(), a heap overflow may occur. NOTE: the original discoverer disputes that the overflow can actually happen.", + "nvd_text": "An issue was discovered in the Linux kernel before 6.0.11. Missing validation of IEEE80211_P2P_ATTR_OPER_CHANNEL in drivers/net/wireless/microchip/wilc1000/cfg80211.c in the WILC1000 wireless driver can trigger an out-of-bounds write when parsing the channel list attribute from Wi-Fi management frames.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-39842", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-39842", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-39842", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-39842", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-39842", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-39842" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-47519", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-47519", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-47519", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-47519", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-47519", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-47519" } }, - "CVE-2022-40133": { - "affected_versions": "v4.20-rc1 to v6.2-rc4", - "breaks": "e8c66efbfe3a2e3cbc573f2474a3d51690f1b857", - "cmt_msg": "drm/vmwgfx: Remove rcu locks from user resources", + "CVE-2022-47520": { + "affected_versions": "v4.2-rc1 to v6.1-rc8", + "breaks": "c5c77ba18ea66aa05441c71e38473efb787705a4", + "cmt_msg": "wifi: wilc1000: validate pairwise and authentication suite offsets", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", - "Confidentiality": "None", + "Confidentiality": "High", "Integrity": "None", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", - "score": 5.5 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", + "score": 7.1 }, - "cwe": "Use After Free", - "fixes": "a309c7194e8a2f8bd4539b9449917913f6c2cd50", - "last_affected_version": "6.1.6", + "cwe": "Out-of-bounds Read", + "fixes": "cd21d99e595ec1d8721e1058dcdd4f1f7de1d793", + "last_affected_version": "6.0.10", "last_modified": "2023-12-06", - "nvd_text": "A use-after-free(UAF) vulnerability was found in function 'vmw_execbuf_tie_context' in drivers/gpu/vmxgfx/vmxgfx_execbuf.c in Linux kernel's vmwgfx driver with device file '/dev/dri/renderD128 (or Dxxx)'. This flaw allows a local attacker with a user account on the system to gain privilege, causing a denial of service(DoS).", + "nvd_text": "An issue was discovered in the Linux kernel before 6.0.11. Missing offset validation in drivers/net/wireless/microchip/wilc1000/hif.c in the WILC1000 wireless driver can trigger an out-of-bounds read when parsing a Robust Security Network (RSN) information element from a Netlink packet.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-40133", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-40133", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-40133", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-40133", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-40133", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-40133" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-47520", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-47520", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-47520", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-47520", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-47520", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-47520" } }, - "CVE-2022-40307": { - "affected_versions": "v4.7-rc1 to v6.0-rc5", - "breaks": "65117f1aa1b2d145fd5ca376bde642794d0aae1b", - "cmt_msg": "efi: capsule-loader: Fix use-after-free in efi_capsule_write", + "CVE-2022-47521": { + "affected_versions": "v5.7-rc1 to v6.1-rc8", + "breaks": "4fb8b5aa2a1126783ae00bae544d6f3c519408ef", + "cmt_msg": "wifi: wilc1000: validate length of IEEE80211_P2P_ATTR_CHANNEL_LIST attribute", "cvss3": { - "Attack Complexity": "High", + "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", - "Confidentiality": "None", - "Integrity": "None", + "Confidentiality": "High", + "Integrity": "High", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", - "score": 4.7 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 7.8 }, - "cwe": "Use After Free", - "fixes": "9cb636b5f6a8cc6d1b50809ec8f8d33ae0c84c95", - "last_affected_version": "5.19.8", + "cwe": "Out-of-bounds Write", + "fixes": "f9b62f9843c7b0afdaecabbcebf1dbba18599408", + "last_affected_version": "6.0.10", "last_modified": "2023-12-06", - "nvd_text": "An issue was discovered in the Linux kernel through 5.19.8. drivers/firmware/efi/capsule-loader.c has a race condition with a resultant use-after-free.", + "nvd_text": "An issue was discovered in the Linux kernel before 6.0.11. Missing validation of IEEE80211_P2P_ATTR_CHANNEL_LIST in drivers/net/wireless/microchip/wilc1000/cfg80211.c in the WILC1000 wireless driver can trigger a heap-based buffer overflow when parsing the operating channel attribute from Wi-Fi management frames.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-40307", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-40307", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-40307", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-40307", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-40307", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-40307" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-47521", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-47521", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-47521", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-47521", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-47521", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-47521" } }, - "CVE-2022-40476": { - "affected_versions": "v5.19-rc1 to v5.19-rc4", - "breaks": "9cae36a094e7e9d6e5fe8b6dcd4642138b3eb0c7", + "CVE-2022-47929": { + "affected_versions": "v4.3-rc1 to v6.2-rc4", + "breaks": "d66d6c3152e8d5a6db42a56bf7ae1c6cae87ba48", + "cmt_msg": "net: sched: disallow noqueue for qdisc classes", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", @@ -80238,199 +86511,203 @@ "score": 5.5 }, "cwe": "NULL Pointer Dereference", - "fixes": "386e4fb6962b9f248a80f8870aea0870ca603e89", + "fixes": "96398560f26aa07e8f2969d73c8197e6a6d10407", + "last_affected_version": "6.1.5", "last_modified": "2023-12-06", - "nvd_text": "A null pointer dereference issue was discovered in fs/io_uring.c in the Linux kernel before 5.15.62. A local user could use this flaw to crash the system or potentially cause a denial of service.", + "nvd_text": "In the Linux kernel before 6.1.6, a NULL pointer dereference bug in the traffic control subsystem allows an unprivileged user to trigger a denial of service (system crash) via a crafted traffic control configuration that is set up with \"tc qdisc\" and \"tc class\" commands. This affects qdisc_graft in net/sched/sch_api.c.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-40476", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-40476", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-40476", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-40476", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-40476", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-40476" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-47929", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-47929", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-47929", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-47929", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-47929", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-47929" } }, - "CVE-2022-40768": { - "affected_versions": "v2.6.19-rc1 to v6.1-rc1", - "breaks": "5a25ba1677ab8d63890016a8c1bca68a3e0fbc7d", - "cmt_msg": "scsi: stex: Properly zero out the passthrough command structure", + "CVE-2022-47938": { + "affected_versions": "v5.15-rc1 to v6.0-rc1", + "breaks": "e2f34481b24db2fd634b5edb0a5bd0e4d38cc6e9", + "cmt_msg": "ksmbd: prevent out of bound read for SMB2_TREE_CONNNECT", "cvss3": { "Attack Complexity": "Low", - "Attack Vector": "Local", - "Availability": "None", - "Confidentiality": "High", + "Attack Vector": "Network", + "Availability": "High", + "Confidentiality": "None", "Integrity": "None", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", - "score": 5.5 + "raw": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "score": 6.5 }, - "cwe": "Exposure of Resource to Wrong Sphere", - "fixes": "6022f210461fef67e6e676fd8544ca02d1bcfa7a", - "last_affected_version": "6.0.1", + "cwe": "Out-of-bounds Read", + "fixes": "824d4f64c20093275f72fc8101394d75ff6a249e", + "last_affected_version": "5.19.1", "last_modified": "2023-12-06", - "nvd_text": "drivers/scsi/stex.c in the Linux kernel through 5.19.9 allows local users to obtain sensitive information from kernel memory because stex_queuecommand_lck lacks a memset for the PASSTHRU_CMD case.", + "nvd_text": "An issue was discovered in ksmbd in the Linux kernel 5.15 through 5.19 before 5.19.2. fs/ksmbd/smb2misc.c has an out-of-bounds read and OOPS for SMB2_TREE_CONNECT.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-40768", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-40768", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-40768", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-40768", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-40768", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-40768" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-47938", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-47938", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-47938", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-47938", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-47938", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-47938" } }, - "CVE-2022-4095": { - "affected_versions": "v2.6.37-rc1 to v6.0-rc4", - "breaks": "2865d42c78a9121caad52cb02d1fbb7f5cdbc4ef", - "cmt_msg": "staging: rtl8712: fix use after free bugs", + "CVE-2022-47939": { + "affected_versions": "v5.15-rc1 to v6.0-rc1", + "breaks": "e2f34481b24db2fd634b5edb0a5bd0e4d38cc6e9", + "cmt_msg": "ksmbd: fix use-after-free bug in smb2_tree_disconect", "cvss3": { "Attack Complexity": "Low", - "Attack Vector": "Local", + "Attack Vector": "Network", "Availability": "High", "Confidentiality": "High", "Integrity": "High", - "Privileges Required": "Low", + "Privileges Required": "None", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", - "score": 7.8 + "raw": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "score": 9.8 }, - "fixes": "e230a4455ac3e9b112f0367d1b8e255e141afae0", - "last_affected_version": "5.19.7", + "cwe": "Use After Free", + "fixes": "cf6531d98190fa2cf92a6d8bbc8af0a4740a223c", + "last_affected_version": "5.19.1", "last_modified": "2023-12-06", - "nvd_text": "A use-after-free flaw was found in Linux kernel before 5.19.2. This issue occurs in cmd_hdl_filter in drivers/staging/rtl8712/rtl8712_cmd.c, allowing an attacker to launch a local denial of service attack and gain escalation of privileges.", + "nvd_text": "An issue was discovered in ksmbd in the Linux kernel 5.15 through 5.19 before 5.19.2. fs/ksmbd/smb2pdu.c has a use-after-free and OOPS for SMB2_TREE_DISCONNECT.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-4095", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-4095", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-4095", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-4095", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-4095", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-4095" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-47939", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-47939", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-47939", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-47939", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-47939", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-47939" } }, - "CVE-2022-40982": { - "affected_versions": "v2.6.12-rc2 to v6.5-rc6", - "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", - "cmt_msg": "x86/speculation: Add Gather Data Sampling mitigation", + "CVE-2022-47940": { + "affected_versions": "v5.15-rc1 to v5.19-rc1", + "breaks": "e2f34481b24db2fd634b5edb0a5bd0e4d38cc6e9", + "cmt_msg": "ksmbd: validate length in smb2_write()", "cvss3": { "Attack Complexity": "Low", - "Attack Vector": "Local", - "Availability": "None", + "Attack Vector": "Network", + "Availability": "High", "Confidentiality": "High", "Integrity": "None", "Privileges Required": "Low", - "Scope": "Changed", + "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", - "score": 6.5 + "raw": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", + "score": 8.1 }, - "fixes": "8974eb588283b7d44a7c91fa09fcbaf380339f3a", - "last_affected_version": "6.4.8", - "last_modified": "2023-12-06", - "nvd_text": "Information exposure through microarchitectural state after transient execution in certain vector execution units for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", + "cwe": "Out-of-bounds Read", + "fixes": "158a66b245739e15858de42c0ba60fcf3de9b8e6", + "last_affected_version": "5.18.17", + "last_modified": "2023-12-27", + "nvd_text": "An issue was discovered in ksmbd in the Linux kernel 5.15 through 5.18 before 5.18.18. fs/ksmbd/smb2pdu.c lacks length validation in the non-padding case in smb2_write.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-40982", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-40982", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-40982", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-40982", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-40982", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-40982" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-47940", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-47940", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-47940", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-47940", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-47940", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-47940" } }, - "CVE-2022-41218": { - "affected_versions": "v2.6.22-rc1 to v6.2-rc1", - "breaks": "57861b432bda77f8bfafda2fb6f5a922d5f3aef1", - "cmt_msg": "media: dvb-core: Fix UAF due to refcount races at releasing", + "CVE-2022-47941": { + "affected_versions": "v5.15-rc1 to v6.0-rc1", + "breaks": "e2f34481b24db2fd634b5edb0a5bd0e4d38cc6e9", + "cmt_msg": "ksmbd: fix memory leak in smb2_handle_negotiate", "cvss3": { "Attack Complexity": "Low", - "Attack Vector": "Local", + "Attack Vector": "Network", "Availability": "High", "Confidentiality": "None", "Integrity": "None", - "Privileges Required": "Low", + "Privileges Required": "None", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", - "score": 5.5 + "raw": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "score": 7.5 }, - "cwe": "Use After Free", - "fixes": "fd3d91ab1c6ab0628fe642dd570b56302c30a792", - "last_affected_version": "6.1.3", + "cwe": "Missing Release of Memory after Effective Lifetime", + "fixes": "aa7253c2393f6dcd6a1468b0792f6da76edad917", + "last_affected_version": "5.19.1", "last_modified": "2023-12-06", - "nvd_text": "In drivers/media/dvb-core/dmxdev.c in the Linux kernel through 5.19.10, there is a use-after-free caused by refcount races, affecting dvb_demux_open and dvb_dmxdev_release.", + "nvd_text": "An issue was discovered in ksmbd in the Linux kernel 5.15 through 5.19 before 5.19.2. fs/ksmbd/smb2pdu.c omits a kfree call in certain smb2_handle_negotiate error conditions, aka a memory leak.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-41218", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-41218", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-41218", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-41218", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-41218", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-41218" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-47941", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-47941", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-47941", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-47941", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-47941", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-47941" } }, - "CVE-2022-41222": { - "affected_versions": "v2.6.12-rc2 to v5.14-rc1", - "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", - "cmt_msg": "mm/mremap: hold the rmap lock in write mode when moving page table entries.", + "CVE-2022-47942": { + "affected_versions": "v5.15-rc1 to v6.0-rc1", + "breaks": "e2f34481b24db2fd634b5edb0a5bd0e4d38cc6e9", + "cmt_msg": "ksmbd: fix heap-based overflow in set_ntacl_dacl()", "cvss3": { - "Attack Complexity": "High", - "Attack Vector": "Local", + "Attack Complexity": "Low", + "Attack Vector": "Network", "Availability": "High", "Confidentiality": "High", "Integrity": "High", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", - "score": 7.0 + "raw": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 8.8 }, - "cwe": "Use After Free", - "fixes": "97113eb39fa7972722ff490b947d8af023e1f6a2", - "last_affected_version": "5.13.2", + "cwe": "Out-of-bounds Write", + "fixes": "8f0541186e9ad1b62accc9519cc2b7a7240272a7", + "last_affected_version": "5.19.1", "last_modified": "2023-12-06", - "nvd_text": "mm/mremap.c in the Linux kernel before 5.13.3 has a use-after-free via a stale TLB because an rmap lock is not held during a PUD move.", + "nvd_text": "An issue was discovered in ksmbd in the Linux kernel 5.15 through 5.19 before 5.19.2. There is a heap-based buffer overflow in set_ntacl_dacl, related to use of SMB2_QUERY_INFO_HE after a malformed SMB2_SET_INFO_HE command.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-41222", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-41222", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-41222", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-41222", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-41222", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-41222" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-47942", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-47942", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-47942", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-47942", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-47942", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-47942" } }, - "CVE-2022-4127": { - "affected_versions": "v5.19-rc1 to v5.19-rc6", - "breaks": "a7c41b4687f5902af70cd559806990930c8a307b", - "cmt_msg": "io_uring: check that we have a file table when allocating update slots", + "CVE-2022-47943": { + "affected_versions": "v5.15-rc1 to v6.0-rc1", + "breaks": "e2f34481b24db2fd634b5edb0a5bd0e4d38cc6e9", + "cmt_msg": "ksmbd: prevent out of bound read for SMB2_WRITE", "cvss3": { "Attack Complexity": "Low", - "Attack Vector": "Local", + "Attack Vector": "Network", "Availability": "High", - "Confidentiality": "None", + "Confidentiality": "High", "Integrity": "None", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", - "score": 5.5 + "raw": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", + "score": 8.1 }, - "cwe": "NULL Pointer Dereference", - "fixes": "d785a773bed966a75ca1f11d108ae1897189975b", + "cwe": "Out-of-bounds Read", + "fixes": "ac60778b87e45576d7bfdbd6f53df902654e6f09", + "last_affected_version": "5.19.1", "last_modified": "2023-12-06", - "nvd_text": "A NULL pointer dereference issue was discovered in the Linux kernel in io_files_update_with_index_alloc. A local user could use this flaw to potentially crash the system causing a denial of service.", + "nvd_text": "An issue was discovered in ksmbd in the Linux kernel 5.15 through 5.19 before 5.19.2. There is an out-of-bounds read and OOPS for SMB2_WRITE, when there is a large length in the zero DataOffset case.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-4127", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-4127", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-4127", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-4127", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-4127", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-4127" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-47943", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-47943", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-47943", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-47943", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-47943", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-47943" } }, - "CVE-2022-4128": { - "affected_versions": "v5.17-rc1 to v5.19-rc7", - "breaks": "b29fcfb54cd70caca5b11c80d8d238854938884a", - "cmt_msg": "mptcp: fix subflow traversal at disconnect time", + "CVE-2022-47946": { + "affected_versions": "v5.1-rc1 to v5.12-rc2", + "breaks": "2b188cc1bb857a9d4701ae59aa7768b5124e262e", + "cmt_msg": "io_uring: kill sqo_dead and sqo submission halting", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", @@ -80443,24 +86720,23 @@ "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "score": 5.5 }, - "cwe": "NULL Pointer Dereference", - "fixes": "5c835bb142d4013c2ab24bff5ae9f6709a39cbcf", - "last_affected_version": "5.18.12", + "cwe": "Use After Free", + "fixes": "70aacfe66136809d7f080f89c492c278298719f4", "last_modified": "2023-12-06", - "nvd_text": "A NULL pointer dereference issue was discovered in the Linux kernel in the MPTCP protocol when traversing the subflow list at disconnect time. A local user could use this flaw to potentially crash the system causing a denial of service.", + "nvd_text": "An issue was discovered in the Linux kernel 5.10.x before 5.10.155. A use-after-free in io_sqpoll_wait_sq in fs/io_uring.c allows an attacker to crash the kernel, resulting in denial of service. finish_wait can be skipped. An attack can occur in some situations by forking a process and then quickly terminating it. NOTE: later kernel versions, such as the 5.15 longterm series, substantially changed the implementation of io_sqpoll_wait_sq.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-4128", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-4128", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-4128", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-4128", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-4128", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-4128" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-47946", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-47946", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-47946", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-47946", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-47946", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-47946" } }, - "CVE-2022-4129": { - "affected_versions": "v2.6.23-rc1 to v6.1-rc6", - "breaks": "3557baabf28088f49bdf72a048fd33ab62e205b1", - "cmt_msg": "l2tp: Serialize access to sk_user_data with sk_callback_lock", + "CVE-2022-4842": { + "affected_versions": "v5.15-rc1 to v6.2-rc1", + "breaks": "be71b5cba2e6485e8959da7a9f9a44461a1bb074", + "cmt_msg": "fs/ntfs3: Fix attr_punch_hole() null pointer derenference", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", @@ -80473,24 +86749,24 @@ "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "score": 5.5 }, - "cwe": "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')", - "fixes": "b68777d54fac21fc833ec26ea1a2a84f975ab035", - "last_affected_version": "5.15.90", + "cwe": "NULL Pointer Dereference", + "fixes": "6d5c9e79b726cc473d40e9cb60976dbe8e669624", + "last_affected_version": "6.1.7", "last_modified": "2023-12-06", - "nvd_text": "A flaw was found in the Linux kernel's Layer 2 Tunneling Protocol (L2TP). A missing lock when clearing sk_user_data can lead to a race condition and NULL pointer dereference. A local user could use this flaw to potentially crash the system causing a denial of service.", + "nvd_text": "A flaw NULL Pointer Dereference in the Linux kernel NTFS3 driver function attr_punch_hole() was found. A local user could use this flaw to crash the system.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-4129", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-4129", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-4129", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-4129", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-4129", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-4129" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-4842", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-4842", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-4842", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-4842", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-4842", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-4842" } }, - "CVE-2022-4139": { - "affected_versions": "v5.17-rc2 to v6.1-rc8", - "breaks": "7938d61591d33394a21bdd7797a245b65428f44c", - "cmt_msg": "drm/i915: fix TLB invalidation for Gen12 video and compute engines", + "CVE-2022-48423": { + "affected_versions": "v5.15-rc1 to v6.2-rc1", + "breaks": "12dad495eaab95e0bb784c43869073617c513ea4", + "cmt_msg": "fs/ntfs3: Validate resident attribute name", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", @@ -80503,113 +86779,114 @@ "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "score": 7.8 }, - "fixes": "04aa64375f48a5d430b5550d9271f8428883e550", - "last_affected_version": "6.0.10", + "cwe": "Unspecified", + "fixes": "54e45702b648b7c0000e90b3e9b890e367e16ea8", + "last_affected_version": "6.1.2", "last_modified": "2023-12-06", - "nvd_text": "An incorrect TLB flush issue was found in the Linux kernel\u2019s GPU i915 kernel driver, potentially leading to random memory corruption or data leaks. This flaw could allow a local user to crash the system or escalate their privileges on the system.", + "nvd_text": "In the Linux kernel before 6.1.3, fs/ntfs3/record.c does not validate resident attribute names. An out-of-bounds write may occur.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-4139", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-4139", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-4139", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-4139", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-4139", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-4139" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-48423", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-48423", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-48423", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-48423", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-48423", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-48423" } }, - "CVE-2022-41674": { - "affected_versions": "v5.1-rc1 to v6.1-rc1", - "breaks": "0b8fb8235be8be99a197e8d948fc0a2df8dc261a", - "cmt_msg": "wifi: cfg80211: fix u8 overflow in cfg80211_update_notlisted_nontrans()", + "CVE-2022-48424": { + "affected_versions": "v5.15-rc1 to v6.2-rc1", + "breaks": "12dad495eaab95e0bb784c43869073617c513ea4", + "cmt_msg": "fs/ntfs3: Validate attribute name offset", "cvss3": { "Attack Complexity": "Low", - "Attack Vector": "Adjacent", + "Attack Vector": "Local", "Availability": "High", "Confidentiality": "High", - "Integrity": "None", - "Privileges Required": "None", + "Integrity": "High", + "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", - "score": 8.1 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 7.8 }, - "cwe": "Out-of-bounds Write", - "fixes": "aebe9f4639b13a1f4e9a6b42cdd2e38c617b442d", - "last_affected_version": "6.0.1", + "cwe": "Unspecified", + "fixes": "4f1dc7d9756e66f3f876839ea174df2e656b7f79", + "last_affected_version": "6.1.2", "last_modified": "2023-12-06", - "nvd_text": "An issue was discovered in the Linux kernel before 5.19.16. Attackers able to inject WLAN frames could cause a buffer overflow in the ieee80211_bss_info_update function in net/mac80211/scan.c.", + "nvd_text": "In the Linux kernel before 6.1.3, fs/ntfs3/inode.c does not validate the attribute name offset. An unhandled page fault may occur.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-41674", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-41674", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-41674", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-41674", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-41674", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-41674" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-48424", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-48424", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-48424", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-48424", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-48424", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-48424" } }, - "CVE-2022-41848": { - "affected_versions": "unk to unk", - "breaks": "", + "CVE-2022-48425": { + "affected_versions": "v5.15-rc1 to v6.4-rc1", + "breaks": "12dad495eaab95e0bb784c43869073617c513ea4", + "cmt_msg": "fs/ntfs3: Validate MFT flags before replaying logs", "cvss3": { - "Attack Complexity": "High", - "Attack Vector": "Physical", + "Attack Complexity": "Low", + "Attack Vector": "Local", "Availability": "High", - "Confidentiality": "None", - "Integrity": "None", - "Privileges Required": "None", + "Confidentiality": "High", + "Integrity": "High", + "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", - "score": 4.2 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 7.8 }, - "cwe": "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')", - "fixes": "", + "fixes": "98bea253aa28ad8be2ce565a9ca21beb4a9419e5", + "last_affected_version": "6.3.3", "last_modified": "2023-12-06", - "nvd_text": "drivers/char/pcmcia/synclink_cs.c in the Linux kernel through 5.19.12 has a race condition and resultant use-after-free if a physically proximate attacker removes a PCMCIA device while calling ioctl, aka a race condition between mgslpc_ioctl and mgslpc_detach.", + "nvd_text": "In the Linux kernel through 6.2.7, fs/ntfs3/inode.c has an invalid kfree because it does not validate MFT flags before replaying logs.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-41848", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-41848", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-41848", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-41848", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-41848", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-41848" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-48425", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-48425", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-48425", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-48425", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-48425", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-48425" } }, - "CVE-2022-41849": { - "affected_versions": "v2.6.12-rc2 to v6.1-rc1", - "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", - "cmt_msg": "fbdev: smscufx: Fix use-after-free in ufx_ops_open()", + "CVE-2022-48502": { + "affected_versions": "v5.15-rc1 to v6.2-rc1", + "breaks": "f7464060f7ab9a2424428008f0ee9f1e267e410f", + "cmt_msg": "fs/ntfs3: Check fields while reading", "cvss3": { - "Attack Complexity": "High", - "Attack Vector": "Physical", + "Attack Complexity": "Low", + "Attack Vector": "Local", "Availability": "High", - "Confidentiality": "None", + "Confidentiality": "High", "Integrity": "None", - "Privileges Required": "None", + "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", - "score": 4.2 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", + "score": 7.1 }, - "cwe": "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')", - "fixes": "5610bcfe8693c02e2e4c8b31427f1bdbdecc839c", - "last_affected_version": "6.0.2", + "fixes": "0e8235d28f3a0e9eda9f02ff67ee566d5f42b66b", + "last_affected_version": "6.1.39", "last_modified": "2023-12-06", - "nvd_text": "drivers/video/fbdev/smscufx.c in the Linux kernel through 5.19.12 has a race condition and resultant use-after-free if a physically proximate attacker removes a USB device while calling open(), aka a race condition between ufx_ops_open and ufx_usb_disconnect.", + "nvd_text": "An issue was discovered in the Linux kernel before 6.2. The ntfs3 subsystem does not properly check for correctness during disk reads, leading to an out-of-bounds read in ntfs_set_ea in fs/ntfs3/xattr.c.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-41849", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-41849", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-41849", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-41849", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-41849", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-41849" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-48502", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-48502", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-48502", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-48502", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-48502", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-48502" } }, - "CVE-2022-41850": { - "affected_versions": "v2.6.12-rc2 to v6.1-rc1", + "CVE-2022-48619": { + "affected_versions": "v2.6.12-rc2 to v5.18-rc1", "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", - "cmt_msg": "HID: roccat: Fix use-after-free in roccat_read()", + "cmt_msg": "Input: add bounds checking to input_set_capability()", "cvss3": { - "Attack Complexity": "High", + "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", "Confidentiality": "None", @@ -80617,87 +86894,215 @@ "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", - "score": 4.7 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "score": 5.5 }, - "cwe": "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')", - "fixes": "cacdb14b1c8d3804a3a7d31773bc7569837b71a4", - "last_affected_version": "6.0.2", - "last_modified": "2023-12-06", - "nvd_text": "roccat_report_event in drivers/hid/hid-roccat.c in the Linux kernel through 5.19.12 has a race condition and resultant use-after-free in certain situations where a report is received while copying a report->value is in progress.", + "cwe": "Unspecified", + "fixes": "409353cbe9fe48f6bc196114c442b1cff05a39bc", + "last_affected_version": "5.17.9", + "last_modified": "2024-02-02", + "nvd_text": "An issue was discovered in drivers/input/input.c in the Linux kernel before 5.17.10. An attacker can cause a denial of service (panic) because input_set_capability mishandles the situation in which an event code falls outside of a bitmap.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-41850", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-41850", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-41850", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-41850", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-41850", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-41850" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-48619", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-48619", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-48619", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-48619", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-48619", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-48619" } }, - "CVE-2022-41858": { - "affected_versions": "v2.6.12-rc2 to v5.18-rc2", + "CVE-2022-48626": { + "affected_versions": "unk to v5.17-rc4", + "breaks": "", + "cmt_msg": "moxart: fix potential use-after-free on remove path", + "fixes": "bd2db32e7c3e35bd4d9b8bbff689434a50893546", + "last_affected_version": "5.16.8", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmoxart: fix potential use-after-free on remove path\n\nIt was reported that the mmc host structure could be accessed after it\nwas freed in moxart_remove(), so fix this by saving the base register of\nthe device and using it instead of the pointer dereference.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-48626", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-48626", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-48626", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-48626", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-48626", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-48626" + } + }, + "CVE-2022-48627": { + "affected_versions": "v3.7-rc1 to v5.19-rc7", + "breaks": "81732c3b2fede049a692e58a7ceabb6d18ffb18c", + "cmt_msg": "vt: fix memory overlapping when deleting chars in the buffer", + "fixes": "39cdb68c64d84e71a4a717000b6e5de208ee60cc", + "last_affected_version": "5.18.12", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvt: fix memory overlapping when deleting chars in the buffer\n\nA memory overlapping copy occurs when deleting a long line. This memory\noverlapping copy can cause data corruption when scr_memcpyw is optimized\nto memcpy because memcpy does not ensure its behavior if the destination\nbuffer overlaps with the source buffer. The line buffer is not always\nbroken, because the memcpy utilizes the hardware acceleration, whose\nresult is not deterministic.\n\nFix this problem by using replacing the scr_memcpyw with scr_memmovew.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-48627", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-48627", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-48627", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-48627", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-48627", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-48627" + } + }, + "CVE-2022-48628": { + "affected_versions": "v2.6.12-rc2 to v6.6-rc1", "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", - "cmt_msg": "drivers: net: slip: fix NPD bug in sl_tx_timeout()", + "cmt_msg": "ceph: drop messages from MDS when unmounting", + "fixes": "e3dfcab2080dc1f9a4b09cc1327361bc2845bfcd", + "last_affected_version": "6.5.5", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nceph: drop messages from MDS when unmounting\n\nWhen unmounting all the dirty buffers will be flushed and after\nthe last osd request is finished the last reference of the i_count\nwill be released. Then it will flush the dirty cap/snap to MDSs,\nand the unmounting won't wait the possible acks, which will ihold\nthe inodes when updating the metadata locally but makes no sense\nany more, of this. This will make the evict_inodes() to skip these\ninodes.\n\nIf encrypt is enabled the kernel generate a warning when removing\nthe encrypt keys when the skipped inodes still hold the keyring:\n\nWARNING: CPU: 4 PID: 168846 at fs/crypto/keyring.c:242 fscrypt_destroy_keyring+0x7e/0xd0\nCPU: 4 PID: 168846 Comm: umount Tainted: G S 6.1.0-rc5-ceph-g72ead199864c #1\nHardware name: Supermicro SYS-5018R-WR/X10SRW-F, BIOS 2.0 12/17/2015\nRIP: 0010:fscrypt_destroy_keyring+0x7e/0xd0\nRSP: 0018:ffffc9000b277e28 EFLAGS: 00010202\nRAX: 0000000000000002 RBX: ffff88810d52ac00 RCX: ffff88810b56aa00\nRDX: 0000000080000000 RSI: ffffffff822f3a09 RDI: ffff888108f59000\nRBP: ffff8881d394fb88 R08: 0000000000000028 R09: 0000000000000000\nR10: 0000000000000001 R11: 11ff4fe6834fcd91 R12: ffff8881d394fc40\nR13: ffff888108f59000 R14: ffff8881d394f800 R15: 0000000000000000\nFS: 00007fd83f6f1080(0000) GS:ffff88885fd00000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007f918d417000 CR3: 000000017f89a005 CR4: 00000000003706e0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n\ngeneric_shutdown_super+0x47/0x120\nkill_anon_super+0x14/0x30\nceph_kill_sb+0x36/0x90 [ceph]\ndeactivate_locked_super+0x29/0x60\ncleanup_mnt+0xb8/0x140\ntask_work_run+0x67/0xb0\nexit_to_user_mode_prepare+0x23d/0x240\nsyscall_exit_to_user_mode+0x25/0x60\ndo_syscall_64+0x40/0x80\nentry_SYSCALL_64_after_hwframe+0x63/0xcd\nRIP: 0033:0x7fd83dc39e9b\n\nLater the kernel will crash when iput() the inodes and dereferencing\nthe \"sb->s_master_keys\", which has been released by the\ngeneric_shutdown_super().", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-48628", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-48628", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-48628", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-48628", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-48628", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-48628" + } + }, + "CVE-2022-48629": { + "affected_versions": "v4.19-rc1 to v5.17", + "breaks": "ceec5f5b59882b871a722ca4d49b767a09a4bde9", + "cmt_msg": "crypto: qcom-rng - ensure buffer for generate is completely filled", + "fixes": "a680b1832ced3b5fa7c93484248fd221ea0d614b", + "last_affected_version": "5.16", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: qcom-rng - ensure buffer for generate is completely filled\n\nThe generate function in struct rng_alg expects that the destination\nbuffer is completely filled if the function returns 0. qcom_rng_read()\ncan run into a situation where the buffer is partially filled with\nrandomness and the remaining part of the buffer is zeroed since\nqcom_rng_generate() doesn't check the return value. This issue can\nbe reproduced by running the following from libkcapi:\n\n kcapi-rng -b 9000000 > OUTFILE\n\nThe generated OUTFILE will have three huge sections that contain all\nzeros, and this is caused by the code where the test\n'val & PRNG_STATUS_DATA_AVAIL' fails.\n\nLet's fix this issue by ensuring that qcom_rng_read() always returns\nwith a full buffer if the function returns success. Let's also have\nqcom_rng_generate() return the correct value.\n\nHere's some statistics from the ent project\n(https://www.fourmilab.ch/random/) that shows information about the\nquality of the generated numbers:\n\n $ ent -c qcom-random-before\n Value Char Occurrences Fraction\n 0 606748 0.067416\n 1 33104 0.003678\n 2 33001 0.003667\n ...\n 253 ? 32883 0.003654\n 254 ? 33035 0.003671\n 255 ? 33239 0.003693\n\n Total: 9000000 1.000000\n\n Entropy = 7.811590 bits per byte.\n\n Optimum compression would reduce the size\n of this 9000000 byte file by 2 percent.\n\n Chi square distribution for 9000000 samples is 9329962.81, and\n randomly would exceed this value less than 0.01 percent of the\n times.\n\n Arithmetic mean value of data bytes is 119.3731 (127.5 = random).\n Monte Carlo value for Pi is 3.197293333 (error 1.77 percent).\n Serial correlation coefficient is 0.159130 (totally uncorrelated =\n 0.0).\n\nWithout this patch, the results of the chi-square test is 0.01%, and\nthe numbers are certainly not random according to ent's project page.\nThe results improve with this patch:\n\n $ ent -c qcom-random-after\n Value Char Occurrences Fraction\n 0 35432 0.003937\n 1 35127 0.003903\n 2 35424 0.003936\n ...\n 253 ? 35201 0.003911\n 254 ? 34835 0.003871\n 255 ? 35368 0.003930\n\n Total: 9000000 1.000000\n\n Entropy = 7.999979 bits per byte.\n\n Optimum compression would reduce the size\n of this 9000000 byte file by 0 percent.\n\n Chi square distribution for 9000000 samples is 258.77, and randomly\n would exceed this value 42.24 percent of the times.\n\n Arithmetic mean value of data bytes is 127.5006 (127.5 = random).\n Monte Carlo value for Pi is 3.141277333 (error 0.01 percent).\n Serial correlation coefficient is 0.000468 (totally uncorrelated =\n 0.0).\n\nThis change was tested on a Nexus 5 phone (msm8974 SoC).", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-48629", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-48629", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-48629", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-48629", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-48629", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-48629" + } + }, + "CVE-2022-48630": { + "affected_versions": "v5.17 to v5.18", + "breaks": "a680b1832ced3b5fa7c93484248fd221ea0d614b", + "cmt_msg": "crypto: qcom-rng - fix infinite loop on requests not multiple of WORD_SZ", + "fixes": "16287397ec5c08aa58db6acf7dbc55470d78087d", + "last_affected_version": "5.17", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: qcom-rng - fix infinite loop on requests not multiple of WORD_SZ\n\nThe commit referenced in the Fixes tag removed the 'break' from the else\nbranch in qcom_rng_read(), causing an infinite loop whenever 'max' is\nnot a multiple of WORD_SZ. This can be reproduced e.g. by running:\n\n kcapi-rng -b 67 >/dev/null\n\nThere are many ways to fix this without adding back the 'break', but\nthey all seem more awkward than simply adding it back, so do just that.\n\nTested on a machine with Qualcomm Amberwing processor.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-48630", + "ExploitDB": "https://www.exploit-db.com/search?cve=2022-48630", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-48630", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-48630", + "SUSE": "https://www.suse.com/security/cve/CVE-2022-48630", + "Ubuntu": "https://ubuntu.com/security/CVE-2022-48630" + } + }, + "CVE-2023-0030": { + "affected_versions": "v2.6.12-rc2 to v5.0-rc1", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "drm/nouveau/mmu: add more general vmm free/node handling functions", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", "Confidentiality": "High", - "Integrity": "None", + "Integrity": "High", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", - "score": 7.1 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 7.8 + }, + "fixes": "729eba3355674f2d9524629b73683ba1d1cd3f10", + "last_modified": "2023-12-06", + "nvd_text": "A use-after-free flaw was found in the Linux kernel\u2019s nouveau driver in how a user triggers a memory overflow that causes the nvkm_vma_tail function to fail. This flaw allows a local user to crash or potentially escalate their privileges on the system.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-0030", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-0030", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-0030", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-0030", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-0030", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-0030" + } + }, + "CVE-2023-0045": { + "affected_versions": "v4.20-rc5 to v6.2-rc3", + "breaks": "9137bb27e60e554dab694eafa4cca241fa3a694f", + "cmt_msg": "x86/bugs: Flush IBP in ib_prctl_set()", + "cvss3": { + "Attack Complexity": "Low", + "Attack Vector": "Network", + "Availability": "None", + "Confidentiality": "High", + "Integrity": "None", + "Privileges Required": "None", + "Scope": "Unchanged", + "User Interaction": "None", + "raw": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "score": 7.5 }, - "cwe": "Use After Free", - "fixes": "ec4eb8a86ade4d22633e1da2a7d85a846b7d1798", - "last_affected_version": "5.17.3", + "fixes": "a664ec9158eeddd75121d39c9a0758016097fa96", + "last_affected_version": "6.1.4", "last_modified": "2023-12-06", - "nvd_text": "A flaw was found in the Linux kernel. A NULL pointer dereference may occur while a slip driver is in progress to detach in sl_tx_timeout in drivers/net/slip/slip.c. This issue could allow an attacker to crash the system or leak internal kernel information.", + "nvd_text": "The current implementation of the prctl syscall does not issue an IBPB immediately during the syscall. The ib_prctl_set \u00a0function updates the Thread Information Flags (TIFs) for the task and updates the SPEC_CTRL MSR on the function __speculation_ctrl_update, but the IBPB is only issued on the next schedule, when the TIF bits are checked. This leaves the victim vulnerable to values already injected on the BTB, prior to the prctl syscall. \u00a0The patch that added the support for the conditional mitigation via prctl (ib_prctl_set) dates back to the kernel 4.9.176.\n\nWe recommend upgrading past commit\u00a0a664ec9158eeddd75121d39c9a0758016097fa96\n\n", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-41858", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-41858", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-41858", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-41858", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-41858", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-41858" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-0045", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-0045", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-0045", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-0045", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-0045", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-0045" } }, - "CVE-2022-42328": { - "affected_versions": "v5.16-rc7 to v6.1", - "breaks": "be81992f9086b230623ae3ebbc85ecee4d00a3d3", - "cmt_msg": "xen/netback: don't call kfree_skb() with interrupts disabled", + "CVE-2023-0047": { + "affected_versions": "v2.6.12-rc2 to v5.16-rc1", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "mm, oom: do not trigger out_of_memory from the #PF", + "fixes": "60e2793d440a3ec95abb5d6d4fc034a4b480472d", + "last_affected_version": "5.15.2", + "last_modified": "2023-12-06", + "nvd_text": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2023. Notes: none.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-0047", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-0047", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-0047", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-0047", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-0047", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-0047" + }, + "rejected": true + }, + "CVE-2023-0122": { + "affected_versions": "v6.0-rc1 to v6.0-rc4", + "breaks": "db1312dd95488b5e6ff362ff66fcf953a46b1821", "cvss3": { "Attack Complexity": "Low", - "Attack Vector": "Local", + "Attack Vector": "Network", "Availability": "High", "Confidentiality": "None", "Integrity": "None", - "Privileges Required": "Low", + "Privileges Required": "None", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", - "score": 5.5 + "raw": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "score": 7.5 }, - "cwe": "Improper Locking", - "fixes": "74e7e1efdad45580cc3839f2a155174cf158f9b5", - "last_affected_version": "6.0", + "cwe": "NULL Pointer Dereference", + "fixes": "da0342a3aa0357795224e6283df86444e1117168", "last_modified": "2023-12-06", - "nvd_text": "Guests can trigger deadlock in Linux netback driver T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] The patch for XSA-392 introduced another issue which might result in a deadlock when trying to free the SKB of a packet dropped due to the XSA-392 handling (CVE-2022-42328). Additionally when dropping packages for other reasons the same deadlock could occur in case of netpoll being active for the interface the xen-netback driver is connected to (CVE-2022-42329).", + "nvd_text": "A NULL pointer dereference vulnerability in the Linux kernel NVMe functionality, in nvmet_setup_auth(), allows an attacker to perform a Pre-Auth Denial of Service (DoS) attack on a remote machine. Affected versions v6.0-rc1 to v6.0-rc3, fixed in v6.0-rc4.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-42328", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-42328", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-42328", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-42328", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-42328", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-42328" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-0122", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-0122", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-0122", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-0122", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-0122", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-0122" } }, - "CVE-2022-42329": { - "affected_versions": "v5.16-rc7 to v6.1", - "breaks": "be81992f9086b230623ae3ebbc85ecee4d00a3d3", - "cmt_msg": "xen/netback: don't call kfree_skb() with interrupts disabled", + "CVE-2023-0160": { + "affected_versions": "v4.20-rc1 to v6.4-rc1", + "breaks": "604326b41a6fb9b4a78b6179335decee0365cd8c", + "cmt_msg": "bpf, sockmap: fix deadlocks in the sockhash and sockmap", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", @@ -80710,143 +87115,138 @@ "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "score": 5.5 }, - "cwe": "Improper Locking", - "fixes": "74e7e1efdad45580cc3839f2a155174cf158f9b5", - "last_affected_version": "6.0", + "fixes": "ed17aa92dc56b6d8883e4b7a8f1c6fbf5ed6cd29", + "last_affected_version": "6.3.1", "last_modified": "2023-12-06", - "nvd_text": "Guests can trigger deadlock in Linux netback driver T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] The patch for XSA-392 introduced another issue which might result in a deadlock when trying to free the SKB of a packet dropped due to the XSA-392 handling (CVE-2022-42328). Additionally when dropping packages for other reasons the same deadlock could occur in case of netpoll being active for the interface the xen-netback driver is connected to (CVE-2022-42329).", + "nvd_text": "A deadlock flaw was found in the Linux kernel\u2019s BPF subsystem. This flaw allows a local user to potentially crash the system.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-42329", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-42329", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-42329", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-42329", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-42329", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-42329" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-0160", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-0160", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-0160", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-0160", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-0160", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-0160" } }, - "CVE-2022-42432": { - "affected_versions": "v5.2-rc1 to v6.0-rc7", - "breaks": "22c7652cdaa8cd33ce78bacceb4e826a3f795873", - "cmt_msg": "netfilter: nfnetlink_osf: fix possible bogus match in nf_osf_find()", + "CVE-2023-0179": { + "affected_versions": "v5.5-rc1 to v6.2-rc5", + "breaks": "f6ae9f120dada00abfb47313364c35118469455f", + "cmt_msg": "netfilter: nft_payload: incorrect arithmetics when fetching VLAN header bits", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", - "Availability": "None", + "Availability": "High", "Confidentiality": "High", - "Integrity": "None", - "Privileges Required": "High", + "Integrity": "High", + "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", - "score": 4.4 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 7.8 }, - "fixes": "559c36c5a8d730c49ef805a72b213d3bba155cc8", - "last_affected_version": "5.19.11", + "fixes": "696e1a48b1a1b01edad542a1ef293665864a4dd0", + "last_affected_version": "6.1.6", "last_modified": "2023-12-06", - "nvd_text": "This vulnerability allows local attackers to disclose sensitive information on affected installations of the Linux Kernel 6.0-rc2. An attacker must first obtain the ability to execute high-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the nft_osf_eval function. The issue results from the lack of proper initialization of memory prior to accessing it. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the kernel. Was ZDI-CAN-18540.", + "nvd_text": "A buffer overflow vulnerability was found in the Netfilter subsystem in the Linux Kernel. This issue could allow the leakage of both stack and heap addresses, and potentially allow Local Privilege Escalation to the root user via arbitrary code execution.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-42432", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-42432", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-42432", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-42432", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-42432", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-42432" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-0179", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-0179", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-0179", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-0179", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-0179", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-0179" } }, - "CVE-2022-4269": { - "affected_versions": "v4.10-rc1 to v6.3-rc1", - "breaks": "53592b3640019f2834701093e38272fdfd367ad8", - "cmt_msg": "act_mirred: use the backlog for nested calls to mirred ingress", + "CVE-2023-0210": { + "affected_versions": "v5.15-rc1 to v6.2-rc4", + "breaks": "e2f34481b24db2fd634b5edb0a5bd0e4d38cc6e9", + "cmt_msg": "ksmbd: check nt_len to be at least CIFS_ENCPWD_SIZE in ksmbd_decode_ntlmssp_auth_blob", "cvss3": { "Attack Complexity": "Low", - "Attack Vector": "Local", + "Attack Vector": "Network", "Availability": "High", "Confidentiality": "None", "Integrity": "None", - "Privileges Required": "Low", + "Privileges Required": "None", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", - "score": 5.5 + "raw": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "score": 7.5 }, - "cwe": "Deadlock", - "fixes": "ca22da2fbd693b54dc8e3b7b54ccc9f7e9ba3640", - "last_affected_version": "6.2.8", + "fixes": "797805d81baa814f76cf7bdab35f86408a79d707", + "last_affected_version": "6.1.4", "last_modified": "2023-12-06", - "nvd_text": "A flaw was found in the Linux kernel Traffic Control (TC) subsystem. Using a specific networking configuration (redirecting egress packets to ingress using TC action \"mirred\") a local unprivileged user could trigger a CPU soft lockup (ABBA deadlock) when the transport protocol in use (TCP or SCTP) does a retransmission, resulting in a denial of service condition.", + "nvd_text": "A bug affects the Linux kernel\u2019s ksmbd NTLMv2 authentication and is known to crash the OS immediately in Linux-based systems.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-4269", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-4269", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-4269", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-4269", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-4269", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-4269" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-0210", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-0210", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-0210", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-0210", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-0210", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-0210" } }, - "CVE-2022-42703": { - "affected_versions": "v3.19-rc4 to v6.0-rc4", - "breaks": "7a3ef208e662f4b63d43a23f61a64a129c525bbc", - "cmt_msg": "mm/rmap: Fix anon_vma->degree ambiguity leading to double-reuse", + "CVE-2023-0240": { + "affected_versions": "v5.1-rc1 to v5.10-rc1", + "breaks": "2b188cc1bb857a9d4701ae59aa7768b5124e262e", + "cmt_msg": "io_uring: COW io_identity on mismatch", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", - "Confidentiality": "None", - "Integrity": "None", + "Confidentiality": "High", + "Integrity": "High", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", - "score": 5.5 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 7.8 }, - "cwe": "Use After Free", - "fixes": "2555283eb40df89945557273121e9393ef9b542b", - "last_affected_version": "5.19.6", + "fixes": "1e6fa5216a0e59ef02e8b6b40d553238a3b81d49", "last_modified": "2023-12-06", - "nvd_text": "mm/rmap.c in the Linux kernel before 5.19.7 has a use-after-free related to leaf anon_vma double reuse.", + "nvd_text": "There is a logic error in io_uring's implementation which can be used to trigger a use-after-free vulnerability leading to privilege escalation.\n\nIn the io_prep_async_work function the assumption that the last io_grab_identity call cannot return false is not true, and in this case the function will use the init_cred or the previous linked requests identity to do operations instead of using the current identity. This can lead to reference counting issues causing use-after-free. We recommend upgrading past version 5.10.161.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-42703", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-42703", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-42703", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-42703", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-42703", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-42703" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-0240", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-0240", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-0240", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-0240", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-0240", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-0240" } }, - "CVE-2022-42719": { - "affected_versions": "v5.2-rc1 to v6.1-rc1", - "breaks": "5023b14cf4df4d22e1a80738167f3438c9e62e5f", - "cmt_msg": "wifi: mac80211: fix MBSSID parsing use-after-free", + "CVE-2023-0266": { + "affected_versions": "v2.6.12-rc2 to v6.2-rc4", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF", "cvss3": { "Attack Complexity": "Low", - "Attack Vector": "Adjacent", + "Attack Vector": "Local", "Availability": "High", "Confidentiality": "High", "Integrity": "High", - "Privileges Required": "None", + "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", - "score": 8.8 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 7.8 }, - "cwe": "Use After Free", - "fixes": "ff05d4b45dd89b922578dac497dcabf57cf771c6", - "last_affected_version": "6.0.1", + "fixes": "56b88b50565cd8b946a2d00b0c83927b7ebb055e", + "last_affected_version": "6.1.5", "last_modified": "2023-12-06", - "nvd_text": "A use-after-free in the mac80211 stack when parsing a multi-BSSID element in the Linux kernel 5.2 through 5.19.x before 5.19.16 could be used by attackers (able to inject WLAN frames) to crash the kernel and potentially execute code.", + "nvd_text": "A use after free vulnerability exists in the ALSA PCM package in the Linux Kernel.\u00a0SNDRV_CTL_IOCTL_ELEM_{READ|WRITE}32 is missing locks that can be used in a use-after-free that can result in a priviledge escalation to gain ring0 access from the system user. We recommend upgrading past commit\u00a056b88b50565cd8b946a2d00b0c83927b7ebb055e\n", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-42719", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-42719", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-42719", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-42719", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-42719", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-42719" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-0266", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-0266", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-0266", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-0266", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-0266", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-0266" } }, - "CVE-2022-42720": { - "affected_versions": "v5.1-rc1 to v6.1-rc1", - "breaks": "a3584f56de1c808d4383a275b4a74467b19e5645", - "cmt_msg": "wifi: cfg80211: fix BSS refcounting bugs", + "CVE-2023-0386": { + "affected_versions": "v2.6.12-rc2 to v6.2-rc6", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "ovl: fail on invalid uid/gid mapping at copy up", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", @@ -80859,24 +87259,24 @@ "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "score": 7.8 }, - "cwe": "Use After Free", - "fixes": "0b7808818cb9df6680f98996b8e9a439fa7bcc2f", - "last_affected_version": "6.0.1", + "cwe": "Unspecified", + "fixes": "4f11ada10d0ad3fd53e2bd67806351de63a4f9c3", + "last_affected_version": "6.1.8", "last_modified": "2023-12-06", - "nvd_text": "Various refcounting bugs in the multi-BSS handling in the mac80211 stack in the Linux kernel 5.1 through 5.19.x before 5.19.16 could be used by local attackers (able to inject WLAN frames) to trigger use-after-free conditions to potentially execute code.", + "nvd_text": "A flaw was found in the Linux kernel, where unauthorized access to the execution of the setuid file with capabilities was found in the Linux kernel\u2019s OverlayFS subsystem in how a user copies a capable file from a nosuid mount into another mount. This uid mapping bug allows a local user to escalate their privileges on the system.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-42720", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-42720", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-42720", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-42720", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-42720", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-42720" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-0386", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-0386", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-0386", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-0386", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-0386", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-0386" } }, - "CVE-2022-42721": { - "affected_versions": "v5.1-rc1 to v6.1-rc1", - "breaks": "0b8fb8235be8be99a197e8d948fc0a2df8dc261a", - "cmt_msg": "wifi: cfg80211: avoid nontransmitted BSS list corruption", + "CVE-2023-0394": { + "affected_versions": "v2.6.12-rc3 to v6.2-rc4", + "breaks": "357b40a18b04c699da1d45608436e9b76b50e251", + "cmt_msg": "ipv6: raw: Deduct extension header length in rawv6_push_pending_frames", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", @@ -80889,408 +87289,401 @@ "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "score": 5.5 }, - "cwe": "Loop with Unreachable Exit Condition ('Infinite Loop')", - "fixes": "bcca852027e5878aec911a347407ecc88d6fff7f", - "last_affected_version": "6.0.1", + "cwe": "NULL Pointer Dereference", + "fixes": "cb3e9864cdbe35ff6378966660edbcbac955fe17", + "last_affected_version": "6.1.6", "last_modified": "2023-12-06", - "nvd_text": "A list management bug in BSS handling in the mac80211 stack in the Linux kernel 5.1 through 5.19.x before 5.19.16 could be used by local attackers (able to inject WLAN frames) to corrupt a linked list and, in turn, potentially execute code.", + "nvd_text": "A NULL pointer dereference flaw was found in rawv6_push_pending_frames in net/ipv6/raw.c in the network subcomponent in the Linux kernel. This flaw causes the system to crash.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-42721", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-42721", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-42721", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-42721", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-42721", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-42721" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-0394", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-0394", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-0394", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-0394", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-0394", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-0394" } }, - "CVE-2022-42722": { - "affected_versions": "v5.8-rc1 to v6.1-rc1", - "breaks": "9eaf183af741e3d8393eb571ac8aec9ee7d6530e", - "cmt_msg": "wifi: mac80211: fix crash in beacon protection for P2P-device", + "CVE-2023-0458": { + "affected_versions": "v2.6.12-rc2 to v6.2-rc5", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "prlimit: do_prlimit needs to have a speculation check", "cvss3": { - "Attack Complexity": "Low", + "Attack Complexity": "High", "Attack Vector": "Local", - "Availability": "High", - "Confidentiality": "None", + "Availability": "None", + "Confidentiality": "High", "Integrity": "None", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", - "score": 5.5 + "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", + "score": 4.7 }, - "cwe": "NULL Pointer Dereference", - "fixes": "b2d03cabe2b2e150ff5a381731ea0355459be09f", - "last_affected_version": "6.0.1", + "fixes": "739790605705ddcf18f21782b9c99ad7d53a8c11", + "last_affected_version": "6.1.7", "last_modified": "2023-12-06", - "nvd_text": "In the Linux kernel 5.8 through 5.19.x before 5.19.16, local attackers able to inject WLAN frames into the mac80211 stack could cause a NULL pointer dereference denial-of-service attack against the beacon protection of P2P devices.", + "nvd_text": "A speculative pointer dereference problem exists in the Linux Kernel on the do_prlimit() function. The resource argument value is controlled and is used in pointer arithmetic for the 'rlim' variable and can be used to leak the contents. We recommend upgrading past version 6.1.8 or commit\u00a0739790605705ddcf18f21782b9c99ad7d53a8c11", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-42722", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-42722", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-42722", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-42722", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-42722", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-42722" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-0458", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-0458", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-0458", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-0458", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-0458", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-0458" } }, - "CVE-2022-42895": { - "affected_versions": "v2.6.12-rc2 to v6.1-rc4", + "CVE-2023-0459": { + "affected_versions": "v2.6.12-rc2 to v6.3-rc1", "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", - "cmt_msg": "Bluetooth: L2CAP: Fix attempting to access uninitialized memory", + "cmt_msg": "uaccess: Add speculation barrier to copy_from_user()", "cvss3": { "Attack Complexity": "Low", - "Attack Vector": "Adjacent", + "Attack Vector": "Local", "Availability": "None", "Confidentiality": "High", "Integrity": "None", - "Privileges Required": "None", + "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", - "score": 6.5 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "score": 5.5 }, - "cwe": "Access of Uninitialized Pointer", - "fixes": "b1a2cd50c0357f243b7435a732b4e62ba3157a2e", - "last_affected_version": "6.0.7", + "fixes": "74e19ef0ff8061ef55957c3abd71614ef0f42f47", + "last_affected_version": "6.2.0", "last_modified": "2023-12-06", - "nvd_text": "There is an infoleak vulnerability in the Linux kernel's net/bluetooth/l2cap_core.c's l2cap_parse_conf_req function which can be used to leak kernel pointers remotely.\nWe recommend upgrading past commit\u00a0 https://github.com/torvalds/linux/commit/b1a2cd50c0357f243b7435a732b4e62ba3157a2e https://www.google.com/url \n\n", + "nvd_text": "Copy_from_user on 64-bit versions of the Linux kernel does not implement the __uaccess_begin_nospec allowing a user to bypass the \"access_ok\" check and pass a kernel pointer to copy_from_user(). This would allow an attacker to leak information. We recommend upgrading beyond commit\u00a074e19ef0ff8061ef55957c3abd71614ef0f42f47", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-42895", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-42895", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-42895", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-42895", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-42895", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-42895" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-0459", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-0459", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-0459", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-0459", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-0459", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-0459" } }, - "CVE-2022-42896": { - "affected_versions": "v2.6.12-rc2 to v6.1-rc4", - "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", - "cmt_msg": "Bluetooth: L2CAP: Fix accepting connection request for invalid SPSM", + "CVE-2023-0461": { + "affected_versions": "v4.13-rc1 to v6.2-rc3", + "breaks": "734942cc4ea6478eed125af258da1bdbb4afe578", + "cmt_msg": "net/ulp: prevent ULP without clone op from entering the LISTEN status", "cvss3": { "Attack Complexity": "Low", - "Attack Vector": "Adjacent", + "Attack Vector": "Local", "Availability": "High", "Confidentiality": "High", "Integrity": "High", - "Privileges Required": "None", + "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", - "score": 8.8 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 7.8 }, - "cwe": "Use After Free", - "fixes": "711f8c3fb3db61897080468586b970c87c61d9e4", - "last_affected_version": "6.0.7", + "fixes": "2c02d41d71f90a5168391b6a5f2954112ba2307c", + "last_affected_version": "6.1.4", "last_modified": "2023-12-06", - "nvd_text": "There are use-after-free vulnerabilities in the Linux kernel's net/bluetooth/l2cap_core.c's l2cap_connect and l2cap_le_connect_req functions which may allow code execution and leaking kernel memory (respectively) remotely via Bluetooth.\u00a0A remote attacker could execute code leaking kernel memory via Bluetooth if within proximity of the victim.\n\nWe recommend upgrading past commit\u00a0 https://www.google.com/url https://github.com/torvalds/linux/commit/711f8c3fb3db61897080468586b970c87c61d9e4 https://www.google.com/url \n\n", + "nvd_text": "There is a use-after-free vulnerability in the Linux Kernel which can be exploited to achieve local privilege escalation. To reach the vulnerability kernel configuration flag CONFIG_TLS\u00a0or CONFIG_XFRM_ESPINTCP\u00a0has to be configured, but the operation does not require any privilege.\n\nThere is a use-after-free bug of icsk_ulp_data\u00a0of a struct inet_connection_sock.\n\nWhen CONFIG_TLS\u00a0is enabled, user can install a tls context (struct tls_context) on a connected tcp socket. The context is not cleared if this socket is disconnected and reused as a listener. If a new socket is created from the listener, the context is inherited and vulnerable.\n\nThe setsockopt\u00a0TCP_ULP\u00a0operation does not require any privilege.\n\nWe recommend upgrading past commit\u00a02c02d41d71f90a5168391b6a5f2954112ba2307c", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-42896", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-42896", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-42896", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-42896", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-42896", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-42896" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-0461", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-0461", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-0461", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-0461", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-0461", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-0461" } }, - "CVE-2022-43750": { - "affected_versions": "v2.6.21-rc1 to v6.1-rc1", - "breaks": "6f23ee1fefdc1f80bd8a3ab04a1c41ab2dec14c9", - "cmt_msg": "usb: mon: make mmapped memory read only", + "CVE-2023-0468": { + "affected_versions": "v5.17-rc1 to v6.1-rc7", + "breaks": "aa43477b040251f451db0d844073ac00a8ab66ee", + "cmt_msg": "io_uring: make poll refs more robust", "cvss3": { - "Attack Complexity": "Low", + "Attack Complexity": "High", "Attack Vector": "Local", "Availability": "High", - "Confidentiality": "High", - "Integrity": "High", - "Privileges Required": "High", + "Confidentiality": "None", + "Integrity": "None", + "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", - "score": 6.7 + "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", + "score": 4.7 }, - "cwe": "Out-of-bounds Write", - "fixes": "a659daf63d16aa883be42f3f34ff84235c302198", - "last_affected_version": "6.0.0", + "fixes": "a26a35e9019fd70bf3cf647dcfdae87abc7bacea", + "last_affected_version": "6.0.10", "last_modified": "2023-12-06", - "nvd_text": "drivers/usb/mon/mon_bin.c in usbmon in the Linux kernel before 5.19.15 and 6.x before 6.0.1 allows a user-space client to corrupt the monitor's internal memory.", + "nvd_text": "A use-after-free flaw was found in io_uring/poll.c in io_poll_check_events in the io_uring subcomponent in the Linux Kernel due to a race condition of poll_refs. This flaw may cause a NULL pointer dereference.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-43750", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-43750", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-43750", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-43750", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-43750", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-43750" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-0468", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-0468", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-0468", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-0468", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-0468", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-0468" } }, - "CVE-2022-4378": { - "affected_versions": "v5.8-rc1 to v6.1", - "breaks": "32927393dc1ccd60fb2bdc05b9e8e88753761469", - "cmt_msg": "proc: proc_skip_spaces() shouldn't think it is working on C strings", + "CVE-2023-0469": { + "affected_versions": "v5.19-rc1 to v6.1-rc7", + "breaks": "61c1b44a21d70d4783db02198fbf68b132f4953c", + "cmt_msg": "io_uring/filetable: fix file reference underflow", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", - "Confidentiality": "High", - "Integrity": "High", + "Confidentiality": "None", + "Integrity": "None", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", - "score": 7.8 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "score": 5.5 }, - "cwe": "Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')", - "fixes": "bce9332220bd677d83b19d21502776ad555a0e73", - "last_affected_version": "6.0", + "cwe": "Integer Underflow (Wrap or Wraparound)", + "fixes": "9d94c04c0db024922e886c9fd429659f22f48ea4", + "last_affected_version": "6.0.10", "last_modified": "2023-12-06", - "nvd_text": "A stack overflow flaw was found in the Linux kernel's SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system.", + "nvd_text": "A use-after-free flaw was found in io_uring/filetable.c in io_install_fixed_file in the io_uring subcomponent in the Linux Kernel during call cleanup. This flaw may lead to a denial of service.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-4378", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-4378", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-4378", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-4378", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-4378", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-4378" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-0469", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-0469", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-0469", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-0469", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-0469", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-0469" } }, - "CVE-2022-4379": { - "affected_versions": "v5.6-rc1 to v6.2-rc1", - "breaks": "ce0887ac96d35c7105090e166bb0807dc0a0e838", - "cmt_msg": "NFSD: fix use-after-free in __nfs42_ssc_open()", + "CVE-2023-0590": { + "affected_versions": "v2.6.32-rc1 to v6.1-rc2", + "breaks": "af356afa010f3cd2c8b8fcc3bce90f7a7b7ec02a", + "cmt_msg": "net: sched: fix race condition in qdisc_graft()", "cvss3": { - "Attack Complexity": "Low", - "Attack Vector": "Network", + "Attack Complexity": "High", + "Attack Vector": "Local", "Availability": "High", "Confidentiality": "None", "Integrity": "None", - "Privileges Required": "None", + "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", - "score": 7.5 + "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", + "score": 4.7 }, - "cwe": "Use After Free", - "fixes": "75333d48f92256a0dec91dbf07835e804fc411c0", - "last_affected_version": "6.1.2", + "fixes": "ebda44da44f6f309d302522b049f43d6f829f7aa", + "last_affected_version": "6.0.5", "last_modified": "2023-12-06", - "nvd_text": "A use-after-free vulnerability was found in __nfs42_ssc_open() in fs/nfs/nfs4file.c in the Linux kernel. This flaw allows an attacker to conduct a remote denial", + "nvd_text": "A use-after-free flaw was found in qdisc_graft in net/sched/sch_api.c in the Linux Kernel due to a race problem. This flaw leads to a denial of service issue. If patch ebda44da44f6 (\"net: sched: fix race condition in qdisc_graft()\") not applied yet, then kernel could be affected.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-4379", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-4379", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-4379", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-4379", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-4379", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-4379" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-0590", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-0590", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-0590", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-0590", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-0590", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-0590" } }, - "CVE-2022-4382": { - "affected_versions": "v5.3-rc1 to v6.2-rc5", - "breaks": "e5d82a7360d124ae1a38c2a5eac92ba49b125191", - "cmt_msg": "USB: gadgetfs: Fix race between mounting and unmounting", + "CVE-2023-0597": { + "affected_versions": "v2.6.12-rc2 to v6.2-rc1", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "x86/mm: Randomize per-cpu entry area", "cvss3": { - "Attack Complexity": "High", - "Attack Vector": "Physical", - "Availability": "High", + "Attack Complexity": "Low", + "Attack Vector": "Local", + "Availability": "None", "Confidentiality": "High", - "Integrity": "High", - "Privileges Required": "None", + "Integrity": "None", + "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", - "score": 6.4 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "score": 5.5 }, - "cwe": "Use After Free", - "fixes": "d18dcfe9860e842f394e37ba01ca9440ab2178f4", - "last_affected_version": "6.1.7", + "fixes": "97e3d26b5e5f371b3ee223d94dd123e6c442ba80", "last_modified": "2023-12-06", - "nvd_text": "A use-after-free flaw caused by a race among the superblock operations in the gadgetfs Linux driver was found. It could be triggered by yanking out a device that is running the gadgetfs side.", + "nvd_text": "A flaw possibility of memory leak in the Linux kernel cpu_entry_area mapping of X86 CPU data to memory was found in the way user can guess location of exception stack(s) or other important data. A local user could use this flaw to get access to some important data with expected location in memory.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-4382", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-4382", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-4382", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-4382", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-4382", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-4382" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-0597", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-0597", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-0597", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-0597", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-0597", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-0597" } }, - "CVE-2022-43945": { - "affected_versions": "v5.11-rc1 to v6.1-rc1", - "breaks": "5191955d6fc65e6d4efe8f4f10a6028298f57281", - "cmt_msg": "NFSD: Protect against send buffer overflow in NFSv2 READDIR", + "CVE-2023-0615": { + "affected_versions": "v3.18-rc1 to v6.1-rc3", + "breaks": "ef834f7836ec0502f49f20bbc42f1240577a9c83", + "cmt_msg": "media: vivid: dev->bitmap_cap wasn't freed in all cases", "cvss3": { "Attack Complexity": "Low", - "Attack Vector": "Network", + "Attack Vector": "Local", "Availability": "High", "Confidentiality": "None", "Integrity": "None", - "Privileges Required": "None", + "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", - "score": 7.5 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "score": 5.5 }, - "cwe": "Allocation of Resources Without Limits or Throttling", - "fixes": "00b4492686e0497fdb924a9d4c8f6f99377e176c", - "last_affected_version": "6.0.2", + "fixes": "1f65ea411cc7b6ff128d82a3493d7b5648054e6f", + "last_affected_version": "6.0.6", "last_modified": "2023-12-06", - "nvd_text": "The Linux kernel NFSD implementation prior to versions 5.19.17 and 6.0.2 are vulnerable to buffer overflow. NFSD tracks the number of pages held by each NFSD thread by combining the receive and send buffers of a remote procedure call (RPC) into a single array of pages. A client can force the send buffer to shrink by sending an RPC message over TCP with garbage data added at the end of the message. The RPC message with garbage data is still correctly formed according to the specification and is passed forward to handlers. Vulnerable code in NFSD is not expecting the oversized request and writes beyond the allocated buffer space. CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "nvd_text": "A memory leak flaw and potential divide by zero and Integer overflow was found in the Linux kernel V4L2 and vivid test code functionality. This issue occurs when a user triggers ioctls, such as VIDIOC_S_DV_TIMINGS ioctl. This could allow a local user to crash the system if vivid test code enabled.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-43945", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-43945", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-43945", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-43945", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-43945", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-43945" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-0615", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-0615", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-0615", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-0615", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-0615", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-0615" } }, - "CVE-2022-44032": { - "affected_versions": "v2.6.12-rc2 to v6.4-rc1", - "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", - "cmt_msg": "char: pcmcia: remove all the drivers", + "CVE-2023-1032": { + "affected_versions": "v5.19-rc1 to v6.3-rc2", + "breaks": "da214a475f8bd1d3e9e7a19ddfeb4d1617551bab", + "cmt_msg": "net: avoid double iput when sock_alloc_file fails", "cvss3": { - "Attack Complexity": "High", - "Attack Vector": "Physical", + "Attack Complexity": "Low", + "Attack Vector": "Local", "Availability": "High", - "Confidentiality": "High", - "Integrity": "High", - "Privileges Required": "None", + "Confidentiality": "None", + "Integrity": "None", + "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", - "score": 6.4 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "score": 5.5 }, - "cwe": "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')", - "fixes": "9b12f050c76f090cc6d0aebe0ef76fed79ec3f15", - "last_modified": "2023-12-06", - "nvd_text": "An issue was discovered in the Linux kernel through 6.0.6. drivers/char/pcmcia/cm4000_cs.c has a race condition and resultant use-after-free if a physically proximate attacker removes a PCMCIA device while calling open(), aka a race condition between cmm_open() and cm4000_detach().", + "fixes": "649c15c7691e9b13cbe9bf6c65c365350e056067", + "last_affected_version": "6.2.2", + "last_modified": "2024-01-12", + "nvd_text": "The Linux kernel io_uring IORING_OP_SOCKET operation contained a double free in function __sys_socket_file() in file net/socket.c. This issue was introduced in da214a475f8bd1d3e9e7a19ddfeb4d1617551bab and fixed in 649c15c7691e9b13cbe9bf6c65c365350e056067.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-44032", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-44032", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-44032", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-44032", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-44032", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-44032" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-1032", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-1032", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-1032", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-1032", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-1032", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-1032" } }, - "CVE-2022-44033": { - "affected_versions": "v2.6.12-rc2 to v6.4-rc1", - "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", - "cmt_msg": "char: pcmcia: remove all the drivers", + "CVE-2023-1073": { + "affected_versions": "v3.16-rc1 to v6.2-rc5", + "breaks": "1b15d2e5b8077670b1e6a33250a0d9577efff4a5", + "cmt_msg": "HID: check empty report_list in hid_validate_values()", "cvss3": { - "Attack Complexity": "High", + "Attack Complexity": "Low", "Attack Vector": "Physical", "Availability": "High", "Confidentiality": "High", "Integrity": "High", - "Privileges Required": "None", + "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", - "score": 6.4 + "raw": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 6.6 }, - "cwe": "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')", - "fixes": "9b12f050c76f090cc6d0aebe0ef76fed79ec3f15", + "fixes": "b12fece4c64857e5fab4290bf01b2e0317a88456", + "last_affected_version": "6.1.8", "last_modified": "2023-12-06", - "nvd_text": "An issue was discovered in the Linux kernel through 6.0.6. drivers/char/pcmcia/cm4040_cs.c has a race condition and resultant use-after-free if a physically proximate attacker removes a PCMCIA device while calling open(), aka a race condition between cm4040_open() and reader_detach().", + "nvd_text": "A memory corruption flaw was found in the Linux kernel\u2019s human interface device (HID) subsystem in how a user inserts a malicious USB device. This flaw allows a local user to crash or potentially escalate their privileges on the system.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-44033", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-44033", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-44033", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-44033", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-44033", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-44033" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-1073", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-1073", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-1073", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-1073", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-1073", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-1073" } }, - "CVE-2022-44034": { - "affected_versions": "v4.10-rc1 to v6.4-rc1", - "breaks": "f2ed287bcc9073d8edbf6561c389b282163edc78", - "cmt_msg": "char: pcmcia: remove all the drivers", + "CVE-2023-1074": { + "affected_versions": "v2.6.12-rc2 to v6.2-rc6", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "sctp: fail if no bound addresses can be used for a given scope", "cvss3": { - "Attack Complexity": "High", - "Attack Vector": "Physical", + "Attack Complexity": "Low", + "Attack Vector": "Local", "Availability": "High", - "Confidentiality": "High", - "Integrity": "High", - "Privileges Required": "None", + "Confidentiality": "None", + "Integrity": "None", + "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", - "score": 6.4 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "score": 5.5 }, - "cwe": "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')", - "fixes": "9b12f050c76f090cc6d0aebe0ef76fed79ec3f15", + "fixes": "458e279f861d3f61796894cd158b780765a1569f", + "last_affected_version": "6.1.8", "last_modified": "2023-12-06", - "nvd_text": "An issue was discovered in the Linux kernel through 6.0.6. drivers/char/pcmcia/scr24x_cs.c has a race condition and resultant use-after-free if a physically proximate attacker removes a PCMCIA device while calling open(), aka a race condition between scr24x_open() and scr24x_remove().", + "nvd_text": "A memory leak flaw was found in the Linux kernel's Stream Control Transmission Protocol. This issue may occur when a user starts a malicious networking service and someone connects to this service. This could allow a local user to starve resources, causing a denial of service.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-44034", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-44034", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-44034", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-44034", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-44034", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-44034" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-1074", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-1074", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-1074", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-1074", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-1074", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-1074" } }, - "CVE-2022-4543": { - "affected_versions": "unk to unk", - "breaks": "", + "CVE-2023-1075": { + "affected_versions": "v4.20-rc1 to v6.2-rc7", + "breaks": "a42055e8d2c30d4decfc13ce943d09c7b9dad221", + "cmt_msg": "net/tls: tls_is_tx_ready() checked list_entry", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "None", - "Confidentiality": "High", + "Confidentiality": "Low", "Integrity": "None", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", - "score": 5.5 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "score": 3.3 }, - "cwe": "Exposure of Sensitive Information to an Unauthorized Actor", - "fixes": "", + "fixes": "ffe2a22562444720b05bdfeb999c03e810d84cbb", + "last_affected_version": "6.1.10", "last_modified": "2023-12-06", - "nvd_text": "A flaw named \"EntryBleed\" was found in the Linux Kernel Page Table Isolation (KPTI). This issue could allow a local attacker to leak KASLR base via prefetch side-channels based on TLB timing for Intel systems.", + "nvd_text": "A flaw was found in the Linux Kernel. The tls_is_tx_ready() incorrectly checks for list emptiness, potentially accessing a type confused entry to the list_head, leaking the last byte of the confused field that overlaps with rec->tx_ready.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-4543", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-4543", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-4543", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-4543", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-4543", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-4543" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-1075", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-1075", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-1075", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-1075", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-1075", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-1075" } }, - "CVE-2022-45869": { - "affected_versions": "v5.12-rc1-dontuse to v6.1-rc7", - "breaks": "a2855afc7ee88475e8feb16840b23f787bfc994d", - "cmt_msg": "KVM: x86/mmu: Fix race condition in direct_page_fault", + "CVE-2023-1076": { + "affected_versions": "v4.10-rc1 to v6.3-rc1", + "breaks": "86741ec25462e4c8cdce6df2f41ead05568c7d5e", + "cmt_msg": "tun: tun_chr_open(): correctly initialize socket uid", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", - "Availability": "High", + "Availability": "None", "Confidentiality": "None", - "Integrity": "None", + "Integrity": "High", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "score": 5.5 }, - "cwe": "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')", - "fixes": "47b0c2e4c220f2251fd8dcfbb44479819c715e15", - "last_affected_version": "6.0.10", + "fixes": "a096ccca6e503a5c575717ff8a36ace27510ab0a", + "last_affected_version": "6.2.2", "last_modified": "2023-12-06", - "nvd_text": "A race condition in the x86 KVM subsystem in the Linux kernel through 6.1-rc6 allows guest OS users to cause a denial of service (host OS crash or host OS memory corruption) when nested virtualisation and the TDP MMU are enabled.", + "nvd_text": "A flaw was found in the Linux Kernel. The tun/tap sockets have their socket UID hardcoded to 0 due to a type confusion in their initialization function. While it will be often correct, as tuntap devices require CAP_NET_ADMIN, it may not always be the case, e.g., a non-root user only having that capability. This would make tun/tap sockets being incorrectly treated in filtering/routing decisions, possibly bypassing network filters.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-45869", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-45869", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-45869", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-45869", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-45869", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-45869" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-1076", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-1076", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-1076", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-1076", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-1076", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-1076" } }, - "CVE-2022-45884": { - "affected_versions": "v2.6.21-rc2 to unk", - "breaks": "b61901024776b25ce7b8edc31bb1757c7382a88e", + "CVE-2023-1077": { + "affected_versions": "v2.6.25-rc1 to v6.3-rc1", + "breaks": "326587b840785c60f5dc18557235a23bafefd620", + "cmt_msg": "sched/rt: pick_next_rt_entity(): check list_entry", "cvss3": { "Attack Complexity": "High", "Attack Vector": "Local", @@ -81303,24 +87696,25 @@ "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "score": 7.0 }, - "cwe": "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')", - "fixes": "", + "fixes": "7c4a5b89a0b5a57a64b601775b296abf77a9fe97", + "last_affected_version": "6.2.2", "last_modified": "2023-12-06", - "nvd_text": "An issue was discovered in the Linux kernel through 6.0.9. drivers/media/dvb-core/dvbdev.c has a use-after-free, related to dvb_register_device dynamically allocating fops.", + "nvd_text": "In the Linux kernel, pick_next_rt_entity() may return a type confused entry, not detected by the BUG_ON condition, as the confused entry will not be NULL, but list_head.The buggy error condition would lead to a type confused entry with the list head,which would then be used as a type confused sched_rt_entity,causing memory corruption.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-45884", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-45884", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-45884", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-45884", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-45884", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-45884" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-1077", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-1077", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-1077", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-1077", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-1077", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-1077" } }, - "CVE-2022-45885": { - "affected_versions": "unk to unk", - "breaks": "", + "CVE-2023-1078": { + "affected_versions": "v4.17-rc1 to v6.2-rc8", + "breaks": "9426bbc6de99b8649d897b94e8f5916b58195643", + "cmt_msg": "rds: rds_rm_zerocopy_callback() use list_first_entry()", "cvss3": { - "Attack Complexity": "High", + "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", "Confidentiality": "High", @@ -81328,58 +87722,57 @@ "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", - "score": 7.0 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 7.8 }, - "cwe": "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')", - "fixes": "", + "fixes": "f753a68980cf4b59a80fe677619da2b1804f526d", + "last_affected_version": "6.1.11", "last_modified": "2023-12-06", - "nvd_text": "An issue was discovered in the Linux kernel through 6.0.9. drivers/media/dvb-core/dvb_frontend.c has a race condition that can cause a use-after-free when a device is disconnected.", + "nvd_text": "A flaw was found in the Linux Kernel in RDS (Reliable Datagram Sockets) protocol. The rds_rm_zerocopy_callback() uses list_entry() on the head of a list causing a type confusion. Local user can trigger this with rds_message_put(). Type confusion leads to `struct rds_msg_zcopy_info *info` actually points to something else that is potentially controlled by local user. It is known how to trigger this, which causes an out of bounds access, and a lock corruption.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-45885", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-45885", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-45885", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-45885", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-45885", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-45885" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-1078", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-1078", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-1078", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-1078", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-1078", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-1078" } }, - "CVE-2022-45886": { - "affected_versions": "v2.6.12-rc2 to v6.4-rc3", - "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", - "cmt_msg": "media: dvb-core: Fix use-after-free due on race condition at dvb_net", + "CVE-2023-1079": { + "affected_versions": "v4.12-rc1 to v6.3-rc1", + "breaks": "af22a610bc38508d5ea760507d31be6b6983dfa8", + "cmt_msg": "HID: asus: use spinlock to safely schedule workers", "cvss3": { - "Attack Complexity": "High", - "Attack Vector": "Local", + "Attack Complexity": "Low", + "Attack Vector": "Physical", "Availability": "High", "Confidentiality": "High", "Integrity": "High", - "Privileges Required": "Low", + "Privileges Required": "None", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", - "score": 7.0 + "raw": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "score": 6.8 }, - "cwe": "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')", - "fixes": "4172385b0c9ac366dcab78eda48c26814b87ed1a", - "last_affected_version": "6.3.6", + "fixes": "4ab3a086d10eeec1424f2e8a968827a6336203df", + "last_affected_version": "6.2.2", "last_modified": "2023-12-06", - "nvd_text": "An issue was discovered in the Linux kernel through 6.0.9. drivers/media/dvb-core/dvb_net.c has a .disconnect versus dvb_device_open race condition that leads to a use-after-free.", + "nvd_text": "A flaw was found in the Linux kernel. A use-after-free may be triggered in asus_kbd_backlight_set when plugging/disconnecting in a malicious USB device, which advertises itself as an Asus device. Similarly to the previous known CVE-2023-25012, but in asus devices, the work_struct may be scheduled by the LED controller while the device is disconnecting, triggering a use-after-free on the struct asus_kbd_leds *led structure. A malicious USB device may exploit the issue to cause memory corruption with controlled data.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-45886", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-45886", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-45886", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-45886", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-45886", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-45886" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-1079", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-1079", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-1079", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-1079", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-1079", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-1079" } }, - "CVE-2022-45887": { - "affected_versions": "v2.6.12-rc2 to v6.4-rc3", - "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", - "cmt_msg": "media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb()", + "CVE-2023-1095": { + "affected_versions": "v3.16-rc1 to v6.0-rc1", + "breaks": "55dd6f93076bb82aa8911191125418dcfcbf2c9b", + "cmt_msg": "netfilter: nf_tables: fix null deref due to zeroed list head", "cvss3": { - "Attack Complexity": "High", + "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", "Confidentiality": "None", @@ -81387,116 +87780,142 @@ "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", - "score": 4.7 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "score": 5.5 }, - "cwe": "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')", - "fixes": "517a281338322ff8293f988771c98aaa7205e457", - "last_affected_version": "6.3.6", - "last_modified": "2023-12-06", - "nvd_text": "An issue was discovered in the Linux kernel through 6.0.9. drivers/media/usb/ttusb-dec/ttusb_dec.c has a memory leak because of the lack of a dvb_frontend_detach call.", + "fixes": "580077855a40741cf511766129702d97ff02f4d9", + "last_affected_version": "5.19.1", + "last_modified": "2023-12-27", + "nvd_text": "In nf_tables_updtable, if nf_tables_table_enable returns an error, nft_trans_destroy is called to free the transaction object. nft_trans_destroy() calls list_del(), but the transaction was never placed on a list -- the list head is all zeroes, this results in a NULL pointer dereference.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-45887", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-45887", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-45887", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-45887", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-45887", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-45887" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-1095", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-1095", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-1095", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-1095", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-1095", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-1095" } }, - "CVE-2022-45888": { - "affected_versions": "v5.14-rc1 to v6.2-rc1", - "breaks": "a53d1202aef122894b6e46116a92174a9123db5d", - "cmt_msg": "char: xillybus: Prevent use-after-free due to race condition", + "CVE-2023-1118": { + "affected_versions": "v2.6.36-rc1 to v6.3-rc1", + "breaks": "9ea53b74df9c4681f5bb2da6b2e10e37d87ea6d6", + "cmt_msg": "media: rc: Fix use-after-free bugs caused by ene_tx_irqsim()", "cvss3": { - "Attack Complexity": "High", - "Attack Vector": "Physical", + "Attack Complexity": "Low", + "Attack Vector": "Local", "Availability": "High", "Confidentiality": "High", "Integrity": "High", - "Privileges Required": "None", + "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", - "score": 6.4 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 7.8 }, - "cwe": "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')", - "fixes": "282a4b71816b6076029017a7bab3a9dcee12a920", + "fixes": "29b0589a865b6f66d141d79b2dd1373e4e50fe17", + "last_affected_version": "6.2.2", "last_modified": "2023-12-06", - "nvd_text": "An issue was discovered in the Linux kernel through 6.0.9. drivers/char/xillybus/xillyusb.c has a race condition and use-after-free during physical removal of a USB device.", + "nvd_text": "A flaw use after free in the Linux kernel integrated infrared receiver/transceiver driver was found in the way user detaching rc device. A local user could use this flaw to crash the system or potentially escalate their privileges on the system.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-45888", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-45888", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-45888", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-45888", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-45888", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-45888" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-1118", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-1118", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-1118", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-1118", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-1118", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-1118" } }, - "CVE-2022-45919": { - "affected_versions": "v2.6.12-rc2 to v6.4-rc3", - "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", - "cmt_msg": "media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221", + "CVE-2023-1192": { + "affected_versions": "v5.15-rc1 to v6.4-rc1", + "breaks": "a848c4f15ab6d5d405dbee7de5da71839b2bf35e", + "cmt_msg": "fs/ntfs3: Validate MFT flags before replaying logs", "cvss3": { - "Attack Complexity": "High", - "Attack Vector": "Local", + "Attack Complexity": "Low", + "Attack Vector": "Network", "Availability": "High", - "Confidentiality": "High", - "Integrity": "High", + "Confidentiality": "None", + "Integrity": "None", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", - "score": 7.0 + "raw": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "score": 6.5 }, - "cwe": "Use After Free", - "fixes": "280a8ab81733da8bc442253c700a52c4c0886ffd", - "last_affected_version": "6.3.6", + "fixes": "98bea253aa28ad8be2ce565a9ca21beb4a9419e5", + "last_affected_version": "6.3.3", "last_modified": "2023-12-06", - "nvd_text": "An issue was discovered in the Linux kernel through 6.0.10. In drivers/media/dvb-core/dvb_ca_en50221.c, a use-after-free can occur is there is a disconnect after an open, because of the lack of a wait_event.", + "nvd_text": "A use-after-free flaw was found in smb2_is_status_io_timeout() in CIFS in the Linux Kernel. After CIFS transfers response data to a system call, there are still local variable points to the memory region, and if the system call frees it faster than CIFS uses it, CIFS will access a free memory region, leading to a denial of service.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-45919", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-45919", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-45919", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-45919", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-45919", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-45919" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-1192", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-1192", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-1192", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-1192", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-1192", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-1192" } }, - "CVE-2022-45934": { - "affected_versions": "v2.6.12-rc2 to v6.1", - "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", - "cmt_msg": "Bluetooth: L2CAP: Fix u8 overflow", + "CVE-2023-1193": { + "affected_versions": "v5.15-rc1 to v6.3-rc6", + "breaks": "a848c4f15ab6d5d405dbee7de5da71839b2bf35e", + "cmt_msg": "ksmbd: delete asynchronous work from list", "cvss3": { "Attack Complexity": "Low", - "Attack Vector": "Local", + "Attack Vector": "Network", + "Availability": "High", + "Confidentiality": "None", + "Integrity": "None", + "Privileges Required": "Low", + "Scope": "Unchanged", + "User Interaction": "None", + "raw": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "score": 6.5 + }, + "fixes": "3a9b557f44ea8f216aab515a7db20e23f0eb51b9", + "last_affected_version": "6.1.70", + "last_modified": "2024-01-12", + "nvd_text": "A use-after-free flaw was found in setup_async_work in the KSMBD implementation of the in-kernel samba server and CIFS in the Linux kernel. This issue could allow an attacker to crash the system by accessing freed work.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-1193", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-1193", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-1193", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-1193", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-1193", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-1193" + } + }, + "CVE-2023-1194": { + "affected_versions": "v5.15-rc1 to v6.4-rc6", + "breaks": "a848c4f15ab6d5d405dbee7de5da71839b2bf35e", + "cmt_msg": "ksmbd: fix out-of-bound read in parse_lease_state()", + "cvss3": { + "Attack Complexity": "Low", + "Attack Vector": "Network", "Availability": "High", "Confidentiality": "High", - "Integrity": "High", + "Integrity": "None", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", - "score": 7.8 + "raw": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", + "score": 8.1 }, - "cwe": "Integer Overflow or Wraparound", - "fixes": "bcd70260ef56e0aee8a4fc6cd214a419900b0765", - "last_affected_version": "6.0", - "last_modified": "2023-12-06", - "nvd_text": "An issue was discovered in the Linux kernel through 6.0.10. l2cap_config_req in net/bluetooth/l2cap_core.c has an integer wraparound via L2CAP_CONF_REQ packets.", + "fixes": "fc6c6a3c324c1b3e93a03d0cfa3749c781f23de0", + "last_affected_version": "6.3.7", + "last_modified": "2023-12-27", + "nvd_text": "An out-of-bounds (OOB) memory read flaw was found in parse_lease_state in the KSMBD implementation of the in-kernel samba server and CIFS in the Linux kernel. When an attacker sends the CREATE command with a malformed payload to KSMBD, due to a missing check of `NameOffset` in the `parse_lease_state()` function, the `create_context` object can access invalid memory.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-45934", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-45934", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-45934", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-45934", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-45934", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-45934" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-1194", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-1194", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-1194", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-1194", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-1194", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-1194" } }, - "CVE-2022-4662": { - "affected_versions": "v2.6.12-rc2 to v6.0-rc4", - "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", - "cmt_msg": "USB: core: Prevent nested device-reset calls", + "CVE-2023-1195": { + "affected_versions": "v5.16-rc1 to v6.1-rc3", + "breaks": "7be3248f313930ff3d3436d4e9ddbe9fccc1f541", + "cmt_msg": "cifs: fix use-after-free caused by invalid pointer `hostname`", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", @@ -81509,82 +87928,80 @@ "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "score": 5.5 }, - "cwe": "Non-exit on Failed Initialization", - "fixes": "9c6d778800b921bde3bff3cff5003d1650f942d1", - "last_affected_version": "5.19.7", + "fixes": "153695d36ead0ccc4d0256953c751cabf673e621", "last_modified": "2023-12-06", - "nvd_text": "A flaw incorrect access control in the Linux kernel USB core subsystem was found in the way user attaches usb device. A local user could use this flaw to crash the system.", + "nvd_text": "A use-after-free flaw was found in reconn_set_ipaddr_from_hostname in fs/cifs/connect.c in the Linux kernel. The issue occurs when it forgets to set the free pointer server->hostname to NULL, leading to an invalid pointer request.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-4662", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-4662", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-4662", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-4662", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-4662", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-4662" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-1195", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-1195", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-1195", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-1195", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-1195", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-1195" } }, - "CVE-2022-4696": { - "affected_versions": "v5.10-rc1 to v5.12-rc1-dontuse", - "breaks": "0f203765880c4416675726be558b65da4a7604e2", - "cmt_msg": "io_uring: remove any grabbing of context", + "CVE-2023-1206": { + "affected_versions": "v2.6.12-rc2 to v6.5-rc4", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "tcp: Reduce chance of collisions in inet6_hashfn().", "cvss3": { "Attack Complexity": "Low", - "Attack Vector": "Local", + "Attack Vector": "Adjacent", "Availability": "High", - "Confidentiality": "High", - "Integrity": "High", + "Confidentiality": "None", + "Integrity": "None", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", - "score": 7.8 + "raw": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "score": 5.7 }, - "cwe": "Use After Free", - "fixes": "44526bedc2ff8fcd58552e3c5bae928524b6f13c", + "fixes": "d11b0df7ddf1831f3e170972f43186dad520bfcc", + "last_affected_version": "6.4.7", "last_modified": "2023-12-06", - "nvd_text": "There exists a use-after-free vulnerability in the Linux kernel through io_uring and the\u00a0IORING_OP_SPLICE operation. If\u00a0IORING_OP_SPLICE is\u00a0missing the IO_WQ_WORK_FILES flag, which signals that the operation won't use current->nsproxy, so its reference counter is not increased. This assumption is not always true as calling io_splice on specific files will call the get_uts function which will use current->nsproxy leading to invalidly decreasing its reference counter later causing the use-after-free vulnerability. We recommend upgrading to version 5.10.160 or above\n", + "nvd_text": "A hash collision flaw was found in the IPv6 connection lookup table in the Linux kernel\u2019s IPv6 functionality when a user makes a new kind of SYN flood attack. A user located in the local network or with a high bandwidth connection can increase the CPU usage of the server that accepts IPV6 connections up to 95%.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-4696", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-4696", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-4696", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-4696", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-4696", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-4696" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-1206", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-1206", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-1206", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-1206", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-1206", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-1206" } }, - "CVE-2022-4744": { - "affected_versions": "v2.6.12-rc2 to v5.16-rc7", - "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", - "cmt_msg": "tun: avoid double free in tun_free_netdev", + "CVE-2023-1249": { + "affected_versions": "v3.7-rc1 to v5.18-rc1", + "breaks": "2aa362c49c314a98fb9aebbd7760a461667bac05", + "cmt_msg": "coredump: Use the vma snapshot in fill_files_note", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", - "Confidentiality": "High", - "Integrity": "High", + "Confidentiality": "None", + "Integrity": "None", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", - "score": 7.8 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "score": 5.5 }, - "fixes": "158b515f703e75e7d68289bf4d98c664e1d632df", - "last_affected_version": "5.15.11", + "fixes": "390031c942116d4733310f0684beb8db19885fe6", + "last_affected_version": "5.17.1", "last_modified": "2023-12-06", - "nvd_text": "A double-free flaw was found in the Linux kernel\u2019s TUN/TAP device driver functionality in how a user registers the device when the register_netdevice function fails (NETDEV_REGISTER notifier). This flaw allows a local user to crash or potentially escalate their privileges on the system.", + "nvd_text": "A use-after-free flaw was found in the Linux kernel\u2019s core dump subsystem. This flaw allows a local user to crash the system. Only if patch 390031c94211 (\"coredump: Use the vma snapshot in fill_files_note\") not applied yet, then kernel could be affected.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-4744", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-4744", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-4744", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-4744", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-4744", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-4744" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-1249", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-1249", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-1249", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-1249", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-1249", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-1249" } }, - "CVE-2022-47518": { - "affected_versions": "v5.7-rc1 to v6.1-rc8", - "breaks": "4fb8b5aa2a1126783ae00bae544d6f3c519408ef", - "cmt_msg": "wifi: wilc1000: validate number of channels", + "CVE-2023-1252": { + "affected_versions": "v5.6-rc1 to v5.16-rc1", + "breaks": "2406a307ac7ddfd7effeeaff6947149ec6a95b4e", + "cmt_msg": "ovl: fix use after free in struct ovl_aio_req", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", @@ -81597,24 +88014,23 @@ "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "score": 7.8 }, - "cwe": "Out-of-bounds Write", - "fixes": "0cdfa9e6f0915e3d243e2393bfa8a22e12d553b0", - "last_affected_version": "6.0.10", + "fixes": "9a254403760041528bc8f69fe2f5e1ef86950991", + "last_affected_version": "5.15.2", "last_modified": "2023-12-06", - "nvd_text": "An issue was discovered in the Linux kernel before 6.0.11. Missing validation of the number of channels in drivers/net/wireless/microchip/wilc1000/cfg80211.c in the WILC1000 wireless driver can trigger a heap-based buffer overflow when copying the list of operating channels from Wi-Fi management frames.", + "nvd_text": "A use-after-free flaw was found in the Linux kernel\u2019s Ext4 File System in how a user triggers several file operations simultaneously with the overlay FS usage. This flaw allows a local user to crash or potentially escalate their privileges on the system. Only if patch 9a2544037600 (\"ovl: fix use after free in struct ovl_aio_req\") not applied yet, the kernel could be affected.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-47518", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-47518", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-47518", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-47518", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-47518", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-47518" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-1252", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-1252", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-1252", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-1252", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-1252", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-1252" } }, - "CVE-2022-47519": { - "affected_versions": "v5.7-rc1 to v6.1-rc8", - "breaks": "4fb8b5aa2a1126783ae00bae544d6f3c519408ef", - "cmt_msg": "wifi: wilc1000: validate length of IEEE80211_P2P_ATTR_OPER_CHANNEL attribute", + "CVE-2023-1281": { + "affected_versions": "v4.14-rc1 to v6.2", + "breaks": "9b0d4446b56904b59ae3809913b0ac760fa941a6", + "cmt_msg": "net/sched: tcindex: update imperfect hash filters respecting rcu", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", @@ -81627,86 +88043,83 @@ "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "score": 7.8 }, - "cwe": "Out-of-bounds Write", - "fixes": "051ae669e4505abbe05165bebf6be7922de11f41", - "last_affected_version": "6.0.10", + "fixes": "ee059170b1f7e94e55fa6cadee544e176a6e59c2", + "last_affected_version": "6.1", "last_modified": "2023-12-06", - "nvd_text": "An issue was discovered in the Linux kernel before 6.0.11. Missing validation of IEEE80211_P2P_ATTR_OPER_CHANNEL in drivers/net/wireless/microchip/wilc1000/cfg80211.c in the WILC1000 wireless driver can trigger an out-of-bounds write when parsing the channel list attribute from Wi-Fi management frames.", + "nvd_text": "Use After Free vulnerability in Linux kernel traffic control index filter (tcindex) allows Privilege Escalation.\u00a0The imperfect hash area can be updated while packets are traversing, which will cause a use-after-free when 'tcf_exts_exec()' is called with the destroyed tcf_ext.\u00a0A local attacker user can use this vulnerability to elevate its privileges to root.\nThis issue affects Linux Kernel: from 4.14 before git commit ee059170b1f7e94e55fa6cadee544e176a6e59c2.\n\n", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-47519", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-47519", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-47519", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-47519", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-47519", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-47519" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-1281", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-1281", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-1281", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-1281", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-1281", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-1281" } }, - "CVE-2022-47520": { - "affected_versions": "v4.2-rc1 to v6.1-rc8", - "breaks": "c5c77ba18ea66aa05441c71e38473efb787705a4", - "cmt_msg": "wifi: wilc1000: validate pairwise and authentication suite offsets", + "CVE-2023-1295": { + "affected_versions": "v5.6-rc1 to v5.12-rc1-dontuse", + "breaks": "b5dba59e0cf7e2cc4d3b3b1ac5fe81ddf21959eb", + "cmt_msg": "io_uring: get rid of intermediate IORING_OP_CLOSE stage", "cvss3": { - "Attack Complexity": "Low", + "Attack Complexity": "High", "Attack Vector": "Local", "Availability": "High", "Confidentiality": "High", - "Integrity": "None", + "Integrity": "High", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", - "score": 7.1 + "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 7.0 }, - "cwe": "Out-of-bounds Read", - "fixes": "cd21d99e595ec1d8721e1058dcdd4f1f7de1d793", - "last_affected_version": "6.0.10", + "fixes": "9eac1904d3364254d622bf2c771c4f85cd435fc2", + "last_affected_version": "5.11.5", "last_modified": "2023-12-06", - "nvd_text": "An issue was discovered in the Linux kernel before 6.0.11. Missing offset validation in drivers/net/wireless/microchip/wilc1000/hif.c in the WILC1000 wireless driver can trigger an out-of-bounds read when parsing a Robust Security Network (RSN) information element from a Netlink packet.", + "nvd_text": "A time-of-check to time-of-use issue exists in io_uring subsystem's IORING_OP_CLOSE operation in the Linux kernel's versions 5.6 - 5.11 (inclusive), which allows a local user to elevate their privileges to root. Introduced in b5dba59e0cf7e2cc4d3b3b1ac5fe81ddf21959eb, patched in 9eac1904d3364254d622bf2c771c4f85cd435fc2, backported to stable in 788d0824269bef539fe31a785b1517882eafed93.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-47520", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-47520", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-47520", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-47520", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-47520", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-47520" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-1295", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-1295", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-1295", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-1295", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-1295", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-1295" } }, - "CVE-2022-47521": { - "affected_versions": "v5.7-rc1 to v6.1-rc8", - "breaks": "4fb8b5aa2a1126783ae00bae544d6f3c519408ef", - "cmt_msg": "wifi: wilc1000: validate length of IEEE80211_P2P_ATTR_CHANNEL_LIST attribute", + "CVE-2023-1380": { + "affected_versions": "v3.2-rc1 to v6.4-rc1", + "breaks": "5b435de0d786869c95d1962121af0d7df2542009", + "cmt_msg": "wifi: brcmfmac: slab-out-of-bounds read in brcmf_get_assoc_ies()", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", "Confidentiality": "High", - "Integrity": "High", + "Integrity": "None", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", - "score": 7.8 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", + "score": 7.1 }, - "cwe": "Out-of-bounds Write", - "fixes": "f9b62f9843c7b0afdaecabbcebf1dbba18599408", - "last_affected_version": "6.0.10", + "fixes": "0da40e018fd034d87c9460123fa7f897b69fdee7", + "last_affected_version": "6.3.0", "last_modified": "2023-12-06", - "nvd_text": "An issue was discovered in the Linux kernel before 6.0.11. Missing validation of IEEE80211_P2P_ATTR_CHANNEL_LIST in drivers/net/wireless/microchip/wilc1000/cfg80211.c in the WILC1000 wireless driver can trigger a heap-based buffer overflow when parsing the operating channel attribute from Wi-Fi management frames.", + "nvd_text": "A slab-out-of-bound read problem was found in brcmf_get_assoc_ies in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux Kernel. This issue could occur when assoc_info->req_len data is bigger than the size of the buffer, defined as WL_EXTRA_BUF_MAX, leading to a denial of service.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-47521", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-47521", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-47521", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-47521", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-47521", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-47521" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-1380", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-1380", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-1380", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-1380", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-1380", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-1380" } }, - "CVE-2022-47929": { - "affected_versions": "v4.3-rc1 to v6.2-rc4", - "breaks": "d66d6c3152e8d5a6db42a56bf7ae1c6cae87ba48", - "cmt_msg": "net: sched: disallow noqueue for qdisc classes", + "CVE-2023-1382": { + "affected_versions": "v3.11-rc1 to v6.1-rc7", + "breaks": "c5fa7b3cf3cb22e4ac60485fc2dc187fe012910f", + "cmt_msg": "tipc: set con sock in tipc_conn_alloc", "cvss3": { - "Attack Complexity": "Low", + "Attack Complexity": "High", "Attack Vector": "Local", "Availability": "High", "Confidentiality": "None", @@ -81714,296 +88127,257 @@ "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", - "score": 5.5 + "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", + "score": 4.7 }, - "cwe": "NULL Pointer Dereference", - "fixes": "96398560f26aa07e8f2969d73c8197e6a6d10407", - "last_affected_version": "6.1.5", + "fixes": "0e5d56c64afcd6fd2d132ea972605b66f8a7d3c4", + "last_affected_version": "6.0.10", "last_modified": "2023-12-06", - "nvd_text": "In the Linux kernel before 6.1.6, a NULL pointer dereference bug in the traffic control subsystem allows an unprivileged user to trigger a denial of service (system crash) via a crafted traffic control configuration that is set up with \"tc qdisc\" and \"tc class\" commands. This affects qdisc_graft in net/sched/sch_api.c.", + "nvd_text": "A data race flaw was found in the Linux kernel, between where con is allocated and con->sock is set. This issue leads to a NULL pointer dereference when accessing con->sock->sk in net/tipc/topsrv.c in the tipc protocol in the Linux kernel.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-47929", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-47929", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-47929", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-47929", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-47929", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-47929" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-1382", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-1382", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-1382", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-1382", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-1382", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-1382" } }, - "CVE-2022-47938": { - "affected_versions": "v5.15-rc1 to v6.0-rc1", - "breaks": "e2f34481b24db2fd634b5edb0a5bd0e4d38cc6e9", - "cmt_msg": "ksmbd: prevent out of bound read for SMB2_TREE_CONNNECT", + "CVE-2023-1390": { + "affected_versions": "v4.3-rc1 to v5.11-rc4", + "breaks": "af9b028e270fda6fb812d70d17d902297df1ceb5", + "cmt_msg": "tipc: fix NULL deref in tipc_link_xmit()", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Network", "Availability": "High", "Confidentiality": "None", "Integrity": "None", - "Privileges Required": "Low", + "Privileges Required": "None", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", - "score": 6.5 + "raw": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "score": 7.5 }, - "cwe": "Out-of-bounds Read", - "fixes": "824d4f64c20093275f72fc8101394d75ff6a249e", - "last_affected_version": "5.19.1", + "cwe": "Unspecified", + "fixes": "b77413446408fdd256599daf00d5be72b5f3e7c6", + "last_affected_version": "5.10.9", "last_modified": "2023-12-06", - "nvd_text": "An issue was discovered in ksmbd in the Linux kernel 5.15 through 5.19 before 5.19.2. fs/ksmbd/smb2misc.c has an out-of-bounds read and OOPS for SMB2_TREE_CONNECT.", + "nvd_text": "A remote denial of service vulnerability was found in the Linux kernel\u2019s TIPC kernel module. The while loop in tipc_link_xmit() hits an unknown state while attempting to parse SKBs, which are not in the queue. Sending two small UDP packets to a system with a UDP bearer results in the CPU utilization for the system to instantly spike to 100%, causing a denial of service condition.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-47938", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-47938", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-47938", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-47938", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-47938", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-47938" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-1390", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-1390", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-1390", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-1390", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-1390", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-1390" } }, - "CVE-2022-47939": { - "affected_versions": "v5.15-rc1 to v6.0-rc1", - "breaks": "e2f34481b24db2fd634b5edb0a5bd0e4d38cc6e9", - "cmt_msg": "ksmbd: fix use-after-free bug in smb2_tree_disconect", + "CVE-2023-1476": { + "affected_versions": "unk to unk", + "breaks": "", "cvss3": { - "Attack Complexity": "Low", - "Attack Vector": "Network", + "Attack Complexity": "High", + "Attack Vector": "Local", "Availability": "High", "Confidentiality": "High", "Integrity": "High", - "Privileges Required": "None", + "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", - "score": 9.8 + "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 7.0 }, - "cwe": "Use After Free", - "fixes": "cf6531d98190fa2cf92a6d8bbc8af0a4740a223c", - "last_affected_version": "5.19.1", - "last_modified": "2023-12-06", - "nvd_text": "An issue was discovered in ksmbd in the Linux kernel 5.15 through 5.19 before 5.19.2. fs/ksmbd/smb2pdu.c has a use-after-free and OOPS for SMB2_TREE_DISCONNECT.", + "fixes": "", + "last_modified": "2024-01-15", + "nvd_text": "A use-after-free flaw was found in the Linux kernel\u2019s mm/mremap memory address space accounting source code. This issue occurs due to a race condition between rmap walk and mremap, allowing a local user to crash the system or potentially escalate their privileges on the system.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-47939", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-47939", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-47939", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-47939", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-47939", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-47939" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-1476", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-1476", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-1476", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-1476", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-1476", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-1476" } }, - "CVE-2022-47940": { - "affected_versions": "v5.15-rc1 to v5.19-rc1", - "breaks": "e2f34481b24db2fd634b5edb0a5bd0e4d38cc6e9", - "cmt_msg": "ksmbd: validate length in smb2_write()", + "CVE-2023-1513": { + "affected_versions": "v2.6.12-rc2 to v6.2", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "kvm: initialize all of the kvm_debugregs structure before sending it to userspace", "cvss3": { "Attack Complexity": "Low", - "Attack Vector": "Network", - "Availability": "High", - "Confidentiality": "High", + "Attack Vector": "Local", + "Availability": "None", + "Confidentiality": "Low", "Integrity": "None", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", - "score": 8.1 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "score": 3.3 }, - "cwe": "Out-of-bounds Read", - "fixes": "158a66b245739e15858de42c0ba60fcf3de9b8e6", - "last_affected_version": "5.18.17", - "last_modified": "2023-12-27", - "nvd_text": "An issue was discovered in ksmbd in the Linux kernel 5.15 through 5.18 before 5.18.18. fs/ksmbd/smb2pdu.c lacks length validation in the non-padding case in smb2_write.", + "fixes": "2c10b61421a28e95a46ab489fd56c0f442ff6952", + "last_affected_version": "6.1", + "last_modified": "2023-12-06", + "nvd_text": "A flaw was found in KVM. When calling the KVM_GET_DEBUGREGS ioctl, on 32-bit systems, there might be some uninitialized portions of the kvm_debugregs structure that could be copied to userspace, causing an information leak.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-47940", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-47940", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-47940", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-47940", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-47940", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-47940" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-1513", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-1513", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-1513", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-1513", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-1513", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-1513" } }, - "CVE-2022-47941": { - "affected_versions": "v5.15-rc1 to v6.0-rc1", - "breaks": "e2f34481b24db2fd634b5edb0a5bd0e4d38cc6e9", - "cmt_msg": "ksmbd: fix memory leak in smb2_handle_negotiate", + "CVE-2023-1582": { + "affected_versions": "v4.5-rc1 to v5.17-rc4", + "breaks": "e9b61f19858a5d6c42ce2298cf138279375d0d9b", + "cmt_msg": "fs/proc: task_mmu.c: don't read mapcount for migration entry", "cvss3": { - "Attack Complexity": "Low", - "Attack Vector": "Network", + "Attack Complexity": "High", + "Attack Vector": "Local", "Availability": "High", "Confidentiality": "None", "Integrity": "None", - "Privileges Required": "None", - "Scope": "Unchanged", - "User Interaction": "None", - "raw": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", - "score": 7.5 - }, - "cwe": "Missing Release of Memory after Effective Lifetime", - "fixes": "aa7253c2393f6dcd6a1468b0792f6da76edad917", - "last_affected_version": "5.19.1", - "last_modified": "2023-12-06", - "nvd_text": "An issue was discovered in ksmbd in the Linux kernel 5.15 through 5.19 before 5.19.2. fs/ksmbd/smb2pdu.c omits a kfree call in certain smb2_handle_negotiate error conditions, aka a memory leak.", - "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-47941", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-47941", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-47941", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-47941", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-47941", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-47941" - } - }, - "CVE-2022-47942": { - "affected_versions": "v5.15-rc1 to v6.0-rc1", - "breaks": "e2f34481b24db2fd634b5edb0a5bd0e4d38cc6e9", - "cmt_msg": "ksmbd: fix heap-based overflow in set_ntacl_dacl()", - "cvss3": { - "Attack Complexity": "Low", - "Attack Vector": "Network", - "Availability": "High", - "Confidentiality": "High", - "Integrity": "High", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", - "score": 8.8 + "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", + "score": 4.7 }, - "cwe": "Out-of-bounds Write", - "fixes": "8f0541186e9ad1b62accc9519cc2b7a7240272a7", - "last_affected_version": "5.19.1", + "fixes": "24d7275ce2791829953ed4e72f68277ceb2571c6", + "last_affected_version": "5.16.9", "last_modified": "2023-12-06", - "nvd_text": "An issue was discovered in ksmbd in the Linux kernel 5.15 through 5.19 before 5.19.2. There is a heap-based buffer overflow in set_ntacl_dacl, related to use of SMB2_QUERY_INFO_HE after a malformed SMB2_SET_INFO_HE command.", + "nvd_text": "A race problem was found in fs/proc/task_mmu.c in the memory management sub-component in the Linux kernel. This issue may allow a local attacker with user privilege to cause a denial of service.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-47942", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-47942", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-47942", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-47942", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-47942", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-47942" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-1582", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-1582", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-1582", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-1582", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-1582", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-1582" } }, - "CVE-2022-47943": { - "affected_versions": "v5.15-rc1 to v6.0-rc1", - "breaks": "e2f34481b24db2fd634b5edb0a5bd0e4d38cc6e9", - "cmt_msg": "ksmbd: prevent out of bound read for SMB2_WRITE", + "CVE-2023-1583": { + "affected_versions": "v5.19-rc1 to v6.3-rc4", + "breaks": "4278a0deb1f6cac40ded3362fe2a9827d7efee3d", + "cmt_msg": "io_uring/rsrc: fix null-ptr-deref in io_file_bitmap_get()", "cvss3": { "Attack Complexity": "Low", - "Attack Vector": "Network", + "Attack Vector": "Local", "Availability": "High", - "Confidentiality": "High", + "Confidentiality": "None", "Integrity": "None", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", - "score": 8.1 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "score": 5.5 }, - "cwe": "Out-of-bounds Read", - "fixes": "ac60778b87e45576d7bfdbd6f53df902654e6f09", - "last_affected_version": "5.19.1", + "fixes": "02a4d923e4400a36d340ea12d8058f69ebf3a383", + "last_affected_version": "6.2.8", "last_modified": "2023-12-06", - "nvd_text": "An issue was discovered in ksmbd in the Linux kernel 5.15 through 5.19 before 5.19.2. There is an out-of-bounds read and OOPS for SMB2_WRITE, when there is a large length in the zero DataOffset case.", + "nvd_text": "A NULL pointer dereference was found in io_file_bitmap_get in io_uring/filetable.c in the io_uring sub-component in the Linux Kernel. When fixed files are unregistered, some context information (file_alloc_{start,end} and alloc_hint) is not cleared. A subsequent request that has auto index selection enabled via IORING_FILE_INDEX_ALLOC can cause a NULL pointer dereference. An unprivileged user can use the flaw to cause a system crash.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-47943", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-47943", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-47943", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-47943", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-47943", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-47943" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-1583", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-1583", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-1583", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-1583", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-1583", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-1583" } }, - "CVE-2022-47946": { - "affected_versions": "v5.1-rc1 to v5.12-rc2", - "breaks": "2b188cc1bb857a9d4701ae59aa7768b5124e262e", - "cmt_msg": "io_uring: kill sqo_dead and sqo submission halting", + "CVE-2023-1611": { + "affected_versions": "v2.6.12-rc2 to v6.3-rc5", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "btrfs: fix race between quota disable and quota assign ioctls", "cvss3": { - "Attack Complexity": "Low", + "Attack Complexity": "High", "Attack Vector": "Local", "Availability": "High", - "Confidentiality": "None", + "Confidentiality": "High", "Integrity": "None", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", - "score": 5.5 + "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H", + "score": 6.3 }, - "cwe": "Use After Free", - "fixes": "70aacfe66136809d7f080f89c492c278298719f4", + "fixes": "2f1a6be12ab6c8470d5776e68644726c94257c54", + "last_affected_version": "6.2.9", "last_modified": "2023-12-06", - "nvd_text": "An issue was discovered in the Linux kernel 5.10.x before 5.10.155. A use-after-free in io_sqpoll_wait_sq in fs/io_uring.c allows an attacker to crash the kernel, resulting in denial of service. finish_wait can be skipped. An attack can occur in some situations by forking a process and then quickly terminating it. NOTE: later kernel versions, such as the 5.15 longterm series, substantially changed the implementation of io_sqpoll_wait_sq.", + "nvd_text": "A use-after-free flaw was found in btrfs_search_slot in fs/btrfs/ctree.c in btrfs in the Linux Kernel.This flaw allows an attacker to crash the system and possibly cause a kernel information lea", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-47946", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-47946", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-47946", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-47946", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-47946", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-47946" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-1611", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-1611", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-1611", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-1611", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-1611", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-1611" } }, - "CVE-2022-4842": { - "affected_versions": "v5.15-rc1 to v6.2-rc1", - "breaks": "be71b5cba2e6485e8959da7a9f9a44461a1bb074", - "cmt_msg": "fs/ntfs3: Fix attr_punch_hole() null pointer derenference", + "CVE-2023-1637": { + "affected_versions": "v4.17-rc7 to v5.18-rc2", + "breaks": "772439717dbf703b39990be58d8d4e3e4ad0598a", + "cmt_msg": "x86/speculation: Restore speculation related MSRs during S3 resume", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", - "Availability": "High", - "Confidentiality": "None", + "Availability": "None", + "Confidentiality": "High", "Integrity": "None", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "score": 5.5 }, - "cwe": "NULL Pointer Dereference", - "fixes": "6d5c9e79b726cc473d40e9cb60976dbe8e669624", - "last_affected_version": "6.1.7", + "fixes": "e2a1256b17b16f9b9adf1b6fea56819e7b68e463", + "last_affected_version": "5.17.2", "last_modified": "2023-12-06", - "nvd_text": "A flaw NULL Pointer Dereference in the Linux kernel NTFS3 driver function attr_punch_hole() was found. A local user could use this flaw to crash the system.", + "nvd_text": "A flaw that boot CPU could be vulnerable for the speculative execution behavior kind of attacks in the Linux kernel X86 CPU Power management options functionality was found in the way user resuming CPU from suspend-to-RAM. A local user could use this flaw to potentially get unauthorized access to some memory of the CPU similar to the speculative execution behavior kind of attacks.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-4842", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-4842", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-4842", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-4842", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-4842", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-4842" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-1637", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-1637", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-1637", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-1637", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-1637", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-1637" } }, - "CVE-2022-48423": { - "affected_versions": "v5.15-rc1 to v6.2-rc1", - "breaks": "12dad495eaab95e0bb784c43869073617c513ea4", - "cmt_msg": "fs/ntfs3: Validate resident attribute name", + "CVE-2023-1652": { + "affected_versions": "v5.14-rc1 to v6.2-rc5", + "breaks": "f4e44b393389c77958f7c58bf4415032b4cda15b", + "cmt_msg": "NFSD: fix use-after-free in nfsd4_ssc_setup_dul()", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", "Confidentiality": "High", - "Integrity": "High", + "Integrity": "None", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", - "score": 7.8 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", + "score": 7.1 }, - "cwe": "Unspecified", - "fixes": "54e45702b648b7c0000e90b3e9b890e367e16ea8", - "last_affected_version": "6.1.2", + "fixes": "e6cf91b7b47ff82b624bdfe2fdcde32bb52e71dd", + "last_affected_version": "6.1.8", "last_modified": "2023-12-06", - "nvd_text": "In the Linux kernel before 6.1.3, fs/ntfs3/record.c does not validate resident attribute names. An out-of-bounds write may occur.", + "nvd_text": "A use-after-free flaw was found in nfsd4_ssc_setup_dul in fs/nfsd/nfs4proc.c in the NFS filesystem in the Linux Kernel. This issue could allow a local attacker to crash the system or it may lead to a kernel information leak problem.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-48423", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-48423", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-48423", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-48423", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-48423", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-48423" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-1652", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-1652", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-1652", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-1652", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-1652", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-1652" } }, - "CVE-2022-48424": { - "affected_versions": "v5.15-rc1 to v6.2-rc1", - "breaks": "12dad495eaab95e0bb784c43869073617c513ea4", - "cmt_msg": "fs/ntfs3: Validate attribute name offset", + "CVE-2023-1670": { + "affected_versions": "v2.6.12-rc2 to v6.3-rc4", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "xirc2ps_cs: Fix use after free bug in xirc2ps_detach", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", @@ -82016,24 +88390,23 @@ "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "score": 7.8 }, - "cwe": "Unspecified", - "fixes": "4f1dc7d9756e66f3f876839ea174df2e656b7f79", - "last_affected_version": "6.1.2", + "fixes": "e8d20c3ded59a092532513c9bd030d1ea66f5f44", + "last_affected_version": "6.2.8", "last_modified": "2023-12-06", - "nvd_text": "In the Linux kernel before 6.1.3, fs/ntfs3/inode.c does not validate the attribute name offset. An unhandled page fault may occur.", + "nvd_text": "A flaw use after free in the Linux kernel Xircom 16-bit PCMCIA (PC-card) Ethernet driver was found.A local user could use this flaw to crash the system or potentially escalate their privileges on the system.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-48424", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-48424", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-48424", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-48424", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-48424", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-48424" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-1670", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-1670", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-1670", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-1670", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-1670", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-1670" } }, - "CVE-2022-48425": { - "affected_versions": "v5.15-rc1 to v6.4-rc1", - "breaks": "12dad495eaab95e0bb784c43869073617c513ea4", - "cmt_msg": "fs/ntfs3: Validate MFT flags before replaying logs", + "CVE-2023-1829": { + "affected_versions": "v2.6.12-rc2 to v6.3-rc1", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "net/sched: Retire tcindex classifier", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", @@ -82046,23 +88419,23 @@ "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "score": 7.8 }, - "fixes": "98bea253aa28ad8be2ce565a9ca21beb4a9419e5", - "last_affected_version": "6.3.3", + "fixes": "8c710f75256bb3cf05ac7b1672c82b92c43f3d28", + "last_affected_version": "6.2.4", "last_modified": "2023-12-06", - "nvd_text": "In the Linux kernel through 6.2.7, fs/ntfs3/inode.c has an invalid kfree because it does not validate MFT flags before replaying logs.", + "nvd_text": "A use-after-free vulnerability in the Linux Kernel traffic control index filter (tcindex) can be exploited to achieve local privilege escalation.\u00a0The tcindex_delete function which does not properly deactivate filters in case of a perfect hashes while deleting the underlying structure which can later lead to double freeing the structure.\u00a0A local attacker user can use this vulnerability to elevate its privileges to root.\nWe recommend upgrading past commit 8c710f75256bb3cf05ac7b1672c82b92c43f3d28.\n\n", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-48425", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-48425", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-48425", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-48425", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-48425", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-48425" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-1829", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-1829", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-1829", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-1829", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-1829", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-1829" } }, - "CVE-2022-48502": { - "affected_versions": "v5.15-rc1 to v6.2-rc1", - "breaks": "f7464060f7ab9a2424428008f0ee9f1e267e410f", - "cmt_msg": "fs/ntfs3: Check fields while reading", + "CVE-2023-1838": { + "affected_versions": "v2.6.12-rc2 to v5.18", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "Fix double fget() in vhost_net_set_backend()", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", @@ -82075,158 +88448,141 @@ "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", "score": 7.1 }, - "fixes": "0e8235d28f3a0e9eda9f02ff67ee566d5f42b66b", - "last_affected_version": "6.1.39", + "fixes": "fb4554c2232e44d595920f4d5c66cf8f7d13f9bc", + "last_affected_version": "5.17", "last_modified": "2023-12-06", - "nvd_text": "An issue was discovered in the Linux kernel before 6.2. The ntfs3 subsystem does not properly check for correctness during disk reads, leading to an out-of-bounds read in ntfs_set_ea in fs/ntfs3/xattr.c.", + "nvd_text": "A use-after-free flaw was found in vhost_net_set_backend in drivers/vhost/net.c in virtio network subcomponent in the Linux kernel due to a double fget. This flaw could allow a local attacker to crash the system, and could even lead to a kernel information leak problem.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-48502", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-48502", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-48502", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-48502", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-48502", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-48502" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-1838", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-1838", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-1838", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-1838", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-1838", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-1838" } }, - "CVE-2022-48619": { - "affected_versions": "v2.6.12-rc2 to v5.18-rc1", - "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", - "cmt_msg": "Input: add bounds checking to input_set_capability()", + "CVE-2023-1855": { + "affected_versions": "v4.9-rc1 to v6.3-rc3", + "breaks": "2ca492e22cb70a001749377506bd22eb06f60ecc", + "cmt_msg": "hwmon: (xgene) Fix use after free bug in xgene_hwmon_remove due to race condition", "cvss3": { - "Attack Complexity": "Low", + "Attack Complexity": "High", "Attack Vector": "Local", "Availability": "High", - "Confidentiality": "None", + "Confidentiality": "High", "Integrity": "None", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", - "score": 5.5 + "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H", + "score": 6.3 }, - "cwe": "Unspecified", - "fixes": "409353cbe9fe48f6bc196114c442b1cff05a39bc", - "last_affected_version": "5.17.9", - "last_modified": "2024-02-02", - "nvd_text": "An issue was discovered in drivers/input/input.c in the Linux kernel before 5.17.10. An attacker can cause a denial of service (panic) because input_set_capability mishandles the situation in which an event code falls outside of a bitmap.", + "fixes": "cb090e64cf25602b9adaf32d5dfc9c8bec493cd1", + "last_affected_version": "6.2.7", + "last_modified": "2023-12-06", + "nvd_text": "A use-after-free flaw was found in xgene_hwmon_remove in drivers/hwmon/xgene-hwmon.c in the Hardware Monitoring Linux Kernel Driver (xgene-hwmon). This flaw could allow a local attacker to crash the system due to a race problem. This vulnerability could even lead to a kernel information leak problem.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2022-48619", - "ExploitDB": "https://www.exploit-db.com/search?cve=2022-48619", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2022-48619", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2022-48619", - "SUSE": "https://www.suse.com/security/cve/CVE-2022-48619", - "Ubuntu": "https://ubuntu.com/security/CVE-2022-48619" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-1855", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-1855", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-1855", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-1855", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-1855", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-1855" } }, - "CVE-2023-0030": { - "affected_versions": "v2.6.12-rc2 to v5.0-rc1", - "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", - "cmt_msg": "drm/nouveau/mmu: add more general vmm free/node handling functions", + "CVE-2023-1859": { + "affected_versions": "v4.12-rc1 to v6.3-rc7", + "breaks": "71ebd71921e451f0f942ddfe85d01e31ddc6eb88", + "cmt_msg": "9p/xen : Fix use after free bug in xen_9pfs_front_remove due to race condition", "cvss3": { - "Attack Complexity": "Low", + "Attack Complexity": "High", "Attack Vector": "Local", "Availability": "High", - "Confidentiality": "High", - "Integrity": "High", + "Confidentiality": "None", + "Integrity": "None", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", - "score": 7.8 + "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", + "score": 4.7 }, - "fixes": "729eba3355674f2d9524629b73683ba1d1cd3f10", + "fixes": "ea4f1009408efb4989a0f139b70fb338e7f687d0", + "last_affected_version": "6.2.11", "last_modified": "2023-12-06", - "nvd_text": "A use-after-free flaw was found in the Linux kernel\u2019s nouveau driver in how a user triggers a memory overflow that causes the nvkm_vma_tail function to fail. This flaw allows a local user to crash or potentially escalate their privileges on the system.", + "nvd_text": "A use-after-free flaw was found in xen_9pfs_front_removet in net/9p/trans_xen.c in Xen transport for 9pfs in the Linux Kernel. This flaw could allow a local attacker to crash the system due to a race problem, possibly leading to a kernel information leak.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-0030", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-0030", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-0030", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-0030", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-0030", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-0030" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-1859", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-1859", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-1859", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-1859", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-1859", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-1859" } }, - "CVE-2023-0045": { - "affected_versions": "v4.20-rc5 to v6.2-rc3", - "breaks": "9137bb27e60e554dab694eafa4cca241fa3a694f", - "cmt_msg": "x86/bugs: Flush IBP in ib_prctl_set()", + "CVE-2023-1872": { + "affected_versions": "v5.7-rc1 to v5.18-rc2", + "breaks": "7d67af2c013402537385dae343a2d0f6a4cb3bfd", + "cmt_msg": "io_uring: propagate issue_flags state down to file assignment", "cvss3": { - "Attack Complexity": "Low", - "Attack Vector": "Network", - "Availability": "None", + "Attack Complexity": "High", + "Attack Vector": "Local", + "Availability": "High", "Confidentiality": "High", - "Integrity": "None", - "Privileges Required": "None", + "Integrity": "High", + "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", - "score": 7.5 + "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 7.0 }, - "fixes": "a664ec9158eeddd75121d39c9a0758016097fa96", - "last_affected_version": "6.1.4", + "fixes": "5106dd6e74ab6c94daac1c357094f11e6934b36f", + "last_affected_version": "5.17.2", "last_modified": "2023-12-06", - "nvd_text": "The current implementation of the prctl syscall does not issue an IBPB immediately during the syscall. The ib_prctl_set \u00a0function updates the Thread Information Flags (TIFs) for the task and updates the SPEC_CTRL MSR on the function __speculation_ctrl_update, but the IBPB is only issued on the next schedule, when the TIF bits are checked. This leaves the victim vulnerable to values already injected on the BTB, prior to the prctl syscall. \u00a0The patch that added the support for the conditional mitigation via prctl (ib_prctl_set) dates back to the kernel 4.9.176.\n\nWe recommend upgrading past commit\u00a0a664ec9158eeddd75121d39c9a0758016097fa96\n\n", + "nvd_text": "A use-after-free vulnerability in the Linux Kernel io_uring system can be exploited to achieve local privilege escalation.\n\nThe io_file_get_fixed function lacks the presence of ctx->uring_lock which can lead to a Use-After-Free vulnerability due a race condition with fixed files getting unregistered.\n\nWe recommend upgrading past commit da24142b1ef9fd5d36b76e36bab328a5b27523e8.\n\n", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-0045", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-0045", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-0045", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-0045", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-0045", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-0045" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-1872", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-1872", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-1872", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-1872", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-1872", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-1872" } }, - "CVE-2023-0047": { - "affected_versions": "v2.6.12-rc2 to v5.16-rc1", - "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", - "cmt_msg": "mm, oom: do not trigger out_of_memory from the #PF", - "fixes": "60e2793d440a3ec95abb5d6d4fc034a4b480472d", - "last_affected_version": "5.15.2", - "last_modified": "2023-12-06", - "nvd_text": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2023. Notes: none.", - "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-0047", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-0047", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-0047", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-0047", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-0047", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-0047" - }, - "rejected": true - }, - "CVE-2023-0122": { - "affected_versions": "v6.0-rc1 to v6.0-rc4", - "breaks": "db1312dd95488b5e6ff362ff66fcf953a46b1821", + "CVE-2023-1989": { + "affected_versions": "v2.6.24-rc1 to v6.3-rc4", + "breaks": "ddbaf13e3609442b64abb931ac21527772d87980", + "cmt_msg": "Bluetooth: btsdio: fix use after free bug in btsdio_remove due to unfinished work", "cvss3": { - "Attack Complexity": "Low", - "Attack Vector": "Network", + "Attack Complexity": "High", + "Attack Vector": "Local", "Availability": "High", - "Confidentiality": "None", - "Integrity": "None", - "Privileges Required": "None", + "Confidentiality": "High", + "Integrity": "High", + "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", - "score": 7.5 + "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 7.0 }, - "cwe": "NULL Pointer Dereference", - "fixes": "da0342a3aa0357795224e6283df86444e1117168", + "fixes": "1e9ac114c4428fdb7ff4635b45d4f46017e8916f", + "last_affected_version": "6.2.8", "last_modified": "2023-12-06", - "nvd_text": "A NULL pointer dereference vulnerability in the Linux kernel NVMe functionality, in nvmet_setup_auth(), allows an attacker to perform a Pre-Auth Denial of Service (DoS) attack on a remote machine. Affected versions v6.0-rc1 to v6.0-rc3, fixed in v6.0-rc4.", + "nvd_text": "A use-after-free flaw was found in btsdio_remove in drivers\\bluetooth\\btsdio.c in the Linux Kernel. In this flaw, a call to btsdio_remove with an unfinished job, may cause a race problem leading to a UAF on hdev devices.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-0122", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-0122", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-0122", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-0122", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-0122", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-0122" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-1989", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-1989", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-1989", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-1989", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-1989", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-1989" } }, - "CVE-2023-0160": { - "affected_versions": "v4.20-rc1 to v6.4-rc1", - "breaks": "604326b41a6fb9b4a78b6179335decee0365cd8c", - "cmt_msg": "bpf, sockmap: fix deadlocks in the sockhash and sockmap", + "CVE-2023-1990": { + "affected_versions": "v3.17-rc1 to v6.3-rc3", + "breaks": "35630df68d6030daf12dde12ed07bbe26324e6ac", + "cmt_msg": "nfc: st-nci: Fix use after free bug in ndlc_remove due to race condition", "cvss3": { - "Attack Complexity": "Low", + "Attack Complexity": "High", "Attack Vector": "Local", "Availability": "High", "Confidentiality": "None", @@ -82234,86 +88590,86 @@ "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", - "score": 5.5 + "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", + "score": 4.7 }, - "fixes": "ed17aa92dc56b6d8883e4b7a8f1c6fbf5ed6cd29", - "last_affected_version": "6.3.1", + "fixes": "5000fe6c27827a61d8250a7e4a1d26c3298ef4f6", + "last_affected_version": "6.2.7", "last_modified": "2023-12-06", - "nvd_text": "A deadlock flaw was found in the Linux kernel\u2019s BPF subsystem. This flaw allows a local user to potentially crash the system.", + "nvd_text": "A use-after-free flaw was found in ndlc_remove in drivers/nfc/st-nci/ndlc.c in the Linux Kernel. This flaw could allow an attacker to crash the system due to a race problem.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-0160", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-0160", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-0160", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-0160", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-0160", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-0160" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-1990", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-1990", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-1990", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-1990", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-1990", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-1990" } }, - "CVE-2023-0179": { - "affected_versions": "v5.5-rc1 to v6.2-rc5", - "breaks": "f6ae9f120dada00abfb47313364c35118469455f", - "cmt_msg": "netfilter: nft_payload: incorrect arithmetics when fetching VLAN header bits", + "CVE-2023-1998": { + "affected_versions": "v5.19-rc7 to v6.3-rc1", + "breaks": "7c693f54c873691a4b7da05c7e0f74e67745d144", + "cmt_msg": "x86/speculation: Allow enabling STIBP with legacy IBRS", "cvss3": { - "Attack Complexity": "Low", + "Attack Complexity": "High", "Attack Vector": "Local", - "Availability": "High", + "Availability": "None", "Confidentiality": "High", - "Integrity": "High", + "Integrity": "None", "Privileges Required": "Low", - "Scope": "Unchanged", + "Scope": "Changed", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", - "score": 7.8 + "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", + "score": 5.6 }, - "fixes": "696e1a48b1a1b01edad542a1ef293665864a4dd0", - "last_affected_version": "6.1.6", + "fixes": "6921ed9049bc7457f66c1596c5b78aec0dae4a9d", + "last_affected_version": "6.2.2", "last_modified": "2023-12-06", - "nvd_text": "A buffer overflow vulnerability was found in the Netfilter subsystem in the Linux Kernel. This issue could allow the leakage of both stack and heap addresses, and potentially allow Local Privilege Escalation to the root user via arbitrary code execution.", + "nvd_text": "The Linux kernel allows userspace processes to enable mitigations by calling prctl with PR_SET_SPECULATION_CTRL which disables the speculation feature as well as by using seccomp. We had noticed that on VMs of at least one major cloud provider, the kernel still left the victim process exposed to attacks in some cases even after enabling the spectre-BTI mitigation with prctl. The same behavior can be observed on a bare-metal machine when forcing the mitigation to IBRS on boot command line.\n\nThis happened because when plain IBRS was enabled (not enhanced IBRS), the kernel had some logic that determined that STIBP was not needed. The IBRS bit implicitly protects against cross-thread branch target injection. However, with legacy IBRS, the IBRS bit was cleared on returning to userspace, due to performance reasons, which disabled the implicit STIBP and left userspace threads vulnerable to cross-thread branch target injection against which STIBP protects.\n\n\n", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-0179", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-0179", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-0179", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-0179", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-0179", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-0179" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-1998", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-1998", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-1998", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-1998", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-1998", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-1998" } }, - "CVE-2023-0210": { - "affected_versions": "v5.15-rc1 to v6.2-rc4", - "breaks": "e2f34481b24db2fd634b5edb0a5bd0e4d38cc6e9", - "cmt_msg": "ksmbd: check nt_len to be at least CIFS_ENCPWD_SIZE in ksmbd_decode_ntlmssp_auth_blob", + "CVE-2023-2002": { + "affected_versions": "v4.9-rc1 to v6.4-rc1", + "breaks": "f81f5b2db8692ff1d2d5f4db1fde58e67aa976a3", + "cmt_msg": "bluetooth: Perform careful capability checks in hci_sock_ioctl()", "cvss3": { "Attack Complexity": "Low", - "Attack Vector": "Network", + "Attack Vector": "Adjacent", "Availability": "High", - "Confidentiality": "None", - "Integrity": "None", - "Privileges Required": "None", + "Confidentiality": "Low", + "Integrity": "Low", + "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", - "score": 7.5 + "raw": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H", + "score": 6.8 }, - "fixes": "797805d81baa814f76cf7bdab35f86408a79d707", - "last_affected_version": "6.1.4", + "fixes": "25c150ac103a4ebeed0319994c742a90634ddf18", + "last_affected_version": "6.3.0", "last_modified": "2023-12-06", - "nvd_text": "A bug affects the Linux kernel\u2019s ksmbd NTLMv2 authentication and is known to crash the OS immediately in Linux-based systems.", + "nvd_text": "A vulnerability was found in the HCI sockets implementation due to a missing capability check in net/bluetooth/hci_sock.c in the Linux Kernel. This flaw allows an attacker to unauthorized execution of management commands, compromising the confidentiality, integrity, and availability of Bluetooth communication.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-0210", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-0210", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-0210", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-0210", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-0210", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-0210" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-2002", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-2002", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-2002", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-2002", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-2002", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-2002" } }, - "CVE-2023-0240": { - "affected_versions": "v5.1-rc1 to v5.10-rc1", - "breaks": "2b188cc1bb857a9d4701ae59aa7768b5124e262e", - "cmt_msg": "io_uring: COW io_identity on mismatch", + "CVE-2023-2006": { + "affected_versions": "v5.10-rc1 to v6.1-rc7", + "breaks": "245500d853e9f20036cec7df4f6984ece4c6bf26", + "cmt_msg": "rxrpc: Fix race between conn bundle lookup and bundle removal [ZDI-CAN-15975]", "cvss3": { - "Attack Complexity": "Low", + "Attack Complexity": "High", "Attack Vector": "Local", "Availability": "High", "Confidentiality": "High", @@ -82321,25 +88677,26 @@ "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", - "score": 7.8 + "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 7.0 }, - "fixes": "1e6fa5216a0e59ef02e8b6b40d553238a3b81d49", + "fixes": "3bcd6c7eaa53b56c3f584da46a1f7652e759d0e5", + "last_affected_version": "6.0.10", "last_modified": "2023-12-06", - "nvd_text": "There is a logic error in io_uring's implementation which can be used to trigger a use-after-free vulnerability leading to privilege escalation.\n\nIn the io_prep_async_work function the assumption that the last io_grab_identity call cannot return false is not true, and in this case the function will use the init_cred or the previous linked requests identity to do operations instead of using the current identity. This can lead to reference counting issues causing use-after-free. We recommend upgrading past version 5.10.161.", + "nvd_text": "A race condition was found in the Linux kernel's RxRPC network protocol, within the processing of RxRPC bundles. This issue results from the lack of proper locking when performing operations on an object. This may allow an attacker to escalate privileges and execute arbitrary code in the context of the kernel.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-0240", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-0240", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-0240", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-0240", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-0240", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-0240" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-2006", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-2006", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-2006", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-2006", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-2006", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-2006" } }, - "CVE-2023-0266": { - "affected_versions": "v2.6.12-rc2 to v6.2-rc4", + "CVE-2023-2007": { + "affected_versions": "v2.6.12-rc2 to v6.0-rc1", "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", - "cmt_msg": "ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF", + "cmt_msg": "scsi: dpt_i2o: Remove obsolete driver", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", @@ -82352,23 +88709,22 @@ "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "score": 7.8 }, - "fixes": "56b88b50565cd8b946a2d00b0c83927b7ebb055e", - "last_affected_version": "6.1.5", + "fixes": "b04e75a4a8a81887386a0d2dbf605a48e779d2a0", "last_modified": "2023-12-06", - "nvd_text": "A use after free vulnerability exists in the ALSA PCM package in the Linux Kernel.\u00a0SNDRV_CTL_IOCTL_ELEM_{READ|WRITE}32 is missing locks that can be used in a use-after-free that can result in a priviledge escalation to gain ring0 access from the system user. We recommend upgrading past commit\u00a056b88b50565cd8b946a2d00b0c83927b7ebb055e\n", + "nvd_text": "The specific flaw exists within the DPT I2O Controller driver. The issue results from the lack of proper locking when performing operations on an object. An attacker can leverage this in conjunction with other vulnerabilities to escalate privileges and execute arbitrary code in the context of the kernel.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-0266", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-0266", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-0266", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-0266", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-0266", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-0266" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-2007", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-2007", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-2007", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-2007", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-2007", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-2007" } }, - "CVE-2023-0386": { - "affected_versions": "v2.6.12-rc2 to v6.2-rc6", - "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", - "cmt_msg": "ovl: fail on invalid uid/gid mapping at copy up", + "CVE-2023-2008": { + "affected_versions": "v4.20-rc1 to v5.19-rc4", + "breaks": "7b26e4e2119d0c5ede1282b22ce2af22835ff4b5", + "cmt_msg": "udmabuf: add back sanity check", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", @@ -82381,54 +88737,53 @@ "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "score": 7.8 }, - "cwe": "Unspecified", - "fixes": "4f11ada10d0ad3fd53e2bd67806351de63a4f9c3", - "last_affected_version": "6.1.8", + "fixes": "05b252cccb2e5c3f56119d25de684b4f810ba40a", + "last_affected_version": "5.18.7", "last_modified": "2023-12-06", - "nvd_text": "A flaw was found in the Linux kernel, where unauthorized access to the execution of the setuid file with capabilities was found in the Linux kernel\u2019s OverlayFS subsystem in how a user copies a capable file from a nosuid mount into another mount. This uid mapping bug allows a local user to escalate their privileges on the system.", + "nvd_text": "A flaw was found in the Linux kernel's udmabuf device driver. The specific flaw exists within a fault handler. The issue results from the lack of proper validation of user-supplied data, which can result in a memory access past the end of an array. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the kernel.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-0386", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-0386", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-0386", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-0386", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-0386", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-0386" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-2008", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-2008", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-2008", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-2008", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-2008", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-2008" } }, - "CVE-2023-0394": { - "affected_versions": "v2.6.12-rc3 to v6.2-rc4", - "breaks": "357b40a18b04c699da1d45608436e9b76b50e251", - "cmt_msg": "ipv6: raw: Deduct extension header length in rawv6_push_pending_frames", + "CVE-2023-2019": { + "affected_versions": "v5.12-rc1-dontuse to v6.0-rc1", + "breaks": "0ae3eb7b4611207e140e9772398b9f88b72d6839", + "cmt_msg": "netdevsim: fib: Fix reference count leak on route deletion failure", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", "Confidentiality": "None", "Integrity": "None", - "Privileges Required": "Low", + "Privileges Required": "High", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", - "score": 5.5 + "raw": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "score": 4.4 }, - "cwe": "NULL Pointer Dereference", - "fixes": "cb3e9864cdbe35ff6378966660edbcbac955fe17", - "last_affected_version": "6.1.6", + "cwe": "Unspecified", + "fixes": "180a6a3ee60a7cb69ed1232388460644f6a21f00", + "last_affected_version": "5.19.1", "last_modified": "2023-12-06", - "nvd_text": "A NULL pointer dereference flaw was found in rawv6_push_pending_frames in net/ipv6/raw.c in the network subcomponent in the Linux kernel. This flaw causes the system to crash.", + "nvd_text": "A flaw was found in the Linux kernel's netdevsim device driver, within the scheduling of events. This issue results from the improper management of a reference count. This may allow an attacker to create a denial of service condition on the system.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-0394", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-0394", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-0394", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-0394", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-0394", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-0394" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-2019", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-2019", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-2019", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-2019", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-2019", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-2019" } }, - "CVE-2023-0458": { - "affected_versions": "v2.6.12-rc2 to v6.2-rc5", + "CVE-2023-20569": { + "affected_versions": "v2.6.12-rc2 to v6.5-rc6", "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", - "cmt_msg": "prlimit: do_prlimit needs to have a speculation check", + "cmt_msg": "x86/bugs: Increase the x86 bugs vector size to two u32s", "cvss3": { "Attack Complexity": "High", "Attack Vector": "Local", @@ -82441,23 +88796,23 @@ "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "score": 4.7 }, - "fixes": "739790605705ddcf18f21782b9c99ad7d53a8c11", - "last_affected_version": "6.1.7", + "fixes": "0e52740ffd10c6c316837c6c128f460f1aaba1ea", + "last_affected_version": "6.4.8", "last_modified": "2023-12-06", - "nvd_text": "A speculative pointer dereference problem exists in the Linux Kernel on the do_prlimit() function. The resource argument value is controlled and is used in pointer arithmetic for the 'rlim' variable and can be used to leak the contents. We recommend upgrading past version 6.1.8 or commit\u00a0739790605705ddcf18f21782b9c99ad7d53a8c11", + "nvd_text": "\n\n\nA side channel vulnerability on some of the AMD CPUs may allow an attacker to influence the return address prediction. This may result in speculative execution at an attacker-controlled?address, potentially leading to information disclosure.\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-0458", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-0458", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-0458", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-0458", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-0458", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-0458" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-20569", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-20569", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-20569", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-20569", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-20569", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-20569" } }, - "CVE-2023-0459": { - "affected_versions": "v2.6.12-rc2 to v6.3-rc1", + "CVE-2023-20588": { + "affected_versions": "v2.6.12-rc2 to v6.5-rc6", "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", - "cmt_msg": "uaccess: Add speculation barrier to copy_from_user()", + "cmt_msg": "x86/CPU/AMD: Do not leak quotient data after a division by 0", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", @@ -82470,429 +88825,426 @@ "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "score": 5.5 }, - "fixes": "74e19ef0ff8061ef55957c3abd71614ef0f42f47", - "last_affected_version": "6.2.0", + "fixes": "77245f1c3c6495521f6a3af082696ee2f8ce3921", + "last_affected_version": "6.4.9", "last_modified": "2023-12-06", - "nvd_text": "Copy_from_user on 64-bit versions of the Linux kernel does not implement the __uaccess_begin_nospec allowing a user to bypass the \"access_ok\" check and pass a kernel pointer to copy_from_user(). This would allow an attacker to leak information. We recommend upgrading beyond commit\u00a074e19ef0ff8061ef55957c3abd71614ef0f42f47", + "nvd_text": "\nA division-by-zero error on some AMD processors can potentially return speculative data resulting in loss of confidentiality.\u00a0\n\n\n\n\n\n\n\n", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-0459", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-0459", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-0459", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-0459", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-0459", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-0459" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-20588", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-20588", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-20588", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-20588", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-20588", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-20588" } }, - "CVE-2023-0461": { - "affected_versions": "v4.13-rc1 to v6.2-rc3", - "breaks": "734942cc4ea6478eed125af258da1bdbb4afe578", - "cmt_msg": "net/ulp: prevent ULP without clone op from entering the LISTEN status", + "CVE-2023-20593": { + "affected_versions": "v2.6.12-rc2 to v6.5-rc4", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "x86/cpu/amd: Add a Zenbleed fix", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", - "Availability": "High", + "Availability": "None", "Confidentiality": "High", - "Integrity": "High", + "Integrity": "None", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", - "score": 7.8 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "score": 5.5 }, - "fixes": "2c02d41d71f90a5168391b6a5f2954112ba2307c", - "last_affected_version": "6.1.4", + "cwe": "Unspecified", + "fixes": "522b1d69219d8f083173819fde04f994aa051a98", + "last_affected_version": "6.4.5", "last_modified": "2023-12-06", - "nvd_text": "There is a use-after-free vulnerability in the Linux Kernel which can be exploited to achieve local privilege escalation. To reach the vulnerability kernel configuration flag CONFIG_TLS\u00a0or CONFIG_XFRM_ESPINTCP\u00a0has to be configured, but the operation does not require any privilege.\n\nThere is a use-after-free bug of icsk_ulp_data\u00a0of a struct inet_connection_sock.\n\nWhen CONFIG_TLS\u00a0is enabled, user can install a tls context (struct tls_context) on a connected tcp socket. The context is not cleared if this socket is disconnected and reused as a listener. If a new socket is created from the listener, the context is inherited and vulnerable.\n\nThe setsockopt\u00a0TCP_ULP\u00a0operation does not require any privilege.\n\nWe recommend upgrading past commit\u00a02c02d41d71f90a5168391b6a5f2954112ba2307c", + "nvd_text": "\nAn issue in \u201cZen 2\u201d CPUs, under specific microarchitectural circumstances, may allow an attacker to potentially access sensitive information.\n\n\n\n\n\n\n", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-0461", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-0461", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-0461", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-0461", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-0461", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-0461" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-20593", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-20593", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-20593", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-20593", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-20593", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-20593" } }, - "CVE-2023-0468": { - "affected_versions": "v5.17-rc1 to v6.1-rc7", - "breaks": "aa43477b040251f451db0d844073ac00a8ab66ee", - "cmt_msg": "io_uring: make poll refs more robust", + "CVE-2023-20928": { + "affected_versions": "v4.20-rc1 to v6.0-rc1", + "breaks": "dd2283f2605e3b3e9c61bcae844b34f2afa4813f", + "cmt_msg": "android: binder: stop saving a pointer to the VMA", "cvss3": { - "Attack Complexity": "High", + "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", - "Confidentiality": "None", - "Integrity": "None", + "Confidentiality": "High", + "Integrity": "High", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", - "score": 4.7 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 7.8 }, - "fixes": "a26a35e9019fd70bf3cf647dcfdae87abc7bacea", - "last_affected_version": "6.0.10", + "fixes": "a43cfc87caaf46710c8027a8c23b8a55f1078f19", + "last_affected_version": "5.18.17", "last_modified": "2023-12-06", - "nvd_text": "A use-after-free flaw was found in io_uring/poll.c in io_poll_check_events in the io_uring subcomponent in the Linux Kernel due to a race condition of poll_refs. This flaw may cause a NULL pointer dereference.", + "nvd_text": "In binder_vma_close of binder.c, there is a possible use after free due to improper locking. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-254837884References: Upstream kernel", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-0468", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-0468", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-0468", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-0468", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-0468", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-0468" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-20928", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-20928", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-20928", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-20928", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-20928", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-20928" } }, - "CVE-2023-0469": { - "affected_versions": "v5.19-rc1 to v6.1-rc7", - "breaks": "61c1b44a21d70d4783db02198fbf68b132f4953c", - "cmt_msg": "io_uring/filetable: fix file reference underflow", + "CVE-2023-20937": { + "affected_versions": "unk to unk", + "breaks": "", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", - "Confidentiality": "None", - "Integrity": "None", + "Confidentiality": "High", + "Integrity": "High", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", - "score": 5.5 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 7.8 }, - "cwe": "Integer Underflow (Wrap or Wraparound)", - "fixes": "9d94c04c0db024922e886c9fd429659f22f48ea4", - "last_affected_version": "6.0.10", + "fixes": "", "last_modified": "2023-12-06", - "nvd_text": "A use-after-free flaw was found in io_uring/filetable.c in io_install_fixed_file in the io_uring subcomponent in the Linux Kernel during call cleanup. This flaw may lead to a denial of service.", + "nvd_text": "In several functions of the Android Linux kernel, there is a possible way to corrupt memory due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-257443051References: Upstream kernel", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-0469", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-0469", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-0469", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-0469", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-0469", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-0469" - } + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-20937", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-20937", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-20937", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-20937", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-20937", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-20937" + }, + "vendor_specific": true }, - "CVE-2023-0590": { - "affected_versions": "v2.6.32-rc1 to v6.1-rc2", - "breaks": "af356afa010f3cd2c8b8fcc3bce90f7a7b7ec02a", - "cmt_msg": "net: sched: fix race condition in qdisc_graft()", + "CVE-2023-20938": { + "affected_versions": "v5.17-rc1 to v5.18-rc5", + "breaks": "09184ae9b5756cc469db6fd1d1cfdcffbf627c2d", + "cmt_msg": "binder: Gracefully handle BINDER_TYPE_FDA objects with num_fds=0", "cvss3": { - "Attack Complexity": "High", + "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", - "Confidentiality": "None", - "Integrity": "None", + "Confidentiality": "High", + "Integrity": "High", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", - "score": 4.7 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 7.8 }, - "fixes": "ebda44da44f6f309d302522b049f43d6f829f7aa", - "last_affected_version": "6.0.5", + "fixes": "ef38de9217a04c9077629a24652689d8fdb4c6c6", + "last_affected_version": "5.17.5", "last_modified": "2023-12-06", - "nvd_text": "A use-after-free flaw was found in qdisc_graft in net/sched/sch_api.c in the Linux Kernel due to a race problem. This flaw leads to a denial of service issue. If patch ebda44da44f6 (\"net: sched: fix race condition in qdisc_graft()\") not applied yet, then kernel could be affected.", + "nvd_text": "In binder_transaction_buffer_release of binder.c, there is a possible use after free due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-257685302References: Upstream kernel", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-0590", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-0590", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-0590", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-0590", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-0590", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-0590" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-20938", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-20938", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-20938", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-20938", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-20938", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-20938" } }, - "CVE-2023-0597": { - "affected_versions": "v2.6.12-rc2 to v6.2-rc1", - "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", - "cmt_msg": "x86/mm: Randomize per-cpu entry area", + "CVE-2023-20941": { + "affected_versions": "unk to unk", + "breaks": "", "cvss3": { "Attack Complexity": "Low", - "Attack Vector": "Local", - "Availability": "None", + "Attack Vector": "Physical", + "Availability": "High", "Confidentiality": "High", - "Integrity": "None", - "Privileges Required": "Low", + "Integrity": "High", + "Privileges Required": "None", "Scope": "Unchanged", - "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", - "score": 5.5 + "User Interaction": "Required", + "raw": "CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "score": 6.6 }, - "fixes": "97e3d26b5e5f371b3ee223d94dd123e6c442ba80", + "fixes": "", "last_modified": "2023-12-06", - "nvd_text": "A flaw possibility of memory leak in the Linux kernel cpu_entry_area mapping of X86 CPU data to memory was found in the way user can guess location of exception stack(s) or other important data. A local user could use this flaw to get access to some important data with expected location in memory.", + "nvd_text": "In acc_ctrlrequest_composite of f_accessory.c, there is a possible out of bounds write due to a missing bounds check. This could lead to physical escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-264029575References: Upstream kernel", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-0597", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-0597", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-0597", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-0597", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-0597", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-0597" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-20941", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-20941", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-20941", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-20941", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-20941", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-20941" } }, - "CVE-2023-0615": { - "affected_versions": "v3.18-rc1 to v6.1-rc3", - "breaks": "ef834f7836ec0502f49f20bbc42f1240577a9c83", - "cmt_msg": "media: vivid: dev->bitmap_cap wasn't freed in all cases", + "CVE-2023-21102": { + "affected_versions": "v5.14-rc1 to v6.2-rc4", + "breaks": "cefc7ca46235f01d5233e3abd4b79452af01d9e9", + "cmt_msg": "efi: rt-wrapper: Add missing include", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", - "Confidentiality": "None", - "Integrity": "None", + "Confidentiality": "High", + "Integrity": "High", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", - "score": 5.5 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 7.8 }, - "fixes": "1f65ea411cc7b6ff128d82a3493d7b5648054e6f", - "last_affected_version": "6.0.6", + "cwe": "Unspecified", + "fixes": "18bba1843fc7f264f58c9345d00827d082f9c558", + "last_affected_version": "6.1.7", "last_modified": "2023-12-06", - "nvd_text": "A memory leak flaw and potential divide by zero and Integer overflow was found in the Linux kernel V4L2 and vivid test code functionality. This issue occurs when a user triggers ioctls, such as VIDIOC_S_DV_TIMINGS ioctl. This could allow a local user to crash the system if vivid test code enabled.", + "nvd_text": "In __efi_rt_asm_wrapper of efi-rt-wrapper.S, there is a possible bypass of shadow stack protection due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-260821414References: Upstream kernel", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-0615", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-0615", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-0615", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-0615", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-0615", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-0615" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-21102", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-21102", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-21102", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-21102", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-21102", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-21102" } }, - "CVE-2023-1032": { - "affected_versions": "v5.19-rc1 to v6.3-rc2", - "breaks": "da214a475f8bd1d3e9e7a19ddfeb4d1617551bab", - "cmt_msg": "net: avoid double iput when sock_alloc_file fails", + "CVE-2023-21106": { + "affected_versions": "v5.19-rc1 to v6.2-rc5", + "breaks": "d4726d7700688835f4784d3b94de6fff2cbe16c2", + "cmt_msg": "drm/msm/gpu: Fix potential double-free", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", - "Confidentiality": "None", - "Integrity": "None", + "Confidentiality": "High", + "Integrity": "High", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", - "score": 5.5 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 7.8 }, - "fixes": "649c15c7691e9b13cbe9bf6c65c365350e056067", - "last_affected_version": "6.2.2", - "last_modified": "2024-01-12", - "nvd_text": "The Linux kernel io_uring IORING_OP_SOCKET operation contained a double free in function __sys_socket_file() in file net/socket.c. This issue was introduced in da214a475f8bd1d3e9e7a19ddfeb4d1617551bab and fixed in 649c15c7691e9b13cbe9bf6c65c365350e056067.", + "fixes": "a66f1efcf748febea7758c4c3c8b5bc5294949ef", + "last_affected_version": "6.1.8", + "last_modified": "2023-12-06", + "nvd_text": "In adreno_set_param of adreno_gpu.c, there is a possible memory corruption due to a double free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-265016072References: Upstream kernel", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-1032", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-1032", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-1032", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-1032", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-1032", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-1032" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-21106", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-21106", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-21106", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-21106", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-21106", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-21106" } }, - "CVE-2023-1073": { - "affected_versions": "v3.16-rc1 to v6.2-rc5", - "breaks": "1b15d2e5b8077670b1e6a33250a0d9577efff4a5", - "cmt_msg": "HID: check empty report_list in hid_validate_values()", + "CVE-2023-2124": { + "affected_versions": "v3.12-rc1 to v6.4-rc1", + "breaks": "50d5c8d8e938e3c4c0d21db9fc7d64282dc7be20", + "cmt_msg": "xfs: verify buffer contents when we skip log replay", "cvss3": { "Attack Complexity": "Low", - "Attack Vector": "Physical", + "Attack Vector": "Local", "Availability": "High", "Confidentiality": "High", "Integrity": "High", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", - "score": 6.6 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 7.8 }, - "fixes": "b12fece4c64857e5fab4290bf01b2e0317a88456", - "last_affected_version": "6.1.8", + "fixes": "22ed903eee23a5b174e240f1cdfa9acf393a5210", + "last_affected_version": "6.3.6", "last_modified": "2023-12-06", - "nvd_text": "A memory corruption flaw was found in the Linux kernel\u2019s human interface device (HID) subsystem in how a user inserts a malicious USB device. This flaw allows a local user to crash or potentially escalate their privileges on the system.", + "nvd_text": "An out-of-bounds memory access flaw was found in the Linux kernel\u2019s XFS file system in how a user restores an XFS image after failure (with a dirty log journal). This flaw allows a local user to crash or potentially escalate their privileges on the system.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-1073", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-1073", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-1073", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-1073", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-1073", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-1073" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-2124", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-2124", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-2124", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-2124", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-2124", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-2124" } }, - "CVE-2023-1074": { - "affected_versions": "v2.6.12-rc2 to v6.2-rc6", - "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", - "cmt_msg": "sctp: fail if no bound addresses can be used for a given scope", + "CVE-2023-21255": { + "affected_versions": "v5.16-rc1 to v6.4-rc4", + "breaks": "32e9f56a96d8d0f23cb2aeb2a3cd18d40393e787", + "cmt_msg": "binder: fix UAF caused by faulty buffer cleanup", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", - "Confidentiality": "None", - "Integrity": "None", + "Confidentiality": "High", + "Integrity": "High", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", - "score": 5.5 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 7.8 }, - "fixes": "458e279f861d3f61796894cd158b780765a1569f", - "last_affected_version": "6.1.8", + "fixes": "bdc1c5fac982845a58d28690cdb56db8c88a530d", + "last_affected_version": "6.3.4", "last_modified": "2023-12-06", - "nvd_text": "A memory leak flaw was found in the Linux kernel's Stream Control Transmission Protocol. This issue may occur when a user starts a malicious networking service and someone connects to this service. This could allow a local user to starve resources, causing a denial of service.", + "nvd_text": "In multiple functions of binder.c, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.\n\n", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-1074", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-1074", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-1074", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-1074", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-1074", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-1074" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-21255", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-21255", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-21255", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-21255", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-21255", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-21255" } }, - "CVE-2023-1075": { - "affected_versions": "v4.20-rc1 to v6.2-rc7", - "breaks": "a42055e8d2c30d4decfc13ce943d09c7b9dad221", - "cmt_msg": "net/tls: tls_is_tx_ready() checked list_entry", + "CVE-2023-21264": { + "affected_versions": "v5.17-rc1 to v6.4-rc5", + "breaks": "e82edcc75c4e2389a3d7223c4ef1737bd9a07e5d", + "cmt_msg": "KVM: arm64: Prevent unconditional donation of unmapped regions from the host", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", - "Availability": "None", - "Confidentiality": "Low", - "Integrity": "None", - "Privileges Required": "Low", + "Availability": "High", + "Confidentiality": "High", + "Integrity": "High", + "Privileges Required": "High", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", - "score": 3.3 + "raw": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "score": 6.7 }, - "fixes": "ffe2a22562444720b05bdfeb999c03e810d84cbb", - "last_affected_version": "6.1.10", + "fixes": "09cce60bddd6461a93a5bf434265a47827d1bc6f", + "last_affected_version": "6.3.6", "last_modified": "2023-12-06", - "nvd_text": "A flaw was found in the Linux Kernel. The tls_is_tx_ready() incorrectly checks for list emptiness, potentially accessing a type confused entry to the list_head, leaking the last byte of the confused field that overlaps with rec->tx_ready.", + "nvd_text": "In multiple functions of mem_protect.c, there is a possible way to access hypervisor memory due to a memory access check in the wrong place. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.\n\n", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-1075", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-1075", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-1075", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-1075", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-1075", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-1075" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-21264", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-21264", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-21264", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-21264", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-21264", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-21264" } }, - "CVE-2023-1076": { - "affected_versions": "v4.10-rc1 to v6.3-rc1", - "breaks": "86741ec25462e4c8cdce6df2f41ead05568c7d5e", - "cmt_msg": "tun: tun_chr_open(): correctly initialize socket uid", + "CVE-2023-21400": { + "affected_versions": "v5.1-rc1 to unk", + "breaks": "2b188cc1bb857a9d4701ae59aa7768b5124e262e", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", - "Availability": "None", - "Confidentiality": "None", + "Availability": "High", + "Confidentiality": "High", "Integrity": "High", - "Privileges Required": "Low", + "Privileges Required": "High", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", - "score": 5.5 + "raw": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "score": 6.7 }, - "fixes": "a096ccca6e503a5c575717ff8a36ace27510ab0a", - "last_affected_version": "6.2.2", + "fixes": "fb348857e7b67eefe365052f1423427b66dedbf3", "last_modified": "2023-12-06", - "nvd_text": "A flaw was found in the Linux Kernel. The tun/tap sockets have their socket UID hardcoded to 0 due to a type confusion in their initialization function. While it will be often correct, as tuntap devices require CAP_NET_ADMIN, it may not always be the case, e.g., a non-root user only having that capability. This would make tun/tap sockets being incorrectly treated in filtering/routing decisions, possibly bypassing network filters.", + "nvd_text": "In multiple functions of io_uring.c, there is a possible kernel memory corruption due to improper locking. This could lead to local escalation of privilege in the kernel with System execution privileges needed. User interaction is not needed for exploitation.\n\n", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-1076", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-1076", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-1076", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-1076", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-1076", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-1076" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-21400", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-21400", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-21400", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-21400", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-21400", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-21400" } }, - "CVE-2023-1077": { - "affected_versions": "v2.6.25-rc1 to v6.3-rc1", - "breaks": "326587b840785c60f5dc18557235a23bafefd620", - "cmt_msg": "sched/rt: pick_next_rt_entity(): check list_entry", + "CVE-2023-2156": { + "affected_versions": "v5.7-rc1 to v6.3", + "breaks": "8610c7c6e3bd647ff98d21c8bc0580e77bc2f8b3", + "cmt_msg": "net: rpl: fix rpl header size calculation", "cvss3": { - "Attack Complexity": "High", - "Attack Vector": "Local", + "Attack Complexity": "Low", + "Attack Vector": "Network", "Availability": "High", - "Confidentiality": "High", - "Integrity": "High", - "Privileges Required": "Low", + "Confidentiality": "None", + "Integrity": "None", + "Privileges Required": "None", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", - "score": 7.0 + "raw": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "score": 7.5 }, - "fixes": "7c4a5b89a0b5a57a64b601775b296abf77a9fe97", - "last_affected_version": "6.2.2", + "fixes": "4e006c7a6dac0ead4c1bf606000aa90a372fc253", + "last_affected_version": "6.2", "last_modified": "2023-12-06", - "nvd_text": "In the Linux kernel, pick_next_rt_entity() may return a type confused entry, not detected by the BUG_ON condition, as the confused entry will not be NULL, but list_head.The buggy error condition would lead to a type confused entry with the list head,which would then be used as a type confused sched_rt_entity,causing memory corruption.", + "nvd_text": "A flaw was found in the networking subsystem of the Linux kernel within the handling of the RPL protocol. This issue results from the lack of proper handling of user-supplied data, which can lead to an assertion failure. This may allow an unauthenticated remote attacker to create a denial of service condition on the system.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-1077", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-1077", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-1077", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-1077", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-1077", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-1077" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-2156", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-2156", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-2156", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-2156", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-2156", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-2156" } }, - "CVE-2023-1078": { - "affected_versions": "v4.17-rc1 to v6.2-rc8", - "breaks": "9426bbc6de99b8649d897b94e8f5916b58195643", - "cmt_msg": "rds: rds_rm_zerocopy_callback() use list_first_entry()", + "CVE-2023-2162": { + "affected_versions": "v2.6.12-rc2 to v6.2-rc6", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", - "Availability": "High", + "Availability": "None", "Confidentiality": "High", - "Integrity": "High", + "Integrity": "None", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", - "score": 7.8 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "score": 5.5 }, - "fixes": "f753a68980cf4b59a80fe677619da2b1804f526d", - "last_affected_version": "6.1.11", + "fixes": "f484a794e4ee2a9ce61f52a78e810ac45f3fe3b3", + "last_affected_version": "6.1.10", "last_modified": "2023-12-06", - "nvd_text": "A flaw was found in the Linux Kernel in RDS (Reliable Datagram Sockets) protocol. The rds_rm_zerocopy_callback() uses list_entry() on the head of a list causing a type confusion. Local user can trigger this with rds_message_put(). Type confusion leads to `struct rds_msg_zcopy_info *info` actually points to something else that is potentially controlled by local user. It is known how to trigger this, which causes an out of bounds access, and a lock corruption.", + "nvd_text": "A use-after-free vulnerability was found in iscsi_sw_tcp_session_create in drivers/scsi/iscsi_tcp.c in SCSI sub-component in the Linux Kernel. In this flaw an attacker could leak kernel internal information.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-1078", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-1078", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-1078", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-1078", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-1078", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-1078" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-2162", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-2162", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-2162", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-2162", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-2162", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-2162" } }, - "CVE-2023-1079": { - "affected_versions": "v4.12-rc1 to v6.3-rc1", - "breaks": "af22a610bc38508d5ea760507d31be6b6983dfa8", - "cmt_msg": "HID: asus: use spinlock to safely schedule workers", + "CVE-2023-2163": { + "affected_versions": "v5.3-rc1 to v6.3", + "breaks": "b5dc0163d8fd78e64a7e21f309cf932fda34353e", + "cmt_msg": "bpf: Fix incorrect verifier pruning due to missing register precision taints", "cvss3": { "Attack Complexity": "Low", - "Attack Vector": "Physical", + "Attack Vector": "Local", "Availability": "High", "Confidentiality": "High", "Integrity": "High", - "Privileges Required": "None", - "Scope": "Unchanged", + "Privileges Required": "Low", + "Scope": "Changed", "User Interaction": "None", - "raw": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", - "score": 6.8 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "score": 8.8 }, - "fixes": "4ab3a086d10eeec1424f2e8a968827a6336203df", - "last_affected_version": "6.2.2", + "fixes": "71b547f561247897a0a14f3082730156c0533fed", + "last_affected_version": "6.2", "last_modified": "2023-12-06", - "nvd_text": "A flaw was found in the Linux kernel. A use-after-free may be triggered in asus_kbd_backlight_set when plugging/disconnecting in a malicious USB device, which advertises itself as an Asus device. Similarly to the previous known CVE-2023-25012, but in asus devices, the work_struct may be scheduled by the LED controller while the device is disconnecting, triggering a use-after-free on the struct asus_kbd_leds *led structure. A malicious USB device may exploit the issue to cause memory corruption with controlled data.", + "nvd_text": "Incorrect verifier pruning\u00a0in BPF in Linux Kernel\u00a0>=5.4\u00a0leads to unsafe\ncode paths being incorrectly marked as safe, resulting in\u00a0arbitrary read/write in\nkernel memory, lateral privilege escalation, and container escape.\n", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-1079", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-1079", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-1079", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-1079", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-1079", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-1079" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-2163", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-2163", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-2163", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-2163", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-2163", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-2163" } }, - "CVE-2023-1095": { - "affected_versions": "v3.16-rc1 to v6.0-rc1", - "breaks": "55dd6f93076bb82aa8911191125418dcfcbf2c9b", - "cmt_msg": "netfilter: nf_tables: fix null deref due to zeroed list head", + "CVE-2023-2166": { + "affected_versions": "v5.12-rc1-dontuse to v6.1", + "breaks": "4e096a18867a5a989b510f6999d9c6b6622e8f7b", + "cmt_msg": "can: af_can: fix NULL pointer dereference in can_rcv_filter", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", @@ -82905,23 +89257,23 @@ "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "score": 5.5 }, - "fixes": "580077855a40741cf511766129702d97ff02f4d9", - "last_affected_version": "5.19.1", - "last_modified": "2023-12-27", - "nvd_text": "In nf_tables_updtable, if nf_tables_table_enable returns an error, nft_trans_destroy is called to free the transaction object. nft_trans_destroy() calls list_del(), but the transaction was never placed on a list -- the list head is all zeroes, this results in a NULL pointer dereference.", + "fixes": "0acc442309a0a1b01bcdaa135e56e6398a49439c", + "last_affected_version": "6.0", + "last_modified": "2023-12-06", + "nvd_text": "A null pointer dereference issue was found in can protocol in net/can/af_can.c in the Linux before Linux. ml_priv may not be initialized in the receive path of CAN frames. A local user could use this flaw to crash the system or potentially cause a denial of service.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-1095", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-1095", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-1095", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-1095", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-1095", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-1095" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-2166", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-2166", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-2166", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-2166", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-2166", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-2166" } }, - "CVE-2023-1118": { - "affected_versions": "v2.6.36-rc1 to v6.3-rc1", - "breaks": "9ea53b74df9c4681f5bb2da6b2e10e37d87ea6d6", - "cmt_msg": "media: rc: Fix use-after-free bugs caused by ene_tx_irqsim()", + "CVE-2023-2176": { + "affected_versions": "v2.6.12-rc2 to v6.3-rc1", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "RDMA/core: Refactor rdma_bind_addr", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", @@ -82934,167 +89286,215 @@ "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "score": 7.8 }, - "fixes": "29b0589a865b6f66d141d79b2dd1373e4e50fe17", - "last_affected_version": "6.2.2", - "last_modified": "2023-12-06", - "nvd_text": "A flaw use after free in the Linux kernel integrated infrared receiver/transceiver driver was found in the way user detaching rc device. A local user could use this flaw to crash the system or potentially escalate their privileges on the system.", + "fixes": "8d037973d48c026224ab285e6a06985ccac6f7bf", + "last_affected_version": "6.1.80", + "last_modified": "2024-04-06", + "nvd_text": "A vulnerability was found in compare_netdev_and_ip in drivers/infiniband/core/cma.c in RDMA in the Linux Kernel. The improper cleanup results in out-of-boundary read, where a local user can utilize this problem to crash the system or escalation of privilege.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-1118", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-1118", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-1118", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-1118", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-1118", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-1118" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-2176", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-2176", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-2176", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-2176", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-2176", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-2176" } }, - "CVE-2023-1192": { - "affected_versions": "v5.15-rc1 to v6.4-rc1", - "breaks": "a848c4f15ab6d5d405dbee7de5da71839b2bf35e", - "cmt_msg": "fs/ntfs3: Validate MFT flags before replaying logs", + "CVE-2023-2177": { + "affected_versions": "v4.15-rc1 to v5.19", + "breaks": "5bbbbe32a43199c2b9ea5ea66fab6241c64beb51", + "cmt_msg": "sctp: leave the err path free in sctp_stream_init to sctp_stream_free", "cvss3": { "Attack Complexity": "Low", - "Attack Vector": "Network", + "Attack Vector": "Local", "Availability": "High", "Confidentiality": "None", "Integrity": "None", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", - "score": 6.5 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "score": 5.5 }, - "fixes": "98bea253aa28ad8be2ce565a9ca21beb4a9419e5", - "last_affected_version": "6.3.3", + "fixes": "181d8d2066c000ba0a0e6940a7ad80f1a0e68e9d", + "last_affected_version": "5.18", + "last_modified": "2024-02-02", + "nvd_text": "A null pointer dereference issue was found in the sctp network protocol in net/sctp/stream_sched.c in Linux Kernel. If stream_in allocation is failed, stream_out is freed which would further be accessed. A local user could use this flaw to crash the system or potentially cause a denial of service.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-2177", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-2177", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-2177", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-2177", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-2177", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-2177" + } + }, + "CVE-2023-2194": { + "affected_versions": "v4.2-rc1 to v6.3-rc4", + "breaks": "f6505fbabc426b9e293da5bb702ace2eb1ccf87d", + "cmt_msg": "i2c: xgene-slimpro: Fix out-of-bounds bug in xgene_slimpro_i2c_xfer()", + "cvss3": { + "Attack Complexity": "Low", + "Attack Vector": "Local", + "Availability": "High", + "Confidentiality": "High", + "Integrity": "High", + "Privileges Required": "High", + "Scope": "Unchanged", + "User Interaction": "None", + "raw": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "score": 6.7 + }, + "fixes": "92fbb6d1296f81f41f65effd7f5f8c0f74943d15", + "last_affected_version": "6.2.8", "last_modified": "2023-12-06", - "nvd_text": "A use-after-free flaw was found in smb2_is_status_io_timeout() in CIFS in the Linux Kernel. After CIFS transfers response data to a system call, there are still local variable points to the memory region, and if the system call frees it faster than CIFS uses it, CIFS will access a free memory region, leading to a denial of service.", + "nvd_text": "An out-of-bounds write vulnerability was found in the Linux kernel's SLIMpro I2C device driver. The userspace \"data->block[0]\" variable was not capped to a number between 0-255 and was used as the size of a memcpy, possibly writing beyond the end of dma_buffer. This flaw could allow a local privileged user to crash the system or potentially achieve code execution.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-1192", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-1192", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-1192", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-1192", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-1192", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-1192" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-2194", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-2194", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-2194", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-2194", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-2194", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-2194" } }, - "CVE-2023-1193": { - "affected_versions": "v5.15-rc1 to v6.3-rc6", - "breaks": "a848c4f15ab6d5d405dbee7de5da71839b2bf35e", - "cmt_msg": "ksmbd: delete asynchronous work from list", + "CVE-2023-2235": { + "affected_versions": "v5.13-rc1 to v6.3-rc3", + "breaks": "2e498d0a74e5b88a6689ae1b811f247f91ff188e", + "cmt_msg": "perf: Fix check before add_event_to_groups() in perf_group_detach()", "cvss3": { "Attack Complexity": "Low", - "Attack Vector": "Network", + "Attack Vector": "Local", "Availability": "High", - "Confidentiality": "None", - "Integrity": "None", + "Confidentiality": "High", + "Integrity": "High", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", - "score": 6.5 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 7.8 }, - "fixes": "3a9b557f44ea8f216aab515a7db20e23f0eb51b9", - "last_affected_version": "6.1.70", - "last_modified": "2024-01-12", - "nvd_text": "A use-after-free flaw was found in setup_async_work in the KSMBD implementation of the in-kernel samba server and CIFS in the Linux kernel. This issue could allow an attacker to crash the system by accessing freed work.", + "fixes": "fd0815f632c24878e325821943edccc7fde947a2", + "last_affected_version": "6.2.7", + "last_modified": "2023-12-06", + "nvd_text": "A use-after-free vulnerability in the Linux Kernel Performance Events system can be exploited to achieve local privilege escalation.\n\nThe perf_group_detach function did not check the event's siblings' attach_state before calling add_event_to_groups(), but\u00a0remove_on_exec made it possible to call list_del_event() on before detaching from their group, making it possible to use a dangling pointer causing a use-after-free vulnerability.\n\nWe recommend upgrading past commit fd0815f632c24878e325821943edccc7fde947a2.\n\n", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-1193", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-1193", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-1193", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-1193", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-1193", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-1193" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-2235", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-2235", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-2235", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-2235", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-2235", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-2235" } }, - "CVE-2023-1194": { - "affected_versions": "v5.15-rc1 to v6.4-rc6", - "breaks": "a848c4f15ab6d5d405dbee7de5da71839b2bf35e", - "cmt_msg": "ksmbd: fix out-of-bound read in parse_lease_state()", + "CVE-2023-2236": { + "affected_versions": "v5.19-rc1 to v6.1-rc7", + "breaks": "61c1b44a21d70d4783db02198fbf68b132f4953c", + "cmt_msg": "io_uring/filetable: fix file reference underflow", "cvss3": { "Attack Complexity": "Low", - "Attack Vector": "Network", + "Attack Vector": "Local", "Availability": "High", "Confidentiality": "High", - "Integrity": "None", + "Integrity": "High", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", - "score": 8.1 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 7.8 }, - "fixes": "fc6c6a3c324c1b3e93a03d0cfa3749c781f23de0", - "last_affected_version": "6.3.7", - "last_modified": "2023-12-27", - "nvd_text": "An out-of-bounds (OOB) memory read flaw was found in parse_lease_state in the KSMBD implementation of the in-kernel samba server and CIFS in the Linux kernel. When an attacker sends the CREATE command with a malformed payload to KSMBD, due to a missing check of `NameOffset` in the `parse_lease_state()` function, the `create_context` object can access invalid memory.", + "fixes": "9d94c04c0db024922e886c9fd429659f22f48ea4", + "last_affected_version": "6.0.10", + "last_modified": "2023-12-06", + "nvd_text": "A use-after-free vulnerability in the Linux Kernel io_uring subsystem can be exploited to achieve local privilege escalation.\n\nBoth\u00a0io_install_fixed_file\u00a0and its callers call fput in a file in case of an error, causing a reference underflow which leads to a use-after-free vulnerability.\n\nWe recommend upgrading past commit 9d94c04c0db024922e886c9fd429659f22f48ea4.\n\n", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-1194", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-1194", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-1194", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-1194", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-1194", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-1194" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-2236", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-2236", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-2236", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-2236", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-2236", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-2236" } }, - "CVE-2023-1195": { - "affected_versions": "v5.16-rc1 to v6.1-rc3", - "breaks": "7be3248f313930ff3d3436d4e9ddbe9fccc1f541", - "cmt_msg": "cifs: fix use-after-free caused by invalid pointer `hostname`", + "CVE-2023-2248": { + "affected_versions": "v3.7-rc5 to v6.3", + "breaks": "3015f3d2a3cd9614294025849d3ed89fd2f3a7f5", + "cmt_msg": "net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg", + "fixes": "3037933448f60f9acb705997eae62013ecb81e0d", + "last_affected_version": "6.2", + "last_modified": "2023-12-06", + "nvd_text": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it was the duplicate of CVE-2023-31436.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-2248", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-2248", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-2248", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-2248", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-2248", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-2248" + }, + "rejected": true + }, + "CVE-2023-2269": { + "affected_versions": "v2.6.33-rc1 to v6.4-rc1", + "breaks": "1d0f3ce83200edc5d43723c77c62b09ad6560294", + "cmt_msg": "dm ioctl: fix nested locking in table_clear() to remove deadlock concern", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", "Confidentiality": "None", "Integrity": "None", - "Privileges Required": "Low", + "Privileges Required": "High", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", - "score": 5.5 + "raw": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "score": 4.4 }, - "fixes": "153695d36ead0ccc4d0256953c751cabf673e621", + "fixes": "3d32aaa7e66d5c1479a3c31d6c2c5d45dd0d3b89", + "last_affected_version": "6.3.1", "last_modified": "2023-12-06", - "nvd_text": "A use-after-free flaw was found in reconn_set_ipaddr_from_hostname in fs/cifs/connect.c in the Linux kernel. The issue occurs when it forgets to set the free pointer server->hostname to NULL, leading to an invalid pointer request.", + "nvd_text": "A denial of service problem was found, due to a possible recursive locking scenario, resulting in a deadlock in table_clear in drivers/md/dm-ioctl.c in the Linux Kernel Device Mapper-Multipathing sub-component.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-1195", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-1195", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-1195", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-1195", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-1195", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-1195" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-2269", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-2269", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-2269", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-2269", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-2269", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-2269" } }, - "CVE-2023-1206": { - "affected_versions": "v2.6.12-rc2 to v6.5-rc4", + "CVE-2023-22995": { + "affected_versions": "v2.6.12-rc2 to v5.17-rc1", "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", - "cmt_msg": "tcp: Reduce chance of collisions in inet6_hashfn().", + "cmt_msg": "usb: dwc3: dwc3-qcom: Add missing platform_device_put() in dwc3_qcom_acpi_register_core", "cvss3": { "Attack Complexity": "Low", - "Attack Vector": "Adjacent", + "Attack Vector": "Local", "Availability": "High", - "Confidentiality": "None", - "Integrity": "None", + "Confidentiality": "High", + "Integrity": "High", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", - "score": 5.7 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 7.8 }, - "fixes": "d11b0df7ddf1831f3e170972f43186dad520bfcc", - "last_affected_version": "6.4.7", + "cwe": "Unspecified", + "fixes": "fa0ef93868a6062babe1144df2807a8b1d4924d2", "last_modified": "2023-12-06", - "nvd_text": "A hash collision flaw was found in the IPv6 connection lookup table in the Linux kernel\u2019s IPv6 functionality when a user makes a new kind of SYN flood attack. A user located in the local network or with a high bandwidth connection can increase the CPU usage of the server that accepts IPV6 connections up to 95%.", + "nvd_text": "In the Linux kernel before 5.17, an error path in dwc3_qcom_acpi_register_core in drivers/usb/dwc3/dwc3-qcom.c lacks certain platform_device_put and kfree calls.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-1206", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-1206", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-1206", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-1206", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-1206", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-1206" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-22995", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-22995", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-22995", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-22995", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-22995", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-22995" } }, - "CVE-2023-1249": { - "affected_versions": "v3.7-rc1 to v5.18-rc1", - "breaks": "2aa362c49c314a98fb9aebbd7760a461667bac05", - "cmt_msg": "coredump: Use the vma snapshot in fill_files_note", + "CVE-2023-22996": { + "affected_versions": "v5.16-rc1 to v5.18-rc1", + "breaks": "8c75d585b931ac874fbe4ee5a8f1811d20c2817f", + "cmt_msg": "soc: qcom: aoss: Fix missing put_device call in qmp_get", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", @@ -83107,141 +89507,140 @@ "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "score": 5.5 }, - "fixes": "390031c942116d4733310f0684beb8db19885fe6", + "fixes": "4b41a9d0fe3db5f91078a380f62f0572c3ecf2dd", "last_affected_version": "5.17.1", "last_modified": "2023-12-06", - "nvd_text": "A use-after-free flaw was found in the Linux kernel\u2019s core dump subsystem. This flaw allows a local user to crash the system. Only if patch 390031c94211 (\"coredump: Use the vma snapshot in fill_files_note\") not applied yet, then kernel could be affected.", + "nvd_text": "In the Linux kernel before 5.17.2, drivers/soc/qcom/qcom_aoss.c does not release an of_find_device_by_node reference after use, e.g., with put_device.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-1249", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-1249", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-1249", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-1249", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-1249", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-1249" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-22996", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-22996", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-22996", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-22996", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-22996", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-22996" } }, - "CVE-2023-1252": { - "affected_versions": "v5.6-rc1 to v5.16-rc1", - "breaks": "2406a307ac7ddfd7effeeaff6947149ec6a95b4e", - "cmt_msg": "ovl: fix use after free in struct ovl_aio_req", + "CVE-2023-22997": { + "affected_versions": "v5.17-rc1 to v6.2-rc1", + "breaks": "b1ae6dc41eaaa98bb75671e0f3665bfda248c3e7", + "cmt_msg": "module: Fix NULL vs IS_ERR checking for module_get_next_page", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", - "Confidentiality": "High", - "Integrity": "High", + "Confidentiality": "None", + "Integrity": "None", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", - "score": 7.8 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "score": 5.5 }, - "fixes": "9a254403760041528bc8f69fe2f5e1ef86950991", - "last_affected_version": "5.15.2", + "fixes": "45af1d7aae7d5520d2858f8517a1342646f015db", + "last_affected_version": "6.1.1", "last_modified": "2023-12-06", - "nvd_text": "A use-after-free flaw was found in the Linux kernel\u2019s Ext4 File System in how a user triggers several file operations simultaneously with the overlay FS usage. This flaw allows a local user to crash or potentially escalate their privileges on the system. Only if patch 9a2544037600 (\"ovl: fix use after free in struct ovl_aio_req\") not applied yet, the kernel could be affected.", + "nvd_text": "In the Linux kernel before 6.1.2, kernel/module/decompress.c misinterprets the module_get_next_page return value (expects it to be NULL in the error case, whereas it is actually an error pointer).", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-1252", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-1252", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-1252", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-1252", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-1252", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-1252" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-22997", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-22997", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-22997", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-22997", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-22997", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-22997" } }, - "CVE-2023-1281": { - "affected_versions": "v4.14-rc1 to v6.2", - "breaks": "9b0d4446b56904b59ae3809913b0ac760fa941a6", - "cmt_msg": "net/sched: tcindex: update imperfect hash filters respecting rcu", + "CVE-2023-22998": { + "affected_versions": "v5.7-rc1 to v6.0-rc1", + "breaks": "2f2aa13724d56829d910b2fa8e80c502d388f106", + "cmt_msg": "drm/virtio: Fix NULL vs IS_ERR checking in virtio_gpu_object_shmem_init", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", - "Confidentiality": "High", - "Integrity": "High", + "Confidentiality": "None", + "Integrity": "None", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", - "score": 7.8 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "score": 5.5 }, - "fixes": "ee059170b1f7e94e55fa6cadee544e176a6e59c2", - "last_affected_version": "6.1", + "fixes": "c24968734abfed81c8f93dc5f44a7b7a9aecadfa", + "last_affected_version": "5.19.1", "last_modified": "2023-12-06", - "nvd_text": "Use After Free vulnerability in Linux kernel traffic control index filter (tcindex) allows Privilege Escalation.\u00a0The imperfect hash area can be updated while packets are traversing, which will cause a use-after-free when 'tcf_exts_exec()' is called with the destroyed tcf_ext.\u00a0A local attacker user can use this vulnerability to elevate its privileges to root.\nThis issue affects Linux Kernel: from 4.14 before git commit ee059170b1f7e94e55fa6cadee544e176a6e59c2.\n\n", + "nvd_text": "In the Linux kernel before 6.0.3, drivers/gpu/drm/virtio/virtgpu_object.c misinterprets the drm_gem_shmem_get_sg_table return value (expects it to be NULL in the error case, whereas it is actually an error pointer).", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-1281", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-1281", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-1281", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-1281", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-1281", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-1281" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-22998", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-22998", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-22998", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-22998", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-22998", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-22998" } }, - "CVE-2023-1295": { - "affected_versions": "v5.6-rc1 to v5.12-rc1-dontuse", - "breaks": "b5dba59e0cf7e2cc4d3b3b1ac5fe81ddf21959eb", - "cmt_msg": "io_uring: get rid of intermediate IORING_OP_CLOSE stage", + "CVE-2023-22999": { + "affected_versions": "v5.12-rc1-dontuse to v5.17-rc1", + "breaks": "c25c210f590e7a37eecd865d84f97d1f40e39786", + "cmt_msg": "usb: dwc3: qcom: Fix NULL vs IS_ERR checking in dwc3_qcom_probe", "cvss3": { - "Attack Complexity": "High", + "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", - "Confidentiality": "High", - "Integrity": "High", + "Confidentiality": "None", + "Integrity": "None", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", - "score": 7.0 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "score": 5.5 }, - "fixes": "9eac1904d3364254d622bf2c771c4f85cd435fc2", - "last_affected_version": "5.11.5", + "fixes": "b52fe2dbb3e655eb1483000adfab68a219549e13", + "last_affected_version": "5.16.2", "last_modified": "2023-12-06", - "nvd_text": "A time-of-check to time-of-use issue exists in io_uring subsystem's IORING_OP_CLOSE operation in the Linux kernel's versions 5.6 - 5.11 (inclusive), which allows a local user to elevate their privileges to root. Introduced in b5dba59e0cf7e2cc4d3b3b1ac5fe81ddf21959eb, patched in 9eac1904d3364254d622bf2c771c4f85cd435fc2, backported to stable in 788d0824269bef539fe31a785b1517882eafed93.", + "nvd_text": "In the Linux kernel before 5.16.3, drivers/usb/dwc3/dwc3-qcom.c misinterprets the dwc3_qcom_create_urs_usb_platdev return value (expects it to be NULL in the error case, whereas it is actually an error pointer).", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-1295", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-1295", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-1295", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-1295", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-1295", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-1295" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-22999", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-22999", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-22999", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-22999", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-22999", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-22999" } }, - "CVE-2023-1380": { - "affected_versions": "v3.2-rc1 to v6.4-rc1", - "breaks": "5b435de0d786869c95d1962121af0d7df2542009", - "cmt_msg": "wifi: brcmfmac: slab-out-of-bounds read in brcmf_get_assoc_ies()", + "CVE-2023-23000": { + "affected_versions": "v4.14-rc6 to v5.17-rc1", + "breaks": "1df79cb3bae754e4a42240f9851ed82549a44f1a", + "cmt_msg": "phy: tegra: xusb: Fix return value of tegra_xusb_find_port_node function", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", - "Confidentiality": "High", + "Confidentiality": "None", "Integrity": "None", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", - "score": 7.1 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "score": 5.5 }, - "fixes": "0da40e018fd034d87c9460123fa7f897b69fdee7", - "last_affected_version": "6.3.0", + "fixes": "045a31b95509c8f25f5f04ec5e0dec5cd09f2c5f", "last_modified": "2023-12-06", - "nvd_text": "A slab-out-of-bound read problem was found in brcmf_get_assoc_ies in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux Kernel. This issue could occur when assoc_info->req_len data is bigger than the size of the buffer, defined as WL_EXTRA_BUF_MAX, leading to a denial of service.", + "nvd_text": "In the Linux kernel before 5.17, drivers/phy/tegra/xusb.c mishandles the tegra_xusb_find_port_node return value. Callers expect NULL in the error case, but an error pointer is used.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-1380", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-1380", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-1380", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-1380", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-1380", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-1380" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-23000", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-23000", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-23000", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-23000", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-23000", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-23000" } }, - "CVE-2023-1382": { - "affected_versions": "v3.11-rc1 to v6.1-rc7", - "breaks": "c5fa7b3cf3cb22e4ac60485fc2dc187fe012910f", - "cmt_msg": "tipc: set con sock in tipc_conn_alloc", + "CVE-2023-23001": { + "affected_versions": "v5.11-rc1 to v5.17-rc1", + "breaks": "cf137b3ea49a04e0c843b12674afa4b1d23e827f", + "cmt_msg": "scsi: ufs: ufs-mediatek: Fix error checking in ufs_mtk_init_va09_pwr_ctrl()", "cvss3": { - "Attack Complexity": "High", + "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", "Confidentiality": "None", @@ -83249,114 +89648,113 @@ "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", - "score": 4.7 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "score": 5.5 }, - "fixes": "0e5d56c64afcd6fd2d132ea972605b66f8a7d3c4", - "last_affected_version": "6.0.10", - "last_modified": "2023-12-06", - "nvd_text": "A data race flaw was found in the Linux kernel, between where con is allocated and con->sock is set. This issue leads to a NULL pointer dereference when accessing con->sock->sk in net/tipc/topsrv.c in the tipc protocol in the Linux kernel.", - "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-1382", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-1382", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-1382", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-1382", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-1382", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-1382" + "fixes": "3ba880a12df5aa4488c18281701b5b1bc3d4531a", + "last_affected_version": "5.16.2", + "last_modified": "2023-12-06", + "nvd_text": "In the Linux kernel before 5.16.3, drivers/scsi/ufs/ufs-mediatek.c misinterprets the regulator_get return value (expects it to be NULL in the error case, whereas it is actually an error pointer).", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-23001", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-23001", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-23001", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-23001", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-23001", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-23001" } }, - "CVE-2023-1390": { - "affected_versions": "v4.3-rc1 to v5.11-rc4", - "breaks": "af9b028e270fda6fb812d70d17d902297df1ceb5", - "cmt_msg": "tipc: fix NULL deref in tipc_link_xmit()", + "CVE-2023-23002": { + "affected_versions": "v5.7-rc1 to v5.17-rc1", + "breaks": "77131dfec6af114efd32610b4a6bbecd934e37d5", + "cmt_msg": "Bluetooth: hci_qca: Fix NULL vs IS_ERR_OR_NULL check in qca_serdev_probe", "cvss3": { "Attack Complexity": "Low", - "Attack Vector": "Network", + "Attack Vector": "Local", "Availability": "High", "Confidentiality": "None", "Integrity": "None", - "Privileges Required": "None", + "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", - "score": 7.5 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "score": 5.5 }, - "cwe": "Unspecified", - "fixes": "b77413446408fdd256599daf00d5be72b5f3e7c6", - "last_affected_version": "5.10.9", + "fixes": "6845667146a28c09b5dfc401c1ad112374087944", + "last_affected_version": "5.16.2", "last_modified": "2023-12-06", - "nvd_text": "A remote denial of service vulnerability was found in the Linux kernel\u2019s TIPC kernel module. The while loop in tipc_link_xmit() hits an unknown state while attempting to parse SKBs, which are not in the queue. Sending two small UDP packets to a system with a UDP bearer results in the CPU utilization for the system to instantly spike to 100%, causing a denial of service condition.", + "nvd_text": "In the Linux kernel before 5.16.3, drivers/bluetooth/hci_qca.c misinterprets the devm_gpiod_get_index_optional return value (expects it to be NULL in the error case, whereas it is actually an error pointer).", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-1390", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-1390", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-1390", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-1390", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-1390", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-1390" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-23002", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-23002", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-23002", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-23002", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-23002", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-23002" } }, - "CVE-2023-1476": { - "affected_versions": "unk to unk", - "breaks": "", + "CVE-2023-23003": { + "affected_versions": "v5.16-rc1 to v5.16-rc6", + "breaks": "cb94a02e7494c001fa8b5a4c5e16693fafd98530", "cvss3": { "Attack Complexity": "High", "Attack Vector": "Local", "Availability": "High", - "Confidentiality": "High", - "Integrity": "High", - "Privileges Required": "Low", + "Confidentiality": "None", + "Integrity": "None", + "Privileges Required": "High", "Scope": "Unchanged", - "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", - "score": 7.0 + "User Interaction": "Required", + "raw": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H", + "score": 4.0 }, - "fixes": "", - "last_modified": "2024-01-15", - "nvd_text": "A use-after-free flaw was found in the Linux kernel\u2019s mm/mremap memory address space accounting source code. This issue occurs due to a race condition between rmap walk and mremap, allowing a local user to crash the system or potentially escalate their privileges on the system.", + "fixes": "0a515a06c5ebfa46fee3ac519e418f801e718da4", + "last_modified": "2023-12-06", + "nvd_text": "In the Linux kernel before 5.16, tools/perf/util/expr.c lacks a check for the hashmap__new return value.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-1476", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-1476", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-1476", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-1476", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-1476", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-1476" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-23003", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-23003", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-23003", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-23003", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-23003", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-23003" } }, - "CVE-2023-1513": { - "affected_versions": "v2.6.12-rc2 to v6.2", - "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", - "cmt_msg": "kvm: initialize all of the kvm_debugregs structure before sending it to userspace", + "CVE-2023-23004": { + "affected_versions": "v4.20-rc1 to v5.19-rc1", + "breaks": "1f23a56a46b81de50eb8b898f06296ca06720a99", + "cmt_msg": "malidp: Fix NULL vs IS_ERR() checking", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", - "Availability": "None", - "Confidentiality": "Low", + "Availability": "High", + "Confidentiality": "None", "Integrity": "None", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", - "score": 3.3 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "score": 5.5 }, - "fixes": "2c10b61421a28e95a46ab489fd56c0f442ff6952", - "last_affected_version": "6.1", + "fixes": "15342f930ebebcfe36f2415049736a77d7d2e045", + "last_affected_version": "5.15.99", "last_modified": "2023-12-06", - "nvd_text": "A flaw was found in KVM. When calling the KVM_GET_DEBUGREGS ioctl, on 32-bit systems, there might be some uninitialized portions of the kvm_debugregs structure that could be copied to userspace, causing an information leak.", + "nvd_text": "In the Linux kernel before 5.19, drivers/gpu/drm/arm/malidp_planes.c misinterprets the get_sg_table return value (expects it to be NULL in the error case, whereas it is actually an error pointer).", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-1513", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-1513", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-1513", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-1513", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-1513", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-1513" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-23004", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-23004", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-23004", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-23004", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-23004", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-23004" } }, - "CVE-2023-1582": { - "affected_versions": "v4.5-rc1 to v5.17-rc4", - "breaks": "e9b61f19858a5d6c42ce2298cf138279375d0d9b", - "cmt_msg": "fs/proc: task_mmu.c: don't read mapcount for migration entry", + "CVE-2023-23005": { + "affected_versions": "v6.1-rc1 to v6.2-rc1", + "breaks": "7b88bda3761b95856cf97822efe8281c8100067b", + "cmt_msg": "mm/demotion: fix NULL vs IS_ERR checking in memory_tier_init", "cvss3": { - "Attack Complexity": "High", + "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", "Confidentiality": "None", @@ -83364,26 +89762,25 @@ "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", - "score": 4.7 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "score": 5.5 }, - "fixes": "24d7275ce2791829953ed4e72f68277ceb2571c6", - "last_affected_version": "5.16.9", + "fixes": "4a625ceee8a0ab0273534cb6b432ce6b331db5ee", "last_modified": "2023-12-06", - "nvd_text": "A race problem was found in fs/proc/task_mmu.c in the memory management sub-component in the Linux kernel. This issue may allow a local attacker with user privilege to cause a denial of service.", + "nvd_text": "In the Linux kernel before 6.2, mm/memory-tiers.c misinterprets the alloc_memory_type return value (expects it to be NULL in the error case, whereas it is actually an error pointer). NOTE: this is disputed by third parties because there are no realistic cases in which a user can cause the alloc_memory_type error case to be reached.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-1582", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-1582", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-1582", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-1582", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-1582", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-1582" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-23005", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-23005", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-23005", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-23005", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-23005", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-23005" } }, - "CVE-2023-1583": { - "affected_versions": "v5.19-rc1 to v6.3-rc4", - "breaks": "4278a0deb1f6cac40ded3362fe2a9827d7efee3d", - "cmt_msg": "io_uring/rsrc: fix null-ptr-deref in io_file_bitmap_get()", + "CVE-2023-23006": { + "affected_versions": "v5.4-rc1 to v5.16-rc8", + "breaks": "4ec9e7b02697eca8dc9853ea559c18029c38da36", + "cmt_msg": "net/mlx5: DR, Fix NULL vs IS_ERR checking in dr_domain_init_resources", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", @@ -83396,110 +89793,110 @@ "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "score": 5.5 }, - "fixes": "02a4d923e4400a36d340ea12d8058f69ebf3a383", - "last_affected_version": "6.2.8", + "fixes": "6b8b42585886c59a008015083282aae434349094", + "last_affected_version": "5.15.12", "last_modified": "2023-12-06", - "nvd_text": "A NULL pointer dereference was found in io_file_bitmap_get in io_uring/filetable.c in the io_uring sub-component in the Linux Kernel. When fixed files are unregistered, some context information (file_alloc_{start,end} and alloc_hint) is not cleared. A subsequent request that has auto index selection enabled via IORING_FILE_INDEX_ALLOC can cause a NULL pointer dereference. An unprivileged user can use the flaw to cause a system crash.", + "nvd_text": "In the Linux kernel before 5.15.13, drivers/net/ethernet/mellanox/mlx5/core/steering/dr_domain.c misinterprets the mlx5_get_uars_page return value (expects it to be NULL in the error case, whereas it is actually an error pointer).", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-1583", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-1583", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-1583", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-1583", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-1583", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-1583" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-23006", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-23006", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-23006", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-23006", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-23006", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-23006" } }, - "CVE-2023-1611": { - "affected_versions": "v2.6.12-rc2 to v6.3-rc5", - "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", - "cmt_msg": "btrfs: fix race between quota disable and quota assign ioctls", + "CVE-2023-23039": { + "affected_versions": "unk to unk", + "breaks": "", "cvss3": { "Attack Complexity": "High", - "Attack Vector": "Local", + "Attack Vector": "Physical", "Availability": "High", - "Confidentiality": "High", - "Integrity": "None", - "Privileges Required": "Low", + "Confidentiality": "None", + "Integrity": "High", + "Privileges Required": "None", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H", - "score": 6.3 + "raw": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H", + "score": 5.7 }, - "fixes": "2f1a6be12ab6c8470d5776e68644726c94257c54", - "last_affected_version": "6.2.9", + "fixes": "", "last_modified": "2023-12-06", - "nvd_text": "A use-after-free flaw was found in btrfs_search_slot in fs/btrfs/ctree.c in btrfs in the Linux Kernel.This flaw allows an attacker to crash the system and possibly cause a kernel information lea", + "nvd_text": "An issue was discovered in the Linux kernel through 6.2.0-rc2. drivers/tty/vcc.c has a race condition and resultant use-after-free if a physically proximate attacker removes a VCC device while calling open(), aka a race condition between vcc_open() and vcc_remove().", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-1611", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-1611", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-1611", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-1611", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-1611", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-1611" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-23039", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-23039", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-23039", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-23039", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-23039", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-23039" } }, - "CVE-2023-1637": { - "affected_versions": "v4.17-rc7 to v5.18-rc2", - "breaks": "772439717dbf703b39990be58d8d4e3e4ad0598a", - "cmt_msg": "x86/speculation: Restore speculation related MSRs during S3 resume", + "CVE-2023-23454": { + "affected_versions": "v2.6.12-rc2 to v6.2-rc3", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "net: sched: cbq: dont intepret cls results when asked to drop", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", - "Availability": "None", - "Confidentiality": "High", + "Availability": "High", + "Confidentiality": "None", "Integrity": "None", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "score": 5.5 }, - "fixes": "e2a1256b17b16f9b9adf1b6fea56819e7b68e463", - "last_affected_version": "5.17.2", + "cwe": "Access of Resource Using Incompatible Type ('Type Confusion')", + "fixes": "caa4b35b4317d5147b3ab0fbdc9c075c7d2e9c12", + "last_affected_version": "6.1.4", "last_modified": "2023-12-06", - "nvd_text": "A flaw that boot CPU could be vulnerable for the speculative execution behavior kind of attacks in the Linux kernel X86 CPU Power management options functionality was found in the way user resuming CPU from suspend-to-RAM. A local user could use this flaw to potentially get unauthorized access to some memory of the CPU similar to the speculative execution behavior kind of attacks.", + "nvd_text": "cbq_classify in net/sched/sch_cbq.c in the Linux kernel through 6.1.4 allows attackers to cause a denial of service (slab-out-of-bounds read) because of type confusion (non-negative numbers can sometimes indicate a TC_ACT_SHOT condition rather than valid classification results).", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-1637", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-1637", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-1637", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-1637", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-1637", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-1637" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-23454", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-23454", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-23454", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-23454", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-23454", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-23454" } }, - "CVE-2023-1652": { - "affected_versions": "v5.14-rc1 to v6.2-rc5", - "breaks": "f4e44b393389c77958f7c58bf4415032b4cda15b", - "cmt_msg": "NFSD: fix use-after-free in nfsd4_ssc_setup_dul()", + "CVE-2023-23455": { + "affected_versions": "v2.6.23-rc1 to v6.2-rc3", + "breaks": "b0188d4dbe5f4285372dd033acf7c92a97006629", + "cmt_msg": "net: sched: atm: dont intepret cls results when asked to drop", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", - "Confidentiality": "High", + "Confidentiality": "None", "Integrity": "None", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", - "score": 7.1 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "score": 5.5 }, - "fixes": "e6cf91b7b47ff82b624bdfe2fdcde32bb52e71dd", - "last_affected_version": "6.1.8", + "cwe": "Access of Resource Using Incompatible Type ('Type Confusion')", + "fixes": "a2965c7be0522eaa18808684b7b82b248515511b", + "last_affected_version": "6.1.4", "last_modified": "2023-12-06", - "nvd_text": "A use-after-free flaw was found in nfsd4_ssc_setup_dul in fs/nfsd/nfs4proc.c in the NFS filesystem in the Linux Kernel. This issue could allow a local attacker to crash the system or it may lead to a kernel information leak problem.", + "nvd_text": "atm_tc_enqueue in net/sched/sch_atm.c in the Linux kernel through 6.1.4 allows attackers to cause a denial of service because of type confusion (non-negative numbers can sometimes indicate a TC_ACT_SHOT condition rather than valid classification results).", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-1652", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-1652", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-1652", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-1652", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-1652", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-1652" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-23455", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-23455", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-23455", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-23455", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-23455", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-23455" } }, - "CVE-2023-1670": { - "affected_versions": "v2.6.12-rc2 to v6.3-rc4", - "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", - "cmt_msg": "xirc2ps_cs: Fix use after free bug in xirc2ps_detach", + "CVE-2023-23559": { + "affected_versions": "v2.6.35-rc1 to v6.2-rc5", + "breaks": "80f8c5b434f94926c6489d7350d58aecb53ab70f", + "cmt_msg": "wifi: rndis_wlan: Prevent buffer overflow in rndis_query_oid", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", @@ -83512,170 +89909,189 @@ "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "score": 7.8 }, - "fixes": "e8d20c3ded59a092532513c9bd030d1ea66f5f44", - "last_affected_version": "6.2.8", + "cwe": "Integer Overflow or Wraparound", + "fixes": "b870e73a56c4cccbec33224233eaf295839f228c", + "last_affected_version": "6.1.8", "last_modified": "2023-12-06", - "nvd_text": "A flaw use after free in the Linux kernel Xircom 16-bit PCMCIA (PC-card) Ethernet driver was found.A local user could use this flaw to crash the system or potentially escalate their privileges on the system.", + "nvd_text": "In rndis_query_oid in drivers/net/wireless/rndis_wlan.c in the Linux kernel through 6.1.5, there is an integer overflow in an addition.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-1670", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-1670", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-1670", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-1670", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-1670", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-1670" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-23559", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-23559", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-23559", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-23559", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-23559", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-23559" } }, - "CVE-2023-1829": { - "affected_versions": "v2.6.12-rc2 to v6.3-rc1", - "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", - "cmt_msg": "net/sched: Retire tcindex classifier", + "CVE-2023-23586": { + "affected_versions": "v5.10-rc1 to v5.12-rc1-dontuse", + "breaks": "500a373d731ac506612db12631ec21295c1ff360", + "cmt_msg": "io_uring: remove io_identity", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", - "Availability": "High", + "Availability": "None", "Confidentiality": "High", - "Integrity": "High", + "Integrity": "None", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", - "score": 7.8 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "score": 5.5 }, - "fixes": "8c710f75256bb3cf05ac7b1672c82b92c43f3d28", - "last_affected_version": "6.2.4", + "fixes": "4379bf8bd70b5de6bba7d53015b0c36c57a634ee", "last_modified": "2023-12-06", - "nvd_text": "A use-after-free vulnerability in the Linux Kernel traffic control index filter (tcindex) can be exploited to achieve local privilege escalation.\u00a0The tcindex_delete function which does not properly deactivate filters in case of a perfect hashes while deleting the underlying structure which can later lead to double freeing the structure.\u00a0A local attacker user can use this vulnerability to elevate its privileges to root.\nWe recommend upgrading past commit 8c710f75256bb3cf05ac7b1672c82b92c43f3d28.\n\n", + "nvd_text": "Due to a vulnerability in the io_uring subsystem, it is possible to leak kernel memory information to the user process.\u00a0timens_install calls current_is_single_threaded to determine if the current process is single-threaded, but this call does not consider io_uring's io_worker threads, thus it is possible to insert a time namespace's vvar page to process's memory space via a page fault. When this time namespace is destroyed, the vvar page is also freed, but not removed from the process' memory, and a next page allocated by the kernel will be still available from the user-space process and can leak memory contents via this (read-only) use-after-free vulnerability. We recommend upgrading past version 5.10.161 or commit\u00a0 788d0824269bef539fe31a785b1517882eafed93 https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/io_uring \n", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-1829", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-1829", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-1829", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-1829", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-1829", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-1829" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-23586", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-23586", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-23586", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-23586", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-23586", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-23586" } }, - "CVE-2023-1838": { - "affected_versions": "v2.6.12-rc2 to v5.18", - "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", - "cmt_msg": "Fix double fget() in vhost_net_set_backend()", + "CVE-2023-2430": { + "affected_versions": "v5.18-rc1 to v6.2-rc5", + "breaks": "4f57f06ce2186c31c3da52386125dc57b1cd6f96", + "cmt_msg": "io_uring/msg_ring: fix missing lock on overflow for IOPOLL", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", - "Confidentiality": "High", + "Confidentiality": "None", "Integrity": "None", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", - "score": 7.1 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "score": 5.5 }, - "fixes": "fb4554c2232e44d595920f4d5c66cf8f7d13f9bc", - "last_affected_version": "5.17", - "last_modified": "2023-12-06", - "nvd_text": "A use-after-free flaw was found in vhost_net_set_backend in drivers/vhost/net.c in virtio network subcomponent in the Linux kernel due to a double fget. This flaw could allow a local attacker to crash the system, and could even lead to a kernel information leak problem.", + "fixes": "e12d7a46f65ae4b7d58a5e0c1cbfa825cf8d830d", + "last_affected_version": "6.1.49", + "last_modified": "2024-01-15", + "nvd_text": "A vulnerability was found due to missing lock for IOPOLL flaw in io_cqring_event_overflow() in io_uring.c in Linux Kernel. This flaw allows a local attacker with user privilege to trigger a Denial of Service threat.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-1838", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-1838", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-1838", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-1838", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-1838", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-1838" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-2430", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-2430", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-2430", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-2430", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-2430", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-2430" } }, - "CVE-2023-1855": { - "affected_versions": "v4.9-rc1 to v6.3-rc3", - "breaks": "2ca492e22cb70a001749377506bd22eb06f60ecc", - "cmt_msg": "hwmon: (xgene) Fix use after free bug in xgene_hwmon_remove due to race condition", + "CVE-2023-2483": { + "affected_versions": "v4.9-rc1 to v6.3-rc4", + "breaks": "b9b17debc69d27cd55e21ee51a5ba7fc50a426cf", + "cmt_msg": "net: qcom/emac: Fix use after free bug in emac_remove due to race condition", + "fixes": "6b6bc5b8bd2d4ca9e1efa9ae0f98a0b0687ace75", + "last_affected_version": "6.2.8", + "last_modified": "2023-12-06", + "nvd_text": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2023-33203. Reason: This candidate is a reservation duplicate of CVE-2023-33203. Notes: All CVE users should reference CVE-2023-33203 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-2483", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-2483", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-2483", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-2483", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-2483", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-2483" + }, + "rejected": true + }, + "CVE-2023-25012": { + "affected_versions": "v5.6-rc4 to v6.3-rc1", + "breaks": "4eb1b01de5b9d8596d6c103efcf1a15cfc1bedf7", + "cmt_msg": "HID: bigben: use spinlock to safely schedule workers", "cvss3": { - "Attack Complexity": "High", - "Attack Vector": "Local", + "Attack Complexity": "Low", + "Attack Vector": "Physical", "Availability": "High", - "Confidentiality": "High", + "Confidentiality": "None", "Integrity": "None", - "Privileges Required": "Low", + "Privileges Required": "None", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H", - "score": 6.3 + "raw": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "score": 4.6 }, - "fixes": "cb090e64cf25602b9adaf32d5dfc9c8bec493cd1", - "last_affected_version": "6.2.7", + "fixes": "76ca8da989c7d97a7f76c75d475fe95a584439d7", + "last_affected_version": "6.2.2", "last_modified": "2023-12-06", - "nvd_text": "A use-after-free flaw was found in xgene_hwmon_remove in drivers/hwmon/xgene-hwmon.c in the Hardware Monitoring Linux Kernel Driver (xgene-hwmon). This flaw could allow a local attacker to crash the system due to a race problem. This vulnerability could even lead to a kernel information leak problem.", + "nvd_text": "The Linux kernel through 6.1.9 has a Use-After-Free in bigben_remove in drivers/hid/hid-bigbenff.c via a crafted USB device because the LED controllers remain registered for too long.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-1855", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-1855", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-1855", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-1855", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-1855", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-1855" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-25012", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-25012", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-25012", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-25012", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-25012", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-25012" } }, - "CVE-2023-1859": { - "affected_versions": "v4.12-rc1 to v6.3-rc7", - "breaks": "71ebd71921e451f0f942ddfe85d01e31ddc6eb88", - "cmt_msg": "9p/xen : Fix use after free bug in xen_9pfs_front_remove due to race condition", + "CVE-2023-2513": { + "affected_versions": "v2.6.19-rc2 to v6.0-rc1", + "breaks": "ac27a0ec112a089f1a5102bc8dffc79c8c815571", + "cmt_msg": "ext4: fix use-after-free in ext4_xattr_set_entry", "cvss3": { - "Attack Complexity": "High", + "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", - "Confidentiality": "None", - "Integrity": "None", - "Privileges Required": "Low", + "Confidentiality": "High", + "Integrity": "High", + "Privileges Required": "High", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", - "score": 4.7 + "raw": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "score": 6.7 }, - "fixes": "ea4f1009408efb4989a0f139b70fb338e7f687d0", - "last_affected_version": "6.2.11", + "fixes": "67d7d8ad99beccd9fe92d585b87f1760dc9018e3", + "last_affected_version": "5.19.1", "last_modified": "2023-12-06", - "nvd_text": "A use-after-free flaw was found in xen_9pfs_front_removet in net/9p/trans_xen.c in Xen transport for 9pfs in the Linux Kernel. This flaw could allow a local attacker to crash the system due to a race problem, possibly leading to a kernel information leak.", + "nvd_text": "A use-after-free vulnerability was found in the Linux kernel's ext4 filesystem in the way it handled the extra inode size for extended attributes. This flaw could allow a privileged local user to cause a system crash or other undefined behaviors.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-1859", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-1859", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-1859", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-1859", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-1859", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-1859" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-2513", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-2513", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-2513", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-2513", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-2513", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-2513" } }, - "CVE-2023-1872": { - "affected_versions": "v5.7-rc1 to v5.18-rc2", - "breaks": "7d67af2c013402537385dae343a2d0f6a4cb3bfd", - "cmt_msg": "io_uring: propagate issue_flags state down to file assignment", + "CVE-2023-25775": { + "affected_versions": "v5.14-rc1 to v6.6-rc1", + "breaks": "b48c24c2d710cf34810c555dcef883a3d35a9c08", + "cmt_msg": "RDMA/irdma: Prevent zero-length STAG registration", "cvss3": { - "Attack Complexity": "High", - "Attack Vector": "Local", + "Attack Complexity": "Low", + "Attack Vector": "Network", "Availability": "High", "Confidentiality": "High", "Integrity": "High", - "Privileges Required": "Low", + "Privileges Required": "None", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", - "score": 7.0 + "raw": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "score": 9.8 }, - "fixes": "5106dd6e74ab6c94daac1c357094f11e6934b36f", - "last_affected_version": "5.17.2", - "last_modified": "2023-12-06", - "nvd_text": "A use-after-free vulnerability in the Linux Kernel io_uring system can be exploited to achieve local privilege escalation.\n\nThe io_file_get_fixed function lacks the presence of ctx->uring_lock which can lead to a Use-After-Free vulnerability due a race condition with fixed files getting unregistered.\n\nWe recommend upgrading past commit da24142b1ef9fd5d36b76e36bab328a5b27523e8.\n\n", + "cwe": "Unspecified", + "fixes": "bb6d73d9add68ad270888db327514384dfa44958", + "last_affected_version": "6.5.2", + "last_modified": "2023-12-27", + "nvd_text": "Improper access control in the Intel(R) Ethernet Controller RDMA driver for linux before version 1.9.30 may allow an unauthenticated user to potentially enable escalation of privilege via network access.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-1872", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-1872", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-1872", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-1872", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-1872", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-1872" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-25775", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-25775", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-25775", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-25775", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-25775", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-25775" } }, - "CVE-2023-1989": { - "affected_versions": "v2.6.24-rc1 to v6.3-rc4", - "breaks": "ddbaf13e3609442b64abb931ac21527772d87980", - "cmt_msg": "Bluetooth: btsdio: fix use after free bug in btsdio_remove due to unfinished work", + "CVE-2023-2598": { + "affected_versions": "v6.3-rc1 to v6.4-rc1", + "breaks": "57bebf807e2abcf87d96b9de1266104ee2d8fc2f", + "cmt_msg": "io_uring/rsrc: check for nonconsecutive pages", "cvss3": { - "Attack Complexity": "High", + "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", "Confidentiality": "High", @@ -83683,142 +90099,137 @@ "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", - "score": 7.0 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 7.8 }, - "fixes": "1e9ac114c4428fdb7ff4635b45d4f46017e8916f", - "last_affected_version": "6.2.8", + "fixes": "776617db78c6d208780e7c69d4d68d1fa82913de", + "last_affected_version": "6.3.1", "last_modified": "2023-12-06", - "nvd_text": "A use-after-free flaw was found in btsdio_remove in drivers\\bluetooth\\btsdio.c in the Linux Kernel. In this flaw, a call to btsdio_remove with an unfinished job, may cause a race problem leading to a UAF on hdev devices.", + "nvd_text": "A flaw was found in the fixed buffer registration code for io_uring (io_sqe_buffer_register in io_uring/rsrc.c) in the Linux kernel that allows out-of-bounds access to physical memory beyond the end of the buffer. This flaw enables full local privilege escalation.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-1989", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-1989", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-1989", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-1989", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-1989", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-1989" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-2598", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-2598", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-2598", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-2598", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-2598", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-2598" } }, - "CVE-2023-1990": { - "affected_versions": "v3.17-rc1 to v6.3-rc3", - "breaks": "35630df68d6030daf12dde12ed07bbe26324e6ac", - "cmt_msg": "nfc: st-nci: Fix use after free bug in ndlc_remove due to race condition", + "CVE-2023-26242": { + "affected_versions": "v4.19-rc1 to unk", + "breaks": "857a26222ff75eecf7d701ef0e91e4fbf6efa663", "cvss3": { - "Attack Complexity": "High", + "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", - "Confidentiality": "None", - "Integrity": "None", + "Confidentiality": "High", + "Integrity": "High", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", - "score": 4.7 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 7.8 }, - "fixes": "5000fe6c27827a61d8250a7e4a1d26c3298ef4f6", - "last_affected_version": "6.2.7", + "fixes": "", "last_modified": "2023-12-06", - "nvd_text": "A use-after-free flaw was found in ndlc_remove in drivers/nfc/st-nci/ndlc.c in the Linux Kernel. This flaw could allow an attacker to crash the system due to a race problem.", + "nvd_text": "afu_mmio_region_get_by_offset in drivers/fpga/dfl-afu-region.c in the Linux kernel through 6.1.12 has an integer overflow.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-1990", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-1990", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-1990", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-1990", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-1990", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-1990" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-26242", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-26242", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-26242", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-26242", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-26242", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-26242" } }, - "CVE-2023-1998": { - "affected_versions": "v5.19-rc7 to v6.3-rc1", - "breaks": "7c693f54c873691a4b7da05c7e0f74e67745d144", - "cmt_msg": "x86/speculation: Allow enabling STIBP with legacy IBRS", + "CVE-2023-2640": { + "affected_versions": "v5.19-rc1 to unk", + "breaks": "c914c0e27eb0843b7cf3bec71d6f34d53a3a671e", "cvss3": { - "Attack Complexity": "High", + "Attack Complexity": "Low", "Attack Vector": "Local", - "Availability": "None", + "Availability": "High", "Confidentiality": "High", - "Integrity": "None", + "Integrity": "High", "Privileges Required": "Low", - "Scope": "Changed", + "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", - "score": 5.6 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 7.8 }, - "fixes": "6921ed9049bc7457f66c1596c5b78aec0dae4a9d", - "last_affected_version": "6.2.2", + "fixes": "", "last_modified": "2023-12-06", - "nvd_text": "The Linux kernel allows userspace processes to enable mitigations by calling prctl with PR_SET_SPECULATION_CTRL which disables the speculation feature as well as by using seccomp. We had noticed that on VMs of at least one major cloud provider, the kernel still left the victim process exposed to attacks in some cases even after enabling the spectre-BTI mitigation with prctl. The same behavior can be observed on a bare-metal machine when forcing the mitigation to IBRS on boot command line.\n\nThis happened because when plain IBRS was enabled (not enhanced IBRS), the kernel had some logic that determined that STIBP was not needed. The IBRS bit implicitly protects against cross-thread branch target injection. However, with legacy IBRS, the IBRS bit was cleared on returning to userspace, due to performance reasons, which disabled the implicit STIBP and left userspace threads vulnerable to cross-thread branch target injection against which STIBP protects.\n\n\n", + "nvd_text": "On Ubuntu kernels carrying both c914c0e27eb0 and \"UBUNTU: SAUCE: overlayfs: Skip permission checking for trusted.overlayfs.* xattrs\", an unprivileged user may set privileged extended attributes on the mounted files, leading them to be set on the upper files without the appropriate security checks.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-1998", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-1998", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-1998", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-1998", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-1998", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-1998" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-2640", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-2640", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-2640", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-2640", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-2640", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-2640" } }, - "CVE-2023-2002": { - "affected_versions": "v4.9-rc1 to v6.4-rc1", - "breaks": "f81f5b2db8692ff1d2d5f4db1fde58e67aa976a3", - "cmt_msg": "bluetooth: Perform careful capability checks in hci_sock_ioctl()", + "CVE-2023-26544": { + "affected_versions": "v5.15-rc1 to v6.2-rc1", + "breaks": "4342306f0f0d5ff4315a204d315c1b51b914fca5", + "cmt_msg": "fs/ntfs3: Fix slab-out-of-bounds read in run_unpack", "cvss3": { "Attack Complexity": "Low", - "Attack Vector": "Adjacent", + "Attack Vector": "Local", "Availability": "High", - "Confidentiality": "Low", - "Integrity": "Low", + "Confidentiality": "High", + "Integrity": "High", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H", - "score": 6.8 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 7.8 }, - "fixes": "25c150ac103a4ebeed0319994c742a90634ddf18", - "last_affected_version": "6.3.0", + "fixes": "887bfc546097fbe8071dac13b2fef73b77920899", + "last_affected_version": "6.1.2", "last_modified": "2023-12-06", - "nvd_text": "A vulnerability was found in the HCI sockets implementation due to a missing capability check in net/bluetooth/hci_sock.c in the Linux Kernel. This flaw allows an attacker to unauthorized execution of management commands, compromising the confidentiality, integrity, and availability of Bluetooth communication.", + "nvd_text": "In the Linux kernel 6.0.8, there is a use-after-free in run_unpack in fs/ntfs3/run.c, related to a difference between NTFS sector size and media sector size.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-2002", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-2002", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-2002", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-2002", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-2002", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-2002" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-26544", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-26544", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-26544", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-26544", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-26544", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-26544" } }, - "CVE-2023-2006": { - "affected_versions": "v5.10-rc1 to v6.1-rc7", - "breaks": "245500d853e9f20036cec7df4f6984ece4c6bf26", - "cmt_msg": "rxrpc: Fix race between conn bundle lookup and bundle removal [ZDI-CAN-15975]", + "CVE-2023-26545": { + "affected_versions": "v4.1-rc8 to v6.2", + "breaks": "0fae3bf018d97b210051c8797a49d66d31071847", + "cmt_msg": "net: mpls: fix stale pointer if allocation fails during device rename", "cvss3": { "Attack Complexity": "High", "Attack Vector": "Local", "Availability": "High", - "Confidentiality": "High", - "Integrity": "High", + "Confidentiality": "None", + "Integrity": "None", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", - "score": 7.0 + "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", + "score": 4.7 }, - "fixes": "3bcd6c7eaa53b56c3f584da46a1f7652e759d0e5", - "last_affected_version": "6.0.10", + "fixes": "fda6c89fe3d9aca073495a664e1d5aea28cd4377", + "last_affected_version": "6.1", "last_modified": "2023-12-06", - "nvd_text": "A race condition was found in the Linux kernel's RxRPC network protocol, within the processing of RxRPC bundles. This issue results from the lack of proper locking when performing operations on an object. This may allow an attacker to escalate privileges and execute arbitrary code in the context of the kernel.", + "nvd_text": "In the Linux kernel before 6.1.13, there is a double free in net/mpls/af_mpls.c upon an allocation failure (for registering the sysctl table under a new location) during the renaming of a device.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-2006", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-2006", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-2006", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-2006", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-2006", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-2006" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-26545", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-26545", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-26545", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-26545", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-26545", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-26545" } }, - "CVE-2023-2007": { - "affected_versions": "v2.6.12-rc2 to v6.0-rc1", - "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", - "cmt_msg": "scsi: dpt_i2o: Remove obsolete driver", + "CVE-2023-26605": { + "affected_versions": "v6.1-rc1 to v6.1-rc7", + "breaks": "cbfecb927f429a6fa613d74b998496bd71e4438a", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", @@ -83831,22 +90242,22 @@ "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "score": 7.8 }, - "fixes": "b04e75a4a8a81887386a0d2dbf605a48e779d2a0", + "fixes": "4e3c51f4e805291b057d12f5dda5aeb50a538dc4", "last_modified": "2023-12-06", - "nvd_text": "The specific flaw exists within the DPT I2O Controller driver. The issue results from the lack of proper locking when performing operations on an object. An attacker can leverage this in conjunction with other vulnerabilities to escalate privileges and execute arbitrary code in the context of the kernel.", + "nvd_text": "In the Linux kernel 6.0.8, there is a use-after-free in inode_cgwb_move_to_attached in fs/fs-writeback.c, related to __list_del_entry_valid.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-2007", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-2007", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-2007", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-2007", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-2007", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-2007" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-26605", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-26605", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-26605", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-26605", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-26605", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-26605" } }, - "CVE-2023-2008": { - "affected_versions": "v4.20-rc1 to v5.19-rc4", - "breaks": "7b26e4e2119d0c5ede1282b22ce2af22835ff4b5", - "cmt_msg": "udmabuf: add back sanity check", + "CVE-2023-26606": { + "affected_versions": "v5.15-rc1 to v6.2-rc1", + "breaks": "3f3b442b5ad2455507c9bfdacf39a3792eb3a6d0", + "cmt_msg": "fs/ntfs3: Fix slab-out-of-bounds read in ntfs_trim_fs", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", @@ -83859,141 +90270,110 @@ "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "score": 7.8 }, - "fixes": "05b252cccb2e5c3f56119d25de684b4f810ba40a", - "last_affected_version": "5.18.7", + "fixes": "557d19675a470bb0a98beccec38c5dc3735c20fa", + "last_affected_version": "6.1.1", "last_modified": "2023-12-06", - "nvd_text": "A flaw was found in the Linux kernel's udmabuf device driver. The specific flaw exists within a fault handler. The issue results from the lack of proper validation of user-supplied data, which can result in a memory access past the end of an array. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the kernel.", + "nvd_text": "In the Linux kernel 6.0.8, there is a use-after-free in ntfs_trim_fs in fs/ntfs3/bitmap.c.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-2008", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-2008", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-2008", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-2008", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-2008", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-2008" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-26606", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-26606", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-26606", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-26606", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-26606", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-26606" } }, - "CVE-2023-2019": { - "affected_versions": "v5.12-rc1-dontuse to v6.0-rc1", - "breaks": "0ae3eb7b4611207e140e9772398b9f88b72d6839", - "cmt_msg": "netdevsim: fib: Fix reference count leak on route deletion failure", + "CVE-2023-26607": { + "affected_versions": "v2.6.12-rc2 to v6.1-rc1", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "ntfs: fix out-of-bounds read in ntfs_attr_find()", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", - "Confidentiality": "None", - "Integrity": "None", - "Privileges Required": "High", - "Scope": "Unchanged", - "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", - "score": 4.4 - }, - "cwe": "Unspecified", - "fixes": "180a6a3ee60a7cb69ed1232388460644f6a21f00", - "last_affected_version": "5.19.1", - "last_modified": "2023-12-06", - "nvd_text": "A flaw was found in the Linux kernel's netdevsim device driver, within the scheduling of events. This issue results from the improper management of a reference count. This may allow an attacker to create a denial of service condition on the system.", - "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-2019", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-2019", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-2019", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-2019", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-2019", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-2019" - } - }, - "CVE-2023-20569": { - "affected_versions": "v2.6.12-rc2 to v6.5-rc6", - "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", - "cmt_msg": "x86/bugs: Increase the x86 bugs vector size to two u32s", - "cvss3": { - "Attack Complexity": "High", - "Attack Vector": "Local", - "Availability": "None", "Confidentiality": "High", "Integrity": "None", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", - "score": 4.7 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", + "score": 7.1 }, - "fixes": "0e52740ffd10c6c316837c6c128f460f1aaba1ea", - "last_affected_version": "6.4.8", + "fixes": "36a4d82dddbbd421d2b8e79e1cab68c8126d5075", + "last_affected_version": "6.0.9", "last_modified": "2023-12-06", - "nvd_text": "\n\n\nA side channel vulnerability on some of the AMD CPUs may allow an attacker to influence the return address prediction. This may result in speculative execution at an attacker-controlled?address, potentially leading to information disclosure.\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n", + "nvd_text": "In the Linux kernel 6.0.8, there is an out-of-bounds read in ntfs_attr_find in fs/ntfs/attrib.c.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-20569", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-20569", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-20569", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-20569", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-20569", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-20569" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-26607", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-26607", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-26607", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-26607", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-26607", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-26607" } }, - "CVE-2023-20588": { - "affected_versions": "v2.6.12-rc2 to v6.5-rc6", - "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", - "cmt_msg": "x86/CPU/AMD: Do not leak quotient data after a division by 0", + "CVE-2023-28327": { + "affected_versions": "v5.3-rc1 to v6.1", + "breaks": "cae9910e73446cac68a54e3a7b02aaa12b689026", + "cmt_msg": "af_unix: Get user_ns from in_skb in unix_diag_get_exact().", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", - "Availability": "None", - "Confidentiality": "High", + "Availability": "High", + "Confidentiality": "None", "Integrity": "None", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "score": 5.5 }, - "fixes": "77245f1c3c6495521f6a3af082696ee2f8ce3921", - "last_affected_version": "6.4.9", + "fixes": "b3abe42e94900bdd045c472f9c9be620ba5ce553", + "last_affected_version": "6.0", "last_modified": "2023-12-06", - "nvd_text": "\nA division-by-zero error on some AMD processors can potentially return speculative data resulting in loss of confidentiality.\u00a0\n\n\n\n\n\n\n\n", + "nvd_text": "A NULL pointer dereference flaw was found in the UNIX protocol in net/unix/diag.c In unix_diag_get_exact in the Linux Kernel. The newly allocated skb does not have sk, leading to a NULL pointer. This flaw allows a local user to crash or potentially cause a denial of service.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-20588", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-20588", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-20588", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-20588", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-20588", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-20588" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-28327", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-28327", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-28327", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-28327", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-28327", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-28327" } }, - "CVE-2023-20593": { - "affected_versions": "v2.6.12-rc2 to v6.5-rc4", - "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", - "cmt_msg": "x86/cpu/amd: Add a Zenbleed fix", + "CVE-2023-28328": { + "affected_versions": "v2.6.34-rc1 to v6.2-rc1", + "breaks": "76f9a820c8672ada12ffa0903652c9e6f2429462", + "cmt_msg": "media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer()", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", - "Availability": "None", - "Confidentiality": "High", + "Availability": "High", + "Confidentiality": "None", "Integrity": "None", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "score": 5.5 }, - "cwe": "Unspecified", - "fixes": "522b1d69219d8f083173819fde04f994aa051a98", - "last_affected_version": "6.4.5", + "fixes": "0ed554fd769a19ea8464bb83e9ac201002ef74ad", + "last_affected_version": "6.1.1", "last_modified": "2023-12-06", - "nvd_text": "\nAn issue in \u201cZen 2\u201d CPUs, under specific microarchitectural circumstances, may allow an attacker to potentially access sensitive information.\n\n\n\n\n\n\n", + "nvd_text": "A NULL pointer dereference flaw was found in the az6027 driver in drivers/media/usb/dev-usb/az6027.c in the Linux Kernel. The message from user space is not checked properly before transferring into the device. This flaw allows a local user to crash the system or potentially cause a denial of service.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-20593", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-20593", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-20593", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-20593", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-20593", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-20593" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-28328", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-28328", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-28328", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-28328", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-28328", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-28328" } }, - "CVE-2023-20928": { - "affected_versions": "v4.20-rc1 to v6.0-rc1", - "breaks": "dd2283f2605e3b3e9c61bcae844b34f2afa4813f", - "cmt_msg": "android: binder: stop saving a pointer to the VMA", + "CVE-2023-28410": { + "affected_versions": "v5.8-rc1 to v5.19-rc1", + "breaks": "9f909e215fea0652023b9ed09d3d7bfe10386423", + "cmt_msg": "drm/i915/gem: add missing boundary check in vm_access", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", @@ -84006,22 +90386,22 @@ "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "score": 7.8 }, - "fixes": "a43cfc87caaf46710c8027a8c23b8a55f1078f19", - "last_affected_version": "5.18.17", + "fixes": "661412e301e2ca86799aa4f400d1cf0bd38c57c6", + "last_affected_version": "None", "last_modified": "2023-12-06", - "nvd_text": "In binder_vma_close of binder.c, there is a possible use after free due to improper locking. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-254837884References: Upstream kernel", + "nvd_text": "Improper restriction of operations within the bounds of a memory buffer in some Intel(R) i915 Graphics drivers for linux before kernel version 6.2.10 may allow an authenticated user to potentially enable escalation of privilege via local access.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-20928", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-20928", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-20928", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-20928", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-20928", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-20928" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-28410", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-28410", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-28410", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-28410", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-28410", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-28410" } }, - "CVE-2023-20937": { - "affected_versions": "unk to unk", - "breaks": "", + "CVE-2023-28464": { + "affected_versions": "v6.3-rc1 to v6.3-rc7", + "breaks": "0f00cd322d22d4441de51aa80bcce5bb6a8cbb44", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", @@ -84034,25 +90414,24 @@ "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "score": 7.8 }, - "fixes": "", + "fixes": "5dc7d23e167e2882ef118456ceccd57873e876d8", "last_modified": "2023-12-06", - "nvd_text": "In several functions of the Android Linux kernel, there is a possible way to corrupt memory due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-257443051References: Upstream kernel", + "nvd_text": "hci_conn_cleanup in net/bluetooth/hci_conn.c in the Linux kernel through 6.2.9 has a use-after-free (observed in hci_conn_hash_flush) because of calls to hci_dev_put and hci_conn_put. There is a double free that may lead to privilege escalation.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-20937", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-20937", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-20937", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-20937", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-20937", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-20937" - }, - "vendor_specific": true + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-28464", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-28464", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-28464", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-28464", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-28464", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-28464" + } }, - "CVE-2023-20938": { - "affected_versions": "v5.17-rc1 to v5.18-rc5", - "breaks": "09184ae9b5756cc469db6fd1d1cfdcffbf627c2d", - "cmt_msg": "binder: Gracefully handle BINDER_TYPE_FDA objects with num_fds=0", + "CVE-2023-28466": { + "affected_versions": "v4.13-rc1 to v6.3-rc2", + "breaks": "3c4d7559159bfe1e3b94df3a657b2cda3a34e218", + "cmt_msg": "net: tls: fix possible race condition between do_tls_getsockopt_conf() and do_tls_setsockopt_conf()", "cvss3": { - "Attack Complexity": "Low", + "Attack Complexity": "High", "Attack Vector": "Local", "Availability": "High", "Confidentiality": "High", @@ -84060,284 +90439,304 @@ "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", - "score": 7.8 + "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 7.0 }, - "fixes": "ef38de9217a04c9077629a24652689d8fdb4c6c6", - "last_affected_version": "5.17.5", + "fixes": "49c47cc21b5b7a3d8deb18fc57b0aa2ab1286962", + "last_affected_version": "6.2.6", "last_modified": "2023-12-06", - "nvd_text": "In binder_transaction_buffer_release of binder.c, there is a possible use after free due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-257685302References: Upstream kernel", + "nvd_text": "do_tls_getsockopt in net/tls/tls_main.c in the Linux kernel through 6.2.6 lacks a lock_sock call, leading to a race condition (with a resultant use-after-free or NULL pointer dereference).", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-20938", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-20938", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-20938", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-20938", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-20938", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-20938" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-28466", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-28466", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-28466", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-28466", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-28466", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-28466" } }, - "CVE-2023-20941": { - "affected_versions": "unk to unk", - "breaks": "", + "CVE-2023-2860": { + "affected_versions": "v4.10-rc1 to v6.0-rc5", + "breaks": "4f4853dc1c9c1994f6f756eabdcc25374ff271d9", + "cmt_msg": "ipv6: sr: fix out-of-bounds read when setting HMAC data.", "cvss3": { "Attack Complexity": "Low", - "Attack Vector": "Physical", - "Availability": "High", + "Attack Vector": "Local", + "Availability": "None", "Confidentiality": "High", - "Integrity": "High", - "Privileges Required": "None", + "Integrity": "None", + "Privileges Required": "High", "Scope": "Unchanged", - "User Interaction": "Required", - "raw": "CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", - "score": 6.6 + "User Interaction": "None", + "raw": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "score": 4.4 }, - "fixes": "", + "fixes": "84a53580c5d2138c7361c7c3eea5b31827e63b35", + "last_affected_version": "5.15.67", "last_modified": "2023-12-06", - "nvd_text": "In acc_ctrlrequest_composite of f_accessory.c, there is a possible out of bounds write due to a missing bounds check. This could lead to physical escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-264029575References: Upstream kernel", + "nvd_text": "An out-of-bounds read vulnerability was found in the SR-IPv6 implementation in the Linux kernel. The flaw exists within the processing of seg6 attributes. The issue results from the improper validation of user-supplied data, which can result in a read past the end of an allocated buffer. This flaw allows a privileged local user to disclose sensitive information on affected installations of the Linux kernel.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-20941", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-20941", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-20941", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-20941", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-20941", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-20941" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-2860", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-2860", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-2860", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-2860", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-2860", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-2860" } }, - "CVE-2023-21102": { - "affected_versions": "v5.14-rc1 to v6.2-rc4", - "breaks": "cefc7ca46235f01d5233e3abd4b79452af01d9e9", - "cmt_msg": "efi: rt-wrapper: Add missing include", + "CVE-2023-28746": { + "affected_versions": "unk to v6.9-rc1", + "breaks": "", + "cmt_msg": "x86/mmio: Disable KVM mitigation when X86_FEATURE_CLEAR_CPU_BUF is set", + "fixes": "e95df4ec0c0c9791941f112db699fae794b9862a", + "last_affected_version": "6.7.9", + "last_modified": "2024-04-09", + "nvd_text": "Information exposure through microarchitectural state after transient execution from some register files for some Intel(R) Atom(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-28746", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-28746", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-28746", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-28746", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-28746", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-28746" + } + }, + "CVE-2023-28772": { + "affected_versions": "v2.6.27-rc1 to v5.14-rc1", + "breaks": "5e3ca0ec76fce92daa4eed0d02de9c79b1fe3920", + "cmt_msg": "seq_buf: Fix overflow in seq_buf_putmem_hex()", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", "Confidentiality": "High", "Integrity": "High", - "Privileges Required": "Low", + "Privileges Required": "High", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", - "score": 7.8 + "raw": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "score": 6.7 }, - "cwe": "Unspecified", - "fixes": "18bba1843fc7f264f58c9345d00827d082f9c558", - "last_affected_version": "6.1.7", + "fixes": "d3b16034a24a112bb83aeb669ac5b9b01f744bb7", + "last_affected_version": "5.13.2", "last_modified": "2023-12-06", - "nvd_text": "In __efi_rt_asm_wrapper of efi-rt-wrapper.S, there is a possible bypass of shadow stack protection due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-260821414References: Upstream kernel", + "nvd_text": "An issue was discovered in the Linux kernel before 5.13.3. lib/seq_buf.c has a seq_buf_putmem_hex buffer overflow.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-21102", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-21102", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-21102", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-21102", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-21102", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-21102" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-28772", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-28772", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-28772", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-28772", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-28772", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-28772" } }, - "CVE-2023-21106": { - "affected_versions": "v5.19-rc1 to v6.2-rc5", - "breaks": "d4726d7700688835f4784d3b94de6fff2cbe16c2", - "cmt_msg": "drm/msm/gpu: Fix potential double-free", + "CVE-2023-28866": { + "affected_versions": "v5.17-rc1 to v6.3-rc4", + "breaks": "d0b137062b2de75b264b84143d21c98abc5f5ad2", + "cmt_msg": "Bluetooth: HCI: Fix global-out-of-bounds", "cvss3": { "Attack Complexity": "Low", - "Attack Vector": "Local", - "Availability": "High", - "Confidentiality": "High", - "Integrity": "High", - "Privileges Required": "Low", + "Attack Vector": "Network", + "Availability": "None", + "Confidentiality": "Low", + "Integrity": "None", + "Privileges Required": "None", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", - "score": 7.8 + "raw": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "score": 5.3 }, - "fixes": "a66f1efcf748febea7758c4c3c8b5bc5294949ef", - "last_affected_version": "6.1.8", + "fixes": "bce56405201111807cc8e4f47c6de3e10b17c1ac", + "last_affected_version": "6.2.8", "last_modified": "2023-12-06", - "nvd_text": "In adreno_set_param of adreno_gpu.c, there is a possible memory corruption due to a double free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-265016072References: Upstream kernel", + "nvd_text": "In the Linux kernel through 6.2.8, net/bluetooth/hci_sync.c allows out-of-bounds access because amp_init1[] and amp_init2[] are supposed to have an intentionally invalid element, but do not.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-21106", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-21106", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-21106", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-21106", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-21106", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-21106" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-28866", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-28866", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-28866", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-28866", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-28866", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-28866" } }, - "CVE-2023-2124": { - "affected_versions": "v3.12-rc1 to v6.4-rc1", - "breaks": "50d5c8d8e938e3c4c0d21db9fc7d64282dc7be20", - "cmt_msg": "xfs: verify buffer contents when we skip log replay", + "CVE-2023-2898": { + "affected_versions": "v5.8-rc1 to v6.5-rc1", + "breaks": "b4b10061ef98c583bcf82a4200703fbaa98c18dc", + "cmt_msg": "f2fs: fix to avoid NULL pointer dereference f2fs_write_end_io()", "cvss3": { - "Attack Complexity": "Low", + "Attack Complexity": "High", "Attack Vector": "Local", "Availability": "High", - "Confidentiality": "High", - "Integrity": "High", + "Confidentiality": "None", + "Integrity": "None", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", - "score": 7.8 + "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", + "score": 4.7 }, - "fixes": "22ed903eee23a5b174e240f1cdfa9acf393a5210", - "last_affected_version": "6.3.6", + "fixes": "d8189834d4348ae608083e1f1f53792cfcc2a9bc", + "last_affected_version": "6.4.3", "last_modified": "2023-12-06", - "nvd_text": "An out-of-bounds memory access flaw was found in the Linux kernel\u2019s XFS file system in how a user restores an XFS image after failure (with a dirty log journal). This flaw allows a local user to crash or potentially escalate their privileges on the system.", + "nvd_text": "There is a null-pointer-dereference flaw found in f2fs_write_end_io in fs/f2fs/data.c in the Linux kernel. This flaw allows a local privileged user to cause a denial of service problem.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-2124", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-2124", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-2124", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-2124", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-2124", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-2124" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-2898", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-2898", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-2898", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-2898", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-2898", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-2898" } }, - "CVE-2023-21255": { - "affected_versions": "v5.16-rc1 to v6.4-rc4", - "breaks": "32e9f56a96d8d0f23cb2aeb2a3cd18d40393e787", - "cmt_msg": "binder: fix UAF caused by faulty buffer cleanup", + "CVE-2023-2985": { + "affected_versions": "v2.6.12-rc2 to v6.3-rc1", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "fs: hfsplus: fix UAF issue in hfsplus_put_super", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", - "Confidentiality": "High", - "Integrity": "High", + "Confidentiality": "None", + "Integrity": "None", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", - "score": 7.8 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "score": 5.5 }, - "fixes": "bdc1c5fac982845a58d28690cdb56db8c88a530d", - "last_affected_version": "6.3.4", + "fixes": "07db5e247ab5858439b14dd7cc1fe538b9efcf32", + "last_affected_version": "6.2.2", "last_modified": "2023-12-06", - "nvd_text": "In multiple functions of binder.c, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.\n\n", + "nvd_text": "A use after free flaw was found in hfsplus_put_super in fs/hfsplus/super.c in the Linux Kernel. This flaw could allow a local user to cause a denial of service problem.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-21255", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-21255", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-21255", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-21255", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-21255", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-21255" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-2985", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-2985", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-2985", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-2985", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-2985", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-2985" } }, - "CVE-2023-21264": { - "affected_versions": "v5.17-rc1 to v6.4-rc5", - "breaks": "e82edcc75c4e2389a3d7223c4ef1737bd9a07e5d", - "cmt_msg": "KVM: arm64: Prevent unconditional donation of unmapped regions from the host", + "CVE-2023-3006": { + "affected_versions": "v2.6.12-rc2 to v6.1-rc1", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "arm64: Add AMPERE1 to the Spectre-BHB affected list", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", - "Availability": "High", + "Availability": "None", "Confidentiality": "High", - "Integrity": "High", - "Privileges Required": "High", + "Integrity": "None", + "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", - "score": 6.7 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "score": 5.5 }, - "fixes": "09cce60bddd6461a93a5bf434265a47827d1bc6f", - "last_affected_version": "6.3.6", + "fixes": "0e5d5ae837c8ce04d2ddb874ec5f920118bd9d31", + "last_affected_version": "6.0.6", "last_modified": "2023-12-06", - "nvd_text": "In multiple functions of mem_protect.c, there is a possible way to access hypervisor memory due to a memory access check in the wrong place. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.\n\n", + "nvd_text": "A known cache speculation vulnerability, known as Branch History Injection (BHI) or Spectre-BHB, becomes actual again for the new hw AmpereOne. Spectre-BHB is similar to Spectre v2, except that malicious code uses the shared branch history (stored in the CPU Branch History Buffer, or BHB) to influence mispredicted branches within the victim's hardware context. Once that occurs, speculation caused by the mispredicted branches can cause cache allocation. This issue leads to obtaining information that should not be accessible.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-21264", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-21264", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-21264", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-21264", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-21264", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-21264" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-3006", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-3006", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-3006", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-3006", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-3006", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-3006" } }, - "CVE-2023-21400": { - "affected_versions": "v5.1-rc1 to unk", - "breaks": "2b188cc1bb857a9d4701ae59aa7768b5124e262e", + "CVE-2023-3022": { + "backport": true, + "breaks": "effda4dd97e878ab83336bec7411cc41b5cc6d37", + "cmt_msg": "ipv6: Use result arg in fib_lookup_arg consistently", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", - "Confidentiality": "High", - "Integrity": "High", - "Privileges Required": "High", + "Confidentiality": "None", + "Integrity": "None", + "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", - "score": 6.7 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "score": 5.5 }, - "fixes": "fb348857e7b67eefe365052f1423427b66dedbf3", + "fixes": "a65120bae4b7425a39c5783aa3d4fc29677eef0e", "last_modified": "2023-12-06", - "nvd_text": "In multiple functions of io_uring.c, there is a possible kernel memory corruption due to improper locking. This could lead to local escalation of privilege in the kernel with System execution privileges needed. User interaction is not needed for exploitation.\n\n", + "nvd_text": "A flaw was found in the IPv6 module of the Linux kernel. The arg.result was not used consistently in fib6_rule_lookup, sometimes holding rt6_info and other times fib6_info. This was not accounted for in other parts of the code where rt6_info was expected unconditionally, potentially leading to a kernel panic in fib6_rule_suppress.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-21400", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-21400", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-21400", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-21400", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-21400", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-21400" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-3022", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-3022", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-3022", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-3022", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-3022", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-3022" } }, - "CVE-2023-2156": { - "affected_versions": "v5.7-rc1 to v6.3", - "breaks": "8610c7c6e3bd647ff98d21c8bc0580e77bc2f8b3", - "cmt_msg": "net: rpl: fix rpl header size calculation", + "CVE-2023-30456": { + "affected_versions": "v2.6.12-rc2 to v6.3-rc3", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "KVM: nVMX: add missing consistency checks for CR0 and CR4", "cvss3": { "Attack Complexity": "Low", - "Attack Vector": "Network", + "Attack Vector": "Local", "Availability": "High", "Confidentiality": "None", "Integrity": "None", - "Privileges Required": "None", - "Scope": "Unchanged", + "Privileges Required": "Low", + "Scope": "Changed", "User Interaction": "None", - "raw": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", - "score": 7.5 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", + "score": 6.5 }, - "fixes": "4e006c7a6dac0ead4c1bf606000aa90a372fc253", - "last_affected_version": "6.2", + "cwe": "Unspecified", + "fixes": "112e66017bff7f2837030f34c2bc19501e9212d5", + "last_affected_version": "6.2.7", "last_modified": "2023-12-06", - "nvd_text": "A flaw was found in the networking subsystem of the Linux kernel within the handling of the RPL protocol. This issue results from the lack of proper handling of user-supplied data, which can lead to an assertion failure. This may allow an unauthenticated remote attacker to create a denial of service condition on the system.", + "nvd_text": "An issue was discovered in arch/x86/kvm/vmx/nested.c in the Linux kernel before 6.2.8. nVMX on x86_64 lacks consistency checks for CR0 and CR4.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-2156", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-2156", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-2156", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-2156", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-2156", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-2156" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-30456", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-30456", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-30456", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-30456", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-30456", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-30456" } }, - "CVE-2023-2162": { - "affected_versions": "v2.6.12-rc2 to v6.2-rc6", - "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", - "cmt_msg": "scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress", + "CVE-2023-30772": { + "affected_versions": "v4.1-rc1 to v6.3-rc4", + "breaks": "c1a281e34dae41379af86b95592a5ae8e9e3af67", + "cmt_msg": "power: supply: da9150: Fix use after free bug in da9150_charger_remove due to race condition", "cvss3": { - "Attack Complexity": "Low", - "Attack Vector": "Local", - "Availability": "None", + "Attack Complexity": "High", + "Attack Vector": "Physical", + "Availability": "High", "Confidentiality": "High", - "Integrity": "None", - "Privileges Required": "Low", + "Integrity": "High", + "Privileges Required": "None", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", - "score": 5.5 + "raw": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "score": 6.4 }, - "fixes": "f484a794e4ee2a9ce61f52a78e810ac45f3fe3b3", - "last_affected_version": "6.1.10", + "fixes": "06615d11cc78162dfd5116efb71f29eb29502d37", + "last_affected_version": "6.2.8", "last_modified": "2023-12-06", - "nvd_text": "A use-after-free vulnerability was found in iscsi_sw_tcp_session_create in drivers/scsi/iscsi_tcp.c in SCSI sub-component in the Linux Kernel. In this flaw an attacker could leak kernel internal information.", + "nvd_text": "The Linux kernel before 6.2.9 has a race condition and resultant use-after-free in drivers/power/supply/da9150-charger.c if a physically proximate attacker unplugs a device.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-2162", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-2162", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-2162", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-2162", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-2162", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-2162" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-30772", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-30772", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-30772", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-30772", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-30772", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-30772" } }, - "CVE-2023-2163": { - "affected_versions": "v5.3-rc1 to v6.3", - "breaks": "b5dc0163d8fd78e64a7e21f309cf932fda34353e", - "cmt_msg": "bpf: Fix incorrect verifier pruning due to missing register precision taints", + "CVE-2023-3090": { + "affected_versions": "v3.19-rc1 to v6.4-rc2", + "breaks": "2ad7bf3638411cb547f2823df08166c13ab04269", + "cmt_msg": "ipvlan:Fix out-of-bounds caused by unclear skb->cb", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", @@ -84345,85 +90744,84 @@ "Confidentiality": "High", "Integrity": "High", "Privileges Required": "Low", - "Scope": "Changed", + "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", - "score": 8.8 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 7.8 }, - "fixes": "71b547f561247897a0a14f3082730156c0533fed", - "last_affected_version": "6.2", + "fixes": "90cbed5247439a966b645b34eb0a2e037836ea8e", + "last_affected_version": "6.3.3", "last_modified": "2023-12-06", - "nvd_text": "Incorrect verifier pruning\u00a0in BPF in Linux Kernel\u00a0>=5.4\u00a0leads to unsafe\ncode paths being incorrectly marked as safe, resulting in\u00a0arbitrary read/write in\nkernel memory, lateral privilege escalation, and container escape.\n", + "nvd_text": "A heap out-of-bounds write vulnerability in the Linux Kernel ipvlan network driver can be exploited to achieve local privilege escalation.\n\nThe out-of-bounds write is caused by missing skb->cb initialization in the ipvlan network driver. The vulnerability is reachable if\u00a0CONFIG_IPVLAN is enabled.\n\n\nWe recommend upgrading past commit 90cbed5247439a966b645b34eb0a2e037836ea8e.\n\n", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-2163", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-2163", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-2163", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-2163", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-2163", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-2163" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-3090", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-3090", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-3090", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-3090", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-3090", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-3090" } }, - "CVE-2023-2166": { - "affected_versions": "v5.12-rc1-dontuse to v6.1", - "breaks": "4e096a18867a5a989b510f6999d9c6b6622e8f7b", - "cmt_msg": "can: af_can: fix NULL pointer dereference in can_rcv_filter", + "CVE-2023-3106": { + "affected_versions": "v3.15-rc1 to v4.8-rc7", + "breaks": "d3623099d3509fa68fa28235366049dd3156c63a", + "cmt_msg": "xfrm: fix crash in XFRM_MSG_GETSA netlink handler", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", - "Confidentiality": "None", - "Integrity": "None", + "Confidentiality": "High", + "Integrity": "High", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", - "score": 5.5 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 7.8 }, - "fixes": "0acc442309a0a1b01bcdaa135e56e6398a49439c", - "last_affected_version": "6.0", + "fixes": "1ba5bf993c6a3142e18e68ea6452b347f9cb5635", + "last_affected_version": "4.4.222", "last_modified": "2023-12-06", - "nvd_text": "A null pointer dereference issue was found in can protocol in net/can/af_can.c in the Linux before Linux. ml_priv may not be initialized in the receive path of CAN frames. A local user could use this flaw to crash the system or potentially cause a denial of service.", + "nvd_text": "A NULL pointer dereference vulnerability was found in netlink_dump. This issue can occur when the Netlink socket receives the message(sendmsg) for the XFRM_MSG_GETSA, XFRM_MSG_GETPOLICY type message, and the DUMP flag is set and can cause a denial of service or possibly another unspecified impact. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although it is unlikely.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-2166", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-2166", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-2166", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-2166", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-2166", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-2166" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-3106", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-3106", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-3106", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-3106", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-3106", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-3106" } }, - "CVE-2023-2176": { - "affected_versions": "v2.6.12-rc2 to v6.3-rc1", - "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", - "cmt_msg": "RDMA/core: Refactor rdma_bind_addr", + "CVE-2023-3108": { + "backport": true, + "breaks": "1d10eb2f156f5fc83cf6c7ce60441592e66eadb3", + "cmt_msg": "crypto: fix af_alg_make_sg() conversion to iov_iter", "cvss3": { - "Attack Complexity": "Low", + "Attack Complexity": "High", "Attack Vector": "Local", "Availability": "High", - "Confidentiality": "High", - "Integrity": "High", + "Confidentiality": "None", + "Integrity": "None", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", - "score": 7.8 + "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", + "score": 4.7 }, - "fixes": "8d037973d48c026224ab285e6a06985ccac6f7bf", + "fixes": "9399f0c51489ae8c16d6559b82a452fdc1895e91", "last_modified": "2023-12-06", - "nvd_text": "A vulnerability was found in compare_netdev_and_ip in drivers/infiniband/core/cma.c in RDMA in the Linux Kernel. The improper cleanup results in out-of-boundary read, where a local user can utilize this problem to crash the system or escalation of privilege.", + "nvd_text": "A flaw was found in the subsequent get_user_pages_fast in the Linux kernel\u2019s interface for symmetric key cipher algorithms in the skcipher_recvmsg of crypto/algif_skcipher.c function. This flaw allows a local user to crash the system.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-2176", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-2176", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-2176", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-2176", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-2176", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-2176" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-3108", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-3108", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-3108", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-3108", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-3108", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-3108" } }, - "CVE-2023-2177": { - "affected_versions": "v4.15-rc1 to v5.19", - "breaks": "5bbbbe32a43199c2b9ea5ea66fab6241c64beb51", - "cmt_msg": "sctp: leave the err path free in sctp_stream_init to sctp_stream_free", + "CVE-2023-31081": { + "affected_versions": "unk to unk", + "breaks": "", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", @@ -84436,157 +90834,135 @@ "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "score": 5.5 }, - "fixes": "181d8d2066c000ba0a0e6940a7ad80f1a0e68e9d", - "last_affected_version": "5.18", - "last_modified": "2024-02-02", - "nvd_text": "A null pointer dereference issue was found in the sctp network protocol in net/sctp/stream_sched.c in Linux Kernel. If stream_in allocation is failed, stream_out is freed which would further be accessed. A local user could use this flaw to crash the system or potentially cause a denial of service.", + "fixes": "", + "last_modified": "2023-12-06", + "nvd_text": "An issue was discovered in drivers/media/test-drivers/vidtv/vidtv_bridge.c in the Linux kernel 6.2. There is a NULL pointer dereference in vidtv_mux_stop_thread. In vidtv_stop_streaming, after dvb->mux=NULL occurs, it executes vidtv_mux_stop_thread(dvb->mux).", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-2177", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-2177", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-2177", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-2177", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-2177", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-2177" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-31081", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-31081", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-31081", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-31081", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-31081", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-31081" } }, - "CVE-2023-2194": { - "affected_versions": "v4.2-rc1 to v6.3-rc4", - "breaks": "f6505fbabc426b9e293da5bb702ace2eb1ccf87d", - "cmt_msg": "i2c: xgene-slimpro: Fix out-of-bounds bug in xgene_slimpro_i2c_xfer()", + "CVE-2023-31082": { + "affected_versions": "unk to unk", + "breaks": "", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", - "Confidentiality": "High", - "Integrity": "High", - "Privileges Required": "High", + "Confidentiality": "None", + "Integrity": "None", + "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", - "score": 6.7 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "score": 5.5 }, - "fixes": "92fbb6d1296f81f41f65effd7f5f8c0f74943d15", - "last_affected_version": "6.2.8", + "fixes": "", "last_modified": "2023-12-06", - "nvd_text": "An out-of-bounds write vulnerability was found in the Linux kernel's SLIMpro I2C device driver. The userspace \"data->block[0]\" variable was not capped to a number between 0-255 and was used as the size of a memcpy, possibly writing beyond the end of dma_buffer. This flaw could allow a local privileged user to crash the system or potentially achieve code execution.", + "nvd_text": "An issue was discovered in drivers/tty/n_gsm.c in the Linux kernel 6.2. There is a sleeping function called from an invalid context in gsmld_write, which will block the kernel.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-2194", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-2194", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-2194", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-2194", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-2194", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-2194" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-31082", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-31082", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-31082", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-31082", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-31082", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-31082" } }, - "CVE-2023-2235": { - "affected_versions": "v5.13-rc1 to v6.3-rc3", - "breaks": "2e498d0a74e5b88a6689ae1b811f247f91ff188e", - "cmt_msg": "perf: Fix check before add_event_to_groups() in perf_group_detach()", + "CVE-2023-31083": { + "affected_versions": "v2.6.12-rc2 to v6.6-rc1", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO", "cvss3": { - "Attack Complexity": "Low", + "Attack Complexity": "High", "Attack Vector": "Local", "Availability": "High", - "Confidentiality": "High", - "Integrity": "High", + "Confidentiality": "None", + "Integrity": "None", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", - "score": 7.8 + "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", + "score": 4.7 }, - "fixes": "fd0815f632c24878e325821943edccc7fde947a2", - "last_affected_version": "6.2.7", + "fixes": "9c33663af9ad115f90c076a1828129a3fbadea98", "last_modified": "2023-12-06", - "nvd_text": "A use-after-free vulnerability in the Linux Kernel Performance Events system can be exploited to achieve local privilege escalation.\n\nThe perf_group_detach function did not check the event's siblings' attach_state before calling add_event_to_groups(), but\u00a0remove_on_exec made it possible to call list_del_event() on before detaching from their group, making it possible to use a dangling pointer causing a use-after-free vulnerability.\n\nWe recommend upgrading past commit fd0815f632c24878e325821943edccc7fde947a2.\n\n", + "nvd_text": "An issue was discovered in drivers/bluetooth/hci_ldisc.c in the Linux kernel 6.2. In hci_uart_tty_ioctl, there is a race condition between HCIUARTSETPROTO and HCIUARTGETPROTO. HCI_UART_PROTO_SET is set before hu->proto is set. A NULL pointer dereference may occur.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-2235", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-2235", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-2235", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-2235", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-2235", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-2235" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-31083", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-31083", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-31083", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-31083", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-31083", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-31083" } }, - "CVE-2023-2236": { - "affected_versions": "v5.19-rc1 to v6.1-rc7", - "breaks": "61c1b44a21d70d4783db02198fbf68b132f4953c", - "cmt_msg": "io_uring/filetable: fix file reference underflow", + "CVE-2023-31084": { + "affected_versions": "v2.6.12-rc2 to v6.4-rc3", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*()", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", - "Confidentiality": "High", - "Integrity": "High", + "Confidentiality": "None", + "Integrity": "None", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", - "score": 7.8 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "score": 5.5 }, - "fixes": "9d94c04c0db024922e886c9fd429659f22f48ea4", - "last_affected_version": "6.0.10", + "cwe": "Unspecified", + "fixes": "b8c75e4a1b325ea0a9433fa8834be97b5836b946", "last_modified": "2023-12-06", - "nvd_text": "A use-after-free vulnerability in the Linux Kernel io_uring subsystem can be exploited to achieve local privilege escalation.\n\nBoth\u00a0io_install_fixed_file\u00a0and its callers call fput in a file in case of an error, causing a reference underflow which leads to a use-after-free vulnerability.\n\nWe recommend upgrading past commit 9d94c04c0db024922e886c9fd429659f22f48ea4.\n\n", + "nvd_text": "An issue was discovered in drivers/media/dvb-core/dvb_frontend.c in the Linux kernel 6.2. There is a blocking operation when a task is in !TASK_RUNNING. In dvb_frontend_get_event, wait_event_interruptible is called; the condition is dvb_frontend_test_event(fepriv,events). In dvb_frontend_test_event, down(&fepriv->sem) is called. However, wait_event_interruptible would put the process to sleep, and down(&fepriv->sem) may block the process.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-2236", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-2236", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-2236", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-2236", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-2236", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-2236" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-31084", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-31084", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-31084", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-31084", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-31084", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-31084" } }, - "CVE-2023-2248": { - "affected_versions": "v3.7-rc5 to v6.3", - "breaks": "3015f3d2a3cd9614294025849d3ed89fd2f3a7f5", - "cmt_msg": "net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg", - "fixes": "3037933448f60f9acb705997eae62013ecb81e0d", - "last_affected_version": "6.2", - "last_modified": "2023-12-06", - "nvd_text": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it was the duplicate of CVE-2023-31436.", - "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-2248", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-2248", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-2248", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-2248", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-2248", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-2248" - }, - "rejected": true - }, - "CVE-2023-2269": { - "affected_versions": "v2.6.33-rc1 to v6.4-rc1", - "breaks": "1d0f3ce83200edc5d43723c77c62b09ad6560294", - "cmt_msg": "dm ioctl: fix nested locking in table_clear() to remove deadlock concern", + "CVE-2023-31085": { + "affected_versions": "v2.6.22-rc1 to v6.6-rc5", + "breaks": "801c135ce73d5df1caf3eca35b66a10824ae0707", + "cmt_msg": "ubi: Refuse attaching if mtd's erasesize is 0", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", "Confidentiality": "None", "Integrity": "None", - "Privileges Required": "High", + "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", - "score": 4.4 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "score": 5.5 }, - "fixes": "3d32aaa7e66d5c1479a3c31d6c2c5d45dd0d3b89", - "last_affected_version": "6.3.1", + "fixes": "017c73a34a661a861712f7cc1393a123e5b2208c", + "last_affected_version": "6.5.6", "last_modified": "2023-12-06", - "nvd_text": "A denial of service problem was found, due to a possible recursive locking scenario, resulting in a deadlock in table_clear in drivers/md/dm-ioctl.c in the Linux Kernel Device Mapper-Multipathing sub-component.", + "nvd_text": "An issue was discovered in drivers/mtd/ubi/cdev.c in the Linux kernel 6.2. There is a divide-by-zero error in do_div(sz,mtd->erasesize), used indirectly by ctrl_cdev_ioctl, when mtd->erasesize is 0.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-2269", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-2269", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-2269", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-2269", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-2269", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-2269" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-31085", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-31085", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-31085", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-31085", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-31085", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-31085" } }, - "CVE-2023-22995": { - "affected_versions": "v2.6.12-rc2 to v5.17-rc1", - "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", - "cmt_msg": "usb: dwc3: dwc3-qcom: Add missing platform_device_put() in dwc3_qcom_acpi_register_core", + "CVE-2023-3111": { + "affected_versions": "v2.6.31-rc1 to v6.0-rc2", + "breaks": "5d4f98a28c7d334091c1b7744f48a1acdd2a4ae0", + "cmt_msg": "btrfs: unset reloc control if transaction commit fails in prepare_to_relocate()", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", @@ -84599,167 +90975,169 @@ "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "score": 7.8 }, - "cwe": "Unspecified", - "fixes": "fa0ef93868a6062babe1144df2807a8b1d4924d2", + "fixes": "85f02d6c856b9f3a0acf5219de6e32f58b9778eb", + "last_affected_version": "5.19.3", "last_modified": "2023-12-06", - "nvd_text": "In the Linux kernel before 5.17, an error path in dwc3_qcom_acpi_register_core in drivers/usb/dwc3/dwc3-qcom.c lacks certain platform_device_put and kfree calls.", + "nvd_text": "A use after free vulnerability was found in prepare_to_relocate in fs/btrfs/relocation.c in btrfs in the Linux Kernel. This possible flaw can be triggered by calling btrfs_ioctl_balance() before calling btrfs_ioctl_defrag().", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-22995", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-22995", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-22995", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-22995", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-22995", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-22995" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-3111", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-3111", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-3111", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-3111", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-3111", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-3111" } }, - "CVE-2023-22996": { - "affected_versions": "v5.16-rc1 to v5.18-rc1", - "breaks": "8c75d585b931ac874fbe4ee5a8f1811d20c2817f", - "cmt_msg": "soc: qcom: aoss: Fix missing put_device call in qmp_get", + "CVE-2023-3117": { + "affected_versions": "v3.16-rc1 to v6.4-rc7", + "breaks": "958bee14d0718ca7a5002c0f48a099d1d345812a", + "cmt_msg": "netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", - "Confidentiality": "None", - "Integrity": "None", + "Confidentiality": "High", + "Integrity": "High", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", - "score": 5.5 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 7.8 }, - "fixes": "4b41a9d0fe3db5f91078a380f62f0572c3ecf2dd", - "last_affected_version": "5.17.1", + "fixes": "1240eb93f0616b21c675416516ff3d74798fdc97", + "last_affected_version": "6.3.8", "last_modified": "2023-12-06", - "nvd_text": "In the Linux kernel before 5.17.2, drivers/soc/qcom/qcom_aoss.c does not release an of_find_device_by_node reference after use, e.g., with put_device.", + "nvd_text": "Rejected reason: Duplicate of CVE-2023-3390.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-22996", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-22996", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-22996", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-22996", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-22996", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-22996" - } + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-3117", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-3117", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-3117", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-3117", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-3117", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-3117" + }, + "rejected": true }, - "CVE-2023-22997": { - "affected_versions": "v5.17-rc1 to v6.2-rc1", - "breaks": "b1ae6dc41eaaa98bb75671e0f3665bfda248c3e7", - "cmt_msg": "module: Fix NULL vs IS_ERR checking for module_get_next_page", + "CVE-2023-31248": { + "affected_versions": "v5.9-rc1 to v6.5-rc2", + "breaks": "837830a4b439bfeb86c70b0115c280377c84714b", + "cmt_msg": "netfilter: nf_tables: do not ignore genmask when looking up chain by id", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", - "Confidentiality": "None", - "Integrity": "None", + "Confidentiality": "High", + "Integrity": "High", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", - "score": 5.5 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 7.8 }, - "fixes": "45af1d7aae7d5520d2858f8517a1342646f015db", - "last_affected_version": "6.1.1", + "fixes": "515ad530795c118f012539ed76d02bacfd426d89", + "last_affected_version": "6.4.3", "last_modified": "2023-12-06", - "nvd_text": "In the Linux kernel before 6.1.2, kernel/module/decompress.c misinterprets the module_get_next_page return value (expects it to be NULL in the error case, whereas it is actually an error pointer).", + "nvd_text": "Linux Kernel nftables Use-After-Free Local Privilege Escalation Vulnerability; `nft_chain_lookup_byid()` failed to check whether a chain was active and CAP_NET_ADMIN is in any user or network namespace", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-22997", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-22997", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-22997", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-22997", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-22997", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-22997" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-31248", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-31248", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-31248", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-31248", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-31248", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-31248" } }, - "CVE-2023-22998": { - "affected_versions": "v5.7-rc1 to v6.0-rc1", - "breaks": "2f2aa13724d56829d910b2fa8e80c502d388f106", - "cmt_msg": "drm/virtio: Fix NULL vs IS_ERR checking in virtio_gpu_object_shmem_init", + "CVE-2023-3141": { + "affected_versions": "v2.6.39-rc1 to v6.4-rc1", + "breaks": "9263412501022fecef844907129ee2513b5a89de", + "cmt_msg": "memstick: r592: Fix UAF bug in r592_remove due to race condition", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", - "Confidentiality": "None", + "Confidentiality": "High", "Integrity": "None", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", - "score": 5.5 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", + "score": 7.1 }, - "fixes": "c24968734abfed81c8f93dc5f44a7b7a9aecadfa", - "last_affected_version": "5.19.1", + "fixes": "63264422785021704c39b38f65a78ab9e4a186d7", + "last_affected_version": "6.3.3", "last_modified": "2023-12-06", - "nvd_text": "In the Linux kernel before 6.0.3, drivers/gpu/drm/virtio/virtgpu_object.c misinterprets the drm_gem_shmem_get_sg_table return value (expects it to be NULL in the error case, whereas it is actually an error pointer).", + "nvd_text": "A use-after-free flaw was found in r592_remove in drivers/memstick/host/r592.c in media access in the Linux Kernel. This flaw allows a local attacker to crash the system at device disconnect, possibly leading to a kernel information leak.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-22998", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-22998", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-22998", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-22998", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-22998", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-22998" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-3141", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-3141", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-3141", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-3141", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-3141", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-3141" } }, - "CVE-2023-22999": { - "affected_versions": "v5.12-rc1-dontuse to v5.17-rc1", - "breaks": "c25c210f590e7a37eecd865d84f97d1f40e39786", - "cmt_msg": "usb: dwc3: qcom: Fix NULL vs IS_ERR checking in dwc3_qcom_probe", + "CVE-2023-31436": { + "affected_versions": "v3.7-rc5 to v6.3", + "breaks": "3015f3d2a3cd9614294025849d3ed89fd2f3a7f5", + "cmt_msg": "net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", - "Confidentiality": "None", - "Integrity": "None", + "Confidentiality": "High", + "Integrity": "High", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", - "score": 5.5 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 7.8 }, - "fixes": "b52fe2dbb3e655eb1483000adfab68a219549e13", - "last_affected_version": "5.16.2", + "fixes": "3037933448f60f9acb705997eae62013ecb81e0d", + "last_affected_version": "6.2", "last_modified": "2023-12-06", - "nvd_text": "In the Linux kernel before 5.16.3, drivers/usb/dwc3/dwc3-qcom.c misinterprets the dwc3_qcom_create_urs_usb_platdev return value (expects it to be NULL in the error case, whereas it is actually an error pointer).", + "nvd_text": "qfq_change_class in net/sched/sch_qfq.c in the Linux kernel before 6.2.13 allows an out-of-bounds write because lmax can exceed QFQ_MIN_LMAX.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-22999", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-22999", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-22999", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-22999", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-22999", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-22999" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-31436", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-31436", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-31436", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-31436", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-31436", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-31436" } }, - "CVE-2023-23000": { - "affected_versions": "v4.14-rc6 to v5.17-rc1", - "breaks": "1df79cb3bae754e4a42240f9851ed82549a44f1a", - "cmt_msg": "phy: tegra: xusb: Fix return value of tegra_xusb_find_port_node function", + "CVE-2023-3159": { + "affected_versions": "v2.6.36-rc1 to v5.18-rc6", + "breaks": "850bb6f23b93c04ce1e4509a87fa607dc17d97c1", + "cmt_msg": "firewire: fix potential uaf in outbound_phy_packet_callback()", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", - "Confidentiality": "None", - "Integrity": "None", - "Privileges Required": "Low", + "Confidentiality": "High", + "Integrity": "High", + "Privileges Required": "High", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", - "score": 5.5 + "raw": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "score": 6.7 }, - "fixes": "045a31b95509c8f25f5f04ec5e0dec5cd09f2c5f", + "fixes": "b7c81f80246fac44077166f3e07103affe6db8ff", + "last_affected_version": "5.17.6", "last_modified": "2023-12-06", - "nvd_text": "In the Linux kernel before 5.17, drivers/phy/tegra/xusb.c mishandles the tegra_xusb_find_port_node return value. Callers expect NULL in the error case, but an error pointer is used.", + "nvd_text": "A use after free issue was discovered in driver/firewire in outbound_phy_packet_callback in the Linux Kernel. In this flaw a local attacker with special privilege may cause a use after free problem when queue_event() fails.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-23000", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-23000", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-23000", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-23000", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-23000", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-23000" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-3159", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-3159", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-3159", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-3159", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-3159", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-3159" } }, - "CVE-2023-23001": { - "affected_versions": "v5.11-rc1 to v5.17-rc1", - "breaks": "cf137b3ea49a04e0c843b12674afa4b1d23e827f", - "cmt_msg": "scsi: ufs: ufs-mediatek: Fix error checking in ufs_mtk_init_va09_pwr_ctrl()", + "CVE-2023-3161": { + "affected_versions": "v2.6.22-rc1 to v6.2-rc7", + "breaks": "2d2699d984924890f6dac8cf51c3b6311f56816c", + "cmt_msg": "fbcon: Check font dimension limits", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", @@ -84772,557 +91150,544 @@ "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "score": 5.5 }, - "fixes": "3ba880a12df5aa4488c18281701b5b1bc3d4531a", - "last_affected_version": "5.16.2", + "fixes": "2b09d5d364986f724f17001ccfe4126b9b43a0be", + "last_affected_version": "6.1.10", "last_modified": "2023-12-06", - "nvd_text": "In the Linux kernel before 5.16.3, drivers/scsi/ufs/ufs-mediatek.c misinterprets the regulator_get return value (expects it to be NULL in the error case, whereas it is actually an error pointer).", + "nvd_text": "A flaw was found in the Framebuffer Console (fbcon) in the Linux Kernel. When providing font->width and font->height greater than 32 to fbcon_set_font, since there are no checks in place, a shift-out-of-bounds occurs leading to undefined behavior and possible denial of service.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-23001", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-23001", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-23001", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-23001", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-23001", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-23001" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-3161", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-3161", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-3161", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-3161", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-3161", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-3161" } }, - "CVE-2023-23002": { - "affected_versions": "v5.7-rc1 to v5.17-rc1", - "breaks": "77131dfec6af114efd32610b4a6bbecd934e37d5", - "cmt_msg": "Bluetooth: hci_qca: Fix NULL vs IS_ERR_OR_NULL check in qca_serdev_probe", + "CVE-2023-3212": { + "affected_versions": "v2.6.24-rc1 to v6.4-rc2", + "breaks": "16615be18cadf53ee6f8a4f0bdd647f0753421b1", + "cmt_msg": "gfs2: Don't deref jdesc in evict", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", "Confidentiality": "None", "Integrity": "None", - "Privileges Required": "Low", + "Privileges Required": "High", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", - "score": 5.5 + "raw": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "score": 4.4 }, - "fixes": "6845667146a28c09b5dfc401c1ad112374087944", - "last_affected_version": "5.16.2", + "fixes": "504a10d9e46bc37b23d0a1ae2f28973c8516e636", + "last_affected_version": "6.3.6", "last_modified": "2023-12-06", - "nvd_text": "In the Linux kernel before 5.16.3, drivers/bluetooth/hci_qca.c misinterprets the devm_gpiod_get_index_optional return value (expects it to be NULL in the error case, whereas it is actually an error pointer).", + "nvd_text": "A NULL pointer dereference issue was found in the gfs2 file system in the Linux kernel. It occurs on corrupt gfs2 file systems when the evict code tries to reference the journal descriptor structure after it has been freed and set to NULL. A privileged local user could use this flaw to cause a kernel panic.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-23002", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-23002", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-23002", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-23002", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-23002", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-23002" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-3212", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-3212", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-3212", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-3212", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-3212", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-3212" } }, - "CVE-2023-23003": { - "affected_versions": "v5.16-rc1 to v5.16-rc6", - "breaks": "cb94a02e7494c001fa8b5a4c5e16693fafd98530", + "CVE-2023-3220": { + "affected_versions": "v4.19-rc1 to v6.3-rc1", + "breaks": "25fdd5933e4c0f5fe2ea5cd59994f8ac5fbe90ef", + "cmt_msg": "drm/msm/dpu: Add check for pstates", "cvss3": { - "Attack Complexity": "High", + "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", "Confidentiality": "None", "Integrity": "None", - "Privileges Required": "High", + "Privileges Required": "Low", "Scope": "Unchanged", - "User Interaction": "Required", - "raw": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H", - "score": 4.0 + "User Interaction": "None", + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "score": 5.5 }, - "fixes": "0a515a06c5ebfa46fee3ac519e418f801e718da4", + "fixes": "93340e10b9c5fc86730d149636e0aa8b47bb5a34", + "last_affected_version": "6.2.2", "last_modified": "2023-12-06", - "nvd_text": "In the Linux kernel before 5.16, tools/perf/util/expr.c lacks a check for the hashmap__new return value.", + "nvd_text": "An issue was discovered in the Linux kernel through 6.1-rc8. dpu_crtc_atomic_check in drivers/gpu/drm/msm/disp/dpu1/dpu_crtc.c lacks check of the return value of kzalloc() and will cause the NULL Pointer Dereference.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-23003", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-23003", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-23003", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-23003", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-23003", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-23003" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-3220", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-3220", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-3220", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-3220", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-3220", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-3220" } }, - "CVE-2023-23004": { - "affected_versions": "v4.20-rc1 to v5.19-rc1", - "breaks": "1f23a56a46b81de50eb8b898f06296ca06720a99", - "cmt_msg": "malidp: Fix NULL vs IS_ERR() checking", + "CVE-2023-32233": { + "affected_versions": "v2.6.12-rc2 to v6.4-rc1", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "netfilter: nf_tables: deactivate anonymous set from preparation phase", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", - "Confidentiality": "None", - "Integrity": "None", + "Confidentiality": "High", + "Integrity": "High", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", - "score": 5.5 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 7.8 }, - "fixes": "15342f930ebebcfe36f2415049736a77d7d2e045", - "last_affected_version": "5.15.99", + "fixes": "c1592a89942e9678f7d9c8030efa777c0d57edab", + "last_affected_version": "6.3.1", "last_modified": "2023-12-06", - "nvd_text": "In the Linux kernel before 5.19, drivers/gpu/drm/arm/malidp_planes.c misinterprets the get_sg_table return value (expects it to be NULL in the error case, whereas it is actually an error pointer).", + "nvd_text": "In the Linux kernel through 6.3.1, a use-after-free in Netfilter nf_tables when processing batch requests can be abused to perform arbitrary read and write operations on kernel memory. Unprivileged local users can obtain root privileges. This occurs because anonymous sets are mishandled.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-23004", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-23004", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-23004", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-23004", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-23004", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-23004" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-32233", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-32233", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-32233", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-32233", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-32233", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-32233" } }, - "CVE-2023-23005": { - "affected_versions": "v6.1-rc1 to v6.2-rc1", - "breaks": "7b88bda3761b95856cf97822efe8281c8100067b", - "cmt_msg": "mm/demotion: fix NULL vs IS_ERR checking in memory_tier_init", + "CVE-2023-32247": { + "affected_versions": "v5.15-rc1 to v6.4-rc1", + "breaks": "0626e6641f6b467447c81dd7678a69c66f7746cf", + "cmt_msg": "ksmbd: destroy expired sessions", "cvss3": { "Attack Complexity": "Low", - "Attack Vector": "Local", + "Attack Vector": "Network", "Availability": "High", "Confidentiality": "None", "Integrity": "None", - "Privileges Required": "Low", + "Privileges Required": "None", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", - "score": 5.5 + "raw": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "score": 7.5 }, - "fixes": "4a625ceee8a0ab0273534cb6b432ce6b331db5ee", - "last_modified": "2023-12-06", - "nvd_text": "In the Linux kernel before 6.2, mm/memory-tiers.c misinterprets the alloc_memory_type return value (expects it to be NULL in the error case, whereas it is actually an error pointer). NOTE: this is disputed by third parties because there are no realistic cases in which a user can cause the alloc_memory_type error case to be reached.", + "fixes": "ea174a91893956450510945a0c5d1a10b5323656", + "last_affected_version": "6.3.1", + "last_modified": "2023-12-27", + "nvd_text": "A flaw was found in the Linux kernel's ksmbd, a high-performance in-kernel SMB server. The specific flaw exists within the handling of SMB2_SESSION_SETUP commands. The issue results from the lack of control of resource consumption. An attacker can leverage this vulnerability to create a denial-of-service condition on the system.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-23005", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-23005", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-23005", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-23005", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-23005", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-23005" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-32247", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-32247", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-32247", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-32247", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-32247", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-32247" } }, - "CVE-2023-23006": { - "affected_versions": "v5.4-rc1 to v5.16-rc8", - "breaks": "4ec9e7b02697eca8dc9853ea559c18029c38da36", - "cmt_msg": "net/mlx5: DR, Fix NULL vs IS_ERR checking in dr_domain_init_resources", + "CVE-2023-32248": { + "affected_versions": "v5.15-rc1 to v6.4-rc1", + "breaks": "0626e6641f6b467447c81dd7678a69c66f7746cf", + "cmt_msg": "ksmbd: fix NULL pointer dereference in smb2_get_info_filesystem()", "cvss3": { "Attack Complexity": "Low", - "Attack Vector": "Local", + "Attack Vector": "Network", "Availability": "High", "Confidentiality": "None", "Integrity": "None", - "Privileges Required": "Low", + "Privileges Required": "None", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", - "score": 5.5 + "raw": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "score": 7.5 }, - "fixes": "6b8b42585886c59a008015083282aae434349094", - "last_affected_version": "5.15.12", + "fixes": "3ac00a2ab69b34189942afa9e862d5170cdcb018", + "last_affected_version": "6.3.1", "last_modified": "2023-12-06", - "nvd_text": "In the Linux kernel before 5.15.13, drivers/net/ethernet/mellanox/mlx5/core/steering/dr_domain.c misinterprets the mlx5_get_uars_page return value (expects it to be NULL in the error case, whereas it is actually an error pointer).", + "nvd_text": "A flaw was found in the Linux kernel's ksmbd, a high-performance in-kernel SMB server. The specific flaw exists within the handling of SMB2_TREE_CONNECT and SMB2_QUERY_INFO commands. The issue results from the lack of proper validation of a pointer prior to accessing it. An attacker can leverage this vulnerability to create a denial-of-service condition on the system.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-23006", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-23006", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-23006", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-23006", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-23006", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-23006" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-32248", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-32248", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-32248", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-32248", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-32248", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-32248" } }, - "CVE-2023-23039": { - "affected_versions": "unk to unk", - "breaks": "", + "CVE-2023-32250": { + "affected_versions": "v5.15-rc1 to v6.4-rc1", + "breaks": "0626e6641f6b467447c81dd7678a69c66f7746cf", + "cmt_msg": "ksmbd: fix racy issue from session setup and logoff", "cvss3": { "Attack Complexity": "High", - "Attack Vector": "Physical", + "Attack Vector": "Network", "Availability": "High", - "Confidentiality": "None", + "Confidentiality": "High", "Integrity": "High", "Privileges Required": "None", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H", - "score": 5.7 + "raw": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "score": 8.1 }, - "fixes": "", - "last_modified": "2023-12-06", - "nvd_text": "An issue was discovered in the Linux kernel through 6.2.0-rc2. drivers/tty/vcc.c has a race condition and resultant use-after-free if a physically proximate attacker removes a VCC device while calling open(), aka a race condition between vcc_open() and vcc_remove().", + "fixes": "f5c779b7ddbda30866cf2a27c63e34158f858c73", + "last_affected_version": "6.3.1", + "last_modified": "2023-12-27", + "nvd_text": "A flaw was found in the Linux kernel's ksmbd, a high-performance in-kernel SMB server. The specific flaw exists within the processing of SMB2_SESSION_SETUP commands. The issue results from the lack of proper locking when performing operations on an object. An attacker can leverage this vulnerability to execute code in the context of the kernel.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-23039", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-23039", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-23039", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-23039", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-23039", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-23039" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-32250", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-32250", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-32250", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-32250", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-32250", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-32250" } }, - "CVE-2023-23454": { - "affected_versions": "v2.6.12-rc2 to v6.2-rc3", - "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", - "cmt_msg": "net: sched: cbq: dont intepret cls results when asked to drop", + "CVE-2023-32252": { + "affected_versions": "v5.15-rc1 to v6.4-rc1", + "breaks": "0626e6641f6b467447c81dd7678a69c66f7746cf", + "cmt_msg": "ksmbd: fix racy issue from session setup and logoff", "cvss3": { "Attack Complexity": "Low", - "Attack Vector": "Local", + "Attack Vector": "Network", "Availability": "High", "Confidentiality": "None", "Integrity": "None", - "Privileges Required": "Low", + "Privileges Required": "None", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", - "score": 5.5 + "raw": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "score": 7.5 }, - "cwe": "Access of Resource Using Incompatible Type ('Type Confusion')", - "fixes": "caa4b35b4317d5147b3ab0fbdc9c075c7d2e9c12", - "last_affected_version": "6.1.4", - "last_modified": "2023-12-06", - "nvd_text": "cbq_classify in net/sched/sch_cbq.c in the Linux kernel through 6.1.4 allows attackers to cause a denial of service (slab-out-of-bounds read) because of type confusion (non-negative numbers can sometimes indicate a TC_ACT_SHOT condition rather than valid classification results).", + "fixes": "f5c779b7ddbda30866cf2a27c63e34158f858c73", + "last_affected_version": "6.3.1", + "last_modified": "2023-12-27", + "nvd_text": "A flaw was found in the Linux kernel's ksmbd, a high-performance in-kernel SMB server. The specific flaw exists within the handling of SMB2_LOGOFF commands. The issue results from the lack of proper validation of a pointer prior to accessing it. An attacker can leverage this vulnerability to create a denial-of-service condition on the system.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-23454", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-23454", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-23454", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-23454", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-23454", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-23454" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-32252", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-32252", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-32252", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-32252", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-32252", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-32252" } }, - "CVE-2023-23455": { - "affected_versions": "v2.6.23-rc1 to v6.2-rc3", - "breaks": "b0188d4dbe5f4285372dd033acf7c92a97006629", - "cmt_msg": "net: sched: atm: dont intepret cls results when asked to drop", + "CVE-2023-32254": { + "affected_versions": "v5.15-rc1 to v6.4-rc1", + "breaks": "0626e6641f6b467447c81dd7678a69c66f7746cf", + "cmt_msg": "ksmbd: fix racy issue under cocurrent smb2 tree disconnect", "cvss3": { - "Attack Complexity": "Low", - "Attack Vector": "Local", + "Attack Complexity": "High", + "Attack Vector": "Network", "Availability": "High", - "Confidentiality": "None", - "Integrity": "None", - "Privileges Required": "Low", + "Confidentiality": "High", + "Integrity": "High", + "Privileges Required": "None", + "Scope": "Unchanged", + "User Interaction": "None", + "raw": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "score": 8.1 + }, + "fixes": "30210947a343b6b3ca13adc9bfc88e1543e16dd5", + "last_affected_version": "6.3.1", + "last_modified": "2023-12-27", + "nvd_text": "A flaw was found in the Linux kernel's ksmbd, a high-performance in-kernel SMB server. The specific flaw exists within the processing of SMB2_TREE_DISCONNECT commands. The issue results from the lack of proper locking when performing operations on an object. An attacker can leverage this vulnerability to execute code in the context of the kernel.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-32254", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-32254", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-32254", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-32254", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-32254", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-32254" + } + }, + "CVE-2023-32257": { + "affected_versions": "v5.15-rc1 to v6.4-rc1", + "breaks": "0626e6641f6b467447c81dd7678a69c66f7746cf", + "cmt_msg": "ksmbd: fix racy issue from session setup and logoff", + "cvss3": { + "Attack Complexity": "High", + "Attack Vector": "Network", + "Availability": "High", + "Confidentiality": "High", + "Integrity": "High", + "Privileges Required": "None", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", - "score": 5.5 + "raw": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "score": 8.1 }, - "cwe": "Access of Resource Using Incompatible Type ('Type Confusion')", - "fixes": "a2965c7be0522eaa18808684b7b82b248515511b", - "last_affected_version": "6.1.4", - "last_modified": "2023-12-06", - "nvd_text": "atm_tc_enqueue in net/sched/sch_atm.c in the Linux kernel through 6.1.4 allows attackers to cause a denial of service because of type confusion (non-negative numbers can sometimes indicate a TC_ACT_SHOT condition rather than valid classification results).", + "fixes": "f5c779b7ddbda30866cf2a27c63e34158f858c73", + "last_affected_version": "6.3.1", + "last_modified": "2023-12-27", + "nvd_text": "A flaw was found in the Linux kernel's ksmbd, a high-performance in-kernel SMB server. The specific flaw exists within the processing of SMB2_SESSION_SETUP and SMB2_LOGOFF commands. The issue results from the lack of proper locking when performing operations on an object. An attacker can leverage this vulnerability to execute code in the context of the kernel.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-23455", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-23455", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-23455", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-23455", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-23455", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-23455" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-32257", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-32257", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-32257", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-32257", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-32257", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-32257" } }, - "CVE-2023-23559": { - "affected_versions": "v2.6.35-rc1 to v6.2-rc5", - "breaks": "80f8c5b434f94926c6489d7350d58aecb53ab70f", - "cmt_msg": "wifi: rndis_wlan: Prevent buffer overflow in rndis_query_oid", + "CVE-2023-32258": { + "affected_versions": "v5.15-rc1 to v6.4-rc1", + "breaks": "0626e6641f6b467447c81dd7678a69c66f7746cf", + "cmt_msg": "ksmbd: fix racy issue from smb2 close and logoff with multichannel", "cvss3": { - "Attack Complexity": "Low", - "Attack Vector": "Local", + "Attack Complexity": "High", + "Attack Vector": "Network", "Availability": "High", "Confidentiality": "High", "Integrity": "High", - "Privileges Required": "Low", + "Privileges Required": "None", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", - "score": 7.8 + "raw": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "score": 8.1 }, - "cwe": "Integer Overflow or Wraparound", - "fixes": "b870e73a56c4cccbec33224233eaf295839f228c", - "last_affected_version": "6.1.8", - "last_modified": "2023-12-06", - "nvd_text": "In rndis_query_oid in drivers/net/wireless/rndis_wlan.c in the Linux kernel through 6.1.5, there is an integer overflow in an addition.", + "fixes": "abcc506a9a71976a8b4c9bf3ee6efd13229c1e19", + "last_affected_version": "6.3.1", + "last_modified": "2023-12-27", + "nvd_text": "A flaw was found in the Linux kernel's ksmbd, a high-performance in-kernel SMB server. The specific flaw exists within the processing of SMB2_LOGOFF and SMB2_CLOSE commands. The issue results from the lack of proper locking when performing operations on an object. An attacker can leverage this vulnerability to execute code in the context of the kernel.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-23559", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-23559", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-23559", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-23559", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-23559", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-23559" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-32258", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-32258", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-32258", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-32258", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-32258", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-32258" } }, - "CVE-2023-23586": { - "affected_versions": "v5.10-rc1 to v5.12-rc1-dontuse", - "breaks": "500a373d731ac506612db12631ec21295c1ff360", - "cmt_msg": "io_uring: remove io_identity", + "CVE-2023-32269": { + "affected_versions": "v2.6.12-rc2 to v6.2-rc7", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "netrom: Fix use-after-free caused by accept on already connected socket", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", - "Availability": "None", + "Availability": "High", "Confidentiality": "High", - "Integrity": "None", - "Privileges Required": "Low", + "Integrity": "High", + "Privileges Required": "High", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", - "score": 5.5 + "raw": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "score": 6.7 }, - "fixes": "4379bf8bd70b5de6bba7d53015b0c36c57a634ee", + "fixes": "611792920925fb088ddccbe2783c7f92fdfb6b64", + "last_affected_version": "6.1.10", "last_modified": "2023-12-06", - "nvd_text": "Due to a vulnerability in the io_uring subsystem, it is possible to leak kernel memory information to the user process.\u00a0timens_install calls current_is_single_threaded to determine if the current process is single-threaded, but this call does not consider io_uring's io_worker threads, thus it is possible to insert a time namespace's vvar page to process's memory space via a page fault. When this time namespace is destroyed, the vvar page is also freed, but not removed from the process' memory, and a next page allocated by the kernel will be still available from the user-space process and can leak memory contents via this (read-only) use-after-free vulnerability. We recommend upgrading past version 5.10.161 or commit\u00a0 788d0824269bef539fe31a785b1517882eafed93 https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/io_uring \n", + "nvd_text": "An issue was discovered in the Linux kernel before 6.1.11. In net/netrom/af_netrom.c, there is a use-after-free because accept is also allowed for a successfully connected AF_NETROM socket. However, in order for an attacker to exploit this, the system must have netrom routing configured or the attacker must have the CAP_NET_ADMIN capability.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-23586", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-23586", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-23586", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-23586", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-23586", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-23586" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-32269", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-32269", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-32269", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-32269", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-32269", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-32269" } }, - "CVE-2023-2430": { - "affected_versions": "v5.18-rc1 to v6.2-rc5", - "breaks": "4f57f06ce2186c31c3da52386125dc57b1cd6f96", - "cmt_msg": "io_uring/msg_ring: fix missing lock on overflow for IOPOLL", + "CVE-2023-32629": { + "affected_versions": "v5.19-rc1 to unk", + "breaks": "c914c0e27eb0843b7cf3bec71d6f34d53a3a671e", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", - "Confidentiality": "None", - "Integrity": "None", + "Confidentiality": "High", + "Integrity": "High", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", - "score": 5.5 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 7.8 }, - "fixes": "e12d7a46f65ae4b7d58a5e0c1cbfa825cf8d830d", - "last_affected_version": "6.1.49", - "last_modified": "2024-01-15", - "nvd_text": "A vulnerability was found due to missing lock for IOPOLL flaw in io_cqring_event_overflow() in io_uring.c in Linux Kernel. This flaw allows a local attacker with user privilege to trigger a Denial of Service threat.", - "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-2430", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-2430", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-2430", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-2430", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-2430", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-2430" - } - }, - "CVE-2023-2483": { - "affected_versions": "v4.9-rc1 to v6.3-rc4", - "breaks": "b9b17debc69d27cd55e21ee51a5ba7fc50a426cf", - "cmt_msg": "net: qcom/emac: Fix use after free bug in emac_remove due to race condition", - "fixes": "6b6bc5b8bd2d4ca9e1efa9ae0f98a0b0687ace75", - "last_affected_version": "6.2.8", + "fixes": "", "last_modified": "2023-12-06", - "nvd_text": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2023-33203. Reason: This candidate is a reservation duplicate of CVE-2023-33203. Notes: All CVE users should reference CVE-2023-33203 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.", + "nvd_text": "Local privilege escalation vulnerability in Ubuntu Kernels overlayfs ovl_copy_up_meta_inode_data skip permission checks when calling ovl_do_setxattr on Ubuntu kernels", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-2483", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-2483", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-2483", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-2483", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-2483", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-2483" - }, - "rejected": true + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-32629", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-32629", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-32629", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-32629", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-32629", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-32629" + } }, - "CVE-2023-25012": { - "affected_versions": "v5.6-rc4 to v6.3-rc1", - "breaks": "4eb1b01de5b9d8596d6c103efcf1a15cfc1bedf7", - "cmt_msg": "HID: bigben: use spinlock to safely schedule workers", + "CVE-2023-3268": { + "affected_versions": "v2.6.22-rc7 to v6.4-rc1", + "breaks": "8d62fdebdaf9b866c7e236a8f5cfe90e6dba5773", + "cmt_msg": "relayfs: fix out-of-bounds access in relay_file_read", "cvss3": { "Attack Complexity": "Low", - "Attack Vector": "Physical", + "Attack Vector": "Local", "Availability": "High", - "Confidentiality": "None", + "Confidentiality": "High", "Integrity": "None", - "Privileges Required": "None", + "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", - "score": 4.6 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", + "score": 7.1 }, - "fixes": "76ca8da989c7d97a7f76c75d475fe95a584439d7", - "last_affected_version": "6.2.2", + "fixes": "43ec16f1450f4936025a9bdf1a273affdb9732c1", + "last_affected_version": "6.3.1", "last_modified": "2023-12-06", - "nvd_text": "The Linux kernel through 6.1.9 has a Use-After-Free in bigben_remove in drivers/hid/hid-bigbenff.c via a crafted USB device because the LED controllers remain registered for too long.", + "nvd_text": "An out of bounds (OOB) memory access flaw was found in the Linux kernel in relay_file_read_start_pos in kernel/relay.c in the relayfs. This flaw could allow a local attacker to crash the system or leak kernel internal information.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-25012", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-25012", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-25012", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-25012", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-25012", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-25012" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-3268", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-3268", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-3268", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-3268", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-3268", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-3268" } }, - "CVE-2023-2513": { - "affected_versions": "v2.6.19-rc2 to v6.0-rc1", - "breaks": "ac27a0ec112a089f1a5102bc8dffc79c8c815571", - "cmt_msg": "ext4: fix use-after-free in ext4_xattr_set_entry", + "CVE-2023-3269": { + "affected_versions": "v6.1-rc1 to v6.5-rc1", + "breaks": "54a611b605901c7d5d05b6b8f5d04a6ceb0962aa", + "cmt_msg": "mm: introduce new 'lock_mm_and_find_vma()' page fault helper", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", "Confidentiality": "High", "Integrity": "High", - "Privileges Required": "High", + "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", - "score": 6.7 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 7.8 }, - "fixes": "67d7d8ad99beccd9fe92d585b87f1760dc9018e3", - "last_affected_version": "5.19.1", + "fixes": "c2508ec5a58db67093f4fb8bf89a9a7c53a109e9", + "last_affected_version": "6.4.0", "last_modified": "2023-12-06", - "nvd_text": "A use-after-free vulnerability was found in the Linux kernel's ext4 filesystem in the way it handled the extra inode size for extended attributes. This flaw could allow a privileged local user to cause a system crash or other undefined behaviors.", + "name": "StackRot", + "nvd_text": "A vulnerability exists in the memory management subsystem of the Linux kernel. The lock handling for accessing and updating virtual memory areas (VMAs) is incorrect, leading to use-after-free problems. This issue can be successfully exploited to execute arbitrary kernel code, escalate containers, and gain root privileges.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-2513", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-2513", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-2513", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-2513", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-2513", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-2513" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-3269", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-3269", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-3269", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-3269", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-3269", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-3269" } }, - "CVE-2023-25775": { - "affected_versions": "v5.14-rc1 to v6.6-rc1", - "breaks": "b48c24c2d710cf34810c555dcef883a3d35a9c08", - "cmt_msg": "RDMA/irdma: Prevent zero-length STAG registration", + "CVE-2023-3312": { + "affected_versions": "v6.2-rc1 to v6.4-rc1", + "breaks": "054a3ef683a176a509cc9b37f762029aae942495", + "cmt_msg": "cpufreq: qcom-cpufreq-hw: fix double IO unmap and resource release on exit", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Network", "Availability": "High", - "Confidentiality": "High", - "Integrity": "High", + "Confidentiality": "None", + "Integrity": "None", "Privileges Required": "None", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", - "score": 9.8 - }, - "cwe": "Unspecified", - "fixes": "bb6d73d9add68ad270888db327514384dfa44958", - "last_affected_version": "6.5.2", - "last_modified": "2023-12-27", - "nvd_text": "Improper access control in the Intel(R) Ethernet Controller RDMA driver for linux before version 1.9.30 may allow an unauthenticated user to potentially enable escalation of privilege via network access.", - "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-25775", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-25775", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-25775", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-25775", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-25775", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-25775" - } - }, - "CVE-2023-2598": { - "affected_versions": "v6.3-rc1 to v6.4-rc1", - "breaks": "57bebf807e2abcf87d96b9de1266104ee2d8fc2f", - "cmt_msg": "io_uring/rsrc: check for nonconsecutive pages", - "cvss3": { - "Attack Complexity": "Low", - "Attack Vector": "Local", - "Availability": "High", - "Confidentiality": "High", - "Integrity": "High", - "Privileges Required": "Low", - "Scope": "Unchanged", - "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", - "score": 7.8 + "raw": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "score": 7.5 }, - "fixes": "776617db78c6d208780e7c69d4d68d1fa82913de", + "fixes": "ba5e770c9698782bc203bbf5cf3b36a77720bdbe", "last_affected_version": "6.3.1", "last_modified": "2023-12-06", - "nvd_text": "A flaw was found in the fixed buffer registration code for io_uring (io_sqe_buffer_register in io_uring/rsrc.c) in the Linux kernel that allows out-of-bounds access to physical memory beyond the end of the buffer. This flaw enables full local privilege escalation.", + "nvd_text": "A vulnerability was found in drivers/cpufreq/qcom-cpufreq-hw.c in cpufreq subsystem in the Linux Kernel. This flaw, during device unbind will lead to double release problem leading to denial of service.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-2598", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-2598", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-2598", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-2598", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-2598", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-2598" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-3312", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-3312", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-3312", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-3312", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-3312", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-3312" } }, - "CVE-2023-26242": { - "affected_versions": "v4.19-rc1 to unk", - "breaks": "857a26222ff75eecf7d701ef0e91e4fbf6efa663", + "CVE-2023-3317": { + "affected_versions": "v6.2-rc1 to v6.3-rc6", + "breaks": "034ae28b56f13dc1f2beb3fa294b455f57ede9cb", + "cmt_msg": "wifi: mt76: mt7921: Fix use-after-free in fw features query.", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", "Confidentiality": "High", - "Integrity": "High", + "Integrity": "None", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", - "score": 7.8 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", + "score": 7.1 }, - "fixes": "", + "fixes": "2ceb76f734e37833824b7fab6af17c999eb48d2b", + "last_affected_version": "6.2.14", "last_modified": "2023-12-06", - "nvd_text": "afu_mmio_region_get_by_offset in drivers/fpga/dfl-afu-region.c in the Linux kernel through 6.1.12 has an integer overflow.", + "nvd_text": "A use-after-free flaw was found in mt7921_check_offload_capability in drivers/net/wireless/mediatek/mt76/mt7921/init.c in wifi mt76/mt7921 sub-component in the Linux Kernel. This flaw could allow an attacker to crash the system after 'features' memory release. This vulnerability could even lead to a kernel information leak problem.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-26242", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-26242", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-26242", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-26242", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-26242", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-26242" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-3317", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-3317", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-3317", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-3317", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-3317", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-3317" } }, - "CVE-2023-2640": { - "affected_versions": "v5.19-rc1 to unk", - "breaks": "c914c0e27eb0843b7cf3bec71d6f34d53a3a671e", + "CVE-2023-33203": { + "affected_versions": "v4.9-rc1 to v6.3-rc4", + "breaks": "b9b17debc69d27cd55e21ee51a5ba7fc50a426cf", + "cmt_msg": "net: qcom/emac: Fix use after free bug in emac_remove due to race condition", "cvss3": { - "Attack Complexity": "Low", - "Attack Vector": "Local", + "Attack Complexity": "High", + "Attack Vector": "Physical", "Availability": "High", "Confidentiality": "High", "Integrity": "High", - "Privileges Required": "Low", + "Privileges Required": "None", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", - "score": 7.8 + "raw": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "score": 6.4 }, - "fixes": "", + "fixes": "6b6bc5b8bd2d4ca9e1efa9ae0f98a0b0687ace75", + "last_affected_version": "6.2.8", "last_modified": "2023-12-06", - "nvd_text": "On Ubuntu kernels carrying both c914c0e27eb0 and \"UBUNTU: SAUCE: overlayfs: Skip permission checking for trusted.overlayfs.* xattrs\", an unprivileged user may set privileged extended attributes on the mounted files, leading them to be set on the upper files without the appropriate security checks.", + "nvd_text": "The Linux kernel before 6.2.9 has a race condition and resultant use-after-free in drivers/net/ethernet/qualcomm/emac/emac.c if a physically proximate attacker unplugs an emac based device.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-2640", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-2640", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-2640", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-2640", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-2640", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-2640" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-33203", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-33203", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-33203", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-33203", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-33203", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-33203" } }, - "CVE-2023-26544": { - "affected_versions": "v5.15-rc1 to v6.2-rc1", - "breaks": "4342306f0f0d5ff4315a204d315c1b51b914fca5", - "cmt_msg": "fs/ntfs3: Fix slab-out-of-bounds read in run_unpack", + "CVE-2023-33250": { + "affected_versions": "v6.2-rc1 to v6.5-rc1", + "breaks": "2ff4bed7fee72ba1abfcff5f11ae8f8e570353f2", + "cmt_msg": "iommufd: Call iopt_area_contig_done() under the lock", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", - "Confidentiality": "High", - "Integrity": "High", - "Privileges Required": "Low", + "Confidentiality": "None", + "Integrity": "None", + "Privileges Required": "High", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", - "score": 7.8 + "raw": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "score": 4.4 }, - "fixes": "887bfc546097fbe8071dac13b2fef73b77920899", - "last_affected_version": "6.1.2", + "fixes": "dbe245cdf5189e88d680379ed13901356628b650", + "last_affected_version": "6.4.3", "last_modified": "2023-12-06", - "nvd_text": "In the Linux kernel 6.0.8, there is a use-after-free in run_unpack in fs/ntfs3/run.c, related to a difference between NTFS sector size and media sector size.", + "nvd_text": "The Linux kernel 6.3 has a use-after-free in iopt_unmap_iova_range in drivers/iommu/iommufd/io_pagetable.c.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-26544", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-26544", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-26544", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-26544", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-26544", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-26544" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-33250", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-33250", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-33250", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-33250", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-33250", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-33250" } }, - "CVE-2023-26545": { - "affected_versions": "v4.1-rc8 to v6.2", - "breaks": "0fae3bf018d97b210051c8797a49d66d31071847", - "cmt_msg": "net: mpls: fix stale pointer if allocation fails during device rename", + "CVE-2023-33288": { + "affected_versions": "v2.6.39-rc1 to v6.3-rc4", + "breaks": "97774672573ac4355bd12cf84b202555c1131b69", + "cmt_msg": "power: supply: bq24190: Fix use after free bug in bq24190_remove due to race condition", "cvss3": { "Attack Complexity": "High", "Attack Vector": "Local", @@ -85335,108 +91700,110 @@ "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "score": 4.7 }, - "fixes": "fda6c89fe3d9aca073495a664e1d5aea28cd4377", - "last_affected_version": "6.1", + "fixes": "47c29d69212911f50bdcdd0564b5999a559010d4", + "last_affected_version": "6.2.8", "last_modified": "2023-12-06", - "nvd_text": "In the Linux kernel before 6.1.13, there is a double free in net/mpls/af_mpls.c upon an allocation failure (for registering the sysctl table under a new location) during the renaming of a device.", + "nvd_text": "An issue was discovered in the Linux kernel before 6.2.9. A use-after-free was found in bq24190_remove in drivers/power/supply/bq24190_charger.c. It could allow a local attacker to crash the system due to a race condition.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-26545", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-26545", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-26545", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-26545", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-26545", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-26545" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-33288", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-33288", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-33288", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-33288", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-33288", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-33288" } }, - "CVE-2023-26605": { - "affected_versions": "v6.1-rc1 to v6.1-rc7", - "breaks": "cbfecb927f429a6fa613d74b998496bd71e4438a", + "CVE-2023-3338": { + "affected_versions": "v2.6.12-rc2 to v6.1-rc1", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "Remove DECnet support from kernel", "cvss3": { "Attack Complexity": "Low", - "Attack Vector": "Local", + "Attack Vector": "Network", "Availability": "High", - "Confidentiality": "High", - "Integrity": "High", + "Confidentiality": "None", + "Integrity": "None", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", - "score": 7.8 + "raw": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "score": 6.5 }, - "fixes": "4e3c51f4e805291b057d12f5dda5aeb50a538dc4", + "fixes": "1202cdd665315c525b5237e96e0bedc76d7e754f", + "last_affected_version": "5.15.117", "last_modified": "2023-12-06", - "nvd_text": "In the Linux kernel 6.0.8, there is a use-after-free in inode_cgwb_move_to_attached in fs/fs-writeback.c, related to __list_del_entry_valid.", + "nvd_text": "A null pointer dereference flaw was found in the Linux kernel's DECnet networking protocol. This issue could allow a remote user to crash the system.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-26605", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-26605", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-26605", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-26605", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-26605", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-26605" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-3338", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-3338", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-3338", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-3338", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-3338", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-3338" } }, - "CVE-2023-26606": { - "affected_versions": "v5.15-rc1 to v6.2-rc1", - "breaks": "3f3b442b5ad2455507c9bfdacf39a3792eb3a6d0", - "cmt_msg": "fs/ntfs3: Fix slab-out-of-bounds read in ntfs_trim_fs", + "CVE-2023-3355": { + "affected_versions": "v5.11-rc1 to v6.3-rc1", + "breaks": "20224d715a882210428ea62bba93f1bc4a0afe23", + "cmt_msg": "drm/msm/gem: Add check for kmalloc", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", - "Confidentiality": "High", - "Integrity": "High", + "Confidentiality": "None", + "Integrity": "None", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", - "score": 7.8 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "score": 5.5 }, - "fixes": "557d19675a470bb0a98beccec38c5dc3735c20fa", - "last_affected_version": "6.1.1", + "fixes": "d839f0811a31322c087a859c2b181e2383daa7be", + "last_affected_version": "6.2.2", "last_modified": "2023-12-06", - "nvd_text": "In the Linux kernel 6.0.8, there is a use-after-free in ntfs_trim_fs in fs/ntfs3/bitmap.c.", + "nvd_text": "A NULL pointer dereference flaw was found in the Linux kernel's drivers/gpu/drm/msm/msm_gem_submit.c code in the submit_lookup_cmds function, which fails because it lacks a check of the return value of kmalloc(). This issue allows a local user to crash the system.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-26606", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-26606", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-26606", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-26606", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-26606", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-26606" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-3355", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-3355", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-3355", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-3355", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-3355", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-3355" } }, - "CVE-2023-26607": { - "affected_versions": "v2.6.12-rc2 to v6.1-rc1", - "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", - "cmt_msg": "ntfs: fix out-of-bounds read in ntfs_attr_find()", + "CVE-2023-3357": { + "affected_versions": "v5.11-rc1 to v6.2-rc1", + "breaks": "4b2c53d93a4bc9d52cc0ec354629cfc9dc217f93", + "cmt_msg": "HID: amd_sfh: Add missing check for dma_alloc_coherent", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", - "Confidentiality": "High", + "Confidentiality": "None", "Integrity": "None", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", - "score": 7.1 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "score": 5.5 }, - "fixes": "36a4d82dddbbd421d2b8e79e1cab68c8126d5075", - "last_affected_version": "6.0.9", + "fixes": "53ffa6a9f83b2170c60591da1ead8791d5a42e81", + "last_affected_version": "6.1.1", "last_modified": "2023-12-06", - "nvd_text": "In the Linux kernel 6.0.8, there is an out-of-bounds read in ntfs_attr_find in fs/ntfs/attrib.c.", + "nvd_text": "A NULL pointer dereference flaw was found in the Linux kernel AMD Sensor Fusion Hub driver. This flaw allows a local user to crash the system.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-26607", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-26607", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-26607", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-26607", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-26607", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-26607" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-3357", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-3357", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-3357", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-3357", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-3357", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-3357" } }, - "CVE-2023-28327": { - "affected_versions": "v5.3-rc1 to v6.1", - "breaks": "cae9910e73446cac68a54e3a7b02aaa12b689026", - "cmt_msg": "af_unix: Get user_ns from in_skb in unix_diag_get_exact().", + "CVE-2023-3358": { + "affected_versions": "v4.9-rc1 to v6.2-rc5", + "breaks": "3703f53b99e4a7c373ce3568dd3f91f175ebb626", + "cmt_msg": "HID: intel_ish-hid: Add check for ishtp_dma_tx_map", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", @@ -85449,23 +91816,23 @@ "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "score": 5.5 }, - "fixes": "b3abe42e94900bdd045c472f9c9be620ba5ce553", - "last_affected_version": "6.0", + "fixes": "b3d40c3ec3dc4ad78017de6c3a38979f57aaaab8", + "last_affected_version": "6.1.8", "last_modified": "2023-12-06", - "nvd_text": "A NULL pointer dereference flaw was found in the UNIX protocol in net/unix/diag.c In unix_diag_get_exact in the Linux Kernel. The newly allocated skb does not have sk, leading to a NULL pointer. This flaw allows a local user to crash or potentially cause a denial of service.", + "nvd_text": "A null pointer dereference was found in the Linux kernel's Integrated Sensor Hub (ISH) driver. This issue could allow a local user to crash the system.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-28327", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-28327", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-28327", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-28327", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-28327", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-28327" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-3358", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-3358", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-3358", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-3358", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-3358", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-3358" } }, - "CVE-2023-28328": { - "affected_versions": "v2.6.34-rc1 to v6.2-rc1", - "breaks": "76f9a820c8672ada12ffa0903652c9e6f2429462", - "cmt_msg": "media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer()", + "CVE-2023-3359": { + "affected_versions": "v5.18-rc1 to v6.2-rc7", + "breaks": "6e977eaa8280e957b87904b536661550f2a6b3e8", + "cmt_msg": "nvmem: brcm_nvram: Add check for kzalloc", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", @@ -85478,23 +91845,23 @@ "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "score": 5.5 }, - "fixes": "0ed554fd769a19ea8464bb83e9ac201002ef74ad", - "last_affected_version": "6.1.1", + "fixes": "b0576ade3aaf24b376ea1a4406ae138e2a22b0c0", + "last_affected_version": "6.1.10", "last_modified": "2023-12-06", - "nvd_text": "A NULL pointer dereference flaw was found in the az6027 driver in drivers/media/usb/dev-usb/az6027.c in the Linux Kernel. The message from user space is not checked properly before transferring into the device. This flaw allows a local user to crash the system or potentially cause a denial of service.", + "nvd_text": "An issue was discovered in the Linux kernel brcm_nvram_parse in drivers/nvmem/brcm_nvram.c. Lacks for the check of the return value of kzalloc() can cause the NULL Pointer Dereference.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-28328", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-28328", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-28328", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-28328", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-28328", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-28328" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-3359", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-3359", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-3359", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-3359", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-3359", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-3359" } }, - "CVE-2023-28410": { - "affected_versions": "v5.8-rc1 to v5.19-rc1", - "breaks": "9f909e215fea0652023b9ed09d3d7bfe10386423", - "cmt_msg": "drm/i915/gem: add missing boundary check in vm_access", + "CVE-2023-3389": { + "affected_versions": "v5.1-rc1 to v6.0-rc1", + "breaks": "2b188cc1bb857a9d4701ae59aa7768b5124e262e", + "cmt_msg": "io_uring: mutex locked poll hashing", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", @@ -85507,22 +91874,22 @@ "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "score": 7.8 }, - "fixes": "661412e301e2ca86799aa4f400d1cf0bd38c57c6", - "last_affected_version": "None", + "fixes": "9ca9fb24d5febccea354089c41f96a8ad0d853f8", "last_modified": "2023-12-06", - "nvd_text": "Improper restriction of operations within the bounds of a memory buffer in some Intel(R) i915 Graphics drivers for linux before kernel version 6.2.10 may allow an authenticated user to potentially enable escalation of privilege via local access.", + "nvd_text": "A use-after-free vulnerability in the Linux Kernel io_uring subsystem can be exploited to achieve local privilege escalation.\n\nRacing a io_uring cancel poll request with a linked timeout can cause a UAF in a hrtimer.\n\nWe recommend upgrading past commit ef7dfac51d8ed961b742218f526bd589f3900a59 (4716c73b188566865bdd79c3a6709696a224ac04 for 5.10 stable and\u00a00e388fce7aec40992eadee654193cad345d62663 for 5.15 stable).\n\n", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-28410", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-28410", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-28410", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-28410", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-28410", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-28410" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-3389", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-3389", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-3389", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-3389", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-3389", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-3389" } }, - "CVE-2023-28464": { - "affected_versions": "v6.3-rc1 to v6.3-rc7", - "breaks": "0f00cd322d22d4441de51aa80bcce5bb6a8cbb44", + "CVE-2023-3390": { + "affected_versions": "v3.16-rc1 to v6.4-rc7", + "breaks": "958bee14d0718ca7a5002c0f48a099d1d345812a", + "cmt_msg": "netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", @@ -85535,312 +91902,328 @@ "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "score": 7.8 }, - "fixes": "5dc7d23e167e2882ef118456ceccd57873e876d8", + "fixes": "1240eb93f0616b21c675416516ff3d74798fdc97", + "last_affected_version": "6.3.8", "last_modified": "2023-12-06", - "nvd_text": "hci_conn_cleanup in net/bluetooth/hci_conn.c in the Linux kernel through 6.2.9 has a use-after-free (observed in hci_conn_hash_flush) because of calls to hci_dev_put and hci_conn_put. There is a double free that may lead to privilege escalation.", + "nvd_text": "A use-after-free vulnerability was found in the Linux kernel's netfilter subsystem in net/netfilter/nf_tables_api.c.\n\nMishandled error handling with NFT_MSG_NEWRULE makes it possible to use a dangling pointer in the same transaction causing a use-after-free vulnerability. This flaw allows a local attacker with user access to cause a privilege escalation issue.\n\nWe recommend upgrading past commit\u00a01240eb93f0616b21c675416516ff3d74798fdc97.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-28464", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-28464", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-28464", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-28464", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-28464", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-28464" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-3390", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-3390", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-3390", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-3390", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-3390", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-3390" } }, - "CVE-2023-28466": { - "affected_versions": "v4.13-rc1 to v6.3-rc2", - "breaks": "3c4d7559159bfe1e3b94df3a657b2cda3a34e218", - "cmt_msg": "net: tls: fix possible race condition between do_tls_getsockopt_conf() and do_tls_setsockopt_conf()", + "CVE-2023-33951": { + "affected_versions": "v5.17-rc1 to v6.4-rc1", + "breaks": "8afa13a0583f94c14607e3041c02f068ac8fb628", + "cmt_msg": "drm/vmwgfx: Do not drop the reference to the handle too soon", "cvss3": { "Attack Complexity": "High", "Attack Vector": "Local", - "Availability": "High", + "Availability": "None", "Confidentiality": "High", - "Integrity": "High", - "Privileges Required": "Low", - "Scope": "Unchanged", + "Integrity": "None", + "Privileges Required": "High", + "Scope": "Changed", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", - "score": 7.0 + "raw": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N", + "score": 5.3 }, - "fixes": "49c47cc21b5b7a3d8deb18fc57b0aa2ab1286962", - "last_affected_version": "6.2.6", + "fixes": "9ef8d83e8e25d5f1811b3a38eb1484f85f64296c", + "last_affected_version": "None", "last_modified": "2023-12-06", - "nvd_text": "do_tls_getsockopt in net/tls/tls_main.c in the Linux kernel through 6.2.6 lacks a lock_sock call, leading to a race condition (with a resultant use-after-free or NULL pointer dereference).", + "nvd_text": "A race condition vulnerability was found in the vmwgfx driver in the Linux kernel. The flaw exists within the handling of GEM objects. The issue results from improper locking when performing operations on an object. This flaw allows a local privileged user to disclose information in the context of the kernel.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-28466", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-28466", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-28466", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-28466", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-28466", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-28466" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-33951", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-33951", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-33951", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-33951", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-33951", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-33951" } }, - "CVE-2023-2860": { - "affected_versions": "v4.10-rc1 to v6.0-rc5", - "breaks": "4f4853dc1c9c1994f6f756eabdcc25374ff271d9", - "cmt_msg": "ipv6: sr: fix out-of-bounds read when setting HMAC data.", + "CVE-2023-33952": { + "affected_versions": "v5.17-rc1 to v6.4-rc1", + "breaks": "8afa13a0583f94c14607e3041c02f068ac8fb628", + "cmt_msg": "drm/vmwgfx: Do not drop the reference to the handle too soon", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", - "Availability": "None", + "Availability": "High", "Confidentiality": "High", - "Integrity": "None", + "Integrity": "High", "Privileges Required": "High", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", - "score": 4.4 + "raw": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "score": 6.7 }, - "fixes": "84a53580c5d2138c7361c7c3eea5b31827e63b35", - "last_affected_version": "5.15.67", - "last_modified": "2023-12-06", - "nvd_text": "An out-of-bounds read vulnerability was found in the SR-IPv6 implementation in the Linux kernel. The flaw exists within the processing of seg6 attributes. The issue results from the improper validation of user-supplied data, which can result in a read past the end of an allocated buffer. This flaw allows a privileged local user to disclose sensitive information on affected installations of the Linux kernel.", + "fixes": "9ef8d83e8e25d5f1811b3a38eb1484f85f64296c", + "last_affected_version": "None", + "last_modified": "2024-01-12", + "nvd_text": "A double-free vulnerability was found in handling vmw_buffer_object objects in the vmwgfx driver in the Linux kernel. This issue occurs due to the lack of validating the existence of an object prior to performing further free operations on the object, which may allow a local privileged user to escalate privileges and execute code in the context of the kernel.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-2860", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-2860", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-2860", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-2860", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-2860", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-2860" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-33952", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-33952", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-33952", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-33952", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-33952", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-33952" } }, - "CVE-2023-28772": { - "affected_versions": "v2.6.27-rc1 to v5.14-rc1", - "breaks": "5e3ca0ec76fce92daa4eed0d02de9c79b1fe3920", - "cmt_msg": "seq_buf: Fix overflow in seq_buf_putmem_hex()", + "CVE-2023-3397": { + "affected_versions": "unk to unk", + "breaks": "", "cvss3": { - "Attack Complexity": "Low", + "Attack Complexity": "High", "Attack Vector": "Local", "Availability": "High", "Confidentiality": "High", - "Integrity": "High", - "Privileges Required": "High", + "Integrity": "None", + "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", - "score": 6.7 + "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H", + "score": 6.3 }, - "fixes": "d3b16034a24a112bb83aeb669ac5b9b01f744bb7", - "last_affected_version": "5.13.2", + "fixes": "", "last_modified": "2023-12-06", - "nvd_text": "An issue was discovered in the Linux kernel before 5.13.3. lib/seq_buf.c has a seq_buf_putmem_hex buffer overflow.", + "nvd_text": "A race condition occurred between the functions lmLogClose and txEnd in JFS, in the Linux Kernel, executed in different threads. This flaw allows a local attacker with normal user privileges to crash the system or leak internal kernel information.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-28772", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-28772", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-28772", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-28772", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-28772", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-28772" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-3397", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-3397", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-3397", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-3397", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-3397", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-3397" } }, - "CVE-2023-28866": { - "affected_versions": "v5.17-rc1 to v6.3-rc4", - "breaks": "d0b137062b2de75b264b84143d21c98abc5f5ad2", - "cmt_msg": "Bluetooth: HCI: Fix global-out-of-bounds", + "CVE-2023-34255": { + "affected_versions": "v2.6.12-rc2 to v6.4-rc1", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "xfs: verify buffer contents when we skip log replay", + "fixes": "22ed903eee23a5b174e240f1cdfa9acf393a5210", + "last_affected_version": "6.3.6", + "last_modified": "2023-12-06", + "nvd_text": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2023-2124. Reason: This candidate is a duplicate of CVE-2023-2124. Notes: All CVE users should reference CVE-2023-2124 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-34255", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-34255", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-34255", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-34255", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-34255", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-34255" + }, + "rejected": true + }, + "CVE-2023-34256": { + "affected_versions": "v2.6.24-rc1 to v6.4-rc2", + "breaks": "717d50e4971b81b96c0199c91cdf0039a8cb181a", + "cmt_msg": "ext4: avoid a potential slab-out-of-bounds in ext4_group_desc_csum", "cvss3": { "Attack Complexity": "Low", - "Attack Vector": "Network", - "Availability": "None", - "Confidentiality": "Low", + "Attack Vector": "Local", + "Availability": "High", + "Confidentiality": "None", "Integrity": "None", - "Privileges Required": "None", + "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", - "score": 5.3 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "score": 5.5 }, - "fixes": "bce56405201111807cc8e4f47c6de3e10b17c1ac", - "last_affected_version": "6.2.8", + "fixes": "4f04351888a83e595571de672e0a4a8b74f4fb31", + "last_affected_version": "6.3.2", "last_modified": "2023-12-06", - "nvd_text": "In the Linux kernel through 6.2.8, net/bluetooth/hci_sync.c allows out-of-bounds access because amp_init1[] and amp_init2[] are supposed to have an intentionally invalid element, but do not.", + "nvd_text": "An issue was discovered in the Linux kernel before 6.3.3. There is an out-of-bounds read in crc16 in lib/crc16.c when called from fs/ext4/super.c because ext4_group_desc_csum does not properly check an offset. NOTE: this is disputed by third parties because the kernel is not intended to defend against attackers with the stated \"When modifying the block device while it is mounted by the filesystem\" access.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-28866", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-28866", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-28866", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-28866", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-28866", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-28866" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-34256", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-34256", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-34256", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-34256", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-34256", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-34256" } }, - "CVE-2023-2898": { - "affected_versions": "v5.8-rc1 to v6.5-rc1", - "breaks": "b4b10061ef98c583bcf82a4200703fbaa98c18dc", - "cmt_msg": "f2fs: fix to avoid NULL pointer dereference f2fs_write_end_io()", + "CVE-2023-34319": { + "affected_versions": "v6.1 to v6.5-rc6", + "breaks": "ad7f402ae4f466647c3a669b8a6f3e5d4271c84a", + "cmt_msg": "xen/netback: Fix buffer overrun triggered by unusual packet", "cvss3": { - "Attack Complexity": "High", + "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", - "Confidentiality": "None", - "Integrity": "None", + "Confidentiality": "High", + "Integrity": "High", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", - "score": 4.7 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 7.8 }, - "fixes": "d8189834d4348ae608083e1f1f53792cfcc2a9bc", - "last_affected_version": "6.4.3", + "fixes": "534fc31d09b706a16d83533e16b5dc855caf7576", + "last_affected_version": "6.4.8", "last_modified": "2023-12-06", - "nvd_text": "There is a null-pointer-dereference flaw found in f2fs_write_end_io in fs/f2fs/data.c in the Linux kernel. This flaw allows a local privileged user to cause a denial of service problem.", + "nvd_text": "The fix for XSA-423 added logic to Linux'es netback driver to deal with\na frontend splitting a packet in a way such that not all of the headers\nwould come in one piece. Unfortunately the logic introduced there\ndidn't account for the extreme case of the entire packet being split\ninto as many pieces as permitted by the protocol, yet still being\nsmaller than the area that's specially dealt with to keep all (possible)\nheaders together. Such an unusual packet would therefore trigger a\nbuffer overrun in the driver.\n", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-2898", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-2898", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-2898", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-2898", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-2898", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-2898" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-34319", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-34319", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-34319", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-34319", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-34319", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-34319" } }, - "CVE-2023-2985": { - "affected_versions": "v2.6.12-rc2 to v6.3-rc1", - "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", - "cmt_msg": "fs: hfsplus: fix UAF issue in hfsplus_put_super", + "CVE-2023-34324": { + "affected_versions": "v5.10-rc1 to v6.6-rc6", + "breaks": "54c9de89895e0a36047fcc4ae754ea5b8655fb9d", + "cmt_msg": "xen/events: replace evtchn_rwlock with RCU", "cvss3": { "Attack Complexity": "Low", - "Attack Vector": "Local", + "Attack Vector": "Network", "Availability": "High", "Confidentiality": "None", "Integrity": "None", - "Privileges Required": "Low", + "Privileges Required": "High", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", - "score": 5.5 + "raw": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "score": 4.9 }, - "fixes": "07db5e247ab5858439b14dd7cc1fe538b9efcf32", - "last_affected_version": "6.2.2", - "last_modified": "2023-12-06", - "nvd_text": "A use after free flaw was found in hfsplus_put_super in fs/hfsplus/super.c in the Linux Kernel. This flaw could allow a local user to cause a denial of service problem.", + "fixes": "87797fad6cce28ec9be3c13f031776ff4f104cfc", + "last_affected_version": "6.5.6", + "last_modified": "2024-01-12", + "nvd_text": "Closing of an event channel in the Linux kernel can result in a deadlock.\nThis happens when the close is being performed in parallel to an unrelated\nXen console action and the handling of a Xen console interrupt in an\nunprivileged guest.\n\nThe closing of an event channel is e.g. triggered by removal of a\nparavirtual device on the other side. As this action will cause console\nmessages to be issued on the other side quite often, the chance of\ntriggering the deadlock is not neglectable.\n\nNote that 32-bit Arm-guests are not affected, as the 32-bit Linux kernel\non Arm doesn't use queued-RW-locks, which are required to trigger the\nissue (on Arm32 a waiting writer doesn't block further readers to get\nthe lock).\n", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-2985", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-2985", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-2985", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-2985", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-2985", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-2985" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-34324", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-34324", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-34324", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-34324", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-34324", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-34324" } }, - "CVE-2023-3006": { - "affected_versions": "v2.6.12-rc2 to v6.1-rc1", - "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", - "cmt_msg": "arm64: Add AMPERE1 to the Spectre-BHB affected list", + "CVE-2023-3439": { + "affected_versions": "v5.15-rc1 to v5.18-rc5", + "breaks": "583be982d93479ea3d85091b0fd0b01201ede87d", + "cmt_msg": "mctp: defer the kfree of object mdev->addrs", "cvss3": { - "Attack Complexity": "Low", + "Attack Complexity": "High", "Attack Vector": "Local", - "Availability": "None", - "Confidentiality": "High", + "Availability": "High", + "Confidentiality": "None", "Integrity": "None", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", - "score": 5.5 + "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", + "score": 4.7 }, - "fixes": "0e5d5ae837c8ce04d2ddb874ec5f920118bd9d31", - "last_affected_version": "6.0.6", + "fixes": "b561275d633bcd8e0e8055ab86f1a13df75a0269", + "last_affected_version": "5.17.5", "last_modified": "2023-12-06", - "nvd_text": "A known cache speculation vulnerability, known as Branch History Injection (BHI) or Spectre-BHB, becomes actual again for the new hw AmpereOne. Spectre-BHB is similar to Spectre v2, except that malicious code uses the shared branch history (stored in the CPU Branch History Buffer, or BHB) to influence mispredicted branches within the victim's hardware context. Once that occurs, speculation caused by the mispredicted branches can cause cache allocation. This issue leads to obtaining information that should not be accessible.", + "nvd_text": "A flaw was found in the MCTP protocol in the Linux kernel. The function mctp_unregister() reclaims the device's relevant resource when a netcard detaches. However, a running routine may be unaware of this and cause the use-after-free of the mdev->addrs object, potentially leading to a denial of service.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-3006", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-3006", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-3006", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-3006", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-3006", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-3006" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-3439", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-3439", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-3439", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-3439", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-3439", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-3439" } }, - "CVE-2023-3022": { - "backport": true, - "breaks": "effda4dd97e878ab83336bec7411cc41b5cc6d37", - "cmt_msg": "ipv6: Use result arg in fib_lookup_arg consistently", + "CVE-2023-35001": { + "affected_versions": "v3.13-rc1 to v6.5-rc2", + "breaks": "96518518cc417bb0a8c80b9fb736202e28acdf96", + "cmt_msg": "netfilter: nf_tables: prevent OOB access in nft_byteorder_eval", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", - "Confidentiality": "None", - "Integrity": "None", + "Confidentiality": "High", + "Integrity": "High", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", - "score": 5.5 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 7.8 }, - "fixes": "a65120bae4b7425a39c5783aa3d4fc29677eef0e", + "fixes": "caf3ef7468f7534771b5c44cd8dbd6f7f87c2cbd", + "last_affected_version": "6.4.3", "last_modified": "2023-12-06", - "nvd_text": "A flaw was found in the IPv6 module of the Linux kernel. The arg.result was not used consistently in fib6_rule_lookup, sometimes holding rt6_info and other times fib6_info. This was not accounted for in other parts of the code where rt6_info was expected unconditionally, potentially leading to a kernel panic in fib6_rule_suppress.", + "nvd_text": "Linux Kernel nftables Out-Of-Bounds Read/Write Vulnerability; nft_byteorder poorly handled vm register contents when CAP_NET_ADMIN is in any user or network namespace", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-3022", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-3022", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-3022", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-3022", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-3022", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-3022" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-35001", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-35001", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-35001", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-35001", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-35001", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-35001" } }, - "CVE-2023-30456": { - "affected_versions": "v2.6.12-rc2 to v6.3-rc3", - "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", - "cmt_msg": "KVM: nVMX: add missing consistency checks for CR0 and CR4", + "CVE-2023-3567": { + "affected_versions": "v2.6.38-rc3 to v6.2-rc7", + "breaks": "ac751efa6a0d70f2c9daef5c7e3a92270f5c2dff", + "cmt_msg": "vc_screen: move load of struct vc_data pointer in vcs_read() to avoid UAF", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", - "Confidentiality": "None", + "Confidentiality": "High", "Integrity": "None", "Privileges Required": "Low", - "Scope": "Changed", + "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", - "score": 6.5 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", + "score": 7.1 }, - "cwe": "Unspecified", - "fixes": "112e66017bff7f2837030f34c2bc19501e9212d5", - "last_affected_version": "6.2.7", + "fixes": "226fae124b2dac217ea5436060d623ff3385bc34", + "last_affected_version": "6.1.10", "last_modified": "2023-12-06", - "nvd_text": "An issue was discovered in arch/x86/kvm/vmx/nested.c in the Linux kernel before 6.2.8. nVMX on x86_64 lacks consistency checks for CR0 and CR4.", + "nvd_text": "A use-after-free flaw was found in vcs_read in drivers/tty/vt/vc_screen.c in vc_screen in the Linux Kernel. This issue may allow an attacker with local user access to cause a system crash or leak internal kernel information.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-30456", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-30456", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-30456", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-30456", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-30456", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-30456" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-3567", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-3567", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-3567", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-3567", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-3567", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-3567" } }, - "CVE-2023-30772": { - "affected_versions": "v4.1-rc1 to v6.3-rc4", - "breaks": "c1a281e34dae41379af86b95592a5ae8e9e3af67", - "cmt_msg": "power: supply: da9150: Fix use after free bug in da9150_charger_remove due to race condition", + "CVE-2023-35693": { + "affected_versions": "unk to unk", + "breaks": "", "cvss3": { - "Attack Complexity": "High", - "Attack Vector": "Physical", + "Attack Complexity": "Low", + "Attack Vector": "Local", "Availability": "High", "Confidentiality": "High", "Integrity": "High", - "Privileges Required": "None", + "Privileges Required": "High", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", - "score": 6.4 + "raw": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "score": 6.7 }, - "fixes": "06615d11cc78162dfd5116efb71f29eb29502d37", - "last_affected_version": "6.2.8", + "fixes": "", "last_modified": "2023-12-06", - "nvd_text": "The Linux kernel before 6.2.9 has a race condition and resultant use-after-free in drivers/power/supply/da9150-charger.c if a physically proximate attacker unplugs a device.", + "nvd_text": "In incfs_kill_sb of fs/incfs/vfs.c, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.\n\n", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-30772", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-30772", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-30772", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-30772", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-30772", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-30772" - } + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-35693", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-35693", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-35693", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-35693", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-35693", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-35693" + }, + "vendor_specific": true }, - "CVE-2023-3090": { - "affected_versions": "v3.19-rc1 to v6.4-rc2", - "breaks": "2ad7bf3638411cb547f2823df08166c13ab04269", - "cmt_msg": "ipvlan:Fix out-of-bounds caused by unclear skb->cb", + "CVE-2023-35788": { + "affected_versions": "v4.19-rc1 to v6.4-rc5", + "breaks": "0a6e77784f490912d81b92cfd48424541c04691e", + "cmt_msg": "net/sched: flower: fix possible OOB write in fl_set_geneve_opt()", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", @@ -85853,25 +92236,25 @@ "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "score": 7.8 }, - "fixes": "90cbed5247439a966b645b34eb0a2e037836ea8e", - "last_affected_version": "6.3.3", + "fixes": "4d56304e5827c8cc8cc18c75343d283af7c4825c", + "last_affected_version": "6.3.6", "last_modified": "2023-12-06", - "nvd_text": "A heap out-of-bounds write vulnerability in the Linux Kernel ipvlan network driver can be exploited to achieve local privilege escalation.\n\nThe out-of-bounds write is caused by missing skb->cb initialization in the ipvlan network driver. The vulnerability is reachable if\u00a0CONFIG_IPVLAN is enabled.\n\n\nWe recommend upgrading past commit 90cbed5247439a966b645b34eb0a2e037836ea8e.\n\n", + "nvd_text": "An issue was discovered in fl_set_geneve_opt in net/sched/cls_flower.c in the Linux kernel before 6.3.7. It allows an out-of-bounds write in the flower classifier code via TCA_FLOWER_KEY_ENC_OPTS_GENEVE packets. This may result in denial of service or privilege escalation.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-3090", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-3090", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-3090", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-3090", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-3090", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-3090" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-35788", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-35788", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-35788", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-35788", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-35788", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-35788" } }, - "CVE-2023-3106": { - "affected_versions": "v3.15-rc1 to v4.8-rc7", - "breaks": "d3623099d3509fa68fa28235366049dd3156c63a", - "cmt_msg": "xfrm: fix crash in XFRM_MSG_GETSA netlink handler", + "CVE-2023-35823": { + "affected_versions": "v4.15-rc1 to v6.4-rc1", + "breaks": "1e7126b4a86ad69e870099fb6b922a3b6e29598b", + "cmt_msg": "media: saa7134: fix use after free bug in saa7134_finidev due to race condition", "cvss3": { - "Attack Complexity": "Low", + "Attack Complexity": "High", "Attack Vector": "Local", "Availability": "High", "Confidentiality": "High", @@ -85879,194 +92262,200 @@ "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", - "score": 7.8 + "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 7.0 }, - "fixes": "1ba5bf993c6a3142e18e68ea6452b347f9cb5635", - "last_affected_version": "4.4.222", + "fixes": "30cf57da176cca80f11df0d9b7f71581fe601389", + "last_affected_version": "6.3.1", "last_modified": "2023-12-06", - "nvd_text": "A NULL pointer dereference vulnerability was found in netlink_dump. This issue can occur when the Netlink socket receives the message(sendmsg) for the XFRM_MSG_GETSA, XFRM_MSG_GETPOLICY type message, and the DUMP flag is set and can cause a denial of service or possibly another unspecified impact. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although it is unlikely.", + "nvd_text": "An issue was discovered in the Linux kernel before 6.3.2. A use-after-free was found in saa7134_finidev in drivers/media/pci/saa7134/saa7134-core.c.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-3106", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-3106", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-3106", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-3106", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-3106", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-3106" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-35823", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-35823", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-35823", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-35823", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-35823", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-35823" } }, - "CVE-2023-3108": { - "backport": true, - "breaks": "1d10eb2f156f5fc83cf6c7ce60441592e66eadb3", - "cmt_msg": "crypto: fix af_alg_make_sg() conversion to iov_iter", + "CVE-2023-35824": { + "affected_versions": "v2.6.34-rc1 to v6.4-rc1", + "breaks": "34d2f9bf189c36ef8642cf6b64e80dfb756d888f", + "cmt_msg": "media: dm1105: Fix use after free bug in dm1105_remove due to race condition", "cvss3": { "Attack Complexity": "High", "Attack Vector": "Local", "Availability": "High", - "Confidentiality": "None", - "Integrity": "None", + "Confidentiality": "High", + "Integrity": "High", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", - "score": 4.7 + "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 7.0 }, - "fixes": "9399f0c51489ae8c16d6559b82a452fdc1895e91", + "fixes": "5abda7a16698d4d1f47af1168d8fa2c640116b4a", + "last_affected_version": "6.3.1", "last_modified": "2023-12-06", - "nvd_text": "A flaw was found in the subsequent get_user_pages_fast in the Linux kernel\u2019s interface for symmetric key cipher algorithms in the skcipher_recvmsg of crypto/algif_skcipher.c function. This flaw allows a local user to crash the system.", + "nvd_text": "An issue was discovered in the Linux kernel before 6.3.2. A use-after-free was found in dm1105_remove in drivers/media/pci/dm1105/dm1105.c.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-3108", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-3108", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-3108", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-3108", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-3108", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-3108" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-35824", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-35824", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-35824", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-35824", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-35824", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-35824" } }, - "CVE-2023-31081": { - "affected_versions": "unk to unk", - "breaks": "", + "CVE-2023-35826": { + "affected_versions": "v5.18-rc1 to v6.4-rc1", + "breaks": "7c38a551bda1b7adea7e98e5c6786f5bee7100b8", + "cmt_msg": "media: cedrus: fix use after free bug in cedrus_remove due to race condition", "cvss3": { - "Attack Complexity": "Low", + "Attack Complexity": "High", "Attack Vector": "Local", "Availability": "High", - "Confidentiality": "None", - "Integrity": "None", + "Confidentiality": "High", + "Integrity": "High", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", - "score": 5.5 + "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 7.0 }, - "fixes": "", + "fixes": "50d0a7aea4809cef87979d4669911276aa23b71f", + "last_affected_version": "6.3.1", "last_modified": "2023-12-06", - "nvd_text": "An issue was discovered in drivers/media/test-drivers/vidtv/vidtv_bridge.c in the Linux kernel 6.2. There is a NULL pointer dereference in vidtv_mux_stop_thread. In vidtv_stop_streaming, after dvb->mux=NULL occurs, it executes vidtv_mux_stop_thread(dvb->mux).", + "nvd_text": "An issue was discovered in the Linux kernel before 6.3.2. A use-after-free was found in cedrus_remove in drivers/staging/media/sunxi/cedrus/cedrus.c.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-31081", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-31081", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-31081", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-31081", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-31081", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-31081" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-35826", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-35826", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-35826", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-35826", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-35826", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-35826" } }, - "CVE-2023-31082": { - "affected_versions": "unk to unk", - "breaks": "", + "CVE-2023-35827": { + "affected_versions": "v4.2-rc1 to v6.6-rc6", + "breaks": "c156633f1353264634135dea86ffcae74f2122fc", + "cmt_msg": "ravb: Fix use-after-free issue in ravb_tx_timeout_work()", "cvss3": { - "Attack Complexity": "Low", + "Attack Complexity": "High", "Attack Vector": "Local", "Availability": "High", - "Confidentiality": "None", - "Integrity": "None", + "Confidentiality": "High", + "Integrity": "High", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", - "score": 5.5 + "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 7.0 }, - "fixes": "", - "last_modified": "2023-12-06", - "nvd_text": "An issue was discovered in drivers/tty/n_gsm.c in the Linux kernel 6.2. There is a sleeping function called from an invalid context in gsmld_write, which will block the kernel.", + "fixes": "3971442870713de527684398416970cf025b4f89", + "last_affected_version": "6.5.7", + "last_modified": "2024-02-02", + "nvd_text": "An issue was discovered in the Linux kernel through 6.3.8. A use-after-free was found in ravb_remove in drivers/net/ethernet/renesas/ravb_main.c.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-31082", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-31082", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-31082", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-31082", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-31082", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-31082" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-35827", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-35827", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-35827", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-35827", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-35827", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-35827" } }, - "CVE-2023-31083": { - "affected_versions": "v2.6.12-rc2 to v6.6-rc1", - "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", - "cmt_msg": "Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO", + "CVE-2023-35828": { + "affected_versions": "v4.19-rc1 to v6.4-rc1", + "breaks": "39facfa01c9fc64f90233d1734882f0a0cafe36a", + "cmt_msg": "usb: gadget: udc: renesas_usb3: Fix use after free bug in renesas_usb3_remove due to race condition", "cvss3": { "Attack Complexity": "High", "Attack Vector": "Local", "Availability": "High", - "Confidentiality": "None", - "Integrity": "None", + "Confidentiality": "High", + "Integrity": "High", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", - "score": 4.7 + "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 7.0 }, - "fixes": "9c33663af9ad115f90c076a1828129a3fbadea98", + "fixes": "2b947f8769be8b8181dc795fd292d3e7120f5204", + "last_affected_version": "6.3.1", "last_modified": "2023-12-06", - "nvd_text": "An issue was discovered in drivers/bluetooth/hci_ldisc.c in the Linux kernel 6.2. In hci_uart_tty_ioctl, there is a race condition between HCIUARTSETPROTO and HCIUARTGETPROTO. HCI_UART_PROTO_SET is set before hu->proto is set. A NULL pointer dereference may occur.", + "nvd_text": "An issue was discovered in the Linux kernel before 6.3.2. A use-after-free was found in renesas_usb3_remove in drivers/usb/gadget/udc/renesas_usb3.c.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-31083", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-31083", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-31083", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-31083", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-31083", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-31083" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-35828", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-35828", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-35828", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-35828", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-35828", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-35828" } }, - "CVE-2023-31084": { - "affected_versions": "v2.6.12-rc2 to v6.4-rc3", - "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", - "cmt_msg": "media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*()", + "CVE-2023-35829": { + "affected_versions": "v5.8-rc1 to v6.4-rc1", + "breaks": "cd33c830448baf7b1e94da72eca069e3e1d050c9", + "cmt_msg": "media: rkvdec: fix use after free bug in rkvdec_remove", "cvss3": { - "Attack Complexity": "Low", + "Attack Complexity": "High", "Attack Vector": "Local", "Availability": "High", - "Confidentiality": "None", - "Integrity": "None", + "Confidentiality": "High", + "Integrity": "High", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", - "score": 5.5 + "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 7.0 }, - "cwe": "Unspecified", - "fixes": "b8c75e4a1b325ea0a9433fa8834be97b5836b946", + "fixes": "3228cec23b8b29215e18090c6ba635840190993d", + "last_affected_version": "6.3.1", "last_modified": "2023-12-06", - "nvd_text": "An issue was discovered in drivers/media/dvb-core/dvb_frontend.c in the Linux kernel 6.2. There is a blocking operation when a task is in !TASK_RUNNING. In dvb_frontend_get_event, wait_event_interruptible is called; the condition is dvb_frontend_test_event(fepriv,events). In dvb_frontend_test_event, down(&fepriv->sem) is called. However, wait_event_interruptible would put the process to sleep, and down(&fepriv->sem) may block the process.", + "nvd_text": "An issue was discovered in the Linux kernel before 6.3.2. A use-after-free was found in rkvdec_remove in drivers/staging/media/rkvdec/rkvdec.c.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-31084", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-31084", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-31084", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-31084", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-31084", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-31084" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-35829", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-35829", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-35829", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-35829", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-35829", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-35829" } }, - "CVE-2023-31085": { - "affected_versions": "v2.6.22-rc1 to v6.6-rc5", - "breaks": "801c135ce73d5df1caf3eca35b66a10824ae0707", - "cmt_msg": "ubi: Refuse attaching if mtd's erasesize is 0", + "CVE-2023-3609": { + "affected_versions": "v4.14-rc1 to v6.4-rc7", + "breaks": "705c7091262d02b09eb686c24491de61bf42fdb2", + "cmt_msg": "net/sched: cls_u32: Fix reference counter leak leading to overflow", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", - "Confidentiality": "None", - "Integrity": "None", + "Confidentiality": "High", + "Integrity": "High", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", - "score": 5.5 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 7.8 }, - "fixes": "017c73a34a661a861712f7cc1393a123e5b2208c", - "last_affected_version": "6.5.6", + "fixes": "04c55383fa5689357bcdd2c8036725a55ed632bc", + "last_affected_version": "6.3.8", "last_modified": "2023-12-06", - "nvd_text": "An issue was discovered in drivers/mtd/ubi/cdev.c in the Linux kernel 6.2. There is a divide-by-zero error in do_div(sz,mtd->erasesize), used indirectly by ctrl_cdev_ioctl, when mtd->erasesize is 0.", + "nvd_text": "A use-after-free vulnerability in the Linux kernel's net/sched: cls_u32 component can be exploited to achieve local privilege escalation.\n\nIf tcf_change_indev() fails, u32_set_parms() will immediately return an error after incrementing or decrementing the reference counter in tcf_bind_filter(). If an attacker can control the reference counter and set it to zero, they can cause the reference to be freed, leading to a use-after-free vulnerability.\n\nWe recommend upgrading past commit 04c55383fa5689357bcdd2c8036725a55ed632bc.\n\n", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-31085", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-31085", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-31085", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-31085", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-31085", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-31085" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-3609", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-3609", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-3609", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-3609", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-3609", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-3609" } }, - "CVE-2023-3111": { - "affected_versions": "v2.6.31-rc1 to v6.0-rc2", - "breaks": "5d4f98a28c7d334091c1b7744f48a1acdd2a4ae0", - "cmt_msg": "btrfs: unset reloc control if transaction commit fails in prepare_to_relocate()", + "CVE-2023-3610": { + "affected_versions": "v5.9-rc1 to v6.4", + "breaks": "d0e2c7de92c7f2b3d355ad76b0bb9fc43d1beb87", + "cmt_msg": "netfilter: nf_tables: fix chain binding transaction logic", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", @@ -86079,23 +92468,23 @@ "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "score": 7.8 }, - "fixes": "85f02d6c856b9f3a0acf5219de6e32f58b9778eb", - "last_affected_version": "5.19.3", + "fixes": "4bedf9eee016286c835e3d8fa981ddece5338795", + "last_affected_version": "6.3", "last_modified": "2023-12-06", - "nvd_text": "A use after free vulnerability was found in prepare_to_relocate in fs/btrfs/relocation.c in btrfs in the Linux Kernel. This possible flaw can be triggered by calling btrfs_ioctl_balance() before calling btrfs_ioctl_defrag().", + "nvd_text": "A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation.\n\nFlaw in the error handling of bound chains causes a use-after-free in the abort path of NFT_MSG_NEWRULE. The vulnerability requires CAP_NET_ADMIN to be triggered.\n\nWe recommend upgrading past commit 4bedf9eee016286c835e3d8fa981ddece5338795.\n\n", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-3111", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-3111", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-3111", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-3111", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-3111", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-3111" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-3610", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-3610", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-3610", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-3610", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-3610", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-3610" } }, - "CVE-2023-3117": { - "affected_versions": "v3.16-rc1 to v6.4-rc7", - "breaks": "958bee14d0718ca7a5002c0f48a099d1d345812a", - "cmt_msg": "netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE", + "CVE-2023-3611": { + "affected_versions": "v3.8-rc1 to v6.5-rc2", + "breaks": "462dbc9101acd38e92eda93c0726857517a24bbd", + "cmt_msg": "net/sched: sch_qfq: account for stab overhead in qfq_enqueue", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", @@ -86108,24 +92497,22 @@ "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "score": 7.8 }, - "fixes": "1240eb93f0616b21c675416516ff3d74798fdc97", - "last_affected_version": "6.3.8", + "fixes": "3e337087c3b5805fe0b8a46ba622a962880b5d64", + "last_affected_version": "6.4.4", "last_modified": "2023-12-06", - "nvd_text": "Rejected reason: Duplicate of CVE-2023-3390.", + "nvd_text": "An out-of-bounds write vulnerability in the Linux kernel's net/sched: sch_qfq component can be exploited to achieve local privilege escalation.\n\nThe qfq_change_agg() function in net/sched/sch_qfq.c allows an out-of-bounds write because lmax is updated according to packet sizes without bounds checks.\n\nWe recommend upgrading past commit 3e337087c3b5805fe0b8a46ba622a962880b5d64.\n\n", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-3117", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-3117", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-3117", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-3117", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-3117", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-3117" - }, - "rejected": true + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-3611", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-3611", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-3611", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-3611", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-3611", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-3611" + } }, - "CVE-2023-31248": { - "affected_versions": "v5.9-rc1 to v6.5-rc2", - "breaks": "837830a4b439bfeb86c70b0115c280377c84714b", - "cmt_msg": "netfilter: nf_tables: do not ignore genmask when looking up chain by id", + "CVE-2023-3640": { + "affected_versions": "unk to unk", + "breaks": "", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", @@ -86138,197 +92525,194 @@ "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "score": 7.8 }, - "fixes": "515ad530795c118f012539ed76d02bacfd426d89", - "last_affected_version": "6.4.3", + "fixes": "", "last_modified": "2023-12-06", - "nvd_text": "Linux Kernel nftables Use-After-Free Local Privilege Escalation Vulnerability; `nft_chain_lookup_byid()` failed to check whether a chain was active and CAP_NET_ADMIN is in any user or network namespace", + "nvd_text": "A possible unauthorized memory access flaw was found in the Linux kernel's cpu_entry_area mapping of X86 CPU data to memory, where a user may guess the location of exception stacks or other important data. Based on the previous CVE-2023-0597, the 'Randomize per-cpu entry area' feature was implemented in /arch/x86/mm/cpu_entry_area.c, which works through the init_cea_offsets() function when KASLR is enabled. However, despite this feature, there is still a risk of per-cpu entry area leaks. This issue could allow a local user to gain access to some important data with memory in an expected location and potentially escalate their privileges on the system.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-31248", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-31248", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-31248", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-31248", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-31248", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-31248" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-3640", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-3640", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-3640", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-3640", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-3640", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-3640" } }, - "CVE-2023-3141": { - "affected_versions": "v2.6.39-rc1 to v6.4-rc1", - "breaks": "9263412501022fecef844907129ee2513b5a89de", - "cmt_msg": "memstick: r592: Fix UAF bug in r592_remove due to race condition", + "CVE-2023-37453": { + "affected_versions": "v6.3-rc1 to v6.6-rc1", + "breaks": "45bf39f8df7f05efb83b302c65ae3b9bc92b7065", + "cmt_msg": "USB: core: Fix race by not overwriting udev->descriptor in hub_port_init()", "cvss3": { "Attack Complexity": "Low", - "Attack Vector": "Local", + "Attack Vector": "Physical", "Availability": "High", - "Confidentiality": "High", + "Confidentiality": "None", "Integrity": "None", - "Privileges Required": "Low", + "Privileges Required": "None", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", - "score": 7.1 + "raw": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "score": 4.6 }, - "fixes": "63264422785021704c39b38f65a78ab9e4a186d7", - "last_affected_version": "6.3.3", + "fixes": "ff33299ec8bb80cdcc073ad9c506bd79bb2ed20b", + "last_affected_version": "6.5.2", "last_modified": "2023-12-06", - "nvd_text": "A use-after-free flaw was found in r592_remove in drivers/memstick/host/r592.c in media access in the Linux Kernel. This flaw allows a local attacker to crash the system at device disconnect, possibly leading to a kernel information leak.", + "nvd_text": "An issue was discovered in the USB subsystem in the Linux kernel through 6.4.2. There is an out-of-bounds and crash in read_descriptors in drivers/usb/core/sysfs.c.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-3141", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-3141", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-3141", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-3141", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-3141", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-3141" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-37453", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-37453", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-37453", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-37453", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-37453", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-37453" } }, - "CVE-2023-31436": { - "affected_versions": "v3.7-rc5 to v6.3", - "breaks": "3015f3d2a3cd9614294025849d3ed89fd2f3a7f5", - "cmt_msg": "net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg", + "CVE-2023-37454": { + "affected_versions": "unk to unk", + "breaks": "", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", - "Confidentiality": "High", - "Integrity": "High", + "Confidentiality": "None", + "Integrity": "None", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", - "score": 7.8 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "score": 5.5 }, - "fixes": "3037933448f60f9acb705997eae62013ecb81e0d", - "last_affected_version": "6.2", + "fixes": "", "last_modified": "2023-12-06", - "nvd_text": "qfq_change_class in net/sched/sch_qfq.c in the Linux kernel before 6.2.13 allows an out-of-bounds write because lmax can exceed QFQ_MIN_LMAX.", + "nvd_text": "An issue was discovered in the Linux kernel through 6.4.2. A crafted UDF filesystem image causes a use-after-free write operation in the udf_put_super and udf_close_lvid functions in fs/udf/super.c. NOTE: the suse.com reference has a different perspective about this.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-31436", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-31436", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-31436", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-31436", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-31436", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-31436" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-37454", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-37454", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-37454", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-37454", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-37454", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-37454" } }, - "CVE-2023-3159": { - "affected_versions": "v2.6.36-rc1 to v5.18-rc6", - "breaks": "850bb6f23b93c04ce1e4509a87fa607dc17d97c1", - "cmt_msg": "firewire: fix potential uaf in outbound_phy_packet_callback()", + "CVE-2023-3772": { + "affected_versions": "v2.6.39-rc1 to v6.5-rc7", + "breaks": "d8647b79c3b7e223ac051439d165bc8e7bbb832f", + "cmt_msg": "xfrm: add NULL check in xfrm_update_ae_params", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", - "Confidentiality": "High", - "Integrity": "High", + "Confidentiality": "None", + "Integrity": "None", "Privileges Required": "High", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", - "score": 6.7 + "raw": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "score": 4.4 }, - "fixes": "b7c81f80246fac44077166f3e07103affe6db8ff", - "last_affected_version": "5.17.6", + "fixes": "00374d9b6d9f932802b55181be9831aa948e5b7c", + "last_affected_version": "6.4.11", "last_modified": "2023-12-06", - "nvd_text": "A use after free issue was discovered in driver/firewire in outbound_phy_packet_callback in the Linux Kernel. In this flaw a local attacker with special privilege may cause a use after free problem when queue_event() fails.", + "nvd_text": "A flaw was found in the Linux kernel\u2019s IP framework for transforming packets (XFRM subsystem). This issue may allow a malicious user with CAP_NET_ADMIN privileges to directly dereference a NULL pointer in xfrm_update_ae_params(), leading to a possible kernel crash and denial of service.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-3159", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-3159", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-3159", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-3159", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-3159", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-3159" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-3772", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-3772", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-3772", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-3772", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-3772", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-3772" } }, - "CVE-2023-3161": { - "affected_versions": "v2.6.22-rc1 to v6.2-rc7", - "breaks": "2d2699d984924890f6dac8cf51c3b6311f56816c", - "cmt_msg": "fbcon: Check font dimension limits", + "CVE-2023-3773": { + "affected_versions": "v5.17-rc1 to v6.5-rc7", + "breaks": "4e484b3e969b52effd95c17f7a86f39208b2ccf4", + "cmt_msg": "xfrm: add forgotten nla_policy for XFRMA_MTIMER_THRESH", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", - "Availability": "High", - "Confidentiality": "None", + "Availability": "None", + "Confidentiality": "High", "Integrity": "None", - "Privileges Required": "Low", + "Privileges Required": "High", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", - "score": 5.5 + "raw": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "score": 4.4 }, - "fixes": "2b09d5d364986f724f17001ccfe4126b9b43a0be", - "last_affected_version": "6.1.10", + "fixes": "5e2424708da7207087934c5c75211e8584d553a0", + "last_affected_version": "6.4.11", "last_modified": "2023-12-06", - "nvd_text": "A flaw was found in the Framebuffer Console (fbcon) in the Linux Kernel. When providing font->width and font->height greater than 32 to fbcon_set_font, since there are no checks in place, a shift-out-of-bounds occurs leading to undefined behavior and possible denial of service.", + "nvd_text": "A flaw was found in the Linux kernel\u2019s IP framework for transforming packets (XFRM subsystem). This issue may allow a malicious user with CAP_NET_ADMIN privileges to cause a 4 byte out-of-bounds read of XFRMA_MTIMER_THRESH when parsing netlink attributes, leading to potential leakage of sensitive heap data to userspace.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-3161", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-3161", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-3161", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-3161", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-3161", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-3161" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-3773", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-3773", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-3773", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-3773", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-3773", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-3773" } }, - "CVE-2023-3212": { - "affected_versions": "v2.6.24-rc1 to v6.4-rc2", - "breaks": "16615be18cadf53ee6f8a4f0bdd647f0753421b1", - "cmt_msg": "gfs2: Don't deref jdesc in evict", + "CVE-2023-3776": { + "affected_versions": "v2.6.12-rc2 to v6.5-rc2", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "net/sched: cls_fw: Fix improper refcount update leads to use-after-free", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", - "Confidentiality": "None", - "Integrity": "None", - "Privileges Required": "High", + "Confidentiality": "High", + "Integrity": "High", + "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", - "score": 4.4 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 7.8 }, - "fixes": "504a10d9e46bc37b23d0a1ae2f28973c8516e636", - "last_affected_version": "6.3.6", + "fixes": "0323bce598eea038714f941ce2b22541c46d488f", + "last_affected_version": "6.4.4", "last_modified": "2023-12-06", - "nvd_text": "A NULL pointer dereference issue was found in the gfs2 file system in the Linux kernel. It occurs on corrupt gfs2 file systems when the evict code tries to reference the journal descriptor structure after it has been freed and set to NULL. A privileged local user could use this flaw to cause a kernel panic.", + "nvd_text": "A use-after-free vulnerability in the Linux kernel's net/sched: cls_fw component can be exploited to achieve local privilege escalation.\n\nIf tcf_change_indev() fails, fw_set_parms() will immediately return an error after incrementing or decrementing the reference counter in tcf_bind_filter(). If an attacker can control the reference counter and set it to zero, they can cause the reference to be freed, leading to a use-after-free vulnerability.\n\nWe recommend upgrading past commit 0323bce598eea038714f941ce2b22541c46d488f.\n\n", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-3212", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-3212", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-3212", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-3212", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-3212", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-3212" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-3776", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-3776", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-3776", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-3776", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-3776", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-3776" } }, - "CVE-2023-3220": { - "affected_versions": "v4.19-rc1 to v6.3-rc1", - "breaks": "25fdd5933e4c0f5fe2ea5cd59994f8ac5fbe90ef", - "cmt_msg": "drm/msm/dpu: Add check for pstates", + "CVE-2023-3777": { + "affected_versions": "v5.9-rc1 to v6.5-rc3", + "breaks": "d0e2c7de92c7f2b3d355ad76b0bb9fc43d1beb87", + "cmt_msg": "netfilter: nf_tables: skip bound chain on rule flush", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", - "Confidentiality": "None", - "Integrity": "None", + "Confidentiality": "High", + "Integrity": "High", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", - "score": 5.5 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 7.8 }, - "fixes": "93340e10b9c5fc86730d149636e0aa8b47bb5a34", - "last_affected_version": "6.2.2", + "fixes": "6eaf41e87a223ae6f8e7a28d6e78384ad7e407f8", + "last_affected_version": "6.4.6", "last_modified": "2023-12-06", - "nvd_text": "An issue was discovered in the Linux kernel through 6.1-rc8. dpu_crtc_atomic_check in drivers/gpu/drm/msm/disp/dpu1/dpu_crtc.c lacks check of the return value of kzalloc() and will cause the NULL Pointer Dereference.", + "nvd_text": "A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation.\n\nWhen nf_tables_delrule() is flushing table rules, it is not checked whether the chain is bound and the chain's owner rule can also release the objects in certain circumstances.\n\nWe recommend upgrading past commit 6eaf41e87a223ae6f8e7a28d6e78384ad7e407f8.\n\n", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-3220", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-3220", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-3220", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-3220", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-3220", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-3220" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-3777", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-3777", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-3777", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-3777", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-3777", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-3777" } }, - "CVE-2023-32233": { - "affected_versions": "v2.6.12-rc2 to v6.4-rc1", - "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", - "cmt_msg": "netfilter: nf_tables: deactivate anonymous set from preparation phase", + "CVE-2023-3812": { + "affected_versions": "v4.15-rc1 to v6.1-rc4", + "breaks": "90e33d45940793def6f773b2d528e9f3c84ffdc7", + "cmt_msg": "net: tun: fix bugs for oversize packet when napi frags enabled", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", @@ -86341,83 +92725,84 @@ "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "score": 7.8 }, - "fixes": "c1592a89942e9678f7d9c8030efa777c0d57edab", - "last_affected_version": "6.3.1", + "fixes": "363a5328f4b0517e59572118ccfb7c626d81dca9", + "last_affected_version": "6.0.7", "last_modified": "2023-12-06", - "nvd_text": "In the Linux kernel through 6.3.1, a use-after-free in Netfilter nf_tables when processing batch requests can be abused to perform arbitrary read and write operations on kernel memory. Unprivileged local users can obtain root privileges. This occurs because anonymous sets are mishandled.", + "nvd_text": "An out-of-bounds memory access flaw was found in the Linux kernel\u2019s TUN/TAP device driver functionality in how a user generates a malicious (too big) networking packet when napi frags is enabled. This flaw allows a local user to crash or potentially escalate their privileges on the system.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-32233", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-32233", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-32233", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-32233", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-32233", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-32233" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-3812", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-3812", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-3812", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-3812", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-3812", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-3812" } }, - "CVE-2023-32247": { - "affected_versions": "v5.15-rc1 to v6.4-rc1", - "breaks": "0626e6641f6b467447c81dd7678a69c66f7746cf", - "cmt_msg": "ksmbd: destroy expired sessions", + "CVE-2023-38409": { + "affected_versions": "v5.19-rc1 to v6.3-rc7", + "breaks": "d443d93864726ad68c0a741d1e7b03934a9af143", + "cmt_msg": "fbcon: set_con2fb_map needs to set con2fb_map!", "cvss3": { "Attack Complexity": "Low", - "Attack Vector": "Network", + "Attack Vector": "Local", "Availability": "High", "Confidentiality": "None", "Integrity": "None", - "Privileges Required": "None", + "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", - "score": 7.5 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "score": 5.5 }, - "fixes": "ea174a91893956450510945a0c5d1a10b5323656", - "last_affected_version": "6.3.1", - "last_modified": "2023-12-27", - "nvd_text": "A flaw was found in the Linux kernel's ksmbd, a high-performance in-kernel SMB server. The specific flaw exists within the handling of SMB2_SESSION_SETUP commands. The issue results from the lack of control of resource consumption. An attacker can leverage this vulnerability to create a denial-of-service condition on the system.", + "cwe": "Unspecified", + "fixes": "fffb0b52d5258554c645c966c6cbef7de50b851d", + "last_affected_version": "6.2.11", + "last_modified": "2023-12-06", + "nvd_text": "An issue was discovered in set_con2fb_map in drivers/video/fbdev/core/fbcon.c in the Linux kernel before 6.2.12. Because an assignment occurs only for the first vc, the fbcon_registered_fb and fbcon_display arrays can be desynchronized in fbcon_mode_deleted (the con2fb_map points at the old fb_info).", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-32247", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-32247", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-32247", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-32247", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-32247", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-32247" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-38409", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-38409", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-38409", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-38409", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-38409", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-38409" } }, - "CVE-2023-32248": { - "affected_versions": "v5.15-rc1 to v6.4-rc1", + "CVE-2023-38426": { + "affected_versions": "v5.15-rc1 to v6.4-rc3", "breaks": "0626e6641f6b467447c81dd7678a69c66f7746cf", - "cmt_msg": "ksmbd: fix NULL pointer dereference in smb2_get_info_filesystem()", + "cmt_msg": "ksmbd: fix global-out-of-bounds in smb2_find_context_vals", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Network", "Availability": "High", - "Confidentiality": "None", + "Confidentiality": "High", "Integrity": "None", "Privileges Required": "None", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", - "score": 7.5 + "raw": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", + "score": 9.1 }, - "fixes": "3ac00a2ab69b34189942afa9e862d5170cdcb018", - "last_affected_version": "6.3.1", + "fixes": "02f76c401d17e409ed45bf7887148fcc22c93c85", + "last_affected_version": "6.3.3", "last_modified": "2023-12-06", - "nvd_text": "A flaw was found in the Linux kernel's ksmbd, a high-performance in-kernel SMB server. The specific flaw exists within the handling of SMB2_TREE_CONNECT and SMB2_QUERY_INFO commands. The issue results from the lack of proper validation of a pointer prior to accessing it. An attacker can leverage this vulnerability to create a denial-of-service condition on the system.", + "nvd_text": "An issue was discovered in the Linux kernel before 6.3.4. ksmbd has an out-of-bounds read in smb2_find_context_vals when create_context's name_len is larger than the tag length.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-32248", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-32248", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-32248", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-32248", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-32248", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-32248" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-38426", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-38426", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-38426", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-38426", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-38426", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-38426" } }, - "CVE-2023-32250": { - "affected_versions": "v5.15-rc1 to v6.4-rc1", + "CVE-2023-38427": { + "affected_versions": "v5.15-rc1 to v6.4-rc6", "breaks": "0626e6641f6b467447c81dd7678a69c66f7746cf", - "cmt_msg": "ksmbd: fix racy issue from session setup and logoff", + "cmt_msg": "ksmbd: fix out-of-bound read in deassemble_neg_contexts()", "cvss3": { - "Attack Complexity": "High", + "Attack Complexity": "Low", "Attack Vector": "Network", "Availability": "High", "Confidentiality": "High", @@ -86425,57 +92810,57 @@ "Privileges Required": "None", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", - "score": 8.1 + "raw": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "score": 9.8 }, - "fixes": "f5c779b7ddbda30866cf2a27c63e34158f858c73", - "last_affected_version": "6.3.1", + "fixes": "f1a411873c85b642f13b01f21b534c2bab81fc1b", + "last_affected_version": "6.3.7", "last_modified": "2023-12-27", - "nvd_text": "A flaw was found in the Linux kernel's ksmbd, a high-performance in-kernel SMB server. The specific flaw exists within the processing of SMB2_SESSION_SETUP commands. The issue results from the lack of proper locking when performing operations on an object. An attacker can leverage this vulnerability to execute code in the context of the kernel.", + "nvd_text": "An issue was discovered in the Linux kernel before 6.3.8. fs/smb/server/smb2pdu.c in ksmbd has an integer underflow and out-of-bounds read in deassemble_neg_contexts.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-32250", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-32250", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-32250", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-32250", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-32250", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-32250" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-38427", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-38427", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-38427", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-38427", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-38427", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-38427" } }, - "CVE-2023-32252": { - "affected_versions": "v5.15-rc1 to v6.4-rc1", + "CVE-2023-38428": { + "affected_versions": "v5.15-rc1 to v6.4-rc3", "breaks": "0626e6641f6b467447c81dd7678a69c66f7746cf", - "cmt_msg": "ksmbd: fix racy issue from session setup and logoff", + "cmt_msg": "ksmbd: fix wrong UserName check in session_user", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Network", "Availability": "High", - "Confidentiality": "None", + "Confidentiality": "High", "Integrity": "None", "Privileges Required": "None", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", - "score": 7.5 + "raw": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", + "score": 9.1 }, - "fixes": "f5c779b7ddbda30866cf2a27c63e34158f858c73", - "last_affected_version": "6.3.1", - "last_modified": "2023-12-27", - "nvd_text": "A flaw was found in the Linux kernel's ksmbd, a high-performance in-kernel SMB server. The specific flaw exists within the handling of SMB2_LOGOFF commands. The issue results from the lack of proper validation of a pointer prior to accessing it. An attacker can leverage this vulnerability to create a denial-of-service condition on the system.", + "fixes": "f0a96d1aafd8964e1f9955c830a3e5cb3c60a90f", + "last_affected_version": "6.3.3", + "last_modified": "2023-12-06", + "nvd_text": "An issue was discovered in the Linux kernel before 6.3.4. fs/ksmbd/smb2pdu.c in ksmbd does not properly check the UserName value because it does not consider the address of security buffer, leading to an out-of-bounds read.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-32252", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-32252", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-32252", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-32252", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-32252", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-32252" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-38428", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-38428", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-38428", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-38428", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-38428", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-38428" } }, - "CVE-2023-32254": { - "affected_versions": "v5.15-rc1 to v6.4-rc1", + "CVE-2023-38429": { + "affected_versions": "v5.15-rc1 to v6.4-rc3", "breaks": "0626e6641f6b467447c81dd7678a69c66f7746cf", - "cmt_msg": "ksmbd: fix racy issue under cocurrent smb2 tree disconnect", + "cmt_msg": "ksmbd: allocate one more byte for implied bcc[0]", "cvss3": { - "Attack Complexity": "High", + "Attack Complexity": "Low", "Attack Vector": "Network", "Availability": "High", "Confidentiality": "High", @@ -86483,489 +92868,450 @@ "Privileges Required": "None", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", - "score": 8.1 + "raw": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "score": 9.8 }, - "fixes": "30210947a343b6b3ca13adc9bfc88e1543e16dd5", - "last_affected_version": "6.3.1", - "last_modified": "2023-12-27", - "nvd_text": "A flaw was found in the Linux kernel's ksmbd, a high-performance in-kernel SMB server. The specific flaw exists within the processing of SMB2_TREE_DISCONNECT commands. The issue results from the lack of proper locking when performing operations on an object. An attacker can leverage this vulnerability to execute code in the context of the kernel.", + "fixes": "443d61d1fa9faa60ef925513d83742902390100f", + "last_affected_version": "6.3.3", + "last_modified": "2023-12-06", + "nvd_text": "An issue was discovered in the Linux kernel before 6.3.4. fs/ksmbd/connection.c in ksmbd has an off-by-one error in memory allocation (because of ksmbd_smb2_check_message) that may lead to out-of-bounds access.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-32254", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-32254", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-32254", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-32254", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-32254", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-32254" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-38429", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-38429", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-38429", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-38429", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-38429", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-38429" } }, - "CVE-2023-32257": { - "affected_versions": "v5.15-rc1 to v6.4-rc1", + "CVE-2023-38430": { + "affected_versions": "v5.15-rc1 to v6.4-rc6", "breaks": "0626e6641f6b467447c81dd7678a69c66f7746cf", - "cmt_msg": "ksmbd: fix racy issue from session setup and logoff", + "cmt_msg": "ksmbd: validate smb request protocol id", "cvss3": { - "Attack Complexity": "High", + "Attack Complexity": "Low", "Attack Vector": "Network", "Availability": "High", "Confidentiality": "High", - "Integrity": "High", + "Integrity": "None", "Privileges Required": "None", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", - "score": 8.1 + "raw": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", + "score": 9.1 }, - "fixes": "f5c779b7ddbda30866cf2a27c63e34158f858c73", - "last_affected_version": "6.3.1", + "fixes": "1c1bcf2d3ea061613119b534f57507c377df20f9", + "last_affected_version": "6.3.8", "last_modified": "2023-12-27", - "nvd_text": "A flaw was found in the Linux kernel's ksmbd, a high-performance in-kernel SMB server. The specific flaw exists within the processing of SMB2_SESSION_SETUP and SMB2_LOGOFF commands. The issue results from the lack of proper locking when performing operations on an object. An attacker can leverage this vulnerability to execute code in the context of the kernel.", + "nvd_text": "An issue was discovered in the Linux kernel before 6.3.9. ksmbd does not validate the SMB request protocol ID, leading to an out-of-bounds read.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-32257", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-32257", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-32257", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-32257", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-32257", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-32257" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-38430", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-38430", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-38430", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-38430", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-38430", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-38430" } }, - "CVE-2023-32258": { - "affected_versions": "v5.15-rc1 to v6.4-rc1", + "CVE-2023-38431": { + "affected_versions": "v5.15-rc1 to v6.4-rc6", "breaks": "0626e6641f6b467447c81dd7678a69c66f7746cf", - "cmt_msg": "ksmbd: fix racy issue from smb2 close and logoff with multichannel", + "cmt_msg": "ksmbd: check the validation of pdu_size in ksmbd_conn_handler_loop", "cvss3": { - "Attack Complexity": "High", + "Attack Complexity": "Low", "Attack Vector": "Network", "Availability": "High", "Confidentiality": "High", - "Integrity": "High", + "Integrity": "None", "Privileges Required": "None", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", - "score": 8.1 + "raw": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", + "score": 9.1 }, - "fixes": "abcc506a9a71976a8b4c9bf3ee6efd13229c1e19", - "last_affected_version": "6.3.1", + "fixes": "368ba06881c395f1c9a7ba22203cf8d78b4addc0", + "last_affected_version": "6.3.7", "last_modified": "2023-12-27", - "nvd_text": "A flaw was found in the Linux kernel's ksmbd, a high-performance in-kernel SMB server. The specific flaw exists within the processing of SMB2_LOGOFF and SMB2_CLOSE commands. The issue results from the lack of proper locking when performing operations on an object. An attacker can leverage this vulnerability to execute code in the context of the kernel.", + "nvd_text": "An issue was discovered in the Linux kernel before 6.3.8. fs/smb/server/connection.c in ksmbd does not validate the relationship between the NetBIOS header's length field and the SMB header sizes, via pdu_size in ksmbd_conn_handler_loop, leading to an out-of-bounds read.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-32258", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-32258", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-32258", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-32258", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-32258", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-32258" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-38431", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-38431", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-38431", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-38431", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-38431", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-38431" } }, - "CVE-2023-32269": { - "affected_versions": "v2.6.12-rc2 to v6.2-rc7", - "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", - "cmt_msg": "netrom: Fix use-after-free caused by accept on already connected socket", + "CVE-2023-38432": { + "affected_versions": "v5.15-rc1 to v6.4", + "breaks": "0626e6641f6b467447c81dd7678a69c66f7746cf", + "cmt_msg": "ksmbd: validate command payload size", "cvss3": { "Attack Complexity": "Low", - "Attack Vector": "Local", + "Attack Vector": "Network", "Availability": "High", "Confidentiality": "High", - "Integrity": "High", - "Privileges Required": "High", + "Integrity": "None", + "Privileges Required": "None", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", - "score": 6.7 + "raw": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", + "score": 9.1 }, - "fixes": "611792920925fb088ddccbe2783c7f92fdfb6b64", - "last_affected_version": "6.1.10", + "fixes": "2b9b8f3b68edb3d67d79962f02e26dbb5ae3808d", + "last_affected_version": "6.3", "last_modified": "2023-12-06", - "nvd_text": "An issue was discovered in the Linux kernel before 6.1.11. In net/netrom/af_netrom.c, there is a use-after-free because accept is also allowed for a successfully connected AF_NETROM socket. However, in order for an attacker to exploit this, the system must have netrom routing configured or the attacker must have the CAP_NET_ADMIN capability.", + "nvd_text": "An issue was discovered in the Linux kernel before 6.3.10. fs/smb/server/smb2misc.c in ksmbd does not validate the relationship between the command payload size and the RFC1002 length specification, leading to an out-of-bounds read.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-32269", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-32269", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-32269", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-32269", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-32269", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-32269" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-38432", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-38432", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-38432", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-38432", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-38432", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-38432" } }, - "CVE-2023-32629": { - "affected_versions": "v5.19-rc1 to unk", - "breaks": "c914c0e27eb0843b7cf3bec71d6f34d53a3a671e", + "CVE-2023-3863": { + "affected_versions": "v3.8-rc1 to v6.5-rc1", + "breaks": "52feb444a90304eb13c03115bb9758101dbb9254", + "cmt_msg": "net: nfc: Fix use-after-free caused by nfc_llcp_find_local", "cvss3": { - "Attack Complexity": "Low", + "Attack Complexity": "High", "Attack Vector": "Local", - "Availability": "High", + "Availability": "None", "Confidentiality": "High", - "Integrity": "High", - "Privileges Required": "Low", + "Integrity": "None", + "Privileges Required": "High", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", - "score": 7.8 + "raw": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N", + "score": 4.1 }, - "fixes": "", + "fixes": "6709d4b7bc2e079241fdef15d1160581c5261c10", + "last_affected_version": "6.4.3", "last_modified": "2023-12-06", - "nvd_text": "Local privilege escalation vulnerability in Ubuntu Kernels overlayfs ovl_copy_up_meta_inode_data skip permission checks when calling ovl_do_setxattr on Ubuntu kernels", + "nvd_text": "A use-after-free flaw was found in nfc_llcp_find_local in net/nfc/llcp_core.c in NFC in the Linux kernel. This flaw allows a local user with special privileges to impact a kernel information leak issue.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-32629", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-32629", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-32629", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-32629", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-32629", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-32629" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-3863", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-3863", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-3863", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-3863", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-3863", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-3863" } }, - "CVE-2023-3268": { - "affected_versions": "v2.6.22-rc7 to v6.4-rc1", - "breaks": "8d62fdebdaf9b866c7e236a8f5cfe90e6dba5773", - "cmt_msg": "relayfs: fix out-of-bounds access in relay_file_read", - "cvss3": { - "Attack Complexity": "Low", - "Attack Vector": "Local", - "Availability": "High", - "Confidentiality": "High", - "Integrity": "None", - "Privileges Required": "Low", - "Scope": "Unchanged", - "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", - "score": 7.1 - }, - "fixes": "43ec16f1450f4936025a9bdf1a273affdb9732c1", - "last_affected_version": "6.3.1", - "last_modified": "2023-12-06", - "nvd_text": "An out of bounds (OOB) memory access flaw was found in the Linux kernel in relay_file_read_start_pos in kernel/relay.c in the relayfs. This flaw could allow a local attacker to crash the system or leak kernel internal information.", + "CVE-2023-3865": { + "affected_versions": "v5.15-rc1 to v6.4", + "breaks": "a848c4f15ab6d5d405dbee7de5da71839b2bf35e", + "cmt_msg": "ksmbd: fix out-of-bound read in smb2_write", + "fixes": "5fe7f7b78290638806211046a99f031ff26164e1", + "last_affected_version": "6.3", + "last_modified": "2023-09-17", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-3268", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-3268", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-3268", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-3268", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-3268", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-3268" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-3865", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-3865", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-3865", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-3865", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-3865", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-3865" } }, - "CVE-2023-3269": { - "affected_versions": "v6.1-rc1 to v6.5-rc1", - "breaks": "54a611b605901c7d5d05b6b8f5d04a6ceb0962aa", - "cmt_msg": "mm: introduce new 'lock_mm_and_find_vma()' page fault helper", - "cvss3": { - "Attack Complexity": "Low", - "Attack Vector": "Local", - "Availability": "High", - "Confidentiality": "High", - "Integrity": "High", - "Privileges Required": "Low", - "Scope": "Unchanged", - "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", - "score": 7.8 - }, - "fixes": "c2508ec5a58db67093f4fb8bf89a9a7c53a109e9", - "last_affected_version": "6.4.0", - "last_modified": "2023-12-06", - "name": "StackRot", - "nvd_text": "A vulnerability exists in the memory management subsystem of the Linux kernel. The lock handling for accessing and updating virtual memory areas (VMAs) is incorrect, leading to use-after-free problems. This issue can be successfully exploited to execute arbitrary kernel code, escalate containers, and gain root privileges.", + "CVE-2023-3866": { + "affected_versions": "v5.15-rc1 to v6.4", + "breaks": "a848c4f15ab6d5d405dbee7de5da71839b2bf35e", + "cmt_msg": "ksmbd: validate session id and tree id in the compound request", + "fixes": "5005bcb4219156f1bf7587b185080ec1da08518e", + "last_affected_version": "6.3", + "last_modified": "2023-09-17", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-3269", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-3269", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-3269", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-3269", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-3269", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-3269" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-3866", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-3866", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-3866", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-3866", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-3866", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-3866" } }, - "CVE-2023-3312": { - "affected_versions": "v6.2-rc1 to v6.4-rc1", - "breaks": "054a3ef683a176a509cc9b37f762029aae942495", - "cmt_msg": "cpufreq: qcom-cpufreq-hw: fix double IO unmap and resource release on exit", - "cvss3": { - "Attack Complexity": "Low", - "Attack Vector": "Network", - "Availability": "High", - "Confidentiality": "None", - "Integrity": "None", - "Privileges Required": "None", - "Scope": "Unchanged", - "User Interaction": "None", - "raw": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", - "score": 7.5 - }, - "fixes": "ba5e770c9698782bc203bbf5cf3b36a77720bdbe", - "last_affected_version": "6.3.1", - "last_modified": "2023-12-06", - "nvd_text": "A vulnerability was found in drivers/cpufreq/qcom-cpufreq-hw.c in cpufreq subsystem in the Linux Kernel. This flaw, during device unbind will lead to double release problem leading to denial of service.", + "CVE-2023-3867": { + "affected_versions": "v5.15-rc1 to v6.5-rc1", + "breaks": "a848c4f15ab6d5d405dbee7de5da71839b2bf35e", + "cmt_msg": "ksmbd: add missing compound request handing in some commands", + "fixes": "7b7d709ef7cf285309157fb94c33f625dd22c5e1", + "last_affected_version": "6.4.4", + "last_modified": "2023-12-27", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-3312", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-3312", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-3312", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-3312", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-3312", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-3312" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-3867", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-3867", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-3867", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-3867", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-3867", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-3867" } }, - "CVE-2023-3317": { - "affected_versions": "v6.2-rc1 to v6.3-rc6", - "breaks": "034ae28b56f13dc1f2beb3fa294b455f57ede9cb", - "cmt_msg": "wifi: mt76: mt7921: Fix use-after-free in fw features query.", + "CVE-2023-39189": { + "affected_versions": "v2.6.31-rc1 to v6.6-rc1", + "breaks": "11eeef41d5f63c7d2f7fdfcc733eb7fb137cc384", + "cmt_msg": "netfilter: nfnetlink_osf: avoid OOB read", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", "Confidentiality": "High", "Integrity": "None", - "Privileges Required": "Low", + "Privileges Required": "High", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", - "score": 7.1 + "raw": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H", + "score": 6.0 }, - "fixes": "2ceb76f734e37833824b7fab6af17c999eb48d2b", - "last_affected_version": "6.2.14", + "fixes": "f4f8a7803119005e87b716874bec07c751efafec", + "last_affected_version": "6.5.3", "last_modified": "2023-12-06", - "nvd_text": "A use-after-free flaw was found in mt7921_check_offload_capability in drivers/net/wireless/mediatek/mt76/mt7921/init.c in wifi mt76/mt7921 sub-component in the Linux Kernel. This flaw could allow an attacker to crash the system after 'features' memory release. This vulnerability could even lead to a kernel information leak problem.", + "nvd_text": "A flaw was found in the Netfilter subsystem in the Linux kernel. The nfnl_osf_add_callback function did not validate the user mode controlled opt_num field. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, leading to a crash or information disclosure.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-3317", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-3317", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-3317", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-3317", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-3317", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-3317" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-39189", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-39189", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-39189", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-39189", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-39189", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-39189" } }, - "CVE-2023-33203": { - "affected_versions": "v4.9-rc1 to v6.3-rc4", - "breaks": "b9b17debc69d27cd55e21ee51a5ba7fc50a426cf", - "cmt_msg": "net: qcom/emac: Fix use after free bug in emac_remove due to race condition", + "CVE-2023-39191": { + "affected_versions": "v5.19-rc1 to v6.3-rc1", + "breaks": "97e03f521050c092919591e668107b3d69c5f426", + "cmt_msg": "bpf: Fix state pruning for STACK_DYNPTR stack slots", "cvss3": { - "Attack Complexity": "High", - "Attack Vector": "Physical", + "Attack Complexity": "Low", + "Attack Vector": "Local", "Availability": "High", "Confidentiality": "High", "Integrity": "High", - "Privileges Required": "None", - "Scope": "Unchanged", + "Privileges Required": "High", + "Scope": "Changed", "User Interaction": "None", - "raw": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", - "score": 6.4 + "raw": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", + "score": 8.2 }, - "fixes": "6b6bc5b8bd2d4ca9e1efa9ae0f98a0b0687ace75", - "last_affected_version": "6.2.8", + "cwe": "Unspecified", + "fixes": "d6fefa1105dacc8a742cdcf2f4bfb501c9e61349", + "last_affected_version": "6.2.2", "last_modified": "2023-12-06", - "nvd_text": "The Linux kernel before 6.2.9 has a race condition and resultant use-after-free in drivers/net/ethernet/qualcomm/emac/emac.c if a physically proximate attacker unplugs an emac based device.", + "nvd_text": "An improper input validation flaw was found in the eBPF subsystem in the Linux kernel. The issue occurs due to a lack of proper validation of dynamic pointers within user-supplied eBPF programs prior to executing them. This may allow an attacker with CAP_BPF privileges to escalate privileges and execute arbitrary code in the context of the kernel.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-33203", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-33203", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-33203", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-33203", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-33203", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-33203" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-39191", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-39191", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-39191", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-39191", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-39191", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-39191" } }, - "CVE-2023-33250": { - "affected_versions": "v6.2-rc1 to v6.5-rc1", - "breaks": "2ff4bed7fee72ba1abfcff5f11ae8f8e570353f2", - "cmt_msg": "iommufd: Call iopt_area_contig_done() under the lock", + "CVE-2023-39192": { + "affected_versions": "v2.6.23-rc1 to v6.6-rc1", + "breaks": "1b50b8a371e90a5e110f466e4ac02cf6b5f681de", + "cmt_msg": "netfilter: xt_u32: validate user space input", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", - "Confidentiality": "None", + "Confidentiality": "High", "Integrity": "None", "Privileges Required": "High", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", - "score": 4.4 + "raw": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H", + "score": 6.0 }, - "fixes": "dbe245cdf5189e88d680379ed13901356628b650", - "last_affected_version": "6.4.3", + "fixes": "69c5d284f67089b4750d28ff6ac6f52ec224b330", + "last_affected_version": "6.5.2", "last_modified": "2023-12-06", - "nvd_text": "The Linux kernel 6.3 has a use-after-free in iopt_unmap_iova_range in drivers/iommu/iommufd/io_pagetable.c.", + "nvd_text": "A flaw was found in the Netfilter subsystem in the Linux kernel. The xt_u32 module did not validate the fields in the xt_u32 structure. This flaw allows a local privileged attacker to trigger an out-of-bounds read by setting the size fields with a value beyond the array boundaries, leading to a crash or information disclosure.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-33250", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-33250", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-33250", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-33250", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-33250", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-33250" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-39192", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-39192", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-39192", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-39192", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-39192", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-39192" } }, - "CVE-2023-33288": { - "affected_versions": "v2.6.39-rc1 to v6.3-rc4", - "breaks": "97774672573ac4355bd12cf84b202555c1131b69", - "cmt_msg": "power: supply: bq24190: Fix use after free bug in bq24190_remove due to race condition", + "CVE-2023-39193": { + "affected_versions": "v2.6.16-rc1 to v6.6-rc1", + "breaks": "2e4e6a17af35be359cc8f1c924f8f198fbd478cc", + "cmt_msg": "netfilter: xt_sctp: validate the flag_info count", "cvss3": { - "Attack Complexity": "High", + "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", - "Confidentiality": "None", + "Confidentiality": "High", "Integrity": "None", - "Privileges Required": "Low", + "Privileges Required": "High", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", - "score": 4.7 + "raw": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H", + "score": 6.0 }, - "fixes": "47c29d69212911f50bdcdd0564b5999a559010d4", - "last_affected_version": "6.2.8", + "fixes": "e99476497687ef9e850748fe6d232264f30bc8f9", + "last_affected_version": "6.5.2", "last_modified": "2023-12-06", - "nvd_text": "An issue was discovered in the Linux kernel before 6.2.9. A use-after-free was found in bq24190_remove in drivers/power/supply/bq24190_charger.c. It could allow a local attacker to crash the system due to a race condition.", + "nvd_text": "A flaw was found in the Netfilter subsystem in the Linux kernel. The sctp_mt_check did not validate the flag_count field. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, leading to a crash or information disclosure.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-33288", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-33288", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-33288", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-33288", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-33288", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-33288" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-39193", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-39193", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-39193", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-39193", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-39193", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-39193" } }, - "CVE-2023-3338": { - "affected_versions": "v2.6.12-rc2 to v6.1-rc1", - "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", - "cmt_msg": "Remove DECnet support from kernel", + "CVE-2023-39194": { + "affected_versions": "v3.15-rc1 to v6.5-rc7", + "breaks": "d3623099d3509fa68fa28235366049dd3156c63a", + "cmt_msg": "net: xfrm: Fix xfrm_address_filter OOB read", "cvss3": { "Attack Complexity": "Low", - "Attack Vector": "Network", - "Availability": "High", - "Confidentiality": "None", + "Attack Vector": "Local", + "Availability": "None", + "Confidentiality": "High", "Integrity": "None", - "Privileges Required": "Low", + "Privileges Required": "High", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", - "score": 6.5 + "raw": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "score": 4.4 }, - "fixes": "1202cdd665315c525b5237e96e0bedc76d7e754f", - "last_affected_version": "5.15.117", + "fixes": "dfa73c17d55b921e1d4e154976de35317e43a93a", + "last_affected_version": "6.4.11", "last_modified": "2023-12-06", - "nvd_text": "A null pointer dereference flaw was found in the Linux kernel's DECnet networking protocol. This issue could allow a remote user to crash the system.", + "nvd_text": "A flaw was found in the XFRM subsystem in the Linux kernel. The specific flaw exists within the processing of state filters, which can result in a read past the end of an allocated buffer. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, potentially leading to an information disclosure.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-3338", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-3338", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-3338", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-3338", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-3338", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-3338" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-39194", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-39194", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-39194", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-39194", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-39194", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-39194" } }, - "CVE-2023-3355": { - "affected_versions": "v5.11-rc1 to v6.3-rc1", - "breaks": "20224d715a882210428ea62bba93f1bc4a0afe23", - "cmt_msg": "drm/msm/gem: Add check for kmalloc", + "CVE-2023-39197": { + "affected_versions": "v2.6.26-rc1 to v6.5-rc1", + "breaks": "2bc780499aa33311ec0f3e42624dfaa7be0ade5e", + "cmt_msg": "netfilter: conntrack: dccp: copy entire header to stack buffer, not just basic one", "cvss3": { "Attack Complexity": "Low", - "Attack Vector": "Local", - "Availability": "High", - "Confidentiality": "None", + "Attack Vector": "Network", + "Availability": "None", + "Confidentiality": "High", "Integrity": "None", - "Privileges Required": "Low", + "Privileges Required": "None", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", - "score": 5.5 + "raw": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "score": 7.5 }, - "fixes": "d839f0811a31322c087a859c2b181e2383daa7be", - "last_affected_version": "6.2.2", - "last_modified": "2023-12-06", - "nvd_text": "A NULL pointer dereference flaw was found in the Linux kernel's drivers/gpu/drm/msm/msm_gem_submit.c code in the submit_lookup_cmds function, which fails because it lacks a check of the return value of kmalloc(). This issue allows a local user to crash the system.", + "fixes": "ff0a3a7d52ff7282dbd183e7fc29a1fe386b0c30", + "last_affected_version": "6.4.3", + "last_modified": "2024-02-02", + "nvd_text": "An out-of-bounds read vulnerability was found in Netfilter Connection Tracking (conntrack) in the Linux kernel. This flaw allows a remote user to disclose sensitive information via the DCCP protocol.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-3355", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-3355", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-3355", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-3355", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-3355", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-3355" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-39197", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-39197", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-39197", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-39197", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-39197", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-39197" } }, - "CVE-2023-3357": { - "affected_versions": "v5.11-rc1 to v6.2-rc1", - "breaks": "4b2c53d93a4bc9d52cc0ec354629cfc9dc217f93", - "cmt_msg": "HID: amd_sfh: Add missing check for dma_alloc_coherent", + "CVE-2023-39198": { + "affected_versions": "v3.10-rc1 to v6.5-rc7", + "breaks": "f64122c1f6ade301585569863b4b3b18f6e4e332", + "cmt_msg": "drm/qxl: fix UAF on handle creation", "cvss3": { - "Attack Complexity": "Low", + "Attack Complexity": "High", "Attack Vector": "Local", "Availability": "High", - "Confidentiality": "None", - "Integrity": "None", - "Privileges Required": "Low", + "Confidentiality": "High", + "Integrity": "High", + "Privileges Required": "High", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", - "score": 5.5 + "raw": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", + "score": 6.4 }, - "fixes": "53ffa6a9f83b2170c60591da1ead8791d5a42e81", - "last_affected_version": "6.1.1", - "last_modified": "2023-12-06", - "nvd_text": "A NULL pointer dereference flaw was found in the Linux kernel AMD Sensor Fusion Hub driver. This flaw allows a local user to crash the system.", + "fixes": "c611589b4259ed63b9b77be6872b1ce07ec0ac16", + "last_affected_version": "6.4.11", + "last_modified": "2024-02-02", + "nvd_text": "A race condition was found in the QXL driver in the Linux kernel. The qxl_mode_dumb_create() function dereferences the qobj returned by the qxl_gem_object_create_with_handle(), but the handle is the only one holding a reference to it. This flaw allows an attacker to guess the returned handle value and trigger a use-after-free issue, potentially leading to a denial of service or privilege escalation.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-3357", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-3357", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-3357", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-3357", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-3357", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-3357" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-39198", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-39198", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-39198", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-39198", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-39198", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-39198" } }, - "CVE-2023-3358": { - "affected_versions": "v4.9-rc1 to v6.2-rc5", - "breaks": "3703f53b99e4a7c373ce3568dd3f91f175ebb626", - "cmt_msg": "HID: intel_ish-hid: Add check for ishtp_dma_tx_map", + "CVE-2023-4004": { + "affected_versions": "v5.6-rc1 to v6.5-rc3", + "breaks": "3c4287f62044a90e73a561aa05fc46e62da173da", + "cmt_msg": "netfilter: nft_set_pipapo: fix improper element removal", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", - "Confidentiality": "None", - "Integrity": "None", + "Confidentiality": "High", + "Integrity": "High", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", - "score": 5.5 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 7.8 }, - "fixes": "b3d40c3ec3dc4ad78017de6c3a38979f57aaaab8", - "last_affected_version": "6.1.8", + "fixes": "87b5a5c209405cb6b57424cdfa226a6dbd349232", + "last_affected_version": "6.4.6", "last_modified": "2023-12-06", - "nvd_text": "A null pointer dereference was found in the Linux kernel's Integrated Sensor Hub (ISH) driver. This issue could allow a local user to crash the system.", + "nvd_text": "A use-after-free flaw was found in the Linux kernel's netfilter in the way a user triggers the nft_pipapo_remove function with the element, without a NFT_SET_EXT_KEY_END. This issue could allow a local user to crash the system or potentially escalate their privileges on the system.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-3358", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-3358", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-3358", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-3358", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-3358", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-3358" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-4004", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-4004", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-4004", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-4004", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-4004", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-4004" } }, - "CVE-2023-3359": { - "affected_versions": "v5.18-rc1 to v6.2-rc7", - "breaks": "6e977eaa8280e957b87904b536661550f2a6b3e8", - "cmt_msg": "nvmem: brcm_nvram: Add check for kzalloc", + "CVE-2023-4010": { + "affected_versions": "v2.6.35-rc1 to unk", + "breaks": "21677cfc562a27e099719d413287bc8d1d24deb7", "cvss3": { "Attack Complexity": "Low", - "Attack Vector": "Local", + "Attack Vector": "Physical", "Availability": "High", "Confidentiality": "None", "Integrity": "None", - "Privileges Required": "Low", + "Privileges Required": "None", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", - "score": 5.5 + "raw": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "score": 4.6 }, - "fixes": "b0576ade3aaf24b376ea1a4406ae138e2a22b0c0", - "last_affected_version": "6.1.10", - "last_modified": "2023-12-06", - "nvd_text": "An issue was discovered in the Linux kernel brcm_nvram_parse in drivers/nvmem/brcm_nvram.c. Lacks for the check of the return value of kzalloc() can cause the NULL Pointer Dereference.", + "fixes": "", + "last_modified": "2024-02-02", + "nvd_text": "A flaw was found in the USB Host Controller Driver framework in the Linux kernel. The usb_giveback_urb function has a logic loophole in its implementation. Due to the inappropriate judgment condition of the goto statement, the function cannot return under the input of a specific malformed descriptor file, so it falls into an endless loop, resulting in a denial of service.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-3359", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-3359", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-3359", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-3359", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-3359", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-3359" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-4010", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-4010", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-4010", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-4010", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-4010", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-4010" } }, - "CVE-2023-3389": { - "affected_versions": "v5.1-rc1 to v6.0-rc1", - "breaks": "2b188cc1bb857a9d4701ae59aa7768b5124e262e", - "cmt_msg": "io_uring: mutex locked poll hashing", + "CVE-2023-4015": { + "affected_versions": "v5.9-rc1 to v6.5-rc4", + "breaks": "d0e2c7de92c7f2b3d355ad76b0bb9fc43d1beb87", + "cmt_msg": "netfilter: nf_tables: skip immediate deactivate in _PREPARE_ERROR", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", @@ -86978,22 +93324,23 @@ "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "score": 7.8 }, - "fixes": "9ca9fb24d5febccea354089c41f96a8ad0d853f8", + "fixes": "0a771f7b266b02d262900c75f1e175c7fe76fec2", + "last_affected_version": "6.4.7", "last_modified": "2023-12-06", - "nvd_text": "A use-after-free vulnerability in the Linux Kernel io_uring subsystem can be exploited to achieve local privilege escalation.\n\nRacing a io_uring cancel poll request with a linked timeout can cause a UAF in a hrtimer.\n\nWe recommend upgrading past commit ef7dfac51d8ed961b742218f526bd589f3900a59 (4716c73b188566865bdd79c3a6709696a224ac04 for 5.10 stable and\u00a00e388fce7aec40992eadee654193cad345d62663 for 5.15 stable).\n\n", + "nvd_text": "A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation.\n\nOn an error when building a nftables rule, deactivating immediate expressions in nft_immediate_deactivate() can lead unbinding the chain and objects be deactivated but later used.\n\nWe recommend upgrading past commit 0a771f7b266b02d262900c75f1e175c7fe76fec2.\n\n", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-3389", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-3389", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-3389", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-3389", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-3389", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-3389" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-4015", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-4015", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-4015", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-4015", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-4015", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-4015" } }, - "CVE-2023-3390": { - "affected_versions": "v3.16-rc1 to v6.4-rc7", - "breaks": "958bee14d0718ca7a5002c0f48a099d1d345812a", - "cmt_msg": "netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE", + "CVE-2023-40283": { + "affected_versions": "v2.6.12-rc2 to v6.5-rc1", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", @@ -87006,126 +93353,82 @@ "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "score": 7.8 }, - "fixes": "1240eb93f0616b21c675416516ff3d74798fdc97", - "last_affected_version": "6.3.8", - "last_modified": "2023-12-06", - "nvd_text": "A use-after-free vulnerability was found in the Linux kernel's netfilter subsystem in net/netfilter/nf_tables_api.c.\n\nMishandled error handling with NFT_MSG_NEWRULE makes it possible to use a dangling pointer in the same transaction causing a use-after-free vulnerability. This flaw allows a local attacker with user access to cause a privilege escalation issue.\n\nWe recommend upgrading past commit\u00a01240eb93f0616b21c675416516ff3d74798fdc97.", - "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-3390", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-3390", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-3390", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-3390", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-3390", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-3390" - } - }, - "CVE-2023-33951": { - "affected_versions": "v5.17-rc1 to v6.4-rc1", - "breaks": "8afa13a0583f94c14607e3041c02f068ac8fb628", - "cmt_msg": "drm/vmwgfx: Do not drop the reference to the handle too soon", - "cvss3": { - "Attack Complexity": "High", - "Attack Vector": "Local", - "Availability": "None", - "Confidentiality": "High", - "Integrity": "None", - "Privileges Required": "High", - "Scope": "Changed", - "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N", - "score": 5.3 - }, - "fixes": "9ef8d83e8e25d5f1811b3a38eb1484f85f64296c", - "last_affected_version": "None", + "fixes": "1728137b33c00d5a2b5110ed7aafb42e7c32e4a1", + "last_affected_version": "6.4.9", "last_modified": "2023-12-06", - "nvd_text": "A race condition vulnerability was found in the vmwgfx driver in the Linux kernel. The flaw exists within the handling of GEM objects. The issue results from improper locking when performing operations on an object. This flaw allows a local privileged user to disclose information in the context of the kernel.", + "nvd_text": "An issue was discovered in l2cap_sock_release in net/bluetooth/l2cap_sock.c in the Linux kernel before 6.4.10. There is a use-after-free because the children of an sk are mishandled.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-33951", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-33951", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-33951", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-33951", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-33951", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-33951" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-40283", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-40283", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-40283", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-40283", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-40283", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-40283" } }, - "CVE-2023-33952": { - "affected_versions": "v5.17-rc1 to v6.4-rc1", - "breaks": "8afa13a0583f94c14607e3041c02f068ac8fb628", - "cmt_msg": "drm/vmwgfx: Do not drop the reference to the handle too soon", + "CVE-2023-40791": { + "affected_versions": "v6.3-rc1 to v6.5-rc6", + "breaks": "0185846975339a5c348373aa450a977f5242366b", + "cmt_msg": "crypto, cifs: fix error handling in extract_iter_to_sg()", "cvss3": { "Attack Complexity": "Low", - "Attack Vector": "Local", + "Attack Vector": "Network", "Availability": "High", - "Confidentiality": "High", + "Confidentiality": "None", "Integrity": "High", - "Privileges Required": "High", + "Privileges Required": "None", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", - "score": 6.7 + "raw": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", + "score": 9.1 }, - "fixes": "9ef8d83e8e25d5f1811b3a38eb1484f85f64296c", - "last_affected_version": "None", - "last_modified": "2024-01-12", - "nvd_text": "A double-free vulnerability was found in handling vmw_buffer_object objects in the vmwgfx driver in the Linux kernel. This issue occurs due to the lack of validating the existence of an object prior to performing further free operations on the object, which may allow a local privileged user to escalate privileges and execute code in the context of the kernel.", + "cwe": "Unspecified", + "fixes": "f443fd5af5dbd531f880d3645d5dd36976cf087f", + "last_affected_version": "6.4.11", + "last_modified": "2023-12-06", + "nvd_text": "extract_user_to_sg in lib/scatterlist.c in the Linux kernel before 6.4.12 fails to unpin pages in a certain situation, as demonstrated by a WARNING for try_grab_page.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-33952", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-33952", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-33952", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-33952", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-33952", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-33952" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-40791", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-40791", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-40791", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-40791", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-40791", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-40791" } }, - "CVE-2023-3397": { - "affected_versions": "unk to unk", - "breaks": "", + "CVE-2023-4128": { + "affected_versions": "v3.18-rc1 to v6.5-rc5", + "breaks": "de5df63228fcfbd5bb7fd883774c18fec9e61f12", + "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free", "cvss3": { - "Attack Complexity": "High", + "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", "Confidentiality": "High", - "Integrity": "None", + "Integrity": "High", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H", - "score": 6.3 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 7.8 }, - "fixes": "", + "fixes": "3044b16e7c6fe5d24b1cdbcf1bd0a9d92d1ebd81", + "last_affected_version": "6.4.9", "last_modified": "2023-12-06", - "nvd_text": "A race condition occurred between the functions lmLogClose and txEnd in JFS, in the Linux Kernel, executed in different threads. This flaw allows a local attacker with normal user privileges to crash the system or leak internal kernel information.", + "nvd_text": "Rejected reason: ** REJECT ** DO NOT USE THIS CVE RECORD. ConsultIDs: CVE-2023-4206, CVE-2023-4207, CVE-2023-4208. Reason: This record is a duplicate of CVE-2023-4206, CVE-2023-4207, CVE-2023-4208. Notes: All CVE users should reference CVE-2023-4206, CVE-2023-4207, CVE-2023-4208 instead of this record. All references and descriptions in this record have been removed to prevent accidental usage.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-3397", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-3397", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-3397", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-3397", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-3397", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-3397" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-4128", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-4128", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-4128", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-4128", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-4128", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-4128" } }, - "CVE-2023-34255": { - "affected_versions": "v2.6.12-rc2 to v6.4-rc1", - "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", - "cmt_msg": "xfs: verify buffer contents when we skip log replay", - "fixes": "22ed903eee23a5b174e240f1cdfa9acf393a5210", - "last_affected_version": "6.3.6", - "last_modified": "2023-12-06", - "nvd_text": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2023-2124. Reason: This candidate is a duplicate of CVE-2023-2124. Notes: All CVE users should reference CVE-2023-2124 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.", - "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-34255", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-34255", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-34255", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-34255", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-34255", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-34255" - }, - "rejected": true - }, - "CVE-2023-34256": { - "affected_versions": "v2.6.24-rc1 to v6.4-rc2", - "breaks": "717d50e4971b81b96c0199c91cdf0039a8cb181a", - "cmt_msg": "ext4: avoid a potential slab-out-of-bounds in ext4_group_desc_csum", + "CVE-2023-4132": { + "affected_versions": "v4.6-rc1 to v6.5-rc1", + "breaks": "dd47fbd40e6ea6884e295e13a2e50b0894258fdf", + "cmt_msg": "media: usb: siano: Fix warning due to null work_func_t function pointer", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", @@ -87138,81 +93441,97 @@ "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "score": 5.5 }, - "fixes": "4f04351888a83e595571de672e0a4a8b74f4fb31", - "last_affected_version": "6.3.2", + "fixes": "6f489a966fbeb0da63d45c2c66a8957eab604bf6", + "last_affected_version": "6.4.3", "last_modified": "2023-12-06", - "nvd_text": "An issue was discovered in the Linux kernel before 6.3.3. There is an out-of-bounds read in crc16 in lib/crc16.c when called from fs/ext4/super.c because ext4_group_desc_csum does not properly check an offset. NOTE: this is disputed by third parties because the kernel is not intended to defend against attackers with the stated \"When modifying the block device while it is mounted by the filesystem\" access.", + "nvd_text": "A use-after-free vulnerability was found in the siano smsusb module in the Linux kernel. The bug occurs during device initialization when the siano device is plugged in. This flaw allows a local user to crash the system, causing a denial of service condition.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-34256", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-34256", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-34256", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-34256", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-34256", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-34256" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-4132", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-4132", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-4132", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-4132", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-4132", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-4132" } }, - "CVE-2023-34319": { - "affected_versions": "v6.1 to v6.5-rc6", - "breaks": "ad7f402ae4f466647c3a669b8a6f3e5d4271c84a", - "cmt_msg": "xen/netback: Fix buffer overrun triggered by unusual packet", + "CVE-2023-4133": { + "affected_versions": "v4.15-rc1 to v6.3", + "breaks": "e0f911c81e93fc23fe1a4fb0318ff1c3b1c9027f", + "cmt_msg": "cxgb4: fix use after free bugs caused by circular dependency problem", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", - "Confidentiality": "High", - "Integrity": "High", + "Confidentiality": "None", + "Integrity": "None", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", - "score": 7.8 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "score": 5.5 }, - "fixes": "534fc31d09b706a16d83533e16b5dc855caf7576", - "last_affected_version": "6.4.8", + "fixes": "e50b9b9e8610d47b7c22529443e45a16b1ea3a15", + "last_affected_version": "6.2", "last_modified": "2023-12-06", - "nvd_text": "The fix for XSA-423 added logic to Linux'es netback driver to deal with\na frontend splitting a packet in a way such that not all of the headers\nwould come in one piece. Unfortunately the logic introduced there\ndidn't account for the extreme case of the entire packet being split\ninto as many pieces as permitted by the protocol, yet still being\nsmaller than the area that's specially dealt with to keep all (possible)\nheaders together. Such an unusual packet would therefore trigger a\nbuffer overrun in the driver.\n", + "nvd_text": "A use-after-free vulnerability was found in the cxgb4 driver in the Linux kernel. The bug occurs when the cxgb4 device is detaching due to a possible rearming of the flower_stats_timer from the work queue. This flaw allows a local user to crash the system, causing a denial of service condition.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-34319", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-34319", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-34319", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-34319", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-34319", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-34319" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-4133", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-4133", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-4133", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-4133", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-4133", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-4133" } }, - "CVE-2023-34324": { - "affected_versions": "v5.10-rc1 to v6.6-rc6", - "breaks": "54c9de89895e0a36047fcc4ae754ea5b8655fb9d", - "cmt_msg": "xen/events: replace evtchn_rwlock with RCU", + "CVE-2023-4134": { + "affected_versions": "v3.11-rc1 to v6.5-rc1", + "breaks": "17fb1563d69b63fe7a79570fe870cf7e530cd2cd", + "cmt_msg": "Input: cyttsp4_core - change del_timer_sync() to timer_shutdown_sync()", + "fixes": "dbe836576f12743a7d2d170ad4ad4fd324c4d47a", + "last_affected_version": "6.4.3", + "last_modified": "2023-08-25", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-4134", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-4134", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-4134", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-4134", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-4134", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-4134" + } + }, + "CVE-2023-4147": { + "affected_versions": "v5.9-rc1 to v6.5-rc4", + "breaks": "d0e2c7de92c7f2b3d355ad76b0bb9fc43d1beb87", + "cmt_msg": "netfilter: nf_tables: disallow rule addition to bound chain via NFTA_RULE_CHAIN_ID", "cvss3": { "Attack Complexity": "Low", - "Attack Vector": "Network", + "Attack Vector": "Local", "Availability": "High", - "Confidentiality": "None", - "Integrity": "None", - "Privileges Required": "High", + "Confidentiality": "High", + "Integrity": "High", + "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", - "score": 4.9 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 7.8 }, - "fixes": "87797fad6cce28ec9be3c13f031776ff4f104cfc", - "last_affected_version": "6.5.6", - "last_modified": "2024-01-12", - "nvd_text": "Closing of an event channel in the Linux kernel can result in a deadlock.\nThis happens when the close is being performed in parallel to an unrelated\nXen console action and the handling of a Xen console interrupt in an\nunprivileged guest.\n\nThe closing of an event channel is e.g. triggered by removal of a\nparavirtual device on the other side. As this action will cause console\nmessages to be issued on the other side quite often, the chance of\ntriggering the deadlock is not neglectable.\n\nNote that 32-bit Arm-guests are not affected, as the 32-bit Linux kernel\non Arm doesn't use queued-RW-locks, which are required to trigger the\nissue (on Arm32 a waiting writer doesn't block further readers to get\nthe lock).\n", + "fixes": "0ebc1064e4874d5987722a2ddbc18f94aa53b211", + "last_affected_version": "6.4.7", + "last_modified": "2023-12-06", + "nvd_text": "A use-after-free flaw was found in the Linux kernel\u2019s Netfilter functionality when adding a rule with NFTA_RULE_CHAIN_ID. This flaw allows a local user to crash or escalate their privileges on the system.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-34324", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-34324", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-34324", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-34324", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-34324", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-34324" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-4147", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-4147", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-4147", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-4147", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-4147", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-4147" } }, - "CVE-2023-3439": { - "affected_versions": "v5.15-rc1 to v5.18-rc5", - "breaks": "583be982d93479ea3d85091b0fd0b01201ede87d", - "cmt_msg": "mctp: defer the kfree of object mdev->addrs", + "CVE-2023-4155": { + "affected_versions": "v5.11-rc1 to v6.5-rc6", + "breaks": "291bd20d5d88814a73d43b55b9428feab2f28094", + "cmt_msg": "KVM: SEV: only access GHCB fields once", "cvss3": { "Attack Complexity": "High", "Attack Vector": "Local", @@ -87220,114 +93539,115 @@ "Confidentiality": "None", "Integrity": "None", "Privileges Required": "Low", - "Scope": "Unchanged", + "Scope": "Changed", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", - "score": 4.7 + "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H", + "score": 5.6 }, - "fixes": "b561275d633bcd8e0e8055ab86f1a13df75a0269", - "last_affected_version": "5.17.5", + "fixes": "7588dbcebcbf0193ab5b76987396d0254270b04a", + "last_affected_version": "6.4.10", "last_modified": "2023-12-06", - "nvd_text": "A flaw was found in the MCTP protocol in the Linux kernel. The function mctp_unregister() reclaims the device's relevant resource when a netcard detaches. However, a running routine may be unaware of this and cause the use-after-free of the mdev->addrs object, potentially leading to a denial of service.", + "nvd_text": "A flaw was found in KVM AMD Secure Encrypted Virtualization (SEV) in the Linux kernel. A KVM guest using SEV-ES or SEV-SNP with multiple vCPUs can trigger a double fetch race condition vulnerability and invoke the `VMGEXIT` handler recursively. If an attacker manages to call the handler multiple times, they can trigger a stack overflow and cause a denial of service or potentially guest-to-host escape in kernel configurations without stack guard pages (`CONFIG_VMAP_STACK`).", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-3439", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-3439", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-3439", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-3439", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-3439", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-3439" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-4155", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-4155", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-4155", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-4155", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-4155", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-4155" } }, - "CVE-2023-35001": { - "affected_versions": "v3.13-rc1 to v6.5-rc2", - "breaks": "96518518cc417bb0a8c80b9fb736202e28acdf96", - "cmt_msg": "netfilter: nf_tables: prevent OOB access in nft_byteorder_eval", + "CVE-2023-4194": { + "affected_versions": "v6.3-rc1 to v6.5-rc5", + "breaks": "a096ccca6e503a5c575717ff8a36ace27510ab0a", + "cmt_msg": "net: tun_chr_open(): set sk_uid from current_fsuid()", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", - "Availability": "High", - "Confidentiality": "High", + "Availability": "None", + "Confidentiality": "None", "Integrity": "High", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", - "score": 7.8 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", + "score": 5.5 }, - "fixes": "caf3ef7468f7534771b5c44cd8dbd6f7f87c2cbd", - "last_affected_version": "6.4.3", + "fixes": "9bc3047374d5bec163e83e743709e23753376f0c", + "last_affected_version": "6.4.9", "last_modified": "2023-12-06", - "nvd_text": "Linux Kernel nftables Out-Of-Bounds Read/Write Vulnerability; nft_byteorder poorly handled vm register contents when CAP_NET_ADMIN is in any user or network namespace", + "nvd_text": "A flaw was found in the Linux kernel's TUN/TAP functionality. This issue could allow a local user to bypass network filters and gain unauthorized access to some resources. The original patches fixing CVE-2023-1076 are incorrect or incomplete. The problem is that the following upstream commits - a096ccca6e50 (\"tun: tun_chr_open(): correctly initialize socket uid\"), - 66b2c338adce (\"tap: tap_open(): correctly initialize socket uid\"), pass \"inode->i_uid\" to sock_init_data_uid() as the last parameter and that turns out to not be accurate.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-35001", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-35001", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-35001", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-35001", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-35001", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-35001" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-4194", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-4194", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-4194", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-4194", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-4194", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-4194" } }, - "CVE-2023-3567": { - "affected_versions": "v2.6.38-rc3 to v6.2-rc7", - "breaks": "ac751efa6a0d70f2c9daef5c7e3a92270f5c2dff", - "cmt_msg": "vc_screen: move load of struct vc_data pointer in vcs_read() to avoid UAF", + "CVE-2023-4206": { + "affected_versions": "v3.18-rc1 to v6.5-rc5", + "breaks": "1109c00547fc66df45b9ff923544be4c1e1bec13", + "cmt_msg": "net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", "Confidentiality": "High", - "Integrity": "None", + "Integrity": "High", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", - "score": 7.1 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 7.8 }, - "fixes": "226fae124b2dac217ea5436060d623ff3385bc34", - "last_affected_version": "6.1.10", + "fixes": "b80b829e9e2c1b3f7aae34855e04d8f6ecaf13c8", + "last_affected_version": "6.4.9", "last_modified": "2023-12-06", - "nvd_text": "A use-after-free flaw was found in vcs_read in drivers/tty/vt/vc_screen.c in vc_screen in the Linux Kernel. This issue may allow an attacker with local user access to cause a system crash or leak internal kernel information.", + "nvd_text": "A use-after-free vulnerability in the Linux kernel's net/sched: cls_route component can be exploited to achieve local privilege escalation.\n\nWhen route4_change() is called on an existing filter, the whole tcf_result struct is always copied into the new instance of the filter. This causes a problem when updating a filter bound to a class, as tcf_unbind_filter() is always called on the old instance in the success path, decreasing filter_cnt of the still referenced class and allowing it to be deleted, leading to a use-after-free.\n\nWe recommend upgrading past commit b80b829e9e2c1b3f7aae34855e04d8f6ecaf13c8.\n\n", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-3567", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-3567", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-3567", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-3567", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-3567", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-3567" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-4206", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-4206", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-4206", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-4206", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-4206", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-4206" } }, - "CVE-2023-35693": { - "affected_versions": "unk to unk", - "breaks": "", + "CVE-2023-4207": { + "affected_versions": "v3.18-rc1 to v6.5-rc5", + "breaks": "e35a8ee5993ba81fd6c092f6827458c60406255b", + "cmt_msg": "net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", "Confidentiality": "High", "Integrity": "High", - "Privileges Required": "High", + "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", - "score": 6.7 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 7.8 }, - "fixes": "", + "fixes": "76e42ae831991c828cffa8c37736ebfb831ad5ec", + "last_affected_version": "6.4.9", "last_modified": "2023-12-06", - "nvd_text": "In incfs_kill_sb of fs/incfs/vfs.c, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.\n\n", + "nvd_text": "A use-after-free vulnerability in the Linux kernel's net/sched: cls_fw component can be exploited to achieve local privilege escalation.\n\nWhen fw_change() is called on an existing filter, the whole tcf_result struct is always copied into the new instance of the filter. This causes a problem when updating a filter bound to a class, as tcf_unbind_filter() is always called on the old instance in the success path, decreasing filter_cnt of the still referenced class and allowing it to be deleted, leading to a use-after-free.\n\nWe recommend upgrading past commit 76e42ae831991c828cffa8c37736ebfb831ad5ec.\n\n", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-35693", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-35693", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-35693", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-35693", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-35693", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-35693" - }, - "vendor_specific": true + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-4207", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-4207", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-4207", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-4207", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-4207", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-4207" + } }, - "CVE-2023-35788": { - "affected_versions": "v4.19-rc1 to v6.4-rc5", - "breaks": "0a6e77784f490912d81b92cfd48424541c04691e", - "cmt_msg": "net/sched: flower: fix possible OOB write in fl_set_geneve_opt()", + "CVE-2023-4208": { + "affected_versions": "v3.18-rc1 to v6.5-rc5", + "breaks": "de5df63228fcfbd5bb7fd883774c18fec9e61f12", + "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", @@ -87340,23 +93660,23 @@ "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "score": 7.8 }, - "fixes": "4d56304e5827c8cc8cc18c75343d283af7c4825c", - "last_affected_version": "6.3.6", + "fixes": "3044b16e7c6fe5d24b1cdbcf1bd0a9d92d1ebd81", + "last_affected_version": "6.4.9", "last_modified": "2023-12-06", - "nvd_text": "An issue was discovered in fl_set_geneve_opt in net/sched/cls_flower.c in the Linux kernel before 6.3.7. It allows an out-of-bounds write in the flower classifier code via TCA_FLOWER_KEY_ENC_OPTS_GENEVE packets. This may result in denial of service or privilege escalation.", + "nvd_text": "A use-after-free vulnerability in the Linux kernel's net/sched: cls_u32 component can be exploited to achieve local privilege escalation.\n\nWhen u32_change() is called on an existing filter, the whole tcf_result struct is always copied into the new instance of the filter. This causes a problem when updating a filter bound to a class, as tcf_unbind_filter() is always called on the old instance in the success path, decreasing filter_cnt of the still referenced class and allowing it to be deleted, leading to a use-after-free.\n\nWe recommend upgrading past commit 3044b16e7c6fe5d24b1cdbcf1bd0a9d92d1ebd81.\n\n", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-35788", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-35788", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-35788", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-35788", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-35788", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-35788" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-4208", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-4208", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-4208", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-4208", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-4208", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-4208" } }, - "CVE-2023-35823": { - "affected_versions": "v4.15-rc1 to v6.4-rc1", - "breaks": "1e7126b4a86ad69e870099fb6b922a3b6e29598b", - "cmt_msg": "media: saa7134: fix use after free bug in saa7134_finidev due to race condition", + "CVE-2023-4244": { + "affected_versions": "v5.6-rc1 to v6.5-rc7", + "breaks": "3c4287f62044a90e73a561aa05fc46e62da173da", + "cmt_msg": "netfilter: nf_tables: fix GC transaction races with netns and netlink event exit path", "cvss3": { "Attack Complexity": "High", "Attack Vector": "Local", @@ -87369,54 +93689,83 @@ "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "score": 7.0 }, - "fixes": "30cf57da176cca80f11df0d9b7f71581fe601389", - "last_affected_version": "6.3.1", + "fixes": "6a33d8b73dfac0a41f3877894b38082bd0c9a5bc", + "last_affected_version": "6.4.11", "last_modified": "2023-12-06", - "nvd_text": "An issue was discovered in the Linux kernel before 6.3.2. A use-after-free was found in saa7134_finidev in drivers/media/pci/saa7134/saa7134-core.c.", + "nvd_text": "A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation.\n\nDue to a race condition between nf_tables netlink control plane transaction and nft_set element garbage collection, it is possible to underflow the reference counter causing a use-after-free vulnerability.\n\nWe recommend upgrading past commit 3e91b0ebd994635df2346353322ac51ce84ce6d8.\n\n", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-35823", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-35823", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-35823", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-35823", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-35823", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-35823" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-4244", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-4244", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-4244", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-4244", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-4244", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-4244" } }, - "CVE-2023-35824": { - "affected_versions": "v2.6.34-rc1 to v6.4-rc1", - "breaks": "34d2f9bf189c36ef8642cf6b64e80dfb756d888f", - "cmt_msg": "media: dm1105: Fix use after free bug in dm1105_remove due to race condition", + "CVE-2023-4273": { + "affected_versions": "v5.7-rc1 to v6.5-rc5", + "breaks": "ca06197382bde0a3bc20215595d1c9ce20c6e341", + "cmt_msg": "exfat: check if filename entries exceeds max filename length", "cvss3": { - "Attack Complexity": "High", + "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", "Confidentiality": "High", "Integrity": "High", + "Privileges Required": "High", + "Scope": "Unchanged", + "User Interaction": "None", + "raw": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "score": 6.7 + }, + "fixes": "d42334578eba1390859012ebb91e1e556d51db49", + "last_affected_version": "6.4.9", + "last_modified": "2023-12-06", + "nvd_text": "A flaw was found in the exFAT driver of the Linux kernel. The vulnerability exists in the implementation of the file name reconstruction function, which is responsible for reading file name entries from a directory index and merging file name parts belonging to one file into a single long file name. Since the file name characters are copied into a stack variable, a local privileged attacker could use this flaw to overflow the kernel stack.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-4273", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-4273", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-4273", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-4273", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-4273", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-4273" + } + }, + "CVE-2023-42752": { + "affected_versions": "v2.6.38-rc1 to v6.6-rc1", + "breaks": "57e1ab6eaddc9f2c358cd4afb497cda6e3c6821a", + "cmt_msg": "igmp: limit igmpv3_newpack() packet size to IP_MAX_MTU", + "cvss3": { + "Attack Complexity": "Low", + "Attack Vector": "Local", + "Availability": "High", + "Confidentiality": "None", + "Integrity": "None", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", - "score": 7.0 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "score": 5.5 }, - "fixes": "5abda7a16698d4d1f47af1168d8fa2c640116b4a", - "last_affected_version": "6.3.1", + "fixes": "c3b704d4a4a265660e665df51b129e8425216ed1", + "last_affected_version": "6.5.2", "last_modified": "2023-12-06", - "nvd_text": "An issue was discovered in the Linux kernel before 6.3.2. A use-after-free was found in dm1105_remove in drivers/media/pci/dm1105/dm1105.c.", + "nvd_text": "An integer overflow flaw was found in the Linux kernel. This issue leads to the kernel allocating `skb_shared_info` in the userspace, which is exploitable in systems without SMAP protection since `skb_shared_info` contains references to function pointers.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-35824", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-35824", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-35824", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-35824", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-35824", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-35824" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-42752", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-42752", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-42752", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-42752", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-42752", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-42752" } }, - "CVE-2023-35826": { - "affected_versions": "v5.18-rc1 to v6.4-rc1", - "breaks": "7c38a551bda1b7adea7e98e5c6786f5bee7100b8", - "cmt_msg": "media: cedrus: fix use after free bug in cedrus_remove due to race condition", + "CVE-2023-42753": { + "affected_versions": "v4.20-rc2 to v6.6-rc1", + "breaks": "886503f34d63e681662057448819edb5b1057a97", + "cmt_msg": "netfilter: ipset: add the missing IP_SET_HASH_WITH_NET0 macro for ip_set_hash_netportnet.c", "cvss3": { - "Attack Complexity": "High", + "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", "Confidentiality": "High", @@ -87424,255 +93773,258 @@ "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", - "score": 7.0 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 7.8 }, - "fixes": "50d0a7aea4809cef87979d4669911276aa23b71f", - "last_affected_version": "6.3.1", + "fixes": "050d91c03b28ca479df13dfb02bcd2c60dd6a878", + "last_affected_version": "6.5.2", "last_modified": "2023-12-06", - "nvd_text": "An issue was discovered in the Linux kernel before 6.3.2. A use-after-free was found in cedrus_remove in drivers/staging/media/sunxi/cedrus/cedrus.c.", + "nvd_text": "An array indexing vulnerability was found in the netfilter subsystem of the Linux kernel. A missing macro could lead to a miscalculation of the `h->nets` array offset, providing attackers with the primitive to arbitrarily increment/decrement a memory buffer out-of-bound. This issue may allow a local user to crash the system or potentially escalate their privileges on the system.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-35826", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-35826", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-35826", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-35826", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-35826", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-35826" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-42753", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-42753", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-42753", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-42753", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-42753", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-42753" } }, - "CVE-2023-35827": { - "affected_versions": "v4.2-rc1 to v6.6-rc6", - "breaks": "c156633f1353264634135dea86ffcae74f2122fc", - "cmt_msg": "ravb: Fix use-after-free issue in ravb_tx_timeout_work()", + "CVE-2023-42754": { + "affected_versions": "v5.1-rc6 to v6.6-rc3", + "breaks": "ed0de45a1008991fdaa27a0152befcb74d126a8b", + "cmt_msg": "ipv4: fix null-deref in ipv4_link_failure", "cvss3": { - "Attack Complexity": "High", + "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", - "Confidentiality": "High", - "Integrity": "High", + "Confidentiality": "None", + "Integrity": "None", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", - "score": 7.0 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "score": 5.5 }, - "fixes": "3971442870713de527684398416970cf025b4f89", - "last_affected_version": "6.5.7", - "last_modified": "2024-02-02", - "nvd_text": "An issue was discovered in the Linux kernel through 6.3.8. A use-after-free was found in ravb_remove in drivers/net/ethernet/renesas/ravb_main.c.", + "fixes": "0113d9c9d1ccc07f5a3710dac4aa24b6d711278c", + "last_affected_version": "6.5.5", + "last_modified": "2023-12-06", + "nvd_text": "A NULL pointer dereference flaw was found in the Linux kernel ipv4 stack. The socket buffer (skb) was assumed to be associated with a device before calling __ip_options_compile, which is not always the case if the skb is re-routed by ipvs. This issue may allow a local user with CAP_NET_ADMIN privileges to crash the system.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-35827", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-35827", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-35827", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-35827", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-35827", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-35827" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-42754", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-42754", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-42754", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-42754", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-42754", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-42754" } }, - "CVE-2023-35828": { - "affected_versions": "v4.19-rc1 to v6.4-rc1", - "breaks": "39facfa01c9fc64f90233d1734882f0a0cafe36a", - "cmt_msg": "usb: gadget: udc: renesas_usb3: Fix use after free bug in renesas_usb3_remove due to race condition", + "CVE-2023-42755": { + "affected_versions": "v2.6.12-rc2 to v6.3-rc1", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "net/sched: Retire rsvp classifier", "cvss3": { - "Attack Complexity": "High", + "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", - "Confidentiality": "High", - "Integrity": "High", + "Confidentiality": "None", + "Integrity": "None", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", - "score": 7.0 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "score": 5.5 }, - "fixes": "2b947f8769be8b8181dc795fd292d3e7120f5204", - "last_affected_version": "6.3.1", + "fixes": "265b4da82dbf5df04bee5a5d46b7474b1aaf326a", + "last_affected_version": "6.1.54", "last_modified": "2023-12-06", - "nvd_text": "An issue was discovered in the Linux kernel before 6.3.2. A use-after-free was found in renesas_usb3_remove in drivers/usb/gadget/udc/renesas_usb3.c.", + "nvd_text": "A flaw was found in the IPv4 Resource Reservation Protocol (RSVP) classifier in the Linux kernel. The xprt pointer may go beyond the linear part of the skb, leading to an out-of-bounds read in the `rsvp_classify` function. This issue may allow a local user to crash the system and cause a denial of service.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-35828", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-35828", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-35828", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-35828", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-35828", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-35828" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-42755", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-42755", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-42755", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-42755", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-42755", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-42755" } }, - "CVE-2023-35829": { - "affected_versions": "v5.8-rc1 to v6.4-rc1", - "breaks": "cd33c830448baf7b1e94da72eca069e3e1d050c9", - "cmt_msg": "media: rkvdec: fix use after free bug in rkvdec_remove", + "CVE-2023-42756": { + "affected_versions": "v6.4-rc6 to v6.6-rc3", + "breaks": "24e227896bbf003165e006732dccb3516f87f88e", + "cmt_msg": "netfilter: ipset: Fix race between IPSET_CMD_CREATE and IPSET_CMD_SWAP", "cvss3": { "Attack Complexity": "High", "Attack Vector": "Local", "Availability": "High", - "Confidentiality": "High", - "Integrity": "High", + "Confidentiality": "None", + "Integrity": "None", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", - "score": 7.0 + "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", + "score": 4.7 }, - "fixes": "3228cec23b8b29215e18090c6ba635840190993d", - "last_affected_version": "6.3.1", + "fixes": "7433b6d2afd512d04398c73aa984d1e285be125b", + "last_affected_version": "6.5.5", "last_modified": "2023-12-06", - "nvd_text": "An issue was discovered in the Linux kernel before 6.3.2. A use-after-free was found in rkvdec_remove in drivers/staging/media/rkvdec/rkvdec.c.", + "nvd_text": "A flaw was found in the Netfilter subsystem of the Linux kernel. A race condition between IPSET_CMD_ADD and IPSET_CMD_SWAP can lead to a kernel panic due to the invocation of `__ip_set_put` on a wrong `set`. This issue may allow a local user to crash the system.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-35829", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-35829", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-35829", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-35829", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-35829", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-35829" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-42756", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-42756", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-42756", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-42756", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-42756", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-42756" } }, - "CVE-2023-3609": { - "affected_versions": "v4.14-rc1 to v6.4-rc7", - "breaks": "705c7091262d02b09eb686c24491de61bf42fdb2", - "cmt_msg": "net/sched: cls_u32: Fix reference counter leak leading to overflow", + "CVE-2023-4385": { + "affected_versions": "v2.6.12-rc2 to v5.19-rc1", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "fs: jfs: fix possible NULL pointer dereference in dbFree()", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", - "Confidentiality": "High", - "Integrity": "High", + "Confidentiality": "None", + "Integrity": "None", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", - "score": 7.8 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "score": 5.5 }, - "fixes": "04c55383fa5689357bcdd2c8036725a55ed632bc", - "last_affected_version": "6.3.8", + "fixes": "0d4837fdb796f99369cf7691d33de1b856bcaf1f", + "last_affected_version": "5.18.2", "last_modified": "2023-12-06", - "nvd_text": "A use-after-free vulnerability in the Linux kernel's net/sched: cls_u32 component can be exploited to achieve local privilege escalation.\n\nIf tcf_change_indev() fails, u32_set_parms() will immediately return an error after incrementing or decrementing the reference counter in tcf_bind_filter(). If an attacker can control the reference counter and set it to zero, they can cause the reference to be freed, leading to a use-after-free vulnerability.\n\nWe recommend upgrading past commit 04c55383fa5689357bcdd2c8036725a55ed632bc.\n\n", + "nvd_text": "A NULL pointer dereference flaw was found in dbFree in fs/jfs/jfs_dmap.c in the journaling file system (JFS) in the Linux Kernel. This issue may allow a local attacker to crash the system due to a missing sanity check.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-3609", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-3609", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-3609", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-3609", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-3609", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-3609" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-4385", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-4385", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-4385", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-4385", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-4385", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-4385" } }, - "CVE-2023-3610": { - "affected_versions": "v5.9-rc1 to v6.4", - "breaks": "d0e2c7de92c7f2b3d355ad76b0bb9fc43d1beb87", - "cmt_msg": "netfilter: nf_tables: fix chain binding transaction logic", + "CVE-2023-4387": { + "affected_versions": "v4.4-rc4 to v5.18", + "breaks": "5738a09d58d5ad2871f1f9a42bf6a3aa9ece5b3c", + "cmt_msg": "net: vmxnet3: fix possible use-after-free bugs in vmxnet3_rq_alloc_rx_buf()", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", "Confidentiality": "High", - "Integrity": "High", + "Integrity": "None", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", - "score": 7.8 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", + "score": 7.1 }, - "fixes": "4bedf9eee016286c835e3d8fa981ddece5338795", - "last_affected_version": "6.3", + "fixes": "9e7fef9521e73ca8afd7da9e58c14654b02dfad8", + "last_affected_version": "5.17", "last_modified": "2023-12-06", - "nvd_text": "A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation.\n\nFlaw in the error handling of bound chains causes a use-after-free in the abort path of NFT_MSG_NEWRULE. The vulnerability requires CAP_NET_ADMIN to be triggered.\n\nWe recommend upgrading past commit 4bedf9eee016286c835e3d8fa981ddece5338795.\n\n", + "nvd_text": "A use-after-free flaw was found in vmxnet3_rq_alloc_rx_buf in drivers/net/vmxnet3/vmxnet3_drv.c in VMware's vmxnet3 ethernet NIC driver in the Linux Kernel. This issue could allow a local attacker to crash the system due to a double-free while cleaning up vmxnet3_rq_cleanup_all, which could also lead to a kernel information leak problem.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-3610", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-3610", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-3610", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-3610", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-3610", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-3610" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-4387", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-4387", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-4387", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-4387", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-4387", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-4387" } }, - "CVE-2023-3611": { - "affected_versions": "v3.8-rc1 to v6.5-rc2", - "breaks": "462dbc9101acd38e92eda93c0726857517a24bbd", - "cmt_msg": "net/sched: sch_qfq: account for stab overhead in qfq_enqueue", + "CVE-2023-4389": { + "affected_versions": "v5.7-rc1 to v5.18-rc3", + "breaks": "bc44d7c4b2b179c4b74fba208b9908e2ecbc1b4d", + "cmt_msg": "btrfs: fix root ref counts in error handling in btrfs_get_root_ref", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", "Confidentiality": "High", - "Integrity": "High", + "Integrity": "None", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", - "score": 7.8 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", + "score": 7.1 }, - "fixes": "3e337087c3b5805fe0b8a46ba622a962880b5d64", - "last_affected_version": "6.4.4", + "fixes": "168a2f776b9762f4021421008512dd7ab7474df1", + "last_affected_version": "5.17.3", "last_modified": "2023-12-06", - "nvd_text": "An out-of-bounds write vulnerability in the Linux kernel's net/sched: sch_qfq component can be exploited to achieve local privilege escalation.\n\nThe qfq_change_agg() function in net/sched/sch_qfq.c allows an out-of-bounds write because lmax is updated according to packet sizes without bounds checks.\n\nWe recommend upgrading past commit 3e337087c3b5805fe0b8a46ba622a962880b5d64.\n\n", + "nvd_text": "A flaw was found in btrfs_get_root_ref in fs/btrfs/disk-io.c in the btrfs filesystem in the Linux Kernel due to a double decrement of the reference count. This issue may allow a local attacker with user privilege to crash the system or may lead to leaked internal kernel information.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-3611", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-3611", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-3611", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-3611", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-3611", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-3611" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-4389", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-4389", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-4389", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-4389", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-4389", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-4389" } }, - "CVE-2023-3640": { - "affected_versions": "unk to unk", - "breaks": "", + "CVE-2023-4394": { + "affected_versions": "v5.16-rc1 to v6.0-rc3", + "breaks": "faa775c41d655a4786e9d53cb075a77bb5a75f66", + "cmt_msg": "btrfs: fix possible memory leak in btrfs_get_dev_args_from_path()", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", "Confidentiality": "High", - "Integrity": "High", - "Privileges Required": "Low", + "Integrity": "None", + "Privileges Required": "High", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", - "score": 7.8 + "raw": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H", + "score": 6.0 }, - "fixes": "", + "fixes": "9ea0106a7a3d8116860712e3f17cd52ce99f6707", + "last_affected_version": "5.19.5", "last_modified": "2023-12-06", - "nvd_text": "A possible unauthorized memory access flaw was found in the Linux kernel's cpu_entry_area mapping of X86 CPU data to memory, where a user may guess the location of exception stacks or other important data. Based on the previous CVE-2023-0597, the 'Randomize per-cpu entry area' feature was implemented in /arch/x86/mm/cpu_entry_area.c, which works through the init_cea_offsets() function when KASLR is enabled. However, despite this feature, there is still a risk of per-cpu entry area leaks. This issue could allow a local user to gain access to some important data with memory in an expected location and potentially escalate their privileges on the system.", + "nvd_text": "A use-after-free flaw was found in btrfs_get_dev_args_from_path in fs/btrfs/volumes.c in btrfs file-system in the Linux Kernel. This flaw allows a local attacker with special privileges to cause a system crash or leak internal kernel information", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-3640", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-3640", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-3640", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-3640", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-3640", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-3640" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-4394", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-4394", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-4394", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-4394", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-4394", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-4394" } }, - "CVE-2023-37453": { - "affected_versions": "v6.3-rc1 to v6.6-rc1", - "breaks": "45bf39f8df7f05efb83b302c65ae3b9bc92b7065", - "cmt_msg": "USB: core: Fix race by not overwriting udev->descriptor in hub_port_init()", + "CVE-2023-44466": { + "affected_versions": "v5.11-rc1 to v6.5-rc2", + "breaks": "cd1a677cad994021b19665ed476aea63f5d54f31", + "cmt_msg": "libceph: harden msgr2.1 frame segment length checks", "cvss3": { "Attack Complexity": "Low", - "Attack Vector": "Physical", + "Attack Vector": "Network", "Availability": "High", - "Confidentiality": "None", - "Integrity": "None", - "Privileges Required": "None", + "Confidentiality": "High", + "Integrity": "High", + "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", - "score": 4.6 + "raw": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 8.8 }, - "fixes": "ff33299ec8bb80cdcc073ad9c506bd79bb2ed20b", - "last_affected_version": "6.5.2", + "fixes": "a282a2f10539dce2aa619e71e1817570d557fc97", + "last_affected_version": "6.4.4", "last_modified": "2023-12-06", - "nvd_text": "An issue was discovered in the USB subsystem in the Linux kernel through 6.4.2. There is an out-of-bounds and crash in read_descriptors in drivers/usb/core/sysfs.c.", + "nvd_text": "An issue was discovered in net/ceph/messenger_v2.c in the Linux kernel before 6.4.5. There is an integer signedness error, leading to a buffer overflow and remote code execution via HELLO or one of the AUTH frames. This occurs because of an untrusted length taken from a TCP packet in ceph_decode_32.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-37453", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-37453", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-37453", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-37453", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-37453", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-37453" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-44466", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-44466", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-44466", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-44466", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-44466", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-44466" } }, - "CVE-2023-37454": { - "affected_versions": "unk to unk", - "breaks": "", + "CVE-2023-4459": { + "affected_versions": "v2.6.32-rc5 to v5.18", + "breaks": "d1a890fa37f27d6aca3abc6e25e4148efc3223a6", + "cmt_msg": "net: vmxnet3: fix possible NULL pointer dereference in vmxnet3_rq_cleanup()", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", @@ -87685,138 +94037,157 @@ "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "score": 5.5 }, - "fixes": "", + "fixes": "edf410cb74dc612fd47ef5be319c5a0bcd6e6ccd", + "last_affected_version": "5.17", "last_modified": "2023-12-06", - "nvd_text": "An issue was discovered in the Linux kernel through 6.4.2. A crafted UDF filesystem image causes a use-after-free write operation in the udf_put_super and udf_close_lvid functions in fs/udf/super.c. NOTE: the suse.com reference has a different perspective about this.", + "nvd_text": "A NULL pointer dereference flaw was found in vmxnet3_rq_cleanup in drivers/net/vmxnet3/vmxnet3_drv.c in the networking sub-component in vmxnet3 in the Linux Kernel. This issue may allow a local attacker with normal user privilege to cause a denial of service due to a missing sanity check during cleanup.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-37454", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-37454", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-37454", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-37454", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-37454", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-37454" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-4459", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-4459", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-4459", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-4459", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-4459", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-4459" } }, - "CVE-2023-3772": { - "affected_versions": "v2.6.39-rc1 to v6.5-rc7", - "breaks": "d8647b79c3b7e223ac051439d165bc8e7bbb832f", - "cmt_msg": "xfrm: add NULL check in xfrm_update_ae_params", + "CVE-2023-4563": { + "affected_versions": "v5.6-rc1 to v6.5-rc6", + "breaks": "3c4287f62044a90e73a561aa05fc46e62da173da", + "cmt_msg": "netfilter: nf_tables: don't skip expired elements during walk", + "fixes": "24138933b97b055d486e8064b4a1721702442a9b", + "last_affected_version": "6.4.10", + "last_modified": "2023-12-06", + "nvd_text": "Rejected reason: This was assigned as a duplicate of CVE-2023-4244.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-4563", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-4563", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-4563", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-4563", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-4563", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-4563" + }, + "rejected": true + }, + "CVE-2023-4569": { + "affected_versions": "v5.13-rc1 to v6.5-rc7", + "breaks": "aaa31047a6d25da0fa101da1ed544e1247949b40", + "cmt_msg": "netfilter: nf_tables: deactivate catchall elements in next generation", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", "Confidentiality": "None", "Integrity": "None", - "Privileges Required": "High", + "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", - "score": 4.4 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "score": 5.5 }, - "fixes": "00374d9b6d9f932802b55181be9831aa948e5b7c", + "fixes": "90e5b3462efa37b8bba82d7c4e63683856e188af", "last_affected_version": "6.4.11", "last_modified": "2023-12-06", - "nvd_text": "A flaw was found in the Linux kernel\u2019s IP framework for transforming packets (XFRM subsystem). This issue may allow a malicious user with CAP_NET_ADMIN privileges to directly dereference a NULL pointer in xfrm_update_ae_params(), leading to a possible kernel crash and denial of service.", + "nvd_text": "A memory leak flaw was found in nft_set_catchall_flush in net/netfilter/nf_tables_api.c in the Linux Kernel. This issue may allow a local attacker to cause double-deactivations of catchall elements, which can result in a memory leak.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-3772", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-3772", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-3772", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-3772", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-3772", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-3772" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-4569", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-4569", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-4569", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-4569", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-4569", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-4569" } }, - "CVE-2023-3773": { - "affected_versions": "v5.17-rc1 to v6.5-rc7", - "breaks": "4e484b3e969b52effd95c17f7a86f39208b2ccf4", - "cmt_msg": "xfrm: add forgotten nla_policy for XFRMA_MTIMER_THRESH", + "CVE-2023-45862": { + "affected_versions": "v3.1-rc1 to v6.3-rc1", + "breaks": "33842cedfc33ee907b2a702f321a26f7c0bf0aaa", + "cmt_msg": "USB: ene_usb6250: Allocate enough memory for full object", "cvss3": { "Attack Complexity": "Low", - "Attack Vector": "Local", - "Availability": "None", - "Confidentiality": "High", + "Attack Vector": "Network", + "Availability": "High", + "Confidentiality": "None", "Integrity": "None", - "Privileges Required": "High", + "Privileges Required": "None", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", - "score": 4.4 + "raw": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "score": 7.5 }, - "fixes": "5e2424708da7207087934c5c75211e8584d553a0", - "last_affected_version": "6.4.11", + "fixes": "ce33e64c1788912976b61314b56935abd4bc97ef", + "last_affected_version": "6.2.4", "last_modified": "2023-12-06", - "nvd_text": "A flaw was found in the Linux kernel\u2019s IP framework for transforming packets (XFRM subsystem). This issue may allow a malicious user with CAP_NET_ADMIN privileges to cause a 4 byte out-of-bounds read of XFRMA_MTIMER_THRESH when parsing netlink attributes, leading to potential leakage of sensitive heap data to userspace.", + "nvd_text": "An issue was discovered in drivers/usb/storage/ene_ub6250.c for the ENE UB6250 reader driver in the Linux kernel before 6.2.5. An object could potentially extend beyond the end of an allocation.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-3773", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-3773", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-3773", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-3773", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-3773", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-3773" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-45862", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-45862", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-45862", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-45862", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-45862", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-45862" } }, - "CVE-2023-3776": { - "affected_versions": "v2.6.12-rc2 to v6.5-rc2", + "CVE-2023-45863": { + "affected_versions": "v2.6.12-rc2 to v6.3-rc1", "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", - "cmt_msg": "net/sched: cls_fw: Fix improper refcount update leads to use-after-free", + "cmt_msg": "kobject: Fix slab-out-of-bounds in fill_kobj_path()", "cvss3": { - "Attack Complexity": "Low", + "Attack Complexity": "High", "Attack Vector": "Local", "Availability": "High", "Confidentiality": "High", "Integrity": "High", - "Privileges Required": "Low", + "Privileges Required": "High", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", - "score": 7.8 + "raw": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", + "score": 6.4 }, - "fixes": "0323bce598eea038714f941ce2b22541c46d488f", - "last_affected_version": "6.4.4", + "fixes": "3bb2a01caa813d3a1845d378bbe4169ef280d394", + "last_affected_version": "6.2.2", "last_modified": "2023-12-06", - "nvd_text": "A use-after-free vulnerability in the Linux kernel's net/sched: cls_fw component can be exploited to achieve local privilege escalation.\n\nIf tcf_change_indev() fails, fw_set_parms() will immediately return an error after incrementing or decrementing the reference counter in tcf_bind_filter(). If an attacker can control the reference counter and set it to zero, they can cause the reference to be freed, leading to a use-after-free vulnerability.\n\nWe recommend upgrading past commit 0323bce598eea038714f941ce2b22541c46d488f.\n\n", + "nvd_text": "An issue was discovered in lib/kobject.c in the Linux kernel before 6.2.3. With root access, an attacker can trigger a race condition that results in a fill_kobj_path out-of-bounds write.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-3776", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-3776", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-3776", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-3776", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-3776", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-3776" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-45863", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-45863", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-45863", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-45863", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-45863", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-45863" } }, - "CVE-2023-3777": { - "affected_versions": "v5.9-rc1 to v6.5-rc3", - "breaks": "d0e2c7de92c7f2b3d355ad76b0bb9fc43d1beb87", - "cmt_msg": "netfilter: nf_tables: skip bound chain on rule flush", + "CVE-2023-45871": { + "affected_versions": "v3.4-rc1 to v6.6-rc1", + "breaks": "89eaefb61dc9170237d95b844dd357338fc7225d", + "cmt_msg": "igb: set max size RX buffer when store bad packet is enabled", "cvss3": { "Attack Complexity": "Low", - "Attack Vector": "Local", + "Attack Vector": "Network", "Availability": "High", "Confidentiality": "High", "Integrity": "High", - "Privileges Required": "Low", + "Privileges Required": "None", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", - "score": 7.8 + "raw": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "score": 9.8 }, - "fixes": "6eaf41e87a223ae6f8e7a28d6e78384ad7e407f8", - "last_affected_version": "6.4.6", + "fixes": "bb5ed01cd2428cd25b1c88a3a9cba87055eb289f", + "last_affected_version": "6.5.2", "last_modified": "2023-12-06", - "nvd_text": "A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation.\n\nWhen nf_tables_delrule() is flushing table rules, it is not checked whether the chain is bound and the chain's owner rule can also release the objects in certain circumstances.\n\nWe recommend upgrading past commit 6eaf41e87a223ae6f8e7a28d6e78384ad7e407f8.\n\n", + "nvd_text": "An issue was discovered in drivers/net/ethernet/intel/igb/igb_main.c in the IGB driver in the Linux kernel before 6.5.3. A buffer size may not be adequate for frames larger than the MTU.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-3777", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-3777", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-3777", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-3777", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-3777", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-3777" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-45871", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-45871", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-45871", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-45871", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-45871", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-45871" } }, - "CVE-2023-3812": { - "affected_versions": "v4.15-rc1 to v6.1-rc4", - "breaks": "90e33d45940793def6f773b2d528e9f3c84ffdc7", - "cmt_msg": "net: tun: fix bugs for oversize packet when napi frags enabled", + "CVE-2023-45898": { + "affected_versions": "v6.5-rc1 to v6.6-rc1", + "breaks": "2a69c450083db164596c75c0f5b4d9c4c0e18eba", + "cmt_msg": "ext4: fix slab-use-after-free in ext4_es_insert_extent()", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", @@ -87829,539 +94200,450 @@ "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "score": 7.8 }, - "fixes": "363a5328f4b0517e59572118ccfb7c626d81dca9", - "last_affected_version": "6.0.7", + "fixes": "768d612f79822d30a1e7d132a4d4b05337ce42ec", + "last_affected_version": "6.5.3", "last_modified": "2023-12-06", - "nvd_text": "An out-of-bounds memory access flaw was found in the Linux kernel\u2019s TUN/TAP device driver functionality in how a user generates a malicious (too big) networking packet when napi frags is enabled. This flaw allows a local user to crash or potentially escalate their privileges on the system.", + "nvd_text": "The Linux kernel before 6.5.4 has an es1 use-after-free in fs/ext4/extents_status.c, related to ext4_es_insert_extent.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-3812", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-3812", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-3812", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-3812", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-3812", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-3812" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-45898", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-45898", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-45898", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-45898", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-45898", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-45898" } }, - "CVE-2023-38409": { - "affected_versions": "v5.19-rc1 to v6.3-rc7", - "breaks": "d443d93864726ad68c0a741d1e7b03934a9af143", - "cmt_msg": "fbcon: set_con2fb_map needs to set con2fb_map!", - "cvss3": { - "Attack Complexity": "Low", - "Attack Vector": "Local", - "Availability": "High", - "Confidentiality": "None", - "Integrity": "None", - "Privileges Required": "Low", - "Scope": "Unchanged", - "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", - "score": 5.5 - }, - "cwe": "Unspecified", - "fixes": "fffb0b52d5258554c645c966c6cbef7de50b851d", - "last_affected_version": "6.2.11", - "last_modified": "2023-12-06", - "nvd_text": "An issue was discovered in set_con2fb_map in drivers/video/fbdev/core/fbcon.c in the Linux kernel before 6.2.12. Because an assignment occurs only for the first vc, the fbcon_registered_fb and fbcon_display arrays can be desynchronized in fbcon_mode_deleted (the con2fb_map points at the old fb_info).", + "CVE-2023-4610": { + "affected_versions": "v6.4-rc1 to v6.4", + "breaks": "f95bdb700bc6bb74e1199b1f5f90c613e152cfa7", + "cmt_msg": "Revert \"mm: vmscan: make global slab shrink lockless\"", + "fixes": "71c3ad65fabec9620d3f548b2da948c79c7ad9d5", + "last_affected_version": "6.3", + "last_modified": "2024-01-15", + "nvd_text": "Rejected reason: The SRCU code was added in upstream kernel v6.4-rc1 and removed before v6.4. This bug only existed in development kernels. Please see https://lore.kernel.org/all/ZTKVfoQZplpB8rki@casper.infradead.org and https://bugzilla.suse.com/show_bug.cgi?id=1215932 for more information.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-38409", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-38409", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-38409", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-38409", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-38409", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-38409" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-4610", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-4610", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-4610", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-4610", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-4610", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-4610" } }, - "CVE-2023-38426": { - "affected_versions": "v5.15-rc1 to v6.4-rc3", - "breaks": "0626e6641f6b467447c81dd7678a69c66f7746cf", - "cmt_msg": "ksmbd: fix global-out-of-bounds in smb2_find_context_vals", + "CVE-2023-4611": { + "affected_versions": "v6.4-rc1 to v6.5-rc4", + "breaks": "5e31275cc997f8ec5d9e8d65fe9840ebed89db19", + "cmt_msg": "mm/mempolicy: Take VMA lock before replacing policy", "cvss3": { - "Attack Complexity": "Low", - "Attack Vector": "Network", + "Attack Complexity": "High", + "Attack Vector": "Local", "Availability": "High", "Confidentiality": "High", "Integrity": "None", - "Privileges Required": "None", + "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", - "score": 9.1 + "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H", + "score": 6.3 }, - "fixes": "02f76c401d17e409ed45bf7887148fcc22c93c85", - "last_affected_version": "6.3.3", + "fixes": "6c21e066f9256ea1df6f88768f6ae1080b7cf509", + "last_affected_version": "6.4.7", "last_modified": "2023-12-06", - "nvd_text": "An issue was discovered in the Linux kernel before 6.3.4. ksmbd has an out-of-bounds read in smb2_find_context_vals when create_context's name_len is larger than the tag length.", + "nvd_text": "A use-after-free flaw was found in mm/mempolicy.c in the memory management subsystem in the Linux Kernel. This issue is caused by a race between mbind() and VMA-locked page fault, and may allow a local attacker to crash the system or lead to a kernel information leak.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-38426", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-38426", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-38426", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-38426", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-38426", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-38426" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-4611", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-4611", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-4611", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-4611", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-4611", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-4611" } }, - "CVE-2023-38427": { - "affected_versions": "v5.15-rc1 to v6.4-rc6", - "breaks": "0626e6641f6b467447c81dd7678a69c66f7746cf", - "cmt_msg": "ksmbd: fix out-of-bound read in deassemble_neg_contexts()", + "CVE-2023-4622": { + "affected_versions": "v4.2-rc1 to v6.5-rc1", + "breaks": "869e7c62486ec0e170a9771acaa251d1a33b5871", + "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES", "cvss3": { - "Attack Complexity": "Low", - "Attack Vector": "Network", + "Attack Complexity": "High", + "Attack Vector": "Local", "Availability": "High", "Confidentiality": "High", "Integrity": "High", - "Privileges Required": "None", - "Scope": "Unchanged", - "User Interaction": "None", - "raw": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", - "score": 9.8 - }, - "fixes": "f1a411873c85b642f13b01f21b534c2bab81fc1b", - "last_affected_version": "6.3.7", - "last_modified": "2023-12-27", - "nvd_text": "An issue was discovered in the Linux kernel before 6.3.8. fs/smb/server/smb2pdu.c in ksmbd has an integer underflow and out-of-bounds read in deassemble_neg_contexts.", - "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-38427", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-38427", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-38427", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-38427", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-38427", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-38427" - } - }, - "CVE-2023-38428": { - "affected_versions": "v5.15-rc1 to v6.4-rc3", - "breaks": "0626e6641f6b467447c81dd7678a69c66f7746cf", - "cmt_msg": "ksmbd: fix wrong UserName check in session_user", - "cvss3": { - "Attack Complexity": "Low", - "Attack Vector": "Network", - "Availability": "High", - "Confidentiality": "High", - "Integrity": "None", - "Privileges Required": "None", + "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", - "score": 9.1 + "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 7.0 }, - "fixes": "f0a96d1aafd8964e1f9955c830a3e5cb3c60a90f", - "last_affected_version": "6.3.3", + "fixes": "57d44a354a43edba4ef9963327d4657d12edbfbc", "last_modified": "2023-12-06", - "nvd_text": "An issue was discovered in the Linux kernel before 6.3.4. fs/ksmbd/smb2pdu.c in ksmbd does not properly check the UserName value because it does not consider the address of security buffer, leading to an out-of-bounds read.", + "nvd_text": "A use-after-free vulnerability in the Linux kernel's af_unix component can be exploited to achieve local privilege escalation.\n\nThe unix_stream_sendpage() function tries to add data to the last skb in the peer's recv queue without locking the queue. Thus there is a race where unix_stream_sendpage() could access an skb locklessly that is being released by garbage collection, resulting in use-after-free.\n\nWe recommend upgrading past commit 790c2f9d15b594350ae9bca7b236f2b1859de02c.\n\n", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-38428", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-38428", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-38428", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-38428", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-38428", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-38428" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-4622", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-4622", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-4622", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-4622", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-4622", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-4622" } }, - "CVE-2023-38429": { - "affected_versions": "v5.15-rc1 to v6.4-rc3", - "breaks": "0626e6641f6b467447c81dd7678a69c66f7746cf", - "cmt_msg": "ksmbd: allocate one more byte for implied bcc[0]", + "CVE-2023-4623": { + "affected_versions": "v2.6.12-rc2 to v6.6-rc1", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "net/sched: sch_hfsc: Ensure inner classes have fsc curve", "cvss3": { "Attack Complexity": "Low", - "Attack Vector": "Network", + "Attack Vector": "Local", "Availability": "High", "Confidentiality": "High", "Integrity": "High", - "Privileges Required": "None", + "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", - "score": 9.8 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 7.8 }, - "fixes": "443d61d1fa9faa60ef925513d83742902390100f", - "last_affected_version": "6.3.3", + "fixes": "b3d26c5702c7d6c45456326e56d2ccf3f103e60f", + "last_affected_version": "6.5.2", "last_modified": "2023-12-06", - "nvd_text": "An issue was discovered in the Linux kernel before 6.3.4. fs/ksmbd/connection.c in ksmbd has an off-by-one error in memory allocation (because of ksmbd_smb2_check_message) that may lead to out-of-bounds access.", + "nvd_text": "A use-after-free vulnerability in the Linux kernel's net/sched: sch_hfsc (HFSC qdisc traffic control) component can be exploited to achieve local privilege escalation.\n\nIf a class with a link-sharing curve (i.e. with the HFSC_FSC flag set) has a parent without a link-sharing curve, then init_vf() will call vttree_insert() on the parent, but vttree_remove() will be skipped in update_vf(). This leaves a dangling pointer that can cause a use-after-free.\n\nWe recommend upgrading past commit b3d26c5702c7d6c45456326e56d2ccf3f103e60f.\n\n", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-38429", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-38429", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-38429", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-38429", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-38429", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-38429" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-4623", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-4623", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-4623", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-4623", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-4623", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-4623" } }, - "CVE-2023-38430": { - "affected_versions": "v5.15-rc1 to v6.4-rc6", - "breaks": "0626e6641f6b467447c81dd7678a69c66f7746cf", - "cmt_msg": "ksmbd: validate smb request protocol id", + "CVE-2023-46343": { + "affected_versions": "v3.11-rc1 to v6.6-rc7", + "breaks": "391d8a2da787257aeaf952c974405b53926e3fb3", + "cmt_msg": "nfc: nci: fix possible NULL pointer dereference in send_acknowledge()", "cvss3": { "Attack Complexity": "Low", - "Attack Vector": "Network", + "Attack Vector": "Local", "Availability": "High", - "Confidentiality": "High", + "Confidentiality": "None", "Integrity": "None", - "Privileges Required": "None", + "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", - "score": 9.1 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "score": 5.5 }, - "fixes": "1c1bcf2d3ea061613119b534f57507c377df20f9", - "last_affected_version": "6.3.8", - "last_modified": "2023-12-27", - "nvd_text": "An issue was discovered in the Linux kernel before 6.3.9. ksmbd does not validate the SMB request protocol ID, leading to an out-of-bounds read.", + "fixes": "7937609cd387246aed994e81aa4fa951358fba41", + "last_affected_version": "6.5.8", + "last_modified": "2024-02-02", + "nvd_text": "In the Linux kernel before 6.5.9, there is a NULL pointer dereference in send_acknowledge in net/nfc/nci/spi.c.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-38430", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-38430", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-38430", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-38430", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-38430", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-38430" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-46343", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-46343", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-46343", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-46343", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-46343", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-46343" } }, - "CVE-2023-38431": { - "affected_versions": "v5.15-rc1 to v6.4-rc6", - "breaks": "0626e6641f6b467447c81dd7678a69c66f7746cf", - "cmt_msg": "ksmbd: check the validation of pdu_size in ksmbd_conn_handler_loop", + "CVE-2023-46813": { + "affected_versions": "v5.10-rc1 to v6.6-rc7", + "breaks": "597cfe48212a3f110ab0f918bf59791f453e65b7", + "cmt_msg": "x86/sev: Check for user-space IOIO pointing to kernel space", "cvss3": { - "Attack Complexity": "Low", - "Attack Vector": "Network", + "Attack Complexity": "High", + "Attack Vector": "Local", "Availability": "High", "Confidentiality": "High", - "Integrity": "None", - "Privileges Required": "None", + "Integrity": "High", + "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", - "score": 9.1 - }, - "fixes": "368ba06881c395f1c9a7ba22203cf8d78b4addc0", - "last_affected_version": "6.3.7", - "last_modified": "2023-12-27", - "nvd_text": "An issue was discovered in the Linux kernel before 6.3.8. fs/smb/server/connection.c in ksmbd does not validate the relationship between the NetBIOS header's length field and the SMB header sizes, via pdu_size in ksmbd_conn_handler_loop, leading to an out-of-bounds read.", + "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 7.0 + }, + "cwe": "Unspecified", + "fixes": "63e44bc52047f182601e7817da969a105aa1f721", + "last_affected_version": "6.5.8", + "last_modified": "2023-12-06", + "nvd_text": "An issue was discovered in the Linux kernel before 6.5.9, exploitable by local users with userspace access to MMIO registers. Incorrect access checking in the #VC handler and instruction emulation of the SEV-ES emulation of MMIO accesses could lead to arbitrary write access to kernel memory (and thus privilege escalation). This depends on a race condition through which userspace can replace an instruction before the #VC handler reads it.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-38431", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-38431", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-38431", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-38431", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-38431", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-38431" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-46813", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-46813", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-46813", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-46813", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-46813", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-46813" } }, - "CVE-2023-38432": { - "affected_versions": "v5.15-rc1 to v6.4", - "breaks": "0626e6641f6b467447c81dd7678a69c66f7746cf", - "cmt_msg": "ksmbd: validate command payload size", + "CVE-2023-46838": { + "affected_versions": "v2.6.12-rc2 to v6.8-rc2", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "xen-netback: don't produce zero-size SKB frags", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Network", "Availability": "High", - "Confidentiality": "High", + "Confidentiality": "None", "Integrity": "None", "Privileges Required": "None", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", - "score": 9.1 + "raw": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "score": 7.5 }, - "fixes": "2b9b8f3b68edb3d67d79962f02e26dbb5ae3808d", - "last_affected_version": "6.3", - "last_modified": "2023-12-06", - "nvd_text": "An issue was discovered in the Linux kernel before 6.3.10. fs/smb/server/smb2misc.c in ksmbd does not validate the relationship between the command payload size and the RFC1002 length specification, leading to an out-of-bounds read.", + "fixes": "c7ec4f2d684e17d69bbdd7c4324db0ef5daac26a", + "last_affected_version": "6.7.1", + "last_modified": "2024-02-02", + "nvd_text": "Transmit requests in Xen's virtual network protocol can consist of\nmultiple parts. While not really useful, except for the initial part\nany of them may be of zero length, i.e. carry no data at all. Besides a\ncertain initial portion of the to be transferred data, these parts are\ndirectly translated into what Linux calls SKB fragments. Such converted\nrequest parts can, when for a particular SKB they are all of length\nzero, lead to a de-reference of NULL in core networking code.\n", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-38432", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-38432", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-38432", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-38432", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-38432", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-38432" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-46838", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-46838", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-46838", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-46838", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-46838", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-46838" } }, - "CVE-2023-3863": { - "affected_versions": "v3.8-rc1 to v6.5-rc1", - "breaks": "52feb444a90304eb13c03115bb9758101dbb9254", - "cmt_msg": "net: nfc: Fix use-after-free caused by nfc_llcp_find_local", + "CVE-2023-46862": { + "affected_versions": "v5.10-rc1 to v6.6", + "breaks": "dbbe9c642411c359ad0a0e32442eb2e11d3811b5", + "cmt_msg": "io_uring/fdinfo: lock SQ thread while retrieving thread cpu/pid", "cvss3": { "Attack Complexity": "High", "Attack Vector": "Local", - "Availability": "None", - "Confidentiality": "High", + "Availability": "High", + "Confidentiality": "None", "Integrity": "None", - "Privileges Required": "High", + "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N", - "score": 4.1 + "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", + "score": 4.7 }, - "fixes": "6709d4b7bc2e079241fdef15d1160581c5261c10", - "last_affected_version": "6.4.3", + "fixes": "7644b1a1c9a7ae8ab99175989bfc8676055edb46", + "last_affected_version": "6.5", "last_modified": "2023-12-06", - "nvd_text": "A use-after-free flaw was found in nfc_llcp_find_local in net/nfc/llcp_core.c in NFC in the Linux kernel. This flaw allows a local user with special privileges to impact a kernel information leak issue.", - "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-3863", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-3863", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-3863", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-3863", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-3863", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-3863" - } - }, - "CVE-2023-3865": { - "affected_versions": "v5.15-rc1 to v6.4", - "breaks": "a848c4f15ab6d5d405dbee7de5da71839b2bf35e", - "cmt_msg": "ksmbd: fix out-of-bound read in smb2_write", - "fixes": "5fe7f7b78290638806211046a99f031ff26164e1", - "last_affected_version": "6.3", - "last_modified": "2023-09-17", - "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-3865", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-3865", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-3865", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-3865", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-3865", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-3865" - } - }, - "CVE-2023-3866": { - "affected_versions": "v5.15-rc1 to v6.4", - "breaks": "a848c4f15ab6d5d405dbee7de5da71839b2bf35e", - "cmt_msg": "ksmbd: validate session id and tree id in the compound request", - "fixes": "5005bcb4219156f1bf7587b185080ec1da08518e", - "last_affected_version": "6.3", - "last_modified": "2023-09-17", - "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-3866", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-3866", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-3866", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-3866", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-3866", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-3866" - } - }, - "CVE-2023-3867": { - "affected_versions": "v5.15-rc1 to v6.5-rc1", - "breaks": "a848c4f15ab6d5d405dbee7de5da71839b2bf35e", - "cmt_msg": "ksmbd: add missing compound request handing in some commands", - "fixes": "7b7d709ef7cf285309157fb94c33f625dd22c5e1", - "last_affected_version": "6.4.4", - "last_modified": "2023-12-27", + "nvd_text": "An issue was discovered in the Linux kernel through 6.5.9. During a race with SQ thread exit, an io_uring/fdinfo.c io_uring_show_fdinfo NULL pointer dereference can occur.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-3867", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-3867", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-3867", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-3867", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-3867", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-3867" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-46862", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-46862", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-46862", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-46862", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-46862", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-46862" } }, - "CVE-2023-39189": { - "affected_versions": "v2.6.31-rc1 to v6.6-rc1", - "breaks": "11eeef41d5f63c7d2f7fdfcc733eb7fb137cc384", - "cmt_msg": "netfilter: nfnetlink_osf: avoid OOB read", + "CVE-2023-47233": { + "affected_versions": "v3.7-rc1 to v6.9-rc1", + "breaks": "e756af5b30b008f6ffcfebf8ad0b477f6f225b62", + "cmt_msg": "wifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach", "cvss3": { "Attack Complexity": "Low", - "Attack Vector": "Local", + "Attack Vector": "Physical", "Availability": "High", - "Confidentiality": "High", + "Confidentiality": "None", "Integrity": "None", - "Privileges Required": "High", + "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H", - "score": 6.0 + "raw": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "score": 4.3 }, - "fixes": "f4f8a7803119005e87b716874bec07c751efafec", - "last_affected_version": "6.5.3", - "last_modified": "2023-12-06", - "nvd_text": "A flaw was found in the Netfilter subsystem in the Linux kernel. The nfnl_osf_add_callback function did not validate the user mode controlled opt_num field. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, leading to a crash or information disclosure.", + "fixes": "0f7352557a35ab7888bc7831411ec8a3cbe20d78", + "last_affected_version": "6.7.11", + "last_modified": "2024-04-06", + "nvd_text": "The brcm80211 component in the Linux kernel through 6.5.10 has a brcmf_cfg80211_detach use-after-free in the device unplugging (disconnect the USB by hotplug) code. For physically proximate attackers with local access, this \"could be exploited in a real world scenario.\" This is related to brcmf_cfg80211_escan_timeout_worker in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-39189", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-39189", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-39189", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-39189", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-39189", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-39189" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-47233", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-47233", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-47233", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-47233", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-47233", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-47233" } }, - "CVE-2023-39191": { - "affected_versions": "v5.19-rc1 to v6.3-rc1", - "breaks": "97e03f521050c092919591e668107b3d69c5f426", - "cmt_msg": "bpf: Fix state pruning for STACK_DYNPTR stack slots", + "CVE-2023-4732": { + "affected_versions": "v5.7-rc1 to v5.14-rc1", + "breaks": "5a281062af1d43d3f3956a6b429c2d727bc92603", + "cmt_msg": "mm/userfaultfd: fix uffd-wp special cases for fork()", "cvss3": { - "Attack Complexity": "Low", + "Attack Complexity": "High", "Attack Vector": "Local", "Availability": "High", - "Confidentiality": "High", - "Integrity": "High", - "Privileges Required": "High", - "Scope": "Changed", + "Confidentiality": "None", + "Integrity": "None", + "Privileges Required": "Low", + "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", - "score": 8.2 + "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", + "score": 4.7 }, - "cwe": "Unspecified", - "fixes": "d6fefa1105dacc8a742cdcf2f4bfb501c9e61349", - "last_affected_version": "6.2.2", - "last_modified": "2023-12-06", - "nvd_text": "An improper input validation flaw was found in the eBPF subsystem in the Linux kernel. The issue occurs due to a lack of proper validation of dynamic pointers within user-supplied eBPF programs prior to executing them. This may allow an attacker with CAP_BPF privileges to escalate privileges and execute arbitrary code in the context of the kernel.", + "fixes": "8f34f1eac3820fc2722e5159acceb22545b30b0d", + "last_affected_version": "5.13.4", + "last_modified": "2024-01-15", + "nvd_text": "A flaw was found in pfn_swap_entry_to_page in memory management subsystem in the Linux Kernel. In this flaw, an attacker with a local user privilege may cause a denial of service problem due to a BUG statement referencing pmd_t x.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-39191", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-39191", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-39191", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-39191", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-39191", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-39191" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-4732", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-4732", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-4732", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-4732", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-4732", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-4732" } }, - "CVE-2023-39192": { - "affected_versions": "v2.6.23-rc1 to v6.6-rc1", - "breaks": "1b50b8a371e90a5e110f466e4ac02cf6b5f681de", - "cmt_msg": "netfilter: xt_u32: validate user space input", + "CVE-2023-4881": { + "affected_versions": "v4.1-rc1 to v6.6-rc1", + "breaks": "49499c3e6e18b7677a63316f3ff54a16533dc28f", + "cmt_msg": "netfilter: nftables: exthdr: fix 4-byte stack OOB write", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", "Confidentiality": "High", "Integrity": "None", - "Privileges Required": "High", + "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H", - "score": 6.0 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", + "score": 7.1 }, - "fixes": "69c5d284f67089b4750d28ff6ac6f52ec224b330", - "last_affected_version": "6.5.2", + "fixes": "fd94d9dadee58e09b49075240fe83423eb1dcd36", + "last_affected_version": "6.5.3", "last_modified": "2023-12-06", - "nvd_text": "A flaw was found in the Netfilter subsystem in the Linux kernel. The xt_u32 module did not validate the fields in the xt_u32 structure. This flaw allows a local privileged attacker to trigger an out-of-bounds read by setting the size fields with a value beyond the array boundaries, leading to a crash or information disclosure.", + "nvd_text": "Rejected reason: CVE-2023-4881 was wrongly assigned to a bug that was deemed to be a non-security issue by the Linux kernel security team.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-39192", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-39192", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-39192", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-39192", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-39192", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-39192" - } + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-4881", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-4881", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-4881", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-4881", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-4881", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-4881" + }, + "rejected": true }, - "CVE-2023-39193": { - "affected_versions": "v2.6.16-rc1 to v6.6-rc1", - "breaks": "2e4e6a17af35be359cc8f1c924f8f198fbd478cc", - "cmt_msg": "netfilter: xt_sctp: validate the flag_info count", + "CVE-2023-4921": { + "affected_versions": "v3.8-rc1 to v6.6-rc1", + "breaks": "462dbc9101acd38e92eda93c0726857517a24bbd", + "cmt_msg": "net: sched: sch_qfq: Fix UAF in qfq_dequeue()", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", "Confidentiality": "High", - "Integrity": "None", - "Privileges Required": "High", + "Integrity": "High", + "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H", - "score": 6.0 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 7.8 }, - "fixes": "e99476497687ef9e850748fe6d232264f30bc8f9", - "last_affected_version": "6.5.2", + "fixes": "8fc134fee27f2263988ae38920bc03da416b03d8", + "last_affected_version": "6.5.3", "last_modified": "2023-12-06", - "nvd_text": "A flaw was found in the Netfilter subsystem in the Linux kernel. The sctp_mt_check did not validate the flag_count field. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, leading to a crash or information disclosure.", + "nvd_text": "A use-after-free vulnerability in the Linux kernel's net/sched: sch_qfq component can be exploited to achieve local privilege escalation.\n\nWhen the plug qdisc is used as a class of the qfq qdisc, sending network packets triggers use-after-free in qfq_dequeue() due to the incorrect .peek handler of sch_plug and lack of error checking in agg_dequeue().\n\nWe recommend upgrading past commit 8fc134fee27f2263988ae38920bc03da416b03d8.\n\n", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-39193", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-39193", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-39193", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-39193", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-39193", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-39193" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-4921", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-4921", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-4921", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-4921", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-4921", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-4921" } }, - "CVE-2023-39194": { - "affected_versions": "v3.15-rc1 to v6.5-rc7", - "breaks": "d3623099d3509fa68fa28235366049dd3156c63a", - "cmt_msg": "net: xfrm: Fix xfrm_address_filter OOB read", + "CVE-2023-50431": { + "affected_versions": "v5.1-rc1 to v6.8-rc1", + "breaks": "c4d66343a46a4931d6a547042198896e4fd1c592", + "cmt_msg": "accel/habanalabs: fix information leak in sec_attest_info()", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "None", "Confidentiality": "High", "Integrity": "None", - "Privileges Required": "High", + "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", - "score": 4.4 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "score": 5.5 }, - "fixes": "dfa73c17d55b921e1d4e154976de35317e43a93a", - "last_affected_version": "6.4.11", - "last_modified": "2023-12-06", - "nvd_text": "A flaw was found in the XFRM subsystem in the Linux kernel. The specific flaw exists within the processing of state filters, which can result in a read past the end of an allocated buffer. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, potentially leading to an information disclosure.", + "cwe": "Unspecified", + "fixes": "a9f07790a4b2250f0140e9a61c7f842fd9b618c7", + "last_affected_version": "6.7.1", + "last_modified": "2024-02-02", + "nvd_text": "sec_attest_info in drivers/accel/habanalabs/common/habanalabs_ioctl.c in the Linux kernel through 6.6.5 allows an information leak to user space because info->pad0 is not initialized.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-39194", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-39194", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-39194", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-39194", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-39194", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-39194" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-50431", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-50431", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-50431", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-50431", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-50431", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-50431" } }, - "CVE-2023-39197": { - "affected_versions": "v2.6.26-rc1 to v6.5-rc1", - "breaks": "2bc780499aa33311ec0f3e42624dfaa7be0ade5e", - "cmt_msg": "netfilter: conntrack: dccp: copy entire header to stack buffer, not just basic one", + "CVE-2023-5090": { + "affected_versions": "v6.0-rc1 to v6.6-rc7", + "breaks": "4d1d7942e36add0aa741a62d0c8e3aba2d5b3ab1", + "cmt_msg": "x86: KVM: SVM: always update the x2avic msr interception", "cvss3": { "Attack Complexity": "Low", - "Attack Vector": "Network", - "Availability": "None", - "Confidentiality": "High", + "Attack Vector": "Local", + "Availability": "High", + "Confidentiality": "None", "Integrity": "None", - "Privileges Required": "None", + "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", - "score": 7.5 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "score": 5.5 }, - "fixes": "ff0a3a7d52ff7282dbd183e7fc29a1fe386b0c30", - "last_affected_version": "6.4.3", - "last_modified": "2024-02-02", - "nvd_text": "An out-of-bounds read vulnerability was found in Netfilter Connection Tracking (conntrack) in the Linux kernel. This flaw allows a remote user to disclose sensitive information via the DCCP protocol.", + "fixes": "b65235f6e102354ccafda601eaa1c5bef5284d21", + "last_affected_version": "6.5.8", + "last_modified": "2023-12-06", + "nvd_text": "A flaw was found in KVM. An improper check in svm_set_x2apic_msr_interception() may allow direct access to host x2apic msrs when the guest resets its apic, potentially leading to a denial of service condition.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-39197", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-39197", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-39197", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-39197", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-39197", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-39197" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-5090", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-5090", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-5090", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-5090", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-5090", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-5090" } }, - "CVE-2023-39198": { - "affected_versions": "v3.10-rc1 to v6.5-rc7", - "breaks": "f64122c1f6ade301585569863b4b3b18f6e4e332", - "cmt_msg": "drm/qxl: fix UAF on handle creation", + "CVE-2023-51042": { + "affected_versions": "v4.15-rc1 to v6.5-rc1", + "breaks": "7a0a48ddf63bc9944b9690c6fa043ea4305f7f79", + "cmt_msg": "drm/amdgpu: Fix potential fence use-after-free v2", "cvss3": { - "Attack Complexity": "High", + "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", "Confidentiality": "High", "Integrity": "High", - "Privileges Required": "High", + "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", - "score": 6.4 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 7.8 }, - "fixes": "c611589b4259ed63b9b77be6872b1ce07ec0ac16", + "fixes": "2e54154b9f27262efd0cb4f903cc7d5ad1fe9628", "last_affected_version": "6.4.11", "last_modified": "2024-02-02", - "nvd_text": "A race condition was found in the QXL driver in the Linux kernel. The qxl_mode_dumb_create() function dereferences the qobj returned by the qxl_gem_object_create_with_handle(), but the handle is the only one holding a reference to it. This flaw allows an attacker to guess the returned handle value and trigger a use-after-free issue, potentially leading to a denial of service or privilege escalation.", + "nvd_text": "In the Linux kernel before 6.4.12, amdgpu_cs_wait_all_fences in drivers/gpu/drm/amd/amdgpu/amdgpu_cs.c has a fence use-after-free.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-39198", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-39198", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-39198", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-39198", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-39198", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-39198" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-51042", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-51042", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-51042", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-51042", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-51042", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-51042" } }, - "CVE-2023-4004": { - "affected_versions": "v5.6-rc1 to v6.5-rc3", - "breaks": "3c4287f62044a90e73a561aa05fc46e62da173da", - "cmt_msg": "netfilter: nft_set_pipapo: fix improper element removal", + "CVE-2023-51043": { + "affected_versions": "v2.6.12-rc2 to v6.5-rc3", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "drm/atomic: Fix potential use-after-free in nonblocking commits", "cvss3": { - "Attack Complexity": "Low", + "Attack Complexity": "High", "Attack Vector": "Local", "Availability": "High", "Confidentiality": "High", @@ -88369,84 +94651,105 @@ "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", - "score": 7.8 + "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 7.0 }, - "fixes": "87b5a5c209405cb6b57424cdfa226a6dbd349232", - "last_affected_version": "6.4.6", - "last_modified": "2023-12-06", - "nvd_text": "A use-after-free flaw was found in the Linux kernel's netfilter in the way a user triggers the nft_pipapo_remove function with the element, without a NFT_SET_EXT_KEY_END. This issue could allow a local user to crash the system or potentially escalate their privileges on the system.", + "fixes": "4e076c73e4f6e90816b30fcd4a0d7ab365087255", + "last_affected_version": "6.4.4", + "last_modified": "2024-02-02", + "nvd_text": "In the Linux kernel before 6.4.5, drivers/gpu/drm/drm_atomic.c has a use-after-free during a race condition between a nonblocking atomic commit and a driver unload.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-4004", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-4004", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-4004", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-4004", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-4004", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-4004" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-51043", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-51043", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-51043", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-51043", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-51043", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-51043" } }, - "CVE-2023-4010": { - "affected_versions": "v2.6.35-rc1 to unk", - "breaks": "21677cfc562a27e099719d413287bc8d1d24deb7", + "CVE-2023-5158": { + "affected_versions": "v5.13-rc1 to v6.6-rc5", + "breaks": "b8c06ad4d67db56ed6bdfb685c134da74e92a2c7", + "cmt_msg": "vringh: don't use vringh_kiov_advance() in vringh_iov_xfer()", "cvss3": { "Attack Complexity": "Low", - "Attack Vector": "Physical", + "Attack Vector": "Local", "Availability": "High", "Confidentiality": "None", "Integrity": "None", - "Privileges Required": "None", + "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", - "score": 4.6 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "score": 5.5 }, - "fixes": "", - "last_modified": "2024-02-02", - "nvd_text": "A flaw was found in the USB Host Controller Driver framework in the Linux kernel. The usb_giveback_urb function has a logic loophole in its implementation. Due to the inappropriate judgment condition of the goto statement, the function cannot return under the input of a specific malformed descriptor file, so it falls into an endless loop, resulting in a denial of service.", + "cwe": "Unspecified", + "fixes": "7aed44babc7f97e82b38e9a68515e699692cc100", + "last_affected_version": "6.5.6", + "last_modified": "2023-12-06", + "nvd_text": "A flaw was found in vringh_kiov_advance in drivers/vhost/vringh.c in the host side of a virtio ring in the Linux Kernel. This issue may result in a denial of service from guest to host via zero length descriptor.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-4010", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-4010", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-4010", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-4010", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-4010", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-4010" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-5158", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-5158", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-5158", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-5158", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-5158", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-5158" } }, - "CVE-2023-4015": { - "affected_versions": "v5.9-rc1 to v6.5-rc4", - "breaks": "d0e2c7de92c7f2b3d355ad76b0bb9fc43d1beb87", - "cmt_msg": "netfilter: nf_tables: skip immediate deactivate in _PREPARE_ERROR", + "CVE-2023-51779": { + "affected_versions": "v2.6.12-rc2 to v6.7-rc7", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "Bluetooth: af_bluetooth: Fix Use-After-Free in bt_sock_recvmsg", + "fixes": "2e07e8348ea454615e268222ae3fc240421be768", + "last_affected_version": "6.6.8", + "last_modified": "2024-04-09", + "nvd_text": "bt_sock_recvmsg in net/bluetooth/af_bluetooth.c in the Linux kernel through 6.6.8 has a use-after-free because of a bt_sock_ioctl race condition.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-51779", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-51779", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-51779", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-51779", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-51779", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-51779" + } + }, + "CVE-2023-5178": { + "affected_versions": "v5.0-rc1 to v6.6-rc7", + "backport": true, + "breaks": "872d26a391da92ed8f0c0f5cb5fef428067b7f30", + "cmt_msg": "nvmet-tcp: Fix a possible UAF in queue intialization setup", "cvss3": { "Attack Complexity": "Low", - "Attack Vector": "Local", + "Attack Vector": "Network", "Availability": "High", "Confidentiality": "High", "Integrity": "High", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", - "score": 7.8 + "raw": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 8.8 }, - "fixes": "0a771f7b266b02d262900c75f1e175c7fe76fec2", - "last_affected_version": "6.4.7", - "last_modified": "2023-12-06", - "nvd_text": "A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation.\n\nOn an error when building a nftables rule, deactivating immediate expressions in nft_immediate_deactivate() can lead unbinding the chain and objects be deactivated but later used.\n\nWe recommend upgrading past commit 0a771f7b266b02d262900c75f1e175c7fe76fec2.\n\n", + "fixes": "872d26a391da92ed8f0c0f5cb5fef428067b7f30", + "last_affected_version": "6.5.8", + "last_modified": "2024-02-09", + "nvd_text": "A use-after-free vulnerability was found in drivers/nvme/target/tcp.c` in `nvmet_tcp_free_crypto` due to a logical bug in the NVMe/TCP subsystem in the Linux kernel. This issue may allow a malicious user to cause a use-after-free and double-free problem, which may permit remote code execution or lead to local privilege escalation.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-4015", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-4015", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-4015", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-4015", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-4015", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-4015" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-5178", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-5178", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-5178", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-5178", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-5178", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-5178" } }, - "CVE-2023-40283": { - "affected_versions": "v2.6.12-rc2 to v6.5-rc1", + "CVE-2023-51780": { + "affected_versions": "v2.6.12-rc2 to v6.7-rc6", "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", - "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb", + "cmt_msg": "atm: Fix Use-After-Free in do_vcc_ioctl", "cvss3": { - "Attack Complexity": "Low", + "Attack Complexity": "High", "Attack Vector": "Local", "Availability": "High", "Confidentiality": "High", @@ -88454,58 +94757,57 @@ "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", - "score": 7.8 + "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 7.0 }, - "fixes": "1728137b33c00d5a2b5110ed7aafb42e7c32e4a1", - "last_affected_version": "6.4.9", - "last_modified": "2023-12-06", - "nvd_text": "An issue was discovered in l2cap_sock_release in net/bluetooth/l2cap_sock.c in the Linux kernel before 6.4.10. There is a use-after-free because the children of an sk are mishandled.", + "fixes": "24e90b9e34f9e039f56b5f25f6e6eb92cdd8f4b3", + "last_affected_version": "6.6.7", + "last_modified": "2024-02-02", + "nvd_text": "An issue was discovered in the Linux kernel before 6.6.8. do_vcc_ioctl in net/atm/ioctl.c has a use-after-free because of a vcc_recvmsg race condition.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-40283", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-40283", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-40283", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-40283", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-40283", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-40283" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-51780", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-51780", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-51780", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-51780", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-51780", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-51780" } }, - "CVE-2023-40791": { - "affected_versions": "v6.3-rc1 to v6.5-rc6", - "breaks": "0185846975339a5c348373aa450a977f5242366b", - "cmt_msg": "crypto, cifs: fix error handling in extract_iter_to_sg()", + "CVE-2023-51781": { + "affected_versions": "v2.6.12-rc2 to v6.7-rc6", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "appletalk: Fix Use-After-Free in atalk_ioctl", "cvss3": { - "Attack Complexity": "Low", - "Attack Vector": "Network", + "Attack Complexity": "High", + "Attack Vector": "Local", "Availability": "High", - "Confidentiality": "None", + "Confidentiality": "High", "Integrity": "High", - "Privileges Required": "None", + "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", - "score": 9.1 + "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 7.0 }, - "cwe": "Unspecified", - "fixes": "f443fd5af5dbd531f880d3645d5dd36976cf087f", - "last_affected_version": "6.4.11", - "last_modified": "2023-12-06", - "nvd_text": "extract_user_to_sg in lib/scatterlist.c in the Linux kernel before 6.4.12 fails to unpin pages in a certain situation, as demonstrated by a WARNING for try_grab_page.", + "fixes": "189ff16722ee36ced4d2a2469d4ab65a8fee4198", + "last_affected_version": "6.6.7", + "last_modified": "2024-02-02", + "nvd_text": "An issue was discovered in the Linux kernel before 6.6.8. atalk_ioctl in net/appletalk/ddp.c has a use-after-free because of an atalk_recvmsg race condition.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-40791", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-40791", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-40791", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-40791", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-40791", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-40791" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-51781", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-51781", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-51781", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-51781", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-51781", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-51781" } }, - "CVE-2023-4128": { - "affected_versions": "v3.18-rc1 to v6.5-rc5", - "breaks": "de5df63228fcfbd5bb7fd883774c18fec9e61f12", - "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free", + "CVE-2023-51782": { + "affected_versions": "v2.6.12-rc2 to v6.7-rc6", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "net/rose: Fix Use-After-Free in rose_ioctl", "cvss3": { - "Attack Complexity": "Low", + "Attack Complexity": "High", "Attack Vector": "Local", "Availability": "High", "Confidentiality": "High", @@ -88513,55 +94815,71 @@ "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", - "score": 7.8 + "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 7.0 }, - "fixes": "3044b16e7c6fe5d24b1cdbcf1bd0a9d92d1ebd81", - "last_affected_version": "6.4.9", - "last_modified": "2023-12-06", - "nvd_text": "Rejected reason: ** REJECT ** DO NOT USE THIS CVE RECORD. ConsultIDs: CVE-2023-4206, CVE-2023-4207, CVE-2023-4208. Reason: This record is a duplicate of CVE-2023-4206, CVE-2023-4207, CVE-2023-4208. Notes: All CVE users should reference CVE-2023-4206, CVE-2023-4207, CVE-2023-4208 instead of this record. All references and descriptions in this record have been removed to prevent accidental usage.", + "fixes": "810c38a369a0a0ce625b5c12169abce1dd9ccd53", + "last_affected_version": "6.6.7", + "last_modified": "2024-02-02", + "nvd_text": "An issue was discovered in the Linux kernel before 6.6.8. rose_ioctl in net/rose/af_rose.c has a use-after-free because of a rose_accept race condition.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-4128", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-4128", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-4128", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-4128", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-4128", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-4128" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-51782", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-51782", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-51782", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-51782", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-51782", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-51782" } }, - "CVE-2023-4132": { - "affected_versions": "v4.6-rc1 to v6.5-rc1", - "breaks": "dd47fbd40e6ea6884e295e13a2e50b0894258fdf", - "cmt_msg": "media: usb: siano: Fix warning due to null work_func_t function pointer", + "CVE-2023-5197": { + "affected_versions": "v5.9-rc1 to v6.6-rc3", + "breaks": "d0e2c7de92c7f2b3d355ad76b0bb9fc43d1beb87", + "cmt_msg": "netfilter: nf_tables: disallow rule removal from chain binding", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", - "Confidentiality": "None", - "Integrity": "None", + "Confidentiality": "Low", + "Integrity": "Low", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", - "score": 5.5 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H", + "score": 6.6 }, - "fixes": "6f489a966fbeb0da63d45c2c66a8957eab604bf6", - "last_affected_version": "6.4.3", + "fixes": "f15f29fd4779be8a418b66e9d52979bb6d6c2325", + "last_affected_version": "6.5.5", "last_modified": "2023-12-06", - "nvd_text": "A use-after-free vulnerability was found in the siano smsusb module in the Linux kernel. The bug occurs during device initialization when the siano device is plugged in. This flaw allows a local user to crash the system, causing a denial of service condition.", + "nvd_text": "A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation.\n\nAddition and removal of rules from chain bindings within the same transaction causes leads to use-after-free.\n\nWe recommend upgrading past commit f15f29fd4779be8a418b66e9d52979bb6d6c2325.\n\n", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-4132", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-4132", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-4132", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-4132", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-4132", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-4132" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-5197", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-5197", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-5197", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-5197", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-5197", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-5197" } }, - "CVE-2023-4133": { - "affected_versions": "v4.15-rc1 to v6.3", - "breaks": "e0f911c81e93fc23fe1a4fb0318ff1c3b1c9027f", - "cmt_msg": "cxgb4: fix use after free bugs caused by circular dependency problem", + "CVE-2023-52340": { + "affected_versions": "v2.6.12-rc2 to v6.3-rc1", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "ipv6: remove max_size check inline with ipv4", + "fixes": "af6d10345ca76670c1b7c37799f0d5576ccef277", + "last_affected_version": "6.1.72", + "last_modified": "2024-02-24", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52340", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52340", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52340", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52340", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52340", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52340" + } + }, + "CVE-2023-52429": { + "affected_versions": "v2.6.12-rc2 to v6.8-rc3", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "dm: limit the number of targets and parameter size area", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", @@ -88574,126 +94892,144 @@ "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "score": 5.5 }, - "fixes": "e50b9b9e8610d47b7c22529443e45a16b1ea3a15", - "last_affected_version": "6.2", - "last_modified": "2023-12-06", - "nvd_text": "A use-after-free vulnerability was found in the cxgb4 driver in the Linux kernel. The bug occurs when the cxgb4 device is detaching due to a possible rearming of the flower_stats_timer from the work queue. This flaw allows a local user to crash the system, causing a denial of service condition.", + "fixes": "bd504bcfec41a503b32054da5472904b404341a4", + "last_affected_version": "6.7.5", + "last_modified": "2024-04-09", + "nvd_text": "dm_table_create in drivers/md/dm-table.c in the Linux kernel through 6.7.4 can attempt to (in alloc_targets) allocate more than INT_MAX bytes, and crash, because of a missing check for struct dm_ioctl.target_count.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-4133", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-4133", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-4133", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-4133", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-4133", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-4133" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52429", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52429", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52429", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52429", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52429", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52429" } }, - "CVE-2023-4134": { - "affected_versions": "v3.11-rc1 to v6.5-rc1", - "breaks": "17fb1563d69b63fe7a79570fe870cf7e530cd2cd", - "cmt_msg": "Input: cyttsp4_core - change del_timer_sync() to timer_shutdown_sync()", - "fixes": "dbe836576f12743a7d2d170ad4ad4fd324c4d47a", - "last_affected_version": "6.4.3", - "last_modified": "2023-08-25", + "CVE-2023-52433": { + "affected_versions": "v6.5-rc6 to v6.6-rc1", + "breaks": "f6c383b8c31a", + "cmt_msg": "netfilter: nft_set_rbtree: skip sync GC for new elements in this transaction", + "fixes": "2ee52ae94baabf7ee09cf2a8d854b990dac5d0e4", + "last_affected_version": "6.5.3", + "last_modified": "2024-02-25", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nft_set_rbtree: skip sync GC for new elements in this transaction\n\nNew elements in this transaction might expired before such transaction\nends. Skip sync GC for such elements otherwise commit path might walk\nover an already released object. Once transaction is finished, async GC\nwill collect such expired element.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-4134", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-4134", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-4134", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-4134", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-4134", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-4134" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52433", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52433", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52433", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52433", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52433", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52433" } }, - "CVE-2023-4147": { - "affected_versions": "v5.9-rc1 to v6.5-rc4", - "breaks": "d0e2c7de92c7f2b3d355ad76b0bb9fc43d1beb87", - "cmt_msg": "netfilter: nf_tables: disallow rule addition to bound chain via NFTA_RULE_CHAIN_ID", + "CVE-2023-52434": { + "affected_versions": "v2.6.12-rc2 to v6.7-rc6", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "smb: client: fix potential OOBs in smb2_parse_contexts()", "cvss3": { "Attack Complexity": "Low", - "Attack Vector": "Local", + "Attack Vector": "Adjacent", "Availability": "High", "Confidentiality": "High", "Integrity": "High", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", - "score": 7.8 + "raw": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 8.0 }, - "fixes": "0ebc1064e4874d5987722a2ddbc18f94aa53b211", - "last_affected_version": "6.4.7", - "last_modified": "2023-12-06", - "nvd_text": "A use-after-free flaw was found in the Linux kernel\u2019s Netfilter functionality when adding a rule with NFTA_RULE_CHAIN_ID. This flaw allows a local user to crash or escalate their privileges on the system.", + "fixes": "af1689a9b7701d9907dfc84d2a4b57c4bc907144", + "last_affected_version": "6.6.7", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb: client: fix potential OOBs in smb2_parse_contexts()\n\nValidate offsets and lengths before dereferencing create contexts in\nsmb2_parse_contexts().\n\nThis fixes following oops when accessing invalid create contexts from\nserver:\n\n BUG: unable to handle page fault for address: ffff8881178d8cc3\n #PF: supervisor read access in kernel mode\n #PF: error_code(0x0000) - not-present page\n PGD 4a01067 P4D 4a01067 PUD 0\n Oops: 0000 [#1] PREEMPT SMP NOPTI\n CPU: 3 PID: 1736 Comm: mount.cifs Not tainted 6.7.0-rc4 #1\n Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS\n rel-1.16.2-3-gd478f380-rebuilt.opensuse.org 04/01/2014\n RIP: 0010:smb2_parse_contexts+0xa0/0x3a0 [cifs]\n Code: f8 10 75 13 48 b8 93 ad 25 50 9c b4 11 e7 49 39 06 0f 84 d2 00\n 00 00 8b 45 00 85 c0 74 61 41 29 c5 48 01 c5 41 83 fd 0f 76 55 <0f> b7\n 7d 04 0f b7 45 06 4c 8d 74 3d 00 66 83 f8 04 75 bc ba 04 00\n RSP: 0018:ffffc900007939e0 EFLAGS: 00010216\n RAX: ffffc90000793c78 RBX: ffff8880180cc000 RCX: ffffc90000793c90\n RDX: ffffc90000793cc0 RSI: ffff8880178d8cc0 RDI: ffff8880180cc000\n RBP: ffff8881178d8cbf R08: ffffc90000793c22 R09: 0000000000000000\n R10: ffff8880180cc000 R11: 0000000000000024 R12: 0000000000000000\n R13: 0000000000000020 R14: 0000000000000000 R15: ffffc90000793c22\n FS: 00007f873753cbc0(0000) GS:ffff88806bc00000(0000)\n knlGS:0000000000000000\n CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: ffff8881178d8cc3 CR3: 00000000181ca000 CR4: 0000000000750ef0\n PKRU: 55555554\n Call Trace:\n \n ? __die+0x23/0x70\n ? page_fault_oops+0x181/0x480\n ? search_module_extables+0x19/0x60\n ? srso_alias_return_thunk+0x5/0xfbef5\n ? exc_page_fault+0x1b6/0x1c0\n ? asm_exc_page_fault+0x26/0x30\n ? smb2_parse_contexts+0xa0/0x3a0 [cifs]\n SMB2_open+0x38d/0x5f0 [cifs]\n ? smb2_is_path_accessible+0x138/0x260 [cifs]\n smb2_is_path_accessible+0x138/0x260 [cifs]\n cifs_is_path_remote+0x8d/0x230 [cifs]\n cifs_mount+0x7e/0x350 [cifs]\n cifs_smb3_do_mount+0x128/0x780 [cifs]\n smb3_get_tree+0xd9/0x290 [cifs]\n vfs_get_tree+0x2c/0x100\n ? capable+0x37/0x70\n path_mount+0x2d7/0xb80\n ? srso_alias_return_thunk+0x5/0xfbef5\n ? _raw_spin_unlock_irqrestore+0x44/0x60\n __x64_sys_mount+0x11a/0x150\n do_syscall_64+0x47/0xf0\n entry_SYSCALL_64_after_hwframe+0x6f/0x77\n RIP: 0033:0x7f8737657b1e", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-4147", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-4147", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-4147", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-4147", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-4147", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-4147" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52434", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52434", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52434", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52434", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52434", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52434" } }, - "CVE-2023-4155": { - "affected_versions": "v5.11-rc1 to v6.5-rc6", - "breaks": "291bd20d5d88814a73d43b55b9428feab2f28094", - "cmt_msg": "KVM: SEV: only access GHCB fields once", + "CVE-2023-52435": { + "affected_versions": "v4.8-rc1 to v6.7-rc6", + "breaks": "3953c46c3ac7eef31a9935427371c6f54a22f1ba", + "cmt_msg": "net: prevent mss overflow in skb_segment()", "cvss3": { - "Attack Complexity": "High", + "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", "Confidentiality": "None", "Integrity": "None", "Privileges Required": "Low", - "Scope": "Changed", + "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H", - "score": 5.6 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "score": 5.5 }, - "fixes": "7588dbcebcbf0193ab5b76987396d0254270b04a", - "last_affected_version": "6.4.10", - "last_modified": "2023-12-06", - "nvd_text": "A flaw was found in KVM AMD Secure Encrypted Virtualization (SEV) in the Linux kernel. A KVM guest using SEV-ES or SEV-SNP with multiple vCPUs can trigger a double fetch race condition vulnerability and invoke the `VMGEXIT` handler recursively. If an attacker manages to call the handler multiple times, they can trigger a stack overflow and cause a denial of service or potentially guest-to-host escape in kernel configurations without stack guard pages (`CONFIG_VMAP_STACK`).", + "fixes": "23d05d563b7e7b0314e65c8e882bc27eac2da8e7", + "last_affected_version": "6.6.10", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: prevent mss overflow in skb_segment()\n\nOnce again syzbot is able to crash the kernel in skb_segment() [1]\n\nGSO_BY_FRAGS is a forbidden value, but unfortunately the following\ncomputation in skb_segment() can reach it quite easily :\n\n\tmss = mss * partial_segs;\n\n65535 = 3 * 5 * 17 * 257, so many initial values of mss can lead to\na bad final result.\n\nMake sure to limit segmentation so that the new mss value is smaller\nthan GSO_BY_FRAGS.\n\n[1]\n\ngeneral protection fault, probably for non-canonical address 0xdffffc000000000e: 0000 [#1] PREEMPT SMP KASAN\nKASAN: null-ptr-deref in range [0x0000000000000070-0x0000000000000077]\nCPU: 1 PID: 5079 Comm: syz-executor993 Not tainted 6.7.0-rc4-syzkaller-00141-g1ae4cd3cbdd0 #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023\nRIP: 0010:skb_segment+0x181d/0x3f30 net/core/skbuff.c:4551\nCode: 83 e3 02 e9 fb ed ff ff e8 90 68 1c f9 48 8b 84 24 f8 00 00 00 48 8d 78 70 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <0f> b6 04 02 84 c0 74 08 3c 03 0f 8e 8a 21 00 00 48 8b 84 24 f8 00\nRSP: 0018:ffffc900043473d0 EFLAGS: 00010202\nRAX: dffffc0000000000 RBX: 0000000000010046 RCX: ffffffff886b1597\nRDX: 000000000000000e RSI: ffffffff886b2520 RDI: 0000000000000070\nRBP: ffffc90004347578 R08: 0000000000000005 R09: 000000000000ffff\nR10: 000000000000ffff R11: 0000000000000002 R12: ffff888063202ac0\nR13: 0000000000010000 R14: 000000000000ffff R15: 0000000000000046\nFS: 0000555556e7e380(0000) GS:ffff8880b9900000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000000020010000 CR3: 0000000027ee2000 CR4: 00000000003506f0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n\nudp6_ufo_fragment+0xa0e/0xd00 net/ipv6/udp_offload.c:109\nipv6_gso_segment+0x534/0x17e0 net/ipv6/ip6_offload.c:120\nskb_mac_gso_segment+0x290/0x610 net/core/gso.c:53\n__skb_gso_segment+0x339/0x710 net/core/gso.c:124\nskb_gso_segment include/net/gso.h:83 [inline]\nvalidate_xmit_skb+0x36c/0xeb0 net/core/dev.c:3626\n__dev_queue_xmit+0x6f3/0x3d60 net/core/dev.c:4338\ndev_queue_xmit include/linux/netdevice.h:3134 [inline]\npacket_xmit+0x257/0x380 net/packet/af_packet.c:276\npacket_snd net/packet/af_packet.c:3087 [inline]\npacket_sendmsg+0x24c6/0x5220 net/packet/af_packet.c:3119\nsock_sendmsg_nosec net/socket.c:730 [inline]\n__sock_sendmsg+0xd5/0x180 net/socket.c:745\n__sys_sendto+0x255/0x340 net/socket.c:2190\n__do_sys_sendto net/socket.c:2202 [inline]\n__se_sys_sendto net/socket.c:2198 [inline]\n__x64_sys_sendto+0xe0/0x1b0 net/socket.c:2198\ndo_syscall_x64 arch/x86/entry/common.c:52 [inline]\ndo_syscall_64+0x40/0x110 arch/x86/entry/common.c:83\nentry_SYSCALL_64_after_hwframe+0x63/0x6b\nRIP: 0033:0x7f8692032aa9\nCode: 28 00 00 00 75 05 48 83 c4 28 c3 e8 d1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48\nRSP: 002b:00007fff8d685418 EFLAGS: 00000246 ORIG_RAX: 000000000000002c\nRAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00007f8692032aa9\nRDX: 0000000000010048 RSI: 00000000200000c0 RDI: 0000000000000003\nRBP: 00000000000f4240 R08: 0000000020000540 R09: 0000000000000014\nR10: 0000000000000000 R11: 0000000000000246 R12: 00007fff8d685480\nR13: 0000000000000001 R14: 00007fff8d685480 R15: 0000000000000003\n\nModules linked in:\n---[ end trace 0000000000000000 ]---\nRIP: 0010:skb_segment+0x181d/0x3f30 net/core/skbuff.c:4551\nCode: 83 e3 02 e9 fb ed ff ff e8 90 68 1c f9 48 8b 84 24 f8 00 00 00 48 8d 78 70 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <0f> b6 04 02 84 c0 74 08 3c 03 0f 8e 8a 21 00 00 48 8b 84 24 f8 00\nRSP: 0018:ffffc900043473d0 EFLAGS: 00010202\nRAX: dffffc0000000000 RBX: 0000000000010046 RCX: ffffffff886b1597\nRDX: 000000000000000e RSI: ffffffff886b2520 RDI: 0000000000000070\nRBP: ffffc90004347578 R0\n---truncated---", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-4155", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-4155", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-4155", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-4155", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-4155", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-4155" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52435", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52435", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52435", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52435", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52435", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52435" } }, - "CVE-2023-4194": { - "affected_versions": "v6.3-rc1 to v6.5-rc5", - "breaks": "a096ccca6e503a5c575717ff8a36ace27510ab0a", - "cmt_msg": "net: tun_chr_open(): set sk_uid from current_fsuid()", + "CVE-2023-52436": { + "affected_versions": "v2.6.12-rc2 to v6.8-rc1", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "f2fs: explicitly null-terminate the xattr list", + "fixes": "e26b6d39270f5eab0087453d9b544189a38c8564", + "last_affected_version": "6.7.0", + "last_modified": "2024-02-25", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nf2fs: explicitly null-terminate the xattr list\n\nWhen setting an xattr, explicitly null-terminate the xattr list. This\neliminates the fragile assumption that the unused xattr space is always\nzeroed.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52436", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52436", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52436", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52436", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52436", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52436" + } + }, + "CVE-2023-52438": { + "affected_versions": "v4.20-rc1 to v6.8-rc1", + "breaks": "dd2283f2605e", + "cmt_msg": "binder: fix use-after-free in shinker's callback", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", - "Availability": "None", - "Confidentiality": "None", + "Availability": "High", + "Confidentiality": "High", "Integrity": "High", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", - "score": 5.5 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 7.8 }, - "fixes": "9bc3047374d5bec163e83e743709e23753376f0c", - "last_affected_version": "6.4.9", - "last_modified": "2023-12-06", - "nvd_text": "A flaw was found in the Linux kernel's TUN/TAP functionality. This issue could allow a local user to bypass network filters and gain unauthorized access to some resources. The original patches fixing CVE-2023-1076 are incorrect or incomplete. The problem is that the following upstream commits - a096ccca6e50 (\"tun: tun_chr_open(): correctly initialize socket uid\"), - 66b2c338adce (\"tap: tap_open(): correctly initialize socket uid\"), pass \"inode->i_uid\" to sock_init_data_uid() as the last parameter and that turns out to not be accurate.", + "fixes": "3f489c2067c5824528212b0fc18b28d51332d906", + "last_affected_version": "6.7.0", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbinder: fix use-after-free in shinker's callback\n\nThe mmap read lock is used during the shrinker's callback, which means\nthat using alloc->vma pointer isn't safe as it can race with munmap().\nAs of commit dd2283f2605e (\"mm: mmap: zap pages with read mmap_sem in\nmunmap\") the mmap lock is downgraded after the vma has been isolated.\n\nI was able to reproduce this issue by manually adding some delays and\ntriggering page reclaiming through the shrinker's debug sysfs. The\nfollowing KASAN report confirms the UAF:\n\n ==================================================================\n BUG: KASAN: slab-use-after-free in zap_page_range_single+0x470/0x4b8\n Read of size 8 at addr ffff356ed50e50f0 by task bash/478\n\n CPU: 1 PID: 478 Comm: bash Not tainted 6.6.0-rc5-00055-g1c8b86a3799f-dirty #70\n Hardware name: linux,dummy-virt (DT)\n Call trace:\n zap_page_range_single+0x470/0x4b8\n binder_alloc_free_page+0x608/0xadc\n __list_lru_walk_one+0x130/0x3b0\n list_lru_walk_node+0xc4/0x22c\n binder_shrink_scan+0x108/0x1dc\n shrinker_debugfs_scan_write+0x2b4/0x500\n full_proxy_write+0xd4/0x140\n vfs_write+0x1ac/0x758\n ksys_write+0xf0/0x1dc\n __arm64_sys_write+0x6c/0x9c\n\n Allocated by task 492:\n kmem_cache_alloc+0x130/0x368\n vm_area_alloc+0x2c/0x190\n mmap_region+0x258/0x18bc\n do_mmap+0x694/0xa60\n vm_mmap_pgoff+0x170/0x29c\n ksys_mmap_pgoff+0x290/0x3a0\n __arm64_sys_mmap+0xcc/0x144\n\n Freed by task 491:\n kmem_cache_free+0x17c/0x3c8\n vm_area_free_rcu_cb+0x74/0x98\n rcu_core+0xa38/0x26d4\n rcu_core_si+0x10/0x1c\n __do_softirq+0x2fc/0xd24\n\n Last potentially related work creation:\n __call_rcu_common.constprop.0+0x6c/0xba0\n call_rcu+0x10/0x1c\n vm_area_free+0x18/0x24\n remove_vma+0xe4/0x118\n do_vmi_align_munmap.isra.0+0x718/0xb5c\n do_vmi_munmap+0xdc/0x1fc\n __vm_munmap+0x10c/0x278\n __arm64_sys_munmap+0x58/0x7c\n\nFix this issue by performing instead a vma_lookup() which will fail to\nfind the vma that was isolated before the mmap lock downgrade. Note that\nthis option has better performance than upgrading to a mmap write lock\nwhich would increase contention. Plus, mmap_write_trylock() has been\nrecently removed anyway.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-4194", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-4194", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-4194", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-4194", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-4194", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-4194" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52438", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52438", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52438", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52438", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52438", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52438" } }, - "CVE-2023-4206": { - "affected_versions": "v3.18-rc1 to v6.5-rc5", - "breaks": "1109c00547fc66df45b9ff923544be4c1e1bec13", - "cmt_msg": "net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free", + "CVE-2023-52439": { + "affected_versions": "v4.18-rc5 to v6.8-rc1", + "breaks": "57c5f4df0a5a", + "cmt_msg": "uio: Fix use-after-free in uio_open", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", @@ -88706,23 +95042,23 @@ "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "score": 7.8 }, - "fixes": "b80b829e9e2c1b3f7aae34855e04d8f6ecaf13c8", - "last_affected_version": "6.4.9", - "last_modified": "2023-12-06", - "nvd_text": "A use-after-free vulnerability in the Linux kernel's net/sched: cls_route component can be exploited to achieve local privilege escalation.\n\nWhen route4_change() is called on an existing filter, the whole tcf_result struct is always copied into the new instance of the filter. This causes a problem when updating a filter bound to a class, as tcf_unbind_filter() is always called on the old instance in the success path, decreasing filter_cnt of the still referenced class and allowing it to be deleted, leading to a use-after-free.\n\nWe recommend upgrading past commit b80b829e9e2c1b3f7aae34855e04d8f6ecaf13c8.\n\n", + "fixes": "0c9ae0b8605078eafc3bea053cc78791e97ba2e2", + "last_affected_version": "6.7.0", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nuio: Fix use-after-free in uio_open\n\ncore-1\t\t\t\tcore-2\n-------------------------------------------------------\nuio_unregister_device\t\tuio_open\n\t\t\t\tidev = idr_find()\ndevice_unregister(&idev->dev)\nput_device(&idev->dev)\nuio_device_release\n\t\t\t\tget_device(&idev->dev)\nkfree(idev)\nuio_free_minor(minor)\n\t\t\t\tuio_release\n\t\t\t\tput_device(&idev->dev)\n\t\t\t\tkfree(idev)\n-------------------------------------------------------\n\nIn the core-1 uio_unregister_device(), the device_unregister will kfree\nidev when the idev->dev kobject ref is 1. But after core-1\ndevice_unregister, put_device and before doing kfree, the core-2 may\nget_device. Then:\n1. After core-1 kfree idev, the core-2 will do use-after-free for idev.\n2. When core-2 do uio_release and put_device, the idev will be double\n freed.\n\nTo address this issue, we can get idev atomic & inc idev reference with\nminor_lock.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-4206", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-4206", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-4206", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-4206", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-4206", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-4206" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52439", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52439", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52439", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52439", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52439", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52439" } }, - "CVE-2023-4207": { - "affected_versions": "v3.18-rc1 to v6.5-rc5", - "breaks": "e35a8ee5993ba81fd6c092f6827458c60406255b", - "cmt_msg": "net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free", + "CVE-2023-52440": { + "affected_versions": "v5.17-rc4 to v6.6-rc1", + "breaks": "f9929ef6a2a55f03aac61248c6a3a987b8546f2a", + "cmt_msg": "ksmbd: fix slub overflow in ksmbd_decode_ntlmssp_auth_blob()", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", @@ -88735,23 +95071,23 @@ "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "score": 7.8 }, - "fixes": "76e42ae831991c828cffa8c37736ebfb831ad5ec", - "last_affected_version": "6.4.9", - "last_modified": "2023-12-06", - "nvd_text": "A use-after-free vulnerability in the Linux kernel's net/sched: cls_fw component can be exploited to achieve local privilege escalation.\n\nWhen fw_change() is called on an existing filter, the whole tcf_result struct is always copied into the new instance of the filter. This causes a problem when updating a filter bound to a class, as tcf_unbind_filter() is always called on the old instance in the success path, decreasing filter_cnt of the still referenced class and allowing it to be deleted, leading to a use-after-free.\n\nWe recommend upgrading past commit 76e42ae831991c828cffa8c37736ebfb831ad5ec.\n\n", + "fixes": "4b081ce0d830b684fdf967abc3696d1261387254", + "last_affected_version": "6.5.1", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nksmbd: fix slub overflow in ksmbd_decode_ntlmssp_auth_blob()\n\nIf authblob->SessionKey.Length is bigger than session key\nsize(CIFS_KEY_SIZE), slub overflow can happen in key exchange codes.\ncifs_arc4_crypt copy to session key array from SessionKey from client.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-4207", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-4207", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-4207", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-4207", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-4207", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-4207" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52440", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52440", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52440", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52440", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52440", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52440" } }, - "CVE-2023-4208": { - "affected_versions": "v3.18-rc1 to v6.5-rc5", - "breaks": "de5df63228fcfbd5bb7fd883774c18fec9e61f12", - "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free", + "CVE-2023-52441": { + "affected_versions": "v5.15-rc1 to v6.5-rc4", + "breaks": "e2f34481b24db2fd634b5edb0a5bd0e4d38cc6e9", + "cmt_msg": "ksmbd: fix out of bounds in init_smb2_rsp_hdr()", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", @@ -88764,25 +95100,71 @@ "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "score": 7.8 }, - "fixes": "3044b16e7c6fe5d24b1cdbcf1bd0a9d92d1ebd81", - "last_affected_version": "6.4.9", - "last_modified": "2023-12-06", - "nvd_text": "A use-after-free vulnerability in the Linux kernel's net/sched: cls_u32 component can be exploited to achieve local privilege escalation.\n\nWhen u32_change() is called on an existing filter, the whole tcf_result struct is always copied into the new instance of the filter. This causes a problem when updating a filter bound to a class, as tcf_unbind_filter() is always called on the old instance in the success path, decreasing filter_cnt of the still referenced class and allowing it to be deleted, leading to a use-after-free.\n\nWe recommend upgrading past commit 3044b16e7c6fe5d24b1cdbcf1bd0a9d92d1ebd81.\n\n", + "fixes": "536bb492d39bb6c080c92f31e8a55fe9934f452b", + "last_affected_version": "6.4.15", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nksmbd: fix out of bounds in init_smb2_rsp_hdr()\n\nIf client send smb2 negotiate request and then send smb1 negotiate\nrequest, init_smb2_rsp_hdr is called for smb1 negotiate request since\nneed_neg is set to false. This patch ignore smb1 packets after ->need_neg\nis set to false.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-4208", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-4208", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-4208", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-4208", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-4208", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-4208" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52441", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52441", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52441", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52441", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52441", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52441" } }, - "CVE-2023-4244": { - "affected_versions": "v5.6-rc1 to v6.5-rc7", - "breaks": "3c4287f62044a90e73a561aa05fc46e62da173da", - "cmt_msg": "netfilter: nf_tables: fix GC transaction races with netns and netlink event exit path", + "CVE-2023-52442": { + "affected_versions": "v2.6.12-rc2 to v6.5-rc4", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "ksmbd: validate session id and tree id in compound request", + "fixes": "3df0411e132ee74a87aa13142dfd2b190275332e", + "last_affected_version": "6.4.15", + "last_modified": "2024-02-25", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nksmbd: validate session id and tree id in compound request\n\n`smb2_get_msg()` in smb2_get_ksmbd_tcon() and smb2_check_user_session()\nwill always return the first request smb2 header in a compound request.\nif `SMB2_TREE_CONNECT_HE` is the first command in compound request, will\nreturn 0, i.e. The tree id check is skipped.\nThis patch use ksmbd_req_buf_next() to get current command in compound.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52442", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52442", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52442", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52442", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52442", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52442" + } + }, + "CVE-2023-52443": { + "affected_versions": "v4.11-rc1 to v6.8-rc1", + "breaks": "04dc715e24d0", + "cmt_msg": "apparmor: avoid crash when parsed profile name is empty", "cvss3": { - "Attack Complexity": "High", + "Attack Complexity": "Low", + "Attack Vector": "Local", + "Availability": "High", + "Confidentiality": "None", + "Integrity": "None", + "Privileges Required": "Low", + "Scope": "Unchanged", + "User Interaction": "None", + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "score": 5.5 + }, + "fixes": "55a8210c9e7d21ff2644809699765796d4bfb200", + "last_affected_version": "6.7.1", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\napparmor: avoid crash when parsed profile name is empty\n\nWhen processing a packed profile in unpack_profile() described like\n\n \"profile :ns::samba-dcerpcd /usr/lib*/samba/{,samba/}samba-dcerpcd {...}\"\n\na string \":samba-dcerpcd\" is unpacked as a fully-qualified name and then\npassed to aa_splitn_fqname().\n\naa_splitn_fqname() treats \":samba-dcerpcd\" as only containing a namespace.\nThus it returns NULL for tmpname, meanwhile tmpns is non-NULL. Later\naa_alloc_profile() crashes as the new profile name is NULL now.\n\ngeneral protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] PREEMPT SMP KASAN NOPTI\nKASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007]\nCPU: 6 PID: 1657 Comm: apparmor_parser Not tainted 6.7.0-rc2-dirty #16\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.2-3-gd478f380-rebuilt.opensuse.org 04/01/2014\nRIP: 0010:strlen+0x1e/0xa0\nCall Trace:\n \n ? strlen+0x1e/0xa0\n aa_policy_init+0x1bb/0x230\n aa_alloc_profile+0xb1/0x480\n unpack_profile+0x3bc/0x4960\n aa_unpack+0x309/0x15e0\n aa_replace_profiles+0x213/0x33c0\n policy_update+0x261/0x370\n profile_replace+0x20e/0x2a0\n vfs_write+0x2af/0xe00\n ksys_write+0x126/0x250\n do_syscall_64+0x46/0xf0\n entry_SYSCALL_64_after_hwframe+0x6e/0x76\n \n---[ end trace 0000000000000000 ]---\nRIP: 0010:strlen+0x1e/0xa0\n\nIt seems such behaviour of aa_splitn_fqname() is expected and checked in\nother places where it is called (e.g. aa_remove_profiles). Well, there\nis an explicit comment \"a ns name without a following profile is allowed\"\ninside.\n\nAFAICS, nothing can prevent unpacked \"name\" to be in form like\n\":samba-dcerpcd\" - it is passed from userspace.\n\nDeny the whole profile set replacement in such case and inform user with\nEPROTO and an explaining message.\n\nFound by Linux Verification Center (linuxtesting.org).", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52443", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52443", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52443", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52443", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52443", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52443" + } + }, + "CVE-2023-52444": { + "affected_versions": "v4.2-rc1 to v6.8-rc1", + "breaks": "7e01e7ad746b", + "cmt_msg": "f2fs: fix to avoid dirent corruption", + "cvss3": { + "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", "Confidentiality": "High", @@ -88790,84 +95172,84 @@ "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", - "score": 7.0 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 7.8 }, - "fixes": "6a33d8b73dfac0a41f3877894b38082bd0c9a5bc", - "last_affected_version": "6.4.11", - "last_modified": "2023-12-06", - "nvd_text": "A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation.\n\nDue to a race condition between nf_tables netlink control plane transaction and nft_set element garbage collection, it is possible to underflow the reference counter causing a use-after-free vulnerability.\n\nWe recommend upgrading past commit 3e91b0ebd994635df2346353322ac51ce84ce6d8.\n\n", + "fixes": "53edb549565f55ccd0bdf43be3d66ce4c2d48b28", + "last_affected_version": "6.7.1", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nf2fs: fix to avoid dirent corruption\n\nAs Al reported in link[1]:\n\nf2fs_rename()\n...\n\tif (old_dir != new_dir && !whiteout)\n\t\tf2fs_set_link(old_inode, old_dir_entry,\n\t\t\t\t\told_dir_page, new_dir);\n\telse\n\t\tf2fs_put_page(old_dir_page, 0);\n\nYou want correct inumber in the \"..\" link. And cross-directory\nrename does move the source to new parent, even if you'd been asked\nto leave a whiteout in the old place.\n\n[1] https://lore.kernel.org/all/20231017055040.GN800259@ZenIV/\n\nWith below testcase, it may cause dirent corruption, due to it missed\nto call f2fs_set_link() to update \"..\" link to new directory.\n- mkdir -p dir/foo\n- renameat2 -w dir/foo bar\n\n[ASSERT] (__chk_dots_dentries:1421) --> Bad inode number[0x4] for '..', parent parent ino is [0x3]\n[FSCK] other corrupted bugs [Fail]", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-4244", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-4244", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-4244", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-4244", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-4244", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-4244" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52444", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52444", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52444", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52444", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52444", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52444" } }, - "CVE-2023-4273": { - "affected_versions": "v5.7-rc1 to v6.5-rc5", - "breaks": "ca06197382bde0a3bc20215595d1c9ce20c6e341", - "cmt_msg": "exfat: check if filename entries exceeds max filename length", + "CVE-2023-52445": { + "affected_versions": "v2.6.26-rc1 to v6.8-rc1", + "breaks": "e5be15c63804", + "cmt_msg": "media: pvrusb2: fix use after free on context disconnection", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", "Confidentiality": "High", "Integrity": "High", - "Privileges Required": "High", + "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", - "score": 6.7 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 7.8 }, - "fixes": "d42334578eba1390859012ebb91e1e556d51db49", - "last_affected_version": "6.4.9", - "last_modified": "2023-12-06", - "nvd_text": "A flaw was found in the exFAT driver of the Linux kernel. The vulnerability exists in the implementation of the file name reconstruction function, which is responsible for reading file name entries from a directory index and merging file name parts belonging to one file into a single long file name. Since the file name characters are copied into a stack variable, a local privileged attacker could use this flaw to overflow the kernel stack.", - "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-4273", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-4273", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-4273", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-4273", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-4273", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-4273" + "fixes": "ded85b0c0edd8f45fec88783d7555a5b982449c1", + "last_affected_version": "6.7.1", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: pvrusb2: fix use after free on context disconnection\n\nUpon module load, a kthread is created targeting the\npvr2_context_thread_func function, which may call pvr2_context_destroy\nand thus call kfree() on the context object. However, that might happen\nbefore the usb hub_event handler is able to notify the driver. This\npatch adds a sanity check before the invalid read reported by syzbot,\nwithin the context disconnection call stack.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52445", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52445", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52445", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52445", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52445", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52445" } }, - "CVE-2023-42752": { - "affected_versions": "v2.6.38-rc1 to v6.6-rc1", - "breaks": "57e1ab6eaddc9f2c358cd4afb497cda6e3c6821a", - "cmt_msg": "igmp: limit igmpv3_newpack() packet size to IP_MAX_MTU", + "CVE-2023-52446": { + "affected_versions": "v6.2-rc1 to v6.8-rc1", + "breaks": "958cf2e273f0", + "cmt_msg": "bpf: Fix a race condition between btf_put() and map_free()", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", - "Confidentiality": "None", - "Integrity": "None", + "Confidentiality": "High", + "Integrity": "High", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", - "score": 5.5 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 7.8 }, - "fixes": "c3b704d4a4a265660e665df51b129e8425216ed1", - "last_affected_version": "6.5.2", - "last_modified": "2023-12-06", - "nvd_text": "An integer overflow flaw was found in the Linux kernel. This issue leads to the kernel allocating `skb_shared_info` in the userspace, which is exploitable in systems without SMAP protection since `skb_shared_info` contains references to function pointers.", + "fixes": "59e5791f59dd83e8aa72a4e74217eabb6e8cfd90", + "last_affected_version": "6.7.1", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Fix a race condition between btf_put() and map_free()\n\nWhen running `./test_progs -j` in my local vm with latest kernel,\nI once hit a kasan error like below:\n\n [ 1887.184724] BUG: KASAN: slab-use-after-free in bpf_rb_root_free+0x1f8/0x2b0\n [ 1887.185599] Read of size 4 at addr ffff888106806910 by task kworker/u12:2/2830\n [ 1887.186498]\n [ 1887.186712] CPU: 3 PID: 2830 Comm: kworker/u12:2 Tainted: G OEL 6.7.0-rc3-00699-g90679706d486-dirty #494\n [ 1887.188034] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014\n [ 1887.189618] Workqueue: events_unbound bpf_map_free_deferred\n [ 1887.190341] Call Trace:\n [ 1887.190666] \n [ 1887.190949] dump_stack_lvl+0xac/0xe0\n [ 1887.191423] ? nf_tcp_handle_invalid+0x1b0/0x1b0\n [ 1887.192019] ? panic+0x3c0/0x3c0\n [ 1887.192449] print_report+0x14f/0x720\n [ 1887.192930] ? preempt_count_sub+0x1c/0xd0\n [ 1887.193459] ? __virt_addr_valid+0xac/0x120\n [ 1887.194004] ? bpf_rb_root_free+0x1f8/0x2b0\n [ 1887.194572] kasan_report+0xc3/0x100\n [ 1887.195085] ? bpf_rb_root_free+0x1f8/0x2b0\n [ 1887.195668] bpf_rb_root_free+0x1f8/0x2b0\n [ 1887.196183] ? __bpf_obj_drop_impl+0xb0/0xb0\n [ 1887.196736] ? preempt_count_sub+0x1c/0xd0\n [ 1887.197270] ? preempt_count_sub+0x1c/0xd0\n [ 1887.197802] ? _raw_spin_unlock+0x1f/0x40\n [ 1887.198319] bpf_obj_free_fields+0x1d4/0x260\n [ 1887.198883] array_map_free+0x1a3/0x260\n [ 1887.199380] bpf_map_free_deferred+0x7b/0xe0\n [ 1887.199943] process_scheduled_works+0x3a2/0x6c0\n [ 1887.200549] worker_thread+0x633/0x890\n [ 1887.201047] ? __kthread_parkme+0xd7/0xf0\n [ 1887.201574] ? kthread+0x102/0x1d0\n [ 1887.202020] kthread+0x1ab/0x1d0\n [ 1887.202447] ? pr_cont_work+0x270/0x270\n [ 1887.202954] ? kthread_blkcg+0x50/0x50\n [ 1887.203444] ret_from_fork+0x34/0x50\n [ 1887.203914] ? kthread_blkcg+0x50/0x50\n [ 1887.204397] ret_from_fork_asm+0x11/0x20\n [ 1887.204913] \n [ 1887.204913] \n [ 1887.205209]\n [ 1887.205416] Allocated by task 2197:\n [ 1887.205881] kasan_set_track+0x3f/0x60\n [ 1887.206366] __kasan_kmalloc+0x6e/0x80\n [ 1887.206856] __kmalloc+0xac/0x1a0\n [ 1887.207293] btf_parse_fields+0xa15/0x1480\n [ 1887.207836] btf_parse_struct_metas+0x566/0x670\n [ 1887.208387] btf_new_fd+0x294/0x4d0\n [ 1887.208851] __sys_bpf+0x4ba/0x600\n [ 1887.209292] __x64_sys_bpf+0x41/0x50\n [ 1887.209762] do_syscall_64+0x4c/0xf0\n [ 1887.210222] entry_SYSCALL_64_after_hwframe+0x63/0x6b\n [ 1887.210868]\n [ 1887.211074] Freed by task 36:\n [ 1887.211460] kasan_set_track+0x3f/0x60\n [ 1887.211951] kasan_save_free_info+0x28/0x40\n [ 1887.212485] ____kasan_slab_free+0x101/0x180\n [ 1887.213027] __kmem_cache_free+0xe4/0x210\n [ 1887.213514] btf_free+0x5b/0x130\n [ 1887.213918] rcu_core+0x638/0xcc0\n [ 1887.214347] __do_softirq+0x114/0x37e\n\nThe error happens at bpf_rb_root_free+0x1f8/0x2b0:\n\n 00000000000034c0 :\n ; {\n 34c0: f3 0f 1e fa endbr64\n 34c4: e8 00 00 00 00 callq 0x34c9 \n 34c9: 55 pushq %rbp\n 34ca: 48 89 e5 movq %rsp, %rbp\n ...\n ; if (rec && rec->refcount_off >= 0 &&\n 36aa: 4d 85 ed testq %r13, %r13\n 36ad: 74 a9 je 0x3658 \n 36af: 49 8d 7d 10 leaq 0x10(%r13), %rdi\n 36b3: e8 00 00 00 00 callq 0x36b8 \n <==== kasan function\n 36b8: 45 8b 7d 10 movl 0x10(%r13), %r15d\n <==== use-after-free load\n 36bc: 45 85 ff testl %r15d, %r15d\n 36bf: 78 8c js 0x364d \n\nSo the problem \n---truncated---", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-42752", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-42752", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-42752", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-42752", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-42752", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-42752" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52446", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52446", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52446", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52446", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52446", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52446" } }, - "CVE-2023-42753": { - "affected_versions": "v4.20-rc2 to v6.6-rc1", - "breaks": "886503f34d63e681662057448819edb5b1057a97", - "cmt_msg": "netfilter: ipset: add the missing IP_SET_HASH_WITH_NET0 macro for ip_set_hash_netportnet.c", + "CVE-2023-52447": { + "affected_versions": "v5.9-rc1 to v6.8-rc1", + "breaks": "bba1dc0b55ac", + "cmt_msg": "bpf: Defer the free of inner map when necessary", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", @@ -88880,23 +95262,23 @@ "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "score": 7.8 }, - "fixes": "050d91c03b28ca479df13dfb02bcd2c60dd6a878", - "last_affected_version": "6.5.2", - "last_modified": "2023-12-06", - "nvd_text": "An array indexing vulnerability was found in the netfilter subsystem of the Linux kernel. A missing macro could lead to a miscalculation of the `h->nets` array offset, providing attackers with the primitive to arbitrarily increment/decrement a memory buffer out-of-bound. This issue may allow a local user to crash the system or potentially escalate their privileges on the system.", + "fixes": "876673364161da50eed6b472d746ef88242b2368", + "last_affected_version": "6.7.1", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Defer the free of inner map when necessary\n\nWhen updating or deleting an inner map in map array or map htab, the map\nmay still be accessed by non-sleepable program or sleepable program.\nHowever bpf_map_fd_put_ptr() decreases the ref-counter of the inner map\ndirectly through bpf_map_put(), if the ref-counter is the last one\n(which is true for most cases), the inner map will be freed by\nops->map_free() in a kworker. But for now, most .map_free() callbacks\ndon't use synchronize_rcu() or its variants to wait for the elapse of a\nRCU grace period, so after the invocation of ops->map_free completes,\nthe bpf program which is accessing the inner map may incur\nuse-after-free problem.\n\nFix the free of inner map by invoking bpf_map_free_deferred() after both\none RCU grace period and one tasks trace RCU grace period if the inner\nmap has been removed from the outer map before. The deferment is\naccomplished by using call_rcu() or call_rcu_tasks_trace() when\nreleasing the last ref-counter of bpf map. The newly-added rcu_head\nfield in bpf_map shares the same storage space with work field to\nreduce the size of bpf_map.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-42753", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-42753", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-42753", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-42753", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-42753", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-42753" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52447", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52447", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52447", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52447", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52447", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52447" } }, - "CVE-2023-42754": { - "affected_versions": "v5.1-rc6 to v6.6-rc3", - "breaks": "ed0de45a1008991fdaa27a0152befcb74d126a8b", - "cmt_msg": "ipv4: fix null-deref in ipv4_link_failure", + "CVE-2023-52448": { + "affected_versions": "v4.20-rc1 to v6.8-rc1", + "breaks": "72244b6bc752", + "cmt_msg": "gfs2: Fix kernel NULL pointer dereference in gfs2_rgrp_dump", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", @@ -88909,23 +95291,23 @@ "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "score": 5.5 }, - "fixes": "0113d9c9d1ccc07f5a3710dac4aa24b6d711278c", - "last_affected_version": "6.5.5", - "last_modified": "2023-12-06", - "nvd_text": "A NULL pointer dereference flaw was found in the Linux kernel ipv4 stack. The socket buffer (skb) was assumed to be associated with a device before calling __ip_options_compile, which is not always the case if the skb is re-routed by ipvs. This issue may allow a local user with CAP_NET_ADMIN privileges to crash the system.", + "fixes": "8877243beafa7c6bfc42022cbfdf9e39b25bd4fa", + "last_affected_version": "6.7.1", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\ngfs2: Fix kernel NULL pointer dereference in gfs2_rgrp_dump\n\nSyzkaller has reported a NULL pointer dereference when accessing\nrgd->rd_rgl in gfs2_rgrp_dump(). This can happen when creating\nrgd->rd_gl fails in read_rindex_entry(). Add a NULL pointer check in\ngfs2_rgrp_dump() to prevent that.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-42754", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-42754", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-42754", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-42754", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-42754", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-42754" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52448", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52448", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52448", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52448", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52448", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52448" } }, - "CVE-2023-42755": { - "affected_versions": "v2.6.12-rc2 to v6.3-rc1", - "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", - "cmt_msg": "net/sched: Retire rsvp classifier", + "CVE-2023-52449": { + "affected_versions": "v2.6.31-rc1 to v6.8-rc1", + "breaks": "2ba3d76a1e29", + "cmt_msg": "mtd: Fix gluebi NULL pointer dereference caused by ftl notifier", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", @@ -88938,25 +95320,25 @@ "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "score": 5.5 }, - "fixes": "265b4da82dbf5df04bee5a5d46b7474b1aaf326a", - "last_affected_version": "6.1.54", - "last_modified": "2023-12-06", - "nvd_text": "A flaw was found in the IPv4 Resource Reservation Protocol (RSVP) classifier in the Linux kernel. The xprt pointer may go beyond the linear part of the skb, leading to an out-of-bounds read in the `rsvp_classify` function. This issue may allow a local user to crash the system and cause a denial of service.", + "fixes": "a43bdc376deab5fff1ceb93dca55bcab8dbdc1d6", + "last_affected_version": "6.7.1", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmtd: Fix gluebi NULL pointer dereference caused by ftl notifier\n\nIf both ftl.ko and gluebi.ko are loaded, the notifier of ftl\ntriggers NULL pointer dereference when trying to access\n\u2018gluebi->desc\u2019 in gluebi_read().\n\nubi_gluebi_init\n ubi_register_volume_notifier\n ubi_enumerate_volumes\n ubi_notify_all\n gluebi_notify nb->notifier_call()\n gluebi_create\n mtd_device_register\n mtd_device_parse_register\n add_mtd_device\n blktrans_notify_add not->add()\n ftl_add_mtd tr->add_mtd()\n scan_header\n mtd_read\n mtd_read_oob\n mtd_read_oob_std\n gluebi_read mtd->read()\n gluebi->desc - NULL\n\nDetailed reproduction information available at the Link [1],\n\nIn the normal case, obtain gluebi->desc in the gluebi_get_device(),\nand access gluebi->desc in the gluebi_read(). However,\ngluebi_get_device() is not executed in advance in the\nftl_add_mtd() process, which leads to NULL pointer dereference.\n\nThe solution for the gluebi module is to run jffs2 on the UBI\nvolume without considering working with ftl or mtdblock [2].\nTherefore, this problem can be avoided by preventing gluebi from\ncreating the mtdblock device after creating mtd partition of the\ntype MTD_UBIVOLUME.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-42755", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-42755", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-42755", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-42755", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-42755", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-42755" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52449", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52449", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52449", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52449", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52449", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52449" } }, - "CVE-2023-42756": { - "affected_versions": "v6.4-rc6 to v6.6-rc3", - "breaks": "24e227896bbf003165e006732dccb3516f87f88e", - "cmt_msg": "netfilter: ipset: Fix race between IPSET_CMD_CREATE and IPSET_CMD_SWAP", + "CVE-2023-52450": { + "affected_versions": "v6.2-rc1 to v6.8-rc1", + "breaks": "f680b6e6062e", + "cmt_msg": "perf/x86/intel/uncore: Fix NULL pointer dereference issue in upi_fill_topology()", "cvss3": { - "Attack Complexity": "High", + "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", "Confidentiality": "None", @@ -88964,1561 +95346,2726 @@ "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", - "score": 4.7 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "score": 5.5 }, - "fixes": "7433b6d2afd512d04398c73aa984d1e285be125b", - "last_affected_version": "6.5.5", - "last_modified": "2023-12-06", - "nvd_text": "A flaw was found in the Netfilter subsystem of the Linux kernel. A race condition between IPSET_CMD_ADD and IPSET_CMD_SWAP can lead to a kernel panic due to the invocation of `__ip_set_put` on a wrong `set`. This issue may allow a local user to crash the system.", + "fixes": "1692cf434ba13ee212495b5af795b6a07e986ce4", + "last_affected_version": "6.7.1", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nperf/x86/intel/uncore: Fix NULL pointer dereference issue in upi_fill_topology()\n\nGet logical socket id instead of physical id in discover_upi_topology()\nto avoid out-of-bound access on 'upi = &type->topology[nid][idx];' line\nthat leads to NULL pointer dereference in upi_fill_topology()", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-42756", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-42756", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-42756", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-42756", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-42756", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-42756" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52450", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52450", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52450", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52450", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52450", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52450" } }, - "CVE-2023-4385": { - "affected_versions": "v2.6.12-rc2 to v5.19-rc1", - "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", - "cmt_msg": "fs: jfs: fix possible NULL pointer dereference in dbFree()", + "CVE-2023-52451": { + "affected_versions": "v4.1-rc1 to v6.8-rc1", + "breaks": "51925fb3c5c9", + "cmt_msg": "powerpc/pseries/memhp: Fix access beyond end of drmem array", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", - "Confidentiality": "None", - "Integrity": "None", + "Confidentiality": "High", + "Integrity": "High", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", - "score": 5.5 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 7.8 }, - "fixes": "0d4837fdb796f99369cf7691d33de1b856bcaf1f", - "last_affected_version": "5.18.2", - "last_modified": "2023-12-06", - "nvd_text": "A NULL pointer dereference flaw was found in dbFree in fs/jfs/jfs_dmap.c in the journaling file system (JFS) in the Linux Kernel. This issue may allow a local attacker to crash the system due to a missing sanity check.", + "fixes": "bd68ffce69f6cf8ddd3a3c32549d1d2275e49fc5", + "last_affected_version": "6.7.1", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\npowerpc/pseries/memhp: Fix access beyond end of drmem array\n\ndlpar_memory_remove_by_index() may access beyond the bounds of the\ndrmem lmb array when the LMB lookup fails to match an entry with the\ngiven DRC index. When the search fails, the cursor is left pointing to\n&drmem_info->lmbs[drmem_info->n_lmbs], which is one element past the\nlast valid entry in the array. The debug message at the end of the\nfunction then dereferences this pointer:\n\n pr_debug(\"Failed to hot-remove memory at %llx\\n\",\n lmb->base_addr);\n\nThis was found by inspection and confirmed with KASAN:\n\n pseries-hotplug-mem: Attempting to hot-remove LMB, drc index 1234\n ==================================================================\n BUG: KASAN: slab-out-of-bounds in dlpar_memory+0x298/0x1658\n Read of size 8 at addr c000000364e97fd0 by task bash/949\n\n dump_stack_lvl+0xa4/0xfc (unreliable)\n print_report+0x214/0x63c\n kasan_report+0x140/0x2e0\n __asan_load8+0xa8/0xe0\n dlpar_memory+0x298/0x1658\n handle_dlpar_errorlog+0x130/0x1d0\n dlpar_store+0x18c/0x3e0\n kobj_attr_store+0x68/0xa0\n sysfs_kf_write+0xc4/0x110\n kernfs_fop_write_iter+0x26c/0x390\n vfs_write+0x2d4/0x4e0\n ksys_write+0xac/0x1a0\n system_call_exception+0x268/0x530\n system_call_vectored_common+0x15c/0x2ec\n\n Allocated by task 1:\n kasan_save_stack+0x48/0x80\n kasan_set_track+0x34/0x50\n kasan_save_alloc_info+0x34/0x50\n __kasan_kmalloc+0xd0/0x120\n __kmalloc+0x8c/0x320\n kmalloc_array.constprop.0+0x48/0x5c\n drmem_init+0x2a0/0x41c\n do_one_initcall+0xe0/0x5c0\n kernel_init_freeable+0x4ec/0x5a0\n kernel_init+0x30/0x1e0\n ret_from_kernel_user_thread+0x14/0x1c\n\n The buggy address belongs to the object at c000000364e80000\n which belongs to the cache kmalloc-128k of size 131072\n The buggy address is located 0 bytes to the right of\n allocated 98256-byte region [c000000364e80000, c000000364e97fd0)\n\n ==================================================================\n pseries-hotplug-mem: Failed to hot-remove memory at 0\n\nLog failed lookups with a separate message and dereference the\ncursor only when it points to a valid entry.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-4385", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-4385", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-4385", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-4385", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-4385", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-4385" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52451", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52451", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52451", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52451", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52451", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52451" } }, - "CVE-2023-4387": { - "affected_versions": "v4.4-rc4 to v5.18", - "breaks": "5738a09d58d5ad2871f1f9a42bf6a3aa9ece5b3c", - "cmt_msg": "net: vmxnet3: fix possible use-after-free bugs in vmxnet3_rq_alloc_rx_buf()", + "CVE-2023-52452": { + "affected_versions": "v5.12-rc1-dontuse to v6.8-rc1", + "breaks": "01f810ace9ed3", + "cmt_msg": "bpf: Fix accesses to uninit stack slots", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", "Availability": "High", "Confidentiality": "High", - "Integrity": "None", + "Integrity": "High", "Privileges Required": "Low", "Scope": "Unchanged", "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", - "score": 7.1 + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 7.8 }, - "fixes": "9e7fef9521e73ca8afd7da9e58c14654b02dfad8", - "last_affected_version": "5.17", - "last_modified": "2023-12-06", - "nvd_text": "A use-after-free flaw was found in vmxnet3_rq_alloc_rx_buf in drivers/net/vmxnet3/vmxnet3_drv.c in VMware's vmxnet3 ethernet NIC driver in the Linux Kernel. This issue could allow a local attacker to crash the system due to a double-free while cleaning up vmxnet3_rq_cleanup_all, which could also lead to a kernel information leak problem.", + "fixes": "6b4a64bafd107e521c01eec3453ce94a3fb38529", + "last_affected_version": "6.7.1", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Fix accesses to uninit stack slots\n\nPrivileged programs are supposed to be able to read uninitialized stack\nmemory (ever since 6715df8d5) but, before this patch, these accesses\nwere permitted inconsistently. In particular, accesses were permitted\nabove state->allocated_stack, but not below it. In other words, if the\nstack was already \"large enough\", the access was permitted, but\notherwise the access was rejected instead of being allowed to \"grow the\nstack\". This undesired rejection was happening in two places:\n- in check_stack_slot_within_bounds()\n- in check_stack_range_initialized()\nThis patch arranges for these accesses to be permitted. A bunch of tests\nthat were relying on the old rejection had to change; all of them were\nchanged to add also run unprivileged, in which case the old behavior\npersists. One tests couldn't be updated - global_func16 - because it\ncan't run unprivileged for other reasons.\n\nThis patch also fixes the tracking of the stack size for variable-offset\nreads. This second fix is bundled in the same commit as the first one\nbecause they're inter-related. Before this patch, writes to the stack\nusing registers containing a variable offset (as opposed to registers\nwith fixed, known values) were not properly contributing to the\nfunction's needed stack size. As a result, it was possible for a program\nto verify, but then to attempt to read out-of-bounds data at runtime\nbecause a too small stack had been allocated for it.\n\nEach function tracks the size of the stack it needs in\nbpf_subprog_info.stack_depth, which is maintained by\nupdate_stack_depth(). For regular memory accesses, check_mem_access()\nwas calling update_state_depth() but it was passing in only the fixed\npart of the offset register, ignoring the variable offset. This was\nincorrect; the minimum possible value of that register should be used\ninstead.\n\nThis tracking is now fixed by centralizing the tracking of stack size in\ngrow_stack_state(), and by lifting the calls to grow_stack_state() to\ncheck_stack_access_within_bounds() as suggested by Andrii. The code is\nnow simpler and more convincingly tracks the correct maximum stack size.\ncheck_stack_range_initialized() can now rely on enough stack having been\nallocated for the access; this helps with the fix for the first issue.\n\nA few tests were changed to also check the stack depth computation. The\none that fails without this patch is verifier_var_off:stack_write_priv_vs_unpriv.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-4387", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-4387", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-4387", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-4387", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-4387", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-4387" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52452", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52452", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52452", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52452", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52452", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52452" + } + }, + "CVE-2023-52453": { + "affected_versions": "v6.2-rc1 to v6.8-rc1", + "breaks": "d9a871e4a143047d1d84a606772af319f11516f9", + "cmt_msg": "hisi_acc_vfio_pci: Update migration data pointer correctly on saving/resume", + "fixes": "be12ad45e15b5ee0e2526a50266ba1d295d26a88", + "last_affected_version": "6.7.1", + "last_modified": "2024-02-25", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nhisi_acc_vfio_pci: Update migration data pointer correctly on saving/resume\n\nWhen the optional PRE_COPY support was added to speed up the device\ncompatibility check, it failed to update the saving/resuming data\npointers based on the fd offset. This results in migration data\ncorruption and when the device gets started on the destination the\nfollowing error is reported in some cases,\n\n[ 478.907684] arm-smmu-v3 arm-smmu-v3.2.auto: event 0x10 received:\n[ 478.913691] arm-smmu-v3 arm-smmu-v3.2.auto: 0x0000310200000010\n[ 478.919603] arm-smmu-v3 arm-smmu-v3.2.auto: 0x000002088000007f\n[ 478.925515] arm-smmu-v3 arm-smmu-v3.2.auto: 0x0000000000000000\n[ 478.931425] arm-smmu-v3 arm-smmu-v3.2.auto: 0x0000000000000000\n[ 478.947552] hisi_zip 0000:31:00.0: qm_axi_rresp [error status=0x1] found\n[ 478.955930] hisi_zip 0000:31:00.0: qm_db_timeout [error status=0x400] found\n[ 478.955944] hisi_zip 0000:31:00.0: qm sq doorbell timeout in function 2", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52453", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52453", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52453", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52453", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52453", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52453" + } + }, + "CVE-2023-52454": { + "affected_versions": "v5.0-rc1 to v6.8-rc1", + "breaks": "872d26a391da92ed8f0c0f5cb5fef428067b7f30", + "cmt_msg": "nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length", + "fixes": "efa56305908ba20de2104f1b8508c6a7401833be", + "last_affected_version": "6.7.1", + "last_modified": "2024-02-25", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length\n\nIf the host sends an H2CData command with an invalid DATAL,\nthe kernel may crash in nvmet_tcp_build_pdu_iovec().\n\nUnable to handle kernel NULL pointer dereference at\nvirtual address 0000000000000000\nlr : nvmet_tcp_io_work+0x6ac/0x718 [nvmet_tcp]\nCall trace:\n process_one_work+0x174/0x3c8\n worker_thread+0x2d0/0x3e8\n kthread+0x104/0x110\n\nFix the bug by raising a fatal error if DATAL isn't coherent\nwith the packet size.\nAlso, the PDU length should never exceed the MAXH2CDATA parameter which\nhas been communicated to the host in nvmet_tcp_handle_icreq().", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52454", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52454", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52454", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52454", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52454", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52454" + } + }, + "CVE-2023-52455": { + "affected_versions": "v6.3-rc1 to v6.8-rc1", + "breaks": "a5bf3cfce8cb77d9d24613ab52d520896f83dd48", + "cmt_msg": "iommu: Don't reserve 0-length IOVA region", + "fixes": "bb57f6705960bebeb832142ce9abf43220c3eab1", + "last_affected_version": "6.7.1", + "last_modified": "2024-02-25", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\niommu: Don't reserve 0-length IOVA region\n\nWhen the bootloader/firmware doesn't setup the framebuffers, their\naddress and size are 0 in \"iommu-addresses\" property. If IOVA region is\nreserved with 0 length, then it ends up corrupting the IOVA rbtree with\nan entry which has pfn_hi < pfn_lo.\nIf we intend to use display driver in kernel without framebuffer then\nit's causing the display IOMMU mappings to fail as entire valid IOVA\nspace is reserved when address and length are passed as 0.\nAn ideal solution would be firmware removing the \"iommu-addresses\"\nproperty and corresponding \"memory-region\" if display is not present.\nBut the kernel should be able to handle this by checking for size of\nIOVA region and skipping the IOVA reservation if size is 0. Also, add\na warning if firmware is requesting 0-length IOVA region reservation.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52455", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52455", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52455", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52455", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52455", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52455" + } + }, + "CVE-2023-52456": { + "affected_versions": "v5.9-rc1 to v6.8-rc1", + "breaks": "cb1a609236096c278ecbfb7be678a693a70283f1", + "cmt_msg": "serial: imx: fix tx statemachine deadlock", + "fixes": "78d60dae9a0c9f09aa3d6477c94047df2fe6f7b0", + "last_affected_version": "6.7.1", + "last_modified": "2024-04-06", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nserial: imx: fix tx statemachine deadlock\n\nWhen using the serial port as RS485 port, the tx statemachine is used to\ncontrol the RTS pin to drive the RS485 transceiver TX_EN pin. When the\nTTY port is closed in the middle of a transmission (for instance during\nuserland application crash), imx_uart_shutdown disables the interface\nand disables the Transmission Complete interrupt. afer that,\nimx_uart_stop_tx bails on an incomplete transmission, to be retriggered\nby the TC interrupt. This interrupt is disabled and therefore the tx\nstatemachine never transitions out of SEND. The statemachine is in\ndeadlock now, and the TX_EN remains low, making the interface useless.\n\nimx_uart_stop_tx now checks for incomplete transmission AND whether TC\ninterrupts are enabled before bailing to be retriggered. This makes sure\nthe state machine handling is reached, and is properly set to\nWAIT_AFTER_SEND.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52456", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52456", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52456", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52456", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52456", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52456" + } + }, + "CVE-2023-52457": { + "affected_versions": "v6.1-rc6 to v6.8-rc1", + "breaks": "e3f0c638f428fd66b5871154b62706772045f91a", + "cmt_msg": "serial: 8250: omap: Don't skip resource freeing if pm_runtime_resume_and_get() failed", + "fixes": "ad90d0358bd3b4554f243a425168fc7cebe7d04e", + "last_affected_version": "6.7.1", + "last_modified": "2024-04-06", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nserial: 8250: omap: Don't skip resource freeing if pm_runtime_resume_and_get() failed\n\nReturning an error code from .remove() makes the driver core emit the\nlittle helpful error message:\n\n\tremove callback returned a non-zero value. This will be ignored.\n\nand then remove the device anyhow. So all resources that were not freed\nare leaked in this case. Skipping serial8250_unregister_port() has the\npotential to keep enough of the UART around to trigger a use-after-free.\n\nSo replace the error return (and with it the little helpful error\nmessage) by a more useful error message and continue to cleanup.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52457", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52457", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52457", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52457", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52457", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52457" + } + }, + "CVE-2023-52458": { + "affected_versions": "v2.6.12-rc2 to v6.8-rc1", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "block: add check that partition length needs to be aligned with block size", + "fixes": "6f64f866aa1ae6975c95d805ed51d7e9433a0016", + "last_affected_version": "6.7.1", + "last_modified": "2024-04-06", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nblock: add check that partition length needs to be aligned with block size\n\nBefore calling add partition or resize partition, there is no check\non whether the length is aligned with the logical block size.\nIf the logical block size of the disk is larger than 512 bytes,\nthen the partition size maybe not the multiple of the logical block size,\nand when the last sector is read, bio_truncate() will adjust the bio size,\nresulting in an IO error if the size of the read command is smaller than\nthe logical block size.If integrity data is supported, this will also\nresult in a null pointer dereference when calling bio_integrity_free.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52458", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52458", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52458", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52458", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52458", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52458" + } + }, + "CVE-2023-52459": { + "affected_versions": "v6.6-rc1 to v6.8-rc1", + "breaks": "28a1295795d85a25f2e7dd391c43969e95fcb341", + "cmt_msg": "media: v4l: async: Fix duplicated list deletion", + "fixes": "3de6ee94aae701fa949cd3b5df6b6a440ddfb8f2", + "last_affected_version": "6.7.1", + "last_modified": "2024-02-25", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: v4l: async: Fix duplicated list deletion\n\nThe list deletion call dropped here is already called from the\nhelper function in the line before. Having a second list_del()\ncall results in either a warning (with CONFIG_DEBUG_LIST=y):\n\nlist_del corruption, c46c8198->next is LIST_POISON1 (00000100)\n\nIf CONFIG_DEBUG_LIST is disabled the operation results in a\nkernel error due to NULL pointer dereference.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52459", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52459", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52459", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52459", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52459", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52459" + } + }, + "CVE-2023-52460": { + "affected_versions": "v6.7-rc1 to v6.8-rc1", + "breaks": "7966f319c66d9468623c6a6a017ecbc0dd79be75", + "cmt_msg": "drm/amd/display: Fix NULL pointer dereference at hibernate", + "fixes": "b719a9c15d52d4f56bdea8241a5d90fd9197ce99", + "last_affected_version": "6.7.1", + "last_modified": "2024-02-25", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Fix NULL pointer dereference at hibernate\n\nDuring hibernate sequence the source context might not have a clk_mgr.\nSo don't use it to look for DML2 support.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52460", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52460", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52460", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52460", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52460", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52460" + } + }, + "CVE-2023-52461": { + "affected_versions": "v6.7-rc1 to v6.8-rc1", + "breaks": "56e449603f0ac580700621a356d35d5716a62ce5", + "cmt_msg": "drm/sched: Fix bounds limiting when given a malformed entity", + "fixes": "2bbe6ab2be53858507f11f99f856846d04765ae3", + "last_affected_version": "6.7.1", + "last_modified": "2024-02-25", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/sched: Fix bounds limiting when given a malformed entity\n\nIf we're given a malformed entity in drm_sched_entity_init()--shouldn't\nhappen, but we verify--with out-of-bounds priority value, we set it to an\nallowed value. Fix the expression which sets this limit.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52461", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52461", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52461", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52461", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52461", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52461" + } + }, + "CVE-2023-52462": { + "affected_versions": "v5.16-rc1 to v6.8-rc1", + "breaks": "27113c59b6d0a587b29ae72d4ff3f832f58b0651", + "cmt_msg": "bpf: fix check for attempt to corrupt spilled pointer", + "fixes": "ab125ed3ec1c10ccc36bc98c7a4256ad114a3dae", + "last_affected_version": "6.7.1", + "last_modified": "2024-02-25", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: fix check for attempt to corrupt spilled pointer\n\nWhen register is spilled onto a stack as a 1/2/4-byte register, we set\nslot_type[BPF_REG_SIZE - 1] (plus potentially few more below it,\ndepending on actual spill size). So to check if some stack slot has\nspilled register we need to consult slot_type[7], not slot_type[0].\n\nTo avoid the need to remember and double-check this in the future, just\nuse is_spilled_reg() helper.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52462", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52462", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52462", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52462", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52462", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52462" + } + }, + "CVE-2023-52463": { + "affected_versions": "v5.8-rc7 to v6.8-rc1", + "breaks": "f88814cc2578c121e6edef686365036db72af0ed", + "cmt_msg": "efivarfs: force RO when remounting if SetVariable is not supported", + "fixes": "0e8d2444168dd519fea501599d150e62718ed2fe", + "last_affected_version": "6.7.1", + "last_modified": "2024-02-25", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nefivarfs: force RO when remounting if SetVariable is not supported\n\nIf SetVariable at runtime is not supported by the firmware we never assign\na callback for that function. At the same time mount the efivarfs as\nRO so no one can call that. However, we never check the permission flags\nwhen someone remounts the filesystem as RW. As a result this leads to a\ncrash looking like this:\n\n$ mount -o remount,rw /sys/firmware/efi/efivars\n$ efi-updatevar -f PK.auth PK\n\n[ 303.279166] Unable to handle kernel NULL pointer dereference at virtual address 0000000000000000\n[ 303.280482] Mem abort info:\n[ 303.280854] ESR = 0x0000000086000004\n[ 303.281338] EC = 0x21: IABT (current EL), IL = 32 bits\n[ 303.282016] SET = 0, FnV = 0\n[ 303.282414] EA = 0, S1PTW = 0\n[ 303.282821] FSC = 0x04: level 0 translation fault\n[ 303.283771] user pgtable: 4k pages, 48-bit VAs, pgdp=000000004258c000\n[ 303.284913] [0000000000000000] pgd=0000000000000000, p4d=0000000000000000\n[ 303.286076] Internal error: Oops: 0000000086000004 [#1] PREEMPT SMP\n[ 303.286936] Modules linked in: qrtr tpm_tis tpm_tis_core crct10dif_ce arm_smccc_trng rng_core drm fuse ip_tables x_tables ipv6\n[ 303.288586] CPU: 1 PID: 755 Comm: efi-updatevar Not tainted 6.3.0-rc1-00108-gc7d0c4695c68 #1\n[ 303.289748] Hardware name: Unknown Unknown Product/Unknown Product, BIOS 2023.04-00627-g88336918701d 04/01/2023\n[ 303.291150] pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n[ 303.292123] pc : 0x0\n[ 303.292443] lr : efivar_set_variable_locked+0x74/0xec\n[ 303.293156] sp : ffff800008673c10\n[ 303.293619] x29: ffff800008673c10 x28: ffff0000037e8000 x27: 0000000000000000\n[ 303.294592] x26: 0000000000000800 x25: ffff000002467400 x24: 0000000000000027\n[ 303.295572] x23: ffffd49ea9832000 x22: ffff0000020c9800 x21: ffff000002467000\n[ 303.296566] x20: 0000000000000001 x19: 00000000000007fc x18: 0000000000000000\n[ 303.297531] x17: 0000000000000000 x16: 0000000000000000 x15: 0000aaaac807ab54\n[ 303.298495] x14: ed37489f673633c0 x13: 71c45c606de13f80 x12: 47464259e219acf4\n[ 303.299453] x11: ffff000002af7b01 x10: 0000000000000003 x9 : 0000000000000002\n[ 303.300431] x8 : 0000000000000010 x7 : ffffd49ea8973230 x6 : 0000000000a85201\n[ 303.301412] x5 : 0000000000000000 x4 : ffff0000020c9800 x3 : 00000000000007fc\n[ 303.302370] x2 : 0000000000000027 x1 : ffff000002467400 x0 : ffff000002467000\n[ 303.303341] Call trace:\n[ 303.303679] 0x0\n[ 303.303938] efivar_entry_set_get_size+0x98/0x16c\n[ 303.304585] efivarfs_file_write+0xd0/0x1a4\n[ 303.305148] vfs_write+0xc4/0x2e4\n[ 303.305601] ksys_write+0x70/0x104\n[ 303.306073] __arm64_sys_write+0x1c/0x28\n[ 303.306622] invoke_syscall+0x48/0x114\n[ 303.307156] el0_svc_common.constprop.0+0x44/0xec\n[ 303.307803] do_el0_svc+0x38/0x98\n[ 303.308268] el0_svc+0x2c/0x84\n[ 303.308702] el0t_64_sync_handler+0xf4/0x120\n[ 303.309293] el0t_64_sync+0x190/0x194\n[ 303.309794] Code: ???????? ???????? ???????? ???????? (????????)\n[ 303.310612] ---[ end trace 0000000000000000 ]---\n\nFix this by adding a .reconfigure() function to the fs operations which\nwe can use to check the requested flags and deny anything that's not RO\nif the firmware doesn't implement SetVariable at runtime.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52463", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52463", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52463", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52463", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52463", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52463" + } + }, + "CVE-2023-52464": { + "affected_versions": "v4.12-rc1 to v6.8-rc1", + "breaks": "41003396f932d7f027725c7acebb6a7caa41dc3e", + "cmt_msg": "EDAC/thunderx: Fix possible out-of-bounds string access", + "fixes": "475c58e1a471e9b873e3e39958c64a2d278275c8", + "last_affected_version": "6.7.1", + "last_modified": "2024-02-25", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nEDAC/thunderx: Fix possible out-of-bounds string access\n\nEnabling -Wstringop-overflow globally exposes a warning for a common bug\nin the usage of strncat():\n\n drivers/edac/thunderx_edac.c: In function 'thunderx_ocx_com_threaded_isr':\n drivers/edac/thunderx_edac.c:1136:17: error: 'strncat' specified bound 1024 equals destination size [-Werror=stringop-overflow=]\n 1136 | strncat(msg, other, OCX_MESSAGE_SIZE);\n | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~\n ...\n 1145 | strncat(msg, other, OCX_MESSAGE_SIZE);\n ...\n 1150 | strncat(msg, other, OCX_MESSAGE_SIZE);\n\n ...\n\nApparently the author of this driver expected strncat() to behave the\nway that strlcat() does, which uses the size of the destination buffer\nas its third argument rather than the length of the source buffer. The\nresult is that there is no check on the size of the allocated buffer.\n\nChange it to strlcat().\n\n [ bp: Trim compiler output, fixup commit message. ]", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52464", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52464", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52464", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52464", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52464", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52464" + } + }, + "CVE-2023-52465": { + "affected_versions": "v6.5-rc1 to v6.8-rc1", + "breaks": "8648aeb5d7b70e13264ff5f444f22081d37d4670", + "cmt_msg": "power: supply: Fix null pointer dereference in smb2_probe", + "fixes": "88f04bc3e737155e13caddf0ba8ed19db87f0212", + "last_affected_version": "6.7.1", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\npower: supply: Fix null pointer dereference in smb2_probe\n\ndevm_kasprintf and devm_kzalloc return a pointer to dynamically\nallocated memory which can be NULL upon failure.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52465", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52465", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52465", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52465", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52465", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52465" + } + }, + "CVE-2023-52467": { + "affected_versions": "v5.9-rc1 to v6.8-rc1", + "breaks": "e15d7f2b81d2e7d93115d46fa931b366c1cdebc2", + "cmt_msg": "mfd: syscon: Fix null pointer dereference in of_syscon_register()", + "fixes": "41673c66b3d0c09915698fec5c13b24336f18dd1", + "last_affected_version": "6.7.1", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmfd: syscon: Fix null pointer dereference in of_syscon_register()\n\nkasprintf() returns a pointer to dynamically allocated memory\nwhich can be NULL upon failure.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52467", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52467", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52467", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52467", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52467", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52467" + } + }, + "CVE-2023-52468": { + "affected_versions": "v6.4-rc1 to v6.8-rc1", + "breaks": "dcfbb67e48a2becfce7990386e985b9c45098ee5", + "cmt_msg": "class: fix use-after-free in class_register()", + "fixes": "93ec4a3b76404bce01bd5c9032bef5df6feb1d62", + "last_affected_version": "6.7.1", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nclass: fix use-after-free in class_register()\n\nThe lock_class_key is still registered and can be found in\nlock_keys_hash hlist after subsys_private is freed in error\nhandler path.A task who iterate over the lock_keys_hash\nlater may cause use-after-free.So fix that up and unregister\nthe lock_class_key before kfree(cp).\n\nOn our platform, a driver fails to kset_register because of\ncreating duplicate filename '/class/xxx'.With Kasan enabled,\nit prints a invalid-access bug report.\n\nKASAN bug report:\n\nBUG: KASAN: invalid-access in lockdep_register_key+0x19c/0x1bc\nWrite of size 8 at addr 15ffff808b8c0368 by task modprobe/252\nPointer tag: [15], memory tag: [fe]\n\nCPU: 7 PID: 252 Comm: modprobe Tainted: G W\n 6.6.0-mainline-maybe-dirty #1\n\nCall trace:\ndump_backtrace+0x1b0/0x1e4\nshow_stack+0x2c/0x40\ndump_stack_lvl+0xac/0xe0\nprint_report+0x18c/0x4d8\nkasan_report+0xe8/0x148\n__hwasan_store8_noabort+0x88/0x98\nlockdep_register_key+0x19c/0x1bc\nclass_register+0x94/0x1ec\ninit_module+0xbc/0xf48 [rfkill]\ndo_one_initcall+0x17c/0x72c\ndo_init_module+0x19c/0x3f8\n...\nMemory state around the buggy address:\nffffff808b8c0100: 8a 8a 8a 8a 8a 8a 8a 8a 8a 8a 8a 8a 8a 8a 8a 8a\nffffff808b8c0200: 8a 8a 8a 8a 8a 8a 8a 8a fe fe fe fe fe fe fe fe\n>ffffff808b8c0300: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe\n ^\nffffff808b8c0400: 03 03 03 03 03 03 03 03 03 03 03 03 03 03 03 03\n\nAs CONFIG_KASAN_GENERIC is not set, Kasan reports invalid-access\nnot use-after-free here.In this case, modprobe is manipulating\nthe corrupted lock_keys_hash hlish where lock_class_key is already\nfreed before.\n\nIt's worth noting that this only can happen if lockdep is enabled,\nwhich is not true for normal system.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52468", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52468", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52468", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52468", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52468", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52468" + } + }, + "CVE-2023-52469": { + "affected_versions": "v4.2-rc1 to v6.8-rc1", + "breaks": "a2e73f56fa6282481927ec43aa9362c03c2e2104", + "cmt_msg": "drivers/amd/pm: fix a use-after-free in kv_parse_power_table", + "fixes": "28dd788382c43b330480f57cd34cde0840896743", + "last_affected_version": "6.7.1", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrivers/amd/pm: fix a use-after-free in kv_parse_power_table\n\nWhen ps allocated by kzalloc equals to NULL, kv_parse_power_table\nfrees adev->pm.dpm.ps that allocated before. However, after the control\nflow goes through the following call chains:\n\nkv_parse_power_table\n |-> kv_dpm_init\n |-> kv_dpm_sw_init\n\t |-> kv_dpm_fini\n\nThe adev->pm.dpm.ps is used in the for loop of kv_dpm_fini after its\nfirst free in kv_parse_power_table and causes a use-after-free bug.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52469", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52469", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52469", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52469", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52469", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52469" + } + }, + "CVE-2023-52470": { + "affected_versions": "v3.16-rc1 to v6.8-rc1", + "breaks": "fa7f517cb26eb1a1a1f0baffcced39f6c3ec3337", + "cmt_msg": "drm/radeon: check the alloc_workqueue return value in radeon_crtc_init()", + "fixes": "7a2464fac80d42f6f8819fed97a553e9c2f43310", + "last_affected_version": "6.7.1", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/radeon: check the alloc_workqueue return value in radeon_crtc_init()\n\ncheck the alloc_workqueue return value in radeon_crtc_init()\nto avoid null-ptr-deref.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52470", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52470", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52470", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52470", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52470", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52470" + } + }, + "CVE-2023-52471": { + "affected_versions": "v6.7-rc1 to v6.8-rc1", + "breaks": "d938a8cca88a5f02f523f95fe3d2d1214f4b4a8d", + "cmt_msg": "ice: Fix some null pointer dereference issues in ice_ptp.c", + "fixes": "3027e7b15b02d2d37e3f82d6b8404f6d37e3b8cf", + "last_affected_version": "6.7.1", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nice: Fix some null pointer dereference issues in ice_ptp.c\n\ndevm_kasprintf() returns a pointer to dynamically allocated memory\nwhich can be NULL upon failure.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52471", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52471", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52471", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52471", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52471", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52471" + } + }, + "CVE-2023-52472": { + "affected_versions": "v6.5-rc1 to v6.8-rc1", + "breaks": "6637e11e4ad22ff03183da0dbd36d65c98b81cf7", + "cmt_msg": "crypto: rsa - add a check for allocation failure", + "fixes": "d872ca165cb67112f2841ef9c37d51ef7e63d1e4", + "last_affected_version": "6.7.1", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: rsa - add a check for allocation failure\n\nStatic checkers insist that the mpi_alloc() allocation can fail so add\na check to prevent a NULL dereference. Small allocations like this\ncan't actually fail in current kernels, but adding a check is very\nsimple and makes the static checkers happy.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52472", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52472", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52472", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52472", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52472", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52472" + } + }, + "CVE-2023-52473": { + "affected_versions": "v6.4-rc1 to v6.8-rc1", + "breaks": "3d439b1a2ad36c8b4ea151c8de25309d60d17407", + "cmt_msg": "thermal: core: Fix NULL pointer dereference in zone registration error path", + "fixes": "04e6ccfc93c5a1aa1d75a537cf27e418895e20ea", + "last_affected_version": "6.7.1", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nthermal: core: Fix NULL pointer dereference in zone registration error path\n\nIf device_register() in thermal_zone_device_register_with_trips()\nreturns an error, the tz variable is set to NULL and subsequently\ndereferenced in kfree(tz->tzp).\n\nCommit adc8749b150c (\"thermal/drivers/core: Use put_device() if\ndevice_register() fails\") added the tz = NULL assignment in question to\navoid a possible double-free after dropping the reference to the zone\ndevice. However, after commit 4649620d9404 (\"thermal: core: Make\nthermal_zone_device_unregister() return after freeing the zone\"), that\nassignment has become redundant, because dropping the reference to the\nzone device does not cause the zone object to be freed any more.\n\nDrop it to address the NULL pointer dereference.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52473", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52473", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52473", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52473", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52473", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52473" + } + }, + "CVE-2023-52474": { + "affected_versions": "v4.14-rc1 to v6.4-rc1", + "breaks": "7be85676f1d13c77a7e0c72e04903bfd39580d4f", + "cmt_msg": "IB/hfi1: Fix bugs with non-PAGE_SIZE-end multi-iovec user SDMA requests", + "fixes": "00cbce5cbf88459cd1aa1d60d0f1df15477df127", + "last_affected_version": "6.3.1", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nIB/hfi1: Fix bugs with non-PAGE_SIZE-end multi-iovec user SDMA requests\n\nhfi1 user SDMA request processing has two bugs that can cause data\ncorruption for user SDMA requests that have multiple payload iovecs\nwhere an iovec other than the tail iovec does not run up to the page\nboundary for the buffer pointed to by that iovec.a\n\nHere are the specific bugs:\n1. user_sdma_txadd() does not use struct user_sdma_iovec->iov.iov_len.\n Rather, user_sdma_txadd() will add up to PAGE_SIZE bytes from iovec\n to the packet, even if some of those bytes are past\n iovec->iov.iov_len and are thus not intended to be in the packet.\n2. user_sdma_txadd() and user_sdma_send_pkts() fail to advance to the\n next iovec in user_sdma_request->iovs when the current iovec\n is not PAGE_SIZE and does not contain enough data to complete the\n packet. The transmitted packet will contain the wrong data from the\n iovec pages.\n\nThis has not been an issue with SDMA packets from hfi1 Verbs or PSM2\nbecause they only produce iovecs that end short of PAGE_SIZE as the tail\niovec of an SDMA request.\n\nFixing these bugs exposes other bugs with the SDMA pin cache\n(struct mmu_rb_handler) that get in way of supporting user SDMA requests\nwith multiple payload iovecs whose buffers do not end at PAGE_SIZE. So\nthis commit fixes those issues as well.\n\nHere are the mmu_rb_handler bugs that non-PAGE_SIZE-end multi-iovec\npayload user SDMA requests can hit:\n1. Overlapping memory ranges in mmu_rb_handler will result in duplicate\n pinnings.\n2. When extending an existing mmu_rb_handler entry (struct mmu_rb_node),\n the mmu_rb code (1) removes the existing entry under a lock, (2)\n releases that lock, pins the new pages, (3) then reacquires the lock\n to insert the extended mmu_rb_node.\n\n If someone else comes in and inserts an overlapping entry between (2)\n and (3), insert in (3) will fail.\n\n The failure path code in this case unpins _all_ pages in either the\n original mmu_rb_node or the new mmu_rb_node that was inserted between\n (2) and (3).\n3. In hfi1_mmu_rb_remove_unless_exact(), mmu_rb_node->refcount is\n incremented outside of mmu_rb_handler->lock. As a result, mmu_rb_node\n could be evicted by another thread that gets mmu_rb_handler->lock and\n checks mmu_rb_node->refcount before mmu_rb_node->refcount is\n incremented.\n4. Related to #2 above, SDMA request submission failure path does not\n check mmu_rb_node->refcount before freeing mmu_rb_node object.\n\n If there are other SDMA requests in progress whose iovecs have\n pointers to the now-freed mmu_rb_node(s), those pointers to the\n now-freed mmu_rb nodes will be dereferenced when those SDMA requests\n complete.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52474", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52474", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52474", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52474", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52474", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52474" + } + }, + "CVE-2023-52475": { + "affected_versions": "v2.6.12-rc2 to v6.6-rc6", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "Input: powermate - fix use-after-free in powermate_config_complete", + "fixes": "5c15c60e7be615f05a45cd905093a54b11f461bc", + "last_affected_version": "6.5.7", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nInput: powermate - fix use-after-free in powermate_config_complete\n\nsyzbot has found a use-after-free bug [1] in the powermate driver. This\nhappens when the device is disconnected, which leads to a memory free from\nthe powermate_device struct. When an asynchronous control message\ncompletes after the kfree and its callback is invoked, the lock does not\nexist anymore and hence the bug.\n\nUse usb_kill_urb() on pm->config to cancel any in-progress requests upon\ndevice disconnection.\n\n[1] https://syzkaller.appspot.com/bug?extid=0434ac83f907a1dbdd1e", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52475", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52475", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52475", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52475", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52475", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52475" + } + }, + "CVE-2023-52476": { + "affected_versions": "v2.6.12-rc2 to v6.6-rc6", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "perf/x86/lbr: Filter vsyscall addresses", + "fixes": "e53899771a02f798d436655efbd9d4b46c0f9265", + "last_affected_version": "6.5.7", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nperf/x86/lbr: Filter vsyscall addresses\n\nWe found that a panic can occur when a vsyscall is made while LBR sampling\nis active. If the vsyscall is interrupted (NMI) for perf sampling, this\ncall sequence can occur (most recent at top):\n\n __insn_get_emulate_prefix()\n insn_get_emulate_prefix()\n insn_get_prefixes()\n insn_get_opcode()\n decode_branch_type()\n get_branch_type()\n intel_pmu_lbr_filter()\n intel_pmu_handle_irq()\n perf_event_nmi_handler()\n\nWithin __insn_get_emulate_prefix() at frame 0, a macro is called:\n\n peek_nbyte_next(insn_byte_t, insn, i)\n\nWithin this macro, this dereference occurs:\n\n (insn)->next_byte\n\nInspecting registers at this point, the value of the next_byte field is the\naddress of the vsyscall made, for example the location of the vsyscall\nversion of gettimeofday() at 0xffffffffff600000. The access to an address\nin the vsyscall region will trigger an oops due to an unhandled page fault.\n\nTo fix the bug, filtering for vsyscalls can be done when\ndetermining the branch type. This patch will return\na \"none\" branch if a kernel address if found to lie in the\nvsyscall region.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52476", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52476", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52476", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52476", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52476", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52476" + } + }, + "CVE-2023-52477": { + "affected_versions": "v2.6.12-rc2 to v6.6-rc6", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "usb: hub: Guard against accesses to uninitialized BOS descriptors", + "fixes": "f74a7afc224acd5e922c7a2e52244d891bbe44ee", + "last_affected_version": "6.5.7", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: hub: Guard against accesses to uninitialized BOS descriptors\n\nMany functions in drivers/usb/core/hub.c and drivers/usb/core/hub.h\naccess fields inside udev->bos without checking if it was allocated and\ninitialized. If usb_get_bos_descriptor() fails for whatever\nreason, udev->bos will be NULL and those accesses will result in a\ncrash:\n\nBUG: kernel NULL pointer dereference, address: 0000000000000018\nPGD 0 P4D 0\nOops: 0000 [#1] PREEMPT SMP NOPTI\nCPU: 5 PID: 17818 Comm: kworker/5:1 Tainted: G W 5.15.108-18910-gab0e1cb584e1 #1 \nHardware name: Google Kindred/Kindred, BIOS Google_Kindred.12672.413.0 02/03/2021\nWorkqueue: usb_hub_wq hub_event\nRIP: 0010:hub_port_reset+0x193/0x788\nCode: 89 f7 e8 20 f7 15 00 48 8b 43 08 80 b8 96 03 00 00 03 75 36 0f b7 88 92 03 00 00 81 f9 10 03 00 00 72 27 48 8b 80 a8 03 00 00 <48> 83 78 18 00 74 19 48 89 df 48 8b 75 b0 ba 02 00 00 00 4c 89 e9\nRSP: 0018:ffffab740c53fcf8 EFLAGS: 00010246\nRAX: 0000000000000000 RBX: ffffa1bc5f678000 RCX: 0000000000000310\nRDX: fffffffffffffdff RSI: 0000000000000286 RDI: ffffa1be9655b840\nRBP: ffffab740c53fd70 R08: 00001b7d5edaa20c R09: ffffffffb005e060\nR10: 0000000000000001 R11: 0000000000000000 R12: 0000000000000000\nR13: ffffab740c53fd3e R14: 0000000000000032 R15: 0000000000000000\nFS: 0000000000000000(0000) GS:ffffa1be96540000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000000000000018 CR3: 000000022e80c005 CR4: 00000000003706e0\nCall Trace:\nhub_event+0x73f/0x156e\n? hub_activate+0x5b7/0x68f\nprocess_one_work+0x1a2/0x487\nworker_thread+0x11a/0x288\nkthread+0x13a/0x152\n? process_one_work+0x487/0x487\n? kthread_associate_blkcg+0x70/0x70\nret_from_fork+0x1f/0x30\n\nFall back to a default behavior if the BOS descriptor isn't accessible\nand skip all the functionalities that depend on it: LPM support checks,\nSuper Speed capabilitiy checks, U1/U2 states setup.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52477", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52477", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52477", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52477", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52477", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52477" + } + }, + "CVE-2023-52478": { + "affected_versions": "v2.6.12-rc2 to v6.6-rc6", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect", + "fixes": "dac501397b9d81e4782232c39f94f4307b137452", + "last_affected_version": "6.5.7", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nHID: logitech-hidpp: Fix kernel crash on receiver USB disconnect\n\nhidpp_connect_event() has *four* time-of-check vs time-of-use (TOCTOU)\nraces when it races with itself.\n\nhidpp_connect_event() primarily runs from a workqueue but it also runs\non probe() and if a \"device-connected\" packet is received by the hw\nwhen the thread running hidpp_connect_event() from probe() is waiting on\nthe hw, then a second thread running hidpp_connect_event() will be\nstarted from the workqueue.\n\nThis opens the following races (note the below code is simplified):\n\n1. Retrieving + printing the protocol (harmless race):\n\n\tif (!hidpp->protocol_major) {\n\t\thidpp_root_get_protocol_version()\n\t\thidpp->protocol_major = response.rap.params[0];\n\t}\n\nWe can actually see this race hit in the dmesg in the abrt output\nattached to rhbz#2227968:\n\n[ 3064.624215] logitech-hidpp-device 0003:046D:4071.0049: HID++ 4.5 device connected.\n[ 3064.658184] logitech-hidpp-device 0003:046D:4071.0049: HID++ 4.5 device connected.\n\nTesting with extra logging added has shown that after this the 2 threads\ntake turn grabbing the hw access mutex (send_mutex) so they ping-pong\nthrough all the other TOCTOU cases managing to hit all of them:\n\n2. Updating the name to the HIDPP name (harmless race):\n\n\tif (hidpp->name == hdev->name) {\n\t\t...\n\t\thidpp->name = new_name;\n\t}\n\n3. Initializing the power_supply class for the battery (problematic!):\n\nhidpp_initialize_battery()\n{\n if (hidpp->battery.ps)\n return 0;\n\n\tprobe_battery(); /* Blocks, threads take turns executing this */\n\n\thidpp->battery.desc.properties =\n\t\tdevm_kmemdup(dev, hidpp_battery_props, cnt, GFP_KERNEL);\n\n\thidpp->battery.ps =\n\t\tdevm_power_supply_register(&hidpp->hid_dev->dev,\n\t\t\t\t\t &hidpp->battery.desc, cfg);\n}\n\n4. Creating delayed input_device (potentially problematic):\n\n\tif (hidpp->delayed_input)\n\t\treturn;\n\n\thidpp->delayed_input = hidpp_allocate_input(hdev);\n\nThe really big problem here is 3. Hitting the race leads to the following\nsequence:\n\n\thidpp->battery.desc.properties =\n\t\tdevm_kmemdup(dev, hidpp_battery_props, cnt, GFP_KERNEL);\n\n\thidpp->battery.ps =\n\t\tdevm_power_supply_register(&hidpp->hid_dev->dev,\n\t\t\t\t\t &hidpp->battery.desc, cfg);\n\n\t...\n\n\thidpp->battery.desc.properties =\n\t\tdevm_kmemdup(dev, hidpp_battery_props, cnt, GFP_KERNEL);\n\n\thidpp->battery.ps =\n\t\tdevm_power_supply_register(&hidpp->hid_dev->dev,\n\t\t\t\t\t &hidpp->battery.desc, cfg);\n\nSo now we have registered 2 power supplies for the same battery,\nwhich looks a bit weird from userspace's pov but this is not even\nthe really big problem.\n\nNotice how:\n\n1. This is all devm-maganaged\n2. The hidpp->battery.desc struct is shared between the 2 power supplies\n3. hidpp->battery.desc.properties points to the result from the second\n devm_kmemdup()\n\nThis causes a use after free scenario on USB disconnect of the receiver:\n1. The last registered power supply class device gets unregistered\n2. The memory from the last devm_kmemdup() call gets freed,\n hidpp->battery.desc.properties now points to freed memory\n3. The first registered power supply class device gets unregistered,\n this involves sending a remove uevent to userspace which invokes\n power_supply_uevent() to fill the uevent data\n4. power_supply_uevent() uses hidpp->battery.desc.properties which\n now points to freed memory leading to backtraces like this one:\n\nSep 22 20:01:35 eric kernel: BUG: unable to handle page fault for address: ffffb2140e017f08\n...\nSep 22 20:01:35 eric kernel: Workqueue: usb_hub_wq hub_event\nSep 22 20:01:35 eric kernel: RIP: 0010:power_supply_uevent+0xee/0x1d0\n...\nSep 22 20:01:35 eric kernel: ? asm_exc_page_fault+0x26/0x30\nSep 22 20:01:35 eric kernel: ? power_supply_uevent+0xee/0x1d0\nSep 22 20:01:35 eric kernel: ? power_supply_uevent+0x10d/0x1d0\nSep 22 20:01:35 eric kernel: dev_uevent+0x10f/0x2d0\nSep 22 20:01:35 eric kernel: kobject_uevent_env+0x291/0x680\nSep 22 20:01:35 eric kernel: \n---truncated---", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52478", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52478", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52478", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52478", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52478", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52478" + } + }, + "CVE-2023-52479": { + "affected_versions": "v2.6.12-rc2 to v6.6-rc5", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "ksmbd: fix uaf in smb20_oplock_break_ack", + "fixes": "c69813471a1ec081a0b9bf0c6bd7e8afd818afce", + "last_affected_version": "6.5.6", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nksmbd: fix uaf in smb20_oplock_break_ack\n\ndrop reference after use opinfo.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52479", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52479", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52479", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52479", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52479", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52479" + } + }, + "CVE-2023-52480": { + "affected_versions": "v2.6.12-rc2 to v6.6-rc5", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "ksmbd: fix race condition between session lookup and expire", + "fixes": "53ff5cf89142b978b1a5ca8dc4d4425e6a09745f", + "last_affected_version": "6.5.6", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nksmbd: fix race condition between session lookup and expire\n\n Thread A + Thread B\n ksmbd_session_lookup | smb2_sess_setup\n sess = xa_load |\n |\n | xa_erase(&conn->sessions, sess->id);\n |\n | ksmbd_session_destroy(sess) --> kfree(sess)\n |\n // UAF! |\n sess->last_active = jiffies |\n +\n\nThis patch add rwsem to fix race condition between ksmbd_session_lookup\nand ksmbd_expire_session.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52480", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52480", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52480", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52480", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52480", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52480" + } + }, + "CVE-2023-52481": { + "affected_versions": "v2.6.12-rc2 to v6.6-rc5", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "arm64: errata: Add Cortex-A520 speculative unprivileged load workaround", + "fixes": "471470bc7052d28ce125901877dd10e4c048e513", + "last_affected_version": "6.5.6", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\narm64: errata: Add Cortex-A520 speculative unprivileged load workaround\n\nImplement the workaround for ARM Cortex-A520 erratum 2966298. On an\naffected Cortex-A520 core, a speculatively executed unprivileged load\nmight leak data from a privileged load via a cache side channel. The\nissue only exists for loads within a translation regime with the same\ntranslation (e.g. same ASID and VMID). Therefore, the issue only affects\nthe return to EL0.\n\nThe workaround is to execute a TLBI before returning to EL0 after all\nloads of privileged data. A non-shareable TLBI to any address is\nsufficient.\n\nThe workaround isn't necessary if page table isolation (KPTI) is\nenabled, but for simplicity it will be. Page table isolation should\nnormally be disabled for Cortex-A520 as it supports the CSV3 feature\nand the E0PD feature (used when KASLR is enabled).", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52481", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52481", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52481", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52481", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52481", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52481" + } + }, + "CVE-2023-52482": { + "affected_versions": "v2.6.12-rc2 to v6.6-rc4", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "x86/srso: Add SRSO mitigation for Hygon processors", + "fixes": "a5ef7d68cea1344cf524f04981c2b3f80bedbb0d", + "last_affected_version": "6.5.5", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nx86/srso: Add SRSO mitigation for Hygon processors\n\nAdd mitigation for the speculative return stack overflow vulnerability\nwhich exists on Hygon processors too.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52482", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52482", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52482", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52482", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52482", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52482" + } + }, + "CVE-2023-52483": { + "affected_versions": "v5.15-rc1 to v6.6-rc6", + "breaks": "889b7da23abf92faf34491df95733bda63639e32", + "cmt_msg": "mctp: perform route lookups under a RCU read-side lock", + "fixes": "5093bbfc10ab6636b32728e35813cbd79feb063c", + "last_affected_version": "6.5.7", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmctp: perform route lookups under a RCU read-side lock\n\nOur current route lookups (mctp_route_lookup and mctp_route_lookup_null)\ntraverse the net's route list without the RCU read lock held. This means\nthe route lookup is subject to preemption, resulting in an potential\ngrace period expiry, and so an eventual kfree() while we still have the\nroute pointer.\n\nAdd the proper read-side critical section locks around the route\nlookups, preventing premption and a possible parallel kfree.\n\nThe remaining net->mctp.routes accesses are already under a\nrcu_read_lock, or protected by the RTNL for updates.\n\nBased on an analysis from Sili Luo , where\nintroducing a delay in the route lookup could cause a UAF on\nsimultaneous sendmsg() and route deletion.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52483", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52483", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52483", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52483", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52483", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52483" + } + }, + "CVE-2023-52484": { + "affected_versions": "v2.6.12-rc2 to v6.6-rc5", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "iommu/arm-smmu-v3: Fix soft lockup triggered by arm_smmu_mm_invalidate_range", + "fixes": "d5afb4b47e13161b3f33904d45110f9e6463bad6", + "last_affected_version": "6.5.5", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\niommu/arm-smmu-v3: Fix soft lockup triggered by arm_smmu_mm_invalidate_range\n\nWhen running an SVA case, the following soft lockup is triggered:\n--------------------------------------------------------------------\nwatchdog: BUG: soft lockup - CPU#244 stuck for 26s!\npstate: 83400009 (Nzcv daif +PAN -UAO +TCO +DIT -SSBS BTYPE=--)\npc : arm_smmu_cmdq_issue_cmdlist+0x178/0xa50\nlr : arm_smmu_cmdq_issue_cmdlist+0x150/0xa50\nsp : ffff8000d83ef290\nx29: ffff8000d83ef290 x28: 000000003b9aca00 x27: 0000000000000000\nx26: ffff8000d83ef3c0 x25: da86c0812194a0e8 x24: 0000000000000000\nx23: 0000000000000040 x22: ffff8000d83ef340 x21: ffff0000c63980c0\nx20: 0000000000000001 x19: ffff0000c6398080 x18: 0000000000000000\nx17: 0000000000000000 x16: 0000000000000000 x15: ffff3000b4a3bbb0\nx14: ffff3000b4a30888 x13: ffff3000b4a3cf60 x12: 0000000000000000\nx11: 0000000000000000 x10: 0000000000000000 x9 : ffffc08120e4d6bc\nx8 : 0000000000000000 x7 : 0000000000000000 x6 : 0000000000048cfa\nx5 : 0000000000000000 x4 : 0000000000000001 x3 : 000000000000000a\nx2 : 0000000080000000 x1 : 0000000000000000 x0 : 0000000000000001\nCall trace:\n arm_smmu_cmdq_issue_cmdlist+0x178/0xa50\n __arm_smmu_tlb_inv_range+0x118/0x254\n arm_smmu_tlb_inv_range_asid+0x6c/0x130\n arm_smmu_mm_invalidate_range+0xa0/0xa4\n __mmu_notifier_invalidate_range_end+0x88/0x120\n unmap_vmas+0x194/0x1e0\n unmap_region+0xb4/0x144\n do_mas_align_munmap+0x290/0x490\n do_mas_munmap+0xbc/0x124\n __vm_munmap+0xa8/0x19c\n __arm64_sys_munmap+0x28/0x50\n invoke_syscall+0x78/0x11c\n el0_svc_common.constprop.0+0x58/0x1c0\n do_el0_svc+0x34/0x60\n el0_svc+0x2c/0xd4\n el0t_64_sync_handler+0x114/0x140\n el0t_64_sync+0x1a4/0x1a8\n--------------------------------------------------------------------\n\nNote that since 6.6-rc1 the arm_smmu_mm_invalidate_range above is renamed\nto \"arm_smmu_mm_arch_invalidate_secondary_tlbs\", yet the problem remains.\n\nThe commit 06ff87bae8d3 (\"arm64: mm: remove unused functions and variable\nprotoypes\") fixed a similar lockup on the CPU MMU side. Yet, it can occur\nto SMMU too, since arm_smmu_mm_arch_invalidate_secondary_tlbs() is called\ntypically next to MMU tlb flush function, e.g.\n\ttlb_flush_mmu_tlbonly {\n\t\ttlb_flush {\n\t\t\t__flush_tlb_range {\n\t\t\t\t// check MAX_TLBI_OPS\n\t\t\t}\n\t\t}\n\t\tmmu_notifier_arch_invalidate_secondary_tlbs {\n\t\t\tarm_smmu_mm_arch_invalidate_secondary_tlbs {\n\t\t\t\t// does not check MAX_TLBI_OPS\n\t\t\t}\n\t\t}\n\t}\n\nClone a CMDQ_MAX_TLBI_OPS from the MAX_TLBI_OPS in tlbflush.h, since in an\nSVA case SMMU uses the CPU page table, so it makes sense to align with the\ntlbflush code. Then, replace per-page TLBI commands with a single per-asid\nTLBI command, if the request size hits this threshold.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52484", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52484", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52484", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52484", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52484", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52484" + } + }, + "CVE-2023-52485": { + "affected_versions": "v2.6.12-rc2 to v6.8-rc1", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "drm/amd/display: Wake DMCUB before sending a command", + "fixes": "8892780834ae294bc3697c7d0e056d7743900b39", + "last_affected_version": "6.7.2", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Wake DMCUB before sending a command\n\n[Why]\nWe can hang in place trying to send commands when the DMCUB isn't\npowered on.\n\n[How]\nFor functions that execute within a DC context or DC lock we can\nwrap the direct calls to dm_execute_dmub_cmd/list with code that\nexits idle power optimizations and reallows once we're done with\nthe command submission on success.\n\nFor DM direct submissions the DM will need to manage the enter/exit\nsequencing manually.\n\nWe cannot invoke a DMCUB command directly within the DM execution\nhelper or we can deadlock.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52485", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52485", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52485", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52485", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52485", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52485" + } + }, + "CVE-2023-52486": { + "affected_versions": "v2.6.12-rc2 to v6.8-rc1", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "drm: Don't unref the same fb many times by mistake due to deadlock handling", + "fixes": "cb4daf271302d71a6b9a7c01bd0b6d76febd8f0c", + "last_affected_version": "6.7.2", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm: Don't unref the same fb many times by mistake due to deadlock handling\n\nIf we get a deadlock after the fb lookup in drm_mode_page_flip_ioctl()\nwe proceed to unref the fb and then retry the whole thing from the top.\nBut we forget to reset the fb pointer back to NULL, and so if we then\nget another error during the retry, before the fb lookup, we proceed\nthe unref the same fb again without having gotten another reference.\nThe end result is that the fb will (eventually) end up being freed\nwhile it's still in use.\n\nReset fb to NULL once we've unreffed it to avoid doing it again\nuntil we've done another fb lookup.\n\nThis turned out to be pretty easy to hit on a DG2 when doing async\nflips (and CONFIG_DEBUG_WW_MUTEX_SLOWPATH=y). The first symptom I\nsaw that drm_closefb() simply got stuck in a busy loop while walking\nthe framebuffer list. Fortunately I was able to convince it to oops\ninstead, and from there it was easier to track down the culprit.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52486", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52486", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52486", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52486", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52486", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52486" + } + }, + "CVE-2023-52487": { + "affected_versions": "v6.5-rc1 to v6.8-rc2", + "breaks": "9be6c21fdcf8a7ec48262bb76f78c17ac2761ac6", + "cmt_msg": "net/mlx5e: Fix peer flow lists handling", + "fixes": "d76fdd31f953ac5046555171620f2562715e9b71", + "last_affected_version": "6.7.2", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5e: Fix peer flow lists handling\n\nThe cited change refactored mlx5e_tc_del_fdb_peer_flow() to only clear DUP\nflag when list of peer flows has become empty. However, if any concurrent\nuser holds a reference to a peer flow (for example, the neighbor update\nworkqueue task is updating peer flow's parent encap entry concurrently),\nthen the flow will not be removed from the peer list and, consecutively,\nDUP flag will remain set. Since mlx5e_tc_del_fdb_peers_flow() calls\nmlx5e_tc_del_fdb_peer_flow() for every possible peer index the algorithm\nwill try to remove the flow from eswitch instances that it has never peered\nwith causing either NULL pointer dereference when trying to remove the flow\npeer list head of peer_index that was never initialized or a warning if the\nlist debug config is enabled[0].\n\nFix the issue by always removing the peer flow from the list even when not\nreleasing the last reference to it.\n\n[0]:\n\n[ 3102.985806] ------------[ cut here ]------------\n[ 3102.986223] list_del corruption, ffff888139110698->next is NULL\n[ 3102.986757] WARNING: CPU: 2 PID: 22109 at lib/list_debug.c:53 __list_del_entry_valid_or_report+0x4f/0xc0\n[ 3102.987561] Modules linked in: act_ct nf_flow_table bonding act_tunnel_key act_mirred act_skbedit vxlan cls_matchall nfnetlink_cttimeout act_gact cls_flower sch_ingress mlx5_vdpa vringh vhost_iotlb vdpa openvswitch nsh xt_MASQUERADE nf_conntrack_netlink nfnetlink iptable_nat xt_addrtype xt_conntrack nf_nat br_netfilter rpcsec_gss_krb5 auth_rpcg\nss oid_registry overlay rpcrdma rdma_ucm ib_iser libiscsi scsi_transport_iscsi ib_umad rdma_cm ib_ipoib iw_cm ib_cm mlx5_ib ib_uverbs ib_core mlx5_core [last unloaded: bonding]\n[ 3102.991113] CPU: 2 PID: 22109 Comm: revalidator28 Not tainted 6.6.0-rc6+ #3\n[ 3102.991695] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014\n[ 3102.992605] RIP: 0010:__list_del_entry_valid_or_report+0x4f/0xc0\n[ 3102.993122] Code: 39 c2 74 56 48 8b 32 48 39 fe 75 62 48 8b 51 08 48 39 f2 75 73 b8 01 00 00 00 c3 48 89 fe 48 c7 c7 48 fd 0a 82 e8 41 0b ad ff <0f> 0b 31 c0 c3 48 89 fe 48 c7 c7 70 fd 0a 82 e8 2d 0b ad ff 0f 0b\n[ 3102.994615] RSP: 0018:ffff8881383e7710 EFLAGS: 00010286\n[ 3102.995078] RAX: 0000000000000000 RBX: 0000000000000002 RCX: 0000000000000000\n[ 3102.995670] RDX: 0000000000000001 RSI: ffff88885f89b640 RDI: ffff88885f89b640\n[ 3102.997188] DEL flow 00000000be367878 on port 0\n[ 3102.998594] RBP: dead000000000122 R08: 0000000000000000 R09: c0000000ffffdfff\n[ 3102.999604] R10: 0000000000000008 R11: ffff8881383e7598 R12: dead000000000100\n[ 3103.000198] R13: 0000000000000002 R14: ffff888139110000 R15: ffff888101901240\n[ 3103.000790] FS: 00007f424cde4700(0000) GS:ffff88885f880000(0000) knlGS:0000000000000000\n[ 3103.001486] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 3103.001986] CR2: 00007fd42e8dcb70 CR3: 000000011e68a003 CR4: 0000000000370ea0\n[ 3103.002596] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n[ 3103.003190] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n[ 3103.003787] Call Trace:\n[ 3103.004055] \n[ 3103.004297] ? __warn+0x7d/0x130\n[ 3103.004623] ? __list_del_entry_valid_or_report+0x4f/0xc0\n[ 3103.005094] ? report_bug+0xf1/0x1c0\n[ 3103.005439] ? console_unlock+0x4a/0xd0\n[ 3103.005806] ? handle_bug+0x3f/0x70\n[ 3103.006149] ? exc_invalid_op+0x13/0x60\n[ 3103.006531] ? asm_exc_invalid_op+0x16/0x20\n[ 3103.007430] ? __list_del_entry_valid_or_report+0x4f/0xc0\n[ 3103.007910] mlx5e_tc_del_fdb_peers_flow+0xcf/0x240 [mlx5_core]\n[ 3103.008463] mlx5e_tc_del_flow+0x46/0x270 [mlx5_core]\n[ 3103.008944] mlx5e_flow_put+0x26/0x50 [mlx5_core]\n[ 3103.009401] mlx5e_delete_flower+0x25f/0x380 [mlx5_core]\n[ 3103.009901] tc_setup_cb_destroy+0xab/0x180\n[ 3103.010292] fl_hw_destroy_filter+0x99/0xc0 [cls_flower]\n[ 3103.010779] __fl_delete+0x2d4/0x2f0 [cls_flower]\n[ 3103.0\n---truncated---", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52487", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52487", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52487", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52487", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52487", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52487" + } + }, + "CVE-2023-52488": { + "affected_versions": "v3.16-rc1 to v6.8-rc1", + "breaks": "dfeae619d781dee61666d5551b93ba3be755a86b", + "cmt_msg": "serial: sc16is7xx: convert from _raw_ to _noinc_ regmap functions for FIFO", + "fixes": "dbf4ab821804df071c8b566d9813083125e6d97b", + "last_affected_version": "6.7.2", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nserial: sc16is7xx: convert from _raw_ to _noinc_ regmap functions for FIFO\n\nThe SC16IS7XX IC supports a burst mode to access the FIFOs where the\ninitial register address is sent ($00), followed by all the FIFO data\nwithout having to resend the register address each time. In this mode, the\nIC doesn't increment the register address for each R/W byte.\n\nThe regmap_raw_read() and regmap_raw_write() are functions which can\nperform IO over multiple registers. They are currently used to read/write\nfrom/to the FIFO, and although they operate correctly in this burst mode on\nthe SPI bus, they would corrupt the regmap cache if it was not disabled\nmanually. The reason is that when the R/W size is more than 1 byte, these\nfunctions assume that the register address is incremented and handle the\ncache accordingly.\n\nConvert FIFO R/W functions to use the regmap _noinc_ versions in order to\nremove the manual cache control which was a workaround when using the\n_raw_ versions. FIFO registers are properly declared as volatile so\ncache will not be used/updated for FIFO accesses.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52488", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52488", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52488", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52488", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52488", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52488" + } + }, + "CVE-2023-52489": { + "affected_versions": "v2.6.12-rc2 to v6.8-rc1", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "mm/sparsemem: fix race in accessing memory_section->usage", + "fixes": "5ec8e8ea8b7783fab150cf86404fc38cb4db8800", + "last_affected_version": "6.7.2", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm/sparsemem: fix race in accessing memory_section->usage\n\nThe below race is observed on a PFN which falls into the device memory\nregion with the system memory configuration where PFN's are such that\n[ZONE_NORMAL ZONE_DEVICE ZONE_NORMAL]. Since normal zone start and end\npfn contains the device memory PFN's as well, the compaction triggered\nwill try on the device memory PFN's too though they end up in NOP(because\npfn_to_online_page() returns NULL for ZONE_DEVICE memory sections). When\nfrom other core, the section mappings are being removed for the\nZONE_DEVICE region, that the PFN in question belongs to, on which\ncompaction is currently being operated is resulting into the kernel crash\nwith CONFIG_SPASEMEM_VMEMAP enabled. The crash logs can be seen at [1].\n\ncompact_zone()\t\t\tmemunmap_pages\n-------------\t\t\t---------------\n__pageblock_pfn_to_page\n ......\n (a)pfn_valid():\n valid_section()//return true\n\t\t\t (b)__remove_pages()->\n\t\t\t\t sparse_remove_section()->\n\t\t\t\t section_deactivate():\n\t\t\t\t [Free the array ms->usage and set\n\t\t\t\t ms->usage = NULL]\n pfn_section_valid()\n [Access ms->usage which\n is NULL]\n\nNOTE: From the above it can be said that the race is reduced to between\nthe pfn_valid()/pfn_section_valid() and the section deactivate with\nSPASEMEM_VMEMAP enabled.\n\nThe commit b943f045a9af(\"mm/sparse: fix kernel crash with\npfn_section_valid check\") tried to address the same problem by clearing\nthe SECTION_HAS_MEM_MAP with the expectation of valid_section() returns\nfalse thus ms->usage is not accessed.\n\nFix this issue by the below steps:\n\na) Clear SECTION_HAS_MEM_MAP before freeing the ->usage.\n\nb) RCU protected read side critical section will either return NULL\n when SECTION_HAS_MEM_MAP is cleared or can successfully access ->usage.\n\nc) Free the ->usage with kfree_rcu() and set ms->usage = NULL. No\n attempt will be made to access ->usage after this as the\n SECTION_HAS_MEM_MAP is cleared thus valid_section() return false.\n\nThanks to David/Pavan for their inputs on this patch.\n\n[1] https://lore.kernel.org/linux-mm/994410bb-89aa-d987-1f50-f514903c55aa@quicinc.com/\n\nOn Snapdragon SoC, with the mentioned memory configuration of PFN's as\n[ZONE_NORMAL ZONE_DEVICE ZONE_NORMAL], we are able to see bunch of\nissues daily while testing on a device farm.\n\nFor this particular issue below is the log. Though the below log is\nnot directly pointing to the pfn_section_valid(){ ms->usage;}, when we\nloaded this dump on T32 lauterbach tool, it is pointing.\n\n[ 540.578056] Unable to handle kernel NULL pointer dereference at\nvirtual address 0000000000000000\n[ 540.578068] Mem abort info:\n[ 540.578070] ESR = 0x0000000096000005\n[ 540.578073] EC = 0x25: DABT (current EL), IL = 32 bits\n[ 540.578077] SET = 0, FnV = 0\n[ 540.578080] EA = 0, S1PTW = 0\n[ 540.578082] FSC = 0x05: level 1 translation fault\n[ 540.578085] Data abort info:\n[ 540.578086] ISV = 0, ISS = 0x00000005\n[ 540.578088] CM = 0, WnR = 0\n[ 540.579431] pstate: 82400005 (Nzcv daif +PAN -UAO +TCO -DIT -SSBSBTYPE=--)\n[ 540.579436] pc : __pageblock_pfn_to_page+0x6c/0x14c\n[ 540.579454] lr : compact_zone+0x994/0x1058\n[ 540.579460] sp : ffffffc03579b510\n[ 540.579463] x29: ffffffc03579b510 x28: 0000000000235800 x27:000000000000000c\n[ 540.579470] x26: 0000000000235c00 x25: 0000000000000068 x24:ffffffc03579b640\n[ 540.579477] x23: 0000000000000001 x22: ffffffc03579b660 x21:0000000000000000\n[ 540.579483] x20: 0000000000235bff x19: ffffffdebf7e3940 x18:ffffffdebf66d140\n[ 540.579489] x17: 00000000739ba063 x16: 00000000739ba063 x15:00000000009f4bff\n[ 540.579495] x14: 0000008000000000 x13: 0000000000000000 x12:0000000000000001\n[ 540.579501] x11: 0000000000000000 x10: 0000000000000000 x9 :ffffff897d2cd440\n[ 540.579507] x8 : 0000000000000000 x7 : 0000000000000000 x6 :ffffffc03579b5b4\n[ 540.579512] x5 : 0000000000027f25 x4 : ffffffc03579b5b8 x3 :0000000000000\n---truncated---", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52489", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52489", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52489", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52489", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52489", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52489" } }, - "CVE-2023-4389": { - "affected_versions": "v5.7-rc1 to v5.18-rc3", - "breaks": "bc44d7c4b2b179c4b74fba208b9908e2ecbc1b4d", - "cmt_msg": "btrfs: fix root ref counts in error handling in btrfs_get_root_ref", - "cvss3": { - "Attack Complexity": "Low", - "Attack Vector": "Local", - "Availability": "High", - "Confidentiality": "High", - "Integrity": "None", - "Privileges Required": "Low", - "Scope": "Unchanged", - "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", - "score": 7.1 - }, - "fixes": "168a2f776b9762f4021421008512dd7ab7474df1", - "last_affected_version": "5.17.3", - "last_modified": "2023-12-06", - "nvd_text": "A flaw was found in btrfs_get_root_ref in fs/btrfs/disk-io.c in the btrfs filesystem in the Linux Kernel due to a double decrement of the reference count. This issue may allow a local attacker with user privilege to crash the system or may lead to leaked internal kernel information.", + "CVE-2023-52490": { + "affected_versions": "v6.3-rc1 to v6.8-rc1", + "breaks": "64c8902ed4418317cd416c566f896bd4a92b2efc", + "cmt_msg": "mm: migrate: fix getting incorrect page mapping during page migration", + "fixes": "d1adb25df7111de83b64655a80b5a135adbded61", + "last_affected_version": "6.7.2", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm: migrate: fix getting incorrect page mapping during page migration\n\nWhen running stress-ng testing, we found below kernel crash after a few hours:\n\nUnable to handle kernel NULL pointer dereference at virtual address 0000000000000000\npc : dentry_name+0xd8/0x224\nlr : pointer+0x22c/0x370\nsp : ffff800025f134c0\n......\nCall trace:\n dentry_name+0xd8/0x224\n pointer+0x22c/0x370\n vsnprintf+0x1ec/0x730\n vscnprintf+0x2c/0x60\n vprintk_store+0x70/0x234\n vprintk_emit+0xe0/0x24c\n vprintk_default+0x3c/0x44\n vprintk_func+0x84/0x2d0\n printk+0x64/0x88\n __dump_page+0x52c/0x530\n dump_page+0x14/0x20\n set_migratetype_isolate+0x110/0x224\n start_isolate_page_range+0xc4/0x20c\n offline_pages+0x124/0x474\n memory_block_offline+0x44/0xf4\n memory_subsys_offline+0x3c/0x70\n device_offline+0xf0/0x120\n ......\n\nAfter analyzing the vmcore, I found this issue is caused by page migration.\nThe scenario is that, one thread is doing page migration, and we will use the\ntarget page's ->mapping field to save 'anon_vma' pointer between page unmap and\npage move, and now the target page is locked and refcount is 1.\n\nCurrently, there is another stress-ng thread performing memory hotplug,\nattempting to offline the target page that is being migrated. It discovers that\nthe refcount of this target page is 1, preventing the offline operation, thus\nproceeding to dump the page. However, page_mapping() of the target page may\nreturn an incorrect file mapping to crash the system in dump_mapping(), since\nthe target page->mapping only saves 'anon_vma' pointer without setting\nPAGE_MAPPING_ANON flag.\n\nThere are seveval ways to fix this issue:\n(1) Setting the PAGE_MAPPING_ANON flag for target page's ->mapping when saving\n'anon_vma', but this can confuse PageAnon() for PFN walkers, since the target\npage has not built mappings yet.\n(2) Getting the page lock to call page_mapping() in __dump_page() to avoid crashing\nthe system, however, there are still some PFN walkers that call page_mapping()\nwithout holding the page lock, such as compaction.\n(3) Using target page->private field to save the 'anon_vma' pointer and 2 bits\npage state, just as page->mapping records an anonymous page, which can remove\nthe page_mapping() impact for PFN walkers and also seems a simple way.\n\nSo I choose option 3 to fix this issue, and this can also fix other potential\nissues for PFN walkers, such as compaction.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-4389", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-4389", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-4389", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-4389", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-4389", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-4389" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52490", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52490", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52490", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52490", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52490", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52490" } }, - "CVE-2023-4394": { - "affected_versions": "v5.16-rc1 to v6.0-rc3", - "breaks": "faa775c41d655a4786e9d53cb075a77bb5a75f66", - "cmt_msg": "btrfs: fix possible memory leak in btrfs_get_dev_args_from_path()", - "cvss3": { - "Attack Complexity": "Low", - "Attack Vector": "Local", - "Availability": "High", - "Confidentiality": "High", - "Integrity": "None", - "Privileges Required": "High", - "Scope": "Unchanged", - "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H", - "score": 6.0 - }, - "fixes": "9ea0106a7a3d8116860712e3f17cd52ce99f6707", - "last_affected_version": "5.19.5", - "last_modified": "2023-12-06", - "nvd_text": "A use-after-free flaw was found in btrfs_get_dev_args_from_path in fs/btrfs/volumes.c in btrfs file-system in the Linux Kernel. This flaw allows a local attacker with special privileges to cause a system crash or leak internal kernel information", + "CVE-2023-52491": { + "affected_versions": "v4.12-rc1 to v6.8-rc1", + "breaks": "b2f0d2724ba477d326e9d654d4db1c93e98f8b93", + "cmt_msg": "media: mtk-jpeg: Fix use after free bug due to error path handling in mtk_jpeg_dec_device_run", + "fixes": "206c857dd17d4d026de85866f1b5f0969f2a109e", + "last_affected_version": "6.7.2", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: mtk-jpeg: Fix use after free bug due to error path handling in mtk_jpeg_dec_device_run\n\nIn mtk_jpeg_probe, &jpeg->job_timeout_work is bound with\nmtk_jpeg_job_timeout_work.\n\nIn mtk_jpeg_dec_device_run, if error happens in\nmtk_jpeg_set_dec_dst, it will finally start the worker while\nmark the job as finished by invoking v4l2_m2m_job_finish.\n\nThere are two methods to trigger the bug. If we remove the\nmodule, it which will call mtk_jpeg_remove to make cleanup.\nThe possible sequence is as follows, which will cause a\nuse-after-free bug.\n\nCPU0 CPU1\nmtk_jpeg_dec_... |\n start worker\t |\n |mtk_jpeg_job_timeout_work\nmtk_jpeg_remove |\n v4l2_m2m_release |\n kfree(m2m_dev); |\n |\n | v4l2_m2m_get_curr_priv\n | m2m_dev->curr_ctx //use\n\nIf we close the file descriptor, which will call mtk_jpeg_release,\nit will have a similar sequence.\n\nFix this bug by starting timeout worker only if started jpegdec worker\nsuccessfully. Then v4l2_m2m_job_finish will only be called in\neither mtk_jpeg_job_timeout_work or mtk_jpeg_dec_device_run.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52491", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52491", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52491", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52491", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52491", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52491" + } + }, + "CVE-2023-52492": { + "affected_versions": "v5.6-rc1 to v6.8-rc1", + "breaks": "d2fb0a0438384fee08a418025f743913020033ce", + "cmt_msg": "dmaengine: fix NULL pointer in channel unregistration function", + "fixes": "f5c24d94512f1b288262beda4d3dcb9629222fc7", + "last_affected_version": "6.7.2", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndmaengine: fix NULL pointer in channel unregistration function\n\n__dma_async_device_channel_register() can fail. In case of failure,\nchan->local is freed (with free_percpu()), and chan->local is nullified.\nWhen dma_async_device_unregister() is called (because of managed API or\nintentionally by DMA controller driver), channels are unconditionally\nunregistered, leading to this NULL pointer:\n[ 1.318693] Unable to handle kernel NULL pointer dereference at virtual address 00000000000000d0\n[...]\n[ 1.484499] Call trace:\n[ 1.486930] device_del+0x40/0x394\n[ 1.490314] device_unregister+0x20/0x7c\n[ 1.494220] __dma_async_device_channel_unregister+0x68/0xc0\n\nLook at dma_async_device_register() function error path, channel device\nunregistration is done only if chan->local is not NULL.\n\nThen add the same condition at the beginning of\n__dma_async_device_channel_unregister() function, to avoid NULL pointer\nissue whatever the API used to reach this function.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52492", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52492", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52492", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52492", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52492", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52492" + } + }, + "CVE-2023-52493": { + "affected_versions": "v5.7-rc1 to v6.8-rc1", + "breaks": "1d3173a3bae7039b765a0956e3e4bf846dbaacb8", + "cmt_msg": "bus: mhi: host: Drop chan lock before queuing buffers", + "fixes": "01bd694ac2f682fb8017e16148b928482bc8fa4b", + "last_affected_version": "6.7.2", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbus: mhi: host: Drop chan lock before queuing buffers\n\nEnsure read and write locks for the channel are not taken in succession by\ndropping the read lock from parse_xfer_event() such that a callback given\nto client can potentially queue buffers and acquire the write lock in that\nprocess. Any queueing of buffers should be done without channel read lock\nacquired as it can result in multiple locks and a soft lockup.\n\n[mani: added fixes tag and cc'ed stable]", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-4394", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-4394", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-4394", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-4394", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-4394", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-4394" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52493", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52493", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52493", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52493", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52493", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52493" } }, - "CVE-2023-44466": { - "affected_versions": "v5.11-rc1 to v6.5-rc2", - "breaks": "cd1a677cad994021b19665ed476aea63f5d54f31", - "cmt_msg": "libceph: harden msgr2.1 frame segment length checks", - "cvss3": { - "Attack Complexity": "Low", - "Attack Vector": "Network", - "Availability": "High", - "Confidentiality": "High", - "Integrity": "High", - "Privileges Required": "Low", - "Scope": "Unchanged", - "User Interaction": "None", - "raw": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", - "score": 8.8 - }, - "fixes": "a282a2f10539dce2aa619e71e1817570d557fc97", - "last_affected_version": "6.4.4", - "last_modified": "2023-12-06", - "nvd_text": "An issue was discovered in net/ceph/messenger_v2.c in the Linux kernel before 6.4.5. There is an integer signedness error, leading to a buffer overflow and remote code execution via HELLO or one of the AUTH frames. This occurs because of an untrusted length taken from a TCP packet in ceph_decode_32.", + "CVE-2023-52494": { + "affected_versions": "v5.13-rc1 to v6.8-rc1", + "breaks": "ec32332df7645e0ba463a08d483fe97665167071", + "cmt_msg": "bus: mhi: host: Add alignment check for event ring read pointer", + "fixes": "eff9704f5332a13b08fbdbe0f84059c9e7051d5f", + "last_affected_version": "6.7.2", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbus: mhi: host: Add alignment check for event ring read pointer\n\nThough we do check the event ring read pointer by \"is_valid_ring_ptr\"\nto make sure it is in the buffer range, but there is another risk the\npointer may be not aligned. Since we are expecting event ring elements\nare 128 bits(struct mhi_ring_element) aligned, an unaligned read pointer\ncould lead to multiple issues like DoS or ring buffer memory corruption.\n\nSo add a alignment check for event ring read pointer.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-44466", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-44466", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-44466", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-44466", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-44466", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-44466" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52494", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52494", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52494", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52494", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52494", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52494" } }, - "CVE-2023-4459": { - "affected_versions": "v2.6.32-rc5 to v5.18", - "breaks": "d1a890fa37f27d6aca3abc6e25e4148efc3223a6", - "cmt_msg": "net: vmxnet3: fix possible NULL pointer dereference in vmxnet3_rq_cleanup()", - "cvss3": { - "Attack Complexity": "Low", - "Attack Vector": "Local", - "Availability": "High", - "Confidentiality": "None", - "Integrity": "None", - "Privileges Required": "Low", - "Scope": "Unchanged", - "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", - "score": 5.5 - }, - "fixes": "edf410cb74dc612fd47ef5be319c5a0bcd6e6ccd", - "last_affected_version": "5.17", - "last_modified": "2023-12-06", - "nvd_text": "A NULL pointer dereference flaw was found in vmxnet3_rq_cleanup in drivers/net/vmxnet3/vmxnet3_drv.c in the networking sub-component in vmxnet3 in the Linux Kernel. This issue may allow a local attacker with normal user privilege to cause a denial of service due to a missing sanity check during cleanup.", + "CVE-2023-52495": { + "affected_versions": "v6.3-rc1 to v6.8-rc1", + "breaks": "080b4e24852b1d5b66929f69344e6c3eeb963941", + "cmt_msg": "soc: qcom: pmic_glink_altmode: fix port sanity check", + "fixes": "c4fb7d2eac9ff9bfc35a2e4d40c7169a332416e0", + "last_affected_version": "6.7.2", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsoc: qcom: pmic_glink_altmode: fix port sanity check\n\nThe PMIC GLINK altmode driver currently supports at most two ports.\n\nFix the incomplete port sanity check on notifications to avoid\naccessing and corrupting memory beyond the port array if we ever get a\nnotification for an unsupported port.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52495", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52495", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52495", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52495", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52495", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52495" + } + }, + "CVE-2023-52497": { + "affected_versions": "v5.3-rc1 to v6.8-rc1", + "breaks": "0ffd71bcc3a03ebb3551661a36052488369c4de9", + "cmt_msg": "erofs: fix lz4 inplace decompression", + "fixes": "3c12466b6b7bf1e56f9b32c366a3d83d87afb4de", + "last_affected_version": "6.7.2", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nerofs: fix lz4 inplace decompression\n\nCurrently EROFS can map another compressed buffer for inplace\ndecompression, that was used to handle the cases that some pages of\ncompressed data are actually not in-place I/O.\n\nHowever, like most simple LZ77 algorithms, LZ4 expects the compressed\ndata is arranged at the end of the decompressed buffer and it\nexplicitly uses memmove() to handle overlapping:\n __________________________________________________________\n |_ direction of decompression --> ____ |_ compressed data _|\n\nAlthough EROFS arranges compressed data like this, it typically maps two\nindividual virtual buffers so the relative order is uncertain.\nPreviously, it was hardly observed since LZ4 only uses memmove() for\nshort overlapped literals and x86/arm64 memmove implementations seem to\ncompletely cover it up and they don't have this issue. Juhyung reported\nthat EROFS data corruption can be found on a new Intel x86 processor.\nAfter some analysis, it seems that recent x86 processors with the new\nFSRM feature expose this issue with \"rep movsb\".\n\nLet's strictly use the decompressed buffer for lz4 inplace\ndecompression for now. Later, as an useful improvement, we could try\nto tie up these two buffers together in the correct order.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-4459", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-4459", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-4459", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-4459", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-4459", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-4459" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52497", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52497", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52497", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52497", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52497", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52497" } }, - "CVE-2023-4563": { - "affected_versions": "v5.6-rc1 to v6.5-rc6", - "breaks": "3c4287f62044a90e73a561aa05fc46e62da173da", - "cmt_msg": "netfilter: nf_tables: don't skip expired elements during walk", - "fixes": "24138933b97b055d486e8064b4a1721702442a9b", - "last_affected_version": "6.4.10", - "last_modified": "2023-12-06", - "nvd_text": "Rejected reason: This was assigned as a duplicate of CVE-2023-4244.", + "CVE-2023-52498": { + "affected_versions": "v2.6.12-rc2 to v6.8-rc1", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "PM: sleep: Fix possible deadlocks in core system-wide PM code", + "fixes": "7839d0078e0d5e6cc2fa0b0dfbee71de74f1e557", + "last_affected_version": "6.7.2", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nPM: sleep: Fix possible deadlocks in core system-wide PM code\n\nIt is reported that in low-memory situations the system-wide resume core\ncode deadlocks, because async_schedule_dev() executes its argument\nfunction synchronously if it cannot allocate memory (and not only in\nthat case) and that function attempts to acquire a mutex that is already\nheld. Executing the argument function synchronously from within\ndpm_async_fn() may also be problematic for ordering reasons (it may\ncause a consumer device's resume callback to be invoked before a\nrequisite supplier device's one, for example).\n\nAddress this by changing the code in question to use\nasync_schedule_dev_nocall() for scheduling the asynchronous\nexecution of device suspend and resume functions and to directly\nrun them synchronously if async_schedule_dev_nocall() returns false.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52498", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52498", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52498", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52498", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52498", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52498" + } + }, + "CVE-2023-52499": { + "affected_versions": "v5.12-rc1-dontuse to v6.6-rc6", + "breaks": "6f76a01173ccaa363739f913394d4e138d92d718", + "cmt_msg": "powerpc/47x: Fix 47x syscall return crash", + "fixes": "f0eee815babed70a749d2496a7678be5b45b4c14", + "last_affected_version": "6.5.7", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\npowerpc/47x: Fix 47x syscall return crash\n\nEddie reported that newer kernels were crashing during boot on his 476\nFSP2 system:\n\n kernel tried to execute user page (b7ee2000) - exploit attempt? (uid: 0)\n BUG: Unable to handle kernel instruction fetch\n Faulting instruction address: 0xb7ee2000\n Oops: Kernel access of bad area, sig: 11 [#1]\n BE PAGE_SIZE=4K FSP-2\n Modules linked in:\n CPU: 0 PID: 61 Comm: mount Not tainted 6.1.55-d23900f.ppcnf-fsp2 #1\n Hardware name: ibm,fsp2 476fpe 0x7ff520c0 FSP-2\n NIP:\u00a0 b7ee2000 LR: 8c008000 CTR: 00000000\n REGS: bffebd83 TRAP: 0400\u00a0\u00a0 Not tainted (6.1.55-d23900f.ppcnf-fs p2)\n MSR:\u00a0 00000030 \u00a0 CR: 00001000\u00a0 XER: 20000000\n GPR00: c00110ac bffebe63 bffebe7e bffebe88 8c008000 00001000 00000d12 b7ee2000\n GPR08: 00000033 00000000 00000000 c139df10 48224824 1016c314 10160000 00000000\n GPR16: 10160000 10160000 00000008 00000000 10160000 00000000 10160000 1017f5b0\n GPR24: 1017fa50 1017f4f0 1017fa50 1017f740 1017f630 00000000 00000000 1017f4f0\n NIP [b7ee2000] 0xb7ee2000\n LR [8c008000] 0x8c008000\n Call Trace:\n Instruction dump:\n XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX\n XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX\n ---[ end trace 0000000000000000 ]---\n\nThe problem is in ret_from_syscall where the check for\nicache_44x_need_flush is done. When the flush is needed the code jumps\nout-of-line to do the flush, and then intends to jump back to continue\nthe syscall return.\n\nHowever the branch back to label 1b doesn't return to the correct\nlocation, instead branching back just prior to the return to userspace,\ncausing bogus register values to be used by the rfi.\n\nThe breakage was introduced by commit 6f76a01173cc\n(\"powerpc/syscall: implement system call entry/exit logic in C for PPC32\") which\ninadvertently removed the \"1\" label and reused it elsewhere.\n\nFix it by adding named local labels in the correct locations. Note that\nthe return label needs to be outside the ifdef so that CONFIG_PPC_47x=n\ncompiles.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-4563", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-4563", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-4563", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-4563", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-4563", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-4563" - }, - "rejected": true + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52499", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52499", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52499", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52499", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52499", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52499" + } }, - "CVE-2023-4569": { - "affected_versions": "v5.13-rc1 to v6.5-rc7", - "breaks": "aaa31047a6d25da0fa101da1ed544e1247949b40", - "cmt_msg": "netfilter: nf_tables: deactivate catchall elements in next generation", - "cvss3": { - "Attack Complexity": "Low", - "Attack Vector": "Local", - "Availability": "High", - "Confidentiality": "None", - "Integrity": "None", - "Privileges Required": "Low", - "Scope": "Unchanged", - "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", - "score": 5.5 - }, - "fixes": "90e5b3462efa37b8bba82d7c4e63683856e188af", - "last_affected_version": "6.4.11", - "last_modified": "2023-12-06", - "nvd_text": "A memory leak flaw was found in nft_set_catchall_flush in net/netfilter/nf_tables_api.c in the Linux Kernel. This issue may allow a local attacker to cause double-deactivations of catchall elements, which can result in a memory leak.", + "CVE-2023-52500": { + "affected_versions": "v2.6.12-rc2 to v6.6-rc2", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "scsi: pm80xx: Avoid leaking tags when processing OPC_INB_SET_CONTROLLER_CONFIG command", + "fixes": "c13e7331745852d0dd7c35eabbe181cbd5b01172", + "last_affected_version": "6.5.5", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: pm80xx: Avoid leaking tags when processing OPC_INB_SET_CONTROLLER_CONFIG command\n\nTags allocated for OPC_INB_SET_CONTROLLER_CONFIG command need to be freed\nwhen we receive the response.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-4569", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-4569", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-4569", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-4569", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-4569", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-4569" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52500", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52500", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52500", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52500", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52500", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52500" } }, - "CVE-2023-45862": { - "affected_versions": "v3.1-rc1 to v6.3-rc1", - "breaks": "33842cedfc33ee907b2a702f321a26f7c0bf0aaa", - "cmt_msg": "USB: ene_usb6250: Allocate enough memory for full object", - "cvss3": { - "Attack Complexity": "Low", - "Attack Vector": "Network", - "Availability": "High", - "Confidentiality": "None", - "Integrity": "None", - "Privileges Required": "None", - "Scope": "Unchanged", - "User Interaction": "None", - "raw": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", - "score": 7.5 - }, - "fixes": "ce33e64c1788912976b61314b56935abd4bc97ef", - "last_affected_version": "6.2.4", - "last_modified": "2023-12-06", - "nvd_text": "An issue was discovered in drivers/usb/storage/ene_ub6250.c for the ENE UB6250 reader driver in the Linux kernel before 6.2.5. An object could potentially extend beyond the end of an allocation.", + "CVE-2023-52501": { + "affected_versions": "v2.6.12-rc2 to v6.6-rc2", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "ring-buffer: Do not attempt to read past \"commit\"", + "fixes": "95a404bd60af6c4d9d8db01ad14fe8957ece31ca", + "last_affected_version": "6.5.5", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nring-buffer: Do not attempt to read past \"commit\"\n\nWhen iterating over the ring buffer while the ring buffer is active, the\nwriter can corrupt the reader. There's barriers to help detect this and\nhandle it, but that code missed the case where the last event was at the\nvery end of the page and has only 4 bytes left.\n\nThe checks to detect the corruption by the writer to reads needs to see the\nlength of the event. If the length in the first 4 bytes is zero then the\nlength is stored in the second 4 bytes. But if the writer is in the process\nof updating that code, there's a small window where the length in the first\n4 bytes could be zero even though the length is only 4 bytes. That will\ncause rb_event_length() to read the next 4 bytes which could happen to be off the\nallocated page.\n\nTo protect against this, fail immediately if the next event pointer is\nless than 8 bytes from the end of the commit (last byte of data), as all\nevents must be a minimum of 8 bytes anyway.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52501", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52501", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52501", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52501", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52501", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52501" + } + }, + "CVE-2023-52502": { + "affected_versions": "v3.6-rc1 to v6.6-rc6", + "breaks": "8f50020ed9b81ba909ce9573f9d05263cdebf502", + "cmt_msg": "net: nfc: fix races in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn()", + "fixes": "31c07dffafce914c1d1543c135382a11ff058d93", + "last_affected_version": "6.5.7", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: nfc: fix races in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn()\n\nSili Luo reported a race in nfc_llcp_sock_get(), leading to UAF.\n\nGetting a reference on the socket found in a lookup while\nholding a lock should happen before releasing the lock.\n\nnfc_llcp_sock_get_sn() has a similar problem.\n\nFinally nfc_llcp_recv_snl() needs to make sure the socket\nfound by nfc_llcp_sock_from_sn() does not disappear.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52502", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52502", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52502", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52502", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52502", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52502" + } + }, + "CVE-2023-52503": { + "affected_versions": "v5.6-rc1 to v6.6-rc6", + "breaks": "757cc3e9ff1d72d014096399d6e2bf03974d9da1", + "cmt_msg": "tee: amdtee: fix use-after-free vulnerability in amdtee_close_session", + "fixes": "f4384b3e54ea813868bb81a861bf5b2406e15d8f", + "last_affected_version": "6.5.7", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntee: amdtee: fix use-after-free vulnerability in amdtee_close_session\n\nThere is a potential race condition in amdtee_close_session that may\ncause use-after-free in amdtee_open_session. For instance, if a session\nhas refcount == 1, and one thread tries to free this session via:\n\n kref_put(&sess->refcount, destroy_session);\n\nthe reference count will get decremented, and the next step would be to\ncall destroy_session(). However, if in another thread,\namdtee_open_session() is called before destroy_session() has completed\nexecution, alloc_session() may return 'sess' that will be freed up\nlater in destroy_session() leading to use-after-free in\namdtee_open_session.\n\nTo fix this issue, treat decrement of sess->refcount and removal of\n'sess' from session list in destroy_session() as a critical section, so\nthat it is executed atomically.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52503", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52503", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52503", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52503", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52503", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52503" + } + }, + "CVE-2023-52504": { + "affected_versions": "v4.17-rc1 to v6.6-rc6", + "breaks": "6657fca06e3ffab8d0b3f9d8b397f5ee498952d7", + "cmt_msg": "x86/alternatives: Disable KASAN in apply_alternatives()", + "fixes": "d35652a5fc9944784f6f50a5c979518ff8dacf61", + "last_affected_version": "6.5.7", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nx86/alternatives: Disable KASAN in apply_alternatives()\n\nFei has reported that KASAN triggers during apply_alternatives() on\na 5-level paging machine:\n\n\tBUG: KASAN: out-of-bounds in rcu_is_watching()\n\tRead of size 4 at addr ff110003ee6419a0 by task swapper/0/0\n\t...\n\t__asan_load4()\n\trcu_is_watching()\n\ttrace_hardirqs_on()\n\ttext_poke_early()\n\tapply_alternatives()\n\t...\n\nOn machines with 5-level paging, cpu_feature_enabled(X86_FEATURE_LA57)\ngets patched. It includes KASAN code, where KASAN_SHADOW_START depends on\n__VIRTUAL_MASK_SHIFT, which is defined with cpu_feature_enabled().\n\nKASAN gets confused when apply_alternatives() patches the\nKASAN_SHADOW_START users. A test patch that makes KASAN_SHADOW_START\nstatic, by replacing __VIRTUAL_MASK_SHIFT with 56, works around the issue.\n\nFix it for real by disabling KASAN while the kernel is patching alternatives.\n\n[ mingo: updated the changelog ]", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52504", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52504", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52504", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52504", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52504", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52504" + } + }, + "CVE-2023-52505": { + "affected_versions": "v5.18-rc1 to v6.6-rc6", + "breaks": "8f73b37cf3fbda67ea1e579c3b5785da4e7aa2e3", + "cmt_msg": "phy: lynx-28g: serialize concurrent phy_set_mode_ext() calls to shared registers", + "fixes": "139ad1143151a07be93bf741d4ea7c89e59f89ce", + "last_affected_version": "6.5.7", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nphy: lynx-28g: serialize concurrent phy_set_mode_ext() calls to shared registers\n\nThe protocol converter configuration registers PCC8, PCCC, PCCD\n(implemented by the driver), as well as others, control protocol\nconverters from multiple lanes (each represented as a different\nstruct phy). So, if there are simultaneous calls to phy_set_mode_ext()\nto lanes sharing the same PCC register (either for the \"old\" or for the\n\"new\" protocol), corruption of the values programmed to hardware is\npossible, because lynx_28g_rmw() has no locking.\n\nAdd a spinlock in the struct lynx_28g_priv shared by all lanes, and take\nthe global spinlock from the phy_ops :: set_mode() implementation. There\nare no other callers which modify PCC registers.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-45862", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-45862", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-45862", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-45862", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-45862", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-45862" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52505", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52505", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52505", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52505", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52505", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52505" } }, - "CVE-2023-45863": { - "affected_versions": "v2.6.12-rc2 to v6.3-rc1", + "CVE-2023-52506": { + "affected_versions": "v2.6.12-rc2 to v6.6-rc3", "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", - "cmt_msg": "kobject: Fix slab-out-of-bounds in fill_kobj_path()", - "cvss3": { - "Attack Complexity": "High", - "Attack Vector": "Local", - "Availability": "High", - "Confidentiality": "High", - "Integrity": "High", - "Privileges Required": "High", - "Scope": "Unchanged", - "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", - "score": 6.4 - }, - "fixes": "3bb2a01caa813d3a1845d378bbe4169ef280d394", - "last_affected_version": "6.2.2", - "last_modified": "2023-12-06", - "nvd_text": "An issue was discovered in lib/kobject.c in the Linux kernel before 6.2.3. With root access, an attacker can trigger a race condition that results in a fill_kobj_path out-of-bounds write.", + "cmt_msg": "LoongArch: Set all reserved memblocks on Node#0 at initialization", + "fixes": "b795fb9f5861ee256070d59e33130980a01fadd7", + "last_affected_version": "6.5.5", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nLoongArch: Set all reserved memblocks on Node#0 at initialization\n\nAfter commit 61167ad5fecdea (\"mm: pass nid to reserve_bootmem_region()\")\nwe get a panic if DEFERRED_STRUCT_PAGE_INIT is enabled:\n\n[ 0.000000] CPU 0 Unable to handle kernel paging request at virtual address 0000000000002b82, era == 90000000040e3f28, ra == 90000000040e3f18\n[ 0.000000] Oops[#1]:\n[ 0.000000] CPU: 0 PID: 0 Comm: swapper Not tainted 6.5.0+ #733\n[ 0.000000] pc 90000000040e3f28 ra 90000000040e3f18 tp 90000000046f4000 sp 90000000046f7c90\n[ 0.000000] a0 0000000000000001 a1 0000000000200000 a2 0000000000000040 a3 90000000046f7ca0\n[ 0.000000] a4 90000000046f7ca4 a5 0000000000000000 a6 90000000046f7c38 a7 0000000000000000\n[ 0.000000] t0 0000000000000002 t1 9000000004b00ac8 t2 90000000040e3f18 t3 90000000040f0800\n[ 0.000000] t4 00000000000f0000 t5 80000000ffffe07e t6 0000000000000003 t7 900000047fff5e20\n[ 0.000000] t8 aaaaaaaaaaaaaaab u0 0000000000000018 s9 0000000000000000 s0 fffffefffe000000\n[ 0.000000] s1 0000000000000000 s2 0000000000000080 s3 0000000000000040 s4 0000000000000000\n[ 0.000000] s5 0000000000000000 s6 fffffefffe000000 s7 900000000470b740 s8 9000000004ad4000\n[ 0.000000] ra: 90000000040e3f18 reserve_bootmem_region+0xec/0x21c\n[ 0.000000] ERA: 90000000040e3f28 reserve_bootmem_region+0xfc/0x21c\n[ 0.000000] CRMD: 000000b0 (PLV0 -IE -DA +PG DACF=CC DACM=CC -WE)\n[ 0.000000] PRMD: 00000000 (PPLV0 -PIE -PWE)\n[ 0.000000] EUEN: 00000000 (-FPE -SXE -ASXE -BTE)\n[ 0.000000] ECFG: 00070800 (LIE=11 VS=7)\n[ 0.000000] ESTAT: 00010800 [PIL] (IS=11 ECode=1 EsubCode=0)\n[ 0.000000] BADV: 0000000000002b82\n[ 0.000000] PRID: 0014d000 (Loongson-64bit, Loongson-3A6000)\n[ 0.000000] Modules linked in:\n[ 0.000000] Process swapper (pid: 0, threadinfo=(____ptrval____), task=(____ptrval____))\n[ 0.000000] Stack : 0000000000000000 9000000002eb5430 0000003a00000020 90000000045ccd00\n[ 0.000000] 900000000470e000 90000000002c1918 0000000000000000 9000000004110780\n[ 0.000000] 00000000fe6c0000 0000000480000000 9000000004b4e368 9000000004110748\n[ 0.000000] 0000000000000000 900000000421ca84 9000000004620000 9000000004564970\n[ 0.000000] 90000000046f7d78 9000000002cc9f70 90000000002c1918 900000000470e000\n[ 0.000000] 9000000004564970 90000000040bc0e0 90000000046f7d78 0000000000000000\n[ 0.000000] 0000000000004000 90000000045ccd00 0000000000000000 90000000002c1918\n[ 0.000000] 90000000002c1900 900000000470b700 9000000004b4df78 9000000004620000\n[ 0.000000] 90000000046200a8 90000000046200a8 0000000000000000 9000000004218b2c\n[ 0.000000] 9000000004270008 0000000000000001 0000000000000000 90000000045ccd00\n[ 0.000000] ...\n[ 0.000000] Call Trace:\n[ 0.000000] [<90000000040e3f28>] reserve_bootmem_region+0xfc/0x21c\n[ 0.000000] [<900000000421ca84>] memblock_free_all+0x114/0x350\n[ 0.000000] [<9000000004218b2c>] mm_core_init+0x138/0x3cc\n[ 0.000000] [<9000000004200e38>] start_kernel+0x488/0x7a4\n[ 0.000000] [<90000000040df0d8>] kernel_entry+0xd8/0xdc\n[ 0.000000]\n[ 0.000000] Code: 02eb21ad 00410f4c 380c31ac <262b818d> 6800b70d 02c1c196 0015001c 57fe4bb1 260002cd\n\nThe reason is early memblock_reserve() in memblock_init() set node id to\nMAX_NUMNODES, making NODE_DATA(nid) a NULL dereference in the call chain\nreserve_bootmem_region() -> init_reserved_page(). After memblock_init(),\nthose late calls of memblock_reserve() operate on subregions of memblock\n.memory regions. As a result, these reserved regions will be set to the\ncorrect node at the first iteration of memmap_init_reserved_pages().\n\nSo set all reserved memblocks on Node#0 at initialization can avoid this\npanic.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-45863", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-45863", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-45863", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-45863", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-45863", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-45863" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52506", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52506", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52506", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52506", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52506", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52506" } }, - "CVE-2023-45871": { - "affected_versions": "v3.4-rc1 to v6.6-rc1", - "breaks": "89eaefb61dc9170237d95b844dd357338fc7225d", - "cmt_msg": "igb: set max size RX buffer when store bad packet is enabled", - "cvss3": { - "Attack Complexity": "Low", - "Attack Vector": "Network", - "Availability": "High", - "Confidentiality": "High", - "Integrity": "High", - "Privileges Required": "None", - "Scope": "Unchanged", - "User Interaction": "None", - "raw": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", - "score": 9.8 - }, - "fixes": "bb5ed01cd2428cd25b1c88a3a9cba87055eb289f", - "last_affected_version": "6.5.2", - "last_modified": "2023-12-06", - "nvd_text": "An issue was discovered in drivers/net/ethernet/intel/igb/igb_main.c in the IGB driver in the Linux kernel before 6.5.3. A buffer size may not be adequate for frames larger than the MTU.", + "CVE-2023-52507": { + "affected_versions": "v3.2-rc1 to v6.6-rc6", + "breaks": "6a2968aaf50c7a22fced77a5e24aa636281efca8", + "cmt_msg": "nfc: nci: assert requested protocol is valid", + "fixes": "354a6e707e29cb0c007176ee5b8db8be7bd2dee0", + "last_affected_version": "6.5.7", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnfc: nci: assert requested protocol is valid\n\nThe protocol is used in a bit mask to determine if the protocol is\nsupported. Assert the provided protocol is less than the maximum\ndefined so it doesn't potentially perform a shift-out-of-bounds and\nprovide a clearer error for undefined protocols vs unsupported ones.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-45871", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-45871", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-45871", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-45871", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-45871", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-45871" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52507", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52507", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52507", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52507", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52507", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52507" } }, - "CVE-2023-45898": { - "affected_versions": "v6.5-rc1 to v6.6-rc1", - "breaks": "2a69c450083db164596c75c0f5b4d9c4c0e18eba", - "cmt_msg": "ext4: fix slab-use-after-free in ext4_es_insert_extent()", - "cvss3": { - "Attack Complexity": "Low", - "Attack Vector": "Local", - "Availability": "High", - "Confidentiality": "High", - "Integrity": "High", - "Privileges Required": "Low", - "Scope": "Unchanged", - "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", - "score": 7.8 - }, - "fixes": "768d612f79822d30a1e7d132a4d4b05337ce42ec", - "last_affected_version": "6.5.3", - "last_modified": "2023-12-06", - "nvd_text": "The Linux kernel before 6.5.4 has an es1 use-after-free in fs/ext4/extents_status.c, related to ext4_es_insert_extent.", + "CVE-2023-52508": { + "affected_versions": "v2.6.12-rc2 to v6.6-rc2", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "nvme-fc: Prevent null pointer dereference in nvme_fc_io_getuuid()", + "fixes": "8ae5b3a685dc59a8cf7ccfe0e850999ba9727a3c", + "last_affected_version": "6.5.5", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvme-fc: Prevent null pointer dereference in nvme_fc_io_getuuid()\n\nThe nvme_fc_fcp_op structure describing an AEN operation is initialized with a\nnull request structure pointer. An FC LLDD may make a call to\nnvme_fc_io_getuuid passing a pointer to an nvmefc_fcp_req for an AEN operation.\n\nAdd validation of the request structure pointer before dereference.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-45898", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-45898", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-45898", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-45898", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-45898", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-45898" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52508", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52508", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52508", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52508", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52508", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52508" } }, - "CVE-2023-4610": { - "affected_versions": "v6.4-rc1 to v6.4", - "breaks": "f95bdb700bc6bb74e1199b1f5f90c613e152cfa7", - "cmt_msg": "Revert \"mm: vmscan: make global slab shrink lockless\"", - "fixes": "71c3ad65fabec9620d3f548b2da948c79c7ad9d5", - "last_affected_version": "6.3", - "last_modified": "2024-01-15", - "nvd_text": "Rejected reason: The SRCU code was added in upstream kernel v6.4-rc1 and removed before v6.4. This bug only existed in development kernels. Please see https://lore.kernel.org/all/ZTKVfoQZplpB8rki@casper.infradead.org and https://bugzilla.suse.com/show_bug.cgi?id=1215932 for more information.", + "CVE-2023-52509": { + "affected_versions": "unk to v6.6-rc6", + "breaks": "", + "cmt_msg": "ravb: Fix use-after-free issue in ravb_tx_timeout_work()", + "fixes": "3971442870713de527684398416970cf025b4f89", + "last_affected_version": "6.5.7", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nravb: Fix use-after-free issue in ravb_tx_timeout_work()\n\nThe ravb_stop() should call cancel_work_sync(). Otherwise,\nravb_tx_timeout_work() is possible to use the freed priv after\nravb_remove() was called like below:\n\nCPU0\t\t\tCPU1\n\t\t\travb_tx_timeout()\nravb_remove()\nunregister_netdev()\nfree_netdev(ndev)\n// free priv\n\t\t\travb_tx_timeout_work()\n\t\t\t// use priv\n\nunregister_netdev() will call .ndo_stop() so that ravb_stop() is\ncalled. And, after phy_stop() is called, netif_carrier_off()\nis also called. So that .ndo_tx_timeout() will not be called\nafter phy_stop().", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-4610", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-4610", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-4610", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-4610", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-4610", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-4610" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52509", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52509", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52509", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52509", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52509", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52509" } }, - "CVE-2023-4611": { - "affected_versions": "v6.4-rc1 to v6.5-rc4", - "breaks": "5e31275cc997f8ec5d9e8d65fe9840ebed89db19", - "cmt_msg": "mm/mempolicy: Take VMA lock before replacing policy", - "cvss3": { - "Attack Complexity": "High", - "Attack Vector": "Local", - "Availability": "High", - "Confidentiality": "High", - "Integrity": "None", - "Privileges Required": "Low", - "Scope": "Unchanged", - "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H", - "score": 6.3 - }, - "fixes": "6c21e066f9256ea1df6f88768f6ae1080b7cf509", - "last_affected_version": "6.4.7", - "last_modified": "2023-12-06", - "nvd_text": "A use-after-free flaw was found in mm/mempolicy.c in the memory management subsystem in the Linux Kernel. This issue is caused by a race between mbind() and VMA-locked page fault, and may allow a local attacker to crash the system or lead to a kernel information leak.", + "CVE-2023-52510": { + "affected_versions": "v4.12-rc1 to v6.6-rc6", + "breaks": "ded845a781a578dfb0b5b2c138e5a067aa3b1242", + "cmt_msg": "ieee802154: ca8210: Fix a potential UAF in ca8210_probe", + "fixes": "f990874b1c98fe8e57ee9385669f501822979258", + "last_affected_version": "6.5.7", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nieee802154: ca8210: Fix a potential UAF in ca8210_probe\n\nIf of_clk_add_provider() fails in ca8210_register_ext_clock(),\nit calls clk_unregister() to release priv->clk and returns an\nerror. However, the caller ca8210_probe() then calls ca8210_remove(),\nwhere priv->clk is freed again in ca8210_unregister_ext_clock(). In\nthis case, a use-after-free may happen in the second time we call\nclk_unregister().\n\nFix this by removing the first clk_unregister(). Also, priv->clk could\nbe an error code on failure of clk_register_fixed_rate(). Use\nIS_ERR_OR_NULL to catch this case in ca8210_unregister_ext_clock().", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-4611", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-4611", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-4611", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-4611", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-4611", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-4611" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52510", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52510", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52510", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52510", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52510", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52510" } }, - "CVE-2023-4622": { - "affected_versions": "v4.2-rc1 to v6.5-rc1", - "breaks": "869e7c62486ec0e170a9771acaa251d1a33b5871", - "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES", - "cvss3": { - "Attack Complexity": "High", - "Attack Vector": "Local", - "Availability": "High", - "Confidentiality": "High", - "Integrity": "High", - "Privileges Required": "Low", - "Scope": "Unchanged", - "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", - "score": 7.0 - }, - "fixes": "57d44a354a43edba4ef9963327d4657d12edbfbc", - "last_modified": "2023-12-06", - "nvd_text": "A use-after-free vulnerability in the Linux kernel's af_unix component can be exploited to achieve local privilege escalation.\n\nThe unix_stream_sendpage() function tries to add data to the last skb in the peer's recv queue without locking the queue. Thus there is a race where unix_stream_sendpage() could access an skb locklessly that is being released by garbage collection, resulting in use-after-free.\n\nWe recommend upgrading past commit 790c2f9d15b594350ae9bca7b236f2b1859de02c.\n\n", + "CVE-2023-52511": { + "affected_versions": "v2.6.12-rc2 to v6.6-rc1", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "spi: sun6i: reduce DMA RX transfer width to single byte", + "fixes": "171f8a49f212e87a8b04087568e1b3d132e36a18", + "last_affected_version": "6.5.5", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nspi: sun6i: reduce DMA RX transfer width to single byte\n\nThrough empirical testing it has been determined that sometimes RX SPI\ntransfers with DMA enabled return corrupted data. This is down to single\nor even multiple bytes lost during DMA transfer from SPI peripheral to\nmemory. It seems the RX FIFO within the SPI peripheral can become\nconfused when performing bus read accesses wider than a single byte to it\nduring an active SPI transfer.\n\nThis patch reduces the width of individual DMA read accesses to the\nRX FIFO to a single byte to mitigate that issue.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52511", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52511", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52511", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52511", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52511", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52511" + } + }, + "CVE-2023-52512": { + "affected_versions": "v5.18-rc1 to v6.6-rc6", + "breaks": "a1d1e0e3d80a870cc37a6c064994b89e963d2b58", + "cmt_msg": "pinctrl: nuvoton: wpcm450: fix out of bounds write", + "fixes": "87d315a34133edcb29c4cadbf196ec6c30dfd47b", + "last_affected_version": "6.5.7", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\npinctrl: nuvoton: wpcm450: fix out of bounds write\n\nWrite into 'pctrl->gpio_bank' happens before the check for GPIO index\nvalidity, so out of bounds write may happen.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52512", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52512", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52512", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52512", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52512", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52512" + } + }, + "CVE-2023-52513": { + "affected_versions": "v5.3-rc1 to v6.6-rc5", + "breaks": "6c52fdc244b5ccc468006fd65a504d4ee33743c7", + "cmt_msg": "RDMA/siw: Fix connection failure handling", + "fixes": "53a3f777049771496f791504e7dc8ef017cba590", + "last_affected_version": "6.5.6", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/siw: Fix connection failure handling\n\nIn case immediate MPA request processing fails, the newly\ncreated endpoint unlinks the listening endpoint and is\nready to be dropped. This special case was not handled\ncorrectly by the code handling the later TCP socket close,\ncausing a NULL dereference crash in siw_cm_work_handler()\nwhen dereferencing a NULL listener. We now also cancel\nthe useless MPA timeout, if immediate MPA request\nprocessing fails.\n\nThis patch furthermore simplifies MPA processing in general:\nScheduling a useless TCP socket read in sk_data_ready() upcall\nis now surpressed, if the socket is already moved out of\nTCP_ESTABLISHED state.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52513", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52513", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52513", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52513", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52513", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52513" + } + }, + "CVE-2023-52515": { + "affected_versions": "v3.7-rc1 to v6.6-rc5", + "breaks": "d8536670916a685df116b5c2cb256573fd25e4e3", + "cmt_msg": "RDMA/srp: Do not call scsi_done() from srp_abort()", + "fixes": "e193b7955dfad68035b983a0011f4ef3590c85eb", + "last_affected_version": "6.5.6", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/srp: Do not call scsi_done() from srp_abort()\n\nAfter scmd_eh_abort_handler() has called the SCSI LLD eh_abort_handler\ncallback, it performs one of the following actions:\n* Call scsi_queue_insert().\n* Call scsi_finish_command().\n* Call scsi_eh_scmd_add().\nHence, SCSI abort handlers must not call scsi_done(). Otherwise all\nthe above actions would trigger a use-after-free. Hence remove the\nscsi_done() call from srp_abort(). Keep the srp_free_req() call\nbefore returning SUCCESS because we may not see the command again if\nSUCCESS is returned.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-4622", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-4622", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-4622", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-4622", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-4622", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-4622" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52515", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52515", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52515", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52515", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52515", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52515" } }, - "CVE-2023-4623": { + "CVE-2023-52516": { "affected_versions": "v2.6.12-rc2 to v6.6-rc1", "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", - "cmt_msg": "net/sched: sch_hfsc: Ensure inner classes have fsc curve", - "cvss3": { - "Attack Complexity": "Low", - "Attack Vector": "Local", - "Availability": "High", - "Confidentiality": "High", - "Integrity": "High", - "Privileges Required": "Low", - "Scope": "Unchanged", - "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", - "score": 7.8 - }, - "fixes": "b3d26c5702c7d6c45456326e56d2ccf3f103e60f", - "last_affected_version": "6.5.2", - "last_modified": "2023-12-06", - "nvd_text": "A use-after-free vulnerability in the Linux kernel's net/sched: sch_hfsc (HFSC qdisc traffic control) component can be exploited to achieve local privilege escalation.\n\nIf a class with a link-sharing curve (i.e. with the HFSC_FSC flag set) has a parent without a link-sharing curve, then init_vf() will call vttree_insert() on the parent, but vttree_remove() will be skipped in update_vf(). This leaves a dangling pointer that can cause a use-after-free.\n\nWe recommend upgrading past commit b3d26c5702c7d6c45456326e56d2ccf3f103e60f.\n\n", + "cmt_msg": "dma-debug: don't call __dma_entry_alloc_check_leak() under free_entries_lock", + "fixes": "fb5a4315591dae307a65fc246ca80b5159d296e1", + "last_affected_version": "6.5.5", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndma-debug: don't call __dma_entry_alloc_check_leak() under free_entries_lock\n\n__dma_entry_alloc_check_leak() calls into printk -> serial console\noutput (qcom geni) and grabs port->lock under free_entries_lock\nspin lock, which is a reverse locking dependency chain as qcom_geni\nIRQ handler can call into dma-debug code and grab free_entries_lock\nunder port->lock.\n\nMove __dma_entry_alloc_check_leak() call out of free_entries_lock\nscope so that we don't acquire serial console's port->lock under it.\n\nTrimmed-down lockdep splat:\n\n The existing dependency chain (in reverse order) is:\n\n -> #2 (free_entries_lock){-.-.}-{2:2}:\n _raw_spin_lock_irqsave+0x60/0x80\n dma_entry_alloc+0x38/0x110\n debug_dma_map_page+0x60/0xf8\n dma_map_page_attrs+0x1e0/0x230\n dma_map_single_attrs.constprop.0+0x6c/0xc8\n geni_se_rx_dma_prep+0x40/0xcc\n qcom_geni_serial_isr+0x310/0x510\n __handle_irq_event_percpu+0x110/0x244\n handle_irq_event_percpu+0x20/0x54\n handle_irq_event+0x50/0x88\n handle_fasteoi_irq+0xa4/0xcc\n handle_irq_desc+0x28/0x40\n generic_handle_domain_irq+0x24/0x30\n gic_handle_irq+0xc4/0x148\n do_interrupt_handler+0xa4/0xb0\n el1_interrupt+0x34/0x64\n el1h_64_irq_handler+0x18/0x24\n el1h_64_irq+0x64/0x68\n arch_local_irq_enable+0x4/0x8\n ____do_softirq+0x18/0x24\n ...\n\n -> #1 (&port_lock_key){-.-.}-{2:2}:\n _raw_spin_lock_irqsave+0x60/0x80\n qcom_geni_serial_console_write+0x184/0x1dc\n console_flush_all+0x344/0x454\n console_unlock+0x94/0xf0\n vprintk_emit+0x238/0x24c\n vprintk_default+0x3c/0x48\n vprintk+0xb4/0xbc\n _printk+0x68/0x90\n register_console+0x230/0x38c\n uart_add_one_port+0x338/0x494\n qcom_geni_serial_probe+0x390/0x424\n platform_probe+0x70/0xc0\n really_probe+0x148/0x280\n __driver_probe_device+0xfc/0x114\n driver_probe_device+0x44/0x100\n __device_attach_driver+0x64/0xdc\n bus_for_each_drv+0xb0/0xd8\n __device_attach+0xe4/0x140\n device_initial_probe+0x1c/0x28\n bus_probe_device+0x44/0xb0\n device_add+0x538/0x668\n of_device_add+0x44/0x50\n of_platform_device_create_pdata+0x94/0xc8\n of_platform_bus_create+0x270/0x304\n of_platform_populate+0xac/0xc4\n devm_of_platform_populate+0x60/0xac\n geni_se_probe+0x154/0x160\n platform_probe+0x70/0xc0\n ...\n\n -> #0 (console_owner){-...}-{0:0}:\n __lock_acquire+0xdf8/0x109c\n lock_acquire+0x234/0x284\n console_flush_all+0x330/0x454\n console_unlock+0x94/0xf0\n vprintk_emit+0x238/0x24c\n vprintk_default+0x3c/0x48\n vprintk+0xb4/0xbc\n _printk+0x68/0x90\n dma_entry_alloc+0xb4/0x110\n debug_dma_map_sg+0xdc/0x2f8\n __dma_map_sg_attrs+0xac/0xe4\n dma_map_sgtable+0x30/0x4c\n get_pages+0x1d4/0x1e4 [msm]\n msm_gem_pin_pages_locked+0x38/0xac [msm]\n msm_gem_pin_vma_locked+0x58/0x88 [msm]\n msm_ioctl_gem_submit+0xde4/0x13ac [msm]\n drm_ioctl_kernel+0xe0/0x15c\n drm_ioctl+0x2e8/0x3f4\n vfs_ioctl+0x30/0x50\n ...\n\n Chain exists of:\n console_owner --> &port_lock_key --> free_entries_lock\n\n Possible unsafe locking scenario:\n\n CPU0 CPU1\n ---- ----\n lock(free_entries_lock);\n lock(&port_lock_key);\n lock(free_entries_lock);\n lock(console_owner);\n\n *** DEADLOCK ***\n\n Call trace:\n dump_backtrace+0xb4/0xf0\n show_stack+0x20/0x30\n dump_stack_lvl+0x60/0x84\n dump_stack+0x18/0x24\n print_circular_bug+0x1cc/0x234\n check_noncircular+0x78/0xac\n __lock_acquire+0xdf8/0x109c\n lock_acquire+0x234/0x284\n console_flush_all+0x330/0x454\n consol\n---truncated---", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-4623", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-4623", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-4623", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-4623", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-4623", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-4623" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52516", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52516", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52516", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52516", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52516", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52516" } }, - "CVE-2023-46343": { - "affected_versions": "v3.11-rc1 to v6.6-rc7", - "breaks": "391d8a2da787257aeaf952c974405b53926e3fb3", - "cmt_msg": "nfc: nci: fix possible NULL pointer dereference in send_acknowledge()", - "cvss3": { - "Attack Complexity": "Low", - "Attack Vector": "Local", - "Availability": "High", - "Confidentiality": "None", - "Integrity": "None", - "Privileges Required": "Low", - "Scope": "Unchanged", - "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", - "score": 5.5 - }, - "fixes": "7937609cd387246aed994e81aa4fa951358fba41", - "last_affected_version": "6.5.8", - "last_modified": "2024-02-02", - "nvd_text": "In the Linux kernel before 6.5.9, there is a NULL pointer dereference in send_acknowledge in net/nfc/nci/spi.c.", + "CVE-2023-52517": { + "affected_versions": "v2.6.12-rc2 to v6.6-rc1", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "spi: sun6i: fix race between DMA RX transfer completion and RX FIFO drain", + "fixes": "1f11f4202caf5710204d334fe63392052783876d", + "last_affected_version": "6.5.5", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nspi: sun6i: fix race between DMA RX transfer completion and RX FIFO drain\n\nPreviously the transfer complete IRQ immediately drained to RX FIFO to\nread any data remaining in FIFO to the RX buffer. This behaviour is\ncorrect when dealing with SPI in interrupt mode. However in DMA mode the\ntransfer complete interrupt still fires as soon as all bytes to be\ntransferred have been stored in the FIFO. At that point data in the FIFO\nstill needs to be picked up by the DMA engine. Thus the drain procedure\nand DMA engine end up racing to read from RX FIFO, corrupting any data\nread. Additionally the RX buffer pointer is never adjusted according to\nDMA progress in DMA mode, thus calling the RX FIFO drain procedure in DMA\nmode is a bug.\nFix corruptions in DMA RX mode by draining RX FIFO only in interrupt mode.\nAlso wait for completion of RX DMA when in DMA mode before returning to\nensure all data has been copied to the supplied memory buffer.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52517", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52517", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52517", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52517", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52517", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52517" + } + }, + "CVE-2023-52518": { + "affected_versions": "v5.16-rc1 to v6.6-rc5", + "breaks": "8961987f3f5fa2f2618e72304d013c8dd5e604a6", + "cmt_msg": "Bluetooth: hci_codec: Fix leaking content of local_codecs", + "fixes": "b938790e70540bf4f2e653dcd74b232494d06c8f", + "last_affected_version": "6.5.6", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: hci_codec: Fix leaking content of local_codecs\n\nThe following memory leak can be observed when the controller supports\ncodecs which are stored in local_codecs list but the elements are never\nfreed:\n\nunreferenced object 0xffff88800221d840 (size 32):\n comm \"kworker/u3:0\", pid 36, jiffies 4294898739 (age 127.060s)\n hex dump (first 32 bytes):\n f8 d3 02 03 80 88 ff ff 80 d8 21 02 80 88 ff ff ..........!.....\n 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................\n backtrace:\n [] __kmalloc+0x47/0x120\n [] hci_codec_list_add.isra.0+0x2d/0x160\n [] hci_read_codec_capabilities+0x183/0x270\n [] hci_read_supported_codecs+0x1bb/0x2d0\n [] hci_read_local_codecs_sync+0x3e/0x60\n [] hci_dev_open_sync+0x943/0x11e0\n [] hci_power_on+0x10d/0x3f0\n [] process_one_work+0x404/0x800\n [] worker_thread+0x374/0x670\n [] kthread+0x188/0x1c0\n [] ret_from_fork+0x2b/0x50\n [] ret_from_fork_asm+0x1a/0x30", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-46343", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-46343", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-46343", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-46343", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-46343", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-46343" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52518", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52518", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52518", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52518", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52518", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52518" } }, - "CVE-2023-46813": { - "affected_versions": "v5.10-rc1 to v6.6-rc7", - "breaks": "597cfe48212a3f110ab0f918bf59791f453e65b7", - "cmt_msg": "x86/sev: Check for user-space IOIO pointing to kernel space", - "cvss3": { - "Attack Complexity": "High", - "Attack Vector": "Local", - "Availability": "High", - "Confidentiality": "High", - "Integrity": "High", - "Privileges Required": "Low", - "Scope": "Unchanged", - "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", - "score": 7.0 - }, - "cwe": "Unspecified", - "fixes": "63e44bc52047f182601e7817da969a105aa1f721", - "last_affected_version": "6.5.8", - "last_modified": "2023-12-06", - "nvd_text": "An issue was discovered in the Linux kernel before 6.5.9, exploitable by local users with userspace access to MMIO registers. Incorrect access checking in the #VC handler and instruction emulation of the SEV-ES emulation of MMIO accesses could lead to arbitrary write access to kernel memory (and thus privilege escalation). This depends on a race condition through which userspace can replace an instruction before the #VC handler reads it.", + "CVE-2023-52519": { + "affected_versions": "unk to v6.6-rc5", + "breaks": "", + "cmt_msg": "HID: intel-ish-hid: ipc: Disable and reenable ACPI GPE bit", + "fixes": "8f02139ad9a7e6e5c05712f8c1501eebed8eacfd", + "last_affected_version": "6.5.6", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nHID: intel-ish-hid: ipc: Disable and reenable ACPI GPE bit\n\nThe EHL (Elkhart Lake) based platforms provide a OOB (Out of band)\nservice, which allows to wakup device when the system is in S5 (Soft-Off\nstate). This OOB service can be enabled/disabled from BIOS settings. When\nenabled, the ISH device gets PME wake capability. To enable PME wakeup,\ndriver also needs to enable ACPI GPE bit.\n\nOn resume, BIOS will clear the wakeup bit. So driver need to re-enable it\nin resume function to keep the next wakeup capability. But this BIOS\nclearing of wakeup bit doesn't decrement internal OS GPE reference count,\nso this reenabling on every resume will cause reference count to overflow.\n\nSo first disable and reenable ACPI GPE bit using acpi_disable_gpe().", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52519", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52519", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52519", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52519", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52519", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52519" + } + }, + "CVE-2023-52520": { + "affected_versions": "v5.14-rc1 to v6.6-rc5", + "breaks": "1bcad8e510b27ad843315ab2c27ccf459e3acded", + "cmt_msg": "platform/x86: think-lmi: Fix reference leak", + "fixes": "528ab3e605cabf2f9c9bd5944d3bfe15f6e94f81", + "last_affected_version": "6.5.7", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nplatform/x86: think-lmi: Fix reference leak\n\nIf a duplicate attribute is found using kset_find_obj(), a reference\nto that attribute is returned which needs to be disposed accordingly\nusing kobject_put(). Move the setting name validation into a separate\nfunction to allow for this change without having to duplicate the\ncleanup code for this setting.\nAs a side note, a very similar bug was fixed in\ncommit 7295a996fdab (\"platform/x86: dell-sysman: Fix reference leak\"),\nso it seems that the bug was copied from that driver.\n\nCompile-tested only.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52520", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52520", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52520", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52520", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52520", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52520" + } + }, + "CVE-2023-52522": { + "affected_versions": "v2.6.37-rc1 to v6.6-rc5", + "breaks": "767e97e1e0db0d0f3152cd2f3bd3403596aedbad", + "cmt_msg": "net: fix possible store tearing in neigh_periodic_work()", + "fixes": "25563b581ba3a1f263a00e8c9a97f5e7363be6fd", + "last_affected_version": "6.5.6", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: fix possible store tearing in neigh_periodic_work()\n\nWhile looking at a related syzbot report involving neigh_periodic_work(),\nI found that I forgot to add an annotation when deleting an\nRCU protected item from a list.\n\nReaders use rcu_deference(*np), we need to use either\nrcu_assign_pointer() or WRITE_ONCE() on writer side\nto prevent store tearing.\n\nI use rcu_assign_pointer() to have lockdep support,\nthis was the choice made in neigh_flush_dev().", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-46813", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-46813", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-46813", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-46813", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-46813", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-46813" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52522", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52522", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52522", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52522", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52522", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52522" } }, - "CVE-2023-46838": { - "affected_versions": "v2.6.12-rc2 to v6.8-rc2", - "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", - "cmt_msg": "xen-netback: don't produce zero-size SKB frags", - "cvss3": { - "Attack Complexity": "Low", - "Attack Vector": "Network", - "Availability": "High", - "Confidentiality": "None", - "Integrity": "None", - "Privileges Required": "None", - "Scope": "Unchanged", - "User Interaction": "None", - "raw": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", - "score": 7.5 - }, - "fixes": "c7ec4f2d684e17d69bbdd7c4324db0ef5daac26a", - "last_affected_version": "6.7.1", - "last_modified": "2024-02-02", - "nvd_text": "Transmit requests in Xen's virtual network protocol can consist of\nmultiple parts. While not really useful, except for the initial part\nany of them may be of zero length, i.e. carry no data at all. Besides a\ncertain initial portion of the to be transferred data, these parts are\ndirectly translated into what Linux calls SKB fragments. Such converted\nrequest parts can, when for a particular SKB they are all of length\nzero, lead to a de-reference of NULL in core networking code.\n", + "CVE-2023-52523": { + "affected_versions": "v5.13-rc1 to v6.6-rc5", + "breaks": "122e6c79efe1c25816118aca9cfabe54e99c2432", + "cmt_msg": "bpf, sockmap: Reject sk_msg egress redirects to non-TCP sockets", + "fixes": "b80e31baa43614e086a9d29dc1151932b1bd7fc5", + "last_affected_version": "6.5.6", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf, sockmap: Reject sk_msg egress redirects to non-TCP sockets\n\nWith a SOCKMAP/SOCKHASH map and an sk_msg program user can steer messages\nsent from one TCP socket (s1) to actually egress from another TCP\nsocket (s2):\n\ntcp_bpf_sendmsg(s1)\t\t// = sk_prot->sendmsg\n tcp_bpf_send_verdict(s1)\t// __SK_REDIRECT case\n tcp_bpf_sendmsg_redir(s2)\n tcp_bpf_push_locked(s2)\n\ttcp_bpf_push(s2)\n\t tcp_rate_check_app_limited(s2) // expects tcp_sock\n\t tcp_sendmsg_locked(s2)\t // ditto\n\nThere is a hard-coded assumption in the call-chain, that the egress\nsocket (s2) is a TCP socket.\n\nHowever in commit 122e6c79efe1 (\"sock_map: Update sock type checks for\nUDP\") we have enabled redirects to non-TCP sockets. This was done for the\nsake of BPF sk_skb programs. There was no indention to support sk_msg\nsend-to-egress use case.\n\nAs a result, attempts to send-to-egress through a non-TCP socket lead to a\ncrash due to invalid downcast from sock to tcp_sock:\n\n BUG: kernel NULL pointer dereference, address: 000000000000002f\n ...\n Call Trace:\n \n ? show_regs+0x60/0x70\n ? __die+0x1f/0x70\n ? page_fault_oops+0x80/0x160\n ? do_user_addr_fault+0x2d7/0x800\n ? rcu_is_watching+0x11/0x50\n ? exc_page_fault+0x70/0x1c0\n ? asm_exc_page_fault+0x27/0x30\n ? tcp_tso_segs+0x14/0xa0\n tcp_write_xmit+0x67/0xce0\n __tcp_push_pending_frames+0x32/0xf0\n tcp_push+0x107/0x140\n tcp_sendmsg_locked+0x99f/0xbb0\n tcp_bpf_push+0x19d/0x3a0\n tcp_bpf_sendmsg_redir+0x55/0xd0\n tcp_bpf_send_verdict+0x407/0x550\n tcp_bpf_sendmsg+0x1a1/0x390\n inet_sendmsg+0x6a/0x70\n sock_sendmsg+0x9d/0xc0\n ? sockfd_lookup_light+0x12/0x80\n __sys_sendto+0x10e/0x160\n ? syscall_enter_from_user_mode+0x20/0x60\n ? __this_cpu_preempt_check+0x13/0x20\n ? lockdep_hardirqs_on+0x82/0x110\n __x64_sys_sendto+0x1f/0x30\n do_syscall_64+0x38/0x90\n entry_SYSCALL_64_after_hwframe+0x63/0xcd\n\nReject selecting a non-TCP sockets as redirect target from a BPF sk_msg\nprogram to prevent the crash. When attempted, user will receive an EACCES\nerror from send/sendto/sendmsg() syscall.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52523", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52523", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52523", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52523", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52523", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52523" + } + }, + "CVE-2023-52524": { + "affected_versions": "v6.5-rc1 to v6.6-rc5", + "breaks": "6709d4b7bc2e079241fdef15d1160581c5261c10", + "cmt_msg": "net: nfc: llcp: Add lock when modifying device list", + "fixes": "dfc7f7a988dad34c3bf4c053124fb26aa6c5f916", + "last_affected_version": "6.5.6", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: nfc: llcp: Add lock when modifying device list\n\nThe device list needs its associated lock held when modifying it, or the\nlist could become corrupted, as syzbot discovered.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52524", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52524", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52524", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52524", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52524", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52524" + } + }, + "CVE-2023-52525": { + "affected_versions": "v6.6-rc1 to v6.6-rc5", + "breaks": "11958528161731c58e105b501ed60b83a91ea941", + "fixes": "aef7a0300047e7b4707ea0411dc9597cba108fc8", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: mwifiex: Fix oob check condition in mwifiex_process_rx_packet\n\nOnly skip the code path trying to access the rfc1042 headers when the\nbuffer is too small, so the driver can still process packets without\nrfc1042 headers.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52525", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52525", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52525", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52525", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52525", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52525" + } + }, + "CVE-2023-52526": { + "affected_versions": "v6.1-rc1 to v6.6-rc5", + "breaks": "5c2a64252c5dc4cfe78e5b2a531c118894e3d155", + "cmt_msg": "erofs: fix memory leak of LZMA global compressed deduplication", + "fixes": "75a5221630fe5aa3fedba7a06be618db0f79ba1e", + "last_affected_version": "6.5.6", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nerofs: fix memory leak of LZMA global compressed deduplication\n\nWhen stressing microLZMA EROFS images with the new global compressed\ndeduplication feature enabled (`-Ededupe`), I found some short-lived\ntemporary pages weren't properly released, which could slowly cause\nunexpected OOMs hours later.\n\nLet's fix it now (LZ4 and DEFLATE don't have this issue.)", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-46838", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-46838", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-46838", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-46838", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-46838", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-46838" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52526", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52526", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52526", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52526", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52526", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52526" } }, - "CVE-2023-46862": { - "affected_versions": "v5.10-rc1 to v6.6", - "breaks": "dbbe9c642411c359ad0a0e32442eb2e11d3811b5", - "cmt_msg": "io_uring/fdinfo: lock SQ thread while retrieving thread cpu/pid", - "cvss3": { - "Attack Complexity": "High", - "Attack Vector": "Local", - "Availability": "High", - "Confidentiality": "None", - "Integrity": "None", - "Privileges Required": "Low", - "Scope": "Unchanged", - "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", - "score": 4.7 - }, - "fixes": "7644b1a1c9a7ae8ab99175989bfc8676055edb46", - "last_affected_version": "6.5", - "last_modified": "2023-12-06", - "nvd_text": "An issue was discovered in the Linux kernel through 6.5.9. During a race with SQ thread exit, an io_uring/fdinfo.c io_uring_show_fdinfo NULL pointer dereference can occur.", + "CVE-2023-52527": { + "affected_versions": "v3.5-rc1 to v6.6-rc5", + "breaks": "a32e0eec7042b21ccb52896cf715e3e2641fed93", + "cmt_msg": "ipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data()", + "fixes": "9d4c75800f61e5d75c1659ba201b6c0c7ead3070", + "last_affected_version": "6.5.6", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data()\n\nIncluding the transhdrlen in length is a problem when the packet is\npartially filled (e.g. something like send(MSG_MORE) happened previously)\nwhen appending to an IPv4 or IPv6 packet as we don't want to repeat the\ntransport header or account for it twice. This can happen under some\ncircumstances, such as splicing into an L2TP socket.\n\nThe symptom observed is a warning in __ip6_append_data():\n\n WARNING: CPU: 1 PID: 5042 at net/ipv6/ip6_output.c:1800 __ip6_append_data.isra.0+0x1be8/0x47f0 net/ipv6/ip6_output.c:1800\n\nthat occurs when MSG_SPLICE_PAGES is used to append more data to an already\npartially occupied skbuff. The warning occurs when 'copy' is larger than\nthe amount of data in the message iterator. This is because the requested\nlength includes the transport header length when it shouldn't. This can be\ntriggered by, for example:\n\n sfd = socket(AF_INET6, SOCK_DGRAM, IPPROTO_L2TP);\n bind(sfd, ...); // ::1\n connect(sfd, ...); // ::1 port 7\n send(sfd, buffer, 4100, MSG_MORE);\n sendfile(sfd, dfd, NULL, 1024);\n\nFix this by only adding transhdrlen into the length if the write queue is\nempty in l2tp_ip6_sendmsg(), analogously to how UDP does things.\n\nl2tp_ip_sendmsg() looks like it won't suffer from this problem as it builds\nthe UDP packet itself.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52527", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52527", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52527", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52527", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52527", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52527" + } + }, + "CVE-2023-52528": { + "affected_versions": "v2.6.34-rc2 to v6.6-rc5", + "breaks": "d0cad871703b898a442e4049c532ec39168e5b57", + "cmt_msg": "net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg", + "fixes": "e9c65989920f7c28775ec4e0c11b483910fb67b8", + "last_affected_version": "6.5.6", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg\n\nsyzbot reported the following uninit-value access issue:\n\n=====================================================\nBUG: KMSAN: uninit-value in smsc75xx_wait_ready drivers/net/usb/smsc75xx.c:975 [inline]\nBUG: KMSAN: uninit-value in smsc75xx_bind+0x5c9/0x11e0 drivers/net/usb/smsc75xx.c:1482\nCPU: 0 PID: 8696 Comm: kworker/0:3 Not tainted 5.8.0-rc5-syzkaller #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011\nWorkqueue: usb_hub_wq hub_event\nCall Trace:\n __dump_stack lib/dump_stack.c:77 [inline]\n dump_stack+0x21c/0x280 lib/dump_stack.c:118\n kmsan_report+0xf7/0x1e0 mm/kmsan/kmsan_report.c:121\n __msan_warning+0x58/0xa0 mm/kmsan/kmsan_instr.c:215\n smsc75xx_wait_ready drivers/net/usb/smsc75xx.c:975 [inline]\n smsc75xx_bind+0x5c9/0x11e0 drivers/net/usb/smsc75xx.c:1482\n usbnet_probe+0x1152/0x3f90 drivers/net/usb/usbnet.c:1737\n usb_probe_interface+0xece/0x1550 drivers/usb/core/driver.c:374\n really_probe+0xf20/0x20b0 drivers/base/dd.c:529\n driver_probe_device+0x293/0x390 drivers/base/dd.c:701\n __device_attach_driver+0x63f/0x830 drivers/base/dd.c:807\n bus_for_each_drv+0x2ca/0x3f0 drivers/base/bus.c:431\n __device_attach+0x4e2/0x7f0 drivers/base/dd.c:873\n device_initial_probe+0x4a/0x60 drivers/base/dd.c:920\n bus_probe_device+0x177/0x3d0 drivers/base/bus.c:491\n device_add+0x3b0e/0x40d0 drivers/base/core.c:2680\n usb_set_configuration+0x380f/0x3f10 drivers/usb/core/message.c:2032\n usb_generic_driver_probe+0x138/0x300 drivers/usb/core/generic.c:241\n usb_probe_device+0x311/0x490 drivers/usb/core/driver.c:272\n really_probe+0xf20/0x20b0 drivers/base/dd.c:529\n driver_probe_device+0x293/0x390 drivers/base/dd.c:701\n __device_attach_driver+0x63f/0x830 drivers/base/dd.c:807\n bus_for_each_drv+0x2ca/0x3f0 drivers/base/bus.c:431\n __device_attach+0x4e2/0x7f0 drivers/base/dd.c:873\n device_initial_probe+0x4a/0x60 drivers/base/dd.c:920\n bus_probe_device+0x177/0x3d0 drivers/base/bus.c:491\n device_add+0x3b0e/0x40d0 drivers/base/core.c:2680\n usb_new_device+0x1bd4/0x2a30 drivers/usb/core/hub.c:2554\n hub_port_connect drivers/usb/core/hub.c:5208 [inline]\n hub_port_connect_change drivers/usb/core/hub.c:5348 [inline]\n port_event drivers/usb/core/hub.c:5494 [inline]\n hub_event+0x5e7b/0x8a70 drivers/usb/core/hub.c:5576\n process_one_work+0x1688/0x2140 kernel/workqueue.c:2269\n worker_thread+0x10bc/0x2730 kernel/workqueue.c:2415\n kthread+0x551/0x590 kernel/kthread.c:292\n ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:293\n\nLocal variable ----buf.i87@smsc75xx_bind created at:\n __smsc75xx_read_reg drivers/net/usb/smsc75xx.c:83 [inline]\n smsc75xx_wait_ready drivers/net/usb/smsc75xx.c:968 [inline]\n smsc75xx_bind+0x485/0x11e0 drivers/net/usb/smsc75xx.c:1482\n __smsc75xx_read_reg drivers/net/usb/smsc75xx.c:83 [inline]\n smsc75xx_wait_ready drivers/net/usb/smsc75xx.c:968 [inline]\n smsc75xx_bind+0x485/0x11e0 drivers/net/usb/smsc75xx.c:1482\n\nThis issue is caused because usbnet_read_cmd() reads less bytes than requested\n(zero byte in the reproducer). In this case, 'buf' is not properly filled.\n\nThis patch fixes the issue by returning -ENODATA if usbnet_read_cmd() reads\nless bytes than requested.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52528", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52528", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52528", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52528", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52528", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52528" + } + }, + "CVE-2023-52529": { + "affected_versions": "v5.14-rc1 to v6.6-rc5", + "breaks": "fb1a79a6b6e1223ddb18f12aa35e36f832da2290", + "cmt_msg": "HID: sony: Fix a potential memory leak in sony_probe()", + "fixes": "e1cd4004cde7c9b694bbdd8def0e02288ee58c74", + "last_affected_version": "6.5.6", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nHID: sony: Fix a potential memory leak in sony_probe()\n\nIf an error occurs after a successful usb_alloc_urb() call, usb_free_urb()\nshould be called.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52529", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52529", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52529", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52529", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52529", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52529" + } + }, + "CVE-2023-52530": { + "affected_versions": "v4.14-rc6 to v6.6-rc5", + "breaks": "fdf7cb4185b60c68e1a75e61691c4afdc15dea0e", + "cmt_msg": "wifi: mac80211: fix potential key use-after-free", + "fixes": "31db78a4923ef5e2008f2eed321811ca79e7f71b", + "last_affected_version": "6.5.6", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: mac80211: fix potential key use-after-free\n\nWhen ieee80211_key_link() is called by ieee80211_gtk_rekey_add()\nbut returns 0 due to KRACK protection (identical key reinstall),\nieee80211_gtk_rekey_add() will still return a pointer into the\nkey, in a potential use-after-free. This normally doesn't happen\nsince it's only called by iwlwifi in case of WoWLAN rekey offload\nwhich has its own KRACK protection, but still better to fix, do\nthat by returning an error code and converting that to success on\nthe cfg80211 boundary only, leaving the error for bad callers of\nieee80211_gtk_rekey_add().", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52530", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52530", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52530", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52530", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52530", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52530" + } + }, + "CVE-2023-52531": { + "affected_versions": "v3.9-rc1 to v6.6-rc5", + "breaks": "8ca151b568b67a7b72dcfc6ee6ea7c107ddd795c", + "cmt_msg": "wifi: iwlwifi: mvm: Fix a memory corruption issue", + "fixes": "8ba438ef3cacc4808a63ed0ce24d4f0942cfe55d", + "last_affected_version": "6.5.6", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: iwlwifi: mvm: Fix a memory corruption issue\n\nA few lines above, space is kzalloc()'ed for:\n\tsizeof(struct iwl_nvm_data) +\n\tsizeof(struct ieee80211_channel) +\n\tsizeof(struct ieee80211_rate)\n\n'mvm->nvm_data' is a 'struct iwl_nvm_data', so it is fine.\n\nAt the end of this structure, there is the 'channels' flex array.\nEach element is of type 'struct ieee80211_channel'.\nSo only 1 element is allocated in this array.\n\nWhen doing:\n mvm->nvm_data->bands[0].channels = mvm->nvm_data->channels;\nWe point at the first element of the 'channels' flex array.\nSo this is fine.\n\nHowever, when doing:\n mvm->nvm_data->bands[0].bitrates =\n\t\t\t(void *)((u8 *)mvm->nvm_data->channels + 1);\nbecause of the \"(u8 *)\" cast, we add only 1 to the address of the beginning\nof the flex array.\n\nIt is likely that we want point at the 'struct ieee80211_rate' allocated\njust after.\n\nRemove the spurious casting so that the pointer arithmetic works as\nexpected.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52531", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52531", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52531", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52531", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52531", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52531" + } + }, + "CVE-2023-52532": { + "affected_versions": "unk to v6.6-rc5", + "breaks": "", + "cmt_msg": "net: mana: Fix TX CQE error handling", + "fixes": "b2b000069a4c307b09548dc2243f31f3ca0eac9c", + "last_affected_version": "6.5.6", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: mana: Fix TX CQE error handling\n\nFor an unknown TX CQE error type (probably from a newer hardware),\nstill free the SKB, update the queue tail, etc., otherwise the\naccounting will be wrong.\n\nAlso, TX errors can be triggered by injecting corrupted packets, so\nreplace the WARN_ONCE to ratelimited error logging.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52532", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52532", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52532", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52532", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52532", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52532" + } + }, + "CVE-2023-52559": { + "affected_versions": "v2.6.12-rc2 to v6.6-rc5", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "iommu/vt-d: Avoid memory allocation in iommu_suspend()", + "fixes": "59df44bfb0ca4c3ee1f1c3c5d0ee8e314844799e", + "last_affected_version": "6.5.6", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\niommu/vt-d: Avoid memory allocation in iommu_suspend()\n\nThe iommu_suspend() syscore suspend callback is invoked with IRQ disabled.\nAllocating memory with the GFP_KERNEL flag may re-enable IRQs during\nthe suspend callback, which can cause intermittent suspend/hibernation\nproblems with the following kernel traces:\n\nCalling iommu_suspend+0x0/0x1d0\n------------[ cut here ]------------\nWARNING: CPU: 0 PID: 15 at kernel/time/timekeeping.c:868 ktime_get+0x9b/0xb0\n...\nCPU: 0 PID: 15 Comm: rcu_preempt Tainted: G U E 6.3-intel #r1\nRIP: 0010:ktime_get+0x9b/0xb0\n...\nCall Trace:\n \n tick_sched_timer+0x22/0x90\n ? __pfx_tick_sched_timer+0x10/0x10\n __hrtimer_run_queues+0x111/0x2b0\n hrtimer_interrupt+0xfa/0x230\n __sysvec_apic_timer_interrupt+0x63/0x140\n sysvec_apic_timer_interrupt+0x7b/0xa0\n \n \n asm_sysvec_apic_timer_interrupt+0x1f/0x30\n...\n------------[ cut here ]------------\nInterrupts enabled after iommu_suspend+0x0/0x1d0\nWARNING: CPU: 0 PID: 27420 at drivers/base/syscore.c:68 syscore_suspend+0x147/0x270\nCPU: 0 PID: 27420 Comm: rtcwake Tainted: G U W E 6.3-intel #r1\nRIP: 0010:syscore_suspend+0x147/0x270\n...\nCall Trace:\n \n hibernation_snapshot+0x25b/0x670\n hibernate+0xcd/0x390\n state_store+0xcf/0xe0\n kobj_attr_store+0x13/0x30\n sysfs_kf_write+0x3f/0x50\n kernfs_fop_write_iter+0x128/0x200\n vfs_write+0x1fd/0x3c0\n ksys_write+0x6f/0xf0\n __x64_sys_write+0x1d/0x30\n do_syscall_64+0x3b/0x90\n entry_SYSCALL_64_after_hwframe+0x72/0xdc\n\nGiven that only 4 words memory is needed, avoid the memory allocation in\niommu_suspend().", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52559", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52559", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52559", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52559", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52559", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52559" + } + }, + "CVE-2023-52560": { + "affected_versions": "v5.16-rc5 to v6.6-rc4", + "breaks": "9f86d624292c238203b3687cdb870a2cde1a6f9b", + "cmt_msg": "mm/damon/vaddr-test: fix memory leak in damon_do_test_apply_three_regions()", + "fixes": "45120b15743fa7c0aa53d5db6dfb4c8f87be4abd", + "last_affected_version": "6.5.5", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm/damon/vaddr-test: fix memory leak in damon_do_test_apply_three_regions()\n\nWhen CONFIG_DAMON_VADDR_KUNIT_TEST=y and making CONFIG_DEBUG_KMEMLEAK=y\nand CONFIG_DEBUG_KMEMLEAK_AUTO_SCAN=y, the below memory leak is detected.\n\nSince commit 9f86d624292c (\"mm/damon/vaddr-test: remove unnecessary\nvariables\"), the damon_destroy_ctx() is removed, but still call\ndamon_new_target() and damon_new_region(), the damon_region which is\nallocated by kmem_cache_alloc() in damon_new_region() and the damon_target\nwhich is allocated by kmalloc in damon_new_target() are not freed. And\nthe damon_region which is allocated in damon_new_region() in\ndamon_set_regions() is also not freed.\n\nSo use damon_destroy_target to free all the damon_regions and damon_target.\n\n unreferenced object 0xffff888107c9a940 (size 64):\n comm \"kunit_try_catch\", pid 1069, jiffies 4294670592 (age 732.761s)\n hex dump (first 32 bytes):\n 00 00 00 00 00 00 00 00 06 00 00 00 6b 6b 6b 6b ............kkkk\n 60 c7 9c 07 81 88 ff ff f8 cb 9c 07 81 88 ff ff `...............\n backtrace:\n [] kmalloc_trace+0x27/0xa0\n [] damon_new_target+0x3f/0x1b0\n [] damon_do_test_apply_three_regions.constprop.0+0x95/0x3e0\n [] damon_test_apply_three_regions1+0x21e/0x260\n [] kunit_generic_run_threadfn_adapter+0x4a/0x90\n [] kthread+0x2b6/0x380\n [] ret_from_fork+0x2d/0x70\n [] ret_from_fork_asm+0x11/0x20\n unreferenced object 0xffff8881079cc740 (size 56):\n comm \"kunit_try_catch\", pid 1069, jiffies 4294670592 (age 732.761s)\n hex dump (first 32 bytes):\n 05 00 00 00 00 00 00 00 14 00 00 00 00 00 00 00 ................\n 6b 6b 6b 6b 6b 6b 6b 6b 00 00 00 00 6b 6b 6b 6b kkkkkkkk....kkkk\n backtrace:\n [] damon_new_region+0x22/0x1c0\n [] damon_do_test_apply_three_regions.constprop.0+0xd1/0x3e0\n [] damon_test_apply_three_regions1+0x21e/0x260\n [] kunit_generic_run_threadfn_adapter+0x4a/0x90\n [] kthread+0x2b6/0x380\n [] ret_from_fork+0x2d/0x70\n [] ret_from_fork_asm+0x11/0x20\n unreferenced object 0xffff888107c9ac40 (size 64):\n comm \"kunit_try_catch\", pid 1071, jiffies 4294670595 (age 732.843s)\n hex dump (first 32 bytes):\n 00 00 00 00 00 00 00 00 06 00 00 00 6b 6b 6b 6b ............kkkk\n a0 cc 9c 07 81 88 ff ff 78 a1 76 07 81 88 ff ff ........x.v.....\n backtrace:\n [] kmalloc_trace+0x27/0xa0\n [] damon_new_target+0x3f/0x1b0\n [] damon_do_test_apply_three_regions.constprop.0+0x95/0x3e0\n [] damon_test_apply_three_regions2+0x21e/0x260\n [] kunit_generic_run_threadfn_adapter+0x4a/0x90\n [] kthread+0x2b6/0x380\n [] ret_from_fork+0x2d/0x70\n [] ret_from_fork_asm+0x11/0x20\n unreferenced object 0xffff8881079ccc80 (size 56):\n comm \"kunit_try_catch\", pid 1071, jiffies 4294670595 (age 732.843s)\n hex dump (first 32 bytes):\n 05 00 00 00 00 00 00 00 14 00 00 00 00 00 00 00 ................\n 6b 6b 6b 6b 6b 6b 6b 6b 00 00 00 00 6b 6b 6b 6b kkkkkkkk....kkkk\n backtrace:\n [] damon_new_region+0x22/0x1c0\n [] damon_do_test_apply_three_regions.constprop.0+0xd1/0x3e0\n [] damon_test_apply_three_regions2+0x21e/0x260\n [] kunit_generic_run_threadfn_adapter+0x4a/0x90\n [] kthread+0x2b6/0x380\n [] ret_from_fork+0x2d/0x70\n [prev should be ffff89f596fb5768, but was 52f1e5016aeee75d. (next=ffff89f595a1b268)\n [ 1041.219165] ------------[ cut here ]------------\n [ 1041.221517] kernel BUG at lib/list_debug.c:62!\n [ 1041.223452] invalid opcode: 0000 [#1] PREEMPT SMP PTI\n [ 1041.225408] CPU: 2 PID: 1852 Comm: rmmod Kdump: loaded Tainted: G B W OE 6.5.0 #15\n [ 1041.228244] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS edk2-20230524-3.fc37 05/24/2023\n [ 1041.231212] RIP: 0010:__list_del_entry_valid+0xae/0xb0\n\nAnother quick way to trigger this issue, in a kernel with CONFIG_SLUB=y,\nis to set slub_debug to poison the released objects and then just run\ncat /proc/slabinfo after removing the module that leaks slab objects,\nin which case the kernel will panic:\n\n [ 50.954843] general protection fault, probably for non-canonical address 0xa56b6b6b6b6b6b8b: 0000 [#1] PREEMPT SMP PTI\n [ 50.961545] CPU: 2 PID: 1495 Comm: cat Kdump: loaded Tainted: G B W OE 6.5.0 #15\n [ 50.966808] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS edk2-20230524-3.fc37 05/24/2023\n [ 50.972663] RIP: 0010:get_slabinfo+0x42/0xf0\n\nThis patch fixes this issue by properly checking shutdown_cache()'s\nreturn value before taking the kmem_cache_release() branch.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-47233", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-47233", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-47233", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-47233", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-47233", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-47233" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52562", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52562", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52562", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52562", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52562", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52562" } }, - "CVE-2023-4732": { - "affected_versions": "v5.7-rc1 to v5.14-rc1", - "breaks": "5a281062af1d43d3f3956a6b429c2d727bc92603", - "cmt_msg": "mm/userfaultfd: fix uffd-wp special cases for fork()", - "cvss3": { - "Attack Complexity": "High", - "Attack Vector": "Local", - "Availability": "High", - "Confidentiality": "None", - "Integrity": "None", - "Privileges Required": "Low", - "Scope": "Unchanged", - "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", - "score": 4.7 - }, - "fixes": "8f34f1eac3820fc2722e5159acceb22545b30b0d", - "last_affected_version": "5.13.4", - "last_modified": "2024-01-15", - "nvd_text": "A flaw was found in pfn_swap_entry_to_page in memory management subsystem in the Linux Kernel. In this flaw, an attacker with a local user privilege may cause a denial of service problem due to a BUG statement referencing pmd_t x.", + "CVE-2023-52563": { + "affected_versions": "unk to v6.6-rc3", + "breaks": "", + "cmt_msg": "drm/meson: fix memory leak on ->hpd_notify callback", + "fixes": "099f0af9d98231bb74956ce92508e87cbcb896be", + "last_affected_version": "6.5.5", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/meson: fix memory leak on ->hpd_notify callback\n\nThe EDID returned by drm_bridge_get_edid() needs to be freed.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52563", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52563", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52563", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52563", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52563", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52563" + } + }, + "CVE-2023-52564": { + "affected_versions": "v6.5-rc4 to v6.6-rc4", + "breaks": "9b9c8195f3f0d74a826077fc1c01b9ee74907239", + "cmt_msg": "Revert \"tty: n_gsm: fix UAF in gsm_cleanup_mux\"", + "fixes": "29346e217b8ab8a52889b88f00b268278d6b7668", + "last_affected_version": "6.5.5", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRevert \"tty: n_gsm: fix UAF in gsm_cleanup_mux\"\n\nThis reverts commit 9b9c8195f3f0d74a826077fc1c01b9ee74907239.\n\nThe commit above is reverted as it did not solve the original issue.\n\ngsm_cleanup_mux() tries to free up the virtual ttys by calling\ngsm_dlci_release() for each available DLCI. There, dlci_put() is called to\ndecrease the reference counter for the DLCI via tty_port_put() which\nfinally calls gsm_dlci_free(). This already clears the pointer which is\nbeing checked in gsm_cleanup_mux() before calling gsm_dlci_release().\nTherefore, it is not necessary to clear this pointer in gsm_cleanup_mux()\nas done in the reverted commit. The commit introduces a null pointer\ndereference:\n \n ? __die+0x1f/0x70\n ? page_fault_oops+0x156/0x420\n ? search_exception_tables+0x37/0x50\n ? fixup_exception+0x21/0x310\n ? exc_page_fault+0x69/0x150\n ? asm_exc_page_fault+0x26/0x30\n ? tty_port_put+0x19/0xa0\n gsmtty_cleanup+0x29/0x80 [n_gsm]\n release_one_tty+0x37/0xe0\n process_one_work+0x1e6/0x3e0\n worker_thread+0x4c/0x3d0\n ? __pfx_worker_thread+0x10/0x10\n kthread+0xe1/0x110\n ? __pfx_kthread+0x10/0x10\n ret_from_fork+0x2f/0x50\n ? __pfx_kthread+0x10/0x10\n ret_from_fork_asm+0x1b/0x30\n \n\nThe actual issue is that nothing guards dlci_put() from being called\nmultiple times while the tty driver was triggered but did not yet finished\ncalling gsm_dlci_free().", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-4732", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-4732", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-4732", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-4732", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-4732", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-4732" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52564", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52564", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52564", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52564", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52564", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52564" } }, - "CVE-2023-4881": { - "affected_versions": "v4.1-rc1 to v6.6-rc1", - "breaks": "49499c3e6e18b7677a63316f3ff54a16533dc28f", - "cmt_msg": "netfilter: nftables: exthdr: fix 4-byte stack OOB write", - "cvss3": { - "Attack Complexity": "Low", - "Attack Vector": "Local", - "Availability": "High", - "Confidentiality": "High", - "Integrity": "None", - "Privileges Required": "Low", - "Scope": "Unchanged", - "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", - "score": 7.1 - }, - "fixes": "fd94d9dadee58e09b49075240fe83423eb1dcd36", - "last_affected_version": "6.5.3", - "last_modified": "2023-12-06", - "nvd_text": "Rejected reason: CVE-2023-4881 was wrongly assigned to a bug that was deemed to be a non-security issue by the Linux kernel security team.", + "CVE-2023-52565": { + "affected_versions": "unk to v6.6-rc3", + "breaks": "", + "cmt_msg": "media: uvcvideo: Fix OOB read", + "fixes": "41ebaa5e0eebea4c3bac96b72f9f8ae0d77c0bdb", + "last_affected_version": "6.5.5", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: uvcvideo: Fix OOB read\n\nIf the index provided by the user is bigger than the mask size, we might do\nan out of bound read.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-4881", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-4881", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-4881", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-4881", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-4881", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-4881" - }, - "rejected": true + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52565", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52565", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52565", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52565", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52565", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52565" + } }, - "CVE-2023-4921": { - "affected_versions": "v3.8-rc1 to v6.6-rc1", - "breaks": "462dbc9101acd38e92eda93c0726857517a24bbd", - "cmt_msg": "net: sched: sch_qfq: Fix UAF in qfq_dequeue()", - "cvss3": { - "Attack Complexity": "Low", - "Attack Vector": "Local", - "Availability": "High", - "Confidentiality": "High", - "Integrity": "High", - "Privileges Required": "Low", - "Scope": "Unchanged", - "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", - "score": 7.8 - }, - "fixes": "8fc134fee27f2263988ae38920bc03da416b03d8", - "last_affected_version": "6.5.3", - "last_modified": "2023-12-06", - "nvd_text": "A use-after-free vulnerability in the Linux kernel's net/sched: sch_qfq component can be exploited to achieve local privilege escalation.\n\nWhen the plug qdisc is used as a class of the qfq qdisc, sending network packets triggers use-after-free in qfq_dequeue() due to the incorrect .peek handler of sch_plug and lack of error checking in agg_dequeue().\n\nWe recommend upgrading past commit 8fc134fee27f2263988ae38920bc03da416b03d8.\n\n", + "CVE-2023-52566": { + "affected_versions": "unk to v6.6-rc4", + "breaks": "", + "cmt_msg": "nilfs2: fix potential use after free in nilfs_gccache_submit_read_data()", + "fixes": "7ee29facd8a9c5a26079148e36bcf07141b3a6bc", + "last_affected_version": "6.5.5", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnilfs2: fix potential use after free in nilfs_gccache_submit_read_data()\n\nIn nilfs_gccache_submit_read_data(), brelse(bh) is called to drop the\nreference count of bh when the call to nilfs_dat_translate() fails. If\nthe reference count hits 0 and its owner page gets unlocked, bh may be\nfreed. However, bh->b_page is dereferenced to put the page after that,\nwhich may result in a use-after-free bug. This patch moves the release\noperation after unlocking and putting the page.\n\nNOTE: The function in question is only called in GC, and in combination\nwith current userland tools, address translation using DAT does not occur\nin that function, so the code path that causes this issue will not be\nexecuted. However, it is possible to run that code path by intentionally\nmodifying the userland GC library or by calling the GC ioctl directly.\n\n[konishi.ryusuke@gmail.com: NOTE added to the commit log]", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52566", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52566", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52566", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52566", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52566", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52566" + } + }, + "CVE-2023-52567": { + "affected_versions": "v6.4-rc1 to v6.6-rc4", + "breaks": "0ba9e3a13c6adfa99e32b2576d20820ab10ad48a", + "cmt_msg": "serial: 8250_port: Check IRQ data before use", + "fixes": "cce7fc8b29961b64fadb1ce398dc5ff32a79643b", + "last_affected_version": "6.5.5", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nserial: 8250_port: Check IRQ data before use\n\nIn case the leaf driver wants to use IRQ polling (irq = 0) and\nIIR register shows that an interrupt happened in the 8250 hardware\nthe IRQ data can be NULL. In such a case we need to skip the wake\nevent as we came to this path from the timer interrupt and quite\nlikely system is already awake.\n\nWithout this fix we have got an Oops:\n\n serial8250: ttyS0 at I/O 0x3f8 (irq = 0, base_baud = 115200) is a 16550A\n ...\n BUG: kernel NULL pointer dereference, address: 0000000000000010\n RIP: 0010:serial8250_handle_irq+0x7c/0x240\n Call Trace:\n ? serial8250_handle_irq+0x7c/0x240\n ? __pfx_serial8250_timeout+0x10/0x10", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-4921", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-4921", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-4921", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-4921", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-4921", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-4921" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52567", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52567", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52567", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52567", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52567", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52567" } }, - "CVE-2023-50431": { - "affected_versions": "v5.1-rc1 to v6.8-rc1", - "breaks": "c4d66343a46a4931d6a547042198896e4fd1c592", - "cmt_msg": "accel/habanalabs: fix information leak in sec_attest_info()", - "cvss3": { - "Attack Complexity": "Low", - "Attack Vector": "Local", - "Availability": "None", - "Confidentiality": "High", - "Integrity": "None", - "Privileges Required": "Low", - "Scope": "Unchanged", - "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", - "score": 5.5 - }, - "cwe": "Unspecified", - "fixes": "a9f07790a4b2250f0140e9a61c7f842fd9b618c7", - "last_affected_version": "6.7.1", - "last_modified": "2024-02-02", - "nvd_text": "sec_attest_info in drivers/accel/habanalabs/common/habanalabs_ioctl.c in the Linux kernel through 6.6.5 allows an information leak to user space because info->pad0 is not initialized.", + "CVE-2023-52568": { + "affected_versions": "unk to v6.6-rc4", + "breaks": "", + "cmt_msg": "x86/sgx: Resolves SECS reclaim vs. page fault for EAUG race", + "fixes": "c6c2adcba50c2622ed25ba5d5e7f05f584711358", + "last_affected_version": "6.5.5", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nx86/sgx: Resolves SECS reclaim vs. page fault for EAUG race\n\nThe SGX EPC reclaimer (ksgxd) may reclaim the SECS EPC page for an\nenclave and set secs.epc_page to NULL. The SECS page is used for EAUG\nand ELDU in the SGX page fault handler. However, the NULL check for\nsecs.epc_page is only done for ELDU, not EAUG before being used.\n\nFix this by doing the same NULL check and reloading of the SECS page as\nneeded for both EAUG and ELDU.\n\nThe SECS page holds global enclave metadata. It can only be reclaimed\nwhen there are no other enclave pages remaining. At that point,\nvirtually nothing can be done with the enclave until the SECS page is\npaged back in.\n\nAn enclave can not run nor generate page faults without a resident SECS\npage. But it is still possible for a #PF for a non-SECS page to race\nwith paging out the SECS page: when the last resident non-SECS page A\ntriggers a #PF in a non-resident page B, and then page A and the SECS\nboth are paged out before the #PF on B is handled.\n\nHitting this bug requires that race triggered with a #PF for EAUG.\nFollowing is a trace when it happens.\n\nBUG: kernel NULL pointer dereference, address: 0000000000000000\nRIP: 0010:sgx_encl_eaug_page+0xc7/0x210\nCall Trace:\n ? __kmem_cache_alloc_node+0x16a/0x440\n ? xa_load+0x6e/0xa0\n sgx_vma_fault+0x119/0x230\n __do_fault+0x36/0x140\n do_fault+0x12f/0x400\n __handle_mm_fault+0x728/0x1110\n handle_mm_fault+0x105/0x310\n do_user_addr_fault+0x1ee/0x750\n ? __this_cpu_preempt_check+0x13/0x20\n exc_page_fault+0x76/0x180\n asm_exc_page_fault+0x27/0x30", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-50431", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-50431", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-50431", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-50431", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-50431", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-50431" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52568", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52568", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52568", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52568", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52568", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52568" } }, - "CVE-2023-5090": { - "affected_versions": "v6.0-rc1 to v6.6-rc7", - "breaks": "4d1d7942e36add0aa741a62d0c8e3aba2d5b3ab1", - "cmt_msg": "x86: KVM: SVM: always update the x2avic msr interception", - "cvss3": { - "Attack Complexity": "Low", - "Attack Vector": "Local", - "Availability": "High", - "Confidentiality": "None", - "Integrity": "None", - "Privileges Required": "Low", - "Scope": "Unchanged", - "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", - "score": 5.5 - }, - "fixes": "b65235f6e102354ccafda601eaa1c5bef5284d21", - "last_affected_version": "6.5.8", - "last_modified": "2023-12-06", - "nvd_text": "A flaw was found in KVM. An improper check in svm_set_x2apic_msr_interception() may allow direct access to host x2apic msrs when the guest resets its apic, potentially leading to a denial of service condition.", + "CVE-2023-52569": { + "affected_versions": "v2.6.12-rc2 to v6.6-rc2", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "btrfs: remove BUG() after failure to insert delayed dir index item", + "fixes": "2c58c3931ede7cd08cbecf1f1a4acaf0a04a41a9", + "last_affected_version": "6.5.5", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: remove BUG() after failure to insert delayed dir index item\n\nInstead of calling BUG() when we fail to insert a delayed dir index item\ninto the delayed node's tree, we can just release all the resources we\nhave allocated/acquired before and return the error to the caller. This is\nfine because all existing call chains undo anything they have done before\ncalling btrfs_insert_delayed_dir_index() or BUG_ON (when creating pending\nsnapshots in the transaction commit path).\n\nSo remove the BUG() call and do proper error handling.\n\nThis relates to a syzbot report linked below, but does not fix it because\nit only prevents hitting a BUG(), it does not fix the issue where somehow\nwe attempt to use twice the same index number for different index items.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-5090", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-5090", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-5090", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-5090", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-5090", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-5090" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52569", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52569", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52569", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52569", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52569", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52569" } }, - "CVE-2023-51042": { - "affected_versions": "v4.15-rc1 to v6.5-rc1", - "breaks": "7a0a48ddf63bc9944b9690c6fa043ea4305f7f79", - "cmt_msg": "drm/amdgpu: Fix potential fence use-after-free v2", - "cvss3": { - "Attack Complexity": "Low", - "Attack Vector": "Local", - "Availability": "High", - "Confidentiality": "High", - "Integrity": "High", - "Privileges Required": "Low", - "Scope": "Unchanged", - "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", - "score": 7.8 - }, - "fixes": "2e54154b9f27262efd0cb4f903cc7d5ad1fe9628", - "last_affected_version": "6.4.11", - "last_modified": "2024-02-02", - "nvd_text": "In the Linux kernel before 6.4.12, amdgpu_cs_wait_all_fences in drivers/gpu/drm/amd/amdgpu/amdgpu_cs.c has a fence use-after-free.", + "CVE-2023-52570": { + "affected_versions": "v6.1-rc1 to v6.6-rc4", + "breaks": "da44c340c4fe9d9653ae84fa6a60f406bafcffce", + "cmt_msg": "vfio/mdev: Fix a null-ptr-deref bug for mdev_unregister_parent()", + "fixes": "c777b11d34e0f47dbbc4b018ef65ad030f2b283a", + "last_affected_version": "6.5.5", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvfio/mdev: Fix a null-ptr-deref bug for mdev_unregister_parent()\n\nInject fault while probing mdpy.ko, if kstrdup() of create_dir() fails in\nkobject_add_internal() in kobject_init_and_add() in mdev_type_add()\nin parent_create_sysfs_files(), it will return 0 and probe successfully.\nAnd when rmmod mdpy.ko, the mdpy_dev_exit() will call\nmdev_unregister_parent(), the mdev_type_remove() may traverse uninitialized\nparent->types[i] in parent_remove_sysfs_files(), and it will cause\nbelow null-ptr-deref.\n\nIf mdev_type_add() fails, return the error code and kset_unregister()\nto fix the issue.\n\n general protection fault, probably for non-canonical address 0xdffffc0000000002: 0000 [#1] PREEMPT SMP KASAN\n KASAN: null-ptr-deref in range [0x0000000000000010-0x0000000000000017]\n CPU: 2 PID: 10215 Comm: rmmod Tainted: G W N 6.6.0-rc2+ #20\n Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014\n RIP: 0010:__kobject_del+0x62/0x1c0\n Code: 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 51 01 00 00 48 b8 00 00 00 00 00 fc ff df 48 8b 6b 28 48 8d 7d 10 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 24 01 00 00 48 8b 75 10 48 89 df 48 8d 6b 3c e8\n RSP: 0018:ffff88810695fd30 EFLAGS: 00010202\n RAX: dffffc0000000000 RBX: ffffffffa0270268 RCX: 0000000000000000\n RDX: 0000000000000002 RSI: 0000000000000004 RDI: 0000000000000010\n RBP: 0000000000000000 R08: 0000000000000001 R09: ffffed10233a4ef1\n R10: ffff888119d2778b R11: 0000000063666572 R12: 0000000000000000\n R13: fffffbfff404e2d4 R14: dffffc0000000000 R15: ffffffffa0271660\n FS: 00007fbc81981540(0000) GS:ffff888119d00000(0000) knlGS:0000000000000000\n CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 00007fc14a142dc0 CR3: 0000000110a62003 CR4: 0000000000770ee0\n DR0: ffffffff8fb0bce8 DR1: ffffffff8fb0bce9 DR2: ffffffff8fb0bcea\n DR3: ffffffff8fb0bceb DR6: 00000000fffe0ff0 DR7: 0000000000000600\n PKRU: 55555554\n Call Trace:\n \n ? die_addr+0x3d/0xa0\n ? exc_general_protection+0x144/0x220\n ? asm_exc_general_protection+0x22/0x30\n ? __kobject_del+0x62/0x1c0\n kobject_del+0x32/0x50\n parent_remove_sysfs_files+0xd6/0x170 [mdev]\n mdev_unregister_parent+0xfb/0x190 [mdev]\n ? mdev_register_parent+0x270/0x270 [mdev]\n ? find_module_all+0x9d/0xe0\n mdpy_dev_exit+0x17/0x63 [mdpy]\n __do_sys_delete_module.constprop.0+0x2fa/0x4b0\n ? module_flags+0x300/0x300\n ? __fput+0x4e7/0xa00\n do_syscall_64+0x35/0x80\n entry_SYSCALL_64_after_hwframe+0x46/0xb0\n RIP: 0033:0x7fbc813221b7\n Code: 73 01 c3 48 8b 0d d1 8c 2c 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 b0 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d a1 8c 2c 00 f7 d8 64 89 01 48\n RSP: 002b:00007ffe780e0648 EFLAGS: 00000206 ORIG_RAX: 00000000000000b0\n RAX: ffffffffffffffda RBX: 00007ffe780e06a8 RCX: 00007fbc813221b7\n RDX: 000000000000000a RSI: 0000000000000800 RDI: 000055e214df9b58\n RBP: 000055e214df9af0 R08: 00007ffe780df5c1 R09: 0000000000000000\n R10: 00007fbc8139ecc0 R11: 0000000000000206 R12: 00007ffe780e0870\n R13: 00007ffe780e0ed0 R14: 000055e214df9260 R15: 000055e214df9af0\n \n Modules linked in: mdpy(-) mdev vfio_iommu_type1 vfio [last unloaded: mdpy]\n Dumping ftrace buffer:\n (ftrace buffer empty)\n ---[ end trace 0000000000000000 ]---\n RIP: 0010:__kobject_del+0x62/0x1c0\n Code: 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 51 01 00 00 48 b8 00 00 00 00 00 fc ff df 48 8b 6b 28 48 8d 7d 10 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 24 01 00 00 48 8b 75 10 48 89 df 48 8d 6b 3c e8\n RSP: 0018:ffff88810695fd30 EFLAGS: 00010202\n RAX: dffffc0000000000 RBX: ffffffffa0270268 RCX: 0000000000000000\n RDX: 0000000000000002 RSI: 0000000000000004 RDI: 0000000000000010\n RBP: 0000000000000000 R08: 0000000000000001 R09: ffffed10233a4ef1\n R10: ffff888119d2778b R11: 0000000063666572 R12: 0000000000000000\n R13: fffffbfff404e2d4 R14: dffffc0000000000 R15: ffffffffa0271660\n FS: 00007fbc81981540(0000) GS:ffff888119d00000(000\n---truncated---", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-51042", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-51042", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-51042", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-51042", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-51042", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-51042" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52570", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52570", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52570", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52570", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52570", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52570" } }, - "CVE-2023-51043": { - "affected_versions": "v2.6.12-rc2 to v6.5-rc3", + "CVE-2023-52571": { + "affected_versions": "unk to v6.6-rc4", + "breaks": "", + "cmt_msg": "power: supply: rk817: Fix node refcount leak", + "fixes": "488ef44c068e79752dba8eda0b75f524f111a695", + "last_affected_version": "6.5.5", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\npower: supply: rk817: Fix node refcount leak\n\nDan Carpenter reports that the Smatch static checker warning has found\nthat there is another refcount leak in the probe function. While\nof_node_put() was added in one of the return paths, it should in\nfact be added for ALL return paths that return an error and at driver\nremoval time.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52571", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52571", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52571", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52571", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52571", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52571" + } + }, + "CVE-2023-52572": { + "affected_versions": "v2.6.12-rc2 to v6.6-rc3", "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", - "cmt_msg": "drm/atomic: Fix potential use-after-free in nonblocking commits", - "cvss3": { - "Attack Complexity": "High", - "Attack Vector": "Local", - "Availability": "High", - "Confidentiality": "High", - "Integrity": "High", - "Privileges Required": "Low", - "Scope": "Unchanged", - "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", - "score": 7.0 - }, - "fixes": "4e076c73e4f6e90816b30fcd4a0d7ab365087255", - "last_affected_version": "6.4.4", - "last_modified": "2024-02-02", - "nvd_text": "In the Linux kernel before 6.4.5, drivers/gpu/drm/drm_atomic.c has a use-after-free during a race condition between a nonblocking atomic commit and a driver unload.", + "cmt_msg": "cifs: Fix UAF in cifs_demultiplex_thread()", + "fixes": "d527f51331cace562393a8038d870b3e9916686f", + "last_affected_version": "6.5.5", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncifs: Fix UAF in cifs_demultiplex_thread()\n\nThere is a UAF when xfstests on cifs:\n\n BUG: KASAN: use-after-free in smb2_is_network_name_deleted+0x27/0x160\n Read of size 4 at addr ffff88810103fc08 by task cifsd/923\n\n CPU: 1 PID: 923 Comm: cifsd Not tainted 6.1.0-rc4+ #45\n ...\n Call Trace:\n \n dump_stack_lvl+0x34/0x44\n print_report+0x171/0x472\n kasan_report+0xad/0x130\n kasan_check_range+0x145/0x1a0\n smb2_is_network_name_deleted+0x27/0x160\n cifs_demultiplex_thread.cold+0x172/0x5a4\n kthread+0x165/0x1a0\n ret_from_fork+0x1f/0x30\n \n\n Allocated by task 923:\n kasan_save_stack+0x1e/0x40\n kasan_set_track+0x21/0x30\n __kasan_slab_alloc+0x54/0x60\n kmem_cache_alloc+0x147/0x320\n mempool_alloc+0xe1/0x260\n cifs_small_buf_get+0x24/0x60\n allocate_buffers+0xa1/0x1c0\n cifs_demultiplex_thread+0x199/0x10d0\n kthread+0x165/0x1a0\n ret_from_fork+0x1f/0x30\n\n Freed by task 921:\n kasan_save_stack+0x1e/0x40\n kasan_set_track+0x21/0x30\n kasan_save_free_info+0x2a/0x40\n ____kasan_slab_free+0x143/0x1b0\n kmem_cache_free+0xe3/0x4d0\n cifs_small_buf_release+0x29/0x90\n SMB2_negotiate+0x8b7/0x1c60\n smb2_negotiate+0x51/0x70\n cifs_negotiate_protocol+0xf0/0x160\n cifs_get_smb_ses+0x5fa/0x13c0\n mount_get_conns+0x7a/0x750\n cifs_mount+0x103/0xd00\n cifs_smb3_do_mount+0x1dd/0xcb0\n smb3_get_tree+0x1d5/0x300\n vfs_get_tree+0x41/0xf0\n path_mount+0x9b3/0xdd0\n __x64_sys_mount+0x190/0x1d0\n do_syscall_64+0x35/0x80\n entry_SYSCALL_64_after_hwframe+0x46/0xb0\n\nThe UAF is because:\n\n mount(pid: 921) | cifsd(pid: 923)\n-------------------------------|-------------------------------\n | cifs_demultiplex_thread\nSMB2_negotiate |\n cifs_send_recv |\n compound_send_recv |\n smb_send_rqst |\n wait_for_response |\n wait_event_state [1] |\n | standard_receive3\n | cifs_handle_standard\n | handle_mid\n | mid->resp_buf = buf; [2]\n | dequeue_mid [3]\n KILL the process [4] |\n resp_iov[i].iov_base = buf |\n free_rsp_buf [5] |\n | is_network_name_deleted [6]\n | callback\n\n1. After send request to server, wait the response until\n mid->mid_state != SUBMITTED;\n2. Receive response from server, and set it to mid;\n3. Set the mid state to RECEIVED;\n4. Kill the process, the mid state already RECEIVED, get 0;\n5. Handle and release the negotiate response;\n6. UAF.\n\nIt can be easily reproduce with add some delay in [3] - [6].\n\nOnly sync call has the problem since async call's callback is\nexecuted in cifsd process.\n\nAdd an extra state to mark the mid state to READY before wakeup the\nwaitter, then it can get the resp safely.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52572", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52572", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52572", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52572", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52572", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52572" + } + }, + "CVE-2023-52573": { + "affected_versions": "v5.1-rc1 to v6.6-rc3", + "breaks": "fd261ce6a30e01ad67c416e2c67e263024b3a6f9", + "cmt_msg": "net: rds: Fix possible NULL-pointer dereference", + "fixes": "f1d95df0f31048f1c59092648997686e3f7d9478", + "last_affected_version": "6.5.5", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: rds: Fix possible NULL-pointer dereference\n\nIn rds_rdma_cm_event_handler_cmn() check, if conn pointer exists\nbefore dereferencing it as rdma_set_service_type() argument\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-51043", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-51043", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-51043", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-51043", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-51043", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-51043" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52573", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52573", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52573", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52573", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52573", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52573" } }, - "CVE-2023-5158": { - "affected_versions": "v5.13-rc1 to v6.6-rc5", - "breaks": "b8c06ad4d67db56ed6bdfb685c134da74e92a2c7", - "cmt_msg": "vringh: don't use vringh_kiov_advance() in vringh_iov_xfer()", - "cvss3": { - "Attack Complexity": "Low", - "Attack Vector": "Local", - "Availability": "High", - "Confidentiality": "None", - "Integrity": "None", - "Privileges Required": "Low", - "Scope": "Unchanged", - "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", - "score": 5.5 - }, - "cwe": "Unspecified", - "fixes": "7aed44babc7f97e82b38e9a68515e699692cc100", - "last_affected_version": "6.5.6", - "last_modified": "2023-12-06", - "nvd_text": "A flaw was found in vringh_kiov_advance in drivers/vhost/vringh.c in the host side of a virtio ring in the Linux Kernel. This issue may result in a denial of service from guest to host via zero length descriptor.", + "CVE-2023-52574": { + "affected_versions": "unk to v6.6-rc3", + "breaks": "", + "cmt_msg": "team: fix null-ptr-deref when team device type is changed", + "fixes": "492032760127251e5540a5716a70996bacf2a3fd", + "last_affected_version": "6.5.5", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nteam: fix null-ptr-deref when team device type is changed\n\nGet a null-ptr-deref bug as follows with reproducer [1].\n\nBUG: kernel NULL pointer dereference, address: 0000000000000228\n...\nRIP: 0010:vlan_dev_hard_header+0x35/0x140 [8021q]\n...\nCall Trace:\n \n ? __die+0x24/0x70\n ? page_fault_oops+0x82/0x150\n ? exc_page_fault+0x69/0x150\n ? asm_exc_page_fault+0x26/0x30\n ? vlan_dev_hard_header+0x35/0x140 [8021q]\n ? vlan_dev_hard_header+0x8e/0x140 [8021q]\n neigh_connected_output+0xb2/0x100\n ip6_finish_output2+0x1cb/0x520\n ? nf_hook_slow+0x43/0xc0\n ? ip6_mtu+0x46/0x80\n ip6_finish_output+0x2a/0xb0\n mld_sendpack+0x18f/0x250\n mld_ifc_work+0x39/0x160\n process_one_work+0x1e6/0x3f0\n worker_thread+0x4d/0x2f0\n ? __pfx_worker_thread+0x10/0x10\n kthread+0xe5/0x120\n ? __pfx_kthread+0x10/0x10\n ret_from_fork+0x34/0x50\n ? __pfx_kthread+0x10/0x10\n ret_from_fork_asm+0x1b/0x30\n\n[1]\n$ teamd -t team0 -d -c '{\"runner\": {\"name\": \"loadbalance\"}}'\n$ ip link add name t-dummy type dummy\n$ ip link add link t-dummy name t-dummy.100 type vlan id 100\n$ ip link add name t-nlmon type nlmon\n$ ip link set t-nlmon master team0\n$ ip link set t-nlmon nomaster\n$ ip link set t-dummy up\n$ ip link set team0 up\n$ ip link set t-dummy.100 down\n$ ip link set t-dummy.100 master team0\n\nWhen enslave a vlan device to team device and team device type is changed\nfrom non-ether to ether, header_ops of team device is changed to\nvlan_header_ops. That is incorrect and will trigger null-ptr-deref\nfor vlan->real_dev in vlan_dev_hard_header() because team device is not\na vlan device.\n\nCache eth_header_ops in team_setup(), then assign cached header_ops to\nheader_ops of team net device when its type is changed from non-ether\nto ether to fix the bug.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52574", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52574", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52574", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52574", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52574", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52574" + } + }, + "CVE-2023-52575": { + "affected_versions": "v6.5-rc6 to v6.6-rc3", + "breaks": "fb3bd914b3ec28f5fb697ac55c4846ac2d542855", + "cmt_msg": "x86/srso: Fix SBPB enablement for spec_rstack_overflow=off", + "fixes": "01b057b2f4cc2d905a0bd92195657dbd9a7005ab", + "last_affected_version": "6.5.5", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nx86/srso: Fix SBPB enablement for spec_rstack_overflow=off\n\nIf the user has requested no SRSO mitigation, other mitigations can use\nthe lighter-weight SBPB instead of IBPB.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52575", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52575", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52575", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52575", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52575", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52575" + } + }, + "CVE-2023-52576": { + "affected_versions": "v5.13-rc1 to v6.6-rc3", + "breaks": "fee3ff99bc67604fba77f19da0106f3ec52b1956", + "cmt_msg": "x86/mm, kexec, ima: Use memblock_free_late() from ima_free_kexec_buffer()", + "fixes": "34cf99c250d5cd2530b93a57b0de31d3aaf8685b", + "last_affected_version": "6.5.5", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nx86/mm, kexec, ima: Use memblock_free_late() from ima_free_kexec_buffer()\n\nThe code calling ima_free_kexec_buffer() runs long after the memblock\nallocator has already been torn down, potentially resulting in a use\nafter free in memblock_isolate_range().\n\nWith KASAN or KFENCE, this use after free will result in a BUG\nfrom the idle task, and a subsequent kernel panic.\n\nSwitch ima_free_kexec_buffer() over to memblock_free_late() to avoid\nthat bug.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52576", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52576", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52576", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52576", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52576", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52576" + } + }, + "CVE-2023-52577": { + "affected_versions": "v6.6-rc1 to v6.6-rc3", + "breaks": "977ad86c2a1bcaf58f01ab98df5cc145083c489c", + "fixes": "6af289746a636f71f4c0535a9801774118486c7a", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndccp: fix dccp_v4_err()/dccp_v6_err() again\n\ndh->dccph_x is the 9th byte (offset 8) in \"struct dccp_hdr\",\nnot in the \"byte 7\" as Jann claimed.\n\nWe need to make sure the ICMP messages are big enough,\nusing more standard ways (no more assumptions).\n\nsyzbot reported:\nBUG: KMSAN: uninit-value in pskb_may_pull_reason include/linux/skbuff.h:2667 [inline]\nBUG: KMSAN: uninit-value in pskb_may_pull include/linux/skbuff.h:2681 [inline]\nBUG: KMSAN: uninit-value in dccp_v6_err+0x426/0x1aa0 net/dccp/ipv6.c:94\npskb_may_pull_reason include/linux/skbuff.h:2667 [inline]\npskb_may_pull include/linux/skbuff.h:2681 [inline]\ndccp_v6_err+0x426/0x1aa0 net/dccp/ipv6.c:94\nicmpv6_notify+0x4c7/0x880 net/ipv6/icmp.c:867\nicmpv6_rcv+0x19d5/0x30d0\nip6_protocol_deliver_rcu+0xda6/0x2a60 net/ipv6/ip6_input.c:438\nip6_input_finish net/ipv6/ip6_input.c:483 [inline]\nNF_HOOK include/linux/netfilter.h:304 [inline]\nip6_input+0x15d/0x430 net/ipv6/ip6_input.c:492\nip6_mc_input+0xa7e/0xc80 net/ipv6/ip6_input.c:586\ndst_input include/net/dst.h:468 [inline]\nip6_rcv_finish+0x5db/0x870 net/ipv6/ip6_input.c:79\nNF_HOOK include/linux/netfilter.h:304 [inline]\nipv6_rcv+0xda/0x390 net/ipv6/ip6_input.c:310\n__netif_receive_skb_one_core net/core/dev.c:5523 [inline]\n__netif_receive_skb+0x1a6/0x5a0 net/core/dev.c:5637\nnetif_receive_skb_internal net/core/dev.c:5723 [inline]\nnetif_receive_skb+0x58/0x660 net/core/dev.c:5782\ntun_rx_batched+0x83b/0x920\ntun_get_user+0x564c/0x6940 drivers/net/tun.c:2002\ntun_chr_write_iter+0x3af/0x5d0 drivers/net/tun.c:2048\ncall_write_iter include/linux/fs.h:1985 [inline]\nnew_sync_write fs/read_write.c:491 [inline]\nvfs_write+0x8ef/0x15c0 fs/read_write.c:584\nksys_write+0x20f/0x4c0 fs/read_write.c:637\n__do_sys_write fs/read_write.c:649 [inline]\n__se_sys_write fs/read_write.c:646 [inline]\n__x64_sys_write+0x93/0xd0 fs/read_write.c:646\ndo_syscall_x64 arch/x86/entry/common.c:50 [inline]\ndo_syscall_64+0x41/0xc0 arch/x86/entry/common.c:80\nentry_SYSCALL_64_after_hwframe+0x63/0xcd\n\nUninit was created at:\nslab_post_alloc_hook+0x12f/0xb70 mm/slab.h:767\nslab_alloc_node mm/slub.c:3478 [inline]\nkmem_cache_alloc_node+0x577/0xa80 mm/slub.c:3523\nkmalloc_reserve+0x13d/0x4a0 net/core/skbuff.c:559\n__alloc_skb+0x318/0x740 net/core/skbuff.c:650\nalloc_skb include/linux/skbuff.h:1286 [inline]\nalloc_skb_with_frags+0xc8/0xbd0 net/core/skbuff.c:6313\nsock_alloc_send_pskb+0xa80/0xbf0 net/core/sock.c:2795\ntun_alloc_skb drivers/net/tun.c:1531 [inline]\ntun_get_user+0x23cf/0x6940 drivers/net/tun.c:1846\ntun_chr_write_iter+0x3af/0x5d0 drivers/net/tun.c:2048\ncall_write_iter include/linux/fs.h:1985 [inline]\nnew_sync_write fs/read_write.c:491 [inline]\nvfs_write+0x8ef/0x15c0 fs/read_write.c:584\nksys_write+0x20f/0x4c0 fs/read_write.c:637\n__do_sys_write fs/read_write.c:649 [inline]\n__se_sys_write fs/read_write.c:646 [inline]\n__x64_sys_write+0x93/0xd0 fs/read_write.c:646\ndo_syscall_x64 arch/x86/entry/common.c:50 [inline]\ndo_syscall_64+0x41/0xc0 arch/x86/entry/common.c:80\nentry_SYSCALL_64_after_hwframe+0x63/0xcd\n\nCPU: 0 PID: 4995 Comm: syz-executor153 Not tainted 6.6.0-rc1-syzkaller-00014-ga747acc0b752 #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52577", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52577", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52577", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52577", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52577", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52577" + } + }, + "CVE-2023-52578": { + "affected_versions": "v2.6.17-rc4 to v6.6-rc3", + "breaks": "1c29fc4989bc2a3838b2837adc12b8aeb0feeede", + "cmt_msg": "net: bridge: use DEV_STATS_INC()", + "fixes": "44bdb313da57322c9b3c108eb66981c6ec6509f4", + "last_affected_version": "6.5.5", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: bridge: use DEV_STATS_INC()\n\nsyzbot/KCSAN reported data-races in br_handle_frame_finish() [1]\nThis function can run from multiple cpus without mutual exclusion.\n\nAdopt SMP safe DEV_STATS_INC() to update dev->stats fields.\n\nHandles updates to dev->stats.tx_dropped while we are at it.\n\n[1]\nBUG: KCSAN: data-race in br_handle_frame_finish / br_handle_frame_finish\n\nread-write to 0xffff8881374b2178 of 8 bytes by interrupt on cpu 1:\nbr_handle_frame_finish+0xd4f/0xef0 net/bridge/br_input.c:189\nbr_nf_hook_thresh+0x1ed/0x220\nbr_nf_pre_routing_finish_ipv6+0x50f/0x540\nNF_HOOK include/linux/netfilter.h:304 [inline]\nbr_nf_pre_routing_ipv6+0x1e3/0x2a0 net/bridge/br_netfilter_ipv6.c:178\nbr_nf_pre_routing+0x526/0xba0 net/bridge/br_netfilter_hooks.c:508\nnf_hook_entry_hookfn include/linux/netfilter.h:144 [inline]\nnf_hook_bridge_pre net/bridge/br_input.c:272 [inline]\nbr_handle_frame+0x4c9/0x940 net/bridge/br_input.c:417\n__netif_receive_skb_core+0xa8a/0x21e0 net/core/dev.c:5417\n__netif_receive_skb_one_core net/core/dev.c:5521 [inline]\n__netif_receive_skb+0x57/0x1b0 net/core/dev.c:5637\nprocess_backlog+0x21f/0x380 net/core/dev.c:5965\n__napi_poll+0x60/0x3b0 net/core/dev.c:6527\nnapi_poll net/core/dev.c:6594 [inline]\nnet_rx_action+0x32b/0x750 net/core/dev.c:6727\n__do_softirq+0xc1/0x265 kernel/softirq.c:553\nrun_ksoftirqd+0x17/0x20 kernel/softirq.c:921\nsmpboot_thread_fn+0x30a/0x4a0 kernel/smpboot.c:164\nkthread+0x1d7/0x210 kernel/kthread.c:388\nret_from_fork+0x48/0x60 arch/x86/kernel/process.c:147\nret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:304\n\nread-write to 0xffff8881374b2178 of 8 bytes by interrupt on cpu 0:\nbr_handle_frame_finish+0xd4f/0xef0 net/bridge/br_input.c:189\nbr_nf_hook_thresh+0x1ed/0x220\nbr_nf_pre_routing_finish_ipv6+0x50f/0x540\nNF_HOOK include/linux/netfilter.h:304 [inline]\nbr_nf_pre_routing_ipv6+0x1e3/0x2a0 net/bridge/br_netfilter_ipv6.c:178\nbr_nf_pre_routing+0x526/0xba0 net/bridge/br_netfilter_hooks.c:508\nnf_hook_entry_hookfn include/linux/netfilter.h:144 [inline]\nnf_hook_bridge_pre net/bridge/br_input.c:272 [inline]\nbr_handle_frame+0x4c9/0x940 net/bridge/br_input.c:417\n__netif_receive_skb_core+0xa8a/0x21e0 net/core/dev.c:5417\n__netif_receive_skb_one_core net/core/dev.c:5521 [inline]\n__netif_receive_skb+0x57/0x1b0 net/core/dev.c:5637\nprocess_backlog+0x21f/0x380 net/core/dev.c:5965\n__napi_poll+0x60/0x3b0 net/core/dev.c:6527\nnapi_poll net/core/dev.c:6594 [inline]\nnet_rx_action+0x32b/0x750 net/core/dev.c:6727\n__do_softirq+0xc1/0x265 kernel/softirq.c:553\ndo_softirq+0x5e/0x90 kernel/softirq.c:454\n__local_bh_enable_ip+0x64/0x70 kernel/softirq.c:381\n__raw_spin_unlock_bh include/linux/spinlock_api_smp.h:167 [inline]\n_raw_spin_unlock_bh+0x36/0x40 kernel/locking/spinlock.c:210\nspin_unlock_bh include/linux/spinlock.h:396 [inline]\nbatadv_tt_local_purge+0x1a8/0x1f0 net/batman-adv/translation-table.c:1356\nbatadv_tt_purge+0x2b/0x630 net/batman-adv/translation-table.c:3560\nprocess_one_work kernel/workqueue.c:2630 [inline]\nprocess_scheduled_works+0x5b8/0xa30 kernel/workqueue.c:2703\nworker_thread+0x525/0x730 kernel/workqueue.c:2784\nkthread+0x1d7/0x210 kernel/kthread.c:388\nret_from_fork+0x48/0x60 arch/x86/kernel/process.c:147\nret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:304\n\nvalue changed: 0x00000000000d7190 -> 0x00000000000d7191\n\nReported by Kernel Concurrency Sanitizer on:\nCPU: 0 PID: 14848 Comm: kworker/u4:11 Not tainted 6.6.0-rc1-syzkaller-00236-gad8a69f361b9 #0", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52578", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52578", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52578", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52578", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52578", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52578" + } + }, + "CVE-2023-52580": { + "affected_versions": "v5.12-rc1-dontuse to v6.6-rc3", + "breaks": "4f1cc51f34886d645cd3e8fc2915cc9b7a55c3b6", + "cmt_msg": "net/core: Fix ETH_P_1588 flow dissector", + "fixes": "75ad80ed88a182ab2ad5513e448cf07b403af5c3", + "last_affected_version": "6.5.5", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/core: Fix ETH_P_1588 flow dissector\n\nWhen a PTP ethernet raw frame with a size of more than 256 bytes followed\nby a 0xff pattern is sent to __skb_flow_dissect, nhoff value calculation\nis wrong. For example: hdr->message_length takes the wrong value (0xffff)\nand it does not replicate real header length. In this case, 'nhoff' value\nwas overridden and the PTP header was badly dissected. This leads to a\nkernel crash.\n\nnet/core: flow_dissector\nnet/core flow dissector nhoff = 0x0000000e\nnet/core flow dissector hdr->message_length = 0x0000ffff\nnet/core flow dissector nhoff = 0x0001000d (u16 overflow)\n...\nskb linear: 00000000: 00 a0 c9 00 00 00 00 a0 c9 00 00 00 88\nskb frag: 00000000: f7 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff\n\nUsing the size of the ptp_header struct will allow the corrected\ncalculation of the nhoff value.\n\nnet/core flow dissector nhoff = 0x0000000e\nnet/core flow dissector nhoff = 0x00000030 (sizeof ptp_header)\n...\nskb linear: 00000000: 00 a0 c9 00 00 00 00 a0 c9 00 00 00 88 f7 ff ff\nskb linear: 00000010: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff\nskb linear: 00000020: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff\nskb frag: 00000000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff\n\nKernel trace:\n[ 74.984279] ------------[ cut here ]------------\n[ 74.989471] kernel BUG at include/linux/skbuff.h:2440!\n[ 74.995237] invalid opcode: 0000 [#1] PREEMPT SMP NOPTI\n[ 75.001098] CPU: 4 PID: 0 Comm: swapper/4 Tainted: G U 5.15.85-intel-ese-standard-lts #1\n[ 75.011629] Hardware name: Intel Corporation A-Island (CPU:AlderLake)/A-Island (ID:06), BIOS SB_ADLP.01.01.00.01.03.008.D-6A9D9E73-dirty Mar 30 2023\n[ 75.026507] RIP: 0010:eth_type_trans+0xd0/0x130\n[ 75.031594] Code: 03 88 47 78 eb c7 8b 47 68 2b 47 6c 48 8b 97 c0 00 00 00 83 f8 01 7e 1b 48 85 d2 74 06 66 83 3a ff 74 09 b8 00 04 00 00 eb ab <0f> 0b b8 00 01 00 00 eb a2 48 85 ff 74 eb 48 8d 54 24 06 31 f6 b9\n[ 75.052612] RSP: 0018:ffff9948c0228de0 EFLAGS: 00010297\n[ 75.058473] RAX: 00000000000003f2 RBX: ffff8e47047dc300 RCX: 0000000000001003\n[ 75.066462] RDX: ffff8e4e8c9ea040 RSI: ffff8e4704e0a000 RDI: ffff8e47047dc300\n[ 75.074458] RBP: ffff8e4704e2acc0 R08: 00000000000003f3 R09: 0000000000000800\n[ 75.082466] R10: 000000000000000d R11: ffff9948c0228dec R12: ffff8e4715e4e010\n[ 75.090461] R13: ffff9948c0545018 R14: 0000000000000001 R15: 0000000000000800\n[ 75.098464] FS: 0000000000000000(0000) GS:ffff8e4e8fb00000(0000) knlGS:0000000000000000\n[ 75.107530] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 75.113982] CR2: 00007f5eb35934a0 CR3: 0000000150e0a002 CR4: 0000000000770ee0\n[ 75.121980] PKRU: 55555554\n[ 75.125035] Call Trace:\n[ 75.127792] \n[ 75.130063] ? eth_get_headlen+0xa4/0xc0\n[ 75.134472] igc_process_skb_fields+0xcd/0x150\n[ 75.139461] igc_poll+0xc80/0x17b0\n[ 75.143272] __napi_poll+0x27/0x170\n[ 75.147192] net_rx_action+0x234/0x280\n[ 75.151409] __do_softirq+0xef/0x2f4\n[ 75.155424] irq_exit_rcu+0xc7/0x110\n[ 75.159432] common_interrupt+0xb8/0xd0\n[ 75.163748] \n[ 75.166112] \n[ 75.168473] asm_common_interrupt+0x22/0x40\n[ 75.173175] RIP: 0010:cpuidle_enter_state+0xe2/0x350\n[ 75.178749] Code: 85 c0 0f 8f 04 02 00 00 31 ff e8 39 6c 67 ff 45 84 ff 74 12 9c 58 f6 c4 02 0f 85 50 02 00 00 31 ff e8 52 b0 6d ff fb 45 85 f6 <0f> 88 b1 00 00 00 49 63 ce 4c 2b 2c 24 48 89 c8 48 6b d1 68 48 c1\n[ 75.199757] RSP: 0018:ffff9948c013bea8 EFLAGS: 00000202\n[ 75.205614] RAX: ffff8e4e8fb00000 RBX: ffffb948bfd23900 RCX: 000000000000001f\n[ 75.213619] RDX: 0000000000000004 RSI: ffffffff94206161 RDI: ffffffff94212e20\n[ 75.221620] RBP: 0000000000000004 R08: 000000117568973a R09: 0000000000000001\n[ 75.229622] R10: 000000000000afc8 R11: ffff8e4e8fb29ce4 R12: ffffffff945ae980\n[ 75.237628] R13: 000000117568973a R14: 0000000000000004 R15: 0000000000000000\n[ 75.245635] ? \n---truncated---", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-5158", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-5158", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-5158", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-5158", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-5158", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-5158" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52580", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52580", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52580", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52580", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52580", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52580" } }, - "CVE-2023-51779": { - "affected_versions": "v2.6.12-rc2 to v6.7-rc7", + "CVE-2023-52581": { + "affected_versions": "v6.5-rc6 to v6.6-rc3", + "breaks": "5f68718b34a531a556f2f50300ead2862278da26", + "cmt_msg": "netfilter: nf_tables: fix memleak when more than 255 elements expired", + "fixes": "cf5000a7787cbc10341091d37245a42c119d26c5", + "last_affected_version": "6.5.5", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_tables: fix memleak when more than 255 elements expired\n\nWhen more than 255 elements expired we're supposed to switch to a new gc\ncontainer structure.\n\nThis never happens: u8 type will wrap before reaching the boundary\nand nft_trans_gc_space() always returns true.\n\nThis means we recycle the initial gc container structure and\nlose track of the elements that came before.\n\nWhile at it, don't deref 'gc' after we've passed it to call_rcu.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52581", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52581", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52581", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52581", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52581", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52581" + } + }, + "CVE-2023-52582": { + "affected_versions": "v5.13-rc1 to v6.6-rc3", + "breaks": "3d3c95046742e4eebaa4b891b0b01cbbed94ebbd", + "cmt_msg": "netfs: Only call folio_start_fscache() one time for each folio", + "fixes": "df1c357f25d808e30b216188330e708e09e1a412", + "last_affected_version": "6.5.5", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfs: Only call folio_start_fscache() one time for each folio\n\nIf a network filesystem using netfs implements a clamp_length()\nfunction, it can set subrequest lengths smaller than a page size.\n\nWhen we loop through the folios in netfs_rreq_unlock_folios() to\nset any folios to be written back, we need to make sure we only\ncall folio_start_fscache() once for each folio.\n\nOtherwise, this simple testcase:\n\n mount -o fsc,rsize=1024,wsize=1024 127.0.0.1:/export /mnt/nfs\n dd if=/dev/zero of=/mnt/nfs/file.bin bs=4096 count=1\n 1+0 records in\n 1+0 records out\n 4096 bytes (4.1 kB, 4.0 KiB) copied, 0.0126359 s, 324 kB/s\n echo 3 > /proc/sys/vm/drop_caches\n cat /mnt/nfs/file.bin > /dev/null\n\nwill trigger an oops similar to the following:\n\n page dumped because: VM_BUG_ON_FOLIO(folio_test_private_2(folio))\n ------------[ cut here ]------------\n kernel BUG at include/linux/netfs.h:44!\n ...\n CPU: 5 PID: 134 Comm: kworker/u16:5 Kdump: loaded Not tainted 6.4.0-rc5\n ...\n RIP: 0010:netfs_rreq_unlock_folios+0x68e/0x730 [netfs]\n ...\n Call Trace:\n netfs_rreq_assess+0x497/0x660 [netfs]\n netfs_subreq_terminated+0x32b/0x610 [netfs]\n nfs_netfs_read_completion+0x14e/0x1a0 [nfs]\n nfs_read_completion+0x2f9/0x330 [nfs]\n rpc_free_task+0x72/0xa0 [sunrpc]\n rpc_async_release+0x46/0x70 [sunrpc]\n process_one_work+0x3bd/0x710\n worker_thread+0x89/0x610\n kthread+0x181/0x1c0\n ret_from_fork+0x29/0x50", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52582", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52582", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52582", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52582", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52582", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52582" + } + }, + "CVE-2023-52583": { + "affected_versions": "unk to v6.8-rc1", + "breaks": "", + "cmt_msg": "ceph: fix deadlock or deadcode of misusing dget()", + "fixes": "b493ad718b1f0357394d2cdecbf00a44a36fa085", + "last_affected_version": "6.7.3", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nceph: fix deadlock or deadcode of misusing dget()\n\nThe lock order is incorrect between denty and its parent, we should\nalways make sure that the parent get the lock first.\n\nBut since this deadcode is never used and the parent dir will always\nbe set from the callers, let's just remove it.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52583", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52583", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52583", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52583", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52583", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52583" + } + }, + "CVE-2023-52584": { + "affected_versions": "v2.6.12-rc2 to v6.8-rc1", "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", - "cmt_msg": "Bluetooth: af_bluetooth: Fix Use-After-Free in bt_sock_recvmsg", - "fixes": "2e07e8348ea454615e268222ae3fc240421be768", - "last_affected_version": "6.6.8", - "last_modified": "2024-01-12", + "cmt_msg": "spmi: mediatek: Fix UAF on device remove", + "fixes": "e821d50ab5b956ed0effa49faaf29912fd4106d9", + "last_affected_version": "6.7.3", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nspmi: mediatek: Fix UAF on device remove\n\nThe pmif driver data that contains the clocks is allocated along with\nspmi_controller.\nOn device remove, spmi_controller will be freed first, and then devres\n, including the clocks, will be cleanup.\nThis leads to UAF because putting the clocks will access the clocks in\nthe pmif driver data, which is already freed along with spmi_controller.\n\nThis can be reproduced by enabling DEBUG_TEST_DRIVER_REMOVE and\nbuilding the kernel with KASAN.\n\nFix the UAF issue by using unmanaged clk_bulk_get() and putting the\nclocks before freeing spmi_controller.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-51779", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-51779", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-51779", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-51779", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-51779", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-51779" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52584", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52584", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52584", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52584", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52584", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52584" } }, - "CVE-2023-5178": { - "affected_versions": "v5.0-rc1 to v6.6-rc7", - "backport": true, - "breaks": "872d26a391da92ed8f0c0f5cb5fef428067b7f30", - "cmt_msg": "nvmet-tcp: Fix a possible UAF in queue intialization setup", - "cvss3": { - "Attack Complexity": "Low", - "Attack Vector": "Network", - "Availability": "High", - "Confidentiality": "High", - "Integrity": "High", - "Privileges Required": "Low", - "Scope": "Unchanged", - "User Interaction": "None", - "raw": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", - "score": 8.8 - }, - "fixes": "872d26a391da92ed8f0c0f5cb5fef428067b7f30", - "last_affected_version": "6.5.8", - "last_modified": "2024-02-09", - "nvd_text": "A use-after-free vulnerability was found in drivers/nvme/target/tcp.c` in `nvmet_tcp_free_crypto` due to a logical bug in the NVMe/TCP subsystem in the Linux kernel. This issue may allow a malicious user to cause a use-after-free and double-free problem, which may permit remote code execution or lead to local privilege escalation.", + "CVE-2023-52585": { + "affected_versions": "v2.6.12-rc2 to v6.8-rc1", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "drm/amdgpu: Fix possible NULL dereference in amdgpu_ras_query_error_status_helper()", + "fixes": "b8d55a90fd55b767c25687747e2b24abd1ef8680", + "last_affected_version": "6.7.3", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdgpu: Fix possible NULL dereference in amdgpu_ras_query_error_status_helper()\n\nReturn invalid error code -EINVAL for invalid block id.\n\nFixes the below:\n\ndrivers/gpu/drm/amd/amdgpu/amdgpu_ras.c:1183 amdgpu_ras_query_error_status_helper() error: we previously assumed 'info' could be null (see line 1176)", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-5178", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-5178", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-5178", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-5178", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-5178", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-5178" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52585", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52585", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52585", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52585", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52585", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52585" } }, - "CVE-2023-51780": { - "affected_versions": "v2.6.12-rc2 to v6.7-rc6", + "CVE-2023-52586": { + "affected_versions": "v2.6.12-rc2 to v6.8-rc1", "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", - "cmt_msg": "atm: Fix Use-After-Free in do_vcc_ioctl", - "cvss3": { - "Attack Complexity": "High", - "Attack Vector": "Local", - "Availability": "High", - "Confidentiality": "High", - "Integrity": "High", - "Privileges Required": "Low", - "Scope": "Unchanged", - "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", - "score": 7.0 - }, - "fixes": "24e90b9e34f9e039f56b5f25f6e6eb92cdd8f4b3", - "last_affected_version": "6.6.7", - "last_modified": "2024-02-02", - "nvd_text": "An issue was discovered in the Linux kernel before 6.6.8. do_vcc_ioctl in net/atm/ioctl.c has a use-after-free because of a vcc_recvmsg race condition.", + "cmt_msg": "drm/msm/dpu: Add mutex lock in control vblank irq", + "fixes": "45284ff733e4caf6c118aae5131eb7e7cf3eea5a", + "last_affected_version": "6.7.3", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/msm/dpu: Add mutex lock in control vblank irq\n\nAdd a mutex lock to control vblank irq to synchronize vblank\nenable/disable operations happening from different threads to prevent\nrace conditions while registering/unregistering the vblank irq callback.\n\nv4: -Removed vblank_ctl_lock from dpu_encoder_virt, so it is only a\n parameter of dpu_encoder_phys.\n -Switch from atomic refcnt to a simple int counter as mutex has\n now been added\nv3: Mistakenly did not change wording in last version. It is done now.\nv2: Slightly changed wording of commit message\n\nPatchwork: https://patchwork.freedesktop.org/patch/571854/", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-51780", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-51780", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-51780", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-51780", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-51780", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-51780" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52586", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52586", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52586", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52586", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52586", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52586" } }, - "CVE-2023-51781": { - "affected_versions": "v2.6.12-rc2 to v6.7-rc6", + "CVE-2023-52587": { + "affected_versions": "v2.6.12-rc2 to v6.8-rc1", "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", - "cmt_msg": "appletalk: Fix Use-After-Free in atalk_ioctl", - "cvss3": { - "Attack Complexity": "High", - "Attack Vector": "Local", - "Availability": "High", - "Confidentiality": "High", - "Integrity": "High", - "Privileges Required": "Low", - "Scope": "Unchanged", - "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", - "score": 7.0 - }, - "fixes": "189ff16722ee36ced4d2a2469d4ab65a8fee4198", - "last_affected_version": "6.6.7", - "last_modified": "2024-02-02", - "nvd_text": "An issue was discovered in the Linux kernel before 6.6.8. atalk_ioctl in net/appletalk/ddp.c has a use-after-free because of an atalk_recvmsg race condition.", + "cmt_msg": "IB/ipoib: Fix mcast list locking", + "fixes": "4f973e211b3b1c6d36f7c6a19239d258856749f9", + "last_affected_version": "6.7.3", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nIB/ipoib: Fix mcast list locking\n\nReleasing the `priv->lock` while iterating the `priv->multicast_list` in\n`ipoib_mcast_join_task()` opens a window for `ipoib_mcast_dev_flush()` to\nremove the items while in the middle of iteration. If the mcast is removed\nwhile the lock was dropped, the for loop spins forever resulting in a hard\nlockup (as was reported on RHEL 4.18.0-372.75.1.el8_6 kernel):\n\n Task A (kworker/u72:2 below) | Task B (kworker/u72:0 below)\n -----------------------------------+-----------------------------------\n ipoib_mcast_join_task(work) | ipoib_ib_dev_flush_light(work)\n spin_lock_irq(&priv->lock) | __ipoib_ib_dev_flush(priv, ...)\n list_for_each_entry(mcast, | ipoib_mcast_dev_flush(dev = priv->dev)\n &priv->multicast_list, list) |\n ipoib_mcast_join(dev, mcast) |\n spin_unlock_irq(&priv->lock) |\n | spin_lock_irqsave(&priv->lock, flags)\n | list_for_each_entry_safe(mcast, tmcast,\n | &priv->multicast_list, list)\n | list_del(&mcast->list);\n | list_add_tail(&mcast->list, &remove_list)\n | spin_unlock_irqrestore(&priv->lock, flags)\n spin_lock_irq(&priv->lock) |\n | ipoib_mcast_remove_list(&remove_list)\n (Here, `mcast` is no longer on the | list_for_each_entry_safe(mcast, tmcast,\n `priv->multicast_list` and we keep | remove_list, list)\n spinning on the `remove_list` of | >>> wait_for_completion(&mcast->done)\n the other thread which is blocked |\n and the list is still valid on |\n it's stack.)\n\nFix this by keeping the lock held and changing to GFP_ATOMIC to prevent\neventual sleeps.\nUnfortunately we could not reproduce the lockup and confirm this fix but\nbased on the code review I think this fix should address such lockups.\n\ncrash> bc 31\nPID: 747 TASK: ff1c6a1a007e8000 CPU: 31 COMMAND: \"kworker/u72:2\"\n--\n [exception RIP: ipoib_mcast_join_task+0x1b1]\n RIP: ffffffffc0944ac1 RSP: ff646f199a8c7e00 RFLAGS: 00000002\n RAX: 0000000000000000 RBX: ff1c6a1a04dc82f8 RCX: 0000000000000000\n work (&priv->mcast_task{,.work})\n RDX: ff1c6a192d60ac68 RSI: 0000000000000286 RDI: ff1c6a1a04dc8000\n &mcast->list\n RBP: ff646f199a8c7e90 R8: ff1c699980019420 R9: ff1c6a1920c9a000\n R10: ff646f199a8c7e00 R11: ff1c6a191a7d9800 R12: ff1c6a192d60ac00\n mcast\n R13: ff1c6a1d82200000 R14: ff1c6a1a04dc8000 R15: ff1c6a1a04dc82d8\n dev priv (&priv->lock) &priv->multicast_list (aka head)\n ORIG_RAX: ffffffffffffffff CS: 0010 SS: 0018\n--- ---\n #5 [ff646f199a8c7e00] ipoib_mcast_join_task+0x1b1 at ffffffffc0944ac1 [ib_ipoib]\n #6 [ff646f199a8c7e98] process_one_work+0x1a7 at ffffffff9bf10967\n\ncrash> rx ff646f199a8c7e68\nff646f199a8c7e68: ff1c6a1a04dc82f8 <<< work = &priv->mcast_task.work\n\ncrash> list -hO ipoib_dev_priv.multicast_list ff1c6a1a04dc8000\n(empty)\n\ncrash> ipoib_dev_priv.mcast_task.work.func,mcast_mutex.owner.counter ff1c6a1a04dc8000\n mcast_task.work.func = 0xffffffffc0944910 ,\n mcast_mutex.owner.counter = 0xff1c69998efec000\n\ncrash> b 8\nPID: 8 TASK: ff1c69998efec000 CPU: 33 COMMAND: \"kworker/u72:0\"\n--\n #3 [ff646f1980153d50] wait_for_completion+0x96 at ffffffff9c7d7646\n #4 [ff646f1980153d90] ipoib_mcast_remove_list+0x56 at ffffffffc0944dc6 [ib_ipoib]\n #5 [ff646f1980153de8] ipoib_mcast_dev_flush+0x1a7 at ffffffffc09455a7 [ib_ipoib]\n #6 [ff646f1980153e58] __ipoib_ib_dev_flush+0x1a4 at ffffffffc09431a4 [ib_ipoib]\n #7 [ff\n---truncated---", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-51781", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-51781", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-51781", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-51781", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-51781", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-51781" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52587", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52587", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52587", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52587", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52587", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52587" } }, - "CVE-2023-51782": { - "affected_versions": "v2.6.12-rc2 to v6.7-rc6", + "CVE-2023-52588": { + "affected_versions": "v2.6.12-rc2 to v6.8-rc1", "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", - "cmt_msg": "net/rose: Fix Use-After-Free in rose_ioctl", - "cvss3": { - "Attack Complexity": "High", - "Attack Vector": "Local", - "Availability": "High", - "Confidentiality": "High", - "Integrity": "High", - "Privileges Required": "Low", - "Scope": "Unchanged", - "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", - "score": 7.0 - }, - "fixes": "810c38a369a0a0ce625b5c12169abce1dd9ccd53", - "last_affected_version": "6.6.7", - "last_modified": "2024-02-02", - "nvd_text": "An issue was discovered in the Linux kernel before 6.6.8. rose_ioctl in net/rose/af_rose.c has a use-after-free because of a rose_accept race condition.", + "cmt_msg": "f2fs: fix to tag gcing flag on page during block migration", + "fixes": "4961acdd65c956e97c1a000c82d91a8c1cdbe44b", + "last_affected_version": "6.7.3", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nf2fs: fix to tag gcing flag on page during block migration\n\nIt needs to add missing gcing flag on page during block migration,\nin order to garantee migrated data be persisted during checkpoint,\notherwise out-of-order persistency between data and node may cause\ndata corruption after SPOR.\n\nSimilar issue was fixed by commit 2d1fe8a86bf5 (\"f2fs: fix to tag\ngcing flag on page during file defragment\").", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-51782", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-51782", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-51782", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-51782", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-51782", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-51782" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52588", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52588", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52588", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52588", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52588", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52588" } }, - "CVE-2023-5197": { - "affected_versions": "v5.9-rc1 to v6.6-rc3", - "breaks": "d0e2c7de92c7f2b3d355ad76b0bb9fc43d1beb87", - "cmt_msg": "netfilter: nf_tables: disallow rule removal from chain binding", - "cvss3": { - "Attack Complexity": "Low", - "Attack Vector": "Local", - "Availability": "High", - "Confidentiality": "Low", - "Integrity": "Low", - "Privileges Required": "Low", - "Scope": "Unchanged", - "User Interaction": "None", - "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H", - "score": 6.6 - }, - "fixes": "f15f29fd4779be8a418b66e9d52979bb6d6c2325", - "last_affected_version": "6.5.5", - "last_modified": "2023-12-06", - "nvd_text": "A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation.\n\nAddition and removal of rules from chain bindings within the same transaction causes leads to use-after-free.\n\nWe recommend upgrading past commit f15f29fd4779be8a418b66e9d52979bb6d6c2325.\n\n", + "CVE-2023-52589": { + "affected_versions": "v2.6.12-rc2 to v6.8-rc1", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "media: rkisp1: Fix IRQ disable race issue", + "fixes": "870565f063a58576e8a4529f122cac4325c6b395", + "last_affected_version": "6.7.3", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: rkisp1: Fix IRQ disable race issue\n\nIn rkisp1_isp_stop() and rkisp1_csi_disable() the driver masks the\ninterrupts and then apparently assumes that the interrupt handler won't\nbe running, and proceeds in the stop procedure. This is not the case, as\nthe interrupt handler can already be running, which would lead to the\nISP being disabled while the interrupt handler handling a captured\nframe.\n\nThis brings up two issues: 1) the ISP could be powered off while the\ninterrupt handler is still running and accessing registers, leading to\nboard lockup, and 2) the interrupt handler code and the code that\ndisables the streaming might do things that conflict.\n\nIt is not clear to me if 2) causes a real issue, but 1) can be seen with\na suitable delay (or printk in my case) in the interrupt handler,\nleading to board lockup.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-5197", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-5197", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-5197", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-5197", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-5197", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-5197" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52589", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52589", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52589", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52589", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52589", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52589" } }, - "CVE-2023-52340": { - "affected_versions": "v2.6.12-rc2 to v6.3-rc1", + "CVE-2023-52590": { + "affected_versions": "v2.6.12-rc2 to v6.8-rc1", "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", - "cmt_msg": "ipv6: remove max_size check inline with ipv4", - "fixes": "af6d10345ca76670c1b7c37799f0d5576ccef277", - "last_affected_version": "6.1.72", - "last_modified": "2024-02-24", + "cmt_msg": "ocfs2: Avoid touching renamed directory if parent does not change", + "fixes": "9d618d19b29c2943527e3a43da0a35aea91062fc", + "last_affected_version": "6.7.3", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nocfs2: Avoid touching renamed directory if parent does not change\n\nThe VFS will not be locking moved directory if its parent does not\nchange. Change ocfs2 rename code to avoid touching renamed directory if\nits parent does not change as without locking that can corrupt the\nfilesystem.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52340", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52340", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52340", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52340", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-52340", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-52340" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52590", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52590", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52590", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52590", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52590", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52590" } }, - "CVE-2023-52429": { - "affected_versions": "v2.6.12-rc2 to v6.8-rc3", + "CVE-2023-52591": { + "affected_versions": "v2.6.12-rc2 to v6.8-rc1", "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", - "cmt_msg": "dm: limit the number of targets and parameter size area", - "fixes": "bd504bcfec41a503b32054da5472904b404341a4", - "last_affected_version": "6.7.5", - "last_modified": "2024-02-25", - "nvd_text": "dm_table_create in drivers/md/dm-table.c in the Linux kernel through 6.7.4 can attempt to (in alloc_targets) allocate more than INT_MAX bytes, and crash, because of a missing check for struct dm_ioctl.target_count.", + "cmt_msg": "reiserfs: Avoid touching renamed directory if parent does not change", + "fixes": "49db9b1b86a82448dfaf3fcfefcf678dee56c8ed", + "last_affected_version": "6.7.3", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nreiserfs: Avoid touching renamed directory if parent does not change\n\nThe VFS will not be locking moved directory if its parent does not\nchange. Change reiserfs rename code to avoid touching renamed directory\nif its parent does not change as without locking that can corrupt the\nfilesystem.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52429", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52429", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52429", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52429", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-52429", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-52429" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52591", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52591", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52591", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52591", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52591", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52591" } }, - "CVE-2023-52433": { - "affected_versions": "v6.5-rc6 to v6.6-rc1", - "breaks": "f6c383b8c31a", - "cmt_msg": "netfilter: nft_set_rbtree: skip sync GC for new elements in this transaction", - "fixes": "2ee52ae94baabf7ee09cf2a8d854b990dac5d0e4", - "last_affected_version": "6.5.3", - "last_modified": "2024-02-25", - "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nft_set_rbtree: skip sync GC for new elements in this transaction\n\nNew elements in this transaction might expired before such transaction\nends. Skip sync GC for such elements otherwise commit path might walk\nover an already released object. Once transaction is finished, async GC\nwill collect such expired element.", + "CVE-2023-52593": { + "affected_versions": "v2.6.12-rc2 to v6.8-rc1", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "wifi: wfx: fix possible NULL pointer dereference in wfx_set_mfp_ap()", + "fixes": "fe0a7776d4d19e613bb8dd80fe2d78ae49e8b49d", + "last_affected_version": "6.7.3", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: wfx: fix possible NULL pointer dereference in wfx_set_mfp_ap()\n\nSince 'ieee80211_beacon_get()' can return NULL, 'wfx_set_mfp_ap()'\nshould check the return value before examining skb data. So convert\nthe latter to return an appropriate error code and propagate it to\nreturn from 'wfx_start_ap()' as well. Compile tested only.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52593", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52593", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52593", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52593", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52593", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52593" + } + }, + "CVE-2023-52594": { + "affected_versions": "v3.0-rc1 to v6.8-rc1", + "breaks": "27876a29de221186c9d5883e5fe5f6da18ef9a45", + "cmt_msg": "wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus()", + "fixes": "2adc886244dff60f948497b59affb6c6ebb3c348", + "last_affected_version": "6.7.3", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus()\n\nFix an array-index-out-of-bounds read in ath9k_htc_txstatus(). The bug\noccurs when txs->cnt, data from a URB provided by a USB device, is\nbigger than the size of the array txs->txstatus, which is\nHTC_MAX_TX_STATUS. WARN_ON() already checks it, but there is no bug\nhandling code after the check. Make the function return if that is the\ncase.\n\nFound by a modified version of syzkaller.\n\nUBSAN: array-index-out-of-bounds in htc_drv_txrx.c\nindex 13 is out of range for type '__wmi_event_txstatus [12]'\nCall Trace:\n ath9k_htc_txstatus\n ath9k_wmi_event_tasklet\n tasklet_action_common\n __do_softirq\n irq_exit_rxu\n sysvec_apic_timer_interrupt", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52594", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52594", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52594", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52594", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52594", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52594" + } + }, + "CVE-2023-52595": { + "affected_versions": "v2.6.12-rc2 to v6.8-rc1", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "wifi: rt2x00: restart beacon queue when hardware reset", + "fixes": "a11d965a218f0cd95b13fe44d0bcd8a20ce134a8", + "last_affected_version": "6.7.3", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: rt2x00: restart beacon queue when hardware reset\n\nWhen a hardware reset is triggered, all registers are reset, so all\nqueues are forced to stop in hardware interface. However, mac80211\nwill not automatically stop the queue. If we don't manually stop the\nbeacon queue, the queue will be deadlocked and unable to start again.\nThis patch fixes the issue where Apple devices cannot connect to the\nAP after calling ieee80211_restart_hw().", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52433", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52433", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52433", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52433", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-52433", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-52433" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52595", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52595", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52595", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52595", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52595", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52595" } }, - "CVE-2023-52434": { - "affected_versions": "v2.6.12-rc2 to v6.7-rc6", + "CVE-2023-52596": { + "affected_versions": "v2.6.12-rc2 to v6.8-rc1", "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", - "cmt_msg": "smb: client: fix potential OOBs in smb2_parse_contexts()", - "fixes": "af1689a9b7701d9907dfc84d2a4b57c4bc907144", - "last_affected_version": "6.6.7", - "last_modified": "2024-02-25", - "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb: client: fix potential OOBs in smb2_parse_contexts()\n\nValidate offsets and lengths before dereferencing create contexts in\nsmb2_parse_contexts().\n\nThis fixes following oops when accessing invalid create contexts from\nserver:\n\n BUG: unable to handle page fault for address: ffff8881178d8cc3\n #PF: supervisor read access in kernel mode\n #PF: error_code(0x0000) - not-present page\n PGD 4a01067 P4D 4a01067 PUD 0\n Oops: 0000 [#1] PREEMPT SMP NOPTI\n CPU: 3 PID: 1736 Comm: mount.cifs Not tainted 6.7.0-rc4 #1\n Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS\n rel-1.16.2-3-gd478f380-rebuilt.opensuse.org 04/01/2014\n RIP: 0010:smb2_parse_contexts+0xa0/0x3a0 [cifs]\n Code: f8 10 75 13 48 b8 93 ad 25 50 9c b4 11 e7 49 39 06 0f 84 d2 00\n 00 00 8b 45 00 85 c0 74 61 41 29 c5 48 01 c5 41 83 fd 0f 76 55 <0f> b7\n 7d 04 0f b7 45 06 4c 8d 74 3d 00 66 83 f8 04 75 bc ba 04 00\n RSP: 0018:ffffc900007939e0 EFLAGS: 00010216\n RAX: ffffc90000793c78 RBX: ffff8880180cc000 RCX: ffffc90000793c90\n RDX: ffffc90000793cc0 RSI: ffff8880178d8cc0 RDI: ffff8880180cc000\n RBP: ffff8881178d8cbf R08: ffffc90000793c22 R09: 0000000000000000\n R10: ffff8880180cc000 R11: 0000000000000024 R12: 0000000000000000\n R13: 0000000000000020 R14: 0000000000000000 R15: ffffc90000793c22\n FS: 00007f873753cbc0(0000) GS:ffff88806bc00000(0000)\n knlGS:0000000000000000\n CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: ffff8881178d8cc3 CR3: 00000000181ca000 CR4: 0000000000750ef0\n PKRU: 55555554\n Call Trace:\n \n ? __die+0x23/0x70\n ? page_fault_oops+0x181/0x480\n ? search_module_extables+0x19/0x60\n ? srso_alias_return_thunk+0x5/0xfbef5\n ? exc_page_fault+0x1b6/0x1c0\n ? asm_exc_page_fault+0x26/0x30\n ? smb2_parse_contexts+0xa0/0x3a0 [cifs]\n SMB2_open+0x38d/0x5f0 [cifs]\n ? smb2_is_path_accessible+0x138/0x260 [cifs]\n smb2_is_path_accessible+0x138/0x260 [cifs]\n cifs_is_path_remote+0x8d/0x230 [cifs]\n cifs_mount+0x7e/0x350 [cifs]\n cifs_smb3_do_mount+0x128/0x780 [cifs]\n smb3_get_tree+0xd9/0x290 [cifs]\n vfs_get_tree+0x2c/0x100\n ? capable+0x37/0x70\n path_mount+0x2d7/0xb80\n ? srso_alias_return_thunk+0x5/0xfbef5\n ? _raw_spin_unlock_irqrestore+0x44/0x60\n __x64_sys_mount+0x11a/0x150\n do_syscall_64+0x47/0xf0\n entry_SYSCALL_64_after_hwframe+0x6f/0x77\n RIP: 0033:0x7f8737657b1e", + "cmt_msg": "sysctl: Fix out of bounds access for empty sysctl registers", + "fixes": "315552310c7de92baea4e570967066569937a843", + "last_affected_version": "6.7.3", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsysctl: Fix out of bounds access for empty sysctl registers\n\nWhen registering tables to the sysctl subsystem there is a check to see\nif header is a permanently empty directory (used for mounts). This check\nevaluates the first element of the ctl_table. This results in an out of\nbounds evaluation when registering empty directories.\n\nThe function register_sysctl_mount_point now passes a ctl_table of size\n1 instead of size 0. It now relies solely on the type to identify\na permanently empty register.\n\nMake sure that the ctl_table has at least one element before testing for\npermanent emptiness.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52434", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52434", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52434", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52434", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-52434", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-52434" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52596", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52596", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52596", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52596", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52596", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52596" } }, - "CVE-2023-52435": { - "affected_versions": "unk to v6.7-rc6", + "CVE-2023-52597": { + "affected_versions": "v2.6.12-rc2 to v6.8-rc1", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "KVM: s390: fix setting of fpc register", + "fixes": "b988b1bb0053c0dcd26187d29ef07566a565cf55", + "last_affected_version": "6.7.3", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: s390: fix setting of fpc register\n\nkvm_arch_vcpu_ioctl_set_fpu() allows to set the floating point control\n(fpc) register of a guest cpu. The new value is tested for validity by\ntemporarily loading it into the fpc register.\n\nThis may lead to corruption of the fpc register of the host process:\nif an interrupt happens while the value is temporarily loaded into the fpc\nregister, and within interrupt context floating point or vector registers\nare used, the current fp/vx registers are saved with save_fpu_regs()\nassuming they belong to user space and will be loaded into fp/vx registers\nwhen returning to user space.\n\ntest_fp_ctl() restores the original user space / host process fpc register\nvalue, however it will be discarded, when returning to user space.\n\nIn result the host process will incorrectly continue to run with the value\nthat was supposed to be used for a guest cpu.\n\nFix this by simply removing the test. There is another test right before\nthe SIE context is entered which will handles invalid values.\n\nThis results in a change of behaviour: invalid values will now be accepted\ninstead of that the ioctl fails with -EINVAL. This seems to be acceptable,\ngiven that this interface is most likely not used anymore, and this is in\naddition the same behaviour implemented with the memory mapped interface\n(replace invalid values with zero) - see sync_regs() in kvm-s390.c.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52597", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52597", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52597", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52597", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52597", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52597" + } + }, + "CVE-2023-52598": { + "affected_versions": "unk to v6.8-rc1", "breaks": "", - "cmt_msg": "net: prevent mss overflow in skb_segment()", - "fixes": "23d05d563b7e7b0314e65c8e882bc27eac2da8e7", - "last_affected_version": "6.6.10", - "last_modified": "2024-02-25", - "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: prevent mss overflow in skb_segment()\n\nOnce again syzbot is able to crash the kernel in skb_segment() [1]\n\nGSO_BY_FRAGS is a forbidden value, but unfortunately the following\ncomputation in skb_segment() can reach it quite easily :\n\n\tmss = mss * partial_segs;\n\n65535 = 3 * 5 * 17 * 257, so many initial values of mss can lead to\na bad final result.\n\nMake sure to limit segmentation so that the new mss value is smaller\nthan GSO_BY_FRAGS.\n\n[1]\n\ngeneral protection fault, probably for non-canonical address 0xdffffc000000000e: 0000 [#1] PREEMPT SMP KASAN\nKASAN: null-ptr-deref in range [0x0000000000000070-0x0000000000000077]\nCPU: 1 PID: 5079 Comm: syz-executor993 Not tainted 6.7.0-rc4-syzkaller-00141-g1ae4cd3cbdd0 #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023\nRIP: 0010:skb_segment+0x181d/0x3f30 net/core/skbuff.c:4551\nCode: 83 e3 02 e9 fb ed ff ff e8 90 68 1c f9 48 8b 84 24 f8 00 00 00 48 8d 78 70 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <0f> b6 04 02 84 c0 74 08 3c 03 0f 8e 8a 21 00 00 48 8b 84 24 f8 00\nRSP: 0018:ffffc900043473d0 EFLAGS: 00010202\nRAX: dffffc0000000000 RBX: 0000000000010046 RCX: ffffffff886b1597\nRDX: 000000000000000e RSI: ffffffff886b2520 RDI: 0000000000000070\nRBP: ffffc90004347578 R08: 0000000000000005 R09: 000000000000ffff\nR10: 000000000000ffff R11: 0000000000000002 R12: ffff888063202ac0\nR13: 0000000000010000 R14: 000000000000ffff R15: 0000000000000046\nFS: 0000555556e7e380(0000) GS:ffff8880b9900000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000000020010000 CR3: 0000000027ee2000 CR4: 00000000003506f0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n\nudp6_ufo_fragment+0xa0e/0xd00 net/ipv6/udp_offload.c:109\nipv6_gso_segment+0x534/0x17e0 net/ipv6/ip6_offload.c:120\nskb_mac_gso_segment+0x290/0x610 net/core/gso.c:53\n__skb_gso_segment+0x339/0x710 net/core/gso.c:124\nskb_gso_segment include/net/gso.h:83 [inline]\nvalidate_xmit_skb+0x36c/0xeb0 net/core/dev.c:3626\n__dev_queue_xmit+0x6f3/0x3d60 net/core/dev.c:4338\ndev_queue_xmit include/linux/netdevice.h:3134 [inline]\npacket_xmit+0x257/0x380 net/packet/af_packet.c:276\npacket_snd net/packet/af_packet.c:3087 [inline]\npacket_sendmsg+0x24c6/0x5220 net/packet/af_packet.c:3119\nsock_sendmsg_nosec net/socket.c:730 [inline]\n__sock_sendmsg+0xd5/0x180 net/socket.c:745\n__sys_sendto+0x255/0x340 net/socket.c:2190\n__do_sys_sendto net/socket.c:2202 [inline]\n__se_sys_sendto net/socket.c:2198 [inline]\n__x64_sys_sendto+0xe0/0x1b0 net/socket.c:2198\ndo_syscall_x64 arch/x86/entry/common.c:52 [inline]\ndo_syscall_64+0x40/0x110 arch/x86/entry/common.c:83\nentry_SYSCALL_64_after_hwframe+0x63/0x6b\nRIP: 0033:0x7f8692032aa9\nCode: 28 00 00 00 75 05 48 83 c4 28 c3 e8 d1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48\nRSP: 002b:00007fff8d685418 EFLAGS: 00000246 ORIG_RAX: 000000000000002c\nRAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00007f8692032aa9\nRDX: 0000000000010048 RSI: 00000000200000c0 RDI: 0000000000000003\nRBP: 00000000000f4240 R08: 0000000020000540 R09: 0000000000000014\nR10: 0000000000000000 R11: 0000000000000246 R12: 00007fff8d685480\nR13: 0000000000000001 R14: 00007fff8d685480 R15: 0000000000000003\n\nModules linked in:\n---[ end trace 0000000000000000 ]---\nRIP: 0010:skb_segment+0x181d/0x3f30 net/core/skbuff.c:4551\nCode: 83 e3 02 e9 fb ed ff ff e8 90 68 1c f9 48 8b 84 24 f8 00 00 00 48 8d 78 70 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <0f> b6 04 02 84 c0 74 08 3c 03 0f 8e 8a 21 00 00 48 8b 84 24 f8 00\nRSP: 0018:ffffc900043473d0 EFLAGS: 00010202\nRAX: dffffc0000000000 RBX: 0000000000010046 RCX: ffffffff886b1597\nRDX: 000000000000000e RSI: ffffffff886b2520 RDI: 0000000000000070\nRBP: ffffc90004347578 R0\n---truncated---", + "cmt_msg": "s390/ptrace: handle setting of fpc register correctly", + "fixes": "8b13601d19c541158a6e18b278c00ba69ae37829", + "last_affected_version": "6.7.3", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\ns390/ptrace: handle setting of fpc register correctly\n\nIf the content of the floating point control (fpc) register of a traced\nprocess is modified with the ptrace interface the new value is tested for\nvalidity by temporarily loading it into the fpc register.\n\nThis may lead to corruption of the fpc register of the tracing process:\nif an interrupt happens while the value is temporarily loaded into the\nfpc register, and within interrupt context floating point or vector\nregisters are used, the current fp/vx registers are saved with\nsave_fpu_regs() assuming they belong to user space and will be loaded into\nfp/vx registers when returning to user space.\n\ntest_fp_ctl() restores the original user space fpc register value, however\nit will be discarded, when returning to user space.\n\nIn result the tracer will incorrectly continue to run with the value that\nwas supposed to be used for the traced process.\n\nFix this by saving fpu register contents with save_fpu_regs() before using\ntest_fp_ctl().", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52435", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52435", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52435", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52435", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-52435", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-52435" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52598", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52598", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52598", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52598", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52598", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52598" + } + }, + "CVE-2023-52599": { + "affected_versions": "v2.6.12-rc2 to v6.8-rc1", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "jfs: fix array-index-out-of-bounds in diNewExt", + "fixes": "49f9637aafa6e63ba686c13cb8549bf5e6920402", + "last_affected_version": "6.7.3", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\njfs: fix array-index-out-of-bounds in diNewExt\n\n[Syz report]\nUBSAN: array-index-out-of-bounds in fs/jfs/jfs_imap.c:2360:2\nindex -878706688 is out of range for type 'struct iagctl[128]'\nCPU: 1 PID: 5065 Comm: syz-executor282 Not tainted 6.7.0-rc4-syzkaller-00009-gbee0e7762ad2 #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023\nCall Trace:\n \n __dump_stack lib/dump_stack.c:88 [inline]\n dump_stack_lvl+0x1e7/0x2d0 lib/dump_stack.c:106\n ubsan_epilogue lib/ubsan.c:217 [inline]\n __ubsan_handle_out_of_bounds+0x11c/0x150 lib/ubsan.c:348\n diNewExt+0x3cf3/0x4000 fs/jfs/jfs_imap.c:2360\n diAllocExt fs/jfs/jfs_imap.c:1949 [inline]\n diAllocAG+0xbe8/0x1e50 fs/jfs/jfs_imap.c:1666\n diAlloc+0x1d3/0x1760 fs/jfs/jfs_imap.c:1587\n ialloc+0x8f/0x900 fs/jfs/jfs_inode.c:56\n jfs_mkdir+0x1c5/0xb90 fs/jfs/namei.c:225\n vfs_mkdir+0x2f1/0x4b0 fs/namei.c:4106\n do_mkdirat+0x264/0x3a0 fs/namei.c:4129\n __do_sys_mkdir fs/namei.c:4149 [inline]\n __se_sys_mkdir fs/namei.c:4147 [inline]\n __x64_sys_mkdir+0x6e/0x80 fs/namei.c:4147\n do_syscall_x64 arch/x86/entry/common.c:51 [inline]\n do_syscall_64+0x45/0x110 arch/x86/entry/common.c:82\n entry_SYSCALL_64_after_hwframe+0x63/0x6b\nRIP: 0033:0x7fcb7e6a0b57\nCode: ff ff 77 07 31 c0 c3 0f 1f 40 00 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff c3 66 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48\nRSP: 002b:00007ffd83023038 EFLAGS: 00000286 ORIG_RAX: 0000000000000053\nRAX: ffffffffffffffda RBX: 00000000ffffffff RCX: 00007fcb7e6a0b57\nRDX: 00000000000a1020 RSI: 00000000000001ff RDI: 0000000020000140\nRBP: 0000000020000140 R08: 0000000000000000 R09: 0000000000000000\nR10: 0000000000000000 R11: 0000000000000286 R12: 00007ffd830230d0\nR13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000\n\n[Analysis]\nWhen the agstart is too large, it can cause agno overflow.\n\n[Fix]\nAfter obtaining agno, if the value is invalid, exit the subsequent process.\n\n\nModified the test from agno > MAXAG to agno >= MAXAG based on linux-next\nreport by kernel test robot (Dan Carpenter).", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52599", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52599", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52599", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52599", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52599", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52599" } }, - "CVE-2023-52436": { + "CVE-2023-52600": { "affected_versions": "v2.6.12-rc2 to v6.8-rc1", "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", - "cmt_msg": "f2fs: explicitly null-terminate the xattr list", - "fixes": "e26b6d39270f5eab0087453d9b544189a38c8564", - "last_affected_version": "6.7.0", - "last_modified": "2024-02-25", - "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nf2fs: explicitly null-terminate the xattr list\n\nWhen setting an xattr, explicitly null-terminate the xattr list. This\neliminates the fragile assumption that the unused xattr space is always\nzeroed.", + "cmt_msg": "jfs: fix uaf in jfs_evict_inode", + "fixes": "e0e1958f4c365e380b17ccb35617345b31ef7bf3", + "last_affected_version": "6.7.3", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\njfs: fix uaf in jfs_evict_inode\n\nWhen the execution of diMount(ipimap) fails, the object ipimap that has been\nreleased may be accessed in diFreeSpecial(). Asynchronous ipimap release occurs\nwhen rcu_core() calls jfs_free_node().\n\nTherefore, when diMount(ipimap) fails, sbi->ipimap should not be initialized as\nipimap.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52436", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52436", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52436", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52436", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-52436", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-52436" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52600", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52600", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52600", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52600", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52600", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52600" } }, - "CVE-2023-52438": { - "affected_versions": "v4.20-rc1 to v6.8-rc1", - "breaks": "dd2283f2605e", - "cmt_msg": "binder: fix use-after-free in shinker's callback", - "fixes": "3f489c2067c5824528212b0fc18b28d51332d906", - "last_affected_version": "6.7.0", - "last_modified": "2024-02-25", - "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbinder: fix use-after-free in shinker's callback\n\nThe mmap read lock is used during the shrinker's callback, which means\nthat using alloc->vma pointer isn't safe as it can race with munmap().\nAs of commit dd2283f2605e (\"mm: mmap: zap pages with read mmap_sem in\nmunmap\") the mmap lock is downgraded after the vma has been isolated.\n\nI was able to reproduce this issue by manually adding some delays and\ntriggering page reclaiming through the shrinker's debug sysfs. The\nfollowing KASAN report confirms the UAF:\n\n ==================================================================\n BUG: KASAN: slab-use-after-free in zap_page_range_single+0x470/0x4b8\n Read of size 8 at addr ffff356ed50e50f0 by task bash/478\n\n CPU: 1 PID: 478 Comm: bash Not tainted 6.6.0-rc5-00055-g1c8b86a3799f-dirty #70\n Hardware name: linux,dummy-virt (DT)\n Call trace:\n zap_page_range_single+0x470/0x4b8\n binder_alloc_free_page+0x608/0xadc\n __list_lru_walk_one+0x130/0x3b0\n list_lru_walk_node+0xc4/0x22c\n binder_shrink_scan+0x108/0x1dc\n shrinker_debugfs_scan_write+0x2b4/0x500\n full_proxy_write+0xd4/0x140\n vfs_write+0x1ac/0x758\n ksys_write+0xf0/0x1dc\n __arm64_sys_write+0x6c/0x9c\n\n Allocated by task 492:\n kmem_cache_alloc+0x130/0x368\n vm_area_alloc+0x2c/0x190\n mmap_region+0x258/0x18bc\n do_mmap+0x694/0xa60\n vm_mmap_pgoff+0x170/0x29c\n ksys_mmap_pgoff+0x290/0x3a0\n __arm64_sys_mmap+0xcc/0x144\n\n Freed by task 491:\n kmem_cache_free+0x17c/0x3c8\n vm_area_free_rcu_cb+0x74/0x98\n rcu_core+0xa38/0x26d4\n rcu_core_si+0x10/0x1c\n __do_softirq+0x2fc/0xd24\n\n Last potentially related work creation:\n __call_rcu_common.constprop.0+0x6c/0xba0\n call_rcu+0x10/0x1c\n vm_area_free+0x18/0x24\n remove_vma+0xe4/0x118\n do_vmi_align_munmap.isra.0+0x718/0xb5c\n do_vmi_munmap+0xdc/0x1fc\n __vm_munmap+0x10c/0x278\n __arm64_sys_munmap+0x58/0x7c\n\nFix this issue by performing instead a vma_lookup() which will fail to\nfind the vma that was isolated before the mmap lock downgrade. Note that\nthis option has better performance than upgrading to a mmap write lock\nwhich would increase contention. Plus, mmap_write_trylock() has been\nrecently removed anyway.", + "CVE-2023-52601": { + "affected_versions": "unk to v6.8-rc1", + "breaks": "", + "cmt_msg": "jfs: fix array-index-out-of-bounds in dbAdjTree", + "fixes": "74ecdda68242b174920fe7c6133a856fb7d8559b", + "last_affected_version": "6.7.3", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\njfs: fix array-index-out-of-bounds in dbAdjTree\n\nCurrently there is a bound check missing in the dbAdjTree while\naccessing the dmt_stree. To add the required check added the bool is_ctl\nwhich is required to determine the size as suggest in the following\ncommit.\nhttps://lore.kernel.org/linux-kernel-mentees/f9475918-2186-49b8-b801-6f0f9e75f4fa@oracle.com/", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52438", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52438", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52438", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52438", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-52438", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-52438" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52601", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52601", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52601", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52601", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52601", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52601" } }, - "CVE-2023-52439": { - "affected_versions": "v4.18-rc5 to v6.8-rc1", - "breaks": "57c5f4df0a5a", - "cmt_msg": "uio: Fix use-after-free in uio_open", - "fixes": "0c9ae0b8605078eafc3bea053cc78791e97ba2e2", - "last_affected_version": "6.7.0", - "last_modified": "2024-02-25", - "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nuio: Fix use-after-free in uio_open\n\ncore-1\t\t\t\tcore-2\n-------------------------------------------------------\nuio_unregister_device\t\tuio_open\n\t\t\t\tidev = idr_find()\ndevice_unregister(&idev->dev)\nput_device(&idev->dev)\nuio_device_release\n\t\t\t\tget_device(&idev->dev)\nkfree(idev)\nuio_free_minor(minor)\n\t\t\t\tuio_release\n\t\t\t\tput_device(&idev->dev)\n\t\t\t\tkfree(idev)\n-------------------------------------------------------\n\nIn the core-1 uio_unregister_device(), the device_unregister will kfree\nidev when the idev->dev kobject ref is 1. But after core-1\ndevice_unregister, put_device and before doing kfree, the core-2 may\nget_device. Then:\n1. After core-1 kfree idev, the core-2 will do use-after-free for idev.\n2. When core-2 do uio_release and put_device, the idev will be double\n freed.\n\nTo address this issue, we can get idev atomic & inc idev reference with\nminor_lock.", + "CVE-2023-52602": { + "affected_versions": "v2.6.12-rc2 to v6.8-rc1", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "jfs: fix slab-out-of-bounds Read in dtSearch", + "fixes": "fa5492ee89463a7590a1449358002ff7ef63529f", + "last_affected_version": "6.7.3", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\njfs: fix slab-out-of-bounds Read in dtSearch\n\nCurrently while searching for current page in the sorted entry table\nof the page there is a out of bound access. Added a bound check to fix\nthe error.\n\nDave:\nSet return code to -EIO", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52439", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52439", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52439", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52439", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-52439", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-52439" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52602", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52602", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52602", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52602", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52602", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52602" } }, - "CVE-2023-52440": { - "affected_versions": "v5.17-rc4 to v6.6-rc1", - "breaks": "f9929ef6a2a55f03aac61248c6a3a987b8546f2a", - "cmt_msg": "ksmbd: fix slub overflow in ksmbd_decode_ntlmssp_auth_blob()", - "fixes": "4b081ce0d830b684fdf967abc3696d1261387254", - "last_affected_version": "6.5.1", - "last_modified": "2024-02-25", - "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nksmbd: fix slub overflow in ksmbd_decode_ntlmssp_auth_blob()\n\nIf authblob->SessionKey.Length is bigger than session key\nsize(CIFS_KEY_SIZE), slub overflow can happen in key exchange codes.\ncifs_arc4_crypt copy to session key array from SessionKey from client.", + "CVE-2023-52603": { + "affected_versions": "v2.6.12-rc2 to v6.8-rc1", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "UBSAN: array-index-out-of-bounds in dtSplitRoot", + "fixes": "27e56f59bab5ddafbcfe69ad7a4a6ea1279c1b16", + "last_affected_version": "6.7.3", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nUBSAN: array-index-out-of-bounds in dtSplitRoot\n\nSyzkaller reported the following issue:\n\noop0: detected capacity change from 0 to 32768\n\nUBSAN: array-index-out-of-bounds in fs/jfs/jfs_dtree.c:1971:9\nindex -2 is out of range for type 'struct dtslot [128]'\nCPU: 0 PID: 3613 Comm: syz-executor270 Not tainted 6.0.0-syzkaller-09423-g493ffd6605b2 #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022\nCall Trace:\n \n __dump_stack lib/dump_stack.c:88 [inline]\n dump_stack_lvl+0x1b1/0x28e lib/dump_stack.c:106\n ubsan_epilogue lib/ubsan.c:151 [inline]\n __ubsan_handle_out_of_bounds+0xdb/0x130 lib/ubsan.c:283\n dtSplitRoot+0x8d8/0x1900 fs/jfs/jfs_dtree.c:1971\n dtSplitUp fs/jfs/jfs_dtree.c:985 [inline]\n dtInsert+0x1189/0x6b80 fs/jfs/jfs_dtree.c:863\n jfs_mkdir+0x757/0xb00 fs/jfs/namei.c:270\n vfs_mkdir+0x3b3/0x590 fs/namei.c:4013\n do_mkdirat+0x279/0x550 fs/namei.c:4038\n __do_sys_mkdirat fs/namei.c:4053 [inline]\n __se_sys_mkdirat fs/namei.c:4051 [inline]\n __x64_sys_mkdirat+0x85/0x90 fs/namei.c:4051\n do_syscall_x64 arch/x86/entry/common.c:50 [inline]\n do_syscall_64+0x3d/0xb0 arch/x86/entry/common.c:80\n entry_SYSCALL_64_after_hwframe+0x63/0xcd\nRIP: 0033:0x7fcdc0113fd9\nCode: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48\nRSP: 002b:00007ffeb8bc67d8 EFLAGS: 00000246 ORIG_RAX: 0000000000000102\nRAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fcdc0113fd9\nRDX: 0000000000000000 RSI: 0000000020000340 RDI: 0000000000000003\nRBP: 00007fcdc00d37a0 R08: 0000000000000000 R09: 00007fcdc00d37a0\nR10: 00005555559a72c0 R11: 0000000000000246 R12: 00000000f8008000\nR13: 0000000000000000 R14: 00083878000000f8 R15: 0000000000000000\n \n\nThe issue is caused when the value of fsi becomes less than -1.\nThe check to break the loop when fsi value becomes -1 is present\nbut syzbot was able to produce value less than -1 which cause the error.\nThis patch simply add the change for the values less than 0.\n\nThe patch is tested via syzbot.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52440", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52440", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52440", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52440", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-52440", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-52440" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52603", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52603", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52603", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52603", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52603", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52603" } }, - "CVE-2023-52441": { - "affected_versions": "v5.15-rc1 to v6.5-rc4", - "breaks": "e2f34481b24db2fd634b5edb0a5bd0e4d38cc6e9", - "cmt_msg": "ksmbd: fix out of bounds in init_smb2_rsp_hdr()", - "fixes": "536bb492d39bb6c080c92f31e8a55fe9934f452b", - "last_affected_version": "6.4.15", - "last_modified": "2024-02-25", - "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nksmbd: fix out of bounds in init_smb2_rsp_hdr()\n\nIf client send smb2 negotiate request and then send smb1 negotiate\nrequest, init_smb2_rsp_hdr is called for smb1 negotiate request since\nneed_neg is set to false. This patch ignore smb1 packets after ->need_neg\nis set to false.", + "CVE-2023-52604": { + "affected_versions": "v2.6.12-rc2 to v6.8-rc1", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "FS:JFS:UBSAN:array-index-out-of-bounds in dbAdjTree", + "fixes": "9862ec7ac1cbc6eb5ee4a045b5d5b8edbb2f7e68", + "last_affected_version": "6.7.3", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nFS:JFS:UBSAN:array-index-out-of-bounds in dbAdjTree\n\nSyzkaller reported the following issue:\n\nUBSAN: array-index-out-of-bounds in fs/jfs/jfs_dmap.c:2867:6\nindex 196694 is out of range for type 's8[1365]' (aka 'signed char[1365]')\nCPU: 1 PID: 109 Comm: jfsCommit Not tainted 6.6.0-rc3-syzkaller #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023\nCall Trace:\n \n __dump_stack lib/dump_stack.c:88 [inline]\n dump_stack_lvl+0x1e7/0x2d0 lib/dump_stack.c:106\n ubsan_epilogue lib/ubsan.c:217 [inline]\n __ubsan_handle_out_of_bounds+0x11c/0x150 lib/ubsan.c:348\n dbAdjTree+0x474/0x4f0 fs/jfs/jfs_dmap.c:2867\n dbJoin+0x210/0x2d0 fs/jfs/jfs_dmap.c:2834\n dbFreeBits+0x4eb/0xda0 fs/jfs/jfs_dmap.c:2331\n dbFreeDmap fs/jfs/jfs_dmap.c:2080 [inline]\n dbFree+0x343/0x650 fs/jfs/jfs_dmap.c:402\n txFreeMap+0x798/0xd50 fs/jfs/jfs_txnmgr.c:2534\n txUpdateMap+0x342/0x9e0\n txLazyCommit fs/jfs/jfs_txnmgr.c:2664 [inline]\n jfs_lazycommit+0x47a/0xb70 fs/jfs/jfs_txnmgr.c:2732\n kthread+0x2d3/0x370 kernel/kthread.c:388\n ret_from_fork+0x48/0x80 arch/x86/kernel/process.c:147\n ret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:304\n \n================================================================================\nKernel panic - not syncing: UBSAN: panic_on_warn set ...\nCPU: 1 PID: 109 Comm: jfsCommit Not tainted 6.6.0-rc3-syzkaller #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023\nCall Trace:\n \n __dump_stack lib/dump_stack.c:88 [inline]\n dump_stack_lvl+0x1e7/0x2d0 lib/dump_stack.c:106\n panic+0x30f/0x770 kernel/panic.c:340\n check_panic_on_warn+0x82/0xa0 kernel/panic.c:236\n ubsan_epilogue lib/ubsan.c:223 [inline]\n __ubsan_handle_out_of_bounds+0x13c/0x150 lib/ubsan.c:348\n dbAdjTree+0x474/0x4f0 fs/jfs/jfs_dmap.c:2867\n dbJoin+0x210/0x2d0 fs/jfs/jfs_dmap.c:2834\n dbFreeBits+0x4eb/0xda0 fs/jfs/jfs_dmap.c:2331\n dbFreeDmap fs/jfs/jfs_dmap.c:2080 [inline]\n dbFree+0x343/0x650 fs/jfs/jfs_dmap.c:402\n txFreeMap+0x798/0xd50 fs/jfs/jfs_txnmgr.c:2534\n txUpdateMap+0x342/0x9e0\n txLazyCommit fs/jfs/jfs_txnmgr.c:2664 [inline]\n jfs_lazycommit+0x47a/0xb70 fs/jfs/jfs_txnmgr.c:2732\n kthread+0x2d3/0x370 kernel/kthread.c:388\n ret_from_fork+0x48/0x80 arch/x86/kernel/process.c:147\n ret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:304\n \nKernel Offset: disabled\nRebooting in 86400 seconds..\n\nThe issue is caused when the value of lp becomes greater than\nCTLTREESIZE which is the max size of stree. Adding a simple check\nsolves this issue.\n\nDave:\nAs the function returns a void, good error handling\nwould require a more intrusive code reorganization, so I modified\nOsama's patch at use WARN_ON_ONCE for lack of a cleaner option.\n\nThe patch is tested via syzbot.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52441", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52441", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52441", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52441", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-52441", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-52441" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52604", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52604", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52604", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52604", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52604", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52604" } }, - "CVE-2023-52442": { - "affected_versions": "v2.6.12-rc2 to v6.5-rc4", + "CVE-2023-52606": { + "affected_versions": "v2.6.12-rc2 to v6.8-rc1", "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", - "cmt_msg": "ksmbd: validate session id and tree id in compound request", - "fixes": "3df0411e132ee74a87aa13142dfd2b190275332e", - "last_affected_version": "6.4.15", - "last_modified": "2024-02-25", - "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nksmbd: validate session id and tree id in compound request\n\n`smb2_get_msg()` in smb2_get_ksmbd_tcon() and smb2_check_user_session()\nwill always return the first request smb2 header in a compound request.\nif `SMB2_TREE_CONNECT_HE` is the first command in compound request, will\nreturn 0, i.e. The tree id check is skipped.\nThis patch use ksmbd_req_buf_next() to get current command in compound.", + "cmt_msg": "powerpc/lib: Validate size for vector operations", + "fixes": "8f9abaa6d7de0a70fc68acaedce290c1f96e2e59", + "last_affected_version": "6.7.3", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\npowerpc/lib: Validate size for vector operations\n\nSome of the fp/vmx code in sstep.c assume a certain maximum size for the\ninstructions being emulated. The size of those operations however is\ndetermined separately in analyse_instr().\n\nAdd a check to validate the assumption on the maximum size of the\noperations, so as to prevent any unintended kernel stack corruption.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52606", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52606", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52606", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52606", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52606", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52606" + } + }, + "CVE-2023-52607": { + "affected_versions": "v2.6.33-rc1 to v6.8-rc1", + "breaks": "a0668cdc154e54bf0c85182e0535eea237d53146", + "cmt_msg": "powerpc/mm: Fix null-pointer dereference in pgtable_cache_add", + "fixes": "f46c8a75263f97bda13c739ba1c90aced0d3b071", + "last_affected_version": "6.7.3", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\npowerpc/mm: Fix null-pointer dereference in pgtable_cache_add\n\nkasprintf() returns a pointer to dynamically allocated memory\nwhich can be NULL upon failure. Ensure the allocation was successful\nby checking the pointer validity.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52607", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52607", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52607", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52607", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52607", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52607" + } + }, + "CVE-2023-52608": { + "affected_versions": "v5.7-rc1 to v6.8-rc2", + "breaks": "5c8a47a5a91d4d6e185f758d61997613d9c5d6ac", + "cmt_msg": "firmware: arm_scmi: Check mailbox/SMT channel for consistency", + "fixes": "437a310b22244d4e0b78665c3042e5d1c0f45306", + "last_affected_version": "6.7.2", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfirmware: arm_scmi: Check mailbox/SMT channel for consistency\n\nOn reception of a completion interrupt the shared memory area is accessed\nto retrieve the message header at first and then, if the message sequence\nnumber identifies a transaction which is still pending, the related\npayload is fetched too.\n\nWhen an SCMI command times out the channel ownership remains with the\nplatform until eventually a late reply is received and, as a consequence,\nany further transmission attempt remains pending, waiting for the channel\nto be relinquished by the platform.\n\nOnce that late reply is received the channel ownership is given back\nto the agent and any pending request is then allowed to proceed and\noverwrite the SMT area of the just delivered late reply; then the wait\nfor the reply to the new request starts.\n\nIt has been observed that the spurious IRQ related to the late reply can\nbe wrongly associated with the freshly enqueued request: when that happens\nthe SCMI stack in-flight lookup procedure is fooled by the fact that the\nmessage header now present in the SMT area is related to the new pending\ntransaction, even though the real reply has still to arrive.\n\nThis race-condition on the A2P channel can be detected by looking at the\nchannel status bits: a genuine reply from the platform will have set the\nchannel free bit before triggering the completion IRQ.\n\nAdd a consistency check to validate such condition in the A2P ISR.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52442", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52442", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52442", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52442", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-52442", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-52442" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52608", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52608", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52608", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52608", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52608", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52608" } }, - "CVE-2023-52443": { - "affected_versions": "v4.11-rc1 to v6.8-rc1", - "breaks": "04dc715e24d0", - "cmt_msg": "apparmor: avoid crash when parsed profile name is empty", - "fixes": "55a8210c9e7d21ff2644809699765796d4bfb200", + "CVE-2023-52609": { + "affected_versions": "unk to v6.8-rc1", + "breaks": "", + "cmt_msg": "binder: fix race between mmput() and do_exit()", + "fixes": "9a9ab0d963621d9d12199df9817e66982582d5a5", "last_affected_version": "6.7.1", - "last_modified": "2024-02-25", - "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\napparmor: avoid crash when parsed profile name is empty\n\nWhen processing a packed profile in unpack_profile() described like\n\n \"profile :ns::samba-dcerpcd /usr/lib*/samba/{,samba/}samba-dcerpcd {...}\"\n\na string \":samba-dcerpcd\" is unpacked as a fully-qualified name and then\npassed to aa_splitn_fqname().\n\naa_splitn_fqname() treats \":samba-dcerpcd\" as only containing a namespace.\nThus it returns NULL for tmpname, meanwhile tmpns is non-NULL. Later\naa_alloc_profile() crashes as the new profile name is NULL now.\n\ngeneral protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] PREEMPT SMP KASAN NOPTI\nKASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007]\nCPU: 6 PID: 1657 Comm: apparmor_parser Not tainted 6.7.0-rc2-dirty #16\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.2-3-gd478f380-rebuilt.opensuse.org 04/01/2014\nRIP: 0010:strlen+0x1e/0xa0\nCall Trace:\n \n ? strlen+0x1e/0xa0\n aa_policy_init+0x1bb/0x230\n aa_alloc_profile+0xb1/0x480\n unpack_profile+0x3bc/0x4960\n aa_unpack+0x309/0x15e0\n aa_replace_profiles+0x213/0x33c0\n policy_update+0x261/0x370\n profile_replace+0x20e/0x2a0\n vfs_write+0x2af/0xe00\n ksys_write+0x126/0x250\n do_syscall_64+0x46/0xf0\n entry_SYSCALL_64_after_hwframe+0x6e/0x76\n \n---[ end trace 0000000000000000 ]---\nRIP: 0010:strlen+0x1e/0xa0\n\nIt seems such behaviour of aa_splitn_fqname() is expected and checked in\nother places where it is called (e.g. aa_remove_profiles). Well, there\nis an explicit comment \"a ns name without a following profile is allowed\"\ninside.\n\nAFAICS, nothing can prevent unpacked \"name\" to be in form like\n\":samba-dcerpcd\" - it is passed from userspace.\n\nDeny the whole profile set replacement in such case and inform user with\nEPROTO and an explaining message.\n\nFound by Linux Verification Center (linuxtesting.org).", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbinder: fix race between mmput() and do_exit()\n\nTask A calls binder_update_page_range() to allocate and insert pages on\na remote address space from Task B. For this, Task A pins the remote mm\nvia mmget_not_zero() first. This can race with Task B do_exit() and the\nfinal mmput() refcount decrement will come from Task A.\n\n Task A | Task B\n ------------------+------------------\n mmget_not_zero() |\n | do_exit()\n | exit_mm()\n | mmput()\n mmput() |\n exit_mmap() |\n remove_vma() |\n fput() |\n\nIn this case, the work of ____fput() from Task B is queued up in Task A\nas TWA_RESUME. So in theory, Task A returns to userspace and the cleanup\nwork gets executed. However, Task A instead sleep, waiting for a reply\nfrom Task B that never comes (it's dead).\n\nThis means the binder_deferred_release() is blocked until an unrelated\nbinder event forces Task A to go back to userspace. All the associated\ndeath notifications will also be delayed until then.\n\nIn order to fix this use mmput_async() that will schedule the work in\nthe corresponding mm->async_put_work WQ instead of Task A.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52609", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52609", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52609", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52609", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52609", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52609" + } + }, + "CVE-2023-52610": { + "affected_versions": "v5.3-rc1 to v6.8-rc1", + "breaks": "b57dc7c13ea90e09ae15f821d2583fa0231b4935", + "cmt_msg": "net/sched: act_ct: fix skb leak and crash on ooo frags", + "fixes": "3f14b377d01d8357eba032b4cabc8c1149b458b6", + "last_affected_version": "6.7.1", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: act_ct: fix skb leak and crash on ooo frags\n\nact_ct adds skb->users before defragmentation. If frags arrive in order,\nthe last frag's reference is reset in:\n\n inet_frag_reasm_prepare\n skb_morph\n\nwhich is not straightforward.\n\nHowever when frags arrive out of order, nobody unref the last frag, and\nall frags are leaked. The situation is even worse, as initiating packet\ncapture can lead to a crash[0] when skb has been cloned and shared at the\nsame time.\n\nFix the issue by removing skb_get() before defragmentation. act_ct\nreturns TC_ACT_CONSUMED when defrag failed or in progress.\n\n[0]:\n[ 843.804823] ------------[ cut here ]------------\n[ 843.809659] kernel BUG at net/core/skbuff.c:2091!\n[ 843.814516] invalid opcode: 0000 [#1] PREEMPT SMP\n[ 843.819296] CPU: 7 PID: 0 Comm: swapper/7 Kdump: loaded Tainted: G S 6.7.0-rc3 #2\n[ 843.824107] Hardware name: XFUSION 1288H V6/BC13MBSBD, BIOS 1.29 11/25/2022\n[ 843.828953] RIP: 0010:pskb_expand_head+0x2ac/0x300\n[ 843.833805] Code: 8b 70 28 48 85 f6 74 82 48 83 c6 08 bf 01 00 00 00 e8 38 bd ff ff 8b 83 c0 00 00 00 48 03 83 c8 00 00 00 e9 62 ff ff ff 0f 0b <0f> 0b e8 8d d0 ff ff e9 b3 fd ff ff 81 7c 24 14 40 01 00 00 4c 89\n[ 843.843698] RSP: 0018:ffffc9000cce07c0 EFLAGS: 00010202\n[ 843.848524] RAX: 0000000000000002 RBX: ffff88811a211d00 RCX: 0000000000000820\n[ 843.853299] RDX: 0000000000000640 RSI: 0000000000000000 RDI: ffff88811a211d00\n[ 843.857974] RBP: ffff888127d39518 R08: 00000000bee97314 R09: 0000000000000000\n[ 843.862584] R10: 0000000000000000 R11: ffff8881109f0000 R12: 0000000000000880\n[ 843.867147] R13: ffff888127d39580 R14: 0000000000000640 R15: ffff888170f7b900\n[ 843.871680] FS: 0000000000000000(0000) GS:ffff889ffffc0000(0000) knlGS:0000000000000000\n[ 843.876242] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 843.880778] CR2: 00007fa42affcfb8 CR3: 000000011433a002 CR4: 0000000000770ef0\n[ 843.885336] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n[ 843.889809] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n[ 843.894229] PKRU: 55555554\n[ 843.898539] Call Trace:\n[ 843.902772] \n[ 843.906922] ? __die_body+0x1e/0x60\n[ 843.911032] ? die+0x3c/0x60\n[ 843.915037] ? do_trap+0xe2/0x110\n[ 843.918911] ? pskb_expand_head+0x2ac/0x300\n[ 843.922687] ? do_error_trap+0x65/0x80\n[ 843.926342] ? pskb_expand_head+0x2ac/0x300\n[ 843.929905] ? exc_invalid_op+0x50/0x60\n[ 843.933398] ? pskb_expand_head+0x2ac/0x300\n[ 843.936835] ? asm_exc_invalid_op+0x1a/0x20\n[ 843.940226] ? pskb_expand_head+0x2ac/0x300\n[ 843.943580] inet_frag_reasm_prepare+0xd1/0x240\n[ 843.946904] ip_defrag+0x5d4/0x870\n[ 843.950132] nf_ct_handle_fragments+0xec/0x130 [nf_conntrack]\n[ 843.953334] tcf_ct_act+0x252/0xd90 [act_ct]\n[ 843.956473] ? tcf_mirred_act+0x516/0x5a0 [act_mirred]\n[ 843.959657] tcf_action_exec+0xa1/0x160\n[ 843.962823] fl_classify+0x1db/0x1f0 [cls_flower]\n[ 843.966010] ? skb_clone+0x53/0xc0\n[ 843.969173] tcf_classify+0x24d/0x420\n[ 843.972333] tc_run+0x8f/0xf0\n[ 843.975465] __netif_receive_skb_core+0x67a/0x1080\n[ 843.978634] ? dev_gro_receive+0x249/0x730\n[ 843.981759] __netif_receive_skb_list_core+0x12d/0x260\n[ 843.984869] netif_receive_skb_list_internal+0x1cb/0x2f0\n[ 843.987957] ? mlx5e_handle_rx_cqe_mpwrq_rep+0xfa/0x1a0 [mlx5_core]\n[ 843.991170] napi_complete_done+0x72/0x1a0\n[ 843.994305] mlx5e_napi_poll+0x28c/0x6d0 [mlx5_core]\n[ 843.997501] __napi_poll+0x25/0x1b0\n[ 844.000627] net_rx_action+0x256/0x330\n[ 844.003705] __do_softirq+0xb3/0x29b\n[ 844.006718] irq_exit_rcu+0x9e/0xc0\n[ 844.009672] common_interrupt+0x86/0xa0\n[ 844.012537] \n[ 844.015285] \n[ 844.017937] asm_common_interrupt+0x26/0x40\n[ 844.020591] RIP: 0010:acpi_safe_halt+0x1b/0x20\n[ 844.023247] Code: ff 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 65 48 8b 04 25 00 18 03 00 48 8b 00 a8 08 75 0c 66 90 0f 00 2d 81 d0 44 00 fb\n---truncated---", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52610", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52610", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52610", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52610", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52610", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52610" + } + }, + "CVE-2023-52611": { + "affected_versions": "v6.4-rc1 to v6.8-rc1", + "breaks": "65371a3f14e73979958aea0db1e3bb456a296149", + "cmt_msg": "wifi: rtw88: sdio: Honor the host max_req_size in the RX path", + "fixes": "00384f565a91c08c4bedae167f749b093d10e3fe", + "last_affected_version": "6.7.1", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: rtw88: sdio: Honor the host max_req_size in the RX path\n\nLukas reports skb_over_panic errors on his Banana Pi BPI-CM4 which comes\nwith an Amlogic A311D (G12B) SoC and a RTL8822CS SDIO wifi/Bluetooth\ncombo card. The error he observed is identical to what has been fixed\nin commit e967229ead0e (\"wifi: rtw88: sdio: Check the HISR RX_REQUEST\nbit in rtw_sdio_rx_isr()\") but that commit didn't fix Lukas' problem.\n\nLukas found that disabling or limiting RX aggregation works around the\nproblem for some time (but does not fully fix it). In the following\ndiscussion a few key topics have been discussed which have an impact on\nthis problem:\n- The Amlogic A311D (G12B) SoC has a hardware bug in the SDIO controller\n which prevents DMA transfers. Instead all transfers need to go through\n the controller SRAM which limits transfers to 1536 bytes\n- rtw88 chips don't split incoming (RX) packets, so if a big packet is\n received this is forwarded to the host in it's original form\n- rtw88 chips can do RX aggregation, meaning more multiple incoming\n packets can be pulled by the host from the card with one MMC/SDIO\n transfer. This Depends on settings in the REG_RXDMA_AGG_PG_TH\n register (BIT_RXDMA_AGG_PG_TH limits the number of packets that will\n be aggregated, BIT_DMA_AGG_TO_V1 configures a timeout for aggregation\n and BIT_EN_PRE_CALC makes the chip honor the limits more effectively)\n\nUse multiple consecutive reads in rtw_sdio_read_port() and limit the\nnumber of bytes which are copied by the host from the card in one\nMMC/SDIO transfer. This allows receiving a buffer that's larger than\nthe hosts max_req_size (number of bytes which can be transferred in\none MMC/SDIO transfer). As a result of this the skb_over_panic error\nis gone as the rtw88 driver is now able to receive more than 1536 bytes\nfrom the card (either because the incoming packet is larger than that\nor because multiple packets have been aggregated).\n\nIn case of an receive errors (-EILSEQ has been observed by Lukas) we\nneed to drain the remaining data from the card's buffer, otherwise the\ncard will return corrupt data for the next rtw_sdio_read_port() call.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52611", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52611", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52611", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52611", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52611", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52611" + } + }, + "CVE-2023-52612": { + "affected_versions": "v4.10-rc1 to v6.8-rc1", + "breaks": "1ab53a77b772bf7369464a0e4fa6fd6499acf8f1", + "cmt_msg": "crypto: scomp - fix req->dst buffer overflow", + "fixes": "744e1885922a9943458954cfea917b31064b4131", + "last_affected_version": "6.7.1", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: scomp - fix req->dst buffer overflow\n\nThe req->dst buffer size should be checked before copying from the\nscomp_scratch->dst to avoid req->dst buffer overflow problem.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52443", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52443", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52443", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52443", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-52443", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-52443" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52612", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52612", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52612", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52612", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52612", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52612" } }, - "CVE-2023-52444": { - "affected_versions": "v4.2-rc1 to v6.8-rc1", - "breaks": "7e01e7ad746b", - "cmt_msg": "f2fs: fix to avoid dirent corruption", - "fixes": "53edb549565f55ccd0bdf43be3d66ce4c2d48b28", + "CVE-2023-52613": { + "affected_versions": "v6.6-rc1 to v6.8-rc1", + "breaks": "e7e3a7c35791fe7a70997883fb8ada5866a40f4d", + "cmt_msg": "drivers/thermal/loongson2_thermal: Fix incorrect PTR_ERR() judgment", + "fixes": "15ef92e9c41124ee9d88b01208364f3fe1f45f84", "last_affected_version": "6.7.1", - "last_modified": "2024-02-25", - "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nf2fs: fix to avoid dirent corruption\n\nAs Al reported in link[1]:\n\nf2fs_rename()\n...\n\tif (old_dir != new_dir && !whiteout)\n\t\tf2fs_set_link(old_inode, old_dir_entry,\n\t\t\t\t\told_dir_page, new_dir);\n\telse\n\t\tf2fs_put_page(old_dir_page, 0);\n\nYou want correct inumber in the \"..\" link. And cross-directory\nrename does move the source to new parent, even if you'd been asked\nto leave a whiteout in the old place.\n\n[1] https://lore.kernel.org/all/20231017055040.GN800259@ZenIV/\n\nWith below testcase, it may cause dirent corruption, due to it missed\nto call f2fs_set_link() to update \"..\" link to new directory.\n- mkdir -p dir/foo\n- renameat2 -w dir/foo bar\n\n[ASSERT] (__chk_dots_dentries:1421) --> Bad inode number[0x4] for '..', parent parent ino is [0x3]\n[FSCK] other corrupted bugs [Fail]", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrivers/thermal/loongson2_thermal: Fix incorrect PTR_ERR() judgment\n\nPTR_ERR() returns -ENODEV when thermal-zones are undefined, and we need\n-ENODEV as the right value for comparison.\n\nOtherwise, tz->type is NULL when thermal-zones is undefined, resulting\nin the following error:\n\n[ 12.290030] CPU 1 Unable to handle kernel paging request at virtual address fffffffffffffff1, era == 900000000355f410, ra == 90000000031579b8\n[ 12.302877] Oops[#1]:\n[ 12.305190] CPU: 1 PID: 181 Comm: systemd-udevd Not tainted 6.6.0-rc7+ #5385\n[ 12.312304] pc 900000000355f410 ra 90000000031579b8 tp 90000001069e8000 sp 90000001069eba10\n[ 12.320739] a0 0000000000000000 a1 fffffffffffffff1 a2 0000000000000014 a3 0000000000000001\n[ 12.329173] a4 90000001069eb990 a5 0000000000000001 a6 0000000000001001 a7 900000010003431c\n[ 12.337606] t0 fffffffffffffff1 t1 54567fd5da9b4fd4 t2 900000010614ec40 t3 00000000000dc901\n[ 12.346041] t4 0000000000000000 t5 0000000000000004 t6 900000010614ee20 t7 900000000d00b790\n[ 12.354472] t8 00000000000dc901 u0 54567fd5da9b4fd4 s9 900000000402ae10 s0 900000010614ec40\n[ 12.362916] s1 90000000039fced0 s2 ffffffffffffffed s3 ffffffffffffffed s4 9000000003acc000\n[ 12.362931] s5 0000000000000004 s6 fffffffffffff000 s7 0000000000000490 s8 90000001028b2ec8\n[ 12.362938] ra: 90000000031579b8 thermal_add_hwmon_sysfs+0x258/0x300\n[ 12.386411] ERA: 900000000355f410 strscpy+0xf0/0x160\n[ 12.391626] CRMD: 000000b0 (PLV0 -IE -DA +PG DACF=CC DACM=CC -WE)\n[ 12.397898] PRMD: 00000004 (PPLV0 +PIE -PWE)\n[ 12.403678] EUEN: 00000000 (-FPE -SXE -ASXE -BTE)\n[ 12.409859] ECFG: 00071c1c (LIE=2-4,10-12 VS=7)\n[ 12.415882] ESTAT: 00010000 [PIL] (IS= ECode=1 EsubCode=0)\n[ 12.415907] BADV: fffffffffffffff1\n[ 12.415911] PRID: 0014a000 (Loongson-64bit, Loongson-2K1000)\n[ 12.415917] Modules linked in: loongson2_thermal(+) vfat fat uio_pdrv_genirq uio fuse zram zsmalloc\n[ 12.415950] Process systemd-udevd (pid: 181, threadinfo=00000000358b9718, task=00000000ace72fe3)\n[ 12.415961] Stack : 0000000000000dc0 54567fd5da9b4fd4 900000000402ae10 9000000002df9358\n[ 12.415982] ffffffffffffffed 0000000000000004 9000000107a10aa8 90000001002a3410\n[ 12.415999] ffffffffffffffed ffffffffffffffed 9000000107a11268 9000000003157ab0\n[ 12.416016] 9000000107a10aa8 ffffff80020fc0c8 90000001002a3410 ffffffffffffffed\n[ 12.416032] 0000000000000024 ffffff80020cc1e8 900000000402b2a0 9000000003acc000\n[ 12.416048] 90000001002a3410 0000000000000000 ffffff80020f4030 90000001002a3410\n[ 12.416065] 0000000000000000 9000000002df6808 90000001002a3410 0000000000000000\n[ 12.416081] ffffff80020f4030 0000000000000000 90000001002a3410 9000000002df2ba8\n[ 12.416097] 00000000000000b4 90000001002a34f4 90000001002a3410 0000000000000002\n[ 12.416114] ffffff80020f4030 fffffffffffffff0 90000001002a3410 9000000002df2f30\n[ 12.416131] ...\n[ 12.416138] Call Trace:\n[ 12.416142] [<900000000355f410>] strscpy+0xf0/0x160\n[ 12.416167] [<90000000031579b8>] thermal_add_hwmon_sysfs+0x258/0x300\n[ 12.416183] [<9000000003157ab0>] devm_thermal_add_hwmon_sysfs+0x50/0xe0\n[ 12.416200] [] loongson2_thermal_probe+0x128/0x200 [loongson2_thermal]\n[ 12.416232] [<9000000002df6808>] platform_probe+0x68/0x140\n[ 12.416249] [<9000000002df2ba8>] really_probe+0xc8/0x3c0\n[ 12.416269] [<9000000002df2f30>] __driver_probe_device+0x90/0x180\n[ 12.416286] [<9000000002df3058>] driver_probe_device+0x38/0x160\n[ 12.416302] [<9000000002df33a8>] __driver_attach+0xa8/0x200\n[ 12.416314] [<9000000002deffec>] bus_for_each_dev+0x8c/0x120\n[ 12.416330] [<9000000002df198c>] bus_add_driver+0x10c/0x2a0\n[ 12.416346] [<9000000002df46b4>] driver_register+0x74/0x160\n[ 12.416358] [<90000000022201a4>] do_one_initcall+0x84/0x220\n[ 12.416372] [<90000000022f3ab8>] do_init_module+0x58/0x2c0\n[\n---truncated---", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52444", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52444", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52444", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52444", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-52444", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-52444" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52613", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52613", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52613", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52613", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52613", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52613" } }, - "CVE-2023-52445": { - "affected_versions": "v2.6.26-rc1 to v6.8-rc1", - "breaks": "e5be15c63804", - "cmt_msg": "media: pvrusb2: fix use after free on context disconnection", - "fixes": "ded85b0c0edd8f45fec88783d7555a5b982449c1", - "last_affected_version": "6.7.1", - "last_modified": "2024-02-25", - "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: pvrusb2: fix use after free on context disconnection\n\nUpon module load, a kthread is created targeting the\npvr2_context_thread_func function, which may call pvr2_context_destroy\nand thus call kfree() on the context object. However, that might happen\nbefore the usb hub_event handler is able to notify the driver. This\npatch adds a sanity check before the invalid read reported by syzbot,\nwithin the context disconnection call stack.", + "CVE-2023-52614": { + "affected_versions": "unk to v6.8-rc1", + "breaks": "", + "cmt_msg": "PM / devfreq: Fix buffer overflow in trans_stat_show", + "fixes": "08e23d05fa6dc4fc13da0ccf09defdd4bbc92ff4", + "last_affected_version": "6.7.2", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nPM / devfreq: Fix buffer overflow in trans_stat_show\n\nFix buffer overflow in trans_stat_show().\n\nConvert simple snprintf to the more secure scnprintf with size of\nPAGE_SIZE.\n\nAdd condition checking if we are exceeding PAGE_SIZE and exit early from\nloop. Also add at the end a warning that we exceeded PAGE_SIZE and that\nstats is disabled.\n\nReturn -EFBIG in the case where we don't have enough space to write the\nfull transition table.\n\nAlso document in the ABI that this function can return -EFBIG error.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52614", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52614", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52614", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52614", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52614", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52614" + } + }, + "CVE-2023-52615": { + "affected_versions": "v2.6.33-rc1 to v6.8-rc1", + "breaks": "9996508b3353063f2d6c48c1a28a84543d72d70b", + "cmt_msg": "hwrng: core - Fix page fault dead lock on mmap-ed hwrng", + "fixes": "78aafb3884f6bc6636efcc1760c891c8500b9922", + "last_affected_version": "6.7.2", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nhwrng: core - Fix page fault dead lock on mmap-ed hwrng\n\nThere is a dead-lock in the hwrng device read path. This triggers\nwhen the user reads from /dev/hwrng into memory also mmap-ed from\n/dev/hwrng. The resulting page fault triggers a recursive read\nwhich then dead-locks.\n\nFix this by using a stack buffer when calling copy_to_user.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52615", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52615", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52615", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52615", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52615", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52615" + } + }, + "CVE-2023-52616": { + "affected_versions": "v5.10-rc1 to v6.8-rc1", + "breaks": "d58bb7e55a8a65894cc02f27c3e2bf9403e7c40f", + "cmt_msg": "crypto: lib/mpi - Fix unexpected pointer access in mpi_ec_init", + "fixes": "ba3c5574203034781ac4231acf117da917efcd2a", + "last_affected_version": "6.7.2", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: lib/mpi - Fix unexpected pointer access in mpi_ec_init\n\nWhen the mpi_ec_ctx structure is initialized, some fields are not\ncleared, causing a crash when referencing the field when the\nstructure was released. Initially, this issue was ignored because\nmemory for mpi_ec_ctx is allocated with the __GFP_ZERO flag.\nFor example, this error will be triggered when calculating the\nZa value for SM2 separately.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52445", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52445", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52445", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52445", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-52445", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-52445" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52616", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52616", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52616", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52616", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52616", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52616" } }, - "CVE-2023-52446": { - "affected_versions": "v6.2-rc1 to v6.8-rc1", - "breaks": "958cf2e273f0", - "cmt_msg": "bpf: Fix a race condition between btf_put() and map_free()", - "fixes": "59e5791f59dd83e8aa72a4e74217eabb6e8cfd90", - "last_affected_version": "6.7.1", - "last_modified": "2024-02-25", - "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Fix a race condition between btf_put() and map_free()\n\nWhen running `./test_progs -j` in my local vm with latest kernel,\nI once hit a kasan error like below:\n\n [ 1887.184724] BUG: KASAN: slab-use-after-free in bpf_rb_root_free+0x1f8/0x2b0\n [ 1887.185599] Read of size 4 at addr ffff888106806910 by task kworker/u12:2/2830\n [ 1887.186498]\n [ 1887.186712] CPU: 3 PID: 2830 Comm: kworker/u12:2 Tainted: G OEL 6.7.0-rc3-00699-g90679706d486-dirty #494\n [ 1887.188034] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014\n [ 1887.189618] Workqueue: events_unbound bpf_map_free_deferred\n [ 1887.190341] Call Trace:\n [ 1887.190666] \n [ 1887.190949] dump_stack_lvl+0xac/0xe0\n [ 1887.191423] ? nf_tcp_handle_invalid+0x1b0/0x1b0\n [ 1887.192019] ? panic+0x3c0/0x3c0\n [ 1887.192449] print_report+0x14f/0x720\n [ 1887.192930] ? preempt_count_sub+0x1c/0xd0\n [ 1887.193459] ? __virt_addr_valid+0xac/0x120\n [ 1887.194004] ? bpf_rb_root_free+0x1f8/0x2b0\n [ 1887.194572] kasan_report+0xc3/0x100\n [ 1887.195085] ? bpf_rb_root_free+0x1f8/0x2b0\n [ 1887.195668] bpf_rb_root_free+0x1f8/0x2b0\n [ 1887.196183] ? __bpf_obj_drop_impl+0xb0/0xb0\n [ 1887.196736] ? preempt_count_sub+0x1c/0xd0\n [ 1887.197270] ? preempt_count_sub+0x1c/0xd0\n [ 1887.197802] ? _raw_spin_unlock+0x1f/0x40\n [ 1887.198319] bpf_obj_free_fields+0x1d4/0x260\n [ 1887.198883] array_map_free+0x1a3/0x260\n [ 1887.199380] bpf_map_free_deferred+0x7b/0xe0\n [ 1887.199943] process_scheduled_works+0x3a2/0x6c0\n [ 1887.200549] worker_thread+0x633/0x890\n [ 1887.201047] ? __kthread_parkme+0xd7/0xf0\n [ 1887.201574] ? kthread+0x102/0x1d0\n [ 1887.202020] kthread+0x1ab/0x1d0\n [ 1887.202447] ? pr_cont_work+0x270/0x270\n [ 1887.202954] ? kthread_blkcg+0x50/0x50\n [ 1887.203444] ret_from_fork+0x34/0x50\n [ 1887.203914] ? kthread_blkcg+0x50/0x50\n [ 1887.204397] ret_from_fork_asm+0x11/0x20\n [ 1887.204913] \n [ 1887.204913] \n [ 1887.205209]\n [ 1887.205416] Allocated by task 2197:\n [ 1887.205881] kasan_set_track+0x3f/0x60\n [ 1887.206366] __kasan_kmalloc+0x6e/0x80\n [ 1887.206856] __kmalloc+0xac/0x1a0\n [ 1887.207293] btf_parse_fields+0xa15/0x1480\n [ 1887.207836] btf_parse_struct_metas+0x566/0x670\n [ 1887.208387] btf_new_fd+0x294/0x4d0\n [ 1887.208851] __sys_bpf+0x4ba/0x600\n [ 1887.209292] __x64_sys_bpf+0x41/0x50\n [ 1887.209762] do_syscall_64+0x4c/0xf0\n [ 1887.210222] entry_SYSCALL_64_after_hwframe+0x63/0x6b\n [ 1887.210868]\n [ 1887.211074] Freed by task 36:\n [ 1887.211460] kasan_set_track+0x3f/0x60\n [ 1887.211951] kasan_save_free_info+0x28/0x40\n [ 1887.212485] ____kasan_slab_free+0x101/0x180\n [ 1887.213027] __kmem_cache_free+0xe4/0x210\n [ 1887.213514] btf_free+0x5b/0x130\n [ 1887.213918] rcu_core+0x638/0xcc0\n [ 1887.214347] __do_softirq+0x114/0x37e\n\nThe error happens at bpf_rb_root_free+0x1f8/0x2b0:\n\n 00000000000034c0 :\n ; {\n 34c0: f3 0f 1e fa endbr64\n 34c4: e8 00 00 00 00 callq 0x34c9 \n 34c9: 55 pushq %rbp\n 34ca: 48 89 e5 movq %rsp, %rbp\n ...\n ; if (rec && rec->refcount_off >= 0 &&\n 36aa: 4d 85 ed testq %r13, %r13\n 36ad: 74 a9 je 0x3658 \n 36af: 49 8d 7d 10 leaq 0x10(%r13), %rdi\n 36b3: e8 00 00 00 00 callq 0x36b8 \n <==== kasan function\n 36b8: 45 8b 7d 10 movl 0x10(%r13), %r15d\n <==== use-after-free load\n 36bc: 45 85 ff testl %r15d, %r15d\n 36bf: 78 8c js 0x364d \n\nSo the problem \n---truncated---", + "CVE-2023-52617": { + "affected_versions": "v2.6.12-rc2 to v6.8-rc1", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "PCI: switchtec: Fix stdev_release() crash after surprise hot remove", + "fixes": "df25461119d987b8c81d232cfe4411e91dcabe66", + "last_affected_version": "6.7.3", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nPCI: switchtec: Fix stdev_release() crash after surprise hot remove\n\nA PCI device hot removal may occur while stdev->cdev is held open. The call\nto stdev_release() then happens during close or exit, at a point way past\nswitchtec_pci_remove(). Otherwise the last ref would vanish with the\ntrailing put_device(), just before return.\n\nAt that later point in time, the devm cleanup has already removed the\nstdev->mmio_mrpc mapping. Also, the stdev->pdev reference was not a counted\none. Therefore, in DMA mode, the iowrite32() in stdev_release() will cause\na fatal page fault, and the subsequent dma_free_coherent(), if reached,\nwould pass a stale &stdev->pdev->dev pointer.\n\nFix by moving MRPC DMA shutdown into switchtec_pci_remove(), after\nstdev_kill(). Counting the stdev->pdev ref is now optional, but may prevent\nfuture accidents.\n\nReproducible via the script at\nhttps://lore.kernel.org/r/20231113212150.96410-1-dns@arista.com", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52446", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52446", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52446", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52446", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-52446", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-52446" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52617", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52617", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52617", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52617", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52617", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52617" } }, - "CVE-2023-52447": { - "affected_versions": "v5.9-rc1 to v6.8-rc1", - "breaks": "bba1dc0b55ac", - "cmt_msg": "bpf: Defer the free of inner map when necessary", - "fixes": "876673364161da50eed6b472d746ef88242b2368", - "last_affected_version": "6.7.1", - "last_modified": "2024-02-25", - "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Defer the free of inner map when necessary\n\nWhen updating or deleting an inner map in map array or map htab, the map\nmay still be accessed by non-sleepable program or sleepable program.\nHowever bpf_map_fd_put_ptr() decreases the ref-counter of the inner map\ndirectly through bpf_map_put(), if the ref-counter is the last one\n(which is true for most cases), the inner map will be freed by\nops->map_free() in a kworker. But for now, most .map_free() callbacks\ndon't use synchronize_rcu() or its variants to wait for the elapse of a\nRCU grace period, so after the invocation of ops->map_free completes,\nthe bpf program which is accessing the inner map may incur\nuse-after-free problem.\n\nFix the free of inner map by invoking bpf_map_free_deferred() after both\none RCU grace period and one tasks trace RCU grace period if the inner\nmap has been removed from the outer map before. The deferment is\naccomplished by using call_rcu() or call_rcu_tasks_trace() when\nreleasing the last ref-counter of bpf map. The newly-added rcu_head\nfield in bpf_map shares the same storage space with work field to\nreduce the size of bpf_map.", + "CVE-2023-52618": { + "affected_versions": "v2.6.12-rc2 to v6.8-rc1", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "block/rnbd-srv: Check for unlikely string overflow", + "fixes": "9e4bf6a08d1e127bcc4bd72557f2dfafc6bc7f41", + "last_affected_version": "6.7.3", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nblock/rnbd-srv: Check for unlikely string overflow\n\nSince \"dev_search_path\" can technically be as large as PATH_MAX,\nthere was a risk of truncation when copying it and a second string\ninto \"full_path\" since it was also PATH_MAX sized. The W=1 builds were\nreporting this warning:\n\ndrivers/block/rnbd/rnbd-srv.c: In function 'process_msg_open.isra':\ndrivers/block/rnbd/rnbd-srv.c:616:51: warning: '%s' directive output may be truncated writing up to 254 bytes into a region of size between 0 and 4095 [-Wformat-truncation=]\n 616 | snprintf(full_path, PATH_MAX, \"%s/%s\",\n | ^~\nIn function 'rnbd_srv_get_full_path',\n inlined from 'process_msg_open.isra' at drivers/block/rnbd/rnbd-srv.c:721:14: drivers/block/rnbd/rnbd-srv.c:616:17: note: 'snprintf' output between 2 and 4351 bytes into a destination of size 4096\n 616 | snprintf(full_path, PATH_MAX, \"%s/%s\",\n | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~\n 617 | dev_search_path, dev_name);\n | ~~~~~~~~~~~~~~~~~~~~~~~~~~\n\nTo fix this, unconditionally check for truncation (as was already done\nfor the case where \"%SESSNAME%\" was present).", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52447", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52447", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52447", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52447", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-52447", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-52447" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52618", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52618", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52618", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52618", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52618", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52618" } }, - "CVE-2023-52448": { - "affected_versions": "v4.20-rc1 to v6.8-rc1", - "breaks": "72244b6bc752", - "cmt_msg": "gfs2: Fix kernel NULL pointer dereference in gfs2_rgrp_dump", - "fixes": "8877243beafa7c6bfc42022cbfdf9e39b25bd4fa", - "last_affected_version": "6.7.1", - "last_modified": "2024-02-25", - "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\ngfs2: Fix kernel NULL pointer dereference in gfs2_rgrp_dump\n\nSyzkaller has reported a NULL pointer dereference when accessing\nrgd->rd_rgl in gfs2_rgrp_dump(). This can happen when creating\nrgd->rd_gl fails in read_rindex_entry(). Add a NULL pointer check in\ngfs2_rgrp_dump() to prevent that.", + "CVE-2023-52619": { + "affected_versions": "v2.6.12-rc2 to v6.8-rc1", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "pstore/ram: Fix crash when setting number of cpus to an odd number", + "fixes": "d49270a04623ce3c0afddbf3e984cb245aa48e9c", + "last_affected_version": "6.7.3", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\npstore/ram: Fix crash when setting number of cpus to an odd number\n\nWhen the number of cpu cores is adjusted to 7 or other odd numbers,\nthe zone size will become an odd number.\nThe address of the zone will become:\n addr of zone0 = BASE\n addr of zone1 = BASE + zone_size\n addr of zone2 = BASE + zone_size*2\n ...\nThe address of zone1/3/5/7 will be mapped to non-alignment va.\nEventually crashes will occur when accessing these va.\n\nSo, use ALIGN_DOWN() to make sure the zone size is even\nto avoid this bug.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52448", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52448", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52448", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52448", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-52448", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-52448" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52619", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52619", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52619", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52619", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52619", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52619" } }, - "CVE-2023-52449": { - "affected_versions": "v2.6.31-rc1 to v6.8-rc1", - "breaks": "2ba3d76a1e29", - "cmt_msg": "mtd: Fix gluebi NULL pointer dereference caused by ftl notifier", - "fixes": "a43bdc376deab5fff1ceb93dca55bcab8dbdc1d6", - "last_affected_version": "6.7.1", - "last_modified": "2024-02-25", - "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmtd: Fix gluebi NULL pointer dereference caused by ftl notifier\n\nIf both ftl.ko and gluebi.ko are loaded, the notifier of ftl\ntriggers NULL pointer dereference when trying to access\n\u2018gluebi->desc\u2019 in gluebi_read().\n\nubi_gluebi_init\n ubi_register_volume_notifier\n ubi_enumerate_volumes\n ubi_notify_all\n gluebi_notify nb->notifier_call()\n gluebi_create\n mtd_device_register\n mtd_device_parse_register\n add_mtd_device\n blktrans_notify_add not->add()\n ftl_add_mtd tr->add_mtd()\n scan_header\n mtd_read\n mtd_read_oob\n mtd_read_oob_std\n gluebi_read mtd->read()\n gluebi->desc - NULL\n\nDetailed reproduction information available at the Link [1],\n\nIn the normal case, obtain gluebi->desc in the gluebi_get_device(),\nand access gluebi->desc in the gluebi_read(). However,\ngluebi_get_device() is not executed in advance in the\nftl_add_mtd() process, which leads to NULL pointer dereference.\n\nThe solution for the gluebi module is to run jffs2 on the UBI\nvolume without considering working with ftl or mtdblock [2].\nTherefore, this problem can be avoided by preventing gluebi from\ncreating the mtdblock device after creating mtd partition of the\ntype MTD_UBIVOLUME.", + "CVE-2023-52620": { + "affected_versions": "v2.6.12-rc2 to v6.4", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "netfilter: nf_tables: disallow timeout for anonymous sets", + "fixes": "e26d3009efda338f19016df4175f354a9bd0a4ab", + "last_affected_version": "6.3", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_tables: disallow timeout for anonymous sets\n\nNever used from userspace, disallow these parameters.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52449", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52449", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52449", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52449", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-52449", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-52449" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52620", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52620", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52620", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52620", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52620", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52620" } }, - "CVE-2023-52450": { - "affected_versions": "v6.2-rc1 to v6.8-rc1", - "breaks": "f680b6e6062e", - "cmt_msg": "perf/x86/intel/uncore: Fix NULL pointer dereference issue in upi_fill_topology()", - "fixes": "1692cf434ba13ee212495b5af795b6a07e986ce4", - "last_affected_version": "6.7.1", - "last_modified": "2024-02-25", - "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nperf/x86/intel/uncore: Fix NULL pointer dereference issue in upi_fill_topology()\n\nGet logical socket id instead of physical id in discover_upi_topology()\nto avoid out-of-bound access on 'upi = &type->topology[nid][idx];' line\nthat leads to NULL pointer dereference in upi_fill_topology()", + "CVE-2023-52621": { + "affected_versions": "v2.6.12-rc2 to v6.8-rc1", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers", + "fixes": "169410eba271afc9f0fb476d996795aa26770c6d", + "last_affected_version": "6.7.3", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Check rcu_read_lock_trace_held() before calling bpf map helpers\n\nThese three bpf_map_{lookup,update,delete}_elem() helpers are also\navailable for sleepable bpf program, so add the corresponding lock\nassertion for sleepable bpf program, otherwise the following warning\nwill be reported when a sleepable bpf program manipulates bpf map under\ninterpreter mode (aka bpf_jit_enable=0):\n\n WARNING: CPU: 3 PID: 4985 at kernel/bpf/helpers.c:40 ......\n CPU: 3 PID: 4985 Comm: test_progs Not tainted 6.6.0+ #2\n Hardware name: QEMU Standard PC (i440FX + PIIX, 1996) ......\n RIP: 0010:bpf_map_lookup_elem+0x54/0x60\n ......\n Call Trace:\n \n ? __warn+0xa5/0x240\n ? bpf_map_lookup_elem+0x54/0x60\n ? report_bug+0x1ba/0x1f0\n ? handle_bug+0x40/0x80\n ? exc_invalid_op+0x18/0x50\n ? asm_exc_invalid_op+0x1b/0x20\n ? __pfx_bpf_map_lookup_elem+0x10/0x10\n ? rcu_lockdep_current_cpu_online+0x65/0xb0\n ? rcu_is_watching+0x23/0x50\n ? bpf_map_lookup_elem+0x54/0x60\n ? __pfx_bpf_map_lookup_elem+0x10/0x10\n ___bpf_prog_run+0x513/0x3b70\n __bpf_prog_run32+0x9d/0xd0\n ? __bpf_prog_enter_sleepable_recur+0xad/0x120\n ? __bpf_prog_enter_sleepable_recur+0x3e/0x120\n bpf_trampoline_6442580665+0x4d/0x1000\n __x64_sys_getpgid+0x5/0x30\n ? do_syscall_64+0x36/0xb0\n entry_SYSCALL_64_after_hwframe+0x6e/0x76\n ", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52450", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52450", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52450", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52450", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-52450", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-52450" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52621", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52621", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52621", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52621", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52621", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52621" } }, - "CVE-2023-52451": { - "affected_versions": "v4.1-rc1 to v6.8-rc1", - "breaks": "51925fb3c5c9", - "cmt_msg": "powerpc/pseries/memhp: Fix access beyond end of drmem array", - "fixes": "bd68ffce69f6cf8ddd3a3c32549d1d2275e49fc5", - "last_affected_version": "6.7.1", - "last_modified": "2024-02-25", - "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\npowerpc/pseries/memhp: Fix access beyond end of drmem array\n\ndlpar_memory_remove_by_index() may access beyond the bounds of the\ndrmem lmb array when the LMB lookup fails to match an entry with the\ngiven DRC index. When the search fails, the cursor is left pointing to\n&drmem_info->lmbs[drmem_info->n_lmbs], which is one element past the\nlast valid entry in the array. The debug message at the end of the\nfunction then dereferences this pointer:\n\n pr_debug(\"Failed to hot-remove memory at %llx\\n\",\n lmb->base_addr);\n\nThis was found by inspection and confirmed with KASAN:\n\n pseries-hotplug-mem: Attempting to hot-remove LMB, drc index 1234\n ==================================================================\n BUG: KASAN: slab-out-of-bounds in dlpar_memory+0x298/0x1658\n Read of size 8 at addr c000000364e97fd0 by task bash/949\n\n dump_stack_lvl+0xa4/0xfc (unreliable)\n print_report+0x214/0x63c\n kasan_report+0x140/0x2e0\n __asan_load8+0xa8/0xe0\n dlpar_memory+0x298/0x1658\n handle_dlpar_errorlog+0x130/0x1d0\n dlpar_store+0x18c/0x3e0\n kobj_attr_store+0x68/0xa0\n sysfs_kf_write+0xc4/0x110\n kernfs_fop_write_iter+0x26c/0x390\n vfs_write+0x2d4/0x4e0\n ksys_write+0xac/0x1a0\n system_call_exception+0x268/0x530\n system_call_vectored_common+0x15c/0x2ec\n\n Allocated by task 1:\n kasan_save_stack+0x48/0x80\n kasan_set_track+0x34/0x50\n kasan_save_alloc_info+0x34/0x50\n __kasan_kmalloc+0xd0/0x120\n __kmalloc+0x8c/0x320\n kmalloc_array.constprop.0+0x48/0x5c\n drmem_init+0x2a0/0x41c\n do_one_initcall+0xe0/0x5c0\n kernel_init_freeable+0x4ec/0x5a0\n kernel_init+0x30/0x1e0\n ret_from_kernel_user_thread+0x14/0x1c\n\n The buggy address belongs to the object at c000000364e80000\n which belongs to the cache kmalloc-128k of size 131072\n The buggy address is located 0 bytes to the right of\n allocated 98256-byte region [c000000364e80000, c000000364e97fd0)\n\n ==================================================================\n pseries-hotplug-mem: Failed to hot-remove memory at 0\n\nLog failed lookups with a separate message and dereference the\ncursor only when it points to a valid entry.", + "CVE-2023-52622": { + "affected_versions": "v2.6.12-rc2 to v6.8-rc1", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "ext4: avoid online resizing failures due to oversized flex bg", + "fixes": "5d1935ac02ca5aee364a449a35e2977ea84509b0", + "last_affected_version": "6.7.3", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: avoid online resizing failures due to oversized flex bg\n\nWhen we online resize an ext4 filesystem with a oversized flexbg_size,\n\n mkfs.ext4 -F -G 67108864 $dev -b 4096 100M\n mount $dev $dir\n resize2fs $dev 16G\n\nthe following WARN_ON is triggered:\n==================================================================\nWARNING: CPU: 0 PID: 427 at mm/page_alloc.c:4402 __alloc_pages+0x411/0x550\nModules linked in: sg(E)\nCPU: 0 PID: 427 Comm: resize2fs Tainted: G E 6.6.0-rc5+ #314\nRIP: 0010:__alloc_pages+0x411/0x550\nCall Trace:\n \n __kmalloc_large_node+0xa2/0x200\n __kmalloc+0x16e/0x290\n ext4_resize_fs+0x481/0xd80\n __ext4_ioctl+0x1616/0x1d90\n ext4_ioctl+0x12/0x20\n __x64_sys_ioctl+0xf0/0x150\n do_syscall_64+0x3b/0x90\n==================================================================\n\nThis is because flexbg_size is too large and the size of the new_group_data\narray to be allocated exceeds MAX_ORDER. Currently, the minimum value of\nMAX_ORDER is 8, the minimum value of PAGE_SIZE is 4096, the corresponding\nmaximum number of groups that can be allocated is:\n\n (PAGE_SIZE << MAX_ORDER) / sizeof(struct ext4_new_group_data) ? 21845\n\nAnd the value that is down-aligned to the power of 2 is 16384. Therefore,\nthis value is defined as MAX_RESIZE_BG, and the number of groups added\neach time does not exceed this value during resizing, and is added multiple\ntimes to complete the online resizing. The difference is that the metadata\nin a flex_bg may be more dispersed.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52451", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52451", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52451", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52451", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-52451", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-52451" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52622", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52622", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52622", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52622", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52622", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52622" } }, - "CVE-2023-52452": { - "affected_versions": "v5.12-rc1-dontuse to v6.8-rc1", - "breaks": "01f810ace9ed3", - "cmt_msg": "bpf: Fix accesses to uninit stack slots", - "fixes": "6b4a64bafd107e521c01eec3453ce94a3fb38529", - "last_affected_version": "6.7.1", - "last_modified": "2024-02-25", - "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Fix accesses to uninit stack slots\n\nPrivileged programs are supposed to be able to read uninitialized stack\nmemory (ever since 6715df8d5) but, before this patch, these accesses\nwere permitted inconsistently. In particular, accesses were permitted\nabove state->allocated_stack, but not below it. In other words, if the\nstack was already \"large enough\", the access was permitted, but\notherwise the access was rejected instead of being allowed to \"grow the\nstack\". This undesired rejection was happening in two places:\n- in check_stack_slot_within_bounds()\n- in check_stack_range_initialized()\nThis patch arranges for these accesses to be permitted. A bunch of tests\nthat were relying on the old rejection had to change; all of them were\nchanged to add also run unprivileged, in which case the old behavior\npersists. One tests couldn't be updated - global_func16 - because it\ncan't run unprivileged for other reasons.\n\nThis patch also fixes the tracking of the stack size for variable-offset\nreads. This second fix is bundled in the same commit as the first one\nbecause they're inter-related. Before this patch, writes to the stack\nusing registers containing a variable offset (as opposed to registers\nwith fixed, known values) were not properly contributing to the\nfunction's needed stack size. As a result, it was possible for a program\nto verify, but then to attempt to read out-of-bounds data at runtime\nbecause a too small stack had been allocated for it.\n\nEach function tracks the size of the stack it needs in\nbpf_subprog_info.stack_depth, which is maintained by\nupdate_stack_depth(). For regular memory accesses, check_mem_access()\nwas calling update_state_depth() but it was passing in only the fixed\npart of the offset register, ignoring the variable offset. This was\nincorrect; the minimum possible value of that register should be used\ninstead.\n\nThis tracking is now fixed by centralizing the tracking of stack size in\ngrow_stack_state(), and by lifting the calls to grow_stack_state() to\ncheck_stack_access_within_bounds() as suggested by Andrii. The code is\nnow simpler and more convincingly tracks the correct maximum stack size.\ncheck_stack_range_initialized() can now rely on enough stack having been\nallocated for the access; this helps with the fix for the first issue.\n\nA few tests were changed to also check the stack depth computation. The\none that fails without this patch is verifier_var_off:stack_write_priv_vs_unpriv.", + "CVE-2023-52623": { + "affected_versions": "v2.6.12-rc2 to v6.8-rc1", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "SUNRPC: Fix a suspicious RCU usage warning", + "fixes": "31b62908693c90d4d07db597e685d9f25a120073", + "last_affected_version": "6.7.3", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nSUNRPC: Fix a suspicious RCU usage warning\n\nI received the following warning while running cthon against an ontap\nserver running pNFS:\n\n[ 57.202521] =============================\n[ 57.202522] WARNING: suspicious RCU usage\n[ 57.202523] 6.7.0-rc3-g2cc14f52aeb7 #41492 Not tainted\n[ 57.202525] -----------------------------\n[ 57.202525] net/sunrpc/xprtmultipath.c:349 RCU-list traversed in non-reader section!!\n[ 57.202527]\n other info that might help us debug this:\n\n[ 57.202528]\n rcu_scheduler_active = 2, debug_locks = 1\n[ 57.202529] no locks held by test5/3567.\n[ 57.202530]\n stack backtrace:\n[ 57.202532] CPU: 0 PID: 3567 Comm: test5 Not tainted 6.7.0-rc3-g2cc14f52aeb7 #41492 5b09971b4965c0aceba19f3eea324a4a806e227e\n[ 57.202534] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS unknown 2/2/2022\n[ 57.202536] Call Trace:\n[ 57.202537] \n[ 57.202540] dump_stack_lvl+0x77/0xb0\n[ 57.202551] lockdep_rcu_suspicious+0x154/0x1a0\n[ 57.202556] rpc_xprt_switch_has_addr+0x17c/0x190 [sunrpc ebe02571b9a8ceebf7d98e71675af20c19bdb1f6]\n[ 57.202596] rpc_clnt_setup_test_and_add_xprt+0x50/0x180 [sunrpc ebe02571b9a8ceebf7d98e71675af20c19bdb1f6]\n[ 57.202621] ? rpc_clnt_add_xprt+0x254/0x300 [sunrpc ebe02571b9a8ceebf7d98e71675af20c19bdb1f6]\n[ 57.202646] rpc_clnt_add_xprt+0x27a/0x300 [sunrpc ebe02571b9a8ceebf7d98e71675af20c19bdb1f6]\n[ 57.202671] ? __pfx_rpc_clnt_setup_test_and_add_xprt+0x10/0x10 [sunrpc ebe02571b9a8ceebf7d98e71675af20c19bdb1f6]\n[ 57.202696] nfs4_pnfs_ds_connect+0x345/0x760 [nfsv4 c716d88496ded0ea6d289bbea684fa996f9b57a9]\n[ 57.202728] ? __pfx_nfs4_test_session_trunk+0x10/0x10 [nfsv4 c716d88496ded0ea6d289bbea684fa996f9b57a9]\n[ 57.202754] nfs4_fl_prepare_ds+0x75/0xc0 [nfs_layout_nfsv41_files e3a4187f18ae8a27b630f9feae6831b584a9360a]\n[ 57.202760] filelayout_write_pagelist+0x4a/0x200 [nfs_layout_nfsv41_files e3a4187f18ae8a27b630f9feae6831b584a9360a]\n[ 57.202765] pnfs_generic_pg_writepages+0xbe/0x230 [nfsv4 c716d88496ded0ea6d289bbea684fa996f9b57a9]\n[ 57.202788] __nfs_pageio_add_request+0x3fd/0x520 [nfs 6c976fa593a7c2976f5a0aeb4965514a828e6902]\n[ 57.202813] nfs_pageio_add_request+0x18b/0x390 [nfs 6c976fa593a7c2976f5a0aeb4965514a828e6902]\n[ 57.202831] nfs_do_writepage+0x116/0x1e0 [nfs 6c976fa593a7c2976f5a0aeb4965514a828e6902]\n[ 57.202849] nfs_writepages_callback+0x13/0x30 [nfs 6c976fa593a7c2976f5a0aeb4965514a828e6902]\n[ 57.202866] write_cache_pages+0x265/0x450\n[ 57.202870] ? __pfx_nfs_writepages_callback+0x10/0x10 [nfs 6c976fa593a7c2976f5a0aeb4965514a828e6902]\n[ 57.202891] nfs_writepages+0x141/0x230 [nfs 6c976fa593a7c2976f5a0aeb4965514a828e6902]\n[ 57.202913] do_writepages+0xd2/0x230\n[ 57.202917] ? filemap_fdatawrite_wbc+0x5c/0x80\n[ 57.202921] filemap_fdatawrite_wbc+0x67/0x80\n[ 57.202924] filemap_write_and_wait_range+0xd9/0x170\n[ 57.202930] nfs_wb_all+0x49/0x180 [nfs 6c976fa593a7c2976f5a0aeb4965514a828e6902]\n[ 57.202947] nfs4_file_flush+0x72/0xb0 [nfsv4 c716d88496ded0ea6d289bbea684fa996f9b57a9]\n[ 57.202969] __se_sys_close+0x46/0xd0\n[ 57.202972] do_syscall_64+0x68/0x100\n[ 57.202975] ? do_syscall_64+0x77/0x100\n[ 57.202976] ? do_syscall_64+0x77/0x100\n[ 57.202979] entry_SYSCALL_64_after_hwframe+0x6e/0x76\n[ 57.202982] RIP: 0033:0x7fe2b12e4a94\n[ 57.202985] Code: 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 80 3d d5 18 0e 00 00 74 13 b8 03 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 44 c3 0f 1f 00 48 83 ec 18 89 7c 24 0c e8 c3\n[ 57.202987] RSP: 002b:00007ffe857ddb38 EFLAGS: 00000202 ORIG_RAX: 0000000000000003\n[ 57.202989] RAX: ffffffffffffffda RBX: 00007ffe857dfd68 RCX: 00007fe2b12e4a94\n[ 57.202991] RDX: 0000000000002000 RSI: 00007ffe857ddc40 RDI: 0000000000000003\n[ 57.202992] RBP: 00007ffe857dfc50 R08: 7fffffffffffffff R09: 0000000065650f49\n[ 57.202993] R10: 00007f\n---truncated---", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52452", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52452", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52452", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52452", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-52452", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-52452" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52623", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52623", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52623", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52623", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52623", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52623" } }, - "CVE-2023-52453": { - "affected_versions": "v6.2-rc1 to v6.8-rc1", - "breaks": "d9a871e4a143047d1d84a606772af319f11516f9", - "cmt_msg": "hisi_acc_vfio_pci: Update migration data pointer correctly on saving/resume", - "fixes": "be12ad45e15b5ee0e2526a50266ba1d295d26a88", - "last_affected_version": "6.7.1", - "last_modified": "2024-02-25", - "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nhisi_acc_vfio_pci: Update migration data pointer correctly on saving/resume\n\nWhen the optional PRE_COPY support was added to speed up the device\ncompatibility check, it failed to update the saving/resuming data\npointers based on the fd offset. This results in migration data\ncorruption and when the device gets started on the destination the\nfollowing error is reported in some cases,\n\n[ 478.907684] arm-smmu-v3 arm-smmu-v3.2.auto: event 0x10 received:\n[ 478.913691] arm-smmu-v3 arm-smmu-v3.2.auto: 0x0000310200000010\n[ 478.919603] arm-smmu-v3 arm-smmu-v3.2.auto: 0x000002088000007f\n[ 478.925515] arm-smmu-v3 arm-smmu-v3.2.auto: 0x0000000000000000\n[ 478.931425] arm-smmu-v3 arm-smmu-v3.2.auto: 0x0000000000000000\n[ 478.947552] hisi_zip 0000:31:00.0: qm_axi_rresp [error status=0x1] found\n[ 478.955930] hisi_zip 0000:31:00.0: qm_db_timeout [error status=0x400] found\n[ 478.955944] hisi_zip 0000:31:00.0: qm sq doorbell timeout in function 2", + "CVE-2023-52624": { + "affected_versions": "v2.6.12-rc2 to v6.8-rc1", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "drm/amd/display: Wake DMCUB before executing GPINT commands", + "fixes": "e5ffd1263dd5b44929c676171802e7b6af483f21", + "last_affected_version": "6.7.2", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Wake DMCUB before executing GPINT commands\n\n[Why]\nDMCUB can be in idle when we attempt to interface with the HW through\nthe GPINT mailbox resulting in a system hang.\n\n[How]\nAdd dc_wake_and_execute_gpint() to wrap the wake, execute, sleep\nsequence.\n\nIf the GPINT executes successfully then DMCUB will be put back into\nsleep after the optional response is returned.\n\nIt functions similar to the inbox command interface.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52453", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52453", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52453", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52453", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-52453", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-52453" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52624", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52624", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52624", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52624", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52624", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52624" } }, - "CVE-2023-52454": { - "affected_versions": "v5.0-rc1 to v6.8-rc1", - "breaks": "872d26a391da92ed8f0c0f5cb5fef428067b7f30", - "cmt_msg": "nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length", - "fixes": "efa56305908ba20de2104f1b8508c6a7401833be", - "last_affected_version": "6.7.1", - "last_modified": "2024-02-25", - "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length\n\nIf the host sends an H2CData command with an invalid DATAL,\nthe kernel may crash in nvmet_tcp_build_pdu_iovec().\n\nUnable to handle kernel NULL pointer dereference at\nvirtual address 0000000000000000\nlr : nvmet_tcp_io_work+0x6ac/0x718 [nvmet_tcp]\nCall trace:\n process_one_work+0x174/0x3c8\n worker_thread+0x2d0/0x3e8\n kthread+0x104/0x110\n\nFix the bug by raising a fatal error if DATAL isn't coherent\nwith the packet size.\nAlso, the PDU length should never exceed the MAXH2CDATA parameter which\nhas been communicated to the host in nvmet_tcp_handle_icreq().", + "CVE-2023-52625": { + "affected_versions": "v2.6.12-rc2 to v6.8-rc1", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "drm/amd/display: Refactor DMCUB enter/exit idle interface", + "fixes": "8e57c06bf4b0f51a4d6958e15e1a99c9520d00fa", + "last_affected_version": "6.7.2", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Refactor DMCUB enter/exit idle interface\n\n[Why]\nWe can hang in place trying to send commands when the DMCUB isn't\npowered on.\n\n[How]\nWe need to exit out of the idle state prior to sending a command,\nbut the process that performs the exit also invokes a command itself.\n\nFixing this issue involves the following:\n\n1. Using a software state to track whether or not we need to start\n the process to exit idle or notify idle.\n\nIt's possible for the hardware to have exited an idle state without\ndriver knowledge, but entering one is always restricted to a driver\nallow - which makes the SW state vs HW state mismatch issue purely one\nof optimization, which should seldomly be hit, if at all.\n\n2. Refactor any instances of exit/notify idle to use a single wrapper\n that maintains this SW state.\n\nThis works simialr to dc_allow_idle_optimizations, but works at the\nDMCUB level and makes sure the state is marked prior to any notify/exit\nidle so we don't enter an infinite loop.\n\n3. Make sure we exit out of idle prior to sending any commands or\n waiting for DMCUB idle.\n\nThis patch takes care of 1/2. A future patch will take care of wrapping\nDMCUB command submission with calls to this new interface.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52625", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52625", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52625", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52625", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52625", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52625" + } + }, + "CVE-2023-52626": { + "affected_versions": "v6.7-rc2 to v6.8-rc2", + "breaks": "92214be5979c0961a471b7eaaaeacab41bdf456c", + "cmt_msg": "net/mlx5e: Fix operation precedence bug in port timestamping napi_poll context", + "fixes": "3876638b2c7ebb2c9d181de1191db0de8cac143a", + "last_affected_version": "6.7.2", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5e: Fix operation precedence bug in port timestamping napi_poll context\n\nIndirection (*) is of lower precedence than postfix increment (++). Logic\nin napi_poll context would cause an out-of-bound read by first increment\nthe pointer address by byte address space and then dereference the value.\nRather, the intended logic was to dereference first and then increment the\nunderlying value.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52626", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52626", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52626", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52626", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52626", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52626" + } + }, + "CVE-2023-52627": { + "affected_versions": "v5.6-rc1 to v6.8-rc1", + "breaks": "ca69300173b642ba64118200172171ea5967b6c5", + "cmt_msg": "iio: adc: ad7091r: Allow users to configure device events", + "fixes": "020e71c7ffc25dfe29ed9be6c2d39af7bd7f661f", + "last_affected_version": "6.7.2", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\niio: adc: ad7091r: Allow users to configure device events\n\nAD7091R-5 devices are supported by the ad7091r-5 driver together with\nthe ad7091r-base driver. Those drivers declared iio events for notifying\nuser space when ADC readings fall bellow the thresholds of low limit\nregisters or above the values set in high limit registers.\nHowever, to configure iio events and their thresholds, a set of callback\nfunctions must be implemented and those were not present until now.\nThe consequence of trying to configure ad7091r-5 events without the\nproper callback functions was a null pointer dereference in the kernel\nbecause the pointers to the callback functions were not set.\n\nImplement event configuration callbacks allowing users to read/write\nevent thresholds and enable/disable event generation.\n\nSince the event spec structs are generic to AD7091R devices, also move\nthose from the ad7091r-5 driver the base driver so they can be reused\nwhen support for ad7091r-2/-4/-8 be added.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52454", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52454", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52454", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52454", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-52454", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-52454" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52627", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52627", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52627", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52627", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52627", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52627" } }, - "CVE-2023-52455": { - "affected_versions": "v6.3-rc1 to v6.8-rc1", - "breaks": "a5bf3cfce8cb77d9d24613ab52d520896f83dd48", - "cmt_msg": "iommu: Don't reserve 0-length IOVA region", - "fixes": "bb57f6705960bebeb832142ce9abf43220c3eab1", - "last_affected_version": "6.7.1", - "last_modified": "2024-02-25", - "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\niommu: Don't reserve 0-length IOVA region\n\nWhen the bootloader/firmware doesn't setup the framebuffers, their\naddress and size are 0 in \"iommu-addresses\" property. If IOVA region is\nreserved with 0 length, then it ends up corrupting the IOVA rbtree with\nan entry which has pfn_hi < pfn_lo.\nIf we intend to use display driver in kernel without framebuffer then\nit's causing the display IOMMU mappings to fail as entire valid IOVA\nspace is reserved when address and length are passed as 0.\nAn ideal solution would be firmware removing the \"iommu-addresses\"\nproperty and corresponding \"memory-region\" if display is not present.\nBut the kernel should be able to handle this by checking for size of\nIOVA region and skipping the IOVA reservation if size is 0. Also, add\na warning if firmware is requesting 0-length IOVA region reservation.", + "CVE-2023-52628": { + "affected_versions": "v4.1-rc1 to v6.6-rc1", + "breaks": "49499c3e6e18b7677a63316f3ff54a16533dc28f", + "cmt_msg": "netfilter: nftables: exthdr: fix 4-byte stack OOB write", + "fixes": "fd94d9dadee58e09b49075240fe83423eb1dcd36", + "last_affected_version": "6.5.3", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nftables: exthdr: fix 4-byte stack OOB write\n\nIf priv->len is a multiple of 4, then dst[len / 4] can write past\nthe destination array which leads to stack corruption.\n\nThis construct is necessary to clean the remainder of the register\nin case ->len is NOT a multiple of the register size, so make it\nconditional just like nft_payload.c does.\n\nThe bug was added in 4.1 cycle and then copied/inherited when\ntcp/sctp and ip option support was added.\n\nBug reported by Zero Day Initiative project (ZDI-CAN-21950,\nZDI-CAN-21951, ZDI-CAN-21961).", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52628", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52628", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52628", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52628", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52628", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52628" + } + }, + "CVE-2023-52629": { + "affected_versions": "v2.6.20-rc1 to v6.6-rc1", + "breaks": "9f5e8eee5cfe1328660c71812d87c2a67bda389f", + "cmt_msg": "sh: push-switch: Reorder cleanup operations to avoid use-after-free bug", + "fixes": "246f80a0b17f8f582b2c0996db02998239057c65", + "last_affected_version": "6.5.3", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsh: push-switch: Reorder cleanup operations to avoid use-after-free bug\n\nThe original code puts flush_work() before timer_shutdown_sync()\nin switch_drv_remove(). Although we use flush_work() to stop\nthe worker, it could be rescheduled in switch_timer(). As a result,\na use-after-free bug can occur. The details are shown below:\n\n (cpu 0) | (cpu 1)\nswitch_drv_remove() |\n flush_work() |\n ... | switch_timer // timer\n | schedule_work(&psw->work)\n timer_shutdown_sync() |\n ... | switch_work_handler // worker\n kfree(psw) // free |\n | psw->state = 0 // use\n\nThis patch puts timer_shutdown_sync() before flush_work() to\nmitigate the bugs. As a result, the worker and timer will be\nstopped safely before the deallocate operations.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52629", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52629", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52629", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52629", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52629", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52629" + } + }, + "CVE-2023-52630": { + "affected_versions": "v5.10-rc1 to v6.8-rc4", + "breaks": "5160a5a53c0c4ae3708959d9465ea43ad5d90542", + "cmt_msg": "blk-iocost: Fix an UBSAN shift-out-of-bounds warning", + "fixes": "2a427b49d02995ea4a6ff93a1432c40fa4d36821", + "last_affected_version": "6.7.4", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nblk-iocost: Fix an UBSAN shift-out-of-bounds warning\n\nWhen iocg_kick_delay() is called from a CPU different than the one which set\nthe delay, @now may be in the past of @iocg->delay_at leading to the\nfollowing warning:\n\n UBSAN: shift-out-of-bounds in block/blk-iocost.c:1359:23\n shift exponent 18446744073709 is too large for 64-bit type 'u64' (aka 'unsigned long long')\n ...\n Call Trace:\n \n dump_stack_lvl+0x79/0xc0\n __ubsan_handle_shift_out_of_bounds+0x2ab/0x300\n iocg_kick_delay+0x222/0x230\n ioc_rqos_merge+0x1d7/0x2c0\n __rq_qos_merge+0x2c/0x80\n bio_attempt_back_merge+0x83/0x190\n blk_attempt_plug_merge+0x101/0x150\n blk_mq_submit_bio+0x2b1/0x720\n submit_bio_noacct_nocheck+0x320/0x3e0\n __swap_writepage+0x2ab/0x9d0\n\nThe underflow itself doesn't really affect the behavior in any meaningful\nway; however, the past timestamp may exaggerate the delay amount calculated\nlater in the code, which shouldn't be a material problem given the nature of\nthe delay mechanism.\n\nIf @now is in the past, this CPU is racing another CPU which recently set up\nthe delay and there's nothing this CPU can contribute w.r.t. the delay.\nLet's bail early from iocg_kick_delay() in such cases.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52455", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52455", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52455", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52455", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-52455", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-52455" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52630", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52630", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52630", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52630", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52630", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52630" } }, - "CVE-2023-52456": { - "affected_versions": "unk to v6.8-rc1", - "breaks": "", - "cmt_msg": "serial: imx: fix tx statemachine deadlock", - "fixes": "78d60dae9a0c9f09aa3d6477c94047df2fe6f7b0", - "last_affected_version": "6.7.1", - "last_modified": "2024-02-25", - "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nserial: imx: fix tx statemachine deadlock\n\nWhen using the serial port as RS485 port, the tx statemachine is used to\ncontrol the RTS pin to drive the RS485 transceiver TX_EN pin. When the\nTTY port is closed in the middle of a transmission (for instance during\nuserland application crash), imx_uart_shutdown disables the interface\nand disables the Transmission Complete interrupt. afer that,\nimx_uart_stop_tx bails on an incomplete transmission, to be retriggered\nby the TC interrupt. This interrupt is disabled and therefore the tx\nstatemachine never transitions out of SEND. The statemachine is in\ndeadlock now, and the TX_EN remains low, making the interface useless.\n\nimx_uart_stop_tx now checks for incomplete transmission AND whether TC\ninterrupts are enabled before bailing to be retriggered. This makes sure\nthe state machine handling is reached, and is properly set to\nWAIT_AFTER_SEND.", + "CVE-2023-52631": { + "affected_versions": "v5.15-rc1 to v6.8-rc4", + "breaks": "be71b5cba2e6485e8959da7a9f9a44461a1bb074", + "cmt_msg": "fs/ntfs3: Fix an NULL dereference bug", + "fixes": "b2dd7b953c25ffd5912dda17e980e7168bebcf6c", + "last_affected_version": "6.7.4", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfs/ntfs3: Fix an NULL dereference bug\n\nThe issue here is when this is called from ntfs_load_attr_list(). The\n\"size\" comes from le32_to_cpu(attr->res.data_size) so it can't overflow\non a 64bit systems but on 32bit systems the \"+ 1023\" can overflow and\nthe result is zero. This means that the kmalloc will succeed by\nreturning the ZERO_SIZE_PTR and then the memcpy() will crash with an\nOops on the next line.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52456", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52456", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52456", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52456", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-52456", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-52456" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52631", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52631", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52631", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52631", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52631", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52631" } }, - "CVE-2023-52457": { - "affected_versions": "unk to v6.8-rc1", - "breaks": "", - "cmt_msg": "serial: 8250: omap: Don't skip resource freeing if pm_runtime_resume_and_get() failed", - "fixes": "ad90d0358bd3b4554f243a425168fc7cebe7d04e", - "last_affected_version": "6.7.1", - "last_modified": "2024-02-25", - "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nserial: 8250: omap: Don't skip resource freeing if pm_runtime_resume_and_get() failed\n\nReturning an error code from .remove() makes the driver core emit the\nlittle helpful error message:\n\n\tremove callback returned a non-zero value. This will be ignored.\n\nand then remove the device anyhow. So all resources that were not freed\nare leaked in this case. Skipping serial8250_unregister_port() has the\npotential to keep enough of the UART around to trigger a use-after-free.\n\nSo replace the error return (and with it the little helpful error\nmessage) by a more useful error message and continue to cleanup.", + "CVE-2023-52632": { + "affected_versions": "v2.6.12-rc2 to v6.8-rc1", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "drm/amdkfd: Fix lock dependency warning with srcu", + "fixes": "2a9de42e8d3c82c6990d226198602be44f43f340", + "last_affected_version": "6.7.3", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdkfd: Fix lock dependency warning with srcu\n\n======================================================\nWARNING: possible circular locking dependency detected\n6.5.0-kfd-yangp #2289 Not tainted\n------------------------------------------------------\nkworker/0:2/996 is trying to acquire lock:\n (srcu){.+.+}-{0:0}, at: __synchronize_srcu+0x5/0x1a0\n\nbut task is already holding lock:\n ((work_completion)(&svms->deferred_list_work)){+.+.}-{0:0}, at:\n\tprocess_one_work+0x211/0x560\n\nwhich lock already depends on the new lock.\n\nthe existing dependency chain (in reverse order) is:\n\n-> #3 ((work_completion)(&svms->deferred_list_work)){+.+.}-{0:0}:\n __flush_work+0x88/0x4f0\n svm_range_list_lock_and_flush_work+0x3d/0x110 [amdgpu]\n svm_range_set_attr+0xd6/0x14c0 [amdgpu]\n kfd_ioctl+0x1d1/0x630 [amdgpu]\n __x64_sys_ioctl+0x88/0xc0\n\n-> #2 (&info->lock#2){+.+.}-{3:3}:\n __mutex_lock+0x99/0xc70\n amdgpu_amdkfd_gpuvm_restore_process_bos+0x54/0x740 [amdgpu]\n restore_process_helper+0x22/0x80 [amdgpu]\n restore_process_worker+0x2d/0xa0 [amdgpu]\n process_one_work+0x29b/0x560\n worker_thread+0x3d/0x3d0\n\n-> #1 ((work_completion)(&(&process->restore_work)->work)){+.+.}-{0:0}:\n __flush_work+0x88/0x4f0\n __cancel_work_timer+0x12c/0x1c0\n kfd_process_notifier_release_internal+0x37/0x1f0 [amdgpu]\n __mmu_notifier_release+0xad/0x240\n exit_mmap+0x6a/0x3a0\n mmput+0x6a/0x120\n do_exit+0x322/0xb90\n do_group_exit+0x37/0xa0\n __x64_sys_exit_group+0x18/0x20\n do_syscall_64+0x38/0x80\n\n-> #0 (srcu){.+.+}-{0:0}:\n __lock_acquire+0x1521/0x2510\n lock_sync+0x5f/0x90\n __synchronize_srcu+0x4f/0x1a0\n __mmu_notifier_release+0x128/0x240\n exit_mmap+0x6a/0x3a0\n mmput+0x6a/0x120\n svm_range_deferred_list_work+0x19f/0x350 [amdgpu]\n process_one_work+0x29b/0x560\n worker_thread+0x3d/0x3d0\n\nother info that might help us debug this:\nChain exists of:\n srcu --> &info->lock#2 --> (work_completion)(&svms->deferred_list_work)\n\nPossible unsafe locking scenario:\n\n CPU0 CPU1\n ---- ----\n lock((work_completion)(&svms->deferred_list_work));\n lock(&info->lock#2);\n\t\t\tlock((work_completion)(&svms->deferred_list_work));\n sync(srcu);", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52457", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52457", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52457", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52457", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-52457", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-52457" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52632", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52632", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52632", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52632", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52632", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52632" } }, - "CVE-2023-52458": { - "affected_versions": "unk to v6.8-rc1", - "breaks": "", - "cmt_msg": "block: add check that partition length needs to be aligned with block size", - "fixes": "6f64f866aa1ae6975c95d805ed51d7e9433a0016", - "last_affected_version": "6.7.1", - "last_modified": "2024-02-25", - "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nblock: add check that partition length needs to be aligned with block size\n\nBefore calling add partition or resize partition, there is no check\non whether the length is aligned with the logical block size.\nIf the logical block size of the disk is larger than 512 bytes,\nthen the partition size maybe not the multiple of the logical block size,\nand when the last sector is read, bio_truncate() will adjust the bio size,\nresulting in an IO error if the size of the read command is smaller than\nthe logical block size.If integrity data is supported, this will also\nresult in a null pointer dereference when calling bio_integrity_free.", + "CVE-2023-52633": { + "affected_versions": "v2.6.12-rc2 to v6.8-rc1", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "um: time-travel: fix time corruption", + "fixes": "abe4eaa8618bb36c2b33e9cdde0499296a23448c", + "last_affected_version": "6.7.3", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\num: time-travel: fix time corruption\n\nIn 'basic' time-travel mode (without =inf-cpu or =ext), we\nstill get timer interrupts. These can happen at arbitrary\npoints in time, i.e. while in timer_read(), which pushes\ntime forward just a little bit. Then, if we happen to get\nthe interrupt after calculating the new time to push to,\nbut before actually finishing that, the interrupt will set\nthe time to a value that's incompatible with the forward,\nand we'll crash because time goes backwards when we do the\nforwarding.\n\nFix this by reading the time_travel_time, calculating the\nadjustment, and doing the adjustment all with interrupts\ndisabled.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52458", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52458", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52458", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52458", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-52458", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-52458" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52633", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52633", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52633", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52633", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52633", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52633" } }, - "CVE-2023-52459": { - "affected_versions": "v6.6-rc1 to v6.8-rc1", - "breaks": "28a1295795d85a25f2e7dd391c43969e95fcb341", - "cmt_msg": "media: v4l: async: Fix duplicated list deletion", - "fixes": "3de6ee94aae701fa949cd3b5df6b6a440ddfb8f2", - "last_affected_version": "6.7.1", - "last_modified": "2024-02-25", - "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: v4l: async: Fix duplicated list deletion\n\nThe list deletion call dropped here is already called from the\nhelper function in the line before. Having a second list_del()\ncall results in either a warning (with CONFIG_DEBUG_LIST=y):\n\nlist_del corruption, c46c8198->next is LIST_POISON1 (00000100)\n\nIf CONFIG_DEBUG_LIST is disabled the operation results in a\nkernel error due to NULL pointer dereference.", + "CVE-2023-52634": { + "affected_versions": "v2.6.12-rc2 to v6.8-rc1", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "drm/amd/display: Fix disable_otg_wa logic", + "fixes": "2ce156482a6fef349d2eba98e5070c412d3af662", + "last_affected_version": "6.7.3", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Fix disable_otg_wa logic\n\n[Why]\nWhen switching to another HDMI mode, we are unnecesarilly\ndisabling/enabling FIFO causing both HPO and DIG registers to be set at\nthe same time when only HPO is supposed to be set.\n\nThis can lead to a system hang the next time we change refresh rates as\nthere are cases when we don't disable OTG/FIFO but FIFO is enabled when\nit isn't supposed to be.\n\n[How]\nRemoving the enable/disable FIFO entirely.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52459", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52459", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52459", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52459", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-52459", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-52459" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52634", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52634", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52634", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52634", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52634", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52634" } }, - "CVE-2023-52460": { - "affected_versions": "v6.7-rc1 to v6.8-rc1", - "breaks": "7966f319c66d9468623c6a6a017ecbc0dd79be75", - "cmt_msg": "drm/amd/display: Fix NULL pointer dereference at hibernate", - "fixes": "b719a9c15d52d4f56bdea8241a5d90fd9197ce99", - "last_affected_version": "6.7.1", - "last_modified": "2024-02-25", - "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Fix NULL pointer dereference at hibernate\n\nDuring hibernate sequence the source context might not have a clk_mgr.\nSo don't use it to look for DML2 support.", + "CVE-2023-52635": { + "affected_versions": "v2.6.12-rc2 to v6.8-rc1", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "PM / devfreq: Synchronize devfreq_monitor_[start/stop]", + "fixes": "aed5ed595960c6d301dcd4ed31aeaa7a8054c0c6", + "last_affected_version": "6.7.3", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nPM / devfreq: Synchronize devfreq_monitor_[start/stop]\n\nThere is a chance if a frequent switch of the governor\ndone in a loop result in timer list corruption where\ntimer cancel being done from two place one from\ncancel_delayed_work_sync() and followed by expire_timers()\ncan be seen from the traces[1].\n\nwhile true\ndo\n echo \"simple_ondemand\" > /sys/class/devfreq/1d84000.ufshc/governor\n echo \"performance\" > /sys/class/devfreq/1d84000.ufshc/governor\ndone\n\nIt looks to be issue with devfreq driver where\ndevice_monitor_[start/stop] need to synchronized so that\ndelayed work should get corrupted while it is either\nbeing queued or running or being cancelled.\n\nLet's use polling flag and devfreq lock to synchronize the\nqueueing the timer instance twice and work data being\ncorrupted.\n\n[1]\n...\n..\n-0 [003] 9436.209662: timer_cancel timer=0xffffff80444f0428\n-0 [003] 9436.209664: timer_expire_entry timer=0xffffff80444f0428 now=0x10022da1c function=__typeid__ZTSFvP10timer_listE_global_addr baseclk=0x10022da1c\n-0 [003] 9436.209718: timer_expire_exit timer=0xffffff80444f0428\nkworker/u16:6-14217 [003] 9436.209863: timer_start timer=0xffffff80444f0428 function=__typeid__ZTSFvP10timer_listE_global_addr expires=0x10022da2b now=0x10022da1c flags=182452227\nvendor.xxxyyy.ha-1593 [004] 9436.209888: timer_cancel timer=0xffffff80444f0428\nvendor.xxxyyy.ha-1593 [004] 9436.216390: timer_init timer=0xffffff80444f0428\nvendor.xxxyyy.ha-1593 [004] 9436.216392: timer_start timer=0xffffff80444f0428 function=__typeid__ZTSFvP10timer_listE_global_addr expires=0x10022da2c now=0x10022da1d flags=186646532\nvendor.xxxyyy.ha-1593 [005] 9436.220992: timer_cancel timer=0xffffff80444f0428\nxxxyyyTraceManag-7795 [004] 9436.261641: timer_cancel timer=0xffffff80444f0428\n\n[2]\n\n 9436.261653][ C4] Unable to handle kernel paging request at virtual address dead00000000012a\n[ 9436.261664][ C4] Mem abort info:\n[ 9436.261666][ C4] ESR = 0x96000044\n[ 9436.261669][ C4] EC = 0x25: DABT (current EL), IL = 32 bits\n[ 9436.261671][ C4] SET = 0, FnV = 0\n[ 9436.261673][ C4] EA = 0, S1PTW = 0\n[ 9436.261675][ C4] Data abort info:\n[ 9436.261677][ C4] ISV = 0, ISS = 0x00000044\n[ 9436.261680][ C4] CM = 0, WnR = 1\n[ 9436.261682][ C4] [dead00000000012a] address between user and kernel address ranges\n[ 9436.261685][ C4] Internal error: Oops: 96000044 [#1] PREEMPT SMP\n[ 9436.261701][ C4] Skip md ftrace buffer dump for: 0x3a982d0\n...\n\n[ 9436.262138][ C4] CPU: 4 PID: 7795 Comm: TraceManag Tainted: G S W O 5.10.149-android12-9-o-g17f915d29d0c #1\n[ 9436.262141][ C4] Hardware name: Qualcomm Technologies, Inc. (DT)\n[ 9436.262144][ C4] pstate: 22400085 (nzCv daIf +PAN -UAO +TCO BTYPE=--)\n[ 9436.262161][ C4] pc : expire_timers+0x9c/0x438\n[ 9436.262164][ C4] lr : expire_timers+0x2a4/0x438\n[ 9436.262168][ C4] sp : ffffffc010023dd0\n[ 9436.262171][ C4] x29: ffffffc010023df0 x28: ffffffd0636fdc18\n[ 9436.262178][ C4] x27: ffffffd063569dd0 x26: ffffffd063536008\n[ 9436.262182][ C4] x25: 0000000000000001 x24: ffffff88f7c69280\n[ 9436.262185][ C4] x23: 00000000000000e0 x22: dead000000000122\n[ 9436.262188][ C4] x21: 000000010022da29 x20: ffffff8af72b4e80\n[ 9436.262191][ C4] x19: ffffffc010023e50 x18: ffffffc010025038\n[ 9436.262195][ C4] x17: 0000000000000240 x16: 0000000000000201\n[ 9436.262199][ C4] x15: ffffffffffffffff x14: ffffff889f3c3100\n[ 9436.262203][ C4] x13: ffffff889f3c3100 x12: 00000000049f56b8\n[ 9436.262207][ C4] x11: 00000000049f56b8 x10: 00000000ffffffff\n[ 9436.262212][ C4] x9 : ffffffc010023e50 x8 : dead000000000122\n[ 9436.262216][ C4] x7 : ffffffffffffffff x6 : ffffffc0100239d8\n[ 9436.262220][ C4] x5 : 0000000000000000 x4 : 0000000000000101\n[ 9436.262223][ C4] x3 : 0000000000000080 x2 : ffffff8\n---truncated---", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52635", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52635", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52635", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52635", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52635", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52635" + } + }, + "CVE-2023-52636": { + "affected_versions": "v6.6-rc1 to v6.8-rc4", + "breaks": "d396f89db39a2f259e2125ca43b4c31bb65afcad", + "cmt_msg": "libceph: just wait for more data to be available on the socket", + "fixes": "8e46a2d068c92a905d01cbb018b00d66991585ab", + "last_affected_version": "6.7.4", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nlibceph: just wait for more data to be available on the socket\n\nA short read may occur while reading the message footer from the\nsocket. Later, when the socket is ready for another read, the\nmessenger invokes all read_partial_*() handlers, including\nread_partial_sparse_msg_data(). The expectation is that\nread_partial_sparse_msg_data() would bail, allowing the messenger to\ninvoke read_partial() for the footer and pick up where it left off.\n\nHowever read_partial_sparse_msg_data() violates that and ends up\ncalling into the state machine in the OSD client. The sparse-read\nstate machine assumes that it's a new op and interprets some piece of\nthe footer as the sparse-read header and returns bogus extents/data\nlength, etc.\n\nTo determine whether read_partial_sparse_msg_data() should bail, let's\nreuse cursor->total_resid. Because once it reaches to zero that means\nall the extents and data have been successfully received in last read,\nelse it could break out when partially reading any of the extents and\ndata. And then osd_sparse_read() could continue where it left off.\n\n[ idryomov: changelog ]", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52460", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52460", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52460", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52460", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-52460", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-52460" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52636", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52636", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52636", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52636", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52636", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52636" } }, - "CVE-2023-52461": { - "affected_versions": "v6.7-rc1 to v6.8-rc1", - "breaks": "56e449603f0ac580700621a356d35d5716a62ce5", - "cmt_msg": "drm/sched: Fix bounds limiting when given a malformed entity", - "fixes": "2bbe6ab2be53858507f11f99f856846d04765ae3", - "last_affected_version": "6.7.1", - "last_modified": "2024-02-25", - "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/sched: Fix bounds limiting when given a malformed entity\n\nIf we're given a malformed entity in drm_sched_entity_init()--shouldn't\nhappen, but we verify--with out-of-bounds priority value, we set it to an\nallowed value. Fix the expression which sets this limit.", + "CVE-2023-52637": { + "affected_versions": "v5.4-rc1 to v6.8-rc5", + "breaks": "9d71dd0c70099914fcd063135da3c580865e924c", + "cmt_msg": "can: j1939: Fix UAF in j1939_sk_match_filter during setsockopt(SO_J1939_FILTER)", + "fixes": "efe7cf828039aedb297c1f9920b638fffee6aabc", + "last_affected_version": "6.7.5", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncan: j1939: Fix UAF in j1939_sk_match_filter during setsockopt(SO_J1939_FILTER)\n\nLock jsk->sk to prevent UAF when setsockopt(..., SO_J1939_FILTER, ...)\nmodifies jsk->filters while receiving packets.\n\nFollowing trace was seen on affected system:\n ==================================================================\n BUG: KASAN: slab-use-after-free in j1939_sk_recv_match_one+0x1af/0x2d0 [can_j1939]\n Read of size 4 at addr ffff888012144014 by task j1939/350\n\n CPU: 0 PID: 350 Comm: j1939 Tainted: G W OE 6.5.0-rc5 #1\n Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.13.0-1ubuntu1.1 04/01/2014\n Call Trace:\n print_report+0xd3/0x620\n ? kasan_complete_mode_report_info+0x7d/0x200\n ? j1939_sk_recv_match_one+0x1af/0x2d0 [can_j1939]\n kasan_report+0xc2/0x100\n ? j1939_sk_recv_match_one+0x1af/0x2d0 [can_j1939]\n __asan_load4+0x84/0xb0\n j1939_sk_recv_match_one+0x1af/0x2d0 [can_j1939]\n j1939_sk_recv+0x20b/0x320 [can_j1939]\n ? __kasan_check_write+0x18/0x20\n ? __pfx_j1939_sk_recv+0x10/0x10 [can_j1939]\n ? j1939_simple_recv+0x69/0x280 [can_j1939]\n ? j1939_ac_recv+0x5e/0x310 [can_j1939]\n j1939_can_recv+0x43f/0x580 [can_j1939]\n ? __pfx_j1939_can_recv+0x10/0x10 [can_j1939]\n ? raw_rcv+0x42/0x3c0 [can_raw]\n ? __pfx_j1939_can_recv+0x10/0x10 [can_j1939]\n can_rcv_filter+0x11f/0x350 [can]\n can_receive+0x12f/0x190 [can]\n ? __pfx_can_rcv+0x10/0x10 [can]\n can_rcv+0xdd/0x130 [can]\n ? __pfx_can_rcv+0x10/0x10 [can]\n __netif_receive_skb_one_core+0x13d/0x150\n ? __pfx___netif_receive_skb_one_core+0x10/0x10\n ? __kasan_check_write+0x18/0x20\n ? _raw_spin_lock_irq+0x8c/0xe0\n __netif_receive_skb+0x23/0xb0\n process_backlog+0x107/0x260\n __napi_poll+0x69/0x310\n net_rx_action+0x2a1/0x580\n ? __pfx_net_rx_action+0x10/0x10\n ? __pfx__raw_spin_lock+0x10/0x10\n ? handle_irq_event+0x7d/0xa0\n __do_softirq+0xf3/0x3f8\n do_softirq+0x53/0x80\n \n \n __local_bh_enable_ip+0x6e/0x70\n netif_rx+0x16b/0x180\n can_send+0x32b/0x520 [can]\n ? __pfx_can_send+0x10/0x10 [can]\n ? __check_object_size+0x299/0x410\n raw_sendmsg+0x572/0x6d0 [can_raw]\n ? __pfx_raw_sendmsg+0x10/0x10 [can_raw]\n ? apparmor_socket_sendmsg+0x2f/0x40\n ? __pfx_raw_sendmsg+0x10/0x10 [can_raw]\n sock_sendmsg+0xef/0x100\n sock_write_iter+0x162/0x220\n ? __pfx_sock_write_iter+0x10/0x10\n ? __rtnl_unlock+0x47/0x80\n ? security_file_permission+0x54/0x320\n vfs_write+0x6ba/0x750\n ? __pfx_vfs_write+0x10/0x10\n ? __fget_light+0x1ca/0x1f0\n ? __rcu_read_unlock+0x5b/0x280\n ksys_write+0x143/0x170\n ? __pfx_ksys_write+0x10/0x10\n ? __kasan_check_read+0x15/0x20\n ? fpregs_assert_state_consistent+0x62/0x70\n __x64_sys_write+0x47/0x60\n do_syscall_64+0x60/0x90\n ? do_syscall_64+0x6d/0x90\n ? irqentry_exit+0x3f/0x50\n ? exc_page_fault+0x79/0xf0\n entry_SYSCALL_64_after_hwframe+0x6e/0xd8\n\n Allocated by task 348:\n kasan_save_stack+0x2a/0x50\n kasan_set_track+0x29/0x40\n kasan_save_alloc_info+0x1f/0x30\n __kasan_kmalloc+0xb5/0xc0\n __kmalloc_node_track_caller+0x67/0x160\n j1939_sk_setsockopt+0x284/0x450 [can_j1939]\n __sys_setsockopt+0x15c/0x2f0\n __x64_sys_setsockopt+0x6b/0x80\n do_syscall_64+0x60/0x90\n entry_SYSCALL_64_after_hwframe+0x6e/0xd8\n\n Freed by task 349:\n kasan_save_stack+0x2a/0x50\n kasan_set_track+0x29/0x40\n kasan_save_free_info+0x2f/0x50\n __kasan_slab_free+0x12e/0x1c0\n __kmem_cache_free+0x1b9/0x380\n kfree+0x7a/0x120\n j1939_sk_setsockopt+0x3b2/0x450 [can_j1939]\n __sys_setsockopt+0x15c/0x2f0\n __x64_sys_setsockopt+0x6b/0x80\n do_syscall_64+0x60/0x90\n entry_SYSCALL_64_after_hwframe+0x6e/0xd8", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52461", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52461", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52461", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52461", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-52461", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-52461" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52637", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52637", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52637", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52637", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52637", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52637" } }, - "CVE-2023-52462": { - "affected_versions": "v5.16-rc1 to v6.8-rc1", - "breaks": "27113c59b6d0a587b29ae72d4ff3f832f58b0651", - "cmt_msg": "bpf: fix check for attempt to corrupt spilled pointer", - "fixes": "ab125ed3ec1c10ccc36bc98c7a4256ad114a3dae", - "last_affected_version": "6.7.1", - "last_modified": "2024-02-25", - "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: fix check for attempt to corrupt spilled pointer\n\nWhen register is spilled onto a stack as a 1/2/4-byte register, we set\nslot_type[BPF_REG_SIZE - 1] (plus potentially few more below it,\ndepending on actual spill size). So to check if some stack slot has\nspilled register we need to consult slot_type[7], not slot_type[0].\n\nTo avoid the need to remember and double-check this in the future, just\nuse is_spilled_reg() helper.", + "CVE-2023-52638": { + "affected_versions": "v2.6.12-rc2 to v6.8-rc5", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock", + "fixes": "6cdedc18ba7b9dacc36466e27e3267d201948c8d", + "last_affected_version": "6.7.5", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncan: j1939: prevent deadlock by changing j1939_socks_lock to rwlock\n\nThe following 3 locks would race against each other, causing the\ndeadlock situation in the Syzbot bug report:\n\n- j1939_socks_lock\n- active_session_list_lock\n- sk_session_queue_lock\n\nA reasonable fix is to change j1939_socks_lock to an rwlock, since in\nthe rare situations where a write lock is required for the linked list\nthat j1939_socks_lock is protecting, the code does not attempt to\nacquire any more locks. This would break the circular lock dependency,\nwhere, for example, the current thread already locks j1939_socks_lock\nand attempts to acquire sk_session_queue_lock, and at the same time,\nanother thread attempts to acquire j1939_socks_lock while holding\nsk_session_queue_lock.\n\nNOTE: This patch along does not fix the unregister_netdevice bug\nreported by Syzbot; instead, it solves a deadlock situation to prepare\nfor one or more further patches to actually fix the Syzbot bug, which\nappears to be a reference counting problem within the j1939 codebase.\n\n[mkl: remove unrelated newline change]", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52462", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52462", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52462", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52462", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-52462", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-52462" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52638", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52638", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52638", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52638", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52638", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52638" } }, - "CVE-2023-52463": { - "affected_versions": "v5.8-rc7 to v6.8-rc1", - "breaks": "f88814cc2578c121e6edef686365036db72af0ed", - "cmt_msg": "efivarfs: force RO when remounting if SetVariable is not supported", - "fixes": "0e8d2444168dd519fea501599d150e62718ed2fe", - "last_affected_version": "6.7.1", - "last_modified": "2024-02-25", - "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nefivarfs: force RO when remounting if SetVariable is not supported\n\nIf SetVariable at runtime is not supported by the firmware we never assign\na callback for that function. At the same time mount the efivarfs as\nRO so no one can call that. However, we never check the permission flags\nwhen someone remounts the filesystem as RW. As a result this leads to a\ncrash looking like this:\n\n$ mount -o remount,rw /sys/firmware/efi/efivars\n$ efi-updatevar -f PK.auth PK\n\n[ 303.279166] Unable to handle kernel NULL pointer dereference at virtual address 0000000000000000\n[ 303.280482] Mem abort info:\n[ 303.280854] ESR = 0x0000000086000004\n[ 303.281338] EC = 0x21: IABT (current EL), IL = 32 bits\n[ 303.282016] SET = 0, FnV = 0\n[ 303.282414] EA = 0, S1PTW = 0\n[ 303.282821] FSC = 0x04: level 0 translation fault\n[ 303.283771] user pgtable: 4k pages, 48-bit VAs, pgdp=000000004258c000\n[ 303.284913] [0000000000000000] pgd=0000000000000000, p4d=0000000000000000\n[ 303.286076] Internal error: Oops: 0000000086000004 [#1] PREEMPT SMP\n[ 303.286936] Modules linked in: qrtr tpm_tis tpm_tis_core crct10dif_ce arm_smccc_trng rng_core drm fuse ip_tables x_tables ipv6\n[ 303.288586] CPU: 1 PID: 755 Comm: efi-updatevar Not tainted 6.3.0-rc1-00108-gc7d0c4695c68 #1\n[ 303.289748] Hardware name: Unknown Unknown Product/Unknown Product, BIOS 2023.04-00627-g88336918701d 04/01/2023\n[ 303.291150] pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n[ 303.292123] pc : 0x0\n[ 303.292443] lr : efivar_set_variable_locked+0x74/0xec\n[ 303.293156] sp : ffff800008673c10\n[ 303.293619] x29: ffff800008673c10 x28: ffff0000037e8000 x27: 0000000000000000\n[ 303.294592] x26: 0000000000000800 x25: ffff000002467400 x24: 0000000000000027\n[ 303.295572] x23: ffffd49ea9832000 x22: ffff0000020c9800 x21: ffff000002467000\n[ 303.296566] x20: 0000000000000001 x19: 00000000000007fc x18: 0000000000000000\n[ 303.297531] x17: 0000000000000000 x16: 0000000000000000 x15: 0000aaaac807ab54\n[ 303.298495] x14: ed37489f673633c0 x13: 71c45c606de13f80 x12: 47464259e219acf4\n[ 303.299453] x11: ffff000002af7b01 x10: 0000000000000003 x9 : 0000000000000002\n[ 303.300431] x8 : 0000000000000010 x7 : ffffd49ea8973230 x6 : 0000000000a85201\n[ 303.301412] x5 : 0000000000000000 x4 : ffff0000020c9800 x3 : 00000000000007fc\n[ 303.302370] x2 : 0000000000000027 x1 : ffff000002467400 x0 : ffff000002467000\n[ 303.303341] Call trace:\n[ 303.303679] 0x0\n[ 303.303938] efivar_entry_set_get_size+0x98/0x16c\n[ 303.304585] efivarfs_file_write+0xd0/0x1a4\n[ 303.305148] vfs_write+0xc4/0x2e4\n[ 303.305601] ksys_write+0x70/0x104\n[ 303.306073] __arm64_sys_write+0x1c/0x28\n[ 303.306622] invoke_syscall+0x48/0x114\n[ 303.307156] el0_svc_common.constprop.0+0x44/0xec\n[ 303.307803] do_el0_svc+0x38/0x98\n[ 303.308268] el0_svc+0x2c/0x84\n[ 303.308702] el0t_64_sync_handler+0xf4/0x120\n[ 303.309293] el0t_64_sync+0x190/0x194\n[ 303.309794] Code: ???????? ???????? ???????? ???????? (????????)\n[ 303.310612] ---[ end trace 0000000000000000 ]---\n\nFix this by adding a .reconfigure() function to the fs operations which\nwe can use to check the requested flags and deny anything that's not RO\nif the firmware doesn't implement SetVariable at runtime.", + "CVE-2023-52639": { + "affected_versions": "unk to v6.8-rc4", + "breaks": "", + "cmt_msg": "KVM: s390: vsie: fix race during shadow creation", + "fixes": "fe752331d4b361d43cfd0b89534b4b2176057c32", + "last_affected_version": "6.7.5", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: s390: vsie: fix race during shadow creation\n\nRight now it is possible to see gmap->private being zero in\nkvm_s390_vsie_gmap_notifier resulting in a crash. This is due to the\nfact that we add gmap->private == kvm after creation:\n\nstatic int acquire_gmap_shadow(struct kvm_vcpu *vcpu,\n struct vsie_page *vsie_page)\n{\n[...]\n gmap = gmap_shadow(vcpu->arch.gmap, asce, edat);\n if (IS_ERR(gmap))\n return PTR_ERR(gmap);\n gmap->private = vcpu->kvm;\n\nLet children inherit the private field of the parent.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52463", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52463", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52463", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52463", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-52463", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-52463" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52639", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52639", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52639", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52639", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52639", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52639" } }, - "CVE-2023-52464": { - "affected_versions": "v4.12-rc1 to v6.8-rc1", - "breaks": "41003396f932d7f027725c7acebb6a7caa41dc3e", - "cmt_msg": "EDAC/thunderx: Fix possible out-of-bounds string access", - "fixes": "475c58e1a471e9b873e3e39958c64a2d278275c8", - "last_affected_version": "6.7.1", - "last_modified": "2024-02-25", - "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nEDAC/thunderx: Fix possible out-of-bounds string access\n\nEnabling -Wstringop-overflow globally exposes a warning for a common bug\nin the usage of strncat():\n\n drivers/edac/thunderx_edac.c: In function 'thunderx_ocx_com_threaded_isr':\n drivers/edac/thunderx_edac.c:1136:17: error: 'strncat' specified bound 1024 equals destination size [-Werror=stringop-overflow=]\n 1136 | strncat(msg, other, OCX_MESSAGE_SIZE);\n | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~\n ...\n 1145 | strncat(msg, other, OCX_MESSAGE_SIZE);\n ...\n 1150 | strncat(msg, other, OCX_MESSAGE_SIZE);\n\n ...\n\nApparently the author of this driver expected strncat() to behave the\nway that strlcat() does, which uses the size of the destination buffer\nas its third argument rather than the length of the source buffer. The\nresult is that there is no check on the size of the allocated buffer.\n\nChange it to strlcat().\n\n [ bp: Trim compiler output, fixup commit message. ]", + "CVE-2023-52640": { + "affected_versions": "v2.6.12-rc2 to v6.8-rc4", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "fs/ntfs3: Fix oob in ntfs_listxattr", + "fixes": "731ab1f9828800df871c5a7ab9ffe965317d3f15", + "last_affected_version": "6.7.6", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfs/ntfs3: Fix oob in ntfs_listxattr\n\nThe length of name cannot exceed the space occupied by ea.", "ref_urls": { - "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52464", - "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52464", - "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52464", - "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52464", - "SUSE": "https://www.suse.com/security/cve/CVE-2023-52464", - "Ubuntu": "https://ubuntu.com/security/CVE-2023-52464" + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52640", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52640", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52640", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52640", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52640", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52640" + } + }, + "CVE-2023-52641": { + "affected_versions": "unk to v6.8-rc4", + "breaks": "", + "cmt_msg": "fs/ntfs3: Add NULL ptr dereference checking at the end of attr_allocate_frame()", + "fixes": "aaab47f204aaf47838241d57bf8662c8840de60a", + "last_affected_version": "6.7.6", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfs/ntfs3: Add NULL ptr dereference checking at the end of attr_allocate_frame()\n\nIt is preferable to exit through the out: label because\ninternal debugging functions are located there.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-52641", + "ExploitDB": "https://www.exploit-db.com/search?cve=2023-52641", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-52641", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-52641", + "SUSE": "https://www.suse.com/security/cve/CVE-2023-52641", + "Ubuntu": "https://ubuntu.com/security/CVE-2023-52641" } }, "CVE-2023-5345": { @@ -90866,8 +98413,9 @@ } }, "CVE-2023-6270": { - "affected_versions": "unk to unk", + "affected_versions": "unk to v6.9-rc1", "breaks": "", + "cmt_msg": "aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts", "cvss3": { "Attack Complexity": "High", "Attack Vector": "Local", @@ -90880,8 +98428,9 @@ "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "score": 7.0 }, - "fixes": "", - "last_modified": "2024-01-12", + "fixes": "f98364e926626c678fb4b9004b75cacf92ff0662", + "last_affected_version": "6.7.10", + "last_modified": "2024-04-08", "nvd_text": "A flaw was found in the ATA over Ethernet (AoE) driver in the Linux kernel. The aoecmd_cfg_pkts() function improperly updates the refcnt on `struct net_device`, and a use-after-free can be triggered by racing between the free on the struct and the access through the `skbtxq` global queue. This could lead to a denial of service condition or potential code execution.", "ref_urls": { "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-6270", @@ -90893,8 +98442,9 @@ } }, "CVE-2023-6356": { - "affected_versions": "unk to unk", + "affected_versions": "unk to v6.8-rc1", "breaks": "", + "cmt_msg": "nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Network", @@ -90907,8 +98457,9 @@ "raw": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "score": 7.5 }, - "fixes": "", - "last_modified": "2024-02-25", + "fixes": "efa56305908ba20de2104f1b8508c6a7401833be", + "last_affected_version": "6.7.1", + "last_modified": "2024-04-08", "nvd_text": "A flaw was found in the Linux kernel's NVMe driver. This issue may allow an unauthenticated malicious actor to send a set of crafted TCP packages when using NVMe over TCP, leading the NVMe driver to a NULL pointer dereference in the NVMe driver and causing kernel panic and a denial of service.", "ref_urls": { "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-6356", @@ -90976,8 +98527,9 @@ } }, "CVE-2023-6536": { - "affected_versions": "unk to unk", + "affected_versions": "unk to v6.8-rc1", "breaks": "", + "cmt_msg": "nvmet-tcp: fix a crash in nvmet_req_complete()", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Network", @@ -90990,8 +98542,9 @@ "raw": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "score": 7.5 }, - "fixes": "", - "last_modified": "2024-02-25", + "fixes": "0849a5441358cef02586fb2d60f707c0db195628", + "last_affected_version": "6.7.1", + "last_modified": "2024-04-08", "nvd_text": "A flaw was found in the Linux kernel's NVMe driver. This issue may allow an unauthenticated malicious actor to send a set of crafted TCP packages when using NVMe over TCP, leading the NVMe driver to a NULL pointer dereference in the NVMe driver, causing kernel panic and a denial of service.", "ref_urls": { "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-6536", @@ -91292,8 +98845,9 @@ } }, "CVE-2023-7042": { - "affected_versions": "v3.11-rc1 to unk", + "affected_versions": "v3.11-rc1 to v6.9-rc1", "breaks": "5e3dd157d7e70f0e3cea3f2573ed69fb156a19d5", + "cmt_msg": "wifi: ath10k: fix NULL pointer dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev()", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", @@ -91306,8 +98860,9 @@ "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "score": 5.5 }, - "fixes": "", - "last_modified": "2024-01-12", + "fixes": "ad25ee36f00172f7d53242dc77c69fff7ced0755", + "last_affected_version": "6.7.10", + "last_modified": "2024-04-08", "nvd_text": "A null pointer dereference vulnerability was found in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev() in drivers/net/wireless/ath/ath10k/wmi-tlv.c in the Linux kernel. This issue could be exploited to trigger a denial of service.", "ref_urls": { "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-7042", @@ -91509,7 +99064,7 @@ }, "fixes": "eec04ea119691e65227a97ce53c0da6b9b74b0b7", "last_affected_version": "6.6.7", - "last_modified": "2024-02-02", + "last_modified": "2024-04-08", "nvd_text": "An out-of-bounds memory read flaw was found in receive_encrypted_standard in fs/smb/client/smb2ops.c in the SMB Client sub-component in the Linux Kernel. This issue occurs due to integer underflow on the memcpy length, leading to a denial of service.", "ref_urls": { "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-0565", @@ -91725,8 +99280,9 @@ } }, "CVE-2024-0841": { - "affected_versions": "v5.1-rc1 to unk", + "affected_versions": "v5.1-rc1 to v6.8-rc4", "breaks": "32021982a324dce93b4ae00c06213bf45fb319c8", + "cmt_msg": "fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", @@ -91739,8 +99295,9 @@ "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "score": 7.8 }, - "fixes": "", - "last_modified": "2024-02-09", + "fixes": "79d72c68c58784a3e1cd2378669d51bfd0cb7498", + "last_affected_version": "6.7.5", + "last_modified": "2024-04-08", "nvd_text": "A null pointer dereference flaw was found in the hugetlbfs_fill_super function in the Linux kernel hugetlbfs (HugeTLB pages) functionality. This issue may allow a local user to crash the system or potentially escalate their privileges on the system.", "ref_urls": { "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-0841", @@ -91883,9 +99440,25 @@ "Ubuntu": "https://ubuntu.com/security/CVE-2024-21803" } }, - "CVE-2024-22099": { + "CVE-2024-2193": { "affected_versions": "unk to unk", "breaks": "", + "fixes": "", + "last_modified": "2024-04-09", + "nvd_text": "A Speculative Race Condition (SRC) vulnerability that impacts modern CPU architectures supporting speculative execution (related to Spectre V1) has been disclosed. An unauthenticated attacker can exploit this vulnerability to disclose arbitrary data from the CPU using race conditions to access the speculative executable code paths.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-2193", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-2193", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-2193", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-2193", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-2193", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-2193" + } + }, + "CVE-2024-22099": { + "affected_versions": "unk to v6.8-rc7", + "breaks": "", + "cmt_msg": "Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", @@ -91898,8 +99471,9 @@ "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "score": 5.5 }, - "fixes": "", - "last_modified": "2024-02-02", + "fixes": "2535b848fa0f42ddff3e5255cf5e742c9b77bb26", + "last_affected_version": "6.7.10", + "last_modified": "2024-04-08", "nvd_text": "NULL Pointer Dereference vulnerability in Linux Linux kernel kernel on Linux, x86, ARM (net, bluetooth modules) allows Overflow Buffers. This vulnerability is associated with program files /net/bluetooth/rfcomm/core.C.\n\nThis issue affects Linux kernel: v2.6.12-rc2.\n\n", "ref_urls": { "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-22099", @@ -91967,8 +99541,9 @@ } }, "CVE-2024-23196": { - "affected_versions": "unk to unk", + "affected_versions": "unk to v6.5-rc1", "breaks": "", + "cmt_msg": "ALSA: hda: fix a possible null-pointer dereference due to data race in snd_hdac_regmap_sync()", "cvss3": { "Attack Complexity": "High", "Attack Vector": "Local", @@ -91981,8 +99556,9 @@ "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "score": 4.7 }, - "fixes": "", - "last_modified": "2024-02-25", + "fixes": "1f4a08fed450db87fbb5ff5105354158bdbe1a22", + "last_affected_version": "6.4.11", + "last_modified": "2024-04-08", "nvd_text": "A race condition was found in the Linux kernel's sound/hda device driver in snd_hdac_regmap_sync() function. This can result in a null pointer dereference issue, possibly leading to a kernel panic or denial of service issue.\n\n", "ref_urls": { "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-23196", @@ -91994,8 +99570,9 @@ } }, "CVE-2024-23307": { - "affected_versions": "v4.1-rc1 to unk", + "affected_versions": "v4.1-rc1 to v6.9-rc1", "breaks": "edbe83ab4c27ea6669eb57adb5ed7eaec1118ceb", + "cmt_msg": "md/raid5: fix atomicity violation in raid5_cache_count", "cvss3": { "Attack Complexity": "Low", "Attack Vector": "Local", @@ -92008,8 +99585,9 @@ "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "score": 7.8 }, - "fixes": "", - "last_modified": "2024-02-02", + "fixes": "dfd2bf436709b2bccb78c2dda550dde93700efa7", + "last_affected_version": "6.7.11", + "last_modified": "2024-04-08", "nvd_text": "Integer Overflow or Wraparound vulnerability in Linux Linux kernel kernel on Linux, x86, ARM (md, raid, raid5 modules) allows Forced Integer Overflow.", "ref_urls": { "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-23307", @@ -92107,8 +99685,8 @@ } }, "CVE-2024-23851": { - "affected_versions": "unk to v6.8-rc3", - "breaks": "", + "affected_versions": "v2.6.12-rc2 to v6.8-rc3", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", "cmt_msg": "dm: limit the number of targets and parameter size area", "cvss3": { "Attack Complexity": "Low", @@ -92125,7 +99703,7 @@ "cwe": "Unspecified", "fixes": "bd504bcfec41a503b32054da5472904b404341a4", "last_affected_version": "6.7.5", - "last_modified": "2024-02-24", + "last_modified": "2024-04-08", "nvd_text": "copy_params in drivers/md/dm-ioctl.c in the Linux kernel through 6.7.1 can attempt to allocate more than INT_MAX bytes, and crash, because of a missing param_kernel->data_size check. This is related to ctl_ioctl.", "ref_urls": { "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-23851", @@ -92275,8 +99853,9 @@ } }, "CVE-2024-24861": { - "affected_versions": "unk to unk", + "affected_versions": "unk to v6.9-rc1", "breaks": "", + "cmt_msg": "media: xc4000: Fix atomicity violation in xc4000_get_frequency", "cvss3": { "Attack Complexity": "High", "Attack Vector": "Local", @@ -92289,8 +99868,9 @@ "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H", "score": 6.3 }, - "fixes": "", - "last_modified": "2024-02-25", + "fixes": "36d503ad547d1c75758a6fcdbec2806f1b6aeb41", + "last_affected_version": "6.7.11", + "last_modified": "2024-04-08", "nvd_text": "A race condition was found in the Linux kernel's media/xc4000 device driver in xc4000 xc4000_get_frequency() function. This can result in return value overflow issue, possibly leading to malfunction or denial of service issue.\n\n\n\n\n", "ref_urls": { "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-24861", @@ -92331,8 +99911,20 @@ "CVE-2024-25739": { "affected_versions": "v2.6.22-rc1 to unk", "breaks": "801c135ce73d5df1caf3eca35b66a10824ae0707", + "cvss3": { + "Attack Complexity": "Low", + "Attack Vector": "Local", + "Availability": "High", + "Confidentiality": "None", + "Integrity": "None", + "Privileges Required": "Low", + "Scope": "Unchanged", + "User Interaction": "None", + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "score": 5.5 + }, "fixes": "", - "last_modified": "2024-02-25", + "last_modified": "2024-04-09", "nvd_text": "create_empty_lvol in drivers/mtd/ubi/vtbl.c in the Linux kernel through 6.7.4 can attempt to allocate zero bytes, and crash, because of a missing check for ubi->leb_size.", "ref_urls": { "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-25739", @@ -92346,8 +99938,20 @@ "CVE-2024-25740": { "affected_versions": "unk to unk", "breaks": "", + "cvss3": { + "Attack Complexity": "Low", + "Attack Vector": "Local", + "Availability": "High", + "Confidentiality": "None", + "Integrity": "None", + "Privileges Required": "Low", + "Scope": "Unchanged", + "User Interaction": "None", + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "score": 5.5 + }, "fixes": "", - "last_modified": "2024-02-25", + "last_modified": "2024-04-09", "nvd_text": "A memory leak flaw was found in the UBI driver in drivers/mtd/ubi/attach.c in the Linux kernel through 6.7.4 for UBI_IOCATT, because kobj->name is not released.", "ref_urls": { "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-25740", @@ -92411,9 +100015,21 @@ "affected_versions": "v6.0-rc1 to v6.8-rc5", "breaks": "fd31f3996af2", "cmt_msg": "net: tls: fix use-after-free with partial reads and async decrypt", + "cvss3": { + "Attack Complexity": "Low", + "Attack Vector": "Local", + "Availability": "High", + "Confidentiality": "High", + "Integrity": "High", + "Privileges Required": "Low", + "Scope": "Unchanged", + "User Interaction": "None", + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 7.8 + }, "fixes": "32b55c5ff9103b8508c1e04bfa5a08c64e7a925f", "last_affected_version": "6.7.5", - "last_modified": "2024-02-25", + "last_modified": "2024-04-09", "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: tls: fix use-after-free with partial reads and async decrypt\n\ntls_decrypt_sg doesn't take a reference on the pages from clear_skb,\nso the put_page() in tls_decrypt_done releases them, and we trigger\na use-after-free in process_rx_list when we try to read from the\npartially-read skb.", "ref_urls": { "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26582", @@ -92428,9 +100044,21 @@ "affected_versions": "v5.7 to v6.8-rc5", "breaks": "0cada33241d9de205522e3858b18e506ca5cce2c", "cmt_msg": "tls: fix race between async notify and socket close", + "cvss3": { + "Attack Complexity": "High", + "Attack Vector": "Local", + "Availability": "High", + "Confidentiality": "None", + "Integrity": "None", + "Privileges Required": "Low", + "Scope": "Unchanged", + "User Interaction": "None", + "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", + "score": 4.7 + }, "fixes": "aec7961916f3f9e88766e2688992da6980f11b8d", "last_affected_version": "6.7.5", - "last_modified": "2024-02-25", + "last_modified": "2024-04-09", "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntls: fix race between async notify and socket close\n\nThe submitting thread (one which called recvmsg/sendmsg)\nmay exit as soon as the async crypto handler calls complete()\nso any code past that point risks touching already freed data.\n\nTry to avoid the locking and extra flags altogether.\nHave the main thread hold an extra reference, this way\nwe can depend solely on the atomic ref counter for\nsynchronization.\n\nDon't futz with reiniting the completion, either, we are now\ntightly controlling when completion fires.", "ref_urls": { "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26583", @@ -92442,12 +100070,12 @@ } }, "CVE-2024-26584": { - "affected_versions": "unk to v6.8-rc5", - "breaks": "", + "affected_versions": "v4.16-rc1 to v6.8-rc5", + "breaks": "a54667f6728c", "cmt_msg": "net: tls: handle backlogging of crypto requests", "fixes": "8590541473188741055d27b955db0777569438e3", "last_affected_version": "6.7.5", - "last_modified": "2024-02-25", + "last_modified": "2024-04-08", "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: tls: handle backlogging of crypto requests\n\nSince we're setting the CRYPTO_TFM_REQ_MAY_BACKLOG flag on our\nrequests to the crypto API, crypto_aead_{encrypt,decrypt} can return\n -EBUSY instead of -EINPROGRESS in valid situations. For example, when\nthe cryptd queue for AESNI is full (easy to trigger with an\nartificially low cryptd.cryptd_max_cpu_qlen), requests will be enqueued\nto the backlog but still processed. In that case, the async callback\nwill also be called twice: first with err == -EINPROGRESS, which it\nseems we can just ignore, then with err == 0.\n\nCompared to Sabrina's original patch this version uses the new\ntls_*crypt_async_wait() helpers and converts the EBUSY to\nEINPROGRESS to avoid having to modify all the error handling\npaths. The handling is identical.", "ref_urls": { "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26584", @@ -92462,9 +100090,21 @@ "affected_versions": "v4.20-rc1 to v6.8-rc5", "breaks": "a42055e8d2c3", "cmt_msg": "tls: fix race between tx work scheduling and socket close", + "cvss3": { + "Attack Complexity": "High", + "Attack Vector": "Local", + "Availability": "High", + "Confidentiality": "None", + "Integrity": "None", + "Privileges Required": "Low", + "Scope": "Unchanged", + "User Interaction": "None", + "raw": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", + "score": 4.7 + }, "fixes": "e01e3934a1b2d122919f73bc6ddbe1cdafc4bbdb", "last_affected_version": "6.7.5", - "last_modified": "2024-02-25", + "last_modified": "2024-04-09", "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntls: fix race between tx work scheduling and socket close\n\nSimilarly to previous commit, the submitting thread (recvmsg/sendmsg)\nmay exit as soon as the async crypto handler calls complete().\nReorder scheduling the work before calling complete().\nThis seems more logical in the first place, as it's\nthe inverse order of what the submitting thread will do.", "ref_urls": { "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26585", @@ -92479,9 +100119,21 @@ "affected_versions": "v4.19-rc1 to v6.8-rc1", "breaks": "c3ab435466d5", "cmt_msg": "mlxsw: spectrum_acl_tcam: Fix stack corruption", + "cvss3": { + "Attack Complexity": "Low", + "Attack Vector": "Local", + "Availability": "High", + "Confidentiality": "High", + "Integrity": "High", + "Privileges Required": "Low", + "Scope": "Unchanged", + "User Interaction": "None", + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 7.8 + }, "fixes": "483ae90d8f976f8339cf81066312e1329f2d3706", "last_affected_version": "6.7.1", - "last_modified": "2024-02-25", + "last_modified": "2024-04-09", "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmlxsw: spectrum_acl_tcam: Fix stack corruption\n\nWhen tc filters are first added to a net device, the corresponding local\nport gets bound to an ACL group in the device. The group contains a list\nof ACLs. In turn, each ACL points to a different TCAM region where the\nfilters are stored. During forwarding, the ACLs are sequentially\nevaluated until a match is found.\n\nOne reason to place filters in different regions is when they are added\nwith decreasing priorities and in an alternating order so that two\nconsecutive filters can never fit in the same region because of their\nkey usage.\n\nIn Spectrum-2 and newer ASICs the firmware started to report that the\nmaximum number of ACLs in a group is more than 16, but the layout of the\nregister that configures ACL groups (PAGT) was not updated to account\nfor that. It is therefore possible to hit stack corruption [1] in the\nrare case where more than 16 ACLs in a group are required.\n\nFix by limiting the maximum ACL group size to the minimum between what\nthe firmware reports and the maximum ACLs that fit in the PAGT register.\n\nAdd a test case to make sure the machine does not crash when this\ncondition is hit.\n\n[1]\nKernel panic - not syncing: stack-protector: Kernel stack is corrupted in: mlxsw_sp_acl_tcam_group_update+0x116/0x120\n[...]\n dump_stack_lvl+0x36/0x50\n panic+0x305/0x330\n __stack_chk_fail+0x15/0x20\n mlxsw_sp_acl_tcam_group_update+0x116/0x120\n mlxsw_sp_acl_tcam_group_region_attach+0x69/0x110\n mlxsw_sp_acl_tcam_vchunk_get+0x492/0xa20\n mlxsw_sp_acl_tcam_ventry_add+0x25/0xe0\n mlxsw_sp_acl_rule_add+0x47/0x240\n mlxsw_sp_flower_replace+0x1a9/0x1d0\n tc_setup_cb_add+0xdc/0x1c0\n fl_hw_replace_filter+0x146/0x1f0\n fl_change+0xc17/0x1360\n tc_new_tfilter+0x472/0xb90\n rtnetlink_rcv_msg+0x313/0x3b0\n netlink_rcv_skb+0x58/0x100\n netlink_unicast+0x244/0x390\n netlink_sendmsg+0x1e4/0x440\n ____sys_sendmsg+0x164/0x260\n ___sys_sendmsg+0x9a/0xe0\n __sys_sendmsg+0x7a/0xc0\n do_syscall_64+0x40/0xe0\n entry_SYSCALL_64_after_hwframe+0x63/0x6b", "ref_urls": { "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26586", @@ -92493,12 +100145,24 @@ } }, "CVE-2024-26587": { - "affected_versions": "unk to v6.8-rc1", - "breaks": "", + "affected_versions": "v6.6-rc1 to v6.8-rc1", + "breaks": "b63e78fca889e07931ec8f259701718a24e5052e", "cmt_msg": "net: netdevsim: don't try to destroy PHC on VFs", + "cvss3": { + "Attack Complexity": "Low", + "Attack Vector": "Local", + "Availability": "High", + "Confidentiality": "None", + "Integrity": "None", + "Privileges Required": "Low", + "Scope": "Unchanged", + "User Interaction": "None", + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "score": 5.5 + }, "fixes": "ea937f77208323d35ffe2f8d8fc81b00118bfcda", "last_affected_version": "6.7.1", - "last_modified": "2024-02-25", + "last_modified": "2024-04-09", "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: netdevsim: don't try to destroy PHC on VFs\n\nPHC gets initialized in nsim_init_netdevsim(), which\nis only called if (nsim_dev_port_is_pf()).\n\nCreate a counterpart of nsim_init_netdevsim() and\nmove the mock_phc_destroy() there.\n\nThis fixes a crash trying to destroy netdevsim with\nVFs instantiated, as caught by running the devlink.sh test:\n\n BUG: kernel NULL pointer dereference, address: 00000000000000b8\n RIP: 0010:mock_phc_destroy+0xd/0x30\n Call Trace:\n \n nsim_destroy+0x4a/0x70 [netdevsim]\n __nsim_dev_port_del+0x47/0x70 [netdevsim]\n nsim_dev_reload_destroy+0x105/0x120 [netdevsim]\n nsim_drv_remove+0x2f/0xb0 [netdevsim]\n device_release_driver_internal+0x1a1/0x210\n bus_remove_device+0xd5/0x120\n device_del+0x159/0x490\n device_unregister+0x12/0x30\n del_device_store+0x11a/0x1a0 [netdevsim]\n kernfs_fop_write_iter+0x130/0x1d0\n vfs_write+0x30b/0x4b0\n ksys_write+0x69/0xf0\n do_syscall_64+0xcc/0x1e0\n entry_SYSCALL_64_after_hwframe+0x6f/0x77", "ref_urls": { "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26587", @@ -92510,12 +100174,24 @@ } }, "CVE-2024-26588": { - "affected_versions": "unk to v6.8-rc1", - "breaks": "", + "affected_versions": "v6.1-rc3 to v6.8-rc1", + "breaks": "bbfddb904df6f82a5948687a2d57766216b9bc0f", "cmt_msg": "LoongArch: BPF: Prevent out-of-bounds memory access", + "cvss3": { + "Attack Complexity": "Low", + "Attack Vector": "Local", + "Availability": "High", + "Confidentiality": "High", + "Integrity": "High", + "Privileges Required": "Low", + "Scope": "Unchanged", + "User Interaction": "None", + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 7.8 + }, "fixes": "36a87385e31c9343af9a4756598e704741250a67", "last_affected_version": "6.7.1", - "last_modified": "2024-02-25", + "last_modified": "2024-04-09", "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nLoongArch: BPF: Prevent out-of-bounds memory access\n\nThe test_tag test triggers an unhandled page fault:\n\n # ./test_tag\n [ 130.640218] CPU 0 Unable to handle kernel paging request at virtual address ffff80001b898004, era == 9000000003137f7c, ra == 9000000003139e70\n [ 130.640501] Oops[#3]:\n [ 130.640553] CPU: 0 PID: 1326 Comm: test_tag Tainted: G D O 6.7.0-rc4-loong-devel-gb62ab1a397cf #47 61985c1d94084daa2432f771daa45b56b10d8d2a\n [ 130.640764] Hardware name: QEMU QEMU Virtual Machine, BIOS unknown 2/2/2022\n [ 130.640874] pc 9000000003137f7c ra 9000000003139e70 tp 9000000104cb4000 sp 9000000104cb7a40\n [ 130.641001] a0 ffff80001b894000 a1 ffff80001b897ff8 a2 000000006ba210be a3 0000000000000000\n [ 130.641128] a4 000000006ba210be a5 00000000000000f1 a6 00000000000000b3 a7 0000000000000000\n [ 130.641256] t0 0000000000000000 t1 00000000000007f6 t2 0000000000000000 t3 9000000004091b70\n [ 130.641387] t4 000000006ba210be t5 0000000000000004 t6 fffffffffffffff0 t7 90000000040913e0\n [ 130.641512] t8 0000000000000005 u0 0000000000000dc0 s9 0000000000000009 s0 9000000104cb7ae0\n [ 130.641641] s1 00000000000007f6 s2 0000000000000009 s3 0000000000000095 s4 0000000000000000\n [ 130.641771] s5 ffff80001b894000 s6 ffff80001b897fb0 s7 9000000004090c50 s8 0000000000000000\n [ 130.641900] ra: 9000000003139e70 build_body+0x1fcc/0x4988\n [ 130.642007] ERA: 9000000003137f7c build_body+0xd8/0x4988\n [ 130.642112] CRMD: 000000b0 (PLV0 -IE -DA +PG DACF=CC DACM=CC -WE)\n [ 130.642261] PRMD: 00000004 (PPLV0 +PIE -PWE)\n [ 130.642353] EUEN: 00000003 (+FPE +SXE -ASXE -BTE)\n [ 130.642458] ECFG: 00071c1c (LIE=2-4,10-12 VS=7)\n [ 130.642554] ESTAT: 00010000 [PIL] (IS= ECode=1 EsubCode=0)\n [ 130.642658] BADV: ffff80001b898004\n [ 130.642719] PRID: 0014c010 (Loongson-64bit, Loongson-3A5000)\n [ 130.642815] Modules linked in: [last unloaded: bpf_testmod(O)]\n [ 130.642924] Process test_tag (pid: 1326, threadinfo=00000000f7f4015f, task=000000006499f9fd)\n [ 130.643062] Stack : 0000000000000000 9000000003380724 0000000000000000 0000000104cb7be8\n [ 130.643213] 0000000000000000 25af8d9b6e600558 9000000106250ea0 9000000104cb7ae0\n [ 130.643378] 0000000000000000 0000000000000000 9000000104cb7be8 90000000049f6000\n [ 130.643538] 0000000000000090 9000000106250ea0 ffff80001b894000 ffff80001b894000\n [ 130.643685] 00007ffffb917790 900000000313ca94 0000000000000000 0000000000000000\n [ 130.643831] ffff80001b894000 0000000000000ff7 0000000000000000 9000000100468000\n [ 130.643983] 0000000000000000 0000000000000000 0000000000000040 25af8d9b6e600558\n [ 130.644131] 0000000000000bb7 ffff80001b894048 0000000000000000 0000000000000000\n [ 130.644276] 9000000104cb7be8 90000000049f6000 0000000000000090 9000000104cb7bdc\n [ 130.644423] ffff80001b894000 0000000000000000 00007ffffb917790 90000000032acfb0\n [ 130.644572] ...\n [ 130.644629] Call Trace:\n [ 130.644641] [<9000000003137f7c>] build_body+0xd8/0x4988\n [ 130.644785] [<900000000313ca94>] bpf_int_jit_compile+0x228/0x4ec\n [ 130.644891] [<90000000032acfb0>] bpf_prog_select_runtime+0x158/0x1b0\n [ 130.645003] [<90000000032b3504>] bpf_prog_load+0x760/0xb44\n [ 130.645089] [<90000000032b6744>] __sys_bpf+0xbb8/0x2588\n [ 130.645175] [<90000000032b8388>] sys_bpf+0x20/0x2c\n [ 130.645259] [<9000000003f6ab38>] do_syscall+0x7c/0x94\n [ 130.645369] [<9000000003121c5c>] handle_syscall+0xbc/0x158\n [ 130.645507]\n [ 130.645539] Code: 380839f6 380831f9 28412bae <24000ca6> 004081ad 0014cb50 004083e8 02bff34c 58008e91\n [ 130.645729]\n [ 130.646418] ---[ end trace 0000000000000000 ]---\n\nOn my machine, which has CONFIG_PAGE_SIZE_16KB=y, the test failed at\nloading a BPF prog with 2039 instructions:\n\n prog = (struct bpf_prog *)ffff80001b894000\n insn = (struct bpf_insn *)(prog->insnsi)fff\n---truncated---", "ref_urls": { "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26588", @@ -92530,9 +100206,21 @@ "affected_versions": "v4.20-rc1 to v6.8-rc1", "breaks": "d58e468b1112", "cmt_msg": "bpf: Reject variable offset alu on PTR_TO_FLOW_KEYS", + "cvss3": { + "Attack Complexity": "Low", + "Attack Vector": "Local", + "Availability": "High", + "Confidentiality": "High", + "Integrity": "High", + "Privileges Required": "Low", + "Scope": "Unchanged", + "User Interaction": "None", + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "score": 7.8 + }, "fixes": "22c7fa171a02d310e3a3f6ed46a698ca8a0060ed", "last_affected_version": "6.7.1", - "last_modified": "2024-02-25", + "last_modified": "2024-04-09", "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Reject variable offset alu on PTR_TO_FLOW_KEYS\n\nFor PTR_TO_FLOW_KEYS, check_flow_keys_access() only uses fixed off\nfor validation. However, variable offset ptr alu is not prohibited\nfor this ptr kind. So the variable offset is not checked.\n\nThe following prog is accepted:\n\n func#0 @0\n 0: R1=ctx() R10=fp0\n 0: (bf) r6 = r1 ; R1=ctx() R6_w=ctx()\n 1: (79) r7 = *(u64 *)(r6 +144) ; R6_w=ctx() R7_w=flow_keys()\n 2: (b7) r8 = 1024 ; R8_w=1024\n 3: (37) r8 /= 1 ; R8_w=scalar()\n 4: (57) r8 &= 1024 ; R8_w=scalar(smin=smin32=0,\n smax=umax=smax32=umax32=1024,var_off=(0x0; 0x400))\n 5: (0f) r7 += r8\n mark_precise: frame0: last_idx 5 first_idx 0 subseq_idx -1\n mark_precise: frame0: regs=r8 stack= before 4: (57) r8 &= 1024\n mark_precise: frame0: regs=r8 stack= before 3: (37) r8 /= 1\n mark_precise: frame0: regs=r8 stack= before 2: (b7) r8 = 1024\n 6: R7_w=flow_keys(smin=smin32=0,smax=umax=smax32=umax32=1024,var_off\n =(0x0; 0x400)) R8_w=scalar(smin=smin32=0,smax=umax=smax32=umax32=1024,\n var_off=(0x0; 0x400))\n 6: (79) r0 = *(u64 *)(r7 +0) ; R0_w=scalar()\n 7: (95) exit\n\nThis prog loads flow_keys to r7, and adds the variable offset r8\nto r7, and finally causes out-of-bounds access:\n\n BUG: unable to handle page fault for address: ffffc90014c80038\n [...]\n Call Trace:\n \n bpf_dispatcher_nop_func include/linux/bpf.h:1231 [inline]\n __bpf_prog_run include/linux/filter.h:651 [inline]\n bpf_prog_run include/linux/filter.h:658 [inline]\n bpf_prog_run_pin_on_cpu include/linux/filter.h:675 [inline]\n bpf_flow_dissect+0x15f/0x350 net/core/flow_dissector.c:991\n bpf_prog_test_run_flow_dissector+0x39d/0x620 net/bpf/test_run.c:1359\n bpf_prog_test_run kernel/bpf/syscall.c:4107 [inline]\n __sys_bpf+0xf8f/0x4560 kernel/bpf/syscall.c:5475\n __do_sys_bpf kernel/bpf/syscall.c:5561 [inline]\n __se_sys_bpf kernel/bpf/syscall.c:5559 [inline]\n __x64_sys_bpf+0x73/0xb0 kernel/bpf/syscall.c:5559\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0x3f/0x110 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x63/0x6b\n\nFix this by rejecting ptr alu with variable offset on flow_keys.\nApplying the patch rejects the program with \"R7 pointer arithmetic\non flow_keys prohibited\".", "ref_urls": { "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26589", @@ -92547,9 +100235,21 @@ "affected_versions": "v5.16-rc1 to v6.8-rc1", "breaks": "8f89926290c4", "cmt_msg": "erofs: fix inconsistent per-file compression format", + "cvss3": { + "Attack Complexity": "Low", + "Attack Vector": "Local", + "Availability": "High", + "Confidentiality": "None", + "Integrity": "None", + "Privileges Required": "Low", + "Scope": "Unchanged", + "User Interaction": "None", + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "score": 5.5 + }, "fixes": "118a8cf504d7dfa519562d000f423ee3ca75d2c4", "last_affected_version": "6.7.1", - "last_modified": "2024-02-25", + "last_modified": "2024-04-09", "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nerofs: fix inconsistent per-file compression format\n\nEROFS can select compression algorithms on a per-file basis, and each\nper-file compression algorithm needs to be marked in the on-disk\nsuperblock for initialization.\n\nHowever, syzkaller can generate inconsistent crafted images that use\nan unsupported algorithmtype for specific inodes, e.g. use MicroLZMA\nalgorithmtype even it's not set in `sbi->available_compr_algs`. This\ncan lead to an unexpected \"BUG: kernel NULL pointer dereference\" if\nthe corresponding decompressor isn't built-in.\n\nFix this by checking against `sbi->available_compr_algs` for each\nm_algorithmformat request. Incorrect !erofs_sb_has_compr_cfgs preset\nbitmap is now fixed together since it was harmless previously.", "ref_urls": { "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26590", @@ -92561,12 +100261,24 @@ } }, "CVE-2024-26591": { - "affected_versions": "unk to v6.8-rc1", - "breaks": "", + "affected_versions": "v5.13-rc1 to v6.8-rc1", + "breaks": "f3a95075549e0e5c36db922caf86847db7a35403", "cmt_msg": "bpf: Fix re-attachment branch in bpf_tracing_prog_attach", + "cvss3": { + "Attack Complexity": "Low", + "Attack Vector": "Local", + "Availability": "High", + "Confidentiality": "None", + "Integrity": "None", + "Privileges Required": "Low", + "Scope": "Unchanged", + "User Interaction": "None", + "raw": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "score": 5.5 + }, "fixes": "715d82ba636cb3629a6e18a33bb9dbe53f9936ee", "last_affected_version": "6.7.1", - "last_modified": "2024-02-25", + "last_modified": "2024-04-09", "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Fix re-attachment branch in bpf_tracing_prog_attach\n\nThe following case can cause a crash due to missing attach_btf:\n\n1) load rawtp program\n2) load fentry program with rawtp as target_fd\n3) create tracing link for fentry program with target_fd = 0\n4) repeat 3\n\nIn the end we have:\n\n- prog->aux->dst_trampoline == NULL\n- tgt_prog == NULL (because we did not provide target_fd to link_create)\n- prog->aux->attach_btf == NULL (the program was loaded with attach_prog_fd=X)\n- the program was loaded for tgt_prog but we have no way to find out which one\n\n BUG: kernel NULL pointer dereference, address: 0000000000000058\n Call Trace:\n \n ? __die+0x20/0x70\n ? page_fault_oops+0x15b/0x430\n ? fixup_exception+0x22/0x330\n ? exc_page_fault+0x6f/0x170\n ? asm_exc_page_fault+0x22/0x30\n ? bpf_tracing_prog_attach+0x279/0x560\n ? btf_obj_id+0x5/0x10\n bpf_tracing_prog_attach+0x439/0x560\n __sys_bpf+0x1cf4/0x2de0\n __x64_sys_bpf+0x1c/0x30\n do_syscall_64+0x41/0xf0\n entry_SYSCALL_64_after_hwframe+0x6e/0x76\n\nReturn -EINVAL in this situation.", "ref_urls": { "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26591", @@ -92712,5 +100424,3472 @@ "SUSE": "https://www.suse.com/security/cve/CVE-2024-26599", "Ubuntu": "https://ubuntu.com/security/CVE-2024-26599" } + }, + "CVE-2024-26600": { + "affected_versions": "v3.7-rc1 to v6.8-rc3", + "breaks": "657b306a7bdfca4ae1514b533a0e7c3c6d26dbc6", + "cmt_msg": "phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP", + "fixes": "7104ba0f1958adb250319e68a15eff89ec4fd36d", + "last_affected_version": "6.7.4", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nphy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP\n\nIf the external phy working together with phy-omap-usb2 does not implement\nsend_srp(), we may still attempt to call it. This can happen on an idle\nEthernet gadget triggering a wakeup for example:\n\nconfigfs-gadget.g1 gadget.0: ECM Suspend\nconfigfs-gadget.g1 gadget.0: Port suspended. Triggering wakeup\n...\nUnable to handle kernel NULL pointer dereference at virtual address\n00000000 when execute\n...\nPC is at 0x0\nLR is at musb_gadget_wakeup+0x1d4/0x254 [musb_hdrc]\n...\nmusb_gadget_wakeup [musb_hdrc] from usb_gadget_wakeup+0x1c/0x3c [udc_core]\nusb_gadget_wakeup [udc_core] from eth_start_xmit+0x3b0/0x3d4 [u_ether]\neth_start_xmit [u_ether] from dev_hard_start_xmit+0x94/0x24c\ndev_hard_start_xmit from sch_direct_xmit+0x104/0x2e4\nsch_direct_xmit from __dev_queue_xmit+0x334/0xd88\n__dev_queue_xmit from arp_solicit+0xf0/0x268\narp_solicit from neigh_probe+0x54/0x7c\nneigh_probe from __neigh_event_send+0x22c/0x47c\n__neigh_event_send from neigh_resolve_output+0x14c/0x1c0\nneigh_resolve_output from ip_finish_output2+0x1c8/0x628\nip_finish_output2 from ip_send_skb+0x40/0xd8\nip_send_skb from udp_send_skb+0x124/0x340\nudp_send_skb from udp_sendmsg+0x780/0x984\nudp_sendmsg from __sys_sendto+0xd8/0x158\n__sys_sendto from ret_fast_syscall+0x0/0x58\n\nLet's fix the issue by checking for send_srp() and set_vbus() before\ncalling them. For USB peripheral only cases these both could be NULL.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26600", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26600", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26600", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26600", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26600", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26600" + } + }, + "CVE-2024-26601": { + "affected_versions": "v5.11-rc1 to v6.8-rc3", + "breaks": "6bd97bf273bdb4944904e57480f6545bca48ad77", + "cmt_msg": "ext4: regenerate buddy after block freeing failed if under fc replay", + "fixes": "c9b528c35795b711331ed36dc3dbee90d5812d4e", + "last_affected_version": "6.7.4", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: regenerate buddy after block freeing failed if under fc replay\n\nThis mostly reverts commit 6bd97bf273bd (\"ext4: remove redundant\nmb_regenerate_buddy()\") and reintroduces mb_regenerate_buddy(). Based on\ncode in mb_free_blocks(), fast commit replay can end up marking as free\nblocks that are already marked as such. This causes corruption of the\nbuddy bitmap so we need to regenerate it in that case.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26601", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26601", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26601", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26601", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26601", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26601" + } + }, + "CVE-2024-26602": { + "affected_versions": "v4.14-rc1 to v6.8-rc6", + "breaks": "22e4ebb975822833b083533035233d128b30e98f", + "cmt_msg": "sched/membarrier: reduce the ability to hammer on sys_membarrier", + "fixes": "944d5fe50f3f03daacfea16300e656a1691c4a23", + "last_affected_version": "6.7.5", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsched/membarrier: reduce the ability to hammer on sys_membarrier\n\nOn some systems, sys_membarrier can be very expensive, causing overall\nslowdowns for everything. So put a lock on the path in order to\nserialize the accesses to prevent the ability for this to be called at\ntoo high of a frequency and saturate the machine.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26602", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26602", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26602", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26602", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26602", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26602" + } + }, + "CVE-2024-26603": { + "affected_versions": "v5.14-rc1 to v6.8-rc4", + "breaks": "fcb3635f5018e53024c6be3c3213737f469f74ff", + "cmt_msg": "x86/fpu: Stop relying on userspace for info to fault in xsave buffer", + "fixes": "d877550eaf2dc9090d782864c96939397a3c6835", + "last_affected_version": "6.7.5", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nx86/fpu: Stop relying on userspace for info to fault in xsave buffer\n\nBefore this change, the expected size of the user space buffer was\ntaken from fx_sw->xstate_size. fx_sw->xstate_size can be changed\nfrom user-space, so it is possible construct a sigreturn frame where:\n\n * fx_sw->xstate_size is smaller than the size required by valid bits in\n fx_sw->xfeatures.\n * user-space unmaps parts of the sigrame fpu buffer so that not all of\n the buffer required by xrstor is accessible.\n\nIn this case, xrstor tries to restore and accesses the unmapped area\nwhich results in a fault. But fault_in_readable succeeds because buf +\nfx_sw->xstate_size is within the still mapped area, so it goes back and\ntries xrstor again. It will spin in this loop forever.\n\nInstead, fault in the maximum size which can be touched by XRSTOR (taken\nfrom fpstate->user_size).\n\n[ dhansen: tweak subject / changelog ]", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26603", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26603", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26603", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26603", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26603", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26603" + } + }, + "CVE-2024-26604": { + "affected_versions": "v6.6-rc1 to v6.8-rc5", + "breaks": "1b28cb81dab7c1eedc6034206f4e8d644046ad31", + "cmt_msg": "Revert \"kobject: Remove redundant checks for whether ktype is NULL\"", + "fixes": "3ca8fbabcceb8bfe44f7f50640092fd8f1de375c", + "last_affected_version": "6.7.5", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRevert \"kobject: Remove redundant checks for whether ktype is NULL\"\n\nThis reverts commit 1b28cb81dab7c1eedc6034206f4e8d644046ad31.\n\nIt is reported to cause problems, so revert it for now until the root\ncause can be found.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26604", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26604", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26604", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26604", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26604", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26604" + } + }, + "CVE-2024-26605": { + "affected_versions": "v6.7 to v6.8-rc3", + "breaks": "f93e71aea6c60ebff8adbd8941e678302d377869", + "cmt_msg": "PCI/ASPM: Fix deadlock when enabling ASPM", + "fixes": "1e560864159d002b453da42bd2c13a1805515a20", + "last_affected_version": "6.7.4", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nPCI/ASPM: Fix deadlock when enabling ASPM\n\nA last minute revert in 6.7-final introduced a potential deadlock when\nenabling ASPM during probe of Qualcomm PCIe controllers as reported by\nlockdep:\n\n ============================================\n WARNING: possible recursive locking detected\n 6.7.0 #40 Not tainted\n --------------------------------------------\n kworker/u16:5/90 is trying to acquire lock:\n ffffacfa78ced000 (pci_bus_sem){++++}-{3:3}, at: pcie_aspm_pm_state_change+0x58/0xdc\n\n but task is already holding lock:\n ffffacfa78ced000 (pci_bus_sem){++++}-{3:3}, at: pci_walk_bus+0x34/0xbc\n\n other info that might help us debug this:\n Possible unsafe locking scenario:\n\n CPU0\n ----\n lock(pci_bus_sem);\n lock(pci_bus_sem);\n\n *** DEADLOCK ***\n\n Call trace:\n print_deadlock_bug+0x25c/0x348\n __lock_acquire+0x10a4/0x2064\n lock_acquire+0x1e8/0x318\n down_read+0x60/0x184\n pcie_aspm_pm_state_change+0x58/0xdc\n pci_set_full_power_state+0xa8/0x114\n pci_set_power_state+0xc4/0x120\n qcom_pcie_enable_aspm+0x1c/0x3c [pcie_qcom]\n pci_walk_bus+0x64/0xbc\n qcom_pcie_host_post_init_2_7_0+0x28/0x34 [pcie_qcom]\n\nThe deadlock can easily be reproduced on machines like the Lenovo ThinkPad\nX13s by adding a delay to increase the race window during asynchronous\nprobe where another thread can take a write lock.\n\nAdd a new pci_set_power_state_locked() and associated helper functions that\ncan be called with the PCI bus semaphore held to avoid taking the read lock\ntwice.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26605", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26605", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26605", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26605", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26605", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26605" + } + }, + "CVE-2024-26606": { + "affected_versions": "v2.6.29-rc1 to v6.8-rc3", + "breaks": "457b9a6f09f011ebcb9b52cc203a6331a6fc2de7", + "cmt_msg": "binder: signal epoll threads of self-work", + "fixes": "97830f3c3088638ff90b20dfba2eb4d487bf14d7", + "last_affected_version": "6.7.5", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbinder: signal epoll threads of self-work\n\nIn (e)poll mode, threads often depend on I/O events to determine when\ndata is ready for consumption. Within binder, a thread may initiate a\ncommand via BINDER_WRITE_READ without a read buffer and then make use\nof epoll_wait() or similar to consume any responses afterwards.\n\nIt is then crucial that epoll threads are signaled via wakeup when they\nqueue their own work. Otherwise, they risk waiting indefinitely for an\nevent leaving their work unhandled. What is worse, subsequent commands\nwon't trigger a wakeup either as the thread has pending work.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26606", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26606", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26606", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26606", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26606", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26606" + } + }, + "CVE-2024-26607": { + "affected_versions": "v5.0-rc1 to v6.8-rc2", + "breaks": "21d808405fe49028036932dd969920f4fee4f481", + "cmt_msg": "drm/bridge: sii902x: Fix probing race issue", + "fixes": "08ac6f132dd77e40f786d8af51140c96c6d739c9", + "last_affected_version": "6.7.2", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/bridge: sii902x: Fix probing race issue\n\nA null pointer dereference crash has been observed rarely on TI\nplatforms using sii9022 bridge:\n\n[ 53.271356] sii902x_get_edid+0x34/0x70 [sii902x]\n[ 53.276066] sii902x_bridge_get_edid+0x14/0x20 [sii902x]\n[ 53.281381] drm_bridge_get_edid+0x20/0x34 [drm]\n[ 53.286305] drm_bridge_connector_get_modes+0x8c/0xcc [drm_kms_helper]\n[ 53.292955] drm_helper_probe_single_connector_modes+0x190/0x538 [drm_kms_helper]\n[ 53.300510] drm_client_modeset_probe+0x1f0/0xbd4 [drm]\n[ 53.305958] __drm_fb_helper_initial_config_and_unlock+0x50/0x510 [drm_kms_helper]\n[ 53.313611] drm_fb_helper_initial_config+0x48/0x58 [drm_kms_helper]\n[ 53.320039] drm_fbdev_dma_client_hotplug+0x84/0xd4 [drm_dma_helper]\n[ 53.326401] drm_client_register+0x5c/0xa0 [drm]\n[ 53.331216] drm_fbdev_dma_setup+0xc8/0x13c [drm_dma_helper]\n[ 53.336881] tidss_probe+0x128/0x264 [tidss]\n[ 53.341174] platform_probe+0x68/0xc4\n[ 53.344841] really_probe+0x188/0x3c4\n[ 53.348501] __driver_probe_device+0x7c/0x16c\n[ 53.352854] driver_probe_device+0x3c/0x10c\n[ 53.357033] __device_attach_driver+0xbc/0x158\n[ 53.361472] bus_for_each_drv+0x88/0xe8\n[ 53.365303] __device_attach+0xa0/0x1b4\n[ 53.369135] device_initial_probe+0x14/0x20\n[ 53.373314] bus_probe_device+0xb0/0xb4\n[ 53.377145] deferred_probe_work_func+0xcc/0x124\n[ 53.381757] process_one_work+0x1f0/0x518\n[ 53.385770] worker_thread+0x1e8/0x3dc\n[ 53.389519] kthread+0x11c/0x120\n[ 53.392750] ret_from_fork+0x10/0x20\n\nThe issue here is as follows:\n\n- tidss probes, but is deferred as sii902x is still missing.\n- sii902x starts probing and enters sii902x_init().\n- sii902x calls drm_bridge_add(). Now the sii902x bridge is ready from\n DRM's perspective.\n- sii902x calls sii902x_audio_codec_init() and\n platform_device_register_data()\n- The registration of the audio platform device causes probing of the\n deferred devices.\n- tidss probes, which eventually causes sii902x_bridge_get_edid() to be\n called.\n- sii902x_bridge_get_edid() tries to use the i2c to read the edid.\n However, the sii902x driver has not set up the i2c part yet, leading\n to the crash.\n\nFix this by moving the drm_bridge_add() to the end of the\nsii902x_init(), which is also at the very end of sii902x_probe().", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26607", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26607", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26607", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26607", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26607", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26607" + } + }, + "CVE-2024-26608": { + "affected_versions": "v5.15-rc1 to v6.8-rc2", + "breaks": "0626e6641f6b467447c81dd7678a69c66f7746cf", + "cmt_msg": "ksmbd: fix global oob in ksmbd_nl_policy", + "fixes": "ebeae8adf89d9a82359f6659b1663d09beec2faa", + "last_affected_version": "6.7.2", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nksmbd: fix global oob in ksmbd_nl_policy\n\nSimilar to a reported issue (check the commit b33fb5b801c6 (\"net:\nqualcomm: rmnet: fix global oob in rmnet_policy\"), my local fuzzer finds\nanother global out-of-bounds read for policy ksmbd_nl_policy. See bug\ntrace below:\n\n==================================================================\nBUG: KASAN: global-out-of-bounds in validate_nla lib/nlattr.c:386 [inline]\nBUG: KASAN: global-out-of-bounds in __nla_validate_parse+0x24af/0x2750 lib/nlattr.c:600\nRead of size 1 at addr ffffffff8f24b100 by task syz-executor.1/62810\n\nCPU: 0 PID: 62810 Comm: syz-executor.1 Tainted: G N 6.1.0 #3\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.13.0-1ubuntu1.1 04/01/2014\nCall Trace:\n \n __dump_stack lib/dump_stack.c:88 [inline]\n dump_stack_lvl+0x8b/0xb3 lib/dump_stack.c:106\n print_address_description mm/kasan/report.c:284 [inline]\n print_report+0x172/0x475 mm/kasan/report.c:395\n kasan_report+0xbb/0x1c0 mm/kasan/report.c:495\n validate_nla lib/nlattr.c:386 [inline]\n __nla_validate_parse+0x24af/0x2750 lib/nlattr.c:600\n __nla_parse+0x3e/0x50 lib/nlattr.c:697\n __nlmsg_parse include/net/netlink.h:748 [inline]\n genl_family_rcv_msg_attrs_parse.constprop.0+0x1b0/0x290 net/netlink/genetlink.c:565\n genl_family_rcv_msg_doit+0xda/0x330 net/netlink/genetlink.c:734\n genl_family_rcv_msg net/netlink/genetlink.c:833 [inline]\n genl_rcv_msg+0x441/0x780 net/netlink/genetlink.c:850\n netlink_rcv_skb+0x14f/0x410 net/netlink/af_netlink.c:2540\n genl_rcv+0x24/0x40 net/netlink/genetlink.c:861\n netlink_unicast_kernel net/netlink/af_netlink.c:1319 [inline]\n netlink_unicast+0x54e/0x800 net/netlink/af_netlink.c:1345\n netlink_sendmsg+0x930/0xe50 net/netlink/af_netlink.c:1921\n sock_sendmsg_nosec net/socket.c:714 [inline]\n sock_sendmsg+0x154/0x190 net/socket.c:734\n ____sys_sendmsg+0x6df/0x840 net/socket.c:2482\n ___sys_sendmsg+0x110/0x1b0 net/socket.c:2536\n __sys_sendmsg+0xf3/0x1c0 net/socket.c:2565\n do_syscall_x64 arch/x86/entry/common.c:50 [inline]\n do_syscall_64+0x3b/0x90 arch/x86/entry/common.c:80\n entry_SYSCALL_64_after_hwframe+0x63/0xcd\nRIP: 0033:0x7fdd66a8f359\nCode: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48\nRSP: 002b:00007fdd65e00168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e\nRAX: ffffffffffffffda RBX: 00007fdd66bbcf80 RCX: 00007fdd66a8f359\nRDX: 0000000000000000 RSI: 0000000020000500 RDI: 0000000000000003\nRBP: 00007fdd66ada493 R08: 0000000000000000 R09: 0000000000000000\nR10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000\nR13: 00007ffc84b81aff R14: 00007fdd65e00300 R15: 0000000000022000\n \n\nThe buggy address belongs to the variable:\n ksmbd_nl_policy+0x100/0xa80\n\nThe buggy address belongs to the physical page:\npage:0000000034f47940 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1ccc4b\nflags: 0x200000000001000(reserved|node=0|zone=2)\nraw: 0200000000001000 ffffea00073312c8 ffffea00073312c8 0000000000000000\nraw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000\npage dumped because: kasan: bad access detected\n\nMemory state around the buggy address:\n ffffffff8f24b000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00\n ffffffff8f24b080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00\n>ffffffff8f24b100: f9 f9 f9 f9 00 00 f9 f9 f9 f9 f9 f9 00 00 07 f9\n ^\n ffffffff8f24b180: f9 f9 f9 f9 00 05 f9 f9 f9 f9 f9 f9 00 00 00 05\n ffffffff8f24b200: f9 f9 f9 f9 00 00 03 f9 f9 f9 f9 f9 00 00 04 f9\n==================================================================\n\nTo fix it, add a placeholder named __KSMBD_EVENT_MAX and let\nKSMBD_EVENT_MAX to be its original value - 1 according to what other\nnetlink families do. Also change two sites that refer the\nKSMBD_EVENT_MAX to correct value.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26608", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26608", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26608", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26608", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26608", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26608" + } + }, + "CVE-2024-26610": { + "affected_versions": "v5.5-rc1 to v6.8-rc2", + "breaks": "cf29c5b66b9f83939367d90679eb68cdfa2f0356", + "cmt_msg": "wifi: iwlwifi: fix a memory corruption", + "fixes": "cf4a0d840ecc72fcf16198d5e9c505ab7d5a5e4d", + "last_affected_version": "6.7.2", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: iwlwifi: fix a memory corruption\n\niwl_fw_ini_trigger_tlv::data is a pointer to a __le32, which means that\nif we copy to iwl_fw_ini_trigger_tlv::data + offset while offset is in\nbytes, we'll write past the buffer.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26610", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26610", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26610", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26610", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26610", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26610" + } + }, + "CVE-2024-26611": { + "affected_versions": "v6.6-rc1 to v6.8-rc2", + "breaks": "24ea50127ecf0efe819c1f6230add27abc6ca9d9", + "cmt_msg": "xsk: fix usage of multi-buffer BPF helpers for ZC XDP", + "fixes": "c5114710c8ce86b8317e9b448f4fd15c711c2a82", + "last_affected_version": "6.7.2", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nxsk: fix usage of multi-buffer BPF helpers for ZC XDP\n\nCurrently when packet is shrunk via bpf_xdp_adjust_tail() and memory\ntype is set to MEM_TYPE_XSK_BUFF_POOL, null ptr dereference happens:\n\n[1136314.192256] BUG: kernel NULL pointer dereference, address:\n0000000000000034\n[1136314.203943] #PF: supervisor read access in kernel mode\n[1136314.213768] #PF: error_code(0x0000) - not-present page\n[1136314.223550] PGD 0 P4D 0\n[1136314.230684] Oops: 0000 [#1] PREEMPT SMP NOPTI\n[1136314.239621] CPU: 8 PID: 54203 Comm: xdpsock Not tainted 6.6.0+ #257\n[1136314.250469] Hardware name: Intel Corporation S2600WFT/S2600WFT,\nBIOS SE5C620.86B.02.01.0008.031920191559 03/19/2019\n[1136314.265615] RIP: 0010:__xdp_return+0x6c/0x210\n[1136314.274653] Code: ad 00 48 8b 47 08 49 89 f8 a8 01 0f 85 9b 01 00 00 0f 1f 44 00 00 f0 41 ff 48 34 75 32 4c 89 c7 e9 79 cd 80 ff 83 fe 03 75 17 41 34 01 0f 85 02 01 00 00 48 89 cf e9 22 cc 1e 00 e9 3d d2 86\n[1136314.302907] RSP: 0018:ffffc900089f8db0 EFLAGS: 00010246\n[1136314.312967] RAX: ffffc9003168aed0 RBX: ffff8881c3300000 RCX:\n0000000000000000\n[1136314.324953] RDX: 0000000000000000 RSI: 0000000000000003 RDI:\nffffc9003168c000\n[1136314.336929] RBP: 0000000000000ae0 R08: 0000000000000002 R09:\n0000000000010000\n[1136314.348844] R10: ffffc9000e495000 R11: 0000000000000040 R12:\n0000000000000001\n[1136314.360706] R13: 0000000000000524 R14: ffffc9003168aec0 R15:\n0000000000000001\n[1136314.373298] FS: 00007f8df8bbcb80(0000) GS:ffff8897e0e00000(0000)\nknlGS:0000000000000000\n[1136314.386105] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[1136314.396532] CR2: 0000000000000034 CR3: 00000001aa912002 CR4:\n00000000007706f0\n[1136314.408377] DR0: 0000000000000000 DR1: 0000000000000000 DR2:\n0000000000000000\n[1136314.420173] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7:\n0000000000000400\n[1136314.431890] PKRU: 55555554\n[1136314.439143] Call Trace:\n[1136314.446058] \n[1136314.452465] ? __die+0x20/0x70\n[1136314.459881] ? page_fault_oops+0x15b/0x440\n[1136314.468305] ? exc_page_fault+0x6a/0x150\n[1136314.476491] ? asm_exc_page_fault+0x22/0x30\n[1136314.484927] ? __xdp_return+0x6c/0x210\n[1136314.492863] bpf_xdp_adjust_tail+0x155/0x1d0\n[1136314.501269] bpf_prog_ccc47ae29d3b6570_xdp_sock_prog+0x15/0x60\n[1136314.511263] ice_clean_rx_irq_zc+0x206/0xc60 [ice]\n[1136314.520222] ? ice_xmit_zc+0x6e/0x150 [ice]\n[1136314.528506] ice_napi_poll+0x467/0x670 [ice]\n[1136314.536858] ? ttwu_do_activate.constprop.0+0x8f/0x1a0\n[1136314.546010] __napi_poll+0x29/0x1b0\n[1136314.553462] net_rx_action+0x133/0x270\n[1136314.561619] __do_softirq+0xbe/0x28e\n[1136314.569303] do_softirq+0x3f/0x60\n\nThis comes from __xdp_return() call with xdp_buff argument passed as\nNULL which is supposed to be consumed by xsk_buff_free() call.\n\nTo address this properly, in ZC case, a node that represents the frag\nbeing removed has to be pulled out of xskb_list. Introduce\nappropriate xsk helpers to do such node operation and use them\naccordingly within bpf_xdp_adjust_tail().", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26611", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26611", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26611", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26611", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26611", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26611" + } + }, + "CVE-2024-26612": { + "affected_versions": "v5.17-rc1 to v6.8-rc2", + "breaks": "9549332df4ed4e761a1d41c83f2c25d28bb22431", + "cmt_msg": "netfs, fscache: Prevent Oops in fscache_put_cache()", + "fixes": "3be0b3ed1d76c6703b9ee482b55f7e01c369cc68", + "last_affected_version": "6.7.2", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfs, fscache: Prevent Oops in fscache_put_cache()\n\nThis function dereferences \"cache\" and then checks if it's\nIS_ERR_OR_NULL(). Check first, then dereference.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26612", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26612", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26612", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26612", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26612", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26612" + } + }, + "CVE-2024-26614": { + "affected_versions": "v4.4-rc1 to v6.8-rc2", + "breaks": "fff1f3001cc58b5064a0f1154a7ac09b76f29c44", + "cmt_msg": "tcp: make sure init the accept_queue's spinlocks once", + "fixes": "198bc90e0e734e5f98c3d2833e8390cac3df61b2", + "last_affected_version": "6.7.2", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp: make sure init the accept_queue's spinlocks once\n\nWhen I run syz's reproduction C program locally, it causes the following\nissue:\npvqspinlock: lock 0xffff9d181cd5c660 has corrupted value 0x0!\nWARNING: CPU: 19 PID: 21160 at __pv_queued_spin_unlock_slowpath (kernel/locking/qspinlock_paravirt.h:508)\nHardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011\nRIP: 0010:__pv_queued_spin_unlock_slowpath (kernel/locking/qspinlock_paravirt.h:508)\nCode: 73 56 3a ff 90 c3 cc cc cc cc 8b 05 bb 1f 48 01 85 c0 74 05 c3 cc cc cc cc 8b 17 48 89 fe 48 c7 c7\n30 20 ce 8f e8 ad 56 42 ff <0f> 0b c3 cc cc cc cc 0f 0b 0f 1f 40 00 90 90 90 90 90 90 90 90 90\nRSP: 0018:ffffa8d200604cb8 EFLAGS: 00010282\nRAX: 0000000000000000 RBX: 0000000000000000 RCX: ffff9d1ef60e0908\nRDX: 00000000ffffffd8 RSI: 0000000000000027 RDI: ffff9d1ef60e0900\nRBP: ffff9d181cd5c280 R08: 0000000000000000 R09: 00000000ffff7fff\nR10: ffffa8d200604b68 R11: ffffffff907dcdc8 R12: 0000000000000000\nR13: ffff9d181cd5c660 R14: ffff9d1813a3f330 R15: 0000000000001000\nFS: 00007fa110184640(0000) GS:ffff9d1ef60c0000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000000020000000 CR3: 000000011f65e000 CR4: 00000000000006f0\nCall Trace:\n\n _raw_spin_unlock (kernel/locking/spinlock.c:186)\n inet_csk_reqsk_queue_add (net/ipv4/inet_connection_sock.c:1321)\n inet_csk_complete_hashdance (net/ipv4/inet_connection_sock.c:1358)\n tcp_check_req (net/ipv4/tcp_minisocks.c:868)\n tcp_v4_rcv (net/ipv4/tcp_ipv4.c:2260)\n ip_protocol_deliver_rcu (net/ipv4/ip_input.c:205)\n ip_local_deliver_finish (net/ipv4/ip_input.c:234)\n __netif_receive_skb_one_core (net/core/dev.c:5529)\n process_backlog (./include/linux/rcupdate.h:779)\n __napi_poll (net/core/dev.c:6533)\n net_rx_action (net/core/dev.c:6604)\n __do_softirq (./arch/x86/include/asm/jump_label.h:27)\n do_softirq (kernel/softirq.c:454 kernel/softirq.c:441)\n\n\n __local_bh_enable_ip (kernel/softirq.c:381)\n __dev_queue_xmit (net/core/dev.c:4374)\n ip_finish_output2 (./include/net/neighbour.h:540 net/ipv4/ip_output.c:235)\n __ip_queue_xmit (net/ipv4/ip_output.c:535)\n __tcp_transmit_skb (net/ipv4/tcp_output.c:1462)\n tcp_rcv_synsent_state_process (net/ipv4/tcp_input.c:6469)\n tcp_rcv_state_process (net/ipv4/tcp_input.c:6657)\n tcp_v4_do_rcv (net/ipv4/tcp_ipv4.c:1929)\n __release_sock (./include/net/sock.h:1121 net/core/sock.c:2968)\n release_sock (net/core/sock.c:3536)\n inet_wait_for_connect (net/ipv4/af_inet.c:609)\n __inet_stream_connect (net/ipv4/af_inet.c:702)\n inet_stream_connect (net/ipv4/af_inet.c:748)\n __sys_connect (./include/linux/file.h:45 net/socket.c:2064)\n __x64_sys_connect (net/socket.c:2073 net/socket.c:2070 net/socket.c:2070)\n do_syscall_64 (arch/x86/entry/common.c:51 arch/x86/entry/common.c:82)\n entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:129)\n RIP: 0033:0x7fa10ff05a3d\n Code: 5b 41 5c c3 66 0f 1f 84 00 00 00 00 00 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89\n c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d ab a3 0e 00 f7 d8 64 89 01 48\n RSP: 002b:00007fa110183de8 EFLAGS: 00000202 ORIG_RAX: 000000000000002a\n RAX: ffffffffffffffda RBX: 0000000020000054 RCX: 00007fa10ff05a3d\n RDX: 000000000000001c RSI: 0000000020000040 RDI: 0000000000000003\n RBP: 00007fa110183e20 R08: 0000000000000000 R09: 0000000000000000\n R10: 0000000000000000 R11: 0000000000000202 R12: 00007fa110184640\n R13: 0000000000000000 R14: 00007fa10fe8b060 R15: 00007fff73e23b20\n\n\nThe issue triggering process is analyzed as follows:\nThread A Thread B\ntcp_v4_rcv\t//receive ack TCP packet inet_shutdown\n tcp_check_req tcp_disconnect //disconnect sock\n ... tcp_set_state(sk, TCP_CLOSE)\n inet_csk_complete_hashdance ...\n inet_csk_reqsk_queue_add \n---truncated---", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26614", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26614", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26614", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26614", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26614", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26614" + } + }, + "CVE-2024-26615": { + "affected_versions": "v4.19-rc1 to v6.8-rc2", + "breaks": "4b1b7d3b30a6d32ac1a1dcede284e76ef8a8542d", + "cmt_msg": "net/smc: fix illegal rmb_desc access in SMC-D connection dump", + "fixes": "dbc153fd3c142909e564bb256da087e13fbf239c", + "last_affected_version": "6.7.2", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/smc: fix illegal rmb_desc access in SMC-D connection dump\n\nA crash was found when dumping SMC-D connections. It can be reproduced\nby following steps:\n\n- run nginx/wrk test:\n smc_run nginx\n smc_run wrk -t 16 -c 1000 -d -H 'Connection: Close' \n\n- continuously dump SMC-D connections in parallel:\n watch -n 1 'smcss -D'\n\n BUG: kernel NULL pointer dereference, address: 0000000000000030\n CPU: 2 PID: 7204 Comm: smcss Kdump: loaded Tainted: G\tE 6.7.0+ #55\n RIP: 0010:__smc_diag_dump.constprop.0+0x5e5/0x620 [smc_diag]\n Call Trace:\n \n ? __die+0x24/0x70\n ? page_fault_oops+0x66/0x150\n ? exc_page_fault+0x69/0x140\n ? asm_exc_page_fault+0x26/0x30\n ? __smc_diag_dump.constprop.0+0x5e5/0x620 [smc_diag]\n ? __kmalloc_node_track_caller+0x35d/0x430\n ? __alloc_skb+0x77/0x170\n smc_diag_dump_proto+0xd0/0xf0 [smc_diag]\n smc_diag_dump+0x26/0x60 [smc_diag]\n netlink_dump+0x19f/0x320\n __netlink_dump_start+0x1dc/0x300\n smc_diag_handler_dump+0x6a/0x80 [smc_diag]\n ? __pfx_smc_diag_dump+0x10/0x10 [smc_diag]\n sock_diag_rcv_msg+0x121/0x140\n ? __pfx_sock_diag_rcv_msg+0x10/0x10\n netlink_rcv_skb+0x5a/0x110\n sock_diag_rcv+0x28/0x40\n netlink_unicast+0x22a/0x330\n netlink_sendmsg+0x1f8/0x420\n __sock_sendmsg+0xb0/0xc0\n ____sys_sendmsg+0x24e/0x300\n ? copy_msghdr_from_user+0x62/0x80\n ___sys_sendmsg+0x7c/0xd0\n ? __do_fault+0x34/0x160\n ? do_read_fault+0x5f/0x100\n ? do_fault+0xb0/0x110\n ? __handle_mm_fault+0x2b0/0x6c0\n __sys_sendmsg+0x4d/0x80\n do_syscall_64+0x69/0x180\n entry_SYSCALL_64_after_hwframe+0x6e/0x76\n\nIt is possible that the connection is in process of being established\nwhen we dump it. Assumed that the connection has been registered in a\nlink group by smc_conn_create() but the rmb_desc has not yet been\ninitialized by smc_buf_create(), thus causing the illegal access to\nconn->rmb_desc. So fix it by checking before dump.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26615", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26615", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26615", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26615", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26615", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26615" + } + }, + "CVE-2024-26616": { + "affected_versions": "v6.4-rc1 to v6.8-rc2", + "breaks": "e02ee89baa66c40e1002cf8b09141fce7265e0f5", + "cmt_msg": "btrfs: scrub: avoid use-after-free when chunk length is not 64K aligned", + "fixes": "f546c4282673497a06ecb6190b50ae7f6c85b02f", + "last_affected_version": "6.7.2", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: scrub: avoid use-after-free when chunk length is not 64K aligned\n\n[BUG]\nThere is a bug report that, on a ext4-converted btrfs, scrub leads to\nvarious problems, including:\n\n- \"unable to find chunk map\" errors\n BTRFS info (device vdb): scrub: started on devid 1\n BTRFS critical (device vdb): unable to find chunk map for logical 2214744064 length 4096\n BTRFS critical (device vdb): unable to find chunk map for logical 2214744064 length 45056\n\n This would lead to unrepariable errors.\n\n- Use-after-free KASAN reports:\n ==================================================================\n BUG: KASAN: slab-use-after-free in __blk_rq_map_sg+0x18f/0x7c0\n Read of size 8 at addr ffff8881013c9040 by task btrfs/909\n CPU: 0 PID: 909 Comm: btrfs Not tainted 6.7.0-x64v3-dbg #11 c50636e9419a8354555555245df535e380563b2b\n Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 2023.11-2 12/24/2023\n Call Trace:\n \n dump_stack_lvl+0x43/0x60\n print_report+0xcf/0x640\n kasan_report+0xa6/0xd0\n __blk_rq_map_sg+0x18f/0x7c0\n virtblk_prep_rq.isra.0+0x215/0x6a0 [virtio_blk 19a65eeee9ae6fcf02edfad39bb9ddee07dcdaff]\n virtio_queue_rqs+0xc4/0x310 [virtio_blk 19a65eeee9ae6fcf02edfad39bb9ddee07dcdaff]\n blk_mq_flush_plug_list.part.0+0x780/0x860\n __blk_flush_plug+0x1ba/0x220\n blk_finish_plug+0x3b/0x60\n submit_initial_group_read+0x10a/0x290 [btrfs e57987a360bed82fe8756dcd3e0de5406ccfe965]\n flush_scrub_stripes+0x38e/0x430 [btrfs e57987a360bed82fe8756dcd3e0de5406ccfe965]\n scrub_stripe+0x82a/0xae0 [btrfs e57987a360bed82fe8756dcd3e0de5406ccfe965]\n scrub_chunk+0x178/0x200 [btrfs e57987a360bed82fe8756dcd3e0de5406ccfe965]\n scrub_enumerate_chunks+0x4bc/0xa30 [btrfs e57987a360bed82fe8756dcd3e0de5406ccfe965]\n btrfs_scrub_dev+0x398/0x810 [btrfs e57987a360bed82fe8756dcd3e0de5406ccfe965]\n btrfs_ioctl+0x4b9/0x3020 [btrfs e57987a360bed82fe8756dcd3e0de5406ccfe965]\n __x64_sys_ioctl+0xbd/0x100\n do_syscall_64+0x5d/0xe0\n entry_SYSCALL_64_after_hwframe+0x63/0x6b\n RIP: 0033:0x7f47e5e0952b\n\n- Crash, mostly due to above use-after-free\n\n[CAUSE]\nThe converted fs has the following data chunk layout:\n\n item 2 key (FIRST_CHUNK_TREE CHUNK_ITEM 2214658048) itemoff 16025 itemsize 80\n length 86016 owner 2 stripe_len 65536 type DATA|single\n\nFor above logical bytenr 2214744064, it's at the chunk end\n(2214658048 + 86016 = 2214744064).\n\nThis means btrfs_submit_bio() would split the bio, and trigger endio\nfunction for both of the two halves.\n\nHowever scrub_submit_initial_read() would only expect the endio function\nto be called once, not any more.\nThis means the first endio function would already free the bbio::bio,\nleaving the bvec freed, thus the 2nd endio call would lead to\nuse-after-free.\n\n[FIX]\n- Make sure scrub_read_endio() only updates bits in its range\n Since we may read less than 64K at the end of the chunk, we should not\n touch the bits beyond chunk boundary.\n\n- Make sure scrub_submit_initial_read() only to read the chunk range\n This is done by calculating the real number of sectors we need to\n read, and add sector-by-sector to the bio.\n\nThankfully the scrub read repair path won't need extra fixes:\n\n- scrub_stripe_submit_repair_read()\n With above fixes, we won't update error bit for range beyond chunk,\n thus scrub_stripe_submit_repair_read() should never submit any read\n beyond the chunk.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26616", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26616", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26616", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26616", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26616", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26616" + } + }, + "CVE-2024-26617": { + "affected_versions": "v6.7-rc1 to v6.8-rc1", + "breaks": "52526ca7fdb905a768a93f8faa418e9b988fc34b", + "cmt_msg": "fs/proc/task_mmu: move mmu notification mechanism inside mm lock", + "fixes": "4cccb6221cae6d020270606b9e52b1678fc8b71a", + "last_affected_version": "6.7.2", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfs/proc/task_mmu: move mmu notification mechanism inside mm lock\n\nMove mmu notification mechanism inside mm lock to prevent race condition\nin other components which depend on it. The notifier will invalidate\nmemory range. Depending upon the number of iterations, different memory\nranges would be invalidated.\n\nThe following warning would be removed by this patch:\nWARNING: CPU: 0 PID: 5067 at arch/x86/kvm/../../../virt/kvm/kvm_main.c:734 kvm_mmu_notifier_change_pte+0x860/0x960 arch/x86/kvm/../../../virt/kvm/kvm_main.c:734\n\nThere is no behavioural and performance change with this patch when\nthere is no component registered with the mmu notifier.\n\n[akpm@linux-foundation.org: narrow the scope of `range', per Sean]", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26617", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26617", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26617", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26617", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26617", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26617" + } + }, + "CVE-2024-26618": { + "affected_versions": "v6.5-rc7 to v6.8-rc1", + "breaks": "5d0a8d2fba50e9c07cde4aad7fba28c008b07a5b", + "cmt_msg": "arm64/sme: Always exit sme_alloc() early with existing storage", + "fixes": "dc7eb8755797ed41a0d1b5c0c39df3c8f401b3d9", + "last_affected_version": "6.7.2", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\narm64/sme: Always exit sme_alloc() early with existing storage\n\nWhen sme_alloc() is called with existing storage and we are not flushing we\nwill always allocate new storage, both leaking the existing storage and\ncorrupting the state. Fix this by separating the checks for flushing and\nfor existing storage as we do for SVE.\n\nCallers that reallocate (eg, due to changing the vector length) should\ncall sme_free() themselves.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26618", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26618", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26618", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26618", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26618", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26618" + } + }, + "CVE-2024-26619": { + "affected_versions": "v6.7-rc5 to v6.8-rc1", + "breaks": "d8792a5734b0f3e58b898c2e2f910bfac48e9ee3", + "cmt_msg": "riscv: Fix module loading free order", + "fixes": "78996eee79ebdfe8b6f0e54cb6dcc792d5129291", + "last_affected_version": "6.7.2", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nriscv: Fix module loading free order\n\nReverse order of kfree calls to resolve use-after-free error.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26619", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26619", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26619", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26619", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26619", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26619" + } + }, + "CVE-2024-26620": { + "affected_versions": "v6.0-rc1 to v6.8-rc1", + "breaks": "48cae940c31d2407d860d87c41d5f9871c0521db", + "cmt_msg": "s390/vfio-ap: always filter entire AP matrix", + "fixes": "850fb7fa8c684a4c6bf0e4b6978f4ddcc5d43d11", + "last_affected_version": "6.7.2", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\ns390/vfio-ap: always filter entire AP matrix\n\nThe vfio_ap_mdev_filter_matrix function is called whenever a new adapter or\ndomain is assigned to the mdev. The purpose of the function is to update\nthe guest's AP configuration by filtering the matrix of adapters and\ndomains assigned to the mdev. When an adapter or domain is assigned, only\nthe APQNs associated with the APID of the new adapter or APQI of the new\ndomain are inspected. If an APQN does not reference a queue device bound to\nthe vfio_ap device driver, then it's APID will be filtered from the mdev's\nmatrix when updating the guest's AP configuration.\n\nInspecting only the APID of the new adapter or APQI of the new domain will\nresult in passing AP queues through to a guest that are not bound to the\nvfio_ap device driver under certain circumstances. Consider the following:\n\nguest's AP configuration (all also assigned to the mdev's matrix):\n14.0004\n14.0005\n14.0006\n16.0004\n16.0005\n16.0006\n\nunassign domain 4\nunbind queue 16.0005\nassign domain 4\n\nWhen domain 4 is re-assigned, since only domain 4 will be inspected, the\nAPQNs that will be examined will be:\n14.0004\n16.0004\n\nSince both of those APQNs reference queue devices that are bound to the\nvfio_ap device driver, nothing will get filtered from the mdev's matrix\nwhen updating the guest's AP configuration. Consequently, queue 16.0005\nwill get passed through despite not being bound to the driver. This\nviolates the linux device model requirement that a guest shall only be\ngiven access to devices bound to the device driver facilitating their\npass-through.\n\nTo resolve this problem, every adapter and domain assigned to the mdev will\nbe inspected when filtering the mdev's matrix.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26620", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26620", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26620", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26620", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26620", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26620" + } + }, + "CVE-2024-26621": { + "affected_versions": "v6.7 to v6.8-rc3", + "breaks": "efa7df3e3bb5da8e6abbe37727417f32a37fba47", + "cmt_msg": "mm: huge_memory: don't force huge page alignment on 32 bit", + "fixes": "4ef9ad19e17676b9ef071309bc62020e2373705d", + "last_affected_version": "6.7.5", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm: huge_memory: don't force huge page alignment on 32 bit\n\ncommit efa7df3e3bb5 (\"mm: align larger anonymous mappings on THP\nboundaries\") caused two issues [1] [2] reported on 32 bit system or compat\nuserspace.\n\nIt doesn't make too much sense to force huge page alignment on 32 bit\nsystem due to the constrained virtual address space.\n\n[1] https://lore.kernel.org/linux-mm/d0a136a0-4a31-46bc-adf4-2db109a61672@kernel.org/\n[2] https://lore.kernel.org/linux-mm/CAJuCfpHXLdQy1a2B6xN2d7quTYwg2OoZseYPZTRpU0eHHKD-sQ@mail.gmail.com/", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26621", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26621", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26621", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26621", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26621", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26621" + } + }, + "CVE-2024-26622": { + "affected_versions": "unk to v6.8-rc7", + "breaks": "", + "cmt_msg": "tomoyo: fix UAF write bug in tomoyo_write_control()", + "fixes": "2f03fc340cac9ea1dc63cbf8c93dd2eb0f227815", + "last_affected_version": "6.7.8", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntomoyo: fix UAF write bug in tomoyo_write_control()\n\nSince tomoyo_write_control() updates head->write_buf when write()\nof long lines is requested, we need to fetch head->write_buf after\nhead->io_sem is held. Otherwise, concurrent write() requests can\ncause use-after-free-write and double-free problems.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26622", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26622", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26622", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26622", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26622", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26622" + } + }, + "CVE-2024-26623": { + "affected_versions": "unk to v6.8-rc3", + "breaks": "", + "cmt_msg": "pds_core: Prevent race issues involving the adminq", + "fixes": "7e82a8745b951b1e794cc780d46f3fbee5e93447", + "last_affected_version": "6.7.3", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\npds_core: Prevent race issues involving the adminq\n\nThere are multiple paths that can result in using the pdsc's\nadminq.\n\n[1] pdsc_adminq_isr and the resulting work from queue_work(),\n i.e. pdsc_work_thread()->pdsc_process_adminq()\n\n[2] pdsc_adminq_post()\n\nWhen the device goes through reset via PCIe reset and/or\na fw_down/fw_up cycle due to bad PCIe state or bad device\nstate the adminq is destroyed and recreated.\n\nA NULL pointer dereference can happen if [1] or [2] happens\nafter the adminq is already destroyed.\n\nIn order to fix this, add some further state checks and\nimplement reference counting for adminq uses. Reference\ncounting was used because multiple threads can attempt to\naccess the adminq at the same time via [1] or [2]. Additionally,\nmultiple clients (i.e. pds-vfio-pci) can be using [2]\nat the same time.\n\nThe adminq_refcnt is initialized to 1 when the adminq has been\nallocated and is ready to use. Users/clients of the adminq\n(i.e. [1] and [2]) will increment the refcnt when they are using\nthe adminq. When the driver goes into a fw_down cycle it will\nset the PDSC_S_FW_DEAD bit and then wait for the adminq_refcnt\nto hit 1. Setting the PDSC_S_FW_DEAD before waiting will prevent\nany further adminq_refcnt increments. Waiting for the\nadminq_refcnt to hit 1 allows for any current users of the adminq\nto finish before the driver frees the adminq. Once the\nadminq_refcnt hits 1 the driver clears the refcnt to signify that\nthe adminq is deleted and cannot be used. On the fw_up cycle the\ndriver will once again initialize the adminq_refcnt to 1 allowing\nthe adminq to be used again.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26623", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26623", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26623", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26623", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26623", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26623" + } + }, + "CVE-2024-26625": { + "affected_versions": "unk to v6.8-rc3", + "breaks": "", + "cmt_msg": "llc: call sock_orphan() at release time", + "fixes": "aa2b2eb3934859904c287bf5434647ba72e14c1c", + "last_affected_version": "6.7.3", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nllc: call sock_orphan() at release time\n\nsyzbot reported an interesting trace [1] caused by a stale sk->sk_wq\npointer in a closed llc socket.\n\nIn commit ff7b11aa481f (\"net: socket: set sock->sk to NULL after\ncalling proto_ops::release()\") Eric Biggers hinted that some protocols\nare missing a sock_orphan(), we need to perform a full audit.\n\nIn net-next, I plan to clear sock->sk from sock_orphan() and\namend Eric patch to add a warning.\n\n[1]\n BUG: KASAN: slab-use-after-free in list_empty include/linux/list.h:373 [inline]\n BUG: KASAN: slab-use-after-free in waitqueue_active include/linux/wait.h:127 [inline]\n BUG: KASAN: slab-use-after-free in sock_def_write_space_wfree net/core/sock.c:3384 [inline]\n BUG: KASAN: slab-use-after-free in sock_wfree+0x9a8/0x9d0 net/core/sock.c:2468\nRead of size 8 at addr ffff88802f4fc880 by task ksoftirqd/1/27\n\nCPU: 1 PID: 27 Comm: ksoftirqd/1 Not tainted 6.8.0-rc1-syzkaller-00049-g6098d87eaf31 #0\nHardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.2-debian-1.16.2-1 04/01/2014\nCall Trace:\n \n __dump_stack lib/dump_stack.c:88 [inline]\n dump_stack_lvl+0xd9/0x1b0 lib/dump_stack.c:106\n print_address_description mm/kasan/report.c:377 [inline]\n print_report+0xc4/0x620 mm/kasan/report.c:488\n kasan_report+0xda/0x110 mm/kasan/report.c:601\n list_empty include/linux/list.h:373 [inline]\n waitqueue_active include/linux/wait.h:127 [inline]\n sock_def_write_space_wfree net/core/sock.c:3384 [inline]\n sock_wfree+0x9a8/0x9d0 net/core/sock.c:2468\n skb_release_head_state+0xa3/0x2b0 net/core/skbuff.c:1080\n skb_release_all net/core/skbuff.c:1092 [inline]\n napi_consume_skb+0x119/0x2b0 net/core/skbuff.c:1404\n e1000_unmap_and_free_tx_resource+0x144/0x200 drivers/net/ethernet/intel/e1000/e1000_main.c:1970\n e1000_clean_tx_irq drivers/net/ethernet/intel/e1000/e1000_main.c:3860 [inline]\n e1000_clean+0x4a1/0x26e0 drivers/net/ethernet/intel/e1000/e1000_main.c:3801\n __napi_poll.constprop.0+0xb4/0x540 net/core/dev.c:6576\n napi_poll net/core/dev.c:6645 [inline]\n net_rx_action+0x956/0xe90 net/core/dev.c:6778\n __do_softirq+0x21a/0x8de kernel/softirq.c:553\n run_ksoftirqd kernel/softirq.c:921 [inline]\n run_ksoftirqd+0x31/0x60 kernel/softirq.c:913\n smpboot_thread_fn+0x660/0xa10 kernel/smpboot.c:164\n kthread+0x2c6/0x3a0 kernel/kthread.c:388\n ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:147\n ret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:242\n \n\nAllocated by task 5167:\n kasan_save_stack+0x33/0x50 mm/kasan/common.c:47\n kasan_save_track+0x14/0x30 mm/kasan/common.c:68\n unpoison_slab_object mm/kasan/common.c:314 [inline]\n __kasan_slab_alloc+0x81/0x90 mm/kasan/common.c:340\n kasan_slab_alloc include/linux/kasan.h:201 [inline]\n slab_post_alloc_hook mm/slub.c:3813 [inline]\n slab_alloc_node mm/slub.c:3860 [inline]\n kmem_cache_alloc_lru+0x142/0x6f0 mm/slub.c:3879\n alloc_inode_sb include/linux/fs.h:3019 [inline]\n sock_alloc_inode+0x25/0x1c0 net/socket.c:308\n alloc_inode+0x5d/0x220 fs/inode.c:260\n new_inode_pseudo+0x16/0x80 fs/inode.c:1005\n sock_alloc+0x40/0x270 net/socket.c:634\n __sock_create+0xbc/0x800 net/socket.c:1535\n sock_create net/socket.c:1622 [inline]\n __sys_socket_create net/socket.c:1659 [inline]\n __sys_socket+0x14c/0x260 net/socket.c:1706\n __do_sys_socket net/socket.c:1720 [inline]\n __se_sys_socket net/socket.c:1718 [inline]\n __x64_sys_socket+0x72/0xb0 net/socket.c:1718\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0xd3/0x250 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x63/0x6b\n\nFreed by task 0:\n kasan_save_stack+0x33/0x50 mm/kasan/common.c:47\n kasan_save_track+0x14/0x30 mm/kasan/common.c:68\n kasan_save_free_info+0x3f/0x60 mm/kasan/generic.c:640\n poison_slab_object mm/kasan/common.c:241 [inline]\n __kasan_slab_free+0x121/0x1b0 mm/kasan/common.c:257\n kasan_slab_free include/linux/kasan.h:184 [inline]\n slab_free_hook mm/slub.c:2121 [inlin\n---truncated---", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26625", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26625", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26625", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26625", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26625", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26625" + } + }, + "CVE-2024-26626": { + "affected_versions": "v6.8-rc1 to v6.8-rc3", + "breaks": "bb7403655b3c3eb245d0ee330047cd3e20b3c4af", + "fixes": "e622502c310f1069fd9f41cd38210553115f610a", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipmr: fix kernel panic when forwarding mcast packets\n\nThe stacktrace was:\n[ 86.305548] BUG: kernel NULL pointer dereference, address: 0000000000000092\n[ 86.306815] #PF: supervisor read access in kernel mode\n[ 86.307717] #PF: error_code(0x0000) - not-present page\n[ 86.308624] PGD 0 P4D 0\n[ 86.309091] Oops: 0000 [#1] PREEMPT SMP NOPTI\n[ 86.309883] CPU: 2 PID: 3139 Comm: pimd Tainted: G U 6.8.0-6wind-knet #1\n[ 86.311027] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.11.1-0-g0551a4be2c-prebuilt.qemu-project.org 04/01/2014\n[ 86.312728] RIP: 0010:ip_mr_forward (/build/work/knet/net/ipv4/ipmr.c:1985)\n[ 86.313399] Code: f9 1f 0f 87 85 03 00 00 48 8d 04 5b 48 8d 04 83 49 8d 44 c5 00 48 8b 40 70 48 39 c2 0f 84 d9 00 00 00 49 8b 46 58 48 83 e0 fe <80> b8 92 00 00 00 00 0f 84 55 ff ff ff 49 83 47 38 01 45 85 e4 0f\n[ 86.316565] RSP: 0018:ffffad21c0583ae0 EFLAGS: 00010246\n[ 86.317497] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000\n[ 86.318596] RDX: ffff9559cb46c000 RSI: 0000000000000000 RDI: 0000000000000000\n[ 86.319627] RBP: ffffad21c0583b30 R08: 0000000000000000 R09: 0000000000000000\n[ 86.320650] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000001\n[ 86.321672] R13: ffff9559c093a000 R14: ffff9559cc00b800 R15: ffff9559c09c1d80\n[ 86.322873] FS: 00007f85db661980(0000) GS:ffff955a79d00000(0000) knlGS:0000000000000000\n[ 86.324291] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 86.325314] CR2: 0000000000000092 CR3: 000000002f13a000 CR4: 0000000000350ef0\n[ 86.326589] Call Trace:\n[ 86.327036] \n[ 86.327434] ? show_regs (/build/work/knet/arch/x86/kernel/dumpstack.c:479)\n[ 86.328049] ? __die (/build/work/knet/arch/x86/kernel/dumpstack.c:421 /build/work/knet/arch/x86/kernel/dumpstack.c:434)\n[ 86.328508] ? page_fault_oops (/build/work/knet/arch/x86/mm/fault.c:707)\n[ 86.329107] ? do_user_addr_fault (/build/work/knet/arch/x86/mm/fault.c:1264)\n[ 86.329756] ? srso_return_thunk (/build/work/knet/arch/x86/lib/retpoline.S:223)\n[ 86.330350] ? __irq_work_queue_local (/build/work/knet/kernel/irq_work.c:111 (discriminator 1))\n[ 86.331013] ? exc_page_fault (/build/work/knet/./arch/x86/include/asm/paravirt.h:693 /build/work/knet/arch/x86/mm/fault.c:1515 /build/work/knet/arch/x86/mm/fault.c:1563)\n[ 86.331702] ? asm_exc_page_fault (/build/work/knet/./arch/x86/include/asm/idtentry.h:570)\n[ 86.332468] ? ip_mr_forward (/build/work/knet/net/ipv4/ipmr.c:1985)\n[ 86.333183] ? srso_return_thunk (/build/work/knet/arch/x86/lib/retpoline.S:223)\n[ 86.333920] ipmr_mfc_add (/build/work/knet/./include/linux/rcupdate.h:782 /build/work/knet/net/ipv4/ipmr.c:1009 /build/work/knet/net/ipv4/ipmr.c:1273)\n[ 86.334583] ? __pfx_ipmr_hash_cmp (/build/work/knet/net/ipv4/ipmr.c:363)\n[ 86.335357] ip_mroute_setsockopt (/build/work/knet/net/ipv4/ipmr.c:1470)\n[ 86.336135] ? srso_return_thunk (/build/work/knet/arch/x86/lib/retpoline.S:223)\n[ 86.336854] ? ip_mroute_setsockopt (/build/work/knet/net/ipv4/ipmr.c:1470)\n[ 86.337679] do_ip_setsockopt (/build/work/knet/net/ipv4/ip_sockglue.c:944)\n[ 86.338408] ? __pfx_unix_stream_read_actor (/build/work/knet/net/unix/af_unix.c:2862)\n[ 86.339232] ? srso_return_thunk (/build/work/knet/arch/x86/lib/retpoline.S:223)\n[ 86.339809] ? aa_sk_perm (/build/work/knet/security/apparmor/include/cred.h:153 /build/work/knet/security/apparmor/net.c:181)\n[ 86.340342] ip_setsockopt (/build/work/knet/net/ipv4/ip_sockglue.c:1415)\n[ 86.340859] raw_setsockopt (/build/work/knet/net/ipv4/raw.c:836)\n[ 86.341408] ? security_socket_setsockopt (/build/work/knet/security/security.c:4561 (discriminator 13))\n[ 86.342116] sock_common_setsockopt (/build/work/knet/net/core/sock.c:3716)\n[ 86.342747] do_sock_setsockopt (/build/work/knet/net/socket.c:2313)\n[ 86.343363] __sys_setsockopt (/build/work/knet/./include/linux/file.h:32 /build/work/kn\n---truncated---", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26626", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26626", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26626", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26626", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26626", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26626" + } + }, + "CVE-2024-26627": { + "affected_versions": "unk to v6.8-rc3", + "breaks": "", + "cmt_msg": "scsi: core: Move scsi_host_busy() out of host lock for waking up EH handler", + "fixes": "4373534a9850627a2695317944898eb1283a2db0", + "last_affected_version": "6.7.3", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: core: Move scsi_host_busy() out of host lock for waking up EH handler\n\nInside scsi_eh_wakeup(), scsi_host_busy() is called & checked with host\nlock every time for deciding if error handler kthread needs to be waken up.\n\nThis can be too heavy in case of recovery, such as:\n\n - N hardware queues\n\n - queue depth is M for each hardware queue\n\n - each scsi_host_busy() iterates over (N * M) tag/requests\n\nIf recovery is triggered in case that all requests are in-flight, each\nscsi_eh_wakeup() is strictly serialized, when scsi_eh_wakeup() is called\nfor the last in-flight request, scsi_host_busy() has been run for (N * M -\n1) times, and request has been iterated for (N*M - 1) * (N * M) times.\n\nIf both N and M are big enough, hard lockup can be triggered on acquiring\nhost lock, and it is observed on mpi3mr(128 hw queues, queue depth 8169).\n\nFix the issue by calling scsi_host_busy() outside the host lock. We don't\nneed the host lock for getting busy count because host the lock never\ncovers that.\n\n[mkp: Drop unnecessary 'busy' variables pointed out by Bart]", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26627", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26627", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26627", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26627", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26627", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26627" + } + }, + "CVE-2024-26629": { + "affected_versions": "v5.19-rc1 to v6.8-rc2", + "breaks": "ce3c4ad7f4ce5db7b4f08a1e237d8dd94b39180b", + "cmt_msg": "nfsd: fix RELEASE_LOCKOWNER", + "fixes": "edcf9725150e42beeca42d085149f4c88fa97afd", + "last_affected_version": "6.7.2", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnfsd: fix RELEASE_LOCKOWNER\n\nThe test on so_count in nfsd4_release_lockowner() is nonsense and\nharmful. Revert to using check_for_locks(), changing that to not sleep.\n\nFirst: harmful.\nAs is documented in the kdoc comment for nfsd4_release_lockowner(), the\ntest on so_count can transiently return a false positive resulting in a\nreturn of NFS4ERR_LOCKS_HELD when in fact no locks are held. This is\nclearly a protocol violation and with the Linux NFS client it can cause\nincorrect behaviour.\n\nIf RELEASE_LOCKOWNER is sent while some other thread is still\nprocessing a LOCK request which failed because, at the time that request\nwas received, the given owner held a conflicting lock, then the nfsd\nthread processing that LOCK request can hold a reference (conflock) to\nthe lock owner that causes nfsd4_release_lockowner() to return an\nincorrect error.\n\nThe Linux NFS client ignores that NFS4ERR_LOCKS_HELD error because it\nnever sends NFS4_RELEASE_LOCKOWNER without first releasing any locks, so\nit knows that the error is impossible. It assumes the lock owner was in\nfact released so it feels free to use the same lock owner identifier in\nsome later locking request.\n\nWhen it does reuse a lock owner identifier for which a previous RELEASE\nfailed, it will naturally use a lock_seqid of zero. However the server,\nwhich didn't release the lock owner, will expect a larger lock_seqid and\nso will respond with NFS4ERR_BAD_SEQID.\n\nSo clearly it is harmful to allow a false positive, which testing\nso_count allows.\n\nThe test is nonsense because ... well... it doesn't mean anything.\n\nso_count is the sum of three different counts.\n1/ the set of states listed on so_stateids\n2/ the set of active vfs locks owned by any of those states\n3/ various transient counts such as for conflicting locks.\n\nWhen it is tested against '2' it is clear that one of these is the\ntransient reference obtained by find_lockowner_str_locked(). It is not\nclear what the other one is expected to be.\n\nIn practice, the count is often 2 because there is precisely one state\non so_stateids. If there were more, this would fail.\n\nIn my testing I see two circumstances when RELEASE_LOCKOWNER is called.\nIn one case, CLOSE is called before RELEASE_LOCKOWNER. That results in\nall the lock states being removed, and so the lockowner being discarded\n(it is removed when there are no more references which usually happens\nwhen the lock state is discarded). When nfsd4_release_lockowner() finds\nthat the lock owner doesn't exist, it returns success.\n\nThe other case shows an so_count of '2' and precisely one state listed\nin so_stateid. It appears that the Linux client uses a separate lock\nowner for each file resulting in one lock state per lock owner, so this\ntest on '2' is safe. For another client it might not be safe.\n\nSo this patch changes check_for_locks() to use the (newish)\nfind_any_file_locked() so that it doesn't take a reference on the\nnfs4_file and so never calls nfsd_file_put(), and so never sleeps. With\nthis check is it safe to restore the use of check_for_locks() rather\nthan testing so_count against the mysterious '2'.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26629", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26629", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26629", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26629", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26629", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26629" + } + }, + "CVE-2024-26630": { + "affected_versions": "v6.5-rc1 to v6.8-rc7", + "breaks": "cf264e1329fb0307e044f7675849f9f38b44c11a", + "cmt_msg": "mm: cachestat: fix folio read-after-free in cache walk", + "fixes": "3a75cb05d53f4a6823a32deb078de1366954a804", + "last_affected_version": "6.7.8", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm: cachestat: fix folio read-after-free in cache walk\n\nIn cachestat, we access the folio from the page cache's xarray to compute\nits page offset, and check for its dirty and writeback flags. However, we\ndo not hold a reference to the folio before performing these actions,\nwhich means the folio can concurrently be released and reused as another\nfolio/page/slab.\n\nGet around this altogether by just using xarray's existing machinery for\nthe folio page offsets and dirty/writeback states.\n\nThis changes behavior for tmpfs files to now always report zeroes in their\ndirty and writeback counters. This is okay as tmpfs doesn't follow\nconventional writeback cache behavior: its pages get \"cleaned\" during\nswapout, after which they're no longer resident etc.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26630", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26630", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26630", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26630", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26630", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26630" + } + }, + "CVE-2024-26631": { + "affected_versions": "v5.13-rc1 to v6.8-rc1", + "breaks": "2d9a93b4902be6a5504b5941dd15e9cd776aadca", + "cmt_msg": "ipv6: mcast: fix data-race in ipv6_mc_down / mld_ifc_work", + "fixes": "2e7ef287f07c74985f1bf2858bedc62bd9ebf155", + "last_affected_version": "6.7.1", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv6: mcast: fix data-race in ipv6_mc_down / mld_ifc_work\n\nidev->mc_ifc_count can be written over without proper locking.\n\nOriginally found by syzbot [1], fix this issue by encapsulating calls\nto mld_ifc_stop_work() (and mld_gq_stop_work() for good measure) with\nmutex_lock() and mutex_unlock() accordingly as these functions\nshould only be called with mc_lock per their declarations.\n\n[1]\nBUG: KCSAN: data-race in ipv6_mc_down / mld_ifc_work\n\nwrite to 0xffff88813a80c832 of 1 bytes by task 3771 on cpu 0:\n mld_ifc_stop_work net/ipv6/mcast.c:1080 [inline]\n ipv6_mc_down+0x10a/0x280 net/ipv6/mcast.c:2725\n addrconf_ifdown+0xe32/0xf10 net/ipv6/addrconf.c:3949\n addrconf_notify+0x310/0x980\n notifier_call_chain kernel/notifier.c:93 [inline]\n raw_notifier_call_chain+0x6b/0x1c0 kernel/notifier.c:461\n __dev_notify_flags+0x205/0x3d0\n dev_change_flags+0xab/0xd0 net/core/dev.c:8685\n do_setlink+0x9f6/0x2430 net/core/rtnetlink.c:2916\n rtnl_group_changelink net/core/rtnetlink.c:3458 [inline]\n __rtnl_newlink net/core/rtnetlink.c:3717 [inline]\n rtnl_newlink+0xbb3/0x1670 net/core/rtnetlink.c:3754\n rtnetlink_rcv_msg+0x807/0x8c0 net/core/rtnetlink.c:6558\n netlink_rcv_skb+0x126/0x220 net/netlink/af_netlink.c:2545\n rtnetlink_rcv+0x1c/0x20 net/core/rtnetlink.c:6576\n netlink_unicast_kernel net/netlink/af_netlink.c:1342 [inline]\n netlink_unicast+0x589/0x650 net/netlink/af_netlink.c:1368\n netlink_sendmsg+0x66e/0x770 net/netlink/af_netlink.c:1910\n ...\n\nwrite to 0xffff88813a80c832 of 1 bytes by task 22 on cpu 1:\n mld_ifc_work+0x54c/0x7b0 net/ipv6/mcast.c:2653\n process_one_work kernel/workqueue.c:2627 [inline]\n process_scheduled_works+0x5b8/0xa30 kernel/workqueue.c:2700\n worker_thread+0x525/0x730 kernel/workqueue.c:2781\n ...", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26631", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26631", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26631", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26631", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26631", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26631" + } + }, + "CVE-2024-26632": { + "affected_versions": "v5.17-rc1 to v6.8-rc1", + "breaks": "640d1930bef4f87ec8d8d2b05f0f6edc1dfcf662", + "cmt_msg": "block: Fix iterating over an empty bio with bio_for_each_folio_all", + "fixes": "7bed6f3d08b7af27b7015da8dc3acf2b9c1f21d7", + "last_affected_version": "6.7.1", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nblock: Fix iterating over an empty bio with bio_for_each_folio_all\n\nIf the bio contains no data, bio_first_folio() calls page_folio() on a\nNULL pointer and oopses. Move the test that we've reached the end of\nthe bio from bio_next_folio() to bio_first_folio().\n\n[axboe: add unlikely() to error case]", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26632", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26632", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26632", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26632", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26632", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26632" + } + }, + "CVE-2024-26633": { + "affected_versions": "unk to v6.8-rc1", + "breaks": "", + "cmt_msg": "ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim()", + "fixes": "d375b98e0248980681e5e56b712026174d617198", + "last_affected_version": "6.7.1", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim()\n\nsyzbot pointed out [1] that NEXTHDR_FRAGMENT handling is broken.\n\nReading frag_off can only be done if we pulled enough bytes\nto skb->head. Currently we might access garbage.\n\n[1]\nBUG: KMSAN: uninit-value in ip6_tnl_parse_tlv_enc_lim+0x94f/0xbb0\nip6_tnl_parse_tlv_enc_lim+0x94f/0xbb0\nipxip6_tnl_xmit net/ipv6/ip6_tunnel.c:1326 [inline]\nip6_tnl_start_xmit+0xab2/0x1a70 net/ipv6/ip6_tunnel.c:1432\n__netdev_start_xmit include/linux/netdevice.h:4940 [inline]\nnetdev_start_xmit include/linux/netdevice.h:4954 [inline]\nxmit_one net/core/dev.c:3548 [inline]\ndev_hard_start_xmit+0x247/0xa10 net/core/dev.c:3564\n__dev_queue_xmit+0x33b8/0x5130 net/core/dev.c:4349\ndev_queue_xmit include/linux/netdevice.h:3134 [inline]\nneigh_connected_output+0x569/0x660 net/core/neighbour.c:1592\nneigh_output include/net/neighbour.h:542 [inline]\nip6_finish_output2+0x23a9/0x2b30 net/ipv6/ip6_output.c:137\nip6_finish_output+0x855/0x12b0 net/ipv6/ip6_output.c:222\nNF_HOOK_COND include/linux/netfilter.h:303 [inline]\nip6_output+0x323/0x610 net/ipv6/ip6_output.c:243\ndst_output include/net/dst.h:451 [inline]\nip6_local_out+0xe9/0x140 net/ipv6/output_core.c:155\nip6_send_skb net/ipv6/ip6_output.c:1952 [inline]\nip6_push_pending_frames+0x1f9/0x560 net/ipv6/ip6_output.c:1972\nrawv6_push_pending_frames+0xbe8/0xdf0 net/ipv6/raw.c:582\nrawv6_sendmsg+0x2b66/0x2e70 net/ipv6/raw.c:920\ninet_sendmsg+0x105/0x190 net/ipv4/af_inet.c:847\nsock_sendmsg_nosec net/socket.c:730 [inline]\n__sock_sendmsg net/socket.c:745 [inline]\n____sys_sendmsg+0x9c2/0xd60 net/socket.c:2584\n___sys_sendmsg+0x28d/0x3c0 net/socket.c:2638\n__sys_sendmsg net/socket.c:2667 [inline]\n__do_sys_sendmsg net/socket.c:2676 [inline]\n__se_sys_sendmsg net/socket.c:2674 [inline]\n__x64_sys_sendmsg+0x307/0x490 net/socket.c:2674\ndo_syscall_x64 arch/x86/entry/common.c:52 [inline]\ndo_syscall_64+0x44/0x110 arch/x86/entry/common.c:83\nentry_SYSCALL_64_after_hwframe+0x63/0x6b\n\nUninit was created at:\nslab_post_alloc_hook+0x129/0xa70 mm/slab.h:768\nslab_alloc_node mm/slub.c:3478 [inline]\n__kmem_cache_alloc_node+0x5c9/0x970 mm/slub.c:3517\n__do_kmalloc_node mm/slab_common.c:1006 [inline]\n__kmalloc_node_track_caller+0x118/0x3c0 mm/slab_common.c:1027\nkmalloc_reserve+0x249/0x4a0 net/core/skbuff.c:582\npskb_expand_head+0x226/0x1a00 net/core/skbuff.c:2098\n__pskb_pull_tail+0x13b/0x2310 net/core/skbuff.c:2655\npskb_may_pull_reason include/linux/skbuff.h:2673 [inline]\npskb_may_pull include/linux/skbuff.h:2681 [inline]\nip6_tnl_parse_tlv_enc_lim+0x901/0xbb0 net/ipv6/ip6_tunnel.c:408\nipxip6_tnl_xmit net/ipv6/ip6_tunnel.c:1326 [inline]\nip6_tnl_start_xmit+0xab2/0x1a70 net/ipv6/ip6_tunnel.c:1432\n__netdev_start_xmit include/linux/netdevice.h:4940 [inline]\nnetdev_start_xmit include/linux/netdevice.h:4954 [inline]\nxmit_one net/core/dev.c:3548 [inline]\ndev_hard_start_xmit+0x247/0xa10 net/core/dev.c:3564\n__dev_queue_xmit+0x33b8/0x5130 net/core/dev.c:4349\ndev_queue_xmit include/linux/netdevice.h:3134 [inline]\nneigh_connected_output+0x569/0x660 net/core/neighbour.c:1592\nneigh_output include/net/neighbour.h:542 [inline]\nip6_finish_output2+0x23a9/0x2b30 net/ipv6/ip6_output.c:137\nip6_finish_output+0x855/0x12b0 net/ipv6/ip6_output.c:222\nNF_HOOK_COND include/linux/netfilter.h:303 [inline]\nip6_output+0x323/0x610 net/ipv6/ip6_output.c:243\ndst_output include/net/dst.h:451 [inline]\nip6_local_out+0xe9/0x140 net/ipv6/output_core.c:155\nip6_send_skb net/ipv6/ip6_output.c:1952 [inline]\nip6_push_pending_frames+0x1f9/0x560 net/ipv6/ip6_output.c:1972\nrawv6_push_pending_frames+0xbe8/0xdf0 net/ipv6/raw.c:582\nrawv6_sendmsg+0x2b66/0x2e70 net/ipv6/raw.c:920\ninet_sendmsg+0x105/0x190 net/ipv4/af_inet.c:847\nsock_sendmsg_nosec net/socket.c:730 [inline]\n__sock_sendmsg net/socket.c:745 [inline]\n____sys_sendmsg+0x9c2/0xd60 net/socket.c:2584\n___sys_sendmsg+0x28d/0x3c0 net/socket.c:2638\n__sys_sendmsg net/socket.c:2667 [inline]\n__do_sys_sendms\n---truncated---", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26633", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26633", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26633", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26633", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26633", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26633" + } + }, + "CVE-2024-26634": { + "affected_versions": "v6.6-rc7 to v6.8-rc2", + "breaks": "7663d522099ecc464512164e660bc771b2ff7b64", + "cmt_msg": "net: fix removing a namespace with conflicting altnames", + "fixes": "d09486a04f5da0a812c26217213b89a3b1acf836", + "last_affected_version": "6.7.2", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: fix removing a namespace with conflicting altnames\n\nMark reports a BUG() when a net namespace is removed.\n\n kernel BUG at net/core/dev.c:11520!\n\nPhysical interfaces moved outside of init_net get \"refunded\"\nto init_net when that namespace disappears. The main interface\nname may get overwritten in the process if it would have\nconflicted. We need to also discard all conflicting altnames.\nRecent fixes addressed ensuring that altnames get moved\nwith the main interface, which surfaced this problem.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26634", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26634", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26634", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26634", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26634", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26634" + } + }, + "CVE-2024-26635": { + "affected_versions": "unk to v6.8-rc2", + "breaks": "", + "cmt_msg": "llc: Drop support for ETH_P_TR_802_2.", + "fixes": "e3f9bed9bee261e3347131764e42aeedf1ffea61", + "last_affected_version": "6.7.2", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nllc: Drop support for ETH_P_TR_802_2.\n\nsyzbot reported an uninit-value bug below. [0]\n\nllc supports ETH_P_802_2 (0x0004) and used to support ETH_P_TR_802_2\n(0x0011), and syzbot abused the latter to trigger the bug.\n\n write$tun(r0, &(0x7f0000000040)={@val={0x0, 0x11}, @val, @mpls={[], @llc={@snap={0xaa, 0x1, ')', \"90e5dd\"}}}}, 0x16)\n\nllc_conn_handler() initialises local variables {saddr,daddr}.mac\nbased on skb in llc_pdu_decode_sa()/llc_pdu_decode_da() and passes\nthem to __llc_lookup().\n\nHowever, the initialisation is done only when skb->protocol is\nhtons(ETH_P_802_2), otherwise, __llc_lookup_established() and\n__llc_lookup_listener() will read garbage.\n\nThe missing initialisation existed prior to commit 211ed865108e\n(\"net: delete all instances of special processing for token ring\").\n\nIt removed the part to kick out the token ring stuff but forgot to\nclose the door allowing ETH_P_TR_802_2 packets to sneak into llc_rcv().\n\nLet's remove llc_tr_packet_type and complete the deprecation.\n\n[0]:\nBUG: KMSAN: uninit-value in __llc_lookup_established+0xe9d/0xf90\n __llc_lookup_established+0xe9d/0xf90\n __llc_lookup net/llc/llc_conn.c:611 [inline]\n llc_conn_handler+0x4bd/0x1360 net/llc/llc_conn.c:791\n llc_rcv+0xfbb/0x14a0 net/llc/llc_input.c:206\n __netif_receive_skb_one_core net/core/dev.c:5527 [inline]\n __netif_receive_skb+0x1a6/0x5a0 net/core/dev.c:5641\n netif_receive_skb_internal net/core/dev.c:5727 [inline]\n netif_receive_skb+0x58/0x660 net/core/dev.c:5786\n tun_rx_batched+0x3ee/0x980 drivers/net/tun.c:1555\n tun_get_user+0x53af/0x66d0 drivers/net/tun.c:2002\n tun_chr_write_iter+0x3af/0x5d0 drivers/net/tun.c:2048\n call_write_iter include/linux/fs.h:2020 [inline]\n new_sync_write fs/read_write.c:491 [inline]\n vfs_write+0x8ef/0x1490 fs/read_write.c:584\n ksys_write+0x20f/0x4c0 fs/read_write.c:637\n __do_sys_write fs/read_write.c:649 [inline]\n __se_sys_write fs/read_write.c:646 [inline]\n __x64_sys_write+0x93/0xd0 fs/read_write.c:646\n do_syscall_x64 arch/x86/entry/common.c:51 [inline]\n do_syscall_64+0x44/0x110 arch/x86/entry/common.c:82\n entry_SYSCALL_64_after_hwframe+0x63/0x6b\n\nLocal variable daddr created at:\n llc_conn_handler+0x53/0x1360 net/llc/llc_conn.c:783\n llc_rcv+0xfbb/0x14a0 net/llc/llc_input.c:206\n\nCPU: 1 PID: 5004 Comm: syz-executor994 Not tainted 6.6.0-syzkaller-14500-g1c41041124bd #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26635", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26635", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26635", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26635", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26635", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26635" + } + }, + "CVE-2024-26636": { + "affected_versions": "unk to v6.8-rc2", + "breaks": "", + "cmt_msg": "llc: make llc_ui_sendmsg() more robust against bonding changes", + "fixes": "dad555c816a50c6a6a8a86be1f9177673918c647", + "last_affected_version": "6.7.2", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nllc: make llc_ui_sendmsg() more robust against bonding changes\n\nsyzbot was able to trick llc_ui_sendmsg(), allocating an skb with no\nheadroom, but subsequently trying to push 14 bytes of Ethernet header [1]\n\nLike some others, llc_ui_sendmsg() releases the socket lock before\ncalling sock_alloc_send_skb().\nThen it acquires it again, but does not redo all the sanity checks\nthat were performed.\n\nThis fix:\n\n- Uses LL_RESERVED_SPACE() to reserve space.\n- Check all conditions again after socket lock is held again.\n- Do not account Ethernet header for mtu limitation.\n\n[1]\n\nskbuff: skb_under_panic: text:ffff800088baa334 len:1514 put:14 head:ffff0000c9c37000 data:ffff0000c9c36ff2 tail:0x5dc end:0x6c0 dev:bond0\n\n kernel BUG at net/core/skbuff.c:193 !\nInternal error: Oops - BUG: 00000000f2000800 [#1] PREEMPT SMP\nModules linked in:\nCPU: 0 PID: 6875 Comm: syz-executor.0 Not tainted 6.7.0-rc8-syzkaller-00101-g0802e17d9aca-dirty #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023\npstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n pc : skb_panic net/core/skbuff.c:189 [inline]\n pc : skb_under_panic+0x13c/0x140 net/core/skbuff.c:203\n lr : skb_panic net/core/skbuff.c:189 [inline]\n lr : skb_under_panic+0x13c/0x140 net/core/skbuff.c:203\nsp : ffff800096f97000\nx29: ffff800096f97010 x28: ffff80008cc8d668 x27: dfff800000000000\nx26: ffff0000cb970c90 x25: 00000000000005dc x24: ffff0000c9c36ff2\nx23: ffff0000c9c37000 x22: 00000000000005ea x21: 00000000000006c0\nx20: 000000000000000e x19: ffff800088baa334 x18: 1fffe000368261ce\nx17: ffff80008e4ed000 x16: ffff80008a8310f8 x15: 0000000000000001\nx14: 1ffff00012df2d58 x13: 0000000000000000 x12: 0000000000000000\nx11: 0000000000000001 x10: 0000000000ff0100 x9 : e28a51f1087e8400\nx8 : e28a51f1087e8400 x7 : ffff80008028f8d0 x6 : 0000000000000000\nx5 : 0000000000000001 x4 : 0000000000000001 x3 : ffff800082b78714\nx2 : 0000000000000001 x1 : 0000000100000000 x0 : 0000000000000089\nCall trace:\n skb_panic net/core/skbuff.c:189 [inline]\n skb_under_panic+0x13c/0x140 net/core/skbuff.c:203\n skb_push+0xf0/0x108 net/core/skbuff.c:2451\n eth_header+0x44/0x1f8 net/ethernet/eth.c:83\n dev_hard_header include/linux/netdevice.h:3188 [inline]\n llc_mac_hdr_init+0x110/0x17c net/llc/llc_output.c:33\n llc_sap_action_send_xid_c+0x170/0x344 net/llc/llc_s_ac.c:85\n llc_exec_sap_trans_actions net/llc/llc_sap.c:153 [inline]\n llc_sap_next_state net/llc/llc_sap.c:182 [inline]\n llc_sap_state_process+0x1ec/0x774 net/llc/llc_sap.c:209\n llc_build_and_send_xid_pkt+0x12c/0x1c0 net/llc/llc_sap.c:270\n llc_ui_sendmsg+0x7bc/0xb1c net/llc/af_llc.c:997\n sock_sendmsg_nosec net/socket.c:730 [inline]\n __sock_sendmsg net/socket.c:745 [inline]\n sock_sendmsg+0x194/0x274 net/socket.c:767\n splice_to_socket+0x7cc/0xd58 fs/splice.c:881\n do_splice_from fs/splice.c:933 [inline]\n direct_splice_actor+0xe4/0x1c0 fs/splice.c:1142\n splice_direct_to_actor+0x2a0/0x7e4 fs/splice.c:1088\n do_splice_direct+0x20c/0x348 fs/splice.c:1194\n do_sendfile+0x4bc/0xc70 fs/read_write.c:1254\n __do_sys_sendfile64 fs/read_write.c:1322 [inline]\n __se_sys_sendfile64 fs/read_write.c:1308 [inline]\n __arm64_sys_sendfile64+0x160/0x3b4 fs/read_write.c:1308\n __invoke_syscall arch/arm64/kernel/syscall.c:37 [inline]\n invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:51\n el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:136\n do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:155\n el0_svc+0x54/0x158 arch/arm64/kernel/entry-common.c:678\n el0t_64_sync_handler+0x84/0xfc arch/arm64/kernel/entry-common.c:696\n el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:595\nCode: aa1803e6 aa1903e7 a90023f5 94792f6a (d4210000)", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26636", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26636", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26636", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26636", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26636", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26636" + } + }, + "CVE-2024-26637": { + "affected_versions": "v6.7 to v6.8-rc2", + "breaks": "0a3d898ee9a8303d5b3982b97ef0703919c3ea76", + "cmt_msg": "wifi: ath11k: rely on mac80211 debugfs handling for vif", + "fixes": "556857aa1d0855aba02b1c63bc52b91ec63fc2cc", + "last_affected_version": "6.7.2", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: ath11k: rely on mac80211 debugfs handling for vif\n\nmac80211 started to delete debugfs entries in certain cases, causing a\nath11k to crash when it tried to delete the entries later. Fix this by\nrelying on mac80211 to delete the entries when appropriate and adding\nthem from the vif_add_debugfs handler.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26637", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26637", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26637", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26637", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26637", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26637" + } + }, + "CVE-2024-26638": { + "affected_versions": "v5.19-rc1 to v6.8-rc1", + "breaks": "f94fd25cb0aaf77fd7453f31c5d394a1a68ecf60", + "cmt_msg": "nbd: always initialize struct msghdr completely", + "fixes": "78fbb92af27d0982634116c7a31065f24d092826", + "last_affected_version": "6.7.2", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnbd: always initialize struct msghdr completely\n\nsyzbot complains that msg->msg_get_inq value can be uninitialized [1]\n\nstruct msghdr got many new fields recently, we should always make\nsure their values is zero by default.\n\n[1]\n BUG: KMSAN: uninit-value in tcp_recvmsg+0x686/0xac0 net/ipv4/tcp.c:2571\n tcp_recvmsg+0x686/0xac0 net/ipv4/tcp.c:2571\n inet_recvmsg+0x131/0x580 net/ipv4/af_inet.c:879\n sock_recvmsg_nosec net/socket.c:1044 [inline]\n sock_recvmsg+0x12b/0x1e0 net/socket.c:1066\n __sock_xmit+0x236/0x5c0 drivers/block/nbd.c:538\n nbd_read_reply drivers/block/nbd.c:732 [inline]\n recv_work+0x262/0x3100 drivers/block/nbd.c:863\n process_one_work kernel/workqueue.c:2627 [inline]\n process_scheduled_works+0x104e/0x1e70 kernel/workqueue.c:2700\n worker_thread+0xf45/0x1490 kernel/workqueue.c:2781\n kthread+0x3ed/0x540 kernel/kthread.c:388\n ret_from_fork+0x66/0x80 arch/x86/kernel/process.c:147\n ret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:242\n\nLocal variable msg created at:\n __sock_xmit+0x4c/0x5c0 drivers/block/nbd.c:513\n nbd_read_reply drivers/block/nbd.c:732 [inline]\n recv_work+0x262/0x3100 drivers/block/nbd.c:863\n\nCPU: 1 PID: 7465 Comm: kworker/u5:1 Not tainted 6.7.0-rc7-syzkaller-00041-gf016f7547aee #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023\nWorkqueue: nbd5-recv recv_work", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26638", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26638", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26638", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26638", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26638", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26638" + } + }, + "CVE-2024-26639": { + "affected_versions": "v6.8-rc1 to v6.8-rc3", + "breaks": "5ec8e8ea8b7783fab150cf86404fc38cb4db8800", + "fixes": "f6564fce256a3944aa1bc76cb3c40e792d97c1eb", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm, kmsan: fix infinite recursion due to RCU critical section\n\nAlexander Potapenko writes in [1]: \"For every memory access in the code\ninstrumented by KMSAN we call kmsan_get_metadata() to obtain the metadata\nfor the memory being accessed. For virtual memory the metadata pointers\nare stored in the corresponding `struct page`, therefore we need to call\nvirt_to_page() to get them.\n\nAccording to the comment in arch/x86/include/asm/page.h,\nvirt_to_page(kaddr) returns a valid pointer iff virt_addr_valid(kaddr) is\ntrue, so KMSAN needs to call virt_addr_valid() as well.\n\nTo avoid recursion, kmsan_get_metadata() must not call instrumented code,\ntherefore ./arch/x86/include/asm/kmsan.h forks parts of\narch/x86/mm/physaddr.c to check whether a virtual address is valid or not.\n\nBut the introduction of rcu_read_lock() to pfn_valid() added instrumented\nRCU API calls to virt_to_page_or_null(), which is called by\nkmsan_get_metadata(), so there is an infinite recursion now. I do not\nthink it is correct to stop that recursion by doing\nkmsan_enter_runtime()/kmsan_exit_runtime() in kmsan_get_metadata(): that\nwould prevent instrumented functions called from within the runtime from\ntracking the shadow values, which might introduce false positives.\"\n\nFix the issue by switching pfn_valid() to the _sched() variant of\nrcu_read_lock/unlock(), which does not require calling into RCU. Given\nthe critical section in pfn_valid() is very small, this is a reasonable\ntrade-off (with preemptible RCU).\n\nKMSAN further needs to be careful to suppress calls into the scheduler,\nwhich would be another source of recursion. This can be done by wrapping\nthe call to pfn_valid() into preempt_disable/enable_no_resched(). The\ndownside is that this sacrifices breaking scheduling guarantees; however,\na kernel compiled with KMSAN has already given up any performance\nguarantees due to being heavily instrumented.\n\nNote, KMSAN code already disables tracing via Makefile, and since mmzone.h\nis included, it is not necessary to use the notrace variant, which is\ngenerally preferred in all other cases.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26639", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26639", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26639", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26639", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26639", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26639" + } + }, + "CVE-2024-26640": { + "affected_versions": "v4.18-rc1 to v6.8-rc3", + "breaks": "93ab6cc69162775201587cc9da00d5016dc890e2", + "cmt_msg": "tcp: add sanity checks to rx zerocopy", + "fixes": "577e4432f3ac810049cb7e6b71f4d96ec7c6e894", + "last_affected_version": "6.7.3", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp: add sanity checks to rx zerocopy\n\nTCP rx zerocopy intent is to map pages initially allocated\nfrom NIC drivers, not pages owned by a fs.\n\nThis patch adds to can_map_frag() these additional checks:\n\n- Page must not be a compound one.\n- page->mapping must be NULL.\n\nThis fixes the panic reported by ZhangPeng.\n\nsyzbot was able to loopback packets built with sendfile(),\nmapping pages owned by an ext4 file to TCP rx zerocopy.\n\nr3 = socket$inet_tcp(0x2, 0x1, 0x0)\nmmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x12, r3, 0x0)\nr4 = socket$inet_tcp(0x2, 0x1, 0x0)\nbind$inet(r4, &(0x7f0000000000)={0x2, 0x4e24, @multicast1}, 0x10)\nconnect$inet(r4, &(0x7f00000006c0)={0x2, 0x4e24, @empty}, 0x10)\nr5 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\\x00',\n 0x181e42, 0x0)\nfallocate(r5, 0x0, 0x0, 0x85b8)\nsendfile(r4, r5, 0x0, 0x8ba0)\ngetsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r4, 0x6, 0x23,\n &(0x7f00000001c0)={&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0,\n 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000440)=0x40)\nr6 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\\x00',\n 0x181e42, 0x0)", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26640", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26640", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26640", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26640", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26640", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26640" + } + }, + "CVE-2024-26641": { + "affected_versions": "v4.7-rc1 to v6.8-rc3", + "breaks": "0d3c703a9d1723c7707e0680019ac8ff5922db42", + "cmt_msg": "ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv()", + "fixes": "8d975c15c0cd744000ca386247432d57b21f9df0", + "last_affected_version": "6.7.3", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv()\n\nsyzbot found __ip6_tnl_rcv() could access unitiliazed data [1].\n\nCall pskb_inet_may_pull() to fix this, and initialize ipv6h\nvariable after this call as it can change skb->head.\n\n[1]\n BUG: KMSAN: uninit-value in __INET_ECN_decapsulate include/net/inet_ecn.h:253 [inline]\n BUG: KMSAN: uninit-value in INET_ECN_decapsulate include/net/inet_ecn.h:275 [inline]\n BUG: KMSAN: uninit-value in IP6_ECN_decapsulate+0x7df/0x1e50 include/net/inet_ecn.h:321\n __INET_ECN_decapsulate include/net/inet_ecn.h:253 [inline]\n INET_ECN_decapsulate include/net/inet_ecn.h:275 [inline]\n IP6_ECN_decapsulate+0x7df/0x1e50 include/net/inet_ecn.h:321\n ip6ip6_dscp_ecn_decapsulate+0x178/0x1b0 net/ipv6/ip6_tunnel.c:727\n __ip6_tnl_rcv+0xd4e/0x1590 net/ipv6/ip6_tunnel.c:845\n ip6_tnl_rcv+0xce/0x100 net/ipv6/ip6_tunnel.c:888\n gre_rcv+0x143f/0x1870\n ip6_protocol_deliver_rcu+0xda6/0x2a60 net/ipv6/ip6_input.c:438\n ip6_input_finish net/ipv6/ip6_input.c:483 [inline]\n NF_HOOK include/linux/netfilter.h:314 [inline]\n ip6_input+0x15d/0x430 net/ipv6/ip6_input.c:492\n ip6_mc_input+0xa7e/0xc80 net/ipv6/ip6_input.c:586\n dst_input include/net/dst.h:461 [inline]\n ip6_rcv_finish+0x5db/0x870 net/ipv6/ip6_input.c:79\n NF_HOOK include/linux/netfilter.h:314 [inline]\n ipv6_rcv+0xda/0x390 net/ipv6/ip6_input.c:310\n __netif_receive_skb_one_core net/core/dev.c:5532 [inline]\n __netif_receive_skb+0x1a6/0x5a0 net/core/dev.c:5646\n netif_receive_skb_internal net/core/dev.c:5732 [inline]\n netif_receive_skb+0x58/0x660 net/core/dev.c:5791\n tun_rx_batched+0x3ee/0x980 drivers/net/tun.c:1555\n tun_get_user+0x53af/0x66d0 drivers/net/tun.c:2002\n tun_chr_write_iter+0x3af/0x5d0 drivers/net/tun.c:2048\n call_write_iter include/linux/fs.h:2084 [inline]\n new_sync_write fs/read_write.c:497 [inline]\n vfs_write+0x786/0x1200 fs/read_write.c:590\n ksys_write+0x20f/0x4c0 fs/read_write.c:643\n __do_sys_write fs/read_write.c:655 [inline]\n __se_sys_write fs/read_write.c:652 [inline]\n __x64_sys_write+0x93/0xd0 fs/read_write.c:652\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0x6d/0x140 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x63/0x6b\n\nUninit was created at:\n slab_post_alloc_hook+0x129/0xa70 mm/slab.h:768\n slab_alloc_node mm/slub.c:3478 [inline]\n kmem_cache_alloc_node+0x5e9/0xb10 mm/slub.c:3523\n kmalloc_reserve+0x13d/0x4a0 net/core/skbuff.c:560\n __alloc_skb+0x318/0x740 net/core/skbuff.c:651\n alloc_skb include/linux/skbuff.h:1286 [inline]\n alloc_skb_with_frags+0xc8/0xbd0 net/core/skbuff.c:6334\n sock_alloc_send_pskb+0xa80/0xbf0 net/core/sock.c:2787\n tun_alloc_skb drivers/net/tun.c:1531 [inline]\n tun_get_user+0x1e8a/0x66d0 drivers/net/tun.c:1846\n tun_chr_write_iter+0x3af/0x5d0 drivers/net/tun.c:2048\n call_write_iter include/linux/fs.h:2084 [inline]\n new_sync_write fs/read_write.c:497 [inline]\n vfs_write+0x786/0x1200 fs/read_write.c:590\n ksys_write+0x20f/0x4c0 fs/read_write.c:643\n __do_sys_write fs/read_write.c:655 [inline]\n __se_sys_write fs/read_write.c:652 [inline]\n __x64_sys_write+0x93/0xd0 fs/read_write.c:652\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0x6d/0x140 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x63/0x6b\n\nCPU: 0 PID: 5034 Comm: syz-executor331 Not tainted 6.7.0-syzkaller-00562-g9f8413c4a66f #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26641", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26641", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26641", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26641", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26641", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26641" + } + }, + "CVE-2024-26642": { + "affected_versions": "v4.1-rc1 to v6.8", + "breaks": "761da2935d6e18d178582dbdf315a3a458555505", + "cmt_msg": "netfilter: nf_tables: disallow anonymous set with timeout flag", + "fixes": "16603605b667b70da974bea8216c93e7db043bf1", + "last_affected_version": "6.7.11", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_tables: disallow anonymous set with timeout flag\n\nAnonymous sets are never used with timeout from userspace, reject this.\nException to this rule is NFT_SET_EVAL to ensure legacy meters still work.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26642", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26642", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26642", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26642", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26642", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26642" + } + }, + "CVE-2024-26643": { + "affected_versions": "v6.5-rc6 to v6.8", + "breaks": "5f68718b34a531a556f2f50300ead2862278da26", + "cmt_msg": "netfilter: nf_tables: mark set as dead when unbinding anonymous set with timeout", + "fixes": "552705a3650bbf46a22b1adedc1b04181490fc36", + "last_affected_version": "6.7.11", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_tables: mark set as dead when unbinding anonymous set with timeout\n\nWhile the rhashtable set gc runs asynchronously, a race allows it to\ncollect elements from anonymous sets with timeouts while it is being\nreleased from the commit path.\n\nMingi Cho originally reported this issue in a different path in 6.1.x\nwith a pipapo set with low timeouts which is not possible upstream since\n7395dfacfff6 (\"netfilter: nf_tables: use timestamp to check for set\nelement timeout\").\n\nFix this by setting on the dead flag for anonymous sets to skip async gc\nin this case.\n\nAccording to 08e4c8c5919f (\"netfilter: nf_tables: mark newset as dead on\ntransaction abort\"), Florian plans to accelerate abort path by releasing\nobjects via workqueue, therefore, this sets on the dead flag for abort\npath too.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26643", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26643", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26643", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26643", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26643", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26643" + } + }, + "CVE-2024-26644": { + "affected_versions": "v2.6.12-rc2 to v6.8-rc2", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "btrfs: don't abort filesystem when attempting to snapshot deleted subvolume", + "fixes": "7081929ab2572920e94d70be3d332e5c9f97095a", + "last_affected_version": "6.7.2", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: don't abort filesystem when attempting to snapshot deleted subvolume\n\nIf the source file descriptor to the snapshot ioctl refers to a deleted\nsubvolume, we get the following abort:\n\n BTRFS: Transaction aborted (error -2)\n WARNING: CPU: 0 PID: 833 at fs/btrfs/transaction.c:1875 create_pending_snapshot+0x1040/0x1190 [btrfs]\n Modules linked in: pata_acpi btrfs ata_piix libata scsi_mod virtio_net blake2b_generic xor net_failover virtio_rng failover scsi_common rng_core raid6_pq libcrc32c\n CPU: 0 PID: 833 Comm: t_snapshot_dele Not tainted 6.7.0-rc6 #2\n Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-1.fc39 04/01/2014\n RIP: 0010:create_pending_snapshot+0x1040/0x1190 [btrfs]\n RSP: 0018:ffffa09c01337af8 EFLAGS: 00010282\n RAX: 0000000000000000 RBX: ffff9982053e7c78 RCX: 0000000000000027\n RDX: ffff99827dc20848 RSI: 0000000000000001 RDI: ffff99827dc20840\n RBP: ffffa09c01337c00 R08: 0000000000000000 R09: ffffa09c01337998\n R10: 0000000000000003 R11: ffffffffb96da248 R12: fffffffffffffffe\n R13: ffff99820535bb28 R14: ffff99820b7bd000 R15: ffff99820381ea80\n FS: 00007fe20aadabc0(0000) GS:ffff99827dc00000(0000) knlGS:0000000000000000\n CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 0000559a120b502f CR3: 00000000055b6000 CR4: 00000000000006f0\n Call Trace:\n \n ? create_pending_snapshot+0x1040/0x1190 [btrfs]\n ? __warn+0x81/0x130\n ? create_pending_snapshot+0x1040/0x1190 [btrfs]\n ? report_bug+0x171/0x1a0\n ? handle_bug+0x3a/0x70\n ? exc_invalid_op+0x17/0x70\n ? asm_exc_invalid_op+0x1a/0x20\n ? create_pending_snapshot+0x1040/0x1190 [btrfs]\n ? create_pending_snapshot+0x1040/0x1190 [btrfs]\n create_pending_snapshots+0x92/0xc0 [btrfs]\n btrfs_commit_transaction+0x66b/0xf40 [btrfs]\n btrfs_mksubvol+0x301/0x4d0 [btrfs]\n btrfs_mksnapshot+0x80/0xb0 [btrfs]\n __btrfs_ioctl_snap_create+0x1c2/0x1d0 [btrfs]\n btrfs_ioctl_snap_create_v2+0xc4/0x150 [btrfs]\n btrfs_ioctl+0x8a6/0x2650 [btrfs]\n ? kmem_cache_free+0x22/0x340\n ? do_sys_openat2+0x97/0xe0\n __x64_sys_ioctl+0x97/0xd0\n do_syscall_64+0x46/0xf0\n entry_SYSCALL_64_after_hwframe+0x6e/0x76\n RIP: 0033:0x7fe20abe83af\n RSP: 002b:00007ffe6eff1360 EFLAGS: 00000246 ORIG_RAX: 0000000000000010\n RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 00007fe20abe83af\n RDX: 00007ffe6eff23c0 RSI: 0000000050009417 RDI: 0000000000000003\n RBP: 0000000000000003 R08: 0000000000000000 R09: 00007fe20ad16cd0\n R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000\n R13: 00007ffe6eff13c0 R14: 00007fe20ad45000 R15: 0000559a120b6d58\n \n ---[ end trace 0000000000000000 ]---\n BTRFS: error (device vdc: state A) in create_pending_snapshot:1875: errno=-2 No such entry\n BTRFS info (device vdc: state EA): forced readonly\n BTRFS warning (device vdc: state EA): Skipping commit of aborted transaction.\n BTRFS: error (device vdc: state EA) in cleanup_transaction:2055: errno=-2 No such entry\n\nThis happens because create_pending_snapshot() initializes the new root\nitem as a copy of the source root item. This includes the refs field,\nwhich is 0 for a deleted subvolume. The call to btrfs_insert_root()\ntherefore inserts a root with refs == 0. btrfs_get_new_fs_root() then\nfinds the root and returns -ENOENT if refs == 0, which causes\ncreate_pending_snapshot() to abort.\n\nFix it by checking the source root's refs before attempting the\nsnapshot, but after locking subvol_sem to avoid racing with deletion.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26644", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26644", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26644", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26644", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26644", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26644" + } + }, + "CVE-2024-26645": { + "affected_versions": "v4.17-rc1 to v6.8-rc2", + "breaks": "c193707dde77ace92a649cd59a17e105e2fbeaef", + "cmt_msg": "tracing: Ensure visibility when inserting an element into tracing_map", + "fixes": "2b44760609e9eaafc9d234a6883d042fc21132a7", + "last_affected_version": "6.7.2", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntracing: Ensure visibility when inserting an element into tracing_map\n\nRunning the following two commands in parallel on a multi-processor\nAArch64 machine can sporadically produce an unexpected warning about\nduplicate histogram entries:\n\n $ while true; do\n echo hist:key=id.syscall:val=hitcount > \\\n /sys/kernel/debug/tracing/events/raw_syscalls/sys_enter/trigger\n cat /sys/kernel/debug/tracing/events/raw_syscalls/sys_enter/hist\n sleep 0.001\n done\n $ stress-ng --sysbadaddr $(nproc)\n\nThe warning looks as follows:\n\n[ 2911.172474] ------------[ cut here ]------------\n[ 2911.173111] Duplicates detected: 1\n[ 2911.173574] WARNING: CPU: 2 PID: 12247 at kernel/trace/tracing_map.c:983 tracing_map_sort_entries+0x3e0/0x408\n[ 2911.174702] Modules linked in: iscsi_ibft(E) iscsi_boot_sysfs(E) rfkill(E) af_packet(E) nls_iso8859_1(E) nls_cp437(E) vfat(E) fat(E) ena(E) tiny_power_button(E) qemu_fw_cfg(E) button(E) fuse(E) efi_pstore(E) ip_tables(E) x_tables(E) xfs(E) libcrc32c(E) aes_ce_blk(E) aes_ce_cipher(E) crct10dif_ce(E) polyval_ce(E) polyval_generic(E) ghash_ce(E) gf128mul(E) sm4_ce_gcm(E) sm4_ce_ccm(E) sm4_ce(E) sm4_ce_cipher(E) sm4(E) sm3_ce(E) sm3(E) sha3_ce(E) sha512_ce(E) sha512_arm64(E) sha2_ce(E) sha256_arm64(E) nvme(E) sha1_ce(E) nvme_core(E) nvme_auth(E) t10_pi(E) sg(E) scsi_mod(E) scsi_common(E) efivarfs(E)\n[ 2911.174738] Unloaded tainted modules: cppc_cpufreq(E):1\n[ 2911.180985] CPU: 2 PID: 12247 Comm: cat Kdump: loaded Tainted: G E 6.7.0-default #2 1b58bbb22c97e4399dc09f92d309344f69c44a01\n[ 2911.182398] Hardware name: Amazon EC2 c7g.8xlarge/, BIOS 1.0 11/1/2018\n[ 2911.183208] pstate: 61400005 (nZCv daif +PAN -UAO -TCO +DIT -SSBS BTYPE=--)\n[ 2911.184038] pc : tracing_map_sort_entries+0x3e0/0x408\n[ 2911.184667] lr : tracing_map_sort_entries+0x3e0/0x408\n[ 2911.185310] sp : ffff8000a1513900\n[ 2911.185750] x29: ffff8000a1513900 x28: ffff0003f272fe80 x27: 0000000000000001\n[ 2911.186600] x26: ffff0003f272fe80 x25: 0000000000000030 x24: 0000000000000008\n[ 2911.187458] x23: ffff0003c5788000 x22: ffff0003c16710c8 x21: ffff80008017f180\n[ 2911.188310] x20: ffff80008017f000 x19: ffff80008017f180 x18: ffffffffffffffff\n[ 2911.189160] x17: 0000000000000000 x16: 0000000000000000 x15: ffff8000a15134b8\n[ 2911.190015] x14: 0000000000000000 x13: 205d373432323154 x12: 5b5d313131333731\n[ 2911.190844] x11: 00000000fffeffff x10: 00000000fffeffff x9 : ffffd1b78274a13c\n[ 2911.191716] x8 : 000000000017ffe8 x7 : c0000000fffeffff x6 : 000000000057ffa8\n[ 2911.192554] x5 : ffff0012f6c24ec0 x4 : 0000000000000000 x3 : ffff2e5b72b5d000\n[ 2911.193404] x2 : 0000000000000000 x1 : 0000000000000000 x0 : ffff0003ff254480\n[ 2911.194259] Call trace:\n[ 2911.194626] tracing_map_sort_entries+0x3e0/0x408\n[ 2911.195220] hist_show+0x124/0x800\n[ 2911.195692] seq_read_iter+0x1d4/0x4e8\n[ 2911.196193] seq_read+0xe8/0x138\n[ 2911.196638] vfs_read+0xc8/0x300\n[ 2911.197078] ksys_read+0x70/0x108\n[ 2911.197534] __arm64_sys_read+0x24/0x38\n[ 2911.198046] invoke_syscall+0x78/0x108\n[ 2911.198553] el0_svc_common.constprop.0+0xd0/0xf8\n[ 2911.199157] do_el0_svc+0x28/0x40\n[ 2911.199613] el0_svc+0x40/0x178\n[ 2911.200048] el0t_64_sync_handler+0x13c/0x158\n[ 2911.200621] el0t_64_sync+0x1a8/0x1b0\n[ 2911.201115] ---[ end trace 0000000000000000 ]---\n\nThe problem appears to be caused by CPU reordering of writes issued from\n__tracing_map_insert().\n\nThe check for the presence of an element with a given key in this\nfunction is:\n\n val = READ_ONCE(entry->val);\n if (val && keys_match(key, val->key, map->key_size)) ...\n\nThe write of a new entry is:\n\n elt = get_free_elt(map);\n memcpy(elt->key, key, map->key_size);\n entry->val = elt;\n\nThe \"memcpy(elt->key, key, map->key_size);\" and \"entry->val = elt;\"\nstores may become visible in the reversed order on another CPU. This\nsecond CPU might then incorrectly determine that a new key doesn't match\nan already present val->key and subse\n---truncated---", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26645", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26645", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26645", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26645", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26645", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26645" + } + }, + "CVE-2024-26646": { + "affected_versions": "v2.6.12-rc2 to v6.8-rc1", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "thermal: intel: hfi: Add syscore callbacks for system-wide PM", + "fixes": "97566d09fd02d2ab329774bb89a2cdf2267e86d9", + "last_affected_version": "6.7.2", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nthermal: intel: hfi: Add syscore callbacks for system-wide PM\n\nThe kernel allocates a memory buffer and provides its location to the\nhardware, which uses it to update the HFI table. This allocation occurs\nduring boot and remains constant throughout runtime.\n\nWhen resuming from hibernation, the restore kernel allocates a second\nmemory buffer and reprograms the HFI hardware with the new location as\npart of a normal boot. The location of the second memory buffer may\ndiffer from the one allocated by the image kernel.\n\nWhen the restore kernel transfers control to the image kernel, its HFI\nbuffer becomes invalid, potentially leading to memory corruption if the\nhardware writes to it (the hardware continues to use the buffer from the\nrestore kernel).\n\nIt is also possible that the hardware \"forgets\" the address of the memory\nbuffer when resuming from \"deep\" suspend. Memory corruption may also occur\nin such a scenario.\n\nTo prevent the described memory corruption, disable HFI when preparing to\nsuspend or hibernate. Enable it when resuming.\n\nAdd syscore callbacks to handle the package of the boot CPU (packages of\nnon-boot CPUs are handled via CPU offline). Syscore ops always run on the\nboot CPU. Additionally, HFI only needs to be disabled during \"deep\" suspend\nand hibernation. Syscore ops only run in these cases.\n\n[ rjw: Comment adjustment, subject and changelog edits ]", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26646", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26646", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26646", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26646", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26646", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26646" + } + }, + "CVE-2024-26647": { + "affected_versions": "v2.6.12-rc2 to v6.8-rc1", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "drm/amd/display: Fix late derefrence 'dsc' check in 'link_set_dsc_pps_packet()'", + "fixes": "3bb9b1f958c3d986ed90a3ff009f1e77e9553207", + "last_affected_version": "6.7.2", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Fix late derefrence 'dsc' check in 'link_set_dsc_pps_packet()'\n\nIn link_set_dsc_pps_packet(), 'struct display_stream_compressor *dsc'\nwas dereferenced in a DC_LOGGER_INIT(dsc->ctx->logger); before the 'dsc'\nNULL pointer check.\n\nFixes the below:\ndrivers/gpu/drm/amd/amdgpu/../display/dc/link/link_dpms.c:905 link_set_dsc_pps_packet() warn: variable dereferenced before check 'dsc' (see line 903)", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26647", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26647", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26647", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26647", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26647", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26647" + } + }, + "CVE-2024-26648": { + "affected_versions": "v2.6.12-rc2 to v6.8-rc1", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "drm/amd/display: Fix variable deferencing before NULL check in edp_setup_replay()", + "fixes": "7073934f5d73f8b53308963cee36f0d389ea857c", + "last_affected_version": "6.7.2", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Fix variable deferencing before NULL check in edp_setup_replay()\n\nIn edp_setup_replay(), 'struct dc *dc' & 'struct dmub_replay *replay'\nwas dereferenced before the pointer 'link' & 'replay' NULL check.\n\nFixes the below:\ndrivers/gpu/drm/amd/amdgpu/../display/dc/link/protocols/link_edp_panel_control.c:947 edp_setup_replay() warn: variable dereferenced before check 'link' (see line 933)", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26648", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26648", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26648", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26648", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26648", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26648" + } + }, + "CVE-2024-26649": { + "affected_versions": "v6.3-rc1 to v6.8-rc1", + "breaks": "3da9b71563cbb7281875adab1d7c4132679da987", + "cmt_msg": "drm/amdgpu: Fix the null pointer when load rlc firmware", + "fixes": "bc03c02cc1991a066b23e69bbcc0f66e8f1f7453", + "last_affected_version": "6.7.2", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdgpu: Fix the null pointer when load rlc firmware\n\nIf the RLC firmware is invalid because of wrong header size,\nthe pointer to the rlc firmware is released in function\namdgpu_ucode_request. There will be a null pointer error\nin subsequent use. So skip validation to fix it.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26649", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26649", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26649", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26649", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26649", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26649" + } + }, + "CVE-2024-26650": { + "affected_versions": "unk to v6.8-rc2", + "breaks": "", + "cmt_msg": "platform/x86: p2sb: Allow p2sb_bar() calls during PCI device probe", + "fixes": "5913320eb0b3ec88158cfcb0fa5e996bf4ef681b", + "last_affected_version": "6.7.2", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nplatform/x86: p2sb: Allow p2sb_bar() calls during PCI device probe\n\np2sb_bar() unhides P2SB device to get resources from the device. It\nguards the operation by locking pci_rescan_remove_lock so that parallel\nrescans do not find the P2SB device. However, this lock causes deadlock\nwhen PCI bus rescan is triggered by /sys/bus/pci/rescan. The rescan\nlocks pci_rescan_remove_lock and probes PCI devices. When PCI devices\ncall p2sb_bar() during probe, it locks pci_rescan_remove_lock again.\nHence the deadlock.\n\nTo avoid the deadlock, do not lock pci_rescan_remove_lock in p2sb_bar().\nInstead, do the lock at fs_initcall. Introduce p2sb_cache_resources()\nfor fs_initcall which gets and caches the P2SB resources. At p2sb_bar(),\nrefer the cache and return to the caller.\n\nBefore operating the device at P2SB DEVFN for resource cache, check\nthat its device class is PCI_CLASS_MEMORY_OTHER 0x0580 that PCH\nspecifications define. This avoids unexpected operation to other devices\nat the same DEVFN.\n\nTested-by Klara Modin ", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26650", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26650", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26650", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26650", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26650", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26650" + } + }, + "CVE-2024-26651": { + "affected_versions": "unk to v6.9-rc1", + "breaks": "", + "cmt_msg": "sr9800: Add check for usbnet_get_endpoints", + "fixes": "07161b2416f740a2cb87faa5566873f401440a61", + "last_affected_version": "6.7.10", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsr9800: Add check for usbnet_get_endpoints\n\nAdd check for usbnet_get_endpoints() and return the error if it fails\nin order to transfer the error.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26651", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26651", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26651", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26651", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26651", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26651" + } + }, + "CVE-2024-26652": { + "affected_versions": "v6.4-rc1 to v6.8", + "breaks": "4569cce43bc61e4cdd76597a1cf9b608846c18cc", + "cmt_msg": "net: pds_core: Fix possible double free in error handling path", + "fixes": "ba18deddd6d502da71fd6b6143c53042271b82bd", + "last_affected_version": "6.7.9", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: pds_core: Fix possible double free in error handling path\n\nWhen auxiliary_device_add() returns error and then calls\nauxiliary_device_uninit(), Callback function pdsc_auxbus_dev_release\ncalls kfree(padev) to free memory. We shouldn't call kfree(padev)\nagain in the error handling path.\n\nFix this by cleaning up the redundant kfree() and putting\nthe error handling back to where the errors happened.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26652", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26652", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26652", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26652", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26652", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26652" + } + }, + "CVE-2024-26653": { + "affected_versions": "v6.7-rc1 to v6.9-rc2", + "breaks": "acd6199f195d6de814ac4090ce0864a613b1580e", + "cmt_msg": "usb: misc: ljca: Fix double free in error handling path", + "fixes": "7c9631969287a5366bc8e39cd5abff154b35fb80", + "last_affected_version": "6.7.11", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: misc: ljca: Fix double free in error handling path\n\nWhen auxiliary_device_add() returns error and then calls\nauxiliary_device_uninit(), callback function ljca_auxdev_release\ncalls kfree(auxdev->dev.platform_data) to free the parameter data\nof the function ljca_new_client_device. The callers of\nljca_new_client_device shouldn't call kfree() again\nin the error handling path to free the platform data.\n\nFix this by cleaning up the redundant kfree() in all callers and\nadding kfree() the passed in platform_data on errors which happen\nbefore auxiliary_device_init() succeeds .", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26653", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26653", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26653", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26653", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26653", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26653" + } + }, + "CVE-2024-26654": { + "affected_versions": "unk to v6.9-rc2", + "breaks": "", + "cmt_msg": "ALSA: sh: aica: reorder cleanup operations to avoid UAF bugs", + "fixes": "051e0840ffa8ab25554d6b14b62c9ab9e4901457", + "last_affected_version": "6.7.11", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: sh: aica: reorder cleanup operations to avoid UAF bugs\n\nThe dreamcastcard->timer could schedule the spu_dma_work and the\nspu_dma_work could also arm the dreamcastcard->timer.\n\nWhen the snd_pcm_substream is closing, the aica_channel will be\ndeallocated. But it could still be dereferenced in the worker\nthread. The reason is that del_timer() will return directly\nregardless of whether the timer handler is running or not and\nthe worker could be rescheduled in the timer handler. As a result,\nthe UAF bug will happen. The racy situation is shown below:\n\n (Thread 1) | (Thread 2)\nsnd_aicapcm_pcm_close() |\n ... | run_spu_dma() //worker\n | mod_timer()\n flush_work() |\n del_timer() | aica_period_elapsed() //timer\n kfree(dreamcastcard->channel) | schedule_work()\n | run_spu_dma() //worker\n ... | dreamcastcard->channel-> //USE\n\nIn order to mitigate this bug and other possible corner cases,\ncall mod_timer() conditionally in run_spu_dma(), then implement\nPCM sync_stop op to cancel both the timer and worker. The sync_stop\nop will be called from PCM core appropriately when needed.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26654", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26654", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26654", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26654", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26654", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26654" + } + }, + "CVE-2024-26655": { + "affected_versions": "unk to v6.9-rc2", + "breaks": "", + "cmt_msg": "Fix memory leak in posix_clock_open()", + "fixes": "5b4cdd9c5676559b8a7c944ac5269b914b8c0bb8", + "last_affected_version": "6.7.11", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nFix memory leak in posix_clock_open()\n\nIf the clk ops.open() function returns an error, we don't release the\npccontext we allocated for this clock.\n\nRe-organize the code slightly to make it all more obvious.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26655", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26655", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26655", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26655", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26655", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26655" + } + }, + "CVE-2024-26656": { + "affected_versions": "v2.6.12-rc2 to v6.9-rc1", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "drm/amdgpu: fix use-after-free bug", + "fixes": "22207fd5c80177b860279653d017474b2812af5e", + "last_affected_version": "6.7.11", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdgpu: fix use-after-free bug\n\nThe bug can be triggered by sending a single amdgpu_gem_userptr_ioctl\nto the AMDGPU DRM driver on any ASICs with an invalid address and size.\nThe bug was reported by Joonkyo Jung .\nFor example the following code:\n\nstatic void Syzkaller1(int fd)\n{\n\tstruct drm_amdgpu_gem_userptr arg;\n\tint ret;\n\n\targ.addr = 0xffffffffffff0000;\n\targ.size = 0x80000000; /*2 Gb*/\n\targ.flags = 0x7;\n\tret = drmIoctl(fd, 0xc1186451/*amdgpu_gem_userptr_ioctl*/, &arg);\n}\n\nDue to the address and size are not valid there is a failure in\namdgpu_hmm_register->mmu_interval_notifier_insert->__mmu_interval_notifier_insert->\ncheck_shl_overflow, but we even the amdgpu_hmm_register failure we still call\namdgpu_hmm_unregister into amdgpu_gem_object_free which causes access to a bad address.\nThe following stack is below when the issue is reproduced when Kazan is enabled:\n\n[ +0.000014] Hardware name: ASUS System Product Name/ROG STRIX B550-F GAMING (WI-FI), BIOS 1401 12/03/2020\n[ +0.000009] RIP: 0010:mmu_interval_notifier_remove+0x327/0x340\n[ +0.000017] Code: ff ff 49 89 44 24 08 48 b8 00 01 00 00 00 00 ad de 4c 89 f7 49 89 47 40 48 83 c0 22 49 89 47 48 e8 ce d1 2d 01 e9 32 ff ff ff <0f> 0b e9 16 ff ff ff 4c 89 ef e8 fa 14 b3 ff e9 36 ff ff ff e8 80\n[ +0.000014] RSP: 0018:ffffc90002657988 EFLAGS: 00010246\n[ +0.000013] RAX: 0000000000000000 RBX: 1ffff920004caf35 RCX: ffffffff8160565b\n[ +0.000011] RDX: dffffc0000000000 RSI: 0000000000000004 RDI: ffff8881a9f78260\n[ +0.000010] RBP: ffffc90002657a70 R08: 0000000000000001 R09: fffff520004caf25\n[ +0.000010] R10: 0000000000000003 R11: ffffffff8161d1d6 R12: ffff88810e988c00\n[ +0.000010] R13: ffff888126fb5a00 R14: ffff88810e988c0c R15: ffff8881a9f78260\n[ +0.000011] FS: 00007ff9ec848540(0000) GS:ffff8883cc880000(0000) knlGS:0000000000000000\n[ +0.000012] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ +0.000010] CR2: 000055b3f7e14328 CR3: 00000001b5770000 CR4: 0000000000350ef0\n[ +0.000010] Call Trace:\n[ +0.000006] \n[ +0.000007] ? show_regs+0x6a/0x80\n[ +0.000018] ? __warn+0xa5/0x1b0\n[ +0.000019] ? mmu_interval_notifier_remove+0x327/0x340\n[ +0.000018] ? report_bug+0x24a/0x290\n[ +0.000022] ? handle_bug+0x46/0x90\n[ +0.000015] ? exc_invalid_op+0x19/0x50\n[ +0.000016] ? asm_exc_invalid_op+0x1b/0x20\n[ +0.000017] ? kasan_save_stack+0x26/0x50\n[ +0.000017] ? mmu_interval_notifier_remove+0x23b/0x340\n[ +0.000019] ? mmu_interval_notifier_remove+0x327/0x340\n[ +0.000019] ? mmu_interval_notifier_remove+0x23b/0x340\n[ +0.000020] ? __pfx_mmu_interval_notifier_remove+0x10/0x10\n[ +0.000017] ? kasan_save_alloc_info+0x1e/0x30\n[ +0.000018] ? srso_return_thunk+0x5/0x5f\n[ +0.000014] ? __kasan_kmalloc+0xb1/0xc0\n[ +0.000018] ? srso_return_thunk+0x5/0x5f\n[ +0.000013] ? __kasan_check_read+0x11/0x20\n[ +0.000020] amdgpu_hmm_unregister+0x34/0x50 [amdgpu]\n[ +0.004695] amdgpu_gem_object_free+0x66/0xa0 [amdgpu]\n[ +0.004534] ? __pfx_amdgpu_gem_object_free+0x10/0x10 [amdgpu]\n[ +0.004291] ? do_syscall_64+0x5f/0xe0\n[ +0.000023] ? srso_return_thunk+0x5/0x5f\n[ +0.000017] drm_gem_object_free+0x3b/0x50 [drm]\n[ +0.000489] amdgpu_gem_userptr_ioctl+0x306/0x500 [amdgpu]\n[ +0.004295] ? __pfx_amdgpu_gem_userptr_ioctl+0x10/0x10 [amdgpu]\n[ +0.004270] ? srso_return_thunk+0x5/0x5f\n[ +0.000014] ? __this_cpu_preempt_check+0x13/0x20\n[ +0.000015] ? srso_return_thunk+0x5/0x5f\n[ +0.000013] ? sysvec_apic_timer_interrupt+0x57/0xc0\n[ +0.000020] ? srso_return_thunk+0x5/0x5f\n[ +0.000014] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20\n[ +0.000022] ? drm_ioctl_kernel+0x17b/0x1f0 [drm]\n[ +0.000496] ? __pfx_amdgpu_gem_userptr_ioctl+0x10/0x10 [amdgpu]\n[ +0.004272] ? drm_ioctl_kernel+0x190/0x1f0 [drm]\n[ +0.000492] drm_ioctl_kernel+0x140/0x1f0 [drm]\n[ +0.000497] ? __pfx_amdgpu_gem_userptr_ioctl+0x10/0x10 [amdgpu]\n[ +0.004297] ? __pfx_drm_ioctl_kernel+0x10/0x10 [d\n---truncated---", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26656", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26656", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26656", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26656", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26656", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26656" + } + }, + "CVE-2024-26657": { + "affected_versions": "v6.7-rc1 to v6.9-rc2", + "breaks": "56e449603f0ac580700621a356d35d5716a62ce5", + "cmt_msg": "drm/sched: fix null-ptr-deref in init entity", + "fixes": "f34e8bb7d6c6626933fe993e03ed59ae85e16abb", + "last_affected_version": "6.7.11", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/sched: fix null-ptr-deref in init entity\n\nThe bug can be triggered by sending an amdgpu_cs_wait_ioctl\nto the AMDGPU DRM driver on any ASICs with valid context.\nThe bug was reported by Joonkyo Jung .\nFor example the following code:\n\n static void Syzkaller2(int fd)\n {\n\tunion drm_amdgpu_ctx arg1;\n\tunion drm_amdgpu_wait_cs arg2;\n\n\targ1.in.op = AMDGPU_CTX_OP_ALLOC_CTX;\n\tret = drmIoctl(fd, 0x140106442 /* amdgpu_ctx_ioctl */, &arg1);\n\n\targ2.in.handle = 0x0;\n\targ2.in.timeout = 0x2000000000000;\n\targ2.in.ip_type = AMD_IP_VPE /* 0x9 */;\n\targ2->in.ip_instance = 0x0;\n\targ2.in.ring = 0x0;\n\targ2.in.ctx_id = arg1.out.alloc.ctx_id;\n\n\tdrmIoctl(fd, 0xc0206449 /* AMDGPU_WAIT_CS * /, &arg2);\n }\n\nThe ioctl AMDGPU_WAIT_CS without previously submitted job could be assumed that\nthe error should be returned, but the following commit 1decbf6bb0b4dc56c9da6c5e57b994ebfc2be3aa\nmodified the logic and allowed to have sched_rq equal to NULL.\n\nAs a result when there is no job the ioctl AMDGPU_WAIT_CS returns success.\nThe change fixes null-ptr-deref in init entity and the stack below demonstrates\nthe error condition:\n\n[ +0.000007] BUG: kernel NULL pointer dereference, address: 0000000000000028\n[ +0.007086] #PF: supervisor read access in kernel mode\n[ +0.005234] #PF: error_code(0x0000) - not-present page\n[ +0.005232] PGD 0 P4D 0\n[ +0.002501] Oops: 0000 [#1] PREEMPT SMP KASAN NOPTI\n[ +0.005034] CPU: 10 PID: 9229 Comm: amd_basic Tainted: G B W L 6.7.0+ #4\n[ +0.007797] Hardware name: ASUS System Product Name/ROG STRIX B550-F GAMING (WI-FI), BIOS 1401 12/03/2020\n[ +0.009798] RIP: 0010:drm_sched_entity_init+0x2d3/0x420 [gpu_sched]\n[ +0.006426] Code: 80 00 00 00 00 00 00 00 e8 1a 81 82 e0 49 89 9c 24 c0 00 00 00 4c 89 ef e8 4a 80 82 e0 49 8b 5d 00 48 8d 7b 28 e8 3d 80 82 e0 <48> 83 7b 28 00 0f 84 28 01 00 00 4d 8d ac 24 98 00 00 00 49 8d 5c\n[ +0.019094] RSP: 0018:ffffc90014c1fa40 EFLAGS: 00010282\n[ +0.005237] RAX: 0000000000000001 RBX: 0000000000000000 RCX: ffffffff8113f3fa\n[ +0.007326] RDX: fffffbfff0a7889d RSI: 0000000000000008 RDI: ffffffff853c44e0\n[ +0.007264] RBP: ffffc90014c1fa80 R08: 0000000000000001 R09: fffffbfff0a7889c\n[ +0.007266] R10: ffffffff853c44e7 R11: 0000000000000001 R12: ffff8881a719b010\n[ +0.007263] R13: ffff88810d412748 R14: 0000000000000002 R15: 0000000000000000\n[ +0.007264] FS: 00007ffff7045540(0000) GS:ffff8883cc900000(0000) knlGS:0000000000000000\n[ +0.008236] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ +0.005851] CR2: 0000000000000028 CR3: 000000011912e000 CR4: 0000000000350ef0\n[ +0.007175] Call Trace:\n[ +0.002561] \n[ +0.002141] ? show_regs+0x6a/0x80\n[ +0.003473] ? __die+0x25/0x70\n[ +0.003124] ? page_fault_oops+0x214/0x720\n[ +0.004179] ? preempt_count_sub+0x18/0xc0\n[ +0.004093] ? __pfx_page_fault_oops+0x10/0x10\n[ +0.004590] ? srso_return_thunk+0x5/0x5f\n[ +0.004000] ? vprintk_default+0x1d/0x30\n[ +0.004063] ? srso_return_thunk+0x5/0x5f\n[ +0.004087] ? vprintk+0x5c/0x90\n[ +0.003296] ? drm_sched_entity_init+0x2d3/0x420 [gpu_sched]\n[ +0.005807] ? srso_return_thunk+0x5/0x5f\n[ +0.004090] ? _printk+0xb3/0xe0\n[ +0.003293] ? __pfx__printk+0x10/0x10\n[ +0.003735] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20\n[ +0.005482] ? do_user_addr_fault+0x345/0x770\n[ +0.004361] ? exc_page_fault+0x64/0xf0\n[ +0.003972] ? asm_exc_page_fault+0x27/0x30\n[ +0.004271] ? add_taint+0x2a/0xa0\n[ +0.003476] ? drm_sched_entity_init+0x2d3/0x420 [gpu_sched]\n[ +0.005812] amdgpu_ctx_get_entity+0x3f9/0x770 [amdgpu]\n[ +0.009530] ? finish_task_switch.isra.0+0x129/0x470\n[ +0.005068] ? __pfx_amdgpu_ctx_get_entity+0x10/0x10 [amdgpu]\n[ +0.010063] ? __kasan_check_write+0x14/0x20\n[ +0.004356] ? srso_return_thunk+0x5/0x5f\n[ +0.004001] ? mutex_unlock+0x81/0xd0\n[ +0.003802] ? srso_return_thunk+0x5/0x5f\n[ +0.004096] amdgpu_cs_wait_ioctl+0xf6/0x270 [amdgpu]\n[ +0.009355] ? __pfx_\n---truncated---", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26657", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26657", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26657", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26657", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26657", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26657" + } + }, + "CVE-2024-26658": { + "affected_versions": "unk to v6.8-rc1", + "breaks": "", + "cmt_msg": "bcachefs: grab s_umount only if snapshotting", + "fixes": "2acc59dd88d27ad69b66ded80df16c042b04eeec", + "last_affected_version": "6.7.4", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbcachefs: grab s_umount only if snapshotting\n\nWhen I was testing mongodb over bcachefs with compression,\nthere is a lockdep warning when snapshotting mongodb data volume.\n\n$ cat test.sh\nprog=bcachefs\n\n$prog subvolume create /mnt/data\n$prog subvolume create /mnt/data/snapshots\n\nwhile true;do\n $prog subvolume snapshot /mnt/data /mnt/data/snapshots/$(date +%s)\n sleep 1s\ndone\n\n$ cat /etc/mongodb.conf\nsystemLog:\n destination: file\n logAppend: true\n path: /mnt/data/mongod.log\n\nstorage:\n dbPath: /mnt/data/\n\nlockdep reports:\n[ 3437.452330] ======================================================\n[ 3437.452750] WARNING: possible circular locking dependency detected\n[ 3437.453168] 6.7.0-rc7-custom+ #85 Tainted: G E\n[ 3437.453562] ------------------------------------------------------\n[ 3437.453981] bcachefs/35533 is trying to acquire lock:\n[ 3437.454325] ffffa0a02b2b1418 (sb_writers#10){.+.+}-{0:0}, at: filename_create+0x62/0x190\n[ 3437.454875]\n but task is already holding lock:\n[ 3437.455268] ffffa0a02b2b10e0 (&type->s_umount_key#48){.+.+}-{3:3}, at: bch2_fs_file_ioctl+0x232/0xc90 [bcachefs]\n[ 3437.456009]\n which lock already depends on the new lock.\n\n[ 3437.456553]\n the existing dependency chain (in reverse order) is:\n[ 3437.457054]\n -> #3 (&type->s_umount_key#48){.+.+}-{3:3}:\n[ 3437.457507] down_read+0x3e/0x170\n[ 3437.457772] bch2_fs_file_ioctl+0x232/0xc90 [bcachefs]\n[ 3437.458206] __x64_sys_ioctl+0x93/0xd0\n[ 3437.458498] do_syscall_64+0x42/0xf0\n[ 3437.458779] entry_SYSCALL_64_after_hwframe+0x6e/0x76\n[ 3437.459155]\n -> #2 (&c->snapshot_create_lock){++++}-{3:3}:\n[ 3437.459615] down_read+0x3e/0x170\n[ 3437.459878] bch2_truncate+0x82/0x110 [bcachefs]\n[ 3437.460276] bchfs_truncate+0x254/0x3c0 [bcachefs]\n[ 3437.460686] notify_change+0x1f1/0x4a0\n[ 3437.461283] do_truncate+0x7f/0xd0\n[ 3437.461555] path_openat+0xa57/0xce0\n[ 3437.461836] do_filp_open+0xb4/0x160\n[ 3437.462116] do_sys_openat2+0x91/0xc0\n[ 3437.462402] __x64_sys_openat+0x53/0xa0\n[ 3437.462701] do_syscall_64+0x42/0xf0\n[ 3437.462982] entry_SYSCALL_64_after_hwframe+0x6e/0x76\n[ 3437.463359]\n -> #1 (&sb->s_type->i_mutex_key#15){+.+.}-{3:3}:\n[ 3437.463843] down_write+0x3b/0xc0\n[ 3437.464223] bch2_write_iter+0x5b/0xcc0 [bcachefs]\n[ 3437.464493] vfs_write+0x21b/0x4c0\n[ 3437.464653] ksys_write+0x69/0xf0\n[ 3437.464839] do_syscall_64+0x42/0xf0\n[ 3437.465009] entry_SYSCALL_64_after_hwframe+0x6e/0x76\n[ 3437.465231]\n -> #0 (sb_writers#10){.+.+}-{0:0}:\n[ 3437.465471] __lock_acquire+0x1455/0x21b0\n[ 3437.465656] lock_acquire+0xc6/0x2b0\n[ 3437.465822] mnt_want_write+0x46/0x1a0\n[ 3437.465996] filename_create+0x62/0x190\n[ 3437.466175] user_path_create+0x2d/0x50\n[ 3437.466352] bch2_fs_file_ioctl+0x2ec/0xc90 [bcachefs]\n[ 3437.466617] __x64_sys_ioctl+0x93/0xd0\n[ 3437.466791] do_syscall_64+0x42/0xf0\n[ 3437.466957] entry_SYSCALL_64_after_hwframe+0x6e/0x76\n[ 3437.467180]\n other info that might help us debug this:\n\n[ 3437.469670] 2 locks held by bcachefs/35533:\n other info that might help us debug this:\n\n[ 3437.467507] Chain exists of:\n sb_writers#10 --> &c->snapshot_create_lock --> &type->s_umount_key#48\n\n[ 3437.467979] Possible unsafe locking scenario:\n\n[ 3437.468223] CPU0 CPU1\n[ 3437.468405] ---- ----\n[ 3437.468585] rlock(&type->s_umount_key#48);\n[ 3437.468758] lock(&c->snapshot_create_lock);\n[ 3437.469030] lock(&type->s_umount_key#48);\n[ 3437.469291] rlock(sb_writers#10);\n[ 3437.469434]\n *** DEADLOCK ***\n\n[ 3437.469\n---truncated---", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26658", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26658", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26658", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26658", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26658", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26658" + } + }, + "CVE-2024-26659": { + "affected_versions": "v2.6.12-rc2 to v6.8-rc3", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "xhci: handle isoc Babble and Buffer Overrun events properly", + "fixes": "7c4650ded49e5b88929ecbbb631efb8b0838e811", + "last_affected_version": "6.7.4", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nxhci: handle isoc Babble and Buffer Overrun events properly\n\nxHCI 4.9 explicitly forbids assuming that the xHC has released its\nownership of a multi-TRB TD when it reports an error on one of the\nearly TRBs. Yet the driver makes such assumption and releases the TD,\nallowing the remaining TRBs to be freed or overwritten by new TDs.\n\nThe xHC should also report completion of the final TRB due to its IOC\nflag being set by us, regardless of prior errors. This event cannot\nbe recognized if the TD has already been freed earlier, resulting in\n\"Transfer event TRB DMA ptr not part of current TD\" error message.\n\nFix this by reusing the logic for processing isoc Transaction Errors.\nThis also handles hosts which fail to report the final completion.\n\nFix transfer length reporting on Babble errors. They may be caused by\ndevice malfunction, no guarantee that the buffer has been filled.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26659", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26659", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26659", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26659", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26659", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26659" + } + }, + "CVE-2024-26660": { + "affected_versions": "v5.11-rc1 to v6.8-rc4", + "breaks": "3a83e4e64bb1522ddac67ffc787d1c38291e1a65", + "cmt_msg": "drm/amd/display: Implement bounds check for stream encoder creation in DCN301", + "fixes": "58fca355ad37dcb5f785d9095db5f748b79c5dc2", + "last_affected_version": "6.7.4", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Implement bounds check for stream encoder creation in DCN301\n\n'stream_enc_regs' array is an array of dcn10_stream_enc_registers\nstructures. The array is initialized with four elements, corresponding\nto the four calls to stream_enc_regs() in the array initializer. This\nmeans that valid indices for this array are 0, 1, 2, and 3.\n\nThe error message 'stream_enc_regs' 4 <= 5 below, is indicating that\nthere is an attempt to access this array with an index of 5, which is\nout of bounds. This could lead to undefined behavior\n\nHere, eng_id is used as an index to access the stream_enc_regs array. If\neng_id is 5, this would result in an out-of-bounds access on the\nstream_enc_regs array.\n\nThus fixing Buffer overflow error in dcn301_stream_encoder_create\nreported by Smatch:\ndrivers/gpu/drm/amd/amdgpu/../display/dc/resource/dcn301/dcn301_resource.c:1011 dcn301_stream_encoder_create() error: buffer overflow 'stream_enc_regs' 4 <= 5", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26660", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26660", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26660", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26660", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26660", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26660" + } + }, + "CVE-2024-26661": { + "affected_versions": "v5.9-rc1 to v6.8-rc4", + "breaks": "474ac4a875ca6fea3fc5183d3ad22ef7523dca53", + "cmt_msg": "drm/amd/display: Add NULL test for 'timing generator' in 'dcn21_set_pipe()'", + "fixes": "66951d98d9bf45ba25acf37fe0747253fafdf298", + "last_affected_version": "6.7.4", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Add NULL test for 'timing generator' in 'dcn21_set_pipe()'\n\nIn \"u32 otg_inst = pipe_ctx->stream_res.tg->inst;\"\npipe_ctx->stream_res.tg could be NULL, it is relying on the caller to\nensure the tg is not NULL.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26661", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26661", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26661", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26661", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26661", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26661" + } + }, + "CVE-2024-26662": { + "affected_versions": "v5.9-rc1 to v6.8-rc4", + "breaks": "474ac4a875ca6fea3fc5183d3ad22ef7523dca53", + "cmt_msg": "drm/amd/display: Fix 'panel_cntl' could be null in 'dcn21_set_backlight_level()'", + "fixes": "e96fddb32931d007db12b1fce9b5e8e4c080401b", + "last_affected_version": "6.7.4", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Fix 'panel_cntl' could be null in 'dcn21_set_backlight_level()'\n\n'panel_cntl' structure used to control the display panel could be null,\ndereferencing it could lead to a null pointer access.\n\nFixes the below:\ndrivers/gpu/drm/amd/amdgpu/../display/dc/hwss/dcn21/dcn21_hwseq.c:269 dcn21_set_backlight_level() error: we previously assumed 'panel_cntl' could be null (see line 250)", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26662", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26662", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26662", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26662", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26662", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26662" + } + }, + "CVE-2024-26663": { + "affected_versions": "v4.9-rc1 to v6.8-rc4", + "breaks": "ef20cd4dd1633987bcf46ac34ace2c8af212361f", + "cmt_msg": "tipc: Check the bearer type before calling tipc_udp_nl_bearer_add()", + "fixes": "3871aa01e1a779d866fa9dfdd5a836f342f4eb87", + "last_affected_version": "6.7.4", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntipc: Check the bearer type before calling tipc_udp_nl_bearer_add()\n\nsyzbot reported the following general protection fault [1]:\n\ngeneral protection fault, probably for non-canonical address 0xdffffc0000000010: 0000 [#1] PREEMPT SMP KASAN\nKASAN: null-ptr-deref in range [0x0000000000000080-0x0000000000000087]\n...\nRIP: 0010:tipc_udp_is_known_peer+0x9c/0x250 net/tipc/udp_media.c:291\n...\nCall Trace:\n \n tipc_udp_nl_bearer_add+0x212/0x2f0 net/tipc/udp_media.c:646\n tipc_nl_bearer_add+0x21e/0x360 net/tipc/bearer.c:1089\n genl_family_rcv_msg_doit+0x1fc/0x2e0 net/netlink/genetlink.c:972\n genl_family_rcv_msg net/netlink/genetlink.c:1052 [inline]\n genl_rcv_msg+0x561/0x800 net/netlink/genetlink.c:1067\n netlink_rcv_skb+0x16b/0x440 net/netlink/af_netlink.c:2544\n genl_rcv+0x28/0x40 net/netlink/genetlink.c:1076\n netlink_unicast_kernel net/netlink/af_netlink.c:1341 [inline]\n netlink_unicast+0x53b/0x810 net/netlink/af_netlink.c:1367\n netlink_sendmsg+0x8b7/0xd70 net/netlink/af_netlink.c:1909\n sock_sendmsg_nosec net/socket.c:730 [inline]\n __sock_sendmsg+0xd5/0x180 net/socket.c:745\n ____sys_sendmsg+0x6ac/0x940 net/socket.c:2584\n ___sys_sendmsg+0x135/0x1d0 net/socket.c:2638\n __sys_sendmsg+0x117/0x1e0 net/socket.c:2667\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0x40/0x110 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x63/0x6b\n\nThe cause of this issue is that when tipc_nl_bearer_add() is called with\nthe TIPC_NLA_BEARER_UDP_OPTS attribute, tipc_udp_nl_bearer_add() is called\neven if the bearer is not UDP.\n\ntipc_udp_is_known_peer() called by tipc_udp_nl_bearer_add() assumes that\nthe media_ptr field of the tipc_bearer has an udp_bearer type object, so\nthe function goes crazy for non-UDP bearers.\n\nThis patch fixes the issue by checking the bearer type before calling\ntipc_udp_nl_bearer_add() in tipc_nl_bearer_add().", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26663", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26663", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26663", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26663", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26663", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26663" + } + }, + "CVE-2024-26664": { + "affected_versions": "unk to v6.8-rc4", + "breaks": "", + "cmt_msg": "hwmon: (coretemp) Fix out-of-bounds memory access", + "fixes": "4e440abc894585a34c2904a32cd54af1742311b3", + "last_affected_version": "6.7.4", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nhwmon: (coretemp) Fix out-of-bounds memory access\n\nFix a bug that pdata->cpu_map[] is set before out-of-bounds check.\nThe problem might be triggered on systems with more than 128 cores per\npackage.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26664", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26664", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26664", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26664", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26664", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26664" + } + }, + "CVE-2024-26665": { + "affected_versions": "v5.9-rc1 to v6.8-rc4", + "breaks": "4cb47a8644cc9eb8ec81190a50e79e6530d0297f", + "cmt_msg": "tunnels: fix out of bounds access when building IPv6 PMTU error", + "fixes": "d75abeec401f8c86b470e7028a13fcdc87e5dd06", + "last_affected_version": "6.7.4", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntunnels: fix out of bounds access when building IPv6 PMTU error\n\nIf the ICMPv6 error is built from a non-linear skb we get the following\nsplat,\n\n BUG: KASAN: slab-out-of-bounds in do_csum+0x220/0x240\n Read of size 4 at addr ffff88811d402c80 by task netperf/820\n CPU: 0 PID: 820 Comm: netperf Not tainted 6.8.0-rc1+ #543\n ...\n kasan_report+0xd8/0x110\n do_csum+0x220/0x240\n csum_partial+0xc/0x20\n skb_tunnel_check_pmtu+0xeb9/0x3280\n vxlan_xmit_one+0x14c2/0x4080\n vxlan_xmit+0xf61/0x5c00\n dev_hard_start_xmit+0xfb/0x510\n __dev_queue_xmit+0x7cd/0x32a0\n br_dev_queue_push_xmit+0x39d/0x6a0\n\nUse skb_checksum instead of csum_partial who cannot deal with non-linear\nSKBs.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26665", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26665", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26665", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26665", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26665", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26665" + } + }, + "CVE-2024-26666": { + "affected_versions": "v6.5-rc1 to v6.8-rc4", + "breaks": "8cc07265b69141f8ed9597d0f27185239c241c80", + "cmt_msg": "wifi: mac80211: fix RCU use in TDLS fast-xmit", + "fixes": "9480adfe4e0f0319b9da04b44e4eebd5ad07e0cd", + "last_affected_version": "6.7.4", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: mac80211: fix RCU use in TDLS fast-xmit\n\nThis looks up the link under RCU protection, but isn't\nguaranteed to actually have protection. Fix that.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26666", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26666", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26666", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26666", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26666", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26666" + } + }, + "CVE-2024-26667": { + "affected_versions": "v5.19-rc1 to v6.8-rc4", + "breaks": "ae4d721ce10057a4aa9f0d253e0d460518a9ef75", + "cmt_msg": "drm/msm/dpu: check for valid hw_pp in dpu_encoder_helper_phys_cleanup", + "fixes": "7f3d03c48b1eb6bc45ab20ca98b8b11be25f9f52", + "last_affected_version": "6.7.4", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/msm/dpu: check for valid hw_pp in dpu_encoder_helper_phys_cleanup\n\nThe commit 8b45a26f2ba9 (\"drm/msm/dpu: reserve cdm blocks for writeback\nin case of YUV output\") introduced a smatch warning about another\nconditional block in dpu_encoder_helper_phys_cleanup() which had assumed\nhw_pp will always be valid which may not necessarily be true.\n\nLets fix the other conditional block by making sure hw_pp is valid\nbefore dereferencing it.\n\nPatchwork: https://patchwork.freedesktop.org/patch/574878/", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26667", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26667", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26667", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26667", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26667", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26667" + } + }, + "CVE-2024-26668": { + "affected_versions": "v4.3-rc1 to v6.8-rc2", + "breaks": "d2168e849ebf617b2b7feae44c0c0baf739cb610", + "cmt_msg": "netfilter: nft_limit: reject configurations that cause integer overflow", + "fixes": "c9d9eb9c53d37cdebbad56b91e40baf42d5a97aa", + "last_affected_version": "6.7.2", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nft_limit: reject configurations that cause integer overflow\n\nReject bogus configs where internal token counter wraps around.\nThis only occurs with very very large requests, such as 17gbyte/s.\n\nIts better to reject this rather than having incorrect ratelimit.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26668", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26668", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26668", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26668", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26668", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26668" + } + }, + "CVE-2024-26669": { + "affected_versions": "v5.1-rc1 to v6.8-rc2", + "breaks": "bbf73830cd48cff1599811d4f69c7cfd49c7b869", + "cmt_msg": "net/sched: flower: Fix chain template offload", + "fixes": "32f2a0afa95fae0d1ceec2ff06e0e816939964b8", + "last_affected_version": "6.7.2", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: flower: Fix chain template offload\n\nWhen a qdisc is deleted from a net device the stack instructs the\nunderlying driver to remove its flow offload callback from the\nassociated filter block using the 'FLOW_BLOCK_UNBIND' command. The stack\nthen continues to replay the removal of the filters in the block for\nthis driver by iterating over the chains in the block and invoking the\n'reoffload' operation of the classifier being used. In turn, the\nclassifier in its 'reoffload' operation prepares and emits a\n'FLOW_CLS_DESTROY' command for each filter.\n\nHowever, the stack does not do the same for chain templates and the\nunderlying driver never receives a 'FLOW_CLS_TMPLT_DESTROY' command when\na qdisc is deleted. This results in a memory leak [1] which can be\nreproduced using [2].\n\nFix by introducing a 'tmplt_reoffload' operation and have the stack\ninvoke it with the appropriate arguments as part of the replay.\nImplement the operation in the sole classifier that supports chain\ntemplates (flower) by emitting the 'FLOW_CLS_TMPLT_{CREATE,DESTROY}'\ncommand based on whether a flow offload callback is being bound to a\nfilter block or being unbound from one.\n\nAs far as I can tell, the issue happens since cited commit which\nreordered tcf_block_offload_unbind() before tcf_block_flush_all_chains()\nin __tcf_block_put(). The order cannot be reversed as the filter block\nis expected to be freed after flushing all the chains.\n\n[1]\nunreferenced object 0xffff888107e28800 (size 2048):\n comm \"tc\", pid 1079, jiffies 4294958525 (age 3074.287s)\n hex dump (first 32 bytes):\n b1 a6 7c 11 81 88 ff ff e0 5b b3 10 81 88 ff ff ..|......[......\n 01 00 00 00 00 00 00 00 e0 aa b0 84 ff ff ff ff ................\n backtrace:\n [] __kmem_cache_alloc_node+0x1e8/0x320\n [] __kmalloc+0x4e/0x90\n [] mlxsw_sp_acl_ruleset_get+0x34d/0x7a0\n [] mlxsw_sp_flower_tmplt_create+0x145/0x180\n [] mlxsw_sp_flow_block_cb+0x1ea/0x280\n [] tc_setup_cb_call+0x183/0x340\n [] fl_tmplt_create+0x3da/0x4c0\n [] tc_ctl_chain+0xa15/0x1170\n [] rtnetlink_rcv_msg+0x3cc/0xed0\n [] netlink_rcv_skb+0x170/0x440\n [] netlink_unicast+0x540/0x820\n [] netlink_sendmsg+0x8d8/0xda0\n [] ____sys_sendmsg+0x30f/0xa80\n [] ___sys_sendmsg+0x13a/0x1e0\n [] __sys_sendmsg+0x11c/0x1f0\n [] do_syscall_64+0x40/0xe0\nunreferenced object 0xffff88816d2c0400 (size 1024):\n comm \"tc\", pid 1079, jiffies 4294958525 (age 3074.287s)\n hex dump (first 32 bytes):\n 40 00 00 00 00 00 00 00 57 f6 38 be 00 00 00 00 @.......W.8.....\n 10 04 2c 6d 81 88 ff ff 10 04 2c 6d 81 88 ff ff ..,m......,m....\n backtrace:\n [] __kmem_cache_alloc_node+0x1e8/0x320\n [] __kmalloc_node+0x51/0x90\n [] kvmalloc_node+0xa6/0x1f0\n [] bucket_table_alloc.isra.0+0x83/0x460\n [] rhashtable_init+0x43b/0x7c0\n [] mlxsw_sp_acl_ruleset_get+0x428/0x7a0\n [] mlxsw_sp_flower_tmplt_create+0x145/0x180\n [] mlxsw_sp_flow_block_cb+0x1ea/0x280\n [] tc_setup_cb_call+0x183/0x340\n [] fl_tmplt_create+0x3da/0x4c0\n [] tc_ctl_chain+0xa15/0x1170\n [] rtnetlink_rcv_msg+0x3cc/0xed0\n [] netlink_rcv_skb+0x170/0x440\n [] netlink_unicast+0x540/0x820\n [] netlink_sendmsg+0x8d8/0xda0\n [] ____sys_sendmsg+0x30f/0xa80\n\n[2]\n # tc qdisc add dev swp1 clsact\n # tc chain add dev swp1 ingress proto ip chain 1 flower dst_ip 0.0.0.0/32\n # tc qdisc del dev\n---truncated---", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26669", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26669", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26669", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26669", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26669", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26669" + } + }, + "CVE-2024-26670": { + "affected_versions": "v6.6-rc5 to v6.8-rc1", + "breaks": "471470bc7052d28ce125901877dd10e4c048e513", + "cmt_msg": "arm64: entry: fix ARM64_WORKAROUND_SPECULATIVE_UNPRIV_LOAD", + "fixes": "832dd634bd1b4e3bbe9f10b9c9ba5db6f6f2b97f", + "last_affected_version": "6.7.2", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\narm64: entry: fix ARM64_WORKAROUND_SPECULATIVE_UNPRIV_LOAD\n\nCurrently the ARM64_WORKAROUND_SPECULATIVE_UNPRIV_LOAD workaround isn't\nquite right, as it is supposed to be applied after the last explicit\nmemory access, but is immediately followed by an LDR.\n\nThe ARM64_WORKAROUND_SPECULATIVE_UNPRIV_LOAD workaround is used to\nhandle Cortex-A520 erratum 2966298 and Cortex-A510 erratum 3117295,\nwhich are described in:\n\n* https://developer.arm.com/documentation/SDEN2444153/0600/?lang=en\n* https://developer.arm.com/documentation/SDEN1873361/1600/?lang=en\n\nIn both cases the workaround is described as:\n\n| If pagetable isolation is disabled, the context switch logic in the\n| kernel can be updated to execute the following sequence on affected\n| cores before exiting to EL0, and after all explicit memory accesses:\n|\n| 1. A non-shareable TLBI to any context and/or address, including\n| unused contexts or addresses, such as a `TLBI VALE1 Xzr`.\n|\n| 2. A DSB NSH to guarantee completion of the TLBI.\n\nThe important part being that the TLBI+DSB must be placed \"after all\nexplicit memory accesses\".\n\nUnfortunately, as-implemented, the TLBI+DSB is immediately followed by\nan LDR, as we have:\n\n| alternative_if ARM64_WORKAROUND_SPECULATIVE_UNPRIV_LOAD\n| \ttlbi\tvale1, xzr\n| \tdsb\tnsh\n| alternative_else_nop_endif\n| alternative_if_not ARM64_UNMAP_KERNEL_AT_EL0\n| \tldr\tlr, [sp, #S_LR]\n| \tadd\tsp, sp, #PT_REGS_SIZE\t\t// restore sp\n| \teret\n| alternative_else_nop_endif\n|\n| [ ... KPTI exception return path ... ]\n\nThis patch fixes this by reworking the logic to place the TLBI+DSB\nimmediately before the ERET, after all explicit memory accesses.\n\nThe ERET is currently in a separate alternative block, and alternatives\ncannot be nested. To account for this, the alternative block for\nARM64_UNMAP_KERNEL_AT_EL0 is replaced with a single alternative branch\nto skip the KPTI logic, with the new shape of the logic being:\n\n| alternative_insn \"b .L_skip_tramp_exit_\\@\", nop, ARM64_UNMAP_KERNEL_AT_EL0\n| \t[ ... KPTI exception return path ... ]\n| .L_skip_tramp_exit_\\@:\n|\n| \tldr\tlr, [sp, #S_LR]\n| \tadd\tsp, sp, #PT_REGS_SIZE\t\t// restore sp\n|\n| alternative_if ARM64_WORKAROUND_SPECULATIVE_UNPRIV_LOAD\n| \ttlbi\tvale1, xzr\n| \tdsb\tnsh\n| alternative_else_nop_endif\n| \teret\n\nThe new structure means that the workaround is only applied when KPTI is\nnot in use; this is fine as noted in the documented implications of the\nerratum:\n\n| Pagetable isolation between EL0 and higher level ELs prevents the\n| issue from occurring.\n\n... and as per the workaround description quoted above, the workaround\nis only necessary \"If pagetable isolation is disabled\".", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26670", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26670", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26670", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26670", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26670", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26670" + } + }, + "CVE-2024-26671": { + "affected_versions": "v2.6.12-rc2 to v6.8-rc1", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "blk-mq: fix IO hang from sbitmap wakeup race", + "fixes": "5266caaf5660529e3da53004b8b7174cab6374ed", + "last_affected_version": "6.7.3", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nblk-mq: fix IO hang from sbitmap wakeup race\n\nIn blk_mq_mark_tag_wait(), __add_wait_queue() may be re-ordered\nwith the following blk_mq_get_driver_tag() in case of getting driver\ntag failure.\n\nThen in __sbitmap_queue_wake_up(), waitqueue_active() may not observe\nthe added waiter in blk_mq_mark_tag_wait() and wake up nothing, meantime\nblk_mq_mark_tag_wait() can't get driver tag successfully.\n\nThis issue can be reproduced by running the following test in loop, and\nfio hang can be observed in < 30min when running it on my test VM\nin laptop.\n\n\tmodprobe -r scsi_debug\n\tmodprobe scsi_debug delay=0 dev_size_mb=4096 max_queue=1 host_max_queue=1 submit_queues=4\n\tdev=`ls -d /sys/bus/pseudo/drivers/scsi_debug/adapter*/host*/target*/*/block/* | head -1 | xargs basename`\n\tfio --filename=/dev/\"$dev\" --direct=1 --rw=randrw --bs=4k --iodepth=1 \\\n \t\t--runtime=100 --numjobs=40 --time_based --name=test \\\n \t--ioengine=libaio\n\nFix the issue by adding one explicit barrier in blk_mq_mark_tag_wait(), which\nis just fine in case of running out of tag.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26671", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26671", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26671", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26671", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26671", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26671" + } + }, + "CVE-2024-26672": { + "affected_versions": "v2.6.12-rc2 to v6.8-rc1", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "drm/amdgpu: Fix variable 'mca_funcs' dereferenced before NULL check in 'amdgpu_mca_smu_get_mca_entry()'", + "fixes": "4f32504a2f85a7b40fe149436881381f48e9c0c0", + "last_affected_version": "6.7.3", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdgpu: Fix variable 'mca_funcs' dereferenced before NULL check in 'amdgpu_mca_smu_get_mca_entry()'\n\nFixes the below:\n\ndrivers/gpu/drm/amd/amdgpu/amdgpu_mca.c:377 amdgpu_mca_smu_get_mca_entry() warn: variable dereferenced before check 'mca_funcs' (see line 368)\n\n357 int amdgpu_mca_smu_get_mca_entry(struct amdgpu_device *adev,\n\t\t\t\t enum amdgpu_mca_error_type type,\n358 int idx, struct mca_bank_entry *entry)\n359 {\n360 const struct amdgpu_mca_smu_funcs *mca_funcs =\n\t\t\t\t\t\tadev->mca.mca_funcs;\n361 int count;\n362\n363 switch (type) {\n364 case AMDGPU_MCA_ERROR_TYPE_UE:\n365 count = mca_funcs->max_ue_count;\n\nmca_funcs is dereferenced here.\n\n366 break;\n367 case AMDGPU_MCA_ERROR_TYPE_CE:\n368 count = mca_funcs->max_ce_count;\n\nmca_funcs is dereferenced here.\n\n369 break;\n370 default:\n371 return -EINVAL;\n372 }\n373\n374 if (idx >= count)\n375 return -EINVAL;\n376\n377 if (mca_funcs && mca_funcs->mca_get_mca_entry)\n\t ^^^^^^^^^\n\nChecked too late!", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26672", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26672", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26672", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26672", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26672", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26672" + } + }, + "CVE-2024-26673": { + "affected_versions": "v5.3-rc1 to v6.8-rc3", + "breaks": "857b46027d6f91150797295752581b7155b9d0e1", + "cmt_msg": "netfilter: nft_ct: sanitize layer 3 and 4 protocol number in custom expectations", + "fixes": "8059918a1377f2f1fff06af4f5a4ed3d5acd6bc4", + "last_affected_version": "6.7.3", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nft_ct: sanitize layer 3 and 4 protocol number in custom expectations\n\n- Disallow families other than NFPROTO_{IPV4,IPV6,INET}.\n- Disallow layer 4 protocol with no ports, since destination port is a\n mandatory attribute for this object.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26673", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26673", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26673", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26673", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26673", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26673" + } + }, + "CVE-2024-26674": { + "affected_versions": "v6.4-rc1 to v6.8-rc4", + "breaks": "b19b74bc99b1501a550f4448d04d59b946dc617a", + "cmt_msg": "x86/lib: Revert to _ASM_EXTABLE_UA() for {get,put}_user() fixups", + "fixes": "8eed4e00a370b37b4e5985ed983dccedd555ea9d", + "last_affected_version": "6.7.4", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nx86/lib: Revert to _ASM_EXTABLE_UA() for {get,put}_user() fixups\n\nDuring memory error injection test on kernels >= v6.4, the kernel panics\nlike below. However, this issue couldn't be reproduced on kernels <= v6.3.\n\n mce: [Hardware Error]: CPU 296: Machine Check Exception: f Bank 1: bd80000000100134\n mce: [Hardware Error]: RIP 10: {__get_user_nocheck_4+0x6/0x20}\n mce: [Hardware Error]: TSC 411a93533ed ADDR 346a8730040 MISC 86\n mce: [Hardware Error]: PROCESSOR 0:a06d0 TIME 1706000767 SOCKET 1 APIC 211 microcode 80001490\n mce: [Hardware Error]: Run the above through 'mcelog --ascii'\n mce: [Hardware Error]: Machine check: Data load in unrecoverable area of kernel\n Kernel panic - not syncing: Fatal local machine check\n\nThe MCA code can recover from an in-kernel #MC if the fixup type is\nEX_TYPE_UACCESS, explicitly indicating that the kernel is attempting to\naccess userspace memory. However, if the fixup type is EX_TYPE_DEFAULT\nthe only thing that is raised for an in-kernel #MC is a panic.\n\nex_handler_uaccess() would warn if users gave a non-canonical addresses\n(with bit 63 clear) to {get, put}_user(), which was unexpected.\n\nTherefore, commit\n\n b19b74bc99b1 (\"x86/mm: Rework address range check in get_user() and put_user()\")\n\nreplaced _ASM_EXTABLE_UA() with _ASM_EXTABLE() for {get, put}_user()\nfixups. However, the new fixup type EX_TYPE_DEFAULT results in a panic.\n\nCommit\n\n 6014bc27561f (\"x86-64: make access_ok() independent of LAM\")\n\nadded the check gp_fault_address_ok() right before the WARN_ONCE() in\nex_handler_uaccess() to not warn about non-canonical user addresses due\nto LAM.\n\nWith that in place, revert back to _ASM_EXTABLE_UA() for {get,put}_user()\nexception fixups in order to be able to handle in-kernel MCEs correctly\nagain.\n\n [ bp: Massage commit message. ]", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26674", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26674", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26674", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26674", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26674", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26674" + } + }, + "CVE-2024-26675": { + "affected_versions": "v2.6.12-rc2 to v6.8-rc4", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "ppp_async: limit MRU to 64K", + "fixes": "cb88cb53badb8aeb3955ad6ce80b07b598e310b8", + "last_affected_version": "6.7.4", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nppp_async: limit MRU to 64K\n\nsyzbot triggered a warning [1] in __alloc_pages():\n\nWARN_ON_ONCE_GFP(order > MAX_PAGE_ORDER, gfp)\n\nWillem fixed a similar issue in commit c0a2a1b0d631 (\"ppp: limit MRU to 64K\")\n\nAdopt the same sanity check for ppp_async_ioctl(PPPIOCSMRU)\n\n[1]:\n\n WARNING: CPU: 1 PID: 11 at mm/page_alloc.c:4543 __alloc_pages+0x308/0x698 mm/page_alloc.c:4543\nModules linked in:\nCPU: 1 PID: 11 Comm: kworker/u4:0 Not tainted 6.8.0-rc2-syzkaller-g41bccc98fb79 #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023\nWorkqueue: events_unbound flush_to_ldisc\npstate: 204000c5 (nzCv daIF +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n pc : __alloc_pages+0x308/0x698 mm/page_alloc.c:4543\n lr : __alloc_pages+0xc8/0x698 mm/page_alloc.c:4537\nsp : ffff800093967580\nx29: ffff800093967660 x28: ffff8000939675a0 x27: dfff800000000000\nx26: ffff70001272ceb4 x25: 0000000000000000 x24: ffff8000939675c0\nx23: 0000000000000000 x22: 0000000000060820 x21: 1ffff0001272ceb8\nx20: ffff8000939675e0 x19: 0000000000000010 x18: ffff800093967120\nx17: ffff800083bded5c x16: ffff80008ac97500 x15: 0000000000000005\nx14: 1ffff0001272cebc x13: 0000000000000000 x12: 0000000000000000\nx11: ffff70001272cec1 x10: 1ffff0001272cec0 x9 : 0000000000000001\nx8 : ffff800091c91000 x7 : 0000000000000000 x6 : 000000000000003f\nx5 : 00000000ffffffff x4 : 0000000000000000 x3 : 0000000000000020\nx2 : 0000000000000008 x1 : 0000000000000000 x0 : ffff8000939675e0\nCall trace:\n __alloc_pages+0x308/0x698 mm/page_alloc.c:4543\n __alloc_pages_node include/linux/gfp.h:238 [inline]\n alloc_pages_node include/linux/gfp.h:261 [inline]\n __kmalloc_large_node+0xbc/0x1fc mm/slub.c:3926\n __do_kmalloc_node mm/slub.c:3969 [inline]\n __kmalloc_node_track_caller+0x418/0x620 mm/slub.c:4001\n kmalloc_reserve+0x17c/0x23c net/core/skbuff.c:590\n __alloc_skb+0x1c8/0x3d8 net/core/skbuff.c:651\n __netdev_alloc_skb+0xb8/0x3e8 net/core/skbuff.c:715\n netdev_alloc_skb include/linux/skbuff.h:3235 [inline]\n dev_alloc_skb include/linux/skbuff.h:3248 [inline]\n ppp_async_input drivers/net/ppp/ppp_async.c:863 [inline]\n ppp_asynctty_receive+0x588/0x186c drivers/net/ppp/ppp_async.c:341\n tty_ldisc_receive_buf+0x12c/0x15c drivers/tty/tty_buffer.c:390\n tty_port_default_receive_buf+0x74/0xac drivers/tty/tty_port.c:37\n receive_buf drivers/tty/tty_buffer.c:444 [inline]\n flush_to_ldisc+0x284/0x6e4 drivers/tty/tty_buffer.c:494\n process_one_work+0x694/0x1204 kernel/workqueue.c:2633\n process_scheduled_works kernel/workqueue.c:2706 [inline]\n worker_thread+0x938/0xef4 kernel/workqueue.c:2787\n kthread+0x288/0x310 kernel/kthread.c:388\n ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:860", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26675", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26675", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26675", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26675", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26675", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26675" + } + }, + "CVE-2024-26676": { + "affected_versions": "unk to v6.8-rc4", + "breaks": "", + "cmt_msg": "af_unix: Call kfree_skb() for dead unix_(sk)->oob_skb in GC.", + "fixes": "1279f9d9dec2d7462823a18c29ad61359e0a007d", + "last_affected_version": "6.7.4", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\naf_unix: Call kfree_skb() for dead unix_(sk)->oob_skb in GC.\n\nsyzbot reported a warning [0] in __unix_gc() with a repro, which\ncreates a socketpair and sends one socket's fd to itself using the\npeer.\n\n socketpair(AF_UNIX, SOCK_STREAM, 0, [3, 4]) = 0\n sendmsg(4, {msg_name=NULL, msg_namelen=0, msg_iov=[{iov_base=\"\\360\", iov_len=1}],\n msg_iovlen=1, msg_control=[{cmsg_len=20, cmsg_level=SOL_SOCKET,\n cmsg_type=SCM_RIGHTS, cmsg_data=[3]}],\n msg_controllen=24, msg_flags=0}, MSG_OOB|MSG_PROBE|MSG_DONTWAIT|MSG_ZEROCOPY) = 1\n\nThis forms a self-cyclic reference that GC should finally untangle\nbut does not due to lack of MSG_OOB handling, resulting in memory\nleak.\n\nRecently, commit 11498715f266 (\"af_unix: Remove io_uring code for\nGC.\") removed io_uring's dead code in GC and revealed the problem.\n\nThe code was executed at the final stage of GC and unconditionally\nmoved all GC candidates from gc_candidates to gc_inflight_list.\nThat papered over the reported problem by always making the following\nWARN_ON_ONCE(!list_empty(&gc_candidates)) false.\n\nThe problem has been there since commit 2aab4b969002 (\"af_unix: fix\nstruct pid leaks in OOB support\") added full scm support for MSG_OOB\nwhile fixing another bug.\n\nTo fix this problem, we must call kfree_skb() for unix_sk(sk)->oob_skb\nif the socket still exists in gc_candidates after purging collected skb.\n\nThen, we need to set NULL to oob_skb before calling kfree_skb() because\nit calls last fput() and triggers unix_release_sock(), where we call\nduplicate kfree_skb(u->oob_skb) if not NULL.\n\nNote that the leaked socket remained being linked to a global list, so\nkmemleak also could not detect it. We need to check /proc/net/protocol\nto notice the unfreed socket.\n\n[0]:\nWARNING: CPU: 0 PID: 2863 at net/unix/garbage.c:345 __unix_gc+0xc74/0xe80 net/unix/garbage.c:345\nModules linked in:\nCPU: 0 PID: 2863 Comm: kworker/u4:11 Not tainted 6.8.0-rc1-syzkaller-00583-g1701940b1a02 #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024\nWorkqueue: events_unbound __unix_gc\nRIP: 0010:__unix_gc+0xc74/0xe80 net/unix/garbage.c:345\nCode: 8b 5c 24 50 e9 86 f8 ff ff e8 f8 e4 22 f8 31 d2 48 c7 c6 30 6a 69 89 4c 89 ef e8 97 ef ff ff e9 80 f9 ff ff e8 dd e4 22 f8 90 <0f> 0b 90 e9 7b fd ff ff 48 89 df e8 5c e7 7c f8 e9 d3 f8 ff ff e8\nRSP: 0018:ffffc9000b03fba0 EFLAGS: 00010293\nRAX: 0000000000000000 RBX: ffffc9000b03fc10 RCX: ffffffff816c493e\nRDX: ffff88802c02d940 RSI: ffffffff896982f3 RDI: ffffc9000b03fb30\nRBP: ffffc9000b03fce0 R08: 0000000000000001 R09: fffff52001607f66\nR10: 0000000000000003 R11: 0000000000000002 R12: dffffc0000000000\nR13: ffffc9000b03fc10 R14: ffffc9000b03fc10 R15: 0000000000000001\nFS: 0000000000000000(0000) GS:ffff8880b9400000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00005559c8677a60 CR3: 000000000d57a000 CR4: 00000000003506f0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n \n process_one_work+0x889/0x15e0 kernel/workqueue.c:2633\n process_scheduled_works kernel/workqueue.c:2706 [inline]\n worker_thread+0x8b9/0x12a0 kernel/workqueue.c:2787\n kthread+0x2c6/0x3b0 kernel/kthread.c:388\n ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:147\n ret_from_fork_asm+0x1b/0x30 arch/x86/entry/entry_64.S:242\n ", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26676", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26676", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26676", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26676", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26676", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26676" + } + }, + "CVE-2024-26677": { + "affected_versions": "unk to v6.8-rc4", + "breaks": "", + "cmt_msg": "rxrpc: Fix delayed ACKs to not set the reference serial number", + "fixes": "e7870cf13d20f56bfc19f9c3e89707c69cf104ef", + "last_affected_version": "6.7.4", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nrxrpc: Fix delayed ACKs to not set the reference serial number\n\nFix the construction of delayed ACKs to not set the reference serial number\nas they can't be used as an RTT reference.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26677", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26677", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26677", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26677", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26677", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26677" + } + }, + "CVE-2024-26678": { + "affected_versions": "v6.7-rc1 to v6.8-rc4", + "breaks": "3e3eabe26dc88692d34cf76ca0e0dd331481cc15", + "cmt_msg": "x86/efistub: Use 1:1 file:memory mapping for PE/COFF .compat section", + "fixes": "1ad55cecf22f05f1c884adf63cc09d3c3e609ebf", + "last_affected_version": "6.7.4", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nx86/efistub: Use 1:1 file:memory mapping for PE/COFF .compat section\n\nThe .compat section is a dummy PE section that contains the address of\nthe 32-bit entrypoint of the 64-bit kernel image if it is bootable from\n32-bit firmware (i.e., CONFIG_EFI_MIXED=y)\n\nThis section is only 8 bytes in size and is only referenced from the\nloader, and so it is placed at the end of the memory view of the image,\nto avoid the need for padding it to 4k, which is required for sections\nappearing in the middle of the image.\n\nUnfortunately, this violates the PE/COFF spec, and even if most EFI\nloaders will work correctly (including the Tianocore reference\nimplementation), PE loaders do exist that reject such images, on the\nbasis that both the file and memory views of the file contents should be\ndescribed by the section headers in a monotonically increasing manner\nwithout leaving any gaps.\n\nSo reorganize the sections to avoid this issue. This results in a slight\npadding overhead (< 4k) which can be avoided if desired by disabling\nCONFIG_EFI_MIXED (which is only needed in rare cases these days)", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26678", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26678", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26678", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26678", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26678", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26678" + } + }, + "CVE-2024-26679": { + "affected_versions": "v3.18-rc7 to v6.8-rc4", + "breaks": "f4713a3dfad045d46afcb9c2a7d0bba288920ed4", + "cmt_msg": "inet: read sk->sk_family once in inet_recv_error()", + "fixes": "eef00a82c568944f113f2de738156ac591bbd5cd", + "last_affected_version": "6.7.4", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\ninet: read sk->sk_family once in inet_recv_error()\n\ninet_recv_error() is called without holding the socket lock.\n\nIPv6 socket could mutate to IPv4 with IPV6_ADDRFORM\nsocket option and trigger a KCSAN warning.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26679", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26679", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26679", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26679", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26679", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26679" + } + }, + "CVE-2024-26680": { + "affected_versions": "v5.5-rc1 to v6.8-rc4", + "breaks": "94ad94558b0fbf18dd6fb0987540af1693157556", + "cmt_msg": "net: atlantic: Fix DMA mapping for PTP hwts ring", + "fixes": "2e7d3b67630dfd8f178c41fa2217aa00e79a5887", + "last_affected_version": "6.7.4", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: atlantic: Fix DMA mapping for PTP hwts ring\n\nFunction aq_ring_hwts_rx_alloc() maps extra AQ_CFG_RXDS_DEF bytes\nfor PTP HWTS ring but then generic aq_ring_free() does not take this\ninto account.\nCreate and use a specific function to free HWTS ring to fix this\nissue.\n\nTrace:\n[ 215.351607] ------------[ cut here ]------------\n[ 215.351612] DMA-API: atlantic 0000:4b:00.0: device driver frees DMA memory with different size [device address=0x00000000fbdd0000] [map size=34816 bytes] [unmap size=32768 bytes]\n[ 215.351635] WARNING: CPU: 33 PID: 10759 at kernel/dma/debug.c:988 check_unmap+0xa6f/0x2360\n...\n[ 215.581176] Call Trace:\n[ 215.583632] \n[ 215.585745] ? show_trace_log_lvl+0x1c4/0x2df\n[ 215.590114] ? show_trace_log_lvl+0x1c4/0x2df\n[ 215.594497] ? debug_dma_free_coherent+0x196/0x210\n[ 215.599305] ? check_unmap+0xa6f/0x2360\n[ 215.603147] ? __warn+0xca/0x1d0\n[ 215.606391] ? check_unmap+0xa6f/0x2360\n[ 215.610237] ? report_bug+0x1ef/0x370\n[ 215.613921] ? handle_bug+0x3c/0x70\n[ 215.617423] ? exc_invalid_op+0x14/0x50\n[ 215.621269] ? asm_exc_invalid_op+0x16/0x20\n[ 215.625480] ? check_unmap+0xa6f/0x2360\n[ 215.629331] ? mark_lock.part.0+0xca/0xa40\n[ 215.633445] debug_dma_free_coherent+0x196/0x210\n[ 215.638079] ? __pfx_debug_dma_free_coherent+0x10/0x10\n[ 215.643242] ? slab_free_freelist_hook+0x11d/0x1d0\n[ 215.648060] dma_free_attrs+0x6d/0x130\n[ 215.651834] aq_ring_free+0x193/0x290 [atlantic]\n[ 215.656487] aq_ptp_ring_free+0x67/0x110 [atlantic]\n...\n[ 216.127540] ---[ end trace 6467e5964dd2640b ]---\n[ 216.132160] DMA-API: Mapped at:\n[ 216.132162] debug_dma_alloc_coherent+0x66/0x2f0\n[ 216.132165] dma_alloc_attrs+0xf5/0x1b0\n[ 216.132168] aq_ring_hwts_rx_alloc+0x150/0x1f0 [atlantic]\n[ 216.132193] aq_ptp_ring_alloc+0x1bb/0x540 [atlantic]\n[ 216.132213] aq_nic_init+0x4a1/0x760 [atlantic]", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26680", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26680", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26680", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26680", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26680", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26680" + } + }, + "CVE-2024-26681": { + "affected_versions": "v6.0-rc1 to v6.8-rc4", + "breaks": "012ec02ae4410207f796a9b280a60b80b6cc790a", + "cmt_msg": "netdevsim: avoid potential loop in nsim_dev_trap_report_work()", + "fixes": "ba5e1272142d051dcc57ca1d3225ad8a089f9858", + "last_affected_version": "6.7.4", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetdevsim: avoid potential loop in nsim_dev_trap_report_work()\n\nMany syzbot reports include the following trace [1]\n\nIf nsim_dev_trap_report_work() can not grab the mutex,\nit should rearm itself at least one jiffie later.\n\n[1]\nSending NMI from CPU 1 to CPUs 0:\nNMI backtrace for cpu 0\nCPU: 0 PID: 32383 Comm: kworker/0:2 Not tainted 6.8.0-rc2-syzkaller-00031-g861c0981648f #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023\nWorkqueue: events nsim_dev_trap_report_work\n RIP: 0010:bytes_is_nonzero mm/kasan/generic.c:89 [inline]\n RIP: 0010:memory_is_nonzero mm/kasan/generic.c:104 [inline]\n RIP: 0010:memory_is_poisoned_n mm/kasan/generic.c:129 [inline]\n RIP: 0010:memory_is_poisoned mm/kasan/generic.c:161 [inline]\n RIP: 0010:check_region_inline mm/kasan/generic.c:180 [inline]\n RIP: 0010:kasan_check_range+0x101/0x190 mm/kasan/generic.c:189\nCode: 07 49 39 d1 75 0a 45 3a 11 b8 01 00 00 00 7c 0b 44 89 c2 e8 21 ed ff ff 83 f0 01 5b 5d 41 5c c3 48 85 d2 74 4f 48 01 ea eb 09 <48> 83 c0 01 48 39 d0 74 41 80 38 00 74 f2 eb b6 41 bc 08 00 00 00\nRSP: 0018:ffffc90012dcf998 EFLAGS: 00000046\nRAX: fffffbfff258af1e RBX: fffffbfff258af1f RCX: ffffffff8168eda3\nRDX: fffffbfff258af1f RSI: 0000000000000004 RDI: ffffffff92c578f0\nRBP: fffffbfff258af1e R08: 0000000000000000 R09: fffffbfff258af1e\nR10: ffffffff92c578f3 R11: ffffffff8acbcbc0 R12: 0000000000000002\nR13: ffff88806db38400 R14: 1ffff920025b9f42 R15: ffffffff92c578e8\nFS: 0000000000000000(0000) GS:ffff8880b9800000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 000000c00994e078 CR3: 000000002c250000 CR4: 00000000003506f0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n \n \n \n instrument_atomic_read include/linux/instrumented.h:68 [inline]\n atomic_read include/linux/atomic/atomic-instrumented.h:32 [inline]\n queued_spin_is_locked include/asm-generic/qspinlock.h:57 [inline]\n debug_spin_unlock kernel/locking/spinlock_debug.c:101 [inline]\n do_raw_spin_unlock+0x53/0x230 kernel/locking/spinlock_debug.c:141\n __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:150 [inline]\n _raw_spin_unlock_irqrestore+0x22/0x70 kernel/locking/spinlock.c:194\n debug_object_activate+0x349/0x540 lib/debugobjects.c:726\n debug_work_activate kernel/workqueue.c:578 [inline]\n insert_work+0x30/0x230 kernel/workqueue.c:1650\n __queue_work+0x62e/0x11d0 kernel/workqueue.c:1802\n __queue_delayed_work+0x1bf/0x270 kernel/workqueue.c:1953\n queue_delayed_work_on+0x106/0x130 kernel/workqueue.c:1989\n queue_delayed_work include/linux/workqueue.h:563 [inline]\n schedule_delayed_work include/linux/workqueue.h:677 [inline]\n nsim_dev_trap_report_work+0x9c0/0xc80 drivers/net/netdevsim/dev.c:842\n process_one_work+0x886/0x15d0 kernel/workqueue.c:2633\n process_scheduled_works kernel/workqueue.c:2706 [inline]\n worker_thread+0x8b9/0x1290 kernel/workqueue.c:2787\n kthread+0x2c6/0x3a0 kernel/kthread.c:388\n ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:147\n ret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:242\n ", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26681", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26681", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26681", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26681", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26681", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26681" + } + }, + "CVE-2024-26682": { + "affected_versions": "v6.7-rc1 to v6.8-rc4", + "breaks": "c09c4f31998bac6d73508e38812518aceb069b68", + "cmt_msg": "wifi: mac80211: improve CSA/ECSA connection refusal", + "fixes": "35e2385dbe787936c793d70755a5177d267a40aa", + "last_affected_version": "6.7.4", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: mac80211: improve CSA/ECSA connection refusal\n\nAs mentioned in the previous commit, we pretty quickly found\nthat some APs have ECSA elements stuck in their probe response,\nso using that to not attempt to connect while CSA is happening\nwe never connect to such an AP.\n\nImprove this situation by checking more carefully and ignoring\nthe ECSA if cfg80211 has previously detected the ECSA element\nbeing stuck in the probe response.\n\nAdditionally, allow connecting to an AP that's switching to a\nchannel it's already using, unless it's using quiet mode. In\nthis case, we may just have to adjust bandwidth later. If it's\nactually switching channels, it's better not to try to connect\nin the middle of that.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26682", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26682", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26682", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26682", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26682", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26682" + } + }, + "CVE-2024-26683": { + "affected_versions": "v6.7-rc1 to v6.8-rc4", + "breaks": "c09c4f31998bac6d73508e38812518aceb069b68", + "cmt_msg": "wifi: cfg80211: detect stuck ECSA element in probe resp", + "fixes": "177fbbcb4ed6b306c1626a277fac3fb1c495a4c7", + "last_affected_version": "6.7.4", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: cfg80211: detect stuck ECSA element in probe resp\n\nWe recently added some validation that we don't try to\nconnect to an AP that is currently in a channel switch\nprocess, since that might want the channel to be quiet\nor we might not be able to connect in time to hear the\nswitching in a beacon. This was in commit c09c4f31998b\n(\"wifi: mac80211: don't connect to an AP while it's in\na CSA process\").\n\nHowever, we promptly got a report that this caused new\nconnection failures, and it turns out that the AP that\nwe now cannot connect to is permanently advertising an\nextended channel switch announcement, even with quiet.\nThe AP in question was an Asus RT-AC53, with firmware\n3.0.0.4.380_10760-g21a5898.\n\nAs a first step, attempt to detect that we're dealing\nwith such a situation, so mac80211 can use this later.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26683", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26683", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26683", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26683", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26683", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26683" + } + }, + "CVE-2024-26684": { + "affected_versions": "v5.4-rc1 to v6.8-rc4", + "breaks": "56e58d6c8a5640eb708e85866e9d243d0357ee54", + "cmt_msg": "net: stmmac: xgmac: fix handling of DPP safety error for DMA channels", + "fixes": "46eba193d04f8bd717e525eb4110f3c46c12aec3", + "last_affected_version": "6.7.4", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: stmmac: xgmac: fix handling of DPP safety error for DMA channels\n\nCommit 56e58d6c8a56 (\"net: stmmac: Implement Safety Features in\nXGMAC core\") checks and reports safety errors, but leaves the\nData Path Parity Errors for each channel in DMA unhandled at all, lead to\na storm of interrupt.\nFix it by checking and clearing the DMA_DPP_Interrupt_Status register.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26684", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26684", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26684", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26684", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26684", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26684" + } + }, + "CVE-2024-26685": { + "affected_versions": "v3.12-rc4 to v6.8-rc4", + "breaks": "7f42ec3941560f0902fe3671e36f2c20ffd3af0a", + "cmt_msg": "nilfs2: fix potential bug in end_buffer_async_write", + "fixes": "5bc09b397cbf1221f8a8aacb1152650c9195b02b", + "last_affected_version": "6.7.5", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnilfs2: fix potential bug in end_buffer_async_write\n\nAccording to a syzbot report, end_buffer_async_write(), which handles the\ncompletion of block device writes, may detect abnormal condition of the\nbuffer async_write flag and cause a BUG_ON failure when using nilfs2.\n\nNilfs2 itself does not use end_buffer_async_write(). But, the async_write\nflag is now used as a marker by commit 7f42ec394156 (\"nilfs2: fix issue\nwith race condition of competition between segments for dirty blocks\") as\na means of resolving double list insertion of dirty blocks in\nnilfs_lookup_dirty_data_buffers() and nilfs_lookup_node_buffers() and the\nresulting crash.\n\nThis modification is safe as long as it is used for file data and b-tree\nnode blocks where the page caches are independent. However, it was\nirrelevant and redundant to also introduce async_write for segment summary\nand super root blocks that share buffers with the backing device. This\nled to the possibility that the BUG_ON check in end_buffer_async_write\nwould fail as described above, if independent writebacks of the backing\ndevice occurred in parallel.\n\nThe use of async_write for segment summary buffers has already been\nremoved in a previous change.\n\nFix this issue by removing the manipulation of the async_write flag for\nthe remaining super root block buffer.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26685", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26685", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26685", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26685", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26685", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26685" + } + }, + "CVE-2024-26686": { + "affected_versions": "v2.6.12-rc2 to v6.8-rc4", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "fs/proc: do_task_stat: use sig->stats_lock to gather the threads/children stats", + "fixes": "7601df8031fd67310af891897ef6cc0df4209305", + "last_affected_version": "6.7.5", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfs/proc: do_task_stat: use sig->stats_lock to gather the threads/children stats\n\nlock_task_sighand() can trigger a hard lockup. If NR_CPUS threads call\ndo_task_stat() at the same time and the process has NR_THREADS, it will\nspin with irqs disabled O(NR_CPUS * NR_THREADS) time.\n\nChange do_task_stat() to use sig->stats_lock to gather the statistics\noutside of ->siglock protected section, in the likely case this code will\nrun lockless.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26686", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26686", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26686", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26686", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26686", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26686" + } + }, + "CVE-2024-26687": { + "affected_versions": "v2.6.37-rc1 to v6.8-rc5", + "breaks": "d46a78b05c0e37f76ddf4a7a67bf0b6c68bada55", + "cmt_msg": "xen/events: close evtchn after mapping cleanup", + "fixes": "fa765c4b4aed2d64266b694520ecb025c862c5a9", + "last_affected_version": "6.7.5", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nxen/events: close evtchn after mapping cleanup\n\nshutdown_pirq and startup_pirq are not taking the\nirq_mapping_update_lock because they can't due to lock inversion. Both\nare called with the irq_desc->lock being taking. The lock order,\nhowever, is first irq_mapping_update_lock and then irq_desc->lock.\n\nThis opens multiple races:\n- shutdown_pirq can be interrupted by a function that allocates an event\n channel:\n\n CPU0 CPU1\n shutdown_pirq {\n xen_evtchn_close(e)\n __startup_pirq {\n EVTCHNOP_bind_pirq\n -> returns just freed evtchn e\n set_evtchn_to_irq(e, irq)\n }\n xen_irq_info_cleanup() {\n set_evtchn_to_irq(e, -1)\n }\n }\n\n Assume here event channel e refers here to the same event channel\n number.\n After this race the evtchn_to_irq mapping for e is invalid (-1).\n\n- __startup_pirq races with __unbind_from_irq in a similar way. Because\n __startup_pirq doesn't take irq_mapping_update_lock it can grab the\n evtchn that __unbind_from_irq is currently freeing and cleaning up. In\n this case even though the event channel is allocated, its mapping can\n be unset in evtchn_to_irq.\n\nThe fix is to first cleanup the mappings and then close the event\nchannel. In this way, when an event channel gets allocated it's\npotential previous evtchn_to_irq mappings are guaranteed to be unset already.\nThis is also the reverse order of the allocation where first the event\nchannel is allocated and then the mappings are setup.\n\nOn a 5.10 kernel prior to commit 3fcdaf3d7634 (\"xen/events: modify internal\n[un]bind interfaces\"), we hit a BUG like the following during probing of NVMe\ndevices. The issue is that during nvme_setup_io_queues, pci_free_irq\nis called for every device which results in a call to shutdown_pirq.\nWith many nvme devices it's therefore likely to hit this race during\nboot because there will be multiple calls to shutdown_pirq and\nstartup_pirq are running potentially in parallel.\n\n ------------[ cut here ]------------\n blkfront: xvda: barrier or flush: disabled; persistent grants: enabled; indirect descriptors: enabled; bounce buffer: enabled\n kernel BUG at drivers/xen/events/events_base.c:499!\n invalid opcode: 0000 [#1] SMP PTI\n CPU: 44 PID: 375 Comm: kworker/u257:23 Not tainted 5.10.201-191.748.amzn2.x86_64 #1\n Hardware name: Xen HVM domU, BIOS 4.11.amazon 08/24/2006\n Workqueue: nvme-reset-wq nvme_reset_work\n RIP: 0010:bind_evtchn_to_cpu+0xdf/0xf0\n Code: 5d 41 5e c3 cc cc cc cc 44 89 f7 e8 2b 55 ad ff 49 89 c5 48 85 c0 0f 84 64 ff ff ff 4c 8b 68 30 41 83 fe ff 0f 85 60 ff ff ff <0f> 0b 66 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 0f 1f 44 00 00\n RSP: 0000:ffffc9000d533b08 EFLAGS: 00010046\n RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000006\n RDX: 0000000000000028 RSI: 00000000ffffffff RDI: 00000000ffffffff\n RBP: ffff888107419680 R08: 0000000000000000 R09: ffffffff82d72b00\n R10: 0000000000000000 R11: 0000000000000000 R12: 00000000000001ed\n R13: 0000000000000000 R14: 00000000ffffffff R15: 0000000000000002\n FS: 0000000000000000(0000) GS:ffff88bc8b500000(0000) knlGS:0000000000000000\n CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 0000000000000000 CR3: 0000000002610001 CR4: 00000000001706e0\n DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n Call Trace:\n ? show_trace_log_lvl+0x1c1/0x2d9\n ? show_trace_log_lvl+0x1c1/0x2d9\n ? set_affinity_irq+0xdc/0x1c0\n ? __die_body.cold+0x8/0xd\n ? die+0x2b/0x50\n ? do_trap+0x90/0x110\n ? bind_evtchn_to_cpu+0xdf/0xf0\n ? do_error_trap+0x65/0x80\n ? bind_evtchn_to_cpu+0xdf/0xf0\n ? exc_invalid_op+0x4e/0x70\n ? bind_evtchn_to_cpu+0xdf/0xf0\n ? asm_exc_invalid_op+0x12/0x20\n ? bind_evtchn_to_cpu+0xdf/0x\n---truncated---", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26687", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26687", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26687", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26687", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26687", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26687" + } + }, + "CVE-2024-26688": { + "affected_versions": "v5.1-rc1 to v6.8-rc4", + "breaks": "32021982a324dce93b4ae00c06213bf45fb319c8", + "cmt_msg": "fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super", + "fixes": "79d72c68c58784a3e1cd2378669d51bfd0cb7498", + "last_affected_version": "6.7.5", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super\n\nWhen configuring a hugetlb filesystem via the fsconfig() syscall, there is\na possible NULL dereference in hugetlbfs_fill_super() caused by assigning\nNULL to ctx->hstate in hugetlbfs_parse_param() when the requested pagesize\nis non valid.\n\nE.g: Taking the following steps:\n\n fd = fsopen(\"hugetlbfs\", FSOPEN_CLOEXEC);\n fsconfig(fd, FSCONFIG_SET_STRING, \"pagesize\", \"1024\", 0);\n fsconfig(fd, FSCONFIG_CMD_CREATE, NULL, NULL, 0);\n\nGiven that the requested \"pagesize\" is invalid, ctxt->hstate will be replaced\nwith NULL, losing its previous value, and we will print an error:\n\n ...\n ...\n case Opt_pagesize:\n ps = memparse(param->string, &rest);\n ctx->hstate = h;\n if (!ctx->hstate) {\n pr_err(\"Unsupported page size %lu MB\\n\", ps / SZ_1M);\n return -EINVAL;\n }\n return 0;\n ...\n ...\n\nThis is a problem because later on, we will dereference ctxt->hstate in\nhugetlbfs_fill_super()\n\n ...\n ...\n sb->s_blocksize = huge_page_size(ctx->hstate);\n ...\n ...\n\nCausing below Oops.\n\nFix this by replacing cxt->hstate value only when then pagesize is known\nto be valid.\n\n kernel: hugetlbfs: Unsupported page size 0 MB\n kernel: BUG: kernel NULL pointer dereference, address: 0000000000000028\n kernel: #PF: supervisor read access in kernel mode\n kernel: #PF: error_code(0x0000) - not-present page\n kernel: PGD 800000010f66c067 P4D 800000010f66c067 PUD 1b22f8067 PMD 0\n kernel: Oops: 0000 [#1] PREEMPT SMP PTI\n kernel: CPU: 4 PID: 5659 Comm: syscall Tainted: G E 6.8.0-rc2-default+ #22 5a47c3fef76212addcc6eb71344aabc35190ae8f\n kernel: Hardware name: Intel Corp. GROVEPORT/GROVEPORT, BIOS GVPRCRB1.86B.0016.D04.1705030402 05/03/2017\n kernel: RIP: 0010:hugetlbfs_fill_super+0xb4/0x1a0\n kernel: Code: 48 8b 3b e8 3e c6 ed ff 48 85 c0 48 89 45 20 0f 84 d6 00 00 00 48 b8 ff ff ff ff ff ff ff 7f 4c 89 e7 49 89 44 24 20 48 8b 03 <8b> 48 28 b8 00 10 00 00 48 d3 e0 49 89 44 24 18 48 8b 03 8b 40 28\n kernel: RSP: 0018:ffffbe9960fcbd48 EFLAGS: 00010246\n kernel: RAX: 0000000000000000 RBX: ffff9af5272ae780 RCX: 0000000000372004\n kernel: RDX: ffffffffffffffff RSI: ffffffffffffffff RDI: ffff9af555e9b000\n kernel: RBP: ffff9af52ee66b00 R08: 0000000000000040 R09: 0000000000370004\n kernel: R10: ffffbe9960fcbd48 R11: 0000000000000040 R12: ffff9af555e9b000\n kernel: R13: ffffffffa66b86c0 R14: ffff9af507d2f400 R15: ffff9af507d2f400\n kernel: FS: 00007ffbc0ba4740(0000) GS:ffff9b0bd7000000(0000) knlGS:0000000000000000\n kernel: CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n kernel: CR2: 0000000000000028 CR3: 00000001b1ee0000 CR4: 00000000001506f0\n kernel: Call Trace:\n kernel: \n kernel: ? __die_body+0x1a/0x60\n kernel: ? page_fault_oops+0x16f/0x4a0\n kernel: ? search_bpf_extables+0x65/0x70\n kernel: ? fixup_exception+0x22/0x310\n kernel: ? exc_page_fault+0x69/0x150\n kernel: ? asm_exc_page_fault+0x22/0x30\n kernel: ? __pfx_hugetlbfs_fill_super+0x10/0x10\n kernel: ? hugetlbfs_fill_super+0xb4/0x1a0\n kernel: ? hugetlbfs_fill_super+0x28/0x1a0\n kernel: ? __pfx_hugetlbfs_fill_super+0x10/0x10\n kernel: vfs_get_super+0x40/0xa0\n kernel: ? __pfx_bpf_lsm_capable+0x10/0x10\n kernel: vfs_get_tree+0x25/0xd0\n kernel: vfs_cmd_create+0x64/0xe0\n kernel: __x64_sys_fsconfig+0x395/0x410\n kernel: do_syscall_64+0x80/0x160\n kernel: ? syscall_exit_to_user_mode+0x82/0x240\n kernel: ? do_syscall_64+0x8d/0x160\n kernel: ? syscall_exit_to_user_mode+0x82/0x240\n kernel: ? do_syscall_64+0x8d/0x160\n kernel: ? exc_page_fault+0x69/0x150\n kernel: entry_SYSCALL_64_after_hwframe+0x6e/0x76\n kernel: RIP: 0033:0x7ffbc0cb87c9\n kernel: Code: 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 97 96 0d 00 f7 d8 64 89 01 48\n kernel: RSP: 002b:00007ffc29d2f388 EFLAGS: 00000206 ORIG_RAX: 00000000000001af\n kernel: RAX: fffffffffff\n---truncated---", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26688", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26688", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26688", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26688", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26688", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26688" + } + }, + "CVE-2024-26689": { + "affected_versions": "v2.6.12-rc2 to v6.8-rc4", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "ceph: prevent use-after-free in encode_cap_msg()", + "fixes": "cda4672da1c26835dcbd7aec2bfed954eda9b5ef", + "last_affected_version": "6.7.5", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nceph: prevent use-after-free in encode_cap_msg()\n\nIn fs/ceph/caps.c, in encode_cap_msg(), \"use after free\" error was\ncaught by KASAN at this line - 'ceph_buffer_get(arg->xattr_buf);'. This\nimplies before the refcount could be increment here, it was freed.\n\nIn same file, in \"handle_cap_grant()\" refcount is decremented by this\nline - 'ceph_buffer_put(ci->i_xattrs.blob);'. It appears that a race\noccurred and resource was freed by the latter line before the former\nline could increment it.\n\nencode_cap_msg() is called by __send_cap() and __send_cap() is called by\nceph_check_caps() after calling __prep_cap(). __prep_cap() is where\narg->xattr_buf is assigned to ci->i_xattrs.blob. This is the spot where\nthe refcount must be increased to prevent \"use after free\" error.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26689", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26689", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26689", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26689", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26689", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26689" + } + }, + "CVE-2024-26690": { + "affected_versions": "v6.6-rc1 to v6.8-rc4", + "breaks": "133466c3bbe171f826294161db203f7670bb30c8", + "cmt_msg": "net: stmmac: protect updates of 64-bit statistics counters", + "fixes": "38cc3c6dcc09dc3a1800b5ec22aef643ca11eab8", + "last_affected_version": "6.7.5", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: stmmac: protect updates of 64-bit statistics counters\n\nAs explained by a comment in , write side of struct\nu64_stats_sync must ensure mutual exclusion, or one seqcount update could\nbe lost on 32-bit platforms, thus blocking readers forever. Such lockups\nhave been observed in real world after stmmac_xmit() on one CPU raced with\nstmmac_napi_poll_tx() on another CPU.\n\nTo fix the issue without introducing a new lock, split the statics into\nthree parts:\n\n1. fields updated only under the tx queue lock,\n2. fields updated only during NAPI poll,\n3. fields updated only from interrupt context,\n\nUpdates to fields in the first two groups are already serialized through\nother locks. It is sufficient to split the existing struct u64_stats_sync\nso that each group has its own.\n\nNote that tx_set_ic_bit is updated from both contexts. Split this counter\nso that each context gets its own, and calculate their sum to get the total\nvalue in stmmac_get_ethtool_stats().\n\nFor the third group, multiple interrupts may be processed by different CPUs\nat the same time, but interrupts on the same CPU will not nest. Move fields\nfrom this group to a newly created per-cpu struct stmmac_pcpu_stats.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26690", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26690", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26690", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26690", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26690", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26690" + } + }, + "CVE-2024-26691": { + "affected_versions": "unk to v6.8-rc5", + "breaks": "", + "cmt_msg": "KVM: arm64: Fix circular locking dependency", + "fixes": "10c02aad111df02088d1a81792a709f6a7eca6cc", + "last_affected_version": "6.7.5", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: arm64: Fix circular locking dependency\n\nThe rule inside kvm enforces that the vcpu->mutex is taken *inside*\nkvm->lock. The rule is violated by the pkvm_create_hyp_vm() which acquires\nthe kvm->lock while already holding the vcpu->mutex lock from\nkvm_vcpu_ioctl(). Avoid the circular locking dependency altogether by\nprotecting the hyp vm handle with the config_lock, much like we already\ndo for other forms of VM-scoped data.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26691", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26691", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26691", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26691", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26691", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26691" + } + }, + "CVE-2024-26692": { + "affected_versions": "v6.3-rc1 to v6.8-rc5", + "breaks": "d08089f649a0cfb2099c8551ac47eef0cc23fdf2", + "cmt_msg": "smb: Fix regression in writes when non-standard maximum write size negotiated", + "fixes": "4860abb91f3d7fbaf8147d54782149bb1fc45892", + "last_affected_version": "6.7.5", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb: Fix regression in writes when non-standard maximum write size negotiated\n\nThe conversion to netfs in the 6.3 kernel caused a regression when\nmaximum write size is set by the server to an unexpected value which is\nnot a multiple of 4096 (similarly if the user overrides the maximum\nwrite size by setting mount parm \"wsize\", but sets it to a value that\nis not a multiple of 4096). When negotiated write size is not a\nmultiple of 4096 the netfs code can skip the end of the final\npage when doing large sequential writes, causing data corruption.\n\nThis section of code is being rewritten/removed due to a large\nnetfs change, but until that point (ie for the 6.3 kernel until now)\nwe can not support non-standard maximum write sizes.\n\nAdd a warning if a user specifies a wsize on mount that is not\na multiple of 4096 (and round down), also add a change where we\nround down the maximum write size if the server negotiates a value\nthat is not a multiple of 4096 (we also have to check to make sure that\nwe do not round it down to zero).", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26692", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26692", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26692", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26692", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26692", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26692" + } + }, + "CVE-2024-26693": { + "affected_versions": "v6.4-rc1 to v6.8-rc5", + "breaks": "57974a55d995468a9a476e24693eb741c649b25f", + "cmt_msg": "wifi: iwlwifi: mvm: fix a crash when we run out of stations", + "fixes": "b7198383ef2debe748118996f627452281cf27d7", + "last_affected_version": "6.7.5", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: iwlwifi: mvm: fix a crash when we run out of stations\n\nA DoS tool that injects loads of authentication frames made our AP\ncrash. The iwl_mvm_is_dup() function couldn't find the per-queue\ndup_data which was not allocated.\n\nThe root cause for that is that we ran out of stations in the firmware\nand we didn't really add the station to the firmware, yet we didn't\nreturn an error to mac80211.\nMac80211 was thinking that we have the station and because of that,\nsta_info::uploaded was set to 1. This allowed\nieee80211_find_sta_by_ifaddr() to return a valid station object, but\nthat ieee80211_sta didn't have any iwl_mvm_sta object initialized and\nthat caused the crash mentioned earlier when we got Rx on that station.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26693", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26693", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26693", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26693", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26693", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26693" + } + }, + "CVE-2024-26694": { + "affected_versions": "v6.4-rc1 to v6.8-rc4", + "breaks": "5e31b3df86ec6fbb925eee77fe2c450099c61dff", + "cmt_msg": "wifi: iwlwifi: fix double-free bug", + "fixes": "353d321f63f7dbfc9ef58498cc732c9fe886a596", + "last_affected_version": "6.7.5", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: iwlwifi: fix double-free bug\n\nThe storage for the TLV PC register data wasn't done like all\nthe other storage in the drv->fw area, which is cleared at the\nend of deallocation. Therefore, the freeing must also be done\ndifferently, explicitly NULL'ing it out after the free, since\notherwise there's a nasty double-free bug here if a file fails\nto load after this has been parsed, and we get another free\nlater (e.g. because no other file exists.) Fix that by adding\nthe missing NULL assignment.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26694", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26694", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26694", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26694", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26694", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26694" + } + }, + "CVE-2024-26695": { + "affected_versions": "v6.0-rc1 to v6.8-rc4", + "breaks": "1b05ece0c931536c0a38a9385e243a7962e933f6", + "cmt_msg": "crypto: ccp - Fix null pointer dereference in __sev_platform_shutdown_locked", + "fixes": "ccb88e9549e7cfd8bcd511c538f437e20026e983", + "last_affected_version": "6.7.5", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: ccp - Fix null pointer dereference in __sev_platform_shutdown_locked\n\nThe SEV platform device can be shutdown with a null psp_master,\ne.g., using DEBUG_TEST_DRIVER_REMOVE. Found using KASAN:\n\n[ 137.148210] ccp 0000:23:00.1: enabling device (0000 -> 0002)\n[ 137.162647] ccp 0000:23:00.1: no command queues available\n[ 137.170598] ccp 0000:23:00.1: sev enabled\n[ 137.174645] ccp 0000:23:00.1: psp enabled\n[ 137.178890] general protection fault, probably for non-canonical address 0xdffffc000000001e: 0000 [#1] PREEMPT SMP DEBUG_PAGEALLOC KASAN NOPTI\n[ 137.182693] KASAN: null-ptr-deref in range [0x00000000000000f0-0x00000000000000f7]\n[ 137.182693] CPU: 93 PID: 1 Comm: swapper/0 Not tainted 6.8.0-rc1+ #311\n[ 137.182693] RIP: 0010:__sev_platform_shutdown_locked+0x51/0x180\n[ 137.182693] Code: 08 80 3c 08 00 0f 85 0e 01 00 00 48 8b 1d 67 b6 01 08 48 b8 00 00 00 00 00 fc ff df 48 8d bb f0 00 00 00 48 89 f9 48 c1 e9 03 <80> 3c 01 00 0f 85 fe 00 00 00 48 8b 9b f0 00 00 00 48 85 db 74 2c\n[ 137.182693] RSP: 0018:ffffc900000cf9b0 EFLAGS: 00010216\n[ 137.182693] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: 000000000000001e\n[ 137.182693] RDX: 0000000000000000 RSI: 0000000000000008 RDI: 00000000000000f0\n[ 137.182693] RBP: ffffc900000cf9c8 R08: 0000000000000000 R09: fffffbfff58f5a66\n[ 137.182693] R10: ffffc900000cf9c8 R11: ffffffffac7ad32f R12: ffff8881e5052c28\n[ 137.182693] R13: ffff8881e5052c28 R14: ffff8881758e43e8 R15: ffffffffac64abf8\n[ 137.182693] FS: 0000000000000000(0000) GS:ffff889de7000000(0000) knlGS:0000000000000000\n[ 137.182693] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 137.182693] CR2: 0000000000000000 CR3: 0000001cf7c7e000 CR4: 0000000000350ef0\n[ 137.182693] Call Trace:\n[ 137.182693] \n[ 137.182693] ? show_regs+0x6c/0x80\n[ 137.182693] ? __die_body+0x24/0x70\n[ 137.182693] ? die_addr+0x4b/0x80\n[ 137.182693] ? exc_general_protection+0x126/0x230\n[ 137.182693] ? asm_exc_general_protection+0x2b/0x30\n[ 137.182693] ? __sev_platform_shutdown_locked+0x51/0x180\n[ 137.182693] sev_firmware_shutdown.isra.0+0x1e/0x80\n[ 137.182693] sev_dev_destroy+0x49/0x100\n[ 137.182693] psp_dev_destroy+0x47/0xb0\n[ 137.182693] sp_destroy+0xbb/0x240\n[ 137.182693] sp_pci_remove+0x45/0x60\n[ 137.182693] pci_device_remove+0xaa/0x1d0\n[ 137.182693] device_remove+0xc7/0x170\n[ 137.182693] really_probe+0x374/0xbe0\n[ 137.182693] ? srso_return_thunk+0x5/0x5f\n[ 137.182693] __driver_probe_device+0x199/0x460\n[ 137.182693] driver_probe_device+0x4e/0xd0\n[ 137.182693] __driver_attach+0x191/0x3d0\n[ 137.182693] ? __pfx___driver_attach+0x10/0x10\n[ 137.182693] bus_for_each_dev+0x100/0x190\n[ 137.182693] ? __pfx_bus_for_each_dev+0x10/0x10\n[ 137.182693] ? __kasan_check_read+0x15/0x20\n[ 137.182693] ? srso_return_thunk+0x5/0x5f\n[ 137.182693] ? _raw_spin_unlock+0x27/0x50\n[ 137.182693] driver_attach+0x41/0x60\n[ 137.182693] bus_add_driver+0x2a8/0x580\n[ 137.182693] driver_register+0x141/0x480\n[ 137.182693] __pci_register_driver+0x1d6/0x2a0\n[ 137.182693] ? srso_return_thunk+0x5/0x5f\n[ 137.182693] ? esrt_sysfs_init+0x1cd/0x5d0\n[ 137.182693] ? __pfx_sp_mod_init+0x10/0x10\n[ 137.182693] sp_pci_init+0x22/0x30\n[ 137.182693] sp_mod_init+0x14/0x30\n[ 137.182693] ? __pfx_sp_mod_init+0x10/0x10\n[ 137.182693] do_one_initcall+0xd1/0x470\n[ 137.182693] ? __pfx_do_one_initcall+0x10/0x10\n[ 137.182693] ? parameq+0x80/0xf0\n[ 137.182693] ? srso_return_thunk+0x5/0x5f\n[ 137.182693] ? __kmalloc+0x3b0/0x4e0\n[ 137.182693] ? kernel_init_freeable+0x92d/0x1050\n[ 137.182693] ? kasan_populate_vmalloc_pte+0x171/0x190\n[ 137.182693] ? srso_return_thunk+0x5/0x5f\n[ 137.182693] kernel_init_freeable+0xa64/0x1050\n[ 137.182693] ? __pfx_kernel_init+0x10/0x10\n[ 137.182693] kernel_init+0x24/0x160\n[ 137.182693] ? __switch_to_asm+0x3e/0x70\n[ 137.182693] ret_from_fork+0x40/0x80\n[ 137.182693] ? __pfx_kernel_init+0x1\n---truncated---", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26695", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26695", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26695", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26695", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26695", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26695" + } + }, + "CVE-2024-26696": { + "affected_versions": "v3.9-rc1 to v6.8-rc4", + "breaks": "1d1d1a767206fbe5d4c69493b7e6d2a8d08cc0a0", + "cmt_msg": "nilfs2: fix hang in nilfs_lookup_dirty_data_buffers()", + "fixes": "38296afe3c6ee07319e01bb249aa4bb47c07b534", + "last_affected_version": "6.7.5", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnilfs2: fix hang in nilfs_lookup_dirty_data_buffers()\n\nSyzbot reported a hang issue in migrate_pages_batch() called by mbind()\nand nilfs_lookup_dirty_data_buffers() called in the log writer of nilfs2.\n\nWhile migrate_pages_batch() locks a folio and waits for the writeback to\ncomplete, the log writer thread that should bring the writeback to\ncompletion picks up the folio being written back in\nnilfs_lookup_dirty_data_buffers() that it calls for subsequent log\ncreation and was trying to lock the folio. Thus causing a deadlock.\n\nIn the first place, it is unexpected that folios/pages in the middle of\nwriteback will be updated and become dirty. Nilfs2 adds a checksum to\nverify the validity of the log being written and uses it for recovery at\nmount, so data changes during writeback are suppressed. Since this is\nbroken, an unclean shutdown could potentially cause recovery to fail.\n\nInvestigation revealed that the root cause is that the wait for writeback\ncompletion in nilfs_page_mkwrite() is conditional, and if the backing\ndevice does not require stable writes, data may be modified without\nwaiting.\n\nFix these issues by making nilfs_page_mkwrite() wait for writeback to\nfinish regardless of the stable write requirement of the backing device.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26696", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26696", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26696", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26696", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26696", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26696" + } + }, + "CVE-2024-26697": { + "affected_versions": "v2.6.12-rc2 to v6.8-rc4", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "nilfs2: fix data corruption in dsync block recovery for small block sizes", + "fixes": "67b8bcbaed4777871bb0dcc888fb02a614a98ab1", + "last_affected_version": "6.7.5", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnilfs2: fix data corruption in dsync block recovery for small block sizes\n\nThe helper function nilfs_recovery_copy_block() of\nnilfs_recovery_dsync_blocks(), which recovers data from logs created by\ndata sync writes during a mount after an unclean shutdown, incorrectly\ncalculates the on-page offset when copying repair data to the file's page\ncache. In environments where the block size is smaller than the page\nsize, this flaw can cause data corruption and leak uninitialized memory\nbytes during the recovery process.\n\nFix these issues by correcting this byte offset calculation on the page.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26697", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26697", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26697", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26697", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26697", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26697" + } + }, + "CVE-2024-26698": { + "affected_versions": "v5.8-rc1 to v6.8-rc3", + "breaks": "ac5047671758ad4be9f93898247b3a8b6dfde4c7", + "cmt_msg": "hv_netvsc: Fix race condition between netvsc_probe and netvsc_remove", + "fixes": "e0526ec5360a48ad3ab2e26e802b0532302a7e11", + "last_affected_version": "6.7.5", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nhv_netvsc: Fix race condition between netvsc_probe and netvsc_remove\n\nIn commit ac5047671758 (\"hv_netvsc: Disable NAPI before closing the\nVMBus channel\"), napi_disable was getting called for all channels,\nincluding all subchannels without confirming if they are enabled or not.\n\nThis caused hv_netvsc getting hung at napi_disable, when netvsc_probe()\nhas finished running but nvdev->subchan_work has not started yet.\nnetvsc_subchan_work() -> rndis_set_subchannel() has not created the\nsub-channels and because of that netvsc_sc_open() is not running.\nnetvsc_remove() calls cancel_work_sync(&nvdev->subchan_work), for which\nnetvsc_subchan_work did not run.\n\nnetif_napi_add() sets the bit NAPI_STATE_SCHED because it ensures NAPI\ncannot be scheduled. Then netvsc_sc_open() -> napi_enable will clear the\nNAPIF_STATE_SCHED bit, so it can be scheduled. napi_disable() does the\nopposite.\n\nNow during netvsc_device_remove(), when napi_disable is called for those\nsubchannels, napi_disable gets stuck on infinite msleep.\n\nThis fix addresses this problem by ensuring that napi_disable() is not\ngetting called for non-enabled NAPI struct.\nBut netif_napi_del() is still necessary for these non-enabled NAPI struct\nfor cleanup purpose.\n\nCall trace:\n[ 654.559417] task:modprobe state:D stack: 0 pid: 2321 ppid: 1091 flags:0x00004002\n[ 654.568030] Call Trace:\n[ 654.571221] \n[ 654.573790] __schedule+0x2d6/0x960\n[ 654.577733] schedule+0x69/0xf0\n[ 654.581214] schedule_timeout+0x87/0x140\n[ 654.585463] ? __bpf_trace_tick_stop+0x20/0x20\n[ 654.590291] msleep+0x2d/0x40\n[ 654.593625] napi_disable+0x2b/0x80\n[ 654.597437] netvsc_device_remove+0x8a/0x1f0 [hv_netvsc]\n[ 654.603935] rndis_filter_device_remove+0x194/0x1c0 [hv_netvsc]\n[ 654.611101] ? do_wait_intr+0xb0/0xb0\n[ 654.615753] netvsc_remove+0x7c/0x120 [hv_netvsc]\n[ 654.621675] vmbus_remove+0x27/0x40 [hv_vmbus]", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26698", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26698", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26698", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26698", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26698", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26698" + } + }, + "CVE-2024-26699": { + "affected_versions": "v2.6.12-rc2 to v6.8-rc5", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "drm/amd/display: Fix array-index-out-of-bounds in dcn35_clkmgr", + "fixes": "46806e59a87790760870d216f54951a5b4d545bc", + "last_affected_version": "6.7.5", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Fix array-index-out-of-bounds in dcn35_clkmgr\n\n[Why]\nThere is a potential memory access violation while\niterating through array of dcn35 clks.\n\n[How]\nLimit iteration per array size.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26699", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26699", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26699", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26699", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26699", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26699" + } + }, + "CVE-2024-26700": { + "affected_versions": "v2.6.12-rc2 to v6.8-rc4", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "drm/amd/display: Fix MST Null Ptr for RV", + "fixes": "e6a7df96facdcf5b1f71eb3ec26f2f9f6ad61e57", + "last_affected_version": "6.7.5", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Fix MST Null Ptr for RV\n\nThe change try to fix below error specific to RV platform:\n\nBUG: kernel NULL pointer dereference, address: 0000000000000008\nPGD 0 P4D 0\nOops: 0000 [#1] PREEMPT SMP NOPTI\nCPU: 4 PID: 917 Comm: sway Not tainted 6.3.9-arch1-1 #1 124dc55df4f5272ccb409f39ef4872fc2b3376a2\nHardware name: LENOVO 20NKS01Y00/20NKS01Y00, BIOS R12ET61W(1.31 ) 07/28/2022\nRIP: 0010:drm_dp_atomic_find_time_slots+0x5e/0x260 [drm_display_helper]\nCode: 01 00 00 48 8b 85 60 05 00 00 48 63 80 88 00 00 00 3b 43 28 0f 8d 2e 01 00 00 48 8b 53 30 48 8d 04 80 48 8d 04 c2 48 8b 40 18 <48> 8>\nRSP: 0018:ffff960cc2df77d8 EFLAGS: 00010293\nRAX: 0000000000000000 RBX: ffff8afb87e81280 RCX: 0000000000000224\nRDX: ffff8afb9ee37c00 RSI: ffff8afb8da1a578 RDI: ffff8afb87e81280\nRBP: ffff8afb83d67000 R08: 0000000000000001 R09: ffff8afb9652f850\nR10: ffff960cc2df7908 R11: 0000000000000002 R12: 0000000000000000\nR13: ffff8afb8d7688a0 R14: ffff8afb8da1a578 R15: 0000000000000224\nFS: 00007f4dac35ce00(0000) GS:ffff8afe30b00000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000000000000008 CR3: 000000010ddc6000 CR4: 00000000003506e0\nCall Trace:\n \n ? __die+0x23/0x70\n ? page_fault_oops+0x171/0x4e0\n ? plist_add+0xbe/0x100\n ? exc_page_fault+0x7c/0x180\n ? asm_exc_page_fault+0x26/0x30\n ? drm_dp_atomic_find_time_slots+0x5e/0x260 [drm_display_helper 0e67723696438d8e02b741593dd50d80b44c2026]\n ? drm_dp_atomic_find_time_slots+0x28/0x260 [drm_display_helper 0e67723696438d8e02b741593dd50d80b44c2026]\n compute_mst_dsc_configs_for_link+0x2ff/0xa40 [amdgpu 62e600d2a75e9158e1cd0a243bdc8e6da040c054]\n ? fill_plane_buffer_attributes+0x419/0x510 [amdgpu 62e600d2a75e9158e1cd0a243bdc8e6da040c054]\n compute_mst_dsc_configs_for_state+0x1e1/0x250 [amdgpu 62e600d2a75e9158e1cd0a243bdc8e6da040c054]\n amdgpu_dm_atomic_check+0xecd/0x1190 [amdgpu 62e600d2a75e9158e1cd0a243bdc8e6da040c054]\n drm_atomic_check_only+0x5c5/0xa40\n drm_mode_atomic_ioctl+0x76e/0xbc0\n ? _copy_to_user+0x25/0x30\n ? drm_ioctl+0x296/0x4b0\n ? __pfx_drm_mode_atomic_ioctl+0x10/0x10\n drm_ioctl_kernel+0xcd/0x170\n drm_ioctl+0x26d/0x4b0\n ? __pfx_drm_mode_atomic_ioctl+0x10/0x10\n amdgpu_drm_ioctl+0x4e/0x90 [amdgpu 62e600d2a75e9158e1cd0a243bdc8e6da040c054]\n __x64_sys_ioctl+0x94/0xd0\n do_syscall_64+0x60/0x90\n ? do_syscall_64+0x6c/0x90\n entry_SYSCALL_64_after_hwframe+0x72/0xdc\nRIP: 0033:0x7f4dad17f76f\nCode: 00 48 89 44 24 18 31 c0 48 8d 44 24 60 c7 04 24 10 00 00 00 48 89 44 24 08 48 8d 44 24 20 48 89 44 24 10 b8 10 00 00 00 0f 05 <89> c>\nRSP: 002b:00007ffd9ae859f0 EFLAGS: 00000246 ORIG_RAX: 0000000000000010\nRAX: ffffffffffffffda RBX: 000055e255a55900 RCX: 00007f4dad17f76f\nRDX: 00007ffd9ae85a90 RSI: 00000000c03864bc RDI: 000000000000000b\nRBP: 00007ffd9ae85a90 R08: 0000000000000003 R09: 0000000000000003\nR10: 0000000000000000 R11: 0000000000000246 R12: 00000000c03864bc\nR13: 000000000000000b R14: 000055e255a7fc60 R15: 000055e255a01eb0\n \nModules linked in: rfcomm snd_seq_dummy snd_hrtimer snd_seq snd_seq_device ccm cmac algif_hash algif_skcipher af_alg joydev mousedev bnep >\n typec libphy k10temp ipmi_msghandler roles i2c_scmi acpi_cpufreq mac_hid nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_mas>\nCR2: 0000000000000008\n---[ end trace 0000000000000000 ]---\nRIP: 0010:drm_dp_atomic_find_time_slots+0x5e/0x260 [drm_display_helper]\nCode: 01 00 00 48 8b 85 60 05 00 00 48 63 80 88 00 00 00 3b 43 28 0f 8d 2e 01 00 00 48 8b 53 30 48 8d 04 80 48 8d 04 c2 48 8b 40 18 <48> 8>\nRSP: 0018:ffff960cc2df77d8 EFLAGS: 00010293\nRAX: 0000000000000000 RBX: ffff8afb87e81280 RCX: 0000000000000224\nRDX: ffff8afb9ee37c00 RSI: ffff8afb8da1a578 RDI: ffff8afb87e81280\nRBP: ffff8afb83d67000 R08: 0000000000000001 R09: ffff8afb9652f850\nR10: ffff960cc2df7908 R11: 0000000000000002 R12: 0000000000000000\nR13: ffff8afb8d7688a0 R14: ffff8afb8da1a578 R15: 0000000000000224\nFS: 00007f4dac35ce00(0000) GS:ffff8afe30b00000(0000\n---truncated---", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26700", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26700", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26700", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26700", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26700", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26700" + } + }, + "CVE-2024-26702": { + "affected_versions": "v5.0-rc1 to v6.8-rc5", + "breaks": "121354b2eceb2669ebdffa76b105ad6c03413966", + "cmt_msg": "iio: magnetometer: rm3100: add boundary check for the value read from RM3100_REG_TMRC", + "fixes": "792595bab4925aa06532a14dd256db523eb4fa5e", + "last_affected_version": "6.7.5", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\niio: magnetometer: rm3100: add boundary check for the value read from RM3100_REG_TMRC\n\nRecently, we encounter kernel crash in function rm3100_common_probe\ncaused by out of bound access of array rm3100_samp_rates (because of\nunderlying hardware failures). Add boundary check to prevent out of\nbound access.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26702", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26702", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26702", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26702", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26702", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26702" + } + }, + "CVE-2024-26703": { + "affected_versions": "v6.5-rc1 to v6.8-rc3", + "breaks": "e88ed227f639ebcb31ed4e5b88756b47d904584b", + "cmt_msg": "tracing/timerlat: Move hrtimer_init to timerlat_fd open()", + "fixes": "1389358bb008e7625942846e9f03554319b7fecc", + "last_affected_version": "6.7.5", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntracing/timerlat: Move hrtimer_init to timerlat_fd open()\n\nCurrently, the timerlat's hrtimer is initialized at the first read of\ntimerlat_fd, and destroyed at close(). It works, but it causes an error\nif the user program open() and close() the file without reading.\n\nHere's an example:\n\n # echo NO_OSNOISE_WORKLOAD > /sys/kernel/debug/tracing/osnoise/options\n # echo timerlat > /sys/kernel/debug/tracing/current_tracer\n\n # cat < ./timerlat_load.py\n # !/usr/bin/env python3\n\n timerlat_fd = open(\"/sys/kernel/tracing/osnoise/per_cpu/cpu0/timerlat_fd\", 'r')\n timerlat_fd.close();\n EOF\n\n # ./taskset -c 0 ./timerlat_load.py\n\n\n BUG: kernel NULL pointer dereference, address: 0000000000000010\n #PF: supervisor read access in kernel mode\n #PF: error_code(0x0000) - not-present page\n PGD 0 P4D 0\n Oops: 0000 [#1] PREEMPT SMP NOPTI\n CPU: 1 PID: 2673 Comm: python3 Not tainted 6.6.13-200.fc39.x86_64 #1\n Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-1.fc39 04/01/2014\n RIP: 0010:hrtimer_active+0xd/0x50\n Code: 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 0f 1f 44 00 00 48 8b 57 30 <8b> 42 10 a8 01 74 09 f3 90 8b 42 10 a8 01 75 f7 80 7f 38 00 75 1d\n RSP: 0018:ffffb031009b7e10 EFLAGS: 00010286\n RAX: 000000000002db00 RBX: ffff9118f786db08 RCX: 0000000000000000\n RDX: 0000000000000000 RSI: ffff9117a0e64400 RDI: ffff9118f786db08\n RBP: ffff9118f786db80 R08: ffff9117a0ddd420 R09: ffff9117804d4f70\n R10: 0000000000000000 R11: 0000000000000000 R12: ffff9118f786db08\n R13: ffff91178fdd5e20 R14: ffff9117840978c0 R15: 0000000000000000\n FS: 00007f2ffbab1740(0000) GS:ffff9118f7840000(0000) knlGS:0000000000000000\n CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 0000000000000010 CR3: 00000001b402e000 CR4: 0000000000750ee0\n PKRU: 55555554\n Call Trace:\n \n ? __die+0x23/0x70\n ? page_fault_oops+0x171/0x4e0\n ? srso_alias_return_thunk+0x5/0x7f\n ? avc_has_extended_perms+0x237/0x520\n ? exc_page_fault+0x7f/0x180\n ? asm_exc_page_fault+0x26/0x30\n ? hrtimer_active+0xd/0x50\n hrtimer_cancel+0x15/0x40\n timerlat_fd_release+0x48/0xe0\n __fput+0xf5/0x290\n __x64_sys_close+0x3d/0x80\n do_syscall_64+0x60/0x90\n ? srso_alias_return_thunk+0x5/0x7f\n ? __x64_sys_ioctl+0x72/0xd0\n ? srso_alias_return_thunk+0x5/0x7f\n ? syscall_exit_to_user_mode+0x2b/0x40\n ? srso_alias_return_thunk+0x5/0x7f\n ? do_syscall_64+0x6c/0x90\n ? srso_alias_return_thunk+0x5/0x7f\n ? exit_to_user_mode_prepare+0x142/0x1f0\n ? srso_alias_return_thunk+0x5/0x7f\n ? syscall_exit_to_user_mode+0x2b/0x40\n ? srso_alias_return_thunk+0x5/0x7f\n ? do_syscall_64+0x6c/0x90\n entry_SYSCALL_64_after_hwframe+0x6e/0xd8\n RIP: 0033:0x7f2ffb321594\n Code: 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 80 3d d5 cd 0d 00 00 74 13 b8 03 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 3c c3 0f 1f 00 55 48 89 e5 48 83 ec 10 89 7d\n RSP: 002b:00007ffe8d8eef18 EFLAGS: 00000202 ORIG_RAX: 0000000000000003\n RAX: ffffffffffffffda RBX: 00007f2ffba4e668 RCX: 00007f2ffb321594\n RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003\n RBP: 00007ffe8d8eef40 R08: 0000000000000000 R09: 0000000000000000\n R10: 55c926e3167eae79 R11: 0000000000000202 R12: 0000000000000003\n R13: 00007ffe8d8ef030 R14: 0000000000000000 R15: 00007f2ffba4e668\n \n CR2: 0000000000000010\n ---[ end trace 0000000000000000 ]---\n\nMove hrtimer_init to timerlat_fd open() to avoid this problem.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26703", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26703", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26703", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26703", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26703", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26703" + } + }, + "CVE-2024-26704": { + "affected_versions": "v3.18-rc2 to v6.8-rc3", + "breaks": "fcf6b1b729bcd23f2b49a84fb33ffbb44712ee6a", + "cmt_msg": "ext4: fix double-free of blocks due to wrong extents moved_len", + "fixes": "55583e899a5357308274601364741a83e78d6ac4", + "last_affected_version": "6.7.5", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: fix double-free of blocks due to wrong extents moved_len\n\nIn ext4_move_extents(), moved_len is only updated when all moves are\nsuccessfully executed, and only discards orig_inode and donor_inode\npreallocations when moved_len is not zero. When the loop fails to exit\nafter successfully moving some extents, moved_len is not updated and\nremains at 0, so it does not discard the preallocations.\n\nIf the moved extents overlap with the preallocated extents, the\noverlapped extents are freed twice in ext4_mb_release_inode_pa() and\next4_process_freed_data() (as described in commit 94d7c16cbbbd (\"ext4:\nFix double-free of blocks with EXT4_IOC_MOVE_EXT\")), and bb_free is\nincremented twice. Hence when trim is executed, a zero-division bug is\ntriggered in mb_update_avg_fragment_size() because bb_free is not zero\nand bb_fragments is zero.\n\nTherefore, update move_len after each extent move to avoid the issue.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26704", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26704", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26704", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26704", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26704", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26704" + } + }, + "CVE-2024-26705": { + "affected_versions": "v6.6-rc2 to v6.8-rc3", + "breaks": "e5ef93d02d6c9cc3a14e7348481c9e41a528caa1", + "cmt_msg": "parisc: BTLB: Fix crash when setting up BTLB at CPU bringup", + "fixes": "913b9d443a0180cf0de3548f1ab3149378998486", + "last_affected_version": "6.7.5", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nparisc: BTLB: Fix crash when setting up BTLB at CPU bringup\n\nWhen using hotplug and bringing up a 32-bit CPU, ask the firmware about the\nBTLB information to set up the static (block) TLB entries.\n\nFor that write access to the static btlb_info struct is needed, but\nsince it is marked __ro_after_init the kernel segfaults with missing\nwrite permissions.\n\nFix the crash by dropping the __ro_after_init annotation.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26705", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26705", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26705", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26705", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26705", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26705" + } + }, + "CVE-2024-26706": { + "affected_versions": "v2.6.12-rc2 to v6.8-rc3", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "parisc: Fix random data corruption from exception handler", + "fixes": "8b1d72395635af45410b66cc4c4ab37a12c4a831", + "last_affected_version": "6.7.5", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nparisc: Fix random data corruption from exception handler\n\nThe current exception handler implementation, which assists when accessing\nuser space memory, may exhibit random data corruption if the compiler decides\nto use a different register than the specified register %r29 (defined in\nASM_EXCEPTIONTABLE_REG) for the error code. If the compiler choose another\nregister, the fault handler will nevertheless store -EFAULT into %r29 and thus\ntrash whatever this register is used for.\nLooking at the assembly I found that this happens sometimes in emulate_ldd().\n\nTo solve the issue, the easiest solution would be if it somehow is\npossible to tell the fault handler which register is used to hold the error\ncode. Using %0 or %1 in the inline assembly is not posssible as it will show\nup as e.g. %r29 (with the \"%r\" prefix), which the GNU assembler can not\nconvert to an integer.\n\nThis patch takes another, better and more flexible approach:\nWe extend the __ex_table (which is out of the execution path) by one 32-word.\nIn this word we tell the compiler to insert the assembler instruction\n\"or %r0,%r0,%reg\", where %reg references the register which the compiler\nchoosed for the error return code.\nIn case of an access failure, the fault handler finds the __ex_table entry and\ncan examine the opcode. The used register is encoded in the lowest 5 bits, and\nthe fault handler can then store -EFAULT into this register.\n\nSince we extend the __ex_table to 3 words we can't use the BUILDTIME_TABLE_SORT\nconfig option any longer.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26706", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26706", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26706", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26706", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26706", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26706" + } + }, + "CVE-2024-26707": { + "affected_versions": "v5.9-rc1 to v6.8-rc3", + "breaks": "121c33b07b3127f501b366bc23d2a590e2f2b8ef", + "cmt_msg": "net: hsr: remove WARN_ONCE() in send_hsr_supervision_frame()", + "fixes": "37e8c97e539015637cb920d3e6f1e404f707a06e", + "last_affected_version": "6.7.5", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: hsr: remove WARN_ONCE() in send_hsr_supervision_frame()\n\nSyzkaller reported [1] hitting a warning after failing to allocate\nresources for skb in hsr_init_skb(). Since a WARN_ONCE() call will\nnot help much in this case, it might be prudent to switch to\nnetdev_warn_once(). At the very least it will suppress syzkaller\nreports such as [1].\n\nJust in case, use netdev_warn_once() in send_prp_supervision_frame()\nfor similar reasons.\n\n[1]\nHSR: Could not send supervision frame\nWARNING: CPU: 1 PID: 85 at net/hsr/hsr_device.c:294 send_hsr_supervision_frame+0x60a/0x810 net/hsr/hsr_device.c:294\nRIP: 0010:send_hsr_supervision_frame+0x60a/0x810 net/hsr/hsr_device.c:294\n...\nCall Trace:\n \n hsr_announce+0x114/0x370 net/hsr/hsr_device.c:382\n call_timer_fn+0x193/0x590 kernel/time/timer.c:1700\n expire_timers kernel/time/timer.c:1751 [inline]\n __run_timers+0x764/0xb20 kernel/time/timer.c:2022\n run_timer_softirq+0x58/0xd0 kernel/time/timer.c:2035\n __do_softirq+0x21a/0x8de kernel/softirq.c:553\n invoke_softirq kernel/softirq.c:427 [inline]\n __irq_exit_rcu kernel/softirq.c:632 [inline]\n irq_exit_rcu+0xb7/0x120 kernel/softirq.c:644\n sysvec_apic_timer_interrupt+0x95/0xb0 arch/x86/kernel/apic/apic.c:1076\n \n \n asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:649\n...\n\nThis issue is also found in older kernels (at least up to 5.10).", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26707", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26707", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26707", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26707", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26707", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26707" + } + }, + "CVE-2024-26708": { + "affected_versions": "v6.2-rc1 to v6.8-rc5", + "breaks": "1e777f39b4d75e599a3aac8e0f67d739474f198c", + "cmt_msg": "mptcp: really cope with fastopen race", + "fixes": "337cebbd850f94147cee05252778f8f78b8c337f", + "last_affected_version": "6.7.5", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmptcp: really cope with fastopen race\n\nFastopen and PM-trigger subflow shutdown can race, as reported by\nsyzkaller.\n\nIn my first attempt to close such race, I missed the fact that\nthe subflow status can change again before the subflow_state_change\ncallback is invoked.\n\nAddress the issue additionally copying with all the states directly\nreachable from TCP_FIN_WAIT1.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26708", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26708", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26708", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26708", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26708", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26708" + } + }, + "CVE-2024-26709": { + "affected_versions": "v6.7-rc1 to v6.8-rc5", + "breaks": "a8ca9fc9134c1a43e6d4db7ff59496bbd7075def", + "cmt_msg": "powerpc/iommu: Fix the missing iommu_group_put() during platform domain attach", + "fixes": "0846dd77c8349ec92ca0079c9c71d130f34cb192", + "last_affected_version": "6.7.5", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\npowerpc/iommu: Fix the missing iommu_group_put() during platform domain attach\n\nThe function spapr_tce_platform_iommu_attach_dev() is missing to call\niommu_group_put() when the domain is already set. This refcount leak\nshows up with BUG_ON() during DLPAR remove operation as:\n\n KernelBug: Kernel bug in state 'None': kernel BUG at arch/powerpc/platforms/pseries/iommu.c:100!\n Oops: Exception in kernel mode, sig: 5 [#1]\n LE PAGE_SIZE=64K MMU=Radix SMP NR_CPUS=8192 NUMA pSeries\n \n Hardware name: IBM,9080-HEX POWER10 (raw) 0x800200 0xf000006 of:IBM,FW1060.00 (NH1060_016) hv:phyp pSeries\n NIP: c0000000000ff4d4 LR: c0000000000ff4cc CTR: 0000000000000000\n REGS: c0000013aed5f840 TRAP: 0700 Tainted: G I (6.8.0-rc3-autotest-g99bd3cb0d12e)\n MSR: 8000000000029033 CR: 44002402 XER: 20040000\n CFAR: c000000000a0d170 IRQMASK: 0\n ...\n NIP iommu_reconfig_notifier+0x94/0x200\n LR iommu_reconfig_notifier+0x8c/0x200\n Call Trace:\n iommu_reconfig_notifier+0x8c/0x200 (unreliable)\n notifier_call_chain+0xb8/0x19c\n blocking_notifier_call_chain+0x64/0x98\n of_reconfig_notify+0x44/0xdc\n of_detach_node+0x78/0xb0\n ofdt_write.part.0+0x86c/0xbb8\n proc_reg_write+0xf4/0x150\n vfs_write+0xf8/0x488\n ksys_write+0x84/0x140\n system_call_exception+0x138/0x330\n system_call_vectored_common+0x15c/0x2ec\n\nThe patch adds the missing iommu_group_put() call.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26709", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26709", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26709", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26709", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26709", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26709" + } + }, + "CVE-2024-26710": { + "affected_versions": "v6.8-rc1 to v6.8-rc5", + "breaks": "18f14afe281648e31ed35c9ad2fcb724c4838ad9", + "fixes": "f1acb109505d983779bbb7e20a1ee6244d2b5736", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\npowerpc/kasan: Limit KASAN thread size increase to 32KB\n\nKASAN is seen to increase stack usage, to the point that it was reported\nto lead to stack overflow on some 32-bit machines (see link).\n\nTo avoid overflows the stack size was doubled for KASAN builds in\ncommit 3e8635fb2e07 (\"powerpc/kasan: Force thread size increase with\nKASAN\").\n\nHowever with a 32KB stack size to begin with, the doubling leads to a\n64KB stack, which causes build errors:\n arch/powerpc/kernel/switch.S:249: Error: operand out of range (0x000000000000fe50 is not between 0xffffffffffff8000 and 0x0000000000007fff)\n\nAlthough the asm could be reworked, in practice a 32KB stack seems\nsufficient even for KASAN builds - the additional usage seems to be in\nthe 2-3KB range for a 64-bit KASAN build.\n\nSo only increase the stack for KASAN if the stack size is < 32KB.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26710", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26710", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26710", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26710", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26710", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26710" + } + }, + "CVE-2024-26711": { + "affected_versions": "v6.2-rc1 to v6.8-rc5", + "breaks": "62094060cf3acaf52e277457d807ea753269b89e", + "cmt_msg": "iio: adc: ad4130: zero-initialize clock init data", + "fixes": "a22b0a2be69a36511cb5b37d948b651ddf7debf3", + "last_affected_version": "6.7.5", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\niio: adc: ad4130: zero-initialize clock init data\n\nThe clk_init_data struct does not have all its members\ninitialized, causing issues when trying to expose the internal\nclock on the CLK pin.\n\nFix this by zero-initializing the clk_init_data struct.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26711", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26711", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26711", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26711", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26711", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26711" + } + }, + "CVE-2024-26712": { + "affected_versions": "v5.4-rc1 to v6.8-rc5", + "breaks": "663c0c9496a69f80011205ba3194049bcafd681d", + "cmt_msg": "powerpc/kasan: Fix addr error caused by page alignment", + "fixes": "4a7aee96200ad281a5cc4cf5c7a2e2a49d2b97b0", + "last_affected_version": "6.7.5", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\npowerpc/kasan: Fix addr error caused by page alignment\n\nIn kasan_init_region, when k_start is not page aligned, at the begin of\nfor loop, k_cur = k_start & PAGE_MASK is less than k_start, and then\n`va = block + k_cur - k_start` is less than block, the addr va is invalid,\nbecause the memory address space from va to block is not alloced by\nmemblock_alloc, which will not be reserved by memblock_reserve later, it\nwill be used by other places.\n\nAs a result, memory overwriting occurs.\n\nfor example:\nint __init __weak kasan_init_region(void *start, size_t size)\n{\n[...]\n\t/* if say block(dcd97000) k_start(feef7400) k_end(feeff3fe) */\n\tblock = memblock_alloc(k_end - k_start, PAGE_SIZE);\n\t[...]\n\tfor (k_cur = k_start & PAGE_MASK; k_cur < k_end; k_cur += PAGE_SIZE) {\n\t\t/* at the begin of for loop\n\t\t * block(dcd97000) va(dcd96c00) k_cur(feef7000) k_start(feef7400)\n\t\t * va(dcd96c00) is less than block(dcd97000), va is invalid\n\t\t */\n\t\tvoid *va = block + k_cur - k_start;\n\t\t[...]\n\t}\n[...]\n}\n\nTherefore, page alignment is performed on k_start before\nmemblock_alloc() to ensure the validity of the VA address.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26712", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26712", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26712", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26712", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26712", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26712" + } + }, + "CVE-2024-26713": { + "affected_versions": "unk to v6.8-rc5", + "breaks": "", + "cmt_msg": "powerpc/pseries/iommu: Fix iommu initialisation during DLPAR add", + "fixes": "ed8b94f6e0acd652ce69bd69d678a0c769172df8", + "last_affected_version": "6.7.5", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\npowerpc/pseries/iommu: Fix iommu initialisation during DLPAR add\n\nWhen a PCI device is dynamically added, the kernel oopses with a NULL\npointer dereference:\n\n BUG: Kernel NULL pointer dereference on read at 0x00000030\n Faulting instruction address: 0xc0000000006bbe5c\n Oops: Kernel access of bad area, sig: 11 [#1]\n LE PAGE_SIZE=64K MMU=Radix SMP NR_CPUS=2048 NUMA pSeries\n Modules linked in: rpadlpar_io rpaphp rpcsec_gss_krb5 auth_rpcgss nfsv4 dns_resolver nfs lockd grace fscache netfs xsk_diag bonding nft_compat nf_tables nfnetlink rfkill binfmt_misc dm_multipath rpcrdma sunrpc rdma_ucm ib_srpt ib_isert iscsi_target_mod target_core_mod ib_umad ib_iser libiscsi scsi_transport_iscsi ib_ipoib rdma_cm iw_cm ib_cm mlx5_ib ib_uverbs ib_core pseries_rng drm drm_panel_orientation_quirks xfs libcrc32c mlx5_core mlxfw sd_mod t10_pi sg tls ibmvscsi ibmveth scsi_transport_srp vmx_crypto pseries_wdt psample dm_mirror dm_region_hash dm_log dm_mod fuse\n CPU: 17 PID: 2685 Comm: drmgr Not tainted 6.7.0-203405+ #66\n Hardware name: IBM,9080-HEX POWER10 (raw) 0x800200 0xf000006 of:IBM,FW1060.00 (NH1060_008) hv:phyp pSeries\n NIP: c0000000006bbe5c LR: c000000000a13e68 CTR: c0000000000579f8\n REGS: c00000009924f240 TRAP: 0300 Not tainted (6.7.0-203405+)\n MSR: 8000000000009033 CR: 24002220 XER: 20040006\n CFAR: c000000000a13e64 DAR: 0000000000000030 DSISR: 40000000 IRQMASK: 0\n ...\n NIP sysfs_add_link_to_group+0x34/0x94\n LR iommu_device_link+0x5c/0x118\n Call Trace:\n iommu_init_device+0x26c/0x318 (unreliable)\n iommu_device_link+0x5c/0x118\n iommu_init_device+0xa8/0x318\n iommu_probe_device+0xc0/0x134\n iommu_bus_notifier+0x44/0x104\n notifier_call_chain+0xb8/0x19c\n blocking_notifier_call_chain+0x64/0x98\n bus_notify+0x50/0x7c\n device_add+0x640/0x918\n pci_device_add+0x23c/0x298\n of_create_pci_dev+0x400/0x884\n of_scan_pci_dev+0x124/0x1b0\n __of_scan_bus+0x78/0x18c\n pcibios_scan_phb+0x2a4/0x3b0\n init_phb_dynamic+0xb8/0x110\n dlpar_add_slot+0x170/0x3b8 [rpadlpar_io]\n add_slot_store.part.0+0xb4/0x130 [rpadlpar_io]\n kobj_attr_store+0x2c/0x48\n sysfs_kf_write+0x64/0x78\n kernfs_fop_write_iter+0x1b0/0x290\n vfs_write+0x350/0x4a0\n ksys_write+0x84/0x140\n system_call_exception+0x124/0x330\n system_call_vectored_common+0x15c/0x2ec\n\nCommit a940904443e4 (\"powerpc/iommu: Add iommu_ops to report capabilities\nand allow blocking domains\") broke DLPAR add of PCI devices.\n\nThe above added iommu_device structure to pci_controller. During\nsystem boot, PCI devices are discovered and this newly added iommu_device\nstructure is initialized by a call to iommu_device_register().\n\nDuring DLPAR add of a PCI device, a new pci_controller structure is\nallocated but there are no calls made to iommu_device_register()\ninterface.\n\nFix is to register the iommu device during DLPAR add as well.\n\n[mpe: Trim oops and tweak some change log wording]", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26713", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26713", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26713", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26713", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26713", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26713" + } + }, + "CVE-2024-26714": { + "affected_versions": "v5.15-rc1 to v6.8-rc5", + "breaks": "9c8c6bac1ae86f6902baa938101902fb3a0a100b", + "cmt_msg": "interconnect: qcom: sc8180x: Mark CO0 BCM keepalive", + "fixes": "85e985a4f46e462a37f1875cb74ed380e7c0c2e0", + "last_affected_version": "6.7.5", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\ninterconnect: qcom: sc8180x: Mark CO0 BCM keepalive\n\nThe CO0 BCM needs to be up at all times, otherwise some hardware (like\nthe UFS controller) loses its connection to the rest of the SoC,\nresulting in a hang of the platform, accompanied by a spectacular\nlogspam.\n\nMark it as keepalive to prevent such cases.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26714", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26714", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26714", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26714", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26714", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26714" + } + }, + "CVE-2024-26715": { + "affected_versions": "v4.6-rc5 to v6.8-rc3", + "breaks": "9772b47a4c2916d645c551228b6085ea24acbe5d", + "cmt_msg": "usb: dwc3: gadget: Fix NULL pointer dereference in dwc3_gadget_suspend", + "fixes": "61a348857e869432e6a920ad8ea9132e8d44c316", + "last_affected_version": "6.7.5", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: dwc3: gadget: Fix NULL pointer dereference in dwc3_gadget_suspend\n\nIn current scenario if Plug-out and Plug-In performed continuously\nthere could be a chance while checking for dwc->gadget_driver in\ndwc3_gadget_suspend, a NULL pointer dereference may occur.\n\nCall Stack:\n\n\tCPU1: CPU2:\n\tgadget_unbind_driver dwc3_suspend_common\n\tdwc3_gadget_stop dwc3_gadget_suspend\n dwc3_disconnect_gadget\n\nCPU1 basically clears the variable and CPU2 checks the variable.\nConsider CPU1 is running and right before gadget_driver is cleared\nand in parallel CPU2 executes dwc3_gadget_suspend where it finds\ndwc->gadget_driver which is not NULL and resumes execution and then\nCPU1 completes execution. CPU2 executes dwc3_disconnect_gadget where\nit checks dwc->gadget_driver is already NULL because of which the\nNULL pointer deference occur.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26715", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26715", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26715", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26715", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26715", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26715" + } + }, + "CVE-2024-26716": { + "affected_versions": "v6.5-rc1 to v6.8-rc3", + "breaks": "83cb2604f641cecadc275ca18adbba4bf262320f", + "cmt_msg": "usb: core: Prevent null pointer dereference in update_port_device_state", + "fixes": "12783c0b9e2c7915a50d5ec829630ff2da50472c", + "last_affected_version": "6.7.5", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: core: Prevent null pointer dereference in update_port_device_state\n\nCurrently, the function update_port_device_state gets the usb_hub from\nudev->parent by calling usb_hub_to_struct_hub.\nHowever, in case the actconfig or the maxchild is 0, the usb_hub would\nbe NULL and upon further accessing to get port_dev would result in null\npointer dereference.\n\nFix this by introducing an if check after the usb_hub is populated.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26716", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26716", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26716", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26716", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26716", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26716" + } + }, + "CVE-2024-26717": { + "affected_versions": "v5.12-rc1-dontuse to v6.8-rc3", + "breaks": "b33752c300232d7f95dd9a4353947d0c9e6a0e52", + "cmt_msg": "HID: i2c-hid-of: fix NULL-deref on failed power up", + "fixes": "00aab7dcb2267f2aef59447602f34501efe1a07f", + "last_affected_version": "6.7.5", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nHID: i2c-hid-of: fix NULL-deref on failed power up\n\nA while back the I2C HID implementation was split in an ACPI and OF\npart, but the new OF driver never initialises the client pointer which\nis dereferenced on power-up failures.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26717", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26717", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26717", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26717", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26717", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26717" + } + }, + "CVE-2024-26718": { + "affected_versions": "v5.9-rc1 to v6.8-rc3", + "breaks": "39d42fa96ba1b7d2544db3f8ed5da8fb0d5cb877", + "cmt_msg": "dm-crypt, dm-verity: disable tasklets", + "fixes": "0a9bab391e336489169b95cb0d4553d921302189", + "last_affected_version": "6.7.5", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndm-crypt, dm-verity: disable tasklets\n\nTasklets have an inherent problem with memory corruption. The function\ntasklet_action_common calls tasklet_trylock, then it calls the tasklet\ncallback and then it calls tasklet_unlock. If the tasklet callback frees\nthe structure that contains the tasklet or if it calls some code that may\nfree it, tasklet_unlock will write into free memory.\n\nThe commits 8e14f610159d and d9a02e016aaf try to fix it for dm-crypt, but\nit is not a sufficient fix and the data corruption can still happen [1].\nThere is no fix for dm-verity and dm-verity will write into free memory\nwith every tasklet-processed bio.\n\nThere will be atomic workqueues implemented in the kernel 6.9 [2]. They\nwill have better interface and they will not suffer from the memory\ncorruption problem.\n\nBut we need something that stops the memory corruption now and that can be\nbackported to the stable kernels. So, I'm proposing this commit that\ndisables tasklets in both dm-crypt and dm-verity. This commit doesn't\nremove the tasklet support, because the tasklet code will be reused when\natomic workqueues will be implemented.\n\n[1] https://lore.kernel.org/all/d390d7ee-f142-44d3-822a-87949e14608b@suse.de/T/\n[2] https://lore.kernel.org/lkml/20240130091300.2968534-1-tj@kernel.org/", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26718", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26718", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26718", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26718", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26718", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26718" + } + }, + "CVE-2024-26719": { + "affected_versions": "v2.6.12-rc2 to v6.8-rc3", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "nouveau: offload fence uevents work to workqueue", + "fixes": "39126abc5e20611579602f03b66627d7cd1422f0", + "last_affected_version": "6.7.5", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnouveau: offload fence uevents work to workqueue\n\nThis should break the deadlock between the fctx lock and the irq lock.\n\nThis offloads the processing off the work from the irq into a workqueue.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26719", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26719", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26719", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26719", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26719", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26719" + } + }, + "CVE-2024-26720": { + "affected_versions": "v3.16 to v6.8-rc3", + "breaks": "f6789593d5cea42a4ecb1cbeab6a23ade5ebbba7", + "cmt_msg": "mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again", + "fixes": "9319b647902cbd5cc884ac08a8a6d54ce111fc78", + "last_affected_version": "6.7.5", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again\n\n(struct dirty_throttle_control *)->thresh is an unsigned long, but is\npassed as the u32 divisor argument to div_u64(). On architectures where\nunsigned long is 64 bytes, the argument will be implicitly truncated.\n\nUse div64_u64() instead of div_u64() so that the value used in the \"is\nthis a safe division\" check is the same as the divisor.\n\nAlso, remove redundant cast of the numerator to u64, as that should happen\nimplicitly.\n\nThis would be difficult to exploit in memcg domain, given the ratio-based\narithmetic domain_drity_limits() uses, but is much easier in global\nwriteback domain with a BDI_CAP_STRICTLIMIT-backing device, using e.g. \nvm.dirty_bytes=(1<<32)*PAGE_SIZE so that dtc->thresh == (1<<32)", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26720", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26720", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26720", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26720", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26720", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26720" + } + }, + "CVE-2024-26721": { + "affected_versions": "v6.7-rc1 to v6.8-rc5", + "breaks": "bd077259d0a9c9bf453e7e9751bf41f1996e6585", + "cmt_msg": "drm/i915/dsc: Fix the macro that calculates DSCC_/DSCA_ PPS reg address", + "fixes": "962ac2dce56bb3aad1f82a4bbe3ada57a020287c", + "last_affected_version": "6.7.5", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/i915/dsc: Fix the macro that calculates DSCC_/DSCA_ PPS reg address\n\nCommit bd077259d0a9 (\"drm/i915/vdsc: Add function to read any PPS\nregister\") defines a new macro to calculate the DSC PPS register\naddresses with PPS number as an input. This macro correctly calculates\nthe addresses till PPS 11 since the addresses increment by 4. So in that\ncase the following macro works correctly to give correct register\naddress:\n\n_MMIO(_DSCA_PPS_0 + (pps) * 4)\n\nHowever after PPS 11, the register address for PPS 12 increments by 12\nbecause of RC Buffer memory allocation in between. Because of this\ndiscontinuity in the address space, the macro calculates wrong addresses\nfor PPS 12 - 16 resulting into incorrect DSC PPS parameter value\nread/writes causing DSC corruption.\n\nThis fixes it by correcting this macro to add the offset of 12 for PPS\n>=12.\n\nv3: Add correct paranthesis for pps argument (Jani Nikula)\n\n(cherry picked from commit 6074be620c31dc2ae11af96a1a5ea95580976fb5)", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26721", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26721", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26721", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26721", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26721", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26721" + } + }, + "CVE-2024-26722": { + "affected_versions": "v6.7-rc5 to v6.8-rc5", + "breaks": "cdba4301adda7c60a2064bf808e48fccd352aaa9", + "cmt_msg": "ASoC: rt5645: Fix deadlock in rt5645_jack_detect_work()", + "fixes": "6ef5d5b92f7117b324efaac72b3db27ae8bb3082", + "last_affected_version": "6.7.5", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: rt5645: Fix deadlock in rt5645_jack_detect_work()\n\nThere is a path in rt5645_jack_detect_work(), where rt5645->jd_mutex\nis left locked forever. That may lead to deadlock\nwhen rt5645_jack_detect_work() is called for the second time.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26722", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26722", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26722", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26722", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26722", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26722" + } + }, + "CVE-2024-26723": { + "affected_versions": "v6.1-rc1 to v6.8-rc5", + "breaks": "cabc9d49333df72fe0f6d58bdcf9057ba341e701", + "cmt_msg": "lan966x: Fix crash when adding interface under a lag", + "fixes": "15faa1f67ab405d47789d4702f587ec7df7ef03e", + "last_affected_version": "6.7.5", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nlan966x: Fix crash when adding interface under a lag\n\nThere is a crash when adding one of the lan966x interfaces under a lag\ninterface. The issue can be reproduced like this:\nip link add name bond0 type bond miimon 100 mode balance-xor\nip link set dev eth0 master bond0\n\nThe reason is because when adding a interface under the lag it would go\nthrough all the ports and try to figure out which other ports are under\nthat lag interface. And the issue is that lan966x can have ports that are\nNULL pointer as they are not probed. So then iterating over these ports\nit would just crash as they are NULL pointers.\nThe fix consists in actually checking for NULL pointers before accessing\nsomething from the ports. Like we do in other places.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26723", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26723", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26723", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26723", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26723", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26723" + } + }, + "CVE-2024-26724": { + "affected_versions": "v6.7-rc1 to v6.8-rc5", + "breaks": "496fd0a26bbf73b6b12407ee4fbe5ff49d659a6d", + "cmt_msg": "net/mlx5: DPLL, Fix possible use after free after delayed work timer triggers", + "fixes": "aa1eec2f546f2afa8c98ec41e5d8ee488165d685", + "last_affected_version": "6.7.5", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5: DPLL, Fix possible use after free after delayed work timer triggers\n\nI managed to hit following use after free warning recently:\n\n[ 2169.711665] ==================================================================\n[ 2169.714009] BUG: KASAN: slab-use-after-free in __run_timers.part.0+0x179/0x4c0\n[ 2169.716293] Write of size 8 at addr ffff88812b326a70 by task swapper/4/0\n\n[ 2169.719022] CPU: 4 PID: 0 Comm: swapper/4 Not tainted 6.8.0-rc2jiri+ #2\n[ 2169.720974] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014\n[ 2169.722457] Call Trace:\n[ 2169.722756] \n[ 2169.723024] dump_stack_lvl+0x58/0xb0\n[ 2169.723417] print_report+0xc5/0x630\n[ 2169.723807] ? __virt_addr_valid+0x126/0x2b0\n[ 2169.724268] kasan_report+0xbe/0xf0\n[ 2169.724667] ? __run_timers.part.0+0x179/0x4c0\n[ 2169.725116] ? __run_timers.part.0+0x179/0x4c0\n[ 2169.725570] __run_timers.part.0+0x179/0x4c0\n[ 2169.726003] ? call_timer_fn+0x320/0x320\n[ 2169.726404] ? lock_downgrade+0x3a0/0x3a0\n[ 2169.726820] ? kvm_clock_get_cycles+0x14/0x20\n[ 2169.727257] ? ktime_get+0x92/0x150\n[ 2169.727630] ? lapic_next_deadline+0x35/0x60\n[ 2169.728069] run_timer_softirq+0x40/0x80\n[ 2169.728475] __do_softirq+0x1a1/0x509\n[ 2169.728866] irq_exit_rcu+0x95/0xc0\n[ 2169.729241] sysvec_apic_timer_interrupt+0x6b/0x80\n[ 2169.729718] \n[ 2169.729993] \n[ 2169.730259] asm_sysvec_apic_timer_interrupt+0x16/0x20\n[ 2169.730755] RIP: 0010:default_idle+0x13/0x20\n[ 2169.731190] Code: c0 08 00 00 00 4d 29 c8 4c 01 c7 4c 29 c2 e9 72 ff ff ff cc cc cc cc 8b 05 9a 7f 1f 02 85 c0 7e 07 0f 00 2d cf 69 43 00 fb f4 c3 66 66 2e 0f 1f 84 00 00 00 00 00 65 48 8b 04 25 c0 93 04 00\n[ 2169.732759] RSP: 0018:ffff888100dbfe10 EFLAGS: 00000242\n[ 2169.733264] RAX: 0000000000000001 RBX: ffff888100d9c200 RCX: ffffffff8241bd62\n[ 2169.733925] RDX: ffffed109a848b15 RSI: 0000000000000004 RDI: ffffffff8127ac55\n[ 2169.734566] RBP: 0000000000000004 R08: 0000000000000000 R09: ffffed109a848b14\n[ 2169.735200] R10: ffff8884d42458a3 R11: 000000000000ba7e R12: ffffffff83d7d3a0\n[ 2169.735835] R13: 1ffff110201b7fc6 R14: 0000000000000000 R15: ffff888100d9c200\n[ 2169.736478] ? ct_kernel_exit.constprop.0+0xa2/0xc0\n[ 2169.736954] ? do_idle+0x285/0x290\n[ 2169.737323] default_idle_call+0x63/0x90\n[ 2169.737730] do_idle+0x285/0x290\n[ 2169.738089] ? arch_cpu_idle_exit+0x30/0x30\n[ 2169.738511] ? mark_held_locks+0x1a/0x80\n[ 2169.738917] ? lockdep_hardirqs_on_prepare+0x12e/0x200\n[ 2169.739417] cpu_startup_entry+0x30/0x40\n[ 2169.739825] start_secondary+0x19a/0x1c0\n[ 2169.740229] ? set_cpu_sibling_map+0xbd0/0xbd0\n[ 2169.740673] secondary_startup_64_no_verify+0x15d/0x16b\n[ 2169.741179] \n\n[ 2169.741686] Allocated by task 1098:\n[ 2169.742058] kasan_save_stack+0x1c/0x40\n[ 2169.742456] kasan_save_track+0x10/0x30\n[ 2169.742852] __kasan_kmalloc+0x83/0x90\n[ 2169.743246] mlx5_dpll_probe+0xf5/0x3c0 [mlx5_dpll]\n[ 2169.743730] auxiliary_bus_probe+0x62/0xb0\n[ 2169.744148] really_probe+0x127/0x590\n[ 2169.744534] __driver_probe_device+0xd2/0x200\n[ 2169.744973] device_driver_attach+0x6b/0xf0\n[ 2169.745402] bind_store+0x90/0xe0\n[ 2169.745761] kernfs_fop_write_iter+0x1df/0x2a0\n[ 2169.746210] vfs_write+0x41f/0x790\n[ 2169.746579] ksys_write+0xc7/0x160\n[ 2169.746947] do_syscall_64+0x6f/0x140\n[ 2169.747333] entry_SYSCALL_64_after_hwframe+0x46/0x4e\n\n[ 2169.748049] Freed by task 1220:\n[ 2169.748393] kasan_save_stack+0x1c/0x40\n[ 2169.748789] kasan_save_track+0x10/0x30\n[ 2169.749188] kasan_save_free_info+0x3b/0x50\n[ 2169.749621] poison_slab_object+0x106/0x180\n[ 2169.750044] __kasan_slab_free+0x14/0x50\n[ 2169.750451] kfree+0x118/0x330\n[ 2169.750792] mlx5_dpll_remove+0xf5/0x110 [mlx5_dpll]\n[ 2169.751271] auxiliary_bus_remove+0x2e/0x40\n[ 2169.751694] device_release_driver_internal+0x24b/0x2e0\n[ 2169.752191] unbind_store+0xa6/0xb0\n[ 2169.752563] kernfs_fo\n---truncated---", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26724", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26724", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26724", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26724", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26724", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26724" + } + }, + "CVE-2024-26725": { + "affected_versions": "v6.7-rc1 to v6.8-rc5", + "breaks": "9d71b54b65b1fb6c0d3a6c5c88ba9b915c783fbc", + "cmt_msg": "dpll: fix possible deadlock during netlink dump operation", + "fixes": "53c0441dd2c44ee93fddb5473885fd41e4bc2361", + "last_affected_version": "6.7.5", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndpll: fix possible deadlock during netlink dump operation\n\nRecently, I've been hitting following deadlock warning during dpll pin\ndump:\n\n[52804.637962] ======================================================\n[52804.638536] WARNING: possible circular locking dependency detected\n[52804.639111] 6.8.0-rc2jiri+ #1 Not tainted\n[52804.639529] ------------------------------------------------------\n[52804.640104] python3/2984 is trying to acquire lock:\n[52804.640581] ffff88810e642678 (nlk_cb_mutex-GENERIC){+.+.}-{3:3}, at: netlink_dump+0xb3/0x780\n[52804.641417]\n but task is already holding lock:\n[52804.642010] ffffffff83bde4c8 (dpll_lock){+.+.}-{3:3}, at: dpll_lock_dumpit+0x13/0x20\n[52804.642747]\n which lock already depends on the new lock.\n\n[52804.643551]\n the existing dependency chain (in reverse order) is:\n[52804.644259]\n -> #1 (dpll_lock){+.+.}-{3:3}:\n[52804.644836] lock_acquire+0x174/0x3e0\n[52804.645271] __mutex_lock+0x119/0x1150\n[52804.645723] dpll_lock_dumpit+0x13/0x20\n[52804.646169] genl_start+0x266/0x320\n[52804.646578] __netlink_dump_start+0x321/0x450\n[52804.647056] genl_family_rcv_msg_dumpit+0x155/0x1e0\n[52804.647575] genl_rcv_msg+0x1ed/0x3b0\n[52804.648001] netlink_rcv_skb+0xdc/0x210\n[52804.648440] genl_rcv+0x24/0x40\n[52804.648831] netlink_unicast+0x2f1/0x490\n[52804.649290] netlink_sendmsg+0x36d/0x660\n[52804.649742] __sock_sendmsg+0x73/0xc0\n[52804.650165] __sys_sendto+0x184/0x210\n[52804.650597] __x64_sys_sendto+0x72/0x80\n[52804.651045] do_syscall_64+0x6f/0x140\n[52804.651474] entry_SYSCALL_64_after_hwframe+0x46/0x4e\n[52804.652001]\n -> #0 (nlk_cb_mutex-GENERIC){+.+.}-{3:3}:\n[52804.652650] check_prev_add+0x1ae/0x1280\n[52804.653107] __lock_acquire+0x1ed3/0x29a0\n[52804.653559] lock_acquire+0x174/0x3e0\n[52804.653984] __mutex_lock+0x119/0x1150\n[52804.654423] netlink_dump+0xb3/0x780\n[52804.654845] __netlink_dump_start+0x389/0x450\n[52804.655321] genl_family_rcv_msg_dumpit+0x155/0x1e0\n[52804.655842] genl_rcv_msg+0x1ed/0x3b0\n[52804.656272] netlink_rcv_skb+0xdc/0x210\n[52804.656721] genl_rcv+0x24/0x40\n[52804.657119] netlink_unicast+0x2f1/0x490\n[52804.657570] netlink_sendmsg+0x36d/0x660\n[52804.658022] __sock_sendmsg+0x73/0xc0\n[52804.658450] __sys_sendto+0x184/0x210\n[52804.658877] __x64_sys_sendto+0x72/0x80\n[52804.659322] do_syscall_64+0x6f/0x140\n[52804.659752] entry_SYSCALL_64_after_hwframe+0x46/0x4e\n[52804.660281]\n other info that might help us debug this:\n\n[52804.661077] Possible unsafe locking scenario:\n\n[52804.661671] CPU0 CPU1\n[52804.662129] ---- ----\n[52804.662577] lock(dpll_lock);\n[52804.662924] lock(nlk_cb_mutex-GENERIC);\n[52804.663538] lock(dpll_lock);\n[52804.664073] lock(nlk_cb_mutex-GENERIC);\n[52804.664490]\n\nThe issue as follows: __netlink_dump_start() calls control->start(cb)\nwith nlk->cb_mutex held. In control->start(cb) the dpll_lock is taken.\nThen nlk->cb_mutex is released and taken again in netlink_dump(), while\ndpll_lock still being held. That leads to ABBA deadlock when another\nCPU races with the same operation.\n\nFix this by moving dpll_lock taking into dumpit() callback which ensures\ncorrect lock taking order.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26725", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26725", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26725", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26725", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26725", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26725" + } + }, + "CVE-2024-26726": { + "affected_versions": "v2.6.12-rc2 to v6.8-rc5", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "btrfs: don't drop extent_map for free space inode on write error", + "fixes": "5571e41ec6e56e35f34ae9f5b3a335ef510e0ade", + "last_affected_version": "6.7.5", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: don't drop extent_map for free space inode on write error\n\nWhile running the CI for an unrelated change I hit the following panic\nwith generic/648 on btrfs_holes_spacecache.\n\nassertion failed: block_start != EXTENT_MAP_HOLE, in fs/btrfs/extent_io.c:1385\n------------[ cut here ]------------\nkernel BUG at fs/btrfs/extent_io.c:1385!\ninvalid opcode: 0000 [#1] PREEMPT SMP NOPTI\nCPU: 1 PID: 2695096 Comm: fsstress Kdump: loaded Tainted: G W 6.8.0-rc2+ #1\nRIP: 0010:__extent_writepage_io.constprop.0+0x4c1/0x5c0\nCall Trace:\n \n extent_write_cache_pages+0x2ac/0x8f0\n extent_writepages+0x87/0x110\n do_writepages+0xd5/0x1f0\n filemap_fdatawrite_wbc+0x63/0x90\n __filemap_fdatawrite_range+0x5c/0x80\n btrfs_fdatawrite_range+0x1f/0x50\n btrfs_write_out_cache+0x507/0x560\n btrfs_write_dirty_block_groups+0x32a/0x420\n commit_cowonly_roots+0x21b/0x290\n btrfs_commit_transaction+0x813/0x1360\n btrfs_sync_file+0x51a/0x640\n __x64_sys_fdatasync+0x52/0x90\n do_syscall_64+0x9c/0x190\n entry_SYSCALL_64_after_hwframe+0x6e/0x76\n\nThis happens because we fail to write out the free space cache in one\ninstance, come back around and attempt to write it again. However on\nthe second pass through we go to call btrfs_get_extent() on the inode to\nget the extent mapping. Because this is a new block group, and with the\nfree space inode we always search the commit root to avoid deadlocking\nwith the tree, we find nothing and return a EXTENT_MAP_HOLE for the\nrequested range.\n\nThis happens because the first time we try to write the space cache out\nwe hit an error, and on an error we drop the extent mapping. This is\nnormal for normal files, but the free space cache inode is special. We\nalways expect the extent map to be correct. Thus the second time\nthrough we end up with a bogus extent map.\n\nSince we're deprecating this feature, the most straightforward way to\nfix this is to simply skip dropping the extent map range for this failed\nrange.\n\nI shortened the test by using error injection to stress the area to make\nit easier to reproduce. With this patch in place we no longer panic\nwith my error injection test.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26726", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26726", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26726", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26726", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26726", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26726" + } + }, + "CVE-2024-26727": { + "affected_versions": "v5.9-rc1 to v6.8-rc4", + "breaks": "2dfb1e43f57dd3aeaa66f7cf05d068db2d4c8788", + "cmt_msg": "btrfs: do not ASSERT() if the newly created subvolume already got read", + "fixes": "e03ee2fe873eb68c1f9ba5112fee70303ebf9dfb", + "last_affected_version": "6.7.5", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: do not ASSERT() if the newly created subvolume already got read\n\n[BUG]\nThere is a syzbot crash, triggered by the ASSERT() during subvolume\ncreation:\n\n assertion failed: !anon_dev, in fs/btrfs/disk-io.c:1319\n ------------[ cut here ]------------\n kernel BUG at fs/btrfs/disk-io.c:1319!\n invalid opcode: 0000 [#1] PREEMPT SMP KASAN\n RIP: 0010:btrfs_get_root_ref.part.0+0x9aa/0xa60\n \n btrfs_get_new_fs_root+0xd3/0xf0\n create_subvol+0xd02/0x1650\n btrfs_mksubvol+0xe95/0x12b0\n __btrfs_ioctl_snap_create+0x2f9/0x4f0\n btrfs_ioctl_snap_create+0x16b/0x200\n btrfs_ioctl+0x35f0/0x5cf0\n __x64_sys_ioctl+0x19d/0x210\n do_syscall_64+0x3f/0xe0\n entry_SYSCALL_64_after_hwframe+0x63/0x6b\n ---[ end trace 0000000000000000 ]---\n\n[CAUSE]\nDuring create_subvol(), after inserting root item for the newly created\nsubvolume, we would trigger btrfs_get_new_fs_root() to get the\nbtrfs_root of that subvolume.\n\nThe idea here is, we have preallocated an anonymous device number for\nthe subvolume, thus we can assign it to the new subvolume.\n\nBut there is really nothing preventing things like backref walk to read\nthe new subvolume.\nIf that happens before we call btrfs_get_new_fs_root(), the subvolume\nwould be read out, with a new anonymous device number assigned already.\n\nIn that case, we would trigger ASSERT(), as we really expect no one to\nread out that subvolume (which is not yet accessible from the fs).\nBut things like backref walk is still possible to trigger the read on\nthe subvolume.\n\nThus our assumption on the ASSERT() is not correct in the first place.\n\n[FIX]\nFix it by removing the ASSERT(), and just free the @anon_dev, reset it\nto 0, and continue.\n\nIf the subvolume tree is read out by something else, it should have\nalready get a new anon_dev assigned thus we only need to free the\npreallocated one.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26727", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26727", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26727", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26727", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26727", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26727" + } + }, + "CVE-2024-26728": { + "affected_versions": "v6.7-rc1 to v6.8-rc6", + "breaks": "0e859faf8670a78ce206977dcf1a31a0231e9ca5", + "cmt_msg": "drm/amd/display: fix null-pointer dereference on edid reading", + "fixes": "9671761792156f2339627918bafcd713a8a6f777", + "last_affected_version": "6.7.6", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: fix null-pointer dereference on edid reading\n\nUse i2c adapter when there isn't aux_mode in dc_link to fix a\nnull-pointer derefence that happens when running\nigt@kms_force_connector_basic in a system with DCN2.1 and HDMI connector\ndetected as below:\n\n[ +0.178146] BUG: kernel NULL pointer dereference, address: 00000000000004c0\n[ +0.000010] #PF: supervisor read access in kernel mode\n[ +0.000005] #PF: error_code(0x0000) - not-present page\n[ +0.000004] PGD 0 P4D 0\n[ +0.000006] Oops: 0000 [#1] PREEMPT SMP NOPTI\n[ +0.000006] CPU: 15 PID: 2368 Comm: kms_force_conne Not tainted 6.5.0-asdn+ #152\n[ +0.000005] Hardware name: HP HP ENVY x360 Convertible 13-ay1xxx/8929, BIOS F.01 07/14/2021\n[ +0.000004] RIP: 0010:i2c_transfer+0xd/0x100\n[ +0.000011] Code: ea fc ff ff 66 0f 1f 84 00 00 00 00 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 0f 1f 44 00 00 41 54 55 53 <48> 8b 47 10 48 89 fb 48 83 38 00 0f 84 b3 00 00 00 83 3d 2f 80 16\n[ +0.000004] RSP: 0018:ffff9c4f89c0fad0 EFLAGS: 00010246\n[ +0.000005] RAX: 0000000000000000 RBX: 0000000000000005 RCX: 0000000000000080\n[ +0.000003] RDX: 0000000000000002 RSI: ffff9c4f89c0fb20 RDI: 00000000000004b0\n[ +0.000003] RBP: ffff9c4f89c0fb80 R08: 0000000000000080 R09: ffff8d8e0b15b980\n[ +0.000003] R10: 00000000000380e0 R11: 0000000000000000 R12: 0000000000000080\n[ +0.000002] R13: 0000000000000002 R14: ffff9c4f89c0fb0e R15: ffff9c4f89c0fb0f\n[ +0.000004] FS: 00007f9ad2176c40(0000) GS:ffff8d90fe9c0000(0000) knlGS:0000000000000000\n[ +0.000003] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ +0.000004] CR2: 00000000000004c0 CR3: 0000000121bc4000 CR4: 0000000000750ee0\n[ +0.000003] PKRU: 55555554\n[ +0.000003] Call Trace:\n[ +0.000006] \n[ +0.000006] ? __die+0x23/0x70\n[ +0.000011] ? page_fault_oops+0x17d/0x4c0\n[ +0.000008] ? preempt_count_add+0x6e/0xa0\n[ +0.000008] ? srso_alias_return_thunk+0x5/0x7f\n[ +0.000011] ? exc_page_fault+0x7f/0x180\n[ +0.000009] ? asm_exc_page_fault+0x26/0x30\n[ +0.000013] ? i2c_transfer+0xd/0x100\n[ +0.000010] drm_do_probe_ddc_edid+0xc2/0x140 [drm]\n[ +0.000067] ? srso_alias_return_thunk+0x5/0x7f\n[ +0.000006] ? _drm_do_get_edid+0x97/0x3c0 [drm]\n[ +0.000043] ? __pfx_drm_do_probe_ddc_edid+0x10/0x10 [drm]\n[ +0.000042] edid_block_read+0x3b/0xd0 [drm]\n[ +0.000043] _drm_do_get_edid+0xb6/0x3c0 [drm]\n[ +0.000041] ? __pfx_drm_do_probe_ddc_edid+0x10/0x10 [drm]\n[ +0.000043] drm_edid_read_custom+0x37/0xd0 [drm]\n[ +0.000044] amdgpu_dm_connector_mode_valid+0x129/0x1d0 [amdgpu]\n[ +0.000153] drm_connector_mode_valid+0x3b/0x60 [drm_kms_helper]\n[ +0.000000] __drm_helper_update_and_validate+0xfe/0x3c0 [drm_kms_helper]\n[ +0.000000] ? amdgpu_dm_connector_get_modes+0xb6/0x520 [amdgpu]\n[ +0.000000] ? srso_alias_return_thunk+0x5/0x7f\n[ +0.000000] drm_helper_probe_single_connector_modes+0x2ab/0x540 [drm_kms_helper]\n[ +0.000000] status_store+0xb2/0x1f0 [drm]\n[ +0.000000] kernfs_fop_write_iter+0x136/0x1d0\n[ +0.000000] vfs_write+0x24d/0x440\n[ +0.000000] ksys_write+0x6f/0xf0\n[ +0.000000] do_syscall_64+0x60/0xc0\n[ +0.000000] ? srso_alias_return_thunk+0x5/0x7f\n[ +0.000000] ? syscall_exit_to_user_mode+0x2b/0x40\n[ +0.000000] ? srso_alias_return_thunk+0x5/0x7f\n[ +0.000000] ? do_syscall_64+0x6c/0xc0\n[ +0.000000] ? do_syscall_64+0x6c/0xc0\n[ +0.000000] entry_SYSCALL_64_after_hwframe+0x6e/0xd8\n[ +0.000000] RIP: 0033:0x7f9ad46b4b00\n[ +0.000000] Code: 40 00 48 8b 15 19 b3 0d 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b7 0f 1f 00 80 3d e1 3a 0e 00 00 74 17 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 58 c3 0f 1f 80 00 00 00 00 48 83 ec 28 48 89\n[ +0.000000] RSP: 002b:00007ffcbd3bd6d8 EFLAGS: 00000202 ORIG_RAX: 0000000000000001\n[ +0.000000] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f9ad46b4b00\n[ +0.000000] RDX: 0000000000000002 RSI: 00007f9ad48a7417 RDI: 0000000000000009\n[ +0.000000] RBP: 0000000000000002 R08\n---truncated---", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26728", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26728", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26728", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26728", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26728", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26728" + } + }, + "CVE-2024-26729": { + "affected_versions": "v6.7-rc1 to v6.8-rc6", + "breaks": "028bac5834495f4f4036bf8b3206fcdafe99a393", + "cmt_msg": "drm/amd/display: Fix potential null pointer dereference in dc_dmub_srv", + "fixes": "d2b48f340d9e4a8fbeb1cdc84cd8da6ad143a907", + "last_affected_version": "6.7.6", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Fix potential null pointer dereference in dc_dmub_srv\n\nFixes potential null pointer dereference warnings in the\ndc_dmub_srv_cmd_list_queue_execute() and dc_dmub_srv_is_hw_pwr_up()\nfunctions.\n\nIn both functions, the 'dc_dmub_srv' variable was being dereferenced\nbefore it was checked for null. This could lead to a null pointer\ndereference if 'dc_dmub_srv' is null. The fix is to check if\n'dc_dmub_srv' is null before dereferencing it.\n\nThus moving the null checks for 'dc_dmub_srv' to the beginning of the\nfunctions to ensure that 'dc_dmub_srv' is not null when it is\ndereferenced.\n\nFound by smatch & thus fixing the below:\ndrivers/gpu/drm/amd/amdgpu/../display/dc/dc_dmub_srv.c:133 dc_dmub_srv_cmd_list_queue_execute() warn: variable dereferenced before check 'dc_dmub_srv' (see line 128)\ndrivers/gpu/drm/amd/amdgpu/../display/dc/dc_dmub_srv.c:1167 dc_dmub_srv_is_hw_pwr_up() warn: variable dereferenced before check 'dc_dmub_srv' (see line 1164)", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26729", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26729", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26729", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26729", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26729", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26729" + } + }, + "CVE-2024-26730": { + "affected_versions": "v6.6-rc1 to v6.8-rc6", + "breaks": "b7f1f7b2523a6a4382f12fe953380b847b80e09d", + "cmt_msg": "hwmon: (nct6775) Fix access to temperature configuration registers", + "fixes": "d56e460e19ea8382f813eb489730248ec8d7eb73", + "last_affected_version": "6.7.6", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nhwmon: (nct6775) Fix access to temperature configuration registers\n\nThe number of temperature configuration registers does\nnot always match the total number of temperature registers.\nThis can result in access errors reported if KASAN is enabled.\n\nBUG: KASAN: global-out-of-bounds in nct6775_probe+0x5654/0x6fe9 nct6775_core", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26730", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26730", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26730", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26730", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26730", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26730" + } + }, + "CVE-2024-26731": { + "affected_versions": "v6.4-rc4 to v6.8-rc6", + "breaks": "6df7f764cd3cf5a03a4a47b23be47e57e41fcd85", + "cmt_msg": "bpf, sockmap: Fix NULL pointer dereference in sk_psock_verdict_data_ready()", + "fixes": "4cd12c6065dfcdeba10f49949bffcf383b3952d8", + "last_affected_version": "6.7.6", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf, sockmap: Fix NULL pointer dereference in sk_psock_verdict_data_ready()\n\nsyzbot reported the following NULL pointer dereference issue [1]:\n\n BUG: kernel NULL pointer dereference, address: 0000000000000000\n [...]\n RIP: 0010:0x0\n [...]\n Call Trace:\n \n sk_psock_verdict_data_ready+0x232/0x340 net/core/skmsg.c:1230\n unix_stream_sendmsg+0x9b4/0x1230 net/unix/af_unix.c:2293\n sock_sendmsg_nosec net/socket.c:730 [inline]\n __sock_sendmsg+0x221/0x270 net/socket.c:745\n ____sys_sendmsg+0x525/0x7d0 net/socket.c:2584\n ___sys_sendmsg net/socket.c:2638 [inline]\n __sys_sendmsg+0x2b0/0x3a0 net/socket.c:2667\n do_syscall_64+0xf9/0x240\n entry_SYSCALL_64_after_hwframe+0x6f/0x77\n\nIf sk_psock_verdict_data_ready() and sk_psock_stop_verdict() are called\nconcurrently, psock->saved_data_ready can be NULL, causing the above issue.\n\nThis patch fixes this issue by calling the appropriate data ready function\nusing the sk_psock_data_ready() helper and protecting it from concurrency\nwith sk->sk_callback_lock.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26731", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26731", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26731", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26731", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26731", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26731" + } + }, + "CVE-2024-26732": { + "affected_versions": "v6.7-rc1 to v6.8-rc6", + "breaks": "859051dd165ec6cc915f0f2114699021144fd249", + "cmt_msg": "net: implement lockless setsockopt(SO_PEEK_OFF)", + "fixes": "56667da7399eb19af857e30f41bea89aa6fa812c", + "last_affected_version": "6.7.6", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: implement lockless setsockopt(SO_PEEK_OFF)\n\nsyzbot reported a lockdep violation [1] involving af_unix\nsupport of SO_PEEK_OFF.\n\nSince SO_PEEK_OFF is inherently not thread safe (it uses a per-socket\nsk_peek_off field), there is really no point to enforce a pointless\nthread safety in the kernel.\n\nAfter this patch :\n\n- setsockopt(SO_PEEK_OFF) no longer acquires the socket lock.\n\n- skb_consume_udp() no longer has to acquire the socket lock.\n\n- af_unix no longer needs a special version of sk_set_peek_off(),\n because it does not lock u->iolock anymore.\n\nAs a followup, we could replace prot->set_peek_off to be a boolean\nand avoid an indirect call, since we always use sk_set_peek_off().\n\n[1]\n\nWARNING: possible circular locking dependency detected\n6.8.0-rc4-syzkaller-00267-g0f1dd5e91e2b #0 Not tainted\n\nsyz-executor.2/30025 is trying to acquire lock:\n ffff8880765e7d80 (&u->iolock){+.+.}-{3:3}, at: unix_set_peek_off+0x26/0xa0 net/unix/af_unix.c:789\n\nbut task is already holding lock:\n ffff8880765e7930 (sk_lock-AF_UNIX){+.+.}-{0:0}, at: lock_sock include/net/sock.h:1691 [inline]\n ffff8880765e7930 (sk_lock-AF_UNIX){+.+.}-{0:0}, at: sockopt_lock_sock net/core/sock.c:1060 [inline]\n ffff8880765e7930 (sk_lock-AF_UNIX){+.+.}-{0:0}, at: sk_setsockopt+0xe52/0x3360 net/core/sock.c:1193\n\nwhich lock already depends on the new lock.\n\nthe existing dependency chain (in reverse order) is:\n\n-> #1 (sk_lock-AF_UNIX){+.+.}-{0:0}:\n lock_acquire+0x1e3/0x530 kernel/locking/lockdep.c:5754\n lock_sock_nested+0x48/0x100 net/core/sock.c:3524\n lock_sock include/net/sock.h:1691 [inline]\n __unix_dgram_recvmsg+0x1275/0x12c0 net/unix/af_unix.c:2415\n sock_recvmsg_nosec+0x18e/0x1d0 net/socket.c:1046\n ____sys_recvmsg+0x3c0/0x470 net/socket.c:2801\n ___sys_recvmsg net/socket.c:2845 [inline]\n do_recvmmsg+0x474/0xae0 net/socket.c:2939\n __sys_recvmmsg net/socket.c:3018 [inline]\n __do_sys_recvmmsg net/socket.c:3041 [inline]\n __se_sys_recvmmsg net/socket.c:3034 [inline]\n __x64_sys_recvmmsg+0x199/0x250 net/socket.c:3034\n do_syscall_64+0xf9/0x240\n entry_SYSCALL_64_after_hwframe+0x6f/0x77\n\n-> #0 (&u->iolock){+.+.}-{3:3}:\n check_prev_add kernel/locking/lockdep.c:3134 [inline]\n check_prevs_add kernel/locking/lockdep.c:3253 [inline]\n validate_chain+0x18ca/0x58e0 kernel/locking/lockdep.c:3869\n __lock_acquire+0x1345/0x1fd0 kernel/locking/lockdep.c:5137\n lock_acquire+0x1e3/0x530 kernel/locking/lockdep.c:5754\n __mutex_lock_common kernel/locking/mutex.c:608 [inline]\n __mutex_lock+0x136/0xd70 kernel/locking/mutex.c:752\n unix_set_peek_off+0x26/0xa0 net/unix/af_unix.c:789\n sk_setsockopt+0x207e/0x3360\n do_sock_setsockopt+0x2fb/0x720 net/socket.c:2307\n __sys_setsockopt+0x1ad/0x250 net/socket.c:2334\n __do_sys_setsockopt net/socket.c:2343 [inline]\n __se_sys_setsockopt net/socket.c:2340 [inline]\n __x64_sys_setsockopt+0xb5/0xd0 net/socket.c:2340\n do_syscall_64+0xf9/0x240\n entry_SYSCALL_64_after_hwframe+0x6f/0x77\n\nother info that might help us debug this:\n\n Possible unsafe locking scenario:\n\n CPU0 CPU1\n ---- ----\n lock(sk_lock-AF_UNIX);\n lock(&u->iolock);\n lock(sk_lock-AF_UNIX);\n lock(&u->iolock);\n\n *** DEADLOCK ***\n\n1 lock held by syz-executor.2/30025:\n #0: ffff8880765e7930 (sk_lock-AF_UNIX){+.+.}-{0:0}, at: lock_sock include/net/sock.h:1691 [inline]\n #0: ffff8880765e7930 (sk_lock-AF_UNIX){+.+.}-{0:0}, at: sockopt_lock_sock net/core/sock.c:1060 [inline]\n #0: ffff8880765e7930 (sk_lock-AF_UNIX){+.+.}-{0:0}, at: sk_setsockopt+0xe52/0x3360 net/core/sock.c:1193\n\nstack backtrace:\nCPU: 0 PID: 30025 Comm: syz-executor.2 Not tainted 6.8.0-rc4-syzkaller-00267-g0f1dd5e91e2b #0\nHardware name: Google Google C\n---truncated---", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26732", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26732", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26732", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26732", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26732", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26732" + } + }, + "CVE-2024-26733": { + "affected_versions": "v2.6.12-rc2 to v6.8-rc6", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "arp: Prevent overflow in arp_req_get().", + "fixes": "a7d6027790acea24446ddd6632d394096c0f4667", + "last_affected_version": "6.7.6", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\narp: Prevent overflow in arp_req_get().\n\nsyzkaller reported an overflown write in arp_req_get(). [0]\n\nWhen ioctl(SIOCGARP) is issued, arp_req_get() looks up an neighbour\nentry and copies neigh->ha to struct arpreq.arp_ha.sa_data.\n\nThe arp_ha here is struct sockaddr, not struct sockaddr_storage, so\nthe sa_data buffer is just 14 bytes.\n\nIn the splat below, 2 bytes are overflown to the next int field,\narp_flags. We initialise the field just after the memcpy(), so it's\nnot a problem.\n\nHowever, when dev->addr_len is greater than 22 (e.g. MAX_ADDR_LEN),\narp_netmask is overwritten, which could be set as htonl(0xFFFFFFFFUL)\nin arp_ioctl() before calling arp_req_get().\n\nTo avoid the overflow, let's limit the max length of memcpy().\n\nNote that commit b5f0de6df6dc (\"net: dev: Convert sa_data to flexible\narray in struct sockaddr\") just silenced syzkaller.\n\n[0]:\nmemcpy: detected field-spanning write (size 16) of single field \"r->arp_ha.sa_data\" at net/ipv4/arp.c:1128 (size 14)\nWARNING: CPU: 0 PID: 144638 at net/ipv4/arp.c:1128 arp_req_get+0x411/0x4a0 net/ipv4/arp.c:1128\nModules linked in:\nCPU: 0 PID: 144638 Comm: syz-executor.4 Not tainted 6.1.74 #31\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.0-debian-1.16.0-5 04/01/2014\nRIP: 0010:arp_req_get+0x411/0x4a0 net/ipv4/arp.c:1128\nCode: fd ff ff e8 41 42 de fb b9 0e 00 00 00 4c 89 fe 48 c7 c2 20 6d ab 87 48 c7 c7 80 6d ab 87 c6 05 25 af 72 04 01 e8 5f 8d ad fb <0f> 0b e9 6c fd ff ff e8 13 42 de fb be 03 00 00 00 4c 89 e7 e8 a6\nRSP: 0018:ffffc900050b7998 EFLAGS: 00010286\nRAX: 0000000000000000 RBX: ffff88803a815000 RCX: 0000000000000000\nRDX: 0000000000000000 RSI: ffffffff8641a44a RDI: 0000000000000001\nRBP: ffffc900050b7a98 R08: 0000000000000001 R09: 0000000000000000\nR10: 0000000000000000 R11: 203a7970636d656d R12: ffff888039c54000\nR13: 1ffff92000a16f37 R14: ffff88803a815084 R15: 0000000000000010\nFS: 00007f172bf306c0(0000) GS:ffff88805aa00000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007f172b3569f0 CR3: 0000000057f12005 CR4: 0000000000770ef0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nPKRU: 55555554\nCall Trace:\n \n arp_ioctl+0x33f/0x4b0 net/ipv4/arp.c:1261\n inet_ioctl+0x314/0x3a0 net/ipv4/af_inet.c:981\n sock_do_ioctl+0xdf/0x260 net/socket.c:1204\n sock_ioctl+0x3ef/0x650 net/socket.c:1321\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:870 [inline]\n __se_sys_ioctl fs/ioctl.c:856 [inline]\n __x64_sys_ioctl+0x18e/0x220 fs/ioctl.c:856\n do_syscall_x64 arch/x86/entry/common.c:51 [inline]\n do_syscall_64+0x37/0x90 arch/x86/entry/common.c:81\n entry_SYSCALL_64_after_hwframe+0x64/0xce\nRIP: 0033:0x7f172b262b8d\nCode: 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48\nRSP: 002b:00007f172bf300b8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010\nRAX: ffffffffffffffda RBX: 00007f172b3abf80 RCX: 00007f172b262b8d\nRDX: 0000000020000000 RSI: 0000000000008954 RDI: 0000000000000003\nRBP: 00007f172b2d3493 R08: 0000000000000000 R09: 0000000000000000\nR10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000\nR13: 000000000000000b R14: 00007f172b3abf80 R15: 00007f172bf10000\n ", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26733", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26733", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26733", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26733", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26733", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26733" + } + }, + "CVE-2024-26734": { + "affected_versions": "v6.3-rc1 to v6.8-rc6", + "breaks": "687125b5799cd5120437fa455cfccbe8537916ff", + "cmt_msg": "devlink: fix possible use-after-free and memory leaks in devlink_init()", + "fixes": "def689fc26b9a9622d2e2cb0c4933dd3b1c8071c", + "last_affected_version": "6.7.6", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndevlink: fix possible use-after-free and memory leaks in devlink_init()\n\nThe pernet operations structure for the subsystem must be registered\nbefore registering the generic netlink family.\n\nMake an unregister in case of unsuccessful registration.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26734", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26734", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26734", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26734", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26734", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26734" + } + }, + "CVE-2024-26735": { + "affected_versions": "v4.10-rc1 to v6.8-rc6", + "breaks": "915d7e5e5930b4f01d0971d93b9b25ed17d221aa", + "cmt_msg": "ipv6: sr: fix possible use-after-free and null-ptr-deref", + "fixes": "5559cea2d5aa3018a5f00dd2aca3427ba09b386b", + "last_affected_version": "6.7.6", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv6: sr: fix possible use-after-free and null-ptr-deref\n\nThe pernet operations structure for the subsystem must be registered\nbefore registering the generic netlink family.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26735", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26735", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26735", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26735", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26735", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26735" + } + }, + "CVE-2024-26736": { + "affected_versions": "v4.15-rc1 to v6.8-rc6", + "breaks": "d2ddc776a4581d900fc3bdc7803b403daae64d88", + "cmt_msg": "afs: Increase buffer size in afs_update_volume_status()", + "fixes": "6ea38e2aeb72349cad50e38899b0ba6fbcb2af3d", + "last_affected_version": "6.7.6", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nafs: Increase buffer size in afs_update_volume_status()\n\nThe max length of volume->vid value is 20 characters.\nSo increase idbuf[] size up to 24 to avoid overflow.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.\n\n[DH: Actually, it's 20 + NUL, so increase it to 24 and use snprintf()]", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26736", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26736", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26736", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26736", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26736", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26736" + } + }, + "CVE-2024-26737": { + "affected_versions": "v5.15-rc1 to v6.8-rc6", + "breaks": "b00628b1c7d595ae5b544e059c27b1f5828314b4", + "cmt_msg": "bpf: Fix racing between bpf_timer_cancel_and_free and bpf_timer_cancel", + "fixes": "0281b919e175bb9c3128bd3872ac2903e9436e3f", + "last_affected_version": "6.7.6", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Fix racing between bpf_timer_cancel_and_free and bpf_timer_cancel\n\nThe following race is possible between bpf_timer_cancel_and_free\nand bpf_timer_cancel. It will lead a UAF on the timer->timer.\n\nbpf_timer_cancel();\n\tspin_lock();\n\tt = timer->time;\n\tspin_unlock();\n\n\t\t\t\t\tbpf_timer_cancel_and_free();\n\t\t\t\t\t\tspin_lock();\n\t\t\t\t\t\tt = timer->timer;\n\t\t\t\t\t\ttimer->timer = NULL;\n\t\t\t\t\t\tspin_unlock();\n\t\t\t\t\t\thrtimer_cancel(&t->timer);\n\t\t\t\t\t\tkfree(t);\n\n\t/* UAF on t */\n\thrtimer_cancel(&t->timer);\n\nIn bpf_timer_cancel_and_free, this patch frees the timer->timer\nafter a rcu grace period. This requires a rcu_head addition\nto the \"struct bpf_hrtimer\". Another kfree(t) happens in bpf_timer_init,\nthis does not need a kfree_rcu because it is still under the\nspin_lock and timer->timer has not been visible by others yet.\n\nIn bpf_timer_cancel, rcu_read_lock() is added because this helper\ncan be used in a non rcu critical section context (e.g. from\na sleepable bpf prog). Other timer->timer usages in helpers.c\nhave been audited, bpf_timer_cancel() is the only place where\ntimer->timer is used outside of the spin_lock.\n\nAnother solution considered is to mark a t->flag in bpf_timer_cancel\nand clear it after hrtimer_cancel() is done. In bpf_timer_cancel_and_free,\nit busy waits for the flag to be cleared before kfree(t). This patch\ngoes with a straight forward solution and frees timer->timer after\na rcu grace period.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26737", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26737", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26737", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26737", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26737", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26737" + } + }, + "CVE-2024-26738": { + "affected_versions": "unk to v6.8-rc6", + "breaks": "", + "cmt_msg": "powerpc/pseries/iommu: DLPAR add doesn't completely initialize pci_controller", + "fixes": "a5c57fd2e9bd1c8ea8613a8f94fd0be5eccbf321", + "last_affected_version": "6.7.6", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\npowerpc/pseries/iommu: DLPAR add doesn't completely initialize pci_controller\n\nWhen a PCI device is dynamically added, the kernel oopses with a NULL\npointer dereference:\n\n BUG: Kernel NULL pointer dereference on read at 0x00000030\n Faulting instruction address: 0xc0000000006bbe5c\n Oops: Kernel access of bad area, sig: 11 [#1]\n LE PAGE_SIZE=64K MMU=Radix SMP NR_CPUS=2048 NUMA pSeries\n Modules linked in: rpadlpar_io rpaphp rpcsec_gss_krb5 auth_rpcgss nfsv4 dns_resolver nfs lockd grace fscache netfs xsk_diag bonding nft_compat nf_tables nfnetlink rfkill binfmt_misc dm_multipath rpcrdma sunrpc rdma_ucm ib_srpt ib_isert iscsi_target_mod target_core_mod ib_umad ib_iser libiscsi scsi_transport_iscsi ib_ipoib rdma_cm iw_cm ib_cm mlx5_ib ib_uverbs ib_core pseries_rng drm drm_panel_orientation_quirks xfs libcrc32c mlx5_core mlxfw sd_mod t10_pi sg tls ibmvscsi ibmveth scsi_transport_srp vmx_crypto pseries_wdt psample dm_mirror dm_region_hash dm_log dm_mod fuse\n CPU: 17 PID: 2685 Comm: drmgr Not tainted 6.7.0-203405+ #66\n Hardware name: IBM,9080-HEX POWER10 (raw) 0x800200 0xf000006 of:IBM,FW1060.00 (NH1060_008) hv:phyp pSeries\n NIP: c0000000006bbe5c LR: c000000000a13e68 CTR: c0000000000579f8\n REGS: c00000009924f240 TRAP: 0300 Not tainted (6.7.0-203405+)\n MSR: 8000000000009033 CR: 24002220 XER: 20040006\n CFAR: c000000000a13e64 DAR: 0000000000000030 DSISR: 40000000 IRQMASK: 0\n ...\n NIP sysfs_add_link_to_group+0x34/0x94\n LR iommu_device_link+0x5c/0x118\n Call Trace:\n iommu_init_device+0x26c/0x318 (unreliable)\n iommu_device_link+0x5c/0x118\n iommu_init_device+0xa8/0x318\n iommu_probe_device+0xc0/0x134\n iommu_bus_notifier+0x44/0x104\n notifier_call_chain+0xb8/0x19c\n blocking_notifier_call_chain+0x64/0x98\n bus_notify+0x50/0x7c\n device_add+0x640/0x918\n pci_device_add+0x23c/0x298\n of_create_pci_dev+0x400/0x884\n of_scan_pci_dev+0x124/0x1b0\n __of_scan_bus+0x78/0x18c\n pcibios_scan_phb+0x2a4/0x3b0\n init_phb_dynamic+0xb8/0x110\n dlpar_add_slot+0x170/0x3b8 [rpadlpar_io]\n add_slot_store.part.0+0xb4/0x130 [rpadlpar_io]\n kobj_attr_store+0x2c/0x48\n sysfs_kf_write+0x64/0x78\n kernfs_fop_write_iter+0x1b0/0x290\n vfs_write+0x350/0x4a0\n ksys_write+0x84/0x140\n system_call_exception+0x124/0x330\n system_call_vectored_common+0x15c/0x2ec\n\nCommit a940904443e4 (\"powerpc/iommu: Add iommu_ops to report capabilities\nand allow blocking domains\") broke DLPAR add of PCI devices.\n\nThe above added iommu_device structure to pci_controller. During\nsystem boot, PCI devices are discovered and this newly added iommu_device\nstructure is initialized by a call to iommu_device_register().\n\nDuring DLPAR add of a PCI device, a new pci_controller structure is\nallocated but there are no calls made to iommu_device_register()\ninterface.\n\nFix is to register the iommu device during DLPAR add as well.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26738", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26738", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26738", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26738", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26738", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26738" + } + }, + "CVE-2024-26739": { + "affected_versions": "unk to v6.8-rc6", + "breaks": "", + "cmt_msg": "net/sched: act_mirred: don't override retval if we already lost the skb", + "fixes": "166c2c8a6a4dc2e4ceba9e10cfe81c3e469e3210", + "last_affected_version": "6.7.6", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: act_mirred: don't override retval if we already lost the skb\n\nIf we're redirecting the skb, and haven't called tcf_mirred_forward(),\nyet, we need to tell the core to drop the skb by setting the retcode\nto SHOT. If we have called tcf_mirred_forward(), however, the skb\nis out of our hands and returning SHOT will lead to UaF.\n\nMove the retval override to the error path which actually need it.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26739", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26739", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26739", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26739", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26739", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26739" + } + }, + "CVE-2024-26740": { + "affected_versions": "v4.10-rc1 to v6.8-rc6", + "breaks": "53592b3640019f2834701093e38272fdfd367ad8", + "cmt_msg": "net/sched: act_mirred: use the backlog for mirred ingress", + "fixes": "52f671db18823089a02f07efc04efdb2272ddc17", + "last_affected_version": "6.7.6", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: act_mirred: use the backlog for mirred ingress\n\nThe test Davide added in commit ca22da2fbd69 (\"act_mirred: use the backlog\nfor nested calls to mirred ingress\") hangs our testing VMs every 10 or so\nruns, with the familiar tcp_v4_rcv -> tcp_v4_rcv deadlock reported by\nlockdep.\n\nThe problem as previously described by Davide (see Link) is that\nif we reverse flow of traffic with the redirect (egress -> ingress)\nwe may reach the same socket which generated the packet. And we may\nstill be holding its socket lock. The common solution to such deadlocks\nis to put the packet in the Rx backlog, rather than run the Rx path\ninline. Do that for all egress -> ingress reversals, not just once\nwe started to nest mirred calls.\n\nIn the past there was a concern that the backlog indirection will\nlead to loss of error reporting / less accurate stats. But the current\nworkaround does not seem to address the issue.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26740", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26740", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26740", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26740", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26740", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26740" + } + }, + "CVE-2024-26741": { + "affected_versions": "v6.1-rc1 to v6.8-rc6", + "breaks": "28044fc1d4953b07acec0da4d2fc4784c57ea6fb", + "cmt_msg": "dccp/tcp: Unhash sk from ehash for tb2 alloc failure after check_estalblished().", + "fixes": "66b60b0c8c4a163b022a9f0ad6769b0fd3dc662f", + "last_affected_version": "6.7.6", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndccp/tcp: Unhash sk from ehash for tb2 alloc failure after check_estalblished().\n\nsyzkaller reported a warning [0] in inet_csk_destroy_sock() with no\nrepro.\n\n WARN_ON(inet_sk(sk)->inet_num && !inet_csk(sk)->icsk_bind_hash);\n\nHowever, the syzkaller's log hinted that connect() failed just before\nthe warning due to FAULT_INJECTION. [1]\n\nWhen connect() is called for an unbound socket, we search for an\navailable ephemeral port. If a bhash bucket exists for the port, we\ncall __inet_check_established() or __inet6_check_established() to check\nif the bucket is reusable.\n\nIf reusable, we add the socket into ehash and set inet_sk(sk)->inet_num.\n\nLater, we look up the corresponding bhash2 bucket and try to allocate\nit if it does not exist.\n\nAlthough it rarely occurs in real use, if the allocation fails, we must\nrevert the changes by check_established(). Otherwise, an unconnected\nsocket could illegally occupy an ehash entry.\n\nNote that we do not put tw back into ehash because sk might have\nalready responded to a packet for tw and it would be better to free\ntw earlier under such memory presure.\n\n[0]:\nWARNING: CPU: 0 PID: 350830 at net/ipv4/inet_connection_sock.c:1193 inet_csk_destroy_sock (net/ipv4/inet_connection_sock.c:1193)\nModules linked in:\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014\nRIP: 0010:inet_csk_destroy_sock (net/ipv4/inet_connection_sock.c:1193)\nCode: 41 5c 41 5d 41 5e e9 2d 4a 3d fd e8 28 4a 3d fd 48 89 ef e8 f0 cd 7d ff 5b 5d 41 5c 41 5d 41 5e e9 13 4a 3d fd e8 0e 4a 3d fd <0f> 0b e9 61 fe ff ff e8 02 4a 3d fd 4c 89 e7 be 03 00 00 00 e8 05\nRSP: 0018:ffffc9000b21fd38 EFLAGS: 00010293\nRAX: 0000000000000000 RBX: 0000000000009e78 RCX: ffffffff840bae40\nRDX: ffff88806e46c600 RSI: ffffffff840bb012 RDI: ffff88811755cca8\nRBP: ffff88811755c880 R08: 0000000000000003 R09: 0000000000000000\nR10: 0000000000009e78 R11: 0000000000000000 R12: ffff88811755c8e0\nR13: ffff88811755c892 R14: ffff88811755c918 R15: 0000000000000000\nFS: 00007f03e5243800(0000) GS:ffff88811ae00000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000001b32f21000 CR3: 0000000112ffe001 CR4: 0000000000770ef0\nPKRU: 55555554\nCall Trace:\n \n ? inet_csk_destroy_sock (net/ipv4/inet_connection_sock.c:1193)\n dccp_close (net/dccp/proto.c:1078)\n inet_release (net/ipv4/af_inet.c:434)\n __sock_release (net/socket.c:660)\n sock_close (net/socket.c:1423)\n __fput (fs/file_table.c:377)\n __fput_sync (fs/file_table.c:462)\n __x64_sys_close (fs/open.c:1557 fs/open.c:1539 fs/open.c:1539)\n do_syscall_64 (arch/x86/entry/common.c:52 arch/x86/entry/common.c:83)\n entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:129)\nRIP: 0033:0x7f03e53852bb\nCode: 03 00 00 00 0f 05 48 3d 00 f0 ff ff 77 41 c3 48 83 ec 18 89 7c 24 0c e8 43 c9 f5 ff 8b 7c 24 0c 41 89 c0 b8 03 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 35 44 89 c7 89 44 24 0c e8 a1 c9 f5 ff 8b 44\nRSP: 002b:00000000005dfba0 EFLAGS: 00000293 ORIG_RAX: 0000000000000003\nRAX: ffffffffffffffda RBX: 0000000000000004 RCX: 00007f03e53852bb\nRDX: 0000000000000002 RSI: 0000000000000002 RDI: 0000000000000003\nRBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000167c\nR10: 0000000008a79680 R11: 0000000000000293 R12: 00007f03e4e43000\nR13: 00007f03e4e43170 R14: 00007f03e4e43178 R15: 00007f03e4e43170\n \n\n[1]:\nFAULT_INJECTION: forcing a failure.\nname failslab, interval 1, probability 0, space 0, times 0\nCPU: 0 PID: 350833 Comm: syz-executor.1 Not tainted 6.7.0-12272-g2121c43f88f5 #9\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014\nCall Trace:\n \n dump_stack_lvl (lib/dump_stack.c:107 (discriminator 1))\n should_fail_ex (lib/fault-inject.c:52 lib/fault-inject.c:153)\n should_failslab (mm/slub.c:3748)\n kmem_cache_alloc (mm/slub.c:3763 mm/slub.c:3842 mm/slub.c:3867)\n inet_bind2_bucket_create \n---truncated---", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26741", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26741", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26741", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26741", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26741", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26741" + } + }, + "CVE-2024-26742": { + "affected_versions": "v6.0-rc1 to v6.8-rc6", + "breaks": "cf15c3e734e8d25de7b4d9170f5a69ace633a583", + "cmt_msg": "scsi: smartpqi: Fix disable_managed_interrupts", + "fixes": "5761eb9761d2d5fe8248a9b719efc4d8baf1f24a", + "last_affected_version": "6.7.6", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: smartpqi: Fix disable_managed_interrupts\n\nCorrect blk-mq registration issue with module parameter\ndisable_managed_interrupts enabled.\n\nWhen we turn off the default PCI_IRQ_AFFINITY flag, the driver needs to\nregister with blk-mq using blk_mq_map_queues(). The driver is currently\ncalling blk_mq_pci_map_queues() which results in a stack trace and possibly\nundefined behavior.\n\nStack Trace:\n[ 7.860089] scsi host2: smartpqi\n[ 7.871934] WARNING: CPU: 0 PID: 238 at block/blk-mq-pci.c:52 blk_mq_pci_map_queues+0xca/0xd0\n[ 7.889231] Modules linked in: sd_mod t10_pi sg uas smartpqi(+) crc32c_intel scsi_transport_sas usb_storage dm_mirror dm_region_hash dm_log dm_mod ipmi_devintf ipmi_msghandler fuse\n[ 7.924755] CPU: 0 PID: 238 Comm: kworker/0:3 Not tainted 4.18.0-372.88.1.el8_6_smartpqi_test.x86_64 #1\n[ 7.944336] Hardware name: HPE ProLiant DL380 Gen10/ProLiant DL380 Gen10, BIOS U30 03/08/2022\n[ 7.963026] Workqueue: events work_for_cpu_fn\n[ 7.978275] RIP: 0010:blk_mq_pci_map_queues+0xca/0xd0\n[ 7.978278] Code: 48 89 de 89 c7 e8 f6 0f 4f 00 3b 05 c4 b7 8e 01 72 e1 5b 31 c0 5d 41 5c 41 5d 41 5e 41 5f e9 7d df 73 00 31 c0 e9 76 df 73 00 <0f> 0b eb bc 90 90 0f 1f 44 00 00 41 57 49 89 ff 41 56 41 55 41 54\n[ 7.978280] RSP: 0018:ffffa95fc3707d50 EFLAGS: 00010216\n[ 7.978283] RAX: 00000000ffffffff RBX: 0000000000000000 RCX: 0000000000000010\n[ 7.978284] RDX: 0000000000000004 RSI: 0000000000000000 RDI: ffff9190c32d4310\n[ 7.978286] RBP: 0000000000000000 R08: ffffa95fc3707d38 R09: ffff91929b81ac00\n[ 7.978287] R10: 0000000000000001 R11: ffffa95fc3707ac0 R12: 0000000000000000\n[ 7.978288] R13: ffff9190c32d4000 R14: 00000000ffffffff R15: ffff9190c4c950a8\n[ 7.978290] FS: 0000000000000000(0000) GS:ffff9193efc00000(0000) knlGS:0000000000000000\n[ 7.978292] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 8.172814] CR2: 000055d11166c000 CR3: 00000002dae10002 CR4: 00000000007706f0\n[ 8.172816] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n[ 8.172817] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n[ 8.172818] PKRU: 55555554\n[ 8.172819] Call Trace:\n[ 8.172823] blk_mq_alloc_tag_set+0x12e/0x310\n[ 8.264339] scsi_add_host_with_dma.cold.9+0x30/0x245\n[ 8.279302] pqi_ctrl_init+0xacf/0xc8e [smartpqi]\n[ 8.294085] ? pqi_pci_probe+0x480/0x4c8 [smartpqi]\n[ 8.309015] pqi_pci_probe+0x480/0x4c8 [smartpqi]\n[ 8.323286] local_pci_probe+0x42/0x80\n[ 8.337855] work_for_cpu_fn+0x16/0x20\n[ 8.351193] process_one_work+0x1a7/0x360\n[ 8.364462] ? create_worker+0x1a0/0x1a0\n[ 8.379252] worker_thread+0x1ce/0x390\n[ 8.392623] ? create_worker+0x1a0/0x1a0\n[ 8.406295] kthread+0x10a/0x120\n[ 8.418428] ? set_kthread_struct+0x50/0x50\n[ 8.431532] ret_from_fork+0x1f/0x40\n[ 8.444137] ---[ end trace 1bf0173d39354506 ]---", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26742", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26742", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26742", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26742", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26742", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26742" + } + }, + "CVE-2024-26743": { + "affected_versions": "v2.6.12-rc2 to v6.8-rc6", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "RDMA/qedr: Fix qedr_create_user_qp error flow", + "fixes": "5ba4e6d5863c53e937f49932dee0ecb004c65928", + "last_affected_version": "6.7.6", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/qedr: Fix qedr_create_user_qp error flow\n\nAvoid the following warning by making sure to free the allocated\nresources in case that qedr_init_user_queue() fail.\n\n-----------[ cut here ]-----------\nWARNING: CPU: 0 PID: 143192 at drivers/infiniband/core/rdma_core.c:874 uverbs_destroy_ufile_hw+0xcf/0xf0 [ib_uverbs]\nModules linked in: tls target_core_user uio target_core_pscsi target_core_file target_core_iblock ib_srpt ib_srp scsi_transport_srp nfsd nfs_acl rpcsec_gss_krb5 auth_rpcgss nfsv4 dns_resolver nfs lockd grace fscache netfs 8021q garp mrp stp llc ext4 mbcache jbd2 opa_vnic ib_umad ib_ipoib sunrpc rdma_ucm ib_isert iscsi_target_mod target_core_mod ib_iser libiscsi scsi_transport_iscsi rdma_cm iw_cm ib_cm hfi1 intel_rapl_msr intel_rapl_common mgag200 qedr sb_edac drm_shmem_helper rdmavt x86_pkg_temp_thermal drm_kms_helper intel_powerclamp ib_uverbs coretemp i2c_algo_bit kvm_intel dell_wmi_descriptor ipmi_ssif sparse_keymap kvm ib_core rfkill syscopyarea sysfillrect video sysimgblt irqbypass ipmi_si ipmi_devintf fb_sys_fops rapl iTCO_wdt mxm_wmi iTCO_vendor_support intel_cstate pcspkr dcdbas intel_uncore ipmi_msghandler lpc_ich acpi_power_meter mei_me mei fuse drm xfs libcrc32c qede sd_mod ahci libahci t10_pi sg crct10dif_pclmul crc32_pclmul crc32c_intel qed libata tg3\nghash_clmulni_intel megaraid_sas crc8 wmi [last unloaded: ib_srpt]\nCPU: 0 PID: 143192 Comm: fi_rdm_tagged_p Kdump: loaded Not tainted 5.14.0-408.el9.x86_64 #1\nHardware name: Dell Inc. PowerEdge R430/03XKDV, BIOS 2.14.0 01/25/2022\nRIP: 0010:uverbs_destroy_ufile_hw+0xcf/0xf0 [ib_uverbs]\nCode: 5d 41 5c 41 5d 41 5e e9 0f 26 1b dd 48 89 df e8 67 6a ff ff 49 8b 86 10 01 00 00 48 85 c0 74 9c 4c 89 e7 e8 83 c0 cb dd eb 92 <0f> 0b eb be 0f 0b be 04 00 00 00 48 89 df e8 8e f5 ff ff e9 6d ff\nRSP: 0018:ffffb7c6cadfbc60 EFLAGS: 00010286\nRAX: ffff8f0889ee3f60 RBX: ffff8f088c1a5200 RCX: 00000000802a0016\nRDX: 00000000802a0017 RSI: 0000000000000001 RDI: ffff8f0880042600\nRBP: 0000000000000001 R08: 0000000000000001 R09: 0000000000000000\nR10: ffff8f11fffd5000 R11: 0000000000039000 R12: ffff8f0d5b36cd80\nR13: ffff8f088c1a5250 R14: ffff8f1206d91000 R15: 0000000000000000\nFS: 0000000000000000(0000) GS:ffff8f11d7c00000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000147069200e20 CR3: 00000001c7210002 CR4: 00000000001706f0\nCall Trace:\n\n? show_trace_log_lvl+0x1c4/0x2df\n? show_trace_log_lvl+0x1c4/0x2df\n? ib_uverbs_close+0x1f/0xb0 [ib_uverbs]\n? uverbs_destroy_ufile_hw+0xcf/0xf0 [ib_uverbs]\n? __warn+0x81/0x110\n? uverbs_destroy_ufile_hw+0xcf/0xf0 [ib_uverbs]\n? report_bug+0x10a/0x140\n? handle_bug+0x3c/0x70\n? exc_invalid_op+0x14/0x70\n? asm_exc_invalid_op+0x16/0x20\n? uverbs_destroy_ufile_hw+0xcf/0xf0 [ib_uverbs]\nib_uverbs_close+0x1f/0xb0 [ib_uverbs]\n__fput+0x94/0x250\ntask_work_run+0x5c/0x90\ndo_exit+0x270/0x4a0\ndo_group_exit+0x2d/0x90\nget_signal+0x87c/0x8c0\narch_do_signal_or_restart+0x25/0x100\n? ib_uverbs_ioctl+0xc2/0x110 [ib_uverbs]\nexit_to_user_mode_loop+0x9c/0x130\nexit_to_user_mode_prepare+0xb6/0x100\nsyscall_exit_to_user_mode+0x12/0x40\ndo_syscall_64+0x69/0x90\n? syscall_exit_work+0x103/0x130\n? syscall_exit_to_user_mode+0x22/0x40\n? do_syscall_64+0x69/0x90\n? syscall_exit_work+0x103/0x130\n? syscall_exit_to_user_mode+0x22/0x40\n? do_syscall_64+0x69/0x90\n? do_syscall_64+0x69/0x90\n? common_interrupt+0x43/0xa0\nentry_SYSCALL_64_after_hwframe+0x72/0xdc\nRIP: 0033:0x1470abe3ec6b\nCode: Unable to access opcode bytes at RIP 0x1470abe3ec41.\nRSP: 002b:00007fff13ce9108 EFLAGS: 00000246 ORIG_RAX: 0000000000000010\nRAX: fffffffffffffffc RBX: 00007fff13ce9218 RCX: 00001470abe3ec6b\nRDX: 00007fff13ce9200 RSI: 00000000c0181b01 RDI: 0000000000000004\nRBP: 00007fff13ce91e0 R08: 0000558d9655da10 R09: 0000558d9655dd00\nR10: 00007fff13ce95c0 R11: 0000000000000246 R12: 00007fff13ce9358\nR13: 0000000000000013 R14: 0000558d9655db50 R15: 00007fff13ce9470\n\n--[ end trace 888a9b92e04c5c97 ]--", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26743", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26743", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26743", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26743", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26743", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26743" + } + }, + "CVE-2024-26744": { + "affected_versions": "v3.3-rc1 to v6.8-rc6", + "breaks": "a42d985bd5b234da8b61347a78dc3057bf7bb94d", + "cmt_msg": "RDMA/srpt: Support specifying the srpt_service_guid parameter", + "fixes": "fdfa083549de5d50ebf7f6811f33757781e838c0", + "last_affected_version": "6.7.6", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/srpt: Support specifying the srpt_service_guid parameter\n\nMake loading ib_srpt with this parameter set work. The current behavior is\nthat setting that parameter while loading the ib_srpt kernel module\ntriggers the following kernel crash:\n\nBUG: kernel NULL pointer dereference, address: 0000000000000000\nCall Trace:\n \n parse_one+0x18c/0x1d0\n parse_args+0xe1/0x230\n load_module+0x8de/0xa60\n init_module_from_file+0x8b/0xd0\n idempotent_init_module+0x181/0x240\n __x64_sys_finit_module+0x5a/0xb0\n do_syscall_64+0x5f/0xe0\n entry_SYSCALL_64_after_hwframe+0x6e/0x76", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26744", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26744", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26744", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26744", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26744", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26744" + } + }, + "CVE-2024-26745": { + "affected_versions": "unk to v6.8-rc7", + "breaks": "", + "cmt_msg": "powerpc/pseries/iommu: IOMMU table is not initialized for kdump over SR-IOV", + "fixes": "09a3c1e46142199adcee372a420b024b4fc61051", + "last_affected_version": "6.7.8", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\npowerpc/pseries/iommu: IOMMU table is not initialized for kdump over SR-IOV\n\nWhen kdump kernel tries to copy dump data over SR-IOV, LPAR panics due\nto NULL pointer exception:\n\n Kernel attempted to read user page (0) - exploit attempt? (uid: 0)\n BUG: Kernel NULL pointer dereference on read at 0x00000000\n Faulting instruction address: 0xc000000020847ad4\n Oops: Kernel access of bad area, sig: 11 [#1]\n LE PAGE_SIZE=64K MMU=Radix SMP NR_CPUS=2048 NUMA pSeries\n Modules linked in: mlx5_core(+) vmx_crypto pseries_wdt papr_scm libnvdimm mlxfw tls psample sunrpc fuse overlay squashfs loop\n CPU: 12 PID: 315 Comm: systemd-udevd Not tainted 6.4.0-Test102+ #12\n Hardware name: IBM,9080-HEX POWER10 (raw) 0x800200 0xf000006 of:IBM,FW1060.00 (NH1060_008) hv:phyp pSeries\n NIP: c000000020847ad4 LR: c00000002083b2dc CTR: 00000000006cd18c\n REGS: c000000029162ca0 TRAP: 0300 Not tainted (6.4.0-Test102+)\n MSR: 800000000280b033 CR: 48288244 XER: 00000008\n CFAR: c00000002083b2d8 DAR: 0000000000000000 DSISR: 40000000 IRQMASK: 1\n ...\n NIP _find_next_zero_bit+0x24/0x110\n LR bitmap_find_next_zero_area_off+0x5c/0xe0\n Call Trace:\n dev_printk_emit+0x38/0x48 (unreliable)\n iommu_area_alloc+0xc4/0x180\n iommu_range_alloc+0x1e8/0x580\n iommu_alloc+0x60/0x130\n iommu_alloc_coherent+0x158/0x2b0\n dma_iommu_alloc_coherent+0x3c/0x50\n dma_alloc_attrs+0x170/0x1f0\n mlx5_cmd_init+0xc0/0x760 [mlx5_core]\n mlx5_function_setup+0xf0/0x510 [mlx5_core]\n mlx5_init_one+0x84/0x210 [mlx5_core]\n probe_one+0x118/0x2c0 [mlx5_core]\n local_pci_probe+0x68/0x110\n pci_call_probe+0x68/0x200\n pci_device_probe+0xbc/0x1a0\n really_probe+0x104/0x540\n __driver_probe_device+0xb4/0x230\n driver_probe_device+0x54/0x130\n __driver_attach+0x158/0x2b0\n bus_for_each_dev+0xa8/0x130\n driver_attach+0x34/0x50\n bus_add_driver+0x16c/0x300\n driver_register+0xa4/0x1b0\n __pci_register_driver+0x68/0x80\n mlx5_init+0xb8/0x100 [mlx5_core]\n do_one_initcall+0x60/0x300\n do_init_module+0x7c/0x2b0\n\nAt the time of LPAR dump, before kexec hands over control to kdump\nkernel, DDWs (Dynamic DMA Windows) are scanned and added to the FDT.\nFor the SR-IOV case, default DMA window \"ibm,dma-window\" is removed from\nthe FDT and DDW added, for the device.\n\nNow, kexec hands over control to the kdump kernel.\n\nWhen the kdump kernel initializes, PCI busses are scanned and IOMMU\ngroup/tables created, in pci_dma_bus_setup_pSeriesLP(). For the SR-IOV\ncase, there is no \"ibm,dma-window\". The original commit: b1fc44eaa9ba,\nfixes the path where memory is pre-mapped (direct mapped) to the DDW.\nWhen TCEs are direct mapped, there is no need to initialize IOMMU\ntables.\n\niommu_table_setparms_lpar() only considers \"ibm,dma-window\" property\nwhen initiallizing IOMMU table. In the scenario where TCEs are\ndynamically allocated for SR-IOV, newly created IOMMU table is not\ninitialized. Later, when the device driver tries to enter TCEs for the\nSR-IOV device, NULL pointer execption is thrown from iommu_area_alloc().\n\nThe fix is to initialize the IOMMU table with DDW property stored in the\nFDT. There are 2 points to remember:\n\n\t1. For the dedicated adapter, kdump kernel would encounter both\n\t default and DDW in FDT. In this case, DDW property is used to\n\t initialize the IOMMU table.\n\n\t2. A DDW could be direct or dynamic mapped. kdump kernel would\n\t initialize IOMMU table and mark the existing DDW as\n\t \"dynamic\". This works fine since, at the time of table\n\t initialization, iommu_table_clear() makes some space in the\n\t DDW, for some predefined number of TCEs which are needed for\n\t kdump to succeed.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26745", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26745", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26745", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26745", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26745", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26745" + } + }, + "CVE-2024-26746": { + "affected_versions": "v6.4-rc1 to v6.8-rc7", + "breaks": "c2f156bf168fb42cd6ecd0a8e2204dbe542b8516", + "cmt_msg": "dmaengine: idxd: Ensure safe user copy of completion record", + "fixes": "d3ea125df37dc37972d581b74a5d3785c3f283ab", + "last_affected_version": "6.7.8", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndmaengine: idxd: Ensure safe user copy of completion record\n\nIf CONFIG_HARDENED_USERCOPY is enabled, copying completion record from\nevent log cache to user triggers a kernel bug.\n\n[ 1987.159822] usercopy: Kernel memory exposure attempt detected from SLUB object 'dsa0' (offset 74, size 31)!\n[ 1987.170845] ------------[ cut here ]------------\n[ 1987.176086] kernel BUG at mm/usercopy.c:102!\n[ 1987.180946] invalid opcode: 0000 [#1] PREEMPT SMP NOPTI\n[ 1987.186866] CPU: 17 PID: 528 Comm: kworker/17:1 Not tainted 6.8.0-rc2+ #5\n[ 1987.194537] Hardware name: Intel Corporation AvenueCity/AvenueCity, BIOS BHSDCRB1.86B.2492.D03.2307181620 07/18/2023\n[ 1987.206405] Workqueue: wq0.0 idxd_evl_fault_work [idxd]\n[ 1987.212338] RIP: 0010:usercopy_abort+0x72/0x90\n[ 1987.217381] Code: 58 65 9c 50 48 c7 c2 17 85 61 9c 57 48 c7 c7 98 fd 6b 9c 48 0f 44 d6 48 c7 c6 b3 08 62 9c 4c 89 d1 49 0f 44 f3 e8 1e 2e d5 ff <0f> 0b 49 c7 c1 9e 42 61 9c 4c 89 cf 4d 89 c8 eb a9 66 66 2e 0f 1f\n[ 1987.238505] RSP: 0018:ff62f5cf20607d60 EFLAGS: 00010246\n[ 1987.244423] RAX: 000000000000005f RBX: 000000000000001f RCX: 0000000000000000\n[ 1987.252480] RDX: 0000000000000000 RSI: ffffffff9c61429e RDI: 00000000ffffffff\n[ 1987.260538] RBP: ff62f5cf20607d78 R08: ff2a6a89ef3fffe8 R09: 00000000fffeffff\n[ 1987.268595] R10: ff2a6a89eed00000 R11: 0000000000000003 R12: ff2a66934849c89a\n[ 1987.276652] R13: 0000000000000001 R14: ff2a66934849c8b9 R15: ff2a66934849c899\n[ 1987.284710] FS: 0000000000000000(0000) GS:ff2a66b22fe40000(0000) knlGS:0000000000000000\n[ 1987.293850] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 1987.300355] CR2: 00007fe291a37000 CR3: 000000010fbd4005 CR4: 0000000000f71ef0\n[ 1987.308413] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n[ 1987.316470] DR3: 0000000000000000 DR6: 00000000fffe07f0 DR7: 0000000000000400\n[ 1987.324527] PKRU: 55555554\n[ 1987.327622] Call Trace:\n[ 1987.330424] \n[ 1987.332826] ? show_regs+0x6e/0x80\n[ 1987.336703] ? die+0x3c/0xa0\n[ 1987.339988] ? do_trap+0xd4/0xf0\n[ 1987.343662] ? do_error_trap+0x75/0xa0\n[ 1987.347922] ? usercopy_abort+0x72/0x90\n[ 1987.352277] ? exc_invalid_op+0x57/0x80\n[ 1987.356634] ? usercopy_abort+0x72/0x90\n[ 1987.360988] ? asm_exc_invalid_op+0x1f/0x30\n[ 1987.365734] ? usercopy_abort+0x72/0x90\n[ 1987.370088] __check_heap_object+0xb7/0xd0\n[ 1987.374739] __check_object_size+0x175/0x2d0\n[ 1987.379588] idxd_copy_cr+0xa9/0x130 [idxd]\n[ 1987.384341] idxd_evl_fault_work+0x127/0x390 [idxd]\n[ 1987.389878] process_one_work+0x13e/0x300\n[ 1987.394435] ? __pfx_worker_thread+0x10/0x10\n[ 1987.399284] worker_thread+0x2f7/0x420\n[ 1987.403544] ? _raw_spin_unlock_irqrestore+0x2b/0x50\n[ 1987.409171] ? __pfx_worker_thread+0x10/0x10\n[ 1987.414019] kthread+0x107/0x140\n[ 1987.417693] ? __pfx_kthread+0x10/0x10\n[ 1987.421954] ret_from_fork+0x3d/0x60\n[ 1987.426019] ? __pfx_kthread+0x10/0x10\n[ 1987.430281] ret_from_fork_asm+0x1b/0x30\n[ 1987.434744] \n\nThe issue arises because event log cache is created using\nkmem_cache_create() which is not suitable for user copy.\n\nFix the issue by creating event log cache with\nkmem_cache_create_usercopy(), ensuring safe user copy.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26746", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26746", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26746", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26746", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26746", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26746" + } + }, + "CVE-2024-26747": { + "affected_versions": "v4.19-rc6 to v6.8-rc6", + "breaks": "5c54fcac9a9de559b444ac63ec3cd82f1d157a0b", + "cmt_msg": "usb: roles: fix NULL pointer issue when put module's reference", + "fixes": "1c9be13846c0b2abc2480602f8ef421360e1ad9e", + "last_affected_version": "6.7.6", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: roles: fix NULL pointer issue when put module's reference\n\nIn current design, usb role class driver will get usb_role_switch parent's\nmodule reference after the user get usb_role_switch device and put the\nreference after the user put the usb_role_switch device. However, the\nparent device of usb_role_switch may be removed before the user put the\nusb_role_switch. If so, then, NULL pointer issue will be met when the user\nput the parent module's reference.\n\nThis will save the module pointer in structure of usb_role_switch. Then,\nwe don't need to find module by iterating long relations.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26747", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26747", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26747", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26747", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26747", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26747" + } + }, + "CVE-2024-26748": { + "affected_versions": "unk to v6.8-rc6", + "breaks": "", + "cmt_msg": "usb: cdns3: fix memory double free when handle zero packet", + "fixes": "5fd9e45f1ebcd57181358af28506e8a661a260b3", + "last_affected_version": "6.7.6", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: cdns3: fix memory double free when handle zero packet\n\n829 if (request->complete) {\n830 spin_unlock(&priv_dev->lock);\n831 usb_gadget_giveback_request(&priv_ep->endpoint,\n832 request);\n833 spin_lock(&priv_dev->lock);\n834 }\n835\n836 if (request->buf == priv_dev->zlp_buf)\n837 cdns3_gadget_ep_free_request(&priv_ep->endpoint, request);\n\nDriver append an additional zero packet request when queue a packet, which\nlength mod max packet size is 0. When transfer complete, run to line 831,\nusb_gadget_giveback_request() will free this requestion. 836 condition is\ntrue, so cdns3_gadget_ep_free_request() free this request again.\n\nLog:\n\n[ 1920.140696][ T150] BUG: KFENCE: use-after-free read in cdns3_gadget_giveback+0x134/0x2c0 [cdns3]\n[ 1920.140696][ T150]\n[ 1920.151837][ T150] Use-after-free read at 0x000000003d1cd10b (in kfence-#36):\n[ 1920.159082][ T150] cdns3_gadget_giveback+0x134/0x2c0 [cdns3]\n[ 1920.164988][ T150] cdns3_transfer_completed+0x438/0x5f8 [cdns3]\n\nAdd check at line 829, skip call usb_gadget_giveback_request() if it is\nadditional zero length packet request. Needn't call\nusb_gadget_giveback_request() because it is allocated in this driver.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26748", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26748", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26748", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26748", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26748", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26748" + } + }, + "CVE-2024-26749": { + "affected_versions": "v5.4-rc1 to v6.8-rc6", + "breaks": "7733f6c32e36ff9d7adadf40001039bf219b1cbe", + "cmt_msg": "usb: cdns3: fixed memory use after free at cdns3_gadget_ep_disable()", + "fixes": "cd45f99034b0c8c9cb346dd0d6407a95ca3d36f6", + "last_affected_version": "6.7.6", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: cdns3: fixed memory use after free at cdns3_gadget_ep_disable()\n\n ...\n cdns3_gadget_ep_free_request(&priv_ep->endpoint, &priv_req->request);\n list_del_init(&priv_req->list);\n ...\n\n'priv_req' actually free at cdns3_gadget_ep_free_request(). But\nlist_del_init() use priv_req->list after it.\n\n[ 1542.642868][ T534] BUG: KFENCE: use-after-free read in __list_del_entry_valid+0x10/0xd4\n[ 1542.642868][ T534]\n[ 1542.653162][ T534] Use-after-free read at 0x000000009ed0ba99 (in kfence-#3):\n[ 1542.660311][ T534] __list_del_entry_valid+0x10/0xd4\n[ 1542.665375][ T534] cdns3_gadget_ep_disable+0x1f8/0x388 [cdns3]\n[ 1542.671571][ T534] usb_ep_disable+0x44/0xe4\n[ 1542.675948][ T534] ffs_func_eps_disable+0x64/0xc8\n[ 1542.680839][ T534] ffs_func_set_alt+0x74/0x368\n[ 1542.685478][ T534] ffs_func_disable+0x18/0x28\n\nMove list_del_init() before cdns3_gadget_ep_free_request() to resolve this\nproblem.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26749", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26749", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26749", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26749", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26749", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26749" + } + }, + "CVE-2024-26750": { + "affected_versions": "v6.8-rc5 to v6.8-rc6", + "breaks": "25236c91b5ab4a26a56ba2e79b8060cf4e047839", + "fixes": "aa82ac51d63328714645c827775d64dbfd9941f3", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\naf_unix: Drop oob_skb ref before purging queue in GC.\n\nsyzbot reported another task hung in __unix_gc(). [0]\n\nThe current while loop assumes that all of the left candidates\nhave oob_skb and calling kfree_skb(oob_skb) releases the remaining\ncandidates.\n\nHowever, I missed a case that oob_skb has self-referencing fd and\nanother fd and the latter sk is placed before the former in the\ncandidate list. Then, the while loop never proceeds, resulting\nthe task hung.\n\n__unix_gc() has the same loop just before purging the collected skb,\nso we can call kfree_skb(oob_skb) there and let __skb_queue_purge()\nrelease all inflight sockets.\n\n[0]:\nSending NMI from CPU 0 to CPUs 1:\nNMI backtrace for cpu 1\nCPU: 1 PID: 2784 Comm: kworker/u4:8 Not tainted 6.8.0-rc4-syzkaller-01028-g71b605d32017 #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024\nWorkqueue: events_unbound __unix_gc\nRIP: 0010:__sanitizer_cov_trace_pc+0x0/0x70 kernel/kcov.c:200\nCode: 89 fb e8 23 00 00 00 48 8b 3d 84 f5 1a 0c 48 89 de 5b e9 43 26 57 00 0f 1f 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 0f 1e fa 48 8b 04 24 65 48 8b 0d 90 52 70 7e 65 8b 15 91 52 70\nRSP: 0018:ffffc9000a17fa78 EFLAGS: 00000287\nRAX: ffffffff8a0a6108 RBX: ffff88802b6c2640 RCX: ffff88802c0b3b80\nRDX: 0000000000000000 RSI: 0000000000000002 RDI: 0000000000000000\nRBP: ffffc9000a17fbf0 R08: ffffffff89383f1d R09: 1ffff1100ee5ff84\nR10: dffffc0000000000 R11: ffffed100ee5ff85 R12: 1ffff110056d84ee\nR13: ffffc9000a17fae0 R14: 0000000000000000 R15: ffffffff8f47b840\nFS: 0000000000000000(0000) GS:ffff8880b9500000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007ffef5687ff8 CR3: 0000000029b34000 CR4: 00000000003506f0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n \n \n \n __unix_gc+0xe69/0xf40 net/unix/garbage.c:343\n process_one_work kernel/workqueue.c:2633 [inline]\n process_scheduled_works+0x913/0x1420 kernel/workqueue.c:2706\n worker_thread+0xa5f/0x1000 kernel/workqueue.c:2787\n kthread+0x2ef/0x390 kernel/kthread.c:388\n ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147\n ret_from_fork_asm+0x1b/0x30 arch/x86/entry/entry_64.S:242\n ", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26750", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26750", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26750", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26750", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26750", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26750" + } + }, + "CVE-2024-26751": { + "affected_versions": "v4.15-rc1 to v6.8-rc6", + "breaks": "b2e63555592f81331c8da3afaa607d8cf83e8138", + "cmt_msg": "ARM: ep93xx: Add terminator to gpiod_lookup_table", + "fixes": "fdf87a0dc26d0550c60edc911cda42f9afec3557", + "last_affected_version": "6.7.6", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nARM: ep93xx: Add terminator to gpiod_lookup_table\n\nWithout the terminator, if a con_id is passed to gpio_find() that\ndoes not exist in the lookup table the function will not stop looping\ncorrectly, and eventually cause an oops.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26751", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26751", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26751", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26751", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26751", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26751" + } + }, + "CVE-2024-26752": { + "affected_versions": "unk to v6.8-rc6", + "breaks": "", + "cmt_msg": "l2tp: pass correct message length to ip6_append_data", + "fixes": "359e54a93ab43d32ee1bff3c2f9f10cb9f6b6e79", + "last_affected_version": "6.7.6", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nl2tp: pass correct message length to ip6_append_data\n\nl2tp_ip6_sendmsg needs to avoid accounting for the transport header\ntwice when splicing more data into an already partially-occupied skbuff.\n\nTo manage this, we check whether the skbuff contains data using\nskb_queue_empty when deciding how much data to append using\nip6_append_data.\n\nHowever, the code which performed the calculation was incorrect:\n\n ulen = len + skb_queue_empty(&sk->sk_write_queue) ? transhdrlen : 0;\n\n...due to C operator precedence, this ends up setting ulen to\ntranshdrlen for messages with a non-zero length, which results in\ncorrupted packets on the wire.\n\nAdd parentheses to correct the calculation in line with the original\nintent.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26752", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26752", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26752", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26752", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26752", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26752" + } + }, + "CVE-2024-26753": { + "affected_versions": "v5.18-rc1 to v6.8-rc6", + "breaks": "59ca6c93387d325e96577d8bd4c23c78c1491c11", + "cmt_msg": "crypto: virtio/akcipher - Fix stack overflow on memcpy", + "fixes": "c0ec2a712daf133d9996a8a1b7ee2d4996080363", + "last_affected_version": "6.7.6", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: virtio/akcipher - Fix stack overflow on memcpy\n\nsizeof(struct virtio_crypto_akcipher_session_para) is less than\nsizeof(struct virtio_crypto_op_ctrl_req::u), copying more bytes from\nstack variable leads stack overflow. Clang reports this issue by\ncommands:\nmake -j CC=clang-14 mrproper >/dev/null 2>&1\nmake -j O=/tmp/crypto-build CC=clang-14 allmodconfig >/dev/null 2>&1\nmake -j O=/tmp/crypto-build W=1 CC=clang-14 drivers/crypto/virtio/\n virtio_crypto_akcipher_algs.o", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26753", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26753", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26753", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26753", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26753", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26753" + } + }, + "CVE-2024-26754": { + "affected_versions": "v4.7-rc1 to v6.8-rc6", + "breaks": "459aa660eb1d8ce67080da1983bb81d716aa5a69", + "cmt_msg": "gtp: fix use-after-free and null-ptr-deref in gtp_genl_dump_pdp()", + "fixes": "136cfaca22567a03bbb3bf53a43d8cb5748b80ec", + "last_affected_version": "6.7.6", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\ngtp: fix use-after-free and null-ptr-deref in gtp_genl_dump_pdp()\n\nThe gtp_net_ops pernet operations structure for the subsystem must be\nregistered before registering the generic netlink family.\n\nSyzkaller hit 'general protection fault in gtp_genl_dump_pdp' bug:\n\ngeneral protection fault, probably for non-canonical address\n0xdffffc0000000002: 0000 [#1] PREEMPT SMP KASAN NOPTI\nKASAN: null-ptr-deref in range [0x0000000000000010-0x0000000000000017]\nCPU: 1 PID: 5826 Comm: gtp Not tainted 6.8.0-rc3-std-def-alt1 #1\nHardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.0-alt1 04/01/2014\nRIP: 0010:gtp_genl_dump_pdp+0x1be/0x800 [gtp]\nCode: c6 89 c6 e8 64 e9 86 df 58 45 85 f6 0f 85 4e 04 00 00 e8 c5 ee 86\n df 48 8b 54 24 18 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 <80>\n 3c 02 00 0f 85 de 05 00 00 48 8b 44 24 18 4c 8b 30 4c 39 f0 74\nRSP: 0018:ffff888014107220 EFLAGS: 00010202\nRAX: dffffc0000000000 RBX: 0000000000000000 RCX: 0000000000000000\nRDX: 0000000000000002 RSI: 0000000000000000 RDI: 0000000000000000\nRBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000\nR10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000\nR13: ffff88800fcda588 R14: 0000000000000001 R15: 0000000000000000\nFS: 00007f1be4eb05c0(0000) GS:ffff88806ce80000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007f1be4e766cf CR3: 000000000c33e000 CR4: 0000000000750ef0\nPKRU: 55555554\nCall Trace:\n \n ? show_regs+0x90/0xa0\n ? die_addr+0x50/0xd0\n ? exc_general_protection+0x148/0x220\n ? asm_exc_general_protection+0x22/0x30\n ? gtp_genl_dump_pdp+0x1be/0x800 [gtp]\n ? __alloc_skb+0x1dd/0x350\n ? __pfx___alloc_skb+0x10/0x10\n genl_dumpit+0x11d/0x230\n netlink_dump+0x5b9/0xce0\n ? lockdep_hardirqs_on_prepare+0x253/0x430\n ? __pfx_netlink_dump+0x10/0x10\n ? kasan_save_track+0x10/0x40\n ? __kasan_kmalloc+0x9b/0xa0\n ? genl_start+0x675/0x970\n __netlink_dump_start+0x6fc/0x9f0\n genl_family_rcv_msg_dumpit+0x1bb/0x2d0\n ? __pfx_genl_family_rcv_msg_dumpit+0x10/0x10\n ? genl_op_from_small+0x2a/0x440\n ? cap_capable+0x1d0/0x240\n ? __pfx_genl_start+0x10/0x10\n ? __pfx_genl_dumpit+0x10/0x10\n ? __pfx_genl_done+0x10/0x10\n ? security_capable+0x9d/0xe0", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26754", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26754", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26754", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26754", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26754", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26754" + } + }, + "CVE-2024-26755": { + "affected_versions": "v6.7-rc1 to v6.8-rc6", + "breaks": "bc08041b32abe6c9824f78735bac22018eabfc06", + "cmt_msg": "md: Don't suspend the array for interrupted reshape", + "fixes": "9e46c70e829bddc24e04f963471e9983a11598b7", + "last_affected_version": "6.7.6", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmd: Don't suspend the array for interrupted reshape\n\nmd_start_sync() will suspend the array if there are spares that can be\nadded or removed from conf, however, if reshape is still in progress,\nthis won't happen at all or data will be corrupted(remove_and_add_spares\nwon't be called from md_choose_sync_action for reshape), hence there is\nno need to suspend the array if reshape is not done yet.\n\nMeanwhile, there is a potential deadlock for raid456:\n\n1) reshape is interrupted;\n\n2) set one of the disk WantReplacement, and add a new disk to the array,\n however, recovery won't start until the reshape is finished;\n\n3) then issue an IO across reshpae position, this IO will wait for\n reshape to make progress;\n\n4) continue to reshape, then md_start_sync() found there is a spare disk\n that can be added to conf, mddev_suspend() is called;\n\nStep 4 and step 3 is waiting for each other, deadlock triggered. Noted\nthis problem is found by code review, and it's not reporduced yet.\n\nFix this porblem by don't suspend the array for interrupted reshape,\nthis is safe because conf won't be changed until reshape is done.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26755", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26755", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26755", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26755", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26755", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26755" + } + }, + "CVE-2024-26756": { + "affected_versions": "v2.6.17-rc1 to v6.8-rc6", + "breaks": "f67055780caac6a99f43834795c43acf99eba6a6", + "cmt_msg": "md: Don't register sync_thread for reshape directly", + "fixes": "ad39c08186f8a0f221337985036ba86731d6aafe", + "last_affected_version": "6.7.6", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmd: Don't register sync_thread for reshape directly\n\nCurrently, if reshape is interrupted, then reassemble the array will\nregister sync_thread directly from pers->run(), in this case\n'MD_RECOVERY_RUNNING' is set directly, however, there is no guarantee\nthat md_do_sync() will be executed, hence stop_sync_thread() will hang\nbecause 'MD_RECOVERY_RUNNING' can't be cleared.\n\nLast patch make sure that md_do_sync() will set MD_RECOVERY_DONE,\nhowever, following hang can still be triggered by dm-raid test\nshell/lvconvert-raid-reshape.sh occasionally:\n\n[root@fedora ~]# cat /proc/1982/stack\n[<0>] stop_sync_thread+0x1ab/0x270 [md_mod]\n[<0>] md_frozen_sync_thread+0x5c/0xa0 [md_mod]\n[<0>] raid_presuspend+0x1e/0x70 [dm_raid]\n[<0>] dm_table_presuspend_targets+0x40/0xb0 [dm_mod]\n[<0>] __dm_destroy+0x2a5/0x310 [dm_mod]\n[<0>] dm_destroy+0x16/0x30 [dm_mod]\n[<0>] dev_remove+0x165/0x290 [dm_mod]\n[<0>] ctl_ioctl+0x4bb/0x7b0 [dm_mod]\n[<0>] dm_ctl_ioctl+0x11/0x20 [dm_mod]\n[<0>] vfs_ioctl+0x21/0x60\n[<0>] __x64_sys_ioctl+0xb9/0xe0\n[<0>] do_syscall_64+0xc6/0x230\n[<0>] entry_SYSCALL_64_after_hwframe+0x6c/0x74\n\nMeanwhile mddev->recovery is:\nMD_RECOVERY_RUNNING |\nMD_RECOVERY_INTR |\nMD_RECOVERY_RESHAPE |\nMD_RECOVERY_FROZEN\n\nFix this problem by remove the code to register sync_thread directly\nfrom raid10 and raid5. And let md_check_recovery() to register\nsync_thread.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26756", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26756", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26756", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26756", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26756", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26756" + } + }, + "CVE-2024-26757": { + "affected_versions": "v4.8-rc1 to v6.8-rc6", + "breaks": "ecbfb9f118bce49f571675929160e4ecef91cc8a", + "cmt_msg": "md: Don't ignore read-only array in md_check_recovery()", + "fixes": "55a48ad2db64737f7ffc0407634218cc6e4c513b", + "last_affected_version": "6.7.6", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmd: Don't ignore read-only array in md_check_recovery()\n\nUsually if the array is not read-write, md_check_recovery() won't\nregister new sync_thread in the first place. And if the array is\nread-write and sync_thread is registered, md_set_readonly() will\nunregister sync_thread before setting the array read-only. md/raid\nfollow this behavior hence there is no problem.\n\nAfter commit f52f5c71f3d4 (\"md: fix stopping sync thread\"), following\nhang can be triggered by test shell/integrity-caching.sh:\n\n1) array is read-only. dm-raid update super block:\nrs_update_sbs\n ro = mddev->ro\n mddev->ro = 0\n -> set array read-write\n md_update_sb\n\n2) register new sync thread concurrently.\n\n3) dm-raid set array back to read-only:\nrs_update_sbs\n mddev->ro = ro\n\n4) stop the array:\nraid_dtr\n md_stop\n stop_sync_thread\n set_bit(MD_RECOVERY_INTR, &mddev->recovery);\n md_wakeup_thread_directly(mddev->sync_thread);\n wait_event(..., !test_bit(MD_RECOVERY_RUNNING, &mddev->recovery))\n\n5) sync thread done:\n md_do_sync\n set_bit(MD_RECOVERY_DONE, &mddev->recovery);\n md_wakeup_thread(mddev->thread);\n\n6) daemon thread can't unregister sync thread:\n md_check_recovery\n if (!md_is_rdwr(mddev) &&\n !test_bit(MD_RECOVERY_NEEDED, &mddev->recovery))\n return;\n -> -> MD_RECOVERY_RUNNING can't be cleared, hence step 4 hang;\n\nThe root cause is that dm-raid manipulate 'mddev->ro' by itself,\nhowever, dm-raid really should stop sync thread before setting the\narray read-only. Unfortunately, I need to read more code before I\ncan refacter the handler of 'mddev->ro' in dm-raid, hence let's fix\nthe problem the easy way for now to prevent dm-raid regression.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26757", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26757", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26757", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26757", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26757", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26757" + } + }, + "CVE-2024-26758": { + "affected_versions": "v3.0-rc4 to v6.8-rc6", + "breaks": "68866e425be2ef2664aa5c691bb3ab789736acf5", + "cmt_msg": "md: Don't ignore suspended array in md_check_recovery()", + "fixes": "1baae052cccd08daf9a9d64c3f959d8cdb689757", + "last_affected_version": "6.7.6", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmd: Don't ignore suspended array in md_check_recovery()\n\nmddev_suspend() never stop sync_thread, hence it doesn't make sense to\nignore suspended array in md_check_recovery(), which might cause\nsync_thread can't be unregistered.\n\nAfter commit f52f5c71f3d4 (\"md: fix stopping sync thread\"), following\nhang can be triggered by test shell/integrity-caching.sh:\n\n1) suspend the array:\nraid_postsuspend\n mddev_suspend\n\n2) stop the array:\nraid_dtr\n md_stop\n __md_stop_writes\n stop_sync_thread\n set_bit(MD_RECOVERY_INTR, &mddev->recovery);\n md_wakeup_thread_directly(mddev->sync_thread);\n wait_event(..., !test_bit(MD_RECOVERY_RUNNING, &mddev->recovery))\n\n3) sync thread done:\nmd_do_sync\n set_bit(MD_RECOVERY_DONE, &mddev->recovery);\n md_wakeup_thread(mddev->thread);\n\n4) daemon thread can't unregister sync thread:\nmd_check_recovery\n if (mddev->suspended)\n return; -> return directly\n md_read_sync_thread\n clear_bit(MD_RECOVERY_RUNNING, &mddev->recovery);\n -> MD_RECOVERY_RUNNING can't be cleared, hence step 2 hang;\n\nThis problem is not just related to dm-raid, fix it by ignoring\nsuspended array in md_check_recovery(). And follow up patches will\nimprove dm-raid better to frozen sync thread during suspend.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26758", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26758", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26758", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26758", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26758", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26758" + } + }, + "CVE-2024-26759": { + "affected_versions": "unk to v6.8-rc6", + "breaks": "", + "cmt_msg": "mm/swap: fix race when skipping swapcache", + "fixes": "13ddaf26be324a7f951891ecd9ccd04466d27458", + "last_affected_version": "6.7.6", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm/swap: fix race when skipping swapcache\n\nWhen skipping swapcache for SWP_SYNCHRONOUS_IO, if two or more threads\nswapin the same entry at the same time, they get different pages (A, B). \nBefore one thread (T0) finishes the swapin and installs page (A) to the\nPTE, another thread (T1) could finish swapin of page (B), swap_free the\nentry, then swap out the possibly modified page reusing the same entry. \nIt breaks the pte_same check in (T0) because PTE value is unchanged,\ncausing ABA problem. Thread (T0) will install a stalled page (A) into the\nPTE and cause data corruption.\n\nOne possible callstack is like this:\n\nCPU0 CPU1\n---- ----\ndo_swap_page() do_swap_page() with same entry\n \n \nswap_read_folio() <- read to page A swap_read_folio() <- read to page B\n \n... set_pte_at()\n swap_free() <- entry is free\n \n \npte_same() <- Check pass, PTE seems\n unchanged, but page A\n is stalled!\nswap_free() <- page B content lost!\nset_pte_at() <- staled page A installed!\n\nAnd besides, for ZRAM, swap_free() allows the swap device to discard the\nentry content, so even if page (B) is not modified, if swap_read_folio()\non CPU0 happens later than swap_free() on CPU1, it may also cause data\nloss.\n\nTo fix this, reuse swapcache_prepare which will pin the swap entry using\nthe cache flag, and allow only one thread to swap it in, also prevent any\nparallel code from putting the entry in the cache. Release the pin after\nPT unlocked.\n\nRacers just loop and wait since it's a rare and very short event. A\nschedule_timeout_uninterruptible(1) call is added to avoid repeated page\nfaults wasting too much CPU, causing livelock or adding too much noise to\nperf statistics. A similar livelock issue was described in commit\n029c4628b2eb (\"mm: swap: get rid of livelock in swapin readahead\")\n\nReproducer:\n\nThis race issue can be triggered easily using a well constructed\nreproducer and patched brd (with a delay in read path) [1]:\n\nWith latest 6.8 mainline, race caused data loss can be observed easily:\n$ gcc -g -lpthread test-thread-swap-race.c && ./a.out\n Polulating 32MB of memory region...\n Keep swapping out...\n Starting round 0...\n Spawning 65536 workers...\n 32746 workers spawned, wait for done...\n Round 0: Error on 0x5aa00, expected 32746, got 32743, 3 data loss!\n Round 0: Error on 0x395200, expected 32746, got 32743, 3 data loss!\n Round 0: Error on 0x3fd000, expected 32746, got 32737, 9 data loss!\n Round 0 Failed, 15 data loss!\n\nThis reproducer spawns multiple threads sharing the same memory region\nusing a small swap device. Every two threads updates mapped pages one by\none in opposite direction trying to create a race, with one dedicated\nthread keep swapping out the data out using madvise.\n\nThe reproducer created a reproduce rate of about once every 5 minutes, so\nthe race should be totally possible in production.\n\nAfter this patch, I ran the reproducer for over a few hundred rounds and\nno data loss observed.\n\nPerformance overhead is minimal, microbenchmark swapin 10G from 32G\nzram:\n\nBefore: 10934698 us\nAfter: 11157121 us\nCached: 13155355 us (Dropping SWP_SYNCHRONOUS_IO flag)\n\n[kasong@tencent.com: v4]\n Link: https://lkml.kernel.org/r/20240219082040.7495-1-ryncsn@gmail.com", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26759", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26759", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26759", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26759", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26759", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26759" + } + }, + "CVE-2024-26760": { + "affected_versions": "v5.19-rc1 to v6.8-rc6", + "breaks": "066ff571011d8416e903d3d4f1f41e0b5eb91e1d", + "cmt_msg": "scsi: target: pscsi: Fix bio_put() for error case", + "fixes": "de959094eb2197636f7c803af0943cb9d3b35804", + "last_affected_version": "6.7.6", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: target: pscsi: Fix bio_put() for error case\n\nAs of commit 066ff571011d (\"block: turn bio_kmalloc into a simple kmalloc\nwrapper\"), a bio allocated by bio_kmalloc() must be freed by bio_uninit()\nand kfree(). That is not done properly for the error case, hitting WARN and\nNULL pointer dereference in bio_free().", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26760", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26760", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26760", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26760", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26760", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26760" + } + }, + "CVE-2024-26761": { + "affected_versions": "v5.19-rc1 to v6.8-rc6", + "breaks": "34e37b4c432cd0f1842b352fde4b8878b4166888", + "cmt_msg": "cxl/pci: Fix disabling memory if DVSEC CXL Range does not match a CFMWS window", + "fixes": "0cab687205986491302cd2e440ef1d253031c221", + "last_affected_version": "6.7.6", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncxl/pci: Fix disabling memory if DVSEC CXL Range does not match a CFMWS window\n\nThe Linux CXL subsystem is built on the assumption that HPA == SPA.\nThat is, the host physical address (HPA) the HDM decoder registers are\nprogrammed with are system physical addresses (SPA).\n\nDuring HDM decoder setup, the DVSEC CXL range registers (cxl-3.1,\n8.1.3.8) are checked if the memory is enabled and the CXL range is in\na HPA window that is described in a CFMWS structure of the CXL host\nbridge (cxl-3.1, 9.18.1.3).\n\nNow, if the HPA is not an SPA, the CXL range does not match a CFMWS\nwindow and the CXL memory range will be disabled then. The HDM decoder\nstops working which causes system memory being disabled and further a\nsystem hang during HDM decoder initialization, typically when a CXL\nenabled kernel boots.\n\nPrevent a system hang and do not disable the HDM decoder if the\ndecoder's CXL range is not found in a CFMWS window.\n\nNote the change only fixes a hardware hang, but does not implement\nHPA/SPA translation. Support for this can be added in a follow on\npatch series.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26761", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26761", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26761", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26761", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26761", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26761" + } + }, + "CVE-2024-26762": { + "affected_versions": "v6.7-rc1 to v6.8-rc6", + "breaks": "6ac07883dbb5f60f7bc56a13b7a84a382aa9c1ab", + "cmt_msg": "cxl/pci: Skip to handle RAS errors if CXL.mem device is detached", + "fixes": "eef5c7b28dbecd6b141987a96db6c54e49828102", + "last_affected_version": "6.7.6", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncxl/pci: Skip to handle RAS errors if CXL.mem device is detached\n\nThe PCI AER model is an awkward fit for CXL error handling. While the\nexpectation is that a PCI device can escalate to link reset to recover\nfrom an AER event, the same reset on CXL amounts to a surprise memory\nhotplug of massive amounts of memory.\n\nAt present, the CXL error handler attempts some optimistic error\nhandling to unbind the device from the cxl_mem driver after reaping some\nRAS register values. This results in a \"hopeful\" attempt to unplug the\nmemory, but there is no guarantee that will succeed.\n\nA subsequent AER notification after the memdev unbind event can no\nlonger assume the registers are mapped. Check for memdev bind before\nreaping status register values to avoid crashes of the form:\n\n BUG: unable to handle page fault for address: ffa00000195e9100\n #PF: supervisor read access in kernel mode\n #PF: error_code(0x0000) - not-present page\n [...]\n RIP: 0010:__cxl_handle_ras+0x30/0x110 [cxl_core]\n [...]\n Call Trace:\n \n ? __die+0x24/0x70\n ? page_fault_oops+0x82/0x160\n ? kernelmode_fixup_or_oops+0x84/0x110\n ? exc_page_fault+0x113/0x170\n ? asm_exc_page_fault+0x26/0x30\n ? __pfx_dpc_reset_link+0x10/0x10\n ? __cxl_handle_ras+0x30/0x110 [cxl_core]\n ? find_cxl_port+0x59/0x80 [cxl_core]\n cxl_handle_rp_ras+0xbc/0xd0 [cxl_core]\n cxl_error_detected+0x6c/0xf0 [cxl_core]\n report_error_detected+0xc7/0x1c0\n pci_walk_bus+0x73/0x90\n pcie_do_recovery+0x23f/0x330\n\nLonger term, the unbind and PCI_ERS_RESULT_DISCONNECT behavior might\nneed to be replaced with a new PCI_ERS_RESULT_PANIC.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26762", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26762", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26762", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26762", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26762", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26762" + } + }, + "CVE-2024-26763": { + "affected_versions": "v2.6.12-rc2 to v6.8-rc6", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "dm-crypt: don't modify the data when using authenticated encryption", + "fixes": "50c70240097ce41fe6bce6478b80478281e4d0f7", + "last_affected_version": "6.7.6", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndm-crypt: don't modify the data when using authenticated encryption\n\nIt was said that authenticated encryption could produce invalid tag when\nthe data that is being encrypted is modified [1]. So, fix this problem by\ncopying the data into the clone bio first and then encrypt them inside the\nclone bio.\n\nThis may reduce performance, but it is needed to prevent the user from\ncorrupting the device by writing data with O_DIRECT and modifying them at\nthe same time.\n\n[1] https://lore.kernel.org/all/20240207004723.GA35324@sol.localdomain/T/", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26763", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26763", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26763", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26763", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26763", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26763" + } + }, + "CVE-2024-26764": { + "affected_versions": "v2.6.12-rc2 to v6.8-rc6", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "fs/aio: Restrict kiocb_set_cancel_fn() to I/O submitted via libaio", + "fixes": "b820de741ae48ccf50dd95e297889c286ff4f760", + "last_affected_version": "6.7.6", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfs/aio: Restrict kiocb_set_cancel_fn() to I/O submitted via libaio\n\nIf kiocb_set_cancel_fn() is called for I/O submitted via io_uring, the\nfollowing kernel warning appears:\n\nWARNING: CPU: 3 PID: 368 at fs/aio.c:598 kiocb_set_cancel_fn+0x9c/0xa8\nCall trace:\n kiocb_set_cancel_fn+0x9c/0xa8\n ffs_epfile_read_iter+0x144/0x1d0\n io_read+0x19c/0x498\n io_issue_sqe+0x118/0x27c\n io_submit_sqes+0x25c/0x5fc\n __arm64_sys_io_uring_enter+0x104/0xab0\n invoke_syscall+0x58/0x11c\n el0_svc_common+0xb4/0xf4\n do_el0_svc+0x2c/0xb0\n el0_svc+0x2c/0xa4\n el0t_64_sync_handler+0x68/0xb4\n el0t_64_sync+0x1a4/0x1a8\n\nFix this by setting the IOCB_AIO_RW flag for read and write I/O that is\nsubmitted by libaio.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26764", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26764", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26764", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26764", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26764", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26764" + } + }, + "CVE-2024-26765": { + "affected_versions": "v2.6.12-rc2 to v6.8-rc6", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "LoongArch: Disable IRQ before init_fn() for nonboot CPUs", + "fixes": "1001db6c42e4012b55e5ee19405490f23e033b5a", + "last_affected_version": "6.7.6", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nLoongArch: Disable IRQ before init_fn() for nonboot CPUs\n\nDisable IRQ before init_fn() for nonboot CPUs when hotplug, in order to\nsilence such warnings (and also avoid potential errors due to unexpected\ninterrupts):\n\nWARNING: CPU: 1 PID: 0 at kernel/rcu/tree.c:4503 rcu_cpu_starting+0x214/0x280\nCPU: 1 PID: 0 Comm: swapper/1 Not tainted 6.6.17+ #1198\npc 90000000048e3334 ra 90000000047bd56c tp 900000010039c000 sp 900000010039fdd0\na0 0000000000000001 a1 0000000000000006 a2 900000000802c040 a3 0000000000000000\na4 0000000000000001 a5 0000000000000004 a6 0000000000000000 a7 90000000048e3f4c\nt0 0000000000000001 t1 9000000005c70968 t2 0000000004000000 t3 000000000005e56e\nt4 00000000000002e4 t5 0000000000001000 t6 ffffffff80000000 t7 0000000000040000\nt8 9000000007931638 u0 0000000000000006 s9 0000000000000004 s0 0000000000000001\ns1 9000000006356ac0 s2 9000000007244000 s3 0000000000000001 s4 0000000000000001\ns5 900000000636f000 s6 7fffffffffffffff s7 9000000002123940 s8 9000000001ca55f8\n ra: 90000000047bd56c tlb_init+0x24c/0x528\n ERA: 90000000048e3334 rcu_cpu_starting+0x214/0x280\n CRMD: 000000b0 (PLV0 -IE -DA +PG DACF=CC DACM=CC -WE)\n PRMD: 00000000 (PPLV0 -PIE -PWE)\n EUEN: 00000000 (-FPE -SXE -ASXE -BTE)\n ECFG: 00071000 (LIE=12 VS=7)\nESTAT: 000c0000 [BRK] (IS= ECode=12 EsubCode=0)\n PRID: 0014c010 (Loongson-64bit, Loongson-3A5000)\nCPU: 1 PID: 0 Comm: swapper/1 Not tainted 6.6.17+ #1198\nStack : 0000000000000000 9000000006375000 9000000005b61878 900000010039c000\n 900000010039fa30 0000000000000000 900000010039fa38 900000000619a140\n 9000000006456888 9000000006456880 900000010039f950 0000000000000001\n 0000000000000001 cb0cb028ec7e52e1 0000000002b90000 9000000100348700\n 0000000000000000 0000000000000001 ffffffff916d12f1 0000000000000003\n 0000000000040000 9000000007930370 0000000002b90000 0000000000000004\n 9000000006366000 900000000619a140 0000000000000000 0000000000000004\n 0000000000000000 0000000000000009 ffffffffffc681f2 9000000002123940\n 9000000001ca55f8 9000000006366000 90000000047a4828 00007ffff057ded8\n 00000000000000b0 0000000000000000 0000000000000000 0000000000071000\n ...\nCall Trace:\n[<90000000047a4828>] show_stack+0x48/0x1a0\n[<9000000005b61874>] dump_stack_lvl+0x84/0xcc\n[<90000000047f60ac>] __warn+0x8c/0x1e0\n[<9000000005b0ab34>] report_bug+0x1b4/0x280\n[<9000000005b63110>] do_bp+0x2d0/0x480\n[<90000000047a2e20>] handle_bp+0x120/0x1c0\n[<90000000048e3334>] rcu_cpu_starting+0x214/0x280\n[<90000000047bd568>] tlb_init+0x248/0x528\n[<90000000047a4c44>] per_cpu_trap_init+0x124/0x160\n[<90000000047a19f4>] cpu_probe+0x494/0xa00\n[<90000000047b551c>] start_secondary+0x3c/0xc0\n[<9000000005b66134>] smpboot_entry+0x50/0x58", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26765", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26765", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26765", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26765", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26765", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26765" + } + }, + "CVE-2024-26766": { + "affected_versions": "unk to v6.8-rc6", + "breaks": "", + "cmt_msg": "IB/hfi1: Fix sdma.h tx->num_descs off-by-one error", + "fixes": "e6f57c6881916df39db7d95981a8ad2b9c3458d6", + "last_affected_version": "6.7.6", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nIB/hfi1: Fix sdma.h tx->num_descs off-by-one error\n\nUnfortunately the commit `fd8958efe877` introduced another error\ncausing the `descs` array to overflow. This reults in further crashes\neasily reproducible by `sendmsg` system call.\n\n[ 1080.836473] general protection fault, probably for non-canonical address 0x400300015528b00a: 0000 [#1] PREEMPT SMP PTI\n[ 1080.869326] RIP: 0010:hfi1_ipoib_build_ib_tx_headers.constprop.0+0xe1/0x2b0 [hfi1]\n--\n[ 1080.974535] Call Trace:\n[ 1080.976990] \n[ 1081.021929] hfi1_ipoib_send_dma_common+0x7a/0x2e0 [hfi1]\n[ 1081.027364] hfi1_ipoib_send_dma_list+0x62/0x270 [hfi1]\n[ 1081.032633] hfi1_ipoib_send+0x112/0x300 [hfi1]\n[ 1081.042001] ipoib_start_xmit+0x2a9/0x2d0 [ib_ipoib]\n[ 1081.046978] dev_hard_start_xmit+0xc4/0x210\n--\n[ 1081.148347] __sys_sendmsg+0x59/0xa0\n\ncrash> ipoib_txreq 0xffff9cfeba229f00\nstruct ipoib_txreq {\n txreq = {\n list = {\n next = 0xffff9cfeba229f00,\n prev = 0xffff9cfeba229f00\n },\n descp = 0xffff9cfeba229f40,\n coalesce_buf = 0x0,\n wait = 0xffff9cfea4e69a48,\n complete = 0xffffffffc0fe0760 ,\n packet_len = 0x46d,\n tlen = 0x0,\n num_desc = 0x0,\n desc_limit = 0x6,\n next_descq_idx = 0x45c,\n coalesce_idx = 0x0,\n flags = 0x0,\n descs = {{\n qw = {0x8024000120dffb00, 0x4} # SDMA_DESC0_FIRST_DESC_FLAG (bit 63)\n }, {\n qw = { 0x3800014231b108, 0x4}\n }, {\n qw = { 0x310000e4ee0fcf0, 0x8}\n }, {\n qw = { 0x3000012e9f8000, 0x8}\n }, {\n qw = { 0x59000dfb9d0000, 0x8}\n }, {\n qw = { 0x78000e02e40000, 0x8}\n }}\n },\n sdma_hdr = 0x400300015528b000, <<< invalid pointer in the tx request structure\n sdma_status = 0x0, SDMA_DESC0_LAST_DESC_FLAG (bit 62)\n complete = 0x0,\n priv = 0x0,\n txq = 0xffff9cfea4e69880,\n skb = 0xffff9d099809f400\n}\n\nIf an SDMA send consists of exactly 6 descriptors and requires dword\npadding (in the 7th descriptor), the sdma_txreq descriptor array is not\nproperly expanded and the packet will overflow into the container\nstructure. This results in a panic when the send completion runs. The\nexact panic varies depending on what elements of the container structure\nget corrupted. The fix is to use the correct expression in\n_pad_sdma_tx_descs() to test the need to expand the descriptor array.\n\nWith this patch the crashes are no longer reproducible and the machine is\nstable.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26766", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26766", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26766", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26766", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26766", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26766" + } + }, + "CVE-2024-26767": { + "affected_versions": "v2.6.12-rc2 to v6.8-rc5", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "drm/amd/display: fixed integer types and null check locations", + "fixes": "0484e05d048b66d01d1f3c1d2306010bb57d8738", + "last_affected_version": "6.7.6", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: fixed integer types and null check locations\n\n[why]:\nissues fixed:\n- comparison with wider integer type in loop condition which can cause\ninfinite loops\n- pointer dereference before null check", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26767", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26767", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26767", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26767", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26767", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26767" + } + }, + "CVE-2024-26768": { + "affected_versions": "v2.6.12-rc2 to v6.8-rc4", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "LoongArch: Change acpi_core_pic[NR_CPUS] to acpi_core_pic[MAX_CORE_PIC]", + "fixes": "4551b30525cf3d2f026b92401ffe241eb04dfebe", + "last_affected_version": "6.7.6", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nLoongArch: Change acpi_core_pic[NR_CPUS] to acpi_core_pic[MAX_CORE_PIC]\n\nWith default config, the value of NR_CPUS is 64. When HW platform has\nmore then 64 cpus, system will crash on these platforms. MAX_CORE_PIC\nis the maximum cpu number in MADT table (max physical number) which can\nexceed the supported maximum cpu number (NR_CPUS, max logical number),\nbut kernel should not crash. Kernel should boot cpus with NR_CPUS, let\nthe remainder cpus stay in BIOS.\n\nThe potential crash reason is that the array acpi_core_pic[NR_CPUS] can\nbe overflowed when parsing MADT table, and it is obvious that CORE_PIC\nshould be corresponding to physical core rather than logical core, so it\nis better to define the array as acpi_core_pic[MAX_CORE_PIC].\n\nWith the patch, system can boot up 64 vcpus with qemu parameter -smp 128,\notherwise system will crash with the following message.\n\n[ 0.000000] CPU 0 Unable to handle kernel paging request at virtual address 0000420000004259, era == 90000000037a5f0c, ra == 90000000037a46ec\n[ 0.000000] Oops[#1]:\n[ 0.000000] CPU: 0 PID: 0 Comm: swapper Not tainted 6.8.0-rc2+ #192\n[ 0.000000] Hardware name: QEMU QEMU Virtual Machine, BIOS unknown 2/2/2022\n[ 0.000000] pc 90000000037a5f0c ra 90000000037a46ec tp 9000000003c90000 sp 9000000003c93d60\n[ 0.000000] a0 0000000000000019 a1 9000000003d93bc0 a2 0000000000000000 a3 9000000003c93bd8\n[ 0.000000] a4 9000000003c93a74 a5 9000000083c93a67 a6 9000000003c938f0 a7 0000000000000005\n[ 0.000000] t0 0000420000004201 t1 0000000000000000 t2 0000000000000001 t3 0000000000000001\n[ 0.000000] t4 0000000000000003 t5 0000000000000000 t6 0000000000000030 t7 0000000000000063\n[ 0.000000] t8 0000000000000014 u0 ffffffffffffffff s9 0000000000000000 s0 9000000003caee98\n[ 0.000000] s1 90000000041b0480 s2 9000000003c93da0 s3 9000000003c93d98 s4 9000000003c93d90\n[ 0.000000] s5 9000000003caa000 s6 000000000a7fd000 s7 000000000f556b60 s8 000000000e0a4330\n[ 0.000000] ra: 90000000037a46ec platform_init+0x214/0x250\n[ 0.000000] ERA: 90000000037a5f0c efi_runtime_init+0x30/0x94\n[ 0.000000] CRMD: 000000b0 (PLV0 -IE -DA +PG DACF=CC DACM=CC -WE)\n[ 0.000000] PRMD: 00000000 (PPLV0 -PIE -PWE)\n[ 0.000000] EUEN: 00000000 (-FPE -SXE -ASXE -BTE)\n[ 0.000000] ECFG: 00070800 (LIE=11 VS=7)\n[ 0.000000] ESTAT: 00010000 [PIL] (IS= ECode=1 EsubCode=0)\n[ 0.000000] BADV: 0000420000004259\n[ 0.000000] PRID: 0014c010 (Loongson-64bit, Loongson-3A5000)\n[ 0.000000] Modules linked in:\n[ 0.000000] Process swapper (pid: 0, threadinfo=(____ptrval____), task=(____ptrval____))\n[ 0.000000] Stack : 9000000003c93a14 9000000003800898 90000000041844f8 90000000037a46ec\n[ 0.000000] 000000000a7fd000 0000000008290000 0000000000000000 0000000000000000\n[ 0.000000] 0000000000000000 0000000000000000 00000000019d8000 000000000f556b60\n[ 0.000000] 000000000a7fd000 000000000f556b08 9000000003ca7700 9000000003800000\n[ 0.000000] 9000000003c93e50 9000000003800898 9000000003800108 90000000037a484c\n[ 0.000000] 000000000e0a4330 000000000f556b60 000000000a7fd000 000000000f556b08\n[ 0.000000] 9000000003ca7700 9000000004184000 0000000000200000 000000000e02b018\n[ 0.000000] 000000000a7fd000 90000000037a0790 9000000003800108 0000000000000000\n[ 0.000000] 0000000000000000 000000000e0a4330 000000000f556b60 000000000a7fd000\n[ 0.000000] 000000000f556b08 000000000eaae298 000000000eaa5040 0000000000200000\n[ 0.000000] ...\n[ 0.000000] Call Trace:\n[ 0.000000] [<90000000037a5f0c>] efi_runtime_init+0x30/0x94\n[ 0.000000] [<90000000037a46ec>] platform_init+0x214/0x250\n[ 0.000000] [<90000000037a484c>] setup_arch+0x124/0x45c\n[ 0.000000] [<90000000037a0790>] start_kernel+0x90/0x670\n[ 0.000000] [<900000000378b0d8>] kernel_entry+0xd8/0xdc", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26768", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26768", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26768", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26768", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26768", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26768" + } + }, + "CVE-2024-26769": { + "affected_versions": "v2.6.12-rc2 to v6.8-rc3", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "nvmet-fc: avoid deadlock on delete association path", + "fixes": "710c69dbaccdac312e32931abcb8499c1525d397", + "last_affected_version": "6.7.6", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvmet-fc: avoid deadlock on delete association path\n\nWhen deleting an association the shutdown path is deadlocking because we\ntry to flush the nvmet_wq nested. Avoid this by deadlock by deferring\nthe put work into its own work item.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26769", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26769", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26769", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26769", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26769", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26769" + } + }, + "CVE-2024-26770": { + "affected_versions": "v2.6.12-rc2 to v6.8-rc3", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "HID: nvidia-shield: Add missing null pointer checks to LED initialization", + "fixes": "b6eda11c44dc89a681e1c105f0f4660e69b1e183", + "last_affected_version": "6.7.6", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nHID: nvidia-shield: Add missing null pointer checks to LED initialization\n\ndevm_kasprintf() returns a pointer to dynamically allocated memory\nwhich can be NULL upon failure. Ensure the allocation was successful\nby checking the pointer validity.\n\n[jkosina@suse.com: tweak changelog a bit]", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26770", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26770", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26770", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26770", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26770", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26770" + } + }, + "CVE-2024-26771": { + "affected_versions": "v2.6.12-rc2 to v6.8-rc3", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "dmaengine: ti: edma: Add some null pointer checks to the edma_probe", + "fixes": "6e2276203ac9ff10fc76917ec9813c660f627369", + "last_affected_version": "6.7.6", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndmaengine: ti: edma: Add some null pointer checks to the edma_probe\n\ndevm_kasprintf() returns a pointer to dynamically allocated memory\nwhich can be NULL upon failure. Ensure the allocation was successful\nby checking the pointer validity.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26771", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26771", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26771", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26771", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26771", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26771" + } + }, + "CVE-2024-26772": { + "affected_versions": "v2.6.12-rc2 to v6.8-rc3", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal()", + "fixes": "832698373a25950942c04a512daa652c18a9b513", + "last_affected_version": "6.7.6", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal()\n\nPlaces the logic for checking if the group's block bitmap is corrupt under\nthe protection of the group lock to avoid allocating blocks from the group\nwith a corrupted block bitmap.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26772", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26772", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26772", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26772", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26772", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26772" + } + }, + "CVE-2024-26773": { + "affected_versions": "v2.6.12-rc2 to v6.8-rc3", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found()", + "fixes": "4530b3660d396a646aad91a787b6ab37cf604b53", + "last_affected_version": "6.7.6", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found()\n\nDetermine if the group block bitmap is corrupted before using ac_b_ex in\next4_mb_try_best_found() to avoid allocating blocks from a group with a\ncorrupted block bitmap in the following concurrency and making the\nsituation worse.\n\next4_mb_regular_allocator\n ext4_lock_group(sb, group)\n ext4_mb_good_group\n // check if the group bbitmap is corrupted\n ext4_mb_complex_scan_group\n // Scan group gets ac_b_ex but doesn't use it\n ext4_unlock_group(sb, group)\n ext4_mark_group_bitmap_corrupted(group)\n // The block bitmap was corrupted during\n // the group unlock gap.\n ext4_mb_try_best_found\n ext4_lock_group(ac->ac_sb, group)\n ext4_mb_use_best_found\n mb_mark_used\n // Allocating blocks in block bitmap corrupted group", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26773", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26773", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26773", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26773", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26773", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26773" + } + }, + "CVE-2024-26774": { + "affected_versions": "v2.6.12-rc2 to v6.8-rc3", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "ext4: avoid dividing by 0 in mb_update_avg_fragment_size() when block bitmap corrupt", + "fixes": "993bf0f4c393b3667830918f9247438a8f6fdb5b", + "last_affected_version": "6.7.6", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: avoid dividing by 0 in mb_update_avg_fragment_size() when block bitmap corrupt\n\nDetermine if bb_fragments is 0 instead of determining bb_free to eliminate\nthe risk of dividing by zero when the block bitmap is corrupted.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26774", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26774", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26774", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26774", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26774", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26774" + } + }, + "CVE-2024-26775": { + "affected_versions": "v2.6.12-rc2 to v6.8-rc2", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "aoe: avoid potential deadlock at set_capacity", + "fixes": "e169bd4fb2b36c4b2bee63c35c740c85daeb2e86", + "last_affected_version": "6.7.6", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\naoe: avoid potential deadlock at set_capacity\n\nMove set_capacity() outside of the section procected by (&d->lock).\nTo avoid possible interrupt unsafe locking scenario:\n\n CPU0 CPU1\n ---- ----\n[1] lock(&bdev->bd_size_lock);\n local_irq_disable();\n [2] lock(&d->lock);\n [3] lock(&bdev->bd_size_lock);\n \n[4] lock(&d->lock);\n\n *** DEADLOCK ***\n\nWhere [1](&bdev->bd_size_lock) hold by zram_add()->set_capacity().\n[2]lock(&d->lock) hold by aoeblk_gdalloc(). And aoeblk_gdalloc()\nis trying to acquire [3](&bdev->bd_size_lock) at set_capacity() call.\nIn this situation an attempt to acquire [4]lock(&d->lock) from\naoecmd_cfg_rsp() will lead to deadlock.\n\nSo the simplest solution is breaking lock dependency\n[2](&d->lock) -> [3](&bdev->bd_size_lock) by moving set_capacity()\noutside.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26775", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26775", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26775", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26775", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26775", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26775" + } + }, + "CVE-2024-26776": { + "affected_versions": "unk to v6.8-rc2", + "breaks": "", + "cmt_msg": "spi: hisi-sfc-v3xx: Return IRQ_NONE if no interrupts were detected", + "fixes": "de8b6e1c231a95abf95ad097b993d34b31458ec9", + "last_affected_version": "6.7.6", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nspi: hisi-sfc-v3xx: Return IRQ_NONE if no interrupts were detected\n\nReturn IRQ_NONE from the interrupt handler when no interrupt was\ndetected. Because an empty interrupt will cause a null pointer error:\n\n Unable to handle kernel NULL pointer dereference at virtual\n address 0000000000000008\n Call trace:\n complete+0x54/0x100\n hisi_sfc_v3xx_isr+0x2c/0x40 [spi_hisi_sfc_v3xx]\n __handle_irq_event_percpu+0x64/0x1e0\n handle_irq_event+0x7c/0x1cc", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26776", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26776", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26776", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26776", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26776", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26776" + } + }, + "CVE-2024-26777": { + "affected_versions": "v2.6.12-rc2 to v6.8-rc2", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "fbdev: sis: Error out if pixclock equals zero", + "fixes": "e421946be7d9bf545147bea8419ef8239cb7ca52", + "last_affected_version": "6.7.6", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfbdev: sis: Error out if pixclock equals zero\n\nThe userspace program could pass any values to the driver through\nioctl() interface. If the driver doesn't check the value of pixclock,\nit may cause divide-by-zero error.\n\nIn sisfb_check_var(), var->pixclock is used as a divisor to caculate\ndrate before it is checked against zero. Fix this by checking it\nat the beginning.\n\nThis is similar to CVE-2022-3061 in i740fb which was fixed by\ncommit 15cf0b8.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26777", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26777", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26777", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26777", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26777", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26777" + } + }, + "CVE-2024-26778": { + "affected_versions": "v2.6.12-rc2 to v6.8-rc2", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "fbdev: savage: Error out if pixclock equals zero", + "fixes": "04e5eac8f3ab2ff52fa191c187a46d4fdbc1e288", + "last_affected_version": "6.7.6", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfbdev: savage: Error out if pixclock equals zero\n\nThe userspace program could pass any values to the driver through\nioctl() interface. If the driver doesn't check the value of pixclock,\nit may cause divide-by-zero error.\n\nAlthough pixclock is checked in savagefb_decode_var(), but it is not\nchecked properly in savagefb_probe(). Fix this by checking whether\npixclock is zero in the function savagefb_check_var() before\ninfo->var.pixclock is used as the divisor.\n\nThis is similar to CVE-2022-3061 in i740fb which was fixed by\ncommit 15cf0b8.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26778", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26778", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26778", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26778", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26778", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26778" + } + }, + "CVE-2024-26779": { + "affected_versions": "unk to v6.8-rc2", + "breaks": "", + "cmt_msg": "wifi: mac80211: fix race condition on enabling fast-xmit", + "fixes": "bcbc84af1183c8cf3d1ca9b78540c2185cd85e7f", + "last_affected_version": "6.7.6", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: mac80211: fix race condition on enabling fast-xmit\n\nfast-xmit must only be enabled after the sta has been uploaded to the driver,\notherwise it could end up passing the not-yet-uploaded sta via drv_tx calls\nto the driver, leading to potential crashes because of uninitialized drv_priv\ndata.\nAdd a missing sta->uploaded check and re-check fast xmit after inserting a sta.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26779", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26779", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26779", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26779", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26779", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26779" + } + }, + "CVE-2024-26780": { + "affected_versions": "v6.8-rc4 to v6.8-rc5", + "breaks": "1279f9d9dec2d7462823a18c29ad61359e0a007d", + "fixes": "25236c91b5ab4a26a56ba2e79b8060cf4e047839", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\naf_unix: Fix task hung while purging oob_skb in GC.\n\nsyzbot reported a task hung; at the same time, GC was looping infinitely\nin list_for_each_entry_safe() for OOB skb. [0]\n\nsyzbot demonstrated that the list_for_each_entry_safe() was not actually\nsafe in this case.\n\nA single skb could have references for multiple sockets. If we free such\na skb in the list_for_each_entry_safe(), the current and next sockets could\nbe unlinked in a single iteration.\n\nunix_notinflight() uses list_del_init() to unlink the socket, so the\nprefetched next socket forms a loop itself and list_for_each_entry_safe()\nnever stops.\n\nHere, we must use while() and make sure we always fetch the first socket.\n\n[0]:\nSending NMI from CPU 0 to CPUs 1:\nNMI backtrace for cpu 1\nCPU: 1 PID: 5065 Comm: syz-executor236 Not tainted 6.8.0-rc3-syzkaller-00136-g1f719a2f3fa6 #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024\nRIP: 0010:preempt_count arch/x86/include/asm/preempt.h:26 [inline]\nRIP: 0010:check_kcov_mode kernel/kcov.c:173 [inline]\nRIP: 0010:__sanitizer_cov_trace_pc+0xd/0x60 kernel/kcov.c:207\nCode: cc cc cc cc 66 0f 1f 84 00 00 00 00 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 65 48 8b 14 25 40 c2 03 00 <65> 8b 05 b4 7c 78 7e a9 00 01 ff 00 48 8b 34 24 74 0f f6 c4 01 74\nRSP: 0018:ffffc900033efa58 EFLAGS: 00000283\nRAX: ffff88807b077800 RBX: ffff88807b077800 RCX: 1ffffffff27b1189\nRDX: ffff88802a5a3b80 RSI: ffffffff8968488d RDI: ffff88807b077f70\nRBP: ffffc900033efbb0 R08: 0000000000000001 R09: fffffbfff27a900c\nR10: ffffffff93d48067 R11: ffffffff8ae000eb R12: ffff88807b077800\nR13: dffffc0000000000 R14: ffff88807b077e40 R15: 0000000000000001\nFS: 0000000000000000(0000) GS:ffff8880b9500000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000564f4fc1e3a8 CR3: 000000000d57a000 CR4: 00000000003506f0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n \n \n \n unix_gc+0x563/0x13b0 net/unix/garbage.c:319\n unix_release_sock+0xa93/0xf80 net/unix/af_unix.c:683\n unix_release+0x91/0xf0 net/unix/af_unix.c:1064\n __sock_release+0xb0/0x270 net/socket.c:659\n sock_close+0x1c/0x30 net/socket.c:1421\n __fput+0x270/0xb80 fs/file_table.c:376\n task_work_run+0x14f/0x250 kernel/task_work.c:180\n exit_task_work include/linux/task_work.h:38 [inline]\n do_exit+0xa8a/0x2ad0 kernel/exit.c:871\n do_group_exit+0xd4/0x2a0 kernel/exit.c:1020\n __do_sys_exit_group kernel/exit.c:1031 [inline]\n __se_sys_exit_group kernel/exit.c:1029 [inline]\n __x64_sys_exit_group+0x3e/0x50 kernel/exit.c:1029\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0xd5/0x270 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x6f/0x77\nRIP: 0033:0x7f9d6cbdac09\nCode: Unable to access opcode bytes at 0x7f9d6cbdabdf.\nRSP: 002b:00007fff5952feb8 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7\nRAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f9d6cbdac09\nRDX: 000000000000003c RSI: 00000000000000e7 RDI: 0000000000000000\nRBP: 00007f9d6cc552b0 R08: ffffffffffffffb8 R09: 0000000000000006\nR10: 0000000000000006 R11: 0000000000000246 R12: 00007f9d6cc552b0\nR13: 0000000000000000 R14: 00007f9d6cc55d00 R15: 00007f9d6cbabe70\n ", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26780", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26780", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26780", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26780", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26780", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26780" + } + }, + "CVE-2024-26781": { + "affected_versions": "v6.8-rc6 to v6.8-rc7", + "breaks": "b8adb69a7d29c2d33eb327bca66476fb6066516b", + "fixes": "d6a9608af9a75d13243d217f6ce1e30e57d56ffe", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmptcp: fix possible deadlock in subflow diag\n\nSyzbot and Eric reported a lockdep splat in the subflow diag:\n\n WARNING: possible circular locking dependency detected\n 6.8.0-rc4-syzkaller-00212-g40b9385dd8e6 #0 Not tainted\n\n syz-executor.2/24141 is trying to acquire lock:\n ffff888045870130 (k-sk_lock-AF_INET6){+.+.}-{0:0}, at:\n tcp_diag_put_ulp net/ipv4/tcp_diag.c:100 [inline]\n ffff888045870130 (k-sk_lock-AF_INET6){+.+.}-{0:0}, at:\n tcp_diag_get_aux+0x738/0x830 net/ipv4/tcp_diag.c:137\n\n but task is already holding lock:\n ffffc9000135e488 (&h->lhash2[i].lock){+.+.}-{2:2}, at: spin_lock\n include/linux/spinlock.h:351 [inline]\n ffffc9000135e488 (&h->lhash2[i].lock){+.+.}-{2:2}, at:\n inet_diag_dump_icsk+0x39f/0x1f80 net/ipv4/inet_diag.c:1038\n\n which lock already depends on the new lock.\n\n the existing dependency chain (in reverse order) is:\n\n -> #1 (&h->lhash2[i].lock){+.+.}-{2:2}:\n lock_acquire+0x1e3/0x530 kernel/locking/lockdep.c:5754\n __raw_spin_lock include/linux/spinlock_api_smp.h:133 [inline]\n _raw_spin_lock+0x2e/0x40 kernel/locking/spinlock.c:154\n spin_lock include/linux/spinlock.h:351 [inline]\n __inet_hash+0x335/0xbe0 net/ipv4/inet_hashtables.c:743\n inet_csk_listen_start+0x23a/0x320 net/ipv4/inet_connection_sock.c:1261\n __inet_listen_sk+0x2a2/0x770 net/ipv4/af_inet.c:217\n inet_listen+0xa3/0x110 net/ipv4/af_inet.c:239\n rds_tcp_listen_init+0x3fd/0x5a0 net/rds/tcp_listen.c:316\n rds_tcp_init_net+0x141/0x320 net/rds/tcp.c:577\n ops_init+0x352/0x610 net/core/net_namespace.c:136\n __register_pernet_operations net/core/net_namespace.c:1214 [inline]\n register_pernet_operations+0x2cb/0x660 net/core/net_namespace.c:1283\n register_pernet_device+0x33/0x80 net/core/net_namespace.c:1370\n rds_tcp_init+0x62/0xd0 net/rds/tcp.c:735\n do_one_initcall+0x238/0x830 init/main.c:1236\n do_initcall_level+0x157/0x210 init/main.c:1298\n do_initcalls+0x3f/0x80 init/main.c:1314\n kernel_init_freeable+0x42f/0x5d0 init/main.c:1551\n kernel_init+0x1d/0x2a0 init/main.c:1441\n ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147\n ret_from_fork_asm+0x1b/0x30 arch/x86/entry/entry_64.S:242\n\n -> #0 (k-sk_lock-AF_INET6){+.+.}-{0:0}:\n check_prev_add kernel/locking/lockdep.c:3134 [inline]\n check_prevs_add kernel/locking/lockdep.c:3253 [inline]\n validate_chain+0x18ca/0x58e0 kernel/locking/lockdep.c:3869\n __lock_acquire+0x1345/0x1fd0 kernel/locking/lockdep.c:5137\n lock_acquire+0x1e3/0x530 kernel/locking/lockdep.c:5754\n lock_sock_fast include/net/sock.h:1723 [inline]\n subflow_get_info+0x166/0xd20 net/mptcp/diag.c:28\n tcp_diag_put_ulp net/ipv4/tcp_diag.c:100 [inline]\n tcp_diag_get_aux+0x738/0x830 net/ipv4/tcp_diag.c:137\n inet_sk_diag_fill+0x10ed/0x1e00 net/ipv4/inet_diag.c:345\n inet_diag_dump_icsk+0x55b/0x1f80 net/ipv4/inet_diag.c:1061\n __inet_diag_dump+0x211/0x3a0 net/ipv4/inet_diag.c:1263\n inet_diag_dump_compat+0x1c1/0x2d0 net/ipv4/inet_diag.c:1371\n netlink_dump+0x59b/0xc80 net/netlink/af_netlink.c:2264\n __netlink_dump_start+0x5df/0x790 net/netlink/af_netlink.c:2370\n netlink_dump_start include/linux/netlink.h:338 [inline]\n inet_diag_rcv_msg_compat+0x209/0x4c0 net/ipv4/inet_diag.c:1405\n sock_diag_rcv_msg+0xe7/0x410\n netlink_rcv_skb+0x1e3/0x430 net/netlink/af_netlink.c:2543\n sock_diag_rcv+0x2a/0x40 net/core/sock_diag.c:280\n netlink_unicast_kernel net/netlink/af_netlink.c:1341 [inline]\n netlink_unicast+0x7ea/0x980 net/netlink/af_netlink.c:1367\n netlink_sendmsg+0xa3b/0xd70 net/netlink/af_netlink.c:1908\n sock_sendmsg_nosec net/socket.c:730 [inline]\n __sock_sendmsg+0x221/0x270 net/socket.c:745\n ____sys_sendmsg+0x525/0x7d0 net/socket.c:2584\n ___sys_sendmsg net/socket.c:2638 [inline]\n __sys_sendmsg+0x2b0/0x3a0 net/socket.c:2667\n do_syscall_64+0xf9/0x240\n entry_SYSCALL_64_after_hwframe+0x6f/0x77\n\nAs noted by Eric we can break the lock dependency chain avoid\ndumping \n---truncated---", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26781", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26781", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26781", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26781", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26781", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26781" + } + }, + "CVE-2024-26782": { + "affected_versions": "v5.6-rc1 to v6.8-rc7", + "breaks": "cf7da0d66cc1a2a19fc5930bb746ffbb2d4cd1be", + "cmt_msg": "mptcp: fix double-free on socket dismantle", + "fixes": "10048689def7e40a4405acda16fdc6477d4ecc5c", + "last_affected_version": "6.7.8", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmptcp: fix double-free on socket dismantle\n\nwhen MPTCP server accepts an incoming connection, it clones its listener\nsocket. However, the pointer to 'inet_opt' for the new socket has the same\nvalue as the original one: as a consequence, on program exit it's possible\nto observe the following splat:\n\n BUG: KASAN: double-free in inet_sock_destruct+0x54f/0x8b0\n Free of addr ffff888485950880 by task swapper/25/0\n\n CPU: 25 PID: 0 Comm: swapper/25 Kdump: loaded Not tainted 6.8.0-rc1+ #609\n Hardware name: Supermicro SYS-6027R-72RF/X9DRH-7TF/7F/iTF/iF, BIOS 3.0 07/26/2013\n Call Trace:\n \n dump_stack_lvl+0x32/0x50\n print_report+0xca/0x620\n kasan_report_invalid_free+0x64/0x90\n __kasan_slab_free+0x1aa/0x1f0\n kfree+0xed/0x2e0\n inet_sock_destruct+0x54f/0x8b0\n __sk_destruct+0x48/0x5b0\n rcu_do_batch+0x34e/0xd90\n rcu_core+0x559/0xac0\n __do_softirq+0x183/0x5a4\n irq_exit_rcu+0x12d/0x170\n sysvec_apic_timer_interrupt+0x6b/0x80\n \n \n asm_sysvec_apic_timer_interrupt+0x16/0x20\n RIP: 0010:cpuidle_enter_state+0x175/0x300\n Code: 30 00 0f 84 1f 01 00 00 83 e8 01 83 f8 ff 75 e5 48 83 c4 18 44 89 e8 5b 5d 41 5c 41 5d 41 5e 41 5f c3 cc cc cc cc fb 45 85 ed <0f> 89 60 ff ff ff 48 c1 e5 06 48 c7 43 18 00 00 00 00 48 83 44 2b\n RSP: 0018:ffff888481cf7d90 EFLAGS: 00000202\n RAX: 0000000000000000 RBX: ffff88887facddc8 RCX: 0000000000000000\n RDX: 1ffff1110ff588b1 RSI: 0000000000000019 RDI: ffff88887fac4588\n RBP: 0000000000000004 R08: 0000000000000002 R09: 0000000000043080\n R10: 0009b02ea273363f R11: ffff88887fabf42b R12: ffffffff932592e0\n R13: 0000000000000004 R14: 0000000000000000 R15: 00000022c880ec80\n cpuidle_enter+0x4a/0xa0\n do_idle+0x310/0x410\n cpu_startup_entry+0x51/0x60\n start_secondary+0x211/0x270\n secondary_startup_64_no_verify+0x184/0x18b\n \n\n Allocated by task 6853:\n kasan_save_stack+0x1c/0x40\n kasan_save_track+0x10/0x30\n __kasan_kmalloc+0xa6/0xb0\n __kmalloc+0x1eb/0x450\n cipso_v4_sock_setattr+0x96/0x360\n netlbl_sock_setattr+0x132/0x1f0\n selinux_netlbl_socket_post_create+0x6c/0x110\n selinux_socket_post_create+0x37b/0x7f0\n security_socket_post_create+0x63/0xb0\n __sock_create+0x305/0x450\n __sys_socket_create.part.23+0xbd/0x130\n __sys_socket+0x37/0xb0\n __x64_sys_socket+0x6f/0xb0\n do_syscall_64+0x83/0x160\n entry_SYSCALL_64_after_hwframe+0x6e/0x76\n\n Freed by task 6858:\n kasan_save_stack+0x1c/0x40\n kasan_save_track+0x10/0x30\n kasan_save_free_info+0x3b/0x60\n __kasan_slab_free+0x12c/0x1f0\n kfree+0xed/0x2e0\n inet_sock_destruct+0x54f/0x8b0\n __sk_destruct+0x48/0x5b0\n subflow_ulp_release+0x1f0/0x250\n tcp_cleanup_ulp+0x6e/0x110\n tcp_v4_destroy_sock+0x5a/0x3a0\n inet_csk_destroy_sock+0x135/0x390\n tcp_fin+0x416/0x5c0\n tcp_data_queue+0x1bc8/0x4310\n tcp_rcv_state_process+0x15a3/0x47b0\n tcp_v4_do_rcv+0x2c1/0x990\n tcp_v4_rcv+0x41fb/0x5ed0\n ip_protocol_deliver_rcu+0x6d/0x9f0\n ip_local_deliver_finish+0x278/0x360\n ip_local_deliver+0x182/0x2c0\n ip_rcv+0xb5/0x1c0\n __netif_receive_skb_one_core+0x16e/0x1b0\n process_backlog+0x1e3/0x650\n __napi_poll+0xa6/0x500\n net_rx_action+0x740/0xbb0\n __do_softirq+0x183/0x5a4\n\n The buggy address belongs to the object at ffff888485950880\n which belongs to the cache kmalloc-64 of size 64\n The buggy address is located 0 bytes inside of\n 64-byte region [ffff888485950880, ffff8884859508c0)\n\n The buggy address belongs to the physical page:\n page:0000000056d1e95e refcount:1 mapcount:0 mapping:0000000000000000 index:0xffff888485950700 pfn:0x485950\n flags: 0x57ffffc0000800(slab|node=1|zone=2|lastcpupid=0x1fffff)\n page_type: 0xffffffff()\n raw: 0057ffffc0000800 ffff88810004c640 ffffea00121b8ac0 dead000000000006\n raw: ffff888485950700 0000000000200019 00000001ffffffff 0000000000000000\n page dumped because: kasan: bad access detected\n\n Memory state around the buggy address:\n ffff888485950780: fa fb fb\n---truncated---", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26782", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26782", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26782", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26782", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26782", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26782" + } + }, + "CVE-2024-26783": { + "affected_versions": "v5.18-rc1 to v6.8-rc7", + "breaks": "c574bbe917036c8968b984c82c7b13194fe5ce98", + "cmt_msg": "mm/vmscan: fix a bug calling wakeup_kswapd() with a wrong zone index", + "fixes": "2774f256e7c0219e2b0a0894af1c76bdabc4f974", + "last_affected_version": "6.7.8", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm/vmscan: fix a bug calling wakeup_kswapd() with a wrong zone index\n\nWith numa balancing on, when a numa system is running where a numa node\ndoesn't have its local memory so it has no managed zones, the following\noops has been observed. It's because wakeup_kswapd() is called with a\nwrong zone index, -1. Fixed it by checking the index before calling\nwakeup_kswapd().\n\n> BUG: unable to handle page fault for address: 00000000000033f3\n> #PF: supervisor read access in kernel mode\n> #PF: error_code(0x0000) - not-present page\n> PGD 0 P4D 0\n> Oops: 0000 [#1] PREEMPT SMP NOPTI\n> CPU: 2 PID: 895 Comm: masim Not tainted 6.6.0-dirty #255\n> Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS\n> rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014\n> RIP: 0010:wakeup_kswapd (./linux/mm/vmscan.c:7812)\n> Code: (omitted)\n> RSP: 0000:ffffc90004257d58 EFLAGS: 00010286\n> RAX: ffffffffffffffff RBX: ffff88883fff0480 RCX: 0000000000000003\n> RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffff88883fff0480\n> RBP: ffffffffffffffff R08: ff0003ffffffffff R09: ffffffffffffffff\n> R10: ffff888106c95540 R11: 0000000055555554 R12: 0000000000000003\n> R13: 0000000000000000 R14: 0000000000000000 R15: ffff88883fff0940\n> FS: 00007fc4b8124740(0000) GS:ffff888827c00000(0000) knlGS:0000000000000000\n> CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n> CR2: 00000000000033f3 CR3: 000000026cc08004 CR4: 0000000000770ee0\n> DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n> DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n> PKRU: 55555554\n> Call Trace:\n> \n> ? __die\n> ? page_fault_oops\n> ? __pte_offset_map_lock\n> ? exc_page_fault\n> ? asm_exc_page_fault\n> ? wakeup_kswapd\n> migrate_misplaced_page\n> __handle_mm_fault\n> handle_mm_fault\n> do_user_addr_fault\n> exc_page_fault\n> asm_exc_page_fault\n> RIP: 0033:0x55b897ba0808\n> Code: (omitted)\n> RSP: 002b:00007ffeefa821a0 EFLAGS: 00010287\n> RAX: 000055b89983acd0 RBX: 00007ffeefa823f8 RCX: 000055b89983acd0\n> RDX: 00007fc2f8122010 RSI: 0000000000020000 RDI: 000055b89983acd0\n> RBP: 00007ffeefa821a0 R08: 0000000000000037 R09: 0000000000000075\n> R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000000\n> R13: 00007ffeefa82410 R14: 000055b897ba5dd8 R15: 00007fc4b8340000\n> ", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26783", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26783", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26783", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26783", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26783", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26783" + } + }, + "CVE-2024-26784": { + "affected_versions": "unk to v6.8-rc7", + "breaks": "", + "cmt_msg": "pmdomain: arm: Fix NULL dereference on scmi_perf_domain removal", + "fixes": "eb5555d422d0fc325e1574a7353d3c616f82d8b5", + "last_affected_version": "6.7.8", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\npmdomain: arm: Fix NULL dereference on scmi_perf_domain removal\n\nOn unloading of the scmi_perf_domain module got the below splat, when in\nthe DT provided to the system under test the '#power-domain-cells' property\nwas missing. Indeed, this particular setup causes the probe to bail out\nearly without giving any error, which leads to the ->remove() callback gets\nto run too, but without all the expected initialized structures in place.\n\nAdd a check and bail out early on remove too.\n\n Call trace:\n scmi_perf_domain_remove+0x28/0x70 [scmi_perf_domain]\n scmi_dev_remove+0x28/0x40 [scmi_core]\n device_remove+0x54/0x90\n device_release_driver_internal+0x1dc/0x240\n driver_detach+0x58/0xa8\n bus_remove_driver+0x78/0x108\n driver_unregister+0x38/0x70\n scmi_driver_unregister+0x28/0x180 [scmi_core]\n scmi_perf_domain_driver_exit+0x18/0xb78 [scmi_perf_domain]\n __arm64_sys_delete_module+0x1a8/0x2c0\n invoke_syscall+0x50/0x128\n el0_svc_common.constprop.0+0x48/0xf0\n do_el0_svc+0x24/0x38\n el0_svc+0x34/0xb8\n el0t_64_sync_handler+0x100/0x130\n el0t_64_sync+0x190/0x198\n Code: a90153f3 f9403c14 f9414800 955f8a05 (b9400a80)\n ---[ end trace 0000000000000000 ]---", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26784", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26784", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26784", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26784", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26784", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26784" + } + }, + "CVE-2024-26785": { + "affected_versions": "v6.6-rc1 to v6.8-rc7", + "breaks": "9227da7816dd1a42e20d41e2244cb63c205477ca", + "cmt_msg": "iommufd: Fix protection fault in iommufd_test_syz_conv_iova", + "fixes": "cf7c2789822db8b5efa34f5ebcf1621bc0008d48", + "last_affected_version": "6.7.8", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\niommufd: Fix protection fault in iommufd_test_syz_conv_iova\n\nSyzkaller reported the following bug:\n\n general protection fault, probably for non-canonical address 0xdffffc0000000038: 0000 [#1] SMP KASAN\n KASAN: null-ptr-deref in range [0x00000000000001c0-0x00000000000001c7]\n Call Trace:\n lock_acquire\n lock_acquire+0x1ce/0x4f0\n down_read+0x93/0x4a0\n iommufd_test_syz_conv_iova+0x56/0x1f0\n iommufd_test_access_rw.isra.0+0x2ec/0x390\n iommufd_test+0x1058/0x1e30\n iommufd_fops_ioctl+0x381/0x510\n vfs_ioctl\n __do_sys_ioctl\n __se_sys_ioctl\n __x64_sys_ioctl+0x170/0x1e0\n do_syscall_x64\n do_syscall_64+0x71/0x140\n\nThis is because the new iommufd_access_change_ioas() sets access->ioas to\nNULL during its process, so the lock might be gone in a concurrent racing\ncontext.\n\nFix this by doing the same access->ioas sanity as iommufd_access_rw() and\niommufd_access_pin_pages() functions do.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26785", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26785", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26785", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26785", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26785", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26785" + } + }, + "CVE-2024-26786": { + "affected_versions": "v6.6-rc1 to v6.8-rc7", + "breaks": "9227da7816dd1a42e20d41e2244cb63c205477ca", + "cmt_msg": "iommufd: Fix iopt_access_list_id overwrite bug", + "fixes": "aeb004c0cd6958e910123a1607634401009c9539", + "last_affected_version": "6.7.8", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\niommufd: Fix iopt_access_list_id overwrite bug\n\nSyzkaller reported the following WARN_ON:\n WARNING: CPU: 1 PID: 4738 at drivers/iommu/iommufd/io_pagetable.c:1360\n\n Call Trace:\n iommufd_access_change_ioas+0x2fe/0x4e0\n iommufd_access_destroy_object+0x50/0xb0\n iommufd_object_remove+0x2a3/0x490\n iommufd_object_destroy_user\n iommufd_access_destroy+0x71/0xb0\n iommufd_test_staccess_release+0x89/0xd0\n __fput+0x272/0xb50\n __fput_sync+0x4b/0x60\n __do_sys_close\n __se_sys_close\n __x64_sys_close+0x8b/0x110\n do_syscall_x64\n\nThe mismatch between the access pointer in the list and the passed-in\npointer is resulting from an overwrite of access->iopt_access_list_id, in\niopt_add_access(). Called from iommufd_access_change_ioas() when\nxa_alloc() succeeds but iopt_calculate_iova_alignment() fails.\n\nAdd a new_id in iopt_add_access() and only update iopt_access_list_id when\nreturning successfully.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26786", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26786", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26786", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26786", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26786", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26786" + } + }, + "CVE-2024-26787": { + "affected_versions": "v4.20-rc1 to v6.8-rc7", + "breaks": "46b723dd867d599420fb640c0eaf2a866ef721d4", + "cmt_msg": "mmc: mmci: stm32: fix DMA API overlapping mappings warning", + "fixes": "6b1ba3f9040be5efc4396d86c9752cdc564730be", + "last_affected_version": "6.7.8", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmmc: mmci: stm32: fix DMA API overlapping mappings warning\n\nTurning on CONFIG_DMA_API_DEBUG_SG results in the following warning:\n\nDMA-API: mmci-pl18x 48220000.mmc: cacheline tracking EEXIST,\noverlapping mappings aren't supported\nWARNING: CPU: 1 PID: 51 at kernel/dma/debug.c:568\nadd_dma_entry+0x234/0x2f4\nModules linked in:\nCPU: 1 PID: 51 Comm: kworker/1:2 Not tainted 6.1.28 #1\nHardware name: STMicroelectronics STM32MP257F-EV1 Evaluation Board (DT)\nWorkqueue: events_freezable mmc_rescan\nCall trace:\nadd_dma_entry+0x234/0x2f4\ndebug_dma_map_sg+0x198/0x350\n__dma_map_sg_attrs+0xa0/0x110\ndma_map_sg_attrs+0x10/0x2c\nsdmmc_idma_prep_data+0x80/0xc0\nmmci_prep_data+0x38/0x84\nmmci_start_data+0x108/0x2dc\nmmci_request+0xe4/0x190\n__mmc_start_request+0x68/0x140\nmmc_start_request+0x94/0xc0\nmmc_wait_for_req+0x70/0x100\nmmc_send_tuning+0x108/0x1ac\nsdmmc_execute_tuning+0x14c/0x210\nmmc_execute_tuning+0x48/0xec\nmmc_sd_init_uhs_card.part.0+0x208/0x464\nmmc_sd_init_card+0x318/0x89c\nmmc_attach_sd+0xe4/0x180\nmmc_rescan+0x244/0x320\n\nDMA API debug brings to light leaking dma-mappings as dma_map_sg and\ndma_unmap_sg are not correctly balanced.\n\nIf an error occurs in mmci_cmd_irq function, only mmci_dma_error\nfunction is called and as this API is not managed on stm32 variant,\ndma_unmap_sg is never called in this error path.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26787", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26787", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26787", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26787", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26787", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26787" + } + }, + "CVE-2024-26788": { + "affected_versions": "v5.1-rc1 to v6.8-rc7", + "breaks": "b092529e0aa09829a6404424ce167bf3ce3235e2", + "cmt_msg": "dmaengine: fsl-qdma: init irq after reg initialization", + "fixes": "87a39071e0b639f45e05d296cc0538eef44ec0bd", + "last_affected_version": "6.7.8", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndmaengine: fsl-qdma: init irq after reg initialization\n\nInitialize the qDMA irqs after the registers are configured so that\ninterrupts that may have been pending from a primary kernel don't get\nprocessed by the irq handler before it is ready to and cause panic with\nthe following trace:\n\n Call trace:\n fsl_qdma_queue_handler+0xf8/0x3e8\n __handle_irq_event_percpu+0x78/0x2b0\n handle_irq_event_percpu+0x1c/0x68\n handle_irq_event+0x44/0x78\n handle_fasteoi_irq+0xc8/0x178\n generic_handle_irq+0x24/0x38\n __handle_domain_irq+0x90/0x100\n gic_handle_irq+0x5c/0xb8\n el1_irq+0xb8/0x180\n _raw_spin_unlock_irqrestore+0x14/0x40\n __setup_irq+0x4bc/0x798\n request_threaded_irq+0xd8/0x190\n devm_request_threaded_irq+0x74/0xe8\n fsl_qdma_probe+0x4d4/0xca8\n platform_drv_probe+0x50/0xa0\n really_probe+0xe0/0x3f8\n driver_probe_device+0x64/0x130\n device_driver_attach+0x6c/0x78\n __driver_attach+0xbc/0x158\n bus_for_each_dev+0x5c/0x98\n driver_attach+0x20/0x28\n bus_add_driver+0x158/0x220\n driver_register+0x60/0x110\n __platform_driver_register+0x44/0x50\n fsl_qdma_driver_init+0x18/0x20\n do_one_initcall+0x48/0x258\n kernel_init_freeable+0x1a4/0x23c\n kernel_init+0x10/0xf8\n ret_from_fork+0x10/0x18", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26788", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26788", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26788", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26788", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26788", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26788" + } + }, + "CVE-2024-26789": { + "affected_versions": "unk to v6.8-rc7", + "breaks": "", + "cmt_msg": "crypto: arm64/neonbs - fix out-of-bounds access on short input", + "fixes": "1c0cf6d19690141002889d72622b90fc01562ce4", + "last_affected_version": "6.7.8", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: arm64/neonbs - fix out-of-bounds access on short input\n\nThe bit-sliced implementation of AES-CTR operates on blocks of 128\nbytes, and will fall back to the plain NEON version for tail blocks or\ninputs that are shorter than 128 bytes to begin with.\n\nIt will call straight into the plain NEON asm helper, which performs all\nmemory accesses in granules of 16 bytes (the size of a NEON register).\nFor this reason, the associated plain NEON glue code will copy inputs\nshorter than 16 bytes into a temporary buffer, given that this is a rare\noccurrence and it is not worth the effort to work around this in the asm\ncode.\n\nThe fallback from the bit-sliced NEON version fails to take this into\naccount, potentially resulting in out-of-bounds accesses. So clone the\nsame workaround, and use a temp buffer for short in/outputs.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26789", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26789", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26789", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26789", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26789", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26789" + } + }, + "CVE-2024-26790": { + "affected_versions": "v5.1-rc1 to v6.8-rc7", + "breaks": "b092529e0aa09829a6404424ce167bf3ce3235e2", + "cmt_msg": "dmaengine: fsl-qdma: fix SoC may hang on 16 byte unaligned read", + "fixes": "9d739bccf261dd93ec1babf82f5c5d71dd4caa3e", + "last_affected_version": "6.7.8", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndmaengine: fsl-qdma: fix SoC may hang on 16 byte unaligned read\n\nThere is chip (ls1028a) errata:\n\nThe SoC may hang on 16 byte unaligned read transactions by QDMA.\n\nUnaligned read transactions initiated by QDMA may stall in the NOC\n(Network On-Chip), causing a deadlock condition. Stalled transactions will\ntrigger completion timeouts in PCIe controller.\n\nWorkaround:\nEnable prefetch by setting the source descriptor prefetchable bit\n( SD[PF] = 1 ).\n\nImplement this workaround.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26790", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26790", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26790", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26790", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26790", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26790" + } + }, + "CVE-2024-26791": { + "affected_versions": "v2.6.12-rc2 to v6.8-rc7", + "breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "cmt_msg": "btrfs: dev-replace: properly validate device names", + "fixes": "9845664b9ee47ce7ee7ea93caf47d39a9d4552c4", + "last_affected_version": "6.7.8", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: dev-replace: properly validate device names\n\nThere's a syzbot report that device name buffers passed to device\nreplace are not properly checked for string termination which could lead\nto a read out of bounds in getname_kernel().\n\nAdd a helper that validates both source and target device name buffers.\nFor devid as the source initialize the buffer to empty string in case\nsomething tries to read it later.\n\nThis was originally analyzed and fixed in a different way by Edward Adam\nDavis (see links).", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26791", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26791", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26791", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26791", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26791", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26791" + } + }, + "CVE-2024-26792": { + "affected_versions": "v6.8-rc4 to v6.8-rc7", + "breaks": "e03ee2fe873eb68c1f9ba5112fee70303ebf9dfb", + "fixes": "e2b54eaf28df0c978626c9736b94f003b523b451", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: fix double free of anonymous device after snapshot creation failure\n\nWhen creating a snapshot we may do a double free of an anonymous device\nin case there's an error committing the transaction. The second free may\nresult in freeing an anonymous device number that was allocated by some\nother subsystem in the kernel or another btrfs filesystem.\n\nThe steps that lead to this:\n\n1) At ioctl.c:create_snapshot() we allocate an anonymous device number\n and assign it to pending_snapshot->anon_dev;\n\n2) Then we call btrfs_commit_transaction() and end up at\n transaction.c:create_pending_snapshot();\n\n3) There we call btrfs_get_new_fs_root() and pass it the anonymous device\n number stored in pending_snapshot->anon_dev;\n\n4) btrfs_get_new_fs_root() frees that anonymous device number because\n btrfs_lookup_fs_root() returned a root - someone else did a lookup\n of the new root already, which could some task doing backref walking;\n\n5) After that some error happens in the transaction commit path, and at\n ioctl.c:create_snapshot() we jump to the 'fail' label, and after\n that we free again the same anonymous device number, which in the\n meanwhile may have been reallocated somewhere else, because\n pending_snapshot->anon_dev still has the same value as in step 1.\n\nRecently syzbot ran into this and reported the following trace:\n\n ------------[ cut here ]------------\n ida_free called for id=51 which is not allocated.\n WARNING: CPU: 1 PID: 31038 at lib/idr.c:525 ida_free+0x370/0x420 lib/idr.c:525\n Modules linked in:\n CPU: 1 PID: 31038 Comm: syz-executor.2 Not tainted 6.8.0-rc4-syzkaller-00410-gc02197fc9076 #0\n Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024\n RIP: 0010:ida_free+0x370/0x420 lib/idr.c:525\n Code: 10 42 80 3c 28 (...)\n RSP: 0018:ffffc90015a67300 EFLAGS: 00010246\n RAX: be5130472f5dd000 RBX: 0000000000000033 RCX: 0000000000040000\n RDX: ffffc90009a7a000 RSI: 000000000003ffff RDI: 0000000000040000\n RBP: ffffc90015a673f0 R08: ffffffff81577992 R09: 1ffff92002b4cdb4\n R10: dffffc0000000000 R11: fffff52002b4cdb5 R12: 0000000000000246\n R13: dffffc0000000000 R14: ffffffff8e256b80 R15: 0000000000000246\n FS: 00007fca3f4b46c0(0000) GS:ffff8880b9500000(0000) knlGS:0000000000000000\n CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 00007f167a17b978 CR3: 000000001ed26000 CR4: 0000000000350ef0\n Call Trace:\n \n btrfs_get_root_ref+0xa48/0xaf0 fs/btrfs/disk-io.c:1346\n create_pending_snapshot+0xff2/0x2bc0 fs/btrfs/transaction.c:1837\n create_pending_snapshots+0x195/0x1d0 fs/btrfs/transaction.c:1931\n btrfs_commit_transaction+0xf1c/0x3740 fs/btrfs/transaction.c:2404\n create_snapshot+0x507/0x880 fs/btrfs/ioctl.c:848\n btrfs_mksubvol+0x5d0/0x750 fs/btrfs/ioctl.c:998\n btrfs_mksnapshot+0xb5/0xf0 fs/btrfs/ioctl.c:1044\n __btrfs_ioctl_snap_create+0x387/0x4b0 fs/btrfs/ioctl.c:1306\n btrfs_ioctl_snap_create_v2+0x1ca/0x400 fs/btrfs/ioctl.c:1393\n btrfs_ioctl+0xa74/0xd40\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:871 [inline]\n __se_sys_ioctl+0xfe/0x170 fs/ioctl.c:857\n do_syscall_64+0xfb/0x240\n entry_SYSCALL_64_after_hwframe+0x6f/0x77\n RIP: 0033:0x7fca3e67dda9\n Code: 28 00 00 00 (...)\n RSP: 002b:00007fca3f4b40c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010\n RAX: ffffffffffffffda RBX: 00007fca3e7abf80 RCX: 00007fca3e67dda9\n RDX: 00000000200005c0 RSI: 0000000050009417 RDI: 0000000000000003\n RBP: 00007fca3e6ca47a R08: 0000000000000000 R09: 0000000000000000\n R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000\n R13: 000000000000000b R14: 00007fca3e7abf80 R15: 00007fff6bf95658\n \n\nWhere we get an explicit message where we attempt to free an anonymous\ndevice number that is not currently allocated. It happens in a different\ncode path from the example below, at btrfs_get_root_ref(), so this change\nmay not fix the case triggered by sy\n---truncated---", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26792", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26792", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26792", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26792", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26792", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26792" + } + }, + "CVE-2024-26793": { + "affected_versions": "unk to v6.8-rc7", + "breaks": "", + "cmt_msg": "gtp: fix use-after-free and null-ptr-deref in gtp_newlink()", + "fixes": "616d82c3cfa2a2146dd7e3ae47bda7e877ee549e", + "last_affected_version": "6.7.8", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\ngtp: fix use-after-free and null-ptr-deref in gtp_newlink()\n\nThe gtp_link_ops operations structure for the subsystem must be\nregistered after registering the gtp_net_ops pernet operations structure.\n\nSyzkaller hit 'general protection fault in gtp_genl_dump_pdp' bug:\n\n[ 1010.702740] gtp: GTP module unloaded\n[ 1010.715877] general protection fault, probably for non-canonical address 0xdffffc0000000001: 0000 [#1] SMP KASAN NOPTI\n[ 1010.715888] KASAN: null-ptr-deref in range [0x0000000000000008-0x000000000000000f]\n[ 1010.715895] CPU: 1 PID: 128616 Comm: a.out Not tainted 6.8.0-rc6-std-def-alt1 #1\n[ 1010.715899] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.0-alt1 04/01/2014\n[ 1010.715908] RIP: 0010:gtp_newlink+0x4d7/0x9c0 [gtp]\n[ 1010.715915] Code: 80 3c 02 00 0f 85 41 04 00 00 48 8b bb d8 05 00 00 e8 ed f6 ff ff 48 89 c2 48 89 c5 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 <80> 3c 02 00 0f 85 4f 04 00 00 4c 89 e2 4c 8b 6d 00 48 b8 00 00 00\n[ 1010.715920] RSP: 0018:ffff888020fbf180 EFLAGS: 00010203\n[ 1010.715929] RAX: dffffc0000000000 RBX: ffff88800399c000 RCX: 0000000000000000\n[ 1010.715933] RDX: 0000000000000001 RSI: ffffffff84805280 RDI: 0000000000000282\n[ 1010.715938] RBP: 000000000000000d R08: 0000000000000001 R09: 0000000000000000\n[ 1010.715942] R10: 0000000000000001 R11: 0000000000000001 R12: ffff88800399cc80\n[ 1010.715947] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000400\n[ 1010.715953] FS: 00007fd1509ab5c0(0000) GS:ffff88805b300000(0000) knlGS:0000000000000000\n[ 1010.715958] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 1010.715962] CR2: 0000000000000000 CR3: 000000001c07a000 CR4: 0000000000750ee0\n[ 1010.715968] PKRU: 55555554\n[ 1010.715972] Call Trace:\n[ 1010.715985] ? __die_body.cold+0x1a/0x1f\n[ 1010.715995] ? die_addr+0x43/0x70\n[ 1010.716002] ? exc_general_protection+0x199/0x2f0\n[ 1010.716016] ? asm_exc_general_protection+0x1e/0x30\n[ 1010.716026] ? gtp_newlink+0x4d7/0x9c0 [gtp]\n[ 1010.716034] ? gtp_net_exit+0x150/0x150 [gtp]\n[ 1010.716042] __rtnl_newlink+0x1063/0x1700\n[ 1010.716051] ? rtnl_setlink+0x3c0/0x3c0\n[ 1010.716063] ? is_bpf_text_address+0xc0/0x1f0\n[ 1010.716070] ? kernel_text_address.part.0+0xbb/0xd0\n[ 1010.716076] ? __kernel_text_address+0x56/0xa0\n[ 1010.716084] ? unwind_get_return_address+0x5a/0xa0\n[ 1010.716091] ? create_prof_cpu_mask+0x30/0x30\n[ 1010.716098] ? arch_stack_walk+0x9e/0xf0\n[ 1010.716106] ? stack_trace_save+0x91/0xd0\n[ 1010.716113] ? stack_trace_consume_entry+0x170/0x170\n[ 1010.716121] ? __lock_acquire+0x15c5/0x5380\n[ 1010.716139] ? mark_held_locks+0x9e/0xe0\n[ 1010.716148] ? kmem_cache_alloc_trace+0x35f/0x3c0\n[ 1010.716155] ? __rtnl_newlink+0x1700/0x1700\n[ 1010.716160] rtnl_newlink+0x69/0xa0\n[ 1010.716166] rtnetlink_rcv_msg+0x43b/0xc50\n[ 1010.716172] ? rtnl_fdb_dump+0x9f0/0x9f0\n[ 1010.716179] ? lock_acquire+0x1fe/0x560\n[ 1010.716188] ? netlink_deliver_tap+0x12f/0xd50\n[ 1010.716196] netlink_rcv_skb+0x14d/0x440\n[ 1010.716202] ? rtnl_fdb_dump+0x9f0/0x9f0\n[ 1010.716208] ? netlink_ack+0xab0/0xab0\n[ 1010.716213] ? netlink_deliver_tap+0x202/0xd50\n[ 1010.716220] ? netlink_deliver_tap+0x218/0xd50\n[ 1010.716226] ? __virt_addr_valid+0x30b/0x590\n[ 1010.716233] netlink_unicast+0x54b/0x800\n[ 1010.716240] ? netlink_attachskb+0x870/0x870\n[ 1010.716248] ? __check_object_size+0x2de/0x3b0\n[ 1010.716254] netlink_sendmsg+0x938/0xe40\n[ 1010.716261] ? netlink_unicast+0x800/0x800\n[ 1010.716269] ? __import_iovec+0x292/0x510\n[ 1010.716276] ? netlink_unicast+0x800/0x800\n[ 1010.716284] __sock_sendmsg+0x159/0x190\n[ 1010.716290] ____sys_sendmsg+0x712/0x880\n[ 1010.716297] ? sock_write_iter+0x3d0/0x3d0\n[ 1010.716304] ? __ia32_sys_recvmmsg+0x270/0x270\n[ 1010.716309] ? lock_acquire+0x1fe/0x560\n[ 1010.716315] ? drain_array_locked+0x90/0x90\n[ 1010.716324] ___sys_sendmsg+0xf8/0x170\n[ 1010.716331] ? sendmsg_copy_msghdr+0x170/0x170\n[ 1010.716337] ? lockdep_init_map\n---truncated---", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26793", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26793", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26793", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26793", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26793", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26793" + } + }, + "CVE-2024-26794": { + "affected_versions": "v6.8-rc6 to v6.8-rc7", + "breaks": "b0ad381fa7690244802aed119b478b4bdafc31dd", + "fixes": "a1a4a9ca77f143c00fce69c1239887ff8b813bec", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: fix race between ordered extent completion and fiemap\n\nFor fiemap we recently stopped locking the target extent range for the\nwhole duration of the fiemap call, in order to avoid a deadlock in a\nscenario where the fiemap buffer happens to be a memory mapped range of\nthe same file. This use case is very unlikely to be useful in practice but\nit may be triggered by fuzz testing (syzbot, etc).\n\nHowever by not locking the target extent range for the whole duration of\nthe fiemap call we can race with an ordered extent. This happens like\nthis:\n\n1) The fiemap task finishes processing a file extent item that covers\n the file range [512K, 1M[, and that file extent item is the last item\n in the leaf currently being processed;\n\n2) And ordered extent for the file range [768K, 2M[, in COW mode,\n completes (btrfs_finish_one_ordered()) and the file extent item\n covering the range [512K, 1M[ is trimmed to cover the range\n [512K, 768K[ and then a new file extent item for the range [768K, 2M[\n is inserted in the inode's subvolume tree;\n\n3) The fiemap task calls fiemap_next_leaf_item(), which then calls\n btrfs_next_leaf() to find the next leaf / item. This finds that the\n the next key following the one we previously processed (its type is\n BTRFS_EXTENT_DATA_KEY and its offset is 512K), is the key corresponding\n to the new file extent item inserted by the ordered extent, which has\n a type of BTRFS_EXTENT_DATA_KEY and an offset of 768K;\n\n4) Later the fiemap code ends up at emit_fiemap_extent() and triggers\n the warning:\n\n if (cache->offset + cache->len > offset) {\n WARN_ON(1);\n return -EINVAL;\n }\n\n Since we get 1M > 768K, because the previously emitted entry for the\n old extent covering the file range [512K, 1M[ ends at an offset that\n is greater than the new extent's start offset (768K). This makes fiemap\n fail with -EINVAL besides triggering the warning that produces a stack\n trace like the following:\n\n [1621.677651] ------------[ cut here ]------------\n [1621.677656] WARNING: CPU: 1 PID: 204366 at fs/btrfs/extent_io.c:2492 emit_fiemap_extent+0x84/0x90 [btrfs]\n [1621.677899] Modules linked in: btrfs blake2b_generic (...)\n [1621.677951] CPU: 1 PID: 204366 Comm: pool Not tainted 6.8.0-rc5-btrfs-next-151+ #1\n [1621.677954] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.2-0-gea1b7a073390-prebuilt.qemu.org 04/01/2014\n [1621.677956] RIP: 0010:emit_fiemap_extent+0x84/0x90 [btrfs]\n [1621.678033] Code: 2b 4c 89 63 (...)\n [1621.678035] RSP: 0018:ffffab16089ffd20 EFLAGS: 00010206\n [1621.678037] RAX: 00000000004fa000 RBX: ffffab16089ffe08 RCX: 0000000000009000\n [1621.678039] RDX: 00000000004f9000 RSI: 00000000004f1000 RDI: ffffab16089ffe90\n [1621.678040] RBP: 00000000004f9000 R08: 0000000000001000 R09: 0000000000000000\n [1621.678041] R10: 0000000000000000 R11: 0000000000001000 R12: 0000000041d78000\n [1621.678043] R13: 0000000000001000 R14: 0000000000000000 R15: ffff9434f0b17850\n [1621.678044] FS: 00007fa6e20006c0(0000) GS:ffff943bdfa40000(0000) knlGS:0000000000000000\n [1621.678046] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n [1621.678048] CR2: 00007fa6b0801000 CR3: 000000012d404002 CR4: 0000000000370ef0\n [1621.678053] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n [1621.678055] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n [1621.678056] Call Trace:\n [1621.678074] \n [1621.678076] ? __warn+0x80/0x130\n [1621.678082] ? emit_fiemap_extent+0x84/0x90 [btrfs]\n [1621.678159] ? report_bug+0x1f4/0x200\n [1621.678164] ? handle_bug+0x42/0x70\n [1621.678167] ? exc_invalid_op+0x14/0x70\n [1621.678170] ? asm_exc_invalid_op+0x16/0x20\n [1621.678178] ? emit_fiemap_extent+0x84/0x90 [btrfs]\n [1621.678253] extent_fiemap+0x766\n---truncated---", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26794", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26794", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26794", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26794", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26794", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26794" + } + }, + "CVE-2024-26795": { + "affected_versions": "v5.4-rc1 to v6.8-rc7", + "breaks": "d95f1a542c3df396137afa217ef9bd39cb8931ca", + "cmt_msg": "riscv: Sparse-Memory/vmemmap out-of-bounds fix", + "fixes": "a11dd49dcb9376776193e15641f84fcc1e5980c9", + "last_affected_version": "6.7.8", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nriscv: Sparse-Memory/vmemmap out-of-bounds fix\n\nOffset vmemmap so that the first page of vmemmap will be mapped\nto the first page of physical memory in order to ensure that\nvmemmap\u2019s bounds will be respected during\npfn_to_page()/page_to_pfn() operations.\nThe conversion macros will produce correct SV39/48/57 addresses\nfor every possible/valid DRAM_BASE inside the physical memory limits.\n\nv2:Address Alex's comments", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26795", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26795", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26795", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26795", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26795", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26795" + } + }, + "CVE-2024-26796": { + "affected_versions": "v6.6-rc1 to v6.8-rc7", + "breaks": "cc4c07c89aada16229084eeb93895c95b7eabaa3", + "cmt_msg": "drivers: perf: ctr_get_width function for legacy is not defined", + "fixes": "682dc133f83e0194796e6ea72eb642df1c03dfbe", + "last_affected_version": "6.7.8", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrivers: perf: ctr_get_width function for legacy is not defined\n\nWith parameters CONFIG_RISCV_PMU_LEGACY=y and CONFIG_RISCV_PMU_SBI=n\nlinux kernel crashes when you try perf record:\n\n$ perf record ls\n[ 46.749286] Unable to handle kernel NULL pointer dereference at virtual address 0000000000000000\n[ 46.750199] Oops [#1]\n[ 46.750342] Modules linked in:\n[ 46.750608] CPU: 0 PID: 107 Comm: perf-exec Not tainted 6.6.0 #2\n[ 46.750906] Hardware name: riscv-virtio,qemu (DT)\n[ 46.751184] epc : 0x0\n[ 46.751430] ra : arch_perf_update_userpage+0x54/0x13e\n[ 46.751680] epc : 0000000000000000 ra : ffffffff8072ee52 sp : ff2000000022b8f0\n[ 46.751958] gp : ffffffff81505988 tp : ff6000000290d400 t0 : ff2000000022b9c0\n[ 46.752229] t1 : 0000000000000001 t2 : 0000000000000003 s0 : ff2000000022b930\n[ 46.752451] s1 : ff600000028fb000 a0 : 0000000000000000 a1 : ff600000028fb000\n[ 46.752673] a2 : 0000000ae2751268 a3 : 00000000004fb708 a4 : 0000000000000004\n[ 46.752895] a5 : 0000000000000000 a6 : 000000000017ffe3 a7 : 00000000000000d2\n[ 46.753117] s2 : ff600000028fb000 s3 : 0000000ae2751268 s4 : 0000000000000000\n[ 46.753338] s5 : ffffffff8153e290 s6 : ff600000863b9000 s7 : ff60000002961078\n[ 46.753562] s8 : ff60000002961048 s9 : ff60000002961058 s10: 0000000000000001\n[ 46.753783] s11: 0000000000000018 t3 : ffffffffffffffff t4 : ffffffffffffffff\n[ 46.754005] t5 : ff6000000292270c t6 : ff2000000022bb30\n[ 46.754179] status: 0000000200000100 badaddr: 0000000000000000 cause: 000000000000000c\n[ 46.754653] Code: Unable to access instruction at 0xffffffffffffffec.\n[ 46.754939] ---[ end trace 0000000000000000 ]---\n[ 46.755131] note: perf-exec[107] exited with irqs disabled\n[ 46.755546] note: perf-exec[107] exited with preempt_count 4\n\nThis happens because in the legacy case the ctr_get_width function was not\ndefined, but it is used in arch_perf_update_userpage.\n\nAlso remove extra check in riscv_pmu_ctr_get_width_mask", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26796", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26796", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26796", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26796", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26796", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26796" + } + }, + "CVE-2024-26797": { + "affected_versions": "unk to v6.8-rc7", + "breaks": "", + "cmt_msg": "drm/amd/display: Prevent potential buffer overflow in map_hw_resources", + "fixes": "0f8ca019544a252d1afb468ce840c6dcbac73af4", + "last_affected_version": "6.7.8", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Prevent potential buffer overflow in map_hw_resources\n\nAdds a check in the map_hw_resources function to prevent a potential\nbuffer overflow. The function was accessing arrays using an index that\ncould potentially be greater than the size of the arrays, leading to a\nbuffer overflow.\n\nAdds a check to ensure that the index is within the bounds of the\narrays. If the index is out of bounds, an error message is printed and\nbreak it will continue execution with just ignoring extra data early to\nprevent the buffer overflow.\n\nReported by smatch:\ndrivers/gpu/drm/amd/amdgpu/../display/dc/dml2/dml2_wrapper.c:79 map_hw_resources() error: buffer overflow 'dml2->v20.scratch.dml_to_dc_pipe_mapping.disp_cfg_to_stream_id' 6 <= 7\ndrivers/gpu/drm/amd/amdgpu/../display/dc/dml2/dml2_wrapper.c:81 map_hw_resources() error: buffer overflow 'dml2->v20.scratch.dml_to_dc_pipe_mapping.disp_cfg_to_plane_id' 6 <= 7", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26797", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26797", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26797", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26797", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26797", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26797" + } + }, + "CVE-2024-26798": { + "affected_versions": "unk to v6.8-rc7", + "breaks": "", + "cmt_msg": "fbcon: always restore the old font data in fbcon_do_set_font()", + "fixes": "00d6a284fcf3fad1b7e1b5bc3cd87cbfb60ce03f", + "last_affected_version": "6.7.8", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfbcon: always restore the old font data in fbcon_do_set_font()\n\nCommit a5a923038d70 (fbdev: fbcon: Properly revert changes when\nvc_resize() failed) started restoring old font data upon failure (of\nvc_resize()). But it performs so only for user fonts. It means that the\n\"system\"/internal fonts are not restored at all. So in result, the very\nfirst call to fbcon_do_set_font() performs no restore at all upon\nfailing vc_resize().\n\nThis can be reproduced by Syzkaller to crash the system on the next\ninvocation of font_get(). It's rather hard to hit the allocation failure\nin vc_resize() on the first font_set(), but not impossible. Esp. if\nfault injection is used to aid the execution/failure. It was\ndemonstrated by Sirius:\n BUG: unable to handle page fault for address: fffffffffffffff8\n #PF: supervisor read access in kernel mode\n #PF: error_code(0x0000) - not-present page\n PGD cb7b067 P4D cb7b067 PUD cb7d067 PMD 0\n Oops: 0000 [#1] PREEMPT SMP KASAN\n CPU: 1 PID: 8007 Comm: poc Not tainted 6.7.0-g9d1694dc91ce #20\n Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014\n RIP: 0010:fbcon_get_font+0x229/0x800 drivers/video/fbdev/core/fbcon.c:2286\n Call Trace:\n \n con_font_get drivers/tty/vt/vt.c:4558 [inline]\n con_font_op+0x1fc/0xf20 drivers/tty/vt/vt.c:4673\n vt_k_ioctl drivers/tty/vt/vt_ioctl.c:474 [inline]\n vt_ioctl+0x632/0x2ec0 drivers/tty/vt/vt_ioctl.c:752\n tty_ioctl+0x6f8/0x1570 drivers/tty/tty_io.c:2803\n vfs_ioctl fs/ioctl.c:51 [inline]\n ...\n\nSo restore the font data in any case, not only for user fonts. Note the\nlater 'if' is now protected by 'old_userfont' and not 'old_data' as the\nlatter is always set now. (And it is supposed to be non-NULL. Otherwise\nwe would see the bug above again.)", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26798", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26798", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26798", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26798", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26798", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26798" + } + }, + "CVE-2024-26799": { + "affected_versions": "v5.18-rc1 to v6.8-rc7", + "breaks": "b81af585ea54ee9f749391e594ee9cbd44061eae", + "cmt_msg": "ASoC: qcom: Fix uninitialized pointer dmactl", + "fixes": "1382d8b55129875b2e07c4d2a7ebc790183769ee", + "last_affected_version": "6.7.8", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: qcom: Fix uninitialized pointer dmactl\n\nIn the case where __lpass_get_dmactl_handle is called and the driver\nid dai_id is invalid the pointer dmactl is not being assigned a value,\nand dmactl contains a garbage value since it has not been initialized\nand so the null check may not work. Fix this to initialize dmactl to\nNULL. One could argue that modern compilers will set this to zero, but\nit is useful to keep this initialized as per the same way in functions\n__lpass_platform_codec_intf_init and lpass_cdc_dma_daiops_hw_params.\n\nCleans up clang scan build warning:\nsound/soc/qcom/lpass-cdc-dma.c:275:7: warning: Branch condition\nevaluates to a garbage value [core.uninitialized.Branch]", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26799", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26799", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26799", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26799", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26799", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26799" + } + }, + "CVE-2024-26800": { + "affected_versions": "v6.8-rc5 to v6.8-rc7", + "breaks": "8590541473188741055d27b955db0777569438e3", + "fixes": "13114dc5543069f7b97991e3b79937b6da05f5b0", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntls: fix use-after-free on failed backlog decryption\n\nWhen the decrypt request goes to the backlog and crypto_aead_decrypt\nreturns -EBUSY, tls_do_decryption will wait until all async\ndecryptions have completed. If one of them fails, tls_do_decryption\nwill return -EBADMSG and tls_decrypt_sg jumps to the error path,\nreleasing all the pages. But the pages have been passed to the async\ncallback, and have already been released by tls_decrypt_done.\n\nThe only true async case is when crypto_aead_decrypt returns\n -EINPROGRESS. With -EBUSY, we already waited so we can tell\ntls_sw_recvmsg that the data is available for immediate copy, but we\nneed to notify tls_decrypt_sg (via the new ->async_done flag) that the\nmemory has already been released.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26800", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26800", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26800", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26800", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26800", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26800" + } + }, + "CVE-2024-26801": { + "affected_versions": "v4.0-rc1 to v6.8-rc7", + "breaks": "c7741d16a57cbf97eebe53f27e8216b1ff20e20c", + "cmt_msg": "Bluetooth: Avoid potential use-after-free in hci_error_reset", + "fixes": "2449007d3f73b2842c9734f45f0aadb522daf592", + "last_affected_version": "6.7.8", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: Avoid potential use-after-free in hci_error_reset\n\nWhile handling the HCI_EV_HARDWARE_ERROR event, if the underlying\nBT controller is not responding, the GPIO reset mechanism would\nfree the hci_dev and lead to a use-after-free in hci_error_reset.\n\nHere's the call trace observed on a ChromeOS device with Intel AX201:\n queue_work_on+0x3e/0x6c\n __hci_cmd_sync_sk+0x2ee/0x4c0 [bluetooth ]\n ? init_wait_entry+0x31/0x31\n __hci_cmd_sync+0x16/0x20 [bluetooth ]\n hci_error_reset+0x4f/0xa4 [bluetooth ]\n process_one_work+0x1d8/0x33f\n worker_thread+0x21b/0x373\n kthread+0x13a/0x152\n ? pr_cont_work+0x54/0x54\n ? kthread_blkcg+0x31/0x31\n ret_from_fork+0x1f/0x30\n\nThis patch holds the reference count on the hci_dev while processing\na HCI_EV_HARDWARE_ERROR event to avoid potential crash.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26801", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26801", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26801", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26801", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26801", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26801" + } + }, + "CVE-2024-26802": { + "affected_versions": "unk to v6.8-rc7", + "breaks": "", + "cmt_msg": "stmmac: Clear variable when destroying workqueue", + "fixes": "8af411bbba1f457c33734795f024d0ef26d0963f", + "last_affected_version": "6.7.8", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nstmmac: Clear variable when destroying workqueue\n\nCurrently when suspending driver and stopping workqueue it is checked whether\nworkqueue is not NULL and if so, it is destroyed.\nFunction destroy_workqueue() does drain queue and does clear variable, but\nit does not set workqueue variable to NULL. This can cause kernel/module\npanic if code attempts to clear workqueue that was not initialized.\n\nThis scenario is possible when resuming suspended driver in stmmac_resume(),\nbecause there is no handling for failed stmmac_hw_setup(),\nwhich can fail and return if DMA engine has failed to initialize,\nand workqueue is initialized after DMA engine.\nShould DMA engine fail to initialize, resume will proceed normally,\nbut interface won't work and TX queue will eventually timeout,\ncausing 'Reset adapter' error.\nThis then does destroy workqueue during reset process.\nAnd since workqueue is initialized after DMA engine and can be skipped,\nit will cause kernel/module panic.\n\nTo secure against this possible crash, set workqueue variable to NULL when\ndestroying workqueue.\n\nLog/backtrace from crash goes as follows:\n[88.031977]------------[ cut here ]------------\n[88.031985]NETDEV WATCHDOG: eth0 (sxgmac): transmit queue 1 timed out\n[88.032017]WARNING: CPU: 0 PID: 0 at net/sched/sch_generic.c:477 dev_watchdog+0x390/0x398\n \n[88.032251]---[ end trace e70de432e4d5c2c0 ]---\n[88.032282]sxgmac 16d88000.ethernet eth0: Reset adapter.\n[88.036359]------------[ cut here ]------------\n[88.036519]Call trace:\n[88.036523] flush_workqueue+0x3e4/0x430\n[88.036528] drain_workqueue+0xc4/0x160\n[88.036533] destroy_workqueue+0x40/0x270\n[88.036537] stmmac_fpe_stop_wq+0x4c/0x70\n[88.036541] stmmac_release+0x278/0x280\n[88.036546] __dev_close_many+0xcc/0x158\n[88.036551] dev_close_many+0xbc/0x190\n[88.036555] dev_close.part.0+0x70/0xc0\n[88.036560] dev_close+0x24/0x30\n[88.036564] stmmac_service_task+0x110/0x140\n[88.036569] process_one_work+0x1d8/0x4a0\n[88.036573] worker_thread+0x54/0x408\n[88.036578] kthread+0x164/0x170\n[88.036583] ret_from_fork+0x10/0x20\n[88.036588]---[ end trace e70de432e4d5c2c1 ]---\n[88.036597]Unable to handle kernel NULL pointer dereference at virtual address 0000000000000004", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26802", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26802", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26802", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26802", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26802", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26802" + } + }, + "CVE-2024-26803": { + "affected_versions": "unk to v6.8-rc7", + "breaks": "", + "cmt_msg": "net: veth: clear GRO when clearing XDP even when down", + "fixes": "fe9f801355f0b47668419f30f1fac1cf4539e736", + "last_affected_version": "6.7.8", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: veth: clear GRO when clearing XDP even when down\n\nveth sets NETIF_F_GRO automatically when XDP is enabled,\nbecause both features use the same NAPI machinery.\n\nThe logic to clear NETIF_F_GRO sits in veth_disable_xdp() which\nis called both on ndo_stop and when XDP is turned off.\nTo avoid the flag from being cleared when the device is brought\ndown, the clearing is skipped when IFF_UP is not set.\nBringing the device down should indeed not modify its features.\n\nUnfortunately, this means that clearing is also skipped when\nXDP is disabled _while_ the device is down. And there's nothing\non the open path to bring the device features back into sync.\nIOW if user enables XDP, disables it and then brings the device\nup we'll end up with a stray GRO flag set but no NAPI instances.\n\nWe don't depend on the GRO flag on the datapath, so the datapath\nwon't crash. We will crash (or hang), however, next time features\nare sync'ed (either by user via ethtool or peer changing its config).\nThe GRO flag will go away, and veth will try to disable the NAPIs.\nBut the open path never created them since XDP was off, the GRO flag\nwas a stray. If NAPI was initialized before we'll hang in napi_disable().\nIf it never was we'll crash trying to stop uninitialized hrtimer.\n\nMove the GRO flag updates to the XDP enable / disable paths,\ninstead of mixing them with the ndo_open / ndo_close paths.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26803", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26803", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26803", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26803", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26803", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26803" + } + }, + "CVE-2024-26804": { + "affected_versions": "v2.6.34-rc3 to v6.8-rc7", + "breaks": "243aad830e8a4cdda261626fbaeddde16b08d04a", + "cmt_msg": "net: ip_tunnel: prevent perpetual headroom growth", + "fixes": "5ae1e9922bbdbaeb9cfbe91085ab75927488ac0f", + "last_affected_version": "6.7.8", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: ip_tunnel: prevent perpetual headroom growth\n\nsyzkaller triggered following kasan splat:\nBUG: KASAN: use-after-free in __skb_flow_dissect+0x19d1/0x7a50 net/core/flow_dissector.c:1170\nRead of size 1 at addr ffff88812fb4000e by task syz-executor183/5191\n[..]\n kasan_report+0xda/0x110 mm/kasan/report.c:588\n __skb_flow_dissect+0x19d1/0x7a50 net/core/flow_dissector.c:1170\n skb_flow_dissect_flow_keys include/linux/skbuff.h:1514 [inline]\n ___skb_get_hash net/core/flow_dissector.c:1791 [inline]\n __skb_get_hash+0xc7/0x540 net/core/flow_dissector.c:1856\n skb_get_hash include/linux/skbuff.h:1556 [inline]\n ip_tunnel_xmit+0x1855/0x33c0 net/ipv4/ip_tunnel.c:748\n ipip_tunnel_xmit+0x3cc/0x4e0 net/ipv4/ipip.c:308\n __netdev_start_xmit include/linux/netdevice.h:4940 [inline]\n netdev_start_xmit include/linux/netdevice.h:4954 [inline]\n xmit_one net/core/dev.c:3548 [inline]\n dev_hard_start_xmit+0x13d/0x6d0 net/core/dev.c:3564\n __dev_queue_xmit+0x7c1/0x3d60 net/core/dev.c:4349\n dev_queue_xmit include/linux/netdevice.h:3134 [inline]\n neigh_connected_output+0x42c/0x5d0 net/core/neighbour.c:1592\n ...\n ip_finish_output2+0x833/0x2550 net/ipv4/ip_output.c:235\n ip_finish_output+0x31/0x310 net/ipv4/ip_output.c:323\n ..\n iptunnel_xmit+0x5b4/0x9b0 net/ipv4/ip_tunnel_core.c:82\n ip_tunnel_xmit+0x1dbc/0x33c0 net/ipv4/ip_tunnel.c:831\n ipgre_xmit+0x4a1/0x980 net/ipv4/ip_gre.c:665\n __netdev_start_xmit include/linux/netdevice.h:4940 [inline]\n netdev_start_xmit include/linux/netdevice.h:4954 [inline]\n xmit_one net/core/dev.c:3548 [inline]\n dev_hard_start_xmit+0x13d/0x6d0 net/core/dev.c:3564\n ...\n\nThe splat occurs because skb->data points past skb->head allocated area.\nThis is because neigh layer does:\n __skb_pull(skb, skb_network_offset(skb));\n\n... but skb_network_offset() returns a negative offset and __skb_pull()\narg is unsigned. IOW, we skb->data gets \"adjusted\" by a huge value.\n\nThe negative value is returned because skb->head and skb->data distance is\nmore than 64k and skb->network_header (u16) has wrapped around.\n\nThe bug is in the ip_tunnel infrastructure, which can cause\ndev->needed_headroom to increment ad infinitum.\n\nThe syzkaller reproducer consists of packets getting routed via a gre\ntunnel, and route of gre encapsulated packets pointing at another (ipip)\ntunnel. The ipip encapsulation finds gre0 as next output device.\n\nThis results in the following pattern:\n\n1). First packet is to be sent out via gre0.\nRoute lookup found an output device, ipip0.\n\n2).\nip_tunnel_xmit for gre0 bumps gre0->needed_headroom based on the future\noutput device, rt.dev->needed_headroom (ipip0).\n\n3).\nip output / start_xmit moves skb on to ipip0. which runs the same\ncode path again (xmit recursion).\n\n4).\nRouting step for the post-gre0-encap packet finds gre0 as output device\nto use for ipip0 encapsulated packet.\n\ntunl0->needed_headroom is then incremented based on the (already bumped)\ngre0 device headroom.\n\nThis repeats for every future packet:\n\ngre0->needed_headroom gets inflated because previous packets' ipip0 step\nincremented rt->dev (gre0) headroom, and ipip0 incremented because gre0\nneeded_headroom was increased.\n\nFor each subsequent packet, gre/ipip0->needed_headroom grows until\npost-expand-head reallocations result in a skb->head/data distance of\nmore than 64k.\n\nOnce that happens, skb->network_header (u16) wraps around when\npskb_expand_head tries to make sure that skb_network_offset() is unchanged\nafter the headroom expansion/reallocation.\n\nAfter this skb_network_offset(skb) returns a different (and negative)\nresult post headroom expansion.\n\nThe next trip to neigh layer (or anything else that would __skb_pull the\nnetwork header) makes skb->data point to a memory location outside\nskb->head area.\n\nv2: Cap the needed_headroom update to an arbitarily chosen upperlimit to\nprevent perpetual increase instead of dropping the headroom increment\ncompletely.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26804", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26804", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26804", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26804", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26804", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26804" + } + }, + "CVE-2024-26805": { + "affected_versions": "v4.3-rc3 to v6.8-rc7", + "breaks": "1853c949646005b5959c483becde86608f548f24", + "cmt_msg": "netlink: Fix kernel-infoleak-after-free in __skb_datagram_iter", + "fixes": "661779e1fcafe1b74b3f3fe8e980c1e207fea1fd", + "last_affected_version": "6.7.8", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetlink: Fix kernel-infoleak-after-free in __skb_datagram_iter\n\nsyzbot reported the following uninit-value access issue [1]:\n\nnetlink_to_full_skb() creates a new `skb` and puts the `skb->data`\npassed as a 1st arg of netlink_to_full_skb() onto new `skb`. The data\nsize is specified as `len` and passed to skb_put_data(). This `len`\nis based on `skb->end` that is not data offset but buffer offset. The\n`skb->end` contains data and tailroom. Since the tailroom is not\ninitialized when the new `skb` created, KMSAN detects uninitialized\nmemory area when copying the data.\n\nThis patch resolved this issue by correct the len from `skb->end` to\n`skb->len`, which is the actual data offset.\n\nBUG: KMSAN: kernel-infoleak-after-free in instrument_copy_to_user include/linux/instrumented.h:114 [inline]\nBUG: KMSAN: kernel-infoleak-after-free in copy_to_user_iter lib/iov_iter.c:24 [inline]\nBUG: KMSAN: kernel-infoleak-after-free in iterate_ubuf include/linux/iov_iter.h:29 [inline]\nBUG: KMSAN: kernel-infoleak-after-free in iterate_and_advance2 include/linux/iov_iter.h:245 [inline]\nBUG: KMSAN: kernel-infoleak-after-free in iterate_and_advance include/linux/iov_iter.h:271 [inline]\nBUG: KMSAN: kernel-infoleak-after-free in _copy_to_iter+0x364/0x2520 lib/iov_iter.c:186\n instrument_copy_to_user include/linux/instrumented.h:114 [inline]\n copy_to_user_iter lib/iov_iter.c:24 [inline]\n iterate_ubuf include/linux/iov_iter.h:29 [inline]\n iterate_and_advance2 include/linux/iov_iter.h:245 [inline]\n iterate_and_advance include/linux/iov_iter.h:271 [inline]\n _copy_to_iter+0x364/0x2520 lib/iov_iter.c:186\n copy_to_iter include/linux/uio.h:197 [inline]\n simple_copy_to_iter+0x68/0xa0 net/core/datagram.c:532\n __skb_datagram_iter+0x123/0xdc0 net/core/datagram.c:420\n skb_copy_datagram_iter+0x5c/0x200 net/core/datagram.c:546\n skb_copy_datagram_msg include/linux/skbuff.h:3960 [inline]\n packet_recvmsg+0xd9c/0x2000 net/packet/af_packet.c:3482\n sock_recvmsg_nosec net/socket.c:1044 [inline]\n sock_recvmsg net/socket.c:1066 [inline]\n sock_read_iter+0x467/0x580 net/socket.c:1136\n call_read_iter include/linux/fs.h:2014 [inline]\n new_sync_read fs/read_write.c:389 [inline]\n vfs_read+0x8f6/0xe00 fs/read_write.c:470\n ksys_read+0x20f/0x4c0 fs/read_write.c:613\n __do_sys_read fs/read_write.c:623 [inline]\n __se_sys_read fs/read_write.c:621 [inline]\n __x64_sys_read+0x93/0xd0 fs/read_write.c:621\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0x44/0x110 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x63/0x6b\n\nUninit was stored to memory at:\n skb_put_data include/linux/skbuff.h:2622 [inline]\n netlink_to_full_skb net/netlink/af_netlink.c:181 [inline]\n __netlink_deliver_tap_skb net/netlink/af_netlink.c:298 [inline]\n __netlink_deliver_tap+0x5be/0xc90 net/netlink/af_netlink.c:325\n netlink_deliver_tap net/netlink/af_netlink.c:338 [inline]\n netlink_deliver_tap_kernel net/netlink/af_netlink.c:347 [inline]\n netlink_unicast_kernel net/netlink/af_netlink.c:1341 [inline]\n netlink_unicast+0x10f1/0x1250 net/netlink/af_netlink.c:1368\n netlink_sendmsg+0x1238/0x13d0 net/netlink/af_netlink.c:1910\n sock_sendmsg_nosec net/socket.c:730 [inline]\n __sock_sendmsg net/socket.c:745 [inline]\n ____sys_sendmsg+0x9c2/0xd60 net/socket.c:2584\n ___sys_sendmsg+0x28d/0x3c0 net/socket.c:2638\n __sys_sendmsg net/socket.c:2667 [inline]\n __do_sys_sendmsg net/socket.c:2676 [inline]\n __se_sys_sendmsg net/socket.c:2674 [inline]\n __x64_sys_sendmsg+0x307/0x490 net/socket.c:2674\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0x44/0x110 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x63/0x6b\n\nUninit was created at:\n free_pages_prepare mm/page_alloc.c:1087 [inline]\n free_unref_page_prepare+0xb0/0xa40 mm/page_alloc.c:2347\n free_unref_page_list+0xeb/0x1100 mm/page_alloc.c:2533\n release_pages+0x23d3/0x2410 mm/swap.c:1042\n free_pages_and_swap_cache+0xd9/0xf0 mm/swap_state.c:316\n tlb_batch_pages\n---truncated---", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26805", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26805", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26805", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26805", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26805", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26805" + } + }, + "CVE-2024-26806": { + "affected_versions": "unk to v6.8-rc7", + "breaks": "", + "cmt_msg": "spi: cadence-qspi: remove system-wide suspend helper calls from runtime PM hooks", + "fixes": "959043afe53ae80633e810416cee6076da6e91c6", + "last_affected_version": "6.7.8", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nspi: cadence-qspi: remove system-wide suspend helper calls from runtime PM hooks\n\nThe ->runtime_suspend() and ->runtime_resume() callbacks are not\nexpected to call spi_controller_suspend() and spi_controller_resume().\nRemove calls to those in the cadence-qspi driver.\n\nThose helpers have two roles currently:\n - They stop/start the queue, including dealing with the kworker.\n - They toggle the SPI controller SPI_CONTROLLER_SUSPENDED flag. It\n requires acquiring ctlr->bus_lock_mutex.\n\nStep one is irrelevant because cadence-qspi is not queued. Step two\nhowever has two implications:\n - A deadlock occurs, because ->runtime_resume() is called in a context\n where the lock is already taken (in the ->exec_op() callback, where\n the usage count is incremented).\n - It would disallow all operations once the device is auto-suspended.\n\nHere is a brief call tree highlighting the mutex deadlock:\n\nspi_mem_exec_op()\n ...\n spi_mem_access_start()\n mutex_lock(&ctlr->bus_lock_mutex)\n\n cqspi_exec_mem_op()\n pm_runtime_resume_and_get()\n cqspi_resume()\n spi_controller_resume()\n mutex_lock(&ctlr->bus_lock_mutex)\n ...\n\n spi_mem_access_end()\n mutex_unlock(&ctlr->bus_lock_mutex)\n ...", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26806", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26806", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26806", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26806", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26806", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26806" + } + }, + "CVE-2024-26807": { + "affected_versions": "v6.4-rc1 to v6.8-rc7", + "breaks": "2087e85bb66ee3652dafe732bb9b9b896229eafc", + "cmt_msg": "spi: cadence-qspi: fix pointer reference in runtime PM hooks", + "fixes": "32ce3bb57b6b402de2aec1012511e7ac4e7449dc", + "last_affected_version": "6.7.8", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nspi: cadence-qspi: fix pointer reference in runtime PM hooks\n\ndev_get_drvdata() gets used to acquire the pointer to cqspi and the SPI\ncontroller. Neither embed the other; this lead to memory corruption.\n\nOn a given platform (Mobileye EyeQ5) the memory corruption is hidden\ninside cqspi->f_pdata. Also, this uninitialised memory is used as a\nmutex (ctlr->bus_lock_mutex) by spi_controller_suspend().", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26807", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26807", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26807", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26807", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26807", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26807" + } + }, + "CVE-2024-26808": { + "affected_versions": "unk to v6.8-rc2", + "breaks": "", + "cmt_msg": "netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain", + "fixes": "01acb2e8666a6529697141a6017edbf206921913", + "last_affected_version": "6.7.2", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain\n\nRemove netdevice from inet/ingress basechain in case NETDEV_UNREGISTER\nevent is reported, otherwise a stale reference to netdevice remains in\nthe hook list.", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26808", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26808", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26808", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26808", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26808", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26808" + } + }, + "CVE-2024-26809": { + "affected_versions": "unk to v6.9-rc1", + "breaks": "", + "cmt_msg": "netfilter: nft_set_pipapo: release elements in clone only from destroy path", + "fixes": "b0e256f3dd2ba6532f37c5c22e07cb07a36031ee", + "last_affected_version": "6.7.10", + "last_modified": "2024-04-09", + "nvd_text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nft_set_pipapo: release elements in clone only from destroy path\n\nClone already always provides a current view of the lookup table, use it\nto destroy the set, otherwise it is possible to destroy elements twice.\n\nThis fix requires:\n\n 212ed75dc5fb (\"netfilter: nf_tables: integrate pipapo into commit protocol\")\n\nwhich came after:\n\n 9827a0e6e23b (\"netfilter: nft_set_pipapo: release elements in clone from abort path\").", + "ref_urls": { + "Debian": "https://security-tracker.debian.org/tracker/CVE-2024-26809", + "ExploitDB": "https://www.exploit-db.com/search?cve=2024-26809", + "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2024-26809", + "Red Hat": "https://access.redhat.com/security/cve/CVE-2024-26809", + "SUSE": "https://www.suse.com/security/cve/CVE-2024-26809", + "Ubuntu": "https://ubuntu.com/security/CVE-2024-26809" + } } } \ No newline at end of file diff --git a/data/stream_data.json b/data/stream_data.json index f21a81e08..6bfa6552e 100644 --- a/data/stream_data.json +++ b/data/stream_data.json @@ -1819,6 +1819,10 @@ "cmt_msg": "net: hsr: fix memory leak in hsr_dev_finalize()", "cmt_id": "e3d6490ad2b47f41bd534a6a5f8655549a754665" }, + "CVE-2019-25160": { + "cmt_msg": "netlabel: fix out-of-bounds memory accesses", + "cmt_id": "c61d01faa5550e06794dcf86125ccd325bfad950" + }, "CVE-2019-2101": { "cmt_msg": "media: uvcvideo: Fix 'type' check leading to overflow", "cmt_id": "7828fe7452f151cc1107a5c28ed042aeb64c1166" @@ -1920,6 +1924,9 @@ "CVE-2020-35508": { "cmt_msg": "fork: fix copy_process(CLONE_PARENT) race with the exiting ->real_parent" }, + "CVE-2024-26686": { + "cmt_msg": "fs/proc: do_task_stat: use sig->stats_lock to gather the threads/children stats" + }, "CVE-2022-3649": { "cmt_msg": "nilfs2: fix use-after-free bug of struct nilfs_root" }, @@ -1929,6 +1936,9 @@ "CVE-2019-15098": { "cmt_msg": "ath6kl: fix a NULL-ptr-deref bug in ath6kl_usb_alloc_urb_from_pipe()" }, + "CVE-2024-26687": { + "cmt_msg": "xen/events: close evtchn after mapping cleanup" + }, "CVE-2021-45095": { "cmt_msg": "phonet: refcount leak in pep_sock_accep" }, @@ -1947,6 +1957,15 @@ "CVE-2017-15102": { "cmt_msg": "usb: misc: legousbtower: Fix NULL pointer deference" }, + "CVE-2023-52615": { + "cmt_msg": "hwrng: core - Fix page fault dead lock on mmap-ed hwrng" + }, + "CVE-2023-52614": { + "cmt_msg": "PM / devfreq: Fix buffer overflow in trans_stat_show" + }, + "CVE-2023-52617": { + "cmt_msg": "PCI: switchtec: Fix stdev_release() crash after surprise hot remove" + }, "CVE-2020-24587": { "cmt_msg": "mac80211: prevent mixed key and fragment cache attacks" }, @@ -1962,6 +1981,12 @@ "CVE-2020-24588": { "cmt_msg": "cfg80211: mitigate A-MSDU aggregation attacks" }, + "CVE-2023-52619": { + "cmt_msg": "pstore/ram: Fix crash when setting number of cpus to an odd number" + }, + "CVE-2023-52618": { + "cmt_msg": "block/rnbd-srv: Check for unlikely string overflow" + }, "CVE-2016-10044": { "cmt_msg": "aio: mark AIO pseudo-fs noexec" }, @@ -1998,11 +2023,29 @@ "CVE-2021-3847": { "cmt_msg": "" }, + "CVE-2021-47052": { + "cmt_msg": "crypto: sa2ul - Fix memory leak of rxd" + }, "CVE-2016-2143": { "cmt_msg": "s390/mm: four page table levels vs. fork" }, - "CVE-2024-26588": { - "cmt_msg": "LoongArch: BPF: Prevent out-of-bounds memory access" + "CVE-2021-47112": { + "cmt_msg": "x86/kvm: Teardown PV features on boot CPU as well" + }, + "CVE-2021-47113": { + "cmt_msg": "btrfs: abort in rename_exchange if we fail to insert the second ref" + }, + "CVE-2021-47110": { + "cmt_msg": "x86/kvm: Disable kvmclock on all CPUs on shutdown" + }, + "CVE-2021-47116": { + "cmt_msg": "ext4: fix memory leak in ext4_mb_init_backend on error path." + }, + "CVE-2021-47117": { + "cmt_msg": "ext4: fix bug on in ext4_es_cache_extent as ext4_split_extent_at failed" + }, + "CVE-2021-47114": { + "cmt_msg": "ocfs2: fix data corruption by fallocate" }, "CVE-2023-2162": { "cmt_msg": "scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress" @@ -2010,6 +2053,12 @@ "CVE-2017-5551": { "cmt_msg": "tmpfs: clear S_ISGID when setting posix ACLs" }, + "CVE-2021-47118": { + "cmt_msg": "pid: take a reference when initializing `cad_pid`" + }, + "CVE-2021-46970": { + "cmt_msg": "bus: mhi: pci_generic: Remove WQ_MEM_RECLAIM flag from state workqueue" + }, "CVE-2019-19241": { "cmt_msg": "io_uring: async workers should inherit the user creds" }, @@ -2052,6 +2101,9 @@ "CVE-2023-0458": { "cmt_msg": "prlimit: do_prlimit needs to have a speculation check" }, + "CVE-2021-47086": { + "cmt_msg": "phonet/pep: refuse to enable an unbound pipe" + }, "CVE-2023-0597": { "cmt_msg": "x86/mm: Randomize per-cpu entry area" }, @@ -2115,6 +2167,9 @@ "CVE-2022-3202": { "cmt_msg": "jfs: prevent NULL deref in diFree" }, + "CVE-2021-47028": { + "cmt_msg": "mt76: mt7915: fix txrate reporting" + }, "CVE-2018-3646": { "cmt_msg": "x86/microcode: Allow late microcode loading with SMT disabled" }, @@ -2125,7 +2180,7 @@ "cmt_msg": "staging: android: ion: Drop ion_map_kernel interface" }, "CVE-2024-24861": { - "cmt_msg": "" + "cmt_msg": "media: xc4000: Fix atomicity violation in xc4000_get_frequency" }, "CVE-2022-28388": { "cmt_msg": "can: usb_8dev: usb_8dev_start_xmit(): fix double dev_kfree_skb() in error path" @@ -2142,6 +2197,9 @@ "CVE-2017-7895": { "cmt_msg": "nfsd: stricter decoding of write-like NFSv2/v3 ops" }, + "CVE-2021-46906": { + "cmt_msg": "HID: usbhid: fix info leak in hid_submit_ctrl" + }, "CVE-2018-14614": { "cmt_msg": "f2fs: fix to do sanity check with cp_pack_start_sum" }, @@ -2208,6 +2266,9 @@ "CVE-2018-13093": { "cmt_msg": "xfs: validate cached inodes are free when allocated" }, + "CVE-2024-26745": { + "cmt_msg": "powerpc/pseries/iommu: IOMMU table is not initialized for kdump over SR-IOV" + }, "CVE-2023-51781": { "cmt_msg": "appletalk: Fix Use-After-Free in atalk_ioctl" }, @@ -2235,6 +2296,12 @@ "CVE-2018-13099": { "cmt_msg": "f2fs: fix to do sanity check with reserved blkaddr of inline inode" }, + "CVE-2024-26772": { + "cmt_msg": "ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal()" + }, + "CVE-2024-26748": { + "cmt_msg": "usb: cdns3: fix memory double free when handle zero packet" + }, "CVE-2014-9717": { "cmt_msg": "mnt: Update detach_mounts to leave mounts connected" }, @@ -2265,12 +2332,18 @@ "CVE-2015-8952": { "cmt_msg": "ext2: convert to mbcache2" }, + "CVE-2024-26699": { + "cmt_msg": "drm/amd/display: Fix array-index-out-of-bounds in dcn35_clkmgr" + }, "CVE-2022-23038": { "cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()" }, "CVE-2022-23039": { "cmt_msg": "xen/gntalloc: don't use gnttab_query_foreign_access()" }, + "CVE-2024-26691": { + "cmt_msg": "KVM: arm64: Fix circular locking dependency" + }, "CVE-2016-8645": { "cmt_msg": "tcp: take care of truncations done by sk_filter()" }, @@ -2280,6 +2353,9 @@ "CVE-2022-23037": { "cmt_msg": "xen/netfront: don't use gnttab_query_foreign_access() for mapped status" }, + "CVE-2024-26697": { + "cmt_msg": "nilfs2: fix data corruption in dsync block recovery for small block sizes" + }, "CVE-2017-5669": { "cmt_msg": "ipc/shm: Fix shmat mmap nil-page protection" }, @@ -2301,6 +2377,12 @@ "CVE-2021-42008": { "cmt_msg": "net: 6pack: fix slab-out-of-bounds in decode_data" }, + "CVE-2022-44033": { + "cmt_msg": "char: pcmcia: remove all the drivers" + }, + "CVE-2024-26789": { + "cmt_msg": "crypto: arm64/neonbs - fix out-of-bounds access on short input" + }, "CVE-2022-39188": { "cmt_msg": "mmu_gather: Force tlb-flush VM_PFNMAP vmas" }, @@ -2334,6 +2416,9 @@ "CVE-2019-15215": { "cmt_msg": "media: cpia2_usb: first wake up, then free in disconnect" }, + "CVE-2023-52574": { + "cmt_msg": "team: fix null-ptr-deref when team device type is changed" + }, "CVE-2021-33034": { "cmt_msg": "Bluetooth: verify AMP hci_chan before amp_destroy" }, @@ -2352,6 +2437,12 @@ "CVE-2020-15437": { "cmt_msg": "serial: 8250: fix null-ptr-deref in serial8250_start_tx()" }, + "CVE-2023-52528": { + "cmt_msg": "net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg" + }, + "CVE-2023-52598": { + "cmt_msg": "s390/ptrace: handle setting of fpc register correctly" + }, "CVE-2016-3857": { "cmt_msg": "arm: oabi compat: add missing access checks" }, @@ -2409,12 +2500,18 @@ "CVE-2023-39198": { "cmt_msg": "drm/qxl: fix UAF on handle creation" }, + "CVE-2023-42752": { + "cmt_msg": "igmp: limit igmpv3_newpack() packet size to IP_MAX_MTU" + }, "CVE-2018-12127": { "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" }, "CVE-2018-12126": { "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" }, + "CVE-2022-1048": { + "cmt_msg": "ALSA: pcm: Fix races among concurrent hw_params and hw_free calls" + }, "CVE-2023-37454": { "cmt_msg": "" }, @@ -2427,6 +2524,9 @@ "CVE-2023-39197": { "cmt_msg": "netfilter: conntrack: dccp: copy entire header to stack buffer, not just basic one" }, + "CVE-2023-52489": { + "cmt_msg": "mm/sparsemem: fix race in accessing memory_section->usage" + }, "CVE-2019-10126": { "cmt_msg": "mwifiex: Fix heap overflow in mwifiex_uap_parse_tail_ies()" }, @@ -2436,6 +2536,9 @@ "CVE-2019-13631": { "cmt_msg": "Input: gtco - bounds check collection indent level" }, + "CVE-2023-52584": { + "cmt_msg": "spmi: mediatek: Fix UAF on device remove" + }, "CVE-2020-13974": { "cmt_msg": "vt: keyboard: avoid signed integer overflow in k_ascii" }, @@ -2451,6 +2554,9 @@ "CVE-2023-33288": { "cmt_msg": "power: supply: bq24190: Fix use after free bug in bq24190_remove due to race condition" }, + "CVE-2023-52484": { + "cmt_msg": "iommu/arm-smmu-v3: Fix soft lockup triggered by arm_smmu_mm_invalidate_range" + }, "CVE-2022-29900": { "cmt_msg": "x86/kvm/vmx: Make noinstr clean" }, @@ -2466,8 +2572,8 @@ "CVE-2020-10751": { "cmt_msg": "selinux: properly handle multiple messages in selinux_netlink_send()" }, - "CVE-2022-3567": { - "cmt_msg": "ipv6: Fix data races around sk->sk_prot." + "CVE-2021-47149": { + "cmt_msg": "net: fujitsu: fix potential null-ptr-deref" }, "CVE-2021-4002": { "cmt_msg": "hugetlbfs: flush TLBs correctly after huge_pmd_unshare" @@ -2499,12 +2605,30 @@ "CVE-2020-8647": { "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region" }, + "CVE-2022-3564": { + "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free caused by l2cap_reassemble_sdu" + }, "CVE-2022-23816": { "cmt_msg": "x86/kvm/vmx: Make noinstr clean" }, "CVE-2019-0154": { "cmt_msg": "drm/i915: Lower RM timeout to avoid DSI hard hangs" }, + "CVE-2023-52481": { + "cmt_msg": "arm64: errata: Add Cortex-A520 speculative unprivileged load workaround" + }, + "CVE-2023-52585": { + "cmt_msg": "drm/amdgpu: Fix possible NULL dereference in amdgpu_ras_query_error_status_helper()" + }, + "CVE-2021-47145": { + "cmt_msg": "btrfs: do not BUG_ON in link_to_fixup_dir" + }, + "CVE-2023-52587": { + "cmt_msg": "IB/ipoib: Fix mcast list locking" + }, + "CVE-2023-52586": { + "cmt_msg": "drm/msm/dpu: Add mutex lock in control vblank irq" + }, "CVE-2017-6348": { "cmt_msg": "irda: Fix lockdep annotations in hashbin_delete()." }, @@ -2514,12 +2638,15 @@ "CVE-2022-3565": { "cmt_msg": "mISDN: fix use-after-free bugs in l1oip timer handlers" }, - "CVE-2022-3564": { - "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free caused by l2cap_reassemble_sdu" + "CVE-2021-47065": { + "cmt_msg": "rtw88: Fix array overrun in rtw_get_tx_power_params()" }, "CVE-2020-36386": { "cmt_msg": "Bluetooth: Fix slab-out-of-bounds read in hci_extended_inquiry_result_evt()" }, + "CVE-2021-47144": { + "cmt_msg": "drm/amd/amdgpu: fix refcount leak" + }, "CVE-2017-6346": { "cmt_msg": "packet: fix races in fanout_add()" }, @@ -2529,8 +2656,17 @@ "CVE-2022-3628": { "cmt_msg": "wifi: brcmfmac: Fix potential buffer overflow in brcmf_fweh_event_worker()" }, - "CVE-2022-1048": { - "cmt_msg": "ALSA: pcm: Fix races among concurrent hw_params and hw_free calls" + "CVE-2021-47140": { + "cmt_msg": "iommu/amd: Clear DMA ops when switching domain" + }, + "CVE-2021-47143": { + "cmt_msg": "net/smc: remove device from smcd_dev_list after failed device_add()" + }, + "CVE-2021-47142": { + "cmt_msg": "drm/amdgpu: Fix a use-after-free" + }, + "CVE-2021-47146": { + "cmt_msg": "mld: fix panic in mld_newpack()" }, "CVE-2020-0009": { "cmt_msg": "staging: android: ashmem: Disallow ashmem memory from being remapped" @@ -2538,12 +2674,24 @@ "CVE-2023-52340": { "cmt_msg": "ipv6: remove max_size check inline with ipv4" }, + "CVE-2023-52589": { + "cmt_msg": "media: rkisp1: Fix IRQ disable race issue" + }, + "CVE-2022-3567": { + "cmt_msg": "ipv6: Fix data races around sk->sk_prot." + }, "CVE-2018-7480": { "cmt_msg": "blkcg: fix double free of new_blkg in blkcg_init_queue" }, + "CVE-2023-52588": { + "cmt_msg": "f2fs: fix to tag gcing flag on page during block migration" + }, "CVE-2019-14615": { "cmt_msg": "drm/i915/gen9: Clear residual context state on context switch" }, + "CVE-2023-52578": { + "cmt_msg": "net: bridge: use DEV_STATS_INC()" + }, "CVE-2020-12771": { "cmt_msg": "bcache: fix potential deadlock problem in btree_gc_coalesce" }, @@ -2598,15 +2746,33 @@ "CVE-2022-1974": { "cmt_msg": "nfc: replace improper check device_is_registered() in netlink related functions" }, + "CVE-2021-47147": { + "cmt_msg": "ptp: ocp: Fix a resource leak in an error handling path" + }, "CVE-2020-8832": { "cmt_msg": "drm/i915: Record the default hw state after reset upon load" }, + "CVE-2021-47125": { + "cmt_msg": "sch_htb: fix refcount leak in htb_parent_to_leaf_offload" + }, + "CVE-2024-26797": { + "cmt_msg": "drm/amd/display: Prevent potential buffer overflow in map_hw_resources" + }, "CVE-2022-1836": { "cmt_msg": "floppy: disable FDRAWCMD by default" }, + "CVE-2024-26793": { + "cmt_msg": "gtp: fix use-after-free and null-ptr-deref in gtp_newlink()" + }, "CVE-2021-32078": { "cmt_msg": "ARM: footbridge: remove personal server platform" }, + "CVE-2023-52532": { + "cmt_msg": "net: mana: Fix TX CQE error handling" + }, + "CVE-2024-26798": { + "cmt_msg": "fbcon: always restore the old font data in fbcon_do_set_font()" + }, "CVE-2017-16528": { "cmt_msg": "ALSA: seq: Cancel pending autoload work at unbinding device" }, @@ -2622,6 +2788,9 @@ "CVE-2021-3864": { "cmt_msg": "" }, + "CVE-2024-26696": { + "cmt_msg": "nilfs2: fix hang in nilfs_lookup_dirty_data_buffers()" + }, "CVE-2020-0255": { "cmt_msg": "selinux: properly handle multiple messages in selinux_netlink_send()" }, @@ -2643,6 +2812,9 @@ "CVE-2019-2213": { "cmt_msg": "binder: fix possible UAF when freeing buffer" }, + "CVE-2024-26677": { + "cmt_msg": "rxrpc: Fix delayed ACKs to not set the reference serial number" + }, "CVE-2020-25211": { "cmt_msg": "netfilter: ctnetlink: add a range check for l3/l4 protonum" }, @@ -2655,9 +2827,18 @@ "CVE-2020-26557": { "cmt_msg": "" }, + "CVE-2024-26671": { + "cmt_msg": "blk-mq: fix IO hang from sbitmap wakeup race" + }, "CVE-2020-26555": { "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical" }, + "CVE-2024-26776": { + "cmt_msg": "spi: hisi-sfc-v3xx: Return IRQ_NONE if no interrupts were detected" + }, + "CVE-2024-26777": { + "cmt_msg": "fbdev: sis: Error out if pixclock equals zero" + }, "CVE-2018-9517": { "cmt_msg": "l2tp: pass tunnel pointer to ->session_create()" }, @@ -2667,12 +2848,24 @@ "CVE-2023-3397": { "cmt_msg": "" }, + "CVE-2020-36775": { + "cmt_msg": "f2fs: fix to avoid potential deadlock" + }, + "CVE-2024-26679": { + "cmt_msg": "inet: read sk->sk_family once in inet_recv_error()" + }, + "CVE-2024-26771": { + "cmt_msg": "dmaengine: ti: edma: Add some null pointer checks to the edma_probe" + }, "CVE-2018-1128": { "cmt_msg": "libceph: add authorizer challenge" }, "CVE-2018-1129": { "cmt_msg": "libceph: implement CEPHX_V2 calculation mode" }, + "CVE-2021-47128": { + "cmt_msg": "bpf, lockdown, audit: Fix buggy SELinux lockdown permission checks" + }, "CVE-2022-26365": { "cmt_msg": "xen/blkfront: fix leaking data in shared pages" }, @@ -2688,11 +2881,14 @@ "CVE-2018-20856": { "cmt_msg": "block: blk_init_allocated_queue() set q->fq as NULL in the fail case" }, + "CVE-2023-28746": { + "cmt_msg": "x86/mmio: Disable KVM mitigation when X86_FEATURE_CLEAR_CPU_BUF is set" + }, "CVE-2017-5754": { "cmt_msg": "x86/cpufeatures: Add Intel feature bits for Speculation Control" }, - "CVE-2022-3061": { - "cmt_msg": "video: fbdev: i740fb: Error out if 'pixclock' equals zero" + "CVE-2021-47119": { + "cmt_msg": "ext4: fix memory leak in ext4_fill_super" }, "CVE-2017-5753": { "cmt_msg": "x86/cpufeatures: Add X86_BUG_SPECTRE_V[12]" @@ -2727,6 +2923,12 @@ "CVE-2019-14814": { "cmt_msg": "mwifiex: Fix three heap overflow at parsing element in cfg80211_ap_settings" }, + "CVE-2024-26700": { + "cmt_msg": "drm/amd/display: Fix MST Null Ptr for RV" + }, + "CVE-2024-26706": { + "cmt_msg": "parisc: Fix random data corruption from exception handler" + }, "CVE-2023-6240": { "cmt_msg": "" }, @@ -2781,8 +2983,8 @@ "CVE-2019-9453": { "cmt_msg": "f2fs: fix to avoid accessing xattr across the boundary" }, - "CVE-2022-1016": { - "cmt_msg": "netfilter: nf_tables: initialize registers in nft_do_chain()" + "CVE-2021-47124": { + "cmt_msg": "io_uring: fix link timeout refs" }, "CVE-2022-1011": { "cmt_msg": "fuse: fix pipe buffer lifetime for direct_io" @@ -2796,9 +2998,24 @@ "CVE-2023-31436": { "cmt_msg": "net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg" }, + "CVE-2023-52621": { + "cmt_msg": "bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers" + }, + "CVE-2023-52622": { + "cmt_msg": "ext4: avoid online resizing failures due to oversized flex bg" + }, "CVE-2020-8649": { "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region" }, + "CVE-2023-52624": { + "cmt_msg": "drm/amd/display: Wake DMCUB before executing GPINT commands" + }, + "CVE-2023-52625": { + "cmt_msg": "drm/amd/display: Refactor DMCUB enter/exit idle interface" + }, + "CVE-2023-52527": { + "cmt_msg": "ipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data()" + }, "CVE-2023-34255": { "cmt_msg": "xfs: verify buffer contents when we skip log replay" }, @@ -2814,9 +3031,6 @@ "CVE-2021-26932": { "cmt_msg": "Xen/x86: don't bail early from clear_foreign_p2m_mapping()" }, - "CVE-2023-52456": { - "cmt_msg": "serial: imx: fix tx statemachine deadlock" - }, "CVE-2023-3141": { "cmt_msg": "memstick: r592: Fix UAF bug in r592_remove due to race condition" }, @@ -2853,6 +3067,15 @@ "CVE-2021-3178": { "cmt_msg": "nfsd4: readdirplus shouldn't return parent of export" }, + "CVE-2021-47101": { + "cmt_msg": "asix: fix uninit-value in asix_mdio_read()" + }, + "CVE-2021-47103": { + "cmt_msg": "inet: fully convert sk->sk_rx_dst to RCU rules" + }, + "CVE-2021-46982": { + "cmt_msg": "f2fs: compress: fix race condition of overwrite vs truncate" + }, "CVE-2018-7754": { "cmt_msg": "printk: hash addresses printed with %p" }, @@ -2865,9 +3088,15 @@ "CVE-2023-3863": { "cmt_msg": "net: nfc: Fix use-after-free caused by nfc_llcp_find_local" }, + "CVE-2024-26606": { + "cmt_msg": "binder: signal epoll threads of self-work" + }, "CVE-2023-0590": { "cmt_msg": "net: sched: fix race condition in qdisc_graft()" }, + "CVE-2023-52583": { + "cmt_msg": "ceph: fix deadlock or deadcode of misusing dget()" + }, "CVE-2022-4095": { "cmt_msg": "staging: rtl8712: fix use after free bugs" }, @@ -2892,6 +3121,9 @@ "CVE-2021-37159": { "cmt_msg": "usb: hso: fix error handling code of hso_create_net_device" }, + "CVE-2023-52517": { + "cmt_msg": "spi: sun6i: fix race between DMA RX transfer completion and RX FIFO drain" + }, "CVE-2022-2586": { "cmt_msg": "netfilter: nf_tables: do not allow SET_ID to refer to another table" }, @@ -2955,12 +3187,21 @@ "CVE-2022-4543": { "cmt_msg": "" }, + "CVE-2023-52571": { + "cmt_msg": "power: supply: rk817: Fix node refcount leak" + }, + "CVE-2023-52572": { + "cmt_msg": "cifs: Fix UAF in cifs_demultiplex_thread()" + }, "CVE-2023-4921": { "cmt_msg": "net: sched: sch_qfq: Fix UAF in qfq_dequeue()" }, "CVE-2022-3424": { "cmt_msg": "misc: sgi-gru: fix use-after-free error in gru_set_context_option, gru_fault and gru_handle_user_call_os" }, + "CVE-2021-46965": { + "cmt_msg": "mtd: physmap: physmap-bt1-rom: Fix unintentional stack access" + }, "CVE-2023-1829": { "cmt_msg": "net/sched: Retire tcindex classifier" }, @@ -2973,9 +3214,18 @@ "CVE-2023-1670": { "cmt_msg": "xirc2ps_cs: Fix use after free bug in xirc2ps_detach" }, + "CVE-2024-26769": { + "cmt_msg": "nvmet-fc: avoid deadlock on delete association path" + }, "CVE-2022-20148": { "cmt_msg": "f2fs: fix UAF in f2fs_available_free_memory" }, + "CVE-2024-26704": { + "cmt_msg": "ext4: fix double-free of blocks due to wrong extents moved_len" + }, + "CVE-2023-52515": { + "cmt_msg": "RDMA/srp: Do not call scsi_done() from srp_abort()" + }, "CVE-2013-7445": { "cmt_msg": "" }, @@ -2988,11 +3238,20 @@ "CVE-2015-4176": { "cmt_msg": "mnt: Update detach_mounts to leave mounts connected" }, + "CVE-2024-26738": { + "cmt_msg": "powerpc/pseries/iommu: DLPAR add doesn't completely initialize pci_controller" + }, + "CVE-2024-26739": { + "cmt_msg": "net/sched: act_mirred: don't override retval if we already lost the skb" + }, "CVE-2022-38096": { "cmt_msg": "" }, - "CVE-2024-26591": { - "cmt_msg": "bpf: Fix re-attachment branch in bpf_tracing_prog_attach" + "CVE-2024-26804": { + "cmt_msg": "net: ip_tunnel: prevent perpetual headroom growth" + }, + "CVE-2023-52506": { + "cmt_msg": "LoongArch: Set all reserved memblocks on Node#0 at initialization" }, "CVE-2020-14381": { "cmt_msg": "futex: Fix inode life-time issue" @@ -3024,6 +3283,9 @@ "CVE-2016-8630": { "cmt_msg": "kvm: x86: Check memopp before dereference (CVE-2016-8630)" }, + "CVE-2023-52641": { + "cmt_msg": "fs/ntfs3: Add NULL ptr dereference checking at the end of attr_allocate_frame()" + }, "CVE-2016-8632": { "cmt_msg": "tipc: check minimum bearer MTU" }, @@ -3045,9 +3307,15 @@ "CVE-2019-15917": { "cmt_msg": "Bluetooth: hci_ldisc: Postpone HCI_UART_PROTO_READY bit set in hci_uart_set_proto()" }, + "CVE-2024-26803": { + "cmt_msg": "net: veth: clear GRO when clearing XDP even when down" + }, "CVE-2024-26598": { "cmt_msg": "KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache" }, + "CVE-2024-26768": { + "cmt_msg": "LoongArch: Change acpi_core_pic[NR_CPUS] to acpi_core_pic[MAX_CORE_PIC]" + }, "CVE-2020-12362": { "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" }, @@ -3066,15 +3334,27 @@ "CVE-2020-12364": { "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" }, + "CVE-2023-52607": { + "cmt_msg": "powerpc/mm: Fix null-pointer dereference in pgtable_cache_add" + }, + "CVE-2024-26646": { + "cmt_msg": "thermal: intel: hfi: Add syscore callbacks for system-wide PM" + }, "CVE-2018-18690": { "cmt_msg": "xfs: don't fail when converting shortform attr to long form during ATTR_REPLACE" }, + "CVE-2024-26644": { + "cmt_msg": "btrfs: don't abort filesystem when attempting to snapshot deleted subvolume" + }, "CVE-2015-8767": { "cmt_msg": "sctp: Prevent soft lockup when sctp_accept() is called during a timeout event" }, "CVE-2021-0605": { "cmt_msg": "af_key: pfkey_dump needs parameter validation" }, + "CVE-2024-26656": { + "cmt_msg": "drm/amdgpu: fix use-after-free bug" + }, "CVE-2021-3896": { "cmt_msg": "isdn: cpai: check ctr->cnr to avoid array index out of bound" }, @@ -3087,9 +3367,15 @@ "CVE-2021-38204": { "cmt_msg": "usb: max-3421: Prevent corruption of freed memory" }, + "CVE-2023-52445": { + "cmt_msg": "media: pvrusb2: fix use after free on context disconnection" + }, "CVE-2019-16232": { "cmt_msg": "libertas: fix a potential NULL pointer dereference" }, + "CVE-2024-26791": { + "cmt_msg": "btrfs: dev-replace: properly validate device names" + }, "CVE-2019-20811": { "cmt_msg": "net-sysfs: call dev_hold if kobject_init_and_add success" }, @@ -3099,9 +3385,15 @@ "CVE-2019-20812": { "cmt_msg": "af_packet: set defaule value for tmo" }, + "CVE-2023-52600": { + "cmt_msg": "jfs: fix uaf in jfs_evict_inode" + }, "CVE-2020-14314": { "cmt_msg": "ext4: fix potential negative array index in do_split()" }, + "CVE-2023-52601": { + "cmt_msg": "jfs: fix array-index-out-of-bounds in dbAdjTree" + }, "CVE-2018-25020": { "cmt_msg": "bpf: fix truncated jump targets on heavy expansions" }, @@ -3126,18 +3418,39 @@ "CVE-2024-23848": { "cmt_msg": "" }, + "CVE-2021-46904": { + "cmt_msg": "net: hso: fix null-ptr-deref during tty device unregistration" + }, + "CVE-2024-26633": { + "cmt_msg": "ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim()" + }, "CVE-2018-7273": { "cmt_msg": "printk: hash addresses printed with %p" }, + "CVE-2024-26778": { + "cmt_msg": "fbdev: savage: Error out if pixclock equals zero" + }, "CVE-2023-4459": { "cmt_msg": "net: vmxnet3: fix possible NULL pointer dereference in vmxnet3_rq_cleanup()" }, + "CVE-2024-26625": { + "cmt_msg": "llc: call sock_orphan() at release time" + }, + "CVE-2024-26635": { + "cmt_msg": "llc: Drop support for ETH_P_TR_802_2." + }, "CVE-2022-23036": { "cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()" }, + "CVE-2023-52639": { + "cmt_msg": "KVM: s390: vsie: fix race during shadow creation" + }, "CVE-2022-2153": { "cmt_msg": "KVM: x86: Avoid theoretical NULL pointer dereference in kvm_irq_delivery_to_apic_fast()" }, + "CVE-2024-2193": { + "cmt_msg": "" + }, "CVE-2022-20566": { "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free caused by l2cap_chan_put" }, @@ -3148,11 +3461,17 @@ "cmt_msg": "" }, "CVE-2024-23196": { - "cmt_msg": "" + "cmt_msg": "ALSA: hda: fix a possible null-pointer dereference due to data race in snd_hdac_regmap_sync()" }, "CVE-2020-12769": { "cmt_msg": "spi: spi-dw: Add lock protect dw_spi rx/tx to prevent concurrent calls" }, + "CVE-2024-26765": { + "cmt_msg": "LoongArch: Disable IRQ before init_fn() for nonboot CPUs" + }, + "CVE-2023-52609": { + "cmt_msg": "binder: fix race between mmput() and do_exit()" + }, "CVE-2021-32399": { "cmt_msg": "bluetooth: eliminate the potential race condition when removing the HCI controller" }, @@ -3174,6 +3493,18 @@ "CVE-2020-8648": { "cmt_msg": "vt: selection, close sel_buffer race" }, + "CVE-2023-52633": { + "cmt_msg": "um: time-travel: fix time corruption" + }, + "CVE-2020-36780": { + "cmt_msg": "i2c: sprd: fix reference leak when pm_runtime_get_sync fails" + }, + "CVE-2020-36781": { + "cmt_msg": "i2c: imx: fix reference leak when pm_runtime_get_sync fails" + }, + "CVE-2024-26647": { + "cmt_msg": "drm/amd/display: Fix late derefrence 'dsc' check in 'link_set_dsc_pps_packet()'" + }, "CVE-2021-3732": { "cmt_msg": "ovl: prevent private clone if bind mount is not allowed" }, @@ -3195,12 +3526,18 @@ "CVE-2022-20369": { "cmt_msg": "media: v4l2-mem2mem: Apply DST_QUEUE_OFF_BASE on MMAP buffers across ioctls" }, + "CVE-2024-26627": { + "cmt_msg": "scsi: core: Move scsi_host_busy() out of host lock for waking up EH handler" + }, "CVE-2020-13143": { "cmt_msg": "USB: gadget: fix illegal array access in binding with UDC" }, "CVE-2020-10768": { "cmt_msg": "x86/speculation: PR_SPEC_FORCE_DISABLE enforcement for indirect branches." }, + "CVE-2024-26685": { + "cmt_msg": "nilfs2: fix potential bug in end_buffer_async_write" + }, "CVE-2024-25740": { "cmt_msg": "" }, @@ -3228,27 +3565,63 @@ "CVE-2018-3693": { "cmt_msg": "ext4: fix spectre gadget in ext4_mb_regular_allocator()" }, - "CVE-2022-44033": { - "cmt_msg": "char: pcmcia: remove all the drivers" + "CVE-2021-47070": { + "cmt_msg": "uio_hv_generic: Fix another memory leak in error handling paths" + }, + "CVE-2021-47075": { + "cmt_msg": "nvmet: fix memory leak in nvmet_alloc_ctrl()" }, "CVE-2019-11191": { "cmt_msg": "x86: Deprecate a.out support" }, + "CVE-2021-47076": { + "cmt_msg": "RDMA/rxe: Return CQE error if invalid lkey was supplied" + }, "CVE-2016-1575": { "cmt_msg": "ovl: setattr: check permissions before copy-up" }, + "CVE-2021-47171": { + "cmt_msg": "net: usb: fix memory leak in smsc75xx_bind" + }, + "CVE-2021-47172": { + "cmt_msg": "iio: adc: ad7124: Fix potential overflow due to non sequential channel numbers" + }, "CVE-2016-1576": { "cmt_msg": "ovl: setattr: check permissions before copy-up" }, + "CVE-2022-36123": { + "cmt_msg": "x86: Clear .brk area at early boot" + }, + "CVE-2021-47175": { + "cmt_msg": "net/sched: fq_pie: fix OOB access in the traffic path" + }, "CVE-2018-10323": { "cmt_msg": "xfs: set format back to extents if xfs_bmap_extents_to_btree" }, "CVE-2018-10322": { "cmt_msg": "xfs: enhance dinode verifier" }, + "CVE-2021-46951": { + "cmt_msg": "tpm: efi: Use local variable for calculating final log size" + }, + "CVE-2021-46950": { + "cmt_msg": "md/raid1: properly indicate failure when ending a failed write request" + }, "CVE-2023-1989": { "cmt_msg": "Bluetooth: btsdio: fix use after free bug in btsdio_remove due to unfinished work" }, + "CVE-2021-46952": { + "cmt_msg": "NFS: fs_context: validate UDP retrans to prevent shift out-of-bounds" + }, + "CVE-2021-46908": { + "cmt_msg": "bpf: Use correct permission flag for mixed signed bounds arithmetic" + }, + "CVE-2023-52597": { + "cmt_msg": "KVM: s390: fix setting of fpc register" + }, + "CVE-2021-46959": { + "cmt_msg": "spi: Fix use-after-free with devm_spi_alloc_*" + }, "CVE-2016-9644": { "cmt_msg": "x86/mm: Expand the exception table logic to allow new handling options" }, @@ -3273,6 +3646,9 @@ "CVE-2017-13220": { "cmt_msg": "Bluetooth: hidp_connection_add() unsafe use of l2cap_pi()" }, + "CVE-2021-47137": { + "cmt_msg": "net: lantiq: fix memory corruption in RX ring" + }, "CVE-2019-19536": { "cmt_msg": "can: peak_usb: pcan_usb_pro: Fix info-leaks to USB devices" }, @@ -3294,12 +3670,18 @@ "CVE-2019-19531": { "cmt_msg": "usb: yurex: Fix use-after-free in yurex_delete" }, + "CVE-2021-47136": { + "cmt_msg": "net: zero-initialize tc skb extension on allocation" + }, "CVE-2021-0929": { "cmt_msg": "staging/android/ion: delete dma_buf->kmap/unmap implemenation" }, "CVE-2018-14616": { "cmt_msg": "f2fs: fix to do sanity check with block address in main area v2" }, + "CVE-2023-52590": { + "cmt_msg": "ocfs2: Avoid touching renamed directory if parent does not change" + }, "CVE-2019-20096": { "cmt_msg": "dccp: Fix memleak in __feat_register_sp" }, @@ -3312,8 +3694,8 @@ "CVE-2022-0168": { "cmt_msg": "cifs: fix NULL ptr dereference in smb2_ioctl_query_info()" }, - "CVE-2024-26587": { - "cmt_msg": "net: netdevsim: don't try to destroy PHC on VFs" + "CVE-2024-26622": { + "cmt_msg": "tomoyo: fix UAF write bug in tomoyo_write_control()" }, "CVE-2023-51043": { "cmt_msg": "drm/atomic: Fix potential use-after-free in nonblocking commits" @@ -3327,6 +3709,9 @@ "CVE-2023-0615": { "cmt_msg": "media: vivid: dev->bitmap_cap wasn't freed in all cases" }, + "CVE-2024-26672": { + "cmt_msg": "drm/amdgpu: Fix variable 'mca_funcs' dereferenced before NULL check in 'amdgpu_mca_smu_get_mca_entry()'" + }, "CVE-2019-14896": { "cmt_msg": "libertas: Fix two buffer overflows at parsing bss descriptor" }, @@ -3336,12 +3721,21 @@ "CVE-2017-16536": { "cmt_msg": "[media] cx231xx-cards: fix NULL-deref on missing association descriptor" }, + "CVE-2023-52522": { + "cmt_msg": "net: fix possible store tearing in neigh_periodic_work()" + }, "CVE-2022-3586": { "cmt_msg": "sch_sfb: Don't assume the skb is still around after enqueueing to child" }, "CVE-2024-26592": { "cmt_msg": "ksmbd: fix UAF issue in ksmbd_tcp_new_connection()" }, + "CVE-2024-26636": { + "cmt_msg": "llc: make llc_ui_sendmsg() more robust against bonding changes" + }, + "CVE-2024-26779": { + "cmt_msg": "wifi: mac80211: fix race condition on enabling fast-xmit" + }, "CVE-2023-3006": { "cmt_msg": "arm64: Add AMPERE1 to the Spectre-BHB affected list" }, @@ -3354,12 +3748,18 @@ "CVE-2020-27820": { "cmt_msg": "drm/nouveau: use drm_dev_unplug() during device removal" }, + "CVE-2024-25744": { + "cmt_msg": "x86/coco: Disable 32-bit emulation by default on TDX and SEV" + }, "CVE-2023-39194": { "cmt_msg": "net: xfrm: Fix xfrm_address_filter OOB read" }, "CVE-2020-0067": { "cmt_msg": "f2fs: fix to avoid memory leakage in f2fs_listxattr" }, + "CVE-2023-52599": { + "cmt_msg": "jfs: fix array-index-out-of-bounds in diNewExt" + }, "CVE-2019-20794": { "cmt_msg": "" }, @@ -3375,6 +3775,9 @@ "CVE-2023-6610": { "cmt_msg": "smb: client: fix potential OOB in smb2_dump_detail()" }, + "CVE-2024-26600": { + "cmt_msg": "phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP" + }, "CVE-2023-3390": { "cmt_msg": "netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE" }, @@ -3390,6 +3793,18 @@ "CVE-2021-33061": { "cmt_msg": "ixgbe: add improvement for MDD response functionality" }, + "CVE-2024-26764": { + "cmt_msg": "fs/aio: Restrict kiocb_set_cancel_fn() to I/O submitted via libaio" + }, + "CVE-2024-26767": { + "cmt_msg": "drm/amd/display: fixed integer types and null check locations" + }, + "CVE-2024-26766": { + "cmt_msg": "IB/hfi1: Fix sdma.h tx->num_descs off-by-one error" + }, + "CVE-2024-26763": { + "cmt_msg": "dm-crypt: don't modify the data when using authenticated encryption" + }, "CVE-2023-1476": { "cmt_msg": "" }, @@ -3402,6 +3817,9 @@ "CVE-2017-18552": { "cmt_msg": "RDS: validate the requested traces user input against max supported" }, + "CVE-2024-26770": { + "cmt_msg": "HID: nvidia-shield: Add missing null pointer checks to LED initialization" + }, "CVE-2015-8839": { "cmt_msg": "ext4: fix races between page faults and hole punching" }, @@ -3411,6 +3829,9 @@ "CVE-2015-8830": { "cmt_msg": "aio: lift iov_iter_init() into aio_setup_..._rw()" }, + "CVE-2021-46932": { + "cmt_msg": "Input: appletouch - initialize work before device registration" + }, "CVE-2020-14351": { "cmt_msg": "perf/core: Fix race in the perf_mmap_close() function" }, @@ -3441,11 +3862,17 @@ "CVE-2020-0427": { "cmt_msg": "pinctrl: devicetree: Avoid taking direct reference to device name string" }, + "CVE-2021-47059": { + "cmt_msg": "crypto: sun8i-ss - fix result memory leak on error path" + }, + "CVE-2022-20424": { + "cmt_msg": "io_uring: remove io_identity" + }, "CVE-2023-40283": { "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb" }, "CVE-2023-6270": { - "cmt_msg": "" + "cmt_msg": "aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts" }, "CVE-2019-13272": { "cmt_msg": "ptrace: Fix ->ptracer_cred handling for PTRACE_TRACEME" @@ -3495,6 +3922,12 @@ "CVE-2022-3533": { "cmt_msg": "" }, + "CVE-2024-26648": { + "cmt_msg": "drm/amd/display: Fix variable deferencing before NULL check in edp_setup_replay()" + }, + "CVE-2022-21166": { + "cmt_msg": "x86/speculation/mmio: Enable CPU Fill buffer clearing on idle" + }, "CVE-2023-26607": { "cmt_msg": "ntfs: fix out-of-bounds read in ntfs_attr_find()" }, @@ -3504,6 +3937,21 @@ "CVE-2019-15239": { "cmt_msg": "" }, + "CVE-2024-26743": { + "cmt_msg": "RDMA/qedr: Fix qedr_create_user_qp error flow" + }, + "CVE-2023-52635": { + "cmt_msg": "PM / devfreq: Synchronize devfreq_monitor_[start/stop]" + }, + "CVE-2023-52634": { + "cmt_msg": "drm/amd/display: Fix disable_otg_wa logic" + }, + "CVE-2023-52594": { + "cmt_msg": "wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus()" + }, + "CVE-2023-52632": { + "cmt_msg": "drm/amdkfd: Fix lock dependency warning with srcu" + }, "CVE-2021-4037": { "cmt_msg": "xfs: fix up non-directory creation in SGID directories" }, @@ -3552,21 +4000,39 @@ "CVE-2022-3534": { "cmt_msg": "libbpf: Fix use-after-free in btf_dump_name_dups" }, + "CVE-2021-47135": { + "cmt_msg": "mt76: mt7921: fix possible AOOB issue in mt7921_mcu_tx_rate_report" + }, "CVE-2021-20261": { "cmt_msg": "floppy: fix lock_fdc() signal handling" }, "CVE-2020-36516": { "cmt_msg": "ipv4: avoid using shared IP generator for connected sockets" }, + "CVE-2021-47131": { + "cmt_msg": "net/tls: Fix use-after-free after the TLS device goes down and up" + }, "CVE-2021-20265": { "cmt_msg": "af_unix: fix struct pid memory leak" }, + "CVE-2021-47133": { + "cmt_msg": "HID: amd_sfh: Fix memory leak in amd_sfh_work" + }, + "CVE-2024-26675": { + "cmt_msg": "ppp_async: limit MRU to 64K" + }, + "CVE-2022-3061": { + "cmt_msg": "video: fbdev: i740fb: Error out if 'pixclock' equals zero" + }, "CVE-2023-28328": { "cmt_msg": "media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer()" }, "CVE-2023-0386": { "cmt_msg": "ovl: fail on invalid uid/gid mapping at copy up" }, + "CVE-2023-52638": { + "cmt_msg": "can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock" + }, "CVE-2017-13693": { "cmt_msg": "" }, @@ -3591,8 +4057,17 @@ "CVE-2020-1749": { "cmt_msg": "net: ipv6_stub: use ip6_dst_lookup_flow instead of ip6_dst_lookup" }, - "CVE-2022-36123": { - "cmt_msg": "x86: Clear .brk area at early boot" + "CVE-2022-48626": { + "cmt_msg": "moxart: fix potential use-after-free on remove path" + }, + "CVE-2022-48627": { + "cmt_msg": "vt: fix memory overlapping when deleting chars in the buffer" + }, + "CVE-2021-47180": { + "cmt_msg": "NFC: nci: fix memory leak in nci_allocate_device" + }, + "CVE-2022-48628": { + "cmt_msg": "ceph: drop messages from MDS when unmounting" }, "CVE-2020-11608": { "cmt_msg": "media: ov519: add missing endpoint sanity checks" @@ -3633,6 +4108,12 @@ "CVE-2022-3545": { "cmt_msg": "nfp: fix use-after-free in area_cache_get()" }, + "CVE-2023-52569": { + "cmt_msg": "btrfs: remove BUG() after failure to insert delayed dir index item" + }, + "CVE-2023-52568": { + "cmt_msg": "x86/sgx: Resolves SECS reclaim vs. page fault for EAUG race" + }, "CVE-2020-14416": { "cmt_msg": "can, slip: Protect tty->disc_data in write_wakeup and close with RCU" }, @@ -3642,12 +4123,21 @@ "CVE-2022-3542": { "cmt_msg": "bnx2x: fix potential memory leak in bnx2x_tpa_stop()" }, + "CVE-2023-52563": { + "cmt_msg": "drm/meson: fix memory leak on ->hpd_notify callback" + }, "CVE-2019-16921": { "cmt_msg": "RDMA/hns: Fix init resp when alloc ucontext" }, + "CVE-2023-52561": { + "cmt_msg": "arm64: dts: qcom: sdm845-db845c: Mark cont splash memory region as reserved" + }, "CVE-2018-16597": { "cmt_msg": "ovl: modify ovl_permission() to do checks on two inodes" }, + "CVE-2023-52566": { + "cmt_msg": "nilfs2: fix potential use after free in nilfs_gccache_submit_read_data()" + }, "CVE-2021-21781": { "cmt_msg": "ARM: ensure the signal page contains defined contents" }, @@ -3663,6 +4153,12 @@ "CVE-2023-1380": { "cmt_msg": "wifi: brcmfmac: slab-out-of-bounds read in brcmf_get_assoc_ies()" }, + "CVE-2021-46924": { + "cmt_msg": "NFC: st21nfca: Fix memory leak in device probe and remove" + }, + "CVE-2021-46926": { + "cmt_msg": "ALSA: hda: intel-sdw-acpi: harden detection of controller" + }, "CVE-2020-0347": { "cmt_msg": "" }, @@ -3690,12 +4186,18 @@ "CVE-2021-33656": { "cmt_msg": "vt: drop old FONT ioctls" }, + "CVE-2024-26713": { + "cmt_msg": "powerpc/pseries/iommu: Fix iommu initialisation during DLPAR add" + }, "CVE-2021-33655": { "cmt_msg": "fbcon: Disallow setting font bigger than screen size" }, "CVE-2022-41858": { "cmt_msg": "drivers: net: slip: fix NPD bug in sl_tx_timeout()" }, + "CVE-2024-26726": { + "cmt_msg": "btrfs: don't drop extent_map for free space inode on write error" + }, "CVE-2023-1206": { "cmt_msg": "tcp: Reduce chance of collisions in inet6_hashfn()." }, @@ -3735,6 +4237,9 @@ "CVE-2018-3639": { "cmt_msg": "x86/nospec: Simplify alternative_msr_write()" }, + "CVE-2023-52516": { + "cmt_msg": "dma-debug: don't call __dma_entry_alloc_check_leak() under free_entries_lock" + }, "CVE-2021-4218": { "cmt_msg": "sysctl: pass kernel pointers to ->proc_handler" }, @@ -3747,6 +4252,9 @@ "CVE-2024-25739": { "cmt_msg": "" }, + "CVE-2023-52511": { + "cmt_msg": "spi: sun6i: reduce DMA RX transfer width to single byte" + }, "CVE-2024-0340": { "cmt_msg": "vhost: use kzalloc() instead of kmalloc() followed by memset()" }, @@ -3754,7 +4262,7 @@ "cmt_msg": "vt_kdsetmode: extend console locking" }, "CVE-2023-6536": { - "cmt_msg": "" + "cmt_msg": "nvmet-tcp: fix a crash in nvmet_req_complete()" }, "CVE-2019-11135": { "cmt_msg": "x86/msr: Add the IA32_TSX_CTRL MSR" @@ -3777,12 +4285,30 @@ "CVE-2018-17977": { "cmt_msg": "" }, + "CVE-2024-26659": { + "cmt_msg": "xhci: handle isoc Babble and Buffer Overrun events properly" + }, + "CVE-2024-26658": { + "cmt_msg": "bcachefs: grab s_umount only if snapshotting" + }, "CVE-2010-5321": { "cmt_msg": "" }, + "CVE-2024-26655": { + "cmt_msg": "Fix memory leak in posix_clock_open()" + }, + "CVE-2024-26654": { + "cmt_msg": "ALSA: sh: aica: reorder cleanup operations to avoid UAF bugs" + }, "CVE-2021-20321": { "cmt_msg": "ovl: fix missing negative dentry check in ovl_rename()" }, + "CVE-2024-26651": { + "cmt_msg": "sr9800: Add check for usbnet_get_endpoints" + }, + "CVE-2024-26650": { + "cmt_msg": "platform/x86: p2sb: Allow p2sb_bar() calls during PCI device probe" + }, "CVE-2022-42896": { "cmt_msg": "Bluetooth: L2CAP: Fix accepting connection request for invalid SPSM" }, @@ -3807,12 +4333,30 @@ "CVE-2018-20976": { "cmt_msg": "xfs: clear sb->s_fs_info on mount failure" }, + "CVE-2023-52475": { + "cmt_msg": "Input: powermate - fix use-after-free in powermate_config_complete" + }, + "CVE-2023-52477": { + "cmt_msg": "usb: hub: Guard against accesses to uninitialized BOS descriptors" + }, + "CVE-2023-52476": { + "cmt_msg": "perf/x86/lbr: Filter vsyscall addresses" + }, "CVE-2016-10147": { "cmt_msg": "crypto: mcryptd - Check mcryptd algorithm compatibility" }, + "CVE-2023-52470": { + "cmt_msg": "drm/radeon: check the alloc_workqueue return value in radeon_crtc_init()" + }, "CVE-2024-21803": { "cmt_msg": "" }, + "CVE-2023-52479": { + "cmt_msg": "ksmbd: fix uaf in smb20_oplock_break_ack" + }, + "CVE-2023-52478": { + "cmt_msg": "HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect" + }, "CVE-2021-3542": { "cmt_msg": "" }, @@ -3876,6 +4420,12 @@ "CVE-2024-25741": { "cmt_msg": "" }, + "CVE-2024-26808": { + "cmt_msg": "netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain" + }, + "CVE-2024-26809": { + "cmt_msg": "netfilter: nft_set_pipapo: release elements in clone only from destroy path" + }, "CVE-2022-26966": { "cmt_msg": "sr9700: sanity check for packet length" }, @@ -3885,6 +4435,9 @@ "CVE-2022-3344": { "cmt_msg": "KVM: x86: nSVM: harden svm_free_nested against freeing vmcb02 while still in use" }, + "CVE-2024-26806": { + "cmt_msg": "spi: cadence-qspi: remove system-wide suspend helper calls from runtime PM hooks" + }, "CVE-2022-3111": { "cmt_msg": "power: supply: wm8350-power: Add missing free in free_charger_irq" }, @@ -3894,11 +4447,29 @@ "CVE-2020-12770": { "cmt_msg": "scsi: sg: add sg_remove_request in sg_write" }, + "CVE-2024-26802": { + "cmt_msg": "stmmac: Clear variable when destroying workqueue" + }, + "CVE-2023-52508": { + "cmt_msg": "nvme-fc: Prevent null pointer dereference in nvme_fc_io_getuuid()" + }, + "CVE-2023-52606": { + "cmt_msg": "powerpc/lib: Validate size for vector operations" + }, "CVE-2019-15222": { "cmt_msg": "ALSA: usb-audio: Fix gpf in snd_usb_pipe_sanity_check" }, - "CVE-2024-25744": { - "cmt_msg": "x86/coco: Disable 32-bit emulation by default on TDX and SEV" + "CVE-2023-52604": { + "cmt_msg": "FS:JFS:UBSAN:array-index-out-of-bounds in dbAdjTree" + }, + "CVE-2023-52531": { + "cmt_msg": "wifi: iwlwifi: mvm: Fix a memory corruption issue" + }, + "CVE-2023-52602": { + "cmt_msg": "jfs: fix slab-out-of-bounds Read in dtSearch" + }, + "CVE-2023-52603": { + "cmt_msg": "UBSAN: array-index-out-of-bounds in dtSplitRoot" }, "CVE-2022-25265": { "cmt_msg": "" @@ -3918,6 +4489,9 @@ "CVE-2022-21499": { "cmt_msg": "lockdown: also lock down previous kgdb use" }, + "CVE-2023-52519": { + "cmt_msg": "HID: intel-ish-hid: ipc: Disable and reenable ACPI GPE bit" + }, "CVE-2020-25284": { "cmt_msg": "rbd: require global CAP_SYS_ADMIN for mapping and unmapping" }, @@ -3954,30 +4528,51 @@ "CVE-2023-0047": { "cmt_msg": "mm, oom: do not trigger out_of_memory from the #PF" }, + "CVE-2021-47046": { + "cmt_msg": "drm/amd/display: Fix off by one in hdmi_14_process_transaction()" + }, "CVE-2019-15219": { "cmt_msg": "USB: sisusbvga: fix oops in error path of sisusb_probe" }, - "CVE-2022-20424": { - "cmt_msg": "io_uring: remove io_identity" + "CVE-2021-47165": { + "cmt_msg": "drm/meson: fix shutdown crash when component not probed" }, "CVE-2023-1990": { "cmt_msg": "nfc: st-nci: Fix use after free bug in ndlc_remove due to race condition" }, + "CVE-2021-46969": { + "cmt_msg": "bus: mhi: core: Fix invalid error returning in mhi_queue" + }, "CVE-2017-5549": { "cmt_msg": "USB: serial: kl5kusb105: fix line-state error handling" }, + "CVE-2021-47160": { + "cmt_msg": "net: dsa: mt7530: fix VLAN traffic leaks" + }, "CVE-2023-4385": { "cmt_msg": "fs: jfs: fix possible NULL pointer dereference in dbFree()" }, "CVE-2020-25643": { "cmt_msg": "hdlc_ppp: add range checks in ppp_cp_parse_cr()" }, + "CVE-2021-46962": { + "cmt_msg": "mmc: uniphier-sd: Fix a resource leak in the remove function" + }, + "CVE-2021-47168": { + "cmt_msg": "NFS: fix an incorrect limit in filelayout_decode_layout()" + }, "CVE-2019-19378": { "cmt_msg": "" }, + "CVE-2022-1016": { + "cmt_msg": "netfilter: nf_tables: initialize registers in nft_do_chain()" + }, "CVE-2020-4788": { "cmt_msg": "powerpc/64s: flush L1D on kernel entry" }, + "CVE-2024-26744": { + "cmt_msg": "RDMA/srpt: Support specifying the srpt_service_guid parameter" + }, "CVE-2022-36879": { "cmt_msg": "xfrm: xfrm_policy: fix a possible double xfrm_pols_put() in xfrm_bundle_lookup()" }, @@ -4032,6 +4627,12 @@ "CVE-2021-3752": { "cmt_msg": "Bluetooth: fix use-after-free error in lock_sock_nested()" }, + "CVE-2023-52620": { + "cmt_msg": "netfilter: nf_tables: disallow timeout for anonymous sets" + }, + "CVE-2024-26774": { + "cmt_msg": "ext4: avoid dividing by 0 in mb_update_avg_fragment_size() when block bitmap corrupt" + }, "CVE-2021-0937": { "cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write" }, @@ -4050,6 +4651,9 @@ "CVE-2019-16746": { "cmt_msg": "nl80211: validate beacon head" }, + "CVE-2023-52623": { + "cmt_msg": "SUNRPC: Fix a suspicious RCU usage warning" + }, "CVE-2022-3606": { "cmt_msg": "" }, @@ -4062,8 +4666,11 @@ "CVE-2021-37576": { "cmt_msg": "KVM: PPC: Book3S: Fix H_RTAS rets buffer overflow" }, + "CVE-2024-26775": { + "cmt_msg": "aoe: avoid potential deadlock at set_capacity" + }, "CVE-2023-7042": { - "cmt_msg": "" + "cmt_msg": "wifi: ath10k: fix NULL pointer dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev()" }, "CVE-2022-3594": { "cmt_msg": "r8152: Rate limit overflow messages" @@ -4074,15 +4681,27 @@ "CVE-2021-33098": { "cmt_msg": "ixgbe: fix large MTU request from VF" }, + "CVE-2023-52559": { + "cmt_msg": "iommu/vt-d: Avoid memory allocation in iommu_suspend()" + }, "CVE-2023-47233": { - "cmt_msg": "" + "cmt_msg": "wifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach" }, "CVE-2020-27815": { "cmt_msg": "jfs: Fix array index bounds check in dbAdjTree" }, + "CVE-2023-52629": { + "cmt_msg": "sh: push-switch: Reorder cleanup operations to avoid use-after-free bug" + }, "CVE-2022-1462": { "cmt_msg": "tty: use new tty_insert_flip_string_and_push_buffer() in pty_write()" }, + "CVE-2024-26758": { + "cmt_msg": "md: Don't ignore suspended array in md_check_recovery()" + }, + "CVE-2024-26759": { + "cmt_msg": "mm/swap: fix race when skipping swapcache" + }, "CVE-2023-6606": { "cmt_msg": "smb: client: fix OOB in smbCalcSize()" }, @@ -4107,9 +4726,15 @@ "CVE-2020-27675": { "cmt_msg": "xen/events: avoid removing an event channel while handling it" }, + "CVE-2024-26756": { + "cmt_msg": "md: Don't register sync_thread for reshape directly" + }, "CVE-2020-28915": { "cmt_msg": "fbcon: Fix global-out-of-bounds read in fbcon_get_font()" }, + "CVE-2021-47169": { + "cmt_msg": "serial: rp2: use 'request_firmware' instead of 'request_firmware_nowait'" + }, "CVE-2019-20908": { "cmt_msg": "efi: Restrict efivar_ssdt_load when the kernel is locked down" }, @@ -4125,8 +4750,8 @@ "CVE-2021-29154": { "cmt_msg": "bpf, x86: Validate computation of branch displacements for x86-64" }, - "CVE-2023-52435": { - "cmt_msg": "net: prevent mss overflow in skb_segment()" + "CVE-2024-26773": { + "cmt_msg": "ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found()" }, "CVE-2023-52434": { "cmt_msg": "smb: client: fix potential OOBs in smb2_parse_contexts()" @@ -4179,6 +4804,9 @@ "CVE-2010-4563": { "cmt_msg": "" }, + "CVE-2023-52565": { + "cmt_msg": "media: uvcvideo: Fix OOB read" + }, "CVE-2023-1249": { "cmt_msg": "coredump: Use the vma snapshot in fill_files_note" }, @@ -4200,8 +4828,8 @@ "CVE-2023-0266": { "cmt_msg": "ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF" }, - "CVE-2023-1838": { - "cmt_msg": "Fix double fget() in vhost_net_set_backend()" + "CVE-2021-46928": { + "cmt_msg": "parisc: Clear stale IIR value on instruction access rights trap" }, "CVE-2021-3483": { "cmt_msg": "firewire: nosy: Fix a use-after-free bug in nosy_ioctl()" @@ -4218,9 +4846,15 @@ "CVE-2022-24448": { "cmt_msg": "NFSv4: Handle case where the lookup of a directory fails" }, + "CVE-2023-52498": { + "cmt_msg": "PM: sleep: Fix possible deadlocks in core system-wide PM code" + }, "CVE-2021-4023": { "cmt_msg": "io-wq: fix cancellation on create-worker failure" }, + "CVE-2023-52640": { + "cmt_msg": "fs/ntfs3: Fix oob in ntfs_listxattr" + }, "CVE-2023-3268": { "cmt_msg": "relayfs: fix out-of-bounds access in relay_file_read" }, @@ -4233,20 +4867,35 @@ "CVE-2021-0399": { "cmt_msg": "" }, + "CVE-2023-52488": { + "cmt_msg": "serial: sc16is7xx: convert from _raw_ to _noinc_ regmap functions for FIFO" + }, "CVE-2020-36691": { "cmt_msg": "netlink: limit recursion depth in policy validation" }, + "CVE-2021-47179": { + "cmt_msg": "NFSv4: Fix a NULL pointer dereference in pnfs_mark_matching_lsegs_return()" + }, "CVE-2023-42755": { "cmt_msg": "net/sched: Retire rsvp classifier" }, "CVE-2020-2732": { "cmt_msg": "KVM: nVMX: Don't emulate instructions in guest mode" }, + "CVE-2023-52486": { + "cmt_msg": "drm: Don't unref the same fb many times by mistake due to deadlock handling" + }, + "CVE-2023-52480": { + "cmt_msg": "ksmbd: fix race condition between session lookup and expire" + }, "CVE-2012-4542": { "cmt_msg": "" }, - "CVE-2023-42752": { - "cmt_msg": "igmp: limit igmpv3_newpack() packet size to IP_MAX_MTU" + "CVE-2023-52482": { + "cmt_msg": "x86/srso: Add SRSO mitigation for Hygon processors" + }, + "CVE-2023-1838": { + "cmt_msg": "Fix double fget() in vhost_net_set_backend()" }, "CVE-2023-4128": { "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free" @@ -4281,6 +4930,9 @@ "CVE-2018-12130": { "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" }, + "CVE-2021-47083": { + "cmt_msg": "pinctrl: mediatek: fix global-out-of-bounds issue" + }, "CVE-2021-20292": { "cmt_msg": "drm/ttm/nouveau: don't call tt destroy callback on alloc failure." }, @@ -4293,6 +4945,12 @@ "CVE-2022-32981": { "cmt_msg": "powerpc/32: Fix overread/overwrite of thread_struct via ptrace" }, + "CVE-2021-47122": { + "cmt_msg": "net: caif: fix memory leak in caif_device_notify" + }, + "CVE-2021-47121": { + "cmt_msg": "net: caif: fix memory leak in cfusbl_device_notify" + }, "CVE-2022-1280": { "cmt_msg": "drm: avoid circular locks in drm_mode_getconnector" }, @@ -4308,6 +4966,9 @@ "CVE-2019-15118": { "cmt_msg": "ALSA: usb-audio: Fix a stack buffer overflow bug in check_input_term" }, + "CVE-2021-47170": { + "cmt_msg": "USB: usbfs: Don't WARN about excessively large memory allocations" + }, "CVE-2023-2269": { "cmt_msg": "dm ioctl: fix nested locking in table_clear() to remove deadlock concern" }, @@ -4341,6 +5002,9 @@ "CVE-2020-3702": { "cmt_msg": "ath: Use safer key clearing with key cache entries" }, + "CVE-2023-52485": { + "cmt_msg": "drm/amd/display: Wake DMCUB before sending a command" + }, "CVE-2021-3653": { "cmt_msg": "KVM: nSVM: avoid picking up unsupported bits from L2 in int_ctl (CVE-2021-3653)" }, @@ -4353,9 +5017,6 @@ "CVE-2021-4159": { "cmt_msg": "bpf: Verifer, adjust_scalar_min_max_vals to always call update_reg_bounds()" }, - "CVE-2024-26584": { - "cmt_msg": "net: tls: handle backlogging of crypto requests" - }, "CVE-2019-12614": { "cmt_msg": "powerpc/pseries/dlpar: Fix a missing check in dlpar_parse_cc_property()" }, @@ -4368,6 +5029,9 @@ "CVE-2021-3714": { "cmt_msg": "" }, + "CVE-2024-26733": { + "cmt_msg": "arp: Prevent overflow in arp_req_get()." + }, "CVE-2019-16230": { "cmt_msg": "drm/amdkfd: fix a potential NULL pointer dereference (v2)" }, @@ -4380,6 +5044,9 @@ "CVE-2021-3892": { "cmt_msg": "" }, + "CVE-2024-26752": { + "cmt_msg": "l2tp: pass correct message length to ip6_append_data" + }, "CVE-2021-39633": { "cmt_msg": "ip_gre: add validation for csum_start" }, @@ -4416,20 +5083,44 @@ "CVE-2022-33744": { "cmt_msg": "xen/arm: Fix race in RB-tree based P2M accounting" }, + "CVE-2023-52596": { + "cmt_msg": "sysctl: Fix out of bounds access for empty sysctl registers" + }, "CVE-2017-9605": { "cmt_msg": "drm/vmwgfx: Make sure backup_handle is always valid" }, "CVE-2017-18193": { "cmt_msg": "f2fs: fix a bug caused by NULL extent tree" }, + "CVE-2023-52595": { + "cmt_msg": "wifi: rt2x00: restart beacon queue when hardware reset" + }, + "CVE-2023-52593": { + "cmt_msg": "wifi: wfx: fix possible NULL pointer dereference in wfx_set_mfp_ap()" + }, + "CVE-2021-47158": { + "cmt_msg": "net: dsa: sja1105: add error handling in sja1105_setup()" + }, + "CVE-2023-52591": { + "cmt_msg": "reiserfs: Avoid touching renamed directory if parent does not change" + }, "CVE-2021-45486": { "cmt_msg": "inet: use bigger hash table for IP ID generation" }, "CVE-2020-12888": { "cmt_msg": "vfio-pci: Invalidate mmaps and block MMIO access on disabled memory" }, - "CVE-2023-52445": { - "cmt_msg": "media: pvrusb2: fix use after free on context disconnection" + "CVE-2021-47153": { + "cmt_msg": "i2c: i801: Don't generate an interrupt on bus reset" + }, + "CVE-2021-47150": { + "cmt_msg": "net: fec: fix the potential memory leak in fec_enet_init()" + }, + "CVE-2021-47151": { + "cmt_msg": "interconnect: qcom: bcm-voter: add a missing of_node_put()" + }, + "CVE-2021-46936": { + "cmt_msg": "net: fix use-after-free in tw_timer_handler" }, "CVE-2016-6198": { "cmt_msg": "vfs: add vfs_select_inode() helper" @@ -4443,9 +5134,6 @@ "CVE-2011-4917": { "cmt_msg": "" }, - "CVE-2023-52457": { - "cmt_msg": "serial: 8250: omap: Don't skip resource freeing if pm_runtime_resume_and_get() failed" - }, "CVE-2022-36946": { "cmt_msg": "netfilter: nf_queue: do not allow packet truncation below transport header offset" }, @@ -4458,8 +5146,8 @@ "CVE-2018-19824": { "cmt_msg": "ALSA: usb-audio: Fix UAF decrement if card has no live interfaces in card.c" }, - "CVE-2022-21166": { - "cmt_msg": "x86/speculation/mmio: Enable CPU Fill buffer clearing on idle" + "CVE-2021-46939": { + "cmt_msg": "tracing: Restructure trace_clock_global() to never block" }, "CVE-2020-29374": { "cmt_msg": "gup: document and work around \"COW can break either way\" issue" @@ -4489,7 +5177,10 @@ "cmt_msg": "" }, "CVE-2023-6356": { - "cmt_msg": "" + "cmt_msg": "nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length" + }, + "CVE-2024-26720": { + "cmt_msg": "mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again" }, "CVE-2022-1353": { "cmt_msg": "af_key: add __GFP_ZERO flag for compose_sadb_supported in function pfkey_register" @@ -4500,6 +5191,9 @@ "CVE-2015-8844": { "cmt_msg": "powerpc/tm: Block signal return setting invalid MSR state" }, + "CVE-2021-47173": { + "cmt_msg": "misc/uss720: fix memory leak in uss720_probe" + }, "CVE-2022-1198": { "cmt_msg": "drivers: hamradio: 6pack: fix UAF bug caused by mod_timer()" }, @@ -4515,11 +5209,17 @@ "CVE-2021-39800": { "cmt_msg": "" }, + "CVE-2024-26676": { + "cmt_msg": "af_unix: Call kfree_skb() for dead unix_(sk)->oob_skb in GC." + }, + "CVE-2024-26784": { + "cmt_msg": "pmdomain: arm: Fix NULL dereference on scmi_perf_domain removal" + }, "CVE-2022-1195": { "cmt_msg": "hamradio: improve the incomplete fix to avoid NPD" }, "CVE-2024-22099": { - "cmt_msg": "" + "cmt_msg": "Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security" }, "CVE-2021-4202": { "cmt_msg": "NFC: reorganize the functions in nci_request" @@ -4533,6 +5233,9 @@ "CVE-2022-45886": { "cmt_msg": "media: dvb-core: Fix use-after-free due on race condition at dvb_net" }, + "CVE-2023-52509": { + "cmt_msg": "ravb: Fix use-after-free issue in ravb_tx_timeout_work()" + }, "CVE-2023-46343": { "cmt_msg": "nfc: nci: fix possible NULL pointer dereference in send_acknowledge()" }, @@ -4542,9 +5245,21 @@ "CVE-2023-5178": { "cmt_msg": "nvmet-tcp: Fix a possible UAF in queue intialization setup" }, + "CVE-2023-52507": { + "cmt_msg": "nfc: nci: assert requested protocol is valid" + }, "CVE-2023-2124": { "cmt_msg": "xfs: verify buffer contents when we skip log replay" }, + "CVE-2023-52501": { + "cmt_msg": "ring-buffer: Do not attempt to read past \"commit\"" + }, + "CVE-2023-52500": { + "cmt_msg": "scsi: pm80xx: Avoid leaking tags when processing OPC_INB_SET_CONTROLLER_CONFIG command" + }, + "CVE-2023-52502": { + "cmt_msg": "net: nfc: fix races in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn()" + }, "CVE-2021-44879": { "cmt_msg": "f2fs: fix to do sanity check on inode type during garbage collection" }, @@ -4560,6 +5275,12 @@ "CVE-2020-0429": { "cmt_msg": "l2tp: fix race between l2tp_session_delete() and l2tp_tunnel_closeall()" }, + "CVE-2024-26623": { + "cmt_msg": "pds_core: Prevent race issues involving the adminq" + }, + "CVE-2024-26719": { + "cmt_msg": "nouveau: offload fence uevents work to workqueue" + }, "CVE-2020-27066": { "cmt_msg": "xfrm: policy: Fix doulbe free in xfrm_policy_timer" }, @@ -4578,12 +5299,18 @@ "CVE-2020-9383": { "cmt_msg": "floppy: check FDC index for errors before assigning it" }, + "CVE-2024-26664": { + "cmt_msg": "hwmon: (coretemp) Fix out-of-bounds memory access" + }, "CVE-2023-32269": { "cmt_msg": "netrom: Fix use-after-free caused by accept on already connected socket" }, "CVE-2021-38198": { "cmt_msg": "KVM: X86: MMU: Use the correct inherited permissions to get shadow page" }, + "CVE-2024-26689": { + "cmt_msg": "ceph: prevent use-after-free in encode_cap_msg()" + }, "CVE-2017-5972": { "cmt_msg": "tcp: do not lock listener to process SYN packets" }, @@ -4599,6 +5326,9 @@ "CVE-2021-26401": { "cmt_msg": "x86/speculation: Use generic retpoline by default on AMD" }, + "CVE-2024-1312": { + "cmt_msg": "mm: lock_vma_under_rcu() must check vma->anon_vma under vma lock" + }, "CVE-2015-4001": { "cmt_msg": "ozwpan: Use unsigned ints to prevent heap overflow" }, @@ -4650,8 +5380,8 @@ "CVE-2019-5489": { "cmt_msg": "Change mincore() to count \"mapped\" pages rather than \"cached\" pages" }, - "CVE-2024-1312": { - "cmt_msg": "mm: lock_vma_under_rcu() must check vma->anon_vma under vma lock" + "CVE-2021-47082": { + "cmt_msg": "tun: avoid double free in tun_free_netdev" }, "CVE-2019-14284": { "cmt_msg": "floppy: fix div-by-zero in setup_format_params" @@ -4860,41 +5590,23 @@ } }, "outstanding": { - "CVE-2020-36322": { - "cmt_msg": "fuse: fix bad inode" - }, - "CVE-2020-10711": { - "cmt_msg": "netlabel: cope with NULL catmap" - }, "CVE-2019-15090": { "cmt_msg": "scsi: qedi: remove memset/memcpy to nfunc and use func instead" }, - "CVE-2022-3649": { - "cmt_msg": "nilfs2: fix use-after-free bug of struct nilfs_root" - }, - "CVE-2020-35501": { - "cmt_msg": "" - }, "CVE-2019-15098": { "cmt_msg": "ath6kl: fix a NULL-ptr-deref bug in ath6kl_usb_alloc_urb_from_pipe()" }, - "CVE-2020-29368": { - "cmt_msg": "mm: thp: make the THP mapcount atomic against __split_huge_pmd_locked()" - }, - "CVE-2017-17806": { - "cmt_msg": "crypto: hmac - require that the underlying hash algorithm is unkeyed" - }, - "CVE-2023-3611": { - "cmt_msg": "net/sched: sch_qfq: account for stab overhead in qfq_enqueue" + "CVE-2017-17712": { + "cmt_msg": "net: ipv4: fix for a race condition in raw_sendmsg" }, "CVE-2022-0001": { "cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE" }, - "CVE-2020-12464": { - "cmt_msg": "USB: core: Fix free-while-in-use bug in the USB S-Glibrary" + "CVE-2023-2248": { + "cmt_msg": "net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg" }, - "CVE-2021-45469": { - "cmt_msg": "f2fs: fix to do sanity check on last xattr entry in __f2fs_setxattr()" + "CVE-2022-0002": { + "cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE" }, "CVE-2019-19965": { "cmt_msg": "scsi: libsas: stop discovering if oob mode is disconnected" @@ -4902,11 +5614,14 @@ "CVE-2019-19966": { "cmt_msg": "media: cpia2: Fix use-after-free in cpia2_exit" }, - "CVE-2020-35508": { - "cmt_msg": "fork: fix copy_process(CLONE_PARENT) race with the exiting ->real_parent" + "CVE-2023-52615": { + "cmt_msg": "hwrng: core - Fix page fault dead lock on mmap-ed hwrng" }, - "CVE-2022-1184": { - "cmt_msg": "ext4: verify dir block before splitting it" + "CVE-2023-52614": { + "cmt_msg": "PM / devfreq: Fix buffer overflow in trans_stat_show" + }, + "CVE-2023-52617": { + "cmt_msg": "PCI: switchtec: Fix stdev_release() crash after surprise hot remove" }, "CVE-2020-24587": { "cmt_msg": "mac80211: prevent mixed key and fragment cache attacks" @@ -4914,41 +5629,29 @@ "CVE-2020-24586": { "cmt_msg": "mac80211: prevent mixed key and fragment cache attacks" }, - "CVE-2017-1000410": { - "cmt_msg": "Bluetooth: Prevent stack info leak from the EFS element." - }, - "CVE-2023-6270": { - "cmt_msg": "" - }, - "CVE-2022-3642": { - "cmt_msg": "" + "CVE-2023-52612": { + "cmt_msg": "crypto: scomp - fix req->dst buffer overflow" }, "CVE-2021-0129": { "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical" }, - "CVE-2019-20096": { - "cmt_msg": "dccp: Fix memleak in __feat_register_sp" + "CVE-2020-24588": { + "cmt_msg": "cfg80211: mitigate A-MSDU aggregation attacks" }, - "CVE-2022-47520": { - "cmt_msg": "wifi: wilc1000: validate pairwise and authentication suite offsets" + "CVE-2023-52619": { + "cmt_msg": "pstore/ram: Fix crash when setting number of cpus to an odd number" }, - "CVE-2023-42755": { - "cmt_msg": "net/sched: Retire rsvp classifier" + "CVE-2023-52618": { + "cmt_msg": "block/rnbd-srv: Check for unlikely string overflow" }, "CVE-2023-5717": { "cmt_msg": "perf: Disallow mis-matched inherited group reads" }, - "CVE-2022-3643": { - "cmt_msg": "xen/netback: Ensure protocol headers don't fall in the non-linear area" - }, "CVE-2018-10940": { "cmt_msg": "cdrom: information leak in cdrom_ioctl_media_changed()" }, - "CVE-2022-32250": { - "cmt_msg": "netfilter: nf_tables: disallow non-stateful expression in sets earlier" - }, - "CVE-2018-10087": { - "cmt_msg": "kernel/exit.c: avoid undefined behaviour when calling wait4()" + "CVE-2019-9506": { + "cmt_msg": "Bluetooth: Fix faulty expression for minimum encryption key size check" }, "CVE-2019-9500": { "cmt_msg": "brcmfmac: assure SSID length from firmware is limited" @@ -4956,12 +5659,6 @@ "CVE-2019-9503": { "cmt_msg": "brcmfmac: add subtype check for event handling in data path" }, - "CVE-2018-6555": { - "cmt_msg": "staging: irda: remove the irda network stack and drivers" - }, - "CVE-2023-3159": { - "cmt_msg": "firewire: fix potential uaf in outbound_phy_packet_callback()" - }, "CVE-2022-0480": { "cmt_msg": "memcg: enable accounting for file lock caches" }, @@ -4971,246 +5668,96 @@ "CVE-2022-0487": { "cmt_msg": "moxart: fix potential use-after-free on remove path" }, - "CVE-2023-52429": { - "cmt_msg": "dm: limit the number of targets and parameter size area" - }, - "CVE-2021-28964": { - "cmt_msg": "btrfs: fix race when cloning extent buffer during rewind of an old root" - }, - "CVE-2020-26558": { - "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical" - }, - "CVE-2021-0920": { - "cmt_msg": "af_unix: fix garbage collect vs MSG_PEEK" - }, "CVE-2022-23825": { "cmt_msg": "" }, - "CVE-2022-1974": { - "cmt_msg": "nfc: replace improper check device_is_registered() in netlink related functions" - }, - "CVE-2019-13631": { - "cmt_msg": "Input: gtco - bounds check collection indent level" - }, - "CVE-2024-26588": { - "cmt_msg": "LoongArch: BPF: Prevent out-of-bounds memory access" - }, - "CVE-2023-2162": { - "cmt_msg": "scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress" - }, - "CVE-2022-21125": { - "cmt_msg": "x86/speculation/mmio: Reuse SRBDS mitigation for SBDS" - }, - "CVE-2024-24857": { - "cmt_msg": "" - }, - "CVE-2019-19241": { - "cmt_msg": "io_uring: async workers should inherit the user creds" - }, - "CVE-2022-40307": { - "cmt_msg": "efi: capsule-loader: Fix use-after-free in efi_capsule_write" - }, - "CVE-2022-21123": { - "cmt_msg": "x86/speculation/mmio: Add mitigation for Processor MMIO Stale Data" - }, - "CVE-2023-3390": { - "cmt_msg": "netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE" + "CVE-2021-47112": { + "cmt_msg": "x86/kvm: Teardown PV features on boot CPU as well" }, - "CVE-2021-28688": { - "cmt_msg": "xen-blkback: don't leak persistent grants from xen_blkbk_map()" + "CVE-2021-47113": { + "cmt_msg": "btrfs: abort in rename_exchange if we fail to insert the second ref" }, - "CVE-2021-39686": { - "cmt_msg": "binder: use euid from cred instead of using task" + "CVE-2021-47110": { + "cmt_msg": "x86/kvm: Disable kvmclock on all CPUs on shutdown" }, - "CVE-2021-39685": { - "cmt_msg": "USB: gadget: detect too-big endpoint 0 requests" + "CVE-2021-47116": { + "cmt_msg": "ext4: fix memory leak in ext4_mb_init_backend on error path." }, - "CVE-2023-6535": { - "cmt_msg": "" + "CVE-2021-47117": { + "cmt_msg": "ext4: fix bug on in ext4_es_cache_extent as ext4_split_extent_at failed" }, - "CVE-2021-43975": { - "cmt_msg": "atlantic: Fix OOB read and write in hw_atl_utils_fw_rpc_wait" + "CVE-2021-47114": { + "cmt_msg": "ocfs2: fix data corruption by fallocate" }, - "CVE-2018-6927": { - "cmt_msg": "futex: Prevent overflow by strengthen input validation" + "CVE-2021-47118": { + "cmt_msg": "pid: take a reference when initializing `cad_pid`" }, - "CVE-2020-0466": { - "cmt_msg": "do_epoll_ctl(): clean the failure exits up a bit" + "CVE-2021-46970": { + "cmt_msg": "bus: mhi: pci_generic: Remove WQ_MEM_RECLAIM flag from state workqueue" }, "CVE-2019-10207": { "cmt_msg": "Bluetooth: hci_uart: check for missing tty operations" }, - "CVE-2023-1073": { - "cmt_msg": "HID: check empty report_list in hid_validate_values()" - }, - "CVE-2019-14835": { - "cmt_msg": "vhost: make sure log_num < in_num" - }, "CVE-2023-0459": { "cmt_msg": "uaccess: Add speculation barrier to copy_from_user()" }, "CVE-2023-0458": { "cmt_msg": "prlimit: do_prlimit needs to have a speculation check" }, - "CVE-2018-1000204": { - "cmt_msg": "scsi: sg: allocate with __GFP_ZERO in sg_build_indirect()" - }, - "CVE-2023-0597": { - "cmt_msg": "x86/mm: Randomize per-cpu entry area" - }, - "CVE-2019-12379": { - "cmt_msg": "consolemap: Fix a memory leaking bug in drivers/tty/vt/consolemap.c" - }, - "CVE-2017-12134": { - "cmt_msg": "xen: fix bio vec merging" - }, - "CVE-2023-2002": { - "cmt_msg": "bluetooth: Perform careful capability checks in hci_sock_ioctl()" - }, "CVE-2021-30002": { "cmt_msg": "media: v4l: ioctl: Fix memory leak in video_usercopy" }, - "CVE-2017-17450": { - "cmt_msg": "netfilter: xt_osf: Add missing permission checks" - }, "CVE-2021-0941": { "cmt_msg": "bpf: Remove MTU check in __bpf_skb_max_len" }, - "CVE-2022-3628": { - "cmt_msg": "wifi: brcmfmac: Fix potential buffer overflow in brcmf_fweh_event_worker()" - }, - "CVE-2024-26591": { - "cmt_msg": "bpf: Fix re-attachment branch in bpf_tracing_prog_attach" - }, "CVE-2020-15802": { "cmt_msg": "" }, - "CVE-2024-26594": { - "cmt_msg": "ksmbd: validate mech token in session setup" - }, - "CVE-2023-2483": { - "cmt_msg": "net: qcom/emac: Fix use after free bug in emac_remove due to race condition" - }, - "CVE-2017-18270": { - "cmt_msg": "KEYS: prevent creating a different user's keyrings" - }, "CVE-2022-3636": { "cmt_msg": "net: ethernet: mtk_eth_soc: use after free in __mtk_ppe_check_skb()" }, "CVE-2022-3635": { "cmt_msg": "atm: idt77252: fix use-after-free bugs caused by tst_timer" }, - "CVE-2022-0002": { - "cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE" - }, - "CVE-2021-34556": { - "cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4" - }, - "CVE-2020-0543": { - "cmt_msg": "x86/cpu: Add 'table' argument to cpu_matches()" - }, - "CVE-2022-40982": { - "cmt_msg": "x86/speculation: Add Gather Data Sampling mitigation" - }, - "CVE-2022-3202": { - "cmt_msg": "jfs: prevent NULL deref in diFree" + "CVE-2021-28715": { + "cmt_msg": "xen/netback: don't queue unlimited number of packages" }, - "CVE-2018-3646": { - "cmt_msg": "x86/microcode: Allow late microcode loading with SMT disabled" + "CVE-2022-34918": { + "cmt_msg": "netfilter: nf_tables: stricter validation of element data" }, - "CVE-2017-7518": { - "cmt_msg": "KVM: x86: fix singlestepping over syscall" + "CVE-2021-47028": { + "cmt_msg": "mt76: mt7915: fix txrate reporting" }, "CVE-2019-11085": { "cmt_msg": "drm/i915/gvt: Fix mmap range check" }, - "CVE-2024-24861": { - "cmt_msg": "" - }, - "CVE-2017-17558": { - "cmt_msg": "USB: core: prevent malicious bNumInterfaces overflow" - }, - "CVE-2019-11477": { - "cmt_msg": "tcp: limit payload size of sacked skbs" - }, - "CVE-2021-28711": { - "cmt_msg": "xen/blkfront: harden blkfront against event channel storms" - }, - "CVE-2018-14614": { - "cmt_msg": "f2fs: fix to do sanity check with cp_pack_start_sum" - }, - "CVE-2019-11479": { - "cmt_msg": "tcp: add tcp_min_snd_mss sysctl" - }, - "CVE-2018-14616": { - "cmt_msg": "f2fs: fix to do sanity check with block address in main area v2" - }, - "CVE-2018-14611": { - "cmt_msg": "btrfs: validate type when reading a chunk" - }, - "CVE-2018-14610": { - "cmt_msg": "btrfs: Check that each block group has corresponding chunk at mount time" - }, - "CVE-2018-14613": { - "cmt_msg": "btrfs: tree-checker: Verify block_group_item" - }, - "CVE-2018-14612": { - "cmt_msg": "btrfs: tree-checker: Detect invalid and empty essential trees" - }, - "CVE-2020-26145": { - "cmt_msg": "ath10k: drop fragments with multicast DA for PCIe" - }, - "CVE-2017-13216": { - "cmt_msg": "staging: android: ashmem: fix a race condition in ASHMEM_SET_SIZE ioctl" - }, - "CVE-2020-26147": { - "cmt_msg": "mac80211: assure all fragments are encrypted" + "CVE-2017-18261": { + "cmt_msg": "clocksource/drivers/arm_arch_timer: Avoid infinite recursion when ftrace is enabled" }, "CVE-2018-5814": { "cmt_msg": "usbip: usbip_host: fix NULL-ptr deref and use-after-free errors" }, - "CVE-2020-26140": { - "cmt_msg": "" - }, - "CVE-2020-26143": { - "cmt_msg": "" - }, - "CVE-2020-26142": { - "cmt_msg": "" - }, - "CVE-2019-17053": { - "cmt_msg": "ieee802154: enforce CAP_NET_RAW for raw sockets" + "CVE-2021-43389": { + "cmt_msg": "isdn: cpai: check ctr->cnr to avoid array index out of bound" }, - "CVE-2019-17052": { - "cmt_msg": "ax25: enforce CAP_NET_RAW for raw sockets" + "CVE-2023-1074": { + "cmt_msg": "sctp: fail if no bound addresses can be used for a given scope" }, "CVE-2023-1076": { "cmt_msg": "tun: tun_chr_open(): correctly initialize socket uid" }, - "CVE-2017-14497": { - "cmt_msg": "packet: Don't write vnet header beyond end of buffer" - }, - "CVE-2020-27418": { - "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region" - }, - "CVE-2019-17056": { - "cmt_msg": "nfc: enforce CAP_NET_RAW for raw sockets" + "CVE-2023-1077": { + "cmt_msg": "sched/rt: pick_next_rt_entity(): check list_entry" }, - "CVE-2019-17055": { - "cmt_msg": "mISDN: enforce CAP_NET_RAW for raw sockets" + "CVE-2023-40283": { + "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb" }, - "CVE-2019-17054": { - "cmt_msg": "appletalk: enforce CAP_NET_RAW for raw sockets" + "CVE-2023-1073": { + "cmt_msg": "HID: check empty report_list in hid_validate_values()" }, "CVE-2018-13093": { "cmt_msg": "xfs: validate cached inodes are free when allocated" }, - "CVE-2021-38300": { - "cmt_msg": "bpf, mips: Validate conditional branch offsets" - }, - "CVE-2023-51781": { - "cmt_msg": "appletalk: Fix Use-After-Free in atalk_ioctl" - }, "CVE-2018-13096": { "cmt_msg": "f2fs: fix to do sanity check with node footer and iblocks" }, @@ -5223,308 +5770,74 @@ "CVE-2018-13095": { "cmt_msg": "xfs: More robust inode extent count validation" }, - "CVE-2020-29661": { - "cmt_msg": "tty: Fix ->pgrp locking in tiocspgrp()" - }, - "CVE-2020-29660": { - "cmt_msg": "tty: Fix ->session locking" - }, "CVE-2018-13098": { "cmt_msg": "f2fs: fix to do sanity check with extra_attr feature" }, "CVE-2018-13099": { "cmt_msg": "f2fs: fix to do sanity check with reserved blkaddr of inline inode" }, - "CVE-2022-1734": { - "cmt_msg": "nfc: nfcmrvl: main: reorder destructive operations in nfcmrvl_nci_unregister_dev to avoid bugs" - }, - "CVE-2017-15951": { - "cmt_msg": "KEYS: Fix race between updating and finding a negative key" - }, - "CVE-2023-28772": { - "cmt_msg": "seq_buf: Fix overflow in seq_buf_putmem_hex()" - }, - "CVE-2019-14895": { - "cmt_msg": "mwifiex: fix possible heap overflow in mwifiex_process_country_ie()" - }, - "CVE-2022-24448": { - "cmt_msg": "NFSv4: Handle case where the lookup of a directory fails" - }, "CVE-2019-11884": { "cmt_msg": "Bluetooth: hidp: fix buffer overflow" }, - "CVE-2020-15780": { - "cmt_msg": "ACPI: configfs: Disallow loading ACPI tables when locked down" + "CVE-2019-11810": { + "cmt_msg": "scsi: megaraid_sas: return error when create DMA pool failed" }, - "CVE-2019-19074": { - "cmt_msg": "ath9k: release allocated buffer if timed out" + "CVE-2021-39657": { + "cmt_msg": "scsi: ufs: Correct the LUN used in eh_device_reset_handler() callback" }, "CVE-2019-18683": { "cmt_msg": "media: vivid: Fix wrong locking that causes race conditions on streaming stop" }, - "CVE-2022-2503": { - "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag" - }, - "CVE-2022-48619": { - "cmt_msg": "Input: add bounds checking to input_set_capability()" - }, "CVE-2019-18680": { "cmt_msg": "" }, - "CVE-2022-23038": { - "cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()" - }, - "CVE-2022-23039": { - "cmt_msg": "xen/gntalloc: don't use gnttab_query_foreign_access()" - }, - "CVE-2019-11815": { - "cmt_msg": "net: rds: force to destroy connection if t_sock is NULL in rds_tcp_kill_sock()." + "CVE-2021-45868": { + "cmt_msg": "quota: check block number when reading the block in quota file" }, "CVE-2022-20158": { "cmt_msg": "net/packet: fix slab-out-of-bounds access in packet_recvmsg()" }, - "CVE-2022-23037": { - "cmt_msg": "xen/netfront: don't use gnttab_query_foreign_access() for mapped status" - }, - "CVE-2023-20588": { - "cmt_msg": "x86/CPU/AMD: Do not leak quotient data after a division by 0" - }, "CVE-2020-0404": { "cmt_msg": "media: uvcvideo: Avoid cyclic entity chains due to malformed USB descriptors" }, - "CVE-2019-15924": { - "cmt_msg": "fm10k: Fix a potential NULL pointer dereference" - }, - "CVE-2019-15538": { - "cmt_msg": "xfs: fix missing ILOCK unlock when xfs_setattr_nonsize fails due to EDQUOT" - }, - "CVE-2019-15926": { - "cmt_msg": "ath6kl: add some bounds checking" - }, - "CVE-2019-15921": { - "cmt_msg": "genetlink: Fix a memory leak on error path" - }, - "CVE-2019-14821": { - "cmt_msg": "KVM: coalesced_mmio: add bounds checking" - }, - "CVE-2020-12826": { - "cmt_msg": "signal: Extend exec_id to 64bits" - }, - "CVE-2019-3701": { - "cmt_msg": "can: gw: ensure DLC boundaries after CAN frame modification" - }, - "CVE-2021-42008": { - "cmt_msg": "net: 6pack: fix slab-out-of-bounds in decode_data" - }, "CVE-2022-39188": { "cmt_msg": "mmu_gather: Force tlb-flush VM_PFNMAP vmas" }, - "CVE-2018-20511": { - "cmt_msg": "net/appletalk: fix minor pointer leak to userspace in SIOCFINDIPDDPRT" - }, - "CVE-2019-1125": { - "cmt_msg": "x86/speculation: Prepare entry code for Spectre v1 swapgs mitigations" - }, - "CVE-2019-15218": { - "cmt_msg": "media: usb: siano: Fix general protection fault in smsusb" - }, - "CVE-2019-15666": { - "cmt_msg": "xfrm: policy: Fix out-of-bound array accesses in __xfrm_policy_unlink" - }, - "CVE-2020-25641": { - "cmt_msg": "block: allow for_each_bvec to support zero len bvec" - }, - "CVE-2005-3660": { - "cmt_msg": "" - }, - "CVE-2017-14106": { - "cmt_msg": "tcp: initialize rcv_mss to TCP_MIN_MSS instead of 0" - }, - "CVE-2019-15212": { - "cmt_msg": "USB: rio500: refuse more than one device at a time" - }, - "CVE-2019-15211": { - "cmt_msg": "media: radio-raremono: change devm_k*alloc to k*alloc" - }, - "CVE-2023-1095": { - "cmt_msg": "netfilter: nf_tables: fix null deref due to zeroed list head" - }, - "CVE-2019-15217": { - "cmt_msg": "media: usb:zr364xx:Fix KASAN:null-ptr-deref Read in zr364xx_vidioc_querycap" - }, - "CVE-2019-14896": { - "cmt_msg": "libertas: Fix two buffer overflows at parsing bss descriptor" - }, - "CVE-2017-1000380": { - "cmt_msg": "ALSA: timer: Fix race between read and ioctl" - }, - "CVE-2019-15214": { - "cmt_msg": "ALSA: core: Fix card races between register and disconnect" - }, - "CVE-2020-24588": { - "cmt_msg": "cfg80211: mitigate A-MSDU aggregation attacks" - }, - "CVE-2021-33034": { - "cmt_msg": "Bluetooth: verify AMP hci_chan before amp_destroy" - }, - "CVE-2019-19922": { - "cmt_msg": "sched/fair: Fix low cpu usage with high throttling by removing expiration of cpu-local slices" - }, - "CVE-2021-33033": { - "cmt_msg": "cipso,calipso: resolve a number of problems with the DOI refcounts" - }, - "CVE-2019-19927": { - "cmt_msg": "drm/ttm: fix incrementing the page pointer for huge pages" + "CVE-2020-27067": { + "cmt_msg": "l2tp: fix l2tp_eth module loading" }, - "CVE-2017-18509": { - "cmt_msg": "ipv6: check sk sk_type and protocol early in ip_mroute_set/getsockopt" + "CVE-2020-27066": { + "cmt_msg": "xfrm: policy: Fix doulbe free in xfrm_policy_timer" }, "CVE-2020-27068": { "cmt_msg": "cfg80211: add missing policy for NL80211_ATTR_STATUS_CODE" }, "CVE-2024-23307": { - "cmt_msg": "" - }, - "CVE-2020-8648": { - "cmt_msg": "vt: selection, close sel_buffer race" - }, - "CVE-2022-32296": { - "cmt_msg": "tcp: increase source port perturb table to 2^16" - }, - "CVE-2017-11600": { - "cmt_msg": "xfrm: policy: check policy direction value" + "cmt_msg": "md/raid5: fix atomicity violation in raid5_cache_count" }, - "CVE-2023-3567": { - "cmt_msg": "vc_screen: move load of struct vc_data pointer in vcs_read() to avoid UAF" - }, - "CVE-2019-20806": { - "cmt_msg": "media: tw5864: Fix possible NULL pointer dereference in tw5864_handle_frame" - }, - "CVE-2022-3028": { - "cmt_msg": "af_key: Do not call xfrm_probe_algs in parallel" - }, - "CVE-2020-0305": { - "cmt_msg": "chardev: Avoid potential use-after-free in 'chrdev_open()'" - }, - "CVE-2020-14304": { - "cmt_msg": "" - }, - "CVE-2010-5321": { - "cmt_msg": "" + "CVE-2017-0861": { + "cmt_msg": "ALSA: pcm: prevent UAF in snd_pcm_info" }, "CVE-2020-15393": { "cmt_msg": "usb: usbtest: fix missing kfree(dev->buf) in usbtest_disconnect" }, - "CVE-2022-33981": { - "cmt_msg": "floppy: disable FDRAWCMD by default" - }, "CVE-2021-3564": { "cmt_msg": "Bluetooth: fix the erroneous flush_work() order" }, - "CVE-2019-9506": { - "cmt_msg": "Bluetooth: Fix faulty expression for minimum encryption key size check" - }, - "CVE-2023-1476": { - "cmt_msg": "" - }, - "CVE-2017-16995": { - "cmt_msg": "bpf: fix incorrect sign extension in check_alu_op()" - }, - "CVE-2017-16994": { - "cmt_msg": "mm/pagewalk.c: report holes in hugetlb ranges" - }, - "CVE-2019-2025": { - "cmt_msg": "binder: fix race that allows malicious free of live buffer" - }, - "CVE-2020-26560": { - "cmt_msg": "" - }, - "CVE-2022-38096": { - "cmt_msg": "" - }, - "CVE-2023-39198": { - "cmt_msg": "drm/qxl: fix UAF on handle creation" - }, "CVE-2017-13080": { "cmt_msg": "mac80211: accept key reinstall without changing anything" }, - "CVE-2021-20321": { - "cmt_msg": "ovl: fix missing negative dentry check in ovl_rename()" - }, "CVE-2018-12127": { "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" }, "CVE-2018-12126": { "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" }, - "CVE-2022-23816": { - "cmt_msg": "x86/kvm/vmx: Make noinstr clean" - }, - "CVE-2020-36158": { - "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_cmd_802_11_ad_hoc_start" - }, - "CVE-2017-9077": { - "cmt_msg": "ipv6/dccp: do not inherit ipv6_mc_list from parent" - }, - "CVE-2017-9076": { - "cmt_msg": "ipv6/dccp: do not inherit ipv6_mc_list from parent" - }, - "CVE-2017-9075": { - "cmt_msg": "sctp: do not inherit ipv6_{mc|ac|fl}_list from parent" - }, - "CVE-2017-9074": { - "cmt_msg": "ipv6: Prevent overrun when parsing v6 header options" - }, - "CVE-2022-20572": { - "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag" - }, - "CVE-2018-10021": { - "cmt_msg": "scsi: libsas: defer ata device eh commands to libata" - }, - "CVE-2022-20132": { - "cmt_msg": "HID: add hid_is_usb() function to make it simpler for USB detection" - }, - "CVE-2019-2024": { - "cmt_msg": "media: em28xx: Fix use-after-free when disconnecting" - }, - "CVE-2023-39194": { - "cmt_msg": "net: xfrm: Fix xfrm_address_filter OOB read" - }, - "CVE-2020-0067": { - "cmt_msg": "f2fs: fix to avoid memory leakage in f2fs_listxattr" - }, - "CVE-2019-10126": { - "cmt_msg": "mwifiex: Fix heap overflow in mwifiex_uap_parse_tail_ies()" - }, - "CVE-2019-10124": { - "cmt_msg": "mm: hwpoison: fix thp split handing in soft_offline_in_use_page()" - }, - "CVE-2020-14353": { - "cmt_msg": "KEYS: prevent creating a different user's keyrings" - }, - "CVE-2020-13974": { - "cmt_msg": "vt: keyboard: avoid signed integer overflow in k_ascii" - }, - "CVE-2021-4083": { - "cmt_msg": "fget: check that the fd still exists after getting a ref to it" - }, - "CVE-2023-33288": { - "cmt_msg": "power: supply: bq24190: Fix use after free bug in bq24190_remove due to race condition" - }, - "CVE-2018-10938": { - "cmt_msg": "Cipso: cipso_v4_optptr enter infinite loop" - }, - "CVE-2017-1000251": { - "cmt_msg": "Bluetooth: Properly check L2CAP config option output buffer length" - }, - "CVE-2017-1000252": { - "cmt_msg": "KVM: VMX: Do not BUG() on out-of-bounds guest IRQ" - }, - "CVE-2022-29901": { - "cmt_msg": "x86/kvm/vmx: Make noinstr clean" + "CVE-2021-28964": { + "cmt_msg": "btrfs: fix race when cloning extent buffer during rewind of an old root" }, - "CVE-2017-1000255": { - "cmt_msg": "powerpc/64s: Use emergency stack for kernel TM Bad Thing program checks" + "CVE-2019-13631": { + "cmt_msg": "Input: gtco - bounds check collection indent level" }, "CVE-2018-12233": { "cmt_msg": "jfs: Fix inconsistency between memory allocation and ea_buf->max_size" @@ -5532,41 +5845,14 @@ "CVE-2018-12232": { "cmt_msg": "socket: close race condition between sock_close() and sockfs_setattr()" }, - "CVE-2020-10751": { - "cmt_msg": "selinux: properly handle multiple messages in selinux_netlink_send()" - }, - "CVE-2023-39192": { - "cmt_msg": "netfilter: xt_u32: validate user space input" - }, - "CVE-2022-23042": { - "cmt_msg": "xen/netfront: react properly to failing gnttab_end_foreign_access_ref()" - }, - "CVE-2020-10757": { - "cmt_msg": "mm: Fix mremap not considering huge pmd devmap" - }, "CVE-2018-9465": { "cmt_msg": "binder: fix proc->files use-after-free" }, - "CVE-2018-20510": { - "cmt_msg": "binder: replace \"%p\" with \"%pK\"" - }, - "CVE-2022-20166": { - "cmt_msg": "drivers core: Use sysfs_emit and sysfs_emit_at for show(device *...) functions" - }, - "CVE-2020-15437": { - "cmt_msg": "serial: 8250: fix null-ptr-deref in serial8250_start_tx()" - }, - "CVE-2020-15436": { - "cmt_msg": "block: Fix use-after-free in blkdev_get()" - }, - "CVE-2022-1116": { - "cmt_msg": "" - }, - "CVE-2021-28660": { - "cmt_msg": "staging: rtl8188eu: prevent ->ssid overflow in rtw_wx_set_scan()" + "CVE-2020-8649": { + "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region" }, - "CVE-2024-0775": { - "cmt_msg": "ext4: improve error recovery code paths in __ext4_remount()" + "CVE-2020-8648": { + "cmt_msg": "vt: selection, close sel_buffer race" }, "CVE-2020-8647": { "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region" @@ -5580,188 +5866,86 @@ "CVE-2023-35827": { "cmt_msg": "ravb: Fix use-after-free issue in ravb_tx_timeout_work()" }, - "CVE-2020-36386": { - "cmt_msg": "Bluetooth: Fix slab-out-of-bounds read in hci_extended_inquiry_result_evt()" - }, - "CVE-2022-3567": { - "cmt_msg": "ipv6: Fix data races around sk->sk_prot." - }, - "CVE-2022-3566": { - "cmt_msg": "tcp: Fix data races around icsk->icsk_af_ops." - }, - "CVE-2022-3565": { - "cmt_msg": "mISDN: fix use-after-free bugs in l1oip timer handlers" - }, - "CVE-2022-3564": { - "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free caused by l2cap_reassemble_sdu" + "CVE-2023-52585": { + "cmt_msg": "drm/amdgpu: Fix possible NULL dereference in amdgpu_ras_query_error_status_helper()" }, - "CVE-2018-19407": { - "cmt_msg": "KVM: X86: Fix scan ioapic use-before-initialization" + "CVE-2023-52584": { + "cmt_msg": "spmi: mediatek: Fix UAF on device remove" }, - "CVE-2021-20317": { - "cmt_msg": "lib/timerqueue: Rely on rbtree semantics for next timer" + "CVE-2023-52587": { + "cmt_msg": "IB/ipoib: Fix mcast list locking" }, - "CVE-2020-36385": { - "cmt_msg": "RDMA/ucma: Rework ucma_migrate_id() to avoid races with destroy" + "CVE-2023-52586": { + "cmt_msg": "drm/msm/dpu: Add mutex lock in control vblank irq" }, - "CVE-2019-14897": { - "cmt_msg": "libertas: Fix two buffer overflows at parsing bss descriptor" + "CVE-2023-52583": { + "cmt_msg": "ceph: fix deadlock or deadcode of misusing dget()" }, - "CVE-2018-9385": { - "cmt_msg": "ARM: amba: Don't read past the end of sysfs \"driver_override\" buffer" + "CVE-2023-52589": { + "cmt_msg": "media: rkisp1: Fix IRQ disable race issue" }, - "CVE-2020-0009": { - "cmt_msg": "staging: android: ashmem: Disallow ashmem memory from being remapped" + "CVE-2023-52588": { + "cmt_msg": "f2fs: fix to tag gcing flag on page during block migration" }, "CVE-2023-52340": { "cmt_msg": "ipv6: remove max_size check inline with ipv4" }, - "CVE-2023-31082": { - "cmt_msg": "" - }, - "CVE-2018-7480": { - "cmt_msg": "blkcg: fix double free of new_blkg in blkcg_init_queue" - }, - "CVE-2019-14615": { - "cmt_msg": "drm/i915/gen9: Clear residual context state on context switch" - }, - "CVE-2018-16871": { - "cmt_msg": "nfsd: COPY and CLONE operations require the saved filehandle to be set" - }, - "CVE-2018-9415": { - "cmt_msg": "ARM: amba: Fix race condition with driver_override" - }, - "CVE-2023-52442": { - "cmt_msg": "ksmbd: validate session id and tree id in compound request" - }, - "CVE-2019-13648": { - "cmt_msg": "powerpc/tm: Fix oops on sigreturn on systems without TM" - }, - "CVE-2023-0030": { - "cmt_msg": "drm/nouveau/mmu: add more general vmm free/node handling functions" + "CVE-2021-46969": { + "cmt_msg": "bus: mhi: core: Fix invalid error returning in mhi_queue" }, "CVE-2020-16120": { "cmt_msg": "ovl: switch to mounter creds in readdir" }, - "CVE-2019-11599": { - "cmt_msg": "coredump: fix race condition between mmget_not_zero()/get_task_mm() and core dumping" - }, - "CVE-2018-16658": { - "cmt_msg": "cdrom: Fix info leak/OOB read in cdrom_ioctl_drive_status" - }, - "CVE-2018-15572": { - "cmt_msg": "x86/speculation: Protect against userspace-userspace spectreRSB" - }, - "CVE-2022-1204": { - "cmt_msg": "ax25: Fix refcount leaks caused by ax25_cb_del()" - }, - "CVE-2019-2101": { - "cmt_msg": "media: uvcvideo: Fix 'type' check leading to overflow" - }, "CVE-2019-17666": { "cmt_msg": "rtlwifi: Fix potential overflow on P2P code" }, - "CVE-2021-23133": { - "cmt_msg": "net/sctp: fix race condition in sctp_destroy_sock" - }, - "CVE-2018-9363": { - "cmt_msg": "Bluetooth: hidp: buffer overflow in hidp_process_report" - }, "CVE-2018-15471": { "cmt_msg": "xen-netback: fix input validation in xenvif_set_hash_mapping()" }, - "CVE-2016-10723": { - "cmt_msg": "mm, oom: remove sleep from under oom_lock" - }, - "CVE-2021-3573": { - "cmt_msg": "Bluetooth: use correct lock to prevent UAF of hdev object" - }, - "CVE-2020-25212": { - "cmt_msg": "nfs: Fix getxattr kernel panic and memory overflow" - }, - "CVE-2019-19036": { - "cmt_msg": "btrfs: Detect unbalanced tree with empty leaf before crashing btree operations" - }, - "CVE-2019-3459": { - "cmt_msg": "Bluetooth: Verify that l2cap_get_conf_opt provides large enough buffer" + "CVE-2021-34693": { + "cmt_msg": "can: bcm: fix infoleak in struct bcm_msg_head" }, "CVE-2020-11494": { "cmt_msg": "slcan: Don't transmit uninitialized stack data in padding" }, - "CVE-2017-8797": { - "cmt_msg": "nfsd: fix undefined behavior in nfsd4_layout_verify" - }, - "CVE-2020-0444": { - "cmt_msg": "audit: fix error handling in audit_data_to_entry()" - }, - "CVE-2018-10675": { - "cmt_msg": "mm/mempolicy: fix use after free when calling get_mempolicy" - }, - "CVE-2017-16526": { - "cmt_msg": "uwb: properly check kthread_run return value" - }, - "CVE-2017-16527": { - "cmt_msg": "ALSA: usb-audio: Kill stray URB at exiting" - }, - "CVE-2017-16525": { - "cmt_msg": "USB: serial: console: fix use-after-free after failed setup" - }, - "CVE-2022-1836": { - "cmt_msg": "floppy: disable FDRAWCMD by default" + "CVE-2024-26797": { + "cmt_msg": "drm/amd/display: Prevent potential buffer overflow in map_hw_resources" }, - "CVE-2020-8834": { - "cmt_msg": "KVM: PPC: Book3S HV: Factor fake-suspend handling out of kvmppc_save/restore_tm" + "CVE-2024-26791": { + "cmt_msg": "btrfs: dev-replace: properly validate device names" }, - "CVE-2021-32078": { - "cmt_msg": "ARM: footbridge: remove personal server platform" + "CVE-2024-26793": { + "cmt_msg": "gtp: fix use-after-free and null-ptr-deref in gtp_newlink()" }, "CVE-2022-30594": { "cmt_msg": "ptrace: Check PTRACE_O_SUSPEND_SECCOMP permission on PTRACE_SEIZE" }, - "CVE-2017-16528": { - "cmt_msg": "ALSA: seq: Cancel pending autoload work at unbinding device" - }, - "CVE-2017-16529": { - "cmt_msg": "ALSA: usb-audio: Check out-of-bounds access by corrupted buffer descriptor" + "CVE-2024-26798": { + "cmt_msg": "fbcon: always restore the old font data in fbcon_do_set_font()" }, - "CVE-2019-11833": { - "cmt_msg": "ext4: zero out the unused memory region in the extent tree block" + "CVE-2021-38204": { + "cmt_msg": "usb: max-3421: Prevent corruption of freed memory" }, "CVE-2021-38205": { "cmt_msg": "net: xilinx_emaclite: Do not print real IOMEM pointer" }, - "CVE-2020-27835": { - "cmt_msg": "IB/hfi1: Ensure correct mm is used at all times" - }, "CVE-2020-0255": { "cmt_msg": "selinux: properly handle multiple messages in selinux_netlink_send()" }, - "CVE-2019-2215": { - "cmt_msg": "ANDROID: binder: remove waitqueue when thread exits." - }, - "CVE-2021-3892": { - "cmt_msg": "" + "CVE-2023-35001": { + "cmt_msg": "netfilter: nf_tables: prevent OOB access in nft_byteorder_eval" }, "CVE-2021-38208": { "cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect" }, - "CVE-2018-7995": { - "cmt_msg": "x86/MCE: Serialize sysfs changes" + "CVE-2018-1108": { + "cmt_msg": "random: fix crng_ready() test" }, "CVE-2017-18232": { "cmt_msg": "scsi: libsas: direct call probe and destruct" }, - "CVE-2019-2213": { - "cmt_msg": "binder: fix possible UAF when freeing buffer" - }, - "CVE-2023-3338": { - "cmt_msg": "Remove DECnet support from kernel" - }, - "CVE-2020-25211": { - "cmt_msg": "netfilter: ctnetlink: add a range check for l3/l4 protonum" - }, - "CVE-2017-14140": { - "cmt_msg": "Sanitize 'move_pages()' permission checks" + "CVE-2022-0168": { + "cmt_msg": "cifs: fix NULL ptr dereference in smb2_ioctl_query_info()" }, "CVE-2020-26556": { "cmt_msg": "" @@ -5769,137 +5953,62 @@ "CVE-2018-9518": { "cmt_msg": "NFC: llcp: Limit size of SDP URI" }, + "CVE-2024-26778": { + "cmt_msg": "fbdev: savage: Error out if pixclock equals zero" + }, "CVE-2020-26555": { "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical" }, - "CVE-2018-9517": { - "cmt_msg": "l2tp: pass tunnel pointer to ->session_create()" - }, - "CVE-2018-9516": { - "cmt_msg": "HID: debug: check length before copy_to_user()" - }, - "CVE-2023-3397": { - "cmt_msg": "" - }, - "CVE-2018-1128": { - "cmt_msg": "libceph: add authorizer challenge" + "CVE-2024-26776": { + "cmt_msg": "spi: hisi-sfc-v3xx: Return IRQ_NONE if no interrupts were detected" }, - "CVE-2018-1129": { - "cmt_msg": "libceph: implement CEPHX_V2 calculation mode" + "CVE-2024-26777": { + "cmt_msg": "fbdev: sis: Error out if pixclock equals zero" }, - "CVE-2018-1087": { - "cmt_msg": "kvm/x86: fix icebp instruction handling" + "CVE-2020-26558": { + "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical" }, - "CVE-2022-26365": { - "cmt_msg": "xen/blkfront: fix leaking data in shared pages" + "CVE-2023-3390": { + "cmt_msg": "netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE" }, - "CVE-2022-1652": { - "cmt_msg": "floppy: use a statically allocated error counter" + "CVE-2023-3397": { + "cmt_msg": "" }, - "CVE-2018-1120": { - "cmt_msg": "proc: do not access cmdline nor environ from file-backed areas" + "CVE-2024-26773": { + "cmt_msg": "ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found()" }, - "CVE-2018-1121": { - "cmt_msg": "" + "CVE-2024-26770": { + "cmt_msg": "HID: nvidia-shield: Add missing null pointer checks to LED initialization" }, - "CVE-2018-20856": { - "cmt_msg": "block: blk_init_allocated_queue() set q->fq as NULL in the fail case" + "CVE-2024-26771": { + "cmt_msg": "dmaengine: ti: edma: Add some null pointer checks to the edma_probe" }, - "CVE-2023-52451": { - "cmt_msg": "powerpc/pseries/memhp: Fix access beyond end of drmem array" + "CVE-2023-28746": { + "cmt_msg": "x86/mmio: Disable KVM mitigation when X86_FEATURE_CLEAR_CPU_BUF is set" }, "CVE-2017-5754": { "cmt_msg": "x86/cpufeatures: Add Intel feature bits for Speculation Control" }, - "CVE-2022-3061": { - "cmt_msg": "video: fbdev: i740fb: Error out if 'pixclock' equals zero" + "CVE-2021-47119": { + "cmt_msg": "ext4: fix memory leak in ext4_fill_super" }, "CVE-2017-5753": { "cmt_msg": "x86/cpufeatures: Add X86_BUG_SPECTRE_V[12]" }, - "CVE-2022-2961": { - "cmt_msg": "" - }, - "CVE-2022-20369": { - "cmt_msg": "media: v4l2-mem2mem: Apply DST_QUEUE_OFF_BASE on MMAP buffers across ioctls" - }, - "CVE-2023-2176": { - "cmt_msg": "RDMA/core: Refactor rdma_bind_addr" - }, "CVE-2024-1086": { "cmt_msg": "netfilter: nf_tables: reject QUEUE/DROP verdict parameters" }, - "CVE-2024-22386": { - "cmt_msg": "" - }, "CVE-2019-9466": { "cmt_msg": "brcmfmac: add subtype check for event handling in data path" }, - "CVE-2020-11565": { - "cmt_msg": "mm: mempolicy: require at least one nodeid for MPOL_PREFERRED" - }, - "CVE-2019-19049": { - "cmt_msg": "of: unittest: fix memory leak in unittest_data_add" - }, - "CVE-2018-9568": { - "cmt_msg": "net: Set sk_prot_creator when cloning sockets to the right proto" - }, - "CVE-2022-0644": { - "cmt_msg": "vfs: check fd has read access in kernel_read_file_from_fd()" - }, - "CVE-2020-27784": { - "cmt_msg": "usb: gadget: function: printer: fix use-after-free in __lock_acquire" - }, - "CVE-2018-13053": { - "cmt_msg": "alarmtimer: Prevent overflow for relative nanosleep" - }, - "CVE-2020-27786": { - "cmt_msg": "ALSA: rawmidi: Fix racy buffer resize under concurrent accesses" - }, - "CVE-2019-14816": { - "cmt_msg": "mwifiex: Fix three heap overflow at parsing element in cfg80211_ap_settings" - }, - "CVE-2019-14814": { - "cmt_msg": "mwifiex: Fix three heap overflow at parsing element in cfg80211_ap_settings" - }, - "CVE-2019-14815": { - "cmt_msg": "mwifiex: Fix three heap overflow at parsing element in cfg80211_ap_settings" - }, - "CVE-2023-6240": { - "cmt_msg": "" - }, - "CVE-2023-23559": { - "cmt_msg": "wifi: rndis_wlan: Prevent buffer overflow in rndis_query_oid" - }, - "CVE-2020-10720": { - "cmt_msg": "net-gro: fix use-after-free read in napi_gro_frags()" - }, - "CVE-2020-14351": { - "cmt_msg": "perf/core: Fix race in the perf_mmap_close() function" - }, "CVE-2022-0382": { "cmt_msg": "net ticp:fix a kernel-infoleak in __tipc_sendmsg()" }, - "CVE-2019-9456": { - "cmt_msg": "usb: usbmon: Read text within supplied buffer size" - }, "CVE-2023-32233": { "cmt_msg": "netfilter: nf_tables: deactivate anonymous set from preparation phase" }, - "CVE-2020-25672": { - "cmt_msg": "nfc: fix memory leak in llcp_sock_connect()" - }, - "CVE-2019-9455": { - "cmt_msg": "media: videobuf2-v4l2: drop WARN_ON in vb2_warn_zero_bytesused()" - }, - "CVE-2020-25670": { - "cmt_msg": "nfc: fix refcount leak in llcp_sock_bind()" - }, - "CVE-2020-25671": { - "cmt_msg": "nfc: fix refcount leak in llcp_sock_connect()" - }, - "CVE-2018-21008": { - "cmt_msg": "rsi: add fix for crash during assertions" + "CVE-2019-15222": { + "cmt_msg": "ALSA: usb-audio: Fix gpf in snd_usb_pipe_sanity_check" }, "CVE-2019-15223": { "cmt_msg": "ALSA: line6: Assure canceling delayed work at disconnection" @@ -5910,86 +6019,50 @@ "CVE-2019-15221": { "cmt_msg": "ALSA: line6: Fix write on zero-sized buffer" }, - "CVE-2019-19815": { - "cmt_msg": "f2fs: support swap file w/ DIO" - }, - "CVE-2019-19814": { - "cmt_msg": "" - }, - "CVE-2020-29371": { - "cmt_msg": "romfs: fix uninitialized memory leak in romfs_dev_read()" - }, - "CVE-2019-19816": { - "cmt_msg": "btrfs: inode: Verify inode mode to avoid NULL pointer dereference" - }, - "CVE-2017-16939": { - "cmt_msg": "ipsec: Fix aborted xfrm policy dump crash" - }, - "CVE-2020-0429": { - "cmt_msg": "l2tp: fix race between l2tp_session_delete() and l2tp_tunnel_closeall()" - }, "CVE-2022-1016": { "cmt_msg": "netfilter: nf_tables: initialize registers in nft_do_chain()" }, - "CVE-2018-18710": { - "cmt_msg": "cdrom: fix improper type cast, which can leat to information leak." - }, - "CVE-2019-5108": { - "cmt_msg": "mac80211: Do not send Layer 2 Update frame before authorization" + "CVE-2022-1011": { + "cmt_msg": "fuse: fix pipe buffer lifetime for direct_io" }, "CVE-2022-1012": { "cmt_msg": "secure_seq: use the 64 bits of the siphash for port offset calculation" }, - "CVE-2020-12114": { - "cmt_msg": "make struct mountpoint bear the dentry reference to mountpoint, not struct mount" - }, - "CVE-2020-8649": { - "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region" - }, - "CVE-2020-12351": { - "cmt_msg": "Bluetooth: L2CAP: Fix calling sk_filter on non-socket based channel" - }, - "CVE-2020-12656": { - "cmt_msg": "sunrpc: check that domain table is empty at module unload." - }, - "CVE-2020-14356": { - "cmt_msg": "cgroup: fix cgroup_sk_alloc() for sk_clone_lock()" + "CVE-2023-52620": { + "cmt_msg": "netfilter: nf_tables: disallow timeout for anonymous sets" }, - "CVE-2017-1000405": { - "cmt_msg": "mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d()" + "CVE-2023-52621": { + "cmt_msg": "bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers" }, - "CVE-2021-26930": { - "cmt_msg": "xen-blkback: fix error handling in xen_blkbk_map()" + "CVE-2023-52622": { + "cmt_msg": "ext4: avoid online resizing failures due to oversized flex bg" }, - "CVE-2017-1000407": { - "cmt_msg": "KVM: VMX: remove I/O port 0x80 bypass on Intel hosts" + "CVE-2023-52623": { + "cmt_msg": "SUNRPC: Fix a suspicious RCU usage warning" }, - "CVE-2021-26932": { - "cmt_msg": "Xen/x86: don't bail early from clear_foreign_p2m_mapping()" + "CVE-2023-52624": { + "cmt_msg": "drm/amd/display: Wake DMCUB before executing GPINT commands" }, - "CVE-2024-25740": { - "cmt_msg": "" + "CVE-2023-52625": { + "cmt_msg": "drm/amd/display: Refactor DMCUB enter/exit idle interface" }, - "CVE-2023-52456": { - "cmt_msg": "serial: imx: fix tx statemachine deadlock" + "CVE-2023-52628": { + "cmt_msg": "netfilter: nftables: exthdr: fix 4-byte stack OOB write" }, - "CVE-2023-3141": { - "cmt_msg": "memstick: r592: Fix UAF bug in r592_remove due to race condition" + "CVE-2023-52629": { + "cmt_msg": "sh: push-switch: Reorder cleanup operations to avoid use-after-free bug" }, - "CVE-2023-37454": { - "cmt_msg": "" + "CVE-2018-14617": { + "cmt_msg": "hfsplus: fix NULL dereference in hfsplus_lookup()" }, - "CVE-2019-3892": { - "cmt_msg": "coredump: fix race condition between mmget_not_zero()/get_task_mm() and core dumping" + "CVE-2022-0492": { + "cmt_msg": "cgroup-v1: Require capabilities to set release_agent" }, "CVE-2020-12352": { "cmt_msg": "Bluetooth: A2MP: Fix not initializing all members" }, - "CVE-2019-3460": { - "cmt_msg": "Bluetooth: Check L2CAP option sizes returned from l2cap_get_conf_opt" - }, - "CVE-2020-12655": { - "cmt_msg": "xfs: add agf freeblocks verify in xfs_agf_verify" + "CVE-2020-12351": { + "cmt_msg": "Bluetooth: L2CAP: Fix calling sk_filter on non-socket based channel" }, "CVE-2021-43976": { "cmt_msg": "mwifiex: Fix skb_over_panic in mwifiex_usb_recv()" @@ -5997,1740 +6070,1644 @@ "CVE-2022-0494": { "cmt_msg": "block-map: add __GFP_ZERO flag for alloc_page in function bio_copy_kern" }, - "CVE-2023-2269": { - "cmt_msg": "dm ioctl: fix nested locking in table_clear() to remove deadlock concern" - }, - "CVE-2020-26088": { - "cmt_msg": "net/nfc/rawsock.c: add CAP_NET_RAW check." - }, - "CVE-2022-3524": { - "cmt_msg": "tcp/udp: Fix memory leak in ipv6_renew_options()." + "CVE-2021-47101": { + "cmt_msg": "asix: fix uninit-value in asix_mdio_read()" }, - "CVE-2022-3523": { - "cmt_msg": "mm/memory.c: fix race when faulting a device private page" + "CVE-2021-47103": { + "cmt_msg": "inet: fully convert sk->sk_rx_dst to RCU rules" }, - "CVE-2022-3522": { - "cmt_msg": "mm/hugetlb: use hugetlb_pte_stable in migration race check" + "CVE-2021-46982": { + "cmt_msg": "f2fs: compress: fix race condition of overwrite vs truncate" }, - "CVE-2008-2544": { + "CVE-2007-3719": { "cmt_msg": "" }, - "CVE-2021-3178": { - "cmt_msg": "nfsd4: readdirplus shouldn't return parent of export" - }, - "CVE-2022-2318": { - "cmt_msg": "net: rose: fix UAF bugs caused by timer handler" + "CVE-2023-3863": { + "cmt_msg": "net: nfc: Fix use-after-free caused by nfc_llcp_find_local" }, - "CVE-2022-42703": { - "cmt_msg": "mm/rmap: Fix anon_vma->degree ambiguity leading to double-reuse" + "CVE-2019-19319": { + "cmt_msg": "ext4: protect journal inode's blocks using block_validity" }, - "CVE-2023-23455": { - "cmt_msg": "net: sched: atm: dont intepret cls results when asked to drop" + "CVE-2022-3628": { + "cmt_msg": "wifi: brcmfmac: Fix potential buffer overflow in brcmf_fweh_event_worker()" }, - "CVE-2018-7755": { - "cmt_msg": "floppy: Do not copy a kernel pointer to user memory in FDGETPRM ioctl" + "CVE-2022-3629": { + "cmt_msg": "vsock: Fix memory leak in vsock_connect()" }, - "CVE-2017-7346": { - "cmt_msg": "drm/vmwgfx: limit the number of mip levels in vmw_gb_surface_define_ioctl()" + "CVE-2022-3621": { + "cmt_msg": "nilfs2: fix NULL pointer dereference at nilfs_bmap_lookup_at_level()" }, - "CVE-2018-7757": { - "cmt_msg": "scsi: libsas: fix memory leak in sas_smp_get_phy_events()" + "CVE-2022-23960": { + "cmt_msg": "ARM: report Spectre v2 status through sysfs" }, - "CVE-2022-0330": { - "cmt_msg": "drm/i915: Flush TLBs before releasing backing store" + "CVE-2022-3624": { + "cmt_msg": "bonding: fix reference count leak in balance-alb mode" }, - "CVE-2007-3719": { - "cmt_msg": "" + "CVE-2019-11091": { + "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" }, - "CVE-2023-3863": { - "cmt_msg": "net: nfc: Fix use-after-free caused by nfc_llcp_find_local" + "CVE-2023-4921": { + "cmt_msg": "net: sched: sch_qfq: Fix UAF in qfq_dequeue()" }, - "CVE-2023-0590": { - "cmt_msg": "net: sched: fix race condition in qdisc_graft()" + "CVE-2017-15649": { + "cmt_msg": "packet: in packet_do_bind, test fanout with bind_lock held" }, - "CVE-2022-29900": { - "cmt_msg": "x86/kvm/vmx: Make noinstr clean" + "CVE-2023-1829": { + "cmt_msg": "net/sched: Retire tcindex classifier" }, - "CVE-2022-4095": { - "cmt_msg": "staging: rtl8712: fix use after free bugs" + "CVE-2019-19227": { + "cmt_msg": "appletalk: Fix potential NULL pointer dereference in unregister_snap_client" }, - "CVE-2017-10911": { - "cmt_msg": "xen-blkback: don't leak stack data via response ring" + "CVE-2024-0775": { + "cmt_msg": "ext4: improve error recovery code paths in __ext4_remount()" }, - "CVE-2023-34255": { - "cmt_msg": "xfs: verify buffer contents when we skip log replay" + "CVE-2020-24394": { + "cmt_msg": "nfsd: apply umask on fs without ACL support" }, - "CVE-2022-45919": { - "cmt_msg": "media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221" + "CVE-2020-14386": { + "cmt_msg": "net/packet: fix overflow in tpacket_rcv" }, - "CVE-2019-19319": { - "cmt_msg": "ext4: protect journal inode's blocks using block_validity" + "CVE-2020-14381": { + "cmt_msg": "futex: Fix inode life-time issue" }, - "CVE-2019-19462": { - "cmt_msg": "kernel/relay.c: handle alloc_percpu returning NULL in relay_open" + "CVE-2019-19768": { + "cmt_msg": "blktrace: Protect q->blk_trace with RCU" }, - "CVE-2023-30772": { - "cmt_msg": "power: supply: da9150: Fix use after free bug in da9150_charger_remove due to race condition" + "CVE-2022-20141": { + "cmt_msg": "igmp: Add ip_mc_list lock in ip_check_mc_rcu" }, - "CVE-2017-18017": { - "cmt_msg": "netfilter: xt_TCPMSS: add more sanity tests on tcph->doff" + "CVE-2023-23455": { + "cmt_msg": "net: sched: atm: dont intepret cls results when asked to drop" }, - "CVE-2022-24958": { - "cmt_msg": "usb: gadget: don't release an existing dev->buf" + "CVE-2023-23454": { + "cmt_msg": "net: sched: cbq: dont intepret cls results when asked to drop" }, - "CVE-2023-1611": { - "cmt_msg": "btrfs: fix race between quota disable and quota assign ioctls" + "CVE-2022-20148": { + "cmt_msg": "f2fs: fix UAF in f2fs_available_free_memory" }, - "CVE-2021-3772": { - "cmt_msg": "sctp: use init_tag from inithdr for ABORT chunk" + "CVE-2023-6931": { + "cmt_msg": "perf: Fix perf_event_validate_size()" }, - "CVE-2023-3268": { - "cmt_msg": "relayfs: fix out-of-bounds access in relay_file_read" + "CVE-2023-6932": { + "cmt_msg": "ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet" }, - "CVE-2021-3679": { - "cmt_msg": "tracing: Fix bug in rb_per_cpu_empty() that might cause deadloop." + "CVE-2018-8781": { + "cmt_msg": "drm: udl: Properly check framebuffer mmap offsets" }, - "CVE-2021-37159": { - "cmt_msg": "usb: hso: fix error handling code of hso_create_net_device" + "CVE-2017-15265": { + "cmt_msg": "ALSA: seq: Fix use-after-free at creating a port" }, - "CVE-2022-2586": { - "cmt_msg": "netfilter: nf_tables: do not allow SET_ID to refer to another table" + "CVE-2021-0605": { + "cmt_msg": "af_key: pfkey_dump needs parameter validation" }, - "CVE-2022-3629": { - "cmt_msg": "vsock: Fix memory leak in vsock_connect()" + "CVE-2018-20961": { + "cmt_msg": "USB: gadget: f_midi: fixing a possible double-free in f_midi" }, - "CVE-2021-28715": { - "cmt_msg": "xen/netback: don't queue unlimited number of packages" + "CVE-2018-5995": { + "cmt_msg": "printk: hash addresses printed with %p" }, - "CVE-2021-28714": { - "cmt_msg": "xen/netback: fix rx queue stall detection" + "CVE-2022-2153": { + "cmt_msg": "KVM: x86: Avoid theoretical NULL pointer dereference in kvm_irq_delivery_to_apic_fast()" }, - "CVE-2021-28713": { - "cmt_msg": "xen/console: harden hvc_xen against event channel storms" + "CVE-2024-2193": { + "cmt_msg": "" }, - "CVE-2018-5873": { - "cmt_msg": "nsfs: mark dentry with DCACHE_RCUACCESS" + "CVE-2018-12930": { + "cmt_msg": "" }, - "CVE-2017-18261": { - "cmt_msg": "clocksource/drivers/arm_arch_timer: Avoid infinite recursion when ftrace is enabled" + "CVE-2018-12931": { + "cmt_msg": "" }, - "CVE-2021-4157": { - "cmt_msg": "pNFS/flexfiles: fix incorrect size check in decode_nfs_fh()" + "CVE-2021-28972": { + "cmt_msg": "PCI: rpadlpar: Fix potential drc_name corruption in store functions" }, - "CVE-2022-2991": { - "cmt_msg": "remove the lightnvm subsystem" + "CVE-2021-28971": { + "cmt_msg": "perf/x86/intel: Fix a crash caused by zero PEBS status" }, - "CVE-2022-3621": { - "cmt_msg": "nilfs2: fix NULL pointer dereference at nilfs_bmap_lookup_at_level()" + "CVE-2019-19543": { + "cmt_msg": "media: serial_ir: Fix use-after-free in serial_ir_init_module" }, - "CVE-2017-11473": { - "cmt_msg": "x86/acpi: Prevent out of bound access caused by broken ACPI tables" + "CVE-2017-12146": { + "cmt_msg": "driver core: platform: fix race condition with driver_override" }, - "CVE-2017-11472": { - "cmt_msg": "ACPICA: Namespace: fix operand cache leak" + "CVE-2020-36781": { + "cmt_msg": "i2c: imx: fix reference leak when pm_runtime_get_sync fails" }, - "CVE-2022-3624": { - "cmt_msg": "bonding: fix reference count leak in balance-alb mode" + "CVE-2021-3732": { + "cmt_msg": "ovl: prevent private clone if bind mount is not allowed" }, - "CVE-2017-17862": { - "cmt_msg": "bpf: fix branch pruning logic" + "CVE-2020-36784": { + "cmt_msg": "i2c: cadence: fix reference leak when pm_runtime_get_sync fails" }, - "CVE-2017-17863": { - "cmt_msg": "bpf: fix integer overflows" + "CVE-2017-13166": { + "cmt_msg": "media: v4l2-ioctl.c: use check_fmt for enum/g/s/try_fmt" }, - "CVE-2021-3669": { - "cmt_msg": "ipc: replace costly bailout check in sysvipc_find_ipc()" + "CVE-2018-12207": { + "cmt_msg": "kvm: x86, powerpc: do not allow clearing largepages debugfs entry" }, - "CVE-2019-18885": { - "cmt_msg": "btrfs: merge btrfs_find_device and find_device" + "CVE-2017-13168": { + "cmt_msg": "scsi: sg: mitigate read/write abuse" }, - "CVE-2022-4744": { - "cmt_msg": "tun: avoid double free in tun_free_netdev" + "CVE-2019-0148": { + "cmt_msg": "i40e: Wrong truncation from u16 to u8" }, - "CVE-2019-12378": { - "cmt_msg": "ipv6_sockglue: Fix a missing-check bug in ip6_ra_control()" + "CVE-2019-17075": { + "cmt_msg": "RDMA/cxgb4: Do not dma memory off of the stack" }, - "CVE-2019-11091": { - "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" + "CVE-2023-20588": { + "cmt_msg": "x86/CPU/AMD: Do not leak quotient data after a division by 0" }, - "CVE-2022-3239": { - "cmt_msg": "media: em28xx: initialize refcount before kref_get" + "CVE-2019-0147": { + "cmt_msg": "i40e: add num_vectors checker in iwarp handler" }, - "CVE-2022-4543": { - "cmt_msg": "" + "CVE-2019-0145": { + "cmt_msg": "i40e: add num_vectors checker in iwarp handler" }, - "CVE-2019-18660": { - "cmt_msg": "powerpc/book3s64: Fix link stack flush on context switch" + "CVE-2022-44034": { + "cmt_msg": "char: pcmcia: remove all the drivers" }, - "CVE-2023-4921": { - "cmt_msg": "net: sched: sch_qfq: Fix UAF in qfq_dequeue()" + "CVE-2022-44033": { + "cmt_msg": "char: pcmcia: remove all the drivers" }, - "CVE-2022-3424": { - "cmt_msg": "misc: sgi-gru: fix use-after-free error in gru_set_context_option, gru_fault and gru_handle_user_call_os" + "CVE-2022-44032": { + "cmt_msg": "char: pcmcia: remove all the drivers" }, - "CVE-2017-15649": { - "cmt_msg": "packet: in packet_do_bind, test fanout with bind_lock held" + "CVE-2021-3609": { + "cmt_msg": "can: bcm: delay release of struct bcm_op after synchronize_rcu()" }, - "CVE-2017-11089": { - "cmt_msg": "cfg80211: Define nla_policy for NL80211_ATTR_LOCAL_MESH_POWER_MODE" + "CVE-2017-13305": { + "cmt_msg": "KEYS: encrypted: fix buffer overread in valid_master_desc()" }, - "CVE-2023-1829": { - "cmt_msg": "net/sched: Retire tcindex classifier" + "CVE-2021-23133": { + "cmt_msg": "net/sctp: fix race condition in sctp_destroy_sock" }, - "CVE-2019-18282": { - "cmt_msg": "net/flow_dissector: switch to siphash" + "CVE-2019-11478": { + "cmt_msg": "tcp: tcp_fragment() should apply sane memory limits" }, - "CVE-2021-34981": { - "cmt_msg": "Bluetooth: cmtp: fix file refcount when cmtp_attach_device fails" + "CVE-2019-20095": { + "cmt_msg": "mwifiex: Fix mem leak in mwifiex_tm_cmd" }, - "CVE-2023-1670": { - "cmt_msg": "xirc2ps_cs: Fix use after free bug in xirc2ps_detach" + "CVE-2019-20096": { + "cmt_msg": "dccp: Fix memleak in __feat_register_sp" }, - "CVE-2018-14625": { - "cmt_msg": "vhost/vsock: fix use-after-free in network stack callers" + "CVE-2018-6554": { + "cmt_msg": "staging: irda: remove the irda network stack and drivers" }, - "CVE-2023-4881": { - "cmt_msg": "netfilter: nftables: exthdr: fix 4-byte stack OOB write" + "CVE-2018-6555": { + "cmt_msg": "staging: irda: remove the irda network stack and drivers" }, - "CVE-2017-14489": { - "cmt_msg": "scsi: scsi_transport_iscsi: fix the issue that iscsi_if_rx doesn't parse nlmsg properly" + "CVE-2019-9213": { + "cmt_msg": "mm: enforce min addr even if capable() in expand_downwards()" }, - "CVE-2023-6915": { - "cmt_msg": "ida: Fix crash in ida_free when the bitmap is empty" + "CVE-2019-14896": { + "cmt_msg": "libertas: Fix two buffer overflows at parsing bss descriptor" }, - "CVE-2022-20148": { - "cmt_msg": "f2fs: fix UAF in f2fs_available_free_memory" + "CVE-2019-14897": { + "cmt_msg": "libertas: Fix two buffer overflows at parsing bss descriptor" }, - "CVE-2022-1786": { - "cmt_msg": "io_uring: remove io_identity" + "CVE-2019-14895": { + "cmt_msg": "mwifiex: fix possible heap overflow in mwifiex_process_country_ie()" }, - "CVE-2013-7445": { - "cmt_msg": "" + "CVE-2024-26784": { + "cmt_msg": "pmdomain: arm: Fix NULL dereference on scmi_perf_domain removal" }, - "CVE-2022-3646": { - "cmt_msg": "nilfs2: fix leak of nilfs_root in case of writer thread creation failure" + "CVE-2024-26789": { + "cmt_msg": "crypto: arm64/neonbs - fix out-of-bounds access on short input" }, - "CVE-2022-28390": { - "cmt_msg": "can: ems_usb: ems_usb_start_xmit(): fix double dev_kfree_skb() in error path" + "CVE-2017-18222": { + "cmt_msg": "net: hns: fix ethtool_get_strings overflow in hns driver" }, - "CVE-2019-15292": { - "cmt_msg": "appletalk: Fix use-after-free in atalk_proc_exit" + "CVE-2020-0067": { + "cmt_msg": "f2fs: fix to avoid memory leakage in f2fs_listxattr" }, - "CVE-2020-12652": { - "cmt_msg": "scsi: mptfusion: Fix double fetch bug in ioctl" + "CVE-2017-18224": { + "cmt_msg": "ocfs2: ip_alloc_sem should be taken in ocfs2_get_block()" }, - "CVE-2017-14340": { - "cmt_msg": "xfs: XFS_IS_REALTIME_INODE() should be false if no rt device present" + "CVE-2020-26541": { + "cmt_msg": "certs: Add EFI_CERT_X509_GUID support for dbx entries" }, - "CVE-2022-26966": { - "cmt_msg": "sr9700: sanity check for packet length" + "CVE-2019-20794": { + "cmt_msg": "" }, - "CVE-2019-19535": { - "cmt_msg": "can: peak_usb: pcan_usb_fd: Fix info-leaks to USB devices" + "CVE-2024-26769": { + "cmt_msg": "nvmet-fc: avoid deadlock on delete association path" }, - "CVE-2020-14386": { - "cmt_msg": "net/packet: fix overflow in tpacket_rcv" + "CVE-2024-26768": { + "cmt_msg": "LoongArch: Change acpi_core_pic[NR_CPUS] to acpi_core_pic[MAX_CORE_PIC]" }, - "CVE-2021-34693": { - "cmt_msg": "can: bcm: fix infoleak in struct bcm_msg_head" + "CVE-2021-33061": { + "cmt_msg": "ixgbe: add improvement for MDD response functionality" }, - "CVE-2020-14381": { - "cmt_msg": "futex: Fix inode life-time issue" + "CVE-2024-26764": { + "cmt_msg": "fs/aio: Restrict kiocb_set_cancel_fn() to I/O submitted via libaio" }, - "CVE-2023-30456": { - "cmt_msg": "KVM: nVMX: add missing consistency checks for CR0 and CR4" + "CVE-2024-26767": { + "cmt_msg": "drm/amd/display: fixed integer types and null check locations" }, - "CVE-2019-19768": { - "cmt_msg": "blktrace: Protect q->blk_trace with RCU" + "CVE-2024-26766": { + "cmt_msg": "IB/hfi1: Fix sdma.h tx->num_descs off-by-one error" }, - "CVE-2022-3303": { - "cmt_msg": "ALSA: pcm: oss: Fix race at SNDCTL_DSP_SYNC" + "CVE-2024-26763": { + "cmt_msg": "dm-crypt: don't modify the data when using authenticated encryption" }, - "CVE-2019-19039": { - "cmt_msg": "btrfs: Don't submit any btree write bio if the fs has errors" + "CVE-2017-18551": { + "cmt_msg": "i2c: core-smbus: prevent stack corruption on read I2C_BLOCK_DATA" }, - "CVE-2017-5715": { - "cmt_msg": "x86/cpufeatures: Add X86_BUG_SPECTRE_V[12]" + "CVE-2017-18552": { + "cmt_msg": "RDS: validate the requested traces user input against max supported" }, - "CVE-2022-20141": { - "cmt_msg": "igmp: Add ip_mc_list lock in ip_check_mc_rcu" + "CVE-2018-18559": { + "cmt_msg": "net/packet: fix a race in packet_bind() and packet_notifier()" }, - "CVE-2020-25704": { - "cmt_msg": "perf/core: Fix a memory leak in perf_event_parse_addr_filter()" + "CVE-2019-9457": { + "cmt_msg": "exec: Limit arg stack to at most 75% of _STK_LIM" }, - "CVE-2021-45095": { - "cmt_msg": "phonet: refcount leak in pep_sock_accep" + "CVE-2019-9456": { + "cmt_msg": "usb: usbmon: Read text within supplied buffer size" }, - "CVE-2023-23454": { - "cmt_msg": "net: sched: cbq: dont intepret cls results when asked to drop" + "CVE-2019-9455": { + "cmt_msg": "media: videobuf2-v4l2: drop WARN_ON in vb2_warn_zero_bytesused()" }, - "CVE-2020-12771": { - "cmt_msg": "bcache: fix potential deadlock problem in btree_gc_coalesce" + "CVE-2022-2978": { + "cmt_msg": "fs: fix UAF/GPF bug in nilfs_mdt_destroy" }, - "CVE-2018-10853": { - "cmt_msg": "kvm: x86: use correct privilege level for sgdt/sidt/fxsave/fxrstor access" + "CVE-2019-9453": { + "cmt_msg": "f2fs: fix to avoid accessing xattr across the boundary" }, - "CVE-2018-3620": { - "cmt_msg": "x86/microcode: Allow late microcode loading with SMT disabled" + "CVE-2023-20569": { + "cmt_msg": "x86/bugs: Increase the x86 bugs vector size to two u32s" }, - "CVE-2023-6932": { - "cmt_msg": "ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet" + "CVE-2023-46838": { + "cmt_msg": "xen-netback: don't produce zero-size SKB frags" }, - "CVE-2017-18379": { - "cmt_msg": "nvmet-fc: ensure target queue id within range." + "CVE-2019-9458": { + "cmt_msg": "media: v4l: event: Prevent freeing event subscriptions while accessed" }, - "CVE-2018-8781": { - "cmt_msg": "drm: udl: Properly check framebuffer mmap offsets" + "CVE-2023-3090": { + "cmt_msg": "ipvlan:Fix out-of-bounds caused by unclear skb->cb" }, - "CVE-2021-29155": { - "cmt_msg": "bpf: Use correct permission flag for mixed signed bounds arithmetic" + "CVE-2023-45862": { + "cmt_msg": "USB: ene_usb6250: Allocate enough memory for full object" }, - "CVE-2021-33631": { - "cmt_msg": "ext4: fix kernel BUG in 'ext4_write_inline_data_end()'" + "CVE-2023-45863": { + "cmt_msg": "kobject: Fix slab-out-of-bounds in fill_kobj_path()" }, - "CVE-2019-15916": { - "cmt_msg": "net-sysfs: Fix mem leak in netdev_register_kobject" + "CVE-2020-25704": { + "cmt_msg": "perf/core: Fix a memory leak in perf_event_parse_addr_filter()" }, - "CVE-2019-15917": { - "cmt_msg": "Bluetooth: hci_ldisc: Postpone HCI_UART_PROTO_READY bit set in hci_uart_set_proto()" + "CVE-2020-25705": { + "cmt_msg": "icmp: randomize the global rate limiter" }, - "CVE-2017-18344": { - "cmt_msg": "posix-timer: Properly check sigevent->sigev_notify" + "CVE-2023-52639": { + "cmt_msg": "KVM: s390: vsie: fix race during shadow creation" }, - "CVE-2017-15115": { - "cmt_msg": "sctp: do not peel off an assoc from one netns to another one" + "CVE-2023-52638": { + "cmt_msg": "can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock" }, - "CVE-2017-15265": { - "cmt_msg": "ALSA: seq: Fix use-after-free at creating a port" + "CVE-2019-15239": { + "cmt_msg": "" }, - "CVE-2021-27363": { - "cmt_msg": "scsi: iscsi: Restrict sessions and handles to admin capabilities" + "CVE-2017-15129": { + "cmt_msg": "net: Fix double free and memory corruption in get_net_ns_by_id()" }, - "CVE-2020-12362": { - "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" + "CVE-2022-26373": { + "cmt_msg": "x86/speculation: Add RSB VM Exit protections" }, - "CVE-2020-12363": { - "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" + "CVE-2023-52633": { + "cmt_msg": "um: time-travel: fix time corruption" }, - "CVE-2019-12881": { - "cmt_msg": "drm/i915/userptr: reject zero user_size" + "CVE-2023-52632": { + "cmt_msg": "drm/amdkfd: Fix lock dependency warning with srcu" }, - "CVE-2022-4129": { - "cmt_msg": "l2tp: Serialize access to sk_user_data with sk_callback_lock" + "CVE-2017-9986": { + "cmt_msg": "sound: Retire OSS" }, - "CVE-2023-3117": { - "cmt_msg": "netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE" + "CVE-2017-9985": { + "cmt_msg": "ALSA: msnd: Optimize / harden DSP and MIDI loops" }, - "CVE-2018-1000004": { - "cmt_msg": "ALSA: seq: Make ioctls race-free" + "CVE-2017-9984": { + "cmt_msg": "ALSA: msnd: Optimize / harden DSP and MIDI loops" }, - "CVE-2019-19530": { - "cmt_msg": "usb: cdc-acm: make sure a refcount is taken early enough" + "CVE-2017-9059": { + "cmt_msg": "NFSv4: Fix callback server shutdown" }, - "CVE-2018-18690": { - "cmt_msg": "xfs: don't fail when converting shortform attr to long form during ATTR_REPLACE" + "CVE-2021-47135": { + "cmt_msg": "mt76: mt7921: fix possible AOOB issue in mt7921_mcu_tx_rate_report" }, - "CVE-2022-28388": { - "cmt_msg": "can: usb_8dev: usb_8dev_start_xmit(): fix double dev_kfree_skb() in error path" + "CVE-2021-47136": { + "cmt_msg": "net: zero-initialize tc skb extension on allocation" }, - "CVE-2023-33203": { - "cmt_msg": "net: qcom/emac: Fix use after free bug in emac_remove due to race condition" + "CVE-2021-47137": { + "cmt_msg": "net: lantiq: fix memory corruption in RX ring" }, - "CVE-2017-0627": { - "cmt_msg": "media: uvcvideo: Prevent heap overflow when accessing mapped controls" + "CVE-2021-47131": { + "cmt_msg": "net/tls: Fix use-after-free after the TLS device goes down and up" }, - "CVE-2021-0605": { - "cmt_msg": "af_key: pfkey_dump needs parameter validation" + "CVE-2021-47133": { + "cmt_msg": "HID: amd_sfh: Fix memory leak in amd_sfh_work" }, - "CVE-2021-3896": { - "cmt_msg": "isdn: cpai: check ctr->cnr to avoid array index out of bound" + "CVE-2024-26675": { + "cmt_msg": "ppp_async: limit MRU to 64K" }, - "CVE-2021-4002": { - "cmt_msg": "hugetlbfs: flush TLBs correctly after huge_pmd_unshare" + "CVE-2023-0386": { + "cmt_msg": "ovl: fail on invalid uid/gid mapping at copy up" }, - "CVE-2023-26545": { - "cmt_msg": "net: mpls: fix stale pointer if allocation fails during device rename" + "CVE-2022-42896": { + "cmt_msg": "Bluetooth: L2CAP: Fix accepting connection request for invalid SPSM" }, - "CVE-2021-38204": { - "cmt_msg": "usb: max-3421: Prevent corruption of freed memory" + "CVE-2022-42895": { + "cmt_msg": "Bluetooth: L2CAP: Fix attempting to access uninitialized memory" }, - "CVE-2022-34918": { - "cmt_msg": "netfilter: nf_tables: stricter validation of element data" + "CVE-2022-48626": { + "cmt_msg": "moxart: fix potential use-after-free on remove path" }, - "CVE-2018-20961": { - "cmt_msg": "USB: gadget: f_midi: fixing a possible double-free in f_midi" + "CVE-2022-48627": { + "cmt_msg": "vt: fix memory overlapping when deleting chars in the buffer" }, - "CVE-2020-24394": { - "cmt_msg": "nfsd: apply umask on fs without ACL support" + "CVE-2022-48628": { + "cmt_msg": "ceph: drop messages from MDS when unmounting" }, - "CVE-2019-20811": { - "cmt_msg": "net-sysfs: call dev_hold if kobject_init_and_add success" + "CVE-2024-24859": { + "cmt_msg": "" }, - "CVE-2019-20810": { - "cmt_msg": "media: go7007: fix a miss of snd_card_free" + "CVE-2017-1000112": { + "cmt_msg": "udp: consistently apply ufo or fragmentation" }, - "CVE-2019-20812": { - "cmt_msg": "af_packet: set defaule value for tmo" + "CVE-2017-1000111": { + "cmt_msg": "packet: fix tp_reserve race in packet_set_ring" }, - "CVE-2023-1990": { - "cmt_msg": "nfc: st-nci: Fix use after free bug in ndlc_remove due to race condition" + "CVE-2024-24855": { + "cmt_msg": "scsi: lpfc: Fix a possible data race in lpfc_unregister_fcf_rescan()" }, - "CVE-2018-1118": { - "cmt_msg": "vhost: fix info leak due to uninitialized memory" + "CVE-2024-24857": { + "cmt_msg": "" }, - "CVE-2023-6040": { - "cmt_msg": "netfilter: nf_tables: Reject tables of unsupported family" + "CVE-2019-3892": { + "cmt_msg": "coredump: fix race condition between mmget_not_zero()/get_task_mm() and core dumping" }, - "CVE-2018-5391": { - "cmt_msg": "ip: discard IPv4 datagrams with overlapping segments." + "CVE-2021-29264": { + "cmt_msg": "gianfar: fix jumbo packets+napi+rx overrun crash" }, - "CVE-2022-26373": { - "cmt_msg": "x86/speculation: Add RSB VM Exit protections" + "CVE-2021-29265": { + "cmt_msg": "usbip: fix stub_dev usbip_sockfd_store() races leading to gpf" }, - "CVE-2018-5995": { - "cmt_msg": "printk: hash addresses printed with %p" + "CVE-2022-3545": { + "cmt_msg": "nfp: fix use-after-free in area_cache_get()" }, - "CVE-2018-18386": { - "cmt_msg": "n_tty: fix EXTPROC vs ICANON interaction with TIOCINQ (aka FIONREAD)" + "CVE-2022-3542": { + "cmt_msg": "bnx2x: fix potential memory leak in bnx2x_tpa_stop()" }, - "CVE-2019-15291": { - "cmt_msg": "media: b2c2-flexcop-usb: add sanity checking" + "CVE-2021-21781": { + "cmt_msg": "ARM: ensure the signal page contains defined contents" }, - "CVE-2019-15290": { - "cmt_msg": "" + "CVE-2023-1838": { + "cmt_msg": "Fix double fget() in vhost_net_set_backend()" }, - "CVE-2023-3212": { - "cmt_msg": "gfs2: Don't deref jdesc in evict" + "CVE-2023-1382": { + "cmt_msg": "tipc: set con sock in tipc_conn_alloc" }, - "CVE-2024-23848": { - "cmt_msg": "" + "CVE-2018-14734": { + "cmt_msg": "infiniband: fix a possible use-after-free bug" }, - "CVE-2017-9211": { - "cmt_msg": "crypto: skcipher - Add missing API setkey checks" + "CVE-2017-15306": { + "cmt_msg": "KVM: PPC: Fix oops when checking KVM_CAP_PPC_HTM" }, - "CVE-2018-7273": { - "cmt_msg": "printk: hash addresses printed with %p" + "CVE-2018-8822": { + "cmt_msg": "staging: ncpfs: memory corruption in ncp_read_kernel()" }, - "CVE-2023-52444": { - "cmt_msg": "f2fs: fix to avoid dirent corruption" + "CVE-2021-29647": { + "cmt_msg": "net: qrtr: fix a kernel-infoleak in qrtr_recvmsg()" }, - "CVE-2019-3016": { - "cmt_msg": "x86/kvm: Be careful not to clear KVM_VCPU_FLUSH_TLB bit" + "CVE-2023-6546": { + "cmt_msg": "tty: n_gsm: fix the UAF caused by race condition in gsm_cleanup_mux" }, - "CVE-2023-4459": { - "cmt_msg": "net: vmxnet3: fix possible NULL pointer dereference in vmxnet3_rq_cleanup()" + "CVE-2020-14390": { + "cmt_msg": "fbcon: remove soft scrollback code" }, - "CVE-2023-52457": { - "cmt_msg": "serial: 8250: omap: Don't skip resource freeing if pm_runtime_resume_and_get() failed" + "CVE-2021-45469": { + "cmt_msg": "f2fs: fix to do sanity check on last xattr entry in __f2fs_setxattr()" }, - "CVE-2022-23036": { - "cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()" + "CVE-2017-7541": { + "cmt_msg": "brcmfmac: fix possible buffer overflow in brcmf_cfg80211_mgmt_tx()" }, - "CVE-2022-2153": { - "cmt_msg": "KVM: x86: Avoid theoretical NULL pointer dereference in kvm_irq_delivery_to_apic_fast()" + "CVE-2017-7542": { + "cmt_msg": "ipv6: avoid overflow of offset in ip6_find_1stfragopt" }, - "CVE-2019-19531": { - "cmt_msg": "usb: yurex: Fix use-after-free in yurex_delete" + "CVE-2024-0584": { + "cmt_msg": "ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet" }, - "CVE-2022-20566": { - "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free caused by l2cap_chan_put" + "CVE-2020-0465": { + "cmt_msg": "HID: core: Sanitize event code and type when mapping input" }, - "CVE-2018-12930": { - "cmt_msg": "" + "CVE-2020-0466": { + "cmt_msg": "do_epoll_ctl(): clean the failure exits up a bit" }, - "CVE-2018-12931": { - "cmt_msg": "" + "CVE-2017-15274": { + "cmt_msg": "KEYS: fix dereferencing NULL payload with nonzero length" }, - "CVE-2024-23196": { - "cmt_msg": "" + "CVE-2024-0340": { + "cmt_msg": "vhost: use kzalloc() instead of kmalloc() followed by memset()" }, - "CVE-2020-12769": { - "cmt_msg": "spi: spi-dw: Add lock protect dw_spi rx/tx to prevent concurrent calls" + "CVE-2019-19523": { + "cmt_msg": "USB: adutux: fix use-after-free on disconnect" }, - "CVE-2017-8890": { - "cmt_msg": "dccp/tcp: do not inherit mc_list from parent" + "CVE-2019-11135": { + "cmt_msg": "x86/msr: Add the IA32_TSX_CTRL MSR" }, - "CVE-2022-4662": { - "cmt_msg": "USB: core: Prevent nested device-reset calls" + "CVE-2021-27365": { + "cmt_msg": "scsi: iscsi: Ensure sysfs attributes are limited to PAGE_SIZE" }, - "CVE-2021-32399": { - "cmt_msg": "bluetooth: eliminate the potential race condition when removing the HCI controller" + "CVE-2021-27364": { + "cmt_msg": "scsi: iscsi: Restrict sessions and handles to admin capabilities" }, - "CVE-2021-45868": { - "cmt_msg": "quota: check block number when reading the block in quota file" + "CVE-2021-27363": { + "cmt_msg": "scsi: iscsi: Restrict sessions and handles to admin capabilities" }, - "CVE-2019-12380": { - "cmt_msg": "efi/x86/Add missing error handling to old_memmap 1:1 mapping code" + "CVE-2021-20320": { + "cmt_msg": "s390/bpf: Fix optimizing out zero-extensions" }, - "CVE-2019-12381": { - "cmt_msg": "ip_sockglue: Fix missing-check bug in ip_ra_control()" + "CVE-2021-20321": { + "cmt_msg": "ovl: fix missing negative dentry check in ovl_rename()" }, - "CVE-2019-12382": { - "cmt_msg": "drm/edid: Fix a missing-check bug in drm_load_edid_firmware()" + "CVE-2017-18360": { + "cmt_msg": "USB: serial: io_ti: fix div-by-zero in set_termios" }, - "CVE-2017-10810": { - "cmt_msg": "drm/virtio: don't leak bo on drm_gem_object_init failure" + "CVE-2017-5967": { + "cmt_msg": "time: Remove CONFIG_TIMER_STATS" }, - "CVE-2020-12364": { - "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" + "CVE-2022-3169": { + "cmt_msg": "nvme: ensure subsystem reset is single threaded" }, - "CVE-2019-19543": { - "cmt_msg": "media: serial_ir: Fix use-after-free in serial_ir_init_module" + "CVE-2018-20976": { + "cmt_msg": "xfs: clear sb->s_fs_info on mount failure" }, - "CVE-2017-12146": { - "cmt_msg": "driver core: platform: fix race condition with driver_override" + "CVE-2023-22995": { + "cmt_msg": "usb: dwc3: dwc3-qcom: Add missing platform_device_put() in dwc3_qcom_acpi_register_core" }, - "CVE-2021-3732": { - "cmt_msg": "ovl: prevent private clone if bind mount is not allowed" + "CVE-2021-3542": { + "cmt_msg": "" }, - "CVE-2022-25375": { - "cmt_msg": "usb: gadget: rndis: check size of RNDIS_MSG_SET command" + "CVE-2017-16650": { + "cmt_msg": "net: qmi_wwan: fix divide by 0 on bad descriptors" }, - "CVE-2020-10766": { - "cmt_msg": "x86/speculation: Prevent rogue cross-process SSBD shutdown" + "CVE-2018-12929": { + "cmt_msg": "" }, - "CVE-2017-13166": { - "cmt_msg": "media: v4l2-ioctl.c: use check_fmt for enum/g/s/try_fmt" + "CVE-2018-12928": { + "cmt_msg": "" }, - "CVE-2018-12207": { - "cmt_msg": "kvm: x86, powerpc: do not allow clearing largepages debugfs entry" + "CVE-2020-36310": { + "cmt_msg": "KVM: SVM: avoid infinite loop on NPF from bad address" }, - "CVE-2017-1000364": { - "cmt_msg": "mm: larger stack guard gap, between vmas" + "CVE-2020-36313": { + "cmt_msg": "KVM: Fix out of range accesses to memslots" }, - "CVE-2017-1000365": { - "cmt_msg": "fs/exec.c: account for argv/envp pointers" + "CVE-2020-35519": { + "cmt_msg": "net/x25: prevent a couple of overflows" }, - "CVE-2020-13143": { - "cmt_msg": "USB: gadget: fix illegal array access in binding with UDC" + "CVE-2020-35513": { + "cmt_msg": "nfsd: fix incorrect umasks" }, - "CVE-2023-5178": { - "cmt_msg": "nvmet-tcp: Fix a possible UAF in queue intialization setup" + "CVE-2020-10708": { + "cmt_msg": "" }, - "CVE-2020-10768": { - "cmt_msg": "x86/speculation: PR_SPEC_FORCE_DISABLE enforcement for indirect branches." + "CVE-2018-5344": { + "cmt_msg": "loop: fix concurrent lo_open/lo_release" }, - "CVE-2017-13168": { - "cmt_msg": "scsi: sg: mitigate read/write abuse" + "CVE-2017-12153": { + "cmt_msg": "nl80211: check for the required netlink attributes presence" }, - "CVE-2017-1000363": { - "cmt_msg": "char: lp: fix possible integer overflow in lp_setup()" + "CVE-2017-12154": { + "cmt_msg": "kvm: nVMX: Don't allow L2 to access the hardware CR8" }, - "CVE-2019-0148": { - "cmt_msg": "i40e: Wrong truncation from u16 to u8" + "CVE-2022-21499": { + "cmt_msg": "lockdown: also lock down previous kgdb use" }, - "CVE-2022-2978": { - "cmt_msg": "fs: fix UAF/GPF bug in nilfs_mdt_destroy" + "CVE-2023-20593": { + "cmt_msg": "x86/cpu/amd: Add a Zenbleed fix" }, - "CVE-2019-17075": { - "cmt_msg": "RDMA/cxgb4: Do not dma memory off of the stack" + "CVE-2022-2380": { + "cmt_msg": "video: fbdev: sm712fb: Fix crash in smtcfb_read()" }, - "CVE-2022-3903": { - "cmt_msg": "media: mceusb: Use new usb_control_msg_*() routines" + "CVE-2022-0850": { + "cmt_msg": "ext4: fix kernel infoleak via ext4_extent_header" }, - "CVE-2022-23960": { - "cmt_msg": "ARM: report Spectre v2 status through sysfs" + "CVE-2019-19447": { + "cmt_msg": "ext4: work around deleting a file with i_nlink == 0 safely" }, - "CVE-2023-39189": { - "cmt_msg": "netfilter: nfnetlink_osf: avoid OOB read" + "CVE-2021-3612": { + "cmt_msg": "Input: joydev - prevent potential read overflow in ioctl" }, - "CVE-2019-0146": { - "cmt_msg": "i40e: add num_vectors checker in iwarp handler" + "CVE-2019-19448": { + "cmt_msg": "btrfs: only search for left_info if there is no right_info in try_merge_free_space" }, - "CVE-2019-0147": { - "cmt_msg": "i40e: add num_vectors checker in iwarp handler" + "CVE-2019-19449": { + "cmt_msg": "f2fs: fix to do sanity check on segment/section count" }, - "CVE-2018-20449": { - "cmt_msg": "printk: hash addresses printed with %p" + "CVE-2020-11725": { + "cmt_msg": "" }, - "CVE-2019-0145": { - "cmt_msg": "i40e: add num_vectors checker in iwarp handler" + "CVE-2023-30456": { + "cmt_msg": "KVM: nVMX: add missing consistency checks for CR0 and CR4" }, - "CVE-2017-15299": { - "cmt_msg": "KEYS: don't let add_key() update an uninstantiated key" + "CVE-2021-35477": { + "cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4" }, - "CVE-2022-44034": { - "cmt_msg": "char: pcmcia: remove all the drivers" + "CVE-2024-26758": { + "cmt_msg": "md: Don't ignore suspended array in md_check_recovery()" }, - "CVE-2022-44033": { - "cmt_msg": "char: pcmcia: remove all the drivers" + "CVE-2024-26759": { + "cmt_msg": "mm/swap: fix race when skipping swapcache" }, - "CVE-2019-11191": { - "cmt_msg": "x86: Deprecate a.out support" + "CVE-2022-1729": { + "cmt_msg": "perf: Fix sys_perf_event_open() race against self" }, - "CVE-2023-35001": { - "cmt_msg": "netfilter: nf_tables: prevent OOB access in nft_byteorder_eval" + "CVE-2024-26752": { + "cmt_msg": "l2tp: pass correct message length to ip6_append_data" }, - "CVE-2018-10323": { - "cmt_msg": "xfs: set format back to extents if xfs_bmap_extents_to_btree" + "CVE-2024-26754": { + "cmt_msg": "gtp: fix use-after-free and null-ptr-deref in gtp_genl_dump_pdp()" }, - "CVE-2018-10322": { - "cmt_msg": "xfs: enhance dinode verifier" + "CVE-2024-26756": { + "cmt_msg": "md: Don't register sync_thread for reshape directly" }, - "CVE-2023-1989": { - "cmt_msg": "Bluetooth: btsdio: fix use after free bug in btsdio_remove due to unfinished work" + "CVE-2024-26757": { + "cmt_msg": "md: Don't ignore read-only array in md_check_recovery()" }, - "CVE-2017-8824": { - "cmt_msg": "dccp: CVE-2017-8824: use-after-free in DCCP code" + "CVE-2021-28038": { + "cmt_msg": "Xen/gnttab: handle p2m update errors on a per-slot basis" }, - "CVE-2018-7492": { - "cmt_msg": "rds: Fix NULL pointer dereference in __rds_rdma_map" + "CVE-2020-14305": { + "cmt_msg": "netfilter: helpers: remove data_len usage for inkernel helpers" }, - "CVE-2020-26139": { - "cmt_msg": "mac80211: do not accept/forward invalid EAPOL frames" + "CVE-2022-2964": { + "cmt_msg": "net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup" }, - "CVE-2018-20836": { - "cmt_msg": "scsi: libsas: fix a race condition when smp task timeout" + "CVE-2024-26689": { + "cmt_msg": "ceph: prevent use-after-free in encode_cap_msg()" }, - "CVE-2018-17182": { - "cmt_msg": "mm: get rid of vmacache_flush_all() entirely" + "CVE-2019-9444": { + "cmt_msg": "printk: hash addresses printed with %p" }, - "CVE-2017-13305": { - "cmt_msg": "KEYS: encrypted: fix buffer overread in valid_master_desc()" + "CVE-2022-2961": { + "cmt_msg": "" }, - "CVE-2019-19536": { - "cmt_msg": "can: peak_usb: pcan_usb_pro: Fix info-leaks to USB devices" + "CVE-2024-26686": { + "cmt_msg": "fs/proc: do_task_stat: use sig->stats_lock to gather the threads/children stats" }, - "CVE-2019-19537": { - "cmt_msg": "USB: core: Fix races in character device registration and deregistraion" + "CVE-2024-26687": { + "cmt_msg": "xen/events: close evtchn after mapping cleanup" }, - "CVE-2019-19534": { - "cmt_msg": "can: peak_usb: fix slab info leak" + "CVE-2023-3268": { + "cmt_msg": "relayfs: fix out-of-bounds access in relay_file_read" }, - "CVE-2017-1000370": { - "cmt_msg": "binfmt_elf: use ELF_ET_DYN_BASE only for PIE" + "CVE-2023-45871": { + "cmt_msg": "igb: set max size RX buffer when store bad packet is enabled" }, - "CVE-2019-19532": { - "cmt_msg": "HID: Fix assumption that devices have inputs" + "CVE-2020-12114": { + "cmt_msg": "make struct mountpoint bear the dentry reference to mountpoint, not struct mount" }, - "CVE-2018-14617": { - "cmt_msg": "hfsplus: fix NULL dereference in hfsplus_lookup()" + "CVE-2021-4218": { + "cmt_msg": "sysctl: pass kernel pointers to ->proc_handler" }, - "CVE-2019-10638": { - "cmt_msg": "inet: switch IP ID generator to siphash" + "CVE-2023-0266": { + "cmt_msg": "ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF" }, - "CVE-2019-10639": { - "cmt_msg": "netns: provide pure entropy for net_hash_mix()" + "CVE-2019-10142": { + "cmt_msg": "drivers/virt/fsl_hypervisor.c: prevent integer overflow in ioctl" }, - "CVE-2022-3533": { + "CVE-2023-52640": { + "cmt_msg": "fs/ntfs3: Fix oob in ntfs_listxattr" + }, + "CVE-2023-52641": { + "cmt_msg": "fs/ntfs3: Add NULL ptr dereference checking at the end of attr_allocate_frame()" + }, + "CVE-2021-0399": { "cmt_msg": "" }, - "CVE-2021-0929": { - "cmt_msg": "staging/android/ion: delete dma_buf->kmap/unmap implemenation" + "CVE-2023-52488": { + "cmt_msg": "serial: sc16is7xx: convert from _raw_ to _noinc_ regmap functions for FIFO" }, - "CVE-2019-11478": { - "cmt_msg": "tcp: tcp_fragment() should apply sane memory limits" + "CVE-2023-52489": { + "cmt_msg": "mm/sparsemem: fix race in accessing memory_section->usage" }, - "CVE-2019-20095": { - "cmt_msg": "mwifiex: Fix mem leak in mwifiex_tm_cmd" + "CVE-2023-52484": { + "cmt_msg": "iommu/arm-smmu-v3: Fix soft lockup triggered by arm_smmu_mm_invalidate_range" }, - "CVE-2018-19985": { - "cmt_msg": "USB: hso: Fix OOB memory access in hso_probe/hso_get_config_data" + "CVE-2020-2732": { + "cmt_msg": "KVM: nVMX: Don't emulate instructions in guest mode" }, - "CVE-2018-6554": { - "cmt_msg": "staging: irda: remove the irda network stack and drivers" + "CVE-2023-52486": { + "cmt_msg": "drm: Don't unref the same fb many times by mistake due to deadlock handling" }, - "CVE-2017-18257": { - "cmt_msg": "f2fs: fix a dead loop in f2fs_fiemap()" + "CVE-2023-52480": { + "cmt_msg": "ksmbd: fix race condition between session lookup and expire" }, - "CVE-2023-6546": { - "cmt_msg": "tty: n_gsm: fix the UAF caused by race condition in gsm_cleanup_mux" + "CVE-2023-52481": { + "cmt_msg": "arm64: errata: Add Cortex-A520 speculative unprivileged load workaround" }, - "CVE-2017-18255": { - "cmt_msg": "perf/core: Fix the perf_cpu_time_max_percent check" + "CVE-2023-52482": { + "cmt_msg": "x86/srso: Add SRSO mitigation for Hygon processors" }, - "CVE-2018-5953": { - "cmt_msg": "printk: hash addresses printed with %p" + "CVE-2023-4128": { + "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free" }, - "CVE-2024-26587": { - "cmt_msg": "net: netdevsim: don't try to destroy PHC on VFs" + "CVE-2021-47128": { + "cmt_msg": "bpf, lockdown, audit: Fix buggy SELinux lockdown permission checks" }, - "CVE-2023-51043": { - "cmt_msg": "drm/atomic: Fix potential use-after-free in nonblocking commits" + "CVE-2018-17182": { + "cmt_msg": "mm: get rid of vmacache_flush_all() entirely" }, - "CVE-2020-28374": { - "cmt_msg": "scsi: target: Fix XCOPY NAA identifier lookup" + "CVE-2021-47122": { + "cmt_msg": "net: caif: fix memory leak in caif_device_notify" }, - "CVE-2019-9213": { - "cmt_msg": "mm: enforce min addr even if capable() in expand_downwards()" + "CVE-2021-47121": { + "cmt_msg": "net: caif: fix memory leak in cfusbl_device_notify" }, - "CVE-2023-2007": { - "cmt_msg": "scsi: dpt_i2o: Remove obsolete driver" + "CVE-2021-47125": { + "cmt_msg": "sch_htb: fix refcount leak in htb_parent_to_leaf_offload" }, - "CVE-2023-0615": { - "cmt_msg": "media: vivid: dev->bitmap_cap wasn't freed in all cases" + "CVE-2021-47124": { + "cmt_msg": "io_uring: fix link timeout refs" }, - "CVE-2020-26557": { - "cmt_msg": "" + "CVE-2019-15118": { + "cmt_msg": "ALSA: usb-audio: Fix a stack buffer overflow bug in check_input_term" }, - "CVE-2017-16535": { - "cmt_msg": "USB: core: fix out-of-bounds access bug in usb_get_bos_descriptor()" + "CVE-2019-12818": { + "cmt_msg": "net: nfc: Fix NULL dereference on nfc_llcp_build_tlv fails" }, - "CVE-2017-16534": { - "cmt_msg": "USB: core: harden cdc_parse_cdc_header" + "CVE-2019-12819": { + "cmt_msg": "mdio_bus: Fix use-after-free on device_register fails" }, - "CVE-2017-16537": { - "cmt_msg": "media: imon: Fix null-ptr-deref in imon_probe" + "CVE-2023-0394": { + "cmt_msg": "ipv6: raw: Deduct extension header length in rawv6_push_pending_frames" }, - "CVE-2017-16536": { - "cmt_msg": "[media] cx231xx-cards: fix NULL-deref on missing association descriptor" + "CVE-2019-19332": { + "cmt_msg": "KVM: x86: fix out-of-bounds write in KVM_GET_EMULATED_CPUID (CVE-2019-19332)" }, - "CVE-2017-16531": { - "cmt_msg": "USB: fix out-of-bounds in usb_set_configuration" + "CVE-2019-15117": { + "cmt_msg": "ALSA: usb-audio: Fix an OOB bug in parse_audio_mixer_unit" }, - "CVE-2017-16530": { - "cmt_msg": "USB: uas: fix bug in handling of alternate settings" + "CVE-2022-25258": { + "cmt_msg": "USB: gadget: validate interface OS descriptor requests" }, - "CVE-2017-16533": { - "cmt_msg": "HID: usbhid: fix out-of-bounds bug" + "CVE-2020-3702": { + "cmt_msg": "ath: Use safer key clearing with key cache entries" }, - "CVE-2017-16532": { - "cmt_msg": "usb: usbtest: fix NULL pointer dereference" + "CVE-2023-3117": { + "cmt_msg": "netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE" }, - "CVE-2024-26592": { - "cmt_msg": "ksmbd: fix UAF issue in ksmbd_tcp_new_connection()" + "CVE-2023-3111": { + "cmt_msg": "btrfs: unset reloc control if transaction commit fails in prepare_to_relocate()" }, - "CVE-2022-43750": { - "cmt_msg": "usb: mon: make mmapped memory read only" + "CVE-2019-3882": { + "cmt_msg": "vfio/type1: Limit DMA mappings per container" }, - "CVE-2017-16538": { - "cmt_msg": "media: dvb-usb-v2: lmedm04: Improve logic checking of warm start" + "CVE-2024-24861": { + "cmt_msg": "media: xc4000: Fix atomicity violation in xc4000_get_frequency" }, - "CVE-2023-3006": { - "cmt_msg": "arm64: Add AMPERE1 to the Spectre-BHB affected list" + "CVE-2019-18675": { + "cmt_msg": "mmap: introduce sane default mmap limits" }, - "CVE-2020-27825": { - "cmt_msg": "tracing: Fix race in trace_open and buffer resize call" + "CVE-2024-24864": { + "cmt_msg": "" }, - "CVE-2019-2181": { - "cmt_msg": "binder: check for overflow when alloc for security context" + "CVE-2017-9605": { + "cmt_msg": "drm/vmwgfx: Make sure backup_handle is always valid" }, - "CVE-2019-2182": { - "cmt_msg": "arm64: Enforce BBM for huge IO/VMAP mappings" + "CVE-2021-47013": { + "cmt_msg": "net:emac/emac-mac: Fix a use after free in emac_mac_tx_buf_send" }, - "CVE-2020-27820": { - "cmt_msg": "drm/nouveau: use drm_dev_unplug() during device removal" + "CVE-2017-16647": { + "cmt_msg": "net: usb: asix: fill null-ptr-deref in asix_suspend" }, - "CVE-2017-18222": { - "cmt_msg": "net: hns: fix ethtool_get_strings overflow in hns driver" + "CVE-2022-36946": { + "cmt_msg": "netfilter: nf_queue: do not allow packet truncation below transport header offset" }, - "CVE-2017-18221": { - "cmt_msg": "mlock: fix mlock count can not decrease in race condition" + "CVE-2018-19824": { + "cmt_msg": "ALSA: usb-audio: Fix UAF decrement if card has no live interfaces in card.c" }, - "CVE-2023-4622": { - "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES" + "CVE-2022-21166": { + "cmt_msg": "x86/speculation/mmio: Enable CPU Fill buffer clearing on idle" }, - "CVE-2019-20794": { - "cmt_msg": "" + "CVE-2021-29650": { + "cmt_msg": "netfilter: x_tables: Use correct memory barriers." }, - "CVE-2023-39193": { - "cmt_msg": "netfilter: xt_sctp: validate the flag_info count" + "CVE-2018-20169": { + "cmt_msg": "USB: check usb_get_extra_descriptor for proper size" }, - "CVE-2017-18224": { - "cmt_msg": "ocfs2: ip_alloc_sem should be taken in ocfs2_get_block()" + "CVE-2022-28356": { + "cmt_msg": "llc: fix netdevice reference leaks in llc_ui_bind()" }, - "CVE-2020-26541": { - "cmt_msg": "certs: Add EFI_CERT_X509_GUID support for dbx entries" + "CVE-2018-5750": { + "cmt_msg": "ACPI: sbshc: remove raw pointer from printk() message" }, - "CVE-2023-6610": { - "cmt_msg": "smb: client: fix potential OOB in smb2_dump_detail()" + "CVE-2017-7558": { + "cmt_msg": "sctp: Avoid out-of-bounds reads from address storage" }, - "CVE-2020-26559": { - "cmt_msg": "" + "CVE-2022-20166": { + "cmt_msg": "drivers core: Use sysfs_emit and sysfs_emit_at for show(device *...) functions" }, - "CVE-2020-27673": { - "cmt_msg": "xen/events: add a proper barrier to 2-level uevent unmasking" + "CVE-2019-10220": { + "cmt_msg": "Convert filldir[64]() from __put_user() to unsafe_put_user()" }, - "CVE-2021-43389": { - "cmt_msg": "isdn: cpai: check ctr->cnr to avoid array index out of bound" + "CVE-2021-44879": { + "cmt_msg": "f2fs: fix to do sanity check on inode type during garbage collection" }, - "CVE-2017-14156": { - "cmt_msg": "video: fbdev: aty: do not leak uninitialized padding in clk to userspace" + "CVE-2020-9383": { + "cmt_msg": "floppy: check FDC index for errors before assigning it" }, - "CVE-2021-33061": { - "cmt_msg": "ixgbe: add improvement for MDD response functionality" + "CVE-2023-1513": { + "cmt_msg": "kvm: initialize all of the kvm_debugregs structure before sending it to userspace" }, - "CVE-2018-1092": { - "cmt_msg": "ext4: fail ext4_iget for root directory if unallocated" + "CVE-2021-26401": { + "cmt_msg": "x86/speculation: Use generic retpoline by default on AMD" }, - "CVE-2018-1093": { - "cmt_msg": "ext4: add validity checks for bitmap block numbers" + "CVE-2021-3847": { + "cmt_msg": "" }, - "CVE-2017-18551": { - "cmt_msg": "i2c: core-smbus: prevent stack corruption on read I2C_BLOCK_DATA" + "CVE-2019-9445": { + "cmt_msg": "f2fs: check if file namelen exceeds max value" }, - "CVE-2023-1074": { - "cmt_msg": "sctp: fail if no bound addresses can be used for a given scope" + "CVE-2019-20934": { + "cmt_msg": "sched/fair: Don't free p->numa_faults with concurrent readers" }, - "CVE-2017-18552": { - "cmt_msg": "RDS: validate the requested traces user input against max supported" + "CVE-2011-4916": { + "cmt_msg": "" }, - "CVE-2021-26931": { - "cmt_msg": "xen-blkback: don't \"handle\" error by BUG()" + "CVE-2023-23039": { + "cmt_msg": "" }, - "CVE-2024-26584": { - "cmt_msg": "net: tls: handle backlogging of crypto requests" + "CVE-2017-16646": { + "cmt_msg": "media: dib0700: fix invalid dvb_detach argument" }, - "CVE-2021-4203": { - "cmt_msg": "af_unix: fix races in sk_peer_pid and sk_peer_cred accesses" + "CVE-2017-16645": { + "cmt_msg": "Input: ims-psu - check if CDC union descriptor is sane" }, - "CVE-2023-4623": { - "cmt_msg": "net/sched: sch_hfsc: Ensure inner classes have fsc curve" + "CVE-2017-16644": { + "cmt_msg": "media: hdpvr: Fix an error handling path in hdpvr_probe()" }, - "CVE-2020-29568": { - "cmt_msg": "xen/xenbus: Allow watches discard events before queueing" + "CVE-2017-16643": { + "cmt_msg": "Input: gtco - fix potential out-of-bound access" }, - "CVE-2018-18559": { - "cmt_msg": "net/packet: fix a race in packet_bind() and packet_notifier()" + "CVE-2019-5489": { + "cmt_msg": "Change mincore() to count \"mapped\" pages rather than \"cached\" pages" }, - "CVE-2019-9457": { - "cmt_msg": "exec: Limit arg stack to at most 75% of _STK_LIM" + "CVE-2017-16649": { + "cmt_msg": "net: cdc_ether: fix divide by 0 on bad descriptors" }, - "CVE-2019-19054": { - "cmt_msg": "media: rc: prevent memory leak in cx23888_ir_probe" + "CVE-2017-16648": { + "cmt_msg": "dvb_frontend: don't use-after-free the frontend struct" }, - "CVE-2019-19057": { - "cmt_msg": "mwifiex: pcie: Fix memory leak in mwifiex_pcie_init_evt_ring" + "CVE-2020-36322": { + "cmt_msg": "fuse: fix bad inode" }, - "CVE-2019-19056": { - "cmt_msg": "mwifiex: pcie: Fix memory leak in mwifiex_pcie_alloc_cmdrsp_buf" + "CVE-2020-10711": { + "cmt_msg": "netlabel: cope with NULL catmap" }, - "CVE-2019-9453": { - "cmt_msg": "f2fs: fix to avoid accessing xattr across the boundary" + "CVE-2020-35508": { + "cmt_msg": "fork: fix copy_process(CLONE_PARENT) race with the exiting ->real_parent" }, - "CVE-2023-23039": { + "CVE-2020-35501": { "cmt_msg": "" }, - "CVE-2019-19052": { - "cmt_msg": "can: gs_usb: gs_can_open(): prevent memory leak" + "CVE-2021-45095": { + "cmt_msg": "phonet: refcount leak in pep_sock_accep" }, - "CVE-2019-3846": { - "cmt_msg": "mwifiex: Fix possible buffer overflows at parsing bss descriptor" + "CVE-2024-26685": { + "cmt_msg": "nilfs2: fix potential bug in end_buffer_async_write" }, - "CVE-2023-46838": { - "cmt_msg": "xen-netback: don't produce zero-size SKB frags" + "CVE-2021-32399": { + "cmt_msg": "bluetooth: eliminate the potential race condition when removing the HCI controller" }, - "CVE-2020-0427": { - "cmt_msg": "pinctrl: devicetree: Avoid taking direct reference to device name string" + "CVE-2017-1000410": { + "cmt_msg": "Bluetooth: Prevent stack info leak from the EFS element." }, - "CVE-2019-19227": { - "cmt_msg": "appletalk: Fix potential NULL pointer dereference in unregister_snap_client" + "CVE-2022-32250": { + "cmt_msg": "netfilter: nf_tables: disallow non-stateful expression in sets earlier" }, - "CVE-2019-19058": { - "cmt_msg": "iwlwifi: dbg_ini: fix memory leak in alloc_sgtable" + "CVE-2021-28688": { + "cmt_msg": "xen-blkback: don't leak persistent grants from xen_blkbk_map()" }, - "CVE-2019-9458": { - "cmt_msg": "media: v4l: event: Prevent freeing event subscriptions while accessed" + "CVE-2018-10878": { + "cmt_msg": "ext4: always check block group bounds in ext4_init_block_bitmap()" }, - "CVE-2021-39714": { - "cmt_msg": "staging: android: ion: Drop ion_map_kernel interface" + "CVE-2019-12379": { + "cmt_msg": "consolemap: Fix a memory leaking bug in drivers/tty/vt/consolemap.c" }, - "CVE-2023-39197": { - "cmt_msg": "netfilter: conntrack: dccp: copy entire header to stack buffer, not just basic one" + "CVE-2019-12378": { + "cmt_msg": "ipv6_sockglue: Fix a missing-check bug in ip6_ra_control()" }, - "CVE-2017-9242": { - "cmt_msg": "ipv6: fix out of bound writes in __ip6_append_data()" + "CVE-2017-18379": { + "cmt_msg": "nvmet-fc: ensure target queue id within range." }, - "CVE-2016-8660": { - "cmt_msg": "" + "CVE-2020-26145": { + "cmt_msg": "ath10k: drop fragments with multicast DA for PCIe" }, - "CVE-2020-14314": { - "cmt_msg": "ext4: fix potential negative array index in do_split()" + "CVE-2017-13216": { + "cmt_msg": "staging: android: ashmem: fix a race condition in ASHMEM_SET_SIZE ioctl" }, - "CVE-2023-3090": { - "cmt_msg": "ipvlan:Fix out-of-bounds caused by unclear skb->cb" + "CVE-2020-26147": { + "cmt_msg": "mac80211: assure all fragments are encrypted" }, - "CVE-2019-13272": { - "cmt_msg": "ptrace: Fix ->ptracer_cred handling for PTRACE_TRACEME" + "CVE-2020-26141": { + "cmt_msg": "ath10k: Fix TKIP Michael MIC verification for PCIe" }, - "CVE-2021-3587": { - "cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect" + "CVE-2020-26140": { + "cmt_msg": "" }, - "CVE-2023-45862": { - "cmt_msg": "USB: ene_usb6250: Allocate enough memory for full object" + "CVE-2020-26143": { + "cmt_msg": "" }, - "CVE-2023-45863": { - "cmt_msg": "kobject: Fix slab-out-of-bounds in fill_kobj_path()" + "CVE-2020-26142": { + "cmt_msg": "" }, - "CVE-2023-1582": { - "cmt_msg": "fs/proc: task_mmu.c: don't read mapcount for migration entry" + "CVE-2019-17053": { + "cmt_msg": "ieee802154: enforce CAP_NET_RAW for raw sockets" }, - "CVE-2017-15537": { - "cmt_msg": "x86/fpu: Don't let userspace set bogus xcomp_bv" + "CVE-2019-17052": { + "cmt_msg": "ax25: enforce CAP_NET_RAW for raw sockets" }, - "CVE-2022-2588": { - "cmt_msg": "net_sched: cls_route: remove from list when handle is 0" + "CVE-2017-14497": { + "cmt_msg": "packet: Don't write vnet header beyond end of buffer" }, - "CVE-2019-17351": { - "cmt_msg": "xen: let alloc_xenballooned_pages() fail if not enough memory free" + "CVE-2019-17056": { + "cmt_msg": "nfc: enforce CAP_NET_RAW for raw sockets" }, - "CVE-2022-23222": { - "cmt_msg": "bpf: Replace PTR_TO_XXX_OR_NULL with PTR_TO_XXX | PTR_MAYBE_NULL" + "CVE-2019-17055": { + "cmt_msg": "mISDN: enforce CAP_NET_RAW for raw sockets" }, - "CVE-2020-25669": { - "cmt_msg": "Input: sunkbd - avoid use-after-free in teardown paths" + "CVE-2019-17054": { + "cmt_msg": "appletalk: enforce CAP_NET_RAW for raw sockets" }, - "CVE-2020-25668": { - "cmt_msg": "tty: make FONTX ioctl use the tty pointer they were actually passed" + "CVE-2024-26745": { + "cmt_msg": "powerpc/pseries/iommu: IOMMU table is not initialized for kdump over SR-IOV" }, - "CVE-2008-4609": { - "cmt_msg": "" + "CVE-2024-26744": { + "cmt_msg": "RDMA/srpt: Support specifying the srpt_service_guid parameter" }, - "CVE-2020-25705": { - "cmt_msg": "icmp: randomize the global rate limiter" + "CVE-2024-26743": { + "cmt_msg": "RDMA/qedr: Fix qedr_create_user_qp error flow" }, - "CVE-2023-52458": { - "cmt_msg": "block: add check that partition length needs to be aligned with block size" + "CVE-2024-26740": { + "cmt_msg": "net/sched: act_mirred: use the backlog for mirred ingress" }, - "CVE-2023-40283": { - "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb" + "CVE-2020-29661": { + "cmt_msg": "tty: Fix ->pgrp locking in tiocspgrp()" }, - "CVE-2022-0435": { - "cmt_msg": "tipc: improve size validations for received domain records" + "CVE-2020-29660": { + "cmt_msg": "tty: Fix ->session locking" }, - "CVE-2022-20565": { - "cmt_msg": "HID: core: Correctly handle ReportSize being zero" + "CVE-2022-1734": { + "cmt_msg": "nfc: nfcmrvl: main: reorder destructive operations in nfcmrvl_nci_unregister_dev to avoid bugs" }, - "CVE-2022-1419": { - "cmt_msg": "drm/vgem: Close use-after-free race in vgem_gem_create" + "CVE-2024-26748": { + "cmt_msg": "usb: cdns3: fix memory double free when handle zero packet" }, - "CVE-2018-20854": { - "cmt_msg": "phy: ocelot-serdes: fix out-of-bounds read" + "CVE-2023-28772": { + "cmt_msg": "seq_buf: Fix overflow in seq_buf_putmem_hex()" }, - "CVE-2018-25020": { - "cmt_msg": "bpf: fix truncated jump targets on heavy expansions" + "CVE-2024-26699": { + "cmt_msg": "drm/amd/display: Fix array-index-out-of-bounds in dcn35_clkmgr" }, - "CVE-2018-5390": { - "cmt_msg": "tcp: free batches of packets in tcp_prune_ofo_queue()" + "CVE-2024-26691": { + "cmt_msg": "KVM: arm64: Fix circular locking dependency" }, - "CVE-2023-26607": { - "cmt_msg": "ntfs: fix out-of-bounds read in ntfs_attr_find()" - }, - "CVE-2018-20855": { - "cmt_msg": "IB/mlx5: Fix leaking stack memory to userspace" + "CVE-2022-4269": { + "cmt_msg": "act_mirred: use the backlog for nested calls to mirred ingress" }, - "CVE-2019-15239": { - "cmt_msg": "" + "CVE-2024-26697": { + "cmt_msg": "nilfs2: fix data corruption in dsync block recovery for small block sizes" }, - "CVE-2022-3534": { - "cmt_msg": "libbpf: Fix use-after-free in btf_dump_name_dups" + "CVE-2024-26696": { + "cmt_msg": "nilfs2: fix hang in nilfs_lookup_dirty_data_buffers()" }, - "CVE-2017-15129": { - "cmt_msg": "net: Fix double free and memory corruption in get_net_ns_by_id()" + "CVE-2019-15924": { + "cmt_msg": "fm10k: Fix a potential NULL pointer dereference" }, - "CVE-2021-4037": { - "cmt_msg": "xfs: fix up non-directory creation in SGID directories" + "CVE-2019-15927": { + "cmt_msg": "ALSA: usb-audio: Avoid access before bLength check in build_audio_procunit()" }, - "CVE-2021-22543": { - "cmt_msg": "KVM: do not allow mapping valid but non-reference-counted pages" + "CVE-2019-15926": { + "cmt_msg": "ath6kl: add some bounds checking" }, - "CVE-2022-45884": { - "cmt_msg": "" + "CVE-2019-15921": { + "cmt_msg": "genetlink: Fix a memory leak on error path" }, - "CVE-2021-3348": { - "cmt_msg": "nbd: freeze the queue while we're adding connections" + "CVE-2021-38160": { + "cmt_msg": "virtio_console: Assure used length from device is limited" }, - "CVE-2019-1999": { - "cmt_msg": "binder: fix race between munmap() and direct reclaim" + "CVE-2019-15219": { + "cmt_msg": "USB: sisusbvga: fix oops in error path of sisusb_probe" }, - "CVE-2018-1065": { - "cmt_msg": "netfilter: add back stackpointer size checks" + "CVE-2019-15218": { + "cmt_msg": "media: usb: siano: Fix general protection fault in smsusb" }, - "CVE-2023-20941": { + "CVE-2005-3660": { "cmt_msg": "" }, - "CVE-2018-1066": { - "cmt_msg": "CIFS: Enable encryption during session setup phase" - }, - "CVE-2017-12188": { - "cmt_msg": "KVM: nVMX: update last_nonleaf_level when initializing nested EPT" - }, - "CVE-2018-1068": { - "cmt_msg": "netfilter: ebtables: CONFIG_COMPAT: don't trust userland offsets" - }, - "CVE-2017-17053": { - "cmt_msg": "x86/mm: Fix use-after-free of ldt_struct" - }, - "CVE-2017-17052": { - "cmt_msg": "fork: fix incorrect fput of ->exe_file causing use-after-free" - }, - "CVE-2021-4197": { - "cmt_msg": "cgroup: Use open-time credentials for process migraton perm checks" - }, - "CVE-2020-10135": { - "cmt_msg": "Bluetooth: Consolidate encryption handling in hci_encrypt_cfm" - }, - "CVE-2020-25285": { - "cmt_msg": "mm/hugetlb: fix a race between hugetlb sysctl handlers" - }, - "CVE-2019-7308": { - "cmt_msg": "bpf: fix sanitation of alu op with pointer / scalar type from different paths" - }, - "CVE-2018-1000199": { - "cmt_msg": "perf/hwbp: Simplify the perf-hwbp code, fix documentation" + "CVE-2017-14106": { + "cmt_msg": "tcp: initialize rcv_mss to TCP_MIN_MSS instead of 0" }, - "CVE-2022-1966": { - "cmt_msg": "netfilter: nf_tables: disallow non-stateful expression in sets earlier" + "CVE-2019-15212": { + "cmt_msg": "USB: rio500: refuse more than one device at a time" }, - "CVE-2023-31084": { - "cmt_msg": "media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*()" + "CVE-2019-15211": { + "cmt_msg": "media: radio-raremono: change devm_k*alloc to k*alloc" }, - "CVE-2017-9986": { - "cmt_msg": "sound: Retire OSS" + "CVE-2019-15217": { + "cmt_msg": "media: usb:zr364xx:Fix KASAN:null-ptr-deref Read in zr364xx_vidioc_querycap" }, - "CVE-2017-9985": { - "cmt_msg": "ALSA: msnd: Optimize / harden DSP and MIDI loops" + "CVE-2019-15216": { + "cmt_msg": "USB: yurex: Fix protection fault after device removal" }, - "CVE-2017-9984": { - "cmt_msg": "ALSA: msnd: Optimize / harden DSP and MIDI loops" + "CVE-2017-1000380": { + "cmt_msg": "ALSA: timer: Fix race between read and ioctl" }, - "CVE-2019-16995": { - "cmt_msg": "net: hsr: fix memory leak in hsr_dev_finalize()" + "CVE-2019-15214": { + "cmt_msg": "ALSA: core: Fix card races between register and disconnect" }, - "CVE-2017-18075": { - "cmt_msg": "crypto: pcrypt - fix freeing pcrypt instances" + "CVE-2019-19922": { + "cmt_msg": "sched/fair: Fix low cpu usage with high throttling by removing expiration of cpu-local slices" }, - "CVE-2017-9059": { - "cmt_msg": "NFSv4: Fix callback server shutdown" + "CVE-2019-19927": { + "cmt_msg": "drm/ttm: fix incrementing the page pointer for huge pages" }, - "CVE-2023-34256": { - "cmt_msg": "ext4: avoid a potential slab-out-of-bounds in ext4_group_desc_csum" + "CVE-2017-11176": { + "cmt_msg": "mqueue: fix a use-after-free in sys_mq_notify()" }, - "CVE-2020-36516": { - "cmt_msg": "ipv4: avoid using shared IP generator for connected sockets" + "CVE-2023-52498": { + "cmt_msg": "PM: sleep: Fix possible deadlocks in core system-wide PM code" }, - "CVE-2020-36766": { - "cmt_msg": "cec-api: prevent leaking memory through hole in structure" + "CVE-2022-2318": { + "cmt_msg": "net: rose: fix UAF bugs caused by timer handler" }, - "CVE-2017-18079": { - "cmt_msg": "Input: i8042 - fix crash at boot time" + "CVE-2023-3611": { + "cmt_msg": "net/sched: sch_qfq: account for stab overhead in qfq_enqueue" }, - "CVE-2023-28328": { - "cmt_msg": "media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer()" + "CVE-2023-4132": { + "cmt_msg": "media: usb: siano: Fix warning due to null work_func_t function pointer" }, - "CVE-2023-0386": { - "cmt_msg": "ovl: fail on invalid uid/gid mapping at copy up" + "CVE-2020-26560": { + "cmt_msg": "" }, - "CVE-2023-6121": { - "cmt_msg": "nvmet: nul-terminate the NQNs passed in the connect command" + "CVE-2023-4134": { + "cmt_msg": "Input: cyttsp4_core - change del_timer_sync() to timer_shutdown_sync()" }, - "CVE-2017-13693": { - "cmt_msg": "" + "CVE-2017-9077": { + "cmt_msg": "ipv6/dccp: do not inherit ipv6_mc_list from parent" }, - "CVE-2022-0617": { - "cmt_msg": "udf: Fix NULL ptr deref when converting from inline format" + "CVE-2017-9076": { + "cmt_msg": "ipv6/dccp: do not inherit ipv6_mc_list from parent" }, - "CVE-2017-13695": { - "cmt_msg": "ACPICA: acpi: acpica: fix acpi operand cache leak in nseval.c" + "CVE-2017-9075": { + "cmt_msg": "sctp: do not inherit ipv6_{mc|ac|fl}_list from parent" }, - "CVE-2017-13694": { - "cmt_msg": "" + "CVE-2017-9074": { + "cmt_msg": "ipv6: Prevent overrun when parsing v6 header options" }, - "CVE-2021-4149": { - "cmt_msg": "btrfs: unlock newly allocated extent buffer after error" + "CVE-2022-20572": { + "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag" }, - "CVE-2022-21385": { - "cmt_msg": "net/rds: fix warn in rds_message_alloc_sgs" + "CVE-2022-42703": { + "cmt_msg": "mm/rmap: Fix anon_vma->degree ambiguity leading to double-reuse" }, - "CVE-2021-3864": { - "cmt_msg": "" + "CVE-2021-4083": { + "cmt_msg": "fget: check that the fd still exists after getting a ref to it" }, - "CVE-2021-3640": { - "cmt_msg": "Bluetooth: sco: Fix lock_sock() blockage by memcpy_from_msg()" + "CVE-2023-33288": { + "cmt_msg": "power: supply: bq24190: Fix use after free bug in bq24190_remove due to race condition" }, - "CVE-2020-1749": { - "cmt_msg": "net: ipv6_stub: use ip6_dst_lookup_flow instead of ip6_dst_lookup" + "CVE-2017-1000251": { + "cmt_msg": "Bluetooth: Properly check L2CAP config option output buffer length" }, - "CVE-2022-42896": { - "cmt_msg": "Bluetooth: L2CAP: Fix accepting connection request for invalid SPSM" + "CVE-2017-1000252": { + "cmt_msg": "KVM: VMX: Do not BUG() on out-of-bounds guest IRQ" }, - "CVE-2021-3760": { - "cmt_msg": "nfc: nci: fix the UAF of rf_conn_info object" + "CVE-2022-29901": { + "cmt_msg": "x86/kvm/vmx: Make noinstr clean" }, - "CVE-2022-36123": { - "cmt_msg": "x86: Clear .brk area at early boot" + "CVE-2017-1000255": { + "cmt_msg": "powerpc/64s: Use emergency stack for kernel TM Bad Thing program checks" }, - "CVE-2020-11608": { - "cmt_msg": "media: ov519: add missing endpoint sanity checks" + "CVE-2023-52485": { + "cmt_msg": "drm/amd/display: Wake DMCUB before sending a command" }, - "CVE-2020-10732": { - "cmt_msg": "fs/binfmt_elf.c: allocate initialized memory in fill_thread_core_info()" + "CVE-2018-20511": { + "cmt_msg": "net/appletalk: fix minor pointer leak to userspace in SIOCFINDIPDDPRT" }, - "CVE-2020-28097": { - "cmt_msg": "vgacon: remove software scrollback support" + "CVE-2018-20510": { + "cmt_msg": "binder: replace \"%p\" with \"%pK\"" }, - "CVE-2017-18216": { - "cmt_msg": "ocfs2: subsystem.su_mutex is required while accessing the item->ci_parent" + "CVE-2022-3567": { + "cmt_msg": "ipv6: Fix data races around sk->sk_prot." }, - "CVE-2017-1000112": { - "cmt_msg": "udp: consistently apply ufo or fragmentation" + "CVE-2022-3566": { + "cmt_msg": "tcp: Fix data races around icsk->icsk_af_ops." }, - "CVE-2017-1000111": { - "cmt_msg": "packet: fix tp_reserve race in packet_set_ring" + "CVE-2022-3565": { + "cmt_msg": "mISDN: fix use-after-free bugs in l1oip timer handlers" }, - "CVE-2024-24855": { - "cmt_msg": "scsi: lpfc: Fix a possible data race in lpfc_unregister_fcf_rescan()" + "CVE-2022-3564": { + "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free caused by l2cap_reassemble_sdu" }, - "CVE-2017-18218": { - "cmt_msg": "net: hns: Fix a skb used after free bug" + "CVE-2018-7480": { + "cmt_msg": "blkcg: fix double free of new_blkg in blkcg_init_queue" }, - "CVE-2017-7533": { - "cmt_msg": "dentry name snapshots" + "CVE-2023-0030": { + "cmt_msg": "drm/nouveau/mmu: add more general vmm free/node handling functions" }, - "CVE-2018-8897": { - "cmt_msg": "x86/entry/64: Don't use IST entry for #BP stack" + "CVE-2019-11599": { + "cmt_msg": "coredump: fix race condition between mmget_not_zero()/get_task_mm() and core dumping" }, - "CVE-2021-29265": { - "cmt_msg": "usbip: fix stub_dev usbip_sockfd_store() races leading to gpf" + "CVE-2019-2101": { + "cmt_msg": "media: uvcvideo: Fix 'type' check leading to overflow" }, - "CVE-2021-39648": { - "cmt_msg": "usb: gadget: configfs: Fix use-after-free issue with udc_name" + "CVE-2019-3459": { + "cmt_msg": "Bluetooth: Verify that l2cap_get_conf_opt provides large enough buffer" }, - "CVE-2022-3545": { - "cmt_msg": "nfp: fix use-after-free in area_cache_get()" + "CVE-2020-0444": { + "cmt_msg": "audit: fix error handling in audit_data_to_entry()" }, - "CVE-2022-3542": { - "cmt_msg": "bnx2x: fix potential memory leak in bnx2x_tpa_stop()" + "CVE-2017-16526": { + "cmt_msg": "uwb: properly check kthread_run return value" }, - "CVE-2020-14416": { - "cmt_msg": "can, slip: Protect tty->disc_data in write_wakeup and close with RCU" + "CVE-2017-16527": { + "cmt_msg": "ALSA: usb-audio: Kill stray URB at exiting" }, - "CVE-2019-0136": { - "cmt_msg": "mac80211: drop robust management frames from unknown TA" + "CVE-2017-16525": { + "cmt_msg": "USB: serial: console: fix use-after-free after failed setup" }, - "CVE-2017-17975": { - "cmt_msg": "media: usbtv: prevent double free in error case" + "CVE-2022-1836": { + "cmt_msg": "floppy: disable FDRAWCMD by default" }, - "CVE-2019-16921": { - "cmt_msg": "RDMA/hns: Fix init resp when alloc ucontext" + "CVE-2017-16528": { + "cmt_msg": "ALSA: seq: Cancel pending autoload work at unbinding device" }, - "CVE-2019-19377": { - "cmt_msg": "btrfs: Don't submit any btree write bio if the fs has errors" + "CVE-2017-16529": { + "cmt_msg": "ALSA: usb-audio: Check out-of-bounds access by corrupted buffer descriptor" }, - "CVE-2021-21781": { - "cmt_msg": "ARM: ensure the signal page contains defined contents" + "CVE-2019-2215": { + "cmt_msg": "ANDROID: binder: remove waitqueue when thread exits." }, - "CVE-2021-0512": { - "cmt_msg": "HID: make arrays usage and value to be the same" + "CVE-2019-2213": { + "cmt_msg": "binder: fix possible UAF when freeing buffer" }, - "CVE-2018-14634": { - "cmt_msg": "exec: Limit arg stack to at most 75% of _STK_LIM" + "CVE-2018-1087": { + "cmt_msg": "kvm/x86: fix icebp instruction handling" }, - "CVE-2018-14633": { - "cmt_msg": "scsi: target: iscsi: Use hex2bin instead of a re-implementation" + "CVE-2017-8065": { + "cmt_msg": "crypto: ccm - move cbcmac input off the stack" }, - "CVE-2018-12896": { - "cmt_msg": "posix-timers: Sanitize overrun handling" + "CVE-2019-19049": { + "cmt_msg": "of: unittest: fix memory leak in unittest_data_add" }, - "CVE-2023-1382": { - "cmt_msg": "tipc: set con sock in tipc_conn_alloc" + "CVE-2018-13053": { + "cmt_msg": "alarmtimer: Prevent overflow for relative nanosleep" }, - "CVE-2019-19073": { - "cmt_msg": "ath9k_htc: release allocated buffer if timed out" + "CVE-2023-23559": { + "cmt_msg": "wifi: rndis_wlan: Prevent buffer overflow in rndis_query_oid" }, - "CVE-2018-14734": { - "cmt_msg": "infiniband: fix a possible use-after-free bug" + "CVE-2020-10720": { + "cmt_msg": "net-gro: fix use-after-free read in napi_gro_frags()" }, - "CVE-2017-15306": { - "cmt_msg": "KVM: PPC: Fix oops when checking KVM_CAP_PPC_HTM" + "CVE-2022-20369": { + "cmt_msg": "media: v4l2-mem2mem: Apply DST_QUEUE_OFF_BASE on MMAP buffers across ioctls" }, - "CVE-2020-0347": { - "cmt_msg": "" + "CVE-2022-20368": { + "cmt_msg": "net/packet: fix slab-out-of-bounds access in packet_recvmsg()" }, - "CVE-2019-18809": { - "cmt_msg": "media: usb: fix memory leak in af9005_identify_state" + "CVE-2022-3424": { + "cmt_msg": "misc: sgi-gru: fix use-after-free error in gru_set_context_option, gru_fault and gru_handle_user_call_os" }, - "CVE-2019-18808": { - "cmt_msg": "crypto: ccp - Release all allocated memory if sha type is invalid" + "CVE-2019-5108": { + "cmt_msg": "mac80211: Do not send Layer 2 Update frame before authorization" }, - "CVE-2022-41222": { - "cmt_msg": "mm/mremap: hold the rmap lock in write mode when moving page table entries." + "CVE-2017-1000405": { + "cmt_msg": "mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d()" }, - "CVE-2018-8822": { - "cmt_msg": "staging: ncpfs: memory corruption in ncp_read_kernel()" + "CVE-2017-1000407": { + "cmt_msg": "KVM: VMX: remove I/O port 0x80 bypass on Intel hosts" }, - "CVE-2021-40490": { - "cmt_msg": "ext4: fix race writing to an inline_data file while its xattrs are changing" + "CVE-2022-24448": { + "cmt_msg": "NFSv4: Handle case where the lookup of a directory fails" }, - "CVE-2021-33909": { - "cmt_msg": "seq_file: disallow extremely large seq buffer allocations" + "CVE-2020-0427": { + "cmt_msg": "pinctrl: devicetree: Avoid taking direct reference to device name string" }, - "CVE-2019-12455": { - "cmt_msg": "clk-sunxi: fix a missing-check bug in sunxi_divs_clk_setup()" + "CVE-2020-26088": { + "cmt_msg": "net/nfc/rawsock.c: add CAP_NET_RAW check." }, - "CVE-2019-12456": { + "CVE-2008-2544": { "cmt_msg": "" }, - "CVE-2023-20569": { - "cmt_msg": "x86/bugs: Increase the x86 bugs vector size to two u32s" + "CVE-2019-19462": { + "cmt_msg": "kernel/relay.c: handle alloc_percpu returning NULL in relay_open" }, - "CVE-2022-0812": { - "cmt_msg": "xprtrdma: fix incorrect header size calculations" + "CVE-2023-30772": { + "cmt_msg": "power: supply: da9150: Fix use after free bug in da9150_charger_remove due to race condition" }, - "CVE-2021-29647": { - "cmt_msg": "net: qrtr: fix a kernel-infoleak in qrtr_recvmsg()" + "CVE-2017-18017": { + "cmt_msg": "netfilter: xt_TCPMSS: add more sanity tests on tcph->doff" }, - "CVE-2019-17133": { - "cmt_msg": "cfg80211: wext: avoid copying malformed SSIDs" + "CVE-2021-3679": { + "cmt_msg": "tracing: Fix bug in rb_per_cpu_empty() that might cause deadloop." }, - "CVE-2017-18595": { - "cmt_msg": "tracing: Fix possible double free on failure of allocating trace buffer" + "CVE-2022-2586": { + "cmt_msg": "netfilter: nf_tables: do not allow SET_ID to refer to another table" }, - "CVE-2021-33655": { - "cmt_msg": "fbcon: Disallow setting font bigger than screen size" + "CVE-2021-39714": { + "cmt_msg": "staging: android: ion: Drop ion_map_kernel interface" }, - "CVE-2021-3612": { - "cmt_msg": "Input: joydev - prevent potential read overflow in ioctl" + "CVE-2023-51782": { + "cmt_msg": "net/rose: Fix Use-After-Free in rose_ioctl" }, - "CVE-2022-41858": { - "cmt_msg": "drivers: net: slip: fix NPD bug in sl_tx_timeout()" + "CVE-2023-51780": { + "cmt_msg": "atm: Fix Use-After-Free in do_vcc_ioctl" }, - "CVE-2017-7487": { - "cmt_msg": "ipx: call ipxitf_put() in ioctl error path" + "CVE-2023-51781": { + "cmt_msg": "appletalk: Fix Use-After-Free in atalk_ioctl" }, - "CVE-2019-6974": { - "cmt_msg": "kvm: fix kvm_ioctl_create_device() reference counting (CVE-2019-6974)" + "CVE-2022-2588": { + "cmt_msg": "net_sched: cls_route: remove from list when handle is 0" }, - "CVE-2022-41850": { - "cmt_msg": "HID: roccat: Fix use-after-free in roccat_read()" + "CVE-2019-18885": { + "cmt_msg": "btrfs: merge btrfs_find_device and find_device" }, - "CVE-2020-24503": { - "cmt_msg": "" + "CVE-2017-14489": { + "cmt_msg": "scsi: scsi_transport_iscsi: fix the issue that iscsi_if_rx doesn't parse nlmsg properly" }, - "CVE-2022-0168": { - "cmt_msg": "cifs: fix NULL ptr dereference in smb2_ioctl_query_info()" + "CVE-2024-26733": { + "cmt_msg": "arp: Prevent overflow in arp_req_get()." }, - "CVE-2023-2985": { - "cmt_msg": "fs: hfsplus: fix UAF issue in hfsplus_put_super" + "CVE-2024-26735": { + "cmt_msg": "ipv6: sr: fix possible use-after-free and null-ptr-deref" }, - "CVE-2020-14390": { - "cmt_msg": "fbcon: remove soft scrollback code" + "CVE-2024-26738": { + "cmt_msg": "powerpc/pseries/iommu: DLPAR add doesn't completely initialize pci_controller" }, - "CVE-2023-4132": { - "cmt_msg": "media: usb: siano: Fix warning due to null work_func_t function pointer" + "CVE-2024-26739": { + "cmt_msg": "net/sched: act_mirred: don't override retval if we already lost the skb" }, - "CVE-2020-24502": { + "CVE-2022-38096": { "cmt_msg": "" }, - "CVE-2017-17712": { - "cmt_msg": "net: ipv4: fix for a race condition in raw_sendmsg" - }, - "CVE-2017-17807": { - "cmt_msg": "KEYS: add missing permission check for request_key() destination" + "CVE-2017-5715": { + "cmt_msg": "x86/cpufeatures: Add X86_BUG_SPECTRE_V[12]" }, - "CVE-2017-17805": { - "cmt_msg": "crypto: salsa20 - fix blkcipher_walk API usage" + "CVE-2018-3620": { + "cmt_msg": "x86/microcode: Allow late microcode loading with SMT disabled" }, - "CVE-2017-7541": { - "cmt_msg": "brcmfmac: fix possible buffer overflow in brcmf_cfg80211_mgmt_tx()" + "CVE-2020-16166": { + "cmt_msg": "random32: update the net random state on interrupt and activity" }, - "CVE-2019-19527": { - "cmt_msg": "HID: hiddev: do cleanup in failure of opening a device" + "CVE-2021-33631": { + "cmt_msg": "ext4: fix kernel BUG in 'ext4_write_inline_data_end()'" }, - "CVE-2017-7542": { - "cmt_msg": "ipv6: avoid overflow of offset in ip6_find_1stfragopt" + "CVE-2019-15916": { + "cmt_msg": "net-sysfs: Fix mem leak in netdev_register_kobject" }, - "CVE-2024-0584": { - "cmt_msg": "ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet" + "CVE-2019-15917": { + "cmt_msg": "Bluetooth: hci_ldisc: Postpone HCI_UART_PROTO_READY bit set in hci_uart_set_proto()" }, - "CVE-2020-26141": { - "cmt_msg": "ath10k: Fix TKIP Michael MIC verification for PCIe" + "CVE-2017-18344": { + "cmt_msg": "posix-timer: Properly check sigevent->sigev_notify" }, - "CVE-2020-0465": { - "cmt_msg": "HID: core: Sanitize event code and type when mapping input" + "CVE-2024-26648": { + "cmt_msg": "drm/amd/display: Fix variable deferencing before NULL check in edp_setup_replay()" }, - "CVE-2023-6931": { - "cmt_msg": "perf: Fix perf_event_validate_size()" + "CVE-2024-26646": { + "cmt_msg": "thermal: intel: hfi: Add syscore callbacks for system-wide PM" }, - "CVE-2018-3639": { - "cmt_msg": "x86/nospec: Simplify alternative_msr_write()" + "CVE-2018-18690": { + "cmt_msg": "xfs: don't fail when converting shortform attr to long form during ATTR_REPLACE" }, - "CVE-2021-4218": { - "cmt_msg": "sysctl: pass kernel pointers to ->proc_handler" + "CVE-2024-26644": { + "cmt_msg": "btrfs: don't abort filesystem when attempting to snapshot deleted subvolume" }, - "CVE-2019-15902": { - "cmt_msg": "" + "CVE-2024-26642": { + "cmt_msg": "netfilter: nf_tables: disallow anonymous set with timeout flag" }, - "CVE-2024-25739": { - "cmt_msg": "" + "CVE-2017-0627": { + "cmt_msg": "media: uvcvideo: Prevent heap overflow when accessing mapped controls" }, - "CVE-2023-3358": { - "cmt_msg": "HID: intel_ish-hid: Add check for ishtp_dma_tx_map" + "CVE-2024-26641": { + "cmt_msg": "ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv()" }, - "CVE-2019-20054": { - "cmt_msg": "fs/proc/proc_sysctl.c: fix NULL pointer dereference in put_links" + "CVE-2018-25020": { + "cmt_msg": "bpf: fix truncated jump targets on heavy expansions" }, - "CVE-2017-15274": { - "cmt_msg": "KEYS: fix dereferencing NULL payload with nonzero length" + "CVE-2023-52469": { + "cmt_msg": "drivers/amd/pm: fix a use-after-free in kv_parse_power_table" }, - "CVE-2024-0340": { - "cmt_msg": "vhost: use kzalloc() instead of kmalloc() followed by memset()" + "CVE-2021-46904": { + "cmt_msg": "net: hso: fix null-ptr-deref during tty device unregistration" }, - "CVE-2021-3753": { - "cmt_msg": "vt_kdsetmode: extend console locking" + "CVE-2018-7273": { + "cmt_msg": "printk: hash addresses printed with %p" }, - "CVE-2023-6536": { - "cmt_msg": "" + "CVE-2022-0617": { + "cmt_msg": "udf: Fix NULL ptr deref when converting from inline format" }, - "CVE-2019-11135": { - "cmt_msg": "x86/msr: Add the IA32_TSX_CTRL MSR" + "CVE-2023-4459": { + "cmt_msg": "net: vmxnet3: fix possible NULL pointer dereference in vmxnet3_rq_cleanup()" }, - "CVE-2019-11810": { - "cmt_msg": "scsi: megaraid_sas: return error when create DMA pool failed" + "CVE-2022-20566": { + "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free caused by l2cap_chan_put" }, - "CVE-2021-27365": { - "cmt_msg": "scsi: iscsi: Ensure sysfs attributes are limited to PAGE_SIZE" + "CVE-2022-20565": { + "cmt_msg": "HID: core: Correctly handle ReportSize being zero" }, - "CVE-2021-27364": { - "cmt_msg": "scsi: iscsi: Restrict sessions and handles to admin capabilities" + "CVE-2023-1990": { + "cmt_msg": "nfc: st-nci: Fix use after free bug in ndlc_remove due to race condition" }, - "CVE-2017-14991": { - "cmt_msg": "scsi: sg: fixup infoleak when using SG_GET_REQUEST_TABLE" + "CVE-2021-33098": { + "cmt_msg": "ixgbe: fix large MTU request from VF" }, - "CVE-2020-0431": { - "cmt_msg": "HID: hid-input: clear unmapped usages" + "CVE-2022-48619": { + "cmt_msg": "Input: add bounds checking to input_set_capability()" }, - "CVE-2022-39842": { - "cmt_msg": "video: fbdev: pxa3xx-gcu: Fix integer overflow in pxa3xx_gcu_write" + "CVE-2017-10810": { + "cmt_msg": "drm/virtio: don't leak bo on drm_gem_object_init failure" }, - "CVE-2018-17977": { - "cmt_msg": "" + "CVE-2024-24860": { + "cmt_msg": "Bluetooth: Fix atomicity violation in {min,max}_key_size_set" }, - "CVE-2023-31081": { - "cmt_msg": "" + "CVE-2018-20509": { + "cmt_msg": "binder: refactor binder ref inc/dec for thread safety" }, - "CVE-2018-17972": { - "cmt_msg": "proc: restrict kernel stack dumps to root" + "CVE-2021-47070": { + "cmt_msg": "uio_hv_generic: Fix another memory leak in error handling paths" }, - "CVE-2021-20320": { - "cmt_msg": "s390/bpf: Fix optimizing out zero-extensions" + "CVE-2021-47075": { + "cmt_msg": "nvmet: fix memory leak in nvmet_alloc_ctrl()" }, - "CVE-2020-28974": { - "cmt_msg": "vt: Disable KD_FONT_OP_COPY" + "CVE-2021-47074": { + "cmt_msg": "nvme-loop: fix memory leak in nvme_loop_create_ctrl()" }, - "CVE-2018-7566": { - "cmt_msg": "ALSA: seq: Fix racy pool initializations" + "CVE-2021-47076": { + "cmt_msg": "RDMA/rxe: Return CQE error if invalid lkey was supplied" }, - "CVE-2020-11725": { - "cmt_msg": "" + "CVE-2021-47078": { + "cmt_msg": "RDMA/rxe: Clear all QP fields if creation failed" }, - "CVE-2022-33742": { - "cmt_msg": "xen/blkfront: force data bouncing when backend is untrusted" + "CVE-2017-8824": { + "cmt_msg": "dccp: CVE-2017-8824: use-after-free in DCCP code" }, - "CVE-2022-26490": { - "cmt_msg": "nfc: st21nfca: Fix potential buffer overflows in EVT_TRANSACTION" + "CVE-2018-7492": { + "cmt_msg": "rds: Fix NULL pointer dereference in __rds_rdma_map" }, - "CVE-2017-5967": { - "cmt_msg": "time: Remove CONFIG_TIMER_STATS" + "CVE-2017-12188": { + "cmt_msg": "KVM: nVMX: update last_nonleaf_level when initializing nested EPT" }, - "CVE-2021-0937": { - "cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write" + "CVE-2018-5848": { + "cmt_msg": "wil6210: missing length check in wmi_set_ie" }, - "CVE-2022-42895": { - "cmt_msg": "Bluetooth: L2CAP: Fix attempting to access uninitialized memory" + "CVE-2019-10638": { + "cmt_msg": "inet: switch IP ID generator to siphash" }, - "CVE-2022-3169": { - "cmt_msg": "nvme: ensure subsystem reset is single threaded" + "CVE-2019-10639": { + "cmt_msg": "netns: provide pure entropy for net_hash_mix()" }, - "CVE-2022-36280": { - "cmt_msg": "drm/vmwgfx: Validate the box size for the snooped cursor" + "CVE-2024-26676": { + "cmt_msg": "af_unix: Call kfree_skb() for dead unix_(sk)->oob_skb in GC." }, - "CVE-2022-1048": { - "cmt_msg": "ALSA: pcm: Fix races among concurrent hw_params and hw_free calls" + "CVE-2017-14140": { + "cmt_msg": "Sanitize 'move_pages()' permission checks" }, - "CVE-2018-20976": { - "cmt_msg": "xfs: clear sb->s_fs_info on mount failure" + "CVE-2020-26557": { + "cmt_msg": "" }, - "CVE-2023-22995": { - "cmt_msg": "usb: dwc3: dwc3-qcom: Add missing platform_device_put() in dwc3_qcom_acpi_register_core" + "CVE-2017-16535": { + "cmt_msg": "USB: core: fix out-of-bounds access bug in usb_get_bos_descriptor()" }, - "CVE-2024-21803": { - "cmt_msg": "" + "CVE-2017-16534": { + "cmt_msg": "USB: core: harden cdc_parse_cdc_header" }, - "CVE-2018-1108": { - "cmt_msg": "random: fix crng_ready() test" + "CVE-2017-16537": { + "cmt_msg": "media: imon: Fix null-ptr-deref in imon_probe" }, - "CVE-2018-16276": { - "cmt_msg": "USB: yurex: fix out-of-bounds uaccess in read handler" + "CVE-2017-16536": { + "cmt_msg": "[media] cx231xx-cards: fix NULL-deref on missing association descriptor" }, - "CVE-2019-15927": { - "cmt_msg": "ALSA: usb-audio: Avoid access before bLength check in build_audio_procunit()" + "CVE-2017-16531": { + "cmt_msg": "USB: fix out-of-bounds in usb_set_configuration" }, - "CVE-2021-3542": { - "cmt_msg": "" + "CVE-2017-16530": { + "cmt_msg": "USB: uas: fix bug in handling of alternate settings" }, - "CVE-2019-16413": { - "cmt_msg": "9p: use inode->i_lock to protect i_size_write() under 32-bit" + "CVE-2017-16533": { + "cmt_msg": "HID: usbhid: fix out-of-bounds bug" }, - "CVE-2024-24860": { - "cmt_msg": "Bluetooth: Fix atomicity violation in {min,max}_key_size_set" + "CVE-2017-16532": { + "cmt_msg": "usb: usbtest: fix NULL pointer dereference" }, - "CVE-2022-1263": { - "cmt_msg": "KVM: avoid NULL pointer dereference in kvm_dirty_ring_push" + "CVE-2024-26779": { + "cmt_msg": "wifi: mac80211: fix race condition on enabling fast-xmit" }, - "CVE-2017-16650": { - "cmt_msg": "net: qmi_wwan: fix divide by 0 on bad descriptors" + "CVE-2017-16538": { + "cmt_msg": "media: dvb-usb-v2: lmedm04: Improve logic checking of warm start" }, - "CVE-2020-12653": { - "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_cmd_append_vsie_tlv()" + "CVE-2018-9517": { + "cmt_msg": "l2tp: pass tunnel pointer to ->session_create()" }, - "CVE-2019-7222": { - "cmt_msg": "KVM: x86: work around leak of uninitialized stack contents (CVE-2019-7222)" + "CVE-2018-9516": { + "cmt_msg": "HID: debug: check length before copy_to_user()" }, - "CVE-2017-14051": { - "cmt_msg": "scsi: qla2xxx: Fix an integer overflow in sysfs code" + "CVE-2021-20317": { + "cmt_msg": "lib/timerqueue: Rely on rbtree semantics for next timer" }, - "CVE-2020-12654": { - "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_ret_wmm_get_status()" + "CVE-2024-26772": { + "cmt_msg": "ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal()" }, - "CVE-2019-7221": { - "cmt_msg": "KVM: nVMX: unconditionally cancel preemption timer in free_nested (CVE-2019-7221)" + "CVE-2018-1092": { + "cmt_msg": "ext4: fail ext4_iget for root directory if unallocated" }, - "CVE-2018-12929": { - "cmt_msg": "" + "CVE-2018-1093": { + "cmt_msg": "ext4: add validity checks for bitmap block numbers" }, - "CVE-2018-12928": { + "CVE-2021-3864": { "cmt_msg": "" }, - "CVE-2020-36310": { - "cmt_msg": "KVM: SVM: avoid infinite loop on NPF from bad address" - }, - "CVE-2020-36313": { - "cmt_msg": "KVM: Fix out of range accesses to memslots" + "CVE-2019-19054": { + "cmt_msg": "media: rc: prevent memory leak in cx23888_ir_probe" }, - "CVE-2020-35519": { - "cmt_msg": "net/x25: prevent a couple of overflows" + "CVE-2019-19057": { + "cmt_msg": "mwifiex: pcie: Fix memory leak in mwifiex_pcie_init_evt_ring" }, - "CVE-2023-31436": { - "cmt_msg": "net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg" + "CVE-2019-19056": { + "cmt_msg": "mwifiex: pcie: Fix memory leak in mwifiex_pcie_alloc_cmdrsp_buf" }, - "CVE-2022-33740": { - "cmt_msg": "xen/netfront: fix leaking data in shared pages" + "CVE-2019-19052": { + "cmt_msg": "can: gs_usb: gs_can_open(): prevent memory leak" }, - "CVE-2023-51782": { - "cmt_msg": "net/rose: Fix Use-After-Free in rose_ioctl" + "CVE-2019-3846": { + "cmt_msg": "mwifiex: Fix possible buffer overflows at parsing bss descriptor" }, - "CVE-2020-35513": { - "cmt_msg": "nfsd: fix incorrect umasks" + "CVE-2019-19058": { + "cmt_msg": "iwlwifi: dbg_ini: fix memory leak in alloc_sgtable" }, - "CVE-2020-10708": { - "cmt_msg": "" + "CVE-2017-15537": { + "cmt_msg": "x86/fpu: Don't let userspace set bogus xcomp_bv" }, - "CVE-2020-25673": { - "cmt_msg": "nfc: Avoid endless loops caused by repeated llcp_sock_connect()" + "CVE-2018-5391": { + "cmt_msg": "ip: discard IPv4 datagrams with overlapping segments." }, - "CVE-2022-0400": { - "cmt_msg": "" + "CVE-2018-5390": { + "cmt_msg": "tcp: free batches of packets in tcp_prune_ofo_queue()" }, - "CVE-2024-25741": { + "CVE-2023-20941": { "cmt_msg": "" }, - "CVE-2021-38160": { - "cmt_msg": "virtio_console: Assure used length from device is limited" - }, - "CVE-2021-42739": { - "cmt_msg": "media: firewire: firedtv-avc: fix a buffer overflow in avc_ca_pmt()" - }, - "CVE-2022-3344": { - "cmt_msg": "KVM: x86: nSVM: harden svm_free_nested against freeing vmcb02 while still in use" - }, - "CVE-2022-3111": { - "cmt_msg": "power: supply: wm8350-power: Add missing free in free_charger_irq" + "CVE-2018-20836": { + "cmt_msg": "scsi: libsas: fix a race condition when smp task timeout" }, - "CVE-2018-5344": { - "cmt_msg": "loop: fix concurrent lo_open/lo_release" + "CVE-2020-10135": { + "cmt_msg": "Bluetooth: Consolidate encryption handling in hci_encrypt_cfm" }, - "CVE-2020-12770": { - "cmt_msg": "scsi: sg: add sg_remove_request in sg_write" + "CVE-2020-36766": { + "cmt_msg": "cec-api: prevent leaking memory through hole in structure" }, - "CVE-2018-6412": { - "cmt_msg": "fbdev: Fixing arbitrary kernel leak in case FBIOGETCMAP_SPARC in sbusfb_ioctl_helper()." + "CVE-2023-28328": { + "cmt_msg": "media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer()" }, - "CVE-2019-15222": { - "cmt_msg": "ALSA: usb-audio: Fix gpf in snd_usb_pipe_sanity_check" + "CVE-2017-13693": { + "cmt_msg": "" }, - "CVE-2024-25744": { - "cmt_msg": "x86/coco: Disable 32-bit emulation by default on TDX and SEV" + "CVE-2017-13695": { + "cmt_msg": "ACPICA: acpi: acpica: fix acpi operand cache leak in nseval.c" }, - "CVE-2022-25265": { + "CVE-2017-13694": { "cmt_msg": "" }, - "CVE-2022-20368": { - "cmt_msg": "net/packet: fix slab-out-of-bounds access in packet_recvmsg()" + "CVE-2024-26647": { + "cmt_msg": "drm/amd/display: Fix late derefrence 'dsc' check in 'link_set_dsc_pps_packet()'" }, - "CVE-2017-12153": { - "cmt_msg": "nl80211: check for the required netlink attributes presence" + "CVE-2021-3640": { + "cmt_msg": "Bluetooth: sco: Fix lock_sock() blockage by memcpy_from_msg()" }, - "CVE-2019-19813": { - "cmt_msg": "btrfs: inode: Verify inode mode to avoid NULL pointer dereference" + "CVE-2020-11608": { + "cmt_msg": "media: ov519: add missing endpoint sanity checks" }, - "CVE-2017-12154": { - "cmt_msg": "kvm: nVMX: Don't allow L2 to access the hardware CR8" + "CVE-2020-10732": { + "cmt_msg": "fs/binfmt_elf.c: allocate initialized memory in fill_thread_core_info()" }, - "CVE-2020-10773": { - "cmt_msg": "s390/cmm: fix information leak in cmm_timeout_handler()" + "CVE-2017-17975": { + "cmt_msg": "media: usbtv: prevent double free in error case" }, - "CVE-2022-21499": { - "cmt_msg": "lockdown: also lock down previous kgdb use" + "CVE-2019-16921": { + "cmt_msg": "RDMA/hns: Fix init resp when alloc ucontext" }, - "CVE-2020-25284": { - "cmt_msg": "rbd: require global CAP_SYS_ADMIN for mapping and unmapping" + "CVE-2021-0512": { + "cmt_msg": "HID: make arrays usage and value to be the same" }, - "CVE-2023-4208": { - "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free" + "CVE-2022-41222": { + "cmt_msg": "mm/mremap: hold the rmap lock in write mode when moving page table entries." }, - "CVE-2017-1000379": { - "cmt_msg": "mm: larger stack guard gap, between vmas" + "CVE-2017-18595": { + "cmt_msg": "tracing: Fix possible double free on failure of allocating trace buffer" }, - "CVE-2022-3606": { - "cmt_msg": "" + "CVE-2024-26720": { + "cmt_msg": "mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again" }, - "CVE-2023-4206": { - "cmt_msg": "net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free" + "CVE-2024-26726": { + "cmt_msg": "btrfs: don't drop extent_map for free space inode on write error" }, - "CVE-2023-4207": { - "cmt_msg": "net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free" + "CVE-2019-6974": { + "cmt_msg": "kvm: fix kvm_ioctl_create_device() reference counting (CVE-2019-6974)" }, - "CVE-2023-3640": { - "cmt_msg": "" + "CVE-2023-2985": { + "cmt_msg": "fs: hfsplus: fix UAF issue in hfsplus_put_super" }, - "CVE-2017-1000371": { - "cmt_msg": "binfmt_elf: use ELF_ET_DYN_BASE only for PIE" + "CVE-2017-17806": { + "cmt_msg": "crypto: hmac - require that the underlying hash algorithm is unkeyed" }, - "CVE-2018-18281": { - "cmt_msg": "mremap: properly flush TLB before releasing the page" + "CVE-2017-17807": { + "cmt_msg": "KEYS: add missing permission check for request_key() destination" }, - "CVE-2023-20593": { - "cmt_msg": "x86/cpu/amd: Add a Zenbleed fix" + "CVE-2017-17805": { + "cmt_msg": "crypto: salsa20 - fix blkcipher_walk API usage" }, - "CVE-2019-18675": { - "cmt_msg": "mmap: introduce sane default mmap limits" + "CVE-2024-26700": { + "cmt_msg": "drm/amd/display: Fix MST Null Ptr for RV" }, - "CVE-2023-3022": { - "cmt_msg": "ipv6: Use result arg in fib_lookup_arg consistently" + "CVE-2023-52519": { + "cmt_msg": "HID: intel-ish-hid: ipc: Disable and reenable ACPI GPE bit" }, - "CVE-2022-2663": { - "cmt_msg": "netfilter: nf_conntrack_irc: Fix forged IP logic" + "CVE-2023-52516": { + "cmt_msg": "dma-debug: don't call __dma_entry_alloc_check_leak() under free_entries_lock" }, - "CVE-2019-8912": { - "cmt_msg": "net: crypto set sk to NULL when af_alg_release." + "CVE-2023-52517": { + "cmt_msg": "spi: sun6i: fix race between DMA RX transfer completion and RX FIFO drain" }, - "CVE-2023-51780": { - "cmt_msg": "atm: Fix Use-After-Free in do_vcc_ioctl" + "CVE-2023-52515": { + "cmt_msg": "RDMA/srp: Do not call scsi_done() from srp_abort()" }, - "CVE-2023-0047": { - "cmt_msg": "mm, oom: do not trigger out_of_memory from the #PF" + "CVE-2019-15902": { + "cmt_msg": "" }, - "CVE-2020-29370": { - "cmt_msg": "mm: slub: add missing TID bump in kmem_cache_alloc_bulk()" + "CVE-2023-52511": { + "cmt_msg": "spi: sun6i: reduce DMA RX transfer width to single byte" }, - "CVE-2019-15219": { - "cmt_msg": "USB: sisusbvga: fix oops in error path of sisusb_probe" + "CVE-2019-20054": { + "cmt_msg": "fs/proc/proc_sysctl.c: fix NULL pointer dereference in put_links" }, - "CVE-2022-20424": { - "cmt_msg": "io_uring: remove io_identity" + "CVE-2018-17977": { + "cmt_msg": "" }, - "CVE-2022-0850": { - "cmt_msg": "ext4: fix kernel infoleak via ext4_extent_header" + "CVE-2024-26659": { + "cmt_msg": "xhci: handle isoc Babble and Buffer Overrun events properly" }, - "CVE-2022-20422": { - "cmt_msg": "arm64: fix oops in concurrently setting insn_emulation sysctls" + "CVE-2024-26658": { + "cmt_msg": "bcachefs: grab s_umount only if snapshotting" }, - "CVE-2023-4385": { - "cmt_msg": "fs: jfs: fix possible NULL pointer dereference in dbFree()" + "CVE-2010-5321": { + "cmt_msg": "" }, - "CVE-2020-25643": { - "cmt_msg": "hdlc_ppp: add range checks in ppp_cp_parse_cr()" + "CVE-2024-26655": { + "cmt_msg": "Fix memory leak in posix_clock_open()" }, - "CVE-2023-4387": { - "cmt_msg": "net: vmxnet3: fix possible use-after-free bugs in vmxnet3_rq_alloc_rx_buf()" + "CVE-2024-26654": { + "cmt_msg": "ALSA: sh: aica: reorder cleanup operations to avoid UAF bugs" }, - "CVE-2021-39657": { - "cmt_msg": "scsi: ufs: Correct the LUN used in eh_device_reset_handler() callback" + "CVE-2024-26656": { + "cmt_msg": "drm/amdgpu: fix use-after-free bug" }, - "CVE-2024-24858": { - "cmt_msg": "" + "CVE-2024-26651": { + "cmt_msg": "sr9800: Add check for usbnet_get_endpoints" }, - "CVE-2019-19378": { - "cmt_msg": "" + "CVE-2024-26650": { + "cmt_msg": "platform/x86: p2sb: Allow p2sb_bar() calls during PCI device probe" }, - "CVE-2020-4788": { - "cmt_msg": "powerpc/64s: flush L1D on kernel entry" + "CVE-2022-1048": { + "cmt_msg": "ALSA: pcm: Fix races among concurrent hw_params and hw_free calls" }, - "CVE-2022-36879": { - "cmt_msg": "xfrm: xfrm_policy: fix a possible double xfrm_pols_put() in xfrm_bundle_lookup()" + "CVE-2023-52475": { + "cmt_msg": "Input: powermate - fix use-after-free in powermate_config_complete" }, - "CVE-2017-8831": { - "cmt_msg": "[media] saa7164: fix double fetch PCIe access condition" + "CVE-2023-52477": { + "cmt_msg": "usb: hub: Guard against accesses to uninitialized BOS descriptors" }, - "CVE-2021-39698": { - "cmt_msg": "wait: add wake_up_pollfree()" + "CVE-2023-52476": { + "cmt_msg": "perf/x86/lbr: Filter vsyscall addresses" }, - "CVE-2022-45934": { - "cmt_msg": "Bluetooth: L2CAP: Fix u8 overflow" + "CVE-2023-52470": { + "cmt_msg": "drm/radeon: check the alloc_workqueue return value in radeon_crtc_init()" }, - "CVE-2018-5333": { - "cmt_msg": "RDS: null pointer dereference in rds_atomic_free_op" + "CVE-2023-52479": { + "cmt_msg": "ksmbd: fix uaf in smb20_oplock_break_ack" }, - "CVE-2018-5332": { - "cmt_msg": "RDS: Heap OOB write in rds_message_alloc_sgs()" + "CVE-2023-52478": { + "cmt_msg": "HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect" }, - "CVE-2022-2380": { - "cmt_msg": "video: fbdev: sm712fb: Fix crash in smtcfb_read()" + "CVE-2022-26365": { + "cmt_msg": "xen/blkfront: fix leaking data in shared pages" }, - "CVE-2017-7482": { - "cmt_msg": "rxrpc: Fix several cases where a padded len isn't checked in ticket decode" + "CVE-2020-12652": { + "cmt_msg": "scsi: mptfusion: Fix double fetch bug in ioctl" }, - "CVE-2020-10767": { - "cmt_msg": "x86/speculation: Avoid force-disabling IBPB based on STIBP and enhanced IBRS." + "CVE-2020-12653": { + "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_cmd_append_vsie_tlv()" }, - "CVE-2021-3759": { - "cmt_msg": "memcg: enable accounting of ipc resources" + "CVE-2020-12656": { + "cmt_msg": "sunrpc: check that domain table is empty at module unload." }, - "CVE-2019-19447": { - "cmt_msg": "ext4: work around deleting a file with i_nlink == 0 safely" + "CVE-2017-14051": { + "cmt_msg": "scsi: qla2xxx: Fix an integer overflow in sysfs code" }, - "CVE-2017-17448": { - "cmt_msg": "netfilter: nfnetlink_cthelper: Add missing permission checks" + "CVE-2020-12654": { + "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_ret_wmm_get_status()" }, - "CVE-2017-17449": { - "cmt_msg": "netlink: Add netns check on taps" + "CVE-2022-23042": { + "cmt_msg": "xen/netfront: react properly to failing gnttab_end_foreign_access_ref()" }, - "CVE-2019-19525": { - "cmt_msg": "ieee802154: atusb: fix use-after-free at disconnect" + "CVE-2024-25740": { + "cmt_msg": "" }, - "CVE-2019-19524": { - "cmt_msg": "Input: ff-memless - kill timer in destroy()" + "CVE-2022-4744": { + "cmt_msg": "tun: avoid double free in tun_free_netdev" }, - "CVE-2019-19448": { - "cmt_msg": "btrfs: only search for left_info if there is no right_info in try_merge_free_space" + "CVE-2022-0400": { + "cmt_msg": "" }, - "CVE-2019-19449": { - "cmt_msg": "f2fs: fix to do sanity check on segment/section count" + "CVE-2024-25741": { + "cmt_msg": "" }, - "CVE-2023-31085": { - "cmt_msg": "ubi: Refuse attaching if mtd's erasesize is 0" + "CVE-2022-26966": { + "cmt_msg": "sr9700: sanity check for packet length" }, - "CVE-2019-19523": { - "cmt_msg": "USB: adutux: fix use-after-free on disconnect" + "CVE-2023-1989": { + "cmt_msg": "Bluetooth: btsdio: fix use after free bug in btsdio_remove due to unfinished work" }, - "CVE-2021-3752": { - "cmt_msg": "Bluetooth: fix use-after-free error in lock_sock_nested()" + "CVE-2022-25265": { + "cmt_msg": "" }, - "CVE-2017-10663": { - "cmt_msg": "f2fs: sanity check checkpoint segno and blkoff" + "CVE-2020-25285": { + "cmt_msg": "mm/hugetlb: fix a race between hugetlb sysctl handlers" }, - "CVE-2017-18360": { - "cmt_msg": "USB: serial: io_ti: fix div-by-zero in set_termios" + "CVE-2020-11609": { + "cmt_msg": "media: stv06xx: add missing descriptor sanity checks" }, - "CVE-2018-5848": { - "cmt_msg": "wil6210: missing length check in wmi_set_ie" + "CVE-2020-25284": { + "cmt_msg": "rbd: require global CAP_SYS_ADMIN for mapping and unmapping" }, - "CVE-2017-18249": { - "cmt_msg": "f2fs: fix race condition in between free nid allocator/initializer" + "CVE-2023-4208": { + "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free" }, - "CVE-2021-29264": { - "cmt_msg": "gianfar: fix jumbo packets+napi+rx overrun crash" + "CVE-2023-4206": { + "cmt_msg": "net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free" }, - "CVE-2021-35477": { - "cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4" + "CVE-2023-4207": { + "cmt_msg": "net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free" }, - "CVE-2017-18241": { - "cmt_msg": "f2fs: fix a panic caused by NULL flush_cmd_control" + "CVE-2021-47046": { + "cmt_msg": "drm/amd/display: Fix off by one in hdmi_14_process_transaction()" }, - "CVE-2022-3521": { - "cmt_msg": "kcm: avoid potential race in kcm_tx_work" + "CVE-2020-29370": { + "cmt_msg": "mm: slub: add missing TID bump in kmem_cache_alloc_bulk()" }, - "CVE-2019-15216": { - "cmt_msg": "USB: yurex: Fix protection fault after device removal" + "CVE-2022-20424": { + "cmt_msg": "io_uring: remove io_identity" }, - "CVE-2022-47929": { - "cmt_msg": "net: sched: disallow noqueue for qdisc classes" + "CVE-2022-20422": { + "cmt_msg": "arm64: fix oops in concurrently setting insn_emulation sysctls" }, - "CVE-2019-16746": { - "cmt_msg": "nl80211: validate beacon head" + "CVE-2017-8831": { + "cmt_msg": "[media] saa7164: fix double fetch PCIe access condition" }, - "CVE-2021-41864": { - "cmt_msg": "bpf: Fix integer overflow in prealloc_elems_and_freelist()" + "CVE-2022-45934": { + "cmt_msg": "Bluetooth: L2CAP: Fix u8 overflow" }, - "CVE-2019-15215": { - "cmt_msg": "media: cpia2_usb: first wake up, then free in disconnect" + "CVE-2021-4197": { + "cmt_msg": "cgroup: Use open-time credentials for process migraton perm checks" }, - "CVE-2022-2209": { + "CVE-2020-24503": { "cmt_msg": "" }, - "CVE-2018-18021": { - "cmt_msg": "arm64: KVM: Tighten guest core register access from userspace" + "CVE-2020-24502": { + "cmt_msg": "" }, - "CVE-2022-45887": { - "cmt_msg": "media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb()" + "CVE-2024-26774": { + "cmt_msg": "ext4: avoid dividing by 0 in mb_update_avg_fragment_size() when block bitmap corrupt" }, - "CVE-2021-37576": { - "cmt_msg": "KVM: PPC: Book3S: Fix H_RTAS rets buffer overflow" + "CVE-2023-31436": { + "cmt_msg": "net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg" }, "CVE-2019-8980": { "cmt_msg": "exec: Fix mem leak in kernel_read_file" }, - "CVE-2023-45871": { - "cmt_msg": "igb: set max size RX buffer when store bad packet is enabled" - }, - "CVE-2023-1855": { - "cmt_msg": "hwmon: (xgene) Fix use after free bug in xgene_hwmon_remove due to race condition" - }, - "CVE-2023-7042": { - "cmt_msg": "" - }, - "CVE-2022-3594": { - "cmt_msg": "r8152: Rate limit overflow messages" + "CVE-2024-26775": { + "cmt_msg": "aoe: avoid potential deadlock at set_capacity" }, "CVE-2018-14609": { "cmt_msg": "btrfs: relocation: Only remove reloc rb_trees if reloc control has been initialized" }, - "CVE-2023-35824": { - "cmt_msg": "media: dm1105: Fix use after free bug in dm1105_remove due to race condition" - }, - "CVE-2021-33098": { - "cmt_msg": "ixgbe: fix large MTU request from VF" - }, - "CVE-2022-3595": { - "cmt_msg": "cifs: fix double-fault crash during ntlmssp" - }, - "CVE-2021-28971": { - "cmt_msg": "perf/x86/intel: Fix a crash caused by zero PEBS status" - }, - "CVE-2023-47233": { - "cmt_msg": "" - }, - "CVE-2020-10769": { - "cmt_msg": "crypto: authenc - fix parsing key with misaligned rta_len" - }, - "CVE-2023-6606": { - "cmt_msg": "smb: client: fix OOB in smbCalcSize()" - }, - "CVE-2018-5803": { - "cmt_msg": "sctp: verify size of a new chunk in _sctp_make_chunk()" - }, - "CVE-2020-27815": { - "cmt_msg": "jfs: Fix array index bounds check in dbAdjTree" - }, - "CVE-2021-45486": { - "cmt_msg": "inet: use bigger hash table for IP ID generation" - }, - "CVE-2022-1462": { - "cmt_msg": "tty: use new tty_insert_flip_string_and_push_buffer() in pty_write()" - }, - "CVE-2022-27223": { - "cmt_msg": "USB: gadget: validate endpoint index for xilinx udc" - }, - "CVE-2020-27067": { - "cmt_msg": "l2tp: fix l2tp_eth module loading" + "CVE-2024-23851": { + "cmt_msg": "dm: limit the number of targets and parameter size area" }, "CVE-2020-27777": { "cmt_msg": "powerpc/rtas: Restrict RTAS requests from userspace" }, - "CVE-2019-20636": { - "cmt_msg": "Input: add safety guards to input_set_keycode()" - }, "CVE-2019-11486": { "cmt_msg": "tty: mark Siemens R3964 line discipline as BROKEN" }, @@ -7740,42 +7717,9 @@ "CVE-2018-8043": { "cmt_msg": "net: phy: mdio-bcm-unimac: fix potential NULL dereference in unimac_mdio_probe()" }, - "CVE-2020-27675": { - "cmt_msg": "xen/events: avoid removing an event channel while handling it" - }, - "CVE-2020-28915": { - "cmt_msg": "fbcon: Fix global-out-of-bounds read in fbcon_get_font()" - }, - "CVE-2023-7192": { - "cmt_msg": "netfilter: ctnetlink: fix possible refcount leak in ctnetlink_create_conntrack()" - }, "CVE-2019-20908": { "cmt_msg": "efi: Restrict efivar_ssdt_load when the kernel is locked down" }, - "CVE-2023-3776": { - "cmt_msg": "net/sched: cls_fw: Fix improper refcount update leads to use-after-free" - }, - "CVE-2021-28038": { - "cmt_msg": "Xen/gnttab: handle p2m update errors on a per-slot basis" - }, - "CVE-2022-23040": { - "cmt_msg": "xen/xenbus: don't let xenbus_grant_ring() remove grants in error case" - }, - "CVE-2021-29154": { - "cmt_msg": "bpf, x86: Validate computation of branch displacements for x86-64" - }, - "CVE-2023-52435": { - "cmt_msg": "net: prevent mss overflow in skb_segment()" - }, - "CVE-2023-52434": { - "cmt_msg": "smb: client: fix potential OOBs in smb2_parse_contexts()" - }, - "CVE-2023-3161": { - "cmt_msg": "fbcon: Check font dimension limits" - }, - "CVE-2023-52436": { - "cmt_msg": "f2fs: explicitly null-terminate the xattr list" - }, "CVE-2019-19060": { "cmt_msg": "iio: imu: adis16400: release allocated memory on failure" }, @@ -7791,9 +7735,6 @@ "CVE-2017-17741": { "cmt_msg": "KVM: Fix stack-out-of-bounds read in write_mmio" }, - "CVE-2019-9445": { - "cmt_msg": "f2fs: check if file namelen exceeds max value" - }, "CVE-2019-19066": { "cmt_msg": "scsi: bfa: release allocated memory in case of error" }, @@ -7803,1314 +7744,1262 @@ "CVE-2019-19068": { "cmt_msg": "rtl8xxxu: prevent leaking urb" }, - "CVE-2020-0435": { - "cmt_msg": "f2fs: fix to do sanity check with i_extra_isize" - }, - "CVE-2020-0432": { - "cmt_msg": "staging: most: net: fix buffer overflow" - }, - "CVE-2020-0433": { - "cmt_msg": "blk-mq: sync the update nr_hw_queues with blk_mq_queue_tag_busy_iter" - }, - "CVE-2023-51779": { - "cmt_msg": "Bluetooth: af_bluetooth: Fix Use-After-Free in bt_sock_recvmsg" - }, "CVE-2019-3874": { "cmt_msg": "sctp: implement memory accounting on tx path" }, - "CVE-2018-10877": { - "cmt_msg": "ext4: verify the depth of extent tree in ext4_find_extent()" + "CVE-2017-12193": { + "cmt_msg": "assoc_array: Fix a buggy node-splitting case" }, - "CVE-2018-10876": { - "cmt_msg": "ext4: only look at the bg_flags field if it is valid" + "CVE-2017-12192": { + "cmt_msg": "KEYS: prevent KEYCTL_READ on negative key" }, - "CVE-2010-4563": { + "CVE-2017-12190": { + "cmt_msg": "fix unbalanced page refcounting in bio_map_user_iov" + }, + "CVE-2020-36516": { + "cmt_msg": "ipv4: avoid using shared IP generator for connected sockets" + }, + "CVE-2012-4542": { "cmt_msg": "" }, - "CVE-2023-1249": { - "cmt_msg": "coredump: Use the vma snapshot in fill_files_note" + "CVE-2018-1000028": { + "cmt_msg": "nfsd: auth: Fix gid sorting when rootsquash enabled" }, - "CVE-2020-14331": { - "cmt_msg": "vgacon: Fix for missing check in scrollback handling" + "CVE-2018-1000026": { + "cmt_msg": "bnx2x: disable GSO where gso_size is too big for hardware" }, - "CVE-2018-10879": { - "cmt_msg": "ext4: make sure bitmaps and the inode table don't overlap with bg descriptors" + "CVE-2020-36777": { + "cmt_msg": "media: dvbdev: Fix memory leak in dvb_media_device_free()" }, - "CVE-2018-10878": { - "cmt_msg": "ext4: always check block group bounds in ext4_init_block_bitmap()" - }, - "CVE-2023-2248": { - "cmt_msg": "net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg" + "CVE-2020-36775": { + "cmt_msg": "f2fs: fix to avoid potential deadlock" }, - "CVE-2023-0266": { - "cmt_msg": "ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF" + "CVE-2021-20292": { + "cmt_msg": "drm/ttm/nouveau: don't call tt destroy callback on alloc failure." }, - "CVE-2023-1838": { - "cmt_msg": "Fix double fget() in vhost_net_set_backend()" + "CVE-2023-2269": { + "cmt_msg": "dm ioctl: fix nested locking in table_clear() to remove deadlock concern" }, - "CVE-2021-3483": { - "cmt_msg": "firewire: nosy: Fix a use-after-free bug in nosy_ioctl()" + "CVE-2020-10690": { + "cmt_msg": "ptp: fix the race between the release of ptp_clock and cdev" }, - "CVE-2019-15807": { - "cmt_msg": "scsi: libsas: delete sas port if expander discover failed" + "CVE-2021-3659": { + "cmt_msg": "net: mac802154: Fix general protection fault" }, - "CVE-2017-16913": { - "cmt_msg": "usbip: fix stub_rx: harden CMD_SUBMIT path to handle malicious input" + "CVE-2021-3653": { + "cmt_msg": "KVM: nSVM: avoid picking up unsupported bits from L2 in int_ctl (CVE-2021-3653)" }, - "CVE-2017-16912": { - "cmt_msg": "usbip: fix stub_rx: get_pipe() to validate endpoint number" + "CVE-2021-3655": { + "cmt_msg": "sctp: validate from_addr_param return" }, - "CVE-2017-16911": { - "cmt_msg": "usbip: prevent vhci_hcd driver from leaking a socket pointer address" + "CVE-2019-12614": { + "cmt_msg": "powerpc/pseries/dlpar: Fix a missing check in dlpar_parse_cc_property()" }, - "CVE-2017-0861": { - "cmt_msg": "ALSA: pcm: prevent UAF in snd_pcm_info" + "CVE-2019-12615": { + "cmt_msg": "mdesc: fix a missing-check bug in get_vdev_port_node_info()" }, - "CVE-2020-25656": { - "cmt_msg": "vt: keyboard, extend func_buf_lock to readers" + "CVE-2021-3896": { + "cmt_msg": "isdn: cpai: check ctr->cnr to avoid array index out of bound" }, - "CVE-2017-16914": { - "cmt_msg": "usbip: fix stub_send_ret_submit() vulnerability to null transfer_buffer" + "CVE-2021-3892": { + "cmt_msg": "" }, - "CVE-2023-1390": { - "cmt_msg": "tipc: fix NULL deref in tipc_link_xmit()" + "CVE-2022-27223": { + "cmt_msg": "USB: gadget: validate endpoint index for xilinx udc" }, - "CVE-2022-0492": { - "cmt_msg": "cgroup-v1: Require capabilities to set release_agent" + "CVE-2022-24958": { + "cmt_msg": "usb: gadget: don't release an existing dev->buf" }, - "CVE-2024-26598": { - "cmt_msg": "KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache" + "CVE-2020-36557": { + "cmt_msg": "vt: vt_ioctl: fix VT_DISALLOCATE freeing in-use virtual console" }, - "CVE-2020-10942": { - "cmt_msg": "vhost: Check docket sk_family instead of call getname" + "CVE-2020-12888": { + "cmt_msg": "vfio-pci: Invalidate mmaps and block MMIO access on disabled memory" }, - "CVE-2019-10142": { - "cmt_msg": "drivers/virt/fsl_hypervisor.c: prevent integer overflow in ioctl" + "CVE-2023-2194": { + "cmt_msg": "i2c: xgene-slimpro: Fix out-of-bounds bug in xgene_slimpro_i2c_xfer()" }, - "CVE-2021-4023": { - "cmt_msg": "io-wq: fix cancellation on create-worker failure" + "CVE-2022-41218": { + "cmt_msg": "media: dvb-core: Fix UAF due to refcount races at releasing" }, - "CVE-2017-11176": { - "cmt_msg": "mqueue: fix a use-after-free in sys_mq_notify()" + "CVE-2011-4917": { + "cmt_msg": "" }, - "CVE-2018-3693": { - "cmt_msg": "ext4: fix spectre gadget in ext4_mb_regular_allocator()" + "CVE-2021-45485": { + "cmt_msg": "ipv6: use prandom_u32() for ID generation" }, - "CVE-2017-12193": { - "cmt_msg": "assoc_array: Fix a buggy node-splitting case" + "CVE-2020-0030": { + "cmt_msg": "ANDROID: binder: synchronize_rcu() when using POLLFREE." }, - "CVE-2017-12192": { - "cmt_msg": "KEYS: prevent KEYCTL_READ on negative key" + "CVE-2019-18806": { + "cmt_msg": "net: qlogic: Fix memory leak in ql_alloc_large_buffers" }, - "CVE-2021-22555": { - "cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write" + "CVE-2018-7754": { + "cmt_msg": "printk: hash addresses printed with %p" }, - "CVE-2017-12190": { - "cmt_msg": "fix unbalanced page refcounting in bio_map_user_iov" + "CVE-2019-3900": { + "cmt_msg": "vhost_net: fix possible infinite loop" }, - "CVE-2022-1011": { - "cmt_msg": "fuse: fix pipe buffer lifetime for direct_io" + "CVE-2022-40982": { + "cmt_msg": "x86/speculation: Add Gather Data Sampling mitigation" }, - "CVE-2021-0399": { + "CVE-2021-39801": { "cmt_msg": "" }, - "CVE-2020-36691": { - "cmt_msg": "netlink: limit recursion depth in policy validation" - }, - "CVE-2023-3111": { - "cmt_msg": "btrfs: unset reloc control if transaction commit fails in prepare_to_relocate()" - }, - "CVE-2020-2732": { - "cmt_msg": "KVM: nVMX: Don't emulate instructions in guest mode" - }, - "CVE-2012-4542": { + "CVE-2021-39800": { "cmt_msg": "" }, - "CVE-2022-1729": { - "cmt_msg": "perf: Fix sys_perf_event_open() race against self" - }, - "CVE-2023-42752": { - "cmt_msg": "igmp: limit igmpv3_newpack() packet size to IP_MAX_MTU" - }, - "CVE-2023-4128": { - "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free" + "CVE-2024-22099": { + "cmt_msg": "Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security" }, - "CVE-2021-28712": { - "cmt_msg": "xen/netfront: harden netfront against event channel storms" + "CVE-2021-4202": { + "cmt_msg": "NFC: reorganize the functions in nci_request" }, - "CVE-2018-1000028": { - "cmt_msg": "nfsd: auth: Fix gid sorting when rootsquash enabled" + "CVE-2021-4203": { + "cmt_msg": "af_unix: fix races in sk_peer_pid and sk_peer_cred accesses" }, - "CVE-2023-1118": { - "cmt_msg": "media: rc: Fix use-after-free bugs caused by ene_tx_irqsim()" + "CVE-2023-52509": { + "cmt_msg": "ravb: Fix use-after-free issue in ravb_tx_timeout_work()" }, - "CVE-2018-7191": { - "cmt_msg": "tun: call dev_get_valid_name() before register_netdevice()" + "CVE-2023-52508": { + "cmt_msg": "nvme-fc: Prevent null pointer dereference in nvme_fc_io_getuuid()" }, - "CVE-2024-0607": { - "cmt_msg": "netfilter: nf_tables: fix pointer math issue in nft_byteorder_eval()" + "CVE-2023-52507": { + "cmt_msg": "nfc: nci: assert requested protocol is valid" }, - "CVE-2018-1000026": { - "cmt_msg": "bnx2x: disable GSO where gso_size is too big for hardware" + "CVE-2023-52506": { + "cmt_msg": "LoongArch: Set all reserved memblocks on Node#0 at initialization" }, - "CVE-2022-1975": { - "cmt_msg": "NFC: netlink: fix sleep in atomic bug when firmware download timeout" + "CVE-2023-52501": { + "cmt_msg": "ring-buffer: Do not attempt to read past \"commit\"" }, - "CVE-2023-1380": { - "cmt_msg": "wifi: brcmfmac: slab-out-of-bounds read in brcmf_get_assoc_ies()" + "CVE-2023-52500": { + "cmt_msg": "scsi: pm80xx: Avoid leaking tags when processing OPC_INB_SET_CONTROLLER_CONFIG command" }, - "CVE-2022-44032": { - "cmt_msg": "char: pcmcia: remove all the drivers" + "CVE-2023-52502": { + "cmt_msg": "net: nfc: fix races in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn()" }, - "CVE-2017-0786": { - "cmt_msg": "brcmfmac: add length check in brcmf_cfg80211_escan_handler()" + "CVE-2023-2513": { + "cmt_msg": "ext4: fix use-after-free in ext4_xattr_set_entry" }, - "CVE-2021-28972": { - "cmt_msg": "PCI: rpadlpar: Fix potential drc_name corruption in store functions" + "CVE-2017-1000": { + "cmt_msg": "udp: consistently apply ufo or fragmentation" }, - "CVE-2018-12130": { - "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" + "CVE-2024-26668": { + "cmt_msg": "netfilter: nft_limit: reject configurations that cause integer overflow" }, - "CVE-2020-14305": { - "cmt_msg": "netfilter: helpers: remove data_len usage for inkernel helpers" + "CVE-2017-0605": { + "cmt_msg": "tracing: Use strlcpy() instead of strcpy() in __trace_find_cmdline()" }, - "CVE-2021-20292": { - "cmt_msg": "drm/ttm/nouveau: don't call tt destroy callback on alloc failure." + "CVE-2024-24858": { + "cmt_msg": "" }, - "CVE-2021-31916": { - "cmt_msg": "dm ioctl: fix out of bounds array access when no devices" + "CVE-2024-26663": { + "cmt_msg": "tipc: Check the bearer type before calling tipc_udp_nl_bearer_add()" }, - "CVE-2017-8065": { - "cmt_msg": "crypto: ccm - move cbcmac input off the stack" + "CVE-2024-26664": { + "cmt_msg": "hwmon: (coretemp) Fix out-of-bounds memory access" }, - "CVE-2022-32981": { - "cmt_msg": "powerpc/32: Fix overread/overwrite of thread_struct via ptrace" + "CVE-2021-38198": { + "cmt_msg": "KVM: X86: MMU: Use the correct inherited permissions to get shadow page" }, - "CVE-2018-13405": { - "cmt_msg": "Fix up non-directory creation in SGID directories" + "CVE-2021-38199": { + "cmt_msg": "NFSv4: Initialise connection to the server in nfs4_alloc_client()" }, - "CVE-2020-25645": { - "cmt_msg": "geneve: add transport ports in route lookup for geneve" + "CVE-2022-1679": { + "cmt_msg": "ath9k: fix use-after-free in ath9k_hif_usb_rx_cb" }, - "CVE-2018-13406": { - "cmt_msg": "video: uvesafb: Fix integer overflow in allocation" + "CVE-2023-34256": { + "cmt_msg": "ext4: avoid a potential slab-out-of-bounds in ext4_group_desc_csum" }, - "CVE-2022-1280": { - "cmt_msg": "drm: avoid circular locks in drm_mode_getconnector" + "CVE-2023-52442": { + "cmt_msg": "ksmbd: validate session id and tree id in compound request" }, - "CVE-2023-3772": { - "cmt_msg": "xfrm: add NULL check in xfrm_update_ae_params" + "CVE-2022-40768": { + "cmt_msg": "scsi: stex: Properly zero out the passthrough command structure" }, - "CVE-2020-11668": { - "cmt_msg": "media: xirlink_cit: add missing descriptor sanity checks" + "CVE-2023-52444": { + "cmt_msg": "f2fs: fix to avoid dirent corruption" }, - "CVE-2020-11669": { - "cmt_msg": "powerpc/powernv/idle: Restore AMR/UAMOR/AMOR after idle" + "CVE-2023-52445": { + "cmt_msg": "media: pvrusb2: fix use after free on context disconnection" }, - "CVE-2019-15118": { - "cmt_msg": "ALSA: usb-audio: Fix a stack buffer overflow bug in check_input_term" + "CVE-2023-52449": { + "cmt_msg": "mtd: Fix gluebi NULL pointer dereference caused by ftl notifier" }, - "CVE-2019-12818": { - "cmt_msg": "net: nfc: Fix NULL dereference on nfc_llcp_build_tlv fails" + "CVE-2019-15807": { + "cmt_msg": "scsi: libsas: delete sas port if expander discover failed" }, - "CVE-2019-12819": { - "cmt_msg": "mdio_bus: Fix use-after-free on device_register fails" + "CVE-2024-26719": { + "cmt_msg": "nouveau: offload fence uevents work to workqueue" }, - "CVE-2023-0394": { - "cmt_msg": "ipv6: raw: Deduct extension header length in rawv6_push_pending_frames" + "CVE-2024-26715": { + "cmt_msg": "usb: dwc3: gadget: Fix NULL pointer dereference in dwc3_gadget_suspend" }, - "CVE-2020-10690": { - "cmt_msg": "ptp: fix the race between the release of ptp_clock and cdev" + "CVE-2024-1312": { + "cmt_msg": "mm: lock_vma_under_rcu() must check vma->anon_vma under vma lock" }, - "CVE-2022-36402": { - "cmt_msg": "drm/vmwgfx: Fix shader stage validation" + "CVE-2019-14284": { + "cmt_msg": "floppy: fix div-by-zero in setup_format_params" }, - "CVE-2019-19332": { - "cmt_msg": "KVM: x86: fix out-of-bounds write in KVM_GET_EMULATED_CPUID (CVE-2019-19332)" + "CVE-2019-14283": { + "cmt_msg": "floppy: fix out-of-bounds read in copy_buffer" }, - "CVE-2019-15117": { - "cmt_msg": "ALSA: usb-audio: Fix an OOB bug in parse_audio_mixer_unit" + "CVE-2023-3338": { + "cmt_msg": "Remove DECnet support from kernel" }, - "CVE-2021-3659": { - "cmt_msg": "net: mac802154: Fix general protection fault" + "CVE-2018-10882": { + "cmt_msg": "ext4: add more inode number paranoia checks" }, - "CVE-2022-25258": { - "cmt_msg": "USB: gadget: validate interface OS descriptor requests" + "CVE-2018-10883": { + "cmt_msg": "jbd2: don't mark block as modified if the handle is out of credits" }, - "CVE-2021-4155": { - "cmt_msg": "xfs: map unwritten blocks in XFS_IOC_{ALLOC,FREE}SP just like fallocate" + "CVE-2020-29368": { + "cmt_msg": "mm: thp: make the THP mapcount atomic against __split_huge_pmd_locked()" }, - "CVE-2019-14901": { - "cmt_msg": "mwifiex: Fix heap overflow in mmwifiex_process_tdls_action_frame()" + "CVE-2020-12464": { + "cmt_msg": "USB: core: Fix free-while-in-use bug in the USB S-Glibrary" }, - "CVE-2021-4150": { - "cmt_msg": "block: fix incorrect references to disk objects" + "CVE-2022-47520": { + "cmt_msg": "wifi: wilc1000: validate pairwise and authentication suite offsets" }, - "CVE-2020-3702": { - "cmt_msg": "ath: Use safer key clearing with key cache entries" + "CVE-2018-10087": { + "cmt_msg": "kernel/exit.c: avoid undefined behaviour when calling wait4()" }, - "CVE-2020-16166": { - "cmt_msg": "random32: update the net random state on interrupt and activity" + "CVE-2023-3159": { + "cmt_msg": "firewire: fix potential uaf in outbound_phy_packet_callback()" }, - "CVE-2021-3653": { - "cmt_msg": "KVM: nSVM: avoid picking up unsupported bits from L2 in int_ctl (CVE-2021-3653)" + "CVE-2021-47059": { + "cmt_msg": "crypto: sun8i-ss - fix result memory leak on error path" }, - "CVE-2021-3655": { - "cmt_msg": "sctp: validate from_addr_param return" + "CVE-2021-47052": { + "cmt_msg": "crypto: sa2ul - Fix memory leak of rxd" }, - "CVE-2020-8694": { - "cmt_msg": "powercap: restrict energy meter to root access" + "CVE-2021-47056": { + "cmt_msg": "crypto: qat - ADF_STATUS_PF_RUNNING should be set after adf_dev_init" }, - "CVE-2021-4159": { - "cmt_msg": "bpf: Verifer, adjust_scalar_min_max_vals to always call update_reg_bounds()" + "CVE-2021-47054": { + "cmt_msg": "bus: qcom: Put child node before return" }, - "CVE-2019-12614": { - "cmt_msg": "powerpc/pseries/dlpar: Fix a missing check in dlpar_parse_cc_property()" + "CVE-2022-21125": { + "cmt_msg": "x86/speculation/mmio: Reuse SRBDS mitigation for SBDS" }, - "CVE-2019-12615": { - "cmt_msg": "mdesc: fix a missing-check bug in get_vdev_port_node_info()" + "CVE-2019-19241": { + "cmt_msg": "io_uring: async workers should inherit the user creds" }, - "CVE-2021-3715": { - "cmt_msg": "net_sched: cls_route: remove the right filter from hashtable" + "CVE-2022-21123": { + "cmt_msg": "x86/speculation/mmio: Add mitigation for Processor MMIO Stale Data" }, - "CVE-2021-3714": { + "CVE-2020-26559": { "cmt_msg": "" }, - "CVE-2019-16230": { - "cmt_msg": "drm/amdkfd: fix a potential NULL pointer dereference (v2)" + "CVE-2021-43975": { + "cmt_msg": "atlantic: Fix OOB read and write in hw_atl_utils_fw_rpc_wait" }, - "CVE-2019-16231": { - "cmt_msg": "fjes: Handle workqueue allocation failure" + "CVE-2018-6927": { + "cmt_msg": "futex: Prevent overflow by strengthen input validation" }, - "CVE-2019-16232": { - "cmt_msg": "libertas: fix a potential NULL pointer dereference" + "CVE-2018-3639": { + "cmt_msg": "x86/nospec: Simplify alternative_msr_write()" }, - "CVE-2019-16233": { - "cmt_msg": "scsi: qla2xxx: fix a potential NULL pointer dereference" + "CVE-2023-0590": { + "cmt_msg": "net: sched: fix race condition in qdisc_graft()" }, - "CVE-2019-16234": { - "cmt_msg": "iwlwifi: pcie: fix rb_allocator workqueue allocation" + "CVE-2023-0597": { + "cmt_msg": "x86/mm: Randomize per-cpu entry area" }, - "CVE-2019-6133": { - "cmt_msg": "fork: record start_time late" + "CVE-2022-28390": { + "cmt_msg": "can: ems_usb: ems_usb_start_xmit(): fix double dev_kfree_skb() in error path" }, - "CVE-2018-10902": { - "cmt_msg": "ALSA: rawmidi: Change resized buffers atomically" + "CVE-2019-3460": { + "cmt_msg": "Bluetooth: Check L2CAP option sizes returned from l2cap_get_conf_opt" }, - "CVE-2021-39633": { - "cmt_msg": "ip_gre: add validation for csum_start" + "CVE-2022-3202": { + "cmt_msg": "jfs: prevent NULL deref in diFree" }, - "CVE-2017-18203": { - "cmt_msg": "dm: fix race between dm_get_from_kobject() and __dm_destroy()" + "CVE-2017-7518": { + "cmt_msg": "KVM: x86: fix singlestepping over syscall" }, - "CVE-2017-18202": { - "cmt_msg": "mm, oom_reaper: gather each vma to prevent leaking TLB entry" + "CVE-2019-11477": { + "cmt_msg": "tcp: limit payload size of sacked skbs" }, - "CVE-2021-39636": { - "cmt_msg": "netfilter: x_tables: fix pointer leaks to userspace" + "CVE-2021-46908": { + "cmt_msg": "bpf: Use correct permission flag for mixed signed bounds arithmetic" }, - "CVE-2017-18204": { - "cmt_msg": "ocfs2: should wait dio before inode lock in ocfs2_setattr()" + "CVE-2021-46906": { + "cmt_msg": "HID: usbhid: fix info leak in hid_submit_ctrl" }, - "CVE-2021-39634": { - "cmt_msg": "epoll: do not insert into poll queues until all sanity checks are done" + "CVE-2018-14614": { + "cmt_msg": "f2fs: fix to do sanity check with cp_pack_start_sum" }, - "CVE-2024-23851": { - "cmt_msg": "dm: limit the number of targets and parameter size area" + "CVE-2019-11479": { + "cmt_msg": "tcp: add tcp_min_snd_mss sysctl" }, - "CVE-2019-3882": { - "cmt_msg": "vfio/type1: Limit DMA mappings per container" + "CVE-2018-14616": { + "cmt_msg": "f2fs: fix to do sanity check with block address in main area v2" }, - "CVE-2017-18208": { - "cmt_msg": "mm/madvise.c: fix madvise() infinite loop under special circumstances" + "CVE-2018-14611": { + "cmt_msg": "btrfs: validate type when reading a chunk" }, - "CVE-2022-33741": { - "cmt_msg": "xen/netfront: force data bouncing when backend is untrusted" + "CVE-2018-14610": { + "cmt_msg": "btrfs: Check that each block group has corresponding chunk at mount time" }, - "CVE-2018-20509": { - "cmt_msg": "binder: refactor binder ref inc/dec for thread safety" + "CVE-2018-14613": { + "cmt_msg": "btrfs: tree-checker: Verify block_group_item" }, - "CVE-2024-24864": { - "cmt_msg": "" + "CVE-2018-14612": { + "cmt_msg": "btrfs: tree-checker: Detect invalid and empty essential trees" }, - "CVE-2022-45885": { + "CVE-2024-23848": { "cmt_msg": "" }, - "CVE-2022-33744": { - "cmt_msg": "xen/arm: Fix race in RB-tree based P2M accounting" + "CVE-2020-27418": { + "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region" }, - "CVE-2017-9605": { - "cmt_msg": "drm/vmwgfx: Make sure backup_handle is always valid" + "CVE-2019-2025": { + "cmt_msg": "binder: fix race that allows malicious free of live buffer" }, - "CVE-2017-18193": { - "cmt_msg": "f2fs: fix a bug caused by NULL extent tree" + "CVE-2019-2024": { + "cmt_msg": "media: em28xx: Fix use-after-free when disconnecting" }, - "CVE-2022-40768": { - "cmt_msg": "scsi: stex: Properly zero out the passthrough command structure" + "CVE-2017-15951": { + "cmt_msg": "KEYS: Fix race between updating and finding a negative key" }, - "CVE-2019-9454": { - "cmt_msg": "i2c: core-smbus: prevent stack corruption on read I2C_BLOCK_DATA" + "CVE-2019-19074": { + "cmt_msg": "ath9k: release allocated buffer if timed out" }, - "CVE-2020-12888": { - "cmt_msg": "vfio-pci: Invalidate mmaps and block MMIO access on disabled memory" + "CVE-2019-19073": { + "cmt_msg": "ath9k_htc: release allocated buffer if timed out" }, - "CVE-2023-2194": { - "cmt_msg": "i2c: xgene-slimpro: Fix out-of-bounds bug in xgene_slimpro_i2c_xfer()" + "CVE-2019-1125": { + "cmt_msg": "x86/speculation: Prepare entry code for Spectre v1 swapgs mitigations" }, - "CVE-2023-52445": { - "cmt_msg": "media: pvrusb2: fix use after free on context disconnection" + "CVE-2023-31085": { + "cmt_msg": "ubi: Refuse attaching if mtd's erasesize is 0" }, - "CVE-2021-0447": { - "cmt_msg": "l2tp: protect sock pointer of struct pppol2tp_session with RCU" + "CVE-2023-31084": { + "cmt_msg": "media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*()" }, - "CVE-2022-41218": { - "cmt_msg": "media: dvb-core: Fix UAF due to refcount races at releasing" + "CVE-2023-31083": { + "cmt_msg": "Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO" }, - "CVE-2019-20934": { - "cmt_msg": "sched/fair: Don't free p->numa_faults with concurrent readers" + "CVE-2023-31082": { + "cmt_msg": "" }, - "CVE-2022-1247": { + "CVE-2023-31081": { "cmt_msg": "" }, - "CVE-2022-36946": { - "cmt_msg": "netfilter: nf_queue: do not allow packet truncation below transport header offset" + "CVE-2022-32296": { + "cmt_msg": "tcp: increase source port perturb table to 2^16" }, - "CVE-2021-45485": { - "cmt_msg": "ipv6: use prandom_u32() for ID generation" + "CVE-2020-28974": { + "cmt_msg": "vt: Disable KD_FONT_OP_COPY" }, - "CVE-2021-0448": { - "cmt_msg": "netfilter: ctnetlink: add a range check for l3/l4 protonum" + "CVE-2019-20806": { + "cmt_msg": "media: tw5864: Fix possible NULL pointer dereference in tw5864_handle_frame" }, - "CVE-2018-19824": { - "cmt_msg": "ALSA: usb-audio: Fix UAF decrement if card has no live interfaces in card.c" + "CVE-2022-3028": { + "cmt_msg": "af_key: Do not call xfrm_probe_algs in parallel" }, - "CVE-2022-21166": { - "cmt_msg": "x86/speculation/mmio: Enable CPU Fill buffer clearing on idle" + "CVE-2020-14304": { + "cmt_msg": "" }, - "CVE-2020-29374": { - "cmt_msg": "gup: document and work around \"COW can break either way\" issue" + "CVE-2018-17972": { + "cmt_msg": "proc: restrict kernel stack dumps to root" }, - "CVE-2020-0030": { - "cmt_msg": "ANDROID: binder: synchronize_rcu() when using POLLFREE." + "CVE-2022-33981": { + "cmt_msg": "floppy: disable FDRAWCMD by default" }, - "CVE-2023-4134": { - "cmt_msg": "Input: cyttsp4_core - change del_timer_sync() to timer_shutdown_sync()" + "CVE-2017-16995": { + "cmt_msg": "bpf: fix incorrect sign extension in check_alu_op()" }, - "CVE-2018-16862": { - "cmt_msg": "mm: cleancache: fix corruption on missed inode invalidation" + "CVE-2017-16994": { + "cmt_msg": "mm/pagewalk.c: report holes in hugetlb ranges" }, - "CVE-2023-52449": { - "cmt_msg": "mtd: Fix gluebi NULL pointer dereference caused by ftl notifier" + "CVE-2017-17558": { + "cmt_msg": "USB: core: prevent malicious bNumInterfaces overflow" }, - "CVE-2021-29650": { - "cmt_msg": "netfilter: x_tables: Use correct memory barriers." + "CVE-2023-1390": { + "cmt_msg": "tipc: fix NULL deref in tipc_link_xmit()" }, - "CVE-2019-18806": { - "cmt_msg": "net: qlogic: Fix memory leak in ql_alloc_large_buffers" + "CVE-2020-10751": { + "cmt_msg": "selinux: properly handle multiple messages in selinux_netlink_send()" }, - "CVE-2023-4010": { + "CVE-2020-10757": { + "cmt_msg": "mm: Fix mremap not considering huge pmd devmap" + }, + "CVE-2022-1116": { "cmt_msg": "" }, - "CVE-2018-20169": { - "cmt_msg": "USB: check usb_get_extra_descriptor for proper size" + "CVE-2021-28660": { + "cmt_msg": "staging: rtl8188eu: prevent ->ssid overflow in rtw_wx_set_scan()" }, - "CVE-2017-12762": { - "cmt_msg": "isdn/i4l: fix buffer overflow" + "CVE-2020-36386": { + "cmt_msg": "Bluetooth: Fix slab-out-of-bounds read in hci_extended_inquiry_result_evt()" }, - "CVE-2018-7754": { - "cmt_msg": "printk: hash addresses printed with %p" + "CVE-2020-36385": { + "cmt_msg": "RDMA/ucma: Rework ucma_migrate_id() to avoid races with destroy" }, - "CVE-2021-33656": { - "cmt_msg": "vt: drop old FONT ioctls" + "CVE-2018-9385": { + "cmt_msg": "ARM: amba: Don't read past the end of sysfs \"driver_override\" buffer" }, - "CVE-2020-36558": { - "cmt_msg": "vt: vt_ioctl: fix race in VT_RESIZEX" + "CVE-2020-0009": { + "cmt_msg": "staging: android: ashmem: Disallow ashmem memory from being remapped" }, - "CVE-2022-41849": { - "cmt_msg": "fbdev: smscufx: Fix use-after-free in ufx_ops_open()" + "CVE-2019-14615": { + "cmt_msg": "drm/i915/gen9: Clear residual context state on context switch" }, - "CVE-2022-41848": { - "cmt_msg": "" + "CVE-2018-9415": { + "cmt_msg": "ARM: amba: Fix race condition with driver_override" }, - "CVE-2023-6356": { - "cmt_msg": "" + "CVE-2019-13648": { + "cmt_msg": "powerpc/tm: Fix oops on sigreturn on systems without TM" }, - "CVE-2022-1353": { - "cmt_msg": "af_key: add __GFP_ZERO flag for compose_sadb_supported in function pfkey_register" + "CVE-2018-15572": { + "cmt_msg": "x86/speculation: Protect against userspace-userspace spectreRSB" }, - "CVE-2022-28356": { - "cmt_msg": "llc: fix netdevice reference leaks in llc_ui_bind()" + "CVE-2022-1204": { + "cmt_msg": "ax25: Fix refcount leaks caused by ax25_cb_del()" }, - "CVE-2022-1198": { - "cmt_msg": "drivers: hamradio: 6pack: fix UAF bug caused by mod_timer()" + "CVE-2018-9363": { + "cmt_msg": "Bluetooth: hidp: buffer overflow in hidp_process_report" }, - "CVE-2022-1199": { - "cmt_msg": "ax25: Fix NULL pointer dereference in ax25_kill_by_device" + "CVE-2016-10723": { + "cmt_msg": "mm, oom: remove sleep from under oom_lock" }, - "CVE-2018-5750": { - "cmt_msg": "ACPI: sbshc: remove raw pointer from printk() message" + "CVE-2022-26490": { + "cmt_msg": "nfc: st21nfca: Fix potential buffer overflows in EVT_TRANSACTION" }, - "CVE-2021-39801": { - "cmt_msg": "" + "CVE-2020-8832": { + "cmt_msg": "drm/i915: Record the default hw state after reset upon load" }, - "CVE-2021-39800": { - "cmt_msg": "" + "CVE-2020-8834": { + "cmt_msg": "KVM: PPC: Book3S HV: Factor fake-suspend handling out of kvmppc_save/restore_tm" }, - "CVE-2017-7558": { - "cmt_msg": "sctp: Avoid out-of-bounds reads from address storage" + "CVE-2023-52531": { + "cmt_msg": "wifi: iwlwifi: mvm: Fix a memory corruption issue" }, - "CVE-2018-16884": { - "cmt_msg": "sunrpc: use-after-free in svc_process_common()" + "CVE-2023-52532": { + "cmt_msg": "net: mana: Fix TX CQE error handling" }, - "CVE-2022-1195": { - "cmt_msg": "hamradio: improve the incomplete fix to avoid NPD" + "CVE-2023-39189": { + "cmt_msg": "netfilter: nfnetlink_osf: avoid OOB read" }, - "CVE-2024-22099": { - "cmt_msg": "" + "CVE-2024-26677": { + "cmt_msg": "rxrpc: Fix delayed ACKs to not set the reference serial number" }, - "CVE-2021-4202": { - "cmt_msg": "NFC: reorganize the functions in nci_request" + "CVE-2020-25211": { + "cmt_msg": "netfilter: ctnetlink: add a range check for l3/l4 protonum" }, - "CVE-2017-16647": { - "cmt_msg": "net: usb: asix: fill null-ptr-deref in asix_suspend" + "CVE-2020-25212": { + "cmt_msg": "nfs: Fix getxattr kernel panic and memory overflow" }, - "CVE-2022-4269": { - "cmt_msg": "act_mirred: use the backlog for nested calls to mirred ingress" + "CVE-2020-28374": { + "cmt_msg": "scsi: target: Fix XCOPY NAA identifier lookup" }, - "CVE-2022-45886": { - "cmt_msg": "media: dvb-core: Fix use-after-free due on race condition at dvb_net" + "CVE-2024-26672": { + "cmt_msg": "drm/amdgpu: Fix variable 'mca_funcs' dereferenced before NULL check in 'amdgpu_mca_smu_get_mca_entry()'" }, - "CVE-2023-46343": { - "cmt_msg": "nfc: nci: fix possible NULL pointer dereference in send_acknowledge()" + "CVE-2024-26671": { + "cmt_msg": "blk-mq: fix IO hang from sbitmap wakeup race" }, - "CVE-2024-24859": { - "cmt_msg": "" + "CVE-2024-26679": { + "cmt_msg": "inet: read sk->sk_family once in inet_recv_error()" }, - "CVE-2019-10220": { - "cmt_msg": "Convert filldir[64]() from __put_user() to unsafe_put_user()" + "CVE-2023-52458": { + "cmt_msg": "block: add check that partition length needs to be aligned with block size" }, - "CVE-2023-2124": { - "cmt_msg": "xfs: verify buffer contents when we skip log replay" + "CVE-2023-52451": { + "cmt_msg": "powerpc/pseries/memhp: Fix access beyond end of drmem array" }, - "CVE-2021-3609": { - "cmt_msg": "can: bcm: delay release of struct bcm_op after synchronize_rcu()" + "CVE-2018-9568": { + "cmt_msg": "net: Set sk_prot_creator when cloning sockets to the right proto" }, - "CVE-2023-2860": { - "cmt_msg": "ipv6: sr: fix out-of-bounds read when setting HMAC data." + "CVE-2022-0644": { + "cmt_msg": "vfs: check fd has read access in kernel_read_file_from_fd()" }, - "CVE-2021-44879": { - "cmt_msg": "f2fs: fix to do sanity check on inode type during garbage collection" + "CVE-2019-14816": { + "cmt_msg": "mwifiex: Fix three heap overflow at parsing element in cfg80211_ap_settings" }, - "CVE-2019-15505": { - "cmt_msg": "media: technisat-usb2: break out of loop at end of buffer" + "CVE-2019-14814": { + "cmt_msg": "mwifiex: Fix three heap overflow at parsing element in cfg80211_ap_settings" }, - "CVE-2023-2513": { - "cmt_msg": "ext4: fix use-after-free in ext4_xattr_set_entry" + "CVE-2019-14815": { + "cmt_msg": "mwifiex: Fix three heap overflow at parsing element in cfg80211_ap_settings" }, - "CVE-2017-1000": { - "cmt_msg": "udp: consistently apply ufo or fragmentation" + "CVE-2024-26706": { + "cmt_msg": "parisc: Fix random data corruption from exception handler" }, - "CVE-2020-11609": { - "cmt_msg": "media: stv06xx: add missing descriptor sanity checks" + "CVE-2024-26704": { + "cmt_msg": "ext4: fix double-free of blocks due to wrong extents moved_len" }, - "CVE-2022-27672": { - "cmt_msg": "x86/speculation: Identify processors vulnerable to SMT RSB predictions" + "CVE-2020-25672": { + "cmt_msg": "nfc: fix memory leak in llcp_sock_connect()" }, - "CVE-2020-27066": { - "cmt_msg": "xfrm: policy: Fix doulbe free in xfrm_policy_timer" + "CVE-2020-25673": { + "cmt_msg": "nfc: Avoid endless loops caused by repeated llcp_sock_connect()" }, - "CVE-2022-2964": { - "cmt_msg": "net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup" + "CVE-2020-25670": { + "cmt_msg": "nfc: fix refcount leak in llcp_sock_bind()" }, - "CVE-2017-0605": { - "cmt_msg": "tracing: Use strlcpy() instead of strcpy() in __trace_find_cmdline()" + "CVE-2020-25671": { + "cmt_msg": "nfc: fix refcount leak in llcp_sock_connect()" }, - "CVE-2021-1048": { - "cmt_msg": "fix regression in \"epoll: Keep a reference on files added to the check list\"" + "CVE-2019-19813": { + "cmt_msg": "btrfs: inode: Verify inode mode to avoid NULL pointer dereference" }, - "CVE-2015-2877": { + "CVE-2020-29374": { + "cmt_msg": "gup: document and work around \"COW can break either way\" issue" + }, + "CVE-2019-19815": { + "cmt_msg": "f2fs: support swap file w/ DIO" + }, + "CVE-2019-19814": { "cmt_msg": "" }, - "CVE-2020-9383": { - "cmt_msg": "floppy: check FDC index for errors before assigning it" + "CVE-2020-29371": { + "cmt_msg": "romfs: fix uninitialized memory leak in romfs_dev_read()" }, - "CVE-2022-3586": { - "cmt_msg": "sch_sfb: Don't assume the skb is still around after enqueueing to child" + "CVE-2019-19816": { + "cmt_msg": "btrfs: inode: Verify inode mode to avoid NULL pointer dereference" }, - "CVE-2023-32269": { - "cmt_msg": "netrom: Fix use-after-free caused by accept on already connected socket" + "CVE-2018-18710": { + "cmt_msg": "cdrom: fix improper type cast, which can leat to information leak." }, - "CVE-2023-1206": { - "cmt_msg": "tcp: Reduce chance of collisions in inet6_hashfn()." + "CVE-2023-34255": { + "cmt_msg": "xfs: verify buffer contents when we skip log replay" }, - "CVE-2021-38198": { - "cmt_msg": "KVM: X86: MMU: Use the correct inherited permissions to get shadow page" + "CVE-2022-23040": { + "cmt_msg": "xen/xenbus: don't let xenbus_grant_ring() remove grants in error case" }, - "CVE-2021-38199": { - "cmt_msg": "NFSv4: Initialise connection to the server in nfs4_alloc_client()" + "CVE-2023-3141": { + "cmt_msg": "memstick: r592: Fix UAF bug in r592_remove due to race condition" }, - "CVE-2022-1679": { - "cmt_msg": "ath9k: fix use-after-free in ath9k_hif_usb_rx_cb" + "CVE-2020-12655": { + "cmt_msg": "xfs: add agf freeblocks verify in xfs_agf_verify" }, - "CVE-2020-8832": { - "cmt_msg": "drm/i915: Record the default hw state after reset upon load" + "CVE-2022-3524": { + "cmt_msg": "tcp/udp: Fix memory leak in ipv6_renew_options()." }, - "CVE-2023-1513": { - "cmt_msg": "kvm: initialize all of the kvm_debugregs structure before sending it to userspace" + "CVE-2022-3523": { + "cmt_msg": "mm/memory.c: fix race when faulting a device private page" }, - "CVE-2019-9444": { - "cmt_msg": "printk: hash addresses printed with %p" + "CVE-2022-3522": { + "cmt_msg": "mm/hugetlb: use hugetlb_pte_stable in migration race check" }, - "CVE-2021-26401": { - "cmt_msg": "x86/speculation: Use generic retpoline by default on AMD" + "CVE-2022-3521": { + "cmt_msg": "kcm: avoid potential race in kcm_tx_work" }, - "CVE-2021-3847": { - "cmt_msg": "" + "CVE-2018-7755": { + "cmt_msg": "floppy: Do not copy a kernel pointer to user memory in FDGETPRM ioctl" }, - "CVE-2018-1130": { - "cmt_msg": "dccp: check sk for closed state in dccp_sendmsg()" + "CVE-2017-7346": { + "cmt_msg": "drm/vmwgfx: limit the number of mip levels in vmw_gb_surface_define_ioctl()" }, - "CVE-2023-1077": { - "cmt_msg": "sched/rt: pick_next_rt_entity(): check list_entry" + "CVE-2018-7757": { + "cmt_msg": "scsi: libsas: fix memory leak in sas_smp_get_phy_events()" }, - "CVE-2019-14284": { - "cmt_msg": "floppy: fix div-by-zero in setup_format_params" + "CVE-2022-0330": { + "cmt_msg": "drm/i915: Flush TLBs before releasing backing store" }, - "CVE-2020-36557": { - "cmt_msg": "vt: vt_ioctl: fix VT_DISALLOCATE freeing in-use virtual console" + "CVE-2022-4095": { + "cmt_msg": "staging: rtl8712: fix use after free bugs" }, - "CVE-2021-3506": { - "cmt_msg": "f2fs: fix to avoid out-of-bounds memory access" + "CVE-2017-10911": { + "cmt_msg": "xen-blkback: don't leak stack data via response ring" }, - "CVE-2011-4917": { - "cmt_msg": "" + "CVE-2022-45919": { + "cmt_msg": "media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221" }, - "CVE-2011-4916": { - "cmt_msg": "" + "CVE-2018-5873": { + "cmt_msg": "nsfs: mark dentry with DCACHE_RCUACCESS" }, - "CVE-2019-14283": { - "cmt_msg": "floppy: fix out-of-bounds read in copy_buffer" + "CVE-2021-3669": { + "cmt_msg": "ipc: replace costly bailout check in sysvipc_find_ipc()" }, - "CVE-2019-3900": { - "cmt_msg": "vhost_net: fix possible infinite loop" + "CVE-2019-3701": { + "cmt_msg": "can: gw: ensure DLC boundaries after CAN frame modification" }, - "CVE-2019-19528": { - "cmt_msg": "USB: iowarrior: fix use-after-free on disconnect" + "CVE-2023-1095": { + "cmt_msg": "netfilter: nf_tables: fix null deref due to zeroed list head" }, - "CVE-2019-19533": { - "cmt_msg": "media: ttusb-dec: Fix info-leak in ttusb_dec_send_command()" + "CVE-2022-3239": { + "cmt_msg": "media: em28xx: initialize refcount before kref_get" }, - "CVE-2018-13100": { - "cmt_msg": "f2fs: fix to do sanity check with secs_per_zone" + "CVE-2022-4543": { + "cmt_msg": "" }, - "CVE-2017-16646": { - "cmt_msg": "media: dib0700: fix invalid dvb_detach argument" + "CVE-2017-11089": { + "cmt_msg": "cfg80211: Define nla_policy for NL80211_ATTR_LOCAL_MESH_POWER_MODE" }, - "CVE-2017-16645": { - "cmt_msg": "Input: ims-psu - check if CDC union descriptor is sane" + "CVE-2019-18282": { + "cmt_msg": "net/flow_dissector: switch to siphash" }, - "CVE-2017-16644": { - "cmt_msg": "media: hdpvr: Fix an error handling path in hdpvr_probe()" + "CVE-2021-34981": { + "cmt_msg": "Bluetooth: cmtp: fix file refcount when cmtp_attach_device fails" }, - "CVE-2017-16643": { - "cmt_msg": "Input: gtco - fix potential out-of-bound access" + "CVE-2018-14625": { + "cmt_msg": "vhost/vsock: fix use-after-free in network stack callers" }, - "CVE-2017-16649": { - "cmt_msg": "net: cdc_ether: fix divide by 0 on bad descriptors" + "CVE-2023-4881": { + "cmt_msg": "netfilter: nftables: exthdr: fix 4-byte stack OOB write" }, - "CVE-2023-31083": { - "cmt_msg": "Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO" + "CVE-2013-7445": { + "cmt_msg": "" }, - "CVE-2019-5489": { - "cmt_msg": "Change mincore() to count \"mapped\" pages rather than \"cached\" pages" + "CVE-2024-26804": { + "cmt_msg": "net: ip_tunnel: prevent perpetual headroom growth" }, - "CVE-2024-1312": { - "cmt_msg": "mm: lock_vma_under_rcu() must check vma->anon_vma under vma lock" + "CVE-2024-26805": { + "cmt_msg": "netlink: Fix kernel-infoleak-after-free in __skb_datagram_iter" }, - "CVE-2017-16648": { - "cmt_msg": "dvb_frontend: don't use-after-free the frontend struct" + "CVE-2022-3303": { + "cmt_msg": "ALSA: pcm: oss: Fix race at SNDCTL_DSP_SYNC" }, - "CVE-2018-10880": { - "cmt_msg": "ext4: never move the system.data xattr out of the inode body" + "CVE-2020-12771": { + "cmt_msg": "bcache: fix potential deadlock problem in btree_gc_coalesce" }, - "CVE-2018-10881": { - "cmt_msg": "ext4: clear i_data in ext4_inode_info when removing inline data" + "CVE-2024-0607": { + "cmt_msg": "netfilter: nf_tables: fix pointer math issue in nft_byteorder_eval()" }, - "CVE-2018-10882": { - "cmt_msg": "ext4: add more inode number paranoia checks" + "CVE-2024-26801": { + "cmt_msg": "Bluetooth: Avoid potential use-after-free in hci_error_reset" }, - "CVE-2018-10883": { - "cmt_msg": "jbd2: don't mark block as modified if the handle is out of credits" - } - } - }, - "4.13": { - "4.13": { - "CVE-2017-11600": { - "cmt_msg": "xfrm: policy: check policy direction value", - "cmt_id": "7bab09631c2a303f87a7eb7e3d69e888673b9b7e" + "CVE-2022-28388": { + "cmt_msg": "can: usb_8dev: usb_8dev_start_xmit(): fix double dev_kfree_skb() in error path" }, - "CVE-2017-14497": { - "cmt_msg": "packet: Don't write vnet header beyond end of buffer", - "cmt_id": "edbd58be15a957f6a760c4a514cd475217eb97fd" + "CVE-2018-6412": { + "cmt_msg": "fbdev: Fixing arbitrary kernel leak in case FBIOGETCMAP_SPARC in sbusfb_ioctl_helper()." }, - "CVE-2017-7558": { - "cmt_msg": "sctp: Avoid out-of-bounds reads from address storage", - "cmt_id": "ee6c88bb754e3d363e568da78086adfedb692447" - } - }, - "4.13.2": { - "CVE-2017-14340": { - "cmt_msg": "xfs: XFS_IS_REALTIME_INODE() should be false if no rt device present", - "cmt_id": "24cb33252843e531194e78222af2d8afb75fac5f" + "CVE-2018-1000004": { + "cmt_msg": "ALSA: seq: Make ioctls race-free" }, - "CVE-2017-1000251": { - "cmt_msg": "Bluetooth: Properly check L2CAP config option output buffer length", - "cmt_id": "fb372097356d450b890aaadbfc45deecbe27e3e7" - } - }, - "4.13.4": { - "CVE-2017-16528": { - "cmt_msg": "ALSA: seq: Cancel pending autoload work at unbinding device", - "cmt_id": "2f3ab4a5fe065958f33d41bec352de4b4844dff5" + "CVE-2023-52607": { + "cmt_msg": "powerpc/mm: Fix null-pointer dereference in pgtable_cache_add" }, - "CVE-2017-14991": { - "cmt_msg": "scsi: sg: fixup infoleak when using SG_GET_REQUEST_TABLE", - "cmt_id": "9f62840e7fc648b0a55d089714484b704557c027" + "CVE-2019-20811": { + "cmt_msg": "net-sysfs: call dev_hold if kobject_init_and_add success" }, - "CVE-2017-14051": { - "cmt_msg": "scsi: qla2xxx: Fix an integer overflow in sysfs code", - "cmt_id": "bb8eb5376409be8e2f4e2d24a473d2c0a35aa38e" + "CVE-2019-20810": { + "cmt_msg": "media: go7007: fix a miss of snd_card_free" }, - "CVE-2017-0627": { - "cmt_msg": "media: uvcvideo: Prevent heap overflow when accessing mapped controls", - "cmt_id": "4185087177877b467df0b4aa08a128e7822542e2" - } - }, - "4.13.5": { - "CVE-2020-14353": { - "cmt_msg": "KEYS: prevent creating a different user's keyrings", - "cmt_id": "943f8697a9b3785a4b20a4b01816f11cccadfd0f" + "CVE-2019-20812": { + "cmt_msg": "af_packet: set defaule value for tmo" }, - "CVE-2017-14156": { - "cmt_msg": "video: fbdev: aty: do not leak uninitialized padding in clk to userspace", - "cmt_id": "fd7ea1828b0dc2a3501b403f4254e9b34ea8a8da" + "CVE-2018-1118": { + "cmt_msg": "vhost: fix info leak due to uninitialized memory" }, - "CVE-2017-12153": { - "cmt_msg": "nl80211: check for the required netlink attributes presence", - "cmt_id": "f0e85f56f70f172ada0d06b26baff47823695629" + "CVE-2019-18660": { + "cmt_msg": "powerpc/book3s64: Fix link stack flush on context switch" }, - "CVE-2017-1000252": { - "cmt_msg": "KVM: VMX: Do not BUG() on out-of-bounds guest IRQ", - "cmt_id": "c69768cc3eb4fb41a0f3c47c6d6575fd8ead57b7" + "CVE-2019-12380": { + "cmt_msg": "efi/x86/Add missing error handling to old_memmap 1:1 mapping code" }, - "CVE-2017-14954": { - "cmt_msg": "fix infoleak in waitid(2)", - "cmt_id": "c8b679ba7c65457e45af7c086c5df0748522aa2f" + "CVE-2019-12381": { + "cmt_msg": "ip_sockglue: Fix missing-check bug in ip_ra_control()" }, - "CVE-2017-12154": { - "cmt_msg": "kvm: nVMX: Don't allow L2 to access the hardware CR8", - "cmt_id": "27920625f93e59b2b24bdadf946ae4b61f885f40" + "CVE-2019-12382": { + "cmt_msg": "drm/edid: Fix a missing-check bug in drm_load_edid_firmware()" }, - "CVE-2017-18270": { - "cmt_msg": "KEYS: prevent creating a different user's keyrings", - "cmt_id": "943f8697a9b3785a4b20a4b01816f11cccadfd0f" + "CVE-2020-10766": { + "cmt_msg": "x86/speculation: Prevent rogue cross-process SSBD shutdown" }, - "CVE-2017-14489": { - "cmt_msg": "scsi: scsi_transport_iscsi: fix the issue that iscsi_if_rx doesn't parse nlmsg properly", - "cmt_id": "1fc547cd09e2d7295656fde40a34706448bf6098" + "CVE-2020-10767": { + "cmt_msg": "x86/speculation: Avoid force-disabling IBPB based on STIBP and enhanced IBRS." }, - "CVE-2018-1091": { - "cmt_msg": "powerpc/tm: Flush TM only if CPU has TM feature", - "cmt_id": "5075520e4b0b2ec8d21ae7a992e6a073e46c8507" + "CVE-2019-25162": { + "cmt_msg": "i2c: Fix a potential use after free" }, - "CVE-2017-12192": { - "cmt_msg": "KEYS: prevent KEYCTL_READ on negative key", - "cmt_id": "069276fabc8c6aef5c4f95442fef68138f5e8020" + "CVE-2019-25160": { + "cmt_msg": "netlabel: fix out-of-bounds memory accesses" }, - "CVE-2017-15537": { - "cmt_msg": "x86/fpu: Don't let userspace set bogus xcomp_bv", - "cmt_id": "7c6bcb52072cb117e7792dca856944f05182bd19" - } - }, - "4.13.6": { - "CVE-2017-0786": { - "cmt_msg": "brcmfmac: add length check in brcmf_cfg80211_escan_handler()", - "cmt_id": "1b9fff6661fe217d56c6257515c0effbe41d9ab7" + "CVE-2020-10768": { + "cmt_msg": "x86/speculation: PR_SPEC_FORCE_DISABLE enforcement for indirect branches." }, - "CVE-2017-16526": { - "cmt_msg": "uwb: properly check kthread_run return value", - "cmt_id": "6fd9ba4251e3ce1f6f69c60e4c13539b745a0f8a" + "CVE-2020-10769": { + "cmt_msg": "crypto: authenc - fix parsing key with misaligned rta_len" }, - "CVE-2017-15649": { - "cmt_msg": "packet: in packet_do_bind, test fanout with bind_lock held", - "cmt_id": "a5d0f35d810a531c971394b0ea5d8de417acfea5" + "CVE-2020-10942": { + "cmt_msg": "vhost: Check docket sk_family instead of call getname" }, - "CVE-2017-16531": { - "cmt_msg": "USB: fix out-of-bounds in usb_set_configuration", - "cmt_id": "31991559f483b33eb30b7fdb1219b3f78b616a27" + "CVE-2020-26139": { + "cmt_msg": "mac80211: do not accept/forward invalid EAPOL frames" }, - "CVE-2017-16530": { - "cmt_msg": "USB: uas: fix bug in handling of alternate settings", - "cmt_id": "468f2bf8e0d546479a935e67b4091cdb3c4a11e8" + "CVE-2019-19536": { + "cmt_msg": "can: peak_usb: pcan_usb_pro: Fix info-leaks to USB devices" }, - "CVE-2017-16534": { - "cmt_msg": "USB: core: harden cdc_parse_cdc_header", - "cmt_id": "7dddbeaf504434f37e041479af997b14b0f9ea0d" + "CVE-2019-19537": { + "cmt_msg": "USB: core: Fix races in character device registration and deregistraion" }, - "CVE-2017-16529": { - "cmt_msg": "ALSA: usb-audio: Check out-of-bounds access by corrupted buffer descriptor", - "cmt_id": "ee93eb98bc606a6c6dc37a04f6264ebb514117ab" + "CVE-2019-19534": { + "cmt_msg": "can: peak_usb: fix slab info leak" }, - "CVE-2018-9568": { - "cmt_msg": "net: Set sk_prot_creator when cloning sockets to the right proto", - "cmt_id": "401dfb4850a485e504a151a55e84836de77ac27b" + "CVE-2019-19535": { + "cmt_msg": "can: peak_usb: pcan_usb_fd: Fix info-leaks to USB devices" }, - "CVE-2017-1000255": { - "cmt_msg": "powerpc/64s: Use emergency stack for kernel TM Bad Thing program checks", - "cmt_id": "c654b8387692160ced6e4dcbb3eed888d6ce10cd" + "CVE-2020-11565": { + "cmt_msg": "mm: mempolicy: require at least one nodeid for MPOL_PREFERRED" }, - "CVE-2020-27067": { - "cmt_msg": "l2tp: fix l2tp_eth module loading", - "cmt_id": "d7a268ea8624115cd4b1ddd29fc410965e4b0950" + "CVE-2019-19533": { + "cmt_msg": "media: ttusb-dec: Fix info-leak in ttusb_dec_send_command()" }, - "CVE-2017-15126": { - "cmt_msg": "userfaultfd: non-cooperative: fix fork use after free", - "cmt_id": "8919b6a762bace82c4c7c04471561b1347c17a33" - } - }, - "4.13.7": { - "CVE-2017-5123": { - "cmt_msg": "waitid(): Add missing access_ok() checks", - "cmt_id": "3da54587cf4c1be7c26a8ae0b58313828b69638a" - } - }, - "4.13.8": { - "CVE-2017-16527": { - "cmt_msg": "ALSA: usb-audio: Kill stray URB at exiting", - "cmt_id": "fd7066e5e913ef8bf6e58c9af8a63cb09e05952f" + "CVE-2019-19530": { + "cmt_msg": "usb: cdc-acm: make sure a refcount is taken early enough" }, - "CVE-2017-16525": { - "cmt_msg": "USB: serial: console: fix use-after-free after failed setup", - "cmt_id": "e21045a223959d469174629614028136b202a586" + "CVE-2019-19531": { + "cmt_msg": "usb: yurex: Fix use-after-free in yurex_delete" }, - "CVE-2017-16533": { - "cmt_msg": "HID: usbhid: fix out-of-bounds bug", - "cmt_id": "984154e7eef1f9e543dabd7422cfc99015778732" + "CVE-2017-18257": { + "cmt_msg": "f2fs: fix a dead loop in f2fs_fiemap()" }, - "CVE-2017-12188": { - "cmt_msg": "KVM: nVMX: update last_nonleaf_level when initializing nested EPT", - "cmt_id": "a75ac6b475ae817f4006b511b8eb2d1fbe6a5713" + "CVE-2017-18255": { + "cmt_msg": "perf/core: Fix the perf_cpu_time_max_percent check" }, - "CVE-2017-15265": { - "cmt_msg": "ALSA: seq: Fix use-after-free at creating a port", - "cmt_id": "71c766e18dd3f321bd450ec7c0c20643b2c4b74e" + "CVE-2023-52527": { + "cmt_msg": "ipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data()" }, - "CVE-2017-12190": { - "cmt_msg": "fix unbalanced page refcounting in bio_map_user_iov", - "cmt_id": "ffe1d63bc4570ee980a59996667c296c5be7252e" - } - }, - "4.13.10": { - "CVE-2017-15299": { - "cmt_msg": "KEYS: don't let add_key() update an uninstantiated key", - "cmt_id": "24a33a0c96f3e976c18e4321ca09f71cb835a9b5" + "CVE-2023-3006": { + "cmt_msg": "arm64: Add AMPERE1 to the Spectre-BHB affected list" }, - "CVE-2017-16535": { - "cmt_msg": "USB: core: fix out-of-bounds access bug in usb_get_bos_descriptor()", - "cmt_id": "775462fd5c5378957e5165c898e2fa532ebf4234" + "CVE-2023-52522": { + "cmt_msg": "net: fix possible store tearing in neigh_periodic_work()" }, - "CVE-2017-15951": { - "cmt_msg": "KEYS: Fix race between updating and finding a negative key", - "cmt_id": "f45b8fe12221c178ce708b1c9d634634f2261802" - } - }, - "4.13.11": { - "CVE-2017-16939": { - "cmt_msg": "ipsec: Fix aborted xfrm policy dump crash", - "cmt_id": "20d17a2d1347b3754acfc395c7c57a068fc84d40" + "CVE-2019-8912": { + "cmt_msg": "net: crypto set sk to NULL when af_alg_release." }, - "CVE-2017-16643": { - "cmt_msg": "Input: gtco - fix potential out-of-bound access", - "cmt_id": "8d3736faa7f7e438fab0cd28a31c0dc4eea552b8" + "CVE-2023-52528": { + "cmt_msg": "net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg" }, - "CVE-2017-12193": { - "cmt_msg": "assoc_array: Fix a buggy node-splitting case", - "cmt_id": "ca6711747c5a1434219ae0bd6745864a618f68b3" + "CVE-2020-0305": { + "cmt_msg": "chardev: Avoid potential use-after-free in 'chrdev_open()'" }, - "CVE-2017-15306": { - "cmt_msg": "KVM: PPC: Fix oops when checking KVM_CAP_PPC_HTM", - "cmt_id": "3f3414599f110c8dce4e0b0d51502fc8c07517d7" - } - }, - "4.13.12": { - "CVE-2017-15128": { - "cmt_msg": "userfaultfd: hugetlbfs: prevent UFFDIO_COPY to fill beyond the end of i_size", - "cmt_id": "c14ee6986103f9232c99de035a996547faba6371" - } - }, - "4.13.14": { - "CVE-2017-13080": { - "cmt_msg": "mac80211: accept key reinstall without changing anything", - "cmt_id": "a9ab1b2e30e898440a22d7b1d7a5b0b7c6a8791f" + "CVE-2023-39198": { + "cmt_msg": "drm/qxl: fix UAF on handle creation" }, - "CVE-2017-16645": { - "cmt_msg": "Input: ims-psu - check if CDC union descriptor is sane", - "cmt_id": "cf87b5de4473fdc0735c27ef719abb2e0a6964bb" + "CVE-2023-39194": { + "cmt_msg": "net: xfrm: Fix xfrm_address_filter OOB read" }, - "CVE-2018-7191": { - "cmt_msg": "tun: call dev_get_valid_name() before register_netdevice()", - "cmt_id": "aa9ab97c4d79b29727344f9c77d673743bbe35cb" + "CVE-2023-39197": { + "cmt_msg": "netfilter: conntrack: dccp: copy entire header to stack buffer, not just basic one" }, - "CVE-2017-16532": { - "cmt_msg": "usb: usbtest: fix NULL pointer dereference", - "cmt_id": "19ab6908533107d0a18048a7d8262eb74f5c05cb" - } - }, - "4.13.15": { - "CVE-2017-16646": { - "cmt_msg": "media: dib0700: fix invalid dvb_detach argument", - "cmt_id": "02a260a31257c653af31570faf4e07ad3dbe81f9" + "CVE-2023-39193": { + "cmt_msg": "netfilter: xt_sctp: validate the flag_info count" }, - "CVE-2017-16537": { - "cmt_msg": "media: imon: Fix null-ptr-deref in imon_probe", - "cmt_id": "442cc6c4c54fdeb402a425b37265a09c5d393af3" - } - }, - "4.13.16": { - "CVE-2017-18204": { - "cmt_msg": "ocfs2: should wait dio before inode lock in ocfs2_setattr()", - "cmt_id": "ccb2cca45acfd1f34bdb19d8ef5e409af40f2533" + "CVE-2023-39192": { + "cmt_msg": "netfilter: xt_u32: validate user space input" }, - "CVE-2017-16647": { - "cmt_msg": "net: usb: asix: fill null-ptr-deref in asix_suspend", - "cmt_id": "f93b123370688313fb3624aa7cb3ebfc6019c24e" + "CVE-2024-26600": { + "cmt_msg": "phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP" }, - "CVE-2017-16994": { - "cmt_msg": "mm/pagewalk.c: report holes in hugetlb ranges", - "cmt_id": "cd21766d6fb1b25bdc85d6541646b1dcf8a8cb52" + "CVE-2024-26606": { + "cmt_msg": "binder: signal epoll threads of self-work" }, - "CVE-2017-16650": { - "cmt_msg": "net: qmi_wwan: fix divide by 0 on bad descriptors", - "cmt_id": "dcf3cdb7b7603b7b09c1beb7bccf227e64b0f07f" + "CVE-2017-14156": { + "cmt_msg": "video: fbdev: aty: do not leak uninitialized padding in clk to userspace" }, - "CVE-2017-16649": { - "cmt_msg": "net: cdc_ether: fix divide by 0 on bad descriptors", - "cmt_id": "f99427bc5d83e5c8546560c006effa91592cfcc4" + "CVE-2023-52429": { + "cmt_msg": "dm: limit the number of targets and parameter size area" }, - "CVE-2017-15115": { - "cmt_msg": "sctp: do not peel off an assoc from one netns to another one", - "cmt_id": "22f767973fb024036d8a9c2878035bdc6c5d1e6d" - } - }, - "outstanding": { - "CVE-2020-36322": { - "cmt_msg": "fuse: fix bad inode" + "CVE-2022-1652": { + "cmt_msg": "floppy: use a statically allocated error counter" }, - "CVE-2020-10711": { - "cmt_msg": "netlabel: cope with NULL catmap" + "CVE-2020-29568": { + "cmt_msg": "xen/xenbus: Allow watches discard events before queueing" }, - "CVE-2019-15090": { - "cmt_msg": "scsi: qedi: remove memset/memcpy to nfunc and use func instead" + "CVE-2016-8660": { + "cmt_msg": "" }, - "CVE-2022-3649": { - "cmt_msg": "nilfs2: fix use-after-free bug of struct nilfs_root" + "CVE-2020-14314": { + "cmt_msg": "ext4: fix potential negative array index in do_split()" }, - "CVE-2020-35501": { + "CVE-2019-13272": { + "cmt_msg": "ptrace: Fix ->ptracer_cred handling for PTRACE_TRACEME" + }, + "CVE-2022-1786": { + "cmt_msg": "io_uring: remove io_identity" + }, + "CVE-2020-25669": { + "cmt_msg": "Input: sunkbd - avoid use-after-free in teardown paths" + }, + "CVE-2020-25668": { + "cmt_msg": "tty: make FONTX ioctl use the tty pointer they were actually passed" + }, + "CVE-2008-4609": { "cmt_msg": "" }, - "CVE-2019-15098": { - "cmt_msg": "ath6kl: fix a NULL-ptr-deref bug in ath6kl_usb_alloc_urb_from_pipe()" + "CVE-2022-0435": { + "cmt_msg": "tipc: improve size validations for received domain records" }, - "CVE-2020-29368": { - "cmt_msg": "mm: thp: make the THP mapcount atomic against __split_huge_pmd_locked()" + "CVE-2023-26607": { + "cmt_msg": "ntfs: fix out-of-bounds read in ntfs_attr_find()" }, - "CVE-2017-17806": { - "cmt_msg": "crypto: hmac - require that the underlying hash algorithm is unkeyed" + "CVE-2021-4037": { + "cmt_msg": "xfs: fix up non-directory creation in SGID directories" }, - "CVE-2022-0001": { - "cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE" + "CVE-2021-22543": { + "cmt_msg": "KVM: do not allow mapping valid but non-reference-counted pages" }, - "CVE-2020-12464": { - "cmt_msg": "USB: core: Fix free-while-in-use bug in the USB S-Glibrary" + "CVE-2018-18386": { + "cmt_msg": "n_tty: fix EXTPROC vs ICANON interaction with TIOCINQ (aka FIONREAD)" }, - "CVE-2021-45469": { - "cmt_msg": "f2fs: fix to do sanity check on last xattr entry in __f2fs_setxattr()" + "CVE-2021-47169": { + "cmt_msg": "serial: rp2: use 'request_firmware' instead of 'request_firmware_nowait'" }, - "CVE-2019-19965": { - "cmt_msg": "scsi: libsas: stop discovering if oob mode is disconnected" + "CVE-2023-3776": { + "cmt_msg": "net/sched: cls_fw: Fix improper refcount update leads to use-after-free" }, - "CVE-2019-19966": { - "cmt_msg": "media: cpia2: Fix use-after-free in cpia2_exit" + "CVE-2017-9242": { + "cmt_msg": "ipv6: fix out of bound writes in __ip6_append_data()" }, - "CVE-2022-42703": { - "cmt_msg": "mm/rmap: Fix anon_vma->degree ambiguity leading to double-reuse" + "CVE-2023-3772": { + "cmt_msg": "xfrm: add NULL check in xfrm_update_ae_params" }, - "CVE-2020-35508": { - "cmt_msg": "fork: fix copy_process(CLONE_PARENT) race with the exiting ->real_parent" + "CVE-2022-3533": { + "cmt_msg": "" }, - "CVE-2021-3894": { - "cmt_msg": "sctp: account stream padding length for reconf chunk" + "CVE-2022-3534": { + "cmt_msg": "libbpf: Fix use-after-free in btf_dump_name_dups" }, - "CVE-2020-24587": { - "cmt_msg": "mac80211: prevent mixed key and fragment cache attacks" + "CVE-2021-4149": { + "cmt_msg": "btrfs: unlock newly allocated extent buffer after error" }, - "CVE-2020-24586": { - "cmt_msg": "mac80211: prevent mixed key and fragment cache attacks" + "CVE-2022-21385": { + "cmt_msg": "net/rds: fix warn in rds_message_alloc_sgs" }, - "CVE-2017-1000410": { - "cmt_msg": "Bluetooth: Prevent stack info leak from the EFS element." + "CVE-2021-47180": { + "cmt_msg": "NFC: nci: fix memory leak in nci_allocate_device" }, - "CVE-2023-6270": { - "cmt_msg": "" + "CVE-2020-28097": { + "cmt_msg": "vgacon: remove software scrollback support" }, - "CVE-2021-0129": { - "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical" + "CVE-2017-7533": { + "cmt_msg": "dentry name snapshots" }, - "CVE-2019-20096": { - "cmt_msg": "dccp: Fix memleak in __feat_register_sp" + "CVE-2018-8897": { + "cmt_msg": "x86/entry/64: Don't use IST entry for #BP stack" }, - "CVE-2022-47520": { - "cmt_msg": "wifi: wilc1000: validate pairwise and authentication suite offsets" + "CVE-2020-14416": { + "cmt_msg": "can, slip: Protect tty->disc_data in write_wakeup and close with RCU" }, - "CVE-2023-5717": { - "cmt_msg": "perf: Disallow mis-matched inherited group reads" + "CVE-2021-46928": { + "cmt_msg": "parisc: Clear stale IIR value on instruction access rights trap" + }, + "CVE-2018-14634": { + "cmt_msg": "exec: Limit arg stack to at most 75% of _STK_LIM" + }, + "CVE-2018-14633": { + "cmt_msg": "scsi: target: iscsi: Use hex2bin instead of a re-implementation" + }, + "CVE-2021-46924": { + "cmt_msg": "NFC: st21nfca: Fix memory leak in device probe and remove" + }, + "CVE-2021-46926": { + "cmt_msg": "ALSA: hda: intel-sdw-acpi: harden detection of controller" + }, + "CVE-2023-1206": { + "cmt_msg": "tcp: Reduce chance of collisions in inet6_hashfn()." + }, + "CVE-2022-3649": { + "cmt_msg": "nilfs2: fix use-after-free bug of struct nilfs_root" + }, + "CVE-2022-3646": { + "cmt_msg": "nilfs2: fix leak of nilfs_root in case of writer thread creation failure" + }, + "CVE-2022-3642": { + "cmt_msg": "" }, "CVE-2022-3643": { "cmt_msg": "xen/netback: Ensure protocol headers don't fall in the non-linear area" }, - "CVE-2018-10940": { - "cmt_msg": "cdrom: information leak in cdrom_ioctl_media_changed()" + "CVE-2021-1048": { + "cmt_msg": "fix regression in \"epoll: Keep a reference on files added to the check list\"" }, - "CVE-2022-32250": { - "cmt_msg": "netfilter: nf_tables: disallow non-stateful expression in sets earlier" + "CVE-2020-0543": { + "cmt_msg": "x86/cpu: Add 'table' argument to cpu_matches()" }, - "CVE-2019-9506": { - "cmt_msg": "Bluetooth: Fix faulty expression for minimum encryption key size check" + "CVE-2024-25739": { + "cmt_msg": "" }, - "CVE-2019-9500": { - "cmt_msg": "brcmfmac: assure SSID length from firmware is limited" + "CVE-2023-6535": { + "cmt_msg": "" }, - "CVE-2019-9503": { - "cmt_msg": "brcmfmac: add subtype check for event handling in data path" + "CVE-2023-6536": { + "cmt_msg": "nvmet-tcp: fix a crash in nvmet_req_complete()" }, - "CVE-2020-36158": { - "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_cmd_802_11_ad_hoc_start" + "CVE-2020-15780": { + "cmt_msg": "ACPI: configfs: Disallow loading ACPI tables when locked down" }, - "CVE-2023-3159": { - "cmt_msg": "firewire: fix potential uaf in outbound_phy_packet_callback()" + "CVE-2019-11815": { + "cmt_msg": "net: rds: force to destroy connection if t_sock is NULL in rds_tcp_kill_sock()." }, - "CVE-2022-0480": { - "cmt_msg": "memcg: enable accounting for file lock caches" + "CVE-2022-36280": { + "cmt_msg": "drm/vmwgfx: Validate the box size for the snooped cursor" }, - "CVE-2020-16166": { - "cmt_msg": "random32: update the net random state on interrupt and activity" + "CVE-2024-21803": { + "cmt_msg": "" }, - "CVE-2022-0487": { - "cmt_msg": "moxart: fix potential use-after-free on remove path" + "CVE-2018-7995": { + "cmt_msg": "x86/MCE: Serialize sysfs changes" }, - "CVE-2023-52429": { - "cmt_msg": "dm: limit the number of targets and parameter size area" + "CVE-2018-16276": { + "cmt_msg": "USB: yurex: fix out-of-bounds uaccess in read handler" }, - "CVE-2021-28964": { - "cmt_msg": "btrfs: fix race when cloning extent buffer during rewind of an old root" + "CVE-2023-2176": { + "cmt_msg": "RDMA/core: Refactor rdma_bind_addr" }, - "CVE-2020-26558": { - "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical" + "CVE-2019-16413": { + "cmt_msg": "9p: use inode->i_lock to protect i_size_write() under 32-bit" }, - "CVE-2024-26595": { - "cmt_msg": "mlxsw: spectrum_acl_tcam: Fix NULL pointer dereference in error path" + "CVE-2019-7222": { + "cmt_msg": "KVM: x86: work around leak of uninitialized stack contents (CVE-2019-7222)" }, - "CVE-2022-23825": { - "cmt_msg": "" + "CVE-2019-7221": { + "cmt_msg": "KVM: nVMX: unconditionally cancel preemption timer in free_nested (CVE-2019-7221)" }, - "CVE-2021-3847": { - "cmt_msg": "" + "CVE-2020-10773": { + "cmt_msg": "s390/cmm: fix information leak in cmm_timeout_handler()" }, - "CVE-2021-42252": { - "cmt_msg": "soc: aspeed: lpc-ctrl: Fix boundary check for mmap" + "CVE-2020-36780": { + "cmt_msg": "i2c: sprd: fix reference leak when pm_runtime_get_sync fails" }, - "CVE-2018-20784": { - "cmt_msg": "sched/fair: Fix infinite loop in update_blocked_averages() by reverting a9e7f6544b9c" + "CVE-2018-18281": { + "cmt_msg": "mremap: properly flush TLB before releasing the page" }, - "CVE-2019-10124": { - "cmt_msg": "mm: hwpoison: fix thp split handing in soft_offline_in_use_page()" + "CVE-2022-2663": { + "cmt_msg": "netfilter: nf_conntrack_irc: Fix forged IP logic" }, - "CVE-2019-9245": { - "cmt_msg": "f2fs: sanity check of xattr entry size" + "CVE-2024-26803": { + "cmt_msg": "net: veth: clear GRO when clearing XDP even when down" }, - "CVE-2024-26588": { - "cmt_msg": "LoongArch: BPF: Prevent out-of-bounds memory access" + "CVE-2020-25643": { + "cmt_msg": "hdlc_ppp: add range checks in ppp_cp_parse_cr()" }, - "CVE-2023-2162": { - "cmt_msg": "scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress" + "CVE-2020-4788": { + "cmt_msg": "powerpc/64s: flush L1D on kernel entry" }, - "CVE-2022-21125": { - "cmt_msg": "x86/speculation/mmio: Reuse SRBDS mitigation for SBDS" + "CVE-2021-39698": { + "cmt_msg": "wait: add wake_up_pollfree()" }, - "CVE-2019-19241": { - "cmt_msg": "io_uring: async workers should inherit the user creds" + "CVE-2018-5333": { + "cmt_msg": "RDS: null pointer dereference in rds_atomic_free_op" }, - "CVE-2022-40307": { - "cmt_msg": "efi: capsule-loader: Fix use-after-free in efi_capsule_write" + "CVE-2018-5332": { + "cmt_msg": "RDS: Heap OOB write in rds_message_alloc_sgs()" }, - "CVE-2022-21123": { - "cmt_msg": "x86/speculation/mmio: Add mitigation for Processor MMIO Stale Data" + "CVE-2021-3759": { + "cmt_msg": "memcg: enable accounting of ipc resources" }, - "CVE-2023-3390": { - "cmt_msg": "netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE" + "CVE-2019-19528": { + "cmt_msg": "USB: iowarrior: fix use-after-free on disconnect" }, - "CVE-2021-28688": { - "cmt_msg": "xen-blkback: don't leak persistent grants from xen_blkbk_map()" + "CVE-2017-17448": { + "cmt_msg": "netfilter: nfnetlink_cthelper: Add missing permission checks" }, - "CVE-2021-39686": { - "cmt_msg": "binder: use euid from cred instead of using task" + "CVE-2017-17449": { + "cmt_msg": "netlink: Add netns check on taps" }, - "CVE-2021-39685": { - "cmt_msg": "USB: gadget: detect too-big endpoint 0 requests" + "CVE-2019-19525": { + "cmt_msg": "ieee802154: atusb: fix use-after-free at disconnect" }, - "CVE-2023-6535": { - "cmt_msg": "" + "CVE-2019-19524": { + "cmt_msg": "Input: ff-memless - kill timer in destroy()" }, - "CVE-2021-43975": { - "cmt_msg": "atlantic: Fix OOB read and write in hw_atl_utils_fw_rpc_wait" + "CVE-2019-19527": { + "cmt_msg": "HID: hiddev: do cleanup in failure of opening a device" }, - "CVE-2018-6927": { - "cmt_msg": "futex: Prevent overflow by strengthen input validation" + "CVE-2021-3753": { + "cmt_msg": "vt_kdsetmode: extend console locking" }, - "CVE-2020-0466": { - "cmt_msg": "do_epoll_ctl(): clean the failure exits up a bit" + "CVE-2021-3752": { + "cmt_msg": "Bluetooth: fix use-after-free error in lock_sock_nested()" }, - "CVE-2019-10207": { - "cmt_msg": "Bluetooth: hci_uart: check for missing tty operations" + "CVE-2023-7192": { + "cmt_msg": "netfilter: ctnetlink: fix possible refcount leak in ctnetlink_create_conntrack()" }, - "CVE-2019-14835": { - "cmt_msg": "vhost: make sure log_num < in_num" + "CVE-2017-18249": { + "cmt_msg": "f2fs: fix race condition in between free nid allocator/initializer" }, - "CVE-2023-0459": { - "cmt_msg": "uaccess: Add speculation barrier to copy_from_user()" + "CVE-2022-1263": { + "cmt_msg": "KVM: avoid NULL pointer dereference in kvm_dirty_ring_push" }, - "CVE-2023-0458": { - "cmt_msg": "prlimit: do_prlimit needs to have a speculation check" + "CVE-2017-18241": { + "cmt_msg": "f2fs: fix a panic caused by NULL flush_cmd_control" }, - "CVE-2020-26141": { - "cmt_msg": "ath10k: Fix TKIP Michael MIC verification for PCIe" + "CVE-2021-41864": { + "cmt_msg": "bpf: Fix integer overflow in prealloc_elems_and_freelist()" }, - "CVE-2018-1000204": { - "cmt_msg": "scsi: sg: allocate with __GFP_ZERO in sg_build_indirect()" + "CVE-2019-15215": { + "cmt_msg": "media: cpia2_usb: first wake up, then free in disconnect" }, - "CVE-2023-0597": { - "cmt_msg": "x86/mm: Randomize per-cpu entry area" + "CVE-2022-2209": { + "cmt_msg": "" }, - "CVE-2019-12379": { - "cmt_msg": "consolemap: Fix a memory leaking bug in drivers/tty/vt/consolemap.c" + "CVE-2023-7042": { + "cmt_msg": "wifi: ath10k: fix NULL pointer dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev()" }, - "CVE-2019-12378": { - "cmt_msg": "ipv6_sockglue: Fix a missing-check bug in ip6_ra_control()" + "CVE-2023-52559": { + "cmt_msg": "iommu/vt-d: Avoid memory allocation in iommu_suspend()" }, - "CVE-2021-3744": { - "cmt_msg": "crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd()" + "CVE-2023-47233": { + "cmt_msg": "wifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach" }, - "CVE-2021-30002": { - "cmt_msg": "media: v4l: ioctl: Fix memory leak in video_usercopy" + "CVE-2022-1462": { + "cmt_msg": "tty: use new tty_insert_flip_string_and_push_buffer() in pty_write()" }, - "CVE-2017-17450": { - "cmt_msg": "netfilter: xt_osf: Add missing permission checks" + "CVE-2024-26614": { + "cmt_msg": "tcp: make sure init the accept_queue's spinlocks once" }, - "CVE-2021-0941": { - "cmt_msg": "bpf: Remove MTU check in __bpf_skb_max_len" + "CVE-2019-20636": { + "cmt_msg": "Input: add safety guards to input_set_keycode()" }, - "CVE-2022-2586": { - "cmt_msg": "netfilter: nf_tables: do not allow SET_ID to refer to another table" + "CVE-2023-52435": { + "cmt_msg": "net: prevent mss overflow in skb_segment()" }, - "CVE-2024-26591": { - "cmt_msg": "bpf: Fix re-attachment branch in bpf_tracing_prog_attach" + "CVE-2023-52434": { + "cmt_msg": "smb: client: fix potential OOBs in smb2_parse_contexts()" }, - "CVE-2020-15802": { + "CVE-2023-52436": { + "cmt_msg": "f2fs: explicitly null-terminate the xattr list" + }, + "CVE-2023-51779": { + "cmt_msg": "Bluetooth: af_bluetooth: Fix Use-After-Free in bt_sock_recvmsg" + }, + "CVE-2018-10877": { + "cmt_msg": "ext4: verify the depth of extent tree in ext4_find_extent()" + }, + "CVE-2018-10876": { + "cmt_msg": "ext4: only look at the bg_flags field if it is valid" + }, + "CVE-2010-4563": { "cmt_msg": "" }, - "CVE-2023-6610": { - "cmt_msg": "smb: client: fix potential OOB in smb2_dump_detail()" + "CVE-2023-2162": { + "cmt_msg": "scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress" }, - "CVE-2023-2483": { - "cmt_msg": "net: qcom/emac: Fix use after free bug in emac_remove due to race condition" + "CVE-2018-10879": { + "cmt_msg": "ext4: make sure bitmaps and the inode table don't overlap with bg descriptors" }, - "CVE-2017-18379": { - "cmt_msg": "nvmet-fc: ensure target queue id within range." + "CVE-2019-14835": { + "cmt_msg": "vhost: make sure log_num < in_num" }, - "CVE-2022-3636": { - "cmt_msg": "net: ethernet: mtk_eth_soc: use after free in __mtk_ppe_check_skb()" + "CVE-2023-4622": { + "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES" }, - "CVE-2022-3635": { - "cmt_msg": "atm: idt77252: fix use-after-free bugs caused by tst_timer" + "CVE-2023-4623": { + "cmt_msg": "net/sched: sch_hfsc: Ensure inner classes have fsc curve" }, - "CVE-2022-0002": { - "cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE" + "CVE-2019-0146": { + "cmt_msg": "i40e: add num_vectors checker in iwarp handler" }, - "CVE-2021-34556": { - "cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4" + "CVE-2021-38300": { + "cmt_msg": "bpf, mips: Validate conditional branch offsets" }, - "CVE-2020-0543": { - "cmt_msg": "x86/cpu: Add 'table' argument to cpu_matches()" + "CVE-2020-25656": { + "cmt_msg": "vt: keyboard, extend func_buf_lock to readers" }, - "CVE-2022-40982": { - "cmt_msg": "x86/speculation: Add Gather Data Sampling mitigation" + "CVE-2021-4023": { + "cmt_msg": "io-wq: fix cancellation on create-worker failure" }, - "CVE-2021-28714": { - "cmt_msg": "xen/netback: fix rx queue stall detection" + "CVE-2018-3693": { + "cmt_msg": "ext4: fix spectre gadget in ext4_mb_regular_allocator()" }, - "CVE-2022-3202": { - "cmt_msg": "jfs: prevent NULL deref in diFree" + "CVE-2021-22555": { + "cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write" }, - "CVE-2018-3646": { - "cmt_msg": "x86/microcode: Allow late microcode loading with SMT disabled" + "CVE-2023-3161": { + "cmt_msg": "fbcon: Check font dimension limits" }, - "CVE-2019-11085": { - "cmt_msg": "drm/i915/gvt: Fix mmap range check" + "CVE-2018-7191": { + "cmt_msg": "tun: call dev_get_valid_name() before register_netdevice()" }, - "CVE-2024-24861": { - "cmt_msg": "" + "CVE-2018-10675": { + "cmt_msg": "mm/mempolicy: fix use after free when calling get_mempolicy" }, - "CVE-2019-11477": { - "cmt_msg": "tcp: limit payload size of sacked skbs" + "CVE-2017-0786": { + "cmt_msg": "brcmfmac: add length check in brcmf_cfg80211_escan_handler()" }, - "CVE-2021-28711": { - "cmt_msg": "xen/blkfront: harden blkfront against event channel storms" + "CVE-2021-47082": { + "cmt_msg": "tun: avoid double free in tun_free_netdev" }, - "CVE-2018-14614": { - "cmt_msg": "f2fs: fix to do sanity check with cp_pack_start_sum" + "CVE-2021-47083": { + "cmt_msg": "pinctrl: mediatek: fix global-out-of-bounds issue" }, - "CVE-2019-11479": { - "cmt_msg": "tcp: add tcp_min_snd_mss sysctl" + "CVE-2021-31916": { + "cmt_msg": "dm ioctl: fix out of bounds array access when no devices" }, - "CVE-2019-11478": { - "cmt_msg": "tcp: tcp_fragment() should apply sane memory limits" + "CVE-2021-47086": { + "cmt_msg": "phonet/pep: refuse to enable an unbound pipe" }, - "CVE-2018-14611": { - "cmt_msg": "btrfs: validate type when reading a chunk" + "CVE-2023-32269": { + "cmt_msg": "netrom: Fix use-after-free caused by accept on already connected socket" }, - "CVE-2018-14610": { - "cmt_msg": "btrfs: Check that each block group has corresponding chunk at mount time" + "CVE-2021-4157": { + "cmt_msg": "pNFS/flexfiles: fix incorrect size check in decode_nfs_fh()" }, - "CVE-2018-14613": { - "cmt_msg": "btrfs: tree-checker: Verify block_group_item" + "CVE-2021-4155": { + "cmt_msg": "xfs: map unwritten blocks in XFS_IOC_{ALLOC,FREE}SP just like fallocate" }, - "CVE-2018-14612": { - "cmt_msg": "btrfs: tree-checker: Detect invalid and empty essential trees" + "CVE-2021-4150": { + "cmt_msg": "block: fix incorrect references to disk objects" }, - "CVE-2020-26145": { - "cmt_msg": "ath10k: drop fragments with multicast DA for PCIe" + "CVE-2021-4159": { + "cmt_msg": "bpf: Verifer, adjust_scalar_min_max_vals to always call update_reg_bounds()" }, - "CVE-2017-13216": { - "cmt_msg": "staging: android: ashmem: fix a race condition in ASHMEM_SET_SIZE ioctl" + "CVE-2021-29154": { + "cmt_msg": "bpf, x86: Validate computation of branch displacements for x86-64" }, - "CVE-2020-26147": { - "cmt_msg": "mac80211: assure all fragments are encrypted" + "CVE-2021-29155": { + "cmt_msg": "bpf: Use correct permission flag for mixed signed bounds arithmetic" }, - "CVE-2018-19854": { - "cmt_msg": "crypto: user - fix leaking uninitialized memory to userspace" + "CVE-2019-3016": { + "cmt_msg": "x86/kvm: Be careful not to clear KVM_VCPU_FLUSH_TLB bit" }, - "CVE-2020-26140": { - "cmt_msg": "" + "CVE-2022-25375": { + "cmt_msg": "usb: gadget: rndis: check size of RNDIS_MSG_SET command" }, - "CVE-2020-26143": { + "CVE-2021-47158": { + "cmt_msg": "net: dsa: sja1105: add error handling in sja1105_setup()" + }, + "CVE-2021-47159": { + "cmt_msg": "net: dsa: fix a crash if ->get_sset_count() fails" + }, + "CVE-2021-47153": { + "cmt_msg": "i2c: i801: Don't generate an interrupt on bus reset" + }, + "CVE-2021-47150": { + "cmt_msg": "net: fec: fix the potential memory leak in fec_enet_init()" + }, + "CVE-2021-47151": { + "cmt_msg": "interconnect: qcom: bcm-voter: add a missing of_node_put()" + }, + "CVE-2021-46936": { + "cmt_msg": "net: fix use-after-free in tw_timer_handler" + }, + "CVE-2021-46933": { + "cmt_msg": "usb: gadget: f_fs: Clear ffs_eventfd in ffs_data_clear." + }, + "CVE-2021-46932": { + "cmt_msg": "Input: appletouch - initialize work before device registration" + }, + "CVE-2021-46939": { + "cmt_msg": "tracing: Restructure trace_clock_global() to never block" + }, + "CVE-2021-46938": { + "cmt_msg": "dm rq: fix double free of blk_mq_tag_set in dev remove after table load fails" + }, + "CVE-2018-16862": { + "cmt_msg": "mm: cleancache: fix corruption on missed inode invalidation" + }, + "CVE-2024-26623": { + "cmt_msg": "pds_core: Prevent race issues involving the adminq" + }, + "CVE-2018-16884": { + "cmt_msg": "sunrpc: use-after-free in svc_process_common()" + }, + "CVE-2022-45885": { "cmt_msg": "" }, - "CVE-2020-26142": { + "CVE-2022-45884": { "cmt_msg": "" }, - "CVE-2019-17053": { - "cmt_msg": "ieee802154: enforce CAP_NET_RAW for raw sockets" + "CVE-2022-45887": { + "cmt_msg": "media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb()" }, - "CVE-2019-17052": { - "cmt_msg": "ax25: enforce CAP_NET_RAW for raw sockets" + "CVE-2022-45886": { + "cmt_msg": "media: dvb-core: Fix use-after-free due on race condition at dvb_net" }, - "CVE-2023-1076": { - "cmt_msg": "tun: tun_chr_open(): correctly initialize socket uid" + "CVE-2024-25744": { + "cmt_msg": "x86/coco: Disable 32-bit emulation by default on TDX and SEV" }, - "CVE-2023-1077": { - "cmt_msg": "sched/rt: pick_next_rt_entity(): check list_entry" + "CVE-2023-1855": { + "cmt_msg": "hwmon: (xgene) Fix use after free bug in xgene_hwmon_remove due to race condition" }, - "CVE-2020-27418": { - "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region" + "CVE-2015-2877": { + "cmt_msg": "" }, - "CVE-2019-17056": { - "cmt_msg": "nfc: enforce CAP_NET_RAW for raw sockets" + "CVE-2023-37454": { + "cmt_msg": "" }, - "CVE-2019-17055": { - "cmt_msg": "mISDN: enforce CAP_NET_RAW for raw sockets" + "CVE-2018-1130": { + "cmt_msg": "dccp: check sk for closed state in dccp_sendmsg()" }, - "CVE-2019-17054": { - "cmt_msg": "appletalk: enforce CAP_NET_RAW for raw sockets" + "CVE-2021-45486": { + "cmt_msg": "inet: use bigger hash table for IP ID generation" }, - "CVE-2018-13093": { - "cmt_msg": "xfs: validate cached inodes are free when allocated" + "CVE-2021-3506": { + "cmt_msg": "f2fs: fix to avoid out-of-bounds memory access" }, - "CVE-2018-13096": { - "cmt_msg": "f2fs: fix to do sanity check with node footer and iblocks" + "CVE-2020-14331": { + "cmt_msg": "vgacon: Fix for missing check in scrollback handling" }, - "CVE-2018-13097": { - "cmt_msg": "f2fs: fix to do sanity check with user_block_count" + "CVE-2022-36123": { + "cmt_msg": "x86: Clear .brk area at early boot" }, - "CVE-2018-13094": { - "cmt_msg": "xfs: don't call xfs_da_shrink_inode with NULL bp" + "CVE-2019-19532": { + "cmt_msg": "HID: Fix assumption that devices have inputs" }, - "CVE-2018-13095": { - "cmt_msg": "xfs: More robust inode extent count validation" + "CVE-2020-36558": { + "cmt_msg": "vt: vt_ioctl: fix race in VT_RESIZEX" }, - "CVE-2020-29661": { - "cmt_msg": "tty: Fix ->pgrp locking in tiocspgrp()" + "CVE-2018-13100": { + "cmt_msg": "f2fs: fix to do sanity check with secs_per_zone" }, - "CVE-2020-29660": { - "cmt_msg": "tty: Fix ->session locking" + "CVE-2020-36158": { + "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_cmd_802_11_ad_hoc_start" }, - "CVE-2018-13098": { - "cmt_msg": "f2fs: fix to do sanity check with extra_attr feature" + "CVE-2022-40307": { + "cmt_msg": "efi: capsule-loader: Fix use-after-free in efi_capsule_write" }, - "CVE-2018-13099": { - "cmt_msg": "f2fs: fix to do sanity check with reserved blkaddr of inline inode" + "CVE-2021-39686": { + "cmt_msg": "binder: use euid from cred instead of using task" }, - "CVE-2022-1734": { - "cmt_msg": "nfc: nfcmrvl: main: reorder destructive operations in nfcmrvl_nci_unregister_dev to avoid bugs" + "CVE-2021-39685": { + "cmt_msg": "USB: gadget: detect too-big endpoint 0 requests" }, - "CVE-2021-38300": { - "cmt_msg": "bpf, mips: Validate conditional branch offsets" + "CVE-2018-1000204": { + "cmt_msg": "scsi: sg: allocate with __GFP_ZERO in sg_build_indirect()" }, - "CVE-2023-28772": { - "cmt_msg": "seq_buf: Fix overflow in seq_buf_putmem_hex()" + "CVE-2017-12134": { + "cmt_msg": "xen: fix bio vec merging" }, - "CVE-2019-14895": { - "cmt_msg": "mwifiex: fix possible heap overflow in mwifiex_process_country_ie()" + "CVE-2017-17450": { + "cmt_msg": "netfilter: xt_osf: Add missing permission checks" }, - "CVE-2019-19770": { - "cmt_msg": "blktrace: fix debugfs use after free" + "CVE-2024-26592": { + "cmt_msg": "ksmbd: fix UAF issue in ksmbd_tcp_new_connection()" }, - "CVE-2022-2588": { - "cmt_msg": "net_sched: cls_route: remove from list when handle is 0" + "CVE-2024-26594": { + "cmt_msg": "ksmbd: validate mech token in session setup" }, - "CVE-2019-11884": { - "cmt_msg": "Bluetooth: hidp: fix buffer overflow" + "CVE-2023-2483": { + "cmt_msg": "net: qcom/emac: Fix use after free bug in emac_remove due to race condition" }, - "CVE-2020-15780": { - "cmt_msg": "ACPI: configfs: Disallow loading ACPI tables when locked down" + "CVE-2017-18270": { + "cmt_msg": "KEYS: prevent creating a different user's keyrings" }, - "CVE-2019-19075": { - "cmt_msg": "ieee802154: ca8210: prevent memory leak" + "CVE-2024-26598": { + "cmt_msg": "KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache" }, - "CVE-2019-19074": { - "cmt_msg": "ath9k: release allocated buffer if timed out" + "CVE-2018-3646": { + "cmt_msg": "x86/microcode: Allow late microcode loading with SMT disabled" }, - "CVE-2019-18683": { - "cmt_msg": "media: vivid: Fix wrong locking that causes race conditions on streaming stop" + "CVE-2023-2002": { + "cmt_msg": "bluetooth: Perform careful capability checks in hci_sock_ioctl()" }, - "CVE-2022-2503": { - "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag" + "CVE-2022-29900": { + "cmt_msg": "x86/kvm/vmx: Make noinstr clean" }, - "CVE-2022-48619": { - "cmt_msg": "Input: add bounds checking to input_set_capability()" + "CVE-2023-2007": { + "cmt_msg": "scsi: dpt_i2o: Remove obsolete driver" }, - "CVE-2019-18680": { - "cmt_msg": "" + "CVE-2022-1419": { + "cmt_msg": "drm/vgem: Close use-after-free race in vgem_gem_create" + }, + "CVE-2017-16913": { + "cmt_msg": "usbip: fix stub_rx: harden CMD_SUBMIT path to handle malicious input" + }, + "CVE-2022-2503": { + "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag" }, "CVE-2022-23038": { "cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()" @@ -9118,59 +9007,26 @@ "CVE-2022-23039": { "cmt_msg": "xen/gntalloc: don't use gnttab_query_foreign_access()" }, - "CVE-2021-27363": { - "cmt_msg": "scsi: iscsi: Restrict sessions and handles to admin capabilities" - }, - "CVE-2022-20158": { - "cmt_msg": "net/packet: fix slab-out-of-bounds access in packet_recvmsg()" + "CVE-2022-23036": { + "cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()" }, "CVE-2022-23037": { "cmt_msg": "xen/netfront: don't use gnttab_query_foreign_access() for mapped status" }, - "CVE-2024-0564": { - "cmt_msg": "" - }, - "CVE-2020-0404": { - "cmt_msg": "media: uvcvideo: Avoid cyclic entity chains due to malformed USB descriptors" - }, - "CVE-2018-10840": { - "cmt_msg": "ext4: correctly handle a zero-length xattr with a non-zero e_value_offs" - }, - "CVE-2019-15924": { - "cmt_msg": "fm10k: Fix a potential NULL pointer dereference" - }, "CVE-2019-15538": { "cmt_msg": "xfs: fix missing ILOCK unlock when xfs_setattr_nonsize fails due to EDQUOT" }, - "CVE-2019-15926": { - "cmt_msg": "ath6kl: add some bounds checking" - }, - "CVE-2019-15921": { - "cmt_msg": "genetlink: Fix a memory leak on error path" - }, "CVE-2019-14821": { "cmt_msg": "KVM: coalesced_mmio: add bounds checking" }, "CVE-2020-12826": { "cmt_msg": "signal: Extend exec_id to 64bits" }, - "CVE-2019-3701": { - "cmt_msg": "can: gw: ensure DLC boundaries after CAN frame modification" - }, "CVE-2021-42008": { "cmt_msg": "net: 6pack: fix slab-out-of-bounds in decode_data" }, - "CVE-2022-39188": { - "cmt_msg": "mmu_gather: Force tlb-flush VM_PFNMAP vmas" - }, - "CVE-2018-20511": { - "cmt_msg": "net/appletalk: fix minor pointer leak to userspace in SIOCFINDIPDDPRT" - }, - "CVE-2019-1125": { - "cmt_msg": "x86/speculation: Prepare entry code for Spectre v1 swapgs mitigations" - }, - "CVE-2019-15218": { - "cmt_msg": "media: usb: siano: Fix general protection fault in smsusb" + "CVE-2020-25645": { + "cmt_msg": "geneve: add transport ports in route lookup for geneve" }, "CVE-2019-15666": { "cmt_msg": "xfrm: policy: Fix out-of-bound array accesses in __xfrm_policy_unlink" @@ -9178,2078 +9034,2196 @@ "CVE-2020-25641": { "cmt_msg": "block: allow for_each_bvec to support zero len bvec" }, - "CVE-2005-3660": { - "cmt_msg": "" + "CVE-2021-33034": { + "cmt_msg": "Bluetooth: verify AMP hci_chan before amp_destroy" }, - "CVE-2019-15212": { - "cmt_msg": "USB: rio500: refuse more than one device at a time" + "CVE-2021-33033": { + "cmt_msg": "cipso,calipso: resolve a number of problems with the DOI refcounts" }, - "CVE-2019-15211": { - "cmt_msg": "media: radio-raremono: change devm_k*alloc to k*alloc" + "CVE-2017-18509": { + "cmt_msg": "ipv6: check sk sk_type and protocol early in ip_mroute_set/getsockopt" }, - "CVE-2023-31084": { - "cmt_msg": "media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*()" + "CVE-2017-11600": { + "cmt_msg": "xfrm: policy: check policy direction value" }, - "CVE-2019-15217": { - "cmt_msg": "media: usb:zr364xx:Fix KASAN:null-ptr-deref Read in zr364xx_vidioc_querycap" + "CVE-2024-26625": { + "cmt_msg": "llc: call sock_orphan() at release time" }, - "CVE-2019-15216": { - "cmt_msg": "USB: yurex: Fix protection fault after device removal" + "CVE-2024-26627": { + "cmt_msg": "scsi: core: Move scsi_host_busy() out of host lock for waking up EH handler" }, - "CVE-2019-15215": { - "cmt_msg": "media: cpia2_usb: first wake up, then free in disconnect" + "CVE-2024-26622": { + "cmt_msg": "tomoyo: fix UAF write bug in tomoyo_write_control()" }, - "CVE-2019-15214": { - "cmt_msg": "ALSA: core: Fix card races between register and disconnect" + "CVE-2024-22386": { + "cmt_msg": "" }, - "CVE-2020-24588": { - "cmt_msg": "cfg80211: mitigate A-MSDU aggregation attacks" + "CVE-2018-10021": { + "cmt_msg": "scsi: libsas: defer ata device eh commands to libata" }, - "CVE-2021-33034": { - "cmt_msg": "Bluetooth: verify AMP hci_chan before amp_destroy" + "CVE-2017-18221": { + "cmt_msg": "mlock: fix mlock count can not decrease in race condition" }, - "CVE-2019-19922": { - "cmt_msg": "sched/fair: Fix low cpu usage with high throttling by removing expiration of cpu-local slices" + "CVE-2019-10126": { + "cmt_msg": "mwifiex: Fix heap overflow in mwifiex_uap_parse_tail_ies()" }, - "CVE-2021-33033": { - "cmt_msg": "cipso,calipso: resolve a number of problems with the DOI refcounts" + "CVE-2019-10124": { + "cmt_msg": "mm: hwpoison: fix thp split handing in soft_offline_in_use_page()" }, - "CVE-2019-19927": { - "cmt_msg": "drm/ttm: fix incrementing the page pointer for huge pages" + "CVE-2020-13974": { + "cmt_msg": "vt: keyboard: avoid signed integer overflow in k_ascii" }, - "CVE-2020-27066": { - "cmt_msg": "xfrm: policy: Fix doulbe free in xfrm_policy_timer" + "CVE-2018-10938": { + "cmt_msg": "Cipso: cipso_v4_optptr enter infinite loop" }, - "CVE-2020-27068": { - "cmt_msg": "cfg80211: add missing policy for NL80211_ATTR_STATUS_CODE" + "CVE-2020-15437": { + "cmt_msg": "serial: 8250: fix null-ptr-deref in serial8250_start_tx()" }, - "CVE-2022-3521": { - "cmt_msg": "kcm: avoid potential race in kcm_tx_work" + "CVE-2020-15436": { + "cmt_msg": "block: Fix use-after-free in blkdev_get()" }, - "CVE-2020-8648": { - "cmt_msg": "vt: selection, close sel_buffer race" + "CVE-2021-47065": { + "cmt_msg": "rtw88: Fix array overrun in rtw_get_tx_power_params()" }, - "CVE-2022-32296": { - "cmt_msg": "tcp: increase source port perturb table to 2^16" + "CVE-2022-23816": { + "cmt_msg": "x86/kvm/vmx: Make noinstr clean" }, - "CVE-2017-0861": { - "cmt_msg": "ALSA: pcm: prevent UAF in snd_pcm_info" + "CVE-2021-47145": { + "cmt_msg": "btrfs: do not BUG_ON in link_to_fixup_dir" }, - "CVE-2023-3567": { - "cmt_msg": "vc_screen: move load of struct vc_data pointer in vcs_read() to avoid UAF" + "CVE-2021-47149": { + "cmt_msg": "net: fujitsu: fix potential null-ptr-deref" }, - "CVE-2019-20806": { - "cmt_msg": "media: tw5864: Fix possible NULL pointer dereference in tw5864_handle_frame" + "CVE-2018-19407": { + "cmt_msg": "KVM: X86: Fix scan ioapic use-before-initialization" }, - "CVE-2022-3028": { - "cmt_msg": "af_key: Do not call xfrm_probe_algs in parallel" + "CVE-2021-47144": { + "cmt_msg": "drm/amd/amdgpu: fix refcount leak" }, - "CVE-2020-0305": { - "cmt_msg": "chardev: Avoid potential use-after-free in 'chrdev_open()'" + "CVE-2021-47147": { + "cmt_msg": "ptp: ocp: Fix a resource leak in an error handling path" }, - "CVE-2020-14304": { - "cmt_msg": "" + "CVE-2021-47146": { + "cmt_msg": "mld: fix panic in mld_newpack()" }, - "CVE-2010-5321": { - "cmt_msg": "" + "CVE-2021-47140": { + "cmt_msg": "iommu/amd: Clear DMA ops when switching domain" }, - "CVE-2020-15393": { - "cmt_msg": "usb: usbtest: fix missing kfree(dev->buf) in usbtest_disconnect" + "CVE-2021-47143": { + "cmt_msg": "net/smc: remove device from smcd_dev_list after failed device_add()" }, - "CVE-2022-33981": { - "cmt_msg": "floppy: disable FDRAWCMD by default" + "CVE-2021-47142": { + "cmt_msg": "drm/amdgpu: Fix a use-after-free" }, - "CVE-2021-3564": { - "cmt_msg": "Bluetooth: fix the erroneous flush_work() order" + "CVE-2024-26765": { + "cmt_msg": "LoongArch: Disable IRQ before init_fn() for nonboot CPUs" }, - "CVE-2023-3611": { - "cmt_msg": "net/sched: sch_qfq: account for stab overhead in qfq_enqueue" + "CVE-2018-16871": { + "cmt_msg": "nfsd: COPY and CLONE operations require the saved filehandle to be set" }, - "CVE-2023-1476": { - "cmt_msg": "" + "CVE-2018-16658": { + "cmt_msg": "cdrom: Fix info leak/OOB read in cdrom_ioctl_drive_status" }, - "CVE-2017-16995": { - "cmt_msg": "bpf: fix incorrect sign extension in check_alu_op()" + "CVE-2019-19036": { + "cmt_msg": "btrfs: Detect unbalanced tree with empty leaf before crashing btree operations" }, - "CVE-2019-18675": { - "cmt_msg": "mmap: introduce sane default mmap limits" + "CVE-2017-8797": { + "cmt_msg": "nfsd: fix undefined behavior in nfsd4_layout_verify" }, - "CVE-2019-2025": { - "cmt_msg": "binder: fix race that allows malicious free of live buffer" + "CVE-2021-32078": { + "cmt_msg": "ARM: footbridge: remove personal server platform" }, - "CVE-2020-26560": { - "cmt_msg": "" + "CVE-2022-4662": { + "cmt_msg": "USB: core: Prevent nested device-reset calls" }, - "CVE-2022-38096": { - "cmt_msg": "" + "CVE-2019-11833": { + "cmt_msg": "ext4: zero out the unused memory region in the extent tree block" }, - "CVE-2018-18397": { - "cmt_msg": "userfaultfd: use ENOENT instead of EFAULT if the atomic copy user fails" + "CVE-2020-27835": { + "cmt_msg": "IB/hfi1: Ensure correct mm is used at all times" }, - "CVE-2018-12127": { - "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" + "CVE-2018-5953": { + "cmt_msg": "printk: hash addresses printed with %p" }, - "CVE-2018-12126": { - "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" + "CVE-2018-1128": { + "cmt_msg": "libceph: add authorizer challenge" }, - "CVE-2022-23816": { - "cmt_msg": "x86/kvm/vmx: Make noinstr clean" + "CVE-2018-1129": { + "cmt_msg": "libceph: implement CEPHX_V2 calculation mode" }, - "CVE-2023-37454": { - "cmt_msg": "" + "CVE-2018-1120": { + "cmt_msg": "proc: do not access cmdline nor environ from file-backed areas" }, - "CVE-2021-3892": { + "CVE-2018-1121": { "cmt_msg": "" }, - "CVE-2022-20572": { - "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag" + "CVE-2018-20856": { + "cmt_msg": "block: blk_init_allocated_queue() set q->fq as NULL in the fail case" }, - "CVE-2018-10021": { - "cmt_msg": "scsi: libsas: defer ata device eh commands to libata" + "CVE-2022-3061": { + "cmt_msg": "video: fbdev: i740fb: Error out if 'pixclock' equals zero" }, - "CVE-2022-20132": { - "cmt_msg": "HID: add hid_is_usb() function to make it simpler for USB detection" + "CVE-2020-27784": { + "cmt_msg": "usb: gadget: function: printer: fix use-after-free in __lock_acquire" }, - "CVE-2019-2024": { - "cmt_msg": "media: em28xx: Fix use-after-free when disconnecting" + "CVE-2020-27786": { + "cmt_msg": "ALSA: rawmidi: Fix racy buffer resize under concurrent accesses" }, - "CVE-2023-39194": { - "cmt_msg": "net: xfrm: Fix xfrm_address_filter OOB read" + "CVE-2023-6240": { + "cmt_msg": "" }, - "CVE-2023-2002": { - "cmt_msg": "bluetooth: Perform careful capability checks in hci_sock_ioctl()" + "CVE-2022-39842": { + "cmt_msg": "video: fbdev: pxa3xx-gcu: Fix integer overflow in pxa3xx_gcu_write" }, - "CVE-2023-39197": { - "cmt_msg": "netfilter: conntrack: dccp: copy entire header to stack buffer, not just basic one" + "CVE-2023-51043": { + "cmt_msg": "drm/atomic: Fix potential use-after-free in nonblocking commits" }, - "CVE-2019-10126": { - "cmt_msg": "mwifiex: Fix heap overflow in mwifiex_uap_parse_tail_ies()" + "CVE-2024-23196": { + "cmt_msg": "ALSA: hda: fix a possible null-pointer dereference due to data race in snd_hdac_regmap_sync()" }, - "CVE-2023-52443": { - "cmt_msg": "apparmor: avoid crash when parsed profile name is empty" + "CVE-2017-16939": { + "cmt_msg": "ipsec: Fix aborted xfrm policy dump crash" }, - "CVE-2019-13631": { - "cmt_msg": "Input: gtco - bounds check collection indent level" + "CVE-2021-26931": { + "cmt_msg": "xen-blkback: don't \"handle\" error by BUG()" }, - "CVE-2020-13974": { - "cmt_msg": "vt: keyboard: avoid signed integer overflow in k_ascii" + "CVE-2021-26930": { + "cmt_msg": "xen-blkback: fix error handling in xen_blkbk_map()" }, - "CVE-2021-4083": { - "cmt_msg": "fget: check that the fd still exists after getting a ref to it" + "CVE-2021-26932": { + "cmt_msg": "Xen/x86: don't bail early from clear_foreign_p2m_mapping()" }, - "CVE-2023-33288": { - "cmt_msg": "power: supply: bq24190: Fix use after free bug in bq24190_remove due to race condition" + "CVE-2022-36402": { + "cmt_msg": "drm/vmwgfx: Fix shader stage validation" }, - "CVE-2017-17558": { - "cmt_msg": "USB: core: prevent malicious bNumInterfaces overflow" + "CVE-2021-3178": { + "cmt_msg": "nfsd4: readdirplus shouldn't return parent of export" }, - "CVE-2022-29900": { - "cmt_msg": "x86/kvm/vmx: Make noinstr clean" + "CVE-2023-1611": { + "cmt_msg": "btrfs: fix race between quota disable and quota assign ioctls" }, - "CVE-2022-29901": { - "cmt_msg": "x86/kvm/vmx: Make noinstr clean" + "CVE-2021-3772": { + "cmt_msg": "sctp: use init_tag from inithdr for ABORT chunk" }, - "CVE-2018-12233": { - "cmt_msg": "jfs: Fix inconsistency between memory allocation and ea_buf->max_size" + "CVE-2021-34556": { + "cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4" }, - "CVE-2018-12232": { - "cmt_msg": "socket: close race condition between sock_close() and sockfs_setattr()" + "CVE-2021-28714": { + "cmt_msg": "xen/netback: fix rx queue stall detection" }, - "CVE-2020-10751": { - "cmt_msg": "selinux: properly handle multiple messages in selinux_netlink_send()" + "CVE-2021-28713": { + "cmt_msg": "xen/console: harden hvc_xen against event channel storms" }, - "CVE-2023-39192": { - "cmt_msg": "netfilter: xt_u32: validate user space input" + "CVE-2021-28712": { + "cmt_msg": "xen/netfront: harden netfront against event channel storms" }, - "CVE-2022-23042": { - "cmt_msg": "xen/netfront: react properly to failing gnttab_end_foreign_access_ref()" + "CVE-2021-28711": { + "cmt_msg": "xen/blkfront: harden blkfront against event channel storms" }, - "CVE-2020-10757": { - "cmt_msg": "mm: Fix mremap not considering huge pmd devmap" + "CVE-2022-1247": { + "cmt_msg": "" }, - "CVE-2018-9465": { - "cmt_msg": "binder: fix proc->files use-after-free" + "CVE-2022-2991": { + "cmt_msg": "remove the lightnvm subsystem" }, - "CVE-2018-20510": { - "cmt_msg": "binder: replace \"%p\" with \"%pK\"" + "CVE-2017-11473": { + "cmt_msg": "x86/acpi: Prevent out of bound access caused by broken ACPI tables" }, - "CVE-2022-20166": { - "cmt_msg": "drivers core: Use sysfs_emit and sysfs_emit_at for show(device *...) functions" + "CVE-2017-11472": { + "cmt_msg": "ACPICA: Namespace: fix operand cache leak" }, - "CVE-2019-14763": { - "cmt_msg": "usb: dwc3: gadget: never call ->complete() from ->ep_queue()" + "CVE-2017-17862": { + "cmt_msg": "bpf: fix branch pruning logic" }, - "CVE-2020-15437": { - "cmt_msg": "serial: 8250: fix null-ptr-deref in serial8250_start_tx()" + "CVE-2017-17863": { + "cmt_msg": "bpf: fix integer overflows" }, - "CVE-2020-15436": { - "cmt_msg": "block: Fix use-after-free in blkdev_get()" + "CVE-2023-52578": { + "cmt_msg": "net: bridge: use DEV_STATS_INC()" }, - "CVE-2022-1116": { - "cmt_msg": "" + "CVE-2023-52574": { + "cmt_msg": "team: fix null-ptr-deref when team device type is changed" }, - "CVE-2021-28660": { - "cmt_msg": "staging: rtl8188eu: prevent ->ssid overflow in rtw_wx_set_scan()" + "CVE-2023-3567": { + "cmt_msg": "vc_screen: move load of struct vc_data pointer in vcs_read() to avoid UAF" }, - "CVE-2024-0775": { - "cmt_msg": "ext4: improve error recovery code paths in __ext4_remount()" + "CVE-2023-52571": { + "cmt_msg": "power: supply: rk817: Fix node refcount leak" }, - "CVE-2020-8647": { - "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region" + "CVE-2023-52572": { + "cmt_msg": "cifs: Fix UAF in cifs_demultiplex_thread()" }, - "CVE-2022-3564": { - "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free caused by l2cap_reassemble_sdu" + "CVE-2017-14340": { + "cmt_msg": "xfs: XFS_IS_REALTIME_INODE() should be false if no rt device present" }, - "CVE-2019-0155": { - "cmt_msg": "drm/i915: Rename gen7 cmdparser tables" + "CVE-2019-19039": { + "cmt_msg": "btrfs: Don't submit any btree write bio if the fs has errors" }, - "CVE-2019-0154": { - "cmt_msg": "drm/i915: Lower RM timeout to avoid DSI hard hangs" + "CVE-2018-10902": { + "cmt_msg": "ALSA: rawmidi: Change resized buffers atomically" }, - "CVE-2023-35827": { - "cmt_msg": "ravb: Fix use-after-free issue in ravb_tx_timeout_work()" + "CVE-2018-10853": { + "cmt_msg": "kvm: x86: use correct privilege level for sgdt/sidt/fxsave/fxrstor access" }, - "CVE-2020-36386": { - "cmt_msg": "Bluetooth: Fix slab-out-of-bounds read in hci_extended_inquiry_result_evt()" + "CVE-2020-12362": { + "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" }, - "CVE-2022-3567": { - "cmt_msg": "ipv6: Fix data races around sk->sk_prot." + "CVE-2020-12363": { + "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" }, - "CVE-2022-3566": { - "cmt_msg": "tcp: Fix data races around icsk->icsk_af_ops." + "CVE-2019-12881": { + "cmt_msg": "drm/i915/userptr: reject zero user_size" }, - "CVE-2022-3565": { - "cmt_msg": "mISDN: fix use-after-free bugs in l1oip timer handlers" + "CVE-2022-4129": { + "cmt_msg": "l2tp: Serialize access to sk_user_data with sk_callback_lock" }, - "CVE-2022-33740": { - "cmt_msg": "xen/netfront: fix leaking data in shared pages" + "CVE-2020-12364": { + "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" }, - "CVE-2018-19407": { - "cmt_msg": "KVM: X86: Fix scan ioapic use-before-initialization" + "CVE-2023-33203": { + "cmt_msg": "net: qcom/emac: Fix use after free bug in emac_remove due to race condition" }, - "CVE-2021-20317": { - "cmt_msg": "lib/timerqueue: Rely on rbtree semantics for next timer" + "CVE-2021-4002": { + "cmt_msg": "hugetlbfs: flush TLBs correctly after huge_pmd_unshare" }, - "CVE-2020-36385": { - "cmt_msg": "RDMA/ucma: Rework ucma_migrate_id() to avoid races with destroy" + "CVE-2023-26545": { + "cmt_msg": "net: mpls: fix stale pointer if allocation fails during device rename" }, - "CVE-2022-3628": { - "cmt_msg": "wifi: brcmfmac: Fix potential buffer overflow in brcmf_fweh_event_worker()" + "CVE-2019-15292": { + "cmt_msg": "appletalk: Fix use-after-free in atalk_proc_exit" }, - "CVE-2018-9385": { - "cmt_msg": "ARM: amba: Don't read past the end of sysfs \"driver_override\" buffer" + "CVE-2019-15291": { + "cmt_msg": "media: b2c2-flexcop-usb: add sanity checking" }, - "CVE-2020-0009": { - "cmt_msg": "staging: android: ashmem: Disallow ashmem memory from being remapped" + "CVE-2019-15290": { + "cmt_msg": "" }, - "CVE-2023-52340": { - "cmt_msg": "ipv6: remove max_size check inline with ipv4" + "CVE-2023-3212": { + "cmt_msg": "gfs2: Don't deref jdesc in evict" }, - "CVE-2023-20588": { - "cmt_msg": "x86/CPU/AMD: Do not leak quotient data after a division by 0" + "CVE-2017-9211": { + "cmt_msg": "crypto: skcipher - Add missing API setkey checks" }, - "CVE-2023-28466": { - "cmt_msg": "net: tls: fix possible race condition between do_tls_getsockopt_conf() and do_tls_setsockopt_conf()" + "CVE-2024-26633": { + "cmt_msg": "ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim()" }, - "CVE-2019-14615": { - "cmt_msg": "drm/i915/gen9: Clear residual context state on context switch" + "CVE-2024-26636": { + "cmt_msg": "llc: make llc_ui_sendmsg() more robust against bonding changes" }, - "CVE-2018-16871": { - "cmt_msg": "nfsd: COPY and CLONE operations require the saved filehandle to be set" + "CVE-2024-26635": { + "cmt_msg": "llc: Drop support for ETH_P_TR_802_2." }, - "CVE-2018-9415": { - "cmt_msg": "ARM: amba: Fix race condition with driver_override" + "CVE-2020-12769": { + "cmt_msg": "spi: spi-dw: Add lock protect dw_spi rx/tx to prevent concurrent calls" }, - "CVE-2019-13648": { - "cmt_msg": "powerpc/tm: Fix oops on sigreturn on systems without TM" + "CVE-2017-8890": { + "cmt_msg": "dccp/tcp: do not inherit mc_list from parent" }, - "CVE-2023-0030": { - "cmt_msg": "drm/nouveau/mmu: add more general vmm free/node handling functions" + "CVE-2023-52635": { + "cmt_msg": "PM / devfreq: Synchronize devfreq_monitor_[start/stop]" }, - "CVE-2020-16120": { - "cmt_msg": "ovl: switch to mounter creds in readdir" + "CVE-2023-52634": { + "cmt_msg": "drm/amd/display: Fix disable_otg_wa logic" }, - "CVE-2019-11599": { - "cmt_msg": "coredump: fix race condition between mmget_not_zero()/get_task_mm() and core dumping" + "CVE-2023-2860": { + "cmt_msg": "ipv6: sr: fix out-of-bounds read when setting HMAC data." }, - "CVE-2018-16658": { - "cmt_msg": "cdrom: Fix info leak/OOB read in cdrom_ioctl_drive_status" + "CVE-2017-18208": { + "cmt_msg": "mm/madvise.c: fix madvise() infinite loop under special circumstances" }, - "CVE-2018-15572": { - "cmt_msg": "x86/speculation: Protect against userspace-userspace spectreRSB" + "CVE-2017-1000364": { + "cmt_msg": "mm: larger stack guard gap, between vmas" }, - "CVE-2022-1204": { - "cmt_msg": "ax25: Fix refcount leaks caused by ax25_cb_del()" + "CVE-2017-1000365": { + "cmt_msg": "fs/exec.c: account for argv/envp pointers" }, - "CVE-2019-2101": { - "cmt_msg": "media: uvcvideo: Fix 'type' check leading to overflow" + "CVE-2020-13143": { + "cmt_msg": "USB: gadget: fix illegal array access in binding with UDC" }, - "CVE-2019-17666": { - "cmt_msg": "rtlwifi: Fix potential overflow on P2P code" + "CVE-2017-1000363": { + "cmt_msg": "char: lp: fix possible integer overflow in lp_setup()" }, - "CVE-2021-23133": { - "cmt_msg": "net/sctp: fix race condition in sctp_destroy_sock" + "CVE-2022-3903": { + "cmt_msg": "media: mceusb: Use new usb_control_msg_*() routines" }, - "CVE-2018-9363": { - "cmt_msg": "Bluetooth: hidp: buffer overflow in hidp_process_report" + "CVE-2018-20449": { + "cmt_msg": "printk: hash addresses printed with %p" }, - "CVE-2018-15471": { - "cmt_msg": "xen-netback: fix input validation in xenvif_set_hash_mapping()" + "CVE-2017-15299": { + "cmt_msg": "KEYS: don't let add_key() update an uninstantiated key" }, - "CVE-2016-10723": { - "cmt_msg": "mm, oom: remove sleep from under oom_lock" + "CVE-2021-47179": { + "cmt_msg": "NFSv4: Fix a NULL pointer dereference in pnfs_mark_matching_lsegs_return()" }, - "CVE-2019-19036": { - "cmt_msg": "btrfs: Detect unbalanced tree with empty leaf before crashing btree operations" + "CVE-2019-11191": { + "cmt_msg": "x86: Deprecate a.out support" }, - "CVE-2019-3459": { - "cmt_msg": "Bluetooth: Verify that l2cap_get_conf_opt provides large enough buffer" + "CVE-2021-47170": { + "cmt_msg": "USB: usbfs: Don't WARN about excessively large memory allocations" }, - "CVE-2020-11494": { - "cmt_msg": "slcan: Don't transmit uninitialized stack data in padding" + "CVE-2021-47171": { + "cmt_msg": "net: usb: fix memory leak in smsc75xx_bind" }, - "CVE-2019-19039": { - "cmt_msg": "btrfs: Don't submit any btree write bio if the fs has errors" + "CVE-2021-47172": { + "cmt_msg": "iio: adc: ad7124: Fix potential overflow due to non sequential channel numbers" }, - "CVE-2020-0444": { - "cmt_msg": "audit: fix error handling in audit_data_to_entry()" + "CVE-2021-47173": { + "cmt_msg": "misc/uss720: fix memory leak in uss720_probe" }, - "CVE-2022-1974": { - "cmt_msg": "nfc: replace improper check device_is_registered() in netlink related functions" + "CVE-2021-47175": { + "cmt_msg": "net/sched: fq_pie: fix OOB access in the traffic path" }, - "CVE-2020-8832": { - "cmt_msg": "drm/i915: Record the default hw state after reset upon load" + "CVE-2018-10323": { + "cmt_msg": "xfs: set format back to extents if xfs_bmap_extents_to_btree" }, - "CVE-2022-1419": { - "cmt_msg": "drm/vgem: Close use-after-free race in vgem_gem_create" + "CVE-2018-10322": { + "cmt_msg": "xfs: enhance dinode verifier" }, - "CVE-2022-1836": { - "cmt_msg": "floppy: disable FDRAWCMD by default" + "CVE-2021-46951": { + "cmt_msg": "tpm: efi: Use local variable for calculating final log size" }, - "CVE-2020-8834": { - "cmt_msg": "KVM: PPC: Book3S HV: Factor fake-suspend handling out of kvmppc_save/restore_tm" - }, - "CVE-2021-32078": { - "cmt_msg": "ARM: footbridge: remove personal server platform" - }, - "CVE-2022-30594": { - "cmt_msg": "ptrace: Check PTRACE_O_SUSPEND_SECCOMP permission on PTRACE_SEIZE" + "CVE-2021-46950": { + "cmt_msg": "md/raid1: properly indicate failure when ending a failed write request" }, - "CVE-2022-4662": { - "cmt_msg": "USB: core: Prevent nested device-reset calls" - }, - "CVE-2019-11833": { - "cmt_msg": "ext4: zero out the unused memory region in the extent tree block" - }, - "CVE-2021-38205": { - "cmt_msg": "net: xilinx_emaclite: Do not print real IOMEM pointer" + "CVE-2021-46952": { + "cmt_msg": "NFS: fs_context: validate UDP retrans to prevent shift out-of-bounds" }, - "CVE-2020-27835": { - "cmt_msg": "IB/hfi1: Ensure correct mm is used at all times" + "CVE-2021-46959": { + "cmt_msg": "spi: Fix use-after-free with devm_spi_alloc_*" }, - "CVE-2020-27830": { - "cmt_msg": "speakup: Reject setting the speakup line discipline outside of speakup" + "CVE-2017-18193": { + "cmt_msg": "f2fs: fix a bug caused by NULL extent tree" }, - "CVE-2020-0255": { - "cmt_msg": "selinux: properly handle multiple messages in selinux_netlink_send()" + "CVE-2023-5178": { + "cmt_msg": "nvmet-tcp: Fix a possible UAF in queue intialization setup" }, - "CVE-2019-2215": { - "cmt_msg": "ANDROID: binder: remove waitqueue when thread exits." + "CVE-2021-0929": { + "cmt_msg": "staging/android/ion: delete dma_buf->kmap/unmap implemenation" }, - "CVE-2023-35001": { - "cmt_msg": "netfilter: nf_tables: prevent OOB access in nft_byteorder_eval" + "CVE-2018-19985": { + "cmt_msg": "USB: hso: Fix OOB memory access in hso_probe/hso_get_config_data" }, - "CVE-2022-27666": { - "cmt_msg": "esp: Fix possible buffer overflow in ESP transformation" + "CVE-2021-0920": { + "cmt_msg": "af_unix: fix garbage collect vs MSG_PEEK" }, - "CVE-2021-38208": { - "cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect" + "CVE-2023-0615": { + "cmt_msg": "media: vivid: dev->bitmap_cap wasn't freed in all cases" }, - "CVE-2018-1108": { - "cmt_msg": "random: fix crng_ready() test" + "CVE-2022-3586": { + "cmt_msg": "sch_sfb: Don't assume the skb is still around after enqueueing to child" }, - "CVE-2017-18232": { - "cmt_msg": "scsi: libsas: direct call probe and destruct" + "CVE-2020-27825": { + "cmt_msg": "tracing: Fix race in trace_open and buffer resize call" }, - "CVE-2019-2213": { - "cmt_msg": "binder: fix possible UAF when freeing buffer" + "CVE-2019-2181": { + "cmt_msg": "binder: check for overflow when alloc for security context" }, - "CVE-2023-3338": { - "cmt_msg": "Remove DECnet support from kernel" + "CVE-2019-2182": { + "cmt_msg": "arm64: Enforce BBM for huge IO/VMAP mappings" }, - "CVE-2020-25211": { - "cmt_msg": "netfilter: ctnetlink: add a range check for l3/l4 protonum" + "CVE-2020-27820": { + "cmt_msg": "drm/nouveau: use drm_dev_unplug() during device removal" }, - "CVE-2018-5953": { - "cmt_msg": "printk: hash addresses printed with %p" + "CVE-2023-6610": { + "cmt_msg": "smb: client: fix potential OOB in smb2_dump_detail()" }, - "CVE-2020-26556": { + "CVE-2023-1476": { "cmt_msg": "" }, - "CVE-2018-9518": { - "cmt_msg": "NFC: llcp: Limit size of SDP URI" + "CVE-2023-1670": { + "cmt_msg": "xirc2ps_cs: Fix use after free bug in xirc2ps_detach" }, - "CVE-2020-26555": { - "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical" + "CVE-2020-14351": { + "cmt_msg": "perf/core: Fix race in the perf_mmap_close() function" }, - "CVE-2018-9517": { - "cmt_msg": "l2tp: pass tunnel pointer to ->session_create()" + "CVE-2020-14353": { + "cmt_msg": "KEYS: prevent creating a different user's keyrings" }, - "CVE-2018-9516": { - "cmt_msg": "HID: debug: check length before copy_to_user()" + "CVE-2020-0429": { + "cmt_msg": "l2tp: fix race between l2tp_session_delete() and l2tp_tunnel_closeall()" }, - "CVE-2023-3397": { - "cmt_msg": "" + "CVE-2020-14356": { + "cmt_msg": "cgroup: fix cgroup_sk_alloc() for sk_clone_lock()" }, - "CVE-2018-1128": { - "cmt_msg": "libceph: add authorizer challenge" + "CVE-2022-20132": { + "cmt_msg": "HID: add hid_is_usb() function to make it simpler for USB detection" }, - "CVE-2018-1129": { - "cmt_msg": "libceph: implement CEPHX_V2 calculation mode" + "CVE-2023-6270": { + "cmt_msg": "aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts" }, - "CVE-2018-1087": { - "cmt_msg": "kvm/x86: fix icebp instruction handling" + "CVE-2023-1582": { + "cmt_msg": "fs/proc: task_mmu.c: don't read mapcount for migration entry" }, - "CVE-2022-26365": { - "cmt_msg": "xen/blkfront: fix leaking data in shared pages" + "CVE-2019-17351": { + "cmt_msg": "xen: let alloc_xenballooned_pages() fail if not enough memory free" }, - "CVE-2023-52458": { - "cmt_msg": "block: add check that partition length needs to be aligned with block size" + "CVE-2018-20854": { + "cmt_msg": "phy: ocelot-serdes: fix out-of-bounds read" }, - "CVE-2018-1120": { - "cmt_msg": "proc: do not access cmdline nor environ from file-backed areas" + "CVE-2018-20855": { + "cmt_msg": "IB/mlx5: Fix leaking stack memory to userspace" }, - "CVE-2018-1121": { - "cmt_msg": "" + "CVE-2023-35824": { + "cmt_msg": "media: dm1105: Fix use after free bug in dm1105_remove due to race condition" }, - "CVE-2018-20856": { - "cmt_msg": "block: blk_init_allocated_queue() set q->fq as NULL in the fail case" + "CVE-2021-3348": { + "cmt_msg": "nbd: freeze the queue while we're adding connections" }, - "CVE-2023-52451": { - "cmt_msg": "powerpc/pseries/memhp: Fix access beyond end of drmem array" + "CVE-2019-1999": { + "cmt_msg": "binder: fix race between munmap() and direct reclaim" }, - "CVE-2017-5754": { - "cmt_msg": "x86/cpufeatures: Add Intel feature bits for Speculation Control" + "CVE-2018-1065": { + "cmt_msg": "netfilter: add back stackpointer size checks" }, - "CVE-2019-19045": { - "cmt_msg": "net/mlx5: prevent memory leak in mlx5_fpga_conn_create_cq" + "CVE-2018-1066": { + "cmt_msg": "CIFS: Enable encryption during session setup phase" }, - "CVE-2017-5753": { - "cmt_msg": "x86/cpufeatures: Add X86_BUG_SPECTRE_V[12]" + "CVE-2018-1068": { + "cmt_msg": "netfilter: ebtables: CONFIG_COMPAT: don't trust userland offsets" }, - "CVE-2022-2961": { - "cmt_msg": "" + "CVE-2017-17053": { + "cmt_msg": "x86/mm: Fix use-after-free of ldt_struct" }, - "CVE-2023-2176": { - "cmt_msg": "RDMA/core: Refactor rdma_bind_addr" + "CVE-2017-17052": { + "cmt_msg": "fork: fix incorrect fput of ->exe_file causing use-after-free" }, - "CVE-2024-1086": { - "cmt_msg": "netfilter: nf_tables: reject QUEUE/DROP verdict parameters" + "CVE-2019-7308": { + "cmt_msg": "bpf: fix sanitation of alu op with pointer / scalar type from different paths" }, - "CVE-2024-22386": { - "cmt_msg": "" + "CVE-2018-1000199": { + "cmt_msg": "perf/hwbp: Simplify the perf-hwbp code, fix documentation" }, - "CVE-2019-9466": { - "cmt_msg": "brcmfmac: add subtype check for event handling in data path" + "CVE-2022-1966": { + "cmt_msg": "netfilter: nf_tables: disallow non-stateful expression in sets earlier" }, - "CVE-2020-11565": { - "cmt_msg": "mm: mempolicy: require at least one nodeid for MPOL_PREFERRED" + "CVE-2021-3587": { + "cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect" }, - "CVE-2019-19049": { - "cmt_msg": "of: unittest: fix memory leak in unittest_data_add" + "CVE-2019-16995": { + "cmt_msg": "net: hsr: fix memory leak in hsr_dev_finalize()" }, - "CVE-2021-3759": { - "cmt_msg": "memcg: enable accounting of ipc resources" + "CVE-2017-18075": { + "cmt_msg": "crypto: pcrypt - fix freeing pcrypt instances" }, - "CVE-2022-0644": { - "cmt_msg": "vfs: check fd has read access in kernel_read_file_from_fd()" + "CVE-2017-18079": { + "cmt_msg": "Input: i8042 - fix crash at boot time" }, - "CVE-2020-27784": { - "cmt_msg": "usb: gadget: function: printer: fix use-after-free in __lock_acquire" + "CVE-2023-6121": { + "cmt_msg": "nvmet: nul-terminate the NQNs passed in the connect command" }, - "CVE-2018-13053": { - "cmt_msg": "alarmtimer: Prevent overflow for relative nanosleep" + "CVE-2020-1749": { + "cmt_msg": "net: ipv6_stub: use ip6_dst_lookup_flow instead of ip6_dst_lookup" }, - "CVE-2020-27786": { - "cmt_msg": "ALSA: rawmidi: Fix racy buffer resize under concurrent accesses" + "CVE-2021-3760": { + "cmt_msg": "nfc: nci: fix the UAF of rf_conn_info object" }, - "CVE-2019-14816": { - "cmt_msg": "mwifiex: Fix three heap overflow at parsing element in cfg80211_ap_settings" + "CVE-2017-18216": { + "cmt_msg": "ocfs2: subsystem.su_mutex is required while accessing the item->ci_parent" }, - "CVE-2019-14814": { - "cmt_msg": "mwifiex: Fix three heap overflow at parsing element in cfg80211_ap_settings" + "CVE-2017-18218": { + "cmt_msg": "net: hns: Fix a skb used after free bug" }, - "CVE-2019-14815": { - "cmt_msg": "mwifiex: Fix three heap overflow at parsing element in cfg80211_ap_settings" + "CVE-2021-46992": { + "cmt_msg": "netfilter: nftables: avoid overflows in nft_hash_buckets()" }, - "CVE-2023-6240": { - "cmt_msg": "" + "CVE-2021-39648": { + "cmt_msg": "usb: gadget: configfs: Fix use-after-free issue with udc_name" }, - "CVE-2023-23559": { - "cmt_msg": "wifi: rndis_wlan: Prevent buffer overflow in rndis_query_oid" + "CVE-2023-52569": { + "cmt_msg": "btrfs: remove BUG() after failure to insert delayed dir index item" }, - "CVE-2020-10720": { - "cmt_msg": "net-gro: fix use-after-free read in napi_gro_frags()" + "CVE-2023-52568": { + "cmt_msg": "x86/sgx: Resolves SECS reclaim vs. page fault for EAUG race" }, - "CVE-2022-0382": { - "cmt_msg": "net ticp:fix a kernel-infoleak in __tipc_sendmsg()" + "CVE-2019-0136": { + "cmt_msg": "mac80211: drop robust management frames from unknown TA" }, - "CVE-2018-12904": { - "cmt_msg": "kvm: nVMX: Enforce cpl=0 for VMX instructions" + "CVE-2023-52563": { + "cmt_msg": "drm/meson: fix memory leak on ->hpd_notify callback" }, - "CVE-2023-32233": { - "cmt_msg": "netfilter: nf_tables: deactivate anonymous set from preparation phase" + "CVE-2023-52561": { + "cmt_msg": "arm64: dts: qcom: sdm845-db845c: Mark cont splash memory region as reserved" }, - "CVE-2020-25672": { - "cmt_msg": "nfc: fix memory leak in llcp_sock_connect()" + "CVE-2022-3344": { + "cmt_msg": "KVM: x86: nSVM: harden svm_free_nested against freeing vmcb02 while still in use" }, - "CVE-2019-9455": { - "cmt_msg": "media: videobuf2-v4l2: drop WARN_ON in vb2_warn_zero_bytesused()" + "CVE-2023-52566": { + "cmt_msg": "nilfs2: fix potential use after free in nilfs_gccache_submit_read_data()" }, - "CVE-2020-25670": { - "cmt_msg": "nfc: fix refcount leak in llcp_sock_bind()" + "CVE-2023-52565": { + "cmt_msg": "media: uvcvideo: Fix OOB read" }, - "CVE-2020-25671": { - "cmt_msg": "nfc: fix refcount leak in llcp_sock_connect()" + "CVE-2018-12896": { + "cmt_msg": "posix-timers: Sanitize overrun handling" }, - "CVE-2019-15222": { - "cmt_msg": "ALSA: usb-audio: Fix gpf in snd_usb_pipe_sanity_check" + "CVE-2020-0347": { + "cmt_msg": "" }, - "CVE-2019-15223": { - "cmt_msg": "ALSA: line6: Assure canceling delayed work at disconnection" + "CVE-2019-18809": { + "cmt_msg": "media: usb: fix memory leak in af9005_identify_state" }, - "CVE-2019-15220": { - "cmt_msg": "p54usb: Fix race between disconnect and firmware loading" + "CVE-2019-18808": { + "cmt_msg": "crypto: ccp - Release all allocated memory if sha type is invalid" }, - "CVE-2019-15221": { - "cmt_msg": "ALSA: line6: Fix write on zero-sized buffer" + "CVE-2021-40490": { + "cmt_msg": "ext4: fix race writing to an inline_data file while its xattrs are changing" }, - "CVE-2019-19815": { - "cmt_msg": "f2fs: support swap file w/ DIO" + "CVE-2021-33909": { + "cmt_msg": "seq_file: disallow extremely large seq buffer allocations" }, - "CVE-2019-19814": { + "CVE-2019-12455": { + "cmt_msg": "clk-sunxi: fix a missing-check bug in sunxi_divs_clk_setup()" + }, + "CVE-2019-12456": { "cmt_msg": "" }, - "CVE-2020-29371": { - "cmt_msg": "romfs: fix uninitialized memory leak in romfs_dev_read()" + "CVE-2022-0812": { + "cmt_msg": "xprtrdma: fix incorrect header size calculations" }, - "CVE-2019-19816": { - "cmt_msg": "btrfs: inode: Verify inode mode to avoid NULL pointer dereference" + "CVE-2019-17133": { + "cmt_msg": "cfg80211: wext: avoid copying malformed SSIDs" }, - "CVE-2020-0429": { - "cmt_msg": "l2tp: fix race between l2tp_session_delete() and l2tp_tunnel_closeall()" + "CVE-2021-33656": { + "cmt_msg": "vt: drop old FONT ioctls" }, - "CVE-2018-11412": { - "cmt_msg": "ext4: do not allow external inodes for inline data" + "CVE-2021-33655": { + "cmt_msg": "fbcon: Disallow setting font bigger than screen size" }, - "CVE-2022-1016": { - "cmt_msg": "netfilter: nf_tables: initialize registers in nft_do_chain()" + "CVE-2022-41858": { + "cmt_msg": "drivers: net: slip: fix NPD bug in sl_tx_timeout()" }, - "CVE-2018-18710": { - "cmt_msg": "cdrom: fix improper type cast, which can leat to information leak." + "CVE-2022-41850": { + "cmt_msg": "HID: roccat: Fix use-after-free in roccat_read()" }, - "CVE-2019-5108": { - "cmt_msg": "mac80211: Do not send Layer 2 Update frame before authorization" + "CVE-2017-10663": { + "cmt_msg": "f2fs: sanity check checkpoint segno and blkoff" }, - "CVE-2022-1012": { - "cmt_msg": "secure_seq: use the 64 bits of the siphash for port offset calculation" + "CVE-2022-1184": { + "cmt_msg": "ext4: verify dir block before splitting it" }, - "CVE-2020-12114": { - "cmt_msg": "make struct mountpoint bear the dentry reference to mountpoint, not struct mount" + "CVE-2023-3358": { + "cmt_msg": "HID: intel_ish-hid: Add check for ishtp_dma_tx_map" }, - "CVE-2020-8649": { - "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region" + "CVE-2017-14991": { + "cmt_msg": "scsi: sg: fixup infoleak when using SG_GET_REQUEST_TABLE" }, - "CVE-2020-12656": { - "cmt_msg": "sunrpc: check that domain table is empty at module unload." + "CVE-2018-7566": { + "cmt_msg": "ALSA: seq: Fix racy pool initializations" }, - "CVE-2020-14356": { - "cmt_msg": "cgroup: fix cgroup_sk_alloc() for sk_clone_lock()" + "CVE-2024-26808": { + "cmt_msg": "netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain" }, - "CVE-2017-1000405": { - "cmt_msg": "mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d()" + "CVE-2024-26809": { + "cmt_msg": "netfilter: nft_set_pipapo: release elements in clone only from destroy path" }, - "CVE-2021-26930": { - "cmt_msg": "xen-blkback: fix error handling in xen_blkbk_map()" + "CVE-2021-42739": { + "cmt_msg": "media: firewire: firedtv-avc: fix a buffer overflow in avc_ca_pmt()" }, - "CVE-2017-1000407": { - "cmt_msg": "KVM: VMX: remove I/O port 0x80 bypass on Intel hosts" + "CVE-2023-46343": { + "cmt_msg": "nfc: nci: fix possible NULL pointer dereference in send_acknowledge()" }, - "CVE-2021-26932": { - "cmt_msg": "Xen/x86: don't bail early from clear_foreign_p2m_mapping()" + "CVE-2024-26806": { + "cmt_msg": "spi: cadence-qspi: remove system-wide suspend helper calls from runtime PM hooks" }, - "CVE-2023-52456": { - "cmt_msg": "serial: imx: fix tx statemachine deadlock" + "CVE-2021-37159": { + "cmt_msg": "usb: hso: fix error handling code of hso_create_net_device" }, - "CVE-2023-3141": { - "cmt_msg": "memstick: r592: Fix UAF bug in r592_remove due to race condition" + "CVE-2020-12770": { + "cmt_msg": "scsi: sg: add sg_remove_request in sg_write" }, - "CVE-2022-0492": { - "cmt_msg": "cgroup-v1: Require capabilities to set release_agent" + "CVE-2024-26802": { + "cmt_msg": "stmmac: Clear variable when destroying workqueue" }, - "CVE-2020-12352": { - "cmt_msg": "Bluetooth: A2MP: Fix not initializing all members" + "CVE-2017-15115": { + "cmt_msg": "sctp: do not peel off an assoc from one netns to another one" }, - "CVE-2020-12351": { - "cmt_msg": "Bluetooth: L2CAP: Fix calling sk_filter on non-socket based channel" + "CVE-2023-52606": { + "cmt_msg": "powerpc/lib: Validate size for vector operations" }, - "CVE-2020-12655": { - "cmt_msg": "xfs: add agf freeblocks verify in xfs_agf_verify" + "CVE-2018-21008": { + "cmt_msg": "rsi: add fix for crash during assertions" }, - "CVE-2021-43976": { - "cmt_msg": "mwifiex: Fix skb_over_panic in mwifiex_usb_recv()" + "CVE-2023-52604": { + "cmt_msg": "FS:JFS:UBSAN:array-index-out-of-bounds in dbAdjTree" }, - "CVE-2022-0494": { - "cmt_msg": "block-map: add __GFP_ZERO flag for alloc_page in function bio_copy_kern" + "CVE-2023-52602": { + "cmt_msg": "jfs: fix slab-out-of-bounds Read in dtSearch" }, - "CVE-2023-2269": { - "cmt_msg": "dm ioctl: fix nested locking in table_clear() to remove deadlock concern" + "CVE-2023-52603": { + "cmt_msg": "UBSAN: array-index-out-of-bounds in dtSplitRoot" }, - "CVE-2020-26088": { - "cmt_msg": "net/nfc/rawsock.c: add CAP_NET_RAW check." + "CVE-2023-52600": { + "cmt_msg": "jfs: fix uaf in jfs_evict_inode" }, - "CVE-2022-3524": { - "cmt_msg": "tcp/udp: Fix memory leak in ipv6_renew_options()." + "CVE-2023-52601": { + "cmt_msg": "jfs: fix array-index-out-of-bounds in dbAdjTree" }, - "CVE-2022-3523": { - "cmt_msg": "mm/memory.c: fix race when faulting a device private page" + "CVE-2023-52609": { + "cmt_msg": "binder: fix race between mmput() and do_exit()" }, - "CVE-2022-3522": { - "cmt_msg": "mm/hugetlb: use hugetlb_pte_stable in migration race check" + "CVE-2017-1000379": { + "cmt_msg": "mm: larger stack guard gap, between vmas" }, - "CVE-2008-2544": { + "CVE-2023-3640": { "cmt_msg": "" }, - "CVE-2021-3178": { - "cmt_msg": "nfsd4: readdirplus shouldn't return parent of export" - }, - "CVE-2019-9445": { - "cmt_msg": "f2fs: check if file namelen exceeds max value" - }, - "CVE-2018-7755": { - "cmt_msg": "floppy: Do not copy a kernel pointer to user memory in FDGETPRM ioctl" + "CVE-2017-1000371": { + "cmt_msg": "binfmt_elf: use ELF_ET_DYN_BASE only for PIE" }, - "CVE-2018-7754": { - "cmt_msg": "printk: hash addresses printed with %p" + "CVE-2017-1000370": { + "cmt_msg": "binfmt_elf: use ELF_ET_DYN_BASE only for PIE" }, - "CVE-2018-7757": { - "cmt_msg": "scsi: libsas: fix memory leak in sas_smp_get_phy_events()" + "CVE-2023-3022": { + "cmt_msg": "ipv6: Use result arg in fib_lookup_arg consistently" }, - "CVE-2019-15030": { - "cmt_msg": "powerpc/tm: Fix FP/VMX unavailable exceptions inside a transaction" + "CVE-2022-43750": { + "cmt_msg": "usb: mon: make mmapped memory read only" }, - "CVE-2022-0330": { - "cmt_msg": "drm/i915: Flush TLBs before releasing backing store" + "CVE-2023-0047": { + "cmt_msg": "mm, oom: do not trigger out_of_memory from the #PF" }, - "CVE-2007-3719": { + "CVE-2023-4010": { "cmt_msg": "" }, - "CVE-2023-3863": { - "cmt_msg": "net: nfc: Fix use-after-free caused by nfc_llcp_find_local" - }, - "CVE-2023-0590": { - "cmt_msg": "net: sched: fix race condition in qdisc_graft()" + "CVE-2021-47167": { + "cmt_msg": "NFS: Fix an Oopsable condition in __nfs_pageio_add_request()" }, - "CVE-2022-4095": { - "cmt_msg": "staging: rtl8712: fix use after free bugs" + "CVE-2021-47166": { + "cmt_msg": "NFS: Don't corrupt the value of pg_bytes_written in nfs_do_recoalesce()" }, - "CVE-2022-45919": { - "cmt_msg": "media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221" + "CVE-2021-47165": { + "cmt_msg": "drm/meson: fix shutdown crash when component not probed" }, - "CVE-2019-19319": { - "cmt_msg": "ext4: protect journal inode's blocks using block_validity" + "CVE-2021-47163": { + "cmt_msg": "tipc: wait and exit until all work queues are done" }, - "CVE-2019-19462": { - "cmt_msg": "kernel/relay.c: handle alloc_percpu returning NULL in relay_open" + "CVE-2021-47162": { + "cmt_msg": "tipc: skb_linearize the head skb when reassembling msgs" }, - "CVE-2023-30772": { - "cmt_msg": "power: supply: da9150: Fix use after free bug in da9150_charger_remove due to race condition" + "CVE-2021-47161": { + "cmt_msg": "spi: spi-fsl-dspi: Fix a resource leak in an error handling path" }, - "CVE-2022-24958": { - "cmt_msg": "usb: gadget: don't release an existing dev->buf" + "CVE-2021-47160": { + "cmt_msg": "net: dsa: mt7530: fix VLAN traffic leaks" }, - "CVE-2023-1611": { - "cmt_msg": "btrfs: fix race between quota disable and quota assign ioctls" + "CVE-2023-4385": { + "cmt_msg": "fs: jfs: fix possible NULL pointer dereference in dbFree()" }, - "CVE-2021-3772": { - "cmt_msg": "sctp: use init_tag from inithdr for ABORT chunk" + "CVE-2021-46965": { + "cmt_msg": "mtd: physmap: physmap-bt1-rom: Fix unintentional stack access" }, - "CVE-2023-3268": { - "cmt_msg": "relayfs: fix out-of-bounds access in relay_file_read" + "CVE-2023-4387": { + "cmt_msg": "net: vmxnet3: fix possible use-after-free bugs in vmxnet3_rq_alloc_rx_buf()" }, - "CVE-2021-3679": { - "cmt_msg": "tracing: Fix bug in rb_per_cpu_empty() that might cause deadloop." + "CVE-2021-46962": { + "cmt_msg": "mmc: uniphier-sd: Fix a resource leak in the remove function" }, - "CVE-2021-37159": { - "cmt_msg": "usb: hso: fix error handling code of hso_create_net_device" + "CVE-2021-47168": { + "cmt_msg": "NFS: fix an incorrect limit in filelayout_decode_layout()" }, - "CVE-2021-39711": { - "cmt_msg": "bpf: fix panic due to oob in bpf_prog_test_run_skb" + "CVE-2019-19378": { + "cmt_msg": "" }, - "CVE-2022-3629": { - "cmt_msg": "vsock: Fix memory leak in vsock_connect()" + "CVE-2022-36879": { + "cmt_msg": "xfrm: xfrm_policy: fix a possible double xfrm_pols_put() in xfrm_bundle_lookup()" }, - "CVE-2021-28715": { - "cmt_msg": "xen/netback: don't queue unlimited number of packages" + "CVE-2019-19377": { + "cmt_msg": "btrfs: Don't submit any btree write bio if the fs has errors" }, - "CVE-2018-5703": { - "cmt_msg": "tls: Use correct sk->sk_prot for IPV6" + "CVE-2017-7482": { + "cmt_msg": "rxrpc: Fix several cases where a padded len isn't checked in ticket decode" }, - "CVE-2021-28713": { - "cmt_msg": "xen/console: harden hvc_xen against event channel storms" + "CVE-2017-7487": { + "cmt_msg": "ipx: call ipxitf_put() in ioctl error path" }, - "CVE-2021-28712": { - "cmt_msg": "xen/netfront: harden netfront against event channel storms" + "CVE-2023-1118": { + "cmt_msg": "media: rc: Fix use-after-free bugs caused by ene_tx_irqsim()" }, - "CVE-2020-10781": { - "cmt_msg": "Revert \"zram: convert remaining CLASS_ATTR() to CLASS_ATTR_RO()\"" + "CVE-2021-0937": { + "cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write" }, - "CVE-2021-4157": { - "cmt_msg": "pNFS/flexfiles: fix incorrect size check in decode_nfs_fh()" + "CVE-2022-47929": { + "cmt_msg": "net: sched: disallow noqueue for qdisc classes" }, - "CVE-2022-2991": { - "cmt_msg": "remove the lightnvm subsystem" + "CVE-2019-16746": { + "cmt_msg": "nl80211: validate beacon head" }, - "CVE-2022-3621": { - "cmt_msg": "nilfs2: fix NULL pointer dereference at nilfs_bmap_lookup_at_level()" + "CVE-2022-3606": { + "cmt_msg": "" }, - "CVE-2022-23960": { - "cmt_msg": "ARM: report Spectre v2 status through sysfs" + "CVE-2018-18021": { + "cmt_msg": "arm64: KVM: Tighten guest core register access from userspace" }, - "CVE-2023-51781": { - "cmt_msg": "appletalk: Fix Use-After-Free in atalk_ioctl" + "CVE-2021-37576": { + "cmt_msg": "KVM: PPC: Book3S: Fix H_RTAS rets buffer overflow" }, - "CVE-2022-3624": { - "cmt_msg": "bonding: fix reference count leak in balance-alb mode" + "CVE-2022-3594": { + "cmt_msg": "r8152: Rate limit overflow messages" }, - "CVE-2017-17862": { - "cmt_msg": "bpf: fix branch pruning logic" + "CVE-2022-3595": { + "cmt_msg": "cifs: fix double-fault crash during ntlmssp" }, - "CVE-2017-17863": { - "cmt_msg": "bpf: fix integer overflows" + "CVE-2018-5803": { + "cmt_msg": "sctp: verify size of a new chunk in _sctp_make_chunk()" }, - "CVE-2021-3669": { - "cmt_msg": "ipc: replace costly bailout check in sysvipc_find_ipc()" + "CVE-2020-27815": { + "cmt_msg": "jfs: Fix array index bounds check in dbAdjTree" }, - "CVE-2019-18885": { - "cmt_msg": "btrfs: merge btrfs_find_device and find_device" + "CVE-2023-6606": { + "cmt_msg": "smb: client: fix OOB in smbCalcSize()" }, - "CVE-2022-4744": { - "cmt_msg": "tun: avoid double free in tun_free_netdev" + "CVE-2020-27673": { + "cmt_msg": "xen/events: add a proper barrier to 2-level uevent unmasking" }, - "CVE-2023-1095": { - "cmt_msg": "netfilter: nf_tables: fix null deref due to zeroed list head" + "CVE-2020-27675": { + "cmt_msg": "xen/events: avoid removing an event channel while handling it" }, - "CVE-2019-11091": { - "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" + "CVE-2020-28915": { + "cmt_msg": "fbcon: Fix global-out-of-bounds read in fbcon_get_font()" }, - "CVE-2022-3239": { - "cmt_msg": "media: em28xx: initialize refcount before kref_get" + "CVE-2022-3111": { + "cmt_msg": "power: supply: wm8350-power: Add missing free in free_charger_irq" }, - "CVE-2022-4543": { - "cmt_msg": "" + "CVE-2020-0435": { + "cmt_msg": "f2fs: fix to do sanity check with i_extra_isize" }, - "CVE-2023-4921": { - "cmt_msg": "net: sched: sch_qfq: Fix UAF in qfq_dequeue()" + "CVE-2020-0432": { + "cmt_msg": "staging: most: net: fix buffer overflow" }, - "CVE-2022-3424": { - "cmt_msg": "misc: sgi-gru: fix use-after-free error in gru_set_context_option, gru_fault and gru_handle_user_call_os" + "CVE-2020-0433": { + "cmt_msg": "blk-mq: sync the update nr_hw_queues with blk_mq_queue_tag_busy_iter" }, - "CVE-2023-23455": { - "cmt_msg": "net: sched: atm: dont intepret cls results when asked to drop" + "CVE-2020-0431": { + "cmt_msg": "HID: hid-input: clear unmapped usages" }, - "CVE-2023-1829": { - "cmt_msg": "net/sched: Retire tcindex classifier" + "CVE-2023-6915": { + "cmt_msg": "ida: Fix crash in ida_free when the bitmap is empty" }, - "CVE-2019-18282": { - "cmt_msg": "net/flow_dissector: switch to siphash" + "CVE-2021-47006": { + "cmt_msg": "ARM: 9064/1: hw_breakpoint: Do not directly check the event's overflow_handler hook" }, - "CVE-2021-34981": { - "cmt_msg": "Bluetooth: cmtp: fix file refcount when cmtp_attach_device fails" + "CVE-2023-1249": { + "cmt_msg": "coredump: Use the vma snapshot in fill_files_note" }, - "CVE-2023-1670": { - "cmt_msg": "xirc2ps_cs: Fix use after free bug in xirc2ps_detach" + "CVE-2021-3483": { + "cmt_msg": "firewire: nosy: Fix a use-after-free bug in nosy_ioctl()" }, - "CVE-2018-14625": { - "cmt_msg": "vhost/vsock: fix use-after-free in network stack callers" + "CVE-2023-6040": { + "cmt_msg": "netfilter: nf_tables: Reject tables of unsupported family" }, - "CVE-2023-4881": { - "cmt_msg": "netfilter: nftables: exthdr: fix 4-byte stack OOB write" + "CVE-2017-16912": { + "cmt_msg": "usbip: fix stub_rx: get_pipe() to validate endpoint number" }, - "CVE-2020-24394": { - "cmt_msg": "nfsd: apply umask on fs without ACL support" + "CVE-2017-16911": { + "cmt_msg": "usbip: prevent vhci_hcd driver from leaking a socket pointer address" }, - "CVE-2023-6915": { - "cmt_msg": "ida: Fix crash in ida_free when the bitmap is empty" + "CVE-2017-16914": { + "cmt_msg": "usbip: fix stub_send_ret_submit() vulnerability to null transfer_buffer" }, - "CVE-2022-20148": { - "cmt_msg": "f2fs: fix UAF in f2fs_available_free_memory" + "CVE-2020-36691": { + "cmt_msg": "netlink: limit recursion depth in policy validation" }, - "CVE-2024-0607": { - "cmt_msg": "netfilter: nf_tables: fix pointer math issue in nft_byteorder_eval()" + "CVE-2023-42755": { + "cmt_msg": "net/sched: Retire rsvp classifier" }, - "CVE-2013-7445": { - "cmt_msg": "" + "CVE-2023-42752": { + "cmt_msg": "igmp: limit igmpv3_newpack() packet size to IP_MAX_MTU" }, - "CVE-2023-32269": { - "cmt_msg": "netrom: Fix use-after-free caused by accept on already connected socket" + "CVE-2021-3573": { + "cmt_msg": "Bluetooth: use correct lock to prevent UAF of hdev object" }, - "CVE-2022-3646": { - "cmt_msg": "nilfs2: fix leak of nilfs_root in case of writer thread creation failure" + "CVE-2022-1974": { + "cmt_msg": "nfc: replace improper check device_is_registered() in netlink related functions" }, - "CVE-2022-28390": { - "cmt_msg": "can: ems_usb: ems_usb_start_xmit(): fix double dev_kfree_skb() in error path" + "CVE-2022-1975": { + "cmt_msg": "NFC: netlink: fix sleep in atomic bug when firmware download timeout" }, - "CVE-2023-34255": { - "cmt_msg": "xfs: verify buffer contents when we skip log replay" + "CVE-2023-1380": { + "cmt_msg": "wifi: brcmfmac: slab-out-of-bounds read in brcmf_get_assoc_ies()" }, - "CVE-2022-26966": { - "cmt_msg": "sr9700: sanity check for packet length" + "CVE-2018-12130": { + "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" }, - "CVE-2023-6931": { - "cmt_msg": "perf: Fix perf_event_validate_size()" + "CVE-2022-32981": { + "cmt_msg": "powerpc/32: Fix overread/overwrite of thread_struct via ptrace" }, - "CVE-2020-14386": { - "cmt_msg": "net/packet: fix overflow in tpacket_rcv" + "CVE-2018-13405": { + "cmt_msg": "Fix up non-directory creation in SGID directories" }, - "CVE-2021-34693": { - "cmt_msg": "can: bcm: fix infoleak in struct bcm_msg_head" + "CVE-2018-13406": { + "cmt_msg": "video: uvesafb: Fix integer overflow in allocation" }, - "CVE-2019-19767": { - "cmt_msg": "ext4: add more paranoia checking in ext4_expand_extra_isize handling" + "CVE-2020-11668": { + "cmt_msg": "media: xirlink_cit: add missing descriptor sanity checks" }, - "CVE-2021-3656": { - "cmt_msg": "KVM: nSVM: always intercept VMLOAD/VMSAVE when nested (CVE-2021-3656)" + "CVE-2020-11669": { + "cmt_msg": "powerpc/powernv/idle: Restore AMR/UAMOR/AMOR after idle" }, - "CVE-2020-14381": { - "cmt_msg": "futex: Fix inode life-time issue" + "CVE-2019-14901": { + "cmt_msg": "mwifiex: Fix heap overflow in mmwifiex_process_tdls_action_frame()" }, - "CVE-2023-30456": { - "cmt_msg": "KVM: nVMX: add missing consistency checks for CR0 and CR4" + "CVE-2020-8694": { + "cmt_msg": "powercap: restrict energy meter to root access" }, - "CVE-2019-19768": { - "cmt_msg": "blktrace: Protect q->blk_trace with RCU" + "CVE-2021-3715": { + "cmt_msg": "net_sched: cls_route: remove the right filter from hashtable" }, - "CVE-2022-3303": { - "cmt_msg": "ALSA: pcm: oss: Fix race at SNDCTL_DSP_SYNC" + "CVE-2021-3714": { + "cmt_msg": "" }, - "CVE-2017-5715": { - "cmt_msg": "x86/cpufeatures: Add X86_BUG_SPECTRE_V[12]" + "CVE-2019-16230": { + "cmt_msg": "drm/amdkfd: fix a potential NULL pointer dereference (v2)" }, - "CVE-2022-20141": { - "cmt_msg": "igmp: Add ip_mc_list lock in ip_check_mc_rcu" + "CVE-2019-16231": { + "cmt_msg": "fjes: Handle workqueue allocation failure" }, - "CVE-2020-25704": { - "cmt_msg": "perf/core: Fix a memory leak in perf_event_parse_addr_filter()" + "CVE-2019-16232": { + "cmt_msg": "libertas: fix a potential NULL pointer dereference" }, - "CVE-2021-45095": { - "cmt_msg": "phonet: refcount leak in pep_sock_accep" + "CVE-2019-16233": { + "cmt_msg": "scsi: qla2xxx: fix a potential NULL pointer dereference" }, - "CVE-2023-23454": { - "cmt_msg": "net: sched: cbq: dont intepret cls results when asked to drop" + "CVE-2019-16234": { + "cmt_msg": "iwlwifi: pcie: fix rb_allocator workqueue allocation" }, - "CVE-2020-12771": { - "cmt_msg": "bcache: fix potential deadlock problem in btree_gc_coalesce" + "CVE-2019-6133": { + "cmt_msg": "fork: record start_time late" }, - "CVE-2020-25705": { - "cmt_msg": "icmp: randomize the global rate limiter" + "CVE-2021-39633": { + "cmt_msg": "ip_gre: add validation for csum_start" }, - "CVE-2018-10853": { - "cmt_msg": "kvm: x86: use correct privilege level for sgdt/sidt/fxsave/fxrstor access" + "CVE-2017-18203": { + "cmt_msg": "dm: fix race between dm_get_from_kobject() and __dm_destroy()" }, - "CVE-2018-3620": { - "cmt_msg": "x86/microcode: Allow late microcode loading with SMT disabled" + "CVE-2017-18202": { + "cmt_msg": "mm, oom_reaper: gather each vma to prevent leaking TLB entry" }, - "CVE-2023-6932": { - "cmt_msg": "ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet" + "CVE-2021-39636": { + "cmt_msg": "netfilter: x_tables: fix pointer leaks to userspace" }, - "CVE-2019-3460": { - "cmt_msg": "Bluetooth: Check L2CAP option sizes returned from l2cap_get_conf_opt" + "CVE-2017-18204": { + "cmt_msg": "ocfs2: should wait dio before inode lock in ocfs2_setattr()" }, - "CVE-2018-8781": { - "cmt_msg": "drm: udl: Properly check framebuffer mmap offsets" + "CVE-2021-39634": { + "cmt_msg": "epoll: do not insert into poll queues until all sanity checks are done" }, - "CVE-2021-29155": { - "cmt_msg": "bpf: Use correct permission flag for mixed signed bounds arithmetic" + "CVE-2022-33742": { + "cmt_msg": "xen/blkfront: force data bouncing when backend is untrusted" }, - "CVE-2021-33631": { - "cmt_msg": "ext4: fix kernel BUG in 'ext4_write_inline_data_end()'" + "CVE-2022-33741": { + "cmt_msg": "xen/netfront: force data bouncing when backend is untrusted" }, - "CVE-2019-15916": { - "cmt_msg": "net-sysfs: Fix mem leak in netdev_register_kobject" + "CVE-2022-33740": { + "cmt_msg": "xen/netfront: fix leaking data in shared pages" }, - "CVE-2019-15917": { - "cmt_msg": "Bluetooth: hci_ldisc: Postpone HCI_UART_PROTO_READY bit set in hci_uart_set_proto()" + "CVE-2022-33744": { + "cmt_msg": "xen/arm: Fix race in RB-tree based P2M accounting" }, - "CVE-2017-18344": { - "cmt_msg": "posix-timer: Properly check sigevent->sigev_notify" + "CVE-2023-52596": { + "cmt_msg": "sysctl: Fix out of bounds access for empty sysctl registers" }, - "CVE-2023-52444": { - "cmt_msg": "f2fs: fix to avoid dirent corruption" + "CVE-2023-52597": { + "cmt_msg": "KVM: s390: fix setting of fpc register" }, - "CVE-2020-12362": { - "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" + "CVE-2023-52594": { + "cmt_msg": "wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus()" }, - "CVE-2020-12363": { - "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" + "CVE-2023-52595": { + "cmt_msg": "wifi: rt2x00: restart beacon queue when hardware reset" }, - "CVE-2019-12881": { - "cmt_msg": "drm/i915/userptr: reject zero user_size" + "CVE-2023-52593": { + "cmt_msg": "wifi: wfx: fix possible NULL pointer dereference in wfx_set_mfp_ap()" }, - "CVE-2022-4129": { - "cmt_msg": "l2tp: Serialize access to sk_user_data with sk_callback_lock" + "CVE-2023-52590": { + "cmt_msg": "ocfs2: Avoid touching renamed directory if parent does not change" }, - "CVE-2023-3117": { - "cmt_msg": "netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE" + "CVE-2023-52591": { + "cmt_msg": "reiserfs: Avoid touching renamed directory if parent does not change" }, - "CVE-2022-28389": { - "cmt_msg": "can: mcba_usb: mcba_usb_start_xmit(): fix double dev_kfree_skb in error path" + "CVE-2019-9454": { + "cmt_msg": "i2c: core-smbus: prevent stack corruption on read I2C_BLOCK_DATA" }, - "CVE-2018-1000004": { - "cmt_msg": "ALSA: seq: Make ioctls race-free" + "CVE-2023-52598": { + "cmt_msg": "s390/ptrace: handle setting of fpc register correctly" }, - "CVE-2018-18690": { - "cmt_msg": "xfs: don't fail when converting shortform attr to long form during ATTR_REPLACE" + "CVE-2023-52599": { + "cmt_msg": "jfs: fix array-index-out-of-bounds in diNewExt" }, - "CVE-2022-28388": { - "cmt_msg": "can: usb_8dev: usb_8dev_start_xmit(): fix double dev_kfree_skb() in error path" + "CVE-2021-0447": { + "cmt_msg": "l2tp: protect sock pointer of struct pppol2tp_session with RCU" }, - "CVE-2023-33203": { - "cmt_msg": "net: qcom/emac: Fix use after free bug in emac_remove due to race condition" + "CVE-2022-23222": { + "cmt_msg": "bpf: Replace PTR_TO_XXX_OR_NULL with PTR_TO_XXX | PTR_MAYBE_NULL" }, - "CVE-2021-0605": { - "cmt_msg": "af_key: pfkey_dump needs parameter validation" + "CVE-2021-0448": { + "cmt_msg": "netfilter: ctnetlink: add a range check for l3/l4 protonum" }, - "CVE-2021-3896": { - "cmt_msg": "isdn: cpai: check ctr->cnr to avoid array index out of bound" + "CVE-2017-12762": { + "cmt_msg": "isdn/i4l: fix buffer overflow" }, - "CVE-2021-4002": { - "cmt_msg": "hugetlbfs: flush TLBs correctly after huge_pmd_unshare" + "CVE-2022-41849": { + "cmt_msg": "fbdev: smscufx: Fix use-after-free in ufx_ops_open()" }, - "CVE-2023-26545": { - "cmt_msg": "net: mpls: fix stale pointer if allocation fails during device rename" + "CVE-2022-41848": { + "cmt_msg": "" }, - "CVE-2021-38204": { - "cmt_msg": "usb: max-3421: Prevent corruption of freed memory" + "CVE-2023-6356": { + "cmt_msg": "nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length" }, - "CVE-2022-34918": { - "cmt_msg": "netfilter: nf_tables: stricter validation of element data" + "CVE-2022-1353": { + "cmt_msg": "af_key: add __GFP_ZERO flag for compose_sadb_supported in function pfkey_register" }, - "CVE-2018-20961": { - "cmt_msg": "USB: gadget: f_midi: fixing a possible double-free in f_midi" + "CVE-2022-1198": { + "cmt_msg": "drivers: hamradio: 6pack: fix UAF bug caused by mod_timer()" }, - "CVE-2019-18786": { - "cmt_msg": "media: rcar_drif: fix a memory disclosure" + "CVE-2022-1199": { + "cmt_msg": "ax25: Fix NULL pointer dereference in ax25_kill_by_device" }, - "CVE-2019-20810": { - "cmt_msg": "media: go7007: fix a miss of snd_card_free" + "CVE-2022-1195": { + "cmt_msg": "hamradio: improve the incomplete fix to avoid NPD" }, - "CVE-2023-52464": { - "cmt_msg": "EDAC/thunderx: Fix possible out-of-bounds string access" + "CVE-2023-2124": { + "cmt_msg": "xfs: verify buffer contents when we skip log replay" }, - "CVE-2019-20812": { - "cmt_msg": "af_packet: set defaule value for tmo" + "CVE-2019-15505": { + "cmt_msg": "media: technisat-usb2: break out of loop at end of buffer" }, - "CVE-2023-1990": { - "cmt_msg": "nfc: st-nci: Fix use after free bug in ndlc_remove due to race condition" + "CVE-2022-27672": { + "cmt_msg": "x86/speculation: Identify processors vulnerable to SMT RSB predictions" }, - "CVE-2018-1118": { - "cmt_msg": "vhost: fix info leak due to uninitialized memory" + "CVE-2022-1280": { + "cmt_msg": "drm: avoid circular locks in drm_mode_getconnector" }, - "CVE-2023-6040": { - "cmt_msg": "netfilter: nf_tables: Reject tables of unsupported family" + "CVE-2018-10880": { + "cmt_msg": "ext4: never move the system.data xattr out of the inode body" }, - "CVE-2018-5391": { - "cmt_msg": "ip: discard IPv4 datagrams with overlapping segments." + "CVE-2018-10881": { + "cmt_msg": "ext4: clear i_data in ext4_inode_info when removing inline data" }, - "CVE-2022-26373": { - "cmt_msg": "x86/speculation: Add RSB VM Exit protections" + "CVE-2024-26713": { + "cmt_msg": "powerpc/pseries/iommu: Fix iommu initialisation during DLPAR add" + } + } + }, + "4.13": { + "4.13": { + "CVE-2017-11600": { + "cmt_msg": "xfrm: policy: check policy direction value", + "cmt_id": "7bab09631c2a303f87a7eb7e3d69e888673b9b7e" }, - "CVE-2018-5995": { - "cmt_msg": "printk: hash addresses printed with %p" + "CVE-2017-14497": { + "cmt_msg": "packet: Don't write vnet header beyond end of buffer", + "cmt_id": "edbd58be15a957f6a760c4a514cd475217eb97fd" }, - "CVE-2019-15292": { - "cmt_msg": "appletalk: Fix use-after-free in atalk_proc_exit" + "CVE-2017-7558": { + "cmt_msg": "sctp: Avoid out-of-bounds reads from address storage", + "cmt_id": "ee6c88bb754e3d363e568da78086adfedb692447" + } + }, + "4.13.2": { + "CVE-2017-14340": { + "cmt_msg": "xfs: XFS_IS_REALTIME_INODE() should be false if no rt device present", + "cmt_id": "24cb33252843e531194e78222af2d8afb75fac5f" }, - "CVE-2019-15291": { - "cmt_msg": "media: b2c2-flexcop-usb: add sanity checking" + "CVE-2017-1000251": { + "cmt_msg": "Bluetooth: Properly check L2CAP config option output buffer length", + "cmt_id": "fb372097356d450b890aaadbfc45deecbe27e3e7" + } + }, + "4.13.4": { + "CVE-2017-16528": { + "cmt_msg": "ALSA: seq: Cancel pending autoload work at unbinding device", + "cmt_id": "2f3ab4a5fe065958f33d41bec352de4b4844dff5" }, - "CVE-2019-15290": { - "cmt_msg": "" + "CVE-2017-14991": { + "cmt_msg": "scsi: sg: fixup infoleak when using SG_GET_REQUEST_TABLE", + "cmt_id": "9f62840e7fc648b0a55d089714484b704557c027" }, - "CVE-2023-3212": { - "cmt_msg": "gfs2: Don't deref jdesc in evict" + "CVE-2017-14051": { + "cmt_msg": "scsi: qla2xxx: Fix an integer overflow in sysfs code", + "cmt_id": "bb8eb5376409be8e2f4e2d24a473d2c0a35aa38e" }, - "CVE-2024-23848": { - "cmt_msg": "" + "CVE-2017-0627": { + "cmt_msg": "media: uvcvideo: Prevent heap overflow when accessing mapped controls", + "cmt_id": "4185087177877b467df0b4aa08a128e7822542e2" + } + }, + "4.13.5": { + "CVE-2020-14353": { + "cmt_msg": "KEYS: prevent creating a different user's keyrings", + "cmt_id": "943f8697a9b3785a4b20a4b01816f11cccadfd0f" }, - "CVE-2018-7273": { - "cmt_msg": "printk: hash addresses printed with %p" + "CVE-2017-14156": { + "cmt_msg": "video: fbdev: aty: do not leak uninitialized padding in clk to userspace", + "cmt_id": "fd7ea1828b0dc2a3501b403f4254e9b34ea8a8da" }, - "CVE-2019-3016": { - "cmt_msg": "x86/kvm: Be careful not to clear KVM_VCPU_FLUSH_TLB bit" + "CVE-2017-12153": { + "cmt_msg": "nl80211: check for the required netlink attributes presence", + "cmt_id": "f0e85f56f70f172ada0d06b26baff47823695629" }, - "CVE-2023-4459": { - "cmt_msg": "net: vmxnet3: fix possible NULL pointer dereference in vmxnet3_rq_cleanup()" + "CVE-2017-1000252": { + "cmt_msg": "KVM: VMX: Do not BUG() on out-of-bounds guest IRQ", + "cmt_id": "c69768cc3eb4fb41a0f3c47c6d6575fd8ead57b7" }, - "CVE-2023-52457": { - "cmt_msg": "serial: 8250: omap: Don't skip resource freeing if pm_runtime_resume_and_get() failed" + "CVE-2017-14954": { + "cmt_msg": "fix infoleak in waitid(2)", + "cmt_id": "c8b679ba7c65457e45af7c086c5df0748522aa2f" }, - "CVE-2022-23036": { - "cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()" + "CVE-2017-12154": { + "cmt_msg": "kvm: nVMX: Don't allow L2 to access the hardware CR8", + "cmt_id": "27920625f93e59b2b24bdadf946ae4b61f885f40" }, - "CVE-2022-2153": { - "cmt_msg": "KVM: x86: Avoid theoretical NULL pointer dereference in kvm_irq_delivery_to_apic_fast()" + "CVE-2017-18270": { + "cmt_msg": "KEYS: prevent creating a different user's keyrings", + "cmt_id": "943f8697a9b3785a4b20a4b01816f11cccadfd0f" }, - "CVE-2019-19531": { - "cmt_msg": "usb: yurex: Fix use-after-free in yurex_delete" + "CVE-2017-14489": { + "cmt_msg": "scsi: scsi_transport_iscsi: fix the issue that iscsi_if_rx doesn't parse nlmsg properly", + "cmt_id": "1fc547cd09e2d7295656fde40a34706448bf6098" }, - "CVE-2022-20566": { - "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free caused by l2cap_chan_put" + "CVE-2018-1091": { + "cmt_msg": "powerpc/tm: Flush TM only if CPU has TM feature", + "cmt_id": "5075520e4b0b2ec8d21ae7a992e6a073e46c8507" }, - "CVE-2018-12930": { - "cmt_msg": "" + "CVE-2017-12192": { + "cmt_msg": "KEYS: prevent KEYCTL_READ on negative key", + "cmt_id": "069276fabc8c6aef5c4f95442fef68138f5e8020" }, - "CVE-2018-12931": { - "cmt_msg": "" + "CVE-2017-15537": { + "cmt_msg": "x86/fpu: Don't let userspace set bogus xcomp_bv", + "cmt_id": "7c6bcb52072cb117e7792dca856944f05182bd19" + } + }, + "4.13.6": { + "CVE-2017-0786": { + "cmt_msg": "brcmfmac: add length check in brcmf_cfg80211_escan_handler()", + "cmt_id": "1b9fff6661fe217d56c6257515c0effbe41d9ab7" }, - "CVE-2024-23196": { - "cmt_msg": "" + "CVE-2017-16526": { + "cmt_msg": "uwb: properly check kthread_run return value", + "cmt_id": "6fd9ba4251e3ce1f6f69c60e4c13539b745a0f8a" }, - "CVE-2020-12769": { - "cmt_msg": "spi: spi-dw: Add lock protect dw_spi rx/tx to prevent concurrent calls" + "CVE-2017-15649": { + "cmt_msg": "packet: in packet_do_bind, test fanout with bind_lock held", + "cmt_id": "a5d0f35d810a531c971394b0ea5d8de417acfea5" }, - "CVE-2021-32399": { - "cmt_msg": "bluetooth: eliminate the potential race condition when removing the HCI controller" + "CVE-2017-16531": { + "cmt_msg": "USB: fix out-of-bounds in usb_set_configuration", + "cmt_id": "31991559f483b33eb30b7fdb1219b3f78b616a27" }, - "CVE-2021-45868": { - "cmt_msg": "quota: check block number when reading the block in quota file" + "CVE-2017-16530": { + "cmt_msg": "USB: uas: fix bug in handling of alternate settings", + "cmt_id": "468f2bf8e0d546479a935e67b4091cdb3c4a11e8" }, - "CVE-2019-12380": { - "cmt_msg": "efi/x86/Add missing error handling to old_memmap 1:1 mapping code" + "CVE-2017-16534": { + "cmt_msg": "USB: core: harden cdc_parse_cdc_header", + "cmt_id": "7dddbeaf504434f37e041479af997b14b0f9ea0d" }, - "CVE-2019-12381": { - "cmt_msg": "ip_sockglue: Fix missing-check bug in ip_ra_control()" + "CVE-2017-16529": { + "cmt_msg": "ALSA: usb-audio: Check out-of-bounds access by corrupted buffer descriptor", + "cmt_id": "ee93eb98bc606a6c6dc37a04f6264ebb514117ab" }, - "CVE-2019-12382": { - "cmt_msg": "drm/edid: Fix a missing-check bug in drm_load_edid_firmware()" + "CVE-2018-9568": { + "cmt_msg": "net: Set sk_prot_creator when cloning sockets to the right proto", + "cmt_id": "401dfb4850a485e504a151a55e84836de77ac27b" }, - "CVE-2020-12364": { - "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" + "CVE-2017-1000255": { + "cmt_msg": "powerpc/64s: Use emergency stack for kernel TM Bad Thing program checks", + "cmt_id": "c654b8387692160ced6e4dcbb3eed888d6ce10cd" }, - "CVE-2018-20669": { - "cmt_msg": "make 'user_access_begin()' do 'access_ok()'" + "CVE-2020-27067": { + "cmt_msg": "l2tp: fix l2tp_eth module loading", + "cmt_id": "d7a268ea8624115cd4b1ddd29fc410965e4b0950" }, - "CVE-2019-19543": { - "cmt_msg": "media: serial_ir: Fix use-after-free in serial_ir_init_module" + "CVE-2017-15126": { + "cmt_msg": "userfaultfd: non-cooperative: fix fork use after free", + "cmt_id": "8919b6a762bace82c4c7c04471561b1347c17a33" + } + }, + "4.13.7": { + "CVE-2017-5123": { + "cmt_msg": "waitid(): Add missing access_ok() checks", + "cmt_id": "3da54587cf4c1be7c26a8ae0b58313828b69638a" + } + }, + "4.13.8": { + "CVE-2017-16527": { + "cmt_msg": "ALSA: usb-audio: Kill stray URB at exiting", + "cmt_id": "fd7066e5e913ef8bf6e58c9af8a63cb09e05952f" }, - "CVE-2021-3732": { - "cmt_msg": "ovl: prevent private clone if bind mount is not allowed" + "CVE-2017-16525": { + "cmt_msg": "USB: serial: console: fix use-after-free after failed setup", + "cmt_id": "e21045a223959d469174629614028136b202a586" }, - "CVE-2022-25375": { - "cmt_msg": "usb: gadget: rndis: check size of RNDIS_MSG_SET command" + "CVE-2017-16533": { + "cmt_msg": "HID: usbhid: fix out-of-bounds bug", + "cmt_id": "984154e7eef1f9e543dabd7422cfc99015778732" }, - "CVE-2020-10766": { - "cmt_msg": "x86/speculation: Prevent rogue cross-process SSBD shutdown" + "CVE-2017-12188": { + "cmt_msg": "KVM: nVMX: update last_nonleaf_level when initializing nested EPT", + "cmt_id": "a75ac6b475ae817f4006b511b8eb2d1fbe6a5713" }, - "CVE-2017-13166": { - "cmt_msg": "media: v4l2-ioctl.c: use check_fmt for enum/g/s/try_fmt" + "CVE-2017-15265": { + "cmt_msg": "ALSA: seq: Fix use-after-free at creating a port", + "cmt_id": "71c766e18dd3f321bd450ec7c0c20643b2c4b74e" }, - "CVE-2018-12207": { - "cmt_msg": "kvm: x86, powerpc: do not allow clearing largepages debugfs entry" + "CVE-2017-12190": { + "cmt_msg": "fix unbalanced page refcounting in bio_map_user_iov", + "cmt_id": "ffe1d63bc4570ee980a59996667c296c5be7252e" + } + }, + "4.13.10": { + "CVE-2017-15299": { + "cmt_msg": "KEYS: don't let add_key() update an uninstantiated key", + "cmt_id": "24a33a0c96f3e976c18e4321ca09f71cb835a9b5" }, - "CVE-2022-20369": { - "cmt_msg": "media: v4l2-mem2mem: Apply DST_QUEUE_OFF_BASE on MMAP buffers across ioctls" + "CVE-2017-16535": { + "cmt_msg": "USB: core: fix out-of-bounds access bug in usb_get_bos_descriptor()", + "cmt_id": "775462fd5c5378957e5165c898e2fa532ebf4234" }, - "CVE-2020-13143": { - "cmt_msg": "USB: gadget: fix illegal array access in binding with UDC" + "CVE-2017-15951": { + "cmt_msg": "KEYS: Fix race between updating and finding a negative key", + "cmt_id": "f45b8fe12221c178ce708b1c9d634634f2261802" + } + }, + "4.13.11": { + "CVE-2017-16939": { + "cmt_msg": "ipsec: Fix aborted xfrm policy dump crash", + "cmt_id": "20d17a2d1347b3754acfc395c7c57a068fc84d40" }, - "CVE-2020-10768": { - "cmt_msg": "x86/speculation: PR_SPEC_FORCE_DISABLE enforcement for indirect branches." + "CVE-2017-16643": { + "cmt_msg": "Input: gtco - fix potential out-of-bound access", + "cmt_id": "8d3736faa7f7e438fab0cd28a31c0dc4eea552b8" }, - "CVE-2017-13168": { - "cmt_msg": "scsi: sg: mitigate read/write abuse" + "CVE-2017-12193": { + "cmt_msg": "assoc_array: Fix a buggy node-splitting case", + "cmt_id": "ca6711747c5a1434219ae0bd6745864a618f68b3" }, - "CVE-2024-25740": { - "cmt_msg": "" + "CVE-2017-15306": { + "cmt_msg": "KVM: PPC: Fix oops when checking KVM_CAP_PPC_HTM", + "cmt_id": "3f3414599f110c8dce4e0b0d51502fc8c07517d7" + } + }, + "4.13.12": { + "CVE-2017-15128": { + "cmt_msg": "userfaultfd: hugetlbfs: prevent UFFDIO_COPY to fill beyond the end of i_size", + "cmt_id": "c14ee6986103f9232c99de035a996547faba6371" + } + }, + "4.13.14": { + "CVE-2017-13080": { + "cmt_msg": "mac80211: accept key reinstall without changing anything", + "cmt_id": "a9ab1b2e30e898440a22d7b1d7a5b0b7c6a8791f" }, - "CVE-2019-0148": { - "cmt_msg": "i40e: Wrong truncation from u16 to u8" + "CVE-2017-16645": { + "cmt_msg": "Input: ims-psu - check if CDC union descriptor is sane", + "cmt_id": "cf87b5de4473fdc0735c27ef719abb2e0a6964bb" }, - "CVE-2022-2978": { - "cmt_msg": "fs: fix UAF/GPF bug in nilfs_mdt_destroy" + "CVE-2018-7191": { + "cmt_msg": "tun: call dev_get_valid_name() before register_netdevice()", + "cmt_id": "aa9ab97c4d79b29727344f9c77d673743bbe35cb" }, - "CVE-2019-17075": { - "cmt_msg": "RDMA/cxgb4: Do not dma memory off of the stack" + "CVE-2017-16532": { + "cmt_msg": "usb: usbtest: fix NULL pointer dereference", + "cmt_id": "19ab6908533107d0a18048a7d8262eb74f5c05cb" + } + }, + "4.13.15": { + "CVE-2017-16646": { + "cmt_msg": "media: dib0700: fix invalid dvb_detach argument", + "cmt_id": "02a260a31257c653af31570faf4e07ad3dbe81f9" }, - "CVE-2022-3903": { - "cmt_msg": "media: mceusb: Use new usb_control_msg_*() routines" + "CVE-2017-16537": { + "cmt_msg": "media: imon: Fix null-ptr-deref in imon_probe", + "cmt_id": "442cc6c4c54fdeb402a425b37265a09c5d393af3" + } + }, + "4.13.16": { + "CVE-2017-18204": { + "cmt_msg": "ocfs2: should wait dio before inode lock in ocfs2_setattr()", + "cmt_id": "ccb2cca45acfd1f34bdb19d8ef5e409af40f2533" }, - "CVE-2023-39189": { - "cmt_msg": "netfilter: nfnetlink_osf: avoid OOB read" + "CVE-2017-16647": { + "cmt_msg": "net: usb: asix: fill null-ptr-deref in asix_suspend", + "cmt_id": "f93b123370688313fb3624aa7cb3ebfc6019c24e" }, - "CVE-2019-0146": { - "cmt_msg": "i40e: add num_vectors checker in iwarp handler" + "CVE-2017-16994": { + "cmt_msg": "mm/pagewalk.c: report holes in hugetlb ranges", + "cmt_id": "cd21766d6fb1b25bdc85d6541646b1dcf8a8cb52" }, - "CVE-2019-0147": { - "cmt_msg": "i40e: add num_vectors checker in iwarp handler" + "CVE-2017-16650": { + "cmt_msg": "net: qmi_wwan: fix divide by 0 on bad descriptors", + "cmt_id": "dcf3cdb7b7603b7b09c1beb7bccf227e64b0f07f" }, - "CVE-2018-20449": { - "cmt_msg": "printk: hash addresses printed with %p" + "CVE-2017-16649": { + "cmt_msg": "net: cdc_ether: fix divide by 0 on bad descriptors", + "cmt_id": "f99427bc5d83e5c8546560c006effa91592cfcc4" }, - "CVE-2019-0145": { - "cmt_msg": "i40e: add num_vectors checker in iwarp handler" + "CVE-2017-15115": { + "cmt_msg": "sctp: do not peel off an assoc from one netns to another one", + "cmt_id": "22f767973fb024036d8a9c2878035bdc6c5d1e6d" + } + }, + "outstanding": { + "CVE-2019-15090": { + "cmt_msg": "scsi: qedi: remove memset/memcpy to nfunc and use func instead" }, - "CVE-2022-44034": { - "cmt_msg": "char: pcmcia: remove all the drivers" + "CVE-2021-42252": { + "cmt_msg": "soc: aspeed: lpc-ctrl: Fix boundary check for mmap" }, - "CVE-2022-44033": { - "cmt_msg": "char: pcmcia: remove all the drivers" + "CVE-2019-15098": { + "cmt_msg": "ath6kl: fix a NULL-ptr-deref bug in ath6kl_usb_alloc_urb_from_pipe()" }, - "CVE-2019-11191": { - "cmt_msg": "x86: Deprecate a.out support" + "CVE-2017-17712": { + "cmt_msg": "net: ipv4: fix for a race condition in raw_sendmsg" }, - "CVE-2023-39198": { - "cmt_msg": "drm/qxl: fix UAF on handle creation" + "CVE-2022-0001": { + "cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE" }, - "CVE-2018-10323": { - "cmt_msg": "xfs: set format back to extents if xfs_bmap_extents_to_btree" + "CVE-2023-2248": { + "cmt_msg": "net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg" }, - "CVE-2018-10322": { - "cmt_msg": "xfs: enhance dinode verifier" + "CVE-2022-0002": { + "cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE" }, - "CVE-2023-1989": { - "cmt_msg": "Bluetooth: btsdio: fix use after free bug in btsdio_remove due to unfinished work" + "CVE-2019-19965": { + "cmt_msg": "scsi: libsas: stop discovering if oob mode is disconnected" }, - "CVE-2017-8824": { - "cmt_msg": "dccp: CVE-2017-8824: use-after-free in DCCP code" + "CVE-2019-19966": { + "cmt_msg": "media: cpia2: Fix use-after-free in cpia2_exit" }, - "CVE-2018-7492": { - "cmt_msg": "rds: Fix NULL pointer dereference in __rds_rdma_map" + "CVE-2023-52615": { + "cmt_msg": "hwrng: core - Fix page fault dead lock on mmap-ed hwrng" }, - "CVE-2020-26139": { - "cmt_msg": "mac80211: do not accept/forward invalid EAPOL frames" + "CVE-2023-52614": { + "cmt_msg": "PM / devfreq: Fix buffer overflow in trans_stat_show" }, - "CVE-2020-14314": { - "cmt_msg": "ext4: fix potential negative array index in do_split()" + "CVE-2023-52617": { + "cmt_msg": "PCI: switchtec: Fix stdev_release() crash after surprise hot remove" }, - "CVE-2019-10220": { - "cmt_msg": "Convert filldir[64]() from __put_user() to unsafe_put_user()" + "CVE-2020-24587": { + "cmt_msg": "mac80211: prevent mixed key and fragment cache attacks" }, - "CVE-2021-3609": { - "cmt_msg": "can: bcm: delay release of struct bcm_op after synchronize_rcu()" + "CVE-2020-24586": { + "cmt_msg": "mac80211: prevent mixed key and fragment cache attacks" }, - "CVE-2019-19536": { - "cmt_msg": "can: peak_usb: pcan_usb_pro: Fix info-leaks to USB devices" + "CVE-2023-52612": { + "cmt_msg": "crypto: scomp - fix req->dst buffer overflow" }, - "CVE-2019-19537": { - "cmt_msg": "USB: core: Fix races in character device registration and deregistraion" + "CVE-2021-0129": { + "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical" }, - "CVE-2019-19534": { - "cmt_msg": "can: peak_usb: fix slab info leak" + "CVE-2020-24588": { + "cmt_msg": "cfg80211: mitigate A-MSDU aggregation attacks" }, - "CVE-2019-19535": { - "cmt_msg": "can: peak_usb: pcan_usb_fd: Fix info-leaks to USB devices" + "CVE-2023-52619": { + "cmt_msg": "pstore/ram: Fix crash when setting number of cpus to an odd number" }, - "CVE-2019-19532": { - "cmt_msg": "HID: Fix assumption that devices have inputs" + "CVE-2023-52618": { + "cmt_msg": "block/rnbd-srv: Check for unlikely string overflow" }, - "CVE-2018-14617": { - "cmt_msg": "hfsplus: fix NULL dereference in hfsplus_lookup()" + "CVE-2023-5717": { + "cmt_msg": "perf: Disallow mis-matched inherited group reads" }, - "CVE-2019-10638": { - "cmt_msg": "inet: switch IP ID generator to siphash" + "CVE-2018-10940": { + "cmt_msg": "cdrom: information leak in cdrom_ioctl_media_changed()" }, - "CVE-2019-10639": { - "cmt_msg": "netns: provide pure entropy for net_hash_mix()" + "CVE-2019-9506": { + "cmt_msg": "Bluetooth: Fix faulty expression for minimum encryption key size check" }, - "CVE-2022-3533": { - "cmt_msg": "" + "CVE-2019-9500": { + "cmt_msg": "brcmfmac: assure SSID length from firmware is limited" }, - "CVE-2021-0929": { - "cmt_msg": "staging/android/ion: delete dma_buf->kmap/unmap implemenation" + "CVE-2019-9503": { + "cmt_msg": "brcmfmac: add subtype check for event handling in data path" }, - "CVE-2018-14616": { - "cmt_msg": "f2fs: fix to do sanity check with block address in main area v2" + "CVE-2022-0480": { + "cmt_msg": "memcg: enable accounting for file lock caches" }, - "CVE-2019-20095": { - "cmt_msg": "mwifiex: Fix mem leak in mwifiex_tm_cmd" + "CVE-2022-0487": { + "cmt_msg": "moxart: fix potential use-after-free on remove path" }, - "CVE-2018-19985": { - "cmt_msg": "USB: hso: Fix OOB memory access in hso_probe/hso_get_config_data" + "CVE-2022-23825": { + "cmt_msg": "" }, - "CVE-2018-6554": { - "cmt_msg": "staging: irda: remove the irda network stack and drivers" + "CVE-2021-47112": { + "cmt_msg": "x86/kvm: Teardown PV features on boot CPU as well" }, - "CVE-2018-6555": { - "cmt_msg": "staging: irda: remove the irda network stack and drivers" + "CVE-2021-47113": { + "cmt_msg": "btrfs: abort in rename_exchange if we fail to insert the second ref" }, - "CVE-2023-6546": { - "cmt_msg": "tty: n_gsm: fix the UAF caused by race condition in gsm_cleanup_mux" + "CVE-2021-47110": { + "cmt_msg": "x86/kvm: Disable kvmclock on all CPUs on shutdown" }, - "CVE-2021-0920": { - "cmt_msg": "af_unix: fix garbage collect vs MSG_PEEK" + "CVE-2021-47116": { + "cmt_msg": "ext4: fix memory leak in ext4_mb_init_backend on error path." }, - "CVE-2020-25212": { - "cmt_msg": "nfs: Fix getxattr kernel panic and memory overflow" + "CVE-2021-47117": { + "cmt_msg": "ext4: fix bug on in ext4_es_cache_extent as ext4_split_extent_at failed" }, - "CVE-2024-26587": { - "cmt_msg": "net: netdevsim: don't try to destroy PHC on VFs" + "CVE-2021-47114": { + "cmt_msg": "ocfs2: fix data corruption by fallocate" }, - "CVE-2023-51043": { - "cmt_msg": "drm/atomic: Fix potential use-after-free in nonblocking commits" + "CVE-2021-47118": { + "cmt_msg": "pid: take a reference when initializing `cad_pid`" }, - "CVE-2020-28374": { - "cmt_msg": "scsi: target: Fix XCOPY NAA identifier lookup" + "CVE-2021-46970": { + "cmt_msg": "bus: mhi: pci_generic: Remove WQ_MEM_RECLAIM flag from state workqueue" }, - "CVE-2019-9213": { - "cmt_msg": "mm: enforce min addr even if capable() in expand_downwards()" + "CVE-2019-10207": { + "cmt_msg": "Bluetooth: hci_uart: check for missing tty operations" }, - "CVE-2023-2007": { - "cmt_msg": "scsi: dpt_i2o: Remove obsolete driver" + "CVE-2023-0459": { + "cmt_msg": "uaccess: Add speculation barrier to copy_from_user()" }, - "CVE-2023-0615": { - "cmt_msg": "media: vivid: dev->bitmap_cap wasn't freed in all cases" + "CVE-2023-0458": { + "cmt_msg": "prlimit: do_prlimit needs to have a speculation check" }, - "CVE-2020-26557": { + "CVE-2021-30002": { + "cmt_msg": "media: v4l: ioctl: Fix memory leak in video_usercopy" + }, + "CVE-2021-0941": { + "cmt_msg": "bpf: Remove MTU check in __bpf_skb_max_len" + }, + "CVE-2021-39711": { + "cmt_msg": "bpf: fix panic due to oob in bpf_prog_test_run_skb" + }, + "CVE-2020-15802": { "cmt_msg": "" }, - "CVE-2019-14896": { - "cmt_msg": "libertas: Fix two buffer overflows at parsing bss descriptor" + "CVE-2022-3636": { + "cmt_msg": "net: ethernet: mtk_eth_soc: use after free in __mtk_ppe_check_skb()" }, - "CVE-2019-14897": { - "cmt_msg": "libertas: Fix two buffer overflows at parsing bss descriptor" + "CVE-2022-3635": { + "cmt_msg": "atm: idt77252: fix use-after-free bugs caused by tst_timer" }, - "CVE-2017-16536": { - "cmt_msg": "[media] cx231xx-cards: fix NULL-deref on missing association descriptor" + "CVE-2021-28715": { + "cmt_msg": "xen/netback: don't queue unlimited number of packages" }, - "CVE-2022-3586": { - "cmt_msg": "sch_sfb: Don't assume the skb is still around after enqueueing to child" + "CVE-2022-34918": { + "cmt_msg": "netfilter: nf_tables: stricter validation of element data" }, - "CVE-2024-26592": { - "cmt_msg": "ksmbd: fix UAF issue in ksmbd_tcp_new_connection()" + "CVE-2021-47028": { + "cmt_msg": "mt76: mt7915: fix txrate reporting" }, - "CVE-2022-43750": { - "cmt_msg": "usb: mon: make mmapped memory read only" + "CVE-2019-11085": { + "cmt_msg": "drm/i915/gvt: Fix mmap range check" }, - "CVE-2017-16538": { - "cmt_msg": "media: dvb-usb-v2: lmedm04: Improve logic checking of warm start" + "CVE-2018-19854": { + "cmt_msg": "crypto: user - fix leaking uninitialized memory to userspace" }, - "CVE-2020-27825": { - "cmt_msg": "tracing: Fix race in trace_open and buffer resize call" + "CVE-2023-1079": { + "cmt_msg": "HID: asus: use spinlock to safely schedule workers" }, - "CVE-2019-2181": { - "cmt_msg": "binder: check for overflow when alloc for security context" + "CVE-2021-43389": { + "cmt_msg": "isdn: cpai: check ctr->cnr to avoid array index out of bound" }, - "CVE-2019-2182": { - "cmt_msg": "arm64: Enforce BBM for huge IO/VMAP mappings" + "CVE-2023-1074": { + "cmt_msg": "sctp: fail if no bound addresses can be used for a given scope" }, - "CVE-2020-27820": { - "cmt_msg": "drm/nouveau: use drm_dev_unplug() during device removal" + "CVE-2023-1076": { + "cmt_msg": "tun: tun_chr_open(): correctly initialize socket uid" }, - "CVE-2018-5814": { - "cmt_msg": "usbip: usbip_host: fix NULL-ptr deref and use-after-free errors" + "CVE-2023-1077": { + "cmt_msg": "sched/rt: pick_next_rt_entity(): check list_entry" }, - "CVE-2020-0067": { - "cmt_msg": "f2fs: fix to avoid memory leakage in f2fs_listxattr" + "CVE-2023-40283": { + "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb" }, - "CVE-2023-4622": { - "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES" + "CVE-2023-1073": { + "cmt_msg": "HID: check empty report_list in hid_validate_values()" }, - "CVE-2019-20794": { - "cmt_msg": "" + "CVE-2018-13093": { + "cmt_msg": "xfs: validate cached inodes are free when allocated" }, - "CVE-2023-39193": { - "cmt_msg": "netfilter: xt_sctp: validate the flag_info count" + "CVE-2018-13096": { + "cmt_msg": "f2fs: fix to do sanity check with node footer and iblocks" }, - "CVE-2017-18224": { - "cmt_msg": "ocfs2: ip_alloc_sem should be taken in ocfs2_get_block()" + "CVE-2018-13097": { + "cmt_msg": "f2fs: fix to do sanity check with user_block_count" }, - "CVE-2020-26541": { - "cmt_msg": "certs: Add EFI_CERT_X509_GUID support for dbx entries" + "CVE-2018-13094": { + "cmt_msg": "xfs: don't call xfs_da_shrink_inode with NULL bp" }, - "CVE-2019-20811": { - "cmt_msg": "net-sysfs: call dev_hold if kobject_init_and_add success" + "CVE-2018-13095": { + "cmt_msg": "xfs: More robust inode extent count validation" }, - "CVE-2020-26559": { - "cmt_msg": "" + "CVE-2018-13098": { + "cmt_msg": "f2fs: fix to do sanity check with extra_attr feature" }, - "CVE-2020-27673": { - "cmt_msg": "xen/events: add a proper barrier to 2-level uevent unmasking" + "CVE-2018-13099": { + "cmt_msg": "f2fs: fix to do sanity check with reserved blkaddr of inline inode" }, - "CVE-2021-43389": { - "cmt_msg": "isdn: cpai: check ctr->cnr to avoid array index out of bound" + "CVE-2019-19770": { + "cmt_msg": "blktrace: fix debugfs use after free" }, - "CVE-2023-3111": { - "cmt_msg": "btrfs: unset reloc control if transaction commit fails in prepare_to_relocate()" + "CVE-2019-11884": { + "cmt_msg": "Bluetooth: hidp: fix buffer overflow" }, - "CVE-2018-1094": { - "cmt_msg": "ext4: always initialize the crc32c checksum driver" + "CVE-2019-11810": { + "cmt_msg": "scsi: megaraid_sas: return error when create DMA pool failed" }, - "CVE-2018-1095": { - "cmt_msg": "ext4: limit xattr size to INT_MAX" + "CVE-2021-39657": { + "cmt_msg": "scsi: ufs: Correct the LUN used in eh_device_reset_handler() callback" }, - "CVE-2018-1092": { - "cmt_msg": "ext4: fail ext4_iget for root directory if unallocated" + "CVE-2019-18683": { + "cmt_msg": "media: vivid: Fix wrong locking that causes race conditions on streaming stop" }, - "CVE-2018-1093": { - "cmt_msg": "ext4: add validity checks for bitmap block numbers" + "CVE-2019-18680": { + "cmt_msg": "" }, - "CVE-2017-18551": { - "cmt_msg": "i2c: core-smbus: prevent stack corruption on read I2C_BLOCK_DATA" + "CVE-2021-45868": { + "cmt_msg": "quota: check block number when reading the block in quota file" }, - "CVE-2023-1074": { - "cmt_msg": "sctp: fail if no bound addresses can be used for a given scope" + "CVE-2022-20158": { + "cmt_msg": "net/packet: fix slab-out-of-bounds access in packet_recvmsg()" }, - "CVE-2021-3864": { + "CVE-2024-0564": { "cmt_msg": "" }, - "CVE-2021-26931": { - "cmt_msg": "xen-blkback: don't \"handle\" error by BUG()" + "CVE-2020-0404": { + "cmt_msg": "media: uvcvideo: Avoid cyclic entity chains due to malformed USB descriptors" }, - "CVE-2024-26584": { - "cmt_msg": "net: tls: handle backlogging of crypto requests" + "CVE-2022-39188": { + "cmt_msg": "mmu_gather: Force tlb-flush VM_PFNMAP vmas" + }, + "CVE-2020-27066": { + "cmt_msg": "xfrm: policy: Fix doulbe free in xfrm_policy_timer" + }, + "CVE-2020-27068": { + "cmt_msg": "cfg80211: add missing policy for NL80211_ATTR_STATUS_CODE" }, "CVE-2024-23307": { - "cmt_msg": "" + "cmt_msg": "md/raid5: fix atomicity violation in raid5_cache_count" }, - "CVE-2022-1652": { - "cmt_msg": "floppy: use a statically allocated error counter" + "CVE-2017-0861": { + "cmt_msg": "ALSA: pcm: prevent UAF in snd_pcm_info" }, - "CVE-2023-4623": { - "cmt_msg": "net/sched: sch_hfsc: Ensure inner classes have fsc curve" + "CVE-2020-15393": { + "cmt_msg": "usb: usbtest: fix missing kfree(dev->buf) in usbtest_disconnect" }, - "CVE-2024-23849": { - "cmt_msg": "net/rds: Fix UBSAN: array-index-out-of-bounds in rds_cmsg_recv" + "CVE-2021-3564": { + "cmt_msg": "Bluetooth: fix the erroneous flush_work() order" }, - "CVE-2020-29568": { - "cmt_msg": "xen/xenbus: Allow watches discard events before queueing" + "CVE-2018-12127": { + "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" }, - "CVE-2018-18559": { - "cmt_msg": "net/packet: fix a race in packet_bind() and packet_notifier()" + "CVE-2018-12126": { + "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" }, - "CVE-2020-14351": { - "cmt_msg": "perf/core: Fix race in the perf_mmap_close() function" + "CVE-2021-28964": { + "cmt_msg": "btrfs: fix race when cloning extent buffer during rewind of an old root" }, - "CVE-2019-19054": { - "cmt_msg": "media: rc: prevent memory leak in cx23888_ir_probe" + "CVE-2019-13631": { + "cmt_msg": "Input: gtco - bounds check collection indent level" }, - "CVE-2019-19057": { - "cmt_msg": "mwifiex: pcie: Fix memory leak in mwifiex_pcie_init_evt_ring" + "CVE-2018-12233": { + "cmt_msg": "jfs: Fix inconsistency between memory allocation and ea_buf->max_size" }, - "CVE-2019-19056": { - "cmt_msg": "mwifiex: pcie: Fix memory leak in mwifiex_pcie_alloc_cmdrsp_buf" + "CVE-2018-12232": { + "cmt_msg": "socket: close race condition between sock_close() and sockfs_setattr()" }, - "CVE-2019-9453": { - "cmt_msg": "f2fs: fix to avoid accessing xattr across the boundary" + "CVE-2018-9465": { + "cmt_msg": "binder: fix proc->files use-after-free" }, - "CVE-2023-23039": { - "cmt_msg": "" + "CVE-2020-8649": { + "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region" }, - "CVE-2019-19052": { - "cmt_msg": "can: gs_usb: gs_can_open(): prevent memory leak" + "CVE-2020-8648": { + "cmt_msg": "vt: selection, close sel_buffer race" }, - "CVE-2019-3846": { - "cmt_msg": "mwifiex: Fix possible buffer overflows at parsing bss descriptor" + "CVE-2020-8647": { + "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region" }, - "CVE-2023-46838": { - "cmt_msg": "xen-netback: don't produce zero-size SKB frags" + "CVE-2019-0155": { + "cmt_msg": "drm/i915: Rename gen7 cmdparser tables" }, - "CVE-2020-0427": { - "cmt_msg": "pinctrl: devicetree: Avoid taking direct reference to device name string" + "CVE-2019-0154": { + "cmt_msg": "drm/i915: Lower RM timeout to avoid DSI hard hangs" }, - "CVE-2019-19227": { - "cmt_msg": "appletalk: Fix potential NULL pointer dereference in unregister_snap_client" + "CVE-2023-35827": { + "cmt_msg": "ravb: Fix use-after-free issue in ravb_tx_timeout_work()" }, - "CVE-2022-2977": { - "cmt_msg": "tpm: fix reference counting for struct tpm_chip" + "CVE-2023-52585": { + "cmt_msg": "drm/amdgpu: Fix possible NULL dereference in amdgpu_ras_query_error_status_helper()" }, - "CVE-2019-19058": { - "cmt_msg": "iwlwifi: dbg_ini: fix memory leak in alloc_sgtable" + "CVE-2023-52584": { + "cmt_msg": "spmi: mediatek: Fix UAF on device remove" }, - "CVE-2019-9458": { - "cmt_msg": "media: v4l: event: Prevent freeing event subscriptions while accessed" + "CVE-2023-52587": { + "cmt_msg": "IB/ipoib: Fix mcast list locking" }, - "CVE-2023-40283": { - "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb" + "CVE-2023-52586": { + "cmt_msg": "drm/msm/dpu: Add mutex lock in control vblank irq" }, - "CVE-2016-8660": { - "cmt_msg": "" + "CVE-2023-52583": { + "cmt_msg": "ceph: fix deadlock or deadcode of misusing dget()" }, - "CVE-2018-10883": { - "cmt_msg": "jbd2: don't mark block as modified if the handle is out of credits" + "CVE-2023-52589": { + "cmt_msg": "media: rkisp1: Fix IRQ disable race issue" }, - "CVE-2023-3090": { - "cmt_msg": "ipvlan:Fix out-of-bounds caused by unclear skb->cb" + "CVE-2023-52588": { + "cmt_msg": "f2fs: fix to tag gcing flag on page during block migration" }, - "CVE-2019-13272": { - "cmt_msg": "ptrace: Fix ->ptracer_cred handling for PTRACE_TRACEME" + "CVE-2023-52340": { + "cmt_msg": "ipv6: remove max_size check inline with ipv4" }, - "CVE-2023-1073": { - "cmt_msg": "HID: check empty report_list in hid_validate_values()" + "CVE-2021-46969": { + "cmt_msg": "bus: mhi: core: Fix invalid error returning in mhi_queue" }, - "CVE-2023-45862": { - "cmt_msg": "USB: ene_usb6250: Allocate enough memory for full object" + "CVE-2020-16120": { + "cmt_msg": "ovl: switch to mounter creds in readdir" }, - "CVE-2023-45863": { - "cmt_msg": "kobject: Fix slab-out-of-bounds in fill_kobj_path()" + "CVE-2019-17666": { + "cmt_msg": "rtlwifi: Fix potential overflow on P2P code" }, - "CVE-2023-1582": { - "cmt_msg": "fs/proc: task_mmu.c: don't read mapcount for migration entry" + "CVE-2018-15471": { + "cmt_msg": "xen-netback: fix input validation in xenvif_set_hash_mapping()" }, - "CVE-2022-1786": { - "cmt_msg": "io_uring: remove io_identity" + "CVE-2021-34693": { + "cmt_msg": "can: bcm: fix infoleak in struct bcm_msg_head" }, - "CVE-2019-17351": { - "cmt_msg": "xen: let alloc_xenballooned_pages() fail if not enough memory free" + "CVE-2020-11494": { + "cmt_msg": "slcan: Don't transmit uninitialized stack data in padding" }, - "CVE-2022-23222": { - "cmt_msg": "bpf: Replace PTR_TO_XXX_OR_NULL with PTR_TO_XXX | PTR_MAYBE_NULL" + "CVE-2024-26797": { + "cmt_msg": "drm/amd/display: Prevent potential buffer overflow in map_hw_resources" }, - "CVE-2020-25669": { - "cmt_msg": "Input: sunkbd - avoid use-after-free in teardown paths" + "CVE-2024-26791": { + "cmt_msg": "btrfs: dev-replace: properly validate device names" }, - "CVE-2020-25668": { - "cmt_msg": "tty: make FONTX ioctl use the tty pointer they were actually passed" + "CVE-2024-26793": { + "cmt_msg": "gtp: fix use-after-free and null-ptr-deref in gtp_newlink()" }, - "CVE-2008-4609": { - "cmt_msg": "" + "CVE-2022-30594": { + "cmt_msg": "ptrace: Check PTRACE_O_SUSPEND_SECCOMP permission on PTRACE_SEIZE" }, - "CVE-2019-9456": { - "cmt_msg": "usb: usbmon: Read text within supplied buffer size" + "CVE-2024-26798": { + "cmt_msg": "fbcon: always restore the old font data in fbcon_do_set_font()" }, - "CVE-2022-0435": { - "cmt_msg": "tipc: improve size validations for received domain records" + "CVE-2021-38204": { + "cmt_msg": "usb: max-3421: Prevent corruption of freed memory" }, - "CVE-2022-20565": { - "cmt_msg": "HID: core: Correctly handle ReportSize being zero" + "CVE-2021-38205": { + "cmt_msg": "net: xilinx_emaclite: Do not print real IOMEM pointer" }, - "CVE-2018-20854": { - "cmt_msg": "phy: ocelot-serdes: fix out-of-bounds read" + "CVE-2020-0255": { + "cmt_msg": "selinux: properly handle multiple messages in selinux_netlink_send()" }, - "CVE-2018-25020": { - "cmt_msg": "bpf: fix truncated jump targets on heavy expansions" + "CVE-2023-35001": { + "cmt_msg": "netfilter: nf_tables: prevent OOB access in nft_byteorder_eval" }, - "CVE-2018-5390": { - "cmt_msg": "tcp: free batches of packets in tcp_prune_ofo_queue()" + "CVE-2022-27666": { + "cmt_msg": "esp: Fix possible buffer overflow in ESP transformation" }, - "CVE-2023-26607": { - "cmt_msg": "ntfs: fix out-of-bounds read in ntfs_attr_find()" + "CVE-2021-38208": { + "cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect" }, - "CVE-2018-20855": { - "cmt_msg": "IB/mlx5: Fix leaking stack memory to userspace" + "CVE-2018-7995": { + "cmt_msg": "x86/MCE: Serialize sysfs changes" }, - "CVE-2019-15239": { + "CVE-2017-18232": { + "cmt_msg": "scsi: libsas: direct call probe and destruct" + }, + "CVE-2022-0168": { + "cmt_msg": "cifs: fix NULL ptr dereference in smb2_ioctl_query_info()" + }, + "CVE-2020-26556": { "cmt_msg": "" }, - "CVE-2017-15129": { - "cmt_msg": "net: Fix double free and memory corruption in get_net_ns_by_id()" + "CVE-2018-9518": { + "cmt_msg": "NFC: llcp: Limit size of SDP URI" }, - "CVE-2021-4037": { - "cmt_msg": "xfs: fix up non-directory creation in SGID directories" + "CVE-2024-26778": { + "cmt_msg": "fbdev: savage: Error out if pixclock equals zero" }, - "CVE-2021-22543": { - "cmt_msg": "KVM: do not allow mapping valid but non-reference-counted pages" + "CVE-2020-26555": { + "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical" }, - "CVE-2022-45884": { - "cmt_msg": "" + "CVE-2024-26776": { + "cmt_msg": "spi: hisi-sfc-v3xx: Return IRQ_NONE if no interrupts were detected" }, - "CVE-2021-3348": { - "cmt_msg": "nbd: freeze the queue while we're adding connections" + "CVE-2024-26777": { + "cmt_msg": "fbdev: sis: Error out if pixclock equals zero" }, - "CVE-2019-1999": { - "cmt_msg": "binder: fix race between munmap() and direct reclaim" + "CVE-2020-26558": { + "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical" }, - "CVE-2018-1065": { - "cmt_msg": "netfilter: add back stackpointer size checks" + "CVE-2023-3390": { + "cmt_msg": "netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE" }, - "CVE-2023-20941": { + "CVE-2023-3397": { "cmt_msg": "" }, - "CVE-2019-18660": { - "cmt_msg": "powerpc/book3s64: Fix link stack flush on context switch" + "CVE-2024-26773": { + "cmt_msg": "ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found()" }, - "CVE-2018-20836": { - "cmt_msg": "scsi: libsas: fix a race condition when smp task timeout" + "CVE-2024-26770": { + "cmt_msg": "HID: nvidia-shield: Add missing null pointer checks to LED initialization" }, - "CVE-2018-1068": { - "cmt_msg": "netfilter: ebtables: CONFIG_COMPAT: don't trust userland offsets" + "CVE-2024-26771": { + "cmt_msg": "dmaengine: ti: edma: Add some null pointer checks to the edma_probe" }, - "CVE-2021-44733": { - "cmt_msg": "tee: handle lookup of shm with reference count 0" + "CVE-2023-28746": { + "cmt_msg": "x86/mmio: Disable KVM mitigation when X86_FEATURE_CLEAR_CPU_BUF is set" }, - "CVE-2021-4197": { - "cmt_msg": "cgroup: Use open-time credentials for process migraton perm checks" + "CVE-2017-5754": { + "cmt_msg": "x86/cpufeatures: Add Intel feature bits for Speculation Control" }, - "CVE-2020-10135": { - "cmt_msg": "Bluetooth: Consolidate encryption handling in hci_encrypt_cfm" + "CVE-2021-47119": { + "cmt_msg": "ext4: fix memory leak in ext4_fill_super" }, - "CVE-2020-25285": { - "cmt_msg": "mm/hugetlb: fix a race between hugetlb sysctl handlers" + "CVE-2017-5753": { + "cmt_msg": "x86/cpufeatures: Add X86_BUG_SPECTRE_V[12]" }, - "CVE-2019-7308": { - "cmt_msg": "bpf: fix sanitation of alu op with pointer / scalar type from different paths" + "CVE-2024-1086": { + "cmt_msg": "netfilter: nf_tables: reject QUEUE/DROP verdict parameters" }, - "CVE-2018-1000199": { - "cmt_msg": "perf/hwbp: Simplify the perf-hwbp code, fix documentation" + "CVE-2019-9466": { + "cmt_msg": "brcmfmac: add subtype check for event handling in data path" }, - "CVE-2022-1966": { - "cmt_msg": "netfilter: nf_tables: disallow non-stateful expression in sets earlier" + "CVE-2022-0382": { + "cmt_msg": "net ticp:fix a kernel-infoleak in __tipc_sendmsg()" }, - "CVE-2017-9986": { - "cmt_msg": "sound: Retire OSS" + "CVE-2023-32233": { + "cmt_msg": "netfilter: nf_tables: deactivate anonymous set from preparation phase" }, - "CVE-2021-3587": { - "cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect" + "CVE-2019-15222": { + "cmt_msg": "ALSA: usb-audio: Fix gpf in snd_usb_pipe_sanity_check" }, - "CVE-2019-16995": { - "cmt_msg": "net: hsr: fix memory leak in hsr_dev_finalize()" + "CVE-2019-15223": { + "cmt_msg": "ALSA: line6: Assure canceling delayed work at disconnection" }, - "CVE-2019-16994": { - "cmt_msg": "net: sit: fix memory leak in sit_init_net()" + "CVE-2019-15220": { + "cmt_msg": "p54usb: Fix race between disconnect and firmware loading" }, - "CVE-2017-18075": { - "cmt_msg": "crypto: pcrypt - fix freeing pcrypt instances" + "CVE-2019-15221": { + "cmt_msg": "ALSA: line6: Fix write on zero-sized buffer" }, - "CVE-2022-3534": { - "cmt_msg": "libbpf: Fix use-after-free in btf_dump_name_dups" + "CVE-2022-1016": { + "cmt_msg": "netfilter: nf_tables: initialize registers in nft_do_chain()" }, - "CVE-2020-36516": { - "cmt_msg": "ipv4: avoid using shared IP generator for connected sockets" + "CVE-2022-1011": { + "cmt_msg": "fuse: fix pipe buffer lifetime for direct_io" }, - "CVE-2020-36766": { - "cmt_msg": "cec-api: prevent leaking memory through hole in structure" + "CVE-2022-1012": { + "cmt_msg": "secure_seq: use the 64 bits of the siphash for port offset calculation" }, - "CVE-2018-7740": { - "cmt_msg": "hugetlbfs: check for pgoff value overflow" + "CVE-2023-52620": { + "cmt_msg": "netfilter: nf_tables: disallow timeout for anonymous sets" }, - "CVE-2022-3061": { - "cmt_msg": "video: fbdev: i740fb: Error out if 'pixclock' equals zero" + "CVE-2023-52621": { + "cmt_msg": "bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers" }, - "CVE-2023-28328": { - "cmt_msg": "media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer()" + "CVE-2023-52622": { + "cmt_msg": "ext4: avoid online resizing failures due to oversized flex bg" }, - "CVE-2022-0322": { - "cmt_msg": "sctp: account stream padding length for reconf chunk" + "CVE-2023-52623": { + "cmt_msg": "SUNRPC: Fix a suspicious RCU usage warning" }, - "CVE-2023-0386": { - "cmt_msg": "ovl: fail on invalid uid/gid mapping at copy up" + "CVE-2023-52624": { + "cmt_msg": "drm/amd/display: Wake DMCUB before executing GPINT commands" }, - "CVE-2023-6121": { - "cmt_msg": "nvmet: nul-terminate the NQNs passed in the connect command" + "CVE-2023-52625": { + "cmt_msg": "drm/amd/display: Refactor DMCUB enter/exit idle interface" }, - "CVE-2018-18386": { - "cmt_msg": "n_tty: fix EXTPROC vs ICANON interaction with TIOCINQ (aka FIONREAD)" + "CVE-2023-52628": { + "cmt_msg": "netfilter: nftables: exthdr: fix 4-byte stack OOB write" }, - "CVE-2017-13693": { - "cmt_msg": "" + "CVE-2023-52629": { + "cmt_msg": "sh: push-switch: Reorder cleanup operations to avoid use-after-free bug" }, - "CVE-2022-0617": { - "cmt_msg": "udf: Fix NULL ptr deref when converting from inline format" + "CVE-2018-14617": { + "cmt_msg": "hfsplus: fix NULL dereference in hfsplus_lookup()" }, - "CVE-2017-13695": { - "cmt_msg": "ACPICA: acpi: acpica: fix acpi operand cache leak in nseval.c" + "CVE-2022-0492": { + "cmt_msg": "cgroup-v1: Require capabilities to set release_agent" }, - "CVE-2017-13694": { - "cmt_msg": "" + "CVE-2020-12352": { + "cmt_msg": "Bluetooth: A2MP: Fix not initializing all members" }, - "CVE-2021-4149": { - "cmt_msg": "btrfs: unlock newly allocated extent buffer after error" + "CVE-2020-12351": { + "cmt_msg": "Bluetooth: L2CAP: Fix calling sk_filter on non-socket based channel" }, - "CVE-2022-21385": { - "cmt_msg": "net/rds: fix warn in rds_message_alloc_sgs" + "CVE-2021-43976": { + "cmt_msg": "mwifiex: Fix skb_over_panic in mwifiex_usb_recv()" }, - "CVE-2022-42895": { - "cmt_msg": "Bluetooth: L2CAP: Fix attempting to access uninitialized memory" + "CVE-2022-0494": { + "cmt_msg": "block-map: add __GFP_ZERO flag for alloc_page in function bio_copy_kern" }, - "CVE-2021-3640": { - "cmt_msg": "Bluetooth: sco: Fix lock_sock() blockage by memcpy_from_msg()" + "CVE-2021-47101": { + "cmt_msg": "asix: fix uninit-value in asix_mdio_read()" }, - "CVE-2021-3764": { - "cmt_msg": "crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd()" + "CVE-2021-47103": { + "cmt_msg": "inet: fully convert sk->sk_rx_dst to RCU rules" }, - "CVE-2020-1749": { - "cmt_msg": "net: ipv6_stub: use ip6_dst_lookup_flow instead of ip6_dst_lookup" + "CVE-2021-46982": { + "cmt_msg": "f2fs: compress: fix race condition of overwrite vs truncate" }, - "CVE-2022-42896": { - "cmt_msg": "Bluetooth: L2CAP: Fix accepting connection request for invalid SPSM" + "CVE-2007-3719": { + "cmt_msg": "" }, - "CVE-2021-3760": { - "cmt_msg": "nfc: nci: fix the UAF of rf_conn_info object" + "CVE-2021-46988": { + "cmt_msg": "userfaultfd: release page in error path to avoid BUG_ON" }, - "CVE-2022-36123": { - "cmt_msg": "x86: Clear .brk area at early boot" + "CVE-2019-19319": { + "cmt_msg": "ext4: protect journal inode's blocks using block_validity" }, - "CVE-2020-11608": { - "cmt_msg": "media: ov519: add missing endpoint sanity checks" + "CVE-2022-3628": { + "cmt_msg": "wifi: brcmfmac: Fix potential buffer overflow in brcmf_fweh_event_worker()" }, - "CVE-2020-10732": { - "cmt_msg": "fs/binfmt_elf.c: allocate initialized memory in fill_thread_core_info()" + "CVE-2022-3629": { + "cmt_msg": "vsock: Fix memory leak in vsock_connect()" }, - "CVE-2020-28097": { - "cmt_msg": "vgacon: remove software scrollback support" + "CVE-2022-3621": { + "cmt_msg": "nilfs2: fix NULL pointer dereference at nilfs_bmap_lookup_at_level()" }, - "CVE-2017-18216": { - "cmt_msg": "ocfs2: subsystem.su_mutex is required while accessing the item->ci_parent" + "CVE-2022-23960": { + "cmt_msg": "ARM: report Spectre v2 status through sysfs" }, - "CVE-2024-24858": { - "cmt_msg": "" + "CVE-2022-3624": { + "cmt_msg": "bonding: fix reference count leak in balance-alb mode" }, - "CVE-2024-24855": { - "cmt_msg": "scsi: lpfc: Fix a possible data race in lpfc_unregister_fcf_rescan()" + "CVE-2019-11091": { + "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" }, - "CVE-2024-24857": { - "cmt_msg": "" + "CVE-2023-4921": { + "cmt_msg": "net: sched: sch_qfq: Fix UAF in qfq_dequeue()" }, - "CVE-2018-5848": { - "cmt_msg": "wil6210: missing length check in wmi_set_ie" + "CVE-2023-1829": { + "cmt_msg": "net/sched: Retire tcindex classifier" }, - "CVE-2018-8897": { - "cmt_msg": "x86/entry/64: Don't use IST entry for #BP stack" + "CVE-2019-19227": { + "cmt_msg": "appletalk: Fix potential NULL pointer dereference in unregister_snap_client" }, - "CVE-2021-29265": { - "cmt_msg": "usbip: fix stub_dev usbip_sockfd_store() races leading to gpf" + "CVE-2024-0775": { + "cmt_msg": "ext4: improve error recovery code paths in __ext4_remount()" }, - "CVE-2021-39648": { - "cmt_msg": "usb: gadget: configfs: Fix use-after-free issue with udc_name" + "CVE-2020-24394": { + "cmt_msg": "nfsd: apply umask on fs without ACL support" }, - "CVE-2022-3545": { - "cmt_msg": "nfp: fix use-after-free in area_cache_get()" + "CVE-2020-14386": { + "cmt_msg": "net/packet: fix overflow in tpacket_rcv" }, - "CVE-2020-14416": { - "cmt_msg": "can, slip: Protect tty->disc_data in write_wakeup and close with RCU" + "CVE-2019-19767": { + "cmt_msg": "ext4: add more paranoia checking in ext4_expand_extra_isize handling" }, - "CVE-2019-0136": { - "cmt_msg": "mac80211: drop robust management frames from unknown TA" + "CVE-2020-14381": { + "cmt_msg": "futex: Fix inode life-time issue" }, - "CVE-2017-17975": { - "cmt_msg": "media: usbtv: prevent double free in error case" + "CVE-2019-19768": { + "cmt_msg": "blktrace: Protect q->blk_trace with RCU" }, - "CVE-2019-16921": { - "cmt_msg": "RDMA/hns: Fix init resp when alloc ucontext" + "CVE-2022-20141": { + "cmt_msg": "igmp: Add ip_mc_list lock in ip_check_mc_rcu" }, - "CVE-2019-19377": { - "cmt_msg": "btrfs: Don't submit any btree write bio if the fs has errors" + "CVE-2023-23455": { + "cmt_msg": "net: sched: atm: dont intepret cls results when asked to drop" }, - "CVE-2021-21781": { - "cmt_msg": "ARM: ensure the signal page contains defined contents" + "CVE-2023-23454": { + "cmt_msg": "net: sched: cbq: dont intepret cls results when asked to drop" }, - "CVE-2021-0512": { - "cmt_msg": "HID: make arrays usage and value to be the same" + "CVE-2022-20148": { + "cmt_msg": "f2fs: fix UAF in f2fs_available_free_memory" }, - "CVE-2018-14633": { - "cmt_msg": "scsi: target: iscsi: Use hex2bin instead of a re-implementation" + "CVE-2023-6931": { + "cmt_msg": "perf: Fix perf_event_validate_size()" }, - "CVE-2018-12896": { - "cmt_msg": "posix-timers: Sanitize overrun handling" + "CVE-2023-6932": { + "cmt_msg": "ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet" }, - "CVE-2023-1382": { - "cmt_msg": "tipc: set con sock in tipc_conn_alloc" + "CVE-2018-8781": { + "cmt_msg": "drm: udl: Properly check framebuffer mmap offsets" }, - "CVE-2019-19073": { - "cmt_msg": "ath9k_htc: release allocated buffer if timed out" + "CVE-2021-0605": { + "cmt_msg": "af_key: pfkey_dump needs parameter validation" }, - "CVE-2018-14734": { - "cmt_msg": "infiniband: fix a possible use-after-free bug" + "CVE-2018-20961": { + "cmt_msg": "USB: gadget: f_midi: fixing a possible double-free in f_midi" }, - "CVE-2020-0347": { - "cmt_msg": "" + "CVE-2019-18786": { + "cmt_msg": "media: rcar_drif: fix a memory disclosure" }, - "CVE-2019-18809": { - "cmt_msg": "media: usb: fix memory leak in af9005_identify_state" + "CVE-2018-5995": { + "cmt_msg": "printk: hash addresses printed with %p" }, - "CVE-2019-18808": { - "cmt_msg": "crypto: ccp - Release all allocated memory if sha type is invalid" + "CVE-2022-2153": { + "cmt_msg": "KVM: x86: Avoid theoretical NULL pointer dereference in kvm_irq_delivery_to_apic_fast()" }, - "CVE-2022-41222": { - "cmt_msg": "mm/mremap: hold the rmap lock in write mode when moving page table entries." + "CVE-2024-2193": { + "cmt_msg": "" }, - "CVE-2018-8822": { - "cmt_msg": "staging: ncpfs: memory corruption in ncp_read_kernel()" + "CVE-2018-12930": { + "cmt_msg": "" }, - "CVE-2021-40490": { - "cmt_msg": "ext4: fix race writing to an inline_data file while its xattrs are changing" + "CVE-2018-12931": { + "cmt_msg": "" }, - "CVE-2021-33909": { - "cmt_msg": "seq_file: disallow extremely large seq buffer allocations" + "CVE-2021-28972": { + "cmt_msg": "PCI: rpadlpar: Fix potential drc_name corruption in store functions" }, - "CVE-2019-12455": { - "cmt_msg": "clk-sunxi: fix a missing-check bug in sunxi_divs_clk_setup()" + "CVE-2021-28971": { + "cmt_msg": "perf/x86/intel: Fix a crash caused by zero PEBS status" }, - "CVE-2019-12456": { - "cmt_msg": "" + "CVE-2019-19543": { + "cmt_msg": "media: serial_ir: Fix use-after-free in serial_ir_init_module" }, - "CVE-2023-20569": { - "cmt_msg": "x86/bugs: Increase the x86 bugs vector size to two u32s" + "CVE-2020-36780": { + "cmt_msg": "i2c: sprd: fix reference leak when pm_runtime_get_sync fails" }, - "CVE-2022-0812": { - "cmt_msg": "xprtrdma: fix incorrect header size calculations" + "CVE-2020-36781": { + "cmt_msg": "i2c: imx: fix reference leak when pm_runtime_get_sync fails" }, - "CVE-2021-29647": { - "cmt_msg": "net: qrtr: fix a kernel-infoleak in qrtr_recvmsg()" + "CVE-2021-3732": { + "cmt_msg": "ovl: prevent private clone if bind mount is not allowed" }, - "CVE-2019-18806": { - "cmt_msg": "net: qlogic: Fix memory leak in ql_alloc_large_buffers" + "CVE-2020-36784": { + "cmt_msg": "i2c: cadence: fix reference leak when pm_runtime_get_sync fails" }, - "CVE-2017-18595": { - "cmt_msg": "tracing: Fix possible double free on failure of allocating trace buffer" + "CVE-2017-13166": { + "cmt_msg": "media: v4l2-ioctl.c: use check_fmt for enum/g/s/try_fmt" }, - "CVE-2021-33655": { - "cmt_msg": "fbcon: Disallow setting font bigger than screen size" + "CVE-2024-26647": { + "cmt_msg": "drm/amd/display: Fix late derefrence 'dsc' check in 'link_set_dsc_pps_packet()'" }, - "CVE-2021-3612": { - "cmt_msg": "Input: joydev - prevent potential read overflow in ioctl" + "CVE-2017-13168": { + "cmt_msg": "scsi: sg: mitigate read/write abuse" }, - "CVE-2022-41858": { - "cmt_msg": "drivers: net: slip: fix NPD bug in sl_tx_timeout()" + "CVE-2019-0148": { + "cmt_msg": "i40e: Wrong truncation from u16 to u8" }, - "CVE-2019-6974": { - "cmt_msg": "kvm: fix kvm_ioctl_create_device() reference counting (CVE-2019-6974)" + "CVE-2019-17075": { + "cmt_msg": "RDMA/cxgb4: Do not dma memory off of the stack" }, - "CVE-2022-41850": { - "cmt_msg": "HID: roccat: Fix use-after-free in roccat_read()" + "CVE-2023-20588": { + "cmt_msg": "x86/CPU/AMD: Do not leak quotient data after a division by 0" }, - "CVE-2020-24503": { - "cmt_msg": "" + "CVE-2019-0147": { + "cmt_msg": "i40e: add num_vectors checker in iwarp handler" }, - "CVE-2022-0168": { - "cmt_msg": "cifs: fix NULL ptr dereference in smb2_ioctl_query_info()" + "CVE-2019-0145": { + "cmt_msg": "i40e: add num_vectors checker in iwarp handler" }, - "CVE-2023-2985": { - "cmt_msg": "fs: hfsplus: fix UAF issue in hfsplus_put_super" + "CVE-2022-44034": { + "cmt_msg": "char: pcmcia: remove all the drivers" }, - "CVE-2020-14390": { - "cmt_msg": "fbcon: remove soft scrollback code" + "CVE-2022-44033": { + "cmt_msg": "char: pcmcia: remove all the drivers" }, - "CVE-2020-24502": { - "cmt_msg": "" + "CVE-2022-44032": { + "cmt_msg": "char: pcmcia: remove all the drivers" }, - "CVE-2017-17712": { - "cmt_msg": "net: ipv4: fix for a race condition in raw_sendmsg" + "CVE-2021-3609": { + "cmt_msg": "can: bcm: delay release of struct bcm_op after synchronize_rcu()" }, - "CVE-2017-17807": { - "cmt_msg": "KEYS: add missing permission check for request_key() destination" + "CVE-2021-23133": { + "cmt_msg": "net/sctp: fix race condition in sctp_destroy_sock" }, - "CVE-2017-17805": { - "cmt_msg": "crypto: salsa20 - fix blkcipher_walk API usage" + "CVE-2018-14616": { + "cmt_msg": "f2fs: fix to do sanity check with block address in main area v2" }, - "CVE-2022-3642": { - "cmt_msg": "" + "CVE-2019-20095": { + "cmt_msg": "mwifiex: Fix mem leak in mwifiex_tm_cmd" }, - "CVE-2019-19527": { - "cmt_msg": "HID: hiddev: do cleanup in failure of opening a device" + "CVE-2019-20096": { + "cmt_msg": "dccp: Fix memleak in __feat_register_sp" }, - "CVE-2024-0584": { - "cmt_msg": "ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet" + "CVE-2018-6554": { + "cmt_msg": "staging: irda: remove the irda network stack and drivers" }, - "CVE-2019-19526": { - "cmt_msg": "NFC: pn533: fix use-after-free and memleaks" + "CVE-2018-6555": { + "cmt_msg": "staging: irda: remove the irda network stack and drivers" }, - "CVE-2020-0465": { - "cmt_msg": "HID: core: Sanitize event code and type when mapping input" + "CVE-2019-9213": { + "cmt_msg": "mm: enforce min addr even if capable() in expand_downwards()" }, - "CVE-2018-3639": { - "cmt_msg": "x86/nospec: Simplify alternative_msr_write()" + "CVE-2019-14896": { + "cmt_msg": "libertas: Fix two buffer overflows at parsing bss descriptor" }, - "CVE-2021-4218": { - "cmt_msg": "sysctl: pass kernel pointers to ->proc_handler" + "CVE-2019-14897": { + "cmt_msg": "libertas: Fix two buffer overflows at parsing bss descriptor" }, - "CVE-2019-15902": { - "cmt_msg": "" + "CVE-2019-14895": { + "cmt_msg": "mwifiex: fix possible heap overflow in mwifiex_process_country_ie()" }, - "CVE-2024-25739": { - "cmt_msg": "" + "CVE-2024-26784": { + "cmt_msg": "pmdomain: arm: Fix NULL dereference on scmi_perf_domain removal" }, - "CVE-2023-3358": { - "cmt_msg": "HID: intel_ish-hid: Add check for ishtp_dma_tx_map" + "CVE-2024-26789": { + "cmt_msg": "crypto: arm64/neonbs - fix out-of-bounds access on short input" }, - "CVE-2019-20054": { - "cmt_msg": "fs/proc/proc_sysctl.c: fix NULL pointer dereference in put_links" + "CVE-2018-5814": { + "cmt_msg": "usbip: usbip_host: fix NULL-ptr deref and use-after-free errors" }, - "CVE-2024-0340": { - "cmt_msg": "vhost: use kzalloc() instead of kmalloc() followed by memset()" + "CVE-2020-0067": { + "cmt_msg": "f2fs: fix to avoid memory leakage in f2fs_listxattr" }, - "CVE-2021-3753": { - "cmt_msg": "vt_kdsetmode: extend console locking" + "CVE-2017-18224": { + "cmt_msg": "ocfs2: ip_alloc_sem should be taken in ocfs2_get_block()" }, - "CVE-2023-6536": { - "cmt_msg": "" + "CVE-2020-26541": { + "cmt_msg": "certs: Add EFI_CERT_X509_GUID support for dbx entries" }, - "CVE-2019-11135": { - "cmt_msg": "x86/msr: Add the IA32_TSX_CTRL MSR" + "CVE-2019-20794": { + "cmt_msg": "" }, - "CVE-2019-11810": { - "cmt_msg": "scsi: megaraid_sas: return error when create DMA pool failed" + "CVE-2024-26769": { + "cmt_msg": "nvmet-fc: avoid deadlock on delete association path" }, - "CVE-2021-27365": { - "cmt_msg": "scsi: iscsi: Ensure sysfs attributes are limited to PAGE_SIZE" + "CVE-2024-26768": { + "cmt_msg": "LoongArch: Change acpi_core_pic[NR_CPUS] to acpi_core_pic[MAX_CORE_PIC]" }, - "CVE-2021-27364": { - "cmt_msg": "scsi: iscsi: Restrict sessions and handles to admin capabilities" + "CVE-2021-33061": { + "cmt_msg": "ixgbe: add improvement for MDD response functionality" }, - "CVE-2019-11815": { - "cmt_msg": "net: rds: force to destroy connection if t_sock is NULL in rds_tcp_kill_sock()." + "CVE-2024-26764": { + "cmt_msg": "fs/aio: Restrict kiocb_set_cancel_fn() to I/O submitted via libaio" }, - "CVE-2020-0431": { - "cmt_msg": "HID: hid-input: clear unmapped usages" + "CVE-2024-26767": { + "cmt_msg": "drm/amd/display: fixed integer types and null check locations" }, - "CVE-2022-39842": { - "cmt_msg": "video: fbdev: pxa3xx-gcu: Fix integer overflow in pxa3xx_gcu_write" + "CVE-2024-26766": { + "cmt_msg": "IB/hfi1: Fix sdma.h tx->num_descs off-by-one error" }, - "CVE-2018-17977": { - "cmt_msg": "" + "CVE-2024-26763": { + "cmt_msg": "dm-crypt: don't modify the data when using authenticated encryption" }, - "CVE-2024-1151": { - "cmt_msg": "net: openvswitch: limit the number of recursions from action sets" + "CVE-2017-18551": { + "cmt_msg": "i2c: core-smbus: prevent stack corruption on read I2C_BLOCK_DATA" }, - "CVE-2018-17972": { - "cmt_msg": "proc: restrict kernel stack dumps to root" + "CVE-2018-18559": { + "cmt_msg": "net/packet: fix a race in packet_bind() and packet_notifier()" }, - "CVE-2021-20320": { - "cmt_msg": "s390/bpf: Fix optimizing out zero-extensions" + "CVE-2019-9456": { + "cmt_msg": "usb: usbmon: Read text within supplied buffer size" }, - "CVE-2021-20321": { - "cmt_msg": "ovl: fix missing negative dentry check in ovl_rename()" + "CVE-2019-9455": { + "cmt_msg": "media: videobuf2-v4l2: drop WARN_ON in vb2_warn_zero_bytesused()" }, - "CVE-2018-7566": { - "cmt_msg": "ALSA: seq: Fix racy pool initializations" + "CVE-2022-2978": { + "cmt_msg": "fs: fix UAF/GPF bug in nilfs_mdt_destroy" }, - "CVE-2022-33742": { - "cmt_msg": "xen/blkfront: force data bouncing when backend is untrusted" + "CVE-2019-9453": { + "cmt_msg": "f2fs: fix to avoid accessing xattr across the boundary" }, - "CVE-2022-26490": { - "cmt_msg": "nfc: st21nfca: Fix potential buffer overflows in EVT_TRANSACTION" + "CVE-2023-20569": { + "cmt_msg": "x86/bugs: Increase the x86 bugs vector size to two u32s" }, - "CVE-2021-0937": { - "cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write" + "CVE-2023-46838": { + "cmt_msg": "xen-netback: don't produce zero-size SKB frags" }, - "CVE-2022-3169": { - "cmt_msg": "nvme: ensure subsystem reset is single threaded" + "CVE-2022-2977": { + "cmt_msg": "tpm: fix reference counting for struct tpm_chip" }, - "CVE-2022-36280": { - "cmt_msg": "drm/vmwgfx: Validate the box size for the snooped cursor" + "CVE-2019-9458": { + "cmt_msg": "media: v4l: event: Prevent freeing event subscriptions while accessed" }, - "CVE-2022-1048": { - "cmt_msg": "ALSA: pcm: Fix races among concurrent hw_params and hw_free calls" + "CVE-2023-3090": { + "cmt_msg": "ipvlan:Fix out-of-bounds caused by unclear skb->cb" }, - "CVE-2018-20976": { - "cmt_msg": "xfs: clear sb->s_fs_info on mount failure" + "CVE-2023-45862": { + "cmt_msg": "USB: ene_usb6250: Allocate enough memory for full object" }, - "CVE-2023-22995": { - "cmt_msg": "usb: dwc3: dwc3-qcom: Add missing platform_device_put() in dwc3_qcom_acpi_register_core" + "CVE-2023-45863": { + "cmt_msg": "kobject: Fix slab-out-of-bounds in fill_kobj_path()" }, - "CVE-2024-21803": { - "cmt_msg": "" + "CVE-2020-25704": { + "cmt_msg": "perf/core: Fix a memory leak in perf_event_parse_addr_filter()" }, - "CVE-2018-7995": { - "cmt_msg": "x86/MCE: Serialize sysfs changes" + "CVE-2020-25705": { + "cmt_msg": "icmp: randomize the global rate limiter" }, - "CVE-2018-16276": { - "cmt_msg": "USB: yurex: fix out-of-bounds uaccess in read handler" + "CVE-2023-52639": { + "cmt_msg": "KVM: s390: vsie: fix race during shadow creation" }, - "CVE-2019-15927": { - "cmt_msg": "ALSA: usb-audio: Avoid access before bLength check in build_audio_procunit()" + "CVE-2023-52638": { + "cmt_msg": "can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock" }, - "CVE-2021-3542": { + "CVE-2019-15239": { "cmt_msg": "" }, - "CVE-2019-16413": { - "cmt_msg": "9p: use inode->i_lock to protect i_size_write() under 32-bit" + "CVE-2017-15129": { + "cmt_msg": "net: Fix double free and memory corruption in get_net_ns_by_id()" }, - "CVE-2024-24860": { - "cmt_msg": "Bluetooth: Fix atomicity violation in {min,max}_key_size_set" + "CVE-2022-26373": { + "cmt_msg": "x86/speculation: Add RSB VM Exit protections" }, - "CVE-2022-1263": { - "cmt_msg": "KVM: avoid NULL pointer dereference in kvm_dirty_ring_push" + "CVE-2023-52633": { + "cmt_msg": "um: time-travel: fix time corruption" }, - "CVE-2020-12652": { - "cmt_msg": "scsi: mptfusion: Fix double fetch bug in ioctl" + "CVE-2023-52632": { + "cmt_msg": "drm/amdkfd: Fix lock dependency warning with srcu" }, - "CVE-2020-12653": { - "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_cmd_append_vsie_tlv()" + "CVE-2017-9986": { + "cmt_msg": "sound: Retire OSS" }, - "CVE-2019-7222": { - "cmt_msg": "KVM: x86: work around leak of uninitialized stack contents (CVE-2019-7222)" + "CVE-2021-44733": { + "cmt_msg": "tee: handle lookup of shm with reference count 0" }, - "CVE-2020-12657": { - "cmt_msg": "block, bfq: fix use-after-free in bfq_idle_slice_timer_body" + "CVE-2021-47135": { + "cmt_msg": "mt76: mt7921: fix possible AOOB issue in mt7921_mcu_tx_rate_report" }, - "CVE-2020-12654": { - "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_ret_wmm_get_status()" + "CVE-2021-47136": { + "cmt_msg": "net: zero-initialize tc skb extension on allocation" }, - "CVE-2019-7221": { - "cmt_msg": "KVM: nVMX: unconditionally cancel preemption timer in free_nested (CVE-2019-7221)" + "CVE-2021-47137": { + "cmt_msg": "net: lantiq: fix memory corruption in RX ring" }, - "CVE-2018-12929": { - "cmt_msg": "" + "CVE-2021-47131": { + "cmt_msg": "net/tls: Fix use-after-free after the TLS device goes down and up" }, - "CVE-2018-12928": { - "cmt_msg": "" + "CVE-2021-47133": { + "cmt_msg": "HID: amd_sfh: Fix memory leak in amd_sfh_work" }, - "CVE-2020-36310": { - "cmt_msg": "KVM: SVM: avoid infinite loop on NPF from bad address" + "CVE-2023-0386": { + "cmt_msg": "ovl: fail on invalid uid/gid mapping at copy up" }, - "CVE-2020-36313": { - "cmt_msg": "KVM: Fix out of range accesses to memslots" + "CVE-2022-42896": { + "cmt_msg": "Bluetooth: L2CAP: Fix accepting connection request for invalid SPSM" }, - "CVE-2020-35519": { - "cmt_msg": "net/x25: prevent a couple of overflows" + "CVE-2022-42895": { + "cmt_msg": "Bluetooth: L2CAP: Fix attempting to access uninitialized memory" }, - "CVE-2020-29569": { - "cmt_msg": "xen-blkback: set ring->xenblkd to NULL after kthread_stop()" + "CVE-2022-48626": { + "cmt_msg": "moxart: fix potential use-after-free on remove path" }, - "CVE-2023-51782": { - "cmt_msg": "net/rose: Fix Use-After-Free in rose_ioctl" + "CVE-2022-48627": { + "cmt_msg": "vt: fix memory overlapping when deleting chars in the buffer" }, - "CVE-2020-35513": { - "cmt_msg": "nfsd: fix incorrect umasks" + "CVE-2022-48628": { + "cmt_msg": "ceph: drop messages from MDS when unmounting" }, - "CVE-2020-10708": { + "CVE-2024-24859": { "cmt_msg": "" }, - "CVE-2020-25673": { - "cmt_msg": "nfc: Avoid endless loops caused by repeated llcp_sock_connect()" - }, - "CVE-2022-0400": { + "CVE-2024-24858": { "cmt_msg": "" }, - "CVE-2023-6356": { - "cmt_msg": "" + "CVE-2024-24855": { + "cmt_msg": "scsi: lpfc: Fix a possible data race in lpfc_unregister_fcf_rescan()" }, - "CVE-2024-25741": { + "CVE-2024-24857": { "cmt_msg": "" }, - "CVE-2021-38160": { - "cmt_msg": "virtio_console: Assure used length from device is limited" + "CVE-2019-3892": { + "cmt_msg": "coredump: fix race condition between mmget_not_zero()/get_task_mm() and core dumping" }, - "CVE-2021-42739": { - "cmt_msg": "media: firewire: firedtv-avc: fix a buffer overflow in avc_ca_pmt()" + "CVE-2021-29264": { + "cmt_msg": "gianfar: fix jumbo packets+napi+rx overrun crash" }, - "CVE-2022-3344": { - "cmt_msg": "KVM: x86: nSVM: harden svm_free_nested against freeing vmcb02 while still in use" + "CVE-2021-29265": { + "cmt_msg": "usbip: fix stub_dev usbip_sockfd_store() races leading to gpf" }, - "CVE-2022-3111": { - "cmt_msg": "power: supply: wm8350-power: Add missing free in free_charger_irq" + "CVE-2022-3545": { + "cmt_msg": "nfp: fix use-after-free in area_cache_get()" }, - "CVE-2018-5344": { - "cmt_msg": "loop: fix concurrent lo_open/lo_release" + "CVE-2022-3542": { + "cmt_msg": "bnx2x: fix potential memory leak in bnx2x_tpa_stop()" }, - "CVE-2020-12770": { - "cmt_msg": "scsi: sg: add sg_remove_request in sg_write" + "CVE-2021-21781": { + "cmt_msg": "ARM: ensure the signal page contains defined contents" }, - "CVE-2018-6412": { - "cmt_msg": "fbdev: Fixing arbitrary kernel leak in case FBIOGETCMAP_SPARC in sbusfb_ioctl_helper()." + "CVE-2023-1838": { + "cmt_msg": "Fix double fget() in vhost_net_set_backend()" }, - "CVE-2018-21008": { - "cmt_msg": "rsi: add fix for crash during assertions" + "CVE-2023-1382": { + "cmt_msg": "tipc: set con sock in tipc_conn_alloc" }, - "CVE-2024-25744": { - "cmt_msg": "x86/coco: Disable 32-bit emulation by default on TDX and SEV" + "CVE-2018-14734": { + "cmt_msg": "infiniband: fix a possible use-after-free bug" }, - "CVE-2022-25265": { - "cmt_msg": "" + "CVE-2018-8822": { + "cmt_msg": "staging: ncpfs: memory corruption in ncp_read_kernel()" }, - "CVE-2022-20368": { - "cmt_msg": "net/packet: fix slab-out-of-bounds access in packet_recvmsg()" + "CVE-2019-19529": { + "cmt_msg": "can: mcba_usb: fix use-after-free on disconnect" }, - "CVE-2019-19813": { - "cmt_msg": "btrfs: inode: Verify inode mode to avoid NULL pointer dereference" + "CVE-2021-29647": { + "cmt_msg": "net: qrtr: fix a kernel-infoleak in qrtr_recvmsg()" }, - "CVE-2020-11609": { - "cmt_msg": "media: stv06xx: add missing descriptor sanity checks" + "CVE-2023-6546": { + "cmt_msg": "tty: n_gsm: fix the UAF caused by race condition in gsm_cleanup_mux" }, - "CVE-2020-10773": { - "cmt_msg": "s390/cmm: fix information leak in cmm_timeout_handler()" + "CVE-2020-14390": { + "cmt_msg": "fbcon: remove soft scrollback code" }, - "CVE-2022-21499": { - "cmt_msg": "lockdown: also lock down previous kgdb use" + "CVE-2021-45469": { + "cmt_msg": "f2fs: fix to do sanity check on last xattr entry in __f2fs_setxattr()" }, - "CVE-2020-25284": { - "cmt_msg": "rbd: require global CAP_SYS_ADMIN for mapping and unmapping" + "CVE-2024-0584": { + "cmt_msg": "ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet" }, - "CVE-2023-4208": { - "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free" + "CVE-2020-0465": { + "cmt_msg": "HID: core: Sanitize event code and type when mapping input" }, - "CVE-2022-3606": { - "cmt_msg": "" + "CVE-2020-0466": { + "cmt_msg": "do_epoll_ctl(): clean the failure exits up a bit" }, - "CVE-2023-4206": { - "cmt_msg": "net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free" + "CVE-2024-0340": { + "cmt_msg": "vhost: use kzalloc() instead of kmalloc() followed by memset()" }, - "CVE-2023-4207": { - "cmt_msg": "net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free" + "CVE-2019-19523": { + "cmt_msg": "USB: adutux: fix use-after-free on disconnect" }, - "CVE-2023-3640": { - "cmt_msg": "" + "CVE-2019-11135": { + "cmt_msg": "x86/msr: Add the IA32_TSX_CTRL MSR" }, - "CVE-2018-18281": { - "cmt_msg": "mremap: properly flush TLB before releasing the page" + "CVE-2021-27365": { + "cmt_msg": "scsi: iscsi: Ensure sysfs attributes are limited to PAGE_SIZE" }, - "CVE-2023-20593": { - "cmt_msg": "x86/cpu/amd: Add a Zenbleed fix" + "CVE-2021-27364": { + "cmt_msg": "scsi: iscsi: Restrict sessions and handles to admin capabilities" }, - "CVE-2023-3022": { - "cmt_msg": "ipv6: Use result arg in fib_lookup_arg consistently" + "CVE-2021-27363": { + "cmt_msg": "scsi: iscsi: Restrict sessions and handles to admin capabilities" }, - "CVE-2022-2663": { - "cmt_msg": "netfilter: nf_conntrack_irc: Fix forged IP logic" + "CVE-2021-20320": { + "cmt_msg": "s390/bpf: Fix optimizing out zero-extensions" }, - "CVE-2019-8912": { - "cmt_msg": "net: crypto set sk to NULL when af_alg_release." + "CVE-2021-20321": { + "cmt_msg": "ovl: fix missing negative dentry check in ovl_rename()" }, - "CVE-2023-51780": { - "cmt_msg": "atm: Fix Use-After-Free in do_vcc_ioctl" + "CVE-2022-3169": { + "cmt_msg": "nvme: ensure subsystem reset is single threaded" }, - "CVE-2023-0047": { - "cmt_msg": "mm, oom: do not trigger out_of_memory from the #PF" + "CVE-2018-20976": { + "cmt_msg": "xfs: clear sb->s_fs_info on mount failure" }, - "CVE-2020-29370": { - "cmt_msg": "mm: slub: add missing TID bump in kmem_cache_alloc_bulk()" + "CVE-2023-22995": { + "cmt_msg": "usb: dwc3: dwc3-qcom: Add missing platform_device_put() in dwc3_qcom_acpi_register_core" }, - "CVE-2019-15219": { - "cmt_msg": "USB: sisusbvga: fix oops in error path of sisusb_probe" + "CVE-2021-3542": { + "cmt_msg": "" }, - "CVE-2022-20424": { - "cmt_msg": "io_uring: remove io_identity" + "CVE-2018-12929": { + "cmt_msg": "" }, - "CVE-2022-20422": { - "cmt_msg": "arm64: fix oops in concurrently setting insn_emulation sysctls" + "CVE-2018-12928": { + "cmt_msg": "" }, - "CVE-2023-4385": { - "cmt_msg": "fs: jfs: fix possible NULL pointer dereference in dbFree()" + "CVE-2020-36310": { + "cmt_msg": "KVM: SVM: avoid infinite loop on NPF from bad address" }, - "CVE-2020-25643": { - "cmt_msg": "hdlc_ppp: add range checks in ppp_cp_parse_cr()" + "CVE-2020-36313": { + "cmt_msg": "KVM: Fix out of range accesses to memslots" }, - "CVE-2023-4387": { - "cmt_msg": "net: vmxnet3: fix possible use-after-free bugs in vmxnet3_rq_alloc_rx_buf()" + "CVE-2020-35519": { + "cmt_msg": "net/x25: prevent a couple of overflows" }, - "CVE-2021-39657": { - "cmt_msg": "scsi: ufs: Correct the LUN used in eh_device_reset_handler() callback" + "CVE-2020-35513": { + "cmt_msg": "nfsd: fix incorrect umasks" }, - "CVE-2019-19378": { + "CVE-2020-10708": { "cmt_msg": "" }, - "CVE-2020-4788": { - "cmt_msg": "powerpc/64s: flush L1D on kernel entry" - }, - "CVE-2022-36879": { - "cmt_msg": "xfrm: xfrm_policy: fix a possible double xfrm_pols_put() in xfrm_bundle_lookup()" - }, - "CVE-2022-1011": { - "cmt_msg": "fuse: fix pipe buffer lifetime for direct_io" - }, - "CVE-2021-39698": { - "cmt_msg": "wait: add wake_up_pollfree()" - }, - "CVE-2022-45934": { - "cmt_msg": "Bluetooth: L2CAP: Fix u8 overflow" + "CVE-2018-5344": { + "cmt_msg": "loop: fix concurrent lo_open/lo_release" }, - "CVE-2018-5333": { - "cmt_msg": "RDS: null pointer dereference in rds_atomic_free_op" + "CVE-2022-21499": { + "cmt_msg": "lockdown: also lock down previous kgdb use" }, - "CVE-2018-5332": { - "cmt_msg": "RDS: Heap OOB write in rds_message_alloc_sgs()" + "CVE-2023-20593": { + "cmt_msg": "x86/cpu/amd: Add a Zenbleed fix" }, "CVE-2022-2380": { "cmt_msg": "video: fbdev: sm712fb: Fix crash in smtcfb_read()" @@ -11257,26 +11231,11 @@ "CVE-2022-0850": { "cmt_msg": "ext4: fix kernel infoleak via ext4_extent_header" }, - "CVE-2020-10767": { - "cmt_msg": "x86/speculation: Avoid force-disabling IBPB based on STIBP and enhanced IBRS." - }, - "CVE-2019-19529": { - "cmt_msg": "can: mcba_usb: fix use-after-free on disconnect" - }, "CVE-2019-19447": { "cmt_msg": "ext4: work around deleting a file with i_nlink == 0 safely" }, - "CVE-2017-17448": { - "cmt_msg": "netfilter: nfnetlink_cthelper: Add missing permission checks" - }, - "CVE-2017-17449": { - "cmt_msg": "netlink: Add netns check on taps" - }, - "CVE-2019-19525": { - "cmt_msg": "ieee802154: atusb: fix use-after-free at disconnect" - }, - "CVE-2019-19524": { - "cmt_msg": "Input: ff-memless - kill timer in destroy()" + "CVE-2021-3612": { + "cmt_msg": "Input: joydev - prevent potential read overflow in ioctl" }, "CVE-2019-19448": { "cmt_msg": "btrfs: only search for left_info if there is no right_info in try_merge_free_space" @@ -11284,1482 +11243,1406 @@ "CVE-2019-19449": { "cmt_msg": "f2fs: fix to do sanity check on segment/section count" }, - "CVE-2023-31085": { - "cmt_msg": "ubi: Refuse attaching if mtd's erasesize is 0" + "CVE-2020-11725": { + "cmt_msg": "" }, - "CVE-2019-19523": { - "cmt_msg": "USB: adutux: fix use-after-free on disconnect" + "CVE-2023-30456": { + "cmt_msg": "KVM: nVMX: add missing consistency checks for CR0 and CR4" }, - "CVE-2021-3752": { - "cmt_msg": "Bluetooth: fix use-after-free error in lock_sock_nested()" + "CVE-2021-35477": { + "cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4" }, - "CVE-2021-0935": { - "cmt_msg": "net: ipv6: keep sk status consistent after datagram connect failure" + "CVE-2022-23041": { + "cmt_msg": "xen/9p: use alloc/free_pages_exact()" }, - "CVE-2020-11725": { - "cmt_msg": "" + "CVE-2024-26758": { + "cmt_msg": "md: Don't ignore suspended array in md_check_recovery()" }, - "CVE-2019-3892": { - "cmt_msg": "coredump: fix race condition between mmget_not_zero()/get_task_mm() and core dumping" + "CVE-2024-26759": { + "cmt_msg": "mm/swap: fix race when skipping swapcache" }, - "CVE-2021-29264": { - "cmt_msg": "gianfar: fix jumbo packets+napi+rx overrun crash" + "CVE-2022-1729": { + "cmt_msg": "perf: Fix sys_perf_event_open() race against self" }, - "CVE-2021-35477": { - "cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4" + "CVE-2024-26752": { + "cmt_msg": "l2tp: pass correct message length to ip6_append_data" }, - "CVE-2023-31436": { - "cmt_msg": "net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg" + "CVE-2024-26754": { + "cmt_msg": "gtp: fix use-after-free and null-ptr-deref in gtp_genl_dump_pdp()" }, - "CVE-2020-10690": { - "cmt_msg": "ptp: fix the race between the release of ptp_clock and cdev" + "CVE-2024-26756": { + "cmt_msg": "md: Don't register sync_thread for reshape directly" }, - "CVE-2023-31082": { - "cmt_msg": "" + "CVE-2024-26757": { + "cmt_msg": "md: Don't ignore read-only array in md_check_recovery()" }, - "CVE-2022-47929": { - "cmt_msg": "net: sched: disallow noqueue for qdisc classes" + "CVE-2021-28038": { + "cmt_msg": "Xen/gnttab: handle p2m update errors on a per-slot basis" }, - "CVE-2019-16746": { - "cmt_msg": "nl80211: validate beacon head" + "CVE-2022-2964": { + "cmt_msg": "net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup" }, - "CVE-2021-41864": { - "cmt_msg": "bpf: Fix integer overflow in prealloc_elems_and_freelist()" + "CVE-2024-26689": { + "cmt_msg": "ceph: prevent use-after-free in encode_cap_msg()" }, - "CVE-2023-31081": { - "cmt_msg": "" + "CVE-2019-9444": { + "cmt_msg": "printk: hash addresses printed with %p" }, - "CVE-2022-2209": { + "CVE-2022-2961": { "cmt_msg": "" }, - "CVE-2018-18021": { - "cmt_msg": "arm64: KVM: Tighten guest core register access from userspace" - }, - "CVE-2022-45887": { - "cmt_msg": "media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb()" + "CVE-2024-26686": { + "cmt_msg": "fs/proc: do_task_stat: use sig->stats_lock to gather the threads/children stats" }, - "CVE-2021-37576": { - "cmt_msg": "KVM: PPC: Book3S: Fix H_RTAS rets buffer overflow" + "CVE-2024-26687": { + "cmt_msg": "xen/events: close evtchn after mapping cleanup" }, - "CVE-2019-8980": { - "cmt_msg": "exec: Fix mem leak in kernel_read_file" + "CVE-2024-26685": { + "cmt_msg": "nilfs2: fix potential bug in end_buffer_async_write" }, "CVE-2023-45871": { "cmt_msg": "igb: set max size RX buffer when store bad packet is enabled" }, - "CVE-2023-7042": { - "cmt_msg": "" - }, - "CVE-2022-3594": { - "cmt_msg": "r8152: Rate limit overflow messages" + "CVE-2020-12114": { + "cmt_msg": "make struct mountpoint bear the dentry reference to mountpoint, not struct mount" }, - "CVE-2018-14609": { - "cmt_msg": "btrfs: relocation: Only remove reloc rb_trees if reloc control has been initialized" + "CVE-2021-4218": { + "cmt_msg": "sysctl: pass kernel pointers to ->proc_handler" }, - "CVE-2023-35824": { - "cmt_msg": "media: dm1105: Fix use after free bug in dm1105_remove due to race condition" + "CVE-2023-0266": { + "cmt_msg": "ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF" }, - "CVE-2021-33098": { - "cmt_msg": "ixgbe: fix large MTU request from VF" + "CVE-2019-10142": { + "cmt_msg": "drivers/virt/fsl_hypervisor.c: prevent integer overflow in ioctl" }, - "CVE-2022-3595": { - "cmt_msg": "cifs: fix double-fault crash during ntlmssp" + "CVE-2023-52640": { + "cmt_msg": "fs/ntfs3: Fix oob in ntfs_listxattr" }, - "CVE-2021-28971": { - "cmt_msg": "perf/x86/intel: Fix a crash caused by zero PEBS status" + "CVE-2023-52641": { + "cmt_msg": "fs/ntfs3: Add NULL ptr dereference checking at the end of attr_allocate_frame()" }, - "CVE-2023-47233": { + "CVE-2021-0399": { "cmt_msg": "" }, - "CVE-2020-10769": { - "cmt_msg": "crypto: authenc - fix parsing key with misaligned rta_len" - }, - "CVE-2018-5803": { - "cmt_msg": "sctp: verify size of a new chunk in _sctp_make_chunk()" + "CVE-2023-52488": { + "cmt_msg": "serial: sc16is7xx: convert from _raw_ to _noinc_ regmap functions for FIFO" }, - "CVE-2020-27815": { - "cmt_msg": "jfs: Fix array index bounds check in dbAdjTree" + "CVE-2023-52489": { + "cmt_msg": "mm/sparsemem: fix race in accessing memory_section->usage" }, - "CVE-2022-23041": { - "cmt_msg": "xen/9p: use alloc/free_pages_exact()" + "CVE-2023-52484": { + "cmt_msg": "iommu/arm-smmu-v3: Fix soft lockup triggered by arm_smmu_mm_invalidate_range" }, - "CVE-2021-45486": { - "cmt_msg": "inet: use bigger hash table for IP ID generation" + "CVE-2020-2732": { + "cmt_msg": "KVM: nVMX: Don't emulate instructions in guest mode" }, - "CVE-2022-1462": { - "cmt_msg": "tty: use new tty_insert_flip_string_and_push_buffer() in pty_write()" + "CVE-2023-52486": { + "cmt_msg": "drm: Don't unref the same fb many times by mistake due to deadlock handling" }, - "CVE-2022-3115": { - "cmt_msg": "drm: mali-dp: potential dereference of null pointer" + "CVE-2023-52480": { + "cmt_msg": "ksmbd: fix race condition between session lookup and expire" }, - "CVE-2023-6606": { - "cmt_msg": "smb: client: fix OOB in smbCalcSize()" + "CVE-2023-52481": { + "cmt_msg": "arm64: errata: Add Cortex-A520 speculative unprivileged load workaround" }, - "CVE-2023-3006": { - "cmt_msg": "arm64: Add AMPERE1 to the Spectre-BHB affected list" + "CVE-2023-52482": { + "cmt_msg": "x86/srso: Add SRSO mitigation for Hygon processors" }, - "CVE-2020-27777": { - "cmt_msg": "powerpc/rtas: Restrict RTAS requests from userspace" + "CVE-2023-4128": { + "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free" }, - "CVE-2019-20636": { - "cmt_msg": "Input: add safety guards to input_set_keycode()" + "CVE-2021-47128": { + "cmt_msg": "bpf, lockdown, audit: Fix buggy SELinux lockdown permission checks" }, - "CVE-2019-11486": { - "cmt_msg": "tty: mark Siemens R3964 line discipline as BROKEN" + "CVE-2018-17182": { + "cmt_msg": "mm: get rid of vmacache_flush_all() entirely" }, - "CVE-2019-11487": { - "cmt_msg": "fs: prevent page refcount overflow in pipe_buf_get" + "CVE-2021-47122": { + "cmt_msg": "net: caif: fix memory leak in caif_device_notify" }, - "CVE-2018-8043": { - "cmt_msg": "net: phy: mdio-bcm-unimac: fix potential NULL dereference in unimac_mdio_probe()" + "CVE-2021-47121": { + "cmt_msg": "net: caif: fix memory leak in cfusbl_device_notify" }, - "CVE-2020-27675": { - "cmt_msg": "xen/events: avoid removing an event channel while handling it" + "CVE-2021-47125": { + "cmt_msg": "sch_htb: fix refcount leak in htb_parent_to_leaf_offload" }, - "CVE-2020-28915": { - "cmt_msg": "fbcon: Fix global-out-of-bounds read in fbcon_get_font()" + "CVE-2021-47124": { + "cmt_msg": "io_uring: fix link timeout refs" }, - "CVE-2023-7192": { - "cmt_msg": "netfilter: ctnetlink: fix possible refcount leak in ctnetlink_create_conntrack()" + "CVE-2019-15118": { + "cmt_msg": "ALSA: usb-audio: Fix a stack buffer overflow bug in check_input_term" }, - "CVE-2019-20908": { - "cmt_msg": "efi: Restrict efivar_ssdt_load when the kernel is locked down" + "CVE-2019-12818": { + "cmt_msg": "net: nfc: Fix NULL dereference on nfc_llcp_build_tlv fails" }, - "CVE-2023-3776": { - "cmt_msg": "net/sched: cls_fw: Fix improper refcount update leads to use-after-free" + "CVE-2019-12819": { + "cmt_msg": "mdio_bus: Fix use-after-free on device_register fails" }, - "CVE-2021-28038": { - "cmt_msg": "Xen/gnttab: handle p2m update errors on a per-slot basis" + "CVE-2023-0394": { + "cmt_msg": "ipv6: raw: Deduct extension header length in rawv6_push_pending_frames" }, - "CVE-2021-33061": { - "cmt_msg": "ixgbe: add improvement for MDD response functionality" + "CVE-2019-19332": { + "cmt_msg": "KVM: x86: fix out-of-bounds write in KVM_GET_EMULATED_CPUID (CVE-2019-19332)" }, - "CVE-2022-23040": { - "cmt_msg": "xen/xenbus: don't let xenbus_grant_ring() remove grants in error case" + "CVE-2019-15117": { + "cmt_msg": "ALSA: usb-audio: Fix an OOB bug in parse_audio_mixer_unit" }, - "CVE-2021-29154": { - "cmt_msg": "bpf, x86: Validate computation of branch displacements for x86-64" + "CVE-2022-25258": { + "cmt_msg": "USB: gadget: validate interface OS descriptor requests" }, - "CVE-2023-52435": { - "cmt_msg": "net: prevent mss overflow in skb_segment()" + "CVE-2020-3702": { + "cmt_msg": "ath: Use safer key clearing with key cache entries" }, - "CVE-2023-52434": { - "cmt_msg": "smb: client: fix potential OOBs in smb2_parse_contexts()" + "CVE-2023-0461": { + "cmt_msg": "net/ulp: prevent ULP without clone op from entering the LISTEN status" }, - "CVE-2023-3161": { - "cmt_msg": "fbcon: Check font dimension limits" + "CVE-2023-3117": { + "cmt_msg": "netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE" }, - "CVE-2023-52436": { - "cmt_msg": "f2fs: explicitly null-terminate the xattr list" + "CVE-2018-10322": { + "cmt_msg": "xfs: enhance dinode verifier" }, - "CVE-2019-19060": { - "cmt_msg": "iio: imu: adis16400: release allocated memory on failure" + "CVE-2023-3111": { + "cmt_msg": "btrfs: unset reloc control if transaction commit fails in prepare_to_relocate()" }, - "CVE-2019-19061": { - "cmt_msg": "iio: imu: adis16400: fix memory leak" + "CVE-2024-24860": { + "cmt_msg": "Bluetooth: Fix atomicity violation in {min,max}_key_size_set" }, - "CVE-2019-19062": { - "cmt_msg": "crypto: user - fix memory leak in crypto_report" + "CVE-2024-24861": { + "cmt_msg": "media: xc4000: Fix atomicity violation in xc4000_get_frequency" }, - "CVE-2019-19063": { - "cmt_msg": "rtlwifi: prevent memory leak in rtl_usb_probe" + "CVE-2018-20509": { + "cmt_msg": "binder: refactor binder ref inc/dec for thread safety" }, - "CVE-2017-17741": { - "cmt_msg": "KVM: Fix stack-out-of-bounds read in write_mmio" + "CVE-2024-24864": { + "cmt_msg": "" }, - "CVE-2019-19065": { - "cmt_msg": "RDMA/hfi1: Prevent memory leak in sdma_init" + "CVE-2021-47013": { + "cmt_msg": "net:emac/emac-mac: Fix a use after free in emac_mac_tx_buf_send" }, - "CVE-2019-19066": { - "cmt_msg": "scsi: bfa: release allocated memory in case of error" + "CVE-2022-36946": { + "cmt_msg": "netfilter: nf_queue: do not allow packet truncation below transport header offset" }, - "CVE-2019-19067": { - "cmt_msg": "drm/amdgpu: fix multiple memory leaks in acp_hw_init" + "CVE-2018-19824": { + "cmt_msg": "ALSA: usb-audio: Fix UAF decrement if card has no live interfaces in card.c" }, - "CVE-2019-19068": { - "cmt_msg": "rtl8xxxu: prevent leaking urb" + "CVE-2022-21166": { + "cmt_msg": "x86/speculation/mmio: Enable CPU Fill buffer clearing on idle" }, - "CVE-2020-0435": { - "cmt_msg": "f2fs: fix to do sanity check with i_extra_isize" + "CVE-2021-29650": { + "cmt_msg": "netfilter: x_tables: Use correct memory barriers." }, - "CVE-2020-0432": { - "cmt_msg": "staging: most: net: fix buffer overflow" + "CVE-2018-20169": { + "cmt_msg": "USB: check usb_get_extra_descriptor for proper size" }, - "CVE-2020-0433": { - "cmt_msg": "blk-mq: sync the update nr_hw_queues with blk_mq_queue_tag_busy_iter" + "CVE-2020-36312": { + "cmt_msg": "KVM: fix memory leak in kvm_io_bus_unregister_dev()" }, - "CVE-2023-51779": { - "cmt_msg": "Bluetooth: af_bluetooth: Fix Use-After-Free in bt_sock_recvmsg" + "CVE-2022-28356": { + "cmt_msg": "llc: fix netdevice reference leaks in llc_ui_bind()" }, - "CVE-2019-3874": { - "cmt_msg": "sctp: implement memory accounting on tx path" + "CVE-2018-5750": { + "cmt_msg": "ACPI: sbshc: remove raw pointer from printk() message" }, - "CVE-2018-10877": { - "cmt_msg": "ext4: verify the depth of extent tree in ext4_find_extent()" + "CVE-2022-20166": { + "cmt_msg": "drivers core: Use sysfs_emit and sysfs_emit_at for show(device *...) functions" }, - "CVE-2018-10876": { - "cmt_msg": "ext4: only look at the bg_flags field if it is valid" + "CVE-2023-5178": { + "cmt_msg": "nvmet-tcp: Fix a possible UAF in queue intialization setup" }, - "CVE-2010-4563": { - "cmt_msg": "" + "CVE-2021-44879": { + "cmt_msg": "f2fs: fix to do sanity check on inode type during garbage collection" }, - "CVE-2023-1249": { - "cmt_msg": "coredump: Use the vma snapshot in fill_files_note" + "CVE-2020-9383": { + "cmt_msg": "floppy: check FDC index for errors before assigning it" }, - "CVE-2020-14331": { - "cmt_msg": "vgacon: Fix for missing check in scrollback handling" + "CVE-2023-1513": { + "cmt_msg": "kvm: initialize all of the kvm_debugregs structure before sending it to userspace" }, - "CVE-2018-10879": { - "cmt_msg": "ext4: make sure bitmaps and the inode table don't overlap with bg descriptors" + "CVE-2021-26401": { + "cmt_msg": "x86/speculation: Use generic retpoline by default on AMD" }, - "CVE-2018-10878": { - "cmt_msg": "ext4: always check block group bounds in ext4_init_block_bitmap()" + "CVE-2021-3847": { + "cmt_msg": "" }, - "CVE-2023-2248": { - "cmt_msg": "net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg" + "CVE-2019-9445": { + "cmt_msg": "f2fs: check if file namelen exceeds max value" }, - "CVE-2023-0266": { - "cmt_msg": "ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF" + "CVE-2019-20934": { + "cmt_msg": "sched/fair: Don't free p->numa_faults with concurrent readers" }, - "CVE-2023-1838": { - "cmt_msg": "Fix double fget() in vhost_net_set_backend()" + "CVE-2011-4916": { + "cmt_msg": "" }, - "CVE-2021-3483": { - "cmt_msg": "firewire: nosy: Fix a use-after-free bug in nosy_ioctl()" + "CVE-2023-23039": { + "cmt_msg": "" }, - "CVE-2017-16913": { - "cmt_msg": "usbip: fix stub_rx: harden CMD_SUBMIT path to handle malicious input" + "CVE-2017-16644": { + "cmt_msg": "media: hdpvr: Fix an error handling path in hdpvr_probe()" }, - "CVE-2017-16912": { - "cmt_msg": "usbip: fix stub_rx: get_pipe() to validate endpoint number" + "CVE-2019-5489": { + "cmt_msg": "Change mincore() to count \"mapped\" pages rather than \"cached\" pages" }, - "CVE-2017-16911": { - "cmt_msg": "usbip: prevent vhci_hcd driver from leaking a socket pointer address" + "CVE-2017-16648": { + "cmt_msg": "dvb_frontend: don't use-after-free the frontend struct" }, - "CVE-2020-28974": { - "cmt_msg": "vt: Disable KD_FONT_OP_COPY" + "CVE-2020-36322": { + "cmt_msg": "fuse: fix bad inode" }, - "CVE-2020-25656": { - "cmt_msg": "vt: keyboard, extend func_buf_lock to readers" + "CVE-2020-10711": { + "cmt_msg": "netlabel: cope with NULL catmap" }, - "CVE-2017-16914": { - "cmt_msg": "usbip: fix stub_send_ret_submit() vulnerability to null transfer_buffer" + "CVE-2020-35508": { + "cmt_msg": "fork: fix copy_process(CLONE_PARENT) race with the exiting ->real_parent" }, - "CVE-2023-1390": { - "cmt_msg": "tipc: fix NULL deref in tipc_link_xmit()" + "CVE-2020-35501": { + "cmt_msg": "" }, - "CVE-2022-24448": { - "cmt_msg": "NFSv4: Handle case where the lookup of a directory fails" + "CVE-2021-45095": { + "cmt_msg": "phonet: refcount leak in pep_sock_accep" }, - "CVE-2024-26598": { - "cmt_msg": "KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache" + "CVE-2023-3268": { + "cmt_msg": "relayfs: fix out-of-bounds access in relay_file_read" }, - "CVE-2020-10942": { - "cmt_msg": "vhost: Check docket sk_family instead of call getname" + "CVE-2021-32399": { + "cmt_msg": "bluetooth: eliminate the potential race condition when removing the HCI controller" }, - "CVE-2019-10142": { - "cmt_msg": "drivers/virt/fsl_hypervisor.c: prevent integer overflow in ioctl" + "CVE-2017-1000410": { + "cmt_msg": "Bluetooth: Prevent stack info leak from the EFS element." }, - "CVE-2021-4023": { - "cmt_msg": "io-wq: fix cancellation on create-worker failure" + "CVE-2022-32250": { + "cmt_msg": "netfilter: nf_tables: disallow non-stateful expression in sets earlier" }, - "CVE-2018-3693": { - "cmt_msg": "ext4: fix spectre gadget in ext4_mb_regular_allocator()" + "CVE-2021-28688": { + "cmt_msg": "xen-blkback: don't leak persistent grants from xen_blkbk_map()" }, - "CVE-2022-2318": { - "cmt_msg": "net: rose: fix UAF bugs caused by timer handler" + "CVE-2018-10878": { + "cmt_msg": "ext4: always check block group bounds in ext4_init_block_bitmap()" }, - "CVE-2021-22555": { - "cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write" + "CVE-2019-12379": { + "cmt_msg": "consolemap: Fix a memory leaking bug in drivers/tty/vt/consolemap.c" }, - "CVE-2022-36402": { - "cmt_msg": "drm/vmwgfx: Fix shader stage validation" + "CVE-2019-12378": { + "cmt_msg": "ipv6_sockglue: Fix a missing-check bug in ip6_ra_control()" }, - "CVE-2022-3542": { - "cmt_msg": "bnx2x: fix potential memory leak in bnx2x_tpa_stop()" + "CVE-2017-18379": { + "cmt_msg": "nvmet-fc: ensure target queue id within range." }, - "CVE-2021-0399": { - "cmt_msg": "" + "CVE-2020-26145": { + "cmt_msg": "ath10k: drop fragments with multicast DA for PCIe" }, - "CVE-2020-36691": { - "cmt_msg": "netlink: limit recursion depth in policy validation" + "CVE-2017-13216": { + "cmt_msg": "staging: android: ashmem: fix a race condition in ASHMEM_SET_SIZE ioctl" }, - "CVE-2023-42755": { - "cmt_msg": "net/sched: Retire rsvp classifier" + "CVE-2020-26147": { + "cmt_msg": "mac80211: assure all fragments are encrypted" }, - "CVE-2020-2732": { - "cmt_msg": "KVM: nVMX: Don't emulate instructions in guest mode" + "CVE-2020-26141": { + "cmt_msg": "ath10k: Fix TKIP Michael MIC verification for PCIe" }, - "CVE-2012-4542": { + "CVE-2020-26140": { "cmt_msg": "" }, - "CVE-2022-1729": { - "cmt_msg": "perf: Fix sys_perf_event_open() race against self" + "CVE-2020-26143": { + "cmt_msg": "" }, - "CVE-2023-42752": { - "cmt_msg": "igmp: limit igmpv3_newpack() packet size to IP_MAX_MTU" + "CVE-2020-26142": { + "cmt_msg": "" }, - "CVE-2023-4128": { - "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free" + "CVE-2019-17053": { + "cmt_msg": "ieee802154: enforce CAP_NET_RAW for raw sockets" }, - "CVE-2018-1000028": { - "cmt_msg": "nfsd: auth: Fix gid sorting when rootsquash enabled" + "CVE-2019-17052": { + "cmt_msg": "ax25: enforce CAP_NET_RAW for raw sockets" }, - "CVE-2023-1118": { - "cmt_msg": "media: rc: Fix use-after-free bugs caused by ene_tx_irqsim()" + "CVE-2019-17056": { + "cmt_msg": "nfc: enforce CAP_NET_RAW for raw sockets" }, - "CVE-2021-3573": { - "cmt_msg": "Bluetooth: use correct lock to prevent UAF of hdev object" + "CVE-2019-17055": { + "cmt_msg": "mISDN: enforce CAP_NET_RAW for raw sockets" }, - "CVE-2018-1000026": { - "cmt_msg": "bnx2x: disable GSO where gso_size is too big for hardware" + "CVE-2019-17054": { + "cmt_msg": "appletalk: enforce CAP_NET_RAW for raw sockets" }, - "CVE-2022-1975": { - "cmt_msg": "NFC: netlink: fix sleep in atomic bug when firmware download timeout" + "CVE-2024-26745": { + "cmt_msg": "powerpc/pseries/iommu: IOMMU table is not initialized for kdump over SR-IOV" }, - "CVE-2023-1380": { - "cmt_msg": "wifi: brcmfmac: slab-out-of-bounds read in brcmf_get_assoc_ies()" + "CVE-2024-26744": { + "cmt_msg": "RDMA/srpt: Support specifying the srpt_service_guid parameter" }, - "CVE-2022-44032": { - "cmt_msg": "char: pcmcia: remove all the drivers" + "CVE-2024-26743": { + "cmt_msg": "RDMA/qedr: Fix qedr_create_user_qp error flow" }, - "CVE-2021-28972": { - "cmt_msg": "PCI: rpadlpar: Fix potential drc_name corruption in store functions" + "CVE-2024-26740": { + "cmt_msg": "net/sched: act_mirred: use the backlog for mirred ingress" }, - "CVE-2018-12130": { - "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" + "CVE-2020-29661": { + "cmt_msg": "tty: Fix ->pgrp locking in tiocspgrp()" }, - "CVE-2021-20292": { - "cmt_msg": "drm/ttm/nouveau: don't call tt destroy callback on alloc failure." + "CVE-2020-29660": { + "cmt_msg": "tty: Fix ->session locking" }, - "CVE-2021-31916": { - "cmt_msg": "dm ioctl: fix out of bounds array access when no devices" + "CVE-2022-1734": { + "cmt_msg": "nfc: nfcmrvl: main: reorder destructive operations in nfcmrvl_nci_unregister_dev to avoid bugs" }, - "CVE-2018-17182": { - "cmt_msg": "mm: get rid of vmacache_flush_all() entirely" + "CVE-2024-26748": { + "cmt_msg": "usb: cdns3: fix memory double free when handle zero packet" }, - "CVE-2022-32981": { - "cmt_msg": "powerpc/32: Fix overread/overwrite of thread_struct via ptrace" + "CVE-2023-28772": { + "cmt_msg": "seq_buf: Fix overflow in seq_buf_putmem_hex()" }, - "CVE-2018-13405": { - "cmt_msg": "Fix up non-directory creation in SGID directories" + "CVE-2024-26699": { + "cmt_msg": "drm/amd/display: Fix array-index-out-of-bounds in dcn35_clkmgr" }, - "CVE-2020-25645": { - "cmt_msg": "geneve: add transport ports in route lookup for geneve" + "CVE-2024-26691": { + "cmt_msg": "KVM: arm64: Fix circular locking dependency" }, - "CVE-2018-13406": { - "cmt_msg": "video: uvesafb: Fix integer overflow in allocation" + "CVE-2022-4269": { + "cmt_msg": "act_mirred: use the backlog for nested calls to mirred ingress" }, - "CVE-2022-1280": { - "cmt_msg": "drm: avoid circular locks in drm_mode_getconnector" + "CVE-2024-26697": { + "cmt_msg": "nilfs2: fix data corruption in dsync block recovery for small block sizes" }, - "CVE-2023-3772": { - "cmt_msg": "xfrm: add NULL check in xfrm_update_ae_params" + "CVE-2024-26696": { + "cmt_msg": "nilfs2: fix hang in nilfs_lookup_dirty_data_buffers()" }, - "CVE-2020-11668": { - "cmt_msg": "media: xirlink_cit: add missing descriptor sanity checks" + "CVE-2019-15924": { + "cmt_msg": "fm10k: Fix a potential NULL pointer dereference" }, - "CVE-2020-11669": { - "cmt_msg": "powerpc/powernv/idle: Restore AMR/UAMOR/AMOR after idle" + "CVE-2019-15927": { + "cmt_msg": "ALSA: usb-audio: Avoid access before bLength check in build_audio_procunit()" }, - "CVE-2019-15118": { - "cmt_msg": "ALSA: usb-audio: Fix a stack buffer overflow bug in check_input_term" + "CVE-2019-15926": { + "cmt_msg": "ath6kl: add some bounds checking" }, - "CVE-2019-12818": { - "cmt_msg": "net: nfc: Fix NULL dereference on nfc_llcp_build_tlv fails" + "CVE-2019-15921": { + "cmt_msg": "genetlink: Fix a memory leak on error path" }, - "CVE-2019-12819": { - "cmt_msg": "mdio_bus: Fix use-after-free on device_register fails" + "CVE-2021-38160": { + "cmt_msg": "virtio_console: Assure used length from device is limited" }, - "CVE-2018-11508": { - "cmt_msg": "compat: fix 4-byte infoleak via uninitialized struct field" + "CVE-2019-15219": { + "cmt_msg": "USB: sisusbvga: fix oops in error path of sisusb_probe" }, - "CVE-2018-11506": { - "cmt_msg": "sr: pass down correctly sized SCSI sense buffer" + "CVE-2019-15218": { + "cmt_msg": "media: usb: siano: Fix general protection fault in smsusb" }, - "CVE-2019-19332": { - "cmt_msg": "KVM: x86: fix out-of-bounds write in KVM_GET_EMULATED_CPUID (CVE-2019-19332)" + "CVE-2005-3660": { + "cmt_msg": "" }, - "CVE-2019-15117": { - "cmt_msg": "ALSA: usb-audio: Fix an OOB bug in parse_audio_mixer_unit" + "CVE-2019-15212": { + "cmt_msg": "USB: rio500: refuse more than one device at a time" }, - "CVE-2021-3659": { - "cmt_msg": "net: mac802154: Fix general protection fault" + "CVE-2019-15211": { + "cmt_msg": "media: radio-raremono: change devm_k*alloc to k*alloc" }, - "CVE-2022-25258": { - "cmt_msg": "USB: gadget: validate interface OS descriptor requests" + "CVE-2019-15217": { + "cmt_msg": "media: usb:zr364xx:Fix KASAN:null-ptr-deref Read in zr364xx_vidioc_querycap" }, - "CVE-2021-4155": { - "cmt_msg": "xfs: map unwritten blocks in XFS_IOC_{ALLOC,FREE}SP just like fallocate" + "CVE-2019-15216": { + "cmt_msg": "USB: yurex: Fix protection fault after device removal" }, - "CVE-2019-14901": { - "cmt_msg": "mwifiex: Fix heap overflow in mmwifiex_process_tdls_action_frame()" + "CVE-2019-15215": { + "cmt_msg": "media: cpia2_usb: first wake up, then free in disconnect" }, - "CVE-2021-4150": { - "cmt_msg": "block: fix incorrect references to disk objects" + "CVE-2019-15214": { + "cmt_msg": "ALSA: core: Fix card races between register and disconnect" }, - "CVE-2020-3702": { - "cmt_msg": "ath: Use safer key clearing with key cache entries" + "CVE-2019-19922": { + "cmt_msg": "sched/fair: Fix low cpu usage with high throttling by removing expiration of cpu-local slices" }, - "CVE-2021-3653": { - "cmt_msg": "KVM: nSVM: avoid picking up unsupported bits from L2 in int_ctl (CVE-2021-3653)" + "CVE-2019-19927": { + "cmt_msg": "drm/ttm: fix incrementing the page pointer for huge pages" }, - "CVE-2021-3655": { - "cmt_msg": "sctp: validate from_addr_param return" + "CVE-2023-52498": { + "cmt_msg": "PM: sleep: Fix possible deadlocks in core system-wide PM code" }, - "CVE-2020-8694": { - "cmt_msg": "powercap: restrict energy meter to root access" + "CVE-2023-52491": { + "cmt_msg": "media: mtk-jpeg: Fix use after free bug due to error path handling in mtk_jpeg_dec_device_run" }, - "CVE-2021-4159": { - "cmt_msg": "bpf: Verifer, adjust_scalar_min_max_vals to always call update_reg_bounds()" + "CVE-2022-2318": { + "cmt_msg": "net: rose: fix UAF bugs caused by timer handler" }, - "CVE-2023-0461": { - "cmt_msg": "net/ulp: prevent ULP without clone op from entering the LISTEN status" + "CVE-2023-3611": { + "cmt_msg": "net/sched: sch_qfq: account for stab overhead in qfq_enqueue" }, - "CVE-2019-12614": { - "cmt_msg": "powerpc/pseries/dlpar: Fix a missing check in dlpar_parse_cc_property()" + "CVE-2023-4132": { + "cmt_msg": "media: usb: siano: Fix warning due to null work_func_t function pointer" }, - "CVE-2019-12615": { - "cmt_msg": "mdesc: fix a missing-check bug in get_vdev_port_node_info()" + "CVE-2020-26560": { + "cmt_msg": "" }, - "CVE-2021-3715": { - "cmt_msg": "net_sched: cls_route: remove the right filter from hashtable" + "CVE-2023-4134": { + "cmt_msg": "Input: cyttsp4_core - change del_timer_sync() to timer_shutdown_sync()" }, - "CVE-2021-3714": { + "CVE-2023-37454": { "cmt_msg": "" }, - "CVE-2019-16230": { - "cmt_msg": "drm/amdkfd: fix a potential NULL pointer dereference (v2)" - }, - "CVE-2019-16231": { - "cmt_msg": "fjes: Handle workqueue allocation failure" + "CVE-2023-35824": { + "cmt_msg": "media: dm1105: Fix use after free bug in dm1105_remove due to race condition" }, - "CVE-2019-16232": { - "cmt_msg": "libertas: fix a potential NULL pointer dereference" + "CVE-2022-20572": { + "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag" }, - "CVE-2019-16233": { - "cmt_msg": "scsi: qla2xxx: fix a potential NULL pointer dereference" + "CVE-2022-42703": { + "cmt_msg": "mm/rmap: Fix anon_vma->degree ambiguity leading to double-reuse" }, - "CVE-2019-16234": { - "cmt_msg": "iwlwifi: pcie: fix rb_allocator workqueue allocation" + "CVE-2021-4083": { + "cmt_msg": "fget: check that the fd still exists after getting a ref to it" }, - "CVE-2023-52445": { - "cmt_msg": "media: pvrusb2: fix use after free on context disconnection" + "CVE-2023-33288": { + "cmt_msg": "power: supply: bq24190: Fix use after free bug in bq24190_remove due to race condition" }, - "CVE-2019-6133": { - "cmt_msg": "fork: record start_time late" + "CVE-2022-29900": { + "cmt_msg": "x86/kvm/vmx: Make noinstr clean" }, - "CVE-2018-10902": { - "cmt_msg": "ALSA: rawmidi: Change resized buffers atomically" + "CVE-2022-29901": { + "cmt_msg": "x86/kvm/vmx: Make noinstr clean" }, - "CVE-2021-39633": { - "cmt_msg": "ip_gre: add validation for csum_start" + "CVE-2023-52485": { + "cmt_msg": "drm/amd/display: Wake DMCUB before sending a command" }, - "CVE-2017-18203": { - "cmt_msg": "dm: fix race between dm_get_from_kobject() and __dm_destroy()" + "CVE-2018-20511": { + "cmt_msg": "net/appletalk: fix minor pointer leak to userspace in SIOCFINDIPDDPRT" }, - "CVE-2017-18202": { - "cmt_msg": "mm, oom_reaper: gather each vma to prevent leaking TLB entry" + "CVE-2018-20510": { + "cmt_msg": "binder: replace \"%p\" with \"%pK\"" }, - "CVE-2021-39636": { - "cmt_msg": "netfilter: x_tables: fix pointer leaks to userspace" + "CVE-2021-47063": { + "cmt_msg": "drm: bridge/panel: Cleanup connector on bridge detach" }, - "CVE-2022-27223": { - "cmt_msg": "USB: gadget: validate endpoint index for xilinx udc" + "CVE-2022-3567": { + "cmt_msg": "ipv6: Fix data races around sk->sk_prot." }, - "CVE-2021-39634": { - "cmt_msg": "epoll: do not insert into poll queues until all sanity checks are done" + "CVE-2022-3566": { + "cmt_msg": "tcp: Fix data races around icsk->icsk_af_ops." }, - "CVE-2024-23851": { - "cmt_msg": "dm: limit the number of targets and parameter size area" + "CVE-2022-3565": { + "cmt_msg": "mISDN: fix use-after-free bugs in l1oip timer handlers" }, - "CVE-2019-3882": { - "cmt_msg": "vfio/type1: Limit DMA mappings per container" + "CVE-2022-3564": { + "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free caused by l2cap_reassemble_sdu" }, - "CVE-2017-18208": { - "cmt_msg": "mm/madvise.c: fix madvise() infinite loop under special circumstances" + "CVE-2023-0030": { + "cmt_msg": "drm/nouveau/mmu: add more general vmm free/node handling functions" }, - "CVE-2022-33741": { - "cmt_msg": "xen/netfront: force data bouncing when backend is untrusted" + "CVE-2019-11599": { + "cmt_msg": "coredump: fix race condition between mmget_not_zero()/get_task_mm() and core dumping" }, - "CVE-2018-20509": { - "cmt_msg": "binder: refactor binder ref inc/dec for thread safety" + "CVE-2019-2101": { + "cmt_msg": "media: uvcvideo: Fix 'type' check leading to overflow" }, - "CVE-2024-24864": { - "cmt_msg": "" + "CVE-2019-3459": { + "cmt_msg": "Bluetooth: Verify that l2cap_get_conf_opt provides large enough buffer" }, - "CVE-2022-45885": { - "cmt_msg": "" + "CVE-2020-0444": { + "cmt_msg": "audit: fix error handling in audit_data_to_entry()" }, - "CVE-2022-33744": { - "cmt_msg": "xen/arm: Fix race in RB-tree based P2M accounting" + "CVE-2022-1836": { + "cmt_msg": "floppy: disable FDRAWCMD by default" }, - "CVE-2023-4132": { - "cmt_msg": "media: usb: siano: Fix warning due to null work_func_t function pointer" + "CVE-2019-2215": { + "cmt_msg": "ANDROID: binder: remove waitqueue when thread exits." }, - "CVE-2022-40768": { - "cmt_msg": "scsi: stex: Properly zero out the passthrough command structure" + "CVE-2019-2213": { + "cmt_msg": "binder: fix possible UAF when freeing buffer" }, - "CVE-2023-1079": { - "cmt_msg": "HID: asus: use spinlock to safely schedule workers" + "CVE-2018-1087": { + "cmt_msg": "kvm/x86: fix icebp instruction handling" }, - "CVE-2019-9454": { - "cmt_msg": "i2c: core-smbus: prevent stack corruption on read I2C_BLOCK_DATA" + "CVE-2019-19045": { + "cmt_msg": "net/mlx5: prevent memory leak in mlx5_fpga_conn_create_cq" }, - "CVE-2020-12888": { - "cmt_msg": "vfio-pci: Invalidate mmaps and block MMIO access on disabled memory" + "CVE-2019-19049": { + "cmt_msg": "of: unittest: fix memory leak in unittest_data_add" }, - "CVE-2023-2194": { - "cmt_msg": "i2c: xgene-slimpro: Fix out-of-bounds bug in xgene_slimpro_i2c_xfer()" + "CVE-2018-13053": { + "cmt_msg": "alarmtimer: Prevent overflow for relative nanosleep" }, - "CVE-2021-3923": { - "cmt_msg": "RDMA/core: Don't infoleak GRH fields" + "CVE-2023-23559": { + "cmt_msg": "wifi: rndis_wlan: Prevent buffer overflow in rndis_query_oid" }, - "CVE-2021-0447": { - "cmt_msg": "l2tp: protect sock pointer of struct pppol2tp_session with RCU" + "CVE-2020-10720": { + "cmt_msg": "net-gro: fix use-after-free read in napi_gro_frags()" }, - "CVE-2022-41218": { - "cmt_msg": "media: dvb-core: Fix UAF due to refcount races at releasing" + "CVE-2018-12904": { + "cmt_msg": "kvm: nVMX: Enforce cpl=0 for VMX instructions" }, - "CVE-2019-20934": { - "cmt_msg": "sched/fair: Don't free p->numa_faults with concurrent readers" + "CVE-2022-20369": { + "cmt_msg": "media: v4l2-mem2mem: Apply DST_QUEUE_OFF_BASE on MMAP buffers across ioctls" }, - "CVE-2022-1247": { - "cmt_msg": "" + "CVE-2022-20368": { + "cmt_msg": "net/packet: fix slab-out-of-bounds access in packet_recvmsg()" }, - "CVE-2022-36946": { - "cmt_msg": "netfilter: nf_queue: do not allow packet truncation below transport header offset" + "CVE-2022-3424": { + "cmt_msg": "misc: sgi-gru: fix use-after-free error in gru_set_context_option, gru_fault and gru_handle_user_call_os" }, - "CVE-2022-1184": { - "cmt_msg": "ext4: verify dir block before splitting it" + "CVE-2019-5108": { + "cmt_msg": "mac80211: Do not send Layer 2 Update frame before authorization" }, - "CVE-2021-45485": { - "cmt_msg": "ipv6: use prandom_u32() for ID generation" + "CVE-2017-1000405": { + "cmt_msg": "mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d()" }, - "CVE-2021-0448": { - "cmt_msg": "netfilter: ctnetlink: add a range check for l3/l4 protonum" + "CVE-2017-1000407": { + "cmt_msg": "KVM: VMX: remove I/O port 0x80 bypass on Intel hosts" }, - "CVE-2018-19824": { - "cmt_msg": "ALSA: usb-audio: Fix UAF decrement if card has no live interfaces in card.c" + "CVE-2022-24448": { + "cmt_msg": "NFSv4: Handle case where the lookup of a directory fails" }, - "CVE-2022-21166": { - "cmt_msg": "x86/speculation/mmio: Enable CPU Fill buffer clearing on idle" + "CVE-2020-0427": { + "cmt_msg": "pinctrl: devicetree: Avoid taking direct reference to device name string" }, - "CVE-2020-29374": { - "cmt_msg": "gup: document and work around \"COW can break either way\" issue" + "CVE-2020-26088": { + "cmt_msg": "net/nfc/rawsock.c: add CAP_NET_RAW check." }, - "CVE-2020-0030": { - "cmt_msg": "ANDROID: binder: synchronize_rcu() when using POLLFREE." + "CVE-2008-2544": { + "cmt_msg": "" }, - "CVE-2023-4134": { - "cmt_msg": "Input: cyttsp4_core - change del_timer_sync() to timer_shutdown_sync()" + "CVE-2019-19462": { + "cmt_msg": "kernel/relay.c: handle alloc_percpu returning NULL in relay_open" }, - "CVE-2018-16862": { - "cmt_msg": "mm: cleancache: fix corruption on missed inode invalidation" + "CVE-2023-30772": { + "cmt_msg": "power: supply: da9150: Fix use after free bug in da9150_charger_remove due to race condition" }, - "CVE-2023-52449": { - "cmt_msg": "mtd: Fix gluebi NULL pointer dereference caused by ftl notifier" + "CVE-2021-3679": { + "cmt_msg": "tracing: Fix bug in rb_per_cpu_empty() that might cause deadloop." }, - "CVE-2021-29650": { - "cmt_msg": "netfilter: x_tables: Use correct memory barriers." + "CVE-2022-2586": { + "cmt_msg": "netfilter: nf_tables: do not allow SET_ID to refer to another table" }, - "CVE-2019-17133": { - "cmt_msg": "cfg80211: wext: avoid copying malformed SSIDs" + "CVE-2023-51782": { + "cmt_msg": "net/rose: Fix Use-After-Free in rose_ioctl" }, - "CVE-2023-4010": { - "cmt_msg": "" + "CVE-2023-51780": { + "cmt_msg": "atm: Fix Use-After-Free in do_vcc_ioctl" }, - "CVE-2018-20169": { - "cmt_msg": "USB: check usb_get_extra_descriptor for proper size" + "CVE-2023-51781": { + "cmt_msg": "appletalk: Fix Use-After-Free in atalk_ioctl" }, - "CVE-2021-33656": { - "cmt_msg": "vt: drop old FONT ioctls" + "CVE-2022-2588": { + "cmt_msg": "net_sched: cls_route: remove from list when handle is 0" }, - "CVE-2020-36558": { - "cmt_msg": "vt: vt_ioctl: fix race in VT_RESIZEX" + "CVE-2019-18885": { + "cmt_msg": "btrfs: merge btrfs_find_device and find_device" }, - "CVE-2022-41849": { - "cmt_msg": "fbdev: smscufx: Fix use-after-free in ufx_ops_open()" + "CVE-2024-26733": { + "cmt_msg": "arp: Prevent overflow in arp_req_get()." }, - "CVE-2022-41848": { - "cmt_msg": "" + "CVE-2024-26735": { + "cmt_msg": "ipv6: sr: fix possible use-after-free and null-ptr-deref" }, - "CVE-2020-36312": { - "cmt_msg": "KVM: fix memory leak in kvm_io_bus_unregister_dev()" + "CVE-2024-26738": { + "cmt_msg": "powerpc/pseries/iommu: DLPAR add doesn't completely initialize pci_controller" }, - "CVE-2022-1353": { - "cmt_msg": "af_key: add __GFP_ZERO flag for compose_sadb_supported in function pfkey_register" + "CVE-2024-26739": { + "cmt_msg": "net/sched: act_mirred: don't override retval if we already lost the skb" }, - "CVE-2022-28356": { - "cmt_msg": "llc: fix netdevice reference leaks in llc_ui_bind()" + "CVE-2022-38096": { + "cmt_msg": "" }, - "CVE-2022-1198": { - "cmt_msg": "drivers: hamradio: 6pack: fix UAF bug caused by mod_timer()" + "CVE-2017-5715": { + "cmt_msg": "x86/cpufeatures: Add X86_BUG_SPECTRE_V[12]" }, - "CVE-2022-1199": { - "cmt_msg": "ax25: Fix NULL pointer dereference in ax25_kill_by_device" + "CVE-2018-3620": { + "cmt_msg": "x86/microcode: Allow late microcode loading with SMT disabled" }, - "CVE-2018-5750": { - "cmt_msg": "ACPI: sbshc: remove raw pointer from printk() message" + "CVE-2020-16166": { + "cmt_msg": "random32: update the net random state on interrupt and activity" }, - "CVE-2021-39801": { - "cmt_msg": "" + "CVE-2021-33631": { + "cmt_msg": "ext4: fix kernel BUG in 'ext4_write_inline_data_end()'" }, - "CVE-2021-39800": { - "cmt_msg": "" + "CVE-2019-15916": { + "cmt_msg": "net-sysfs: Fix mem leak in netdev_register_kobject" }, - "CVE-2018-16884": { - "cmt_msg": "sunrpc: use-after-free in svc_process_common()" + "CVE-2019-15917": { + "cmt_msg": "Bluetooth: hci_ldisc: Postpone HCI_UART_PROTO_READY bit set in hci_uart_set_proto()" }, - "CVE-2022-1195": { - "cmt_msg": "hamradio: improve the incomplete fix to avoid NPD" + "CVE-2017-18344": { + "cmt_msg": "posix-timer: Properly check sigevent->sigev_notify" }, - "CVE-2024-22099": { - "cmt_msg": "" + "CVE-2024-26648": { + "cmt_msg": "drm/amd/display: Fix variable deferencing before NULL check in edp_setup_replay()" }, - "CVE-2021-4202": { - "cmt_msg": "NFC: reorganize the functions in nci_request" + "CVE-2024-26646": { + "cmt_msg": "thermal: intel: hfi: Add syscore callbacks for system-wide PM" }, - "CVE-2021-4203": { - "cmt_msg": "af_unix: fix races in sk_peer_pid and sk_peer_cred accesses" + "CVE-2018-18690": { + "cmt_msg": "xfs: don't fail when converting shortform attr to long form during ATTR_REPLACE" }, - "CVE-2022-4269": { - "cmt_msg": "act_mirred: use the backlog for nested calls to mirred ingress" + "CVE-2024-26644": { + "cmt_msg": "btrfs: don't abort filesystem when attempting to snapshot deleted subvolume" }, - "CVE-2022-45886": { - "cmt_msg": "media: dvb-core: Fix use-after-free due on race condition at dvb_net" + "CVE-2024-26642": { + "cmt_msg": "netfilter: nf_tables: disallow anonymous set with timeout flag" }, - "CVE-2023-46343": { - "cmt_msg": "nfc: nci: fix possible NULL pointer dereference in send_acknowledge()" + "CVE-2024-26641": { + "cmt_msg": "ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv()" }, - "CVE-2024-24859": { - "cmt_msg": "" + "CVE-2023-52464": { + "cmt_msg": "EDAC/thunderx: Fix possible out-of-bounds string access" }, - "CVE-2023-5178": { - "cmt_msg": "nvmet-tcp: Fix a possible UAF in queue intialization setup" + "CVE-2018-25020": { + "cmt_msg": "bpf: fix truncated jump targets on heavy expansions" }, - "CVE-2023-2124": { - "cmt_msg": "xfs: verify buffer contents when we skip log replay" + "CVE-2023-52469": { + "cmt_msg": "drivers/amd/pm: fix a use-after-free in kv_parse_power_table" }, - "CVE-2024-26594": { - "cmt_msg": "ksmbd: validate mech token in session setup" + "CVE-2021-46904": { + "cmt_msg": "net: hso: fix null-ptr-deref during tty device unregistration" }, - "CVE-2023-2860": { - "cmt_msg": "ipv6: sr: fix out-of-bounds read when setting HMAC data." + "CVE-2018-7273": { + "cmt_msg": "printk: hash addresses printed with %p" }, - "CVE-2021-44879": { - "cmt_msg": "f2fs: fix to do sanity check on inode type during garbage collection" + "CVE-2022-0617": { + "cmt_msg": "udf: Fix NULL ptr deref when converting from inline format" }, - "CVE-2019-15505": { - "cmt_msg": "media: technisat-usb2: break out of loop at end of buffer" + "CVE-2023-4459": { + "cmt_msg": "net: vmxnet3: fix possible NULL pointer dereference in vmxnet3_rq_cleanup()" }, - "CVE-2023-1859": { - "cmt_msg": "9p/xen : Fix use after free bug in xen_9pfs_front_remove due to race condition" + "CVE-2022-20566": { + "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free caused by l2cap_chan_put" }, - "CVE-2023-2513": { - "cmt_msg": "ext4: fix use-after-free in ext4_xattr_set_entry" + "CVE-2022-20565": { + "cmt_msg": "HID: core: Correctly handle ReportSize being zero" }, - "CVE-2023-1855": { - "cmt_msg": "hwmon: (xgene) Fix use after free bug in xgene_hwmon_remove due to race condition" + "CVE-2023-1990": { + "cmt_msg": "nfc: st-nci: Fix use after free bug in ndlc_remove due to race condition" }, - "CVE-2022-27672": { - "cmt_msg": "x86/speculation: Identify processors vulnerable to SMT RSB predictions" + "CVE-2021-33098": { + "cmt_msg": "ixgbe: fix large MTU request from VF" }, - "CVE-2022-2964": { - "cmt_msg": "net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup" + "CVE-2022-48619": { + "cmt_msg": "Input: add bounds checking to input_set_capability()" }, - "CVE-2021-1048": { - "cmt_msg": "fix regression in \"epoll: Keep a reference on files added to the check list\"" + "CVE-2019-3882": { + "cmt_msg": "vfio/type1: Limit DMA mappings per container" }, - "CVE-2015-2877": { - "cmt_msg": "" + "CVE-2021-47070": { + "cmt_msg": "uio_hv_generic: Fix another memory leak in error handling paths" }, - "CVE-2020-9383": { - "cmt_msg": "floppy: check FDC index for errors before assigning it" + "CVE-2021-47075": { + "cmt_msg": "nvmet: fix memory leak in nvmet_alloc_ctrl()" }, - "CVE-2019-16089": { - "cmt_msg": "" + "CVE-2021-47074": { + "cmt_msg": "nvme-loop: fix memory leak in nvme_loop_create_ctrl()" }, - "CVE-2023-1206": { - "cmt_msg": "tcp: Reduce chance of collisions in inet6_hashfn()." + "CVE-2021-47077": { + "cmt_msg": "scsi: qedf: Add pointer checks in qedf_update_link_speed()" }, - "CVE-2021-38198": { - "cmt_msg": "KVM: X86: MMU: Use the correct inherited permissions to get shadow page" + "CVE-2021-47076": { + "cmt_msg": "RDMA/rxe: Return CQE error if invalid lkey was supplied" }, - "CVE-2021-38199": { - "cmt_msg": "NFSv4: Initialise connection to the server in nfs4_alloc_client()" + "CVE-2021-47078": { + "cmt_msg": "RDMA/rxe: Clear all QP fields if creation failed" }, - "CVE-2023-0394": { - "cmt_msg": "ipv6: raw: Deduct extension header length in rawv6_push_pending_frames" + "CVE-2017-8824": { + "cmt_msg": "dccp: CVE-2017-8824: use-after-free in DCCP code" }, - "CVE-2022-1679": { - "cmt_msg": "ath9k: fix use-after-free in ath9k_hif_usb_rx_cb" + "CVE-2018-7492": { + "cmt_msg": "rds: Fix NULL pointer dereference in __rds_rdma_map" }, - "CVE-2023-34256": { - "cmt_msg": "ext4: avoid a potential slab-out-of-bounds in ext4_group_desc_csum" + "CVE-2019-10638": { + "cmt_msg": "inet: switch IP ID generator to siphash" }, - "CVE-2023-1513": { - "cmt_msg": "kvm: initialize all of the kvm_debugregs structure before sending it to userspace" + "CVE-2019-10639": { + "cmt_msg": "netns: provide pure entropy for net_hash_mix()" }, - "CVE-2019-9444": { - "cmt_msg": "printk: hash addresses printed with %p" + "CVE-2024-26676": { + "cmt_msg": "af_unix: Call kfree_skb() for dead unix_(sk)->oob_skb in GC." }, - "CVE-2021-26401": { - "cmt_msg": "x86/speculation: Use generic retpoline by default on AMD" + "CVE-2024-26675": { + "cmt_msg": "ppp_async: limit MRU to 64K" }, - "CVE-2020-28941": { - "cmt_msg": "speakup: Do not let the line discipline be used several times" + "CVE-2020-26557": { + "cmt_msg": "" }, - "CVE-2018-1130": { - "cmt_msg": "dccp: check sk for closed state in dccp_sendmsg()" + "CVE-2017-16536": { + "cmt_msg": "[media] cx231xx-cards: fix NULL-deref on missing association descriptor" }, - "CVE-2023-52442": { - "cmt_msg": "ksmbd: validate session id and tree id in compound request" + "CVE-2024-26779": { + "cmt_msg": "wifi: mac80211: fix race condition on enabling fast-xmit" }, - "CVE-2019-14284": { - "cmt_msg": "floppy: fix div-by-zero in setup_format_params" + "CVE-2017-16538": { + "cmt_msg": "media: dvb-usb-v2: lmedm04: Improve logic checking of warm start" }, - "CVE-2020-36557": { - "cmt_msg": "vt: vt_ioctl: fix VT_DISALLOCATE freeing in-use virtual console" + "CVE-2018-9517": { + "cmt_msg": "l2tp: pass tunnel pointer to ->session_create()" }, - "CVE-2021-3506": { - "cmt_msg": "f2fs: fix to avoid out-of-bounds memory access" + "CVE-2018-9516": { + "cmt_msg": "HID: debug: check length before copy_to_user()" }, - "CVE-2011-4917": { - "cmt_msg": "" + "CVE-2021-20317": { + "cmt_msg": "lib/timerqueue: Rely on rbtree semantics for next timer" }, - "CVE-2011-4916": { - "cmt_msg": "" + "CVE-2018-1094": { + "cmt_msg": "ext4: always initialize the crc32c checksum driver" }, - "CVE-2018-10880": { - "cmt_msg": "ext4: never move the system.data xattr out of the inode body" + "CVE-2018-1095": { + "cmt_msg": "ext4: limit xattr size to INT_MAX" }, - "CVE-2019-3900": { - "cmt_msg": "vhost_net: fix possible infinite loop" + "CVE-2018-1092": { + "cmt_msg": "ext4: fail ext4_iget for root directory if unallocated" }, - "CVE-2019-19528": { - "cmt_msg": "USB: iowarrior: fix use-after-free on disconnect" + "CVE-2018-1093": { + "cmt_msg": "ext4: add validity checks for bitmap block numbers" }, - "CVE-2019-19533": { - "cmt_msg": "media: ttusb-dec: Fix info-leak in ttusb_dec_send_command()" + "CVE-2021-3864": { + "cmt_msg": "" }, - "CVE-2018-13100": { - "cmt_msg": "f2fs: fix to do sanity check with secs_per_zone" + "CVE-2019-19054": { + "cmt_msg": "media: rc: prevent memory leak in cx23888_ir_probe" }, - "CVE-2019-15807": { - "cmt_msg": "scsi: libsas: delete sas port if expander discover failed" + "CVE-2019-19057": { + "cmt_msg": "mwifiex: pcie: Fix memory leak in mwifiex_pcie_init_evt_ring" }, - "CVE-2017-16644": { - "cmt_msg": "media: hdpvr: Fix an error handling path in hdpvr_probe()" + "CVE-2019-19056": { + "cmt_msg": "mwifiex: pcie: Fix memory leak in mwifiex_pcie_alloc_cmdrsp_buf" }, - "CVE-2019-19530": { - "cmt_msg": "usb: cdc-acm: make sure a refcount is taken early enough" + "CVE-2019-19052": { + "cmt_msg": "can: gs_usb: gs_can_open(): prevent memory leak" }, - "CVE-2023-31083": { - "cmt_msg": "Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO" + "CVE-2019-3846": { + "cmt_msg": "mwifiex: Fix possible buffer overflows at parsing bss descriptor" }, - "CVE-2019-5489": { - "cmt_msg": "Change mincore() to count \"mapped\" pages rather than \"cached\" pages" + "CVE-2019-19058": { + "cmt_msg": "iwlwifi: dbg_ini: fix memory leak in alloc_sgtable" }, - "CVE-2024-1312": { - "cmt_msg": "mm: lock_vma_under_rcu() must check vma->anon_vma under vma lock" + "CVE-2018-5391": { + "cmt_msg": "ip: discard IPv4 datagrams with overlapping segments." }, - "CVE-2018-8087": { - "cmt_msg": "mac80211_hwsim: fix possible memory leak in hwsim_new_radio_nl()" + "CVE-2018-5390": { + "cmt_msg": "tcp: free batches of packets in tcp_prune_ofo_queue()" }, - "CVE-2019-14283": { - "cmt_msg": "floppy: fix out-of-bounds read in copy_buffer" + "CVE-2023-20941": { + "cmt_msg": "" }, - "CVE-2018-10881": { - "cmt_msg": "ext4: clear i_data in ext4_inode_info when removing inline data" + "CVE-2018-20836": { + "cmt_msg": "scsi: libsas: fix a race condition when smp task timeout" }, - "CVE-2018-10882": { - "cmt_msg": "ext4: add more inode number paranoia checks" + "CVE-2020-10135": { + "cmt_msg": "Bluetooth: Consolidate encryption handling in hci_encrypt_cfm" }, - "CVE-2017-16648": { - "cmt_msg": "dvb_frontend: don't use-after-free the frontend struct" - } - } - }, - "4.12": { - "4.12.1": { - "CVE-2017-12146": { - "cmt_msg": "driver core: platform: fix race condition with driver_override", - "cmt_id": "d0ccfd55b9c75b90ebcb9c56029b07eddefb1155" - } - }, - "4.12.2": { - "CVE-2017-11176": { - "cmt_msg": "mqueue: fix a use-after-free in sys_mq_notify()", - "cmt_id": "34bfc894734d56cca6c5924b5889e6308eeb66e1" - } - }, - "4.12.3": { - "CVE-2019-9457": { - "cmt_msg": "exec: Limit arg stack to at most 75% of _STK_LIM", - "cmt_id": "c1152f1638c53af9ec782d77f3f2e6f6c8fb9b0a" + "CVE-2020-36766": { + "cmt_msg": "cec-api: prevent leaking memory through hole in structure" }, - "CVE-2018-14634": { - "cmt_msg": "exec: Limit arg stack to at most 75% of _STK_LIM", - "cmt_id": "c1152f1638c53af9ec782d77f3f2e6f6c8fb9b0a" + "CVE-2023-28328": { + "cmt_msg": "media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer()" }, - "CVE-2017-11089": { - "cmt_msg": "cfg80211: Define nla_policy for NL80211_ATTR_LOCAL_MESH_POWER_MODE", - "cmt_id": "b9582dbe58ebcbd9b415d3d10ef5d990ddba720c" + "CVE-2017-13693": { + "cmt_msg": "" }, - "CVE-2017-7541": { - "cmt_msg": "brcmfmac: fix possible buffer overflow in brcmf_cfg80211_mgmt_tx()", - "cmt_id": "f888b9ad79954af0c11d3a646129f1d70b951eec" + "CVE-2017-13695": { + "cmt_msg": "ACPICA: acpi: acpica: fix acpi operand cache leak in nseval.c" }, - "CVE-2017-1000371": { - "cmt_msg": "binfmt_elf: use ELF_ET_DYN_BASE only for PIE", - "cmt_id": "0c9fd20c4ca8fb97f40ea66a2db39f1f9c85797d" + "CVE-2017-13694": { + "cmt_msg": "" }, - "CVE-2017-1000370": { - "cmt_msg": "binfmt_elf: use ELF_ET_DYN_BASE only for PIE", - "cmt_id": "0c9fd20c4ca8fb97f40ea66a2db39f1f9c85797d" - } - }, - "4.12.4": { - "CVE-2017-10663": { - "cmt_msg": "f2fs: sanity check checkpoint segno and blkoff", - "cmt_id": "55df2e68c21714444fc3056c5636531ee9d1bc58" + "CVE-2021-3640": { + "cmt_msg": "Bluetooth: sco: Fix lock_sock() blockage by memcpy_from_msg()" }, - "CVE-2017-11473": { - "cmt_msg": "x86/acpi: Prevent out of bound access caused by broken ACPI tables", - "cmt_id": "464c38d4b9365fb013c568a391a7c89b7148d72a" + "CVE-2020-11608": { + "cmt_msg": "media: ov519: add missing endpoint sanity checks" }, - "CVE-2017-18079": { - "cmt_msg": "Input: i8042 - fix crash at boot time", - "cmt_id": "6c0d8c2a408402f2d83a41b141efc2e5e8e604c4" - } - }, - "4.12.5": { - "CVE-2017-7533": { - "cmt_msg": "dentry name snapshots", - "cmt_id": "75791420f2942f47f4fb5626110723668feea9a7" + "CVE-2020-10732": { + "cmt_msg": "fs/binfmt_elf.c: allocate initialized memory in fill_thread_core_info()" }, - "CVE-2017-12762": { - "cmt_msg": "isdn/i4l: fix buffer overflow", - "cmt_id": "cd043db87e4c49fa909a81c0daa2a3786dacf349" - } - }, - "4.12.6": { - "CVE-2017-8831": { - "cmt_msg": "saa7164: fix double fetch PCIe access condition", - "cmt_id": "52bc1dfd016e7a1859138d986670408fc3d830a0" + "CVE-2017-17975": { + "cmt_msg": "media: usbtv: prevent double free in error case" }, - "CVE-2017-7542": { - "cmt_msg": "ipv6: avoid overflow of offset in ip6_find_1stfragopt", - "cmt_id": "663f828a08af6f54c4f11c1eb16e68ad7a93c34c" - } - }, - "4.12.7": { - "CVE-2017-1000": { - "cmt_msg": "udp: consistently apply ufo or fragmentation", - "cmt_id": "2a8c396a689114da0fb9164cd07b13fd5b800782" + "CVE-2019-16921": { + "cmt_msg": "RDMA/hns: Fix init resp when alloc ucontext" }, - "CVE-2017-1000112": { - "cmt_msg": "udp: consistently apply ufo or fragmentation", - "cmt_id": "2a8c396a689114da0fb9164cd07b13fd5b800782" + "CVE-2021-0512": { + "cmt_msg": "HID: make arrays usage and value to be the same" }, - "CVE-2017-1000111": { - "cmt_msg": "packet: fix tp_reserve race in packet_set_ring", - "cmt_id": "91b2b39b49c25a0a76e3ef5302e848e6c9e60cfd" - } - }, - "4.12.9": { - "CVE-2017-12134": { - "cmt_msg": "xen: fix bio vec merging", - "cmt_id": "c1cee6062ac9c375cda25bd2d334d54af4bd4c26" + "CVE-2022-41222": { + "cmt_msg": "mm/mremap: hold the rmap lock in write mode when moving page table entries." }, - "CVE-2017-14140": { - "cmt_msg": "Sanitize 'move_pages()' permission checks", - "cmt_id": "e950adf8983f18cf210145af0cda1fe7e6aa8c11" + "CVE-2017-18595": { + "cmt_msg": "tracing: Fix possible double free on failure of allocating trace buffer" }, - "CVE-2018-10675": { - "cmt_msg": "mm/mempolicy: fix use after free when calling get_mempolicy", - "cmt_id": "6b2676ed32bad395689998bea6ce2d64aeda02a6" - } - }, - "4.12.10": { - "CVE-2017-17053": { - "cmt_msg": "x86/mm: Fix use-after-free of ldt_struct", - "cmt_id": "a8da876c1e45b75c082a5dc8ce10c0761a10c638" + "CVE-2024-26720": { + "cmt_msg": "mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again" }, - "CVE-2017-17052": { - "cmt_msg": "fork: fix incorrect fput of ->exe_file causing use-after-free", - "cmt_id": "f5024bb32d4d50b77f4fbc1e7251cf0f21def88e" - } - }, - "4.12.11": { - "CVE-2017-11600": { - "cmt_msg": "xfrm: policy: check policy direction value", - "cmt_id": "6c5b60edd786fe18b7be96b26ca980aa2bef0428" - } - }, - "4.12.13": { - "CVE-2017-14340": { - "cmt_msg": "xfs: XFS_IS_REALTIME_INODE() should be false if no rt device present", - "cmt_id": "9f7df0bca168528aba20794f400be134495551b8" + "CVE-2024-26726": { + "cmt_msg": "btrfs: don't drop extent_map for free space inode on write error" }, - "CVE-2017-1000251": { - "cmt_msg": "Bluetooth: Properly check L2CAP config option output buffer length", - "cmt_id": "8329b5e8c6cfe8af86344eb849c06ed69c0d868d" + "CVE-2019-6974": { + "cmt_msg": "kvm: fix kvm_ioctl_create_device() reference counting (CVE-2019-6974)" }, - "CVE-2017-9985": { - "cmt_msg": "ALSA: msnd: Optimize / harden DSP and MIDI loops", - "cmt_id": "9d6412aa06ce75e44fbaf1bfa15454150fd6a803" + "CVE-2023-2985": { + "cmt_msg": "fs: hfsplus: fix UAF issue in hfsplus_put_super" }, - "CVE-2017-9984": { - "cmt_msg": "ALSA: msnd: Optimize / harden DSP and MIDI loops", - "cmt_id": "9d6412aa06ce75e44fbaf1bfa15454150fd6a803" - } - }, - "4.12.14": { - "CVE-2017-14497": { - "cmt_msg": "packet: Don't write vnet header beyond end of buffer", - "cmt_id": "e7ebdeb47c8b14614c65a0a2ad07cf4c04e51469" + "CVE-2017-17806": { + "cmt_msg": "crypto: hmac - require that the underlying hash algorithm is unkeyed" }, - "CVE-2017-7558": { - "cmt_msg": "sctp: Avoid out-of-bounds reads from address storage", - "cmt_id": "6da138247b47105eca005464383cae11ac57bdab" - } - }, - "outstanding": { - "CVE-2020-36322": { - "cmt_msg": "fuse: fix bad inode" + "CVE-2017-17807": { + "cmt_msg": "KEYS: add missing permission check for request_key() destination" }, - "CVE-2020-10711": { - "cmt_msg": "netlabel: cope with NULL catmap" + "CVE-2017-17805": { + "cmt_msg": "crypto: salsa20 - fix blkcipher_walk API usage" }, - "CVE-2019-15090": { - "cmt_msg": "scsi: qedi: remove memset/memcpy to nfunc and use func instead" + "CVE-2024-26700": { + "cmt_msg": "drm/amd/display: Fix MST Null Ptr for RV" }, - "CVE-2019-14896": { - "cmt_msg": "libertas: Fix two buffer overflows at parsing bss descriptor" + "CVE-2023-52519": { + "cmt_msg": "HID: intel-ish-hid: ipc: Disable and reenable ACPI GPE bit" }, - "CVE-2022-3649": { - "cmt_msg": "nilfs2: fix use-after-free bug of struct nilfs_root" + "CVE-2023-52516": { + "cmt_msg": "dma-debug: don't call __dma_entry_alloc_check_leak() under free_entries_lock" }, - "CVE-2020-35501": { - "cmt_msg": "" + "CVE-2023-52517": { + "cmt_msg": "spi: sun6i: fix race between DMA RX transfer completion and RX FIFO drain" }, - "CVE-2019-15098": { - "cmt_msg": "ath6kl: fix a NULL-ptr-deref bug in ath6kl_usb_alloc_urb_from_pipe()" + "CVE-2023-52515": { + "cmt_msg": "RDMA/srp: Do not call scsi_done() from srp_abort()" }, - "CVE-2020-29368": { - "cmt_msg": "mm: thp: make the THP mapcount atomic against __split_huge_pmd_locked()" + "CVE-2019-15902": { + "cmt_msg": "" }, - "CVE-2017-17712": { - "cmt_msg": "net: ipv4: fix for a race condition in raw_sendmsg" + "CVE-2023-52510": { + "cmt_msg": "ieee802154: ca8210: Fix a potential UAF in ca8210_probe" }, - "CVE-2022-0001": { - "cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE" + "CVE-2023-52511": { + "cmt_msg": "spi: sun6i: reduce DMA RX transfer width to single byte" }, - "CVE-2020-12464": { - "cmt_msg": "USB: core: Fix free-while-in-use bug in the USB S-Glibrary" + "CVE-2019-20054": { + "cmt_msg": "fs/proc/proc_sysctl.c: fix NULL pointer dereference in put_links" }, - "CVE-2021-45469": { - "cmt_msg": "f2fs: fix to do sanity check on last xattr entry in __f2fs_setxattr()" + "CVE-2018-17977": { + "cmt_msg": "" }, - "CVE-2019-19965": { - "cmt_msg": "scsi: libsas: stop discovering if oob mode is disconnected" + "CVE-2024-26659": { + "cmt_msg": "xhci: handle isoc Babble and Buffer Overrun events properly" }, - "CVE-2019-19966": { - "cmt_msg": "media: cpia2: Fix use-after-free in cpia2_exit" + "CVE-2024-26658": { + "cmt_msg": "bcachefs: grab s_umount only if snapshotting" }, - "CVE-2022-42703": { - "cmt_msg": "mm/rmap: Fix anon_vma->degree ambiguity leading to double-reuse" + "CVE-2010-5321": { + "cmt_msg": "" }, - "CVE-2020-35508": { - "cmt_msg": "fork: fix copy_process(CLONE_PARENT) race with the exiting ->real_parent" + "CVE-2024-26655": { + "cmt_msg": "Fix memory leak in posix_clock_open()" }, - "CVE-2021-3894": { - "cmt_msg": "sctp: account stream padding length for reconf chunk" + "CVE-2024-26654": { + "cmt_msg": "ALSA: sh: aica: reorder cleanup operations to avoid UAF bugs" }, - "CVE-2020-24587": { - "cmt_msg": "mac80211: prevent mixed key and fragment cache attacks" + "CVE-2024-26656": { + "cmt_msg": "drm/amdgpu: fix use-after-free bug" }, - "CVE-2020-24586": { - "cmt_msg": "mac80211: prevent mixed key and fragment cache attacks" + "CVE-2024-26651": { + "cmt_msg": "sr9800: Add check for usbnet_get_endpoints" }, - "CVE-2017-1000410": { - "cmt_msg": "Bluetooth: Prevent stack info leak from the EFS element." + "CVE-2024-26650": { + "cmt_msg": "platform/x86: p2sb: Allow p2sb_bar() calls during PCI device probe" }, - "CVE-2023-6270": { - "cmt_msg": "" + "CVE-2022-1048": { + "cmt_msg": "ALSA: pcm: Fix races among concurrent hw_params and hw_free calls" }, - "CVE-2021-0129": { - "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical" + "CVE-2023-52475": { + "cmt_msg": "Input: powermate - fix use-after-free in powermate_config_complete" }, - "CVE-2019-20096": { - "cmt_msg": "dccp: Fix memleak in __feat_register_sp" + "CVE-2023-52477": { + "cmt_msg": "usb: hub: Guard against accesses to uninitialized BOS descriptors" }, - "CVE-2022-47520": { - "cmt_msg": "wifi: wilc1000: validate pairwise and authentication suite offsets" + "CVE-2023-52476": { + "cmt_msg": "perf/x86/lbr: Filter vsyscall addresses" }, - "CVE-2023-5717": { - "cmt_msg": "perf: Disallow mis-matched inherited group reads" + "CVE-2023-52470": { + "cmt_msg": "drm/radeon: check the alloc_workqueue return value in radeon_crtc_init()" }, - "CVE-2022-3643": { - "cmt_msg": "xen/netback: Ensure protocol headers don't fall in the non-linear area" + "CVE-2023-52479": { + "cmt_msg": "ksmbd: fix uaf in smb20_oplock_break_ack" }, - "CVE-2018-10940": { - "cmt_msg": "cdrom: information leak in cdrom_ioctl_media_changed()" + "CVE-2023-52478": { + "cmt_msg": "HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect" }, - "CVE-2022-32250": { - "cmt_msg": "netfilter: nf_tables: disallow non-stateful expression in sets earlier" + "CVE-2022-26365": { + "cmt_msg": "xen/blkfront: fix leaking data in shared pages" }, - "CVE-2018-10087": { - "cmt_msg": "kernel/exit.c: avoid undefined behaviour when calling wait4()" + "CVE-2020-12652": { + "cmt_msg": "scsi: mptfusion: Fix double fetch bug in ioctl" }, - "CVE-2019-9500": { - "cmt_msg": "brcmfmac: assure SSID length from firmware is limited" + "CVE-2020-12653": { + "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_cmd_append_vsie_tlv()" }, - "CVE-2019-9503": { - "cmt_msg": "brcmfmac: add subtype check for event handling in data path" + "CVE-2020-12656": { + "cmt_msg": "sunrpc: check that domain table is empty at module unload." }, - "CVE-2020-36158": { - "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_cmd_802_11_ad_hoc_start" + "CVE-2020-12657": { + "cmt_msg": "block, bfq: fix use-after-free in bfq_idle_slice_timer_body" }, - "CVE-2023-3159": { - "cmt_msg": "firewire: fix potential uaf in outbound_phy_packet_callback()" + "CVE-2020-12654": { + "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_ret_wmm_get_status()" }, - "CVE-2022-0480": { - "cmt_msg": "memcg: enable accounting for file lock caches" + "CVE-2022-23042": { + "cmt_msg": "xen/netfront: react properly to failing gnttab_end_foreign_access_ref()" }, - "CVE-2018-10124": { - "cmt_msg": "kernel/signal.c: avoid undefined behaviour in kill_something_info" + "CVE-2022-45887": { + "cmt_msg": "media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb()" }, - "CVE-2022-0487": { - "cmt_msg": "moxart: fix potential use-after-free on remove path" + "CVE-2022-4744": { + "cmt_msg": "tun: avoid double free in tun_free_netdev" }, - "CVE-2023-52429": { - "cmt_msg": "dm: limit the number of targets and parameter size area" + "CVE-2022-0400": { + "cmt_msg": "" }, - "CVE-2021-28964": { - "cmt_msg": "btrfs: fix race when cloning extent buffer during rewind of an old root" + "CVE-2022-45886": { + "cmt_msg": "media: dvb-core: Fix use-after-free due on race condition at dvb_net" }, - "CVE-2020-26558": { - "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical" + "CVE-2022-26966": { + "cmt_msg": "sr9700: sanity check for packet length" }, - "CVE-2024-26595": { - "cmt_msg": "mlxsw: spectrum_acl_tcam: Fix NULL pointer dereference in error path" + "CVE-2023-1989": { + "cmt_msg": "Bluetooth: btsdio: fix use after free bug in btsdio_remove due to unfinished work" }, - "CVE-2022-23825": { + "CVE-2022-25265": { "cmt_msg": "" }, - "CVE-2021-42252": { - "cmt_msg": "soc: aspeed: lpc-ctrl: Fix boundary check for mmap" - }, - "CVE-2019-10124": { - "cmt_msg": "mm: hwpoison: fix thp split handing in soft_offline_in_use_page()" + "CVE-2020-25285": { + "cmt_msg": "mm/hugetlb: fix a race between hugetlb sysctl handlers" }, - "CVE-2019-9245": { - "cmt_msg": "f2fs: sanity check of xattr entry size" + "CVE-2020-11609": { + "cmt_msg": "media: stv06xx: add missing descriptor sanity checks" }, - "CVE-2024-26588": { - "cmt_msg": "LoongArch: BPF: Prevent out-of-bounds memory access" + "CVE-2020-25284": { + "cmt_msg": "rbd: require global CAP_SYS_ADMIN for mapping and unmapping" }, - "CVE-2023-2162": { - "cmt_msg": "scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress" + "CVE-2023-4208": { + "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free" }, - "CVE-2022-21125": { - "cmt_msg": "x86/speculation/mmio: Reuse SRBDS mitigation for SBDS" + "CVE-2023-4206": { + "cmt_msg": "net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free" }, - "CVE-2024-24857": { - "cmt_msg": "" + "CVE-2023-4207": { + "cmt_msg": "net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free" }, - "CVE-2019-19241": { - "cmt_msg": "io_uring: async workers should inherit the user creds" + "CVE-2021-47046": { + "cmt_msg": "drm/amd/display: Fix off by one in hdmi_14_process_transaction()" }, - "CVE-2022-40307": { - "cmt_msg": "efi: capsule-loader: Fix use-after-free in efi_capsule_write" + "CVE-2020-29370": { + "cmt_msg": "mm: slub: add missing TID bump in kmem_cache_alloc_bulk()" }, - "CVE-2022-21123": { - "cmt_msg": "x86/speculation/mmio: Add mitigation for Processor MMIO Stale Data" + "CVE-2022-20424": { + "cmt_msg": "io_uring: remove io_identity" }, - "CVE-2023-3390": { - "cmt_msg": "netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE" + "CVE-2022-20422": { + "cmt_msg": "arm64: fix oops in concurrently setting insn_emulation sysctls" }, - "CVE-2021-28688": { - "cmt_msg": "xen-blkback: don't leak persistent grants from xen_blkbk_map()" + "CVE-2022-45934": { + "cmt_msg": "Bluetooth: L2CAP: Fix u8 overflow" }, - "CVE-2021-39686": { - "cmt_msg": "binder: use euid from cred instead of using task" + "CVE-2021-4197": { + "cmt_msg": "cgroup: Use open-time credentials for process migraton perm checks" }, - "CVE-2021-39685": { - "cmt_msg": "USB: gadget: detect too-big endpoint 0 requests" + "CVE-2020-24503": { + "cmt_msg": "" }, - "CVE-2023-6535": { + "CVE-2020-24502": { "cmt_msg": "" }, - "CVE-2021-43975": { - "cmt_msg": "atlantic: Fix OOB read and write in hw_atl_utils_fw_rpc_wait" + "CVE-2024-26774": { + "cmt_msg": "ext4: avoid dividing by 0 in mb_update_avg_fragment_size() when block bitmap corrupt" }, - "CVE-2018-6927": { - "cmt_msg": "futex: Prevent overflow by strengthen input validation" + "CVE-2023-31436": { + "cmt_msg": "net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg" }, - "CVE-2020-0466": { - "cmt_msg": "do_epoll_ctl(): clean the failure exits up a bit" + "CVE-2019-8980": { + "cmt_msg": "exec: Fix mem leak in kernel_read_file" }, - "CVE-2019-10207": { - "cmt_msg": "Bluetooth: hci_uart: check for missing tty operations" + "CVE-2024-26775": { + "cmt_msg": "aoe: avoid potential deadlock at set_capacity" }, - "CVE-2018-10878": { - "cmt_msg": "ext4: always check block group bounds in ext4_init_block_bitmap()" + "CVE-2018-14609": { + "cmt_msg": "btrfs: relocation: Only remove reloc rb_trees if reloc control has been initialized" }, - "CVE-2021-33656": { - "cmt_msg": "vt: drop old FONT ioctls" + "CVE-2024-23851": { + "cmt_msg": "dm: limit the number of targets and parameter size area" }, - "CVE-2023-0458": { - "cmt_msg": "prlimit: do_prlimit needs to have a speculation check" + "CVE-2024-26772": { + "cmt_msg": "ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal()" }, - "CVE-2020-26141": { - "cmt_msg": "ath10k: Fix TKIP Michael MIC verification for PCIe" + "CVE-2020-27777": { + "cmt_msg": "powerpc/rtas: Restrict RTAS requests from userspace" }, - "CVE-2018-1000204": { - "cmt_msg": "scsi: sg: allocate with __GFP_ZERO in sg_build_indirect()" + "CVE-2019-11486": { + "cmt_msg": "tty: mark Siemens R3964 line discipline as BROKEN" }, - "CVE-2023-0597": { - "cmt_msg": "x86/mm: Randomize per-cpu entry area" + "CVE-2019-11487": { + "cmt_msg": "fs: prevent page refcount overflow in pipe_buf_get" }, - "CVE-2019-12379": { - "cmt_msg": "consolemap: Fix a memory leaking bug in drivers/tty/vt/consolemap.c" + "CVE-2018-8043": { + "cmt_msg": "net: phy: mdio-bcm-unimac: fix potential NULL dereference in unimac_mdio_probe()" }, - "CVE-2019-12378": { - "cmt_msg": "ipv6_sockglue: Fix a missing-check bug in ip6_ra_control()" + "CVE-2019-20908": { + "cmt_msg": "efi: Restrict efivar_ssdt_load when the kernel is locked down" }, - "CVE-2021-3744": { - "cmt_msg": "crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd()" + "CVE-2019-19060": { + "cmt_msg": "iio: imu: adis16400: release allocated memory on failure" }, - "CVE-2021-30002": { - "cmt_msg": "media: v4l: ioctl: Fix memory leak in video_usercopy" + "CVE-2019-19061": { + "cmt_msg": "iio: imu: adis16400: fix memory leak" }, - "CVE-2017-17450": { - "cmt_msg": "netfilter: xt_osf: Add missing permission checks" + "CVE-2019-19062": { + "cmt_msg": "crypto: user - fix memory leak in crypto_report" }, - "CVE-2021-0941": { - "cmt_msg": "bpf: Remove MTU check in __bpf_skb_max_len" + "CVE-2019-19063": { + "cmt_msg": "rtlwifi: prevent memory leak in rtl_usb_probe" }, - "CVE-2022-2586": { - "cmt_msg": "netfilter: nf_tables: do not allow SET_ID to refer to another table" + "CVE-2017-17741": { + "cmt_msg": "KVM: Fix stack-out-of-bounds read in write_mmio" }, - "CVE-2024-26591": { - "cmt_msg": "bpf: Fix re-attachment branch in bpf_tracing_prog_attach" + "CVE-2019-19065": { + "cmt_msg": "RDMA/hfi1: Prevent memory leak in sdma_init" }, - "CVE-2020-15802": { - "cmt_msg": "" + "CVE-2019-19066": { + "cmt_msg": "scsi: bfa: release allocated memory in case of error" }, - "CVE-2024-26594": { - "cmt_msg": "ksmbd: validate mech token in session setup" + "CVE-2019-19067": { + "cmt_msg": "drm/amdgpu: fix multiple memory leaks in acp_hw_init" }, - "CVE-2023-2483": { - "cmt_msg": "net: qcom/emac: Fix use after free bug in emac_remove due to race condition" + "CVE-2019-19068": { + "cmt_msg": "rtl8xxxu: prevent leaking urb" }, - "CVE-2017-18270": { - "cmt_msg": "KEYS: prevent creating a different user's keyrings" + "CVE-2019-3874": { + "cmt_msg": "sctp: implement memory accounting on tx path" }, - "CVE-2022-3636": { - "cmt_msg": "net: ethernet: mtk_eth_soc: use after free in __mtk_ppe_check_skb()" + "CVE-2020-36516": { + "cmt_msg": "ipv4: avoid using shared IP generator for connected sockets" }, - "CVE-2022-3635": { - "cmt_msg": "atm: idt77252: fix use-after-free bugs caused by tst_timer" + "CVE-2012-4542": { + "cmt_msg": "" }, - "CVE-2022-0002": { - "cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE" + "CVE-2018-1000028": { + "cmt_msg": "nfsd: auth: Fix gid sorting when rootsquash enabled" }, - "CVE-2021-34556": { - "cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4" + "CVE-2018-1000026": { + "cmt_msg": "bnx2x: disable GSO where gso_size is too big for hardware" }, - "CVE-2020-0543": { - "cmt_msg": "x86/cpu: Add 'table' argument to cpu_matches()" + "CVE-2020-36777": { + "cmt_msg": "media: dvbdev: Fix memory leak in dvb_media_device_free()" }, - "CVE-2022-40982": { - "cmt_msg": "x86/speculation: Add Gather Data Sampling mitigation" + "CVE-2020-36775": { + "cmt_msg": "f2fs: fix to avoid potential deadlock" }, - "CVE-2022-3202": { - "cmt_msg": "jfs: prevent NULL deref in diFree" + "CVE-2021-20292": { + "cmt_msg": "drm/ttm/nouveau: don't call tt destroy callback on alloc failure." }, - "CVE-2018-3646": { - "cmt_msg": "x86/microcode: Allow late microcode loading with SMT disabled" + "CVE-2023-2269": { + "cmt_msg": "dm ioctl: fix nested locking in table_clear() to remove deadlock concern" }, - "CVE-2019-11085": { - "cmt_msg": "drm/i915/gvt: Fix mmap range check" + "CVE-2020-10690": { + "cmt_msg": "ptp: fix the race between the release of ptp_clock and cdev" }, - "CVE-2024-24861": { - "cmt_msg": "" + "CVE-2021-3659": { + "cmt_msg": "net: mac802154: Fix general protection fault" }, - "CVE-2017-17558": { - "cmt_msg": "USB: core: prevent malicious bNumInterfaces overflow" + "CVE-2021-3653": { + "cmt_msg": "KVM: nSVM: avoid picking up unsupported bits from L2 in int_ctl (CVE-2021-3653)" }, - "CVE-2019-11477": { - "cmt_msg": "tcp: limit payload size of sacked skbs" + "CVE-2021-3655": { + "cmt_msg": "sctp: validate from_addr_param return" }, - "CVE-2021-28711": { - "cmt_msg": "xen/blkfront: harden blkfront against event channel storms" + "CVE-2021-3656": { + "cmt_msg": "KVM: nSVM: always intercept VMLOAD/VMSAVE when nested (CVE-2021-3656)" }, - "CVE-2018-14614": { - "cmt_msg": "f2fs: fix to do sanity check with cp_pack_start_sum" + "CVE-2019-12614": { + "cmt_msg": "powerpc/pseries/dlpar: Fix a missing check in dlpar_parse_cc_property()" }, - "CVE-2019-11479": { - "cmt_msg": "tcp: add tcp_min_snd_mss sysctl" + "CVE-2019-12615": { + "cmt_msg": "mdesc: fix a missing-check bug in get_vdev_port_node_info()" }, - "CVE-2018-14616": { - "cmt_msg": "f2fs: fix to do sanity check with block address in main area v2" + "CVE-2021-3896": { + "cmt_msg": "isdn: cpai: check ctr->cnr to avoid array index out of bound" }, - "CVE-2018-14611": { - "cmt_msg": "btrfs: validate type when reading a chunk" + "CVE-2021-3894": { + "cmt_msg": "sctp: account stream padding length for reconf chunk" }, - "CVE-2018-14610": { - "cmt_msg": "btrfs: Check that each block group has corresponding chunk at mount time" + "CVE-2021-3892": { + "cmt_msg": "" }, - "CVE-2018-14613": { - "cmt_msg": "btrfs: tree-checker: Verify block_group_item" + "CVE-2022-27223": { + "cmt_msg": "USB: gadget: validate endpoint index for xilinx udc" }, - "CVE-2018-14612": { - "cmt_msg": "btrfs: tree-checker: Detect invalid and empty essential trees" + "CVE-2022-24958": { + "cmt_msg": "usb: gadget: don't release an existing dev->buf" }, - "CVE-2020-26145": { - "cmt_msg": "ath10k: drop fragments with multicast DA for PCIe" + "CVE-2020-36557": { + "cmt_msg": "vt: vt_ioctl: fix VT_DISALLOCATE freeing in-use virtual console" }, - "CVE-2017-13216": { - "cmt_msg": "staging: android: ashmem: fix a race condition in ASHMEM_SET_SIZE ioctl" + "CVE-2020-12888": { + "cmt_msg": "vfio-pci: Invalidate mmaps and block MMIO access on disabled memory" }, - "CVE-2020-26147": { - "cmt_msg": "mac80211: assure all fragments are encrypted" + "CVE-2023-2194": { + "cmt_msg": "i2c: xgene-slimpro: Fix out-of-bounds bug in xgene_slimpro_i2c_xfer()" }, - "CVE-2018-19854": { - "cmt_msg": "crypto: user - fix leaking uninitialized memory to userspace" + "CVE-2022-41218": { + "cmt_msg": "media: dvb-core: Fix UAF due to refcount races at releasing" }, - "CVE-2020-26140": { + "CVE-2011-4917": { "cmt_msg": "" }, - "CVE-2020-26143": { + "CVE-2021-45485": { + "cmt_msg": "ipv6: use prandom_u32() for ID generation" + }, + "CVE-2020-0030": { + "cmt_msg": "ANDROID: binder: synchronize_rcu() when using POLLFREE." + }, + "CVE-2019-17133": { + "cmt_msg": "cfg80211: wext: avoid copying malformed SSIDs" + }, + "CVE-2019-3900": { + "cmt_msg": "vhost_net: fix possible infinite loop" + }, + "CVE-2022-40982": { + "cmt_msg": "x86/speculation: Add Gather Data Sampling mitigation" + }, + "CVE-2021-39801": { "cmt_msg": "" }, - "CVE-2020-26142": { + "CVE-2021-39800": { "cmt_msg": "" }, - "CVE-2019-17053": { - "cmt_msg": "ieee802154: enforce CAP_NET_RAW for raw sockets" + "CVE-2024-22099": { + "cmt_msg": "Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security" }, - "CVE-2019-17052": { - "cmt_msg": "ax25: enforce CAP_NET_RAW for raw sockets" + "CVE-2021-4202": { + "cmt_msg": "NFC: reorganize the functions in nci_request" }, - "CVE-2023-1076": { - "cmt_msg": "tun: tun_chr_open(): correctly initialize socket uid" + "CVE-2021-4203": { + "cmt_msg": "af_unix: fix races in sk_peer_pid and sk_peer_cred accesses" }, - "CVE-2023-1077": { - "cmt_msg": "sched/rt: pick_next_rt_entity(): check list_entry" + "CVE-2023-52509": { + "cmt_msg": "ravb: Fix use-after-free issue in ravb_tx_timeout_work()" }, - "CVE-2020-27418": { - "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region" + "CVE-2023-52508": { + "cmt_msg": "nvme-fc: Prevent null pointer dereference in nvme_fc_io_getuuid()" }, - "CVE-2019-17056": { - "cmt_msg": "nfc: enforce CAP_NET_RAW for raw sockets" + "CVE-2023-52507": { + "cmt_msg": "nfc: nci: assert requested protocol is valid" }, - "CVE-2019-17055": { - "cmt_msg": "mISDN: enforce CAP_NET_RAW for raw sockets" + "CVE-2023-52506": { + "cmt_msg": "LoongArch: Set all reserved memblocks on Node#0 at initialization" }, - "CVE-2019-17054": { - "cmt_msg": "appletalk: enforce CAP_NET_RAW for raw sockets" + "CVE-2023-52501": { + "cmt_msg": "ring-buffer: Do not attempt to read past \"commit\"" }, - "CVE-2018-13093": { - "cmt_msg": "xfs: validate cached inodes are free when allocated" + "CVE-2023-52500": { + "cmt_msg": "scsi: pm80xx: Avoid leaking tags when processing OPC_INB_SET_CONTROLLER_CONFIG command" }, - "CVE-2021-38300": { - "cmt_msg": "bpf, mips: Validate conditional branch offsets" + "CVE-2023-52502": { + "cmt_msg": "net: nfc: fix races in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn()" }, - "CVE-2018-13096": { - "cmt_msg": "f2fs: fix to do sanity check with node footer and iblocks" + "CVE-2023-3863": { + "cmt_msg": "net: nfc: Fix use-after-free caused by nfc_llcp_find_local" }, - "CVE-2018-13097": { - "cmt_msg": "f2fs: fix to do sanity check with user_block_count" + "CVE-2024-26668": { + "cmt_msg": "netfilter: nft_limit: reject configurations that cause integer overflow" }, - "CVE-2018-13094": { - "cmt_msg": "xfs: don't call xfs_da_shrink_inode with NULL bp" + "CVE-2024-26663": { + "cmt_msg": "tipc: Check the bearer type before calling tipc_udp_nl_bearer_add()" }, - "CVE-2018-13095": { - "cmt_msg": "xfs: More robust inode extent count validation" + "CVE-2024-26664": { + "cmt_msg": "hwmon: (coretemp) Fix out-of-bounds memory access" }, - "CVE-2020-29661": { - "cmt_msg": "tty: Fix ->pgrp locking in tiocspgrp()" + "CVE-2021-38198": { + "cmt_msg": "KVM: X86: MMU: Use the correct inherited permissions to get shadow page" }, - "CVE-2020-29660": { - "cmt_msg": "tty: Fix ->session locking" + "CVE-2021-38199": { + "cmt_msg": "NFSv4: Initialise connection to the server in nfs4_alloc_client()" }, - "CVE-2018-13098": { - "cmt_msg": "f2fs: fix to do sanity check with extra_attr feature" + "CVE-2022-1679": { + "cmt_msg": "ath9k: fix use-after-free in ath9k_hif_usb_rx_cb" }, - "CVE-2018-13099": { - "cmt_msg": "f2fs: fix to do sanity check with reserved blkaddr of inline inode" + "CVE-2023-34256": { + "cmt_msg": "ext4: avoid a potential slab-out-of-bounds in ext4_group_desc_csum" }, - "CVE-2022-1734": { - "cmt_msg": "nfc: nfcmrvl: main: reorder destructive operations in nfcmrvl_nci_unregister_dev to avoid bugs" + "CVE-2023-52442": { + "cmt_msg": "ksmbd: validate session id and tree id in compound request" }, - "CVE-2017-15951": { - "cmt_msg": "KEYS: Fix race between updating and finding a negative key" + "CVE-2023-52443": { + "cmt_msg": "apparmor: avoid crash when parsed profile name is empty" }, - "CVE-2023-28772": { - "cmt_msg": "seq_buf: Fix overflow in seq_buf_putmem_hex()" + "CVE-2023-52444": { + "cmt_msg": "f2fs: fix to avoid dirent corruption" }, - "CVE-2019-14895": { - "cmt_msg": "mwifiex: fix possible heap overflow in mwifiex_process_country_ie()" + "CVE-2023-52445": { + "cmt_msg": "media: pvrusb2: fix use after free on context disconnection" }, - "CVE-2019-19770": { - "cmt_msg": "blktrace: fix debugfs use after free" + "CVE-2023-52449": { + "cmt_msg": "mtd: Fix gluebi NULL pointer dereference caused by ftl notifier" }, - "CVE-2022-2588": { - "cmt_msg": "net_sched: cls_route: remove from list when handle is 0" + "CVE-2019-15807": { + "cmt_msg": "scsi: libsas: delete sas port if expander discover failed" }, - "CVE-2019-11884": { - "cmt_msg": "Bluetooth: hidp: fix buffer overflow" + "CVE-2024-26719": { + "cmt_msg": "nouveau: offload fence uevents work to workqueue" }, - "CVE-2020-15780": { - "cmt_msg": "ACPI: configfs: Disallow loading ACPI tables when locked down" + "CVE-2024-26715": { + "cmt_msg": "usb: dwc3: gadget: Fix NULL pointer dereference in dwc3_gadget_suspend" }, - "CVE-2019-19075": { - "cmt_msg": "ieee802154: ca8210: prevent memory leak" + "CVE-2024-1312": { + "cmt_msg": "mm: lock_vma_under_rcu() must check vma->anon_vma under vma lock" }, - "CVE-2019-19074": { - "cmt_msg": "ath9k: release allocated buffer if timed out" + "CVE-2019-14284": { + "cmt_msg": "floppy: fix div-by-zero in setup_format_params" }, - "CVE-2019-18683": { - "cmt_msg": "media: vivid: Fix wrong locking that causes race conditions on streaming stop" + "CVE-2018-10880": { + "cmt_msg": "ext4: never move the system.data xattr out of the inode body" }, - "CVE-2022-2503": { - "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag" + "CVE-2023-3338": { + "cmt_msg": "Remove DECnet support from kernel" }, - "CVE-2022-48619": { - "cmt_msg": "Input: add bounds checking to input_set_capability()" + "CVE-2018-10882": { + "cmt_msg": "ext4: add more inode number paranoia checks" }, - "CVE-2019-18680": { - "cmt_msg": "" + "CVE-2018-10883": { + "cmt_msg": "jbd2: don't mark block as modified if the handle is out of credits" }, - "CVE-2022-23038": { - "cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()" + "CVE-2020-29368": { + "cmt_msg": "mm: thp: make the THP mapcount atomic against __split_huge_pmd_locked()" }, - "CVE-2022-23039": { - "cmt_msg": "xen/gntalloc: don't use gnttab_query_foreign_access()" + "CVE-2020-12464": { + "cmt_msg": "USB: core: Fix free-while-in-use bug in the USB S-Glibrary" }, - "CVE-2017-14991": { - "cmt_msg": "scsi: sg: fixup infoleak when using SG_GET_REQUEST_TABLE" + "CVE-2022-47520": { + "cmt_msg": "wifi: wilc1000: validate pairwise and authentication suite offsets" }, - "CVE-2022-20158": { - "cmt_msg": "net/packet: fix slab-out-of-bounds access in packet_recvmsg()" + "CVE-2023-3159": { + "cmt_msg": "firewire: fix potential uaf in outbound_phy_packet_callback()" }, - "CVE-2022-23037": { - "cmt_msg": "xen/netfront: don't use gnttab_query_foreign_access() for mapped status" + "CVE-2021-47059": { + "cmt_msg": "crypto: sun8i-ss - fix result memory leak on error path" }, - "CVE-2023-20588": { - "cmt_msg": "x86/CPU/AMD: Do not leak quotient data after a division by 0" + "CVE-2021-47052": { + "cmt_msg": "crypto: sa2ul - Fix memory leak of rxd" }, - "CVE-2020-0404": { - "cmt_msg": "media: uvcvideo: Avoid cyclic entity chains due to malformed USB descriptors" + "CVE-2018-20784": { + "cmt_msg": "sched/fair: Fix infinite loop in update_blocked_averages() by reverting a9e7f6544b9c" }, - "CVE-2019-15924": { - "cmt_msg": "fm10k: Fix a potential NULL pointer dereference" + "CVE-2021-47056": { + "cmt_msg": "crypto: qat - ADF_STATUS_PF_RUNNING should be set after adf_dev_init" }, - "CVE-2019-15538": { - "cmt_msg": "xfs: fix missing ILOCK unlock when xfs_setattr_nonsize fails due to EDQUOT" + "CVE-2021-47054": { + "cmt_msg": "bus: qcom: Put child node before return" }, - "CVE-2019-15926": { - "cmt_msg": "ath6kl: add some bounds checking" + "CVE-2022-21125": { + "cmt_msg": "x86/speculation/mmio: Reuse SRBDS mitigation for SBDS" }, - "CVE-2019-15921": { - "cmt_msg": "genetlink: Fix a memory leak on error path" + "CVE-2019-19241": { + "cmt_msg": "io_uring: async workers should inherit the user creds" }, - "CVE-2019-14821": { - "cmt_msg": "KVM: coalesced_mmio: add bounds checking" + "CVE-2022-21123": { + "cmt_msg": "x86/speculation/mmio: Add mitigation for Processor MMIO Stale Data" }, - "CVE-2020-12826": { - "cmt_msg": "signal: Extend exec_id to 64bits" + "CVE-2020-26559": { + "cmt_msg": "" }, - "CVE-2019-3701": { - "cmt_msg": "can: gw: ensure DLC boundaries after CAN frame modification" + "CVE-2021-43975": { + "cmt_msg": "atlantic: Fix OOB read and write in hw_atl_utils_fw_rpc_wait" }, - "CVE-2021-42008": { - "cmt_msg": "net: 6pack: fix slab-out-of-bounds in decode_data" + "CVE-2018-6927": { + "cmt_msg": "futex: Prevent overflow by strengthen input validation" }, - "CVE-2022-39188": { - "cmt_msg": "mmu_gather: Force tlb-flush VM_PFNMAP vmas" + "CVE-2018-3639": { + "cmt_msg": "x86/nospec: Simplify alternative_msr_write()" }, - "CVE-2018-20511": { - "cmt_msg": "net/appletalk: fix minor pointer leak to userspace in SIOCFINDIPDDPRT" + "CVE-2023-0590": { + "cmt_msg": "net: sched: fix race condition in qdisc_graft()" }, - "CVE-2019-1125": { - "cmt_msg": "x86/speculation: Prepare entry code for Spectre v1 swapgs mitigations" + "CVE-2023-0597": { + "cmt_msg": "x86/mm: Randomize per-cpu entry area" }, - "CVE-2019-15218": { - "cmt_msg": "media: usb: siano: Fix general protection fault in smsusb" + "CVE-2022-28390": { + "cmt_msg": "can: ems_usb: ems_usb_start_xmit(): fix double dev_kfree_skb() in error path" }, - "CVE-2019-15666": { - "cmt_msg": "xfrm: policy: Fix out-of-bound array accesses in __xfrm_policy_unlink" + "CVE-2019-3460": { + "cmt_msg": "Bluetooth: Check L2CAP option sizes returned from l2cap_get_conf_opt" }, - "CVE-2020-25641": { - "cmt_msg": "block: allow for_each_bvec to support zero len bvec" + "CVE-2022-3202": { + "cmt_msg": "jfs: prevent NULL deref in diFree" }, - "CVE-2005-3660": { - "cmt_msg": "" + "CVE-2019-11477": { + "cmt_msg": "tcp: limit payload size of sacked skbs" }, - "CVE-2019-15212": { - "cmt_msg": "USB: rio500: refuse more than one device at a time" + "CVE-2021-46908": { + "cmt_msg": "bpf: Use correct permission flag for mixed signed bounds arithmetic" }, - "CVE-2019-15211": { - "cmt_msg": "media: radio-raremono: change devm_k*alloc to k*alloc" + "CVE-2021-46909": { + "cmt_msg": "ARM: footbridge: fix PCI interrupt mapping" }, - "CVE-2023-31084": { - "cmt_msg": "media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*()" + "CVE-2021-46906": { + "cmt_msg": "HID: usbhid: fix info leak in hid_submit_ctrl" }, - "CVE-2019-15217": { - "cmt_msg": "media: usb:zr364xx:Fix KASAN:null-ptr-deref Read in zr364xx_vidioc_querycap" + "CVE-2018-14614": { + "cmt_msg": "f2fs: fix to do sanity check with cp_pack_start_sum" }, - "CVE-2019-15216": { - "cmt_msg": "USB: yurex: Fix protection fault after device removal" + "CVE-2019-11479": { + "cmt_msg": "tcp: add tcp_min_snd_mss sysctl" }, - "CVE-2019-15215": { - "cmt_msg": "media: cpia2_usb: first wake up, then free in disconnect" + "CVE-2019-11478": { + "cmt_msg": "tcp: tcp_fragment() should apply sane memory limits" }, - "CVE-2019-15214": { - "cmt_msg": "ALSA: core: Fix card races between register and disconnect" + "CVE-2018-14611": { + "cmt_msg": "btrfs: validate type when reading a chunk" }, - "CVE-2020-24588": { - "cmt_msg": "cfg80211: mitigate A-MSDU aggregation attacks" + "CVE-2018-14610": { + "cmt_msg": "btrfs: Check that each block group has corresponding chunk at mount time" }, - "CVE-2021-33034": { - "cmt_msg": "Bluetooth: verify AMP hci_chan before amp_destroy" + "CVE-2018-14613": { + "cmt_msg": "btrfs: tree-checker: Verify block_group_item" }, - "CVE-2019-19922": { - "cmt_msg": "sched/fair: Fix low cpu usage with high throttling by removing expiration of cpu-local slices" + "CVE-2018-14612": { + "cmt_msg": "btrfs: tree-checker: Detect invalid and empty essential trees" }, - "CVE-2021-33033": { - "cmt_msg": "cipso,calipso: resolve a number of problems with the DOI refcounts" + "CVE-2024-23849": { + "cmt_msg": "net/rds: Fix UBSAN: array-index-out-of-bounds in rds_cmsg_recv" }, - "CVE-2019-19927": { - "cmt_msg": "drm/ttm: fix incrementing the page pointer for huge pages" + "CVE-2024-23848": { + "cmt_msg": "" }, - "CVE-2020-27066": { - "cmt_msg": "xfrm: policy: Fix doulbe free in xfrm_policy_timer" + "CVE-2020-27418": { + "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region" }, - "CVE-2020-27068": { - "cmt_msg": "cfg80211: add missing policy for NL80211_ATTR_STATUS_CODE" + "CVE-2019-2025": { + "cmt_msg": "binder: fix race that allows malicious free of live buffer" }, - "CVE-2022-3521": { - "cmt_msg": "kcm: avoid potential race in kcm_tx_work" + "CVE-2019-2024": { + "cmt_msg": "media: em28xx: Fix use-after-free when disconnecting" }, - "CVE-2020-8648": { - "cmt_msg": "vt: selection, close sel_buffer race" + "CVE-2019-19075": { + "cmt_msg": "ieee802154: ca8210: prevent memory leak" + }, + "CVE-2019-19074": { + "cmt_msg": "ath9k: release allocated buffer if timed out" + }, + "CVE-2019-19073": { + "cmt_msg": "ath9k_htc: release allocated buffer if timed out" + }, + "CVE-2019-1125": { + "cmt_msg": "x86/speculation: Prepare entry code for Spectre v1 swapgs mitigations" + }, + "CVE-2023-31085": { + "cmt_msg": "ubi: Refuse attaching if mtd's erasesize is 0" + }, + "CVE-2023-31084": { + "cmt_msg": "media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*()" + }, + "CVE-2023-31083": { + "cmt_msg": "Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO" + }, + "CVE-2023-31082": { + "cmt_msg": "" + }, + "CVE-2023-31081": { + "cmt_msg": "" }, "CVE-2022-32296": { "cmt_msg": "tcp: increase source port perturb table to 2^16" }, - "CVE-2017-0861": { - "cmt_msg": "ALSA: pcm: prevent UAF in snd_pcm_info" - }, - "CVE-2023-3567": { - "cmt_msg": "vc_screen: move load of struct vc_data pointer in vcs_read() to avoid UAF" + "CVE-2020-28974": { + "cmt_msg": "vt: Disable KD_FONT_OP_COPY" }, "CVE-2019-20806": { "cmt_msg": "media: tw5864: Fix possible NULL pointer dereference in tw5864_handle_frame" @@ -12767,1497 +12650,1347 @@ "CVE-2022-3028": { "cmt_msg": "af_key: Do not call xfrm_probe_algs in parallel" }, - "CVE-2017-16648": { - "cmt_msg": "dvb_frontend: don't use-after-free the frontend struct" - }, "CVE-2020-14304": { "cmt_msg": "" }, - "CVE-2010-5321": { - "cmt_msg": "" - }, - "CVE-2020-15393": { - "cmt_msg": "usb: usbtest: fix missing kfree(dev->buf) in usbtest_disconnect" + "CVE-2018-17972": { + "cmt_msg": "proc: restrict kernel stack dumps to root" }, "CVE-2022-33981": { "cmt_msg": "floppy: disable FDRAWCMD by default" }, - "CVE-2021-3564": { - "cmt_msg": "Bluetooth: fix the erroneous flush_work() order" - }, - "CVE-2019-9506": { - "cmt_msg": "Bluetooth: Fix faulty expression for minimum encryption key size check" - }, - "CVE-2023-1476": { - "cmt_msg": "" - }, "CVE-2017-16995": { "cmt_msg": "bpf: fix incorrect sign extension in check_alu_op()" }, - "CVE-2017-16994": { - "cmt_msg": "mm/pagewalk.c: report holes in hugetlb ranges" - }, - "CVE-2019-2025": { - "cmt_msg": "binder: fix race that allows malicious free of live buffer" - }, - "CVE-2020-26560": { - "cmt_msg": "" - }, - "CVE-2022-38096": { - "cmt_msg": "" + "CVE-2019-18675": { + "cmt_msg": "mmap: introduce sane default mmap limits" }, "CVE-2018-18397": { "cmt_msg": "userfaultfd: use ENOENT instead of EFAULT if the atomic copy user fails" }, - "CVE-2017-13080": { - "cmt_msg": "mac80211: accept key reinstall without changing anything" + "CVE-2017-17558": { + "cmt_msg": "USB: core: prevent malicious bNumInterfaces overflow" }, - "CVE-2018-12127": { - "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" + "CVE-2023-1390": { + "cmt_msg": "tipc: fix NULL deref in tipc_link_xmit()" }, - "CVE-2018-12126": { - "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" + "CVE-2020-10751": { + "cmt_msg": "selinux: properly handle multiple messages in selinux_netlink_send()" }, - "CVE-2022-23816": { - "cmt_msg": "x86/kvm/vmx: Make noinstr clean" + "CVE-2020-10757": { + "cmt_msg": "mm: Fix mremap not considering huge pmd devmap" }, - "CVE-2023-37454": { - "cmt_msg": "" + "CVE-2019-14763": { + "cmt_msg": "usb: dwc3: gadget: never call ->complete() from ->ep_queue()" }, - "CVE-2021-3892": { + "CVE-2022-1116": { "cmt_msg": "" }, - "CVE-2022-20572": { - "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag" - }, - "CVE-2018-10021": { - "cmt_msg": "scsi: libsas: defer ata device eh commands to libata" + "CVE-2021-28660": { + "cmt_msg": "staging: rtl8188eu: prevent ->ssid overflow in rtw_wx_set_scan()" }, - "CVE-2022-20132": { - "cmt_msg": "HID: add hid_is_usb() function to make it simpler for USB detection" + "CVE-2020-36386": { + "cmt_msg": "Bluetooth: Fix slab-out-of-bounds read in hci_extended_inquiry_result_evt()" }, - "CVE-2019-2024": { - "cmt_msg": "media: em28xx: Fix use-after-free when disconnecting" + "CVE-2020-36385": { + "cmt_msg": "RDMA/ucma: Rework ucma_migrate_id() to avoid races with destroy" }, - "CVE-2023-39194": { - "cmt_msg": "net: xfrm: Fix xfrm_address_filter OOB read" + "CVE-2018-9385": { + "cmt_msg": "ARM: amba: Don't read past the end of sysfs \"driver_override\" buffer" }, - "CVE-2023-2002": { - "cmt_msg": "bluetooth: Perform careful capability checks in hci_sock_ioctl()" + "CVE-2020-0009": { + "cmt_msg": "staging: android: ashmem: Disallow ashmem memory from being remapped" }, - "CVE-2023-39197": { - "cmt_msg": "netfilter: conntrack: dccp: copy entire header to stack buffer, not just basic one" + "CVE-2019-14615": { + "cmt_msg": "drm/i915/gen9: Clear residual context state on context switch" }, - "CVE-2019-10126": { - "cmt_msg": "mwifiex: Fix heap overflow in mwifiex_uap_parse_tail_ies()" + "CVE-2018-9415": { + "cmt_msg": "ARM: amba: Fix race condition with driver_override" }, - "CVE-2023-52443": { - "cmt_msg": "apparmor: avoid crash when parsed profile name is empty" + "CVE-2019-13648": { + "cmt_msg": "powerpc/tm: Fix oops on sigreturn on systems without TM" }, - "CVE-2019-13631": { - "cmt_msg": "Input: gtco - bounds check collection indent level" + "CVE-2018-15572": { + "cmt_msg": "x86/speculation: Protect against userspace-userspace spectreRSB" }, - "CVE-2020-14353": { - "cmt_msg": "KEYS: prevent creating a different user's keyrings" + "CVE-2022-1204": { + "cmt_msg": "ax25: Fix refcount leaks caused by ax25_cb_del()" }, - "CVE-2020-13974": { - "cmt_msg": "vt: keyboard: avoid signed integer overflow in k_ascii" + "CVE-2018-9363": { + "cmt_msg": "Bluetooth: hidp: buffer overflow in hidp_process_report" }, - "CVE-2021-4083": { - "cmt_msg": "fget: check that the fd still exists after getting a ref to it" + "CVE-2016-10723": { + "cmt_msg": "mm, oom: remove sleep from under oom_lock" }, - "CVE-2023-33288": { - "cmt_msg": "power: supply: bq24190: Fix use after free bug in bq24190_remove due to race condition" + "CVE-2022-26490": { + "cmt_msg": "nfc: st21nfca: Fix potential buffer overflows in EVT_TRANSACTION" }, - "CVE-2018-10938": { - "cmt_msg": "Cipso: cipso_v4_optptr enter infinite loop" + "CVE-2020-8832": { + "cmt_msg": "drm/i915: Record the default hw state after reset upon load" }, - "CVE-2023-42755": { - "cmt_msg": "net/sched: Retire rsvp classifier" + "CVE-2020-8834": { + "cmt_msg": "KVM: PPC: Book3S HV: Factor fake-suspend handling out of kvmppc_save/restore_tm" }, - "CVE-2017-1000252": { - "cmt_msg": "KVM: VMX: Do not BUG() on out-of-bounds guest IRQ" + "CVE-2023-52531": { + "cmt_msg": "wifi: iwlwifi: mvm: Fix a memory corruption issue" }, - "CVE-2022-29901": { - "cmt_msg": "x86/kvm/vmx: Make noinstr clean" + "CVE-2023-52532": { + "cmt_msg": "net: mana: Fix TX CQE error handling" }, - "CVE-2017-1000255": { - "cmt_msg": "powerpc/64s: Use emergency stack for kernel TM Bad Thing program checks" + "CVE-2023-39189": { + "cmt_msg": "netfilter: nfnetlink_osf: avoid OOB read" }, - "CVE-2018-12233": { - "cmt_msg": "jfs: Fix inconsistency between memory allocation and ea_buf->max_size" + "CVE-2024-26677": { + "cmt_msg": "rxrpc: Fix delayed ACKs to not set the reference serial number" }, - "CVE-2018-12232": { - "cmt_msg": "socket: close race condition between sock_close() and sockfs_setattr()" + "CVE-2020-25211": { + "cmt_msg": "netfilter: ctnetlink: add a range check for l3/l4 protonum" }, - "CVE-2020-10751": { - "cmt_msg": "selinux: properly handle multiple messages in selinux_netlink_send()" + "CVE-2020-25212": { + "cmt_msg": "nfs: Fix getxattr kernel panic and memory overflow" }, - "CVE-2023-39192": { - "cmt_msg": "netfilter: xt_u32: validate user space input" + "CVE-2020-28374": { + "cmt_msg": "scsi: target: Fix XCOPY NAA identifier lookup" }, - "CVE-2022-23042": { - "cmt_msg": "xen/netfront: react properly to failing gnttab_end_foreign_access_ref()" + "CVE-2024-26672": { + "cmt_msg": "drm/amdgpu: Fix variable 'mca_funcs' dereferenced before NULL check in 'amdgpu_mca_smu_get_mca_entry()'" }, - "CVE-2020-10757": { - "cmt_msg": "mm: Fix mremap not considering huge pmd devmap" + "CVE-2024-26671": { + "cmt_msg": "blk-mq: fix IO hang from sbitmap wakeup race" }, - "CVE-2018-9465": { - "cmt_msg": "binder: fix proc->files use-after-free" + "CVE-2024-26679": { + "cmt_msg": "inet: read sk->sk_family once in inet_recv_error()" }, - "CVE-2018-20510": { - "cmt_msg": "binder: replace \"%p\" with \"%pK\"" + "CVE-2023-52458": { + "cmt_msg": "block: add check that partition length needs to be aligned with block size" }, - "CVE-2022-20166": { - "cmt_msg": "drivers core: Use sysfs_emit and sysfs_emit_at for show(device *...) functions" + "CVE-2023-52451": { + "cmt_msg": "powerpc/pseries/memhp: Fix access beyond end of drmem array" }, - "CVE-2019-14763": { - "cmt_msg": "usb: dwc3: gadget: never call ->complete() from ->ep_queue()" + "CVE-2022-0644": { + "cmt_msg": "vfs: check fd has read access in kernel_read_file_from_fd()" }, - "CVE-2020-15437": { - "cmt_msg": "serial: 8250: fix null-ptr-deref in serial8250_start_tx()" - }, - "CVE-2020-15436": { - "cmt_msg": "block: Fix use-after-free in blkdev_get()" - }, - "CVE-2022-1116": { - "cmt_msg": "" - }, - "CVE-2021-28660": { - "cmt_msg": "staging: rtl8188eu: prevent ->ssid overflow in rtw_wx_set_scan()" - }, - "CVE-2024-0775": { - "cmt_msg": "ext4: improve error recovery code paths in __ext4_remount()" - }, - "CVE-2020-8647": { - "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region" + "CVE-2019-14816": { + "cmt_msg": "mwifiex: Fix three heap overflow at parsing element in cfg80211_ap_settings" }, - "CVE-2022-3564": { - "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free caused by l2cap_reassemble_sdu" + "CVE-2019-14814": { + "cmt_msg": "mwifiex: Fix three heap overflow at parsing element in cfg80211_ap_settings" }, - "CVE-2019-0155": { - "cmt_msg": "drm/i915: Rename gen7 cmdparser tables" + "CVE-2019-14815": { + "cmt_msg": "mwifiex: Fix three heap overflow at parsing element in cfg80211_ap_settings" }, - "CVE-2019-0154": { - "cmt_msg": "drm/i915: Lower RM timeout to avoid DSI hard hangs" + "CVE-2024-26706": { + "cmt_msg": "parisc: Fix random data corruption from exception handler" }, - "CVE-2023-35827": { - "cmt_msg": "ravb: Fix use-after-free issue in ravb_tx_timeout_work()" + "CVE-2024-26704": { + "cmt_msg": "ext4: fix double-free of blocks due to wrong extents moved_len" }, - "CVE-2020-36386": { - "cmt_msg": "Bluetooth: Fix slab-out-of-bounds read in hci_extended_inquiry_result_evt()" + "CVE-2020-25672": { + "cmt_msg": "nfc: fix memory leak in llcp_sock_connect()" }, - "CVE-2022-3567": { - "cmt_msg": "ipv6: Fix data races around sk->sk_prot." + "CVE-2020-25673": { + "cmt_msg": "nfc: Avoid endless loops caused by repeated llcp_sock_connect()" }, - "CVE-2022-3566": { - "cmt_msg": "tcp: Fix data races around icsk->icsk_af_ops." + "CVE-2020-25670": { + "cmt_msg": "nfc: fix refcount leak in llcp_sock_bind()" }, - "CVE-2022-3565": { - "cmt_msg": "mISDN: fix use-after-free bugs in l1oip timer handlers" + "CVE-2020-25671": { + "cmt_msg": "nfc: fix refcount leak in llcp_sock_connect()" }, - "CVE-2022-33740": { - "cmt_msg": "xen/netfront: fix leaking data in shared pages" + "CVE-2019-19813": { + "cmt_msg": "btrfs: inode: Verify inode mode to avoid NULL pointer dereference" }, - "CVE-2018-19407": { - "cmt_msg": "KVM: X86: Fix scan ioapic use-before-initialization" + "CVE-2020-29374": { + "cmt_msg": "gup: document and work around \"COW can break either way\" issue" }, - "CVE-2021-20317": { - "cmt_msg": "lib/timerqueue: Rely on rbtree semantics for next timer" + "CVE-2019-19815": { + "cmt_msg": "f2fs: support swap file w/ DIO" }, - "CVE-2020-36385": { - "cmt_msg": "RDMA/ucma: Rework ucma_migrate_id() to avoid races with destroy" + "CVE-2019-19814": { + "cmt_msg": "" }, - "CVE-2022-3628": { - "cmt_msg": "wifi: brcmfmac: Fix potential buffer overflow in brcmf_fweh_event_worker()" + "CVE-2020-29371": { + "cmt_msg": "romfs: fix uninitialized memory leak in romfs_dev_read()" }, - "CVE-2018-9385": { - "cmt_msg": "ARM: amba: Don't read past the end of sysfs \"driver_override\" buffer" + "CVE-2019-19816": { + "cmt_msg": "btrfs: inode: Verify inode mode to avoid NULL pointer dereference" }, - "CVE-2020-0009": { - "cmt_msg": "staging: android: ashmem: Disallow ashmem memory from being remapped" + "CVE-2018-11412": { + "cmt_msg": "ext4: do not allow external inodes for inline data" }, - "CVE-2023-52340": { - "cmt_msg": "ipv6: remove max_size check inline with ipv4" + "CVE-2018-18710": { + "cmt_msg": "cdrom: fix improper type cast, which can leat to information leak." }, - "CVE-2020-24394": { - "cmt_msg": "nfsd: apply umask on fs without ACL support" + "CVE-2023-34255": { + "cmt_msg": "xfs: verify buffer contents when we skip log replay" }, - "CVE-2019-14615": { - "cmt_msg": "drm/i915/gen9: Clear residual context state on context switch" + "CVE-2022-23040": { + "cmt_msg": "xen/xenbus: don't let xenbus_grant_ring() remove grants in error case" }, - "CVE-2018-16871": { - "cmt_msg": "nfsd: COPY and CLONE operations require the saved filehandle to be set" + "CVE-2023-3141": { + "cmt_msg": "memstick: r592: Fix UAF bug in r592_remove due to race condition" }, - "CVE-2018-9415": { - "cmt_msg": "ARM: amba: Fix race condition with driver_override" + "CVE-2020-12655": { + "cmt_msg": "xfs: add agf freeblocks verify in xfs_agf_verify" }, - "CVE-2019-13648": { - "cmt_msg": "powerpc/tm: Fix oops on sigreturn on systems without TM" + "CVE-2022-3524": { + "cmt_msg": "tcp/udp: Fix memory leak in ipv6_renew_options()." }, - "CVE-2023-0030": { - "cmt_msg": "drm/nouveau/mmu: add more general vmm free/node handling functions" + "CVE-2022-3523": { + "cmt_msg": "mm/memory.c: fix race when faulting a device private page" }, - "CVE-2020-16120": { - "cmt_msg": "ovl: switch to mounter creds in readdir" + "CVE-2022-3522": { + "cmt_msg": "mm/hugetlb: use hugetlb_pte_stable in migration race check" }, - "CVE-2019-11599": { - "cmt_msg": "coredump: fix race condition between mmget_not_zero()/get_task_mm() and core dumping" + "CVE-2022-3521": { + "cmt_msg": "kcm: avoid potential race in kcm_tx_work" }, - "CVE-2018-16658": { - "cmt_msg": "cdrom: Fix info leak/OOB read in cdrom_ioctl_drive_status" + "CVE-2018-7755": { + "cmt_msg": "floppy: Do not copy a kernel pointer to user memory in FDGETPRM ioctl" }, - "CVE-2018-15572": { - "cmt_msg": "x86/speculation: Protect against userspace-userspace spectreRSB" + "CVE-2018-7754": { + "cmt_msg": "printk: hash addresses printed with %p" }, - "CVE-2022-1204": { - "cmt_msg": "ax25: Fix refcount leaks caused by ax25_cb_del()" + "CVE-2018-7757": { + "cmt_msg": "scsi: libsas: fix memory leak in sas_smp_get_phy_events()" }, - "CVE-2019-2101": { - "cmt_msg": "media: uvcvideo: Fix 'type' check leading to overflow" + "CVE-2019-15030": { + "cmt_msg": "powerpc/tm: Fix FP/VMX unavailable exceptions inside a transaction" }, - "CVE-2019-17666": { - "cmt_msg": "rtlwifi: Fix potential overflow on P2P code" + "CVE-2022-0330": { + "cmt_msg": "drm/i915: Flush TLBs before releasing backing store" }, - "CVE-2021-23133": { - "cmt_msg": "net/sctp: fix race condition in sctp_destroy_sock" + "CVE-2022-4095": { + "cmt_msg": "staging: rtl8712: fix use after free bugs" }, - "CVE-2018-9363": { - "cmt_msg": "Bluetooth: hidp: buffer overflow in hidp_process_report" + "CVE-2022-45919": { + "cmt_msg": "media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221" }, - "CVE-2018-15471": { - "cmt_msg": "xen-netback: fix input validation in xenvif_set_hash_mapping()" + "CVE-2018-5703": { + "cmt_msg": "tls: Use correct sk->sk_prot for IPV6" }, - "CVE-2016-10723": { - "cmt_msg": "mm, oom: remove sleep from under oom_lock" + "CVE-2021-3669": { + "cmt_msg": "ipc: replace costly bailout check in sysvipc_find_ipc()" }, - "CVE-2021-3573": { - "cmt_msg": "Bluetooth: use correct lock to prevent UAF of hdev object" + "CVE-2019-3701": { + "cmt_msg": "can: gw: ensure DLC boundaries after CAN frame modification" }, - "CVE-2019-19036": { - "cmt_msg": "btrfs: Detect unbalanced tree with empty leaf before crashing btree operations" + "CVE-2023-1095": { + "cmt_msg": "netfilter: nf_tables: fix null deref due to zeroed list head" }, - "CVE-2019-3459": { - "cmt_msg": "Bluetooth: Verify that l2cap_get_conf_opt provides large enough buffer" + "CVE-2022-3239": { + "cmt_msg": "media: em28xx: initialize refcount before kref_get" }, - "CVE-2020-11494": { - "cmt_msg": "slcan: Don't transmit uninitialized stack data in padding" + "CVE-2022-4543": { + "cmt_msg": "" }, - "CVE-2019-19039": { - "cmt_msg": "btrfs: Don't submit any btree write bio if the fs has errors" + "CVE-2021-46915": { + "cmt_msg": "netfilter: nft_limit: avoid possible divide error in nft_limit_init" }, - "CVE-2020-0444": { - "cmt_msg": "audit: fix error handling in audit_data_to_entry()" + "CVE-2019-18282": { + "cmt_msg": "net/flow_dissector: switch to siphash" }, - "CVE-2022-1974": { - "cmt_msg": "nfc: replace improper check device_is_registered() in netlink related functions" + "CVE-2021-34981": { + "cmt_msg": "Bluetooth: cmtp: fix file refcount when cmtp_attach_device fails" }, - "CVE-2017-16526": { - "cmt_msg": "uwb: properly check kthread_run return value" + "CVE-2018-14625": { + "cmt_msg": "vhost/vsock: fix use-after-free in network stack callers" }, - "CVE-2017-16527": { - "cmt_msg": "ALSA: usb-audio: Kill stray URB at exiting" + "CVE-2023-4881": { + "cmt_msg": "netfilter: nftables: exthdr: fix 4-byte stack OOB write" }, - "CVE-2017-16525": { - "cmt_msg": "USB: serial: console: fix use-after-free after failed setup" + "CVE-2013-7445": { + "cmt_msg": "" }, - "CVE-2022-1836": { - "cmt_msg": "floppy: disable FDRAWCMD by default" + "CVE-2024-26804": { + "cmt_msg": "net: ip_tunnel: prevent perpetual headroom growth" }, - "CVE-2020-8834": { - "cmt_msg": "KVM: PPC: Book3S HV: Factor fake-suspend handling out of kvmppc_save/restore_tm" + "CVE-2024-26805": { + "cmt_msg": "netlink: Fix kernel-infoleak-after-free in __skb_datagram_iter" }, - "CVE-2021-32078": { - "cmt_msg": "ARM: footbridge: remove personal server platform" + "CVE-2022-3303": { + "cmt_msg": "ALSA: pcm: oss: Fix race at SNDCTL_DSP_SYNC" }, - "CVE-2022-30594": { - "cmt_msg": "ptrace: Check PTRACE_O_SUSPEND_SECCOMP permission on PTRACE_SEIZE" + "CVE-2020-12771": { + "cmt_msg": "bcache: fix potential deadlock problem in btree_gc_coalesce" }, - "CVE-2017-16528": { - "cmt_msg": "ALSA: seq: Cancel pending autoload work at unbinding device" + "CVE-2023-2483": { + "cmt_msg": "net: qcom/emac: Fix use after free bug in emac_remove due to race condition" }, - "CVE-2017-16529": { - "cmt_msg": "ALSA: usb-audio: Check out-of-bounds access by corrupted buffer descriptor" + "CVE-2024-0607": { + "cmt_msg": "netfilter: nf_tables: fix pointer math issue in nft_byteorder_eval()" }, - "CVE-2019-11833": { - "cmt_msg": "ext4: zero out the unused memory region in the extent tree block" + "CVE-2024-26801": { + "cmt_msg": "Bluetooth: Avoid potential use-after-free in hci_error_reset" }, - "CVE-2021-38205": { - "cmt_msg": "net: xilinx_emaclite: Do not print real IOMEM pointer" + "CVE-2022-28389": { + "cmt_msg": "can: mcba_usb: mcba_usb_start_xmit(): fix double dev_kfree_skb in error path" }, - "CVE-2020-27835": { - "cmt_msg": "IB/hfi1: Ensure correct mm is used at all times" + "CVE-2022-28388": { + "cmt_msg": "can: usb_8dev: usb_8dev_start_xmit(): fix double dev_kfree_skb() in error path" }, - "CVE-2020-0255": { - "cmt_msg": "selinux: properly handle multiple messages in selinux_netlink_send()" + "CVE-2024-26803": { + "cmt_msg": "net: veth: clear GRO when clearing XDP even when down" }, - "CVE-2019-2215": { - "cmt_msg": "ANDROID: binder: remove waitqueue when thread exits." + "CVE-2018-1000004": { + "cmt_msg": "ALSA: seq: Make ioctls race-free" }, - "CVE-2023-35001": { - "cmt_msg": "netfilter: nf_tables: prevent OOB access in nft_byteorder_eval" + "CVE-2019-20811": { + "cmt_msg": "net-sysfs: call dev_hold if kobject_init_and_add success" }, - "CVE-2022-27666": { - "cmt_msg": "esp: Fix possible buffer overflow in ESP transformation" + "CVE-2019-20810": { + "cmt_msg": "media: go7007: fix a miss of snd_card_free" }, - "CVE-2021-38208": { - "cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect" + "CVE-2019-20812": { + "cmt_msg": "af_packet: set defaule value for tmo" }, - "CVE-2018-1108": { - "cmt_msg": "random: fix crng_ready() test" + "CVE-2018-1118": { + "cmt_msg": "vhost: fix info leak due to uninitialized memory" }, - "CVE-2017-18232": { - "cmt_msg": "scsi: libsas: direct call probe and destruct" + "CVE-2019-18660": { + "cmt_msg": "powerpc/book3s64: Fix link stack flush on context switch" }, - "CVE-2019-2213": { - "cmt_msg": "binder: fix possible UAF when freeing buffer" + "CVE-2019-12380": { + "cmt_msg": "efi/x86/Add missing error handling to old_memmap 1:1 mapping code" }, - "CVE-2023-3338": { - "cmt_msg": "Remove DECnet support from kernel" + "CVE-2019-12381": { + "cmt_msg": "ip_sockglue: Fix missing-check bug in ip_ra_control()" }, - "CVE-2020-25211": { - "cmt_msg": "netfilter: ctnetlink: add a range check for l3/l4 protonum" + "CVE-2019-12382": { + "cmt_msg": "drm/edid: Fix a missing-check bug in drm_load_edid_firmware()" }, - "CVE-2018-5953": { - "cmt_msg": "printk: hash addresses printed with %p" + "CVE-2020-10766": { + "cmt_msg": "x86/speculation: Prevent rogue cross-process SSBD shutdown" }, - "CVE-2020-26556": { - "cmt_msg": "" + "CVE-2020-10767": { + "cmt_msg": "x86/speculation: Avoid force-disabling IBPB based on STIBP and enhanced IBRS." }, - "CVE-2018-9518": { - "cmt_msg": "NFC: llcp: Limit size of SDP URI" + "CVE-2019-25162": { + "cmt_msg": "i2c: Fix a potential use after free" }, - "CVE-2020-26555": { - "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical" + "CVE-2019-25160": { + "cmt_msg": "netlabel: fix out-of-bounds memory accesses" }, - "CVE-2018-9517": { - "cmt_msg": "l2tp: pass tunnel pointer to ->session_create()" + "CVE-2020-10768": { + "cmt_msg": "x86/speculation: PR_SPEC_FORCE_DISABLE enforcement for indirect branches." }, - "CVE-2018-9516": { - "cmt_msg": "HID: debug: check length before copy_to_user()" + "CVE-2020-10769": { + "cmt_msg": "crypto: authenc - fix parsing key with misaligned rta_len" }, - "CVE-2023-3397": { - "cmt_msg": "" + "CVE-2020-10942": { + "cmt_msg": "vhost: Check docket sk_family instead of call getname" }, - "CVE-2018-1128": { - "cmt_msg": "libceph: add authorizer challenge" + "CVE-2020-10781": { + "cmt_msg": "Revert \"zram: convert remaining CLASS_ATTR() to CLASS_ATTR_RO()\"" }, - "CVE-2018-1129": { - "cmt_msg": "libceph: implement CEPHX_V2 calculation mode" + "CVE-2020-26139": { + "cmt_msg": "mac80211: do not accept/forward invalid EAPOL frames" }, - "CVE-2018-1087": { - "cmt_msg": "kvm/x86: fix icebp instruction handling" + "CVE-2019-19536": { + "cmt_msg": "can: peak_usb: pcan_usb_pro: Fix info-leaks to USB devices" }, - "CVE-2022-26365": { - "cmt_msg": "xen/blkfront: fix leaking data in shared pages" + "CVE-2019-19537": { + "cmt_msg": "USB: core: Fix races in character device registration and deregistraion" }, - "CVE-2022-1652": { - "cmt_msg": "floppy: use a statically allocated error counter" + "CVE-2019-19534": { + "cmt_msg": "can: peak_usb: fix slab info leak" }, - "CVE-2018-1120": { - "cmt_msg": "proc: do not access cmdline nor environ from file-backed areas" + "CVE-2019-19535": { + "cmt_msg": "can: peak_usb: pcan_usb_fd: Fix info-leaks to USB devices" }, - "CVE-2018-1121": { - "cmt_msg": "" + "CVE-2020-11565": { + "cmt_msg": "mm: mempolicy: require at least one nodeid for MPOL_PREFERRED" }, - "CVE-2018-20856": { - "cmt_msg": "block: blk_init_allocated_queue() set q->fq as NULL in the fail case" + "CVE-2019-19533": { + "cmt_msg": "media: ttusb-dec: Fix info-leak in ttusb_dec_send_command()" }, - "CVE-2017-18549": { - "cmt_msg": "scsi: aacraid: Don't copy uninitialized stack memory to userspace" + "CVE-2019-19530": { + "cmt_msg": "usb: cdc-acm: make sure a refcount is taken early enough" }, - "CVE-2023-52451": { - "cmt_msg": "powerpc/pseries/memhp: Fix access beyond end of drmem array" + "CVE-2019-19531": { + "cmt_msg": "usb: yurex: Fix use-after-free in yurex_delete" }, - "CVE-2017-5754": { - "cmt_msg": "x86/cpufeatures: Add Intel feature bits for Speculation Control" + "CVE-2023-52527": { + "cmt_msg": "ipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data()" }, - "CVE-2022-3061": { - "cmt_msg": "video: fbdev: i740fb: Error out if 'pixclock' equals zero" + "CVE-2023-3006": { + "cmt_msg": "arm64: Add AMPERE1 to the Spectre-BHB affected list" }, - "CVE-2017-5753": { - "cmt_msg": "x86/cpufeatures: Add X86_BUG_SPECTRE_V[12]" + "CVE-2023-52522": { + "cmt_msg": "net: fix possible store tearing in neigh_periodic_work()" }, - "CVE-2022-2961": { - "cmt_msg": "" + "CVE-2019-8912": { + "cmt_msg": "net: crypto set sk to NULL when af_alg_release." }, - "CVE-2023-2176": { - "cmt_msg": "RDMA/core: Refactor rdma_bind_addr" + "CVE-2023-52528": { + "cmt_msg": "net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg" }, - "CVE-2024-1086": { - "cmt_msg": "netfilter: nf_tables: reject QUEUE/DROP verdict parameters" + "CVE-2020-0305": { + "cmt_msg": "chardev: Avoid potential use-after-free in 'chrdev_open()'" }, "CVE-2024-22386": { "cmt_msg": "" }, - "CVE-2019-9466": { - "cmt_msg": "brcmfmac: add subtype check for event handling in data path" - }, - "CVE-2020-11565": { - "cmt_msg": "mm: mempolicy: require at least one nodeid for MPOL_PREFERRED" - }, - "CVE-2019-19049": { - "cmt_msg": "of: unittest: fix memory leak in unittest_data_add" + "CVE-2023-39194": { + "cmt_msg": "net: xfrm: Fix xfrm_address_filter OOB read" }, - "CVE-2018-9568": { - "cmt_msg": "net: Set sk_prot_creator when cloning sockets to the right proto" + "CVE-2023-39197": { + "cmt_msg": "netfilter: conntrack: dccp: copy entire header to stack buffer, not just basic one" }, - "CVE-2021-3759": { - "cmt_msg": "memcg: enable accounting of ipc resources" + "CVE-2023-39193": { + "cmt_msg": "netfilter: xt_sctp: validate the flag_info count" }, - "CVE-2022-0644": { - "cmt_msg": "vfs: check fd has read access in kernel_read_file_from_fd()" + "CVE-2023-39192": { + "cmt_msg": "netfilter: xt_u32: validate user space input" }, - "CVE-2020-27784": { - "cmt_msg": "usb: gadget: function: printer: fix use-after-free in __lock_acquire" + "CVE-2024-26600": { + "cmt_msg": "phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP" }, - "CVE-2018-13053": { - "cmt_msg": "alarmtimer: Prevent overflow for relative nanosleep" + "CVE-2024-26606": { + "cmt_msg": "binder: signal epoll threads of self-work" }, - "CVE-2020-27786": { - "cmt_msg": "ALSA: rawmidi: Fix racy buffer resize under concurrent accesses" + "CVE-2023-52429": { + "cmt_msg": "dm: limit the number of targets and parameter size area" }, - "CVE-2019-14816": { - "cmt_msg": "mwifiex: Fix three heap overflow at parsing element in cfg80211_ap_settings" + "CVE-2022-1652": { + "cmt_msg": "floppy: use a statically allocated error counter" }, - "CVE-2019-14814": { - "cmt_msg": "mwifiex: Fix three heap overflow at parsing element in cfg80211_ap_settings" + "CVE-2020-29568": { + "cmt_msg": "xen/xenbus: Allow watches discard events before queueing" }, - "CVE-2019-14815": { - "cmt_msg": "mwifiex: Fix three heap overflow at parsing element in cfg80211_ap_settings" + "CVE-2020-29569": { + "cmt_msg": "xen-blkback: set ring->xenblkd to NULL after kthread_stop()" }, - "CVE-2023-6240": { + "CVE-2016-8660": { "cmt_msg": "" }, - "CVE-2023-23559": { - "cmt_msg": "wifi: rndis_wlan: Prevent buffer overflow in rndis_query_oid" + "CVE-2020-14314": { + "cmt_msg": "ext4: fix potential negative array index in do_split()" }, - "CVE-2020-10720": { - "cmt_msg": "net-gro: fix use-after-free read in napi_gro_frags()" + "CVE-2019-13272": { + "cmt_msg": "ptrace: Fix ->ptracer_cred handling for PTRACE_TRACEME" }, - "CVE-2022-0382": { - "cmt_msg": "net ticp:fix a kernel-infoleak in __tipc_sendmsg()" + "CVE-2022-1786": { + "cmt_msg": "io_uring: remove io_identity" }, - "CVE-2018-12904": { - "cmt_msg": "kvm: nVMX: Enforce cpl=0 for VMX instructions" + "CVE-2020-25669": { + "cmt_msg": "Input: sunkbd - avoid use-after-free in teardown paths" }, - "CVE-2023-32233": { - "cmt_msg": "netfilter: nf_tables: deactivate anonymous set from preparation phase" + "CVE-2020-25668": { + "cmt_msg": "tty: make FONTX ioctl use the tty pointer they were actually passed" }, - "CVE-2020-25672": { - "cmt_msg": "nfc: fix memory leak in llcp_sock_connect()" + "CVE-2008-4609": { + "cmt_msg": "" }, - "CVE-2019-9455": { - "cmt_msg": "media: videobuf2-v4l2: drop WARN_ON in vb2_warn_zero_bytesused()" + "CVE-2022-0435": { + "cmt_msg": "tipc: improve size validations for received domain records" }, - "CVE-2020-25670": { - "cmt_msg": "nfc: fix refcount leak in llcp_sock_bind()" + "CVE-2023-26607": { + "cmt_msg": "ntfs: fix out-of-bounds read in ntfs_attr_find()" }, - "CVE-2020-25671": { - "cmt_msg": "nfc: fix refcount leak in llcp_sock_connect()" + "CVE-2021-4037": { + "cmt_msg": "xfs: fix up non-directory creation in SGID directories" }, - "CVE-2018-21008": { - "cmt_msg": "rsi: add fix for crash during assertions" + "CVE-2021-22543": { + "cmt_msg": "KVM: do not allow mapping valid but non-reference-counted pages" }, - "CVE-2019-15223": { - "cmt_msg": "ALSA: line6: Assure canceling delayed work at disconnection" + "CVE-2018-18386": { + "cmt_msg": "n_tty: fix EXTPROC vs ICANON interaction with TIOCINQ (aka FIONREAD)" }, - "CVE-2019-15220": { - "cmt_msg": "p54usb: Fix race between disconnect and firmware loading" + "CVE-2021-47169": { + "cmt_msg": "serial: rp2: use 'request_firmware' instead of 'request_firmware_nowait'" }, - "CVE-2019-15221": { - "cmt_msg": "ALSA: line6: Fix write on zero-sized buffer" + "CVE-2023-3776": { + "cmt_msg": "net/sched: cls_fw: Fix improper refcount update leads to use-after-free" }, - "CVE-2019-19815": { - "cmt_msg": "f2fs: support swap file w/ DIO" + "CVE-2023-3772": { + "cmt_msg": "xfrm: add NULL check in xfrm_update_ae_params" }, - "CVE-2019-19814": { + "CVE-2022-3533": { "cmt_msg": "" }, - "CVE-2020-29371": { - "cmt_msg": "romfs: fix uninitialized memory leak in romfs_dev_read()" - }, - "CVE-2019-19816": { - "cmt_msg": "btrfs: inode: Verify inode mode to avoid NULL pointer dereference" - }, - "CVE-2017-16939": { - "cmt_msg": "ipsec: Fix aborted xfrm policy dump crash" + "CVE-2022-3534": { + "cmt_msg": "libbpf: Fix use-after-free in btf_dump_name_dups" }, - "CVE-2020-0429": { - "cmt_msg": "l2tp: fix race between l2tp_session_delete() and l2tp_tunnel_closeall()" + "CVE-2018-7740": { + "cmt_msg": "hugetlbfs: check for pgoff value overflow" }, - "CVE-2022-1016": { - "cmt_msg": "netfilter: nf_tables: initialize registers in nft_do_chain()" + "CVE-2022-0322": { + "cmt_msg": "sctp: account stream padding length for reconf chunk" }, - "CVE-2018-18710": { - "cmt_msg": "cdrom: fix improper type cast, which can leat to information leak." + "CVE-2021-4149": { + "cmt_msg": "btrfs: unlock newly allocated extent buffer after error" }, - "CVE-2019-5108": { - "cmt_msg": "mac80211: Do not send Layer 2 Update frame before authorization" + "CVE-2022-21385": { + "cmt_msg": "net/rds: fix warn in rds_message_alloc_sgs" }, - "CVE-2022-1012": { - "cmt_msg": "secure_seq: use the 64 bits of the siphash for port offset calculation" + "CVE-2021-47180": { + "cmt_msg": "NFC: nci: fix memory leak in nci_allocate_device" }, - "CVE-2020-12114": { - "cmt_msg": "make struct mountpoint bear the dentry reference to mountpoint, not struct mount" + "CVE-2020-28097": { + "cmt_msg": "vgacon: remove software scrollback support" }, - "CVE-2020-8649": { - "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region" + "CVE-2018-5848": { + "cmt_msg": "wil6210: missing length check in wmi_set_ie" }, - "CVE-2020-12351": { - "cmt_msg": "Bluetooth: L2CAP: Fix calling sk_filter on non-socket based channel" + "CVE-2018-8897": { + "cmt_msg": "x86/entry/64: Don't use IST entry for #BP stack" }, - "CVE-2020-12656": { - "cmt_msg": "sunrpc: check that domain table is empty at module unload." + "CVE-2020-14416": { + "cmt_msg": "can, slip: Protect tty->disc_data in write_wakeup and close with RCU" }, - "CVE-2020-14356": { - "cmt_msg": "cgroup: fix cgroup_sk_alloc() for sk_clone_lock()" + "CVE-2021-46928": { + "cmt_msg": "parisc: Clear stale IIR value on instruction access rights trap" }, - "CVE-2017-1000405": { - "cmt_msg": "mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d()" + "CVE-2018-14633": { + "cmt_msg": "scsi: target: iscsi: Use hex2bin instead of a re-implementation" }, - "CVE-2021-26930": { - "cmt_msg": "xen-blkback: fix error handling in xen_blkbk_map()" + "CVE-2021-46924": { + "cmt_msg": "NFC: st21nfca: Fix memory leak in device probe and remove" }, - "CVE-2017-1000407": { - "cmt_msg": "KVM: VMX: remove I/O port 0x80 bypass on Intel hosts" + "CVE-2021-46925": { + "cmt_msg": "net/smc: fix kernel panic caused by race of smc_sock" }, - "CVE-2020-12657": { - "cmt_msg": "block, bfq: fix use-after-free in bfq_idle_slice_timer_body" + "CVE-2021-46926": { + "cmt_msg": "ALSA: hda: intel-sdw-acpi: harden detection of controller" }, - "CVE-2023-52456": { - "cmt_msg": "serial: imx: fix tx statemachine deadlock" + "CVE-2023-1206": { + "cmt_msg": "tcp: Reduce chance of collisions in inet6_hashfn()." }, - "CVE-2023-3141": { - "cmt_msg": "memstick: r592: Fix UAF bug in r592_remove due to race condition" + "CVE-2022-3649": { + "cmt_msg": "nilfs2: fix use-after-free bug of struct nilfs_root" }, - "CVE-2022-0492": { - "cmt_msg": "cgroup-v1: Require capabilities to set release_agent" + "CVE-2022-3646": { + "cmt_msg": "nilfs2: fix leak of nilfs_root in case of writer thread creation failure" }, - "CVE-2020-12352": { - "cmt_msg": "Bluetooth: A2MP: Fix not initializing all members" + "CVE-2022-3642": { + "cmt_msg": "" }, - "CVE-2019-3460": { - "cmt_msg": "Bluetooth: Check L2CAP option sizes returned from l2cap_get_conf_opt" + "CVE-2022-3643": { + "cmt_msg": "xen/netback: Ensure protocol headers don't fall in the non-linear area" }, - "CVE-2020-12655": { - "cmt_msg": "xfs: add agf freeblocks verify in xfs_agf_verify" + "CVE-2021-1048": { + "cmt_msg": "fix regression in \"epoll: Keep a reference on files added to the check list\"" }, - "CVE-2021-43976": { - "cmt_msg": "mwifiex: Fix skb_over_panic in mwifiex_usb_recv()" + "CVE-2020-0543": { + "cmt_msg": "x86/cpu: Add 'table' argument to cpu_matches()" }, - "CVE-2022-0494": { - "cmt_msg": "block-map: add __GFP_ZERO flag for alloc_page in function bio_copy_kern" + "CVE-2024-25739": { + "cmt_msg": "" }, - "CVE-2023-2269": { - "cmt_msg": "dm ioctl: fix nested locking in table_clear() to remove deadlock concern" + "CVE-2023-6535": { + "cmt_msg": "" }, - "CVE-2020-26088": { - "cmt_msg": "net/nfc/rawsock.c: add CAP_NET_RAW check." + "CVE-2023-6536": { + "cmt_msg": "nvmet-tcp: fix a crash in nvmet_req_complete()" }, - "CVE-2022-3524": { - "cmt_msg": "tcp/udp: Fix memory leak in ipv6_renew_options()." + "CVE-2020-15780": { + "cmt_msg": "ACPI: configfs: Disallow loading ACPI tables when locked down" }, - "CVE-2022-3523": { - "cmt_msg": "mm/memory.c: fix race when faulting a device private page" + "CVE-2019-11815": { + "cmt_msg": "net: rds: force to destroy connection if t_sock is NULL in rds_tcp_kill_sock()." }, - "CVE-2022-3522": { - "cmt_msg": "mm/hugetlb: use hugetlb_pte_stable in migration race check" + "CVE-2022-36280": { + "cmt_msg": "drm/vmwgfx: Validate the box size for the snooped cursor" }, - "CVE-2008-2544": { + "CVE-2024-21803": { "cmt_msg": "" }, - "CVE-2021-3178": { - "cmt_msg": "nfsd4: readdirplus shouldn't return parent of export" - }, - "CVE-2022-2318": { - "cmt_msg": "net: rose: fix UAF bugs caused by timer handler" + "CVE-2018-1108": { + "cmt_msg": "random: fix crng_ready() test" }, - "CVE-2019-9445": { - "cmt_msg": "f2fs: check if file namelen exceeds max value" + "CVE-2018-16276": { + "cmt_msg": "USB: yurex: fix out-of-bounds uaccess in read handler" }, - "CVE-2018-7755": { - "cmt_msg": "floppy: Do not copy a kernel pointer to user memory in FDGETPRM ioctl" + "CVE-2023-2176": { + "cmt_msg": "RDMA/core: Refactor rdma_bind_addr" }, - "CVE-2018-7754": { - "cmt_msg": "printk: hash addresses printed with %p" + "CVE-2019-16413": { + "cmt_msg": "9p: use inode->i_lock to protect i_size_write() under 32-bit" }, - "CVE-2018-7757": { - "cmt_msg": "scsi: libsas: fix memory leak in sas_smp_get_phy_events()" + "CVE-2019-7222": { + "cmt_msg": "KVM: x86: work around leak of uninitialized stack contents (CVE-2019-7222)" }, - "CVE-2019-15030": { - "cmt_msg": "powerpc/tm: Fix FP/VMX unavailable exceptions inside a transaction" + "CVE-2019-7221": { + "cmt_msg": "KVM: nVMX: unconditionally cancel preemption timer in free_nested (CVE-2019-7221)" }, - "CVE-2022-0330": { - "cmt_msg": "drm/i915: Flush TLBs before releasing backing store" + "CVE-2020-10773": { + "cmt_msg": "s390/cmm: fix information leak in cmm_timeout_handler()" }, - "CVE-2007-3719": { - "cmt_msg": "" + "CVE-2018-18281": { + "cmt_msg": "mremap: properly flush TLB before releasing the page" }, - "CVE-2023-3863": { - "cmt_msg": "net: nfc: Fix use-after-free caused by nfc_llcp_find_local" + "CVE-2022-2663": { + "cmt_msg": "netfilter: nf_conntrack_irc: Fix forged IP logic" }, - "CVE-2023-0459": { - "cmt_msg": "uaccess: Add speculation barrier to copy_from_user()" + "CVE-2020-25643": { + "cmt_msg": "hdlc_ppp: add range checks in ppp_cp_parse_cr()" }, - "CVE-2022-29900": { - "cmt_msg": "x86/kvm/vmx: Make noinstr clean" + "CVE-2020-4788": { + "cmt_msg": "powerpc/64s: flush L1D on kernel entry" }, - "CVE-2022-4095": { - "cmt_msg": "staging: rtl8712: fix use after free bugs" + "CVE-2021-39698": { + "cmt_msg": "wait: add wake_up_pollfree()" }, - "CVE-2022-45919": { - "cmt_msg": "media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221" + "CVE-2018-5333": { + "cmt_msg": "RDS: null pointer dereference in rds_atomic_free_op" }, - "CVE-2019-19319": { - "cmt_msg": "ext4: protect journal inode's blocks using block_validity" + "CVE-2018-5332": { + "cmt_msg": "RDS: Heap OOB write in rds_message_alloc_sgs()" }, - "CVE-2019-19462": { - "cmt_msg": "kernel/relay.c: handle alloc_percpu returning NULL in relay_open" + "CVE-2021-3759": { + "cmt_msg": "memcg: enable accounting of ipc resources" }, - "CVE-2023-30772": { - "cmt_msg": "power: supply: da9150: Fix use after free bug in da9150_charger_remove due to race condition" + "CVE-2019-19528": { + "cmt_msg": "USB: iowarrior: fix use-after-free on disconnect" }, - "CVE-2019-19530": { - "cmt_msg": "usb: cdc-acm: make sure a refcount is taken early enough" + "CVE-2017-17448": { + "cmt_msg": "netfilter: nfnetlink_cthelper: Add missing permission checks" }, - "CVE-2022-24958": { - "cmt_msg": "usb: gadget: don't release an existing dev->buf" + "CVE-2017-17449": { + "cmt_msg": "netlink: Add netns check on taps" }, - "CVE-2023-1611": { - "cmt_msg": "btrfs: fix race between quota disable and quota assign ioctls" + "CVE-2019-19525": { + "cmt_msg": "ieee802154: atusb: fix use-after-free at disconnect" }, - "CVE-2021-3772": { - "cmt_msg": "sctp: use init_tag from inithdr for ABORT chunk" + "CVE-2019-19524": { + "cmt_msg": "Input: ff-memless - kill timer in destroy()" }, - "CVE-2023-3268": { - "cmt_msg": "relayfs: fix out-of-bounds access in relay_file_read" + "CVE-2019-19527": { + "cmt_msg": "HID: hiddev: do cleanup in failure of opening a device" }, - "CVE-2021-3679": { - "cmt_msg": "tracing: Fix bug in rb_per_cpu_empty() that might cause deadloop." + "CVE-2019-19526": { + "cmt_msg": "NFC: pn533: fix use-after-free and memleaks" }, - "CVE-2021-37159": { - "cmt_msg": "usb: hso: fix error handling code of hso_create_net_device" + "CVE-2021-3753": { + "cmt_msg": "vt_kdsetmode: extend console locking" }, - "CVE-2021-39711": { - "cmt_msg": "bpf: fix panic due to oob in bpf_prog_test_run_skb" + "CVE-2021-3752": { + "cmt_msg": "Bluetooth: fix use-after-free error in lock_sock_nested()" }, - "CVE-2022-3629": { - "cmt_msg": "vsock: Fix memory leak in vsock_connect()" + "CVE-2023-7192": { + "cmt_msg": "netfilter: ctnetlink: fix possible refcount leak in ctnetlink_create_conntrack()" }, - "CVE-2021-28715": { - "cmt_msg": "xen/netback: don't queue unlimited number of packages" + "CVE-2022-1263": { + "cmt_msg": "KVM: avoid NULL pointer dereference in kvm_dirty_ring_push" }, - "CVE-2021-28714": { - "cmt_msg": "xen/netback: fix rx queue stall detection" + "CVE-2018-12207": { + "cmt_msg": "kvm: x86, powerpc: do not allow clearing largepages debugfs entry" }, - "CVE-2021-28713": { - "cmt_msg": "xen/console: harden hvc_xen against event channel storms" + "CVE-2021-41864": { + "cmt_msg": "bpf: Fix integer overflow in prealloc_elems_and_freelist()" }, - "CVE-2021-28712": { - "cmt_msg": "xen/netfront: harden netfront against event channel storms" + "CVE-2022-2209": { + "cmt_msg": "" }, - "CVE-2017-18261": { - "cmt_msg": "clocksource/drivers/arm_arch_timer: Avoid infinite recursion when ftrace is enabled" + "CVE-2023-7042": { + "cmt_msg": "wifi: ath10k: fix NULL pointer dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev()" }, - "CVE-2021-4157": { - "cmt_msg": "pNFS/flexfiles: fix incorrect size check in decode_nfs_fh()" + "CVE-2023-52559": { + "cmt_msg": "iommu/vt-d: Avoid memory allocation in iommu_suspend()" }, - "CVE-2022-2991": { - "cmt_msg": "remove the lightnvm subsystem" + "CVE-2023-47233": { + "cmt_msg": "wifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach" }, - "CVE-2022-3621": { - "cmt_msg": "nilfs2: fix NULL pointer dereference at nilfs_bmap_lookup_at_level()" + "CVE-2022-1462": { + "cmt_msg": "tty: use new tty_insert_flip_string_and_push_buffer() in pty_write()" }, - "CVE-2022-23960": { - "cmt_msg": "ARM: report Spectre v2 status through sysfs" + "CVE-2024-26614": { + "cmt_msg": "tcp: make sure init the accept_queue's spinlocks once" }, - "CVE-2023-51781": { - "cmt_msg": "appletalk: Fix Use-After-Free in atalk_ioctl" + "CVE-2019-20636": { + "cmt_msg": "Input: add safety guards to input_set_keycode()" }, - "CVE-2022-3624": { - "cmt_msg": "bonding: fix reference count leak in balance-alb mode" + "CVE-2023-52435": { + "cmt_msg": "net: prevent mss overflow in skb_segment()" }, - "CVE-2017-17862": { - "cmt_msg": "bpf: fix branch pruning logic" + "CVE-2023-52434": { + "cmt_msg": "smb: client: fix potential OOBs in smb2_parse_contexts()" }, - "CVE-2017-17863": { - "cmt_msg": "bpf: fix integer overflows" + "CVE-2023-52436": { + "cmt_msg": "f2fs: explicitly null-terminate the xattr list" }, - "CVE-2021-3669": { - "cmt_msg": "ipc: replace costly bailout check in sysvipc_find_ipc()" + "CVE-2023-51779": { + "cmt_msg": "Bluetooth: af_bluetooth: Fix Use-After-Free in bt_sock_recvmsg" }, - "CVE-2019-18885": { - "cmt_msg": "btrfs: merge btrfs_find_device and find_device" + "CVE-2018-10877": { + "cmt_msg": "ext4: verify the depth of extent tree in ext4_find_extent()" }, - "CVE-2022-4744": { - "cmt_msg": "tun: avoid double free in tun_free_netdev" + "CVE-2018-10876": { + "cmt_msg": "ext4: only look at the bg_flags field if it is valid" }, - "CVE-2023-1095": { - "cmt_msg": "netfilter: nf_tables: fix null deref due to zeroed list head" + "CVE-2010-4563": { + "cmt_msg": "" }, - "CVE-2019-11091": { - "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" + "CVE-2023-2162": { + "cmt_msg": "scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress" }, - "CVE-2022-3239": { - "cmt_msg": "media: em28xx: initialize refcount before kref_get" + "CVE-2018-10879": { + "cmt_msg": "ext4: make sure bitmaps and the inode table don't overlap with bg descriptors" }, - "CVE-2022-4543": { - "cmt_msg": "" + "CVE-2019-14835": { + "cmt_msg": "vhost: make sure log_num < in_num" }, - "CVE-2019-18660": { - "cmt_msg": "powerpc/book3s64: Fix link stack flush on context switch" + "CVE-2023-4622": { + "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES" }, - "CVE-2023-4921": { - "cmt_msg": "net: sched: sch_qfq: Fix UAF in qfq_dequeue()" + "CVE-2023-4623": { + "cmt_msg": "net/sched: sch_hfsc: Ensure inner classes have fsc curve" }, - "CVE-2022-3424": { - "cmt_msg": "misc: sgi-gru: fix use-after-free error in gru_set_context_option, gru_fault and gru_handle_user_call_os" + "CVE-2019-0146": { + "cmt_msg": "i40e: add num_vectors checker in iwarp handler" }, - "CVE-2017-15649": { - "cmt_msg": "packet: in packet_do_bind, test fanout with bind_lock held" + "CVE-2021-38300": { + "cmt_msg": "bpf, mips: Validate conditional branch offsets" }, - "CVE-2023-23455": { - "cmt_msg": "net: sched: atm: dont intepret cls results when asked to drop" + "CVE-2020-25656": { + "cmt_msg": "vt: keyboard, extend func_buf_lock to readers" }, - "CVE-2023-1829": { - "cmt_msg": "net/sched: Retire tcindex classifier" + "CVE-2021-4023": { + "cmt_msg": "io-wq: fix cancellation on create-worker failure" }, - "CVE-2019-18282": { - "cmt_msg": "net/flow_dissector: switch to siphash" + "CVE-2018-3693": { + "cmt_msg": "ext4: fix spectre gadget in ext4_mb_regular_allocator()" }, - "CVE-2021-34981": { - "cmt_msg": "Bluetooth: cmtp: fix file refcount when cmtp_attach_device fails" + "CVE-2021-22555": { + "cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write" }, - "CVE-2023-1670": { - "cmt_msg": "xirc2ps_cs: Fix use after free bug in xirc2ps_detach" + "CVE-2023-3161": { + "cmt_msg": "fbcon: Check font dimension limits" }, - "CVE-2018-14625": { - "cmt_msg": "vhost/vsock: fix use-after-free in network stack callers" + "CVE-2021-3506": { + "cmt_msg": "f2fs: fix to avoid out-of-bounds memory access" }, - "CVE-2023-4881": { - "cmt_msg": "netfilter: nftables: exthdr: fix 4-byte stack OOB write" + "CVE-2021-47082": { + "cmt_msg": "tun: avoid double free in tun_free_netdev" }, - "CVE-2017-14489": { - "cmt_msg": "scsi: scsi_transport_iscsi: fix the issue that iscsi_if_rx doesn't parse nlmsg properly" + "CVE-2021-47083": { + "cmt_msg": "pinctrl: mediatek: fix global-out-of-bounds issue" }, - "CVE-2023-6915": { - "cmt_msg": "ida: Fix crash in ida_free when the bitmap is empty" + "CVE-2021-31916": { + "cmt_msg": "dm ioctl: fix out of bounds array access when no devices" }, - "CVE-2022-20148": { - "cmt_msg": "f2fs: fix UAF in f2fs_available_free_memory" + "CVE-2021-47086": { + "cmt_msg": "phonet/pep: refuse to enable an unbound pipe" }, - "CVE-2022-1786": { - "cmt_msg": "io_uring: remove io_identity" + "CVE-2018-11508": { + "cmt_msg": "compat: fix 4-byte infoleak via uninitialized struct field" }, - "CVE-2013-7445": { - "cmt_msg": "" + "CVE-2018-11506": { + "cmt_msg": "sr: pass down correctly sized SCSI sense buffer" }, "CVE-2023-32269": { "cmt_msg": "netrom: Fix use-after-free caused by accept on already connected socket" }, - "CVE-2022-3646": { - "cmt_msg": "nilfs2: fix leak of nilfs_root in case of writer thread creation failure" - }, - "CVE-2022-28390": { - "cmt_msg": "can: ems_usb: ems_usb_start_xmit(): fix double dev_kfree_skb() in error path" - }, - "CVE-2020-12652": { - "cmt_msg": "scsi: mptfusion: Fix double fetch bug in ioctl" - }, - "CVE-2022-26966": { - "cmt_msg": "sr9700: sanity check for packet length" - }, - "CVE-2023-6931": { - "cmt_msg": "perf: Fix perf_event_validate_size()" + "CVE-2021-4157": { + "cmt_msg": "pNFS/flexfiles: fix incorrect size check in decode_nfs_fh()" }, - "CVE-2020-14386": { - "cmt_msg": "net/packet: fix overflow in tpacket_rcv" + "CVE-2021-4155": { + "cmt_msg": "xfs: map unwritten blocks in XFS_IOC_{ALLOC,FREE}SP just like fallocate" }, - "CVE-2021-34693": { - "cmt_msg": "can: bcm: fix infoleak in struct bcm_msg_head" + "CVE-2021-4150": { + "cmt_msg": "block: fix incorrect references to disk objects" }, - "CVE-2020-14381": { - "cmt_msg": "futex: Fix inode life-time issue" + "CVE-2021-4159": { + "cmt_msg": "bpf: Verifer, adjust_scalar_min_max_vals to always call update_reg_bounds()" }, - "CVE-2023-30456": { - "cmt_msg": "KVM: nVMX: add missing consistency checks for CR0 and CR4" + "CVE-2021-29154": { + "cmt_msg": "bpf, x86: Validate computation of branch displacements for x86-64" }, - "CVE-2019-19768": { - "cmt_msg": "blktrace: Protect q->blk_trace with RCU" + "CVE-2021-29155": { + "cmt_msg": "bpf: Use correct permission flag for mixed signed bounds arithmetic" }, - "CVE-2022-3303": { - "cmt_msg": "ALSA: pcm: oss: Fix race at SNDCTL_DSP_SYNC" + "CVE-2019-3016": { + "cmt_msg": "x86/kvm: Be careful not to clear KVM_VCPU_FLUSH_TLB bit" }, - "CVE-2017-5715": { - "cmt_msg": "x86/cpufeatures: Add X86_BUG_SPECTRE_V[12]" + "CVE-2022-25375": { + "cmt_msg": "usb: gadget: rndis: check size of RNDIS_MSG_SET command" }, - "CVE-2022-20141": { - "cmt_msg": "igmp: Add ip_mc_list lock in ip_check_mc_rcu" + "CVE-2021-47158": { + "cmt_msg": "net: dsa: sja1105: add error handling in sja1105_setup()" }, - "CVE-2020-25704": { - "cmt_msg": "perf/core: Fix a memory leak in perf_event_parse_addr_filter()" + "CVE-2021-47159": { + "cmt_msg": "net: dsa: fix a crash if ->get_sset_count() fails" }, - "CVE-2021-45095": { - "cmt_msg": "phonet: refcount leak in pep_sock_accep" + "CVE-2021-47153": { + "cmt_msg": "i2c: i801: Don't generate an interrupt on bus reset" }, - "CVE-2023-23454": { - "cmt_msg": "net: sched: cbq: dont intepret cls results when asked to drop" + "CVE-2021-47150": { + "cmt_msg": "net: fec: fix the potential memory leak in fec_enet_init()" }, - "CVE-2020-12771": { - "cmt_msg": "bcache: fix potential deadlock problem in btree_gc_coalesce" + "CVE-2021-47151": { + "cmt_msg": "interconnect: qcom: bcm-voter: add a missing of_node_put()" }, - "CVE-2020-25705": { - "cmt_msg": "icmp: randomize the global rate limiter" + "CVE-2021-46936": { + "cmt_msg": "net: fix use-after-free in tw_timer_handler" }, - "CVE-2018-10853": { - "cmt_msg": "kvm: x86: use correct privilege level for sgdt/sidt/fxsave/fxrstor access" + "CVE-2021-46933": { + "cmt_msg": "usb: gadget: f_fs: Clear ffs_eventfd in ffs_data_clear." }, - "CVE-2018-3620": { - "cmt_msg": "x86/microcode: Allow late microcode loading with SMT disabled" + "CVE-2021-46932": { + "cmt_msg": "Input: appletouch - initialize work before device registration" }, - "CVE-2023-6932": { - "cmt_msg": "ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet" + "CVE-2021-46939": { + "cmt_msg": "tracing: Restructure trace_clock_global() to never block" }, - "CVE-2017-18379": { - "cmt_msg": "nvmet-fc: ensure target queue id within range." + "CVE-2021-46938": { + "cmt_msg": "dm rq: fix double free of blk_mq_tag_set in dev remove after table load fails" }, - "CVE-2018-8781": { - "cmt_msg": "drm: udl: Properly check framebuffer mmap offsets" + "CVE-2018-16862": { + "cmt_msg": "mm: cleancache: fix corruption on missed inode invalidation" }, - "CVE-2021-29155": { - "cmt_msg": "bpf: Use correct permission flag for mixed signed bounds arithmetic" + "CVE-2024-26623": { + "cmt_msg": "pds_core: Prevent race issues involving the adminq" }, - "CVE-2021-33631": { - "cmt_msg": "ext4: fix kernel BUG in 'ext4_write_inline_data_end()'" + "CVE-2018-16884": { + "cmt_msg": "sunrpc: use-after-free in svc_process_common()" }, - "CVE-2019-15916": { - "cmt_msg": "net-sysfs: Fix mem leak in netdev_register_kobject" + "CVE-2022-45885": { + "cmt_msg": "" }, - "CVE-2019-15917": { - "cmt_msg": "Bluetooth: hci_ldisc: Postpone HCI_UART_PROTO_READY bit set in hci_uart_set_proto()" + "CVE-2022-45884": { + "cmt_msg": "" }, - "CVE-2017-18344": { - "cmt_msg": "posix-timer: Properly check sigevent->sigev_notify" + "CVE-2024-25740": { + "cmt_msg": "" }, - "CVE-2017-15115": { - "cmt_msg": "sctp: do not peel off an assoc from one netns to another one" + "CVE-2024-25741": { + "cmt_msg": "" }, - "CVE-2017-15265": { - "cmt_msg": "ALSA: seq: Fix use-after-free at creating a port" + "CVE-2024-25744": { + "cmt_msg": "x86/coco: Disable 32-bit emulation by default on TDX and SEV" }, - "CVE-2021-27363": { - "cmt_msg": "scsi: iscsi: Restrict sessions and handles to admin capabilities" + "CVE-2023-1859": { + "cmt_msg": "9p/xen : Fix use after free bug in xen_9pfs_front_remove due to race condition" }, - "CVE-2020-12362": { - "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" + "CVE-2023-2513": { + "cmt_msg": "ext4: fix use-after-free in ext4_xattr_set_entry" }, - "CVE-2020-12363": { - "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" + "CVE-2023-1855": { + "cmt_msg": "hwmon: (xgene) Fix use after free bug in xgene_hwmon_remove due to race condition" }, - "CVE-2019-12881": { - "cmt_msg": "drm/i915/userptr: reject zero user_size" + "CVE-2015-2877": { + "cmt_msg": "" }, - "CVE-2022-4129": { - "cmt_msg": "l2tp: Serialize access to sk_user_data with sk_callback_lock" + "CVE-2019-16089": { + "cmt_msg": "" }, - "CVE-2023-3117": { - "cmt_msg": "netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE" + "CVE-2020-28941": { + "cmt_msg": "speakup: Do not let the line discipline be used several times" }, - "CVE-2022-28389": { - "cmt_msg": "can: mcba_usb: mcba_usb_start_xmit(): fix double dev_kfree_skb in error path" + "CVE-2018-1130": { + "cmt_msg": "dccp: check sk for closed state in dccp_sendmsg()" }, - "CVE-2018-1000004": { - "cmt_msg": "ALSA: seq: Make ioctls race-free" + "CVE-2021-45486": { + "cmt_msg": "inet: use bigger hash table for IP ID generation" }, - "CVE-2018-18690": { - "cmt_msg": "xfs: don't fail when converting shortform attr to long form during ATTR_REPLACE" + "CVE-2021-3923": { + "cmt_msg": "RDMA/core: Don't infoleak GRH fields" }, - "CVE-2022-28388": { - "cmt_msg": "can: usb_8dev: usb_8dev_start_xmit(): fix double dev_kfree_skb() in error path" + "CVE-2020-14331": { + "cmt_msg": "vgacon: Fix for missing check in scrollback handling" }, - "CVE-2023-33203": { - "cmt_msg": "net: qcom/emac: Fix use after free bug in emac_remove due to race condition" + "CVE-2022-36123": { + "cmt_msg": "x86: Clear .brk area at early boot" }, - "CVE-2017-0627": { - "cmt_msg": "media: uvcvideo: Prevent heap overflow when accessing mapped controls" + "CVE-2019-19532": { + "cmt_msg": "HID: Fix assumption that devices have inputs" }, "CVE-2020-36558": { "cmt_msg": "vt: vt_ioctl: fix race in VT_RESIZEX" }, - "CVE-2021-3896": { - "cmt_msg": "isdn: cpai: check ctr->cnr to avoid array index out of bound" - }, - "CVE-2021-4002": { - "cmt_msg": "hugetlbfs: flush TLBs correctly after huge_pmd_unshare" - }, - "CVE-2023-26545": { - "cmt_msg": "net: mpls: fix stale pointer if allocation fails during device rename" - }, - "CVE-2021-38204": { - "cmt_msg": "usb: max-3421: Prevent corruption of freed memory" - }, - "CVE-2022-34918": { - "cmt_msg": "netfilter: nf_tables: stricter validation of element data" + "CVE-2018-13100": { + "cmt_msg": "f2fs: fix to do sanity check with secs_per_zone" }, - "CVE-2018-20961": { - "cmt_msg": "USB: gadget: f_midi: fixing a possible double-free in f_midi" + "CVE-2018-8087": { + "cmt_msg": "mac80211_hwsim: fix possible memory leak in hwsim_new_radio_nl()" }, - "CVE-2019-20811": { - "cmt_msg": "net-sysfs: call dev_hold if kobject_init_and_add success" + "CVE-2020-36158": { + "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_cmd_802_11_ad_hoc_start" }, - "CVE-2019-20810": { - "cmt_msg": "media: go7007: fix a miss of snd_card_free" + "CVE-2023-28466": { + "cmt_msg": "net: tls: fix possible race condition between do_tls_getsockopt_conf() and do_tls_setsockopt_conf()" }, - "CVE-2023-52464": { - "cmt_msg": "EDAC/thunderx: Fix possible out-of-bounds string access" + "CVE-2022-40307": { + "cmt_msg": "efi: capsule-loader: Fix use-after-free in efi_capsule_write" }, - "CVE-2019-20812": { - "cmt_msg": "af_packet: set defaule value for tmo" + "CVE-2021-39686": { + "cmt_msg": "binder: use euid from cred instead of using task" }, - "CVE-2023-1990": { - "cmt_msg": "nfc: st-nci: Fix use after free bug in ndlc_remove due to race condition" + "CVE-2021-39685": { + "cmt_msg": "USB: gadget: detect too-big endpoint 0 requests" }, - "CVE-2018-1118": { - "cmt_msg": "vhost: fix info leak due to uninitialized memory" + "CVE-2018-1000204": { + "cmt_msg": "scsi: sg: allocate with __GFP_ZERO in sg_build_indirect()" }, - "CVE-2023-6040": { - "cmt_msg": "netfilter: nf_tables: Reject tables of unsupported family" + "CVE-2021-3744": { + "cmt_msg": "crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd()" }, - "CVE-2018-5391": { - "cmt_msg": "ip: discard IPv4 datagrams with overlapping segments." + "CVE-2017-17450": { + "cmt_msg": "netfilter: xt_osf: Add missing permission checks" }, - "CVE-2022-26373": { - "cmt_msg": "x86/speculation: Add RSB VM Exit protections" + "CVE-2024-26592": { + "cmt_msg": "ksmbd: fix UAF issue in ksmbd_tcp_new_connection()" }, - "CVE-2018-5995": { - "cmt_msg": "printk: hash addresses printed with %p" + "CVE-2024-26594": { + "cmt_msg": "ksmbd: validate mech token in session setup" }, - "CVE-2019-15292": { - "cmt_msg": "appletalk: Fix use-after-free in atalk_proc_exit" + "CVE-2024-26595": { + "cmt_msg": "mlxsw: spectrum_acl_tcam: Fix NULL pointer dereference in error path" }, - "CVE-2019-15291": { - "cmt_msg": "media: b2c2-flexcop-usb: add sanity checking" + "CVE-2024-26598": { + "cmt_msg": "KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache" }, - "CVE-2019-15290": { - "cmt_msg": "" + "CVE-2018-3646": { + "cmt_msg": "x86/microcode: Allow late microcode loading with SMT disabled" }, - "CVE-2023-3212": { - "cmt_msg": "gfs2: Don't deref jdesc in evict" + "CVE-2023-2002": { + "cmt_msg": "bluetooth: Perform careful capability checks in hci_sock_ioctl()" }, - "CVE-2024-23848": { - "cmt_msg": "" + "CVE-2023-2007": { + "cmt_msg": "scsi: dpt_i2o: Remove obsolete driver" }, - "CVE-2018-7273": { - "cmt_msg": "printk: hash addresses printed with %p" + "CVE-2022-1419": { + "cmt_msg": "drm/vgem: Close use-after-free race in vgem_gem_create" }, - "CVE-2023-52444": { - "cmt_msg": "f2fs: fix to avoid dirent corruption" + "CVE-2017-16913": { + "cmt_msg": "usbip: fix stub_rx: harden CMD_SUBMIT path to handle malicious input" }, - "CVE-2019-3016": { - "cmt_msg": "x86/kvm: Be careful not to clear KVM_VCPU_FLUSH_TLB bit" + "CVE-2022-2503": { + "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag" }, - "CVE-2023-4459": { - "cmt_msg": "net: vmxnet3: fix possible NULL pointer dereference in vmxnet3_rq_cleanup()" + "CVE-2022-23038": { + "cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()" }, - "CVE-2023-52457": { - "cmt_msg": "serial: 8250: omap: Don't skip resource freeing if pm_runtime_resume_and_get() failed" + "CVE-2022-23039": { + "cmt_msg": "xen/gntalloc: don't use gnttab_query_foreign_access()" }, "CVE-2022-23036": { "cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()" }, - "CVE-2022-2153": { - "cmt_msg": "KVM: x86: Avoid theoretical NULL pointer dereference in kvm_irq_delivery_to_apic_fast()" - }, - "CVE-2019-19531": { - "cmt_msg": "usb: yurex: Fix use-after-free in yurex_delete" - }, - "CVE-2022-20566": { - "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free caused by l2cap_chan_put" - }, - "CVE-2018-12930": { - "cmt_msg": "" - }, - "CVE-2018-12931": { - "cmt_msg": "" + "CVE-2022-23037": { + "cmt_msg": "xen/netfront: don't use gnttab_query_foreign_access() for mapped status" }, - "CVE-2024-23196": { - "cmt_msg": "" + "CVE-2018-10840": { + "cmt_msg": "ext4: correctly handle a zero-length xattr with a non-zero e_value_offs" }, - "CVE-2020-12769": { - "cmt_msg": "spi: spi-dw: Add lock protect dw_spi rx/tx to prevent concurrent calls" + "CVE-2019-15538": { + "cmt_msg": "xfs: fix missing ILOCK unlock when xfs_setattr_nonsize fails due to EDQUOT" }, - "CVE-2022-4662": { - "cmt_msg": "USB: core: Prevent nested device-reset calls" + "CVE-2019-14821": { + "cmt_msg": "KVM: coalesced_mmio: add bounds checking" }, - "CVE-2021-32399": { - "cmt_msg": "bluetooth: eliminate the potential race condition when removing the HCI controller" + "CVE-2020-12826": { + "cmt_msg": "signal: Extend exec_id to 64bits" }, - "CVE-2021-45868": { - "cmt_msg": "quota: check block number when reading the block in quota file" + "CVE-2021-42008": { + "cmt_msg": "net: 6pack: fix slab-out-of-bounds in decode_data" }, - "CVE-2019-12380": { - "cmt_msg": "efi/x86/Add missing error handling to old_memmap 1:1 mapping code" + "CVE-2020-25645": { + "cmt_msg": "geneve: add transport ports in route lookup for geneve" }, - "CVE-2019-12381": { - "cmt_msg": "ip_sockglue: Fix missing-check bug in ip_ra_control()" + "CVE-2019-15666": { + "cmt_msg": "xfrm: policy: Fix out-of-bound array accesses in __xfrm_policy_unlink" }, - "CVE-2019-12382": { - "cmt_msg": "drm/edid: Fix a missing-check bug in drm_load_edid_firmware()" + "CVE-2020-25641": { + "cmt_msg": "block: allow for_each_bvec to support zero len bvec" }, - "CVE-2020-12364": { - "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" + "CVE-2021-33034": { + "cmt_msg": "Bluetooth: verify AMP hci_chan before amp_destroy" }, - "CVE-2019-19543": { - "cmt_msg": "media: serial_ir: Fix use-after-free in serial_ir_init_module" + "CVE-2021-33033": { + "cmt_msg": "cipso,calipso: resolve a number of problems with the DOI refcounts" }, - "CVE-2021-3732": { - "cmt_msg": "ovl: prevent private clone if bind mount is not allowed" + "CVE-2022-40768": { + "cmt_msg": "scsi: stex: Properly zero out the passthrough command structure" }, - "CVE-2022-25375": { - "cmt_msg": "usb: gadget: rndis: check size of RNDIS_MSG_SET command" + "CVE-2024-26625": { + "cmt_msg": "llc: call sock_orphan() at release time" }, - "CVE-2020-10766": { - "cmt_msg": "x86/speculation: Prevent rogue cross-process SSBD shutdown" + "CVE-2024-26627": { + "cmt_msg": "scsi: core: Move scsi_host_busy() out of host lock for waking up EH handler" }, - "CVE-2017-13166": { - "cmt_msg": "media: v4l2-ioctl.c: use check_fmt for enum/g/s/try_fmt" + "CVE-2024-26622": { + "cmt_msg": "tomoyo: fix UAF write bug in tomoyo_write_control()" }, - "CVE-2018-12207": { - "cmt_msg": "kvm: x86, powerpc: do not allow clearing largepages debugfs entry" + "CVE-2023-39198": { + "cmt_msg": "drm/qxl: fix UAF on handle creation" }, - "CVE-2022-20369": { - "cmt_msg": "media: v4l2-mem2mem: Apply DST_QUEUE_OFF_BASE on MMAP buffers across ioctls" + "CVE-2018-10021": { + "cmt_msg": "scsi: libsas: defer ata device eh commands to libata" }, - "CVE-2020-13143": { - "cmt_msg": "USB: gadget: fix illegal array access in binding with UDC" + "CVE-2019-10126": { + "cmt_msg": "mwifiex: Fix heap overflow in mwifiex_uap_parse_tail_ies()" }, - "CVE-2023-5178": { - "cmt_msg": "nvmet-tcp: Fix a possible UAF in queue intialization setup" + "CVE-2019-10124": { + "cmt_msg": "mm: hwpoison: fix thp split handing in soft_offline_in_use_page()" }, - "CVE-2020-10768": { - "cmt_msg": "x86/speculation: PR_SPEC_FORCE_DISABLE enforcement for indirect branches." + "CVE-2020-13974": { + "cmt_msg": "vt: keyboard: avoid signed integer overflow in k_ascii" }, - "CVE-2017-13168": { - "cmt_msg": "scsi: sg: mitigate read/write abuse" + "CVE-2020-15437": { + "cmt_msg": "serial: 8250: fix null-ptr-deref in serial8250_start_tx()" }, - "CVE-2024-25740": { - "cmt_msg": "" + "CVE-2020-15436": { + "cmt_msg": "block: Fix use-after-free in blkdev_get()" }, - "CVE-2019-0148": { - "cmt_msg": "i40e: Wrong truncation from u16 to u8" + "CVE-2021-47065": { + "cmt_msg": "rtw88: Fix array overrun in rtw_get_tx_power_params()" }, - "CVE-2022-2978": { - "cmt_msg": "fs: fix UAF/GPF bug in nilfs_mdt_destroy" + "CVE-2022-23816": { + "cmt_msg": "x86/kvm/vmx: Make noinstr clean" }, - "CVE-2019-17075": { - "cmt_msg": "RDMA/cxgb4: Do not dma memory off of the stack" + "CVE-2021-47145": { + "cmt_msg": "btrfs: do not BUG_ON in link_to_fixup_dir" }, - "CVE-2022-3903": { - "cmt_msg": "media: mceusb: Use new usb_control_msg_*() routines" + "CVE-2021-47149": { + "cmt_msg": "net: fujitsu: fix potential null-ptr-deref" }, - "CVE-2023-39189": { - "cmt_msg": "netfilter: nfnetlink_osf: avoid OOB read" + "CVE-2018-19407": { + "cmt_msg": "KVM: X86: Fix scan ioapic use-before-initialization" }, - "CVE-2019-0146": { - "cmt_msg": "i40e: add num_vectors checker in iwarp handler" + "CVE-2021-47144": { + "cmt_msg": "drm/amd/amdgpu: fix refcount leak" }, - "CVE-2019-0147": { - "cmt_msg": "i40e: add num_vectors checker in iwarp handler" + "CVE-2021-47147": { + "cmt_msg": "ptp: ocp: Fix a resource leak in an error handling path" }, - "CVE-2018-20449": { - "cmt_msg": "printk: hash addresses printed with %p" + "CVE-2021-47146": { + "cmt_msg": "mld: fix panic in mld_newpack()" }, - "CVE-2019-0145": { - "cmt_msg": "i40e: add num_vectors checker in iwarp handler" + "CVE-2021-47140": { + "cmt_msg": "iommu/amd: Clear DMA ops when switching domain" }, - "CVE-2017-15299": { - "cmt_msg": "KEYS: don't let add_key() update an uninstantiated key" + "CVE-2021-47143": { + "cmt_msg": "net/smc: remove device from smcd_dev_list after failed device_add()" }, - "CVE-2022-44034": { - "cmt_msg": "char: pcmcia: remove all the drivers" + "CVE-2021-47142": { + "cmt_msg": "drm/amdgpu: Fix a use-after-free" }, - "CVE-2022-44033": { - "cmt_msg": "char: pcmcia: remove all the drivers" + "CVE-2021-46941": { + "cmt_msg": "usb: dwc3: core: Do core softreset when switch mode" }, - "CVE-2019-11191": { - "cmt_msg": "x86: Deprecate a.out support" + "CVE-2024-26765": { + "cmt_msg": "LoongArch: Disable IRQ before init_fn() for nonboot CPUs" }, - "CVE-2021-0605": { - "cmt_msg": "af_key: pfkey_dump needs parameter validation" + "CVE-2018-16871": { + "cmt_msg": "nfsd: COPY and CLONE operations require the saved filehandle to be set" }, - "CVE-2023-39198": { - "cmt_msg": "drm/qxl: fix UAF on handle creation" + "CVE-2018-16658": { + "cmt_msg": "cdrom: Fix info leak/OOB read in cdrom_ioctl_drive_status" }, - "CVE-2018-10323": { - "cmt_msg": "xfs: set format back to extents if xfs_bmap_extents_to_btree" + "CVE-2019-19036": { + "cmt_msg": "btrfs: Detect unbalanced tree with empty leaf before crashing btree operations" }, - "CVE-2018-10322": { - "cmt_msg": "xfs: enhance dinode verifier" + "CVE-2019-19039": { + "cmt_msg": "btrfs: Don't submit any btree write bio if the fs has errors" }, - "CVE-2023-1989": { - "cmt_msg": "Bluetooth: btsdio: fix use after free bug in btsdio_remove due to unfinished work" + "CVE-2021-32078": { + "cmt_msg": "ARM: footbridge: remove personal server platform" }, - "CVE-2017-8824": { - "cmt_msg": "dccp: CVE-2017-8824: use-after-free in DCCP code" + "CVE-2022-4662": { + "cmt_msg": "USB: core: Prevent nested device-reset calls" }, - "CVE-2018-7492": { - "cmt_msg": "rds: Fix NULL pointer dereference in __rds_rdma_map" + "CVE-2019-11833": { + "cmt_msg": "ext4: zero out the unused memory region in the extent tree block" }, - "CVE-2020-26139": { - "cmt_msg": "mac80211: do not accept/forward invalid EAPOL frames" + "CVE-2020-27835": { + "cmt_msg": "IB/hfi1: Ensure correct mm is used at all times" }, - "CVE-2018-20836": { - "cmt_msg": "scsi: libsas: fix a race condition when smp task timeout" + "CVE-2020-27830": { + "cmt_msg": "speakup: Reject setting the speakup line discipline outside of speakup" }, - "CVE-2021-3609": { - "cmt_msg": "can: bcm: delay release of struct bcm_op after synchronize_rcu()" + "CVE-2018-5953": { + "cmt_msg": "printk: hash addresses printed with %p" }, - "CVE-2019-19536": { - "cmt_msg": "can: peak_usb: pcan_usb_pro: Fix info-leaks to USB devices" + "CVE-2018-1128": { + "cmt_msg": "libceph: add authorizer challenge" }, - "CVE-2019-19537": { - "cmt_msg": "USB: core: Fix races in character device registration and deregistraion" + "CVE-2018-1129": { + "cmt_msg": "libceph: implement CEPHX_V2 calculation mode" }, - "CVE-2019-19534": { - "cmt_msg": "can: peak_usb: fix slab info leak" + "CVE-2018-1120": { + "cmt_msg": "proc: do not access cmdline nor environ from file-backed areas" }, - "CVE-2019-19535": { - "cmt_msg": "can: peak_usb: pcan_usb_fd: Fix info-leaks to USB devices" + "CVE-2018-1121": { + "cmt_msg": "" }, - "CVE-2019-19532": { - "cmt_msg": "HID: Fix assumption that devices have inputs" + "CVE-2018-20856": { + "cmt_msg": "block: blk_init_allocated_queue() set q->fq as NULL in the fail case" }, - "CVE-2018-14617": { - "cmt_msg": "hfsplus: fix NULL dereference in hfsplus_lookup()" + "CVE-2022-3061": { + "cmt_msg": "video: fbdev: i740fb: Error out if 'pixclock' equals zero" }, - "CVE-2019-10638": { - "cmt_msg": "inet: switch IP ID generator to siphash" + "CVE-2020-27784": { + "cmt_msg": "usb: gadget: function: printer: fix use-after-free in __lock_acquire" }, - "CVE-2019-10639": { - "cmt_msg": "netns: provide pure entropy for net_hash_mix()" + "CVE-2020-27786": { + "cmt_msg": "ALSA: rawmidi: Fix racy buffer resize under concurrent accesses" }, - "CVE-2022-3533": { + "CVE-2023-6240": { "cmt_msg": "" }, - "CVE-2021-0929": { - "cmt_msg": "staging/android/ion: delete dma_buf->kmap/unmap implemenation" + "CVE-2022-39842": { + "cmt_msg": "video: fbdev: pxa3xx-gcu: Fix integer overflow in pxa3xx_gcu_write" }, - "CVE-2019-11478": { - "cmt_msg": "tcp: tcp_fragment() should apply sane memory limits" + "CVE-2023-51043": { + "cmt_msg": "drm/atomic: Fix potential use-after-free in nonblocking commits" }, - "CVE-2019-20095": { - "cmt_msg": "mwifiex: Fix mem leak in mwifiex_tm_cmd" + "CVE-2024-23196": { + "cmt_msg": "ALSA: hda: fix a possible null-pointer dereference due to data race in snd_hdac_regmap_sync()" }, - "CVE-2018-19985": { - "cmt_msg": "USB: hso: Fix OOB memory access in hso_probe/hso_get_config_data" + "CVE-2022-3115": { + "cmt_msg": "drm: mali-dp: potential dereference of null pointer" }, - "CVE-2018-6554": { - "cmt_msg": "staging: irda: remove the irda network stack and drivers" + "CVE-2021-26931": { + "cmt_msg": "xen-blkback: don't \"handle\" error by BUG()" }, - "CVE-2018-6555": { - "cmt_msg": "staging: irda: remove the irda network stack and drivers" + "CVE-2021-26930": { + "cmt_msg": "xen-blkback: fix error handling in xen_blkbk_map()" }, - "CVE-2023-6546": { - "cmt_msg": "tty: n_gsm: fix the UAF caused by race condition in gsm_cleanup_mux" + "CVE-2021-26932": { + "cmt_msg": "Xen/x86: don't bail early from clear_foreign_p2m_mapping()" }, - "CVE-2021-0920": { - "cmt_msg": "af_unix: fix garbage collect vs MSG_PEEK" + "CVE-2022-36402": { + "cmt_msg": "drm/vmwgfx: Fix shader stage validation" }, - "CVE-2020-25212": { - "cmt_msg": "nfs: Fix getxattr kernel panic and memory overflow" + "CVE-2021-3178": { + "cmt_msg": "nfsd4: readdirplus shouldn't return parent of export" }, - "CVE-2024-26587": { - "cmt_msg": "net: netdevsim: don't try to destroy PHC on VFs" + "CVE-2023-1611": { + "cmt_msg": "btrfs: fix race between quota disable and quota assign ioctls" }, - "CVE-2023-51043": { - "cmt_msg": "drm/atomic: Fix potential use-after-free in nonblocking commits" + "CVE-2021-3772": { + "cmt_msg": "sctp: use init_tag from inithdr for ABORT chunk" }, - "CVE-2020-28374": { - "cmt_msg": "scsi: target: Fix XCOPY NAA identifier lookup" + "CVE-2021-34556": { + "cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4" }, - "CVE-2019-9213": { - "cmt_msg": "mm: enforce min addr even if capable() in expand_downwards()" + "CVE-2021-28714": { + "cmt_msg": "xen/netback: fix rx queue stall detection" }, - "CVE-2023-2007": { - "cmt_msg": "scsi: dpt_i2o: Remove obsolete driver" + "CVE-2021-28713": { + "cmt_msg": "xen/console: harden hvc_xen against event channel storms" }, - "CVE-2023-0615": { - "cmt_msg": "media: vivid: dev->bitmap_cap wasn't freed in all cases" + "CVE-2021-28712": { + "cmt_msg": "xen/netfront: harden netfront against event channel storms" }, - "CVE-2020-26557": { + "CVE-2021-28711": { + "cmt_msg": "xen/blkfront: harden blkfront against event channel storms" + }, + "CVE-2022-1247": { "cmt_msg": "" }, - "CVE-2017-16535": { - "cmt_msg": "USB: core: fix out-of-bounds access bug in usb_get_bos_descriptor()" + "CVE-2022-2991": { + "cmt_msg": "remove the lightnvm subsystem" }, - "CVE-2017-16534": { - "cmt_msg": "USB: core: harden cdc_parse_cdc_header" + "CVE-2017-17862": { + "cmt_msg": "bpf: fix branch pruning logic" }, - "CVE-2017-16537": { - "cmt_msg": "media: imon: Fix null-ptr-deref in imon_probe" + "CVE-2017-17863": { + "cmt_msg": "bpf: fix integer overflows" }, - "CVE-2017-16536": { - "cmt_msg": "[media] cx231xx-cards: fix NULL-deref on missing association descriptor" + "CVE-2023-52578": { + "cmt_msg": "net: bridge: use DEV_STATS_INC()" }, - "CVE-2017-16531": { - "cmt_msg": "USB: fix out-of-bounds in usb_set_configuration" + "CVE-2023-52574": { + "cmt_msg": "team: fix null-ptr-deref when team device type is changed" }, - "CVE-2017-16530": { - "cmt_msg": "USB: uas: fix bug in handling of alternate settings" + "CVE-2023-3567": { + "cmt_msg": "vc_screen: move load of struct vc_data pointer in vcs_read() to avoid UAF" }, - "CVE-2017-16533": { - "cmt_msg": "HID: usbhid: fix out-of-bounds bug" + "CVE-2023-52571": { + "cmt_msg": "power: supply: rk817: Fix node refcount leak" }, - "CVE-2017-16532": { - "cmt_msg": "usb: usbtest: fix NULL pointer dereference" + "CVE-2023-52572": { + "cmt_msg": "cifs: Fix UAF in cifs_demultiplex_thread()" }, - "CVE-2024-26592": { - "cmt_msg": "ksmbd: fix UAF issue in ksmbd_tcp_new_connection()" + "CVE-2018-10902": { + "cmt_msg": "ALSA: rawmidi: Change resized buffers atomically" }, - "CVE-2022-43750": { - "cmt_msg": "usb: mon: make mmapped memory read only" + "CVE-2018-10853": { + "cmt_msg": "kvm: x86: use correct privilege level for sgdt/sidt/fxsave/fxrstor access" }, - "CVE-2017-16538": { - "cmt_msg": "media: dvb-usb-v2: lmedm04: Improve logic checking of warm start" + "CVE-2020-12362": { + "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" }, - "CVE-2023-3006": { - "cmt_msg": "arm64: Add AMPERE1 to the Spectre-BHB affected list" + "CVE-2020-12363": { + "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" }, - "CVE-2020-27825": { - "cmt_msg": "tracing: Fix race in trace_open and buffer resize call" + "CVE-2019-12881": { + "cmt_msg": "drm/i915/userptr: reject zero user_size" }, - "CVE-2019-2181": { - "cmt_msg": "binder: check for overflow when alloc for security context" + "CVE-2022-4129": { + "cmt_msg": "l2tp: Serialize access to sk_user_data with sk_callback_lock" }, - "CVE-2019-2182": { - "cmt_msg": "arm64: Enforce BBM for huge IO/VMAP mappings" + "CVE-2020-12364": { + "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" }, - "CVE-2020-27820": { - "cmt_msg": "drm/nouveau: use drm_dev_unplug() during device removal" + "CVE-2023-33203": { + "cmt_msg": "net: qcom/emac: Fix use after free bug in emac_remove due to race condition" }, - "CVE-2018-5814": { - "cmt_msg": "usbip: usbip_host: fix NULL-ptr deref and use-after-free errors" + "CVE-2021-4002": { + "cmt_msg": "hugetlbfs: flush TLBs correctly after huge_pmd_unshare" }, - "CVE-2020-0067": { - "cmt_msg": "f2fs: fix to avoid memory leakage in f2fs_listxattr" + "CVE-2023-26545": { + "cmt_msg": "net: mpls: fix stale pointer if allocation fails during device rename" }, - "CVE-2023-4622": { - "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES" + "CVE-2019-15292": { + "cmt_msg": "appletalk: Fix use-after-free in atalk_proc_exit" }, - "CVE-2019-20794": { + "CVE-2019-15291": { + "cmt_msg": "media: b2c2-flexcop-usb: add sanity checking" + }, + "CVE-2019-15290": { "cmt_msg": "" }, - "CVE-2023-39193": { - "cmt_msg": "netfilter: xt_sctp: validate the flag_info count" + "CVE-2023-3212": { + "cmt_msg": "gfs2: Don't deref jdesc in evict" }, - "CVE-2017-18224": { - "cmt_msg": "ocfs2: ip_alloc_sem should be taken in ocfs2_get_block()" + "CVE-2024-26633": { + "cmt_msg": "ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim()" }, - "CVE-2020-26541": { - "cmt_msg": "certs: Add EFI_CERT_X509_GUID support for dbx entries" + "CVE-2024-26636": { + "cmt_msg": "llc: make llc_ui_sendmsg() more robust against bonding changes" }, - "CVE-2023-6610": { - "cmt_msg": "smb: client: fix potential OOB in smb2_dump_detail()" + "CVE-2024-26635": { + "cmt_msg": "llc: Drop support for ETH_P_TR_802_2." }, - "CVE-2020-26559": { - "cmt_msg": "" + "CVE-2020-12769": { + "cmt_msg": "spi: spi-dw: Add lock protect dw_spi rx/tx to prevent concurrent calls" }, - "CVE-2020-27673": { - "cmt_msg": "xen/events: add a proper barrier to 2-level uevent unmasking" + "CVE-2023-52635": { + "cmt_msg": "PM / devfreq: Synchronize devfreq_monitor_[start/stop]" }, - "CVE-2021-43389": { - "cmt_msg": "isdn: cpai: check ctr->cnr to avoid array index out of bound" + "CVE-2023-52634": { + "cmt_msg": "drm/amd/display: Fix disable_otg_wa logic" }, - "CVE-2017-14156": { - "cmt_msg": "video: fbdev: aty: do not leak uninitialized padding in clk to userspace" + "CVE-2023-2860": { + "cmt_msg": "ipv6: sr: fix out-of-bounds read when setting HMAC data." }, - "CVE-2021-33061": { - "cmt_msg": "ixgbe: add improvement for MDD response functionality" + "CVE-2018-20669": { + "cmt_msg": "make 'user_access_begin()' do 'access_ok()'" }, - "CVE-2018-1092": { - "cmt_msg": "ext4: fail ext4_iget for root directory if unallocated" + "CVE-2017-18208": { + "cmt_msg": "mm/madvise.c: fix madvise() infinite loop under special circumstances" }, - "CVE-2018-1093": { - "cmt_msg": "ext4: add validity checks for bitmap block numbers" + "CVE-2020-13143": { + "cmt_msg": "USB: gadget: fix illegal array access in binding with UDC" }, - "CVE-2017-18551": { - "cmt_msg": "i2c: core-smbus: prevent stack corruption on read I2C_BLOCK_DATA" + "CVE-2022-3903": { + "cmt_msg": "media: mceusb: Use new usb_control_msg_*() routines" }, - "CVE-2017-18550": { - "cmt_msg": "scsi: aacraid: Don't copy uninitialized stack memory to userspace" + "CVE-2018-20449": { + "cmt_msg": "printk: hash addresses printed with %p" }, - "CVE-2021-3864": { - "cmt_msg": "" + "CVE-2021-47179": { + "cmt_msg": "NFSv4: Fix a NULL pointer dereference in pnfs_mark_matching_lsegs_return()" }, - "CVE-2021-26931": { - "cmt_msg": "xen-blkback: don't \"handle\" error by BUG()" + "CVE-2019-11191": { + "cmt_msg": "x86: Deprecate a.out support" }, - "CVE-2024-26584": { - "cmt_msg": "net: tls: handle backlogging of crypto requests" + "CVE-2021-47170": { + "cmt_msg": "USB: usbfs: Don't WARN about excessively large memory allocations" }, - "CVE-2024-23307": { - "cmt_msg": "" + "CVE-2021-47171": { + "cmt_msg": "net: usb: fix memory leak in smsc75xx_bind" }, - "CVE-2021-4203": { - "cmt_msg": "af_unix: fix races in sk_peer_pid and sk_peer_cred accesses" + "CVE-2021-47172": { + "cmt_msg": "iio: adc: ad7124: Fix potential overflow due to non sequential channel numbers" }, - "CVE-2023-4623": { - "cmt_msg": "net/sched: sch_hfsc: Ensure inner classes have fsc curve" + "CVE-2021-47173": { + "cmt_msg": "misc/uss720: fix memory leak in uss720_probe" }, - "CVE-2024-23849": { - "cmt_msg": "net/rds: Fix UBSAN: array-index-out-of-bounds in rds_cmsg_recv" + "CVE-2021-47175": { + "cmt_msg": "net/sched: fq_pie: fix OOB access in the traffic path" }, - "CVE-2020-29568": { - "cmt_msg": "xen/xenbus: Allow watches discard events before queueing" + "CVE-2018-10323": { + "cmt_msg": "xfs: set format back to extents if xfs_bmap_extents_to_btree" }, - "CVE-2018-18559": { - "cmt_msg": "net/packet: fix a race in packet_bind() and packet_notifier()" + "CVE-2021-47177": { + "cmt_msg": "iommu/vt-d: Fix sysfs leak in alloc_iommu()" }, - "CVE-2020-14351": { - "cmt_msg": "perf/core: Fix race in the perf_mmap_close() function" + "CVE-2021-46951": { + "cmt_msg": "tpm: efi: Use local variable for calculating final log size" }, - "CVE-2019-19054": { - "cmt_msg": "media: rc: prevent memory leak in cx23888_ir_probe" + "CVE-2021-46950": { + "cmt_msg": "md/raid1: properly indicate failure when ending a failed write request" }, - "CVE-2019-19057": { - "cmt_msg": "mwifiex: pcie: Fix memory leak in mwifiex_pcie_init_evt_ring" + "CVE-2021-46953": { + "cmt_msg": "ACPI: GTDT: Don't corrupt interrupt mappings on watchdow probe failure" }, - "CVE-2019-19056": { - "cmt_msg": "mwifiex: pcie: Fix memory leak in mwifiex_pcie_alloc_cmdrsp_buf" + "CVE-2021-46952": { + "cmt_msg": "NFS: fs_context: validate UDP retrans to prevent shift out-of-bounds" }, - "CVE-2019-9453": { - "cmt_msg": "f2fs: fix to avoid accessing xattr across the boundary" + "CVE-2021-46959": { + "cmt_msg": "spi: Fix use-after-free with devm_spi_alloc_*" }, - "CVE-2023-23039": { - "cmt_msg": "" + "CVE-2019-10220": { + "cmt_msg": "Convert filldir[64]() from __put_user() to unsafe_put_user()" }, - "CVE-2019-19052": { - "cmt_msg": "can: gs_usb: gs_can_open(): prevent memory leak" + "CVE-2021-0929": { + "cmt_msg": "staging/android/ion: delete dma_buf->kmap/unmap implemenation" }, - "CVE-2019-3846": { - "cmt_msg": "mwifiex: Fix possible buffer overflows at parsing bss descriptor" + "CVE-2018-19985": { + "cmt_msg": "USB: hso: Fix OOB memory access in hso_probe/hso_get_config_data" }, - "CVE-2023-46838": { - "cmt_msg": "xen-netback: don't produce zero-size SKB frags" + "CVE-2021-0920": { + "cmt_msg": "af_unix: fix garbage collect vs MSG_PEEK" }, - "CVE-2020-0427": { - "cmt_msg": "pinctrl: devicetree: Avoid taking direct reference to device name string" + "CVE-2023-0615": { + "cmt_msg": "media: vivid: dev->bitmap_cap wasn't freed in all cases" }, - "CVE-2019-19227": { - "cmt_msg": "appletalk: Fix potential NULL pointer dereference in unregister_snap_client" + "CVE-2022-3586": { + "cmt_msg": "sch_sfb: Don't assume the skb is still around after enqueueing to child" }, - "CVE-2022-2977": { - "cmt_msg": "tpm: fix reference counting for struct tpm_chip" + "CVE-2020-27825": { + "cmt_msg": "tracing: Fix race in trace_open and buffer resize call" }, - "CVE-2019-19058": { - "cmt_msg": "iwlwifi: dbg_ini: fix memory leak in alloc_sgtable" + "CVE-2019-2181": { + "cmt_msg": "binder: check for overflow when alloc for security context" }, - "CVE-2019-9458": { - "cmt_msg": "media: v4l: event: Prevent freeing event subscriptions while accessed" + "CVE-2019-2182": { + "cmt_msg": "arm64: Enforce BBM for huge IO/VMAP mappings" }, - "CVE-2023-34255": { - "cmt_msg": "xfs: verify buffer contents when we skip log replay" + "CVE-2020-27820": { + "cmt_msg": "drm/nouveau: use drm_dev_unplug() during device removal" }, - "CVE-2016-8660": { + "CVE-2023-6610": { + "cmt_msg": "smb: client: fix potential OOB in smb2_dump_detail()" + }, + "CVE-2023-1476": { "cmt_msg": "" }, - "CVE-2020-14314": { - "cmt_msg": "ext4: fix potential negative array index in do_split()" + "CVE-2023-1670": { + "cmt_msg": "xirc2ps_cs: Fix use after free bug in xirc2ps_detach" }, - "CVE-2023-3090": { - "cmt_msg": "ipvlan:Fix out-of-bounds caused by unclear skb->cb" + "CVE-2020-14351": { + "cmt_msg": "perf/core: Fix race in the perf_mmap_close() function" }, - "CVE-2019-13272": { - "cmt_msg": "ptrace: Fix ->ptracer_cred handling for PTRACE_TRACEME" + "CVE-2020-0429": { + "cmt_msg": "l2tp: fix race between l2tp_session_delete() and l2tp_tunnel_closeall()" }, - "CVE-2023-1073": { - "cmt_msg": "HID: check empty report_list in hid_validate_values()" + "CVE-2020-14356": { + "cmt_msg": "cgroup: fix cgroup_sk_alloc() for sk_clone_lock()" }, - "CVE-2023-45862": { - "cmt_msg": "USB: ene_usb6250: Allocate enough memory for full object" + "CVE-2022-20132": { + "cmt_msg": "HID: add hid_is_usb() function to make it simpler for USB detection" }, - "CVE-2023-45863": { - "cmt_msg": "kobject: Fix slab-out-of-bounds in fill_kobj_path()" + "CVE-2023-6270": { + "cmt_msg": "aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts" }, "CVE-2023-1582": { "cmt_msg": "fs/proc: task_mmu.c: don't read mapcount for migration entry" }, - "CVE-2017-15537": { - "cmt_msg": "x86/fpu: Don't let userspace set bogus xcomp_bv" - }, "CVE-2019-17351": { "cmt_msg": "xen: let alloc_xenballooned_pages() fail if not enough memory free" }, - "CVE-2022-23222": { - "cmt_msg": "bpf: Replace PTR_TO_XXX_OR_NULL with PTR_TO_XXX | PTR_MAYBE_NULL" - }, - "CVE-2020-25669": { - "cmt_msg": "Input: sunkbd - avoid use-after-free in teardown paths" - }, - "CVE-2020-25668": { - "cmt_msg": "tty: make FONTX ioctl use the tty pointer they were actually passed" - }, - "CVE-2008-4609": { - "cmt_msg": "" - }, - "CVE-2019-9456": { - "cmt_msg": "usb: usbmon: Read text within supplied buffer size" - }, - "CVE-2023-52458": { - "cmt_msg": "block: add check that partition length needs to be aligned with block size" - }, - "CVE-2023-40283": { - "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb" - }, - "CVE-2022-0435": { - "cmt_msg": "tipc: improve size validations for received domain records" - }, - "CVE-2022-20565": { - "cmt_msg": "HID: core: Correctly handle ReportSize being zero" - }, - "CVE-2022-1419": { - "cmt_msg": "drm/vgem: Close use-after-free race in vgem_gem_create" - }, "CVE-2018-20854": { "cmt_msg": "phy: ocelot-serdes: fix out-of-bounds read" }, - "CVE-2018-25020": { - "cmt_msg": "bpf: fix truncated jump targets on heavy expansions" - }, - "CVE-2018-5390": { - "cmt_msg": "tcp: free batches of packets in tcp_prune_ofo_queue()" - }, - "CVE-2017-15127": { - "cmt_msg": "userfaultfd: hugetlbfs: remove superfluous page unlock in VM_SHARED case" - }, - "CVE-2017-15126": { - "cmt_msg": "userfaultfd: non-cooperative: fix fork use after free" - }, - "CVE-2023-26607": { - "cmt_msg": "ntfs: fix out-of-bounds read in ntfs_attr_find()" - }, "CVE-2018-20855": { "cmt_msg": "IB/mlx5: Fix leaking stack memory to userspace" }, - "CVE-2019-15239": { - "cmt_msg": "" - }, - "CVE-2017-15129": { - "cmt_msg": "net: Fix double free and memory corruption in get_net_ns_by_id()" - }, - "CVE-2017-15128": { - "cmt_msg": "userfaultfd: hugetlbfs: prevent UFFDIO_COPY to fill beyond the end of i_size" - }, - "CVE-2021-4037": { - "cmt_msg": "xfs: fix up non-directory creation in SGID directories" - }, - "CVE-2021-22543": { - "cmt_msg": "KVM: do not allow mapping valid but non-reference-counted pages" - }, - "CVE-2022-45884": { - "cmt_msg": "" - }, "CVE-2021-3348": { "cmt_msg": "nbd: freeze the queue while we're adding connections" }, @@ -14267,30 +14000,9 @@ "CVE-2018-1065": { "cmt_msg": "netfilter: add back stackpointer size checks" }, - "CVE-2023-20941": { - "cmt_msg": "" - }, - "CVE-2018-18386": { - "cmt_msg": "n_tty: fix EXTPROC vs ICANON interaction with TIOCINQ (aka FIONREAD)" - }, - "CVE-2017-12188": { - "cmt_msg": "KVM: nVMX: update last_nonleaf_level when initializing nested EPT" - }, "CVE-2018-1068": { "cmt_msg": "netfilter: ebtables: CONFIG_COMPAT: don't trust userland offsets" }, - "CVE-2021-44733": { - "cmt_msg": "tee: handle lookup of shm with reference count 0" - }, - "CVE-2021-4197": { - "cmt_msg": "cgroup: Use open-time credentials for process migraton perm checks" - }, - "CVE-2020-10135": { - "cmt_msg": "Bluetooth: Consolidate encryption handling in hci_encrypt_cfm" - }, - "CVE-2020-25285": { - "cmt_msg": "mm/hugetlb: fix a race between hugetlb sysctl handlers" - }, "CVE-2019-7308": { "cmt_msg": "bpf: fix sanitation of alu op with pointer / scalar type from different paths" }, @@ -14300,12 +14012,6 @@ "CVE-2022-1966": { "cmt_msg": "netfilter: nf_tables: disallow non-stateful expression in sets earlier" }, - "CVE-2023-3611": { - "cmt_msg": "net/sched: sch_qfq: account for stab overhead in qfq_enqueue" - }, - "CVE-2017-9986": { - "cmt_msg": "sound: Retire OSS" - }, "CVE-2021-3587": { "cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect" }, @@ -14318,147 +14024,54 @@ "CVE-2017-18075": { "cmt_msg": "crypto: pcrypt - fix freeing pcrypt instances" }, - "CVE-2022-3534": { - "cmt_msg": "libbpf: Fix use-after-free in btf_dump_name_dups" - }, - "CVE-2023-34256": { - "cmt_msg": "ext4: avoid a potential slab-out-of-bounds in ext4_group_desc_csum" - }, - "CVE-2020-36516": { - "cmt_msg": "ipv4: avoid using shared IP generator for connected sockets" - }, - "CVE-2020-36766": { - "cmt_msg": "cec-api: prevent leaking memory through hole in structure" - }, - "CVE-2018-7740": { - "cmt_msg": "hugetlbfs: check for pgoff value overflow" - }, - "CVE-2023-28328": { - "cmt_msg": "media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer()" - }, - "CVE-2022-0322": { - "cmt_msg": "sctp: account stream padding length for reconf chunk" - }, - "CVE-2023-0386": { - "cmt_msg": "ovl: fail on invalid uid/gid mapping at copy up" - }, "CVE-2023-6121": { "cmt_msg": "nvmet: nul-terminate the NQNs passed in the connect command" }, - "CVE-2017-13693": { - "cmt_msg": "" - }, - "CVE-2022-0617": { - "cmt_msg": "udf: Fix NULL ptr deref when converting from inline format" - }, - "CVE-2017-13695": { - "cmt_msg": "ACPICA: acpi: acpica: fix acpi operand cache leak in nseval.c" - }, - "CVE-2017-13694": { - "cmt_msg": "" - }, - "CVE-2021-4149": { - "cmt_msg": "btrfs: unlock newly allocated extent buffer after error" - }, - "CVE-2022-21385": { - "cmt_msg": "net/rds: fix warn in rds_message_alloc_sgs" - }, - "CVE-2022-42895": { - "cmt_msg": "Bluetooth: L2CAP: Fix attempting to access uninitialized memory" - }, - "CVE-2021-3640": { - "cmt_msg": "Bluetooth: sco: Fix lock_sock() blockage by memcpy_from_msg()" - }, "CVE-2021-3764": { "cmt_msg": "crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd()" }, "CVE-2020-1749": { "cmt_msg": "net: ipv6_stub: use ip6_dst_lookup_flow instead of ip6_dst_lookup" }, - "CVE-2022-42896": { - "cmt_msg": "Bluetooth: L2CAP: Fix accepting connection request for invalid SPSM" - }, "CVE-2021-3760": { "cmt_msg": "nfc: nci: fix the UAF of rf_conn_info object" }, - "CVE-2022-36123": { - "cmt_msg": "x86: Clear .brk area at early boot" - }, - "CVE-2020-11608": { - "cmt_msg": "media: ov519: add missing endpoint sanity checks" - }, - "CVE-2020-10732": { - "cmt_msg": "fs/binfmt_elf.c: allocate initialized memory in fill_thread_core_info()" - }, - "CVE-2020-28097": { - "cmt_msg": "vgacon: remove software scrollback support" - }, "CVE-2017-18216": { "cmt_msg": "ocfs2: subsystem.su_mutex is required while accessing the item->ci_parent" }, - "CVE-2019-14897": { - "cmt_msg": "libertas: Fix two buffer overflows at parsing bss descriptor" - }, - "CVE-2024-24855": { - "cmt_msg": "scsi: lpfc: Fix a possible data race in lpfc_unregister_fcf_rescan()" - }, - "CVE-2017-18218": { - "cmt_msg": "net: hns: Fix a skb used after free bug" - }, - "CVE-2018-5848": { - "cmt_msg": "wil6210: missing length check in wmi_set_ie" - }, - "CVE-2018-8897": { - "cmt_msg": "x86/entry/64: Don't use IST entry for #BP stack" - }, - "CVE-2021-29265": { - "cmt_msg": "usbip: fix stub_dev usbip_sockfd_store() races leading to gpf" + "CVE-2021-46992": { + "cmt_msg": "netfilter: nftables: avoid overflows in nft_hash_buckets()" }, "CVE-2021-39648": { "cmt_msg": "usb: gadget: configfs: Fix use-after-free issue with udc_name" }, - "CVE-2022-3545": { - "cmt_msg": "nfp: fix use-after-free in area_cache_get()" + "CVE-2023-52569": { + "cmt_msg": "btrfs: remove BUG() after failure to insert delayed dir index item" }, - "CVE-2020-14416": { - "cmt_msg": "can, slip: Protect tty->disc_data in write_wakeup and close with RCU" + "CVE-2023-52568": { + "cmt_msg": "x86/sgx: Resolves SECS reclaim vs. page fault for EAUG race" }, "CVE-2019-0136": { "cmt_msg": "mac80211: drop robust management frames from unknown TA" }, - "CVE-2017-17975": { - "cmt_msg": "media: usbtv: prevent double free in error case" - }, - "CVE-2019-16921": { - "cmt_msg": "RDMA/hns: Fix init resp when alloc ucontext" + "CVE-2023-52563": { + "cmt_msg": "drm/meson: fix memory leak on ->hpd_notify callback" }, - "CVE-2019-19377": { - "cmt_msg": "btrfs: Don't submit any btree write bio if the fs has errors" + "CVE-2023-52561": { + "cmt_msg": "arm64: dts: qcom: sdm845-db845c: Mark cont splash memory region as reserved" }, - "CVE-2021-21781": { - "cmt_msg": "ARM: ensure the signal page contains defined contents" + "CVE-2022-3344": { + "cmt_msg": "KVM: x86: nSVM: harden svm_free_nested against freeing vmcb02 while still in use" }, - "CVE-2021-0512": { - "cmt_msg": "HID: make arrays usage and value to be the same" + "CVE-2023-52566": { + "cmt_msg": "nilfs2: fix potential use after free in nilfs_gccache_submit_read_data()" }, - "CVE-2018-14633": { - "cmt_msg": "scsi: target: iscsi: Use hex2bin instead of a re-implementation" + "CVE-2023-52565": { + "cmt_msg": "media: uvcvideo: Fix OOB read" }, "CVE-2018-12896": { "cmt_msg": "posix-timers: Sanitize overrun handling" }, - "CVE-2023-1382": { - "cmt_msg": "tipc: set con sock in tipc_conn_alloc" - }, - "CVE-2019-19073": { - "cmt_msg": "ath9k_htc: release allocated buffer if timed out" - }, - "CVE-2018-14734": { - "cmt_msg": "infiniband: fix a possible use-after-free bug" - }, - "CVE-2017-15306": { - "cmt_msg": "KVM: PPC: Fix oops when checking KVM_CAP_PPC_HTM" - }, "CVE-2020-0347": { "cmt_msg": "" }, @@ -14468,12 +14081,6 @@ "CVE-2019-18808": { "cmt_msg": "crypto: ccp - Release all allocated memory if sha type is invalid" }, - "CVE-2022-41222": { - "cmt_msg": "mm/mremap: hold the rmap lock in write mode when moving page table entries." - }, - "CVE-2018-8822": { - "cmt_msg": "staging: ncpfs: memory corruption in ncp_read_kernel()" - }, "CVE-2021-40490": { "cmt_msg": "ext4: fix race writing to an inline_data file while its xattrs are changing" }, @@ -14486,1691 +14093,1893 @@ "CVE-2019-12456": { "cmt_msg": "" }, - "CVE-2023-20569": { - "cmt_msg": "x86/bugs: Increase the x86 bugs vector size to two u32s" - }, "CVE-2022-0812": { "cmt_msg": "xprtrdma: fix incorrect header size calculations" }, - "CVE-2021-29647": { - "cmt_msg": "net: qrtr: fix a kernel-infoleak in qrtr_recvmsg()" - }, - "CVE-2019-17133": { - "cmt_msg": "cfg80211: wext: avoid copying malformed SSIDs" + "CVE-2019-18806": { + "cmt_msg": "net: qlogic: Fix memory leak in ql_alloc_large_buffers" }, - "CVE-2017-18595": { - "cmt_msg": "tracing: Fix possible double free on failure of allocating trace buffer" + "CVE-2021-33656": { + "cmt_msg": "vt: drop old FONT ioctls" }, "CVE-2021-33655": { "cmt_msg": "fbcon: Disallow setting font bigger than screen size" }, - "CVE-2021-3612": { - "cmt_msg": "Input: joydev - prevent potential read overflow in ioctl" - }, "CVE-2022-41858": { "cmt_msg": "drivers: net: slip: fix NPD bug in sl_tx_timeout()" }, - "CVE-2019-6974": { - "cmt_msg": "kvm: fix kvm_ioctl_create_device() reference counting (CVE-2019-6974)" - }, "CVE-2022-41850": { "cmt_msg": "HID: roccat: Fix use-after-free in roccat_read()" }, - "CVE-2020-24503": { - "cmt_msg": "" + "CVE-2022-1184": { + "cmt_msg": "ext4: verify dir block before splitting it" }, - "CVE-2022-0168": { - "cmt_msg": "cifs: fix NULL ptr dereference in smb2_ioctl_query_info()" + "CVE-2019-9245": { + "cmt_msg": "f2fs: sanity check of xattr entry size" }, - "CVE-2023-2985": { - "cmt_msg": "fs: hfsplus: fix UAF issue in hfsplus_put_super" + "CVE-2023-3358": { + "cmt_msg": "HID: intel_ish-hid: Add check for ishtp_dma_tx_map" }, - "CVE-2020-14390": { - "cmt_msg": "fbcon: remove soft scrollback code" + "CVE-2024-1151": { + "cmt_msg": "net: openvswitch: limit the number of recursions from action sets" }, - "CVE-2020-24502": { - "cmt_msg": "" + "CVE-2018-7566": { + "cmt_msg": "ALSA: seq: Fix racy pool initializations" }, - "CVE-2017-17806": { - "cmt_msg": "crypto: hmac - require that the underlying hash algorithm is unkeyed" + "CVE-2024-26808": { + "cmt_msg": "netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain" }, - "CVE-2017-17807": { - "cmt_msg": "KEYS: add missing permission check for request_key() destination" + "CVE-2024-26809": { + "cmt_msg": "netfilter: nft_set_pipapo: release elements in clone only from destroy path" }, - "CVE-2017-17805": { - "cmt_msg": "crypto: salsa20 - fix blkcipher_walk API usage" + "CVE-2021-42739": { + "cmt_msg": "media: firewire: firedtv-avc: fix a buffer overflow in avc_ca_pmt()" }, - "CVE-2022-3642": { - "cmt_msg": "" + "CVE-2023-46343": { + "cmt_msg": "nfc: nci: fix possible NULL pointer dereference in send_acknowledge()" }, - "CVE-2019-19527": { - "cmt_msg": "HID: hiddev: do cleanup in failure of opening a device" + "CVE-2024-26806": { + "cmt_msg": "spi: cadence-qspi: remove system-wide suspend helper calls from runtime PM hooks" }, - "CVE-2024-0584": { - "cmt_msg": "ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet" + "CVE-2021-37159": { + "cmt_msg": "usb: hso: fix error handling code of hso_create_net_device" }, - "CVE-2019-19526": { - "cmt_msg": "NFC: pn533: fix use-after-free and memleaks" + "CVE-2020-12770": { + "cmt_msg": "scsi: sg: add sg_remove_request in sg_write" }, - "CVE-2020-0465": { - "cmt_msg": "HID: core: Sanitize event code and type when mapping input" + "CVE-2024-26802": { + "cmt_msg": "stmmac: Clear variable when destroying workqueue" }, - "CVE-2020-0305": { - "cmt_msg": "chardev: Avoid potential use-after-free in 'chrdev_open()'" + "CVE-2018-6412": { + "cmt_msg": "fbdev: Fixing arbitrary kernel leak in case FBIOGETCMAP_SPARC in sbusfb_ioctl_helper()." }, - "CVE-2018-3639": { - "cmt_msg": "x86/nospec: Simplify alternative_msr_write()" + "CVE-2023-52606": { + "cmt_msg": "powerpc/lib: Validate size for vector operations" }, - "CVE-2021-4218": { - "cmt_msg": "sysctl: pass kernel pointers to ->proc_handler" + "CVE-2023-52607": { + "cmt_msg": "powerpc/mm: Fix null-pointer dereference in pgtable_cache_add" }, - "CVE-2019-15902": { - "cmt_msg": "" + "CVE-2023-52604": { + "cmt_msg": "FS:JFS:UBSAN:array-index-out-of-bounds in dbAdjTree" }, - "CVE-2024-25739": { - "cmt_msg": "" + "CVE-2023-52602": { + "cmt_msg": "jfs: fix slab-out-of-bounds Read in dtSearch" }, - "CVE-2023-3358": { - "cmt_msg": "HID: intel_ish-hid: Add check for ishtp_dma_tx_map" + "CVE-2023-52603": { + "cmt_msg": "UBSAN: array-index-out-of-bounds in dtSplitRoot" }, - "CVE-2019-20054": { - "cmt_msg": "fs/proc/proc_sysctl.c: fix NULL pointer dereference in put_links" + "CVE-2023-52600": { + "cmt_msg": "jfs: fix uaf in jfs_evict_inode" }, - "CVE-2024-0340": { - "cmt_msg": "vhost: use kzalloc() instead of kmalloc() followed by memset()" + "CVE-2023-52601": { + "cmt_msg": "jfs: fix array-index-out-of-bounds in dbAdjTree" }, - "CVE-2021-3753": { - "cmt_msg": "vt_kdsetmode: extend console locking" + "CVE-2023-52609": { + "cmt_msg": "binder: fix race between mmput() and do_exit()" }, - "CVE-2023-6536": { + "CVE-2023-3640": { "cmt_msg": "" }, - "CVE-2019-11135": { - "cmt_msg": "x86/msr: Add the IA32_TSX_CTRL MSR" + "CVE-2023-3022": { + "cmt_msg": "ipv6: Use result arg in fib_lookup_arg consistently" }, - "CVE-2019-11810": { - "cmt_msg": "scsi: megaraid_sas: return error when create DMA pool failed" + "CVE-2022-43750": { + "cmt_msg": "usb: mon: make mmapped memory read only" }, - "CVE-2021-27365": { - "cmt_msg": "scsi: iscsi: Ensure sysfs attributes are limited to PAGE_SIZE" + "CVE-2023-0047": { + "cmt_msg": "mm, oom: do not trigger out_of_memory from the #PF" }, - "CVE-2021-27364": { - "cmt_msg": "scsi: iscsi: Restrict sessions and handles to admin capabilities" + "CVE-2023-4010": { + "cmt_msg": "" }, - "CVE-2019-11815": { - "cmt_msg": "net: rds: force to destroy connection if t_sock is NULL in rds_tcp_kill_sock()." + "CVE-2021-47167": { + "cmt_msg": "NFS: Fix an Oopsable condition in __nfs_pageio_add_request()" }, - "CVE-2020-0431": { - "cmt_msg": "HID: hid-input: clear unmapped usages" + "CVE-2021-47166": { + "cmt_msg": "NFS: Don't corrupt the value of pg_bytes_written in nfs_do_recoalesce()" }, - "CVE-2022-39842": { - "cmt_msg": "video: fbdev: pxa3xx-gcu: Fix integer overflow in pxa3xx_gcu_write" + "CVE-2021-47165": { + "cmt_msg": "drm/meson: fix shutdown crash when component not probed" }, - "CVE-2018-17977": { - "cmt_msg": "" + "CVE-2021-47163": { + "cmt_msg": "tipc: wait and exit until all work queues are done" }, - "CVE-2024-1151": { - "cmt_msg": "net: openvswitch: limit the number of recursions from action sets" + "CVE-2021-47162": { + "cmt_msg": "tipc: skb_linearize the head skb when reassembling msgs" }, - "CVE-2018-17972": { - "cmt_msg": "proc: restrict kernel stack dumps to root" + "CVE-2021-47161": { + "cmt_msg": "spi: spi-fsl-dspi: Fix a resource leak in an error handling path" }, - "CVE-2021-20320": { - "cmt_msg": "s390/bpf: Fix optimizing out zero-extensions" + "CVE-2021-47160": { + "cmt_msg": "net: dsa: mt7530: fix VLAN traffic leaks" }, - "CVE-2021-20321": { - "cmt_msg": "ovl: fix missing negative dentry check in ovl_rename()" + "CVE-2023-4385": { + "cmt_msg": "fs: jfs: fix possible NULL pointer dereference in dbFree()" }, - "CVE-2018-7566": { - "cmt_msg": "ALSA: seq: Fix racy pool initializations" + "CVE-2021-46965": { + "cmt_msg": "mtd: physmap: physmap-bt1-rom: Fix unintentional stack access" }, - "CVE-2022-33742": { - "cmt_msg": "xen/blkfront: force data bouncing when backend is untrusted" + "CVE-2023-4387": { + "cmt_msg": "net: vmxnet3: fix possible use-after-free bugs in vmxnet3_rq_alloc_rx_buf()" }, - "CVE-2022-26490": { - "cmt_msg": "nfc: st21nfca: Fix potential buffer overflows in EVT_TRANSACTION" + "CVE-2021-46960": { + "cmt_msg": "cifs: Return correct error code from smb2_get_enc_key" }, - "CVE-2021-0937": { - "cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write" + "CVE-2021-46962": { + "cmt_msg": "mmc: uniphier-sd: Fix a resource leak in the remove function" }, - "CVE-2022-3169": { - "cmt_msg": "nvme: ensure subsystem reset is single threaded" + "CVE-2021-47168": { + "cmt_msg": "NFS: fix an incorrect limit in filelayout_decode_layout()" }, - "CVE-2022-36280": { - "cmt_msg": "drm/vmwgfx: Validate the box size for the snooped cursor" + "CVE-2019-19378": { + "cmt_msg": "" }, - "CVE-2022-1048": { - "cmt_msg": "ALSA: pcm: Fix races among concurrent hw_params and hw_free calls" + "CVE-2022-36879": { + "cmt_msg": "xfrm: xfrm_policy: fix a possible double xfrm_pols_put() in xfrm_bundle_lookup()" }, - "CVE-2018-20976": { - "cmt_msg": "xfs: clear sb->s_fs_info on mount failure" + "CVE-2019-19377": { + "cmt_msg": "btrfs: Don't submit any btree write bio if the fs has errors" }, - "CVE-2023-22995": { - "cmt_msg": "usb: dwc3: dwc3-qcom: Add missing platform_device_put() in dwc3_qcom_acpi_register_core" + "CVE-2023-1118": { + "cmt_msg": "media: rc: Fix use-after-free bugs caused by ene_tx_irqsim()" }, - "CVE-2024-21803": { - "cmt_msg": "" + "CVE-2021-0935": { + "cmt_msg": "net: ipv6: keep sk status consistent after datagram connect failure" }, - "CVE-2018-7995": { - "cmt_msg": "x86/MCE: Serialize sysfs changes" + "CVE-2021-0937": { + "cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write" }, - "CVE-2018-16276": { - "cmt_msg": "USB: yurex: fix out-of-bounds uaccess in read handler" + "CVE-2022-47929": { + "cmt_msg": "net: sched: disallow noqueue for qdisc classes" }, - "CVE-2019-15927": { - "cmt_msg": "ALSA: usb-audio: Avoid access before bLength check in build_audio_procunit()" + "CVE-2019-16746": { + "cmt_msg": "nl80211: validate beacon head" }, - "CVE-2021-3542": { + "CVE-2022-3606": { "cmt_msg": "" }, - "CVE-2019-16413": { - "cmt_msg": "9p: use inode->i_lock to protect i_size_write() under 32-bit" - }, - "CVE-2024-24860": { - "cmt_msg": "Bluetooth: Fix atomicity violation in {min,max}_key_size_set" - }, - "CVE-2022-1263": { - "cmt_msg": "KVM: avoid NULL pointer dereference in kvm_dirty_ring_push" + "CVE-2018-18021": { + "cmt_msg": "arm64: KVM: Tighten guest core register access from userspace" }, - "CVE-2017-16650": { - "cmt_msg": "net: qmi_wwan: fix divide by 0 on bad descriptors" + "CVE-2021-37576": { + "cmt_msg": "KVM: PPC: Book3S: Fix H_RTAS rets buffer overflow" }, - "CVE-2020-12653": { - "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_cmd_append_vsie_tlv()" + "CVE-2022-3594": { + "cmt_msg": "r8152: Rate limit overflow messages" }, - "CVE-2019-7222": { - "cmt_msg": "KVM: x86: work around leak of uninitialized stack contents (CVE-2019-7222)" + "CVE-2022-3595": { + "cmt_msg": "cifs: fix double-fault crash during ntlmssp" }, - "CVE-2017-14051": { - "cmt_msg": "scsi: qla2xxx: Fix an integer overflow in sysfs code" + "CVE-2018-5803": { + "cmt_msg": "sctp: verify size of a new chunk in _sctp_make_chunk()" }, - "CVE-2020-12654": { - "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_ret_wmm_get_status()" + "CVE-2020-27815": { + "cmt_msg": "jfs: Fix array index bounds check in dbAdjTree" }, - "CVE-2019-7221": { - "cmt_msg": "KVM: nVMX: unconditionally cancel preemption timer in free_nested (CVE-2019-7221)" + "CVE-2023-6606": { + "cmt_msg": "smb: client: fix OOB in smbCalcSize()" }, - "CVE-2018-12929": { - "cmt_msg": "" + "CVE-2020-27673": { + "cmt_msg": "xen/events: add a proper barrier to 2-level uevent unmasking" }, - "CVE-2018-12928": { - "cmt_msg": "" + "CVE-2020-27675": { + "cmt_msg": "xen/events: avoid removing an event channel while handling it" }, - "CVE-2020-36310": { - "cmt_msg": "KVM: SVM: avoid infinite loop on NPF from bad address" + "CVE-2020-28915": { + "cmt_msg": "fbcon: Fix global-out-of-bounds read in fbcon_get_font()" }, - "CVE-2020-36313": { - "cmt_msg": "KVM: Fix out of range accesses to memslots" + "CVE-2022-3111": { + "cmt_msg": "power: supply: wm8350-power: Add missing free in free_charger_irq" }, - "CVE-2020-35519": { - "cmt_msg": "net/x25: prevent a couple of overflows" + "CVE-2020-0435": { + "cmt_msg": "f2fs: fix to do sanity check with i_extra_isize" }, - "CVE-2023-31436": { - "cmt_msg": "net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg" + "CVE-2020-0432": { + "cmt_msg": "staging: most: net: fix buffer overflow" }, - "CVE-2020-29569": { - "cmt_msg": "xen-blkback: set ring->xenblkd to NULL after kthread_stop()" + "CVE-2020-0433": { + "cmt_msg": "blk-mq: sync the update nr_hw_queues with blk_mq_queue_tag_busy_iter" }, - "CVE-2023-51782": { - "cmt_msg": "net/rose: Fix Use-After-Free in rose_ioctl" + "CVE-2020-0431": { + "cmt_msg": "HID: hid-input: clear unmapped usages" }, - "CVE-2020-35513": { - "cmt_msg": "nfsd: fix incorrect umasks" + "CVE-2023-6915": { + "cmt_msg": "ida: Fix crash in ida_free when the bitmap is empty" }, - "CVE-2020-10708": { - "cmt_msg": "" + "CVE-2021-47006": { + "cmt_msg": "ARM: 9064/1: hw_breakpoint: Do not directly check the event's overflow_handler hook" }, - "CVE-2020-25673": { - "cmt_msg": "nfc: Avoid endless loops caused by repeated llcp_sock_connect()" + "CVE-2023-1249": { + "cmt_msg": "coredump: Use the vma snapshot in fill_files_note" }, - "CVE-2022-0400": { - "cmt_msg": "" + "CVE-2021-3483": { + "cmt_msg": "firewire: nosy: Fix a use-after-free bug in nosy_ioctl()" }, - "CVE-2023-6356": { - "cmt_msg": "" + "CVE-2023-6040": { + "cmt_msg": "netfilter: nf_tables: Reject tables of unsupported family" }, - "CVE-2024-25741": { - "cmt_msg": "" + "CVE-2017-16912": { + "cmt_msg": "usbip: fix stub_rx: get_pipe() to validate endpoint number" }, - "CVE-2021-38160": { - "cmt_msg": "virtio_console: Assure used length from device is limited" + "CVE-2017-16911": { + "cmt_msg": "usbip: prevent vhci_hcd driver from leaking a socket pointer address" }, - "CVE-2021-42739": { - "cmt_msg": "media: firewire: firedtv-avc: fix a buffer overflow in avc_ca_pmt()" + "CVE-2017-16914": { + "cmt_msg": "usbip: fix stub_send_ret_submit() vulnerability to null transfer_buffer" }, - "CVE-2022-3344": { - "cmt_msg": "KVM: x86: nSVM: harden svm_free_nested against freeing vmcb02 while still in use" + "CVE-2020-36691": { + "cmt_msg": "netlink: limit recursion depth in policy validation" }, - "CVE-2022-3111": { - "cmt_msg": "power: supply: wm8350-power: Add missing free in free_charger_irq" + "CVE-2023-42755": { + "cmt_msg": "net/sched: Retire rsvp classifier" }, - "CVE-2018-5344": { - "cmt_msg": "loop: fix concurrent lo_open/lo_release" + "CVE-2023-42752": { + "cmt_msg": "igmp: limit igmpv3_newpack() packet size to IP_MAX_MTU" }, - "CVE-2020-12770": { - "cmt_msg": "scsi: sg: add sg_remove_request in sg_write" + "CVE-2021-3573": { + "cmt_msg": "Bluetooth: use correct lock to prevent UAF of hdev object" }, - "CVE-2018-6412": { - "cmt_msg": "fbdev: Fixing arbitrary kernel leak in case FBIOGETCMAP_SPARC in sbusfb_ioctl_helper()." + "CVE-2022-1974": { + "cmt_msg": "nfc: replace improper check device_is_registered() in netlink related functions" }, - "CVE-2019-15222": { - "cmt_msg": "ALSA: usb-audio: Fix gpf in snd_usb_pipe_sanity_check" + "CVE-2022-1975": { + "cmt_msg": "NFC: netlink: fix sleep in atomic bug when firmware download timeout" }, - "CVE-2024-25744": { - "cmt_msg": "x86/coco: Disable 32-bit emulation by default on TDX and SEV" + "CVE-2023-1380": { + "cmt_msg": "wifi: brcmfmac: slab-out-of-bounds read in brcmf_get_assoc_ies()" }, - "CVE-2022-25265": { - "cmt_msg": "" + "CVE-2018-12130": { + "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" }, - "CVE-2022-20368": { - "cmt_msg": "net/packet: fix slab-out-of-bounds access in packet_recvmsg()" + "CVE-2022-32981": { + "cmt_msg": "powerpc/32: Fix overread/overwrite of thread_struct via ptrace" }, - "CVE-2017-12153": { - "cmt_msg": "nl80211: check for the required netlink attributes presence" + "CVE-2018-13405": { + "cmt_msg": "Fix up non-directory creation in SGID directories" }, - "CVE-2019-19813": { - "cmt_msg": "btrfs: inode: Verify inode mode to avoid NULL pointer dereference" + "CVE-2018-13406": { + "cmt_msg": "video: uvesafb: Fix integer overflow in allocation" }, - "CVE-2017-12154": { - "cmt_msg": "kvm: nVMX: Don't allow L2 to access the hardware CR8" + "CVE-2020-11668": { + "cmt_msg": "media: xirlink_cit: add missing descriptor sanity checks" }, - "CVE-2020-10773": { - "cmt_msg": "s390/cmm: fix information leak in cmm_timeout_handler()" + "CVE-2020-11669": { + "cmt_msg": "powerpc/powernv/idle: Restore AMR/UAMOR/AMOR after idle" }, - "CVE-2022-21499": { - "cmt_msg": "lockdown: also lock down previous kgdb use" + "CVE-2019-14901": { + "cmt_msg": "mwifiex: Fix heap overflow in mmwifiex_process_tdls_action_frame()" }, - "CVE-2020-25284": { - "cmt_msg": "rbd: require global CAP_SYS_ADMIN for mapping and unmapping" + "CVE-2020-8694": { + "cmt_msg": "powercap: restrict energy meter to root access" }, - "CVE-2023-4208": { - "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free" + "CVE-2021-3715": { + "cmt_msg": "net_sched: cls_route: remove the right filter from hashtable" }, - "CVE-2022-3606": { + "CVE-2021-3714": { "cmt_msg": "" }, - "CVE-2023-4206": { - "cmt_msg": "net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free" + "CVE-2019-16230": { + "cmt_msg": "drm/amdkfd: fix a potential NULL pointer dereference (v2)" }, - "CVE-2023-4207": { - "cmt_msg": "net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free" + "CVE-2019-16231": { + "cmt_msg": "fjes: Handle workqueue allocation failure" }, - "CVE-2023-3640": { - "cmt_msg": "" + "CVE-2019-16232": { + "cmt_msg": "libertas: fix a potential NULL pointer dereference" }, - "CVE-2018-18281": { - "cmt_msg": "mremap: properly flush TLB before releasing the page" + "CVE-2019-16233": { + "cmt_msg": "scsi: qla2xxx: fix a potential NULL pointer dereference" }, - "CVE-2023-20593": { - "cmt_msg": "x86/cpu/amd: Add a Zenbleed fix" + "CVE-2019-16234": { + "cmt_msg": "iwlwifi: pcie: fix rb_allocator workqueue allocation" }, - "CVE-2019-18675": { - "cmt_msg": "mmap: introduce sane default mmap limits" + "CVE-2019-6133": { + "cmt_msg": "fork: record start_time late" }, - "CVE-2023-3022": { - "cmt_msg": "ipv6: Use result arg in fib_lookup_arg consistently" + "CVE-2021-39633": { + "cmt_msg": "ip_gre: add validation for csum_start" }, - "CVE-2022-2663": { - "cmt_msg": "netfilter: nf_conntrack_irc: Fix forged IP logic" + "CVE-2017-18203": { + "cmt_msg": "dm: fix race between dm_get_from_kobject() and __dm_destroy()" }, - "CVE-2019-8912": { - "cmt_msg": "net: crypto set sk to NULL when af_alg_release." + "CVE-2017-18202": { + "cmt_msg": "mm, oom_reaper: gather each vma to prevent leaking TLB entry" }, - "CVE-2023-51780": { - "cmt_msg": "atm: Fix Use-After-Free in do_vcc_ioctl" + "CVE-2021-39636": { + "cmt_msg": "netfilter: x_tables: fix pointer leaks to userspace" }, - "CVE-2023-0047": { - "cmt_msg": "mm, oom: do not trigger out_of_memory from the #PF" + "CVE-2021-39634": { + "cmt_msg": "epoll: do not insert into poll queues until all sanity checks are done" }, - "CVE-2020-29370": { - "cmt_msg": "mm: slub: add missing TID bump in kmem_cache_alloc_bulk()" + "CVE-2022-33742": { + "cmt_msg": "xen/blkfront: force data bouncing when backend is untrusted" }, - "CVE-2019-15219": { - "cmt_msg": "USB: sisusbvga: fix oops in error path of sisusb_probe" + "CVE-2022-33741": { + "cmt_msg": "xen/netfront: force data bouncing when backend is untrusted" }, - "CVE-2022-20424": { - "cmt_msg": "io_uring: remove io_identity" + "CVE-2022-33740": { + "cmt_msg": "xen/netfront: fix leaking data in shared pages" }, - "CVE-2022-20422": { - "cmt_msg": "arm64: fix oops in concurrently setting insn_emulation sysctls" + "CVE-2022-33744": { + "cmt_msg": "xen/arm: Fix race in RB-tree based P2M accounting" }, - "CVE-2023-4385": { - "cmt_msg": "fs: jfs: fix possible NULL pointer dereference in dbFree()" + "CVE-2023-52596": { + "cmt_msg": "sysctl: Fix out of bounds access for empty sysctl registers" }, - "CVE-2020-25643": { - "cmt_msg": "hdlc_ppp: add range checks in ppp_cp_parse_cr()" + "CVE-2023-52597": { + "cmt_msg": "KVM: s390: fix setting of fpc register" }, - "CVE-2023-4387": { - "cmt_msg": "net: vmxnet3: fix possible use-after-free bugs in vmxnet3_rq_alloc_rx_buf()" + "CVE-2023-52594": { + "cmt_msg": "wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus()" }, - "CVE-2021-39657": { - "cmt_msg": "scsi: ufs: Correct the LUN used in eh_device_reset_handler() callback" + "CVE-2023-52595": { + "cmt_msg": "wifi: rt2x00: restart beacon queue when hardware reset" }, - "CVE-2024-24858": { - "cmt_msg": "" + "CVE-2023-52593": { + "cmt_msg": "wifi: wfx: fix possible NULL pointer dereference in wfx_set_mfp_ap()" }, - "CVE-2019-19378": { - "cmt_msg": "" + "CVE-2023-52590": { + "cmt_msg": "ocfs2: Avoid touching renamed directory if parent does not change" }, - "CVE-2020-4788": { - "cmt_msg": "powerpc/64s: flush L1D on kernel entry" + "CVE-2023-52591": { + "cmt_msg": "reiserfs: Avoid touching renamed directory if parent does not change" }, - "CVE-2022-36879": { - "cmt_msg": "xfrm: xfrm_policy: fix a possible double xfrm_pols_put() in xfrm_bundle_lookup()" + "CVE-2019-9454": { + "cmt_msg": "i2c: core-smbus: prevent stack corruption on read I2C_BLOCK_DATA" }, - "CVE-2022-1011": { - "cmt_msg": "fuse: fix pipe buffer lifetime for direct_io" + "CVE-2023-52598": { + "cmt_msg": "s390/ptrace: handle setting of fpc register correctly" }, - "CVE-2021-39698": { - "cmt_msg": "wait: add wake_up_pollfree()" + "CVE-2023-52599": { + "cmt_msg": "jfs: fix array-index-out-of-bounds in diNewExt" }, - "CVE-2022-45934": { - "cmt_msg": "Bluetooth: L2CAP: Fix u8 overflow" + "CVE-2021-0447": { + "cmt_msg": "l2tp: protect sock pointer of struct pppol2tp_session with RCU" }, - "CVE-2018-5333": { - "cmt_msg": "RDS: null pointer dereference in rds_atomic_free_op" + "CVE-2022-23222": { + "cmt_msg": "bpf: Replace PTR_TO_XXX_OR_NULL with PTR_TO_XXX | PTR_MAYBE_NULL" }, - "CVE-2018-5332": { - "cmt_msg": "RDS: Heap OOB write in rds_message_alloc_sgs()" + "CVE-2021-0448": { + "cmt_msg": "netfilter: ctnetlink: add a range check for l3/l4 protonum" }, - "CVE-2022-2380": { - "cmt_msg": "video: fbdev: sm712fb: Fix crash in smtcfb_read()" + "CVE-2022-41849": { + "cmt_msg": "fbdev: smscufx: Fix use-after-free in ufx_ops_open()" }, - "CVE-2022-0850": { - "cmt_msg": "ext4: fix kernel infoleak via ext4_extent_header" + "CVE-2022-41848": { + "cmt_msg": "" }, - "CVE-2020-10767": { - "cmt_msg": "x86/speculation: Avoid force-disabling IBPB based on STIBP and enhanced IBRS." + "CVE-2023-6356": { + "cmt_msg": "nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length" }, - "CVE-2019-19529": { - "cmt_msg": "can: mcba_usb: fix use-after-free on disconnect" + "CVE-2022-1353": { + "cmt_msg": "af_key: add __GFP_ZERO flag for compose_sadb_supported in function pfkey_register" }, - "CVE-2019-19447": { - "cmt_msg": "ext4: work around deleting a file with i_nlink == 0 safely" + "CVE-2022-1198": { + "cmt_msg": "drivers: hamradio: 6pack: fix UAF bug caused by mod_timer()" }, - "CVE-2017-17448": { - "cmt_msg": "netfilter: nfnetlink_cthelper: Add missing permission checks" + "CVE-2022-1199": { + "cmt_msg": "ax25: Fix NULL pointer dereference in ax25_kill_by_device" }, - "CVE-2017-17449": { - "cmt_msg": "netlink: Add netns check on taps" + "CVE-2022-1195": { + "cmt_msg": "hamradio: improve the incomplete fix to avoid NPD" }, - "CVE-2019-19525": { - "cmt_msg": "ieee802154: atusb: fix use-after-free at disconnect" + "CVE-2023-2124": { + "cmt_msg": "xfs: verify buffer contents when we skip log replay" }, - "CVE-2019-19524": { - "cmt_msg": "Input: ff-memless - kill timer in destroy()" + "CVE-2019-15505": { + "cmt_msg": "media: technisat-usb2: break out of loop at end of buffer" }, - "CVE-2019-19448": { - "cmt_msg": "btrfs: only search for left_info if there is no right_info in try_merge_free_space" + "CVE-2018-21008": { + "cmt_msg": "rsi: add fix for crash during assertions" }, - "CVE-2019-19449": { - "cmt_msg": "f2fs: fix to do sanity check on segment/section count" + "CVE-2022-27672": { + "cmt_msg": "x86/speculation: Identify processors vulnerable to SMT RSB predictions" }, - "CVE-2023-31085": { - "cmt_msg": "ubi: Refuse attaching if mtd's erasesize is 0" + "CVE-2022-1280": { + "cmt_msg": "drm: avoid circular locks in drm_mode_getconnector" }, - "CVE-2019-19523": { - "cmt_msg": "USB: adutux: fix use-after-free on disconnect" + "CVE-2019-14283": { + "cmt_msg": "floppy: fix out-of-bounds read in copy_buffer" }, - "CVE-2021-3752": { - "cmt_msg": "Bluetooth: fix use-after-free error in lock_sock_nested()" + "CVE-2018-10881": { + "cmt_msg": "ext4: clear i_data in ext4_inode_info when removing inline data" }, - "CVE-2021-0935": { - "cmt_msg": "net: ipv6: keep sk status consistent after datagram connect failure" + "CVE-2024-26713": { + "cmt_msg": "powerpc/pseries/iommu: Fix iommu initialisation during DLPAR add" + } + } + }, + "4.12": { + "4.12.1": { + "CVE-2017-12146": { + "cmt_msg": "driver core: platform: fix race condition with driver_override", + "cmt_id": "d0ccfd55b9c75b90ebcb9c56029b07eddefb1155" + } + }, + "4.12.2": { + "CVE-2017-11176": { + "cmt_msg": "mqueue: fix a use-after-free in sys_mq_notify()", + "cmt_id": "34bfc894734d56cca6c5924b5889e6308eeb66e1" + } + }, + "4.12.3": { + "CVE-2019-9457": { + "cmt_msg": "exec: Limit arg stack to at most 75% of _STK_LIM", + "cmt_id": "c1152f1638c53af9ec782d77f3f2e6f6c8fb9b0a" }, - "CVE-2020-11725": { - "cmt_msg": "" + "CVE-2018-14634": { + "cmt_msg": "exec: Limit arg stack to at most 75% of _STK_LIM", + "cmt_id": "c1152f1638c53af9ec782d77f3f2e6f6c8fb9b0a" }, - "CVE-2019-3892": { - "cmt_msg": "coredump: fix race condition between mmget_not_zero()/get_task_mm() and core dumping" + "CVE-2017-11089": { + "cmt_msg": "cfg80211: Define nla_policy for NL80211_ATTR_LOCAL_MESH_POWER_MODE", + "cmt_id": "b9582dbe58ebcbd9b415d3d10ef5d990ddba720c" }, - "CVE-2021-29264": { - "cmt_msg": "gianfar: fix jumbo packets+napi+rx overrun crash" + "CVE-2017-7541": { + "cmt_msg": "brcmfmac: fix possible buffer overflow in brcmf_cfg80211_mgmt_tx()", + "cmt_id": "f888b9ad79954af0c11d3a646129f1d70b951eec" }, - "CVE-2021-35477": { - "cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4" + "CVE-2017-1000371": { + "cmt_msg": "binfmt_elf: use ELF_ET_DYN_BASE only for PIE", + "cmt_id": "0c9fd20c4ca8fb97f40ea66a2db39f1f9c85797d" }, - "CVE-2017-18241": { - "cmt_msg": "f2fs: fix a panic caused by NULL flush_cmd_control" + "CVE-2017-1000370": { + "cmt_msg": "binfmt_elf: use ELF_ET_DYN_BASE only for PIE", + "cmt_id": "0c9fd20c4ca8fb97f40ea66a2db39f1f9c85797d" + } + }, + "4.12.4": { + "CVE-2017-10663": { + "cmt_msg": "f2fs: sanity check checkpoint segno and blkoff", + "cmt_id": "55df2e68c21714444fc3056c5636531ee9d1bc58" }, - "CVE-2020-10690": { - "cmt_msg": "ptp: fix the race between the release of ptp_clock and cdev" + "CVE-2017-11473": { + "cmt_msg": "x86/acpi: Prevent out of bound access caused by broken ACPI tables", + "cmt_id": "464c38d4b9365fb013c568a391a7c89b7148d72a" }, - "CVE-2023-31082": { - "cmt_msg": "" + "CVE-2017-18079": { + "cmt_msg": "Input: i8042 - fix crash at boot time", + "cmt_id": "6c0d8c2a408402f2d83a41b141efc2e5e8e604c4" + } + }, + "4.12.5": { + "CVE-2017-7533": { + "cmt_msg": "dentry name snapshots", + "cmt_id": "75791420f2942f47f4fb5626110723668feea9a7" }, - "CVE-2022-47929": { - "cmt_msg": "net: sched: disallow noqueue for qdisc classes" + "CVE-2017-12762": { + "cmt_msg": "isdn/i4l: fix buffer overflow", + "cmt_id": "cd043db87e4c49fa909a81c0daa2a3786dacf349" + } + }, + "4.12.6": { + "CVE-2017-8831": { + "cmt_msg": "saa7164: fix double fetch PCIe access condition", + "cmt_id": "52bc1dfd016e7a1859138d986670408fc3d830a0" }, - "CVE-2019-16746": { - "cmt_msg": "nl80211: validate beacon head" + "CVE-2017-7542": { + "cmt_msg": "ipv6: avoid overflow of offset in ip6_find_1stfragopt", + "cmt_id": "663f828a08af6f54c4f11c1eb16e68ad7a93c34c" + } + }, + "4.12.7": { + "CVE-2017-1000": { + "cmt_msg": "udp: consistently apply ufo or fragmentation", + "cmt_id": "2a8c396a689114da0fb9164cd07b13fd5b800782" }, - "CVE-2021-41864": { - "cmt_msg": "bpf: Fix integer overflow in prealloc_elems_and_freelist()" + "CVE-2017-1000112": { + "cmt_msg": "udp: consistently apply ufo or fragmentation", + "cmt_id": "2a8c396a689114da0fb9164cd07b13fd5b800782" }, - "CVE-2023-31081": { - "cmt_msg": "" + "CVE-2017-1000111": { + "cmt_msg": "packet: fix tp_reserve race in packet_set_ring", + "cmt_id": "91b2b39b49c25a0a76e3ef5302e848e6c9e60cfd" + } + }, + "4.12.9": { + "CVE-2017-12134": { + "cmt_msg": "xen: fix bio vec merging", + "cmt_id": "c1cee6062ac9c375cda25bd2d334d54af4bd4c26" }, - "CVE-2022-2209": { - "cmt_msg": "" + "CVE-2017-14140": { + "cmt_msg": "Sanitize 'move_pages()' permission checks", + "cmt_id": "e950adf8983f18cf210145af0cda1fe7e6aa8c11" }, - "CVE-2018-18021": { - "cmt_msg": "arm64: KVM: Tighten guest core register access from userspace" + "CVE-2018-10675": { + "cmt_msg": "mm/mempolicy: fix use after free when calling get_mempolicy", + "cmt_id": "6b2676ed32bad395689998bea6ce2d64aeda02a6" + } + }, + "4.12.10": { + "CVE-2017-17053": { + "cmt_msg": "x86/mm: Fix use-after-free of ldt_struct", + "cmt_id": "a8da876c1e45b75c082a5dc8ce10c0761a10c638" }, - "CVE-2022-45887": { - "cmt_msg": "media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb()" + "CVE-2017-17052": { + "cmt_msg": "fork: fix incorrect fput of ->exe_file causing use-after-free", + "cmt_id": "f5024bb32d4d50b77f4fbc1e7251cf0f21def88e" + } + }, + "4.12.11": { + "CVE-2017-11600": { + "cmt_msg": "xfrm: policy: check policy direction value", + "cmt_id": "6c5b60edd786fe18b7be96b26ca980aa2bef0428" + } + }, + "4.12.13": { + "CVE-2017-14340": { + "cmt_msg": "xfs: XFS_IS_REALTIME_INODE() should be false if no rt device present", + "cmt_id": "9f7df0bca168528aba20794f400be134495551b8" }, - "CVE-2021-37576": { - "cmt_msg": "KVM: PPC: Book3S: Fix H_RTAS rets buffer overflow" + "CVE-2017-1000251": { + "cmt_msg": "Bluetooth: Properly check L2CAP config option output buffer length", + "cmt_id": "8329b5e8c6cfe8af86344eb849c06ed69c0d868d" }, - "CVE-2019-8980": { - "cmt_msg": "exec: Fix mem leak in kernel_read_file" + "CVE-2017-9985": { + "cmt_msg": "ALSA: msnd: Optimize / harden DSP and MIDI loops", + "cmt_id": "9d6412aa06ce75e44fbaf1bfa15454150fd6a803" }, - "CVE-2023-45871": { - "cmt_msg": "igb: set max size RX buffer when store bad packet is enabled" + "CVE-2017-9984": { + "cmt_msg": "ALSA: msnd: Optimize / harden DSP and MIDI loops", + "cmt_id": "9d6412aa06ce75e44fbaf1bfa15454150fd6a803" + } + }, + "4.12.14": { + "CVE-2017-14497": { + "cmt_msg": "packet: Don't write vnet header beyond end of buffer", + "cmt_id": "e7ebdeb47c8b14614c65a0a2ad07cf4c04e51469" }, - "CVE-2023-1855": { - "cmt_msg": "hwmon: (xgene) Fix use after free bug in xgene_hwmon_remove due to race condition" + "CVE-2017-7558": { + "cmt_msg": "sctp: Avoid out-of-bounds reads from address storage", + "cmt_id": "6da138247b47105eca005464383cae11ac57bdab" + } + }, + "outstanding": { + "CVE-2019-15090": { + "cmt_msg": "scsi: qedi: remove memset/memcpy to nfunc and use func instead" }, - "CVE-2023-7042": { - "cmt_msg": "" + "CVE-2021-42252": { + "cmt_msg": "soc: aspeed: lpc-ctrl: Fix boundary check for mmap" }, - "CVE-2022-3594": { - "cmt_msg": "r8152: Rate limit overflow messages" + "CVE-2019-15098": { + "cmt_msg": "ath6kl: fix a NULL-ptr-deref bug in ath6kl_usb_alloc_urb_from_pipe()" }, - "CVE-2018-14609": { - "cmt_msg": "btrfs: relocation: Only remove reloc rb_trees if reloc control has been initialized" + "CVE-2022-3646": { + "cmt_msg": "nilfs2: fix leak of nilfs_root in case of writer thread creation failure" }, - "CVE-2023-35824": { - "cmt_msg": "media: dm1105: Fix use after free bug in dm1105_remove due to race condition" + "CVE-2022-0001": { + "cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE" }, - "CVE-2021-33098": { - "cmt_msg": "ixgbe: fix large MTU request from VF" + "CVE-2023-2248": { + "cmt_msg": "net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg" }, - "CVE-2022-3595": { - "cmt_msg": "cifs: fix double-fault crash during ntlmssp" + "CVE-2022-0002": { + "cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE" }, - "CVE-2021-28971": { - "cmt_msg": "perf/x86/intel: Fix a crash caused by zero PEBS status" + "CVE-2019-19965": { + "cmt_msg": "scsi: libsas: stop discovering if oob mode is disconnected" }, - "CVE-2023-47233": { - "cmt_msg": "" + "CVE-2019-19966": { + "cmt_msg": "media: cpia2: Fix use-after-free in cpia2_exit" }, - "CVE-2020-10769": { - "cmt_msg": "crypto: authenc - fix parsing key with misaligned rta_len" + "CVE-2023-52615": { + "cmt_msg": "hwrng: core - Fix page fault dead lock on mmap-ed hwrng" }, - "CVE-2023-6606": { - "cmt_msg": "smb: client: fix OOB in smbCalcSize()" + "CVE-2023-52614": { + "cmt_msg": "PM / devfreq: Fix buffer overflow in trans_stat_show" }, - "CVE-2018-5803": { - "cmt_msg": "sctp: verify size of a new chunk in _sctp_make_chunk()" + "CVE-2023-52617": { + "cmt_msg": "PCI: switchtec: Fix stdev_release() crash after surprise hot remove" }, - "CVE-2020-27815": { - "cmt_msg": "jfs: Fix array index bounds check in dbAdjTree" + "CVE-2020-24587": { + "cmt_msg": "mac80211: prevent mixed key and fragment cache attacks" }, - "CVE-2022-23041": { - "cmt_msg": "xen/9p: use alloc/free_pages_exact()" + "CVE-2020-24586": { + "cmt_msg": "mac80211: prevent mixed key and fragment cache attacks" }, - "CVE-2021-45486": { - "cmt_msg": "inet: use bigger hash table for IP ID generation" + "CVE-2023-52612": { + "cmt_msg": "crypto: scomp - fix req->dst buffer overflow" }, - "CVE-2022-1462": { - "cmt_msg": "tty: use new tty_insert_flip_string_and_push_buffer() in pty_write()" + "CVE-2021-0129": { + "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical" }, - "CVE-2022-3115": { - "cmt_msg": "drm: mali-dp: potential dereference of null pointer" + "CVE-2020-24588": { + "cmt_msg": "cfg80211: mitigate A-MSDU aggregation attacks" }, - "CVE-2022-27223": { - "cmt_msg": "USB: gadget: validate endpoint index for xilinx udc" + "CVE-2023-52619": { + "cmt_msg": "pstore/ram: Fix crash when setting number of cpus to an odd number" }, - "CVE-2020-27067": { - "cmt_msg": "l2tp: fix l2tp_eth module loading" + "CVE-2023-52618": { + "cmt_msg": "block/rnbd-srv: Check for unlikely string overflow" }, - "CVE-2020-27777": { - "cmt_msg": "powerpc/rtas: Restrict RTAS requests from userspace" + "CVE-2023-5717": { + "cmt_msg": "perf: Disallow mis-matched inherited group reads" }, - "CVE-2019-20636": { - "cmt_msg": "Input: add safety guards to input_set_keycode()" + "CVE-2018-10940": { + "cmt_msg": "cdrom: information leak in cdrom_ioctl_media_changed()" }, - "CVE-2019-11486": { - "cmt_msg": "tty: mark Siemens R3964 line discipline as BROKEN" + "CVE-2019-9506": { + "cmt_msg": "Bluetooth: Fix faulty expression for minimum encryption key size check" }, - "CVE-2019-11487": { - "cmt_msg": "fs: prevent page refcount overflow in pipe_buf_get" + "CVE-2019-9500": { + "cmt_msg": "brcmfmac: assure SSID length from firmware is limited" }, - "CVE-2018-8043": { - "cmt_msg": "net: phy: mdio-bcm-unimac: fix potential NULL dereference in unimac_mdio_probe()" + "CVE-2019-9503": { + "cmt_msg": "brcmfmac: add subtype check for event handling in data path" }, - "CVE-2020-27675": { - "cmt_msg": "xen/events: avoid removing an event channel while handling it" + "CVE-2022-0480": { + "cmt_msg": "memcg: enable accounting for file lock caches" }, - "CVE-2020-28915": { - "cmt_msg": "fbcon: Fix global-out-of-bounds read in fbcon_get_font()" + "CVE-2018-10124": { + "cmt_msg": "kernel/signal.c: avoid undefined behaviour in kill_something_info" }, - "CVE-2023-7192": { - "cmt_msg": "netfilter: ctnetlink: fix possible refcount leak in ctnetlink_create_conntrack()" + "CVE-2022-0487": { + "cmt_msg": "moxart: fix potential use-after-free on remove path" }, - "CVE-2019-20908": { - "cmt_msg": "efi: Restrict efivar_ssdt_load when the kernel is locked down" + "CVE-2022-23825": { + "cmt_msg": "" }, - "CVE-2023-3776": { - "cmt_msg": "net/sched: cls_fw: Fix improper refcount update leads to use-after-free" + "CVE-2021-47112": { + "cmt_msg": "x86/kvm: Teardown PV features on boot CPU as well" }, - "CVE-2021-28038": { - "cmt_msg": "Xen/gnttab: handle p2m update errors on a per-slot basis" + "CVE-2021-47113": { + "cmt_msg": "btrfs: abort in rename_exchange if we fail to insert the second ref" }, - "CVE-2022-23040": { - "cmt_msg": "xen/xenbus: don't let xenbus_grant_ring() remove grants in error case" + "CVE-2021-47110": { + "cmt_msg": "x86/kvm: Disable kvmclock on all CPUs on shutdown" }, - "CVE-2021-26932": { - "cmt_msg": "Xen/x86: don't bail early from clear_foreign_p2m_mapping()" + "CVE-2021-47116": { + "cmt_msg": "ext4: fix memory leak in ext4_mb_init_backend on error path." }, - "CVE-2023-52435": { - "cmt_msg": "net: prevent mss overflow in skb_segment()" + "CVE-2021-47117": { + "cmt_msg": "ext4: fix bug on in ext4_es_cache_extent as ext4_split_extent_at failed" }, - "CVE-2023-52434": { - "cmt_msg": "smb: client: fix potential OOBs in smb2_parse_contexts()" + "CVE-2021-47114": { + "cmt_msg": "ocfs2: fix data corruption by fallocate" }, - "CVE-2023-3161": { - "cmt_msg": "fbcon: Check font dimension limits" + "CVE-2021-47118": { + "cmt_msg": "pid: take a reference when initializing `cad_pid`" }, - "CVE-2023-52436": { - "cmt_msg": "f2fs: explicitly null-terminate the xattr list" + "CVE-2021-46970": { + "cmt_msg": "bus: mhi: pci_generic: Remove WQ_MEM_RECLAIM flag from state workqueue" }, - "CVE-2019-19060": { - "cmt_msg": "iio: imu: adis16400: release allocated memory on failure" + "CVE-2019-10207": { + "cmt_msg": "Bluetooth: hci_uart: check for missing tty operations" }, - "CVE-2019-19061": { - "cmt_msg": "iio: imu: adis16400: fix memory leak" + "CVE-2023-0459": { + "cmt_msg": "uaccess: Add speculation barrier to copy_from_user()" }, - "CVE-2019-19062": { - "cmt_msg": "crypto: user - fix memory leak in crypto_report" + "CVE-2023-0458": { + "cmt_msg": "prlimit: do_prlimit needs to have a speculation check" }, - "CVE-2019-19063": { - "cmt_msg": "rtlwifi: prevent memory leak in rtl_usb_probe" + "CVE-2021-30002": { + "cmt_msg": "media: v4l: ioctl: Fix memory leak in video_usercopy" }, - "CVE-2017-17741": { - "cmt_msg": "KVM: Fix stack-out-of-bounds read in write_mmio" + "CVE-2021-0941": { + "cmt_msg": "bpf: Remove MTU check in __bpf_skb_max_len" }, - "CVE-2019-19065": { - "cmt_msg": "RDMA/hfi1: Prevent memory leak in sdma_init" + "CVE-2021-39711": { + "cmt_msg": "bpf: fix panic due to oob in bpf_prog_test_run_skb" }, - "CVE-2019-19066": { - "cmt_msg": "scsi: bfa: release allocated memory in case of error" + "CVE-2020-15802": { + "cmt_msg": "" }, - "CVE-2019-19067": { - "cmt_msg": "drm/amdgpu: fix multiple memory leaks in acp_hw_init" + "CVE-2022-3636": { + "cmt_msg": "net: ethernet: mtk_eth_soc: use after free in __mtk_ppe_check_skb()" }, - "CVE-2019-19068": { - "cmt_msg": "rtl8xxxu: prevent leaking urb" + "CVE-2022-3635": { + "cmt_msg": "atm: idt77252: fix use-after-free bugs caused by tst_timer" }, - "CVE-2020-0435": { - "cmt_msg": "f2fs: fix to do sanity check with i_extra_isize" + "CVE-2021-28715": { + "cmt_msg": "xen/netback: don't queue unlimited number of packages" }, - "CVE-2020-0432": { - "cmt_msg": "staging: most: net: fix buffer overflow" + "CVE-2022-34918": { + "cmt_msg": "netfilter: nf_tables: stricter validation of element data" }, - "CVE-2020-0433": { - "cmt_msg": "blk-mq: sync the update nr_hw_queues with blk_mq_queue_tag_busy_iter" + "CVE-2021-47028": { + "cmt_msg": "mt76: mt7915: fix txrate reporting" }, - "CVE-2023-51779": { - "cmt_msg": "Bluetooth: af_bluetooth: Fix Use-After-Free in bt_sock_recvmsg" + "CVE-2019-11085": { + "cmt_msg": "drm/i915/gvt: Fix mmap range check" }, - "CVE-2019-3874": { - "cmt_msg": "sctp: implement memory accounting on tx path" + "CVE-2017-18261": { + "cmt_msg": "clocksource/drivers/arm_arch_timer: Avoid infinite recursion when ftrace is enabled" }, - "CVE-2018-10877": { - "cmt_msg": "ext4: verify the depth of extent tree in ext4_find_extent()" + "CVE-2018-19854": { + "cmt_msg": "crypto: user - fix leaking uninitialized memory to userspace" }, - "CVE-2018-10876": { - "cmt_msg": "ext4: only look at the bg_flags field if it is valid" + "CVE-2023-1079": { + "cmt_msg": "HID: asus: use spinlock to safely schedule workers" }, - "CVE-2010-4563": { - "cmt_msg": "" + "CVE-2021-43389": { + "cmt_msg": "isdn: cpai: check ctr->cnr to avoid array index out of bound" }, - "CVE-2023-1249": { - "cmt_msg": "coredump: Use the vma snapshot in fill_files_note" + "CVE-2023-1074": { + "cmt_msg": "sctp: fail if no bound addresses can be used for a given scope" }, - "CVE-2020-14331": { - "cmt_msg": "vgacon: Fix for missing check in scrollback handling" + "CVE-2023-1076": { + "cmt_msg": "tun: tun_chr_open(): correctly initialize socket uid" }, - "CVE-2018-10879": { - "cmt_msg": "ext4: make sure bitmaps and the inode table don't overlap with bg descriptors" + "CVE-2023-1077": { + "cmt_msg": "sched/rt: pick_next_rt_entity(): check list_entry" }, - "CVE-2019-14835": { - "cmt_msg": "vhost: make sure log_num < in_num" + "CVE-2023-40283": { + "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb" }, - "CVE-2023-2248": { - "cmt_msg": "net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg" + "CVE-2023-1073": { + "cmt_msg": "HID: check empty report_list in hid_validate_values()" }, - "CVE-2023-0266": { - "cmt_msg": "ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF" + "CVE-2018-13093": { + "cmt_msg": "xfs: validate cached inodes are free when allocated" }, - "CVE-2023-1838": { - "cmt_msg": "Fix double fget() in vhost_net_set_backend()" + "CVE-2018-13096": { + "cmt_msg": "f2fs: fix to do sanity check with node footer and iblocks" }, - "CVE-2021-3483": { - "cmt_msg": "firewire: nosy: Fix a use-after-free bug in nosy_ioctl()" + "CVE-2018-13097": { + "cmt_msg": "f2fs: fix to do sanity check with user_block_count" }, - "CVE-2017-16913": { - "cmt_msg": "usbip: fix stub_rx: harden CMD_SUBMIT path to handle malicious input" + "CVE-2018-13094": { + "cmt_msg": "xfs: don't call xfs_da_shrink_inode with NULL bp" }, - "CVE-2017-16912": { - "cmt_msg": "usbip: fix stub_rx: get_pipe() to validate endpoint number" + "CVE-2018-13095": { + "cmt_msg": "xfs: More robust inode extent count validation" }, - "CVE-2017-16911": { - "cmt_msg": "usbip: prevent vhci_hcd driver from leaking a socket pointer address" + "CVE-2018-13098": { + "cmt_msg": "f2fs: fix to do sanity check with extra_attr feature" }, - "CVE-2020-28974": { - "cmt_msg": "vt: Disable KD_FONT_OP_COPY" + "CVE-2018-13099": { + "cmt_msg": "f2fs: fix to do sanity check with reserved blkaddr of inline inode" }, - "CVE-2020-25656": { - "cmt_msg": "vt: keyboard, extend func_buf_lock to readers" + "CVE-2019-19770": { + "cmt_msg": "blktrace: fix debugfs use after free" }, - "CVE-2017-16914": { - "cmt_msg": "usbip: fix stub_send_ret_submit() vulnerability to null transfer_buffer" + "CVE-2019-11884": { + "cmt_msg": "Bluetooth: hidp: fix buffer overflow" }, - "CVE-2023-1390": { - "cmt_msg": "tipc: fix NULL deref in tipc_link_xmit()" + "CVE-2019-11810": { + "cmt_msg": "scsi: megaraid_sas: return error when create DMA pool failed" }, - "CVE-2022-24448": { - "cmt_msg": "NFSv4: Handle case where the lookup of a directory fails" + "CVE-2021-39657": { + "cmt_msg": "scsi: ufs: Correct the LUN used in eh_device_reset_handler() callback" }, - "CVE-2024-26598": { - "cmt_msg": "KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache" + "CVE-2019-18683": { + "cmt_msg": "media: vivid: Fix wrong locking that causes race conditions on streaming stop" }, - "CVE-2020-10942": { - "cmt_msg": "vhost: Check docket sk_family instead of call getname" + "CVE-2019-18680": { + "cmt_msg": "" }, - "CVE-2019-10142": { - "cmt_msg": "drivers/virt/fsl_hypervisor.c: prevent integer overflow in ioctl" + "CVE-2021-45868": { + "cmt_msg": "quota: check block number when reading the block in quota file" }, - "CVE-2021-4023": { - "cmt_msg": "io-wq: fix cancellation on create-worker failure" + "CVE-2022-20158": { + "cmt_msg": "net/packet: fix slab-out-of-bounds access in packet_recvmsg()" }, - "CVE-2018-3693": { - "cmt_msg": "ext4: fix spectre gadget in ext4_mb_regular_allocator()" + "CVE-2020-0404": { + "cmt_msg": "media: uvcvideo: Avoid cyclic entity chains due to malformed USB descriptors" }, - "CVE-2017-12193": { - "cmt_msg": "assoc_array: Fix a buggy node-splitting case" + "CVE-2022-39188": { + "cmt_msg": "mmu_gather: Force tlb-flush VM_PFNMAP vmas" }, - "CVE-2017-12192": { - "cmt_msg": "KEYS: prevent KEYCTL_READ on negative key" + "CVE-2020-27067": { + "cmt_msg": "l2tp: fix l2tp_eth module loading" }, - "CVE-2021-22555": { - "cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write" + "CVE-2020-27066": { + "cmt_msg": "xfrm: policy: Fix doulbe free in xfrm_policy_timer" }, - "CVE-2017-12190": { - "cmt_msg": "fix unbalanced page refcounting in bio_map_user_iov" + "CVE-2020-27068": { + "cmt_msg": "cfg80211: add missing policy for NL80211_ATTR_STATUS_CODE" }, - "CVE-2022-3542": { - "cmt_msg": "bnx2x: fix potential memory leak in bnx2x_tpa_stop()" + "CVE-2024-23307": { + "cmt_msg": "md/raid5: fix atomicity violation in raid5_cache_count" }, - "CVE-2021-0399": { - "cmt_msg": "" + "CVE-2017-0861": { + "cmt_msg": "ALSA: pcm: prevent UAF in snd_pcm_info" }, - "CVE-2020-36691": { - "cmt_msg": "netlink: limit recursion depth in policy validation" + "CVE-2020-15393": { + "cmt_msg": "usb: usbtest: fix missing kfree(dev->buf) in usbtest_disconnect" }, - "CVE-2023-3111": { - "cmt_msg": "btrfs: unset reloc control if transaction commit fails in prepare_to_relocate()" + "CVE-2021-3564": { + "cmt_msg": "Bluetooth: fix the erroneous flush_work() order" }, - "CVE-2020-2732": { - "cmt_msg": "KVM: nVMX: Don't emulate instructions in guest mode" + "CVE-2017-13080": { + "cmt_msg": "mac80211: accept key reinstall without changing anything" }, - "CVE-2012-4542": { - "cmt_msg": "" + "CVE-2018-12127": { + "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" }, - "CVE-2022-1729": { - "cmt_msg": "perf: Fix sys_perf_event_open() race against self" + "CVE-2018-12126": { + "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" }, - "CVE-2023-42752": { - "cmt_msg": "igmp: limit igmpv3_newpack() packet size to IP_MAX_MTU" + "CVE-2021-28964": { + "cmt_msg": "btrfs: fix race when cloning extent buffer during rewind of an old root" }, - "CVE-2023-4128": { - "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free" + "CVE-2019-13631": { + "cmt_msg": "Input: gtco - bounds check collection indent level" }, - "CVE-2018-1000028": { - "cmt_msg": "nfsd: auth: Fix gid sorting when rootsquash enabled" + "CVE-2018-12233": { + "cmt_msg": "jfs: Fix inconsistency between memory allocation and ea_buf->max_size" }, - "CVE-2023-1118": { - "cmt_msg": "media: rc: Fix use-after-free bugs caused by ene_tx_irqsim()" + "CVE-2018-12232": { + "cmt_msg": "socket: close race condition between sock_close() and sockfs_setattr()" }, - "CVE-2018-7191": { - "cmt_msg": "tun: call dev_get_valid_name() before register_netdevice()" + "CVE-2018-9465": { + "cmt_msg": "binder: fix proc->files use-after-free" }, - "CVE-2024-0607": { - "cmt_msg": "netfilter: nf_tables: fix pointer math issue in nft_byteorder_eval()" + "CVE-2020-8649": { + "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region" }, - "CVE-2018-1000026": { - "cmt_msg": "bnx2x: disable GSO where gso_size is too big for hardware" + "CVE-2020-8648": { + "cmt_msg": "vt: selection, close sel_buffer race" }, - "CVE-2022-1975": { - "cmt_msg": "NFC: netlink: fix sleep in atomic bug when firmware download timeout" + "CVE-2020-8647": { + "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region" }, - "CVE-2023-1380": { - "cmt_msg": "wifi: brcmfmac: slab-out-of-bounds read in brcmf_get_assoc_ies()" + "CVE-2019-0155": { + "cmt_msg": "drm/i915: Rename gen7 cmdparser tables" }, - "CVE-2022-44032": { - "cmt_msg": "char: pcmcia: remove all the drivers" + "CVE-2019-0154": { + "cmt_msg": "drm/i915: Lower RM timeout to avoid DSI hard hangs" }, - "CVE-2017-0786": { - "cmt_msg": "brcmfmac: add length check in brcmf_cfg80211_escan_handler()" + "CVE-2023-35827": { + "cmt_msg": "ravb: Fix use-after-free issue in ravb_tx_timeout_work()" }, - "CVE-2021-28972": { - "cmt_msg": "PCI: rpadlpar: Fix potential drc_name corruption in store functions" + "CVE-2023-52585": { + "cmt_msg": "drm/amdgpu: Fix possible NULL dereference in amdgpu_ras_query_error_status_helper()" }, - "CVE-2018-12130": { - "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" + "CVE-2023-52584": { + "cmt_msg": "spmi: mediatek: Fix UAF on device remove" }, - "CVE-2021-20292": { - "cmt_msg": "drm/ttm/nouveau: don't call tt destroy callback on alloc failure." + "CVE-2023-52587": { + "cmt_msg": "IB/ipoib: Fix mcast list locking" }, - "CVE-2021-31916": { - "cmt_msg": "dm ioctl: fix out of bounds array access when no devices" + "CVE-2023-52586": { + "cmt_msg": "drm/msm/dpu: Add mutex lock in control vblank irq" }, - "CVE-2018-17182": { - "cmt_msg": "mm: get rid of vmacache_flush_all() entirely" + "CVE-2023-52583": { + "cmt_msg": "ceph: fix deadlock or deadcode of misusing dget()" }, - "CVE-2022-32981": { - "cmt_msg": "powerpc/32: Fix overread/overwrite of thread_struct via ptrace" + "CVE-2023-52589": { + "cmt_msg": "media: rkisp1: Fix IRQ disable race issue" }, - "CVE-2018-13405": { - "cmt_msg": "Fix up non-directory creation in SGID directories" + "CVE-2023-52588": { + "cmt_msg": "f2fs: fix to tag gcing flag on page during block migration" }, - "CVE-2020-25645": { - "cmt_msg": "geneve: add transport ports in route lookup for geneve" + "CVE-2023-52340": { + "cmt_msg": "ipv6: remove max_size check inline with ipv4" }, - "CVE-2018-13406": { - "cmt_msg": "video: uvesafb: Fix integer overflow in allocation" + "CVE-2021-46969": { + "cmt_msg": "bus: mhi: core: Fix invalid error returning in mhi_queue" }, - "CVE-2022-1280": { - "cmt_msg": "drm: avoid circular locks in drm_mode_getconnector" + "CVE-2020-16120": { + "cmt_msg": "ovl: switch to mounter creds in readdir" }, - "CVE-2023-3772": { - "cmt_msg": "xfrm: add NULL check in xfrm_update_ae_params" + "CVE-2019-17666": { + "cmt_msg": "rtlwifi: Fix potential overflow on P2P code" }, - "CVE-2020-11668": { - "cmt_msg": "media: xirlink_cit: add missing descriptor sanity checks" + "CVE-2018-15471": { + "cmt_msg": "xen-netback: fix input validation in xenvif_set_hash_mapping()" }, - "CVE-2020-11669": { - "cmt_msg": "powerpc/powernv/idle: Restore AMR/UAMOR/AMOR after idle" + "CVE-2021-34693": { + "cmt_msg": "can: bcm: fix infoleak in struct bcm_msg_head" }, - "CVE-2019-15118": { - "cmt_msg": "ALSA: usb-audio: Fix a stack buffer overflow bug in check_input_term" + "CVE-2020-11494": { + "cmt_msg": "slcan: Don't transmit uninitialized stack data in padding" }, - "CVE-2019-12818": { - "cmt_msg": "net: nfc: Fix NULL dereference on nfc_llcp_build_tlv fails" + "CVE-2024-26797": { + "cmt_msg": "drm/amd/display: Prevent potential buffer overflow in map_hw_resources" }, - "CVE-2019-12819": { - "cmt_msg": "mdio_bus: Fix use-after-free on device_register fails" + "CVE-2024-26791": { + "cmt_msg": "btrfs: dev-replace: properly validate device names" }, - "CVE-2023-0394": { - "cmt_msg": "ipv6: raw: Deduct extension header length in rawv6_push_pending_frames" + "CVE-2024-26793": { + "cmt_msg": "gtp: fix use-after-free and null-ptr-deref in gtp_newlink()" }, - "CVE-2018-11506": { - "cmt_msg": "sr: pass down correctly sized SCSI sense buffer" + "CVE-2022-30594": { + "cmt_msg": "ptrace: Check PTRACE_O_SUSPEND_SECCOMP permission on PTRACE_SEIZE" }, - "CVE-2022-36402": { - "cmt_msg": "drm/vmwgfx: Fix shader stage validation" + "CVE-2024-26798": { + "cmt_msg": "fbcon: always restore the old font data in fbcon_do_set_font()" }, - "CVE-2019-19332": { - "cmt_msg": "KVM: x86: fix out-of-bounds write in KVM_GET_EMULATED_CPUID (CVE-2019-19332)" + "CVE-2021-38204": { + "cmt_msg": "usb: max-3421: Prevent corruption of freed memory" }, - "CVE-2019-15117": { - "cmt_msg": "ALSA: usb-audio: Fix an OOB bug in parse_audio_mixer_unit" + "CVE-2021-38205": { + "cmt_msg": "net: xilinx_emaclite: Do not print real IOMEM pointer" }, - "CVE-2021-3659": { - "cmt_msg": "net: mac802154: Fix general protection fault" + "CVE-2020-0255": { + "cmt_msg": "selinux: properly handle multiple messages in selinux_netlink_send()" }, - "CVE-2022-25258": { - "cmt_msg": "USB: gadget: validate interface OS descriptor requests" + "CVE-2023-35001": { + "cmt_msg": "netfilter: nf_tables: prevent OOB access in nft_byteorder_eval" }, - "CVE-2021-4155": { - "cmt_msg": "xfs: map unwritten blocks in XFS_IOC_{ALLOC,FREE}SP just like fallocate" + "CVE-2022-27666": { + "cmt_msg": "esp: Fix possible buffer overflow in ESP transformation" }, - "CVE-2019-14901": { - "cmt_msg": "mwifiex: Fix heap overflow in mmwifiex_process_tdls_action_frame()" + "CVE-2021-38208": { + "cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect" }, - "CVE-2021-4150": { - "cmt_msg": "block: fix incorrect references to disk objects" + "CVE-2018-7995": { + "cmt_msg": "x86/MCE: Serialize sysfs changes" }, - "CVE-2020-3702": { - "cmt_msg": "ath: Use safer key clearing with key cache entries" + "CVE-2017-18232": { + "cmt_msg": "scsi: libsas: direct call probe and destruct" }, - "CVE-2020-16166": { - "cmt_msg": "random32: update the net random state on interrupt and activity" + "CVE-2022-0168": { + "cmt_msg": "cifs: fix NULL ptr dereference in smb2_ioctl_query_info()" }, - "CVE-2021-3653": { - "cmt_msg": "KVM: nSVM: avoid picking up unsupported bits from L2 in int_ctl (CVE-2021-3653)" + "CVE-2020-26556": { + "cmt_msg": "" }, - "CVE-2021-3655": { - "cmt_msg": "sctp: validate from_addr_param return" + "CVE-2018-9518": { + "cmt_msg": "NFC: llcp: Limit size of SDP URI" }, - "CVE-2020-8694": { - "cmt_msg": "powercap: restrict energy meter to root access" + "CVE-2024-26778": { + "cmt_msg": "fbdev: savage: Error out if pixclock equals zero" }, - "CVE-2021-4159": { - "cmt_msg": "bpf: Verifer, adjust_scalar_min_max_vals to always call update_reg_bounds()" + "CVE-2020-26555": { + "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical" }, - "CVE-2019-12614": { - "cmt_msg": "powerpc/pseries/dlpar: Fix a missing check in dlpar_parse_cc_property()" + "CVE-2024-26776": { + "cmt_msg": "spi: hisi-sfc-v3xx: Return IRQ_NONE if no interrupts were detected" }, - "CVE-2019-12615": { - "cmt_msg": "mdesc: fix a missing-check bug in get_vdev_port_node_info()" + "CVE-2024-26777": { + "cmt_msg": "fbdev: sis: Error out if pixclock equals zero" }, - "CVE-2021-3715": { - "cmt_msg": "net_sched: cls_route: remove the right filter from hashtable" + "CVE-2020-26558": { + "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical" }, - "CVE-2021-3714": { + "CVE-2023-3390": { + "cmt_msg": "netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE" + }, + "CVE-2023-3397": { "cmt_msg": "" }, - "CVE-2019-16230": { - "cmt_msg": "drm/amdkfd: fix a potential NULL pointer dereference (v2)" + "CVE-2024-26773": { + "cmt_msg": "ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found()" }, - "CVE-2019-16231": { - "cmt_msg": "fjes: Handle workqueue allocation failure" + "CVE-2024-26770": { + "cmt_msg": "HID: nvidia-shield: Add missing null pointer checks to LED initialization" }, - "CVE-2019-16232": { - "cmt_msg": "libertas: fix a potential NULL pointer dereference" + "CVE-2024-26771": { + "cmt_msg": "dmaengine: ti: edma: Add some null pointer checks to the edma_probe" }, - "CVE-2019-16233": { - "cmt_msg": "scsi: qla2xxx: fix a potential NULL pointer dereference" + "CVE-2017-18549": { + "cmt_msg": "scsi: aacraid: Don't copy uninitialized stack memory to userspace" }, - "CVE-2019-16234": { - "cmt_msg": "iwlwifi: pcie: fix rb_allocator workqueue allocation" + "CVE-2023-28746": { + "cmt_msg": "x86/mmio: Disable KVM mitigation when X86_FEATURE_CLEAR_CPU_BUF is set" }, - "CVE-2023-52445": { - "cmt_msg": "media: pvrusb2: fix use after free on context disconnection" + "CVE-2017-5754": { + "cmt_msg": "x86/cpufeatures: Add Intel feature bits for Speculation Control" }, - "CVE-2019-6133": { - "cmt_msg": "fork: record start_time late" + "CVE-2021-47119": { + "cmt_msg": "ext4: fix memory leak in ext4_fill_super" }, - "CVE-2018-10902": { - "cmt_msg": "ALSA: rawmidi: Change resized buffers atomically" + "CVE-2017-5753": { + "cmt_msg": "x86/cpufeatures: Add X86_BUG_SPECTRE_V[12]" }, - "CVE-2021-39633": { - "cmt_msg": "ip_gre: add validation for csum_start" + "CVE-2024-1086": { + "cmt_msg": "netfilter: nf_tables: reject QUEUE/DROP verdict parameters" }, - "CVE-2017-18203": { - "cmt_msg": "dm: fix race between dm_get_from_kobject() and __dm_destroy()" + "CVE-2019-9466": { + "cmt_msg": "brcmfmac: add subtype check for event handling in data path" }, - "CVE-2017-18202": { - "cmt_msg": "mm, oom_reaper: gather each vma to prevent leaking TLB entry" + "CVE-2022-0382": { + "cmt_msg": "net ticp:fix a kernel-infoleak in __tipc_sendmsg()" }, - "CVE-2021-39636": { - "cmt_msg": "netfilter: x_tables: fix pointer leaks to userspace" + "CVE-2023-32233": { + "cmt_msg": "netfilter: nf_tables: deactivate anonymous set from preparation phase" }, - "CVE-2017-18204": { - "cmt_msg": "ocfs2: should wait dio before inode lock in ocfs2_setattr()" + "CVE-2019-15222": { + "cmt_msg": "ALSA: usb-audio: Fix gpf in snd_usb_pipe_sanity_check" }, - "CVE-2021-39634": { - "cmt_msg": "epoll: do not insert into poll queues until all sanity checks are done" + "CVE-2019-15223": { + "cmt_msg": "ALSA: line6: Assure canceling delayed work at disconnection" }, - "CVE-2024-23851": { - "cmt_msg": "dm: limit the number of targets and parameter size area" + "CVE-2019-15220": { + "cmt_msg": "p54usb: Fix race between disconnect and firmware loading" }, - "CVE-2019-3882": { - "cmt_msg": "vfio/type1: Limit DMA mappings per container" + "CVE-2019-15221": { + "cmt_msg": "ALSA: line6: Fix write on zero-sized buffer" }, - "CVE-2017-18208": { - "cmt_msg": "mm/madvise.c: fix madvise() infinite loop under special circumstances" + "CVE-2022-1016": { + "cmt_msg": "netfilter: nf_tables: initialize registers in nft_do_chain()" }, - "CVE-2022-33741": { - "cmt_msg": "xen/netfront: force data bouncing when backend is untrusted" + "CVE-2022-1011": { + "cmt_msg": "fuse: fix pipe buffer lifetime for direct_io" }, - "CVE-2018-20509": { - "cmt_msg": "binder: refactor binder ref inc/dec for thread safety" + "CVE-2022-1012": { + "cmt_msg": "secure_seq: use the 64 bits of the siphash for port offset calculation" }, - "CVE-2024-24864": { - "cmt_msg": "" + "CVE-2023-52620": { + "cmt_msg": "netfilter: nf_tables: disallow timeout for anonymous sets" }, - "CVE-2022-45885": { - "cmt_msg": "" + "CVE-2023-52621": { + "cmt_msg": "bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers" }, - "CVE-2022-33744": { - "cmt_msg": "xen/arm: Fix race in RB-tree based P2M accounting" + "CVE-2023-52622": { + "cmt_msg": "ext4: avoid online resizing failures due to oversized flex bg" }, - "CVE-2023-4132": { - "cmt_msg": "media: usb: siano: Fix warning due to null work_func_t function pointer" + "CVE-2023-52623": { + "cmt_msg": "SUNRPC: Fix a suspicious RCU usage warning" }, - "CVE-2017-18193": { - "cmt_msg": "f2fs: fix a bug caused by NULL extent tree" + "CVE-2023-52624": { + "cmt_msg": "drm/amd/display: Wake DMCUB before executing GPINT commands" }, - "CVE-2022-40768": { - "cmt_msg": "scsi: stex: Properly zero out the passthrough command structure" + "CVE-2023-52625": { + "cmt_msg": "drm/amd/display: Refactor DMCUB enter/exit idle interface" }, - "CVE-2023-1079": { - "cmt_msg": "HID: asus: use spinlock to safely schedule workers" + "CVE-2023-52628": { + "cmt_msg": "netfilter: nftables: exthdr: fix 4-byte stack OOB write" }, - "CVE-2019-9454": { - "cmt_msg": "i2c: core-smbus: prevent stack corruption on read I2C_BLOCK_DATA" + "CVE-2023-52629": { + "cmt_msg": "sh: push-switch: Reorder cleanup operations to avoid use-after-free bug" }, - "CVE-2020-12888": { - "cmt_msg": "vfio-pci: Invalidate mmaps and block MMIO access on disabled memory" + "CVE-2018-14617": { + "cmt_msg": "hfsplus: fix NULL dereference in hfsplus_lookup()" }, - "CVE-2023-2194": { - "cmt_msg": "i2c: xgene-slimpro: Fix out-of-bounds bug in xgene_slimpro_i2c_xfer()" + "CVE-2022-0492": { + "cmt_msg": "cgroup-v1: Require capabilities to set release_agent" }, - "CVE-2021-3923": { - "cmt_msg": "RDMA/core: Don't infoleak GRH fields" + "CVE-2020-12352": { + "cmt_msg": "Bluetooth: A2MP: Fix not initializing all members" }, - "CVE-2021-0447": { - "cmt_msg": "l2tp: protect sock pointer of struct pppol2tp_session with RCU" + "CVE-2020-12351": { + "cmt_msg": "Bluetooth: L2CAP: Fix calling sk_filter on non-socket based channel" }, - "CVE-2022-41218": { - "cmt_msg": "media: dvb-core: Fix UAF due to refcount races at releasing" + "CVE-2021-43976": { + "cmt_msg": "mwifiex: Fix skb_over_panic in mwifiex_usb_recv()" }, - "CVE-2019-20934": { - "cmt_msg": "sched/fair: Don't free p->numa_faults with concurrent readers" + "CVE-2022-0494": { + "cmt_msg": "block-map: add __GFP_ZERO flag for alloc_page in function bio_copy_kern" }, - "CVE-2022-1247": { + "CVE-2021-47101": { + "cmt_msg": "asix: fix uninit-value in asix_mdio_read()" + }, + "CVE-2021-47103": { + "cmt_msg": "inet: fully convert sk->sk_rx_dst to RCU rules" + }, + "CVE-2021-46982": { + "cmt_msg": "f2fs: compress: fix race condition of overwrite vs truncate" + }, + "CVE-2007-3719": { "cmt_msg": "" }, - "CVE-2022-36946": { - "cmt_msg": "netfilter: nf_queue: do not allow packet truncation below transport header offset" + "CVE-2021-46988": { + "cmt_msg": "userfaultfd: release page in error path to avoid BUG_ON" }, - "CVE-2022-1184": { - "cmt_msg": "ext4: verify dir block before splitting it" + "CVE-2019-19319": { + "cmt_msg": "ext4: protect journal inode's blocks using block_validity" }, - "CVE-2021-45485": { - "cmt_msg": "ipv6: use prandom_u32() for ID generation" + "CVE-2022-3628": { + "cmt_msg": "wifi: brcmfmac: Fix potential buffer overflow in brcmf_fweh_event_worker()" }, - "CVE-2021-0448": { - "cmt_msg": "netfilter: ctnetlink: add a range check for l3/l4 protonum" + "CVE-2022-3629": { + "cmt_msg": "vsock: Fix memory leak in vsock_connect()" }, - "CVE-2018-19824": { - "cmt_msg": "ALSA: usb-audio: Fix UAF decrement if card has no live interfaces in card.c" + "CVE-2022-3621": { + "cmt_msg": "nilfs2: fix NULL pointer dereference at nilfs_bmap_lookup_at_level()" }, - "CVE-2022-21166": { - "cmt_msg": "x86/speculation/mmio: Enable CPU Fill buffer clearing on idle" + "CVE-2022-23960": { + "cmt_msg": "ARM: report Spectre v2 status through sysfs" }, - "CVE-2020-29374": { - "cmt_msg": "gup: document and work around \"COW can break either way\" issue" + "CVE-2022-3624": { + "cmt_msg": "bonding: fix reference count leak in balance-alb mode" }, - "CVE-2020-0030": { - "cmt_msg": "ANDROID: binder: synchronize_rcu() when using POLLFREE." + "CVE-2019-11091": { + "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" }, - "CVE-2023-4134": { - "cmt_msg": "Input: cyttsp4_core - change del_timer_sync() to timer_shutdown_sync()" + "CVE-2023-4921": { + "cmt_msg": "net: sched: sch_qfq: Fix UAF in qfq_dequeue()" }, - "CVE-2018-16862": { - "cmt_msg": "mm: cleancache: fix corruption on missed inode invalidation" + "CVE-2017-15649": { + "cmt_msg": "packet: in packet_do_bind, test fanout with bind_lock held" }, - "CVE-2023-52449": { - "cmt_msg": "mtd: Fix gluebi NULL pointer dereference caused by ftl notifier" + "CVE-2023-1829": { + "cmt_msg": "net/sched: Retire tcindex classifier" }, - "CVE-2021-29650": { - "cmt_msg": "netfilter: x_tables: Use correct memory barriers." + "CVE-2019-19227": { + "cmt_msg": "appletalk: Fix potential NULL pointer dereference in unregister_snap_client" }, - "CVE-2019-18806": { - "cmt_msg": "net: qlogic: Fix memory leak in ql_alloc_large_buffers" + "CVE-2024-0775": { + "cmt_msg": "ext4: improve error recovery code paths in __ext4_remount()" }, - "CVE-2023-4010": { - "cmt_msg": "" + "CVE-2020-24394": { + "cmt_msg": "nfsd: apply umask on fs without ACL support" }, - "CVE-2018-20169": { - "cmt_msg": "USB: check usb_get_extra_descriptor for proper size" + "CVE-2020-14386": { + "cmt_msg": "net/packet: fix overflow in tpacket_rcv" }, - "CVE-2021-29154": { - "cmt_msg": "bpf, x86: Validate computation of branch displacements for x86-64" + "CVE-2020-14381": { + "cmt_msg": "futex: Fix inode life-time issue" }, - "CVE-2017-16646": { - "cmt_msg": "media: dib0700: fix invalid dvb_detach argument" + "CVE-2019-19768": { + "cmt_msg": "blktrace: Protect q->blk_trace with RCU" }, - "CVE-2022-41849": { - "cmt_msg": "fbdev: smscufx: Fix use-after-free in ufx_ops_open()" + "CVE-2022-20141": { + "cmt_msg": "igmp: Add ip_mc_list lock in ip_check_mc_rcu" }, - "CVE-2022-41848": { - "cmt_msg": "" + "CVE-2023-23455": { + "cmt_msg": "net: sched: atm: dont intepret cls results when asked to drop" }, - "CVE-2020-36312": { - "cmt_msg": "KVM: fix memory leak in kvm_io_bus_unregister_dev()" + "CVE-2023-23454": { + "cmt_msg": "net: sched: cbq: dont intepret cls results when asked to drop" }, - "CVE-2022-1353": { - "cmt_msg": "af_key: add __GFP_ZERO flag for compose_sadb_supported in function pfkey_register" + "CVE-2022-20148": { + "cmt_msg": "f2fs: fix UAF in f2fs_available_free_memory" }, - "CVE-2022-28356": { - "cmt_msg": "llc: fix netdevice reference leaks in llc_ui_bind()" + "CVE-2023-6931": { + "cmt_msg": "perf: Fix perf_event_validate_size()" }, - "CVE-2022-1198": { - "cmt_msg": "drivers: hamradio: 6pack: fix UAF bug caused by mod_timer()" + "CVE-2023-6932": { + "cmt_msg": "ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet" }, - "CVE-2022-1199": { - "cmt_msg": "ax25: Fix NULL pointer dereference in ax25_kill_by_device" + "CVE-2018-8781": { + "cmt_msg": "drm: udl: Properly check framebuffer mmap offsets" }, - "CVE-2018-5750": { - "cmt_msg": "ACPI: sbshc: remove raw pointer from printk() message" + "CVE-2017-15265": { + "cmt_msg": "ALSA: seq: Fix use-after-free at creating a port" }, - "CVE-2021-39801": { - "cmt_msg": "" + "CVE-2021-0605": { + "cmt_msg": "af_key: pfkey_dump needs parameter validation" }, - "CVE-2021-39800": { - "cmt_msg": "" + "CVE-2018-20961": { + "cmt_msg": "USB: gadget: f_midi: fixing a possible double-free in f_midi" }, - "CVE-2018-16884": { - "cmt_msg": "sunrpc: use-after-free in svc_process_common()" + "CVE-2018-5995": { + "cmt_msg": "printk: hash addresses printed with %p" }, - "CVE-2023-1074": { - "cmt_msg": "sctp: fail if no bound addresses can be used for a given scope" + "CVE-2022-2153": { + "cmt_msg": "KVM: x86: Avoid theoretical NULL pointer dereference in kvm_irq_delivery_to_apic_fast()" }, - "CVE-2022-1195": { - "cmt_msg": "hamradio: improve the incomplete fix to avoid NPD" + "CVE-2024-2193": { + "cmt_msg": "" }, - "CVE-2024-22099": { + "CVE-2018-12930": { "cmt_msg": "" }, - "CVE-2021-4202": { - "cmt_msg": "NFC: reorganize the functions in nci_request" + "CVE-2018-12931": { + "cmt_msg": "" }, - "CVE-2017-16647": { - "cmt_msg": "net: usb: asix: fill null-ptr-deref in asix_suspend" + "CVE-2021-28972": { + "cmt_msg": "PCI: rpadlpar: Fix potential drc_name corruption in store functions" }, - "CVE-2022-4269": { - "cmt_msg": "act_mirred: use the backlog for nested calls to mirred ingress" + "CVE-2021-28971": { + "cmt_msg": "perf/x86/intel: Fix a crash caused by zero PEBS status" }, - "CVE-2022-45886": { - "cmt_msg": "media: dvb-core: Fix use-after-free due on race condition at dvb_net" + "CVE-2019-19543": { + "cmt_msg": "media: serial_ir: Fix use-after-free in serial_ir_init_module" }, - "CVE-2023-46343": { - "cmt_msg": "nfc: nci: fix possible NULL pointer dereference in send_acknowledge()" + "CVE-2020-36780": { + "cmt_msg": "i2c: sprd: fix reference leak when pm_runtime_get_sync fails" }, - "CVE-2024-24859": { - "cmt_msg": "" + "CVE-2020-36781": { + "cmt_msg": "i2c: imx: fix reference leak when pm_runtime_get_sync fails" }, - "CVE-2019-10220": { - "cmt_msg": "Convert filldir[64]() from __put_user() to unsafe_put_user()" + "CVE-2021-3732": { + "cmt_msg": "ovl: prevent private clone if bind mount is not allowed" }, - "CVE-2023-0590": { - "cmt_msg": "net: sched: fix race condition in qdisc_graft()" + "CVE-2020-36784": { + "cmt_msg": "i2c: cadence: fix reference leak when pm_runtime_get_sync fails" }, - "CVE-2023-2124": { - "cmt_msg": "xfs: verify buffer contents when we skip log replay" + "CVE-2017-13166": { + "cmt_msg": "media: v4l2-ioctl.c: use check_fmt for enum/g/s/try_fmt" }, - "CVE-2023-2860": { - "cmt_msg": "ipv6: sr: fix out-of-bounds read when setting HMAC data." + "CVE-2018-12207": { + "cmt_msg": "kvm: x86, powerpc: do not allow clearing largepages debugfs entry" }, - "CVE-2021-44879": { - "cmt_msg": "f2fs: fix to do sanity check on inode type during garbage collection" + "CVE-2022-20369": { + "cmt_msg": "media: v4l2-mem2mem: Apply DST_QUEUE_OFF_BASE on MMAP buffers across ioctls" }, - "CVE-2019-15505": { - "cmt_msg": "media: technisat-usb2: break out of loop at end of buffer" + "CVE-2017-13168": { + "cmt_msg": "scsi: sg: mitigate read/write abuse" }, - "CVE-2023-1859": { - "cmt_msg": "9p/xen : Fix use after free bug in xen_9pfs_front_remove due to race condition" + "CVE-2019-0148": { + "cmt_msg": "i40e: Wrong truncation from u16 to u8" }, - "CVE-2023-2513": { - "cmt_msg": "ext4: fix use-after-free in ext4_xattr_set_entry" + "CVE-2019-17075": { + "cmt_msg": "RDMA/cxgb4: Do not dma memory off of the stack" }, - "CVE-2020-11609": { - "cmt_msg": "media: stv06xx: add missing descriptor sanity checks" + "CVE-2023-20588": { + "cmt_msg": "x86/CPU/AMD: Do not leak quotient data after a division by 0" }, - "CVE-2022-27672": { - "cmt_msg": "x86/speculation: Identify processors vulnerable to SMT RSB predictions" + "CVE-2019-0147": { + "cmt_msg": "i40e: add num_vectors checker in iwarp handler" }, - "CVE-2022-2964": { - "cmt_msg": "net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup" + "CVE-2019-0145": { + "cmt_msg": "i40e: add num_vectors checker in iwarp handler" }, - "CVE-2021-1048": { - "cmt_msg": "fix regression in \"epoll: Keep a reference on files added to the check list\"" + "CVE-2022-44034": { + "cmt_msg": "char: pcmcia: remove all the drivers" }, - "CVE-2015-2877": { - "cmt_msg": "" + "CVE-2022-44033": { + "cmt_msg": "char: pcmcia: remove all the drivers" }, - "CVE-2020-9383": { - "cmt_msg": "floppy: check FDC index for errors before assigning it" + "CVE-2022-44032": { + "cmt_msg": "char: pcmcia: remove all the drivers" }, - "CVE-2022-3586": { - "cmt_msg": "sch_sfb: Don't assume the skb is still around after enqueueing to child" + "CVE-2021-3609": { + "cmt_msg": "can: bcm: delay release of struct bcm_op after synchronize_rcu()" }, - "CVE-2019-16089": { - "cmt_msg": "" + "CVE-2021-23133": { + "cmt_msg": "net/sctp: fix race condition in sctp_destroy_sock" }, - "CVE-2023-1206": { - "cmt_msg": "tcp: Reduce chance of collisions in inet6_hashfn()." + "CVE-2019-11478": { + "cmt_msg": "tcp: tcp_fragment() should apply sane memory limits" }, - "CVE-2021-38198": { - "cmt_msg": "KVM: X86: MMU: Use the correct inherited permissions to get shadow page" + "CVE-2019-20095": { + "cmt_msg": "mwifiex: Fix mem leak in mwifiex_tm_cmd" }, - "CVE-2021-38199": { - "cmt_msg": "NFSv4: Initialise connection to the server in nfs4_alloc_client()" + "CVE-2019-20096": { + "cmt_msg": "dccp: Fix memleak in __feat_register_sp" }, - "CVE-2022-1679": { - "cmt_msg": "ath9k: fix use-after-free in ath9k_hif_usb_rx_cb" + "CVE-2018-6554": { + "cmt_msg": "staging: irda: remove the irda network stack and drivers" }, - "CVE-2020-8832": { - "cmt_msg": "drm/i915: Record the default hw state after reset upon load" + "CVE-2018-6555": { + "cmt_msg": "staging: irda: remove the irda network stack and drivers" }, - "CVE-2023-1513": { - "cmt_msg": "kvm: initialize all of the kvm_debugregs structure before sending it to userspace" + "CVE-2019-9213": { + "cmt_msg": "mm: enforce min addr even if capable() in expand_downwards()" }, - "CVE-2019-9444": { - "cmt_msg": "printk: hash addresses printed with %p" + "CVE-2019-14896": { + "cmt_msg": "libertas: Fix two buffer overflows at parsing bss descriptor" }, - "CVE-2021-26401": { - "cmt_msg": "x86/speculation: Use generic retpoline by default on AMD" + "CVE-2019-14897": { + "cmt_msg": "libertas: Fix two buffer overflows at parsing bss descriptor" }, - "CVE-2021-3847": { - "cmt_msg": "" + "CVE-2019-14895": { + "cmt_msg": "mwifiex: fix possible heap overflow in mwifiex_process_country_ie()" }, - "CVE-2018-1130": { - "cmt_msg": "dccp: check sk for closed state in dccp_sendmsg()" + "CVE-2024-26784": { + "cmt_msg": "pmdomain: arm: Fix NULL dereference on scmi_perf_domain removal" }, - "CVE-2023-52442": { - "cmt_msg": "ksmbd: validate session id and tree id in compound request" + "CVE-2024-26789": { + "cmt_msg": "crypto: arm64/neonbs - fix out-of-bounds access on short input" }, - "CVE-2019-14284": { - "cmt_msg": "floppy: fix div-by-zero in setup_format_params" + "CVE-2018-5814": { + "cmt_msg": "usbip: usbip_host: fix NULL-ptr deref and use-after-free errors" }, - "CVE-2020-36557": { - "cmt_msg": "vt: vt_ioctl: fix VT_DISALLOCATE freeing in-use virtual console" + "CVE-2020-0067": { + "cmt_msg": "f2fs: fix to avoid memory leakage in f2fs_listxattr" }, - "CVE-2021-3506": { - "cmt_msg": "f2fs: fix to avoid out-of-bounds memory access" + "CVE-2017-18224": { + "cmt_msg": "ocfs2: ip_alloc_sem should be taken in ocfs2_get_block()" }, - "CVE-2011-4917": { + "CVE-2020-26541": { + "cmt_msg": "certs: Add EFI_CERT_X509_GUID support for dbx entries" + }, + "CVE-2019-20794": { "cmt_msg": "" }, - "CVE-2011-4916": { + "CVE-2024-26769": { + "cmt_msg": "nvmet-fc: avoid deadlock on delete association path" + }, + "CVE-2024-26768": { + "cmt_msg": "LoongArch: Change acpi_core_pic[NR_CPUS] to acpi_core_pic[MAX_CORE_PIC]" + }, + "CVE-2021-33061": { + "cmt_msg": "ixgbe: add improvement for MDD response functionality" + }, + "CVE-2024-26764": { + "cmt_msg": "fs/aio: Restrict kiocb_set_cancel_fn() to I/O submitted via libaio" + }, + "CVE-2024-26767": { + "cmt_msg": "drm/amd/display: fixed integer types and null check locations" + }, + "CVE-2024-26766": { + "cmt_msg": "IB/hfi1: Fix sdma.h tx->num_descs off-by-one error" + }, + "CVE-2024-26763": { + "cmt_msg": "dm-crypt: don't modify the data when using authenticated encryption" + }, + "CVE-2017-18551": { + "cmt_msg": "i2c: core-smbus: prevent stack corruption on read I2C_BLOCK_DATA" + }, + "CVE-2017-18550": { + "cmt_msg": "scsi: aacraid: Don't copy uninitialized stack memory to userspace" + }, + "CVE-2018-18559": { + "cmt_msg": "net/packet: fix a race in packet_bind() and packet_notifier()" + }, + "CVE-2019-9456": { + "cmt_msg": "usb: usbmon: Read text within supplied buffer size" + }, + "CVE-2019-9455": { + "cmt_msg": "media: videobuf2-v4l2: drop WARN_ON in vb2_warn_zero_bytesused()" + }, + "CVE-2022-2978": { + "cmt_msg": "fs: fix UAF/GPF bug in nilfs_mdt_destroy" + }, + "CVE-2019-9453": { + "cmt_msg": "f2fs: fix to avoid accessing xattr across the boundary" + }, + "CVE-2023-20569": { + "cmt_msg": "x86/bugs: Increase the x86 bugs vector size to two u32s" + }, + "CVE-2023-46838": { + "cmt_msg": "xen-netback: don't produce zero-size SKB frags" + }, + "CVE-2022-2977": { + "cmt_msg": "tpm: fix reference counting for struct tpm_chip" + }, + "CVE-2019-9458": { + "cmt_msg": "media: v4l: event: Prevent freeing event subscriptions while accessed" + }, + "CVE-2023-3090": { + "cmt_msg": "ipvlan:Fix out-of-bounds caused by unclear skb->cb" + }, + "CVE-2023-45862": { + "cmt_msg": "USB: ene_usb6250: Allocate enough memory for full object" + }, + "CVE-2023-45863": { + "cmt_msg": "kobject: Fix slab-out-of-bounds in fill_kobj_path()" + }, + "CVE-2020-25704": { + "cmt_msg": "perf/core: Fix a memory leak in perf_event_parse_addr_filter()" + }, + "CVE-2020-25705": { + "cmt_msg": "icmp: randomize the global rate limiter" + }, + "CVE-2017-15127": { + "cmt_msg": "userfaultfd: hugetlbfs: remove superfluous page unlock in VM_SHARED case" + }, + "CVE-2017-15126": { + "cmt_msg": "userfaultfd: non-cooperative: fix fork use after free" + }, + "CVE-2023-52639": { + "cmt_msg": "KVM: s390: vsie: fix race during shadow creation" + }, + "CVE-2023-52638": { + "cmt_msg": "can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock" + }, + "CVE-2019-15239": { "cmt_msg": "" }, - "CVE-2018-10880": { - "cmt_msg": "ext4: never move the system.data xattr out of the inode body" + "CVE-2017-15129": { + "cmt_msg": "net: Fix double free and memory corruption in get_net_ns_by_id()" }, - "CVE-2019-3900": { - "cmt_msg": "vhost_net: fix possible infinite loop" + "CVE-2022-26373": { + "cmt_msg": "x86/speculation: Add RSB VM Exit protections" }, - "CVE-2019-19528": { - "cmt_msg": "USB: iowarrior: fix use-after-free on disconnect" + "CVE-2023-52633": { + "cmt_msg": "um: time-travel: fix time corruption" }, - "CVE-2019-19533": { - "cmt_msg": "media: ttusb-dec: Fix info-leak in ttusb_dec_send_command()" + "CVE-2023-52632": { + "cmt_msg": "drm/amdkfd: Fix lock dependency warning with srcu" }, - "CVE-2018-13100": { - "cmt_msg": "f2fs: fix to do sanity check with secs_per_zone" + "CVE-2017-9986": { + "cmt_msg": "sound: Retire OSS" }, - "CVE-2019-15807": { - "cmt_msg": "scsi: libsas: delete sas port if expander discover failed" + "CVE-2021-44733": { + "cmt_msg": "tee: handle lookup of shm with reference count 0" }, - "CVE-2017-16645": { - "cmt_msg": "Input: ims-psu - check if CDC union descriptor is sane" + "CVE-2021-47135": { + "cmt_msg": "mt76: mt7921: fix possible AOOB issue in mt7921_mcu_tx_rate_report" }, - "CVE-2017-16644": { - "cmt_msg": "media: hdpvr: Fix an error handling path in hdpvr_probe()" + "CVE-2021-47136": { + "cmt_msg": "net: zero-initialize tc skb extension on allocation" }, - "CVE-2017-16643": { - "cmt_msg": "Input: gtco - fix potential out-of-bound access" + "CVE-2021-47137": { + "cmt_msg": "net: lantiq: fix memory corruption in RX ring" }, - "CVE-2017-16649": { - "cmt_msg": "net: cdc_ether: fix divide by 0 on bad descriptors" + "CVE-2021-47131": { + "cmt_msg": "net/tls: Fix use-after-free after the TLS device goes down and up" }, - "CVE-2023-31083": { - "cmt_msg": "Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO" + "CVE-2021-47133": { + "cmt_msg": "HID: amd_sfh: Fix memory leak in amd_sfh_work" }, - "CVE-2019-5489": { - "cmt_msg": "Change mincore() to count \"mapped\" pages rather than \"cached\" pages" + "CVE-2023-0386": { + "cmt_msg": "ovl: fail on invalid uid/gid mapping at copy up" }, - "CVE-2024-1312": { - "cmt_msg": "mm: lock_vma_under_rcu() must check vma->anon_vma under vma lock" + "CVE-2022-42896": { + "cmt_msg": "Bluetooth: L2CAP: Fix accepting connection request for invalid SPSM" }, - "CVE-2018-8087": { - "cmt_msg": "mac80211_hwsim: fix possible memory leak in hwsim_new_radio_nl()" + "CVE-2022-42895": { + "cmt_msg": "Bluetooth: L2CAP: Fix attempting to access uninitialized memory" }, - "CVE-2019-14283": { - "cmt_msg": "floppy: fix out-of-bounds read in copy_buffer" + "CVE-2022-48626": { + "cmt_msg": "moxart: fix potential use-after-free on remove path" }, - "CVE-2018-10881": { - "cmt_msg": "ext4: clear i_data in ext4_inode_info when removing inline data" + "CVE-2022-48627": { + "cmt_msg": "vt: fix memory overlapping when deleting chars in the buffer" }, - "CVE-2018-10882": { - "cmt_msg": "ext4: add more inode number paranoia checks" + "CVE-2022-48628": { + "cmt_msg": "ceph: drop messages from MDS when unmounting" }, - "CVE-2018-10883": { - "cmt_msg": "jbd2: don't mark block as modified if the handle is out of credits" - } - } - }, - "4.15": { - "4.15": { - "CVE-2018-1000028": { - "cmt_msg": "nfsd: auth: Fix gid sorting when rootsquash enabled", - "cmt_id": "1995266727fa8143897e89b55f5d3c79aa828420" - } - }, - "4.15-rc1": { - "CVE-2019-19083": { - "cmt_msg": "drm/amd/display: memory leak", - "cmt_id": "9ea29a1f8b9da52d8eca8b0996f1d84eac548d3b" - } - }, - "4.15.1": { - "CVE-2019-2215": { - "cmt_msg": "ANDROID: binder: remove waitqueue when thread exits.", - "cmt_id": "7654cae5433700f4f5ae6cafd785b84b52d10468" - } - }, - "4.15.2": { - "CVE-2017-5754": { - "cmt_msg": "x86/cpufeatures: Add Intel feature bits for Speculation Control", - "cmt_id": "6acd374af3f3b7dafcfb3081ee7d9ec75fd989da" - } - }, - "4.15.4": { - "CVE-2017-13166": { - "cmt_msg": "media: v4l2-ioctl.c: use check_fmt for enum/g/s/try_fmt", - "cmt_id": "1113a74590b4597c0d5104bf9f653cc4daad9daf" + "CVE-2024-24859": { + "cmt_msg": "" }, - "CVE-2018-5750": { - "cmt_msg": "ACPI: sbshc: remove raw pointer from printk() message", - "cmt_id": "1a9b65ce31654f5d4edd134c5ad21a0b0846ab1a" + "CVE-2024-24858": { + "cmt_msg": "" }, - "CVE-2017-16538": { - "cmt_msg": "media: dvb-usb-v2: lmedm04: Improve logic checking of warm start", - "cmt_id": "20f3bae5957e3c0843e71a6564e3dbd040b7f469" + "CVE-2024-24855": { + "cmt_msg": "scsi: lpfc: Fix a possible data race in lpfc_unregister_fcf_rescan()" }, - "CVE-2017-16644": { - "cmt_msg": "media: hdpvr: Fix an error handling path in hdpvr_probe()", - "cmt_id": "2eeaddcc139b5ccf1784148e08c7f2f57ec2c998" - } - }, - "4.15.5": { - "CVE-2018-7566": { - "cmt_msg": "ALSA: seq: Fix racy pool initializations", - "cmt_id": "3b8e84c8373de4e068e282102425d498d992e49b" - } - }, - "4.15.6": { - "CVE-2018-20510": { - "cmt_msg": "binder: replace \"%p\" with \"%pK\"", - "cmt_id": "008fdd7c3915f5fe5481289e66986f149d824ad5" + "CVE-2024-24857": { + "cmt_msg": "" }, - "CVE-2020-0030": { - "cmt_msg": "ANDROID: binder: synchronize_rcu() when using POLLFREE.", - "cmt_id": "3dd13985a916de3f748b07255eaf4b7516921ae0" - } - }, - "4.15.8": { - "CVE-2022-20567": { - "cmt_msg": "l2tp: fix race in pppol2tp_release with session object destroy", - "cmt_id": "08ffa7bbb46e2a298287c66343ba44039a931ba4" + "CVE-2019-3892": { + "cmt_msg": "coredump: fix race condition between mmget_not_zero()/get_task_mm() and core dumping" }, - "CVE-2018-5703": { - "cmt_msg": "tls: Use correct sk->sk_prot for IPV6", - "cmt_id": "c5f3a16c047dfa7f309a2e1ca7d43e7db92ec35b" + "CVE-2021-29264": { + "cmt_msg": "gianfar: fix jumbo packets+napi+rx overrun crash" }, - "CVE-2018-5803": { - "cmt_msg": "sctp: verify size of a new chunk in _sctp_make_chunk()", - "cmt_id": "4fadd1aa760e40ee98507326cb714036b92d1fc1" - } - }, - "4.15.10": { - "CVE-2018-1068": { - "cmt_msg": "netfilter: ebtables: CONFIG_COMPAT: don't trust userland offsets", - "cmt_id": "5c06b89df419ea4c472a68b1e5b668bda52471ba" + "CVE-2021-29265": { + "cmt_msg": "usbip: fix stub_dev usbip_sockfd_store() races leading to gpf" }, - "CVE-2018-7995": { - "cmt_msg": "x86/MCE: Serialize sysfs changes", - "cmt_id": "291a0c2764e4b8f714a6e102ac2fcad6ed7711ba" + "CVE-2022-3545": { + "cmt_msg": "nfp: fix use-after-free in area_cache_get()" + }, + "CVE-2022-3542": { + "cmt_msg": "bnx2x: fix potential memory leak in bnx2x_tpa_stop()" + }, + "CVE-2021-21781": { + "cmt_msg": "ARM: ensure the signal page contains defined contents" + }, + "CVE-2023-1838": { + "cmt_msg": "Fix double fget() in vhost_net_set_backend()" + }, + "CVE-2023-1382": { + "cmt_msg": "tipc: set con sock in tipc_conn_alloc" + }, + "CVE-2018-14734": { + "cmt_msg": "infiniband: fix a possible use-after-free bug" + }, + "CVE-2017-15306": { + "cmt_msg": "KVM: PPC: Fix oops when checking KVM_CAP_PPC_HTM" }, - "CVE-2018-1065": { - "cmt_msg": "netfilter: add back stackpointer size checks", - "cmt_id": "ec6b058c5431e7e1686c4d7ef42f951473baa78b" - } - }, - "4.15.11": { - "CVE-2019-9456": { - "cmt_msg": "usb: usbmon: Read text within supplied buffer size", - "cmt_id": "b42aa204e1110e20f5a49caaf92a935d39a02112" - } - }, - "4.15.14": { "CVE-2018-8822": { - "cmt_msg": "staging: ncpfs: memory corruption in ncp_read_kernel()", - "cmt_id": "9a6730ae707b16b038f3731f93f67aa0bd08017f" + "cmt_msg": "staging: ncpfs: memory corruption in ncp_read_kernel()" }, - "CVE-2018-7740": { - "cmt_msg": "hugetlbfs: check for pgoff value overflow", - "cmt_id": "e0fdb5385c4bf26b4be60c0042344c315c039aeb" + "CVE-2019-19529": { + "cmt_msg": "can: mcba_usb: fix use-after-free on disconnect" }, - "CVE-2018-1087": { - "cmt_msg": "kvm/x86: fix icebp instruction handling", - "cmt_id": "8c42170a40fb42726cae09f901b61d17ab56a465" + "CVE-2021-29647": { + "cmt_msg": "net: qrtr: fix a kernel-infoleak in qrtr_recvmsg()" }, - "CVE-2018-8781": { - "cmt_msg": "drm: udl: Properly check framebuffer mmap offsets", - "cmt_id": "01592437b0ec953300acf8be765721a62e0786b7" + "CVE-2023-6546": { + "cmt_msg": "tty: n_gsm: fix the UAF caused by race condition in gsm_cleanup_mux" }, - "CVE-2018-8897": { - "cmt_msg": "x86/entry/64: Don't use IST entry for #BP stack", - "cmt_id": "69a71b6b418c0052614e8325ca4e91ca4a3d6eef" - } - }, - "4.15.15": { - "CVE-2021-0935": { - "cmt_msg": "net: ipv6: keep sk status consistent after datagram connect failure", - "cmt_id": "812cb9e2340db3f86049b7a2c3cb8fefb0c5bea4" + "CVE-2020-14390": { + "cmt_msg": "fbcon: remove soft scrollback code" }, - "CVE-2018-1130": { - "cmt_msg": "dccp: check sk for closed state in dccp_sendmsg()", - "cmt_id": "5df0f40809d4ac73ce859681a689cfd328ae5788" - } - }, - "4.15.16": { - "CVE-2018-1000199": { - "cmt_msg": "perf/hwbp: Simplify the perf-hwbp code, fix documentation", - "cmt_id": "9b5b7c382e11be732ab63bdc872876e7c886de65" + "CVE-2021-45469": { + "cmt_msg": "f2fs: fix to do sanity check on last xattr entry in __f2fs_setxattr()" }, - "CVE-2017-17975": { - "cmt_msg": "media: usbtv: prevent double free in error case", - "cmt_id": "39fd6d09439714516b75d4b7b07b677f8e7da48e" - } - }, - "4.15.17": { - "CVE-2018-7757": { - "cmt_msg": "scsi: libsas: fix memory leak in sas_smp_get_phy_events()", - "cmt_id": "c16490ba27bb7c5bc5ebe22e50a607f84b6bf06f" - } - }, - "4.15.18": { - "CVE-2020-35513": { - "cmt_msg": "nfsd: fix incorrect umasks", - "cmt_id": "e4e64ce3fbc470a5b33a79f1a795e4746a7b50bb" - } - }, - "outstanding": { - "CVE-2020-36322": { - "cmt_msg": "fuse: fix bad inode" + "CVE-2024-0584": { + "cmt_msg": "ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet" }, - "CVE-2020-10711": { - "cmt_msg": "netlabel: cope with NULL catmap" + "CVE-2020-0465": { + "cmt_msg": "HID: core: Sanitize event code and type when mapping input" }, - "CVE-2019-15090": { - "cmt_msg": "scsi: qedi: remove memset/memcpy to nfunc and use func instead" + "CVE-2020-0466": { + "cmt_msg": "do_epoll_ctl(): clean the failure exits up a bit" }, - "CVE-2022-3649": { - "cmt_msg": "nilfs2: fix use-after-free bug of struct nilfs_root" + "CVE-2024-0340": { + "cmt_msg": "vhost: use kzalloc() instead of kmalloc() followed by memset()" }, - "CVE-2019-15099": { - "cmt_msg": "ath6kl: fix a NULL-ptr-deref bug in ath6kl_usb_alloc_urb_from_pipe()" + "CVE-2019-19523": { + "cmt_msg": "USB: adutux: fix use-after-free on disconnect" }, - "CVE-2019-15098": { - "cmt_msg": "ath6kl: fix a NULL-ptr-deref bug in ath6kl_usb_alloc_urb_from_pipe()" + "CVE-2019-11135": { + "cmt_msg": "x86/msr: Add the IA32_TSX_CTRL MSR" }, - "CVE-2020-29368": { - "cmt_msg": "mm: thp: make the THP mapcount atomic against __split_huge_pmd_locked()" + "CVE-2021-27365": { + "cmt_msg": "scsi: iscsi: Ensure sysfs attributes are limited to PAGE_SIZE" }, - "CVE-2022-0001": { - "cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE" + "CVE-2021-27364": { + "cmt_msg": "scsi: iscsi: Restrict sessions and handles to admin capabilities" }, - "CVE-2020-12464": { - "cmt_msg": "USB: core: Fix free-while-in-use bug in the USB S-Glibrary" + "CVE-2021-27363": { + "cmt_msg": "scsi: iscsi: Restrict sessions and handles to admin capabilities" }, - "CVE-2022-0002": { - "cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE" + "CVE-2021-20320": { + "cmt_msg": "s390/bpf: Fix optimizing out zero-extensions" }, - "CVE-2019-19965": { - "cmt_msg": "scsi: libsas: stop discovering if oob mode is disconnected" + "CVE-2021-20321": { + "cmt_msg": "ovl: fix missing negative dentry check in ovl_rename()" }, - "CVE-2019-19966": { - "cmt_msg": "media: cpia2: Fix use-after-free in cpia2_exit" + "CVE-2022-3169": { + "cmt_msg": "nvme: ensure subsystem reset is single threaded" }, - "CVE-2022-42703": { - "cmt_msg": "mm/rmap: Fix anon_vma->degree ambiguity leading to double-reuse" + "CVE-2018-20976": { + "cmt_msg": "xfs: clear sb->s_fs_info on mount failure" }, - "CVE-2020-35508": { - "cmt_msg": "fork: fix copy_process(CLONE_PARENT) race with the exiting ->real_parent" + "CVE-2023-22995": { + "cmt_msg": "usb: dwc3: dwc3-qcom: Add missing platform_device_put() in dwc3_qcom_acpi_register_core" }, - "CVE-2021-3894": { - "cmt_msg": "sctp: account stream padding length for reconf chunk" + "CVE-2021-3542": { + "cmt_msg": "" }, - "CVE-2020-24587": { - "cmt_msg": "mac80211: prevent mixed key and fragment cache attacks" + "CVE-2017-16650": { + "cmt_msg": "net: qmi_wwan: fix divide by 0 on bad descriptors" }, - "CVE-2020-24586": { - "cmt_msg": "mac80211: prevent mixed key and fragment cache attacks" + "CVE-2018-12929": { + "cmt_msg": "" }, - "CVE-2023-6270": { + "CVE-2018-12928": { "cmt_msg": "" }, - "CVE-2021-0129": { - "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical" + "CVE-2020-36310": { + "cmt_msg": "KVM: SVM: avoid infinite loop on NPF from bad address" }, - "CVE-2019-20096": { - "cmt_msg": "dccp: Fix memleak in __feat_register_sp" + "CVE-2020-36313": { + "cmt_msg": "KVM: Fix out of range accesses to memslots" }, - "CVE-2022-47520": { - "cmt_msg": "wifi: wilc1000: validate pairwise and authentication suite offsets" + "CVE-2020-35519": { + "cmt_msg": "net/x25: prevent a couple of overflows" }, - "CVE-2023-5717": { - "cmt_msg": "perf: Disallow mis-matched inherited group reads" + "CVE-2020-35513": { + "cmt_msg": "nfsd: fix incorrect umasks" }, - "CVE-2022-3643": { - "cmt_msg": "xen/netback: Ensure protocol headers don't fall in the non-linear area" + "CVE-2020-10708": { + "cmt_msg": "" }, - "CVE-2018-10940": { - "cmt_msg": "cdrom: information leak in cdrom_ioctl_media_changed()" + "CVE-2018-5344": { + "cmt_msg": "loop: fix concurrent lo_open/lo_release" }, - "CVE-2022-32250": { - "cmt_msg": "netfilter: nf_tables: disallow non-stateful expression in sets earlier" + "CVE-2017-12153": { + "cmt_msg": "nl80211: check for the required netlink attributes presence" }, - "CVE-2019-9506": { - "cmt_msg": "Bluetooth: Fix faulty expression for minimum encryption key size check" + "CVE-2017-12154": { + "cmt_msg": "kvm: nVMX: Don't allow L2 to access the hardware CR8" }, - "CVE-2019-9500": { - "cmt_msg": "brcmfmac: assure SSID length from firmware is limited" + "CVE-2022-21499": { + "cmt_msg": "lockdown: also lock down previous kgdb use" }, - "CVE-2019-9503": { - "cmt_msg": "brcmfmac: add subtype check for event handling in data path" + "CVE-2023-20593": { + "cmt_msg": "x86/cpu/amd: Add a Zenbleed fix" }, - "CVE-2020-36158": { - "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_cmd_802_11_ad_hoc_start" + "CVE-2022-2380": { + "cmt_msg": "video: fbdev: sm712fb: Fix crash in smtcfb_read()" }, - "CVE-2023-3159": { - "cmt_msg": "firewire: fix potential uaf in outbound_phy_packet_callback()" + "CVE-2022-0850": { + "cmt_msg": "ext4: fix kernel infoleak via ext4_extent_header" }, - "CVE-2022-0480": { - "cmt_msg": "memcg: enable accounting for file lock caches" + "CVE-2019-19447": { + "cmt_msg": "ext4: work around deleting a file with i_nlink == 0 safely" }, - "CVE-2022-0487": { - "cmt_msg": "moxart: fix potential use-after-free on remove path" + "CVE-2021-3612": { + "cmt_msg": "Input: joydev - prevent potential read overflow in ioctl" }, - "CVE-2023-52429": { - "cmt_msg": "dm: limit the number of targets and parameter size area" + "CVE-2019-19448": { + "cmt_msg": "btrfs: only search for left_info if there is no right_info in try_merge_free_space" }, - "CVE-2021-28964": { - "cmt_msg": "btrfs: fix race when cloning extent buffer during rewind of an old root" + "CVE-2019-19449": { + "cmt_msg": "f2fs: fix to do sanity check on segment/section count" }, - "CVE-2022-23825": { + "CVE-2020-11725": { "cmt_msg": "" }, - "CVE-2021-3847": { + "CVE-2023-30456": { + "cmt_msg": "KVM: nVMX: add missing consistency checks for CR0 and CR4" + }, + "CVE-2021-35477": { + "cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4" + }, + "CVE-2022-23041": { + "cmt_msg": "xen/9p: use alloc/free_pages_exact()" + }, + "CVE-2024-26758": { + "cmt_msg": "md: Don't ignore suspended array in md_check_recovery()" + }, + "CVE-2024-26759": { + "cmt_msg": "mm/swap: fix race when skipping swapcache" + }, + "CVE-2022-1729": { + "cmt_msg": "perf: Fix sys_perf_event_open() race against self" + }, + "CVE-2024-26752": { + "cmt_msg": "l2tp: pass correct message length to ip6_append_data" + }, + "CVE-2024-26754": { + "cmt_msg": "gtp: fix use-after-free and null-ptr-deref in gtp_genl_dump_pdp()" + }, + "CVE-2024-26756": { + "cmt_msg": "md: Don't register sync_thread for reshape directly" + }, + "CVE-2024-26757": { + "cmt_msg": "md: Don't ignore read-only array in md_check_recovery()" + }, + "CVE-2021-28038": { + "cmt_msg": "Xen/gnttab: handle p2m update errors on a per-slot basis" + }, + "CVE-2022-23040": { + "cmt_msg": "xen/xenbus: don't let xenbus_grant_ring() remove grants in error case" + }, + "CVE-2022-2964": { + "cmt_msg": "net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup" + }, + "CVE-2024-26689": { + "cmt_msg": "ceph: prevent use-after-free in encode_cap_msg()" + }, + "CVE-2019-9444": { + "cmt_msg": "printk: hash addresses printed with %p" + }, + "CVE-2022-2961": { "cmt_msg": "" }, - "CVE-2020-35501": { + "CVE-2024-26686": { + "cmt_msg": "fs/proc: do_task_stat: use sig->stats_lock to gather the threads/children stats" + }, + "CVE-2024-26687": { + "cmt_msg": "xen/events: close evtchn after mapping cleanup" + }, + "CVE-2023-3268": { + "cmt_msg": "relayfs: fix out-of-bounds access in relay_file_read" + }, + "CVE-2023-45871": { + "cmt_msg": "igb: set max size RX buffer when store bad packet is enabled" + }, + "CVE-2020-12114": { + "cmt_msg": "make struct mountpoint bear the dentry reference to mountpoint, not struct mount" + }, + "CVE-2021-4218": { + "cmt_msg": "sysctl: pass kernel pointers to ->proc_handler" + }, + "CVE-2023-0266": { + "cmt_msg": "ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF" + }, + "CVE-2019-10142": { + "cmt_msg": "drivers/virt/fsl_hypervisor.c: prevent integer overflow in ioctl" + }, + "CVE-2023-52640": { + "cmt_msg": "fs/ntfs3: Fix oob in ntfs_listxattr" + }, + "CVE-2023-52641": { + "cmt_msg": "fs/ntfs3: Add NULL ptr dereference checking at the end of attr_allocate_frame()" + }, + "CVE-2021-0399": { "cmt_msg": "" }, - "CVE-2018-20784": { - "cmt_msg": "sched/fair: Fix infinite loop in update_blocked_averages() by reverting a9e7f6544b9c" + "CVE-2023-52488": { + "cmt_msg": "serial: sc16is7xx: convert from _raw_ to _noinc_ regmap functions for FIFO" }, - "CVE-2019-10124": { - "cmt_msg": "mm: hwpoison: fix thp split handing in soft_offline_in_use_page()" + "CVE-2023-52489": { + "cmt_msg": "mm/sparsemem: fix race in accessing memory_section->usage" }, - "CVE-2019-9245": { - "cmt_msg": "f2fs: sanity check of xattr entry size" + "CVE-2023-52484": { + "cmt_msg": "iommu/arm-smmu-v3: Fix soft lockup triggered by arm_smmu_mm_invalidate_range" }, - "CVE-2024-26588": { - "cmt_msg": "LoongArch: BPF: Prevent out-of-bounds memory access" + "CVE-2020-2732": { + "cmt_msg": "KVM: nVMX: Don't emulate instructions in guest mode" }, - "CVE-2023-2162": { - "cmt_msg": "scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress" + "CVE-2023-52486": { + "cmt_msg": "drm: Don't unref the same fb many times by mistake due to deadlock handling" }, - "CVE-2022-21125": { - "cmt_msg": "x86/speculation/mmio: Reuse SRBDS mitigation for SBDS" + "CVE-2023-52480": { + "cmt_msg": "ksmbd: fix race condition between session lookup and expire" }, - "CVE-2019-19241": { - "cmt_msg": "io_uring: async workers should inherit the user creds" + "CVE-2023-52481": { + "cmt_msg": "arm64: errata: Add Cortex-A520 speculative unprivileged load workaround" }, - "CVE-2022-40307": { - "cmt_msg": "efi: capsule-loader: Fix use-after-free in efi_capsule_write" + "CVE-2023-52482": { + "cmt_msg": "x86/srso: Add SRSO mitigation for Hygon processors" }, - "CVE-2022-21123": { - "cmt_msg": "x86/speculation/mmio: Add mitigation for Processor MMIO Stale Data" + "CVE-2023-4128": { + "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free" }, - "CVE-2023-3390": { + "CVE-2021-47128": { + "cmt_msg": "bpf, lockdown, audit: Fix buggy SELinux lockdown permission checks" + }, + "CVE-2018-17182": { + "cmt_msg": "mm: get rid of vmacache_flush_all() entirely" + }, + "CVE-2021-47122": { + "cmt_msg": "net: caif: fix memory leak in caif_device_notify" + }, + "CVE-2021-47121": { + "cmt_msg": "net: caif: fix memory leak in cfusbl_device_notify" + }, + "CVE-2021-47125": { + "cmt_msg": "sch_htb: fix refcount leak in htb_parent_to_leaf_offload" + }, + "CVE-2021-47124": { + "cmt_msg": "io_uring: fix link timeout refs" + }, + "CVE-2019-15118": { + "cmt_msg": "ALSA: usb-audio: Fix a stack buffer overflow bug in check_input_term" + }, + "CVE-2019-12818": { + "cmt_msg": "net: nfc: Fix NULL dereference on nfc_llcp_build_tlv fails" + }, + "CVE-2019-12819": { + "cmt_msg": "mdio_bus: Fix use-after-free on device_register fails" + }, + "CVE-2023-0394": { + "cmt_msg": "ipv6: raw: Deduct extension header length in rawv6_push_pending_frames" + }, + "CVE-2019-19332": { + "cmt_msg": "KVM: x86: fix out-of-bounds write in KVM_GET_EMULATED_CPUID (CVE-2019-19332)" + }, + "CVE-2019-15117": { + "cmt_msg": "ALSA: usb-audio: Fix an OOB bug in parse_audio_mixer_unit" + }, + "CVE-2022-25258": { + "cmt_msg": "USB: gadget: validate interface OS descriptor requests" + }, + "CVE-2020-3702": { + "cmt_msg": "ath: Use safer key clearing with key cache entries" + }, + "CVE-2023-3117": { "cmt_msg": "netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE" }, - "CVE-2021-28688": { - "cmt_msg": "xen-blkback: don't leak persistent grants from xen_blkbk_map()" + "CVE-2018-10322": { + "cmt_msg": "xfs: enhance dinode verifier" }, - "CVE-2021-39686": { - "cmt_msg": "binder: use euid from cred instead of using task" + "CVE-2023-3111": { + "cmt_msg": "btrfs: unset reloc control if transaction commit fails in prepare_to_relocate()" }, - "CVE-2021-39685": { - "cmt_msg": "USB: gadget: detect too-big endpoint 0 requests" + "CVE-2024-24860": { + "cmt_msg": "Bluetooth: Fix atomicity violation in {min,max}_key_size_set" }, - "CVE-2023-6535": { + "CVE-2024-24861": { + "cmt_msg": "media: xc4000: Fix atomicity violation in xc4000_get_frequency" + }, + "CVE-2019-18675": { + "cmt_msg": "mmap: introduce sane default mmap limits" + }, + "CVE-2024-24864": { "cmt_msg": "" }, - "CVE-2021-43975": { - "cmt_msg": "atlantic: Fix OOB read and write in hw_atl_utils_fw_rpc_wait" + "CVE-2017-15128": { + "cmt_msg": "userfaultfd: hugetlbfs: prevent UFFDIO_COPY to fill beyond the end of i_size" }, - "CVE-2021-43976": { - "cmt_msg": "mwifiex: Fix skb_over_panic in mwifiex_usb_recv()" + "CVE-2017-16647": { + "cmt_msg": "net: usb: asix: fill null-ptr-deref in asix_suspend" }, - "CVE-2020-0466": { - "cmt_msg": "do_epoll_ctl(): clean the failure exits up a bit" + "CVE-2022-36946": { + "cmt_msg": "netfilter: nf_queue: do not allow packet truncation below transport header offset" }, - "CVE-2019-10207": { - "cmt_msg": "Bluetooth: hci_uart: check for missing tty operations" + "CVE-2018-19824": { + "cmt_msg": "ALSA: usb-audio: Fix UAF decrement if card has no live interfaces in card.c" }, - "CVE-2023-39189": { - "cmt_msg": "netfilter: nfnetlink_osf: avoid OOB read" + "CVE-2022-21166": { + "cmt_msg": "x86/speculation/mmio: Enable CPU Fill buffer clearing on idle" }, - "CVE-2018-10878": { - "cmt_msg": "ext4: always check block group bounds in ext4_init_block_bitmap()" + "CVE-2021-29650": { + "cmt_msg": "netfilter: x_tables: Use correct memory barriers." }, - "CVE-2018-1000200": { - "cmt_msg": "mm, oom: fix concurrent munlock and oom reaper unmap, v3" + "CVE-2018-20169": { + "cmt_msg": "USB: check usb_get_extra_descriptor for proper size" }, - "CVE-2023-0458": { - "cmt_msg": "prlimit: do_prlimit needs to have a speculation check" + "CVE-2020-36312": { + "cmt_msg": "KVM: fix memory leak in kvm_io_bus_unregister_dev()" }, - "CVE-2020-26141": { - "cmt_msg": "ath10k: Fix TKIP Michael MIC verification for PCIe" + "CVE-2022-28356": { + "cmt_msg": "llc: fix netdevice reference leaks in llc_ui_bind()" }, - "CVE-2018-1000204": { - "cmt_msg": "scsi: sg: allocate with __GFP_ZERO in sg_build_indirect()" + "CVE-2018-5750": { + "cmt_msg": "ACPI: sbshc: remove raw pointer from printk() message" }, - "CVE-2023-0597": { - "cmt_msg": "x86/mm: Randomize per-cpu entry area" + "CVE-2022-20166": { + "cmt_msg": "drivers core: Use sysfs_emit and sysfs_emit_at for show(device *...) functions" }, - "CVE-2019-12379": { - "cmt_msg": "consolemap: Fix a memory leaking bug in drivers/tty/vt/consolemap.c" + "CVE-2019-10220": { + "cmt_msg": "Convert filldir[64]() from __put_user() to unsafe_put_user()" }, - "CVE-2019-12378": { - "cmt_msg": "ipv6_sockglue: Fix a missing-check bug in ip6_ra_control()" + "CVE-2021-44879": { + "cmt_msg": "f2fs: fix to do sanity check on inode type during garbage collection" }, - "CVE-2021-3744": { - "cmt_msg": "crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd()" + "CVE-2020-9383": { + "cmt_msg": "floppy: check FDC index for errors before assigning it" }, - "CVE-2021-30002": { - "cmt_msg": "media: v4l: ioctl: Fix memory leak in video_usercopy" + "CVE-2023-1513": { + "cmt_msg": "kvm: initialize all of the kvm_debugregs structure before sending it to userspace" }, - "CVE-2021-3743": { - "cmt_msg": "net: qrtr: fix OOB Read in qrtr_endpoint_post" + "CVE-2021-26401": { + "cmt_msg": "x86/speculation: Use generic retpoline by default on AMD" }, - "CVE-2021-0941": { - "cmt_msg": "bpf: Remove MTU check in __bpf_skb_max_len" + "CVE-2021-3847": { + "cmt_msg": "" }, - "CVE-2022-2586": { - "cmt_msg": "netfilter: nf_tables: do not allow SET_ID to refer to another table" + "CVE-2019-9445": { + "cmt_msg": "f2fs: check if file namelen exceeds max value" }, - "CVE-2024-26591": { - "cmt_msg": "bpf: Fix re-attachment branch in bpf_tracing_prog_attach" + "CVE-2019-20934": { + "cmt_msg": "sched/fair: Don't free p->numa_faults with concurrent readers" }, - "CVE-2020-15802": { + "CVE-2011-4916": { "cmt_msg": "" }, - "CVE-2023-6610": { - "cmt_msg": "smb: client: fix potential OOB in smb2_dump_detail()" - }, - "CVE-2023-2483": { - "cmt_msg": "net: qcom/emac: Fix use after free bug in emac_remove due to race condition" + "CVE-2023-23039": { + "cmt_msg": "" }, - "CVE-2019-3460": { - "cmt_msg": "Bluetooth: Check L2CAP option sizes returned from l2cap_get_conf_opt" + "CVE-2017-16646": { + "cmt_msg": "media: dib0700: fix invalid dvb_detach argument" }, - "CVE-2022-3636": { - "cmt_msg": "net: ethernet: mtk_eth_soc: use after free in __mtk_ppe_check_skb()" + "CVE-2017-16645": { + "cmt_msg": "Input: ims-psu - check if CDC union descriptor is sane" }, - "CVE-2022-3635": { - "cmt_msg": "atm: idt77252: fix use-after-free bugs caused by tst_timer" + "CVE-2017-16644": { + "cmt_msg": "media: hdpvr: Fix an error handling path in hdpvr_probe()" }, - "CVE-2021-34556": { - "cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4" + "CVE-2017-16643": { + "cmt_msg": "Input: gtco - fix potential out-of-bound access" }, - "CVE-2020-0543": { - "cmt_msg": "x86/cpu: Add 'table' argument to cpu_matches()" + "CVE-2019-5489": { + "cmt_msg": "Change mincore() to count \"mapped\" pages rather than \"cached\" pages" }, - "CVE-2022-40982": { - "cmt_msg": "x86/speculation: Add Gather Data Sampling mitigation" + "CVE-2017-16649": { + "cmt_msg": "net: cdc_ether: fix divide by 0 on bad descriptors" }, - "CVE-2022-3202": { - "cmt_msg": "jfs: prevent NULL deref in diFree" + "CVE-2017-16648": { + "cmt_msg": "dvb_frontend: don't use-after-free the frontend struct" }, - "CVE-2022-45919": { - "cmt_msg": "media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221" + "CVE-2020-36322": { + "cmt_msg": "fuse: fix bad inode" }, - "CVE-2018-3646": { - "cmt_msg": "x86/microcode: Allow late microcode loading with SMT disabled" + "CVE-2020-10711": { + "cmt_msg": "netlabel: cope with NULL catmap" }, - "CVE-2019-11085": { - "cmt_msg": "drm/i915/gvt: Fix mmap range check" + "CVE-2020-35508": { + "cmt_msg": "fork: fix copy_process(CLONE_PARENT) race with the exiting ->real_parent" }, - "CVE-2024-24861": { + "CVE-2020-35501": { "cmt_msg": "" }, - "CVE-2019-11477": { - "cmt_msg": "tcp: limit payload size of sacked skbs" + "CVE-2021-45095": { + "cmt_msg": "phonet: refcount leak in pep_sock_accep" }, - "CVE-2021-28711": { - "cmt_msg": "xen/blkfront: harden blkfront against event channel storms" + "CVE-2024-26685": { + "cmt_msg": "nilfs2: fix potential bug in end_buffer_async_write" }, - "CVE-2018-14615": { - "cmt_msg": "f2fs: fix to do sanity check with i_extra_isize" + "CVE-2021-32399": { + "cmt_msg": "bluetooth: eliminate the potential race condition when removing the HCI controller" }, - "CVE-2018-14614": { - "cmt_msg": "f2fs: fix to do sanity check with cp_pack_start_sum" + "CVE-2017-1000410": { + "cmt_msg": "Bluetooth: Prevent stack info leak from the EFS element." }, - "CVE-2019-11479": { - "cmt_msg": "tcp: add tcp_min_snd_mss sysctl" + "CVE-2022-32250": { + "cmt_msg": "netfilter: nf_tables: disallow non-stateful expression in sets earlier" }, - "CVE-2019-11478": { - "cmt_msg": "tcp: tcp_fragment() should apply sane memory limits" + "CVE-2021-28688": { + "cmt_msg": "xen-blkback: don't leak persistent grants from xen_blkbk_map()" }, - "CVE-2018-14611": { - "cmt_msg": "btrfs: validate type when reading a chunk" + "CVE-2019-14835": { + "cmt_msg": "vhost: make sure log_num < in_num" }, - "CVE-2018-14610": { - "cmt_msg": "btrfs: Check that each block group has corresponding chunk at mount time" + "CVE-2019-12379": { + "cmt_msg": "consolemap: Fix a memory leaking bug in drivers/tty/vt/consolemap.c" }, - "CVE-2018-14613": { - "cmt_msg": "btrfs: tree-checker: Verify block_group_item" + "CVE-2019-12378": { + "cmt_msg": "ipv6_sockglue: Fix a missing-check bug in ip6_ra_control()" }, - "CVE-2018-14612": { - "cmt_msg": "btrfs: tree-checker: Detect invalid and empty essential trees" + "CVE-2017-18379": { + "cmt_msg": "nvmet-fc: ensure target queue id within range." }, "CVE-2020-26145": { "cmt_msg": "ath10k: drop fragments with multicast DA for PCIe" }, - "CVE-2023-51782": { - "cmt_msg": "net/rose: Fix Use-After-Free in rose_ioctl" + "CVE-2017-13216": { + "cmt_msg": "staging: android: ashmem: fix a race condition in ASHMEM_SET_SIZE ioctl" }, "CVE-2020-26147": { "cmt_msg": "mac80211: assure all fragments are encrypted" }, - "CVE-2018-5814": { - "cmt_msg": "usbip: usbip_host: fix NULL-ptr deref and use-after-free errors" + "CVE-2020-26141": { + "cmt_msg": "ath10k: Fix TKIP Michael MIC verification for PCIe" }, "CVE-2020-26140": { "cmt_msg": "" @@ -16187,15 +15996,6 @@ "CVE-2019-17052": { "cmt_msg": "ax25: enforce CAP_NET_RAW for raw sockets" }, - "CVE-2023-1076": { - "cmt_msg": "tun: tun_chr_open(): correctly initialize socket uid" - }, - "CVE-2023-1077": { - "cmt_msg": "sched/rt: pick_next_rt_entity(): check list_entry" - }, - "CVE-2020-27418": { - "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region" - }, "CVE-2019-17056": { "cmt_msg": "nfc: enforce CAP_NET_RAW for raw sockets" }, @@ -16205,23 +16005,17 @@ "CVE-2019-17054": { "cmt_msg": "appletalk: enforce CAP_NET_RAW for raw sockets" }, - "CVE-2018-13093": { - "cmt_msg": "xfs: validate cached inodes are free when allocated" - }, - "CVE-2023-51042": { - "cmt_msg": "drm/amdgpu: Fix potential fence use-after-free v2" - }, - "CVE-2018-13096": { - "cmt_msg": "f2fs: fix to do sanity check with node footer and iblocks" + "CVE-2024-26745": { + "cmt_msg": "powerpc/pseries/iommu: IOMMU table is not initialized for kdump over SR-IOV" }, - "CVE-2018-13097": { - "cmt_msg": "f2fs: fix to do sanity check with user_block_count" + "CVE-2024-26744": { + "cmt_msg": "RDMA/srpt: Support specifying the srpt_service_guid parameter" }, - "CVE-2018-13094": { - "cmt_msg": "xfs: don't call xfs_da_shrink_inode with NULL bp" + "CVE-2024-26743": { + "cmt_msg": "RDMA/qedr: Fix qedr_create_user_qp error flow" }, - "CVE-2018-13095": { - "cmt_msg": "xfs: More robust inode extent count validation" + "CVE-2024-26740": { + "cmt_msg": "net/sched: act_mirred: use the backlog for mirred ingress" }, "CVE-2020-29661": { "cmt_msg": "tty: Fix ->pgrp locking in tiocspgrp()" @@ -16229,77 +16023,35 @@ "CVE-2020-29660": { "cmt_msg": "tty: Fix ->session locking" }, - "CVE-2018-13098": { - "cmt_msg": "f2fs: fix to do sanity check with extra_attr feature" - }, - "CVE-2019-2024": { - "cmt_msg": "media: em28xx: Fix use-after-free when disconnecting" - }, "CVE-2022-1734": { "cmt_msg": "nfc: nfcmrvl: main: reorder destructive operations in nfcmrvl_nci_unregister_dev to avoid bugs" }, + "CVE-2024-26748": { + "cmt_msg": "usb: cdns3: fix memory double free when handle zero packet" + }, "CVE-2023-28772": { "cmt_msg": "seq_buf: Fix overflow in seq_buf_putmem_hex()" }, - "CVE-2019-19770": { - "cmt_msg": "blktrace: fix debugfs use after free" - }, - "CVE-2019-11884": { - "cmt_msg": "Bluetooth: hidp: fix buffer overflow" - }, - "CVE-2019-19078": { - "cmt_msg": "ath10k: fix memory leak" - }, - "CVE-2019-19075": { - "cmt_msg": "ieee802154: ca8210: prevent memory leak" - }, - "CVE-2019-19074": { - "cmt_msg": "ath9k: release allocated buffer if timed out" - }, - "CVE-2019-19073": { - "cmt_msg": "ath9k_htc: release allocated buffer if timed out" - }, - "CVE-2022-2503": { - "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag" - }, - "CVE-2019-19071": { - "cmt_msg": "rsi: release skb if rsi_prepare_beacon fails" - }, - "CVE-2019-18680": { - "cmt_msg": "" - }, - "CVE-2022-23038": { - "cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()" - }, - "CVE-2022-23039": { - "cmt_msg": "xen/gntalloc: don't use gnttab_query_foreign_access()" - }, - "CVE-2022-20154": { - "cmt_msg": "sctp: use call_rcu to free endpoint" - }, - "CVE-2021-27363": { - "cmt_msg": "scsi: iscsi: Restrict sessions and handles to admin capabilities" - }, - "CVE-2022-20158": { - "cmt_msg": "net/packet: fix slab-out-of-bounds access in packet_recvmsg()" + "CVE-2024-26699": { + "cmt_msg": "drm/amd/display: Fix array-index-out-of-bounds in dcn35_clkmgr" }, - "CVE-2022-23037": { - "cmt_msg": "xen/netfront: don't use gnttab_query_foreign_access() for mapped status" + "CVE-2024-26691": { + "cmt_msg": "KVM: arm64: Fix circular locking dependency" }, - "CVE-2024-0564": { - "cmt_msg": "" + "CVE-2022-4269": { + "cmt_msg": "act_mirred: use the backlog for nested calls to mirred ingress" }, - "CVE-2020-0404": { - "cmt_msg": "media: uvcvideo: Avoid cyclic entity chains due to malformed USB descriptors" + "CVE-2024-26697": { + "cmt_msg": "nilfs2: fix data corruption in dsync block recovery for small block sizes" }, - "CVE-2019-15925": { - "cmt_msg": "net: hns3: add some error checking in hclge_tm module" + "CVE-2024-26696": { + "cmt_msg": "nilfs2: fix hang in nilfs_lookup_dirty_data_buffers()" }, "CVE-2019-15924": { "cmt_msg": "fm10k: Fix a potential NULL pointer dereference" }, - "CVE-2019-15538": { - "cmt_msg": "xfs: fix missing ILOCK unlock when xfs_setattr_nonsize fails due to EDQUOT" + "CVE-2019-15927": { + "cmt_msg": "ALSA: usb-audio: Avoid access before bLength check in build_audio_procunit()" }, "CVE-2019-15926": { "cmt_msg": "ath6kl: add some bounds checking" @@ -16307,36 +16059,15 @@ "CVE-2019-15921": { "cmt_msg": "genetlink: Fix a memory leak on error path" }, - "CVE-2020-10757": { - "cmt_msg": "mm: Fix mremap not considering huge pmd devmap" - }, - "CVE-2019-14821": { - "cmt_msg": "KVM: coalesced_mmio: add bounds checking" - }, - "CVE-2020-12826": { - "cmt_msg": "signal: Extend exec_id to 64bits" - }, - "CVE-2019-3701": { - "cmt_msg": "can: gw: ensure DLC boundaries after CAN frame modification" - }, - "CVE-2021-42008": { - "cmt_msg": "net: 6pack: fix slab-out-of-bounds in decode_data" - }, - "CVE-2022-39188": { - "cmt_msg": "mmu_gather: Force tlb-flush VM_PFNMAP vmas" + "CVE-2021-38160": { + "cmt_msg": "virtio_console: Assure used length from device is limited" }, - "CVE-2019-1125": { - "cmt_msg": "x86/speculation: Prepare entry code for Spectre v1 swapgs mitigations" + "CVE-2019-15219": { + "cmt_msg": "USB: sisusbvga: fix oops in error path of sisusb_probe" }, "CVE-2019-15218": { "cmt_msg": "media: usb: siano: Fix general protection fault in smsusb" }, - "CVE-2019-15666": { - "cmt_msg": "xfrm: policy: Fix out-of-bound array accesses in __xfrm_policy_unlink" - }, - "CVE-2020-25641": { - "cmt_msg": "block: allow for_each_bvec to support zero len bvec" - }, "CVE-2005-3660": { "cmt_msg": "" }, @@ -16346,9 +16077,6 @@ "CVE-2019-15211": { "cmt_msg": "media: radio-raremono: change devm_k*alloc to k*alloc" }, - "CVE-2023-31084": { - "cmt_msg": "media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*()" - }, "CVE-2019-15217": { "cmt_msg": "media: usb:zr364xx:Fix KASAN:null-ptr-deref Read in zr364xx_vidioc_querycap" }, @@ -16361,8822 +16089,6512 @@ "CVE-2019-15214": { "cmt_msg": "ALSA: core: Fix card races between register and disconnect" }, - "CVE-2020-24588": { - "cmt_msg": "cfg80211: mitigate A-MSDU aggregation attacks" - }, - "CVE-2021-33034": { - "cmt_msg": "Bluetooth: verify AMP hci_chan before amp_destroy" - }, "CVE-2019-19922": { "cmt_msg": "sched/fair: Fix low cpu usage with high throttling by removing expiration of cpu-local slices" }, - "CVE-2021-33033": { - "cmt_msg": "cipso,calipso: resolve a number of problems with the DOI refcounts" - }, "CVE-2019-19927": { "cmt_msg": "drm/ttm: fix incrementing the page pointer for huge pages" }, - "CVE-2020-27066": { - "cmt_msg": "xfrm: policy: Fix doulbe free in xfrm_policy_timer" - }, - "CVE-2020-27068": { - "cmt_msg": "cfg80211: add missing policy for NL80211_ATTR_STATUS_CODE" - }, - "CVE-2024-23307": { - "cmt_msg": "" - }, - "CVE-2020-8648": { - "cmt_msg": "vt: selection, close sel_buffer race" + "CVE-2023-52498": { + "cmt_msg": "PM: sleep: Fix possible deadlocks in core system-wide PM code" }, - "CVE-2022-32296": { - "cmt_msg": "tcp: increase source port perturb table to 2^16" + "CVE-2023-52491": { + "cmt_msg": "media: mtk-jpeg: Fix use after free bug due to error path handling in mtk_jpeg_dec_device_run" }, - "CVE-2020-28974": { - "cmt_msg": "vt: Disable KD_FONT_OP_COPY" + "CVE-2022-2318": { + "cmt_msg": "net: rose: fix UAF bugs caused by timer handler" }, - "CVE-2023-3567": { - "cmt_msg": "vc_screen: move load of struct vc_data pointer in vcs_read() to avoid UAF" + "CVE-2023-3611": { + "cmt_msg": "net/sched: sch_qfq: account for stab overhead in qfq_enqueue" }, - "CVE-2019-20806": { - "cmt_msg": "media: tw5864: Fix possible NULL pointer dereference in tw5864_handle_frame" + "CVE-2023-4132": { + "cmt_msg": "media: usb: siano: Fix warning due to null work_func_t function pointer" }, - "CVE-2022-3028": { - "cmt_msg": "af_key: Do not call xfrm_probe_algs in parallel" + "CVE-2020-26560": { + "cmt_msg": "" }, - "CVE-2020-0305": { - "cmt_msg": "chardev: Avoid potential use-after-free in 'chrdev_open()'" + "CVE-2023-4134": { + "cmt_msg": "Input: cyttsp4_core - change del_timer_sync() to timer_shutdown_sync()" }, - "CVE-2020-14304": { + "CVE-2023-37454": { "cmt_msg": "" }, - "CVE-2010-5321": { - "cmt_msg": "" + "CVE-2023-35824": { + "cmt_msg": "media: dm1105: Fix use after free bug in dm1105_remove due to race condition" }, - "CVE-2020-15393": { - "cmt_msg": "usb: usbtest: fix missing kfree(dev->buf) in usbtest_disconnect" + "CVE-2022-20572": { + "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag" }, - "CVE-2023-23000": { - "cmt_msg": "phy: tegra: xusb: Fix return value of tegra_xusb_find_port_node function" + "CVE-2022-42703": { + "cmt_msg": "mm/rmap: Fix anon_vma->degree ambiguity leading to double-reuse" }, - "CVE-2019-19082": { - "cmt_msg": "drm/amd/display: prevent memory leak" + "CVE-2021-4083": { + "cmt_msg": "fget: check that the fd still exists after getting a ref to it" }, - "CVE-2021-3564": { - "cmt_msg": "Bluetooth: fix the erroneous flush_work() order" + "CVE-2023-33288": { + "cmt_msg": "power: supply: bq24190: Fix use after free bug in bq24190_remove due to race condition" }, - "CVE-2023-3611": { - "cmt_msg": "net/sched: sch_qfq: account for stab overhead in qfq_enqueue" + "CVE-2017-1000252": { + "cmt_msg": "KVM: VMX: Do not BUG() on out-of-bounds guest IRQ" }, - "CVE-2023-1476": { - "cmt_msg": "" + "CVE-2022-29901": { + "cmt_msg": "x86/kvm/vmx: Make noinstr clean" }, - "CVE-2019-18675": { - "cmt_msg": "mmap: introduce sane default mmap limits" + "CVE-2017-1000255": { + "cmt_msg": "powerpc/64s: Use emergency stack for kernel TM Bad Thing program checks" }, - "CVE-2023-4132": { - "cmt_msg": "media: usb: siano: Fix warning due to null work_func_t function pointer" + "CVE-2023-52485": { + "cmt_msg": "drm/amd/display: Wake DMCUB before sending a command" }, - "CVE-2023-4133": { - "cmt_msg": "cxgb4: fix use after free bugs caused by circular dependency problem" + "CVE-2018-20511": { + "cmt_msg": "net/appletalk: fix minor pointer leak to userspace in SIOCFINDIPDDPRT" }, - "CVE-2020-26560": { - "cmt_msg": "" + "CVE-2018-20510": { + "cmt_msg": "binder: replace \"%p\" with \"%pK\"" }, - "CVE-2023-35823": { - "cmt_msg": "media: saa7134: fix use after free bug in saa7134_finidev due to race condition" + "CVE-2022-3567": { + "cmt_msg": "ipv6: Fix data races around sk->sk_prot." }, - "CVE-2022-38096": { - "cmt_msg": "" + "CVE-2022-3566": { + "cmt_msg": "tcp: Fix data races around icsk->icsk_af_ops." }, - "CVE-2018-18397": { - "cmt_msg": "userfaultfd: use ENOENT instead of EFAULT if the atomic copy user fails" + "CVE-2022-3565": { + "cmt_msg": "mISDN: fix use-after-free bugs in l1oip timer handlers" }, - "CVE-2018-12127": { - "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" + "CVE-2022-3564": { + "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free caused by l2cap_reassemble_sdu" }, - "CVE-2018-12126": { - "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" + "CVE-2023-0030": { + "cmt_msg": "drm/nouveau/mmu: add more general vmm free/node handling functions" }, - "CVE-2022-23816": { - "cmt_msg": "x86/kvm/vmx: Make noinstr clean" + "CVE-2019-11599": { + "cmt_msg": "coredump: fix race condition between mmget_not_zero()/get_task_mm() and core dumping" }, - "CVE-2023-37454": { - "cmt_msg": "" + "CVE-2019-2101": { + "cmt_msg": "media: uvcvideo: Fix 'type' check leading to overflow" }, - "CVE-2021-3892": { - "cmt_msg": "" + "CVE-2019-3459": { + "cmt_msg": "Bluetooth: Verify that l2cap_get_conf_opt provides large enough buffer" }, - "CVE-2022-20572": { - "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag" + "CVE-2020-0444": { + "cmt_msg": "audit: fix error handling in audit_data_to_entry()" }, - "CVE-2018-10021": { - "cmt_msg": "scsi: libsas: defer ata device eh commands to libata" + "CVE-2017-16526": { + "cmt_msg": "uwb: properly check kthread_run return value" }, - "CVE-2023-39194": { - "cmt_msg": "net: xfrm: Fix xfrm_address_filter OOB read" + "CVE-2017-16527": { + "cmt_msg": "ALSA: usb-audio: Kill stray URB at exiting" }, - "CVE-2023-2002": { - "cmt_msg": "bluetooth: Perform careful capability checks in hci_sock_ioctl()" + "CVE-2017-16525": { + "cmt_msg": "USB: serial: console: fix use-after-free after failed setup" }, - "CVE-2023-39197": { - "cmt_msg": "netfilter: conntrack: dccp: copy entire header to stack buffer, not just basic one" + "CVE-2022-1836": { + "cmt_msg": "floppy: disable FDRAWCMD by default" }, - "CVE-2019-10126": { - "cmt_msg": "mwifiex: Fix heap overflow in mwifiex_uap_parse_tail_ies()" + "CVE-2017-16528": { + "cmt_msg": "ALSA: seq: Cancel pending autoload work at unbinding device" }, - "CVE-2019-13631": { - "cmt_msg": "Input: gtco - bounds check collection indent level" + "CVE-2017-16529": { + "cmt_msg": "ALSA: usb-audio: Check out-of-bounds access by corrupted buffer descriptor" }, - "CVE-2020-13974": { - "cmt_msg": "vt: keyboard: avoid signed integer overflow in k_ascii" + "CVE-2019-2215": { + "cmt_msg": "ANDROID: binder: remove waitqueue when thread exits." }, - "CVE-2021-4083": { - "cmt_msg": "fget: check that the fd still exists after getting a ref to it" + "CVE-2019-2213": { + "cmt_msg": "binder: fix possible UAF when freeing buffer" }, - "CVE-2023-33288": { - "cmt_msg": "power: supply: bq24190: Fix use after free bug in bq24190_remove due to race condition" + "CVE-2018-1087": { + "cmt_msg": "kvm/x86: fix icebp instruction handling" }, - "CVE-2022-36402": { - "cmt_msg": "drm/vmwgfx: Fix shader stage validation" + "CVE-2019-19049": { + "cmt_msg": "of: unittest: fix memory leak in unittest_data_add" }, - "CVE-2022-29900": { - "cmt_msg": "x86/kvm/vmx: Make noinstr clean" + "CVE-2018-13053": { + "cmt_msg": "alarmtimer: Prevent overflow for relative nanosleep" }, - "CVE-2022-29901": { - "cmt_msg": "x86/kvm/vmx: Make noinstr clean" + "CVE-2023-23559": { + "cmt_msg": "wifi: rndis_wlan: Prevent buffer overflow in rndis_query_oid" }, - "CVE-2021-4197": { - "cmt_msg": "cgroup: Use open-time credentials for process migraton perm checks" + "CVE-2020-10720": { + "cmt_msg": "net-gro: fix use-after-free read in napi_gro_frags()" }, - "CVE-2018-12233": { - "cmt_msg": "jfs: Fix inconsistency between memory allocation and ea_buf->max_size" + "CVE-2018-12904": { + "cmt_msg": "kvm: nVMX: Enforce cpl=0 for VMX instructions" }, - "CVE-2019-19227": { - "cmt_msg": "appletalk: Fix potential NULL pointer dereference in unregister_snap_client" + "CVE-2018-21008": { + "cmt_msg": "rsi: add fix for crash during assertions" }, - "CVE-2020-10751": { - "cmt_msg": "selinux: properly handle multiple messages in selinux_netlink_send()" + "CVE-2022-20368": { + "cmt_msg": "net/packet: fix slab-out-of-bounds access in packet_recvmsg()" }, - "CVE-2023-39192": { - "cmt_msg": "netfilter: xt_u32: validate user space input" + "CVE-2022-3424": { + "cmt_msg": "misc: sgi-gru: fix use-after-free error in gru_set_context_option, gru_fault and gru_handle_user_call_os" }, - "CVE-2019-16229": { - "cmt_msg": "drm/amdkfd: fix a potential NULL pointer dereference (v2)" + "CVE-2019-5108": { + "cmt_msg": "mac80211: Do not send Layer 2 Update frame before authorization" }, - "CVE-2018-20511": { - "cmt_msg": "net/appletalk: fix minor pointer leak to userspace in SIOCFINDIPDDPRT" + "CVE-2017-1000405": { + "cmt_msg": "mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d()" }, - "CVE-2022-20166": { - "cmt_msg": "drivers core: Use sysfs_emit and sysfs_emit_at for show(device *...) functions" + "CVE-2017-1000407": { + "cmt_msg": "KVM: VMX: remove I/O port 0x80 bypass on Intel hosts" }, - "CVE-2019-14763": { - "cmt_msg": "usb: dwc3: gadget: never call ->complete() from ->ep_queue()" + "CVE-2022-24448": { + "cmt_msg": "NFSv4: Handle case where the lookup of a directory fails" }, - "CVE-2020-15437": { - "cmt_msg": "serial: 8250: fix null-ptr-deref in serial8250_start_tx()" + "CVE-2020-0427": { + "cmt_msg": "pinctrl: devicetree: Avoid taking direct reference to device name string" }, - "CVE-2020-15436": { - "cmt_msg": "block: Fix use-after-free in blkdev_get()" + "CVE-2020-26088": { + "cmt_msg": "net/nfc/rawsock.c: add CAP_NET_RAW check." }, - "CVE-2022-1116": { + "CVE-2008-2544": { "cmt_msg": "" }, - "CVE-2021-28660": { - "cmt_msg": "staging: rtl8188eu: prevent ->ssid overflow in rtw_wx_set_scan()" + "CVE-2019-19462": { + "cmt_msg": "kernel/relay.c: handle alloc_percpu returning NULL in relay_open" }, - "CVE-2024-0775": { - "cmt_msg": "ext4: improve error recovery code paths in __ext4_remount()" + "CVE-2023-30772": { + "cmt_msg": "power: supply: da9150: Fix use after free bug in da9150_charger_remove due to race condition" }, - "CVE-2020-8647": { - "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region" + "CVE-2021-3679": { + "cmt_msg": "tracing: Fix bug in rb_per_cpu_empty() that might cause deadloop." }, - "CVE-2019-0155": { - "cmt_msg": "drm/i915: Rename gen7 cmdparser tables" + "CVE-2022-2586": { + "cmt_msg": "netfilter: nf_tables: do not allow SET_ID to refer to another table" }, - "CVE-2019-0154": { - "cmt_msg": "drm/i915: Lower RM timeout to avoid DSI hard hangs" + "CVE-2023-51782": { + "cmt_msg": "net/rose: Fix Use-After-Free in rose_ioctl" }, - "CVE-2023-35827": { - "cmt_msg": "ravb: Fix use-after-free issue in ravb_tx_timeout_work()" + "CVE-2023-51780": { + "cmt_msg": "atm: Fix Use-After-Free in do_vcc_ioctl" }, - "CVE-2021-3600": { - "cmt_msg": "bpf: Fix 32 bit src register truncation on div/mod" + "CVE-2023-51781": { + "cmt_msg": "appletalk: Fix Use-After-Free in atalk_ioctl" }, - "CVE-2020-36386": { - "cmt_msg": "Bluetooth: Fix slab-out-of-bounds read in hci_extended_inquiry_result_evt()" + "CVE-2022-2588": { + "cmt_msg": "net_sched: cls_route: remove from list when handle is 0" }, - "CVE-2022-3567": { - "cmt_msg": "ipv6: Fix data races around sk->sk_prot." + "CVE-2019-18885": { + "cmt_msg": "btrfs: merge btrfs_find_device and find_device" }, - "CVE-2022-3566": { - "cmt_msg": "tcp: Fix data races around icsk->icsk_af_ops." + "CVE-2017-14489": { + "cmt_msg": "scsi: scsi_transport_iscsi: fix the issue that iscsi_if_rx doesn't parse nlmsg properly" }, - "CVE-2022-3565": { - "cmt_msg": "mISDN: fix use-after-free bugs in l1oip timer handlers" + "CVE-2024-26733": { + "cmt_msg": "arp: Prevent overflow in arp_req_get()." }, - "CVE-2022-3564": { - "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free caused by l2cap_reassemble_sdu" + "CVE-2024-26735": { + "cmt_msg": "ipv6: sr: fix possible use-after-free and null-ptr-deref" }, - "CVE-2018-19407": { - "cmt_msg": "KVM: X86: Fix scan ioapic use-before-initialization" + "CVE-2024-26738": { + "cmt_msg": "powerpc/pseries/iommu: DLPAR add doesn't completely initialize pci_controller" }, - "CVE-2020-36385": { - "cmt_msg": "RDMA/ucma: Rework ucma_migrate_id() to avoid races with destroy" + "CVE-2024-26739": { + "cmt_msg": "net/sched: act_mirred: don't override retval if we already lost the skb" }, - "CVE-2022-3628": { - "cmt_msg": "wifi: brcmfmac: Fix potential buffer overflow in brcmf_fweh_event_worker()" + "CVE-2022-38096": { + "cmt_msg": "" }, - "CVE-2018-9385": { - "cmt_msg": "ARM: amba: Don't read past the end of sysfs \"driver_override\" buffer" + "CVE-2017-5715": { + "cmt_msg": "x86/cpufeatures: Add X86_BUG_SPECTRE_V[12]" }, - "CVE-2020-0009": { - "cmt_msg": "staging: android: ashmem: Disallow ashmem memory from being remapped" + "CVE-2018-3620": { + "cmt_msg": "x86/microcode: Allow late microcode loading with SMT disabled" }, - "CVE-2023-52340": { - "cmt_msg": "ipv6: remove max_size check inline with ipv4" + "CVE-2020-16166": { + "cmt_msg": "random32: update the net random state on interrupt and activity" }, - "CVE-2020-7053": { - "cmt_msg": "drm/i915: Introduce a mutex for file_priv->context_idr" + "CVE-2021-33631": { + "cmt_msg": "ext4: fix kernel BUG in 'ext4_write_inline_data_end()'" }, - "CVE-2023-28466": { - "cmt_msg": "net: tls: fix possible race condition between do_tls_getsockopt_conf() and do_tls_setsockopt_conf()" + "CVE-2019-15916": { + "cmt_msg": "net-sysfs: Fix mem leak in netdev_register_kobject" }, - "CVE-2019-14615": { - "cmt_msg": "drm/i915/gen9: Clear residual context state on context switch" + "CVE-2019-15917": { + "cmt_msg": "Bluetooth: hci_ldisc: Postpone HCI_UART_PROTO_READY bit set in hci_uart_set_proto()" }, - "CVE-2018-16871": { - "cmt_msg": "nfsd: COPY and CLONE operations require the saved filehandle to be set" + "CVE-2017-18344": { + "cmt_msg": "posix-timer: Properly check sigevent->sigev_notify" }, - "CVE-2018-9415": { - "cmt_msg": "ARM: amba: Fix race condition with driver_override" + "CVE-2024-26648": { + "cmt_msg": "drm/amd/display: Fix variable deferencing before NULL check in edp_setup_replay()" }, - "CVE-2019-13648": { - "cmt_msg": "powerpc/tm: Fix oops on sigreturn on systems without TM" + "CVE-2024-26646": { + "cmt_msg": "thermal: intel: hfi: Add syscore callbacks for system-wide PM" }, - "CVE-2023-0030": { - "cmt_msg": "drm/nouveau/mmu: add more general vmm free/node handling functions" + "CVE-2018-18690": { + "cmt_msg": "xfs: don't fail when converting shortform attr to long form during ATTR_REPLACE" }, - "CVE-2020-16120": { - "cmt_msg": "ovl: switch to mounter creds in readdir" + "CVE-2024-26644": { + "cmt_msg": "btrfs: don't abort filesystem when attempting to snapshot deleted subvolume" }, - "CVE-2019-11599": { - "cmt_msg": "coredump: fix race condition between mmget_not_zero()/get_task_mm() and core dumping" + "CVE-2024-26642": { + "cmt_msg": "netfilter: nf_tables: disallow anonymous set with timeout flag" }, - "CVE-2018-16658": { - "cmt_msg": "cdrom: Fix info leak/OOB read in cdrom_ioctl_drive_status" + "CVE-2017-0627": { + "cmt_msg": "media: uvcvideo: Prevent heap overflow when accessing mapped controls" }, - "CVE-2018-15572": { - "cmt_msg": "x86/speculation: Protect against userspace-userspace spectreRSB" + "CVE-2024-26641": { + "cmt_msg": "ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv()" }, - "CVE-2021-0342": { - "cmt_msg": "tun: correct header offsets in napi frags mode" + "CVE-2023-52464": { + "cmt_msg": "EDAC/thunderx: Fix possible out-of-bounds string access" }, - "CVE-2022-1204": { - "cmt_msg": "ax25: Fix refcount leaks caused by ax25_cb_del()" + "CVE-2018-25020": { + "cmt_msg": "bpf: fix truncated jump targets on heavy expansions" }, - "CVE-2019-2101": { - "cmt_msg": "media: uvcvideo: Fix 'type' check leading to overflow" + "CVE-2023-52469": { + "cmt_msg": "drivers/amd/pm: fix a use-after-free in kv_parse_power_table" }, - "CVE-2019-17666": { - "cmt_msg": "rtlwifi: Fix potential overflow on P2P code" + "CVE-2021-46904": { + "cmt_msg": "net: hso: fix null-ptr-deref during tty device unregistration" }, - "CVE-2021-23133": { - "cmt_msg": "net/sctp: fix race condition in sctp_destroy_sock" + "CVE-2018-7273": { + "cmt_msg": "printk: hash addresses printed with %p" }, - "CVE-2018-9363": { - "cmt_msg": "Bluetooth: hidp: buffer overflow in hidp_process_report" + "CVE-2022-0617": { + "cmt_msg": "udf: Fix NULL ptr deref when converting from inline format" }, - "CVE-2018-15471": { - "cmt_msg": "xen-netback: fix input validation in xenvif_set_hash_mapping()" + "CVE-2023-4459": { + "cmt_msg": "net: vmxnet3: fix possible NULL pointer dereference in vmxnet3_rq_cleanup()" }, - "CVE-2016-10723": { - "cmt_msg": "mm, oom: remove sleep from under oom_lock" + "CVE-2022-20566": { + "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free caused by l2cap_chan_put" }, - "CVE-2019-19036": { - "cmt_msg": "btrfs: Detect unbalanced tree with empty leaf before crashing btree operations" + "CVE-2022-20565": { + "cmt_msg": "HID: core: Correctly handle ReportSize being zero" }, - "CVE-2019-3459": { - "cmt_msg": "Bluetooth: Verify that l2cap_get_conf_opt provides large enough buffer" + "CVE-2023-1990": { + "cmt_msg": "nfc: st-nci: Fix use after free bug in ndlc_remove due to race condition" }, - "CVE-2020-11494": { - "cmt_msg": "slcan: Don't transmit uninitialized stack data in padding" + "CVE-2021-33098": { + "cmt_msg": "ixgbe: fix large MTU request from VF" }, - "CVE-2019-19039": { - "cmt_msg": "btrfs: Don't submit any btree write bio if the fs has errors" + "CVE-2022-48619": { + "cmt_msg": "Input: add bounds checking to input_set_capability()" }, - "CVE-2020-0444": { - "cmt_msg": "audit: fix error handling in audit_data_to_entry()" + "CVE-2019-3882": { + "cmt_msg": "vfio/type1: Limit DMA mappings per container" }, - "CVE-2022-1974": { - "cmt_msg": "nfc: replace improper check device_is_registered() in netlink related functions" + "CVE-2018-20509": { + "cmt_msg": "binder: refactor binder ref inc/dec for thread safety" }, - "CVE-2020-8832": { - "cmt_msg": "drm/i915: Record the default hw state after reset upon load" + "CVE-2021-47070": { + "cmt_msg": "uio_hv_generic: Fix another memory leak in error handling paths" }, - "CVE-2022-1419": { - "cmt_msg": "drm/vgem: Close use-after-free race in vgem_gem_create" + "CVE-2021-47075": { + "cmt_msg": "nvmet: fix memory leak in nvmet_alloc_ctrl()" }, - "CVE-2022-1836": { - "cmt_msg": "floppy: disable FDRAWCMD by default" + "CVE-2021-47074": { + "cmt_msg": "nvme-loop: fix memory leak in nvme_loop_create_ctrl()" }, - "CVE-2020-11884": { - "cmt_msg": "s390/mm: fix page table upgrade vs 2ndary address mode accesses" + "CVE-2021-47077": { + "cmt_msg": "scsi: qedf: Add pointer checks in qedf_update_link_speed()" }, - "CVE-2021-32078": { - "cmt_msg": "ARM: footbridge: remove personal server platform" + "CVE-2021-47076": { + "cmt_msg": "RDMA/rxe: Return CQE error if invalid lkey was supplied" }, - "CVE-2022-30594": { - "cmt_msg": "ptrace: Check PTRACE_O_SUSPEND_SECCOMP permission on PTRACE_SEIZE" + "CVE-2021-47078": { + "cmt_msg": "RDMA/rxe: Clear all QP fields if creation failed" }, - "CVE-2022-4662": { - "cmt_msg": "USB: core: Prevent nested device-reset calls" + "CVE-2017-8824": { + "cmt_msg": "dccp: CVE-2017-8824: use-after-free in DCCP code" }, - "CVE-2019-11833": { - "cmt_msg": "ext4: zero out the unused memory region in the extent tree block" + "CVE-2018-7492": { + "cmt_msg": "rds: Fix NULL pointer dereference in __rds_rdma_map" }, - "CVE-2021-38205": { - "cmt_msg": "net: xilinx_emaclite: Do not print real IOMEM pointer" + "CVE-2017-12188": { + "cmt_msg": "KVM: nVMX: update last_nonleaf_level when initializing nested EPT" }, - "CVE-2020-27835": { - "cmt_msg": "IB/hfi1: Ensure correct mm is used at all times" + "CVE-2021-47013": { + "cmt_msg": "net:emac/emac-mac: Fix a use after free in emac_mac_tx_buf_send" }, - "CVE-2020-27830": { - "cmt_msg": "speakup: Reject setting the speakup line discipline outside of speakup" + "CVE-2019-10638": { + "cmt_msg": "inet: switch IP ID generator to siphash" }, - "CVE-2020-0255": { - "cmt_msg": "selinux: properly handle multiple messages in selinux_netlink_send()" + "CVE-2019-10639": { + "cmt_msg": "netns: provide pure entropy for net_hash_mix()" }, - "CVE-2023-35001": { - "cmt_msg": "netfilter: nf_tables: prevent OOB access in nft_byteorder_eval" + "CVE-2024-26676": { + "cmt_msg": "af_unix: Call kfree_skb() for dead unix_(sk)->oob_skb in GC." }, - "CVE-2022-27666": { - "cmt_msg": "esp: Fix possible buffer overflow in ESP transformation" + "CVE-2024-26675": { + "cmt_msg": "ppp_async: limit MRU to 64K" }, - "CVE-2021-38208": { - "cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect" + "CVE-2020-26557": { + "cmt_msg": "" }, - "CVE-2017-18232": { - "cmt_msg": "scsi: libsas: direct call probe and destruct" + "CVE-2017-16535": { + "cmt_msg": "USB: core: fix out-of-bounds access bug in usb_get_bos_descriptor()" }, - "CVE-2019-2213": { - "cmt_msg": "binder: fix possible UAF when freeing buffer" + "CVE-2017-16534": { + "cmt_msg": "USB: core: harden cdc_parse_cdc_header" }, - "CVE-2020-25211": { - "cmt_msg": "netfilter: ctnetlink: add a range check for l3/l4 protonum" + "CVE-2017-16537": { + "cmt_msg": "media: imon: Fix null-ptr-deref in imon_probe" }, - "CVE-2020-25212": { - "cmt_msg": "nfs: Fix getxattr kernel panic and memory overflow" + "CVE-2017-16536": { + "cmt_msg": "[media] cx231xx-cards: fix NULL-deref on missing association descriptor" }, - "CVE-2018-12232": { - "cmt_msg": "socket: close race condition between sock_close() and sockfs_setattr()" + "CVE-2017-16531": { + "cmt_msg": "USB: fix out-of-bounds in usb_set_configuration" }, - "CVE-2020-26556": { - "cmt_msg": "" + "CVE-2017-16530": { + "cmt_msg": "USB: uas: fix bug in handling of alternate settings" }, - "CVE-2018-9518": { - "cmt_msg": "NFC: llcp: Limit size of SDP URI" + "CVE-2017-16533": { + "cmt_msg": "HID: usbhid: fix out-of-bounds bug" }, - "CVE-2022-48619": { - "cmt_msg": "Input: add bounds checking to input_set_capability()" + "CVE-2017-16532": { + "cmt_msg": "usb: usbtest: fix NULL pointer dereference" }, - "CVE-2020-26555": { - "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical" + "CVE-2024-26779": { + "cmt_msg": "wifi: mac80211: fix race condition on enabling fast-xmit" }, - "CVE-2019-20794": { - "cmt_msg": "" + "CVE-2017-16538": { + "cmt_msg": "media: dvb-usb-v2: lmedm04: Improve logic checking of warm start" + }, + "CVE-2018-9517": { + "cmt_msg": "l2tp: pass tunnel pointer to ->session_create()" }, "CVE-2018-9516": { "cmt_msg": "HID: debug: check length before copy_to_user()" }, - "CVE-2023-3397": { + "CVE-2021-20317": { + "cmt_msg": "lib/timerqueue: Rely on rbtree semantics for next timer" + }, + "CVE-2024-26772": { + "cmt_msg": "ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal()" + }, + "CVE-2018-1092": { + "cmt_msg": "ext4: fail ext4_iget for root directory if unallocated" + }, + "CVE-2018-1093": { + "cmt_msg": "ext4: add validity checks for bitmap block numbers" + }, + "CVE-2021-3864": { "cmt_msg": "" }, - "CVE-2018-1128": { - "cmt_msg": "libceph: add authorizer challenge" + "CVE-2019-19054": { + "cmt_msg": "media: rc: prevent memory leak in cx23888_ir_probe" }, - "CVE-2018-1129": { - "cmt_msg": "libceph: implement CEPHX_V2 calculation mode" + "CVE-2019-19057": { + "cmt_msg": "mwifiex: pcie: Fix memory leak in mwifiex_pcie_init_evt_ring" }, - "CVE-2022-26365": { - "cmt_msg": "xen/blkfront: fix leaking data in shared pages" + "CVE-2019-19056": { + "cmt_msg": "mwifiex: pcie: Fix memory leak in mwifiex_pcie_alloc_cmdrsp_buf" }, - "CVE-2023-52458": { - "cmt_msg": "block: add check that partition length needs to be aligned with block size" + "CVE-2019-19052": { + "cmt_msg": "can: gs_usb: gs_can_open(): prevent memory leak" }, - "CVE-2018-1120": { - "cmt_msg": "proc: do not access cmdline nor environ from file-backed areas" + "CVE-2019-3846": { + "cmt_msg": "mwifiex: Fix possible buffer overflows at parsing bss descriptor" }, - "CVE-2018-1121": { + "CVE-2019-19058": { + "cmt_msg": "iwlwifi: dbg_ini: fix memory leak in alloc_sgtable" + }, + "CVE-2017-15537": { + "cmt_msg": "x86/fpu: Don't let userspace set bogus xcomp_bv" + }, + "CVE-2018-5391": { + "cmt_msg": "ip: discard IPv4 datagrams with overlapping segments." + }, + "CVE-2018-5390": { + "cmt_msg": "tcp: free batches of packets in tcp_prune_ofo_queue()" + }, + "CVE-2023-20941": { "cmt_msg": "" }, - "CVE-2018-20856": { - "cmt_msg": "block: blk_init_allocated_queue() set q->fq as NULL in the fail case" + "CVE-2018-20836": { + "cmt_msg": "scsi: libsas: fix a race condition when smp task timeout" }, - "CVE-2023-52451": { - "cmt_msg": "powerpc/pseries/memhp: Fix access beyond end of drmem array" + "CVE-2020-10135": { + "cmt_msg": "Bluetooth: Consolidate encryption handling in hci_encrypt_cfm" }, - "CVE-2019-19046": { - "cmt_msg": "ipmi: Fix memory leak in __ipmi_bmc_register" + "CVE-2020-36766": { + "cmt_msg": "cec-api: prevent leaking memory through hole in structure" }, - "CVE-2019-19045": { - "cmt_msg": "net/mlx5: prevent memory leak in mlx5_fpga_conn_create_cq" + "CVE-2023-28328": { + "cmt_msg": "media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer()" }, - "CVE-2022-2961": { + "CVE-2017-13693": { "cmt_msg": "" }, - "CVE-2023-2176": { - "cmt_msg": "RDMA/core: Refactor rdma_bind_addr" - }, - "CVE-2024-1086": { - "cmt_msg": "netfilter: nf_tables: reject QUEUE/DROP verdict parameters" + "CVE-2017-13695": { + "cmt_msg": "ACPICA: acpi: acpica: fix acpi operand cache leak in nseval.c" }, - "CVE-2024-22386": { + "CVE-2017-13694": { "cmt_msg": "" }, - "CVE-2019-9466": { - "cmt_msg": "brcmfmac: add subtype check for event handling in data path" + "CVE-2024-26647": { + "cmt_msg": "drm/amd/display: Fix late derefrence 'dsc' check in 'link_set_dsc_pps_packet()'" }, - "CVE-2020-11565": { - "cmt_msg": "mm: mempolicy: require at least one nodeid for MPOL_PREFERRED" + "CVE-2021-3640": { + "cmt_msg": "Bluetooth: sco: Fix lock_sock() blockage by memcpy_from_msg()" }, - "CVE-2019-19049": { - "cmt_msg": "of: unittest: fix memory leak in unittest_data_add" + "CVE-2020-11608": { + "cmt_msg": "media: ov519: add missing endpoint sanity checks" }, - "CVE-2022-0644": { - "cmt_msg": "vfs: check fd has read access in kernel_read_file_from_fd()" + "CVE-2020-10732": { + "cmt_msg": "fs/binfmt_elf.c: allocate initialized memory in fill_thread_core_info()" }, - "CVE-2020-27784": { - "cmt_msg": "usb: gadget: function: printer: fix use-after-free in __lock_acquire" + "CVE-2017-17975": { + "cmt_msg": "media: usbtv: prevent double free in error case" }, - "CVE-2018-13053": { - "cmt_msg": "alarmtimer: Prevent overflow for relative nanosleep" + "CVE-2019-16921": { + "cmt_msg": "RDMA/hns: Fix init resp when alloc ucontext" }, - "CVE-2020-27786": { - "cmt_msg": "ALSA: rawmidi: Fix racy buffer resize under concurrent accesses" + "CVE-2021-0512": { + "cmt_msg": "HID: make arrays usage and value to be the same" }, - "CVE-2019-14816": { - "cmt_msg": "mwifiex: Fix three heap overflow at parsing element in cfg80211_ap_settings" + "CVE-2022-41222": { + "cmt_msg": "mm/mremap: hold the rmap lock in write mode when moving page table entries." }, - "CVE-2019-14814": { - "cmt_msg": "mwifiex: Fix three heap overflow at parsing element in cfg80211_ap_settings" + "CVE-2017-18595": { + "cmt_msg": "tracing: Fix possible double free on failure of allocating trace buffer" }, - "CVE-2019-14815": { - "cmt_msg": "mwifiex: Fix three heap overflow at parsing element in cfg80211_ap_settings" + "CVE-2024-26720": { + "cmt_msg": "mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again" }, - "CVE-2023-6240": { - "cmt_msg": "" + "CVE-2024-26726": { + "cmt_msg": "btrfs: don't drop extent_map for free space inode on write error" }, - "CVE-2023-23559": { - "cmt_msg": "wifi: rndis_wlan: Prevent buffer overflow in rndis_query_oid" + "CVE-2019-6974": { + "cmt_msg": "kvm: fix kvm_ioctl_create_device() reference counting (CVE-2019-6974)" }, - "CVE-2020-10720": { - "cmt_msg": "net-gro: fix use-after-free read in napi_gro_frags()" + "CVE-2023-2985": { + "cmt_msg": "fs: hfsplus: fix UAF issue in hfsplus_put_super" }, - "CVE-2022-0382": { - "cmt_msg": "net ticp:fix a kernel-infoleak in __tipc_sendmsg()" + "CVE-2017-17806": { + "cmt_msg": "crypto: hmac - require that the underlying hash algorithm is unkeyed" }, - "CVE-2018-12904": { - "cmt_msg": "kvm: nVMX: Enforce cpl=0 for VMX instructions" + "CVE-2017-17807": { + "cmt_msg": "KEYS: add missing permission check for request_key() destination" }, - "CVE-2023-32233": { - "cmt_msg": "netfilter: nf_tables: deactivate anonymous set from preparation phase" + "CVE-2017-17805": { + "cmt_msg": "crypto: salsa20 - fix blkcipher_walk API usage" }, - "CVE-2020-25672": { - "cmt_msg": "nfc: fix memory leak in llcp_sock_connect()" + "CVE-2024-26700": { + "cmt_msg": "drm/amd/display: Fix MST Null Ptr for RV" }, - "CVE-2019-9455": { - "cmt_msg": "media: videobuf2-v4l2: drop WARN_ON in vb2_warn_zero_bytesused()" + "CVE-2023-52519": { + "cmt_msg": "HID: intel-ish-hid: ipc: Disable and reenable ACPI GPE bit" }, - "CVE-2020-25670": { - "cmt_msg": "nfc: fix refcount leak in llcp_sock_bind()" + "CVE-2023-52516": { + "cmt_msg": "dma-debug: don't call __dma_entry_alloc_check_leak() under free_entries_lock" }, - "CVE-2020-25671": { - "cmt_msg": "nfc: fix refcount leak in llcp_sock_connect()" + "CVE-2023-52517": { + "cmt_msg": "spi: sun6i: fix race between DMA RX transfer completion and RX FIFO drain" }, - "CVE-2018-21008": { - "cmt_msg": "rsi: add fix for crash during assertions" + "CVE-2023-52515": { + "cmt_msg": "RDMA/srp: Do not call scsi_done() from srp_abort()" }, - "CVE-2019-15223": { - "cmt_msg": "ALSA: line6: Assure canceling delayed work at disconnection" + "CVE-2019-15902": { + "cmt_msg": "" }, - "CVE-2019-19813": { - "cmt_msg": "btrfs: inode: Verify inode mode to avoid NULL pointer dereference" + "CVE-2023-52510": { + "cmt_msg": "ieee802154: ca8210: Fix a potential UAF in ca8210_probe" }, - "CVE-2019-15221": { - "cmt_msg": "ALSA: line6: Fix write on zero-sized buffer" + "CVE-2023-52511": { + "cmt_msg": "spi: sun6i: reduce DMA RX transfer width to single byte" }, - "CVE-2019-19815": { - "cmt_msg": "f2fs: support swap file w/ DIO" + "CVE-2019-20054": { + "cmt_msg": "fs/proc/proc_sysctl.c: fix NULL pointer dereference in put_links" }, - "CVE-2019-19814": { + "CVE-2018-17977": { "cmt_msg": "" }, - "CVE-2020-29371": { - "cmt_msg": "romfs: fix uninitialized memory leak in romfs_dev_read()" + "CVE-2024-26659": { + "cmt_msg": "xhci: handle isoc Babble and Buffer Overrun events properly" }, - "CVE-2019-19816": { - "cmt_msg": "btrfs: inode: Verify inode mode to avoid NULL pointer dereference" + "CVE-2024-26658": { + "cmt_msg": "bcachefs: grab s_umount only if snapshotting" }, - "CVE-2023-1118": { - "cmt_msg": "media: rc: Fix use-after-free bugs caused by ene_tx_irqsim()" + "CVE-2010-5321": { + "cmt_msg": "" }, - "CVE-2018-11412": { - "cmt_msg": "ext4: do not allow external inodes for inline data" + "CVE-2024-26655": { + "cmt_msg": "Fix memory leak in posix_clock_open()" }, - "CVE-2022-1016": { - "cmt_msg": "netfilter: nf_tables: initialize registers in nft_do_chain()" + "CVE-2024-26654": { + "cmt_msg": "ALSA: sh: aica: reorder cleanup operations to avoid UAF bugs" }, - "CVE-2018-18710": { - "cmt_msg": "cdrom: fix improper type cast, which can leat to information leak." + "CVE-2024-26656": { + "cmt_msg": "drm/amdgpu: fix use-after-free bug" }, - "CVE-2019-5108": { - "cmt_msg": "mac80211: Do not send Layer 2 Update frame before authorization" + "CVE-2024-26651": { + "cmt_msg": "sr9800: Add check for usbnet_get_endpoints" }, - "CVE-2023-0386": { - "cmt_msg": "ovl: fail on invalid uid/gid mapping at copy up" + "CVE-2024-26650": { + "cmt_msg": "platform/x86: p2sb: Allow p2sb_bar() calls during PCI device probe" }, - "CVE-2022-1012": { - "cmt_msg": "secure_seq: use the 64 bits of the siphash for port offset calculation" + "CVE-2022-1048": { + "cmt_msg": "ALSA: pcm: Fix races among concurrent hw_params and hw_free calls" }, - "CVE-2020-12114": { - "cmt_msg": "make struct mountpoint bear the dentry reference to mountpoint, not struct mount" + "CVE-2023-52475": { + "cmt_msg": "Input: powermate - fix use-after-free in powermate_config_complete" }, - "CVE-2020-8649": { - "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region" + "CVE-2023-52477": { + "cmt_msg": "usb: hub: Guard against accesses to uninitialized BOS descriptors" }, - "CVE-2020-12656": { - "cmt_msg": "sunrpc: check that domain table is empty at module unload." + "CVE-2023-52476": { + "cmt_msg": "perf/x86/lbr: Filter vsyscall addresses" }, - "CVE-2020-14356": { - "cmt_msg": "cgroup: fix cgroup_sk_alloc() for sk_clone_lock()" + "CVE-2023-52470": { + "cmt_msg": "drm/radeon: check the alloc_workqueue return value in radeon_crtc_init()" }, - "CVE-2021-26931": { - "cmt_msg": "xen-blkback: don't \"handle\" error by BUG()" + "CVE-2023-52479": { + "cmt_msg": "ksmbd: fix uaf in smb20_oplock_break_ack" }, - "CVE-2021-26930": { - "cmt_msg": "xen-blkback: fix error handling in xen_blkbk_map()" + "CVE-2023-52478": { + "cmt_msg": "HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect" }, - "CVE-2021-42252": { - "cmt_msg": "soc: aspeed: lpc-ctrl: Fix boundary check for mmap" + "CVE-2022-26365": { + "cmt_msg": "xen/blkfront: fix leaking data in shared pages" }, - "CVE-2021-26932": { - "cmt_msg": "Xen/x86: don't bail early from clear_foreign_p2m_mapping()" + "CVE-2020-12652": { + "cmt_msg": "scsi: mptfusion: Fix double fetch bug in ioctl" }, - "CVE-2023-52456": { - "cmt_msg": "serial: imx: fix tx statemachine deadlock" + "CVE-2020-12653": { + "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_cmd_append_vsie_tlv()" }, - "CVE-2023-3141": { - "cmt_msg": "memstick: r592: Fix UAF bug in r592_remove due to race condition" + "CVE-2020-12656": { + "cmt_msg": "sunrpc: check that domain table is empty at module unload." }, - "CVE-2022-0492": { - "cmt_msg": "cgroup-v1: Require capabilities to set release_agent" + "CVE-2020-12657": { + "cmt_msg": "block, bfq: fix use-after-free in bfq_idle_slice_timer_body" }, - "CVE-2020-12352": { - "cmt_msg": "Bluetooth: A2MP: Fix not initializing all members" + "CVE-2020-12654": { + "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_ret_wmm_get_status()" }, - "CVE-2020-12351": { - "cmt_msg": "Bluetooth: L2CAP: Fix calling sk_filter on non-socket based channel" + "CVE-2022-23042": { + "cmt_msg": "xen/netfront: react properly to failing gnttab_end_foreign_access_ref()" }, - "CVE-2020-12655": { - "cmt_msg": "xfs: add agf freeblocks verify in xfs_agf_verify" + "CVE-2022-45887": { + "cmt_msg": "media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb()" }, - "CVE-2022-20132": { - "cmt_msg": "HID: add hid_is_usb() function to make it simpler for USB detection" + "CVE-2022-4744": { + "cmt_msg": "tun: avoid double free in tun_free_netdev" }, - "CVE-2022-0494": { - "cmt_msg": "block-map: add __GFP_ZERO flag for alloc_page in function bio_copy_kern" + "CVE-2022-0400": { + "cmt_msg": "" }, - "CVE-2023-2269": { - "cmt_msg": "dm ioctl: fix nested locking in table_clear() to remove deadlock concern" + "CVE-2022-45886": { + "cmt_msg": "media: dvb-core: Fix use-after-free due on race condition at dvb_net" }, - "CVE-2020-26088": { - "cmt_msg": "net/nfc/rawsock.c: add CAP_NET_RAW check." + "CVE-2022-26966": { + "cmt_msg": "sr9700: sanity check for packet length" }, - "CVE-2022-3524": { - "cmt_msg": "tcp/udp: Fix memory leak in ipv6_renew_options()." + "CVE-2023-1989": { + "cmt_msg": "Bluetooth: btsdio: fix use after free bug in btsdio_remove due to unfinished work" }, - "CVE-2022-3523": { - "cmt_msg": "mm/memory.c: fix race when faulting a device private page" + "CVE-2022-25265": { + "cmt_msg": "" }, - "CVE-2022-3522": { - "cmt_msg": "mm/hugetlb: use hugetlb_pte_stable in migration race check" + "CVE-2020-25285": { + "cmt_msg": "mm/hugetlb: fix a race between hugetlb sysctl handlers" }, - "CVE-2008-2544": { - "cmt_msg": "" + "CVE-2020-11609": { + "cmt_msg": "media: stv06xx: add missing descriptor sanity checks" }, - "CVE-2021-3178": { - "cmt_msg": "nfsd4: readdirplus shouldn't return parent of export" + "CVE-2020-25284": { + "cmt_msg": "rbd: require global CAP_SYS_ADMIN for mapping and unmapping" }, - "CVE-2020-10690": { - "cmt_msg": "ptp: fix the race between the release of ptp_clock and cdev" + "CVE-2023-4208": { + "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free" }, - "CVE-2018-7755": { - "cmt_msg": "floppy: Do not copy a kernel pointer to user memory in FDGETPRM ioctl" + "CVE-2023-4206": { + "cmt_msg": "net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free" }, - "CVE-2019-15031": { - "cmt_msg": "powerpc/tm: Fix restoring FP/VMX facility incorrectly on interrupts" + "CVE-2023-4207": { + "cmt_msg": "net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free" }, - "CVE-2019-15030": { - "cmt_msg": "powerpc/tm: Fix FP/VMX unavailable exceptions inside a transaction" + "CVE-2021-47046": { + "cmt_msg": "drm/amd/display: Fix off by one in hdmi_14_process_transaction()" }, - "CVE-2022-0330": { - "cmt_msg": "drm/i915: Flush TLBs before releasing backing store" + "CVE-2020-29370": { + "cmt_msg": "mm: slub: add missing TID bump in kmem_cache_alloc_bulk()" }, - "CVE-2007-3719": { - "cmt_msg": "" + "CVE-2022-20424": { + "cmt_msg": "io_uring: remove io_identity" }, - "CVE-2023-3863": { - "cmt_msg": "net: nfc: Fix use-after-free caused by nfc_llcp_find_local" + "CVE-2022-20422": { + "cmt_msg": "arm64: fix oops in concurrently setting insn_emulation sysctls" }, - "CVE-2023-0459": { - "cmt_msg": "uaccess: Add speculation barrier to copy_from_user()" + "CVE-2022-45934": { + "cmt_msg": "Bluetooth: L2CAP: Fix u8 overflow" }, - "CVE-2022-4095": { - "cmt_msg": "staging: rtl8712: fix use after free bugs" + "CVE-2021-4197": { + "cmt_msg": "cgroup: Use open-time credentials for process migraton perm checks" }, - "CVE-2022-3621": { - "cmt_msg": "nilfs2: fix NULL pointer dereference at nilfs_bmap_lookup_at_level()" + "CVE-2020-24503": { + "cmt_msg": "" }, - "CVE-2019-19319": { - "cmt_msg": "ext4: protect journal inode's blocks using block_validity" + "CVE-2020-24502": { + "cmt_msg": "" }, - "CVE-2019-19462": { - "cmt_msg": "kernel/relay.c: handle alloc_percpu returning NULL in relay_open" + "CVE-2024-26774": { + "cmt_msg": "ext4: avoid dividing by 0 in mb_update_avg_fragment_size() when block bitmap corrupt" }, - "CVE-2023-30772": { - "cmt_msg": "power: supply: da9150: Fix use after free bug in da9150_charger_remove due to race condition" + "CVE-2023-31436": { + "cmt_msg": "net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg" }, - "CVE-2022-24958": { - "cmt_msg": "usb: gadget: don't release an existing dev->buf" + "CVE-2019-8980": { + "cmt_msg": "exec: Fix mem leak in kernel_read_file" }, - "CVE-2023-1611": { - "cmt_msg": "btrfs: fix race between quota disable and quota assign ioctls" + "CVE-2024-26775": { + "cmt_msg": "aoe: avoid potential deadlock at set_capacity" }, - "CVE-2021-3772": { - "cmt_msg": "sctp: use init_tag from inithdr for ABORT chunk" + "CVE-2018-14609": { + "cmt_msg": "btrfs: relocation: Only remove reloc rb_trees if reloc control has been initialized" }, - "CVE-2023-3268": { - "cmt_msg": "relayfs: fix out-of-bounds access in relay_file_read" + "CVE-2024-23851": { + "cmt_msg": "dm: limit the number of targets and parameter size area" }, - "CVE-2021-3679": { - "cmt_msg": "tracing: Fix bug in rb_per_cpu_empty() that might cause deadloop." + "CVE-2020-27777": { + "cmt_msg": "powerpc/rtas: Restrict RTAS requests from userspace" }, - "CVE-2021-39711": { - "cmt_msg": "bpf: fix panic due to oob in bpf_prog_test_run_skb" + "CVE-2019-11486": { + "cmt_msg": "tty: mark Siemens R3964 line discipline as BROKEN" }, - "CVE-2022-3629": { - "cmt_msg": "vsock: Fix memory leak in vsock_connect()" + "CVE-2019-11487": { + "cmt_msg": "fs: prevent page refcount overflow in pipe_buf_get" }, - "CVE-2021-28715": { - "cmt_msg": "xen/netback: don't queue unlimited number of packages" + "CVE-2018-8043": { + "cmt_msg": "net: phy: mdio-bcm-unimac: fix potential NULL dereference in unimac_mdio_probe()" }, - "CVE-2021-28714": { - "cmt_msg": "xen/netback: fix rx queue stall detection" + "CVE-2019-20908": { + "cmt_msg": "efi: Restrict efivar_ssdt_load when the kernel is locked down" }, - "CVE-2021-28713": { - "cmt_msg": "xen/console: harden hvc_xen against event channel storms" + "CVE-2019-19060": { + "cmt_msg": "iio: imu: adis16400: release allocated memory on failure" }, - "CVE-2021-28712": { - "cmt_msg": "xen/netfront: harden netfront against event channel storms" + "CVE-2019-19061": { + "cmt_msg": "iio: imu: adis16400: fix memory leak" }, - "CVE-2020-10781": { - "cmt_msg": "Revert \"zram: convert remaining CLASS_ATTR() to CLASS_ATTR_RO()\"" + "CVE-2019-19062": { + "cmt_msg": "crypto: user - fix memory leak in crypto_report" }, - "CVE-2021-4157": { - "cmt_msg": "pNFS/flexfiles: fix incorrect size check in decode_nfs_fh()" + "CVE-2019-19063": { + "cmt_msg": "rtlwifi: prevent memory leak in rtl_usb_probe" }, - "CVE-2022-2991": { - "cmt_msg": "remove the lightnvm subsystem" + "CVE-2017-17741": { + "cmt_msg": "KVM: Fix stack-out-of-bounds read in write_mmio" }, - "CVE-2021-35039": { - "cmt_msg": "module: limit enabling module.sig_enforce" + "CVE-2019-19065": { + "cmt_msg": "RDMA/hfi1: Prevent memory leak in sdma_init" }, - "CVE-2022-23960": { - "cmt_msg": "ARM: report Spectre v2 status through sysfs" + "CVE-2019-19066": { + "cmt_msg": "scsi: bfa: release allocated memory in case of error" }, - "CVE-2023-51781": { - "cmt_msg": "appletalk: Fix Use-After-Free in atalk_ioctl" + "CVE-2019-19067": { + "cmt_msg": "drm/amdgpu: fix multiple memory leaks in acp_hw_init" }, - "CVE-2022-3624": { - "cmt_msg": "bonding: fix reference count leak in balance-alb mode" + "CVE-2019-19068": { + "cmt_msg": "rtl8xxxu: prevent leaking urb" }, - "CVE-2022-2588": { - "cmt_msg": "net_sched: cls_route: remove from list when handle is 0" + "CVE-2019-3874": { + "cmt_msg": "sctp: implement memory accounting on tx path" }, - "CVE-2021-39657": { - "cmt_msg": "scsi: ufs: Correct the LUN used in eh_device_reset_handler() callback" + "CVE-2017-12193": { + "cmt_msg": "assoc_array: Fix a buggy node-splitting case" }, - "CVE-2021-3669": { - "cmt_msg": "ipc: replace costly bailout check in sysvipc_find_ipc()" + "CVE-2017-12192": { + "cmt_msg": "KEYS: prevent KEYCTL_READ on negative key" }, - "CVE-2019-18885": { - "cmt_msg": "btrfs: merge btrfs_find_device and find_device" + "CVE-2017-12190": { + "cmt_msg": "fix unbalanced page refcounting in bio_map_user_iov" }, - "CVE-2020-10708": { + "CVE-2020-36516": { + "cmt_msg": "ipv4: avoid using shared IP generator for connected sockets" + }, + "CVE-2012-4542": { "cmt_msg": "" }, - "CVE-2023-1095": { - "cmt_msg": "netfilter: nf_tables: fix null deref due to zeroed list head" + "CVE-2018-1000028": { + "cmt_msg": "nfsd: auth: Fix gid sorting when rootsquash enabled" }, - "CVE-2019-11091": { - "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" + "CVE-2018-1000026": { + "cmt_msg": "bnx2x: disable GSO where gso_size is too big for hardware" }, - "CVE-2022-3239": { - "cmt_msg": "media: em28xx: initialize refcount before kref_get" + "CVE-2020-36777": { + "cmt_msg": "media: dvbdev: Fix memory leak in dvb_media_device_free()" }, - "CVE-2022-4543": { - "cmt_msg": "" + "CVE-2020-36775": { + "cmt_msg": "f2fs: fix to avoid potential deadlock" }, - "CVE-2020-15780": { - "cmt_msg": "ACPI: configfs: Disallow loading ACPI tables when locked down" + "CVE-2021-20292": { + "cmt_msg": "drm/ttm/nouveau: don't call tt destroy callback on alloc failure." }, - "CVE-2023-4921": { - "cmt_msg": "net: sched: sch_qfq: Fix UAF in qfq_dequeue()" + "CVE-2023-2269": { + "cmt_msg": "dm ioctl: fix nested locking in table_clear() to remove deadlock concern" }, - "CVE-2022-3424": { - "cmt_msg": "misc: sgi-gru: fix use-after-free error in gru_set_context_option, gru_fault and gru_handle_user_call_os" + "CVE-2020-10690": { + "cmt_msg": "ptp: fix the race between the release of ptp_clock and cdev" }, - "CVE-2023-23455": { - "cmt_msg": "net: sched: atm: dont intepret cls results when asked to drop" + "CVE-2021-3659": { + "cmt_msg": "net: mac802154: Fix general protection fault" }, - "CVE-2023-1829": { - "cmt_msg": "net/sched: Retire tcindex classifier" + "CVE-2021-3653": { + "cmt_msg": "KVM: nSVM: avoid picking up unsupported bits from L2 in int_ctl (CVE-2021-3653)" }, - "CVE-2019-18282": { - "cmt_msg": "net/flow_dissector: switch to siphash" + "CVE-2021-3655": { + "cmt_msg": "sctp: validate from_addr_param return" }, - "CVE-2021-34981": { - "cmt_msg": "Bluetooth: cmtp: fix file refcount when cmtp_attach_device fails" + "CVE-2019-12614": { + "cmt_msg": "powerpc/pseries/dlpar: Fix a missing check in dlpar_parse_cc_property()" }, - "CVE-2023-1670": { - "cmt_msg": "xirc2ps_cs: Fix use after free bug in xirc2ps_detach" + "CVE-2019-12615": { + "cmt_msg": "mdesc: fix a missing-check bug in get_vdev_port_node_info()" }, - "CVE-2018-14625": { - "cmt_msg": "vhost/vsock: fix use-after-free in network stack callers" + "CVE-2021-3896": { + "cmt_msg": "isdn: cpai: check ctr->cnr to avoid array index out of bound" }, - "CVE-2023-4881": { - "cmt_msg": "netfilter: nftables: exthdr: fix 4-byte stack OOB write" + "CVE-2021-3894": { + "cmt_msg": "sctp: account stream padding length for reconf chunk" }, - "CVE-2020-24394": { - "cmt_msg": "nfsd: apply umask on fs without ACL support" + "CVE-2021-3892": { + "cmt_msg": "" }, - "CVE-2023-6915": { - "cmt_msg": "ida: Fix crash in ida_free when the bitmap is empty" + "CVE-2022-27223": { + "cmt_msg": "USB: gadget: validate endpoint index for xilinx udc" }, - "CVE-2022-20148": { - "cmt_msg": "f2fs: fix UAF in f2fs_available_free_memory" + "CVE-2022-24958": { + "cmt_msg": "usb: gadget: don't release an existing dev->buf" }, - "CVE-2024-0607": { - "cmt_msg": "netfilter: nf_tables: fix pointer math issue in nft_byteorder_eval()" + "CVE-2020-36557": { + "cmt_msg": "vt: vt_ioctl: fix VT_DISALLOCATE freeing in-use virtual console" }, - "CVE-2013-7445": { - "cmt_msg": "" + "CVE-2020-12888": { + "cmt_msg": "vfio-pci: Invalidate mmaps and block MMIO access on disabled memory" }, - "CVE-2023-32269": { - "cmt_msg": "netrom: Fix use-after-free caused by accept on already connected socket" + "CVE-2023-2194": { + "cmt_msg": "i2c: xgene-slimpro: Fix out-of-bounds bug in xgene_slimpro_i2c_xfer()" }, - "CVE-2018-18445": { - "cmt_msg": "bpf: 32-bit RSH verification must truncate input before the ALU op" + "CVE-2022-41218": { + "cmt_msg": "media: dvb-core: Fix UAF due to refcount races at releasing" }, - "CVE-2023-34255": { - "cmt_msg": "xfs: verify buffer contents when we skip log replay" + "CVE-2011-4917": { + "cmt_msg": "" }, - "CVE-2019-13233": { - "cmt_msg": "x86/insn-eval: Fix use-after-free access to LDT entry" + "CVE-2021-45485": { + "cmt_msg": "ipv6: use prandom_u32() for ID generation" }, - "CVE-2022-26966": { - "cmt_msg": "sr9700: sanity check for packet length" + "CVE-2020-0030": { + "cmt_msg": "ANDROID: binder: synchronize_rcu() when using POLLFREE." }, - "CVE-2023-6931": { - "cmt_msg": "perf: Fix perf_event_validate_size()" + "CVE-2019-18806": { + "cmt_msg": "net: qlogic: Fix memory leak in ql_alloc_large_buffers" }, - "CVE-2020-14386": { - "cmt_msg": "net/packet: fix overflow in tpacket_rcv" + "CVE-2019-3900": { + "cmt_msg": "vhost_net: fix possible infinite loop" }, - "CVE-2021-34693": { - "cmt_msg": "can: bcm: fix infoleak in struct bcm_msg_head" + "CVE-2022-40982": { + "cmt_msg": "x86/speculation: Add Gather Data Sampling mitigation" }, - "CVE-2019-19767": { - "cmt_msg": "ext4: add more paranoia checking in ext4_expand_extra_isize handling" + "CVE-2021-39801": { + "cmt_msg": "" }, - "CVE-2021-3656": { - "cmt_msg": "KVM: nSVM: always intercept VMLOAD/VMSAVE when nested (CVE-2021-3656)" + "CVE-2021-39800": { + "cmt_msg": "" }, - "CVE-2020-14381": { - "cmt_msg": "futex: Fix inode life-time issue" + "CVE-2024-22099": { + "cmt_msg": "Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security" }, - "CVE-2019-19768": { - "cmt_msg": "blktrace: Protect q->blk_trace with RCU" + "CVE-2021-4202": { + "cmt_msg": "NFC: reorganize the functions in nci_request" }, - "CVE-2022-3303": { - "cmt_msg": "ALSA: pcm: oss: Fix race at SNDCTL_DSP_SYNC" + "CVE-2021-4203": { + "cmt_msg": "af_unix: fix races in sk_peer_pid and sk_peer_cred accesses" }, - "CVE-2023-52443": { - "cmt_msg": "apparmor: avoid crash when parsed profile name is empty" + "CVE-2023-52509": { + "cmt_msg": "ravb: Fix use-after-free issue in ravb_tx_timeout_work()" }, - "CVE-2022-20141": { - "cmt_msg": "igmp: Add ip_mc_list lock in ip_check_mc_rcu" + "CVE-2023-52508": { + "cmt_msg": "nvme-fc: Prevent null pointer dereference in nvme_fc_io_getuuid()" }, - "CVE-2020-25704": { - "cmt_msg": "perf/core: Fix a memory leak in perf_event_parse_addr_filter()" + "CVE-2023-52507": { + "cmt_msg": "nfc: nci: assert requested protocol is valid" }, - "CVE-2021-45095": { - "cmt_msg": "phonet: refcount leak in pep_sock_accep" + "CVE-2023-52506": { + "cmt_msg": "LoongArch: Set all reserved memblocks on Node#0 at initialization" }, - "CVE-2023-23454": { - "cmt_msg": "net: sched: cbq: dont intepret cls results when asked to drop" + "CVE-2023-52501": { + "cmt_msg": "ring-buffer: Do not attempt to read past \"commit\"" }, - "CVE-2021-37159": { - "cmt_msg": "usb: hso: fix error handling code of hso_create_net_device" + "CVE-2023-52500": { + "cmt_msg": "scsi: pm80xx: Avoid leaking tags when processing OPC_INB_SET_CONTROLLER_CONFIG command" }, - "CVE-2024-26595": { - "cmt_msg": "mlxsw: spectrum_acl_tcam: Fix NULL pointer dereference in error path" + "CVE-2023-52502": { + "cmt_msg": "net: nfc: fix races in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn()" }, - "CVE-2018-10853": { - "cmt_msg": "kvm: x86: use correct privilege level for sgdt/sidt/fxsave/fxrstor access" + "CVE-2023-3863": { + "cmt_msg": "net: nfc: Fix use-after-free caused by nfc_llcp_find_local" }, - "CVE-2018-3620": { - "cmt_msg": "x86/microcode: Allow late microcode loading with SMT disabled" + "CVE-2024-26668": { + "cmt_msg": "netfilter: nft_limit: reject configurations that cause integer overflow" }, - "CVE-2023-6932": { - "cmt_msg": "ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet" + "CVE-2024-26663": { + "cmt_msg": "tipc: Check the bearer type before calling tipc_udp_nl_bearer_add()" }, - "CVE-2020-16166": { - "cmt_msg": "random32: update the net random state on interrupt and activity" + "CVE-2024-26664": { + "cmt_msg": "hwmon: (coretemp) Fix out-of-bounds memory access" }, - "CVE-2021-29155": { - "cmt_msg": "bpf: Use correct permission flag for mixed signed bounds arithmetic" + "CVE-2021-38198": { + "cmt_msg": "KVM: X86: MMU: Use the correct inherited permissions to get shadow page" }, - "CVE-2021-33631": { - "cmt_msg": "ext4: fix kernel BUG in 'ext4_write_inline_data_end()'" + "CVE-2021-38199": { + "cmt_msg": "NFSv4: Initialise connection to the server in nfs4_alloc_client()" }, - "CVE-2019-15916": { - "cmt_msg": "net-sysfs: Fix mem leak in netdev_register_kobject" + "CVE-2022-1679": { + "cmt_msg": "ath9k: fix use-after-free in ath9k_hif_usb_rx_cb" }, - "CVE-2019-15917": { - "cmt_msg": "Bluetooth: hci_ldisc: Postpone HCI_UART_PROTO_READY bit set in hci_uart_set_proto()" + "CVE-2023-34256": { + "cmt_msg": "ext4: avoid a potential slab-out-of-bounds in ext4_group_desc_csum" }, - "CVE-2019-15918": { - "cmt_msg": "cifs: Fix lease buffer length error" + "CVE-2023-52442": { + "cmt_msg": "ksmbd: validate session id and tree id in compound request" + }, + "CVE-2023-52443": { + "cmt_msg": "apparmor: avoid crash when parsed profile name is empty" }, "CVE-2023-52444": { "cmt_msg": "f2fs: fix to avoid dirent corruption" }, - "CVE-2020-12362": { - "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" + "CVE-2023-52445": { + "cmt_msg": "media: pvrusb2: fix use after free on context disconnection" }, - "CVE-2020-12363": { - "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" + "CVE-2023-52449": { + "cmt_msg": "mtd: Fix gluebi NULL pointer dereference caused by ftl notifier" }, - "CVE-2019-12881": { - "cmt_msg": "drm/i915/userptr: reject zero user_size" + "CVE-2019-15807": { + "cmt_msg": "scsi: libsas: delete sas port if expander discover failed" }, - "CVE-2022-4129": { - "cmt_msg": "l2tp: Serialize access to sk_user_data with sk_callback_lock" + "CVE-2024-26719": { + "cmt_msg": "nouveau: offload fence uevents work to workqueue" }, - "CVE-2023-3117": { - "cmt_msg": "netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE" + "CVE-2024-26715": { + "cmt_msg": "usb: dwc3: gadget: Fix NULL pointer dereference in dwc3_gadget_suspend" }, - "CVE-2022-28389": { - "cmt_msg": "can: mcba_usb: mcba_usb_start_xmit(): fix double dev_kfree_skb in error path" + "CVE-2024-1312": { + "cmt_msg": "mm: lock_vma_under_rcu() must check vma->anon_vma under vma lock" }, - "CVE-2020-12364": { - "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" + "CVE-2019-14284": { + "cmt_msg": "floppy: fix div-by-zero in setup_format_params" }, - "CVE-2018-18690": { - "cmt_msg": "xfs: don't fail when converting shortform attr to long form during ATTR_REPLACE" + "CVE-2018-10880": { + "cmt_msg": "ext4: never move the system.data xattr out of the inode body" }, - "CVE-2022-28388": { - "cmt_msg": "can: usb_8dev: usb_8dev_start_xmit(): fix double dev_kfree_skb() in error path" + "CVE-2023-3338": { + "cmt_msg": "Remove DECnet support from kernel" }, - "CVE-2023-33203": { - "cmt_msg": "net: qcom/emac: Fix use after free bug in emac_remove due to race condition" + "CVE-2018-10882": { + "cmt_msg": "ext4: add more inode number paranoia checks" }, - "CVE-2021-0605": { - "cmt_msg": "af_key: pfkey_dump needs parameter validation" + "CVE-2018-10883": { + "cmt_msg": "jbd2: don't mark block as modified if the handle is out of credits" }, - "CVE-2021-3896": { - "cmt_msg": "isdn: cpai: check ctr->cnr to avoid array index out of bound" + "CVE-2020-29368": { + "cmt_msg": "mm: thp: make the THP mapcount atomic against __split_huge_pmd_locked()" }, - "CVE-2021-4002": { - "cmt_msg": "hugetlbfs: flush TLBs correctly after huge_pmd_unshare" + "CVE-2020-12464": { + "cmt_msg": "USB: core: Fix free-while-in-use bug in the USB S-Glibrary" }, - "CVE-2023-26545": { - "cmt_msg": "net: mpls: fix stale pointer if allocation fails during device rename" + "CVE-2022-47520": { + "cmt_msg": "wifi: wilc1000: validate pairwise and authentication suite offsets" }, - "CVE-2021-38204": { - "cmt_msg": "usb: max-3421: Prevent corruption of freed memory" + "CVE-2018-10087": { + "cmt_msg": "kernel/exit.c: avoid undefined behaviour when calling wait4()" }, - "CVE-2022-34918": { - "cmt_msg": "netfilter: nf_tables: stricter validation of element data" - }, - "CVE-2018-20961": { - "cmt_msg": "USB: gadget: f_midi: fixing a possible double-free in f_midi" + "CVE-2023-3159": { + "cmt_msg": "firewire: fix potential uaf in outbound_phy_packet_callback()" }, - "CVE-2019-18786": { - "cmt_msg": "media: rcar_drif: fix a memory disclosure" + "CVE-2021-47059": { + "cmt_msg": "crypto: sun8i-ss - fix result memory leak on error path" }, - "CVE-2019-20810": { - "cmt_msg": "media: go7007: fix a miss of snd_card_free" + "CVE-2021-47052": { + "cmt_msg": "crypto: sa2ul - Fix memory leak of rxd" }, - "CVE-2023-52464": { - "cmt_msg": "EDAC/thunderx: Fix possible out-of-bounds string access" + "CVE-2021-47056": { + "cmt_msg": "crypto: qat - ADF_STATUS_PF_RUNNING should be set after adf_dev_init" }, - "CVE-2019-20812": { - "cmt_msg": "af_packet: set defaule value for tmo" + "CVE-2021-47054": { + "cmt_msg": "bus: qcom: Put child node before return" }, - "CVE-2020-8834": { - "cmt_msg": "KVM: PPC: Book3S HV: Factor fake-suspend handling out of kvmppc_save/restore_tm" + "CVE-2022-21125": { + "cmt_msg": "x86/speculation/mmio: Reuse SRBDS mitigation for SBDS" }, - "CVE-2023-1990": { - "cmt_msg": "nfc: st-nci: Fix use after free bug in ndlc_remove due to race condition" + "CVE-2019-19241": { + "cmt_msg": "io_uring: async workers should inherit the user creds" }, - "CVE-2018-1118": { - "cmt_msg": "vhost: fix info leak due to uninitialized memory" + "CVE-2022-21123": { + "cmt_msg": "x86/speculation/mmio: Add mitigation for Processor MMIO Stale Data" }, - "CVE-2018-5391": { - "cmt_msg": "ip: discard IPv4 datagrams with overlapping segments." + "CVE-2020-26559": { + "cmt_msg": "" }, - "CVE-2018-18955": { - "cmt_msg": "userns: also map extents in the reverse map to kernel IDs" + "CVE-2021-43975": { + "cmt_msg": "atlantic: Fix OOB read and write in hw_atl_utils_fw_rpc_wait" }, - "CVE-2019-18660": { - "cmt_msg": "powerpc/book3s64: Fix link stack flush on context switch" + "CVE-2018-6927": { + "cmt_msg": "futex: Prevent overflow by strengthen input validation" }, - "CVE-2019-15291": { - "cmt_msg": "media: b2c2-flexcop-usb: add sanity checking" + "CVE-2018-3639": { + "cmt_msg": "x86/nospec: Simplify alternative_msr_write()" }, - "CVE-2019-15290": { - "cmt_msg": "" + "CVE-2023-0590": { + "cmt_msg": "net: sched: fix race condition in qdisc_graft()" }, - "CVE-2023-3212": { - "cmt_msg": "gfs2: Don't deref jdesc in evict" + "CVE-2023-0597": { + "cmt_msg": "x86/mm: Randomize per-cpu entry area" }, - "CVE-2024-23848": { - "cmt_msg": "" + "CVE-2022-28390": { + "cmt_msg": "can: ems_usb: ems_usb_start_xmit(): fix double dev_kfree_skb() in error path" }, - "CVE-2019-3016": { - "cmt_msg": "x86/kvm: Be careful not to clear KVM_VCPU_FLUSH_TLB bit" + "CVE-2019-3460": { + "cmt_msg": "Bluetooth: Check L2CAP option sizes returned from l2cap_get_conf_opt" }, - "CVE-2023-4459": { - "cmt_msg": "net: vmxnet3: fix possible NULL pointer dereference in vmxnet3_rq_cleanup()" + "CVE-2022-3202": { + "cmt_msg": "jfs: prevent NULL deref in diFree" }, - "CVE-2022-23036": { - "cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()" + "CVE-2019-11477": { + "cmt_msg": "tcp: limit payload size of sacked skbs" }, - "CVE-2022-2153": { - "cmt_msg": "KVM: x86: Avoid theoretical NULL pointer dereference in kvm_irq_delivery_to_apic_fast()" + "CVE-2021-46908": { + "cmt_msg": "bpf: Use correct permission flag for mixed signed bounds arithmetic" }, - "CVE-2022-20566": { - "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free caused by l2cap_chan_put" + "CVE-2021-46906": { + "cmt_msg": "HID: usbhid: fix info leak in hid_submit_ctrl" }, - "CVE-2018-12930": { - "cmt_msg": "" + "CVE-2018-14614": { + "cmt_msg": "f2fs: fix to do sanity check with cp_pack_start_sum" }, - "CVE-2018-12931": { - "cmt_msg": "" + "CVE-2019-11479": { + "cmt_msg": "tcp: add tcp_min_snd_mss sysctl" }, - "CVE-2024-23196": { - "cmt_msg": "" + "CVE-2018-14616": { + "cmt_msg": "f2fs: fix to do sanity check with block address in main area v2" }, - "CVE-2020-12769": { - "cmt_msg": "spi: spi-dw: Add lock protect dw_spi rx/tx to prevent concurrent calls" + "CVE-2018-14611": { + "cmt_msg": "btrfs: validate type when reading a chunk" }, - "CVE-2021-32399": { - "cmt_msg": "bluetooth: eliminate the potential race condition when removing the HCI controller" + "CVE-2018-14610": { + "cmt_msg": "btrfs: Check that each block group has corresponding chunk at mount time" }, - "CVE-2023-3338": { - "cmt_msg": "Remove DECnet support from kernel" + "CVE-2018-14613": { + "cmt_msg": "btrfs: tree-checker: Verify block_group_item" }, - "CVE-2019-12380": { - "cmt_msg": "efi/x86/Add missing error handling to old_memmap 1:1 mapping code" + "CVE-2018-14612": { + "cmt_msg": "btrfs: tree-checker: Detect invalid and empty essential trees" }, - "CVE-2019-12381": { - "cmt_msg": "ip_sockglue: Fix missing-check bug in ip_ra_control()" + "CVE-2024-23849": { + "cmt_msg": "net/rds: Fix UBSAN: array-index-out-of-bounds in rds_cmsg_recv" }, - "CVE-2019-12382": { - "cmt_msg": "drm/edid: Fix a missing-check bug in drm_load_edid_firmware()" + "CVE-2024-23848": { + "cmt_msg": "" }, - "CVE-2022-22942": { - "cmt_msg": "drm/vmwgfx: Fix stale file descriptors on failed usercopy" + "CVE-2020-27418": { + "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region" }, - "CVE-2018-20669": { - "cmt_msg": "make 'user_access_begin()' do 'access_ok()'" + "CVE-2019-2025": { + "cmt_msg": "binder: fix race that allows malicious free of live buffer" }, - "CVE-2019-19543": { - "cmt_msg": "media: serial_ir: Fix use-after-free in serial_ir_init_module" + "CVE-2019-2024": { + "cmt_msg": "media: em28xx: Fix use-after-free when disconnecting" }, - "CVE-2021-3732": { - "cmt_msg": "ovl: prevent private clone if bind mount is not allowed" + "CVE-2017-15951": { + "cmt_msg": "KEYS: Fix race between updating and finding a negative key" }, - "CVE-2022-25375": { - "cmt_msg": "usb: gadget: rndis: check size of RNDIS_MSG_SET command" + "CVE-2019-19075": { + "cmt_msg": "ieee802154: ca8210: prevent memory leak" }, - "CVE-2020-10766": { - "cmt_msg": "x86/speculation: Prevent rogue cross-process SSBD shutdown" + "CVE-2019-19074": { + "cmt_msg": "ath9k: release allocated buffer if timed out" }, - "CVE-2020-10767": { - "cmt_msg": "x86/speculation: Avoid force-disabling IBPB based on STIBP and enhanced IBRS." + "CVE-2019-19073": { + "cmt_msg": "ath9k_htc: release allocated buffer if timed out" }, - "CVE-2018-12207": { - "cmt_msg": "kvm: x86, powerpc: do not allow clearing largepages debugfs entry" + "CVE-2019-1125": { + "cmt_msg": "x86/speculation: Prepare entry code for Spectre v1 swapgs mitigations" }, - "CVE-2022-20369": { - "cmt_msg": "media: v4l2-mem2mem: Apply DST_QUEUE_OFF_BASE on MMAP buffers across ioctls" + "CVE-2023-31085": { + "cmt_msg": "ubi: Refuse attaching if mtd's erasesize is 0" }, - "CVE-2020-13143": { - "cmt_msg": "USB: gadget: fix illegal array access in binding with UDC" + "CVE-2023-31084": { + "cmt_msg": "media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*()" }, - "CVE-2020-10768": { - "cmt_msg": "x86/speculation: PR_SPEC_FORCE_DISABLE enforcement for indirect branches." + "CVE-2023-31083": { + "cmt_msg": "Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO" }, - "CVE-2017-13168": { - "cmt_msg": "scsi: sg: mitigate read/write abuse" + "CVE-2023-31082": { + "cmt_msg": "" }, - "CVE-2024-25740": { + "CVE-2023-31081": { "cmt_msg": "" }, - "CVE-2019-0148": { - "cmt_msg": "i40e: Wrong truncation from u16 to u8" + "CVE-2022-32296": { + "cmt_msg": "tcp: increase source port perturb table to 2^16" }, - "CVE-2022-2978": { - "cmt_msg": "fs: fix UAF/GPF bug in nilfs_mdt_destroy" + "CVE-2020-28974": { + "cmt_msg": "vt: Disable KD_FONT_OP_COPY" }, - "CVE-2019-17075": { - "cmt_msg": "RDMA/cxgb4: Do not dma memory off of the stack" + "CVE-2019-20806": { + "cmt_msg": "media: tw5864: Fix possible NULL pointer dereference in tw5864_handle_frame" }, - "CVE-2022-3903": { - "cmt_msg": "media: mceusb: Use new usb_control_msg_*() routines" + "CVE-2022-3028": { + "cmt_msg": "af_key: Do not call xfrm_probe_algs in parallel" }, - "CVE-2019-19447": { - "cmt_msg": "ext4: work around deleting a file with i_nlink == 0 safely" + "CVE-2020-14304": { + "cmt_msg": "" }, - "CVE-2019-0146": { - "cmt_msg": "i40e: add num_vectors checker in iwarp handler" + "CVE-2018-17972": { + "cmt_msg": "proc: restrict kernel stack dumps to root" }, - "CVE-2019-0147": { - "cmt_msg": "i40e: add num_vectors checker in iwarp handler" + "CVE-2022-33981": { + "cmt_msg": "floppy: disable FDRAWCMD by default" }, - "CVE-2020-10942": { - "cmt_msg": "vhost: Check docket sk_family instead of call getname" + "CVE-2017-16995": { + "cmt_msg": "bpf: fix incorrect sign extension in check_alu_op()" }, - "CVE-2019-0145": { - "cmt_msg": "i40e: add num_vectors checker in iwarp handler" + "CVE-2017-16994": { + "cmt_msg": "mm/pagewalk.c: report holes in hugetlb ranges" }, - "CVE-2022-44034": { - "cmt_msg": "char: pcmcia: remove all the drivers" + "CVE-2018-18397": { + "cmt_msg": "userfaultfd: use ENOENT instead of EFAULT if the atomic copy user fails" }, - "CVE-2022-44033": { - "cmt_msg": "char: pcmcia: remove all the drivers" + "CVE-2017-17558": { + "cmt_msg": "USB: core: prevent malicious bNumInterfaces overflow" }, - "CVE-2019-11191": { - "cmt_msg": "x86: Deprecate a.out support" + "CVE-2023-1390": { + "cmt_msg": "tipc: fix NULL deref in tipc_link_xmit()" }, - "CVE-2023-39198": { - "cmt_msg": "drm/qxl: fix UAF on handle creation" + "CVE-2020-10751": { + "cmt_msg": "selinux: properly handle multiple messages in selinux_netlink_send()" }, - "CVE-2018-10323": { - "cmt_msg": "xfs: set format back to extents if xfs_bmap_extents_to_btree" + "CVE-2020-10757": { + "cmt_msg": "mm: Fix mremap not considering huge pmd devmap" }, - "CVE-2018-10322": { - "cmt_msg": "xfs: enhance dinode verifier" + "CVE-2019-14763": { + "cmt_msg": "usb: dwc3: gadget: never call ->complete() from ->ep_queue()" }, - "CVE-2020-26139": { - "cmt_msg": "mac80211: do not accept/forward invalid EAPOL frames" + "CVE-2022-1116": { + "cmt_msg": "" }, - "CVE-2019-10220": { - "cmt_msg": "Convert filldir[64]() from __put_user() to unsafe_put_user()" + "CVE-2021-28660": { + "cmt_msg": "staging: rtl8188eu: prevent ->ssid overflow in rtw_wx_set_scan()" }, - "CVE-2021-3609": { - "cmt_msg": "can: bcm: delay release of struct bcm_op after synchronize_rcu()" + "CVE-2020-36386": { + "cmt_msg": "Bluetooth: Fix slab-out-of-bounds read in hci_extended_inquiry_result_evt()" }, - "CVE-2019-19536": { - "cmt_msg": "can: peak_usb: pcan_usb_pro: Fix info-leaks to USB devices" + "CVE-2020-36385": { + "cmt_msg": "RDMA/ucma: Rework ucma_migrate_id() to avoid races with destroy" }, - "CVE-2019-19537": { - "cmt_msg": "USB: core: Fix races in character device registration and deregistraion" + "CVE-2018-9385": { + "cmt_msg": "ARM: amba: Don't read past the end of sysfs \"driver_override\" buffer" }, - "CVE-2019-19534": { - "cmt_msg": "can: peak_usb: fix slab info leak" + "CVE-2020-0009": { + "cmt_msg": "staging: android: ashmem: Disallow ashmem memory from being remapped" }, - "CVE-2019-19535": { - "cmt_msg": "can: peak_usb: pcan_usb_fd: Fix info-leaks to USB devices" + "CVE-2019-14615": { + "cmt_msg": "drm/i915/gen9: Clear residual context state on context switch" }, - "CVE-2019-19532": { - "cmt_msg": "HID: Fix assumption that devices have inputs" + "CVE-2018-9415": { + "cmt_msg": "ARM: amba: Fix race condition with driver_override" }, - "CVE-2018-14617": { - "cmt_msg": "hfsplus: fix NULL dereference in hfsplus_lookup()" + "CVE-2019-13648": { + "cmt_msg": "powerpc/tm: Fix oops on sigreturn on systems without TM" }, - "CVE-2019-10638": { - "cmt_msg": "inet: switch IP ID generator to siphash" + "CVE-2018-15572": { + "cmt_msg": "x86/speculation: Protect against userspace-userspace spectreRSB" }, - "CVE-2019-10639": { - "cmt_msg": "netns: provide pure entropy for net_hash_mix()" + "CVE-2022-1204": { + "cmt_msg": "ax25: Fix refcount leaks caused by ax25_cb_del()" }, - "CVE-2022-33981": { - "cmt_msg": "floppy: disable FDRAWCMD by default" + "CVE-2018-9363": { + "cmt_msg": "Bluetooth: hidp: buffer overflow in hidp_process_report" }, - "CVE-2021-0929": { - "cmt_msg": "staging/android/ion: delete dma_buf->kmap/unmap implemenation" + "CVE-2016-10723": { + "cmt_msg": "mm, oom: remove sleep from under oom_lock" }, - "CVE-2018-14616": { - "cmt_msg": "f2fs: fix to do sanity check with block address in main area v2" + "CVE-2022-26490": { + "cmt_msg": "nfc: st21nfca: Fix potential buffer overflows in EVT_TRANSACTION" }, - "CVE-2019-20095": { - "cmt_msg": "mwifiex: Fix mem leak in mwifiex_tm_cmd" + "CVE-2020-8832": { + "cmt_msg": "drm/i915: Record the default hw state after reset upon load" }, - "CVE-2018-19985": { - "cmt_msg": "USB: hso: Fix OOB memory access in hso_probe/hso_get_config_data" + "CVE-2020-8834": { + "cmt_msg": "KVM: PPC: Book3S HV: Factor fake-suspend handling out of kvmppc_save/restore_tm" }, - "CVE-2018-6554": { - "cmt_msg": "staging: irda: remove the irda network stack and drivers" + "CVE-2023-52531": { + "cmt_msg": "wifi: iwlwifi: mvm: Fix a memory corruption issue" }, - "CVE-2018-6555": { - "cmt_msg": "staging: irda: remove the irda network stack and drivers" + "CVE-2023-52532": { + "cmt_msg": "net: mana: Fix TX CQE error handling" }, - "CVE-2021-0920": { - "cmt_msg": "af_unix: fix garbage collect vs MSG_PEEK" + "CVE-2023-39189": { + "cmt_msg": "netfilter: nfnetlink_osf: avoid OOB read" }, - "CVE-2022-0168": { - "cmt_msg": "cifs: fix NULL ptr dereference in smb2_ioctl_query_info()" + "CVE-2024-26677": { + "cmt_msg": "rxrpc: Fix delayed ACKs to not set the reference serial number" }, - "CVE-2024-26587": { - "cmt_msg": "net: netdevsim: don't try to destroy PHC on VFs" + "CVE-2020-25211": { + "cmt_msg": "netfilter: ctnetlink: add a range check for l3/l4 protonum" }, - "CVE-2023-51043": { - "cmt_msg": "drm/atomic: Fix potential use-after-free in nonblocking commits" + "CVE-2020-25212": { + "cmt_msg": "nfs: Fix getxattr kernel panic and memory overflow" }, "CVE-2020-28374": { "cmt_msg": "scsi: target: Fix XCOPY NAA identifier lookup" }, - "CVE-2019-9213": { - "cmt_msg": "mm: enforce min addr even if capable() in expand_downwards()" + "CVE-2024-26672": { + "cmt_msg": "drm/amdgpu: Fix variable 'mca_funcs' dereferenced before NULL check in 'amdgpu_mca_smu_get_mca_entry()'" }, - "CVE-2023-2007": { - "cmt_msg": "scsi: dpt_i2o: Remove obsolete driver" + "CVE-2024-26671": { + "cmt_msg": "blk-mq: fix IO hang from sbitmap wakeup race" }, - "CVE-2023-0615": { - "cmt_msg": "media: vivid: dev->bitmap_cap wasn't freed in all cases" + "CVE-2024-26679": { + "cmt_msg": "inet: read sk->sk_family once in inet_recv_error()" }, - "CVE-2020-26557": { - "cmt_msg": "" + "CVE-2023-52458": { + "cmt_msg": "block: add check that partition length needs to be aligned with block size" }, - "CVE-2019-14896": { - "cmt_msg": "libertas: Fix two buffer overflows at parsing bss descriptor" + "CVE-2023-52451": { + "cmt_msg": "powerpc/pseries/memhp: Fix access beyond end of drmem array" }, - "CVE-2019-14897": { - "cmt_msg": "libertas: Fix two buffer overflows at parsing bss descriptor" + "CVE-2018-9568": { + "cmt_msg": "net: Set sk_prot_creator when cloning sockets to the right proto" }, - "CVE-2019-14895": { - "cmt_msg": "mwifiex: fix possible heap overflow in mwifiex_process_country_ie()" + "CVE-2022-0644": { + "cmt_msg": "vfs: check fd has read access in kernel_read_file_from_fd()" }, - "CVE-2022-3586": { - "cmt_msg": "sch_sfb: Don't assume the skb is still around after enqueueing to child" + "CVE-2019-14816": { + "cmt_msg": "mwifiex: Fix three heap overflow at parsing element in cfg80211_ap_settings" }, - "CVE-2022-43750": { - "cmt_msg": "usb: mon: make mmapped memory read only" + "CVE-2019-14814": { + "cmt_msg": "mwifiex: Fix three heap overflow at parsing element in cfg80211_ap_settings" }, - "CVE-2020-27825": { - "cmt_msg": "tracing: Fix race in trace_open and buffer resize call" + "CVE-2019-14815": { + "cmt_msg": "mwifiex: Fix three heap overflow at parsing element in cfg80211_ap_settings" }, - "CVE-2019-2181": { - "cmt_msg": "binder: check for overflow when alloc for security context" + "CVE-2024-26706": { + "cmt_msg": "parisc: Fix random data corruption from exception handler" }, - "CVE-2019-2182": { - "cmt_msg": "arm64: Enforce BBM for huge IO/VMAP mappings" + "CVE-2024-26704": { + "cmt_msg": "ext4: fix double-free of blocks due to wrong extents moved_len" }, - "CVE-2020-27820": { - "cmt_msg": "drm/nouveau: use drm_dev_unplug() during device removal" + "CVE-2020-25672": { + "cmt_msg": "nfc: fix memory leak in llcp_sock_connect()" }, - "CVE-2018-19854": { - "cmt_msg": "crypto: user - fix leaking uninitialized memory to userspace" + "CVE-2020-25673": { + "cmt_msg": "nfc: Avoid endless loops caused by repeated llcp_sock_connect()" }, - "CVE-2020-0067": { - "cmt_msg": "f2fs: fix to avoid memory leakage in f2fs_listxattr" + "CVE-2020-25670": { + "cmt_msg": "nfc: fix refcount leak in llcp_sock_bind()" }, - "CVE-2023-4622": { - "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES" + "CVE-2020-25671": { + "cmt_msg": "nfc: fix refcount leak in llcp_sock_connect()" }, - "CVE-2020-26558": { - "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical" + "CVE-2019-19813": { + "cmt_msg": "btrfs: inode: Verify inode mode to avoid NULL pointer dereference" }, - "CVE-2023-39193": { - "cmt_msg": "netfilter: xt_sctp: validate the flag_info count" + "CVE-2020-29374": { + "cmt_msg": "gup: document and work around \"COW can break either way\" issue" }, - "CVE-2023-1079": { - "cmt_msg": "HID: asus: use spinlock to safely schedule workers" + "CVE-2019-19815": { + "cmt_msg": "f2fs: support swap file w/ DIO" }, - "CVE-2020-26541": { - "cmt_msg": "certs: Add EFI_CERT_X509_GUID support for dbx entries" + "CVE-2019-19814": { + "cmt_msg": "" }, - "CVE-2019-20811": { - "cmt_msg": "net-sysfs: call dev_hold if kobject_init_and_add success" + "CVE-2020-29371": { + "cmt_msg": "romfs: fix uninitialized memory leak in romfs_dev_read()" }, - "CVE-2020-26559": { - "cmt_msg": "" + "CVE-2019-19816": { + "cmt_msg": "btrfs: inode: Verify inode mode to avoid NULL pointer dereference" }, - "CVE-2021-20317": { - "cmt_msg": "lib/timerqueue: Rely on rbtree semantics for next timer" + "CVE-2018-18710": { + "cmt_msg": "cdrom: fix improper type cast, which can leat to information leak." }, - "CVE-2021-43389": { - "cmt_msg": "isdn: cpai: check ctr->cnr to avoid array index out of bound" + "CVE-2023-34255": { + "cmt_msg": "xfs: verify buffer contents when we skip log replay" }, - "CVE-2023-3111": { - "cmt_msg": "btrfs: unset reloc control if transaction commit fails in prepare_to_relocate()" + "CVE-2017-14051": { + "cmt_msg": "scsi: qla2xxx: Fix an integer overflow in sysfs code" }, - "CVE-2018-1094": { - "cmt_msg": "ext4: always initialize the crc32c checksum driver" + "CVE-2023-3141": { + "cmt_msg": "memstick: r592: Fix UAF bug in r592_remove due to race condition" }, - "CVE-2018-1095": { - "cmt_msg": "ext4: limit xattr size to INT_MAX" + "CVE-2020-12655": { + "cmt_msg": "xfs: add agf freeblocks verify in xfs_agf_verify" }, - "CVE-2018-1092": { - "cmt_msg": "ext4: fail ext4_iget for root directory if unallocated" + "CVE-2022-3524": { + "cmt_msg": "tcp/udp: Fix memory leak in ipv6_renew_options()." }, - "CVE-2018-1093": { - "cmt_msg": "ext4: add validity checks for bitmap block numbers" + "CVE-2022-3523": { + "cmt_msg": "mm/memory.c: fix race when faulting a device private page" }, - "CVE-2023-1074": { - "cmt_msg": "sctp: fail if no bound addresses can be used for a given scope" + "CVE-2022-3522": { + "cmt_msg": "mm/hugetlb: use hugetlb_pte_stable in migration race check" }, - "CVE-2021-3864": { - "cmt_msg": "" + "CVE-2022-3521": { + "cmt_msg": "kcm: avoid potential race in kcm_tx_work" }, - "CVE-2024-26584": { - "cmt_msg": "net: tls: handle backlogging of crypto requests" + "CVE-2018-7755": { + "cmt_msg": "floppy: Do not copy a kernel pointer to user memory in FDGETPRM ioctl" }, - "CVE-2022-1652": { - "cmt_msg": "floppy: use a statically allocated error counter" + "CVE-2018-7754": { + "cmt_msg": "printk: hash addresses printed with %p" }, - "CVE-2023-4623": { - "cmt_msg": "net/sched: sch_hfsc: Ensure inner classes have fsc curve" + "CVE-2018-7757": { + "cmt_msg": "scsi: libsas: fix memory leak in sas_smp_get_phy_events()" }, - "CVE-2024-23849": { - "cmt_msg": "net/rds: Fix UBSAN: array-index-out-of-bounds in rds_cmsg_recv" + "CVE-2019-15030": { + "cmt_msg": "powerpc/tm: Fix FP/VMX unavailable exceptions inside a transaction" }, - "CVE-2020-29568": { - "cmt_msg": "xen/xenbus: Allow watches discard events before queueing" + "CVE-2022-0330": { + "cmt_msg": "drm/i915: Flush TLBs before releasing backing store" }, - "CVE-2020-29569": { - "cmt_msg": "xen-blkback: set ring->xenblkd to NULL after kthread_stop()" + "CVE-2022-4095": { + "cmt_msg": "staging: rtl8712: fix use after free bugs" }, - "CVE-2020-14351": { - "cmt_msg": "perf/core: Fix race in the perf_mmap_close() function" + "CVE-2022-45919": { + "cmt_msg": "media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221" }, - "CVE-2019-19054": { - "cmt_msg": "media: rc: prevent memory leak in cx23888_ir_probe" + "CVE-2021-3669": { + "cmt_msg": "ipc: replace costly bailout check in sysvipc_find_ipc()" }, - "CVE-2019-19057": { - "cmt_msg": "mwifiex: pcie: Fix memory leak in mwifiex_pcie_init_evt_ring" + "CVE-2019-3701": { + "cmt_msg": "can: gw: ensure DLC boundaries after CAN frame modification" }, - "CVE-2019-19056": { - "cmt_msg": "mwifiex: pcie: Fix memory leak in mwifiex_pcie_alloc_cmdrsp_buf" + "CVE-2023-1095": { + "cmt_msg": "netfilter: nf_tables: fix null deref due to zeroed list head" }, - "CVE-2019-9453": { - "cmt_msg": "f2fs: fix to avoid accessing xattr across the boundary" + "CVE-2022-3239": { + "cmt_msg": "media: em28xx: initialize refcount before kref_get" }, - "CVE-2023-23039": { + "CVE-2022-4543": { "cmt_msg": "" }, - "CVE-2019-19052": { - "cmt_msg": "can: gs_usb: gs_can_open(): prevent memory leak" - }, - "CVE-2019-3846": { - "cmt_msg": "mwifiex: Fix possible buffer overflows at parsing bss descriptor" + "CVE-2019-18282": { + "cmt_msg": "net/flow_dissector: switch to siphash" }, - "CVE-2023-46838": { - "cmt_msg": "xen-netback: don't produce zero-size SKB frags" + "CVE-2021-34981": { + "cmt_msg": "Bluetooth: cmtp: fix file refcount when cmtp_attach_device fails" }, - "CVE-2020-0427": { - "cmt_msg": "pinctrl: devicetree: Avoid taking direct reference to device name string" + "CVE-2018-14625": { + "cmt_msg": "vhost/vsock: fix use-after-free in network stack callers" }, - "CVE-2022-2977": { - "cmt_msg": "tpm: fix reference counting for struct tpm_chip" + "CVE-2023-4881": { + "cmt_msg": "netfilter: nftables: exthdr: fix 4-byte stack OOB write" }, - "CVE-2019-19058": { - "cmt_msg": "iwlwifi: dbg_ini: fix memory leak in alloc_sgtable" + "CVE-2013-7445": { + "cmt_msg": "" }, - "CVE-2020-0423": { - "cmt_msg": "binder: fix UAF when releasing todo list" + "CVE-2024-26804": { + "cmt_msg": "net: ip_tunnel: prevent perpetual headroom growth" }, - "CVE-2019-9458": { - "cmt_msg": "media: v4l: event: Prevent freeing event subscriptions while accessed" + "CVE-2024-26805": { + "cmt_msg": "netlink: Fix kernel-infoleak-after-free in __skb_datagram_iter" }, - "CVE-2023-40283": { - "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb" + "CVE-2022-3303": { + "cmt_msg": "ALSA: pcm: oss: Fix race at SNDCTL_DSP_SYNC" }, - "CVE-2016-8660": { - "cmt_msg": "" + "CVE-2020-12771": { + "cmt_msg": "bcache: fix potential deadlock problem in btree_gc_coalesce" }, - "CVE-2020-14314": { - "cmt_msg": "ext4: fix potential negative array index in do_split()" + "CVE-2023-2483": { + "cmt_msg": "net: qcom/emac: Fix use after free bug in emac_remove due to race condition" }, - "CVE-2023-3090": { - "cmt_msg": "ipvlan:Fix out-of-bounds caused by unclear skb->cb" + "CVE-2024-0607": { + "cmt_msg": "netfilter: nf_tables: fix pointer math issue in nft_byteorder_eval()" }, - "CVE-2019-13272": { - "cmt_msg": "ptrace: Fix ->ptracer_cred handling for PTRACE_TRACEME" + "CVE-2024-26801": { + "cmt_msg": "Bluetooth: Avoid potential use-after-free in hci_error_reset" }, - "CVE-2023-1073": { - "cmt_msg": "HID: check empty report_list in hid_validate_values()" + "CVE-2022-28389": { + "cmt_msg": "can: mcba_usb: mcba_usb_start_xmit(): fix double dev_kfree_skb in error path" }, - "CVE-2023-45862": { - "cmt_msg": "USB: ene_usb6250: Allocate enough memory for full object" + "CVE-2022-28388": { + "cmt_msg": "can: usb_8dev: usb_8dev_start_xmit(): fix double dev_kfree_skb() in error path" }, - "CVE-2023-45863": { - "cmt_msg": "kobject: Fix slab-out-of-bounds in fill_kobj_path()" + "CVE-2018-6412": { + "cmt_msg": "fbdev: Fixing arbitrary kernel leak in case FBIOGETCMAP_SPARC in sbusfb_ioctl_helper()." }, - "CVE-2023-1582": { - "cmt_msg": "fs/proc: task_mmu.c: don't read mapcount for migration entry" + "CVE-2018-1000004": { + "cmt_msg": "ALSA: seq: Make ioctls race-free" }, - "CVE-2022-1786": { - "cmt_msg": "io_uring: remove io_identity" + "CVE-2019-20811": { + "cmt_msg": "net-sysfs: call dev_hold if kobject_init_and_add success" }, - "CVE-2019-17351": { - "cmt_msg": "xen: let alloc_xenballooned_pages() fail if not enough memory free" + "CVE-2019-20810": { + "cmt_msg": "media: go7007: fix a miss of snd_card_free" }, - "CVE-2022-23222": { - "cmt_msg": "bpf: Replace PTR_TO_XXX_OR_NULL with PTR_TO_XXX | PTR_MAYBE_NULL" + "CVE-2019-20812": { + "cmt_msg": "af_packet: set defaule value for tmo" }, - "CVE-2020-25669": { - "cmt_msg": "Input: sunkbd - avoid use-after-free in teardown paths" + "CVE-2018-1118": { + "cmt_msg": "vhost: fix info leak due to uninitialized memory" }, - "CVE-2020-25668": { - "cmt_msg": "tty: make FONTX ioctl use the tty pointer they were actually passed" + "CVE-2019-18660": { + "cmt_msg": "powerpc/book3s64: Fix link stack flush on context switch" }, - "CVE-2008-4609": { - "cmt_msg": "" + "CVE-2019-12380": { + "cmt_msg": "efi/x86/Add missing error handling to old_memmap 1:1 mapping code" }, - "CVE-2020-25705": { - "cmt_msg": "icmp: randomize the global rate limiter" + "CVE-2019-12381": { + "cmt_msg": "ip_sockglue: Fix missing-check bug in ip_ra_control()" }, - "CVE-2022-0435": { - "cmt_msg": "tipc: improve size validations for received domain records" + "CVE-2019-12382": { + "cmt_msg": "drm/edid: Fix a missing-check bug in drm_load_edid_firmware()" }, - "CVE-2022-20565": { - "cmt_msg": "HID: core: Correctly handle ReportSize being zero" + "CVE-2020-10766": { + "cmt_msg": "x86/speculation: Prevent rogue cross-process SSBD shutdown" }, - "CVE-2018-20854": { - "cmt_msg": "phy: ocelot-serdes: fix out-of-bounds read" + "CVE-2020-10767": { + "cmt_msg": "x86/speculation: Avoid force-disabling IBPB based on STIBP and enhanced IBRS." }, - "CVE-2018-25020": { - "cmt_msg": "bpf: fix truncated jump targets on heavy expansions" + "CVE-2019-25162": { + "cmt_msg": "i2c: Fix a potential use after free" }, - "CVE-2018-5390": { - "cmt_msg": "tcp: free batches of packets in tcp_prune_ofo_queue()" + "CVE-2019-25160": { + "cmt_msg": "netlabel: fix out-of-bounds memory accesses" }, - "CVE-2023-26607": { - "cmt_msg": "ntfs: fix out-of-bounds read in ntfs_attr_find()" + "CVE-2020-10768": { + "cmt_msg": "x86/speculation: PR_SPEC_FORCE_DISABLE enforcement for indirect branches." }, - "CVE-2018-20855": { - "cmt_msg": "IB/mlx5: Fix leaking stack memory to userspace" + "CVE-2020-10769": { + "cmt_msg": "crypto: authenc - fix parsing key with misaligned rta_len" }, - "CVE-2019-15239": { - "cmt_msg": "unknown" + "CVE-2020-10942": { + "cmt_msg": "vhost: Check docket sk_family instead of call getname" }, - "CVE-2022-26373": { - "cmt_msg": "x86/speculation: Add RSB VM Exit protections" + "CVE-2020-26139": { + "cmt_msg": "mac80211: do not accept/forward invalid EAPOL frames" }, - "CVE-2021-4037": { - "cmt_msg": "xfs: fix up non-directory creation in SGID directories" + "CVE-2019-19536": { + "cmt_msg": "can: peak_usb: pcan_usb_pro: Fix info-leaks to USB devices" }, - "CVE-2021-22543": { - "cmt_msg": "KVM: do not allow mapping valid but non-reference-counted pages" + "CVE-2019-19537": { + "cmt_msg": "USB: core: Fix races in character device registration and deregistraion" }, - "CVE-2022-45884": { - "cmt_msg": "" + "CVE-2019-19534": { + "cmt_msg": "can: peak_usb: fix slab info leak" }, - "CVE-2021-3348": { - "cmt_msg": "nbd: freeze the queue while we're adding connections" + "CVE-2019-19535": { + "cmt_msg": "can: peak_usb: pcan_usb_fd: Fix info-leaks to USB devices" }, - "CVE-2019-1999": { - "cmt_msg": "binder: fix race between munmap() and direct reclaim" + "CVE-2020-11565": { + "cmt_msg": "mm: mempolicy: require at least one nodeid for MPOL_PREFERRED" }, - "CVE-2023-20941": { - "cmt_msg": "" + "CVE-2019-19533": { + "cmt_msg": "media: ttusb-dec: Fix info-leak in ttusb_dec_send_command()" }, - "CVE-2019-15292": { - "cmt_msg": "appletalk: Fix use-after-free in atalk_proc_exit" + "CVE-2019-19530": { + "cmt_msg": "usb: cdc-acm: make sure a refcount is taken early enough" }, - "CVE-2018-20836": { - "cmt_msg": "scsi: libsas: fix a race condition when smp task timeout" + "CVE-2019-19531": { + "cmt_msg": "usb: yurex: Fix use-after-free in yurex_delete" }, - "CVE-2021-44733": { - "cmt_msg": "tee: handle lookup of shm with reference count 0" + "CVE-2023-52527": { + "cmt_msg": "ipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data()" }, - "CVE-2021-3347": { - "cmt_msg": "futex: Ensure the correct return value from futex_lock_pi()" + "CVE-2023-3006": { + "cmt_msg": "arm64: Add AMPERE1 to the Spectre-BHB affected list" }, - "CVE-2020-10135": { - "cmt_msg": "Bluetooth: Consolidate encryption handling in hci_encrypt_cfm" + "CVE-2023-52522": { + "cmt_msg": "net: fix possible store tearing in neigh_periodic_work()" }, - "CVE-2020-25285": { - "cmt_msg": "mm/hugetlb: fix a race between hugetlb sysctl handlers" + "CVE-2019-8912": { + "cmt_msg": "net: crypto set sk to NULL when af_alg_release." }, - "CVE-2019-7308": { - "cmt_msg": "bpf: fix sanitation of alu op with pointer / scalar type from different paths" + "CVE-2023-52528": { + "cmt_msg": "net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg" }, - "CVE-2021-45868": { - "cmt_msg": "quota: check block number when reading the block in quota file" + "CVE-2020-0305": { + "cmt_msg": "chardev: Avoid potential use-after-free in 'chrdev_open()'" }, - "CVE-2022-1966": { - "cmt_msg": "netfilter: nf_tables: disallow non-stateful expression in sets earlier" + "CVE-2024-22386": { + "cmt_msg": "" }, - "CVE-2019-2025": { - "cmt_msg": "binder: fix race that allows malicious free of live buffer" + "CVE-2023-39194": { + "cmt_msg": "net: xfrm: Fix xfrm_address_filter OOB read" }, - "CVE-2021-3587": { - "cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect" + "CVE-2023-39197": { + "cmt_msg": "netfilter: conntrack: dccp: copy entire header to stack buffer, not just basic one" }, - "CVE-2019-16995": { - "cmt_msg": "net: hsr: fix memory leak in hsr_dev_finalize()" + "CVE-2023-39193": { + "cmt_msg": "netfilter: xt_sctp: validate the flag_info count" }, - "CVE-2019-16994": { - "cmt_msg": "net: sit: fix memory leak in sit_init_net()" + "CVE-2023-39192": { + "cmt_msg": "netfilter: xt_u32: validate user space input" }, - "CVE-2018-13099": { - "cmt_msg": "f2fs: fix to do sanity check with reserved blkaddr of inline inode" + "CVE-2024-26600": { + "cmt_msg": "phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP" }, - "CVE-2022-3534": { - "cmt_msg": "libbpf: Fix use-after-free in btf_dump_name_dups" + "CVE-2024-26606": { + "cmt_msg": "binder: signal epoll threads of self-work" }, - "CVE-2020-36516": { - "cmt_msg": "ipv4: avoid using shared IP generator for connected sockets" + "CVE-2017-14156": { + "cmt_msg": "video: fbdev: aty: do not leak uninitialized padding in clk to userspace" }, - "CVE-2020-36766": { - "cmt_msg": "cec-api: prevent leaking memory through hole in structure" + "CVE-2023-52429": { + "cmt_msg": "dm: limit the number of targets and parameter size area" }, - "CVE-2022-3061": { - "cmt_msg": "video: fbdev: i740fb: Error out if 'pixclock' equals zero" + "CVE-2022-1652": { + "cmt_msg": "floppy: use a statically allocated error counter" }, - "CVE-2023-28328": { - "cmt_msg": "media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer()" + "CVE-2020-29568": { + "cmt_msg": "xen/xenbus: Allow watches discard events before queueing" }, - "CVE-2022-0322": { - "cmt_msg": "sctp: account stream padding length for reconf chunk" + "CVE-2020-29569": { + "cmt_msg": "xen-blkback: set ring->xenblkd to NULL after kthread_stop()" }, - "CVE-2022-3533": { + "CVE-2016-8660": { "cmt_msg": "" }, - "CVE-2023-6121": { - "cmt_msg": "nvmet: nul-terminate the NQNs passed in the connect command" + "CVE-2020-14314": { + "cmt_msg": "ext4: fix potential negative array index in do_split()" }, - "CVE-2017-13693": { - "cmt_msg": "" + "CVE-2019-13272": { + "cmt_msg": "ptrace: Fix ->ptracer_cred handling for PTRACE_TRACEME" }, - "CVE-2022-0617": { - "cmt_msg": "udf: Fix NULL ptr deref when converting from inline format" + "CVE-2022-1786": { + "cmt_msg": "io_uring: remove io_identity" }, - "CVE-2017-13695": { - "cmt_msg": "ACPICA: acpi: acpica: fix acpi operand cache leak in nseval.c" + "CVE-2020-25669": { + "cmt_msg": "Input: sunkbd - avoid use-after-free in teardown paths" }, - "CVE-2017-13694": { + "CVE-2020-25668": { + "cmt_msg": "tty: make FONTX ioctl use the tty pointer they were actually passed" + }, + "CVE-2008-4609": { "cmt_msg": "" }, - "CVE-2021-4149": { - "cmt_msg": "btrfs: unlock newly allocated extent buffer after error" + "CVE-2022-0435": { + "cmt_msg": "tipc: improve size validations for received domain records" }, - "CVE-2022-21385": { - "cmt_msg": "net/rds: fix warn in rds_message_alloc_sgs" + "CVE-2023-26607": { + "cmt_msg": "ntfs: fix out-of-bounds read in ntfs_attr_find()" }, - "CVE-2022-42895": { - "cmt_msg": "Bluetooth: L2CAP: Fix attempting to access uninitialized memory" + "CVE-2021-4037": { + "cmt_msg": "xfs: fix up non-directory creation in SGID directories" }, - "CVE-2021-3640": { - "cmt_msg": "Bluetooth: sco: Fix lock_sock() blockage by memcpy_from_msg()" + "CVE-2021-22543": { + "cmt_msg": "KVM: do not allow mapping valid but non-reference-counted pages" }, - "CVE-2021-3764": { - "cmt_msg": "crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd()" + "CVE-2018-18386": { + "cmt_msg": "n_tty: fix EXTPROC vs ICANON interaction with TIOCINQ (aka FIONREAD)" }, - "CVE-2020-1749": { - "cmt_msg": "net: ipv6_stub: use ip6_dst_lookup_flow instead of ip6_dst_lookup" + "CVE-2021-47169": { + "cmt_msg": "serial: rp2: use 'request_firmware' instead of 'request_firmware_nowait'" }, - "CVE-2022-42896": { - "cmt_msg": "Bluetooth: L2CAP: Fix accepting connection request for invalid SPSM" + "CVE-2023-3776": { + "cmt_msg": "net/sched: cls_fw: Fix improper refcount update leads to use-after-free" }, - "CVE-2021-3760": { - "cmt_msg": "nfc: nci: fix the UAF of rf_conn_info object" + "CVE-2023-3772": { + "cmt_msg": "xfrm: add NULL check in xfrm_update_ae_params" }, - "CVE-2022-36123": { - "cmt_msg": "x86: Clear .brk area at early boot" + "CVE-2022-3533": { + "cmt_msg": "" }, - "CVE-2020-11608": { - "cmt_msg": "media: ov519: add missing endpoint sanity checks" + "CVE-2022-3534": { + "cmt_msg": "libbpf: Fix use-after-free in btf_dump_name_dups" }, - "CVE-2020-10732": { - "cmt_msg": "fs/binfmt_elf.c: allocate initialized memory in fill_thread_core_info()" + "CVE-2018-7740": { + "cmt_msg": "hugetlbfs: check for pgoff value overflow" }, - "CVE-2020-28097": { - "cmt_msg": "vgacon: remove software scrollback support" + "CVE-2022-0322": { + "cmt_msg": "sctp: account stream padding length for reconf chunk" }, - "CVE-2024-24859": { - "cmt_msg": "" + "CVE-2021-4149": { + "cmt_msg": "btrfs: unlock newly allocated extent buffer after error" }, - "CVE-2024-24858": { - "cmt_msg": "" + "CVE-2022-21385": { + "cmt_msg": "net/rds: fix warn in rds_message_alloc_sgs" }, - "CVE-2024-24855": { - "cmt_msg": "scsi: lpfc: Fix a possible data race in lpfc_unregister_fcf_rescan()" + "CVE-2021-47180": { + "cmt_msg": "NFC: nci: fix memory leak in nci_allocate_device" }, - "CVE-2024-24857": { - "cmt_msg": "" + "CVE-2020-28097": { + "cmt_msg": "vgacon: remove software scrollback support" }, "CVE-2018-5848": { "cmt_msg": "wil6210: missing length check in wmi_set_ie" }, - "CVE-2021-29264": { - "cmt_msg": "gianfar: fix jumbo packets+napi+rx overrun crash" - }, - "CVE-2021-29265": { - "cmt_msg": "usbip: fix stub_dev usbip_sockfd_store() races leading to gpf" - }, - "CVE-2021-39648": { - "cmt_msg": "usb: gadget: configfs: Fix use-after-free issue with udc_name" - }, - "CVE-2022-3545": { - "cmt_msg": "nfp: fix use-after-free in area_cache_get()" + "CVE-2018-8897": { + "cmt_msg": "x86/entry/64: Don't use IST entry for #BP stack" }, "CVE-2020-14416": { "cmt_msg": "can, slip: Protect tty->disc_data in write_wakeup and close with RCU" }, - "CVE-2019-0136": { - "cmt_msg": "mac80211: drop robust management frames from unknown TA" + "CVE-2021-46928": { + "cmt_msg": "parisc: Clear stale IIR value on instruction access rights trap" }, - "CVE-2022-3542": { - "cmt_msg": "bnx2x: fix potential memory leak in bnx2x_tpa_stop()" + "CVE-2018-14633": { + "cmt_msg": "scsi: target: iscsi: Use hex2bin instead of a re-implementation" }, - "CVE-2019-16921": { - "cmt_msg": "RDMA/hns: Fix init resp when alloc ucontext" + "CVE-2021-46924": { + "cmt_msg": "NFC: st21nfca: Fix memory leak in device probe and remove" }, - "CVE-2022-3344": { - "cmt_msg": "KVM: x86: nSVM: harden svm_free_nested against freeing vmcb02 while still in use" + "CVE-2021-46925": { + "cmt_msg": "net/smc: fix kernel panic caused by race of smc_sock" }, - "CVE-2021-21781": { - "cmt_msg": "ARM: ensure the signal page contains defined contents" + "CVE-2021-46926": { + "cmt_msg": "ALSA: hda: intel-sdw-acpi: harden detection of controller" }, - "CVE-2021-0512": { - "cmt_msg": "HID: make arrays usage and value to be the same" + "CVE-2023-1206": { + "cmt_msg": "tcp: Reduce chance of collisions in inet6_hashfn()." }, - "CVE-2018-14633": { - "cmt_msg": "scsi: target: iscsi: Use hex2bin instead of a re-implementation" + "CVE-2022-3649": { + "cmt_msg": "nilfs2: fix use-after-free bug of struct nilfs_root" }, - "CVE-2018-12896": { - "cmt_msg": "posix-timers: Sanitize overrun handling" + "CVE-2017-17712": { + "cmt_msg": "net: ipv4: fix for a race condition in raw_sendmsg" }, - "CVE-2023-1382": { - "cmt_msg": "tipc: set con sock in tipc_conn_alloc" + "CVE-2022-3642": { + "cmt_msg": "" }, - "CVE-2019-18683": { - "cmt_msg": "media: vivid: Fix wrong locking that causes race conditions on streaming stop" + "CVE-2022-3643": { + "cmt_msg": "xen/netback: Ensure protocol headers don't fall in the non-linear area" }, - "CVE-2018-14734": { - "cmt_msg": "infiniband: fix a possible use-after-free bug" + "CVE-2021-1048": { + "cmt_msg": "fix regression in \"epoll: Keep a reference on files added to the check list\"" }, - "CVE-2022-29581": { - "cmt_msg": "net/sched: cls_u32: fix netns refcount changes in u32_change()" + "CVE-2020-0543": { + "cmt_msg": "x86/cpu: Add 'table' argument to cpu_matches()" }, - "CVE-2020-0347": { + "CVE-2024-25739": { "cmt_msg": "" }, - "CVE-2019-18809": { - "cmt_msg": "media: usb: fix memory leak in af9005_identify_state" - }, - "CVE-2019-18808": { - "cmt_msg": "crypto: ccp - Release all allocated memory if sha type is invalid" + "CVE-2023-6535": { + "cmt_msg": "" }, - "CVE-2022-41222": { - "cmt_msg": "mm/mremap: hold the rmap lock in write mode when moving page table entries." + "CVE-2023-6536": { + "cmt_msg": "nvmet-tcp: fix a crash in nvmet_req_complete()" }, - "CVE-2021-40490": { - "cmt_msg": "ext4: fix race writing to an inline_data file while its xattrs are changing" + "CVE-2020-15780": { + "cmt_msg": "ACPI: configfs: Disallow loading ACPI tables when locked down" }, - "CVE-2021-33909": { - "cmt_msg": "seq_file: disallow extremely large seq buffer allocations" + "CVE-2019-11815": { + "cmt_msg": "net: rds: force to destroy connection if t_sock is NULL in rds_tcp_kill_sock()." }, - "CVE-2019-12455": { - "cmt_msg": "clk-sunxi: fix a missing-check bug in sunxi_divs_clk_setup()" + "CVE-2022-36280": { + "cmt_msg": "drm/vmwgfx: Validate the box size for the snooped cursor" }, - "CVE-2019-12456": { + "CVE-2024-21803": { "cmt_msg": "" }, - "CVE-2023-20569": { - "cmt_msg": "x86/bugs: Increase the x86 bugs vector size to two u32s" + "CVE-2018-1108": { + "cmt_msg": "random: fix crng_ready() test" }, - "CVE-2019-18805": { - "cmt_msg": "ipv4: set the tcp_min_rtt_wlen range from 0 to one day" + "CVE-2018-16276": { + "cmt_msg": "USB: yurex: fix out-of-bounds uaccess in read handler" }, - "CVE-2021-29647": { - "cmt_msg": "net: qrtr: fix a kernel-infoleak in qrtr_recvmsg()" + "CVE-2023-2176": { + "cmt_msg": "RDMA/core: Refactor rdma_bind_addr" }, - "CVE-2019-18806": { - "cmt_msg": "net: qlogic: Fix memory leak in ql_alloc_large_buffers" + "CVE-2019-16413": { + "cmt_msg": "9p: use inode->i_lock to protect i_size_write() under 32-bit" }, - "CVE-2021-33656": { - "cmt_msg": "vt: drop old FONT ioctls" + "CVE-2019-7222": { + "cmt_msg": "KVM: x86: work around leak of uninitialized stack contents (CVE-2019-7222)" }, - "CVE-2021-33655": { - "cmt_msg": "fbcon: Disallow setting font bigger than screen size" + "CVE-2019-7221": { + "cmt_msg": "KVM: nVMX: unconditionally cancel preemption timer in free_nested (CVE-2019-7221)" }, - "CVE-2022-41858": { - "cmt_msg": "drivers: net: slip: fix NPD bug in sl_tx_timeout()" + "CVE-2020-10773": { + "cmt_msg": "s390/cmm: fix information leak in cmm_timeout_handler()" }, - "CVE-2019-6974": { - "cmt_msg": "kvm: fix kvm_ioctl_create_device() reference counting (CVE-2019-6974)" + "CVE-2018-18281": { + "cmt_msg": "mremap: properly flush TLB before releasing the page" }, - "CVE-2022-41850": { - "cmt_msg": "HID: roccat: Fix use-after-free in roccat_read()" + "CVE-2022-2663": { + "cmt_msg": "netfilter: nf_conntrack_irc: Fix forged IP logic" }, - "CVE-2020-24503": { - "cmt_msg": "" + "CVE-2024-26803": { + "cmt_msg": "net: veth: clear GRO when clearing XDP even when down" }, - "CVE-2023-2985": { - "cmt_msg": "fs: hfsplus: fix UAF issue in hfsplus_put_super" + "CVE-2020-25643": { + "cmt_msg": "hdlc_ppp: add range checks in ppp_cp_parse_cr()" }, - "CVE-2020-14390": { - "cmt_msg": "fbcon: remove soft scrollback code" + "CVE-2020-4788": { + "cmt_msg": "powerpc/64s: flush L1D on kernel entry" }, - "CVE-2020-24502": { - "cmt_msg": "" + "CVE-2021-39698": { + "cmt_msg": "wait: add wake_up_pollfree()" }, - "CVE-2022-3646": { - "cmt_msg": "nilfs2: fix leak of nilfs_root in case of writer thread creation failure" + "CVE-2018-5333": { + "cmt_msg": "RDS: null pointer dereference in rds_atomic_free_op" }, - "CVE-2021-45469": { - "cmt_msg": "f2fs: fix to do sanity check on last xattr entry in __f2fs_setxattr()" + "CVE-2018-5332": { + "cmt_msg": "RDS: Heap OOB write in rds_message_alloc_sgs()" }, - "CVE-2022-1184": { - "cmt_msg": "ext4: verify dir block before splitting it" + "CVE-2021-3759": { + "cmt_msg": "memcg: enable accounting of ipc resources" }, - "CVE-2022-3642": { - "cmt_msg": "" + "CVE-2019-19528": { + "cmt_msg": "USB: iowarrior: fix use-after-free on disconnect" }, - "CVE-2019-19448": { - "cmt_msg": "btrfs: only search for left_info if there is no right_info in try_merge_free_space" + "CVE-2017-17448": { + "cmt_msg": "netfilter: nfnetlink_cthelper: Add missing permission checks" }, - "CVE-2024-0584": { - "cmt_msg": "ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet" + "CVE-2017-17449": { + "cmt_msg": "netlink: Add netns check on taps" }, - "CVE-2019-19449": { - "cmt_msg": "f2fs: fix to do sanity check on segment/section count" + "CVE-2019-19525": { + "cmt_msg": "ieee802154: atusb: fix use-after-free at disconnect" }, - "CVE-2020-0465": { - "cmt_msg": "HID: core: Sanitize event code and type when mapping input" + "CVE-2019-19524": { + "cmt_msg": "Input: ff-memless - kill timer in destroy()" }, - "CVE-2018-3639": { - "cmt_msg": "x86/nospec: Simplify alternative_msr_write()" + "CVE-2019-19527": { + "cmt_msg": "HID: hiddev: do cleanup in failure of opening a device" }, - "CVE-2021-4218": { - "cmt_msg": "sysctl: pass kernel pointers to ->proc_handler" + "CVE-2019-19526": { + "cmt_msg": "NFC: pn533: fix use-after-free and memleaks" }, - "CVE-2019-15902": { - "cmt_msg": "unknown" + "CVE-2021-3753": { + "cmt_msg": "vt_kdsetmode: extend console locking" }, - "CVE-2024-25739": { - "cmt_msg": "" + "CVE-2021-3752": { + "cmt_msg": "Bluetooth: fix use-after-free error in lock_sock_nested()" }, - "CVE-2023-3358": { - "cmt_msg": "HID: intel_ish-hid: Add check for ishtp_dma_tx_map" + "CVE-2023-7192": { + "cmt_msg": "netfilter: ctnetlink: fix possible refcount leak in ctnetlink_create_conntrack()" }, - "CVE-2019-20054": { - "cmt_msg": "fs/proc/proc_sysctl.c: fix NULL pointer dereference in put_links" + "CVE-2022-1263": { + "cmt_msg": "KVM: avoid NULL pointer dereference in kvm_dirty_ring_push" }, - "CVE-2024-0340": { - "cmt_msg": "vhost: use kzalloc() instead of kmalloc() followed by memset()" + "CVE-2017-18241": { + "cmt_msg": "f2fs: fix a panic caused by NULL flush_cmd_control" }, - "CVE-2021-3753": { - "cmt_msg": "vt_kdsetmode: extend console locking" + "CVE-2021-41864": { + "cmt_msg": "bpf: Fix integer overflow in prealloc_elems_and_freelist()" }, - "CVE-2023-6536": { + "CVE-2022-2209": { "cmt_msg": "" }, - "CVE-2019-11135": { - "cmt_msg": "x86/msr: Add the IA32_TSX_CTRL MSR" + "CVE-2023-7042": { + "cmt_msg": "wifi: ath10k: fix NULL pointer dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev()" }, - "CVE-2019-11810": { - "cmt_msg": "scsi: megaraid_sas: return error when create DMA pool failed" + "CVE-2023-52559": { + "cmt_msg": "iommu/vt-d: Avoid memory allocation in iommu_suspend()" }, - "CVE-2021-27365": { - "cmt_msg": "scsi: iscsi: Ensure sysfs attributes are limited to PAGE_SIZE" + "CVE-2023-47233": { + "cmt_msg": "wifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach" }, - "CVE-2021-27364": { - "cmt_msg": "scsi: iscsi: Restrict sessions and handles to admin capabilities" + "CVE-2022-1462": { + "cmt_msg": "tty: use new tty_insert_flip_string_and_push_buffer() in pty_write()" }, - "CVE-2019-11815": { - "cmt_msg": "net: rds: force to destroy connection if t_sock is NULL in rds_tcp_kill_sock()." + "CVE-2024-26614": { + "cmt_msg": "tcp: make sure init the accept_queue's spinlocks once" }, - "CVE-2020-0431": { - "cmt_msg": "HID: hid-input: clear unmapped usages" + "CVE-2019-20636": { + "cmt_msg": "Input: add safety guards to input_set_keycode()" }, - "CVE-2022-39842": { - "cmt_msg": "video: fbdev: pxa3xx-gcu: Fix integer overflow in pxa3xx_gcu_write" + "CVE-2023-52435": { + "cmt_msg": "net: prevent mss overflow in skb_segment()" }, - "CVE-2018-17977": { - "cmt_msg": "" + "CVE-2023-52434": { + "cmt_msg": "smb: client: fix potential OOBs in smb2_parse_contexts()" }, - "CVE-2024-1151": { - "cmt_msg": "net: openvswitch: limit the number of recursions from action sets" + "CVE-2023-52436": { + "cmt_msg": "f2fs: explicitly null-terminate the xattr list" }, - "CVE-2018-17972": { - "cmt_msg": "proc: restrict kernel stack dumps to root" + "CVE-2023-51779": { + "cmt_msg": "Bluetooth: af_bluetooth: Fix Use-After-Free in bt_sock_recvmsg" }, - "CVE-2021-20322": { - "cmt_msg": "ipv6: make exception cache less predictible" + "CVE-2018-10877": { + "cmt_msg": "ext4: verify the depth of extent tree in ext4_find_extent()" }, - "CVE-2021-20320": { - "cmt_msg": "s390/bpf: Fix optimizing out zero-extensions" + "CVE-2018-10876": { + "cmt_msg": "ext4: only look at the bg_flags field if it is valid" }, - "CVE-2021-20321": { - "cmt_msg": "ovl: fix missing negative dentry check in ovl_rename()" + "CVE-2010-4563": { + "cmt_msg": "" }, - "CVE-2022-26490": { - "cmt_msg": "nfc: st21nfca: Fix potential buffer overflows in EVT_TRANSACTION" + "CVE-2023-2162": { + "cmt_msg": "scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress" }, - "CVE-2023-3812": { - "cmt_msg": "net: tun: fix bugs for oversize packet when napi frags enabled" + "CVE-2018-10879": { + "cmt_msg": "ext4: make sure bitmaps and the inode table don't overlap with bg descriptors" }, - "CVE-2021-0937": { - "cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write" + "CVE-2018-10878": { + "cmt_msg": "ext4: always check block group bounds in ext4_init_block_bitmap()" }, - "CVE-2022-3169": { - "cmt_msg": "nvme: ensure subsystem reset is single threaded" + "CVE-2023-4622": { + "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES" }, - "CVE-2022-4744": { - "cmt_msg": "tun: avoid double free in tun_free_netdev" + "CVE-2023-4623": { + "cmt_msg": "net/sched: sch_hfsc: Ensure inner classes have fsc curve" }, - "CVE-2022-36280": { - "cmt_msg": "drm/vmwgfx: Validate the box size for the snooped cursor" + "CVE-2019-0146": { + "cmt_msg": "i40e: add num_vectors checker in iwarp handler" }, - "CVE-2022-1048": { - "cmt_msg": "ALSA: pcm: Fix races among concurrent hw_params and hw_free calls" + "CVE-2021-38300": { + "cmt_msg": "bpf, mips: Validate conditional branch offsets" }, - "CVE-2018-20976": { - "cmt_msg": "xfs: clear sb->s_fs_info on mount failure" + "CVE-2020-25656": { + "cmt_msg": "vt: keyboard, extend func_buf_lock to readers" }, - "CVE-2018-10840": { - "cmt_msg": "ext4: correctly handle a zero-length xattr with a non-zero e_value_offs" + "CVE-2021-4023": { + "cmt_msg": "io-wq: fix cancellation on create-worker failure" }, - "CVE-2023-22995": { - "cmt_msg": "usb: dwc3: dwc3-qcom: Add missing platform_device_put() in dwc3_qcom_acpi_register_core" + "CVE-2018-3693": { + "cmt_msg": "ext4: fix spectre gadget in ext4_mb_regular_allocator()" }, - "CVE-2024-21803": { - "cmt_msg": "" + "CVE-2021-22555": { + "cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write" }, - "CVE-2018-1108": { - "cmt_msg": "random: fix crng_ready() test" + "CVE-2023-3161": { + "cmt_msg": "fbcon: Check font dimension limits" }, - "CVE-2018-16276": { - "cmt_msg": "USB: yurex: fix out-of-bounds uaccess in read handler" + "CVE-2021-3506": { + "cmt_msg": "f2fs: fix to avoid out-of-bounds memory access" }, - "CVE-2021-3444": { - "cmt_msg": "bpf: Fix truncation handling for mod32 dst reg wrt zero" + "CVE-2018-7191": { + "cmt_msg": "tun: call dev_get_valid_name() before register_netdevice()" }, - "CVE-2019-15927": { - "cmt_msg": "ALSA: usb-audio: Avoid access before bLength check in build_audio_procunit()" + "CVE-2017-0786": { + "cmt_msg": "brcmfmac: add length check in brcmf_cfg80211_escan_handler()" }, - "CVE-2021-3542": { - "cmt_msg": "" + "CVE-2021-47082": { + "cmt_msg": "tun: avoid double free in tun_free_netdev" }, - "CVE-2019-16413": { - "cmt_msg": "9p: use inode->i_lock to protect i_size_write() under 32-bit" + "CVE-2021-47083": { + "cmt_msg": "pinctrl: mediatek: fix global-out-of-bounds issue" }, - "CVE-2024-24860": { - "cmt_msg": "Bluetooth: Fix atomicity violation in {min,max}_key_size_set" + "CVE-2021-31916": { + "cmt_msg": "dm ioctl: fix out of bounds array access when no devices" }, - "CVE-2023-2177": { - "cmt_msg": "sctp: leave the err path free in sctp_stream_init to sctp_stream_free" + "CVE-2021-47086": { + "cmt_msg": "phonet/pep: refuse to enable an unbound pipe" }, - "CVE-2023-30456": { - "cmt_msg": "KVM: nVMX: add missing consistency checks for CR0 and CR4" + "CVE-2018-11506": { + "cmt_msg": "sr: pass down correctly sized SCSI sense buffer" }, - "CVE-2020-12652": { - "cmt_msg": "scsi: mptfusion: Fix double fetch bug in ioctl" + "CVE-2023-32269": { + "cmt_msg": "netrom: Fix use-after-free caused by accept on already connected socket" }, - "CVE-2020-12653": { - "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_cmd_append_vsie_tlv()" + "CVE-2021-4157": { + "cmt_msg": "pNFS/flexfiles: fix incorrect size check in decode_nfs_fh()" }, - "CVE-2019-7222": { - "cmt_msg": "KVM: x86: work around leak of uninitialized stack contents (CVE-2019-7222)" + "CVE-2021-4155": { + "cmt_msg": "xfs: map unwritten blocks in XFS_IOC_{ALLOC,FREE}SP just like fallocate" }, - "CVE-2020-12657": { - "cmt_msg": "block, bfq: fix use-after-free in bfq_idle_slice_timer_body" + "CVE-2021-4150": { + "cmt_msg": "block: fix incorrect references to disk objects" }, - "CVE-2020-12654": { - "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_ret_wmm_get_status()" + "CVE-2021-4159": { + "cmt_msg": "bpf: Verifer, adjust_scalar_min_max_vals to always call update_reg_bounds()" }, - "CVE-2019-7221": { - "cmt_msg": "KVM: nVMX: unconditionally cancel preemption timer in free_nested (CVE-2019-7221)" + "CVE-2021-29154": { + "cmt_msg": "bpf, x86: Validate computation of branch displacements for x86-64" }, - "CVE-2018-12929": { - "cmt_msg": "" + "CVE-2021-29155": { + "cmt_msg": "bpf: Use correct permission flag for mixed signed bounds arithmetic" }, - "CVE-2018-12928": { - "cmt_msg": "" + "CVE-2019-3016": { + "cmt_msg": "x86/kvm: Be careful not to clear KVM_VCPU_FLUSH_TLB bit" }, - "CVE-2020-36310": { - "cmt_msg": "KVM: SVM: avoid infinite loop on NPF from bad address" + "CVE-2022-25375": { + "cmt_msg": "usb: gadget: rndis: check size of RNDIS_MSG_SET command" }, - "CVE-2020-36313": { - "cmt_msg": "KVM: Fix out of range accesses to memslots" + "CVE-2021-47158": { + "cmt_msg": "net: dsa: sja1105: add error handling in sja1105_setup()" }, - "CVE-2020-35519": { - "cmt_msg": "net/x25: prevent a couple of overflows" + "CVE-2021-47159": { + "cmt_msg": "net: dsa: fix a crash if ->get_sset_count() fails" }, - "CVE-2024-26592": { - "cmt_msg": "ksmbd: fix UAF issue in ksmbd_tcp_new_connection()" + "CVE-2021-47153": { + "cmt_msg": "i2c: i801: Don't generate an interrupt on bus reset" }, - "CVE-2021-28971": { - "cmt_msg": "perf/x86/intel: Fix a crash caused by zero PEBS status" + "CVE-2021-47150": { + "cmt_msg": "net: fec: fix the potential memory leak in fec_enet_init()" }, - "CVE-2019-12984": { - "cmt_msg": "nfc: Ensure presence of required attributes in the deactivate_target handler" + "CVE-2021-47151": { + "cmt_msg": "interconnect: qcom: bcm-voter: add a missing of_node_put()" }, - "CVE-2020-25673": { - "cmt_msg": "nfc: Avoid endless loops caused by repeated llcp_sock_connect()" + "CVE-2021-46936": { + "cmt_msg": "net: fix use-after-free in tw_timer_handler" }, - "CVE-2022-0400": { + "CVE-2021-46933": { + "cmt_msg": "usb: gadget: f_fs: Clear ffs_eventfd in ffs_data_clear." + }, + "CVE-2021-46932": { + "cmt_msg": "Input: appletouch - initialize work before device registration" + }, + "CVE-2021-46939": { + "cmt_msg": "tracing: Restructure trace_clock_global() to never block" + }, + "CVE-2021-46938": { + "cmt_msg": "dm rq: fix double free of blk_mq_tag_set in dev remove after table load fails" + }, + "CVE-2018-16862": { + "cmt_msg": "mm: cleancache: fix corruption on missed inode invalidation" + }, + "CVE-2024-26623": { + "cmt_msg": "pds_core: Prevent race issues involving the adminq" + }, + "CVE-2018-16884": { + "cmt_msg": "sunrpc: use-after-free in svc_process_common()" + }, + "CVE-2022-45885": { "cmt_msg": "" }, - "CVE-2023-6356": { + "CVE-2022-45884": { + "cmt_msg": "" + }, + "CVE-2024-25740": { "cmt_msg": "" }, "CVE-2024-25741": { "cmt_msg": "" }, - "CVE-2021-38160": { - "cmt_msg": "virtio_console: Assure used length from device is limited" + "CVE-2024-25744": { + "cmt_msg": "x86/coco: Disable 32-bit emulation by default on TDX and SEV" }, - "CVE-2021-42739": { - "cmt_msg": "media: firewire: firedtv-avc: fix a buffer overflow in avc_ca_pmt()" + "CVE-2023-1859": { + "cmt_msg": "9p/xen : Fix use after free bug in xen_9pfs_front_remove due to race condition" }, - "CVE-2023-1989": { - "cmt_msg": "Bluetooth: btsdio: fix use after free bug in btsdio_remove due to unfinished work" + "CVE-2023-2513": { + "cmt_msg": "ext4: fix use-after-free in ext4_xattr_set_entry" }, - "CVE-2022-3111": { - "cmt_msg": "power: supply: wm8350-power: Add missing free in free_charger_irq" + "CVE-2023-1855": { + "cmt_msg": "hwmon: (xgene) Fix use after free bug in xgene_hwmon_remove due to race condition" }, - "CVE-2020-12771": { - "cmt_msg": "bcache: fix potential deadlock problem in btree_gc_coalesce" + "CVE-2015-2877": { + "cmt_msg": "" }, - "CVE-2020-12770": { - "cmt_msg": "scsi: sg: add sg_remove_request in sg_write" + "CVE-2019-16089": { + "cmt_msg": "" }, - "CVE-2018-6412": { - "cmt_msg": "fbdev: Fixing arbitrary kernel leak in case FBIOGETCMAP_SPARC in sbusfb_ioctl_helper()." + "CVE-2018-1130": { + "cmt_msg": "dccp: check sk for closed state in dccp_sendmsg()" }, - "CVE-2019-15222": { - "cmt_msg": "ALSA: usb-audio: Fix gpf in snd_usb_pipe_sanity_check" + "CVE-2021-45486": { + "cmt_msg": "inet: use bigger hash table for IP ID generation" }, - "CVE-2022-25265": { - "cmt_msg": "" + "CVE-2021-3923": { + "cmt_msg": "RDMA/core: Don't infoleak GRH fields" }, - "CVE-2022-20368": { - "cmt_msg": "net/packet: fix slab-out-of-bounds access in packet_recvmsg()" + "CVE-2020-14331": { + "cmt_msg": "vgacon: Fix for missing check in scrollback handling" }, - "CVE-2019-15220": { - "cmt_msg": "p54usb: Fix race between disconnect and firmware loading" + "CVE-2022-36123": { + "cmt_msg": "x86: Clear .brk area at early boot" }, - "CVE-2019-14284": { - "cmt_msg": "floppy: fix div-by-zero in setup_format_params" + "CVE-2019-19532": { + "cmt_msg": "HID: Fix assumption that devices have inputs" }, - "CVE-2020-10773": { - "cmt_msg": "s390/cmm: fix information leak in cmm_timeout_handler()" + "CVE-2020-36558": { + "cmt_msg": "vt: vt_ioctl: fix race in VT_RESIZEX" }, - "CVE-2022-21499": { - "cmt_msg": "lockdown: also lock down previous kgdb use" + "CVE-2018-13100": { + "cmt_msg": "f2fs: fix to do sanity check with secs_per_zone" }, - "CVE-2020-25284": { - "cmt_msg": "rbd: require global CAP_SYS_ADMIN for mapping and unmapping" + "CVE-2018-8087": { + "cmt_msg": "mac80211_hwsim: fix possible memory leak in hwsim_new_radio_nl()" }, - "CVE-2023-4208": { - "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free" + "CVE-2020-36158": { + "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_cmd_802_11_ad_hoc_start" }, - "CVE-2022-3606": { - "cmt_msg": "" + "CVE-2022-40307": { + "cmt_msg": "efi: capsule-loader: Fix use-after-free in efi_capsule_write" }, - "CVE-2023-4206": { - "cmt_msg": "net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free" + "CVE-2021-39686": { + "cmt_msg": "binder: use euid from cred instead of using task" }, - "CVE-2023-4207": { - "cmt_msg": "net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free" + "CVE-2021-39685": { + "cmt_msg": "USB: gadget: detect too-big endpoint 0 requests" }, - "CVE-2023-3640": { - "cmt_msg": "" + "CVE-2018-1000204": { + "cmt_msg": "scsi: sg: allocate with __GFP_ZERO in sg_build_indirect()" }, - "CVE-2018-18281": { - "cmt_msg": "mremap: properly flush TLB before releasing the page" + "CVE-2021-3744": { + "cmt_msg": "crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd()" }, - "CVE-2023-20593": { - "cmt_msg": "x86/cpu/amd: Add a Zenbleed fix" + "CVE-2017-17450": { + "cmt_msg": "netfilter: xt_osf: Add missing permission checks" }, - "CVE-2023-3022": { - "cmt_msg": "ipv6: Use result arg in fib_lookup_arg consistently" + "CVE-2024-26592": { + "cmt_msg": "ksmbd: fix UAF issue in ksmbd_tcp_new_connection()" }, - "CVE-2022-2663": { - "cmt_msg": "netfilter: nf_conntrack_irc: Fix forged IP logic" + "CVE-2024-26594": { + "cmt_msg": "ksmbd: validate mech token in session setup" }, - "CVE-2019-8912": { - "cmt_msg": "net: crypto set sk to NULL when af_alg_release." + "CVE-2024-26595": { + "cmt_msg": "mlxsw: spectrum_acl_tcam: Fix NULL pointer dereference in error path" }, - "CVE-2023-51780": { - "cmt_msg": "atm: Fix Use-After-Free in do_vcc_ioctl" + "CVE-2017-18270": { + "cmt_msg": "KEYS: prevent creating a different user's keyrings" }, - "CVE-2023-0047": { - "cmt_msg": "mm, oom: do not trigger out_of_memory from the #PF" + "CVE-2024-26598": { + "cmt_msg": "KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache" }, - "CVE-2020-29370": { - "cmt_msg": "mm: slub: add missing TID bump in kmem_cache_alloc_bulk()" + "CVE-2018-3646": { + "cmt_msg": "x86/microcode: Allow late microcode loading with SMT disabled" }, - "CVE-2019-15219": { - "cmt_msg": "USB: sisusbvga: fix oops in error path of sisusb_probe" + "CVE-2023-2002": { + "cmt_msg": "bluetooth: Perform careful capability checks in hci_sock_ioctl()" }, - "CVE-2022-20424": { - "cmt_msg": "io_uring: remove io_identity" + "CVE-2022-29900": { + "cmt_msg": "x86/kvm/vmx: Make noinstr clean" }, - "CVE-2022-20422": { - "cmt_msg": "arm64: fix oops in concurrently setting insn_emulation sysctls" + "CVE-2023-2007": { + "cmt_msg": "scsi: dpt_i2o: Remove obsolete driver" }, - "CVE-2022-20421": { - "cmt_msg": "binder: fix UAF of ref->proc caused by race condition" + "CVE-2022-1419": { + "cmt_msg": "drm/vgem: Close use-after-free race in vgem_gem_create" }, - "CVE-2023-4385": { - "cmt_msg": "fs: jfs: fix possible NULL pointer dereference in dbFree()" + "CVE-2017-16913": { + "cmt_msg": "usbip: fix stub_rx: harden CMD_SUBMIT path to handle malicious input" }, - "CVE-2020-25643": { - "cmt_msg": "hdlc_ppp: add range checks in ppp_cp_parse_cr()" + "CVE-2022-2503": { + "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag" }, - "CVE-2023-4387": { - "cmt_msg": "net: vmxnet3: fix possible use-after-free bugs in vmxnet3_rq_alloc_rx_buf()" + "CVE-2022-23038": { + "cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()" }, - "CVE-2019-19378": { - "cmt_msg": "" + "CVE-2022-23039": { + "cmt_msg": "xen/gntalloc: don't use gnttab_query_foreign_access()" }, - "CVE-2020-4788": { - "cmt_msg": "powerpc/64s: flush L1D on kernel entry" + "CVE-2022-23036": { + "cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()" }, - "CVE-2022-36879": { - "cmt_msg": "xfrm: xfrm_policy: fix a possible double xfrm_pols_put() in xfrm_bundle_lookup()" + "CVE-2022-23037": { + "cmt_msg": "xen/netfront: don't use gnttab_query_foreign_access() for mapped status" }, - "CVE-2022-1011": { - "cmt_msg": "fuse: fix pipe buffer lifetime for direct_io" + "CVE-2019-15538": { + "cmt_msg": "xfs: fix missing ILOCK unlock when xfs_setattr_nonsize fails due to EDQUOT" }, - "CVE-2021-39698": { - "cmt_msg": "wait: add wake_up_pollfree()" + "CVE-2019-14821": { + "cmt_msg": "KVM: coalesced_mmio: add bounds checking" }, - "CVE-2022-45934": { - "cmt_msg": "Bluetooth: L2CAP: Fix u8 overflow" + "CVE-2020-12826": { + "cmt_msg": "signal: Extend exec_id to 64bits" }, - "CVE-2022-1247": { - "cmt_msg": "" + "CVE-2021-42008": { + "cmt_msg": "net: 6pack: fix slab-out-of-bounds in decode_data" }, - "CVE-2019-19377": { - "cmt_msg": "btrfs: Don't submit any btree write bio if the fs has errors" + "CVE-2020-25645": { + "cmt_msg": "geneve: add transport ports in route lookup for geneve" }, - "CVE-2022-2380": { - "cmt_msg": "video: fbdev: sm712fb: Fix crash in smtcfb_read()" + "CVE-2019-15666": { + "cmt_msg": "xfrm: policy: Fix out-of-bound array accesses in __xfrm_policy_unlink" }, - "CVE-2022-0850": { - "cmt_msg": "ext4: fix kernel infoleak via ext4_extent_header" + "CVE-2020-25641": { + "cmt_msg": "block: allow for_each_bvec to support zero len bvec" }, - "CVE-2019-19529": { - "cmt_msg": "can: mcba_usb: fix use-after-free on disconnect" + "CVE-2021-33034": { + "cmt_msg": "Bluetooth: verify AMP hci_chan before amp_destroy" }, - "CVE-2019-19528": { - "cmt_msg": "USB: iowarrior: fix use-after-free on disconnect" + "CVE-2021-33033": { + "cmt_msg": "cipso,calipso: resolve a number of problems with the DOI refcounts" }, - "CVE-2021-3612": { - "cmt_msg": "Input: joydev - prevent potential read overflow in ioctl" + "CVE-2022-40768": { + "cmt_msg": "scsi: stex: Properly zero out the passthrough command structure" }, - "CVE-2019-19525": { - "cmt_msg": "ieee802154: atusb: fix use-after-free at disconnect" + "CVE-2024-26625": { + "cmt_msg": "llc: call sock_orphan() at release time" }, - "CVE-2019-19524": { - "cmt_msg": "Input: ff-memless - kill timer in destroy()" + "CVE-2024-26627": { + "cmt_msg": "scsi: core: Move scsi_host_busy() out of host lock for waking up EH handler" }, - "CVE-2019-19527": { - "cmt_msg": "HID: hiddev: do cleanup in failure of opening a device" + "CVE-2024-26622": { + "cmt_msg": "tomoyo: fix UAF write bug in tomoyo_write_control()" }, - "CVE-2019-19526": { - "cmt_msg": "NFC: pn533: fix use-after-free and memleaks" + "CVE-2023-39198": { + "cmt_msg": "drm/qxl: fix UAF on handle creation" }, - "CVE-2023-31085": { - "cmt_msg": "ubi: Refuse attaching if mtd's erasesize is 0" + "CVE-2018-10021": { + "cmt_msg": "scsi: libsas: defer ata device eh commands to libata" }, - "CVE-2019-19523": { - "cmt_msg": "USB: adutux: fix use-after-free on disconnect" + "CVE-2019-10126": { + "cmt_msg": "mwifiex: Fix heap overflow in mwifiex_uap_parse_tail_ies()" }, - "CVE-2021-3752": { - "cmt_msg": "Bluetooth: fix use-after-free error in lock_sock_nested()" + "CVE-2019-10124": { + "cmt_msg": "mm: hwpoison: fix thp split handing in soft_offline_in_use_page()" }, - "CVE-2020-11725": { - "cmt_msg": "" + "CVE-2020-13974": { + "cmt_msg": "vt: keyboard: avoid signed integer overflow in k_ascii" }, - "CVE-2019-3892": { - "cmt_msg": "coredump: fix race condition between mmget_not_zero()/get_task_mm() and core dumping" + "CVE-2018-10938": { + "cmt_msg": "Cipso: cipso_v4_optptr enter infinite loop" }, - "CVE-2022-1263": { - "cmt_msg": "KVM: avoid NULL pointer dereference in kvm_dirty_ring_push" + "CVE-2020-15437": { + "cmt_msg": "serial: 8250: fix null-ptr-deref in serial8250_start_tx()" }, - "CVE-2021-35477": { - "cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4" + "CVE-2020-15436": { + "cmt_msg": "block: Fix use-after-free in blkdev_get()" }, - "CVE-2023-31436": { - "cmt_msg": "net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg" + "CVE-2021-47065": { + "cmt_msg": "rtw88: Fix array overrun in rtw_get_tx_power_params()" }, - "CVE-2022-3521": { - "cmt_msg": "kcm: avoid potential race in kcm_tx_work" + "CVE-2022-23816": { + "cmt_msg": "x86/kvm/vmx: Make noinstr clean" }, - "CVE-2023-31082": { - "cmt_msg": "" + "CVE-2021-47145": { + "cmt_msg": "btrfs: do not BUG_ON in link_to_fixup_dir" }, - "CVE-2022-47929": { - "cmt_msg": "net: sched: disallow noqueue for qdisc classes" + "CVE-2021-47149": { + "cmt_msg": "net: fujitsu: fix potential null-ptr-deref" }, - "CVE-2019-16746": { - "cmt_msg": "nl80211: validate beacon head" + "CVE-2018-19407": { + "cmt_msg": "KVM: X86: Fix scan ioapic use-before-initialization" }, - "CVE-2021-41864": { - "cmt_msg": "bpf: Fix integer overflow in prealloc_elems_and_freelist()" + "CVE-2021-47144": { + "cmt_msg": "drm/amd/amdgpu: fix refcount leak" }, - "CVE-2023-31081": { - "cmt_msg": "" + "CVE-2021-47147": { + "cmt_msg": "ptp: ocp: Fix a resource leak in an error handling path" }, - "CVE-2022-2209": { - "cmt_msg": "" + "CVE-2021-47146": { + "cmt_msg": "mld: fix panic in mld_newpack()" }, - "CVE-2018-18021": { - "cmt_msg": "arm64: KVM: Tighten guest core register access from userspace" + "CVE-2021-47140": { + "cmt_msg": "iommu/amd: Clear DMA ops when switching domain" }, - "CVE-2022-45887": { - "cmt_msg": "media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb()" + "CVE-2021-47143": { + "cmt_msg": "net/smc: remove device from smcd_dev_list after failed device_add()" }, - "CVE-2021-37576": { - "cmt_msg": "KVM: PPC: Book3S: Fix H_RTAS rets buffer overflow" + "CVE-2021-47142": { + "cmt_msg": "drm/amdgpu: Fix a use-after-free" }, - "CVE-2019-8980": { - "cmt_msg": "exec: Fix mem leak in kernel_read_file" + "CVE-2021-46941": { + "cmt_msg": "usb: dwc3: core: Do core softreset when switch mode" }, - "CVE-2023-45871": { - "cmt_msg": "igb: set max size RX buffer when store bad packet is enabled" + "CVE-2024-26765": { + "cmt_msg": "LoongArch: Disable IRQ before init_fn() for nonboot CPUs" }, - "CVE-2023-1855": { - "cmt_msg": "hwmon: (xgene) Fix use after free bug in xgene_hwmon_remove due to race condition" + "CVE-2018-16871": { + "cmt_msg": "nfsd: COPY and CLONE operations require the saved filehandle to be set" }, - "CVE-2023-7042": { - "cmt_msg": "" + "CVE-2018-16658": { + "cmt_msg": "cdrom: Fix info leak/OOB read in cdrom_ioctl_drive_status" }, - "CVE-2022-3594": { - "cmt_msg": "r8152: Rate limit overflow messages" + "CVE-2019-19036": { + "cmt_msg": "btrfs: Detect unbalanced tree with empty leaf before crashing btree operations" }, - "CVE-2018-14609": { - "cmt_msg": "btrfs: relocation: Only remove reloc rb_trees if reloc control has been initialized" + "CVE-2019-19039": { + "cmt_msg": "btrfs: Don't submit any btree write bio if the fs has errors" }, - "CVE-2023-35824": { - "cmt_msg": "media: dm1105: Fix use after free bug in dm1105_remove due to race condition" + "CVE-2021-32078": { + "cmt_msg": "ARM: footbridge: remove personal server platform" }, - "CVE-2021-33098": { - "cmt_msg": "ixgbe: fix large MTU request from VF" + "CVE-2022-4662": { + "cmt_msg": "USB: core: Prevent nested device-reset calls" }, - "CVE-2022-3595": { - "cmt_msg": "cifs: fix double-fault crash during ntlmssp" + "CVE-2019-11833": { + "cmt_msg": "ext4: zero out the unused memory region in the extent tree block" }, - "CVE-2023-47233": { - "cmt_msg": "" + "CVE-2020-27835": { + "cmt_msg": "IB/hfi1: Ensure correct mm is used at all times" }, - "CVE-2020-10769": { - "cmt_msg": "crypto: authenc - fix parsing key with misaligned rta_len" + "CVE-2018-5953": { + "cmt_msg": "printk: hash addresses printed with %p" }, - "CVE-2020-27815": { - "cmt_msg": "jfs: Fix array index bounds check in dbAdjTree" + "CVE-2018-1128": { + "cmt_msg": "libceph: add authorizer challenge" }, - "CVE-2022-23041": { - "cmt_msg": "xen/9p: use alloc/free_pages_exact()" + "CVE-2018-1129": { + "cmt_msg": "libceph: implement CEPHX_V2 calculation mode" }, - "CVE-2021-33624": { - "cmt_msg": "bpf: Inherit expanded/patched seen count from old aux data" + "CVE-2018-1120": { + "cmt_msg": "proc: do not access cmdline nor environ from file-backed areas" }, - "CVE-2022-1462": { - "cmt_msg": "tty: use new tty_insert_flip_string_and_push_buffer() in pty_write()" + "CVE-2018-1121": { + "cmt_msg": "" }, - "CVE-2022-3115": { - "cmt_msg": "drm: mali-dp: potential dereference of null pointer" + "CVE-2018-20856": { + "cmt_msg": "block: blk_init_allocated_queue() set q->fq as NULL in the fail case" }, - "CVE-2023-6606": { - "cmt_msg": "smb: client: fix OOB in smbCalcSize()" + "CVE-2022-3061": { + "cmt_msg": "video: fbdev: i740fb: Error out if 'pixclock' equals zero" }, - "CVE-2023-3006": { - "cmt_msg": "arm64: Add AMPERE1 to the Spectre-BHB affected list" + "CVE-2020-27784": { + "cmt_msg": "usb: gadget: function: printer: fix use-after-free in __lock_acquire" }, - "CVE-2020-27777": { - "cmt_msg": "powerpc/rtas: Restrict RTAS requests from userspace" + "CVE-2020-27786": { + "cmt_msg": "ALSA: rawmidi: Fix racy buffer resize under concurrent accesses" }, - "CVE-2019-20636": { - "cmt_msg": "Input: add safety guards to input_set_keycode()" + "CVE-2023-6240": { + "cmt_msg": "" }, - "CVE-2019-11486": { - "cmt_msg": "tty: mark Siemens R3964 line discipline as BROKEN" + "CVE-2022-39842": { + "cmt_msg": "video: fbdev: pxa3xx-gcu: Fix integer overflow in pxa3xx_gcu_write" }, - "CVE-2019-11487": { - "cmt_msg": "fs: prevent page refcount overflow in pipe_buf_get" + "CVE-2023-51043": { + "cmt_msg": "drm/atomic: Fix potential use-after-free in nonblocking commits" }, - "CVE-2022-28390": { - "cmt_msg": "can: ems_usb: ems_usb_start_xmit(): fix double dev_kfree_skb() in error path" + "CVE-2024-23196": { + "cmt_msg": "ALSA: hda: fix a possible null-pointer dereference due to data race in snd_hdac_regmap_sync()" }, - "CVE-2018-8043": { - "cmt_msg": "net: phy: mdio-bcm-unimac: fix potential NULL dereference in unimac_mdio_probe()" + "CVE-2017-16939": { + "cmt_msg": "ipsec: Fix aborted xfrm policy dump crash" }, - "CVE-2020-27675": { - "cmt_msg": "xen/events: avoid removing an event channel while handling it" + "CVE-2022-3115": { + "cmt_msg": "drm: mali-dp: potential dereference of null pointer" }, - "CVE-2020-28915": { - "cmt_msg": "fbcon: Fix global-out-of-bounds read in fbcon_get_font()" + "CVE-2021-26931": { + "cmt_msg": "xen-blkback: don't \"handle\" error by BUG()" }, - "CVE-2023-7192": { - "cmt_msg": "netfilter: ctnetlink: fix possible refcount leak in ctnetlink_create_conntrack()" + "CVE-2021-26930": { + "cmt_msg": "xen-blkback: fix error handling in xen_blkbk_map()" }, - "CVE-2019-20908": { - "cmt_msg": "efi: Restrict efivar_ssdt_load when the kernel is locked down" + "CVE-2022-3111": { + "cmt_msg": "power: supply: wm8350-power: Add missing free in free_charger_irq" }, - "CVE-2023-3776": { - "cmt_msg": "net/sched: cls_fw: Fix improper refcount update leads to use-after-free" + "CVE-2022-36402": { + "cmt_msg": "drm/vmwgfx: Fix shader stage validation" }, - "CVE-2021-28038": { - "cmt_msg": "Xen/gnttab: handle p2m update errors on a per-slot basis" + "CVE-2021-3178": { + "cmt_msg": "nfsd4: readdirplus shouldn't return parent of export" }, - "CVE-2021-33061": { - "cmt_msg": "ixgbe: add improvement for MDD response functionality" + "CVE-2023-1611": { + "cmt_msg": "btrfs: fix race between quota disable and quota assign ioctls" }, - "CVE-2022-23040": { - "cmt_msg": "xen/xenbus: don't let xenbus_grant_ring() remove grants in error case" + "CVE-2021-3772": { + "cmt_msg": "sctp: use init_tag from inithdr for ABORT chunk" }, - "CVE-2021-29154": { - "cmt_msg": "bpf, x86: Validate computation of branch displacements for x86-64" + "CVE-2021-34556": { + "cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4" }, - "CVE-2023-52435": { - "cmt_msg": "net: prevent mss overflow in skb_segment()" + "CVE-2021-28714": { + "cmt_msg": "xen/netback: fix rx queue stall detection" }, - "CVE-2023-52434": { - "cmt_msg": "smb: client: fix potential OOBs in smb2_parse_contexts()" + "CVE-2021-28713": { + "cmt_msg": "xen/console: harden hvc_xen against event channel storms" }, - "CVE-2023-3161": { - "cmt_msg": "fbcon: Check font dimension limits" + "CVE-2021-28712": { + "cmt_msg": "xen/netfront: harden netfront against event channel storms" }, - "CVE-2023-52436": { - "cmt_msg": "f2fs: explicitly null-terminate the xattr list" + "CVE-2021-28711": { + "cmt_msg": "xen/blkfront: harden blkfront against event channel storms" }, - "CVE-2019-19060": { - "cmt_msg": "iio: imu: adis16400: release allocated memory on failure" + "CVE-2022-1247": { + "cmt_msg": "" }, - "CVE-2019-19061": { - "cmt_msg": "iio: imu: adis16400: fix memory leak" + "CVE-2022-2991": { + "cmt_msg": "remove the lightnvm subsystem" }, - "CVE-2019-19062": { - "cmt_msg": "crypto: user - fix memory leak in crypto_report" + "CVE-2017-17862": { + "cmt_msg": "bpf: fix branch pruning logic" }, - "CVE-2019-19063": { - "cmt_msg": "rtlwifi: prevent memory leak in rtl_usb_probe" + "CVE-2017-17863": { + "cmt_msg": "bpf: fix integer overflows" }, - "CVE-2019-19065": { - "cmt_msg": "RDMA/hfi1: Prevent memory leak in sdma_init" + "CVE-2023-52578": { + "cmt_msg": "net: bridge: use DEV_STATS_INC()" }, - "CVE-2019-19066": { - "cmt_msg": "scsi: bfa: release allocated memory in case of error" + "CVE-2023-52574": { + "cmt_msg": "team: fix null-ptr-deref when team device type is changed" }, - "CVE-2019-19067": { - "cmt_msg": "drm/amdgpu: fix multiple memory leaks in acp_hw_init" + "CVE-2023-3567": { + "cmt_msg": "vc_screen: move load of struct vc_data pointer in vcs_read() to avoid UAF" }, - "CVE-2019-19068": { - "cmt_msg": "rtl8xxxu: prevent leaking urb" + "CVE-2023-52571": { + "cmt_msg": "power: supply: rk817: Fix node refcount leak" }, - "CVE-2020-0435": { - "cmt_msg": "f2fs: fix to do sanity check with i_extra_isize" + "CVE-2023-52572": { + "cmt_msg": "cifs: Fix UAF in cifs_demultiplex_thread()" }, - "CVE-2020-0432": { - "cmt_msg": "staging: most: net: fix buffer overflow" + "CVE-2018-10902": { + "cmt_msg": "ALSA: rawmidi: Change resized buffers atomically" }, - "CVE-2020-0433": { - "cmt_msg": "blk-mq: sync the update nr_hw_queues with blk_mq_queue_tag_busy_iter" + "CVE-2018-10853": { + "cmt_msg": "kvm: x86: use correct privilege level for sgdt/sidt/fxsave/fxrstor access" }, - "CVE-2020-0430": { - "cmt_msg": "bpf: reject passing modified ctx to helper functions" + "CVE-2020-12362": { + "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" }, - "CVE-2019-3874": { - "cmt_msg": "sctp: implement memory accounting on tx path" + "CVE-2020-12363": { + "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" }, - "CVE-2018-10877": { - "cmt_msg": "ext4: verify the depth of extent tree in ext4_find_extent()" + "CVE-2019-12881": { + "cmt_msg": "drm/i915/userptr: reject zero user_size" }, - "CVE-2018-10876": { - "cmt_msg": "ext4: only look at the bg_flags field if it is valid" + "CVE-2022-4129": { + "cmt_msg": "l2tp: Serialize access to sk_user_data with sk_callback_lock" }, - "CVE-2010-4563": { - "cmt_msg": "" + "CVE-2020-12364": { + "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" }, - "CVE-2023-1249": { - "cmt_msg": "coredump: Use the vma snapshot in fill_files_note" + "CVE-2023-33203": { + "cmt_msg": "net: qcom/emac: Fix use after free bug in emac_remove due to race condition" }, - "CVE-2020-14331": { - "cmt_msg": "vgacon: Fix for missing check in scrollback handling" + "CVE-2021-4002": { + "cmt_msg": "hugetlbfs: flush TLBs correctly after huge_pmd_unshare" }, - "CVE-2018-10879": { - "cmt_msg": "ext4: make sure bitmaps and the inode table don't overlap with bg descriptors" + "CVE-2023-26545": { + "cmt_msg": "net: mpls: fix stale pointer if allocation fails during device rename" }, - "CVE-2019-14835": { - "cmt_msg": "vhost: make sure log_num < in_num" + "CVE-2019-15292": { + "cmt_msg": "appletalk: Fix use-after-free in atalk_proc_exit" }, - "CVE-2023-2248": { - "cmt_msg": "net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg" + "CVE-2019-15291": { + "cmt_msg": "media: b2c2-flexcop-usb: add sanity checking" }, - "CVE-2023-0266": { - "cmt_msg": "ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF" + "CVE-2019-15290": { + "cmt_msg": "" }, - "CVE-2023-1838": { - "cmt_msg": "Fix double fget() in vhost_net_set_backend()" + "CVE-2023-3212": { + "cmt_msg": "gfs2: Don't deref jdesc in evict" }, - "CVE-2021-3483": { - "cmt_msg": "firewire: nosy: Fix a use-after-free bug in nosy_ioctl()" + "CVE-2024-26633": { + "cmt_msg": "ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim()" }, - "CVE-2023-6040": { - "cmt_msg": "netfilter: nf_tables: Reject tables of unsupported family" + "CVE-2024-26636": { + "cmt_msg": "llc: make llc_ui_sendmsg() more robust against bonding changes" }, - "CVE-2023-20588": { - "cmt_msg": "x86/CPU/AMD: Do not leak quotient data after a division by 0" + "CVE-2024-26635": { + "cmt_msg": "llc: Drop support for ETH_P_TR_802_2." }, - "CVE-2021-38300": { - "cmt_msg": "bpf, mips: Validate conditional branch offsets" + "CVE-2020-12769": { + "cmt_msg": "spi: spi-dw: Add lock protect dw_spi rx/tx to prevent concurrent calls" }, - "CVE-2020-25656": { - "cmt_msg": "vt: keyboard, extend func_buf_lock to readers" + "CVE-2023-52635": { + "cmt_msg": "PM / devfreq: Synchronize devfreq_monitor_[start/stop]" }, - "CVE-2021-3759": { - "cmt_msg": "memcg: enable accounting of ipc resources" + "CVE-2023-52634": { + "cmt_msg": "drm/amd/display: Fix disable_otg_wa logic" }, - "CVE-2023-1390": { - "cmt_msg": "tipc: fix NULL deref in tipc_link_xmit()" + "CVE-2023-2860": { + "cmt_msg": "ipv6: sr: fix out-of-bounds read when setting HMAC data." }, - "CVE-2022-24448": { - "cmt_msg": "NFSv4: Handle case where the lookup of a directory fails" + "CVE-2017-18208": { + "cmt_msg": "mm/madvise.c: fix madvise() infinite loop under special circumstances" }, - "CVE-2024-26598": { - "cmt_msg": "KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache" + "CVE-2020-13143": { + "cmt_msg": "USB: gadget: fix illegal array access in binding with UDC" }, - "CVE-2022-23042": { - "cmt_msg": "xen/netfront: react properly to failing gnttab_end_foreign_access_ref()" + "CVE-2022-3903": { + "cmt_msg": "media: mceusb: Use new usb_control_msg_*() routines" }, - "CVE-2019-10142": { - "cmt_msg": "drivers/virt/fsl_hypervisor.c: prevent integer overflow in ioctl" + "CVE-2018-20449": { + "cmt_msg": "printk: hash addresses printed with %p" }, - "CVE-2021-4023": { - "cmt_msg": "io-wq: fix cancellation on create-worker failure" + "CVE-2017-15299": { + "cmt_msg": "KEYS: don't let add_key() update an uninstantiated key" }, - "CVE-2018-3693": { - "cmt_msg": "ext4: fix spectre gadget in ext4_mb_regular_allocator()" + "CVE-2021-47179": { + "cmt_msg": "NFSv4: Fix a NULL pointer dereference in pnfs_mark_matching_lsegs_return()" }, - "CVE-2022-2318": { - "cmt_msg": "net: rose: fix UAF bugs caused by timer handler" + "CVE-2019-11191": { + "cmt_msg": "x86: Deprecate a.out support" }, - "CVE-2021-22555": { - "cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write" + "CVE-2021-47170": { + "cmt_msg": "USB: usbfs: Don't WARN about excessively large memory allocations" }, - "CVE-2020-36694": { - "cmt_msg": "netfilter: x_tables: Switch synchronization to RCU" + "CVE-2021-47171": { + "cmt_msg": "net: usb: fix memory leak in smsc75xx_bind" }, - "CVE-2021-0399": { - "cmt_msg": "" + "CVE-2021-47172": { + "cmt_msg": "iio: adc: ad7124: Fix potential overflow due to non sequential channel numbers" }, - "CVE-2020-36691": { - "cmt_msg": "netlink: limit recursion depth in policy validation" + "CVE-2021-47173": { + "cmt_msg": "misc/uss720: fix memory leak in uss720_probe" }, - "CVE-2023-42755": { - "cmt_msg": "net/sched: Retire rsvp classifier" + "CVE-2021-47175": { + "cmt_msg": "net/sched: fq_pie: fix OOB access in the traffic path" }, - "CVE-2020-2732": { - "cmt_msg": "KVM: nVMX: Don't emulate instructions in guest mode" + "CVE-2018-10323": { + "cmt_msg": "xfs: set format back to extents if xfs_bmap_extents_to_btree" }, - "CVE-2012-4542": { - "cmt_msg": "" + "CVE-2021-47177": { + "cmt_msg": "iommu/vt-d: Fix sysfs leak in alloc_iommu()" }, - "CVE-2022-1729": { - "cmt_msg": "perf: Fix sys_perf_event_open() race against self" + "CVE-2021-46951": { + "cmt_msg": "tpm: efi: Use local variable for calculating final log size" }, - "CVE-2023-42752": { - "cmt_msg": "igmp: limit igmpv3_newpack() packet size to IP_MAX_MTU" + "CVE-2021-46950": { + "cmt_msg": "md/raid1: properly indicate failure when ending a failed write request" }, - "CVE-2023-4128": { - "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free" + "CVE-2021-46953": { + "cmt_msg": "ACPI: GTDT: Don't corrupt interrupt mappings on watchdow probe failure" }, - "CVE-2021-3573": { - "cmt_msg": "Bluetooth: use correct lock to prevent UAF of hdev object" + "CVE-2021-46952": { + "cmt_msg": "NFS: fs_context: validate UDP retrans to prevent shift out-of-bounds" }, - "CVE-2023-3609": { - "cmt_msg": "net/sched: cls_u32: Fix reference counter leak leading to overflow" + "CVE-2021-46959": { + "cmt_msg": "spi: Fix use-after-free with devm_spi_alloc_*" }, - "CVE-2018-1000026": { - "cmt_msg": "bnx2x: disable GSO where gso_size is too big for hardware" + "CVE-2017-18193": { + "cmt_msg": "f2fs: fix a bug caused by NULL extent tree" }, - "CVE-2022-1975": { - "cmt_msg": "NFC: netlink: fix sleep in atomic bug when firmware download timeout" + "CVE-2023-5178": { + "cmt_msg": "nvmet-tcp: Fix a possible UAF in queue intialization setup" }, - "CVE-2023-1380": { - "cmt_msg": "wifi: brcmfmac: slab-out-of-bounds read in brcmf_get_assoc_ies()" + "CVE-2021-0929": { + "cmt_msg": "staging/android/ion: delete dma_buf->kmap/unmap implemenation" }, - "CVE-2022-44032": { - "cmt_msg": "char: pcmcia: remove all the drivers" + "CVE-2018-19985": { + "cmt_msg": "USB: hso: Fix OOB memory access in hso_probe/hso_get_config_data" }, - "CVE-2021-28972": { - "cmt_msg": "PCI: rpadlpar: Fix potential drc_name corruption in store functions" + "CVE-2021-0920": { + "cmt_msg": "af_unix: fix garbage collect vs MSG_PEEK" }, - "CVE-2018-12130": { - "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" + "CVE-2023-0615": { + "cmt_msg": "media: vivid: dev->bitmap_cap wasn't freed in all cases" }, - "CVE-2021-20292": { - "cmt_msg": "drm/ttm/nouveau: don't call tt destroy callback on alloc failure." + "CVE-2022-3586": { + "cmt_msg": "sch_sfb: Don't assume the skb is still around after enqueueing to child" }, - "CVE-2021-31916": { - "cmt_msg": "dm ioctl: fix out of bounds array access when no devices" + "CVE-2020-27825": { + "cmt_msg": "tracing: Fix race in trace_open and buffer resize call" }, - "CVE-2018-17182": { - "cmt_msg": "mm: get rid of vmacache_flush_all() entirely" + "CVE-2019-2181": { + "cmt_msg": "binder: check for overflow when alloc for security context" }, - "CVE-2022-32981": { - "cmt_msg": "powerpc/32: Fix overread/overwrite of thread_struct via ptrace" + "CVE-2019-2182": { + "cmt_msg": "arm64: Enforce BBM for huge IO/VMAP mappings" }, - "CVE-2018-13405": { - "cmt_msg": "Fix up non-directory creation in SGID directories" + "CVE-2020-27820": { + "cmt_msg": "drm/nouveau: use drm_dev_unplug() during device removal" }, - "CVE-2020-25645": { - "cmt_msg": "geneve: add transport ports in route lookup for geneve" + "CVE-2023-6610": { + "cmt_msg": "smb: client: fix potential OOB in smb2_dump_detail()" }, - "CVE-2018-13406": { - "cmt_msg": "video: uvesafb: Fix integer overflow in allocation" + "CVE-2023-1476": { + "cmt_msg": "" }, - "CVE-2022-1280": { - "cmt_msg": "drm: avoid circular locks in drm_mode_getconnector" + "CVE-2023-1670": { + "cmt_msg": "xirc2ps_cs: Fix use after free bug in xirc2ps_detach" }, - "CVE-2023-3772": { - "cmt_msg": "xfrm: add NULL check in xfrm_update_ae_params" + "CVE-2020-14351": { + "cmt_msg": "perf/core: Fix race in the perf_mmap_close() function" }, - "CVE-2020-11668": { - "cmt_msg": "media: xirlink_cit: add missing descriptor sanity checks" + "CVE-2020-14353": { + "cmt_msg": "KEYS: prevent creating a different user's keyrings" }, - "CVE-2020-11669": { - "cmt_msg": "powerpc/powernv/idle: Restore AMR/UAMOR/AMOR after idle" + "CVE-2020-0429": { + "cmt_msg": "l2tp: fix race between l2tp_session_delete() and l2tp_tunnel_closeall()" }, - "CVE-2019-15118": { - "cmt_msg": "ALSA: usb-audio: Fix a stack buffer overflow bug in check_input_term" + "CVE-2020-14356": { + "cmt_msg": "cgroup: fix cgroup_sk_alloc() for sk_clone_lock()" }, - "CVE-2019-12818": { - "cmt_msg": "net: nfc: Fix NULL dereference on nfc_llcp_build_tlv fails" + "CVE-2022-20132": { + "cmt_msg": "HID: add hid_is_usb() function to make it simpler for USB detection" }, - "CVE-2019-12819": { - "cmt_msg": "mdio_bus: Fix use-after-free on device_register fails" + "CVE-2023-6270": { + "cmt_msg": "aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts" }, - "CVE-2018-11508": { - "cmt_msg": "compat: fix 4-byte infoleak via uninitialized struct field" + "CVE-2023-1582": { + "cmt_msg": "fs/proc: task_mmu.c: don't read mapcount for migration entry" }, - "CVE-2018-11506": { - "cmt_msg": "sr: pass down correctly sized SCSI sense buffer" + "CVE-2019-17351": { + "cmt_msg": "xen: let alloc_xenballooned_pages() fail if not enough memory free" }, - "CVE-2019-19332": { - "cmt_msg": "KVM: x86: fix out-of-bounds write in KVM_GET_EMULATED_CPUID (CVE-2019-19332)" + "CVE-2018-20854": { + "cmt_msg": "phy: ocelot-serdes: fix out-of-bounds read" }, - "CVE-2019-15117": { - "cmt_msg": "ALSA: usb-audio: Fix an OOB bug in parse_audio_mixer_unit" + "CVE-2018-20855": { + "cmt_msg": "IB/mlx5: Fix leaking stack memory to userspace" }, - "CVE-2021-3659": { - "cmt_msg": "net: mac802154: Fix general protection fault" + "CVE-2021-3348": { + "cmt_msg": "nbd: freeze the queue while we're adding connections" }, - "CVE-2022-25258": { - "cmt_msg": "USB: gadget: validate interface OS descriptor requests" + "CVE-2019-1999": { + "cmt_msg": "binder: fix race between munmap() and direct reclaim" }, - "CVE-2021-4155": { - "cmt_msg": "xfs: map unwritten blocks in XFS_IOC_{ALLOC,FREE}SP just like fallocate" + "CVE-2018-1065": { + "cmt_msg": "netfilter: add back stackpointer size checks" }, - "CVE-2019-14901": { - "cmt_msg": "mwifiex: Fix heap overflow in mmwifiex_process_tdls_action_frame()" + "CVE-2018-1068": { + "cmt_msg": "netfilter: ebtables: CONFIG_COMPAT: don't trust userland offsets" }, - "CVE-2021-4150": { - "cmt_msg": "block: fix incorrect references to disk objects" + "CVE-2019-7308": { + "cmt_msg": "bpf: fix sanitation of alu op with pointer / scalar type from different paths" }, - "CVE-2020-3702": { - "cmt_msg": "ath: Use safer key clearing with key cache entries" + "CVE-2018-1000199": { + "cmt_msg": "perf/hwbp: Simplify the perf-hwbp code, fix documentation" }, - "CVE-2021-3653": { - "cmt_msg": "KVM: nSVM: avoid picking up unsupported bits from L2 in int_ctl (CVE-2021-3653)" + "CVE-2022-1966": { + "cmt_msg": "netfilter: nf_tables: disallow non-stateful expression in sets earlier" }, - "CVE-2021-3655": { - "cmt_msg": "sctp: validate from_addr_param return" + "CVE-2021-3587": { + "cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect" }, - "CVE-2020-8694": { - "cmt_msg": "powercap: restrict energy meter to root access" + "CVE-2019-16995": { + "cmt_msg": "net: hsr: fix memory leak in hsr_dev_finalize()" }, - "CVE-2021-4159": { - "cmt_msg": "bpf: Verifer, adjust_scalar_min_max_vals to always call update_reg_bounds()" + "CVE-2019-16994": { + "cmt_msg": "net: sit: fix memory leak in sit_init_net()" }, - "CVE-2023-0461": { - "cmt_msg": "net/ulp: prevent ULP without clone op from entering the LISTEN status" + "CVE-2017-18075": { + "cmt_msg": "crypto: pcrypt - fix freeing pcrypt instances" }, - "CVE-2019-12614": { - "cmt_msg": "powerpc/pseries/dlpar: Fix a missing check in dlpar_parse_cc_property()" + "CVE-2023-6121": { + "cmt_msg": "nvmet: nul-terminate the NQNs passed in the connect command" }, - "CVE-2019-12615": { - "cmt_msg": "mdesc: fix a missing-check bug in get_vdev_port_node_info()" + "CVE-2021-3764": { + "cmt_msg": "crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd()" }, - "CVE-2021-3715": { - "cmt_msg": "net_sched: cls_route: remove the right filter from hashtable" + "CVE-2020-1749": { + "cmt_msg": "net: ipv6_stub: use ip6_dst_lookup_flow instead of ip6_dst_lookup" }, - "CVE-2021-3714": { - "cmt_msg": "" + "CVE-2021-3760": { + "cmt_msg": "nfc: nci: fix the UAF of rf_conn_info object" }, - "CVE-2019-16230": { - "cmt_msg": "drm/amdkfd: fix a potential NULL pointer dereference (v2)" + "CVE-2017-18216": { + "cmt_msg": "ocfs2: subsystem.su_mutex is required while accessing the item->ci_parent" }, - "CVE-2019-16231": { - "cmt_msg": "fjes: Handle workqueue allocation failure" + "CVE-2017-18218": { + "cmt_msg": "net: hns: Fix a skb used after free bug" }, - "CVE-2019-16232": { - "cmt_msg": "libertas: fix a potential NULL pointer dereference" + "CVE-2021-46992": { + "cmt_msg": "netfilter: nftables: avoid overflows in nft_hash_buckets()" }, - "CVE-2019-16233": { - "cmt_msg": "scsi: qla2xxx: fix a potential NULL pointer dereference" + "CVE-2021-39648": { + "cmt_msg": "usb: gadget: configfs: Fix use-after-free issue with udc_name" }, - "CVE-2019-16234": { - "cmt_msg": "iwlwifi: pcie: fix rb_allocator workqueue allocation" + "CVE-2023-52569": { + "cmt_msg": "btrfs: remove BUG() after failure to insert delayed dir index item" }, - "CVE-2023-52445": { - "cmt_msg": "media: pvrusb2: fix use after free on context disconnection" + "CVE-2023-52568": { + "cmt_msg": "x86/sgx: Resolves SECS reclaim vs. page fault for EAUG race" }, - "CVE-2019-6133": { - "cmt_msg": "fork: record start_time late" + "CVE-2019-0136": { + "cmt_msg": "mac80211: drop robust management frames from unknown TA" }, - "CVE-2018-10902": { - "cmt_msg": "ALSA: rawmidi: Change resized buffers atomically" + "CVE-2023-52563": { + "cmt_msg": "drm/meson: fix memory leak on ->hpd_notify callback" }, - "CVE-2021-39633": { - "cmt_msg": "ip_gre: add validation for csum_start" + "CVE-2023-52561": { + "cmt_msg": "arm64: dts: qcom: sdm845-db845c: Mark cont splash memory region as reserved" }, - "CVE-2020-27673": { - "cmt_msg": "xen/events: add a proper barrier to 2-level uevent unmasking" + "CVE-2022-3344": { + "cmt_msg": "KVM: x86: nSVM: harden svm_free_nested against freeing vmcb02 while still in use" }, - "CVE-2021-39636": { - "cmt_msg": "netfilter: x_tables: fix pointer leaks to userspace" + "CVE-2023-52566": { + "cmt_msg": "nilfs2: fix potential use after free in nilfs_gccache_submit_read_data()" }, - "CVE-2022-27223": { - "cmt_msg": "USB: gadget: validate endpoint index for xilinx udc" + "CVE-2023-52565": { + "cmt_msg": "media: uvcvideo: Fix OOB read" }, - "CVE-2021-39634": { - "cmt_msg": "epoll: do not insert into poll queues until all sanity checks are done" + "CVE-2018-12896": { + "cmt_msg": "posix-timers: Sanitize overrun handling" }, - "CVE-2024-23851": { - "cmt_msg": "dm: limit the number of targets and parameter size area" + "CVE-2020-0347": { + "cmt_msg": "" }, - "CVE-2019-3882": { - "cmt_msg": "vfio/type1: Limit DMA mappings per container" + "CVE-2019-18809": { + "cmt_msg": "media: usb: fix memory leak in af9005_identify_state" }, - "CVE-2022-33742": { - "cmt_msg": "xen/blkfront: force data bouncing when backend is untrusted" + "CVE-2019-18808": { + "cmt_msg": "crypto: ccp - Release all allocated memory if sha type is invalid" }, - "CVE-2022-33741": { - "cmt_msg": "xen/netfront: force data bouncing when backend is untrusted" + "CVE-2021-40490": { + "cmt_msg": "ext4: fix race writing to an inline_data file while its xattrs are changing" }, - "CVE-2022-33740": { - "cmt_msg": "xen/netfront: fix leaking data in shared pages" + "CVE-2021-33909": { + "cmt_msg": "seq_file: disallow extremely large seq buffer allocations" }, - "CVE-2024-24864": { - "cmt_msg": "" + "CVE-2019-12455": { + "cmt_msg": "clk-sunxi: fix a missing-check bug in sunxi_divs_clk_setup()" }, - "CVE-2022-45885": { + "CVE-2019-12456": { "cmt_msg": "" }, - "CVE-2022-33744": { - "cmt_msg": "xen/arm: Fix race in RB-tree based P2M accounting" + "CVE-2022-0812": { + "cmt_msg": "xprtrdma: fix incorrect header size calculations" }, - "CVE-2022-40768": { - "cmt_msg": "scsi: stex: Properly zero out the passthrough command structure" + "CVE-2019-17133": { + "cmt_msg": "cfg80211: wext: avoid copying malformed SSIDs" }, - "CVE-2021-45486": { - "cmt_msg": "inet: use bigger hash table for IP ID generation" + "CVE-2021-33656": { + "cmt_msg": "vt: drop old FONT ioctls" }, - "CVE-2020-12888": { - "cmt_msg": "vfio-pci: Invalidate mmaps and block MMIO access on disabled memory" + "CVE-2021-33655": { + "cmt_msg": "fbcon: Disallow setting font bigger than screen size" }, - "CVE-2023-2194": { - "cmt_msg": "i2c: xgene-slimpro: Fix out-of-bounds bug in xgene_slimpro_i2c_xfer()" + "CVE-2022-41858": { + "cmt_msg": "drivers: net: slip: fix NPD bug in sl_tx_timeout()" }, - "CVE-2021-3923": { - "cmt_msg": "RDMA/core: Don't infoleak GRH fields" + "CVE-2022-41850": { + "cmt_msg": "HID: roccat: Fix use-after-free in roccat_read()" }, - "CVE-2022-41218": { - "cmt_msg": "media: dvb-core: Fix UAF due to refcount races at releasing" + "CVE-2022-1184": { + "cmt_msg": "ext4: verify dir block before splitting it" }, - "CVE-2011-4917": { - "cmt_msg": "" + "CVE-2019-9245": { + "cmt_msg": "f2fs: sanity check of xattr entry size" }, - "CVE-2023-52457": { - "cmt_msg": "serial: 8250: omap: Don't skip resource freeing if pm_runtime_resume_and_get() failed" + "CVE-2023-3358": { + "cmt_msg": "HID: intel_ish-hid: Add check for ishtp_dma_tx_map" }, - "CVE-2022-36946": { - "cmt_msg": "netfilter: nf_queue: do not allow packet truncation below transport header offset" + "CVE-2017-14991": { + "cmt_msg": "scsi: sg: fixup infoleak when using SG_GET_REQUEST_TABLE" }, - "CVE-2022-0812": { - "cmt_msg": "xprtrdma: fix incorrect header size calculations" + "CVE-2024-1151": { + "cmt_msg": "net: openvswitch: limit the number of recursions from action sets" }, - "CVE-2021-45485": { - "cmt_msg": "ipv6: use prandom_u32() for ID generation" + "CVE-2018-7566": { + "cmt_msg": "ALSA: seq: Fix racy pool initializations" }, - "CVE-2021-0448": { - "cmt_msg": "netfilter: ctnetlink: add a range check for l3/l4 protonum" + "CVE-2024-26808": { + "cmt_msg": "netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain" }, - "CVE-2018-19824": { - "cmt_msg": "ALSA: usb-audio: Fix UAF decrement if card has no live interfaces in card.c" + "CVE-2024-26809": { + "cmt_msg": "netfilter: nft_set_pipapo: release elements in clone only from destroy path" }, - "CVE-2022-21166": { - "cmt_msg": "x86/speculation/mmio: Enable CPU Fill buffer clearing on idle" + "CVE-2021-42739": { + "cmt_msg": "media: firewire: firedtv-avc: fix a buffer overflow in avc_ca_pmt()" }, - "CVE-2020-29374": { - "cmt_msg": "gup: document and work around \"COW can break either way\" issue" + "CVE-2023-46343": { + "cmt_msg": "nfc: nci: fix possible NULL pointer dereference in send_acknowledge()" }, - "CVE-2019-25045": { - "cmt_msg": "xfrm: clean up xfrm protocol checks" + "CVE-2024-26806": { + "cmt_msg": "spi: cadence-qspi: remove system-wide suspend helper calls from runtime PM hooks" }, - "CVE-2023-4134": { - "cmt_msg": "Input: cyttsp4_core - change del_timer_sync() to timer_shutdown_sync()" + "CVE-2021-37159": { + "cmt_msg": "usb: hso: fix error handling code of hso_create_net_device" }, - "CVE-2018-16862": { - "cmt_msg": "mm: cleancache: fix corruption on missed inode invalidation" + "CVE-2020-12770": { + "cmt_msg": "scsi: sg: add sg_remove_request in sg_write" }, - "CVE-2023-52449": { - "cmt_msg": "mtd: Fix gluebi NULL pointer dereference caused by ftl notifier" + "CVE-2024-26802": { + "cmt_msg": "stmmac: Clear variable when destroying workqueue" }, - "CVE-2021-29650": { - "cmt_msg": "netfilter: x_tables: Use correct memory barriers." + "CVE-2017-15115": { + "cmt_msg": "sctp: do not peel off an assoc from one netns to another one" }, - "CVE-2019-17133": { - "cmt_msg": "cfg80211: wext: avoid copying malformed SSIDs" + "CVE-2023-52606": { + "cmt_msg": "powerpc/lib: Validate size for vector operations" }, - "CVE-2023-4010": { - "cmt_msg": "" + "CVE-2023-52607": { + "cmt_msg": "powerpc/mm: Fix null-pointer dereference in pgtable_cache_add" }, - "CVE-2018-20169": { - "cmt_msg": "USB: check usb_get_extra_descriptor for proper size" + "CVE-2023-52604": { + "cmt_msg": "FS:JFS:UBSAN:array-index-out-of-bounds in dbAdjTree" }, - "CVE-2020-36558": { - "cmt_msg": "vt: vt_ioctl: fix race in VT_RESIZEX" + "CVE-2023-52602": { + "cmt_msg": "jfs: fix slab-out-of-bounds Read in dtSearch" }, - "CVE-2022-41849": { - "cmt_msg": "fbdev: smscufx: Fix use-after-free in ufx_ops_open()" + "CVE-2023-52603": { + "cmt_msg": "UBSAN: array-index-out-of-bounds in dtSplitRoot" }, - "CVE-2022-41848": { - "cmt_msg": "" + "CVE-2023-52600": { + "cmt_msg": "jfs: fix uaf in jfs_evict_inode" }, - "CVE-2020-36312": { - "cmt_msg": "KVM: fix memory leak in kvm_io_bus_unregister_dev()" + "CVE-2023-52601": { + "cmt_msg": "jfs: fix array-index-out-of-bounds in dbAdjTree" }, - "CVE-2022-1353": { - "cmt_msg": "af_key: add __GFP_ZERO flag for compose_sadb_supported in function pfkey_register" + "CVE-2023-52609": { + "cmt_msg": "binder: fix race between mmput() and do_exit()" }, - "CVE-2022-28356": { - "cmt_msg": "llc: fix netdevice reference leaks in llc_ui_bind()" + "CVE-2023-3640": { + "cmt_msg": "" }, - "CVE-2022-1198": { - "cmt_msg": "drivers: hamradio: 6pack: fix UAF bug caused by mod_timer()" + "CVE-2023-3022": { + "cmt_msg": "ipv6: Use result arg in fib_lookup_arg consistently" }, - "CVE-2022-1199": { - "cmt_msg": "ax25: Fix NULL pointer dereference in ax25_kill_by_device" + "CVE-2022-43750": { + "cmt_msg": "usb: mon: make mmapped memory read only" }, - "CVE-2023-6546": { - "cmt_msg": "tty: n_gsm: fix the UAF caused by race condition in gsm_cleanup_mux" + "CVE-2023-0047": { + "cmt_msg": "mm, oom: do not trigger out_of_memory from the #PF" }, - "CVE-2021-39801": { + "CVE-2023-4010": { "cmt_msg": "" }, - "CVE-2021-39800": { - "cmt_msg": "" + "CVE-2021-47167": { + "cmt_msg": "NFS: Fix an Oopsable condition in __nfs_pageio_add_request()" }, - "CVE-2018-16884": { - "cmt_msg": "sunrpc: use-after-free in svc_process_common()" + "CVE-2021-47166": { + "cmt_msg": "NFS: Don't corrupt the value of pg_bytes_written in nfs_do_recoalesce()" }, - "CVE-2018-16882": { - "cmt_msg": "KVM: Fix UAF in nested posted interrupt processing" + "CVE-2021-47165": { + "cmt_msg": "drm/meson: fix shutdown crash when component not probed" }, - "CVE-2022-1195": { - "cmt_msg": "hamradio: improve the incomplete fix to avoid NPD" + "CVE-2021-47163": { + "cmt_msg": "tipc: wait and exit until all work queues are done" }, - "CVE-2024-22099": { - "cmt_msg": "" + "CVE-2021-47162": { + "cmt_msg": "tipc: skb_linearize the head skb when reassembling msgs" }, - "CVE-2021-4202": { - "cmt_msg": "NFC: reorganize the functions in nci_request" + "CVE-2021-47161": { + "cmt_msg": "spi: spi-fsl-dspi: Fix a resource leak in an error handling path" }, - "CVE-2021-4203": { - "cmt_msg": "af_unix: fix races in sk_peer_pid and sk_peer_cred accesses" + "CVE-2021-47160": { + "cmt_msg": "net: dsa: mt7530: fix VLAN traffic leaks" }, - "CVE-2022-4269": { - "cmt_msg": "act_mirred: use the backlog for nested calls to mirred ingress" + "CVE-2023-4385": { + "cmt_msg": "fs: jfs: fix possible NULL pointer dereference in dbFree()" }, - "CVE-2022-45886": { - "cmt_msg": "media: dvb-core: Fix use-after-free due on race condition at dvb_net" + "CVE-2021-46965": { + "cmt_msg": "mtd: physmap: physmap-bt1-rom: Fix unintentional stack access" }, - "CVE-2023-46343": { - "cmt_msg": "nfc: nci: fix possible NULL pointer dereference in send_acknowledge()" + "CVE-2023-4387": { + "cmt_msg": "net: vmxnet3: fix possible use-after-free bugs in vmxnet3_rq_alloc_rx_buf()" }, - "CVE-2024-25744": { - "cmt_msg": "x86/coco: Disable 32-bit emulation by default on TDX and SEV" + "CVE-2021-46960": { + "cmt_msg": "cifs: Return correct error code from smb2_get_enc_key" }, - "CVE-2023-5178": { - "cmt_msg": "nvmet-tcp: Fix a possible UAF in queue intialization setup" + "CVE-2021-46962": { + "cmt_msg": "mmc: uniphier-sd: Fix a resource leak in the remove function" }, - "CVE-2023-51779": { - "cmt_msg": "Bluetooth: af_bluetooth: Fix Use-After-Free in bt_sock_recvmsg" + "CVE-2021-47168": { + "cmt_msg": "NFS: fix an incorrect limit in filelayout_decode_layout()" }, - "CVE-2023-0590": { - "cmt_msg": "net: sched: fix race condition in qdisc_graft()" + "CVE-2019-19378": { + "cmt_msg": "" }, - "CVE-2023-2124": { - "cmt_msg": "xfs: verify buffer contents when we skip log replay" + "CVE-2022-36879": { + "cmt_msg": "xfrm: xfrm_policy: fix a possible double xfrm_pols_put() in xfrm_bundle_lookup()" }, - "CVE-2024-26594": { - "cmt_msg": "ksmbd: validate mech token in session setup" + "CVE-2019-19377": { + "cmt_msg": "btrfs: Don't submit any btree write bio if the fs has errors" }, - "CVE-2023-1281": { - "cmt_msg": "net/sched: tcindex: update imperfect hash filters respecting rcu" + "CVE-2023-1118": { + "cmt_msg": "media: rc: Fix use-after-free bugs caused by ene_tx_irqsim()" }, - "CVE-2023-2860": { - "cmt_msg": "ipv6: sr: fix out-of-bounds read when setting HMAC data." + "CVE-2021-0935": { + "cmt_msg": "net: ipv6: keep sk status consistent after datagram connect failure" }, - "CVE-2021-44879": { - "cmt_msg": "f2fs: fix to do sanity check on inode type during garbage collection" + "CVE-2021-0937": { + "cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write" }, - "CVE-2019-15505": { - "cmt_msg": "media: technisat-usb2: break out of loop at end of buffer" + "CVE-2022-47929": { + "cmt_msg": "net: sched: disallow noqueue for qdisc classes" }, - "CVE-2023-1859": { - "cmt_msg": "9p/xen : Fix use after free bug in xen_9pfs_front_remove due to race condition" + "CVE-2019-16746": { + "cmt_msg": "nl80211: validate beacon head" }, - "CVE-2023-2513": { - "cmt_msg": "ext4: fix use-after-free in ext4_xattr_set_entry" + "CVE-2022-3606": { + "cmt_msg": "" }, - "CVE-2020-11609": { - "cmt_msg": "media: stv06xx: add missing descriptor sanity checks" + "CVE-2018-18021": { + "cmt_msg": "arm64: KVM: Tighten guest core register access from userspace" }, - "CVE-2022-27672": { - "cmt_msg": "x86/speculation: Identify processors vulnerable to SMT RSB predictions" + "CVE-2021-37576": { + "cmt_msg": "KVM: PPC: Book3S: Fix H_RTAS rets buffer overflow" }, - "CVE-2022-2964": { - "cmt_msg": "net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup" + "CVE-2022-3594": { + "cmt_msg": "r8152: Rate limit overflow messages" }, - "CVE-2021-1048": { - "cmt_msg": "fix regression in \"epoll: Keep a reference on files added to the check list\"" + "CVE-2022-3595": { + "cmt_msg": "cifs: fix double-fault crash during ntlmssp" }, - "CVE-2015-2877": { - "cmt_msg": "" + "CVE-2018-5803": { + "cmt_msg": "sctp: verify size of a new chunk in _sctp_make_chunk()" }, - "CVE-2020-9383": { - "cmt_msg": "floppy: check FDC index for errors before assigning it" + "CVE-2020-27815": { + "cmt_msg": "jfs: Fix array index bounds check in dbAdjTree" }, - "CVE-2019-16089": { - "cmt_msg": "" + "CVE-2023-6606": { + "cmt_msg": "smb: client: fix OOB in smbCalcSize()" }, - "CVE-2023-1206": { - "cmt_msg": "tcp: Reduce chance of collisions in inet6_hashfn()." + "CVE-2020-27673": { + "cmt_msg": "xen/events: add a proper barrier to 2-level uevent unmasking" }, - "CVE-2021-38198": { - "cmt_msg": "KVM: X86: MMU: Use the correct inherited permissions to get shadow page" + "CVE-2020-27675": { + "cmt_msg": "xen/events: avoid removing an event channel while handling it" }, - "CVE-2021-38199": { - "cmt_msg": "NFSv4: Initialise connection to the server in nfs4_alloc_client()" + "CVE-2020-28915": { + "cmt_msg": "fbcon: Fix global-out-of-bounds read in fbcon_get_font()" }, - "CVE-2023-0394": { - "cmt_msg": "ipv6: raw: Deduct extension header length in rawv6_push_pending_frames" + "CVE-2021-26932": { + "cmt_msg": "Xen/x86: don't bail early from clear_foreign_p2m_mapping()" }, - "CVE-2022-1679": { - "cmt_msg": "ath9k: fix use-after-free in ath9k_hif_usb_rx_cb" + "CVE-2020-0435": { + "cmt_msg": "f2fs: fix to do sanity check with i_extra_isize" }, - "CVE-2023-34256": { - "cmt_msg": "ext4: avoid a potential slab-out-of-bounds in ext4_group_desc_csum" + "CVE-2020-0432": { + "cmt_msg": "staging: most: net: fix buffer overflow" }, - "CVE-2023-1513": { - "cmt_msg": "kvm: initialize all of the kvm_debugregs structure before sending it to userspace" + "CVE-2020-0433": { + "cmt_msg": "blk-mq: sync the update nr_hw_queues with blk_mq_queue_tag_busy_iter" }, - "CVE-2021-26401": { - "cmt_msg": "x86/speculation: Use generic retpoline by default on AMD" + "CVE-2020-0431": { + "cmt_msg": "HID: hid-input: clear unmapped usages" }, - "CVE-2020-28941": { - "cmt_msg": "speakup: Do not let the line discipline be used several times" + "CVE-2023-6915": { + "cmt_msg": "ida: Fix crash in ida_free when the bitmap is empty" }, - "CVE-2019-9445": { - "cmt_msg": "f2fs: check if file namelen exceeds max value" + "CVE-2021-47006": { + "cmt_msg": "ARM: 9064/1: hw_breakpoint: Do not directly check the event's overflow_handler hook" }, - "CVE-2023-52442": { - "cmt_msg": "ksmbd: validate session id and tree id in compound request" + "CVE-2023-1249": { + "cmt_msg": "coredump: Use the vma snapshot in fill_files_note" }, - "CVE-2018-8087": { - "cmt_msg": "mac80211_hwsim: fix possible memory leak in hwsim_new_radio_nl()" + "CVE-2021-3483": { + "cmt_msg": "firewire: nosy: Fix a use-after-free bug in nosy_ioctl()" }, - "CVE-2020-36557": { - "cmt_msg": "vt: vt_ioctl: fix VT_DISALLOCATE freeing in-use virtual console" + "CVE-2023-6040": { + "cmt_msg": "netfilter: nf_tables: Reject tables of unsupported family" }, - "CVE-2021-3506": { - "cmt_msg": "f2fs: fix to avoid out-of-bounds memory access" + "CVE-2017-16912": { + "cmt_msg": "usbip: fix stub_rx: get_pipe() to validate endpoint number" }, - "CVE-2019-20934": { - "cmt_msg": "sched/fair: Don't free p->numa_faults with concurrent readers" + "CVE-2017-16911": { + "cmt_msg": "usbip: prevent vhci_hcd driver from leaking a socket pointer address" }, - "CVE-2011-4916": { - "cmt_msg": "" + "CVE-2017-16914": { + "cmt_msg": "usbip: fix stub_send_ret_submit() vulnerability to null transfer_buffer" }, - "CVE-2018-10880": { - "cmt_msg": "ext4: never move the system.data xattr out of the inode body" + "CVE-2020-36691": { + "cmt_msg": "netlink: limit recursion depth in policy validation" }, - "CVE-2019-3900": { - "cmt_msg": "vhost_net: fix possible infinite loop" + "CVE-2023-42755": { + "cmt_msg": "net/sched: Retire rsvp classifier" }, - "CVE-2019-19533": { - "cmt_msg": "media: ttusb-dec: Fix info-leak in ttusb_dec_send_command()" + "CVE-2023-42752": { + "cmt_msg": "igmp: limit igmpv3_newpack() packet size to IP_MAX_MTU" }, - "CVE-2018-13100": { - "cmt_msg": "f2fs: fix to do sanity check with secs_per_zone" + "CVE-2021-3573": { + "cmt_msg": "Bluetooth: use correct lock to prevent UAF of hdev object" }, - "CVE-2019-15807": { - "cmt_msg": "scsi: libsas: delete sas port if expander discover failed" + "CVE-2022-1974": { + "cmt_msg": "nfc: replace improper check device_is_registered() in netlink related functions" }, - "CVE-2019-19530": { - "cmt_msg": "usb: cdc-acm: make sure a refcount is taken early enough" + "CVE-2022-1975": { + "cmt_msg": "NFC: netlink: fix sleep in atomic bug when firmware download timeout" }, - "CVE-2023-31083": { - "cmt_msg": "Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO" + "CVE-2023-1380": { + "cmt_msg": "wifi: brcmfmac: slab-out-of-bounds read in brcmf_get_assoc_ies()" }, - "CVE-2019-5489": { - "cmt_msg": "Change mincore() to count \"mapped\" pages rather than \"cached\" pages" + "CVE-2018-12130": { + "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" }, - "CVE-2024-1312": { - "cmt_msg": "mm: lock_vma_under_rcu() must check vma->anon_vma under vma lock" + "CVE-2022-32981": { + "cmt_msg": "powerpc/32: Fix overread/overwrite of thread_struct via ptrace" }, - "CVE-2019-19531": { - "cmt_msg": "usb: yurex: Fix use-after-free in yurex_delete" + "CVE-2018-13405": { + "cmt_msg": "Fix up non-directory creation in SGID directories" }, - "CVE-2019-14283": { - "cmt_msg": "floppy: fix out-of-bounds read in copy_buffer" + "CVE-2018-13406": { + "cmt_msg": "video: uvesafb: Fix integer overflow in allocation" }, - "CVE-2018-10881": { - "cmt_msg": "ext4: clear i_data in ext4_inode_info when removing inline data" + "CVE-2020-11668": { + "cmt_msg": "media: xirlink_cit: add missing descriptor sanity checks" }, - "CVE-2018-10882": { - "cmt_msg": "ext4: add more inode number paranoia checks" + "CVE-2020-11669": { + "cmt_msg": "powerpc/powernv/idle: Restore AMR/UAMOR/AMOR after idle" }, - "CVE-2018-10883": { - "cmt_msg": "jbd2: don't mark block as modified if the handle is out of credits" - } - } - }, - "4.14": { - "4.14": { - "CVE-2017-16647": { - "cmt_msg": "net: usb: asix: fill null-ptr-deref in asix_suspend", - "cmt_id": "baedf68a068ca29624f241426843635920f16e1d" + "CVE-2019-14901": { + "cmt_msg": "mwifiex: Fix heap overflow in mmwifiex_process_tdls_action_frame()" }, - "CVE-2017-16650": { - "cmt_msg": "net: qmi_wwan: fix divide by 0 on bad descriptors", - "cmt_id": "7fd078337201cf7468f53c3d9ef81ff78cb6df3b" + "CVE-2020-8694": { + "cmt_msg": "powercap: restrict energy meter to root access" }, - "CVE-2017-16649": { - "cmt_msg": "net: cdc_ether: fix divide by 0 on bad descriptors", - "cmt_id": "2cb80187ba065d7decad7c6614e35e07aec8a974" - } - }, - "4.14.1": { - "CVE-2017-16646": { - "cmt_msg": "media: dib0700: fix invalid dvb_detach argument", - "cmt_id": "75d9dd294e2a41ddce75cc02d1675a9cf40873fc" + "CVE-2021-3715": { + "cmt_msg": "net_sched: cls_route: remove the right filter from hashtable" }, - "CVE-2017-16537": { - "cmt_msg": "media: imon: Fix null-ptr-deref in imon_probe", - "cmt_id": "16edf1a6a8a52040841e3e875c76bad0aa28f85f" - } - }, - "4.14.2": { - "CVE-2017-18204": { - "cmt_msg": "ocfs2: should wait dio before inode lock in ocfs2_setattr()", - "cmt_id": "44ec0aecc73dc3959bdbb6fa733c69dc0bb633f4" + "CVE-2021-3714": { + "cmt_msg": "" }, - "CVE-2017-16994": { - "cmt_msg": "mm/pagewalk.c: report holes in hugetlb ranges", - "cmt_id": "bbce81fc966f59421e5f54c4bd3d3a4670f45e33" - } - }, - "4.14.3": { - "CVE-2017-18203": { - "cmt_msg": "dm: fix race between dm_get_from_kobject() and __dm_destroy()", - "cmt_id": "3bfb87ecb4f7e19c53c31b7beca4ecd9bb906a67" + "CVE-2019-16230": { + "cmt_msg": "drm/amdkfd: fix a potential NULL pointer dereference (v2)" }, - "CVE-2017-16536": { - "cmt_msg": "cx231xx-cards: fix NULL-deref on missing association descriptor", - "cmt_id": "5a482b8a75500ec7516f3d11c7fb063e3f4abc45" - } - }, - "4.14.4": { - "CVE-2017-18208": { - "cmt_msg": "mm/madvise.c: fix madvise() infinite loop under special circumstances", - "cmt_id": "8a0bb9ebaa8b8faee61f095757662fe5d7fd8da6" + "CVE-2019-16231": { + "cmt_msg": "fjes: Handle workqueue allocation failure" }, - "CVE-2017-18202": { - "cmt_msg": "mm, oom_reaper: gather each vma to prevent leaking TLB entry", - "cmt_id": "786b924d39bad16ff99aacdb4076df027cc2f8b8" + "CVE-2019-16232": { + "cmt_msg": "libertas: fix a potential NULL pointer dereference" }, - "CVE-2017-1000405": { - "cmt_msg": "mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d()", - "cmt_id": "01ca9727457a167463a47e35b6fe5a5173b4e341" - } - }, - "4.14.6": { - "CVE-2017-17807": { - "cmt_msg": "KEYS: add missing permission check for request_key() destination", - "cmt_id": "69d5894ce0a67d37f900d2597fc0b2b8cef6c863" + "CVE-2019-16233": { + "cmt_msg": "scsi: qla2xxx: fix a potential NULL pointer dereference" }, - "CVE-2017-0861": { - "cmt_msg": "ALSA: pcm: prevent UAF in snd_pcm_info", - "cmt_id": "0482dcd51004920b13b59995b7afb66df49937da" + "CVE-2019-16234": { + "cmt_msg": "iwlwifi: pcie: fix rb_allocator workqueue allocation" }, - "CVE-2017-1000407": { - "cmt_msg": "KVM: VMX: remove I/O port 0x80 bypass on Intel hosts", - "cmt_id": "a52c2829cd60492fc75bafc323145cab1af915f5" - } - }, - "4.14.7": { - "CVE-2018-18559": { - "cmt_msg": "net/packet: fix a race in packet_bind() and packet_notifier()", - "cmt_id": "589983eb9986ea9c851c8906a81781f317207313" + "CVE-2019-6133": { + "cmt_msg": "fork: record start_time late" }, - "CVE-2018-7492": { - "cmt_msg": "rds: Fix NULL pointer dereference in __rds_rdma_map", - "cmt_id": "9d9a63d74b2b6ed7c30c7d1584d87c16ae8d5862" + "CVE-2021-39633": { + "cmt_msg": "ip_gre: add validation for csum_start" }, - "CVE-2017-16648": { - "cmt_msg": "dvb_frontend: don't use-after-free the frontend struct", - "cmt_id": "7bc8eb30f1e02b4dd6fd2869720c64d9bf39d765" - } - }, - "4.14.8": { - "CVE-2018-14619": { - "cmt_msg": "crypto: algif_aead - fix reference counting of null skcipher", - "cmt_id": "96c2dfaebe1a8eba95d43732a1413c777469128c" + "CVE-2017-18203": { + "cmt_msg": "dm: fix race between dm_get_from_kobject() and __dm_destroy()" }, - "CVE-2017-16913": { - "cmt_msg": "usbip: fix stub_rx: harden CMD_SUBMIT path to handle malicious input", - "cmt_id": "1621db059603e781f61a9bf33cba639b42faf0bc" + "CVE-2017-18202": { + "cmt_msg": "mm, oom_reaper: gather each vma to prevent leaking TLB entry" }, - "CVE-2017-16912": { - "cmt_msg": "usbip: fix stub_rx: get_pipe() to validate endpoint number", - "cmt_id": "7120d742ad8d0f1fe37e4b73827e166fc1e01eea" + "CVE-2021-39636": { + "cmt_msg": "netfilter: x_tables: fix pointer leaks to userspace" }, - "CVE-2017-16911": { - "cmt_msg": "usbip: prevent vhci_hcd driver from leaking a socket pointer address", - "cmt_id": "b6a2ad646c13bb9d1231bce5599cb3176ff33ca4" + "CVE-2017-18204": { + "cmt_msg": "ocfs2: should wait dio before inode lock in ocfs2_setattr()" }, - "CVE-2017-16914": { - "cmt_msg": "usbip: fix stub_send_ret_submit() vulnerability to null transfer_buffer", - "cmt_id": "d78a5506cf0ea112124c1ffa5c0aae09b579d96d" + "CVE-2021-39634": { + "cmt_msg": "epoll: do not insert into poll queues until all sanity checks are done" }, - "CVE-2017-17558": { - "cmt_msg": "USB: core: prevent malicious bNumInterfaces overflow", - "cmt_id": "4c5ae6a301a5415d1334f6c655bebf91d475bd89" + "CVE-2022-33742": { + "cmt_msg": "xen/blkfront: force data bouncing when backend is untrusted" }, - "CVE-2017-18344": { - "cmt_msg": "posix-timer: Properly check sigevent->sigev_notify", - "cmt_id": "3df23f7ce7255d1ef2a616071cac359a245fb6de" + "CVE-2022-33741": { + "cmt_msg": "xen/netfront: force data bouncing when backend is untrusted" }, - "CVE-2017-17806": { - "cmt_msg": "crypto: hmac - require that the underlying hash algorithm is unkeyed", - "cmt_id": "902ae89f841de0c8d2857919296923f6332e174f" + "CVE-2022-33740": { + "cmt_msg": "xen/netfront: fix leaking data in shared pages" }, - "CVE-2017-17805": { - "cmt_msg": "crypto: salsa20 - fix blkcipher_walk API usage", - "cmt_id": "c68b31521d5fb7216cb1113130399afe65437c6c" - } - }, - "4.14.9": { - "CVE-2017-17857": { - "cmt_msg": "bpf: fix missing error return in check_stack_boundary()", - "cmt_id": "2120fca0ecfb4552d27608d409ebd3403ce02ce4" + "CVE-2022-33744": { + "cmt_msg": "xen/arm: Fix race in RB-tree based P2M accounting" }, - "CVE-2017-17864": { - "cmt_msg": "bpf: don't prune branches when a scalar is replaced with a pointer", - "cmt_id": "cb56cc1b292b8b3f787fad89f1208f8e98d12c7d" + "CVE-2023-52596": { + "cmt_msg": "sysctl: Fix out of bounds access for empty sysctl registers" }, - "CVE-2017-17862": { - "cmt_msg": "bpf: fix branch pruning logic", - "cmt_id": "2b3ea8ceb2bb71e9e58527661261dba127137d9b" + "CVE-2023-52597": { + "cmt_msg": "KVM: s390: fix setting of fpc register" }, - "CVE-2017-17863": { - "cmt_msg": "bpf: fix integer overflows", - "cmt_id": "de31796c052e47c99b1bb342bc70aa826733e862" + "CVE-2023-52594": { + "cmt_msg": "wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus()" }, - "CVE-2017-17853": { - "cmt_msg": "bpf/verifier: fix bounds calculation on BPF_RSH", - "cmt_id": "4d54f7df5131d67f653f674003ec5f52c9818b53" + "CVE-2023-52595": { + "cmt_msg": "wifi: rt2x00: restart beacon queue when hardware reset" }, - "CVE-2017-17852": { - "cmt_msg": "bpf: fix 32-bit ALU op verification", - "cmt_id": "6c8e098d0324412d4ae9e06c7e611a96b87faf80" + "CVE-2023-52593": { + "cmt_msg": "wifi: wfx: fix possible NULL pointer dereference in wfx_set_mfp_ap()" }, - "CVE-2017-17855": { - "cmt_msg": "bpf: don't prune branches when a scalar is replaced with a pointer", - "cmt_id": "cb56cc1b292b8b3f787fad89f1208f8e98d12c7d" + "CVE-2023-52590": { + "cmt_msg": "ocfs2: Avoid touching renamed directory if parent does not change" }, - "CVE-2017-16996": { - "cmt_msg": "bpf: fix incorrect tracking of register size truncation", - "cmt_id": "bf5ee24e87e39548bf30d4e18e479e61a5a98336" + "CVE-2023-52591": { + "cmt_msg": "reiserfs: Avoid touching renamed directory if parent does not change" }, - "CVE-2017-16995": { - "cmt_msg": "bpf: fix incorrect sign extension in check_alu_op()", - "cmt_id": "6e12ea4fb45ca86cdd7425276b6993455fee947a" + "CVE-2019-9454": { + "cmt_msg": "i2c: core-smbus: prevent stack corruption on read I2C_BLOCK_DATA" }, - "CVE-2017-17856": { - "cmt_msg": "bpf: force strict alignment checks for stack pointers", - "cmt_id": "c90268f7cbee0781331b96d1423d0f28a6183889" + "CVE-2023-52598": { + "cmt_msg": "s390/ptrace: handle setting of fpc register correctly" }, - "CVE-2017-17854": { - "cmt_msg": "bpf: fix integer overflows", - "cmt_id": "de31796c052e47c99b1bb342bc70aa826733e862" - } - }, - "4.14.11": { - "CVE-2017-18595": { - "cmt_msg": "tracing: Fix possible double free on failure of allocating trace buffer", - "cmt_id": "21a9c7346ef696161dacbbd9f47dabb0f062c4c8" + "CVE-2023-52599": { + "cmt_msg": "jfs: fix array-index-out-of-bounds in diNewExt" }, - "CVE-2018-9465": { - "cmt_msg": "binder: fix proc->files use-after-free", - "cmt_id": "d87f1bc7d15b89bd3bcf31020eb7f3b3cd6f84b5" + "CVE-2021-0447": { + "cmt_msg": "l2tp: protect sock pointer of struct pppol2tp_session with RCU" }, - "CVE-2018-18386": { - "cmt_msg": "n_tty: fix EXTPROC vs ICANON interaction with TIOCINQ (aka FIONREAD)", - "cmt_id": "aaa5a91ff744f91fb1d1c91853aa0c8f126be563" + "CVE-2022-23222": { + "cmt_msg": "bpf: Replace PTR_TO_XXX_OR_NULL with PTR_TO_XXX | PTR_MAYBE_NULL" }, - "CVE-2017-17449": { - "cmt_msg": "netlink: Add netns check on taps", - "cmt_id": "e3fb538e5715250d6a61a26925215229f2e9f52f" + "CVE-2021-0448": { + "cmt_msg": "netfilter: ctnetlink: add a range check for l3/l4 protonum" }, - "CVE-2017-17712": { - "cmt_msg": "net: ipv4: fix for a race condition in raw_sendmsg", - "cmt_id": "3bc400bad0e003d40a0a2412411aed7cbae16f96" + "CVE-2022-41849": { + "cmt_msg": "fbdev: smscufx: Fix use-after-free in ufx_ops_open()" }, - "CVE-2017-15129": { - "cmt_msg": "net: Fix double free and memory corruption in get_net_ns_by_id()", - "cmt_id": "dd9a2648b3e35c2369f580215d916baf7e23253a" - } - }, - "4.14.13": { - "CVE-2017-18075": { - "cmt_msg": "crypto: pcrypt - fix freeing pcrypt instances", - "cmt_id": "7156c794b8ab462705e6ac80c5fa69565eb44c62" - } - }, - "4.14.14": { - "CVE-2017-17741": { - "cmt_msg": "KVM: Fix stack-out-of-bounds read in write_mmio", - "cmt_id": "653c41ac4729261cb356ee1aff0f3f4f342be1eb" + "CVE-2022-41848": { + "cmt_msg": "" }, - "CVE-2017-5753": { - "cmt_msg": "x86/cpufeatures: Add X86_BUG_SPECTRE_V[12]", - "cmt_id": "9298e868dddd820829f814cd25a0f28c92036af7" + "CVE-2023-6356": { + "cmt_msg": "nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length" }, - "CVE-2017-1000410": { - "cmt_msg": "Bluetooth: Prevent stack info leak from the EFS element.", - "cmt_id": "02462928e2234eea95dd1ce05ca1f2c02088dc13" + "CVE-2022-1353": { + "cmt_msg": "af_key: add __GFP_ZERO flag for compose_sadb_supported in function pfkey_register" }, - "CVE-2018-5333": { - "cmt_msg": "RDS: null pointer dereference in rds_atomic_free_op", - "cmt_id": "5edbe3c0249f54578636b71377861d579b1781cf" + "CVE-2022-1198": { + "cmt_msg": "drivers: hamradio: 6pack: fix UAF bug caused by mod_timer()" }, - "CVE-2018-5332": { - "cmt_msg": "RDS: Heap OOB write in rds_message_alloc_sgs()", - "cmt_id": "5d127d15ad2f9f33af788f1edf720ba29317f55b" + "CVE-2022-1199": { + "cmt_msg": "ax25: Fix NULL pointer dereference in ax25_kill_by_device" }, - "CVE-2017-13216": { - "cmt_msg": "staging: android: ashmem: fix a race condition in ASHMEM_SET_SIZE ioctl", - "cmt_id": "242e20a5b3cc2b99ace977546d3cffc6a2a35991" + "CVE-2022-1195": { + "cmt_msg": "hamradio: improve the incomplete fix to avoid NPD" }, - "CVE-2017-5715": { - "cmt_msg": "x86/cpufeatures: Add X86_BUG_SPECTRE_V[12]", - "cmt_id": "9298e868dddd820829f814cd25a0f28c92036af7" - } - }, - "4.14.15": { - "CVE-2017-18551": { - "cmt_msg": "i2c: core-smbus: prevent stack corruption on read I2C_BLOCK_DATA", - "cmt_id": "c7b8be81fc5506a6f2f9f01a06f6806bcca7d48a" + "CVE-2023-2124": { + "cmt_msg": "xfs: verify buffer contents when we skip log replay" }, - "CVE-2018-6927": { - "cmt_msg": "futex: Prevent overflow by strengthen input validation", - "cmt_id": "17ae6ccfe5dd85605dc44534348b506f95d16a61" + "CVE-2019-15505": { + "cmt_msg": "media: technisat-usb2: break out of loop at end of buffer" }, - "CVE-2019-9454": { - "cmt_msg": "i2c: core-smbus: prevent stack corruption on read I2C_BLOCK_DATA", - "cmt_id": "c7b8be81fc5506a6f2f9f01a06f6806bcca7d48a" + "CVE-2022-27672": { + "cmt_msg": "x86/speculation: Identify processors vulnerable to SMT RSB predictions" }, - "CVE-2018-1000004": { - "cmt_msg": "ALSA: seq: Make ioctls race-free", - "cmt_id": "c3162384aed4cfe3f1a1f40041f3ba8cd7704d88" + "CVE-2022-1280": { + "cmt_msg": "drm: avoid circular locks in drm_mode_getconnector" + }, + "CVE-2019-14283": { + "cmt_msg": "floppy: fix out-of-bounds read in copy_buffer" + }, + "CVE-2018-10881": { + "cmt_msg": "ext4: clear i_data in ext4_inode_info when removing inline data" + }, + "CVE-2024-26713": { + "cmt_msg": "powerpc/pseries/iommu: Fix iommu initialisation during DLPAR add" } - }, - "4.14.16": { + } + }, + "4.15": { + "4.15": { "CVE-2018-1000028": { "cmt_msg": "nfsd: auth: Fix gid sorting when rootsquash enabled", - "cmt_id": "54e67ba7d20a5921cfe712cfe4bd773e75df10e0" - }, - "CVE-2017-17450": { - "cmt_msg": "netfilter: xt_osf: Add missing permission checks", - "cmt_id": "19848ca7b7dad5153860239c893c1eadd603217e" - }, - "CVE-2017-17448": { - "cmt_msg": "netfilter: nfnetlink_cthelper: Add missing permission checks", - "cmt_id": "671624872144abc37bc5e8f3b27987890f6e87f3" + "cmt_id": "1995266727fa8143897e89b55f5d3c79aa828420" } }, - "4.14.17": { + "4.15-rc1": { + "CVE-2019-19083": { + "cmt_msg": "drm/amd/display: memory leak", + "cmt_id": "9ea29a1f8b9da52d8eca8b0996f1d84eac548d3b" + } + }, + "4.15.1": { "CVE-2019-2215": { "cmt_msg": "ANDROID: binder: remove waitqueue when thread exits.", - "cmt_id": "7a3cee43e935b9d526ad07f20bf005ba7e74d05b" - }, - "CVE-2018-5344": { - "cmt_msg": "loop: fix concurrent lo_open/lo_release", - "cmt_id": "d5e06a1867210049bbfe27864ee0a40cfd9b1e9b" + "cmt_id": "7654cae5433700f4f5ae6cafd785b84b52d10468" } }, - "4.14.18": { + "4.15.2": { "CVE-2017-5754": { "cmt_msg": "x86/cpufeatures: Add Intel feature bits for Speculation Control", - "cmt_id": "343c91242d092852ab22411780f886317d7001aa" + "cmt_id": "6acd374af3f3b7dafcfb3081ee7d9ec75fd989da" } }, - "4.14.20": { + "4.15.4": { "CVE-2017-13166": { "cmt_msg": "media: v4l2-ioctl.c: use check_fmt for enum/g/s/try_fmt", - "cmt_id": "ea96d8f676dd3caeb77e3dc509c880cc81d303a6" + "cmt_id": "1113a74590b4597c0d5104bf9f653cc4daad9daf" }, "CVE-2018-5750": { "cmt_msg": "ACPI: sbshc: remove raw pointer from printk() message", - "cmt_id": "f232bfdcdd768bb6ba5945f1f8f28faa94fc10b8" + "cmt_id": "1a9b65ce31654f5d4edd134c5ad21a0b0846ab1a" }, "CVE-2017-16538": { "cmt_msg": "media: dvb-usb-v2: lmedm04: Improve logic checking of warm start", - "cmt_id": "fd31a38d268f50afe9c5cd3d4beafa020ad39e90" - }, - "CVE-2017-8824": { - "cmt_msg": "dccp: CVE-2017-8824: use-after-free in DCCP code", - "cmt_id": "e5e1e153ecd40c2b09c23d2b2c161a6c8ddbba07" + "cmt_id": "20f3bae5957e3c0843e71a6564e3dbd040b7f469" }, "CVE-2017-16644": { "cmt_msg": "media: hdpvr: Fix an error handling path in hdpvr_probe()", - "cmt_id": "dd24d173b50af3aadb1ea2e04edaa8d68ca59b23" + "cmt_id": "2eeaddcc139b5ccf1784148e08c7f2f57ec2c998" } }, - "4.14.21": { + "4.15.5": { "CVE-2018-7566": { "cmt_msg": "ALSA: seq: Fix racy pool initializations", - "cmt_id": "7466294dad8963e29f051d8ab2f4d3f67d2f62a6" + "cmt_id": "3b8e84c8373de4e068e282102425d498d992e49b" } }, - "4.14.22": { + "4.15.6": { "CVE-2018-20510": { "cmt_msg": "binder: replace \"%p\" with \"%pK\"", - "cmt_id": "b46af094b82a47ca1cbba9092578f8f96af82798" + "cmt_id": "008fdd7c3915f5fe5481289e66986f149d824ad5" }, "CVE-2020-0030": { "cmt_msg": "ANDROID: binder: synchronize_rcu() when using POLLFREE.", - "cmt_id": "441b5d10e4602b25ad960d1ca1c6bb77e788c220" + "cmt_id": "3dd13985a916de3f748b07255eaf4b7516921ae0" } }, - "4.14.25": { + "4.15.8": { + "CVE-2022-20567": { + "cmt_msg": "l2tp: fix race in pppol2tp_release with session object destroy", + "cmt_id": "08ffa7bbb46e2a298287c66343ba44039a931ba4" + }, + "CVE-2018-5703": { + "cmt_msg": "tls: Use correct sk->sk_prot for IPV6", + "cmt_id": "c5f3a16c047dfa7f309a2e1ca7d43e7db92ec35b" + }, "CVE-2018-5803": { "cmt_msg": "sctp: verify size of a new chunk in _sctp_make_chunk()", - "cmt_id": "1fc74a57a8ae863c95afedef2510e7e42b194e56" + "cmt_id": "4fadd1aa760e40ee98507326cb714036b92d1fc1" } }, - "4.14.27": { + "4.15.10": { "CVE-2018-1068": { "cmt_msg": "netfilter: ebtables: CONFIG_COMPAT: don't trust userland offsets", - "cmt_id": "eaa06bfba8eabd44ce952758046492eebc973bbe" + "cmt_id": "5c06b89df419ea4c472a68b1e5b668bda52471ba" }, "CVE-2018-7995": { "cmt_msg": "x86/MCE: Serialize sysfs changes", - "cmt_id": "5c1c405d393648da95339c3e0f2dcfd7a1021388" + "cmt_id": "291a0c2764e4b8f714a6e102ac2fcad6ed7711ba" }, "CVE-2018-1065": { "cmt_msg": "netfilter: add back stackpointer size checks", - "cmt_id": "638c2e4eff89aae86593e80ac2be01eee195fccb" + "cmt_id": "ec6b058c5431e7e1686c4d7ef42f951473baa78b" } }, - "4.14.28": { + "4.15.11": { "CVE-2019-9456": { "cmt_msg": "usb: usbmon: Read text within supplied buffer size", - "cmt_id": "59b0613d3f40f0ba621bb9c7ddf06dea2948e0b7" + "cmt_id": "b42aa204e1110e20f5a49caaf92a935d39a02112" } }, - "4.14.31": { + "4.15.14": { "CVE-2018-8822": { "cmt_msg": "staging: ncpfs: memory corruption in ncp_read_kernel()", - "cmt_id": "2a2b9ef3092680bdf09751d55420910f81fd0c3c" + "cmt_id": "9a6730ae707b16b038f3731f93f67aa0bd08017f" }, "CVE-2018-7740": { "cmt_msg": "hugetlbfs: check for pgoff value overflow", - "cmt_id": "1e8628443ede418464b0ab101b24fbb7030949b2" + "cmt_id": "e0fdb5385c4bf26b4be60c0042344c315c039aeb" }, "CVE-2018-1087": { "cmt_msg": "kvm/x86: fix icebp instruction handling", - "cmt_id": "06b2810150542cfe0e66407c77ea2de6790e35dc" + "cmt_id": "8c42170a40fb42726cae09f901b61d17ab56a465" }, "CVE-2018-8781": { "cmt_msg": "drm: udl: Properly check framebuffer mmap offsets", - "cmt_id": "c8deec7181212f170191c7ffbb01a16367682f5b" + "cmt_id": "01592437b0ec953300acf8be765721a62e0786b7" }, "CVE-2018-8897": { "cmt_msg": "x86/entry/64: Don't use IST entry for #BP stack", - "cmt_id": "5a29ce2b9880a26e1ac95169dedabc988360c734" + "cmt_id": "69a71b6b418c0052614e8325ca4e91ca4a3d6eef" } }, - "4.14.32": { - "CVE-2019-15239": { - "cmt_msg": "unknown", - "cmt_id": "dbbf2d1e4077bab0c65ece2765d3fc69cf7d610f" - }, + "4.15.15": { "CVE-2021-0935": { "cmt_msg": "net: ipv6: keep sk status consistent after datagram connect failure", - "cmt_id": "a8f02befc87d6f1a882c9b14a31bcfa1fbd3d430" + "cmt_id": "812cb9e2340db3f86049b7a2c3cb8fefb0c5bea4" }, "CVE-2018-1130": { "cmt_msg": "dccp: check sk for closed state in dccp_sendmsg()", - "cmt_id": "91d27e0c302501e148460db9981b5b04481781ce" + "cmt_id": "5df0f40809d4ac73ce859681a689cfd328ae5788" } }, - "4.14.33": { + "4.15.16": { "CVE-2018-1000199": { "cmt_msg": "perf/hwbp: Simplify the perf-hwbp code, fix documentation", - "cmt_id": "ca04476df8fd39c71818352db43090bd17dd1d58" + "cmt_id": "9b5b7c382e11be732ab63bdc872876e7c886de65" }, "CVE-2017-17975": { "cmt_msg": "media: usbtv: prevent double free in error case", - "cmt_id": "1f17d5033fe3c435556d8fb731f3a51ca073ce85" + "cmt_id": "39fd6d09439714516b75d4b7b07b677f8e7da48e" } }, - "4.14.34": { + "4.15.17": { "CVE-2018-7757": { "cmt_msg": "scsi: libsas: fix memory leak in sas_smp_get_phy_events()", - "cmt_id": "8644d14c3240b6875c9e0e72c346146c24a6d8c1" + "cmt_id": "c16490ba27bb7c5bc5ebe22e50a607f84b6bf06f" } }, - "4.14.35": { + "4.15.18": { "CVE-2020-35513": { "cmt_msg": "nfsd: fix incorrect umasks", - "cmt_id": "9a0a509839f31dc17f2ea788dc362c93589e077a" + "cmt_id": "e4e64ce3fbc470a5b33a79f1a795e4746a7b50bb" } }, - "4.14.36": { - "CVE-2019-14763": { - "cmt_msg": "usb: dwc3: gadget: never call ->complete() from ->ep_queue()", - "cmt_id": "59d3a952e4f3d505f9444e86db069081323351c7" + "outstanding": { + "CVE-2019-15090": { + "cmt_msg": "scsi: qedi: remove memset/memcpy to nfunc and use func instead" }, - "CVE-2018-1094": { - "cmt_msg": "ext4: always initialize the crc32c checksum driver", - "cmt_id": "26dbb30c58ffb85bc015bd5e58831483d50f7d18" + "CVE-2019-15099": { + "cmt_msg": "ath6kl: fix a NULL-ptr-deref bug in ath6kl_usb_alloc_urb_from_pipe()" }, - "CVE-2018-1095": { - "cmt_msg": "ext4: limit xattr size to INT_MAX", - "cmt_id": "a57eb14b740e6175aff8b8941bec628403992dfa" + "CVE-2019-15098": { + "cmt_msg": "ath6kl: fix a NULL-ptr-deref bug in ath6kl_usb_alloc_urb_from_pipe()" }, - "CVE-2018-1108": { - "cmt_msg": "random: fix crng_ready() test", - "cmt_id": "6e513bc20ca63f594632eca4e1968791240b8f18" + "CVE-2022-0001": { + "cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE" }, - "CVE-2018-1092": { - "cmt_msg": "ext4: fail ext4_iget for root directory if unallocated", - "cmt_id": "8e0e94683f8449f4e83b4b563b80eb9c76b9e18f" + "CVE-2023-2248": { + "cmt_msg": "net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg" }, - "CVE-2018-20961": { - "cmt_msg": "USB: gadget: f_midi: fixing a possible double-free in f_midi", - "cmt_id": "96dc465173a1f790e805246206aee3d18770f614" - } - }, - "4.14.37": { - "CVE-2018-8087": { - "cmt_msg": "mac80211_hwsim: fix possible memory leak in hwsim_new_radio_nl()", - "cmt_id": "afadc440a1cc08895f451b4a9db551a45f2a1a21" + "CVE-2022-0002": { + "cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE" }, - "CVE-2021-39636": { - "cmt_msg": "netfilter: x_tables: fix pointer leaks to userspace", - "cmt_id": "ad10785a706e63ff155fc97860cdcc5e3bc5992d" - } - }, - "4.14.38": { - "CVE-2018-10940": { - "cmt_msg": "cdrom: information leak in cdrom_ioctl_media_changed()", - "cmt_id": "68c09d548bfc61aec99fa9a24e703c3d6fdba9b1" - } - }, - "4.14.39": { - "CVE-2018-9415": { - "cmt_msg": "ARM: amba: Fix race condition with driver_override", - "cmt_id": "23abff7b984ff46b78b9964f9cdba42036b4149a" + "CVE-2019-19965": { + "cmt_msg": "scsi: libsas: stop discovering if oob mode is disconnected" }, - "CVE-2018-9385": { - "cmt_msg": "ARM: amba: Don't read past the end of sysfs \"driver_override\" buffer", - "cmt_id": "f671ee8de31a3c2702250e64e5f18ebceb21f1e6" + "CVE-2019-19966": { + "cmt_msg": "media: cpia2: Fix use-after-free in cpia2_exit" }, - "CVE-2018-1093": { - "cmt_msg": "ext4: add validity checks for bitmap block numbers", - "cmt_id": "b39430ea068797bb45b72429db3743064280b1be" - } - }, - "4.14.41": { - "CVE-2018-1000200": { - "cmt_msg": "mm, oom: fix concurrent munlock and oom reaper unmap, v3", - "cmt_id": "2270dfcc4b12d49c6d74394d245858ae882a8b79" + "CVE-2023-52615": { + "cmt_msg": "hwrng: core - Fix page fault dead lock on mmap-ed hwrng" }, - "CVE-2018-11508": { - "cmt_msg": "compat: fix 4-byte infoleak via uninitialized struct field", - "cmt_id": "ef7c4825fe5fe9ed251bda8d4c04d47fe33c3afb" - } - }, - "4.14.42": { - "CVE-2018-1120": { - "cmt_msg": "proc: do not access cmdline nor environ from file-backed areas", - "cmt_id": "5c9a9508de30d4d27a270047c7ab5f2817b1366d" - } - }, - "4.14.43": { - "CVE-2018-5814": { - "cmt_msg": "usbip: usbip_host: fix NULL-ptr deref and use-after-free errors", - "cmt_id": "ec0c93951ecb3ab9463c9a0d0a79c69e4bcb2b2a" + "CVE-2023-52614": { + "cmt_msg": "PM / devfreq: Fix buffer overflow in trans_stat_show" }, - "CVE-2018-3639": { - "cmt_msg": "x86/nospec: Simplify alternative_msr_write()", - "cmt_id": "8410540f5aaf06ab01197443371be89822971e58" - } - }, - "4.14.44": { - "CVE-2018-10021": { - "cmt_msg": "scsi: libsas: defer ata device eh commands to libata", - "cmt_id": "58442874542fb41fd53de4ab34be180ad43779c9" + "CVE-2023-52617": { + "cmt_msg": "PCI: switchtec: Fix stdev_release() crash after surprise hot remove" }, - "CVE-2018-1000204": { - "cmt_msg": "scsi: sg: allocate with __GFP_ZERO in sg_build_indirect()", - "cmt_id": "d827bea2d18c07ba514f7d48cde49f90da9a1384" - } - }, - "4.14.45": { - "CVE-2018-11506": { - "cmt_msg": "sr: pass down correctly sized SCSI sense buffer", - "cmt_id": "2a039b93679fb2e974bedf5b0d76da81731474ba" + "CVE-2020-24587": { + "cmt_msg": "mac80211: prevent mixed key and fragment cache attacks" }, - "CVE-2018-9518": { - "cmt_msg": "NFC: llcp: Limit size of SDP URI", - "cmt_id": "54881db3251a48f9a27ac8b7223a9b421757d395" + "CVE-2020-24586": { + "cmt_msg": "mac80211: prevent mixed key and fragment cache attacks" }, - "CVE-2017-13695": { - "cmt_msg": "ACPICA: acpi: acpica: fix acpi operand cache leak in nseval.c", - "cmt_id": "1d1646c408f62148fd2bbc399927bdc5381cb3ba" + "CVE-2023-52612": { + "cmt_msg": "crypto: scomp - fix req->dst buffer overflow" }, - "CVE-2018-6412": { - "cmt_msg": "fbdev: Fixing arbitrary kernel leak in case FBIOGETCMAP_SPARC in sbusfb_ioctl_helper().", - "cmt_id": "ccf92117d49d77f3d88ad81d63ea5c0d02a94e3f" - } - }, - "4.14.49": { - "CVE-2019-18675": { - "cmt_msg": "mmap: introduce sane default mmap limits", - "cmt_id": "16d7ceb04b554207aa68dd27c1bc11f8933813fd" - } - }, - "4.14.50": { - "CVE-2018-10853": { - "cmt_msg": "kvm: x86: use correct privilege level for sgdt/sidt/fxsave/fxrstor access", - "cmt_id": "53e4b19fcd0ce08933e0f7a7fe11654f6eac1f19" + "CVE-2021-0129": { + "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical" }, - "CVE-2018-12904": { - "cmt_msg": "kvm: nVMX: Enforce cpl=0 for VMX instructions", - "cmt_id": "b1bd9caf5e98d8111361f53367fece3444b0a7c2" - } - }, - "4.14.52": { - "CVE-2018-10840": { - "cmt_msg": "ext4: correctly handle a zero-length xattr with a non-zero e_value_offs", - "cmt_id": "21542545990c5aba4b919ac0f8c8ae6a408b49d4" + "CVE-2020-24588": { + "cmt_msg": "cfg80211: mitigate A-MSDU aggregation attacks" }, - "CVE-2018-1118": { - "cmt_msg": "vhost: fix info leak due to uninitialized memory", - "cmt_id": "7446344baafba2f23da58ac837b86770ec977b90" + "CVE-2023-52619": { + "cmt_msg": "pstore/ram: Fix crash when setting number of cpus to an odd number" }, - "CVE-2018-11412": { - "cmt_msg": "ext4: do not allow external inodes for inline data", - "cmt_id": "e81d371dac30019816a1c5a3a2c4c44bb3c68558" + "CVE-2023-52618": { + "cmt_msg": "block/rnbd-srv: Check for unlikely string overflow" }, - "CVE-2018-12232": { - "cmt_msg": "socket: close race condition between sock_close() and sockfs_setattr()", - "cmt_id": "91717ffc9057f38a0203a40ef36ae2e482fd7cbe" - } - }, - "4.14.53": { - "CVE-2018-13406": { - "cmt_msg": "video: uvesafb: Fix integer overflow in allocation", - "cmt_id": "9aa818d42bf5f5477f66dbc941b4daddfcae290d" - } - }, - "4.14.55": { - "CVE-2018-9516": { - "cmt_msg": "HID: debug: check length before copy_to_user()", - "cmt_id": "50b4d984f55e7e8d75f75da6803505ca3c122cef" + "CVE-2023-5717": { + "cmt_msg": "perf: Disallow mis-matched inherited group reads" }, - "CVE-2018-10879": { - "cmt_msg": "ext4: make sure bitmaps and the inode table don't overlap with bg descriptors", - "cmt_id": "ac93c718365ac6ea9d7631641c8dec867d623491" + "CVE-2018-10940": { + "cmt_msg": "cdrom: information leak in cdrom_ioctl_media_changed()" }, - "CVE-2018-10881": { - "cmt_msg": "ext4: clear i_data in ext4_inode_info when removing inline data", - "cmt_id": "deb465ec750b80776cc4ac5b92b72c0a71fd4f0b" + "CVE-2019-9506": { + "cmt_msg": "Bluetooth: Fix faulty expression for minimum encryption key size check" }, - "CVE-2018-10878": { - "cmt_msg": "ext4: always check block group bounds in ext4_init_block_bitmap()", - "cmt_id": "ac48bb9bc0a32f5a4432be1645b57607f8c46aa7" + "CVE-2019-9500": { + "cmt_msg": "brcmfmac: assure SSID length from firmware is limited" }, - "CVE-2018-10877": { - "cmt_msg": "ext4: verify the depth of extent tree in ext4_find_extent()", - "cmt_id": "d69a9df614fc68741efcb0fcc020f05caa99d668" + "CVE-2019-9503": { + "cmt_msg": "brcmfmac: add subtype check for event handling in data path" }, - "CVE-2018-10876": { - "cmt_msg": "ext4: only look at the bg_flags field if it is valid", - "cmt_id": "44a4bc970bfae625d0ec9ecdfefc88c9d93dfe6c" + "CVE-2022-0480": { + "cmt_msg": "memcg: enable accounting for file lock caches" }, - "CVE-2018-10880": { - "cmt_msg": "ext4: never move the system.data xattr out of the inode body", - "cmt_id": "8a9ef17c0dc93def47e17b227ada95c682592a1d" + "CVE-2022-0487": { + "cmt_msg": "moxart: fix potential use-after-free on remove path" }, - "CVE-2017-13168": { - "cmt_msg": "scsi: sg: mitigate read/write abuse", - "cmt_id": "6e51bfa950864343cfe210a75268e826a2b4b2e8" + "CVE-2022-23825": { + "cmt_msg": "" }, - "CVE-2018-10882": { - "cmt_msg": "ext4: add more inode number paranoia checks", - "cmt_id": "c24aab6d86640ccf321b87be6096319f55b16274" + "CVE-2021-42252": { + "cmt_msg": "soc: aspeed: lpc-ctrl: Fix boundary check for mmap" }, - "CVE-2018-10883": { - "cmt_msg": "jbd2: don't mark block as modified if the handle is out of credits", - "cmt_id": "0321e68838d7ba2528b367b879b2fcf9d96a2099" - } - }, - "4.14.56": { - "CVE-2018-13405": { - "cmt_msg": "Fix up non-directory creation in SGID directories", - "cmt_id": "298243a5fb640f018e2fae22c0c895f1b27f0963" + "CVE-2021-47112": { + "cmt_msg": "x86/kvm: Teardown PV features on boot CPU as well" }, - "CVE-2018-16276": { - "cmt_msg": "USB: yurex: fix out-of-bounds uaccess in read handler", - "cmt_id": "90f2a76ccd37cce2530df49335bcea6cd0e23797" - } - }, - "4.14.57": { - "CVE-2017-18216": { - "cmt_msg": "ocfs2: subsystem.su_mutex is required while accessing the item->ci_parent", - "cmt_id": "c59a8f13f36b51f2100111121b39c6d15eca124d" + "CVE-2021-47113": { + "cmt_msg": "btrfs: abort in rename_exchange if we fail to insert the second ref" }, - "CVE-2017-18224": { - "cmt_msg": "ocfs2: ip_alloc_sem should be taken in ocfs2_get_block()", - "cmt_id": "1ccab2bf726e1cd9292deecf4d72d732527035d6" - } - }, - "4.14.58": { - "CVE-2018-10902": { - "cmt_msg": "ALSA: rawmidi: Change resized buffers atomically", - "cmt_id": "5d251646ab1588077b26e89dcaa116aba105d097" - } - }, - "4.14.59": { - "CVE-2018-5390": { - "cmt_msg": "tcp: free batches of packets in tcp_prune_ofo_queue()", - "cmt_id": "f3a5ba6310e11df370f6888ed716d1486896d983" - } - }, - "4.14.60": { - "CVE-2018-14734": { - "cmt_msg": "infiniband: fix a possible use-after-free bug", - "cmt_id": "e27dad1eb1ac7bedb5a033ac2e068543742c807b" - } - }, - "4.14.62": { - "CVE-2018-13093": { - "cmt_msg": "xfs: validate cached inodes are free when allocated", - "cmt_id": "6f021e4ef39ace7f58c415856aef9308c70e89b9" + "CVE-2021-47110": { + "cmt_msg": "x86/kvm: Disable kvmclock on all CPUs on shutdown" }, - "CVE-2018-13094": { - "cmt_msg": "xfs: don't call xfs_da_shrink_inode with NULL bp", - "cmt_id": "59f35b983e8aeb98188c6ef93f8eabc594f8f953" + "CVE-2021-47116": { + "cmt_msg": "ext4: fix memory leak in ext4_mb_init_backend on error path." }, - "CVE-2018-12233": { - "cmt_msg": "jfs: Fix inconsistency between memory allocation and ea_buf->max_size", - "cmt_id": "7d29fb53439c8c91874550cc078eda6db8feafe7" - } - }, - "4.14.63": { - "CVE-2018-3646": { - "cmt_msg": "x86/microcode: Allow late microcode loading with SMT disabled", - "cmt_id": "e456004eb77734e274e520c83ad9be76736e622c" + "CVE-2021-47117": { + "cmt_msg": "ext4: fix bug on in ext4_es_cache_extent as ext4_split_extent_at failed" }, - "CVE-2018-15572": { - "cmt_msg": "x86/speculation: Protect against userspace-userspace spectreRSB", - "cmt_id": "f374b5593e44c01265156b4c4070b618097f401b" + "CVE-2021-47114": { + "cmt_msg": "ocfs2: fix data corruption by fallocate" }, - "CVE-2018-3620": { - "cmt_msg": "x86/microcode: Allow late microcode loading with SMT disabled", - "cmt_id": "e456004eb77734e274e520c83ad9be76736e622c" - } - }, - "4.14.64": { - "CVE-2018-9363": { - "cmt_msg": "Bluetooth: hidp: buffer overflow in hidp_process_report", - "cmt_id": "6e2c702e797c25b49dac3a9f663c449f30cf8efc" - } - }, - "4.14.67": { - "CVE-2018-3693": { - "cmt_msg": "ext4: fix spectre gadget in ext4_mb_regular_allocator()", - "cmt_id": "4bc32484df6a3bdc173301adff0c2fdc66667a40" - } - }, - "4.14.68": { - "CVE-2018-16658": { - "cmt_msg": "cdrom: Fix info leak/OOB read in cdrom_ioctl_drive_status", - "cmt_id": "73b2e7073b51de0b03ebd15c97dd3ad0c3470810" - } - }, - "4.14.69": { - "CVE-2018-20856": { - "cmt_msg": "block: blk_init_allocated_queue() set q->fq as NULL in the fail case", - "cmt_id": "0affbaece6d0b7c75c5166732d0481ae9a28be60" + "CVE-2021-47118": { + "cmt_msg": "pid: take a reference when initializing `cad_pid`" }, - "CVE-2019-12881": { - "cmt_msg": "drm/i915/userptr: reject zero user_size", - "cmt_id": "7188f7416438a34412a6702f548f81be9e2cf56c" - } - }, - "4.14.70": { - "CVE-2018-6554": { - "cmt_msg": "staging: irda: remove the irda network stack and drivers", - "cmt_id": "77be9452d0e5768bab9a041a62116cbeb9dc3174" + "CVE-2021-46970": { + "cmt_msg": "bus: mhi: pci_generic: Remove WQ_MEM_RECLAIM flag from state workqueue" }, - "CVE-2018-6555": { - "cmt_msg": "staging: irda: remove the irda network stack and drivers", - "cmt_id": "e37957305de356b4f8719a3a4c7bc1453a2f0ca3" + "CVE-2019-10207": { + "cmt_msg": "Bluetooth: hci_uart: check for missing tty operations" }, - "CVE-2018-14617": { - "cmt_msg": "hfsplus: fix NULL dereference in hfsplus_lookup()", - "cmt_id": "68e787c3c80059c776d1d7afb20f5eb9f20237a5" + "CVE-2023-0459": { + "cmt_msg": "uaccess: Add speculation barrier to copy_from_user()" }, - "CVE-2018-14609": { - "cmt_msg": "btrfs: relocation: Only remove reloc rb_trees if reloc control has been initialized", - "cmt_id": "0cdbc3faf960de16ebe8a427feb3b0544ad983cc" - } - }, - "4.14.71": { - "CVE-2018-5391": { - "cmt_msg": "ip: discard IPv4 datagrams with overlapping segments.", - "cmt_id": "1c44969111cc68f361638b6e54f5a176609aa05a" + "CVE-2023-0458": { + "cmt_msg": "prlimit: do_prlimit needs to have a speculation check" }, - "CVE-2018-13099": { - "cmt_msg": "f2fs: fix to do sanity check with reserved blkaddr of inline inode", - "cmt_id": "7fb2b50ee59689578d5a712633d1e6755fc98933" + "CVE-2021-30002": { + "cmt_msg": "media: v4l: ioctl: Fix memory leak in video_usercopy" }, - "CVE-2018-17182": { - "cmt_msg": "mm: get rid of vmacache_flush_all() entirely", - "cmt_id": "06274364edb4407b386a996a7ff46c3ca3459b70" - } - }, - "4.14.73": { - "CVE-2018-20511": { - "cmt_msg": "net/appletalk: fix minor pointer leak to userspace in SIOCFINDIPDDPRT", - "cmt_id": "9951e17efd05b8ad49bbc0db2e6b483f95d94d86" + "CVE-2021-0941": { + "cmt_msg": "bpf: Remove MTU check in __bpf_skb_max_len" }, - "CVE-2018-14633": { - "cmt_msg": "scsi: target: iscsi: Use hex2bin instead of a re-implementation", - "cmt_id": "755e45f3155cc51e37dc1cce9ccde10b84df7d93" - } - }, - "4.14.74": { - "CVE-2019-9458": { - "cmt_msg": "media: v4l: event: Prevent freeing event subscriptions while accessed", - "cmt_id": "d61ba3417e4fb71963441aa0c2e9c26f4568215b" + "CVE-2021-39711": { + "cmt_msg": "bpf: fix panic due to oob in bpf_prog_test_run_skb" }, - "CVE-2018-18021": { - "cmt_msg": "arm64: KVM: Tighten guest core register access from userspace", - "cmt_id": "38d070f9090af15b5bdb26fc0e084b22f34eabd9" + "CVE-2020-15802": { + "cmt_msg": "" }, - "CVE-2018-7755": { - "cmt_msg": "floppy: Do not copy a kernel pointer to user memory in FDGETPRM ioctl", - "cmt_id": "04bc4dd86d0f2b166640c8ea5b7a030d92a3d993" + "CVE-2022-3636": { + "cmt_msg": "net: ethernet: mtk_eth_soc: use after free in __mtk_ppe_check_skb()" }, - "CVE-2018-13053": { - "cmt_msg": "alarmtimer: Prevent overflow for relative nanosleep", - "cmt_id": "a4dbaf7c2de0d622e0fe29840dd2bf4a281277a5" + "CVE-2022-3635": { + "cmt_msg": "atm: idt77252: fix use-after-free bugs caused by tst_timer" }, - "CVE-2018-12896": { - "cmt_msg": "posix-timers: Sanitize overrun handling", - "cmt_id": "3e3f075f72bd2dfcd5211bd1ff3919bc118ad4cd" - } - }, - "4.14.75": { - "CVE-2018-17972": { - "cmt_msg": "proc: restrict kernel stack dumps to root", - "cmt_id": "f8566a92ab75d442a823453414c6158b0b3c5ce7" - } - }, - "4.14.76": { - "CVE-2018-15471": { - "cmt_msg": "xen-netback: fix input validation in xenvif_set_hash_mapping()", - "cmt_id": "309a1c5cfc598c162dfc951fac040554164056e4" - } - }, - "4.14.78": { - "CVE-2018-18281": { - "cmt_msg": "mremap: properly flush TLB before releasing the page", - "cmt_id": "541500abfe9eb30a89ff0a6eb42a21521996d68d" - } - }, - "4.14.82": { - "CVE-2018-19854": { - "cmt_msg": "crypto: user - fix leaking uninitialized memory to userspace", - "cmt_id": "fdc427442b374e84077d4214733764efb1a38a0e" + "CVE-2021-28715": { + "cmt_msg": "xen/netback: don't queue unlimited number of packages" }, - "CVE-2018-16871": { - "cmt_msg": "nfsd: COPY and CLONE operations require the saved filehandle to be set", - "cmt_id": "6d1c38aa47d432f425c5829261eaa8e624274a4f" + "CVE-2022-34918": { + "cmt_msg": "netfilter: nf_tables: stricter validation of element data" }, - "CVE-2018-18710": { - "cmt_msg": "cdrom: fix improper type cast, which can leat to information leak.", - "cmt_id": "a8c254d8e96032d5bb235cb2e777203d9acda09d" - } - }, - "4.14.86": { - "CVE-2018-13100": { - "cmt_msg": "f2fs: fix to do sanity check with secs_per_zone", - "cmt_id": "f3d6361a96a455c8ba12226a04efa67a0ada4966" + "CVE-2021-47028": { + "cmt_msg": "mt76: mt7915: fix txrate reporting" }, - "CVE-2018-5703": { - "cmt_msg": "tls: Use correct sk->sk_prot for IPV6", - "cmt_id": "2a0f5919e1e6a1c0423d895ab75eb15f94a67c69" + "CVE-2019-11085": { + "cmt_msg": "drm/i915/gvt: Fix mmap range check" }, - "CVE-2018-13096": { - "cmt_msg": "f2fs: fix to do sanity check with node footer and iblocks", - "cmt_id": "b8321ccd045710ee04fd5322c34cadd13a5e58af" + "CVE-2018-5814": { + "cmt_msg": "usbip: usbip_host: fix NULL-ptr deref and use-after-free errors" }, - "CVE-2018-13097": { - "cmt_msg": "f2fs: fix to do sanity check with user_block_count", - "cmt_id": "f9cf5462b51d98026275cc51437fc531e808b64a" + "CVE-2023-1079": { + "cmt_msg": "HID: asus: use spinlock to safely schedule workers" }, - "CVE-2018-14615": { - "cmt_msg": "f2fs: fix to do sanity check with i_extra_isize", - "cmt_id": "d7d9d29a837358636e12fe09c90a7882b53b2220" + "CVE-2021-43389": { + "cmt_msg": "isdn: cpai: check ctr->cnr to avoid array index out of bound" }, - "CVE-2018-14614": { - "cmt_msg": "f2fs: fix to do sanity check with cp_pack_start_sum", - "cmt_id": "30130700acfad8a705c109325379f5bbe21b3ccc" + "CVE-2023-1074": { + "cmt_msg": "sctp: fail if no bound addresses can be used for a given scope" }, - "CVE-2018-13098": { - "cmt_msg": "f2fs: fix to do sanity check with extra_attr feature", - "cmt_id": "0081c90ebacebb3a82d0d24bf0f42273ce2d902e" + "CVE-2023-1076": { + "cmt_msg": "tun: tun_chr_open(): correctly initialize socket uid" }, - "CVE-2018-5848": { - "cmt_msg": "wil6210: missing length check in wmi_set_ie", - "cmt_id": "107b02c81a8761f1f7efc1e8b54d435324ccd13e" + "CVE-2023-1077": { + "cmt_msg": "sched/rt: pick_next_rt_entity(): check list_entry" }, - "CVE-2018-14611": { - "cmt_msg": "btrfs: validate type when reading a chunk", - "cmt_id": "f7eef132ccc95c9af50b647c5da0511d2b8492f8" + "CVE-2023-40283": { + "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb" }, - "CVE-2018-14610": { - "cmt_msg": "btrfs: Check that each block group has corresponding chunk at mount time", - "cmt_id": "34407a175a59b668a1a2bbf0d0e495d87a7777d8" + "CVE-2023-1073": { + "cmt_msg": "HID: check empty report_list in hid_validate_values()" }, - "CVE-2018-14613": { - "cmt_msg": "btrfs: tree-checker: Verify block_group_item", - "cmt_id": "9f268b5cf2d6a716779dfe11f4bc02d6461db693" + "CVE-2018-13093": { + "cmt_msg": "xfs: validate cached inodes are free when allocated" }, - "CVE-2018-14612": { - "cmt_msg": "btrfs: tree-checker: Detect invalid and empty essential trees", - "cmt_id": "c0dfb99847851fb830d1e8ea7d5e0571f50c325a" + "CVE-2018-13096": { + "cmt_msg": "f2fs: fix to do sanity check with node footer and iblocks" }, - "CVE-2018-1128": { - "cmt_msg": "libceph: add authorizer challenge", - "cmt_id": "3fd73c8a71f299e30359a63add1f33e3fd834831" + "CVE-2018-13097": { + "cmt_msg": "f2fs: fix to do sanity check with user_block_count" }, - "CVE-2018-1129": { - "cmt_msg": "libceph: implement CEPHX_V2 calculation mode", - "cmt_id": "b16d0c5d32468a0624505a7b6b211e20488295e9" + "CVE-2018-13094": { + "cmt_msg": "xfs: don't call xfs_da_shrink_inode with NULL bp" }, - "CVE-2019-2024": { - "cmt_msg": "media: em28xx: Fix use-after-free when disconnecting", - "cmt_id": "30cdc0c3bac950bebd3ba59f5ff980cdd3710e0f" + "CVE-2018-13095": { + "cmt_msg": "xfs: More robust inode extent count validation" }, - "CVE-2018-18690": { - "cmt_msg": "xfs: don't fail when converting shortform attr to long form during ATTR_REPLACE", - "cmt_id": "cb7ccb9924bb3596f211badf0d2becf131a979cd" + "CVE-2018-13098": { + "cmt_msg": "f2fs: fix to do sanity check with extra_attr feature" }, - "CVE-2018-19407": { - "cmt_msg": "KVM: X86: Fix scan ioapic use-before-initialization", - "cmt_id": "83f00ab9a7c03e9f1410727d985b7fe9473002e1" + "CVE-2018-13099": { + "cmt_msg": "f2fs: fix to do sanity check with reserved blkaddr of inline inode" }, - "CVE-2020-0435": { - "cmt_msg": "f2fs: fix to do sanity check with i_extra_isize", - "cmt_id": "d7d9d29a837358636e12fe09c90a7882b53b2220" + "CVE-2019-19770": { + "cmt_msg": "blktrace: fix debugfs use after free" }, - "CVE-2019-2025": { - "cmt_msg": "binder: fix race that allows malicious free of live buffer", - "cmt_id": "fd6cc33d0775b0d902906d88dd05cc1a2a059f8d" - } - }, - "4.14.87": { - "CVE-2018-16862": { - "cmt_msg": "mm: cleancache: fix corruption on missed inode invalidation", - "cmt_id": "60720df8bf43e8ca2ce1a17936904a52129c8471" + "CVE-2019-11884": { + "cmt_msg": "Bluetooth: hidp: fix buffer overflow" }, - "CVE-2018-18397": { - "cmt_msg": "userfaultfd: use ENOENT instead of EFAULT if the atomic copy user fails", - "cmt_id": "82c5a8c0debac552750a00b4fc7551c89c7b34b8" - } - }, - "4.14.88": { - "CVE-2018-20169": { - "cmt_msg": "USB: check usb_get_extra_descriptor for proper size", - "cmt_id": "7b6e85da8d94948201abb8d576d485892a6a878f" + "CVE-2019-11810": { + "cmt_msg": "scsi: megaraid_sas: return error when create DMA pool failed" }, - "CVE-2018-5953": { - "cmt_msg": "printk: hash addresses printed with %p", - "cmt_id": "f2a4f7622d052eb987e8693633468c239c13575a" + "CVE-2019-18683": { + "cmt_msg": "media: vivid: Fix wrong locking that causes race conditions on streaming stop" }, - "CVE-2018-14616": { - "cmt_msg": "f2fs: fix to do sanity check with block address in main area v2", - "cmt_id": "38fce19d4d7bc8acfa183ee2918758d279a69c9a" + "CVE-2019-18680": { + "cmt_msg": "" }, - "CVE-2018-14625": { - "cmt_msg": "vhost/vsock: fix use-after-free in network stack callers", - "cmt_id": "f15c072d6576c5e2b693c22e39ccc9103c952078" + "CVE-2022-20154": { + "cmt_msg": "sctp: use call_rcu to free endpoint" }, - "CVE-2018-19824": { - "cmt_msg": "ALSA: usb-audio: Fix UAF decrement if card has no live interfaces in card.c", - "cmt_id": "19f74e45746253cafb8cb1e773041e7cadbac622" - } - }, - "4.14.91": { - "CVE-2018-16882": { - "cmt_msg": "KVM: Fix UAF in nested posted interrupt processing", - "cmt_id": "cc70f14956fa0ea84ee1a3a5b79347730c6c2d08" + "CVE-2021-45868": { + "cmt_msg": "quota: check block number when reading the block in quota file" }, - "CVE-2018-19985": { - "cmt_msg": "USB: hso: Fix OOB memory access in hso_probe/hso_get_config_data", - "cmt_id": "49be8dc589aee04c64d61e362c5029ab20fd6fd7" - } - }, - "4.14.93": { - "CVE-2019-15927": { - "cmt_msg": "ALSA: usb-audio: Avoid access before bLength check in build_audio_procunit()", - "cmt_id": "1117b7a380f4b4f575d90a318a43d2e168c01fbd" + "CVE-2022-20158": { + "cmt_msg": "net/packet: fix slab-out-of-bounds access in packet_recvmsg()" }, - "CVE-2018-20784": { - "cmt_msg": "sched/fair: Fix infinite loop in update_blocked_averages() by reverting a9e7f6544b9c", - "cmt_id": "c6a9a1ccafc49fe95d8de54eef154ad5c3b94077" + "CVE-2024-0564": { + "cmt_msg": "" }, - "CVE-2019-6133": { - "cmt_msg": "fork: record start_time late", - "cmt_id": "3f2e4e1d9a6cffa95d31b7a491243d5e92a82507" - } - }, - "4.14.94": { - "CVE-2018-16884": { - "cmt_msg": "sunrpc: use-after-free in svc_process_common()", - "cmt_id": "65dba32522065b79a16393efc75f8006c2c3dbb8" - } - }, - "4.14.95": { - "CVE-2019-3701": { - "cmt_msg": "can: gw: ensure DLC boundaries after CAN frame modification", - "cmt_id": "39ff087b5c6be2ff0b08e617d334e5bf72a08b44" + "CVE-2020-0404": { + "cmt_msg": "media: uvcvideo: Avoid cyclic entity chains due to malformed USB descriptors" }, - "CVE-2020-10769": { - "cmt_msg": "crypto: authenc - fix parsing key with misaligned rta_len", - "cmt_id": "b9119fd2749c1459416ebb559cf7c1d379786cff" - } - }, - "4.14.96": { - "CVE-2019-11085": { - "cmt_msg": "drm/i915/gvt: Fix mmap range check", - "cmt_id": "e89ec9b92f9b75b44e1ff9f52dab48bd01834ed6" - } - }, - "4.14.99": { - "CVE-2019-7222": { - "cmt_msg": "KVM: x86: work around leak of uninitialized stack contents (CVE-2019-7222)", - "cmt_id": "ef1b3d4893cec543305d30e8160df8c096135950" + "CVE-2022-39188": { + "cmt_msg": "mmu_gather: Force tlb-flush VM_PFNMAP vmas" }, - "CVE-2019-6974": { - "cmt_msg": "kvm: fix kvm_ioctl_create_device() reference counting (CVE-2019-6974)", - "cmt_id": "8c1b11bc3555b5d1207b0e179cbdd8b945e71e69" + "CVE-2020-27066": { + "cmt_msg": "xfrm: policy: Fix doulbe free in xfrm_policy_timer" }, - "CVE-2019-7221": { - "cmt_msg": "KVM: nVMX: unconditionally cancel preemption timer in free_nested (CVE-2019-7221)", - "cmt_id": "1c965b1b5ecc2c9e1d59b2514cedb6f7483a0241" - } - }, - "4.14.102": { - "CVE-2018-1000026": { - "cmt_msg": "bnx2x: disable GSO where gso_size is too big for hardware", - "cmt_id": "60cd31866de4386d940e55073491c3ee17ca593e" - } - }, - "4.14.103": { - "CVE-2019-8912": { - "cmt_msg": "net: crypto set sk to NULL when af_alg_release.", - "cmt_id": "6e4c01ee785c2192fcc4be234cedde3706309a7e" - } - }, - "4.14.105": { - "CVE-2019-9213": { - "cmt_msg": "mm: enforce min addr even if capable() in expand_downwards()", - "cmt_id": "f5817069248630b3b7b17ebfcdee0b679c52be33" - } - }, - "4.14.106": { - "CVE-2019-16994": { - "cmt_msg": "net: sit: fix memory leak in sit_init_net()", - "cmt_id": "46a5caa79ff73c9403ab37475ef47ed4c027e712" + "CVE-2020-27068": { + "cmt_msg": "cfg80211: add missing policy for NL80211_ATTR_STATUS_CODE" }, - "CVE-2019-12818": { - "cmt_msg": "net: nfc: Fix NULL dereference on nfc_llcp_build_tlv fails", - "cmt_id": "b275f8e6a0096cac11cf697c4e3ad226070264f5" + "CVE-2024-23307": { + "cmt_msg": "md/raid5: fix atomicity violation in raid5_cache_count" }, - "CVE-2019-8980": { - "cmt_msg": "exec: Fix mem leak in kernel_read_file", - "cmt_id": "069fb92ea221c72bd75f4863b3540420082f32ba" + "CVE-2020-15393": { + "cmt_msg": "usb: usbtest: fix missing kfree(dev->buf) in usbtest_disconnect" }, - "CVE-2019-15916": { - "cmt_msg": "net-sysfs: Fix mem leak in netdev_register_kobject", - "cmt_id": "306bbaeb077068141d472b922ae1adf7ab81fd72" + "CVE-2019-19082": { + "cmt_msg": "drm/amd/display: prevent memory leak" }, - "CVE-2019-2101": { - "cmt_msg": "media: uvcvideo: Fix 'type' check leading to overflow", - "cmt_id": "aa4ba765e0903926de64b359e8653bfd29a3c353" - } - }, - "4.14.107": { - "CVE-2019-16995": { - "cmt_msg": "net: hsr: fix memory leak in hsr_dev_finalize()", - "cmt_id": "1aa1e0a3f6dde5c37bb5d6a9121847b95b255c1f" + "CVE-2021-3564": { + "cmt_msg": "Bluetooth: fix the erroneous flush_work() order" }, - "CVE-2019-12819": { - "cmt_msg": "mdio_bus: Fix use-after-free on device_register fails", - "cmt_id": "07c2216c3783daca34ea0d86affb9dfc5346f183" - } - }, - "4.14.108": { - "CVE-2019-10124": { - "cmt_msg": "mm: hwpoison: fix thp split handing in soft_offline_in_use_page()", - "cmt_id": "c02fd076842636fb7506d4ca8a2bb3f91faf1af3" + "CVE-2018-12127": { + "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" }, - "CVE-2019-9455": { - "cmt_msg": "media: videobuf2-v4l2: drop WARN_ON in vb2_warn_zero_bytesused()", - "cmt_id": "8d6df5097c0005320ab6f3cd8dda2ef31db6c6d1" + "CVE-2018-12126": { + "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" }, - "CVE-2019-16413": { - "cmt_msg": "9p: use inode->i_lock to protect i_size_write() under 32-bit", - "cmt_id": "be0b155c2b2f8c39adaa1641f3f6a4be47277993" - } - }, - "4.14.109": { - "CVE-2019-15917": { - "cmt_msg": "Bluetooth: hci_ldisc: Postpone HCI_UART_PROTO_READY bit set in hci_uart_set_proto()", - "cmt_id": "a1dbb34da6f2edf321df5023cb2accd92579269b" - } - }, - "4.14.110": { - "CVE-2019-20811": { - "cmt_msg": "net-sysfs: call dev_hold if kobject_init_and_add success", - "cmt_id": "e331c9066901dfe40bea4647521b86e9fb9901bb" + "CVE-2021-28964": { + "cmt_msg": "btrfs: fix race when cloning extent buffer during rewind of an old root" }, - "CVE-2019-20054": { - "cmt_msg": "fs/proc/proc_sysctl.c: fix NULL pointer dereference in put_links", - "cmt_id": "0d9ef3f5b07e4b6fe6105a45603de1e133e4df49" + "CVE-2019-13631": { + "cmt_msg": "Input: gtco - bounds check collection indent level" }, - "CVE-2019-3460": { - "cmt_msg": "Bluetooth: Check L2CAP option sizes returned from l2cap_get_conf_opt", - "cmt_id": "82868814a87236b17ac588fbb779c87616e99345" + "CVE-2018-12233": { + "cmt_msg": "jfs: Fix inconsistency between memory allocation and ea_buf->max_size" }, - "CVE-2019-15921": { - "cmt_msg": "genetlink: Fix a memory leak on error path", - "cmt_id": "111fdc6e948b36115e29cf3b1981058d033ffd54" + "CVE-2018-12232": { + "cmt_msg": "socket: close race condition between sock_close() and sockfs_setattr()" }, - "CVE-2019-3459": { - "cmt_msg": "Bluetooth: Verify that l2cap_get_conf_opt provides large enough buffer", - "cmt_id": "2b59d36f22622c92c0b06aee7571f0a86a217188" - } - }, - "4.14.111": { - "CVE-2019-11810": { - "cmt_msg": "scsi: megaraid_sas: return error when create DMA pool failed", - "cmt_id": "90fca247abf6adc1ee6eef9b3de199448c8a4ad6" - } - }, - "4.14.112": { - "CVE-2019-11486": { - "cmt_msg": "tty: mark Siemens R3964 line discipline as BROKEN", - "cmt_id": "429977fd9f7153607230a6040ee12510a525e930" + "CVE-2019-16229": { + "cmt_msg": "drm/amdkfd: fix a potential NULL pointer dereference (v2)" }, - "CVE-2019-11815": { - "cmt_msg": "net: rds: force to destroy connection if t_sock is NULL in rds_tcp_kill_sock().", - "cmt_id": "c8a88799e632045399af886a1b1a5205e5d49897" + "CVE-2020-8649": { + "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region" }, - "CVE-2019-10639": { - "cmt_msg": "netns: provide pure entropy for net_hash_mix()", - "cmt_id": "adbb8bdd392db14dc80ad1ac29f8f1d37ab57a62" - } - }, - "4.14.113": { - "CVE-2019-15292": { - "cmt_msg": "appletalk: Fix use-after-free in atalk_proc_exit", - "cmt_id": "0ba1fa56351e6e9c2f8db4ffc823cb7057e4ea82" + "CVE-2020-8648": { + "cmt_msg": "vt: selection, close sel_buffer race" }, - "CVE-2019-7308": { - "cmt_msg": "bpf: fix sanitation of alu op with pointer / scalar type from different paths", - "cmt_id": "6588a490bfe1b879f11b5e74724ef53a33b68641" - } - }, - "4.14.114": { - "CVE-2018-5995": { - "cmt_msg": "printk: hash addresses printed with %p", - "cmt_id": "47ad82a34560ea70e85d2eb56be0ada03dc4fd35" + "CVE-2023-35823": { + "cmt_msg": "media: saa7134: fix use after free bug in saa7134_finidev due to race condition" }, - "CVE-2019-11599": { - "cmt_msg": "coredump: fix race condition between mmget_not_zero()/get_task_mm() and core dumping", - "cmt_id": "bb461ad8e6e0653fc6bd0f26d9173bab0aec235b" + "CVE-2019-0155": { + "cmt_msg": "drm/i915: Rename gen7 cmdparser tables" }, - "CVE-2019-3892": { - "cmt_msg": "coredump: fix race condition between mmget_not_zero()/get_task_mm() and core dumping", - "cmt_id": "bb461ad8e6e0653fc6bd0f26d9173bab0aec235b" + "CVE-2019-0154": { + "cmt_msg": "drm/i915: Lower RM timeout to avoid DSI hard hangs" }, - "CVE-2019-15214": { - "cmt_msg": "ALSA: core: Fix card races between register and disconnect", - "cmt_id": "d11a33e9ba584bb6f5cc74df9d74b26156ba9bb2" - } - }, - "4.14.115": { - "CVE-2019-3882": { - "cmt_msg": "vfio/type1: Limit DMA mappings per container", - "cmt_id": "73a95f1a41c0bb586b8c62622ebf25aca1582af3" + "CVE-2023-35827": { + "cmt_msg": "ravb: Fix use-after-free issue in ravb_tx_timeout_work()" }, - "CVE-2019-15924": { - "cmt_msg": "fm10k: Fix a potential NULL pointer dereference", - "cmt_id": "2617f9af19ce93c509ebf3fd3ce26048b8f85216" - } - }, - "4.14.116": { - "CVE-2019-11487": { - "cmt_msg": "fs: prevent page refcount overflow in pipe_buf_get", - "cmt_id": "c88a0aa7ace7eb10dca42be59f21e2cbd263575e" - } - }, - "4.14.117": { - "CVE-2019-15216": { - "cmt_msg": "USB: yurex: Fix protection fault after device removal", - "cmt_id": "5696fa3f42168ee33256c0b0b72ca963d224327f" - } - }, - "4.14.118": { - "CVE-2018-20836": { - "cmt_msg": "scsi: libsas: fix a race condition when smp task timeout", - "cmt_id": "3739f98aea7113a21d11b1a604525049e422e29e" + "CVE-2023-52585": { + "cmt_msg": "drm/amdgpu: Fix possible NULL dereference in amdgpu_ras_query_error_status_helper()" }, - "CVE-2019-11884": { - "cmt_msg": "Bluetooth: hidp: fix buffer overflow", - "cmt_id": "2c33156b2d2f5efe820d8efdd610fb168c9acf72" - } - }, - "4.14.119": { - "CVE-2019-11091": { - "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option", - "cmt_id": "91788fcb21d008b1b7ac6beae20522725fa78239" + "CVE-2023-52584": { + "cmt_msg": "spmi: mediatek: Fix UAF on device remove" }, - "CVE-2018-12130": { - "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option", - "cmt_id": "91788fcb21d008b1b7ac6beae20522725fa78239" + "CVE-2023-52587": { + "cmt_msg": "IB/ipoib: Fix mcast list locking" }, - "CVE-2018-12127": { - "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option", - "cmt_id": "91788fcb21d008b1b7ac6beae20522725fa78239" + "CVE-2023-52586": { + "cmt_msg": "drm/msm/dpu: Add mutex lock in control vblank irq" }, - "CVE-2018-12126": { - "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option", - "cmt_id": "91788fcb21d008b1b7ac6beae20522725fa78239" - } - }, - "4.14.120": { - "CVE-2019-10142": { - "cmt_msg": "drivers/virt/fsl_hypervisor.c: prevent integer overflow in ioctl", - "cmt_id": "1a3a561df5e176a4422270e3d2cca1cd835b292e" - } - }, - "4.14.121": { - "CVE-2019-11833": { - "cmt_msg": "ext4: zero out the unused memory region in the extent tree block", - "cmt_id": "d7d9e4823b658eb795f4a379d121d3f0539c1117" - } - }, - "4.14.122": { - "CVE-2019-15666": { - "cmt_msg": "xfrm: policy: Fix out-of-bound array accesses in __xfrm_policy_unlink", - "cmt_id": "1a2bb5125acb5be09ac8dcbf0f1e47ec28468fdc" - } - }, - "4.14.123": { - "CVE-2019-20095": { - "cmt_msg": "mwifiex: Fix mem leak in mwifiex_tm_cmd", - "cmt_id": "ccebaeca5089c49f2b331e91334b2d2e7a40e53c" + "CVE-2023-52583": { + "cmt_msg": "ceph: fix deadlock or deadcode of misusing dget()" }, - "CVE-2019-19543": { - "cmt_msg": "media: serial_ir: Fix use-after-free in serial_ir_init_module", - "cmt_id": "f1c9f1f3665635d86e4d507312f4d114d0d738e3" + "CVE-2023-52589": { + "cmt_msg": "media: rkisp1: Fix IRQ disable race issue" }, - "CVE-2019-9466": { - "cmt_msg": "brcmfmac: add subtype check for event handling in data path", - "cmt_id": "7c9290b56da477b54fab5dc48e1d21cfb8dc46f4" + "CVE-2023-52588": { + "cmt_msg": "f2fs: fix to tag gcing flag on page during block migration" }, - "CVE-2019-9500": { - "cmt_msg": "brcmfmac: assure SSID length from firmware is limited", - "cmt_id": "f9ba91b5d1bfb6124640e00dca6562f69b71ca19" + "CVE-2023-52340": { + "cmt_msg": "ipv6: remove max_size check inline with ipv4" }, - "CVE-2019-9503": { - "cmt_msg": "brcmfmac: add subtype check for event handling in data path", - "cmt_id": "7c9290b56da477b54fab5dc48e1d21cfb8dc46f4" + "CVE-2021-46969": { + "cmt_msg": "bus: mhi: core: Fix invalid error returning in mhi_queue" }, - "CVE-2019-19966": { - "cmt_msg": "media: cpia2: Fix use-after-free in cpia2_exit", - "cmt_id": "b7eaea002ad0a3d2563df9d18e2ca3c6bd81abd3" - } - }, - "4.14.124": { - "CVE-2020-10720": { - "cmt_msg": "net-gro: fix use-after-free read in napi_gro_frags()", - "cmt_id": "385ee66eaf88e1f04be973f623b81e4bf0ec0c6f" + "CVE-2020-16120": { + "cmt_msg": "ovl: switch to mounter creds in readdir" }, - "CVE-2019-15219": { - "cmt_msg": "USB: sisusbvga: fix oops in error path of sisusb_probe", - "cmt_id": "47ffaae93ea154ae149315389a30780fa3189caf" + "CVE-2019-17666": { + "cmt_msg": "rtlwifi: Fix potential overflow on P2P code" }, - "CVE-2019-15218": { - "cmt_msg": "media: usb: siano: Fix general protection fault in smsusb", - "cmt_id": "5a7adcda3de26a44fc0fa3f68199358b1527daf4" + "CVE-2018-15471": { + "cmt_msg": "xen-netback: fix input validation in xenvif_set_hash_mapping()" }, - "CVE-2019-15212": { - "cmt_msg": "USB: rio500: refuse more than one device at a time", - "cmt_id": "f18227d08e6b50717e1560a86fbebda0ca911507" + "CVE-2021-34693": { + "cmt_msg": "can: bcm: fix infoleak in struct bcm_msg_head" }, - "CVE-2019-1999": { - "cmt_msg": "binder: fix race between munmap() and direct reclaim", - "cmt_id": "c2a035d7822ac8d2870cd6dbaadc1ab407713b83" + "CVE-2020-11494": { + "cmt_msg": "slcan: Don't transmit uninitialized stack data in padding" }, - "CVE-2019-10638": { - "cmt_msg": "inet: switch IP ID generator to siphash", - "cmt_id": "e10789acbe6a76b304f45cbc8bb77a926ae4f201" - } - }, - "4.14.127": { - "CVE-2019-11479": { - "cmt_msg": "tcp: add tcp_min_snd_mss sysctl", - "cmt_id": "cd6f35b8421ff20365ff711c0ac7647fd70e9af7" + "CVE-2024-26797": { + "cmt_msg": "drm/amd/display: Prevent potential buffer overflow in map_hw_resources" }, - "CVE-2019-11478": { - "cmt_msg": "tcp: tcp_fragment() should apply sane memory limits", - "cmt_id": "9daf226ff92679d09aeca1b5c1240e3607153336" + "CVE-2024-26791": { + "cmt_msg": "btrfs: dev-replace: properly validate device names" }, - "CVE-2019-11477": { - "cmt_msg": "tcp: limit payload size of sacked skbs", - "cmt_id": "d632920554c5aec81d8a79c23dac07efcbabbd54" - } - }, - "4.14.128": { - "CVE-2019-15090": { - "cmt_msg": "scsi: qedi: remove memset/memcpy to nfunc and use func instead", - "cmt_id": "af1630c6dc4fd96c09fef088f9c400c35e259e72" - } - }, - "4.14.129": { - "CVE-2019-15807": { - "cmt_msg": "scsi: libsas: delete sas port if expander discover failed", - "cmt_id": "5992a6926eb037cb8ed30521c74e2bef082a8946" - } - }, - "4.14.130": { - "CVE-2019-12615": { - "cmt_msg": "mdesc: fix a missing-check bug in get_vdev_port_node_info()", - "cmt_id": "b1013624a8adb9caa83b4c9f487778c7b51467a0" + "CVE-2024-26793": { + "cmt_msg": "gtp: fix use-after-free and null-ptr-deref in gtp_newlink()" }, - "CVE-2019-0136": { - "cmt_msg": "mac80211: drop robust management frames from unknown TA", - "cmt_id": "7a680d6e5441400b768d6e6cfe5524726ebd6b7f" - } - }, - "4.14.133": { - "CVE-2019-13272": { - "cmt_msg": "ptrace: Fix ->ptracer_cred handling for PTRACE_TRACEME", - "cmt_id": "bf71ef9655d25e8b275ec6ed649b6bd719231ddc" + "CVE-2022-30594": { + "cmt_msg": "ptrace: Check PTRACE_O_SUSPEND_SECCOMP permission on PTRACE_SEIZE" }, - "CVE-2019-15221": { - "cmt_msg": "ALSA: line6: Fix write on zero-sized buffer", - "cmt_id": "37eaa74451c1003a6bec548c957890c264559463" + "CVE-2024-26798": { + "cmt_msg": "fbcon: always restore the old font data in fbcon_do_set_font()" }, - "CVE-2019-9506": { - "cmt_msg": "Bluetooth: Fix faulty expression for minimum encryption key size check", - "cmt_id": "05206de4e9ae033afd32f685c4a005cbc1dceb39" + "CVE-2021-38204": { + "cmt_msg": "usb: max-3421: Prevent corruption of freed memory" }, - "CVE-2019-3900": { - "cmt_msg": "vhost_net: fix possible infinite loop", - "cmt_id": "ae446749492d8bd23f1d0b81adba16e5739dc740" - } - }, - "4.14.134": { - "CVE-2019-10126": { - "cmt_msg": "mwifiex: Fix heap overflow in mwifiex_uap_parse_tail_ies()", - "cmt_id": "b1459fb34061337efbf0d47a3ba6208f2f59829d" + "CVE-2021-38205": { + "cmt_msg": "net: xilinx_emaclite: Do not print real IOMEM pointer" }, - "CVE-2019-3846": { - "cmt_msg": "mwifiex: Fix possible buffer overflows at parsing bss descriptor", - "cmt_id": "d50f6b58d7ad30ad8e96c0bbc3e5ecfe9b91ba77" + "CVE-2020-0255": { + "cmt_msg": "selinux: properly handle multiple messages in selinux_netlink_send()" }, - "CVE-2019-15220": { - "cmt_msg": "p54usb: Fix race between disconnect and firmware loading", - "cmt_id": "c760ecb74f84f729ae31b9fbc6b772923cdc78df" - } - }, - "4.14.135": { - "CVE-2019-17351": { - "cmt_msg": "xen: let alloc_xenballooned_pages() fail if not enough memory free", - "cmt_id": "ba110e6dc391f70195c161bcc3de2c58ba705045" + "CVE-2023-35001": { + "cmt_msg": "netfilter: nf_tables: prevent OOB access in nft_byteorder_eval" }, - "CVE-2019-12382": { - "cmt_msg": "drm/edid: Fix a missing-check bug in drm_load_edid_firmware()", - "cmt_id": "df56de8931b924c1d850b80e1b22b62449758e90" + "CVE-2022-27666": { + "cmt_msg": "esp: Fix possible buffer overflow in ESP transformation" }, - "CVE-2019-13631": { - "cmt_msg": "Input: gtco - bounds check collection indent level", - "cmt_id": "81bf168d855cc1d97a7c9cde6787ff42485556c8" + "CVE-2021-38208": { + "cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect" }, - "CVE-2019-15925": { - "cmt_msg": "net: hns3: add some error checking in hclge_tm module", - "cmt_id": "18f05a6fc4cfb78ff1de275d9ebf88c3ed5522a2" + "CVE-2017-18232": { + "cmt_msg": "scsi: libsas: direct call probe and destruct" }, - "CVE-2019-15926": { - "cmt_msg": "ath6kl: add some bounds checking", - "cmt_id": "193a754afbe979a43893c88373a625ed384123ab" + "CVE-2022-0168": { + "cmt_msg": "cifs: fix NULL ptr dereference in smb2_ioctl_query_info()" }, - "CVE-2019-14284": { - "cmt_msg": "floppy: fix div-by-zero in setup_format_params", - "cmt_id": "a904a690ea0317fcd88c5b9dfef40ef0f98d9530" + "CVE-2020-26556": { + "cmt_msg": "" }, - "CVE-2019-14283": { - "cmt_msg": "floppy: fix out-of-bounds read in copy_buffer", - "cmt_id": "80637a906eded08e04ed8a6fbbdd2b8112eaa387" + "CVE-2018-9518": { + "cmt_msg": "NFC: llcp: Limit size of SDP URI" }, - "CVE-2019-13648": { - "cmt_msg": "powerpc/tm: Fix oops on sigreturn on systems without TM", - "cmt_id": "26bee6ef0d72193d58a085610fe49169d23baa83" - } - }, - "4.14.136": { - "CVE-2019-15211": { - "cmt_msg": "media: radio-raremono: change devm_k*alloc to k*alloc", - "cmt_id": "c4c213d9aadc85a2808b04d3676970ea5f90340e" + "CVE-2024-26778": { + "cmt_msg": "fbdev: savage: Error out if pixclock equals zero" }, - "CVE-2019-10207": { - "cmt_msg": "Bluetooth: hci_uart: check for missing tty operations", - "cmt_id": "69f9c2bc3f754ad1d610b30b940681d678c8e684" + "CVE-2020-26555": { + "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical" }, - "CVE-2019-20934": { - "cmt_msg": "sched/fair: Don't free p->numa_faults with concurrent readers", - "cmt_id": "d0919216e468d5613cc8c53d4d0676026960fe39" + "CVE-2024-26776": { + "cmt_msg": "spi: hisi-sfc-v3xx: Return IRQ_NONE if no interrupts were detected" }, - "CVE-2019-15215": { - "cmt_msg": "media: cpia2_usb: first wake up, then free in disconnect", - "cmt_id": "3566a98e59b5cb19829d21bfe18cd396812ce15e" + "CVE-2024-26777": { + "cmt_msg": "fbdev: sis: Error out if pixclock equals zero" }, - "CVE-2019-2213": { - "cmt_msg": "binder: fix possible UAF when freeing buffer", - "cmt_id": "a4a3c070b8760f71c8311399fa9bfe67c8629bca" - } - }, - "4.14.137": { - "CVE-2019-1125": { - "cmt_msg": "x86/speculation: Prepare entry code for Spectre v1 swapgs mitigations", - "cmt_id": "83e6e48e70a133a5ea6167bf152ce2b274008b3d" - } - }, - "4.14.139": { - "CVE-2019-19536": { - "cmt_msg": "can: peak_usb: pcan_usb_pro: Fix info-leaks to USB devices", - "cmt_id": "dc741536d5d04065217a8402c52ad49df4cf134c" + "CVE-2019-20794": { + "cmt_msg": "" }, - "CVE-2019-19535": { - "cmt_msg": "can: peak_usb: pcan_usb_fd: Fix info-leaks to USB devices", - "cmt_id": "15312ff709e6a5598a33edb3d31882951233d765" + "CVE-2023-3390": { + "cmt_msg": "netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE" }, - "CVE-2019-19531": { - "cmt_msg": "usb: yurex: Fix use-after-free in yurex_delete", - "cmt_id": "f0d684599b4f2525a6a7fe0cde8dff6800d16a22" - } - }, - "4.14.140": { - "CVE-2019-19537": { - "cmt_msg": "USB: core: Fix races in character device registration and deregistraion", - "cmt_id": "282a771475c2016ef77871f4438d9aaf9c8aa2b7" + "CVE-2023-3397": { + "cmt_msg": "" }, - "CVE-2019-19527": { - "cmt_msg": "HID: hiddev: do cleanup in failure of opening a device", - "cmt_id": "d65ca54d05c209571cf2b3913277f75ab477e214" + "CVE-2024-26773": { + "cmt_msg": "ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found()" }, - "CVE-2019-19530": { - "cmt_msg": "usb: cdc-acm: make sure a refcount is taken early enough", - "cmt_id": "e630f38040b5d2ecc56920742f7bafd57834cd2a" - } - }, - "4.14.141": { - "CVE-2019-15538": { - "cmt_msg": "xfs: fix missing ILOCK unlock when xfs_setattr_nonsize fails due to EDQUOT", - "cmt_id": "044d098441df8fabffba3b084a70beba0e77f8d4" - } - }, - "4.14.142": { - "CVE-2019-15118": { - "cmt_msg": "ALSA: usb-audio: Fix a stack buffer overflow bug in check_input_term", - "cmt_id": "6e1a602dfd51709538fc371d053708934909e3ba" + "CVE-2024-26770": { + "cmt_msg": "HID: nvidia-shield: Add missing null pointer checks to LED initialization" }, - "CVE-2019-15902": { - "cmt_msg": "unknown", - "cmt_id": "3a647417696217c5861a81ccfe5d2e6791d696ac" + "CVE-2024-26771": { + "cmt_msg": "dmaengine: ti: edma: Add some null pointer checks to the edma_probe" }, - "CVE-2019-15117": { - "cmt_msg": "ALSA: usb-audio: Fix an OOB bug in parse_audio_mixer_unit", - "cmt_id": "96b0e80b6d5fb88c4f5b1e9d5224f2aa56395926" - } - }, - "4.14.144": { - "CVE-2019-14835": { - "cmt_msg": "vhost: make sure log_num < in_num", - "cmt_id": "7e9480b480a57fb4ef2e4d2c2cddbb1a31d56b33" + "CVE-2019-13233": { + "cmt_msg": "x86/insn-eval: Fix use-after-free access to LDT entry" }, - "CVE-2019-15030": { - "cmt_msg": "powerpc/tm: Fix FP/VMX unavailable exceptions inside a transaction", - "cmt_id": "32b803e81ce17eec816f09d5388ef0a1cc9e4c2f" - } - }, - "4.14.146": { - "CVE-2019-14816": { - "cmt_msg": "mwifiex: Fix three heap overflow at parsing element in cfg80211_ap_settings", - "cmt_id": "a723f89aa82fd51f2fc2b8c71928324531b37215" + "CVE-2023-28746": { + "cmt_msg": "x86/mmio: Disable KVM mitigation when X86_FEATURE_CLEAR_CPU_BUF is set" }, - "CVE-2019-14814": { - "cmt_msg": "mwifiex: Fix three heap overflow at parsing element in cfg80211_ap_settings", - "cmt_id": "a723f89aa82fd51f2fc2b8c71928324531b37215" + "CVE-2021-47119": { + "cmt_msg": "ext4: fix memory leak in ext4_fill_super" }, - "CVE-2019-14815": { - "cmt_msg": "mwifiex: Fix three heap overflow at parsing element in cfg80211_ap_settings", - "cmt_id": "a723f89aa82fd51f2fc2b8c71928324531b37215" + "CVE-2024-1086": { + "cmt_msg": "netfilter: nf_tables: reject QUEUE/DROP verdict parameters" }, - "CVE-2019-15505": { - "cmt_msg": "media: technisat-usb2: break out of loop at end of buffer", - "cmt_id": "120d5674a14f5d641970bc4287a752e60415b17c" + "CVE-2019-9466": { + "cmt_msg": "brcmfmac: add subtype check for event handling in data path" }, - "CVE-2019-14821": { - "cmt_msg": "KVM: coalesced_mmio: add bounds checking", - "cmt_id": "bf81752d808cd31e18d9a8db6d92b73497aa48d2" - } - }, - "4.14.147": { - "CVE-2019-17056": { - "cmt_msg": "nfc: enforce CAP_NET_RAW for raw sockets", - "cmt_id": "b6a2d6c11272b3cf5d2d902bb9aaf7558560a5eb" + "CVE-2022-0382": { + "cmt_msg": "net ticp:fix a kernel-infoleak in __tipc_sendmsg()" }, - "CVE-2019-17053": { - "cmt_msg": "ieee802154: enforce CAP_NET_RAW for raw sockets", - "cmt_id": "70f80cb205649c7350617ca79515b98419e90475" + "CVE-2023-32233": { + "cmt_msg": "netfilter: nf_tables: deactivate anonymous set from preparation phase" }, - "CVE-2019-17052": { - "cmt_msg": "ax25: enforce CAP_NET_RAW for raw sockets", - "cmt_id": "6567debe7f9c0423e18a758060cc63ee69e2e7d0" + "CVE-2019-15222": { + "cmt_msg": "ALSA: usb-audio: Fix gpf in snd_usb_pipe_sanity_check" }, - "CVE-2019-19533": { - "cmt_msg": "media: ttusb-dec: Fix info-leak in ttusb_dec_send_command()", - "cmt_id": "580ee4a521ddc18aad5c750cc84bf43171599b29" + "CVE-2019-15223": { + "cmt_msg": "ALSA: line6: Assure canceling delayed work at disconnection" }, - "CVE-2019-17055": { - "cmt_msg": "mISDN: enforce CAP_NET_RAW for raw sockets", - "cmt_id": "371af137855d633d7c6226f659bbb6dcceb21322" + "CVE-2020-25285": { + "cmt_msg": "mm/hugetlb: fix a race between hugetlb sysctl handlers" }, - "CVE-2019-17054": { - "cmt_msg": "appletalk: enforce CAP_NET_RAW for raw sockets", - "cmt_id": "272f46fe19daa1a18c0243cc8ac150e291ea51fd" - } - }, - "4.14.148": { - "CVE-2019-18806": { - "cmt_msg": "net: qlogic: Fix memory leak in ql_alloc_large_buffers", - "cmt_id": "dca8aabd7198e1aa7210ff2de081befba79d0d41" - } - }, - "4.14.149": { - "CVE-2019-19525": { - "cmt_msg": "ieee802154: atusb: fix use-after-free at disconnect", - "cmt_id": "481376cc2ccb32113a2492ed1f8de32b5c777b00" + "CVE-2019-15221": { + "cmt_msg": "ALSA: line6: Fix write on zero-sized buffer" }, - "CVE-2019-16746": { - "cmt_msg": "nl80211: validate beacon head", - "cmt_id": "01ec813e457954d8eeaf768d57d625752d245bc9" - } - }, - "4.14.150": { - "CVE-2018-20976": { - "cmt_msg": "xfs: clear sb->s_fs_info on mount failure", - "cmt_id": "6921174cd2fb5f2d0608770fe23056ab128b6d97" + "CVE-2022-1016": { + "cmt_msg": "netfilter: nf_tables: initialize registers in nft_do_chain()" }, - "CVE-2019-19523": { - "cmt_msg": "USB: adutux: fix use-after-free on disconnect", - "cmt_id": "b074263b69bc7683d5ac595cb135b4b5dfd04813" + "CVE-2022-1011": { + "cmt_msg": "fuse: fix pipe buffer lifetime for direct_io" }, - "CVE-2019-19528": { - "cmt_msg": "USB: iowarrior: fix use-after-free on disconnect", - "cmt_id": "10b0e388a18353d224ccf17cc46a57f1070abb2b" - } - }, - "4.14.151": { - "CVE-2019-19075": { - "cmt_msg": "ieee802154: ca8210: prevent memory leak", - "cmt_id": "0cafebaf5719dc84361e39f3f3874721ec95d1af" + "CVE-2022-1012": { + "cmt_msg": "secure_seq: use the 64 bits of the siphash for port offset calculation" }, - "CVE-2019-17075": { - "cmt_msg": "RDMA/cxgb4: Do not dma memory off of the stack", - "cmt_id": "1db19d6805d9dc5c79f8a19dddde324dbf0a33f9" + "CVE-2023-52620": { + "cmt_msg": "netfilter: nf_tables: disallow timeout for anonymous sets" }, - "CVE-2019-17133": { - "cmt_msg": "cfg80211: wext: avoid copying malformed SSIDs", - "cmt_id": "63eb9c2849bc377c6bbf491f752c6cc6b9b75bca" - } - }, - "4.14.152": { - "CVE-2019-19065": { - "cmt_msg": "RDMA/hfi1: Prevent memory leak in sdma_init", - "cmt_id": "8f7b8f1d14d714181b35e69f4cb73f02ea8f0156" + "CVE-2023-52621": { + "cmt_msg": "bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers" }, - "CVE-2019-17666": { - "cmt_msg": "rtlwifi: Fix potential overflow on P2P code", - "cmt_id": "1b940dd55d42133791d7ba4841adfcf436fab98e" + "CVE-2023-52622": { + "cmt_msg": "ext4: avoid online resizing failures due to oversized flex bg" }, - "CVE-2019-15099": { - "cmt_msg": "ath6kl: fix a NULL-ptr-deref bug in ath6kl_usb_alloc_urb_from_pipe()", - "cmt_id": "ce1dee3c1a88a534f561310f16e2eed3e686f28a" + "CVE-2023-52623": { + "cmt_msg": "SUNRPC: Fix a suspicious RCU usage warning" }, - "CVE-2019-15098": { - "cmt_msg": "ath6kl: fix a NULL-ptr-deref bug in ath6kl_usb_alloc_urb_from_pipe()", - "cmt_id": "ce1dee3c1a88a534f561310f16e2eed3e686f28a" + "CVE-2023-52624": { + "cmt_msg": "drm/amd/display: Wake DMCUB before executing GPINT commands" }, - "CVE-2020-10773": { - "cmt_msg": "s390/cmm: fix information leak in cmm_timeout_handler()", - "cmt_id": "119e9aef452a6b6976d20dac8f35aa2dc3e01348" + "CVE-2023-52625": { + "cmt_msg": "drm/amd/display: Refactor DMCUB enter/exit idle interface" }, - "CVE-2019-19526": { - "cmt_msg": "NFC: pn533: fix use-after-free and memleaks", - "cmt_id": "2a571bd399084762a67519f35ef586407fbd3cb2" + "CVE-2023-52628": { + "cmt_msg": "netfilter: nftables: exthdr: fix 4-byte stack OOB write" }, - "CVE-2019-19532": { - "cmt_msg": "HID: Fix assumption that devices have inputs", - "cmt_id": "e13a3d84494ca7b560551a9927231e7ecf27d96a" - } - }, - "4.14.153": { - "CVE-2019-18282": { - "cmt_msg": "net/flow_dissector: switch to siphash", - "cmt_id": "a9de6f42e945cdb24b59c7ab7ebad1eba6cb5875" + "CVE-2023-52629": { + "cmt_msg": "sh: push-switch: Reorder cleanup operations to avoid use-after-free bug" }, - "CVE-2019-19049": { - "cmt_msg": "of: unittest: fix memory leak in unittest_data_add", - "cmt_id": "9f4ca715dae36ff5b737d56165df1b7964a2cb3e" - } - }, - "4.14.154": { - "CVE-2019-19045": { - "cmt_msg": "net/mlx5: prevent memory leak in mlx5_fpga_conn_create_cq", - "cmt_id": "d905f0cea5e0f29b8aced5a38b1ce243051887de" + "CVE-2018-14617": { + "cmt_msg": "hfsplus: fix NULL dereference in hfsplus_lookup()" }, - "CVE-2019-19052": { - "cmt_msg": "can: gs_usb: gs_can_open(): prevent memory leak", - "cmt_id": "3f5e99731cd55f9be6468e9af7985a838ce7255b" + "CVE-2022-0492": { + "cmt_msg": "cgroup-v1: Require capabilities to set release_agent" }, - "CVE-2018-12207": { - "cmt_msg": "kvm: x86, powerpc: do not allow clearing largepages debugfs entry", - "cmt_id": "82e77746f07db70367f66ef272256037d6415353" + "CVE-2020-12352": { + "cmt_msg": "Bluetooth: A2MP: Fix not initializing all members" }, - "CVE-2019-0155": { - "cmt_msg": "drm/i915: Rename gen7 cmdparser tables", - "cmt_id": "82e0caec38b8eb2ec4fa90b614ba02fc297faeb7" + "CVE-2020-12351": { + "cmt_msg": "Bluetooth: L2CAP: Fix calling sk_filter on non-socket based channel" }, - "CVE-2019-0154": { - "cmt_msg": "drm/i915: Lower RM timeout to avoid DSI hard hangs", - "cmt_id": "d302d64a90b0b390ead3f70832aac2662e34323b" + "CVE-2022-0494": { + "cmt_msg": "block-map: add __GFP_ZERO flag for alloc_page in function bio_copy_kern" }, - "CVE-2019-19922": { - "cmt_msg": "sched/fair: Fix low cpu usage with high throttling by removing expiration of cpu-local slices", - "cmt_id": "3dec71e388f95382d83ebb5589f0016eac4a6d2b" + "CVE-2021-47101": { + "cmt_msg": "asix: fix uninit-value in asix_mdio_read()" }, - "CVE-2019-19529": { - "cmt_msg": "can: mcba_usb: fix use-after-free on disconnect", - "cmt_id": "72e535208bc328e0617a8adb242bf8d89cdfd7d4" + "CVE-2021-47100": { + "cmt_msg": "ipmi: Fix UAF when uninstall ipmi_si and ipmi_msghandler module" }, - "CVE-2019-11135": { - "cmt_msg": "x86/msr: Add the IA32_TSX_CTRL MSR", - "cmt_id": "74bccd0ec712fdff716cec80ba1553d41bc887b8" + "CVE-2021-47103": { + "cmt_msg": "inet: fully convert sk->sk_rx_dst to RCU rules" }, - "CVE-2019-16231": { - "cmt_msg": "fjes: Handle workqueue allocation failure", - "cmt_id": "81370ee55d9250e0744e09493186cb0e071dbcb2" + "CVE-2021-46982": { + "cmt_msg": "f2fs: compress: fix race condition of overwrite vs truncate" }, - "CVE-2019-19534": { - "cmt_msg": "can: peak_usb: fix slab info leak", - "cmt_id": "89a23a5d03956b44eac1a778806449577d690c6c" - } - }, - "4.14.155": { - "CVE-2019-19524": { - "cmt_msg": "Input: ff-memless - kill timer in destroy()", - "cmt_id": "5edab14154213a4b6bcc527f60adb6124034a0be" - } - }, - "4.14.157": { - "CVE-2019-18660": { - "cmt_msg": "powerpc/book3s64: Fix link stack flush on context switch", - "cmt_id": "bc06abfb2bc7e5856f997ebc57c361caa08cd961" + "CVE-2007-3719": { + "cmt_msg": "" }, - "CVE-2019-15291": { - "cmt_msg": "media: b2c2-flexcop-usb: add sanity checking", - "cmt_id": "9a611c200ee2777bb3551ee1d979bf923b93653a" + "CVE-2021-46988": { + "cmt_msg": "userfaultfd: release page in error path to avoid BUG_ON" }, - "CVE-2019-18683": { - "cmt_msg": "media: vivid: Fix wrong locking that causes race conditions on streaming stop", - "cmt_id": "4a2c9b037a08b8496f04a76987332ca6f19bd794" - } - }, - "4.14.158": { - "CVE-2019-12614": { - "cmt_msg": "powerpc/pseries/dlpar: Fix a missing check in dlpar_parse_cc_property()", - "cmt_id": "0583dc6fceb6b70cbd7e39802da41d8269fe82ac" + "CVE-2019-19319": { + "cmt_msg": "ext4: protect journal inode's blocks using block_validity" }, - "CVE-2019-19767": { - "cmt_msg": "ext4: add more paranoia checking in ext4_expand_extra_isize handling", - "cmt_id": "eb3257cba634f9a520467f6c8c56f4abfa347484" - } - }, - "4.14.159": { - "CVE-2019-19227": { - "cmt_msg": "appletalk: Fix potential NULL pointer dereference in unregister_snap_client", - "cmt_id": "39de8cc3678f5cd1f4e0ae274c20acabbd85a8b1" + "CVE-2022-3628": { + "cmt_msg": "wifi: brcmfmac: Fix potential buffer overflow in brcmf_fweh_event_worker()" }, - "CVE-2019-19062": { - "cmt_msg": "crypto: user - fix memory leak in crypto_report", - "cmt_id": "41b3b8e0775465c33083ce1998df7f15c039c9bf" + "CVE-2022-3629": { + "cmt_msg": "vsock: Fix memory leak in vsock_connect()" }, - "CVE-2019-19332": { - "cmt_msg": "KVM: x86: fix out-of-bounds write in KVM_GET_EMULATED_CPUID (CVE-2019-19332)", - "cmt_id": "f70609f898d63973388b36adf3650489311b13b9" + "CVE-2022-3621": { + "cmt_msg": "nilfs2: fix NULL pointer dereference at nilfs_bmap_lookup_at_level()" }, - "CVE-2019-19071": { - "cmt_msg": "rsi: release skb if rsi_prepare_beacon fails", - "cmt_id": "0d8b2921af273b9545e16ad21375fabcb647c56e" + "CVE-2022-23960": { + "cmt_msg": "ARM: report Spectre v2 status through sysfs" }, - "CVE-2019-19447": { - "cmt_msg": "ext4: work around deleting a file with i_nlink == 0 safely", - "cmt_id": "d5a2955049171e48feba628e60f15206689bba94" - } - }, - "4.14.161": { - "CVE-2019-18786": { - "cmt_msg": "media: rcar_drif: fix a memory disclosure", - "cmt_id": "3feec89682118fad5139e745c3453a4cf8580ef0" + "CVE-2022-3624": { + "cmt_msg": "bonding: fix reference count leak in balance-alb mode" }, - "CVE-2019-19057": { - "cmt_msg": "mwifiex: pcie: Fix memory leak in mwifiex_pcie_init_evt_ring", - "cmt_id": "1cdafe368ec4ad7e878eddc30ea0d11a0f57b222" + "CVE-2019-11091": { + "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" }, - "CVE-2019-19063": { - "cmt_msg": "rtlwifi: prevent memory leak in rtl_usb_probe", - "cmt_id": "9c84ba30947a9d8ac2c67abaafc17087ead04426" + "CVE-2023-4921": { + "cmt_msg": "net: sched: sch_qfq: Fix UAF in qfq_dequeue()" }, - "CVE-2020-0427": { - "cmt_msg": "pinctrl: devicetree: Avoid taking direct reference to device name string", - "cmt_id": "679c4f27b8958b65bb51d1c3dfdbf3befe4a33a3" + "CVE-2023-1829": { + "cmt_msg": "net/sched: Retire tcindex classifier" }, - "CVE-2019-20812": { - "cmt_msg": "af_packet: set defaule value for tmo", - "cmt_id": "665c9af8987880414e141e623bf7e6481d1c1696" + "CVE-2019-19227": { + "cmt_msg": "appletalk: Fix potential NULL pointer dereference in unregister_snap_client" }, - "CVE-2019-16232": { - "cmt_msg": "libertas: fix a potential NULL pointer dereference", - "cmt_id": "b88d9f8b8ba5722ab4aef7d01c2a5a66b5414b83" - } - }, - "4.14.162": { - "CVE-2020-10690": { - "cmt_msg": "ptp: fix the race between the release of ptp_clock and cdev", - "cmt_id": "2dece4d6d13fe179ee3a5991811712725a56e2f7" - } - }, - "4.14.163": { - "CVE-2019-18809": { - "cmt_msg": "media: usb: fix memory leak in af9005_identify_state", - "cmt_id": "2d7c27957cac081eeacea7c38d8c9c59049883dc" + "CVE-2024-0775": { + "cmt_msg": "ext4: improve error recovery code paths in __ext4_remount()" }, - "CVE-2019-19965": { - "cmt_msg": "scsi: libsas: stop discovering if oob mode is disconnected", - "cmt_id": "82df1d3fa11bc7b25789efa4232bf0c188c8bc72" - } - }, - "4.14.164": { - "CVE-2019-14901": { - "cmt_msg": "mwifiex: Fix heap overflow in mmwifiex_process_tdls_action_frame()", - "cmt_id": "ec3bb975c6013aa2f5e8a96a0bee2c8d39618e89" + "CVE-2020-24394": { + "cmt_msg": "nfsd: apply umask on fs without ACL support" }, - "CVE-2020-0430": { - "cmt_msg": "bpf: reject passing modified ctx to helper functions", - "cmt_id": "7fed98f4a1e6eb77a5d66ecfdf9345e21df6ac82" - } - }, - "4.14.165": { - "CVE-2019-14895": { - "cmt_msg": "mwifiex: fix possible heap overflow in mwifiex_process_country_ie()", - "cmt_id": "c2544fb30080aecc3fff99f2e97999ce8e625f45" + "CVE-2020-14386": { + "cmt_msg": "net/packet: fix overflow in tpacket_rcv" }, - "CVE-2020-0305": { - "cmt_msg": "chardev: Avoid potential use-after-free in 'chrdev_open()'", - "cmt_id": "c807f43500e14ed24599106745bb6005665f74d6" + "CVE-2019-19767": { + "cmt_msg": "ext4: add more paranoia checking in ext4_expand_extra_isize handling" }, - "CVE-2019-19066": { - "cmt_msg": "scsi: bfa: release allocated memory in case of error", - "cmt_id": "f4e8c78fad1294c785de5e92562862dbef1e9c1e" + "CVE-2020-14381": { + "cmt_msg": "futex: Fix inode life-time issue" }, - "CVE-2019-20636": { - "cmt_msg": "Input: add safety guards to input_set_keycode()", - "cmt_id": "af62c38b0f86539504dc5c0e5dcfc7613b1150a5" + "CVE-2019-19768": { + "cmt_msg": "blktrace: Protect q->blk_trace with RCU" }, - "CVE-2019-19068": { - "cmt_msg": "rtl8xxxu: prevent leaking urb", - "cmt_id": "32079b0c59f4620fdf7a5576af7502b0d05fcb01" + "CVE-2022-20141": { + "cmt_msg": "igmp: Add ip_mc_list lock in ip_check_mc_rcu" }, - "CVE-2020-0431": { - "cmt_msg": "HID: hid-input: clear unmapped usages", - "cmt_id": "cb0a3edf8d00740303e5b42e9c0e72d924fc23d2" + "CVE-2023-23455": { + "cmt_msg": "net: sched: atm: dont intepret cls results when asked to drop" }, - "CVE-2019-14615": { - "cmt_msg": "drm/i915/gen9: Clear residual context state on context switch", - "cmt_id": "39465647eda707db7c7561006da3a8450ca634b9" + "CVE-2023-23454": { + "cmt_msg": "net: sched: cbq: dont intepret cls results when asked to drop" }, - "CVE-2019-19056": { - "cmt_msg": "mwifiex: pcie: Fix memory leak in mwifiex_pcie_alloc_cmdrsp_buf", - "cmt_id": "6ddbe82681d911534f460e6afd297fcf7f388049" + "CVE-2022-20148": { + "cmt_msg": "f2fs: fix UAF in f2fs_available_free_memory" }, - "CVE-2019-19078": { - "cmt_msg": "ath10k: fix memory leak", - "cmt_id": "4af2276845448609264360e95973246f222a7d86" - } - }, - "4.14.166": { - "CVE-2019-20096": { - "cmt_msg": "dccp: Fix memleak in __feat_register_sp", - "cmt_id": "d0c15c1e8f9223552818fe5340b0427483b34f22" + "CVE-2023-6931": { + "cmt_msg": "perf: Fix perf_event_validate_size()" }, - "CVE-2019-15217": { - "cmt_msg": "media: usb:zr364xx:Fix KASAN:null-ptr-deref Read in zr364xx_vidioc_querycap", - "cmt_id": "ffe76c896fbc91af8859aaea15b75b0b887960f3" + "CVE-2023-6932": { + "cmt_msg": "ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet" }, - "CVE-2019-19058": { - "cmt_msg": "iwlwifi: dbg_ini: fix memory leak in alloc_sgtable", - "cmt_id": "db1fb5a39747a680a4cc182c8bb4648b845a841f" + "CVE-2024-0607": { + "cmt_msg": "netfilter: nf_tables: fix pointer math issue in nft_byteorder_eval()" }, - "CVE-2018-21008": { - "cmt_msg": "rsi: add fix for crash during assertions", - "cmt_id": "ba8bbddaa188235df007411fdead5832f9e0cb59" + "CVE-2021-0605": { + "cmt_msg": "af_key: pfkey_dump needs parameter validation" }, - "CVE-2019-2182": { - "cmt_msg": "arm64: Enforce BBM for huge IO/VMAP mappings", - "cmt_id": "68a066f6ff13e7029d54da9d322ad686694c7039" + "CVE-2018-20961": { + "cmt_msg": "USB: gadget: f_midi: fixing a possible double-free in f_midi" }, - "CVE-2019-15918": { - "cmt_msg": "cifs: Fix lease buffer length error", - "cmt_id": "1059b758b6fb0fb6949b8c0474d5db27ea269b01" + "CVE-2019-18786": { + "cmt_msg": "media: rcar_drif: fix a memory disclosure" }, - "CVE-2019-5108": { - "cmt_msg": "mac80211: Do not send Layer 2 Update frame before authorization", - "cmt_id": "57e1b5f6b55acb655358bd62c7e2f14d8af90e0a" - } - }, - "4.14.167": { - "CVE-2020-12652": { - "cmt_msg": "scsi: mptfusion: Fix double fetch bug in ioctl", - "cmt_id": "fedf64ea8f461ac51d9772998b277a30cbf8375e" - } - }, - "4.14.168": { - "CVE-2019-20806": { - "cmt_msg": "media: tw5864: Fix possible NULL pointer dereference in tw5864_handle_frame", - "cmt_id": "f4c8d9e5ea524d7f53e54da2920a7d1250822ec5" - } - }, - "4.14.169": { - "CVE-2019-14896": { - "cmt_msg": "libertas: Fix two buffer overflows at parsing bss descriptor", - "cmt_id": "5cdd9e0e7ee99caf59ad54fa833eeb6033386875" + "CVE-2018-18955": { + "cmt_msg": "userns: also map extents in the reverse map to kernel IDs" }, - "CVE-2019-14897": { - "cmt_msg": "libertas: Fix two buffer overflows at parsing bss descriptor", - "cmt_id": "5cdd9e0e7ee99caf59ad54fa833eeb6033386875" + "CVE-2022-2153": { + "cmt_msg": "KVM: x86: Avoid theoretical NULL pointer dereference in kvm_irq_delivery_to_apic_fast()" }, - "CVE-2020-14416": { - "cmt_msg": "can, slip: Protect tty->disc_data in write_wakeup and close with RCU", - "cmt_id": "c39c4e9116943faf30fb7fb9cc1e739c732b4443" - } - }, - "4.14.170": { - "CVE-2020-0432": { - "cmt_msg": "staging: most: net: fix buffer overflow", - "cmt_id": "6560fd66278fec045902010ff7b07878a13e501f" + "CVE-2024-2193": { + "cmt_msg": "" }, - "CVE-2020-12769": { - "cmt_msg": "spi: spi-dw: Add lock protect dw_spi rx/tx to prevent concurrent calls", - "cmt_id": "b56f2a4a4327f609e30872e37eda6d73a6433ed2" - } - }, - "4.14.171": { - "CVE-2020-12653": { - "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_cmd_append_vsie_tlv()", - "cmt_id": "43e189049f32740c0d015f43a407658ac53d1743" + "CVE-2018-12930": { + "cmt_msg": "" }, - "CVE-2020-12654": { - "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_ret_wmm_get_status()", - "cmt_id": "49e9f1057ef968af57a62860697898cb35246936" + "CVE-2018-12931": { + "cmt_msg": "" }, - "CVE-2020-0404": { - "cmt_msg": "media: uvcvideo: Avoid cyclic entity chains due to malformed USB descriptors", - "cmt_id": "52f001bf9ba6d5fc628852dd6102a98f573e0b3b" - } - }, - "4.14.172": { - "CVE-2020-9383": { - "cmt_msg": "floppy: check FDC index for errors before assigning it", - "cmt_id": "e4c587650f64608fcd3506fa2cb47f81c0f88348" + "CVE-2021-28972": { + "cmt_msg": "PCI: rpadlpar: Fix potential drc_name corruption in store functions" }, - "CVE-2020-2732": { - "cmt_msg": "KVM: nVMX: Don't emulate instructions in guest mode", - "cmt_id": "ee1238c0285f40d8297e70f3aaa0d8a981ea0b53" + "CVE-2021-28971": { + "cmt_msg": "perf/x86/intel: Fix a crash caused by zero PEBS status" }, - "CVE-2019-16233": { - "cmt_msg": "scsi: qla2xxx: fix a potential NULL pointer dereference", - "cmt_id": "2011a54b6161cdeb42ec8d7843170977701f97b6" + "CVE-2022-22942": { + "cmt_msg": "drm/vmwgfx: Fix stale file descriptors on failed usercopy" }, - "CVE-2020-0009": { - "cmt_msg": "staging: android: ashmem: Disallow ashmem memory from being remapped", - "cmt_id": "60ba005bbf5751c2c58ca23ccfc9289ae06782b7" + "CVE-2019-19543": { + "cmt_msg": "media: serial_ir: Fix use-after-free in serial_ir_init_module" }, - "CVE-2020-36558": { - "cmt_msg": "vt: vt_ioctl: fix race in VT_RESIZEX", - "cmt_id": "69931c044c9de837602cfd4bcfc28123ce4987e2" - } - }, - "4.14.173": { - "CVE-2020-8649": { - "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region", - "cmt_id": "1855aaccd74cb9528c24ceb6bc15358a411f65ff" + "CVE-2020-36783": { + "cmt_msg": "i2c: img-scb: fix reference leak when pm_runtime_get_sync fails" }, - "CVE-2020-8648": { - "cmt_msg": "vt: selection, close sel_buffer race", - "cmt_id": "432ef54c0444e7cab85a291347bfc1f69ee6257a" + "CVE-2020-36780": { + "cmt_msg": "i2c: sprd: fix reference leak when pm_runtime_get_sync fails" }, - "CVE-2019-16234": { - "cmt_msg": "iwlwifi: pcie: fix rb_allocator workqueue allocation", - "cmt_id": "864ef06aaef5b164669a5292eb822c454c46dd69" + "CVE-2020-36781": { + "cmt_msg": "i2c: imx: fix reference leak when pm_runtime_get_sync fails" }, - "CVE-2020-8647": { - "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region", - "cmt_id": "1855aaccd74cb9528c24ceb6bc15358a411f65ff" + "CVE-2021-3732": { + "cmt_msg": "ovl: prevent private clone if bind mount is not allowed" }, - "CVE-2020-10942": { - "cmt_msg": "vhost: Check docket sk_family instead of call getname", - "cmt_id": "ff8e12b0cfe277a54edbab525f068b39c7ed0de3" + "CVE-2020-36784": { + "cmt_msg": "i2c: cadence: fix reference leak when pm_runtime_get_sync fails" }, - "CVE-2020-27068": { - "cmt_msg": "cfg80211: add missing policy for NL80211_ATTR_STATUS_CODE", - "cmt_id": "ffe09a48bd96094786c303f1cf29b32a29aa6dc8" + "CVE-2024-26647": { + "cmt_msg": "drm/amd/display: Fix late derefrence 'dsc' check in 'link_set_dsc_pps_packet()'" }, - "CVE-2020-0444": { - "cmt_msg": "audit: fix error handling in audit_data_to_entry()", - "cmt_id": "edde9fcd5f41b2e22e455250214de0c4b126b255" + "CVE-2022-20369": { + "cmt_msg": "media: v4l2-mem2mem: Apply DST_QUEUE_OFF_BASE on MMAP buffers across ioctls" }, - "CVE-2020-27418": { - "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region", - "cmt_id": "1855aaccd74cb9528c24ceb6bc15358a411f65ff" - } - }, - "4.14.174": { - "CVE-2020-29370": { - "cmt_msg": "mm: slub: add missing TID bump in kmem_cache_alloc_bulk()", - "cmt_id": "992a5c90af04da6e1e047f10c5ee5d6d8752a699" - } - }, - "4.14.175": { - "CVE-2020-36557": { - "cmt_msg": "vt: vt_ioctl: fix VT_DISALLOCATE freeing in-use virtual console", - "cmt_id": "b9eb60a0ef3971101c94f9cddb09708c2f900b35" + "CVE-2017-13168": { + "cmt_msg": "scsi: sg: mitigate read/write abuse" }, - "CVE-2020-14381": { - "cmt_msg": "futex: Fix inode life-time issue", - "cmt_id": "e52694b56eb6d4b1fe424bda6126b8ce13c246a8" + "CVE-2019-0148": { + "cmt_msg": "i40e: Wrong truncation from u16 to u8" }, - "CVE-2020-11668": { - "cmt_msg": "media: xirlink_cit: add missing descriptor sanity checks", - "cmt_id": "e251c592321cb82e5f31b06542b2f1f6e81cb2b8" + "CVE-2019-17075": { + "cmt_msg": "RDMA/cxgb4: Do not dma memory off of the stack" }, - "CVE-2021-3715": { - "cmt_msg": "net_sched: cls_route: remove the right filter from hashtable", - "cmt_id": "f0c92f59cf528bc1b872f2ca91b01e128a2af3e6" + "CVE-2019-0146": { + "cmt_msg": "i40e: add num_vectors checker in iwarp handler" }, - "CVE-2020-27066": { - "cmt_msg": "xfrm: policy: Fix doulbe free in xfrm_policy_timer", - "cmt_id": "dc0ea9b710102ef628a26663d892031a2c381549" + "CVE-2019-0147": { + "cmt_msg": "i40e: add num_vectors checker in iwarp handler" }, - "CVE-2020-11608": { - "cmt_msg": "media: ov519: add missing endpoint sanity checks", - "cmt_id": "ea7d13d02a76c76dd3a0ee7bda97bb4361473b62" + "CVE-2019-0145": { + "cmt_msg": "i40e: add num_vectors checker in iwarp handler" }, - "CVE-2020-11609": { - "cmt_msg": "media: stv06xx: add missing descriptor sanity checks", - "cmt_id": "b4ac6fbe5b1a3cb83d84cb9f7ab8df71d104f535" - } - }, - "4.14.176": { - "CVE-2020-11494": { - "cmt_msg": "slcan: Don't transmit uninitialized stack data in padding", - "cmt_id": "d0a7c3373404bd931565f361802d320462fbe9f9" + "CVE-2022-44034": { + "cmt_msg": "char: pcmcia: remove all the drivers" }, - "CVE-2020-11565": { - "cmt_msg": "mm: mempolicy: require at least one nodeid for MPOL_PREFERRED", - "cmt_id": "c51609ac4c48d31a8881af669f1192d2ee405928" + "CVE-2022-44033": { + "cmt_msg": "char: pcmcia: remove all the drivers" }, - "CVE-2020-0433": { - "cmt_msg": "blk-mq: sync the update nr_hw_queues with blk_mq_queue_tag_busy_iter", - "cmt_id": "574eb136ec7f315c3ef2ca68fa9b3e16c56baa24" - } - }, - "4.14.177": { - "CVE-2020-12826": { - "cmt_msg": "signal: Extend exec_id to 64bits", - "cmt_id": "28c63ef17d620f0e95458c56c5d839ea3de3e500" + "CVE-2022-44032": { + "cmt_msg": "char: pcmcia: remove all the drivers" }, - "CVE-2020-12657": { - "cmt_msg": "block, bfq: fix use-after-free in bfq_idle_slice_timer_body", - "cmt_id": "f83b75ef20ac868046f90a7006b44bfea671a7c3" + "CVE-2021-46906": { + "cmt_msg": "HID: usbhid: fix info leak in hid_submit_ctrl" }, - "CVE-2020-11669": { - "cmt_msg": "powerpc/powernv/idle: Restore AMR/UAMOR/AMOR after idle", - "cmt_id": "66a93f57330d3e172bf2c3da29f0501634bfac7a" - } - }, - "4.14.178": { - "CVE-2019-19319": { - "cmt_msg": "ext4: protect journal inode's blocks using block_validity", - "cmt_id": "795762468125a6412c089651e74f780bee154118" + "CVE-2021-3609": { + "cmt_msg": "can: bcm: delay release of struct bcm_op after synchronize_rcu()" }, - "CVE-2020-12114": { - "cmt_msg": "make struct mountpoint bear the dentry reference to mountpoint, not struct mount", - "cmt_id": "e21c8c03af20932c15d8b1d3bb9cbad9607a6eab" + "CVE-2021-3600": { + "cmt_msg": "bpf: Fix 32 bit src register truncation on div/mod" }, - "CVE-2020-12464": { - "cmt_msg": "USB: core: Fix free-while-in-use bug in the USB S-Glibrary", - "cmt_id": "b49aa64f1d2526de71ae0354d37026e5861ccb4b" - } - }, - "4.14.179": { - "CVE-2020-10751": { - "cmt_msg": "selinux: properly handle multiple messages in selinux_netlink_send()", - "cmt_id": "90d4469b0aefac7695e48a641551f74a38f55613" + "CVE-2021-23133": { + "cmt_msg": "net/sctp: fix race condition in sctp_destroy_sock" }, - "CVE-2020-0255": { - "cmt_msg": "selinux: properly handle multiple messages in selinux_netlink_send()", - "cmt_id": "90d4469b0aefac7695e48a641551f74a38f55613" - } - }, - "4.14.181": { - "CVE-2019-9245": { - "cmt_msg": "f2fs: sanity check of xattr entry size", - "cmt_id": "ec236cd6a254da2192c35a65fa0011a0268d66b7" + "CVE-2018-14616": { + "cmt_msg": "f2fs: fix to do sanity check with block address in main area v2" }, - "CVE-2020-10711": { - "cmt_msg": "netlabel: cope with NULL catmap", - "cmt_id": "0f5ae0f5b2675e4e703b980221976a1c2d79dba9" + "CVE-2019-20095": { + "cmt_msg": "mwifiex: Fix mem leak in mwifiex_tm_cmd" }, - "CVE-2020-13143": { - "cmt_msg": "USB: gadget: fix illegal array access in binding with UDC", - "cmt_id": "3d1e9fbbfb888ef59697766561e982524c0a6a03" + "CVE-2019-20096": { + "cmt_msg": "dccp: Fix memleak in __feat_register_sp" }, - "CVE-2020-1749": { - "cmt_msg": "net: ipv6_stub: use ip6_dst_lookup_flow instead of ip6_dst_lookup", - "cmt_id": "8ab8786f78c3fc930f9abf6d6d85e95567de4e1f" + "CVE-2018-6554": { + "cmt_msg": "staging: irda: remove the irda network stack and drivers" }, - "CVE-2020-27786": { - "cmt_msg": "ALSA: rawmidi: Fix racy buffer resize under concurrent accesses", - "cmt_id": "8645ac3684a70e4e8a21c7c407c07a1a4316beec" + "CVE-2018-6555": { + "cmt_msg": "staging: irda: remove the irda network stack and drivers" }, - "CVE-2019-9453": { - "cmt_msg": "f2fs: fix to avoid accessing xattr across the boundary", - "cmt_id": "1d295b32df866ea09aa8cc94500ed6e96e2ea09e" + "CVE-2019-9213": { + "cmt_msg": "mm: enforce min addr even if capable() in expand_downwards()" }, - "CVE-2020-0067": { - "cmt_msg": "f2fs: fix to avoid memory leakage in f2fs_listxattr", - "cmt_id": "ae811cecbbb231f11a84acaf74baca1283b964c7" + "CVE-2019-14896": { + "cmt_msg": "libertas: Fix two buffer overflows at parsing bss descriptor" }, - "CVE-2019-19768": { - "cmt_msg": "blktrace: Protect q->blk_trace with RCU", - "cmt_id": "7a35c8cbf2522e4f45d266dca95dacc71cf412ed" + "CVE-2019-14897": { + "cmt_msg": "libertas: Fix two buffer overflows at parsing bss descriptor" }, - "CVE-2020-12770": { - "cmt_msg": "scsi: sg: add sg_remove_request in sg_write", - "cmt_id": "3f743dd319951491d005ea51470e180f6df9125e" - } - }, - "4.14.182": { - "CVE-2021-0447": { - "cmt_msg": "l2tp: protect sock pointer of struct pppol2tp_session with RCU", - "cmt_id": "26f8819ddd10141ebe7bbce700fbab36bfa5f478" - } - }, - "4.14.183": { - "CVE-2020-10732": { - "cmt_msg": "fs/binfmt_elf.c: allocate initialized memory in fill_thread_core_info()", - "cmt_id": "61ce1733b30fdcf45e31308bc7795b6dc7f2ffba" - } - }, - "4.14.184": { - "CVE-2020-13974": { - "cmt_msg": "vt: keyboard: avoid signed integer overflow in k_ascii", - "cmt_id": "26079af52bf616bc492acc1fe41dce53fe199456" + "CVE-2019-14895": { + "cmt_msg": "mwifiex: fix possible heap overflow in mwifiex_process_country_ie()" }, - "CVE-2020-0543": { - "cmt_msg": "x86/cpu: Add 'table' argument to cpu_matches()", - "cmt_id": "9c98ba3f69b156c9fee72b71260d51f623a4a457" + "CVE-2024-26784": { + "cmt_msg": "pmdomain: arm: Fix NULL dereference on scmi_perf_domain removal" }, - "CVE-2019-19462": { - "cmt_msg": "kernel/relay.c: handle alloc_percpu returning NULL in relay_open", - "cmt_id": "7821131c16cb2d32a5014009b50d362317418556" + "CVE-2024-26789": { + "cmt_msg": "crypto: arm64/neonbs - fix out-of-bounds access on short input" }, - "CVE-2020-10757": { - "cmt_msg": "mm: Fix mremap not considering huge pmd devmap", - "cmt_id": "469ef673629d36d8ed5912b52f5d87ecc0309b3c" - } - }, - "4.14.185": { - "CVE-2019-20810": { - "cmt_msg": "media: go7007: fix a miss of snd_card_free", - "cmt_id": "033e86f47388583d460e1ea075fc4581d23c0fe1" + "CVE-2018-19854": { + "cmt_msg": "crypto: user - fix leaking uninitialized memory to userspace" }, - "CVE-2018-20669": { - "cmt_msg": "make 'user_access_begin()' do 'access_ok()'", - "cmt_id": "b25df2918ba94ccc0ae44b4bb53f0f76a4bb0e96" + "CVE-2020-0067": { + "cmt_msg": "f2fs: fix to avoid memory leakage in f2fs_listxattr" }, - "CVE-2020-29368": { - "cmt_msg": "mm: thp: make the THP mapcount atomic against __split_huge_pmd_locked()", - "cmt_id": "3b6c93db0a02b843694cf91f8bacd94f8e7259c8" + "CVE-2020-26541": { + "cmt_msg": "certs: Add EFI_CERT_X509_GUID support for dbx entries" }, - "CVE-2020-10766": { - "cmt_msg": "x86/speculation: Prevent rogue cross-process SSBD shutdown", - "cmt_id": "d808ea8d0b4deaf6be37a58d41550df48f117a3a" + "CVE-2024-26769": { + "cmt_msg": "nvmet-fc: avoid deadlock on delete association path" }, - "CVE-2020-10767": { - "cmt_msg": "x86/speculation: Avoid force-disabling IBPB based on STIBP and enhanced IBRS.", - "cmt_id": "b4eba1edf71e3ce882d79fd46d654770a7b277b0" + "CVE-2024-26768": { + "cmt_msg": "LoongArch: Change acpi_core_pic[NR_CPUS] to acpi_core_pic[MAX_CORE_PIC]" }, - "CVE-2020-10768": { - "cmt_msg": "x86/speculation: PR_SPEC_FORCE_DISABLE enforcement for indirect branches.", - "cmt_id": "96f1500aedc9ee67ad9614917d7c6e97bc7dbaa1" - } - }, - "4.14.186": { - "CVE-2020-12771": { - "cmt_msg": "bcache: fix potential deadlock problem in btree_gc_coalesce", - "cmt_id": "80d90125a3e1c98aafb6b13e62bd680fe9a4cd5a" + "CVE-2024-26765": { + "cmt_msg": "LoongArch: Disable IRQ before init_fn() for nonboot CPUs" }, - "CVE-2020-15436": { - "cmt_msg": "block: Fix use-after-free in blkdev_get()", - "cmt_id": "a43abf15844c9e5de016957b8e612f447b7fb077" - } - }, - "4.14.187": { - "CVE-2020-12655": { - "cmt_msg": "xfs: add agf freeblocks verify in xfs_agf_verify", - "cmt_id": "115267e8d9fce8d5efe0949f1d2e5cee30441cf7" - } - }, - "4.14.188": { - "CVE-2020-24394": { - "cmt_msg": "nfsd: apply umask on fs without ACL support", - "cmt_id": "15fefb108c7af7ec8e19a88caed928d8b88120ff" + "CVE-2024-26764": { + "cmt_msg": "fs/aio: Restrict kiocb_set_cancel_fn() to I/O submitted via libaio" }, - "CVE-2020-15393": { - "cmt_msg": "usb: usbtest: fix missing kfree(dev->buf) in usbtest_disconnect", - "cmt_id": "4336374bc2220bf3c439b70c31d9e8f6f9583ea8" - } - }, - "4.14.189": { - "CVE-2020-14356": { - "cmt_msg": "cgroup: fix cgroup_sk_alloc() for sk_clone_lock()", - "cmt_id": "82fd2138a5ffd7e0d4320cdb669e115ee976a26e" + "CVE-2024-26767": { + "cmt_msg": "drm/amd/display: fixed integer types and null check locations" }, - "CVE-2020-10781": { - "cmt_msg": "Revert \"zram: convert remaining CLASS_ATTR() to CLASS_ATTR_RO()\"", - "cmt_id": "5cd9ec70b9f6431fc3e60075c01bc00f08c5606b" - } - }, - "4.14.190": { - "CVE-2020-15437": { - "cmt_msg": "serial: 8250: fix null-ptr-deref in serial8250_start_tx()", - "cmt_id": "c5760ab7aae09899412646e0cf842e23bea5b7a2" - } - }, - "4.14.191": { - "CVE-2018-10323": { - "cmt_msg": "xfs: set format back to extents if xfs_bmap_extents_to_btree", - "cmt_id": "8a443ffcf7b572c071398644d35cf9cc55cfa2cb" - } - }, - "4.14.192": { - "CVE-2019-19061": { - "cmt_msg": "iio: imu: adis16400: fix memory leak", - "cmt_id": "8d75cc141d702ebc280dde2b32b50cfdea3a02b3" + "CVE-2024-26766": { + "cmt_msg": "IB/hfi1: Fix sdma.h tx->num_descs off-by-one error" }, - "CVE-2019-9445": { - "cmt_msg": "f2fs: check if file namelen exceeds max value", - "cmt_id": "6a27f426266ac0d29faa95bed8934afeef1f9d13" + "CVE-2024-26763": { + "cmt_msg": "dm-crypt: don't modify the data when using authenticated encryption" }, - "CVE-2019-19054": { - "cmt_msg": "media: rc: prevent memory leak in cx23888_ir_probe", - "cmt_id": "12273ec840cc67b2ec469ee5f5214559357436bb" + "CVE-2019-9455": { + "cmt_msg": "media: videobuf2-v4l2: drop WARN_ON in vb2_warn_zero_bytesused()" }, - "CVE-2018-8043": { - "cmt_msg": "net: phy: mdio-bcm-unimac: fix potential NULL dereference in unimac_mdio_probe()", - "cmt_id": "9e06953ee2a406c4bf4ff08c700d3ce1254974d1" + "CVE-2023-51042": { + "cmt_msg": "drm/amdgpu: Fix potential fence use-after-free v2" }, - "CVE-2019-18808": { - "cmt_msg": "crypto: ccp - Release all allocated memory if sha type is invalid", - "cmt_id": "a42f149865da48f25e5a49ca344dbcad61b66ae1" + "CVE-2019-9453": { + "cmt_msg": "f2fs: fix to avoid accessing xattr across the boundary" }, - "CVE-2019-19074": { - "cmt_msg": "ath9k: release allocated buffer if timed out", - "cmt_id": "83c212df7794563a2f45a3be8fbc097e352b2c3a" + "CVE-2023-20569": { + "cmt_msg": "x86/bugs: Increase the x86 bugs vector size to two u32s" }, - "CVE-2019-19073": { - "cmt_msg": "ath9k_htc: release allocated buffer if timed out", - "cmt_id": "5502de13f91db625b063cb9d0793c7391f38452d" + "CVE-2023-46838": { + "cmt_msg": "xen-netback: don't produce zero-size SKB frags" }, - "CVE-2017-18232": { - "cmt_msg": "scsi: libsas: direct call probe and destruct", - "cmt_id": "3a156abd24346a3188eb7e88cf86386a409e0d02" + "CVE-2022-2977": { + "cmt_msg": "tpm: fix reference counting for struct tpm_chip" }, - "CVE-2019-3016": { - "cmt_msg": "x86/kvm: Be careful not to clear KVM_VCPU_FLUSH_TLB bit", - "cmt_id": "fd4a641bb5731c0ce5397698560a823602dbaac2" - } - }, - "4.14.193": { - "CVE-2020-16166": { - "cmt_msg": "random32: update the net random state on interrupt and activity", - "cmt_id": "583bcbc024f6bf8daa266f4f71b99e9d6e78c40b" - } - }, - "4.14.194": { - "CVE-2020-26088": { - "cmt_msg": "net/nfc/rawsock.c: add CAP_NET_RAW check.", - "cmt_id": "980415fffec6952602edac586eb8c3a7d3f50b43" + "CVE-2019-9458": { + "cmt_msg": "media: v4l: event: Prevent freeing event subscriptions while accessed" }, - "CVE-2020-36386": { - "cmt_msg": "Bluetooth: Fix slab-out-of-bounds read in hci_extended_inquiry_result_evt()", - "cmt_id": "d91299b8382b129156708708d69876e753b9ade6" + "CVE-2023-3090": { + "cmt_msg": "ipvlan:Fix out-of-bounds caused by unclear skb->cb" }, - "CVE-2019-19448": { - "cmt_msg": "btrfs: only search for left_info if there is no right_info in try_merge_free_space", - "cmt_id": "10742034076daea73acc17779e8f234060e03489" + "CVE-2023-45862": { + "cmt_msg": "USB: ene_usb6250: Allocate enough memory for full object" }, - "CVE-2020-25212": { - "cmt_msg": "nfs: Fix getxattr kernel panic and memory overflow", - "cmt_id": "e4ddf4e58946c7dfe8568a21ee3d27b03d96bc56" + "CVE-2023-45863": { + "cmt_msg": "kobject: Fix slab-out-of-bounds in fill_kobj_path()" }, - "CVE-2020-14331": { - "cmt_msg": "vgacon: Fix for missing check in scrollback handling", - "cmt_id": "041a5a238a1e31992b5f22ef4f9792729d3b46ca" - } - }, - "4.14.195": { - "CVE-2020-14314": { - "cmt_msg": "ext4: fix potential negative array index in do_split()", - "cmt_id": "fbbfd55a40d5d0806b59ee0403c75d5ac517533f" + "CVE-2020-25704": { + "cmt_msg": "perf/core: Fix a memory leak in perf_event_parse_addr_filter()" }, - "CVE-2020-29371": { - "cmt_msg": "romfs: fix uninitialized memory leak in romfs_dev_read()", - "cmt_id": "89346bc395e7bc0a7d3c36c824782050b17d4fec" + "CVE-2020-25705": { + "cmt_msg": "icmp: randomize the global rate limiter" }, - "CVE-2020-0466": { - "cmt_msg": "do_epoll_ctl(): clean the failure exits up a bit", - "cmt_id": "6875d79ba740f47a480908cf9fa791715ea0e4f1" - } - }, - "4.14.196": { - "CVE-2020-36766": { - "cmt_msg": "cec-api: prevent leaking memory through hole in structure", - "cmt_id": "e6a62b5c4f7a05afec7ea4cfb040fb8512376259" - } - }, - "4.14.197": { - "CVE-2020-25285": { - "cmt_msg": "mm/hugetlb: fix a race between hugetlb sysctl handlers", - "cmt_id": "c4b219136040bc57e9704afee8f5c5a9430795a5" + "CVE-2023-52639": { + "cmt_msg": "KVM: s390: vsie: fix race during shadow creation" }, - "CVE-2020-0465": { - "cmt_msg": "HID: core: Sanitize event code and type when mapping input", - "cmt_id": "a083dcdcfa2568747112edf865b3e848d70835e5" + "CVE-2023-52638": { + "cmt_msg": "can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock" }, - "CVE-2022-20565": { - "cmt_msg": "HID: core: Correctly handle ReportSize being zero", - "cmt_id": "9e5894b7e2229e6d89319864fb08304571fd44f7" + "CVE-2019-15239": { + "cmt_msg": "unknown" }, - "CVE-2020-25641": { - "cmt_msg": "block: allow for_each_bvec to support zero len bvec", - "cmt_id": "b7aae706e84ac271f755a574d6a18fc9b42e8e8f" + "CVE-2023-52635": { + "cmt_msg": "PM / devfreq: Synchronize devfreq_monitor_[start/stop]" }, - "CVE-2021-1048": { - "cmt_msg": "fix regression in \"epoll: Keep a reference on files added to the check list\"", - "cmt_id": "c5c6e00f6cc5d3ed0d6464b14e33f2f5c8505888" - } - }, - "4.14.198": { - "CVE-2020-12888": { - "cmt_msg": "vfio-pci: Invalidate mmaps and block MMIO access on disabled memory", - "cmt_id": "1356c3e8539ac48b9362e60b1fa80ec06bb960ec" - } - }, - "4.14.199": { - "CVE-2020-25284": { - "cmt_msg": "rbd: require global CAP_SYS_ADMIN for mapping and unmapping", - "cmt_id": "af4a88994936474294b2f484be01117dc7550e68" + "CVE-2022-26373": { + "cmt_msg": "x86/speculation: Add RSB VM Exit protections" }, - "CVE-2020-14390": { - "cmt_msg": "fbcon: remove soft scrollback code", - "cmt_id": "6e2e0735dadecc1c1657e458e8f88e0ca6a4ec04" + "CVE-2023-52633": { + "cmt_msg": "um: time-travel: fix time corruption" }, - "CVE-2020-28097": { - "cmt_msg": "vgacon: remove software scrollback support", - "cmt_id": "34c050b531a72639e61a3be24b608604753f885a" - } - }, - "4.14.200": { - "CVE-2020-25645": { - "cmt_msg": "geneve: add transport ports in route lookup for geneve", - "cmt_id": "494648fc5286830b149bc1c1a059a827a45df3c8" + "CVE-2023-52632": { + "cmt_msg": "drm/amdkfd: Fix lock dependency warning with srcu" }, - "CVE-2021-0605": { - "cmt_msg": "af_key: pfkey_dump needs parameter validation", - "cmt_id": "05570d97443f8e569a79cf6e140f5ed96e6ac172" + "CVE-2021-44733": { + "cmt_msg": "tee: handle lookup of shm with reference count 0" }, - "CVE-2020-25643": { - "cmt_msg": "hdlc_ppp: add range checks in ppp_cp_parse_cr()", - "cmt_id": "8f0addb36dd1c61fe0f1a458a48b1a5ddc96aa24" + "CVE-2021-47135": { + "cmt_msg": "mt76: mt7921: fix possible AOOB issue in mt7921_mcu_tx_rate_report" }, - "CVE-2020-36312": { - "cmt_msg": "KVM: fix memory leak in kvm_io_bus_unregister_dev()", - "cmt_id": "40a023f681befd9b2862a3c16fb306a38b359ae5" - } - }, - "4.14.201": { - "CVE-2020-14386": { - "cmt_msg": "net/packet: fix overflow in tpacket_rcv", - "cmt_id": "5b08356f184a0314d87f9a889be2ed9fef087691" + "CVE-2021-47136": { + "cmt_msg": "net: zero-initialize tc skb extension on allocation" }, - "CVE-2020-25211": { - "cmt_msg": "netfilter: ctnetlink: add a range check for l3/l4 protonum", - "cmt_id": "60634d81cb43b19817b79a8a1d38e25e907e5ea1" + "CVE-2021-47137": { + "cmt_msg": "net: lantiq: fix memory corruption in RX ring" }, - "CVE-2021-0448": { - "cmt_msg": "netfilter: ctnetlink: add a range check for l3/l4 protonum", - "cmt_id": "60634d81cb43b19817b79a8a1d38e25e907e5ea1" + "CVE-2021-47131": { + "cmt_msg": "net/tls: Fix use-after-free after the TLS device goes down and up" }, - "CVE-2021-39634": { - "cmt_msg": "epoll: do not insert into poll queues until all sanity checks are done", - "cmt_id": "23fb662b13e4f75688123e1d16aa7116f602db32" + "CVE-2021-47133": { + "cmt_msg": "HID: amd_sfh: Fix memory leak in amd_sfh_work" }, - "CVE-2020-28915": { - "cmt_msg": "fbcon: Fix global-out-of-bounds read in fbcon_get_font()", - "cmt_id": "30386c13a1bfb0d1ce59ea83b825aa73bd516bc5" - } - }, - "4.14.202": { - "CVE-2020-10135": { - "cmt_msg": "Bluetooth: Consolidate encryption handling in hci_encrypt_cfm", - "cmt_id": "7c9748f455b9206b279a4710210c902cb1f275e2" + "CVE-2023-0386": { + "cmt_msg": "ovl: fail on invalid uid/gid mapping at copy up" }, - "CVE-2020-12352": { - "cmt_msg": "Bluetooth: A2MP: Fix not initializing all members", - "cmt_id": "d53b1e94d08c032754a9aabeb3df309209c00347" + "CVE-2022-42896": { + "cmt_msg": "Bluetooth: L2CAP: Fix accepting connection request for invalid SPSM" }, - "CVE-2020-12351": { - "cmt_msg": "Bluetooth: L2CAP: Fix calling sk_filter on non-socket based channel", - "cmt_id": "2acf87436517894275a804210caa33b9a08cf93c" - } - }, - "4.14.203": { - "CVE-2020-27784": { - "cmt_msg": "usb: gadget: function: printer: fix use-after-free in __lock_acquire", - "cmt_id": "d9fe88b2a38dc700bf5bd3a09c7cd11bbc248367" + "CVE-2022-42895": { + "cmt_msg": "Bluetooth: L2CAP: Fix attempting to access uninitialized memory" }, - "CVE-2020-0423": { - "cmt_msg": "binder: fix UAF when releasing todo list", - "cmt_id": "d4c49b6733c3125c3cc71617399d22f5b8ff962f" + "CVE-2022-48626": { + "cmt_msg": "moxart: fix potential use-after-free on remove path" }, - "CVE-2020-25705": { - "cmt_msg": "icmp: randomize the global rate limiter", - "cmt_id": "e1b8b57623521b7f4974476a20bd6ff971fde6c4" - } - }, - "4.14.204": { - "CVE-2020-27777": { - "cmt_msg": "powerpc/rtas: Restrict RTAS requests from userspace", - "cmt_id": "818783bf8da5c20eb75a6bcf749eb97003ea9983" + "CVE-2022-48627": { + "cmt_msg": "vt: fix memory overlapping when deleting chars in the buffer" }, - "CVE-2020-25668": { - "cmt_msg": "tty: make FONTX ioctl use the tty pointer they were actually passed", - "cmt_id": "0182d680ead968cea5673ed5dcac0e4505a75f29" + "CVE-2022-48628": { + "cmt_msg": "ceph: drop messages from MDS when unmounting" }, - "CVE-2020-25656": { - "cmt_msg": "vt: keyboard, extend func_buf_lock to readers", - "cmt_id": "7f4c966f2ad5f580fd5b1e2dcb19ba1c06a9254f" - } - }, - "4.14.205": { - "CVE-2019-0148": { - "cmt_msg": "i40e: Wrong truncation from u16 to u8", - "cmt_id": "9900bf4d433be6a2ed8c158779137c7a4742ab67" + "CVE-2024-24859": { + "cmt_msg": "" }, - "CVE-2020-35508": { - "cmt_msg": "fork: fix copy_process(CLONE_PARENT) race with the exiting ->real_parent", - "cmt_id": "ee55b8c6bf4d59c7b82079b8a7d67597bb3a5539" + "CVE-2024-24858": { + "cmt_msg": "" }, - "CVE-2019-0146": { - "cmt_msg": "i40e: add num_vectors checker in iwarp handler", - "cmt_id": "978c31f09d59cdd52cadc462f12862376e72f618" + "CVE-2024-24855": { + "cmt_msg": "scsi: lpfc: Fix a possible data race in lpfc_unregister_fcf_rescan()" }, - "CVE-2020-28974": { - "cmt_msg": "vt: Disable KD_FONT_OP_COPY", - "cmt_id": "9421bad22e9fb7f513d81ef8fec513c8a4850c0d" + "CVE-2024-24857": { + "cmt_msg": "" }, - "CVE-2019-0147": { - "cmt_msg": "i40e: add num_vectors checker in iwarp handler", - "cmt_id": "978c31f09d59cdd52cadc462f12862376e72f618" + "CVE-2019-3892": { + "cmt_msg": "coredump: fix race condition between mmget_not_zero()/get_task_mm() and core dumping" }, - "CVE-2019-19770": { - "cmt_msg": "blktrace: fix debugfs use after free", - "cmt_id": "8268f88785ca9476c68da06d1f93c3d0d9747d28" + "CVE-2021-29264": { + "cmt_msg": "gianfar: fix jumbo packets+napi+rx overrun crash" }, - "CVE-2019-0145": { - "cmt_msg": "i40e: add num_vectors checker in iwarp handler", - "cmt_id": "978c31f09d59cdd52cadc462f12862376e72f618" - } - }, - "4.14.206": { - "CVE-2020-8694": { - "cmt_msg": "powercap: restrict energy meter to root access", - "cmt_id": "bab6310b64994ee6ca679d86c90ca24111783516" - } - }, - "4.14.207": { - "CVE-2020-14351": { - "cmt_msg": "perf/core: Fix race in the perf_mmap_close() function", - "cmt_id": "30c8324e9e7ee57b58af2501cb7db5d9d4f7b69b" + "CVE-2021-29265": { + "cmt_msg": "usbip: fix stub_dev usbip_sockfd_store() races leading to gpf" }, - "CVE-2020-27673": { - "cmt_msg": "xen/events: add a proper barrier to 2-level uevent unmasking", - "cmt_id": "025ea15db5665fa14d1c48e39aa788acaf30471b" + "CVE-2022-3545": { + "cmt_msg": "nfp: fix use-after-free in area_cache_get()" }, - "CVE-2020-27675": { - "cmt_msg": "xen/events: avoid removing an event channel while handling it", - "cmt_id": "b559da71974b5eb93311f7f475b2e4b16c0f9bb3" + "CVE-2022-3542": { + "cmt_msg": "bnx2x: fix potential memory leak in bnx2x_tpa_stop()" }, - "CVE-2020-25704": { - "cmt_msg": "perf/core: Fix a memory leak in perf_event_parse_addr_filter()", - "cmt_id": "65c4000ccf7cc58a455977c5ec928525954058ac" - } - }, - "4.14.208": { - "CVE-2020-4788": { - "cmt_msg": "powerpc/64s: flush L1D on kernel entry", - "cmt_id": "db01cad9efe3c3838a6b3a3f68affd295c4b92d6" + "CVE-2021-21781": { + "cmt_msg": "ARM: ensure the signal page contains defined contents" }, - "CVE-2020-25669": { - "cmt_msg": "Input: sunkbd - avoid use-after-free in teardown paths", - "cmt_id": "436aff975718106d8e168fde69a3786962ca356e" - } - }, - "4.14.209": { - "CVE-2020-28941": { - "cmt_msg": "speakup: Do not let the line discipline be used several times", - "cmt_id": "e712cefb3699ea978611edb3c2a5d3acd57d4004" - } - }, - "4.14.210": { - "CVE-2019-19813": { - "cmt_msg": "btrfs: inode: Verify inode mode to avoid NULL pointer dereference", - "cmt_id": "3b68f5961224b7948004fd8a8e185867ecab7974" + "CVE-2023-1838": { + "cmt_msg": "Fix double fget() in vhost_net_set_backend()" }, - "CVE-2019-19816": { - "cmt_msg": "btrfs: inode: Verify inode mode to avoid NULL pointer dereference", - "cmt_id": "3b68f5961224b7948004fd8a8e185867ecab7974" - } - }, - "4.14.211": { - "CVE-2020-35519": { - "cmt_msg": "net/x25: prevent a couple of overflows", - "cmt_id": "f1fbbcb61d840792ae38bc4007160fc80c14ee90" - } - }, - "4.14.212": { - "CVE-2020-29661": { - "cmt_msg": "tty: Fix ->pgrp locking in tiocspgrp()", - "cmt_id": "882e038d2cd276163a8fc7bbeffda59ae0924471" + "CVE-2023-1382": { + "cmt_msg": "tipc: set con sock in tipc_conn_alloc" }, - "CVE-2020-29660": { - "cmt_msg": "tty: Fix ->session locking", - "cmt_id": "8deb3d9018400fab0a7401a910d3341053f5ec82" + "CVE-2018-14734": { + "cmt_msg": "infiniband: fix a possible use-after-free bug" }, - "CVE-2020-27830": { - "cmt_msg": "speakup: Reject setting the speakup line discipline outside of speakup", - "cmt_id": "bccd77063e971a006164968873f4c2918b7188e6" - } - }, - "4.14.213": { - "CVE-2020-27815": { - "cmt_msg": "jfs: Fix array index bounds check in dbAdjTree", - "cmt_id": "4a0809752ef23cd4be99b0cd8f7586c8ed7bd433" + "CVE-2021-3759": { + "cmt_msg": "memcg: enable accounting of ipc resources" }, - "CVE-2020-29568": { - "cmt_msg": "xen/xenbus: Allow watches discard events before queueing", - "cmt_id": "92d4ced9881361aefa2f7bc58dab19aa4d28ddf8" + "CVE-2021-29647": { + "cmt_msg": "net: qrtr: fix a kernel-infoleak in qrtr_recvmsg()" }, - "CVE-2020-29569": { - "cmt_msg": "xen-blkback: set ring->xenblkd to NULL after kthread_stop()", - "cmt_id": "62afce1adda51bd9d033dbec1dfe413891021bae" - } - }, - "4.14.214": { - "CVE-2020-36158": { - "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_cmd_802_11_ad_hoc_start", - "cmt_id": "d367530330f7f638eecdfc724ae276546f1b1e68" - } - }, - "4.14.215": { - "CVE-2020-28374": { - "cmt_msg": "scsi: target: Fix XCOPY NAA identifier lookup", - "cmt_id": "c842ead67ae3cac58e84e7880153e68cccd59773" + "CVE-2023-6546": { + "cmt_msg": "tty: n_gsm: fix the UAF caused by race condition in gsm_cleanup_mux" }, - "CVE-2021-39648": { - "cmt_msg": "usb: gadget: configfs: Fix use-after-free issue with udc_name", - "cmt_id": "6766064c794afeacc29b21fc09ea4dbe3cae1af3" - } - }, - "4.14.217": { - "CVE-2021-3178": { - "cmt_msg": "nfsd4: readdirplus shouldn't return parent of export", - "cmt_id": "0f60f9d1e6182d9440614c13cdf6106e2d470f89" + "CVE-2020-14390": { + "cmt_msg": "fbcon: remove soft scrollback code" }, - "CVE-2023-1390": { - "cmt_msg": "tipc: fix NULL deref in tipc_link_xmit()", - "cmt_id": "3ed0b5bb8cf71b4b9f995d4b3763648674fa032a" - } - }, - "4.14.218": { - "CVE-2020-27825": { - "cmt_msg": "tracing: Fix race in trace_open and buffer resize call", - "cmt_id": "fdb2310d58812b15f6b460509b43ff0b87e59367" + "CVE-2021-45469": { + "cmt_msg": "f2fs: fix to do sanity check on last xattr entry in __f2fs_setxattr()" }, - "CVE-2021-39657": { - "cmt_msg": "scsi: ufs: Correct the LUN used in eh_device_reset_handler() callback", - "cmt_id": "30f2a89f9481f851bc68e51a1e7114392b052231" - } - }, - "4.14.219": { - "CVE-2021-3348": { - "cmt_msg": "nbd: freeze the queue while we're adding connections", - "cmt_id": "51359110d9d9b0231dc6a60716895104c73e7770" - } - }, - "4.14.222": { - "CVE-2021-26931": { - "cmt_msg": "xen-blkback: don't \"handle\" error by BUG()", - "cmt_id": "fd8ec8c708953323feb7c6177d894d39a23b08e4" + "CVE-2024-0584": { + "cmt_msg": "ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet" }, - "CVE-2021-26930": { - "cmt_msg": "xen-blkback: fix error handling in xen_blkbk_map()", - "cmt_id": "5571633988e02a1107720544a57ab4878c4446be" + "CVE-2020-0465": { + "cmt_msg": "HID: core: Sanitize event code and type when mapping input" }, - "CVE-2021-21781": { - "cmt_msg": "ARM: ensure the signal page contains defined contents", - "cmt_id": "b71cc506778eb283b752400e234784ee86b5891c" + "CVE-2020-0466": { + "cmt_msg": "do_epoll_ctl(): clean the failure exits up a bit" }, - "CVE-2021-26932": { - "cmt_msg": "Xen/x86: don't bail early from clear_foreign_p2m_mapping()", - "cmt_id": "da2e2a5c88abfe0974b4b8575c798fcafb552fc9" - } - }, - "4.14.223": { - "CVE-2021-0512": { - "cmt_msg": "HID: make arrays usage and value to be the same", - "cmt_id": "00022873fdc1a304fd89016d227e3781f413dfbd" + "CVE-2024-0340": { + "cmt_msg": "vhost: use kzalloc() instead of kmalloc() followed by memset()" }, - "CVE-2021-3612": { - "cmt_msg": "Input: joydev - prevent potential read overflow in ioctl", - "cmt_id": "d4b7440883871cbcaf6c1cd95a76048a86b005c7" - } - }, - "4.14.224": { - "CVE-2021-30002": { - "cmt_msg": "media: v4l: ioctl: Fix memory leak in video_usercopy", - "cmt_id": "d4daa80676bfa53359ae31e601105cbdefaf2554" + "CVE-2019-19523": { + "cmt_msg": "USB: adutux: fix use-after-free on disconnect" + }, + "CVE-2019-11135": { + "cmt_msg": "x86/msr: Add the IA32_TSX_CTRL MSR" }, "CVE-2021-27365": { - "cmt_msg": "scsi: iscsi: Ensure sysfs attributes are limited to PAGE_SIZE", - "cmt_id": "1a588b51ff984aadc027078125064807c5c7bc3f" + "cmt_msg": "scsi: iscsi: Ensure sysfs attributes are limited to PAGE_SIZE" }, "CVE-2021-27364": { - "cmt_msg": "scsi: iscsi: Restrict sessions and handles to admin capabilities", - "cmt_id": "6c6711c1a0cd2675f9c537c96bd70ecdd84c5d3e" + "cmt_msg": "scsi: iscsi: Restrict sessions and handles to admin capabilities" }, "CVE-2021-27363": { - "cmt_msg": "scsi: iscsi: Restrict sessions and handles to admin capabilities", - "cmt_id": "6c6711c1a0cd2675f9c537c96bd70ecdd84c5d3e" + "cmt_msg": "scsi: iscsi: Restrict sessions and handles to admin capabilities" }, - "CVE-2021-28038": { - "cmt_msg": "Xen/gnttab: handle p2m update errors on a per-slot basis", - "cmt_id": "893a88ea0ee11a1f5e2279cad3c0ed7736187288" - } - }, - "4.14.226": { - "CVE-2019-19060": { - "cmt_msg": "iio: imu: adis16400: release allocated memory on failure", - "cmt_id": "593b7ff46bc064f2acac9ed6b7baa3189d2bcd90" + "CVE-2021-20322": { + "cmt_msg": "ipv6: make exception cache less predictible" }, - "CVE-2021-33033": { - "cmt_msg": "cipso,calipso: resolve a number of problems with the DOI refcounts", - "cmt_id": "ab44f7317c16ddcf9ee12ba2aca60771266c2dc6" + "CVE-2021-20320": { + "cmt_msg": "s390/bpf: Fix optimizing out zero-extensions" }, - "CVE-2021-29265": { - "cmt_msg": "usbip: fix stub_dev usbip_sockfd_store() races leading to gpf", - "cmt_id": "04f879ba79b056041972122c1dc597b79d2464e5" + "CVE-2021-20321": { + "cmt_msg": "ovl: fix missing negative dentry check in ovl_rename()" }, - "CVE-2021-28660": { - "cmt_msg": "staging: rtl8188eu: prevent ->ssid overflow in rtw_wx_set_scan()", - "cmt_id": "33cdc63f0e07abf637ba326b6016731be958088d" - } - }, - "4.14.227": { - "CVE-2021-28964": { - "cmt_msg": "btrfs: fix race when cloning extent buffer during rewind of an old root", - "cmt_id": "0fbf41006d8c850963049c35563e7775fe7c2164" + "CVE-2022-3169": { + "cmt_msg": "nvme: ensure subsystem reset is single threaded" }, - "CVE-2021-28972": { - "cmt_msg": "PCI: rpadlpar: Fix potential drc_name corruption in store functions", - "cmt_id": "6d7724c9c507d5b526991dcdef861c6b28c45eb2" + "CVE-2018-20976": { + "cmt_msg": "xfs: clear sb->s_fs_info on mount failure" }, - "CVE-2021-28971": { - "cmt_msg": "perf/x86/intel: Fix a crash caused by zero PEBS status", - "cmt_id": "403fdabcc1bcd0d31f9fcb9b9b2e831214ab2192" - } - }, - "4.14.228": { - "CVE-2021-28688": { - "cmt_msg": "xen-blkback: don't leak persistent grants from xen_blkbk_map()", - "cmt_id": "db108b67d81397cdbaf3f91aeca6e5eb5f71de1d" + "CVE-2023-22995": { + "cmt_msg": "usb: dwc3: dwc3-qcom: Add missing platform_device_put() in dwc3_qcom_acpi_register_core" }, - "CVE-2021-29647": { - "cmt_msg": "net: qrtr: fix a kernel-infoleak in qrtr_recvmsg()", - "cmt_id": "749d2e33bfbacb3112cbfaafde75e507cb46c67d" + "CVE-2021-3542": { + "cmt_msg": "" }, - "CVE-2021-31916": { - "cmt_msg": "dm ioctl: fix out of bounds array access when no devices", - "cmt_id": "ba73e621ced58ff4ad1020a140ccb5843da1cb26" - } - }, - "4.14.229": { - "CVE-2021-0941": { - "cmt_msg": "bpf: Remove MTU check in __bpf_skb_max_len", - "cmt_id": "64cf6c3156a5cbd9c29f54370b801b336d2f7894" + "CVE-2018-12929": { + "cmt_msg": "" }, - "CVE-2021-3483": { - "cmt_msg": "firewire: nosy: Fix a use-after-free bug in nosy_ioctl()", - "cmt_id": "8aa6e548a5ee59c91e9e5d67fd6de5cbaa5c458a" - } - }, - "4.14.230": { - "CVE-2021-29154": { - "cmt_msg": "bpf, x86: Validate computation of branch displacements for x86-64", - "cmt_id": "32f9a870ab6b1f72f100e9db55b8a022072f78a6" - } - }, - "4.14.231": { - "CVE-2021-3659": { - "cmt_msg": "net: mac802154: Fix general protection fault", - "cmt_id": "d103fd20f0539e2bd615ed6f6159537cb7e2c5ba" + "CVE-2018-12928": { + "cmt_msg": "" }, - "CVE-2021-0937": { - "cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write", - "cmt_id": "522a0191944e3db9c30ade5fa6b6ec0d7c42f40d" + "CVE-2020-36310": { + "cmt_msg": "KVM: SVM: avoid infinite loop on NPF from bad address" }, - "CVE-2020-25672": { - "cmt_msg": "nfc: fix memory leak in llcp_sock_connect()", - "cmt_id": "02b99cae71335f9f38d0a164ffe3a7a1328f44fc" + "CVE-2020-36313": { + "cmt_msg": "KVM: Fix out of range accesses to memslots" }, - "CVE-2020-25673": { - "cmt_msg": "nfc: Avoid endless loops caused by repeated llcp_sock_connect()", - "cmt_id": "892e1f065c1b3c99a12a1a41683f9ddbc22abb3e" + "CVE-2020-35519": { + "cmt_msg": "net/x25: prevent a couple of overflows" }, - "CVE-2020-25670": { - "cmt_msg": "nfc: fix refcount leak in llcp_sock_bind()", - "cmt_id": "538a6ff11516d38a61e237d2d2dc04c30c845fbe" + "CVE-2020-10708": { + "cmt_msg": "" }, - "CVE-2020-25671": { - "cmt_msg": "nfc: fix refcount leak in llcp_sock_connect()", - "cmt_id": "b1d5c07a3b597766bbf5bf61083cd65e72034144" + "CVE-2022-21499": { + "cmt_msg": "lockdown: also lock down previous kgdb use" }, - "CVE-2021-22555": { - "cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write", - "cmt_id": "522a0191944e3db9c30ade5fa6b6ec0d7c42f40d" - } - }, - "4.14.232": { - "CVE-2020-29374": { - "cmt_msg": "gup: document and work around \"COW can break either way\" issue", - "cmt_id": "407faed92b4a4e2ad900d61ea3831dd597640f29" + "CVE-2023-20593": { + "cmt_msg": "x86/cpu/amd: Add a Zenbleed fix" }, - "CVE-2021-23133": { - "cmt_msg": "net/sctp: fix race condition in sctp_destroy_sock", - "cmt_id": "54b63c76b9bb95fba20cd268086ee448f87208c6" - } - }, - "4.14.233": { - "CVE-2021-4157": { - "cmt_msg": "pNFS/flexfiles: fix incorrect size check in decode_nfs_fh()", - "cmt_id": "40286f0852d2ecfa713438199557c706dc6a8db3" + "CVE-2022-2380": { + "cmt_msg": "video: fbdev: sm712fb: Fix crash in smtcfb_read()" }, - "CVE-2021-33034": { - "cmt_msg": "Bluetooth: verify AMP hci_chan before amp_destroy", - "cmt_id": "21f6aee6682a1f7415e23f96ce94ff387d9cdb2e" + "CVE-2022-0850": { + "cmt_msg": "ext4: fix kernel infoleak via ext4_extent_header" }, - "CVE-2021-32399": { - "cmt_msg": "bluetooth: eliminate the potential race condition when removing the HCI controller", - "cmt_id": "40acc1aa3e2a705a3c2ed171ed563ef04f7ba19e" - } - }, - "4.14.234": { - "CVE-2020-26558": { - "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical", - "cmt_id": "4555cee33f7d75c1ee69902c872c9d1e9568ebd5" + "CVE-2019-19447": { + "cmt_msg": "ext4: work around deleting a file with i_nlink == 0 safely" }, - "CVE-2021-0129": { - "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical", - "cmt_id": "4555cee33f7d75c1ee69902c872c9d1e9568ebd5" + "CVE-2021-3612": { + "cmt_msg": "Input: joydev - prevent potential read overflow in ioctl" }, - "CVE-2020-26555": { - "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical", - "cmt_id": "4555cee33f7d75c1ee69902c872c9d1e9568ebd5" - } - }, - "4.14.235": { - "CVE-2021-33098": { - "cmt_msg": "ixgbe: fix large MTU request from VF", - "cmt_id": "5217f9cab7dd28e9c7626cd795e51da98ecb2af4" + "CVE-2019-19448": { + "cmt_msg": "btrfs: only search for left_info if there is no right_info in try_merge_free_space" }, - "CVE-2020-24587": { - "cmt_msg": "mac80211: prevent mixed key and fragment cache attacks", - "cmt_id": "f643397142c196d3ac653b2df32997dad991cb29" + "CVE-2019-19449": { + "cmt_msg": "f2fs: fix to do sanity check on segment/section count" }, - "CVE-2020-24586": { - "cmt_msg": "mac80211: prevent mixed key and fragment cache attacks", - "cmt_id": "f643397142c196d3ac653b2df32997dad991cb29" + "CVE-2020-11725": { + "cmt_msg": "" }, - "CVE-2021-34981": { - "cmt_msg": "Bluetooth: cmtp: fix file refcount when cmtp_attach_device fails", - "cmt_id": "6f6ac2a7959b1864886d07fcf3b9cec587dfe635" + "CVE-2023-30456": { + "cmt_msg": "KVM: nVMX: add missing consistency checks for CR0 and CR4" }, - "CVE-2020-24588": { - "cmt_msg": "cfg80211: mitigate A-MSDU aggregation attacks", - "cmt_id": "a3558e1b75fefb2299659ee0070ee917927d9220" + "CVE-2021-35477": { + "cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4" }, - "CVE-2020-26139": { - "cmt_msg": "mac80211: do not accept/forward invalid EAPOL frames", - "cmt_id": "557bb37533a365f9d8a0093ecce29417da4b9228" + "CVE-2022-23041": { + "cmt_msg": "xen/9p: use alloc/free_pages_exact()" }, - "CVE-2020-26147": { - "cmt_msg": "mac80211: assure all fragments are encrypted", - "cmt_id": "c39f180c7bd8379de238a4fd4a2f7515e03802f8" + "CVE-2024-26758": { + "cmt_msg": "md: Don't ignore suspended array in md_check_recovery()" }, - "CVE-2021-29650": { - "cmt_msg": "netfilter: x_tables: Use correct memory barriers.", - "cmt_id": "f1fd7a174018f1107881150c6c2ce00e49a1e643" - } - }, - "4.14.236": { - "CVE-2021-3564": { - "cmt_msg": "Bluetooth: fix the erroneous flush_work() order", - "cmt_id": "fa7d2874963312030d9618541b9bc2e549e19ac1" + "CVE-2024-26759": { + "cmt_msg": "mm/swap: fix race when skipping swapcache" }, - "CVE-2021-38208": { - "cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect", - "cmt_id": "ffff05b9ee5c74c04bba2801c1f99b31975d74d9" + "CVE-2022-1729": { + "cmt_msg": "perf: Fix sys_perf_event_open() race against self" }, - "CVE-2021-3573": { - "cmt_msg": "Bluetooth: use correct lock to prevent UAF of hdev object", - "cmt_id": "88481ea480756644b5221648216bb67866e51391" + "CVE-2024-26751": { + "cmt_msg": "ARM: ep93xx: Add terminator to gpiod_lookup_table" }, - "CVE-2021-3587": { - "cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect", - "cmt_id": "ffff05b9ee5c74c04bba2801c1f99b31975d74d9" - } - }, - "4.14.238": { - "CVE-2021-34693": { - "cmt_msg": "can: bcm: fix infoleak in struct bcm_msg_head", - "cmt_id": "4fa028860bb1656f370851c2c26de15fc67da300" + "CVE-2024-26752": { + "cmt_msg": "l2tp: pass correct message length to ip6_append_data" }, - "CVE-2021-45486": { - "cmt_msg": "inet: use bigger hash table for IP ID generation", - "cmt_id": "3ba51ed2c3ac36aa947d0b250d318de6ed7cf552" - } - }, - "4.14.240": { - "CVE-2021-45485": { - "cmt_msg": "ipv6: use prandom_u32() for ID generation", - "cmt_id": "4b55d7b3106a410cdab4ea60f5e55ca0668c6a09" + "CVE-2024-26754": { + "cmt_msg": "gtp: fix use-after-free and null-ptr-deref in gtp_genl_dump_pdp()" }, - "CVE-2021-3655": { - "cmt_msg": "sctp: validate from_addr_param return", - "cmt_id": "f01bfaea62d14938ff2fbeaf67f0afec2ec64ab9" + "CVE-2024-26756": { + "cmt_msg": "md: Don't register sync_thread for reshape directly" }, - "CVE-2023-28772": { - "cmt_msg": "seq_buf: Fix overflow in seq_buf_putmem_hex()", - "cmt_id": "50b51460f59acbd403475510ad423bb5ea7a4c97" + "CVE-2024-26757": { + "cmt_msg": "md: Don't ignore read-only array in md_check_recovery()" }, - "CVE-2021-3609": { - "cmt_msg": "can: bcm: delay release of struct bcm_op after synchronize_rcu()", - "cmt_id": "630f13442f1472abe5013ef98f76a3bbca64dd80" + "CVE-2021-28038": { + "cmt_msg": "Xen/gnttab: handle p2m update errors on a per-slot basis" }, - "CVE-2022-0850": { - "cmt_msg": "ext4: fix kernel infoleak via ext4_extent_header", - "cmt_id": "29d882f9a6a6219a1c59729e1f43fa40663903e4" + "CVE-2022-2964": { + "cmt_msg": "net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup" }, - "CVE-2021-33909": { - "cmt_msg": "seq_file: disallow extremely large seq buffer allocations", - "cmt_id": "3c07d1335d17ae0411101024de438dbc3734e992" + "CVE-2024-26689": { + "cmt_msg": "ceph: prevent use-after-free in encode_cap_msg()" }, - "CVE-2021-38160": { - "cmt_msg": "virtio_console: Assure used length from device is limited", - "cmt_id": "56cf748562d3cbfd33d1ba2eb4a7603a5e20da88" - } - }, - "4.14.241": { - "CVE-2021-38204": { - "cmt_msg": "usb: max-3421: Prevent corruption of freed memory", - "cmt_id": "edddc79c4391f8001095320d3ca423214b9aa4bf" + "CVE-2022-2961": { + "cmt_msg": "" }, - "CVE-2021-3679": { - "cmt_msg": "tracing: Fix bug in rb_per_cpu_empty() that might cause deadloop.", - "cmt_id": "76598512d5d7fc407c319ca4448cf5348b65058a" + "CVE-2024-26686": { + "cmt_msg": "fs/proc: do_task_stat: use sig->stats_lock to gather the threads/children stats" }, - "CVE-2021-37576": { - "cmt_msg": "KVM: PPC: Book3S: Fix H_RTAS rets buffer overflow", - "cmt_id": "b67a821813c7b8160b54d83928281fec84a42d88" - } - }, - "4.14.242": { - "CVE-2021-0920": { - "cmt_msg": "af_unix: fix garbage collect vs MSG_PEEK", - "cmt_id": "af3e2b87b36100c28feb71da52c57293c4540690" - } - }, - "4.14.243": { - "CVE-2021-22543": { - "cmt_msg": "KVM: do not allow mapping valid but non-reference-counted pages", - "cmt_id": "46d75ff2c1beebe90e7af8887256d8f0323679e4" - } - }, - "4.14.244": { - "CVE-2021-38205": { - "cmt_msg": "net: xilinx_emaclite: Do not print real IOMEM pointer", - "cmt_id": "1994eacac7af52da86e4b0cb6ae61621bef7393f" + "CVE-2024-26687": { + "cmt_msg": "xen/events: close evtchn after mapping cleanup" }, - "CVE-2021-3732": { - "cmt_msg": "ovl: prevent private clone if bind mount is not allowed", - "cmt_id": "517b875dfbf58f0c6c9e32dc90f5cf42d71a42ce" - } - }, - "4.14.245": { - "CVE-2021-42008": { - "cmt_msg": "net: 6pack: fix slab-out-of-bounds in decode_data", - "cmt_id": "5e0e782874ad03ae6d47d3e55aff378da0b51104" + "CVE-2023-3268": { + "cmt_msg": "relayfs: fix out-of-bounds access in relay_file_read" }, - "CVE-2021-3653": { - "cmt_msg": "KVM: nSVM: avoid picking up unsupported bits from L2 in int_ctl (CVE-2021-3653)", - "cmt_id": "26af47bdc45e454877f15fa7658a167bb9799681" + "CVE-2023-45871": { + "cmt_msg": "igb: set max size RX buffer when store bad packet is enabled" }, - "CVE-2021-3656": { - "cmt_msg": "KVM: nSVM: always intercept VMLOAD/VMSAVE when nested (CVE-2021-3656)", - "cmt_id": "6ed198381ed2496fbc82214108e56a441d3b0213" + "CVE-2020-12114": { + "cmt_msg": "make struct mountpoint bear the dentry reference to mountpoint, not struct mount" }, - "CVE-2020-3702": { - "cmt_msg": "ath: Use safer key clearing with key cache entries", - "cmt_id": "2cbb22fd4b4fb4d0822d185bf5bd6d027107bfda" - } - }, - "4.14.246": { - "CVE-2021-38198": { - "cmt_msg": "KVM: X86: MMU: Use the correct inherited permissions to get shadow page", - "cmt_id": "cea9e8ee3b8059bd2b36d68f1f428d165e5d13ce" + "CVE-2021-4218": { + "cmt_msg": "sysctl: pass kernel pointers to ->proc_handler" }, - "CVE-2021-39633": { - "cmt_msg": "ip_gre: add validation for csum_start", - "cmt_id": "99279223a37b46dc7716ec4e0ed4b3e03f1cfa4c" + "CVE-2023-0266": { + "cmt_msg": "ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF" }, - "CVE-2021-3753": { - "cmt_msg": "vt_kdsetmode: extend console locking", - "cmt_id": "3f488313d96fc6512a4a0fe3ed56cce92cbeec94" - } - }, - "4.14.247": { - "CVE-2022-20141": { - "cmt_msg": "igmp: Add ip_mc_list lock in ip_check_mc_rcu", - "cmt_id": "78967749984cf3614de346c90f3e259ff8272735" + "CVE-2019-10142": { + "cmt_msg": "drivers/virt/fsl_hypervisor.c: prevent integer overflow in ioctl" }, - "CVE-2021-42252": { - "cmt_msg": "soc: aspeed: lpc-ctrl: Fix boundary check for mmap", - "cmt_id": "b1b55e4073d3da6119ecc41636a2994b67a2be37" + "CVE-2023-52640": { + "cmt_msg": "fs/ntfs3: Fix oob in ntfs_listxattr" }, - "CVE-2021-40490": { - "cmt_msg": "ext4: fix race writing to an inline_data file while its xattrs are changing", - "cmt_id": "9569234645f102025aaf0fc83d3dcbf1b8cbf2dc" - } - }, - "4.14.248": { - "CVE-2021-20320": { - "cmt_msg": "s390/bpf: Fix optimizing out zero-extensions", - "cmt_id": "daf48f68fca9040b542282a5cd17397af316dd89" - } - }, - "4.14.249": { - "CVE-2021-3764": { - "cmt_msg": "crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd()", - "cmt_id": "3707e37b3fcef4d5e9a81b9c2c48ba7248051c2a" + "CVE-2023-52641": { + "cmt_msg": "fs/ntfs3: Add NULL ptr dereference checking at the end of attr_allocate_frame()" }, - "CVE-2021-4203": { - "cmt_msg": "af_unix: fix races in sk_peer_pid and sk_peer_cred accesses", - "cmt_id": "9d76f723256d68eea16f0c563fc80b3c14258634" + "CVE-2021-0399": { + "cmt_msg": "" }, - "CVE-2021-3744": { - "cmt_msg": "crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd()", - "cmt_id": "3707e37b3fcef4d5e9a81b9c2c48ba7248051c2a" + "CVE-2023-52488": { + "cmt_msg": "serial: sc16is7xx: convert from _raw_ to _noinc_ regmap functions for FIFO" }, - "CVE-2021-37159": { - "cmt_msg": "usb: hso: fix error handling code of hso_create_net_device", - "cmt_id": "4c0db9c4b3701c29f47bac0721e2f7d2b15d8edb" - } - }, - "4.14.250": { - "CVE-2021-20317": { - "cmt_msg": "lib/timerqueue: Rely on rbtree semantics for next timer", - "cmt_id": "0135fcb86a0bc9e4484f7e1228cadcc343c5edef" - } - }, - "4.14.251": { - "CVE-2021-20321": { - "cmt_msg": "ovl: fix missing negative dentry check in ovl_rename()", - "cmt_id": "1caaa820915d802328bc72e4de0d5b1629eab5da" + "CVE-2023-52489": { + "cmt_msg": "mm/sparsemem: fix race in accessing memory_section->usage" }, - "CVE-2021-41864": { - "cmt_msg": "bpf: Fix integer overflow in prealloc_elems_and_freelist()", - "cmt_id": "f34bcd10c4832d491049905d25ea3f46a410c426" + "CVE-2023-52484": { + "cmt_msg": "iommu/arm-smmu-v3: Fix soft lockup triggered by arm_smmu_mm_invalidate_range" }, - "CVE-2021-38300": { - "cmt_msg": "bpf, mips: Validate conditional branch offsets", - "cmt_id": "3401bca8827ba4918b3d582bd2c27708d4b133fe" - } - }, - "4.14.252": { - "CVE-2021-3894": { - "cmt_msg": "sctp: account stream padding length for reconf chunk", - "cmt_id": "41f0bcc7d9eac315259d4e9fb441552f60e8ec9e" + "CVE-2020-2732": { + "cmt_msg": "KVM: nVMX: Don't emulate instructions in guest mode" }, - "CVE-2022-0322": { - "cmt_msg": "sctp: account stream padding length for reconf chunk", - "cmt_id": "41f0bcc7d9eac315259d4e9fb441552f60e8ec9e" - } - }, - "4.14.253": { - "CVE-2021-3896": { - "cmt_msg": "isdn: cpai: check ctr->cnr to avoid array index out of bound", - "cmt_id": "9b6b2db77bc3121fe435f1d4b56e34de443bec75" + "CVE-2023-52486": { + "cmt_msg": "drm: Don't unref the same fb many times by mistake due to deadlock handling" }, - "CVE-2022-0644": { - "cmt_msg": "vfs: check fd has read access in kernel_read_file_from_fd()", - "cmt_id": "aaa5e83805b09c7ed24c06227321575278e3de1d" + "CVE-2023-52480": { + "cmt_msg": "ksmbd: fix race condition between session lookup and expire" }, - "CVE-2021-3760": { - "cmt_msg": "nfc: nci: fix the UAF of rf_conn_info object", - "cmt_id": "a2efe3df65359add2164740a5777c26e64dd594b" + "CVE-2023-52481": { + "cmt_msg": "arm64: errata: Add Cortex-A520 speculative unprivileged load workaround" }, - "CVE-2021-43389": { - "cmt_msg": "isdn: cpai: check ctr->cnr to avoid array index out of bound", - "cmt_id": "9b6b2db77bc3121fe435f1d4b56e34de443bec75" - } - }, - "4.14.254": { - "CVE-2021-3772": { - "cmt_msg": "sctp: use init_tag from inithdr for ABORT chunk", - "cmt_id": "82ad781d98040b4a5eea4eeb9a5acdd200a420c6" - } - }, - "4.14.255": { - "CVE-2021-42739": { - "cmt_msg": "media: firewire: firedtv-avc: fix a buffer overflow in avc_ca_pmt()", - "cmt_id": "8d6c05da808f8351db844b69a9d6ce7f295214bb" - } - }, - "4.14.256": { - "CVE-2021-4202": { - "cmt_msg": "NFC: reorganize the functions in nci_request", - "cmt_id": "6e2944d8bbc58682691438b57620491b5a4b7cfb" + "CVE-2023-52482": { + "cmt_msg": "x86/srso: Add SRSO mitigation for Hygon processors" }, - "CVE-2021-39686": { - "cmt_msg": "binder: use euid from cred instead of using task", - "cmt_id": "8989da231b3b989e48d885d61345fe290114b648" + "CVE-2023-4128": { + "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free" }, - "CVE-2023-0047": { - "cmt_msg": "mm, oom: do not trigger out_of_memory from the #PF", - "cmt_id": "bed55513692e0dc720f02ad7da3e528c55e0b663" + "CVE-2023-3609": { + "cmt_msg": "net/sched: cls_u32: Fix reference counter leak leading to overflow" }, - "CVE-2021-3640": { - "cmt_msg": "Bluetooth: sco: Fix lock_sock() blockage by memcpy_from_msg()", - "cmt_id": "3eb50acbc96c9de3d8a056982938ece9bd1c2b91" + "CVE-2021-47128": { + "cmt_msg": "bpf, lockdown, audit: Fix buggy SELinux lockdown permission checks" }, - "CVE-2021-45868": { - "cmt_msg": "quota: check block number when reading the block in quota file", - "cmt_id": "1d0606dc3e27e6c281a2684cb8bdf47134051114" + "CVE-2018-17182": { + "cmt_msg": "mm: get rid of vmacache_flush_all() entirely" }, - "CVE-2021-3752": { - "cmt_msg": "Bluetooth: fix use-after-free error in lock_sock_nested()", - "cmt_id": "cd76d797a690969186c0c100e8a301c4480e4e7f" - } - }, - "4.14.257": { - "CVE-2021-4002": { - "cmt_msg": "hugetlbfs: flush TLBs correctly after huge_pmd_unshare", - "cmt_id": "7bf1f5cb5150b1a53f6ccaadc0bc77f8f33206c8" + "CVE-2021-47122": { + "cmt_msg": "net: caif: fix memory leak in caif_device_notify" }, - "CVE-2021-4083": { - "cmt_msg": "fget: check that the fd still exists after getting a ref to it", - "cmt_id": "98548c3a9882a1ea993a103be7c1b499f3b88202" - } - }, - "4.14.258": { - "CVE-2022-20132": { - "cmt_msg": "HID: add hid_is_usb() function to make it simpler for USB detection", - "cmt_id": "43cc4686b15d7d3a2b65b125393ea3f3d477e7d1" + "CVE-2021-47121": { + "cmt_msg": "net: caif: fix memory leak in cfusbl_device_notify" }, - "CVE-2021-39698": { - "cmt_msg": "wait: add wake_up_pollfree()", - "cmt_id": "a36e1978c6cb6282fadd5d62d4b3e7808cf0597b" + "CVE-2021-47125": { + "cmt_msg": "sch_htb: fix refcount leak in htb_parent_to_leaf_offload" }, - "CVE-2021-39685": { - "cmt_msg": "USB: gadget: detect too-big endpoint 0 requests", - "cmt_id": "e7c8afee149134b438df153b09af7fd928a8bc24" - } - }, - "4.14.259": { - "CVE-2021-39711": { - "cmt_msg": "bpf: fix panic due to oob in bpf_prog_test_run_skb", - "cmt_id": "20fdf274472998123a8d173ba4cb6282ff6b63bd" + "CVE-2021-47124": { + "cmt_msg": "io_uring: fix link timeout refs" }, - "CVE-2021-28715": { - "cmt_msg": "xen/netback: don't queue unlimited number of packages", - "cmt_id": "9bebb2eedf679b3be4acaa20efda97f32c999d74" + "CVE-2019-15118": { + "cmt_msg": "ALSA: usb-audio: Fix a stack buffer overflow bug in check_input_term" }, - "CVE-2021-28714": { - "cmt_msg": "xen/netback: fix rx queue stall detection", - "cmt_id": "eae85b8c6e17d3e3888d9159205390e8dbcff6a8" + "CVE-2019-12818": { + "cmt_msg": "net: nfc: Fix NULL dereference on nfc_llcp_build_tlv fails" }, - "CVE-2021-28713": { - "cmt_msg": "xen/console: harden hvc_xen against event channel storms", - "cmt_id": "68b78f976ca47d52c03c41eded207a312e46b934" + "CVE-2019-12819": { + "cmt_msg": "mdio_bus: Fix use-after-free on device_register fails" }, - "CVE-2021-28712": { - "cmt_msg": "xen/netfront: harden netfront against event channel storms", - "cmt_id": "4bf81386e3d6e5083c93d51eff70260bcec091bb" + "CVE-2023-0394": { + "cmt_msg": "ipv6: raw: Deduct extension header length in rawv6_push_pending_frames" }, - "CVE-2021-28711": { - "cmt_msg": "xen/blkfront: harden blkfront against event channel storms", - "cmt_id": "5ac3b68b79c9e964dd6f3cf80ff825518e502b79" - } - }, - "4.14.260": { - "CVE-2021-45469": { - "cmt_msg": "f2fs: fix to do sanity check on last xattr entry in __f2fs_setxattr()", - "cmt_id": "88dedecc24763c2e0bc1e8eeb35f9f2cd785a7e5" + "CVE-2019-19332": { + "cmt_msg": "KVM: x86: fix out-of-bounds write in KVM_GET_EMULATED_CPUID (CVE-2019-19332)" }, - "CVE-2022-1195": { - "cmt_msg": "hamradio: improve the incomplete fix to avoid NPD", - "cmt_id": "a7b0ae2cc486fcb601f9f9d87d98138cc7b7f7f9" - } - }, - "4.14.261": { - "CVE-2021-44733": { - "cmt_msg": "tee: handle lookup of shm with reference count 0", - "cmt_id": "3d556a28bbfe34a80b014db49908b0f1bcb1ae80" + "CVE-2019-15117": { + "cmt_msg": "ALSA: usb-audio: Fix an OOB bug in parse_audio_mixer_unit" }, - "CVE-2022-20154": { - "cmt_msg": "sctp: use call_rcu to free endpoint", - "cmt_id": "8873140f95d4977bf37e4cf0d5c5e3f6e34cdd3e" - } - }, - "4.14.262": { - "CVE-2021-45095": { - "cmt_msg": "phonet: refcount leak in pep_sock_accep", - "cmt_id": "a025db5658d5c10019ffed0d59026da8172897b6" + "CVE-2022-25258": { + "cmt_msg": "USB: gadget: validate interface OS descriptor requests" }, - "CVE-2021-4155": { - "cmt_msg": "xfs: map unwritten blocks in XFS_IOC_{ALLOC,FREE}SP just like fallocate", - "cmt_id": "2af625c89bf4a41c8a0bc818d8cf30a291f216ca" + "CVE-2020-3702": { + "cmt_msg": "ath: Use safer key clearing with key cache entries" }, - "CVE-2021-3923": { - "cmt_msg": "RDMA/core: Don't infoleak GRH fields", - "cmt_id": "50ef6d3c9a4b965cf301c6133e2c6ed5ece2146a" - } - }, - "4.14.263": { - "CVE-2021-29264": { - "cmt_msg": "gianfar: fix jumbo packets+napi+rx overrun crash", - "cmt_id": "93e83b226a16bcc800013c6e02c98eef7ba9868c" + "CVE-2023-0461": { + "cmt_msg": "net/ulp: prevent ULP without clone op from entering the LISTEN status" }, - "CVE-2020-36322": { - "cmt_msg": "fuse: fix bad inode", - "cmt_id": "2cd45139c0f28ebfa7604866faee00c99231a62b" + "CVE-2023-3117": { + "cmt_msg": "netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE" }, - "CVE-2021-20292": { - "cmt_msg": "drm/ttm/nouveau: don't call tt destroy callback on alloc failure.", - "cmt_id": "4a2cec066dc8d099d30c649ae7ed26771029e0b5" + "CVE-2018-10322": { + "cmt_msg": "xfs: enhance dinode verifier" }, - "CVE-2021-43976": { - "cmt_msg": "mwifiex: Fix skb_over_panic in mwifiex_usb_recv()", - "cmt_id": "8c9261b84c9b90d130d97fc7d13727706253af87" + "CVE-2023-3111": { + "cmt_msg": "btrfs: unset reloc control if transaction commit fails in prepare_to_relocate()" }, - "CVE-2021-38199": { - "cmt_msg": "NFSv4: Initialise connection to the server in nfs4_alloc_client()", - "cmt_id": "d5e6dff8c92943a2719fa5415cc3d333e57d5d90" - } - }, - "4.14.264": { - "CVE-2022-0330": { - "cmt_msg": "drm/i915: Flush TLBs before releasing backing store", - "cmt_id": "eed39c1918f1803948d736c444bfacba2a482ad0" + "CVE-2024-24860": { + "cmt_msg": "Bluetooth: Fix atomicity violation in {min,max}_key_size_set" }, - "CVE-2022-22942": { - "cmt_msg": "drm/vmwgfx: Fix stale file descriptors on failed usercopy", - "cmt_id": "e8d092a62449dcfc73517ca43963d2b8f44d0516" - } - }, - "4.14.265": { - "CVE-2022-24448": { - "cmt_msg": "NFSv4: Handle case where the lookup of a directory fails", - "cmt_id": "516f348b759f6a92819820a3f56d678458e22cc8" + "CVE-2024-24861": { + "cmt_msg": "media: xc4000: Fix atomicity violation in xc4000_get_frequency" }, - "CVE-2020-36516": { - "cmt_msg": "ipv4: avoid using shared IP generator for connected sockets", - "cmt_id": "853f58791145b6d7e6d2b6ff2a982119e920e21a" + "CVE-2024-24864": { + "cmt_msg": "" }, - "CVE-2018-25020": { - "cmt_msg": "bpf: fix truncated jump targets on heavy expansions", - "cmt_id": "6824208b59a4727b8a8653f83d8e685584d04606" + "CVE-2021-47013": { + "cmt_msg": "net:emac/emac-mac: Fix a use after free in emac_mac_tx_buf_send" }, - "CVE-2022-0617": { - "cmt_msg": "udf: Fix NULL ptr deref when converting from inline format", - "cmt_id": "a312cbdb9045a52e5c1fec4ac7b86895f508dc76" - } - }, - "4.14.266": { - "CVE-2022-0492": { - "cmt_msg": "cgroup-v1: Require capabilities to set release_agent", - "cmt_id": "b391bb3554dd6e04b7a8ede975dbd3342526a045" + "CVE-2021-47010": { + "cmt_msg": "net: Only allow init netns to set default tcp cong to a restricted algo" }, - "CVE-2022-0435": { - "cmt_msg": "tipc: improve size validations for received domain records", - "cmt_id": "fde4ddeadd099bf9fbb9ccbee8e1b5c20d530a2d" + "CVE-2022-36946": { + "cmt_msg": "netfilter: nf_queue: do not allow packet truncation below transport header offset" }, - "CVE-2022-0487": { - "cmt_msg": "moxart: fix potential use-after-free on remove path", - "cmt_id": "e6f580d0b3349646d4ee1ce0057eb273e8fb7e2e" - } - }, - "4.14.267": { - "CVE-2022-25375": { - "cmt_msg": "usb: gadget: rndis: check size of RNDIS_MSG_SET command", - "cmt_id": "4c22fbcef778badb00fb8bb9f409daa29811c175" + "CVE-2018-19824": { + "cmt_msg": "ALSA: usb-audio: Fix UAF decrement if card has no live interfaces in card.c" }, - "CVE-2022-25258": { - "cmt_msg": "USB: gadget: validate interface OS descriptor requests", - "cmt_id": "c7ad83d561df15ac6043d3b0d783aee777cf1731" - } - }, - "4.14.268": { - "CVE-2022-2964": { - "cmt_msg": "net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup", - "cmt_id": "63f0cfb36c1f1964a59ce544156677601e2d8740" - } - }, - "4.14.269": { - "CVE-2022-27223": { - "cmt_msg": "USB: gadget: validate endpoint index for xilinx udc", - "cmt_id": "fdc22192d49fa577d8397b39f8ef8141cb1d62aa" + "CVE-2022-21166": { + "cmt_msg": "x86/speculation/mmio: Enable CPU Fill buffer clearing on idle" }, - "CVE-2022-26966": { - "cmt_msg": "sr9700: sanity check for packet length", - "cmt_id": "fbc3c962b6eb42b1483d00d8ea28b61b9f2fff26" - } - }, - "4.14.270": { - "CVE-2022-24958": { - "cmt_msg": "usb: gadget: don't release an existing dev->buf", - "cmt_id": "6936d1097e9cb891e1daaa8aab1b9c080f5e59a2" - } - }, - "4.14.271": { - "CVE-2022-23038": { - "cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()", - "cmt_id": "1b2f59f854e7069ba059adfe03d648ea643eba51" + "CVE-2021-29650": { + "cmt_msg": "netfilter: x_tables: Use correct memory barriers." }, - "CVE-2022-23039": { - "cmt_msg": "xen/gntalloc: don't use gnttab_query_foreign_access()", - "cmt_id": "a37eb077983e678bece23d4061fe5a6614f41354" + "CVE-2018-20169": { + "cmt_msg": "USB: check usb_get_extra_descriptor for proper size" }, - "CVE-2022-23960": { - "cmt_msg": "ARM: report Spectre v2 status through sysfs", - "cmt_id": "2d44960d3edf9994998ff798ef618e666c4f0143" + "CVE-2020-36312": { + "cmt_msg": "KVM: fix memory leak in kvm_io_bus_unregister_dev()" }, - "CVE-2022-23041": { - "cmt_msg": "xen/9p: use alloc/free_pages_exact()", - "cmt_id": "22fd4f3fc1cd37d3daa4462f3184b20adb9342f5" + "CVE-2022-28356": { + "cmt_msg": "llc: fix netdevice reference leaks in llc_ui_bind()" }, - "CVE-2022-23036": { - "cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()", - "cmt_id": "1b2f59f854e7069ba059adfe03d648ea643eba51" + "CVE-2022-20166": { + "cmt_msg": "drivers core: Use sysfs_emit and sysfs_emit_at for show(device *...) functions" }, - "CVE-2022-23037": { - "cmt_msg": "xen/netfront: don't use gnttab_query_foreign_access() for mapped status", - "cmt_id": "fbb5d5edd233c25774109dc0a673702c7b4985e5" + "CVE-2023-5178": { + "cmt_msg": "nvmet-tcp: Fix a possible UAF in queue intialization setup" }, - "CVE-2022-0001": { - "cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE", - "cmt_id": "35c13d13becb5b951ea0fc708dda03fe900cf879" + "CVE-2023-1281": { + "cmt_msg": "net/sched: tcindex: update imperfect hash filters respecting rcu" }, - "CVE-2022-0002": { - "cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE", - "cmt_id": "35c13d13becb5b951ea0fc708dda03fe900cf879" + "CVE-2021-44879": { + "cmt_msg": "f2fs: fix to do sanity check on inode type during garbage collection" + }, + "CVE-2020-9383": { + "cmt_msg": "floppy: check FDC index for errors before assigning it" + }, + "CVE-2023-1513": { + "cmt_msg": "kvm: initialize all of the kvm_debugregs structure before sending it to userspace" }, "CVE-2021-26401": { - "cmt_msg": "x86/speculation: Use generic retpoline by default on AMD", - "cmt_id": "85938688be23ecd36a06757096896b2779b80d97" + "cmt_msg": "x86/speculation: Use generic retpoline by default on AMD" }, - "CVE-2022-23040": { - "cmt_msg": "xen/xenbus: don't let xenbus_grant_ring() remove grants in error case", - "cmt_id": "67d21d5bddef88c1977378e4aca2b9c6a4af9edc" + "CVE-2021-3847": { + "cmt_msg": "" }, - "CVE-2022-23042": { - "cmt_msg": "xen/netfront: react properly to failing gnttab_end_foreign_access_ref()", - "cmt_id": "1b9f4115738af90427a8c94a3980bc52fbb23296" - } - }, - "4.14.272": { - "CVE-2022-1199": { - "cmt_msg": "ax25: Fix NULL pointer dereference in ax25_kill_by_device", - "cmt_id": "d03aba820f1549c9f3b1d14bf48fa082663d22b5" + "CVE-2019-9445": { + "cmt_msg": "f2fs: check if file namelen exceeds max value" }, - "CVE-2021-4149": { - "cmt_msg": "btrfs: unlock newly allocated extent buffer after error", - "cmt_id": "e0956dd95ddd6b02b7eb084d127b926a509ae8e7" - } - }, - "4.14.273": { - "CVE-2022-20368": { - "cmt_msg": "net/packet: fix slab-out-of-bounds access in packet_recvmsg()", - "cmt_id": "b1e27cda1e3c12b705875bb7e247a97168580e33" + "CVE-2011-4917": { + "cmt_msg": "" }, - "CVE-2022-20158": { - "cmt_msg": "net/packet: fix slab-out-of-bounds access in packet_recvmsg()", - "cmt_id": "b1e27cda1e3c12b705875bb7e247a97168580e33" - } - }, - "4.14.274": { - "CVE-2022-26490": { - "cmt_msg": "nfc: st21nfca: Fix potential buffer overflows in EVT_TRANSACTION", - "cmt_id": "d908d2776464a8021a1f63eba6e7417fbe7653c9" + "CVE-2011-4916": { + "cmt_msg": "" }, - "CVE-2022-28356": { - "cmt_msg": "llc: fix netdevice reference leaks in llc_ui_bind()", - "cmt_id": "0f294bc04be87f1c9e1d1a908db9fcc84ce94210" + "CVE-2023-23039": { + "cmt_msg": "" }, - "CVE-2022-1016": { - "cmt_msg": "netfilter: nf_tables: initialize registers in nft_do_chain()", - "cmt_id": "a3cc32863b175168283cb0a5fde08de6a1e27df9" + "CVE-2019-5489": { + "cmt_msg": "Change mincore() to count \"mapped\" pages rather than \"cached\" pages" }, - "CVE-2022-27666": { - "cmt_msg": "esp: Fix possible buffer overflow in ESP transformation", - "cmt_id": "2c8abafd6c72ef04bc972f40332c76c1dd04446d" - } - }, - "4.14.276": { - "CVE-2022-28390": { - "cmt_msg": "can: ems_usb: ems_usb_start_xmit(): fix double dev_kfree_skb() in error path", - "cmt_id": "29d967c18737ce04f372831c4542e71da1a8d5c8" + "CVE-2020-36322": { + "cmt_msg": "fuse: fix bad inode" }, - "CVE-2022-2380": { - "cmt_msg": "video: fbdev: sm712fb: Fix crash in smtcfb_read()", - "cmt_id": "2a616cc4513217c850865482cbc0bc6e7188580c" + "CVE-2020-10711": { + "cmt_msg": "netlabel: cope with NULL catmap" }, - "CVE-2022-41858": { - "cmt_msg": "drivers: net: slip: fix NPD bug in sl_tx_timeout()", - "cmt_id": "3fdb033f8f8c978489c7702a4a44494b7ae63424" + "CVE-2020-35508": { + "cmt_msg": "fork: fix copy_process(CLONE_PARENT) race with the exiting ->real_parent" }, - "CVE-2022-1353": { - "cmt_msg": "af_key: add __GFP_ZERO flag for compose_sadb_supported in function pfkey_register", - "cmt_id": "fcdaaeb7eb5d52941ceb2fdcec0e2170c9bf3031" + "CVE-2020-35501": { + "cmt_msg": "" }, - "CVE-2022-30594": { - "cmt_msg": "ptrace: Check PTRACE_O_SUSPEND_SECCOMP permission on PTRACE_SEIZE", - "cmt_id": "f1442ed84c43610ca8ab77deb9ca991e7354746c" + "CVE-2021-45095": { + "cmt_msg": "phonet: refcount leak in pep_sock_accep" }, - "CVE-2022-2977": { - "cmt_msg": "tpm: fix reference counting for struct tpm_chip", - "cmt_id": "473a66f99cb8173c14138c5a5c69bfad04e8f9ac" + "CVE-2024-26685": { + "cmt_msg": "nilfs2: fix potential bug in end_buffer_async_write" }, - "CVE-2022-3111": { - "cmt_msg": "power: supply: wm8350-power: Add missing free in free_charger_irq", - "cmt_id": "ae64b838bececea902b819a69731cb80cca8f31a" + "CVE-2021-32399": { + "cmt_msg": "bluetooth: eliminate the potential race condition when removing the HCI controller" }, - "CVE-2022-1198": { - "cmt_msg": "drivers: hamradio: 6pack: fix UAF bug caused by mod_timer()", - "cmt_id": "a2793cb58444d4411810cc555eb45b8f4a228018" + "CVE-2021-3444": { + "cmt_msg": "bpf: Fix truncation handling for mod32 dst reg wrt zero" }, - "CVE-2022-3202": { - "cmt_msg": "jfs: prevent NULL deref in diFree", - "cmt_id": "33bd243566a9b1ca94261dcc2e16c7b9e3a71c15" + "CVE-2022-32250": { + "cmt_msg": "netfilter: nf_tables: disallow non-stateful expression in sets earlier" }, - "CVE-2021-4197": { - "cmt_msg": "cgroup: Use open-time credentials for process migraton perm checks", - "cmt_id": "a70bcf9ed08f3628a9324f054b0e041697b26853" + "CVE-2021-28688": { + "cmt_msg": "xen-blkback: don't leak persistent grants from xen_blkbk_map()" }, - "CVE-2022-28389": { - "cmt_msg": "can: mcba_usb: mcba_usb_start_xmit(): fix double dev_kfree_skb in error path", - "cmt_id": "cdced1015a63a7f100b5867ebb9a40271f891411" + "CVE-2019-14835": { + "cmt_msg": "vhost: make sure log_num < in_num" }, - "CVE-2022-1011": { - "cmt_msg": "fuse: fix pipe buffer lifetime for direct_io", - "cmt_id": "0ab55e14cf5fd40c39109969c8b04a25870f5d1e" - } - }, - "4.14.277": { - "CVE-2022-1204": { - "cmt_msg": "ax25: Fix refcount leaks caused by ax25_cb_del()", - "cmt_id": "c44a453ffe16eb08acdc6129ac4fa0192dbc0456" + "CVE-2019-12379": { + "cmt_msg": "consolemap: Fix a memory leaking bug in drivers/tty/vt/consolemap.c" }, - "CVE-2022-28388": { - "cmt_msg": "can: usb_8dev: usb_8dev_start_xmit(): fix double dev_kfree_skb() in error path", - "cmt_id": "a5e2259173eb52a728bbf32e02aa9a388451e614" - } - }, - "4.14.278": { - "CVE-2022-33981": { - "cmt_msg": "floppy: disable FDRAWCMD by default", - "cmt_id": "b7fa84ae1171a3c5ea5d710899080a6e63cfe084" + "CVE-2019-12378": { + "cmt_msg": "ipv6_sockglue: Fix a missing-check bug in ip6_ra_control()" }, - "CVE-2022-1836": { - "cmt_msg": "floppy: disable FDRAWCMD by default", - "cmt_id": "b7fa84ae1171a3c5ea5d710899080a6e63cfe084" + "CVE-2020-26145": { + "cmt_msg": "ath10k: drop fragments with multicast DA for PCIe" }, - "CVE-2022-29581": { - "cmt_msg": "net/sched: cls_u32: fix netns refcount changes in u32_change()", - "cmt_id": "0511cdd41a03ab396602dded4e778c5edcd8dcd1" + "CVE-2020-26147": { + "cmt_msg": "mac80211: assure all fragments are encrypted" }, - "CVE-2022-1734": { - "cmt_msg": "nfc: nfcmrvl: main: reorder destructive operations in nfcmrvl_nci_unregister_dev to avoid bugs", - "cmt_id": "ced30680fb1c7c1daae39a9384d23cd1a022585f" + "CVE-2020-26141": { + "cmt_msg": "ath10k: Fix TKIP Michael MIC verification for PCIe" }, - "CVE-2022-1419": { - "cmt_msg": "drm/vgem: Close use-after-free race in vgem_gem_create", - "cmt_id": "d2b8e8fbac9f175388d2808ade90d86402642b01" + "CVE-2020-26140": { + "cmt_msg": "" }, - "CVE-2023-3159": { - "cmt_msg": "firewire: fix potential uaf in outbound_phy_packet_callback()", - "cmt_id": "1269a6567274edecd04ee7fd7871aa4d0c937f2a" + "CVE-2020-26143": { + "cmt_msg": "" }, - "CVE-2022-1974": { - "cmt_msg": "nfc: replace improper check device_is_registered() in netlink related functions", - "cmt_id": "6f0ac4cd0377ab4e0b49b8f6efd37057c21336a9" + "CVE-2020-26142": { + "cmt_msg": "" }, - "CVE-2022-1975": { - "cmt_msg": "NFC: netlink: fix sleep in atomic bug when firmware download timeout", - "cmt_id": "c33b2afffe8ae90e0bd4790e0505edd92addf14c" - } - }, - "4.14.279": { - "CVE-2022-1048": { - "cmt_msg": "ALSA: pcm: Fix races among concurrent hw_params and hw_free calls", - "cmt_id": "a42aa926843acca96c0dfbde2e835b8137f2f092" - } - }, - "4.14.281": { - "CVE-2022-1652": { - "cmt_msg": "floppy: use a statically allocated error counter", - "cmt_id": "dc650d53bad770f169e498f1231671c51b0b321d" + "CVE-2019-17053": { + "cmt_msg": "ieee802154: enforce CAP_NET_RAW for raw sockets" }, - "CVE-2022-48619": { - "cmt_msg": "Input: add bounds checking to input_set_capability()", - "cmt_id": "9cc62ef5ba044b315c8761942db184a2ef8ff005" + "CVE-2019-17052": { + "cmt_msg": "ax25: enforce CAP_NET_RAW for raw sockets" }, - "CVE-2023-4459": { - "cmt_msg": "net: vmxnet3: fix possible NULL pointer dereference in vmxnet3_rq_cleanup()", - "cmt_id": "5fd9a74bf04a1eae5dbde8ca8585106d4410427f" + "CVE-2019-17056": { + "cmt_msg": "nfc: enforce CAP_NET_RAW for raw sockets" }, - "CVE-2023-4387": { - "cmt_msg": "net: vmxnet3: fix possible use-after-free bugs in vmxnet3_rq_alloc_rx_buf()", - "cmt_id": "2bee202d0649cb53b9860fe15d0642167bffd6bf" + "CVE-2019-17055": { + "cmt_msg": "mISDN: enforce CAP_NET_RAW for raw sockets" }, - "CVE-2022-1729": { - "cmt_msg": "perf: Fix sys_perf_event_open() race against self", - "cmt_id": "dee63319e2d1abd5d37a89de046ccf32ca8a8451" - } - }, - "4.14.282": { - "CVE-2022-20572": { - "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag", - "cmt_id": "388bc1e69663956f8cee43af3bd02bd3061d222d" + "CVE-2019-17054": { + "cmt_msg": "appletalk: enforce CAP_NET_RAW for raw sockets" }, - "CVE-2022-2503": { - "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag", - "cmt_id": "388bc1e69663956f8cee43af3bd02bd3061d222d" + "CVE-2024-26745": { + "cmt_msg": "powerpc/pseries/iommu: IOMMU table is not initialized for kdump over SR-IOV" }, - "CVE-2022-0494": { - "cmt_msg": "block-map: add __GFP_ZERO flag for alloc_page in function bio_copy_kern", - "cmt_id": "4f3ea768c56e8dce55ae538f18b37420366c5c22" + "CVE-2024-26744": { + "cmt_msg": "RDMA/srpt: Support specifying the srpt_service_guid parameter" }, - "CVE-2022-1012": { - "cmt_msg": "secure_seq: use the 64 bits of the siphash for port offset calculation", - "cmt_id": "40d20f3186ddd9b6b94598f4ef3d07644b0fa43c" - } - }, - "4.14.283": { - "CVE-2023-4385": { - "cmt_msg": "fs: jfs: fix possible NULL pointer dereference in dbFree()", - "cmt_id": "070ddf59cf17faf6aae7d89f78e0510c94d07940" + "CVE-2024-26743": { + "cmt_msg": "RDMA/qedr: Fix qedr_create_user_qp error flow" }, - "CVE-2022-32250": { - "cmt_msg": "netfilter: nf_tables: disallow non-stateful expression in sets earlier", - "cmt_id": "5b732a9e8e22395d911b3e6c343cbed0e1cec275" + "CVE-2024-26740": { + "cmt_msg": "net/sched: act_mirred: use the backlog for mirred ingress" }, - "CVE-2022-1184": { - "cmt_msg": "ext4: verify dir block before splitting it", - "cmt_id": "d27d3caddbeff10871982d5e25e6557be0fdc29a" + "CVE-2020-29661": { + "cmt_msg": "tty: Fix ->pgrp locking in tiocspgrp()" }, - "CVE-2022-1966": { - "cmt_msg": "netfilter: nf_tables: disallow non-stateful expression in sets earlier", - "cmt_id": "5b732a9e8e22395d911b3e6c343cbed0e1cec275" + "CVE-2020-29660": { + "cmt_msg": "tty: Fix ->session locking" }, - "CVE-2022-32981": { - "cmt_msg": "powerpc/32: Fix overread/overwrite of thread_struct via ptrace", - "cmt_id": "d13c94c4b6f816e79b8e4df193db1bdcc7253610" - } - }, - "4.14.284": { - "CVE-2022-21125": { - "cmt_msg": "x86/speculation/mmio: Reuse SRBDS mitigation for SBDS", - "cmt_id": "532c3a51316b6b1fdc6cb01926e2d139ef7e25da" + "CVE-2022-1734": { + "cmt_msg": "nfc: nfcmrvl: main: reorder destructive operations in nfcmrvl_nci_unregister_dev to avoid bugs" }, - "CVE-2022-21166": { - "cmt_msg": "x86/speculation/mmio: Enable CPU Fill buffer clearing on idle", - "cmt_id": "e0fccc13ebe3ed1205f69d119d49789ef039c1fd" + "CVE-2024-26748": { + "cmt_msg": "usb: cdns3: fix memory double free when handle zero packet" }, - "CVE-2022-21123": { - "cmt_msg": "x86/speculation/mmio: Add mitigation for Processor MMIO Stale Data", - "cmt_id": "d6087dda37d3ffa3c8efe6385757d73d9ed173c5" - } - }, - "4.14.285": { - "CVE-2022-32296": { - "cmt_msg": "tcp: increase source port perturb table to 2^16", - "cmt_id": "9044e70fadec49482c3cb3c2f49e81825796ea6d" + "CVE-2023-28772": { + "cmt_msg": "seq_buf: Fix overflow in seq_buf_putmem_hex()" }, - "CVE-2022-0812": { - "cmt_msg": "xprtrdma: fix incorrect header size calculations", - "cmt_id": "4779af1ec4a6c88a7005c8aabe69f409cf926d58" - } - }, - "4.14.286": { - "CVE-2021-33656": { - "cmt_msg": "vt: drop old FONT ioctls", - "cmt_id": "259742e9ad3551d5be58cd4754e65e0aabc1f9c8" - } - }, - "4.14.287": { - "CVE-2022-2318": { - "cmt_msg": "net: rose: fix UAF bugs caused by timer handler", - "cmt_id": "597b3bbe230caca60c321eeb08de14b9bc4d47c0" + "CVE-2024-26699": { + "cmt_msg": "drm/amd/display: Fix array-index-out-of-bounds in dcn35_clkmgr" }, - "CVE-2022-33742": { - "cmt_msg": "xen/blkfront: force data bouncing when backend is untrusted", - "cmt_id": "0b06590646e0857a804c9a08545791feb2278ab6" + "CVE-2024-26691": { + "cmt_msg": "KVM: arm64: Fix circular locking dependency" }, - "CVE-2022-33741": { - "cmt_msg": "xen/netfront: force data bouncing when backend is untrusted", - "cmt_id": "019eaffbb7cfdbe01b1b4e1b61e7f91688c76c2a" + "CVE-2022-4269": { + "cmt_msg": "act_mirred: use the backlog for nested calls to mirred ingress" }, - "CVE-2022-33740": { - "cmt_msg": "xen/netfront: fix leaking data in shared pages", - "cmt_id": "f2c6f208a52df7e201f9fc34ae5efd7f9f40133e" + "CVE-2024-26697": { + "cmt_msg": "nilfs2: fix data corruption in dsync block recovery for small block sizes" }, - "CVE-2022-26365": { - "cmt_msg": "xen/blkfront: fix leaking data in shared pages", - "cmt_id": "44dc5bcac4b0ec4e876110a69ead25a9b130234b" + "CVE-2024-26696": { + "cmt_msg": "nilfs2: fix hang in nilfs_lookup_dirty_data_buffers()" }, - "CVE-2022-33744": { - "cmt_msg": "xen/arm: Fix race in RB-tree based P2M accounting", - "cmt_id": "01b86faa64b1f5aa04c0b3ca2001b0a8474f3006" - } - }, - "4.14.288": { - "CVE-2021-33655": { - "cmt_msg": "fbcon: Disallow setting font bigger than screen size", - "cmt_id": "f7e7c2ad446f359f54f4ea6a0a30b218e5edf134" - } - }, - "4.14.289": { - "CVE-2022-36123": { - "cmt_msg": "x86: Clear .brk area at early boot", - "cmt_id": "a24eebede57ff42d5123cca948c5077ccddbffcb" - } - }, - "4.14.290": { - "CVE-2022-1462": { - "cmt_msg": "tty: use new tty_insert_flip_string_and_push_buffer() in pty_write()", - "cmt_id": "e9274a2732e1de3ca36076126284b4e5ffe6d587" + "CVE-2019-15925": { + "cmt_msg": "net: hns3: add some error checking in hclge_tm module" }, - "CVE-2022-36879": { - "cmt_msg": "xfrm: xfrm_policy: fix a possible double xfrm_pols_put() in xfrm_bundle_lookup()", - "cmt_id": "2c9d93e35cb857fc613ec9d58d690d332252747b" - } - }, - "4.14.291": { - "CVE-2022-3629": { - "cmt_msg": "vsock: Fix memory leak in vsock_connect()", - "cmt_id": "ec0a5b730cc053202df6b6e6dd6c860977990646" + "CVE-2019-15924": { + "cmt_msg": "fm10k: Fix a potential NULL pointer dereference" }, - "CVE-2022-2153": { - "cmt_msg": "KVM: x86: Avoid theoretical NULL pointer dereference in kvm_irq_delivery_to_apic_fast()", - "cmt_id": "bcf0a450fbaabe7e14d71f885525805b4f86e855" + "CVE-2019-15927": { + "cmt_msg": "ALSA: usb-audio: Avoid access before bLength check in build_audio_procunit()" }, - "CVE-2022-36946": { - "cmt_msg": "netfilter: nf_queue: do not allow packet truncation below transport header offset", - "cmt_id": "83636c64b796a7e44fa72f371777f803c1ef9e74" + "CVE-2019-15926": { + "cmt_msg": "ath6kl: add some bounds checking" }, - "CVE-2022-20566": { - "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free caused by l2cap_chan_put", - "cmt_id": "5bb395334392891dffae5a0e8f37dbe1d70496c9" + "CVE-2019-15921": { + "cmt_msg": "genetlink: Fix a memory leak on error path" }, - "CVE-2022-3635": { - "cmt_msg": "atm: idt77252: fix use-after-free bugs caused by tst_timer", - "cmt_id": "3db3f3bf05a88635beb7391fca235fb0e5213e6f" + "CVE-2021-38160": { + "cmt_msg": "virtio_console: Assure used length from device is limited" }, - "CVE-2022-2588": { - "cmt_msg": "net_sched: cls_route: remove from list when handle is 0", - "cmt_id": "d0cce31f328fa10e7256f314e6e044e13cdf6814" + "CVE-2019-15219": { + "cmt_msg": "USB: sisusbvga: fix oops in error path of sisusb_probe" }, - "CVE-2022-20422": { - "cmt_msg": "arm64: fix oops in concurrently setting insn_emulation sysctls", - "cmt_id": "9d5fec6ba2e4117d196a8259ab54615ffe562460" + "CVE-2019-15218": { + "cmt_msg": "media: usb: siano: Fix general protection fault in smsusb" }, - "CVE-2023-1095": { - "cmt_msg": "netfilter: nf_tables: fix null deref due to zeroed list head", - "cmt_id": "49d57fb1fd44b9d3422f096d3b1b6415685d7364" + "CVE-2005-3660": { + "cmt_msg": "" }, - "CVE-2022-1679": { - "cmt_msg": "ath9k: fix use-after-free in ath9k_hif_usb_rx_cb", - "cmt_id": "62bc1ea5c7401d77eaf73d0c6a15f3d2e742856e" - } - }, - "4.14.292": { - "CVE-2022-42703": { - "cmt_msg": "mm/rmap: Fix anon_vma->degree ambiguity leading to double-reuse", - "cmt_id": "978a70601bdc4c32de4003d3beef4dfa23fff1e0" + "CVE-2019-15212": { + "cmt_msg": "USB: rio500: refuse more than one device at a time" }, - "CVE-2022-3028": { - "cmt_msg": "af_key: Do not call xfrm_probe_algs in parallel", - "cmt_id": "f1b1b63e307478e93548f59e18bd844744b396d3" - } - }, - "4.14.293": { - "CVE-2022-2663": { - "cmt_msg": "netfilter: nf_conntrack_irc: Fix forged IP logic", - "cmt_id": "6ce66e3442a5989cbe56a6884384bf0b7d1d0725" + "CVE-2019-15211": { + "cmt_msg": "media: radio-raremono: change devm_k*alloc to k*alloc" }, - "CVE-2023-2860": { - "cmt_msg": "ipv6: sr: fix out-of-bounds read when setting HMAC data.", - "cmt_id": "dc9dbd65c803af1607484fed5da50d41dc8dd864" + "CVE-2019-15217": { + "cmt_msg": "media: usb:zr364xx:Fix KASAN:null-ptr-deref Read in zr364xx_vidioc_querycap" }, - "CVE-2022-3586": { - "cmt_msg": "sch_sfb: Don't assume the skb is still around after enqueueing to child", - "cmt_id": "a7af71bb5ee6e887d49f098e212ef4f2f7cfbaf6" + "CVE-2019-15216": { + "cmt_msg": "USB: yurex: Fix protection fault after device removal" }, - "CVE-2022-4095": { - "cmt_msg": "staging: rtl8712: fix use after free bugs", - "cmt_id": "376e15487fec837301d888068a3fcc82efb6171a" + "CVE-2019-15215": { + "cmt_msg": "media: cpia2_usb: first wake up, then free in disconnect" }, - "CVE-2021-4159": { - "cmt_msg": "bpf: Verifer, adjust_scalar_min_max_vals to always call update_reg_bounds()", - "cmt_id": "a7cf53f9ebcd887c19588c0c1b4b8260f41a3faa" + "CVE-2019-15214": { + "cmt_msg": "ALSA: core: Fix card races between register and disconnect" }, - "CVE-2022-20421": { - "cmt_msg": "binder: fix UAF of ref->proc caused by race condition", - "cmt_id": "229f47603dd306bc0eb1a831439adb8e48bb0eae" + "CVE-2019-19922": { + "cmt_msg": "sched/fair: Fix low cpu usage with high throttling by removing expiration of cpu-local slices" }, - "CVE-2022-4662": { - "cmt_msg": "USB: core: Prevent nested device-reset calls", - "cmt_id": "1b29498669914c7f9afb619722421418a753d372" + "CVE-2019-19927": { + "cmt_msg": "drm/ttm: fix incrementing the page pointer for huge pages" }, - "CVE-2022-40307": { - "cmt_msg": "efi: capsule-loader: Fix use-after-free in efi_capsule_write", - "cmt_id": "233d5c4d18971feee5fc2f33f00b63d8205cfc67" - } - }, - "4.14.295": { - "CVE-2022-39842": { - "cmt_msg": "video: fbdev: pxa3xx-gcu: Fix integer overflow in pxa3xx_gcu_write", - "cmt_id": "9556a88a16e381dbd6834da95206742d0973afc6" + "CVE-2023-52498": { + "cmt_msg": "PM: sleep: Fix possible deadlocks in core system-wide PM code" }, - "CVE-2022-3239": { - "cmt_msg": "media: em28xx: initialize refcount before kref_get", - "cmt_id": "1f6ab281f218c3a2b789eb976c5b1ef67139680a" - } - }, - "4.14.296": { - "CVE-2022-2978": { - "cmt_msg": "fs: fix UAF/GPF bug in nilfs_mdt_destroy", - "cmt_id": "c0aa76b0f17f59dd9c9d3463550a2986a1d592e4" + "CVE-2023-52491": { + "cmt_msg": "media: mtk-jpeg: Fix use after free bug due to error path handling in mtk_jpeg_dec_device_run" }, - "CVE-2022-41849": { - "cmt_msg": "fbdev: smscufx: Fix use-after-free in ufx_ops_open()", - "cmt_id": "fa008859983d9231b9241a4b9eac7aabfbb45155" + "CVE-2022-2318": { + "cmt_msg": "net: rose: fix UAF bugs caused by timer handler" }, - "CVE-2022-3594": { - "cmt_msg": "r8152: Rate limit overflow messages", - "cmt_id": "f5d6c938d51217d6f0f534f1ee606d9c5eb22fdc" + "CVE-2023-3611": { + "cmt_msg": "net/sched: sch_qfq: account for stab overhead in qfq_enqueue" }, - "CVE-2022-43750": { - "cmt_msg": "usb: mon: make mmapped memory read only", - "cmt_id": "b29f76fcf2db6615b416d98e28c7d81eff4c89a2" + "CVE-2023-4132": { + "cmt_msg": "media: usb: siano: Fix warning due to null work_func_t function pointer" }, - "CVE-2022-3621": { - "cmt_msg": "nilfs2: fix NULL pointer dereference at nilfs_bmap_lookup_at_level()", - "cmt_id": "1ce68de30b663b79073251162123e57cbed2dc84" + "CVE-2023-4133": { + "cmt_msg": "cxgb4: fix use after free bugs caused by circular dependency problem" }, - "CVE-2022-3649": { - "cmt_msg": "nilfs2: fix use-after-free bug of struct nilfs_root", - "cmt_id": "26b9b66610d6f8f3333cb6f52e97745da875fee1" + "CVE-2020-26560": { + "cmt_msg": "" }, - "CVE-2022-41850": { - "cmt_msg": "HID: roccat: Fix use-after-free in roccat_read()", - "cmt_id": "fb8b43b7721786f551ec95542e07cf9a909f3e56" + "CVE-2020-8647": { + "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region" }, - "CVE-2022-40768": { - "cmt_msg": "scsi: stex: Properly zero out the passthrough command structure", - "cmt_id": "5c8395d775ca9044b361af4a19b2ff223485be35" + "CVE-2023-4134": { + "cmt_msg": "Input: cyttsp4_core - change del_timer_sync() to timer_shutdown_sync()" }, - "CVE-2022-3565": { - "cmt_msg": "mISDN: fix use-after-free bugs in l1oip timer handlers", - "cmt_id": "cbd342376a4e7ea481891181910e9e995390eb24" + "CVE-2023-37454": { + "cmt_msg": "" }, - "CVE-2022-3542": { - "cmt_msg": "bnx2x: fix potential memory leak in bnx2x_tpa_stop()", - "cmt_id": "f63e896e78c247d0be8165d99d543a28ca0be360" + "CVE-2023-35824": { + "cmt_msg": "media: dm1105: Fix use after free bug in dm1105_remove due to race condition" }, - "CVE-2022-3646": { - "cmt_msg": "nilfs2: fix leak of nilfs_root in case of writer thread creation failure", - "cmt_id": "a832de79d82ac8c9f445f99069e11b17c5d2224a" - } - }, - "4.14.297": { - "CVE-2022-26373": { - "cmt_msg": "x86/speculation: Add RSB VM Exit protections", - "cmt_id": "7a4d2cba68731673c3ec89a1a5eee3a9af35ffa7" - } - }, - "4.14.298": { - "CVE-2022-20369": { - "cmt_msg": "media: v4l2-mem2mem: Apply DST_QUEUE_OFF_BASE on MMAP buffers across ioctls", - "cmt_id": "7339b6bdf9e084f9e83c084ccc8879b6ae80b75a" + "CVE-2022-20572": { + "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag" }, - "CVE-2023-0615": { - "cmt_msg": "media: vivid: dev->bitmap_cap wasn't freed in all cases", - "cmt_id": "b0e20af206273e90d47647e7c806ddcc0a401f65" - } - }, - "4.14.299": { - "CVE-2022-3628": { - "cmt_msg": "wifi: brcmfmac: Fix potential buffer overflow in brcmf_fweh_event_worker()", - "cmt_id": "b23665bbd39224e15aab89df4a4b60c0ab2ad09d" + "CVE-2022-42703": { + "cmt_msg": "mm/rmap: Fix anon_vma->degree ambiguity leading to double-reuse" }, - "CVE-2022-42895": { - "cmt_msg": "Bluetooth: L2CAP: Fix attempting to access uninitialized memory", - "cmt_id": "999d99c8de09537bd4f4a4a7db2be6b55c6ed817" + "CVE-2021-4083": { + "cmt_msg": "fget: check that the fd still exists after getting a ref to it" }, - "CVE-2022-3564": { - "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free caused by l2cap_reassemble_sdu", - "cmt_id": "03af22e23b96fb7ef75fb7885407ef457e8b403d" - } - }, - "4.14.300": { - "CVE-2023-26607": { - "cmt_msg": "ntfs: fix out-of-bounds read in ntfs_attr_find()", - "cmt_id": "801906eea32d9781725905271a1d4ab275743fc9" + "CVE-2023-33288": { + "cmt_msg": "power: supply: bq24190: Fix use after free bug in bq24190_remove due to race condition" }, - "CVE-2022-3521": { - "cmt_msg": "kcm: avoid potential race in kcm_tx_work", - "cmt_id": "381b6cb3f3e66b84db77028ac7d84f18d80f1153" - } - }, - "4.14.301": { - "CVE-2022-3524": { - "cmt_msg": "tcp/udp: Fix memory leak in ipv6_renew_options().", - "cmt_id": "205c1e9ac56a5cd1a7d0bc457d8b38871f5b37ed" + "CVE-2022-29900": { + "cmt_msg": "x86/kvm/vmx: Make noinstr clean" }, - "CVE-2022-42896": { - "cmt_msg": "Bluetooth: L2CAP: Fix accepting connection request for invalid SPSM", - "cmt_id": "9f4624c42db9dd854870ccb212ddd405d8c59041" - } - }, - "4.14.302": { - "CVE-2022-3643": { - "cmt_msg": "xen/netback: Ensure protocol headers don't fall in the non-linear area", - "cmt_id": "e173cefc814dec81e9836ecc866cdba154e693cd" - } - }, - "4.14.303": { - "CVE-2023-0266": { - "cmt_msg": "ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF", - "cmt_id": "c75e7766cef4e492ec156942d2c4d48c25574e5c" + "CVE-2022-29901": { + "cmt_msg": "x86/kvm/vmx: Make noinstr clean" }, - "CVE-2022-41218": { - "cmt_msg": "media: dvb-core: Fix UAF due to refcount races at releasing", - "cmt_id": "8d904e99c10e2e443c6c7c418541880513eb9790" + "CVE-2023-52485": { + "cmt_msg": "drm/amd/display: Wake DMCUB before sending a command" }, - "CVE-2023-23455": { - "cmt_msg": "net: sched: atm: dont intepret cls results when asked to drop", - "cmt_id": "db49adc5aff0c84ef0439a666f494a0d57c98bc7" + "CVE-2018-20511": { + "cmt_msg": "net/appletalk: fix minor pointer leak to userspace in SIOCFINDIPDDPRT" }, - "CVE-2023-0461": { - "cmt_msg": "net/ulp: prevent ULP without clone op from entering the LISTEN status", - "cmt_id": "b689125d04949841337dfa730d48dd91ada9ce3a" + "CVE-2022-29581": { + "cmt_msg": "net/sched: cls_u32: fix netns refcount changes in u32_change()" }, - "CVE-2022-45934": { - "cmt_msg": "Bluetooth: L2CAP: Fix u8 overflow", - "cmt_id": "95f1847a361c7b4bf7d74c06ecb6968455082c1a" + "CVE-2021-47063": { + "cmt_msg": "drm: bridge/panel: Cleanup connector on bridge detach" }, - "CVE-2022-3424": { - "cmt_msg": "misc: sgi-gru: fix use-after-free error in gru_set_context_option, gru_fault and gru_handle_user_call_os", - "cmt_id": "3eec37e223fabedaf90191e8a0cc61d46a96ab8d" + "CVE-2022-3567": { + "cmt_msg": "ipv6: Fix data races around sk->sk_prot." }, - "CVE-2022-3545": { - "cmt_msg": "nfp: fix use-after-free in area_cache_get()", - "cmt_id": "60537e23e40f7ca9e07679fec28af79d43d9e8f6" + "CVE-2022-3566": { + "cmt_msg": "tcp: Fix data races around icsk->icsk_af_ops." }, - "CVE-2022-47929": { - "cmt_msg": "net: sched: disallow noqueue for qdisc classes", - "cmt_id": "4574e32cbf652d7efcaa6076558752f770b01757" + "CVE-2022-3565": { + "cmt_msg": "mISDN: fix use-after-free bugs in l1oip timer handlers" }, - "CVE-2023-28328": { - "cmt_msg": "media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer()", - "cmt_id": "c712d1ccbfb787620422b437a5b8fac0802547bd" + "CVE-2022-3564": { + "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free caused by l2cap_reassemble_sdu" }, - "CVE-2023-0394": { - "cmt_msg": "ipv6: raw: Deduct extension header length in rawv6_push_pending_frames", - "cmt_id": "35ed8ba485544a31a4ab9b92a1c68e406ab66a47" + "CVE-2018-1095": { + "cmt_msg": "ext4: limit xattr size to INT_MAX" }, - "CVE-2022-36280": { - "cmt_msg": "drm/vmwgfx: Validate the box size for the snooped cursor", - "cmt_id": "50d177f90b63ea4138560e500d92be5e4c928186" - } - }, - "4.14.304": { - "CVE-2023-0458": { - "cmt_msg": "prlimit: do_prlimit needs to have a speculation check", - "cmt_id": "291a0395bb298d0ef0bba21d2186f632e4b30053" - } - }, - "4.14.305": { - "CVE-2023-1074": { - "cmt_msg": "sctp: fail if no bound addresses can be used for a given scope", - "cmt_id": "97ca098d8f1a8119b6675c823706cd6231ba6d9b" - }, - "CVE-2023-3358": { - "cmt_msg": "HID: intel_ish-hid: Add check for ishtp_dma_tx_map", - "cmt_id": "eaa86c4ae77e9c6c28e3c417539ebbee987be0c9" - }, - "CVE-2023-23559": { - "cmt_msg": "wifi: rndis_wlan: Prevent buffer overflow in rndis_query_oid", - "cmt_id": "8a97563bf04358f035a0b98142ae48f1ef095b61" + "CVE-2023-0030": { + "cmt_msg": "drm/nouveau/mmu: add more general vmm free/node handling functions" }, - "CVE-2023-1073": { - "cmt_msg": "HID: check empty report_list in hid_validate_values()", - "cmt_id": "614dd3d1725d329bf10a7ae974ebdfe101150791" - } - }, - "4.14.306": { - "CVE-2023-1513": { - "cmt_msg": "kvm: initialize all of the kvm_debugregs structure before sending it to userspace", - "cmt_id": "1d43de93b35d85981006ec3c52c0cad8af1f2f6a" + "CVE-2019-11599": { + "cmt_msg": "coredump: fix race condition between mmget_not_zero()/get_task_mm() and core dumping" }, - "CVE-2023-2162": { - "cmt_msg": "scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress", - "cmt_id": "496af9d3682ed4c28fb734342a09e6cc0c056ea4" + "CVE-2019-2101": { + "cmt_msg": "media: uvcvideo: Fix 'type' check leading to overflow" }, - "CVE-2023-26545": { - "cmt_msg": "net: mpls: fix stale pointer if allocation fails during device rename", - "cmt_id": "b89824a9b2398d78a32ea75343e5472a0fd4986e" + "CVE-2019-3459": { + "cmt_msg": "Bluetooth: Verify that l2cap_get_conf_opt provides large enough buffer" }, - "CVE-2023-32269": { - "cmt_msg": "netrom: Fix use-after-free caused by accept on already connected socket", - "cmt_id": "35d5bb094bc7529c15561289a1ea995f897bf2e6" + "CVE-2020-0444": { + "cmt_msg": "audit: fix error handling in audit_data_to_entry()" }, - "CVE-2023-3161": { - "cmt_msg": "fbcon: Check font dimension limits", - "cmt_id": "7625513267a2b155a5e31e4ac443bf954591b7fa" - } - }, - "4.14.307": { - "CVE-2023-0459": { - "cmt_msg": "uaccess: Add speculation barrier to copy_from_user()", - "cmt_id": "e0fbff18bbcee4f07d46bee172803fad63f6f4dd" - } - }, - "4.14.308": { - "CVE-2023-7192": { - "cmt_msg": "netfilter: ctnetlink: fix possible refcount leak in ctnetlink_create_conntrack()", - "cmt_id": "8df5f3b50d9ce523251edf9cd0470963be20004b" + "CVE-2022-1836": { + "cmt_msg": "floppy: disable FDRAWCMD by default" }, - "CVE-2023-1829": { - "cmt_msg": "net/sched: Retire tcindex classifier", - "cmt_id": "53af9c793f644d5841d84d8e0ad83bd7ab47f3e0" + "CVE-2019-2213": { + "cmt_msg": "binder: fix possible UAF when freeing buffer" }, - "CVE-2023-2985": { - "cmt_msg": "fs: hfsplus: fix UAF issue in hfsplus_put_super", - "cmt_id": "a9433406837c211af58a533d9e6f7a8f865b01f3" + "CVE-2019-19046": { + "cmt_msg": "ipmi: Fix memory leak in __ipmi_bmc_register" }, - "CVE-2023-1079": { - "cmt_msg": "HID: asus: use spinlock to safely schedule workers", - "cmt_id": "df0fad94ca3787727b9cdd76797aaacf46fe93ed" + "CVE-2019-19045": { + "cmt_msg": "net/mlx5: prevent memory leak in mlx5_fpga_conn_create_cq" }, - "CVE-2023-45862": { - "cmt_msg": "USB: ene_usb6250: Allocate enough memory for full object", - "cmt_id": "26f31c6e1389c23a1b822a61c59d5d1f357cb478" + "CVE-2019-19049": { + "cmt_msg": "of: unittest: fix memory leak in unittest_data_add" }, - "CVE-2023-1118": { - "cmt_msg": "media: rc: Fix use-after-free bugs caused by ene_tx_irqsim()", - "cmt_id": "0987f836bc1a258cb8fb51669a5afb67bb01c31b" - } - }, - "4.14.311": { - "CVE-2023-1855": { - "cmt_msg": "hwmon: (xgene) Fix use after free bug in xgene_hwmon_remove due to race condition", - "cmt_id": "c809ed776e190edfc04f8d6b25a62855b1386a0d" + "CVE-2023-23000": { + "cmt_msg": "phy: tegra: xusb: Fix return value of tegra_xusb_find_port_node function" }, - "CVE-2023-1990": { - "cmt_msg": "nfc: st-nci: Fix use after free bug in ndlc_remove due to race condition", - "cmt_id": "2156490c4b7cacda9a18ec99929940b8376dc0e3" - } - }, - "4.14.312": { - "CVE-2023-2483": { - "cmt_msg": "net: qcom/emac: Fix use after free bug in emac_remove due to race condition", - "cmt_id": "aee129c0096e479eae92e2127f96f9d08f16ad8f" + "CVE-2018-13053": { + "cmt_msg": "alarmtimer: Prevent overflow for relative nanosleep" }, - "CVE-2023-30772": { - "cmt_msg": "power: supply: da9150: Fix use after free bug in da9150_charger_remove due to race condition", - "cmt_id": "bbf45f079f41efcf1e51bb65a0a45d2b31061bd5" + "CVE-2023-23559": { + "cmt_msg": "wifi: rndis_wlan: Prevent buffer overflow in rndis_query_oid" }, - "CVE-2023-33203": { - "cmt_msg": "net: qcom/emac: Fix use after free bug in emac_remove due to race condition", - "cmt_id": "aee129c0096e479eae92e2127f96f9d08f16ad8f" + "CVE-2020-10720": { + "cmt_msg": "net-gro: fix use-after-free read in napi_gro_frags()" }, - "CVE-2023-23454": { - "cmt_msg": "net: sched: cbq: dont intepret cls results when asked to drop", - "cmt_id": "c4b1e702dc841a79664c5b8000fd99ffe9b3e9c2" + "CVE-2018-12904": { + "cmt_msg": "kvm: nVMX: Enforce cpl=0 for VMX instructions" }, - "CVE-2023-1670": { - "cmt_msg": "xirc2ps_cs: Fix use after free bug in xirc2ps_detach", - "cmt_id": "fe7eebebca51d56b900331c3052a6342731f1117" + "CVE-2018-21008": { + "cmt_msg": "rsi: add fix for crash during assertions" }, - "CVE-2021-33631": { - "cmt_msg": "ext4: fix kernel BUG in 'ext4_write_inline_data_end()'", - "cmt_id": "896cba70d0457af680fa00ef501f2d11a91fd42f" + "CVE-2022-20368": { + "cmt_msg": "net/packet: fix slab-out-of-bounds access in packet_recvmsg()" }, - "CVE-2023-1989": { - "cmt_msg": "Bluetooth: btsdio: fix use after free bug in btsdio_remove due to unfinished work", - "cmt_id": "95eacef5692545f199fae4e52abfbfa273acb351" + "CVE-2022-3424": { + "cmt_msg": "misc: sgi-gru: fix use-after-free error in gru_set_context_option, gru_fault and gru_handle_user_call_os" }, - "CVE-2023-2194": { - "cmt_msg": "i2c: xgene-slimpro: Fix out-of-bounds bug in xgene_slimpro_i2c_xfer()", - "cmt_id": "b8cb50c68c87f2c4a1d65df9275073e9c94aef5e" - } - }, - "4.14.313": { - "CVE-2023-1859": { - "cmt_msg": "9p/xen : Fix use after free bug in xen_9pfs_front_remove due to race condition", - "cmt_id": "b5664e929e2e19f644ea133ae8d87fbd5654ec5a" - } - }, - "4.14.314": { - "CVE-2023-31436": { - "cmt_msg": "net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg", - "cmt_id": "0616570ce23bbcc1ac842e97fb8e167235f1582d" + "CVE-2019-5108": { + "cmt_msg": "mac80211: Do not send Layer 2 Update frame before authorization" }, - "CVE-2023-2513": { - "cmt_msg": "ext4: fix use-after-free in ext4_xattr_set_entry", - "cmt_id": "ae2c644049184f04f672e23d3fa8122631ef762e" + "CVE-2022-24448": { + "cmt_msg": "NFSv4: Handle case where the lookup of a directory fails" }, - "CVE-2023-2248": { - "cmt_msg": "net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg", - "cmt_id": "0616570ce23bbcc1ac842e97fb8e167235f1582d" - } - }, - "4.14.315": { - "CVE-2023-1380": { - "cmt_msg": "wifi: brcmfmac: slab-out-of-bounds read in brcmf_get_assoc_ies()", - "cmt_id": "ac5305e5d227b9af3aae25fa83380d3ff0225b73" + "CVE-2020-0427": { + "cmt_msg": "pinctrl: devicetree: Avoid taking direct reference to device name string" }, - "CVE-2024-0775": { - "cmt_msg": "ext4: improve error recovery code paths in __ext4_remount()", - "cmt_id": "7dd95a282809fec91e54867a92e271064284ad98" + "CVE-2020-26088": { + "cmt_msg": "net/nfc/rawsock.c: add CAP_NET_RAW check." }, - "CVE-2023-35824": { - "cmt_msg": "media: dm1105: Fix use after free bug in dm1105_remove due to race condition", - "cmt_id": "df01f9c146ce2134de4daf393e29e18d6d5866ec" + "CVE-2008-2544": { + "cmt_msg": "" }, - "CVE-2023-2269": { - "cmt_msg": "dm ioctl: fix nested locking in table_clear() to remove deadlock concern", - "cmt_id": "c9dfa8ba3b181e67970f06d80de18aa257d1ecda" + "CVE-2019-19462": { + "cmt_msg": "kernel/relay.c: handle alloc_percpu returning NULL in relay_open" }, - "CVE-2023-2002": { - "cmt_msg": "bluetooth: Perform careful capability checks in hci_sock_ioctl()", - "cmt_id": "73ddc585228db650bd4ff10d5b59c831924fd9ba" + "CVE-2023-30772": { + "cmt_msg": "power: supply: da9150: Fix use after free bug in da9150_charger_remove due to race condition" }, - "CVE-2023-32233": { - "cmt_msg": "netfilter: nf_tables: deactivate anonymous set from preparation phase", - "cmt_id": "86572872505023e3bb461b271c2f25fdaa3dfcd7" + "CVE-2021-3679": { + "cmt_msg": "tracing: Fix bug in rb_per_cpu_empty() that might cause deadloop." }, - "CVE-2023-34256": { - "cmt_msg": "ext4: avoid a potential slab-out-of-bounds in ext4_group_desc_csum", - "cmt_id": "64b7487e3769e013fc7edb3804d1a769747f0228" - } - }, - "4.14.316": { "CVE-2022-2586": { - "cmt_msg": "netfilter: nf_tables: do not allow SET_ID to refer to another table", - "cmt_id": "4e0dbab570defe5b747578cbea8e07f9d0709bec" + "cmt_msg": "netfilter: nf_tables: do not allow SET_ID to refer to another table" }, - "CVE-2023-3090": { - "cmt_msg": "ipvlan:Fix out-of-bounds caused by unclear skb->cb", - "cmt_id": "8747ec637300f1212a47a9f15e2340cfe4dcbb9c" + "CVE-2023-51782": { + "cmt_msg": "net/rose: Fix Use-After-Free in rose_ioctl" }, - "CVE-2023-3141": { - "cmt_msg": "memstick: r592: Fix UAF bug in r592_remove due to race condition", - "cmt_id": "3faa6fe21c516dbcca469c297df77decbc2fed0f" + "CVE-2023-51780": { + "cmt_msg": "atm: Fix Use-After-Free in do_vcc_ioctl" }, - "CVE-2022-34918": { - "cmt_msg": "netfilter: nf_tables: stricter validation of element data", - "cmt_id": "acd3e18fbcae6c5f9d79d75455569fc132227162" - } - }, - "4.14.317": { - "CVE-2023-1838": { - "cmt_msg": "Fix double fget() in vhost_net_set_backend()", - "cmt_id": "d1bcb0ab20980c6da663708c9a47c322703f9fc3" + "CVE-2023-51781": { + "cmt_msg": "appletalk: Fix Use-After-Free in atalk_ioctl" }, - "CVE-2022-45887": { - "cmt_msg": "media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb()", - "cmt_id": "cf412b0543b77d01f74ae2303d7f8a97e6bff686" + "CVE-2022-2588": { + "cmt_msg": "net_sched: cls_route: remove from list when handle is 0" }, - "CVE-2022-45919": { - "cmt_msg": "media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221", - "cmt_id": "66e262ad9b35615b2a1b1cad4751e93e1de90634" - } - }, - "4.14.318": { - "CVE-2023-3111": { - "cmt_msg": "btrfs: unset reloc control if transaction commit fails in prepare_to_relocate()", - "cmt_id": "ff0e8ed8dfb584575cffc1561f17a1d094e8565b" - } - }, - "4.14.319": { - "CVE-2023-3338": { - "cmt_msg": "Remove DECnet support from kernel", - "cmt_id": "975840f8dec3c1e6a6b28a387bb7cf55a4775e18" - } - }, - "4.14.321": { - "CVE-2022-40982": { - "cmt_msg": "x86/speculation: Add Gather Data Sampling mitigation", - "cmt_id": "cdc2724c9d060a8fa9652a9aa6347d8324f6cd82" - } - }, - "4.14.322": { - "CVE-2023-4206": { - "cmt_msg": "net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free", - "cmt_id": "226d84d54a9339b7045aff36c8f56d6ee9270476" + "CVE-2019-18885": { + "cmt_msg": "btrfs: merge btrfs_find_device and find_device" }, - "CVE-2023-3390": { - "cmt_msg": "netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE", - "cmt_id": "d19a80db742ceffc8d92a0cf78885f60d10c6a6d" + "CVE-2024-26733": { + "cmt_msg": "arp: Prevent overflow in arp_req_get()." }, - "CVE-2023-1206": { - "cmt_msg": "tcp: Reduce chance of collisions in inet6_hashfn().", - "cmt_id": "ebfedbfb36eecab2d4bfa6faeaad763cbfe3a0e8" + "CVE-2024-26736": { + "cmt_msg": "afs: Increase buffer size in afs_update_volume_status()" }, - "CVE-2023-4128": { - "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free", - "cmt_id": "f0f874147a5b00eae875c24281531f8de7900079" + "CVE-2024-26735": { + "cmt_msg": "ipv6: sr: fix possible use-after-free and null-ptr-deref" }, - "CVE-2023-3611": { - "cmt_msg": "net/sched: sch_qfq: account for stab overhead in qfq_enqueue", - "cmt_id": "c3f21ea515cb4ad7db86ddb511cead2f09e1c1e6" + "CVE-2024-26738": { + "cmt_msg": "powerpc/pseries/iommu: DLPAR add doesn't completely initialize pci_controller" }, - "CVE-2023-3212": { - "cmt_msg": "gfs2: Don't deref jdesc in evict", - "cmt_id": "6fb4b344382879bd4f8cc8394f6fff77c1388b15" + "CVE-2024-26739": { + "cmt_msg": "net/sched: act_mirred: don't override retval if we already lost the skb" }, - "CVE-2023-3609": { - "cmt_msg": "net/sched: cls_u32: Fix reference counter leak leading to overflow", - "cmt_id": "a7f178f8439e939efdd12d190783eb0fabf5990d" + "CVE-2022-38096": { + "cmt_msg": "" }, - "CVE-2023-4208": { - "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free", - "cmt_id": "f0f874147a5b00eae875c24281531f8de7900079" + "CVE-2018-3620": { + "cmt_msg": "x86/microcode: Allow late microcode loading with SMT disabled" }, - "CVE-2023-35001": { - "cmt_msg": "netfilter: nf_tables: prevent OOB access in nft_byteorder_eval", - "cmt_id": "185a79c8be264720b0b89ce2cc42ca2582dbce6f" + "CVE-2020-16166": { + "cmt_msg": "random32: update the net random state on interrupt and activity" }, - "CVE-2023-3776": { - "cmt_msg": "net/sched: cls_fw: Fix improper refcount update leads to use-after-free", - "cmt_id": "fa020e39526994c7248f241f75d615b0df5d7671" + "CVE-2021-33631": { + "cmt_msg": "ext4: fix kernel BUG in 'ext4_write_inline_data_end()'" }, - "CVE-2023-3117": { - "cmt_msg": "netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE", - "cmt_id": "d19a80db742ceffc8d92a0cf78885f60d10c6a6d" + "CVE-2019-15916": { + "cmt_msg": "net-sysfs: Fix mem leak in netdev_register_kobject" }, - "CVE-2023-40283": { - "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb", - "cmt_id": "51822644a047eac2310fab0799b64e3430b5a111" + "CVE-2019-15917": { + "cmt_msg": "Bluetooth: hci_ldisc: Postpone HCI_UART_PROTO_READY bit set in hci_uart_set_proto()" }, - "CVE-2023-4132": { - "cmt_msg": "media: usb: siano: Fix warning due to null work_func_t function pointer", - "cmt_id": "45224862e49e1fde86cbd26c7612f029b4e2e662" - } - }, - "4.14.324": { - "CVE-2023-39194": { - "cmt_msg": "net: xfrm: Fix xfrm_address_filter OOB read", - "cmt_id": "0a42d1335985f9ebfbc997944ba8b1d84b9b661e" + "CVE-2019-15918": { + "cmt_msg": "cifs: Fix lease buffer length error" }, - "CVE-2023-3772": { - "cmt_msg": "xfrm: add NULL check in xfrm_update_ae_params", - "cmt_id": "ed1cba039309c80b49719fcff3e3d7cdddb73d96" - } - }, - "4.14.326": { - "CVE-2023-4921": { - "cmt_msg": "net: sched: sch_qfq: Fix UAF in qfq_dequeue()", - "cmt_id": "d9f43fc5a78d1505733d3621cd4c044eaf71a02f" + "CVE-2024-26648": { + "cmt_msg": "drm/amd/display: Fix variable deferencing before NULL check in edp_setup_replay()" }, - "CVE-2023-42755": { - "cmt_msg": "net/sched: Retire rsvp classifier", - "cmt_id": "a048f77ba9cf7f77a06b2ee60446c6cc061c2daf" + "CVE-2024-26646": { + "cmt_msg": "thermal: intel: hfi: Add syscore callbacks for system-wide PM" }, - "CVE-2023-42752": { - "cmt_msg": "igmp: limit igmpv3_newpack() packet size to IP_MAX_MTU", - "cmt_id": "afd2657ba7af6d05afd6cc6b9315c091fafed14b" + "CVE-2018-18690": { + "cmt_msg": "xfs: don't fail when converting shortform attr to long form during ATTR_REPLACE" }, - "CVE-2023-4207": { - "cmt_msg": "net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free", - "cmt_id": "530a85ea747965b7c275fa44a364916e0ec2efaa" + "CVE-2024-26644": { + "cmt_msg": "btrfs: don't abort filesystem when attempting to snapshot deleted subvolume" }, - "CVE-2023-45871": { - "cmt_msg": "igb: set max size RX buffer when store bad packet is enabled", - "cmt_id": "017d5c8eef06178e4148db273df03b7ad9eeb5bc" + "CVE-2024-26642": { + "cmt_msg": "netfilter: nf_tables: disallow anonymous set with timeout flag" }, - "CVE-2023-39193": { - "cmt_msg": "netfilter: xt_sctp: validate the flag_info count", - "cmt_id": "be52e3c14651ade0f4539f319f9f0c40a230b076" + "CVE-2024-26641": { + "cmt_msg": "ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv()" }, - "CVE-2023-39192": { - "cmt_msg": "netfilter: xt_u32: validate user space input", - "cmt_id": "e416d65ff456066d60d813c540ab2dd2a06d3d12" - } - }, - "4.14.327": { - "CVE-2023-4623": { - "cmt_msg": "net/sched: sch_hfsc: Ensure inner classes have fsc curve", - "cmt_id": "3c0bd0b79733b7f628af1c967269db339eeef8d3" + "CVE-2023-52464": { + "cmt_msg": "EDAC/thunderx: Fix possible out-of-bounds string access" }, - "CVE-2023-31085": { - "cmt_msg": "ubi: Refuse attaching if mtd's erasesize is 0", - "cmt_id": "ef7a4c97a85ab1bff7abc98f885678bd33bb4881" - } - }, - "4.14.328": { - "CVE-2023-46343": { - "cmt_msg": "nfc: nci: fix possible NULL pointer dereference in send_acknowledge()", - "cmt_id": "2b2edf089df3a69f0072c6e71563394c5a94e62e" + "CVE-2020-8834": { + "cmt_msg": "KVM: PPC: Book3S HV: Factor fake-suspend handling out of kvmppc_save/restore_tm" }, - "CVE-2023-5717": { - "cmt_msg": "perf: Disallow mis-matched inherited group reads", - "cmt_id": "555e15e93f6dbb8ce6b5b92e5272473abfe8bd2b" - } - }, - "4.14.329": { - "CVE-2023-3567": { - "cmt_msg": "vc_screen: move load of struct vc_data pointer in vcs_read() to avoid UAF", - "cmt_id": "af79ea9a2443016f64d8fd8d72020cc874f0e066" + "CVE-2018-25020": { + "cmt_msg": "bpf: fix truncated jump targets on heavy expansions" }, - "CVE-2021-44879": { - "cmt_msg": "f2fs: fix to do sanity check on inode type during garbage collection", - "cmt_id": "a481db81e7ead1369acca8e13b6939778cb7d2c5" + "CVE-2023-52469": { + "cmt_msg": "drivers/amd/pm: fix a use-after-free in kv_parse_power_table" }, - "CVE-2023-45863": { - "cmt_msg": "kobject: Fix slab-out-of-bounds in fill_kobj_path()", - "cmt_id": "b43cf5ad5241d6f33a02c93271a282d5ed6c4cce" - } - }, - "4.14.331": { - "CVE-2023-0590": { - "cmt_msg": "net: sched: fix race condition in qdisc_graft()", - "cmt_id": "42c50c7efcd1d263455438b81fe9388e685bfb66" - } - }, - "4.14.332": { - "CVE-2024-0584": { - "cmt_msg": "ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet", - "cmt_id": "be70b329c7fcb4a90c33546dc7c34bff07975b60" + "CVE-2021-46904": { + "cmt_msg": "net: hso: fix null-ptr-deref during tty device unregistration" }, - "CVE-2023-6932": { - "cmt_msg": "ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet", - "cmt_id": "be70b329c7fcb4a90c33546dc7c34bff07975b60" - } - }, - "4.14.334": { - "CVE-2023-51782": { - "cmt_msg": "net/rose: Fix Use-After-Free in rose_ioctl", - "cmt_id": "02af3c8ab5cda2633b187bd18b5dc2b9f0af0859" + "CVE-2022-0617": { + "cmt_msg": "udf: Fix NULL ptr deref when converting from inline format" }, - "CVE-2023-51780": { - "cmt_msg": "atm: Fix Use-After-Free in do_vcc_ioctl", - "cmt_id": "3ddeb55deec5e0e324d0ab8cc2ddd528518ea12d" + "CVE-2023-4459": { + "cmt_msg": "net: vmxnet3: fix possible NULL pointer dereference in vmxnet3_rq_cleanup()" }, - "CVE-2023-51781": { - "cmt_msg": "appletalk: Fix Use-After-Free in atalk_ioctl", - "cmt_id": "0686da1ada51c787610185de6289d8a5006ad263" - } - }, - "outstanding": { - "CVE-2023-20593": { - "cmt_msg": "x86/cpu/amd: Add a Zenbleed fix" + "CVE-2022-20566": { + "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free caused by l2cap_chan_put" }, - "CVE-2024-23307": { - "cmt_msg": "" + "CVE-2022-20565": { + "cmt_msg": "HID: core: Correctly handle ReportSize being zero" }, - "CVE-2021-0929": { - "cmt_msg": "staging/android/ion: delete dma_buf->kmap/unmap implemenation" + "CVE-2023-1990": { + "cmt_msg": "nfc: st-nci: Fix use after free bug in ndlc_remove due to race condition" }, - "CVE-2023-3022": { - "cmt_msg": "ipv6: Use result arg in fib_lookup_arg consistently" + "CVE-2021-33098": { + "cmt_msg": "ixgbe: fix large MTU request from VF" }, - "CVE-2020-26556": { - "cmt_msg": "" + "CVE-2022-48619": { + "cmt_msg": "Input: add bounds checking to input_set_capability()" }, - "CVE-2020-26557": { - "cmt_msg": "" + "CVE-2019-3882": { + "cmt_msg": "vfio/type1: Limit DMA mappings per container" }, - "CVE-2019-20794": { - "cmt_msg": "" + "CVE-2021-47070": { + "cmt_msg": "uio_hv_generic: Fix another memory leak in error handling paths" }, - "CVE-2020-26559": { - "cmt_msg": "" + "CVE-2021-47073": { + "cmt_msg": "platform/x86: dell-smbios-wmi: Fix oops on rmmod dell_smbios" }, - "CVE-2020-35501": { - "cmt_msg": "" + "CVE-2021-47075": { + "cmt_msg": "nvmet: fix memory leak in nvmet_alloc_ctrl()" }, - "CVE-2022-0168": { - "cmt_msg": "cifs: fix NULL ptr dereference in smb2_ioctl_query_info()" + "CVE-2021-47074": { + "cmt_msg": "nvme-loop: fix memory leak in nvme_loop_create_ctrl()" }, - "CVE-2022-20424": { - "cmt_msg": "io_uring: remove io_identity" + "CVE-2021-47077": { + "cmt_msg": "scsi: qedf: Add pointer checks in qedf_update_link_speed()" }, - "CVE-2023-52458": { - "cmt_msg": "block: add check that partition length needs to be aligned with block size" + "CVE-2021-47076": { + "cmt_msg": "RDMA/rxe: Return CQE error if invalid lkey was supplied" }, - "CVE-2018-20854": { - "cmt_msg": "phy: ocelot-serdes: fix out-of-bounds read" + "CVE-2021-47078": { + "cmt_msg": "RDMA/rxe: Clear all QP fields if creation failed" }, - "CVE-2018-20855": { - "cmt_msg": "IB/mlx5: Fix leaking stack memory to userspace" + "CVE-2019-10638": { + "cmt_msg": "inet: switch IP ID generator to siphash" }, - "CVE-2023-2007": { - "cmt_msg": "scsi: dpt_i2o: Remove obsolete driver" + "CVE-2019-10639": { + "cmt_msg": "netns: provide pure entropy for net_hash_mix()" }, - "CVE-2023-52451": { - "cmt_msg": "powerpc/pseries/memhp: Fix access beyond end of drmem array" + "CVE-2024-26676": { + "cmt_msg": "af_unix: Call kfree_skb() for dead unix_(sk)->oob_skb in GC." }, - "CVE-2019-19378": { - "cmt_msg": "" + "CVE-2024-26675": { + "cmt_msg": "ppp_async: limit MRU to 64K" }, - "CVE-2022-25265": { + "CVE-2020-26557": { "cmt_msg": "" }, - "CVE-2022-3061": { - "cmt_msg": "video: fbdev: i740fb: Error out if 'pixclock' equals zero" - }, - "CVE-2024-1086": { - "cmt_msg": "netfilter: nf_tables: reject QUEUE/DROP verdict parameters" - }, - "CVE-2022-47520": { - "cmt_msg": "wifi: wilc1000: validate pairwise and authentication suite offsets" + "CVE-2024-26779": { + "cmt_msg": "wifi: mac80211: fix race condition on enabling fast-xmit" }, - "CVE-2019-19377": { - "cmt_msg": "btrfs: Don't submit any btree write bio if the fs has errors" + "CVE-2020-26558": { + "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical" }, - "CVE-2019-2181": { - "cmt_msg": "binder: check for overflow when alloc for security context" + "CVE-2018-9516": { + "cmt_msg": "HID: debug: check length before copy_to_user()" }, - "CVE-2023-6915": { - "cmt_msg": "ida: Fix crash in ida_free when the bitmap is empty" + "CVE-2021-20317": { + "cmt_msg": "lib/timerqueue: Rely on rbtree semantics for next timer" }, - "CVE-2021-3759": { - "cmt_msg": "memcg: enable accounting of ipc resources" + "CVE-2018-1094": { + "cmt_msg": "ext4: always initialize the crc32c checksum driver" }, - "CVE-2020-27820": { - "cmt_msg": "drm/nouveau: use drm_dev_unplug() during device removal" + "CVE-2024-26772": { + "cmt_msg": "ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal()" }, - "CVE-2024-25744": { - "cmt_msg": "x86/coco: Disable 32-bit emulation by default on TDX and SEV" + "CVE-2018-1092": { + "cmt_msg": "ext4: fail ext4_iget for root directory if unallocated" }, - "CVE-2020-24503": { - "cmt_msg": "" + "CVE-2018-1093": { + "cmt_msg": "ext4: add validity checks for bitmap block numbers" }, - "CVE-2020-24502": { + "CVE-2021-3864": { "cmt_msg": "" }, - "CVE-2023-39197": { - "cmt_msg": "netfilter: conntrack: dccp: copy entire header to stack buffer, not just basic one" + "CVE-2019-19054": { + "cmt_msg": "media: rc: prevent memory leak in cx23888_ir_probe" }, - "CVE-2019-19449": { - "cmt_msg": "f2fs: fix to do sanity check on segment/section count" + "CVE-2019-19057": { + "cmt_msg": "mwifiex: pcie: Fix memory leak in mwifiex_pcie_init_evt_ring" }, - "CVE-2020-26541": { - "cmt_msg": "certs: Add EFI_CERT_X509_GUID support for dbx entries" + "CVE-2019-19056": { + "cmt_msg": "mwifiex: pcie: Fix memory leak in mwifiex_pcie_alloc_cmdrsp_buf" }, - "CVE-2023-6610": { - "cmt_msg": "smb: client: fix potential OOB in smb2_dump_detail()" + "CVE-2019-19052": { + "cmt_msg": "can: gs_usb: gs_can_open(): prevent memory leak" }, - "CVE-2020-11725": { - "cmt_msg": "" + "CVE-2019-3846": { + "cmt_msg": "mwifiex: Fix possible buffer overflows at parsing bss descriptor" }, - "CVE-2023-31084": { - "cmt_msg": "media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*()" + "CVE-2019-19058": { + "cmt_msg": "iwlwifi: dbg_ini: fix memory leak in alloc_sgtable" }, - "CVE-2022-0382": { - "cmt_msg": "net ticp:fix a kernel-infoleak in __tipc_sendmsg()" + "CVE-2018-5391": { + "cmt_msg": "ip: discard IPv4 datagrams with overlapping segments." }, - "CVE-2023-1249": { - "cmt_msg": "coredump: Use the vma snapshot in fill_files_note" + "CVE-2018-5390": { + "cmt_msg": "tcp: free batches of packets in tcp_prune_ofo_queue()" }, - "CVE-2022-23825": { + "CVE-2023-20941": { "cmt_msg": "" }, - "CVE-2021-33061": { - "cmt_msg": "ixgbe: add improvement for MDD response functionality" - }, - "CVE-2022-1263": { - "cmt_msg": "KVM: avoid NULL pointer dereference in kvm_dirty_ring_push" - }, - "CVE-2021-35477": { - "cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4" - }, - "CVE-2023-1476": { - "cmt_msg": "" + "CVE-2018-20836": { + "cmt_msg": "scsi: libsas: fix a race condition when smp task timeout" }, - "CVE-2023-4010": { - "cmt_msg": "" + "CVE-2020-10135": { + "cmt_msg": "Bluetooth: Consolidate encryption handling in hci_encrypt_cfm" }, - "CVE-2019-15222": { - "cmt_msg": "ALSA: usb-audio: Fix gpf in snd_usb_pipe_sanity_check" + "CVE-2020-36766": { + "cmt_msg": "cec-api: prevent leaking memory through hole in structure" }, - "CVE-2019-15223": { - "cmt_msg": "ALSA: line6: Assure canceling delayed work at disconnection" + "CVE-2023-28328": { + "cmt_msg": "media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer()" }, - "CVE-2021-3864": { + "CVE-2017-13693": { "cmt_msg": "" }, - "CVE-2019-19815": { - "cmt_msg": "f2fs: support swap file w/ DIO" + "CVE-2017-13695": { + "cmt_msg": "ACPICA: acpi: acpica: fix acpi operand cache leak in nseval.c" }, - "CVE-2019-19814": { + "CVE-2017-13694": { "cmt_msg": "" }, - "CVE-2022-2209": { - "cmt_msg": "" + "CVE-2021-3640": { + "cmt_msg": "Bluetooth: sco: Fix lock_sock() blockage by memcpy_from_msg()" }, - "CVE-2019-19241": { - "cmt_msg": "io_uring: async workers should inherit the user creds" + "CVE-2020-11608": { + "cmt_msg": "media: ov519: add missing endpoint sanity checks" }, - "CVE-2023-51043": { - "cmt_msg": "drm/atomic: Fix potential use-after-free in nonblocking commits" + "CVE-2020-10732": { + "cmt_msg": "fs/binfmt_elf.c: allocate initialized memory in fill_thread_core_info()" }, - "CVE-2024-23848": { - "cmt_msg": "" + "CVE-2019-16921": { + "cmt_msg": "RDMA/hns: Fix init resp when alloc ucontext" }, - "CVE-2023-7042": { - "cmt_msg": "" + "CVE-2021-0512": { + "cmt_msg": "HID: make arrays usage and value to be the same" }, - "CVE-2022-3595": { - "cmt_msg": "cifs: fix double-fault crash during ntlmssp" + "CVE-2022-41222": { + "cmt_msg": "mm/mremap: hold the rmap lock in write mode when moving page table entries." }, - "CVE-2021-43975": { - "cmt_msg": "atlantic: Fix OOB read and write in hw_atl_utils_fw_rpc_wait" + "CVE-2024-26720": { + "cmt_msg": "mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again" }, - "CVE-2022-3115": { - "cmt_msg": "drm: mali-dp: potential dereference of null pointer" + "CVE-2024-26726": { + "cmt_msg": "btrfs: don't drop extent_map for free space inode on write error" }, - "CVE-2023-47233": { - "cmt_msg": "" + "CVE-2019-6974": { + "cmt_msg": "kvm: fix kvm_ioctl_create_device() reference counting (CVE-2019-6974)" }, - "CVE-2023-23000": { - "cmt_msg": "phy: tegra: xusb: Fix return value of tegra_xusb_find_port_node function" + "CVE-2023-2985": { + "cmt_msg": "fs: hfsplus: fix UAF issue in hfsplus_put_super" }, - "CVE-2023-6606": { - "cmt_msg": "smb: client: fix OOB in smbCalcSize()" + "CVE-2024-26700": { + "cmt_msg": "drm/amd/display: Fix MST Null Ptr for RV" }, - "CVE-2024-23851": { - "cmt_msg": "dm: limit the number of targets and parameter size area" + "CVE-2023-52519": { + "cmt_msg": "HID: intel-ish-hid: ipc: Disable and reenable ACPI GPE bit" }, - "CVE-2016-8660": { - "cmt_msg": "" + "CVE-2023-52516": { + "cmt_msg": "dma-debug: don't call __dma_entry_alloc_check_leak() under free_entries_lock" }, - "CVE-2023-0597": { - "cmt_msg": "x86/mm: Randomize per-cpu entry area" + "CVE-2023-52517": { + "cmt_msg": "spi: sun6i: fix race between DMA RX transfer completion and RX FIFO drain" }, - "CVE-2019-12379": { - "cmt_msg": "consolemap: Fix a memory leaking bug in drivers/tty/vt/consolemap.c" + "CVE-2023-52515": { + "cmt_msg": "RDMA/srp: Do not call scsi_done() from srp_abort()" }, - "CVE-2019-12378": { - "cmt_msg": "ipv6_sockglue: Fix a missing-check bug in ip6_ra_control()" + "CVE-2019-15902": { + "cmt_msg": "unknown" }, - "CVE-2023-1582": { - "cmt_msg": "fs/proc: task_mmu.c: don't read mapcount for migration entry" + "CVE-2023-52510": { + "cmt_msg": "ieee802154: ca8210: Fix a potential UAF in ca8210_probe" }, - "CVE-2022-1786": { - "cmt_msg": "io_uring: remove io_identity" + "CVE-2023-52511": { + "cmt_msg": "spi: sun6i: reduce DMA RX transfer width to single byte" }, - "CVE-2024-26592": { - "cmt_msg": "ksmbd: fix UAF issue in ksmbd_tcp_new_connection()" + "CVE-2019-20054": { + "cmt_msg": "fs/proc/proc_sysctl.c: fix NULL pointer dereference in put_links" }, - "CVE-2018-12929": { - "cmt_msg": "" + "CVE-2021-33624": { + "cmt_msg": "bpf: Inherit expanded/patched seen count from old aux data" }, - "CVE-2022-45885": { + "CVE-2018-17977": { "cmt_msg": "" }, - "CVE-2020-15802": { - "cmt_msg": "" + "CVE-2024-26659": { + "cmt_msg": "xhci: handle isoc Babble and Buffer Overrun events properly" }, - "CVE-2022-3522": { - "cmt_msg": "mm/hugetlb: use hugetlb_pte_stable in migration race check" + "CVE-2024-26658": { + "cmt_msg": "bcachefs: grab s_umount only if snapshotting" }, - "CVE-2008-2544": { + "CVE-2010-5321": { "cmt_msg": "" }, - "CVE-2024-26595": { - "cmt_msg": "mlxsw: spectrum_acl_tcam: Fix NULL pointer dereference in error path" - }, - "CVE-2022-3636": { - "cmt_msg": "net: ethernet: mtk_eth_soc: use after free in __mtk_ppe_check_skb()" - }, - "CVE-2024-26598": { - "cmt_msg": "KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache" - }, - "CVE-2023-52457": { - "cmt_msg": "serial: 8250: omap: Don't skip resource freeing if pm_runtime_resume_and_get() failed" - }, - "CVE-2023-6356": { - "cmt_msg": "" + "CVE-2024-26655": { + "cmt_msg": "Fix memory leak in posix_clock_open()" }, - "CVE-2019-20908": { - "cmt_msg": "efi: Restrict efivar_ssdt_load when the kernel is locked down" + "CVE-2024-26654": { + "cmt_msg": "ALSA: sh: aica: reorder cleanup operations to avoid UAF bugs" }, - "CVE-2018-7754": { - "cmt_msg": "printk: hash addresses printed with %p" + "CVE-2024-26656": { + "cmt_msg": "drm/amdgpu: fix use-after-free bug" }, - "CVE-2018-1121": { - "cmt_msg": "" + "CVE-2024-26651": { + "cmt_msg": "sr9800: Add check for usbnet_get_endpoints" }, - "CVE-2007-3719": { - "cmt_msg": "" + "CVE-2024-26650": { + "cmt_msg": "platform/x86: p2sb: Allow p2sb_bar() calls during PCI device probe" }, - "CVE-2023-52434": { - "cmt_msg": "smb: client: fix potential OOBs in smb2_parse_contexts()" + "CVE-2022-1048": { + "cmt_msg": "ALSA: pcm: Fix races among concurrent hw_params and hw_free calls" }, - "CVE-2021-4037": { - "cmt_msg": "xfs: fix up non-directory creation in SGID directories" + "CVE-2023-52475": { + "cmt_msg": "Input: powermate - fix use-after-free in powermate_config_complete" }, - "CVE-2023-52436": { - "cmt_msg": "f2fs: explicitly null-terminate the xattr list" + "CVE-2021-0342": { + "cmt_msg": "tun: correct header offsets in napi frags mode" }, - "CVE-2022-45884": { - "cmt_msg": "" + "CVE-2023-52477": { + "cmt_msg": "usb: hub: Guard against accesses to uninitialized BOS descriptors" }, - "CVE-2023-3397": { - "cmt_msg": "" + "CVE-2023-52476": { + "cmt_msg": "perf/x86/lbr: Filter vsyscall addresses" }, - "CVE-2019-9444": { - "cmt_msg": "printk: hash addresses printed with %p" + "CVE-2023-52470": { + "cmt_msg": "drm/radeon: check the alloc_workqueue return value in radeon_crtc_init()" }, - "CVE-2022-2961": { - "cmt_msg": "" + "CVE-2023-52479": { + "cmt_msg": "ksmbd: fix uaf in smb20_oplock_break_ack" }, - "CVE-2021-3506": { - "cmt_msg": "f2fs: fix to avoid out-of-bounds memory access" + "CVE-2023-52478": { + "cmt_msg": "HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect" }, - "CVE-2019-19067": { - "cmt_msg": "drm/amdgpu: fix multiple memory leaks in acp_hw_init" + "CVE-2022-26365": { + "cmt_msg": "xen/blkfront: fix leaking data in shared pages" }, - "CVE-2023-20941": { - "cmt_msg": "" + "CVE-2020-12652": { + "cmt_msg": "scsi: mptfusion: Fix double fetch bug in ioctl" }, - "CVE-2024-23849": { - "cmt_msg": "net/rds: Fix UBSAN: array-index-out-of-bounds in rds_cmsg_recv" + "CVE-2020-12653": { + "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_cmd_append_vsie_tlv()" }, - "CVE-2022-1247": { - "cmt_msg": "" + "CVE-2020-12656": { + "cmt_msg": "sunrpc: check that domain table is empty at module unload." }, - "CVE-2023-51779": { - "cmt_msg": "Bluetooth: af_bluetooth: Fix Use-After-Free in bt_sock_recvmsg" + "CVE-2020-12657": { + "cmt_msg": "block, bfq: fix use-after-free in bfq_idle_slice_timer_body" }, - "CVE-2019-3874": { - "cmt_msg": "sctp: implement memory accounting on tx path" + "CVE-2020-12654": { + "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_ret_wmm_get_status()" }, - "CVE-2020-26145": { - "cmt_msg": "ath10k: drop fragments with multicast DA for PCIe" + "CVE-2020-12655": { + "cmt_msg": "xfs: add agf freeblocks verify in xfs_agf_verify" }, - "CVE-2023-6040": { - "cmt_msg": "netfilter: nf_tables: Reject tables of unsupported family" + "CVE-2022-45887": { + "cmt_msg": "media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb()" }, - "CVE-2022-29901": { - "cmt_msg": "x86/kvm/vmx: Make noinstr clean" + "CVE-2022-4744": { + "cmt_msg": "tun: avoid double free in tun_free_netdev" }, - "CVE-2010-4563": { + "CVE-2022-0400": { "cmt_msg": "" }, - "CVE-2020-26140": { - "cmt_msg": "" + "CVE-2022-45886": { + "cmt_msg": "media: dvb-core: Fix use-after-free due on race condition at dvb_net" }, - "CVE-2020-26143": { - "cmt_msg": "" + "CVE-2022-26966": { + "cmt_msg": "sr9700: sanity check for packet length" }, - "CVE-2020-26142": { - "cmt_msg": "" + "CVE-2023-1989": { + "cmt_msg": "Bluetooth: btsdio: fix use after free bug in btsdio_remove due to unfinished work" }, - "CVE-2023-1076": { - "cmt_msg": "tun: tun_chr_open(): correctly initialize socket uid" + "CVE-2022-25265": { + "cmt_msg": "" }, - "CVE-2023-1077": { - "cmt_msg": "sched/rt: pick_next_rt_entity(): check list_entry" + "CVE-2019-15220": { + "cmt_msg": "p54usb: Fix race between disconnect and firmware loading" }, - "CVE-2023-46838": { - "cmt_msg": "xen-netback: don't produce zero-size SKB frags" + "CVE-2020-11609": { + "cmt_msg": "media: stv06xx: add missing descriptor sanity checks" }, - "CVE-2017-9986": { - "cmt_msg": "sound: Retire OSS" + "CVE-2020-25284": { + "cmt_msg": "rbd: require global CAP_SYS_ADMIN for mapping and unmapping" }, - "CVE-2023-4622": { - "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES" + "CVE-2023-4208": { + "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free" }, - "CVE-2021-34556": { - "cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4" + "CVE-2023-4206": { + "cmt_msg": "net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free" }, - "CVE-2022-3533": { - "cmt_msg": "" + "CVE-2023-4207": { + "cmt_msg": "net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free" }, - "CVE-2022-3534": { - "cmt_msg": "libbpf: Fix use-after-free in btf_dump_name_dups" + "CVE-2021-47049": { + "cmt_msg": "Drivers: hv: vmbus: Use after free in __vmbus_open()" }, - "CVE-2024-26584": { - "cmt_msg": "net: tls: handle backlogging of crypto requests" + "CVE-2021-47046": { + "cmt_msg": "drm/amd/display: Fix off by one in hdmi_14_process_transaction()" }, - "CVE-2024-26587": { - "cmt_msg": "net: netdevsim: don't try to destroy PHC on VFs" + "CVE-2020-29370": { + "cmt_msg": "mm: slub: add missing TID bump in kmem_cache_alloc_bulk()" }, - "CVE-2018-13095": { - "cmt_msg": "xfs: More robust inode extent count validation" + "CVE-2022-20424": { + "cmt_msg": "io_uring: remove io_identity" }, - "CVE-2022-2991": { - "cmt_msg": "remove the lightnvm subsystem" + "CVE-2022-20422": { + "cmt_msg": "arm64: fix oops in concurrently setting insn_emulation sysctls" }, - "CVE-2024-26588": { - "cmt_msg": "LoongArch: BPF: Prevent out-of-bounds memory access" + "CVE-2022-20421": { + "cmt_msg": "binder: fix UAF of ref->proc caused by race condition" }, - "CVE-2023-6270": { - "cmt_msg": "" + "CVE-2022-45934": { + "cmt_msg": "Bluetooth: L2CAP: Fix u8 overflow" }, - "CVE-2022-3624": { - "cmt_msg": "bonding: fix reference count leak in balance-alb mode" + "CVE-2021-4197": { + "cmt_msg": "cgroup: Use open-time credentials for process migraton perm checks" }, - "CVE-2022-3606": { + "CVE-2020-24503": { "cmt_msg": "" }, - "CVE-2021-3669": { - "cmt_msg": "ipc: replace costly bailout check in sysvipc_find_ipc()" - }, - "CVE-2019-18885": { - "cmt_msg": "btrfs: merge btrfs_find_device and find_device" - }, - "CVE-2020-10708": { + "CVE-2020-24502": { "cmt_msg": "" }, - "CVE-2018-7273": { - "cmt_msg": "printk: hash addresses printed with %p" - }, - "CVE-2021-4023": { - "cmt_msg": "io-wq: fix cancellation on create-worker failure" + "CVE-2024-26774": { + "cmt_msg": "ext4: avoid dividing by 0 in mb_update_avg_fragment_size() when block bitmap corrupt" }, - "CVE-2023-6121": { - "cmt_msg": "nvmet: nul-terminate the NQNs passed in the connect command" + "CVE-2023-31436": { + "cmt_msg": "net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg" }, - "CVE-2022-4543": { - "cmt_msg": "" + "CVE-2019-8980": { + "cmt_msg": "exec: Fix mem leak in kernel_read_file" }, - "CVE-2024-22386": { - "cmt_msg": "" + "CVE-2024-26775": { + "cmt_msg": "aoe: avoid potential deadlock at set_capacity" }, - "CVE-2019-18680": { - "cmt_msg": "" + "CVE-2018-14609": { + "cmt_msg": "btrfs: relocation: Only remove reloc rb_trees if reloc control has been initialized" }, - "CVE-2017-13693": { - "cmt_msg": "" + "CVE-2024-23851": { + "cmt_msg": "dm: limit the number of targets and parameter size area" }, - "CVE-2021-0399": { - "cmt_msg": "" + "CVE-2020-27777": { + "cmt_msg": "powerpc/rtas: Restrict RTAS requests from userspace" }, - "CVE-2020-36691": { - "cmt_msg": "netlink: limit recursion depth in policy validation" + "CVE-2019-11486": { + "cmt_msg": "tty: mark Siemens R3964 line discipline as BROKEN" }, - "CVE-2017-13694": { - "cmt_msg": "" + "CVE-2019-11487": { + "cmt_msg": "fs: prevent page refcount overflow in pipe_buf_get" }, - "CVE-2024-0564": { - "cmt_msg": "" + "CVE-2018-8043": { + "cmt_msg": "net: phy: mdio-bcm-unimac: fix potential NULL dereference in unimac_mdio_probe()" }, - "CVE-2012-4542": { - "cmt_msg": "" + "CVE-2019-20908": { + "cmt_msg": "efi: Restrict efivar_ssdt_load when the kernel is locked down" }, - "CVE-2023-4881": { - "cmt_msg": "netfilter: nftables: exthdr: fix 4-byte stack OOB write" + "CVE-2019-19060": { + "cmt_msg": "iio: imu: adis16400: release allocated memory on failure" }, - "CVE-2023-2176": { - "cmt_msg": "RDMA/core: Refactor rdma_bind_addr" + "CVE-2019-19061": { + "cmt_msg": "iio: imu: adis16400: fix memory leak" }, - "CVE-2013-7445": { - "cmt_msg": "" + "CVE-2019-19062": { + "cmt_msg": "crypto: user - fix memory leak in crypto_report" }, - "CVE-2019-19036": { - "cmt_msg": "btrfs: Detect unbalanced tree with empty leaf before crashing btree operations" + "CVE-2019-19063": { + "cmt_msg": "rtlwifi: prevent memory leak in rtl_usb_probe" }, - "CVE-2022-27672": { - "cmt_msg": "x86/speculation: Identify processors vulnerable to SMT RSB predictions" + "CVE-2019-19065": { + "cmt_msg": "RDMA/hfi1: Prevent memory leak in sdma_init" }, - "CVE-2023-52435": { - "cmt_msg": "net: prevent mss overflow in skb_segment()" + "CVE-2019-19066": { + "cmt_msg": "scsi: bfa: release allocated memory in case of error" }, - "CVE-2024-24859": { - "cmt_msg": "" + "CVE-2019-19067": { + "cmt_msg": "drm/amdgpu: fix multiple memory leaks in acp_hw_init" }, - "CVE-2024-24858": { - "cmt_msg": "" + "CVE-2019-19068": { + "cmt_msg": "rtl8xxxu: prevent leaking urb" }, - "CVE-2005-3660": { - "cmt_msg": "" + "CVE-2019-3874": { + "cmt_msg": "sctp: implement memory accounting on tx path" }, - "CVE-2024-24855": { - "cmt_msg": "scsi: lpfc: Fix a possible data race in lpfc_unregister_fcf_rescan()" + "CVE-2020-36516": { + "cmt_msg": "ipv4: avoid using shared IP generator for connected sockets" }, - "CVE-2024-24857": { + "CVE-2012-4542": { "cmt_msg": "" }, - "CVE-2023-0386": { - "cmt_msg": "ovl: fail on invalid uid/gid mapping at copy up" - }, - "CVE-2023-31083": { - "cmt_msg": "Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO" + "CVE-2018-1000026": { + "cmt_msg": "bnx2x: disable GSO where gso_size is too big for hardware" }, - "CVE-2023-31082": { - "cmt_msg": "" + "CVE-2020-36777": { + "cmt_msg": "media: dvbdev: Fix memory leak in dvb_media_device_free()" }, - "CVE-2023-31081": { - "cmt_msg": "" + "CVE-2020-36775": { + "cmt_msg": "f2fs: fix to avoid potential deadlock" }, - "CVE-2022-38096": { - "cmt_msg": "" + "CVE-2021-20292": { + "cmt_msg": "drm/ttm/nouveau: don't call tt destroy callback on alloc failure." }, - "CVE-2024-26591": { - "cmt_msg": "bpf: Fix re-attachment branch in bpf_tracing_prog_attach" + "CVE-2023-2269": { + "cmt_msg": "dm ioctl: fix nested locking in table_clear() to remove deadlock concern" }, - "CVE-2019-19927": { - "cmt_msg": "drm/ttm: fix incrementing the page pointer for huge pages" + "CVE-2020-10690": { + "cmt_msg": "ptp: fix the race between the release of ptp_clock and cdev" }, - "CVE-2022-3903": { - "cmt_msg": "media: mceusb: Use new usb_control_msg_*() routines" + "CVE-2021-3659": { + "cmt_msg": "net: mac802154: Fix general protection fault" }, - "CVE-2019-16921": { - "cmt_msg": "RDMA/hns: Fix init resp when alloc ucontext" + "CVE-2021-3653": { + "cmt_msg": "KVM: nSVM: avoid picking up unsupported bits from L2 in int_ctl (CVE-2021-3653)" }, - "CVE-2022-44032": { - "cmt_msg": "char: pcmcia: remove all the drivers" + "CVE-2021-3655": { + "cmt_msg": "sctp: validate from_addr_param return" }, - "CVE-2022-3344": { - "cmt_msg": "KVM: x86: nSVM: harden svm_free_nested against freeing vmcb02 while still in use" + "CVE-2021-3656": { + "cmt_msg": "KVM: nSVM: always intercept VMLOAD/VMSAVE when nested (CVE-2021-3656)" }, - "CVE-2022-3303": { - "cmt_msg": "ALSA: pcm: oss: Fix race at SNDCTL_DSP_SYNC" + "CVE-2019-12614": { + "cmt_msg": "powerpc/pseries/dlpar: Fix a missing check in dlpar_parse_cc_property()" }, - "CVE-2023-28466": { - "cmt_msg": "net: tls: fix possible race condition between do_tls_getsockopt_conf() and do_tls_setsockopt_conf()" + "CVE-2019-12615": { + "cmt_msg": "mdesc: fix a missing-check bug in get_vdev_port_node_info()" }, - "CVE-2022-36402": { - "cmt_msg": "drm/vmwgfx: Fix shader stage validation" + "CVE-2021-3896": { + "cmt_msg": "isdn: cpai: check ctr->cnr to avoid array index out of bound" }, - "CVE-2023-5178": { - "cmt_msg": "nvmet-tcp: Fix a possible UAF in queue intialization setup" + "CVE-2021-3894": { + "cmt_msg": "sctp: account stream padding length for reconf chunk" }, - "CVE-2008-4609": { + "CVE-2021-3892": { "cmt_msg": "" }, - "CVE-2021-4150": { - "cmt_msg": "block: fix incorrect references to disk objects" + "CVE-2022-27223": { + "cmt_msg": "USB: gadget: validate endpoint index for xilinx udc" }, - "CVE-2023-1382": { - "cmt_msg": "tipc: set con sock in tipc_conn_alloc" + "CVE-2022-24958": { + "cmt_msg": "usb: gadget: don't release an existing dev->buf" }, - "CVE-2022-20148": { - "cmt_msg": "f2fs: fix UAF in f2fs_available_free_memory" + "CVE-2020-36557": { + "cmt_msg": "vt: vt_ioctl: fix VT_DISALLOCATE freeing in-use virtual console" }, - "CVE-2020-14304": { - "cmt_msg": "" + "CVE-2020-12888": { + "cmt_msg": "vfio-pci: Invalidate mmaps and block MMIO access on disabled memory" }, - "CVE-2023-6931": { - "cmt_msg": "perf: Fix perf_event_validate_size()" + "CVE-2023-2194": { + "cmt_msg": "i2c: xgene-slimpro: Fix out-of-bounds bug in xgene_slimpro_i2c_xfer()" }, - "CVE-2020-0347": { - "cmt_msg": "" + "CVE-2022-41218": { + "cmt_msg": "media: dvb-core: Fix UAF due to refcount races at releasing" }, - "CVE-2024-0607": { - "cmt_msg": "netfilter: nf_tables: fix pointer math issue in nft_byteorder_eval()" + "CVE-2019-20934": { + "cmt_msg": "sched/fair: Don't free p->numa_faults with concurrent readers" }, - "CVE-2021-29155": { - "cmt_msg": "bpf: Use correct permission flag for mixed signed bounds arithmetic" + "CVE-2022-0812": { + "cmt_msg": "xprtrdma: fix incorrect header size calculations" }, - "CVE-2021-3714": { - "cmt_msg": "" + "CVE-2021-45485": { + "cmt_msg": "ipv6: use prandom_u32() for ID generation" }, - "CVE-2019-16230": { - "cmt_msg": "drm/amdkfd: fix a potential NULL pointer dereference (v2)" + "CVE-2019-17133": { + "cmt_msg": "cfg80211: wext: avoid copying malformed SSIDs" }, - "CVE-2019-12455": { - "cmt_msg": "clk-sunxi: fix a missing-check bug in sunxi_divs_clk_setup()" + "CVE-2019-3900": { + "cmt_msg": "vhost_net: fix possible infinite loop" }, - "CVE-2019-12456": { - "cmt_msg": "" + "CVE-2022-40982": { + "cmt_msg": "x86/speculation: Add Gather Data Sampling mitigation" }, - "CVE-2020-26560": { + "CVE-2021-39801": { "cmt_msg": "" }, - "CVE-2021-3892": { + "CVE-2021-39800": { "cmt_msg": "" }, - "CVE-2023-4134": { - "cmt_msg": "Input: cyttsp4_core - change del_timer_sync() to timer_shutdown_sync()" + "CVE-2024-22099": { + "cmt_msg": "Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security" }, - "CVE-2023-39198": { - "cmt_msg": "drm/qxl: fix UAF on handle creation" + "CVE-2021-4202": { + "cmt_msg": "NFC: reorganize the functions in nci_request" }, - "CVE-2020-12362": { - "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" + "CVE-2021-4203": { + "cmt_msg": "af_unix: fix races in sk_peer_pid and sk_peer_cred accesses" }, - "CVE-2020-12363": { - "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" + "CVE-2023-52509": { + "cmt_msg": "ravb: Fix use-after-free issue in ravb_tx_timeout_work()" }, - "CVE-2022-4129": { - "cmt_msg": "l2tp: Serialize access to sk_user_data with sk_callback_lock" + "CVE-2023-46343": { + "cmt_msg": "nfc: nci: fix possible NULL pointer dereference in send_acknowledge()" }, - "CVE-2020-12364": { - "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" + "CVE-2023-52507": { + "cmt_msg": "nfc: nci: assert requested protocol is valid" }, - "CVE-2024-24860": { - "cmt_msg": "Bluetooth: Fix atomicity violation in {min,max}_key_size_set" + "CVE-2023-52506": { + "cmt_msg": "LoongArch: Set all reserved memblocks on Node#0 at initialization" }, - "CVE-2024-24861": { - "cmt_msg": "" + "CVE-2023-52501": { + "cmt_msg": "ring-buffer: Do not attempt to read past \"commit\"" }, - "CVE-2024-24864": { - "cmt_msg": "" + "CVE-2023-52500": { + "cmt_msg": "scsi: pm80xx: Avoid leaking tags when processing OPC_INB_SET_CONTROLLER_CONFIG command" }, - "CVE-2023-37454": { - "cmt_msg": "" + "CVE-2023-52502": { + "cmt_msg": "net: nfc: fix races in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn()" }, - "CVE-2023-52429": { - "cmt_msg": "dm: limit the number of targets and parameter size area" + "CVE-2023-3863": { + "cmt_msg": "net: nfc: Fix use-after-free caused by nfc_llcp_find_local" }, - "CVE-2022-0480": { - "cmt_msg": "memcg: enable accounting for file lock caches" + "CVE-2024-26668": { + "cmt_msg": "netfilter: nft_limit: reject configurations that cause integer overflow" }, - "CVE-2023-52444": { - "cmt_msg": "f2fs: fix to avoid dirent corruption" + "CVE-2024-26663": { + "cmt_msg": "tipc: Check the bearer type before calling tipc_udp_nl_bearer_add()" }, - "CVE-2022-3642": { - "cmt_msg": "" + "CVE-2024-26664": { + "cmt_msg": "hwmon: (coretemp) Fix out-of-bounds memory access" }, - "CVE-2023-6240": { - "cmt_msg": "" + "CVE-2021-38198": { + "cmt_msg": "KVM: X86: MMU: Use the correct inherited permissions to get shadow page" }, - "CVE-2023-52464": { - "cmt_msg": "EDAC/thunderx: Fix possible out-of-bounds string access" - }, - "CVE-2020-26141": { - "cmt_msg": "ath10k: Fix TKIP Michael MIC verification for PCIe" - }, - "CVE-2020-8834": { - "cmt_msg": "KVM: PPC: Book3S HV: Factor fake-suspend handling out of kvmppc_save/restore_tm" + "CVE-2021-38199": { + "cmt_msg": "NFSv4: Initialise connection to the server in nfs4_alloc_client()" }, - "CVE-2021-4218": { - "cmt_msg": "sysctl: pass kernel pointers to ->proc_handler" + "CVE-2022-1679": { + "cmt_msg": "ath9k: fix use-after-free in ath9k_hif_usb_rx_cb" }, - "CVE-2022-3567": { - "cmt_msg": "ipv6: Fix data races around sk->sk_prot." + "CVE-2023-34256": { + "cmt_msg": "ext4: avoid a potential slab-out-of-bounds in ext4_group_desc_csum" }, - "CVE-2022-23222": { - "cmt_msg": "bpf: Replace PTR_TO_XXX_OR_NULL with PTR_TO_XXX | PTR_MAYBE_NULL" + "CVE-2023-52442": { + "cmt_msg": "ksmbd: validate session id and tree id in compound request" }, - "CVE-2024-25739": { - "cmt_msg": "" + "CVE-2023-52443": { + "cmt_msg": "apparmor: avoid crash when parsed profile name is empty" }, - "CVE-2023-33288": { - "cmt_msg": "power: supply: bq24190: Fix use after free bug in bq24190_remove due to race condition" + "CVE-2023-52444": { + "cmt_msg": "f2fs: fix to avoid dirent corruption" }, - "CVE-2022-29900": { - "cmt_msg": "x86/kvm/vmx: Make noinstr clean" + "CVE-2023-52445": { + "cmt_msg": "media: pvrusb2: fix use after free on context disconnection" }, - "CVE-2019-15290": { - "cmt_msg": "" + "CVE-2023-52449": { + "cmt_msg": "mtd: Fix gluebi NULL pointer dereference caused by ftl notifier" }, - "CVE-2024-0340": { - "cmt_msg": "vhost: use kzalloc() instead of kmalloc() followed by memset()" + "CVE-2019-15807": { + "cmt_msg": "scsi: libsas: delete sas port if expander discover failed" }, - "CVE-2023-6535": { - "cmt_msg": "" + "CVE-2024-26719": { + "cmt_msg": "nouveau: offload fence uevents work to workqueue" }, - "CVE-2023-6536": { - "cmt_msg": "" + "CVE-2024-26715": { + "cmt_msg": "usb: dwc3: gadget: Fix NULL pointer dereference in dwc3_gadget_suspend" }, - "CVE-2023-52449": { - "cmt_msg": "mtd: Fix gluebi NULL pointer dereference caused by ftl notifier" + "CVE-2024-1312": { + "cmt_msg": "mm: lock_vma_under_rcu() must check vma->anon_vma under vma lock" }, - "CVE-2020-15780": { - "cmt_msg": "ACPI: configfs: Disallow loading ACPI tables when locked down" + "CVE-2019-14284": { + "cmt_msg": "floppy: fix div-by-zero in setup_format_params" }, - "CVE-2023-34255": { - "cmt_msg": "xfs: verify buffer contents when we skip log replay" + "CVE-2018-10880": { + "cmt_msg": "ext4: never move the system.data xattr out of the inode body" }, - "CVE-2022-3566": { - "cmt_msg": "tcp: Fix data races around icsk->icsk_af_ops." + "CVE-2023-3338": { + "cmt_msg": "Remove DECnet support from kernel" }, - "CVE-2018-17977": { - "cmt_msg": "" + "CVE-2018-10882": { + "cmt_msg": "ext4: add more inode number paranoia checks" }, - "CVE-2024-1151": { - "cmt_msg": "net: openvswitch: limit the number of recursions from action sets" + "CVE-2024-26713": { + "cmt_msg": "powerpc/pseries/iommu: Fix iommu initialisation during DLPAR add" }, - "CVE-2023-52456": { - "cmt_msg": "serial: imx: fix tx statemachine deadlock" + "CVE-2020-29368": { + "cmt_msg": "mm: thp: make the THP mapcount atomic against __split_huge_pmd_locked()" }, - "CVE-2022-41848": { - "cmt_msg": "" + "CVE-2020-12464": { + "cmt_msg": "USB: core: Fix free-while-in-use bug in the USB S-Glibrary" }, - "CVE-2022-1116": { - "cmt_msg": "" + "CVE-2022-47520": { + "cmt_msg": "wifi: wilc1000: validate pairwise and authentication suite offsets" }, - "CVE-2010-5321": { - "cmt_msg": "" + "CVE-2023-3159": { + "cmt_msg": "firewire: fix potential uaf in outbound_phy_packet_callback()" }, - "CVE-2018-12930": { - "cmt_msg": "" + "CVE-2021-47059": { + "cmt_msg": "crypto: sun8i-ss - fix result memory leak on error path" }, - "CVE-2018-12931": { - "cmt_msg": "" + "CVE-2021-47052": { + "cmt_msg": "crypto: sa2ul - Fix memory leak of rxd" }, - "CVE-2022-23816": { - "cmt_msg": "x86/kvm/vmx: Make noinstr clean" + "CVE-2018-20784": { + "cmt_msg": "sched/fair: Fix infinite loop in update_blocked_averages() by reverting a9e7f6544b9c" }, - "CVE-2023-35827": { - "cmt_msg": "ravb: Fix use-after-free issue in ravb_tx_timeout_work()" + "CVE-2021-47056": { + "cmt_msg": "crypto: qat - ADF_STATUS_PF_RUNNING should be set after adf_dev_init" }, - "CVE-2022-21385": { - "cmt_msg": "net/rds: fix warn in rds_message_alloc_sgs" + "CVE-2021-47054": { + "cmt_msg": "bus: qcom: Put child node before return" }, - "CVE-2024-23196": { - "cmt_msg": "" + "CVE-2022-21125": { + "cmt_msg": "x86/speculation/mmio: Reuse SRBDS mitigation for SBDS" }, - "CVE-2023-6546": { - "cmt_msg": "tty: n_gsm: fix the UAF caused by race condition in gsm_cleanup_mux" + "CVE-2019-19241": { + "cmt_msg": "io_uring: async workers should inherit the user creds" }, - "CVE-2021-39801": { - "cmt_msg": "" + "CVE-2022-21123": { + "cmt_msg": "x86/speculation/mmio: Add mitigation for Processor MMIO Stale Data" }, - "CVE-2021-39800": { + "CVE-2020-26559": { "cmt_msg": "" }, - "CVE-2022-3169": { - "cmt_msg": "nvme: ensure subsystem reset is single threaded" + "CVE-2021-43975": { + "cmt_msg": "atlantic: Fix OOB read and write in hw_atl_utils_fw_rpc_wait" }, - "CVE-2022-4269": { - "cmt_msg": "act_mirred: use the backlog for nested calls to mirred ingress" + "CVE-2021-43976": { + "cmt_msg": "mwifiex: Fix skb_over_panic in mwifiex_usb_recv()" }, - "CVE-2020-36385": { - "cmt_msg": "RDMA/ucma: Rework ucma_migrate_id() to avoid races with destroy" + "CVE-2018-3639": { + "cmt_msg": "x86/nospec: Simplify alternative_msr_write()" }, - "CVE-2022-20166": { - "cmt_msg": "drivers core: Use sysfs_emit and sysfs_emit_at for show(device *...) functions" + "CVE-2023-0590": { + "cmt_msg": "net: sched: fix race condition in qdisc_graft()" }, - "CVE-2024-22099": { - "cmt_msg": "" + "CVE-2023-0597": { + "cmt_msg": "x86/mm: Randomize per-cpu entry area" }, - "CVE-2019-12380": { - "cmt_msg": "efi/x86/Add missing error handling to old_memmap 1:1 mapping code" + "CVE-2022-28390": { + "cmt_msg": "can: ems_usb: ems_usb_start_xmit(): fix double dev_kfree_skb() in error path" }, - "CVE-2019-12381": { - "cmt_msg": "ip_sockglue: Fix missing-check bug in ip_ra_control()" + "CVE-2019-3460": { + "cmt_msg": "Bluetooth: Check L2CAP option sizes returned from l2cap_get_conf_opt" }, - "CVE-2024-25740": { - "cmt_msg": "" + "CVE-2022-3202": { + "cmt_msg": "jfs: prevent NULL deref in diFree" }, - "CVE-2022-45886": { - "cmt_msg": "media: dvb-core: Fix use-after-free due on race condition at dvb_net" + "CVE-2019-11477": { + "cmt_msg": "tcp: limit payload size of sacked skbs" }, - "CVE-2023-22995": { - "cmt_msg": "usb: dwc3: dwc3-qcom: Add missing platform_device_put() in dwc3_qcom_acpi_register_core" + "CVE-2021-46908": { + "cmt_msg": "bpf: Use correct permission flag for mixed signed bounds arithmetic" }, - "CVE-2024-21803": { - "cmt_msg": "" + "CVE-2021-46909": { + "cmt_msg": "ARM: footbridge: fix PCI interrupt mapping" }, - "CVE-2022-21499": { - "cmt_msg": "lockdown: also lock down previous kgdb use" + "CVE-2018-14615": { + "cmt_msg": "f2fs: fix to do sanity check with i_extra_isize" }, - "CVE-2022-41222": { - "cmt_msg": "mm/mremap: hold the rmap lock in write mode when moving page table entries." + "CVE-2018-14614": { + "cmt_msg": "f2fs: fix to do sanity check with cp_pack_start_sum" }, - "CVE-2020-7053": { - "cmt_msg": "drm/i915: Introduce a mutex for file_priv->context_idr" + "CVE-2019-11479": { + "cmt_msg": "tcp: add tcp_min_snd_mss sysctl" }, - "CVE-2023-2124": { - "cmt_msg": "xfs: verify buffer contents when we skip log replay" + "CVE-2019-11478": { + "cmt_msg": "tcp: tcp_fragment() should apply sane memory limits" }, - "CVE-2024-26594": { - "cmt_msg": "ksmbd: validate mech token in session setup" + "CVE-2018-14611": { + "cmt_msg": "btrfs: validate type when reading a chunk" }, - "CVE-2021-3542": { - "cmt_msg": "" + "CVE-2018-14610": { + "cmt_msg": "btrfs: Check that each block group has corresponding chunk at mount time" }, - "CVE-2023-1281": { - "cmt_msg": "net/sched: tcindex: update imperfect hash filters respecting rcu" + "CVE-2018-14613": { + "cmt_msg": "btrfs: tree-checker: Verify block_group_item" }, - "CVE-2023-3863": { - "cmt_msg": "net: nfc: Fix use-after-free caused by nfc_llcp_find_local" + "CVE-2018-14612": { + "cmt_msg": "btrfs: tree-checker: Detect invalid and empty essential trees" }, - "CVE-2023-30456": { - "cmt_msg": "KVM: nVMX: add missing consistency checks for CR0 and CR4" + "CVE-2024-23849": { + "cmt_msg": "net/rds: Fix UBSAN: array-index-out-of-bounds in rds_cmsg_recv" }, - "CVE-2020-12656": { - "cmt_msg": "sunrpc: check that domain table is empty at module unload." + "CVE-2024-23848": { + "cmt_msg": "" }, - "CVE-2023-3268": { - "cmt_msg": "relayfs: fix out-of-bounds access in relay_file_read" + "CVE-2020-27418": { + "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region" }, - "CVE-2023-0030": { - "cmt_msg": "drm/nouveau/mmu: add more general vmm free/node handling functions" + "CVE-2019-2025": { + "cmt_msg": "binder: fix race that allows malicious free of live buffer" }, - "CVE-2020-16120": { - "cmt_msg": "ovl: switch to mounter creds in readdir" + "CVE-2019-2024": { + "cmt_msg": "media: em28xx: Fix use-after-free when disconnecting" }, - "CVE-2018-12928": { - "cmt_msg": "" + "CVE-2019-19078": { + "cmt_msg": "ath10k: fix memory leak" }, - "CVE-2020-36310": { - "cmt_msg": "KVM: SVM: avoid infinite loop on NPF from bad address" + "CVE-2019-19075": { + "cmt_msg": "ieee802154: ca8210: prevent memory leak" }, - "CVE-2020-36313": { - "cmt_msg": "KVM: Fix out of range accesses to memslots" + "CVE-2019-19074": { + "cmt_msg": "ath9k: release allocated buffer if timed out" }, - "CVE-2015-2877": { - "cmt_msg": "" + "CVE-2019-19073": { + "cmt_msg": "ath9k_htc: release allocated buffer if timed out" }, - "CVE-2023-3006": { - "cmt_msg": "arm64: Add AMPERE1 to the Spectre-BHB affected list" + "CVE-2019-19071": { + "cmt_msg": "rsi: release skb if rsi_prepare_beacon fails" }, - "CVE-2023-1611": { - "cmt_msg": "btrfs: fix race between quota disable and quota assign ioctls" + "CVE-2019-1125": { + "cmt_msg": "x86/speculation: Prepare entry code for Spectre v1 swapgs mitigations" }, - "CVE-2023-20588": { - "cmt_msg": "x86/CPU/AMD: Do not leak quotient data after a division by 0" + "CVE-2023-31085": { + "cmt_msg": "ubi: Refuse attaching if mtd's erasesize is 0" }, - "CVE-2018-20449": { - "cmt_msg": "printk: hash addresses printed with %p" + "CVE-2023-31084": { + "cmt_msg": "media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*()" }, - "CVE-2016-10723": { - "cmt_msg": "mm, oom: remove sleep from under oom_lock" + "CVE-2023-31083": { + "cmt_msg": "Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO" }, - "CVE-2022-0400": { + "CVE-2023-31082": { "cmt_msg": "" }, - "CVE-2022-44034": { - "cmt_msg": "char: pcmcia: remove all the drivers" + "CVE-2023-31081": { + "cmt_msg": "" }, - "CVE-2022-44033": { - "cmt_msg": "char: pcmcia: remove all the drivers" + "CVE-2022-32296": { + "cmt_msg": "tcp: increase source port perturb table to 2^16" }, - "CVE-2019-11191": { - "cmt_msg": "x86: Deprecate a.out support" + "CVE-2020-28974": { + "cmt_msg": "vt: Disable KD_FONT_OP_COPY" }, - "CVE-2023-20569": { - "cmt_msg": "x86/bugs: Increase the x86 bugs vector size to two u32s" + "CVE-2019-20806": { + "cmt_msg": "media: tw5864: Fix possible NULL pointer dereference in tw5864_handle_frame" }, - "CVE-2019-19039": { - "cmt_msg": "btrfs: Don't submit any btree write bio if the fs has errors" + "CVE-2022-3028": { + "cmt_msg": "af_key: Do not call xfrm_probe_algs in parallel" }, - "CVE-2024-25741": { + "CVE-2020-14304": { "cmt_msg": "" }, - "CVE-2021-3847": { - "cmt_msg": "" + "CVE-2018-17972": { + "cmt_msg": "proc: restrict kernel stack dumps to root" }, - "CVE-2018-10322": { - "cmt_msg": "xfs: enhance dinode verifier" + "CVE-2022-33981": { + "cmt_msg": "floppy: disable FDRAWCMD by default" }, - "CVE-2020-8832": { - "cmt_msg": "drm/i915: Record the default hw state after reset upon load" + "CVE-2019-18675": { + "cmt_msg": "mmap: introduce sane default mmap limits" }, - "CVE-2023-52442": { - "cmt_msg": "ksmbd: validate session id and tree id in compound request" + "CVE-2018-18397": { + "cmt_msg": "userfaultfd: use ENOENT instead of EFAULT if the atomic copy user fails" }, - "CVE-2023-52443": { - "cmt_msg": "apparmor: avoid crash when parsed profile name is empty" + "CVE-2023-1390": { + "cmt_msg": "tipc: fix NULL deref in tipc_link_xmit()" }, - "CVE-2022-1280": { - "cmt_msg": "drm: avoid circular locks in drm_mode_getconnector" + "CVE-2020-10751": { + "cmt_msg": "selinux: properly handle multiple messages in selinux_netlink_send()" }, - "CVE-2023-52445": { - "cmt_msg": "media: pvrusb2: fix use after free on context disconnection" + "CVE-2020-10757": { + "cmt_msg": "mm: Fix mremap not considering huge pmd devmap" }, - "CVE-2011-4917": { - "cmt_msg": "" + "CVE-2019-14763": { + "cmt_msg": "usb: dwc3: gadget: never call ->complete() from ->ep_queue()" }, - "CVE-2011-4916": { + "CVE-2022-1116": { "cmt_msg": "" }, - "CVE-2019-16089": { - "cmt_msg": "" + "CVE-2021-28660": { + "cmt_msg": "staging: rtl8188eu: prevent ->ssid overflow in rtw_wx_set_scan()" }, - "CVE-2021-32078": { - "cmt_msg": "ARM: footbridge: remove personal server platform" + "CVE-2020-36386": { + "cmt_msg": "Bluetooth: Fix slab-out-of-bounds read in hci_extended_inquiry_result_evt()" }, - "CVE-2023-52340": { - "cmt_msg": "ipv6: remove max_size check inline with ipv4" + "CVE-2020-36385": { + "cmt_msg": "RDMA/ucma: Rework ucma_migrate_id() to avoid races with destroy" }, - "CVE-2022-3523": { - "cmt_msg": "mm/memory.c: fix race when faulting a device private page" + "CVE-2018-9385": { + "cmt_msg": "ARM: amba: Don't read past the end of sysfs \"driver_override\" buffer" }, - "CVE-2023-23039": { - "cmt_msg": "" + "CVE-2020-0009": { + "cmt_msg": "staging: android: ashmem: Disallow ashmem memory from being remapped" }, - "CVE-2019-10220": { - "cmt_msg": "Convert filldir[64]() from __put_user() to unsafe_put_user()" + "CVE-2020-7053": { + "cmt_msg": "drm/i915: Introduce a mutex for file_priv->context_idr" }, - "CVE-2020-27835": { - "cmt_msg": "IB/hfi1: Ensure correct mm is used at all times" + "CVE-2019-14615": { + "cmt_msg": "drm/i915/gen9: Clear residual context state on context switch" }, - "CVE-2022-4744": { - "cmt_msg": "tun: avoid double free in tun_free_netdev" + "CVE-2018-9415": { + "cmt_msg": "ARM: amba: Fix race condition with driver_override" }, - "CVE-2023-39189": { - "cmt_msg": "netfilter: nfnetlink_osf: avoid OOB read" + "CVE-2019-13648": { + "cmt_msg": "powerpc/tm: Fix oops on sigreturn on systems without TM" }, - "CVE-2019-5489": { - "cmt_msg": "Change mincore() to count \"mapped\" pages rather than \"cached\" pages" + "CVE-2018-15572": { + "cmt_msg": "x86/speculation: Protect against userspace-userspace spectreRSB" }, - "CVE-2024-1312": { - "cmt_msg": "mm: lock_vma_under_rcu() must check vma->anon_vma under vma lock" + "CVE-2023-52474": { + "cmt_msg": "IB/hfi1: Fix bugs with non-PAGE_SIZE-end multi-iovec user SDMA requests" }, - "CVE-2022-39188": { - "cmt_msg": "mmu_gather: Force tlb-flush VM_PFNMAP vmas" + "CVE-2022-1204": { + "cmt_msg": "ax25: Fix refcount leaks caused by ax25_cb_del()" }, - "CVE-2023-3640": { - "cmt_msg": "" - } - } - }, - "4.17": { - "4.17-rc1": { - "CVE-2019-19083": { - "cmt_msg": "drm/amd/display: memory leak", - "cmt_id": "9ea29a1f8b9da52d8eca8b0996f1d84eac548d3b" - } - }, - "4.17-rc6": { - "CVE-2019-12881": { - "cmt_msg": "drm/i915/userptr: reject zero user_size", - "cmt_id": "20943f984967477c906522112d2b6b5a29f94684" - } - }, - "4.17.2": { - "CVE-2018-10853": { - "cmt_msg": "kvm: x86: use correct privilege level for sgdt/sidt/fxsave/fxrstor access", - "cmt_id": "0c950f7417267db597e73170d7694ba7f09f77a0" + "CVE-2018-9363": { + "cmt_msg": "Bluetooth: hidp: buffer overflow in hidp_process_report" }, - "CVE-2018-12904": { - "cmt_msg": "kvm: nVMX: Enforce cpl=0 for VMX instructions", - "cmt_id": "9c3c30575618ba14d4fa67c887a32c05dc55e6fd" - } - }, - "4.17.3": { - "CVE-2018-10840": { - "cmt_msg": "ext4: correctly handle a zero-length xattr with a non-zero e_value_offs", - "cmt_id": "0ea1fdcb048f7297153109a2fdced98fe887b0c0" + "CVE-2016-10723": { + "cmt_msg": "mm, oom: remove sleep from under oom_lock" }, - "CVE-2018-1118": { - "cmt_msg": "vhost: fix info leak due to uninitialized memory", - "cmt_id": "a8c0b29a879d56e7bd0cad37fa472876aef69dd9" + "CVE-2022-26490": { + "cmt_msg": "nfc: st21nfca: Fix potential buffer overflows in EVT_TRANSACTION" }, - "CVE-2018-11412": { - "cmt_msg": "ext4: do not allow external inodes for inline data", - "cmt_id": "49e5abce91a0538a909794681619a2580dccfce0" + "CVE-2020-8832": { + "cmt_msg": "drm/i915: Record the default hw state after reset upon load" }, - "CVE-2018-12232": { - "cmt_msg": "socket: close race condition between sock_close() and sockfs_setattr()", - "cmt_id": "be3bb23cc0e4943922db828b923648af7a9f2dc3" - } - }, - "4.17.4": { - "CVE-2018-12633": { - "cmt_msg": "virt: vbox: Only copy_from_user the request-header once", - "cmt_id": "a61b352a7c23191108ae0c747a170f6bce5b154a" + "CVE-2020-11884": { + "cmt_msg": "s390/mm: fix page table upgrade vs 2ndary address mode accesses" }, - "CVE-2018-13406": { - "cmt_msg": "video: uvesafb: Fix integer overflow in allocation", - "cmt_id": "ac6992286f1bb8fe86b2a924849f922edabed4ab" + "CVE-2023-52530": { + "cmt_msg": "wifi: mac80211: fix potential key use-after-free" }, - "CVE-2018-12714": { - "cmt_msg": "tracing: Check for no filter when processing event filters", - "cmt_id": "a6974c2f8e8b6f29ba3bcdb508ace850a26823fc" - } - }, - "4.17.6": { - "CVE-2018-9516": { - "cmt_msg": "HID: debug: check length before copy_to_user()", - "cmt_id": "787b882d9178c35eb2e06e974f3c37fc14829e53" + "CVE-2023-52531": { + "cmt_msg": "wifi: iwlwifi: mvm: Fix a memory corruption issue" }, - "CVE-2018-10879": { - "cmt_msg": "ext4: make sure bitmaps and the inode table don't overlap with bg descriptors", - "cmt_id": "0f2e7fe6d2cc8903765dac6eea7d7aa96e9ad823" + "CVE-2023-52532": { + "cmt_msg": "net: mana: Fix TX CQE error handling" }, - "CVE-2018-10881": { - "cmt_msg": "ext4: clear i_data in ext4_inode_info when removing inline data", - "cmt_id": "0abaed0c74f4dbd3f5a9dcb9fb6b472735874b5e" + "CVE-2023-39189": { + "cmt_msg": "netfilter: nfnetlink_osf: avoid OOB read" }, - "CVE-2018-10878": { - "cmt_msg": "ext4: always check block group bounds in ext4_init_block_bitmap()", - "cmt_id": "425a51f7b055ccc66ea7fd0415eb905ede66622d" + "CVE-2024-26677": { + "cmt_msg": "rxrpc: Fix delayed ACKs to not set the reference serial number" }, - "CVE-2018-10877": { - "cmt_msg": "ext4: verify the depth of extent tree in ext4_find_extent()", - "cmt_id": "a266689c463cc6057400d1cfdf85b8e3ef7b6efd" + "CVE-2020-25211": { + "cmt_msg": "netfilter: ctnetlink: add a range check for l3/l4 protonum" }, - "CVE-2018-10876": { - "cmt_msg": "ext4: only look at the bg_flags field if it is valid", - "cmt_id": "b94094f668a9bf7837c275cd6e49bf29def3c77f" + "CVE-2020-25212": { + "cmt_msg": "nfs: Fix getxattr kernel panic and memory overflow" }, - "CVE-2018-10880": { - "cmt_msg": "ext4: never move the system.data xattr out of the inode body", - "cmt_id": "1f18321d31d0971a5e9a02a9e67a6d94b638fca3" + "CVE-2020-28374": { + "cmt_msg": "scsi: target: Fix XCOPY NAA identifier lookup" }, - "CVE-2017-13168": { - "cmt_msg": "scsi: sg: mitigate read/write abuse", - "cmt_id": "ae78cf6c0c2e2ea05f9d2d6bd59f702fd1e8220c" + "CVE-2024-26672": { + "cmt_msg": "drm/amdgpu: Fix variable 'mca_funcs' dereferenced before NULL check in 'amdgpu_mca_smu_get_mca_entry()'" }, - "CVE-2018-10882": { - "cmt_msg": "ext4: add more inode number paranoia checks", - "cmt_id": "77d4024c10f3271dc7e799890e15df8fcadebcda" + "CVE-2024-26671": { + "cmt_msg": "blk-mq: fix IO hang from sbitmap wakeup race" }, - "CVE-2018-10883": { - "cmt_msg": "jbd2: don't mark block as modified if the handle is out of credits", - "cmt_id": "f869e0b631a6a7befe595dbad0b2e3662c6d1a99" - } - }, - "4.17.7": { - "CVE-2018-13405": { - "cmt_msg": "Fix up non-directory creation in SGID directories", - "cmt_id": "3dcb24abc93cad1afb87b3f30fd5bf348b49d5a7" + "CVE-2024-26679": { + "cmt_msg": "inet: read sk->sk_family once in inet_recv_error()" }, - "CVE-2018-16276": { - "cmt_msg": "USB: yurex: fix out-of-bounds uaccess in read handler", - "cmt_id": "ce6037ad83d4d1a27f11c352eb8fab10b1a4e97c" + "CVE-2023-52458": { + "cmt_msg": "block: add check that partition length needs to be aligned with block size" }, - "CVE-2020-0430": { - "cmt_msg": "bpf: reject passing modified ctx to helper functions", - "cmt_id": "49fde2180b48cd15d6b2a51416bbf1c4be5d77a2" - } - }, - "4.17.10": { - "CVE-2018-10902": { - "cmt_msg": "ALSA: rawmidi: Change resized buffers atomically", - "cmt_id": "f5f3789f192981a482856a69bd2ef38088f0e635" - } - }, - "4.17.11": { - "CVE-2018-5390": { - "cmt_msg": "tcp: free batches of packets in tcp_prune_ofo_queue()", - "cmt_id": "db11182a1e38e7149804962111622b15bd9aeff2" - } - }, - "4.17.12": { - "CVE-2018-14734": { - "cmt_msg": "infiniband: fix a possible use-after-free bug", - "cmt_id": "da1320feb7d48f2a4c5e02b253d5a2186d2bee6c" - } - }, - "4.17.13": { - "CVE-2018-14678": { - "cmt_msg": "x86/entry/64: Remove %ebx handling from error_entry/exit", - "cmt_id": "6557adc69262f90b3f1ddf3d4f874e203894a246" - } - }, - "4.17.14": { - "CVE-2018-13093": { - "cmt_msg": "xfs: validate cached inodes are free when allocated", - "cmt_id": "39dc3fb32fd4bf0fde9e8c971dec8228722f0a70" + "CVE-2023-52451": { + "cmt_msg": "powerpc/pseries/memhp: Fix access beyond end of drmem array" }, - "CVE-2018-13094": { - "cmt_msg": "xfs: don't call xfs_da_shrink_inode with NULL bp", - "cmt_id": "173f00f40107e5099eb8a74ea7b7ff0e662ec80b" + "CVE-2022-0644": { + "cmt_msg": "vfs: check fd has read access in kernel_read_file_from_fd()" }, - "CVE-2018-12233": { - "cmt_msg": "jfs: Fix inconsistency between memory allocation and ea_buf->max_size", - "cmt_id": "2972e3f6816c7dc0d4804ae82a3d02ffb94068dc" - } - }, - "4.17.15": { - "CVE-2018-3646": { - "cmt_msg": "x86/microcode: Allow late microcode loading with SMT disabled", - "cmt_id": "f6b2c7253830473fedb8b5680894660e78e03aea" + "CVE-2019-14816": { + "cmt_msg": "mwifiex: Fix three heap overflow at parsing element in cfg80211_ap_settings" }, - "CVE-2018-3620": { - "cmt_msg": "x86/microcode: Allow late microcode loading with SMT disabled", - "cmt_id": "f6b2c7253830473fedb8b5680894660e78e03aea" + "CVE-2019-14814": { + "cmt_msg": "mwifiex: Fix three heap overflow at parsing element in cfg80211_ap_settings" }, - "CVE-2018-15572": { - "cmt_msg": "x86/speculation: Protect against userspace-userspace spectreRSB", - "cmt_id": "0a9da8dd128e2e3038b0b4355cc639769047976d" + "CVE-2019-14815": { + "cmt_msg": "mwifiex: Fix three heap overflow at parsing element in cfg80211_ap_settings" }, - "CVE-2018-15594": { - "cmt_msg": "x86/paravirt: Fix spectre-v2 mitigations for paravirt guests", - "cmt_id": "7676d2dee2b687449bb501a98062863741b30bc8" - } - }, - "4.17.16": { - "CVE-2018-9363": { - "cmt_msg": "Bluetooth: hidp: buffer overflow in hidp_process_report", - "cmt_id": "0c37356f695faeb8f47c9107707bd47b53622a46" - } - }, - "4.17.19": { - "CVE-2018-3693": { - "cmt_msg": "ext4: fix spectre gadget in ext4_mb_regular_allocator()", - "cmt_id": "df2ef7a510fa4c784adc53ef72b1b392a4033ad2" - } - }, - "outstanding": { - "CVE-2020-36322": { - "cmt_msg": "fuse: fix bad inode" + "CVE-2024-26706": { + "cmt_msg": "parisc: Fix random data corruption from exception handler" }, - "CVE-2020-10711": { - "cmt_msg": "netlabel: cope with NULL catmap" + "CVE-2024-26704": { + "cmt_msg": "ext4: fix double-free of blocks due to wrong extents moved_len" }, - "CVE-2019-15090": { - "cmt_msg": "scsi: qedi: remove memset/memcpy to nfunc and use func instead" + "CVE-2023-3812": { + "cmt_msg": "net: tun: fix bugs for oversize packet when napi frags enabled" }, - "CVE-2022-3649": { - "cmt_msg": "nilfs2: fix use-after-free bug of struct nilfs_root" + "CVE-2020-25672": { + "cmt_msg": "nfc: fix memory leak in llcp_sock_connect()" }, - "CVE-2019-15099": { - "cmt_msg": "ath6kl: fix a NULL-ptr-deref bug in ath6kl_usb_alloc_urb_from_pipe()" + "CVE-2020-25673": { + "cmt_msg": "nfc: Avoid endless loops caused by repeated llcp_sock_connect()" }, - "CVE-2019-15098": { - "cmt_msg": "ath6kl: fix a NULL-ptr-deref bug in ath6kl_usb_alloc_urb_from_pipe()" + "CVE-2020-25670": { + "cmt_msg": "nfc: fix refcount leak in llcp_sock_bind()" }, - "CVE-2020-29368": { - "cmt_msg": "mm: thp: make the THP mapcount atomic against __split_huge_pmd_locked()" + "CVE-2020-25671": { + "cmt_msg": "nfc: fix refcount leak in llcp_sock_connect()" }, - "CVE-2020-12465": { - "cmt_msg": "mt76: fix array overflow on receiving too many fragments for a packet" + "CVE-2019-19813": { + "cmt_msg": "btrfs: inode: Verify inode mode to avoid NULL pointer dereference" }, - "CVE-2020-12464": { - "cmt_msg": "USB: core: Fix free-while-in-use bug in the USB S-Glibrary" + "CVE-2020-29374": { + "cmt_msg": "gup: document and work around \"COW can break either way\" issue" }, - "CVE-2022-0002": { - "cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE" + "CVE-2019-19815": { + "cmt_msg": "f2fs: support swap file w/ DIO" }, - "CVE-2019-19965": { - "cmt_msg": "scsi: libsas: stop discovering if oob mode is disconnected" + "CVE-2019-19814": { + "cmt_msg": "" }, - "CVE-2021-3752": { - "cmt_msg": "Bluetooth: fix use-after-free error in lock_sock_nested()" + "CVE-2020-29371": { + "cmt_msg": "romfs: fix uninitialized memory leak in romfs_dev_read()" }, - "CVE-2019-19966": { - "cmt_msg": "media: cpia2: Fix use-after-free in cpia2_exit" + "CVE-2019-19816": { + "cmt_msg": "btrfs: inode: Verify inode mode to avoid NULL pointer dereference" }, - "CVE-2020-35508": { - "cmt_msg": "fork: fix copy_process(CLONE_PARENT) race with the exiting ->real_parent" + "CVE-2018-11412": { + "cmt_msg": "ext4: do not allow external inodes for inline data" }, - "CVE-2022-2503": { - "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag" + "CVE-2018-18710": { + "cmt_msg": "cdrom: fix improper type cast, which can leat to information leak." }, - "CVE-2020-24587": { - "cmt_msg": "mac80211: prevent mixed key and fragment cache attacks" + "CVE-2023-34255": { + "cmt_msg": "xfs: verify buffer contents when we skip log replay" }, - "CVE-2020-24586": { - "cmt_msg": "mac80211: prevent mixed key and fragment cache attacks" + "CVE-2022-23040": { + "cmt_msg": "xen/xenbus: don't let xenbus_grant_ring() remove grants in error case" }, - "CVE-2021-0129": { - "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical" + "CVE-2023-3141": { + "cmt_msg": "memstick: r592: Fix UAF bug in r592_remove due to race condition" }, - "CVE-2019-20096": { - "cmt_msg": "dccp: Fix memleak in __feat_register_sp" + "CVE-2022-23042": { + "cmt_msg": "xen/netfront: react properly to failing gnttab_end_foreign_access_ref()" }, - "CVE-2022-47520": { - "cmt_msg": "wifi: wilc1000: validate pairwise and authentication suite offsets" + "CVE-2022-3524": { + "cmt_msg": "tcp/udp: Fix memory leak in ipv6_renew_options()." }, - "CVE-2023-5717": { - "cmt_msg": "perf: Disallow mis-matched inherited group reads" + "CVE-2022-3523": { + "cmt_msg": "mm/memory.c: fix race when faulting a device private page" }, - "CVE-2022-3643": { - "cmt_msg": "xen/netback: Ensure protocol headers don't fall in the non-linear area" + "CVE-2022-3522": { + "cmt_msg": "mm/hugetlb: use hugetlb_pte_stable in migration race check" }, - "CVE-2021-3444": { - "cmt_msg": "bpf: Fix truncation handling for mod32 dst reg wrt zero" + "CVE-2022-3521": { + "cmt_msg": "kcm: avoid potential race in kcm_tx_work" }, - "CVE-2022-32250": { - "cmt_msg": "netfilter: nf_tables: disallow non-stateful expression in sets earlier" + "CVE-2018-7755": { + "cmt_msg": "floppy: Do not copy a kernel pointer to user memory in FDGETPRM ioctl" }, - "CVE-2019-9506": { - "cmt_msg": "Bluetooth: Fix faulty expression for minimum encryption key size check" + "CVE-2019-15031": { + "cmt_msg": "powerpc/tm: Fix restoring FP/VMX facility incorrectly on interrupts" }, - "CVE-2019-9500": { - "cmt_msg": "brcmfmac: assure SSID length from firmware is limited" + "CVE-2019-15030": { + "cmt_msg": "powerpc/tm: Fix FP/VMX unavailable exceptions inside a transaction" }, - "CVE-2019-9503": { - "cmt_msg": "brcmfmac: add subtype check for event handling in data path" + "CVE-2022-0330": { + "cmt_msg": "drm/i915: Flush TLBs before releasing backing store" }, - "CVE-2020-36158": { - "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_cmd_802_11_ad_hoc_start" + "CVE-2022-4095": { + "cmt_msg": "staging: rtl8712: fix use after free bugs" }, - "CVE-2023-3159": { - "cmt_msg": "firewire: fix potential uaf in outbound_phy_packet_callback()" + "CVE-2022-45919": { + "cmt_msg": "media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221" }, - "CVE-2022-0480": { - "cmt_msg": "memcg: enable accounting for file lock caches" + "CVE-2021-3669": { + "cmt_msg": "ipc: replace costly bailout check in sysvipc_find_ipc()" }, - "CVE-2022-0487": { - "cmt_msg": "moxart: fix potential use-after-free on remove path" + "CVE-2019-3701": { + "cmt_msg": "can: gw: ensure DLC boundaries after CAN frame modification" }, - "CVE-2023-52429": { - "cmt_msg": "dm: limit the number of targets and parameter size area" + "CVE-2023-1095": { + "cmt_msg": "netfilter: nf_tables: fix null deref due to zeroed list head" }, - "CVE-2021-28964": { - "cmt_msg": "btrfs: fix race when cloning extent buffer during rewind of an old root" + "CVE-2022-3239": { + "cmt_msg": "media: em28xx: initialize refcount before kref_get" }, - "CVE-2022-23825": { + "CVE-2022-4543": { "cmt_msg": "" }, - "CVE-2021-3847": { - "cmt_msg": "" + "CVE-2021-46915": { + "cmt_msg": "netfilter: nft_limit: avoid possible divide error in nft_limit_init" }, - "CVE-2020-35501": { - "cmt_msg": "" + "CVE-2019-18282": { + "cmt_msg": "net/flow_dissector: switch to siphash" }, - "CVE-2018-20784": { - "cmt_msg": "sched/fair: Fix infinite loop in update_blocked_averages() by reverting a9e7f6544b9c" + "CVE-2021-34981": { + "cmt_msg": "Bluetooth: cmtp: fix file refcount when cmtp_attach_device fails" }, - "CVE-2019-10124": { - "cmt_msg": "mm: hwpoison: fix thp split handing in soft_offline_in_use_page()" + "CVE-2018-14625": { + "cmt_msg": "vhost/vsock: fix use-after-free in network stack callers" }, - "CVE-2019-9245": { - "cmt_msg": "f2fs: sanity check of xattr entry size" + "CVE-2023-4881": { + "cmt_msg": "netfilter: nftables: exthdr: fix 4-byte stack OOB write" }, - "CVE-2024-26588": { - "cmt_msg": "LoongArch: BPF: Prevent out-of-bounds memory access" + "CVE-2013-7445": { + "cmt_msg": "" }, - "CVE-2023-2162": { - "cmt_msg": "scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress" + "CVE-2024-26804": { + "cmt_msg": "net: ip_tunnel: prevent perpetual headroom growth" }, - "CVE-2022-21125": { - "cmt_msg": "x86/speculation/mmio: Reuse SRBDS mitigation for SBDS" + "CVE-2022-3303": { + "cmt_msg": "ALSA: pcm: oss: Fix race at SNDCTL_DSP_SYNC" }, - "CVE-2019-19241": { - "cmt_msg": "io_uring: async workers should inherit the user creds" + "CVE-2020-12771": { + "cmt_msg": "bcache: fix potential deadlock problem in btree_gc_coalesce" }, - "CVE-2022-40307": { - "cmt_msg": "efi: capsule-loader: Fix use-after-free in efi_capsule_write" + "CVE-2024-26595": { + "cmt_msg": "mlxsw: spectrum_acl_tcam: Fix NULL pointer dereference in error path" }, - "CVE-2022-21123": { - "cmt_msg": "x86/speculation/mmio: Add mitigation for Processor MMIO Stale Data" + "CVE-2024-26801": { + "cmt_msg": "Bluetooth: Avoid potential use-after-free in hci_error_reset" }, - "CVE-2021-28688": { - "cmt_msg": "xen-blkback: don't leak persistent grants from xen_blkbk_map()" + "CVE-2022-28389": { + "cmt_msg": "can: mcba_usb: mcba_usb_start_xmit(): fix double dev_kfree_skb in error path" }, - "CVE-2021-39686": { - "cmt_msg": "binder: use euid from cred instead of using task" + "CVE-2022-28388": { + "cmt_msg": "can: usb_8dev: usb_8dev_start_xmit(): fix double dev_kfree_skb() in error path" }, - "CVE-2021-39685": { - "cmt_msg": "USB: gadget: detect too-big endpoint 0 requests" + "CVE-2024-26803": { + "cmt_msg": "net: veth: clear GRO when clearing XDP even when down" }, - "CVE-2023-6535": { - "cmt_msg": "" + "CVE-2019-20811": { + "cmt_msg": "net-sysfs: call dev_hold if kobject_init_and_add success" }, - "CVE-2021-43975": { - "cmt_msg": "atlantic: Fix OOB read and write in hw_atl_utils_fw_rpc_wait" + "CVE-2019-20810": { + "cmt_msg": "media: go7007: fix a miss of snd_card_free" }, - "CVE-2021-43976": { - "cmt_msg": "mwifiex: Fix skb_over_panic in mwifiex_usb_recv()" + "CVE-2019-20812": { + "cmt_msg": "af_packet: set defaule value for tmo" }, - "CVE-2021-1048": { - "cmt_msg": "fix regression in \"epoll: Keep a reference on files added to the check list\"" + "CVE-2018-1118": { + "cmt_msg": "vhost: fix info leak due to uninitialized memory" }, - "CVE-2019-10207": { - "cmt_msg": "Bluetooth: hci_uart: check for missing tty operations" + "CVE-2019-18660": { + "cmt_msg": "powerpc/book3s64: Fix link stack flush on context switch" }, - "CVE-2020-12114": { - "cmt_msg": "make struct mountpoint bear the dentry reference to mountpoint, not struct mount" + "CVE-2019-12380": { + "cmt_msg": "efi/x86/Add missing error handling to old_memmap 1:1 mapping code" }, - "CVE-2023-0459": { - "cmt_msg": "uaccess: Add speculation barrier to copy_from_user()" + "CVE-2019-12381": { + "cmt_msg": "ip_sockglue: Fix missing-check bug in ip_ra_control()" }, - "CVE-2023-0458": { - "cmt_msg": "prlimit: do_prlimit needs to have a speculation check" + "CVE-2019-12382": { + "cmt_msg": "drm/edid: Fix a missing-check bug in drm_load_edid_firmware()" }, - "CVE-2023-0597": { - "cmt_msg": "x86/mm: Randomize per-cpu entry area" + "CVE-2020-10766": { + "cmt_msg": "x86/speculation: Prevent rogue cross-process SSBD shutdown" }, - "CVE-2019-12379": { - "cmt_msg": "consolemap: Fix a memory leaking bug in drivers/tty/vt/consolemap.c" + "CVE-2020-10767": { + "cmt_msg": "x86/speculation: Avoid force-disabling IBPB based on STIBP and enhanced IBRS." }, - "CVE-2019-12378": { - "cmt_msg": "ipv6_sockglue: Fix a missing-check bug in ip6_ra_control()" + "CVE-2019-25162": { + "cmt_msg": "i2c: Fix a potential use after free" }, - "CVE-2021-3744": { - "cmt_msg": "crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd()" + "CVE-2019-25160": { + "cmt_msg": "netlabel: fix out-of-bounds memory accesses" }, - "CVE-2021-30002": { - "cmt_msg": "media: v4l: ioctl: Fix memory leak in video_usercopy" + "CVE-2020-10768": { + "cmt_msg": "x86/speculation: PR_SPEC_FORCE_DISABLE enforcement for indirect branches." }, - "CVE-2021-3743": { - "cmt_msg": "net: qrtr: fix OOB Read in qrtr_endpoint_post" + "CVE-2021-35039": { + "cmt_msg": "module: limit enabling module.sig_enforce" }, - "CVE-2021-0941": { - "cmt_msg": "bpf: Remove MTU check in __bpf_skb_max_len" + "CVE-2022-2978": { + "cmt_msg": "fs: fix UAF/GPF bug in nilfs_mdt_destroy" }, - "CVE-2022-2586": { - "cmt_msg": "netfilter: nf_tables: do not allow SET_ID to refer to another table" + "CVE-2020-10942": { + "cmt_msg": "vhost: Check docket sk_family instead of call getname" }, - "CVE-2024-26591": { - "cmt_msg": "bpf: Fix re-attachment branch in bpf_tracing_prog_attach" + "CVE-2020-10781": { + "cmt_msg": "Revert \"zram: convert remaining CLASS_ATTR() to CLASS_ATTR_RO()\"" }, - "CVE-2020-15802": { - "cmt_msg": "" + "CVE-2020-26139": { + "cmt_msg": "mac80211: do not accept/forward invalid EAPOL frames" }, - "CVE-2024-26597": { - "cmt_msg": "net: qualcomm: rmnet: fix global oob in rmnet_policy" + "CVE-2019-19536": { + "cmt_msg": "can: peak_usb: pcan_usb_pro: Fix info-leaks to USB devices" }, - "CVE-2023-6610": { - "cmt_msg": "smb: client: fix potential OOB in smb2_dump_detail()" + "CVE-2019-19537": { + "cmt_msg": "USB: core: Fix races in character device registration and deregistraion" }, - "CVE-2023-2483": { - "cmt_msg": "net: qcom/emac: Fix use after free bug in emac_remove due to race condition" + "CVE-2019-19534": { + "cmt_msg": "can: peak_usb: fix slab info leak" }, - "CVE-2019-3460": { - "cmt_msg": "Bluetooth: Check L2CAP option sizes returned from l2cap_get_conf_opt" + "CVE-2019-19535": { + "cmt_msg": "can: peak_usb: pcan_usb_fd: Fix info-leaks to USB devices" }, - "CVE-2022-3636": { - "cmt_msg": "net: ethernet: mtk_eth_soc: use after free in __mtk_ppe_check_skb()" + "CVE-2020-11565": { + "cmt_msg": "mm: mempolicy: require at least one nodeid for MPOL_PREFERRED" }, - "CVE-2022-3635": { - "cmt_msg": "atm: idt77252: fix use-after-free bugs caused by tst_timer" + "CVE-2019-19533": { + "cmt_msg": "media: ttusb-dec: Fix info-leak in ttusb_dec_send_command()" }, - "CVE-2021-34556": { - "cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4" + "CVE-2019-19530": { + "cmt_msg": "usb: cdc-acm: make sure a refcount is taken early enough" }, - "CVE-2019-15902": { - "cmt_msg": "unknown" + "CVE-2019-19531": { + "cmt_msg": "usb: yurex: Fix use-after-free in yurex_delete" }, - "CVE-2022-40982": { - "cmt_msg": "x86/speculation: Add Gather Data Sampling mitigation" + "CVE-2023-52527": { + "cmt_msg": "ipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data()" }, - "CVE-2022-3202": { - "cmt_msg": "jfs: prevent NULL deref in diFree" + "CVE-2023-3006": { + "cmt_msg": "arm64: Add AMPERE1 to the Spectre-BHB affected list" }, - "CVE-2019-11085": { - "cmt_msg": "drm/i915/gvt: Fix mmap range check" + "CVE-2023-52522": { + "cmt_msg": "net: fix possible store tearing in neigh_periodic_work()" }, - "CVE-2024-24861": { - "cmt_msg": "" + "CVE-2019-8912": { + "cmt_msg": "net: crypto set sk to NULL when af_alg_release." }, - "CVE-2019-11477": { - "cmt_msg": "tcp: limit payload size of sacked skbs" + "CVE-2023-52528": { + "cmt_msg": "net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg" }, - "CVE-2023-39189": { - "cmt_msg": "netfilter: nfnetlink_osf: avoid OOB read" + "CVE-2020-0305": { + "cmt_msg": "chardev: Avoid potential use-after-free in 'chrdev_open()'" }, - "CVE-2018-14615": { - "cmt_msg": "f2fs: fix to do sanity check with i_extra_isize" + "CVE-2024-22386": { + "cmt_msg": "" }, - "CVE-2018-14614": { - "cmt_msg": "f2fs: fix to do sanity check with cp_pack_start_sum" + "CVE-2023-39194": { + "cmt_msg": "net: xfrm: Fix xfrm_address_filter OOB read" }, - "CVE-2018-14617": { - "cmt_msg": "hfsplus: fix NULL dereference in hfsplus_lookup()" + "CVE-2023-39197": { + "cmt_msg": "netfilter: conntrack: dccp: copy entire header to stack buffer, not just basic one" }, - "CVE-2019-11478": { - "cmt_msg": "tcp: tcp_fragment() should apply sane memory limits" + "CVE-2023-39193": { + "cmt_msg": "netfilter: xt_sctp: validate the flag_info count" }, - "CVE-2018-14611": { - "cmt_msg": "btrfs: validate type when reading a chunk" + "CVE-2023-39192": { + "cmt_msg": "netfilter: xt_u32: validate user space input" }, - "CVE-2018-14610": { - "cmt_msg": "btrfs: Check that each block group has corresponding chunk at mount time" + "CVE-2024-26602": { + "cmt_msg": "sched/membarrier: reduce the ability to hammer on sys_membarrier" }, - "CVE-2018-14613": { - "cmt_msg": "btrfs: tree-checker: Verify block_group_item" + "CVE-2024-26600": { + "cmt_msg": "phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP" }, - "CVE-2018-14612": { - "cmt_msg": "btrfs: tree-checker: Detect invalid and empty essential trees" + "CVE-2024-26606": { + "cmt_msg": "binder: signal epoll threads of self-work" }, - "CVE-2020-26145": { - "cmt_msg": "ath10k: drop fragments with multicast DA for PCIe" + "CVE-2023-52429": { + "cmt_msg": "dm: limit the number of targets and parameter size area" }, - "CVE-2023-51782": { - "cmt_msg": "net/rose: Fix Use-After-Free in rose_ioctl" + "CVE-2022-1652": { + "cmt_msg": "floppy: use a statically allocated error counter" }, - "CVE-2020-26147": { - "cmt_msg": "mac80211: assure all fragments are encrypted" + "CVE-2020-29568": { + "cmt_msg": "xen/xenbus: Allow watches discard events before queueing" }, - "CVE-2018-19854": { - "cmt_msg": "crypto: user - fix leaking uninitialized memory to userspace" + "CVE-2020-29569": { + "cmt_msg": "xen-blkback: set ring->xenblkd to NULL after kthread_stop()" }, - "CVE-2020-26140": { + "CVE-2016-8660": { "cmt_msg": "" }, - "CVE-2020-26143": { - "cmt_msg": "" + "CVE-2020-14314": { + "cmt_msg": "ext4: fix potential negative array index in do_split()" }, - "CVE-2020-26142": { - "cmt_msg": "" + "CVE-2019-13272": { + "cmt_msg": "ptrace: Fix ->ptracer_cred handling for PTRACE_TRACEME" }, - "CVE-2019-17053": { - "cmt_msg": "ieee802154: enforce CAP_NET_RAW for raw sockets" + "CVE-2022-1786": { + "cmt_msg": "io_uring: remove io_identity" }, - "CVE-2019-17052": { - "cmt_msg": "ax25: enforce CAP_NET_RAW for raw sockets" + "CVE-2020-25669": { + "cmt_msg": "Input: sunkbd - avoid use-after-free in teardown paths" }, - "CVE-2023-1076": { - "cmt_msg": "tun: tun_chr_open(): correctly initialize socket uid" + "CVE-2020-25668": { + "cmt_msg": "tty: make FONTX ioctl use the tty pointer they were actually passed" }, - "CVE-2023-1077": { - "cmt_msg": "sched/rt: pick_next_rt_entity(): check list_entry" + "CVE-2008-4609": { + "cmt_msg": "" }, - "CVE-2020-27418": { - "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region" + "CVE-2022-0435": { + "cmt_msg": "tipc: improve size validations for received domain records" }, - "CVE-2019-17056": { - "cmt_msg": "nfc: enforce CAP_NET_RAW for raw sockets" + "CVE-2023-26607": { + "cmt_msg": "ntfs: fix out-of-bounds read in ntfs_attr_find()" }, - "CVE-2019-17055": { - "cmt_msg": "mISDN: enforce CAP_NET_RAW for raw sockets" + "CVE-2021-4037": { + "cmt_msg": "xfs: fix up non-directory creation in SGID directories" }, - "CVE-2019-17054": { - "cmt_msg": "appletalk: enforce CAP_NET_RAW for raw sockets" + "CVE-2021-22543": { + "cmt_msg": "KVM: do not allow mapping valid but non-reference-counted pages" }, - "CVE-2023-51042": { - "cmt_msg": "drm/amdgpu: Fix potential fence use-after-free v2" + "CVE-2021-47169": { + "cmt_msg": "serial: rp2: use 'request_firmware' instead of 'request_firmware_nowait'" }, - "CVE-2018-13096": { - "cmt_msg": "f2fs: fix to do sanity check with node footer and iblocks" + "CVE-2023-3776": { + "cmt_msg": "net/sched: cls_fw: Fix improper refcount update leads to use-after-free" }, - "CVE-2018-13097": { - "cmt_msg": "f2fs: fix to do sanity check with user_block_count" + "CVE-2023-3772": { + "cmt_msg": "xfrm: add NULL check in xfrm_update_ae_params" }, - "CVE-2018-13095": { - "cmt_msg": "xfs: More robust inode extent count validation" + "CVE-2022-3533": { + "cmt_msg": "" }, - "CVE-2020-29661": { - "cmt_msg": "tty: Fix ->pgrp locking in tiocspgrp()" + "CVE-2022-3534": { + "cmt_msg": "libbpf: Fix use-after-free in btf_dump_name_dups" }, - "CVE-2020-29660": { - "cmt_msg": "tty: Fix ->session locking" + "CVE-2022-0322": { + "cmt_msg": "sctp: account stream padding length for reconf chunk" }, - "CVE-2018-13098": { - "cmt_msg": "f2fs: fix to do sanity check with extra_attr feature" + "CVE-2021-4149": { + "cmt_msg": "btrfs: unlock newly allocated extent buffer after error" }, - "CVE-2018-13099": { - "cmt_msg": "f2fs: fix to do sanity check with reserved blkaddr of inline inode" + "CVE-2022-21385": { + "cmt_msg": "net/rds: fix warn in rds_message_alloc_sgs" }, - "CVE-2022-1734": { - "cmt_msg": "nfc: nfcmrvl: main: reorder destructive operations in nfcmrvl_nci_unregister_dev to avoid bugs" + "CVE-2021-47180": { + "cmt_msg": "NFC: nci: fix memory leak in nci_allocate_device" }, - "CVE-2023-28772": { - "cmt_msg": "seq_buf: Fix overflow in seq_buf_putmem_hex()" + "CVE-2020-28097": { + "cmt_msg": "vgacon: remove software scrollback support" }, - "CVE-2019-19770": { - "cmt_msg": "blktrace: fix debugfs use after free" + "CVE-2018-5848": { + "cmt_msg": "wil6210: missing length check in wmi_set_ie" }, - "CVE-2019-11884": { - "cmt_msg": "Bluetooth: hidp: fix buffer overflow" + "CVE-2020-14416": { + "cmt_msg": "can, slip: Protect tty->disc_data in write_wakeup and close with RCU" }, - "CVE-2019-19078": { - "cmt_msg": "ath10k: fix memory leak" + "CVE-2021-46928": { + "cmt_msg": "parisc: Clear stale IIR value on instruction access rights trap" }, - "CVE-2019-19077": { - "cmt_msg": "RDMA: Fix goto target to release the allocated memory" + "CVE-2021-46929": { + "cmt_msg": "sctp: use call_rcu to free endpoint" }, - "CVE-2019-19075": { - "cmt_msg": "ieee802154: ca8210: prevent memory leak" + "CVE-2018-14633": { + "cmt_msg": "scsi: target: iscsi: Use hex2bin instead of a re-implementation" }, - "CVE-2019-19074": { - "cmt_msg": "ath9k: release allocated buffer if timed out" + "CVE-2021-46921": { + "cmt_msg": "locking/qrwlock: Fix ordering in queued_write_lock_slowpath()" }, - "CVE-2019-18683": { - "cmt_msg": "media: vivid: Fix wrong locking that causes race conditions on streaming stop" + "CVE-2021-46924": { + "cmt_msg": "NFC: st21nfca: Fix memory leak in device probe and remove" }, - "CVE-2019-19072": { - "cmt_msg": "tracing: Have error path in predicate_parse() free its allocated memory" + "CVE-2021-46925": { + "cmt_msg": "net/smc: fix kernel panic caused by race of smc_sock" }, - "CVE-2019-19071": { - "cmt_msg": "rsi: release skb if rsi_prepare_beacon fails" + "CVE-2021-46926": { + "cmt_msg": "ALSA: hda: intel-sdw-acpi: harden detection of controller" }, - "CVE-2019-18680": { - "cmt_msg": "" + "CVE-2023-1206": { + "cmt_msg": "tcp: Reduce chance of collisions in inet6_hashfn()." }, - "CVE-2022-23038": { - "cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()" + "CVE-2022-3649": { + "cmt_msg": "nilfs2: fix use-after-free bug of struct nilfs_root" }, - "CVE-2022-23039": { - "cmt_msg": "xen/gntalloc: don't use gnttab_query_foreign_access()" + "CVE-2022-3646": { + "cmt_msg": "nilfs2: fix leak of nilfs_root in case of writer thread creation failure" }, - "CVE-2022-20154": { - "cmt_msg": "sctp: use call_rcu to free endpoint" + "CVE-2022-3642": { + "cmt_msg": "" }, - "CVE-2021-27363": { - "cmt_msg": "scsi: iscsi: Restrict sessions and handles to admin capabilities" + "CVE-2022-3643": { + "cmt_msg": "xen/netback: Ensure protocol headers don't fall in the non-linear area" }, - "CVE-2022-20158": { - "cmt_msg": "net/packet: fix slab-out-of-bounds access in packet_recvmsg()" + "CVE-2021-1048": { + "cmt_msg": "fix regression in \"epoll: Keep a reference on files added to the check list\"" }, - "CVE-2022-23037": { - "cmt_msg": "xen/netfront: don't use gnttab_query_foreign_access() for mapped status" + "CVE-2020-0543": { + "cmt_msg": "x86/cpu: Add 'table' argument to cpu_matches()" }, - "CVE-2024-0564": { + "CVE-2024-25739": { "cmt_msg": "" }, - "CVE-2020-0404": { - "cmt_msg": "media: uvcvideo: Avoid cyclic entity chains due to malformed USB descriptors" + "CVE-2023-6535": { + "cmt_msg": "" }, - "CVE-2019-15925": { - "cmt_msg": "net: hns3: add some error checking in hclge_tm module" + "CVE-2023-6536": { + "cmt_msg": "nvmet-tcp: fix a crash in nvmet_req_complete()" }, - "CVE-2019-15924": { - "cmt_msg": "fm10k: Fix a potential NULL pointer dereference" + "CVE-2020-15780": { + "cmt_msg": "ACPI: configfs: Disallow loading ACPI tables when locked down" }, - "CVE-2019-15538": { - "cmt_msg": "xfs: fix missing ILOCK unlock when xfs_setattr_nonsize fails due to EDQUOT" + "CVE-2019-11815": { + "cmt_msg": "net: rds: force to destroy connection if t_sock is NULL in rds_tcp_kill_sock()." }, - "CVE-2019-15926": { - "cmt_msg": "ath6kl: add some bounds checking" - }, - "CVE-2019-15921": { - "cmt_msg": "genetlink: Fix a memory leak on error path" - }, - "CVE-2019-16229": { - "cmt_msg": "drm/amdkfd: fix a potential NULL pointer dereference (v2)" - }, - "CVE-2019-14821": { - "cmt_msg": "KVM: coalesced_mmio: add bounds checking" + "CVE-2022-36280": { + "cmt_msg": "drm/vmwgfx: Validate the box size for the snooped cursor" }, - "CVE-2020-12826": { - "cmt_msg": "signal: Extend exec_id to 64bits" + "CVE-2024-21803": { + "cmt_msg": "" }, - "CVE-2019-18885": { - "cmt_msg": "btrfs: merge btrfs_find_device and find_device" + "CVE-2018-1108": { + "cmt_msg": "random: fix crng_ready() test" }, - "CVE-2021-42008": { - "cmt_msg": "net: 6pack: fix slab-out-of-bounds in decode_data" + "CVE-2018-16276": { + "cmt_msg": "USB: yurex: fix out-of-bounds uaccess in read handler" }, - "CVE-2022-39189": { - "cmt_msg": "KVM: x86: do not report a vCPU as preempted outside instruction boundaries" + "CVE-2023-2176": { + "cmt_msg": "RDMA/core: Refactor rdma_bind_addr" }, - "CVE-2022-39188": { - "cmt_msg": "mmu_gather: Force tlb-flush VM_PFNMAP vmas" + "CVE-2019-16413": { + "cmt_msg": "9p: use inode->i_lock to protect i_size_write() under 32-bit" }, - "CVE-2019-1125": { - "cmt_msg": "x86/speculation: Prepare entry code for Spectre v1 swapgs mitigations" + "CVE-2019-7222": { + "cmt_msg": "KVM: x86: work around leak of uninitialized stack contents (CVE-2019-7222)" }, - "CVE-2019-15218": { - "cmt_msg": "media: usb: siano: Fix general protection fault in smsusb" + "CVE-2019-7221": { + "cmt_msg": "KVM: nVMX: unconditionally cancel preemption timer in free_nested (CVE-2019-7221)" }, - "CVE-2019-15666": { - "cmt_msg": "xfrm: policy: Fix out-of-bound array accesses in __xfrm_policy_unlink" + "CVE-2020-10773": { + "cmt_msg": "s390/cmm: fix information leak in cmm_timeout_handler()" }, - "CVE-2020-25641": { - "cmt_msg": "block: allow for_each_bvec to support zero len bvec" + "CVE-2018-18281": { + "cmt_msg": "mremap: properly flush TLB before releasing the page" }, - "CVE-2005-3660": { - "cmt_msg": "" + "CVE-2022-2663": { + "cmt_msg": "netfilter: nf_conntrack_irc: Fix forged IP logic" }, - "CVE-2019-15212": { - "cmt_msg": "USB: rio500: refuse more than one device at a time" + "CVE-2020-25643": { + "cmt_msg": "hdlc_ppp: add range checks in ppp_cp_parse_cr()" }, - "CVE-2019-15211": { - "cmt_msg": "media: radio-raremono: change devm_k*alloc to k*alloc" + "CVE-2020-4788": { + "cmt_msg": "powerpc/64s: flush L1D on kernel entry" }, - "CVE-2023-31084": { - "cmt_msg": "media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*()" + "CVE-2021-39698": { + "cmt_msg": "wait: add wake_up_pollfree()" }, - "CVE-2019-15217": { - "cmt_msg": "media: usb:zr364xx:Fix KASAN:null-ptr-deref Read in zr364xx_vidioc_querycap" + "CVE-2019-19529": { + "cmt_msg": "can: mcba_usb: fix use-after-free on disconnect" }, - "CVE-2019-15216": { - "cmt_msg": "USB: yurex: Fix protection fault after device removal" + "CVE-2019-19528": { + "cmt_msg": "USB: iowarrior: fix use-after-free on disconnect" }, - "CVE-2019-15215": { - "cmt_msg": "media: cpia2_usb: first wake up, then free in disconnect" + "CVE-2019-19525": { + "cmt_msg": "ieee802154: atusb: fix use-after-free at disconnect" }, - "CVE-2019-15214": { - "cmt_msg": "ALSA: core: Fix card races between register and disconnect" + "CVE-2019-19524": { + "cmt_msg": "Input: ff-memless - kill timer in destroy()" }, - "CVE-2022-45885": { - "cmt_msg": "" + "CVE-2019-19527": { + "cmt_msg": "HID: hiddev: do cleanup in failure of opening a device" }, - "CVE-2020-24588": { - "cmt_msg": "cfg80211: mitigate A-MSDU aggregation attacks" + "CVE-2019-19526": { + "cmt_msg": "NFC: pn533: fix use-after-free and memleaks" }, - "CVE-2021-33034": { - "cmt_msg": "Bluetooth: verify AMP hci_chan before amp_destroy" + "CVE-2021-3753": { + "cmt_msg": "vt_kdsetmode: extend console locking" }, - "CVE-2019-19922": { - "cmt_msg": "sched/fair: Fix low cpu usage with high throttling by removing expiration of cpu-local slices" + "CVE-2021-3752": { + "cmt_msg": "Bluetooth: fix use-after-free error in lock_sock_nested()" }, - "CVE-2021-33033": { - "cmt_msg": "cipso,calipso: resolve a number of problems with the DOI refcounts" + "CVE-2023-7192": { + "cmt_msg": "netfilter: ctnetlink: fix possible refcount leak in ctnetlink_create_conntrack()" }, - "CVE-2019-19927": { - "cmt_msg": "drm/ttm: fix incrementing the page pointer for huge pages" + "CVE-2022-1263": { + "cmt_msg": "KVM: avoid NULL pointer dereference in kvm_dirty_ring_push" }, - "CVE-2020-27066": { - "cmt_msg": "xfrm: policy: Fix doulbe free in xfrm_policy_timer" + "CVE-2018-12207": { + "cmt_msg": "kvm: x86, powerpc: do not allow clearing largepages debugfs entry" }, - "CVE-2020-27068": { - "cmt_msg": "cfg80211: add missing policy for NL80211_ATTR_STATUS_CODE" + "CVE-2021-41864": { + "cmt_msg": "bpf: Fix integer overflow in prealloc_elems_and_freelist()" }, - "CVE-2024-23307": { + "CVE-2022-2209": { "cmt_msg": "" }, - "CVE-2020-8648": { - "cmt_msg": "vt: selection, close sel_buffer race" - }, - "CVE-2022-32296": { - "cmt_msg": "tcp: increase source port perturb table to 2^16" - }, - "CVE-2020-28974": { - "cmt_msg": "vt: Disable KD_FONT_OP_COPY" - }, - "CVE-2023-3567": { - "cmt_msg": "vc_screen: move load of struct vc_data pointer in vcs_read() to avoid UAF" + "CVE-2023-7042": { + "cmt_msg": "wifi: ath10k: fix NULL pointer dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev()" }, - "CVE-2019-20806": { - "cmt_msg": "media: tw5864: Fix possible NULL pointer dereference in tw5864_handle_frame" + "CVE-2023-52559": { + "cmt_msg": "iommu/vt-d: Avoid memory allocation in iommu_suspend()" }, - "CVE-2022-3028": { - "cmt_msg": "af_key: Do not call xfrm_probe_algs in parallel" + "CVE-2023-47233": { + "cmt_msg": "wifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach" }, - "CVE-2020-0305": { - "cmt_msg": "chardev: Avoid potential use-after-free in 'chrdev_open()'" + "CVE-2020-10769": { + "cmt_msg": "crypto: authenc - fix parsing key with misaligned rta_len" }, - "CVE-2020-14304": { - "cmt_msg": "" + "CVE-2022-1462": { + "cmt_msg": "tty: use new tty_insert_flip_string_and_push_buffer() in pty_write()" }, - "CVE-2010-5321": { - "cmt_msg": "" + "CVE-2024-26614": { + "cmt_msg": "tcp: make sure init the accept_queue's spinlocks once" }, - "CVE-2020-15393": { - "cmt_msg": "usb: usbtest: fix missing kfree(dev->buf) in usbtest_disconnect" + "CVE-2019-20636": { + "cmt_msg": "Input: add safety guards to input_set_keycode()" }, - "CVE-2023-23000": { - "cmt_msg": "phy: tegra: xusb: Fix return value of tegra_xusb_find_port_node function" + "CVE-2023-52435": { + "cmt_msg": "net: prevent mss overflow in skb_segment()" }, - "CVE-2019-19082": { - "cmt_msg": "drm/amd/display: prevent memory leak" + "CVE-2023-52434": { + "cmt_msg": "smb: client: fix potential OOBs in smb2_parse_contexts()" }, - "CVE-2021-3564": { - "cmt_msg": "Bluetooth: fix the erroneous flush_work() order" + "CVE-2023-52436": { + "cmt_msg": "f2fs: explicitly null-terminate the xattr list" }, - "CVE-2023-3611": { - "cmt_msg": "net/sched: sch_qfq: account for stab overhead in qfq_enqueue" + "CVE-2023-51779": { + "cmt_msg": "Bluetooth: af_bluetooth: Fix Use-After-Free in bt_sock_recvmsg" }, - "CVE-2023-4132": { - "cmt_msg": "media: usb: siano: Fix warning due to null work_func_t function pointer" + "CVE-2018-10877": { + "cmt_msg": "ext4: verify the depth of extent tree in ext4_find_extent()" }, - "CVE-2023-4133": { - "cmt_msg": "cxgb4: fix use after free bugs caused by circular dependency problem" + "CVE-2018-10876": { + "cmt_msg": "ext4: only look at the bg_flags field if it is valid" }, - "CVE-2020-26560": { + "CVE-2010-4563": { "cmt_msg": "" }, - "CVE-2023-35823": { - "cmt_msg": "media: saa7134: fix use after free bug in saa7134_finidev due to race condition" + "CVE-2023-2162": { + "cmt_msg": "scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress" }, - "CVE-2023-4134": { - "cmt_msg": "Input: cyttsp4_core - change del_timer_sync() to timer_shutdown_sync()" + "CVE-2018-10879": { + "cmt_msg": "ext4: make sure bitmaps and the inode table don't overlap with bg descriptors" }, - "CVE-2018-18397": { - "cmt_msg": "userfaultfd: use ENOENT instead of EFAULT if the atomic copy user fails" + "CVE-2018-10878": { + "cmt_msg": "ext4: always check block group bounds in ext4_init_block_bitmap()" }, - "CVE-2018-12127": { - "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" + "CVE-2023-4622": { + "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES" }, - "CVE-2018-12126": { - "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" + "CVE-2023-4623": { + "cmt_msg": "net/sched: sch_hfsc: Ensure inner classes have fsc curve" }, - "CVE-2022-23816": { - "cmt_msg": "x86/kvm/vmx: Make noinstr clean" + "CVE-2023-20588": { + "cmt_msg": "x86/CPU/AMD: Do not leak quotient data after a division by 0" }, - "CVE-2023-37454": { - "cmt_msg": "" + "CVE-2021-38300": { + "cmt_msg": "bpf, mips: Validate conditional branch offsets" }, - "CVE-2021-3892": { - "cmt_msg": "" + "CVE-2020-25656": { + "cmt_msg": "vt: keyboard, extend func_buf_lock to readers" }, - "CVE-2022-2978": { - "cmt_msg": "fs: fix UAF/GPF bug in nilfs_mdt_destroy" + "CVE-2021-4023": { + "cmt_msg": "io-wq: fix cancellation on create-worker failure" }, - "CVE-2022-20572": { - "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag" + "CVE-2018-3693": { + "cmt_msg": "ext4: fix spectre gadget in ext4_mb_regular_allocator()" }, - "CVE-2023-39194": { - "cmt_msg": "net: xfrm: Fix xfrm_address_filter OOB read" + "CVE-2021-22555": { + "cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write" }, - "CVE-2023-2002": { - "cmt_msg": "bluetooth: Perform careful capability checks in hci_sock_ioctl()" + "CVE-2023-3161": { + "cmt_msg": "fbcon: Check font dimension limits" }, - "CVE-2023-39197": { - "cmt_msg": "netfilter: conntrack: dccp: copy entire header to stack buffer, not just basic one" + "CVE-2021-3506": { + "cmt_msg": "f2fs: fix to avoid out-of-bounds memory access" }, - "CVE-2019-10126": { - "cmt_msg": "mwifiex: Fix heap overflow in mwifiex_uap_parse_tail_ies()" + "CVE-2021-47082": { + "cmt_msg": "tun: avoid double free in tun_free_netdev" }, - "CVE-2019-13631": { - "cmt_msg": "Input: gtco - bounds check collection indent level" + "CVE-2021-47083": { + "cmt_msg": "pinctrl: mediatek: fix global-out-of-bounds issue" }, - "CVE-2020-13974": { - "cmt_msg": "vt: keyboard: avoid signed integer overflow in k_ascii" + "CVE-2021-31916": { + "cmt_msg": "dm ioctl: fix out of bounds array access when no devices" }, - "CVE-2021-4083": { - "cmt_msg": "fget: check that the fd still exists after getting a ref to it" + "CVE-2021-47086": { + "cmt_msg": "phonet/pep: refuse to enable an unbound pipe" }, - "CVE-2023-33288": { - "cmt_msg": "power: supply: bq24190: Fix use after free bug in bq24190_remove due to race condition" + "CVE-2018-11508": { + "cmt_msg": "compat: fix 4-byte infoleak via uninitialized struct field" }, - "CVE-2022-36402": { - "cmt_msg": "drm/vmwgfx: Fix shader stage validation" + "CVE-2018-11506": { + "cmt_msg": "sr: pass down correctly sized SCSI sense buffer" }, - "CVE-2022-29900": { - "cmt_msg": "x86/kvm/vmx: Make noinstr clean" + "CVE-2023-32269": { + "cmt_msg": "netrom: Fix use-after-free caused by accept on already connected socket" }, - "CVE-2022-29901": { - "cmt_msg": "x86/kvm/vmx: Make noinstr clean" + "CVE-2021-4157": { + "cmt_msg": "pNFS/flexfiles: fix incorrect size check in decode_nfs_fh()" }, - "CVE-2021-4197": { - "cmt_msg": "cgroup: Use open-time credentials for process migraton perm checks" + "CVE-2021-4155": { + "cmt_msg": "xfs: map unwritten blocks in XFS_IOC_{ALLOC,FREE}SP just like fallocate" }, - "CVE-2019-19227": { - "cmt_msg": "appletalk: Fix potential NULL pointer dereference in unregister_snap_client" + "CVE-2021-4150": { + "cmt_msg": "block: fix incorrect references to disk objects" }, - "CVE-2020-10751": { - "cmt_msg": "selinux: properly handle multiple messages in selinux_netlink_send()" + "CVE-2021-4159": { + "cmt_msg": "bpf: Verifer, adjust_scalar_min_max_vals to always call update_reg_bounds()" }, - "CVE-2019-9162": { - "cmt_msg": "netfilter: nf_nat_snmp_basic: add missing length checks in ASN.1 cbs" + "CVE-2021-29154": { + "cmt_msg": "bpf, x86: Validate computation of branch displacements for x86-64" }, - "CVE-2023-39192": { - "cmt_msg": "netfilter: xt_u32: validate user space input" + "CVE-2021-29155": { + "cmt_msg": "bpf: Use correct permission flag for mixed signed bounds arithmetic" }, - "CVE-2020-10757": { - "cmt_msg": "mm: Fix mremap not considering huge pmd devmap" + "CVE-2019-3016": { + "cmt_msg": "x86/kvm: Be careful not to clear KVM_VCPU_FLUSH_TLB bit" }, - "CVE-2018-20511": { - "cmt_msg": "net/appletalk: fix minor pointer leak to userspace in SIOCFINDIPDDPRT" + "CVE-2022-25375": { + "cmt_msg": "usb: gadget: rndis: check size of RNDIS_MSG_SET command" }, - "CVE-2022-20166": { - "cmt_msg": "drivers core: Use sysfs_emit and sysfs_emit_at for show(device *...) functions" + "CVE-2021-47158": { + "cmt_msg": "net: dsa: sja1105: add error handling in sja1105_setup()" }, - "CVE-2020-15437": { - "cmt_msg": "serial: 8250: fix null-ptr-deref in serial8250_start_tx()" + "CVE-2021-47159": { + "cmt_msg": "net: dsa: fix a crash if ->get_sset_count() fails" }, - "CVE-2020-15436": { - "cmt_msg": "block: Fix use-after-free in blkdev_get()" + "CVE-2021-47153": { + "cmt_msg": "i2c: i801: Don't generate an interrupt on bus reset" }, - "CVE-2022-1116": { - "cmt_msg": "" + "CVE-2021-47150": { + "cmt_msg": "net: fec: fix the potential memory leak in fec_enet_init()" }, - "CVE-2021-28660": { - "cmt_msg": "staging: rtl8188eu: prevent ->ssid overflow in rtw_wx_set_scan()" + "CVE-2021-47151": { + "cmt_msg": "interconnect: qcom: bcm-voter: add a missing of_node_put()" }, - "CVE-2024-0775": { - "cmt_msg": "ext4: improve error recovery code paths in __ext4_remount()" + "CVE-2021-46936": { + "cmt_msg": "net: fix use-after-free in tw_timer_handler" }, - "CVE-2020-8647": { - "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region" + "CVE-2021-46935": { + "cmt_msg": "binder: fix async_free_space accounting for empty parcels" }, - "CVE-2019-0155": { - "cmt_msg": "drm/i915: Rename gen7 cmdparser tables" + "CVE-2021-46934": { + "cmt_msg": "i2c: validate user data in compat ioctl" }, - "CVE-2019-0154": { - "cmt_msg": "drm/i915: Lower RM timeout to avoid DSI hard hangs" + "CVE-2021-46933": { + "cmt_msg": "usb: gadget: f_fs: Clear ffs_eventfd in ffs_data_clear." }, - "CVE-2023-35827": { - "cmt_msg": "ravb: Fix use-after-free issue in ravb_tx_timeout_work()" + "CVE-2021-46932": { + "cmt_msg": "Input: appletouch - initialize work before device registration" }, - "CVE-2023-1859": { - "cmt_msg": "9p/xen : Fix use after free bug in xen_9pfs_front_remove due to race condition" + "CVE-2021-46939": { + "cmt_msg": "tracing: Restructure trace_clock_global() to never block" }, - "CVE-2020-36386": { - "cmt_msg": "Bluetooth: Fix slab-out-of-bounds read in hci_extended_inquiry_result_evt()" + "CVE-2021-46938": { + "cmt_msg": "dm rq: fix double free of blk_mq_tag_set in dev remove after table load fails" }, - "CVE-2022-3567": { - "cmt_msg": "ipv6: Fix data races around sk->sk_prot." + "CVE-2018-16862": { + "cmt_msg": "mm: cleancache: fix corruption on missed inode invalidation" }, - "CVE-2022-3566": { - "cmt_msg": "tcp: Fix data races around icsk->icsk_af_ops." + "CVE-2024-26623": { + "cmt_msg": "pds_core: Prevent race issues involving the adminq" }, - "CVE-2022-3565": { - "cmt_msg": "mISDN: fix use-after-free bugs in l1oip timer handlers" + "CVE-2018-16884": { + "cmt_msg": "sunrpc: use-after-free in svc_process_common()" }, - "CVE-2022-3564": { - "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free caused by l2cap_reassemble_sdu" + "CVE-2018-16882": { + "cmt_msg": "KVM: Fix UAF in nested posted interrupt processing" }, - "CVE-2018-19407": { - "cmt_msg": "KVM: X86: Fix scan ioapic use-before-initialization" + "CVE-2022-45885": { + "cmt_msg": "" }, - "CVE-2020-36385": { - "cmt_msg": "RDMA/ucma: Rework ucma_migrate_id() to avoid races with destroy" + "CVE-2022-45884": { + "cmt_msg": "" }, - "CVE-2022-3628": { - "cmt_msg": "wifi: brcmfmac: Fix potential buffer overflow in brcmf_fweh_event_worker()" + "CVE-2024-25740": { + "cmt_msg": "" }, - "CVE-2020-0009": { - "cmt_msg": "staging: android: ashmem: Disallow ashmem memory from being remapped" + "CVE-2024-25741": { + "cmt_msg": "" }, - "CVE-2023-52340": { - "cmt_msg": "ipv6: remove max_size check inline with ipv4" + "CVE-2024-25744": { + "cmt_msg": "x86/coco: Disable 32-bit emulation by default on TDX and SEV" }, - "CVE-2020-7053": { - "cmt_msg": "drm/i915: Introduce a mutex for file_priv->context_idr" + "CVE-2023-1859": { + "cmt_msg": "9p/xen : Fix use after free bug in xen_9pfs_front_remove due to race condition" }, - "CVE-2023-28466": { - "cmt_msg": "net: tls: fix possible race condition between do_tls_getsockopt_conf() and do_tls_setsockopt_conf()" + "CVE-2023-2513": { + "cmt_msg": "ext4: fix use-after-free in ext4_xattr_set_entry" }, - "CVE-2019-14615": { - "cmt_msg": "drm/i915/gen9: Clear residual context state on context switch" + "CVE-2023-1855": { + "cmt_msg": "hwmon: (xgene) Fix use after free bug in xgene_hwmon_remove due to race condition" }, - "CVE-2018-16871": { - "cmt_msg": "nfsd: COPY and CLONE operations require the saved filehandle to be set" + "CVE-2015-2877": { + "cmt_msg": "" }, - "CVE-2021-3635": { - "cmt_msg": "netfilter: nf_tables: fix flowtable list del corruption" + "CVE-2019-16089": { + "cmt_msg": "" }, - "CVE-2019-13648": { - "cmt_msg": "powerpc/tm: Fix oops on sigreturn on systems without TM" + "CVE-2020-28941": { + "cmt_msg": "speakup: Do not let the line discipline be used several times" }, - "CVE-2023-0030": { - "cmt_msg": "drm/nouveau/mmu: add more general vmm free/node handling functions" + "CVE-2021-45486": { + "cmt_msg": "inet: use bigger hash table for IP ID generation" }, - "CVE-2020-16120": { - "cmt_msg": "ovl: switch to mounter creds in readdir" + "CVE-2021-3923": { + "cmt_msg": "RDMA/core: Don't infoleak GRH fields" }, - "CVE-2019-11599": { - "cmt_msg": "coredump: fix race condition between mmget_not_zero()/get_task_mm() and core dumping" + "CVE-2020-14331": { + "cmt_msg": "vgacon: Fix for missing check in scrollback handling" }, - "CVE-2018-16658": { - "cmt_msg": "cdrom: Fix info leak/OOB read in cdrom_ioctl_drive_status" + "CVE-2022-36123": { + "cmt_msg": "x86: Clear .brk area at early boot" }, - "CVE-2022-29581": { - "cmt_msg": "net/sched: cls_u32: fix netns refcount changes in u32_change()" + "CVE-2019-19532": { + "cmt_msg": "HID: Fix assumption that devices have inputs" }, - "CVE-2022-1204": { - "cmt_msg": "ax25: Fix refcount leaks caused by ax25_cb_del()" + "CVE-2020-36558": { + "cmt_msg": "vt: vt_ioctl: fix race in VT_RESIZEX" }, - "CVE-2019-2101": { - "cmt_msg": "media: uvcvideo: Fix 'type' check leading to overflow" + "CVE-2018-13100": { + "cmt_msg": "f2fs: fix to do sanity check with secs_per_zone" }, - "CVE-2019-17666": { - "cmt_msg": "rtlwifi: Fix potential overflow on P2P code" + "CVE-2018-8087": { + "cmt_msg": "mac80211_hwsim: fix possible memory leak in hwsim_new_radio_nl()" }, - "CVE-2018-15471": { - "cmt_msg": "xen-netback: fix input validation in xenvif_set_hash_mapping()" + "CVE-2020-36158": { + "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_cmd_802_11_ad_hoc_start" }, - "CVE-2016-10723": { - "cmt_msg": "mm, oom: remove sleep from under oom_lock" + "CVE-2023-28466": { + "cmt_msg": "net: tls: fix possible race condition between do_tls_getsockopt_conf() and do_tls_setsockopt_conf()" }, - "CVE-2019-19036": { - "cmt_msg": "btrfs: Detect unbalanced tree with empty leaf before crashing btree operations" + "CVE-2022-40307": { + "cmt_msg": "efi: capsule-loader: Fix use-after-free in efi_capsule_write" }, - "CVE-2019-3459": { - "cmt_msg": "Bluetooth: Verify that l2cap_get_conf_opt provides large enough buffer" + "CVE-2021-39686": { + "cmt_msg": "binder: use euid from cred instead of using task" }, - "CVE-2020-11494": { - "cmt_msg": "slcan: Don't transmit uninitialized stack data in padding" + "CVE-2021-39685": { + "cmt_msg": "USB: gadget: detect too-big endpoint 0 requests" }, - "CVE-2019-19039": { - "cmt_msg": "btrfs: Don't submit any btree write bio if the fs has errors" + "CVE-2018-1000200": { + "cmt_msg": "mm, oom: fix concurrent munlock and oom reaper unmap, v3" }, - "CVE-2020-0444": { - "cmt_msg": "audit: fix error handling in audit_data_to_entry()" + "CVE-2018-1000204": { + "cmt_msg": "scsi: sg: allocate with __GFP_ZERO in sg_build_indirect()" }, - "CVE-2022-1419": { - "cmt_msg": "drm/vgem: Close use-after-free race in vgem_gem_create" + "CVE-2021-3744": { + "cmt_msg": "crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd()" }, - "CVE-2022-1836": { - "cmt_msg": "floppy: disable FDRAWCMD by default" + "CVE-2021-3743": { + "cmt_msg": "net: qrtr: fix OOB Read in qrtr_endpoint_post" }, - "CVE-2020-11884": { - "cmt_msg": "s390/mm: fix page table upgrade vs 2ndary address mode accesses" + "CVE-2024-26592": { + "cmt_msg": "ksmbd: fix UAF issue in ksmbd_tcp_new_connection()" }, - "CVE-2021-32078": { - "cmt_msg": "ARM: footbridge: remove personal server platform" + "CVE-2024-26594": { + "cmt_msg": "ksmbd: validate mech token in session setup" }, - "CVE-2022-30594": { - "cmt_msg": "ptrace: Check PTRACE_O_SUSPEND_SECCOMP permission on PTRACE_SEIZE" + "CVE-2023-2483": { + "cmt_msg": "net: qcom/emac: Fix use after free bug in emac_remove due to race condition" }, - "CVE-2022-4662": { - "cmt_msg": "USB: core: Prevent nested device-reset calls" + "CVE-2024-26598": { + "cmt_msg": "KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache" }, - "CVE-2019-11833": { - "cmt_msg": "ext4: zero out the unused memory region in the extent tree block" + "CVE-2018-3646": { + "cmt_msg": "x86/microcode: Allow late microcode loading with SMT disabled" }, - "CVE-2021-38205": { - "cmt_msg": "net: xilinx_emaclite: Do not print real IOMEM pointer" + "CVE-2023-2002": { + "cmt_msg": "bluetooth: Perform careful capability checks in hci_sock_ioctl()" }, - "CVE-2020-27835": { - "cmt_msg": "IB/hfi1: Ensure correct mm is used at all times" + "CVE-2023-2007": { + "cmt_msg": "scsi: dpt_i2o: Remove obsolete driver" }, - "CVE-2020-27830": { - "cmt_msg": "speakup: Reject setting the speakup line discipline outside of speakup" + "CVE-2022-1419": { + "cmt_msg": "drm/vgem: Close use-after-free race in vgem_gem_create" }, - "CVE-2020-0255": { - "cmt_msg": "selinux: properly handle multiple messages in selinux_netlink_send()" + "CVE-2022-2503": { + "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag" }, - "CVE-2023-35001": { - "cmt_msg": "netfilter: nf_tables: prevent OOB access in nft_byteorder_eval" + "CVE-2022-23038": { + "cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()" }, - "CVE-2022-27666": { - "cmt_msg": "esp: Fix possible buffer overflow in ESP transformation" + "CVE-2022-23039": { + "cmt_msg": "xen/gntalloc: don't use gnttab_query_foreign_access()" }, - "CVE-2021-38208": { - "cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect" + "CVE-2022-23036": { + "cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()" }, - "CVE-2019-2213": { - "cmt_msg": "binder: fix possible UAF when freeing buffer" + "CVE-2022-23037": { + "cmt_msg": "xen/netfront: don't use gnttab_query_foreign_access() for mapped status" }, - "CVE-2020-25211": { - "cmt_msg": "netfilter: ctnetlink: add a range check for l3/l4 protonum" + "CVE-2018-10840": { + "cmt_msg": "ext4: correctly handle a zero-length xattr with a non-zero e_value_offs" }, - "CVE-2020-25212": { - "cmt_msg": "nfs: Fix getxattr kernel panic and memory overflow" + "CVE-2019-15538": { + "cmt_msg": "xfs: fix missing ILOCK unlock when xfs_setattr_nonsize fails due to EDQUOT" }, - "CVE-2020-26556": { - "cmt_msg": "" + "CVE-2023-2177": { + "cmt_msg": "sctp: leave the err path free in sctp_stream_init to sctp_stream_free" }, - "CVE-2020-26557": { - "cmt_msg": "" + "CVE-2019-14821": { + "cmt_msg": "KVM: coalesced_mmio: add bounds checking" }, - "CVE-2022-48619": { - "cmt_msg": "Input: add bounds checking to input_set_capability()" + "CVE-2020-12826": { + "cmt_msg": "signal: Extend exec_id to 64bits" }, - "CVE-2020-26555": { - "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical" + "CVE-2021-42008": { + "cmt_msg": "net: 6pack: fix slab-out-of-bounds in decode_data" }, - "CVE-2019-20794": { - "cmt_msg": "" + "CVE-2020-25645": { + "cmt_msg": "geneve: add transport ports in route lookup for geneve" }, - "CVE-2020-26559": { - "cmt_msg": "" + "CVE-2019-15666": { + "cmt_msg": "xfrm: policy: Fix out-of-bound array accesses in __xfrm_policy_unlink" }, - "CVE-2023-3397": { - "cmt_msg": "" + "CVE-2020-25641": { + "cmt_msg": "block: allow for_each_bvec to support zero len bvec" }, - "CVE-2018-1128": { - "cmt_msg": "libceph: add authorizer challenge" + "CVE-2021-33034": { + "cmt_msg": "Bluetooth: verify AMP hci_chan before amp_destroy" }, - "CVE-2018-1129": { - "cmt_msg": "libceph: implement CEPHX_V2 calculation mode" + "CVE-2021-33033": { + "cmt_msg": "cipso,calipso: resolve a number of problems with the DOI refcounts" }, - "CVE-2022-26365": { - "cmt_msg": "xen/blkfront: fix leaking data in shared pages" + "CVE-2022-40768": { + "cmt_msg": "scsi: stex: Properly zero out the passthrough command structure" }, - "CVE-2023-52458": { - "cmt_msg": "block: add check that partition length needs to be aligned with block size" + "CVE-2024-26625": { + "cmt_msg": "llc: call sock_orphan() at release time" }, - "CVE-2018-20854": { - "cmt_msg": "phy: ocelot-serdes: fix out-of-bounds read" + "CVE-2024-26627": { + "cmt_msg": "scsi: core: Move scsi_host_busy() out of host lock for waking up EH handler" }, - "CVE-2018-20855": { - "cmt_msg": "IB/mlx5: Fix leaking stack memory to userspace" + "CVE-2024-26622": { + "cmt_msg": "tomoyo: fix UAF write bug in tomoyo_write_control()" }, - "CVE-2018-20856": { - "cmt_msg": "block: blk_init_allocated_queue() set q->fq as NULL in the fail case" + "CVE-2023-39198": { + "cmt_msg": "drm/qxl: fix UAF on handle creation" }, - "CVE-2023-52451": { - "cmt_msg": "powerpc/pseries/memhp: Fix access beyond end of drmem array" + "CVE-2018-10021": { + "cmt_msg": "scsi: libsas: defer ata device eh commands to libata" }, - "CVE-2019-19046": { - "cmt_msg": "ipmi: Fix memory leak in __ipmi_bmc_register" + "CVE-2019-10126": { + "cmt_msg": "mwifiex: Fix heap overflow in mwifiex_uap_parse_tail_ies()" }, - "CVE-2019-19045": { - "cmt_msg": "net/mlx5: prevent memory leak in mlx5_fpga_conn_create_cq" + "CVE-2019-10124": { + "cmt_msg": "mm: hwpoison: fix thp split handing in soft_offline_in_use_page()" }, - "CVE-2022-2961": { - "cmt_msg": "" + "CVE-2020-13974": { + "cmt_msg": "vt: keyboard: avoid signed integer overflow in k_ascii" }, - "CVE-2023-2176": { - "cmt_msg": "RDMA/core: Refactor rdma_bind_addr" + "CVE-2020-15437": { + "cmt_msg": "serial: 8250: fix null-ptr-deref in serial8250_start_tx()" }, - "CVE-2024-1086": { - "cmt_msg": "netfilter: nf_tables: reject QUEUE/DROP verdict parameters" + "CVE-2020-15436": { + "cmt_msg": "block: Fix use-after-free in blkdev_get()" }, - "CVE-2024-22386": { - "cmt_msg": "" + "CVE-2021-47065": { + "cmt_msg": "rtw88: Fix array overrun in rtw_get_tx_power_params()" }, - "CVE-2019-9466": { - "cmt_msg": "brcmfmac: add subtype check for event handling in data path" + "CVE-2022-23816": { + "cmt_msg": "x86/kvm/vmx: Make noinstr clean" }, - "CVE-2019-19048": { - "cmt_msg": "virt: vbox: fix memory leak in hgcm_call_preprocess_linaddr" + "CVE-2021-47145": { + "cmt_msg": "btrfs: do not BUG_ON in link_to_fixup_dir" }, - "CVE-2019-19049": { - "cmt_msg": "of: unittest: fix memory leak in unittest_data_add" + "CVE-2021-47149": { + "cmt_msg": "net: fujitsu: fix potential null-ptr-deref" }, - "CVE-2022-0644": { - "cmt_msg": "vfs: check fd has read access in kernel_read_file_from_fd()" + "CVE-2018-19407": { + "cmt_msg": "KVM: X86: Fix scan ioapic use-before-initialization" }, - "CVE-2020-27784": { - "cmt_msg": "usb: gadget: function: printer: fix use-after-free in __lock_acquire" + "CVE-2021-47144": { + "cmt_msg": "drm/amd/amdgpu: fix refcount leak" }, - "CVE-2018-13053": { - "cmt_msg": "alarmtimer: Prevent overflow for relative nanosleep" + "CVE-2021-47147": { + "cmt_msg": "ptp: ocp: Fix a resource leak in an error handling path" }, - "CVE-2020-27786": { - "cmt_msg": "ALSA: rawmidi: Fix racy buffer resize under concurrent accesses" + "CVE-2021-47146": { + "cmt_msg": "mld: fix panic in mld_newpack()" }, - "CVE-2019-14816": { - "cmt_msg": "mwifiex: Fix three heap overflow at parsing element in cfg80211_ap_settings" + "CVE-2021-47140": { + "cmt_msg": "iommu/amd: Clear DMA ops when switching domain" }, - "CVE-2019-14814": { - "cmt_msg": "mwifiex: Fix three heap overflow at parsing element in cfg80211_ap_settings" + "CVE-2021-47143": { + "cmt_msg": "net/smc: remove device from smcd_dev_list after failed device_add()" }, - "CVE-2019-14815": { - "cmt_msg": "mwifiex: Fix three heap overflow at parsing element in cfg80211_ap_settings" + "CVE-2021-47142": { + "cmt_msg": "drm/amdgpu: Fix a use-after-free" }, - "CVE-2023-6240": { - "cmt_msg": "" + "CVE-2021-46941": { + "cmt_msg": "usb: dwc3: core: Do core softreset when switch mode" }, - "CVE-2023-23559": { - "cmt_msg": "wifi: rndis_wlan: Prevent buffer overflow in rndis_query_oid" + "CVE-2021-33061": { + "cmt_msg": "ixgbe: add improvement for MDD response functionality" }, - "CVE-2020-10720": { - "cmt_msg": "net-gro: fix use-after-free read in napi_gro_frags()" + "CVE-2018-16871": { + "cmt_msg": "nfsd: COPY and CLONE operations require the saved filehandle to be set" }, - "CVE-2022-0382": { - "cmt_msg": "net ticp:fix a kernel-infoleak in __tipc_sendmsg()" + "CVE-2018-16658": { + "cmt_msg": "cdrom: Fix info leak/OOB read in cdrom_ioctl_drive_status" }, - "CVE-2023-32233": { - "cmt_msg": "netfilter: nf_tables: deactivate anonymous set from preparation phase" + "CVE-2019-19036": { + "cmt_msg": "btrfs: Detect unbalanced tree with empty leaf before crashing btree operations" }, - "CVE-2020-25672": { - "cmt_msg": "nfc: fix memory leak in llcp_sock_connect()" + "CVE-2019-19039": { + "cmt_msg": "btrfs: Don't submit any btree write bio if the fs has errors" }, - "CVE-2019-9455": { - "cmt_msg": "media: videobuf2-v4l2: drop WARN_ON in vb2_warn_zero_bytesused()" + "CVE-2021-32078": { + "cmt_msg": "ARM: footbridge: remove personal server platform" }, - "CVE-2020-25670": { - "cmt_msg": "nfc: fix refcount leak in llcp_sock_bind()" + "CVE-2022-4662": { + "cmt_msg": "USB: core: Prevent nested device-reset calls" }, - "CVE-2020-25671": { - "cmt_msg": "nfc: fix refcount leak in llcp_sock_connect()" + "CVE-2019-11833": { + "cmt_msg": "ext4: zero out the unused memory region in the extent tree block" }, - "CVE-2018-21008": { - "cmt_msg": "rsi: add fix for crash during assertions" + "CVE-2020-27835": { + "cmt_msg": "IB/hfi1: Ensure correct mm is used at all times" }, - "CVE-2019-15223": { - "cmt_msg": "ALSA: line6: Assure canceling delayed work at disconnection" + "CVE-2020-27830": { + "cmt_msg": "speakup: Reject setting the speakup line discipline outside of speakup" }, - "CVE-2019-19813": { - "cmt_msg": "btrfs: inode: Verify inode mode to avoid NULL pointer dereference" + "CVE-2018-1128": { + "cmt_msg": "libceph: add authorizer challenge" }, - "CVE-2019-15221": { - "cmt_msg": "ALSA: line6: Fix write on zero-sized buffer" + "CVE-2018-1129": { + "cmt_msg": "libceph: implement CEPHX_V2 calculation mode" }, - "CVE-2019-19815": { - "cmt_msg": "f2fs: support swap file w/ DIO" + "CVE-2018-1120": { + "cmt_msg": "proc: do not access cmdline nor environ from file-backed areas" }, - "CVE-2019-19814": { + "CVE-2018-1121": { "cmt_msg": "" }, - "CVE-2020-29371": { - "cmt_msg": "romfs: fix uninitialized memory leak in romfs_dev_read()" - }, - "CVE-2019-19816": { - "cmt_msg": "btrfs: inode: Verify inode mode to avoid NULL pointer dereference" - }, - "CVE-2023-1118": { - "cmt_msg": "media: rc: Fix use-after-free bugs caused by ene_tx_irqsim()" - }, - "CVE-2022-1016": { - "cmt_msg": "netfilter: nf_tables: initialize registers in nft_do_chain()" - }, - "CVE-2018-18710": { - "cmt_msg": "cdrom: fix improper type cast, which can leat to information leak." + "CVE-2018-20856": { + "cmt_msg": "block: blk_init_allocated_queue() set q->fq as NULL in the fail case" }, - "CVE-2019-5108": { - "cmt_msg": "mac80211: Do not send Layer 2 Update frame before authorization" + "CVE-2022-3061": { + "cmt_msg": "video: fbdev: i740fb: Error out if 'pixclock' equals zero" }, - "CVE-2022-0001": { - "cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE" + "CVE-2020-27784": { + "cmt_msg": "usb: gadget: function: printer: fix use-after-free in __lock_acquire" }, - "CVE-2022-1012": { - "cmt_msg": "secure_seq: use the 64 bits of the siphash for port offset calculation" + "CVE-2020-27786": { + "cmt_msg": "ALSA: rawmidi: Fix racy buffer resize under concurrent accesses" }, - "CVE-2022-38096": { + "CVE-2023-6240": { "cmt_msg": "" }, - "CVE-2020-8649": { - "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region" + "CVE-2022-39842": { + "cmt_msg": "video: fbdev: pxa3xx-gcu: Fix integer overflow in pxa3xx_gcu_write" }, - "CVE-2020-12656": { - "cmt_msg": "sunrpc: check that domain table is empty at module unload." + "CVE-2023-51043": { + "cmt_msg": "drm/atomic: Fix potential use-after-free in nonblocking commits" }, - "CVE-2020-14356": { - "cmt_msg": "cgroup: fix cgroup_sk_alloc() for sk_clone_lock()" + "CVE-2024-23196": { + "cmt_msg": "ALSA: hda: fix a possible null-pointer dereference due to data race in snd_hdac_regmap_sync()" + }, + "CVE-2022-3115": { + "cmt_msg": "drm: mali-dp: potential dereference of null pointer" }, "CVE-2021-26931": { "cmt_msg": "xen-blkback: don't \"handle\" error by BUG()" @@ -25184,9138 +22602,44745 @@ "CVE-2021-26930": { "cmt_msg": "xen-blkback: fix error handling in xen_blkbk_map()" }, - "CVE-2021-42252": { - "cmt_msg": "soc: aspeed: lpc-ctrl: Fix boundary check for mmap" - }, "CVE-2021-26932": { "cmt_msg": "Xen/x86: don't bail early from clear_foreign_p2m_mapping()" }, - "CVE-2023-52456": { - "cmt_msg": "serial: imx: fix tx statemachine deadlock" + "CVE-2022-36402": { + "cmt_msg": "drm/vmwgfx: Fix shader stage validation" }, - "CVE-2023-3141": { - "cmt_msg": "memstick: r592: Fix UAF bug in r592_remove due to race condition" + "CVE-2021-3178": { + "cmt_msg": "nfsd4: readdirplus shouldn't return parent of export" }, - "CVE-2022-0492": { - "cmt_msg": "cgroup-v1: Require capabilities to set release_agent" + "CVE-2023-1611": { + "cmt_msg": "btrfs: fix race between quota disable and quota assign ioctls" }, - "CVE-2020-12352": { - "cmt_msg": "Bluetooth: A2MP: Fix not initializing all members" + "CVE-2021-3772": { + "cmt_msg": "sctp: use init_tag from inithdr for ABORT chunk" }, - "CVE-2020-12351": { - "cmt_msg": "Bluetooth: L2CAP: Fix calling sk_filter on non-socket based channel" + "CVE-2021-34556": { + "cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4" }, - "CVE-2020-12655": { - "cmt_msg": "xfs: add agf freeblocks verify in xfs_agf_verify" + "CVE-2021-28714": { + "cmt_msg": "xen/netback: fix rx queue stall detection" }, - "CVE-2022-20132": { - "cmt_msg": "HID: add hid_is_usb() function to make it simpler for USB detection" + "CVE-2021-28713": { + "cmt_msg": "xen/console: harden hvc_xen against event channel storms" }, - "CVE-2022-0494": { - "cmt_msg": "block-map: add __GFP_ZERO flag for alloc_page in function bio_copy_kern" + "CVE-2021-28712": { + "cmt_msg": "xen/netfront: harden netfront against event channel storms" }, - "CVE-2023-2269": { - "cmt_msg": "dm ioctl: fix nested locking in table_clear() to remove deadlock concern" + "CVE-2021-28711": { + "cmt_msg": "xen/blkfront: harden blkfront against event channel storms" }, - "CVE-2020-26088": { - "cmt_msg": "net/nfc/rawsock.c: add CAP_NET_RAW check." + "CVE-2022-1247": { + "cmt_msg": "" }, - "CVE-2022-3524": { - "cmt_msg": "tcp/udp: Fix memory leak in ipv6_renew_options()." + "CVE-2022-2991": { + "cmt_msg": "remove the lightnvm subsystem" }, - "CVE-2022-3523": { - "cmt_msg": "mm/memory.c: fix race when faulting a device private page" + "CVE-2021-39657": { + "cmt_msg": "scsi: ufs: Correct the LUN used in eh_device_reset_handler() callback" }, - "CVE-2022-3522": { - "cmt_msg": "mm/hugetlb: use hugetlb_pte_stable in migration race check" + "CVE-2023-52578": { + "cmt_msg": "net: bridge: use DEV_STATS_INC()" }, - "CVE-2008-2544": { - "cmt_msg": "" + "CVE-2023-52574": { + "cmt_msg": "team: fix null-ptr-deref when team device type is changed" }, - "CVE-2021-3178": { - "cmt_msg": "nfsd4: readdirplus shouldn't return parent of export" + "CVE-2023-3567": { + "cmt_msg": "vc_screen: move load of struct vc_data pointer in vcs_read() to avoid UAF" }, - "CVE-2022-42703": { - "cmt_msg": "mm/rmap: Fix anon_vma->degree ambiguity leading to double-reuse" + "CVE-2023-52571": { + "cmt_msg": "power: supply: rk817: Fix node refcount leak" }, - "CVE-2018-7755": { - "cmt_msg": "floppy: Do not copy a kernel pointer to user memory in FDGETPRM ioctl" + "CVE-2023-52572": { + "cmt_msg": "cifs: Fix UAF in cifs_demultiplex_thread()" }, - "CVE-2019-15031": { - "cmt_msg": "powerpc/tm: Fix restoring FP/VMX facility incorrectly on interrupts" + "CVE-2018-18445": { + "cmt_msg": "bpf: 32-bit RSH verification must truncate input before the ALU op" }, - "CVE-2019-15030": { - "cmt_msg": "powerpc/tm: Fix FP/VMX unavailable exceptions inside a transaction" + "CVE-2018-10902": { + "cmt_msg": "ALSA: rawmidi: Change resized buffers atomically" }, - "CVE-2019-11479": { - "cmt_msg": "tcp: add tcp_min_snd_mss sysctl" + "CVE-2018-10853": { + "cmt_msg": "kvm: x86: use correct privilege level for sgdt/sidt/fxsave/fxrstor access" }, - "CVE-2022-0330": { - "cmt_msg": "drm/i915: Flush TLBs before releasing backing store" + "CVE-2020-12362": { + "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" }, - "CVE-2007-3719": { - "cmt_msg": "" + "CVE-2020-12363": { + "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" }, - "CVE-2023-3863": { - "cmt_msg": "net: nfc: Fix use-after-free caused by nfc_llcp_find_local" + "CVE-2019-12881": { + "cmt_msg": "drm/i915/userptr: reject zero user_size" }, - "CVE-2023-0590": { - "cmt_msg": "net: sched: fix race condition in qdisc_graft()" + "CVE-2022-4129": { + "cmt_msg": "l2tp: Serialize access to sk_user_data with sk_callback_lock" }, - "CVE-2022-4095": { - "cmt_msg": "staging: rtl8712: fix use after free bugs" + "CVE-2020-12364": { + "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" }, - "CVE-2022-45919": { - "cmt_msg": "media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221" + "CVE-2023-33203": { + "cmt_msg": "net: qcom/emac: Fix use after free bug in emac_remove due to race condition" }, - "CVE-2019-19319": { - "cmt_msg": "ext4: protect journal inode's blocks using block_validity" + "CVE-2021-4002": { + "cmt_msg": "hugetlbfs: flush TLBs correctly after huge_pmd_unshare" }, - "CVE-2019-19462": { - "cmt_msg": "kernel/relay.c: handle alloc_percpu returning NULL in relay_open" + "CVE-2023-26545": { + "cmt_msg": "net: mpls: fix stale pointer if allocation fails during device rename" }, - "CVE-2023-30772": { - "cmt_msg": "power: supply: da9150: Fix use after free bug in da9150_charger_remove due to race condition" + "CVE-2019-15292": { + "cmt_msg": "appletalk: Fix use-after-free in atalk_proc_exit" }, - "CVE-2022-24958": { - "cmt_msg": "usb: gadget: don't release an existing dev->buf" + "CVE-2019-15291": { + "cmt_msg": "media: b2c2-flexcop-usb: add sanity checking" }, - "CVE-2023-1611": { - "cmt_msg": "btrfs: fix race between quota disable and quota assign ioctls" + "CVE-2019-15290": { + "cmt_msg": "" }, - "CVE-2021-3772": { - "cmt_msg": "sctp: use init_tag from inithdr for ABORT chunk" + "CVE-2023-3212": { + "cmt_msg": "gfs2: Don't deref jdesc in evict" }, - "CVE-2021-3679": { - "cmt_msg": "tracing: Fix bug in rb_per_cpu_empty() that might cause deadloop." + "CVE-2024-26633": { + "cmt_msg": "ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim()" }, - "CVE-2021-39711": { - "cmt_msg": "bpf: fix panic due to oob in bpf_prog_test_run_skb" + "CVE-2024-26636": { + "cmt_msg": "llc: make llc_ui_sendmsg() more robust against bonding changes" }, - "CVE-2022-3629": { - "cmt_msg": "vsock: Fix memory leak in vsock_connect()" + "CVE-2024-26635": { + "cmt_msg": "llc: Drop support for ETH_P_TR_802_2." }, - "CVE-2021-28715": { - "cmt_msg": "xen/netback: don't queue unlimited number of packages" + "CVE-2020-12769": { + "cmt_msg": "spi: spi-dw: Add lock protect dw_spi rx/tx to prevent concurrent calls" }, - "CVE-2021-28714": { - "cmt_msg": "xen/netback: fix rx queue stall detection" + "CVE-2023-52634": { + "cmt_msg": "drm/amd/display: Fix disable_otg_wa logic" }, - "CVE-2021-28713": { - "cmt_msg": "xen/console: harden hvc_xen against event channel storms" + "CVE-2023-2860": { + "cmt_msg": "ipv6: sr: fix out-of-bounds read when setting HMAC data." }, - "CVE-2021-28712": { - "cmt_msg": "xen/netfront: harden netfront against event channel storms" + "CVE-2018-20669": { + "cmt_msg": "make 'user_access_begin()' do 'access_ok()'" }, - "CVE-2021-28711": { - "cmt_msg": "xen/blkfront: harden blkfront against event channel storms" + "CVE-2020-13143": { + "cmt_msg": "USB: gadget: fix illegal array access in binding with UDC" }, - "CVE-2021-4157": { - "cmt_msg": "pNFS/flexfiles: fix incorrect size check in decode_nfs_fh()" + "CVE-2022-3903": { + "cmt_msg": "media: mceusb: Use new usb_control_msg_*() routines" }, - "CVE-2022-2991": { - "cmt_msg": "remove the lightnvm subsystem" + "CVE-2021-47179": { + "cmt_msg": "NFSv4: Fix a NULL pointer dereference in pnfs_mark_matching_lsegs_return()" }, - "CVE-2022-3621": { - "cmt_msg": "nilfs2: fix NULL pointer dereference at nilfs_bmap_lookup_at_level()" + "CVE-2019-11191": { + "cmt_msg": "x86: Deprecate a.out support" }, - "CVE-2022-23960": { - "cmt_msg": "ARM: report Spectre v2 status through sysfs" + "CVE-2021-47170": { + "cmt_msg": "USB: usbfs: Don't WARN about excessively large memory allocations" }, - "CVE-2023-51781": { - "cmt_msg": "appletalk: Fix Use-After-Free in atalk_ioctl" + "CVE-2021-47171": { + "cmt_msg": "net: usb: fix memory leak in smsc75xx_bind" }, - "CVE-2022-3624": { - "cmt_msg": "bonding: fix reference count leak in balance-alb mode" + "CVE-2021-47172": { + "cmt_msg": "iio: adc: ad7124: Fix potential overflow due to non sequential channel numbers" }, - "CVE-2022-2588": { - "cmt_msg": "net_sched: cls_route: remove from list when handle is 0" + "CVE-2021-47173": { + "cmt_msg": "misc/uss720: fix memory leak in uss720_probe" }, - "CVE-2021-39657": { - "cmt_msg": "scsi: ufs: Correct the LUN used in eh_device_reset_handler() callback" + "CVE-2021-47175": { + "cmt_msg": "net/sched: fq_pie: fix OOB access in the traffic path" }, - "CVE-2021-3669": { - "cmt_msg": "ipc: replace costly bailout check in sysvipc_find_ipc()" + "CVE-2018-10323": { + "cmt_msg": "xfs: set format back to extents if xfs_bmap_extents_to_btree" }, - "CVE-2019-3701": { - "cmt_msg": "can: gw: ensure DLC boundaries after CAN frame modification" + "CVE-2021-47177": { + "cmt_msg": "iommu/vt-d: Fix sysfs leak in alloc_iommu()" }, - "CVE-2019-12984": { - "cmt_msg": "nfc: Ensure presence of required attributes in the deactivate_target handler" + "CVE-2021-46951": { + "cmt_msg": "tpm: efi: Use local variable for calculating final log size" }, - "CVE-2023-1095": { - "cmt_msg": "netfilter: nf_tables: fix null deref due to zeroed list head" + "CVE-2021-46950": { + "cmt_msg": "md/raid1: properly indicate failure when ending a failed write request" }, - "CVE-2019-11091": { - "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" + "CVE-2021-46953": { + "cmt_msg": "ACPI: GTDT: Don't corrupt interrupt mappings on watchdow probe failure" }, - "CVE-2022-3239": { - "cmt_msg": "media: em28xx: initialize refcount before kref_get" + "CVE-2021-46952": { + "cmt_msg": "NFS: fs_context: validate UDP retrans to prevent shift out-of-bounds" }, - "CVE-2022-4543": { - "cmt_msg": "" + "CVE-2021-46959": { + "cmt_msg": "spi: Fix use-after-free with devm_spi_alloc_*" }, - "CVE-2020-15780": { - "cmt_msg": "ACPI: configfs: Disallow loading ACPI tables when locked down" + "CVE-2019-10220": { + "cmt_msg": "Convert filldir[64]() from __put_user() to unsafe_put_user()" }, - "CVE-2023-4921": { - "cmt_msg": "net: sched: sch_qfq: Fix UAF in qfq_dequeue()" + "CVE-2021-0929": { + "cmt_msg": "staging/android/ion: delete dma_buf->kmap/unmap implemenation" }, - "CVE-2022-3424": { - "cmt_msg": "misc: sgi-gru: fix use-after-free error in gru_set_context_option, gru_fault and gru_handle_user_call_os" + "CVE-2018-19985": { + "cmt_msg": "USB: hso: Fix OOB memory access in hso_probe/hso_get_config_data" }, - "CVE-2023-23455": { - "cmt_msg": "net: sched: atm: dont intepret cls results when asked to drop" + "CVE-2021-0920": { + "cmt_msg": "af_unix: fix garbage collect vs MSG_PEEK" }, - "CVE-2023-1829": { - "cmt_msg": "net/sched: Retire tcindex classifier" + "CVE-2023-0615": { + "cmt_msg": "media: vivid: dev->bitmap_cap wasn't freed in all cases" }, - "CVE-2019-18282": { - "cmt_msg": "net/flow_dissector: switch to siphash" + "CVE-2022-3586": { + "cmt_msg": "sch_sfb: Don't assume the skb is still around after enqueueing to child" }, - "CVE-2021-34981": { - "cmt_msg": "Bluetooth: cmtp: fix file refcount when cmtp_attach_device fails" + "CVE-2020-27825": { + "cmt_msg": "tracing: Fix race in trace_open and buffer resize call" }, - "CVE-2023-1670": { - "cmt_msg": "xirc2ps_cs: Fix use after free bug in xirc2ps_detach" + "CVE-2019-2181": { + "cmt_msg": "binder: check for overflow when alloc for security context" }, - "CVE-2018-14625": { - "cmt_msg": "vhost/vsock: fix use-after-free in network stack callers" + "CVE-2019-2182": { + "cmt_msg": "arm64: Enforce BBM for huge IO/VMAP mappings" }, - "CVE-2023-4881": { - "cmt_msg": "netfilter: nftables: exthdr: fix 4-byte stack OOB write" + "CVE-2020-27820": { + "cmt_msg": "drm/nouveau: use drm_dev_unplug() during device removal" }, - "CVE-2020-24394": { - "cmt_msg": "nfsd: apply umask on fs without ACL support" + "CVE-2023-6610": { + "cmt_msg": "smb: client: fix potential OOB in smb2_dump_detail()" }, - "CVE-2022-20148": { - "cmt_msg": "f2fs: fix UAF in f2fs_available_free_memory" + "CVE-2023-1476": { + "cmt_msg": "" }, - "CVE-2024-0607": { - "cmt_msg": "netfilter: nf_tables: fix pointer math issue in nft_byteorder_eval()" + "CVE-2023-1670": { + "cmt_msg": "xirc2ps_cs: Fix use after free bug in xirc2ps_detach" }, - "CVE-2013-7445": { - "cmt_msg": "" + "CVE-2020-14351": { + "cmt_msg": "perf/core: Fix race in the perf_mmap_close() function" }, - "CVE-2023-32269": { - "cmt_msg": "netrom: Fix use-after-free caused by accept on already connected socket" + "CVE-2020-14356": { + "cmt_msg": "cgroup: fix cgroup_sk_alloc() for sk_clone_lock()" }, - "CVE-2018-18445": { - "cmt_msg": "bpf: 32-bit RSH verification must truncate input before the ALU op" + "CVE-2022-20132": { + "cmt_msg": "HID: add hid_is_usb() function to make it simpler for USB detection" }, - "CVE-2023-34255": { - "cmt_msg": "xfs: verify buffer contents when we skip log replay" + "CVE-2020-0423": { + "cmt_msg": "binder: fix UAF when releasing todo list" }, - "CVE-2019-13233": { - "cmt_msg": "x86/insn-eval: Fix use-after-free access to LDT entry" + "CVE-2023-6270": { + "cmt_msg": "aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts" }, - "CVE-2022-26966": { - "cmt_msg": "sr9700: sanity check for packet length" + "CVE-2023-1582": { + "cmt_msg": "fs/proc: task_mmu.c: don't read mapcount for migration entry" }, - "CVE-2023-6931": { - "cmt_msg": "perf: Fix perf_event_validate_size()" + "CVE-2019-17351": { + "cmt_msg": "xen: let alloc_xenballooned_pages() fail if not enough memory free" }, - "CVE-2020-14386": { - "cmt_msg": "net/packet: fix overflow in tpacket_rcv" + "CVE-2018-20854": { + "cmt_msg": "phy: ocelot-serdes: fix out-of-bounds read" }, - "CVE-2021-34693": { - "cmt_msg": "can: bcm: fix infoleak in struct bcm_msg_head" + "CVE-2018-20855": { + "cmt_msg": "IB/mlx5: Fix leaking stack memory to userspace" }, - "CVE-2020-14385": { - "cmt_msg": "xfs: fix boundary test in xfs_attr_shortform_verify" + "CVE-2021-3348": { + "cmt_msg": "nbd: freeze the queue while we're adding connections" }, - "CVE-2019-19767": { - "cmt_msg": "ext4: add more paranoia checking in ext4_expand_extra_isize handling" + "CVE-2019-1999": { + "cmt_msg": "binder: fix race between munmap() and direct reclaim" }, - "CVE-2021-3656": { - "cmt_msg": "KVM: nSVM: always intercept VMLOAD/VMSAVE when nested (CVE-2021-3656)" + "CVE-2021-3347": { + "cmt_msg": "futex: Ensure the correct return value from futex_lock_pi()" }, - "CVE-2020-14381": { - "cmt_msg": "futex: Fix inode life-time issue" + "CVE-2019-7308": { + "cmt_msg": "bpf: fix sanitation of alu op with pointer / scalar type from different paths" }, - "CVE-2019-19768": { - "cmt_msg": "blktrace: Protect q->blk_trace with RCU" + "CVE-2022-1966": { + "cmt_msg": "netfilter: nf_tables: disallow non-stateful expression in sets earlier" }, - "CVE-2022-3303": { - "cmt_msg": "ALSA: pcm: oss: Fix race at SNDCTL_DSP_SYNC" + "CVE-2021-3587": { + "cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect" }, - "CVE-2023-52443": { - "cmt_msg": "apparmor: avoid crash when parsed profile name is empty" + "CVE-2019-16995": { + "cmt_msg": "net: hsr: fix memory leak in hsr_dev_finalize()" }, - "CVE-2022-20141": { - "cmt_msg": "igmp: Add ip_mc_list lock in ip_check_mc_rcu" + "CVE-2019-16994": { + "cmt_msg": "net: sit: fix memory leak in sit_init_net()" }, - "CVE-2020-25704": { - "cmt_msg": "perf/core: Fix a memory leak in perf_event_parse_addr_filter()" + "CVE-2023-6121": { + "cmt_msg": "nvmet: nul-terminate the NQNs passed in the connect command" }, - "CVE-2021-45095": { - "cmt_msg": "phonet: refcount leak in pep_sock_accep" + "CVE-2021-3764": { + "cmt_msg": "crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd()" }, - "CVE-2023-23454": { - "cmt_msg": "net: sched: cbq: dont intepret cls results when asked to drop" + "CVE-2020-1749": { + "cmt_msg": "net: ipv6_stub: use ip6_dst_lookup_flow instead of ip6_dst_lookup" }, - "CVE-2021-37159": { - "cmt_msg": "usb: hso: fix error handling code of hso_create_net_device" + "CVE-2021-3760": { + "cmt_msg": "nfc: nci: fix the UAF of rf_conn_info object" }, - "CVE-2024-26595": { - "cmt_msg": "mlxsw: spectrum_acl_tcam: Fix NULL pointer dereference in error path" + "CVE-2021-46992": { + "cmt_msg": "netfilter: nftables: avoid overflows in nft_hash_buckets()" }, - "CVE-2021-29154": { - "cmt_msg": "bpf, x86: Validate computation of branch displacements for x86-64" + "CVE-2021-39648": { + "cmt_msg": "usb: gadget: configfs: Fix use-after-free issue with udc_name" }, - "CVE-2023-6932": { - "cmt_msg": "ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet" + "CVE-2023-52569": { + "cmt_msg": "btrfs: remove BUG() after failure to insert delayed dir index item" }, - "CVE-2020-16166": { - "cmt_msg": "random32: update the net random state on interrupt and activity" + "CVE-2023-52568": { + "cmt_msg": "x86/sgx: Resolves SECS reclaim vs. page fault for EAUG race" }, - "CVE-2021-29155": { - "cmt_msg": "bpf: Use correct permission flag for mixed signed bounds arithmetic" + "CVE-2019-0136": { + "cmt_msg": "mac80211: drop robust management frames from unknown TA" }, - "CVE-2021-33631": { - "cmt_msg": "ext4: fix kernel BUG in 'ext4_write_inline_data_end()'" + "CVE-2023-52563": { + "cmt_msg": "drm/meson: fix memory leak on ->hpd_notify callback" }, - "CVE-2019-15916": { - "cmt_msg": "net-sysfs: Fix mem leak in netdev_register_kobject" + "CVE-2023-52561": { + "cmt_msg": "arm64: dts: qcom: sdm845-db845c: Mark cont splash memory region as reserved" }, - "CVE-2019-15917": { - "cmt_msg": "Bluetooth: hci_ldisc: Postpone HCI_UART_PROTO_READY bit set in hci_uart_set_proto()" - }, - "CVE-2019-15918": { - "cmt_msg": "cifs: Fix lease buffer length error" - }, - "CVE-2023-52444": { - "cmt_msg": "f2fs: fix to avoid dirent corruption" + "CVE-2022-3344": { + "cmt_msg": "KVM: x86: nSVM: harden svm_free_nested against freeing vmcb02 while still in use" }, - "CVE-2020-12362": { - "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" + "CVE-2023-52566": { + "cmt_msg": "nilfs2: fix potential use after free in nilfs_gccache_submit_read_data()" }, - "CVE-2020-12363": { - "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" + "CVE-2023-52565": { + "cmt_msg": "media: uvcvideo: Fix OOB read" }, - "CVE-2022-4129": { - "cmt_msg": "l2tp: Serialize access to sk_user_data with sk_callback_lock" + "CVE-2018-12896": { + "cmt_msg": "posix-timers: Sanitize overrun handling" }, - "CVE-2023-3117": { - "cmt_msg": "netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE" + "CVE-2020-0347": { + "cmt_msg": "" }, - "CVE-2022-28389": { - "cmt_msg": "can: mcba_usb: mcba_usb_start_xmit(): fix double dev_kfree_skb in error path" + "CVE-2019-18809": { + "cmt_msg": "media: usb: fix memory leak in af9005_identify_state" }, - "CVE-2020-12364": { - "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" + "CVE-2019-18808": { + "cmt_msg": "crypto: ccp - Release all allocated memory if sha type is invalid" }, - "CVE-2019-10639": { - "cmt_msg": "netns: provide pure entropy for net_hash_mix()" + "CVE-2021-40490": { + "cmt_msg": "ext4: fix race writing to an inline_data file while its xattrs are changing" }, - "CVE-2022-28388": { - "cmt_msg": "can: usb_8dev: usb_8dev_start_xmit(): fix double dev_kfree_skb() in error path" + "CVE-2021-33909": { + "cmt_msg": "seq_file: disallow extremely large seq buffer allocations" }, - "CVE-2023-33203": { - "cmt_msg": "net: qcom/emac: Fix use after free bug in emac_remove due to race condition" + "CVE-2019-12455": { + "cmt_msg": "clk-sunxi: fix a missing-check bug in sunxi_divs_clk_setup()" }, - "CVE-2021-0605": { - "cmt_msg": "af_key: pfkey_dump needs parameter validation" + "CVE-2019-12456": { + "cmt_msg": "" }, - "CVE-2021-3896": { - "cmt_msg": "isdn: cpai: check ctr->cnr to avoid array index out of bound" + "CVE-2019-18805": { + "cmt_msg": "ipv4: set the tcp_min_rtt_wlen range from 0 to one day" }, - "CVE-2021-4002": { - "cmt_msg": "hugetlbfs: flush TLBs correctly after huge_pmd_unshare" + "CVE-2019-18806": { + "cmt_msg": "net: qlogic: Fix memory leak in ql_alloc_large_buffers" }, - "CVE-2023-26545": { - "cmt_msg": "net: mpls: fix stale pointer if allocation fails during device rename" + "CVE-2021-33656": { + "cmt_msg": "vt: drop old FONT ioctls" }, - "CVE-2021-38204": { - "cmt_msg": "usb: max-3421: Prevent corruption of freed memory" + "CVE-2021-33655": { + "cmt_msg": "fbcon: Disallow setting font bigger than screen size" }, - "CVE-2022-34918": { - "cmt_msg": "netfilter: nf_tables: stricter validation of element data" + "CVE-2022-41858": { + "cmt_msg": "drivers: net: slip: fix NPD bug in sl_tx_timeout()" }, - "CVE-2022-20008": { - "cmt_msg": "mmc: block: fix read single on recovery logic" + "CVE-2022-41850": { + "cmt_msg": "HID: roccat: Fix use-after-free in roccat_read()" }, - "CVE-2021-3894": { - "cmt_msg": "sctp: account stream padding length for reconf chunk" + "CVE-2022-1184": { + "cmt_msg": "ext4: verify dir block before splitting it" }, - "CVE-2019-18786": { - "cmt_msg": "media: rcar_drif: fix a memory disclosure" + "CVE-2019-9245": { + "cmt_msg": "f2fs: sanity check of xattr entry size" }, - "CVE-2019-20810": { - "cmt_msg": "media: go7007: fix a miss of snd_card_free" + "CVE-2023-3358": { + "cmt_msg": "HID: intel_ish-hid: Add check for ishtp_dma_tx_map" }, - "CVE-2023-52464": { - "cmt_msg": "EDAC/thunderx: Fix possible out-of-bounds string access" + "CVE-2024-1151": { + "cmt_msg": "net: openvswitch: limit the number of recursions from action sets" }, - "CVE-2019-20812": { - "cmt_msg": "af_packet: set defaule value for tmo" + "CVE-2019-12984": { + "cmt_msg": "nfc: Ensure presence of required attributes in the deactivate_target handler" }, - "CVE-2020-8834": { - "cmt_msg": "KVM: PPC: Book3S HV: Factor fake-suspend handling out of kvmppc_save/restore_tm" + "CVE-2024-26808": { + "cmt_msg": "netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain" }, - "CVE-2023-1990": { - "cmt_msg": "nfc: st-nci: Fix use after free bug in ndlc_remove due to race condition" + "CVE-2024-26809": { + "cmt_msg": "netfilter: nft_set_pipapo: release elements in clone only from destroy path" }, - "CVE-2020-14314": { - "cmt_msg": "ext4: fix potential negative array index in do_split()" + "CVE-2021-42739": { + "cmt_msg": "media: firewire: firedtv-avc: fix a buffer overflow in avc_ca_pmt()" }, - "CVE-2023-6356": { - "cmt_msg": "" + "CVE-2024-26805": { + "cmt_msg": "netlink: Fix kernel-infoleak-after-free in __skb_datagram_iter" }, - "CVE-2018-18955": { - "cmt_msg": "userns: also map extents in the reverse map to kernel IDs" + "CVE-2024-26806": { + "cmt_msg": "spi: cadence-qspi: remove system-wide suspend helper calls from runtime PM hooks" }, - "CVE-2019-18660": { - "cmt_msg": "powerpc/book3s64: Fix link stack flush on context switch" + "CVE-2021-37159": { + "cmt_msg": "usb: hso: fix error handling code of hso_create_net_device" }, - "CVE-2019-15291": { - "cmt_msg": "media: b2c2-flexcop-usb: add sanity checking" + "CVE-2020-12770": { + "cmt_msg": "scsi: sg: add sg_remove_request in sg_write" }, - "CVE-2019-15290": { - "cmt_msg": "" + "CVE-2024-26802": { + "cmt_msg": "stmmac: Clear variable when destroying workqueue" }, - "CVE-2023-3212": { - "cmt_msg": "gfs2: Don't deref jdesc in evict" + "CVE-2018-6412": { + "cmt_msg": "fbdev: Fixing arbitrary kernel leak in case FBIOGETCMAP_SPARC in sbusfb_ioctl_helper()." }, - "CVE-2024-23848": { - "cmt_msg": "" + "CVE-2023-52606": { + "cmt_msg": "powerpc/lib: Validate size for vector operations" }, - "CVE-2022-0617": { - "cmt_msg": "udf: Fix NULL ptr deref when converting from inline format" + "CVE-2023-52607": { + "cmt_msg": "powerpc/mm: Fix null-pointer dereference in pgtable_cache_add" }, - "CVE-2023-4459": { - "cmt_msg": "net: vmxnet3: fix possible NULL pointer dereference in vmxnet3_rq_cleanup()" + "CVE-2023-52604": { + "cmt_msg": "FS:JFS:UBSAN:array-index-out-of-bounds in dbAdjTree" }, - "CVE-2022-23036": { - "cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()" + "CVE-2023-52602": { + "cmt_msg": "jfs: fix slab-out-of-bounds Read in dtSearch" }, - "CVE-2022-2153": { - "cmt_msg": "KVM: x86: Avoid theoretical NULL pointer dereference in kvm_irq_delivery_to_apic_fast()" + "CVE-2023-52603": { + "cmt_msg": "UBSAN: array-index-out-of-bounds in dtSplitRoot" }, - "CVE-2022-20566": { - "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free caused by l2cap_chan_put" + "CVE-2023-52600": { + "cmt_msg": "jfs: fix uaf in jfs_evict_inode" }, - "CVE-2018-12930": { - "cmt_msg": "" + "CVE-2023-52601": { + "cmt_msg": "jfs: fix array-index-out-of-bounds in dbAdjTree" }, - "CVE-2018-12931": { - "cmt_msg": "" + "CVE-2023-52609": { + "cmt_msg": "binder: fix race between mmput() and do_exit()" }, - "CVE-2024-23196": { + "CVE-2023-3640": { "cmt_msg": "" }, - "CVE-2020-12768": { - "cmt_msg": "KVM: SVM: Fix potential memory leak in svm_cpu_init()" - }, - "CVE-2020-12769": { - "cmt_msg": "spi: spi-dw: Add lock protect dw_spi rx/tx to prevent concurrent calls" + "CVE-2023-3022": { + "cmt_msg": "ipv6: Use result arg in fib_lookup_arg consistently" }, - "CVE-2021-32399": { - "cmt_msg": "bluetooth: eliminate the potential race condition when removing the HCI controller" + "CVE-2022-43750": { + "cmt_msg": "usb: mon: make mmapped memory read only" }, - "CVE-2019-12380": { - "cmt_msg": "efi/x86/Add missing error handling to old_memmap 1:1 mapping code" + "CVE-2023-0047": { + "cmt_msg": "mm, oom: do not trigger out_of_memory from the #PF" }, - "CVE-2019-12381": { - "cmt_msg": "ip_sockglue: Fix missing-check bug in ip_ra_control()" + "CVE-2023-4010": { + "cmt_msg": "" }, - "CVE-2019-12382": { - "cmt_msg": "drm/edid: Fix a missing-check bug in drm_load_edid_firmware()" + "CVE-2021-47167": { + "cmt_msg": "NFS: Fix an Oopsable condition in __nfs_pageio_add_request()" }, - "CVE-2022-22942": { - "cmt_msg": "drm/vmwgfx: Fix stale file descriptors on failed usercopy" + "CVE-2021-47166": { + "cmt_msg": "NFS: Don't corrupt the value of pg_bytes_written in nfs_do_recoalesce()" }, - "CVE-2018-20669": { - "cmt_msg": "make 'user_access_begin()' do 'access_ok()'" + "CVE-2021-47165": { + "cmt_msg": "drm/meson: fix shutdown crash when component not probed" }, - "CVE-2019-19543": { - "cmt_msg": "media: serial_ir: Fix use-after-free in serial_ir_init_module" + "CVE-2021-47163": { + "cmt_msg": "tipc: wait and exit until all work queues are done" }, - "CVE-2021-3732": { - "cmt_msg": "ovl: prevent private clone if bind mount is not allowed" + "CVE-2021-47162": { + "cmt_msg": "tipc: skb_linearize the head skb when reassembling msgs" }, - "CVE-2022-25375": { - "cmt_msg": "usb: gadget: rndis: check size of RNDIS_MSG_SET command" + "CVE-2021-47161": { + "cmt_msg": "spi: spi-fsl-dspi: Fix a resource leak in an error handling path" }, - "CVE-2020-10766": { - "cmt_msg": "x86/speculation: Prevent rogue cross-process SSBD shutdown" + "CVE-2021-47160": { + "cmt_msg": "net: dsa: mt7530: fix VLAN traffic leaks" }, - "CVE-2020-10767": { - "cmt_msg": "x86/speculation: Avoid force-disabling IBPB based on STIBP and enhanced IBRS." + "CVE-2023-4385": { + "cmt_msg": "fs: jfs: fix possible NULL pointer dereference in dbFree()" }, - "CVE-2018-12207": { - "cmt_msg": "kvm: x86, powerpc: do not allow clearing largepages debugfs entry" + "CVE-2021-46965": { + "cmt_msg": "mtd: physmap: physmap-bt1-rom: Fix unintentional stack access" }, - "CVE-2022-20369": { - "cmt_msg": "media: v4l2-mem2mem: Apply DST_QUEUE_OFF_BASE on MMAP buffers across ioctls" + "CVE-2023-4387": { + "cmt_msg": "net: vmxnet3: fix possible use-after-free bugs in vmxnet3_rq_alloc_rx_buf()" }, - "CVE-2020-13143": { - "cmt_msg": "USB: gadget: fix illegal array access in binding with UDC" + "CVE-2021-46960": { + "cmt_msg": "cifs: Return correct error code from smb2_get_enc_key" }, - "CVE-2020-10768": { - "cmt_msg": "x86/speculation: PR_SPEC_FORCE_DISABLE enforcement for indirect branches." + "CVE-2021-46962": { + "cmt_msg": "mmc: uniphier-sd: Fix a resource leak in the remove function" }, - "CVE-2020-10769": { - "cmt_msg": "crypto: authenc - fix parsing key with misaligned rta_len" + "CVE-2021-47168": { + "cmt_msg": "NFS: fix an incorrect limit in filelayout_decode_layout()" }, - "CVE-2024-25740": { + "CVE-2019-19378": { "cmt_msg": "" }, - "CVE-2019-0148": { - "cmt_msg": "i40e: Wrong truncation from u16 to u8" + "CVE-2022-36879": { + "cmt_msg": "xfrm: xfrm_policy: fix a possible double xfrm_pols_put() in xfrm_bundle_lookup()" }, - "CVE-2019-0149": { - "cmt_msg": "i40e: Add bounds check for ch[] array" + "CVE-2019-19377": { + "cmt_msg": "btrfs: Don't submit any btree write bio if the fs has errors" }, - "CVE-2019-17075": { - "cmt_msg": "RDMA/cxgb4: Do not dma memory off of the stack" + "CVE-2023-1118": { + "cmt_msg": "media: rc: Fix use-after-free bugs caused by ene_tx_irqsim()" }, - "CVE-2022-3903": { - "cmt_msg": "media: mceusb: Use new usb_control_msg_*() routines" + "CVE-2021-0937": { + "cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write" }, - "CVE-2019-19447": { - "cmt_msg": "ext4: work around deleting a file with i_nlink == 0 safely" + "CVE-2022-47929": { + "cmt_msg": "net: sched: disallow noqueue for qdisc classes" }, - "CVE-2019-0146": { - "cmt_msg": "i40e: add num_vectors checker in iwarp handler" + "CVE-2019-16746": { + "cmt_msg": "nl80211: validate beacon head" }, - "CVE-2019-0147": { - "cmt_msg": "i40e: add num_vectors checker in iwarp handler" + "CVE-2022-3606": { + "cmt_msg": "" }, - "CVE-2020-10942": { - "cmt_msg": "vhost: Check docket sk_family instead of call getname" + "CVE-2018-18021": { + "cmt_msg": "arm64: KVM: Tighten guest core register access from userspace" }, - "CVE-2019-0145": { - "cmt_msg": "i40e: add num_vectors checker in iwarp handler" + "CVE-2021-37576": { + "cmt_msg": "KVM: PPC: Book3S: Fix H_RTAS rets buffer overflow" }, - "CVE-2022-44034": { - "cmt_msg": "char: pcmcia: remove all the drivers" + "CVE-2022-3594": { + "cmt_msg": "r8152: Rate limit overflow messages" }, - "CVE-2022-44033": { - "cmt_msg": "char: pcmcia: remove all the drivers" + "CVE-2022-3595": { + "cmt_msg": "cifs: fix double-fault crash during ntlmssp" }, - "CVE-2019-11191": { - "cmt_msg": "x86: Deprecate a.out support" + "CVE-2020-27815": { + "cmt_msg": "jfs: Fix array index bounds check in dbAdjTree" }, - "CVE-2023-39198": { - "cmt_msg": "drm/qxl: fix UAF on handle creation" + "CVE-2023-6606": { + "cmt_msg": "smb: client: fix OOB in smbCalcSize()" }, - "CVE-2020-10781": { - "cmt_msg": "Revert \"zram: convert remaining CLASS_ATTR() to CLASS_ATTR_RO()\"" + "CVE-2020-27673": { + "cmt_msg": "xen/events: add a proper barrier to 2-level uevent unmasking" }, - "CVE-2020-26139": { - "cmt_msg": "mac80211: do not accept/forward invalid EAPOL frames" + "CVE-2020-27675": { + "cmt_msg": "xen/events: avoid removing an event channel while handling it" }, - "CVE-2019-10220": { - "cmt_msg": "Convert filldir[64]() from __put_user() to unsafe_put_user()" + "CVE-2020-28915": { + "cmt_msg": "fbcon: Fix global-out-of-bounds read in fbcon_get_font()" }, - "CVE-2021-3609": { - "cmt_msg": "can: bcm: delay release of struct bcm_op after synchronize_rcu()" + "CVE-2022-3111": { + "cmt_msg": "power: supply: wm8350-power: Add missing free in free_charger_irq" }, - "CVE-2019-19536": { - "cmt_msg": "can: peak_usb: pcan_usb_pro: Fix info-leaks to USB devices" + "CVE-2020-0435": { + "cmt_msg": "f2fs: fix to do sanity check with i_extra_isize" }, - "CVE-2019-19537": { - "cmt_msg": "USB: core: Fix races in character device registration and deregistraion" + "CVE-2020-0432": { + "cmt_msg": "staging: most: net: fix buffer overflow" }, - "CVE-2019-19534": { - "cmt_msg": "can: peak_usb: fix slab info leak" + "CVE-2020-0433": { + "cmt_msg": "blk-mq: sync the update nr_hw_queues with blk_mq_queue_tag_busy_iter" }, - "CVE-2019-19535": { - "cmt_msg": "can: peak_usb: pcan_usb_fd: Fix info-leaks to USB devices" + "CVE-2020-0430": { + "cmt_msg": "bpf: reject passing modified ctx to helper functions" }, - "CVE-2019-19532": { - "cmt_msg": "HID: Fix assumption that devices have inputs" + "CVE-2020-0431": { + "cmt_msg": "HID: hid-input: clear unmapped usages" }, - "CVE-2019-19533": { - "cmt_msg": "media: ttusb-dec: Fix info-leak in ttusb_dec_send_command()" + "CVE-2023-6915": { + "cmt_msg": "ida: Fix crash in ida_free when the bitmap is empty" }, - "CVE-2019-19530": { - "cmt_msg": "usb: cdc-acm: make sure a refcount is taken early enough" + "CVE-2021-47006": { + "cmt_msg": "ARM: 9064/1: hw_breakpoint: Do not directly check the event's overflow_handler hook" }, - "CVE-2019-19531": { - "cmt_msg": "usb: yurex: Fix use-after-free in yurex_delete" + "CVE-2023-1249": { + "cmt_msg": "coredump: Use the vma snapshot in fill_files_note" }, - "CVE-2022-33981": { - "cmt_msg": "floppy: disable FDRAWCMD by default" + "CVE-2021-3483": { + "cmt_msg": "firewire: nosy: Fix a use-after-free bug in nosy_ioctl()" }, - "CVE-2021-0929": { - "cmt_msg": "staging/android/ion: delete dma_buf->kmap/unmap implemenation" + "CVE-2023-6040": { + "cmt_msg": "netfilter: nf_tables: Reject tables of unsupported family" }, - "CVE-2018-14616": { - "cmt_msg": "f2fs: fix to do sanity check with block address in main area v2" + "CVE-2020-36694": { + "cmt_msg": "netfilter: x_tables: Switch synchronization to RCU" }, - "CVE-2019-20095": { - "cmt_msg": "mwifiex: Fix mem leak in mwifiex_tm_cmd" + "CVE-2020-36691": { + "cmt_msg": "netlink: limit recursion depth in policy validation" }, - "CVE-2018-19985": { - "cmt_msg": "USB: hso: Fix OOB memory access in hso_probe/hso_get_config_data" + "CVE-2023-42755": { + "cmt_msg": "net/sched: Retire rsvp classifier" }, - "CVE-2021-0920": { - "cmt_msg": "af_unix: fix garbage collect vs MSG_PEEK" + "CVE-2023-42752": { + "cmt_msg": "igmp: limit igmpv3_newpack() packet size to IP_MAX_MTU" }, - "CVE-2022-0168": { - "cmt_msg": "cifs: fix NULL ptr dereference in smb2_ioctl_query_info()" + "CVE-2021-3573": { + "cmt_msg": "Bluetooth: use correct lock to prevent UAF of hdev object" }, - "CVE-2024-26587": { - "cmt_msg": "net: netdevsim: don't try to destroy PHC on VFs" + "CVE-2022-1974": { + "cmt_msg": "nfc: replace improper check device_is_registered() in netlink related functions" }, - "CVE-2023-51043": { - "cmt_msg": "drm/atomic: Fix potential use-after-free in nonblocking commits" + "CVE-2022-1975": { + "cmt_msg": "NFC: netlink: fix sleep in atomic bug when firmware download timeout" }, - "CVE-2020-28374": { - "cmt_msg": "scsi: target: Fix XCOPY NAA identifier lookup" + "CVE-2023-1380": { + "cmt_msg": "wifi: brcmfmac: slab-out-of-bounds read in brcmf_get_assoc_ies()" }, - "CVE-2019-9213": { - "cmt_msg": "mm: enforce min addr even if capable() in expand_downwards()" + "CVE-2018-12130": { + "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" }, - "CVE-2023-2007": { - "cmt_msg": "scsi: dpt_i2o: Remove obsolete driver" + "CVE-2022-32981": { + "cmt_msg": "powerpc/32: Fix overread/overwrite of thread_struct via ptrace" }, - "CVE-2023-0615": { - "cmt_msg": "media: vivid: dev->bitmap_cap wasn't freed in all cases" + "CVE-2018-13405": { + "cmt_msg": "Fix up non-directory creation in SGID directories" }, - "CVE-2019-14896": { - "cmt_msg": "libertas: Fix two buffer overflows at parsing bss descriptor" + "CVE-2018-13406": { + "cmt_msg": "video: uvesafb: Fix integer overflow in allocation" }, - "CVE-2019-14897": { - "cmt_msg": "libertas: Fix two buffer overflows at parsing bss descriptor" + "CVE-2020-11668": { + "cmt_msg": "media: xirlink_cit: add missing descriptor sanity checks" }, - "CVE-2019-14895": { - "cmt_msg": "mwifiex: fix possible heap overflow in mwifiex_process_country_ie()" + "CVE-2020-11669": { + "cmt_msg": "powerpc/powernv/idle: Restore AMR/UAMOR/AMOR after idle" }, - "CVE-2022-3586": { - "cmt_msg": "sch_sfb: Don't assume the skb is still around after enqueueing to child" + "CVE-2019-14901": { + "cmt_msg": "mwifiex: Fix heap overflow in mmwifiex_process_tdls_action_frame()" }, - "CVE-2022-43750": { - "cmt_msg": "usb: mon: make mmapped memory read only" + "CVE-2020-8694": { + "cmt_msg": "powercap: restrict energy meter to root access" }, - "CVE-2020-27825": { - "cmt_msg": "tracing: Fix race in trace_open and buffer resize call" + "CVE-2021-3715": { + "cmt_msg": "net_sched: cls_route: remove the right filter from hashtable" }, - "CVE-2019-2181": { - "cmt_msg": "binder: check for overflow when alloc for security context" + "CVE-2021-3714": { + "cmt_msg": "" }, - "CVE-2020-27820": { - "cmt_msg": "drm/nouveau: use drm_dev_unplug() during device removal" + "CVE-2019-16230": { + "cmt_msg": "drm/amdkfd: fix a potential NULL pointer dereference (v2)" }, - "CVE-2020-26141": { - "cmt_msg": "ath10k: Fix TKIP Michael MIC verification for PCIe" + "CVE-2019-16231": { + "cmt_msg": "fjes: Handle workqueue allocation failure" }, - "CVE-2020-0067": { - "cmt_msg": "f2fs: fix to avoid memory leakage in f2fs_listxattr" + "CVE-2019-16232": { + "cmt_msg": "libertas: fix a potential NULL pointer dereference" }, - "CVE-2023-4622": { - "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES" + "CVE-2019-16233": { + "cmt_msg": "scsi: qla2xxx: fix a potential NULL pointer dereference" }, - "CVE-2020-26558": { - "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical" + "CVE-2019-16234": { + "cmt_msg": "iwlwifi: pcie: fix rb_allocator workqueue allocation" }, - "CVE-2023-39193": { - "cmt_msg": "netfilter: xt_sctp: validate the flag_info count" + "CVE-2019-6133": { + "cmt_msg": "fork: record start_time late" }, - "CVE-2023-1079": { - "cmt_msg": "HID: asus: use spinlock to safely schedule workers" + "CVE-2021-39633": { + "cmt_msg": "ip_gre: add validation for csum_start" }, - "CVE-2020-26541": { - "cmt_msg": "certs: Add EFI_CERT_X509_GUID support for dbx entries" + "CVE-2021-39636": { + "cmt_msg": "netfilter: x_tables: fix pointer leaks to userspace" }, - "CVE-2019-20811": { - "cmt_msg": "net-sysfs: call dev_hold if kobject_init_and_add success" + "CVE-2021-39634": { + "cmt_msg": "epoll: do not insert into poll queues until all sanity checks are done" }, - "CVE-2023-3390": { - "cmt_msg": "netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE" + "CVE-2022-33742": { + "cmt_msg": "xen/blkfront: force data bouncing when backend is untrusted" }, - "CVE-2021-20317": { - "cmt_msg": "lib/timerqueue: Rely on rbtree semantics for next timer" + "CVE-2022-33741": { + "cmt_msg": "xen/netfront: force data bouncing when backend is untrusted" }, - "CVE-2021-43389": { - "cmt_msg": "isdn: cpai: check ctr->cnr to avoid array index out of bound" + "CVE-2022-33740": { + "cmt_msg": "xen/netfront: fix leaking data in shared pages" }, - "CVE-2023-3111": { - "cmt_msg": "btrfs: unset reloc control if transaction commit fails in prepare_to_relocate()" + "CVE-2022-33744": { + "cmt_msg": "xen/arm: Fix race in RB-tree based P2M accounting" }, - "CVE-2021-33061": { - "cmt_msg": "ixgbe: add improvement for MDD response functionality" + "CVE-2023-52596": { + "cmt_msg": "sysctl: Fix out of bounds access for empty sysctl registers" }, - "CVE-2023-1476": { - "cmt_msg": "" + "CVE-2023-52597": { + "cmt_msg": "KVM: s390: fix setting of fpc register" }, - "CVE-2023-4010": { - "cmt_msg": "" + "CVE-2023-52594": { + "cmt_msg": "wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus()" }, - "CVE-2023-1074": { - "cmt_msg": "sctp: fail if no bound addresses can be used for a given scope" + "CVE-2023-52595": { + "cmt_msg": "wifi: rt2x00: restart beacon queue when hardware reset" }, - "CVE-2021-3864": { - "cmt_msg": "" + "CVE-2023-52593": { + "cmt_msg": "wifi: wfx: fix possible NULL pointer dereference in wfx_set_mfp_ap()" }, - "CVE-2024-26584": { - "cmt_msg": "net: tls: handle backlogging of crypto requests" + "CVE-2023-52590": { + "cmt_msg": "ocfs2: Avoid touching renamed directory if parent does not change" }, - "CVE-2022-1652": { - "cmt_msg": "floppy: use a statically allocated error counter" + "CVE-2023-52591": { + "cmt_msg": "reiserfs: Avoid touching renamed directory if parent does not change" }, - "CVE-2023-4623": { - "cmt_msg": "net/sched: sch_hfsc: Ensure inner classes have fsc curve" + "CVE-2023-52598": { + "cmt_msg": "s390/ptrace: handle setting of fpc register correctly" }, - "CVE-2024-23849": { - "cmt_msg": "net/rds: Fix UBSAN: array-index-out-of-bounds in rds_cmsg_recv" + "CVE-2023-52599": { + "cmt_msg": "jfs: fix array-index-out-of-bounds in diNewExt" }, - "CVE-2020-29568": { - "cmt_msg": "xen/xenbus: Allow watches discard events before queueing" + "CVE-2022-23222": { + "cmt_msg": "bpf: Replace PTR_TO_XXX_OR_NULL with PTR_TO_XXX | PTR_MAYBE_NULL" }, - "CVE-2020-29569": { - "cmt_msg": "xen-blkback: set ring->xenblkd to NULL after kthread_stop()" + "CVE-2021-0448": { + "cmt_msg": "netfilter: ctnetlink: add a range check for l3/l4 protonum" }, - "CVE-2020-14351": { - "cmt_msg": "perf/core: Fix race in the perf_mmap_close() function" + "CVE-2019-25045": { + "cmt_msg": "xfrm: clean up xfrm protocol checks" }, - "CVE-2019-19054": { - "cmt_msg": "media: rc: prevent memory leak in cx23888_ir_probe" + "CVE-2022-41849": { + "cmt_msg": "fbdev: smscufx: Fix use-after-free in ufx_ops_open()" }, - "CVE-2019-19057": { - "cmt_msg": "mwifiex: pcie: Fix memory leak in mwifiex_pcie_init_evt_ring" + "CVE-2022-41848": { + "cmt_msg": "" }, - "CVE-2019-19056": { - "cmt_msg": "mwifiex: pcie: Fix memory leak in mwifiex_pcie_alloc_cmdrsp_buf" + "CVE-2023-6356": { + "cmt_msg": "nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length" }, - "CVE-2019-9453": { - "cmt_msg": "f2fs: fix to avoid accessing xattr across the boundary" + "CVE-2022-1353": { + "cmt_msg": "af_key: add __GFP_ZERO flag for compose_sadb_supported in function pfkey_register" }, - "CVE-2023-23039": { - "cmt_msg": "" + "CVE-2022-1198": { + "cmt_msg": "drivers: hamradio: 6pack: fix UAF bug caused by mod_timer()" }, - "CVE-2019-19052": { - "cmt_msg": "can: gs_usb: gs_can_open(): prevent memory leak" + "CVE-2022-1199": { + "cmt_msg": "ax25: Fix NULL pointer dereference in ax25_kill_by_device" }, - "CVE-2019-3846": { - "cmt_msg": "mwifiex: Fix possible buffer overflows at parsing bss descriptor" + "CVE-2022-1195": { + "cmt_msg": "hamradio: improve the incomplete fix to avoid NPD" }, - "CVE-2023-46838": { - "cmt_msg": "xen-netback: don't produce zero-size SKB frags" + "CVE-2023-2124": { + "cmt_msg": "xfs: verify buffer contents when we skip log replay" }, - "CVE-2020-0427": { - "cmt_msg": "pinctrl: devicetree: Avoid taking direct reference to device name string" + "CVE-2019-15505": { + "cmt_msg": "media: technisat-usb2: break out of loop at end of buffer" }, - "CVE-2022-2977": { - "cmt_msg": "tpm: fix reference counting for struct tpm_chip" + "CVE-2022-27672": { + "cmt_msg": "x86/speculation: Identify processors vulnerable to SMT RSB predictions" }, - "CVE-2019-19058": { - "cmt_msg": "iwlwifi: dbg_ini: fix memory leak in alloc_sgtable" + "CVE-2023-52508": { + "cmt_msg": "nvme-fc: Prevent null pointer dereference in nvme_fc_io_getuuid()" }, - "CVE-2020-0423": { - "cmt_msg": "binder: fix UAF when releasing todo list" + "CVE-2022-1280": { + "cmt_msg": "drm: avoid circular locks in drm_mode_getconnector" }, - "CVE-2019-9458": { - "cmt_msg": "media: v4l: event: Prevent freeing event subscriptions while accessed" + "CVE-2019-14283": { + "cmt_msg": "floppy: fix out-of-bounds read in copy_buffer" }, - "CVE-2023-40283": { - "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb" + "CVE-2018-10881": { + "cmt_msg": "ext4: clear i_data in ext4_inode_info when removing inline data" }, - "CVE-2016-8660": { - "cmt_msg": "" + "CVE-2018-10883": { + "cmt_msg": "jbd2: don't mark block as modified if the handle is out of credits" + } + } + }, + "4.14": { + "4.14": { + "CVE-2017-16647": { + "cmt_msg": "net: usb: asix: fill null-ptr-deref in asix_suspend", + "cmt_id": "baedf68a068ca29624f241426843635920f16e1d" }, - "CVE-2023-6270": { - "cmt_msg": "" + "CVE-2017-16650": { + "cmt_msg": "net: qmi_wwan: fix divide by 0 on bad descriptors", + "cmt_id": "7fd078337201cf7468f53c3d9ef81ff78cb6df3b" }, - "CVE-2023-3090": { - "cmt_msg": "ipvlan:Fix out-of-bounds caused by unclear skb->cb" + "CVE-2017-16649": { + "cmt_msg": "net: cdc_ether: fix divide by 0 on bad descriptors", + "cmt_id": "2cb80187ba065d7decad7c6614e35e07aec8a974" + } + }, + "4.14.1": { + "CVE-2017-16646": { + "cmt_msg": "media: dib0700: fix invalid dvb_detach argument", + "cmt_id": "75d9dd294e2a41ddce75cc02d1675a9cf40873fc" }, - "CVE-2019-13272": { - "cmt_msg": "ptrace: Fix ->ptracer_cred handling for PTRACE_TRACEME" + "CVE-2017-16537": { + "cmt_msg": "media: imon: Fix null-ptr-deref in imon_probe", + "cmt_id": "16edf1a6a8a52040841e3e875c76bad0aa28f85f" + } + }, + "4.14.2": { + "CVE-2017-18204": { + "cmt_msg": "ocfs2: should wait dio before inode lock in ocfs2_setattr()", + "cmt_id": "44ec0aecc73dc3959bdbb6fa733c69dc0bb633f4" }, - "CVE-2023-1073": { - "cmt_msg": "HID: check empty report_list in hid_validate_values()" + "CVE-2017-16994": { + "cmt_msg": "mm/pagewalk.c: report holes in hugetlb ranges", + "cmt_id": "bbce81fc966f59421e5f54c4bd3d3a4670f45e33" + } + }, + "4.14.3": { + "CVE-2017-18203": { + "cmt_msg": "dm: fix race between dm_get_from_kobject() and __dm_destroy()", + "cmt_id": "3bfb87ecb4f7e19c53c31b7beca4ecd9bb906a67" }, - "CVE-2023-45862": { - "cmt_msg": "USB: ene_usb6250: Allocate enough memory for full object" + "CVE-2017-16536": { + "cmt_msg": "cx231xx-cards: fix NULL-deref on missing association descriptor", + "cmt_id": "5a482b8a75500ec7516f3d11c7fb063e3f4abc45" + } + }, + "4.14.4": { + "CVE-2017-18208": { + "cmt_msg": "mm/madvise.c: fix madvise() infinite loop under special circumstances", + "cmt_id": "8a0bb9ebaa8b8faee61f095757662fe5d7fd8da6" }, - "CVE-2023-45863": { - "cmt_msg": "kobject: Fix slab-out-of-bounds in fill_kobj_path()" + "CVE-2017-18202": { + "cmt_msg": "mm, oom_reaper: gather each vma to prevent leaking TLB entry", + "cmt_id": "786b924d39bad16ff99aacdb4076df027cc2f8b8" }, - "CVE-2023-1582": { - "cmt_msg": "fs/proc: task_mmu.c: don't read mapcount for migration entry" + "CVE-2017-1000405": { + "cmt_msg": "mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d()", + "cmt_id": "01ca9727457a167463a47e35b6fe5a5173b4e341" + } + }, + "4.14.6": { + "CVE-2017-17807": { + "cmt_msg": "KEYS: add missing permission check for request_key() destination", + "cmt_id": "69d5894ce0a67d37f900d2597fc0b2b8cef6c863" }, - "CVE-2022-1786": { - "cmt_msg": "io_uring: remove io_identity" + "CVE-2017-0861": { + "cmt_msg": "ALSA: pcm: prevent UAF in snd_pcm_info", + "cmt_id": "0482dcd51004920b13b59995b7afb66df49937da" }, - "CVE-2019-17351": { - "cmt_msg": "xen: let alloc_xenballooned_pages() fail if not enough memory free" + "CVE-2017-1000407": { + "cmt_msg": "KVM: VMX: remove I/O port 0x80 bypass on Intel hosts", + "cmt_id": "a52c2829cd60492fc75bafc323145cab1af915f5" + } + }, + "4.14.7": { + "CVE-2018-18559": { + "cmt_msg": "net/packet: fix a race in packet_bind() and packet_notifier()", + "cmt_id": "589983eb9986ea9c851c8906a81781f317207313" }, - "CVE-2022-23222": { - "cmt_msg": "bpf: Replace PTR_TO_XXX_OR_NULL with PTR_TO_XXX | PTR_MAYBE_NULL" + "CVE-2018-7492": { + "cmt_msg": "rds: Fix NULL pointer dereference in __rds_rdma_map", + "cmt_id": "9d9a63d74b2b6ed7c30c7d1584d87c16ae8d5862" }, - "CVE-2020-25669": { - "cmt_msg": "Input: sunkbd - avoid use-after-free in teardown paths" + "CVE-2017-16648": { + "cmt_msg": "dvb_frontend: don't use-after-free the frontend struct", + "cmt_id": "7bc8eb30f1e02b4dd6fd2869720c64d9bf39d765" + } + }, + "4.14.8": { + "CVE-2018-14619": { + "cmt_msg": "crypto: algif_aead - fix reference counting of null skcipher", + "cmt_id": "96c2dfaebe1a8eba95d43732a1413c777469128c" }, - "CVE-2020-25668": { - "cmt_msg": "tty: make FONTX ioctl use the tty pointer they were actually passed" + "CVE-2017-16913": { + "cmt_msg": "usbip: fix stub_rx: harden CMD_SUBMIT path to handle malicious input", + "cmt_id": "1621db059603e781f61a9bf33cba639b42faf0bc" }, - "CVE-2008-4609": { - "cmt_msg": "" + "CVE-2017-16912": { + "cmt_msg": "usbip: fix stub_rx: get_pipe() to validate endpoint number", + "cmt_id": "7120d742ad8d0f1fe37e4b73827e166fc1e01eea" }, - "CVE-2020-25705": { - "cmt_msg": "icmp: randomize the global rate limiter" + "CVE-2017-16911": { + "cmt_msg": "usbip: prevent vhci_hcd driver from leaking a socket pointer address", + "cmt_id": "b6a2ad646c13bb9d1231bce5599cb3176ff33ca4" }, - "CVE-2022-0435": { - "cmt_msg": "tipc: improve size validations for received domain records" + "CVE-2017-16914": { + "cmt_msg": "usbip: fix stub_send_ret_submit() vulnerability to null transfer_buffer", + "cmt_id": "d78a5506cf0ea112124c1ffa5c0aae09b579d96d" }, - "CVE-2022-20565": { - "cmt_msg": "HID: core: Correctly handle ReportSize being zero" + "CVE-2017-17558": { + "cmt_msg": "USB: core: prevent malicious bNumInterfaces overflow", + "cmt_id": "4c5ae6a301a5415d1334f6c655bebf91d475bd89" }, - "CVE-2023-52457": { - "cmt_msg": "serial: 8250: omap: Don't skip resource freeing if pm_runtime_resume_and_get() failed" + "CVE-2017-18344": { + "cmt_msg": "posix-timer: Properly check sigevent->sigev_notify", + "cmt_id": "3df23f7ce7255d1ef2a616071cac359a245fb6de" }, - "CVE-2018-5391": { - "cmt_msg": "ip: discard IPv4 datagrams with overlapping segments." + "CVE-2017-17806": { + "cmt_msg": "crypto: hmac - require that the underlying hash algorithm is unkeyed", + "cmt_id": "902ae89f841de0c8d2857919296923f6332e174f" }, - "CVE-2021-4135": { - "cmt_msg": "netdevsim: Zero-initialize memory for new map's value in function nsim_bpf_map_alloc" + "CVE-2017-17805": { + "cmt_msg": "crypto: salsa20 - fix blkcipher_walk API usage", + "cmt_id": "c68b31521d5fb7216cb1113130399afe65437c6c" + } + }, + "4.14.9": { + "CVE-2017-17857": { + "cmt_msg": "bpf: fix missing error return in check_stack_boundary()", + "cmt_id": "2120fca0ecfb4552d27608d409ebd3403ce02ce4" }, - "CVE-2023-26607": { - "cmt_msg": "ntfs: fix out-of-bounds read in ntfs_attr_find()" + "CVE-2017-17864": { + "cmt_msg": "bpf: don't prune branches when a scalar is replaced with a pointer", + "cmt_id": "cb56cc1b292b8b3f787fad89f1208f8e98d12c7d" }, - "CVE-2018-1121": { - "cmt_msg": "" + "CVE-2017-17862": { + "cmt_msg": "bpf: fix branch pruning logic", + "cmt_id": "2b3ea8ceb2bb71e9e58527661261dba127137d9b" }, - "CVE-2019-15239": { - "cmt_msg": "unknown" + "CVE-2017-17863": { + "cmt_msg": "bpf: fix integer overflows", + "cmt_id": "de31796c052e47c99b1bb342bc70aa826733e862" }, - "CVE-2022-26373": { - "cmt_msg": "x86/speculation: Add RSB VM Exit protections" + "CVE-2017-17853": { + "cmt_msg": "bpf/verifier: fix bounds calculation on BPF_RSH", + "cmt_id": "4d54f7df5131d67f653f674003ec5f52c9818b53" }, - "CVE-2021-4037": { - "cmt_msg": "xfs: fix up non-directory creation in SGID directories" + "CVE-2017-17852": { + "cmt_msg": "bpf: fix 32-bit ALU op verification", + "cmt_id": "6c8e098d0324412d4ae9e06c7e611a96b87faf80" }, - "CVE-2021-22543": { - "cmt_msg": "KVM: do not allow mapping valid but non-reference-counted pages" + "CVE-2017-17855": { + "cmt_msg": "bpf: don't prune branches when a scalar is replaced with a pointer", + "cmt_id": "cb56cc1b292b8b3f787fad89f1208f8e98d12c7d" }, - "CVE-2022-45884": { - "cmt_msg": "" + "CVE-2017-16996": { + "cmt_msg": "bpf: fix incorrect tracking of register size truncation", + "cmt_id": "bf5ee24e87e39548bf30d4e18e479e61a5a98336" }, - "CVE-2021-3348": { - "cmt_msg": "nbd: freeze the queue while we're adding connections" + "CVE-2017-16995": { + "cmt_msg": "bpf: fix incorrect sign extension in check_alu_op()", + "cmt_id": "6e12ea4fb45ca86cdd7425276b6993455fee947a" }, - "CVE-2019-1999": { - "cmt_msg": "binder: fix race between munmap() and direct reclaim" + "CVE-2017-17856": { + "cmt_msg": "bpf: force strict alignment checks for stack pointers", + "cmt_id": "c90268f7cbee0781331b96d1423d0f28a6183889" }, - "CVE-2023-20941": { - "cmt_msg": "" + "CVE-2017-17854": { + "cmt_msg": "bpf: fix integer overflows", + "cmt_id": "de31796c052e47c99b1bb342bc70aa826733e862" + } + }, + "4.14.11": { + "CVE-2017-18595": { + "cmt_msg": "tracing: Fix possible double free on failure of allocating trace buffer", + "cmt_id": "21a9c7346ef696161dacbbd9f47dabb0f062c4c8" }, - "CVE-2019-15292": { - "cmt_msg": "appletalk: Fix use-after-free in atalk_proc_exit" + "CVE-2018-9465": { + "cmt_msg": "binder: fix proc->files use-after-free", + "cmt_id": "d87f1bc7d15b89bd3bcf31020eb7f3b3cd6f84b5" }, - "CVE-2018-20836": { - "cmt_msg": "scsi: libsas: fix a race condition when smp task timeout" + "CVE-2018-18386": { + "cmt_msg": "n_tty: fix EXTPROC vs ICANON interaction with TIOCINQ (aka FIONREAD)", + "cmt_id": "aaa5a91ff744f91fb1d1c91853aa0c8f126be563" }, - "CVE-2021-44733": { - "cmt_msg": "tee: handle lookup of shm with reference count 0" + "CVE-2017-17449": { + "cmt_msg": "netlink: Add netns check on taps", + "cmt_id": "e3fb538e5715250d6a61a26925215229f2e9f52f" }, - "CVE-2021-3347": { - "cmt_msg": "futex: Ensure the correct return value from futex_lock_pi()" + "CVE-2017-17712": { + "cmt_msg": "net: ipv4: fix for a race condition in raw_sendmsg", + "cmt_id": "3bc400bad0e003d40a0a2412411aed7cbae16f96" }, - "CVE-2020-10135": { - "cmt_msg": "Bluetooth: Consolidate encryption handling in hci_encrypt_cfm" + "CVE-2017-15129": { + "cmt_msg": "net: Fix double free and memory corruption in get_net_ns_by_id()", + "cmt_id": "dd9a2648b3e35c2369f580215d916baf7e23253a" + } + }, + "4.14.13": { + "CVE-2017-18075": { + "cmt_msg": "crypto: pcrypt - fix freeing pcrypt instances", + "cmt_id": "7156c794b8ab462705e6ac80c5fa69565eb44c62" + } + }, + "4.14.14": { + "CVE-2017-17741": { + "cmt_msg": "KVM: Fix stack-out-of-bounds read in write_mmio", + "cmt_id": "653c41ac4729261cb356ee1aff0f3f4f342be1eb" }, - "CVE-2020-25285": { - "cmt_msg": "mm/hugetlb: fix a race between hugetlb sysctl handlers" + "CVE-2017-5753": { + "cmt_msg": "x86/cpufeatures: Add X86_BUG_SPECTRE_V[12]", + "cmt_id": "9298e868dddd820829f814cd25a0f28c92036af7" }, - "CVE-2019-7308": { - "cmt_msg": "bpf: fix sanitation of alu op with pointer / scalar type from different paths" + "CVE-2017-1000410": { + "cmt_msg": "Bluetooth: Prevent stack info leak from the EFS element.", + "cmt_id": "02462928e2234eea95dd1ce05ca1f2c02088dc13" }, - "CVE-2021-45868": { - "cmt_msg": "quota: check block number when reading the block in quota file" + "CVE-2018-5333": { + "cmt_msg": "RDS: null pointer dereference in rds_atomic_free_op", + "cmt_id": "5edbe3c0249f54578636b71377861d579b1781cf" }, - "CVE-2022-1966": { - "cmt_msg": "netfilter: nf_tables: disallow non-stateful expression in sets earlier" + "CVE-2018-5332": { + "cmt_msg": "RDS: Heap OOB write in rds_message_alloc_sgs()", + "cmt_id": "5d127d15ad2f9f33af788f1edf720ba29317f55b" }, - "CVE-2019-2025": { - "cmt_msg": "binder: fix race that allows malicious free of live buffer" + "CVE-2017-13216": { + "cmt_msg": "staging: android: ashmem: fix a race condition in ASHMEM_SET_SIZE ioctl", + "cmt_id": "242e20a5b3cc2b99ace977546d3cffc6a2a35991" }, - "CVE-2021-3587": { - "cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect" + "CVE-2017-5715": { + "cmt_msg": "x86/cpufeatures: Add X86_BUG_SPECTRE_V[12]", + "cmt_id": "9298e868dddd820829f814cd25a0f28c92036af7" + } + }, + "4.14.15": { + "CVE-2017-18551": { + "cmt_msg": "i2c: core-smbus: prevent stack corruption on read I2C_BLOCK_DATA", + "cmt_id": "c7b8be81fc5506a6f2f9f01a06f6806bcca7d48a" }, - "CVE-2019-16995": { - "cmt_msg": "net: hsr: fix memory leak in hsr_dev_finalize()" + "CVE-2018-6927": { + "cmt_msg": "futex: Prevent overflow by strengthen input validation", + "cmt_id": "17ae6ccfe5dd85605dc44534348b506f95d16a61" }, - "CVE-2019-16994": { - "cmt_msg": "net: sit: fix memory leak in sit_init_net()" + "CVE-2019-9454": { + "cmt_msg": "i2c: core-smbus: prevent stack corruption on read I2C_BLOCK_DATA", + "cmt_id": "c7b8be81fc5506a6f2f9f01a06f6806bcca7d48a" }, - "CVE-2022-3533": { - "cmt_msg": "" + "CVE-2018-1000004": { + "cmt_msg": "ALSA: seq: Make ioctls race-free", + "cmt_id": "c3162384aed4cfe3f1a1f40041f3ba8cd7704d88" + } + }, + "4.14.16": { + "CVE-2018-1000028": { + "cmt_msg": "nfsd: auth: Fix gid sorting when rootsquash enabled", + "cmt_id": "54e67ba7d20a5921cfe712cfe4bd773e75df10e0" }, - "CVE-2022-3534": { - "cmt_msg": "libbpf: Fix use-after-free in btf_dump_name_dups" + "CVE-2017-17450": { + "cmt_msg": "netfilter: xt_osf: Add missing permission checks", + "cmt_id": "19848ca7b7dad5153860239c893c1eadd603217e" }, - "CVE-2020-36516": { - "cmt_msg": "ipv4: avoid using shared IP generator for connected sockets" + "CVE-2017-17448": { + "cmt_msg": "netfilter: nfnetlink_cthelper: Add missing permission checks", + "cmt_id": "671624872144abc37bc5e8f3b27987890f6e87f3" + } + }, + "4.14.17": { + "CVE-2019-2215": { + "cmt_msg": "ANDROID: binder: remove waitqueue when thread exits.", + "cmt_id": "7a3cee43e935b9d526ad07f20bf005ba7e74d05b" }, - "CVE-2020-36766": { - "cmt_msg": "cec-api: prevent leaking memory through hole in structure" + "CVE-2018-5344": { + "cmt_msg": "loop: fix concurrent lo_open/lo_release", + "cmt_id": "d5e06a1867210049bbfe27864ee0a40cfd9b1e9b" + } + }, + "4.14.18": { + "CVE-2017-5754": { + "cmt_msg": "x86/cpufeatures: Add Intel feature bits for Speculation Control", + "cmt_id": "343c91242d092852ab22411780f886317d7001aa" + } + }, + "4.14.20": { + "CVE-2017-13166": { + "cmt_msg": "media: v4l2-ioctl.c: use check_fmt for enum/g/s/try_fmt", + "cmt_id": "ea96d8f676dd3caeb77e3dc509c880cc81d303a6" }, - "CVE-2022-3061": { - "cmt_msg": "video: fbdev: i740fb: Error out if 'pixclock' equals zero" + "CVE-2018-5750": { + "cmt_msg": "ACPI: sbshc: remove raw pointer from printk() message", + "cmt_id": "f232bfdcdd768bb6ba5945f1f8f28faa94fc10b8" }, - "CVE-2023-28328": { - "cmt_msg": "media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer()" + "CVE-2017-16538": { + "cmt_msg": "media: dvb-usb-v2: lmedm04: Improve logic checking of warm start", + "cmt_id": "fd31a38d268f50afe9c5cd3d4beafa020ad39e90" }, - "CVE-2022-0322": { - "cmt_msg": "sctp: account stream padding length for reconf chunk" + "CVE-2017-8824": { + "cmt_msg": "dccp: CVE-2017-8824: use-after-free in DCCP code", + "cmt_id": "e5e1e153ecd40c2b09c23d2b2c161a6c8ddbba07" }, - "CVE-2023-0386": { - "cmt_msg": "ovl: fail on invalid uid/gid mapping at copy up" + "CVE-2017-16644": { + "cmt_msg": "media: hdpvr: Fix an error handling path in hdpvr_probe()", + "cmt_id": "dd24d173b50af3aadb1ea2e04edaa8d68ca59b23" + } + }, + "4.14.21": { + "CVE-2018-7566": { + "cmt_msg": "ALSA: seq: Fix racy pool initializations", + "cmt_id": "7466294dad8963e29f051d8ab2f4d3f67d2f62a6" + } + }, + "4.14.22": { + "CVE-2018-20510": { + "cmt_msg": "binder: replace \"%p\" with \"%pK\"", + "cmt_id": "b46af094b82a47ca1cbba9092578f8f96af82798" }, - "CVE-2023-6121": { - "cmt_msg": "nvmet: nul-terminate the NQNs passed in the connect command" + "CVE-2020-0030": { + "cmt_msg": "ANDROID: binder: synchronize_rcu() when using POLLFREE.", + "cmt_id": "441b5d10e4602b25ad960d1ca1c6bb77e788c220" + } + }, + "4.14.25": { + "CVE-2018-5803": { + "cmt_msg": "sctp: verify size of a new chunk in _sctp_make_chunk()", + "cmt_id": "1fc74a57a8ae863c95afedef2510e7e42b194e56" + } + }, + "4.14.27": { + "CVE-2018-1068": { + "cmt_msg": "netfilter: ebtables: CONFIG_COMPAT: don't trust userland offsets", + "cmt_id": "eaa06bfba8eabd44ce952758046492eebc973bbe" }, - "CVE-2017-13693": { - "cmt_msg": "" + "CVE-2018-7995": { + "cmt_msg": "x86/MCE: Serialize sysfs changes", + "cmt_id": "5c1c405d393648da95339c3e0f2dcfd7a1021388" }, - "CVE-2017-13694": { - "cmt_msg": "" + "CVE-2018-1065": { + "cmt_msg": "netfilter: add back stackpointer size checks", + "cmt_id": "638c2e4eff89aae86593e80ac2be01eee195fccb" + } + }, + "4.14.28": { + "CVE-2019-9456": { + "cmt_msg": "usb: usbmon: Read text within supplied buffer size", + "cmt_id": "59b0613d3f40f0ba621bb9c7ddf06dea2948e0b7" + } + }, + "4.14.31": { + "CVE-2018-8822": { + "cmt_msg": "staging: ncpfs: memory corruption in ncp_read_kernel()", + "cmt_id": "2a2b9ef3092680bdf09751d55420910f81fd0c3c" }, - "CVE-2021-4149": { - "cmt_msg": "btrfs: unlock newly allocated extent buffer after error" + "CVE-2018-7740": { + "cmt_msg": "hugetlbfs: check for pgoff value overflow", + "cmt_id": "1e8628443ede418464b0ab101b24fbb7030949b2" }, - "CVE-2022-21385": { - "cmt_msg": "net/rds: fix warn in rds_message_alloc_sgs" + "CVE-2018-1087": { + "cmt_msg": "kvm/x86: fix icebp instruction handling", + "cmt_id": "06b2810150542cfe0e66407c77ea2de6790e35dc" }, - "CVE-2022-42895": { - "cmt_msg": "Bluetooth: L2CAP: Fix attempting to access uninitialized memory" + "CVE-2018-8781": { + "cmt_msg": "drm: udl: Properly check framebuffer mmap offsets", + "cmt_id": "c8deec7181212f170191c7ffbb01a16367682f5b" }, - "CVE-2021-3640": { - "cmt_msg": "Bluetooth: sco: Fix lock_sock() blockage by memcpy_from_msg()" + "CVE-2018-8897": { + "cmt_msg": "x86/entry/64: Don't use IST entry for #BP stack", + "cmt_id": "5a29ce2b9880a26e1ac95169dedabc988360c734" + } + }, + "4.14.32": { + "CVE-2019-15239": { + "cmt_msg": "unknown", + "cmt_id": "dbbf2d1e4077bab0c65ece2765d3fc69cf7d610f" }, - "CVE-2021-3764": { - "cmt_msg": "crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd()" + "CVE-2021-0935": { + "cmt_msg": "net: ipv6: keep sk status consistent after datagram connect failure", + "cmt_id": "a8f02befc87d6f1a882c9b14a31bcfa1fbd3d430" }, - "CVE-2020-1749": { - "cmt_msg": "net: ipv6_stub: use ip6_dst_lookup_flow instead of ip6_dst_lookup" + "CVE-2018-1130": { + "cmt_msg": "dccp: check sk for closed state in dccp_sendmsg()", + "cmt_id": "91d27e0c302501e148460db9981b5b04481781ce" + } + }, + "4.14.33": { + "CVE-2018-1000199": { + "cmt_msg": "perf/hwbp: Simplify the perf-hwbp code, fix documentation", + "cmt_id": "ca04476df8fd39c71818352db43090bd17dd1d58" }, - "CVE-2022-42896": { - "cmt_msg": "Bluetooth: L2CAP: Fix accepting connection request for invalid SPSM" + "CVE-2017-17975": { + "cmt_msg": "media: usbtv: prevent double free in error case", + "cmt_id": "1f17d5033fe3c435556d8fb731f3a51ca073ce85" + } + }, + "4.14.34": { + "CVE-2018-7757": { + "cmt_msg": "scsi: libsas: fix memory leak in sas_smp_get_phy_events()", + "cmt_id": "8644d14c3240b6875c9e0e72c346146c24a6d8c1" + } + }, + "4.14.35": { + "CVE-2020-35513": { + "cmt_msg": "nfsd: fix incorrect umasks", + "cmt_id": "9a0a509839f31dc17f2ea788dc362c93589e077a" + } + }, + "4.14.36": { + "CVE-2019-14763": { + "cmt_msg": "usb: dwc3: gadget: never call ->complete() from ->ep_queue()", + "cmt_id": "59d3a952e4f3d505f9444e86db069081323351c7" }, - "CVE-2021-3760": { - "cmt_msg": "nfc: nci: fix the UAF of rf_conn_info object" + "CVE-2018-1094": { + "cmt_msg": "ext4: always initialize the crc32c checksum driver", + "cmt_id": "26dbb30c58ffb85bc015bd5e58831483d50f7d18" }, - "CVE-2022-36123": { - "cmt_msg": "x86: Clear .brk area at early boot" + "CVE-2018-1095": { + "cmt_msg": "ext4: limit xattr size to INT_MAX", + "cmt_id": "a57eb14b740e6175aff8b8941bec628403992dfa" }, - "CVE-2020-11608": { - "cmt_msg": "media: ov519: add missing endpoint sanity checks" + "CVE-2018-1108": { + "cmt_msg": "random: fix crng_ready() test", + "cmt_id": "6e513bc20ca63f594632eca4e1968791240b8f18" }, - "CVE-2020-10732": { - "cmt_msg": "fs/binfmt_elf.c: allocate initialized memory in fill_thread_core_info()" + "CVE-2018-1092": { + "cmt_msg": "ext4: fail ext4_iget for root directory if unallocated", + "cmt_id": "8e0e94683f8449f4e83b4b563b80eb9c76b9e18f" }, - "CVE-2020-28097": { - "cmt_msg": "vgacon: remove software scrollback support" + "CVE-2018-20961": { + "cmt_msg": "USB: gadget: f_midi: fixing a possible double-free in f_midi", + "cmt_id": "96dc465173a1f790e805246206aee3d18770f614" + } + }, + "4.14.37": { + "CVE-2018-8087": { + "cmt_msg": "mac80211_hwsim: fix possible memory leak in hwsim_new_radio_nl()", + "cmt_id": "afadc440a1cc08895f451b4a9db551a45f2a1a21" }, - "CVE-2024-24859": { - "cmt_msg": "" + "CVE-2021-39636": { + "cmt_msg": "netfilter: x_tables: fix pointer leaks to userspace", + "cmt_id": "ad10785a706e63ff155fc97860cdcc5e3bc5992d" + } + }, + "4.14.38": { + "CVE-2018-10940": { + "cmt_msg": "cdrom: information leak in cdrom_ioctl_media_changed()", + "cmt_id": "68c09d548bfc61aec99fa9a24e703c3d6fdba9b1" + } + }, + "4.14.39": { + "CVE-2018-9415": { + "cmt_msg": "ARM: amba: Fix race condition with driver_override", + "cmt_id": "23abff7b984ff46b78b9964f9cdba42036b4149a" }, - "CVE-2024-24858": { - "cmt_msg": "" + "CVE-2018-9385": { + "cmt_msg": "ARM: amba: Don't read past the end of sysfs \"driver_override\" buffer", + "cmt_id": "f671ee8de31a3c2702250e64e5f18ebceb21f1e6" + }, + "CVE-2018-1093": { + "cmt_msg": "ext4: add validity checks for bitmap block numbers", + "cmt_id": "b39430ea068797bb45b72429db3743064280b1be" + } + }, + "4.14.41": { + "CVE-2018-1000200": { + "cmt_msg": "mm, oom: fix concurrent munlock and oom reaper unmap, v3", + "cmt_id": "2270dfcc4b12d49c6d74394d245858ae882a8b79" + }, + "CVE-2018-11508": { + "cmt_msg": "compat: fix 4-byte infoleak via uninitialized struct field", + "cmt_id": "ef7c4825fe5fe9ed251bda8d4c04d47fe33c3afb" + } + }, + "4.14.42": { + "CVE-2018-1120": { + "cmt_msg": "proc: do not access cmdline nor environ from file-backed areas", + "cmt_id": "5c9a9508de30d4d27a270047c7ab5f2817b1366d" + } + }, + "4.14.43": { + "CVE-2018-5814": { + "cmt_msg": "usbip: usbip_host: fix NULL-ptr deref and use-after-free errors", + "cmt_id": "ec0c93951ecb3ab9463c9a0d0a79c69e4bcb2b2a" + }, + "CVE-2018-3639": { + "cmt_msg": "x86/nospec: Simplify alternative_msr_write()", + "cmt_id": "8410540f5aaf06ab01197443371be89822971e58" + } + }, + "4.14.44": { + "CVE-2018-10021": { + "cmt_msg": "scsi: libsas: defer ata device eh commands to libata", + "cmt_id": "58442874542fb41fd53de4ab34be180ad43779c9" + }, + "CVE-2018-1000204": { + "cmt_msg": "scsi: sg: allocate with __GFP_ZERO in sg_build_indirect()", + "cmt_id": "d827bea2d18c07ba514f7d48cde49f90da9a1384" + } + }, + "4.14.45": { + "CVE-2018-11506": { + "cmt_msg": "sr: pass down correctly sized SCSI sense buffer", + "cmt_id": "2a039b93679fb2e974bedf5b0d76da81731474ba" + }, + "CVE-2018-9518": { + "cmt_msg": "NFC: llcp: Limit size of SDP URI", + "cmt_id": "54881db3251a48f9a27ac8b7223a9b421757d395" + }, + "CVE-2017-13695": { + "cmt_msg": "ACPICA: acpi: acpica: fix acpi operand cache leak in nseval.c", + "cmt_id": "1d1646c408f62148fd2bbc399927bdc5381cb3ba" + }, + "CVE-2018-6412": { + "cmt_msg": "fbdev: Fixing arbitrary kernel leak in case FBIOGETCMAP_SPARC in sbusfb_ioctl_helper().", + "cmt_id": "ccf92117d49d77f3d88ad81d63ea5c0d02a94e3f" + } + }, + "4.14.49": { + "CVE-2019-18675": { + "cmt_msg": "mmap: introduce sane default mmap limits", + "cmt_id": "16d7ceb04b554207aa68dd27c1bc11f8933813fd" + } + }, + "4.14.50": { + "CVE-2018-10853": { + "cmt_msg": "kvm: x86: use correct privilege level for sgdt/sidt/fxsave/fxrstor access", + "cmt_id": "53e4b19fcd0ce08933e0f7a7fe11654f6eac1f19" + }, + "CVE-2018-12904": { + "cmt_msg": "kvm: nVMX: Enforce cpl=0 for VMX instructions", + "cmt_id": "b1bd9caf5e98d8111361f53367fece3444b0a7c2" + } + }, + "4.14.52": { + "CVE-2018-10840": { + "cmt_msg": "ext4: correctly handle a zero-length xattr with a non-zero e_value_offs", + "cmt_id": "21542545990c5aba4b919ac0f8c8ae6a408b49d4" + }, + "CVE-2018-1118": { + "cmt_msg": "vhost: fix info leak due to uninitialized memory", + "cmt_id": "7446344baafba2f23da58ac837b86770ec977b90" + }, + "CVE-2018-11412": { + "cmt_msg": "ext4: do not allow external inodes for inline data", + "cmt_id": "e81d371dac30019816a1c5a3a2c4c44bb3c68558" + }, + "CVE-2018-12232": { + "cmt_msg": "socket: close race condition between sock_close() and sockfs_setattr()", + "cmt_id": "91717ffc9057f38a0203a40ef36ae2e482fd7cbe" + } + }, + "4.14.53": { + "CVE-2018-13406": { + "cmt_msg": "video: uvesafb: Fix integer overflow in allocation", + "cmt_id": "9aa818d42bf5f5477f66dbc941b4daddfcae290d" + } + }, + "4.14.55": { + "CVE-2018-9516": { + "cmt_msg": "HID: debug: check length before copy_to_user()", + "cmt_id": "50b4d984f55e7e8d75f75da6803505ca3c122cef" + }, + "CVE-2018-10879": { + "cmt_msg": "ext4: make sure bitmaps and the inode table don't overlap with bg descriptors", + "cmt_id": "ac93c718365ac6ea9d7631641c8dec867d623491" + }, + "CVE-2018-10881": { + "cmt_msg": "ext4: clear i_data in ext4_inode_info when removing inline data", + "cmt_id": "deb465ec750b80776cc4ac5b92b72c0a71fd4f0b" + }, + "CVE-2018-10878": { + "cmt_msg": "ext4: always check block group bounds in ext4_init_block_bitmap()", + "cmt_id": "ac48bb9bc0a32f5a4432be1645b57607f8c46aa7" + }, + "CVE-2018-10877": { + "cmt_msg": "ext4: verify the depth of extent tree in ext4_find_extent()", + "cmt_id": "d69a9df614fc68741efcb0fcc020f05caa99d668" + }, + "CVE-2018-10876": { + "cmt_msg": "ext4: only look at the bg_flags field if it is valid", + "cmt_id": "44a4bc970bfae625d0ec9ecdfefc88c9d93dfe6c" + }, + "CVE-2018-10880": { + "cmt_msg": "ext4: never move the system.data xattr out of the inode body", + "cmt_id": "8a9ef17c0dc93def47e17b227ada95c682592a1d" + }, + "CVE-2017-13168": { + "cmt_msg": "scsi: sg: mitigate read/write abuse", + "cmt_id": "6e51bfa950864343cfe210a75268e826a2b4b2e8" + }, + "CVE-2018-10882": { + "cmt_msg": "ext4: add more inode number paranoia checks", + "cmt_id": "c24aab6d86640ccf321b87be6096319f55b16274" + }, + "CVE-2018-10883": { + "cmt_msg": "jbd2: don't mark block as modified if the handle is out of credits", + "cmt_id": "0321e68838d7ba2528b367b879b2fcf9d96a2099" + } + }, + "4.14.56": { + "CVE-2018-13405": { + "cmt_msg": "Fix up non-directory creation in SGID directories", + "cmt_id": "298243a5fb640f018e2fae22c0c895f1b27f0963" + }, + "CVE-2018-16276": { + "cmt_msg": "USB: yurex: fix out-of-bounds uaccess in read handler", + "cmt_id": "90f2a76ccd37cce2530df49335bcea6cd0e23797" + } + }, + "4.14.57": { + "CVE-2017-18216": { + "cmt_msg": "ocfs2: subsystem.su_mutex is required while accessing the item->ci_parent", + "cmt_id": "c59a8f13f36b51f2100111121b39c6d15eca124d" + }, + "CVE-2017-18224": { + "cmt_msg": "ocfs2: ip_alloc_sem should be taken in ocfs2_get_block()", + "cmt_id": "1ccab2bf726e1cd9292deecf4d72d732527035d6" + } + }, + "4.14.58": { + "CVE-2018-10902": { + "cmt_msg": "ALSA: rawmidi: Change resized buffers atomically", + "cmt_id": "5d251646ab1588077b26e89dcaa116aba105d097" + } + }, + "4.14.59": { + "CVE-2018-5390": { + "cmt_msg": "tcp: free batches of packets in tcp_prune_ofo_queue()", + "cmt_id": "f3a5ba6310e11df370f6888ed716d1486896d983" + } + }, + "4.14.60": { + "CVE-2018-14734": { + "cmt_msg": "infiniband: fix a possible use-after-free bug", + "cmt_id": "e27dad1eb1ac7bedb5a033ac2e068543742c807b" + } + }, + "4.14.62": { + "CVE-2018-13093": { + "cmt_msg": "xfs: validate cached inodes are free when allocated", + "cmt_id": "6f021e4ef39ace7f58c415856aef9308c70e89b9" + }, + "CVE-2018-13094": { + "cmt_msg": "xfs: don't call xfs_da_shrink_inode with NULL bp", + "cmt_id": "59f35b983e8aeb98188c6ef93f8eabc594f8f953" + }, + "CVE-2018-12233": { + "cmt_msg": "jfs: Fix inconsistency between memory allocation and ea_buf->max_size", + "cmt_id": "7d29fb53439c8c91874550cc078eda6db8feafe7" + } + }, + "4.14.63": { + "CVE-2018-3646": { + "cmt_msg": "x86/microcode: Allow late microcode loading with SMT disabled", + "cmt_id": "e456004eb77734e274e520c83ad9be76736e622c" + }, + "CVE-2018-15572": { + "cmt_msg": "x86/speculation: Protect against userspace-userspace spectreRSB", + "cmt_id": "f374b5593e44c01265156b4c4070b618097f401b" + }, + "CVE-2018-3620": { + "cmt_msg": "x86/microcode: Allow late microcode loading with SMT disabled", + "cmt_id": "e456004eb77734e274e520c83ad9be76736e622c" + } + }, + "4.14.64": { + "CVE-2018-9363": { + "cmt_msg": "Bluetooth: hidp: buffer overflow in hidp_process_report", + "cmt_id": "6e2c702e797c25b49dac3a9f663c449f30cf8efc" + } + }, + "4.14.67": { + "CVE-2018-3693": { + "cmt_msg": "ext4: fix spectre gadget in ext4_mb_regular_allocator()", + "cmt_id": "4bc32484df6a3bdc173301adff0c2fdc66667a40" + } + }, + "4.14.68": { + "CVE-2018-16658": { + "cmt_msg": "cdrom: Fix info leak/OOB read in cdrom_ioctl_drive_status", + "cmt_id": "73b2e7073b51de0b03ebd15c97dd3ad0c3470810" + } + }, + "4.14.69": { + "CVE-2018-20856": { + "cmt_msg": "block: blk_init_allocated_queue() set q->fq as NULL in the fail case", + "cmt_id": "0affbaece6d0b7c75c5166732d0481ae9a28be60" + }, + "CVE-2019-12881": { + "cmt_msg": "drm/i915/userptr: reject zero user_size", + "cmt_id": "7188f7416438a34412a6702f548f81be9e2cf56c" + } + }, + "4.14.70": { + "CVE-2018-6554": { + "cmt_msg": "staging: irda: remove the irda network stack and drivers", + "cmt_id": "77be9452d0e5768bab9a041a62116cbeb9dc3174" + }, + "CVE-2018-6555": { + "cmt_msg": "staging: irda: remove the irda network stack and drivers", + "cmt_id": "e37957305de356b4f8719a3a4c7bc1453a2f0ca3" + }, + "CVE-2018-14617": { + "cmt_msg": "hfsplus: fix NULL dereference in hfsplus_lookup()", + "cmt_id": "68e787c3c80059c776d1d7afb20f5eb9f20237a5" + }, + "CVE-2018-14609": { + "cmt_msg": "btrfs: relocation: Only remove reloc rb_trees if reloc control has been initialized", + "cmt_id": "0cdbc3faf960de16ebe8a427feb3b0544ad983cc" + } + }, + "4.14.71": { + "CVE-2018-5391": { + "cmt_msg": "ip: discard IPv4 datagrams with overlapping segments.", + "cmt_id": "1c44969111cc68f361638b6e54f5a176609aa05a" + }, + "CVE-2018-13099": { + "cmt_msg": "f2fs: fix to do sanity check with reserved blkaddr of inline inode", + "cmt_id": "7fb2b50ee59689578d5a712633d1e6755fc98933" + }, + "CVE-2018-17182": { + "cmt_msg": "mm: get rid of vmacache_flush_all() entirely", + "cmt_id": "06274364edb4407b386a996a7ff46c3ca3459b70" + } + }, + "4.14.73": { + "CVE-2018-20511": { + "cmt_msg": "net/appletalk: fix minor pointer leak to userspace in SIOCFINDIPDDPRT", + "cmt_id": "9951e17efd05b8ad49bbc0db2e6b483f95d94d86" + }, + "CVE-2018-14633": { + "cmt_msg": "scsi: target: iscsi: Use hex2bin instead of a re-implementation", + "cmt_id": "755e45f3155cc51e37dc1cce9ccde10b84df7d93" + } + }, + "4.14.74": { + "CVE-2019-9458": { + "cmt_msg": "media: v4l: event: Prevent freeing event subscriptions while accessed", + "cmt_id": "d61ba3417e4fb71963441aa0c2e9c26f4568215b" + }, + "CVE-2018-18021": { + "cmt_msg": "arm64: KVM: Tighten guest core register access from userspace", + "cmt_id": "38d070f9090af15b5bdb26fc0e084b22f34eabd9" + }, + "CVE-2018-7755": { + "cmt_msg": "floppy: Do not copy a kernel pointer to user memory in FDGETPRM ioctl", + "cmt_id": "04bc4dd86d0f2b166640c8ea5b7a030d92a3d993" + }, + "CVE-2018-13053": { + "cmt_msg": "alarmtimer: Prevent overflow for relative nanosleep", + "cmt_id": "a4dbaf7c2de0d622e0fe29840dd2bf4a281277a5" + }, + "CVE-2018-12896": { + "cmt_msg": "posix-timers: Sanitize overrun handling", + "cmt_id": "3e3f075f72bd2dfcd5211bd1ff3919bc118ad4cd" + } + }, + "4.14.75": { + "CVE-2018-17972": { + "cmt_msg": "proc: restrict kernel stack dumps to root", + "cmt_id": "f8566a92ab75d442a823453414c6158b0b3c5ce7" + } + }, + "4.14.76": { + "CVE-2018-15471": { + "cmt_msg": "xen-netback: fix input validation in xenvif_set_hash_mapping()", + "cmt_id": "309a1c5cfc598c162dfc951fac040554164056e4" + } + }, + "4.14.78": { + "CVE-2018-18281": { + "cmt_msg": "mremap: properly flush TLB before releasing the page", + "cmt_id": "541500abfe9eb30a89ff0a6eb42a21521996d68d" + } + }, + "4.14.82": { + "CVE-2018-19854": { + "cmt_msg": "crypto: user - fix leaking uninitialized memory to userspace", + "cmt_id": "fdc427442b374e84077d4214733764efb1a38a0e" + }, + "CVE-2018-16871": { + "cmt_msg": "nfsd: COPY and CLONE operations require the saved filehandle to be set", + "cmt_id": "6d1c38aa47d432f425c5829261eaa8e624274a4f" + }, + "CVE-2018-18710": { + "cmt_msg": "cdrom: fix improper type cast, which can leat to information leak.", + "cmt_id": "a8c254d8e96032d5bb235cb2e777203d9acda09d" + } + }, + "4.14.86": { + "CVE-2018-13100": { + "cmt_msg": "f2fs: fix to do sanity check with secs_per_zone", + "cmt_id": "f3d6361a96a455c8ba12226a04efa67a0ada4966" + }, + "CVE-2018-5703": { + "cmt_msg": "tls: Use correct sk->sk_prot for IPV6", + "cmt_id": "2a0f5919e1e6a1c0423d895ab75eb15f94a67c69" + }, + "CVE-2018-13096": { + "cmt_msg": "f2fs: fix to do sanity check with node footer and iblocks", + "cmt_id": "b8321ccd045710ee04fd5322c34cadd13a5e58af" + }, + "CVE-2018-13097": { + "cmt_msg": "f2fs: fix to do sanity check with user_block_count", + "cmt_id": "f9cf5462b51d98026275cc51437fc531e808b64a" + }, + "CVE-2018-14615": { + "cmt_msg": "f2fs: fix to do sanity check with i_extra_isize", + "cmt_id": "d7d9d29a837358636e12fe09c90a7882b53b2220" + }, + "CVE-2018-14614": { + "cmt_msg": "f2fs: fix to do sanity check with cp_pack_start_sum", + "cmt_id": "30130700acfad8a705c109325379f5bbe21b3ccc" + }, + "CVE-2018-13098": { + "cmt_msg": "f2fs: fix to do sanity check with extra_attr feature", + "cmt_id": "0081c90ebacebb3a82d0d24bf0f42273ce2d902e" + }, + "CVE-2018-5848": { + "cmt_msg": "wil6210: missing length check in wmi_set_ie", + "cmt_id": "107b02c81a8761f1f7efc1e8b54d435324ccd13e" + }, + "CVE-2018-14611": { + "cmt_msg": "btrfs: validate type when reading a chunk", + "cmt_id": "f7eef132ccc95c9af50b647c5da0511d2b8492f8" + }, + "CVE-2018-14610": { + "cmt_msg": "btrfs: Check that each block group has corresponding chunk at mount time", + "cmt_id": "34407a175a59b668a1a2bbf0d0e495d87a7777d8" + }, + "CVE-2018-14613": { + "cmt_msg": "btrfs: tree-checker: Verify block_group_item", + "cmt_id": "9f268b5cf2d6a716779dfe11f4bc02d6461db693" + }, + "CVE-2018-14612": { + "cmt_msg": "btrfs: tree-checker: Detect invalid and empty essential trees", + "cmt_id": "c0dfb99847851fb830d1e8ea7d5e0571f50c325a" + }, + "CVE-2018-1128": { + "cmt_msg": "libceph: add authorizer challenge", + "cmt_id": "3fd73c8a71f299e30359a63add1f33e3fd834831" + }, + "CVE-2018-1129": { + "cmt_msg": "libceph: implement CEPHX_V2 calculation mode", + "cmt_id": "b16d0c5d32468a0624505a7b6b211e20488295e9" + }, + "CVE-2019-2024": { + "cmt_msg": "media: em28xx: Fix use-after-free when disconnecting", + "cmt_id": "30cdc0c3bac950bebd3ba59f5ff980cdd3710e0f" + }, + "CVE-2018-18690": { + "cmt_msg": "xfs: don't fail when converting shortform attr to long form during ATTR_REPLACE", + "cmt_id": "cb7ccb9924bb3596f211badf0d2becf131a979cd" + }, + "CVE-2018-19407": { + "cmt_msg": "KVM: X86: Fix scan ioapic use-before-initialization", + "cmt_id": "83f00ab9a7c03e9f1410727d985b7fe9473002e1" + }, + "CVE-2020-0435": { + "cmt_msg": "f2fs: fix to do sanity check with i_extra_isize", + "cmt_id": "d7d9d29a837358636e12fe09c90a7882b53b2220" + }, + "CVE-2019-2025": { + "cmt_msg": "binder: fix race that allows malicious free of live buffer", + "cmt_id": "fd6cc33d0775b0d902906d88dd05cc1a2a059f8d" + } + }, + "4.14.87": { + "CVE-2018-16862": { + "cmt_msg": "mm: cleancache: fix corruption on missed inode invalidation", + "cmt_id": "60720df8bf43e8ca2ce1a17936904a52129c8471" + }, + "CVE-2018-18397": { + "cmt_msg": "userfaultfd: use ENOENT instead of EFAULT if the atomic copy user fails", + "cmt_id": "82c5a8c0debac552750a00b4fc7551c89c7b34b8" + } + }, + "4.14.88": { + "CVE-2018-20169": { + "cmt_msg": "USB: check usb_get_extra_descriptor for proper size", + "cmt_id": "7b6e85da8d94948201abb8d576d485892a6a878f" + }, + "CVE-2018-5953": { + "cmt_msg": "printk: hash addresses printed with %p", + "cmt_id": "f2a4f7622d052eb987e8693633468c239c13575a" + }, + "CVE-2018-14616": { + "cmt_msg": "f2fs: fix to do sanity check with block address in main area v2", + "cmt_id": "38fce19d4d7bc8acfa183ee2918758d279a69c9a" + }, + "CVE-2018-14625": { + "cmt_msg": "vhost/vsock: fix use-after-free in network stack callers", + "cmt_id": "f15c072d6576c5e2b693c22e39ccc9103c952078" + }, + "CVE-2018-19824": { + "cmt_msg": "ALSA: usb-audio: Fix UAF decrement if card has no live interfaces in card.c", + "cmt_id": "19f74e45746253cafb8cb1e773041e7cadbac622" + } + }, + "4.14.91": { + "CVE-2018-16882": { + "cmt_msg": "KVM: Fix UAF in nested posted interrupt processing", + "cmt_id": "cc70f14956fa0ea84ee1a3a5b79347730c6c2d08" + }, + "CVE-2018-19985": { + "cmt_msg": "USB: hso: Fix OOB memory access in hso_probe/hso_get_config_data", + "cmt_id": "49be8dc589aee04c64d61e362c5029ab20fd6fd7" + } + }, + "4.14.93": { + "CVE-2019-15927": { + "cmt_msg": "ALSA: usb-audio: Avoid access before bLength check in build_audio_procunit()", + "cmt_id": "1117b7a380f4b4f575d90a318a43d2e168c01fbd" + }, + "CVE-2018-20784": { + "cmt_msg": "sched/fair: Fix infinite loop in update_blocked_averages() by reverting a9e7f6544b9c", + "cmt_id": "c6a9a1ccafc49fe95d8de54eef154ad5c3b94077" + }, + "CVE-2019-6133": { + "cmt_msg": "fork: record start_time late", + "cmt_id": "3f2e4e1d9a6cffa95d31b7a491243d5e92a82507" + } + }, + "4.14.94": { + "CVE-2018-16884": { + "cmt_msg": "sunrpc: use-after-free in svc_process_common()", + "cmt_id": "65dba32522065b79a16393efc75f8006c2c3dbb8" + } + }, + "4.14.95": { + "CVE-2019-3701": { + "cmt_msg": "can: gw: ensure DLC boundaries after CAN frame modification", + "cmt_id": "39ff087b5c6be2ff0b08e617d334e5bf72a08b44" + }, + "CVE-2020-10769": { + "cmt_msg": "crypto: authenc - fix parsing key with misaligned rta_len", + "cmt_id": "b9119fd2749c1459416ebb559cf7c1d379786cff" + } + }, + "4.14.96": { + "CVE-2019-11085": { + "cmt_msg": "drm/i915/gvt: Fix mmap range check", + "cmt_id": "e89ec9b92f9b75b44e1ff9f52dab48bd01834ed6" + } + }, + "4.14.99": { + "CVE-2019-7222": { + "cmt_msg": "KVM: x86: work around leak of uninitialized stack contents (CVE-2019-7222)", + "cmt_id": "ef1b3d4893cec543305d30e8160df8c096135950" + }, + "CVE-2019-6974": { + "cmt_msg": "kvm: fix kvm_ioctl_create_device() reference counting (CVE-2019-6974)", + "cmt_id": "8c1b11bc3555b5d1207b0e179cbdd8b945e71e69" + }, + "CVE-2019-7221": { + "cmt_msg": "KVM: nVMX: unconditionally cancel preemption timer in free_nested (CVE-2019-7221)", + "cmt_id": "1c965b1b5ecc2c9e1d59b2514cedb6f7483a0241" + } + }, + "4.14.102": { + "CVE-2018-1000026": { + "cmt_msg": "bnx2x: disable GSO where gso_size is too big for hardware", + "cmt_id": "60cd31866de4386d940e55073491c3ee17ca593e" + } + }, + "4.14.103": { + "CVE-2019-8912": { + "cmt_msg": "net: crypto set sk to NULL when af_alg_release.", + "cmt_id": "6e4c01ee785c2192fcc4be234cedde3706309a7e" + } + }, + "4.14.105": { + "CVE-2019-9213": { + "cmt_msg": "mm: enforce min addr even if capable() in expand_downwards()", + "cmt_id": "f5817069248630b3b7b17ebfcdee0b679c52be33" + } + }, + "4.14.106": { + "CVE-2019-16994": { + "cmt_msg": "net: sit: fix memory leak in sit_init_net()", + "cmt_id": "46a5caa79ff73c9403ab37475ef47ed4c027e712" + }, + "CVE-2019-15916": { + "cmt_msg": "net-sysfs: Fix mem leak in netdev_register_kobject", + "cmt_id": "306bbaeb077068141d472b922ae1adf7ab81fd72" + }, + "CVE-2019-2101": { + "cmt_msg": "media: uvcvideo: Fix 'type' check leading to overflow", + "cmt_id": "aa4ba765e0903926de64b359e8653bfd29a3c353" + }, + "CVE-2019-12818": { + "cmt_msg": "net: nfc: Fix NULL dereference on nfc_llcp_build_tlv fails", + "cmt_id": "b275f8e6a0096cac11cf697c4e3ad226070264f5" + }, + "CVE-2019-25160": { + "cmt_msg": "netlabel: fix out-of-bounds memory accesses", + "cmt_id": "fcfe700acdc1c72eab231300e82b962bac2b2b2c" + }, + "CVE-2019-8980": { + "cmt_msg": "exec: Fix mem leak in kernel_read_file", + "cmt_id": "069fb92ea221c72bd75f4863b3540420082f32ba" + } + }, + "4.14.107": { + "CVE-2019-16995": { + "cmt_msg": "net: hsr: fix memory leak in hsr_dev_finalize()", + "cmt_id": "1aa1e0a3f6dde5c37bb5d6a9121847b95b255c1f" + }, + "CVE-2019-12819": { + "cmt_msg": "mdio_bus: Fix use-after-free on device_register fails", + "cmt_id": "07c2216c3783daca34ea0d86affb9dfc5346f183" + } + }, + "4.14.108": { + "CVE-2019-10124": { + "cmt_msg": "mm: hwpoison: fix thp split handing in soft_offline_in_use_page()", + "cmt_id": "c02fd076842636fb7506d4ca8a2bb3f91faf1af3" + }, + "CVE-2019-9455": { + "cmt_msg": "media: videobuf2-v4l2: drop WARN_ON in vb2_warn_zero_bytesused()", + "cmt_id": "8d6df5097c0005320ab6f3cd8dda2ef31db6c6d1" + }, + "CVE-2019-16413": { + "cmt_msg": "9p: use inode->i_lock to protect i_size_write() under 32-bit", + "cmt_id": "be0b155c2b2f8c39adaa1641f3f6a4be47277993" + } + }, + "4.14.109": { + "CVE-2019-15917": { + "cmt_msg": "Bluetooth: hci_ldisc: Postpone HCI_UART_PROTO_READY bit set in hci_uart_set_proto()", + "cmt_id": "a1dbb34da6f2edf321df5023cb2accd92579269b" + } + }, + "4.14.110": { + "CVE-2019-20811": { + "cmt_msg": "net-sysfs: call dev_hold if kobject_init_and_add success", + "cmt_id": "e331c9066901dfe40bea4647521b86e9fb9901bb" + }, + "CVE-2019-20054": { + "cmt_msg": "fs/proc/proc_sysctl.c: fix NULL pointer dereference in put_links", + "cmt_id": "0d9ef3f5b07e4b6fe6105a45603de1e133e4df49" + }, + "CVE-2019-3460": { + "cmt_msg": "Bluetooth: Check L2CAP option sizes returned from l2cap_get_conf_opt", + "cmt_id": "82868814a87236b17ac588fbb779c87616e99345" + }, + "CVE-2019-15921": { + "cmt_msg": "genetlink: Fix a memory leak on error path", + "cmt_id": "111fdc6e948b36115e29cf3b1981058d033ffd54" + }, + "CVE-2019-3459": { + "cmt_msg": "Bluetooth: Verify that l2cap_get_conf_opt provides large enough buffer", + "cmt_id": "2b59d36f22622c92c0b06aee7571f0a86a217188" + } + }, + "4.14.111": { + "CVE-2019-11810": { + "cmt_msg": "scsi: megaraid_sas: return error when create DMA pool failed", + "cmt_id": "90fca247abf6adc1ee6eef9b3de199448c8a4ad6" + } + }, + "4.14.112": { + "CVE-2019-11486": { + "cmt_msg": "tty: mark Siemens R3964 line discipline as BROKEN", + "cmt_id": "429977fd9f7153607230a6040ee12510a525e930" + }, + "CVE-2019-11815": { + "cmt_msg": "net: rds: force to destroy connection if t_sock is NULL in rds_tcp_kill_sock().", + "cmt_id": "c8a88799e632045399af886a1b1a5205e5d49897" + }, + "CVE-2019-10639": { + "cmt_msg": "netns: provide pure entropy for net_hash_mix()", + "cmt_id": "adbb8bdd392db14dc80ad1ac29f8f1d37ab57a62" + } + }, + "4.14.113": { + "CVE-2019-15292": { + "cmt_msg": "appletalk: Fix use-after-free in atalk_proc_exit", + "cmt_id": "0ba1fa56351e6e9c2f8db4ffc823cb7057e4ea82" + }, + "CVE-2019-7308": { + "cmt_msg": "bpf: fix sanitation of alu op with pointer / scalar type from different paths", + "cmt_id": "6588a490bfe1b879f11b5e74724ef53a33b68641" + } + }, + "4.14.114": { + "CVE-2018-5995": { + "cmt_msg": "printk: hash addresses printed with %p", + "cmt_id": "47ad82a34560ea70e85d2eb56be0ada03dc4fd35" + }, + "CVE-2019-11599": { + "cmt_msg": "coredump: fix race condition between mmget_not_zero()/get_task_mm() and core dumping", + "cmt_id": "bb461ad8e6e0653fc6bd0f26d9173bab0aec235b" + }, + "CVE-2019-3892": { + "cmt_msg": "coredump: fix race condition between mmget_not_zero()/get_task_mm() and core dumping", + "cmt_id": "bb461ad8e6e0653fc6bd0f26d9173bab0aec235b" + }, + "CVE-2019-15214": { + "cmt_msg": "ALSA: core: Fix card races between register and disconnect", + "cmt_id": "d11a33e9ba584bb6f5cc74df9d74b26156ba9bb2" + } + }, + "4.14.115": { + "CVE-2019-3882": { + "cmt_msg": "vfio/type1: Limit DMA mappings per container", + "cmt_id": "73a95f1a41c0bb586b8c62622ebf25aca1582af3" + }, + "CVE-2019-15924": { + "cmt_msg": "fm10k: Fix a potential NULL pointer dereference", + "cmt_id": "2617f9af19ce93c509ebf3fd3ce26048b8f85216" + } + }, + "4.14.116": { + "CVE-2019-11487": { + "cmt_msg": "fs: prevent page refcount overflow in pipe_buf_get", + "cmt_id": "c88a0aa7ace7eb10dca42be59f21e2cbd263575e" + } + }, + "4.14.117": { + "CVE-2019-15216": { + "cmt_msg": "USB: yurex: Fix protection fault after device removal", + "cmt_id": "5696fa3f42168ee33256c0b0b72ca963d224327f" + } + }, + "4.14.118": { + "CVE-2018-20836": { + "cmt_msg": "scsi: libsas: fix a race condition when smp task timeout", + "cmt_id": "3739f98aea7113a21d11b1a604525049e422e29e" + }, + "CVE-2019-11884": { + "cmt_msg": "Bluetooth: hidp: fix buffer overflow", + "cmt_id": "2c33156b2d2f5efe820d8efdd610fb168c9acf72" + } + }, + "4.14.119": { + "CVE-2019-11091": { + "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option", + "cmt_id": "91788fcb21d008b1b7ac6beae20522725fa78239" + }, + "CVE-2018-12130": { + "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option", + "cmt_id": "91788fcb21d008b1b7ac6beae20522725fa78239" + }, + "CVE-2018-12127": { + "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option", + "cmt_id": "91788fcb21d008b1b7ac6beae20522725fa78239" + }, + "CVE-2018-12126": { + "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option", + "cmt_id": "91788fcb21d008b1b7ac6beae20522725fa78239" + } + }, + "4.14.120": { + "CVE-2019-10142": { + "cmt_msg": "drivers/virt/fsl_hypervisor.c: prevent integer overflow in ioctl", + "cmt_id": "1a3a561df5e176a4422270e3d2cca1cd835b292e" + } + }, + "4.14.121": { + "CVE-2019-11833": { + "cmt_msg": "ext4: zero out the unused memory region in the extent tree block", + "cmt_id": "d7d9e4823b658eb795f4a379d121d3f0539c1117" + } + }, + "4.14.122": { + "CVE-2019-15666": { + "cmt_msg": "xfrm: policy: Fix out-of-bound array accesses in __xfrm_policy_unlink", + "cmt_id": "1a2bb5125acb5be09ac8dcbf0f1e47ec28468fdc" + } + }, + "4.14.123": { + "CVE-2019-20095": { + "cmt_msg": "mwifiex: Fix mem leak in mwifiex_tm_cmd", + "cmt_id": "ccebaeca5089c49f2b331e91334b2d2e7a40e53c" + }, + "CVE-2019-19543": { + "cmt_msg": "media: serial_ir: Fix use-after-free in serial_ir_init_module", + "cmt_id": "f1c9f1f3665635d86e4d507312f4d114d0d738e3" + }, + "CVE-2019-9466": { + "cmt_msg": "brcmfmac: add subtype check for event handling in data path", + "cmt_id": "7c9290b56da477b54fab5dc48e1d21cfb8dc46f4" + }, + "CVE-2019-9500": { + "cmt_msg": "brcmfmac: assure SSID length from firmware is limited", + "cmt_id": "f9ba91b5d1bfb6124640e00dca6562f69b71ca19" + }, + "CVE-2019-9503": { + "cmt_msg": "brcmfmac: add subtype check for event handling in data path", + "cmt_id": "7c9290b56da477b54fab5dc48e1d21cfb8dc46f4" + }, + "CVE-2019-19966": { + "cmt_msg": "media: cpia2: Fix use-after-free in cpia2_exit", + "cmt_id": "b7eaea002ad0a3d2563df9d18e2ca3c6bd81abd3" + } + }, + "4.14.124": { + "CVE-2020-10720": { + "cmt_msg": "net-gro: fix use-after-free read in napi_gro_frags()", + "cmt_id": "385ee66eaf88e1f04be973f623b81e4bf0ec0c6f" + }, + "CVE-2019-15219": { + "cmt_msg": "USB: sisusbvga: fix oops in error path of sisusb_probe", + "cmt_id": "47ffaae93ea154ae149315389a30780fa3189caf" + }, + "CVE-2019-15218": { + "cmt_msg": "media: usb: siano: Fix general protection fault in smsusb", + "cmt_id": "5a7adcda3de26a44fc0fa3f68199358b1527daf4" + }, + "CVE-2019-15212": { + "cmt_msg": "USB: rio500: refuse more than one device at a time", + "cmt_id": "f18227d08e6b50717e1560a86fbebda0ca911507" + }, + "CVE-2019-1999": { + "cmt_msg": "binder: fix race between munmap() and direct reclaim", + "cmt_id": "c2a035d7822ac8d2870cd6dbaadc1ab407713b83" + }, + "CVE-2019-10638": { + "cmt_msg": "inet: switch IP ID generator to siphash", + "cmt_id": "e10789acbe6a76b304f45cbc8bb77a926ae4f201" + } + }, + "4.14.127": { + "CVE-2019-11479": { + "cmt_msg": "tcp: add tcp_min_snd_mss sysctl", + "cmt_id": "cd6f35b8421ff20365ff711c0ac7647fd70e9af7" + }, + "CVE-2019-11478": { + "cmt_msg": "tcp: tcp_fragment() should apply sane memory limits", + "cmt_id": "9daf226ff92679d09aeca1b5c1240e3607153336" + }, + "CVE-2019-11477": { + "cmt_msg": "tcp: limit payload size of sacked skbs", + "cmt_id": "d632920554c5aec81d8a79c23dac07efcbabbd54" + } + }, + "4.14.128": { + "CVE-2019-15090": { + "cmt_msg": "scsi: qedi: remove memset/memcpy to nfunc and use func instead", + "cmt_id": "af1630c6dc4fd96c09fef088f9c400c35e259e72" + } + }, + "4.14.129": { + "CVE-2019-15807": { + "cmt_msg": "scsi: libsas: delete sas port if expander discover failed", + "cmt_id": "5992a6926eb037cb8ed30521c74e2bef082a8946" + } + }, + "4.14.130": { + "CVE-2019-12615": { + "cmt_msg": "mdesc: fix a missing-check bug in get_vdev_port_node_info()", + "cmt_id": "b1013624a8adb9caa83b4c9f487778c7b51467a0" + }, + "CVE-2019-0136": { + "cmt_msg": "mac80211: drop robust management frames from unknown TA", + "cmt_id": "7a680d6e5441400b768d6e6cfe5524726ebd6b7f" + } + }, + "4.14.133": { + "CVE-2019-13272": { + "cmt_msg": "ptrace: Fix ->ptracer_cred handling for PTRACE_TRACEME", + "cmt_id": "bf71ef9655d25e8b275ec6ed649b6bd719231ddc" + }, + "CVE-2019-15221": { + "cmt_msg": "ALSA: line6: Fix write on zero-sized buffer", + "cmt_id": "37eaa74451c1003a6bec548c957890c264559463" + }, + "CVE-2019-9506": { + "cmt_msg": "Bluetooth: Fix faulty expression for minimum encryption key size check", + "cmt_id": "05206de4e9ae033afd32f685c4a005cbc1dceb39" + }, + "CVE-2019-3900": { + "cmt_msg": "vhost_net: fix possible infinite loop", + "cmt_id": "ae446749492d8bd23f1d0b81adba16e5739dc740" + } + }, + "4.14.134": { + "CVE-2019-10126": { + "cmt_msg": "mwifiex: Fix heap overflow in mwifiex_uap_parse_tail_ies()", + "cmt_id": "b1459fb34061337efbf0d47a3ba6208f2f59829d" + }, + "CVE-2019-3846": { + "cmt_msg": "mwifiex: Fix possible buffer overflows at parsing bss descriptor", + "cmt_id": "d50f6b58d7ad30ad8e96c0bbc3e5ecfe9b91ba77" + }, + "CVE-2019-15220": { + "cmt_msg": "p54usb: Fix race between disconnect and firmware loading", + "cmt_id": "c760ecb74f84f729ae31b9fbc6b772923cdc78df" + } + }, + "4.14.135": { + "CVE-2019-17351": { + "cmt_msg": "xen: let alloc_xenballooned_pages() fail if not enough memory free", + "cmt_id": "ba110e6dc391f70195c161bcc3de2c58ba705045" + }, + "CVE-2019-12382": { + "cmt_msg": "drm/edid: Fix a missing-check bug in drm_load_edid_firmware()", + "cmt_id": "df56de8931b924c1d850b80e1b22b62449758e90" + }, + "CVE-2019-13631": { + "cmt_msg": "Input: gtco - bounds check collection indent level", + "cmt_id": "81bf168d855cc1d97a7c9cde6787ff42485556c8" + }, + "CVE-2019-15925": { + "cmt_msg": "net: hns3: add some error checking in hclge_tm module", + "cmt_id": "18f05a6fc4cfb78ff1de275d9ebf88c3ed5522a2" + }, + "CVE-2019-15926": { + "cmt_msg": "ath6kl: add some bounds checking", + "cmt_id": "193a754afbe979a43893c88373a625ed384123ab" + }, + "CVE-2019-14284": { + "cmt_msg": "floppy: fix div-by-zero in setup_format_params", + "cmt_id": "a904a690ea0317fcd88c5b9dfef40ef0f98d9530" + }, + "CVE-2019-14283": { + "cmt_msg": "floppy: fix out-of-bounds read in copy_buffer", + "cmt_id": "80637a906eded08e04ed8a6fbbdd2b8112eaa387" + }, + "CVE-2019-13648": { + "cmt_msg": "powerpc/tm: Fix oops on sigreturn on systems without TM", + "cmt_id": "26bee6ef0d72193d58a085610fe49169d23baa83" + } + }, + "4.14.136": { + "CVE-2019-15211": { + "cmt_msg": "media: radio-raremono: change devm_k*alloc to k*alloc", + "cmt_id": "c4c213d9aadc85a2808b04d3676970ea5f90340e" + }, + "CVE-2019-10207": { + "cmt_msg": "Bluetooth: hci_uart: check for missing tty operations", + "cmt_id": "69f9c2bc3f754ad1d610b30b940681d678c8e684" + }, + "CVE-2019-20934": { + "cmt_msg": "sched/fair: Don't free p->numa_faults with concurrent readers", + "cmt_id": "d0919216e468d5613cc8c53d4d0676026960fe39" + }, + "CVE-2019-15215": { + "cmt_msg": "media: cpia2_usb: first wake up, then free in disconnect", + "cmt_id": "3566a98e59b5cb19829d21bfe18cd396812ce15e" + }, + "CVE-2019-2213": { + "cmt_msg": "binder: fix possible UAF when freeing buffer", + "cmt_id": "a4a3c070b8760f71c8311399fa9bfe67c8629bca" + } + }, + "4.14.137": { + "CVE-2019-1125": { + "cmt_msg": "x86/speculation: Prepare entry code for Spectre v1 swapgs mitigations", + "cmt_id": "83e6e48e70a133a5ea6167bf152ce2b274008b3d" + } + }, + "4.14.139": { + "CVE-2019-19536": { + "cmt_msg": "can: peak_usb: pcan_usb_pro: Fix info-leaks to USB devices", + "cmt_id": "dc741536d5d04065217a8402c52ad49df4cf134c" + }, + "CVE-2019-19535": { + "cmt_msg": "can: peak_usb: pcan_usb_fd: Fix info-leaks to USB devices", + "cmt_id": "15312ff709e6a5598a33edb3d31882951233d765" + }, + "CVE-2019-19531": { + "cmt_msg": "usb: yurex: Fix use-after-free in yurex_delete", + "cmt_id": "f0d684599b4f2525a6a7fe0cde8dff6800d16a22" + } + }, + "4.14.140": { + "CVE-2019-19537": { + "cmt_msg": "USB: core: Fix races in character device registration and deregistraion", + "cmt_id": "282a771475c2016ef77871f4438d9aaf9c8aa2b7" + }, + "CVE-2019-19527": { + "cmt_msg": "HID: hiddev: do cleanup in failure of opening a device", + "cmt_id": "d65ca54d05c209571cf2b3913277f75ab477e214" + }, + "CVE-2019-19530": { + "cmt_msg": "usb: cdc-acm: make sure a refcount is taken early enough", + "cmt_id": "e630f38040b5d2ecc56920742f7bafd57834cd2a" + } + }, + "4.14.141": { + "CVE-2019-15538": { + "cmt_msg": "xfs: fix missing ILOCK unlock when xfs_setattr_nonsize fails due to EDQUOT", + "cmt_id": "044d098441df8fabffba3b084a70beba0e77f8d4" + } + }, + "4.14.142": { + "CVE-2019-15118": { + "cmt_msg": "ALSA: usb-audio: Fix a stack buffer overflow bug in check_input_term", + "cmt_id": "6e1a602dfd51709538fc371d053708934909e3ba" + }, + "CVE-2019-15902": { + "cmt_msg": "unknown", + "cmt_id": "3a647417696217c5861a81ccfe5d2e6791d696ac" + }, + "CVE-2019-15117": { + "cmt_msg": "ALSA: usb-audio: Fix an OOB bug in parse_audio_mixer_unit", + "cmt_id": "96b0e80b6d5fb88c4f5b1e9d5224f2aa56395926" + } + }, + "4.14.144": { + "CVE-2019-14835": { + "cmt_msg": "vhost: make sure log_num < in_num", + "cmt_id": "7e9480b480a57fb4ef2e4d2c2cddbb1a31d56b33" + }, + "CVE-2019-15030": { + "cmt_msg": "powerpc/tm: Fix FP/VMX unavailable exceptions inside a transaction", + "cmt_id": "32b803e81ce17eec816f09d5388ef0a1cc9e4c2f" + } + }, + "4.14.146": { + "CVE-2019-14816": { + "cmt_msg": "mwifiex: Fix three heap overflow at parsing element in cfg80211_ap_settings", + "cmt_id": "a723f89aa82fd51f2fc2b8c71928324531b37215" + }, + "CVE-2019-14814": { + "cmt_msg": "mwifiex: Fix three heap overflow at parsing element in cfg80211_ap_settings", + "cmt_id": "a723f89aa82fd51f2fc2b8c71928324531b37215" + }, + "CVE-2019-14815": { + "cmt_msg": "mwifiex: Fix three heap overflow at parsing element in cfg80211_ap_settings", + "cmt_id": "a723f89aa82fd51f2fc2b8c71928324531b37215" + }, + "CVE-2019-15505": { + "cmt_msg": "media: technisat-usb2: break out of loop at end of buffer", + "cmt_id": "120d5674a14f5d641970bc4287a752e60415b17c" + }, + "CVE-2019-14821": { + "cmt_msg": "KVM: coalesced_mmio: add bounds checking", + "cmt_id": "bf81752d808cd31e18d9a8db6d92b73497aa48d2" + } + }, + "4.14.147": { + "CVE-2019-17056": { + "cmt_msg": "nfc: enforce CAP_NET_RAW for raw sockets", + "cmt_id": "b6a2d6c11272b3cf5d2d902bb9aaf7558560a5eb" + }, + "CVE-2019-17053": { + "cmt_msg": "ieee802154: enforce CAP_NET_RAW for raw sockets", + "cmt_id": "70f80cb205649c7350617ca79515b98419e90475" + }, + "CVE-2019-17052": { + "cmt_msg": "ax25: enforce CAP_NET_RAW for raw sockets", + "cmt_id": "6567debe7f9c0423e18a758060cc63ee69e2e7d0" + }, + "CVE-2019-19533": { + "cmt_msg": "media: ttusb-dec: Fix info-leak in ttusb_dec_send_command()", + "cmt_id": "580ee4a521ddc18aad5c750cc84bf43171599b29" + }, + "CVE-2019-17055": { + "cmt_msg": "mISDN: enforce CAP_NET_RAW for raw sockets", + "cmt_id": "371af137855d633d7c6226f659bbb6dcceb21322" + }, + "CVE-2019-17054": { + "cmt_msg": "appletalk: enforce CAP_NET_RAW for raw sockets", + "cmt_id": "272f46fe19daa1a18c0243cc8ac150e291ea51fd" + } + }, + "4.14.148": { + "CVE-2019-18806": { + "cmt_msg": "net: qlogic: Fix memory leak in ql_alloc_large_buffers", + "cmt_id": "dca8aabd7198e1aa7210ff2de081befba79d0d41" + } + }, + "4.14.149": { + "CVE-2019-19525": { + "cmt_msg": "ieee802154: atusb: fix use-after-free at disconnect", + "cmt_id": "481376cc2ccb32113a2492ed1f8de32b5c777b00" + }, + "CVE-2019-16746": { + "cmt_msg": "nl80211: validate beacon head", + "cmt_id": "01ec813e457954d8eeaf768d57d625752d245bc9" + } + }, + "4.14.150": { + "CVE-2018-20976": { + "cmt_msg": "xfs: clear sb->s_fs_info on mount failure", + "cmt_id": "6921174cd2fb5f2d0608770fe23056ab128b6d97" + }, + "CVE-2019-19523": { + "cmt_msg": "USB: adutux: fix use-after-free on disconnect", + "cmt_id": "b074263b69bc7683d5ac595cb135b4b5dfd04813" + }, + "CVE-2019-19528": { + "cmt_msg": "USB: iowarrior: fix use-after-free on disconnect", + "cmt_id": "10b0e388a18353d224ccf17cc46a57f1070abb2b" + } + }, + "4.14.151": { + "CVE-2019-19075": { + "cmt_msg": "ieee802154: ca8210: prevent memory leak", + "cmt_id": "0cafebaf5719dc84361e39f3f3874721ec95d1af" + }, + "CVE-2019-17075": { + "cmt_msg": "RDMA/cxgb4: Do not dma memory off of the stack", + "cmt_id": "1db19d6805d9dc5c79f8a19dddde324dbf0a33f9" + }, + "CVE-2019-17133": { + "cmt_msg": "cfg80211: wext: avoid copying malformed SSIDs", + "cmt_id": "63eb9c2849bc377c6bbf491f752c6cc6b9b75bca" + } + }, + "4.14.152": { + "CVE-2019-19065": { + "cmt_msg": "RDMA/hfi1: Prevent memory leak in sdma_init", + "cmt_id": "8f7b8f1d14d714181b35e69f4cb73f02ea8f0156" + }, + "CVE-2019-17666": { + "cmt_msg": "rtlwifi: Fix potential overflow on P2P code", + "cmt_id": "1b940dd55d42133791d7ba4841adfcf436fab98e" + }, + "CVE-2019-15099": { + "cmt_msg": "ath6kl: fix a NULL-ptr-deref bug in ath6kl_usb_alloc_urb_from_pipe()", + "cmt_id": "ce1dee3c1a88a534f561310f16e2eed3e686f28a" + }, + "CVE-2019-15098": { + "cmt_msg": "ath6kl: fix a NULL-ptr-deref bug in ath6kl_usb_alloc_urb_from_pipe()", + "cmt_id": "ce1dee3c1a88a534f561310f16e2eed3e686f28a" + }, + "CVE-2020-10773": { + "cmt_msg": "s390/cmm: fix information leak in cmm_timeout_handler()", + "cmt_id": "119e9aef452a6b6976d20dac8f35aa2dc3e01348" + }, + "CVE-2019-19526": { + "cmt_msg": "NFC: pn533: fix use-after-free and memleaks", + "cmt_id": "2a571bd399084762a67519f35ef586407fbd3cb2" + }, + "CVE-2019-19532": { + "cmt_msg": "HID: Fix assumption that devices have inputs", + "cmt_id": "e13a3d84494ca7b560551a9927231e7ecf27d96a" + } + }, + "4.14.153": { + "CVE-2019-18282": { + "cmt_msg": "net/flow_dissector: switch to siphash", + "cmt_id": "a9de6f42e945cdb24b59c7ab7ebad1eba6cb5875" + }, + "CVE-2019-19049": { + "cmt_msg": "of: unittest: fix memory leak in unittest_data_add", + "cmt_id": "9f4ca715dae36ff5b737d56165df1b7964a2cb3e" + } + }, + "4.14.154": { + "CVE-2019-19045": { + "cmt_msg": "net/mlx5: prevent memory leak in mlx5_fpga_conn_create_cq", + "cmt_id": "d905f0cea5e0f29b8aced5a38b1ce243051887de" + }, + "CVE-2019-19052": { + "cmt_msg": "can: gs_usb: gs_can_open(): prevent memory leak", + "cmt_id": "3f5e99731cd55f9be6468e9af7985a838ce7255b" + }, + "CVE-2018-12207": { + "cmt_msg": "kvm: x86, powerpc: do not allow clearing largepages debugfs entry", + "cmt_id": "82e77746f07db70367f66ef272256037d6415353" + }, + "CVE-2019-0155": { + "cmt_msg": "drm/i915: Rename gen7 cmdparser tables", + "cmt_id": "82e0caec38b8eb2ec4fa90b614ba02fc297faeb7" + }, + "CVE-2019-0154": { + "cmt_msg": "drm/i915: Lower RM timeout to avoid DSI hard hangs", + "cmt_id": "d302d64a90b0b390ead3f70832aac2662e34323b" + }, + "CVE-2019-19922": { + "cmt_msg": "sched/fair: Fix low cpu usage with high throttling by removing expiration of cpu-local slices", + "cmt_id": "3dec71e388f95382d83ebb5589f0016eac4a6d2b" + }, + "CVE-2019-19529": { + "cmt_msg": "can: mcba_usb: fix use-after-free on disconnect", + "cmt_id": "72e535208bc328e0617a8adb242bf8d89cdfd7d4" + }, + "CVE-2019-11135": { + "cmt_msg": "x86/msr: Add the IA32_TSX_CTRL MSR", + "cmt_id": "74bccd0ec712fdff716cec80ba1553d41bc887b8" + }, + "CVE-2019-16231": { + "cmt_msg": "fjes: Handle workqueue allocation failure", + "cmt_id": "81370ee55d9250e0744e09493186cb0e071dbcb2" + }, + "CVE-2019-19534": { + "cmt_msg": "can: peak_usb: fix slab info leak", + "cmt_id": "89a23a5d03956b44eac1a778806449577d690c6c" + } + }, + "4.14.155": { + "CVE-2019-19524": { + "cmt_msg": "Input: ff-memless - kill timer in destroy()", + "cmt_id": "5edab14154213a4b6bcc527f60adb6124034a0be" + } + }, + "4.14.157": { + "CVE-2019-18660": { + "cmt_msg": "powerpc/book3s64: Fix link stack flush on context switch", + "cmt_id": "bc06abfb2bc7e5856f997ebc57c361caa08cd961" + }, + "CVE-2019-15291": { + "cmt_msg": "media: b2c2-flexcop-usb: add sanity checking", + "cmt_id": "9a611c200ee2777bb3551ee1d979bf923b93653a" + }, + "CVE-2019-18683": { + "cmt_msg": "media: vivid: Fix wrong locking that causes race conditions on streaming stop", + "cmt_id": "4a2c9b037a08b8496f04a76987332ca6f19bd794" + } + }, + "4.14.158": { + "CVE-2019-12614": { + "cmt_msg": "powerpc/pseries/dlpar: Fix a missing check in dlpar_parse_cc_property()", + "cmt_id": "0583dc6fceb6b70cbd7e39802da41d8269fe82ac" + }, + "CVE-2019-19767": { + "cmt_msg": "ext4: add more paranoia checking in ext4_expand_extra_isize handling", + "cmt_id": "eb3257cba634f9a520467f6c8c56f4abfa347484" + } + }, + "4.14.159": { + "CVE-2019-19227": { + "cmt_msg": "appletalk: Fix potential NULL pointer dereference in unregister_snap_client", + "cmt_id": "39de8cc3678f5cd1f4e0ae274c20acabbd85a8b1" + }, + "CVE-2019-19062": { + "cmt_msg": "crypto: user - fix memory leak in crypto_report", + "cmt_id": "41b3b8e0775465c33083ce1998df7f15c039c9bf" + }, + "CVE-2019-19332": { + "cmt_msg": "KVM: x86: fix out-of-bounds write in KVM_GET_EMULATED_CPUID (CVE-2019-19332)", + "cmt_id": "f70609f898d63973388b36adf3650489311b13b9" + }, + "CVE-2019-19071": { + "cmt_msg": "rsi: release skb if rsi_prepare_beacon fails", + "cmt_id": "0d8b2921af273b9545e16ad21375fabcb647c56e" + }, + "CVE-2019-19447": { + "cmt_msg": "ext4: work around deleting a file with i_nlink == 0 safely", + "cmt_id": "d5a2955049171e48feba628e60f15206689bba94" + } + }, + "4.14.161": { + "CVE-2019-18786": { + "cmt_msg": "media: rcar_drif: fix a memory disclosure", + "cmt_id": "3feec89682118fad5139e745c3453a4cf8580ef0" + }, + "CVE-2019-19057": { + "cmt_msg": "mwifiex: pcie: Fix memory leak in mwifiex_pcie_init_evt_ring", + "cmt_id": "1cdafe368ec4ad7e878eddc30ea0d11a0f57b222" + }, + "CVE-2019-19063": { + "cmt_msg": "rtlwifi: prevent memory leak in rtl_usb_probe", + "cmt_id": "9c84ba30947a9d8ac2c67abaafc17087ead04426" + }, + "CVE-2020-0427": { + "cmt_msg": "pinctrl: devicetree: Avoid taking direct reference to device name string", + "cmt_id": "679c4f27b8958b65bb51d1c3dfdbf3befe4a33a3" + }, + "CVE-2019-20812": { + "cmt_msg": "af_packet: set defaule value for tmo", + "cmt_id": "665c9af8987880414e141e623bf7e6481d1c1696" + }, + "CVE-2019-16232": { + "cmt_msg": "libertas: fix a potential NULL pointer dereference", + "cmt_id": "b88d9f8b8ba5722ab4aef7d01c2a5a66b5414b83" + } + }, + "4.14.162": { + "CVE-2020-10690": { + "cmt_msg": "ptp: fix the race between the release of ptp_clock and cdev", + "cmt_id": "2dece4d6d13fe179ee3a5991811712725a56e2f7" + } + }, + "4.14.163": { + "CVE-2019-18809": { + "cmt_msg": "media: usb: fix memory leak in af9005_identify_state", + "cmt_id": "2d7c27957cac081eeacea7c38d8c9c59049883dc" + }, + "CVE-2019-19965": { + "cmt_msg": "scsi: libsas: stop discovering if oob mode is disconnected", + "cmt_id": "82df1d3fa11bc7b25789efa4232bf0c188c8bc72" + } + }, + "4.14.164": { + "CVE-2019-14901": { + "cmt_msg": "mwifiex: Fix heap overflow in mmwifiex_process_tdls_action_frame()", + "cmt_id": "ec3bb975c6013aa2f5e8a96a0bee2c8d39618e89" + }, + "CVE-2020-0430": { + "cmt_msg": "bpf: reject passing modified ctx to helper functions", + "cmt_id": "7fed98f4a1e6eb77a5d66ecfdf9345e21df6ac82" + } + }, + "4.14.165": { + "CVE-2019-14895": { + "cmt_msg": "mwifiex: fix possible heap overflow in mwifiex_process_country_ie()", + "cmt_id": "c2544fb30080aecc3fff99f2e97999ce8e625f45" + }, + "CVE-2020-0305": { + "cmt_msg": "chardev: Avoid potential use-after-free in 'chrdev_open()'", + "cmt_id": "c807f43500e14ed24599106745bb6005665f74d6" + }, + "CVE-2019-19066": { + "cmt_msg": "scsi: bfa: release allocated memory in case of error", + "cmt_id": "f4e8c78fad1294c785de5e92562862dbef1e9c1e" + }, + "CVE-2019-20636": { + "cmt_msg": "Input: add safety guards to input_set_keycode()", + "cmt_id": "af62c38b0f86539504dc5c0e5dcfc7613b1150a5" + }, + "CVE-2019-19068": { + "cmt_msg": "rtl8xxxu: prevent leaking urb", + "cmt_id": "32079b0c59f4620fdf7a5576af7502b0d05fcb01" + }, + "CVE-2020-0431": { + "cmt_msg": "HID: hid-input: clear unmapped usages", + "cmt_id": "cb0a3edf8d00740303e5b42e9c0e72d924fc23d2" + }, + "CVE-2019-14615": { + "cmt_msg": "drm/i915/gen9: Clear residual context state on context switch", + "cmt_id": "39465647eda707db7c7561006da3a8450ca634b9" + }, + "CVE-2019-19056": { + "cmt_msg": "mwifiex: pcie: Fix memory leak in mwifiex_pcie_alloc_cmdrsp_buf", + "cmt_id": "6ddbe82681d911534f460e6afd297fcf7f388049" + }, + "CVE-2019-19078": { + "cmt_msg": "ath10k: fix memory leak", + "cmt_id": "4af2276845448609264360e95973246f222a7d86" + } + }, + "4.14.166": { + "CVE-2019-20096": { + "cmt_msg": "dccp: Fix memleak in __feat_register_sp", + "cmt_id": "d0c15c1e8f9223552818fe5340b0427483b34f22" + }, + "CVE-2019-15217": { + "cmt_msg": "media: usb:zr364xx:Fix KASAN:null-ptr-deref Read in zr364xx_vidioc_querycap", + "cmt_id": "ffe76c896fbc91af8859aaea15b75b0b887960f3" + }, + "CVE-2019-19058": { + "cmt_msg": "iwlwifi: dbg_ini: fix memory leak in alloc_sgtable", + "cmt_id": "db1fb5a39747a680a4cc182c8bb4648b845a841f" + }, + "CVE-2018-21008": { + "cmt_msg": "rsi: add fix for crash during assertions", + "cmt_id": "ba8bbddaa188235df007411fdead5832f9e0cb59" + }, + "CVE-2019-2182": { + "cmt_msg": "arm64: Enforce BBM for huge IO/VMAP mappings", + "cmt_id": "68a066f6ff13e7029d54da9d322ad686694c7039" + }, + "CVE-2019-15918": { + "cmt_msg": "cifs: Fix lease buffer length error", + "cmt_id": "1059b758b6fb0fb6949b8c0474d5db27ea269b01" + }, + "CVE-2019-5108": { + "cmt_msg": "mac80211: Do not send Layer 2 Update frame before authorization", + "cmt_id": "57e1b5f6b55acb655358bd62c7e2f14d8af90e0a" + } + }, + "4.14.167": { + "CVE-2020-12652": { + "cmt_msg": "scsi: mptfusion: Fix double fetch bug in ioctl", + "cmt_id": "fedf64ea8f461ac51d9772998b277a30cbf8375e" + } + }, + "4.14.168": { + "CVE-2019-20806": { + "cmt_msg": "media: tw5864: Fix possible NULL pointer dereference in tw5864_handle_frame", + "cmt_id": "f4c8d9e5ea524d7f53e54da2920a7d1250822ec5" + } + }, + "4.14.169": { + "CVE-2019-14896": { + "cmt_msg": "libertas: Fix two buffer overflows at parsing bss descriptor", + "cmt_id": "5cdd9e0e7ee99caf59ad54fa833eeb6033386875" + }, + "CVE-2019-14897": { + "cmt_msg": "libertas: Fix two buffer overflows at parsing bss descriptor", + "cmt_id": "5cdd9e0e7ee99caf59ad54fa833eeb6033386875" + }, + "CVE-2020-14416": { + "cmt_msg": "can, slip: Protect tty->disc_data in write_wakeup and close with RCU", + "cmt_id": "c39c4e9116943faf30fb7fb9cc1e739c732b4443" + } + }, + "4.14.170": { + "CVE-2020-0432": { + "cmt_msg": "staging: most: net: fix buffer overflow", + "cmt_id": "6560fd66278fec045902010ff7b07878a13e501f" + }, + "CVE-2020-12769": { + "cmt_msg": "spi: spi-dw: Add lock protect dw_spi rx/tx to prevent concurrent calls", + "cmt_id": "b56f2a4a4327f609e30872e37eda6d73a6433ed2" + } + }, + "4.14.171": { + "CVE-2020-12653": { + "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_cmd_append_vsie_tlv()", + "cmt_id": "43e189049f32740c0d015f43a407658ac53d1743" + }, + "CVE-2020-12654": { + "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_ret_wmm_get_status()", + "cmt_id": "49e9f1057ef968af57a62860697898cb35246936" + }, + "CVE-2020-0404": { + "cmt_msg": "media: uvcvideo: Avoid cyclic entity chains due to malformed USB descriptors", + "cmt_id": "52f001bf9ba6d5fc628852dd6102a98f573e0b3b" + } + }, + "4.14.172": { + "CVE-2020-9383": { + "cmt_msg": "floppy: check FDC index for errors before assigning it", + "cmt_id": "e4c587650f64608fcd3506fa2cb47f81c0f88348" + }, + "CVE-2020-2732": { + "cmt_msg": "KVM: nVMX: Don't emulate instructions in guest mode", + "cmt_id": "ee1238c0285f40d8297e70f3aaa0d8a981ea0b53" + }, + "CVE-2019-16233": { + "cmt_msg": "scsi: qla2xxx: fix a potential NULL pointer dereference", + "cmt_id": "2011a54b6161cdeb42ec8d7843170977701f97b6" + }, + "CVE-2020-0009": { + "cmt_msg": "staging: android: ashmem: Disallow ashmem memory from being remapped", + "cmt_id": "60ba005bbf5751c2c58ca23ccfc9289ae06782b7" + }, + "CVE-2020-36558": { + "cmt_msg": "vt: vt_ioctl: fix race in VT_RESIZEX", + "cmt_id": "69931c044c9de837602cfd4bcfc28123ce4987e2" + } + }, + "4.14.173": { + "CVE-2020-8649": { + "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region", + "cmt_id": "1855aaccd74cb9528c24ceb6bc15358a411f65ff" + }, + "CVE-2020-8648": { + "cmt_msg": "vt: selection, close sel_buffer race", + "cmt_id": "432ef54c0444e7cab85a291347bfc1f69ee6257a" + }, + "CVE-2019-16234": { + "cmt_msg": "iwlwifi: pcie: fix rb_allocator workqueue allocation", + "cmt_id": "864ef06aaef5b164669a5292eb822c454c46dd69" + }, + "CVE-2020-8647": { + "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region", + "cmt_id": "1855aaccd74cb9528c24ceb6bc15358a411f65ff" + }, + "CVE-2020-10942": { + "cmt_msg": "vhost: Check docket sk_family instead of call getname", + "cmt_id": "ff8e12b0cfe277a54edbab525f068b39c7ed0de3" + }, + "CVE-2020-27068": { + "cmt_msg": "cfg80211: add missing policy for NL80211_ATTR_STATUS_CODE", + "cmt_id": "ffe09a48bd96094786c303f1cf29b32a29aa6dc8" + }, + "CVE-2020-0444": { + "cmt_msg": "audit: fix error handling in audit_data_to_entry()", + "cmt_id": "edde9fcd5f41b2e22e455250214de0c4b126b255" + }, + "CVE-2020-27418": { + "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region", + "cmt_id": "1855aaccd74cb9528c24ceb6bc15358a411f65ff" + } + }, + "4.14.174": { + "CVE-2020-29370": { + "cmt_msg": "mm: slub: add missing TID bump in kmem_cache_alloc_bulk()", + "cmt_id": "992a5c90af04da6e1e047f10c5ee5d6d8752a699" + } + }, + "4.14.175": { + "CVE-2020-36557": { + "cmt_msg": "vt: vt_ioctl: fix VT_DISALLOCATE freeing in-use virtual console", + "cmt_id": "b9eb60a0ef3971101c94f9cddb09708c2f900b35" + }, + "CVE-2020-14381": { + "cmt_msg": "futex: Fix inode life-time issue", + "cmt_id": "e52694b56eb6d4b1fe424bda6126b8ce13c246a8" + }, + "CVE-2020-11668": { + "cmt_msg": "media: xirlink_cit: add missing descriptor sanity checks", + "cmt_id": "e251c592321cb82e5f31b06542b2f1f6e81cb2b8" + }, + "CVE-2021-3715": { + "cmt_msg": "net_sched: cls_route: remove the right filter from hashtable", + "cmt_id": "f0c92f59cf528bc1b872f2ca91b01e128a2af3e6" + }, + "CVE-2020-27066": { + "cmt_msg": "xfrm: policy: Fix doulbe free in xfrm_policy_timer", + "cmt_id": "dc0ea9b710102ef628a26663d892031a2c381549" + }, + "CVE-2020-11608": { + "cmt_msg": "media: ov519: add missing endpoint sanity checks", + "cmt_id": "ea7d13d02a76c76dd3a0ee7bda97bb4361473b62" + }, + "CVE-2020-11609": { + "cmt_msg": "media: stv06xx: add missing descriptor sanity checks", + "cmt_id": "b4ac6fbe5b1a3cb83d84cb9f7ab8df71d104f535" + } + }, + "4.14.176": { + "CVE-2020-11494": { + "cmt_msg": "slcan: Don't transmit uninitialized stack data in padding", + "cmt_id": "d0a7c3373404bd931565f361802d320462fbe9f9" + }, + "CVE-2020-11565": { + "cmt_msg": "mm: mempolicy: require at least one nodeid for MPOL_PREFERRED", + "cmt_id": "c51609ac4c48d31a8881af669f1192d2ee405928" + }, + "CVE-2020-0433": { + "cmt_msg": "blk-mq: sync the update nr_hw_queues with blk_mq_queue_tag_busy_iter", + "cmt_id": "574eb136ec7f315c3ef2ca68fa9b3e16c56baa24" + } + }, + "4.14.177": { + "CVE-2020-12826": { + "cmt_msg": "signal: Extend exec_id to 64bits", + "cmt_id": "28c63ef17d620f0e95458c56c5d839ea3de3e500" + }, + "CVE-2020-12657": { + "cmt_msg": "block, bfq: fix use-after-free in bfq_idle_slice_timer_body", + "cmt_id": "f83b75ef20ac868046f90a7006b44bfea671a7c3" + }, + "CVE-2020-11669": { + "cmt_msg": "powerpc/powernv/idle: Restore AMR/UAMOR/AMOR after idle", + "cmt_id": "66a93f57330d3e172bf2c3da29f0501634bfac7a" + } + }, + "4.14.178": { + "CVE-2019-19319": { + "cmt_msg": "ext4: protect journal inode's blocks using block_validity", + "cmt_id": "795762468125a6412c089651e74f780bee154118" + }, + "CVE-2020-12114": { + "cmt_msg": "make struct mountpoint bear the dentry reference to mountpoint, not struct mount", + "cmt_id": "e21c8c03af20932c15d8b1d3bb9cbad9607a6eab" + }, + "CVE-2020-12464": { + "cmt_msg": "USB: core: Fix free-while-in-use bug in the USB S-Glibrary", + "cmt_id": "b49aa64f1d2526de71ae0354d37026e5861ccb4b" + } + }, + "4.14.179": { + "CVE-2020-10751": { + "cmt_msg": "selinux: properly handle multiple messages in selinux_netlink_send()", + "cmt_id": "90d4469b0aefac7695e48a641551f74a38f55613" + }, + "CVE-2020-0255": { + "cmt_msg": "selinux: properly handle multiple messages in selinux_netlink_send()", + "cmt_id": "90d4469b0aefac7695e48a641551f74a38f55613" + } + }, + "4.14.181": { + "CVE-2019-9245": { + "cmt_msg": "f2fs: sanity check of xattr entry size", + "cmt_id": "ec236cd6a254da2192c35a65fa0011a0268d66b7" + }, + "CVE-2020-10711": { + "cmt_msg": "netlabel: cope with NULL catmap", + "cmt_id": "0f5ae0f5b2675e4e703b980221976a1c2d79dba9" + }, + "CVE-2020-13143": { + "cmt_msg": "USB: gadget: fix illegal array access in binding with UDC", + "cmt_id": "3d1e9fbbfb888ef59697766561e982524c0a6a03" + }, + "CVE-2020-1749": { + "cmt_msg": "net: ipv6_stub: use ip6_dst_lookup_flow instead of ip6_dst_lookup", + "cmt_id": "8ab8786f78c3fc930f9abf6d6d85e95567de4e1f" + }, + "CVE-2020-27786": { + "cmt_msg": "ALSA: rawmidi: Fix racy buffer resize under concurrent accesses", + "cmt_id": "8645ac3684a70e4e8a21c7c407c07a1a4316beec" + }, + "CVE-2019-9453": { + "cmt_msg": "f2fs: fix to avoid accessing xattr across the boundary", + "cmt_id": "1d295b32df866ea09aa8cc94500ed6e96e2ea09e" + }, + "CVE-2020-0067": { + "cmt_msg": "f2fs: fix to avoid memory leakage in f2fs_listxattr", + "cmt_id": "ae811cecbbb231f11a84acaf74baca1283b964c7" + }, + "CVE-2019-19768": { + "cmt_msg": "blktrace: Protect q->blk_trace with RCU", + "cmt_id": "7a35c8cbf2522e4f45d266dca95dacc71cf412ed" + }, + "CVE-2020-12770": { + "cmt_msg": "scsi: sg: add sg_remove_request in sg_write", + "cmt_id": "3f743dd319951491d005ea51470e180f6df9125e" + } + }, + "4.14.182": { + "CVE-2021-0447": { + "cmt_msg": "l2tp: protect sock pointer of struct pppol2tp_session with RCU", + "cmt_id": "26f8819ddd10141ebe7bbce700fbab36bfa5f478" + } + }, + "4.14.183": { + "CVE-2020-10732": { + "cmt_msg": "fs/binfmt_elf.c: allocate initialized memory in fill_thread_core_info()", + "cmt_id": "61ce1733b30fdcf45e31308bc7795b6dc7f2ffba" + } + }, + "4.14.184": { + "CVE-2020-13974": { + "cmt_msg": "vt: keyboard: avoid signed integer overflow in k_ascii", + "cmt_id": "26079af52bf616bc492acc1fe41dce53fe199456" + }, + "CVE-2020-0543": { + "cmt_msg": "x86/cpu: Add 'table' argument to cpu_matches()", + "cmt_id": "9c98ba3f69b156c9fee72b71260d51f623a4a457" + }, + "CVE-2019-19462": { + "cmt_msg": "kernel/relay.c: handle alloc_percpu returning NULL in relay_open", + "cmt_id": "7821131c16cb2d32a5014009b50d362317418556" + }, + "CVE-2020-10757": { + "cmt_msg": "mm: Fix mremap not considering huge pmd devmap", + "cmt_id": "469ef673629d36d8ed5912b52f5d87ecc0309b3c" + } + }, + "4.14.185": { + "CVE-2019-20810": { + "cmt_msg": "media: go7007: fix a miss of snd_card_free", + "cmt_id": "033e86f47388583d460e1ea075fc4581d23c0fe1" + }, + "CVE-2018-20669": { + "cmt_msg": "make 'user_access_begin()' do 'access_ok()'", + "cmt_id": "b25df2918ba94ccc0ae44b4bb53f0f76a4bb0e96" + }, + "CVE-2020-29368": { + "cmt_msg": "mm: thp: make the THP mapcount atomic against __split_huge_pmd_locked()", + "cmt_id": "3b6c93db0a02b843694cf91f8bacd94f8e7259c8" + }, + "CVE-2020-10766": { + "cmt_msg": "x86/speculation: Prevent rogue cross-process SSBD shutdown", + "cmt_id": "d808ea8d0b4deaf6be37a58d41550df48f117a3a" + }, + "CVE-2020-10767": { + "cmt_msg": "x86/speculation: Avoid force-disabling IBPB based on STIBP and enhanced IBRS.", + "cmt_id": "b4eba1edf71e3ce882d79fd46d654770a7b277b0" + }, + "CVE-2020-10768": { + "cmt_msg": "x86/speculation: PR_SPEC_FORCE_DISABLE enforcement for indirect branches.", + "cmt_id": "96f1500aedc9ee67ad9614917d7c6e97bc7dbaa1" + } + }, + "4.14.186": { + "CVE-2020-12771": { + "cmt_msg": "bcache: fix potential deadlock problem in btree_gc_coalesce", + "cmt_id": "80d90125a3e1c98aafb6b13e62bd680fe9a4cd5a" + }, + "CVE-2020-15436": { + "cmt_msg": "block: Fix use-after-free in blkdev_get()", + "cmt_id": "a43abf15844c9e5de016957b8e612f447b7fb077" + } + }, + "4.14.187": { + "CVE-2020-12655": { + "cmt_msg": "xfs: add agf freeblocks verify in xfs_agf_verify", + "cmt_id": "115267e8d9fce8d5efe0949f1d2e5cee30441cf7" + } + }, + "4.14.188": { + "CVE-2020-24394": { + "cmt_msg": "nfsd: apply umask on fs without ACL support", + "cmt_id": "15fefb108c7af7ec8e19a88caed928d8b88120ff" + }, + "CVE-2020-15393": { + "cmt_msg": "usb: usbtest: fix missing kfree(dev->buf) in usbtest_disconnect", + "cmt_id": "4336374bc2220bf3c439b70c31d9e8f6f9583ea8" + } + }, + "4.14.189": { + "CVE-2020-14356": { + "cmt_msg": "cgroup: fix cgroup_sk_alloc() for sk_clone_lock()", + "cmt_id": "82fd2138a5ffd7e0d4320cdb669e115ee976a26e" + }, + "CVE-2020-10781": { + "cmt_msg": "Revert \"zram: convert remaining CLASS_ATTR() to CLASS_ATTR_RO()\"", + "cmt_id": "5cd9ec70b9f6431fc3e60075c01bc00f08c5606b" + } + }, + "4.14.190": { + "CVE-2020-15437": { + "cmt_msg": "serial: 8250: fix null-ptr-deref in serial8250_start_tx()", + "cmt_id": "c5760ab7aae09899412646e0cf842e23bea5b7a2" + } + }, + "4.14.191": { + "CVE-2018-10323": { + "cmt_msg": "xfs: set format back to extents if xfs_bmap_extents_to_btree", + "cmt_id": "8a443ffcf7b572c071398644d35cf9cc55cfa2cb" + } + }, + "4.14.192": { + "CVE-2019-19061": { + "cmt_msg": "iio: imu: adis16400: fix memory leak", + "cmt_id": "8d75cc141d702ebc280dde2b32b50cfdea3a02b3" + }, + "CVE-2019-9445": { + "cmt_msg": "f2fs: check if file namelen exceeds max value", + "cmt_id": "6a27f426266ac0d29faa95bed8934afeef1f9d13" + }, + "CVE-2019-19054": { + "cmt_msg": "media: rc: prevent memory leak in cx23888_ir_probe", + "cmt_id": "12273ec840cc67b2ec469ee5f5214559357436bb" + }, + "CVE-2018-8043": { + "cmt_msg": "net: phy: mdio-bcm-unimac: fix potential NULL dereference in unimac_mdio_probe()", + "cmt_id": "9e06953ee2a406c4bf4ff08c700d3ce1254974d1" + }, + "CVE-2019-18808": { + "cmt_msg": "crypto: ccp - Release all allocated memory if sha type is invalid", + "cmt_id": "a42f149865da48f25e5a49ca344dbcad61b66ae1" + }, + "CVE-2019-19074": { + "cmt_msg": "ath9k: release allocated buffer if timed out", + "cmt_id": "83c212df7794563a2f45a3be8fbc097e352b2c3a" + }, + "CVE-2019-19073": { + "cmt_msg": "ath9k_htc: release allocated buffer if timed out", + "cmt_id": "5502de13f91db625b063cb9d0793c7391f38452d" + }, + "CVE-2017-18232": { + "cmt_msg": "scsi: libsas: direct call probe and destruct", + "cmt_id": "3a156abd24346a3188eb7e88cf86386a409e0d02" + }, + "CVE-2019-3016": { + "cmt_msg": "x86/kvm: Be careful not to clear KVM_VCPU_FLUSH_TLB bit", + "cmt_id": "fd4a641bb5731c0ce5397698560a823602dbaac2" + } + }, + "4.14.193": { + "CVE-2020-16166": { + "cmt_msg": "random32: update the net random state on interrupt and activity", + "cmt_id": "583bcbc024f6bf8daa266f4f71b99e9d6e78c40b" + } + }, + "4.14.194": { + "CVE-2020-26088": { + "cmt_msg": "net/nfc/rawsock.c: add CAP_NET_RAW check.", + "cmt_id": "980415fffec6952602edac586eb8c3a7d3f50b43" + }, + "CVE-2020-36386": { + "cmt_msg": "Bluetooth: Fix slab-out-of-bounds read in hci_extended_inquiry_result_evt()", + "cmt_id": "d91299b8382b129156708708d69876e753b9ade6" + }, + "CVE-2019-19448": { + "cmt_msg": "btrfs: only search for left_info if there is no right_info in try_merge_free_space", + "cmt_id": "10742034076daea73acc17779e8f234060e03489" + }, + "CVE-2020-25212": { + "cmt_msg": "nfs: Fix getxattr kernel panic and memory overflow", + "cmt_id": "e4ddf4e58946c7dfe8568a21ee3d27b03d96bc56" + }, + "CVE-2020-14331": { + "cmt_msg": "vgacon: Fix for missing check in scrollback handling", + "cmt_id": "041a5a238a1e31992b5f22ef4f9792729d3b46ca" + } + }, + "4.14.195": { + "CVE-2020-14314": { + "cmt_msg": "ext4: fix potential negative array index in do_split()", + "cmt_id": "fbbfd55a40d5d0806b59ee0403c75d5ac517533f" + }, + "CVE-2020-29371": { + "cmt_msg": "romfs: fix uninitialized memory leak in romfs_dev_read()", + "cmt_id": "89346bc395e7bc0a7d3c36c824782050b17d4fec" + }, + "CVE-2020-0466": { + "cmt_msg": "do_epoll_ctl(): clean the failure exits up a bit", + "cmt_id": "6875d79ba740f47a480908cf9fa791715ea0e4f1" + } + }, + "4.14.196": { + "CVE-2020-36766": { + "cmt_msg": "cec-api: prevent leaking memory through hole in structure", + "cmt_id": "e6a62b5c4f7a05afec7ea4cfb040fb8512376259" + } + }, + "4.14.197": { + "CVE-2020-25285": { + "cmt_msg": "mm/hugetlb: fix a race between hugetlb sysctl handlers", + "cmt_id": "c4b219136040bc57e9704afee8f5c5a9430795a5" + }, + "CVE-2020-0465": { + "cmt_msg": "HID: core: Sanitize event code and type when mapping input", + "cmt_id": "a083dcdcfa2568747112edf865b3e848d70835e5" + }, + "CVE-2022-20565": { + "cmt_msg": "HID: core: Correctly handle ReportSize being zero", + "cmt_id": "9e5894b7e2229e6d89319864fb08304571fd44f7" + }, + "CVE-2020-25641": { + "cmt_msg": "block: allow for_each_bvec to support zero len bvec", + "cmt_id": "b7aae706e84ac271f755a574d6a18fc9b42e8e8f" + }, + "CVE-2021-1048": { + "cmt_msg": "fix regression in \"epoll: Keep a reference on files added to the check list\"", + "cmt_id": "c5c6e00f6cc5d3ed0d6464b14e33f2f5c8505888" + } + }, + "4.14.198": { + "CVE-2020-12888": { + "cmt_msg": "vfio-pci: Invalidate mmaps and block MMIO access on disabled memory", + "cmt_id": "1356c3e8539ac48b9362e60b1fa80ec06bb960ec" + } + }, + "4.14.199": { + "CVE-2020-25284": { + "cmt_msg": "rbd: require global CAP_SYS_ADMIN for mapping and unmapping", + "cmt_id": "af4a88994936474294b2f484be01117dc7550e68" + }, + "CVE-2020-14390": { + "cmt_msg": "fbcon: remove soft scrollback code", + "cmt_id": "6e2e0735dadecc1c1657e458e8f88e0ca6a4ec04" + }, + "CVE-2020-28097": { + "cmt_msg": "vgacon: remove software scrollback support", + "cmt_id": "34c050b531a72639e61a3be24b608604753f885a" + } + }, + "4.14.200": { + "CVE-2020-25645": { + "cmt_msg": "geneve: add transport ports in route lookup for geneve", + "cmt_id": "494648fc5286830b149bc1c1a059a827a45df3c8" + }, + "CVE-2021-0605": { + "cmt_msg": "af_key: pfkey_dump needs parameter validation", + "cmt_id": "05570d97443f8e569a79cf6e140f5ed96e6ac172" + }, + "CVE-2020-25643": { + "cmt_msg": "hdlc_ppp: add range checks in ppp_cp_parse_cr()", + "cmt_id": "8f0addb36dd1c61fe0f1a458a48b1a5ddc96aa24" + }, + "CVE-2020-36312": { + "cmt_msg": "KVM: fix memory leak in kvm_io_bus_unregister_dev()", + "cmt_id": "40a023f681befd9b2862a3c16fb306a38b359ae5" + } + }, + "4.14.201": { + "CVE-2020-14386": { + "cmt_msg": "net/packet: fix overflow in tpacket_rcv", + "cmt_id": "5b08356f184a0314d87f9a889be2ed9fef087691" + }, + "CVE-2020-25211": { + "cmt_msg": "netfilter: ctnetlink: add a range check for l3/l4 protonum", + "cmt_id": "60634d81cb43b19817b79a8a1d38e25e907e5ea1" + }, + "CVE-2021-0448": { + "cmt_msg": "netfilter: ctnetlink: add a range check for l3/l4 protonum", + "cmt_id": "60634d81cb43b19817b79a8a1d38e25e907e5ea1" + }, + "CVE-2021-39634": { + "cmt_msg": "epoll: do not insert into poll queues until all sanity checks are done", + "cmt_id": "23fb662b13e4f75688123e1d16aa7116f602db32" + }, + "CVE-2020-28915": { + "cmt_msg": "fbcon: Fix global-out-of-bounds read in fbcon_get_font()", + "cmt_id": "30386c13a1bfb0d1ce59ea83b825aa73bd516bc5" + } + }, + "4.14.202": { + "CVE-2020-10135": { + "cmt_msg": "Bluetooth: Consolidate encryption handling in hci_encrypt_cfm", + "cmt_id": "7c9748f455b9206b279a4710210c902cb1f275e2" + }, + "CVE-2020-12352": { + "cmt_msg": "Bluetooth: A2MP: Fix not initializing all members", + "cmt_id": "d53b1e94d08c032754a9aabeb3df309209c00347" + }, + "CVE-2020-12351": { + "cmt_msg": "Bluetooth: L2CAP: Fix calling sk_filter on non-socket based channel", + "cmt_id": "2acf87436517894275a804210caa33b9a08cf93c" + } + }, + "4.14.203": { + "CVE-2020-27784": { + "cmt_msg": "usb: gadget: function: printer: fix use-after-free in __lock_acquire", + "cmt_id": "d9fe88b2a38dc700bf5bd3a09c7cd11bbc248367" + }, + "CVE-2020-0423": { + "cmt_msg": "binder: fix UAF when releasing todo list", + "cmt_id": "d4c49b6733c3125c3cc71617399d22f5b8ff962f" + }, + "CVE-2020-25705": { + "cmt_msg": "icmp: randomize the global rate limiter", + "cmt_id": "e1b8b57623521b7f4974476a20bd6ff971fde6c4" + } + }, + "4.14.204": { + "CVE-2020-27777": { + "cmt_msg": "powerpc/rtas: Restrict RTAS requests from userspace", + "cmt_id": "818783bf8da5c20eb75a6bcf749eb97003ea9983" + }, + "CVE-2020-25668": { + "cmt_msg": "tty: make FONTX ioctl use the tty pointer they were actually passed", + "cmt_id": "0182d680ead968cea5673ed5dcac0e4505a75f29" + }, + "CVE-2020-25656": { + "cmt_msg": "vt: keyboard, extend func_buf_lock to readers", + "cmt_id": "7f4c966f2ad5f580fd5b1e2dcb19ba1c06a9254f" + } + }, + "4.14.205": { + "CVE-2019-0148": { + "cmt_msg": "i40e: Wrong truncation from u16 to u8", + "cmt_id": "9900bf4d433be6a2ed8c158779137c7a4742ab67" + }, + "CVE-2020-35508": { + "cmt_msg": "fork: fix copy_process(CLONE_PARENT) race with the exiting ->real_parent", + "cmt_id": "ee55b8c6bf4d59c7b82079b8a7d67597bb3a5539" + }, + "CVE-2019-0146": { + "cmt_msg": "i40e: add num_vectors checker in iwarp handler", + "cmt_id": "978c31f09d59cdd52cadc462f12862376e72f618" + }, + "CVE-2020-28974": { + "cmt_msg": "vt: Disable KD_FONT_OP_COPY", + "cmt_id": "9421bad22e9fb7f513d81ef8fec513c8a4850c0d" + }, + "CVE-2019-0147": { + "cmt_msg": "i40e: add num_vectors checker in iwarp handler", + "cmt_id": "978c31f09d59cdd52cadc462f12862376e72f618" + }, + "CVE-2019-19770": { + "cmt_msg": "blktrace: fix debugfs use after free", + "cmt_id": "8268f88785ca9476c68da06d1f93c3d0d9747d28" + }, + "CVE-2019-0145": { + "cmt_msg": "i40e: add num_vectors checker in iwarp handler", + "cmt_id": "978c31f09d59cdd52cadc462f12862376e72f618" + } + }, + "4.14.206": { + "CVE-2020-8694": { + "cmt_msg": "powercap: restrict energy meter to root access", + "cmt_id": "bab6310b64994ee6ca679d86c90ca24111783516" + } + }, + "4.14.207": { + "CVE-2020-14351": { + "cmt_msg": "perf/core: Fix race in the perf_mmap_close() function", + "cmt_id": "30c8324e9e7ee57b58af2501cb7db5d9d4f7b69b" + }, + "CVE-2020-27673": { + "cmt_msg": "xen/events: add a proper barrier to 2-level uevent unmasking", + "cmt_id": "025ea15db5665fa14d1c48e39aa788acaf30471b" + }, + "CVE-2020-27675": { + "cmt_msg": "xen/events: avoid removing an event channel while handling it", + "cmt_id": "b559da71974b5eb93311f7f475b2e4b16c0f9bb3" + }, + "CVE-2020-25704": { + "cmt_msg": "perf/core: Fix a memory leak in perf_event_parse_addr_filter()", + "cmt_id": "65c4000ccf7cc58a455977c5ec928525954058ac" + } + }, + "4.14.208": { + "CVE-2020-4788": { + "cmt_msg": "powerpc/64s: flush L1D on kernel entry", + "cmt_id": "db01cad9efe3c3838a6b3a3f68affd295c4b92d6" + }, + "CVE-2020-25669": { + "cmt_msg": "Input: sunkbd - avoid use-after-free in teardown paths", + "cmt_id": "436aff975718106d8e168fde69a3786962ca356e" + } + }, + "4.14.209": { + "CVE-2020-28941": { + "cmt_msg": "speakup: Do not let the line discipline be used several times", + "cmt_id": "e712cefb3699ea978611edb3c2a5d3acd57d4004" + } + }, + "4.14.210": { + "CVE-2019-19813": { + "cmt_msg": "btrfs: inode: Verify inode mode to avoid NULL pointer dereference", + "cmt_id": "3b68f5961224b7948004fd8a8e185867ecab7974" + }, + "CVE-2019-19816": { + "cmt_msg": "btrfs: inode: Verify inode mode to avoid NULL pointer dereference", + "cmt_id": "3b68f5961224b7948004fd8a8e185867ecab7974" + } + }, + "4.14.211": { + "CVE-2020-35519": { + "cmt_msg": "net/x25: prevent a couple of overflows", + "cmt_id": "f1fbbcb61d840792ae38bc4007160fc80c14ee90" + } + }, + "4.14.212": { + "CVE-2020-29661": { + "cmt_msg": "tty: Fix ->pgrp locking in tiocspgrp()", + "cmt_id": "882e038d2cd276163a8fc7bbeffda59ae0924471" + }, + "CVE-2020-29660": { + "cmt_msg": "tty: Fix ->session locking", + "cmt_id": "8deb3d9018400fab0a7401a910d3341053f5ec82" + }, + "CVE-2020-27830": { + "cmt_msg": "speakup: Reject setting the speakup line discipline outside of speakup", + "cmt_id": "bccd77063e971a006164968873f4c2918b7188e6" + } + }, + "4.14.213": { + "CVE-2020-27815": { + "cmt_msg": "jfs: Fix array index bounds check in dbAdjTree", + "cmt_id": "4a0809752ef23cd4be99b0cd8f7586c8ed7bd433" + }, + "CVE-2020-29568": { + "cmt_msg": "xen/xenbus: Allow watches discard events before queueing", + "cmt_id": "92d4ced9881361aefa2f7bc58dab19aa4d28ddf8" + }, + "CVE-2020-29569": { + "cmt_msg": "xen-blkback: set ring->xenblkd to NULL after kthread_stop()", + "cmt_id": "62afce1adda51bd9d033dbec1dfe413891021bae" + } + }, + "4.14.214": { + "CVE-2020-36158": { + "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_cmd_802_11_ad_hoc_start", + "cmt_id": "d367530330f7f638eecdfc724ae276546f1b1e68" + } + }, + "4.14.215": { + "CVE-2020-28374": { + "cmt_msg": "scsi: target: Fix XCOPY NAA identifier lookup", + "cmt_id": "c842ead67ae3cac58e84e7880153e68cccd59773" + }, + "CVE-2021-39648": { + "cmt_msg": "usb: gadget: configfs: Fix use-after-free issue with udc_name", + "cmt_id": "6766064c794afeacc29b21fc09ea4dbe3cae1af3" + } + }, + "4.14.217": { + "CVE-2021-3178": { + "cmt_msg": "nfsd4: readdirplus shouldn't return parent of export", + "cmt_id": "0f60f9d1e6182d9440614c13cdf6106e2d470f89" + }, + "CVE-2023-1390": { + "cmt_msg": "tipc: fix NULL deref in tipc_link_xmit()", + "cmt_id": "3ed0b5bb8cf71b4b9f995d4b3763648674fa032a" + } + }, + "4.14.218": { + "CVE-2020-27825": { + "cmt_msg": "tracing: Fix race in trace_open and buffer resize call", + "cmt_id": "fdb2310d58812b15f6b460509b43ff0b87e59367" + }, + "CVE-2021-39657": { + "cmt_msg": "scsi: ufs: Correct the LUN used in eh_device_reset_handler() callback", + "cmt_id": "30f2a89f9481f851bc68e51a1e7114392b052231" + } + }, + "4.14.219": { + "CVE-2021-3348": { + "cmt_msg": "nbd: freeze the queue while we're adding connections", + "cmt_id": "51359110d9d9b0231dc6a60716895104c73e7770" + } + }, + "4.14.222": { + "CVE-2021-26931": { + "cmt_msg": "xen-blkback: don't \"handle\" error by BUG()", + "cmt_id": "fd8ec8c708953323feb7c6177d894d39a23b08e4" + }, + "CVE-2021-26930": { + "cmt_msg": "xen-blkback: fix error handling in xen_blkbk_map()", + "cmt_id": "5571633988e02a1107720544a57ab4878c4446be" + }, + "CVE-2021-21781": { + "cmt_msg": "ARM: ensure the signal page contains defined contents", + "cmt_id": "b71cc506778eb283b752400e234784ee86b5891c" + }, + "CVE-2021-26932": { + "cmt_msg": "Xen/x86: don't bail early from clear_foreign_p2m_mapping()", + "cmt_id": "da2e2a5c88abfe0974b4b8575c798fcafb552fc9" + } + }, + "4.14.223": { + "CVE-2021-0512": { + "cmt_msg": "HID: make arrays usage and value to be the same", + "cmt_id": "00022873fdc1a304fd89016d227e3781f413dfbd" + }, + "CVE-2021-3612": { + "cmt_msg": "Input: joydev - prevent potential read overflow in ioctl", + "cmt_id": "d4b7440883871cbcaf6c1cd95a76048a86b005c7" + } + }, + "4.14.224": { + "CVE-2021-30002": { + "cmt_msg": "media: v4l: ioctl: Fix memory leak in video_usercopy", + "cmt_id": "d4daa80676bfa53359ae31e601105cbdefaf2554" + }, + "CVE-2021-27365": { + "cmt_msg": "scsi: iscsi: Ensure sysfs attributes are limited to PAGE_SIZE", + "cmt_id": "1a588b51ff984aadc027078125064807c5c7bc3f" + }, + "CVE-2021-27364": { + "cmt_msg": "scsi: iscsi: Restrict sessions and handles to admin capabilities", + "cmt_id": "6c6711c1a0cd2675f9c537c96bd70ecdd84c5d3e" + }, + "CVE-2021-27363": { + "cmt_msg": "scsi: iscsi: Restrict sessions and handles to admin capabilities", + "cmt_id": "6c6711c1a0cd2675f9c537c96bd70ecdd84c5d3e" + }, + "CVE-2021-28038": { + "cmt_msg": "Xen/gnttab: handle p2m update errors on a per-slot basis", + "cmt_id": "893a88ea0ee11a1f5e2279cad3c0ed7736187288" + } + }, + "4.14.226": { + "CVE-2019-19060": { + "cmt_msg": "iio: imu: adis16400: release allocated memory on failure", + "cmt_id": "593b7ff46bc064f2acac9ed6b7baa3189d2bcd90" + }, + "CVE-2021-33033": { + "cmt_msg": "cipso,calipso: resolve a number of problems with the DOI refcounts", + "cmt_id": "ab44f7317c16ddcf9ee12ba2aca60771266c2dc6" + }, + "CVE-2021-29265": { + "cmt_msg": "usbip: fix stub_dev usbip_sockfd_store() races leading to gpf", + "cmt_id": "04f879ba79b056041972122c1dc597b79d2464e5" + }, + "CVE-2021-28660": { + "cmt_msg": "staging: rtl8188eu: prevent ->ssid overflow in rtw_wx_set_scan()", + "cmt_id": "33cdc63f0e07abf637ba326b6016731be958088d" + } + }, + "4.14.227": { + "CVE-2021-28964": { + "cmt_msg": "btrfs: fix race when cloning extent buffer during rewind of an old root", + "cmt_id": "0fbf41006d8c850963049c35563e7775fe7c2164" + }, + "CVE-2021-28972": { + "cmt_msg": "PCI: rpadlpar: Fix potential drc_name corruption in store functions", + "cmt_id": "6d7724c9c507d5b526991dcdef861c6b28c45eb2" + }, + "CVE-2021-28971": { + "cmt_msg": "perf/x86/intel: Fix a crash caused by zero PEBS status", + "cmt_id": "403fdabcc1bcd0d31f9fcb9b9b2e831214ab2192" + } + }, + "4.14.228": { + "CVE-2021-28688": { + "cmt_msg": "xen-blkback: don't leak persistent grants from xen_blkbk_map()", + "cmt_id": "db108b67d81397cdbaf3f91aeca6e5eb5f71de1d" + }, + "CVE-2021-29647": { + "cmt_msg": "net: qrtr: fix a kernel-infoleak in qrtr_recvmsg()", + "cmt_id": "749d2e33bfbacb3112cbfaafde75e507cb46c67d" + }, + "CVE-2021-31916": { + "cmt_msg": "dm ioctl: fix out of bounds array access when no devices", + "cmt_id": "ba73e621ced58ff4ad1020a140ccb5843da1cb26" + } + }, + "4.14.229": { + "CVE-2021-0941": { + "cmt_msg": "bpf: Remove MTU check in __bpf_skb_max_len", + "cmt_id": "64cf6c3156a5cbd9c29f54370b801b336d2f7894" + }, + "CVE-2021-3483": { + "cmt_msg": "firewire: nosy: Fix a use-after-free bug in nosy_ioctl()", + "cmt_id": "8aa6e548a5ee59c91e9e5d67fd6de5cbaa5c458a" + } + }, + "4.14.230": { + "CVE-2021-29154": { + "cmt_msg": "bpf, x86: Validate computation of branch displacements for x86-64", + "cmt_id": "32f9a870ab6b1f72f100e9db55b8a022072f78a6" + } + }, + "4.14.231": { + "CVE-2021-3659": { + "cmt_msg": "net: mac802154: Fix general protection fault", + "cmt_id": "d103fd20f0539e2bd615ed6f6159537cb7e2c5ba" + }, + "CVE-2021-0937": { + "cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write", + "cmt_id": "522a0191944e3db9c30ade5fa6b6ec0d7c42f40d" + }, + "CVE-2020-25672": { + "cmt_msg": "nfc: fix memory leak in llcp_sock_connect()", + "cmt_id": "02b99cae71335f9f38d0a164ffe3a7a1328f44fc" + }, + "CVE-2020-25673": { + "cmt_msg": "nfc: Avoid endless loops caused by repeated llcp_sock_connect()", + "cmt_id": "892e1f065c1b3c99a12a1a41683f9ddbc22abb3e" + }, + "CVE-2020-25670": { + "cmt_msg": "nfc: fix refcount leak in llcp_sock_bind()", + "cmt_id": "538a6ff11516d38a61e237d2d2dc04c30c845fbe" + }, + "CVE-2020-25671": { + "cmt_msg": "nfc: fix refcount leak in llcp_sock_connect()", + "cmt_id": "b1d5c07a3b597766bbf5bf61083cd65e72034144" + }, + "CVE-2021-22555": { + "cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write", + "cmt_id": "522a0191944e3db9c30ade5fa6b6ec0d7c42f40d" + } + }, + "4.14.232": { + "CVE-2021-46915": { + "cmt_msg": "netfilter: nft_limit: avoid possible divide error in nft_limit_init", + "cmt_id": "9065ccb9ec92c5120e7e97958397ebdb454f23d6" + }, + "CVE-2021-46904": { + "cmt_msg": "net: hso: fix null-ptr-deref during tty device unregistration", + "cmt_id": "caf5ac93b3b5d5fac032fc11fbea680e115421b4" + }, + "CVE-2020-29374": { + "cmt_msg": "gup: document and work around \"COW can break either way\" issue", + "cmt_id": "407faed92b4a4e2ad900d61ea3831dd597640f29" + }, + "CVE-2021-23133": { + "cmt_msg": "net/sctp: fix race condition in sctp_destroy_sock", + "cmt_id": "54b63c76b9bb95fba20cd268086ee448f87208c6" + }, + "CVE-2021-46909": { + "cmt_msg": "ARM: footbridge: fix PCI interrupt mapping", + "cmt_id": "532747fd5c7aaa17ee5cf79f3e947c31eb0e35cf" + } + }, + "4.14.233": { + "CVE-2020-36777": { + "cmt_msg": "media: dvbdev: Fix memory leak in dvb_media_device_free()", + "cmt_id": "32168ca1f123316848fffb85d059860adf3c409f" + }, + "CVE-2021-4157": { + "cmt_msg": "pNFS/flexfiles: fix incorrect size check in decode_nfs_fh()", + "cmt_id": "40286f0852d2ecfa713438199557c706dc6a8db3" + }, + "CVE-2021-46953": { + "cmt_msg": "ACPI: GTDT: Don't corrupt interrupt mappings on watchdow probe failure", + "cmt_id": "c3385a9122f8db15b453e07bfc88117fce7f3724" + }, + "CVE-2021-32399": { + "cmt_msg": "bluetooth: eliminate the potential race condition when removing the HCI controller", + "cmt_id": "40acc1aa3e2a705a3c2ed171ed563ef04f7ba19e" + }, + "CVE-2021-46950": { + "cmt_msg": "md/raid1: properly indicate failure when ending a failed write request", + "cmt_id": "12216d0919b64ee2ea5dc7a50e455670f44383d5" + }, + "CVE-2021-47056": { + "cmt_msg": "crypto: qat - ADF_STATUS_PF_RUNNING should be set after adf_dev_init", + "cmt_id": "446045cf682af12d9294765f6c46084b374b5654" + }, + "CVE-2021-46939": { + "cmt_msg": "tracing: Restructure trace_clock_global() to never block", + "cmt_id": "1fca00920327be96f3318224f502e4d5460f9545" + }, + "CVE-2021-46938": { + "cmt_msg": "dm rq: fix double free of blk_mq_tag_set in dev remove after table load fails", + "cmt_id": "b42c0a33dfdd451d9be62dd5de58c39f2750b6e3" + }, + "CVE-2021-33034": { + "cmt_msg": "Bluetooth: verify AMP hci_chan before amp_destroy", + "cmt_id": "21f6aee6682a1f7415e23f96ce94ff387d9cdb2e" + }, + "CVE-2021-47013": { + "cmt_msg": "net:emac/emac-mac: Fix a use after free in emac_mac_tx_buf_send", + "cmt_id": "dc1b438a35773d030be0ee80d9c635c3e558a322" + }, + "CVE-2021-47006": { + "cmt_msg": "ARM: 9064/1: hw_breakpoint: Do not directly check the event's overflow_handler hook", + "cmt_id": "ed1f67465327cec4457bb988775245b199da86e6" + }, + "CVE-2021-46992": { + "cmt_msg": "netfilter: nftables: avoid overflows in nft_hash_buckets()", + "cmt_id": "2824cafc6a93792d9ad85939c499161214d84c4b" + }, + "CVE-2021-47054": { + "cmt_msg": "bus: qcom: Put child node before return", + "cmt_id": "94810fc52925eb122a922df7f9966cf3f4ba7391" + }, + "CVE-2021-46960": { + "cmt_msg": "cifs: Return correct error code from smb2_get_enc_key", + "cmt_id": "e94851629c49c65b4fbb29a5725ddfd7988f8f20" + }, + "CVE-2021-46988": { + "cmt_msg": "userfaultfd: release page in error path to avoid BUG_ON", + "cmt_id": "319116227e52d49eee671f0aa278bac89b3c1b69" + } + }, + "4.14.234": { + "CVE-2021-47078": { + "cmt_msg": "RDMA/rxe: Clear all QP fields if creation failed", + "cmt_id": "6a8086a42dfbf548a42bf2ae4faa291645c72c66" + }, + "CVE-2020-26558": { + "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical", + "cmt_id": "4555cee33f7d75c1ee69902c872c9d1e9568ebd5" + }, + "CVE-2021-0129": { + "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical", + "cmt_id": "4555cee33f7d75c1ee69902c872c9d1e9568ebd5" + }, + "CVE-2020-26555": { + "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical", + "cmt_id": "4555cee33f7d75c1ee69902c872c9d1e9568ebd5" + } + }, + "4.14.235": { + "CVE-2021-47166": { + "cmt_msg": "NFS: Don't corrupt the value of pg_bytes_written in nfs_do_recoalesce()", + "cmt_id": "c757c1f1e65d89429db1409429436cf40d47c008" + }, + "CVE-2021-47165": { + "cmt_msg": "drm/meson: fix shutdown crash when component not probed", + "cmt_id": "b4298d33c1fcce511ffe84d8d3de07e220300f9b" + }, + "CVE-2021-47149": { + "cmt_msg": "net: fujitsu: fix potential null-ptr-deref", + "cmt_id": "c4f1c23edbe921ab2ecd6140d700e756cd44c5f7" + }, + "CVE-2021-47162": { + "cmt_msg": "tipc: skb_linearize the head skb when reassembling msgs", + "cmt_id": "436d650d374329a591c30339a91fa5078052ed1e" + }, + "CVE-2021-47145": { + "cmt_msg": "btrfs: do not BUG_ON in link_to_fixup_dir", + "cmt_id": "0eaf383c6a4a83c09f60fd07a1bea9f1a9181611" + }, + "CVE-2021-47146": { + "cmt_msg": "mld: fix panic in mld_newpack()", + "cmt_id": "221142038f36d9f28b64e83e954774da4d4ccd17" + }, + "CVE-2021-47169": { + "cmt_msg": "serial: rp2: use 'request_firmware' instead of 'request_firmware_nowait'", + "cmt_id": "1cc57cb32c84e059bd158494f746b665fc14d1b1" + }, + "CVE-2021-47168": { + "cmt_msg": "NFS: fix an incorrect limit in filelayout_decode_layout()", + "cmt_id": "f299522eda1566cbfbae4b15c82970fc41b03714" + }, + "CVE-2021-33098": { + "cmt_msg": "ixgbe: fix large MTU request from VF", + "cmt_id": "5217f9cab7dd28e9c7626cd795e51da98ecb2af4" + }, + "CVE-2020-24587": { + "cmt_msg": "mac80211: prevent mixed key and fragment cache attacks", + "cmt_id": "f643397142c196d3ac653b2df32997dad991cb29" + }, + "CVE-2020-24586": { + "cmt_msg": "mac80211: prevent mixed key and fragment cache attacks", + "cmt_id": "f643397142c196d3ac653b2df32997dad991cb29" + }, + "CVE-2020-24588": { + "cmt_msg": "cfg80211: mitigate A-MSDU aggregation attacks", + "cmt_id": "a3558e1b75fefb2299659ee0070ee917927d9220" + }, + "CVE-2020-26147": { + "cmt_msg": "mac80211: assure all fragments are encrypted", + "cmt_id": "c39f180c7bd8379de238a4fd4a2f7515e03802f8" + }, + "CVE-2021-47142": { + "cmt_msg": "drm/amdgpu: Fix a use-after-free", + "cmt_id": "952ab3f9f48eb0e8050596d41951cf516be6b122" + }, + "CVE-2021-47179": { + "cmt_msg": "NFSv4: Fix a NULL pointer dereference in pnfs_mark_matching_lsegs_return()", + "cmt_id": "42637ca25c7d7b5a92804a679af5192e8c1a9f48" + }, + "CVE-2021-47180": { + "cmt_msg": "NFC: nci: fix memory leak in nci_allocate_device", + "cmt_id": "2c2fb2df46ea866b49fea5ec7112ec3cd4896c74" + }, + "CVE-2021-47171": { + "cmt_msg": "net: usb: fix memory leak in smsc75xx_bind", + "cmt_id": "9e6b8c1ff9d997e1fa16cbd2d60739adf6dc1bbc" + }, + "CVE-2021-47173": { + "cmt_msg": "misc/uss720: fix memory leak in uss720_probe", + "cmt_id": "bcb30cc8f8befcbdbcf7a016e4dfd4747c54a364" + }, + "CVE-2021-47153": { + "cmt_msg": "i2c: i801: Don't generate an interrupt on bus reset", + "cmt_id": "dfa8929e117b0228a7765f5c3f5988a4a028f3c6" + }, + "CVE-2021-47177": { + "cmt_msg": "iommu/vt-d: Fix sysfs leak in alloc_iommu()", + "cmt_id": "22da9f4978381a99f1abaeaf6c9b83be6ab5ddd8" + }, + "CVE-2021-34981": { + "cmt_msg": "Bluetooth: cmtp: fix file refcount when cmtp_attach_device fails", + "cmt_id": "6f6ac2a7959b1864886d07fcf3b9cec587dfe635" + }, + "CVE-2020-26139": { + "cmt_msg": "mac80211: do not accept/forward invalid EAPOL frames", + "cmt_id": "557bb37533a365f9d8a0093ecce29417da4b9228" + }, + "CVE-2021-29650": { + "cmt_msg": "netfilter: x_tables: Use correct memory barriers.", + "cmt_id": "f1fd7a174018f1107881150c6c2ce00e49a1e643" + } + }, + "4.14.236": { + "CVE-2021-3573": { + "cmt_msg": "Bluetooth: use correct lock to prevent UAF of hdev object", + "cmt_id": "88481ea480756644b5221648216bb67866e51391" + }, + "CVE-2021-47122": { + "cmt_msg": "net: caif: fix memory leak in caif_device_notify", + "cmt_id": "4bca2034b41c15b62d47a19158bb76235fd4455d" + }, + "CVE-2021-47121": { + "cmt_msg": "net: caif: fix memory leak in cfusbl_device_notify", + "cmt_id": "e8b37f5009ea7095529790f022859711e6939c76" + }, + "CVE-2021-3564": { + "cmt_msg": "Bluetooth: fix the erroneous flush_work() order", + "cmt_id": "fa7d2874963312030d9618541b9bc2e549e19ac1" + }, + "CVE-2021-47117": { + "cmt_msg": "ext4: fix bug on in ext4_es_cache_extent as ext4_split_extent_at failed", + "cmt_id": "d8116743ef5432336289256b2f7c117299213eb9" + }, + "CVE-2021-47114": { + "cmt_msg": "ocfs2: fix data corruption by fallocate", + "cmt_id": "a1700479524bb9cb5e8ae720236a6fabd003acae" + }, + "CVE-2021-47118": { + "cmt_msg": "pid: take a reference when initializing `cad_pid`", + "cmt_id": "4dbd8808a591b49b717862e6e0081bcf14a87788" + }, + "CVE-2021-38208": { + "cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect", + "cmt_id": "ffff05b9ee5c74c04bba2801c1f99b31975d74d9" + }, + "CVE-2021-3587": { + "cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect", + "cmt_id": "ffff05b9ee5c74c04bba2801c1f99b31975d74d9" + } + }, + "4.14.238": { + "CVE-2021-34693": { + "cmt_msg": "can: bcm: fix infoleak in struct bcm_msg_head", + "cmt_id": "4fa028860bb1656f370851c2c26de15fc67da300" + }, + "CVE-2021-46906": { + "cmt_msg": "HID: usbhid: fix info leak in hid_submit_ctrl", + "cmt_id": "8c064eece9a51856f3f275104520c7e3017fc5c0" + }, + "CVE-2021-45486": { + "cmt_msg": "inet: use bigger hash table for IP ID generation", + "cmt_id": "3ba51ed2c3ac36aa947d0b250d318de6ed7cf552" + } + }, + "4.14.240": { + "CVE-2021-45485": { + "cmt_msg": "ipv6: use prandom_u32() for ID generation", + "cmt_id": "4b55d7b3106a410cdab4ea60f5e55ca0668c6a09" + }, + "CVE-2021-3655": { + "cmt_msg": "sctp: validate from_addr_param return", + "cmt_id": "f01bfaea62d14938ff2fbeaf67f0afec2ec64ab9" + }, + "CVE-2023-28772": { + "cmt_msg": "seq_buf: Fix overflow in seq_buf_putmem_hex()", + "cmt_id": "50b51460f59acbd403475510ad423bb5ea7a4c97" + }, + "CVE-2021-3609": { + "cmt_msg": "can: bcm: delay release of struct bcm_op after synchronize_rcu()", + "cmt_id": "630f13442f1472abe5013ef98f76a3bbca64dd80" + }, + "CVE-2022-0850": { + "cmt_msg": "ext4: fix kernel infoleak via ext4_extent_header", + "cmt_id": "29d882f9a6a6219a1c59729e1f43fa40663903e4" + }, + "CVE-2021-33909": { + "cmt_msg": "seq_file: disallow extremely large seq buffer allocations", + "cmt_id": "3c07d1335d17ae0411101024de438dbc3734e992" + }, + "CVE-2021-38160": { + "cmt_msg": "virtio_console: Assure used length from device is limited", + "cmt_id": "56cf748562d3cbfd33d1ba2eb4a7603a5e20da88" + } + }, + "4.14.241": { + "CVE-2021-38204": { + "cmt_msg": "usb: max-3421: Prevent corruption of freed memory", + "cmt_id": "edddc79c4391f8001095320d3ca423214b9aa4bf" + }, + "CVE-2021-3679": { + "cmt_msg": "tracing: Fix bug in rb_per_cpu_empty() that might cause deadloop.", + "cmt_id": "76598512d5d7fc407c319ca4448cf5348b65058a" + }, + "CVE-2021-37576": { + "cmt_msg": "KVM: PPC: Book3S: Fix H_RTAS rets buffer overflow", + "cmt_id": "b67a821813c7b8160b54d83928281fec84a42d88" + }, + "CVE-2021-47161": { + "cmt_msg": "spi: spi-fsl-dspi: Fix a resource leak in an error handling path", + "cmt_id": "10a089bae827ec30ad9b6cb7048020a62fae0cfa" + } + }, + "4.14.242": { + "CVE-2021-0920": { + "cmt_msg": "af_unix: fix garbage collect vs MSG_PEEK", + "cmt_id": "af3e2b87b36100c28feb71da52c57293c4540690" + } + }, + "4.14.243": { + "CVE-2021-22543": { + "cmt_msg": "KVM: do not allow mapping valid but non-reference-counted pages", + "cmt_id": "46d75ff2c1beebe90e7af8887256d8f0323679e4" + } + }, + "4.14.244": { + "CVE-2021-38205": { + "cmt_msg": "net: xilinx_emaclite: Do not print real IOMEM pointer", + "cmt_id": "1994eacac7af52da86e4b0cb6ae61621bef7393f" + }, + "CVE-2021-3732": { + "cmt_msg": "ovl: prevent private clone if bind mount is not allowed", + "cmt_id": "517b875dfbf58f0c6c9e32dc90f5cf42d71a42ce" + } + }, + "4.14.245": { + "CVE-2021-42008": { + "cmt_msg": "net: 6pack: fix slab-out-of-bounds in decode_data", + "cmt_id": "5e0e782874ad03ae6d47d3e55aff378da0b51104" + }, + "CVE-2021-3653": { + "cmt_msg": "KVM: nSVM: avoid picking up unsupported bits from L2 in int_ctl (CVE-2021-3653)", + "cmt_id": "26af47bdc45e454877f15fa7658a167bb9799681" + }, + "CVE-2021-3656": { + "cmt_msg": "KVM: nSVM: always intercept VMLOAD/VMSAVE when nested (CVE-2021-3656)", + "cmt_id": "6ed198381ed2496fbc82214108e56a441d3b0213" + }, + "CVE-2020-3702": { + "cmt_msg": "ath: Use safer key clearing with key cache entries", + "cmt_id": "2cbb22fd4b4fb4d0822d185bf5bd6d027107bfda" + } + }, + "4.14.246": { + "CVE-2021-38198": { + "cmt_msg": "KVM: X86: MMU: Use the correct inherited permissions to get shadow page", + "cmt_id": "cea9e8ee3b8059bd2b36d68f1f428d165e5d13ce" + }, + "CVE-2021-39633": { + "cmt_msg": "ip_gre: add validation for csum_start", + "cmt_id": "99279223a37b46dc7716ec4e0ed4b3e03f1cfa4c" + }, + "CVE-2021-3753": { + "cmt_msg": "vt_kdsetmode: extend console locking", + "cmt_id": "3f488313d96fc6512a4a0fe3ed56cce92cbeec94" + } + }, + "4.14.247": { + "CVE-2022-20141": { + "cmt_msg": "igmp: Add ip_mc_list lock in ip_check_mc_rcu", + "cmt_id": "78967749984cf3614de346c90f3e259ff8272735" + }, + "CVE-2021-42252": { + "cmt_msg": "soc: aspeed: lpc-ctrl: Fix boundary check for mmap", + "cmt_id": "b1b55e4073d3da6119ecc41636a2994b67a2be37" + }, + "CVE-2021-40490": { + "cmt_msg": "ext4: fix race writing to an inline_data file while its xattrs are changing", + "cmt_id": "9569234645f102025aaf0fc83d3dcbf1b8cbf2dc" + } + }, + "4.14.248": { + "CVE-2021-20320": { + "cmt_msg": "s390/bpf: Fix optimizing out zero-extensions", + "cmt_id": "daf48f68fca9040b542282a5cd17397af316dd89" + } + }, + "4.14.249": { + "CVE-2021-3764": { + "cmt_msg": "crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd()", + "cmt_id": "3707e37b3fcef4d5e9a81b9c2c48ba7248051c2a" + }, + "CVE-2021-4203": { + "cmt_msg": "af_unix: fix races in sk_peer_pid and sk_peer_cred accesses", + "cmt_id": "9d76f723256d68eea16f0c563fc80b3c14258634" + }, + "CVE-2021-3744": { + "cmt_msg": "crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd()", + "cmt_id": "3707e37b3fcef4d5e9a81b9c2c48ba7248051c2a" + }, + "CVE-2021-37159": { + "cmt_msg": "usb: hso: fix error handling code of hso_create_net_device", + "cmt_id": "4c0db9c4b3701c29f47bac0721e2f7d2b15d8edb" + } + }, + "4.14.250": { + "CVE-2021-20317": { + "cmt_msg": "lib/timerqueue: Rely on rbtree semantics for next timer", + "cmt_id": "0135fcb86a0bc9e4484f7e1228cadcc343c5edef" + } + }, + "4.14.251": { + "CVE-2021-20321": { + "cmt_msg": "ovl: fix missing negative dentry check in ovl_rename()", + "cmt_id": "1caaa820915d802328bc72e4de0d5b1629eab5da" + }, + "CVE-2021-41864": { + "cmt_msg": "bpf: Fix integer overflow in prealloc_elems_and_freelist()", + "cmt_id": "f34bcd10c4832d491049905d25ea3f46a410c426" + }, + "CVE-2021-38300": { + "cmt_msg": "bpf, mips: Validate conditional branch offsets", + "cmt_id": "3401bca8827ba4918b3d582bd2c27708d4b133fe" + } + }, + "4.14.252": { + "CVE-2021-3894": { + "cmt_msg": "sctp: account stream padding length for reconf chunk", + "cmt_id": "41f0bcc7d9eac315259d4e9fb441552f60e8ec9e" + }, + "CVE-2022-0322": { + "cmt_msg": "sctp: account stream padding length for reconf chunk", + "cmt_id": "41f0bcc7d9eac315259d4e9fb441552f60e8ec9e" + } + }, + "4.14.253": { + "CVE-2021-3896": { + "cmt_msg": "isdn: cpai: check ctr->cnr to avoid array index out of bound", + "cmt_id": "9b6b2db77bc3121fe435f1d4b56e34de443bec75" + }, + "CVE-2022-0644": { + "cmt_msg": "vfs: check fd has read access in kernel_read_file_from_fd()", + "cmt_id": "aaa5e83805b09c7ed24c06227321575278e3de1d" + }, + "CVE-2021-3760": { + "cmt_msg": "nfc: nci: fix the UAF of rf_conn_info object", + "cmt_id": "a2efe3df65359add2164740a5777c26e64dd594b" + }, + "CVE-2021-43389": { + "cmt_msg": "isdn: cpai: check ctr->cnr to avoid array index out of bound", + "cmt_id": "9b6b2db77bc3121fe435f1d4b56e34de443bec75" + } + }, + "4.14.254": { + "CVE-2021-3772": { + "cmt_msg": "sctp: use init_tag from inithdr for ABORT chunk", + "cmt_id": "82ad781d98040b4a5eea4eeb9a5acdd200a420c6" + } + }, + "4.14.255": { + "CVE-2021-42739": { + "cmt_msg": "media: firewire: firedtv-avc: fix a buffer overflow in avc_ca_pmt()", + "cmt_id": "8d6c05da808f8351db844b69a9d6ce7f295214bb" + } + }, + "4.14.256": { + "CVE-2021-4202": { + "cmt_msg": "NFC: reorganize the functions in nci_request", + "cmt_id": "6e2944d8bbc58682691438b57620491b5a4b7cfb" + }, + "CVE-2021-39686": { + "cmt_msg": "binder: use euid from cred instead of using task", + "cmt_id": "8989da231b3b989e48d885d61345fe290114b648" + }, + "CVE-2023-0047": { + "cmt_msg": "mm, oom: do not trigger out_of_memory from the #PF", + "cmt_id": "bed55513692e0dc720f02ad7da3e528c55e0b663" + }, + "CVE-2021-3640": { + "cmt_msg": "Bluetooth: sco: Fix lock_sock() blockage by memcpy_from_msg()", + "cmt_id": "3eb50acbc96c9de3d8a056982938ece9bd1c2b91" + }, + "CVE-2021-45868": { + "cmt_msg": "quota: check block number when reading the block in quota file", + "cmt_id": "1d0606dc3e27e6c281a2684cb8bdf47134051114" + }, + "CVE-2021-3752": { + "cmt_msg": "Bluetooth: fix use-after-free error in lock_sock_nested()", + "cmt_id": "cd76d797a690969186c0c100e8a301c4480e4e7f" + } + }, + "4.14.257": { + "CVE-2021-4002": { + "cmt_msg": "hugetlbfs: flush TLBs correctly after huge_pmd_unshare", + "cmt_id": "7bf1f5cb5150b1a53f6ccaadc0bc77f8f33206c8" + }, + "CVE-2021-4083": { + "cmt_msg": "fget: check that the fd still exists after getting a ref to it", + "cmt_id": "98548c3a9882a1ea993a103be7c1b499f3b88202" + } + }, + "4.14.258": { + "CVE-2022-20132": { + "cmt_msg": "HID: add hid_is_usb() function to make it simpler for USB detection", + "cmt_id": "43cc4686b15d7d3a2b65b125393ea3f3d477e7d1" + }, + "CVE-2021-39698": { + "cmt_msg": "wait: add wake_up_pollfree()", + "cmt_id": "a36e1978c6cb6282fadd5d62d4b3e7808cf0597b" + }, + "CVE-2021-39685": { + "cmt_msg": "USB: gadget: detect too-big endpoint 0 requests", + "cmt_id": "e7c8afee149134b438df153b09af7fd928a8bc24" + } + }, + "4.14.259": { + "CVE-2021-39711": { + "cmt_msg": "bpf: fix panic due to oob in bpf_prog_test_run_skb", + "cmt_id": "20fdf274472998123a8d173ba4cb6282ff6b63bd" + }, + "CVE-2021-28715": { + "cmt_msg": "xen/netback: don't queue unlimited number of packages", + "cmt_id": "9bebb2eedf679b3be4acaa20efda97f32c999d74" + }, + "CVE-2021-28714": { + "cmt_msg": "xen/netback: fix rx queue stall detection", + "cmt_id": "eae85b8c6e17d3e3888d9159205390e8dbcff6a8" + }, + "CVE-2021-28713": { + "cmt_msg": "xen/console: harden hvc_xen against event channel storms", + "cmt_id": "68b78f976ca47d52c03c41eded207a312e46b934" + }, + "CVE-2021-28712": { + "cmt_msg": "xen/netfront: harden netfront against event channel storms", + "cmt_id": "4bf81386e3d6e5083c93d51eff70260bcec091bb" + }, + "CVE-2021-28711": { + "cmt_msg": "xen/blkfront: harden blkfront against event channel storms", + "cmt_id": "5ac3b68b79c9e964dd6f3cf80ff825518e502b79" + } + }, + "4.14.260": { + "CVE-2021-45469": { + "cmt_msg": "f2fs: fix to do sanity check on last xattr entry in __f2fs_setxattr()", + "cmt_id": "88dedecc24763c2e0bc1e8eeb35f9f2cd785a7e5" + }, + "CVE-2022-1195": { + "cmt_msg": "hamradio: improve the incomplete fix to avoid NPD", + "cmt_id": "a7b0ae2cc486fcb601f9f9d87d98138cc7b7f7f9" + }, + "CVE-2021-47086": { + "cmt_msg": "phonet/pep: refuse to enable an unbound pipe", + "cmt_id": "311601f114859d586d5ef8833d60d3aa23282161" + } + }, + "4.14.261": { + "CVE-2021-44733": { + "cmt_msg": "tee: handle lookup of shm with reference count 0", + "cmt_id": "3d556a28bbfe34a80b014db49908b0f1bcb1ae80" + }, + "CVE-2021-46929": { + "cmt_msg": "sctp: use call_rcu to free endpoint", + "cmt_id": "8873140f95d4977bf37e4cf0d5c5e3f6e34cdd3e" + }, + "CVE-2021-46935": { + "cmt_msg": "binder: fix async_free_space accounting for empty parcels", + "cmt_id": "2d2df539d05205fd83c404d5f2dff48d36f9b495" + }, + "CVE-2021-46933": { + "cmt_msg": "usb: gadget: f_fs: Clear ffs_eventfd in ffs_data_clear.", + "cmt_id": "52500239e3f2d6fc77b6f58632a9fb98fe74ac09" + }, + "CVE-2021-46932": { + "cmt_msg": "Input: appletouch - initialize work before device registration", + "cmt_id": "292d2ac61fb0d9276a0f7b7ce4f50426f2a1c99f" + }, + "CVE-2022-20154": { + "cmt_msg": "sctp: use call_rcu to free endpoint", + "cmt_id": "8873140f95d4977bf37e4cf0d5c5e3f6e34cdd3e" + }, + "CVE-2021-46936": { + "cmt_msg": "net: fix use-after-free in tw_timer_handler", + "cmt_id": "5c2fe20ad37ff56070ae0acb34152333976929b4" + }, + "CVE-2021-46924": { + "cmt_msg": "NFC: st21nfca: Fix memory leak in device probe and remove", + "cmt_id": "38c3e320e7ff46f2dc67bc5045333e63d9f8918d" + } + }, + "4.14.262": { + "CVE-2021-45095": { + "cmt_msg": "phonet: refcount leak in pep_sock_accep", + "cmt_id": "a025db5658d5c10019ffed0d59026da8172897b6" + }, + "CVE-2021-4155": { + "cmt_msg": "xfs: map unwritten blocks in XFS_IOC_{ALLOC,FREE}SP just like fallocate", + "cmt_id": "2af625c89bf4a41c8a0bc818d8cf30a291f216ca" + }, + "CVE-2021-3923": { + "cmt_msg": "RDMA/core: Don't infoleak GRH fields", + "cmt_id": "50ef6d3c9a4b965cf301c6133e2c6ed5ece2146a" + } + }, + "4.14.263": { + "CVE-2021-29264": { + "cmt_msg": "gianfar: fix jumbo packets+napi+rx overrun crash", + "cmt_id": "93e83b226a16bcc800013c6e02c98eef7ba9868c" + }, + "CVE-2020-36322": { + "cmt_msg": "fuse: fix bad inode", + "cmt_id": "2cd45139c0f28ebfa7604866faee00c99231a62b" + }, + "CVE-2021-20292": { + "cmt_msg": "drm/ttm/nouveau: don't call tt destroy callback on alloc failure.", + "cmt_id": "4a2cec066dc8d099d30c649ae7ed26771029e0b5" + }, + "CVE-2021-43976": { + "cmt_msg": "mwifiex: Fix skb_over_panic in mwifiex_usb_recv()", + "cmt_id": "8c9261b84c9b90d130d97fc7d13727706253af87" + }, + "CVE-2021-38199": { + "cmt_msg": "NFSv4: Initialise connection to the server in nfs4_alloc_client()", + "cmt_id": "d5e6dff8c92943a2719fa5415cc3d333e57d5d90" + } + }, + "4.14.264": { + "CVE-2022-0330": { + "cmt_msg": "drm/i915: Flush TLBs before releasing backing store", + "cmt_id": "eed39c1918f1803948d736c444bfacba2a482ad0" + }, + "CVE-2022-22942": { + "cmt_msg": "drm/vmwgfx: Fix stale file descriptors on failed usercopy", + "cmt_id": "e8d092a62449dcfc73517ca43963d2b8f44d0516" + } + }, + "4.14.265": { + "CVE-2022-24448": { + "cmt_msg": "NFSv4: Handle case where the lookup of a directory fails", + "cmt_id": "516f348b759f6a92819820a3f56d678458e22cc8" + }, + "CVE-2020-36516": { + "cmt_msg": "ipv4: avoid using shared IP generator for connected sockets", + "cmt_id": "853f58791145b6d7e6d2b6ff2a982119e920e21a" + }, + "CVE-2018-25020": { + "cmt_msg": "bpf: fix truncated jump targets on heavy expansions", + "cmt_id": "6824208b59a4727b8a8653f83d8e685584d04606" + }, + "CVE-2022-0617": { + "cmt_msg": "udf: Fix NULL ptr deref when converting from inline format", + "cmt_id": "a312cbdb9045a52e5c1fec4ac7b86895f508dc76" + } + }, + "4.14.266": { + "CVE-2022-0492": { + "cmt_msg": "cgroup-v1: Require capabilities to set release_agent", + "cmt_id": "b391bb3554dd6e04b7a8ede975dbd3342526a045" + }, + "CVE-2022-48626": { + "cmt_msg": "moxart: fix potential use-after-free on remove path", + "cmt_id": "e6f580d0b3349646d4ee1ce0057eb273e8fb7e2e" + }, + "CVE-2022-0435": { + "cmt_msg": "tipc: improve size validations for received domain records", + "cmt_id": "fde4ddeadd099bf9fbb9ccbee8e1b5c20d530a2d" + }, + "CVE-2022-0487": { + "cmt_msg": "moxart: fix potential use-after-free on remove path", + "cmt_id": "e6f580d0b3349646d4ee1ce0057eb273e8fb7e2e" + } + }, + "4.14.267": { + "CVE-2022-25375": { + "cmt_msg": "usb: gadget: rndis: check size of RNDIS_MSG_SET command", + "cmt_id": "4c22fbcef778badb00fb8bb9f409daa29811c175" + }, + "CVE-2022-25258": { + "cmt_msg": "USB: gadget: validate interface OS descriptor requests", + "cmt_id": "c7ad83d561df15ac6043d3b0d783aee777cf1731" + } + }, + "4.14.268": { + "CVE-2022-2964": { + "cmt_msg": "net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup", + "cmt_id": "63f0cfb36c1f1964a59ce544156677601e2d8740" + } + }, + "4.14.269": { + "CVE-2022-27223": { + "cmt_msg": "USB: gadget: validate endpoint index for xilinx udc", + "cmt_id": "fdc22192d49fa577d8397b39f8ef8141cb1d62aa" + }, + "CVE-2022-26966": { + "cmt_msg": "sr9700: sanity check for packet length", + "cmt_id": "fbc3c962b6eb42b1483d00d8ea28b61b9f2fff26" + } + }, + "4.14.270": { + "CVE-2022-24958": { + "cmt_msg": "usb: gadget: don't release an existing dev->buf", + "cmt_id": "6936d1097e9cb891e1daaa8aab1b9c080f5e59a2" + } + }, + "4.14.271": { + "CVE-2022-23038": { + "cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()", + "cmt_id": "1b2f59f854e7069ba059adfe03d648ea643eba51" + }, + "CVE-2022-23039": { + "cmt_msg": "xen/gntalloc: don't use gnttab_query_foreign_access()", + "cmt_id": "a37eb077983e678bece23d4061fe5a6614f41354" + }, + "CVE-2022-23960": { + "cmt_msg": "ARM: report Spectre v2 status through sysfs", + "cmt_id": "2d44960d3edf9994998ff798ef618e666c4f0143" + }, + "CVE-2022-23041": { + "cmt_msg": "xen/9p: use alloc/free_pages_exact()", + "cmt_id": "22fd4f3fc1cd37d3daa4462f3184b20adb9342f5" + }, + "CVE-2022-23036": { + "cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()", + "cmt_id": "1b2f59f854e7069ba059adfe03d648ea643eba51" + }, + "CVE-2022-23037": { + "cmt_msg": "xen/netfront: don't use gnttab_query_foreign_access() for mapped status", + "cmt_id": "fbb5d5edd233c25774109dc0a673702c7b4985e5" + }, + "CVE-2022-0001": { + "cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE", + "cmt_id": "35c13d13becb5b951ea0fc708dda03fe900cf879" + }, + "CVE-2022-0002": { + "cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE", + "cmt_id": "35c13d13becb5b951ea0fc708dda03fe900cf879" + }, + "CVE-2021-26401": { + "cmt_msg": "x86/speculation: Use generic retpoline by default on AMD", + "cmt_id": "85938688be23ecd36a06757096896b2779b80d97" + }, + "CVE-2022-23040": { + "cmt_msg": "xen/xenbus: don't let xenbus_grant_ring() remove grants in error case", + "cmt_id": "67d21d5bddef88c1977378e4aca2b9c6a4af9edc" + }, + "CVE-2022-23042": { + "cmt_msg": "xen/netfront: react properly to failing gnttab_end_foreign_access_ref()", + "cmt_id": "1b9f4115738af90427a8c94a3980bc52fbb23296" + } + }, + "4.14.272": { + "CVE-2022-1199": { + "cmt_msg": "ax25: Fix NULL pointer dereference in ax25_kill_by_device", + "cmt_id": "d03aba820f1549c9f3b1d14bf48fa082663d22b5" + }, + "CVE-2021-4149": { + "cmt_msg": "btrfs: unlock newly allocated extent buffer after error", + "cmt_id": "e0956dd95ddd6b02b7eb084d127b926a509ae8e7" + } + }, + "4.14.273": { + "CVE-2022-20368": { + "cmt_msg": "net/packet: fix slab-out-of-bounds access in packet_recvmsg()", + "cmt_id": "b1e27cda1e3c12b705875bb7e247a97168580e33" + }, + "CVE-2022-20158": { + "cmt_msg": "net/packet: fix slab-out-of-bounds access in packet_recvmsg()", + "cmt_id": "b1e27cda1e3c12b705875bb7e247a97168580e33" + } + }, + "4.14.274": { + "CVE-2022-26490": { + "cmt_msg": "nfc: st21nfca: Fix potential buffer overflows in EVT_TRANSACTION", + "cmt_id": "d908d2776464a8021a1f63eba6e7417fbe7653c9" + }, + "CVE-2022-28356": { + "cmt_msg": "llc: fix netdevice reference leaks in llc_ui_bind()", + "cmt_id": "0f294bc04be87f1c9e1d1a908db9fcc84ce94210" + }, + "CVE-2022-1016": { + "cmt_msg": "netfilter: nf_tables: initialize registers in nft_do_chain()", + "cmt_id": "a3cc32863b175168283cb0a5fde08de6a1e27df9" + }, + "CVE-2022-27666": { + "cmt_msg": "esp: Fix possible buffer overflow in ESP transformation", + "cmt_id": "2c8abafd6c72ef04bc972f40332c76c1dd04446d" + } + }, + "4.14.276": { + "CVE-2022-28390": { + "cmt_msg": "can: ems_usb: ems_usb_start_xmit(): fix double dev_kfree_skb() in error path", + "cmt_id": "29d967c18737ce04f372831c4542e71da1a8d5c8" + }, + "CVE-2022-2380": { + "cmt_msg": "video: fbdev: sm712fb: Fix crash in smtcfb_read()", + "cmt_id": "2a616cc4513217c850865482cbc0bc6e7188580c" + }, + "CVE-2022-41858": { + "cmt_msg": "drivers: net: slip: fix NPD bug in sl_tx_timeout()", + "cmt_id": "3fdb033f8f8c978489c7702a4a44494b7ae63424" + }, + "CVE-2022-1353": { + "cmt_msg": "af_key: add __GFP_ZERO flag for compose_sadb_supported in function pfkey_register", + "cmt_id": "fcdaaeb7eb5d52941ceb2fdcec0e2170c9bf3031" + }, + "CVE-2022-30594": { + "cmt_msg": "ptrace: Check PTRACE_O_SUSPEND_SECCOMP permission on PTRACE_SEIZE", + "cmt_id": "f1442ed84c43610ca8ab77deb9ca991e7354746c" + }, + "CVE-2022-2977": { + "cmt_msg": "tpm: fix reference counting for struct tpm_chip", + "cmt_id": "473a66f99cb8173c14138c5a5c69bfad04e8f9ac" + }, + "CVE-2022-3111": { + "cmt_msg": "power: supply: wm8350-power: Add missing free in free_charger_irq", + "cmt_id": "ae64b838bececea902b819a69731cb80cca8f31a" + }, + "CVE-2022-1198": { + "cmt_msg": "drivers: hamradio: 6pack: fix UAF bug caused by mod_timer()", + "cmt_id": "a2793cb58444d4411810cc555eb45b8f4a228018" + }, + "CVE-2022-3202": { + "cmt_msg": "jfs: prevent NULL deref in diFree", + "cmt_id": "33bd243566a9b1ca94261dcc2e16c7b9e3a71c15" + }, + "CVE-2021-4197": { + "cmt_msg": "cgroup: Use open-time credentials for process migraton perm checks", + "cmt_id": "a70bcf9ed08f3628a9324f054b0e041697b26853" + }, + "CVE-2022-28389": { + "cmt_msg": "can: mcba_usb: mcba_usb_start_xmit(): fix double dev_kfree_skb in error path", + "cmt_id": "cdced1015a63a7f100b5867ebb9a40271f891411" + }, + "CVE-2022-1011": { + "cmt_msg": "fuse: fix pipe buffer lifetime for direct_io", + "cmt_id": "0ab55e14cf5fd40c39109969c8b04a25870f5d1e" + } + }, + "4.14.277": { + "CVE-2022-1204": { + "cmt_msg": "ax25: Fix refcount leaks caused by ax25_cb_del()", + "cmt_id": "c44a453ffe16eb08acdc6129ac4fa0192dbc0456" + }, + "CVE-2022-28388": { + "cmt_msg": "can: usb_8dev: usb_8dev_start_xmit(): fix double dev_kfree_skb() in error path", + "cmt_id": "a5e2259173eb52a728bbf32e02aa9a388451e614" + } + }, + "4.14.278": { + "CVE-2022-33981": { + "cmt_msg": "floppy: disable FDRAWCMD by default", + "cmt_id": "b7fa84ae1171a3c5ea5d710899080a6e63cfe084" + }, + "CVE-2022-1836": { + "cmt_msg": "floppy: disable FDRAWCMD by default", + "cmt_id": "b7fa84ae1171a3c5ea5d710899080a6e63cfe084" + }, + "CVE-2022-29581": { + "cmt_msg": "net/sched: cls_u32: fix netns refcount changes in u32_change()", + "cmt_id": "0511cdd41a03ab396602dded4e778c5edcd8dcd1" + }, + "CVE-2022-1734": { + "cmt_msg": "nfc: nfcmrvl: main: reorder destructive operations in nfcmrvl_nci_unregister_dev to avoid bugs", + "cmt_id": "ced30680fb1c7c1daae39a9384d23cd1a022585f" + }, + "CVE-2022-1419": { + "cmt_msg": "drm/vgem: Close use-after-free race in vgem_gem_create", + "cmt_id": "d2b8e8fbac9f175388d2808ade90d86402642b01" + }, + "CVE-2023-3159": { + "cmt_msg": "firewire: fix potential uaf in outbound_phy_packet_callback()", + "cmt_id": "1269a6567274edecd04ee7fd7871aa4d0c937f2a" + }, + "CVE-2022-1974": { + "cmt_msg": "nfc: replace improper check device_is_registered() in netlink related functions", + "cmt_id": "6f0ac4cd0377ab4e0b49b8f6efd37057c21336a9" + }, + "CVE-2022-1975": { + "cmt_msg": "NFC: netlink: fix sleep in atomic bug when firmware download timeout", + "cmt_id": "c33b2afffe8ae90e0bd4790e0505edd92addf14c" + } + }, + "4.14.279": { + "CVE-2022-1048": { + "cmt_msg": "ALSA: pcm: Fix races among concurrent hw_params and hw_free calls", + "cmt_id": "a42aa926843acca96c0dfbde2e835b8137f2f092" + } + }, + "4.14.281": { + "CVE-2022-1652": { + "cmt_msg": "floppy: use a statically allocated error counter", + "cmt_id": "dc650d53bad770f169e498f1231671c51b0b321d" + }, + "CVE-2022-48619": { + "cmt_msg": "Input: add bounds checking to input_set_capability()", + "cmt_id": "9cc62ef5ba044b315c8761942db184a2ef8ff005" + }, + "CVE-2023-4459": { + "cmt_msg": "net: vmxnet3: fix possible NULL pointer dereference in vmxnet3_rq_cleanup()", + "cmt_id": "5fd9a74bf04a1eae5dbde8ca8585106d4410427f" + }, + "CVE-2023-4387": { + "cmt_msg": "net: vmxnet3: fix possible use-after-free bugs in vmxnet3_rq_alloc_rx_buf()", + "cmt_id": "2bee202d0649cb53b9860fe15d0642167bffd6bf" + }, + "CVE-2022-1729": { + "cmt_msg": "perf: Fix sys_perf_event_open() race against self", + "cmt_id": "dee63319e2d1abd5d37a89de046ccf32ca8a8451" + } + }, + "4.14.282": { + "CVE-2022-20572": { + "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag", + "cmt_id": "388bc1e69663956f8cee43af3bd02bd3061d222d" + }, + "CVE-2022-2503": { + "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag", + "cmt_id": "388bc1e69663956f8cee43af3bd02bd3061d222d" + }, + "CVE-2022-0494": { + "cmt_msg": "block-map: add __GFP_ZERO flag for alloc_page in function bio_copy_kern", + "cmt_id": "4f3ea768c56e8dce55ae538f18b37420366c5c22" + }, + "CVE-2022-1012": { + "cmt_msg": "secure_seq: use the 64 bits of the siphash for port offset calculation", + "cmt_id": "40d20f3186ddd9b6b94598f4ef3d07644b0fa43c" + } + }, + "4.14.283": { + "CVE-2023-4385": { + "cmt_msg": "fs: jfs: fix possible NULL pointer dereference in dbFree()", + "cmt_id": "070ddf59cf17faf6aae7d89f78e0510c94d07940" + }, + "CVE-2022-32250": { + "cmt_msg": "netfilter: nf_tables: disallow non-stateful expression in sets earlier", + "cmt_id": "5b732a9e8e22395d911b3e6c343cbed0e1cec275" + }, + "CVE-2022-1184": { + "cmt_msg": "ext4: verify dir block before splitting it", + "cmt_id": "d27d3caddbeff10871982d5e25e6557be0fdc29a" + }, + "CVE-2022-1966": { + "cmt_msg": "netfilter: nf_tables: disallow non-stateful expression in sets earlier", + "cmt_id": "5b732a9e8e22395d911b3e6c343cbed0e1cec275" + }, + "CVE-2022-32981": { + "cmt_msg": "powerpc/32: Fix overread/overwrite of thread_struct via ptrace", + "cmt_id": "d13c94c4b6f816e79b8e4df193db1bdcc7253610" + } + }, + "4.14.284": { + "CVE-2022-21125": { + "cmt_msg": "x86/speculation/mmio: Reuse SRBDS mitigation for SBDS", + "cmt_id": "532c3a51316b6b1fdc6cb01926e2d139ef7e25da" + }, + "CVE-2022-21166": { + "cmt_msg": "x86/speculation/mmio: Enable CPU Fill buffer clearing on idle", + "cmt_id": "e0fccc13ebe3ed1205f69d119d49789ef039c1fd" + }, + "CVE-2022-21123": { + "cmt_msg": "x86/speculation/mmio: Add mitigation for Processor MMIO Stale Data", + "cmt_id": "d6087dda37d3ffa3c8efe6385757d73d9ed173c5" + } + }, + "4.14.285": { + "CVE-2022-32296": { + "cmt_msg": "tcp: increase source port perturb table to 2^16", + "cmt_id": "9044e70fadec49482c3cb3c2f49e81825796ea6d" + }, + "CVE-2022-0812": { + "cmt_msg": "xprtrdma: fix incorrect header size calculations", + "cmt_id": "4779af1ec4a6c88a7005c8aabe69f409cf926d58" + } + }, + "4.14.286": { + "CVE-2021-33656": { + "cmt_msg": "vt: drop old FONT ioctls", + "cmt_id": "259742e9ad3551d5be58cd4754e65e0aabc1f9c8" + } + }, + "4.14.287": { + "CVE-2022-2318": { + "cmt_msg": "net: rose: fix UAF bugs caused by timer handler", + "cmt_id": "597b3bbe230caca60c321eeb08de14b9bc4d47c0" + }, + "CVE-2022-33742": { + "cmt_msg": "xen/blkfront: force data bouncing when backend is untrusted", + "cmt_id": "0b06590646e0857a804c9a08545791feb2278ab6" + }, + "CVE-2022-33741": { + "cmt_msg": "xen/netfront: force data bouncing when backend is untrusted", + "cmt_id": "019eaffbb7cfdbe01b1b4e1b61e7f91688c76c2a" + }, + "CVE-2022-33740": { + "cmt_msg": "xen/netfront: fix leaking data in shared pages", + "cmt_id": "f2c6f208a52df7e201f9fc34ae5efd7f9f40133e" + }, + "CVE-2022-26365": { + "cmt_msg": "xen/blkfront: fix leaking data in shared pages", + "cmt_id": "44dc5bcac4b0ec4e876110a69ead25a9b130234b" + }, + "CVE-2022-33744": { + "cmt_msg": "xen/arm: Fix race in RB-tree based P2M accounting", + "cmt_id": "01b86faa64b1f5aa04c0b3ca2001b0a8474f3006" + } + }, + "4.14.288": { + "CVE-2021-33655": { + "cmt_msg": "fbcon: Disallow setting font bigger than screen size", + "cmt_id": "f7e7c2ad446f359f54f4ea6a0a30b218e5edf134" + } + }, + "4.14.289": { + "CVE-2022-36123": { + "cmt_msg": "x86: Clear .brk area at early boot", + "cmt_id": "a24eebede57ff42d5123cca948c5077ccddbffcb" + } + }, + "4.14.290": { + "CVE-2022-1462": { + "cmt_msg": "tty: use new tty_insert_flip_string_and_push_buffer() in pty_write()", + "cmt_id": "e9274a2732e1de3ca36076126284b4e5ffe6d587" + }, + "CVE-2022-36879": { + "cmt_msg": "xfrm: xfrm_policy: fix a possible double xfrm_pols_put() in xfrm_bundle_lookup()", + "cmt_id": "2c9d93e35cb857fc613ec9d58d690d332252747b" + } + }, + "4.14.291": { + "CVE-2022-3629": { + "cmt_msg": "vsock: Fix memory leak in vsock_connect()", + "cmt_id": "ec0a5b730cc053202df6b6e6dd6c860977990646" + }, + "CVE-2022-2153": { + "cmt_msg": "KVM: x86: Avoid theoretical NULL pointer dereference in kvm_irq_delivery_to_apic_fast()", + "cmt_id": "bcf0a450fbaabe7e14d71f885525805b4f86e855" + }, + "CVE-2022-36946": { + "cmt_msg": "netfilter: nf_queue: do not allow packet truncation below transport header offset", + "cmt_id": "83636c64b796a7e44fa72f371777f803c1ef9e74" + }, + "CVE-2022-20566": { + "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free caused by l2cap_chan_put", + "cmt_id": "5bb395334392891dffae5a0e8f37dbe1d70496c9" + }, + "CVE-2022-3635": { + "cmt_msg": "atm: idt77252: fix use-after-free bugs caused by tst_timer", + "cmt_id": "3db3f3bf05a88635beb7391fca235fb0e5213e6f" + }, + "CVE-2022-2588": { + "cmt_msg": "net_sched: cls_route: remove from list when handle is 0", + "cmt_id": "d0cce31f328fa10e7256f314e6e044e13cdf6814" + }, + "CVE-2022-20422": { + "cmt_msg": "arm64: fix oops in concurrently setting insn_emulation sysctls", + "cmt_id": "9d5fec6ba2e4117d196a8259ab54615ffe562460" + }, + "CVE-2022-1679": { + "cmt_msg": "ath9k: fix use-after-free in ath9k_hif_usb_rx_cb", + "cmt_id": "62bc1ea5c7401d77eaf73d0c6a15f3d2e742856e" + }, + "CVE-2023-1095": { + "cmt_msg": "netfilter: nf_tables: fix null deref due to zeroed list head", + "cmt_id": "49d57fb1fd44b9d3422f096d3b1b6415685d7364" + }, + "CVE-2019-25162": { + "cmt_msg": "i2c: Fix a potential use after free", + "cmt_id": "e6412ba3b6508bdf9c074d310bf4144afa6aec1a" + } + }, + "4.14.292": { + "CVE-2022-42703": { + "cmt_msg": "mm/rmap: Fix anon_vma->degree ambiguity leading to double-reuse", + "cmt_id": "978a70601bdc4c32de4003d3beef4dfa23fff1e0" + }, + "CVE-2022-3028": { + "cmt_msg": "af_key: Do not call xfrm_probe_algs in parallel", + "cmt_id": "f1b1b63e307478e93548f59e18bd844744b396d3" + } + }, + "4.14.293": { + "CVE-2022-2663": { + "cmt_msg": "netfilter: nf_conntrack_irc: Fix forged IP logic", + "cmt_id": "6ce66e3442a5989cbe56a6884384bf0b7d1d0725" + }, + "CVE-2023-2860": { + "cmt_msg": "ipv6: sr: fix out-of-bounds read when setting HMAC data.", + "cmt_id": "dc9dbd65c803af1607484fed5da50d41dc8dd864" + }, + "CVE-2022-3586": { + "cmt_msg": "sch_sfb: Don't assume the skb is still around after enqueueing to child", + "cmt_id": "a7af71bb5ee6e887d49f098e212ef4f2f7cfbaf6" + }, + "CVE-2022-4095": { + "cmt_msg": "staging: rtl8712: fix use after free bugs", + "cmt_id": "376e15487fec837301d888068a3fcc82efb6171a" + }, + "CVE-2021-4159": { + "cmt_msg": "bpf: Verifer, adjust_scalar_min_max_vals to always call update_reg_bounds()", + "cmt_id": "a7cf53f9ebcd887c19588c0c1b4b8260f41a3faa" + }, + "CVE-2022-20421": { + "cmt_msg": "binder: fix UAF of ref->proc caused by race condition", + "cmt_id": "229f47603dd306bc0eb1a831439adb8e48bb0eae" + }, + "CVE-2022-4662": { + "cmt_msg": "USB: core: Prevent nested device-reset calls", + "cmt_id": "1b29498669914c7f9afb619722421418a753d372" + }, + "CVE-2022-40307": { + "cmt_msg": "efi: capsule-loader: Fix use-after-free in efi_capsule_write", + "cmt_id": "233d5c4d18971feee5fc2f33f00b63d8205cfc67" + } + }, + "4.14.295": { + "CVE-2022-39842": { + "cmt_msg": "video: fbdev: pxa3xx-gcu: Fix integer overflow in pxa3xx_gcu_write", + "cmt_id": "9556a88a16e381dbd6834da95206742d0973afc6" + }, + "CVE-2022-3239": { + "cmt_msg": "media: em28xx: initialize refcount before kref_get", + "cmt_id": "1f6ab281f218c3a2b789eb976c5b1ef67139680a" + } + }, + "4.14.296": { + "CVE-2022-2978": { + "cmt_msg": "fs: fix UAF/GPF bug in nilfs_mdt_destroy", + "cmt_id": "c0aa76b0f17f59dd9c9d3463550a2986a1d592e4" + }, + "CVE-2022-41849": { + "cmt_msg": "fbdev: smscufx: Fix use-after-free in ufx_ops_open()", + "cmt_id": "fa008859983d9231b9241a4b9eac7aabfbb45155" + }, + "CVE-2022-3594": { + "cmt_msg": "r8152: Rate limit overflow messages", + "cmt_id": "f5d6c938d51217d6f0f534f1ee606d9c5eb22fdc" + }, + "CVE-2022-43750": { + "cmt_msg": "usb: mon: make mmapped memory read only", + "cmt_id": "b29f76fcf2db6615b416d98e28c7d81eff4c89a2" + }, + "CVE-2022-3621": { + "cmt_msg": "nilfs2: fix NULL pointer dereference at nilfs_bmap_lookup_at_level()", + "cmt_id": "1ce68de30b663b79073251162123e57cbed2dc84" + }, + "CVE-2022-3649": { + "cmt_msg": "nilfs2: fix use-after-free bug of struct nilfs_root", + "cmt_id": "26b9b66610d6f8f3333cb6f52e97745da875fee1" + }, + "CVE-2022-41850": { + "cmt_msg": "HID: roccat: Fix use-after-free in roccat_read()", + "cmt_id": "fb8b43b7721786f551ec95542e07cf9a909f3e56" + }, + "CVE-2021-47103": { + "cmt_msg": "inet: fully convert sk->sk_rx_dst to RCU rules", + "cmt_id": "92e6e36ecd16808866ac6172b9491b5097cde449" + }, + "CVE-2022-40768": { + "cmt_msg": "scsi: stex: Properly zero out the passthrough command structure", + "cmt_id": "5c8395d775ca9044b361af4a19b2ff223485be35" + }, + "CVE-2022-3565": { + "cmt_msg": "mISDN: fix use-after-free bugs in l1oip timer handlers", + "cmt_id": "cbd342376a4e7ea481891181910e9e995390eb24" + }, + "CVE-2022-3542": { + "cmt_msg": "bnx2x: fix potential memory leak in bnx2x_tpa_stop()", + "cmt_id": "f63e896e78c247d0be8165d99d543a28ca0be360" + }, + "CVE-2022-3646": { + "cmt_msg": "nilfs2: fix leak of nilfs_root in case of writer thread creation failure", + "cmt_id": "a832de79d82ac8c9f445f99069e11b17c5d2224a" + } + }, + "4.14.297": { + "CVE-2022-26373": { + "cmt_msg": "x86/speculation: Add RSB VM Exit protections", + "cmt_id": "7a4d2cba68731673c3ec89a1a5eee3a9af35ffa7" + } + }, + "4.14.298": { + "CVE-2022-20369": { + "cmt_msg": "media: v4l2-mem2mem: Apply DST_QUEUE_OFF_BASE on MMAP buffers across ioctls", + "cmt_id": "7339b6bdf9e084f9e83c084ccc8879b6ae80b75a" + }, + "CVE-2023-0615": { + "cmt_msg": "media: vivid: dev->bitmap_cap wasn't freed in all cases", + "cmt_id": "b0e20af206273e90d47647e7c806ddcc0a401f65" + } + }, + "4.14.299": { + "CVE-2022-3628": { + "cmt_msg": "wifi: brcmfmac: Fix potential buffer overflow in brcmf_fweh_event_worker()", + "cmt_id": "b23665bbd39224e15aab89df4a4b60c0ab2ad09d" + }, + "CVE-2022-42895": { + "cmt_msg": "Bluetooth: L2CAP: Fix attempting to access uninitialized memory", + "cmt_id": "999d99c8de09537bd4f4a4a7db2be6b55c6ed817" + }, + "CVE-2022-3564": { + "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free caused by l2cap_reassemble_sdu", + "cmt_id": "03af22e23b96fb7ef75fb7885407ef457e8b403d" + } + }, + "4.14.300": { + "CVE-2023-26607": { + "cmt_msg": "ntfs: fix out-of-bounds read in ntfs_attr_find()", + "cmt_id": "801906eea32d9781725905271a1d4ab275743fc9" + }, + "CVE-2022-3521": { + "cmt_msg": "kcm: avoid potential race in kcm_tx_work", + "cmt_id": "381b6cb3f3e66b84db77028ac7d84f18d80f1153" + } + }, + "4.14.301": { + "CVE-2022-3524": { + "cmt_msg": "tcp/udp: Fix memory leak in ipv6_renew_options().", + "cmt_id": "205c1e9ac56a5cd1a7d0bc457d8b38871f5b37ed" + }, + "CVE-2022-42896": { + "cmt_msg": "Bluetooth: L2CAP: Fix accepting connection request for invalid SPSM", + "cmt_id": "9f4624c42db9dd854870ccb212ddd405d8c59041" + } + }, + "4.14.302": { + "CVE-2022-3643": { + "cmt_msg": "xen/netback: Ensure protocol headers don't fall in the non-linear area", + "cmt_id": "e173cefc814dec81e9836ecc866cdba154e693cd" + } + }, + "4.14.303": { + "CVE-2023-0266": { + "cmt_msg": "ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF", + "cmt_id": "c75e7766cef4e492ec156942d2c4d48c25574e5c" + }, + "CVE-2022-41218": { + "cmt_msg": "media: dvb-core: Fix UAF due to refcount races at releasing", + "cmt_id": "8d904e99c10e2e443c6c7c418541880513eb9790" + }, + "CVE-2023-23455": { + "cmt_msg": "net: sched: atm: dont intepret cls results when asked to drop", + "cmt_id": "db49adc5aff0c84ef0439a666f494a0d57c98bc7" + }, + "CVE-2023-0461": { + "cmt_msg": "net/ulp: prevent ULP without clone op from entering the LISTEN status", + "cmt_id": "b689125d04949841337dfa730d48dd91ada9ce3a" + }, + "CVE-2022-45934": { + "cmt_msg": "Bluetooth: L2CAP: Fix u8 overflow", + "cmt_id": "95f1847a361c7b4bf7d74c06ecb6968455082c1a" + }, + "CVE-2022-3424": { + "cmt_msg": "misc: sgi-gru: fix use-after-free error in gru_set_context_option, gru_fault and gru_handle_user_call_os", + "cmt_id": "3eec37e223fabedaf90191e8a0cc61d46a96ab8d" + }, + "CVE-2022-3545": { + "cmt_msg": "nfp: fix use-after-free in area_cache_get()", + "cmt_id": "60537e23e40f7ca9e07679fec28af79d43d9e8f6" + }, + "CVE-2022-47929": { + "cmt_msg": "net: sched: disallow noqueue for qdisc classes", + "cmt_id": "4574e32cbf652d7efcaa6076558752f770b01757" + }, + "CVE-2023-28328": { + "cmt_msg": "media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer()", + "cmt_id": "c712d1ccbfb787620422b437a5b8fac0802547bd" + }, + "CVE-2023-0394": { + "cmt_msg": "ipv6: raw: Deduct extension header length in rawv6_push_pending_frames", + "cmt_id": "35ed8ba485544a31a4ab9b92a1c68e406ab66a47" + }, + "CVE-2022-36280": { + "cmt_msg": "drm/vmwgfx: Validate the box size for the snooped cursor", + "cmt_id": "50d177f90b63ea4138560e500d92be5e4c928186" + } + }, + "4.14.304": { + "CVE-2023-0458": { + "cmt_msg": "prlimit: do_prlimit needs to have a speculation check", + "cmt_id": "291a0395bb298d0ef0bba21d2186f632e4b30053" + } + }, + "4.14.305": { + "CVE-2023-1074": { + "cmt_msg": "sctp: fail if no bound addresses can be used for a given scope", + "cmt_id": "97ca098d8f1a8119b6675c823706cd6231ba6d9b" + }, + "CVE-2023-3358": { + "cmt_msg": "HID: intel_ish-hid: Add check for ishtp_dma_tx_map", + "cmt_id": "eaa86c4ae77e9c6c28e3c417539ebbee987be0c9" + }, + "CVE-2023-23559": { + "cmt_msg": "wifi: rndis_wlan: Prevent buffer overflow in rndis_query_oid", + "cmt_id": "8a97563bf04358f035a0b98142ae48f1ef095b61" + }, + "CVE-2023-1073": { + "cmt_msg": "HID: check empty report_list in hid_validate_values()", + "cmt_id": "614dd3d1725d329bf10a7ae974ebdfe101150791" + } + }, + "4.14.306": { + "CVE-2023-1513": { + "cmt_msg": "kvm: initialize all of the kvm_debugregs structure before sending it to userspace", + "cmt_id": "1d43de93b35d85981006ec3c52c0cad8af1f2f6a" + }, + "CVE-2023-2162": { + "cmt_msg": "scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress", + "cmt_id": "496af9d3682ed4c28fb734342a09e6cc0c056ea4" + }, + "CVE-2023-26545": { + "cmt_msg": "net: mpls: fix stale pointer if allocation fails during device rename", + "cmt_id": "b89824a9b2398d78a32ea75343e5472a0fd4986e" + }, + "CVE-2023-32269": { + "cmt_msg": "netrom: Fix use-after-free caused by accept on already connected socket", + "cmt_id": "35d5bb094bc7529c15561289a1ea995f897bf2e6" + }, + "CVE-2023-3161": { + "cmt_msg": "fbcon: Check font dimension limits", + "cmt_id": "7625513267a2b155a5e31e4ac443bf954591b7fa" + } + }, + "4.14.307": { + "CVE-2023-0459": { + "cmt_msg": "uaccess: Add speculation barrier to copy_from_user()", + "cmt_id": "e0fbff18bbcee4f07d46bee172803fad63f6f4dd" + } + }, + "4.14.308": { + "CVE-2023-7192": { + "cmt_msg": "netfilter: ctnetlink: fix possible refcount leak in ctnetlink_create_conntrack()", + "cmt_id": "8df5f3b50d9ce523251edf9cd0470963be20004b" + }, + "CVE-2023-1829": { + "cmt_msg": "net/sched: Retire tcindex classifier", + "cmt_id": "53af9c793f644d5841d84d8e0ad83bd7ab47f3e0" + }, + "CVE-2023-2985": { + "cmt_msg": "fs: hfsplus: fix UAF issue in hfsplus_put_super", + "cmt_id": "a9433406837c211af58a533d9e6f7a8f865b01f3" + }, + "CVE-2023-1079": { + "cmt_msg": "HID: asus: use spinlock to safely schedule workers", + "cmt_id": "df0fad94ca3787727b9cdd76797aaacf46fe93ed" + }, + "CVE-2023-45862": { + "cmt_msg": "USB: ene_usb6250: Allocate enough memory for full object", + "cmt_id": "26f31c6e1389c23a1b822a61c59d5d1f357cb478" + }, + "CVE-2023-1118": { + "cmt_msg": "media: rc: Fix use-after-free bugs caused by ene_tx_irqsim()", + "cmt_id": "0987f836bc1a258cb8fb51669a5afb67bb01c31b" + } + }, + "4.14.311": { + "CVE-2023-1855": { + "cmt_msg": "hwmon: (xgene) Fix use after free bug in xgene_hwmon_remove due to race condition", + "cmt_id": "c809ed776e190edfc04f8d6b25a62855b1386a0d" + }, + "CVE-2023-1990": { + "cmt_msg": "nfc: st-nci: Fix use after free bug in ndlc_remove due to race condition", + "cmt_id": "2156490c4b7cacda9a18ec99929940b8376dc0e3" + } + }, + "4.14.312": { + "CVE-2023-2483": { + "cmt_msg": "net: qcom/emac: Fix use after free bug in emac_remove due to race condition", + "cmt_id": "aee129c0096e479eae92e2127f96f9d08f16ad8f" + }, + "CVE-2023-30772": { + "cmt_msg": "power: supply: da9150: Fix use after free bug in da9150_charger_remove due to race condition", + "cmt_id": "bbf45f079f41efcf1e51bb65a0a45d2b31061bd5" + }, + "CVE-2023-33203": { + "cmt_msg": "net: qcom/emac: Fix use after free bug in emac_remove due to race condition", + "cmt_id": "aee129c0096e479eae92e2127f96f9d08f16ad8f" + }, + "CVE-2023-23454": { + "cmt_msg": "net: sched: cbq: dont intepret cls results when asked to drop", + "cmt_id": "c4b1e702dc841a79664c5b8000fd99ffe9b3e9c2" + }, + "CVE-2023-1670": { + "cmt_msg": "xirc2ps_cs: Fix use after free bug in xirc2ps_detach", + "cmt_id": "fe7eebebca51d56b900331c3052a6342731f1117" + }, + "CVE-2021-33631": { + "cmt_msg": "ext4: fix kernel BUG in 'ext4_write_inline_data_end()'", + "cmt_id": "896cba70d0457af680fa00ef501f2d11a91fd42f" + }, + "CVE-2023-1989": { + "cmt_msg": "Bluetooth: btsdio: fix use after free bug in btsdio_remove due to unfinished work", + "cmt_id": "95eacef5692545f199fae4e52abfbfa273acb351" + }, + "CVE-2023-2194": { + "cmt_msg": "i2c: xgene-slimpro: Fix out-of-bounds bug in xgene_slimpro_i2c_xfer()", + "cmt_id": "b8cb50c68c87f2c4a1d65df9275073e9c94aef5e" + } + }, + "4.14.313": { + "CVE-2023-1859": { + "cmt_msg": "9p/xen : Fix use after free bug in xen_9pfs_front_remove due to race condition", + "cmt_id": "b5664e929e2e19f644ea133ae8d87fbd5654ec5a" + } + }, + "4.14.314": { + "CVE-2023-31436": { + "cmt_msg": "net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg", + "cmt_id": "0616570ce23bbcc1ac842e97fb8e167235f1582d" + }, + "CVE-2023-2513": { + "cmt_msg": "ext4: fix use-after-free in ext4_xattr_set_entry", + "cmt_id": "ae2c644049184f04f672e23d3fa8122631ef762e" + }, + "CVE-2023-2248": { + "cmt_msg": "net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg", + "cmt_id": "0616570ce23bbcc1ac842e97fb8e167235f1582d" + } + }, + "4.14.315": { + "CVE-2023-1380": { + "cmt_msg": "wifi: brcmfmac: slab-out-of-bounds read in brcmf_get_assoc_ies()", + "cmt_id": "ac5305e5d227b9af3aae25fa83380d3ff0225b73" + }, + "CVE-2024-0775": { + "cmt_msg": "ext4: improve error recovery code paths in __ext4_remount()", + "cmt_id": "7dd95a282809fec91e54867a92e271064284ad98" + }, + "CVE-2023-35824": { + "cmt_msg": "media: dm1105: Fix use after free bug in dm1105_remove due to race condition", + "cmt_id": "df01f9c146ce2134de4daf393e29e18d6d5866ec" + }, + "CVE-2023-2269": { + "cmt_msg": "dm ioctl: fix nested locking in table_clear() to remove deadlock concern", + "cmt_id": "c9dfa8ba3b181e67970f06d80de18aa257d1ecda" + }, + "CVE-2023-2002": { + "cmt_msg": "bluetooth: Perform careful capability checks in hci_sock_ioctl()", + "cmt_id": "73ddc585228db650bd4ff10d5b59c831924fd9ba" + }, + "CVE-2023-32233": { + "cmt_msg": "netfilter: nf_tables: deactivate anonymous set from preparation phase", + "cmt_id": "86572872505023e3bb461b271c2f25fdaa3dfcd7" + }, + "CVE-2023-34256": { + "cmt_msg": "ext4: avoid a potential slab-out-of-bounds in ext4_group_desc_csum", + "cmt_id": "64b7487e3769e013fc7edb3804d1a769747f0228" + } + }, + "4.14.316": { + "CVE-2022-2586": { + "cmt_msg": "netfilter: nf_tables: do not allow SET_ID to refer to another table", + "cmt_id": "4e0dbab570defe5b747578cbea8e07f9d0709bec" + }, + "CVE-2023-3090": { + "cmt_msg": "ipvlan:Fix out-of-bounds caused by unclear skb->cb", + "cmt_id": "8747ec637300f1212a47a9f15e2340cfe4dcbb9c" + }, + "CVE-2023-3141": { + "cmt_msg": "memstick: r592: Fix UAF bug in r592_remove due to race condition", + "cmt_id": "3faa6fe21c516dbcca469c297df77decbc2fed0f" + }, + "CVE-2022-34918": { + "cmt_msg": "netfilter: nf_tables: stricter validation of element data", + "cmt_id": "acd3e18fbcae6c5f9d79d75455569fc132227162" + } + }, + "4.14.317": { + "CVE-2023-1838": { + "cmt_msg": "Fix double fget() in vhost_net_set_backend()", + "cmt_id": "d1bcb0ab20980c6da663708c9a47c322703f9fc3" + }, + "CVE-2022-45887": { + "cmt_msg": "media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb()", + "cmt_id": "cf412b0543b77d01f74ae2303d7f8a97e6bff686" + }, + "CVE-2022-45919": { + "cmt_msg": "media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221", + "cmt_id": "66e262ad9b35615b2a1b1cad4751e93e1de90634" + } + }, + "4.14.318": { + "CVE-2023-3111": { + "cmt_msg": "btrfs: unset reloc control if transaction commit fails in prepare_to_relocate()", + "cmt_id": "ff0e8ed8dfb584575cffc1561f17a1d094e8565b" + } + }, + "4.14.319": { + "CVE-2023-3338": { + "cmt_msg": "Remove DECnet support from kernel", + "cmt_id": "975840f8dec3c1e6a6b28a387bb7cf55a4775e18" + } + }, + "4.14.321": { + "CVE-2022-40982": { + "cmt_msg": "x86/speculation: Add Gather Data Sampling mitigation", + "cmt_id": "cdc2724c9d060a8fa9652a9aa6347d8324f6cd82" + } + }, + "4.14.322": { + "CVE-2023-4206": { + "cmt_msg": "net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free", + "cmt_id": "226d84d54a9339b7045aff36c8f56d6ee9270476" + }, + "CVE-2023-3390": { + "cmt_msg": "netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE", + "cmt_id": "d19a80db742ceffc8d92a0cf78885f60d10c6a6d" + }, + "CVE-2023-1206": { + "cmt_msg": "tcp: Reduce chance of collisions in inet6_hashfn().", + "cmt_id": "ebfedbfb36eecab2d4bfa6faeaad763cbfe3a0e8" + }, + "CVE-2023-4128": { + "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free", + "cmt_id": "f0f874147a5b00eae875c24281531f8de7900079" + }, + "CVE-2023-3611": { + "cmt_msg": "net/sched: sch_qfq: account for stab overhead in qfq_enqueue", + "cmt_id": "c3f21ea515cb4ad7db86ddb511cead2f09e1c1e6" + }, + "CVE-2023-3212": { + "cmt_msg": "gfs2: Don't deref jdesc in evict", + "cmt_id": "6fb4b344382879bd4f8cc8394f6fff77c1388b15" + }, + "CVE-2023-3609": { + "cmt_msg": "net/sched: cls_u32: Fix reference counter leak leading to overflow", + "cmt_id": "a7f178f8439e939efdd12d190783eb0fabf5990d" + }, + "CVE-2023-4208": { + "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free", + "cmt_id": "f0f874147a5b00eae875c24281531f8de7900079" + }, + "CVE-2023-35001": { + "cmt_msg": "netfilter: nf_tables: prevent OOB access in nft_byteorder_eval", + "cmt_id": "185a79c8be264720b0b89ce2cc42ca2582dbce6f" + }, + "CVE-2023-3776": { + "cmt_msg": "net/sched: cls_fw: Fix improper refcount update leads to use-after-free", + "cmt_id": "fa020e39526994c7248f241f75d615b0df5d7671" + }, + "CVE-2023-3117": { + "cmt_msg": "netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE", + "cmt_id": "d19a80db742ceffc8d92a0cf78885f60d10c6a6d" + }, + "CVE-2023-40283": { + "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb", + "cmt_id": "51822644a047eac2310fab0799b64e3430b5a111" + }, + "CVE-2023-4132": { + "cmt_msg": "media: usb: siano: Fix warning due to null work_func_t function pointer", + "cmt_id": "45224862e49e1fde86cbd26c7612f029b4e2e662" + } + }, + "4.14.324": { + "CVE-2023-39194": { + "cmt_msg": "net: xfrm: Fix xfrm_address_filter OOB read", + "cmt_id": "0a42d1335985f9ebfbc997944ba8b1d84b9b661e" + }, + "CVE-2023-3772": { + "cmt_msg": "xfrm: add NULL check in xfrm_update_ae_params", + "cmt_id": "ed1cba039309c80b49719fcff3e3d7cdddb73d96" + } + }, + "4.14.326": { + "CVE-2023-4921": { + "cmt_msg": "net: sched: sch_qfq: Fix UAF in qfq_dequeue()", + "cmt_id": "d9f43fc5a78d1505733d3621cd4c044eaf71a02f" + }, + "CVE-2023-42755": { + "cmt_msg": "net/sched: Retire rsvp classifier", + "cmt_id": "a048f77ba9cf7f77a06b2ee60446c6cc061c2daf" + }, + "CVE-2023-42752": { + "cmt_msg": "igmp: limit igmpv3_newpack() packet size to IP_MAX_MTU", + "cmt_id": "afd2657ba7af6d05afd6cc6b9315c091fafed14b" + }, + "CVE-2023-4207": { + "cmt_msg": "net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free", + "cmt_id": "530a85ea747965b7c275fa44a364916e0ec2efaa" + }, + "CVE-2023-45871": { + "cmt_msg": "igb: set max size RX buffer when store bad packet is enabled", + "cmt_id": "017d5c8eef06178e4148db273df03b7ad9eeb5bc" + }, + "CVE-2023-39193": { + "cmt_msg": "netfilter: xt_sctp: validate the flag_info count", + "cmt_id": "be52e3c14651ade0f4539f319f9f0c40a230b076" + }, + "CVE-2023-39192": { + "cmt_msg": "netfilter: xt_u32: validate user space input", + "cmt_id": "e416d65ff456066d60d813c540ab2dd2a06d3d12" + } + }, + "4.14.327": { + "CVE-2023-52527": { + "cmt_msg": "ipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data()", + "cmt_id": "7626b9fed53092aa2147978070e610ecb61af844" + }, + "CVE-2023-4623": { + "cmt_msg": "net/sched: sch_hfsc: Ensure inner classes have fsc curve", + "cmt_id": "3c0bd0b79733b7f628af1c967269db339eeef8d3" + }, + "CVE-2023-31085": { + "cmt_msg": "ubi: Refuse attaching if mtd's erasesize is 0", + "cmt_id": "ef7a4c97a85ab1bff7abc98f885678bd33bb4881" + }, + "CVE-2023-52528": { + "cmt_msg": "net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg", + "cmt_id": "3e0af6eec1789fd11934164a7f4dbcad979855a4" + }, + "CVE-2023-52574": { + "cmt_msg": "team: fix null-ptr-deref when team device type is changed", + "cmt_id": "1779eb51b9cc628cee551f252701a85a2a50a457" + }, + "CVE-2023-52566": { + "cmt_msg": "nilfs2: fix potential use after free in nilfs_gccache_submit_read_data()", + "cmt_id": "fb1084e63ee56958b0a56e17a50a4fd86445b9c1" + } + }, + "4.14.328": { + "CVE-2023-52475": { + "cmt_msg": "Input: powermate - fix use-after-free in powermate_config_complete", + "cmt_id": "8677575c4f39d65bf0d719b5d20e8042e550ccb9" + }, + "CVE-2023-52477": { + "cmt_msg": "usb: hub: Guard against accesses to uninitialized BOS descriptors", + "cmt_id": "c64e4dca9aefd232b17ac4c779b608b286654e81" + }, + "CVE-2023-46343": { + "cmt_msg": "nfc: nci: fix possible NULL pointer dereference in send_acknowledge()", + "cmt_id": "2b2edf089df3a69f0072c6e71563394c5a94e62e" + }, + "CVE-2023-52507": { + "cmt_msg": "nfc: nci: assert requested protocol is valid", + "cmt_id": "2c231a247a1d1628e41fa1eefd1a5307c41c5f53" + }, + "CVE-2023-52478": { + "cmt_msg": "HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect", + "cmt_id": "ca0c4cc1d215dc22ab0e738c9f017c650f3183f5" + }, + "CVE-2023-52510": { + "cmt_msg": "ieee802154: ca8210: Fix a potential UAF in ca8210_probe", + "cmt_id": "28b68cba378e3e50a4082b65f262bc4f2c7c2add" + }, + "CVE-2023-5717": { + "cmt_msg": "perf: Disallow mis-matched inherited group reads", + "cmt_id": "555e15e93f6dbb8ce6b5b92e5272473abfe8bd2b" + } + }, + "4.14.329": { + "CVE-2023-3567": { + "cmt_msg": "vc_screen: move load of struct vc_data pointer in vcs_read() to avoid UAF", + "cmt_id": "af79ea9a2443016f64d8fd8d72020cc874f0e066" + }, + "CVE-2021-44879": { + "cmt_msg": "f2fs: fix to do sanity check on inode type during garbage collection", + "cmt_id": "a481db81e7ead1369acca8e13b6939778cb7d2c5" + }, + "CVE-2023-45863": { + "cmt_msg": "kobject: Fix slab-out-of-bounds in fill_kobj_path()", + "cmt_id": "b43cf5ad5241d6f33a02c93271a282d5ed6c4cce" + } + }, + "4.14.331": { + "CVE-2023-0590": { + "cmt_msg": "net: sched: fix race condition in qdisc_graft()", + "cmt_id": "42c50c7efcd1d263455438b81fe9388e685bfb66" + } + }, + "4.14.332": { + "CVE-2024-0584": { + "cmt_msg": "ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet", + "cmt_id": "be70b329c7fcb4a90c33546dc7c34bff07975b60" + }, + "CVE-2023-6932": { + "cmt_msg": "ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet", + "cmt_id": "be70b329c7fcb4a90c33546dc7c34bff07975b60" + } + }, + "4.14.334": { + "CVE-2023-51782": { + "cmt_msg": "net/rose: Fix Use-After-Free in rose_ioctl", + "cmt_id": "02af3c8ab5cda2633b187bd18b5dc2b9f0af0859" + }, + "CVE-2023-51780": { + "cmt_msg": "atm: Fix Use-After-Free in do_vcc_ioctl", + "cmt_id": "3ddeb55deec5e0e324d0ab8cc2ddd528518ea12d" + }, + "CVE-2023-51781": { + "cmt_msg": "appletalk: Fix Use-After-Free in atalk_ioctl", + "cmt_id": "0686da1ada51c787610185de6289d8a5006ad263" + } + }, + "outstanding": { + "CVE-2020-35501": { + "cmt_msg": "" + }, + "CVE-2023-3268": { + "cmt_msg": "relayfs: fix out-of-bounds access in relay_file_read" + }, + "CVE-2023-52615": { + "cmt_msg": "hwrng: core - Fix page fault dead lock on mmap-ed hwrng" + }, + "CVE-2023-52614": { + "cmt_msg": "PM / devfreq: Fix buffer overflow in trans_stat_show" + }, + "CVE-2023-52617": { + "cmt_msg": "PCI: switchtec: Fix stdev_release() crash after surprise hot remove" + }, + "CVE-2023-52612": { + "cmt_msg": "crypto: scomp - fix req->dst buffer overflow" + }, + "CVE-2022-47520": { + "cmt_msg": "wifi: wilc1000: validate pairwise and authentication suite offsets" + }, + "CVE-2023-52618": { + "cmt_msg": "block/rnbd-srv: Check for unlikely string overflow" + }, + "CVE-2022-0480": { + "cmt_msg": "memcg: enable accounting for file lock caches" + }, + "CVE-2021-47059": { + "cmt_msg": "crypto: sun8i-ss - fix result memory leak on error path" + }, + "CVE-2022-23825": { + "cmt_msg": "" + }, + "CVE-2021-47052": { + "cmt_msg": "crypto: sa2ul - Fix memory leak of rxd" + }, + "CVE-2021-47112": { + "cmt_msg": "x86/kvm: Teardown PV features on boot CPU as well" + }, + "CVE-2021-47113": { + "cmt_msg": "btrfs: abort in rename_exchange if we fail to insert the second ref" + }, + "CVE-2021-47110": { + "cmt_msg": "x86/kvm: Disable kvmclock on all CPUs on shutdown" + }, + "CVE-2021-47116": { + "cmt_msg": "ext4: fix memory leak in ext4_mb_init_backend on error path." + }, + "CVE-2021-47119": { + "cmt_msg": "ext4: fix memory leak in ext4_fill_super" + }, + "CVE-2019-19241": { + "cmt_msg": "io_uring: async workers should inherit the user creds" + }, + "CVE-2021-43975": { + "cmt_msg": "atlantic: Fix OOB read and write in hw_atl_utils_fw_rpc_wait" + }, + "CVE-2023-0597": { + "cmt_msg": "x86/mm: Randomize per-cpu entry area" + }, + "CVE-2019-12379": { + "cmt_msg": "consolemap: Fix a memory leaking bug in drivers/tty/vt/consolemap.c" + }, + "CVE-2019-12378": { + "cmt_msg": "ipv6_sockglue: Fix a missing-check bug in ip6_ra_control()" + }, + "CVE-2024-26592": { + "cmt_msg": "ksmbd: fix UAF issue in ksmbd_tcp_new_connection()" + }, + "CVE-2020-15802": { + "cmt_msg": "" + }, + "CVE-2024-26594": { + "cmt_msg": "ksmbd: validate mech token in session setup" + }, + "CVE-2024-26595": { + "cmt_msg": "mlxsw: spectrum_acl_tcam: Fix NULL pointer dereference in error path" + }, + "CVE-2022-3636": { + "cmt_msg": "net: ethernet: mtk_eth_soc: use after free in __mtk_ppe_check_skb()" + }, + "CVE-2024-26598": { + "cmt_msg": "KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache" + }, + "CVE-2023-52506": { + "cmt_msg": "LoongArch: Set all reserved memblocks on Node#0 at initialization" + }, + "CVE-2021-47028": { + "cmt_msg": "mt76: mt7915: fix txrate reporting" + }, + "CVE-2021-46908": { + "cmt_msg": "bpf: Use correct permission flag for mixed signed bounds arithmetic" + }, + "CVE-2023-2007": { + "cmt_msg": "scsi: dpt_i2o: Remove obsolete driver" + }, + "CVE-2020-26145": { + "cmt_msg": "ath10k: drop fragments with multicast DA for PCIe" + }, + "CVE-2020-26141": { + "cmt_msg": "ath10k: Fix TKIP Michael MIC verification for PCIe" + }, + "CVE-2020-26140": { + "cmt_msg": "" + }, + "CVE-2020-26143": { + "cmt_msg": "" + }, + "CVE-2020-26142": { + "cmt_msg": "" + }, + "CVE-2023-1076": { + "cmt_msg": "tun: tun_chr_open(): correctly initialize socket uid" + }, + "CVE-2023-1077": { + "cmt_msg": "sched/rt: pick_next_rt_entity(): check list_entry" + }, + "CVE-2023-46838": { + "cmt_msg": "xen-netback: don't produce zero-size SKB frags" + }, + "CVE-2024-26745": { + "cmt_msg": "powerpc/pseries/iommu: IOMMU table is not initialized for kdump over SR-IOV" + }, + "CVE-2024-26744": { + "cmt_msg": "RDMA/srpt: Support specifying the srpt_service_guid parameter" + }, + "CVE-2024-26743": { + "cmt_msg": "RDMA/qedr: Fix qedr_create_user_qp error flow" + }, + "CVE-2018-13095": { + "cmt_msg": "xfs: More robust inode extent count validation" + }, + "CVE-2024-26748": { + "cmt_msg": "usb: cdns3: fix memory double free when handle zero packet" + }, + "CVE-2024-22386": { + "cmt_msg": "" + }, + "CVE-2019-18680": { + "cmt_msg": "" + }, + "CVE-2024-26699": { + "cmt_msg": "drm/amd/display: Fix array-index-out-of-bounds in dcn35_clkmgr" + }, + "CVE-2024-26691": { + "cmt_msg": "KVM: arm64: Fix circular locking dependency" + }, + "CVE-2024-0564": { + "cmt_msg": "" + }, + "CVE-2024-26697": { + "cmt_msg": "nilfs2: fix data corruption in dsync block recovery for small block sizes" + }, + "CVE-2024-26696": { + "cmt_msg": "nilfs2: fix hang in nilfs_lookup_dirty_data_buffers()" + }, + "CVE-2023-2176": { + "cmt_msg": "RDMA/core: Refactor rdma_bind_addr" + }, + "CVE-2023-52578": { + "cmt_msg": "net: bridge: use DEV_STATS_INC()" + }, + "CVE-2022-39188": { + "cmt_msg": "mmu_gather: Force tlb-flush VM_PFNMAP vmas" + }, + "CVE-2005-3660": { + "cmt_msg": "" + }, + "CVE-2023-52619": { + "cmt_msg": "pstore/ram: Fix crash when setting number of cpus to an odd number" + }, + "CVE-2023-31084": { + "cmt_msg": "media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*()" + }, + "CVE-2023-31083": { + "cmt_msg": "Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO" + }, + "CVE-2023-31082": { + "cmt_msg": "" + }, + "CVE-2023-31081": { + "cmt_msg": "" + }, + "CVE-2019-19927": { + "cmt_msg": "drm/ttm: fix incrementing the page pointer for huge pages" + }, + "CVE-2024-23307": { + "cmt_msg": "md/raid5: fix atomicity violation in raid5_cache_count" + }, + "CVE-2023-52640": { + "cmt_msg": "fs/ntfs3: Fix oob in ntfs_listxattr" + }, + "CVE-2023-52498": { + "cmt_msg": "PM: sleep: Fix possible deadlocks in core system-wide PM code" + }, + "CVE-2023-52491": { + "cmt_msg": "media: mtk-jpeg: Fix use after free bug due to error path handling in mtk_jpeg_dec_device_run" + }, + "CVE-2024-26625": { + "cmt_msg": "llc: call sock_orphan() at release time" + }, + "CVE-2020-26560": { + "cmt_msg": "" + }, + "CVE-2023-4134": { + "cmt_msg": "Input: cyttsp4_core - change del_timer_sync() to timer_shutdown_sync()" + }, + "CVE-2023-39198": { + "cmt_msg": "drm/qxl: fix UAF on handle creation" + }, + "CVE-2023-37454": { + "cmt_msg": "" + }, + "CVE-2023-52489": { + "cmt_msg": "mm/sparsemem: fix race in accessing memory_section->usage" + }, + "CVE-2021-47063": { + "cmt_msg": "drm: bridge/panel: Cleanup connector on bridge detach" + }, + "CVE-2023-33288": { + "cmt_msg": "power: supply: bq24190: Fix use after free bug in bq24190_remove due to race condition" + }, + "CVE-2022-29900": { + "cmt_msg": "x86/kvm/vmx: Make noinstr clean" + }, + "CVE-2022-29901": { + "cmt_msg": "x86/kvm/vmx: Make noinstr clean" + }, + "CVE-2024-26602": { + "cmt_msg": "sched/membarrier: reduce the ability to hammer on sys_membarrier" + }, + "CVE-2022-1116": { + "cmt_msg": "" + }, + "CVE-2022-23816": { + "cmt_msg": "x86/kvm/vmx: Make noinstr clean" + }, + "CVE-2023-35827": { + "cmt_msg": "ravb: Fix use-after-free issue in ravb_tx_timeout_work()" + }, + "CVE-2023-52481": { + "cmt_msg": "arm64: errata: Add Cortex-A520 speculative unprivileged load workaround" + }, + "CVE-2023-52585": { + "cmt_msg": "drm/amdgpu: Fix possible NULL dereference in amdgpu_ras_query_error_status_helper()" + }, + "CVE-2023-52584": { + "cmt_msg": "spmi: mediatek: Fix UAF on device remove" + }, + "CVE-2023-52587": { + "cmt_msg": "IB/ipoib: Fix mcast list locking" + }, + "CVE-2023-52586": { + "cmt_msg": "drm/msm/dpu: Add mutex lock in control vblank irq" + }, + "CVE-2022-3567": { + "cmt_msg": "ipv6: Fix data races around sk->sk_prot." + }, + "CVE-2022-3566": { + "cmt_msg": "tcp: Fix data races around icsk->icsk_af_ops." + }, + "CVE-2023-52583": { + "cmt_msg": "ceph: fix deadlock or deadcode of misusing dget()" + }, + "CVE-2021-47065": { + "cmt_msg": "rtw88: Fix array overrun in rtw_get_tx_power_params()" + }, + "CVE-2022-4269": { + "cmt_msg": "act_mirred: use the backlog for nested calls to mirred ingress" + }, + "CVE-2021-47144": { + "cmt_msg": "drm/amd/amdgpu: fix refcount leak" + }, + "CVE-2021-47147": { + "cmt_msg": "ptp: ocp: Fix a resource leak in an error handling path" + }, + "CVE-2020-36385": { + "cmt_msg": "RDMA/ucma: Rework ucma_migrate_id() to avoid races with destroy" + }, + "CVE-2023-52589": { + "cmt_msg": "media: rkisp1: Fix IRQ disable race issue" + }, + "CVE-2023-52588": { + "cmt_msg": "f2fs: fix to tag gcing flag on page during block migration" + }, + "CVE-2021-47143": { + "cmt_msg": "net/smc: remove device from smcd_dev_list after failed device_add()" + }, + "CVE-2021-46941": { + "cmt_msg": "usb: dwc3: core: Do core softreset when switch mode" + }, + "CVE-2023-52340": { + "cmt_msg": "ipv6: remove max_size check inline with ipv4" + }, + "CVE-2020-7053": { + "cmt_msg": "drm/i915: Introduce a mutex for file_priv->context_idr" + }, + "CVE-2023-28466": { + "cmt_msg": "net: tls: fix possible race condition between do_tls_getsockopt_conf() and do_tls_setsockopt_conf()" + }, + "CVE-2021-47140": { + "cmt_msg": "iommu/amd: Clear DMA ops when switching domain" + }, + "CVE-2024-26765": { + "cmt_msg": "LoongArch: Disable IRQ before init_fn() for nonboot CPUs" + }, + "CVE-2023-0030": { + "cmt_msg": "drm/nouveau/mmu: add more general vmm free/node handling functions" + }, + "CVE-2020-16120": { + "cmt_msg": "ovl: switch to mounter creds in readdir" + }, + "CVE-2023-1611": { + "cmt_msg": "btrfs: fix race between quota disable and quota assign ioctls" + }, + "CVE-2016-10723": { + "cmt_msg": "mm, oom: remove sleep from under oom_lock" + }, + "CVE-2019-19036": { + "cmt_msg": "btrfs: Detect unbalanced tree with empty leaf before crashing btree operations" + }, + "CVE-2019-19039": { + "cmt_msg": "btrfs: Don't submit any btree write bio if the fs has errors" + }, + "CVE-2020-8832": { + "cmt_msg": "drm/i915: Record the default hw state after reset upon load" + }, + "CVE-2024-26797": { + "cmt_msg": "drm/amd/display: Prevent potential buffer overflow in map_hw_resources" + }, + "CVE-2024-26791": { + "cmt_msg": "btrfs: dev-replace: properly validate device names" + }, + "CVE-2020-8834": { + "cmt_msg": "KVM: PPC: Book3S HV: Factor fake-suspend handling out of kvmppc_save/restore_tm" + }, + "CVE-2024-26793": { + "cmt_msg": "gtp: fix use-after-free and null-ptr-deref in gtp_newlink()" + }, + "CVE-2023-52530": { + "cmt_msg": "wifi: mac80211: fix potential key use-after-free" + }, + "CVE-2023-52531": { + "cmt_msg": "wifi: iwlwifi: mvm: Fix a memory corruption issue" + }, + "CVE-2023-52532": { + "cmt_msg": "net: mana: Fix TX CQE error handling" + }, + "CVE-2024-26798": { + "cmt_msg": "fbcon: always restore the old font data in fbcon_do_set_font()" + }, + "CVE-2023-52429": { + "cmt_msg": "dm: limit the number of targets and parameter size area" + }, + "CVE-2023-39189": { + "cmt_msg": "netfilter: nfnetlink_osf: avoid OOB read" + }, + "CVE-2024-26677": { + "cmt_msg": "rxrpc: Fix delayed ACKs to not set the reference serial number" + }, + "CVE-2024-26676": { + "cmt_msg": "af_unix: Call kfree_skb() for dead unix_(sk)->oob_skb in GC." + }, + "CVE-2022-0168": { + "cmt_msg": "cifs: fix NULL ptr dereference in smb2_ioctl_query_info()" + }, + "CVE-2020-26556": { + "cmt_msg": "" + }, + "CVE-2020-26557": { + "cmt_msg": "" + }, + "CVE-2024-26671": { + "cmt_msg": "blk-mq: fix IO hang from sbitmap wakeup race" + }, + "CVE-2024-26779": { + "cmt_msg": "wifi: mac80211: fix race condition on enabling fast-xmit" + }, + "CVE-2024-26776": { + "cmt_msg": "spi: hisi-sfc-v3xx: Return IRQ_NONE if no interrupts were detected" + }, + "CVE-2024-26777": { + "cmt_msg": "fbdev: sis: Error out if pixclock equals zero" + }, + "CVE-2019-20794": { + "cmt_msg": "" + }, + "CVE-2020-26559": { + "cmt_msg": "" + }, + "CVE-2023-3397": { + "cmt_msg": "" + }, + "CVE-2020-36775": { + "cmt_msg": "f2fs: fix to avoid potential deadlock" + }, + "CVE-2024-26679": { + "cmt_msg": "inet: read sk->sk_family once in inet_recv_error()" + }, + "CVE-2024-26771": { + "cmt_msg": "dmaengine: ti: edma: Add some null pointer checks to the edma_probe" + }, + "CVE-2021-47083": { + "cmt_msg": "pinctrl: mediatek: fix global-out-of-bounds issue" + }, + "CVE-2023-52458": { + "cmt_msg": "block: add check that partition length needs to be aligned with block size" + }, + "CVE-2018-20854": { + "cmt_msg": "phy: ocelot-serdes: fix out-of-bounds read" + }, + "CVE-2018-20855": { + "cmt_msg": "IB/mlx5: Fix leaking stack memory to userspace" + }, + "CVE-2023-28746": { + "cmt_msg": "x86/mmio: Disable KVM mitigation when X86_FEATURE_CLEAR_CPU_BUF is set" + }, + "CVE-2023-52451": { + "cmt_msg": "powerpc/pseries/memhp: Fix access beyond end of drmem array" + }, + "CVE-2021-46970": { + "cmt_msg": "bus: mhi: pci_generic: Remove WQ_MEM_RECLAIM flag from state workqueue" + }, + "CVE-2024-1086": { + "cmt_msg": "netfilter: nf_tables: reject QUEUE/DROP verdict parameters" + }, + "CVE-2022-3344": { + "cmt_msg": "KVM: x86: nSVM: harden svm_free_nested against freeing vmcb02 while still in use" + }, + "CVE-2023-23000": { + "cmt_msg": "phy: tegra: xusb: Fix return value of tegra_xusb_find_port_node function" + }, + "CVE-2023-6240": { + "cmt_msg": "" + }, + "CVE-2024-26700": { + "cmt_msg": "drm/amd/display: Fix MST Null Ptr for RV" + }, + "CVE-2024-26706": { + "cmt_msg": "parisc: Fix random data corruption from exception handler" + }, + "CVE-2024-26704": { + "cmt_msg": "ext4: fix double-free of blocks due to wrong extents moved_len" + }, + "CVE-2022-0382": { + "cmt_msg": "net ticp:fix a kernel-infoleak in __tipc_sendmsg()" + }, + "CVE-2019-15222": { + "cmt_msg": "ALSA: usb-audio: Fix gpf in snd_usb_pipe_sanity_check" + }, + "CVE-2019-15223": { + "cmt_msg": "ALSA: line6: Assure canceling delayed work at disconnection" + }, + "CVE-2024-23196": { + "cmt_msg": "ALSA: hda: fix a possible null-pointer dereference due to data race in snd_hdac_regmap_sync()" + }, + "CVE-2019-19815": { + "cmt_msg": "f2fs: support swap file w/ DIO" + }, + "CVE-2019-19814": { + "cmt_msg": "" + }, + "CVE-2023-52620": { + "cmt_msg": "netfilter: nf_tables: disallow timeout for anonymous sets" + }, + "CVE-2023-52621": { + "cmt_msg": "bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers" + }, + "CVE-2023-52622": { + "cmt_msg": "ext4: avoid online resizing failures due to oversized flex bg" + }, + "CVE-2023-52623": { + "cmt_msg": "SUNRPC: Fix a suspicious RCU usage warning" + }, + "CVE-2023-52624": { + "cmt_msg": "drm/amd/display: Wake DMCUB before executing GPINT commands" + }, + "CVE-2023-52625": { + "cmt_msg": "drm/amd/display: Refactor DMCUB enter/exit idle interface" + }, + "CVE-2023-52628": { + "cmt_msg": "netfilter: nftables: exthdr: fix 4-byte stack OOB write" + }, + "CVE-2020-12656": { + "cmt_msg": "sunrpc: check that domain table is empty at module unload." + }, + "CVE-2022-3115": { + "cmt_msg": "drm: mali-dp: potential dereference of null pointer" + }, + "CVE-2022-3523": { + "cmt_msg": "mm/memory.c: fix race when faulting a device private page" + }, + "CVE-2022-3522": { + "cmt_msg": "mm/hugetlb: use hugetlb_pte_stable in migration race check" + }, + "CVE-2008-2544": { + "cmt_msg": "" + }, + "CVE-2021-47101": { + "cmt_msg": "asix: fix uninit-value in asix_mdio_read()" + }, + "CVE-2021-46982": { + "cmt_msg": "f2fs: compress: fix race condition of overwrite vs truncate" + }, + "CVE-2018-7754": { + "cmt_msg": "printk: hash addresses printed with %p" + }, + "CVE-2007-3719": { + "cmt_msg": "" + }, + "CVE-2023-3863": { + "cmt_msg": "net: nfc: Fix use-after-free caused by nfc_llcp_find_local" + }, + "CVE-2021-34556": { + "cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4" + }, + "CVE-2022-1247": { + "cmt_msg": "" + }, + "CVE-2022-2991": { + "cmt_msg": "remove the lightnvm subsystem" + }, + "CVE-2022-3624": { + "cmt_msg": "bonding: fix reference count leak in balance-alb mode" + }, + "CVE-2021-3669": { + "cmt_msg": "ipc: replace costly bailout check in sysvipc_find_ipc()" + }, + "CVE-2019-18885": { + "cmt_msg": "btrfs: merge btrfs_find_device and find_device" + }, + "CVE-2022-4744": { + "cmt_msg": "tun: avoid double free in tun_free_netdev" + }, + "CVE-2022-4543": { + "cmt_msg": "" + }, + "CVE-2023-52571": { + "cmt_msg": "power: supply: rk817: Fix node refcount leak" + }, + "CVE-2023-52572": { + "cmt_msg": "cifs: Fix UAF in cifs_demultiplex_thread()" + }, + "CVE-2023-4881": { + "cmt_msg": "netfilter: nftables: exthdr: fix 4-byte stack OOB write" + }, + "CVE-2013-7445": { + "cmt_msg": "" + }, + "CVE-2024-26733": { + "cmt_msg": "arp: Prevent overflow in arp_req_get()." + }, + "CVE-2024-26735": { + "cmt_msg": "ipv6: sr: fix possible use-after-free and null-ptr-deref" + }, + "CVE-2024-26738": { + "cmt_msg": "powerpc/pseries/iommu: DLPAR add doesn't completely initialize pci_controller" + }, + "CVE-2024-26739": { + "cmt_msg": "net/sched: act_mirred: don't override retval if we already lost the skb" + }, + "CVE-2022-38096": { + "cmt_msg": "" + }, + "CVE-2022-3303": { + "cmt_msg": "ALSA: pcm: oss: Fix race at SNDCTL_DSP_SYNC" + }, + "CVE-2024-26769": { + "cmt_msg": "nvmet-fc: avoid deadlock on delete association path" + }, + "CVE-2022-20148": { + "cmt_msg": "f2fs: fix UAF in f2fs_available_free_memory" + }, + "CVE-2023-6931": { + "cmt_msg": "perf: Fix perf_event_validate_size()" + }, + "CVE-2024-0607": { + "cmt_msg": "netfilter: nf_tables: fix pointer math issue in nft_byteorder_eval()" + }, + "CVE-2020-12362": { + "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" + }, + "CVE-2020-12363": { + "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" + }, + "CVE-2022-4129": { + "cmt_msg": "l2tp: Serialize access to sk_user_data with sk_callback_lock" + }, + "CVE-2020-12364": { + "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" + }, + "CVE-2024-26646": { + "cmt_msg": "thermal: intel: hfi: Add syscore callbacks for system-wide PM" + }, + "CVE-2024-26647": { + "cmt_msg": "drm/amd/display: Fix late derefrence 'dsc' check in 'link_set_dsc_pps_packet()'" + }, + "CVE-2024-26644": { + "cmt_msg": "btrfs: don't abort filesystem when attempting to snapshot deleted subvolume" + }, + "CVE-2024-26642": { + "cmt_msg": "netfilter: nf_tables: disallow anonymous set with timeout flag" + }, + "CVE-2024-26641": { + "cmt_msg": "ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv()" + }, + "CVE-2023-52464": { + "cmt_msg": "EDAC/thunderx: Fix possible out-of-bounds string access" + }, + "CVE-2023-52600": { + "cmt_msg": "jfs: fix uaf in jfs_evict_inode" + }, + "CVE-2023-52469": { + "cmt_msg": "drivers/amd/pm: fix a use-after-free in kv_parse_power_table" + }, + "CVE-2019-15290": { + "cmt_msg": "" + }, + "CVE-2021-32078": { + "cmt_msg": "ARM: footbridge: remove personal server platform" + }, + "CVE-2024-26633": { + "cmt_msg": "ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim()" + }, + "CVE-2018-7273": { + "cmt_msg": "printk: hash addresses printed with %p" + }, + "CVE-2024-26636": { + "cmt_msg": "llc: make llc_ui_sendmsg() more robust against bonding changes" + }, + "CVE-2024-26635": { + "cmt_msg": "llc: Drop support for ETH_P_TR_802_2." + }, + "CVE-2024-2193": { + "cmt_msg": "" + }, + "CVE-2018-12930": { + "cmt_msg": "" + }, + "CVE-2018-12931": { + "cmt_msg": "" + }, + "CVE-2019-12380": { + "cmt_msg": "efi/x86/Add missing error handling to old_memmap 1:1 mapping code" + }, + "CVE-2019-12381": { + "cmt_msg": "ip_sockglue: Fix missing-check bug in ip_ra_control()" + }, + "CVE-2024-26648": { + "cmt_msg": "drm/amd/display: Fix variable deferencing before NULL check in edp_setup_replay()" + }, + "CVE-2020-36780": { + "cmt_msg": "i2c: sprd: fix reference leak when pm_runtime_get_sync fails" + }, + "CVE-2020-36781": { + "cmt_msg": "i2c: imx: fix reference leak when pm_runtime_get_sync fails" + }, + "CVE-2020-36784": { + "cmt_msg": "i2c: cadence: fix reference leak when pm_runtime_get_sync fails" + }, + "CVE-2020-27835": { + "cmt_msg": "IB/hfi1: Ensure correct mm is used at all times" + }, + "CVE-2024-26685": { + "cmt_msg": "nilfs2: fix potential bug in end_buffer_async_write" + }, + "CVE-2022-3903": { + "cmt_msg": "media: mceusb: Use new usb_control_msg_*() routines" + }, + "CVE-2023-20588": { + "cmt_msg": "x86/CPU/AMD: Do not leak quotient data after a division by 0" + }, + "CVE-2018-20449": { + "cmt_msg": "printk: hash addresses printed with %p" + }, + "CVE-2021-47070": { + "cmt_msg": "uio_hv_generic: Fix another memory leak in error handling paths" + }, + "CVE-2022-44034": { + "cmt_msg": "char: pcmcia: remove all the drivers" + }, + "CVE-2022-44033": { + "cmt_msg": "char: pcmcia: remove all the drivers" + }, + "CVE-2021-47074": { + "cmt_msg": "nvme-loop: fix memory leak in nvme_loop_create_ctrl()" + }, + "CVE-2021-47077": { + "cmt_msg": "scsi: qedf: Add pointer checks in qedf_update_link_speed()" + }, + "CVE-2021-47076": { + "cmt_msg": "RDMA/rxe: Return CQE error if invalid lkey was supplied" + }, + "CVE-2021-47170": { + "cmt_msg": "USB: usbfs: Don't WARN about excessively large memory allocations" + }, + "CVE-2021-47172": { + "cmt_msg": "iio: adc: ad7124: Fix potential overflow due to non sequential channel numbers" + }, + "CVE-2021-47175": { + "cmt_msg": "net/sched: fq_pie: fix OOB access in the traffic path" + }, + "CVE-2018-10322": { + "cmt_msg": "xfs: enhance dinode verifier" + }, + "CVE-2021-46951": { + "cmt_msg": "tpm: efi: Use local variable for calculating final log size" + }, + "CVE-2021-46952": { + "cmt_msg": "NFS: fs_context: validate UDP retrans to prevent shift out-of-bounds" + }, + "CVE-2021-46959": { + "cmt_msg": "spi: Fix use-after-free with devm_spi_alloc_*" + }, + "CVE-2023-5178": { + "cmt_msg": "nvmet-tcp: Fix a possible UAF in queue intialization setup" + }, + "CVE-2021-0929": { + "cmt_msg": "staging/android/ion: delete dma_buf->kmap/unmap implemenation" + }, + "CVE-2023-52590": { + "cmt_msg": "ocfs2: Avoid touching renamed directory if parent does not change" + }, + "CVE-2023-52591": { + "cmt_msg": "reiserfs: Avoid touching renamed directory if parent does not change" + }, + "CVE-2024-26675": { + "cmt_msg": "ppp_async: limit MRU to 64K" + }, + "CVE-2024-26672": { + "cmt_msg": "drm/amdgpu: Fix variable 'mca_funcs' dereferenced before NULL check in 'amdgpu_mca_smu_get_mca_entry()'" + }, + "CVE-2023-3006": { + "cmt_msg": "arm64: Add AMPERE1 to the Spectre-BHB affected list" + }, + "CVE-2023-52522": { + "cmt_msg": "net: fix possible store tearing in neigh_periodic_work()" + }, + "CVE-2024-26784": { + "cmt_msg": "pmdomain: arm: Fix NULL dereference on scmi_perf_domain removal" + }, + "CVE-2024-26789": { + "cmt_msg": "crypto: arm64/neonbs - fix out-of-bounds access on short input" + }, + "CVE-2019-2181": { + "cmt_msg": "binder: check for overflow when alloc for security context" + }, + "CVE-2020-27820": { + "cmt_msg": "drm/nouveau: use drm_dev_unplug() during device removal" + }, + "CVE-2023-39197": { + "cmt_msg": "netfilter: conntrack: dccp: copy entire header to stack buffer, not just basic one" + }, + "CVE-2023-52599": { + "cmt_msg": "jfs: fix array-index-out-of-bounds in diNewExt" + }, + "CVE-2024-26774": { + "cmt_msg": "ext4: avoid dividing by 0 in mb_update_avg_fragment_size() when block bitmap corrupt" + }, + "CVE-2020-26541": { + "cmt_msg": "certs: Add EFI_CERT_X509_GUID support for dbx entries" + }, + "CVE-2023-6610": { + "cmt_msg": "smb: client: fix potential OOB in smb2_dump_detail()" + }, + "CVE-2024-26600": { + "cmt_msg": "phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP" + }, + "CVE-2024-26775": { + "cmt_msg": "aoe: avoid potential deadlock at set_capacity" + }, + "CVE-2024-26606": { + "cmt_msg": "binder: signal epoll threads of self-work" + }, + "CVE-2024-26768": { + "cmt_msg": "LoongArch: Change acpi_core_pic[NR_CPUS] to acpi_core_pic[MAX_CORE_PIC]" + }, + "CVE-2021-33061": { + "cmt_msg": "ixgbe: add improvement for MDD response functionality" + }, + "CVE-2024-26764": { + "cmt_msg": "fs/aio: Restrict kiocb_set_cancel_fn() to I/O submitted via libaio" + }, + "CVE-2024-26767": { + "cmt_msg": "drm/amd/display: fixed integer types and null check locations" + }, + "CVE-2024-26766": { + "cmt_msg": "IB/hfi1: Fix sdma.h tx->num_descs off-by-one error" + }, + "CVE-2024-26763": { + "cmt_msg": "dm-crypt: don't modify the data when using authenticated encryption" + }, + "CVE-2023-1476": { + "cmt_msg": "" + }, + "CVE-2024-26773": { + "cmt_msg": "ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found()" + }, + "CVE-2021-3864": { + "cmt_msg": "" + }, + "CVE-2024-26770": { + "cmt_msg": "HID: nvidia-shield: Add missing null pointer checks to LED initialization" + }, + "CVE-2024-23849": { + "cmt_msg": "net/rds: Fix UBSAN: array-index-out-of-bounds in rds_cmsg_recv" + }, + "CVE-2023-51043": { + "cmt_msg": "drm/atomic: Fix potential use-after-free in nonblocking commits" + }, + "CVE-2024-23848": { + "cmt_msg": "" + }, + "CVE-2023-20569": { + "cmt_msg": "x86/bugs: Increase the x86 bugs vector size to two u32s" + }, + "CVE-2016-8660": { + "cmt_msg": "" + }, + "CVE-2023-6270": { + "cmt_msg": "aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts" + }, + "CVE-2023-1582": { + "cmt_msg": "fs/proc: task_mmu.c: don't read mapcount for migration entry" + }, + "CVE-2022-1786": { + "cmt_msg": "io_uring: remove io_identity" + }, + "CVE-2008-4609": { + "cmt_msg": "" + }, + "CVE-2023-6356": { + "cmt_msg": "nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length" + }, + "CVE-2023-52639": { + "cmt_msg": "KVM: s390: vsie: fix race during shadow creation" + }, + "CVE-2018-1121": { + "cmt_msg": "" + }, + "CVE-2023-52635": { + "cmt_msg": "PM / devfreq: Synchronize devfreq_monitor_[start/stop]" + }, + "CVE-2023-52634": { + "cmt_msg": "drm/amd/display: Fix disable_otg_wa logic" + }, + "CVE-2023-52633": { + "cmt_msg": "um: time-travel: fix time corruption" + }, + "CVE-2023-52632": { + "cmt_msg": "drm/amdkfd: Fix lock dependency warning with srcu" + }, + "CVE-2021-4037": { + "cmt_msg": "xfs: fix up non-directory creation in SGID directories" + }, + "CVE-2023-20941": { + "cmt_msg": "" + }, + "CVE-2024-26740": { + "cmt_msg": "net/sched: act_mirred: use the backlog for mirred ingress" + }, + "CVE-2017-9986": { + "cmt_msg": "sound: Retire OSS" + }, + "CVE-2022-3533": { + "cmt_msg": "" + }, + "CVE-2022-3534": { + "cmt_msg": "libbpf: Fix use-after-free in btf_dump_name_dups" + }, + "CVE-2021-47135": { + "cmt_msg": "mt76: mt7921: fix possible AOOB issue in mt7921_mcu_tx_rate_report" + }, + "CVE-2021-47136": { + "cmt_msg": "net: zero-initialize tc skb extension on allocation" + }, + "CVE-2021-47137": { + "cmt_msg": "net: lantiq: fix memory corruption in RX ring" + }, + "CVE-2021-47131": { + "cmt_msg": "net/tls: Fix use-after-free after the TLS device goes down and up" + }, + "CVE-2021-47133": { + "cmt_msg": "HID: amd_sfh: Fix memory leak in amd_sfh_work" + }, + "CVE-2022-3061": { + "cmt_msg": "video: fbdev: i740fb: Error out if 'pixclock' equals zero" + }, + "CVE-2023-0386": { + "cmt_msg": "ovl: fail on invalid uid/gid mapping at copy up" + }, + "CVE-2023-6121": { + "cmt_msg": "nvmet: nul-terminate the NQNs passed in the connect command" + }, + "CVE-2023-52638": { + "cmt_msg": "can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock" + }, + "CVE-2017-13693": { + "cmt_msg": "" + }, + "CVE-2017-13694": { + "cmt_msg": "" + }, + "CVE-2022-21385": { + "cmt_msg": "net/rds: fix warn in rds_message_alloc_sgs" + }, + "CVE-2022-48627": { + "cmt_msg": "vt: fix memory overlapping when deleting chars in the buffer" + }, + "CVE-2022-48628": { + "cmt_msg": "ceph: drop messages from MDS when unmounting" + }, + "CVE-2024-24859": { + "cmt_msg": "" + }, + "CVE-2024-24858": { + "cmt_msg": "" + }, + "CVE-2024-24855": { + "cmt_msg": "scsi: lpfc: Fix a possible data race in lpfc_unregister_fcf_rescan()" + }, + "CVE-2024-24857": { + "cmt_msg": "" + }, + "CVE-2023-52569": { + "cmt_msg": "btrfs: remove BUG() after failure to insert delayed dir index item" + }, + "CVE-2023-52568": { + "cmt_msg": "x86/sgx: Resolves SECS reclaim vs. page fault for EAUG race" + }, + "CVE-2023-52563": { + "cmt_msg": "drm/meson: fix memory leak on ->hpd_notify callback" + }, + "CVE-2019-16921": { + "cmt_msg": "RDMA/hns: Fix init resp when alloc ucontext" + }, + "CVE-2023-52561": { + "cmt_msg": "arm64: dts: qcom: sdm845-db845c: Mark cont splash memory region as reserved" + }, + "CVE-2023-52565": { + "cmt_msg": "media: uvcvideo: Fix OOB read" + }, + "CVE-2021-46928": { + "cmt_msg": "parisc: Clear stale IIR value on instruction access rights trap" + }, + "CVE-2023-1382": { + "cmt_msg": "tipc: set con sock in tipc_conn_alloc" + }, + "CVE-2021-46925": { + "cmt_msg": "net/smc: fix kernel panic caused by race of smc_sock" + }, + "CVE-2021-46926": { + "cmt_msg": "ALSA: hda: intel-sdw-acpi: harden detection of controller" + }, + "CVE-2020-0347": { + "cmt_msg": "" + }, + "CVE-2022-41222": { + "cmt_msg": "mm/mremap: hold the rmap lock in write mode when moving page table entries." + }, + "CVE-2019-12455": { + "cmt_msg": "clk-sunxi: fix a missing-check bug in sunxi_divs_clk_setup()" + }, + "CVE-2019-12456": { + "cmt_msg": "" + }, + "CVE-2024-26720": { + "cmt_msg": "mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again" + }, + "CVE-2023-6546": { + "cmt_msg": "tty: n_gsm: fix the UAF caused by race condition in gsm_cleanup_mux" + }, + "CVE-2024-26726": { + "cmt_msg": "btrfs: don't drop extent_map for free space inode on write error" + }, + "CVE-2022-3642": { + "cmt_msg": "" + }, + "CVE-2023-52519": { + "cmt_msg": "HID: intel-ish-hid: ipc: Disable and reenable ACPI GPE bit" + }, + "CVE-2023-52516": { + "cmt_msg": "dma-debug: don't call __dma_entry_alloc_check_leak() under free_entries_lock" + }, + "CVE-2023-52517": { + "cmt_msg": "spi: sun6i: fix race between DMA RX transfer completion and RX FIFO drain" + }, + "CVE-2023-52515": { + "cmt_msg": "RDMA/srp: Do not call scsi_done() from srp_abort()" + }, + "CVE-2024-25739": { + "cmt_msg": "" + }, + "CVE-2023-52511": { + "cmt_msg": "spi: sun6i: reduce DMA RX transfer width to single byte" + }, + "CVE-2024-0340": { + "cmt_msg": "vhost: use kzalloc() instead of kmalloc() followed by memset()" + }, + "CVE-2023-6535": { + "cmt_msg": "" + }, + "CVE-2023-6536": { + "cmt_msg": "nvmet-tcp: fix a crash in nvmet_req_complete()" + }, + "CVE-2020-15780": { + "cmt_msg": "ACPI: configfs: Disallow loading ACPI tables when locked down" + }, + "CVE-2018-17977": { + "cmt_msg": "" + }, + "CVE-2024-1151": { + "cmt_msg": "net: openvswitch: limit the number of recursions from action sets" + }, + "CVE-2024-26659": { + "cmt_msg": "xhci: handle isoc Babble and Buffer Overrun events properly" + }, + "CVE-2024-26658": { + "cmt_msg": "bcachefs: grab s_umount only if snapshotting" + }, + "CVE-2010-5321": { + "cmt_msg": "" + }, + "CVE-2024-26655": { + "cmt_msg": "Fix memory leak in posix_clock_open()" + }, + "CVE-2024-26654": { + "cmt_msg": "ALSA: sh: aica: reorder cleanup operations to avoid UAF bugs" + }, + "CVE-2024-26656": { + "cmt_msg": "drm/amdgpu: fix use-after-free bug" + }, + "CVE-2024-26651": { + "cmt_msg": "sr9800: Add check for usbnet_get_endpoints" + }, + "CVE-2024-26650": { + "cmt_msg": "platform/x86: p2sb: Allow p2sb_bar() calls during PCI device probe" + }, + "CVE-2022-3169": { + "cmt_msg": "nvme: ensure subsystem reset is single threaded" + }, + "CVE-2023-52474": { + "cmt_msg": "IB/hfi1: Fix bugs with non-PAGE_SIZE-end multi-iovec user SDMA requests" + }, + "CVE-2023-52476": { + "cmt_msg": "perf/x86/lbr: Filter vsyscall addresses" + }, + "CVE-2023-22995": { + "cmt_msg": "usb: dwc3: dwc3-qcom: Add missing platform_device_put() in dwc3_qcom_acpi_register_core" + }, + "CVE-2023-52470": { + "cmt_msg": "drm/radeon: check the alloc_workqueue return value in radeon_crtc_init()" + }, + "CVE-2024-21803": { + "cmt_msg": "" + }, + "CVE-2023-52479": { + "cmt_msg": "ksmbd: fix uaf in smb20_oplock_break_ack" + }, + "CVE-2021-3542": { + "cmt_msg": "" + }, + "CVE-2022-1263": { + "cmt_msg": "KVM: avoid NULL pointer dereference in kvm_dirty_ring_push" + }, + "CVE-2023-34255": { + "cmt_msg": "xfs: verify buffer contents when we skip log replay" + }, + "CVE-2018-12929": { + "cmt_msg": "" + }, + "CVE-2018-12928": { + "cmt_msg": "" + }, + "CVE-2020-36310": { + "cmt_msg": "KVM: SVM: avoid infinite loop on NPF from bad address" + }, + "CVE-2020-36313": { + "cmt_msg": "KVM: Fix out of range accesses to memslots" + }, + "CVE-2024-26778": { + "cmt_msg": "fbdev: savage: Error out if pixclock equals zero" + }, + "CVE-2020-10708": { + "cmt_msg": "" + }, + "CVE-2022-0400": { + "cmt_msg": "" + }, + "CVE-2024-25741": { + "cmt_msg": "" + }, + "CVE-2024-26808": { + "cmt_msg": "netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain" + }, + "CVE-2024-26809": { + "cmt_msg": "netfilter: nft_set_pipapo: release elements in clone only from destroy path" + }, + "CVE-2024-26804": { + "cmt_msg": "net: ip_tunnel: prevent perpetual headroom growth" + }, + "CVE-2024-26805": { + "cmt_msg": "netlink: Fix kernel-infoleak-after-free in __skb_datagram_iter" + }, + "CVE-2024-26806": { + "cmt_msg": "spi: cadence-qspi: remove system-wide suspend helper calls from runtime PM hooks" + }, + "CVE-2024-26801": { + "cmt_msg": "Bluetooth: Avoid potential use-after-free in hci_error_reset" + }, + "CVE-2024-26802": { + "cmt_msg": "stmmac: Clear variable when destroying workqueue" + }, + "CVE-2024-26803": { + "cmt_msg": "net: veth: clear GRO when clearing XDP even when down" + }, + "CVE-2023-52606": { + "cmt_msg": "powerpc/lib: Validate size for vector operations" + }, + "CVE-2023-52607": { + "cmt_msg": "powerpc/mm: Fix null-pointer dereference in pgtable_cache_add" + }, + "CVE-2023-52604": { + "cmt_msg": "FS:JFS:UBSAN:array-index-out-of-bounds in dbAdjTree" + }, + "CVE-2023-52602": { + "cmt_msg": "jfs: fix slab-out-of-bounds Read in dtSearch" + }, + "CVE-2023-52603": { + "cmt_msg": "UBSAN: array-index-out-of-bounds in dtSplitRoot" + }, + "CVE-2022-25265": { + "cmt_msg": "" + }, + "CVE-2023-52601": { + "cmt_msg": "jfs: fix array-index-out-of-bounds in dbAdjTree" + }, + "CVE-2023-52609": { + "cmt_msg": "binder: fix race between mmput() and do_exit()" + }, + "CVE-2022-21499": { + "cmt_msg": "lockdown: also lock down previous kgdb use" + }, + "CVE-2023-3640": { + "cmt_msg": "" + }, + "CVE-2023-20593": { + "cmt_msg": "x86/cpu/amd: Add a Zenbleed fix" + }, + "CVE-2023-3022": { + "cmt_msg": "ipv6: Use result arg in fib_lookup_arg consistently" + }, + "CVE-2023-52598": { + "cmt_msg": "s390/ptrace: handle setting of fpc register correctly" + }, + "CVE-2021-47049": { + "cmt_msg": "Drivers: hv: vmbus: Use after free in __vmbus_open()" + }, + "CVE-2021-47046": { + "cmt_msg": "drm/amd/display: Fix off by one in hdmi_14_process_transaction()" + }, + "CVE-2023-4010": { + "cmt_msg": "" + }, + "CVE-2021-47167": { + "cmt_msg": "NFS: Fix an Oopsable condition in __nfs_pageio_add_request()" + }, + "CVE-2022-20424": { + "cmt_msg": "io_uring: remove io_identity" + }, + "CVE-2021-47163": { + "cmt_msg": "tipc: wait and exit until all work queues are done" + }, + "CVE-2021-46969": { + "cmt_msg": "bus: mhi: core: Fix invalid error returning in mhi_queue" + }, + "CVE-2021-47160": { + "cmt_msg": "net: dsa: mt7530: fix VLAN traffic leaks" + }, + "CVE-2021-46965": { + "cmt_msg": "mtd: physmap: physmap-bt1-rom: Fix unintentional stack access" + }, + "CVE-2021-46962": { + "cmt_msg": "mmc: uniphier-sd: Fix a resource leak in the remove function" + }, + "CVE-2019-19378": { + "cmt_msg": "" + }, + "CVE-2019-19377": { + "cmt_msg": "btrfs: Don't submit any btree write bio if the fs has errors" + }, + "CVE-2021-3759": { + "cmt_msg": "memcg: enable accounting of ipc resources" + }, + "CVE-2020-24503": { + "cmt_msg": "" + }, + "CVE-2020-24502": { + "cmt_msg": "" + }, + "CVE-2019-19449": { + "cmt_msg": "f2fs: fix to do sanity check on segment/section count" + }, + "CVE-2020-11725": { + "cmt_msg": "" + }, + "CVE-2023-30456": { + "cmt_msg": "KVM: nVMX: add missing consistency checks for CR0 and CR4" + }, + "CVE-2021-35477": { + "cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4" + }, + "CVE-2022-3606": { + "cmt_msg": "" + }, + "CVE-2022-2209": { + "cmt_msg": "" + }, + "CVE-2023-7042": { + "cmt_msg": "wifi: ath10k: fix NULL pointer dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev()" + }, + "CVE-2022-3595": { + "cmt_msg": "cifs: fix double-fault crash during ntlmssp" + }, + "CVE-2023-52559": { + "cmt_msg": "iommu/vt-d: Avoid memory allocation in iommu_suspend()" + }, + "CVE-2023-47233": { + "cmt_msg": "wifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach" + }, + "CVE-2024-23851": { + "cmt_msg": "dm: limit the number of targets and parameter size area" + }, + "CVE-2023-52629": { + "cmt_msg": "sh: push-switch: Reorder cleanup operations to avoid use-after-free bug" + }, + "CVE-2024-26772": { + "cmt_msg": "ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal()" + }, + "CVE-2024-26758": { + "cmt_msg": "md: Don't ignore suspended array in md_check_recovery()" + }, + "CVE-2024-26759": { + "cmt_msg": "mm/swap: fix race when skipping swapcache" + }, + "CVE-2023-6606": { + "cmt_msg": "smb: client: fix OOB in smbCalcSize()" + }, + "CVE-2024-26614": { + "cmt_msg": "tcp: make sure init the accept_queue's spinlocks once" + }, + "CVE-2024-26752": { + "cmt_msg": "l2tp: pass correct message length to ip6_append_data" + }, + "CVE-2024-26754": { + "cmt_msg": "gtp: fix use-after-free and null-ptr-deref in gtp_genl_dump_pdp()" + }, + "CVE-2024-26756": { + "cmt_msg": "md: Don't register sync_thread for reshape directly" + }, + "CVE-2024-26757": { + "cmt_msg": "md: Don't ignore read-only array in md_check_recovery()" + }, + "CVE-2019-20908": { + "cmt_msg": "efi: Restrict efivar_ssdt_load when the kernel is locked down" + }, + "CVE-2023-52435": { + "cmt_msg": "net: prevent mss overflow in skb_segment()" + }, + "CVE-2023-52434": { + "cmt_msg": "smb: client: fix potential OOBs in smb2_parse_contexts()" + }, + "CVE-2023-52436": { + "cmt_msg": "f2fs: explicitly null-terminate the xattr list" + }, + "CVE-2024-26689": { + "cmt_msg": "ceph: prevent use-after-free in encode_cap_msg()" + }, + "CVE-2019-9444": { + "cmt_msg": "printk: hash addresses printed with %p" + }, + "CVE-2022-2961": { + "cmt_msg": "" + }, + "CVE-2021-3506": { + "cmt_msg": "f2fs: fix to avoid out-of-bounds memory access" + }, + "CVE-2019-19067": { + "cmt_msg": "drm/amdgpu: fix multiple memory leaks in acp_hw_init" + }, + "CVE-2024-26686": { + "cmt_msg": "fs/proc: do_task_stat: use sig->stats_lock to gather the threads/children stats" + }, + "CVE-2024-26687": { + "cmt_msg": "xen/events: close evtchn after mapping cleanup" + }, + "CVE-2023-51779": { + "cmt_msg": "Bluetooth: af_bluetooth: Fix Use-After-Free in bt_sock_recvmsg" + }, + "CVE-2019-3874": { + "cmt_msg": "sctp: implement memory accounting on tx path" + }, + "CVE-2023-6915": { + "cmt_msg": "ida: Fix crash in ida_free when the bitmap is empty" + }, + "CVE-2010-4563": { + "cmt_msg": "" + }, + "CVE-2023-1249": { + "cmt_msg": "coredump: Use the vma snapshot in fill_files_note" + }, + "CVE-2021-4218": { + "cmt_msg": "sysctl: pass kernel pointers to ->proc_handler" + }, + "CVE-2023-4622": { + "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES" + }, + "CVE-2023-6040": { + "cmt_msg": "netfilter: nf_tables: Reject tables of unsupported family" + }, + "CVE-2021-4023": { + "cmt_msg": "io-wq: fix cancellation on create-worker failure" + }, + "CVE-2019-11191": { + "cmt_msg": "x86: Deprecate a.out support" + }, + "CVE-2023-52641": { + "cmt_msg": "fs/ntfs3: Add NULL ptr dereference checking at the end of attr_allocate_frame()" + }, + "CVE-2021-0399": { + "cmt_msg": "" + }, + "CVE-2023-52488": { + "cmt_msg": "serial: sc16is7xx: convert from _raw_ to _noinc_ regmap functions for FIFO" + }, + "CVE-2020-36691": { + "cmt_msg": "netlink: limit recursion depth in policy validation" + }, + "CVE-2023-52484": { + "cmt_msg": "iommu/arm-smmu-v3: Fix soft lockup triggered by arm_smmu_mm_invalidate_range" + }, + "CVE-2023-52485": { + "cmt_msg": "drm/amd/display: Wake DMCUB before sending a command" + }, + "CVE-2023-52486": { + "cmt_msg": "drm: Don't unref the same fb many times by mistake due to deadlock handling" + }, + "CVE-2023-52480": { + "cmt_msg": "ksmbd: fix race condition between session lookup and expire" + }, + "CVE-2012-4542": { + "cmt_msg": "" + }, + "CVE-2023-52482": { + "cmt_msg": "x86/srso: Add SRSO mitigation for Hygon processors" + }, + "CVE-2021-47075": { + "cmt_msg": "nvmet: fix memory leak in nvmet_alloc_ctrl()" + }, + "CVE-2020-14304": { + "cmt_msg": "" + }, + "CVE-2022-44032": { + "cmt_msg": "char: pcmcia: remove all the drivers" + }, + "CVE-2021-47082": { + "cmt_msg": "tun: avoid double free in tun_free_netdev" + }, + "CVE-2021-47128": { + "cmt_msg": "bpf, lockdown, audit: Fix buggy SELinux lockdown permission checks" + }, + "CVE-2021-47125": { + "cmt_msg": "sch_htb: fix refcount leak in htb_parent_to_leaf_offload" + }, + "CVE-2021-47124": { + "cmt_msg": "io_uring: fix link timeout refs" + }, + "CVE-2022-36402": { + "cmt_msg": "drm/vmwgfx: Fix shader stage validation" + }, + "CVE-2021-4150": { + "cmt_msg": "block: fix incorrect references to disk objects" + }, + "CVE-2021-29155": { + "cmt_msg": "bpf: Use correct permission flag for mixed signed bounds arithmetic" + }, + "CVE-2021-3714": { + "cmt_msg": "" + }, + "CVE-2019-16230": { + "cmt_msg": "drm/amdkfd: fix a potential NULL pointer dereference (v2)" + }, + "CVE-2021-3892": { + "cmt_msg": "" + }, + "CVE-2024-24860": { + "cmt_msg": "Bluetooth: Fix atomicity violation in {min,max}_key_size_set" + }, + "CVE-2024-24861": { + "cmt_msg": "media: xc4000: Fix atomicity violation in xc4000_get_frequency" + }, + "CVE-2024-24864": { + "cmt_msg": "" + }, + "CVE-2023-52596": { + "cmt_msg": "sysctl: Fix out of bounds access for empty sysctl registers" + }, + "CVE-2023-52597": { + "cmt_msg": "KVM: s390: fix setting of fpc register" + }, + "CVE-2023-52594": { + "cmt_msg": "wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus()" + }, + "CVE-2023-52595": { + "cmt_msg": "wifi: rt2x00: restart beacon queue when hardware reset" + }, + "CVE-2023-52593": { + "cmt_msg": "wifi: wfx: fix possible NULL pointer dereference in wfx_set_mfp_ap()" + }, + "CVE-2021-47158": { + "cmt_msg": "net: dsa: sja1105: add error handling in sja1105_setup()" + }, + "CVE-2021-47159": { + "cmt_msg": "net: dsa: fix a crash if ->get_sset_count() fails" + }, + "CVE-2022-1280": { + "cmt_msg": "drm: avoid circular locks in drm_mode_getconnector" + }, + "CVE-2021-47150": { + "cmt_msg": "net: fec: fix the potential memory leak in fec_enet_init()" + }, + "CVE-2021-47151": { + "cmt_msg": "interconnect: qcom: bcm-voter: add a missing of_node_put()" + }, + "CVE-2024-26627": { + "cmt_msg": "scsi: core: Move scsi_host_busy() out of host lock for waking up EH handler" + }, + "CVE-2022-23222": { + "cmt_msg": "bpf: Replace PTR_TO_XXX_OR_NULL with PTR_TO_XXX | PTR_MAYBE_NULL" + }, + "CVE-2024-26622": { + "cmt_msg": "tomoyo: fix UAF write bug in tomoyo_write_control()" + }, + "CVE-2024-26623": { + "cmt_msg": "pds_core: Prevent race issues involving the adminq" + }, + "CVE-2022-41848": { + "cmt_msg": "" + }, + "CVE-2021-39801": { + "cmt_msg": "" + }, + "CVE-2021-39800": { + "cmt_msg": "" + }, + "CVE-2022-20166": { + "cmt_msg": "drivers core: Use sysfs_emit and sysfs_emit_at for show(device *...) functions" + }, + "CVE-2024-22099": { + "cmt_msg": "Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security" + }, + "CVE-2022-45885": { + "cmt_msg": "" + }, + "CVE-2022-45884": { + "cmt_msg": "" + }, + "CVE-2024-25740": { + "cmt_msg": "" + }, + "CVE-2022-45886": { + "cmt_msg": "media: dvb-core: Fix use-after-free due on race condition at dvb_net" + }, + "CVE-2023-52509": { + "cmt_msg": "ravb: Fix use-after-free issue in ravb_tx_timeout_work()" + }, + "CVE-2023-52508": { + "cmt_msg": "nvme-fc: Prevent null pointer dereference in nvme_fc_io_getuuid()" + }, + "CVE-2024-25744": { + "cmt_msg": "x86/coco: Disable 32-bit emulation by default on TDX and SEV" + }, + "CVE-2019-10220": { + "cmt_msg": "Convert filldir[64]() from __put_user() to unsafe_put_user()" + }, + "CVE-2023-2124": { + "cmt_msg": "xfs: verify buffer contents when we skip log replay" + }, + "CVE-2023-52501": { + "cmt_msg": "ring-buffer: Do not attempt to read past \"commit\"" + }, + "CVE-2023-52500": { + "cmt_msg": "scsi: pm80xx: Avoid leaking tags when processing OPC_INB_SET_CONTROLLER_CONFIG command" + }, + "CVE-2023-52502": { + "cmt_msg": "net: nfc: fix races in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn()" + }, + "CVE-2023-1281": { + "cmt_msg": "net/sched: tcindex: update imperfect hash filters respecting rcu" + }, + "CVE-2022-27672": { + "cmt_msg": "x86/speculation: Identify processors vulnerable to SMT RSB predictions" + }, + "CVE-2024-26668": { + "cmt_msg": "netfilter: nft_limit: reject configurations that cause integer overflow" + }, + "CVE-2015-2877": { + "cmt_msg": "" + }, + "CVE-2024-26663": { + "cmt_msg": "tipc: Check the bearer type before calling tipc_udp_nl_bearer_add()" + }, + "CVE-2024-26664": { + "cmt_msg": "hwmon: (coretemp) Fix out-of-bounds memory access" + }, + "CVE-2019-16089": { + "cmt_msg": "" + }, + "CVE-2024-26715": { + "cmt_msg": "usb: dwc3: gadget: Fix NULL pointer dereference in dwc3_gadget_suspend" + }, + "CVE-2021-3847": { + "cmt_msg": "" + }, + "CVE-2023-52442": { + "cmt_msg": "ksmbd: validate session id and tree id in compound request" + }, + "CVE-2023-52443": { + "cmt_msg": "apparmor: avoid crash when parsed profile name is empty" + }, + "CVE-2023-52444": { + "cmt_msg": "f2fs: fix to avoid dirent corruption" + }, + "CVE-2023-52445": { + "cmt_msg": "media: pvrusb2: fix use after free on context disconnection" + }, + "CVE-2011-4917": { + "cmt_msg": "" + }, + "CVE-2011-4916": { + "cmt_msg": "" + }, + "CVE-2023-52449": { + "cmt_msg": "mtd: Fix gluebi NULL pointer dereference caused by ftl notifier" + }, + "CVE-2023-23039": { + "cmt_msg": "" + }, + "CVE-2024-26719": { + "cmt_msg": "nouveau: offload fence uevents work to workqueue" + }, + "CVE-2019-5489": { + "cmt_msg": "Change mincore() to count \"mapped\" pages rather than \"cached\" pages" + }, + "CVE-2024-1312": { + "cmt_msg": "mm: lock_vma_under_rcu() must check vma->anon_vma under vma lock" + }, + "CVE-2024-26713": { + "cmt_msg": "powerpc/pseries/iommu: Fix iommu initialisation during DLPAR add" + } + } + }, + "4.17": { + "4.17-rc1": { + "CVE-2019-19083": { + "cmt_msg": "drm/amd/display: memory leak", + "cmt_id": "9ea29a1f8b9da52d8eca8b0996f1d84eac548d3b" + } + }, + "4.17-rc6": { + "CVE-2019-12881": { + "cmt_msg": "drm/i915/userptr: reject zero user_size", + "cmt_id": "20943f984967477c906522112d2b6b5a29f94684" + } + }, + "4.17.2": { + "CVE-2018-10853": { + "cmt_msg": "kvm: x86: use correct privilege level for sgdt/sidt/fxsave/fxrstor access", + "cmt_id": "0c950f7417267db597e73170d7694ba7f09f77a0" + }, + "CVE-2018-12904": { + "cmt_msg": "kvm: nVMX: Enforce cpl=0 for VMX instructions", + "cmt_id": "9c3c30575618ba14d4fa67c887a32c05dc55e6fd" + } + }, + "4.17.3": { + "CVE-2018-10840": { + "cmt_msg": "ext4: correctly handle a zero-length xattr with a non-zero e_value_offs", + "cmt_id": "0ea1fdcb048f7297153109a2fdced98fe887b0c0" + }, + "CVE-2018-1118": { + "cmt_msg": "vhost: fix info leak due to uninitialized memory", + "cmt_id": "a8c0b29a879d56e7bd0cad37fa472876aef69dd9" + }, + "CVE-2018-11412": { + "cmt_msg": "ext4: do not allow external inodes for inline data", + "cmt_id": "49e5abce91a0538a909794681619a2580dccfce0" + }, + "CVE-2018-12232": { + "cmt_msg": "socket: close race condition between sock_close() and sockfs_setattr()", + "cmt_id": "be3bb23cc0e4943922db828b923648af7a9f2dc3" + } + }, + "4.17.4": { + "CVE-2018-12633": { + "cmt_msg": "virt: vbox: Only copy_from_user the request-header once", + "cmt_id": "a61b352a7c23191108ae0c747a170f6bce5b154a" + }, + "CVE-2018-13406": { + "cmt_msg": "video: uvesafb: Fix integer overflow in allocation", + "cmt_id": "ac6992286f1bb8fe86b2a924849f922edabed4ab" + }, + "CVE-2018-12714": { + "cmt_msg": "tracing: Check for no filter when processing event filters", + "cmt_id": "a6974c2f8e8b6f29ba3bcdb508ace850a26823fc" + } + }, + "4.17.6": { + "CVE-2018-9516": { + "cmt_msg": "HID: debug: check length before copy_to_user()", + "cmt_id": "787b882d9178c35eb2e06e974f3c37fc14829e53" + }, + "CVE-2018-10879": { + "cmt_msg": "ext4: make sure bitmaps and the inode table don't overlap with bg descriptors", + "cmt_id": "0f2e7fe6d2cc8903765dac6eea7d7aa96e9ad823" + }, + "CVE-2018-10881": { + "cmt_msg": "ext4: clear i_data in ext4_inode_info when removing inline data", + "cmt_id": "0abaed0c74f4dbd3f5a9dcb9fb6b472735874b5e" + }, + "CVE-2018-10878": { + "cmt_msg": "ext4: always check block group bounds in ext4_init_block_bitmap()", + "cmt_id": "425a51f7b055ccc66ea7fd0415eb905ede66622d" + }, + "CVE-2018-10877": { + "cmt_msg": "ext4: verify the depth of extent tree in ext4_find_extent()", + "cmt_id": "a266689c463cc6057400d1cfdf85b8e3ef7b6efd" + }, + "CVE-2018-10876": { + "cmt_msg": "ext4: only look at the bg_flags field if it is valid", + "cmt_id": "b94094f668a9bf7837c275cd6e49bf29def3c77f" + }, + "CVE-2018-10880": { + "cmt_msg": "ext4: never move the system.data xattr out of the inode body", + "cmt_id": "1f18321d31d0971a5e9a02a9e67a6d94b638fca3" + }, + "CVE-2017-13168": { + "cmt_msg": "scsi: sg: mitigate read/write abuse", + "cmt_id": "ae78cf6c0c2e2ea05f9d2d6bd59f702fd1e8220c" + }, + "CVE-2018-10882": { + "cmt_msg": "ext4: add more inode number paranoia checks", + "cmt_id": "77d4024c10f3271dc7e799890e15df8fcadebcda" + }, + "CVE-2018-10883": { + "cmt_msg": "jbd2: don't mark block as modified if the handle is out of credits", + "cmt_id": "f869e0b631a6a7befe595dbad0b2e3662c6d1a99" + } + }, + "4.17.7": { + "CVE-2018-13405": { + "cmt_msg": "Fix up non-directory creation in SGID directories", + "cmt_id": "3dcb24abc93cad1afb87b3f30fd5bf348b49d5a7" + }, + "CVE-2018-16276": { + "cmt_msg": "USB: yurex: fix out-of-bounds uaccess in read handler", + "cmt_id": "ce6037ad83d4d1a27f11c352eb8fab10b1a4e97c" + }, + "CVE-2020-0430": { + "cmt_msg": "bpf: reject passing modified ctx to helper functions", + "cmt_id": "49fde2180b48cd15d6b2a51416bbf1c4be5d77a2" + } + }, + "4.17.10": { + "CVE-2018-10902": { + "cmt_msg": "ALSA: rawmidi: Change resized buffers atomically", + "cmt_id": "f5f3789f192981a482856a69bd2ef38088f0e635" + } + }, + "4.17.11": { + "CVE-2018-5390": { + "cmt_msg": "tcp: free batches of packets in tcp_prune_ofo_queue()", + "cmt_id": "db11182a1e38e7149804962111622b15bd9aeff2" + } + }, + "4.17.12": { + "CVE-2018-14734": { + "cmt_msg": "infiniband: fix a possible use-after-free bug", + "cmt_id": "da1320feb7d48f2a4c5e02b253d5a2186d2bee6c" + } + }, + "4.17.13": { + "CVE-2018-14678": { + "cmt_msg": "x86/entry/64: Remove %ebx handling from error_entry/exit", + "cmt_id": "6557adc69262f90b3f1ddf3d4f874e203894a246" + } + }, + "4.17.14": { + "CVE-2018-13093": { + "cmt_msg": "xfs: validate cached inodes are free when allocated", + "cmt_id": "39dc3fb32fd4bf0fde9e8c971dec8228722f0a70" + }, + "CVE-2018-13094": { + "cmt_msg": "xfs: don't call xfs_da_shrink_inode with NULL bp", + "cmt_id": "173f00f40107e5099eb8a74ea7b7ff0e662ec80b" + }, + "CVE-2018-12233": { + "cmt_msg": "jfs: Fix inconsistency between memory allocation and ea_buf->max_size", + "cmt_id": "2972e3f6816c7dc0d4804ae82a3d02ffb94068dc" + } + }, + "4.17.15": { + "CVE-2018-3646": { + "cmt_msg": "x86/microcode: Allow late microcode loading with SMT disabled", + "cmt_id": "f6b2c7253830473fedb8b5680894660e78e03aea" + }, + "CVE-2018-3620": { + "cmt_msg": "x86/microcode: Allow late microcode loading with SMT disabled", + "cmt_id": "f6b2c7253830473fedb8b5680894660e78e03aea" + }, + "CVE-2018-15572": { + "cmt_msg": "x86/speculation: Protect against userspace-userspace spectreRSB", + "cmt_id": "0a9da8dd128e2e3038b0b4355cc639769047976d" + }, + "CVE-2018-15594": { + "cmt_msg": "x86/paravirt: Fix spectre-v2 mitigations for paravirt guests", + "cmt_id": "7676d2dee2b687449bb501a98062863741b30bc8" + } + }, + "4.17.16": { + "CVE-2018-9363": { + "cmt_msg": "Bluetooth: hidp: buffer overflow in hidp_process_report", + "cmt_id": "0c37356f695faeb8f47c9107707bd47b53622a46" + } + }, + "4.17.19": { + "CVE-2018-3693": { + "cmt_msg": "ext4: fix spectre gadget in ext4_mb_regular_allocator()", + "cmt_id": "df2ef7a510fa4c784adc53ef72b1b392a4033ad2" + } + }, + "outstanding": { + "CVE-2020-36322": { + "cmt_msg": "fuse: fix bad inode" + }, + "CVE-2020-10711": { + "cmt_msg": "netlabel: cope with NULL catmap" + }, + "CVE-2019-15090": { + "cmt_msg": "scsi: qedi: remove memset/memcpy to nfunc and use func instead" + }, + "CVE-2021-47177": { + "cmt_msg": "iommu/vt-d: Fix sysfs leak in alloc_iommu()" + }, + "CVE-2024-26686": { + "cmt_msg": "fs/proc: do_task_stat: use sig->stats_lock to gather the threads/children stats" + }, + "CVE-2022-3649": { + "cmt_msg": "nilfs2: fix use-after-free bug of struct nilfs_root" + }, + "CVE-2019-15099": { + "cmt_msg": "ath6kl: fix a NULL-ptr-deref bug in ath6kl_usb_alloc_urb_from_pipe()" + }, + "CVE-2019-15098": { + "cmt_msg": "ath6kl: fix a NULL-ptr-deref bug in ath6kl_usb_alloc_urb_from_pipe()" + }, + "CVE-2024-26687": { + "cmt_msg": "xen/events: close evtchn after mapping cleanup" + }, + "CVE-2020-29368": { + "cmt_msg": "mm: thp: make the THP mapcount atomic against __split_huge_pmd_locked()" + }, + "CVE-2020-12465": { + "cmt_msg": "mt76: fix array overflow on receiving too many fragments for a packet" + }, + "CVE-2020-12464": { + "cmt_msg": "USB: core: Fix free-while-in-use bug in the USB S-Glibrary" + }, + "CVE-2022-0002": { + "cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE" + }, + "CVE-2019-19965": { + "cmt_msg": "scsi: libsas: stop discovering if oob mode is disconnected" + }, + "CVE-2021-3752": { + "cmt_msg": "Bluetooth: fix use-after-free error in lock_sock_nested()" + }, + "CVE-2019-19966": { + "cmt_msg": "media: cpia2: Fix use-after-free in cpia2_exit" + }, + "CVE-2022-42703": { + "cmt_msg": "mm/rmap: Fix anon_vma->degree ambiguity leading to double-reuse" + }, + "CVE-2020-35508": { + "cmt_msg": "fork: fix copy_process(CLONE_PARENT) race with the exiting ->real_parent" + }, + "CVE-2023-52615": { + "cmt_msg": "hwrng: core - Fix page fault dead lock on mmap-ed hwrng" + }, + "CVE-2022-2503": { + "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag" + }, + "CVE-2023-52617": { + "cmt_msg": "PCI: switchtec: Fix stdev_release() crash after surprise hot remove" + }, + "CVE-2023-52474": { + "cmt_msg": "IB/hfi1: Fix bugs with non-PAGE_SIZE-end multi-iovec user SDMA requests" + }, + "CVE-2020-24587": { + "cmt_msg": "mac80211: prevent mixed key and fragment cache attacks" + }, + "CVE-2020-24586": { + "cmt_msg": "mac80211: prevent mixed key and fragment cache attacks" + }, + "CVE-2023-52612": { + "cmt_msg": "crypto: scomp - fix req->dst buffer overflow" + }, + "CVE-2021-0129": { + "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical" + }, + "CVE-2019-20096": { + "cmt_msg": "dccp: Fix memleak in __feat_register_sp" + }, + "CVE-2022-47520": { + "cmt_msg": "wifi: wilc1000: validate pairwise and authentication suite offsets" + }, + "CVE-2023-52618": { + "cmt_msg": "block/rnbd-srv: Check for unlikely string overflow" + }, + "CVE-2023-5717": { + "cmt_msg": "perf: Disallow mis-matched inherited group reads" + }, + "CVE-2022-3643": { + "cmt_msg": "xen/netback: Ensure protocol headers don't fall in the non-linear area" + }, + "CVE-2021-3444": { + "cmt_msg": "bpf: Fix truncation handling for mod32 dst reg wrt zero" + }, + "CVE-2022-32250": { + "cmt_msg": "netfilter: nf_tables: disallow non-stateful expression in sets earlier" + }, + "CVE-2019-9506": { + "cmt_msg": "Bluetooth: Fix faulty expression for minimum encryption key size check" + }, + "CVE-2019-9500": { + "cmt_msg": "brcmfmac: assure SSID length from firmware is limited" + }, + "CVE-2019-9503": { + "cmt_msg": "brcmfmac: add subtype check for event handling in data path" + }, + "CVE-2020-36158": { + "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_cmd_802_11_ad_hoc_start" + }, + "CVE-2023-3159": { + "cmt_msg": "firewire: fix potential uaf in outbound_phy_packet_callback()" + }, + "CVE-2022-0480": { + "cmt_msg": "memcg: enable accounting for file lock caches" + }, + "CVE-2022-0487": { + "cmt_msg": "moxart: fix potential use-after-free on remove path" + }, + "CVE-2023-52429": { + "cmt_msg": "dm: limit the number of targets and parameter size area" + }, + "CVE-2021-28964": { + "cmt_msg": "btrfs: fix race when cloning extent buffer during rewind of an old root" + }, + "CVE-2021-47059": { + "cmt_msg": "crypto: sun8i-ss - fix result memory leak on error path" + }, + "CVE-2022-23825": { + "cmt_msg": "" + }, + "CVE-2021-3847": { + "cmt_msg": "" + }, + "CVE-2020-35501": { + "cmt_msg": "" + }, + "CVE-2018-20784": { + "cmt_msg": "sched/fair: Fix infinite loop in update_blocked_averages() by reverting a9e7f6544b9c" + }, + "CVE-2019-10124": { + "cmt_msg": "mm: hwpoison: fix thp split handing in soft_offline_in_use_page()" + }, + "CVE-2021-47054": { + "cmt_msg": "bus: qcom: Put child node before return" + }, + "CVE-2021-47112": { + "cmt_msg": "x86/kvm: Teardown PV features on boot CPU as well" + }, + "CVE-2021-47113": { + "cmt_msg": "btrfs: abort in rename_exchange if we fail to insert the second ref" + }, + "CVE-2021-47110": { + "cmt_msg": "x86/kvm: Disable kvmclock on all CPUs on shutdown" + }, + "CVE-2019-9245": { + "cmt_msg": "f2fs: sanity check of xattr entry size" + }, + "CVE-2021-47116": { + "cmt_msg": "ext4: fix memory leak in ext4_mb_init_backend on error path." + }, + "CVE-2021-47117": { + "cmt_msg": "ext4: fix bug on in ext4_es_cache_extent as ext4_split_extent_at failed" + }, + "CVE-2021-47114": { + "cmt_msg": "ocfs2: fix data corruption by fallocate" + }, + "CVE-2023-2162": { + "cmt_msg": "scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress" + }, + "CVE-2022-21125": { + "cmt_msg": "x86/speculation/mmio: Reuse SRBDS mitigation for SBDS" + }, + "CVE-2021-47118": { + "cmt_msg": "pid: take a reference when initializing `cad_pid`" + }, + "CVE-2021-46970": { + "cmt_msg": "bus: mhi: pci_generic: Remove WQ_MEM_RECLAIM flag from state workqueue" + }, + "CVE-2019-19241": { + "cmt_msg": "io_uring: async workers should inherit the user creds" + }, + "CVE-2022-40307": { + "cmt_msg": "efi: capsule-loader: Fix use-after-free in efi_capsule_write" + }, + "CVE-2022-21123": { + "cmt_msg": "x86/speculation/mmio: Add mitigation for Processor MMIO Stale Data" + }, + "CVE-2021-28688": { + "cmt_msg": "xen-blkback: don't leak persistent grants from xen_blkbk_map()" + }, + "CVE-2021-39686": { + "cmt_msg": "binder: use euid from cred instead of using task" + }, + "CVE-2021-39685": { + "cmt_msg": "USB: gadget: detect too-big endpoint 0 requests" + }, + "CVE-2023-6535": { + "cmt_msg": "" + }, + "CVE-2021-43975": { + "cmt_msg": "atlantic: Fix OOB read and write in hw_atl_utils_fw_rpc_wait" + }, + "CVE-2021-43976": { + "cmt_msg": "mwifiex: Fix skb_over_panic in mwifiex_usb_recv()" + }, + "CVE-2021-1048": { + "cmt_msg": "fix regression in \"epoll: Keep a reference on files added to the check list\"" + }, + "CVE-2019-10207": { + "cmt_msg": "Bluetooth: hci_uart: check for missing tty operations" + }, + "CVE-2020-12114": { + "cmt_msg": "make struct mountpoint bear the dentry reference to mountpoint, not struct mount" + }, + "CVE-2023-0459": { + "cmt_msg": "uaccess: Add speculation barrier to copy_from_user()" + }, + "CVE-2023-0458": { + "cmt_msg": "prlimit: do_prlimit needs to have a speculation check" + }, + "CVE-2023-52565": { + "cmt_msg": "media: uvcvideo: Fix OOB read" + }, + "CVE-2023-0597": { + "cmt_msg": "x86/mm: Randomize per-cpu entry area" + }, + "CVE-2019-12379": { + "cmt_msg": "consolemap: Fix a memory leaking bug in drivers/tty/vt/consolemap.c" + }, + "CVE-2019-12378": { + "cmt_msg": "ipv6_sockglue: Fix a missing-check bug in ip6_ra_control()" + }, + "CVE-2021-3744": { + "cmt_msg": "crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd()" + }, + "CVE-2021-30002": { + "cmt_msg": "media: v4l: ioctl: Fix memory leak in video_usercopy" + }, + "CVE-2021-3743": { + "cmt_msg": "net: qrtr: fix OOB Read in qrtr_endpoint_post" + }, + "CVE-2021-0941": { + "cmt_msg": "bpf: Remove MTU check in __bpf_skb_max_len" + }, + "CVE-2022-2586": { + "cmt_msg": "netfilter: nf_tables: do not allow SET_ID to refer to another table" + }, + "CVE-2020-15802": { + "cmt_msg": "" + }, + "CVE-2024-26597": { + "cmt_msg": "net: qualcomm: rmnet: fix global oob in rmnet_policy" + }, + "CVE-2023-6610": { + "cmt_msg": "smb: client: fix potential OOB in smb2_dump_detail()" + }, + "CVE-2023-2483": { + "cmt_msg": "net: qcom/emac: Fix use after free bug in emac_remove due to race condition" + }, + "CVE-2019-3460": { + "cmt_msg": "Bluetooth: Check L2CAP option sizes returned from l2cap_get_conf_opt" + }, + "CVE-2022-3636": { + "cmt_msg": "net: ethernet: mtk_eth_soc: use after free in __mtk_ppe_check_skb()" + }, + "CVE-2022-3635": { + "cmt_msg": "atm: idt77252: fix use-after-free bugs caused by tst_timer" + }, + "CVE-2021-34556": { + "cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4" + }, + "CVE-2021-47056": { + "cmt_msg": "crypto: qat - ADF_STATUS_PF_RUNNING should be set after adf_dev_init" + }, + "CVE-2019-15902": { + "cmt_msg": "unknown" + }, + "CVE-2022-40982": { + "cmt_msg": "x86/speculation: Add Gather Data Sampling mitigation" + }, + "CVE-2022-3202": { + "cmt_msg": "jfs: prevent NULL deref in diFree" + }, + "CVE-2024-25739": { + "cmt_msg": "" + }, + "CVE-2021-47028": { + "cmt_msg": "mt76: mt7915: fix txrate reporting" + }, + "CVE-2023-52511": { + "cmt_msg": "spi: sun6i: reduce DMA RX transfer width to single byte" + }, + "CVE-2019-11085": { + "cmt_msg": "drm/i915/gvt: Fix mmap range check" + }, + "CVE-2024-24861": { + "cmt_msg": "media: xc4000: Fix atomicity violation in xc4000_get_frequency" + }, + "CVE-2019-11477": { + "cmt_msg": "tcp: limit payload size of sacked skbs" + }, + "CVE-2023-39189": { + "cmt_msg": "netfilter: nfnetlink_osf: avoid OOB read" + }, + "CVE-2021-46908": { + "cmt_msg": "bpf: Use correct permission flag for mixed signed bounds arithmetic" + }, + "CVE-2021-46909": { + "cmt_msg": "ARM: footbridge: fix PCI interrupt mapping" + }, + "CVE-2018-14615": { + "cmt_msg": "f2fs: fix to do sanity check with i_extra_isize" + }, + "CVE-2018-14614": { + "cmt_msg": "f2fs: fix to do sanity check with cp_pack_start_sum" + }, + "CVE-2018-14617": { + "cmt_msg": "hfsplus: fix NULL dereference in hfsplus_lookup()" + }, + "CVE-2019-11478": { + "cmt_msg": "tcp: tcp_fragment() should apply sane memory limits" + }, + "CVE-2018-14611": { + "cmt_msg": "btrfs: validate type when reading a chunk" + }, + "CVE-2018-14610": { + "cmt_msg": "btrfs: Check that each block group has corresponding chunk at mount time" + }, + "CVE-2018-14613": { + "cmt_msg": "btrfs: tree-checker: Verify block_group_item" + }, + "CVE-2018-14612": { + "cmt_msg": "btrfs: tree-checker: Detect invalid and empty essential trees" + }, + "CVE-2020-26145": { + "cmt_msg": "ath10k: drop fragments with multicast DA for PCIe" + }, + "CVE-2023-51782": { + "cmt_msg": "net/rose: Fix Use-After-Free in rose_ioctl" + }, + "CVE-2020-26147": { + "cmt_msg": "mac80211: assure all fragments are encrypted" + }, + "CVE-2018-19854": { + "cmt_msg": "crypto: user - fix leaking uninitialized memory to userspace" + }, + "CVE-2020-26140": { + "cmt_msg": "" + }, + "CVE-2020-26143": { + "cmt_msg": "" + }, + "CVE-2020-26142": { + "cmt_msg": "" + }, + "CVE-2019-17053": { + "cmt_msg": "ieee802154: enforce CAP_NET_RAW for raw sockets" + }, + "CVE-2019-17052": { + "cmt_msg": "ax25: enforce CAP_NET_RAW for raw sockets" + }, + "CVE-2023-1076": { + "cmt_msg": "tun: tun_chr_open(): correctly initialize socket uid" + }, + "CVE-2023-1077": { + "cmt_msg": "sched/rt: pick_next_rt_entity(): check list_entry" + }, + "CVE-2020-27418": { + "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region" + }, + "CVE-2019-17056": { + "cmt_msg": "nfc: enforce CAP_NET_RAW for raw sockets" + }, + "CVE-2019-17055": { + "cmt_msg": "mISDN: enforce CAP_NET_RAW for raw sockets" + }, + "CVE-2019-17054": { + "cmt_msg": "appletalk: enforce CAP_NET_RAW for raw sockets" + }, + "CVE-2023-52527": { + "cmt_msg": "ipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data()" + }, + "CVE-2024-26745": { + "cmt_msg": "powerpc/pseries/iommu: IOMMU table is not initialized for kdump over SR-IOV" + }, + "CVE-2023-51042": { + "cmt_msg": "drm/amdgpu: Fix potential fence use-after-free v2" + }, + "CVE-2018-13096": { + "cmt_msg": "f2fs: fix to do sanity check with node footer and iblocks" + }, + "CVE-2018-13097": { + "cmt_msg": "f2fs: fix to do sanity check with user_block_count" + }, + "CVE-2018-13095": { + "cmt_msg": "xfs: More robust inode extent count validation" + }, + "CVE-2020-29661": { + "cmt_msg": "tty: Fix ->pgrp locking in tiocspgrp()" + }, + "CVE-2020-29660": { + "cmt_msg": "tty: Fix ->session locking" + }, + "CVE-2018-13098": { + "cmt_msg": "f2fs: fix to do sanity check with extra_attr feature" + }, + "CVE-2018-13099": { + "cmt_msg": "f2fs: fix to do sanity check with reserved blkaddr of inline inode" + }, + "CVE-2022-1734": { + "cmt_msg": "nfc: nfcmrvl: main: reorder destructive operations in nfcmrvl_nci_unregister_dev to avoid bugs" + }, + "CVE-2024-26748": { + "cmt_msg": "usb: cdns3: fix memory double free when handle zero packet" + }, + "CVE-2023-28772": { + "cmt_msg": "seq_buf: Fix overflow in seq_buf_putmem_hex()" + }, + "CVE-2019-19770": { + "cmt_msg": "blktrace: fix debugfs use after free" + }, + "CVE-2019-11884": { + "cmt_msg": "Bluetooth: hidp: fix buffer overflow" + }, + "CVE-2019-19078": { + "cmt_msg": "ath10k: fix memory leak" + }, + "CVE-2019-19077": { + "cmt_msg": "RDMA: Fix goto target to release the allocated memory" + }, + "CVE-2019-19075": { + "cmt_msg": "ieee802154: ca8210: prevent memory leak" + }, + "CVE-2019-19074": { + "cmt_msg": "ath9k: release allocated buffer if timed out" + }, + "CVE-2019-18683": { + "cmt_msg": "media: vivid: Fix wrong locking that causes race conditions on streaming stop" + }, + "CVE-2019-19072": { + "cmt_msg": "tracing: Have error path in predicate_parse() free its allocated memory" + }, + "CVE-2019-19071": { + "cmt_msg": "rsi: release skb if rsi_prepare_beacon fails" + }, + "CVE-2019-18680": { + "cmt_msg": "" + }, + "CVE-2024-26699": { + "cmt_msg": "drm/amd/display: Fix array-index-out-of-bounds in dcn35_clkmgr" + }, + "CVE-2022-23038": { + "cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()" + }, + "CVE-2022-23039": { + "cmt_msg": "xen/gntalloc: don't use gnttab_query_foreign_access()" + }, + "CVE-2022-20154": { + "cmt_msg": "sctp: use call_rcu to free endpoint" + }, + "CVE-2024-26691": { + "cmt_msg": "KVM: arm64: Fix circular locking dependency" + }, + "CVE-2021-27363": { + "cmt_msg": "scsi: iscsi: Restrict sessions and handles to admin capabilities" + }, + "CVE-2022-20158": { + "cmt_msg": "net/packet: fix slab-out-of-bounds access in packet_recvmsg()" + }, + "CVE-2022-23037": { + "cmt_msg": "xen/netfront: don't use gnttab_query_foreign_access() for mapped status" + }, + "CVE-2024-0564": { + "cmt_msg": "" + }, + "CVE-2024-26774": { + "cmt_msg": "ext4: avoid dividing by 0 in mb_update_avg_fragment_size() when block bitmap corrupt" + }, + "CVE-2024-26697": { + "cmt_msg": "nilfs2: fix data corruption in dsync block recovery for small block sizes" + }, + "CVE-2020-0404": { + "cmt_msg": "media: uvcvideo: Avoid cyclic entity chains due to malformed USB descriptors" + }, + "CVE-2019-15925": { + "cmt_msg": "net: hns3: add some error checking in hclge_tm module" + }, + "CVE-2019-15924": { + "cmt_msg": "fm10k: Fix a potential NULL pointer dereference" + }, + "CVE-2019-15538": { + "cmt_msg": "xfs: fix missing ILOCK unlock when xfs_setattr_nonsize fails due to EDQUOT" + }, + "CVE-2019-15926": { + "cmt_msg": "ath6kl: add some bounds checking" + }, + "CVE-2019-15921": { + "cmt_msg": "genetlink: Fix a memory leak on error path" + }, + "CVE-2019-16229": { + "cmt_msg": "drm/amdkfd: fix a potential NULL pointer dereference (v2)" + }, + "CVE-2019-14821": { + "cmt_msg": "KVM: coalesced_mmio: add bounds checking" + }, + "CVE-2020-12826": { + "cmt_msg": "signal: Extend exec_id to 64bits" + }, + "CVE-2019-18885": { + "cmt_msg": "btrfs: merge btrfs_find_device and find_device" + }, + "CVE-2021-42008": { + "cmt_msg": "net: 6pack: fix slab-out-of-bounds in decode_data" + }, + "CVE-2024-26789": { + "cmt_msg": "crypto: arm64/neonbs - fix out-of-bounds access on short input" + }, + "CVE-2022-39189": { + "cmt_msg": "KVM: x86: do not report a vCPU as preempted outside instruction boundaries" + }, + "CVE-2022-39188": { + "cmt_msg": "mmu_gather: Force tlb-flush VM_PFNMAP vmas" + }, + "CVE-2019-1125": { + "cmt_msg": "x86/speculation: Prepare entry code for Spectre v1 swapgs mitigations" + }, + "CVE-2019-15218": { + "cmt_msg": "media: usb: siano: Fix general protection fault in smsusb" + }, + "CVE-2019-15666": { + "cmt_msg": "xfrm: policy: Fix out-of-bound array accesses in __xfrm_policy_unlink" + }, + "CVE-2020-25641": { + "cmt_msg": "block: allow for_each_bvec to support zero len bvec" + }, + "CVE-2005-3660": { + "cmt_msg": "" + }, + "CVE-2019-15212": { + "cmt_msg": "USB: rio500: refuse more than one device at a time" + }, + "CVE-2019-15211": { + "cmt_msg": "media: radio-raremono: change devm_k*alloc to k*alloc" + }, + "CVE-2023-31084": { + "cmt_msg": "media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*()" + }, + "CVE-2019-15217": { + "cmt_msg": "media: usb:zr364xx:Fix KASAN:null-ptr-deref Read in zr364xx_vidioc_querycap" + }, + "CVE-2019-15216": { + "cmt_msg": "USB: yurex: Fix protection fault after device removal" + }, + "CVE-2019-15215": { + "cmt_msg": "media: cpia2_usb: first wake up, then free in disconnect" + }, + "CVE-2019-15214": { + "cmt_msg": "ALSA: core: Fix card races between register and disconnect" + }, + "CVE-2022-45885": { + "cmt_msg": "" + }, + "CVE-2020-24588": { + "cmt_msg": "cfg80211: mitigate A-MSDU aggregation attacks" + }, + "CVE-2021-33034": { + "cmt_msg": "Bluetooth: verify AMP hci_chan before amp_destroy" + }, + "CVE-2019-19922": { + "cmt_msg": "sched/fair: Fix low cpu usage with high throttling by removing expiration of cpu-local slices" + }, + "CVE-2021-33033": { + "cmt_msg": "cipso,calipso: resolve a number of problems with the DOI refcounts" + }, + "CVE-2019-19927": { + "cmt_msg": "drm/ttm: fix incrementing the page pointer for huge pages" + }, + "CVE-2020-27066": { + "cmt_msg": "xfrm: policy: Fix doulbe free in xfrm_policy_timer" + }, + "CVE-2020-27068": { + "cmt_msg": "cfg80211: add missing policy for NL80211_ATTR_STATUS_CODE" + }, + "CVE-2022-44032": { + "cmt_msg": "char: pcmcia: remove all the drivers" + }, + "CVE-2024-23307": { + "cmt_msg": "md/raid5: fix atomicity violation in raid5_cache_count" + }, + "CVE-2023-52598": { + "cmt_msg": "s390/ptrace: handle setting of fpc register correctly" + }, + "CVE-2020-8648": { + "cmt_msg": "vt: selection, close sel_buffer race" + }, + "CVE-2022-32296": { + "cmt_msg": "tcp: increase source port perturb table to 2^16" + }, + "CVE-2020-28974": { + "cmt_msg": "vt: Disable KD_FONT_OP_COPY" + }, + "CVE-2023-3567": { + "cmt_msg": "vc_screen: move load of struct vc_data pointer in vcs_read() to avoid UAF" + }, + "CVE-2019-20806": { + "cmt_msg": "media: tw5864: Fix possible NULL pointer dereference in tw5864_handle_frame" + }, + "CVE-2022-3028": { + "cmt_msg": "af_key: Do not call xfrm_probe_algs in parallel" + }, + "CVE-2020-0305": { + "cmt_msg": "chardev: Avoid potential use-after-free in 'chrdev_open()'" + }, + "CVE-2023-52584": { + "cmt_msg": "spmi: mediatek: Fix UAF on device remove" + }, + "CVE-2020-14304": { + "cmt_msg": "" + }, + "CVE-2010-5321": { + "cmt_msg": "" + }, + "CVE-2020-15393": { + "cmt_msg": "usb: usbtest: fix missing kfree(dev->buf) in usbtest_disconnect" + }, + "CVE-2023-23000": { + "cmt_msg": "phy: tegra: xusb: Fix return value of tegra_xusb_find_port_node function" + }, + "CVE-2019-19082": { + "cmt_msg": "drm/amd/display: prevent memory leak" + }, + "CVE-2024-26655": { + "cmt_msg": "Fix memory leak in posix_clock_open()" + }, + "CVE-2021-3564": { + "cmt_msg": "Bluetooth: fix the erroneous flush_work() order" + }, + "CVE-2023-3611": { + "cmt_msg": "net/sched: sch_qfq: account for stab overhead in qfq_enqueue" + }, + "CVE-2023-4132": { + "cmt_msg": "media: usb: siano: Fix warning due to null work_func_t function pointer" + }, + "CVE-2023-4133": { + "cmt_msg": "cxgb4: fix use after free bugs caused by circular dependency problem" + }, + "CVE-2020-26560": { + "cmt_msg": "" + }, + "CVE-2023-35823": { + "cmt_msg": "media: saa7134: fix use after free bug in saa7134_finidev due to race condition" + }, + "CVE-2023-4134": { + "cmt_msg": "Input: cyttsp4_core - change del_timer_sync() to timer_shutdown_sync()" + }, + "CVE-2018-18397": { + "cmt_msg": "userfaultfd: use ENOENT instead of EFAULT if the atomic copy user fails" + }, + "CVE-2023-42752": { + "cmt_msg": "igmp: limit igmpv3_newpack() packet size to IP_MAX_MTU" + }, + "CVE-2018-12127": { + "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" + }, + "CVE-2018-12126": { + "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" + }, + "CVE-2024-26751": { + "cmt_msg": "ARM: ep93xx: Add terminator to gpiod_lookup_table" + }, + "CVE-2022-23816": { + "cmt_msg": "x86/kvm/vmx: Make noinstr clean" + }, + "CVE-2023-37454": { + "cmt_msg": "" + }, + "CVE-2021-3892": { + "cmt_msg": "" + }, + "CVE-2022-2978": { + "cmt_msg": "fs: fix UAF/GPF bug in nilfs_mdt_destroy" + }, + "CVE-2022-20572": { + "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag" + }, + "CVE-2023-39194": { + "cmt_msg": "net: xfrm: Fix xfrm_address_filter OOB read" + }, + "CVE-2023-2002": { + "cmt_msg": "bluetooth: Perform careful capability checks in hci_sock_ioctl()" + }, + "CVE-2023-39197": { + "cmt_msg": "netfilter: conntrack: dccp: copy entire header to stack buffer, not just basic one" + }, + "CVE-2023-52489": { + "cmt_msg": "mm/sparsemem: fix race in accessing memory_section->usage" + }, + "CVE-2019-10126": { + "cmt_msg": "mwifiex: Fix heap overflow in mwifiex_uap_parse_tail_ies()" + }, + "CVE-2019-13631": { + "cmt_msg": "Input: gtco - bounds check collection indent level" + }, + "CVE-2023-52469": { + "cmt_msg": "drivers/amd/pm: fix a use-after-free in kv_parse_power_table" + }, + "CVE-2024-26752": { + "cmt_msg": "l2tp: pass correct message length to ip6_append_data" + }, + "CVE-2021-47063": { + "cmt_msg": "drm: bridge/panel: Cleanup connector on bridge detach" + }, + "CVE-2020-13974": { + "cmt_msg": "vt: keyboard: avoid signed integer overflow in k_ascii" + }, + "CVE-2021-4083": { + "cmt_msg": "fget: check that the fd still exists after getting a ref to it" + }, + "CVE-2023-33288": { + "cmt_msg": "power: supply: bq24190: Fix use after free bug in bq24190_remove due to race condition" + }, + "CVE-2022-36402": { + "cmt_msg": "drm/vmwgfx: Fix shader stage validation" + }, + "CVE-2023-52484": { + "cmt_msg": "iommu/arm-smmu-v3: Fix soft lockup triggered by arm_smmu_mm_invalidate_range" + }, + "CVE-2022-29900": { + "cmt_msg": "x86/kvm/vmx: Make noinstr clean" + }, + "CVE-2022-29901": { + "cmt_msg": "x86/kvm/vmx: Make noinstr clean" + }, + "CVE-2021-4197": { + "cmt_msg": "cgroup: Use open-time credentials for process migraton perm checks" + }, + "CVE-2019-19227": { + "cmt_msg": "appletalk: Fix potential NULL pointer dereference in unregister_snap_client" + }, + "CVE-2020-10751": { + "cmt_msg": "selinux: properly handle multiple messages in selinux_netlink_send()" + }, + "CVE-2019-9162": { + "cmt_msg": "netfilter: nf_nat_snmp_basic: add missing length checks in ASN.1 cbs" + }, + "CVE-2024-26773": { + "cmt_msg": "ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found()" + }, + "CVE-2023-39192": { + "cmt_msg": "netfilter: xt_u32: validate user space input" + }, + "CVE-2020-10757": { + "cmt_msg": "mm: Fix mremap not considering huge pmd devmap" + }, + "CVE-2018-20511": { + "cmt_msg": "net/appletalk: fix minor pointer leak to userspace in SIOCFINDIPDDPRT" + }, + "CVE-2023-52481": { + "cmt_msg": "arm64: errata: Add Cortex-A520 speculative unprivileged load workaround" + }, + "CVE-2022-20166": { + "cmt_msg": "drivers core: Use sysfs_emit and sysfs_emit_at for show(device *...) functions" + }, + "CVE-2020-15437": { + "cmt_msg": "serial: 8250: fix null-ptr-deref in serial8250_start_tx()" + }, + "CVE-2020-15436": { + "cmt_msg": "block: Fix use-after-free in blkdev_get()" + }, + "CVE-2022-1116": { + "cmt_msg": "" + }, + "CVE-2021-28660": { + "cmt_msg": "staging: rtl8188eu: prevent ->ssid overflow in rtw_wx_set_scan()" + }, + "CVE-2024-26645": { + "cmt_msg": "tracing: Ensure visibility when inserting an element into tracing_map" + }, + "CVE-2024-0775": { + "cmt_msg": "ext4: improve error recovery code paths in __ext4_remount()" + }, + "CVE-2020-8647": { + "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region" + }, + "CVE-2022-3564": { + "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free caused by l2cap_reassemble_sdu" + }, + "CVE-2019-0155": { + "cmt_msg": "drm/i915: Rename gen7 cmdparser tables" + }, + "CVE-2019-0154": { + "cmt_msg": "drm/i915: Lower RM timeout to avoid DSI hard hangs" + }, + "CVE-2023-35827": { + "cmt_msg": "ravb: Fix use-after-free issue in ravb_tx_timeout_work()" + }, + "CVE-2023-1859": { + "cmt_msg": "9p/xen : Fix use after free bug in xen_9pfs_front_remove due to race condition" + }, + "CVE-2023-52585": { + "cmt_msg": "drm/amdgpu: Fix possible NULL dereference in amdgpu_ras_query_error_status_helper()" + }, + "CVE-2020-36386": { + "cmt_msg": "Bluetooth: Fix slab-out-of-bounds read in hci_extended_inquiry_result_evt()" + }, + "CVE-2023-52587": { + "cmt_msg": "IB/ipoib: Fix mcast list locking" + }, + "CVE-2023-52586": { + "cmt_msg": "drm/msm/dpu: Add mutex lock in control vblank irq" + }, + "CVE-2021-47149": { + "cmt_msg": "net: fujitsu: fix potential null-ptr-deref" + }, + "CVE-2022-3566": { + "cmt_msg": "tcp: Fix data races around icsk->icsk_af_ops." + }, + "CVE-2022-3565": { + "cmt_msg": "mISDN: fix use-after-free bugs in l1oip timer handlers" + }, + "CVE-2021-47065": { + "cmt_msg": "rtw88: Fix array overrun in rtw_get_tx_power_params()" + }, + "CVE-2018-19407": { + "cmt_msg": "KVM: X86: Fix scan ioapic use-before-initialization" + }, + "CVE-2021-47144": { + "cmt_msg": "drm/amd/amdgpu: fix refcount leak" + }, + "CVE-2021-47147": { + "cmt_msg": "ptp: ocp: Fix a resource leak in an error handling path" + }, + "CVE-2020-36385": { + "cmt_msg": "RDMA/ucma: Rework ucma_migrate_id() to avoid races with destroy" + }, + "CVE-2022-3628": { + "cmt_msg": "wifi: brcmfmac: Fix potential buffer overflow in brcmf_fweh_event_worker()" + }, + "CVE-2021-47140": { + "cmt_msg": "iommu/amd: Clear DMA ops when switching domain" + }, + "CVE-2021-47143": { + "cmt_msg": "net/smc: remove device from smcd_dev_list after failed device_add()" + }, + "CVE-2021-47142": { + "cmt_msg": "drm/amdgpu: Fix a use-after-free" + }, + "CVE-2021-47145": { + "cmt_msg": "btrfs: do not BUG_ON in link_to_fixup_dir" + }, + "CVE-2021-46941": { + "cmt_msg": "usb: dwc3: core: Do core softreset when switch mode" + }, + "CVE-2020-0009": { + "cmt_msg": "staging: android: ashmem: Disallow ashmem memory from being remapped" + }, + "CVE-2023-52340": { + "cmt_msg": "ipv6: remove max_size check inline with ipv4" + }, + "CVE-2023-52589": { + "cmt_msg": "media: rkisp1: Fix IRQ disable race issue" + }, + "CVE-2020-7053": { + "cmt_msg": "drm/i915: Introduce a mutex for file_priv->context_idr" + }, + "CVE-2023-28466": { + "cmt_msg": "net: tls: fix possible race condition between do_tls_getsockopt_conf() and do_tls_setsockopt_conf()" + }, + "CVE-2023-52588": { + "cmt_msg": "f2fs: fix to tag gcing flag on page during block migration" + }, + "CVE-2019-14615": { + "cmt_msg": "drm/i915/gen9: Clear residual context state on context switch" + }, + "CVE-2018-16871": { + "cmt_msg": "nfsd: COPY and CLONE operations require the saved filehandle to be set" + }, + "CVE-2023-52578": { + "cmt_msg": "net: bridge: use DEV_STATS_INC()" + }, + "CVE-2021-47052": { + "cmt_msg": "crypto: sa2ul - Fix memory leak of rxd" + }, + "CVE-2021-3635": { + "cmt_msg": "netfilter: nf_tables: fix flowtable list del corruption" + }, + "CVE-2019-13648": { + "cmt_msg": "powerpc/tm: Fix oops on sigreturn on systems without TM" + }, + "CVE-2023-0030": { + "cmt_msg": "drm/nouveau/mmu: add more general vmm free/node handling functions" + }, + "CVE-2020-16120": { + "cmt_msg": "ovl: switch to mounter creds in readdir" + }, + "CVE-2019-11599": { + "cmt_msg": "coredump: fix race condition between mmget_not_zero()/get_task_mm() and core dumping" + }, + "CVE-2018-16658": { + "cmt_msg": "cdrom: Fix info leak/OOB read in cdrom_ioctl_drive_status" + }, + "CVE-2022-29581": { + "cmt_msg": "net/sched: cls_u32: fix netns refcount changes in u32_change()" + }, + "CVE-2022-1204": { + "cmt_msg": "ax25: Fix refcount leaks caused by ax25_cb_del()" + }, + "CVE-2019-2101": { + "cmt_msg": "media: uvcvideo: Fix 'type' check leading to overflow" + }, + "CVE-2019-17666": { + "cmt_msg": "rtlwifi: Fix potential overflow on P2P code" + }, + "CVE-2018-15471": { + "cmt_msg": "xen-netback: fix input validation in xenvif_set_hash_mapping()" + }, + "CVE-2016-10723": { + "cmt_msg": "mm, oom: remove sleep from under oom_lock" + }, + "CVE-2019-19036": { + "cmt_msg": "btrfs: Detect unbalanced tree with empty leaf before crashing btree operations" + }, + "CVE-2019-3459": { + "cmt_msg": "Bluetooth: Verify that l2cap_get_conf_opt provides large enough buffer" + }, + "CVE-2020-11494": { + "cmt_msg": "slcan: Don't transmit uninitialized stack data in padding" + }, + "CVE-2019-19039": { + "cmt_msg": "btrfs: Don't submit any btree write bio if the fs has errors" + }, + "CVE-2020-0444": { + "cmt_msg": "audit: fix error handling in audit_data_to_entry()" + }, + "CVE-2022-1419": { + "cmt_msg": "drm/vgem: Close use-after-free race in vgem_gem_create" + }, + "CVE-2021-47125": { + "cmt_msg": "sch_htb: fix refcount leak in htb_parent_to_leaf_offload" + }, + "CVE-2024-26797": { + "cmt_msg": "drm/amd/display: Prevent potential buffer overflow in map_hw_resources" + }, + "CVE-2022-1836": { + "cmt_msg": "floppy: disable FDRAWCMD by default" + }, + "CVE-2020-11884": { + "cmt_msg": "s390/mm: fix page table upgrade vs 2ndary address mode accesses" + }, + "CVE-2024-26793": { + "cmt_msg": "gtp: fix use-after-free and null-ptr-deref in gtp_newlink()" + }, + "CVE-2023-52530": { + "cmt_msg": "wifi: mac80211: fix potential key use-after-free" + }, + "CVE-2021-32078": { + "cmt_msg": "ARM: footbridge: remove personal server platform" + }, + "CVE-2023-52532": { + "cmt_msg": "net: mana: Fix TX CQE error handling" + }, + "CVE-2022-30594": { + "cmt_msg": "ptrace: Check PTRACE_O_SUSPEND_SECCOMP permission on PTRACE_SEIZE" + }, + "CVE-2024-26798": { + "cmt_msg": "fbcon: always restore the old font data in fbcon_do_set_font()" + }, + "CVE-2022-4662": { + "cmt_msg": "USB: core: Prevent nested device-reset calls" + }, + "CVE-2019-11833": { + "cmt_msg": "ext4: zero out the unused memory region in the extent tree block" + }, + "CVE-2021-38205": { + "cmt_msg": "net: xilinx_emaclite: Do not print real IOMEM pointer" + }, + "CVE-2020-27835": { + "cmt_msg": "IB/hfi1: Ensure correct mm is used at all times" + }, + "CVE-2020-27830": { + "cmt_msg": "speakup: Reject setting the speakup line discipline outside of speakup" + }, + "CVE-2020-0255": { + "cmt_msg": "selinux: properly handle multiple messages in selinux_netlink_send()" + }, + "CVE-2023-35001": { + "cmt_msg": "netfilter: nf_tables: prevent OOB access in nft_byteorder_eval" + }, + "CVE-2022-27666": { + "cmt_msg": "esp: Fix possible buffer overflow in ESP transformation" + }, + "CVE-2021-38208": { + "cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect" + }, + "CVE-2019-2213": { + "cmt_msg": "binder: fix possible UAF when freeing buffer" + }, + "CVE-2024-26677": { + "cmt_msg": "rxrpc: Fix delayed ACKs to not set the reference serial number" + }, + "CVE-2020-25211": { + "cmt_msg": "netfilter: ctnetlink: add a range check for l3/l4 protonum" + }, + "CVE-2020-25212": { + "cmt_msg": "nfs: Fix getxattr kernel panic and memory overflow" + }, + "CVE-2020-26556": { + "cmt_msg": "" + }, + "CVE-2020-26557": { + "cmt_msg": "" + }, + "CVE-2022-48619": { + "cmt_msg": "Input: add bounds checking to input_set_capability()" + }, + "CVE-2020-26555": { + "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical" + }, + "CVE-2024-26776": { + "cmt_msg": "spi: hisi-sfc-v3xx: Return IRQ_NONE if no interrupts were detected" + }, + "CVE-2024-26777": { + "cmt_msg": "fbdev: sis: Error out if pixclock equals zero" + }, + "CVE-2019-20794": { + "cmt_msg": "" + }, + "CVE-2020-26559": { + "cmt_msg": "" + }, + "CVE-2023-3397": { + "cmt_msg": "" + }, + "CVE-2020-36775": { + "cmt_msg": "f2fs: fix to avoid potential deadlock" + }, + "CVE-2024-26679": { + "cmt_msg": "inet: read sk->sk_family once in inet_recv_error()" + }, + "CVE-2023-52478": { + "cmt_msg": "HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect" + }, + "CVE-2018-1128": { + "cmt_msg": "libceph: add authorizer challenge" + }, + "CVE-2018-1129": { + "cmt_msg": "libceph: implement CEPHX_V2 calculation mode" + }, + "CVE-2021-47128": { + "cmt_msg": "bpf, lockdown, audit: Fix buggy SELinux lockdown permission checks" + }, + "CVE-2022-26365": { + "cmt_msg": "xen/blkfront: fix leaking data in shared pages" + }, + "CVE-2023-52458": { + "cmt_msg": "block: add check that partition length needs to be aligned with block size" + }, + "CVE-2018-20854": { + "cmt_msg": "phy: ocelot-serdes: fix out-of-bounds read" + }, + "CVE-2018-20855": { + "cmt_msg": "IB/mlx5: Fix leaking stack memory to userspace" + }, + "CVE-2018-20856": { + "cmt_msg": "block: blk_init_allocated_queue() set q->fq as NULL in the fail case" + }, + "CVE-2023-28746": { + "cmt_msg": "x86/mmio: Disable KVM mitigation when X86_FEATURE_CLEAR_CPU_BUF is set" + }, + "CVE-2023-52451": { + "cmt_msg": "powerpc/pseries/memhp: Fix access beyond end of drmem array" + }, + "CVE-2019-19046": { + "cmt_msg": "ipmi: Fix memory leak in __ipmi_bmc_register" + }, + "CVE-2019-19045": { + "cmt_msg": "net/mlx5: prevent memory leak in mlx5_fpga_conn_create_cq" + }, + "CVE-2021-47086": { + "cmt_msg": "phonet/pep: refuse to enable an unbound pipe" + }, + "CVE-2022-2961": { + "cmt_msg": "" + }, + "CVE-2024-26602": { + "cmt_msg": "sched/membarrier: reduce the ability to hammer on sys_membarrier" + }, + "CVE-2023-2176": { + "cmt_msg": "RDMA/core: Refactor rdma_bind_addr" + }, + "CVE-2024-1086": { + "cmt_msg": "netfilter: nf_tables: reject QUEUE/DROP verdict parameters" + }, + "CVE-2024-22386": { + "cmt_msg": "" + }, + "CVE-2019-9466": { + "cmt_msg": "brcmfmac: add subtype check for event handling in data path" + }, + "CVE-2019-19048": { + "cmt_msg": "virt: vbox: fix memory leak in hgcm_call_preprocess_linaddr" + }, + "CVE-2019-19049": { + "cmt_msg": "of: unittest: fix memory leak in unittest_data_add" + }, + "CVE-2022-0644": { + "cmt_msg": "vfs: check fd has read access in kernel_read_file_from_fd()" + }, + "CVE-2020-27784": { + "cmt_msg": "usb: gadget: function: printer: fix use-after-free in __lock_acquire" + }, + "CVE-2018-13053": { + "cmt_msg": "alarmtimer: Prevent overflow for relative nanosleep" + }, + "CVE-2020-27786": { + "cmt_msg": "ALSA: rawmidi: Fix racy buffer resize under concurrent accesses" + }, + "CVE-2019-14816": { + "cmt_msg": "mwifiex: Fix three heap overflow at parsing element in cfg80211_ap_settings" + }, + "CVE-2019-14814": { + "cmt_msg": "mwifiex: Fix three heap overflow at parsing element in cfg80211_ap_settings" + }, + "CVE-2019-14815": { + "cmt_msg": "mwifiex: Fix three heap overflow at parsing element in cfg80211_ap_settings" + }, + "CVE-2021-47121": { + "cmt_msg": "net: caif: fix memory leak in cfusbl_device_notify" + }, + "CVE-2023-6240": { + "cmt_msg": "" + }, + "CVE-2023-23559": { + "cmt_msg": "wifi: rndis_wlan: Prevent buffer overflow in rndis_query_oid" + }, + "CVE-2020-10720": { + "cmt_msg": "net-gro: fix use-after-free read in napi_gro_frags()" + }, + "CVE-2024-26739": { + "cmt_msg": "net/sched: act_mirred: don't override retval if we already lost the skb" + }, + "CVE-2022-0382": { + "cmt_msg": "net ticp:fix a kernel-infoleak in __tipc_sendmsg()" + }, + "CVE-2023-32233": { + "cmt_msg": "netfilter: nf_tables: deactivate anonymous set from preparation phase" + }, + "CVE-2024-26685": { + "cmt_msg": "nilfs2: fix potential bug in end_buffer_async_write" + }, + "CVE-2020-25672": { + "cmt_msg": "nfc: fix memory leak in llcp_sock_connect()" + }, + "CVE-2019-9455": { + "cmt_msg": "media: videobuf2-v4l2: drop WARN_ON in vb2_warn_zero_bytesused()" + }, + "CVE-2020-25670": { + "cmt_msg": "nfc: fix refcount leak in llcp_sock_bind()" + }, + "CVE-2020-25671": { + "cmt_msg": "nfc: fix refcount leak in llcp_sock_connect()" + }, + "CVE-2018-21008": { + "cmt_msg": "rsi: add fix for crash during assertions" + }, + "CVE-2019-15223": { + "cmt_msg": "ALSA: line6: Assure canceling delayed work at disconnection" + }, + "CVE-2019-19813": { + "cmt_msg": "btrfs: inode: Verify inode mode to avoid NULL pointer dereference" + }, + "CVE-2019-15221": { + "cmt_msg": "ALSA: line6: Fix write on zero-sized buffer" + }, + "CVE-2019-19815": { + "cmt_msg": "f2fs: support swap file w/ DIO" + }, + "CVE-2019-19814": { + "cmt_msg": "" + }, + "CVE-2020-29371": { + "cmt_msg": "romfs: fix uninitialized memory leak in romfs_dev_read()" + }, + "CVE-2019-19816": { + "cmt_msg": "btrfs: inode: Verify inode mode to avoid NULL pointer dereference" + }, + "CVE-2023-1118": { + "cmt_msg": "media: rc: Fix use-after-free bugs caused by ene_tx_irqsim()" + }, + "CVE-2021-47124": { + "cmt_msg": "io_uring: fix link timeout refs" + }, + "CVE-2018-18710": { + "cmt_msg": "cdrom: fix improper type cast, which can leat to information leak." + }, + "CVE-2019-5108": { + "cmt_msg": "mac80211: Do not send Layer 2 Update frame before authorization" + }, + "CVE-2022-0001": { + "cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE" + }, + "CVE-2022-1012": { + "cmt_msg": "secure_seq: use the 64 bits of the siphash for port offset calculation" + }, + "CVE-2023-52620": { + "cmt_msg": "netfilter: nf_tables: disallow timeout for anonymous sets" + }, + "CVE-2022-38096": { + "cmt_msg": "" + }, + "CVE-2023-52622": { + "cmt_msg": "ext4: avoid online resizing failures due to oversized flex bg" + }, + "CVE-2020-8649": { + "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region" + }, + "CVE-2023-52619": { + "cmt_msg": "pstore/ram: Fix crash when setting number of cpus to an odd number" + }, + "CVE-2023-52625": { + "cmt_msg": "drm/amd/display: Refactor DMCUB enter/exit idle interface" + }, + "CVE-2023-52641": { + "cmt_msg": "fs/ntfs3: Add NULL ptr dereference checking at the end of attr_allocate_frame()" + }, + "CVE-2023-52628": { + "cmt_msg": "netfilter: nftables: exthdr: fix 4-byte stack OOB write" + }, + "CVE-2020-12656": { + "cmt_msg": "sunrpc: check that domain table is empty at module unload." + }, + "CVE-2020-14356": { + "cmt_msg": "cgroup: fix cgroup_sk_alloc() for sk_clone_lock()" + }, + "CVE-2021-26931": { + "cmt_msg": "xen-blkback: don't \"handle\" error by BUG()" + }, + "CVE-2021-26930": { + "cmt_msg": "xen-blkback: fix error handling in xen_blkbk_map()" + }, + "CVE-2021-42252": { + "cmt_msg": "soc: aspeed: lpc-ctrl: Fix boundary check for mmap" + }, + "CVE-2021-26932": { + "cmt_msg": "Xen/x86: don't bail early from clear_foreign_p2m_mapping()" + }, + "CVE-2024-25740": { + "cmt_msg": "" + }, + "CVE-2023-3141": { + "cmt_msg": "memstick: r592: Fix UAF bug in r592_remove due to race condition" + }, + "CVE-2022-0492": { + "cmt_msg": "cgroup-v1: Require capabilities to set release_agent" + }, + "CVE-2020-12352": { + "cmt_msg": "Bluetooth: A2MP: Fix not initializing all members" + }, + "CVE-2020-12351": { + "cmt_msg": "Bluetooth: L2CAP: Fix calling sk_filter on non-socket based channel" + }, + "CVE-2020-12655": { + "cmt_msg": "xfs: add agf freeblocks verify in xfs_agf_verify" + }, + "CVE-2022-20132": { + "cmt_msg": "HID: add hid_is_usb() function to make it simpler for USB detection" + }, + "CVE-2022-0494": { + "cmt_msg": "block-map: add __GFP_ZERO flag for alloc_page in function bio_copy_kern" + }, + "CVE-2023-2269": { + "cmt_msg": "dm ioctl: fix nested locking in table_clear() to remove deadlock concern" + }, + "CVE-2020-26088": { + "cmt_msg": "net/nfc/rawsock.c: add CAP_NET_RAW check." + }, + "CVE-2022-3524": { + "cmt_msg": "tcp/udp: Fix memory leak in ipv6_renew_options()." + }, + "CVE-2022-3523": { + "cmt_msg": "mm/memory.c: fix race when faulting a device private page" + }, + "CVE-2022-3522": { + "cmt_msg": "mm/hugetlb: use hugetlb_pte_stable in migration race check" + }, + "CVE-2008-2544": { + "cmt_msg": "" + }, + "CVE-2021-3178": { + "cmt_msg": "nfsd4: readdirplus shouldn't return parent of export" + }, + "CVE-2021-47101": { + "cmt_msg": "asix: fix uninit-value in asix_mdio_read()" + }, + "CVE-2021-47100": { + "cmt_msg": "ipmi: Fix UAF when uninstall ipmi_si and ipmi_msghandler module" + }, + "CVE-2021-47103": { + "cmt_msg": "inet: fully convert sk->sk_rx_dst to RCU rules" + }, + "CVE-2018-7755": { + "cmt_msg": "floppy: Do not copy a kernel pointer to user memory in FDGETPRM ioctl" + }, + "CVE-2019-15031": { + "cmt_msg": "powerpc/tm: Fix restoring FP/VMX facility incorrectly on interrupts" + }, + "CVE-2019-15030": { + "cmt_msg": "powerpc/tm: Fix FP/VMX unavailable exceptions inside a transaction" + }, + "CVE-2019-11479": { + "cmt_msg": "tcp: add tcp_min_snd_mss sysctl" + }, + "CVE-2022-0330": { + "cmt_msg": "drm/i915: Flush TLBs before releasing backing store" + }, + "CVE-2007-3719": { + "cmt_msg": "" + }, + "CVE-2021-46988": { + "cmt_msg": "userfaultfd: release page in error path to avoid BUG_ON" + }, + "CVE-2024-26606": { + "cmt_msg": "binder: signal epoll threads of self-work" + }, + "CVE-2023-0590": { + "cmt_msg": "net: sched: fix race condition in qdisc_graft()" + }, + "CVE-2022-3567": { + "cmt_msg": "ipv6: Fix data races around sk->sk_prot." + }, + "CVE-2023-52583": { + "cmt_msg": "ceph: fix deadlock or deadcode of misusing dget()" + }, + "CVE-2022-4095": { + "cmt_msg": "staging: rtl8712: fix use after free bugs" + }, + "CVE-2022-45919": { + "cmt_msg": "media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221" + }, + "CVE-2019-19319": { + "cmt_msg": "ext4: protect journal inode's blocks using block_validity" + }, + "CVE-2024-26744": { + "cmt_msg": "RDMA/srpt: Support specifying the srpt_service_guid parameter" + }, + "CVE-2019-19462": { + "cmt_msg": "kernel/relay.c: handle alloc_percpu returning NULL in relay_open" + }, + "CVE-2023-30772": { + "cmt_msg": "power: supply: da9150: Fix use after free bug in da9150_charger_remove due to race condition" + }, + "CVE-2021-47119": { + "cmt_msg": "ext4: fix memory leak in ext4_fill_super" + }, + "CVE-2022-24958": { + "cmt_msg": "usb: gadget: don't release an existing dev->buf" + }, + "CVE-2023-1611": { + "cmt_msg": "btrfs: fix race between quota disable and quota assign ioctls" + }, + "CVE-2021-3772": { + "cmt_msg": "sctp: use init_tag from inithdr for ABORT chunk" + }, + "CVE-2021-3679": { + "cmt_msg": "tracing: Fix bug in rb_per_cpu_empty() that might cause deadloop." + }, + "CVE-2024-26656": { + "cmt_msg": "drm/amdgpu: fix use-after-free bug" + }, + "CVE-2024-26706": { + "cmt_msg": "parisc: Fix random data corruption from exception handler" + }, + "CVE-2023-52517": { + "cmt_msg": "spi: sun6i: fix race between DMA RX transfer completion and RX FIFO drain" + }, + "CVE-2021-39711": { + "cmt_msg": "bpf: fix panic due to oob in bpf_prog_test_run_skb" + }, + "CVE-2022-3629": { + "cmt_msg": "vsock: Fix memory leak in vsock_connect()" + }, + "CVE-2021-28715": { + "cmt_msg": "xen/netback: don't queue unlimited number of packages" + }, + "CVE-2021-28714": { + "cmt_msg": "xen/netback: fix rx queue stall detection" + }, + "CVE-2021-28713": { + "cmt_msg": "xen/console: harden hvc_xen against event channel storms" + }, + "CVE-2021-28712": { + "cmt_msg": "xen/netfront: harden netfront against event channel storms" + }, + "CVE-2021-28711": { + "cmt_msg": "xen/blkfront: harden blkfront against event channel storms" + }, + "CVE-2021-4157": { + "cmt_msg": "pNFS/flexfiles: fix incorrect size check in decode_nfs_fh()" + }, + "CVE-2022-2991": { + "cmt_msg": "remove the lightnvm subsystem" + }, + "CVE-2022-3621": { + "cmt_msg": "nilfs2: fix NULL pointer dereference at nilfs_bmap_lookup_at_level()" + }, + "CVE-2022-23960": { + "cmt_msg": "ARM: report Spectre v2 status through sysfs" + }, + "CVE-2023-51781": { + "cmt_msg": "appletalk: Fix Use-After-Free in atalk_ioctl" + }, + "CVE-2022-3624": { + "cmt_msg": "bonding: fix reference count leak in balance-alb mode" + }, + "CVE-2022-2588": { + "cmt_msg": "net_sched: cls_route: remove from list when handle is 0" + }, + "CVE-2021-39657": { + "cmt_msg": "scsi: ufs: Correct the LUN used in eh_device_reset_handler() callback" + }, + "CVE-2021-3669": { + "cmt_msg": "ipc: replace costly bailout check in sysvipc_find_ipc()" + }, + "CVE-2019-3701": { + "cmt_msg": "can: gw: ensure DLC boundaries after CAN frame modification" + }, + "CVE-2019-12984": { + "cmt_msg": "nfc: Ensure presence of required attributes in the deactivate_target handler" + }, + "CVE-2023-1095": { + "cmt_msg": "netfilter: nf_tables: fix null deref due to zeroed list head" + }, + "CVE-2019-11091": { + "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" + }, + "CVE-2022-3239": { + "cmt_msg": "media: em28xx: initialize refcount before kref_get" + }, + "CVE-2022-4543": { + "cmt_msg": "" + }, + "CVE-2023-52571": { + "cmt_msg": "power: supply: rk817: Fix node refcount leak" + }, + "CVE-2023-52572": { + "cmt_msg": "cifs: Fix UAF in cifs_demultiplex_thread()" + }, + "CVE-2020-15780": { + "cmt_msg": "ACPI: configfs: Disallow loading ACPI tables when locked down" + }, + "CVE-2023-4921": { + "cmt_msg": "net: sched: sch_qfq: Fix UAF in qfq_dequeue()" + }, + "CVE-2022-3424": { + "cmt_msg": "misc: sgi-gru: fix use-after-free error in gru_set_context_option, gru_fault and gru_handle_user_call_os" + }, + "CVE-2021-46965": { + "cmt_msg": "mtd: physmap: physmap-bt1-rom: Fix unintentional stack access" + }, + "CVE-2023-23455": { + "cmt_msg": "net: sched: atm: dont intepret cls results when asked to drop" + }, + "CVE-2023-1829": { + "cmt_msg": "net/sched: Retire tcindex classifier" + }, + "CVE-2021-46915": { + "cmt_msg": "netfilter: nft_limit: avoid possible divide error in nft_limit_init" + }, + "CVE-2019-18282": { + "cmt_msg": "net/flow_dissector: switch to siphash" + }, + "CVE-2021-34981": { + "cmt_msg": "Bluetooth: cmtp: fix file refcount when cmtp_attach_device fails" + }, + "CVE-2023-1670": { + "cmt_msg": "xirc2ps_cs: Fix use after free bug in xirc2ps_detach" + }, + "CVE-2018-14625": { + "cmt_msg": "vhost/vsock: fix use-after-free in network stack callers" + }, + "CVE-2023-4881": { + "cmt_msg": "netfilter: nftables: exthdr: fix 4-byte stack OOB write" + }, + "CVE-2020-24394": { + "cmt_msg": "nfsd: apply umask on fs without ACL support" + }, + "CVE-2024-26769": { + "cmt_msg": "nvmet-fc: avoid deadlock on delete association path" + }, + "CVE-2022-20148": { + "cmt_msg": "f2fs: fix UAF in f2fs_available_free_memory" + }, + "CVE-2024-26704": { + "cmt_msg": "ext4: fix double-free of blocks due to wrong extents moved_len" + }, + "CVE-2022-1786": { + "cmt_msg": "io_uring: remove io_identity" + }, + "CVE-2013-7445": { + "cmt_msg": "" + }, + "CVE-2023-32269": { + "cmt_msg": "netrom: Fix use-after-free caused by accept on already connected socket" + }, + "CVE-2018-18445": { + "cmt_msg": "bpf: 32-bit RSH verification must truncate input before the ALU op" + }, + "CVE-2023-34255": { + "cmt_msg": "xfs: verify buffer contents when we skip log replay" + }, + "CVE-2019-13233": { + "cmt_msg": "x86/insn-eval: Fix use-after-free access to LDT entry" + }, + "CVE-2024-26735": { + "cmt_msg": "ipv6: sr: fix possible use-after-free and null-ptr-deref" + }, + "CVE-2024-26738": { + "cmt_msg": "powerpc/pseries/iommu: DLPAR add doesn't completely initialize pci_controller" + }, + "CVE-2022-26966": { + "cmt_msg": "sr9700: sanity check for packet length" + }, + "CVE-2023-6931": { + "cmt_msg": "perf: Fix perf_event_validate_size()" + }, + "CVE-2020-14386": { + "cmt_msg": "net/packet: fix overflow in tpacket_rcv" + }, + "CVE-2021-34693": { + "cmt_msg": "can: bcm: fix infoleak in struct bcm_msg_head" + }, + "CVE-2020-14385": { + "cmt_msg": "xfs: fix boundary test in xfs_attr_shortform_verify" + }, + "CVE-2019-19767": { + "cmt_msg": "ext4: add more paranoia checking in ext4_expand_extra_isize handling" + }, + "CVE-2021-3656": { + "cmt_msg": "KVM: nSVM: always intercept VMLOAD/VMSAVE when nested (CVE-2021-3656)" + }, + "CVE-2020-14381": { + "cmt_msg": "futex: Fix inode life-time issue" + }, + "CVE-2019-19768": { + "cmt_msg": "blktrace: Protect q->blk_trace with RCU" + }, + "CVE-2022-3303": { + "cmt_msg": "ALSA: pcm: oss: Fix race at SNDCTL_DSP_SYNC" + }, + "CVE-2023-52443": { + "cmt_msg": "apparmor: avoid crash when parsed profile name is empty" + }, + "CVE-2022-20141": { + "cmt_msg": "igmp: Add ip_mc_list lock in ip_check_mc_rcu" + }, + "CVE-2020-25704": { + "cmt_msg": "perf/core: Fix a memory leak in perf_event_parse_addr_filter()" + }, + "CVE-2021-45095": { + "cmt_msg": "phonet: refcount leak in pep_sock_accep" + }, + "CVE-2023-23454": { + "cmt_msg": "net: sched: cbq: dont intepret cls results when asked to drop" + }, + "CVE-2021-37159": { + "cmt_msg": "usb: hso: fix error handling code of hso_create_net_device" + }, + "CVE-2024-26595": { + "cmt_msg": "mlxsw: spectrum_acl_tcam: Fix NULL pointer dereference in error path" + }, + "CVE-2023-52506": { + "cmt_msg": "LoongArch: Set all reserved memblocks on Node#0 at initialization" + }, + "CVE-2021-29154": { + "cmt_msg": "bpf, x86: Validate computation of branch displacements for x86-64" + }, + "CVE-2022-26373": { + "cmt_msg": "x86/speculation: Add RSB VM Exit protections" + }, + "CVE-2024-26801": { + "cmt_msg": "Bluetooth: Avoid potential use-after-free in hci_error_reset" + }, + "CVE-2020-16166": { + "cmt_msg": "random32: update the net random state on interrupt and activity" + }, + "CVE-2021-29155": { + "cmt_msg": "bpf: Use correct permission flag for mixed signed bounds arithmetic" + }, + "CVE-2021-33631": { + "cmt_msg": "ext4: fix kernel BUG in 'ext4_write_inline_data_end()'" + }, + "CVE-2019-15916": { + "cmt_msg": "net-sysfs: Fix mem leak in netdev_register_kobject" + }, + "CVE-2019-15917": { + "cmt_msg": "Bluetooth: hci_ldisc: Postpone HCI_UART_PROTO_READY bit set in hci_uart_set_proto()" + }, + "CVE-2019-15918": { + "cmt_msg": "cifs: Fix lease buffer length error" + }, + "CVE-2022-41218": { + "cmt_msg": "media: dvb-core: Fix UAF due to refcount races at releasing" + }, + "CVE-2021-46906": { + "cmt_msg": "HID: usbhid: fix info leak in hid_submit_ctrl" + }, + "CVE-2023-52444": { + "cmt_msg": "f2fs: fix to avoid dirent corruption" + }, + "CVE-2024-26768": { + "cmt_msg": "LoongArch: Change acpi_core_pic[NR_CPUS] to acpi_core_pic[MAX_CORE_PIC]" + }, + "CVE-2020-12362": { + "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" + }, + "CVE-2020-12363": { + "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" + }, + "CVE-2022-4129": { + "cmt_msg": "l2tp: Serialize access to sk_user_data with sk_callback_lock" + }, + "CVE-2023-3117": { + "cmt_msg": "netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE" + }, + "CVE-2022-28389": { + "cmt_msg": "can: mcba_usb: mcba_usb_start_xmit(): fix double dev_kfree_skb in error path" + }, + "CVE-2020-12364": { + "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" + }, + "CVE-2019-10639": { + "cmt_msg": "netns: provide pure entropy for net_hash_mix()" + }, + "CVE-2024-26646": { + "cmt_msg": "thermal: intel: hfi: Add syscore callbacks for system-wide PM" + }, + "CVE-2024-26647": { + "cmt_msg": "drm/amd/display: Fix late derefrence 'dsc' check in 'link_set_dsc_pps_packet()'" + }, + "CVE-2024-26644": { + "cmt_msg": "btrfs: don't abort filesystem when attempting to snapshot deleted subvolume" + }, + "CVE-2022-28388": { + "cmt_msg": "can: usb_8dev: usb_8dev_start_xmit(): fix double dev_kfree_skb() in error path" + }, + "CVE-2023-33203": { + "cmt_msg": "net: qcom/emac: Fix use after free bug in emac_remove due to race condition" + }, + "CVE-2021-0605": { + "cmt_msg": "af_key: pfkey_dump needs parameter validation" + }, + "CVE-2021-3896": { + "cmt_msg": "isdn: cpai: check ctr->cnr to avoid array index out of bound" + }, + "CVE-2021-4002": { + "cmt_msg": "hugetlbfs: flush TLBs correctly after huge_pmd_unshare" + }, + "CVE-2023-26545": { + "cmt_msg": "net: mpls: fix stale pointer if allocation fails during device rename" + }, + "CVE-2023-52519": { + "cmt_msg": "HID: intel-ish-hid: ipc: Disable and reenable ACPI GPE bit" + }, + "CVE-2021-38204": { + "cmt_msg": "usb: max-3421: Prevent corruption of freed memory" + }, + "CVE-2022-34918": { + "cmt_msg": "netfilter: nf_tables: stricter validation of element data" + }, + "CVE-2022-20008": { + "cmt_msg": "mmc: block: fix read single on recovery logic" + }, + "CVE-2021-3894": { + "cmt_msg": "sctp: account stream padding length for reconf chunk" + }, + "CVE-2024-26641": { + "cmt_msg": "ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv()" + }, + "CVE-2024-26791": { + "cmt_msg": "btrfs: dev-replace: properly validate device names" + }, + "CVE-2019-18786": { + "cmt_msg": "media: rcar_drif: fix a memory disclosure" + }, + "CVE-2019-20810": { + "cmt_msg": "media: go7007: fix a miss of snd_card_free" + }, + "CVE-2023-52464": { + "cmt_msg": "EDAC/thunderx: Fix possible out-of-bounds string access" + }, + "CVE-2019-20812": { + "cmt_msg": "af_packet: set defaule value for tmo" + }, + "CVE-2020-8834": { + "cmt_msg": "KVM: PPC: Book3S HV: Factor fake-suspend handling out of kvmppc_save/restore_tm" + }, + "CVE-2023-1990": { + "cmt_msg": "nfc: st-nci: Fix use after free bug in ndlc_remove due to race condition" + }, + "CVE-2020-14314": { + "cmt_msg": "ext4: fix potential negative array index in do_split()" + }, + "CVE-2023-52601": { + "cmt_msg": "jfs: fix array-index-out-of-bounds in dbAdjTree" + }, + "CVE-2023-6356": { + "cmt_msg": "nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length" + }, + "CVE-2018-18955": { + "cmt_msg": "userns: also map extents in the reverse map to kernel IDs" + }, + "CVE-2019-18660": { + "cmt_msg": "powerpc/book3s64: Fix link stack flush on context switch" + }, + "CVE-2019-15291": { + "cmt_msg": "media: b2c2-flexcop-usb: add sanity checking" + }, + "CVE-2019-15290": { + "cmt_msg": "" + }, + "CVE-2023-3212": { + "cmt_msg": "gfs2: Don't deref jdesc in evict" + }, + "CVE-2024-23848": { + "cmt_msg": "" + }, + "CVE-2021-46904": { + "cmt_msg": "net: hso: fix null-ptr-deref during tty device unregistration" + }, + "CVE-2021-47159": { + "cmt_msg": "net: dsa: fix a crash if ->get_sset_count() fails" + }, + "CVE-2022-0617": { + "cmt_msg": "udf: Fix NULL ptr deref when converting from inline format" + }, + "CVE-2023-4459": { + "cmt_msg": "net: vmxnet3: fix possible NULL pointer dereference in vmxnet3_rq_cleanup()" + }, + "CVE-2024-26625": { + "cmt_msg": "llc: call sock_orphan() at release time" + }, + "CVE-2024-26635": { + "cmt_msg": "llc: Drop support for ETH_P_TR_802_2." + }, + "CVE-2022-23036": { + "cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()" + }, + "CVE-2023-52639": { + "cmt_msg": "KVM: s390: vsie: fix race during shadow creation" + }, + "CVE-2022-2153": { + "cmt_msg": "KVM: x86: Avoid theoretical NULL pointer dereference in kvm_irq_delivery_to_apic_fast()" + }, + "CVE-2024-2193": { + "cmt_msg": "" + }, + "CVE-2022-20566": { + "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free caused by l2cap_chan_put" + }, + "CVE-2018-12930": { + "cmt_msg": "" + }, + "CVE-2018-12931": { + "cmt_msg": "" + }, + "CVE-2022-20424": { + "cmt_msg": "io_uring: remove io_identity" + }, + "CVE-2024-23196": { + "cmt_msg": "ALSA: hda: fix a possible null-pointer dereference due to data race in snd_hdac_regmap_sync()" + }, + "CVE-2020-12768": { + "cmt_msg": "KVM: SVM: Fix potential memory leak in svm_cpu_init()" + }, + "CVE-2020-12769": { + "cmt_msg": "spi: spi-dw: Add lock protect dw_spi rx/tx to prevent concurrent calls" + }, + "CVE-2024-26765": { + "cmt_msg": "LoongArch: Disable IRQ before init_fn() for nonboot CPUs" + }, + "CVE-2023-52609": { + "cmt_msg": "binder: fix race between mmput() and do_exit()" + }, + "CVE-2021-32399": { + "cmt_msg": "bluetooth: eliminate the potential race condition when removing the HCI controller" + }, + "CVE-2023-3863": { + "cmt_msg": "net: nfc: Fix use-after-free caused by nfc_llcp_find_local" + }, + "CVE-2019-12380": { + "cmt_msg": "efi/x86/Add missing error handling to old_memmap 1:1 mapping code" + }, + "CVE-2019-12381": { + "cmt_msg": "ip_sockglue: Fix missing-check bug in ip_ra_control()" + }, + "CVE-2019-12382": { + "cmt_msg": "drm/edid: Fix a missing-check bug in drm_load_edid_firmware()" + }, + "CVE-2023-52634": { + "cmt_msg": "drm/amd/display: Fix disable_otg_wa logic" + }, + "CVE-2022-22942": { + "cmt_msg": "drm/vmwgfx: Fix stale file descriptors on failed usercopy" + }, + "CVE-2018-20669": { + "cmt_msg": "make 'user_access_begin()' do 'access_ok()'" + }, + "CVE-2022-21499": { + "cmt_msg": "lockdown: also lock down previous kgdb use" + }, + "CVE-2019-19543": { + "cmt_msg": "media: serial_ir: Fix use-after-free in serial_ir_init_module" + }, + "CVE-2020-36783": { + "cmt_msg": "i2c: img-scb: fix reference leak when pm_runtime_get_sync fails" + }, + "CVE-2020-36780": { + "cmt_msg": "i2c: sprd: fix reference leak when pm_runtime_get_sync fails" + }, + "CVE-2020-36781": { + "cmt_msg": "i2c: imx: fix reference leak when pm_runtime_get_sync fails" + }, + "CVE-2021-3732": { + "cmt_msg": "ovl: prevent private clone if bind mount is not allowed" + }, + "CVE-2020-36784": { + "cmt_msg": "i2c: cadence: fix reference leak when pm_runtime_get_sync fails" + }, + "CVE-2022-25375": { + "cmt_msg": "usb: gadget: rndis: check size of RNDIS_MSG_SET command" + }, + "CVE-2020-10766": { + "cmt_msg": "x86/speculation: Prevent rogue cross-process SSBD shutdown" + }, + "CVE-2020-10767": { + "cmt_msg": "x86/speculation: Avoid force-disabling IBPB based on STIBP and enhanced IBRS." + }, + "CVE-2019-25162": { + "cmt_msg": "i2c: Fix a potential use after free" + }, + "CVE-2019-25160": { + "cmt_msg": "netlabel: fix out-of-bounds memory accesses" + }, + "CVE-2018-12207": { + "cmt_msg": "kvm: x86, powerpc: do not allow clearing largepages debugfs entry" + }, + "CVE-2022-20369": { + "cmt_msg": "media: v4l2-mem2mem: Apply DST_QUEUE_OFF_BASE on MMAP buffers across ioctls" + }, + "CVE-2024-26627": { + "cmt_msg": "scsi: core: Move scsi_host_busy() out of host lock for waking up EH handler" + }, + "CVE-2020-13143": { + "cmt_msg": "USB: gadget: fix illegal array access in binding with UDC" + }, + "CVE-2020-10768": { + "cmt_msg": "x86/speculation: PR_SPEC_FORCE_DISABLE enforcement for indirect branches." + }, + "CVE-2020-10769": { + "cmt_msg": "crypto: authenc - fix parsing key with misaligned rta_len" + }, + "CVE-2023-39198": { + "cmt_msg": "drm/qxl: fix UAF on handle creation" + }, + "CVE-2019-0148": { + "cmt_msg": "i40e: Wrong truncation from u16 to u8" + }, + "CVE-2019-0149": { + "cmt_msg": "i40e: Add bounds check for ch[] array" + }, + "CVE-2019-17075": { + "cmt_msg": "RDMA/cxgb4: Do not dma memory off of the stack" + }, + "CVE-2022-48626": { + "cmt_msg": "moxart: fix potential use-after-free on remove path" + }, + "CVE-2022-3903": { + "cmt_msg": "media: mceusb: Use new usb_control_msg_*() routines" + }, + "CVE-2024-26642": { + "cmt_msg": "netfilter: nf_tables: disallow anonymous set with timeout flag" + }, + "CVE-2019-19447": { + "cmt_msg": "ext4: work around deleting a file with i_nlink == 0 safely" + }, + "CVE-2019-0146": { + "cmt_msg": "i40e: add num_vectors checker in iwarp handler" + }, + "CVE-2019-0147": { + "cmt_msg": "i40e: add num_vectors checker in iwarp handler" + }, + "CVE-2020-10942": { + "cmt_msg": "vhost: Check docket sk_family instead of call getname" + }, + "CVE-2019-0145": { + "cmt_msg": "i40e: add num_vectors checker in iwarp handler" + }, + "CVE-2021-47070": { + "cmt_msg": "uio_hv_generic: Fix another memory leak in error handling paths" + }, + "CVE-2021-47073": { + "cmt_msg": "platform/x86: dell-smbios-wmi: Fix oops on rmmod dell_smbios" + }, + "CVE-2022-44034": { + "cmt_msg": "char: pcmcia: remove all the drivers" + }, + "CVE-2021-47075": { + "cmt_msg": "nvmet: fix memory leak in nvmet_alloc_ctrl()" + }, + "CVE-2019-11191": { + "cmt_msg": "x86: Deprecate a.out support" + }, + "CVE-2021-47077": { + "cmt_msg": "scsi: qedf: Add pointer checks in qedf_update_link_speed()" + }, + "CVE-2021-47076": { + "cmt_msg": "RDMA/rxe: Return CQE error if invalid lkey was supplied" + }, + "CVE-2021-47170": { + "cmt_msg": "USB: usbfs: Don't WARN about excessively large memory allocations" + }, + "CVE-2021-47078": { + "cmt_msg": "RDMA/rxe: Clear all QP fields if creation failed" + }, + "CVE-2021-47172": { + "cmt_msg": "iio: adc: ad7124: Fix potential overflow due to non sequential channel numbers" + }, + "CVE-2021-47173": { + "cmt_msg": "misc/uss720: fix memory leak in uss720_probe" + }, + "CVE-2022-36123": { + "cmt_msg": "x86: Clear .brk area at early boot" + }, + "CVE-2021-47175": { + "cmt_msg": "net/sched: fq_pie: fix OOB access in the traffic path" + }, + "CVE-2020-10781": { + "cmt_msg": "Revert \"zram: convert remaining CLASS_ATTR() to CLASS_ATTR_RO()\"" + }, + "CVE-2021-46951": { + "cmt_msg": "tpm: efi: Use local variable for calculating final log size" + }, + "CVE-2021-46950": { + "cmt_msg": "md/raid1: properly indicate failure when ending a failed write request" + }, + "CVE-2021-46953": { + "cmt_msg": "ACPI: GTDT: Don't corrupt interrupt mappings on watchdow probe failure" + }, + "CVE-2021-46952": { + "cmt_msg": "NFS: fs_context: validate UDP retrans to prevent shift out-of-bounds" + }, + "CVE-2021-46955": { + "cmt_msg": "openvswitch: fix stack OOB read while fragmenting IPv4 packets" + }, + "CVE-2024-0607": { + "cmt_msg": "netfilter: nf_tables: fix pointer math issue in nft_byteorder_eval()" + }, + "CVE-2021-46959": { + "cmt_msg": "spi: Fix use-after-free with devm_spi_alloc_*" + }, + "CVE-2020-26139": { + "cmt_msg": "mac80211: do not accept/forward invalid EAPOL frames" + }, + "CVE-2024-26772": { + "cmt_msg": "ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal()" + }, + "CVE-2019-10220": { + "cmt_msg": "Convert filldir[64]() from __put_user() to unsafe_put_user()" + }, + "CVE-2021-3609": { + "cmt_msg": "can: bcm: delay release of struct bcm_op after synchronize_rcu()" + }, + "CVE-2023-52595": { + "cmt_msg": "wifi: rt2x00: restart beacon queue when hardware reset" + }, + "CVE-2019-19536": { + "cmt_msg": "can: peak_usb: pcan_usb_pro: Fix info-leaks to USB devices" + }, + "CVE-2019-19537": { + "cmt_msg": "USB: core: Fix races in character device registration and deregistraion" + }, + "CVE-2019-19534": { + "cmt_msg": "can: peak_usb: fix slab info leak" + }, + "CVE-2019-19535": { + "cmt_msg": "can: peak_usb: pcan_usb_fd: Fix info-leaks to USB devices" + }, + "CVE-2019-19532": { + "cmt_msg": "HID: Fix assumption that devices have inputs" + }, + "CVE-2019-19533": { + "cmt_msg": "media: ttusb-dec: Fix info-leak in ttusb_dec_send_command()" + }, + "CVE-2019-19530": { + "cmt_msg": "usb: cdc-acm: make sure a refcount is taken early enough" + }, + "CVE-2019-19531": { + "cmt_msg": "usb: yurex: Fix use-after-free in yurex_delete" + }, + "CVE-2022-33981": { + "cmt_msg": "floppy: disable FDRAWCMD by default" + }, + "CVE-2021-0929": { + "cmt_msg": "staging/android/ion: delete dma_buf->kmap/unmap implemenation" + }, + "CVE-2018-14616": { + "cmt_msg": "f2fs: fix to do sanity check with block address in main area v2" + }, + "CVE-2019-20095": { + "cmt_msg": "mwifiex: Fix mem leak in mwifiex_tm_cmd" + }, + "CVE-2023-52590": { + "cmt_msg": "ocfs2: Avoid touching renamed directory if parent does not change" + }, + "CVE-2018-19985": { + "cmt_msg": "USB: hso: Fix OOB memory access in hso_probe/hso_get_config_data" + }, + "CVE-2021-0920": { + "cmt_msg": "af_unix: fix garbage collect vs MSG_PEEK" + }, + "CVE-2022-0168": { + "cmt_msg": "cifs: fix NULL ptr dereference in smb2_ioctl_query_info()" + }, + "CVE-2023-51043": { + "cmt_msg": "drm/atomic: Fix potential use-after-free in nonblocking commits" + }, + "CVE-2020-28374": { + "cmt_msg": "scsi: target: Fix XCOPY NAA identifier lookup" + }, + "CVE-2019-9213": { + "cmt_msg": "mm: enforce min addr even if capable() in expand_downwards()" + }, + "CVE-2023-2007": { + "cmt_msg": "scsi: dpt_i2o: Remove obsolete driver" + }, + "CVE-2023-0615": { + "cmt_msg": "media: vivid: dev->bitmap_cap wasn't freed in all cases" + }, + "CVE-2024-26672": { + "cmt_msg": "drm/amdgpu: Fix variable 'mca_funcs' dereferenced before NULL check in 'amdgpu_mca_smu_get_mca_entry()'" + }, + "CVE-2019-14896": { + "cmt_msg": "libertas: Fix two buffer overflows at parsing bss descriptor" + }, + "CVE-2019-14897": { + "cmt_msg": "libertas: Fix two buffer overflows at parsing bss descriptor" + }, + "CVE-2019-14895": { + "cmt_msg": "mwifiex: fix possible heap overflow in mwifiex_process_country_ie()" + }, + "CVE-2023-52522": { + "cmt_msg": "net: fix possible store tearing in neigh_periodic_work()" + }, + "CVE-2022-3586": { + "cmt_msg": "sch_sfb: Don't assume the skb is still around after enqueueing to child" + }, + "CVE-2024-26636": { + "cmt_msg": "llc: make llc_ui_sendmsg() more robust against bonding changes" + }, + "CVE-2022-43750": { + "cmt_msg": "usb: mon: make mmapped memory read only" + }, + "CVE-2024-26594": { + "cmt_msg": "ksmbd: validate mech token in session setup" + }, + "CVE-2023-52528": { + "cmt_msg": "net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg" + }, + "CVE-2020-27825": { + "cmt_msg": "tracing: Fix race in trace_open and buffer resize call" + }, + "CVE-2019-2181": { + "cmt_msg": "binder: check for overflow when alloc for security context" + }, + "CVE-2022-20422": { + "cmt_msg": "arm64: fix oops in concurrently setting insn_emulation sysctls" + }, + "CVE-2020-27820": { + "cmt_msg": "drm/nouveau: use drm_dev_unplug() during device removal" + }, + "CVE-2020-26141": { + "cmt_msg": "ath10k: Fix TKIP Michael MIC verification for PCIe" + }, + "CVE-2020-0067": { + "cmt_msg": "f2fs: fix to avoid memory leakage in f2fs_listxattr" + }, + "CVE-2021-47151": { + "cmt_msg": "interconnect: qcom: bcm-voter: add a missing of_node_put()" + }, + "CVE-2023-4622": { + "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES" + }, + "CVE-2020-26558": { + "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical" + }, + "CVE-2023-39193": { + "cmt_msg": "netfilter: xt_sctp: validate the flag_info count" + }, + "CVE-2023-1079": { + "cmt_msg": "HID: asus: use spinlock to safely schedule workers" + }, + "CVE-2020-26541": { + "cmt_msg": "certs: Add EFI_CERT_X509_GUID support for dbx entries" + }, + "CVE-2019-20811": { + "cmt_msg": "net-sysfs: call dev_hold if kobject_init_and_add success" + }, + "CVE-2024-26600": { + "cmt_msg": "phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP" + }, + "CVE-2023-3390": { + "cmt_msg": "netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE" + }, + "CVE-2021-20317": { + "cmt_msg": "lib/timerqueue: Rely on rbtree semantics for next timer" + }, + "CVE-2021-43389": { + "cmt_msg": "isdn: cpai: check ctr->cnr to avoid array index out of bound" + }, + "CVE-2023-3111": { + "cmt_msg": "btrfs: unset reloc control if transaction commit fails in prepare_to_relocate()" + }, + "CVE-2021-33061": { + "cmt_msg": "ixgbe: add improvement for MDD response functionality" + }, + "CVE-2023-52559": { + "cmt_msg": "iommu/vt-d: Avoid memory allocation in iommu_suspend()" + }, + "CVE-2024-26767": { + "cmt_msg": "drm/amd/display: fixed integer types and null check locations" + }, + "CVE-2024-26766": { + "cmt_msg": "IB/hfi1: Fix sdma.h tx->num_descs off-by-one error" + }, + "CVE-2024-26763": { + "cmt_msg": "dm-crypt: don't modify the data when using authenticated encryption" + }, + "CVE-2023-1476": { + "cmt_msg": "" + }, + "CVE-2023-4010": { + "cmt_msg": "" + }, + "CVE-2023-1074": { + "cmt_msg": "sctp: fail if no bound addresses can be used for a given scope" + }, + "CVE-2021-3864": { + "cmt_msg": "" + }, + "CVE-2024-26770": { + "cmt_msg": "HID: nvidia-shield: Add missing null pointer checks to LED initialization" + }, + "CVE-2024-26584": { + "cmt_msg": "net: tls: handle backlogging of crypto requests" + }, + "CVE-2022-1652": { + "cmt_msg": "floppy: use a statically allocated error counter" + }, + "CVE-2023-4623": { + "cmt_msg": "net/sched: sch_hfsc: Ensure inner classes have fsc curve" + }, + "CVE-2024-26771": { + "cmt_msg": "dmaengine: ti: edma: Add some null pointer checks to the edma_probe" + }, + "CVE-2024-23849": { + "cmt_msg": "net/rds: Fix UBSAN: array-index-out-of-bounds in rds_cmsg_recv" + }, + "CVE-2020-29568": { + "cmt_msg": "xen/xenbus: Allow watches discard events before queueing" + }, + "CVE-2020-29569": { + "cmt_msg": "xen-blkback: set ring->xenblkd to NULL after kthread_stop()" + }, + "CVE-2020-14351": { + "cmt_msg": "perf/core: Fix race in the perf_mmap_close() function" + }, + "CVE-2019-19054": { + "cmt_msg": "media: rc: prevent memory leak in cx23888_ir_probe" + }, + "CVE-2019-19057": { + "cmt_msg": "mwifiex: pcie: Fix memory leak in mwifiex_pcie_init_evt_ring" + }, + "CVE-2019-19056": { + "cmt_msg": "mwifiex: pcie: Fix memory leak in mwifiex_pcie_alloc_cmdrsp_buf" + }, + "CVE-2019-9453": { + "cmt_msg": "f2fs: fix to avoid accessing xattr across the boundary" + }, + "CVE-2023-23039": { + "cmt_msg": "" + }, + "CVE-2019-19052": { + "cmt_msg": "can: gs_usb: gs_can_open(): prevent memory leak" + }, + "CVE-2019-3846": { + "cmt_msg": "mwifiex: Fix possible buffer overflows at parsing bss descriptor" + }, + "CVE-2023-46838": { + "cmt_msg": "xen-netback: don't produce zero-size SKB frags" + }, + "CVE-2020-0427": { + "cmt_msg": "pinctrl: devicetree: Avoid taking direct reference to device name string" + }, + "CVE-2022-2977": { + "cmt_msg": "tpm: fix reference counting for struct tpm_chip" + }, + "CVE-2019-19058": { + "cmt_msg": "iwlwifi: dbg_ini: fix memory leak in alloc_sgtable" + }, + "CVE-2020-0423": { + "cmt_msg": "binder: fix UAF when releasing todo list" + }, + "CVE-2019-9458": { + "cmt_msg": "media: v4l: event: Prevent freeing event subscriptions while accessed" + }, + "CVE-2023-40283": { + "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb" + }, + "CVE-2016-8660": { + "cmt_msg": "" + }, + "CVE-2023-6270": { + "cmt_msg": "aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts" + }, + "CVE-2023-3090": { + "cmt_msg": "ipvlan:Fix out-of-bounds caused by unclear skb->cb" + }, + "CVE-2019-13272": { + "cmt_msg": "ptrace: Fix ->ptracer_cred handling for PTRACE_TRACEME" + }, + "CVE-2023-1073": { + "cmt_msg": "HID: check empty report_list in hid_validate_values()" + }, + "CVE-2023-45862": { + "cmt_msg": "USB: ene_usb6250: Allocate enough memory for full object" + }, + "CVE-2023-45863": { + "cmt_msg": "kobject: Fix slab-out-of-bounds in fill_kobj_path()" + }, + "CVE-2023-1582": { + "cmt_msg": "fs/proc: task_mmu.c: don't read mapcount for migration entry" + }, + "CVE-2021-47162": { + "cmt_msg": "tipc: skb_linearize the head skb when reassembling msgs" + }, + "CVE-2019-17351": { + "cmt_msg": "xen: let alloc_xenballooned_pages() fail if not enough memory free" + }, + "CVE-2022-21166": { + "cmt_msg": "x86/speculation/mmio: Enable CPU Fill buffer clearing on idle" + }, + "CVE-2020-25669": { + "cmt_msg": "Input: sunkbd - avoid use-after-free in teardown paths" + }, + "CVE-2020-25668": { + "cmt_msg": "tty: make FONTX ioctl use the tty pointer they were actually passed" + }, + "CVE-2008-4609": { + "cmt_msg": "" + }, + "CVE-2020-25705": { + "cmt_msg": "icmp: randomize the global rate limiter" + }, + "CVE-2022-20421": { + "cmt_msg": "binder: fix UAF of ref->proc caused by race condition" + }, + "CVE-2022-0435": { + "cmt_msg": "tipc: improve size validations for received domain records" + }, + "CVE-2022-20565": { + "cmt_msg": "HID: core: Correctly handle ReportSize being zero" + }, + "CVE-2018-5391": { + "cmt_msg": "ip: discard IPv4 datagrams with overlapping segments." + }, + "CVE-2022-3533": { + "cmt_msg": "" + }, + "CVE-2024-26648": { + "cmt_msg": "drm/amd/display: Fix variable deferencing before NULL check in edp_setup_replay()" + }, + "CVE-2021-4135": { + "cmt_msg": "netdevsim: Zero-initialize memory for new map's value in function nsim_bpf_map_alloc" + }, + "CVE-2023-26607": { + "cmt_msg": "ntfs: fix out-of-bounds read in ntfs_attr_find()" + }, + "CVE-2018-1121": { + "cmt_msg": "" + }, + "CVE-2019-15239": { + "cmt_msg": "unknown" + }, + "CVE-2024-26743": { + "cmt_msg": "RDMA/qedr: Fix qedr_create_user_qp error flow" + }, + "CVE-2023-52635": { + "cmt_msg": "PM / devfreq: Synchronize devfreq_monitor_[start/stop]" + }, + "CVE-2021-46938": { + "cmt_msg": "dm rq: fix double free of blk_mq_tag_set in dev remove after table load fails" + }, + "CVE-2023-52633": { + "cmt_msg": "um: time-travel: fix time corruption" + }, + "CVE-2023-52632": { + "cmt_msg": "drm/amdkfd: Fix lock dependency warning with srcu" + }, + "CVE-2021-4037": { + "cmt_msg": "xfs: fix up non-directory creation in SGID directories" + }, + "CVE-2021-22543": { + "cmt_msg": "KVM: do not allow mapping valid but non-reference-counted pages" + }, + "CVE-2022-45884": { + "cmt_msg": "" + }, + "CVE-2021-3348": { + "cmt_msg": "nbd: freeze the queue while we're adding connections" + }, + "CVE-2019-1999": { + "cmt_msg": "binder: fix race between munmap() and direct reclaim" + }, + "CVE-2024-1151": { + "cmt_msg": "net: openvswitch: limit the number of recursions from action sets" + }, + "CVE-2023-20941": { + "cmt_msg": "" + }, + "CVE-2019-15292": { + "cmt_msg": "appletalk: Fix use-after-free in atalk_proc_exit" + }, + "CVE-2018-20836": { + "cmt_msg": "scsi: libsas: fix a race condition when smp task timeout" + }, + "CVE-2024-26740": { + "cmt_msg": "net/sched: act_mirred: use the backlog for mirred ingress" + }, + "CVE-2021-44733": { + "cmt_msg": "tee: handle lookup of shm with reference count 0" + }, + "CVE-2021-3347": { + "cmt_msg": "futex: Ensure the correct return value from futex_lock_pi()" + }, + "CVE-2020-10135": { + "cmt_msg": "Bluetooth: Consolidate encryption handling in hci_encrypt_cfm" + }, + "CVE-2020-25285": { + "cmt_msg": "mm/hugetlb: fix a race between hugetlb sysctl handlers" + }, + "CVE-2019-7308": { + "cmt_msg": "bpf: fix sanitation of alu op with pointer / scalar type from different paths" + }, + "CVE-2021-45868": { + "cmt_msg": "quota: check block number when reading the block in quota file" + }, + "CVE-2022-1966": { + "cmt_msg": "netfilter: nf_tables: disallow non-stateful expression in sets earlier" + }, + "CVE-2019-2025": { + "cmt_msg": "binder: fix race that allows malicious free of live buffer" + }, + "CVE-2021-3587": { + "cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect" + }, + "CVE-2019-16995": { + "cmt_msg": "net: hsr: fix memory leak in hsr_dev_finalize()" + }, + "CVE-2019-16994": { + "cmt_msg": "net: sit: fix memory leak in sit_init_net()" + }, + "CVE-2021-47137": { + "cmt_msg": "net: lantiq: fix memory corruption in RX ring" + }, + "CVE-2022-3534": { + "cmt_msg": "libbpf: Fix use-after-free in btf_dump_name_dups" + }, + "CVE-2021-47135": { + "cmt_msg": "mt76: mt7921: fix possible AOOB issue in mt7921_mcu_tx_rate_report" + }, + "CVE-2021-47136": { + "cmt_msg": "net: zero-initialize tc skb extension on allocation" + }, + "CVE-2020-36516": { + "cmt_msg": "ipv4: avoid using shared IP generator for connected sockets" + }, + "CVE-2024-26808": { + "cmt_msg": "netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain" + }, + "CVE-2021-47131": { + "cmt_msg": "net/tls: Fix use-after-free after the TLS device goes down and up" + }, + "CVE-2020-36766": { + "cmt_msg": "cec-api: prevent leaking memory through hole in structure" + }, + "CVE-2021-47133": { + "cmt_msg": "HID: amd_sfh: Fix memory leak in amd_sfh_work" + }, + "CVE-2024-26633": { + "cmt_msg": "ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim()" + }, + "CVE-2024-26675": { + "cmt_msg": "ppp_async: limit MRU to 64K" + }, + "CVE-2022-3061": { + "cmt_msg": "video: fbdev: i740fb: Error out if 'pixclock' equals zero" + }, + "CVE-2021-46991": { + "cmt_msg": "i40e: Fix use-after-free in i40e_client_subtask()" + }, + "CVE-2022-0322": { + "cmt_msg": "sctp: account stream padding length for reconf chunk" + }, + "CVE-2021-46992": { + "cmt_msg": "netfilter: nftables: avoid overflows in nft_hash_buckets()" + }, + "CVE-2023-6121": { + "cmt_msg": "nvmet: nul-terminate the NQNs passed in the connect command" + }, + "CVE-2023-52638": { + "cmt_msg": "can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock" + }, + "CVE-2021-46998": { + "cmt_msg": "ethernet:enic: Fix a use after free bug in enic_hard_start_xmit" + }, + "CVE-2017-13693": { + "cmt_msg": "" + }, + "CVE-2017-13694": { + "cmt_msg": "" + }, + "CVE-2024-26764": { + "cmt_msg": "fs/aio: Restrict kiocb_set_cancel_fn() to I/O submitted via libaio" + }, + "CVE-2021-4149": { + "cmt_msg": "btrfs: unlock newly allocated extent buffer after error" + }, + "CVE-2022-21385": { + "cmt_msg": "net/rds: fix warn in rds_message_alloc_sgs" + }, + "CVE-2022-42895": { + "cmt_msg": "Bluetooth: L2CAP: Fix attempting to access uninitialized memory" + }, + "CVE-2021-3640": { + "cmt_msg": "Bluetooth: sco: Fix lock_sock() blockage by memcpy_from_msg()" + }, + "CVE-2021-3764": { + "cmt_msg": "crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd()" + }, + "CVE-2022-23222": { + "cmt_msg": "bpf: Replace PTR_TO_XXX_OR_NULL with PTR_TO_XXX | PTR_MAYBE_NULL" + }, + "CVE-2020-1749": { + "cmt_msg": "net: ipv6_stub: use ip6_dst_lookup_flow instead of ip6_dst_lookup" + }, + "CVE-2022-42896": { + "cmt_msg": "Bluetooth: L2CAP: Fix accepting connection request for invalid SPSM" + }, + "CVE-2021-3760": { + "cmt_msg": "nfc: nci: fix the UAF of rf_conn_info object" + }, + "CVE-2022-48627": { + "cmt_msg": "vt: fix memory overlapping when deleting chars in the buffer" + }, + "CVE-2021-47180": { + "cmt_msg": "NFC: nci: fix memory leak in nci_allocate_device" + }, + "CVE-2022-48628": { + "cmt_msg": "ceph: drop messages from MDS when unmounting" + }, + "CVE-2020-11608": { + "cmt_msg": "media: ov519: add missing endpoint sanity checks" + }, + "CVE-2020-10732": { + "cmt_msg": "fs/binfmt_elf.c: allocate initialized memory in fill_thread_core_info()" + }, + "CVE-2020-28097": { + "cmt_msg": "vgacon: remove software scrollback support" + }, + "CVE-2024-24859": { + "cmt_msg": "" + }, + "CVE-2024-24858": { + "cmt_msg": "" + }, + "CVE-2024-24855": { + "cmt_msg": "scsi: lpfc: Fix a possible data race in lpfc_unregister_fcf_rescan()" + }, + "CVE-2024-24857": { + "cmt_msg": "" + }, + "CVE-2019-3892": { + "cmt_msg": "coredump: fix race condition between mmget_not_zero()/get_task_mm() and core dumping" + }, + "CVE-2021-29264": { + "cmt_msg": "gianfar: fix jumbo packets+napi+rx overrun crash" + }, + "CVE-2021-29265": { + "cmt_msg": "usbip: fix stub_dev usbip_sockfd_store() races leading to gpf" + }, + "CVE-2021-39648": { + "cmt_msg": "usb: gadget: configfs: Fix use-after-free issue with udc_name" + }, + "CVE-2022-3545": { + "cmt_msg": "nfp: fix use-after-free in area_cache_get()" + }, + "CVE-2023-52569": { + "cmt_msg": "btrfs: remove BUG() after failure to insert delayed dir index item" + }, + "CVE-2023-52568": { + "cmt_msg": "x86/sgx: Resolves SECS reclaim vs. page fault for EAUG race" + }, + "CVE-2020-14416": { + "cmt_msg": "can, slip: Protect tty->disc_data in write_wakeup and close with RCU" + }, + "CVE-2019-0136": { + "cmt_msg": "mac80211: drop robust management frames from unknown TA" + }, + "CVE-2022-3542": { + "cmt_msg": "bnx2x: fix potential memory leak in bnx2x_tpa_stop()" + }, + "CVE-2023-52563": { + "cmt_msg": "drm/meson: fix memory leak on ->hpd_notify callback" + }, + "CVE-2023-1078": { + "cmt_msg": "rds: rds_rm_zerocopy_callback() use list_first_entry()" + }, + "CVE-2023-52561": { + "cmt_msg": "arm64: dts: qcom: sdm845-db845c: Mark cont splash memory region as reserved" + }, + "CVE-2022-3344": { + "cmt_msg": "KVM: x86: nSVM: harden svm_free_nested against freeing vmcb02 while still in use" + }, + "CVE-2023-52566": { + "cmt_msg": "nilfs2: fix potential use after free in nilfs_gccache_submit_read_data()" + }, + "CVE-2021-21781": { + "cmt_msg": "ARM: ensure the signal page contains defined contents" + }, + "CVE-2021-0512": { + "cmt_msg": "HID: make arrays usage and value to be the same" + }, + "CVE-2021-46929": { + "cmt_msg": "sctp: use call_rcu to free endpoint" + }, + "CVE-2018-14633": { + "cmt_msg": "scsi: target: iscsi: Use hex2bin instead of a re-implementation" + }, + "CVE-2018-12896": { + "cmt_msg": "posix-timers: Sanitize overrun handling" + }, + "CVE-2023-1382": { + "cmt_msg": "tipc: set con sock in tipc_conn_alloc" + }, + "CVE-2019-19073": { + "cmt_msg": "ath9k_htc: release allocated buffer if timed out" + }, + "CVE-2023-1380": { + "cmt_msg": "wifi: brcmfmac: slab-out-of-bounds read in brcmf_get_assoc_ies()" + }, + "CVE-2021-46924": { + "cmt_msg": "NFC: st21nfca: Fix memory leak in device probe and remove" + }, + "CVE-2021-46925": { + "cmt_msg": "net/smc: fix kernel panic caused by race of smc_sock" + }, + "CVE-2021-46926": { + "cmt_msg": "ALSA: hda: intel-sdw-acpi: harden detection of controller" + }, + "CVE-2020-0347": { + "cmt_msg": "" + }, + "CVE-2019-18809": { + "cmt_msg": "media: usb: fix memory leak in af9005_identify_state" + }, + "CVE-2019-18808": { + "cmt_msg": "crypto: ccp - Release all allocated memory if sha type is invalid" + }, + "CVE-2023-52591": { + "cmt_msg": "reiserfs: Avoid touching renamed directory if parent does not change" + }, + "CVE-2022-41222": { + "cmt_msg": "mm/mremap: hold the rmap lock in write mode when moving page table entries." + }, + "CVE-2021-40490": { + "cmt_msg": "ext4: fix race writing to an inline_data file while its xattrs are changing" + }, + "CVE-2021-33909": { + "cmt_msg": "seq_file: disallow extremely large seq buffer allocations" + }, + "CVE-2019-12455": { + "cmt_msg": "clk-sunxi: fix a missing-check bug in sunxi_divs_clk_setup()" + }, + "CVE-2019-12456": { + "cmt_msg": "" + }, + "CVE-2019-19070": { + "cmt_msg": "spi: gpio: prevent memory leak in spi_gpio_probe" + }, + "CVE-2019-18805": { + "cmt_msg": "ipv4: set the tcp_min_rtt_wlen range from 0 to one day" + }, + "CVE-2021-29647": { + "cmt_msg": "net: qrtr: fix a kernel-infoleak in qrtr_recvmsg()" + }, + "CVE-2019-18806": { + "cmt_msg": "net: qlogic: Fix memory leak in ql_alloc_large_buffers" + }, + "CVE-2021-33656": { + "cmt_msg": "vt: drop old FONT ioctls" + }, + "CVE-2024-26713": { + "cmt_msg": "powerpc/pseries/iommu: Fix iommu initialisation during DLPAR add" + }, + "CVE-2021-33655": { + "cmt_msg": "fbcon: Disallow setting font bigger than screen size" + }, + "CVE-2024-26804": { + "cmt_msg": "net: ip_tunnel: prevent perpetual headroom growth" + }, + "CVE-2022-41858": { + "cmt_msg": "drivers: net: slip: fix NPD bug in sl_tx_timeout()" + }, + "CVE-2024-26726": { + "cmt_msg": "btrfs: don't drop extent_map for free space inode on write error" + }, + "CVE-2024-26671": { + "cmt_msg": "blk-mq: fix IO hang from sbitmap wakeup race" + }, + "CVE-2019-6974": { + "cmt_msg": "kvm: fix kvm_ioctl_create_device() reference counting (CVE-2019-6974)" + }, + "CVE-2022-41850": { + "cmt_msg": "HID: roccat: Fix use-after-free in roccat_read()" + }, + "CVE-2020-24503": { + "cmt_msg": "" + }, + "CVE-2023-52607": { + "cmt_msg": "powerpc/mm: Fix null-pointer dereference in pgtable_cache_add" + }, + "CVE-2023-2985": { + "cmt_msg": "fs: hfsplus: fix UAF issue in hfsplus_put_super" + }, + "CVE-2020-14390": { + "cmt_msg": "fbcon: remove soft scrollback code" + }, + "CVE-2020-24502": { + "cmt_msg": "" + }, + "CVE-2022-3646": { + "cmt_msg": "nilfs2: fix leak of nilfs_root in case of writer thread creation failure" + }, + "CVE-2021-45469": { + "cmt_msg": "f2fs: fix to do sanity check on last xattr entry in __f2fs_setxattr()" + }, + "CVE-2022-1184": { + "cmt_msg": "ext4: verify dir block before splitting it" + }, + "CVE-2022-3642": { + "cmt_msg": "" + }, + "CVE-2019-19448": { + "cmt_msg": "btrfs: only search for left_info if there is no right_info in try_merge_free_space" + }, + "CVE-2024-0584": { + "cmt_msg": "ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet" + }, + "CVE-2019-19449": { + "cmt_msg": "f2fs: fix to do sanity check on segment/section count" + }, + "CVE-2020-0465": { + "cmt_msg": "HID: core: Sanitize event code and type when mapping input" + }, + "CVE-2020-0466": { + "cmt_msg": "do_epoll_ctl(): clean the failure exits up a bit" + }, + "CVE-2023-52516": { + "cmt_msg": "dma-debug: don't call __dma_entry_alloc_check_leak() under free_entries_lock" + }, + "CVE-2021-4218": { + "cmt_msg": "sysctl: pass kernel pointers to ->proc_handler" + }, + "CVE-2023-52515": { + "cmt_msg": "RDMA/srp: Do not call scsi_done() from srp_abort()" + }, + "CVE-2020-0543": { + "cmt_msg": "x86/cpu: Add 'table' argument to cpu_matches()" + }, + "CVE-2023-52510": { + "cmt_msg": "ieee802154: ca8210: Fix a potential UAF in ca8210_probe" + }, + "CVE-2023-3358": { + "cmt_msg": "HID: intel_ish-hid: Add check for ishtp_dma_tx_map" + }, + "CVE-2019-20054": { + "cmt_msg": "fs/proc/proc_sysctl.c: fix NULL pointer dereference in put_links" + }, + "CVE-2021-46982": { + "cmt_msg": "f2fs: compress: fix race condition of overwrite vs truncate" + }, + "CVE-2024-0340": { + "cmt_msg": "vhost: use kzalloc() instead of kmalloc() followed by memset()" + }, + "CVE-2021-3753": { + "cmt_msg": "vt_kdsetmode: extend console locking" + }, + "CVE-2023-6536": { + "cmt_msg": "nvmet-tcp: fix a crash in nvmet_req_complete()" + }, + "CVE-2019-11135": { + "cmt_msg": "x86/msr: Add the IA32_TSX_CTRL MSR" + }, + "CVE-2019-11810": { + "cmt_msg": "scsi: megaraid_sas: return error when create DMA pool failed" + }, + "CVE-2021-27365": { + "cmt_msg": "scsi: iscsi: Ensure sysfs attributes are limited to PAGE_SIZE" + }, + "CVE-2021-27364": { + "cmt_msg": "scsi: iscsi: Restrict sessions and handles to admin capabilities" + }, + "CVE-2019-11815": { + "cmt_msg": "net: rds: force to destroy connection if t_sock is NULL in rds_tcp_kill_sock()." + }, + "CVE-2020-0431": { + "cmt_msg": "HID: hid-input: clear unmapped usages" + }, + "CVE-2022-39842": { + "cmt_msg": "video: fbdev: pxa3xx-gcu: Fix integer overflow in pxa3xx_gcu_write" + }, + "CVE-2018-17977": { + "cmt_msg": "" + }, + "CVE-2023-6932": { + "cmt_msg": "ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet" + }, + "CVE-2024-26659": { + "cmt_msg": "xhci: handle isoc Babble and Buffer Overrun events properly" + }, + "CVE-2024-26658": { + "cmt_msg": "bcachefs: grab s_umount only if snapshotting" + }, + "CVE-2018-17972": { + "cmt_msg": "proc: restrict kernel stack dumps to root" + }, + "CVE-2021-20322": { + "cmt_msg": "ipv6: make exception cache less predictible" + }, + "CVE-2024-26654": { + "cmt_msg": "ALSA: sh: aica: reorder cleanup operations to avoid UAF bugs" + }, + "CVE-2021-20320": { + "cmt_msg": "s390/bpf: Fix optimizing out zero-extensions" + }, + "CVE-2021-20321": { + "cmt_msg": "ovl: fix missing negative dentry check in ovl_rename()" + }, + "CVE-2024-26651": { + "cmt_msg": "sr9800: Add check for usbnet_get_endpoints" + }, + "CVE-2024-26650": { + "cmt_msg": "platform/x86: p2sb: Allow p2sb_bar() calls during PCI device probe" + }, + "CVE-2022-26490": { + "cmt_msg": "nfc: st21nfca: Fix potential buffer overflows in EVT_TRANSACTION" + }, + "CVE-2023-3812": { + "cmt_msg": "net: tun: fix bugs for oversize packet when napi frags enabled" + }, + "CVE-2023-7192": { + "cmt_msg": "netfilter: ctnetlink: fix possible refcount leak in ctnetlink_create_conntrack()" + }, + "CVE-2022-3169": { + "cmt_msg": "nvme: ensure subsystem reset is single threaded" + }, + "CVE-2022-4744": { + "cmt_msg": "tun: avoid double free in tun_free_netdev" + }, + "CVE-2022-36280": { + "cmt_msg": "drm/vmwgfx: Validate the box size for the snooped cursor" + }, + "CVE-2022-1048": { + "cmt_msg": "ALSA: pcm: Fix races among concurrent hw_params and hw_free calls" + }, + "CVE-2024-26696": { + "cmt_msg": "nilfs2: fix hang in nilfs_lookup_dirty_data_buffers()" + }, + "CVE-2018-20976": { + "cmt_msg": "xfs: clear sb->s_fs_info on mount failure" + }, + "CVE-2024-26803": { + "cmt_msg": "net: veth: clear GRO when clearing XDP even when down" + }, + "CVE-2023-52475": { + "cmt_msg": "Input: powermate - fix use-after-free in powermate_config_complete" + }, + "CVE-2021-0342": { + "cmt_msg": "tun: correct header offsets in napi frags mode" + }, + "CVE-2023-52477": { + "cmt_msg": "usb: hub: Guard against accesses to uninitialized BOS descriptors" + }, + "CVE-2023-52476": { + "cmt_msg": "perf/x86/lbr: Filter vsyscall addresses" + }, + "CVE-2023-22995": { + "cmt_msg": "usb: dwc3: dwc3-qcom: Add missing platform_device_put() in dwc3_qcom_acpi_register_core" + }, + "CVE-2023-52470": { + "cmt_msg": "drm/radeon: check the alloc_workqueue return value in radeon_crtc_init()" + }, + "CVE-2024-21803": { + "cmt_msg": "" + }, + "CVE-2023-52479": { + "cmt_msg": "ksmbd: fix uaf in smb20_oplock_break_ack" + }, + "CVE-2019-15927": { + "cmt_msg": "ALSA: usb-audio: Avoid access before bLength check in build_audio_procunit()" + }, + "CVE-2021-3542": { + "cmt_msg": "" + }, + "CVE-2019-16413": { + "cmt_msg": "9p: use inode->i_lock to protect i_size_write() under 32-bit" + }, + "CVE-2024-24860": { + "cmt_msg": "Bluetooth: Fix atomicity violation in {min,max}_key_size_set" + }, + "CVE-2023-2177": { + "cmt_msg": "sctp: leave the err path free in sctp_stream_init to sctp_stream_free" + }, + "CVE-2024-22099": { + "cmt_msg": "Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security" + }, + "CVE-2023-2194": { + "cmt_msg": "i2c: xgene-slimpro: Fix out-of-bounds bug in xgene_slimpro_i2c_xfer()" + }, + "CVE-2023-30456": { + "cmt_msg": "KVM: nVMX: add missing consistency checks for CR0 and CR4" + }, + "CVE-2020-12652": { + "cmt_msg": "scsi: mptfusion: Fix double fetch bug in ioctl" + }, + "CVE-2020-12653": { + "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_cmd_append_vsie_tlv()" + }, + "CVE-2019-7222": { + "cmt_msg": "KVM: x86: work around leak of uninitialized stack contents (CVE-2019-7222)" + }, + "CVE-2020-12657": { + "cmt_msg": "block, bfq: fix use-after-free in bfq_idle_slice_timer_body" + }, + "CVE-2020-12654": { + "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_ret_wmm_get_status()" + }, + "CVE-2019-7221": { + "cmt_msg": "KVM: nVMX: unconditionally cancel preemption timer in free_nested (CVE-2019-7221)" + }, + "CVE-2018-12929": { + "cmt_msg": "" + }, + "CVE-2018-12928": { + "cmt_msg": "" + }, + "CVE-2024-26700": { + "cmt_msg": "drm/amd/display: Fix MST Null Ptr for RV" + }, + "CVE-2020-36311": { + "cmt_msg": "KVM: SVM: Periodically schedule when unregistering regions on destroy" + }, + "CVE-2020-36310": { + "cmt_msg": "KVM: SVM: avoid infinite loop on NPF from bad address" + }, + "CVE-2020-36313": { + "cmt_msg": "KVM: Fix out of range accesses to memslots" + }, + "CVE-2020-35519": { + "cmt_msg": "net/x25: prevent a couple of overflows" + }, + "CVE-2024-26592": { + "cmt_msg": "ksmbd: fix UAF issue in ksmbd_tcp_new_connection()" + }, + "CVE-2021-28971": { + "cmt_msg": "perf/x86/intel: Fix a crash caused by zero PEBS status" + }, + "CVE-2020-10708": { + "cmt_msg": "" + }, + "CVE-2020-25673": { + "cmt_msg": "nfc: Avoid endless loops caused by repeated llcp_sock_connect()" + }, + "CVE-2022-0400": { + "cmt_msg": "" + }, + "CVE-2024-25741": { + "cmt_msg": "" + }, + "CVE-2024-26778": { + "cmt_msg": "fbdev: savage: Error out if pixclock equals zero" + }, + "CVE-2024-26809": { + "cmt_msg": "netfilter: nft_set_pipapo: release elements in clone only from destroy path" + }, + "CVE-2021-38160": { + "cmt_msg": "virtio_console: Assure used length from device is limited" + }, + "CVE-2021-42739": { + "cmt_msg": "media: firewire: firedtv-avc: fix a buffer overflow in avc_ca_pmt()" + }, + "CVE-2023-1989": { + "cmt_msg": "Bluetooth: btsdio: fix use after free bug in btsdio_remove due to unfinished work" + }, + "CVE-2024-26806": { + "cmt_msg": "spi: cadence-qspi: remove system-wide suspend helper calls from runtime PM hooks" + }, + "CVE-2020-12771": { + "cmt_msg": "bcache: fix potential deadlock problem in btree_gc_coalesce" + }, + "CVE-2020-12770": { + "cmt_msg": "scsi: sg: add sg_remove_request in sg_write" + }, + "CVE-2024-26802": { + "cmt_msg": "stmmac: Clear variable when destroying workqueue" + }, + "CVE-2023-52508": { + "cmt_msg": "nvme-fc: Prevent null pointer dereference in nvme_fc_io_getuuid()" + }, + "CVE-2023-52606": { + "cmt_msg": "powerpc/lib: Validate size for vector operations" + }, + "CVE-2019-15222": { + "cmt_msg": "ALSA: usb-audio: Fix gpf in snd_usb_pipe_sanity_check" + }, + "CVE-2023-52604": { + "cmt_msg": "FS:JFS:UBSAN:array-index-out-of-bounds in dbAdjTree" + }, + "CVE-2023-52531": { + "cmt_msg": "wifi: iwlwifi: mvm: Fix a memory corruption issue" + }, + "CVE-2023-52602": { + "cmt_msg": "jfs: fix slab-out-of-bounds Read in dtSearch" + }, + "CVE-2023-52603": { + "cmt_msg": "UBSAN: array-index-out-of-bounds in dtSplitRoot" + }, + "CVE-2022-25265": { + "cmt_msg": "" + }, + "CVE-2022-20368": { + "cmt_msg": "net/packet: fix slab-out-of-bounds access in packet_recvmsg()" + }, + "CVE-2024-26779": { + "cmt_msg": "wifi: mac80211: fix race condition on enabling fast-xmit" + }, + "CVE-2023-52600": { + "cmt_msg": "jfs: fix uaf in jfs_evict_inode" + }, + "CVE-2019-15220": { + "cmt_msg": "p54usb: Fix race between disconnect and firmware loading" + }, + "CVE-2020-11609": { + "cmt_msg": "media: stv06xx: add missing descriptor sanity checks" + }, + "CVE-2020-10773": { + "cmt_msg": "s390/cmm: fix information leak in cmm_timeout_handler()" + }, + "CVE-2020-36782": { + "cmt_msg": "i2c: imx-lpi2c: fix reference leak when pm_runtime_get_sync fails" + }, + "CVE-2020-25284": { + "cmt_msg": "rbd: require global CAP_SYS_ADMIN for mapping and unmapping" + }, + "CVE-2023-4208": { + "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free" + }, + "CVE-2022-3606": { + "cmt_msg": "" + }, + "CVE-2023-4206": { + "cmt_msg": "net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free" + }, + "CVE-2023-4207": { + "cmt_msg": "net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free" + }, + "CVE-2023-3640": { + "cmt_msg": "" + }, + "CVE-2018-18281": { + "cmt_msg": "mremap: properly flush TLB before releasing the page" + }, + "CVE-2023-20593": { + "cmt_msg": "x86/cpu/amd: Add a Zenbleed fix" + }, + "CVE-2023-3022": { + "cmt_msg": "ipv6: Use result arg in fib_lookup_arg consistently" + }, + "CVE-2022-2663": { + "cmt_msg": "netfilter: nf_conntrack_irc: Fix forged IP logic" + }, + "CVE-2021-47049": { + "cmt_msg": "Drivers: hv: vmbus: Use after free in __vmbus_open()" + }, + "CVE-2019-8912": { + "cmt_msg": "net: crypto set sk to NULL when af_alg_release." + }, + "CVE-2023-51780": { + "cmt_msg": "atm: Fix Use-After-Free in do_vcc_ioctl" + }, + "CVE-2023-0047": { + "cmt_msg": "mm, oom: do not trigger out_of_memory from the #PF" + }, + "CVE-2021-47046": { + "cmt_msg": "drm/amd/display: Fix off by one in hdmi_14_process_transaction()" + }, + "CVE-2020-29370": { + "cmt_msg": "mm: slub: add missing TID bump in kmem_cache_alloc_bulk()" + }, + "CVE-2019-15219": { + "cmt_msg": "USB: sisusbvga: fix oops in error path of sisusb_probe" + }, + "CVE-2021-47167": { + "cmt_msg": "NFS: Fix an Oopsable condition in __nfs_pageio_add_request()" + }, + "CVE-2021-47166": { + "cmt_msg": "NFS: Don't corrupt the value of pg_bytes_written in nfs_do_recoalesce()" + }, + "CVE-2021-47165": { + "cmt_msg": "drm/meson: fix shutdown crash when component not probed" + }, + "CVE-2021-47163": { + "cmt_msg": "tipc: wait and exit until all work queues are done" + }, + "CVE-2021-46969": { + "cmt_msg": "bus: mhi: core: Fix invalid error returning in mhi_queue" + }, + "CVE-2021-47161": { + "cmt_msg": "spi: spi-fsl-dspi: Fix a resource leak in an error handling path" + }, + "CVE-2021-47160": { + "cmt_msg": "net: dsa: mt7530: fix VLAN traffic leaks" + }, + "CVE-2023-4385": { + "cmt_msg": "fs: jfs: fix possible NULL pointer dereference in dbFree()" + }, + "CVE-2020-25643": { + "cmt_msg": "hdlc_ppp: add range checks in ppp_cp_parse_cr()" + }, + "CVE-2023-4387": { + "cmt_msg": "net: vmxnet3: fix possible use-after-free bugs in vmxnet3_rq_alloc_rx_buf()" + }, + "CVE-2021-46960": { + "cmt_msg": "cifs: Return correct error code from smb2_get_enc_key" + }, + "CVE-2021-46962": { + "cmt_msg": "mmc: uniphier-sd: Fix a resource leak in the remove function" + }, + "CVE-2021-47168": { + "cmt_msg": "NFS: fix an incorrect limit in filelayout_decode_layout()" + }, + "CVE-2019-19378": { + "cmt_msg": "" + }, + "CVE-2023-52482": { + "cmt_msg": "x86/srso: Add SRSO mitigation for Hygon processors" + }, + "CVE-2023-52599": { + "cmt_msg": "jfs: fix array-index-out-of-bounds in diNewExt" + }, + "CVE-2022-1016": { + "cmt_msg": "netfilter: nf_tables: initialize registers in nft_do_chain()" + }, + "CVE-2020-4788": { + "cmt_msg": "powerpc/64s: flush L1D on kernel entry" + }, + "CVE-2023-52614": { + "cmt_msg": "PM / devfreq: Fix buffer overflow in trans_stat_show" + }, + "CVE-2022-36879": { + "cmt_msg": "xfrm: xfrm_policy: fix a possible double xfrm_pols_put() in xfrm_bundle_lookup()" + }, + "CVE-2022-1011": { + "cmt_msg": "fuse: fix pipe buffer lifetime for direct_io" + }, + "CVE-2021-39698": { + "cmt_msg": "wait: add wake_up_pollfree()" + }, + "CVE-2022-45934": { + "cmt_msg": "Bluetooth: L2CAP: Fix u8 overflow" + }, + "CVE-2022-1247": { + "cmt_msg": "" + }, + "CVE-2019-19377": { + "cmt_msg": "btrfs: Don't submit any btree write bio if the fs has errors" + }, + "CVE-2022-2380": { + "cmt_msg": "video: fbdev: sm712fb: Fix crash in smtcfb_read()" + }, + "CVE-2023-20569": { + "cmt_msg": "x86/bugs: Increase the x86 bugs vector size to two u32s" + }, + "CVE-2022-0850": { + "cmt_msg": "ext4: fix kernel infoleak via ext4_extent_header" + }, + "CVE-2019-19529": { + "cmt_msg": "can: mcba_usb: fix use-after-free on disconnect" + }, + "CVE-2019-19528": { + "cmt_msg": "USB: iowarrior: fix use-after-free on disconnect" + }, + "CVE-2021-3612": { + "cmt_msg": "Input: joydev - prevent potential read overflow in ioctl" + }, + "CVE-2019-19525": { + "cmt_msg": "ieee802154: atusb: fix use-after-free at disconnect" + }, + "CVE-2019-19524": { + "cmt_msg": "Input: ff-memless - kill timer in destroy()" + }, + "CVE-2019-19527": { + "cmt_msg": "HID: hiddev: do cleanup in failure of opening a device" + }, + "CVE-2019-19526": { + "cmt_msg": "NFC: pn533: fix use-after-free and memleaks" + }, + "CVE-2023-31085": { + "cmt_msg": "ubi: Refuse attaching if mtd's erasesize is 0" + }, + "CVE-2019-19523": { + "cmt_msg": "USB: adutux: fix use-after-free on disconnect" + }, + "CVE-2020-24504": { + "cmt_msg": "ice: create scheduler aggregator node config and move VSIs" + }, + "CVE-2020-11725": { + "cmt_msg": "" + }, + "CVE-2021-0937": { + "cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write" + }, + "CVE-2023-52621": { + "cmt_msg": "bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers" + }, + "CVE-2022-1263": { + "cmt_msg": "KVM: avoid NULL pointer dereference in kvm_dirty_ring_push" + }, + "CVE-2021-35477": { + "cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4" + }, + "CVE-2023-31436": { + "cmt_msg": "net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg" + }, + "CVE-2022-3521": { + "cmt_msg": "kcm: avoid potential race in kcm_tx_work" + }, + "CVE-2023-31082": { + "cmt_msg": "" + }, + "CVE-2022-47929": { + "cmt_msg": "net: sched: disallow noqueue for qdisc classes" + }, + "CVE-2019-16746": { + "cmt_msg": "nl80211: validate beacon head" + }, + "CVE-2023-52623": { + "cmt_msg": "SUNRPC: Fix a suspicious RCU usage warning" + }, + "CVE-2021-41864": { + "cmt_msg": "bpf: Fix integer overflow in prealloc_elems_and_freelist()" + }, + "CVE-2023-31081": { + "cmt_msg": "" + }, + "CVE-2022-2209": { + "cmt_msg": "" + }, + "CVE-2023-52624": { + "cmt_msg": "drm/amd/display: Wake DMCUB before executing GPINT commands" + }, + "CVE-2018-18021": { + "cmt_msg": "arm64: KVM: Tighten guest core register access from userspace" + }, + "CVE-2022-45887": { + "cmt_msg": "media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb()" + }, + "CVE-2021-37576": { + "cmt_msg": "KVM: PPC: Book3S: Fix H_RTAS rets buffer overflow" + }, + "CVE-2019-8980": { + "cmt_msg": "exec: Fix mem leak in kernel_read_file" + }, + "CVE-2024-26775": { + "cmt_msg": "aoe: avoid potential deadlock at set_capacity" + }, + "CVE-2023-7042": { + "cmt_msg": "wifi: ath10k: fix NULL pointer dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev()" + }, + "CVE-2022-3594": { + "cmt_msg": "r8152: Rate limit overflow messages" + }, + "CVE-2018-14609": { + "cmt_msg": "btrfs: relocation: Only remove reloc rb_trees if reloc control has been initialized" + }, + "CVE-2023-35824": { + "cmt_msg": "media: dm1105: Fix use after free bug in dm1105_remove due to race condition" + }, + "CVE-2021-33098": { + "cmt_msg": "ixgbe: fix large MTU request from VF" + }, + "CVE-2022-3595": { + "cmt_msg": "cifs: fix double-fault crash during ntlmssp" + }, + "CVE-2023-47233": { + "cmt_msg": "wifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach" + }, + "CVE-2021-35039": { + "cmt_msg": "module: limit enabling module.sig_enforce" + }, + "CVE-2020-27815": { + "cmt_msg": "jfs: Fix array index bounds check in dbAdjTree" + }, + "CVE-2024-26614": { + "cmt_msg": "tcp: make sure init the accept_queue's spinlocks once" + }, + "CVE-2023-52629": { + "cmt_msg": "sh: push-switch: Reorder cleanup operations to avoid use-after-free bug" + }, + "CVE-2024-26736": { + "cmt_msg": "afs: Increase buffer size in afs_update_volume_status()" + }, + "CVE-2022-23041": { + "cmt_msg": "xen/9p: use alloc/free_pages_exact()" + }, + "CVE-2021-33624": { + "cmt_msg": "bpf: Inherit expanded/patched seen count from old aux data" + }, + "CVE-2022-1462": { + "cmt_msg": "tty: use new tty_insert_flip_string_and_push_buffer() in pty_write()" + }, + "CVE-2024-26758": { + "cmt_msg": "md: Don't ignore suspended array in md_check_recovery()" + }, + "CVE-2024-26759": { + "cmt_msg": "mm/swap: fix race when skipping swapcache" + }, + "CVE-2022-3115": { + "cmt_msg": "drm: mali-dp: potential dereference of null pointer" + }, + "CVE-2023-6606": { + "cmt_msg": "smb: client: fix OOB in smbCalcSize()" + }, + "CVE-2023-3006": { + "cmt_msg": "arm64: Add AMPERE1 to the Spectre-BHB affected list" + }, + "CVE-2020-27777": { + "cmt_msg": "powerpc/rtas: Restrict RTAS requests from userspace" + }, + "CVE-2019-20636": { + "cmt_msg": "Input: add safety guards to input_set_keycode()" + }, + "CVE-2019-11486": { + "cmt_msg": "tty: mark Siemens R3964 line discipline as BROKEN" + }, + "CVE-2019-11487": { + "cmt_msg": "fs: prevent page refcount overflow in pipe_buf_get" + }, + "CVE-2022-28390": { + "cmt_msg": "can: ems_usb: ems_usb_start_xmit(): fix double dev_kfree_skb() in error path" + }, + "CVE-2020-27673": { + "cmt_msg": "xen/events: add a proper barrier to 2-level uevent unmasking" + }, + "CVE-2024-26754": { + "cmt_msg": "gtp: fix use-after-free and null-ptr-deref in gtp_genl_dump_pdp()" + }, + "CVE-2020-27675": { + "cmt_msg": "xen/events: avoid removing an event channel while handling it" + }, + "CVE-2024-26756": { + "cmt_msg": "md: Don't register sync_thread for reshape directly" + }, + "CVE-2024-26757": { + "cmt_msg": "md: Don't ignore read-only array in md_check_recovery()" + }, + "CVE-2020-28915": { + "cmt_msg": "fbcon: Fix global-out-of-bounds read in fbcon_get_font()" + }, + "CVE-2021-47169": { + "cmt_msg": "serial: rp2: use 'request_firmware' instead of 'request_firmware_nowait'" + }, + "CVE-2019-20908": { + "cmt_msg": "efi: Restrict efivar_ssdt_load when the kernel is locked down" + }, + "CVE-2023-3776": { + "cmt_msg": "net/sched: cls_fw: Fix improper refcount update leads to use-after-free" + }, + "CVE-2021-28038": { + "cmt_msg": "Xen/gnttab: handle p2m update errors on a per-slot basis" + }, + "CVE-2022-23040": { + "cmt_msg": "xen/xenbus: don't let xenbus_grant_ring() remove grants in error case" + }, + "CVE-2024-26805": { + "cmt_msg": "netlink: Fix kernel-infoleak-after-free in __skb_datagram_iter" + }, + "CVE-2022-3111": { + "cmt_msg": "power: supply: wm8350-power: Add missing free in free_charger_irq" + }, + "CVE-2023-52435": { + "cmt_msg": "net: prevent mss overflow in skb_segment()" + }, + "CVE-2023-52434": { + "cmt_msg": "smb: client: fix potential OOBs in smb2_parse_contexts()" + }, + "CVE-2023-3161": { + "cmt_msg": "fbcon: Check font dimension limits" + }, + "CVE-2023-52436": { + "cmt_msg": "f2fs: explicitly null-terminate the xattr list" + }, + "CVE-2019-19060": { + "cmt_msg": "iio: imu: adis16400: release allocated memory on failure" + }, + "CVE-2019-19061": { + "cmt_msg": "iio: imu: adis16400: fix memory leak" + }, + "CVE-2019-19062": { + "cmt_msg": "crypto: user - fix memory leak in crypto_report" + }, + "CVE-2019-19063": { + "cmt_msg": "rtlwifi: prevent memory leak in rtl_usb_probe" + }, + "CVE-2024-26784": { + "cmt_msg": "pmdomain: arm: Fix NULL dereference on scmi_perf_domain removal" + }, + "CVE-2019-19065": { + "cmt_msg": "RDMA/hfi1: Prevent memory leak in sdma_init" + }, + "CVE-2019-19066": { + "cmt_msg": "scsi: bfa: release allocated memory in case of error" + }, + "CVE-2019-19067": { + "cmt_msg": "drm/amdgpu: fix multiple memory leaks in acp_hw_init" + }, + "CVE-2019-19068": { + "cmt_msg": "rtl8xxxu: prevent leaking urb" + }, + "CVE-2020-0435": { + "cmt_msg": "f2fs: fix to do sanity check with i_extra_isize" + }, + "CVE-2020-0432": { + "cmt_msg": "staging: most: net: fix buffer overflow" + }, + "CVE-2020-0433": { + "cmt_msg": "blk-mq: sync the update nr_hw_queues with blk_mq_queue_tag_busy_iter" + }, + "CVE-2023-51779": { + "cmt_msg": "Bluetooth: af_bluetooth: Fix Use-After-Free in bt_sock_recvmsg" + }, + "CVE-2019-3874": { + "cmt_msg": "sctp: implement memory accounting on tx path" + }, + "CVE-2023-6915": { + "cmt_msg": "ida: Fix crash in ida_free when the bitmap is empty" + }, + "CVE-2010-4563": { + "cmt_msg": "" + }, + "CVE-2021-47006": { + "cmt_msg": "ARM: 9064/1: hw_breakpoint: Do not directly check the event's overflow_handler hook" + }, + "CVE-2023-1249": { + "cmt_msg": "coredump: Use the vma snapshot in fill_files_note" + }, + "CVE-2020-14331": { + "cmt_msg": "vgacon: Fix for missing check in scrollback handling" + }, + "CVE-2023-45871": { + "cmt_msg": "igb: set max size RX buffer when store bad packet is enabled" + }, + "CVE-2019-14835": { + "cmt_msg": "vhost: make sure log_num < in_num" + }, + "CVE-2023-2248": { + "cmt_msg": "net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg" + }, + "CVE-2023-0266": { + "cmt_msg": "ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF" + }, + "CVE-2021-46928": { + "cmt_msg": "parisc: Clear stale IIR value on instruction access rights trap" + }, + "CVE-2021-3483": { + "cmt_msg": "firewire: nosy: Fix a use-after-free bug in nosy_ioctl()" + }, + "CVE-2024-26598": { + "cmt_msg": "KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache" + }, + "CVE-2023-6040": { + "cmt_msg": "netfilter: nf_tables: Reject tables of unsupported family" + }, + "CVE-2023-20588": { + "cmt_msg": "x86/CPU/AMD: Do not leak quotient data after a division by 0" + }, + "CVE-2021-38300": { + "cmt_msg": "bpf, mips: Validate conditional branch offsets" + }, + "CVE-2020-25656": { + "cmt_msg": "vt: keyboard, extend func_buf_lock to readers" + }, + "CVE-2021-3759": { + "cmt_msg": "memcg: enable accounting of ipc resources" + }, + "CVE-2023-1390": { + "cmt_msg": "tipc: fix NULL deref in tipc_link_xmit()" + }, + "CVE-2022-24448": { + "cmt_msg": "NFSv4: Handle case where the lookup of a directory fails" + }, + "CVE-2023-52498": { + "cmt_msg": "PM: sleep: Fix possible deadlocks in core system-wide PM code" + }, + "CVE-2022-23042": { + "cmt_msg": "xen/netfront: react properly to failing gnttab_end_foreign_access_ref()" + }, + "CVE-2019-10142": { + "cmt_msg": "drivers/virt/fsl_hypervisor.c: prevent integer overflow in ioctl" + }, + "CVE-2021-4023": { + "cmt_msg": "io-wq: fix cancellation on create-worker failure" + }, + "CVE-2023-52640": { + "cmt_msg": "fs/ntfs3: Fix oob in ntfs_listxattr" + }, + "CVE-2023-3268": { + "cmt_msg": "relayfs: fix out-of-bounds access in relay_file_read" + }, + "CVE-2022-2318": { + "cmt_msg": "net: rose: fix UAF bugs caused by timer handler" + }, + "CVE-2021-22555": { + "cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write" + }, + "CVE-2020-36694": { + "cmt_msg": "netfilter: x_tables: Switch synchronization to RCU" + }, + "CVE-2021-0399": { + "cmt_msg": "" + }, + "CVE-2023-52488": { + "cmt_msg": "serial: sc16is7xx: convert from _raw_ to _noinc_ regmap functions for FIFO" + }, + "CVE-2020-36691": { + "cmt_msg": "netlink: limit recursion depth in policy validation" + }, + "CVE-2021-47179": { + "cmt_msg": "NFSv4: Fix a NULL pointer dereference in pnfs_mark_matching_lsegs_return()" + }, + "CVE-2023-42755": { + "cmt_msg": "net/sched: Retire rsvp classifier" + }, + "CVE-2020-2732": { + "cmt_msg": "KVM: nVMX: Don't emulate instructions in guest mode" + }, + "CVE-2023-52486": { + "cmt_msg": "drm: Don't unref the same fb many times by mistake due to deadlock handling" + }, + "CVE-2023-52480": { + "cmt_msg": "ksmbd: fix race condition between session lookup and expire" + }, + "CVE-2012-4542": { + "cmt_msg": "" + }, + "CVE-2022-1729": { + "cmt_msg": "perf: Fix sys_perf_event_open() race against self" + }, + "CVE-2023-1838": { + "cmt_msg": "Fix double fget() in vhost_net_set_backend()" + }, + "CVE-2023-28328": { + "cmt_msg": "media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer()" + }, + "CVE-2023-4128": { + "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free" + }, + "CVE-2021-3573": { + "cmt_msg": "Bluetooth: use correct lock to prevent UAF of hdev object" + }, + "CVE-2021-46921": { + "cmt_msg": "locking/qrwlock: Fix ordering in queued_write_lock_slowpath()" + }, + "CVE-2023-3609": { + "cmt_msg": "net/sched: cls_u32: Fix reference counter leak leading to overflow" + }, + "CVE-2022-44033": { + "cmt_msg": "char: pcmcia: remove all the drivers" + }, + "CVE-2022-1974": { + "cmt_msg": "nfc: replace improper check device_is_registered() in netlink related functions" + }, + "CVE-2022-1975": { + "cmt_msg": "NFC: netlink: fix sleep in atomic bug when firmware download timeout" + }, + "CVE-2023-52491": { + "cmt_msg": "media: mtk-jpeg: Fix use after free bug due to error path handling in mtk_jpeg_dec_device_run" + }, + "CVE-2021-47074": { + "cmt_msg": "nvme-loop: fix memory leak in nvme_loop_create_ctrl()" + }, + "CVE-2020-36777": { + "cmt_msg": "media: dvbdev: Fix memory leak in dvb_media_device_free()" + }, + "CVE-2021-28972": { + "cmt_msg": "PCI: rpadlpar: Fix potential drc_name corruption in store functions" + }, + "CVE-2018-12130": { + "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" + }, + "CVE-2021-47083": { + "cmt_msg": "pinctrl: mediatek: fix global-out-of-bounds issue" + }, + "CVE-2021-20292": { + "cmt_msg": "drm/ttm/nouveau: don't call tt destroy callback on alloc failure." + }, + "CVE-2021-31916": { + "cmt_msg": "dm ioctl: fix out of bounds array access when no devices" + }, + "CVE-2018-17182": { + "cmt_msg": "mm: get rid of vmacache_flush_all() entirely" + }, + "CVE-2022-32981": { + "cmt_msg": "powerpc/32: Fix overread/overwrite of thread_struct via ptrace" + }, + "CVE-2021-47122": { + "cmt_msg": "net: caif: fix memory leak in caif_device_notify" + }, + "CVE-2020-25645": { + "cmt_msg": "geneve: add transport ports in route lookup for geneve" + }, + "CVE-2022-1280": { + "cmt_msg": "drm: avoid circular locks in drm_mode_getconnector" + }, + "CVE-2023-3772": { + "cmt_msg": "xfrm: add NULL check in xfrm_update_ae_params" + }, + "CVE-2020-11668": { + "cmt_msg": "media: xirlink_cit: add missing descriptor sanity checks" + }, + "CVE-2020-11669": { + "cmt_msg": "powerpc/powernv/idle: Restore AMR/UAMOR/AMOR after idle" + }, + "CVE-2019-15118": { + "cmt_msg": "ALSA: usb-audio: Fix a stack buffer overflow bug in check_input_term" + }, + "CVE-2019-12818": { + "cmt_msg": "net: nfc: Fix NULL dereference on nfc_llcp_build_tlv fails" + }, + "CVE-2019-12819": { + "cmt_msg": "mdio_bus: Fix use-after-free on device_register fails" + }, + "CVE-2023-0394": { + "cmt_msg": "ipv6: raw: Deduct extension header length in rawv6_push_pending_frames" + }, + "CVE-2021-47171": { + "cmt_msg": "net: usb: fix memory leak in smsc75xx_bind" + }, + "CVE-2020-10690": { + "cmt_msg": "ptp: fix the race between the release of ptp_clock and cdev" + }, + "CVE-2019-12817": { + "cmt_msg": "powerpc/mm/64s/hash: Reallocate context ids on fork" + }, + "CVE-2022-3108": { + "cmt_msg": "drm/amdkfd: Check for null pointer after calling kmemdup" + }, + "CVE-2019-19332": { + "cmt_msg": "KVM: x86: fix out-of-bounds write in KVM_GET_EMULATED_CPUID (CVE-2019-19332)" + }, + "CVE-2019-15117": { + "cmt_msg": "ALSA: usb-audio: Fix an OOB bug in parse_audio_mixer_unit" + }, + "CVE-2023-0386": { + "cmt_msg": "ovl: fail on invalid uid/gid mapping at copy up" + }, + "CVE-2021-3659": { + "cmt_msg": "net: mac802154: Fix general protection fault" + }, + "CVE-2022-25258": { + "cmt_msg": "USB: gadget: validate interface OS descriptor requests" + }, + "CVE-2021-4155": { + "cmt_msg": "xfs: map unwritten blocks in XFS_IOC_{ALLOC,FREE}SP just like fallocate" + }, + "CVE-2019-14901": { + "cmt_msg": "mwifiex: Fix heap overflow in mmwifiex_process_tdls_action_frame()" + }, + "CVE-2021-4150": { + "cmt_msg": "block: fix incorrect references to disk objects" + }, + "CVE-2020-3702": { + "cmt_msg": "ath: Use safer key clearing with key cache entries" + }, + "CVE-2023-52485": { + "cmt_msg": "drm/amd/display: Wake DMCUB before sending a command" + }, + "CVE-2021-3653": { + "cmt_msg": "KVM: nSVM: avoid picking up unsupported bits from L2 in int_ctl (CVE-2021-3653)" + }, + "CVE-2021-3655": { + "cmt_msg": "sctp: validate from_addr_param return" + }, + "CVE-2020-8694": { + "cmt_msg": "powercap: restrict energy meter to root access" + }, + "CVE-2021-4159": { + "cmt_msg": "bpf: Verifer, adjust_scalar_min_max_vals to always call update_reg_bounds()" + }, + "CVE-2023-0461": { + "cmt_msg": "net/ulp: prevent ULP without clone op from entering the LISTEN status" + }, + "CVE-2019-12614": { + "cmt_msg": "powerpc/pseries/dlpar: Fix a missing check in dlpar_parse_cc_property()" + }, + "CVE-2019-12615": { + "cmt_msg": "mdesc: fix a missing-check bug in get_vdev_port_node_info()" + }, + "CVE-2021-3715": { + "cmt_msg": "net_sched: cls_route: remove the right filter from hashtable" + }, + "CVE-2021-3714": { + "cmt_msg": "" + }, + "CVE-2021-46932": { + "cmt_msg": "Input: appletouch - initialize work before device registration" + }, + "CVE-2019-16230": { + "cmt_msg": "drm/amdkfd: fix a potential NULL pointer dereference (v2)" + }, + "CVE-2019-16231": { + "cmt_msg": "fjes: Handle workqueue allocation failure" + }, + "CVE-2019-16232": { + "cmt_msg": "libertas: fix a potential NULL pointer dereference" + }, + "CVE-2019-16233": { + "cmt_msg": "scsi: qla2xxx: fix a potential NULL pointer dereference" + }, + "CVE-2019-16234": { + "cmt_msg": "iwlwifi: pcie: fix rb_allocator workqueue allocation" + }, + "CVE-2023-52445": { + "cmt_msg": "media: pvrusb2: fix use after free on context disconnection" + }, + "CVE-2019-6133": { + "cmt_msg": "fork: record start_time late" + }, + "CVE-2019-3016": { + "cmt_msg": "x86/kvm: Be careful not to clear KVM_VCPU_FLUSH_TLB bit" + }, + "CVE-2021-39633": { + "cmt_msg": "ip_gre: add validation for csum_start" + }, + "CVE-2022-27223": { + "cmt_msg": "USB: gadget: validate endpoint index for xilinx udc" + }, + "CVE-2021-39634": { + "cmt_msg": "epoll: do not insert into poll queues until all sanity checks are done" + }, + "CVE-2024-23851": { + "cmt_msg": "dm: limit the number of targets and parameter size area" + }, + "CVE-2019-3882": { + "cmt_msg": "vfio/type1: Limit DMA mappings per container" + }, + "CVE-2022-33742": { + "cmt_msg": "xen/blkfront: force data bouncing when backend is untrusted" + }, + "CVE-2022-33741": { + "cmt_msg": "xen/netfront: force data bouncing when backend is untrusted" + }, + "CVE-2022-33740": { + "cmt_msg": "xen/netfront: fix leaking data in shared pages" + }, + "CVE-2024-24864": { + "cmt_msg": "" + }, + "CVE-2019-3887": { + "cmt_msg": "KVM: x86: nVMX: close leak of L0's x2APIC MSRs (CVE-2019-3887)" + }, + "CVE-2022-33744": { + "cmt_msg": "xen/arm: Fix race in RB-tree based P2M accounting" + }, + "CVE-2023-52596": { + "cmt_msg": "sysctl: Fix out of bounds access for empty sysctl registers" + }, + "CVE-2023-52597": { + "cmt_msg": "KVM: s390: fix setting of fpc register" + }, + "CVE-2023-52594": { + "cmt_msg": "wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus()" + }, + "CVE-2022-40768": { + "cmt_msg": "scsi: stex: Properly zero out the passthrough command structure" + }, + "CVE-2021-47013": { + "cmt_msg": "net:emac/emac-mac: Fix a use after free in emac_mac_tx_buf_send" + }, + "CVE-2023-52593": { + "cmt_msg": "wifi: wfx: fix possible NULL pointer dereference in wfx_set_mfp_ap()" + }, + "CVE-2021-47158": { + "cmt_msg": "net: dsa: sja1105: add error handling in sja1105_setup()" + }, + "CVE-2021-47010": { + "cmt_msg": "net: Only allow init netns to set default tcp cong to a restricted algo" + }, + "CVE-2021-45486": { + "cmt_msg": "inet: use bigger hash table for IP ID generation" + }, + "CVE-2020-12888": { + "cmt_msg": "vfio-pci: Invalidate mmaps and block MMIO access on disabled memory" + }, + "CVE-2021-47153": { + "cmt_msg": "i2c: i801: Don't generate an interrupt on bus reset" + }, + "CVE-2021-47150": { + "cmt_msg": "net: fec: fix the potential memory leak in fec_enet_init()" + }, + "CVE-2021-3923": { + "cmt_msg": "RDMA/core: Don't infoleak GRH fields" + }, + "CVE-2021-46936": { + "cmt_msg": "net: fix use-after-free in tw_timer_handler" + }, + "CVE-2021-46935": { + "cmt_msg": "binder: fix async_free_space accounting for empty parcels" + }, + "CVE-2021-46934": { + "cmt_msg": "i2c: validate user data in compat ioctl" + }, + "CVE-2021-46933": { + "cmt_msg": "usb: gadget: f_fs: Clear ffs_eventfd in ffs_data_clear." + }, + "CVE-2011-4917": { + "cmt_msg": "" + }, + "CVE-2022-36946": { + "cmt_msg": "netfilter: nf_queue: do not allow packet truncation below transport header offset" + }, + "CVE-2022-0812": { + "cmt_msg": "xprtrdma: fix incorrect header size calculations" + }, + "CVE-2021-45485": { + "cmt_msg": "ipv6: use prandom_u32() for ID generation" + }, + "CVE-2021-0448": { + "cmt_msg": "netfilter: ctnetlink: add a range check for l3/l4 protonum" + }, + "CVE-2018-19824": { + "cmt_msg": "ALSA: usb-audio: Fix UAF decrement if card has no live interfaces in card.c" + }, + "CVE-2021-46939": { + "cmt_msg": "tracing: Restructure trace_clock_global() to never block" + }, + "CVE-2020-29374": { + "cmt_msg": "gup: document and work around \"COW can break either way\" issue" + }, + "CVE-2019-25045": { + "cmt_msg": "xfrm: clean up xfrm protocol checks" + }, + "CVE-2024-26622": { + "cmt_msg": "tomoyo: fix UAF write bug in tomoyo_write_control()" + }, + "CVE-2018-16862": { + "cmt_msg": "mm: cleancache: fix corruption on missed inode invalidation" + }, + "CVE-2023-52449": { + "cmt_msg": "mtd: Fix gluebi NULL pointer dereference caused by ftl notifier" + }, + "CVE-2021-29650": { + "cmt_msg": "netfilter: x_tables: Use correct memory barriers." + }, + "CVE-2019-17133": { + "cmt_msg": "cfg80211: wext: avoid copying malformed SSIDs" + }, + "CVE-2018-20169": { + "cmt_msg": "USB: check usb_get_extra_descriptor for proper size" + }, + "CVE-2019-8956": { + "cmt_msg": "sctp: walk the list of asoc safely" + }, + "CVE-2020-36558": { + "cmt_msg": "vt: vt_ioctl: fix race in VT_RESIZEX" + }, + "CVE-2022-41849": { + "cmt_msg": "fbdev: smscufx: Fix use-after-free in ufx_ops_open()" + }, + "CVE-2022-41848": { + "cmt_msg": "" + }, + "CVE-2020-36312": { + "cmt_msg": "KVM: fix memory leak in kvm_io_bus_unregister_dev()" + }, + "CVE-2024-26720": { + "cmt_msg": "mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again" + }, + "CVE-2022-1353": { + "cmt_msg": "af_key: add __GFP_ZERO flag for compose_sadb_supported in function pfkey_register" + }, + "CVE-2022-28356": { + "cmt_msg": "llc: fix netdevice reference leaks in llc_ui_bind()" + }, + "CVE-2020-16119": { + "cmt_msg": "dccp: don't duplicate ccid when cloning dccp sock" + }, + "CVE-2023-52574": { + "cmt_msg": "team: fix null-ptr-deref when team device type is changed" + }, + "CVE-2022-1198": { + "cmt_msg": "drivers: hamradio: 6pack: fix UAF bug caused by mod_timer()" + }, + "CVE-2022-1199": { + "cmt_msg": "ax25: Fix NULL pointer dereference in ax25_kill_by_device" + }, + "CVE-2023-6546": { + "cmt_msg": "tty: n_gsm: fix the UAF caused by race condition in gsm_cleanup_mux" + }, + "CVE-2021-39801": { + "cmt_msg": "" + }, + "CVE-2021-39800": { + "cmt_msg": "" + }, + "CVE-2024-26676": { + "cmt_msg": "af_unix: Call kfree_skb() for dead unix_(sk)->oob_skb in GC." + }, + "CVE-2018-16884": { + "cmt_msg": "sunrpc: use-after-free in svc_process_common()" + }, + "CVE-2018-16882": { + "cmt_msg": "KVM: Fix UAF in nested posted interrupt processing" + }, + "CVE-2022-1195": { + "cmt_msg": "hamradio: improve the incomplete fix to avoid NPD" + }, + "CVE-2018-16880": { + "cmt_msg": "vhost: fix OOB in get_rx_bufs()" + }, + "CVE-2021-4202": { + "cmt_msg": "NFC: reorganize the functions in nci_request" + }, + "CVE-2021-4203": { + "cmt_msg": "af_unix: fix races in sk_peer_pid and sk_peer_cred accesses" + }, + "CVE-2022-4269": { + "cmt_msg": "act_mirred: use the backlog for nested calls to mirred ingress" + }, + "CVE-2022-45886": { + "cmt_msg": "media: dvb-core: Fix use-after-free due on race condition at dvb_net" + }, + "CVE-2023-52509": { + "cmt_msg": "ravb: Fix use-after-free issue in ravb_tx_timeout_work()" + }, + "CVE-2023-46343": { + "cmt_msg": "nfc: nci: fix possible NULL pointer dereference in send_acknowledge()" + }, + "CVE-2024-25744": { + "cmt_msg": "x86/coco: Disable 32-bit emulation by default on TDX and SEV" + }, + "CVE-2023-5178": { + "cmt_msg": "nvmet-tcp: Fix a possible UAF in queue intialization setup" + }, + "CVE-2023-52504": { + "cmt_msg": "x86/alternatives: Disable KASAN in apply_alternatives()" + }, + "CVE-2023-52507": { + "cmt_msg": "nfc: nci: assert requested protocol is valid" + }, + "CVE-2023-2124": { + "cmt_msg": "xfs: verify buffer contents when we skip log replay" + }, + "CVE-2023-52501": { + "cmt_msg": "ring-buffer: Do not attempt to read past \"commit\"" + }, + "CVE-2023-52500": { + "cmt_msg": "scsi: pm80xx: Avoid leaking tags when processing OPC_INB_SET_CONTROLLER_CONFIG command" + }, + "CVE-2023-52502": { + "cmt_msg": "net: nfc: fix races in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn()" + }, + "CVE-2023-1281": { + "cmt_msg": "net/sched: tcindex: update imperfect hash filters respecting rcu" + }, + "CVE-2023-2860": { + "cmt_msg": "ipv6: sr: fix out-of-bounds read when setting HMAC data." + }, + "CVE-2021-44879": { + "cmt_msg": "f2fs: fix to do sanity check on inode type during garbage collection" + }, + "CVE-2019-15505": { + "cmt_msg": "media: technisat-usb2: break out of loop at end of buffer" + }, + "CVE-2019-15504": { + "cmt_msg": "rsi: fix a double free bug in rsi_91x_deinit()" + }, + "CVE-2023-2513": { + "cmt_msg": "ext4: fix use-after-free in ext4_xattr_set_entry" + }, + "CVE-2023-1855": { + "cmt_msg": "hwmon: (xgene) Fix use after free bug in xgene_hwmon_remove due to race condition" + }, + "CVE-2022-27672": { + "cmt_msg": "x86/speculation: Identify processors vulnerable to SMT RSB predictions" + }, + "CVE-2024-26623": { + "cmt_msg": "pds_core: Prevent race issues involving the adminq" + }, + "CVE-2024-26719": { + "cmt_msg": "nouveau: offload fence uevents work to workqueue" + }, + "CVE-2024-26668": { + "cmt_msg": "netfilter: nft_limit: reject configurations that cause integer overflow" + }, + "CVE-2022-2964": { + "cmt_msg": "net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup" + }, + "CVE-2021-47146": { + "cmt_msg": "mld: fix panic in mld_newpack()" + }, + "CVE-2015-2877": { + "cmt_msg": "" + }, + "CVE-2020-9383": { + "cmt_msg": "floppy: check FDC index for errors before assigning it" + }, + "CVE-2024-26663": { + "cmt_msg": "tipc: Check the bearer type before calling tipc_udp_nl_bearer_add()" + }, + "CVE-2024-26664": { + "cmt_msg": "hwmon: (coretemp) Fix out-of-bounds memory access" + }, + "CVE-2019-16089": { + "cmt_msg": "" + }, + "CVE-2023-1206": { + "cmt_msg": "tcp: Reduce chance of collisions in inet6_hashfn()." + }, + "CVE-2021-38198": { + "cmt_msg": "KVM: X86: MMU: Use the correct inherited permissions to get shadow page" + }, + "CVE-2021-38199": { + "cmt_msg": "NFSv4: Initialise connection to the server in nfs4_alloc_client()" + }, + "CVE-2024-26689": { + "cmt_msg": "ceph: prevent use-after-free in encode_cap_msg()" + }, + "CVE-2022-1679": { + "cmt_msg": "ath9k: fix use-after-free in ath9k_hif_usb_rx_cb" + }, + "CVE-2023-34256": { + "cmt_msg": "ext4: avoid a potential slab-out-of-bounds in ext4_group_desc_csum" + }, + "CVE-2024-26715": { + "cmt_msg": "usb: dwc3: gadget: Fix NULL pointer dereference in dwc3_gadget_suspend" + }, + "CVE-2023-1513": { + "cmt_msg": "kvm: initialize all of the kvm_debugregs structure before sending it to userspace" + }, + "CVE-2021-26401": { + "cmt_msg": "x86/speculation: Use generic retpoline by default on AMD" + }, + "CVE-2024-1312": { + "cmt_msg": "mm: lock_vma_under_rcu() must check vma->anon_vma under vma lock" + }, + "CVE-2020-28941": { + "cmt_msg": "speakup: Do not let the line discipline be used several times" + }, + "CVE-2019-9445": { + "cmt_msg": "f2fs: check if file namelen exceeds max value" + }, + "CVE-2023-52442": { + "cmt_msg": "ksmbd: validate session id and tree id in compound request" + }, + "CVE-2021-3600": { + "cmt_msg": "bpf: Fix 32 bit src register truncation on div/mod" + }, + "CVE-2020-36557": { + "cmt_msg": "vt: vt_ioctl: fix VT_DISALLOCATE freeing in-use virtual console" + }, + "CVE-2021-3506": { + "cmt_msg": "f2fs: fix to avoid out-of-bounds memory access" + }, + "CVE-2019-20934": { + "cmt_msg": "sched/fair: Don't free p->numa_faults with concurrent readers" + }, + "CVE-2011-4916": { + "cmt_msg": "" + }, + "CVE-2020-11565": { + "cmt_msg": "mm: mempolicy: require at least one nodeid for MPOL_PREFERRED" + }, + "CVE-2019-3900": { + "cmt_msg": "vhost_net: fix possible infinite loop" + }, + "CVE-2021-23133": { + "cmt_msg": "net/sctp: fix race condition in sctp_destroy_sock" + }, + "CVE-2018-13100": { + "cmt_msg": "f2fs: fix to do sanity check with secs_per_zone" + }, + "CVE-2019-15807": { + "cmt_msg": "scsi: libsas: delete sas port if expander discover failed" + }, + "CVE-2024-26733": { + "cmt_msg": "arp: Prevent overflow in arp_req_get()." + }, + "CVE-2019-10638": { + "cmt_msg": "inet: switch IP ID generator to siphash" + }, + "CVE-2023-31083": { + "cmt_msg": "Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO" + }, + "CVE-2019-5489": { + "cmt_msg": "Change mincore() to count \"mapped\" pages rather than \"cached\" pages" + }, + "CVE-2021-47082": { + "cmt_msg": "tun: avoid double free in tun_free_netdev" + }, + "CVE-2019-14284": { + "cmt_msg": "floppy: fix div-by-zero in setup_format_params" + }, + "CVE-2019-14283": { + "cmt_msg": "floppy: fix out-of-bounds read in copy_buffer" + }, + "CVE-2023-3338": { + "cmt_msg": "Remove DECnet support from kernel" + }, + "CVE-2023-1637": { + "cmt_msg": "x86/speculation: Restore speculation related MSRs during S3 resume" + } + } + }, + "4.16": { + "4.16": { + "CVE-2018-1000199": { + "cmt_msg": "perf/hwbp: Simplify the perf-hwbp code, fix documentation", + "cmt_id": "f67b15037a7a50c57f72e69a6d59941ad90a0f0f" + } + }, + "4.16-rc1": { + "CVE-2019-19083": { + "cmt_msg": "drm/amd/display: memory leak", + "cmt_id": "9ea29a1f8b9da52d8eca8b0996f1d84eac548d3b" + } + }, + "4.16.1": { + "CVE-2017-17975": { + "cmt_msg": "media: usbtv: prevent double free in error case", + "cmt_id": "8b862cf0bfd4357408500d3254dd1e0119d57059" + } + }, + "4.16.3": { + "CVE-2020-35513": { + "cmt_msg": "nfsd: fix incorrect umasks", + "cmt_id": "35ed0996e1f726c4638b3609898313f5f4013ef8" + } + }, + "4.16.4": { + "CVE-2019-14763": { + "cmt_msg": "usb: dwc3: gadget: never call ->complete() from ->ep_queue()", + "cmt_id": "c3d0f44576923b0106197adf269e6ac377c20df3" + }, + "CVE-2018-1094": { + "cmt_msg": "ext4: always initialize the crc32c checksum driver", + "cmt_id": "114c42aaa63152d31d3c18d5b750de9560f38a63" + }, + "CVE-2018-1095": { + "cmt_msg": "ext4: limit xattr size to INT_MAX", + "cmt_id": "d97c42e8f9bc9054101d04d715ff322379bfa1c9" + }, + "CVE-2018-1108": { + "cmt_msg": "random: fix crng_ready() test", + "cmt_id": "cd8d7a5778a4abf76ee8fe8f1bfcf78976029f8d" + }, + "CVE-2018-1092": { + "cmt_msg": "ext4: fail ext4_iget for root directory if unallocated", + "cmt_id": "510c85c3f0bcfa6111e866b8f3c1a5a58d42da58" + }, + "CVE-2018-20961": { + "cmt_msg": "USB: gadget: f_midi: fixing a possible double-free in f_midi", + "cmt_id": "786513e10cac3cd45b82668fe50d2e9f033c667b" + } + }, + "4.16.6": { + "CVE-2018-10940": { + "cmt_msg": "cdrom: information leak in cdrom_ioctl_media_changed()", + "cmt_id": "9ee2c2beb5ba8f96ca8af41b7da2e3d756026842" + } + }, + "4.16.7": { + "CVE-2018-9415": { + "cmt_msg": "ARM: amba: Fix race condition with driver_override", + "cmt_id": "9c1c4f09f70d7f543f7495e1f047b23a561f00de" + }, + "CVE-2018-9385": { + "cmt_msg": "ARM: amba: Don't read past the end of sysfs \"driver_override\" buffer", + "cmt_id": "064edf1191f5e0255ba3f030400b07abf2a6fe99" + }, + "CVE-2018-1093": { + "cmt_msg": "ext4: add validity checks for bitmap block numbers", + "cmt_id": "169c851575ece8ae4be7a36ee30caa01a43a1b0f" + } + }, + "4.16.9": { + "CVE-2018-1000200": { + "cmt_msg": "mm, oom: fix concurrent munlock and oom reaper unmap, v3", + "cmt_id": "092d4bd6bdf55899d238737d6870adef6f225211" + }, + "CVE-2018-11508": { + "cmt_msg": "compat: fix 4-byte infoleak via uninitialized struct field", + "cmt_id": "1c2117b6ee880d70dbed1845e187225303317928" + } + }, + "4.16.10": { + "CVE-2018-1120": { + "cmt_msg": "proc: do not access cmdline nor environ from file-backed areas", + "cmt_id": "b7458b534b56b9b4d9297ba7a6708aa8071ac8ba" + } + }, + "4.16.11": { + "CVE-2018-5814": { + "cmt_msg": "usbip: usbip_host: fix NULL-ptr deref and use-after-free errors", + "cmt_id": "8fa17d2b620c615a5a1723184e968275dc26a896" + }, + "CVE-2018-3639": { + "cmt_msg": "x86/nospec: Simplify alternative_msr_write()", + "cmt_id": "2cd883a4cc87871db17dbc52398a58321af209b1" + } + }, + "4.16.12": { + "CVE-2018-1000204": { + "cmt_msg": "scsi: sg: allocate with __GFP_ZERO in sg_build_indirect()", + "cmt_id": "39169410574503c6e901de1aa6eac5108475e017" + } + }, + "4.16.13": { + "CVE-2018-11506": { + "cmt_msg": "sr: pass down correctly sized SCSI sense buffer", + "cmt_id": "98d02fd4618c48d75589820e8fc39e60c3d3728e" + }, + "CVE-2017-13695": { + "cmt_msg": "ACPICA: acpi: acpica: fix acpi operand cache leak in nseval.c", + "cmt_id": "1313bbe2d4a7dfd1fc503a2a9b7af4c88e2f68ec" + } + }, + "4.16.15": { + "CVE-2019-18675": { + "cmt_msg": "mmap: introduce sane default mmap limits", + "cmt_id": "0c19efdfe9533b4fca0a733088abab912cc8e391" + } + }, + "4.16.16": { + "CVE-2018-10853": { + "cmt_msg": "kvm: x86: use correct privilege level for sgdt/sidt/fxsave/fxrstor access", + "cmt_id": "3e4717b5bfaebac92f892e50270f001f66f9cb4f" + }, + "CVE-2018-12904": { + "cmt_msg": "kvm: nVMX: Enforce cpl=0 for VMX instructions", + "cmt_id": "b775e0be2c1006a540cdf4982dc588d641e09b2e" + } + }, + "4.16.18": { + "CVE-2018-10840": { + "cmt_msg": "ext4: correctly handle a zero-length xattr with a non-zero e_value_offs", + "cmt_id": "e236c837fbaeb666d66966ba150015016fad901e" + }, + "CVE-2018-1118": { + "cmt_msg": "vhost: fix info leak due to uninitialized memory", + "cmt_id": "5e479dbd7083adaa1032e44957438583f2d91e44" + }, + "CVE-2018-11412": { + "cmt_msg": "ext4: do not allow external inodes for inline data", + "cmt_id": "ebff7cb0666c47a7ee37dfc815fc85fcaf19be3e" + }, + "CVE-2018-12232": { + "cmt_msg": "socket: close race condition between sock_close() and sockfs_setattr()", + "cmt_id": "abaa1bb5e3652593a22a51e289bf9dfd4d4a8542" + } + }, + "outstanding": { + "CVE-2019-15090": { + "cmt_msg": "scsi: qedi: remove memset/memcpy to nfunc and use func instead" + }, + "CVE-2019-15099": { + "cmt_msg": "ath6kl: fix a NULL-ptr-deref bug in ath6kl_usb_alloc_urb_from_pipe()" + }, + "CVE-2019-15098": { + "cmt_msg": "ath6kl: fix a NULL-ptr-deref bug in ath6kl_usb_alloc_urb_from_pipe()" + }, + "CVE-2022-0001": { + "cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE" + }, + "CVE-2023-2248": { + "cmt_msg": "net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg" + }, + "CVE-2022-0002": { + "cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE" + }, + "CVE-2019-19965": { + "cmt_msg": "scsi: libsas: stop discovering if oob mode is disconnected" + }, + "CVE-2019-19966": { + "cmt_msg": "media: cpia2: Fix use-after-free in cpia2_exit" + }, + "CVE-2023-52615": { + "cmt_msg": "hwrng: core - Fix page fault dead lock on mmap-ed hwrng" + }, + "CVE-2023-52614": { + "cmt_msg": "PM / devfreq: Fix buffer overflow in trans_stat_show" + }, + "CVE-2023-52617": { + "cmt_msg": "PCI: switchtec: Fix stdev_release() crash after surprise hot remove" + }, + "CVE-2020-24587": { + "cmt_msg": "mac80211: prevent mixed key and fragment cache attacks" + }, + "CVE-2020-24586": { + "cmt_msg": "mac80211: prevent mixed key and fragment cache attacks" + }, + "CVE-2023-52612": { + "cmt_msg": "crypto: scomp - fix req->dst buffer overflow" + }, + "CVE-2021-0129": { + "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical" + }, + "CVE-2020-24588": { + "cmt_msg": "cfg80211: mitigate A-MSDU aggregation attacks" + }, + "CVE-2023-52619": { + "cmt_msg": "pstore/ram: Fix crash when setting number of cpus to an odd number" + }, + "CVE-2023-52618": { + "cmt_msg": "block/rnbd-srv: Check for unlikely string overflow" + }, + "CVE-2023-5717": { + "cmt_msg": "perf: Disallow mis-matched inherited group reads" + }, + "CVE-2019-9506": { + "cmt_msg": "Bluetooth: Fix faulty expression for minimum encryption key size check" + }, + "CVE-2019-9500": { + "cmt_msg": "brcmfmac: assure SSID length from firmware is limited" + }, + "CVE-2019-9503": { + "cmt_msg": "brcmfmac: add subtype check for event handling in data path" + }, + "CVE-2022-0480": { + "cmt_msg": "memcg: enable accounting for file lock caches" + }, + "CVE-2022-0487": { + "cmt_msg": "moxart: fix potential use-after-free on remove path" + }, + "CVE-2022-23825": { + "cmt_msg": "" + }, + "CVE-2021-42252": { + "cmt_msg": "soc: aspeed: lpc-ctrl: Fix boundary check for mmap" + }, + "CVE-2021-47112": { + "cmt_msg": "x86/kvm: Teardown PV features on boot CPU as well" + }, + "CVE-2021-47113": { + "cmt_msg": "btrfs: abort in rename_exchange if we fail to insert the second ref" + }, + "CVE-2021-47110": { + "cmt_msg": "x86/kvm: Disable kvmclock on all CPUs on shutdown" + }, + "CVE-2021-47116": { + "cmt_msg": "ext4: fix memory leak in ext4_mb_init_backend on error path." + }, + "CVE-2021-47117": { + "cmt_msg": "ext4: fix bug on in ext4_es_cache_extent as ext4_split_extent_at failed" + }, + "CVE-2021-47114": { + "cmt_msg": "ocfs2: fix data corruption by fallocate" + }, + "CVE-2021-47118": { + "cmt_msg": "pid: take a reference when initializing `cad_pid`" + }, + "CVE-2021-46970": { + "cmt_msg": "bus: mhi: pci_generic: Remove WQ_MEM_RECLAIM flag from state workqueue" + }, + "CVE-2019-10207": { + "cmt_msg": "Bluetooth: hci_uart: check for missing tty operations" + }, + "CVE-2023-0459": { + "cmt_msg": "uaccess: Add speculation barrier to copy_from_user()" + }, + "CVE-2023-0458": { + "cmt_msg": "prlimit: do_prlimit needs to have a speculation check" + }, + "CVE-2021-30002": { + "cmt_msg": "media: v4l: ioctl: Fix memory leak in video_usercopy" + }, + "CVE-2021-0941": { + "cmt_msg": "bpf: Remove MTU check in __bpf_skb_max_len" + }, + "CVE-2021-39711": { + "cmt_msg": "bpf: fix panic due to oob in bpf_prog_test_run_skb" + }, + "CVE-2020-15802": { + "cmt_msg": "" + }, + "CVE-2022-3636": { + "cmt_msg": "net: ethernet: mtk_eth_soc: use after free in __mtk_ppe_check_skb()" + }, + "CVE-2022-3635": { + "cmt_msg": "atm: idt77252: fix use-after-free bugs caused by tst_timer" + }, + "CVE-2021-28715": { + "cmt_msg": "xen/netback: don't queue unlimited number of packages" + }, + "CVE-2022-34918": { + "cmt_msg": "netfilter: nf_tables: stricter validation of element data" + }, + "CVE-2021-47028": { + "cmt_msg": "mt76: mt7915: fix txrate reporting" + }, + "CVE-2019-11085": { + "cmt_msg": "drm/i915/gvt: Fix mmap range check" + }, + "CVE-2018-19854": { + "cmt_msg": "crypto: user - fix leaking uninitialized memory to userspace" + }, + "CVE-2023-1079": { + "cmt_msg": "HID: asus: use spinlock to safely schedule workers" + }, + "CVE-2021-43389": { + "cmt_msg": "isdn: cpai: check ctr->cnr to avoid array index out of bound" + }, + "CVE-2023-1074": { + "cmt_msg": "sctp: fail if no bound addresses can be used for a given scope" + }, + "CVE-2023-1076": { + "cmt_msg": "tun: tun_chr_open(): correctly initialize socket uid" + }, + "CVE-2023-1077": { + "cmt_msg": "sched/rt: pick_next_rt_entity(): check list_entry" + }, + "CVE-2023-40283": { + "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb" + }, + "CVE-2023-1073": { + "cmt_msg": "HID: check empty report_list in hid_validate_values()" + }, + "CVE-2018-13093": { + "cmt_msg": "xfs: validate cached inodes are free when allocated" + }, + "CVE-2018-13096": { + "cmt_msg": "f2fs: fix to do sanity check with node footer and iblocks" + }, + "CVE-2018-13097": { + "cmt_msg": "f2fs: fix to do sanity check with user_block_count" + }, + "CVE-2018-13094": { + "cmt_msg": "xfs: don't call xfs_da_shrink_inode with NULL bp" + }, + "CVE-2018-13095": { + "cmt_msg": "xfs: More robust inode extent count validation" + }, + "CVE-2018-13098": { + "cmt_msg": "f2fs: fix to do sanity check with extra_attr feature" + }, + "CVE-2018-13099": { + "cmt_msg": "f2fs: fix to do sanity check with reserved blkaddr of inline inode" + }, + "CVE-2019-19770": { + "cmt_msg": "blktrace: fix debugfs use after free" + }, + "CVE-2019-11884": { + "cmt_msg": "Bluetooth: hidp: fix buffer overflow" + }, + "CVE-2019-11810": { + "cmt_msg": "scsi: megaraid_sas: return error when create DMA pool failed" + }, + "CVE-2019-18683": { + "cmt_msg": "media: vivid: Fix wrong locking that causes race conditions on streaming stop" + }, + "CVE-2019-18680": { + "cmt_msg": "" + }, + "CVE-2022-20154": { + "cmt_msg": "sctp: use call_rcu to free endpoint" + }, + "CVE-2021-45868": { + "cmt_msg": "quota: check block number when reading the block in quota file" + }, + "CVE-2022-20158": { + "cmt_msg": "net/packet: fix slab-out-of-bounds access in packet_recvmsg()" + }, + "CVE-2024-0564": { + "cmt_msg": "" + }, + "CVE-2020-0404": { + "cmt_msg": "media: uvcvideo: Avoid cyclic entity chains due to malformed USB descriptors" + }, + "CVE-2022-39189": { + "cmt_msg": "KVM: x86: do not report a vCPU as preempted outside instruction boundaries" + }, + "CVE-2022-39188": { + "cmt_msg": "mmu_gather: Force tlb-flush VM_PFNMAP vmas" + }, + "CVE-2020-27066": { + "cmt_msg": "xfrm: policy: Fix doulbe free in xfrm_policy_timer" + }, + "CVE-2020-27068": { + "cmt_msg": "cfg80211: add missing policy for NL80211_ATTR_STATUS_CODE" + }, + "CVE-2024-23307": { + "cmt_msg": "md/raid5: fix atomicity violation in raid5_cache_count" + }, + "CVE-2019-3016": { + "cmt_msg": "x86/kvm: Be careful not to clear KVM_VCPU_FLUSH_TLB bit" + }, + "CVE-2020-15393": { + "cmt_msg": "usb: usbtest: fix missing kfree(dev->buf) in usbtest_disconnect" + }, + "CVE-2019-19082": { + "cmt_msg": "drm/amd/display: prevent memory leak" + }, + "CVE-2021-3564": { + "cmt_msg": "Bluetooth: fix the erroneous flush_work() order" + }, + "CVE-2018-12127": { + "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" + }, + "CVE-2018-12126": { + "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" + }, + "CVE-2021-28964": { + "cmt_msg": "btrfs: fix race when cloning extent buffer during rewind of an old root" + }, + "CVE-2019-13631": { + "cmt_msg": "Input: gtco - bounds check collection indent level" + }, + "CVE-2018-12233": { + "cmt_msg": "jfs: Fix inconsistency between memory allocation and ea_buf->max_size" + }, + "CVE-2019-16229": { + "cmt_msg": "drm/amdkfd: fix a potential NULL pointer dereference (v2)" + }, + "CVE-2020-8649": { + "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region" + }, + "CVE-2020-8648": { + "cmt_msg": "vt: selection, close sel_buffer race" + }, + "CVE-2023-35823": { + "cmt_msg": "media: saa7134: fix use after free bug in saa7134_finidev due to race condition" + }, + "CVE-2019-0155": { + "cmt_msg": "drm/i915: Rename gen7 cmdparser tables" + }, + "CVE-2019-0154": { + "cmt_msg": "drm/i915: Lower RM timeout to avoid DSI hard hangs" + }, + "CVE-2023-35827": { + "cmt_msg": "ravb: Fix use-after-free issue in ravb_tx_timeout_work()" + }, + "CVE-2023-52585": { + "cmt_msg": "drm/amdgpu: Fix possible NULL dereference in amdgpu_ras_query_error_status_helper()" + }, + "CVE-2023-52584": { + "cmt_msg": "spmi: mediatek: Fix UAF on device remove" + }, + "CVE-2023-52587": { + "cmt_msg": "IB/ipoib: Fix mcast list locking" + }, + "CVE-2023-52586": { + "cmt_msg": "drm/msm/dpu: Add mutex lock in control vblank irq" + }, + "CVE-2023-52583": { + "cmt_msg": "ceph: fix deadlock or deadcode of misusing dget()" + }, + "CVE-2023-52589": { + "cmt_msg": "media: rkisp1: Fix IRQ disable race issue" + }, + "CVE-2023-52588": { + "cmt_msg": "f2fs: fix to tag gcing flag on page during block migration" + }, + "CVE-2023-52340": { + "cmt_msg": "ipv6: remove max_size check inline with ipv4" + }, + "CVE-2021-3635": { + "cmt_msg": "netfilter: nf_tables: fix flowtable list del corruption" + }, + "CVE-2021-46969": { + "cmt_msg": "bus: mhi: core: Fix invalid error returning in mhi_queue" + }, + "CVE-2020-16120": { + "cmt_msg": "ovl: switch to mounter creds in readdir" + }, + "CVE-2019-17666": { + "cmt_msg": "rtlwifi: Fix potential overflow on P2P code" + }, + "CVE-2018-15471": { + "cmt_msg": "xen-netback: fix input validation in xenvif_set_hash_mapping()" + }, + "CVE-2021-34693": { + "cmt_msg": "can: bcm: fix infoleak in struct bcm_msg_head" + }, + "CVE-2020-11494": { + "cmt_msg": "slcan: Don't transmit uninitialized stack data in padding" + }, + "CVE-2024-26797": { + "cmt_msg": "drm/amd/display: Prevent potential buffer overflow in map_hw_resources" + }, + "CVE-2024-26791": { + "cmt_msg": "btrfs: dev-replace: properly validate device names" + }, + "CVE-2024-26793": { + "cmt_msg": "gtp: fix use-after-free and null-ptr-deref in gtp_newlink()" + }, + "CVE-2022-30594": { + "cmt_msg": "ptrace: Check PTRACE_O_SUSPEND_SECCOMP permission on PTRACE_SEIZE" + }, + "CVE-2024-26798": { + "cmt_msg": "fbcon: always restore the old font data in fbcon_do_set_font()" + }, + "CVE-2021-38204": { + "cmt_msg": "usb: max-3421: Prevent corruption of freed memory" + }, + "CVE-2021-38205": { + "cmt_msg": "net: xilinx_emaclite: Do not print real IOMEM pointer" + }, + "CVE-2020-0255": { + "cmt_msg": "selinux: properly handle multiple messages in selinux_netlink_send()" + }, + "CVE-2023-35001": { + "cmt_msg": "netfilter: nf_tables: prevent OOB access in nft_byteorder_eval" + }, + "CVE-2022-27666": { + "cmt_msg": "esp: Fix possible buffer overflow in ESP transformation" + }, + "CVE-2021-38208": { + "cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect" + }, + "CVE-2022-0168": { + "cmt_msg": "cifs: fix NULL ptr dereference in smb2_ioctl_query_info()" + }, + "CVE-2020-26556": { + "cmt_msg": "" + }, + "CVE-2020-26557": { + "cmt_msg": "" + }, + "CVE-2024-26778": { + "cmt_msg": "fbdev: savage: Error out if pixclock equals zero" + }, + "CVE-2020-26555": { + "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical" + }, + "CVE-2024-26776": { + "cmt_msg": "spi: hisi-sfc-v3xx: Return IRQ_NONE if no interrupts were detected" + }, + "CVE-2024-26777": { + "cmt_msg": "fbdev: sis: Error out if pixclock equals zero" + }, + "CVE-2024-26774": { + "cmt_msg": "ext4: avoid dividing by 0 in mb_update_avg_fragment_size() when block bitmap corrupt" + }, + "CVE-2023-3390": { + "cmt_msg": "netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE" + }, + "CVE-2023-3397": { + "cmt_msg": "" + }, + "CVE-2024-26773": { + "cmt_msg": "ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found()" + }, + "CVE-2024-26770": { + "cmt_msg": "HID: nvidia-shield: Add missing null pointer checks to LED initialization" + }, + "CVE-2024-26771": { + "cmt_msg": "dmaengine: ti: edma: Add some null pointer checks to the edma_probe" + }, + "CVE-2019-13233": { + "cmt_msg": "x86/insn-eval: Fix use-after-free access to LDT entry" + }, + "CVE-2023-28746": { + "cmt_msg": "x86/mmio: Disable KVM mitigation when X86_FEATURE_CLEAR_CPU_BUF is set" + }, + "CVE-2021-47119": { + "cmt_msg": "ext4: fix memory leak in ext4_fill_super" + }, + "CVE-2024-1086": { + "cmt_msg": "netfilter: nf_tables: reject QUEUE/DROP verdict parameters" + }, + "CVE-2019-9466": { + "cmt_msg": "brcmfmac: add subtype check for event handling in data path" + }, + "CVE-2022-0382": { + "cmt_msg": "net ticp:fix a kernel-infoleak in __tipc_sendmsg()" + }, + "CVE-2023-32233": { + "cmt_msg": "netfilter: nf_tables: deactivate anonymous set from preparation phase" + }, + "CVE-2019-15222": { + "cmt_msg": "ALSA: usb-audio: Fix gpf in snd_usb_pipe_sanity_check" + }, + "CVE-2019-15223": { + "cmt_msg": "ALSA: line6: Assure canceling delayed work at disconnection" + }, + "CVE-2020-25285": { + "cmt_msg": "mm/hugetlb: fix a race between hugetlb sysctl handlers" + }, + "CVE-2019-15221": { + "cmt_msg": "ALSA: line6: Fix write on zero-sized buffer" + }, + "CVE-2022-1016": { + "cmt_msg": "netfilter: nf_tables: initialize registers in nft_do_chain()" + }, + "CVE-2022-1011": { + "cmt_msg": "fuse: fix pipe buffer lifetime for direct_io" + }, + "CVE-2022-1012": { + "cmt_msg": "secure_seq: use the 64 bits of the siphash for port offset calculation" + }, + "CVE-2023-52620": { + "cmt_msg": "netfilter: nf_tables: disallow timeout for anonymous sets" + }, + "CVE-2023-52621": { + "cmt_msg": "bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers" + }, + "CVE-2023-52622": { + "cmt_msg": "ext4: avoid online resizing failures due to oversized flex bg" + }, + "CVE-2023-52623": { + "cmt_msg": "SUNRPC: Fix a suspicious RCU usage warning" + }, + "CVE-2023-52624": { + "cmt_msg": "drm/amd/display: Wake DMCUB before executing GPINT commands" + }, + "CVE-2023-52625": { + "cmt_msg": "drm/amd/display: Refactor DMCUB enter/exit idle interface" + }, + "CVE-2023-52628": { + "cmt_msg": "netfilter: nftables: exthdr: fix 4-byte stack OOB write" + }, + "CVE-2023-52629": { + "cmt_msg": "sh: push-switch: Reorder cleanup operations to avoid use-after-free bug" + }, + "CVE-2018-14617": { + "cmt_msg": "hfsplus: fix NULL dereference in hfsplus_lookup()" + }, + "CVE-2022-0492": { + "cmt_msg": "cgroup-v1: Require capabilities to set release_agent" + }, + "CVE-2020-12352": { + "cmt_msg": "Bluetooth: A2MP: Fix not initializing all members" + }, + "CVE-2020-12351": { + "cmt_msg": "Bluetooth: L2CAP: Fix calling sk_filter on non-socket based channel" + }, + "CVE-2022-0494": { + "cmt_msg": "block-map: add __GFP_ZERO flag for alloc_page in function bio_copy_kern" + }, + "CVE-2021-47101": { + "cmt_msg": "asix: fix uninit-value in asix_mdio_read()" + }, + "CVE-2021-47100": { + "cmt_msg": "ipmi: Fix UAF when uninstall ipmi_si and ipmi_msghandler module" + }, + "CVE-2021-47103": { + "cmt_msg": "inet: fully convert sk->sk_rx_dst to RCU rules" + }, + "CVE-2021-46982": { + "cmt_msg": "f2fs: compress: fix race condition of overwrite vs truncate" + }, + "CVE-2007-3719": { + "cmt_msg": "" + }, + "CVE-2023-3863": { + "cmt_msg": "net: nfc: Fix use-after-free caused by nfc_llcp_find_local" + }, + "CVE-2019-19319": { + "cmt_msg": "ext4: protect journal inode's blocks using block_validity" + }, + "CVE-2022-3628": { + "cmt_msg": "wifi: brcmfmac: Fix potential buffer overflow in brcmf_fweh_event_worker()" + }, + "CVE-2022-3629": { + "cmt_msg": "vsock: Fix memory leak in vsock_connect()" + }, + "CVE-2022-3621": { + "cmt_msg": "nilfs2: fix NULL pointer dereference at nilfs_bmap_lookup_at_level()" + }, + "CVE-2022-23960": { + "cmt_msg": "ARM: report Spectre v2 status through sysfs" + }, + "CVE-2022-3624": { + "cmt_msg": "bonding: fix reference count leak in balance-alb mode" + }, + "CVE-2019-11091": { + "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" + }, + "CVE-2023-4921": { + "cmt_msg": "net: sched: sch_qfq: Fix UAF in qfq_dequeue()" + }, + "CVE-2023-1829": { + "cmt_msg": "net/sched: Retire tcindex classifier" + }, + "CVE-2019-19227": { + "cmt_msg": "appletalk: Fix potential NULL pointer dereference in unregister_snap_client" + }, + "CVE-2024-0775": { + "cmt_msg": "ext4: improve error recovery code paths in __ext4_remount()" + }, + "CVE-2020-24394": { + "cmt_msg": "nfsd: apply umask on fs without ACL support" + }, + "CVE-2020-14386": { + "cmt_msg": "net/packet: fix overflow in tpacket_rcv" + }, + "CVE-2020-14385": { + "cmt_msg": "xfs: fix boundary test in xfs_attr_shortform_verify" + }, + "CVE-2019-19767": { + "cmt_msg": "ext4: add more paranoia checking in ext4_expand_extra_isize handling" + }, + "CVE-2020-14381": { + "cmt_msg": "futex: Fix inode life-time issue" + }, + "CVE-2019-19768": { + "cmt_msg": "blktrace: Protect q->blk_trace with RCU" + }, + "CVE-2022-20141": { + "cmt_msg": "igmp: Add ip_mc_list lock in ip_check_mc_rcu" + }, + "CVE-2023-23455": { + "cmt_msg": "net: sched: atm: dont intepret cls results when asked to drop" + }, + "CVE-2023-23454": { + "cmt_msg": "net: sched: cbq: dont intepret cls results when asked to drop" + }, + "CVE-2022-20148": { + "cmt_msg": "f2fs: fix UAF in f2fs_available_free_memory" + }, + "CVE-2023-6931": { + "cmt_msg": "perf: Fix perf_event_validate_size()" + }, + "CVE-2023-6932": { + "cmt_msg": "ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet" + }, + "CVE-2024-0607": { + "cmt_msg": "netfilter: nf_tables: fix pointer math issue in nft_byteorder_eval()" + }, + "CVE-2021-0605": { + "cmt_msg": "af_key: pfkey_dump needs parameter validation" + }, + "CVE-2022-20008": { + "cmt_msg": "mmc: block: fix read single on recovery logic" + }, + "CVE-2019-18786": { + "cmt_msg": "media: rcar_drif: fix a memory disclosure" + }, + "CVE-2018-18955": { + "cmt_msg": "userns: also map extents in the reverse map to kernel IDs" + }, + "CVE-2022-2153": { + "cmt_msg": "KVM: x86: Avoid theoretical NULL pointer dereference in kvm_irq_delivery_to_apic_fast()" + }, + "CVE-2024-2193": { + "cmt_msg": "" + }, + "CVE-2018-12930": { + "cmt_msg": "" + }, + "CVE-2018-12931": { + "cmt_msg": "" + }, + "CVE-2021-28972": { + "cmt_msg": "PCI: rpadlpar: Fix potential drc_name corruption in store functions" + }, + "CVE-2021-28971": { + "cmt_msg": "perf/x86/intel: Fix a crash caused by zero PEBS status" + }, + "CVE-2022-22942": { + "cmt_msg": "drm/vmwgfx: Fix stale file descriptors on failed usercopy" + }, + "CVE-2019-19543": { + "cmt_msg": "media: serial_ir: Fix use-after-free in serial_ir_init_module" + }, + "CVE-2020-36783": { + "cmt_msg": "i2c: img-scb: fix reference leak when pm_runtime_get_sync fails" + }, + "CVE-2020-36780": { + "cmt_msg": "i2c: sprd: fix reference leak when pm_runtime_get_sync fails" + }, + "CVE-2020-36781": { + "cmt_msg": "i2c: imx: fix reference leak when pm_runtime_get_sync fails" + }, + "CVE-2021-3732": { + "cmt_msg": "ovl: prevent private clone if bind mount is not allowed" + }, + "CVE-2020-36784": { + "cmt_msg": "i2c: cadence: fix reference leak when pm_runtime_get_sync fails" + }, + "CVE-2024-26647": { + "cmt_msg": "drm/amd/display: Fix late derefrence 'dsc' check in 'link_set_dsc_pps_packet()'" + }, + "CVE-2022-20369": { + "cmt_msg": "media: v4l2-mem2mem: Apply DST_QUEUE_OFF_BASE on MMAP buffers across ioctls" + }, + "CVE-2017-13168": { + "cmt_msg": "scsi: sg: mitigate read/write abuse" + }, + "CVE-2019-0148": { + "cmt_msg": "i40e: Wrong truncation from u16 to u8" + }, + "CVE-2019-17075": { + "cmt_msg": "RDMA/cxgb4: Do not dma memory off of the stack" + }, + "CVE-2019-0146": { + "cmt_msg": "i40e: add num_vectors checker in iwarp handler" + }, + "CVE-2019-0147": { + "cmt_msg": "i40e: add num_vectors checker in iwarp handler" + }, + "CVE-2019-0145": { + "cmt_msg": "i40e: add num_vectors checker in iwarp handler" + }, + "CVE-2022-44034": { + "cmt_msg": "char: pcmcia: remove all the drivers" + }, + "CVE-2022-44033": { + "cmt_msg": "char: pcmcia: remove all the drivers" + }, + "CVE-2022-44032": { + "cmt_msg": "char: pcmcia: remove all the drivers" + }, + "CVE-2021-46906": { + "cmt_msg": "HID: usbhid: fix info leak in hid_submit_ctrl" + }, + "CVE-2021-3609": { + "cmt_msg": "can: bcm: delay release of struct bcm_op after synchronize_rcu()" + }, + "CVE-2021-3600": { + "cmt_msg": "bpf: Fix 32 bit src register truncation on div/mod" + }, + "CVE-2021-23133": { + "cmt_msg": "net/sctp: fix race condition in sctp_destroy_sock" + }, + "CVE-2018-14616": { + "cmt_msg": "f2fs: fix to do sanity check with block address in main area v2" + }, + "CVE-2019-20095": { + "cmt_msg": "mwifiex: Fix mem leak in mwifiex_tm_cmd" + }, + "CVE-2019-20096": { + "cmt_msg": "dccp: Fix memleak in __feat_register_sp" + }, + "CVE-2018-6554": { + "cmt_msg": "staging: irda: remove the irda network stack and drivers" + }, + "CVE-2018-6555": { + "cmt_msg": "staging: irda: remove the irda network stack and drivers" + }, + "CVE-2019-9213": { + "cmt_msg": "mm: enforce min addr even if capable() in expand_downwards()" + }, + "CVE-2019-14896": { + "cmt_msg": "libertas: Fix two buffer overflows at parsing bss descriptor" + }, + "CVE-2019-14897": { + "cmt_msg": "libertas: Fix two buffer overflows at parsing bss descriptor" + }, + "CVE-2019-14895": { + "cmt_msg": "mwifiex: fix possible heap overflow in mwifiex_process_country_ie()" + }, + "CVE-2024-26784": { + "cmt_msg": "pmdomain: arm: Fix NULL dereference on scmi_perf_domain removal" + }, + "CVE-2024-26789": { + "cmt_msg": "crypto: arm64/neonbs - fix out-of-bounds access on short input" + }, + "CVE-2020-0067": { + "cmt_msg": "f2fs: fix to avoid memory leakage in f2fs_listxattr" + }, + "CVE-2020-26541": { + "cmt_msg": "certs: Add EFI_CERT_X509_GUID support for dbx entries" + }, + "CVE-2024-26769": { + "cmt_msg": "nvmet-fc: avoid deadlock on delete association path" + }, + "CVE-2024-26768": { + "cmt_msg": "LoongArch: Change acpi_core_pic[NR_CPUS] to acpi_core_pic[MAX_CORE_PIC]" + }, + "CVE-2024-26765": { + "cmt_msg": "LoongArch: Disable IRQ before init_fn() for nonboot CPUs" + }, + "CVE-2024-26764": { + "cmt_msg": "fs/aio: Restrict kiocb_set_cancel_fn() to I/O submitted via libaio" + }, + "CVE-2024-26767": { + "cmt_msg": "drm/amd/display: fixed integer types and null check locations" + }, + "CVE-2024-26766": { + "cmt_msg": "IB/hfi1: Fix sdma.h tx->num_descs off-by-one error" + }, + "CVE-2024-26763": { + "cmt_msg": "dm-crypt: don't modify the data when using authenticated encryption" + }, + "CVE-2019-9455": { + "cmt_msg": "media: videobuf2-v4l2: drop WARN_ON in vb2_warn_zero_bytesused()" + }, + "CVE-2023-51042": { + "cmt_msg": "drm/amdgpu: Fix potential fence use-after-free v2" + }, + "CVE-2019-9453": { + "cmt_msg": "f2fs: fix to avoid accessing xattr across the boundary" + }, + "CVE-2023-20569": { + "cmt_msg": "x86/bugs: Increase the x86 bugs vector size to two u32s" + }, + "CVE-2023-46838": { + "cmt_msg": "xen-netback: don't produce zero-size SKB frags" + }, + "CVE-2022-2977": { + "cmt_msg": "tpm: fix reference counting for struct tpm_chip" + }, + "CVE-2019-9458": { + "cmt_msg": "media: v4l: event: Prevent freeing event subscriptions while accessed" + }, + "CVE-2023-3090": { + "cmt_msg": "ipvlan:Fix out-of-bounds caused by unclear skb->cb" + }, + "CVE-2023-45862": { + "cmt_msg": "USB: ene_usb6250: Allocate enough memory for full object" + }, + "CVE-2023-45863": { + "cmt_msg": "kobject: Fix slab-out-of-bounds in fill_kobj_path()" + }, + "CVE-2020-25704": { + "cmt_msg": "perf/core: Fix a memory leak in perf_event_parse_addr_filter()" + }, + "CVE-2020-25705": { + "cmt_msg": "icmp: randomize the global rate limiter" + }, + "CVE-2021-4135": { + "cmt_msg": "netdevsim: Zero-initialize memory for new map's value in function nsim_bpf_map_alloc" + }, + "CVE-2023-52639": { + "cmt_msg": "KVM: s390: vsie: fix race during shadow creation" + }, + "CVE-2023-52638": { + "cmt_msg": "can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock" + }, + "CVE-2019-15239": { + "cmt_msg": "unknown" + }, + "CVE-2023-52635": { + "cmt_msg": "PM / devfreq: Synchronize devfreq_monitor_[start/stop]" + }, + "CVE-2022-26373": { + "cmt_msg": "x86/speculation: Add RSB VM Exit protections" + }, + "CVE-2023-52633": { + "cmt_msg": "um: time-travel: fix time corruption" + }, + "CVE-2023-52632": { + "cmt_msg": "drm/amdkfd: Fix lock dependency warning with srcu" + }, + "CVE-2021-44733": { + "cmt_msg": "tee: handle lookup of shm with reference count 0" + }, + "CVE-2021-47135": { + "cmt_msg": "mt76: mt7921: fix possible AOOB issue in mt7921_mcu_tx_rate_report" + }, + "CVE-2021-47136": { + "cmt_msg": "net: zero-initialize tc skb extension on allocation" + }, + "CVE-2021-47137": { + "cmt_msg": "net: lantiq: fix memory corruption in RX ring" + }, + "CVE-2021-47131": { + "cmt_msg": "net/tls: Fix use-after-free after the TLS device goes down and up" + }, + "CVE-2021-47133": { + "cmt_msg": "HID: amd_sfh: Fix memory leak in amd_sfh_work" + }, + "CVE-2021-46991": { + "cmt_msg": "i40e: Fix use-after-free in i40e_client_subtask()" + }, + "CVE-2021-46992": { + "cmt_msg": "netfilter: nftables: avoid overflows in nft_hash_buckets()" + }, + "CVE-2021-46998": { + "cmt_msg": "ethernet:enic: Fix a use after free bug in enic_hard_start_xmit" + }, + "CVE-2022-42896": { + "cmt_msg": "Bluetooth: L2CAP: Fix accepting connection request for invalid SPSM" + }, + "CVE-2022-42895": { + "cmt_msg": "Bluetooth: L2CAP: Fix attempting to access uninitialized memory" + }, + "CVE-2022-48626": { + "cmt_msg": "moxart: fix potential use-after-free on remove path" + }, + "CVE-2022-48627": { + "cmt_msg": "vt: fix memory overlapping when deleting chars in the buffer" + }, + "CVE-2022-48628": { + "cmt_msg": "ceph: drop messages from MDS when unmounting" + }, + "CVE-2024-24859": { + "cmt_msg": "" + }, + "CVE-2024-24858": { + "cmt_msg": "" + }, + "CVE-2024-24855": { + "cmt_msg": "scsi: lpfc: Fix a possible data race in lpfc_unregister_fcf_rescan()" + }, + "CVE-2024-24857": { + "cmt_msg": "" + }, + "CVE-2019-3892": { + "cmt_msg": "coredump: fix race condition between mmget_not_zero()/get_task_mm() and core dumping" + }, + "CVE-2021-29264": { + "cmt_msg": "gianfar: fix jumbo packets+napi+rx overrun crash" + }, + "CVE-2021-29265": { + "cmt_msg": "usbip: fix stub_dev usbip_sockfd_store() races leading to gpf" + }, + "CVE-2022-3545": { + "cmt_msg": "nfp: fix use-after-free in area_cache_get()" + }, + "CVE-2022-3542": { + "cmt_msg": "bnx2x: fix potential memory leak in bnx2x_tpa_stop()" + }, + "CVE-2021-21781": { + "cmt_msg": "ARM: ensure the signal page contains defined contents" + }, + "CVE-2023-1838": { + "cmt_msg": "Fix double fget() in vhost_net_set_backend()" + }, + "CVE-2023-1382": { + "cmt_msg": "tipc: set con sock in tipc_conn_alloc" + }, + "CVE-2018-14734": { + "cmt_msg": "infiniband: fix a possible use-after-free bug" + }, + "CVE-2021-3759": { + "cmt_msg": "memcg: enable accounting of ipc resources" + }, + "CVE-2021-29647": { + "cmt_msg": "net: qrtr: fix a kernel-infoleak in qrtr_recvmsg()" + }, + "CVE-2023-6546": { + "cmt_msg": "tty: n_gsm: fix the UAF caused by race condition in gsm_cleanup_mux" + }, + "CVE-2020-14390": { + "cmt_msg": "fbcon: remove soft scrollback code" + }, + "CVE-2021-45469": { + "cmt_msg": "f2fs: fix to do sanity check on last xattr entry in __f2fs_setxattr()" + }, + "CVE-2024-0584": { + "cmt_msg": "ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet" + }, + "CVE-2020-0465": { + "cmt_msg": "HID: core: Sanitize event code and type when mapping input" + }, + "CVE-2020-0466": { + "cmt_msg": "do_epoll_ctl(): clean the failure exits up a bit" + }, + "CVE-2024-0340": { + "cmt_msg": "vhost: use kzalloc() instead of kmalloc() followed by memset()" + }, + "CVE-2019-19523": { + "cmt_msg": "USB: adutux: fix use-after-free on disconnect" + }, + "CVE-2019-11135": { + "cmt_msg": "x86/msr: Add the IA32_TSX_CTRL MSR" + }, + "CVE-2021-27365": { + "cmt_msg": "scsi: iscsi: Ensure sysfs attributes are limited to PAGE_SIZE" + }, + "CVE-2021-27364": { + "cmt_msg": "scsi: iscsi: Restrict sessions and handles to admin capabilities" + }, + "CVE-2021-27363": { + "cmt_msg": "scsi: iscsi: Restrict sessions and handles to admin capabilities" + }, + "CVE-2021-20322": { + "cmt_msg": "ipv6: make exception cache less predictible" + }, + "CVE-2021-20320": { + "cmt_msg": "s390/bpf: Fix optimizing out zero-extensions" + }, + "CVE-2021-20321": { + "cmt_msg": "ovl: fix missing negative dentry check in ovl_rename()" + }, + "CVE-2022-3169": { + "cmt_msg": "nvme: ensure subsystem reset is single threaded" + }, + "CVE-2018-20976": { + "cmt_msg": "xfs: clear sb->s_fs_info on mount failure" + }, + "CVE-2023-22995": { + "cmt_msg": "usb: dwc3: dwc3-qcom: Add missing platform_device_put() in dwc3_qcom_acpi_register_core" + }, + "CVE-2021-3542": { + "cmt_msg": "" + }, + "CVE-2018-12929": { + "cmt_msg": "" + }, + "CVE-2018-12928": { + "cmt_msg": "" + }, + "CVE-2020-36311": { + "cmt_msg": "KVM: SVM: Periodically schedule when unregistering regions on destroy" + }, + "CVE-2020-36310": { + "cmt_msg": "KVM: SVM: avoid infinite loop on NPF from bad address" + }, + "CVE-2020-36313": { + "cmt_msg": "KVM: Fix out of range accesses to memslots" + }, + "CVE-2020-35519": { + "cmt_msg": "net/x25: prevent a couple of overflows" + }, + "CVE-2020-10708": { + "cmt_msg": "" + }, + "CVE-2022-21499": { + "cmt_msg": "lockdown: also lock down previous kgdb use" + }, + "CVE-2023-20593": { + "cmt_msg": "x86/cpu/amd: Add a Zenbleed fix" + }, + "CVE-2022-2380": { + "cmt_msg": "video: fbdev: sm712fb: Fix crash in smtcfb_read()" + }, + "CVE-2022-0850": { + "cmt_msg": "ext4: fix kernel infoleak via ext4_extent_header" + }, + "CVE-2019-19447": { + "cmt_msg": "ext4: work around deleting a file with i_nlink == 0 safely" + }, + "CVE-2021-3612": { + "cmt_msg": "Input: joydev - prevent potential read overflow in ioctl" + }, + "CVE-2019-19448": { + "cmt_msg": "btrfs: only search for left_info if there is no right_info in try_merge_free_space" + }, + "CVE-2019-19449": { + "cmt_msg": "f2fs: fix to do sanity check on segment/section count" + }, + "CVE-2020-11725": { + "cmt_msg": "" + }, + "CVE-2023-30456": { + "cmt_msg": "KVM: nVMX: add missing consistency checks for CR0 and CR4" + }, + "CVE-2021-35477": { + "cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4" + }, + "CVE-2022-23041": { + "cmt_msg": "xen/9p: use alloc/free_pages_exact()" + }, + "CVE-2024-26758": { + "cmt_msg": "md: Don't ignore suspended array in md_check_recovery()" + }, + "CVE-2024-26759": { + "cmt_msg": "mm/swap: fix race when skipping swapcache" + }, + "CVE-2022-1729": { + "cmt_msg": "perf: Fix sys_perf_event_open() race against self" + }, + "CVE-2024-26751": { + "cmt_msg": "ARM: ep93xx: Add terminator to gpiod_lookup_table" + }, + "CVE-2024-26752": { + "cmt_msg": "l2tp: pass correct message length to ip6_append_data" + }, + "CVE-2024-26754": { + "cmt_msg": "gtp: fix use-after-free and null-ptr-deref in gtp_genl_dump_pdp()" + }, + "CVE-2024-26756": { + "cmt_msg": "md: Don't register sync_thread for reshape directly" + }, + "CVE-2024-26757": { + "cmt_msg": "md: Don't ignore read-only array in md_check_recovery()" + }, + "CVE-2021-28038": { + "cmt_msg": "Xen/gnttab: handle p2m update errors on a per-slot basis" + }, + "CVE-2022-2964": { + "cmt_msg": "net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup" + }, + "CVE-2024-26689": { + "cmt_msg": "ceph: prevent use-after-free in encode_cap_msg()" + }, + "CVE-2022-2961": { + "cmt_msg": "" + }, + "CVE-2024-26686": { + "cmt_msg": "fs/proc: do_task_stat: use sig->stats_lock to gather the threads/children stats" + }, + "CVE-2024-26687": { + "cmt_msg": "xen/events: close evtchn after mapping cleanup" + }, + "CVE-2024-26685": { + "cmt_msg": "nilfs2: fix potential bug in end_buffer_async_write" + }, + "CVE-2023-45871": { + "cmt_msg": "igb: set max size RX buffer when store bad packet is enabled" + }, + "CVE-2020-12114": { + "cmt_msg": "make struct mountpoint bear the dentry reference to mountpoint, not struct mount" + }, + "CVE-2021-4218": { + "cmt_msg": "sysctl: pass kernel pointers to ->proc_handler" + }, + "CVE-2023-0266": { + "cmt_msg": "ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF" + }, + "CVE-2019-10142": { + "cmt_msg": "drivers/virt/fsl_hypervisor.c: prevent integer overflow in ioctl" + }, + "CVE-2023-52640": { + "cmt_msg": "fs/ntfs3: Fix oob in ntfs_listxattr" + }, + "CVE-2023-52641": { + "cmt_msg": "fs/ntfs3: Add NULL ptr dereference checking at the end of attr_allocate_frame()" + }, + "CVE-2021-0399": { + "cmt_msg": "" + }, + "CVE-2023-52488": { + "cmt_msg": "serial: sc16is7xx: convert from _raw_ to _noinc_ regmap functions for FIFO" + }, + "CVE-2023-52489": { + "cmt_msg": "mm/sparsemem: fix race in accessing memory_section->usage" + }, + "CVE-2023-52484": { + "cmt_msg": "iommu/arm-smmu-v3: Fix soft lockup triggered by arm_smmu_mm_invalidate_range" + }, + "CVE-2020-2732": { + "cmt_msg": "KVM: nVMX: Don't emulate instructions in guest mode" + }, + "CVE-2023-52486": { + "cmt_msg": "drm: Don't unref the same fb many times by mistake due to deadlock handling" + }, + "CVE-2023-52480": { + "cmt_msg": "ksmbd: fix race condition between session lookup and expire" + }, + "CVE-2023-52481": { + "cmt_msg": "arm64: errata: Add Cortex-A520 speculative unprivileged load workaround" + }, + "CVE-2023-52482": { + "cmt_msg": "x86/srso: Add SRSO mitigation for Hygon processors" + }, + "CVE-2023-4128": { + "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free" + }, + "CVE-2023-3609": { + "cmt_msg": "net/sched: cls_u32: Fix reference counter leak leading to overflow" + }, + "CVE-2021-47128": { + "cmt_msg": "bpf, lockdown, audit: Fix buggy SELinux lockdown permission checks" + }, + "CVE-2018-17182": { + "cmt_msg": "mm: get rid of vmacache_flush_all() entirely" + }, + "CVE-2021-47122": { + "cmt_msg": "net: caif: fix memory leak in caif_device_notify" + }, + "CVE-2021-47121": { + "cmt_msg": "net: caif: fix memory leak in cfusbl_device_notify" + }, + "CVE-2021-47125": { + "cmt_msg": "sch_htb: fix refcount leak in htb_parent_to_leaf_offload" + }, + "CVE-2021-47124": { + "cmt_msg": "io_uring: fix link timeout refs" + }, + "CVE-2019-15118": { + "cmt_msg": "ALSA: usb-audio: Fix a stack buffer overflow bug in check_input_term" + }, + "CVE-2019-12818": { + "cmt_msg": "net: nfc: Fix NULL dereference on nfc_llcp_build_tlv fails" + }, + "CVE-2019-12819": { + "cmt_msg": "mdio_bus: Fix use-after-free on device_register fails" + }, + "CVE-2023-0394": { + "cmt_msg": "ipv6: raw: Deduct extension header length in rawv6_push_pending_frames" + }, + "CVE-2019-19332": { + "cmt_msg": "KVM: x86: fix out-of-bounds write in KVM_GET_EMULATED_CPUID (CVE-2019-19332)" + }, + "CVE-2019-15117": { + "cmt_msg": "ALSA: usb-audio: Fix an OOB bug in parse_audio_mixer_unit" + }, + "CVE-2022-25258": { + "cmt_msg": "USB: gadget: validate interface OS descriptor requests" + }, + "CVE-2020-3702": { + "cmt_msg": "ath: Use safer key clearing with key cache entries" + }, + "CVE-2023-0461": { + "cmt_msg": "net/ulp: prevent ULP without clone op from entering the LISTEN status" + }, + "CVE-2023-3117": { + "cmt_msg": "netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE" + }, + "CVE-2018-10322": { + "cmt_msg": "xfs: enhance dinode verifier" + }, + "CVE-2023-3111": { + "cmt_msg": "btrfs: unset reloc control if transaction commit fails in prepare_to_relocate()" + }, + "CVE-2024-24860": { + "cmt_msg": "Bluetooth: Fix atomicity violation in {min,max}_key_size_set" + }, + "CVE-2024-24861": { + "cmt_msg": "media: xc4000: Fix atomicity violation in xc4000_get_frequency" + }, + "CVE-2024-24864": { + "cmt_msg": "" + }, + "CVE-2019-3887": { + "cmt_msg": "KVM: x86: nVMX: close leak of L0's x2APIC MSRs (CVE-2019-3887)" + }, + "CVE-2021-47013": { + "cmt_msg": "net:emac/emac-mac: Fix a use after free in emac_mac_tx_buf_send" + }, + "CVE-2021-47010": { + "cmt_msg": "net: Only allow init netns to set default tcp cong to a restricted algo" + }, + "CVE-2022-36946": { + "cmt_msg": "netfilter: nf_queue: do not allow packet truncation below transport header offset" + }, + "CVE-2018-19824": { + "cmt_msg": "ALSA: usb-audio: Fix UAF decrement if card has no live interfaces in card.c" + }, + "CVE-2022-21166": { + "cmt_msg": "x86/speculation/mmio: Enable CPU Fill buffer clearing on idle" + }, + "CVE-2021-29650": { + "cmt_msg": "netfilter: x_tables: Use correct memory barriers." + }, + "CVE-2018-20169": { + "cmt_msg": "USB: check usb_get_extra_descriptor for proper size" + }, + "CVE-2020-36312": { + "cmt_msg": "KVM: fix memory leak in kvm_io_bus_unregister_dev()" + }, + "CVE-2022-28356": { + "cmt_msg": "llc: fix netdevice reference leaks in llc_ui_bind()" + }, + "CVE-2022-20166": { + "cmt_msg": "drivers core: Use sysfs_emit and sysfs_emit_at for show(device *...) functions" + }, + "CVE-2023-5178": { + "cmt_msg": "nvmet-tcp: Fix a possible UAF in queue intialization setup" + }, + "CVE-2023-1281": { + "cmt_msg": "net/sched: tcindex: update imperfect hash filters respecting rcu" + }, + "CVE-2021-44879": { + "cmt_msg": "f2fs: fix to do sanity check on inode type during garbage collection" + }, + "CVE-2020-9383": { + "cmt_msg": "floppy: check FDC index for errors before assigning it" + }, + "CVE-2023-1513": { + "cmt_msg": "kvm: initialize all of the kvm_debugregs structure before sending it to userspace" + }, + "CVE-2021-26401": { + "cmt_msg": "x86/speculation: Use generic retpoline by default on AMD" + }, + "CVE-2021-3847": { + "cmt_msg": "" + }, + "CVE-2019-9445": { + "cmt_msg": "f2fs: check if file namelen exceeds max value" + }, + "CVE-2011-4917": { + "cmt_msg": "" + }, + "CVE-2011-4916": { + "cmt_msg": "" + }, + "CVE-2023-23039": { + "cmt_msg": "" + }, + "CVE-2019-5489": { + "cmt_msg": "Change mincore() to count \"mapped\" pages rather than \"cached\" pages" + }, + "CVE-2020-36322": { + "cmt_msg": "fuse: fix bad inode" + }, + "CVE-2020-10711": { + "cmt_msg": "netlabel: cope with NULL catmap" + }, + "CVE-2020-35508": { + "cmt_msg": "fork: fix copy_process(CLONE_PARENT) race with the exiting ->real_parent" + }, + "CVE-2020-35501": { + "cmt_msg": "" + }, + "CVE-2021-45095": { + "cmt_msg": "phonet: refcount leak in pep_sock_accep" + }, + "CVE-2023-3268": { + "cmt_msg": "relayfs: fix out-of-bounds access in relay_file_read" + }, + "CVE-2021-32399": { + "cmt_msg": "bluetooth: eliminate the potential race condition when removing the HCI controller" + }, + "CVE-2021-3444": { + "cmt_msg": "bpf: Fix truncation handling for mod32 dst reg wrt zero" + }, + "CVE-2022-32250": { + "cmt_msg": "netfilter: nf_tables: disallow non-stateful expression in sets earlier" + }, + "CVE-2021-28688": { + "cmt_msg": "xen-blkback: don't leak persistent grants from xen_blkbk_map()" + }, + "CVE-2019-14835": { + "cmt_msg": "vhost: make sure log_num < in_num" + }, + "CVE-2019-12379": { + "cmt_msg": "consolemap: Fix a memory leaking bug in drivers/tty/vt/consolemap.c" + }, + "CVE-2019-12378": { + "cmt_msg": "ipv6_sockglue: Fix a missing-check bug in ip6_ra_control()" + }, + "CVE-2018-15594": { + "cmt_msg": "x86/paravirt: Fix spectre-v2 mitigations for paravirt guests" + }, + "CVE-2020-26145": { + "cmt_msg": "ath10k: drop fragments with multicast DA for PCIe" + }, + "CVE-2020-26147": { + "cmt_msg": "mac80211: assure all fragments are encrypted" + }, + "CVE-2020-26141": { + "cmt_msg": "ath10k: Fix TKIP Michael MIC verification for PCIe" + }, + "CVE-2020-26140": { + "cmt_msg": "" + }, + "CVE-2020-26143": { + "cmt_msg": "" + }, + "CVE-2020-26142": { + "cmt_msg": "" + }, + "CVE-2019-17053": { + "cmt_msg": "ieee802154: enforce CAP_NET_RAW for raw sockets" + }, + "CVE-2019-17052": { + "cmt_msg": "ax25: enforce CAP_NET_RAW for raw sockets" + }, + "CVE-2019-17056": { + "cmt_msg": "nfc: enforce CAP_NET_RAW for raw sockets" + }, + "CVE-2019-17055": { + "cmt_msg": "mISDN: enforce CAP_NET_RAW for raw sockets" + }, + "CVE-2019-17054": { + "cmt_msg": "appletalk: enforce CAP_NET_RAW for raw sockets" + }, + "CVE-2024-26745": { + "cmt_msg": "powerpc/pseries/iommu: IOMMU table is not initialized for kdump over SR-IOV" + }, + "CVE-2024-26744": { + "cmt_msg": "RDMA/srpt: Support specifying the srpt_service_guid parameter" + }, + "CVE-2024-26743": { + "cmt_msg": "RDMA/qedr: Fix qedr_create_user_qp error flow" + }, + "CVE-2024-26740": { + "cmt_msg": "net/sched: act_mirred: use the backlog for mirred ingress" + }, + "CVE-2020-29661": { + "cmt_msg": "tty: Fix ->pgrp locking in tiocspgrp()" + }, + "CVE-2020-29660": { + "cmt_msg": "tty: Fix ->session locking" + }, + "CVE-2022-1734": { + "cmt_msg": "nfc: nfcmrvl: main: reorder destructive operations in nfcmrvl_nci_unregister_dev to avoid bugs" + }, + "CVE-2024-26748": { + "cmt_msg": "usb: cdns3: fix memory double free when handle zero packet" + }, + "CVE-2023-28772": { + "cmt_msg": "seq_buf: Fix overflow in seq_buf_putmem_hex()" + }, + "CVE-2024-26699": { + "cmt_msg": "drm/amd/display: Fix array-index-out-of-bounds in dcn35_clkmgr" + }, + "CVE-2024-26691": { + "cmt_msg": "KVM: arm64: Fix circular locking dependency" + }, + "CVE-2022-4269": { + "cmt_msg": "act_mirred: use the backlog for nested calls to mirred ingress" + }, + "CVE-2024-26697": { + "cmt_msg": "nilfs2: fix data corruption in dsync block recovery for small block sizes" + }, + "CVE-2024-26696": { + "cmt_msg": "nilfs2: fix hang in nilfs_lookup_dirty_data_buffers()" + }, + "CVE-2019-15925": { + "cmt_msg": "net: hns3: add some error checking in hclge_tm module" + }, + "CVE-2019-15924": { + "cmt_msg": "fm10k: Fix a potential NULL pointer dereference" + }, + "CVE-2019-15927": { + "cmt_msg": "ALSA: usb-audio: Avoid access before bLength check in build_audio_procunit()" + }, + "CVE-2019-15926": { + "cmt_msg": "ath6kl: add some bounds checking" + }, + "CVE-2019-15921": { + "cmt_msg": "genetlink: Fix a memory leak on error path" + }, + "CVE-2021-38160": { + "cmt_msg": "virtio_console: Assure used length from device is limited" + }, + "CVE-2019-15219": { + "cmt_msg": "USB: sisusbvga: fix oops in error path of sisusb_probe" + }, + "CVE-2019-15218": { + "cmt_msg": "media: usb: siano: Fix general protection fault in smsusb" + }, + "CVE-2005-3660": { + "cmt_msg": "" + }, + "CVE-2019-15212": { + "cmt_msg": "USB: rio500: refuse more than one device at a time" + }, + "CVE-2019-15211": { + "cmt_msg": "media: radio-raremono: change devm_k*alloc to k*alloc" + }, + "CVE-2019-15217": { + "cmt_msg": "media: usb:zr364xx:Fix KASAN:null-ptr-deref Read in zr364xx_vidioc_querycap" + }, + "CVE-2019-15216": { + "cmt_msg": "USB: yurex: Fix protection fault after device removal" + }, + "CVE-2019-15215": { + "cmt_msg": "media: cpia2_usb: first wake up, then free in disconnect" + }, + "CVE-2019-15214": { + "cmt_msg": "ALSA: core: Fix card races between register and disconnect" + }, + "CVE-2019-19922": { + "cmt_msg": "sched/fair: Fix low cpu usage with high throttling by removing expiration of cpu-local slices" + }, + "CVE-2019-19927": { + "cmt_msg": "drm/ttm: fix incrementing the page pointer for huge pages" + }, + "CVE-2023-52498": { + "cmt_msg": "PM: sleep: Fix possible deadlocks in core system-wide PM code" + }, + "CVE-2023-52491": { + "cmt_msg": "media: mtk-jpeg: Fix use after free bug due to error path handling in mtk_jpeg_dec_device_run" + }, + "CVE-2022-2318": { + "cmt_msg": "net: rose: fix UAF bugs caused by timer handler" + }, + "CVE-2023-3611": { + "cmt_msg": "net/sched: sch_qfq: account for stab overhead in qfq_enqueue" + }, + "CVE-2023-4132": { + "cmt_msg": "media: usb: siano: Fix warning due to null work_func_t function pointer" + }, + "CVE-2023-4133": { + "cmt_msg": "cxgb4: fix use after free bugs caused by circular dependency problem" + }, + "CVE-2020-26560": { + "cmt_msg": "" + }, + "CVE-2020-8647": { + "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region" + }, + "CVE-2023-4134": { + "cmt_msg": "Input: cyttsp4_core - change del_timer_sync() to timer_shutdown_sync()" + }, + "CVE-2023-37454": { + "cmt_msg": "" + }, + "CVE-2023-35824": { + "cmt_msg": "media: dm1105: Fix use after free bug in dm1105_remove due to race condition" + }, + "CVE-2022-20572": { + "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag" + }, + "CVE-2022-42703": { + "cmt_msg": "mm/rmap: Fix anon_vma->degree ambiguity leading to double-reuse" + }, + "CVE-2021-4083": { + "cmt_msg": "fget: check that the fd still exists after getting a ref to it" + }, + "CVE-2023-33288": { + "cmt_msg": "power: supply: bq24190: Fix use after free bug in bq24190_remove due to race condition" + }, + "CVE-2022-29900": { + "cmt_msg": "x86/kvm/vmx: Make noinstr clean" + }, + "CVE-2022-29901": { + "cmt_msg": "x86/kvm/vmx: Make noinstr clean" + }, + "CVE-2023-52485": { + "cmt_msg": "drm/amd/display: Wake DMCUB before sending a command" + }, + "CVE-2019-9162": { + "cmt_msg": "netfilter: nf_nat_snmp_basic: add missing length checks in ASN.1 cbs" + }, + "CVE-2018-20511": { + "cmt_msg": "net/appletalk: fix minor pointer leak to userspace in SIOCFINDIPDDPRT" + }, + "CVE-2022-29581": { + "cmt_msg": "net/sched: cls_u32: fix netns refcount changes in u32_change()" + }, + "CVE-2021-47063": { + "cmt_msg": "drm: bridge/panel: Cleanup connector on bridge detach" + }, + "CVE-2022-3567": { + "cmt_msg": "ipv6: Fix data races around sk->sk_prot." + }, + "CVE-2022-3566": { + "cmt_msg": "tcp: Fix data races around icsk->icsk_af_ops." + }, + "CVE-2022-3565": { + "cmt_msg": "mISDN: fix use-after-free bugs in l1oip timer handlers" + }, + "CVE-2022-3564": { + "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free caused by l2cap_reassemble_sdu" + }, + "CVE-2023-0030": { + "cmt_msg": "drm/nouveau/mmu: add more general vmm free/node handling functions" + }, + "CVE-2019-11599": { + "cmt_msg": "coredump: fix race condition between mmget_not_zero()/get_task_mm() and core dumping" + }, + "CVE-2019-2101": { + "cmt_msg": "media: uvcvideo: Fix 'type' check leading to overflow" + }, + "CVE-2019-3459": { + "cmt_msg": "Bluetooth: Verify that l2cap_get_conf_opt provides large enough buffer" + }, + "CVE-2020-0444": { + "cmt_msg": "audit: fix error handling in audit_data_to_entry()" + }, + "CVE-2022-1836": { + "cmt_msg": "floppy: disable FDRAWCMD by default" + }, + "CVE-2019-2213": { + "cmt_msg": "binder: fix possible UAF when freeing buffer" + }, + "CVE-2019-19046": { + "cmt_msg": "ipmi: Fix memory leak in __ipmi_bmc_register" + }, + "CVE-2019-19045": { + "cmt_msg": "net/mlx5: prevent memory leak in mlx5_fpga_conn_create_cq" + }, + "CVE-2019-19048": { + "cmt_msg": "virt: vbox: fix memory leak in hgcm_call_preprocess_linaddr" + }, + "CVE-2019-19049": { + "cmt_msg": "of: unittest: fix memory leak in unittest_data_add" + }, + "CVE-2023-23000": { + "cmt_msg": "phy: tegra: xusb: Fix return value of tegra_xusb_find_port_node function" + }, + "CVE-2018-13053": { + "cmt_msg": "alarmtimer: Prevent overflow for relative nanosleep" + }, + "CVE-2023-23559": { + "cmt_msg": "wifi: rndis_wlan: Prevent buffer overflow in rndis_query_oid" + }, + "CVE-2020-10720": { + "cmt_msg": "net-gro: fix use-after-free read in napi_gro_frags()" + }, + "CVE-2018-21008": { + "cmt_msg": "rsi: add fix for crash during assertions" + }, + "CVE-2022-20368": { + "cmt_msg": "net/packet: fix slab-out-of-bounds access in packet_recvmsg()" + }, + "CVE-2022-3424": { + "cmt_msg": "misc: sgi-gru: fix use-after-free error in gru_set_context_option, gru_fault and gru_handle_user_call_os" + }, + "CVE-2019-5108": { + "cmt_msg": "mac80211: Do not send Layer 2 Update frame before authorization" + }, + "CVE-2022-24448": { + "cmt_msg": "NFSv4: Handle case where the lookup of a directory fails" + }, + "CVE-2020-0427": { + "cmt_msg": "pinctrl: devicetree: Avoid taking direct reference to device name string" + }, + "CVE-2020-26088": { + "cmt_msg": "net/nfc/rawsock.c: add CAP_NET_RAW check." + }, + "CVE-2008-2544": { + "cmt_msg": "" + }, + "CVE-2019-19462": { + "cmt_msg": "kernel/relay.c: handle alloc_percpu returning NULL in relay_open" + }, + "CVE-2023-30772": { + "cmt_msg": "power: supply: da9150: Fix use after free bug in da9150_charger_remove due to race condition" + }, + "CVE-2021-3679": { + "cmt_msg": "tracing: Fix bug in rb_per_cpu_empty() that might cause deadloop." + }, + "CVE-2022-2586": { + "cmt_msg": "netfilter: nf_tables: do not allow SET_ID to refer to another table" + }, + "CVE-2023-51782": { + "cmt_msg": "net/rose: Fix Use-After-Free in rose_ioctl" + }, + "CVE-2023-51780": { + "cmt_msg": "atm: Fix Use-After-Free in do_vcc_ioctl" + }, + "CVE-2023-51781": { + "cmt_msg": "appletalk: Fix Use-After-Free in atalk_ioctl" + }, + "CVE-2022-2588": { + "cmt_msg": "net_sched: cls_route: remove from list when handle is 0" + }, + "CVE-2019-18885": { + "cmt_msg": "btrfs: merge btrfs_find_device and find_device" + }, + "CVE-2024-26733": { + "cmt_msg": "arp: Prevent overflow in arp_req_get()." + }, + "CVE-2024-26736": { + "cmt_msg": "afs: Increase buffer size in afs_update_volume_status()" + }, + "CVE-2024-26735": { + "cmt_msg": "ipv6: sr: fix possible use-after-free and null-ptr-deref" + }, + "CVE-2024-26738": { + "cmt_msg": "powerpc/pseries/iommu: DLPAR add doesn't completely initialize pci_controller" + }, + "CVE-2024-26739": { + "cmt_msg": "net/sched: act_mirred: don't override retval if we already lost the skb" + }, + "CVE-2022-38096": { + "cmt_msg": "" + }, + "CVE-2018-3620": { + "cmt_msg": "x86/microcode: Allow late microcode loading with SMT disabled" + }, + "CVE-2020-16166": { + "cmt_msg": "random32: update the net random state on interrupt and activity" + }, + "CVE-2021-33631": { + "cmt_msg": "ext4: fix kernel BUG in 'ext4_write_inline_data_end()'" + }, + "CVE-2019-15916": { + "cmt_msg": "net-sysfs: Fix mem leak in netdev_register_kobject" + }, + "CVE-2019-15917": { + "cmt_msg": "Bluetooth: hci_ldisc: Postpone HCI_UART_PROTO_READY bit set in hci_uart_set_proto()" + }, + "CVE-2019-15918": { + "cmt_msg": "cifs: Fix lease buffer length error" + }, + "CVE-2024-26648": { + "cmt_msg": "drm/amd/display: Fix variable deferencing before NULL check in edp_setup_replay()" + }, + "CVE-2024-26646": { + "cmt_msg": "thermal: intel: hfi: Add syscore callbacks for system-wide PM" + }, + "CVE-2018-18690": { + "cmt_msg": "xfs: don't fail when converting shortform attr to long form during ATTR_REPLACE" + }, + "CVE-2024-26644": { + "cmt_msg": "btrfs: don't abort filesystem when attempting to snapshot deleted subvolume" + }, + "CVE-2024-26642": { + "cmt_msg": "netfilter: nf_tables: disallow anonymous set with timeout flag" + }, + "CVE-2024-26641": { + "cmt_msg": "ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv()" + }, + "CVE-2023-52464": { + "cmt_msg": "EDAC/thunderx: Fix possible out-of-bounds string access" + }, + "CVE-2020-8834": { + "cmt_msg": "KVM: PPC: Book3S HV: Factor fake-suspend handling out of kvmppc_save/restore_tm" + }, + "CVE-2018-25020": { + "cmt_msg": "bpf: fix truncated jump targets on heavy expansions" + }, + "CVE-2023-52469": { + "cmt_msg": "drivers/amd/pm: fix a use-after-free in kv_parse_power_table" + }, + "CVE-2021-46904": { + "cmt_msg": "net: hso: fix null-ptr-deref during tty device unregistration" + }, + "CVE-2022-0617": { + "cmt_msg": "udf: Fix NULL ptr deref when converting from inline format" + }, + "CVE-2023-4459": { + "cmt_msg": "net: vmxnet3: fix possible NULL pointer dereference in vmxnet3_rq_cleanup()" + }, + "CVE-2022-20566": { + "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free caused by l2cap_chan_put" + }, + "CVE-2022-20565": { + "cmt_msg": "HID: core: Correctly handle ReportSize being zero" + }, + "CVE-2023-1990": { + "cmt_msg": "nfc: st-nci: Fix use after free bug in ndlc_remove due to race condition" + }, + "CVE-2021-33098": { + "cmt_msg": "ixgbe: fix large MTU request from VF" + }, + "CVE-2022-48619": { + "cmt_msg": "Input: add bounds checking to input_set_capability()" + }, + "CVE-2019-3882": { + "cmt_msg": "vfio/type1: Limit DMA mappings per container" + }, + "CVE-2021-47070": { + "cmt_msg": "uio_hv_generic: Fix another memory leak in error handling paths" + }, + "CVE-2021-47073": { + "cmt_msg": "platform/x86: dell-smbios-wmi: Fix oops on rmmod dell_smbios" + }, + "CVE-2021-47075": { + "cmt_msg": "nvmet: fix memory leak in nvmet_alloc_ctrl()" + }, + "CVE-2021-47074": { + "cmt_msg": "nvme-loop: fix memory leak in nvme_loop_create_ctrl()" + }, + "CVE-2021-47077": { + "cmt_msg": "scsi: qedf: Add pointer checks in qedf_update_link_speed()" + }, + "CVE-2021-47076": { + "cmt_msg": "RDMA/rxe: Return CQE error if invalid lkey was supplied" + }, + "CVE-2021-47078": { + "cmt_msg": "RDMA/rxe: Clear all QP fields if creation failed" + }, + "CVE-2019-10638": { + "cmt_msg": "inet: switch IP ID generator to siphash" + }, + "CVE-2019-10639": { + "cmt_msg": "netns: provide pure entropy for net_hash_mix()" + }, + "CVE-2024-26676": { + "cmt_msg": "af_unix: Call kfree_skb() for dead unix_(sk)->oob_skb in GC." + }, + "CVE-2024-26675": { + "cmt_msg": "ppp_async: limit MRU to 64K" + }, + "CVE-2024-26779": { + "cmt_msg": "wifi: mac80211: fix race condition on enabling fast-xmit" + }, + "CVE-2019-20794": { + "cmt_msg": "" + }, + "CVE-2018-9516": { + "cmt_msg": "HID: debug: check length before copy_to_user()" + }, + "CVE-2021-20317": { + "cmt_msg": "lib/timerqueue: Rely on rbtree semantics for next timer" + }, + "CVE-2024-26772": { + "cmt_msg": "ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal()" + }, + "CVE-2021-3864": { + "cmt_msg": "" + }, + "CVE-2019-19054": { + "cmt_msg": "media: rc: prevent memory leak in cx23888_ir_probe" + }, + "CVE-2019-19057": { + "cmt_msg": "mwifiex: pcie: Fix memory leak in mwifiex_pcie_init_evt_ring" + }, + "CVE-2019-19056": { + "cmt_msg": "mwifiex: pcie: Fix memory leak in mwifiex_pcie_alloc_cmdrsp_buf" + }, + "CVE-2019-19052": { + "cmt_msg": "can: gs_usb: gs_can_open(): prevent memory leak" + }, + "CVE-2019-3846": { + "cmt_msg": "mwifiex: Fix possible buffer overflows at parsing bss descriptor" + }, + "CVE-2019-19058": { + "cmt_msg": "iwlwifi: dbg_ini: fix memory leak in alloc_sgtable" + }, + "CVE-2018-5391": { + "cmt_msg": "ip: discard IPv4 datagrams with overlapping segments." + }, + "CVE-2018-5390": { + "cmt_msg": "tcp: free batches of packets in tcp_prune_ofo_queue()" + }, + "CVE-2023-20941": { + "cmt_msg": "" + }, + "CVE-2018-20836": { + "cmt_msg": "scsi: libsas: fix a race condition when smp task timeout" + }, + "CVE-2020-10135": { + "cmt_msg": "Bluetooth: Consolidate encryption handling in hci_encrypt_cfm" + }, + "CVE-2020-36766": { + "cmt_msg": "cec-api: prevent leaking memory through hole in structure" + }, + "CVE-2023-28328": { + "cmt_msg": "media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer()" + }, + "CVE-2017-13693": { + "cmt_msg": "" + }, + "CVE-2017-13694": { + "cmt_msg": "" + }, + "CVE-2021-3640": { + "cmt_msg": "Bluetooth: sco: Fix lock_sock() blockage by memcpy_from_msg()" + }, + "CVE-2020-11608": { + "cmt_msg": "media: ov519: add missing endpoint sanity checks" + }, + "CVE-2020-10732": { + "cmt_msg": "fs/binfmt_elf.c: allocate initialized memory in fill_thread_core_info()" + }, + "CVE-2019-16921": { + "cmt_msg": "RDMA/hns: Fix init resp when alloc ucontext" + }, + "CVE-2021-0512": { + "cmt_msg": "HID: make arrays usage and value to be the same" + }, + "CVE-2022-41222": { + "cmt_msg": "mm/mremap: hold the rmap lock in write mode when moving page table entries." + }, + "CVE-2024-26720": { + "cmt_msg": "mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again" + }, + "CVE-2024-26726": { + "cmt_msg": "btrfs: don't drop extent_map for free space inode on write error" + }, + "CVE-2019-6974": { + "cmt_msg": "kvm: fix kvm_ioctl_create_device() reference counting (CVE-2019-6974)" + }, + "CVE-2023-2985": { + "cmt_msg": "fs: hfsplus: fix UAF issue in hfsplus_put_super" + }, + "CVE-2024-26700": { + "cmt_msg": "drm/amd/display: Fix MST Null Ptr for RV" + }, + "CVE-2023-52519": { + "cmt_msg": "HID: intel-ish-hid: ipc: Disable and reenable ACPI GPE bit" + }, + "CVE-2023-52516": { + "cmt_msg": "dma-debug: don't call __dma_entry_alloc_check_leak() under free_entries_lock" + }, + "CVE-2023-52517": { + "cmt_msg": "spi: sun6i: fix race between DMA RX transfer completion and RX FIFO drain" + }, + "CVE-2023-52515": { + "cmt_msg": "RDMA/srp: Do not call scsi_done() from srp_abort()" + }, + "CVE-2019-15902": { + "cmt_msg": "unknown" + }, + "CVE-2023-52510": { + "cmt_msg": "ieee802154: ca8210: Fix a potential UAF in ca8210_probe" + }, + "CVE-2023-52511": { + "cmt_msg": "spi: sun6i: reduce DMA RX transfer width to single byte" + }, + "CVE-2019-20054": { + "cmt_msg": "fs/proc/proc_sysctl.c: fix NULL pointer dereference in put_links" + }, + "CVE-2021-33624": { + "cmt_msg": "bpf: Inherit expanded/patched seen count from old aux data" + }, + "CVE-2018-17977": { + "cmt_msg": "" + }, + "CVE-2024-26659": { + "cmt_msg": "xhci: handle isoc Babble and Buffer Overrun events properly" + }, + "CVE-2024-26658": { + "cmt_msg": "bcachefs: grab s_umount only if snapshotting" + }, + "CVE-2010-5321": { + "cmt_msg": "" + }, + "CVE-2024-26655": { + "cmt_msg": "Fix memory leak in posix_clock_open()" + }, + "CVE-2024-26654": { + "cmt_msg": "ALSA: sh: aica: reorder cleanup operations to avoid UAF bugs" + }, + "CVE-2024-26656": { + "cmt_msg": "drm/amdgpu: fix use-after-free bug" + }, + "CVE-2024-26651": { + "cmt_msg": "sr9800: Add check for usbnet_get_endpoints" + }, + "CVE-2024-26650": { + "cmt_msg": "platform/x86: p2sb: Allow p2sb_bar() calls during PCI device probe" + }, + "CVE-2022-1048": { + "cmt_msg": "ALSA: pcm: Fix races among concurrent hw_params and hw_free calls" + }, + "CVE-2023-52475": { + "cmt_msg": "Input: powermate - fix use-after-free in powermate_config_complete" + }, + "CVE-2023-52474": { + "cmt_msg": "IB/hfi1: Fix bugs with non-PAGE_SIZE-end multi-iovec user SDMA requests" + }, + "CVE-2023-52477": { + "cmt_msg": "usb: hub: Guard against accesses to uninitialized BOS descriptors" + }, + "CVE-2023-52476": { + "cmt_msg": "perf/x86/lbr: Filter vsyscall addresses" + }, + "CVE-2023-52470": { + "cmt_msg": "drm/radeon: check the alloc_workqueue return value in radeon_crtc_init()" + }, + "CVE-2023-52479": { + "cmt_msg": "ksmbd: fix uaf in smb20_oplock_break_ack" + }, + "CVE-2023-52478": { + "cmt_msg": "HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect" + }, + "CVE-2022-26365": { + "cmt_msg": "xen/blkfront: fix leaking data in shared pages" + }, + "CVE-2020-12652": { + "cmt_msg": "scsi: mptfusion: Fix double fetch bug in ioctl" + }, + "CVE-2020-12653": { + "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_cmd_append_vsie_tlv()" + }, + "CVE-2020-12656": { + "cmt_msg": "sunrpc: check that domain table is empty at module unload." + }, + "CVE-2020-12657": { + "cmt_msg": "block, bfq: fix use-after-free in bfq_idle_slice_timer_body" + }, + "CVE-2020-12654": { + "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_ret_wmm_get_status()" + }, + "CVE-2020-12655": { + "cmt_msg": "xfs: add agf freeblocks verify in xfs_agf_verify" + }, + "CVE-2022-45887": { + "cmt_msg": "media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb()" + }, + "CVE-2022-4744": { + "cmt_msg": "tun: avoid double free in tun_free_netdev" + }, + "CVE-2022-0400": { + "cmt_msg": "" + }, + "CVE-2022-45886": { + "cmt_msg": "media: dvb-core: Fix use-after-free due on race condition at dvb_net" + }, + "CVE-2022-26966": { + "cmt_msg": "sr9700: sanity check for packet length" + }, + "CVE-2023-1989": { + "cmt_msg": "Bluetooth: btsdio: fix use after free bug in btsdio_remove due to unfinished work" + }, + "CVE-2022-25265": { + "cmt_msg": "" + }, + "CVE-2019-15220": { + "cmt_msg": "p54usb: Fix race between disconnect and firmware loading" + }, + "CVE-2020-11609": { + "cmt_msg": "media: stv06xx: add missing descriptor sanity checks" + }, + "CVE-2020-25284": { + "cmt_msg": "rbd: require global CAP_SYS_ADMIN for mapping and unmapping" + }, + "CVE-2023-4208": { + "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free" + }, + "CVE-2023-4206": { + "cmt_msg": "net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free" + }, + "CVE-2023-4207": { + "cmt_msg": "net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free" + }, + "CVE-2021-47049": { + "cmt_msg": "Drivers: hv: vmbus: Use after free in __vmbus_open()" + }, + "CVE-2021-47046": { + "cmt_msg": "drm/amd/display: Fix off by one in hdmi_14_process_transaction()" + }, + "CVE-2020-29370": { + "cmt_msg": "mm: slub: add missing TID bump in kmem_cache_alloc_bulk()" + }, + "CVE-2022-20424": { + "cmt_msg": "io_uring: remove io_identity" + }, + "CVE-2022-20422": { + "cmt_msg": "arm64: fix oops in concurrently setting insn_emulation sysctls" + }, + "CVE-2022-20421": { + "cmt_msg": "binder: fix UAF of ref->proc caused by race condition" + }, + "CVE-2022-45934": { + "cmt_msg": "Bluetooth: L2CAP: Fix u8 overflow" + }, + "CVE-2021-4197": { + "cmt_msg": "cgroup: Use open-time credentials for process migraton perm checks" + }, + "CVE-2020-24503": { + "cmt_msg": "" + }, + "CVE-2020-24502": { + "cmt_msg": "" + }, + "CVE-2023-31436": { + "cmt_msg": "net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg" + }, + "CVE-2019-8980": { + "cmt_msg": "exec: Fix mem leak in kernel_read_file" + }, + "CVE-2024-26775": { + "cmt_msg": "aoe: avoid potential deadlock at set_capacity" + }, + "CVE-2018-14609": { + "cmt_msg": "btrfs: relocation: Only remove reloc rb_trees if reloc control has been initialized" + }, + "CVE-2024-23851": { + "cmt_msg": "dm: limit the number of targets and parameter size area" + }, + "CVE-2020-27777": { + "cmt_msg": "powerpc/rtas: Restrict RTAS requests from userspace" + }, + "CVE-2019-11486": { + "cmt_msg": "tty: mark Siemens R3964 line discipline as BROKEN" + }, + "CVE-2019-11487": { + "cmt_msg": "fs: prevent page refcount overflow in pipe_buf_get" + }, + "CVE-2019-20908": { + "cmt_msg": "efi: Restrict efivar_ssdt_load when the kernel is locked down" + }, + "CVE-2019-19060": { + "cmt_msg": "iio: imu: adis16400: release allocated memory on failure" + }, + "CVE-2019-19061": { + "cmt_msg": "iio: imu: adis16400: fix memory leak" + }, + "CVE-2019-19062": { + "cmt_msg": "crypto: user - fix memory leak in crypto_report" + }, + "CVE-2019-19063": { + "cmt_msg": "rtlwifi: prevent memory leak in rtl_usb_probe" + }, + "CVE-2019-19065": { + "cmt_msg": "RDMA/hfi1: Prevent memory leak in sdma_init" + }, + "CVE-2019-19066": { + "cmt_msg": "scsi: bfa: release allocated memory in case of error" + }, + "CVE-2019-19067": { + "cmt_msg": "drm/amdgpu: fix multiple memory leaks in acp_hw_init" + }, + "CVE-2019-19068": { + "cmt_msg": "rtl8xxxu: prevent leaking urb" + }, + "CVE-2019-3874": { + "cmt_msg": "sctp: implement memory accounting on tx path" + }, + "CVE-2024-26584": { + "cmt_msg": "net: tls: handle backlogging of crypto requests" + }, + "CVE-2020-36516": { + "cmt_msg": "ipv4: avoid using shared IP generator for connected sockets" + }, + "CVE-2012-4542": { + "cmt_msg": "" + }, + "CVE-2020-36777": { + "cmt_msg": "media: dvbdev: Fix memory leak in dvb_media_device_free()" + }, + "CVE-2020-36775": { + "cmt_msg": "f2fs: fix to avoid potential deadlock" + }, + "CVE-2021-20292": { + "cmt_msg": "drm/ttm/nouveau: don't call tt destroy callback on alloc failure." + }, + "CVE-2023-2269": { + "cmt_msg": "dm ioctl: fix nested locking in table_clear() to remove deadlock concern" + }, + "CVE-2020-10690": { + "cmt_msg": "ptp: fix the race between the release of ptp_clock and cdev" + }, + "CVE-2021-3659": { + "cmt_msg": "net: mac802154: Fix general protection fault" + }, + "CVE-2021-3653": { + "cmt_msg": "KVM: nSVM: avoid picking up unsupported bits from L2 in int_ctl (CVE-2021-3653)" + }, + "CVE-2021-3655": { + "cmt_msg": "sctp: validate from_addr_param return" + }, + "CVE-2021-3656": { + "cmt_msg": "KVM: nSVM: always intercept VMLOAD/VMSAVE when nested (CVE-2021-3656)" + }, + "CVE-2019-12614": { + "cmt_msg": "powerpc/pseries/dlpar: Fix a missing check in dlpar_parse_cc_property()" + }, + "CVE-2019-12615": { + "cmt_msg": "mdesc: fix a missing-check bug in get_vdev_port_node_info()" + }, + "CVE-2021-3896": { + "cmt_msg": "isdn: cpai: check ctr->cnr to avoid array index out of bound" + }, + "CVE-2021-3894": { + "cmt_msg": "sctp: account stream padding length for reconf chunk" + }, + "CVE-2021-3892": { + "cmt_msg": "" + }, + "CVE-2022-27223": { + "cmt_msg": "USB: gadget: validate endpoint index for xilinx udc" + }, + "CVE-2022-24958": { + "cmt_msg": "usb: gadget: don't release an existing dev->buf" + }, + "CVE-2020-36557": { + "cmt_msg": "vt: vt_ioctl: fix VT_DISALLOCATE freeing in-use virtual console" + }, + "CVE-2020-12888": { + "cmt_msg": "vfio-pci: Invalidate mmaps and block MMIO access on disabled memory" + }, + "CVE-2023-2194": { + "cmt_msg": "i2c: xgene-slimpro: Fix out-of-bounds bug in xgene_slimpro_i2c_xfer()" + }, + "CVE-2022-41218": { + "cmt_msg": "media: dvb-core: Fix UAF due to refcount races at releasing" + }, + "CVE-2019-20934": { + "cmt_msg": "sched/fair: Don't free p->numa_faults with concurrent readers" + }, + "CVE-2022-0812": { + "cmt_msg": "xprtrdma: fix incorrect header size calculations" + }, + "CVE-2021-45485": { + "cmt_msg": "ipv6: use prandom_u32() for ID generation" + }, + "CVE-2019-17133": { + "cmt_msg": "cfg80211: wext: avoid copying malformed SSIDs" + }, + "CVE-2019-3900": { + "cmt_msg": "vhost_net: fix possible infinite loop" + }, + "CVE-2022-40982": { + "cmt_msg": "x86/speculation: Add Gather Data Sampling mitigation" + }, + "CVE-2021-39801": { + "cmt_msg": "" + }, + "CVE-2021-39800": { + "cmt_msg": "" + }, + "CVE-2024-22099": { + "cmt_msg": "Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security" + }, + "CVE-2021-4202": { + "cmt_msg": "NFC: reorganize the functions in nci_request" + }, + "CVE-2021-4203": { + "cmt_msg": "af_unix: fix races in sk_peer_pid and sk_peer_cred accesses" + }, + "CVE-2023-52509": { + "cmt_msg": "ravb: Fix use-after-free issue in ravb_tx_timeout_work()" + }, + "CVE-2023-52508": { + "cmt_msg": "nvme-fc: Prevent null pointer dereference in nvme_fc_io_getuuid()" + }, + "CVE-2023-52507": { + "cmt_msg": "nfc: nci: assert requested protocol is valid" + }, + "CVE-2023-52506": { + "cmt_msg": "LoongArch: Set all reserved memblocks on Node#0 at initialization" + }, + "CVE-2023-52501": { + "cmt_msg": "ring-buffer: Do not attempt to read past \"commit\"" + }, + "CVE-2023-52500": { + "cmt_msg": "scsi: pm80xx: Avoid leaking tags when processing OPC_INB_SET_CONTROLLER_CONFIG command" + }, + "CVE-2023-52502": { + "cmt_msg": "net: nfc: fix races in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn()" + }, + "CVE-2021-46988": { + "cmt_msg": "userfaultfd: release page in error path to avoid BUG_ON" + }, + "CVE-2024-26668": { + "cmt_msg": "netfilter: nft_limit: reject configurations that cause integer overflow" + }, + "CVE-2024-26663": { + "cmt_msg": "tipc: Check the bearer type before calling tipc_udp_nl_bearer_add()" + }, + "CVE-2024-26664": { + "cmt_msg": "hwmon: (coretemp) Fix out-of-bounds memory access" + }, + "CVE-2021-38198": { + "cmt_msg": "KVM: X86: MMU: Use the correct inherited permissions to get shadow page" + }, + "CVE-2021-38199": { + "cmt_msg": "NFSv4: Initialise connection to the server in nfs4_alloc_client()" + }, + "CVE-2022-1679": { + "cmt_msg": "ath9k: fix use-after-free in ath9k_hif_usb_rx_cb" + }, + "CVE-2023-34256": { + "cmt_msg": "ext4: avoid a potential slab-out-of-bounds in ext4_group_desc_csum" + }, + "CVE-2023-52442": { + "cmt_msg": "ksmbd: validate session id and tree id in compound request" + }, + "CVE-2023-52443": { + "cmt_msg": "apparmor: avoid crash when parsed profile name is empty" + }, + "CVE-2023-52444": { + "cmt_msg": "f2fs: fix to avoid dirent corruption" + }, + "CVE-2023-52445": { + "cmt_msg": "media: pvrusb2: fix use after free on context disconnection" + }, + "CVE-2023-52449": { + "cmt_msg": "mtd: Fix gluebi NULL pointer dereference caused by ftl notifier" + }, + "CVE-2019-15807": { + "cmt_msg": "scsi: libsas: delete sas port if expander discover failed" + }, + "CVE-2024-26719": { + "cmt_msg": "nouveau: offload fence uevents work to workqueue" + }, + "CVE-2024-26715": { + "cmt_msg": "usb: dwc3: gadget: Fix NULL pointer dereference in dwc3_gadget_suspend" + }, + "CVE-2024-1312": { + "cmt_msg": "mm: lock_vma_under_rcu() must check vma->anon_vma under vma lock" + }, + "CVE-2019-14284": { + "cmt_msg": "floppy: fix div-by-zero in setup_format_params" + }, + "CVE-2018-10880": { + "cmt_msg": "ext4: never move the system.data xattr out of the inode body" + }, + "CVE-2023-3338": { + "cmt_msg": "Remove DECnet support from kernel" + }, + "CVE-2018-10882": { + "cmt_msg": "ext4: add more inode number paranoia checks" + }, + "CVE-2024-26713": { + "cmt_msg": "powerpc/pseries/iommu: Fix iommu initialisation during DLPAR add" + }, + "CVE-2020-29368": { + "cmt_msg": "mm: thp: make the THP mapcount atomic against __split_huge_pmd_locked()" + }, + "CVE-2020-12465": { + "cmt_msg": "mt76: fix array overflow on receiving too many fragments for a packet" + }, + "CVE-2020-12464": { + "cmt_msg": "USB: core: Fix free-while-in-use bug in the USB S-Glibrary" + }, + "CVE-2022-47520": { + "cmt_msg": "wifi: wilc1000: validate pairwise and authentication suite offsets" + }, + "CVE-2023-3159": { + "cmt_msg": "firewire: fix potential uaf in outbound_phy_packet_callback()" + }, + "CVE-2021-47059": { + "cmt_msg": "crypto: sun8i-ss - fix result memory leak on error path" + }, + "CVE-2021-47052": { + "cmt_msg": "crypto: sa2ul - Fix memory leak of rxd" + }, + "CVE-2018-20784": { + "cmt_msg": "sched/fair: Fix infinite loop in update_blocked_averages() by reverting a9e7f6544b9c" + }, + "CVE-2021-47056": { + "cmt_msg": "crypto: qat - ADF_STATUS_PF_RUNNING should be set after adf_dev_init" + }, + "CVE-2021-47054": { + "cmt_msg": "bus: qcom: Put child node before return" + }, + "CVE-2022-21125": { + "cmt_msg": "x86/speculation/mmio: Reuse SRBDS mitigation for SBDS" + }, + "CVE-2019-19241": { + "cmt_msg": "io_uring: async workers should inherit the user creds" + }, + "CVE-2022-21123": { + "cmt_msg": "x86/speculation/mmio: Add mitigation for Processor MMIO Stale Data" + }, + "CVE-2020-26559": { + "cmt_msg": "" + }, + "CVE-2021-43975": { + "cmt_msg": "atlantic: Fix OOB read and write in hw_atl_utils_fw_rpc_wait" + }, + "CVE-2021-43976": { + "cmt_msg": "mwifiex: Fix skb_over_panic in mwifiex_usb_recv()" + }, + "CVE-2023-0590": { + "cmt_msg": "net: sched: fix race condition in qdisc_graft()" + }, + "CVE-2023-0597": { + "cmt_msg": "x86/mm: Randomize per-cpu entry area" + }, + "CVE-2022-28390": { + "cmt_msg": "can: ems_usb: ems_usb_start_xmit(): fix double dev_kfree_skb() in error path" + }, + "CVE-2019-3460": { + "cmt_msg": "Bluetooth: Check L2CAP option sizes returned from l2cap_get_conf_opt" + }, + "CVE-2022-3202": { + "cmt_msg": "jfs: prevent NULL deref in diFree" + }, + "CVE-2019-11477": { + "cmt_msg": "tcp: limit payload size of sacked skbs" + }, + "CVE-2021-46908": { + "cmt_msg": "bpf: Use correct permission flag for mixed signed bounds arithmetic" + }, + "CVE-2021-46909": { + "cmt_msg": "ARM: footbridge: fix PCI interrupt mapping" + }, + "CVE-2018-14615": { + "cmt_msg": "f2fs: fix to do sanity check with i_extra_isize" + }, + "CVE-2018-14614": { + "cmt_msg": "f2fs: fix to do sanity check with cp_pack_start_sum" + }, + "CVE-2019-11479": { + "cmt_msg": "tcp: add tcp_min_snd_mss sysctl" + }, + "CVE-2019-11478": { + "cmt_msg": "tcp: tcp_fragment() should apply sane memory limits" + }, + "CVE-2018-14611": { + "cmt_msg": "btrfs: validate type when reading a chunk" + }, + "CVE-2018-14610": { + "cmt_msg": "btrfs: Check that each block group has corresponding chunk at mount time" + }, + "CVE-2018-14613": { + "cmt_msg": "btrfs: tree-checker: Verify block_group_item" + }, + "CVE-2018-14612": { + "cmt_msg": "btrfs: tree-checker: Detect invalid and empty essential trees" + }, + "CVE-2024-23849": { + "cmt_msg": "net/rds: Fix UBSAN: array-index-out-of-bounds in rds_cmsg_recv" + }, + "CVE-2024-23848": { + "cmt_msg": "" + }, + "CVE-2020-27418": { + "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region" + }, + "CVE-2019-2025": { + "cmt_msg": "binder: fix race that allows malicious free of live buffer" + }, + "CVE-2019-19078": { + "cmt_msg": "ath10k: fix memory leak" + }, + "CVE-2019-19077": { + "cmt_msg": "RDMA: Fix goto target to release the allocated memory" + }, + "CVE-2019-19075": { + "cmt_msg": "ieee802154: ca8210: prevent memory leak" + }, + "CVE-2019-19074": { + "cmt_msg": "ath9k: release allocated buffer if timed out" + }, + "CVE-2019-19073": { + "cmt_msg": "ath9k_htc: release allocated buffer if timed out" + }, + "CVE-2019-19071": { + "cmt_msg": "rsi: release skb if rsi_prepare_beacon fails" + }, + "CVE-2020-26558": { + "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical" + }, + "CVE-2019-1125": { + "cmt_msg": "x86/speculation: Prepare entry code for Spectre v1 swapgs mitigations" + }, + "CVE-2023-31085": { + "cmt_msg": "ubi: Refuse attaching if mtd's erasesize is 0" + }, + "CVE-2023-31084": { + "cmt_msg": "media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*()" + }, + "CVE-2023-31083": { + "cmt_msg": "Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO" + }, + "CVE-2023-31082": { + "cmt_msg": "" + }, + "CVE-2023-31081": { + "cmt_msg": "" + }, + "CVE-2022-32296": { + "cmt_msg": "tcp: increase source port perturb table to 2^16" + }, + "CVE-2020-28974": { + "cmt_msg": "vt: Disable KD_FONT_OP_COPY" + }, + "CVE-2019-20806": { + "cmt_msg": "media: tw5864: Fix possible NULL pointer dereference in tw5864_handle_frame" + }, + "CVE-2022-3028": { + "cmt_msg": "af_key: Do not call xfrm_probe_algs in parallel" + }, + "CVE-2020-14304": { + "cmt_msg": "" + }, + "CVE-2018-17972": { + "cmt_msg": "proc: restrict kernel stack dumps to root" + }, + "CVE-2022-33981": { + "cmt_msg": "floppy: disable FDRAWCMD by default" + }, + "CVE-2018-18397": { + "cmt_msg": "userfaultfd: use ENOENT instead of EFAULT if the atomic copy user fails" + }, + "CVE-2023-1390": { + "cmt_msg": "tipc: fix NULL deref in tipc_link_xmit()" + }, + "CVE-2020-10751": { + "cmt_msg": "selinux: properly handle multiple messages in selinux_netlink_send()" + }, + "CVE-2020-10757": { + "cmt_msg": "mm: Fix mremap not considering huge pmd devmap" + }, + "CVE-2022-1116": { + "cmt_msg": "" + }, + "CVE-2021-28660": { + "cmt_msg": "staging: rtl8188eu: prevent ->ssid overflow in rtw_wx_set_scan()" + }, + "CVE-2020-36386": { + "cmt_msg": "Bluetooth: Fix slab-out-of-bounds read in hci_extended_inquiry_result_evt()" + }, + "CVE-2020-36385": { + "cmt_msg": "RDMA/ucma: Rework ucma_migrate_id() to avoid races with destroy" + }, + "CVE-2020-0009": { + "cmt_msg": "staging: android: ashmem: Disallow ashmem memory from being remapped" + }, + "CVE-2020-7053": { + "cmt_msg": "drm/i915: Introduce a mutex for file_priv->context_idr" + }, + "CVE-2019-14615": { + "cmt_msg": "drm/i915/gen9: Clear residual context state on context switch" + }, + "CVE-2019-13648": { + "cmt_msg": "powerpc/tm: Fix oops on sigreturn on systems without TM" + }, + "CVE-2018-15572": { + "cmt_msg": "x86/speculation: Protect against userspace-userspace spectreRSB" + }, + "CVE-2021-0342": { + "cmt_msg": "tun: correct header offsets in napi frags mode" + }, + "CVE-2022-1204": { + "cmt_msg": "ax25: Fix refcount leaks caused by ax25_cb_del()" + }, + "CVE-2018-9363": { + "cmt_msg": "Bluetooth: hidp: buffer overflow in hidp_process_report" + }, + "CVE-2016-10723": { + "cmt_msg": "mm, oom: remove sleep from under oom_lock" + }, + "CVE-2022-26490": { + "cmt_msg": "nfc: st21nfca: Fix potential buffer overflows in EVT_TRANSACTION" + }, + "CVE-2020-11884": { + "cmt_msg": "s390/mm: fix page table upgrade vs 2ndary address mode accesses" + }, + "CVE-2023-52530": { + "cmt_msg": "wifi: mac80211: fix potential key use-after-free" + }, + "CVE-2023-52531": { + "cmt_msg": "wifi: iwlwifi: mvm: Fix a memory corruption issue" + }, + "CVE-2023-52532": { + "cmt_msg": "net: mana: Fix TX CQE error handling" + }, + "CVE-2023-39189": { + "cmt_msg": "netfilter: nfnetlink_osf: avoid OOB read" + }, + "CVE-2024-26677": { + "cmt_msg": "rxrpc: Fix delayed ACKs to not set the reference serial number" + }, + "CVE-2020-25211": { + "cmt_msg": "netfilter: ctnetlink: add a range check for l3/l4 protonum" + }, + "CVE-2020-25212": { + "cmt_msg": "nfs: Fix getxattr kernel panic and memory overflow" + }, + "CVE-2020-28374": { + "cmt_msg": "scsi: target: Fix XCOPY NAA identifier lookup" + }, + "CVE-2024-26672": { + "cmt_msg": "drm/amdgpu: Fix variable 'mca_funcs' dereferenced before NULL check in 'amdgpu_mca_smu_get_mca_entry()'" + }, + "CVE-2024-26671": { + "cmt_msg": "blk-mq: fix IO hang from sbitmap wakeup race" + }, + "CVE-2024-26679": { + "cmt_msg": "inet: read sk->sk_family once in inet_recv_error()" + }, + "CVE-2023-52458": { + "cmt_msg": "block: add check that partition length needs to be aligned with block size" + }, + "CVE-2023-52451": { + "cmt_msg": "powerpc/pseries/memhp: Fix access beyond end of drmem array" + }, + "CVE-2022-0644": { + "cmt_msg": "vfs: check fd has read access in kernel_read_file_from_fd()" + }, + "CVE-2019-14816": { + "cmt_msg": "mwifiex: Fix three heap overflow at parsing element in cfg80211_ap_settings" + }, + "CVE-2019-14814": { + "cmt_msg": "mwifiex: Fix three heap overflow at parsing element in cfg80211_ap_settings" + }, + "CVE-2019-14815": { + "cmt_msg": "mwifiex: Fix three heap overflow at parsing element in cfg80211_ap_settings" + }, + "CVE-2024-26706": { + "cmt_msg": "parisc: Fix random data corruption from exception handler" + }, + "CVE-2024-26704": { + "cmt_msg": "ext4: fix double-free of blocks due to wrong extents moved_len" + }, + "CVE-2023-3812": { + "cmt_msg": "net: tun: fix bugs for oversize packet when napi frags enabled" + }, + "CVE-2020-25672": { + "cmt_msg": "nfc: fix memory leak in llcp_sock_connect()" + }, + "CVE-2020-25673": { + "cmt_msg": "nfc: Avoid endless loops caused by repeated llcp_sock_connect()" + }, + "CVE-2020-25670": { + "cmt_msg": "nfc: fix refcount leak in llcp_sock_bind()" + }, + "CVE-2020-25671": { + "cmt_msg": "nfc: fix refcount leak in llcp_sock_connect()" + }, + "CVE-2019-19813": { + "cmt_msg": "btrfs: inode: Verify inode mode to avoid NULL pointer dereference" + }, + "CVE-2020-29374": { + "cmt_msg": "gup: document and work around \"COW can break either way\" issue" + }, + "CVE-2019-19815": { + "cmt_msg": "f2fs: support swap file w/ DIO" + }, + "CVE-2019-19814": { + "cmt_msg": "" + }, + "CVE-2020-29371": { + "cmt_msg": "romfs: fix uninitialized memory leak in romfs_dev_read()" + }, + "CVE-2019-19816": { + "cmt_msg": "btrfs: inode: Verify inode mode to avoid NULL pointer dereference" + }, + "CVE-2018-18710": { + "cmt_msg": "cdrom: fix improper type cast, which can leat to information leak." + }, + "CVE-2023-34255": { + "cmt_msg": "xfs: verify buffer contents when we skip log replay" + }, + "CVE-2022-23040": { + "cmt_msg": "xen/xenbus: don't let xenbus_grant_ring() remove grants in error case" + }, + "CVE-2023-3141": { + "cmt_msg": "memstick: r592: Fix UAF bug in r592_remove due to race condition" + }, + "CVE-2022-23042": { + "cmt_msg": "xen/netfront: react properly to failing gnttab_end_foreign_access_ref()" + }, + "CVE-2022-3524": { + "cmt_msg": "tcp/udp: Fix memory leak in ipv6_renew_options()." + }, + "CVE-2022-3523": { + "cmt_msg": "mm/memory.c: fix race when faulting a device private page" + }, + "CVE-2022-3522": { + "cmt_msg": "mm/hugetlb: use hugetlb_pte_stable in migration race check" + }, + "CVE-2022-3521": { + "cmt_msg": "kcm: avoid potential race in kcm_tx_work" + }, + "CVE-2018-7755": { + "cmt_msg": "floppy: Do not copy a kernel pointer to user memory in FDGETPRM ioctl" + }, + "CVE-2019-15031": { + "cmt_msg": "powerpc/tm: Fix restoring FP/VMX facility incorrectly on interrupts" + }, + "CVE-2019-15030": { + "cmt_msg": "powerpc/tm: Fix FP/VMX unavailable exceptions inside a transaction" + }, + "CVE-2022-0330": { + "cmt_msg": "drm/i915: Flush TLBs before releasing backing store" + }, + "CVE-2022-4095": { + "cmt_msg": "staging: rtl8712: fix use after free bugs" + }, + "CVE-2022-45919": { + "cmt_msg": "media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221" + }, + "CVE-2021-3669": { + "cmt_msg": "ipc: replace costly bailout check in sysvipc_find_ipc()" + }, + "CVE-2019-3701": { + "cmt_msg": "can: gw: ensure DLC boundaries after CAN frame modification" + }, + "CVE-2023-1095": { + "cmt_msg": "netfilter: nf_tables: fix null deref due to zeroed list head" + }, + "CVE-2022-3239": { + "cmt_msg": "media: em28xx: initialize refcount before kref_get" + }, + "CVE-2022-4543": { + "cmt_msg": "" + }, + "CVE-2021-46915": { + "cmt_msg": "netfilter: nft_limit: avoid possible divide error in nft_limit_init" + }, + "CVE-2019-18282": { + "cmt_msg": "net/flow_dissector: switch to siphash" + }, + "CVE-2021-34981": { + "cmt_msg": "Bluetooth: cmtp: fix file refcount when cmtp_attach_device fails" + }, + "CVE-2018-14625": { + "cmt_msg": "vhost/vsock: fix use-after-free in network stack callers" + }, + "CVE-2023-4881": { + "cmt_msg": "netfilter: nftables: exthdr: fix 4-byte stack OOB write" + }, + "CVE-2013-7445": { + "cmt_msg": "" + }, + "CVE-2024-26804": { + "cmt_msg": "net: ip_tunnel: prevent perpetual headroom growth" + }, + "CVE-2024-26805": { + "cmt_msg": "netlink: Fix kernel-infoleak-after-free in __skb_datagram_iter" + }, + "CVE-2022-3303": { + "cmt_msg": "ALSA: pcm: oss: Fix race at SNDCTL_DSP_SYNC" + }, + "CVE-2020-12771": { + "cmt_msg": "bcache: fix potential deadlock problem in btree_gc_coalesce" + }, + "CVE-2024-26595": { + "cmt_msg": "mlxsw: spectrum_acl_tcam: Fix NULL pointer dereference in error path" + }, + "CVE-2020-12770": { + "cmt_msg": "scsi: sg: add sg_remove_request in sg_write" + }, + "CVE-2022-28389": { + "cmt_msg": "can: mcba_usb: mcba_usb_start_xmit(): fix double dev_kfree_skb in error path" + }, + "CVE-2022-28388": { + "cmt_msg": "can: usb_8dev: usb_8dev_start_xmit(): fix double dev_kfree_skb() in error path" + }, + "CVE-2019-20811": { + "cmt_msg": "net-sysfs: call dev_hold if kobject_init_and_add success" + }, + "CVE-2019-20810": { + "cmt_msg": "media: go7007: fix a miss of snd_card_free" + }, + "CVE-2019-20812": { + "cmt_msg": "af_packet: set defaule value for tmo" + }, + "CVE-2020-14314": { + "cmt_msg": "ext4: fix potential negative array index in do_split()" + }, + "CVE-2019-18660": { + "cmt_msg": "powerpc/book3s64: Fix link stack flush on context switch" + }, + "CVE-2019-12380": { + "cmt_msg": "efi/x86/Add missing error handling to old_memmap 1:1 mapping code" + }, + "CVE-2019-12381": { + "cmt_msg": "ip_sockglue: Fix missing-check bug in ip_ra_control()" + }, + "CVE-2019-12382": { + "cmt_msg": "drm/edid: Fix a missing-check bug in drm_load_edid_firmware()" + }, + "CVE-2020-10766": { + "cmt_msg": "x86/speculation: Prevent rogue cross-process SSBD shutdown" + }, + "CVE-2020-10767": { + "cmt_msg": "x86/speculation: Avoid force-disabling IBPB based on STIBP and enhanced IBRS." + }, + "CVE-2019-25162": { + "cmt_msg": "i2c: Fix a potential use after free" + }, + "CVE-2019-25160": { + "cmt_msg": "netlabel: fix out-of-bounds memory accesses" + }, + "CVE-2018-12633": { + "cmt_msg": "virt: vbox: Only copy_from_user the request-header once" + }, + "CVE-2020-10768": { + "cmt_msg": "x86/speculation: PR_SPEC_FORCE_DISABLE enforcement for indirect branches." + }, + "CVE-2021-35039": { + "cmt_msg": "module: limit enabling module.sig_enforce" + }, + "CVE-2022-2978": { + "cmt_msg": "fs: fix UAF/GPF bug in nilfs_mdt_destroy" + }, + "CVE-2020-10942": { + "cmt_msg": "vhost: Check docket sk_family instead of call getname" + }, + "CVE-2020-10781": { + "cmt_msg": "Revert \"zram: convert remaining CLASS_ATTR() to CLASS_ATTR_RO()\"" + }, + "CVE-2020-26139": { + "cmt_msg": "mac80211: do not accept/forward invalid EAPOL frames" + }, + "CVE-2019-19536": { + "cmt_msg": "can: peak_usb: pcan_usb_pro: Fix info-leaks to USB devices" + }, + "CVE-2019-19537": { + "cmt_msg": "USB: core: Fix races in character device registration and deregistraion" + }, + "CVE-2019-19534": { + "cmt_msg": "can: peak_usb: fix slab info leak" + }, + "CVE-2019-19535": { + "cmt_msg": "can: peak_usb: pcan_usb_fd: Fix info-leaks to USB devices" + }, + "CVE-2020-11565": { + "cmt_msg": "mm: mempolicy: require at least one nodeid for MPOL_PREFERRED" + }, + "CVE-2019-19533": { + "cmt_msg": "media: ttusb-dec: Fix info-leak in ttusb_dec_send_command()" + }, + "CVE-2019-19530": { + "cmt_msg": "usb: cdc-acm: make sure a refcount is taken early enough" + }, + "CVE-2019-19531": { + "cmt_msg": "usb: yurex: Fix use-after-free in yurex_delete" + }, + "CVE-2023-52527": { + "cmt_msg": "ipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data()" + }, + "CVE-2023-3006": { + "cmt_msg": "arm64: Add AMPERE1 to the Spectre-BHB affected list" + }, + "CVE-2023-52522": { + "cmt_msg": "net: fix possible store tearing in neigh_periodic_work()" + }, + "CVE-2019-8912": { + "cmt_msg": "net: crypto set sk to NULL when af_alg_release." + }, + "CVE-2023-52528": { + "cmt_msg": "net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg" + }, + "CVE-2020-0305": { + "cmt_msg": "chardev: Avoid potential use-after-free in 'chrdev_open()'" + }, + "CVE-2024-22386": { + "cmt_msg": "" + }, + "CVE-2023-39194": { + "cmt_msg": "net: xfrm: Fix xfrm_address_filter OOB read" + }, + "CVE-2023-39197": { + "cmt_msg": "netfilter: conntrack: dccp: copy entire header to stack buffer, not just basic one" + }, + "CVE-2023-39193": { + "cmt_msg": "netfilter: xt_sctp: validate the flag_info count" + }, + "CVE-2023-39192": { + "cmt_msg": "netfilter: xt_u32: validate user space input" + }, + "CVE-2024-26602": { + "cmt_msg": "sched/membarrier: reduce the ability to hammer on sys_membarrier" + }, + "CVE-2024-26600": { + "cmt_msg": "phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP" + }, + "CVE-2024-26606": { + "cmt_msg": "binder: signal epoll threads of self-work" + }, + "CVE-2023-52429": { + "cmt_msg": "dm: limit the number of targets and parameter size area" + }, + "CVE-2022-1652": { + "cmt_msg": "floppy: use a statically allocated error counter" + }, + "CVE-2020-29568": { + "cmt_msg": "xen/xenbus: Allow watches discard events before queueing" + }, + "CVE-2020-29569": { + "cmt_msg": "xen-blkback: set ring->xenblkd to NULL after kthread_stop()" + }, + "CVE-2016-8660": { + "cmt_msg": "" + }, + "CVE-2019-13272": { + "cmt_msg": "ptrace: Fix ->ptracer_cred handling for PTRACE_TRACEME" + }, + "CVE-2022-1786": { + "cmt_msg": "io_uring: remove io_identity" + }, + "CVE-2020-25669": { + "cmt_msg": "Input: sunkbd - avoid use-after-free in teardown paths" + }, + "CVE-2020-25668": { + "cmt_msg": "tty: make FONTX ioctl use the tty pointer they were actually passed" + }, + "CVE-2008-4609": { + "cmt_msg": "" + }, + "CVE-2022-0435": { + "cmt_msg": "tipc: improve size validations for received domain records" + }, + "CVE-2023-26607": { + "cmt_msg": "ntfs: fix out-of-bounds read in ntfs_attr_find()" + }, + "CVE-2021-4037": { + "cmt_msg": "xfs: fix up non-directory creation in SGID directories" + }, + "CVE-2021-22543": { + "cmt_msg": "KVM: do not allow mapping valid but non-reference-counted pages" + }, + "CVE-2021-47169": { + "cmt_msg": "serial: rp2: use 'request_firmware' instead of 'request_firmware_nowait'" + }, + "CVE-2023-3776": { + "cmt_msg": "net/sched: cls_fw: Fix improper refcount update leads to use-after-free" + }, + "CVE-2023-3772": { + "cmt_msg": "xfrm: add NULL check in xfrm_update_ae_params" + }, + "CVE-2022-3533": { + "cmt_msg": "" + }, + "CVE-2022-3534": { + "cmt_msg": "libbpf: Fix use-after-free in btf_dump_name_dups" + }, + "CVE-2022-0322": { + "cmt_msg": "sctp: account stream padding length for reconf chunk" + }, + "CVE-2021-4149": { + "cmt_msg": "btrfs: unlock newly allocated extent buffer after error" + }, + "CVE-2022-21385": { + "cmt_msg": "net/rds: fix warn in rds_message_alloc_sgs" + }, + "CVE-2021-47180": { + "cmt_msg": "NFC: nci: fix memory leak in nci_allocate_device" + }, + "CVE-2020-28097": { + "cmt_msg": "vgacon: remove software scrollback support" + }, + "CVE-2020-14416": { + "cmt_msg": "can, slip: Protect tty->disc_data in write_wakeup and close with RCU" + }, + "CVE-2021-46928": { + "cmt_msg": "parisc: Clear stale IIR value on instruction access rights trap" + }, + "CVE-2021-46929": { + "cmt_msg": "sctp: use call_rcu to free endpoint" + }, + "CVE-2018-14633": { + "cmt_msg": "scsi: target: iscsi: Use hex2bin instead of a re-implementation" + }, + "CVE-2021-46921": { + "cmt_msg": "locking/qrwlock: Fix ordering in queued_write_lock_slowpath()" + }, + "CVE-2021-46924": { + "cmt_msg": "NFC: st21nfca: Fix memory leak in device probe and remove" + }, + "CVE-2021-46925": { + "cmt_msg": "net/smc: fix kernel panic caused by race of smc_sock" + }, + "CVE-2021-46926": { + "cmt_msg": "ALSA: hda: intel-sdw-acpi: harden detection of controller" + }, + "CVE-2023-1206": { + "cmt_msg": "tcp: Reduce chance of collisions in inet6_hashfn()." + }, + "CVE-2022-3649": { + "cmt_msg": "nilfs2: fix use-after-free bug of struct nilfs_root" + }, + "CVE-2022-3646": { + "cmt_msg": "nilfs2: fix leak of nilfs_root in case of writer thread creation failure" + }, + "CVE-2022-3642": { + "cmt_msg": "" + }, + "CVE-2022-3643": { + "cmt_msg": "xen/netback: Ensure protocol headers don't fall in the non-linear area" + }, + "CVE-2021-1048": { + "cmt_msg": "fix regression in \"epoll: Keep a reference on files added to the check list\"" + }, + "CVE-2020-0543": { + "cmt_msg": "x86/cpu: Add 'table' argument to cpu_matches()" + }, + "CVE-2024-25739": { + "cmt_msg": "" + }, + "CVE-2023-6535": { + "cmt_msg": "" + }, + "CVE-2023-6536": { + "cmt_msg": "nvmet-tcp: fix a crash in nvmet_req_complete()" + }, + "CVE-2020-15780": { + "cmt_msg": "ACPI: configfs: Disallow loading ACPI tables when locked down" + }, + "CVE-2019-11815": { + "cmt_msg": "net: rds: force to destroy connection if t_sock is NULL in rds_tcp_kill_sock()." + }, + "CVE-2022-36280": { + "cmt_msg": "drm/vmwgfx: Validate the box size for the snooped cursor" + }, + "CVE-2024-21803": { + "cmt_msg": "" + }, + "CVE-2018-16276": { + "cmt_msg": "USB: yurex: fix out-of-bounds uaccess in read handler" + }, + "CVE-2023-2176": { + "cmt_msg": "RDMA/core: Refactor rdma_bind_addr" + }, + "CVE-2019-16413": { + "cmt_msg": "9p: use inode->i_lock to protect i_size_write() under 32-bit" + }, + "CVE-2019-7222": { + "cmt_msg": "KVM: x86: work around leak of uninitialized stack contents (CVE-2019-7222)" + }, + "CVE-2019-7221": { + "cmt_msg": "KVM: nVMX: unconditionally cancel preemption timer in free_nested (CVE-2019-7221)" + }, + "CVE-2020-10773": { + "cmt_msg": "s390/cmm: fix information leak in cmm_timeout_handler()" + }, + "CVE-2020-36782": { + "cmt_msg": "i2c: imx-lpi2c: fix reference leak when pm_runtime_get_sync fails" + }, + "CVE-2018-18281": { + "cmt_msg": "mremap: properly flush TLB before releasing the page" + }, + "CVE-2022-2663": { + "cmt_msg": "netfilter: nf_conntrack_irc: Fix forged IP logic" + }, + "CVE-2020-25643": { + "cmt_msg": "hdlc_ppp: add range checks in ppp_cp_parse_cr()" + }, + "CVE-2020-4788": { + "cmt_msg": "powerpc/64s: flush L1D on kernel entry" + }, + "CVE-2021-39698": { + "cmt_msg": "wait: add wake_up_pollfree()" + }, + "CVE-2019-19529": { + "cmt_msg": "can: mcba_usb: fix use-after-free on disconnect" + }, + "CVE-2019-19528": { + "cmt_msg": "USB: iowarrior: fix use-after-free on disconnect" + }, + "CVE-2019-19525": { + "cmt_msg": "ieee802154: atusb: fix use-after-free at disconnect" + }, + "CVE-2019-19524": { + "cmt_msg": "Input: ff-memless - kill timer in destroy()" + }, + "CVE-2019-19527": { + "cmt_msg": "HID: hiddev: do cleanup in failure of opening a device" + }, + "CVE-2019-19526": { + "cmt_msg": "NFC: pn533: fix use-after-free and memleaks" + }, + "CVE-2021-3753": { + "cmt_msg": "vt_kdsetmode: extend console locking" + }, + "CVE-2021-3752": { + "cmt_msg": "Bluetooth: fix use-after-free error in lock_sock_nested()" + }, + "CVE-2023-7192": { + "cmt_msg": "netfilter: ctnetlink: fix possible refcount leak in ctnetlink_create_conntrack()" + }, + "CVE-2022-1263": { + "cmt_msg": "KVM: avoid NULL pointer dereference in kvm_dirty_ring_push" + }, + "CVE-2018-12207": { + "cmt_msg": "kvm: x86, powerpc: do not allow clearing largepages debugfs entry" + }, + "CVE-2021-41864": { + "cmt_msg": "bpf: Fix integer overflow in prealloc_elems_and_freelist()" + }, + "CVE-2022-2209": { + "cmt_msg": "" + }, + "CVE-2023-7042": { + "cmt_msg": "wifi: ath10k: fix NULL pointer dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev()" + }, + "CVE-2023-52559": { + "cmt_msg": "iommu/vt-d: Avoid memory allocation in iommu_suspend()" + }, + "CVE-2023-47233": { + "cmt_msg": "wifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach" + }, + "CVE-2020-10769": { + "cmt_msg": "crypto: authenc - fix parsing key with misaligned rta_len" + }, + "CVE-2022-1462": { + "cmt_msg": "tty: use new tty_insert_flip_string_and_push_buffer() in pty_write()" + }, + "CVE-2024-26614": { + "cmt_msg": "tcp: make sure init the accept_queue's spinlocks once" + }, + "CVE-2019-20636": { + "cmt_msg": "Input: add safety guards to input_set_keycode()" + }, + "CVE-2023-52435": { + "cmt_msg": "net: prevent mss overflow in skb_segment()" + }, + "CVE-2023-52434": { + "cmt_msg": "smb: client: fix potential OOBs in smb2_parse_contexts()" + }, + "CVE-2023-52436": { + "cmt_msg": "f2fs: explicitly null-terminate the xattr list" + }, + "CVE-2023-51779": { + "cmt_msg": "Bluetooth: af_bluetooth: Fix Use-After-Free in bt_sock_recvmsg" + }, + "CVE-2018-10877": { + "cmt_msg": "ext4: verify the depth of extent tree in ext4_find_extent()" + }, + "CVE-2018-10876": { + "cmt_msg": "ext4: only look at the bg_flags field if it is valid" + }, + "CVE-2010-4563": { + "cmt_msg": "" + }, + "CVE-2023-2162": { + "cmt_msg": "scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress" + }, + "CVE-2018-10879": { + "cmt_msg": "ext4: make sure bitmaps and the inode table don't overlap with bg descriptors" + }, + "CVE-2018-10878": { + "cmt_msg": "ext4: always check block group bounds in ext4_init_block_bitmap()" + }, + "CVE-2023-4622": { + "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES" + }, + "CVE-2023-4623": { + "cmt_msg": "net/sched: sch_hfsc: Ensure inner classes have fsc curve" + }, + "CVE-2023-20588": { + "cmt_msg": "x86/CPU/AMD: Do not leak quotient data after a division by 0" + }, + "CVE-2021-38300": { + "cmt_msg": "bpf, mips: Validate conditional branch offsets" + }, + "CVE-2020-25656": { + "cmt_msg": "vt: keyboard, extend func_buf_lock to readers" + }, + "CVE-2021-4023": { + "cmt_msg": "io-wq: fix cancellation on create-worker failure" + }, + "CVE-2018-3693": { + "cmt_msg": "ext4: fix spectre gadget in ext4_mb_regular_allocator()" + }, + "CVE-2021-22555": { + "cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write" + }, + "CVE-2023-3161": { + "cmt_msg": "fbcon: Check font dimension limits" + }, + "CVE-2021-3506": { + "cmt_msg": "f2fs: fix to avoid out-of-bounds memory access" + }, + "CVE-2021-47082": { + "cmt_msg": "tun: avoid double free in tun_free_netdev" + }, + "CVE-2021-47083": { + "cmt_msg": "pinctrl: mediatek: fix global-out-of-bounds issue" + }, + "CVE-2021-31916": { + "cmt_msg": "dm ioctl: fix out of bounds array access when no devices" + }, + "CVE-2021-47086": { + "cmt_msg": "phonet/pep: refuse to enable an unbound pipe" + }, + "CVE-2023-32269": { + "cmt_msg": "netrom: Fix use-after-free caused by accept on already connected socket" + }, + "CVE-2021-4157": { + "cmt_msg": "pNFS/flexfiles: fix incorrect size check in decode_nfs_fh()" + }, + "CVE-2021-4155": { + "cmt_msg": "xfs: map unwritten blocks in XFS_IOC_{ALLOC,FREE}SP just like fallocate" + }, + "CVE-2021-4150": { + "cmt_msg": "block: fix incorrect references to disk objects" + }, + "CVE-2021-4159": { + "cmt_msg": "bpf: Verifer, adjust_scalar_min_max_vals to always call update_reg_bounds()" + }, + "CVE-2021-29154": { + "cmt_msg": "bpf, x86: Validate computation of branch displacements for x86-64" + }, + "CVE-2021-29155": { + "cmt_msg": "bpf: Use correct permission flag for mixed signed bounds arithmetic" + }, + "CVE-2018-10902": { + "cmt_msg": "ALSA: rawmidi: Change resized buffers atomically" + }, + "CVE-2022-25375": { + "cmt_msg": "usb: gadget: rndis: check size of RNDIS_MSG_SET command" + }, + "CVE-2021-47158": { + "cmt_msg": "net: dsa: sja1105: add error handling in sja1105_setup()" + }, + "CVE-2021-47159": { + "cmt_msg": "net: dsa: fix a crash if ->get_sset_count() fails" + }, + "CVE-2021-47153": { + "cmt_msg": "i2c: i801: Don't generate an interrupt on bus reset" + }, + "CVE-2021-47150": { + "cmt_msg": "net: fec: fix the potential memory leak in fec_enet_init()" + }, + "CVE-2021-47151": { + "cmt_msg": "interconnect: qcom: bcm-voter: add a missing of_node_put()" + }, + "CVE-2021-46936": { + "cmt_msg": "net: fix use-after-free in tw_timer_handler" + }, + "CVE-2021-46935": { + "cmt_msg": "binder: fix async_free_space accounting for empty parcels" + }, + "CVE-2021-46934": { + "cmt_msg": "i2c: validate user data in compat ioctl" + }, + "CVE-2021-46933": { + "cmt_msg": "usb: gadget: f_fs: Clear ffs_eventfd in ffs_data_clear." + }, + "CVE-2021-46932": { + "cmt_msg": "Input: appletouch - initialize work before device registration" + }, + "CVE-2021-46939": { + "cmt_msg": "tracing: Restructure trace_clock_global() to never block" + }, + "CVE-2021-46938": { + "cmt_msg": "dm rq: fix double free of blk_mq_tag_set in dev remove after table load fails" + }, + "CVE-2018-16862": { + "cmt_msg": "mm: cleancache: fix corruption on missed inode invalidation" + }, + "CVE-2024-26623": { + "cmt_msg": "pds_core: Prevent race issues involving the adminq" + }, + "CVE-2018-16884": { + "cmt_msg": "sunrpc: use-after-free in svc_process_common()" + }, + "CVE-2018-16882": { + "cmt_msg": "KVM: Fix UAF in nested posted interrupt processing" + }, + "CVE-2018-16880": { + "cmt_msg": "vhost: fix OOB in get_rx_bufs()" + }, + "CVE-2022-45885": { + "cmt_msg": "" + }, + "CVE-2022-45884": { + "cmt_msg": "" + }, + "CVE-2024-25740": { + "cmt_msg": "" + }, + "CVE-2024-25741": { + "cmt_msg": "" + }, + "CVE-2024-25744": { + "cmt_msg": "x86/coco: Disable 32-bit emulation by default on TDX and SEV" + }, + "CVE-2023-1859": { + "cmt_msg": "9p/xen : Fix use after free bug in xen_9pfs_front_remove due to race condition" + }, + "CVE-2023-2513": { + "cmt_msg": "ext4: fix use-after-free in ext4_xattr_set_entry" + }, + "CVE-2023-1855": { + "cmt_msg": "hwmon: (xgene) Fix use after free bug in xgene_hwmon_remove due to race condition" + }, + "CVE-2015-2877": { + "cmt_msg": "" + }, + "CVE-2019-16089": { + "cmt_msg": "" + }, + "CVE-2020-28941": { + "cmt_msg": "speakup: Do not let the line discipline be used several times" + }, + "CVE-2021-45486": { + "cmt_msg": "inet: use bigger hash table for IP ID generation" + }, + "CVE-2021-3923": { + "cmt_msg": "RDMA/core: Don't infoleak GRH fields" + }, + "CVE-2020-14331": { + "cmt_msg": "vgacon: Fix for missing check in scrollback handling" + }, + "CVE-2022-36123": { + "cmt_msg": "x86: Clear .brk area at early boot" + }, + "CVE-2019-19532": { + "cmt_msg": "HID: Fix assumption that devices have inputs" + }, + "CVE-2020-36558": { + "cmt_msg": "vt: vt_ioctl: fix race in VT_RESIZEX" + }, + "CVE-2018-13100": { + "cmt_msg": "f2fs: fix to do sanity check with secs_per_zone" + }, + "CVE-2022-3108": { + "cmt_msg": "drm/amdkfd: Check for null pointer after calling kmemdup" + }, + "CVE-2020-36158": { + "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_cmd_802_11_ad_hoc_start" + }, + "CVE-2023-28466": { + "cmt_msg": "net: tls: fix possible race condition between do_tls_getsockopt_conf() and do_tls_setsockopt_conf()" + }, + "CVE-2022-40307": { + "cmt_msg": "efi: capsule-loader: Fix use-after-free in efi_capsule_write" + }, + "CVE-2021-39686": { + "cmt_msg": "binder: use euid from cred instead of using task" + }, + "CVE-2021-39685": { + "cmt_msg": "USB: gadget: detect too-big endpoint 0 requests" + }, + "CVE-2021-3744": { + "cmt_msg": "crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd()" + }, + "CVE-2021-3743": { + "cmt_msg": "net: qrtr: fix OOB Read in qrtr_endpoint_post" + }, + "CVE-2024-26592": { + "cmt_msg": "ksmbd: fix UAF issue in ksmbd_tcp_new_connection()" + }, + "CVE-2024-26594": { + "cmt_msg": "ksmbd: validate mech token in session setup" + }, + "CVE-2023-2483": { + "cmt_msg": "net: qcom/emac: Fix use after free bug in emac_remove due to race condition" + }, + "CVE-2024-26598": { + "cmt_msg": "KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache" + }, + "CVE-2018-3646": { + "cmt_msg": "x86/microcode: Allow late microcode loading with SMT disabled" + }, + "CVE-2023-2002": { + "cmt_msg": "bluetooth: Perform careful capability checks in hci_sock_ioctl()" + }, + "CVE-2023-2007": { + "cmt_msg": "scsi: dpt_i2o: Remove obsolete driver" + }, + "CVE-2022-1419": { + "cmt_msg": "drm/vgem: Close use-after-free race in vgem_gem_create" + }, + "CVE-2022-2503": { + "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag" + }, + "CVE-2022-23038": { + "cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()" + }, + "CVE-2022-23039": { + "cmt_msg": "xen/gntalloc: don't use gnttab_query_foreign_access()" + }, + "CVE-2022-23036": { + "cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()" + }, + "CVE-2022-23037": { + "cmt_msg": "xen/netfront: don't use gnttab_query_foreign_access() for mapped status" + }, + "CVE-2019-15538": { + "cmt_msg": "xfs: fix missing ILOCK unlock when xfs_setattr_nonsize fails due to EDQUOT" + }, + "CVE-2023-2177": { + "cmt_msg": "sctp: leave the err path free in sctp_stream_init to sctp_stream_free" + }, + "CVE-2019-14821": { + "cmt_msg": "KVM: coalesced_mmio: add bounds checking" + }, + "CVE-2020-12826": { + "cmt_msg": "signal: Extend exec_id to 64bits" + }, + "CVE-2021-42008": { + "cmt_msg": "net: 6pack: fix slab-out-of-bounds in decode_data" + }, + "CVE-2020-25645": { + "cmt_msg": "geneve: add transport ports in route lookup for geneve" + }, + "CVE-2019-15666": { + "cmt_msg": "xfrm: policy: Fix out-of-bound array accesses in __xfrm_policy_unlink" + }, + "CVE-2020-25641": { + "cmt_msg": "block: allow for_each_bvec to support zero len bvec" + }, + "CVE-2021-33034": { + "cmt_msg": "Bluetooth: verify AMP hci_chan before amp_destroy" + }, + "CVE-2021-33033": { + "cmt_msg": "cipso,calipso: resolve a number of problems with the DOI refcounts" + }, + "CVE-2022-40768": { + "cmt_msg": "scsi: stex: Properly zero out the passthrough command structure" + }, + "CVE-2024-26625": { + "cmt_msg": "llc: call sock_orphan() at release time" + }, + "CVE-2024-26627": { + "cmt_msg": "scsi: core: Move scsi_host_busy() out of host lock for waking up EH handler" + }, + "CVE-2024-26622": { + "cmt_msg": "tomoyo: fix UAF write bug in tomoyo_write_control()" + }, + "CVE-2023-39198": { + "cmt_msg": "drm/qxl: fix UAF on handle creation" + }, + "CVE-2019-10126": { + "cmt_msg": "mwifiex: Fix heap overflow in mwifiex_uap_parse_tail_ies()" + }, + "CVE-2019-10124": { + "cmt_msg": "mm: hwpoison: fix thp split handing in soft_offline_in_use_page()" + }, + "CVE-2020-13974": { + "cmt_msg": "vt: keyboard: avoid signed integer overflow in k_ascii" + }, + "CVE-2020-15437": { + "cmt_msg": "serial: 8250: fix null-ptr-deref in serial8250_start_tx()" + }, + "CVE-2020-15436": { + "cmt_msg": "block: Fix use-after-free in blkdev_get()" + }, + "CVE-2021-47065": { + "cmt_msg": "rtw88: Fix array overrun in rtw_get_tx_power_params()" + }, + "CVE-2022-23816": { + "cmt_msg": "x86/kvm/vmx: Make noinstr clean" + }, + "CVE-2021-47145": { + "cmt_msg": "btrfs: do not BUG_ON in link_to_fixup_dir" + }, + "CVE-2021-47149": { + "cmt_msg": "net: fujitsu: fix potential null-ptr-deref" + }, + "CVE-2018-19407": { + "cmt_msg": "KVM: X86: Fix scan ioapic use-before-initialization" + }, + "CVE-2021-47144": { + "cmt_msg": "drm/amd/amdgpu: fix refcount leak" + }, + "CVE-2021-47147": { + "cmt_msg": "ptp: ocp: Fix a resource leak in an error handling path" + }, + "CVE-2021-47146": { + "cmt_msg": "mld: fix panic in mld_newpack()" + }, + "CVE-2021-47140": { + "cmt_msg": "iommu/amd: Clear DMA ops when switching domain" + }, + "CVE-2021-47143": { + "cmt_msg": "net/smc: remove device from smcd_dev_list after failed device_add()" + }, + "CVE-2021-47142": { + "cmt_msg": "drm/amdgpu: Fix a use-after-free" + }, + "CVE-2021-46941": { + "cmt_msg": "usb: dwc3: core: Do core softreset when switch mode" + }, + "CVE-2021-33061": { + "cmt_msg": "ixgbe: add improvement for MDD response functionality" + }, + "CVE-2018-16871": { + "cmt_msg": "nfsd: COPY and CLONE operations require the saved filehandle to be set" + }, + "CVE-2018-16658": { + "cmt_msg": "cdrom: Fix info leak/OOB read in cdrom_ioctl_drive_status" + }, + "CVE-2019-19036": { + "cmt_msg": "btrfs: Detect unbalanced tree with empty leaf before crashing btree operations" + }, + "CVE-2019-19039": { + "cmt_msg": "btrfs: Don't submit any btree write bio if the fs has errors" + }, + "CVE-2021-32078": { + "cmt_msg": "ARM: footbridge: remove personal server platform" + }, + "CVE-2022-4662": { + "cmt_msg": "USB: core: Prevent nested device-reset calls" + }, + "CVE-2019-11833": { + "cmt_msg": "ext4: zero out the unused memory region in the extent tree block" + }, + "CVE-2020-27835": { + "cmt_msg": "IB/hfi1: Ensure correct mm is used at all times" + }, + "CVE-2020-27830": { + "cmt_msg": "speakup: Reject setting the speakup line discipline outside of speakup" + }, + "CVE-2018-1128": { + "cmt_msg": "libceph: add authorizer challenge" + }, + "CVE-2018-1129": { + "cmt_msg": "libceph: implement CEPHX_V2 calculation mode" + }, + "CVE-2018-20854": { + "cmt_msg": "phy: ocelot-serdes: fix out-of-bounds read" + }, + "CVE-2018-1121": { + "cmt_msg": "" + }, + "CVE-2018-20856": { + "cmt_msg": "block: blk_init_allocated_queue() set q->fq as NULL in the fail case" + }, + "CVE-2022-3061": { + "cmt_msg": "video: fbdev: i740fb: Error out if 'pixclock' equals zero" + }, + "CVE-2020-27784": { + "cmt_msg": "usb: gadget: function: printer: fix use-after-free in __lock_acquire" + }, + "CVE-2020-27786": { + "cmt_msg": "ALSA: rawmidi: Fix racy buffer resize under concurrent accesses" + }, + "CVE-2023-6240": { + "cmt_msg": "" + }, + "CVE-2022-39842": { + "cmt_msg": "video: fbdev: pxa3xx-gcu: Fix integer overflow in pxa3xx_gcu_write" + }, + "CVE-2023-51043": { + "cmt_msg": "drm/atomic: Fix potential use-after-free in nonblocking commits" + }, + "CVE-2024-23196": { + "cmt_msg": "ALSA: hda: fix a possible null-pointer dereference due to data race in snd_hdac_regmap_sync()" + }, + "CVE-2022-3115": { + "cmt_msg": "drm: mali-dp: potential dereference of null pointer" + }, + "CVE-2021-26931": { + "cmt_msg": "xen-blkback: don't \"handle\" error by BUG()" + }, + "CVE-2021-26930": { + "cmt_msg": "xen-blkback: fix error handling in xen_blkbk_map()" + }, + "CVE-2021-26932": { + "cmt_msg": "Xen/x86: don't bail early from clear_foreign_p2m_mapping()" + }, + "CVE-2022-36402": { + "cmt_msg": "drm/vmwgfx: Fix shader stage validation" + }, + "CVE-2021-3178": { + "cmt_msg": "nfsd4: readdirplus shouldn't return parent of export" + }, + "CVE-2023-1611": { + "cmt_msg": "btrfs: fix race between quota disable and quota assign ioctls" + }, + "CVE-2021-3772": { + "cmt_msg": "sctp: use init_tag from inithdr for ABORT chunk" + }, + "CVE-2021-34556": { + "cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4" + }, + "CVE-2021-28714": { + "cmt_msg": "xen/netback: fix rx queue stall detection" + }, + "CVE-2021-28713": { + "cmt_msg": "xen/console: harden hvc_xen against event channel storms" + }, + "CVE-2021-28712": { + "cmt_msg": "xen/netfront: harden netfront against event channel storms" + }, + "CVE-2021-28711": { + "cmt_msg": "xen/blkfront: harden blkfront against event channel storms" + }, + "CVE-2022-1247": { + "cmt_msg": "" + }, + "CVE-2022-2991": { + "cmt_msg": "remove the lightnvm subsystem" + }, + "CVE-2021-39657": { + "cmt_msg": "scsi: ufs: Correct the LUN used in eh_device_reset_handler() callback" + }, + "CVE-2023-52578": { + "cmt_msg": "net: bridge: use DEV_STATS_INC()" + }, + "CVE-2023-52574": { + "cmt_msg": "team: fix null-ptr-deref when team device type is changed" + }, + "CVE-2023-3567": { + "cmt_msg": "vc_screen: move load of struct vc_data pointer in vcs_read() to avoid UAF" + }, + "CVE-2023-52571": { + "cmt_msg": "power: supply: rk817: Fix node refcount leak" + }, + "CVE-2023-52572": { + "cmt_msg": "cifs: Fix UAF in cifs_demultiplex_thread()" + }, + "CVE-2018-18445": { + "cmt_msg": "bpf: 32-bit RSH verification must truncate input before the ALU op" + }, + "CVE-2020-12362": { + "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" + }, + "CVE-2020-12363": { + "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" + }, + "CVE-2019-12881": { + "cmt_msg": "drm/i915/userptr: reject zero user_size" + }, + "CVE-2022-4129": { + "cmt_msg": "l2tp: Serialize access to sk_user_data with sk_callback_lock" + }, + "CVE-2020-12364": { + "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" + }, + "CVE-2023-33203": { + "cmt_msg": "net: qcom/emac: Fix use after free bug in emac_remove due to race condition" + }, + "CVE-2021-4002": { + "cmt_msg": "hugetlbfs: flush TLBs correctly after huge_pmd_unshare" + }, + "CVE-2023-26545": { + "cmt_msg": "net: mpls: fix stale pointer if allocation fails during device rename" + }, + "CVE-2019-15292": { + "cmt_msg": "appletalk: Fix use-after-free in atalk_proc_exit" + }, + "CVE-2019-15291": { + "cmt_msg": "media: b2c2-flexcop-usb: add sanity checking" + }, + "CVE-2019-15290": { + "cmt_msg": "" + }, + "CVE-2023-3212": { + "cmt_msg": "gfs2: Don't deref jdesc in evict" + }, + "CVE-2024-26633": { + "cmt_msg": "ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim()" + }, + "CVE-2024-26636": { + "cmt_msg": "llc: make llc_ui_sendmsg() more robust against bonding changes" + }, + "CVE-2024-26635": { + "cmt_msg": "llc: Drop support for ETH_P_TR_802_2." + }, + "CVE-2020-12768": { + "cmt_msg": "KVM: SVM: Fix potential memory leak in svm_cpu_init()" + }, + "CVE-2020-12769": { + "cmt_msg": "spi: spi-dw: Add lock protect dw_spi rx/tx to prevent concurrent calls" + }, + "CVE-2023-52634": { + "cmt_msg": "drm/amd/display: Fix disable_otg_wa logic" + }, + "CVE-2023-2860": { + "cmt_msg": "ipv6: sr: fix out-of-bounds read when setting HMAC data." + }, + "CVE-2018-20669": { + "cmt_msg": "make 'user_access_begin()' do 'access_ok()'" + }, + "CVE-2020-13143": { + "cmt_msg": "USB: gadget: fix illegal array access in binding with UDC" + }, + "CVE-2022-3903": { + "cmt_msg": "media: mceusb: Use new usb_control_msg_*() routines" + }, + "CVE-2021-47179": { + "cmt_msg": "NFSv4: Fix a NULL pointer dereference in pnfs_mark_matching_lsegs_return()" + }, + "CVE-2019-11191": { + "cmt_msg": "x86: Deprecate a.out support" + }, + "CVE-2021-47170": { + "cmt_msg": "USB: usbfs: Don't WARN about excessively large memory allocations" + }, + "CVE-2021-47171": { + "cmt_msg": "net: usb: fix memory leak in smsc75xx_bind" + }, + "CVE-2021-47172": { + "cmt_msg": "iio: adc: ad7124: Fix potential overflow due to non sequential channel numbers" + }, + "CVE-2021-47173": { + "cmt_msg": "misc/uss720: fix memory leak in uss720_probe" + }, + "CVE-2021-47175": { + "cmt_msg": "net/sched: fq_pie: fix OOB access in the traffic path" + }, + "CVE-2018-10323": { + "cmt_msg": "xfs: set format back to extents if xfs_bmap_extents_to_btree" + }, + "CVE-2021-47177": { + "cmt_msg": "iommu/vt-d: Fix sysfs leak in alloc_iommu()" + }, + "CVE-2021-46951": { + "cmt_msg": "tpm: efi: Use local variable for calculating final log size" + }, + "CVE-2021-46950": { + "cmt_msg": "md/raid1: properly indicate failure when ending a failed write request" + }, + "CVE-2021-46953": { + "cmt_msg": "ACPI: GTDT: Don't corrupt interrupt mappings on watchdow probe failure" + }, + "CVE-2021-46952": { + "cmt_msg": "NFS: fs_context: validate UDP retrans to prevent shift out-of-bounds" + }, + "CVE-2021-46955": { + "cmt_msg": "openvswitch: fix stack OOB read while fragmenting IPv4 packets" + }, + "CVE-2021-46959": { + "cmt_msg": "spi: Fix use-after-free with devm_spi_alloc_*" + }, + "CVE-2019-10220": { + "cmt_msg": "Convert filldir[64]() from __put_user() to unsafe_put_user()" + }, + "CVE-2021-0929": { + "cmt_msg": "staging/android/ion: delete dma_buf->kmap/unmap implemenation" + }, + "CVE-2018-19985": { + "cmt_msg": "USB: hso: Fix OOB memory access in hso_probe/hso_get_config_data" + }, + "CVE-2021-0920": { + "cmt_msg": "af_unix: fix garbage collect vs MSG_PEEK" + }, + "CVE-2023-0615": { + "cmt_msg": "media: vivid: dev->bitmap_cap wasn't freed in all cases" + }, + "CVE-2022-3586": { + "cmt_msg": "sch_sfb: Don't assume the skb is still around after enqueueing to child" + }, + "CVE-2020-27825": { + "cmt_msg": "tracing: Fix race in trace_open and buffer resize call" + }, + "CVE-2019-2181": { + "cmt_msg": "binder: check for overflow when alloc for security context" + }, + "CVE-2020-27820": { + "cmt_msg": "drm/nouveau: use drm_dev_unplug() during device removal" + }, + "CVE-2023-6610": { + "cmt_msg": "smb: client: fix potential OOB in smb2_dump_detail()" + }, + "CVE-2023-1476": { + "cmt_msg": "" + }, + "CVE-2023-1670": { + "cmt_msg": "xirc2ps_cs: Fix use after free bug in xirc2ps_detach" + }, + "CVE-2020-14351": { + "cmt_msg": "perf/core: Fix race in the perf_mmap_close() function" + }, + "CVE-2020-14356": { + "cmt_msg": "cgroup: fix cgroup_sk_alloc() for sk_clone_lock()" + }, + "CVE-2022-20132": { + "cmt_msg": "HID: add hid_is_usb() function to make it simpler for USB detection" + }, + "CVE-2020-0423": { + "cmt_msg": "binder: fix UAF when releasing todo list" + }, + "CVE-2023-6270": { + "cmt_msg": "aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts" + }, + "CVE-2023-1582": { + "cmt_msg": "fs/proc: task_mmu.c: don't read mapcount for migration entry" + }, + "CVE-2019-17351": { + "cmt_msg": "xen: let alloc_xenballooned_pages() fail if not enough memory free" + }, + "CVE-2018-20855": { + "cmt_msg": "IB/mlx5: Fix leaking stack memory to userspace" + }, + "CVE-2021-3348": { + "cmt_msg": "nbd: freeze the queue while we're adding connections" + }, + "CVE-2019-1999": { + "cmt_msg": "binder: fix race between munmap() and direct reclaim" + }, + "CVE-2021-3347": { + "cmt_msg": "futex: Ensure the correct return value from futex_lock_pi()" + }, + "CVE-2019-7308": { + "cmt_msg": "bpf: fix sanitation of alu op with pointer / scalar type from different paths" + }, + "CVE-2022-1966": { + "cmt_msg": "netfilter: nf_tables: disallow non-stateful expression in sets earlier" + }, + "CVE-2021-3587": { + "cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect" + }, + "CVE-2019-16995": { + "cmt_msg": "net: hsr: fix memory leak in hsr_dev_finalize()" + }, + "CVE-2019-16994": { + "cmt_msg": "net: sit: fix memory leak in sit_init_net()" + }, + "CVE-2023-6121": { + "cmt_msg": "nvmet: nul-terminate the NQNs passed in the connect command" + }, + "CVE-2021-3764": { + "cmt_msg": "crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd()" + }, + "CVE-2020-1749": { + "cmt_msg": "net: ipv6_stub: use ip6_dst_lookup_flow instead of ip6_dst_lookup" + }, + "CVE-2021-3760": { + "cmt_msg": "nfc: nci: fix the UAF of rf_conn_info object" + }, + "CVE-2023-0386": { + "cmt_msg": "ovl: fail on invalid uid/gid mapping at copy up" + }, + "CVE-2021-39648": { + "cmt_msg": "usb: gadget: configfs: Fix use-after-free issue with udc_name" + }, + "CVE-2023-52569": { + "cmt_msg": "btrfs: remove BUG() after failure to insert delayed dir index item" + }, + "CVE-2023-52568": { + "cmt_msg": "x86/sgx: Resolves SECS reclaim vs. page fault for EAUG race" + }, + "CVE-2019-0136": { + "cmt_msg": "mac80211: drop robust management frames from unknown TA" + }, + "CVE-2023-52563": { + "cmt_msg": "drm/meson: fix memory leak on ->hpd_notify callback" + }, + "CVE-2023-52561": { + "cmt_msg": "arm64: dts: qcom: sdm845-db845c: Mark cont splash memory region as reserved" + }, + "CVE-2022-3344": { + "cmt_msg": "KVM: x86: nSVM: harden svm_free_nested against freeing vmcb02 while still in use" + }, + "CVE-2023-52566": { + "cmt_msg": "nilfs2: fix potential use after free in nilfs_gccache_submit_read_data()" + }, + "CVE-2023-52565": { + "cmt_msg": "media: uvcvideo: Fix OOB read" + }, + "CVE-2018-12896": { + "cmt_msg": "posix-timers: Sanitize overrun handling" + }, + "CVE-2020-0347": { + "cmt_msg": "" + }, + "CVE-2019-18809": { + "cmt_msg": "media: usb: fix memory leak in af9005_identify_state" + }, + "CVE-2019-18808": { + "cmt_msg": "crypto: ccp - Release all allocated memory if sha type is invalid" + }, + "CVE-2021-40490": { + "cmt_msg": "ext4: fix race writing to an inline_data file while its xattrs are changing" + }, + "CVE-2021-33909": { + "cmt_msg": "seq_file: disallow extremely large seq buffer allocations" + }, + "CVE-2019-12455": { + "cmt_msg": "clk-sunxi: fix a missing-check bug in sunxi_divs_clk_setup()" + }, + "CVE-2019-12456": { + "cmt_msg": "" + }, + "CVE-2019-18805": { + "cmt_msg": "ipv4: set the tcp_min_rtt_wlen range from 0 to one day" + }, + "CVE-2019-18806": { + "cmt_msg": "net: qlogic: Fix memory leak in ql_alloc_large_buffers" + }, + "CVE-2021-33656": { + "cmt_msg": "vt: drop old FONT ioctls" + }, + "CVE-2021-33655": { + "cmt_msg": "fbcon: Disallow setting font bigger than screen size" + }, + "CVE-2022-41858": { + "cmt_msg": "drivers: net: slip: fix NPD bug in sl_tx_timeout()" + }, + "CVE-2022-41850": { + "cmt_msg": "HID: roccat: Fix use-after-free in roccat_read()" + }, + "CVE-2022-1184": { + "cmt_msg": "ext4: verify dir block before splitting it" + }, + "CVE-2019-9245": { + "cmt_msg": "f2fs: sanity check of xattr entry size" + }, + "CVE-2023-3358": { + "cmt_msg": "HID: intel_ish-hid: Add check for ishtp_dma_tx_map" + }, + "CVE-2024-1151": { + "cmt_msg": "net: openvswitch: limit the number of recursions from action sets" + }, + "CVE-2019-12984": { + "cmt_msg": "nfc: Ensure presence of required attributes in the deactivate_target handler" + }, + "CVE-2024-26808": { + "cmt_msg": "netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain" + }, + "CVE-2024-26809": { + "cmt_msg": "netfilter: nft_set_pipapo: release elements in clone only from destroy path" + }, + "CVE-2021-42739": { + "cmt_msg": "media: firewire: firedtv-avc: fix a buffer overflow in avc_ca_pmt()" + }, + "CVE-2023-46343": { + "cmt_msg": "nfc: nci: fix possible NULL pointer dereference in send_acknowledge()" + }, + "CVE-2024-26806": { + "cmt_msg": "spi: cadence-qspi: remove system-wide suspend helper calls from runtime PM hooks" + }, + "CVE-2021-37159": { + "cmt_msg": "usb: hso: fix error handling code of hso_create_net_device" + }, + "CVE-2024-26801": { + "cmt_msg": "Bluetooth: Avoid potential use-after-free in hci_error_reset" + }, + "CVE-2024-26802": { + "cmt_msg": "stmmac: Clear variable when destroying workqueue" + }, + "CVE-2024-26803": { + "cmt_msg": "net: veth: clear GRO when clearing XDP even when down" + }, + "CVE-2023-52606": { + "cmt_msg": "powerpc/lib: Validate size for vector operations" + }, + "CVE-2023-52607": { + "cmt_msg": "powerpc/mm: Fix null-pointer dereference in pgtable_cache_add" + }, + "CVE-2023-52604": { + "cmt_msg": "FS:JFS:UBSAN:array-index-out-of-bounds in dbAdjTree" + }, + "CVE-2023-52602": { + "cmt_msg": "jfs: fix slab-out-of-bounds Read in dtSearch" + }, + "CVE-2023-52603": { + "cmt_msg": "UBSAN: array-index-out-of-bounds in dtSplitRoot" + }, + "CVE-2023-52600": { + "cmt_msg": "jfs: fix uaf in jfs_evict_inode" + }, + "CVE-2023-52601": { + "cmt_msg": "jfs: fix array-index-out-of-bounds in dbAdjTree" + }, + "CVE-2023-52609": { + "cmt_msg": "binder: fix race between mmput() and do_exit()" + }, + "CVE-2023-3640": { + "cmt_msg": "" + }, + "CVE-2023-3022": { + "cmt_msg": "ipv6: Use result arg in fib_lookup_arg consistently" + }, + "CVE-2022-43750": { + "cmt_msg": "usb: mon: make mmapped memory read only" + }, + "CVE-2023-0047": { + "cmt_msg": "mm, oom: do not trigger out_of_memory from the #PF" + }, + "CVE-2023-4010": { + "cmt_msg": "" + }, + "CVE-2021-47167": { + "cmt_msg": "NFS: Fix an Oopsable condition in __nfs_pageio_add_request()" + }, + "CVE-2021-47166": { + "cmt_msg": "NFS: Don't corrupt the value of pg_bytes_written in nfs_do_recoalesce()" + }, + "CVE-2021-47165": { + "cmt_msg": "drm/meson: fix shutdown crash when component not probed" + }, + "CVE-2018-14678": { + "cmt_msg": "x86/entry/64: Remove %ebx handling from error_entry/exit" + }, + "CVE-2021-47163": { + "cmt_msg": "tipc: wait and exit until all work queues are done" + }, + "CVE-2021-47162": { + "cmt_msg": "tipc: skb_linearize the head skb when reassembling msgs" + }, + "CVE-2021-47161": { + "cmt_msg": "spi: spi-fsl-dspi: Fix a resource leak in an error handling path" + }, + "CVE-2021-47160": { + "cmt_msg": "net: dsa: mt7530: fix VLAN traffic leaks" + }, + "CVE-2023-4385": { + "cmt_msg": "fs: jfs: fix possible NULL pointer dereference in dbFree()" + }, + "CVE-2021-46965": { + "cmt_msg": "mtd: physmap: physmap-bt1-rom: Fix unintentional stack access" + }, + "CVE-2023-4387": { + "cmt_msg": "net: vmxnet3: fix possible use-after-free bugs in vmxnet3_rq_alloc_rx_buf()" + }, + "CVE-2021-46960": { + "cmt_msg": "cifs: Return correct error code from smb2_get_enc_key" + }, + "CVE-2021-46962": { + "cmt_msg": "mmc: uniphier-sd: Fix a resource leak in the remove function" + }, + "CVE-2021-47168": { + "cmt_msg": "NFS: fix an incorrect limit in filelayout_decode_layout()" + }, + "CVE-2019-19378": { + "cmt_msg": "" + }, + "CVE-2022-36879": { + "cmt_msg": "xfrm: xfrm_policy: fix a possible double xfrm_pols_put() in xfrm_bundle_lookup()" + }, + "CVE-2019-19377": { + "cmt_msg": "btrfs: Don't submit any btree write bio if the fs has errors" + }, + "CVE-2023-1118": { + "cmt_msg": "media: rc: Fix use-after-free bugs caused by ene_tx_irqsim()" + }, + "CVE-2021-0937": { + "cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write" + }, + "CVE-2022-47929": { + "cmt_msg": "net: sched: disallow noqueue for qdisc classes" + }, + "CVE-2019-16746": { + "cmt_msg": "nl80211: validate beacon head" + }, + "CVE-2022-3606": { + "cmt_msg": "" + }, + "CVE-2018-18021": { + "cmt_msg": "arm64: KVM: Tighten guest core register access from userspace" + }, + "CVE-2021-37576": { + "cmt_msg": "KVM: PPC: Book3S: Fix H_RTAS rets buffer overflow" + }, + "CVE-2022-3594": { + "cmt_msg": "r8152: Rate limit overflow messages" + }, + "CVE-2022-3595": { + "cmt_msg": "cifs: fix double-fault crash during ntlmssp" + }, + "CVE-2020-27815": { + "cmt_msg": "jfs: Fix array index bounds check in dbAdjTree" + }, + "CVE-2023-6606": { + "cmt_msg": "smb: client: fix OOB in smbCalcSize()" + }, + "CVE-2020-27673": { + "cmt_msg": "xen/events: add a proper barrier to 2-level uevent unmasking" + }, + "CVE-2020-27675": { + "cmt_msg": "xen/events: avoid removing an event channel while handling it" + }, + "CVE-2020-28915": { + "cmt_msg": "fbcon: Fix global-out-of-bounds read in fbcon_get_font()" + }, + "CVE-2022-3111": { + "cmt_msg": "power: supply: wm8350-power: Add missing free in free_charger_irq" + }, + "CVE-2020-0435": { + "cmt_msg": "f2fs: fix to do sanity check with i_extra_isize" + }, + "CVE-2020-0432": { + "cmt_msg": "staging: most: net: fix buffer overflow" + }, + "CVE-2020-0433": { + "cmt_msg": "blk-mq: sync the update nr_hw_queues with blk_mq_queue_tag_busy_iter" + }, + "CVE-2020-0430": { + "cmt_msg": "bpf: reject passing modified ctx to helper functions" + }, + "CVE-2020-0431": { + "cmt_msg": "HID: hid-input: clear unmapped usages" + }, + "CVE-2023-6915": { + "cmt_msg": "ida: Fix crash in ida_free when the bitmap is empty" + }, + "CVE-2021-47006": { + "cmt_msg": "ARM: 9064/1: hw_breakpoint: Do not directly check the event's overflow_handler hook" + }, + "CVE-2023-1249": { + "cmt_msg": "coredump: Use the vma snapshot in fill_files_note" + }, + "CVE-2021-3483": { + "cmt_msg": "firewire: nosy: Fix a use-after-free bug in nosy_ioctl()" + }, + "CVE-2023-6040": { + "cmt_msg": "netfilter: nf_tables: Reject tables of unsupported family" + }, + "CVE-2020-36694": { + "cmt_msg": "netfilter: x_tables: Switch synchronization to RCU" + }, + "CVE-2020-36691": { + "cmt_msg": "netlink: limit recursion depth in policy validation" + }, + "CVE-2023-42755": { + "cmt_msg": "net/sched: Retire rsvp classifier" + }, + "CVE-2023-42752": { + "cmt_msg": "igmp: limit igmpv3_newpack() packet size to IP_MAX_MTU" + }, + "CVE-2021-3573": { + "cmt_msg": "Bluetooth: use correct lock to prevent UAF of hdev object" + }, + "CVE-2022-1974": { + "cmt_msg": "nfc: replace improper check device_is_registered() in netlink related functions" + }, + "CVE-2022-1975": { + "cmt_msg": "NFC: netlink: fix sleep in atomic bug when firmware download timeout" + }, + "CVE-2023-1380": { + "cmt_msg": "wifi: brcmfmac: slab-out-of-bounds read in brcmf_get_assoc_ies()" + }, + "CVE-2018-12130": { + "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" + }, + "CVE-2022-32981": { + "cmt_msg": "powerpc/32: Fix overread/overwrite of thread_struct via ptrace" + }, + "CVE-2018-13405": { + "cmt_msg": "Fix up non-directory creation in SGID directories" + }, + "CVE-2018-13406": { + "cmt_msg": "video: uvesafb: Fix integer overflow in allocation" + }, + "CVE-2020-11668": { + "cmt_msg": "media: xirlink_cit: add missing descriptor sanity checks" + }, + "CVE-2020-11669": { + "cmt_msg": "powerpc/powernv/idle: Restore AMR/UAMOR/AMOR after idle" + }, + "CVE-2019-14901": { + "cmt_msg": "mwifiex: Fix heap overflow in mmwifiex_process_tdls_action_frame()" + }, + "CVE-2020-8694": { + "cmt_msg": "powercap: restrict energy meter to root access" + }, + "CVE-2021-3715": { + "cmt_msg": "net_sched: cls_route: remove the right filter from hashtable" + }, + "CVE-2021-3714": { + "cmt_msg": "" + }, + "CVE-2019-16230": { + "cmt_msg": "drm/amdkfd: fix a potential NULL pointer dereference (v2)" + }, + "CVE-2019-16231": { + "cmt_msg": "fjes: Handle workqueue allocation failure" + }, + "CVE-2019-16232": { + "cmt_msg": "libertas: fix a potential NULL pointer dereference" + }, + "CVE-2019-16233": { + "cmt_msg": "scsi: qla2xxx: fix a potential NULL pointer dereference" + }, + "CVE-2019-16234": { + "cmt_msg": "iwlwifi: pcie: fix rb_allocator workqueue allocation" + }, + "CVE-2019-6133": { + "cmt_msg": "fork: record start_time late" + }, + "CVE-2021-39633": { + "cmt_msg": "ip_gre: add validation for csum_start" + }, + "CVE-2021-39634": { + "cmt_msg": "epoll: do not insert into poll queues until all sanity checks are done" + }, + "CVE-2022-33742": { + "cmt_msg": "xen/blkfront: force data bouncing when backend is untrusted" + }, + "CVE-2022-33741": { + "cmt_msg": "xen/netfront: force data bouncing when backend is untrusted" + }, + "CVE-2022-33740": { + "cmt_msg": "xen/netfront: fix leaking data in shared pages" + }, + "CVE-2022-33744": { + "cmt_msg": "xen/arm: Fix race in RB-tree based P2M accounting" + }, + "CVE-2023-52596": { + "cmt_msg": "sysctl: Fix out of bounds access for empty sysctl registers" + }, + "CVE-2023-52597": { + "cmt_msg": "KVM: s390: fix setting of fpc register" + }, + "CVE-2023-52594": { + "cmt_msg": "wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus()" + }, + "CVE-2023-52595": { + "cmt_msg": "wifi: rt2x00: restart beacon queue when hardware reset" + }, + "CVE-2023-52593": { + "cmt_msg": "wifi: wfx: fix possible NULL pointer dereference in wfx_set_mfp_ap()" + }, + "CVE-2023-52590": { + "cmt_msg": "ocfs2: Avoid touching renamed directory if parent does not change" + }, + "CVE-2023-52591": { + "cmt_msg": "reiserfs: Avoid touching renamed directory if parent does not change" + }, + "CVE-2023-52598": { + "cmt_msg": "s390/ptrace: handle setting of fpc register correctly" + }, + "CVE-2023-52599": { + "cmt_msg": "jfs: fix array-index-out-of-bounds in diNewExt" + }, + "CVE-2022-23222": { + "cmt_msg": "bpf: Replace PTR_TO_XXX_OR_NULL with PTR_TO_XXX | PTR_MAYBE_NULL" + }, + "CVE-2021-0448": { + "cmt_msg": "netfilter: ctnetlink: add a range check for l3/l4 protonum" + }, + "CVE-2019-25045": { + "cmt_msg": "xfrm: clean up xfrm protocol checks" + }, + "CVE-2022-41849": { + "cmt_msg": "fbdev: smscufx: Fix use-after-free in ufx_ops_open()" + }, + "CVE-2022-41848": { + "cmt_msg": "" + }, + "CVE-2023-6356": { + "cmt_msg": "nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length" + }, + "CVE-2022-1353": { + "cmt_msg": "af_key: add __GFP_ZERO flag for compose_sadb_supported in function pfkey_register" + }, + "CVE-2022-1198": { + "cmt_msg": "drivers: hamradio: 6pack: fix UAF bug caused by mod_timer()" + }, + "CVE-2022-1199": { + "cmt_msg": "ax25: Fix NULL pointer dereference in ax25_kill_by_device" + }, + "CVE-2022-1195": { + "cmt_msg": "hamradio: improve the incomplete fix to avoid NPD" + }, + "CVE-2023-2124": { + "cmt_msg": "xfs: verify buffer contents when we skip log replay" + }, + "CVE-2019-15505": { + "cmt_msg": "media: technisat-usb2: break out of loop at end of buffer" + }, + "CVE-2022-27672": { + "cmt_msg": "x86/speculation: Identify processors vulnerable to SMT RSB predictions" + }, + "CVE-2022-1280": { + "cmt_msg": "drm: avoid circular locks in drm_mode_getconnector" + }, + "CVE-2019-14283": { + "cmt_msg": "floppy: fix out-of-bounds read in copy_buffer" + }, + "CVE-2018-10881": { + "cmt_msg": "ext4: clear i_data in ext4_inode_info when removing inline data" + }, + "CVE-2018-10883": { + "cmt_msg": "jbd2: don't mark block as modified if the handle is out of credits" + } + } + }, + "4.19": { + "4.19": { + "CVE-2018-18281": { + "cmt_msg": "mremap: properly flush TLB before releasing the page", + "cmt_id": "eb66ae030829605d61fbef1909ce310e29f78821" + } + }, + "4.19-rc1": { + "CVE-2019-19083": { + "cmt_msg": "drm/amd/display: memory leak", + "cmt_id": "9ea29a1f8b9da52d8eca8b0996f1d84eac548d3b" + } + }, + "4.19.2": { + "CVE-2018-18955": { + "cmt_msg": "userns: also map extents in the reverse map to kernel IDs", + "cmt_id": "9a7a80fb02cc7515b273dbb4249374d6e6a35b70" + } + }, + "4.19.3": { + "CVE-2018-19854": { + "cmt_msg": "crypto: user - fix leaking uninitialized memory to userspace", + "cmt_id": "a0f044f025e9a023e1e2b33c0731291059e2748d" + }, + "CVE-2018-16871": { + "cmt_msg": "nfsd: COPY and CLONE operations require the saved filehandle to be set", + "cmt_id": "20965de7f47207394ffe03d70a4806f5e1cfcd7f" + }, + "CVE-2018-18710": { + "cmt_msg": "cdrom: fix improper type cast, which can leat to information leak.", + "cmt_id": "c8099dbf492b565a4f75ae7b8c08b76ca18c4c3f" + } + }, + "4.19.7": { + "CVE-2018-19407": { + "cmt_msg": "KVM: X86: Fix scan ioapic use-before-initialization", + "cmt_id": "61c42d657c859ccc95e53afdac64f73a0053b8ea" + }, + "CVE-2018-19406": { + "cmt_msg": "KVM: LAPIC: Fix pv ipis use-before-initialization", + "cmt_id": "ffb01e73737b4d3e66734c901ee666ae8a23a857" + }, + "CVE-2019-2025": { + "cmt_msg": "binder: fix race that allows malicious free of live buffer", + "cmt_id": "553927d6aab993e1297d0c69274cd0c2df5440ca" + }, + "CVE-2018-16862": { + "cmt_msg": "mm: cleancache: fix corruption on missed inode invalidation", + "cmt_id": "16a2d602244ff5327cecd210fdd50ad5ad443c9c" + } + }, + "4.19.8": { + "CVE-2018-18397": { + "cmt_msg": "userfaultfd: use ENOENT instead of EFAULT if the atomic copy user fails", + "cmt_id": "10f98c134b02d11923d45ce6688c2479435e8ec9" + } + }, + "4.19.9": { + "CVE-2018-20169": { + "cmt_msg": "USB: check usb_get_extra_descriptor for proper size", + "cmt_id": "1b2e742bf7230ce04cda5b7348f922174bef2d7a" + }, + "CVE-2018-14625": { + "cmt_msg": "vhost/vsock: fix use-after-free in network stack callers", + "cmt_id": "f9cd25b1e5e575a5f18547bdc04ea40a23ad511a" + }, + "CVE-2018-19824": { + "cmt_msg": "ALSA: usb-audio: Fix UAF decrement if card has no live interfaces in card.c", + "cmt_id": "a7e719ace75e4451b7958cb73cbc12c627760007" + } + }, + "4.19.13": { + "CVE-2018-16882": { + "cmt_msg": "KVM: Fix UAF in nested posted interrupt processing", + "cmt_id": "1972ca04708330b0edd52956e644e3974065a613" + }, + "CVE-2018-19985": { + "cmt_msg": "USB: hso: Fix OOB memory access in hso_probe/hso_get_config_data", + "cmt_id": "8f980122236c1fc8e11ffb57ec73315d01dc88e0" + } + }, + "4.19.14": { + "CVE-2019-9245": { + "cmt_msg": "f2fs: sanity check of xattr entry size", + "cmt_id": "5036fcd9b14516f62efae6ed0c42dfbb9798b643" + } + }, + "4.19.15": { + "CVE-2019-15927": { + "cmt_msg": "ALSA: usb-audio: Avoid access before bLength check in build_audio_procunit()", + "cmt_id": "8ee6f180d56fe760b275ab7f060c7b12fc05d7b7" + }, + "CVE-2018-20784": { + "cmt_msg": "sched/fair: Fix infinite loop in update_blocked_averages() by reverting a9e7f6544b9c", + "cmt_id": "dc8408ea0b22ab181ee541f3786b4fd6161e0ce3" + }, + "CVE-2019-6133": { + "cmt_msg": "fork: record start_time late", + "cmt_id": "bc999b5099d70030a9cb1aff2c48b073f65e0f8f" + } + }, + "4.19.16": { + "CVE-2018-16884": { + "cmt_msg": "sunrpc: use-after-free in svc_process_common()", + "cmt_id": "44e7bab39f877c9c095bfaaee943b0807574a7f7" + } + }, + "4.19.17": { + "CVE-2019-3701": { + "cmt_msg": "can: gw: ensure DLC boundaries after CAN frame modification", + "cmt_id": "8db82a6f2b76d42ec2615f8def6e797e064e7822" + }, + "CVE-2020-10769": { + "cmt_msg": "crypto: authenc - fix parsing key with misaligned rta_len", + "cmt_id": "44c67402c3f738b7048de4464c02461bc8d0fd37" + }, + "CVE-2019-11085": { + "cmt_msg": "drm/i915/gvt: Fix mmap range check", + "cmt_id": "ac8b9e8e7ddd69f3efa91e8a99312de5729382c0" + } + }, + "4.19.18": { + "CVE-2019-9003": { + "cmt_msg": "ipmi: fix use-after-free of user->release_barrier.rda", + "cmt_id": "1c393ca118cfaf36c95270b9bed295bba109fafa" + } + }, + "4.19.19": { + "CVE-2019-7308": { + "cmt_msg": "bpf: fix sanitation of alu op with pointer / scalar type from different paths", + "cmt_id": "eed84f94ff8d97abcbc5706f6f9427520fd60a10" + } + }, + "4.19.20": { + "CVE-2018-16880": { + "cmt_msg": "vhost: fix OOB in get_rx_bufs()", + "cmt_id": "aafe74b726891386cd139d3432ec619ed5189b29" + } + }, + "4.19.21": { + "CVE-2019-3819": { + "cmt_msg": "HID: debug: fix the ring buffer implementation", + "cmt_id": "c70374ce418e7ae9276d3dc26aed0301e4da5e35" + }, + "CVE-2019-8956": { + "cmt_msg": "sctp: walk the list of asoc safely", + "cmt_id": "7c2361308e1727c3135ebb3b5c6906fb781bb261" + }, + "CVE-2019-7222": { + "cmt_msg": "KVM: x86: work around leak of uninitialized stack contents (CVE-2019-7222)", + "cmt_id": "5a45d3720b5437515f8c094f1c3d61f6afe211c1" + }, + "CVE-2019-6974": { + "cmt_msg": "kvm: fix kvm_ioctl_create_device() reference counting (CVE-2019-6974)", + "cmt_id": "24b027d2b1386da03aafb2aaac69d4fa67ee7d9c" + }, + "CVE-2019-7221": { + "cmt_msg": "KVM: nVMX: unconditionally cancel preemption timer in free_nested (CVE-2019-7221)", + "cmt_id": "236fd677125f974aaf39f09074d226a884b4fe0e" + } + }, + "4.19.25": { + "CVE-2019-9162": { + "cmt_msg": "netfilter: nf_nat_snmp_basic: add missing length checks in ASN.1 cbs", + "cmt_id": "6a3f7237871c4d5c090ab9a6fce3ba6a1baf1f82" + }, + "CVE-2019-8912": { + "cmt_msg": "net: crypto set sk to NULL when af_alg_release.", + "cmt_id": "eb5e6869125f69dd28513f92992d97ec62bb9773" + } + }, + "4.19.27": { + "CVE-2019-9213": { + "cmt_msg": "mm: enforce min addr even if capable() in expand_downwards()", + "cmt_id": "de04d2973a62e4efb3de45e93bd46acd6d510e0a" + } + }, + "4.19.28": { + "CVE-2019-8980": { + "cmt_msg": "exec: Fix mem leak in kernel_read_file", + "cmt_id": "b60d90b2d3d14c426693a0a34041db11be66d29e" + }, + "CVE-2019-16994": { + "cmt_msg": "net: sit: fix memory leak in sit_init_net()", + "cmt_id": "d0bedaac932f4c02c080a50d4a30b2a1fec5d682" + }, + "CVE-2019-12818": { + "cmt_msg": "net: nfc: Fix NULL dereference on nfc_llcp_build_tlv fails", + "cmt_id": "f132b3f5f1ad1cbe818474ab8d0b555ff39369d5" + }, + "CVE-2019-25160": { + "cmt_msg": "netlabel: fix out-of-bounds memory accesses", + "cmt_id": "e3713abc4248aa6bcc11173d754c418b02a62cbb" + }, + "CVE-2019-15916": { + "cmt_msg": "net-sysfs: Fix mem leak in netdev_register_kobject", + "cmt_id": "7ce2a517fd8b7742e381d3b3551b9b03e667ad79" + } + }, + "4.19.29": { + "CVE-2019-2101": { + "cmt_msg": "media: uvcvideo: Fix 'type' check leading to overflow", + "cmt_id": "ac8befb6dd601fd35c1d64167750c6698bc27c80" + } + }, + "4.19.30": { + "CVE-2019-16995": { + "cmt_msg": "net: hsr: fix memory leak in hsr_dev_finalize()", + "cmt_id": "996ee1aca7def6125e9d96f58151799d44082cfc" + }, + "CVE-2019-12819": { + "cmt_msg": "mdio_bus: Fix use-after-free on device_register fails", + "cmt_id": "96a3b14450afa83f4f3ffdeafaca19db8e05c2fd" + } + }, + "4.19.31": { + "CVE-2019-11811": { + "cmt_msg": "ipmi_si: fix use-after-free of resource->name", + "cmt_id": "a441fdaf8c3034436fb6045ee285e515628fc555" + }, + "CVE-2019-10124": { + "cmt_msg": "mm: hwpoison: fix thp split handing in soft_offline_in_use_page()", + "cmt_id": "234c0cc982211bb5539db632f31490bf0ad54827" + }, + "CVE-2019-9455": { + "cmt_msg": "media: videobuf2-v4l2: drop WARN_ON in vb2_warn_zero_bytesused()", + "cmt_id": "573d423a9bd76b396954ddf847ff24d97658453d" + }, + "CVE-2019-16413": { + "cmt_msg": "9p: use inode->i_lock to protect i_size_write() under 32-bit", + "cmt_id": "e08ba890dc29250fafdfa7c9dba62ccfeec8ef7f" + } + }, + "4.19.32": { + "CVE-2019-15917": { + "cmt_msg": "Bluetooth: hci_ldisc: Postpone HCI_UART_PROTO_READY bit set in hci_uart_set_proto()", + "cmt_id": "e365b94086f9dec02ddfcc193dcad72858c6d973" + } + }, + "4.19.33": { + "CVE-2019-20811": { + "cmt_msg": "net-sysfs: call dev_hold if kobject_init_and_add success", + "cmt_id": "d9d215be3a3aa8b3638f2705826f52a7fb84cf24" + }, + "CVE-2019-20054": { + "cmt_msg": "fs/proc/proc_sysctl.c: fix NULL pointer dereference in put_links", + "cmt_id": "07d0d2bd957ad922cf571e7cabb6c34067142b93" + }, + "CVE-2019-3460": { + "cmt_msg": "Bluetooth: Check L2CAP option sizes returned from l2cap_get_conf_opt", + "cmt_id": "2318c0e4b87e590c9d8e88db185477cfac18abe2" + }, + "CVE-2019-15921": { + "cmt_msg": "genetlink: Fix a memory leak on error path", + "cmt_id": "9b8ef421b481d6e648438131d867986c649c297c" + }, + "CVE-2019-3459": { + "cmt_msg": "Bluetooth: Verify that l2cap_get_conf_opt provides large enough buffer", + "cmt_id": "15d6538a0d6e0f6de5116081a948cba7cc3e1d3d" + } + }, + "4.19.34": { + "CVE-2019-11810": { + "cmt_msg": "scsi: megaraid_sas: return error when create DMA pool failed", + "cmt_id": "8032fc9120c211cd40beef4c91c8206f4167e523" + } + }, + "4.19.35": { + "CVE-2019-11486": { + "cmt_msg": "tty: mark Siemens R3964 line discipline as BROKEN", + "cmt_id": "894dc8495898cf6075eadf99fd496374decd3986" + }, + "CVE-2019-11815": { + "cmt_msg": "net: rds: force to destroy connection if t_sock is NULL in rds_tcp_kill_sock().", + "cmt_id": "78b4bf26a8a76569fd6d0b47d98fb553c333b06f" + }, + "CVE-2019-3887": { + "cmt_msg": "KVM: x86: nVMX: close leak of L0's x2APIC MSRs (CVE-2019-3887)", + "cmt_id": "119031be7b0a2ce4ff4cd5525bec6d42817ff53d" + }, + "CVE-2019-10639": { + "cmt_msg": "netns: provide pure entropy for net_hash_mix()", + "cmt_id": "a1c2f3229734a4bb8d5ac008c0a67e025aa11547" + } + }, + "4.19.36": { + "CVE-2019-15292": { + "cmt_msg": "appletalk: Fix use-after-free in atalk_proc_exit", + "cmt_id": "6c42507f426b40c63e8eb98ce6dd4afbc7efcdb5" + }, + "CVE-2019-9857": { + "cmt_msg": "inotify: Fix fsnotify_mark refcount leak in inotify_update_existing_watch()", + "cmt_id": "ca306c17d2edcc8aa3bf1724a5cb1ecefc31ef3b" + }, + "CVE-2022-21385": { + "cmt_msg": "net/rds: fix warn in rds_message_alloc_sgs", + "cmt_id": "5be4bb315de29ad3ae558a8f6b92f13a1b4bfb84" + } + }, + "4.19.37": { + "CVE-2019-3892": { + "cmt_msg": "coredump: fix race condition between mmget_not_zero()/get_task_mm() and core dumping", + "cmt_id": "6ff17bc5936e5fab33de8064dc0690f6c8c789ca" + }, + "CVE-2019-11599": { + "cmt_msg": "coredump: fix race condition between mmget_not_zero()/get_task_mm() and core dumping", + "cmt_id": "6ff17bc5936e5fab33de8064dc0690f6c8c789ca" + }, + "CVE-2019-15920": { + "cmt_msg": "cifs: Fix use-after-free in SMB2_read", + "cmt_id": "c69330a855ab4342d304f67f8c1e7d1fa2686bec" + }, + "CVE-2019-15919": { + "cmt_msg": "cifs: Fix use-after-free in SMB2_write", + "cmt_id": "8fb89b43b65fcd35f15d982712904b96fc64c68a" + }, + "CVE-2019-15214": { + "cmt_msg": "ALSA: core: Fix card races between register and disconnect", + "cmt_id": "b50e435df2d8b9a1d3e956e1c767dfc7e30a441b" + } + }, + "4.19.38": { + "CVE-2019-3882": { + "cmt_msg": "vfio/type1: Limit DMA mappings per container", + "cmt_id": "f7b467ad1be0478f0341afa8a9ac112732def088" + }, + "CVE-2019-15924": { + "cmt_msg": "fm10k: Fix a potential NULL pointer dereference", + "cmt_id": "9b9b0df4e7882638e53c55e8f556aa78915418b9" + }, + "CVE-2019-10125": { + "cmt_msg": "aio: simplify - and fix - fget/fput for io_submit()", + "cmt_id": "d6b2615f7d31d8e58b685d42dbafcc7dc1204bbd" + }, + "CVE-2019-18805": { + "cmt_msg": "ipv4: set the tcp_min_rtt_wlen range from 0 to one day", + "cmt_id": "250e51f856e1534e3e769add508f121966030462" + } + }, + "4.19.39": { + "CVE-2019-11487": { + "cmt_msg": "fs: prevent page refcount overflow in pipe_buf_get", + "cmt_id": "0311ff82b70fa12e80d188635bff24029ec06ae1" + } + }, + "4.19.41": { + "CVE-2019-15216": { + "cmt_msg": "USB: yurex: Fix protection fault after device removal", + "cmt_id": "9f632afe4f3989d77fdbf8ac6a015d6beb03ccb9" + } + }, + "4.19.42": { + "CVE-2018-20836": { + "cmt_msg": "scsi: libsas: fix a race condition when smp task timeout", + "cmt_id": "0f18e433b97bf74bb62e0caa95c61e8631967fb9" + }, + "CVE-2019-11884": { + "cmt_msg": "Bluetooth: hidp: fix buffer overflow", + "cmt_id": "c6d1f9b4b2cb768e29f5d44af143f25ad89062b1" + } + }, + "4.19.43": { + "CVE-2019-11091": { + "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option", + "cmt_id": "59a14fb5832c370c63ab483f4f3718a0f729c7f5" + }, + "CVE-2018-12130": { + "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option", + "cmt_id": "59a14fb5832c370c63ab483f4f3718a0f729c7f5" + }, + "CVE-2018-12127": { + "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option", + "cmt_id": "59a14fb5832c370c63ab483f4f3718a0f729c7f5" + }, + "CVE-2018-12126": { + "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option", + "cmt_id": "59a14fb5832c370c63ab483f4f3718a0f729c7f5" + } + }, + "4.19.44": { + "CVE-2019-10142": { + "cmt_msg": "drivers/virt/fsl_hypervisor.c: prevent integer overflow in ioctl", + "cmt_id": "e9ec5073c90d6de2ca5338bd67f7935b19d7c0c7" + } + }, + "4.19.45": { + "CVE-2019-11833": { + "cmt_msg": "ext4: zero out the unused memory region in the extent tree block", + "cmt_id": "25d010f4e0ece1ddf0d8d57942c0b0f1568fe498" + } + }, + "4.19.46": { + "CVE-2019-25045": { + "cmt_msg": "xfrm: clean up xfrm protocol checks", + "cmt_id": "d410ef75886a4efb3c49b8bacd8e3c295235e744" + }, + "CVE-2019-15666": { + "cmt_msg": "xfrm: policy: Fix out-of-bound array accesses in __xfrm_policy_unlink", + "cmt_id": "c9516503fe53c8960f180c1cc1cdf2341bed843d" + } + }, + "4.19.47": { + "CVE-2019-20095": { + "cmt_msg": "mwifiex: Fix mem leak in mwifiex_tm_cmd", + "cmt_id": "a27ce4840f89acd1e23efe2b4dfc0d512aa5b38a" + }, + "CVE-2019-19543": { + "cmt_msg": "media: serial_ir: Fix use-after-free in serial_ir_init_module", + "cmt_id": "aec118ecf579a6c70e505b39fc6eb6a2d878c89e" + }, + "CVE-2019-9466": { + "cmt_msg": "brcmfmac: add subtype check for event handling in data path", + "cmt_id": "8783c4128c371668e401eee2f2ba3918c6211b81" + }, + "CVE-2019-9500": { + "cmt_msg": "brcmfmac: assure SSID length from firmware is limited", + "cmt_id": "cc240e057c1d48665dde8036144114854bae058c" + }, + "CVE-2019-9503": { + "cmt_msg": "brcmfmac: add subtype check for event handling in data path", + "cmt_id": "8783c4128c371668e401eee2f2ba3918c6211b81" + }, + "CVE-2019-19966": { + "cmt_msg": "media: cpia2: Fix use-after-free in cpia2_exit", + "cmt_id": "bdf3da72ae79f0cfb88c720dedabe16b0d67334b" + } + }, + "4.19.48": { + "CVE-2020-10720": { + "cmt_msg": "net-gro: fix use-after-free read in napi_gro_frags()", + "cmt_id": "39fd0dc4a5565a1df7d84b1c92d2050233b15b5a" + }, + "CVE-2019-10638": { + "cmt_msg": "inet: switch IP ID generator to siphash", + "cmt_id": "07480da0c8a1979e0973d6dd783b6aed966dccf6" + } + }, + "4.19.49": { + "CVE-2019-15212": { + "cmt_msg": "USB: rio500: refuse more than one device at a time", + "cmt_id": "d2d93077bac37c6895d8c58f564699a3a897c5db" + }, + "CVE-2019-15219": { + "cmt_msg": "USB: sisusbvga: fix oops in error path of sisusb_probe", + "cmt_id": "d27ea5e9eb4ac45e0e4cf8250a45aa06b0944787" + }, + "CVE-2019-15218": { + "cmt_msg": "media: usb: siano: Fix general protection fault in smsusb", + "cmt_id": "35b1044566528b26d48b31a52069f45851d49885" + }, + "CVE-2019-1999": { + "cmt_msg": "binder: fix race between munmap() and direct reclaim", + "cmt_id": "9d57cfd4e9d81400c1fe2b7cd4503f54830b46c2" + }, + "CVE-2019-15223": { + "cmt_msg": "ALSA: line6: Assure canceling delayed work at disconnection", + "cmt_id": "eb2eeec920fb1b9b6faf8ea340f6295a2d03602b" + } + }, + "4.19.50": { + "CVE-2019-13233": { + "cmt_msg": "x86/insn-eval: Fix use-after-free access to LDT entry", + "cmt_id": "b598ddc7b9fc87b09bdadb63abf92b4ba46cd385" + } + }, + "4.19.52": { + "CVE-2019-11479": { + "cmt_msg": "tcp: add tcp_min_snd_mss sysctl", + "cmt_id": "7f9f8a37e563c67b24ccd57da1d541a95538e8d9" + }, + "CVE-2019-11478": { + "cmt_msg": "tcp: tcp_fragment() should apply sane memory limits", + "cmt_id": "ec83921899a571ad70d582934ee9e3e07f478848" + }, + "CVE-2019-11477": { + "cmt_msg": "tcp: limit payload size of sacked skbs", + "cmt_id": "c09be31461ed140976c60a87364415454a2c3d42" + } + }, + "4.19.53": { + "CVE-2019-9453": { + "cmt_msg": "f2fs: fix to avoid accessing xattr across the boundary", + "cmt_id": "ae3787d433f7b87ebf6b916e524c6e280e4e5804" + }, + "CVE-2019-15090": { + "cmt_msg": "scsi: qedi: remove memset/memcpy to nfunc and use func instead", + "cmt_id": "f3a7a1137ffc69e1f460eb9e1b5f4fd09d3c4ea9" + } + }, + "4.19.54": { + "CVE-2019-15807": { + "cmt_msg": "scsi: libsas: delete sas port if expander discover failed", + "cmt_id": "114e8135ae0031556ead1bcb67249ecb84b804de" + }, + "CVE-2019-12984": { + "cmt_msg": "nfc: Ensure presence of required attributes in the deactivate_target handler", + "cmt_id": "4bb4ba362cc1ed3acb181a6d0b68c6de22be78e2" + } + }, + "4.19.56": { + "CVE-2019-12817": { + "cmt_msg": "powerpc/mm/64s/hash: Reallocate context ids on fork", + "cmt_id": "cd3e49394cb0f45c8dbf3c17c0818cd3d30b1332" + }, + "CVE-2019-12615": { + "cmt_msg": "mdesc: fix a missing-check bug in get_vdev_port_node_info()", + "cmt_id": "7b460a9bb13db3f442f153c2ab8a9ff8520c368c" + }, + "CVE-2019-0136": { + "cmt_msg": "mac80211: drop robust management frames from unknown TA", + "cmt_id": "0e879ef1cb5baddebe1f12a9a3940a87d8e61558" + } + }, + "4.19.58": { + "CVE-2019-13272": { + "cmt_msg": "ptrace: Fix ->ptracer_cred handling for PTRACE_TRACEME", + "cmt_id": "54435b7fff7bfb9515cc457b71c3734c1c3fff76" + }, + "CVE-2019-15221": { + "cmt_msg": "ALSA: line6: Fix write on zero-sized buffer", + "cmt_id": "7f52af5e9baa9c478edcecdd4058eeef2835b1c3" + }, + "CVE-2019-9506": { + "cmt_msg": "Bluetooth: Fix faulty expression for minimum encryption key size check", + "cmt_id": "5dd6139a0aa22112e46a6df5fd283046095822e0" + } + }, + "4.19.59": { + "CVE-2019-10126": { + "cmt_msg": "mwifiex: Fix heap overflow in mwifiex_uap_parse_tail_ies()", + "cmt_id": "c7e427e28a3a2d1b89b8f9fa7c3f559774d91a7b" + }, + "CVE-2019-3846": { + "cmt_msg": "mwifiex: Fix possible buffer overflows at parsing bss descriptor", + "cmt_id": "d4c0f752c1d2c6383cc7582c19b2ed7159d45937" + }, + "CVE-2019-15220": { + "cmt_msg": "p54usb: Fix race between disconnect and firmware loading", + "cmt_id": "449a8d08a4bc45101fa26e6d233b98258d33620a" + } + }, + "4.19.61": { + "CVE-2019-17351": { + "cmt_msg": "xen: let alloc_xenballooned_pages() fail if not enough memory free", + "cmt_id": "e73db096691e5f2720049502a3794a2a0c6d1b1f" + }, + "CVE-2019-13631": { + "cmt_msg": "Input: gtco - bounds check collection indent level", + "cmt_id": "d657077eda7b5572d86f2f618391bb016b5d9a64" + }, + "CVE-2019-15213": { + "cmt_msg": "media: dvb: usb: fix use after free in dvb_usb_device_exit", + "cmt_id": "94f2b518a7882f562537796b77e3ce6a6461236d" + }, + "CVE-2019-15925": { + "cmt_msg": "net: hns3: add some error checking in hclge_tm module", + "cmt_id": "26d86b29e806769adba91bd6fc1f077b94e9b64b" + }, + "CVE-2019-15926": { + "cmt_msg": "ath6kl: add some bounds checking", + "cmt_id": "83c911f4bd6846397017aa38c32dd18dc532f754" + }, + "CVE-2019-14284": { + "cmt_msg": "floppy: fix div-by-zero in setup_format_params", + "cmt_id": "6e34fd07484a0622a17b40e0ca89ed451260ef45" + }, + "CVE-2019-14283": { + "cmt_msg": "floppy: fix out-of-bounds read in copy_buffer", + "cmt_id": "ff54c44f103825a426e46d08b5d3d76e44791a87" + } + }, + "4.19.63": { + "CVE-2019-12382": { + "cmt_msg": "drm/edid: Fix a missing-check bug in drm_load_edid_firmware()", + "cmt_id": "2a18d76592e0d86c7fddcc6a7aa52509a2900f9d" + }, + "CVE-2019-13648": { + "cmt_msg": "powerpc/tm: Fix oops on sigreturn on systems without TM", + "cmt_id": "b993a66d8ddc1c26da0d9aa3471789cc170b28ee" + } + }, + "4.19.64": { + "CVE-2019-20934": { + "cmt_msg": "sched/fair: Don't free p->numa_faults with concurrent readers", + "cmt_id": "48046e092ad557a01d7daf53205624944793b19d" + }, + "CVE-2019-15211": { + "cmt_msg": "media: radio-raremono: change devm_k*alloc to k*alloc", + "cmt_id": "b3836af8560e27cd0d27940ff9c5a08b90b8d256" + }, + "CVE-2019-3900": { + "cmt_msg": "vhost_net: fix possible infinite loop", + "cmt_id": "3af3b843aee41ed22343b011a4cf3812a80d2f38" + }, + "CVE-2019-10207": { + "cmt_msg": "Bluetooth: hci_uart: check for missing tty operations", + "cmt_id": "56966212e23f82ced10831f7cca02f7339147428" + }, + "CVE-2019-15215": { + "cmt_msg": "media: cpia2_usb: first wake up, then free in disconnect", + "cmt_id": "8b44cc225e6024174508164931cab9f01c79dca2" + }, + "CVE-2019-2213": { + "cmt_msg": "binder: fix possible UAF when freeing buffer", + "cmt_id": "22068d49d09d2b3890e19d7b2048a33340f992da" + } + }, + "4.19.65": { + "CVE-2019-1125": { + "cmt_msg": "x86/speculation: Prepare entry code for Spectre v1 swapgs mitigations", + "cmt_id": "befb822c062b4c3d93380a58d5fd479395e8b267" + } + }, + "4.19.67": { + "CVE-2019-19536": { + "cmt_msg": "can: peak_usb: pcan_usb_pro: Fix info-leaks to USB devices", + "cmt_id": "cab569a44a524709d95bbd88700860ac45e5d5cf" + }, + "CVE-2019-19535": { + "cmt_msg": "can: peak_usb: pcan_usb_fd: Fix info-leaks to USB devices", + "cmt_id": "9ce1b3eb5489416338b2fb2b40f30f0d425700b4" + }, + "CVE-2019-19531": { + "cmt_msg": "usb: yurex: Fix use-after-free in yurex_delete", + "cmt_id": "33f2240acfa8b4017ee5dd64601c8a5ec7f53b4e" + } + }, + "4.19.68": { + "CVE-2019-15118": { + "cmt_msg": "ALSA: usb-audio: Fix a stack buffer overflow bug in check_input_term", + "cmt_id": "46f9a1bc60a4c15a14a6504168cee1c2e0bf3ab4" + }, + "CVE-2019-19537": { + "cmt_msg": "USB: core: Fix races in character device registration and deregistraion", + "cmt_id": "7f52d6d2a82df15d7ea01d69d0943d2abc201b43" + }, + "CVE-2019-19527": { + "cmt_msg": "HID: hiddev: do cleanup in failure of opening a device", + "cmt_id": "b545dc9debe69ca513b93f4a244451e9be14b0c5" + }, + "CVE-2019-19530": { + "cmt_msg": "usb: cdc-acm: make sure a refcount is taken early enough", + "cmt_id": "c02c0249ce5523a7a264136ed36f857b85555bac" + }, + "CVE-2019-15117": { + "cmt_msg": "ALSA: usb-audio: Fix an OOB bug in parse_audio_mixer_unit", + "cmt_id": "58b9f19ee438990f6406e61943d0bc7c875a0921" + } + }, + "4.19.69": { + "CVE-2019-15538": { + "cmt_msg": "xfs: fix missing ILOCK unlock when xfs_setattr_nonsize fails due to EDQUOT", + "cmt_id": "11f85d4d77afb8f1cb1989f1565b26df21280118" + } + }, + "4.19.70": { + "CVE-2019-15902": { + "cmt_msg": "unknown", + "cmt_id": "b307f99dca5ab33edc1e04b9b479bcb0852ff85f" + } + }, + "4.19.73": { + "CVE-2019-15918": { + "cmt_msg": "cifs: Fix lease buffer length error", + "cmt_id": "4061e662c8e9f5fb796b05fd2ab58fed8cd16d59" + }, + "CVE-2019-19319": { + "cmt_msg": "ext4: protect journal inode's blocks using block_validity", + "cmt_id": "2fd4629de51974002f4e9cf1a35a1926dd6c9d99" + }, + "CVE-2019-14835": { + "cmt_msg": "vhost: make sure log_num < in_num", + "cmt_id": "ba03ee62aed0b0ee2eadfeb4a2fecc7d7eb47871" + }, + "CVE-2019-15031": { + "cmt_msg": "powerpc/tm: Fix restoring FP/VMX facility incorrectly on interrupts", + "cmt_id": "569775bd536416ed9049aa580d9f89a0b4307d60" + }, + "CVE-2019-15030": { + "cmt_msg": "powerpc/tm: Fix FP/VMX unavailable exceptions inside a transaction", + "cmt_id": "47a0f70d7d9ac3d6b1a96b312d07bc67af3834e9" + } + }, + "4.19.74": { + "CVE-2019-15504": { + "cmt_msg": "rsi: fix a double free bug in rsi_91x_deinit()", + "cmt_id": "3622d621e9beca76d53cd3007eb7b1d6e724716b" + } + }, + "4.19.75": { + "CVE-2019-14816": { + "cmt_msg": "mwifiex: Fix three heap overflow at parsing element in cfg80211_ap_settings", + "cmt_id": "941431c491a68e0428bdfb46bbe4cbc52f7bfabb" + }, + "CVE-2019-14814": { + "cmt_msg": "mwifiex: Fix three heap overflow at parsing element in cfg80211_ap_settings", + "cmt_id": "941431c491a68e0428bdfb46bbe4cbc52f7bfabb" + }, + "CVE-2019-14815": { + "cmt_msg": "mwifiex: Fix three heap overflow at parsing element in cfg80211_ap_settings", + "cmt_id": "941431c491a68e0428bdfb46bbe4cbc52f7bfabb" + }, + "CVE-2019-15505": { + "cmt_msg": "media: technisat-usb2: break out of loop at end of buffer", + "cmt_id": "b841a9f58d9c778d8c2c5f636dc06a53b9a47fa1" + }, + "CVE-2019-14821": { + "cmt_msg": "KVM: coalesced_mmio: add bounds checking", + "cmt_id": "232a6462f43fceeac82bd99ef092b38e3a7ee296" + } + }, + "4.19.77": { + "CVE-2019-19533": { + "cmt_msg": "media: ttusb-dec: Fix info-leak in ttusb_dec_send_command()", + "cmt_id": "8630a4d13683095fbf14091d59a20e1ac71fdd6b" + }, + "CVE-2019-19080": { + "cmt_msg": "nfp: flower: prevent memory leak in nfp_flower_spawn_phy_reprs", + "cmt_id": "5b6c791f494d5e770dfd015390386f321b9a94da" + }, + "CVE-2019-19081": { + "cmt_msg": "nfp: flower: fix memory leak in nfp_flower_spawn_vnic_reprs", + "cmt_id": "587df35cbf654a063372fb1b523a0b56a5f789ab" + }, + "CVE-2019-17053": { + "cmt_msg": "ieee802154: enforce CAP_NET_RAW for raw sockets", + "cmt_id": "dd651ab7a11436f787aed0a987c85864b261ff19" + }, + "CVE-2019-17052": { + "cmt_msg": "ax25: enforce CAP_NET_RAW for raw sockets", + "cmt_id": "6f0f18e532693ecc1e0c7938e0d63531ea62bc3e" + }, + "CVE-2019-17056": { + "cmt_msg": "nfc: enforce CAP_NET_RAW for raw sockets", + "cmt_id": "33fe1f517e29566d842535038be227c71a4bd54d" + }, + "CVE-2019-17055": { + "cmt_msg": "mISDN: enforce CAP_NET_RAW for raw sockets", + "cmt_id": "50dddec689cb2105f6bccf4a2c6fe43dcc3295d7" + }, + "CVE-2019-17054": { + "cmt_msg": "appletalk: enforce CAP_NET_RAW for raw sockets", + "cmt_id": "6fbf866276089853727dd9b31f1d251e61dde367" + } + }, + "4.19.78": { + "CVE-2019-18806": { + "cmt_msg": "net: qlogic: Fix memory leak in ql_alloc_large_buffers", + "cmt_id": "9d0995cc268b4a431dbfb29db5cac36546732bc0" + } + }, + "4.19.79": { + "CVE-2019-19525": { + "cmt_msg": "ieee802154: atusb: fix use-after-free at disconnect", + "cmt_id": "3f41e88f4bd44284c575ad3fb579581a16b39069" + }, + "CVE-2019-16746": { + "cmt_msg": "nl80211: validate beacon head", + "cmt_id": "1bd17a737c9e7e91483d9a603528b0e6d4c772f8" + } + }, + "4.19.80": { + "CVE-2019-19528": { + "cmt_msg": "USB: iowarrior: fix use-after-free on disconnect", + "cmt_id": "2fdcf7e19bdefc683da824264c0898af39bf8d50" + }, + "CVE-2019-19523": { + "cmt_msg": "USB: adutux: fix use-after-free on disconnect", + "cmt_id": "316f51d7759735a5295301ab22a7c6231b49c24f" + } + }, + "4.19.81": { + "CVE-2019-19075": { + "cmt_msg": "ieee802154: ca8210: prevent memory leak", + "cmt_id": "960019214539ce75398eaf38d31c77b86aadd739" + }, + "CVE-2019-17075": { + "cmt_msg": "RDMA/cxgb4: Do not dma memory off of the stack", + "cmt_id": "27414f90ff6e1d7f6657e4a820b04a7b2d760272" + }, + "CVE-2019-17133": { + "cmt_msg": "cfg80211: wext: avoid copying malformed SSIDs", + "cmt_id": "73c066a9552a6d33ed7de002855337d1c966e8ce" + } + }, + "4.19.82": { + "CVE-2019-19060": { + "cmt_msg": "iio: imu: adis16400: release allocated memory on failure", + "cmt_id": "4a4206a83fc69782d4ef36d8f5eb28836d8b6814" + }, + "CVE-2019-19065": { + "cmt_msg": "RDMA/hfi1: Prevent memory leak in sdma_init", + "cmt_id": "962cff4f3f89acf54b6fb418e7ff386b720b0fd6" + }, + "CVE-2019-17666": { + "cmt_msg": "rtlwifi: Fix potential overflow on P2P code", + "cmt_id": "64efcbc7a5a3c7a14e42ccf7b8a7e7667d672a33" + }, + "CVE-2019-15099": { + "cmt_msg": "ath6kl: fix a NULL-ptr-deref bug in ath6kl_usb_alloc_urb_from_pipe()", + "cmt_id": "696da02259463ea634821e117088f82afe7bf851" + }, + "CVE-2019-15098": { + "cmt_msg": "ath6kl: fix a NULL-ptr-deref bug in ath6kl_usb_alloc_urb_from_pipe()", + "cmt_id": "696da02259463ea634821e117088f82afe7bf851" + }, + "CVE-2019-19048": { + "cmt_msg": "virt: vbox: fix memory leak in hgcm_call_preprocess_linaddr", + "cmt_id": "c2ea451f22f180e9e46225f54b5ec50c50bb639f" + }, + "CVE-2020-10773": { + "cmt_msg": "s390/cmm: fix information leak in cmm_timeout_handler()", + "cmt_id": "ced8cb0230d070274cd26bec818dd7c67514d586" + }, + "CVE-2019-19526": { + "cmt_msg": "NFC: pn533: fix use-after-free and memleaks", + "cmt_id": "24aaf7f4528f0df0f29667d3921f4a63aa7b806c" + }, + "CVE-2019-19532": { + "cmt_msg": "HID: Fix assumption that devices have inputs", + "cmt_id": "8a01c4b908cf0a5367d3309c1c0d4e9be655ce00" + } + }, + "4.19.83": { + "CVE-2019-18282": { + "cmt_msg": "net/flow_dissector: switch to siphash", + "cmt_id": "558d2bdad5f6a0dd65ed7ed4f74419e826a97759" + }, + "CVE-2019-16233": { + "cmt_msg": "scsi: qla2xxx: fix a potential NULL pointer dereference", + "cmt_id": "3ee6a8bdae81a09c1dc9c27d3a50e6b1b6a24676" + }, + "CVE-2019-19049": { + "cmt_msg": "of: unittest: fix memory leak in unittest_data_add", + "cmt_id": "fcc3f7c810c3bc595ce179ea4d9e18f506fd0d03" + } + }, + "4.19.84": { + "CVE-2019-19045": { + "cmt_msg": "net/mlx5: prevent memory leak in mlx5_fpga_conn_create_cq", + "cmt_id": "42de3a902443b64c6e3cf9c61d9cd6f30b2c0d67" + }, + "CVE-2019-19052": { + "cmt_msg": "can: gs_usb: gs_can_open(): prevent memory leak", + "cmt_id": "9289226f69822de0b716c0fbfc31db0283f14e2b" + }, + "CVE-2019-18813": { + "cmt_msg": "usb: dwc3: pci: prevent memory leak in dwc3_pci_probe", + "cmt_id": "10eb9abd21bad2a9726f50557b38924cb8d81ccd" + }, + "CVE-2019-0155": { + "cmt_msg": "drm/i915: Rename gen7 cmdparser tables", + "cmt_id": "b4b1abdc6b181cb78a072b95557ae392d423c3eb" + }, + "CVE-2019-0154": { + "cmt_msg": "drm/i915: Lower RM timeout to avoid DSI hard hangs", + "cmt_id": "011b7173cbdbd1a5f1826656693ea51516f15dc1" + }, + "CVE-2019-19922": { + "cmt_msg": "sched/fair: Fix low cpu usage with high throttling by removing expiration of cpu-local slices", + "cmt_id": "502bd151448c2c76a927b26783e5538875c534ff" + }, + "CVE-2019-19529": { + "cmt_msg": "can: mcba_usb: fix use-after-free on disconnect", + "cmt_id": "ce9b94da0e043b7b0ec1bd3d0e451d956acff9c1" + }, + "CVE-2018-12207": { + "cmt_msg": "kvm: x86, powerpc: do not allow clearing largepages debugfs entry", + "cmt_id": "a991063ce57684a2259688886643cf1c430f8188" + }, + "CVE-2019-11135": { + "cmt_msg": "x86/msr: Add the IA32_TSX_CTRL MSR", + "cmt_id": "4002d16a2ae1e3bdc0aa36ce5089bd62b4b9eab6" + }, + "CVE-2019-16231": { + "cmt_msg": "fjes: Handle workqueue allocation failure", + "cmt_id": "f09b99c883e82fd5d28a529e11e66c2e887da636" + }, + "CVE-2019-19534": { + "cmt_msg": "can: peak_usb: fix slab info leak", + "cmt_id": "a7be2debb769092c7c07b9a866b055d8bee5afaf" + } + }, + "4.19.85": { + "CVE-2019-19524": { + "cmt_msg": "Input: ff-memless - kill timer in destroy()", + "cmt_id": "c02230815282a436366d3d0d6de6d2636dd71b74" + } + }, + "4.19.87": { + "CVE-2019-18660": { + "cmt_msg": "powerpc/book3s64: Fix link stack flush on context switch", + "cmt_id": "0a60d4bddc0ba6a7e06d10efa59f7861837860b0" + }, + "CVE-2019-15291": { + "cmt_msg": "media: b2c2-flexcop-usb: add sanity checking", + "cmt_id": "8b42c263ec1a348bf098e6255407486c1bf17ece" + }, + "CVE-2019-18683": { + "cmt_msg": "media: vivid: Fix wrong locking that causes race conditions on streaming stop", + "cmt_id": "467052f6ea5a51524992e43f02b543550495c391" + } + }, + "4.19.88": { + "CVE-2019-12614": { + "cmt_msg": "powerpc/pseries/dlpar: Fix a missing check in dlpar_parse_cc_property()", + "cmt_id": "32a24a397aee35ca2bb0f835b8f3daabd88890fa" + }, + "CVE-2019-19767": { + "cmt_msg": "ext4: add more paranoia checking in ext4_expand_extra_isize handling", + "cmt_id": "e91cce02f3025da559468729ea0ad9dea242d3eb" + } + }, + "4.19.89": { + "CVE-2019-19062": { + "cmt_msg": "crypto: user - fix memory leak in crypto_report", + "cmt_id": "351a567ebf2482de4dd5e5bbd539f2175540b717" + }, + "CVE-2019-19227": { + "cmt_msg": "appletalk: Fix potential NULL pointer dereference in unregister_snap_client", + "cmt_id": "0977763a13fd87a7aebe376dc96385758de3aa9e" + }, + "CVE-2019-19071": { + "cmt_msg": "rsi: release skb if rsi_prepare_beacon fails", + "cmt_id": "5da96cc31633a9076404621ebb89bbe78f2c8676" + }, + "CVE-2019-19079": { + "cmt_msg": "net: qrtr: fix memort leak in qrtr_tun_write_iter", + "cmt_id": "754e3c0c31c96cf3a4a54ed2a8c63cca28109136" + }, + "CVE-2019-19252": { + "cmt_msg": "vcs: prevent write access to vcsu devices", + "cmt_id": "627f3b9e4dd812dac9d93e578af80de751e704a4" + }, + "CVE-2019-19332": { + "cmt_msg": "KVM: x86: fix out-of-bounds write in KVM_GET_EMULATED_CPUID (CVE-2019-19332)", + "cmt_id": "5119ffd480b644d8bc9af741cc8ef435a7ec5ff7" + } + }, + "4.19.90": { + "CVE-2019-19447": { + "cmt_msg": "ext4: work around deleting a file with i_nlink == 0 safely", + "cmt_id": "8e7a865366105b978eef4108f49a12100eea4299" + } + }, + "4.19.92": { + "CVE-2019-18786": { + "cmt_msg": "media: rcar_drif: fix a memory disclosure", + "cmt_id": "debdd16cbd99ffc767227685e2738e5b495b7c54" + }, + "CVE-2019-19057": { + "cmt_msg": "mwifiex: pcie: Fix memory leak in mwifiex_pcie_init_evt_ring", + "cmt_id": "1b3e52db38471d5ac896eb9be111565e3734d5b5" + }, + "CVE-2019-19063": { + "cmt_msg": "rtlwifi: prevent memory leak in rtl_usb_probe", + "cmt_id": "3717a450f83945c481059a6921440e5e6fe3c856" + }, + "CVE-2020-0427": { + "cmt_msg": "pinctrl: devicetree: Avoid taking direct reference to device name string", + "cmt_id": "f88ac1330779c5bfdd79f7d7f7d4d3343c782f92" + }, + "CVE-2019-19947": { + "cmt_msg": "can: kvaser_usb: kvaser_usb_leaf: Fix some info-leaks to USB devices", + "cmt_id": "9ed59600c3524f12144b30cfc1d86734cfb3927b" + }, + "CVE-2019-20812": { + "cmt_msg": "af_packet: set defaule value for tmo", + "cmt_id": "e99af2cb552e3fe1ec6157fc15856a89a6388886" + }, + "CVE-2019-16230": { + "cmt_msg": "drm/amdkfd: fix a potential NULL pointer dereference (v2)", + "cmt_id": "55248674330101fb3ccf7cec8b729e8e067e5f71" + }, + "CVE-2019-16232": { + "cmt_msg": "libertas: fix a potential NULL pointer dereference", + "cmt_id": "60bb6967b543be59f66f60526ca816e1b33ec480" + }, + "CVE-2019-16229": { + "cmt_msg": "drm/amdkfd: fix a potential NULL pointer dereference (v2)", + "cmt_id": "55248674330101fb3ccf7cec8b729e8e067e5f71" + } + }, + "4.19.93": { + "CVE-2020-10690": { + "cmt_msg": "ptp: fix the race between the release of ptp_clock and cdev", + "cmt_id": "0393b8720128d5b39db8523e5bfbfc689f18c37c" + } + }, + "4.19.94": { + "CVE-2019-18809": { + "cmt_msg": "media: usb: fix memory leak in af9005_identify_state", + "cmt_id": "d933de8115f3263fd50cf3b1f1dac2faff02fd89" + }, + "CVE-2019-19965": { + "cmt_msg": "scsi: libsas: stop discovering if oob mode is disconnected", + "cmt_id": "8b9bf467061bc89ccf4a43be637e08d8a70fd76d" + } + }, + "4.19.95": { + "CVE-2019-14901": { + "cmt_msg": "mwifiex: Fix heap overflow in mmwifiex_process_tdls_action_frame()", + "cmt_id": "21f08020dd8519baf209348c345131a8967e3cef" + } + }, + "4.19.96": { + "CVE-2019-14895": { + "cmt_msg": "mwifiex: fix possible heap overflow in mwifiex_process_country_ie()", + "cmt_id": "0aa8632c57930243bea6fa4ebcbff8fac089e664" + }, + "CVE-2020-0305": { + "cmt_msg": "chardev: Avoid potential use-after-free in 'chrdev_open()'", + "cmt_id": "ec576895d61356a2cab096e1ca23bf7cc765e5b2" + }, + "CVE-2019-19066": { + "cmt_msg": "scsi: bfa: release allocated memory in case of error", + "cmt_id": "486f51201528126bec2c647fa9d4216fc4fda91b" + }, + "CVE-2019-20636": { + "cmt_msg": "Input: add safety guards to input_set_keycode()", + "cmt_id": "f5b9bfbe94a042a2e3806efa4c6e1b6ddb4292c4" + }, + "CVE-2019-19068": { + "cmt_msg": "rtl8xxxu: prevent leaking urb", + "cmt_id": "0e27512c5d0bc2c3d33c1e7f73a8983015c82b83" + }, + "CVE-2020-0431": { + "cmt_msg": "HID: hid-input: clear unmapped usages", + "cmt_id": "64c8b76e69acdecab62b035e72b12775d6d35a3b" + }, + "CVE-2019-14615": { + "cmt_msg": "drm/i915/gen9: Clear residual context state on context switch", + "cmt_id": "dd4f3b3508f65fe37975db223365216316da3998" + }, + "CVE-2019-19056": { + "cmt_msg": "mwifiex: pcie: Fix memory leak in mwifiex_pcie_alloc_cmdrsp_buf", + "cmt_id": "f2bde0e9989e243345316e3c96b352ab94037340" + }, + "CVE-2019-19078": { + "cmt_msg": "ath10k: fix memory leak", + "cmt_id": "aed1b68eadf22513ac1fbd389f591f91c8bdaaf5" + } + }, + "4.19.97": { + "CVE-2019-9445": { + "cmt_msg": "f2fs: check if file namelen exceeds max value", + "cmt_id": "4124927e36b7753efb6faf1a508e2bc6783343cf" + }, + "CVE-2019-20096": { + "cmt_msg": "dccp: Fix memleak in __feat_register_sp", + "cmt_id": "e58c590c772eb5dc5a3603c5aef4148f47ab2e20" + }, + "CVE-2019-15217": { + "cmt_msg": "media: usb:zr364xx:Fix KASAN:null-ptr-deref Read in zr364xx_vidioc_querycap", + "cmt_id": "0648766cb7d336e5932278c316aef6aac35d60ab" + }, + "CVE-2019-19059": { + "cmt_msg": "iwlwifi: pcie: fix memory leaks in iwl_pcie_ctxt_info_gen3_init", + "cmt_id": "6e41dd9731e13b0bdf2f57f84b9d25d009bd9f87" + }, + "CVE-2019-19058": { + "cmt_msg": "iwlwifi: dbg_ini: fix memory leak in alloc_sgtable", + "cmt_id": "09044a4a142404799e519def0bbfcc98fa68c677" + }, + "CVE-2019-19927": { + "cmt_msg": "drm/ttm: fix incrementing the page pointer for huge pages", + "cmt_id": "8c2cdfb2c81bb533b9e6a3874ee5399102c4c580" + }, + "CVE-2019-19077": { + "cmt_msg": "RDMA: Fix goto target to release the allocated memory", + "cmt_id": "d203ff6a3059b7fc3a9b48048eaf5641ed7fda2c" + }, + "CVE-2019-5108": { + "cmt_msg": "mac80211: Do not send Layer 2 Update frame before authorization", + "cmt_id": "8f483142b0bb278f67eabccbe3d6a0e8c45284ad" + } + }, + "4.19.98": { + "CVE-2020-12652": { + "cmt_msg": "scsi: mptfusion: Fix double fetch bug in ioctl", + "cmt_id": "3dae5041c65545ac65d610375b4ac30b00f174a3" + }, + "CVE-2021-3635": { + "cmt_msg": "netfilter: nf_tables: fix flowtable list del corruption", + "cmt_id": "8260ce5aeee4d7c4a6305e469edeae1066de2800" + } + }, + "4.19.99": { + "CVE-2019-19046": { + "cmt_msg": "ipmi: Fix memory leak in __ipmi_bmc_register", + "cmt_id": "211eabc55d07fc3709e967b08b6f5bb77198dbd0" + }, + "CVE-2019-20806": { + "cmt_msg": "media: tw5864: Fix possible NULL pointer dereference in tw5864_handle_frame", + "cmt_id": "30fd5b16c9081afebe74d4d614fe582ff84ef6b2" + } + }, + "4.19.100": { + "CVE-2019-14896": { + "cmt_msg": "libertas: Fix two buffer overflows at parsing bss descriptor", + "cmt_id": "cbd56515be5a8ea97134ef762b7a2923b94cb9c4" + }, + "CVE-2019-14897": { + "cmt_msg": "libertas: Fix two buffer overflows at parsing bss descriptor", + "cmt_id": "cbd56515be5a8ea97134ef762b7a2923b94cb9c4" + }, + "CVE-2020-14416": { + "cmt_msg": "can, slip: Protect tty->disc_data in write_wakeup and close with RCU", + "cmt_id": "bd1448458c6a67782d4e82c181b5540b5727546b" + }, + "CVE-2020-8428": { + "cmt_msg": "do_last(): fetch directory ->i_mode and ->i_uid before it's too late", + "cmt_id": "752f72edea55f9b7c6fd019e71365def13a0f2b6" + } + }, + "4.19.101": { + "CVE-2020-0432": { + "cmt_msg": "staging: most: net: fix buffer overflow", + "cmt_id": "9dab6bbc9462c43001a88ee933a491a1502fa6f5" + }, + "CVE-2020-12769": { + "cmt_msg": "spi: spi-dw: Add lock protect dw_spi rx/tx to prevent concurrent calls", + "cmt_id": "6fb12237c51e73e65899f9b1df69cd3999b4d90a" + } + }, + "4.19.103": { + "CVE-2020-0404": { + "cmt_msg": "media: uvcvideo: Avoid cyclic entity chains due to malformed USB descriptors", + "cmt_id": "3ceb3fcd6d1a6a65e7bf3873a63009d01ba4b05f" + }, + "CVE-2019-3016": { + "cmt_msg": "x86/kvm: Be careful not to clear KVM_VCPU_FLUSH_TLB bit", + "cmt_id": "25a7898937f4a9f32ca2d1e9b7f5f07176af8037" + } + }, + "4.19.104": { + "CVE-2020-12653": { + "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_cmd_append_vsie_tlv()", + "cmt_id": "48247f7e14911a4d18e9c774ba3a1d368f5d8a6f" + }, + "CVE-2020-12654": { + "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_ret_wmm_get_status()", + "cmt_id": "fab5ca79960b7fbda4e9a79a4754c749fdea2bd0" + } + }, + "4.19.107": { + "CVE-2020-9383": { + "cmt_msg": "floppy: check FDC index for errors before assigning it", + "cmt_id": "c8fd87c53a1509162b910cec91c0c46753c58f9a" + }, + "CVE-2020-2732": { + "cmt_msg": "KVM: nVMX: Don't emulate instructions in guest mode", + "cmt_id": "ed9e97c35b454ceb1da4f65c318015a7ab298dae" + }, + "CVE-2020-36558": { + "cmt_msg": "vt: vt_ioctl: fix race in VT_RESIZEX", + "cmt_id": "ec9645f1a77eab98951944273754307e192e69ae" + }, + "CVE-2020-0009": { + "cmt_msg": "staging: android: ashmem: Disallow ashmem memory from being remapped", + "cmt_id": "a4307700608e43dcf9b8abf1ee74f68227e9c61a" + } + }, + "4.19.108": { + "CVE-2020-27068": { + "cmt_msg": "cfg80211: add missing policy for NL80211_ATTR_STATUS_CODE", + "cmt_id": "0fb31bd53a5e27394916758173eb748c5e0dbd47" + }, + "CVE-2020-0444": { + "cmt_msg": "audit: fix error handling in audit_data_to_entry()", + "cmt_id": "c24d457a824f641ca328a20dd28872cfd97a005a" + }, + "CVE-2019-16234": { + "cmt_msg": "iwlwifi: pcie: fix rb_allocator workqueue allocation", + "cmt_id": "1d8780188c8d7f009a05d40fbb8a111eab89746d" + }, + "CVE-2020-10942": { + "cmt_msg": "vhost: Check docket sk_family instead of call getname", + "cmt_id": "ad598a48fe61c6c2407f08a807cb7a2ea83386b3" + } + }, + "4.19.109": { + "CVE-2020-8649": { + "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region", + "cmt_id": "7abe1e0a874418b07524c9e07225df1cbb421ce9" + }, + "CVE-2020-8647": { + "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region", + "cmt_id": "7abe1e0a874418b07524c9e07225df1cbb421ce9" + }, + "CVE-2020-27418": { + "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region", + "cmt_id": "7abe1e0a874418b07524c9e07225df1cbb421ce9" + }, + "CVE-2020-8648": { + "cmt_msg": "vt: selection, close sel_buffer race", + "cmt_id": "31559b59040fc0e6ad363642112d4eb03ad4ebb7" + } + }, + "4.19.111": { + "CVE-2020-12465": { + "cmt_msg": "mt76: fix array overflow on receiving too many fragments for a packet", + "cmt_id": "319478cbd2be90995b011ca6adbd834121eb7acf" + } + }, + "4.19.112": { + "CVE-2020-29370": { + "cmt_msg": "mm: slub: add missing TID bump in kmem_cache_alloc_bulk()", + "cmt_id": "30f6cae722654caef2ab4bacb2e910bfd766866b" + } + }, + "4.19.113": { + "CVE-2020-14381": { + "cmt_msg": "futex: Fix inode life-time issue", + "cmt_id": "e6d506cd2243aa8f6e19fdb4dc61d85275c2c918" + } + }, + "4.19.114": { + "CVE-2020-36557": { + "cmt_msg": "vt: vt_ioctl: fix VT_DISALLOCATE freeing in-use virtual console", + "cmt_id": "54584f79579b9f6ed49b93cadcd2361223ecce28" + }, + "CVE-2020-11668": { + "cmt_msg": "media: xirlink_cit: add missing descriptor sanity checks", + "cmt_id": "5d064d7f0327d9425c5f63fa96efc70a74032d8b" + }, + "CVE-2021-3715": { + "cmt_msg": "net_sched: cls_route: remove the right filter from hashtable", + "cmt_id": "ea3d6652c240978736a91b9e85fde9fee9359be4" + }, + "CVE-2020-27066": { + "cmt_msg": "xfrm: policy: Fix doulbe free in xfrm_policy_timer", + "cmt_id": "7ad217a824f7fab1e8534a6dfa82899ae1900bcb" + }, + "CVE-2020-11608": { + "cmt_msg": "media: ov519: add missing endpoint sanity checks", + "cmt_id": "747a7431661ab3c22ad1e721558bdf9e3d53d4a6" + }, + "CVE-2020-11609": { + "cmt_msg": "media: stv06xx: add missing descriptor sanity checks", + "cmt_id": "70764334b2bcb15c67dfbd912d9a9f7076f6d0df" + } + }, + "4.19.115": { + "CVE-2020-11494": { + "cmt_msg": "slcan: Don't transmit uninitialized stack data in padding", + "cmt_id": "b774578329afb238ccd504477731129aa15e9ec2" + }, + "CVE-2020-11565": { + "cmt_msg": "mm: mempolicy: require at least one nodeid for MPOL_PREFERRED", + "cmt_id": "fa138035f104ae14651ee3217d81fc16cd3aba4d" + } + }, + "4.19.116": { + "CVE-2020-12826": { + "cmt_msg": "signal: Extend exec_id to 64bits", + "cmt_id": "a2a1be2de7e4d9a3a2c6cf8512d38eb24bbeb059" + }, + "CVE-2020-12657": { + "cmt_msg": "block, bfq: fix use-after-free in bfq_idle_slice_timer_body", + "cmt_id": "d999063be0cf91bff8e0d6daaea21e1a4f70d336" + }, + "CVE-2020-11669": { + "cmt_msg": "powerpc/powernv/idle: Restore AMR/UAMOR/AMOR after idle", + "cmt_id": "1855c5436fa50e8dc930b0a24c52157dceef9a54" + } + }, + "4.19.118": { + "CVE-2020-12659": { + "cmt_msg": "xsk: Add missing check on user supplied headroom size", + "cmt_id": "ad8fb61c184fe0f8d1e0b5b954d010fb9f94a6ee" + } + }, + "4.19.119": { + "CVE-2020-11884": { + "cmt_msg": "s390/mm: fix page table upgrade vs 2ndary address mode accesses", + "cmt_id": "215d1f3928713d6eaec67244bcda72105b898000" + }, + "CVE-2020-1749": { + "cmt_msg": "net: ipv6_stub: use ip6_dst_lookup_flow instead of ip6_dst_lookup", + "cmt_id": "5dd6835278454a7c7a045462253625de7c16b13e" + }, + "CVE-2020-12464": { + "cmt_msg": "USB: core: Fix free-while-in-use bug in the USB S-Glibrary", + "cmt_id": "45ea77b75a604da875186519fea94997175c38e3" + }, + "CVE-2020-0067": { + "cmt_msg": "f2fs: fix to avoid memory leakage in f2fs_listxattr", + "cmt_id": "ed523cbd4a6594edf123dc03ec9d70ea4f793671" + }, + "CVE-2019-19768": { + "cmt_msg": "blktrace: Protect q->blk_trace with RCU", + "cmt_id": "473d7f5ed75b8c3750f0c6b442c8e23090d6da8f" + }, + "CVE-2020-12114": { + "cmt_msg": "make struct mountpoint bear the dentry reference to mountpoint, not struct mount", + "cmt_id": "f511dc75d22e0c000fc70b54f670c2c17f5fba9a" + } + }, + "4.19.121": { + "CVE-2020-10751": { + "cmt_msg": "selinux: properly handle multiple messages in selinux_netlink_send()", + "cmt_id": "23075857ad192731fd9edcce3b5cd5db93602c26" + }, + "CVE-2020-0255": { + "cmt_msg": "selinux: properly handle multiple messages in selinux_netlink_send()", + "cmt_id": "23075857ad192731fd9edcce3b5cd5db93602c26" + } + }, + "4.19.124": { + "CVE-2020-13143": { + "cmt_msg": "USB: gadget: fix illegal array access in binding with UDC", + "cmt_id": "a105bb549252e3e8bd9db0bdd81cdd6a853e4238" + }, + "CVE-2020-10711": { + "cmt_msg": "netlabel: cope with NULL catmap", + "cmt_id": "caf6c20c6421ca687751d27b96c8021c655e56e6" + }, + "CVE-2020-12770": { + "cmt_msg": "scsi: sg: add sg_remove_request in sg_write", + "cmt_id": "34fcb4291e234468f9bf9d4b851c9f522f3bbb13" + }, + "CVE-2020-27786": { + "cmt_msg": "ALSA: rawmidi: Fix racy buffer resize under concurrent accesses", + "cmt_id": "a507658fdb2ad8ca282b0eb42f2a40b805deb1e6" + } + }, + "4.19.125": { + "CVE-2020-12768": { + "cmt_msg": "KVM: SVM: Fix potential memory leak in svm_cpu_init()", + "cmt_id": "008708152ebb229c29e065135599984fa9c4a51c" + }, + "CVE-2019-18814": { + "cmt_msg": "apparmor: Fix use-after-free in aa_audit_rule_init", + "cmt_id": "f1738ae012a106c6c8fa7d33ed47fb478d9d3c75" + } + }, + "4.19.126": { + "CVE-2020-10732": { + "cmt_msg": "fs/binfmt_elf.c: allocate initialized memory in fill_thread_core_info()", + "cmt_id": "d16b0abe2687f7f0a2f6343a09797e8aac045c86" + } + }, + "4.19.127": { + "CVE-2020-10757": { + "cmt_msg": "mm: Fix mremap not considering huge pmd devmap", + "cmt_id": "78385480fd6572a83e7541e37658d9a7de6dc9b1" + }, + "CVE-2019-19462": { + "cmt_msg": "kernel/relay.c: handle alloc_percpu returning NULL in relay_open", + "cmt_id": "8b5dfa53eeb6c8bba5a035d38f6f8b981aebb622" + } + }, + "4.19.128": { + "CVE-2020-13974": { + "cmt_msg": "vt: keyboard: avoid signed integer overflow in k_ascii", + "cmt_id": "18059925dbb6a7b6be1c0166ecca29d6b7977c9a" + }, + "CVE-2020-0543": { + "cmt_msg": "x86/cpu: Add 'table' argument to cpu_matches()", + "cmt_id": "6682fe2fca22e45153e69f5b7ce7282bcba3565f" + } + }, + "4.19.129": { + "CVE-2019-20810": { + "cmt_msg": "media: go7007: fix a miss of snd_card_free", + "cmt_id": "95b58c96a28e6174661dcd5bc543618973fc43d3" + }, + "CVE-2018-20669": { + "cmt_msg": "make 'user_access_begin()' do 'access_ok()'", + "cmt_id": "216284c4a126b28469eb0bf4994c669e251f47ba" + }, + "CVE-2021-0342": { + "cmt_msg": "tun: correct header offsets in napi frags mode", + "cmt_id": "75e36c19ff10836e5d03f87cf17793cf83b59430" + }, + "CVE-2020-29368": { + "cmt_msg": "mm: thp: make the THP mapcount atomic against __split_huge_pmd_locked()", + "cmt_id": "453d8a481b127edfa7fb76af1bc7586b7a63bdd2" + }, + "CVE-2020-10766": { + "cmt_msg": "x86/speculation: Prevent rogue cross-process SSBD shutdown", + "cmt_id": "5aaf72a0dcb82d5c98f3b7df149baf4c7cf63e19" + }, + "CVE-2020-10767": { + "cmt_msg": "x86/speculation: Avoid force-disabling IBPB based on STIBP and enhanced IBRS.", + "cmt_id": "5d9d55cf4733c5ced8e1d19ea242a128ab9612d2" + }, + "CVE-2019-18885": { + "cmt_msg": "btrfs: merge btrfs_find_device and find_device", + "cmt_id": "8cb9b069fa631b613bbbd6f63887190e55cafa3c" + }, + "CVE-2019-19036": { + "cmt_msg": "btrfs: Detect unbalanced tree with empty leaf before crashing btree operations", + "cmt_id": "227af79e6cb0ee3faeb8c70be4bc0aec0b09ea25" + }, + "CVE-2020-10768": { + "cmt_msg": "x86/speculation: PR_SPEC_FORCE_DISABLE enforcement for indirect branches.", + "cmt_id": "52c419ba4c96880abd61b38e6e08e4ecd17350f3" + } + }, + "4.19.130": { + "CVE-2020-12771": { + "cmt_msg": "bcache: fix potential deadlock problem in btree_gc_coalesce", + "cmt_id": "2ee8f6e72269eb06649ebab3da6bbf59aed3eabe" + }, + "CVE-2020-15436": { + "cmt_msg": "block: Fix use-after-free in blkdev_get()", + "cmt_id": "49289b1fa5a67011c4010e4e9c801b9d565ce395" + } + }, + "4.19.131": { + "CVE-2020-12655": { + "cmt_msg": "xfs: add agf freeblocks verify in xfs_agf_verify", + "cmt_id": "135eccd83909e75389a5754577b0336bbd0939ef" + } + }, + "4.19.132": { + "CVE-2020-24394": { + "cmt_msg": "nfsd: apply umask on fs without ACL support", + "cmt_id": "2b3faab744b04de198aee4ed8dd74fca7a2a8306" + }, + "CVE-2020-15393": { + "cmt_msg": "usb: usbtest: fix missing kfree(dev->buf) in usbtest_disconnect", + "cmt_id": "7b0f1f89a0dd6e257367eddc840179e85195ca18" + } + }, + "4.19.134": { + "CVE-2020-14356": { + "cmt_msg": "cgroup: fix cgroup_sk_alloc() for sk_clone_lock()", + "cmt_id": "0505cc4c908f46a4d22c4994dbbe7bc489d0c52d" + }, + "CVE-2020-10781": { + "cmt_msg": "Revert \"zram: convert remaining CLASS_ATTR() to CLASS_ATTR_RO()\"", + "cmt_id": "81a91bf266dd7f2dd56fc3472b7bb54348ac62c7" + } + }, + "4.19.135": { + "CVE-2020-15437": { + "cmt_msg": "serial: 8250: fix null-ptr-deref in serial8250_start_tx()", + "cmt_id": "c358255ff1dfa51ddbcbc8dfcc4eaa5719008daa" + } + }, + "4.19.137": { + "CVE-2019-19061": { + "cmt_msg": "iio: imu: adis16400: fix memory leak", + "cmt_id": "c57c213538156bff971aa352d9d7749196dfbfd8" + }, + "CVE-2019-19067": { + "cmt_msg": "drm/amdgpu: fix multiple memory leaks in acp_hw_init", + "cmt_id": "e15f8a9b0046418295d09db24c1ec306c80d013b" + }, + "CVE-2020-24490": { + "cmt_msg": "Bluetooth: fix kernel oops in store_pending_adv_report", + "cmt_id": "5df9e5613d1c51e16b1501a4c75e139fbbe0fb6c" + }, + "CVE-2019-19816": { + "cmt_msg": "btrfs: inode: Verify inode mode to avoid NULL pointer dereference", + "cmt_id": "4e986ab36ed11ecf21de9b5aab0e46ac3342df93" + }, + "CVE-2019-3874": { + "cmt_msg": "sctp: implement memory accounting on tx path", + "cmt_id": "9a84bb13816fe3b361a75e10ee9821ab68aa36f5" + }, + "CVE-2019-19082": { + "cmt_msg": "drm/amd/display: prevent memory leak", + "cmt_id": "60e1b411bf0fd9fda2d2de7f45dc3b1d9960b85e" + }, + "CVE-2019-18808": { + "cmt_msg": "crypto: ccp - Release all allocated memory if sha type is invalid", + "cmt_id": "167edeeb034f65f57790ff70b1af84a501274d15" + }, + "CVE-2019-19813": { + "cmt_msg": "btrfs: inode: Verify inode mode to avoid NULL pointer dereference", + "cmt_id": "4e986ab36ed11ecf21de9b5aab0e46ac3342df93" + }, + "CVE-2019-19054": { + "cmt_msg": "media: rc: prevent memory leak in cx23888_ir_probe", + "cmt_id": "17271f33fd8811b364ae3c54671566434d46d3eb" + }, + "CVE-2019-19074": { + "cmt_msg": "ath9k: release allocated buffer if timed out", + "cmt_id": "e0cf3ebfcf93dbce123b8bef00f549712efe1135" + }, + "CVE-2019-19073": { + "cmt_msg": "ath9k_htc: release allocated buffer if timed out", + "cmt_id": "5b8464dc9a6e81a16481549c77d0d341041e425e" + }, + "CVE-2019-19072": { + "cmt_msg": "tracing: Have error path in predicate_parse() free its allocated memory", + "cmt_id": "7deb2dcb8963812742ed08420cfa4e23bbeda074" + } + }, + "4.19.138": { + "CVE-2020-16166": { + "cmt_msg": "random32: update the net random state on interrupt and activity", + "cmt_id": "29204c846894d73108f87e78aea4757a8ec52c74" + } + }, + "4.19.139": { + "CVE-2019-0148": { + "cmt_msg": "i40e: Wrong truncation from u16 to u8", + "cmt_id": "48a9be93ff2c5a09e308ef93560ea1f4ecbd22f6" + }, + "CVE-2020-14331": { + "cmt_msg": "vgacon: Fix for missing check in scrollback handling", + "cmt_id": "61219546f3036d2b4a1898be7a38da22e97a3b62" + }, + "CVE-2019-0146": { + "cmt_msg": "i40e: add num_vectors checker in iwarp handler", + "cmt_id": "43a7e1cf606e96ee43f8897129972f0b79390367" + }, + "CVE-2019-0147": { + "cmt_msg": "i40e: add num_vectors checker in iwarp handler", + "cmt_id": "43a7e1cf606e96ee43f8897129972f0b79390367" + }, + "CVE-2019-0145": { + "cmt_msg": "i40e: add num_vectors checker in iwarp handler", + "cmt_id": "43a7e1cf606e96ee43f8897129972f0b79390367" + }, + "CVE-2020-36386": { + "cmt_msg": "Bluetooth: Fix slab-out-of-bounds read in hci_extended_inquiry_result_evt()", + "cmt_id": "8c4a649c20fec015ebb326f36b47d4e39d9ff5b7" + } + }, + "4.19.140": { + "CVE-2020-26088": { + "cmt_msg": "net/nfc/rawsock.c: add CAP_NET_RAW check.", + "cmt_id": "b200620cada4eaa63108be32e040ed557a1965fd" + }, + "CVE-2021-20292": { + "cmt_msg": "drm/ttm/nouveau: don't call tt destroy callback on alloc failure.", + "cmt_id": "10c8a526b2db1fcdf9e2d59d4885377b91939c55" + } + }, + "4.19.141": { + "CVE-2019-19448": { + "cmt_msg": "btrfs: only search for left_info if there is no right_info in try_merge_free_space", + "cmt_id": "627fa9d8071daad6aa84316c1fcb114a62db914f" + }, + "CVE-2020-25212": { + "cmt_msg": "nfs: Fix getxattr kernel panic and memory overflow", + "cmt_id": "a906b868953a9c9bba44649a8fe760e818dd7224" + } + }, + "4.19.142": { + "CVE-2020-14314": { + "cmt_msg": "ext4: fix potential negative array index in do_split()", + "cmt_id": "b3ddf6ba5e28a57729fff1605ae08e21be5c92e3" + }, + "CVE-2020-29371": { + "cmt_msg": "romfs: fix uninitialized memory leak in romfs_dev_read()", + "cmt_id": "9660983738399465fd0e3b1977a61bbd29b2e5be" + }, + "CVE-2020-0466": { + "cmt_msg": "do_epoll_ctl(): clean the failure exits up a bit", + "cmt_id": "dcb6e6efb3298e59d90ee05c6ed33de810314892" + } + }, + "4.19.143": { + "CVE-2020-36766": { + "cmt_msg": "cec-api: prevent leaking memory through hole in structure", + "cmt_id": "da489549711e61bd43f3fd6fe19bb538eb575b39" + } + }, + "4.19.144": { + "CVE-2020-0465": { + "cmt_msg": "HID: core: Sanitize event code and type when mapping input", + "cmt_id": "a47b8511d90528c77346597e2012100dfc28cd8c" + }, + "CVE-2020-25641": { + "cmt_msg": "block: allow for_each_bvec to support zero len bvec", + "cmt_id": "b48bcb664b657ae94b19c0728978c88e012f7a37" + }, + "CVE-2021-1048": { + "cmt_msg": "fix regression in \"epoll: Keep a reference on files added to the check list\"", + "cmt_id": "37d933e8b41b83bb8278815e366aec5a542b7e31" + }, + "CVE-2022-20565": { + "cmt_msg": "HID: core: Correctly handle ReportSize being zero", + "cmt_id": "abae259fdccc5e41ff302dd80a2b944ce385c970" + }, + "CVE-2020-25285": { + "cmt_msg": "mm/hugetlb: fix a race between hugetlb sysctl handlers", + "cmt_id": "221ea9a3da9169dc3c9a364a5f938e215db6419e" + }, + "CVE-2020-14385": { + "cmt_msg": "xfs: fix boundary test in xfs_attr_shortform_verify", + "cmt_id": "017265f1421529a473c25dc46a0cee98facbb1a3" + }, + "CVE-2020-12888": { + "cmt_msg": "vfio-pci: Invalidate mmaps and block MMIO access on disabled memory", + "cmt_id": "da7aea6eb5608695f590dcd72523536b709d0399" + } + }, + "4.19.146": { + "CVE-2020-25284": { + "cmt_msg": "rbd: require global CAP_SYS_ADMIN for mapping and unmapping", + "cmt_id": "0070f9906d7190d4c69e338403db4abfec81fe7f" + }, + "CVE-2020-14390": { + "cmt_msg": "fbcon: remove soft scrollback code", + "cmt_id": "770adb5d2b8ebe94a92e4c9510f4f2517f4204eb" + }, + "CVE-2020-28097": { + "cmt_msg": "vgacon: remove software scrollback support", + "cmt_id": "f5fa64c8daf7b97280865c73903edc0a3eea819e" + } + }, + "4.19.148": { + "CVE-2020-25645": { + "cmt_msg": "geneve: add transport ports in route lookup for geneve", + "cmt_id": "c797110d97c48054d1491251fd713900ff51615c" + }, + "CVE-2021-0605": { + "cmt_msg": "af_key: pfkey_dump needs parameter validation", + "cmt_id": "b59a23d596807a5aa88d8dd5655a66c6843729b3" + }, + "CVE-2020-25643": { + "cmt_msg": "hdlc_ppp: add range checks in ppp_cp_parse_cr()", + "cmt_id": "45676c0bc28eff8f46455b28e2db80a77676488b" + }, + "CVE-2020-36312": { + "cmt_msg": "KVM: fix memory leak in kvm_io_bus_unregister_dev()", + "cmt_id": "19184bd06f488af62924ff1747614a8cb284ad63" + } + }, + "4.19.150": { + "CVE-2020-14386": { + "cmt_msg": "net/packet: fix overflow in tpacket_rcv", + "cmt_id": "1c3886dc302329f199cc04f8a56ba44d17a0df16" + }, + "CVE-2020-25211": { + "cmt_msg": "netfilter: ctnetlink: add a range check for l3/l4 protonum", + "cmt_id": "289fe546ea16c2dcb57c5198c5a7b7387604530e" + }, + "CVE-2021-0448": { + "cmt_msg": "netfilter: ctnetlink: add a range check for l3/l4 protonum", + "cmt_id": "289fe546ea16c2dcb57c5198c5a7b7387604530e" + }, + "CVE-2021-39634": { + "cmt_msg": "epoll: do not insert into poll queues until all sanity checks are done", + "cmt_id": "3e3bbc4d23eeb90bf282e98c7dfeca7702df3169" + } + }, + "4.19.151": { + "CVE-2020-28915": { + "cmt_msg": "fbcon: Fix global-out-of-bounds read in fbcon_get_font()", + "cmt_id": "43198a5b1c42e3d8aadc6524a73bb3aa3666cd43" + } + }, + "4.19.152": { + "CVE-2020-10135": { + "cmt_msg": "Bluetooth: Consolidate encryption handling in hci_encrypt_cfm", + "cmt_id": "0c75831bc108ec23c663d969181a4dd7e4b651bb" + }, + "CVE-2020-12352": { + "cmt_msg": "Bluetooth: A2MP: Fix not initializing all members", + "cmt_id": "128278f444ab3a0d38759c4935092d256edc77d0" + }, + "CVE-2020-12351": { + "cmt_msg": "Bluetooth: L2CAP: Fix calling sk_filter on non-socket based channel", + "cmt_id": "360f80e34292dbe91c23e893f90cd357aff8b68a" + } + }, + "4.19.153": { + "CVE-2020-0423": { + "cmt_msg": "binder: fix UAF when releasing todo list", + "cmt_id": "35cc2facc2a5ff52b9aa03f2dc81dcb000d97da3" + }, + "CVE-2020-25705": { + "cmt_msg": "icmp: randomize the global rate limiter", + "cmt_id": "d6c552505c0d1719dda42b4af2def0618bd7bf54" + } + }, + "4.19.154": { + "CVE-2020-27784": { + "cmt_msg": "usb: gadget: function: printer: fix use-after-free in __lock_acquire", + "cmt_id": "cedb0187b8ba929c3f76f28e6bc25804d65f8a54" + } + }, + "4.19.155": { + "CVE-2020-27777": { + "cmt_msg": "powerpc/rtas: Restrict RTAS requests from userspace", + "cmt_id": "94e8f0bbc475228c93d28b2e0f7e37303db80ffe" + }, + "CVE-2020-27673": { + "cmt_msg": "xen/events: add a proper barrier to 2-level uevent unmasking", + "cmt_id": "25f6b08895d579b461487291d6e48b3953a8bf65" + }, + "CVE-2020-25668": { + "cmt_msg": "tty: make FONTX ioctl use the tty pointer they were actually passed", + "cmt_id": "619e366268e0430687d07b24b48f7382fc088c9f" + }, + "CVE-2020-25656": { + "cmt_msg": "vt: keyboard, extend func_buf_lock to readers", + "cmt_id": "7e3ba72e5b9376e12839ea347c49fc4108244b0c" + }, + "CVE-2020-27675": { + "cmt_msg": "xen/events: avoid removing an event channel while handling it", + "cmt_id": "61d359d51a1cce8a5913843c8c3601dc878cc519" + } + }, + "4.19.156": { + "CVE-2020-28974": { + "cmt_msg": "vt: Disable KD_FONT_OP_COPY", + "cmt_id": "6612b754ac0c85ca8b1181b5d3ea4461a8c1bbcb" + }, + "CVE-2020-35508": { + "cmt_msg": "fork: fix copy_process(CLONE_PARENT) race with the exiting ->real_parent", + "cmt_id": "b177d2d915cea2d0a590f0034a20299dd1ee3ef2" + }, + "CVE-2020-25704": { + "cmt_msg": "perf/core: Fix a memory leak in perf_event_parse_addr_filter()", + "cmt_id": "29a975bcc107d68e379a55048813ddf3e7b120b8" + }, + "CVE-2019-19377": { + "cmt_msg": "btrfs: Don't submit any btree write bio if the fs has errors", + "cmt_id": "1527c0e0229d2dd1c8ae1e73b1579bd8d5866b5b" + }, + "CVE-2019-19770": { + "cmt_msg": "blktrace: fix debugfs use after free", + "cmt_id": "8a78b4c0d6292d32d76b4268b5a33ae089a5d791" + }, + "CVE-2019-19039": { + "cmt_msg": "btrfs: Don't submit any btree write bio if the fs has errors", + "cmt_id": "1527c0e0229d2dd1c8ae1e73b1579bd8d5866b5b" + } + }, + "4.19.157": { + "CVE-2020-8694": { + "cmt_msg": "powercap: restrict energy meter to root access", + "cmt_id": "900281e167f45e0c0e5df6e59fa00334b5e38133" + } + }, + "4.19.158": { + "CVE-2020-14351": { + "cmt_msg": "perf/core: Fix race in the perf_mmap_close() function", + "cmt_id": "1cbfb60332f4e62224440f6d38a6b3114b2355f0" + } + }, + "4.19.159": { + "CVE-2020-4788": { + "cmt_msg": "powerpc/64s: flush L1D on kernel entry", + "cmt_id": "f69bb4e51f41973fb7594be1479fa689831efe1a" + }, + "CVE-2020-25669": { + "cmt_msg": "Input: sunkbd - avoid use-after-free in teardown paths", + "cmt_id": "8bf2e8fe8a8e2e05246215697bb55f8901faef44" + } + }, + "4.19.160": { + "CVE-2020-28941": { + "cmt_msg": "speakup: Do not let the line discipline be used several times", + "cmt_id": "3560603ef82f11277143a433170bca05bd9288a8" + } + }, + "4.19.162": { + "CVE-2020-35519": { + "cmt_msg": "net/x25: prevent a couple of overflows", + "cmt_id": "304c080fc33258e3b177b6f0736b97d54e6fea3b" + } + }, + "4.19.163": { + "CVE-2020-29661": { + "cmt_msg": "tty: Fix ->pgrp locking in tiocspgrp()", + "cmt_id": "13f10a78097df2f14d4e1fd390dbaa3e28502ca7" + }, + "CVE-2020-29660": { + "cmt_msg": "tty: Fix ->session locking", + "cmt_id": "361e822b7d8a9d06d88f7cea0fdb0fb6e41c4d45" + }, + "CVE-2020-27830": { + "cmt_msg": "speakup: Reject setting the speakup line discipline outside of speakup", + "cmt_id": "de867367f35237729e285ff6efa3fd4e4b0b9008" + } + }, + "4.19.164": { + "CVE-2020-36694": { + "cmt_msg": "netfilter: x_tables: Switch synchronization to RCU", + "cmt_id": "98ab3ff5e789985ec8c24f813c7a989b445da084" + }, + "CVE-2021-0938": { + "cmt_msg": "compiler.h: fix barrier_data() on clang", + "cmt_id": "b207caff4176e3a6ba273243da2db2e595e4aad2" + }, + "CVE-2020-27815": { + "cmt_msg": "jfs: Fix array index bounds check in dbAdjTree", + "cmt_id": "c7e31b2fecfe0ebd5bd6a8274b2fbfb9c9401738" + }, + "CVE-2020-29568": { + "cmt_msg": "xen/xenbus: Allow watches discard events before queueing", + "cmt_id": "9039eb22f99545fa80a5897496452cf9962e3289" + }, + "CVE-2020-29569": { + "cmt_msg": "xen-blkback: set ring->xenblkd to NULL after kthread_stop()", + "cmt_id": "014ee1c7d184acb8986152014a570ba7c69d3616" + } + }, + "4.19.166": { + "CVE-2020-36158": { + "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_cmd_802_11_ad_hoc_start", + "cmt_id": "b35029a1f24fe511af750537e6565dcf68e5c862" + } + }, + "4.19.167": { + "CVE-2020-28374": { + "cmt_msg": "scsi: target: Fix XCOPY NAA identifier lookup", + "cmt_id": "fff1180d24e68d697f98642d71444316036a81ff" + }, + "CVE-2021-39648": { + "cmt_msg": "usb: gadget: configfs: Fix use-after-free issue with udc_name", + "cmt_id": "83b74059fdf1c4fa6ed261725e6f301552ad23f7" + } + }, + "4.19.170": { + "CVE-2021-3178": { + "cmt_msg": "nfsd4: readdirplus shouldn't return parent of export", + "cmt_id": "a08c2e586ad047fcea3f75664cca0915c77934fe" + }, + "CVE-2023-1390": { + "cmt_msg": "tipc: fix NULL deref in tipc_link_xmit()", + "cmt_id": "4d1d3dddcb3f26000e66cd0a9b8b16f7c2eb41bb" + } + }, + "4.19.171": { + "CVE-2021-39657": { + "cmt_msg": "scsi: ufs: Correct the LUN used in eh_device_reset_handler() callback", + "cmt_id": "b397fcae2207963747c6f947ef4d06575553eaef" + } + }, + "4.19.172": { + "CVE-2020-27825": { + "cmt_msg": "tracing: Fix race in trace_open and buffer resize call", + "cmt_id": "acfa7ad7b7f6489e2bed20880ce090fdabdbb841" + }, + "CVE-2021-3347": { + "cmt_msg": "futex: Ensure the correct return value from futex_lock_pi()", + "cmt_id": "72f38fffa4758b878f819f8a47761b3f03443f36" + } + }, + "4.19.173": { + "CVE-2021-3348": { + "cmt_msg": "nbd: freeze the queue while we're adding connections", + "cmt_id": "424838c0f727f1d11ce2ccaabba96f4346c03906" + } + }, + "4.19.177": { + "CVE-2021-26931": { + "cmt_msg": "xen-blkback: don't \"handle\" error by BUG()", + "cmt_id": "a01b49a9bf91a723f541139c063c1ff681ac536a" + }, + "CVE-2021-26930": { + "cmt_msg": "xen-blkback: fix error handling in xen_blkbk_map()", + "cmt_id": "98f16e171e2849dba76e2e0346e914452c030dc5" + }, + "CVE-2021-21781": { + "cmt_msg": "ARM: ensure the signal page contains defined contents", + "cmt_id": "80ef523d2cb719c3de66787e922a96b5099d2fbb" + }, + "CVE-2021-26932": { + "cmt_msg": "Xen/x86: don't bail early from clear_foreign_p2m_mapping()", + "cmt_id": "dfed59ee4b41b0937163dfed36752d29e72d0712" + } + }, + "4.19.178": { + "CVE-2021-0512": { + "cmt_msg": "HID: make arrays usage and value to be the same", + "cmt_id": "ffca531f71d078c6caf752d64bc2a592f420f7c6" + }, + "CVE-2021-3612": { + "cmt_msg": "Input: joydev - prevent potential read overflow in ioctl", + "cmt_id": "88438fdeeffe11dcb05c2dd0ddd22cb6e3f024b4" + } + }, + "4.19.179": { + "CVE-2021-30002": { + "cmt_msg": "media: v4l: ioctl: Fix memory leak in video_usercopy", + "cmt_id": "ff2111a6fab31923685b6ca8ea466ea0576b8a0e" + }, + "CVE-2021-27365": { + "cmt_msg": "scsi: iscsi: Ensure sysfs attributes are limited to PAGE_SIZE", + "cmt_id": "b2957d7baff77b399c7408dc12bacc7f63765897" + }, + "CVE-2021-27364": { + "cmt_msg": "scsi: iscsi: Restrict sessions and handles to admin capabilities", + "cmt_id": "ae84b246a76c4ace5997e5ca7e9fde3e1a526bc3" + }, + "CVE-2021-27363": { + "cmt_msg": "scsi: iscsi: Restrict sessions and handles to admin capabilities", + "cmt_id": "ae84b246a76c4ace5997e5ca7e9fde3e1a526bc3" + }, + "CVE-2021-28038": { + "cmt_msg": "Xen/gnttab: handle p2m update errors on a per-slot basis", + "cmt_id": "1a999d25ef536a14f6a7c25778836857adfba3f8" + } + }, + "4.19.181": { + "CVE-2021-33033": { + "cmt_msg": "cipso,calipso: resolve a number of problems with the DOI refcounts", + "cmt_id": "a44af1c69737f9e64d5134c34eb9d5c4c2e04da1" + }, + "CVE-2021-29265": { + "cmt_msg": "usbip: fix stub_dev usbip_sockfd_store() races leading to gpf", + "cmt_id": "c6b0ca71d3cd561decd39c1c4132c2d10a496e1a" + }, + "CVE-2021-28660": { + "cmt_msg": "staging: rtl8188eu: prevent ->ssid overflow in rtw_wx_set_scan()", + "cmt_id": "eda4378094de16090d74eacea3d8c10f7719ed25" + } + }, + "4.19.183": { + "CVE-2021-28964": { + "cmt_msg": "btrfs: fix race when cloning extent buffer during rewind of an old root", + "cmt_id": "12dc6889bcff1bc2921a1587afca55ca4091b73e" + }, + "CVE-2021-28972": { + "cmt_msg": "PCI: rpadlpar: Fix potential drc_name corruption in store functions", + "cmt_id": "f27a00f0d5b0646a52633e98f5fc3ef719004dcd" + }, + "CVE-2021-28971": { + "cmt_msg": "perf/x86/intel: Fix a crash caused by zero PEBS status", + "cmt_id": "b35214c541365c7dd7c9d5f44a02b0633a1cc83f" + } + }, + "4.19.184": { + "CVE-2021-28688": { + "cmt_msg": "xen-blkback: don't leak persistent grants from xen_blkbk_map()", + "cmt_id": "16356ddb587867c2a5ab85407eeb75f2b8818207" + }, + "CVE-2021-31916": { + "cmt_msg": "dm ioctl: fix out of bounds array access when no devices", + "cmt_id": "76aa61c55279fdaa8d428236ba8834edf313b372" + }, + "CVE-2021-29264": { + "cmt_msg": "gianfar: fix jumbo packets+napi+rx overrun crash", + "cmt_id": "9943741c2792a7f1d091aad38f496ed6eb7681c4" + }, + "CVE-2021-29647": { + "cmt_msg": "net: qrtr: fix a kernel-infoleak in qrtr_recvmsg()", + "cmt_id": "5f09be2a1a35cb8bd6c178d5f205b7265bd68646" + }, + "CVE-2021-29650": { + "cmt_msg": "netfilter: x_tables: Use correct memory barriers.", + "cmt_id": "81bc258370c6eeb1f41d350325e8a2c8e20fafad" + } + }, + "4.19.185": { + "CVE-2021-0941": { + "cmt_msg": "bpf: Remove MTU check in __bpf_skb_max_len", + "cmt_id": "8c1a77ae15ce70a72f26f4bb83c50f769011220c" + }, + "CVE-2021-3483": { + "cmt_msg": "firewire: nosy: Fix a use-after-free bug in nosy_ioctl()", + "cmt_id": "89a2c28a3b67c7d918218f57e4bb7b591f7e5d0f" + } + }, + "4.19.186": { + "CVE-2021-29154": { + "cmt_msg": "bpf, x86: Validate computation of branch displacements for x86-64", + "cmt_id": "5f26f1f838aa960045c712e13dbab8ff451fed74" + } + }, + "4.19.187": { + "CVE-2021-3659": { + "cmt_msg": "net: mac802154: Fix general protection fault", + "cmt_id": "c166c0f5311dc9de687b8985574a5ee5166d367e" + }, + "CVE-2021-46904": { + "cmt_msg": "net: hso: fix null-ptr-deref during tty device unregistration", + "cmt_id": "92028d7a31e55d53e41cff679156b9432cffcb36" + }, + "CVE-2020-25672": { + "cmt_msg": "nfc: fix memory leak in llcp_sock_connect()", + "cmt_id": "301a4264d6ab56d2b9230066b060d7ceaa000d68" + }, + "CVE-2020-25673": { + "cmt_msg": "nfc: Avoid endless loops caused by repeated llcp_sock_connect()", + "cmt_id": "eab391e0766ed88262160b14bb7131f331f6af1a" + }, + "CVE-2020-25670": { + "cmt_msg": "nfc: fix refcount leak in llcp_sock_bind()", + "cmt_id": "adbb1d218c5f56dbae052765da83c0f57fce2a31" + }, + "CVE-2020-25671": { + "cmt_msg": "nfc: fix refcount leak in llcp_sock_connect()", + "cmt_id": "c14b50185cd0d5ba6d7a5eb8acf9fbcc3663416d" + } + }, + "4.19.188": { + "CVE-2021-0937": { + "cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write", + "cmt_id": "12ec80252edefff00809d473a47e5f89c7485499" + }, + "CVE-2021-22555": { + "cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write", + "cmt_id": "12ec80252edefff00809d473a47e5f89c7485499" + } + }, + "4.19.189": { + "CVE-2021-46915": { + "cmt_msg": "netfilter: nft_limit: avoid possible divide error in nft_limit_init", + "cmt_id": "fadd3c4afdf3d4c21f4d138502f8b76334987e26" + }, + "CVE-2021-46921": { + "cmt_msg": "locking/qrwlock: Fix ordering in queued_write_lock_slowpath()", + "cmt_id": "5902f9453a313be8fe78cbd7e7ca9dba9319fc6e" + }, + "CVE-2020-29374": { + "cmt_msg": "gup: document and work around \"COW can break either way\" issue", + "cmt_id": "5e24029791e809d641e9ea46a1f99806484e53fc" + }, + "CVE-2021-23133": { + "cmt_msg": "net/sctp: fix race condition in sctp_destroy_sock", + "cmt_id": "301084de76eb5bfedddda41ec33e2913e90c99e7" + }, + "CVE-2021-46909": { + "cmt_msg": "ARM: footbridge: fix PCI interrupt mapping", + "cmt_id": "2643da6aa57920d9159a1a579fb04f89a2b0d29a" + } + }, + "4.19.191": { + "CVE-2020-36777": { + "cmt_msg": "media: dvbdev: Fix memory leak in dvb_media_device_free()", + "cmt_id": "cd89f79be5d553c78202f686e8e4caa5fbe94e98" + }, + "CVE-2021-46992": { + "cmt_msg": "netfilter: nftables: avoid overflows in nft_hash_buckets()", + "cmt_id": "efcd730ddd6f25578bd31bfe703e593e2421d708" + }, + "CVE-2021-33034": { + "cmt_msg": "Bluetooth: verify AMP hci_chan before amp_destroy", + "cmt_id": "75e26178e26f910f7f26c79c2824b726eecf0dfb" + }, + "CVE-2021-46960": { + "cmt_msg": "cifs: Return correct error code from smb2_get_enc_key", + "cmt_id": "e486f8397f3f14a7cadc166138141fdb14379a54" + }, + "CVE-2021-47020": { + "cmt_msg": "soundwire: stream: fix memory leak in stream config error path", + "cmt_id": "342260fe821047c3d515e3d28085d73fbdce3e80" + }, + "CVE-2021-46989": { + "cmt_msg": "hfsplus: prevent corruption in shrinking truncate", + "cmt_id": "52dde855663e5db824af51db39b5757d2ef3e28a" + }, + "CVE-2021-4157": { + "cmt_msg": "pNFS/flexfiles: fix incorrect size check in decode_nfs_fh()", + "cmt_id": "f27638a92f77d8107efbaf48a0d3bfa24da8cdad" + }, + "CVE-2021-32399": { + "cmt_msg": "bluetooth: eliminate the potential race condition when removing the HCI controller", + "cmt_id": "35113c4c9fa7c970ff456982e381dc9e9594154a" + }, + "CVE-2021-3506": { + "cmt_msg": "f2fs: fix to avoid out-of-bounds memory access", + "cmt_id": "bfa08a47cea2a9fab077c7135b9cfdf04e69c67a" + }, + "CVE-2021-47006": { + "cmt_msg": "ARM: 9064/1: hw_breakpoint: Do not directly check the event's overflow_handler hook", + "cmt_id": "a9938d6d78a238d6ab8de57a4d3dcf77adceb9bb" + }, + "CVE-2021-47056": { + "cmt_msg": "crypto: qat - ADF_STATUS_PF_RUNNING should be set after adf_dev_init", + "cmt_id": "09d16cee6285d37cc76311c29add6d97a7e4acda" + }, + "CVE-2021-47054": { + "cmt_msg": "bus: qcom: Put child node before return", + "cmt_id": "a399dd80e697a02cfb23e2fc09b87849994043d9" + }, + "CVE-2021-46991": { + "cmt_msg": "i40e: Fix use-after-free in i40e_client_subtask()", + "cmt_id": "c1322eaeb8af0d8985b5cc5fa759140fa0e57b84" + }, + "CVE-2021-47010": { + "cmt_msg": "net: Only allow init netns to set default tcp cong to a restricted algo", + "cmt_id": "992de06308d9a9584d59b96d294ac676f924e437" + }, + "CVE-2021-47034": { + "cmt_msg": "powerpc/64s: Fix pte update for kernel memory on radix", + "cmt_id": "b3d5d0983388d6c4fb35f7d722556d5595f167a7" + }, + "CVE-2021-46998": { + "cmt_msg": "ethernet:enic: Fix a use after free bug in enic_hard_start_xmit", + "cmt_id": "25a87b1f566b5eb2af2857a928f0e2310d900976" + }, + "CVE-2021-46988": { + "cmt_msg": "userfaultfd: release page in error path to avoid BUG_ON", + "cmt_id": "07c9b834c97d0fa3402fb7f3f3b32df370a6ff1f" + }, + "CVE-2021-46950": { + "cmt_msg": "md/raid1: properly indicate failure when ending a failed write request", + "cmt_id": "a6e17cab00fc5bf85472434c52ac751426257c6f" + }, + "CVE-2021-46953": { + "cmt_msg": "ACPI: GTDT: Don't corrupt interrupt mappings on watchdow probe failure", + "cmt_id": "7b2162db1498c71962a4bb2f776fa4e76d4d305b" + }, + "CVE-2021-46955": { + "cmt_msg": "openvswitch: fix stack OOB read while fragmenting IPv4 packets", + "cmt_id": "df9e900de24637be41879e2c50afb713ec4e8b2e" + }, + "CVE-2021-46939": { + "cmt_msg": "tracing: Restructure trace_clock_global() to never block", + "cmt_id": "d43d56dbf452ccecc1ec735cd4b6840118005d7c" + }, + "CVE-2021-46938": { + "cmt_msg": "dm rq: fix double free of blk_mq_tag_set in dev remove after table load fails", + "cmt_id": "772b9f59657665af3b68d24d12b9d172d31f0dfb" + }, + "CVE-2021-47013": { + "cmt_msg": "net:emac/emac-mac: Fix a use after free in emac_mac_tx_buf_send", + "cmt_id": "16d8c44be52e3650917736d45f5904384a9da834" + } + }, + "4.19.192": { + "CVE-2021-47073": { + "cmt_msg": "platform/x86: dell-smbios-wmi: Fix oops on rmmod dell_smbios", + "cmt_id": "75cfc833da4a2111106d4c134e93e0c7f41e35e7" + }, + "CVE-2021-47078": { + "cmt_msg": "RDMA/rxe: Clear all QP fields if creation failed", + "cmt_id": "f3783c415bf6d2ead3d7aa2c38802bbe10723646" + }, + "CVE-2020-26558": { + "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical", + "cmt_id": "30126d4ba73119565f1748b116b9869ac6bbda6b" + }, + "CVE-2021-0129": { + "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical", + "cmt_id": "30126d4ba73119565f1748b116b9869ac6bbda6b" + }, + "CVE-2020-26555": { + "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical", + "cmt_id": "30126d4ba73119565f1748b116b9869ac6bbda6b" + } + }, + "4.19.193": { + "CVE-2021-47166": { + "cmt_msg": "NFS: Don't corrupt the value of pg_bytes_written in nfs_do_recoalesce()", + "cmt_id": "40f139a6d50c232c0d1fd1c5e65a845c62db0ede" + }, + "CVE-2021-47165": { + "cmt_msg": "drm/meson: fix shutdown crash when component not probed", + "cmt_id": "e256a0eb43e17209e347409a80805b1659398d68" + }, + "CVE-2021-47149": { + "cmt_msg": "net: fujitsu: fix potential null-ptr-deref", + "cmt_id": "7883d3895d0fbb0ba9bff0f8665f99974b45210f" + }, + "CVE-2021-47162": { + "cmt_msg": "tipc: skb_linearize the head skb when reassembling msgs", + "cmt_id": "4b1761898861117c97066aea6c58f68a7787f0bf" + }, + "CVE-2021-47160": { + "cmt_msg": "net: dsa: mt7530: fix VLAN traffic leaks", + "cmt_id": "ae389812733b1b1e8e07fcc238e41db166b5c78d" + }, + "CVE-2021-47145": { + "cmt_msg": "btrfs: do not BUG_ON in link_to_fixup_dir", + "cmt_id": "6eccfb28f8dca70c9b1b3bb3194ca54cbe73a9fa" + }, + "CVE-2021-47144": { + "cmt_msg": "drm/amd/amdgpu: fix refcount leak", + "cmt_id": "599e5d61ace952b0bb9bd942b198bbd0cfded1d7" + }, + "CVE-2021-47146": { + "cmt_msg": "mld: fix panic in mld_newpack()", + "cmt_id": "4b77ad9097067b31237eeeee0bf70f80849680a0" + }, + "CVE-2021-47169": { + "cmt_msg": "serial: rp2: use 'request_firmware' instead of 'request_firmware_nowait'", + "cmt_id": "35265552c7fe9553c75e324c80f45e28ff14eb6e" + }, + "CVE-2021-47168": { + "cmt_msg": "NFS: fix an incorrect limit in filelayout_decode_layout()", + "cmt_id": "945ebef997227ca8c20bad7f8a8358c8ee57a84a" + }, + "CVE-2021-33098": { + "cmt_msg": "ixgbe: fix large MTU request from VF", + "cmt_id": "938ffd6d2dd78fb83b9346c9b689e2a3a6fe7174" + }, + "CVE-2020-24587": { + "cmt_msg": "mac80211: prevent mixed key and fragment cache attacks", + "cmt_id": "76ffc27967211afba6f0045ac840e7027fbeefcf" + }, + "CVE-2020-24586": { + "cmt_msg": "mac80211: prevent mixed key and fragment cache attacks", + "cmt_id": "76ffc27967211afba6f0045ac840e7027fbeefcf" + }, + "CVE-2020-24588": { + "cmt_msg": "cfg80211: mitigate A-MSDU aggregation attacks", + "cmt_id": "8ea9e997642360ea097710cfa7b1cd750a73fe64" + }, + "CVE-2020-26147": { + "cmt_msg": "mac80211: assure all fragments are encrypted", + "cmt_id": "3c919823e4cad7bdc2c92b0dd3b4dc463c9315bd" + }, + "CVE-2021-47142": { + "cmt_msg": "drm/amdgpu: Fix a use-after-free", + "cmt_id": "a849e218556f932576c0fb1c5a88714b61709a17" + }, + "CVE-2021-47179": { + "cmt_msg": "NFSv4: Fix a NULL pointer dereference in pnfs_mark_matching_lsegs_return()", + "cmt_id": "39785761feadf261bc5101372b0b0bbaf6a94494" + }, + "CVE-2021-47159": { + "cmt_msg": "net: dsa: fix a crash if ->get_sset_count() fails", + "cmt_id": "0f2cb08c57edefb0e7b5045e0e3e9980a3d3aa37" + }, + "CVE-2021-47170": { + "cmt_msg": "USB: usbfs: Don't WARN about excessively large memory allocations", + "cmt_id": "2ab21d6e1411999b5fb43434f421f00bf50002eb" + }, + "CVE-2021-47171": { + "cmt_msg": "net: usb: fix memory leak in smsc75xx_bind", + "cmt_id": "9e6a3eccb28779710cbbafc4f4258d92509c6d07" + }, + "CVE-2021-47173": { + "cmt_msg": "misc/uss720: fix memory leak in uss720_probe", + "cmt_id": "386918878ce4cd676e4607233866e03c9399a46a" + }, + "CVE-2021-47153": { + "cmt_msg": "i2c: i801: Don't generate an interrupt on bus reset", + "cmt_id": "c70e1ba2e7e65255a0ce004f531dd90dada97a8c" + }, + "CVE-2021-47150": { + "cmt_msg": "net: fec: fix the potential memory leak in fec_enet_init()", + "cmt_id": "15102886bc8f5f29daaadf2d925591d564c17e9f" + }, + "CVE-2021-47177": { + "cmt_msg": "iommu/vt-d: Fix sysfs leak in alloc_iommu()", + "cmt_id": "2ec5e9bb6b0560c90d315559c28a99723c80b996" + }, + "CVE-2021-34981": { + "cmt_msg": "Bluetooth: cmtp: fix file refcount when cmtp_attach_device fails", + "cmt_id": "f8be26b9950710fe50fb45358df5bd01ad18efb7" + }, + "CVE-2020-26139": { + "cmt_msg": "mac80211: do not accept/forward invalid EAPOL frames", + "cmt_id": "24347f561816634ab780bf7e03deeb049898b3bc" + }, + "CVE-2021-47180": { + "cmt_msg": "NFC: nci: fix memory leak in nci_allocate_device", + "cmt_id": "0365701bc44e078682ee1224866a71897495c7ef" + } + }, + "4.19.194": { + "CVE-2021-3573": { + "cmt_msg": "Bluetooth: use correct lock to prevent UAF of hdev object", + "cmt_id": "2b9e9c2ed0f1910b5201c5d37b355b60201df415" + }, + "CVE-2021-47122": { + "cmt_msg": "net: caif: fix memory leak in caif_device_notify", + "cmt_id": "3be863c11cab725add9fef4237ed4e232c3fc3bb" + }, + "CVE-2021-47121": { + "cmt_msg": "net: caif: fix memory leak in cfusbl_device_notify", + "cmt_id": "9ea0ab48e755d8f29fe89eb235fb86176fdb597f" + }, + "CVE-2021-3564": { + "cmt_msg": "Bluetooth: fix the erroneous flush_work() order", + "cmt_id": "64700748e8a7af4883538c72ada57999d9a78e92" + }, + "CVE-2021-47117": { + "cmt_msg": "ext4: fix bug on in ext4_es_cache_extent as ext4_split_extent_at failed", + "cmt_id": "569496aa3776eea1ff0d49d0174ac1b7e861e107" + }, + "CVE-2021-47114": { + "cmt_msg": "ocfs2: fix data corruption by fallocate", + "cmt_id": "cec4e857ffaa8c447f51cd8ab4e72350077b6770" + }, + "CVE-2021-47118": { + "cmt_msg": "pid: take a reference when initializing `cad_pid`", + "cmt_id": "d106f05432e60f9f62d456ef017687f5c73cb414" + }, + "CVE-2021-38208": { + "cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect", + "cmt_id": "93e4ac2a9979a9a4ecc158409ed9c3044dc0ae1f" + }, + "CVE-2021-3587": { + "cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect", + "cmt_id": "93e4ac2a9979a9a4ecc158409ed9c3044dc0ae1f" + } + }, + "4.19.196": { + "CVE-2021-34693": { + "cmt_msg": "can: bcm: fix infoleak in struct bcm_msg_head", + "cmt_id": "8899857d7e450805e6410de5004126491f197146" + }, + "CVE-2021-46906": { + "cmt_msg": "HID: usbhid: fix info leak in hid_submit_ctrl", + "cmt_id": "0e280502be1b003c3483ae03fc60dea554fcfa82" + }, + "CVE-2021-45486": { + "cmt_msg": "inet: use bigger hash table for IP ID generation", + "cmt_id": "7f7e23df8509e072593200400a4b094cc44376d2" + }, + "CVE-2021-35039": { + "cmt_msg": "module: limit enabling module.sig_enforce", + "cmt_id": "ff660863628fb144badcb3395cde7821c82c13a6" + }, + "CVE-2021-3743": { + "cmt_msg": "net: qrtr: fix OOB Read in qrtr_endpoint_post", + "cmt_id": "f8111c0d7ed42ede41a3d0d393b104de0730a8a6" + } + }, + "4.19.197": { + "CVE-2020-36311": { + "cmt_msg": "KVM: SVM: Periodically schedule when unregistering regions on destroy", + "cmt_id": "cadf5bbcefbd9717e51c61d6128b520583ffdf4f" + } + }, + "4.19.198": { + "CVE-2021-45485": { + "cmt_msg": "ipv6: use prandom_u32() for ID generation", + "cmt_id": "f0be58ec9931907e980cf21737e51d369808eb95" + }, + "CVE-2023-28772": { + "cmt_msg": "seq_buf: Fix overflow in seq_buf_putmem_hex()", + "cmt_id": "1f4c6061fccee64b2072b28dfa3e93cf859c4c0a" + }, + "CVE-2021-3655": { + "cmt_msg": "sctp: validate from_addr_param return", + "cmt_id": "c7a03ebace4f9cd40d9cd9dd5fb2af558025583c" + }, + "CVE-2021-38199": { + "cmt_msg": "NFSv4: Initialise connection to the server in nfs4_alloc_client()", + "cmt_id": "743f6b973c8ba8a0a5ed15ab11e1d07fa00d5368" + }, + "CVE-2021-3609": { + "cmt_msg": "can: bcm: delay release of struct bcm_op after synchronize_rcu()", + "cmt_id": "eabe65197876e4a0906eab784f5766c4c76098c7" + }, + "CVE-2022-0850": { + "cmt_msg": "ext4: fix kernel infoleak via ext4_extent_header", + "cmt_id": "9ed3a3d3a8d2cbe99d9e4386a98856491f0eade0" + }, + "CVE-2021-33909": { + "cmt_msg": "seq_file: disallow extremely large seq buffer allocations", + "cmt_id": "6de9f0bf7cacc772a618699f9ed5c9f6fca58a1d" + }, + "CVE-2021-38160": { + "cmt_msg": "virtio_console: Assure used length from device is limited", + "cmt_id": "b5fba782ccd3d12a14f884cd20f255fc9c0eec0c" + } + }, + "4.19.199": { + "CVE-2021-38204": { + "cmt_msg": "usb: max-3421: Prevent corruption of freed memory", + "cmt_id": "51fc12f4d37622fa0c481604833f98f11b1cac4f" + }, + "CVE-2021-3679": { + "cmt_msg": "tracing: Fix bug in rb_per_cpu_empty() that might cause deadloop.", + "cmt_id": "6a99bfee7f5625d2577a5c3b09a2bd2a845feb8a" + }, + "CVE-2021-37576": { + "cmt_msg": "KVM: PPC: Book3S: Fix H_RTAS rets buffer overflow", + "cmt_id": "0493b10c06021796ba80cbe53c961defd5aca6e5" + }, + "CVE-2021-47161": { + "cmt_msg": "spi: spi-fsl-dspi: Fix a resource leak in an error handling path", + "cmt_id": "00450ed03a17143e2433b461a656ef9cd17c2f1d" + }, + "CVE-2021-22543": { + "cmt_msg": "KVM: do not allow mapping valid but non-reference-counted pages", + "cmt_id": "117777467bc015f0dc5fc079eeba0fa80c965149" + } + }, + "4.19.200": { + "CVE-2021-0920": { + "cmt_msg": "af_unix: fix garbage collect vs MSG_PEEK", + "cmt_id": "1dabafa9f61118b1377fde424d9a94bf8dbf2813" + } + }, + "4.19.204": { + "CVE-2021-38198": { + "cmt_msg": "KVM: X86: MMU: Use the correct inherited permissions to get shadow page", + "cmt_id": "4c07e70141eebd3db64297515a427deea4822957" + }, + "CVE-2021-38205": { + "cmt_msg": "net: xilinx_emaclite: Do not print real IOMEM pointer", + "cmt_id": "9322401477a6d1f9de8f18e5d6eb43a68e0b113a" + }, + "CVE-2021-3732": { + "cmt_msg": "ovl: prevent private clone if bind mount is not allowed", + "cmt_id": "963d85d630dabe75a3cfde44a006fec3304d07b8" + }, + "CVE-2021-33624": { + "cmt_msg": "bpf: Inherit expanded/patched seen count from old aux data", + "cmt_id": "0abc8c9754c953f5cd0ac7488c668ca8d53ffc90" + } + }, + "4.19.205": { + "CVE-2021-42008": { + "cmt_msg": "net: 6pack: fix slab-out-of-bounds in decode_data", + "cmt_id": "4e370cc081a78ee23528311ca58fd98a06768ec7" + }, + "CVE-2021-3653": { + "cmt_msg": "KVM: nSVM: avoid picking up unsupported bits from L2 in int_ctl (CVE-2021-3653)", + "cmt_id": "42f4312c0e8a225b5f1e3ed029509ef514f2157a" + }, + "CVE-2021-3656": { + "cmt_msg": "KVM: nSVM: always intercept VMLOAD/VMSAVE when nested (CVE-2021-3656)", + "cmt_id": "119d547cbf7c055ba8100309ad71910478092f24" + }, + "CVE-2020-3702": { + "cmt_msg": "ath: Use safer key clearing with key cache entries", + "cmt_id": "dd5815f023b89c9a28325d8a2a5f0779b57b7190" + } + }, + "4.19.206": { + "CVE-2021-3444": { + "cmt_msg": "bpf: Fix truncation handling for mod32 dst reg wrt zero", + "cmt_id": "39f74b7c81cca139c05757d9c8f9d1e35fbbf56b" + }, + "CVE-2021-3600": { + "cmt_msg": "bpf: Fix 32 bit src register truncation on div/mod", + "cmt_id": "8313432df224d926590731ec3ace3e1bd7bc4a1a" + }, + "CVE-2021-3753": { + "cmt_msg": "vt_kdsetmode: extend console locking", + "cmt_id": "0776c1a20babb4ad0b7ce7f2f4e0806a97663187" + }, + "CVE-2021-39633": { + "cmt_msg": "ip_gre: add validation for csum_start", + "cmt_id": "c33471daf2763c5aee2b7926202c74b75c365119" + } + }, + "4.19.207": { + "CVE-2022-20141": { + "cmt_msg": "igmp: Add ip_mc_list lock in ip_check_mc_rcu", + "cmt_id": "4768973dffed4d0126854514335ed4fe87bec1ab" + }, + "CVE-2021-34556": { + "cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4", + "cmt_id": "91cdb5b36234e6af69d6280f1510e4453707a2b8" + }, + "CVE-2020-16119": { + "cmt_msg": "dccp: don't duplicate ccid when cloning dccp sock", + "cmt_id": "dfec82f3e5b8bd93ab65b7417a64886ec8c42f14" + }, + "CVE-2021-35477": { + "cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4", + "cmt_id": "91cdb5b36234e6af69d6280f1510e4453707a2b8" + }, + "CVE-2021-42252": { + "cmt_msg": "soc: aspeed: lpc-ctrl: Fix boundary check for mmap", + "cmt_id": "9c8891b638319ddba9cfa330247922cd960c95b0" + }, + "CVE-2021-40490": { + "cmt_msg": "ext4: fix race writing to an inline_data file while its xattrs are changing", + "cmt_id": "c481607ba522e31e6ed01efefc19cc1d0e0a46fa" + } + }, + "4.19.208": { + "CVE-2021-20320": { + "cmt_msg": "s390/bpf: Fix optimizing out zero-extensions", + "cmt_id": "ddf58efd05b5d16d86ea4638675e8bd397320930" + } + }, + "4.19.209": { + "CVE-2021-3764": { + "cmt_msg": "crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd()", + "cmt_id": "710be7c42d2f724869e5b18b21998ceddaffc4a9" + }, + "CVE-2021-4203": { + "cmt_msg": "af_unix: fix races in sk_peer_pid and sk_peer_cred accesses", + "cmt_id": "0512a9aede6e4417c4fa6e0042a7ca8bc7e06b86" + }, + "CVE-2021-3744": { + "cmt_msg": "crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd()", + "cmt_id": "710be7c42d2f724869e5b18b21998ceddaffc4a9" + }, + "CVE-2021-37159": { + "cmt_msg": "usb: hso: fix error handling code of hso_create_net_device", + "cmt_id": "f6cf22a1ef49f8e131f99c3f5fd80ab6b23a2d21" + } + }, + "4.19.210": { + "CVE-2021-20317": { + "cmt_msg": "lib/timerqueue: Rely on rbtree semantics for next timer", + "cmt_id": "b9a1ac8e7c03fd09992352c7fb1a61cbbb9ad52b" + } + }, + "4.19.211": { + "CVE-2021-20321": { + "cmt_msg": "ovl: fix missing negative dentry check in ovl_rename()", + "cmt_id": "9d4969d8b5073d02059bae3f1b8d9a20cf023c55" + }, + "CVE-2021-41864": { + "cmt_msg": "bpf: Fix integer overflow in prealloc_elems_and_freelist()", + "cmt_id": "078cdd572408176a3900a6eb5a403db0da22f8e0" + }, + "CVE-2021-38300": { + "cmt_msg": "bpf, mips: Validate conditional branch offsets", + "cmt_id": "79f3a086dfc34887f9bbb0801768608b9470e942" + } + }, + "4.19.213": { + "CVE-2021-3894": { + "cmt_msg": "sctp: account stream padding length for reconf chunk", + "cmt_id": "c57fdeff69b152185fafabd37e6bfecfce51efda" + }, + "CVE-2022-0322": { + "cmt_msg": "sctp: account stream padding length for reconf chunk", + "cmt_id": "c57fdeff69b152185fafabd37e6bfecfce51efda" + } + }, + "4.19.214": { + "CVE-2021-3896": { + "cmt_msg": "isdn: cpai: check ctr->cnr to avoid array index out of bound", + "cmt_id": "7d91adc0ccb060ce564103315189466eb822cc6a" + }, + "CVE-2022-0644": { + "cmt_msg": "vfs: check fd has read access in kernel_read_file_from_fd()", + "cmt_id": "c1ba20965b59c2eeb54a845ca5cab4fc7bcf9735" + }, + "CVE-2021-3760": { + "cmt_msg": "nfc: nci: fix the UAF of rf_conn_info object", + "cmt_id": "1ac0d736c8ae9b59ab44e4e80ad73c8fba5c6132" + }, + "CVE-2021-43389": { + "cmt_msg": "isdn: cpai: check ctr->cnr to avoid array index out of bound", + "cmt_id": "7d91adc0ccb060ce564103315189466eb822cc6a" + } + }, + "4.19.215": { + "CVE-2021-20322": { + "cmt_msg": "ipv6: make exception cache less predictible", + "cmt_id": "c6d0d68d6da68159948cad3d808d61bb291a0283" + }, + "CVE-2021-3772": { + "cmt_msg": "sctp: use init_tag from inithdr for ABORT chunk", + "cmt_id": "1f52dfacca7bb315d89f5ece5660b0337809798e" + } + }, + "4.19.216": { + "CVE-2021-42739": { + "cmt_msg": "media: firewire: firedtv-avc: fix a buffer overflow in avc_ca_pmt()", + "cmt_id": "53ec9dab4eb0a8140fc85760fb50effb526fe219" + } + }, + "4.19.218": { + "CVE-2021-4202": { + "cmt_msg": "NFC: reorganize the functions in nci_request", + "cmt_id": "62be2b1e7914b7340281f09412a7bbb62e6c8b67" + }, + "CVE-2021-39686": { + "cmt_msg": "binder: use euid from cred instead of using task", + "cmt_id": "5d40061285b81a7e213dc9b37acc4a0545eedf32" + }, + "CVE-2023-0047": { + "cmt_msg": "mm, oom: do not trigger out_of_memory from the #PF", + "cmt_id": "d508b70eaa8d6d994c289b757c0ca0355d4dbe29" + }, + "CVE-2021-3640": { + "cmt_msg": "Bluetooth: sco: Fix lock_sock() blockage by memcpy_from_msg()", + "cmt_id": "c1c913f797f3d2441310182ad75b7bd855a327ff" + }, + "CVE-2021-45868": { + "cmt_msg": "quota: check block number when reading the block in quota file", + "cmt_id": "e5222c87dc441dcc8a66e93cb3fd34dfff03d3ec" + }, + "CVE-2021-3752": { + "cmt_msg": "Bluetooth: fix use-after-free error in lock_sock_nested()", + "cmt_id": "72bb30165337b7bce77578ad151fbfab6c8e693c" + } + }, + "4.19.219": { + "CVE-2021-4002": { + "cmt_msg": "hugetlbfs: flush TLBs correctly after huge_pmd_unshare", + "cmt_id": "b0313bc7f5fbb6beee327af39d818ffdc921821a" + } + }, + "4.19.220": { + "CVE-2021-43975": { + "cmt_msg": "atlantic: Fix OOB read and write in hw_atl_utils_fw_rpc_wait", + "cmt_id": "0275fcd9b54f0364f66f2f3f6a0f3748648f3d35" + }, + "CVE-2021-4083": { + "cmt_msg": "fget: check that the fd still exists after getting a ref to it", + "cmt_id": "8bf31f9d9395b71af3ed33166a057cd3ec0c59da" + } + }, + "4.19.221": { + "CVE-2021-39713": { + "cmt_msg": "net: sched: use Qdisc rcu API instead of relying on rtnl lock", + "cmt_id": "ae214e04b95ff64a4b0e9aab6742520bfde6ff0c" + }, + "CVE-2021-39698": { + "cmt_msg": "wait: add wake_up_pollfree()", + "cmt_id": "8dd7c46a59756bdc29cb9783338b899cd3fb4b83" + }, + "CVE-2022-20132": { + "cmt_msg": "HID: add hid_is_usb() function to make it simpler for USB detection", + "cmt_id": "b1efa723b986a84f84a95b6907cffe3a357338c9" + }, + "CVE-2021-39685": { + "cmt_msg": "USB: gadget: detect too-big endpoint 0 requests", + "cmt_id": "13e45e7a262dd96e8161823314679543048709b9" + } + }, + "4.19.222": { + "CVE-2021-28715": { + "cmt_msg": "xen/netback: don't queue unlimited number of packages", + "cmt_id": "c9f17e92917fd5786be872626a3928979ecc4c39" + }, + "CVE-2021-28714": { + "cmt_msg": "xen/netback: fix rx queue stall detection", + "cmt_id": "1de7644eac41981817fb66b74e0f82ca4477dc9d" + }, + "CVE-2021-28713": { + "cmt_msg": "xen/console: harden hvc_xen against event channel storms", + "cmt_id": "57e46acb3b48ea4e8efb1e1bea2e89e0c6cc43e2" + }, + "CVE-2021-28712": { + "cmt_msg": "xen/netfront: harden netfront against event channel storms", + "cmt_id": "3559ca594f15fcd23ed10c0056d40d71e5dab8e5" + }, + "CVE-2021-28711": { + "cmt_msg": "xen/blkfront: harden blkfront against event channel storms", + "cmt_id": "269d7124bcfad2558d2329d0fe603ca20b20d3f4" + }, + "CVE-2021-4135": { + "cmt_msg": "netdevsim: Zero-initialize memory for new map's value in function nsim_bpf_map_alloc", + "cmt_id": "d861443c4dc88650eed113310d933bd593d37b23" + } + }, + "4.19.223": { + "CVE-2021-45469": { + "cmt_msg": "f2fs: fix to do sanity check on last xattr entry in __f2fs_setxattr()", + "cmt_id": "f9dfa44be0fb5e8426183a70f69a246cf5827f49" + }, + "CVE-2022-1195": { + "cmt_msg": "hamradio: improve the incomplete fix to avoid NPD", + "cmt_id": "b68f41c6320b2b7fbb54a95f07a69f3dc7e56c59" + }, + "CVE-2021-47086": { + "cmt_msg": "phonet/pep: refuse to enable an unbound pipe", + "cmt_id": "982b6ba1ce626ef87e5c29f26f2401897554f235" + }, + "CVE-2021-47100": { + "cmt_msg": "ipmi: Fix UAF when uninstall ipmi_si and ipmi_msghandler module", + "cmt_id": "925229d552724e1bba1abf01d3a0b1318539b012" + } + }, + "4.19.224": { + "CVE-2021-44733": { + "cmt_msg": "tee: handle lookup of shm with reference count 0", + "cmt_id": "b4a661b4212b8fac8853ec3b68e4a909dccc88a1" + }, + "CVE-2021-46929": { + "cmt_msg": "sctp: use call_rcu to free endpoint", + "cmt_id": "af6e6e58f7ebf86b4e7201694b1e4f3a62cbc3ec" + }, + "CVE-2021-46935": { + "cmt_msg": "binder: fix async_free_space accounting for empty parcels", + "cmt_id": "7c7064402609aeb6fb11be1b4ec10673ff17b593" + }, + "CVE-2021-46934": { + "cmt_msg": "i2c: validate user data in compat ioctl", + "cmt_id": "407c8708fb1bf2d4afc5337ef50635cf540c364b" + }, + "CVE-2021-46933": { + "cmt_msg": "usb: gadget: f_fs: Clear ffs_eventfd in ffs_data_clear.", + "cmt_id": "33f6a0cbb7772146e1c11f38028fffbfed14728b" + }, + "CVE-2021-46932": { + "cmt_msg": "Input: appletouch - initialize work before device registration", + "cmt_id": "a02e1404e27855089d2b0a0acc4652c2ce65fe46" + }, + "CVE-2022-20154": { + "cmt_msg": "sctp: use call_rcu to free endpoint", + "cmt_id": "af6e6e58f7ebf86b4e7201694b1e4f3a62cbc3ec" + }, + "CVE-2021-46936": { + "cmt_msg": "net: fix use-after-free in tw_timer_handler", + "cmt_id": "a8e1944b44f94f5c5f530e434c5eaee787254566" + }, + "CVE-2021-46924": { + "cmt_msg": "NFC: st21nfca: Fix memory leak in device probe and remove", + "cmt_id": "a1e0080a35a16ce3808f7040fe0c3a8fdb052349" + } + }, + "4.19.225": { + "CVE-2021-45095": { + "cmt_msg": "phonet: refcount leak in pep_sock_accep", + "cmt_id": "4dece2760af408ad91d6e43afc485d20386c2885" + }, + "CVE-2021-4155": { + "cmt_msg": "xfs: map unwritten blocks in XFS_IOC_{ALLOC,FREE}SP just like fallocate", + "cmt_id": "1c3564fca0e7b8c9e96245a2cb35e198b036ee9a" + }, + "CVE-2021-3923": { + "cmt_msg": "RDMA/core: Don't infoleak GRH fields", + "cmt_id": "153843e270459b08529f80a0a0d8258d91597594" + } + }, + "4.19.226": { + "CVE-2020-36322": { + "cmt_msg": "fuse: fix bad inode", + "cmt_id": "1e1bb4933f1faafc68db8e0ecd5838a65dd1aae9" + }, + "CVE-2021-43976": { + "cmt_msg": "mwifiex: Fix skb_over_panic in mwifiex_usb_recv()", + "cmt_id": "2f4b037bf6e8c663a593b8149263c5b6940c7afd" + } + }, + "4.19.227": { + "CVE-2022-0330": { + "cmt_msg": "drm/i915: Flush TLBs before releasing backing store", + "cmt_id": "b188780649081782e341e52223db47c49f172712" + }, + "CVE-2022-22942": { + "cmt_msg": "drm/vmwgfx: Fix stale file descriptors on failed usercopy", + "cmt_id": "0008a0c78fc33a84e2212a7c04e6b21a36ca6f4d" + } + }, + "4.19.228": { + "CVE-2022-24448": { + "cmt_msg": "NFSv4: Handle case where the lookup of a directory fails", + "cmt_id": "b00b4c6faad0f21e443fb1584f7a8ea222beb0de" + }, + "CVE-2020-36516": { + "cmt_msg": "ipv4: avoid using shared IP generator for connected sockets", + "cmt_id": "eb04c6d1ec67e30f3aa5ef82112cbfdbddfd4f65" + }, + "CVE-2022-0617": { + "cmt_msg": "udf: Fix NULL ptr deref when converting from inline format", + "cmt_id": "a23a59717f9f01a49394488f515550f9382fbada" + }, + "CVE-2022-1678": { + "cmt_msg": "tcp: optimize tcp internal pacing", + "cmt_id": "0a70f118475e037732557796accd0878a00fc25a" + }, + "CVE-2022-24959": { + "cmt_msg": "yam: fix a memory leak in yam_siocdevprivate()", + "cmt_id": "4bd197ce18329e3725fe3af5bd27daa4256d3ac7" + } + }, + "4.19.229": { + "CVE-2022-0492": { + "cmt_msg": "cgroup-v1: Require capabilities to set release_agent", + "cmt_id": "939f8b491887c27585933ea7dc5ad4123de58ff3" + }, + "CVE-2022-48626": { + "cmt_msg": "moxart: fix potential use-after-free on remove path", + "cmt_id": "9c25d5ff1856b91bd4365e813f566cb59aaa9552" + }, + "CVE-2022-0435": { + "cmt_msg": "tipc: improve size validations for received domain records", + "cmt_id": "f1af11edd08dd8376f7a84487cbb0ea8203e3a1d" + }, + "CVE-2022-0487": { + "cmt_msg": "moxart: fix potential use-after-free on remove path", + "cmt_id": "9c25d5ff1856b91bd4365e813f566cb59aaa9552" + } + }, + "4.19.230": { + "CVE-2022-25375": { + "cmt_msg": "usb: gadget: rndis: check size of RNDIS_MSG_SET command", + "cmt_id": "db9aaa3026298d652e98f777bc0f5756e2455dda" + }, + "CVE-2022-25258": { + "cmt_msg": "USB: gadget: validate interface OS descriptor requests", + "cmt_id": "e5eb8d19aee115d8fb354d1eff1b8df700467164" + } + }, + "4.19.231": { + "CVE-2022-2964": { + "cmt_msg": "net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup", + "cmt_id": "1668781ed24da43498799aa4f65714a7de201930" + }, + "CVE-2022-20008": { + "cmt_msg": "mmc: block: fix read single on recovery logic", + "cmt_id": "c91b06297563e84ac072464fe6cc141cc15435f0" + } + }, + "4.19.232": { + "CVE-2022-27223": { + "cmt_msg": "USB: gadget: validate endpoint index for xilinx udc", + "cmt_id": "ebc465e894890a534ce05e035eae4829a2a47ba1" + }, + "CVE-2022-26966": { + "cmt_msg": "sr9700: sanity check for packet length", + "cmt_id": "dde5ddf02a47487dd6efcc7077307f1d4e1ba337" + } + }, + "4.19.233": { + "CVE-2022-24958": { + "cmt_msg": "usb: gadget: don't release an existing dev->buf", + "cmt_id": "70196d12856306a17ddc3eae0f022b9c1d748e52" + } + }, + "4.19.234": { + "CVE-2022-23038": { + "cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()", + "cmt_id": "17659846fe336366b1663194f5669d10f5947f53" + }, + "CVE-2022-23039": { + "cmt_msg": "xen/gntalloc: don't use gnttab_query_foreign_access()", + "cmt_id": "fbc57368ea527dcfa909908fc47a851a56e4e5ce" + }, + "CVE-2022-23960": { + "cmt_msg": "ARM: report Spectre v2 status through sysfs", + "cmt_id": "dc64af755099d1e51fd64e99fe3a59b75595814a" + }, + "CVE-2022-23041": { + "cmt_msg": "xen/9p: use alloc/free_pages_exact()", + "cmt_id": "2466bed361f3274e3e0ca9d8e539532481c06fea" + }, + "CVE-2022-23036": { + "cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()", + "cmt_id": "17659846fe336366b1663194f5669d10f5947f53" + }, + "CVE-2022-23037": { + "cmt_msg": "xen/netfront: don't use gnttab_query_foreign_access() for mapped status", + "cmt_id": "927e4eb8ddf4968b6a33be992b28063f84552c72" + }, + "CVE-2022-0001": { + "cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE", + "cmt_id": "25440a8c77dd2fde6a8e9cfc0c616916febf408e" + }, + "CVE-2022-0002": { + "cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE", + "cmt_id": "25440a8c77dd2fde6a8e9cfc0c616916febf408e" + }, + "CVE-2021-26401": { + "cmt_msg": "x86/speculation: Use generic retpoline by default on AMD", + "cmt_id": "d3cb3a6927222268a10b2f12dfb8c9444f7cc39e" + }, + "CVE-2022-23040": { + "cmt_msg": "xen/xenbus: don't let xenbus_grant_ring() remove grants in error case", + "cmt_id": "8d521d960aef22781ff499e16899c30af899de8d" + }, + "CVE-2022-23042": { + "cmt_msg": "xen/netfront: react properly to failing gnttab_end_foreign_access_ref()", + "cmt_id": "c307029d811e03546d18d0e512fe295b3103b8e5" + } + }, + "4.19.235": { + "CVE-2022-1199": { + "cmt_msg": "ax25: Fix NULL pointer dereference in ax25_kill_by_device", + "cmt_id": "5ab8de9377edde3eaf1de9872e2f01d43157cd6c" + }, + "CVE-2021-4149": { + "cmt_msg": "btrfs: unlock newly allocated extent buffer after error", + "cmt_id": "73d55fa1b9310573f623195a4f7ab3170bbaf248" + } + }, + "4.19.236": { + "CVE-2022-20368": { + "cmt_msg": "net/packet: fix slab-out-of-bounds access in packet_recvmsg()", + "cmt_id": "a33dd1e6693f80d805155b3f69c18c2f642915da" + }, + "CVE-2022-20158": { + "cmt_msg": "net/packet: fix slab-out-of-bounds access in packet_recvmsg()", + "cmt_id": "a33dd1e6693f80d805155b3f69c18c2f642915da" + }, + "CVE-2022-48629": { + "cmt_msg": "crypto: qcom-rng - ensure buffer for generate is completely filled", + "cmt_id": "a8e32bbb96c25b7ab29b1894dcd45e0b3b08fd9d" + }, + "CVE-2022-3107": { + "cmt_msg": "hv_netvsc: Add check for kvmalloc_array", + "cmt_id": "a30c7c81db60f7f7ad52f75a4f7de5f628063df4" + } + }, + "4.19.237": { + "CVE-2022-26490": { + "cmt_msg": "nfc: st21nfca: Fix potential buffer overflows in EVT_TRANSACTION", + "cmt_id": "0043b74987acb44f1ade537aad901695511cfebe" + }, + "CVE-2022-28356": { + "cmt_msg": "llc: fix netdevice reference leaks in llc_ui_bind()", + "cmt_id": "d14193111c436fc5de33206c67c7afd45c730099" + }, + "CVE-2022-1016": { + "cmt_msg": "netfilter: nf_tables: initialize registers in nft_do_chain()", + "cmt_id": "88791b79a1eb2ba94e95d039243e28433583a67b" + }, + "CVE-2022-27666": { + "cmt_msg": "esp: Fix possible buffer overflow in ESP transformation", + "cmt_id": "ce89087966651ad41e103770efc5ce2742046284" + } + }, + "4.19.238": { + "CVE-2022-28390": { + "cmt_msg": "can: ems_usb: ems_usb_start_xmit(): fix double dev_kfree_skb() in error path", + "cmt_id": "dec3ed0c76483748268bf36ec278af660b0f80ba" + }, + "CVE-2022-2380": { + "cmt_msg": "video: fbdev: sm712fb: Fix crash in smtcfb_read()", + "cmt_id": "1caa40af491dcfe17b3ae870a854388d8ea01984" + }, + "CVE-2022-1353": { + "cmt_msg": "af_key: add __GFP_ZERO flag for compose_sadb_supported in function pfkey_register", + "cmt_id": "693fe8af9a2625139de07bd1ae212a7d89c37795" + }, + "CVE-2022-30594": { + "cmt_msg": "ptrace: Check PTRACE_O_SUSPEND_SECCOMP permission on PTRACE_SEIZE", + "cmt_id": "b1f438f872dcda10a79e6aeaf06fd52dfb15a6ab" + }, + "CVE-2022-2977": { + "cmt_msg": "tpm: fix reference counting for struct tpm_chip", + "cmt_id": "cb64bd038beacb4331fe464a36c8b5481e8f51e2" + }, + "CVE-2022-3111": { + "cmt_msg": "power: supply: wm8350-power: Add missing free in free_charger_irq", + "cmt_id": "60dd1082322966f192f42fe2a6605dfa08eef41f" + }, + "CVE-2022-1198": { + "cmt_msg": "drivers: hamradio: 6pack: fix UAF bug caused by mod_timer()", + "cmt_id": "79e2f40c210a47f283bca352745068207798fbb9" + }, + "CVE-2022-3202": { + "cmt_msg": "jfs: prevent NULL deref in diFree", + "cmt_id": "2ef74e3e0089b6615ee124e1183746974c6bb561" + }, + "CVE-2021-4197": { + "cmt_msg": "cgroup: Use open-time credentials for process migraton perm checks", + "cmt_id": "0bd407959f7d6671ba0617e2dbda3e89d8a0419f" + }, + "CVE-2022-28389": { + "cmt_msg": "can: mcba_usb: mcba_usb_start_xmit(): fix double dev_kfree_skb in error path", + "cmt_id": "a8bba9fd73775e66b4021b18f2193f769ce48a59" + }, + "CVE-2022-3239": { + "cmt_msg": "media: em28xx: initialize refcount before kref_get", + "cmt_id": "0113fa98a49a8e46a19b0ad80f29c904c6feec23" + }, + "CVE-2022-1011": { + "cmt_msg": "fuse: fix pipe buffer lifetime for direct_io", + "cmt_id": "99db28212be68030c1db3a525f6bbdce39b039e9" + }, + "CVE-2023-1637": { + "cmt_msg": "x86/speculation: Restore speculation related MSRs during S3 resume", + "cmt_id": "edc7b755e8fce10009ac85bb234a035557301bc4" + } + }, + "4.19.239": { + "CVE-2022-41858": { + "cmt_msg": "drivers: net: slip: fix NPD bug in sl_tx_timeout()", + "cmt_id": "753b9d220a7d36dac70e7c6d05492d10d6f9dd36" + } + }, + "4.19.240": { + "CVE-2022-1204": { + "cmt_msg": "ax25: Fix refcount leaks caused by ax25_cb_del()", + "cmt_id": "de55a1338e6a48ff1e41ea8db1432496fbe2a62b" + }, + "CVE-2022-28388": { + "cmt_msg": "can: usb_8dev: usb_8dev_start_xmit(): fix double dev_kfree_skb() in error path", + "cmt_id": "8eb78da898079c0d7250c32ebf0c35fb81737abe" + } + }, + "4.19.241": { + "CVE-2022-33981": { + "cmt_msg": "floppy: disable FDRAWCMD by default", + "cmt_id": "0e535976774504af36fab1dfb54f3d4d6cc577a9" + }, + "CVE-2022-1836": { + "cmt_msg": "floppy: disable FDRAWCMD by default", + "cmt_id": "0e535976774504af36fab1dfb54f3d4d6cc577a9" + }, + "CVE-2022-29581": { + "cmt_msg": "net/sched: cls_u32: fix netns refcount changes in u32_change()", + "cmt_id": "75b0cc7904da7b40c6e8f2cf3ec4223b292b1184" + } + }, + "4.19.242": { + "CVE-2022-1419": { + "cmt_msg": "drm/vgem: Close use-after-free race in vgem_gem_create", + "cmt_id": "df2c1f38939aabb8c6beca108f08b90f050b9ebc" + }, + "CVE-2023-3159": { + "cmt_msg": "firewire: fix potential uaf in outbound_phy_packet_callback()", + "cmt_id": "34380b5647f13fecb458fea9a3eb3d8b3a454709" + }, + "CVE-2022-1974": { + "cmt_msg": "nfc: replace improper check device_is_registered() in netlink related functions", + "cmt_id": "7deebb94a311da0e02e621e765c3aef3d5936572" + }, + "CVE-2022-1975": { + "cmt_msg": "NFC: netlink: fix sleep in atomic bug when firmware download timeout", + "cmt_id": "d360fc8df363ecd7892d755d69ffc8c61d699e38" + }, + "CVE-2022-1734": { + "cmt_msg": "nfc: nfcmrvl: main: reorder destructive operations in nfcmrvl_nci_unregister_dev to avoid bugs", + "cmt_id": "b266f492b2af82269aaaab871ac3949420ae678c" + } + }, + "4.19.243": { + "CVE-2022-1048": { + "cmt_msg": "ALSA: pcm: Fix races among concurrent hw_params and hw_free calls", + "cmt_id": "9cb6c40a6ebe4a0cfc9d6a181958211682cffea9" + } + }, + "4.19.245": { + "CVE-2023-1838": { + "cmt_msg": "Fix double fget() in vhost_net_set_backend()", + "cmt_id": "6ca70982c646cc32e458150ee7f2530a24369b8c" + }, + "CVE-2022-48619": { + "cmt_msg": "Input: add bounds checking to input_set_capability()", + "cmt_id": "01d41d7e7fc7eef99ae5b1065d9186f91ff099e7" + }, + "CVE-2022-1729": { + "cmt_msg": "perf: Fix sys_perf_event_open() race against self", + "cmt_id": "6cdd53a49aa7413e53c14ece27d826f0b628b18a" + }, + "CVE-2022-1652": { + "cmt_msg": "floppy: use a statically allocated error counter", + "cmt_id": "3392d8711ad9e5b688999c948fd36d798c0d075d" + }, + "CVE-2023-4387": { + "cmt_msg": "net: vmxnet3: fix possible use-after-free bugs in vmxnet3_rq_alloc_rx_buf()", + "cmt_id": "3adaaf3472e8ea410cb1330e5dd8372b0483dc78" + }, + "CVE-2023-4459": { + "cmt_msg": "net: vmxnet3: fix possible NULL pointer dereference in vmxnet3_rq_cleanup()", + "cmt_id": "248a37ffd81c7121d30702d8caa31db48450680d" + } + }, + "4.19.246": { + "CVE-2022-20572": { + "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag", + "cmt_id": "6bff6107d1364c95109609c3fd680e6c8d7fa503" + }, + "CVE-2022-2503": { + "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag", + "cmt_id": "6bff6107d1364c95109609c3fd680e6c8d7fa503" + }, + "CVE-2022-0494": { + "cmt_msg": "block-map: add __GFP_ZERO flag for alloc_page in function bio_copy_kern", + "cmt_id": "18243d8479fd77952bdb6340024169d30b173a40" + }, + "CVE-2022-1012": { + "cmt_msg": "secure_seq: use the 64 bits of the siphash for port offset calculation", + "cmt_id": "695309c5c71526d32f5539f008bbf20ed2218528" + } + }, + "4.19.247": { + "CVE-2023-4385": { + "cmt_msg": "fs: jfs: fix possible NULL pointer dereference in dbFree()", + "cmt_id": "c381558c278a540c61dfef1f2b77ab817d5d302d" + }, + "CVE-2022-32250": { + "cmt_msg": "netfilter: nf_tables: disallow non-stateful expression in sets earlier", + "cmt_id": "ed44398b45add3d9be56b7457cc9e05282e518b4" + }, + "CVE-2022-1184": { + "cmt_msg": "ext4: verify dir block before splitting it", + "cmt_id": "78398c2b2cc14f9a9c8592cf6d334c5a479ed611" + }, + "CVE-2022-1966": { + "cmt_msg": "netfilter: nf_tables: disallow non-stateful expression in sets earlier", + "cmt_id": "ed44398b45add3d9be56b7457cc9e05282e518b4" + }, + "CVE-2022-32981": { + "cmt_msg": "powerpc/32: Fix overread/overwrite of thread_struct via ptrace", + "cmt_id": "a0e38a2808ea708beb4196a8873cecc23efb8e64" + } + }, + "4.19.248": { + "CVE-2022-21125": { + "cmt_msg": "x86/speculation/mmio: Reuse SRBDS mitigation for SBDS", + "cmt_id": "0e94464009ee37217a7e450c96ea1f8d42d3a6b5" + }, + "CVE-2022-21166": { + "cmt_msg": "x86/speculation/mmio: Enable CPU Fill buffer clearing on idle", + "cmt_id": "8b42145e8c9903d4805651e08f4fca628e166642" + }, + "CVE-2022-21123": { + "cmt_msg": "x86/speculation/mmio: Add mitigation for Processor MMIO Stale Data", + "cmt_id": "9f2ce43ebc33713ba02a89a66bd5f93c2f3a82cf" + } + }, + "4.19.249": { + "CVE-2022-32296": { + "cmt_msg": "tcp: increase source port perturb table to 2^16", + "cmt_id": "514cd2859c5017fdc487165b093b328e24afe954" + }, + "CVE-2022-0812": { + "cmt_msg": "xprtrdma: fix incorrect header size calculations", + "cmt_id": "4103bc54d8684a099615ae1fbab0590cf2167024" + } + }, + "4.19.250": { + "CVE-2021-33656": { + "cmt_msg": "vt: drop old FONT ioctls", + "cmt_id": "b15d5731b708a2190fec836990b8aefbbf36b07a" + } + }, + "4.19.251": { + "CVE-2022-2318": { + "cmt_msg": "net: rose: fix UAF bugs caused by timer handler", + "cmt_id": "2661f2d88f40e35791257d73def0319b4560b74b" + }, + "CVE-2022-33742": { + "cmt_msg": "xen/blkfront: force data bouncing when backend is untrusted", + "cmt_id": "981de55fb6b5253fa7ae345827c6c3ca77912e5c" + }, + "CVE-2022-33741": { + "cmt_msg": "xen/netfront: force data bouncing when backend is untrusted", + "cmt_id": "4b67d8e42dbba42cfafe22ac3e4117d9573fdd74" + }, + "CVE-2022-33740": { + "cmt_msg": "xen/netfront: fix leaking data in shared pages", + "cmt_id": "3650ac3218c1640a3d597a8cee17d8e2fcf0ed4e" + }, + "CVE-2022-26365": { + "cmt_msg": "xen/blkfront: fix leaking data in shared pages", + "cmt_id": "f4a1391185e30c977bfe1648435c152f806211c7" + }, + "CVE-2022-33744": { + "cmt_msg": "xen/arm: Fix race in RB-tree based P2M accounting", + "cmt_id": "274cb74da15ed13292fcec9097f04332eb3eea17" + } + }, + "4.19.252": { + "CVE-2021-33655": { + "cmt_msg": "fbcon: Disallow setting font bigger than screen size", + "cmt_id": "eae522ed28fe1c00375a8a0081a97dce7996e4d8" + } + }, + "4.19.253": { + "CVE-2022-36123": { + "cmt_msg": "x86: Clear .brk area at early boot", + "cmt_id": "36e2f161fb01795722f2ff1a24d95f08100333dd" + } + }, + "4.19.254": { + "CVE-2022-1462": { + "cmt_msg": "tty: use new tty_insert_flip_string_and_push_buffer() in pty_write()", + "cmt_id": "eb059bf8c237fe41fbaed4a6cccacce687b83222" + }, + "CVE-2022-36879": { + "cmt_msg": "xfrm: xfrm_policy: fix a possible double xfrm_pols_put() in xfrm_bundle_lookup()", + "cmt_id": "fdb4fba1ba8512fa579a9d091dcb6c410f82f96a" + } + }, + "4.19.255": { + "CVE-2022-36946": { + "cmt_msg": "netfilter: nf_queue: do not allow packet truncation below transport header offset", + "cmt_id": "f295d365b30626f82423a923695274024016380e" + }, + "CVE-2022-20566": { + "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free caused by l2cap_chan_put", + "cmt_id": "bbd1fdb0e1adf827997a93bf108f20ede038e56e" + }, + "CVE-2022-26373": { + "cmt_msg": "x86/speculation: Add RSB VM Exit protections", + "cmt_id": "b6c5011934a15762cd694e36fe74f2f2f93eac9b" + } + }, + "4.19.256": { + "CVE-2022-2586": { + "cmt_msg": "netfilter: nf_tables: do not allow SET_ID to refer to another table", + "cmt_id": "77d3b5038b7462318f5183e2ad704b01d57215a2" + }, + "CVE-2022-3629": { + "cmt_msg": "vsock: Fix memory leak in vsock_connect()", + "cmt_id": "2fc2a7767f661e6083f69588718cdf6f07cb9330" + }, + "CVE-2022-2153": { + "cmt_msg": "KVM: x86: Avoid theoretical NULL pointer dereference in kvm_irq_delivery_to_apic_fast()", + "cmt_id": "b8127a0fd21d70ab42d8177f8bb97df74f503cc1" + }, + "CVE-2022-3635": { + "cmt_msg": "atm: idt77252: fix use-after-free bugs caused by tst_timer", + "cmt_id": "52fddbd9754b249546c89315787075b7247b029d" + }, + "CVE-2022-20422": { + "cmt_msg": "arm64: fix oops in concurrently setting insn_emulation sysctls", + "cmt_id": "b51881b1da57fe9877125dfdd0aac5172958fcfd" + }, + "CVE-2021-4159": { + "cmt_msg": "bpf: Verifer, adjust_scalar_min_max_vals to always call update_reg_bounds()", + "cmt_id": "6c6b84ef5ea8dc0ca3559ccf69810960e348c555" + }, + "CVE-2022-1679": { + "cmt_msg": "ath9k: fix use-after-free in ath9k_hif_usb_rx_cb", + "cmt_id": "ab7a0ddf5f1cdec63cb21840369873806fc36d80" + }, + "CVE-2022-2588": { + "cmt_msg": "net_sched: cls_route: remove from list when handle is 0", + "cmt_id": "73584dab72d0a826f286a45544305819b58f7b92" + }, + "CVE-2023-1095": { + "cmt_msg": "netfilter: nf_tables: fix null deref due to zeroed list head", + "cmt_id": "d3f409c375490a86d342eae1d0f6271d12dc19d0" + }, + "CVE-2019-25162": { + "cmt_msg": "i2c: Fix a potential use after free", + "cmt_id": "23a191b132cd87f746c62f3dc27da33683d85829" + } + }, + "4.19.257": { + "CVE-2022-42703": { + "cmt_msg": "mm/rmap: Fix anon_vma->degree ambiguity leading to double-reuse", + "cmt_id": "6dbfc25d68d922736381988d64156a649ccf7bf1" + }, + "CVE-2022-3028": { + "cmt_msg": "af_key: Do not call xfrm_probe_algs in parallel", + "cmt_id": "7dbfc8f25f22fe2a64dd808266e00c8d2661ebdd" + } + }, + "4.19.258": { + "CVE-2022-2663": { + "cmt_msg": "netfilter: nf_conntrack_irc: Fix forged IP logic", + "cmt_id": "3275f7804f40de3c578d2253232349b07c25f146" + }, + "CVE-2023-2860": { + "cmt_msg": "ipv6: sr: fix out-of-bounds read when setting HMAC data.", + "cmt_id": "f684c16971ed5e77dfa25a9ad25b5297e1f58eab" + }, + "CVE-2022-3586": { + "cmt_msg": "sch_sfb: Don't assume the skb is still around after enqueueing to child", + "cmt_id": "9245ed20950afe225bc6d1c4b9d28d55aa152e25" + }, + "CVE-2022-4095": { + "cmt_msg": "staging: rtl8712: fix use after free bugs", + "cmt_id": "9fd6170c5e2d0ccd027abe26f6f5ffc528e1bb27" + }, + "CVE-2022-4662": { + "cmt_msg": "USB: core: Prevent nested device-reset calls", + "cmt_id": "cc9a12e12808af178c600cc485338bac2e37d2a8" + }, + "CVE-2022-20421": { + "cmt_msg": "binder: fix UAF of ref->proc caused by race condition", + "cmt_id": "06e5b43ca4dab06a92bf4c2f33766e6fb11b880a" + }, + "CVE-2022-40307": { + "cmt_msg": "efi: capsule-loader: Fix use-after-free in efi_capsule_write", + "cmt_id": "021805af5bedeafc76c117fc771c100b358ab419" + } + }, + "4.19.260": { + "CVE-2022-39842": { + "cmt_msg": "video: fbdev: pxa3xx-gcu: Fix integer overflow in pxa3xx_gcu_write", + "cmt_id": "a34547fc43d02f2662b2b62c9a4c578594cf662d" + } + }, + "4.19.262": { + "CVE-2022-2978": { + "cmt_msg": "fs: fix UAF/GPF bug in nilfs_mdt_destroy", + "cmt_id": "ec2aab115eb38ac4992ea2fcc2a02fbe7af5cf48" + }, + "CVE-2022-41849": { + "cmt_msg": "fbdev: smscufx: Fix use-after-free in ufx_ops_open()", + "cmt_id": "6d8dbefc4de96d35d68c723e2e75b5a23173c08c" + }, + "CVE-2022-3535": { + "cmt_msg": "net: mvpp2: fix mvpp2 debugfs leak", + "cmt_id": "84e2394b0be397f7198986aa9a28207f70b29bd4" + }, + "CVE-2022-3594": { + "cmt_msg": "r8152: Rate limit overflow messages", + "cmt_id": "88d2a93972c369eb812952aa15a25c1385506c1d" + }, + "CVE-2022-43750": { + "cmt_msg": "usb: mon: make mmapped memory read only", + "cmt_id": "bf7e2cee3899ede4c7c6548f28159ee3775fb67f" + }, + "CVE-2022-3621": { + "cmt_msg": "nilfs2: fix NULL pointer dereference at nilfs_bmap_lookup_at_level()", + "cmt_id": "fe8015680f383ea1dadec76972894dfabf8aefaa" + }, + "CVE-2022-3649": { + "cmt_msg": "nilfs2: fix use-after-free bug of struct nilfs_root", + "cmt_id": "bfc82a26545b5f61a64d51ca2179773706fb028f" + }, + "CVE-2022-41850": { + "cmt_msg": "HID: roccat: Fix use-after-free in roccat_read()", + "cmt_id": "13de81c7ea0fd68efb48a2d2957e349237905923" + }, + "CVE-2021-47103": { + "cmt_msg": "inet: fully convert sk->sk_rx_dst to RCU rules", + "cmt_id": "75a578000ae5e511e5d0e8433c94a14d9c99c412" + }, + "CVE-2022-40768": { + "cmt_msg": "scsi: stex: Properly zero out the passthrough command structure", + "cmt_id": "a99c5e38dc6c3dc3da28489b78db09a4b9ffc8c3" + }, + "CVE-2022-3565": { + "cmt_msg": "mISDN: fix use-after-free bugs in l1oip timer handlers", + "cmt_id": "27f74a47d5b1cf52d48af15993bb1caa31ad8f5b" + }, + "CVE-2022-3542": { + "cmt_msg": "bnx2x: fix potential memory leak in bnx2x_tpa_stop()", + "cmt_id": "70421f9708d4cf14c2bd15de58862a3d22e00bbe" + }, + "CVE-2022-3646": { + "cmt_msg": "nilfs2: fix leak of nilfs_root in case of writer thread creation failure", + "cmt_id": "4b748ef0f2afadd31c914623daa610f26385a4dc" + } + }, + "4.19.264": { + "CVE-2022-20369": { + "cmt_msg": "media: v4l2-mem2mem: Apply DST_QUEUE_OFF_BASE on MMAP buffers across ioctls", + "cmt_id": "95c4751705f7eef0f16a245e121259857f867c4a" + }, + "CVE-2023-0615": { + "cmt_msg": "media: vivid: dev->bitmap_cap wasn't freed in all cases", + "cmt_id": "29385e601f3420cfe46550271714b6685719eb33" + } + }, + "4.19.265": { + "CVE-2022-3628": { + "cmt_msg": "wifi: brcmfmac: Fix potential buffer overflow in brcmf_fweh_event_worker()", + "cmt_id": "5e7d546917431400b7d6e5e38f588e0bd13083c9" + }, + "CVE-2023-3812": { + "cmt_msg": "net: tun: fix bugs for oversize packet when napi frags enabled", + "cmt_id": "aa815bf32acf560dad63c3dc46bc7b98ca9a9672" + }, + "CVE-2022-42895": { + "cmt_msg": "Bluetooth: L2CAP: Fix attempting to access uninitialized memory", + "cmt_id": "36919a82f335784d86b4def308739559bb47943d" + }, + "CVE-2022-3564": { + "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free caused by l2cap_reassemble_sdu", + "cmt_id": "6c7407bfbeafc80a04e6eaedcf34d378532a04f2" + } + }, + "4.19.267": { + "CVE-2023-26607": { + "cmt_msg": "ntfs: fix out-of-bounds read in ntfs_attr_find()", + "cmt_id": "4301aa833a734257ad3715f607cbde17402eda94" + }, + "CVE-2022-3521": { + "cmt_msg": "kcm: avoid potential race in kcm_tx_work", + "cmt_id": "23a0a5869749c7833772330313ae7aec6581ec60" + } + }, + "4.19.268": { + "CVE-2023-1382": { + "cmt_msg": "tipc: set con sock in tipc_conn_alloc", + "cmt_id": "2c9c64a95d97727c9ada0d35abc90ee5fdbaeff7" + }, + "CVE-2022-3524": { + "cmt_msg": "tcp/udp: Fix memory leak in ipv6_renew_options().", + "cmt_id": "bbfbdca680b0cbea0e57be597b5e2cae19747052" + }, + "CVE-2022-42896": { + "cmt_msg": "Bluetooth: L2CAP: Fix accepting connection request for invalid SPSM", + "cmt_id": "a2045d57e844864605d39e6cfd2237861d800f13" + } + }, + "4.19.269": { + "CVE-2022-3643": { + "cmt_msg": "xen/netback: Ensure protocol headers don't fall in the non-linear area", + "cmt_id": "44dfdecc288b8d5932e09f5e6a597a089d5a82b2" + } + }, + "4.19.270": { + "CVE-2023-0266": { + "cmt_msg": "ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF", + "cmt_id": "5b2ea7e91352165054c5b3f8e5442cd31c3e73f9" + }, + "CVE-2022-41218": { + "cmt_msg": "media: dvb-core: Fix UAF due to refcount races at releasing", + "cmt_id": "8f537a1282cd877f132643ef8f9e9d6032f90025" + }, + "CVE-2023-23455": { + "cmt_msg": "net: sched: atm: dont intepret cls results when asked to drop", + "cmt_id": "5374c455ebe6102e3d5f1842c6d8ff72b3ca659f" + }, + "CVE-2023-0461": { + "cmt_msg": "net/ulp: prevent ULP without clone op from entering the LISTEN status", + "cmt_id": "755193f2523ce5157c2f844a4b6d16b95593f830" + }, + "CVE-2022-45934": { + "cmt_msg": "Bluetooth: L2CAP: Fix u8 overflow", + "cmt_id": "ad528fde0702903208d0a79d88d5a42ae3fc235b" + }, + "CVE-2022-3424": { + "cmt_msg": "misc: sgi-gru: fix use-after-free error in gru_set_context_option, gru_fault and gru_handle_user_call_os", + "cmt_id": "bcda4624e87d6b922e94f5c0fd0bd5f027b8b226" + }, + "CVE-2022-3545": { + "cmt_msg": "nfp: fix use-after-free in area_cache_get()", + "cmt_id": "6ff23e9b9a04b833388862246838bb38ac0c46b6" + }, + "CVE-2022-47929": { + "cmt_msg": "net: sched: disallow noqueue for qdisc classes", + "cmt_id": "0195d5ad539382a83e1bfaab51b93b8685f0b7c7" + }, + "CVE-2023-28328": { + "cmt_msg": "media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer()", + "cmt_id": "7abfe467cd685f5da7ecb415441e45e3e4e2baa8" + }, + "CVE-2023-0394": { + "cmt_msg": "ipv6: raw: Deduct extension header length in rawv6_push_pending_frames", + "cmt_id": "f487d636e49bc1fdfbd8105bc1ab159164e2d8bd" + }, + "CVE-2022-36280": { + "cmt_msg": "drm/vmwgfx: Validate the box size for the snooped cursor", + "cmt_id": "6b4e70a428b5a11f56db94047b68e144529fe512" + } + }, + "4.19.271": { + "CVE-2023-0458": { + "cmt_msg": "prlimit: do_prlimit needs to have a speculation check", + "cmt_id": "d3ee91e50a6b3c5a45398e3dcb912a8a264f575c" + } + }, + "4.19.272": { + "CVE-2023-1074": { + "cmt_msg": "sctp: fail if no bound addresses can be used for a given scope", + "cmt_id": "26436553aabfd9b40e1daa537a099bf5bb13fb55" + }, + "CVE-2023-3358": { + "cmt_msg": "HID: intel_ish-hid: Add check for ishtp_dma_tx_map", + "cmt_id": "cc906a3a4432da143ab3d2e894f99ddeff500cd3" + }, + "CVE-2023-23559": { + "cmt_msg": "wifi: rndis_wlan: Prevent buffer overflow in rndis_query_oid", + "cmt_id": "b4cc9d7ae9bed976de5463958afea2983b4ca57f" + }, + "CVE-2023-1073": { + "cmt_msg": "HID: check empty report_list in hid_validate_values()", + "cmt_id": "f958da03d9a71808548b2e5418d95482b106eb9a" + } + }, + "4.19.273": { + "CVE-2023-3161": { + "cmt_msg": "fbcon: Check font dimension limits", + "cmt_id": "1c3d4901fad1db6a4e2dcdd6b13ed0ea22f227a1" + }, + "CVE-2023-26545": { + "cmt_msg": "net: mpls: fix stale pointer if allocation fails during device rename", + "cmt_id": "aa07c86e43ed8780d610ecfb2ce13da326729201" + }, + "CVE-2023-1078": { + "cmt_msg": "rds: rds_rm_zerocopy_callback() use list_first_entry()", + "cmt_id": "909d5eef5ce792bb76d7b5a9b7a6852b813d8cac" + }, + "CVE-2023-1513": { + "cmt_msg": "kvm: initialize all of the kvm_debugregs structure before sending it to userspace", + "cmt_id": "669c76e55de332fbcbce5b74fccef1b4698a8936" + }, + "CVE-2023-2162": { + "cmt_msg": "scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress", + "cmt_id": "6abd4698f4c8a78e7bbfc421205c060c199554a0" + }, + "CVE-2023-3567": { + "cmt_msg": "vc_screen: move load of struct vc_data pointer in vcs_read() to avoid UAF", + "cmt_id": "6332f52f44b9776568bf3c0b714ddfb0bb175e78" + }, + "CVE-2023-32269": { + "cmt_msg": "netrom: Fix use-after-free caused by accept on already connected socket", + "cmt_id": "2c1984d101978e979783bdb2376eb6eca9f8f627" + } + }, + "4.19.274": { + "CVE-2023-0459": { + "cmt_msg": "uaccess: Add speculation barrier to copy_from_user()", + "cmt_id": "f8e54da1c729cc23d9a7b7bd42379323e7fb7979" + }, + "CVE-2022-3707": { + "cmt_msg": "drm/i915/gvt: fix double free bug in split_2MB_gtt_entry", + "cmt_id": "c5245a6cf83ca5c4b68d643f8b31ed0eb127126e" + } + }, + "4.19.276": { + "CVE-2023-7192": { + "cmt_msg": "netfilter: ctnetlink: fix possible refcount leak in ctnetlink_create_conntrack()", + "cmt_id": "43b9a9c78e37a5532c2a9260dff9d9989f2bbb23" + }, + "CVE-2023-1829": { + "cmt_msg": "net/sched: Retire tcindex classifier", + "cmt_id": "01d0d2b8b4e3cf2110baba9371c0c3d04ad5c77b" + }, + "CVE-2023-3220": { + "cmt_msg": "drm/msm/dpu: Add check for pstates", + "cmt_id": "c746a0b9210cebb29511f01d2becf240408327bf" + }, + "CVE-2023-2985": { + "cmt_msg": "fs: hfsplus: fix UAF issue in hfsplus_put_super", + "cmt_id": "e226f1fdcee1ca6e68233b132718deb578a84e38" + }, + "CVE-2023-1079": { + "cmt_msg": "HID: asus: use spinlock to safely schedule workers", + "cmt_id": "74b78391a9b6f67de90b13f5a85e329e3b3f5a72" + }, + "CVE-2023-45862": { + "cmt_msg": "USB: ene_usb6250: Allocate enough memory for full object", + "cmt_id": "cef5e33d8b893891817236db819982f87943e8fd" + }, + "CVE-2023-1118": { + "cmt_msg": "media: rc: Fix use-after-free bugs caused by ene_tx_irqsim()", + "cmt_id": "52bde2754d76fc97390f097fba763413607f157a" + } + }, + "4.19.279": { + "CVE-2023-1855": { + "cmt_msg": "hwmon: (xgene) Fix use after free bug in xgene_hwmon_remove due to race condition", + "cmt_id": "e0a37b43cd732038e37b4e7f6c6c0658fe0b6d73" + }, + "CVE-2023-1990": { + "cmt_msg": "nfc: st-nci: Fix use after free bug in ndlc_remove due to race condition", + "cmt_id": "3405eb641dafcc8b28d174784b203c1622c121bf" + } + }, + "4.19.280": { + "CVE-2021-47082": { + "cmt_msg": "tun: avoid double free in tun_free_netdev", + "cmt_id": "8eb43d635950e27c29f1e9e49a23b31637f37757" + }, + "CVE-2023-23454": { + "cmt_msg": "net: sched: cbq: dont intepret cls results when asked to drop", + "cmt_id": "8ed4c82571d848d76877c4d70687686e607766e3" + }, + "CVE-2023-30772": { + "cmt_msg": "power: supply: da9150: Fix use after free bug in da9150_charger_remove due to race condition", + "cmt_id": "533d915899b4a5a7b5b5a99eec24b2920ccd1f11" + }, + "CVE-2023-2483": { + "cmt_msg": "net: qcom/emac: Fix use after free bug in emac_remove due to race condition", + "cmt_id": "4bbc59ec4feb1ea8d5cb3d9d38d4cb1317943ea4" + }, + "CVE-2023-33203": { + "cmt_msg": "net: qcom/emac: Fix use after free bug in emac_remove due to race condition", + "cmt_id": "4bbc59ec4feb1ea8d5cb3d9d38d4cb1317943ea4" + }, + "CVE-2022-4744": { + "cmt_msg": "tun: avoid double free in tun_free_netdev", + "cmt_id": "8eb43d635950e27c29f1e9e49a23b31637f37757" + }, + "CVE-2023-1670": { + "cmt_msg": "xirc2ps_cs: Fix use after free bug in xirc2ps_detach", + "cmt_id": "526660c25d3b93b1232a525b75469048388f0928" + }, + "CVE-2023-1989": { + "cmt_msg": "Bluetooth: btsdio: fix use after free bug in btsdio_remove due to unfinished work", + "cmt_id": "af4d48754d5517d33bac5e504ff1f1de0808e29e" + }, + "CVE-2023-2194": { + "cmt_msg": "i2c: xgene-slimpro: Fix out-of-bounds bug in xgene_slimpro_i2c_xfer()", + "cmt_id": "5fc2b9485a8722c8350c3379992f5931ccfeaf98" + }, + "CVE-2021-33631": { + "cmt_msg": "ext4: fix kernel BUG in 'ext4_write_inline_data_end()'", + "cmt_id": "53bb0d3e0a3dfc9649add8133f1ecd9c1bc2dd70" + } + }, + "4.19.281": { + "CVE-2023-30456": { + "cmt_msg": "KVM: nVMX: add missing consistency checks for CR0 and CR4", + "cmt_id": "495adb06518bb10f50e1aa1a1dbd5daa47d118f2" + }, + "CVE-2023-1859": { + "cmt_msg": "9p/xen : Fix use after free bug in xen_9pfs_front_remove due to race condition", + "cmt_id": "c078fcd3f00ea5eadad07da169956d84f65af49b" + } + }, + "4.19.282": { + "CVE-2023-31436": { + "cmt_msg": "net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg", + "cmt_id": "6ef8120262dfa63d9ec517d724e6f15591473a78" + }, + "CVE-2023-2513": { + "cmt_msg": "ext4: fix use-after-free in ext4_xattr_set_entry", + "cmt_id": "50c3bf3865da5b4c2fb3fedb79093d3ebcfcae21" + }, + "CVE-2023-2248": { + "cmt_msg": "net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg", + "cmt_id": "6ef8120262dfa63d9ec517d724e6f15591473a78" + } + }, + "4.19.283": { + "CVE-2023-35828": { + "cmt_msg": "usb: gadget: udc: renesas_usb3: Fix use after free bug in renesas_usb3_remove due to race condition", + "cmt_id": "ad03fe033a71ed1fd2cb68a067198ae0e342f991" + }, + "CVE-2023-1380": { + "cmt_msg": "wifi: brcmfmac: slab-out-of-bounds read in brcmf_get_assoc_ies()", + "cmt_id": "39f9bd880abac6068bedb24a4e16e7bd26bf92da" + }, + "CVE-2024-0775": { + "cmt_msg": "ext4: improve error recovery code paths in __ext4_remount()", + "cmt_id": "37302d4c2724dc92be5f90a3718eafa29834d586" + }, + "CVE-2023-35824": { + "cmt_msg": "media: dm1105: Fix use after free bug in dm1105_remove due to race condition", + "cmt_id": "722c156c6eab40a6e7dda98dfa66724f9d5aeceb" + }, + "CVE-2023-3268": { + "cmt_msg": "relayfs: fix out-of-bounds access in relay_file_read", + "cmt_id": "ed32488417669568308b65ba5d45799418f9ed49" + }, + "CVE-2023-2269": { + "cmt_msg": "dm ioctl: fix nested locking in table_clear() to remove deadlock concern", + "cmt_id": "b4b94b25c78ed03be0e07fa4e76fe51e64dac533" + }, + "CVE-2023-2002": { + "cmt_msg": "bluetooth: Perform careful capability checks in hci_sock_ioctl()", + "cmt_id": "8d59548bae309000442c297bff3e54ab535f0ab7" + }, + "CVE-2023-32233": { + "cmt_msg": "netfilter: nf_tables: deactivate anonymous set from preparation phase", + "cmt_id": "c6989314fd809c5eaf4980d6fa474f19fc653d6c" + }, + "CVE-2023-35823": { + "cmt_msg": "media: saa7134: fix use after free bug in saa7134_finidev due to race condition", + "cmt_id": "95e684340470a95ff4957cb9a536ec7a0461c75b" + }, + "CVE-2023-34256": { + "cmt_msg": "ext4: avoid a potential slab-out-of-bounds in ext4_group_desc_csum", + "cmt_id": "a733c466cedd1013a41fd8908d5810f2c161072f" + } + }, + "4.19.284": { + "CVE-2023-3090": { + "cmt_msg": "ipvlan:Fix out-of-bounds caused by unclear skb->cb", + "cmt_id": "b36dcf3ed547c103acef6f52bed000a0ac6c074f" + }, + "CVE-2023-3141": { + "cmt_msg": "memstick: r592: Fix UAF bug in r592_remove due to race condition", + "cmt_id": "dce890c3dfaf631d0a8ac79c2792911f9fc551fa" + }, + "CVE-2022-34918": { + "cmt_msg": "netfilter: nf_tables: stricter validation of element data", + "cmt_id": "835fd72f61c6162f10471df197f0e4b92b1a7b76" + } + }, + "4.19.285": { + "CVE-2022-45887": { + "cmt_msg": "media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb()", + "cmt_id": "3e5af0745a4702ab0df2f880bfe0431eb30f9164" + }, + "CVE-2022-45886": { + "cmt_msg": "media: dvb-core: Fix use-after-free due on race condition at dvb_net", + "cmt_id": "7bb9c6e05efcecb15b0354d574efbc36ca321d75" + }, + "CVE-2023-35788": { + "cmt_msg": "net/sched: flower: fix possible OOB write in fl_set_geneve_opt()", + "cmt_id": "59a27414bb00e48c4153a8b794fb4e69910a6a1b" + }, + "CVE-2022-45919": { + "cmt_msg": "media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221", + "cmt_id": "8624c7e048fa9ba584b7ba43715090ab1aed765c" + } + }, + "4.19.286": { + "CVE-2023-3111": { + "cmt_msg": "btrfs: unset reloc control if transaction commit fails in prepare_to_relocate()", + "cmt_id": "dcb11fe0a0a9cca2b7425191b9bf30dc29f2ad0f" + } + }, + "4.19.287": { + "CVE-2023-3338": { + "cmt_msg": "Remove DECnet support from kernel", + "cmt_id": "3e77bbc87342841db66c18a3afca0441c8c555e4" + } + }, + "4.19.289": { + "CVE-2023-20593": { + "cmt_msg": "x86/cpu/amd: Add a Zenbleed fix", + "cmt_id": "cfef7bbf0dca27209ea5d82d7060d4fc2c0d72ea" + } + }, + "4.19.290": { + "CVE-2022-40982": { + "cmt_msg": "x86/speculation: Add Gather Data Sampling mitigation", + "cmt_id": "e81494b7259b6b1ab81a9f9be3385b4aa99a7a59" + } + }, + "4.19.291": { + "CVE-2023-4206": { + "cmt_msg": "net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free", + "cmt_id": "ad8f36f96696a7f1d191da66637c415959bab6d8" + }, + "CVE-2023-51043": { + "cmt_msg": "drm/atomic: Fix potential use-after-free in nonblocking commits", + "cmt_id": "73a82b22963defa87204f0f9f44a534adf7f831a" + }, + "CVE-2023-3390": { + "cmt_msg": "netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE", + "cmt_id": "798aa8da13782fe472aa48841c5570d7439339b8" + }, + "CVE-2023-1206": { + "cmt_msg": "tcp: Reduce chance of collisions in inet6_hashfn().", + "cmt_id": "8fa0dea2fc96f192d81a12434e48deda2e556320" + }, + "CVE-2023-4128": { + "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free", + "cmt_id": "4aae24015ecd70d824a953e2dc5b0ca2c4769243" + }, + "CVE-2023-3611": { + "cmt_msg": "net/sched: sch_qfq: account for stab overhead in qfq_enqueue", + "cmt_id": "ee3bc829f9b4df96d208d58b654e400fa1f3b46c" + }, + "CVE-2023-3212": { + "cmt_msg": "gfs2: Don't deref jdesc in evict", + "cmt_id": "d3af9cea9a1ce56f427e41e5ffcdafe9280f099f" + }, + "CVE-2023-3609": { + "cmt_msg": "net/sched: cls_u32: Fix reference counter leak leading to overflow", + "cmt_id": "8ffaf24a377519e4396f03da5ccda082edae1ac9" + }, + "CVE-2023-4208": { + "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free", + "cmt_id": "4aae24015ecd70d824a953e2dc5b0ca2c4769243" + }, + "CVE-2023-35001": { + "cmt_msg": "netfilter: nf_tables: prevent OOB access in nft_byteorder_eval", + "cmt_id": "025fd7efe2639773540a5e425b7bc0dc10b6b023" + }, + "CVE-2023-3776": { + "cmt_msg": "net/sched: cls_fw: Fix improper refcount update leads to use-after-free", + "cmt_id": "612f468cfc3df83777ae21058419b1fc8e9037eb" + }, + "CVE-2023-3117": { + "cmt_msg": "netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE", + "cmt_id": "798aa8da13782fe472aa48841c5570d7439339b8" + }, + "CVE-2023-40283": { + "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb", + "cmt_id": "82cdb2ccbe43337798393369f0ceb98699fe6037" + }, + "CVE-2023-4132": { + "cmt_msg": "media: usb: siano: Fix warning due to null work_func_t function pointer", + "cmt_id": "54073c46cbbd2c0c03d6f7d481540cb95cf181a1" + } + }, + "4.19.293": { + "CVE-2023-39194": { + "cmt_msg": "net: xfrm: Fix xfrm_address_filter OOB read", + "cmt_id": "a695f0e724330773283a6d67e149363b89087f76" + }, + "CVE-2023-1077": { + "cmt_msg": "sched/rt: pick_next_rt_entity(): check list_entry", + "cmt_id": "84d90fb72a053c034b018fcc3cfaa6f606faf1c6" + }, + "CVE-2023-51042": { + "cmt_msg": "drm/amdgpu: Fix potential fence use-after-free v2", + "cmt_id": "f9da11d96bde3db277f061ac5a665c234d505787" + }, + "CVE-2023-3772": { + "cmt_msg": "xfrm: add NULL check in xfrm_update_ae_params", + "cmt_id": "44f69c96f8a147413c23c68cda4d6fb5e23137cd" + } + }, + "4.19.295": { + "CVE-2023-4921": { + "cmt_msg": "net: sched: sch_qfq: Fix UAF in qfq_dequeue()", + "cmt_id": "7ea1faa59c75336d86893378838ed1e6f20c0520" + }, + "CVE-2023-4623": { + "cmt_msg": "net/sched: sch_hfsc: Ensure inner classes have fsc curve", + "cmt_id": "7c62e0c3c6e9c9c15ead63339db6a0e158d22a66" + }, + "CVE-2023-42755": { + "cmt_msg": "net/sched: Retire rsvp classifier", + "cmt_id": "6ca0ea6a46e7a2d70fb1b1f6a886efe2b2365e16" + }, + "CVE-2023-42752": { + "cmt_msg": "igmp: limit igmpv3_newpack() packet size to IP_MAX_MTU", + "cmt_id": "76ce657a5db97ff4e26b284fedc33e8591a4be17" + }, + "CVE-2023-39189": { + "cmt_msg": "netfilter: nfnetlink_osf: avoid OOB read", + "cmt_id": "40d427ffccf9e60bd7288ea3748c066404a35622" + }, + "CVE-2023-4207": { + "cmt_msg": "net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free", + "cmt_id": "4f38dc8496d1991e2c055a0068dd98fb48affcc6" + }, + "CVE-2023-45871": { + "cmt_msg": "igb: set max size RX buffer when store bad packet is enabled", + "cmt_id": "981d0bc43e8d5482294432677e80a1d15f4b790d" + }, + "CVE-2023-39193": { + "cmt_msg": "netfilter: xt_sctp: validate the flag_info count", + "cmt_id": "f25dbfadaf525d854597c16420dd753ca47b9396" + }, + "CVE-2023-39192": { + "cmt_msg": "netfilter: xt_u32: validate user space input", + "cmt_id": "ddf190be80ef0677629416a128f9da91e5800d21" + } + }, + "4.19.296": { + "CVE-2023-52527": { + "cmt_msg": "ipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data()", + "cmt_id": "559d697c5d072593d22b3e0bd8b8081108aeaf59" + }, + "CVE-2023-31085": { + "cmt_msg": "ubi: Refuse attaching if mtd's erasesize is 0", + "cmt_id": "a0d71e9e61da8a85a46774c67549739e28fda795" + }, + "CVE-2023-52528": { + "cmt_msg": "net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg", + "cmt_id": "2a36d9e2995c8c3c3f179aab1215a69cff06cbed" + }, + "CVE-2023-52578": { + "cmt_msg": "net: bridge: use DEV_STATS_INC()", + "cmt_id": "d2346e6beb699909ca455d9d20c4e577ce900839" + }, + "CVE-2023-52574": { + "cmt_msg": "team: fix null-ptr-deref when team device type is changed", + "cmt_id": "a7fb47b9711101d2405b0eb1276fb1f9b9b270c7" + }, + "CVE-2023-52566": { + "cmt_msg": "nilfs2: fix potential use after free in nilfs_gccache_submit_read_data()", + "cmt_id": "bb61224f6abc8e71bfdf06d7c984e23460875f5b" + } + }, + "4.19.297": { + "CVE-2023-52475": { + "cmt_msg": "Input: powermate - fix use-after-free in powermate_config_complete", + "cmt_id": "67cace72606baf1758fd60feb358f4c6be92e1cc" + }, + "CVE-2023-52477": { + "cmt_msg": "usb: hub: Guard against accesses to uninitialized BOS descriptors", + "cmt_id": "8e7346bfea56453e31b7421c1c17ca2fb9ed613d" + }, + "CVE-2023-46343": { + "cmt_msg": "nfc: nci: fix possible NULL pointer dereference in send_acknowledge()", + "cmt_id": "5622592f8f74ae3e594379af02e64ea84772d0dd" + }, + "CVE-2023-52504": { + "cmt_msg": "x86/alternatives: Disable KASAN in apply_alternatives()", + "cmt_id": "3719d3c36aa853d5a2401af9f8d6b116c91ad5ae" + }, + "CVE-2023-52507": { + "cmt_msg": "nfc: nci: assert requested protocol is valid", + "cmt_id": "a686f84101680b8442181a8846fbd3c934653729" + }, + "CVE-2023-52478": { + "cmt_msg": "HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect", + "cmt_id": "44481b244fcaa2b895a53081d6204c574720c38c" + }, + "CVE-2023-52510": { + "cmt_msg": "ieee802154: ca8210: Fix a potential UAF in ca8210_probe", + "cmt_id": "cdb46be93c1f7bbf2c4649e9fc5fb147cfb5245d" + }, + "CVE-2023-52502": { + "cmt_msg": "net: nfc: fix races in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn()", + "cmt_id": "e863f5720a5680e50c4cecf12424d7cc31b3eb0a" + }, + "CVE-2023-5717": { + "cmt_msg": "perf: Disallow mis-matched inherited group reads", + "cmt_id": "a714491fa92d2068358dd603cc50bf2062517bd8" + } + }, + "4.19.298": { + "CVE-2021-44879": { + "cmt_msg": "f2fs: fix to do sanity check on inode type during garbage collection", + "cmt_id": "45c9da086dded78a12bc580f5bb012545a910803" + }, + "CVE-2023-45863": { + "cmt_msg": "kobject: Fix slab-out-of-bounds in fill_kobj_path()", + "cmt_id": "0af6c6c15681cf80aeb85fcb3a1928c63aa89deb" + } + }, + "4.19.300": { + "CVE-2023-0590": { + "cmt_msg": "net: sched: fix race condition in qdisc_graft()", + "cmt_id": "f782929b90b5ac88d4445c853949d9efa6db6bae" + } + }, + "4.19.301": { + "CVE-2024-0584": { + "cmt_msg": "ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet", + "cmt_id": "6b6f5c6671fdfde9c94efe6409fa9f39436017e7" + }, + "CVE-2023-6932": { + "cmt_msg": "ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet", + "cmt_id": "6b6f5c6671fdfde9c94efe6409fa9f39436017e7" + } + }, + "4.19.302": { + "CVE-2023-6931": { + "cmt_msg": "perf: Fix perf_event_validate_size()", + "cmt_id": "f5d6ab016792c9d6d5280fdb7f8962eb3b8c620e" + } + }, + "4.19.303": { + "CVE-2023-51782": { + "cmt_msg": "net/rose: Fix Use-After-Free in rose_ioctl", + "cmt_id": "6c9afea8827dde62c4062185d22ac035090ba39b" + }, + "CVE-2023-51780": { + "cmt_msg": "atm: Fix Use-After-Free in do_vcc_ioctl", + "cmt_id": "bff7ddb0d9d515170dcf133d239dba87c47c8cdb" + }, + "CVE-2023-51781": { + "cmt_msg": "appletalk: Fix Use-After-Free in atalk_ioctl", + "cmt_id": "580ff9f59ab6537d8ce1d0d9f012cf970553ef3d" + } + }, + "4.19.304": { + "CVE-2023-6606": { + "cmt_msg": "smb: client: fix OOB in smbCalcSize()", + "cmt_id": "89b6ae907c6bcc175bc95a67d6936217530a29ff" + } + }, + "4.19.305": { + "CVE-2023-6040": { + "cmt_msg": "netfilter: nf_tables: Reject tables of unsupported family", + "cmt_id": "087d38ae0fd5a9a41b949e97601b4b0d09336f19" + }, + "CVE-2023-52340": { + "cmt_msg": "ipv6: remove max_size check inline with ipv4", + "cmt_id": "95372b040ae689293c6863b90049f1af68410c8b" + } + }, + "4.19.306": { + "CVE-2024-26597": { + "cmt_msg": "net: qualcomm: rmnet: fix global oob in rmnet_policy", + "cmt_id": "093dab655808207f7a9f54cf156240aeafc70590" + }, + "CVE-2023-52464": { + "cmt_msg": "EDAC/thunderx: Fix possible out-of-bounds string access", + "cmt_id": "71c17ee02538802ceafc830f0736aa35b564e601" + }, + "CVE-2023-52443": { + "cmt_msg": "apparmor: avoid crash when parsed profile name is empty", + "cmt_id": "9286ee97aa4803d99185768735011d0d65827c9e" + }, + "CVE-2023-52444": { + "cmt_msg": "f2fs: fix to avoid dirent corruption", + "cmt_id": "02160112e6d45c2610b049df6eb693d7a2e57b46" + }, + "CVE-2023-52445": { + "cmt_msg": "media: pvrusb2: fix use after free on context disconnection", + "cmt_id": "ec36c134dd020d28e312c2f1766f85525e747aab" + }, + "CVE-2023-52612": { + "cmt_msg": "crypto: scomp - fix req->dst buffer overflow", + "cmt_id": "1142d65c5b881590962ad763f94505b6dd67d2fe" + }, + "CVE-2023-52449": { + "cmt_msg": "mtd: Fix gluebi NULL pointer dereference caused by ftl notifier", + "cmt_id": "aeba358bcc8ffddf9b4a9bd0e5ec9eb338d46022" + }, + "CVE-2023-52469": { + "cmt_msg": "drivers/amd/pm: fix a use-after-free in kv_parse_power_table", + "cmt_id": "8a27d9d9fc9b5564b8904c3a77a7dea482bfa34e" + }, + "CVE-2023-52439": { + "cmt_msg": "uio: Fix use-after-free in uio_open", + "cmt_id": "3174e0f7de1ba392dc191625da83df02d695b60c" + }, + "CVE-2023-52470": { + "cmt_msg": "drm/radeon: check the alloc_workqueue return value in radeon_crtc_init()", + "cmt_id": "21b1645660717d6126dd4866c850fcc5c4703a41" + }, + "CVE-2024-26633": { + "cmt_msg": "ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim()", + "cmt_id": "135414f300c5db995e2a2f3bf0f455de9d014aee" + }, + "CVE-2023-52609": { + "cmt_msg": "binder: fix race between mmput() and do_exit()", + "cmt_id": "95b1d336b0642198b56836b89908d07b9a0c9608" + }, + "CVE-2023-46838": { + "cmt_msg": "xen-netback: don't produce zero-size SKB frags", + "cmt_id": "5bb8270789c88c0e4ad78c0de2f274f2275c7f6c" + }, + "CVE-2023-52451": { + "cmt_msg": "powerpc/pseries/memhp: Fix access beyond end of drmem array", + "cmt_id": "bb79613a9a704469ddb8d6c6029d532a5cea384c" + }, + "CVE-2023-52436": { + "cmt_msg": "f2fs: explicitly null-terminate the xattr list", + "cmt_id": "16ae3132ff7746894894927c1892493693b89135" + } + }, + "4.19.307": { + "CVE-2024-26675": { + "cmt_msg": "ppp_async: limit MRU to 64K", + "cmt_id": "4fdb14ba89faff6e6969a4dffdc8e54235d6e5ed" + }, + "CVE-2024-26615": { + "cmt_msg": "net/smc: fix illegal rmb_desc access in SMC-D connection dump", + "cmt_id": "27aea64838914c6122db5b8bd4bed865c9736f22" + }, + "CVE-2024-26671": { + "cmt_msg": "blk-mq: fix IO hang from sbitmap wakeup race", + "cmt_id": "9525b38180e2753f0daa1a522b7767a2aa969676" + }, + "CVE-2024-26679": { + "cmt_msg": "inet: read sk->sk_family once in inet_recv_error()", + "cmt_id": "caa064c3c2394d03e289ebd6b0be5102eb8a5b40" + }, + "CVE-2023-52587": { + "cmt_msg": "IB/ipoib: Fix mcast list locking", + "cmt_id": "4c8922ae8eb8dcc1e4b7d1059d97a8334288d825" + }, + "CVE-2023-52583": { + "cmt_msg": "ceph: fix deadlock or deadcode of misusing dget()", + "cmt_id": "eb55ba8aa7fb7aad54f40fbf4d8dcdfdba0bebf6" + }, + "CVE-2023-52615": { + "cmt_msg": "hwrng: core - Fix page fault dead lock on mmap-ed hwrng", + "cmt_id": "eafd83b92f6c044007a3591cbd476bcf90455990" + }, + "CVE-2024-1086": { + "cmt_msg": "netfilter: nf_tables: reject QUEUE/DROP verdict parameters", + "cmt_id": "8365e9d92b85fda975a5ece7a3a139cb964018c8" + }, + "CVE-2023-52619": { + "cmt_msg": "pstore/ram: Fix crash when setting number of cpus to an odd number", + "cmt_id": "8b69c30f4e8b69131d92096cb296dc1f217101e4" + }, + "CVE-2024-26685": { + "cmt_msg": "nilfs2: fix potential bug in end_buffer_async_write", + "cmt_id": "c4a09fdac625e64abe478dcf88bfa20406616928" + }, + "CVE-2024-0607": { + "cmt_msg": "netfilter: nf_tables: fix pointer math issue in nft_byteorder_eval()", + "cmt_id": "fca41e5b687e029f69e3a35a2fa31e2560e538dc" + }, + "CVE-2024-26625": { + "cmt_msg": "llc: call sock_orphan() at release time", + "cmt_id": "6b950c712a9a05cdda4aea7fcb2848766576c11b" + }, + "CVE-2024-23849": { + "cmt_msg": "net/rds: Fix UBSAN: array-index-out-of-bounds in rds_cmsg_recv", + "cmt_id": "344350bfa3b4b37d7c3d5a00536e6fbf0e953fbf" + }, + "CVE-2024-26704": { + "cmt_msg": "ext4: fix double-free of blocks due to wrong extents moved_len", + "cmt_id": "b4fbb89d722cbb16beaaea234b7230faaaf68c71" + }, + "CVE-2024-26602": { + "cmt_msg": "sched/membarrier: reduce the ability to hammer on sys_membarrier", + "cmt_id": "3cd139875e9a7688b3fc715264032620812a5fa3" + }, + "CVE-2024-26720": { + "cmt_msg": "mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again", + "cmt_id": "c593d26fb5d577ef31b6e49a31e08ae3ebc1bc1e" + }, + "CVE-2024-26600": { + "cmt_msg": "phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP", + "cmt_id": "486218c11e8d1c8f515a3bdd70d62203609d4b6b" + }, + "CVE-2024-26663": { + "cmt_msg": "tipc: Check the bearer type before calling tipc_udp_nl_bearer_add()", + "cmt_id": "24ec8f0da93b8a9fba11600be8a90f0d73fb46f1" + }, + "CVE-2024-26606": { + "cmt_msg": "binder: signal epoll threads of self-work", + "cmt_id": "dd64bb8329ce0ea27bc557e4160c2688835402ac" + }, + "CVE-2024-26645": { + "cmt_msg": "tracing: Ensure visibility when inserting an element into tracing_map", + "cmt_id": "5022b331c041e8c54b9a6a3251579bd1e8c0fc0b" + }, + "CVE-2024-26664": { + "cmt_msg": "hwmon: (coretemp) Fix out-of-bounds memory access", + "cmt_id": "93f0f4e846fcb682c3ec436e3b2e30e5a3a8ee6a" + }, + "CVE-2023-52622": { + "cmt_msg": "ext4: avoid online resizing failures due to oversized flex bg", + "cmt_id": "cd1f93ca97a9136989f3bd2bf90696732a2ed644" + }, + "CVE-2023-52597": { + "cmt_msg": "KVM: s390: fix setting of fpc register", + "cmt_id": "3a04410b0bc7e056e0843ac598825dd359246d18" + }, + "CVE-2023-52594": { + "cmt_msg": "wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus()", + "cmt_id": "f44f073c78112ff921a220d01b86d09f2ace59bc" + }, + "CVE-2023-52598": { + "cmt_msg": "s390/ptrace: handle setting of fpc register correctly", + "cmt_id": "6ccf904aac0292e1f6b1a1be6c407c414f7cf713" + }, + "CVE-2023-52599": { + "cmt_msg": "jfs: fix array-index-out-of-bounds in diNewExt", + "cmt_id": "f423528488e4f9606cef858eceea210bf1163f41" + }, + "CVE-2023-52606": { + "cmt_msg": "powerpc/lib: Validate size for vector operations", + "cmt_id": "42084a428a139f1a429f597d44621e3a18f3e414" + }, + "CVE-2023-52607": { + "cmt_msg": "powerpc/mm: Fix null-pointer dereference in pgtable_cache_add", + "cmt_id": "21e45a7b08d7cd98d6a53c5fc5111879f2d96611" + }, + "CVE-2023-52604": { + "cmt_msg": "FS:JFS:UBSAN:array-index-out-of-bounds in dbAdjTree", + "cmt_id": "e3e95c6850661c77e6dab079d9b5374a618ebb15" + }, + "CVE-2023-52623": { + "cmt_msg": "SUNRPC: Fix a suspicious RCU usage warning", + "cmt_id": "fece80a2a6718ed58487ce397285bb1b83a3e54e" + }, + "CVE-2023-52602": { + "cmt_msg": "jfs: fix slab-out-of-bounds Read in dtSearch", + "cmt_id": "ce8bc22e948634a5c0a3fa58a179177d0e3f3950" + }, + "CVE-2023-52603": { + "cmt_msg": "UBSAN: array-index-out-of-bounds in dtSplitRoot", + "cmt_id": "e30b52a2ea3d1e0aaee68096957cf90a2f4ec5af" + }, + "CVE-2023-52600": { + "cmt_msg": "jfs: fix uaf in jfs_evict_inode", + "cmt_id": "81b4249ef37297fb17ba102a524039a05c6c5d35" + }, + "CVE-2023-52601": { + "cmt_msg": "jfs: fix array-index-out-of-bounds in dbAdjTree", + "cmt_id": "3d3898b4d72c677d47fe3cb554449f2df5c12555" + }, + "CVE-2023-52486": { + "cmt_msg": "drm: Don't unref the same fb many times by mistake due to deadlock handling", + "cmt_id": "376e21a9e4c2c63ee5d8d3aa74be5082c3882229" + }, + "CVE-2024-26697": { + "cmt_msg": "nilfs2: fix data corruption in dsync block recovery for small block sizes", + "cmt_id": "5278c3eb6bf5896417572b52adb6be9d26e92f65" + }, + "CVE-2024-26696": { + "cmt_msg": "nilfs2: fix hang in nilfs_lookup_dirty_data_buffers()", + "cmt_id": "228742b2ddfb99dfd71e5a307e6088ab6836272e" + }, + "CVE-2024-0340": { + "cmt_msg": "vhost: use kzalloc() instead of kmalloc() followed by memset()", + "cmt_id": "95eab1039625d54d1770665756dd34e9fe926638" + }, + "CVE-2024-26636": { + "cmt_msg": "llc: make llc_ui_sendmsg() more robust against bonding changes", + "cmt_id": "84e9d10419f6f4f3f3cd8f9aaf44a48719aa4b1b" + }, + "CVE-2024-26635": { + "cmt_msg": "llc: Drop support for ETH_P_TR_802_2.", + "cmt_id": "165ad1e22779685c3ed3dd349c6c4c632309cc62" + } + }, + "4.19.308": { + "CVE-2024-26744": { + "cmt_msg": "RDMA/srpt: Support specifying the srpt_service_guid parameter", + "cmt_id": "84f1dac960cfa210a3b7a7522e6c2320ae91932b" + }, + "CVE-2024-26777": { + "cmt_msg": "fbdev: sis: Error out if pixclock equals zero", + "cmt_id": "84246c35ca34207114055a87552a1c4289c8fd7e" + }, + "CVE-2024-26778": { + "cmt_msg": "fbdev: savage: Error out if pixclock equals zero", + "cmt_id": "224453de8505aede1890f007be973925a3edf6a1" + }, + "CVE-2024-26735": { + "cmt_msg": "ipv6: sr: fix possible use-after-free and null-ptr-deref", + "cmt_id": "953f42934533c151f440cd32390044d2396b87aa" + }, + "CVE-2024-26779": { + "cmt_msg": "wifi: mac80211: fix race condition on enabling fast-xmit", + "cmt_id": "76fad1174a0cae6fc857b9f88b261a2e4f07d587" + }, + "CVE-2024-26751": { + "cmt_msg": "ARM: ep93xx: Add terminator to gpiod_lookup_table", + "cmt_id": "9e200a06ae2abb321939693008290af32b33dd6e" + }, + "CVE-2024-26752": { + "cmt_msg": "l2tp: pass correct message length to ip6_append_data", + "cmt_id": "4c3ce64bc9d36ca9164dd6c77ff144c121011aae" + }, + "CVE-2024-26766": { + "cmt_msg": "IB/hfi1: Fix sdma.h tx->num_descs off-by-one error", + "cmt_id": "115b7f3bc1dce590a6851a2dcf23dc1100c49790" + }, + "CVE-2024-26754": { + "cmt_msg": "gtp: fix use-after-free and null-ptr-deref in gtp_genl_dump_pdp()", + "cmt_id": "f0ecdfa679189d26aedfe24212d4e69e42c2c861" + }, + "CVE-2024-26773": { + "cmt_msg": "ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found()", + "cmt_id": "21f8cfe79f776287459343e9cfa6055af61328ea" + }, + "CVE-2024-26763": { + "cmt_msg": "dm-crypt: don't modify the data when using authenticated encryption", + "cmt_id": "43a202bd552976497474ae144942e32cc5f34d7e" + }, + "CVE-2024-26764": { + "cmt_msg": "fs/aio: Restrict kiocb_set_cancel_fn() to I/O submitted via libaio", + "cmt_id": "337b543e274fe7a8f47df3c8293cc6686ffa620f" + }, + "CVE-2024-26772": { + "cmt_msg": "ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal()", + "cmt_id": "5a6dcc4ad0f7f7fa8e8d127b5526e7c5f2d38a43" + } + }, + "4.19.309": { + "CVE-2024-26805": { + "cmt_msg": "netlink: Fix kernel-infoleak-after-free in __skb_datagram_iter", + "cmt_id": "ec343a55b687a452f5e87f3b52bf9f155864df65" + }, + "CVE-2024-26801": { + "cmt_msg": "Bluetooth: Avoid potential use-after-free in hci_error_reset", + "cmt_id": "e0b278650f07acf2e0932149183458468a731c03" + }, + "CVE-2024-26791": { + "cmt_msg": "btrfs: dev-replace: properly validate device names", + "cmt_id": "11d7a2e429c02d51e2dc90713823ea8b8d3d3a84" + }, + "CVE-2024-26793": { + "cmt_msg": "gtp: fix use-after-free and null-ptr-deref in gtp_newlink()", + "cmt_id": "01129059d5141d62fae692f7a336ae3bc712d3eb" + } + }, + "4.19.311": { + "CVE-2024-26651": { + "cmt_msg": "sr9800: Add check for usbnet_get_endpoints", + "cmt_id": "424eba06ed405d557077339edb19ce0ebe39e7c7" + }, + "CVE-2023-7042": { + "cmt_msg": "wifi: ath10k: fix NULL pointer dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev()", + "cmt_id": "0cd3b0a1dc987697cba1fe93c784365aa1f8a230" + }, + "CVE-2024-22099": { + "cmt_msg": "Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security", + "cmt_id": "369f419c097e82407dd429a202cde9a73d3ae29b" + }, + "CVE-2023-6270": { + "cmt_msg": "aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts", + "cmt_id": "ad80c34944d7175fa1f5c7a55066020002921a99" + } + }, + "outstanding": { + "CVE-2020-35501": { + "cmt_msg": "" + }, + "CVE-2023-52614": { + "cmt_msg": "PM / devfreq: Fix buffer overflow in trans_stat_show" + }, + "CVE-2023-52617": { + "cmt_msg": "PCI: switchtec: Fix stdev_release() crash after surprise hot remove" + }, + "CVE-2022-3108": { + "cmt_msg": "drm/amdkfd: Check for null pointer after calling kmemdup" + }, + "CVE-2022-47520": { + "cmt_msg": "wifi: wilc1000: validate pairwise and authentication suite offsets" + }, + "CVE-2023-52618": { + "cmt_msg": "block/rnbd-srv: Check for unlikely string overflow" + }, + "CVE-2022-0480": { + "cmt_msg": "memcg: enable accounting for file lock caches" + }, + "CVE-2021-47059": { + "cmt_msg": "crypto: sun8i-ss - fix result memory leak on error path" + }, + "CVE-2022-23825": { + "cmt_msg": "" + }, + "CVE-2021-47052": { + "cmt_msg": "crypto: sa2ul - Fix memory leak of rxd" + }, + "CVE-2021-47112": { + "cmt_msg": "x86/kvm: Teardown PV features on boot CPU as well" + }, + "CVE-2021-47113": { + "cmt_msg": "btrfs: abort in rename_exchange if we fail to insert the second ref" + }, + "CVE-2021-47110": { + "cmt_msg": "x86/kvm: Disable kvmclock on all CPUs on shutdown" + }, + "CVE-2021-47116": { + "cmt_msg": "ext4: fix memory leak in ext4_mb_init_backend on error path." + }, + "CVE-2021-47119": { + "cmt_msg": "ext4: fix memory leak in ext4_fill_super" + }, + "CVE-2019-19241": { + "cmt_msg": "io_uring: async workers should inherit the user creds" + }, + "CVE-2023-0597": { + "cmt_msg": "x86/mm: Randomize per-cpu entry area" + }, + "CVE-2019-12379": { + "cmt_msg": "consolemap: Fix a memory leaking bug in drivers/tty/vt/consolemap.c" + }, + "CVE-2019-12378": { + "cmt_msg": "ipv6_sockglue: Fix a missing-check bug in ip6_ra_control()" + }, + "CVE-2024-26592": { + "cmt_msg": "ksmbd: fix UAF issue in ksmbd_tcp_new_connection()" + }, + "CVE-2020-15802": { + "cmt_msg": "" + }, + "CVE-2024-26594": { + "cmt_msg": "ksmbd: validate mech token in session setup" + }, + "CVE-2024-26595": { + "cmt_msg": "mlxsw: spectrum_acl_tcam: Fix NULL pointer dereference in error path" + }, + "CVE-2022-3636": { + "cmt_msg": "net: ethernet: mtk_eth_soc: use after free in __mtk_ppe_check_skb()" + }, + "CVE-2024-26598": { + "cmt_msg": "KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache" + }, + "CVE-2023-52506": { + "cmt_msg": "LoongArch: Set all reserved memblocks on Node#0 at initialization" + }, + "CVE-2021-47028": { + "cmt_msg": "mt76: mt7915: fix txrate reporting" + }, + "CVE-2021-46908": { + "cmt_msg": "bpf: Use correct permission flag for mixed signed bounds arithmetic" + }, + "CVE-2024-26586": { + "cmt_msg": "mlxsw: spectrum_acl_tcam: Fix stack corruption" + }, + "CVE-2023-2007": { + "cmt_msg": "scsi: dpt_i2o: Remove obsolete driver" + }, + "CVE-2020-26145": { + "cmt_msg": "ath10k: drop fragments with multicast DA for PCIe" + }, + "CVE-2020-26141": { + "cmt_msg": "ath10k: Fix TKIP Michael MIC verification for PCIe" + }, + "CVE-2020-26140": { + "cmt_msg": "" + }, + "CVE-2020-26143": { + "cmt_msg": "" + }, + "CVE-2020-26142": { + "cmt_msg": "" + }, + "CVE-2023-1076": { + "cmt_msg": "tun: tun_chr_open(): correctly initialize socket uid" + }, + "CVE-2024-23848": { + "cmt_msg": "" + }, + "CVE-2024-26747": { + "cmt_msg": "usb: roles: fix NULL pointer issue when put module's reference" + }, + "CVE-2024-26745": { + "cmt_msg": "powerpc/pseries/iommu: IOMMU table is not initialized for kdump over SR-IOV" + }, + "CVE-2024-26743": { + "cmt_msg": "RDMA/qedr: Fix qedr_create_user_qp error flow" + }, + "CVE-2024-26740": { + "cmt_msg": "net/sched: act_mirred: use the backlog for mirred ingress" + }, + "CVE-2024-26748": { + "cmt_msg": "usb: cdns3: fix memory double free when handle zero packet" + }, + "CVE-2019-19070": { + "cmt_msg": "spi: gpio: prevent memory leak in spi_gpio_probe" + }, + "CVE-2024-26699": { + "cmt_msg": "drm/amd/display: Fix array-index-out-of-bounds in dcn35_clkmgr" + }, + "CVE-2024-26691": { + "cmt_msg": "KVM: arm64: Fix circular locking dependency" + }, + "CVE-2024-0564": { + "cmt_msg": "" + }, + "CVE-2024-0565": { + "cmt_msg": "smb: client: fix OOB in receive_encrypted_standard()" + }, + "CVE-2023-2176": { + "cmt_msg": "RDMA/core: Refactor rdma_bind_addr" + }, + "CVE-2023-2177": { + "cmt_msg": "sctp: leave the err path free in sctp_stream_init to sctp_stream_free" + }, + "CVE-2022-39189": { + "cmt_msg": "KVM: x86: do not report a vCPU as preempted outside instruction boundaries" + }, + "CVE-2022-39188": { + "cmt_msg": "mmu_gather: Force tlb-flush VM_PFNMAP vmas" + }, + "CVE-2005-3660": { + "cmt_msg": "" + }, + "CVE-2023-31084": { + "cmt_msg": "media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*()" + }, + "CVE-2023-31083": { + "cmt_msg": "Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO" + }, + "CVE-2023-31082": { + "cmt_msg": "" + }, + "CVE-2023-31081": { + "cmt_msg": "" + }, + "CVE-2024-23307": { + "cmt_msg": "md/raid5: fix atomicity violation in raid5_cache_count" + }, + "CVE-2023-52498": { + "cmt_msg": "PM: sleep: Fix possible deadlocks in core system-wide PM code" + }, + "CVE-2023-52491": { + "cmt_msg": "media: mtk-jpeg: Fix use after free bug due to error path handling in mtk_jpeg_dec_device_run" + }, + "CVE-2023-4133": { + "cmt_msg": "cxgb4: fix use after free bugs caused by circular dependency problem" + }, + "CVE-2020-26560": { + "cmt_msg": "" + }, + "CVE-2023-4134": { + "cmt_msg": "Input: cyttsp4_core - change del_timer_sync() to timer_shutdown_sync()" + }, + "CVE-2020-27820": { + "cmt_msg": "drm/nouveau: use drm_dev_unplug() during device removal" + }, + "CVE-2023-37454": { + "cmt_msg": "" + }, + "CVE-2023-52489": { + "cmt_msg": "mm/sparsemem: fix race in accessing memory_section->usage" + }, + "CVE-2023-52584": { + "cmt_msg": "spmi: mediatek: Fix UAF on device remove" + }, + "CVE-2023-33288": { + "cmt_msg": "power: supply: bq24190: Fix use after free bug in bq24190_remove due to race condition" + }, + "CVE-2022-29900": { + "cmt_msg": "x86/kvm/vmx: Make noinstr clean" + }, + "CVE-2022-29901": { + "cmt_msg": "x86/kvm/vmx: Make noinstr clean" + }, + "CVE-2022-1116": { + "cmt_msg": "" + }, + "CVE-2022-23816": { + "cmt_msg": "x86/kvm/vmx: Make noinstr clean" + }, + "CVE-2023-35827": { + "cmt_msg": "ravb: Fix use-after-free issue in ravb_tx_timeout_work()" + }, + "CVE-2023-52481": { + "cmt_msg": "arm64: errata: Add Cortex-A520 speculative unprivileged load workaround" + }, + "CVE-2023-52585": { + "cmt_msg": "drm/amdgpu: Fix possible NULL dereference in amdgpu_ras_query_error_status_helper()" + }, + "CVE-2021-47063": { + "cmt_msg": "drm: bridge/panel: Cleanup connector on bridge detach" + }, + "CVE-2023-52586": { + "cmt_msg": "drm/msm/dpu: Add mutex lock in control vblank irq" + }, + "CVE-2022-3567": { + "cmt_msg": "ipv6: Fix data races around sk->sk_prot." + }, + "CVE-2022-3566": { + "cmt_msg": "tcp: Fix data races around icsk->icsk_af_ops." + }, + "CVE-2021-47065": { + "cmt_msg": "rtw88: Fix array overrun in rtw_get_tx_power_params()" + }, + "CVE-2022-4269": { + "cmt_msg": "act_mirred: use the backlog for nested calls to mirred ingress" + }, + "CVE-2021-47147": { + "cmt_msg": "ptp: ocp: Fix a resource leak in an error handling path" + }, + "CVE-2020-36385": { + "cmt_msg": "RDMA/ucma: Rework ucma_migrate_id() to avoid races with destroy" + }, + "CVE-2023-52589": { + "cmt_msg": "media: rkisp1: Fix IRQ disable race issue" + }, + "CVE-2023-52588": { + "cmt_msg": "f2fs: fix to tag gcing flag on page during block migration" + }, + "CVE-2021-47143": { + "cmt_msg": "net/smc: remove device from smcd_dev_list after failed device_add()" + }, + "CVE-2021-46941": { + "cmt_msg": "usb: dwc3: core: Do core softreset when switch mode" + }, + "CVE-2020-7053": { + "cmt_msg": "drm/i915: Introduce a mutex for file_priv->context_idr" + }, + "CVE-2023-28466": { + "cmt_msg": "net: tls: fix possible race condition between do_tls_getsockopt_conf() and do_tls_setsockopt_conf()" + }, + "CVE-2021-47140": { + "cmt_msg": "iommu/amd: Clear DMA ops when switching domain" + }, + "CVE-2024-26765": { + "cmt_msg": "LoongArch: Disable IRQ before init_fn() for nonboot CPUs" + }, + "CVE-2023-0030": { + "cmt_msg": "drm/nouveau/mmu: add more general vmm free/node handling functions" + }, + "CVE-2020-16120": { + "cmt_msg": "ovl: switch to mounter creds in readdir" + }, + "CVE-2023-1611": { + "cmt_msg": "btrfs: fix race between quota disable and quota assign ioctls" + }, + "CVE-2024-26797": { + "cmt_msg": "drm/amd/display: Prevent potential buffer overflow in map_hw_resources" + }, + "CVE-2023-52530": { + "cmt_msg": "wifi: mac80211: fix potential key use-after-free" + }, + "CVE-2023-52531": { + "cmt_msg": "wifi: iwlwifi: mvm: Fix a memory corruption issue" + }, + "CVE-2023-52532": { + "cmt_msg": "net: mana: Fix TX CQE error handling" + }, + "CVE-2024-26798": { + "cmt_msg": "fbcon: always restore the old font data in fbcon_do_set_font()" + }, + "CVE-2023-52429": { + "cmt_msg": "dm: limit the number of targets and parameter size area" + }, + "CVE-2024-26677": { + "cmt_msg": "rxrpc: Fix delayed ACKs to not set the reference serial number" + }, + "CVE-2024-26676": { + "cmt_msg": "af_unix: Call kfree_skb() for dead unix_(sk)->oob_skb in GC." + }, + "CVE-2022-0168": { + "cmt_msg": "cifs: fix NULL ptr dereference in smb2_ioctl_query_info()" + }, + "CVE-2020-26556": { + "cmt_msg": "" + }, + "CVE-2020-26557": { + "cmt_msg": "" + }, + "CVE-2024-26776": { + "cmt_msg": "spi: hisi-sfc-v3xx: Return IRQ_NONE if no interrupts were detected" + }, + "CVE-2019-20794": { + "cmt_msg": "" + }, + "CVE-2020-26559": { + "cmt_msg": "" + }, + "CVE-2023-3397": { + "cmt_msg": "" + }, + "CVE-2024-26770": { + "cmt_msg": "HID: nvidia-shield: Add missing null pointer checks to LED initialization" + }, + "CVE-2024-26771": { + "cmt_msg": "dmaengine: ti: edma: Add some null pointer checks to the edma_probe" + }, + "CVE-2021-47083": { + "cmt_msg": "pinctrl: mediatek: fix global-out-of-bounds issue" + }, + "CVE-2023-52458": { + "cmt_msg": "block: add check that partition length needs to be aligned with block size" + }, + "CVE-2018-20854": { + "cmt_msg": "phy: ocelot-serdes: fix out-of-bounds read" + }, + "CVE-2018-1121": { + "cmt_msg": "" + }, + "CVE-2023-28746": { + "cmt_msg": "x86/mmio: Disable KVM mitigation when X86_FEATURE_CLEAR_CPU_BUF is set" + }, + "CVE-2021-46970": { + "cmt_msg": "bus: mhi: pci_generic: Remove WQ_MEM_RECLAIM flag from state workqueue" + }, + "CVE-2019-15794": { + "cmt_msg": "ovl: fix reference counting in ovl_mmap error path" + }, + "CVE-2022-3344": { + "cmt_msg": "KVM: x86: nSVM: harden svm_free_nested against freeing vmcb02 while still in use" + }, + "CVE-2023-23000": { + "cmt_msg": "phy: tegra: xusb: Fix return value of tegra_xusb_find_port_node function" + }, + "CVE-2023-6240": { + "cmt_msg": "" + }, + "CVE-2024-26700": { + "cmt_msg": "drm/amd/display: Fix MST Null Ptr for RV" + }, + "CVE-2024-26706": { + "cmt_msg": "parisc: Fix random data corruption from exception handler" + }, + "CVE-2022-0382": { + "cmt_msg": "net ticp:fix a kernel-infoleak in __tipc_sendmsg()" + }, + "CVE-2019-15222": { + "cmt_msg": "ALSA: usb-audio: Fix gpf in snd_usb_pipe_sanity_check" + }, + "CVE-2024-23196": { + "cmt_msg": "ALSA: hda: fix a possible null-pointer dereference due to data race in snd_hdac_regmap_sync()" + }, + "CVE-2019-19815": { + "cmt_msg": "f2fs: support swap file w/ DIO" + }, + "CVE-2019-19814": { + "cmt_msg": "" + }, + "CVE-2023-52620": { + "cmt_msg": "netfilter: nf_tables: disallow timeout for anonymous sets" + }, + "CVE-2023-52621": { + "cmt_msg": "bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers" + }, + "CVE-2023-52624": { + "cmt_msg": "drm/amd/display: Wake DMCUB before executing GPINT commands" + }, + "CVE-2023-52625": { + "cmt_msg": "drm/amd/display: Refactor DMCUB enter/exit idle interface" + }, + "CVE-2023-52628": { + "cmt_msg": "netfilter: nftables: exthdr: fix 4-byte stack OOB write" + }, + "CVE-2023-52629": { + "cmt_msg": "sh: push-switch: Reorder cleanup operations to avoid use-after-free bug" + }, + "CVE-2022-3115": { + "cmt_msg": "drm: mali-dp: potential dereference of null pointer" + }, + "CVE-2022-3523": { + "cmt_msg": "mm/memory.c: fix race when faulting a device private page" + }, + "CVE-2022-3522": { + "cmt_msg": "mm/hugetlb: use hugetlb_pte_stable in migration race check" + }, + "CVE-2008-2544": { + "cmt_msg": "" + }, + "CVE-2021-47101": { + "cmt_msg": "asix: fix uninit-value in asix_mdio_read()" + }, + "CVE-2021-46984": { + "cmt_msg": "kyber: fix out of bounds access when preempted" + }, + "CVE-2021-46982": { + "cmt_msg": "f2fs: compress: fix race condition of overwrite vs truncate" + }, + "CVE-2007-3719": { + "cmt_msg": "" + }, + "CVE-2023-3863": { + "cmt_msg": "net: nfc: Fix use-after-free caused by nfc_llcp_find_local" + }, + "CVE-2024-26584": { + "cmt_msg": "net: tls: handle backlogging of crypto requests" + }, + "CVE-2022-1247": { + "cmt_msg": "" + }, + "CVE-2022-2991": { + "cmt_msg": "remove the lightnvm subsystem" + }, + "CVE-2022-3624": { + "cmt_msg": "bonding: fix reference count leak in balance-alb mode" + }, + "CVE-2022-3625": { + "cmt_msg": "devlink: Fix use-after-free after a failed reload" + }, + "CVE-2021-3669": { + "cmt_msg": "ipc: replace costly bailout check in sysvipc_find_ipc()" + }, + "CVE-2022-4543": { + "cmt_msg": "" + }, + "CVE-2023-52571": { + "cmt_msg": "power: supply: rk817: Fix node refcount leak" + }, + "CVE-2023-52572": { + "cmt_msg": "cifs: Fix UAF in cifs_demultiplex_thread()" + }, + "CVE-2023-4881": { + "cmt_msg": "netfilter: nftables: exthdr: fix 4-byte stack OOB write" + }, + "CVE-2013-7445": { + "cmt_msg": "" + }, + "CVE-2024-26733": { + "cmt_msg": "arp: Prevent overflow in arp_req_get()." + }, + "CVE-2024-26736": { + "cmt_msg": "afs: Increase buffer size in afs_update_volume_status()" + }, + "CVE-2024-26738": { + "cmt_msg": "powerpc/pseries/iommu: DLPAR add doesn't completely initialize pci_controller" + }, + "CVE-2024-26739": { + "cmt_msg": "net/sched: act_mirred: don't override retval if we already lost the skb" + }, + "CVE-2022-38096": { + "cmt_msg": "" + }, + "CVE-2022-3303": { + "cmt_msg": "ALSA: pcm: oss: Fix race at SNDCTL_DSP_SYNC" + }, + "CVE-2022-20148": { + "cmt_msg": "f2fs: fix UAF in f2fs_available_free_memory" + }, + "CVE-2020-12362": { + "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" + }, + "CVE-2020-12363": { + "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" + }, + "CVE-2022-4129": { + "cmt_msg": "l2tp: Serialize access to sk_user_data with sk_callback_lock" + }, + "CVE-2020-12364": { + "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" + }, + "CVE-2024-26646": { + "cmt_msg": "thermal: intel: hfi: Add syscore callbacks for system-wide PM" + }, + "CVE-2024-26647": { + "cmt_msg": "drm/amd/display: Fix late derefrence 'dsc' check in 'link_set_dsc_pps_packet()'" + }, + "CVE-2024-26644": { + "cmt_msg": "btrfs: don't abort filesystem when attempting to snapshot deleted subvolume" + }, + "CVE-2024-26642": { + "cmt_msg": "netfilter: nf_tables: disallow anonymous set with timeout flag" + }, + "CVE-2024-26640": { + "cmt_msg": "tcp: add sanity checks to rx zerocopy" + }, + "CVE-2024-26641": { + "cmt_msg": "ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv()" + }, + "CVE-2019-15290": { + "cmt_msg": "" + }, + "CVE-2021-32078": { + "cmt_msg": "ARM: footbridge: remove personal server platform" + }, + "CVE-2020-12656": { + "cmt_msg": "sunrpc: check that domain table is empty at module unload." + }, + "CVE-2024-2193": { + "cmt_msg": "" + }, + "CVE-2018-12930": { + "cmt_msg": "" + }, + "CVE-2018-12931": { + "cmt_msg": "" + }, + "CVE-2019-12380": { + "cmt_msg": "efi/x86/Add missing error handling to old_memmap 1:1 mapping code" + }, + "CVE-2019-12381": { + "cmt_msg": "ip_sockglue: Fix missing-check bug in ip_ra_control()" + }, + "CVE-2024-26648": { + "cmt_msg": "drm/amd/display: Fix variable deferencing before NULL check in edp_setup_replay()" + }, + "CVE-2020-36782": { + "cmt_msg": "i2c: imx-lpi2c: fix reference leak when pm_runtime_get_sync fails" + }, + "CVE-2020-36783": { + "cmt_msg": "i2c: img-scb: fix reference leak when pm_runtime_get_sync fails" + }, + "CVE-2020-36780": { + "cmt_msg": "i2c: sprd: fix reference leak when pm_runtime_get_sync fails" + }, + "CVE-2020-36781": { + "cmt_msg": "i2c: imx: fix reference leak when pm_runtime_get_sync fails" + }, + "CVE-2020-36784": { + "cmt_msg": "i2c: cadence: fix reference leak when pm_runtime_get_sync fails" + }, + "CVE-2020-27835": { + "cmt_msg": "IB/hfi1: Ensure correct mm is used at all times" + }, + "CVE-2019-0149": { + "cmt_msg": "i40e: Add bounds check for ch[] array" + }, + "CVE-2022-3903": { + "cmt_msg": "media: mceusb: Use new usb_control_msg_*() routines" + }, + "CVE-2023-20588": { + "cmt_msg": "x86/CPU/AMD: Do not leak quotient data after a division by 0" + }, + "CVE-2021-47070": { + "cmt_msg": "uio_hv_generic: Fix another memory leak in error handling paths" + }, + "CVE-2022-44034": { + "cmt_msg": "char: pcmcia: remove all the drivers" + }, + "CVE-2022-44033": { + "cmt_msg": "char: pcmcia: remove all the drivers" + }, + "CVE-2021-47074": { + "cmt_msg": "nvme-loop: fix memory leak in nvme_loop_create_ctrl()" + }, + "CVE-2021-47077": { + "cmt_msg": "scsi: qedf: Add pointer checks in qedf_update_link_speed()" + }, + "CVE-2021-47076": { + "cmt_msg": "RDMA/rxe: Return CQE error if invalid lkey was supplied" + }, + "CVE-2021-47172": { + "cmt_msg": "iio: adc: ad7124: Fix potential overflow due to non sequential channel numbers" + }, + "CVE-2023-39198": { + "cmt_msg": "drm/qxl: fix UAF on handle creation" + }, + "CVE-2021-46951": { + "cmt_msg": "tpm: efi: Use local variable for calculating final log size" + }, + "CVE-2019-11191": { + "cmt_msg": "x86: Deprecate a.out support" + }, + "CVE-2021-46952": { + "cmt_msg": "NFS: fs_context: validate UDP retrans to prevent shift out-of-bounds" + }, + "CVE-2021-46959": { + "cmt_msg": "spi: Fix use-after-free with devm_spi_alloc_*" + }, + "CVE-2023-5178": { + "cmt_msg": "nvmet-tcp: Fix a possible UAF in queue intialization setup" + }, + "CVE-2021-0929": { + "cmt_msg": "staging/android/ion: delete dma_buf->kmap/unmap implemenation" + }, + "CVE-2021-47158": { + "cmt_msg": "net: dsa: sja1105: add error handling in sja1105_setup()" + }, + "CVE-2024-26672": { + "cmt_msg": "drm/amdgpu: Fix variable 'mca_funcs' dereferenced before NULL check in 'amdgpu_mca_smu_get_mca_entry()'" + }, + "CVE-2023-3006": { + "cmt_msg": "arm64: Add AMPERE1 to the Spectre-BHB affected list" + }, + "CVE-2023-52522": { + "cmt_msg": "net: fix possible store tearing in neigh_periodic_work()" + }, + "CVE-2024-26784": { + "cmt_msg": "pmdomain: arm: Fix NULL dereference on scmi_perf_domain removal" + }, + "CVE-2024-26789": { + "cmt_msg": "crypto: arm64/neonbs - fix out-of-bounds access on short input" + }, + "CVE-2019-2181": { + "cmt_msg": "binder: check for overflow when alloc for security context" + }, + "CVE-2024-22386": { + "cmt_msg": "" + }, + "CVE-2023-39197": { + "cmt_msg": "netfilter: conntrack: dccp: copy entire header to stack buffer, not just basic one" + }, + "CVE-2024-26774": { + "cmt_msg": "ext4: avoid dividing by 0 in mb_update_avg_fragment_size() when block bitmap corrupt" + }, + "CVE-2020-26541": { + "cmt_msg": "certs: Add EFI_CERT_X509_GUID support for dbx entries" + }, + "CVE-2023-6610": { + "cmt_msg": "smb: client: fix potential OOB in smb2_dump_detail()" + }, + "CVE-2024-26775": { + "cmt_msg": "aoe: avoid potential deadlock at set_capacity" + }, + "CVE-2024-26769": { + "cmt_msg": "nvmet-fc: avoid deadlock on delete association path" + }, + "CVE-2024-26768": { + "cmt_msg": "LoongArch: Change acpi_core_pic[NR_CPUS] to acpi_core_pic[MAX_CORE_PIC]" + }, + "CVE-2021-33061": { + "cmt_msg": "ixgbe: add improvement for MDD response functionality" + }, + "CVE-2024-26767": { + "cmt_msg": "drm/amd/display: fixed integer types and null check locations" + }, + "CVE-2023-1476": { + "cmt_msg": "" + }, + "CVE-2021-3864": { + "cmt_msg": "" + }, + "CVE-2023-20569": { + "cmt_msg": "x86/bugs: Increase the x86 bugs vector size to two u32s" + }, + "CVE-2022-1789": { + "cmt_msg": "KVM: x86/mmu: fix NULL pointer dereference on guest INVPCID" + }, + "CVE-2016-8660": { + "cmt_msg": "" + }, + "CVE-2023-1582": { + "cmt_msg": "fs/proc: task_mmu.c: don't read mapcount for migration entry" + }, + "CVE-2022-1786": { + "cmt_msg": "io_uring: remove io_identity" + }, + "CVE-2008-4609": { + "cmt_msg": "" + }, + "CVE-2023-6356": { + "cmt_msg": "nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length" + }, + "CVE-2023-52639": { + "cmt_msg": "KVM: s390: vsie: fix race during shadow creation" + }, + "CVE-2023-52638": { + "cmt_msg": "can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock" + }, + "CVE-2019-15239": { + "cmt_msg": "unknown" + }, + "CVE-2023-52635": { + "cmt_msg": "PM / devfreq: Synchronize devfreq_monitor_[start/stop]" + }, + "CVE-2023-52634": { + "cmt_msg": "drm/amd/display: Fix disable_otg_wa logic" + }, + "CVE-2023-52633": { + "cmt_msg": "um: time-travel: fix time corruption" + }, + "CVE-2023-52632": { + "cmt_msg": "drm/amdkfd: Fix lock dependency warning with srcu" + }, + "CVE-2021-4037": { + "cmt_msg": "xfs: fix up non-directory creation in SGID directories" + }, + "CVE-2023-20941": { + "cmt_msg": "" + }, + "CVE-2022-3533": { + "cmt_msg": "" + }, + "CVE-2022-3534": { + "cmt_msg": "libbpf: Fix use-after-free in btf_dump_name_dups" + }, + "CVE-2021-47135": { + "cmt_msg": "mt76: mt7921: fix possible AOOB issue in mt7921_mcu_tx_rate_report" + }, + "CVE-2021-47136": { + "cmt_msg": "net: zero-initialize tc skb extension on allocation" + }, + "CVE-2021-47137": { + "cmt_msg": "net: lantiq: fix memory corruption in RX ring" + }, + "CVE-2021-47131": { + "cmt_msg": "net/tls: Fix use-after-free after the TLS device goes down and up" + }, + "CVE-2021-47133": { + "cmt_msg": "HID: amd_sfh: Fix memory leak in amd_sfh_work" + }, + "CVE-2022-3061": { + "cmt_msg": "video: fbdev: i740fb: Error out if 'pixclock' equals zero" + }, + "CVE-2023-0386": { + "cmt_msg": "ovl: fail on invalid uid/gid mapping at copy up" + }, + "CVE-2023-6121": { + "cmt_msg": "nvmet: nul-terminate the NQNs passed in the connect command" + }, + "CVE-2017-13693": { + "cmt_msg": "" + }, + "CVE-2017-13694": { + "cmt_msg": "" + }, + "CVE-2022-48627": { + "cmt_msg": "vt: fix memory overlapping when deleting chars in the buffer" + }, + "CVE-2022-48628": { + "cmt_msg": "ceph: drop messages from MDS when unmounting" + }, + "CVE-2024-24859": { + "cmt_msg": "" + }, + "CVE-2024-24858": { + "cmt_msg": "" + }, + "CVE-2024-24855": { + "cmt_msg": "scsi: lpfc: Fix a possible data race in lpfc_unregister_fcf_rescan()" + }, + "CVE-2024-24857": { + "cmt_msg": "" + }, + "CVE-2023-52569": { + "cmt_msg": "btrfs: remove BUG() after failure to insert delayed dir index item" + }, + "CVE-2023-52568": { + "cmt_msg": "x86/sgx: Resolves SECS reclaim vs. page fault for EAUG race" + }, + "CVE-2023-52563": { + "cmt_msg": "drm/meson: fix memory leak on ->hpd_notify callback" + }, + "CVE-2023-52561": { + "cmt_msg": "arm64: dts: qcom: sdm845-db845c: Mark cont splash memory region as reserved" + }, + "CVE-2023-52565": { + "cmt_msg": "media: uvcvideo: Fix OOB read" + }, + "CVE-2021-46928": { + "cmt_msg": "parisc: Clear stale IIR value on instruction access rights trap" + }, + "CVE-2021-46925": { + "cmt_msg": "net/smc: fix kernel panic caused by race of smc_sock" + }, + "CVE-2021-46926": { + "cmt_msg": "ALSA: hda: intel-sdw-acpi: harden detection of controller" + }, + "CVE-2020-0347": { + "cmt_msg": "" + }, + "CVE-2022-41222": { + "cmt_msg": "mm/mremap: hold the rmap lock in write mode when moving page table entries." + }, + "CVE-2019-12455": { + "cmt_msg": "clk-sunxi: fix a missing-check bug in sunxi_divs_clk_setup()" + }, + "CVE-2019-12456": { + "cmt_msg": "" + }, + "CVE-2019-18680": { + "cmt_msg": "" + }, + "CVE-2023-6546": { + "cmt_msg": "tty: n_gsm: fix the UAF caused by race condition in gsm_cleanup_mux" + }, + "CVE-2024-26726": { + "cmt_msg": "btrfs: don't drop extent_map for free space inode on write error" + }, + "CVE-2022-3642": { + "cmt_msg": "" + }, + "CVE-2023-52519": { + "cmt_msg": "HID: intel-ish-hid: ipc: Disable and reenable ACPI GPE bit" + }, + "CVE-2023-52516": { + "cmt_msg": "dma-debug: don't call __dma_entry_alloc_check_leak() under free_entries_lock" + }, + "CVE-2023-52517": { + "cmt_msg": "spi: sun6i: fix race between DMA RX transfer completion and RX FIFO drain" + }, + "CVE-2023-52515": { + "cmt_msg": "RDMA/srp: Do not call scsi_done() from srp_abort()" + }, + "CVE-2024-25739": { + "cmt_msg": "" + }, + "CVE-2023-52511": { + "cmt_msg": "spi: sun6i: reduce DMA RX transfer width to single byte" + }, + "CVE-2023-6535": { + "cmt_msg": "" + }, + "CVE-2023-6536": { + "cmt_msg": "nvmet-tcp: fix a crash in nvmet_req_complete()" + }, + "CVE-2020-15780": { + "cmt_msg": "ACPI: configfs: Disallow loading ACPI tables when locked down" + }, + "CVE-2018-17977": { + "cmt_msg": "" + }, + "CVE-2024-1151": { + "cmt_msg": "net: openvswitch: limit the number of recursions from action sets" + }, + "CVE-2024-26659": { + "cmt_msg": "xhci: handle isoc Babble and Buffer Overrun events properly" + }, + "CVE-2024-26658": { + "cmt_msg": "bcachefs: grab s_umount only if snapshotting" + }, + "CVE-2010-5321": { + "cmt_msg": "" + }, + "CVE-2024-26655": { + "cmt_msg": "Fix memory leak in posix_clock_open()" + }, + "CVE-2024-26654": { + "cmt_msg": "ALSA: sh: aica: reorder cleanup operations to avoid UAF bugs" + }, + "CVE-2024-26656": { + "cmt_msg": "drm/amdgpu: fix use-after-free bug" + }, + "CVE-2024-26650": { + "cmt_msg": "platform/x86: p2sb: Allow p2sb_bar() calls during PCI device probe" + }, + "CVE-2022-3169": { + "cmt_msg": "nvme: ensure subsystem reset is single threaded" + }, + "CVE-2023-52474": { + "cmt_msg": "IB/hfi1: Fix bugs with non-PAGE_SIZE-end multi-iovec user SDMA requests" + }, + "CVE-2023-52476": { + "cmt_msg": "perf/x86/lbr: Filter vsyscall addresses" + }, + "CVE-2023-22995": { + "cmt_msg": "usb: dwc3: dwc3-qcom: Add missing platform_device_put() in dwc3_qcom_acpi_register_core" + }, + "CVE-2024-21803": { + "cmt_msg": "" + }, + "CVE-2023-52479": { + "cmt_msg": "ksmbd: fix uaf in smb20_oplock_break_ack" + }, + "CVE-2021-3542": { + "cmt_msg": "" + }, + "CVE-2023-34255": { + "cmt_msg": "xfs: verify buffer contents when we skip log replay" + }, + "CVE-2018-12929": { + "cmt_msg": "" + }, + "CVE-2018-12928": { + "cmt_msg": "" + }, + "CVE-2020-36310": { + "cmt_msg": "KVM: SVM: avoid infinite loop on NPF from bad address" + }, + "CVE-2020-36313": { + "cmt_msg": "KVM: Fix out of range accesses to memslots" + }, + "CVE-2020-10708": { + "cmt_msg": "" + }, + "CVE-2022-0400": { + "cmt_msg": "" + }, + "CVE-2024-26808": { + "cmt_msg": "netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain" + }, + "CVE-2024-26809": { + "cmt_msg": "netfilter: nft_set_pipapo: release elements in clone only from destroy path" + }, + "CVE-2024-26804": { + "cmt_msg": "net: ip_tunnel: prevent perpetual headroom growth" + }, + "CVE-2024-26806": { + "cmt_msg": "spi: cadence-qspi: remove system-wide suspend helper calls from runtime PM hooks" + }, + "CVE-2024-26802": { + "cmt_msg": "stmmac: Clear variable when destroying workqueue" + }, + "CVE-2024-26803": { + "cmt_msg": "net: veth: clear GRO when clearing XDP even when down" + }, + "CVE-2022-25265": { + "cmt_msg": "" + }, + "CVE-2022-21499": { + "cmt_msg": "lockdown: also lock down previous kgdb use" + }, + "CVE-2023-3640": { + "cmt_msg": "" + }, + "CVE-2023-3022": { + "cmt_msg": "ipv6: Use result arg in fib_lookup_arg consistently" + }, + "CVE-2021-47049": { + "cmt_msg": "Drivers: hv: vmbus: Use after free in __vmbus_open()" + }, + "CVE-2021-47046": { + "cmt_msg": "drm/amd/display: Fix off by one in hdmi_14_process_transaction()" + }, + "CVE-2023-4010": { + "cmt_msg": "" + }, + "CVE-2021-47167": { + "cmt_msg": "NFS: Fix an Oopsable condition in __nfs_pageio_add_request()" + }, + "CVE-2022-20424": { + "cmt_msg": "io_uring: remove io_identity" + }, + "CVE-2021-47163": { + "cmt_msg": "tipc: wait and exit until all work queues are done" + }, + "CVE-2021-46969": { + "cmt_msg": "bus: mhi: core: Fix invalid error returning in mhi_queue" + }, + "CVE-2021-46965": { + "cmt_msg": "mtd: physmap: physmap-bt1-rom: Fix unintentional stack access" + }, + "CVE-2021-46962": { + "cmt_msg": "mmc: uniphier-sd: Fix a resource leak in the remove function" + }, + "CVE-2019-19378": { + "cmt_msg": "" + }, + "CVE-2021-3759": { + "cmt_msg": "memcg: enable accounting of ipc resources" + }, + "CVE-2020-24503": { + "cmt_msg": "" + }, + "CVE-2020-24502": { + "cmt_msg": "" + }, + "CVE-2019-19449": { + "cmt_msg": "f2fs: fix to do sanity check on segment/section count" + }, + "CVE-2020-24504": { + "cmt_msg": "ice: create scheduler aggregator node config and move VSIs" + }, + "CVE-2020-11725": { + "cmt_msg": "" + }, + "CVE-2022-1263": { + "cmt_msg": "KVM: avoid NULL pointer dereference in kvm_dirty_ring_push" + }, + "CVE-2022-3606": { + "cmt_msg": "" + }, + "CVE-2022-2209": { + "cmt_msg": "" + }, + "CVE-2022-3595": { + "cmt_msg": "cifs: fix double-fault crash during ntlmssp" + }, + "CVE-2023-52559": { + "cmt_msg": "iommu/vt-d: Avoid memory allocation in iommu_suspend()" + }, + "CVE-2023-47233": { + "cmt_msg": "wifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach" + }, + "CVE-2024-23851": { + "cmt_msg": "dm: limit the number of targets and parameter size area" + }, + "CVE-2021-26934": { + "cmt_msg": "" + }, + "CVE-2024-26758": { + "cmt_msg": "md: Don't ignore suspended array in md_check_recovery()" + }, + "CVE-2024-26759": { + "cmt_msg": "mm/swap: fix race when skipping swapcache" + }, + "CVE-2024-26614": { + "cmt_msg": "tcp: make sure init the accept_queue's spinlocks once" + }, + "CVE-2024-26756": { + "cmt_msg": "md: Don't register sync_thread for reshape directly" + }, + "CVE-2024-26757": { + "cmt_msg": "md: Don't ignore read-only array in md_check_recovery()" + }, + "CVE-2019-20908": { + "cmt_msg": "efi: Restrict efivar_ssdt_load when the kernel is locked down" + }, + "CVE-2023-52435": { + "cmt_msg": "net: prevent mss overflow in skb_segment()" + }, + "CVE-2023-52434": { + "cmt_msg": "smb: client: fix potential OOBs in smb2_parse_contexts()" + }, + "CVE-2024-26689": { + "cmt_msg": "ceph: prevent use-after-free in encode_cap_msg()" + }, + "CVE-2022-2961": { + "cmt_msg": "" + }, + "CVE-2024-26686": { + "cmt_msg": "fs/proc: do_task_stat: use sig->stats_lock to gather the threads/children stats" + }, + "CVE-2024-26687": { + "cmt_msg": "xen/events: close evtchn after mapping cleanup" + }, + "CVE-2023-51779": { + "cmt_msg": "Bluetooth: af_bluetooth: Fix Use-After-Free in bt_sock_recvmsg" + }, + "CVE-2023-6915": { + "cmt_msg": "ida: Fix crash in ida_free when the bitmap is empty" + }, + "CVE-2010-4563": { + "cmt_msg": "" + }, + "CVE-2023-1249": { + "cmt_msg": "coredump: Use the vma snapshot in fill_files_note" + }, + "CVE-2021-4218": { + "cmt_msg": "sysctl: pass kernel pointers to ->proc_handler" + }, + "CVE-2023-4622": { + "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES" + }, + "CVE-2021-20177": { + "cmt_msg": "netfilter: add and use nf_hook_slow_list()" + }, + "CVE-2021-4023": { + "cmt_msg": "io-wq: fix cancellation on create-worker failure" + }, + "CVE-2023-52640": { + "cmt_msg": "fs/ntfs3: Fix oob in ntfs_listxattr" + }, + "CVE-2023-52641": { + "cmt_msg": "fs/ntfs3: Add NULL ptr dereference checking at the end of attr_allocate_frame()" + }, + "CVE-2021-0399": { + "cmt_msg": "" + }, + "CVE-2023-52488": { + "cmt_msg": "serial: sc16is7xx: convert from _raw_ to _noinc_ regmap functions for FIFO" + }, + "CVE-2020-36691": { + "cmt_msg": "netlink: limit recursion depth in policy validation" + }, + "CVE-2023-52484": { + "cmt_msg": "iommu/arm-smmu-v3: Fix soft lockup triggered by arm_smmu_mm_invalidate_range" + }, + "CVE-2023-52485": { + "cmt_msg": "drm/amd/display: Wake DMCUB before sending a command" + }, + "CVE-2023-52480": { + "cmt_msg": "ksmbd: fix race condition between session lookup and expire" + }, + "CVE-2012-4542": { + "cmt_msg": "" + }, + "CVE-2023-52482": { + "cmt_msg": "x86/srso: Add SRSO mitigation for Hygon processors" + }, + "CVE-2021-47075": { + "cmt_msg": "nvmet: fix memory leak in nvmet_alloc_ctrl()" + }, + "CVE-2020-14304": { + "cmt_msg": "" + }, + "CVE-2022-44032": { + "cmt_msg": "char: pcmcia: remove all the drivers" + }, + "CVE-2020-36775": { + "cmt_msg": "f2fs: fix to avoid potential deadlock" + }, + "CVE-2021-47128": { + "cmt_msg": "bpf, lockdown, audit: Fix buggy SELinux lockdown permission checks" + }, + "CVE-2021-47125": { + "cmt_msg": "sch_htb: fix refcount leak in htb_parent_to_leaf_offload" + }, + "CVE-2021-47124": { + "cmt_msg": "io_uring: fix link timeout refs" + }, + "CVE-2022-36402": { + "cmt_msg": "drm/vmwgfx: Fix shader stage validation" + }, + "CVE-2021-4150": { + "cmt_msg": "block: fix incorrect references to disk objects" + }, + "CVE-2021-47175": { + "cmt_msg": "net/sched: fq_pie: fix OOB access in the traffic path" + }, + "CVE-2021-29155": { + "cmt_msg": "bpf: Use correct permission flag for mixed signed bounds arithmetic" + }, + "CVE-2021-3714": { + "cmt_msg": "" + }, + "CVE-2021-3892": { + "cmt_msg": "" + }, + "CVE-2024-24860": { + "cmt_msg": "Bluetooth: Fix atomicity violation in {min,max}_key_size_set" + }, + "CVE-2024-24861": { + "cmt_msg": "media: xc4000: Fix atomicity violation in xc4000_get_frequency" + }, + "CVE-2024-24864": { + "cmt_msg": "" + }, + "CVE-2023-52596": { + "cmt_msg": "sysctl: Fix out of bounds access for empty sysctl registers" + }, + "CVE-2023-52595": { + "cmt_msg": "wifi: rt2x00: restart beacon queue when hardware reset" + }, + "CVE-2023-52593": { + "cmt_msg": "wifi: wfx: fix possible NULL pointer dereference in wfx_set_mfp_ap()" + }, + "CVE-2023-52590": { + "cmt_msg": "ocfs2: Avoid touching renamed directory if parent does not change" + }, + "CVE-2023-52591": { + "cmt_msg": "reiserfs: Avoid touching renamed directory if parent does not change" + }, + "CVE-2021-47151": { + "cmt_msg": "interconnect: qcom: bcm-voter: add a missing of_node_put()" + }, + "CVE-2024-26627": { + "cmt_msg": "scsi: core: Move scsi_host_busy() out of host lock for waking up EH handler" + }, + "CVE-2022-23222": { + "cmt_msg": "bpf: Replace PTR_TO_XXX_OR_NULL with PTR_TO_XXX | PTR_MAYBE_NULL" + }, + "CVE-2024-26622": { + "cmt_msg": "tomoyo: fix UAF write bug in tomoyo_write_control()" + }, + "CVE-2024-26623": { + "cmt_msg": "pds_core: Prevent race issues involving the adminq" + }, + "CVE-2022-41848": { + "cmt_msg": "" + }, + "CVE-2021-39801": { + "cmt_msg": "" + }, + "CVE-2021-39800": { + "cmt_msg": "" + }, + "CVE-2022-20166": { + "cmt_msg": "drivers core: Use sysfs_emit and sysfs_emit_at for show(device *...) functions" + }, + "CVE-2022-45885": { + "cmt_msg": "" + }, + "CVE-2022-45884": { + "cmt_msg": "" + }, + "CVE-2024-25740": { + "cmt_msg": "" + }, + "CVE-2024-25741": { + "cmt_msg": "" + }, + "CVE-2023-52509": { + "cmt_msg": "ravb: Fix use-after-free issue in ravb_tx_timeout_work()" + }, + "CVE-2023-52508": { + "cmt_msg": "nvme-fc: Prevent null pointer dereference in nvme_fc_io_getuuid()" + }, + "CVE-2024-25744": { + "cmt_msg": "x86/coco: Disable 32-bit emulation by default on TDX and SEV" + }, + "CVE-2019-10220": { + "cmt_msg": "Convert filldir[64]() from __put_user() to unsafe_put_user()" + }, + "CVE-2023-2124": { + "cmt_msg": "xfs: verify buffer contents when we skip log replay" + }, + "CVE-2023-52501": { + "cmt_msg": "ring-buffer: Do not attempt to read past \"commit\"" + }, + "CVE-2023-52500": { + "cmt_msg": "scsi: pm80xx: Avoid leaking tags when processing OPC_INB_SET_CONTROLLER_CONFIG command" + }, + "CVE-2023-1281": { + "cmt_msg": "net/sched: tcindex: update imperfect hash filters respecting rcu" + }, + "CVE-2022-27672": { + "cmt_msg": "x86/speculation: Identify processors vulnerable to SMT RSB predictions" + }, + "CVE-2024-26668": { + "cmt_msg": "netfilter: nft_limit: reject configurations that cause integer overflow" + }, + "CVE-2015-2877": { + "cmt_msg": "" + }, + "CVE-2023-26242": { + "cmt_msg": "" + }, + "CVE-2019-16089": { + "cmt_msg": "" + }, + "CVE-2024-26715": { + "cmt_msg": "usb: dwc3: gadget: Fix NULL pointer dereference in dwc3_gadget_suspend" + }, + "CVE-2021-3847": { + "cmt_msg": "" + }, + "CVE-2023-52442": { + "cmt_msg": "ksmbd: validate session id and tree id in compound request" + }, + "CVE-2022-1280": { + "cmt_msg": "drm: avoid circular locks in drm_mode_getconnector" + }, + "CVE-2011-4917": { + "cmt_msg": "" + }, + "CVE-2011-4916": { + "cmt_msg": "" + }, + "CVE-2023-23039": { + "cmt_msg": "" + }, + "CVE-2024-26719": { + "cmt_msg": "nouveau: offload fence uevents work to workqueue" + }, + "CVE-2019-5489": { + "cmt_msg": "Change mincore() to count \"mapped\" pages rather than \"cached\" pages" + }, + "CVE-2024-1312": { + "cmt_msg": "mm: lock_vma_under_rcu() must check vma->anon_vma under vma lock" + }, + "CVE-2024-26713": { + "cmt_msg": "powerpc/pseries/iommu: Fix iommu initialisation during DLPAR add" + } + } + }, + "4.18": { + "4.18-rc1": { + "CVE-2019-19083": { + "cmt_msg": "drm/amd/display: memory leak", + "cmt_id": "9ea29a1f8b9da52d8eca8b0996f1d84eac548d3b" + } + }, + "4.18.1": { + "CVE-2018-3646": { + "cmt_msg": "x86/microcode: Allow late microcode loading with SMT disabled", + "cmt_id": "abf914eefa19098727455f11acd895c57621a822" + }, + "CVE-2018-3620": { + "cmt_msg": "x86/microcode: Allow late microcode loading with SMT disabled", + "cmt_id": "abf914eefa19098727455f11acd895c57621a822" + }, + "CVE-2018-15572": { + "cmt_msg": "x86/speculation: Protect against userspace-userspace spectreRSB", + "cmt_id": "f8a0aeefc2f6e1bfd6653fcc30453ce7e582fac8" + }, + "CVE-2018-15594": { + "cmt_msg": "x86/paravirt: Fix spectre-v2 mitigations for paravirt guests", + "cmt_id": "b13b271933eea6161e741825487d6e73e800bedf" + } + }, + "4.18.2": { + "CVE-2018-9363": { + "cmt_msg": "Bluetooth: hidp: buffer overflow in hidp_process_report", + "cmt_id": "f47e3431b15ae9cae8acc0fdf20fc083422c9f61" + } + }, + "4.18.5": { + "CVE-2018-3693": { + "cmt_msg": "ext4: fix spectre gadget in ext4_mb_regular_allocator()", + "cmt_id": "5b6ea348768d5b26adeeef384971820e24710ad0" + } + }, + "4.18.6": { + "CVE-2018-16658": { + "cmt_msg": "cdrom: Fix info leak/OOB read in cdrom_ioctl_drive_status", + "cmt_id": "6575b15002bfe33cc8345c6b6c3845365e154c85" + }, + "CVE-2018-14656": { + "cmt_msg": "x86/dumpstack: Don't dump kernel memory based on usermode RIP", + "cmt_id": "8e6d15678656e3770e7d3720600a41a02d9a841f" + } + }, + "4.18.7": { + "CVE-2018-20855": { + "cmt_msg": "IB/mlx5: Fix leaking stack memory to userspace", + "cmt_id": "103a3a62e0fbe718f2c85f029544163f332d19d3" + }, + "CVE-2018-20856": { + "cmt_msg": "block: blk_init_allocated_queue() set q->fq as NULL in the fail case", + "cmt_id": "cde67159df4d6faab6816f7847219eb2b29f3c8b" + } + }, + "4.18.8": { + "CVE-2018-14617": { + "cmt_msg": "hfsplus: fix NULL dereference in hfsplus_lookup()", + "cmt_id": "d30de7347e2993a99a647fa5887ed227466e17ab" + }, + "CVE-2018-14612": { + "cmt_msg": "btrfs: tree-checker: Detect invalid and empty essential trees", + "cmt_id": "4fb2799b05c2358453eaf25c9a1352d35e13b9cf" + }, + "CVE-2018-14609": { + "cmt_msg": "btrfs: relocation: Only remove reloc rb_trees if reloc control has been initialized", + "cmt_id": "13b0dbef7dd51d845f17fd43fef46f356283b797" + } + }, + "4.18.9": { + "CVE-2018-13100": { + "cmt_msg": "f2fs: fix to do sanity check with secs_per_zone", + "cmt_id": "0342426f2bf7298a91efee659ddc033082f6918b" + }, + "CVE-2018-13098": { + "cmt_msg": "f2fs: fix to do sanity check with extra_attr feature", + "cmt_id": "b6f493453c78311598fdd204f7815e683818512a" + }, + "CVE-2018-13099": { + "cmt_msg": "f2fs: fix to do sanity check with reserved blkaddr of inline inode", + "cmt_id": "235fd393825b8b79d962eb2f9a2d6aa454eb17a5" + }, + "CVE-2018-17182": { + "cmt_msg": "mm: get rid of vmacache_flush_all() entirely", + "cmt_id": "175ad0cbd818529ec1d642531c51af6006660b7f" + } + }, + "4.18.11": { + "CVE-2018-20511": { + "cmt_msg": "net/appletalk: fix minor pointer leak to userspace in SIOCFINDIPDDPRT", + "cmt_id": "6a9c934f04e6e6351742eb68a6899b964e1d01b5" + }, + "CVE-2018-14633": { + "cmt_msg": "scsi: target: iscsi: Use hex2bin instead of a re-implementation", + "cmt_id": "8e31c95fe08501af201f4e8470af1f68d52d6e7e" + } + }, + "4.18.12": { + "CVE-2019-9458": { + "cmt_msg": "media: v4l: event: Prevent freeing event subscriptions while accessed", + "cmt_id": "c483061d46103aa34daa8e53545a8a3f8cde5c2d" + }, + "CVE-2018-18021": { + "cmt_msg": "arm64: KVM: Tighten guest core register access from userspace", + "cmt_id": "4435064439c68cfa80a7a1ec69733db7b9030884" + }, + "CVE-2018-7755": { + "cmt_msg": "floppy: Do not copy a kernel pointer to user memory in FDGETPRM ioctl", + "cmt_id": "0051646c2cc2fbb9ff134a80775c0dc23baa7d35" + }, + "CVE-2018-13053": { + "cmt_msg": "alarmtimer: Prevent overflow for relative nanosleep", + "cmt_id": "04937aaaf8c795481580c323d91ee40a74cc66af" + }, + "CVE-2018-12896": { + "cmt_msg": "posix-timers: Sanitize overrun handling", + "cmt_id": "5f6b9cd5c5f22603363b181adb5671f6d17e7a4e" + } + }, + "4.18.13": { + "CVE-2018-18445": { + "cmt_msg": "bpf: 32-bit RSH verification must truncate input before the ALU op", + "cmt_id": "11b165210c7214645c183dc7f74aca8d51381691" + }, + "CVE-2018-17972": { + "cmt_msg": "proc: restrict kernel stack dumps to root", + "cmt_id": "2b89f7ad519d8e89e1602901c5a56212080ed455" + } + }, + "4.18.14": { + "CVE-2018-15471": { + "cmt_msg": "xen-netback: fix input validation in xenvif_set_hash_mapping()", + "cmt_id": "7e62c2fbc1fe943ea487f88a26c100d024283ff3" + } + }, + "4.18.16": { + "CVE-2018-18281": { + "cmt_msg": "mremap: properly flush TLB before releasing the page", + "cmt_id": "d80183541e6006563334eaec9e8d1dc6e40efeb7" + } + }, + "4.18.19": { + "CVE-2018-18955": { + "cmt_msg": "userns: also map extents in the reverse map to kernel IDs", + "cmt_id": "bbfed258eb08070e051a1c086282623cc562ff24" + } + }, + "4.18.20": { + "CVE-2018-19854": { + "cmt_msg": "crypto: user - fix leaking uninitialized memory to userspace", + "cmt_id": "f4ae32cf258910c6db2b7adb1832f50c6aae3929" + }, + "CVE-2018-16871": { + "cmt_msg": "nfsd: COPY and CLONE operations require the saved filehandle to be set", + "cmt_id": "651c5d16f3a90db286fb6d83a31eda29a2c07cda" + }, + "CVE-2018-18710": { + "cmt_msg": "cdrom: fix improper type cast, which can leat to information leak.", + "cmt_id": "1dffd49a92ddaba101375e3157f90b5510d3cb46" + } + }, + "outstanding": { + "CVE-2020-36322": { + "cmt_msg": "fuse: fix bad inode" + }, + "CVE-2020-10711": { + "cmt_msg": "netlabel: cope with NULL catmap" + }, + "CVE-2019-15090": { + "cmt_msg": "scsi: qedi: remove memset/memcpy to nfunc and use func instead" + }, + "CVE-2021-47177": { + "cmt_msg": "iommu/vt-d: Fix sysfs leak in alloc_iommu()" + }, + "CVE-2024-26686": { + "cmt_msg": "fs/proc: do_task_stat: use sig->stats_lock to gather the threads/children stats" + }, + "CVE-2022-3649": { + "cmt_msg": "nilfs2: fix use-after-free bug of struct nilfs_root" + }, + "CVE-2019-15099": { + "cmt_msg": "ath6kl: fix a NULL-ptr-deref bug in ath6kl_usb_alloc_urb_from_pipe()" + }, + "CVE-2019-15098": { + "cmt_msg": "ath6kl: fix a NULL-ptr-deref bug in ath6kl_usb_alloc_urb_from_pipe()" + }, + "CVE-2024-26687": { + "cmt_msg": "xen/events: close evtchn after mapping cleanup" + }, + "CVE-2020-29368": { + "cmt_msg": "mm: thp: make the THP mapcount atomic against __split_huge_pmd_locked()" + }, + "CVE-2020-12465": { + "cmt_msg": "mt76: fix array overflow on receiving too many fragments for a packet" + }, + "CVE-2020-12464": { + "cmt_msg": "USB: core: Fix free-while-in-use bug in the USB S-Glibrary" + }, + "CVE-2022-0002": { + "cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE" + }, + "CVE-2019-19965": { + "cmt_msg": "scsi: libsas: stop discovering if oob mode is disconnected" + }, + "CVE-2021-3752": { + "cmt_msg": "Bluetooth: fix use-after-free error in lock_sock_nested()" + }, + "CVE-2019-19966": { + "cmt_msg": "media: cpia2: Fix use-after-free in cpia2_exit" + }, + "CVE-2022-42703": { + "cmt_msg": "mm/rmap: Fix anon_vma->degree ambiguity leading to double-reuse" + }, + "CVE-2020-35508": { + "cmt_msg": "fork: fix copy_process(CLONE_PARENT) race with the exiting ->real_parent" + }, + "CVE-2023-52615": { + "cmt_msg": "hwrng: core - Fix page fault dead lock on mmap-ed hwrng" + }, + "CVE-2023-52614": { + "cmt_msg": "PM / devfreq: Fix buffer overflow in trans_stat_show" + }, + "CVE-2023-52617": { + "cmt_msg": "PCI: switchtec: Fix stdev_release() crash after surprise hot remove" + }, + "CVE-2023-52474": { + "cmt_msg": "IB/hfi1: Fix bugs with non-PAGE_SIZE-end multi-iovec user SDMA requests" + }, + "CVE-2020-24587": { + "cmt_msg": "mac80211: prevent mixed key and fragment cache attacks" + }, + "CVE-2020-24586": { + "cmt_msg": "mac80211: prevent mixed key and fragment cache attacks" + }, + "CVE-2023-52612": { + "cmt_msg": "crypto: scomp - fix req->dst buffer overflow" + }, + "CVE-2021-0129": { + "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical" + }, + "CVE-2019-20096": { + "cmt_msg": "dccp: Fix memleak in __feat_register_sp" + }, + "CVE-2022-47520": { + "cmt_msg": "wifi: wilc1000: validate pairwise and authentication suite offsets" + }, + "CVE-2023-52618": { + "cmt_msg": "block/rnbd-srv: Check for unlikely string overflow" + }, + "CVE-2023-5717": { + "cmt_msg": "perf: Disallow mis-matched inherited group reads" + }, + "CVE-2022-3643": { + "cmt_msg": "xen/netback: Ensure protocol headers don't fall in the non-linear area" + }, + "CVE-2021-3444": { + "cmt_msg": "bpf: Fix truncation handling for mod32 dst reg wrt zero" + }, + "CVE-2022-32250": { + "cmt_msg": "netfilter: nf_tables: disallow non-stateful expression in sets earlier" + }, + "CVE-2019-9506": { + "cmt_msg": "Bluetooth: Fix faulty expression for minimum encryption key size check" + }, + "CVE-2019-9500": { + "cmt_msg": "brcmfmac: assure SSID length from firmware is limited" + }, + "CVE-2019-9503": { + "cmt_msg": "brcmfmac: add subtype check for event handling in data path" + }, + "CVE-2020-36158": { + "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_cmd_802_11_ad_hoc_start" + }, + "CVE-2023-3159": { + "cmt_msg": "firewire: fix potential uaf in outbound_phy_packet_callback()" + }, + "CVE-2022-0480": { + "cmt_msg": "memcg: enable accounting for file lock caches" + }, + "CVE-2022-0487": { + "cmt_msg": "moxart: fix potential use-after-free on remove path" + }, + "CVE-2023-52429": { + "cmt_msg": "dm: limit the number of targets and parameter size area" + }, + "CVE-2021-28964": { + "cmt_msg": "btrfs: fix race when cloning extent buffer during rewind of an old root" + }, + "CVE-2021-47059": { + "cmt_msg": "crypto: sun8i-ss - fix result memory leak on error path" + }, + "CVE-2022-23825": { + "cmt_msg": "" + }, + "CVE-2021-3847": { + "cmt_msg": "" + }, + "CVE-2020-35501": { + "cmt_msg": "" + }, + "CVE-2018-20784": { + "cmt_msg": "sched/fair: Fix infinite loop in update_blocked_averages() by reverting a9e7f6544b9c" + }, + "CVE-2019-10124": { + "cmt_msg": "mm: hwpoison: fix thp split handing in soft_offline_in_use_page()" + }, + "CVE-2021-47054": { + "cmt_msg": "bus: qcom: Put child node before return" + }, + "CVE-2021-47112": { + "cmt_msg": "x86/kvm: Teardown PV features on boot CPU as well" + }, + "CVE-2021-47113": { + "cmt_msg": "btrfs: abort in rename_exchange if we fail to insert the second ref" + }, + "CVE-2021-47110": { + "cmt_msg": "x86/kvm: Disable kvmclock on all CPUs on shutdown" + }, + "CVE-2019-9245": { + "cmt_msg": "f2fs: sanity check of xattr entry size" + }, + "CVE-2021-47116": { + "cmt_msg": "ext4: fix memory leak in ext4_mb_init_backend on error path." + }, + "CVE-2021-47117": { + "cmt_msg": "ext4: fix bug on in ext4_es_cache_extent as ext4_split_extent_at failed" + }, + "CVE-2021-47114": { + "cmt_msg": "ocfs2: fix data corruption by fallocate" + }, + "CVE-2023-2162": { + "cmt_msg": "scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress" + }, + "CVE-2022-21125": { + "cmt_msg": "x86/speculation/mmio: Reuse SRBDS mitigation for SBDS" + }, + "CVE-2021-47118": { + "cmt_msg": "pid: take a reference when initializing `cad_pid`" + }, + "CVE-2021-46970": { + "cmt_msg": "bus: mhi: pci_generic: Remove WQ_MEM_RECLAIM flag from state workqueue" + }, + "CVE-2019-19241": { + "cmt_msg": "io_uring: async workers should inherit the user creds" + }, + "CVE-2022-40307": { + "cmt_msg": "efi: capsule-loader: Fix use-after-free in efi_capsule_write" + }, + "CVE-2022-21123": { + "cmt_msg": "x86/speculation/mmio: Add mitigation for Processor MMIO Stale Data" + }, + "CVE-2021-28688": { + "cmt_msg": "xen-blkback: don't leak persistent grants from xen_blkbk_map()" + }, + "CVE-2021-39686": { + "cmt_msg": "binder: use euid from cred instead of using task" + }, + "CVE-2021-39685": { + "cmt_msg": "USB: gadget: detect too-big endpoint 0 requests" + }, + "CVE-2023-6535": { + "cmt_msg": "" + }, + "CVE-2021-43975": { + "cmt_msg": "atlantic: Fix OOB read and write in hw_atl_utils_fw_rpc_wait" + }, + "CVE-2021-43976": { + "cmt_msg": "mwifiex: Fix skb_over_panic in mwifiex_usb_recv()" + }, + "CVE-2021-1048": { + "cmt_msg": "fix regression in \"epoll: Keep a reference on files added to the check list\"" + }, + "CVE-2019-10207": { + "cmt_msg": "Bluetooth: hci_uart: check for missing tty operations" + }, + "CVE-2019-14835": { + "cmt_msg": "vhost: make sure log_num < in_num" + }, + "CVE-2023-0459": { + "cmt_msg": "uaccess: Add speculation barrier to copy_from_user()" + }, + "CVE-2023-0458": { + "cmt_msg": "prlimit: do_prlimit needs to have a speculation check" + }, + "CVE-2023-52565": { + "cmt_msg": "media: uvcvideo: Fix OOB read" + }, + "CVE-2023-0597": { + "cmt_msg": "x86/mm: Randomize per-cpu entry area" + }, + "CVE-2019-12379": { + "cmt_msg": "consolemap: Fix a memory leaking bug in drivers/tty/vt/consolemap.c" + }, + "CVE-2019-12378": { + "cmt_msg": "ipv6_sockglue: Fix a missing-check bug in ip6_ra_control()" + }, + "CVE-2021-3744": { + "cmt_msg": "crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd()" + }, + "CVE-2021-30002": { + "cmt_msg": "media: v4l: ioctl: Fix memory leak in video_usercopy" + }, + "CVE-2021-3743": { + "cmt_msg": "net: qrtr: fix OOB Read in qrtr_endpoint_post" + }, + "CVE-2021-0941": { + "cmt_msg": "bpf: Remove MTU check in __bpf_skb_max_len" + }, + "CVE-2022-3628": { + "cmt_msg": "wifi: brcmfmac: Fix potential buffer overflow in brcmf_fweh_event_worker()" + }, + "CVE-2020-15802": { + "cmt_msg": "" + }, + "CVE-2024-26597": { + "cmt_msg": "net: qualcomm: rmnet: fix global oob in rmnet_policy" + }, + "CVE-2023-6610": { + "cmt_msg": "smb: client: fix potential OOB in smb2_dump_detail()" + }, + "CVE-2023-2483": { + "cmt_msg": "net: qcom/emac: Fix use after free bug in emac_remove due to race condition" + }, + "CVE-2019-3460": { + "cmt_msg": "Bluetooth: Check L2CAP option sizes returned from l2cap_get_conf_opt" + }, + "CVE-2022-3636": { + "cmt_msg": "net: ethernet: mtk_eth_soc: use after free in __mtk_ppe_check_skb()" + }, + "CVE-2022-3635": { + "cmt_msg": "atm: idt77252: fix use-after-free bugs caused by tst_timer" + }, + "CVE-2021-34556": { + "cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4" + }, + "CVE-2019-15902": { + "cmt_msg": "unknown" + }, + "CVE-2022-40982": { + "cmt_msg": "x86/speculation: Add Gather Data Sampling mitigation" + }, + "CVE-2022-3202": { + "cmt_msg": "jfs: prevent NULL deref in diFree" + }, + "CVE-2024-25739": { + "cmt_msg": "" + }, + "CVE-2021-47028": { + "cmt_msg": "mt76: mt7915: fix txrate reporting" + }, + "CVE-2023-52511": { + "cmt_msg": "spi: sun6i: reduce DMA RX transfer width to single byte" + }, + "CVE-2021-47020": { + "cmt_msg": "soundwire: stream: fix memory leak in stream config error path" + }, + "CVE-2019-11085": { + "cmt_msg": "drm/i915/gvt: Fix mmap range check" + }, + "CVE-2024-24861": { + "cmt_msg": "media: xc4000: Fix atomicity violation in xc4000_get_frequency" + }, + "CVE-2019-11477": { + "cmt_msg": "tcp: limit payload size of sacked skbs" + }, + "CVE-2023-39189": { + "cmt_msg": "netfilter: nfnetlink_osf: avoid OOB read" + }, + "CVE-2021-46908": { + "cmt_msg": "bpf: Use correct permission flag for mixed signed bounds arithmetic" + }, + "CVE-2021-46909": { + "cmt_msg": "ARM: footbridge: fix PCI interrupt mapping" + }, + "CVE-2018-14615": { + "cmt_msg": "f2fs: fix to do sanity check with i_extra_isize" + }, + "CVE-2018-14614": { + "cmt_msg": "f2fs: fix to do sanity check with cp_pack_start_sum" + }, + "CVE-2019-11479": { + "cmt_msg": "tcp: add tcp_min_snd_mss sysctl" + }, + "CVE-2019-11478": { + "cmt_msg": "tcp: tcp_fragment() should apply sane memory limits" + }, + "CVE-2018-14611": { + "cmt_msg": "btrfs: validate type when reading a chunk" + }, + "CVE-2018-14610": { + "cmt_msg": "btrfs: Check that each block group has corresponding chunk at mount time" + }, + "CVE-2018-14613": { + "cmt_msg": "btrfs: tree-checker: Verify block_group_item" + }, + "CVE-2023-2007": { + "cmt_msg": "scsi: dpt_i2o: Remove obsolete driver" + }, + "CVE-2020-26145": { + "cmt_msg": "ath10k: drop fragments with multicast DA for PCIe" + }, + "CVE-2023-51782": { + "cmt_msg": "net/rose: Fix Use-After-Free in rose_ioctl" + }, + "CVE-2020-26147": { + "cmt_msg": "mac80211: assure all fragments are encrypted" + }, + "CVE-2020-26141": { + "cmt_msg": "ath10k: Fix TKIP Michael MIC verification for PCIe" + }, + "CVE-2020-26140": { + "cmt_msg": "" + }, + "CVE-2020-26143": { + "cmt_msg": "" + }, + "CVE-2020-26142": { + "cmt_msg": "" + }, + "CVE-2019-17053": { + "cmt_msg": "ieee802154: enforce CAP_NET_RAW for raw sockets" + }, + "CVE-2019-17052": { + "cmt_msg": "ax25: enforce CAP_NET_RAW for raw sockets" + }, + "CVE-2023-1076": { + "cmt_msg": "tun: tun_chr_open(): correctly initialize socket uid" + }, + "CVE-2023-1077": { + "cmt_msg": "sched/rt: pick_next_rt_entity(): check list_entry" + }, + "CVE-2020-27418": { + "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region" + }, + "CVE-2019-17056": { + "cmt_msg": "nfc: enforce CAP_NET_RAW for raw sockets" + }, + "CVE-2019-17055": { + "cmt_msg": "mISDN: enforce CAP_NET_RAW for raw sockets" + }, + "CVE-2019-17054": { + "cmt_msg": "appletalk: enforce CAP_NET_RAW for raw sockets" + }, + "CVE-2023-52527": { + "cmt_msg": "ipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data()" + }, + "CVE-2024-26745": { + "cmt_msg": "powerpc/pseries/iommu: IOMMU table is not initialized for kdump over SR-IOV" + }, + "CVE-2023-51042": { + "cmt_msg": "drm/amdgpu: Fix potential fence use-after-free v2" + }, + "CVE-2018-13096": { + "cmt_msg": "f2fs: fix to do sanity check with node footer and iblocks" + }, + "CVE-2018-13097": { + "cmt_msg": "f2fs: fix to do sanity check with user_block_count" + }, + "CVE-2023-3006": { + "cmt_msg": "arm64: Add AMPERE1 to the Spectre-BHB affected list" + }, + "CVE-2020-29661": { + "cmt_msg": "tty: Fix ->pgrp locking in tiocspgrp()" + }, + "CVE-2020-29660": { + "cmt_msg": "tty: Fix ->session locking" + }, + "CVE-2019-2025": { + "cmt_msg": "binder: fix race that allows malicious free of live buffer" + }, + "CVE-2021-33624": { + "cmt_msg": "bpf: Inherit expanded/patched seen count from old aux data" + }, + "CVE-2022-1734": { + "cmt_msg": "nfc: nfcmrvl: main: reorder destructive operations in nfcmrvl_nci_unregister_dev to avoid bugs" + }, + "CVE-2024-26748": { + "cmt_msg": "usb: cdns3: fix memory double free when handle zero packet" + }, + "CVE-2023-28772": { + "cmt_msg": "seq_buf: Fix overflow in seq_buf_putmem_hex()" + }, + "CVE-2019-19770": { + "cmt_msg": "blktrace: fix debugfs use after free" + }, + "CVE-2019-19079": { + "cmt_msg": "net: qrtr: fix memort leak in qrtr_tun_write_iter" + }, + "CVE-2019-19078": { + "cmt_msg": "ath10k: fix memory leak" + }, + "CVE-2019-19077": { + "cmt_msg": "RDMA: Fix goto target to release the allocated memory" + }, + "CVE-2019-19075": { + "cmt_msg": "ieee802154: ca8210: prevent memory leak" + }, + "CVE-2019-19074": { + "cmt_msg": "ath9k: release allocated buffer if timed out" + }, + "CVE-2019-18683": { + "cmt_msg": "media: vivid: Fix wrong locking that causes race conditions on streaming stop" + }, + "CVE-2019-19072": { + "cmt_msg": "tracing: Have error path in predicate_parse() free its allocated memory" + }, + "CVE-2019-19071": { + "cmt_msg": "rsi: release skb if rsi_prepare_beacon fails" + }, + "CVE-2019-18680": { + "cmt_msg": "" + }, + "CVE-2024-26699": { + "cmt_msg": "drm/amd/display: Fix array-index-out-of-bounds in dcn35_clkmgr" + }, + "CVE-2022-23038": { + "cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()" + }, + "CVE-2022-23039": { + "cmt_msg": "xen/gntalloc: don't use gnttab_query_foreign_access()" + }, + "CVE-2022-20154": { + "cmt_msg": "sctp: use call_rcu to free endpoint" + }, + "CVE-2024-26691": { + "cmt_msg": "KVM: arm64: Fix circular locking dependency" + }, + "CVE-2021-27363": { + "cmt_msg": "scsi: iscsi: Restrict sessions and handles to admin capabilities" + }, + "CVE-2022-20158": { + "cmt_msg": "net/packet: fix slab-out-of-bounds access in packet_recvmsg()" + }, + "CVE-2022-23037": { + "cmt_msg": "xen/netfront: don't use gnttab_query_foreign_access() for mapped status" + }, + "CVE-2024-0564": { + "cmt_msg": "" + }, + "CVE-2024-26774": { + "cmt_msg": "ext4: avoid dividing by 0 in mb_update_avg_fragment_size() when block bitmap corrupt" + }, + "CVE-2024-26697": { + "cmt_msg": "nilfs2: fix data corruption in dsync block recovery for small block sizes" + }, + "CVE-2020-0404": { + "cmt_msg": "media: uvcvideo: Avoid cyclic entity chains due to malformed USB descriptors" + }, + "CVE-2019-15925": { + "cmt_msg": "net: hns3: add some error checking in hclge_tm module" + }, + "CVE-2019-15924": { + "cmt_msg": "fm10k: Fix a potential NULL pointer dereference" + }, + "CVE-2019-15538": { + "cmt_msg": "xfs: fix missing ILOCK unlock when xfs_setattr_nonsize fails due to EDQUOT" + }, + "CVE-2019-15926": { + "cmt_msg": "ath6kl: add some bounds checking" + }, + "CVE-2019-15921": { + "cmt_msg": "genetlink: Fix a memory leak on error path" + }, + "CVE-2019-15920": { + "cmt_msg": "cifs: Fix use-after-free in SMB2_read" + }, + "CVE-2019-14821": { + "cmt_msg": "KVM: coalesced_mmio: add bounds checking" + }, + "CVE-2020-12826": { + "cmt_msg": "signal: Extend exec_id to 64bits" + }, + "CVE-2019-18885": { + "cmt_msg": "btrfs: merge btrfs_find_device and find_device" + }, + "CVE-2021-42008": { + "cmt_msg": "net: 6pack: fix slab-out-of-bounds in decode_data" + }, + "CVE-2024-26789": { + "cmt_msg": "crypto: arm64/neonbs - fix out-of-bounds access on short input" + }, + "CVE-2022-39189": { + "cmt_msg": "KVM: x86: do not report a vCPU as preempted outside instruction boundaries" + }, + "CVE-2022-39188": { + "cmt_msg": "mmu_gather: Force tlb-flush VM_PFNMAP vmas" + }, + "CVE-2019-1125": { + "cmt_msg": "x86/speculation: Prepare entry code for Spectre v1 swapgs mitigations" + }, + "CVE-2019-15218": { + "cmt_msg": "media: usb: siano: Fix general protection fault in smsusb" + }, + "CVE-2019-15666": { + "cmt_msg": "xfrm: policy: Fix out-of-bound array accesses in __xfrm_policy_unlink" + }, + "CVE-2020-25641": { + "cmt_msg": "block: allow for_each_bvec to support zero len bvec" + }, + "CVE-2005-3660": { + "cmt_msg": "" + }, + "CVE-2019-15212": { + "cmt_msg": "USB: rio500: refuse more than one device at a time" + }, + "CVE-2019-15211": { + "cmt_msg": "media: radio-raremono: change devm_k*alloc to k*alloc" + }, + "CVE-2023-31084": { + "cmt_msg": "media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*()" + }, + "CVE-2019-15217": { + "cmt_msg": "media: usb:zr364xx:Fix KASAN:null-ptr-deref Read in zr364xx_vidioc_querycap" + }, + "CVE-2019-15216": { + "cmt_msg": "USB: yurex: Fix protection fault after device removal" + }, + "CVE-2019-15215": { + "cmt_msg": "media: cpia2_usb: first wake up, then free in disconnect" + }, + "CVE-2019-15214": { + "cmt_msg": "ALSA: core: Fix card races between register and disconnect" + }, + "CVE-2022-45885": { + "cmt_msg": "" + }, + "CVE-2020-24588": { + "cmt_msg": "cfg80211: mitigate A-MSDU aggregation attacks" + }, + "CVE-2021-33034": { + "cmt_msg": "Bluetooth: verify AMP hci_chan before amp_destroy" + }, + "CVE-2019-19922": { + "cmt_msg": "sched/fair: Fix low cpu usage with high throttling by removing expiration of cpu-local slices" + }, + "CVE-2021-33033": { + "cmt_msg": "cipso,calipso: resolve a number of problems with the DOI refcounts" + }, + "CVE-2019-19927": { + "cmt_msg": "drm/ttm: fix incrementing the page pointer for huge pages" + }, + "CVE-2020-27066": { + "cmt_msg": "xfrm: policy: Fix doulbe free in xfrm_policy_timer" + }, + "CVE-2020-27068": { + "cmt_msg": "cfg80211: add missing policy for NL80211_ATTR_STATUS_CODE" + }, + "CVE-2022-44032": { + "cmt_msg": "char: pcmcia: remove all the drivers" + }, + "CVE-2024-23307": { + "cmt_msg": "md/raid5: fix atomicity violation in raid5_cache_count" + }, + "CVE-2023-52598": { + "cmt_msg": "s390/ptrace: handle setting of fpc register correctly" + }, + "CVE-2020-8648": { + "cmt_msg": "vt: selection, close sel_buffer race" + }, + "CVE-2022-32296": { + "cmt_msg": "tcp: increase source port perturb table to 2^16" + }, + "CVE-2020-28974": { + "cmt_msg": "vt: Disable KD_FONT_OP_COPY" + }, + "CVE-2023-3567": { + "cmt_msg": "vc_screen: move load of struct vc_data pointer in vcs_read() to avoid UAF" + }, + "CVE-2019-20806": { + "cmt_msg": "media: tw5864: Fix possible NULL pointer dereference in tw5864_handle_frame" + }, + "CVE-2022-3028": { + "cmt_msg": "af_key: Do not call xfrm_probe_algs in parallel" + }, + "CVE-2020-0305": { + "cmt_msg": "chardev: Avoid potential use-after-free in 'chrdev_open()'" + }, + "CVE-2023-52584": { + "cmt_msg": "spmi: mediatek: Fix UAF on device remove" + }, + "CVE-2020-14304": { + "cmt_msg": "" + }, + "CVE-2022-2318": { + "cmt_msg": "net: rose: fix UAF bugs caused by timer handler" + }, + "CVE-2020-15393": { + "cmt_msg": "usb: usbtest: fix missing kfree(dev->buf) in usbtest_disconnect" + }, + "CVE-2023-23000": { + "cmt_msg": "phy: tegra: xusb: Fix return value of tegra_xusb_find_port_node function" + }, + "CVE-2019-19082": { + "cmt_msg": "drm/amd/display: prevent memory leak" + }, + "CVE-2024-26655": { + "cmt_msg": "Fix memory leak in posix_clock_open()" + }, + "CVE-2019-19080": { + "cmt_msg": "nfp: flower: prevent memory leak in nfp_flower_spawn_phy_reprs" + }, + "CVE-2019-19081": { + "cmt_msg": "nfp: flower: fix memory leak in nfp_flower_spawn_vnic_reprs" + }, + "CVE-2023-4132": { + "cmt_msg": "media: usb: siano: Fix warning due to null work_func_t function pointer" + }, + "CVE-2023-4133": { + "cmt_msg": "cxgb4: fix use after free bugs caused by circular dependency problem" + }, + "CVE-2020-26560": { + "cmt_msg": "" + }, + "CVE-2023-35823": { + "cmt_msg": "media: saa7134: fix use after free bug in saa7134_finidev due to race condition" + }, + "CVE-2023-4134": { + "cmt_msg": "Input: cyttsp4_core - change del_timer_sync() to timer_shutdown_sync()" + }, + "CVE-2018-18397": { + "cmt_msg": "userfaultfd: use ENOENT instead of EFAULT if the atomic copy user fails" + }, + "CVE-2023-42752": { + "cmt_msg": "igmp: limit igmpv3_newpack() packet size to IP_MAX_MTU" + }, + "CVE-2018-12127": { + "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" + }, + "CVE-2018-12126": { + "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" + }, + "CVE-2024-26751": { + "cmt_msg": "ARM: ep93xx: Add terminator to gpiod_lookup_table" + }, + "CVE-2022-23816": { + "cmt_msg": "x86/kvm/vmx: Make noinstr clean" + }, + "CVE-2023-37454": { + "cmt_msg": "" + }, + "CVE-2021-3892": { + "cmt_msg": "" + }, + "CVE-2022-2978": { + "cmt_msg": "fs: fix UAF/GPF bug in nilfs_mdt_destroy" + }, + "CVE-2022-20572": { + "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag" + }, + "CVE-2024-24858": { + "cmt_msg": "" + }, + "CVE-2023-39194": { + "cmt_msg": "net: xfrm: Fix xfrm_address_filter OOB read" + }, + "CVE-2023-2002": { + "cmt_msg": "bluetooth: Perform careful capability checks in hci_sock_ioctl()" + }, + "CVE-2023-39197": { + "cmt_msg": "netfilter: conntrack: dccp: copy entire header to stack buffer, not just basic one" + }, + "CVE-2023-52489": { + "cmt_msg": "mm/sparsemem: fix race in accessing memory_section->usage" + }, + "CVE-2019-10126": { + "cmt_msg": "mwifiex: Fix heap overflow in mwifiex_uap_parse_tail_ies()" + }, + "CVE-2019-13631": { + "cmt_msg": "Input: gtco - bounds check collection indent level" + }, + "CVE-2023-52469": { + "cmt_msg": "drivers/amd/pm: fix a use-after-free in kv_parse_power_table" + }, + "CVE-2021-47063": { + "cmt_msg": "drm: bridge/panel: Cleanup connector on bridge detach" + }, + "CVE-2020-13974": { + "cmt_msg": "vt: keyboard: avoid signed integer overflow in k_ascii" + }, + "CVE-2021-4083": { + "cmt_msg": "fget: check that the fd still exists after getting a ref to it" + }, + "CVE-2023-33288": { + "cmt_msg": "power: supply: bq24190: Fix use after free bug in bq24190_remove due to race condition" + }, + "CVE-2022-36402": { + "cmt_msg": "drm/vmwgfx: Fix shader stage validation" + }, + "CVE-2023-52484": { + "cmt_msg": "iommu/arm-smmu-v3: Fix soft lockup triggered by arm_smmu_mm_invalidate_range" + }, + "CVE-2022-29900": { + "cmt_msg": "x86/kvm/vmx: Make noinstr clean" + }, + "CVE-2022-29901": { + "cmt_msg": "x86/kvm/vmx: Make noinstr clean" + }, + "CVE-2021-4197": { + "cmt_msg": "cgroup: Use open-time credentials for process migraton perm checks" + }, + "CVE-2019-18282": { + "cmt_msg": "net/flow_dissector: switch to siphash" + }, + "CVE-2020-10751": { + "cmt_msg": "selinux: properly handle multiple messages in selinux_netlink_send()" + }, + "CVE-2019-9162": { + "cmt_msg": "netfilter: nf_nat_snmp_basic: add missing length checks in ASN.1 cbs" + }, + "CVE-2024-26773": { + "cmt_msg": "ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found()" + }, + "CVE-2023-39192": { + "cmt_msg": "netfilter: xt_u32: validate user space input" + }, + "CVE-2019-16229": { + "cmt_msg": "drm/amdkfd: fix a potential NULL pointer dereference (v2)" + }, + "CVE-2023-52481": { + "cmt_msg": "arm64: errata: Add Cortex-A520 speculative unprivileged load workaround" + }, + "CVE-2022-20166": { + "cmt_msg": "drivers core: Use sysfs_emit and sysfs_emit_at for show(device *...) functions" + }, + "CVE-2020-15437": { + "cmt_msg": "serial: 8250: fix null-ptr-deref in serial8250_start_tx()" + }, + "CVE-2020-15436": { + "cmt_msg": "block: Fix use-after-free in blkdev_get()" + }, + "CVE-2022-1116": { + "cmt_msg": "" + }, + "CVE-2021-28660": { + "cmt_msg": "staging: rtl8188eu: prevent ->ssid overflow in rtw_wx_set_scan()" + }, + "CVE-2024-26645": { + "cmt_msg": "tracing: Ensure visibility when inserting an element into tracing_map" + }, + "CVE-2020-8647": { + "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region" + }, + "CVE-2022-3564": { + "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free caused by l2cap_reassemble_sdu" + }, + "CVE-2019-0155": { + "cmt_msg": "drm/i915: Rename gen7 cmdparser tables" + }, + "CVE-2019-0154": { + "cmt_msg": "drm/i915: Lower RM timeout to avoid DSI hard hangs" + }, + "CVE-2023-35827": { + "cmt_msg": "ravb: Fix use-after-free issue in ravb_tx_timeout_work()" + }, + "CVE-2023-1859": { + "cmt_msg": "9p/xen : Fix use after free bug in xen_9pfs_front_remove due to race condition" + }, + "CVE-2023-52585": { + "cmt_msg": "drm/amdgpu: Fix possible NULL dereference in amdgpu_ras_query_error_status_helper()" + }, + "CVE-2020-36386": { + "cmt_msg": "Bluetooth: Fix slab-out-of-bounds read in hci_extended_inquiry_result_evt()" + }, + "CVE-2023-52587": { + "cmt_msg": "IB/ipoib: Fix mcast list locking" + }, + "CVE-2023-52586": { + "cmt_msg": "drm/msm/dpu: Add mutex lock in control vblank irq" + }, + "CVE-2021-47149": { + "cmt_msg": "net: fujitsu: fix potential null-ptr-deref" + }, + "CVE-2022-3566": { + "cmt_msg": "tcp: Fix data races around icsk->icsk_af_ops." + }, + "CVE-2022-3565": { + "cmt_msg": "mISDN: fix use-after-free bugs in l1oip timer handlers" + }, + "CVE-2021-47065": { + "cmt_msg": "rtw88: Fix array overrun in rtw_get_tx_power_params()" + }, + "CVE-2018-19407": { + "cmt_msg": "KVM: X86: Fix scan ioapic use-before-initialization" + }, + "CVE-2021-47144": { + "cmt_msg": "drm/amd/amdgpu: fix refcount leak" + }, + "CVE-2021-47147": { + "cmt_msg": "ptp: ocp: Fix a resource leak in an error handling path" + }, + "CVE-2020-36385": { + "cmt_msg": "RDMA/ucma: Rework ucma_migrate_id() to avoid races with destroy" + }, + "CVE-2023-52589": { + "cmt_msg": "media: rkisp1: Fix IRQ disable race issue" + }, + "CVE-2021-47140": { + "cmt_msg": "iommu/amd: Clear DMA ops when switching domain" + }, + "CVE-2021-47143": { + "cmt_msg": "net/smc: remove device from smcd_dev_list after failed device_add()" + }, + "CVE-2021-47142": { + "cmt_msg": "drm/amdgpu: Fix a use-after-free" + }, + "CVE-2021-47145": { + "cmt_msg": "btrfs: do not BUG_ON in link_to_fixup_dir" + }, + "CVE-2021-46941": { + "cmt_msg": "usb: dwc3: core: Do core softreset when switch mode" + }, + "CVE-2020-0009": { + "cmt_msg": "staging: android: ashmem: Disallow ashmem memory from being remapped" + }, + "CVE-2023-52340": { + "cmt_msg": "ipv6: remove max_size check inline with ipv4" + }, + "CVE-2020-7053": { + "cmt_msg": "drm/i915: Introduce a mutex for file_priv->context_idr" + }, + "CVE-2023-28466": { + "cmt_msg": "net: tls: fix possible race condition between do_tls_getsockopt_conf() and do_tls_setsockopt_conf()" + }, + "CVE-2023-52588": { + "cmt_msg": "f2fs: fix to tag gcing flag on page during block migration" + }, + "CVE-2019-14615": { + "cmt_msg": "drm/i915/gen9: Clear residual context state on context switch" + }, + "CVE-2022-2503": { + "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag" + }, + "CVE-2023-52578": { + "cmt_msg": "net: bridge: use DEV_STATS_INC()" + }, + "CVE-2021-47052": { + "cmt_msg": "crypto: sa2ul - Fix memory leak of rxd" + }, + "CVE-2021-3635": { + "cmt_msg": "netfilter: nf_tables: fix flowtable list del corruption" + }, + "CVE-2019-13648": { + "cmt_msg": "powerpc/tm: Fix oops on sigreturn on systems without TM" + }, + "CVE-2023-0030": { + "cmt_msg": "drm/nouveau/mmu: add more general vmm free/node handling functions" + }, + "CVE-2020-16120": { + "cmt_msg": "ovl: switch to mounter creds in readdir" + }, + "CVE-2019-11599": { + "cmt_msg": "coredump: fix race condition between mmget_not_zero()/get_task_mm() and core dumping" + }, + "CVE-2022-29581": { + "cmt_msg": "net/sched: cls_u32: fix netns refcount changes in u32_change()" + }, + "CVE-2022-1204": { + "cmt_msg": "ax25: Fix refcount leaks caused by ax25_cb_del()" + }, + "CVE-2019-2101": { + "cmt_msg": "media: uvcvideo: Fix 'type' check leading to overflow" + }, + "CVE-2019-17666": { + "cmt_msg": "rtlwifi: Fix potential overflow on P2P code" + }, + "CVE-2021-47056": { + "cmt_msg": "crypto: qat - ADF_STATUS_PF_RUNNING should be set after adf_dev_init" + }, + "CVE-2016-10723": { + "cmt_msg": "mm, oom: remove sleep from under oom_lock" + }, + "CVE-2019-19036": { + "cmt_msg": "btrfs: Detect unbalanced tree with empty leaf before crashing btree operations" + }, + "CVE-2019-3459": { + "cmt_msg": "Bluetooth: Verify that l2cap_get_conf_opt provides large enough buffer" + }, + "CVE-2020-11494": { + "cmt_msg": "slcan: Don't transmit uninitialized stack data in padding" + }, + "CVE-2019-19039": { + "cmt_msg": "btrfs: Don't submit any btree write bio if the fs has errors" + }, + "CVE-2020-0444": { + "cmt_msg": "audit: fix error handling in audit_data_to_entry()" + }, + "CVE-2022-1419": { + "cmt_msg": "drm/vgem: Close use-after-free race in vgem_gem_create" + }, + "CVE-2021-47125": { + "cmt_msg": "sch_htb: fix refcount leak in htb_parent_to_leaf_offload" + }, + "CVE-2024-26797": { + "cmt_msg": "drm/amd/display: Prevent potential buffer overflow in map_hw_resources" + }, + "CVE-2022-1836": { + "cmt_msg": "floppy: disable FDRAWCMD by default" + }, + "CVE-2020-11884": { + "cmt_msg": "s390/mm: fix page table upgrade vs 2ndary address mode accesses" + }, + "CVE-2024-26793": { + "cmt_msg": "gtp: fix use-after-free and null-ptr-deref in gtp_newlink()" + }, + "CVE-2023-52530": { + "cmt_msg": "wifi: mac80211: fix potential key use-after-free" + }, + "CVE-2021-32078": { + "cmt_msg": "ARM: footbridge: remove personal server platform" + }, + "CVE-2023-52532": { + "cmt_msg": "net: mana: Fix TX CQE error handling" + }, + "CVE-2022-30594": { + "cmt_msg": "ptrace: Check PTRACE_O_SUSPEND_SECCOMP permission on PTRACE_SEIZE" + }, + "CVE-2024-26798": { + "cmt_msg": "fbcon: always restore the old font data in fbcon_do_set_font()" + }, + "CVE-2022-4662": { + "cmt_msg": "USB: core: Prevent nested device-reset calls" + }, + "CVE-2019-11833": { + "cmt_msg": "ext4: zero out the unused memory region in the extent tree block" + }, + "CVE-2021-38205": { + "cmt_msg": "net: xilinx_emaclite: Do not print real IOMEM pointer" + }, + "CVE-2020-27835": { + "cmt_msg": "IB/hfi1: Ensure correct mm is used at all times" + }, + "CVE-2020-27830": { + "cmt_msg": "speakup: Reject setting the speakup line discipline outside of speakup" + }, + "CVE-2020-0255": { + "cmt_msg": "selinux: properly handle multiple messages in selinux_netlink_send()" + }, + "CVE-2023-35001": { + "cmt_msg": "netfilter: nf_tables: prevent OOB access in nft_byteorder_eval" + }, + "CVE-2022-27666": { + "cmt_msg": "esp: Fix possible buffer overflow in ESP transformation" + }, + "CVE-2021-38208": { + "cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect" + }, + "CVE-2019-2213": { + "cmt_msg": "binder: fix possible UAF when freeing buffer" + }, + "CVE-2024-26677": { + "cmt_msg": "rxrpc: Fix delayed ACKs to not set the reference serial number" + }, + "CVE-2020-25211": { + "cmt_msg": "netfilter: ctnetlink: add a range check for l3/l4 protonum" + }, + "CVE-2020-25212": { + "cmt_msg": "nfs: Fix getxattr kernel panic and memory overflow" + }, + "CVE-2020-26556": { + "cmt_msg": "" + }, + "CVE-2020-26557": { + "cmt_msg": "" + }, + "CVE-2022-48619": { + "cmt_msg": "Input: add bounds checking to input_set_capability()" + }, + "CVE-2020-26555": { + "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical" + }, + "CVE-2024-26776": { + "cmt_msg": "spi: hisi-sfc-v3xx: Return IRQ_NONE if no interrupts were detected" + }, + "CVE-2024-26777": { + "cmt_msg": "fbdev: sis: Error out if pixclock equals zero" + }, + "CVE-2019-20794": { + "cmt_msg": "" + }, + "CVE-2020-26559": { + "cmt_msg": "" + }, + "CVE-2023-3397": { + "cmt_msg": "" + }, + "CVE-2020-36775": { + "cmt_msg": "f2fs: fix to avoid potential deadlock" + }, + "CVE-2024-26679": { + "cmt_msg": "inet: read sk->sk_family once in inet_recv_error()" + }, + "CVE-2023-52478": { + "cmt_msg": "HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect" + }, + "CVE-2018-1128": { + "cmt_msg": "libceph: add authorizer challenge" + }, + "CVE-2018-1129": { + "cmt_msg": "libceph: implement CEPHX_V2 calculation mode" + }, + "CVE-2021-47128": { + "cmt_msg": "bpf, lockdown, audit: Fix buggy SELinux lockdown permission checks" + }, + "CVE-2022-26365": { + "cmt_msg": "xen/blkfront: fix leaking data in shared pages" + }, + "CVE-2023-52458": { + "cmt_msg": "block: add check that partition length needs to be aligned with block size" + }, + "CVE-2018-20854": { + "cmt_msg": "phy: ocelot-serdes: fix out-of-bounds read" + }, + "CVE-2018-1121": { + "cmt_msg": "" + }, + "CVE-2023-28746": { + "cmt_msg": "x86/mmio: Disable KVM mitigation when X86_FEATURE_CLEAR_CPU_BUF is set" + }, + "CVE-2023-52451": { + "cmt_msg": "powerpc/pseries/memhp: Fix access beyond end of drmem array" + }, + "CVE-2019-19046": { + "cmt_msg": "ipmi: Fix memory leak in __ipmi_bmc_register" + }, + "CVE-2019-19045": { + "cmt_msg": "net/mlx5: prevent memory leak in mlx5_fpga_conn_create_cq" + }, + "CVE-2022-2961": { + "cmt_msg": "" + }, + "CVE-2024-26602": { + "cmt_msg": "sched/membarrier: reduce the ability to hammer on sys_membarrier" + }, + "CVE-2023-2176": { + "cmt_msg": "RDMA/core: Refactor rdma_bind_addr" + }, + "CVE-2024-1086": { + "cmt_msg": "netfilter: nf_tables: reject QUEUE/DROP verdict parameters" + }, + "CVE-2024-22386": { + "cmt_msg": "" + }, + "CVE-2019-9466": { + "cmt_msg": "brcmfmac: add subtype check for event handling in data path" + }, + "CVE-2019-19048": { + "cmt_msg": "virt: vbox: fix memory leak in hgcm_call_preprocess_linaddr" + }, + "CVE-2019-19049": { + "cmt_msg": "of: unittest: fix memory leak in unittest_data_add" + }, + "CVE-2022-0644": { + "cmt_msg": "vfs: check fd has read access in kernel_read_file_from_fd()" + }, + "CVE-2020-27784": { + "cmt_msg": "usb: gadget: function: printer: fix use-after-free in __lock_acquire" + }, + "CVE-2023-1670": { + "cmt_msg": "xirc2ps_cs: Fix use after free bug in xirc2ps_detach" + }, + "CVE-2020-27786": { + "cmt_msg": "ALSA: rawmidi: Fix racy buffer resize under concurrent accesses" + }, + "CVE-2019-14816": { + "cmt_msg": "mwifiex: Fix three heap overflow at parsing element in cfg80211_ap_settings" + }, + "CVE-2019-14814": { + "cmt_msg": "mwifiex: Fix three heap overflow at parsing element in cfg80211_ap_settings" + }, + "CVE-2019-14815": { + "cmt_msg": "mwifiex: Fix three heap overflow at parsing element in cfg80211_ap_settings" + }, + "CVE-2021-47121": { + "cmt_msg": "net: caif: fix memory leak in cfusbl_device_notify" + }, + "CVE-2023-6240": { + "cmt_msg": "" + }, + "CVE-2023-23559": { + "cmt_msg": "wifi: rndis_wlan: Prevent buffer overflow in rndis_query_oid" + }, + "CVE-2020-10720": { + "cmt_msg": "net-gro: fix use-after-free read in napi_gro_frags()" + }, + "CVE-2024-26739": { + "cmt_msg": "net/sched: act_mirred: don't override retval if we already lost the skb" + }, + "CVE-2022-0382": { + "cmt_msg": "net ticp:fix a kernel-infoleak in __tipc_sendmsg()" + }, + "CVE-2023-2177": { + "cmt_msg": "sctp: leave the err path free in sctp_stream_init to sctp_stream_free" + }, + "CVE-2023-32233": { + "cmt_msg": "netfilter: nf_tables: deactivate anonymous set from preparation phase" + }, + "CVE-2024-26685": { + "cmt_msg": "nilfs2: fix potential bug in end_buffer_async_write" + }, + "CVE-2020-25672": { + "cmt_msg": "nfc: fix memory leak in llcp_sock_connect()" + }, + "CVE-2019-9455": { + "cmt_msg": "media: videobuf2-v4l2: drop WARN_ON in vb2_warn_zero_bytesused()" + }, + "CVE-2020-25670": { + "cmt_msg": "nfc: fix refcount leak in llcp_sock_bind()" + }, + "CVE-2020-25671": { + "cmt_msg": "nfc: fix refcount leak in llcp_sock_connect()" + }, + "CVE-2019-15222": { + "cmt_msg": "ALSA: usb-audio: Fix gpf in snd_usb_pipe_sanity_check" + }, + "CVE-2019-15223": { + "cmt_msg": "ALSA: line6: Assure canceling delayed work at disconnection" + }, + "CVE-2019-19813": { + "cmt_msg": "btrfs: inode: Verify inode mode to avoid NULL pointer dereference" + }, + "CVE-2019-15221": { + "cmt_msg": "ALSA: line6: Fix write on zero-sized buffer" + }, + "CVE-2019-19815": { + "cmt_msg": "f2fs: support swap file w/ DIO" + }, + "CVE-2019-19814": { + "cmt_msg": "" + }, + "CVE-2020-29371": { + "cmt_msg": "romfs: fix uninitialized memory leak in romfs_dev_read()" + }, + "CVE-2019-19816": { + "cmt_msg": "btrfs: inode: Verify inode mode to avoid NULL pointer dereference" + }, + "CVE-2023-1118": { + "cmt_msg": "media: rc: Fix use-after-free bugs caused by ene_tx_irqsim()" + }, + "CVE-2021-47124": { + "cmt_msg": "io_uring: fix link timeout refs" + }, + "CVE-2022-1011": { + "cmt_msg": "fuse: fix pipe buffer lifetime for direct_io" + }, + "CVE-2019-5108": { + "cmt_msg": "mac80211: Do not send Layer 2 Update frame before authorization" + }, + "CVE-2022-0001": { + "cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE" + }, + "CVE-2022-1012": { + "cmt_msg": "secure_seq: use the 64 bits of the siphash for port offset calculation" + }, + "CVE-2023-52620": { + "cmt_msg": "netfilter: nf_tables: disallow timeout for anonymous sets" + }, + "CVE-2022-38096": { + "cmt_msg": "" + }, + "CVE-2023-52622": { + "cmt_msg": "ext4: avoid online resizing failures due to oversized flex bg" + }, + "CVE-2020-8649": { + "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region" + }, + "CVE-2023-52619": { + "cmt_msg": "pstore/ram: Fix crash when setting number of cpus to an odd number" + }, + "CVE-2023-52625": { + "cmt_msg": "drm/amd/display: Refactor DMCUB enter/exit idle interface" + }, + "CVE-2023-52641": { + "cmt_msg": "fs/ntfs3: Add NULL ptr dereference checking at the end of attr_allocate_frame()" + }, + "CVE-2023-52628": { + "cmt_msg": "netfilter: nftables: exthdr: fix 4-byte stack OOB write" + }, + "CVE-2020-12656": { + "cmt_msg": "sunrpc: check that domain table is empty at module unload." + }, + "CVE-2020-14356": { + "cmt_msg": "cgroup: fix cgroup_sk_alloc() for sk_clone_lock()" + }, + "CVE-2021-26931": { + "cmt_msg": "xen-blkback: don't \"handle\" error by BUG()" + }, + "CVE-2021-26930": { + "cmt_msg": "xen-blkback: fix error handling in xen_blkbk_map()" + }, + "CVE-2021-42252": { + "cmt_msg": "soc: aspeed: lpc-ctrl: Fix boundary check for mmap" + }, + "CVE-2021-26932": { + "cmt_msg": "Xen/x86: don't bail early from clear_foreign_p2m_mapping()" + }, + "CVE-2024-25740": { + "cmt_msg": "" + }, + "CVE-2023-3141": { + "cmt_msg": "memstick: r592: Fix UAF bug in r592_remove due to race condition" + }, + "CVE-2022-0492": { + "cmt_msg": "cgroup-v1: Require capabilities to set release_agent" + }, + "CVE-2020-12352": { + "cmt_msg": "Bluetooth: A2MP: Fix not initializing all members" + }, + "CVE-2020-12351": { + "cmt_msg": "Bluetooth: L2CAP: Fix calling sk_filter on non-socket based channel" + }, + "CVE-2020-12655": { + "cmt_msg": "xfs: add agf freeblocks verify in xfs_agf_verify" + }, + "CVE-2022-20132": { + "cmt_msg": "HID: add hid_is_usb() function to make it simpler for USB detection" + }, + "CVE-2022-0494": { + "cmt_msg": "block-map: add __GFP_ZERO flag for alloc_page in function bio_copy_kern" + }, + "CVE-2023-2269": { + "cmt_msg": "dm ioctl: fix nested locking in table_clear() to remove deadlock concern" + }, + "CVE-2020-26088": { + "cmt_msg": "net/nfc/rawsock.c: add CAP_NET_RAW check." + }, + "CVE-2022-3524": { + "cmt_msg": "tcp/udp: Fix memory leak in ipv6_renew_options()." + }, + "CVE-2022-3523": { + "cmt_msg": "mm/memory.c: fix race when faulting a device private page" + }, + "CVE-2022-3522": { + "cmt_msg": "mm/hugetlb: use hugetlb_pte_stable in migration race check" + }, + "CVE-2008-2544": { + "cmt_msg": "" + }, + "CVE-2021-3178": { + "cmt_msg": "nfsd4: readdirplus shouldn't return parent of export" + }, + "CVE-2021-47101": { + "cmt_msg": "asix: fix uninit-value in asix_mdio_read()" + }, + "CVE-2021-47100": { + "cmt_msg": "ipmi: Fix UAF when uninstall ipmi_si and ipmi_msghandler module" + }, + "CVE-2021-46984": { + "cmt_msg": "kyber: fix out of bounds access when preempted" + }, + "CVE-2021-46982": { + "cmt_msg": "f2fs: compress: fix race condition of overwrite vs truncate" + }, + "CVE-2019-15031": { + "cmt_msg": "powerpc/tm: Fix restoring FP/VMX facility incorrectly on interrupts" + }, + "CVE-2019-15030": { + "cmt_msg": "powerpc/tm: Fix FP/VMX unavailable exceptions inside a transaction" + }, + "CVE-2022-0330": { + "cmt_msg": "drm/i915: Flush TLBs before releasing backing store" + }, + "CVE-2007-3719": { + "cmt_msg": "" + }, + "CVE-2021-46988": { + "cmt_msg": "userfaultfd: release page in error path to avoid BUG_ON" + }, + "CVE-2024-26606": { + "cmt_msg": "binder: signal epoll threads of self-work" + }, + "CVE-2023-0590": { + "cmt_msg": "net: sched: fix race condition in qdisc_graft()" + }, + "CVE-2022-3567": { + "cmt_msg": "ipv6: Fix data races around sk->sk_prot." + }, + "CVE-2023-52583": { + "cmt_msg": "ceph: fix deadlock or deadcode of misusing dget()" + }, + "CVE-2022-4095": { + "cmt_msg": "staging: rtl8712: fix use after free bugs" + }, + "CVE-2022-45919": { + "cmt_msg": "media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221" + }, + "CVE-2019-19319": { + "cmt_msg": "ext4: protect journal inode's blocks using block_validity" + }, + "CVE-2019-19462": { + "cmt_msg": "kernel/relay.c: handle alloc_percpu returning NULL in relay_open" + }, + "CVE-2023-30772": { + "cmt_msg": "power: supply: da9150: Fix use after free bug in da9150_charger_remove due to race condition" + }, + "CVE-2021-47119": { + "cmt_msg": "ext4: fix memory leak in ext4_fill_super" + }, + "CVE-2022-24958": { + "cmt_msg": "usb: gadget: don't release an existing dev->buf" + }, + "CVE-2023-1611": { + "cmt_msg": "btrfs: fix race between quota disable and quota assign ioctls" + }, + "CVE-2021-3772": { + "cmt_msg": "sctp: use init_tag from inithdr for ABORT chunk" + }, + "CVE-2021-3679": { + "cmt_msg": "tracing: Fix bug in rb_per_cpu_empty() that might cause deadloop." + }, + "CVE-2024-26656": { + "cmt_msg": "drm/amdgpu: fix use-after-free bug" + }, + "CVE-2024-26706": { + "cmt_msg": "parisc: Fix random data corruption from exception handler" + }, + "CVE-2023-52517": { + "cmt_msg": "spi: sun6i: fix race between DMA RX transfer completion and RX FIFO drain" + }, + "CVE-2022-2586": { + "cmt_msg": "netfilter: nf_tables: do not allow SET_ID to refer to another table" + }, + "CVE-2022-3629": { + "cmt_msg": "vsock: Fix memory leak in vsock_connect()" + }, + "CVE-2021-28715": { + "cmt_msg": "xen/netback: don't queue unlimited number of packages" + }, + "CVE-2021-28714": { + "cmt_msg": "xen/netback: fix rx queue stall detection" + }, + "CVE-2021-28713": { + "cmt_msg": "xen/console: harden hvc_xen against event channel storms" + }, + "CVE-2021-28712": { + "cmt_msg": "xen/netfront: harden netfront against event channel storms" + }, + "CVE-2021-28711": { + "cmt_msg": "xen/blkfront: harden blkfront against event channel storms" + }, + "CVE-2021-4157": { + "cmt_msg": "pNFS/flexfiles: fix incorrect size check in decode_nfs_fh()" + }, + "CVE-2022-2991": { + "cmt_msg": "remove the lightnvm subsystem" + }, + "CVE-2022-3621": { + "cmt_msg": "nilfs2: fix NULL pointer dereference at nilfs_bmap_lookup_at_level()" + }, + "CVE-2022-23960": { + "cmt_msg": "ARM: report Spectre v2 status through sysfs" + }, + "CVE-2023-51781": { + "cmt_msg": "appletalk: Fix Use-After-Free in atalk_ioctl" + }, + "CVE-2022-3624": { + "cmt_msg": "bonding: fix reference count leak in balance-alb mode" + }, + "CVE-2022-2588": { + "cmt_msg": "net_sched: cls_route: remove from list when handle is 0" + }, + "CVE-2021-39657": { + "cmt_msg": "scsi: ufs: Correct the LUN used in eh_device_reset_handler() callback" + }, + "CVE-2021-3669": { + "cmt_msg": "ipc: replace costly bailout check in sysvipc_find_ipc()" + }, + "CVE-2019-3701": { + "cmt_msg": "can: gw: ensure DLC boundaries after CAN frame modification" + }, + "CVE-2019-12984": { + "cmt_msg": "nfc: Ensure presence of required attributes in the deactivate_target handler" + }, + "CVE-2023-1095": { + "cmt_msg": "netfilter: nf_tables: fix null deref due to zeroed list head" + }, + "CVE-2019-11091": { + "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" + }, + "CVE-2021-47034": { + "cmt_msg": "powerpc/64s: Fix pte update for kernel memory on radix" + }, + "CVE-2022-3239": { + "cmt_msg": "media: em28xx: initialize refcount before kref_get" + }, + "CVE-2022-4543": { + "cmt_msg": "" + }, + "CVE-2023-52571": { + "cmt_msg": "power: supply: rk817: Fix node refcount leak" + }, + "CVE-2023-52572": { + "cmt_msg": "cifs: Fix UAF in cifs_demultiplex_thread()" + }, + "CVE-2020-15780": { + "cmt_msg": "ACPI: configfs: Disallow loading ACPI tables when locked down" + }, + "CVE-2023-4921": { + "cmt_msg": "net: sched: sch_qfq: Fix UAF in qfq_dequeue()" + }, + "CVE-2022-3424": { + "cmt_msg": "misc: sgi-gru: fix use-after-free error in gru_set_context_option, gru_fault and gru_handle_user_call_os" + }, + "CVE-2023-23455": { + "cmt_msg": "net: sched: atm: dont intepret cls results when asked to drop" + }, + "CVE-2023-1829": { + "cmt_msg": "net/sched: Retire tcindex classifier" + }, + "CVE-2021-46915": { + "cmt_msg": "netfilter: nft_limit: avoid possible divide error in nft_limit_init" + }, + "CVE-2019-19227": { + "cmt_msg": "appletalk: Fix potential NULL pointer dereference in unregister_snap_client" + }, + "CVE-2021-34981": { + "cmt_msg": "Bluetooth: cmtp: fix file refcount when cmtp_attach_device fails" + }, + "CVE-2024-0775": { + "cmt_msg": "ext4: improve error recovery code paths in __ext4_remount()" + }, + "CVE-2018-14625": { + "cmt_msg": "vhost/vsock: fix use-after-free in network stack callers" + }, + "CVE-2023-4881": { + "cmt_msg": "netfilter: nftables: exthdr: fix 4-byte stack OOB write" + }, + "CVE-2020-24394": { + "cmt_msg": "nfsd: apply umask on fs without ACL support" + }, + "CVE-2024-26769": { + "cmt_msg": "nvmet-fc: avoid deadlock on delete association path" + }, + "CVE-2022-20148": { + "cmt_msg": "f2fs: fix UAF in f2fs_available_free_memory" + }, + "CVE-2024-26704": { + "cmt_msg": "ext4: fix double-free of blocks due to wrong extents moved_len" + }, + "CVE-2022-1786": { + "cmt_msg": "io_uring: remove io_identity" + }, + "CVE-2013-7445": { + "cmt_msg": "" + }, + "CVE-2019-18814": { + "cmt_msg": "apparmor: Fix use-after-free in aa_audit_rule_init" + }, + "CVE-2022-28390": { + "cmt_msg": "can: ems_usb: ems_usb_start_xmit(): fix double dev_kfree_skb() in error path" + }, + "CVE-2023-34255": { + "cmt_msg": "xfs: verify buffer contents when we skip log replay" + }, + "CVE-2019-13233": { + "cmt_msg": "x86/insn-eval: Fix use-after-free access to LDT entry" + }, + "CVE-2024-26735": { + "cmt_msg": "ipv6: sr: fix possible use-after-free and null-ptr-deref" + }, + "CVE-2024-26738": { + "cmt_msg": "powerpc/pseries/iommu: DLPAR add doesn't completely initialize pci_controller" + }, + "CVE-2022-26966": { + "cmt_msg": "sr9700: sanity check for packet length" + }, + "CVE-2021-3655": { + "cmt_msg": "sctp: validate from_addr_param return" + }, + "CVE-2020-14386": { + "cmt_msg": "net/packet: fix overflow in tpacket_rcv" + }, + "CVE-2021-34693": { + "cmt_msg": "can: bcm: fix infoleak in struct bcm_msg_head" + }, + "CVE-2020-14385": { + "cmt_msg": "xfs: fix boundary test in xfs_attr_shortform_verify" + }, + "CVE-2019-19767": { + "cmt_msg": "ext4: add more paranoia checking in ext4_expand_extra_isize handling" + }, + "CVE-2021-3656": { + "cmt_msg": "KVM: nSVM: always intercept VMLOAD/VMSAVE when nested (CVE-2021-3656)" + }, + "CVE-2020-14381": { + "cmt_msg": "futex: Fix inode life-time issue" + }, + "CVE-2019-19768": { + "cmt_msg": "blktrace: Protect q->blk_trace with RCU" + }, + "CVE-2022-3303": { + "cmt_msg": "ALSA: pcm: oss: Fix race at SNDCTL_DSP_SYNC" + }, + "CVE-2023-52443": { + "cmt_msg": "apparmor: avoid crash when parsed profile name is empty" + }, + "CVE-2022-20141": { + "cmt_msg": "igmp: Add ip_mc_list lock in ip_check_mc_rcu" + }, + "CVE-2020-25704": { + "cmt_msg": "perf/core: Fix a memory leak in perf_event_parse_addr_filter()" + }, + "CVE-2021-45095": { + "cmt_msg": "phonet: refcount leak in pep_sock_accep" + }, + "CVE-2023-23454": { + "cmt_msg": "net: sched: cbq: dont intepret cls results when asked to drop" + }, + "CVE-2019-3819": { + "cmt_msg": "HID: debug: fix the ring buffer implementation" + }, + "CVE-2021-37159": { + "cmt_msg": "usb: hso: fix error handling code of hso_create_net_device" + }, + "CVE-2024-26595": { + "cmt_msg": "mlxsw: spectrum_acl_tcam: Fix NULL pointer dereference in error path" + }, + "CVE-2023-52506": { + "cmt_msg": "LoongArch: Set all reserved memblocks on Node#0 at initialization" + }, + "CVE-2021-29154": { + "cmt_msg": "bpf, x86: Validate computation of branch displacements for x86-64" + }, + "CVE-2023-6932": { + "cmt_msg": "ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet" + }, + "CVE-2024-26801": { + "cmt_msg": "Bluetooth: Avoid potential use-after-free in hci_error_reset" + }, + "CVE-2020-16166": { + "cmt_msg": "random32: update the net random state on interrupt and activity" + }, + "CVE-2021-29155": { + "cmt_msg": "bpf: Use correct permission flag for mixed signed bounds arithmetic" + }, + "CVE-2021-33631": { + "cmt_msg": "ext4: fix kernel BUG in 'ext4_write_inline_data_end()'" + }, + "CVE-2019-15916": { + "cmt_msg": "net-sysfs: Fix mem leak in netdev_register_kobject" + }, + "CVE-2019-15917": { + "cmt_msg": "Bluetooth: hci_ldisc: Postpone HCI_UART_PROTO_READY bit set in hci_uart_set_proto()" + }, + "CVE-2019-15918": { + "cmt_msg": "cifs: Fix lease buffer length error" + }, + "CVE-2019-15919": { + "cmt_msg": "cifs: Fix use-after-free in SMB2_write" + }, + "CVE-2021-46906": { + "cmt_msg": "HID: usbhid: fix info leak in hid_submit_ctrl" + }, + "CVE-2023-52444": { + "cmt_msg": "f2fs: fix to avoid dirent corruption" + }, + "CVE-2024-26768": { + "cmt_msg": "LoongArch: Change acpi_core_pic[NR_CPUS] to acpi_core_pic[MAX_CORE_PIC]" + }, + "CVE-2020-12362": { + "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" + }, + "CVE-2020-12363": { + "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" + }, + "CVE-2022-4129": { + "cmt_msg": "l2tp: Serialize access to sk_user_data with sk_callback_lock" + }, + "CVE-2023-3117": { + "cmt_msg": "netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE" + }, + "CVE-2022-28389": { + "cmt_msg": "can: mcba_usb: mcba_usb_start_xmit(): fix double dev_kfree_skb in error path" + }, + "CVE-2020-12364": { + "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" + }, + "CVE-2019-10639": { + "cmt_msg": "netns: provide pure entropy for net_hash_mix()" + }, + "CVE-2024-26646": { + "cmt_msg": "thermal: intel: hfi: Add syscore callbacks for system-wide PM" + }, + "CVE-2024-26647": { + "cmt_msg": "drm/amd/display: Fix late derefrence 'dsc' check in 'link_set_dsc_pps_packet()'" + }, + "CVE-2024-26644": { + "cmt_msg": "btrfs: don't abort filesystem when attempting to snapshot deleted subvolume" + }, + "CVE-2022-28388": { + "cmt_msg": "can: usb_8dev: usb_8dev_start_xmit(): fix double dev_kfree_skb() in error path" + }, + "CVE-2023-33203": { + "cmt_msg": "net: qcom/emac: Fix use after free bug in emac_remove due to race condition" + }, + "CVE-2024-26640": { + "cmt_msg": "tcp: add sanity checks to rx zerocopy" + }, + "CVE-2021-0605": { + "cmt_msg": "af_key: pfkey_dump needs parameter validation" + }, + "CVE-2021-3896": { + "cmt_msg": "isdn: cpai: check ctr->cnr to avoid array index out of bound" + }, + "CVE-2021-4002": { + "cmt_msg": "hugetlbfs: flush TLBs correctly after huge_pmd_unshare" + }, + "CVE-2023-26545": { + "cmt_msg": "net: mpls: fix stale pointer if allocation fails during device rename" + }, + "CVE-2023-52519": { + "cmt_msg": "HID: intel-ish-hid: ipc: Disable and reenable ACPI GPE bit" + }, + "CVE-2021-38204": { + "cmt_msg": "usb: max-3421: Prevent corruption of freed memory" + }, + "CVE-2022-34918": { + "cmt_msg": "netfilter: nf_tables: stricter validation of element data" + }, + "CVE-2022-20008": { + "cmt_msg": "mmc: block: fix read single on recovery logic" + }, + "CVE-2021-3894": { + "cmt_msg": "sctp: account stream padding length for reconf chunk" + }, + "CVE-2024-26641": { + "cmt_msg": "ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv()" + }, + "CVE-2024-26791": { + "cmt_msg": "btrfs: dev-replace: properly validate device names" + }, + "CVE-2019-18786": { + "cmt_msg": "media: rcar_drif: fix a memory disclosure" + }, + "CVE-2019-20810": { + "cmt_msg": "media: go7007: fix a miss of snd_card_free" + }, + "CVE-2023-52464": { + "cmt_msg": "EDAC/thunderx: Fix possible out-of-bounds string access" + }, + "CVE-2019-20812": { + "cmt_msg": "af_packet: set defaule value for tmo" + }, + "CVE-2023-52600": { + "cmt_msg": "jfs: fix uaf in jfs_evict_inode" + }, + "CVE-2023-1990": { + "cmt_msg": "nfc: st-nci: Fix use after free bug in ndlc_remove due to race condition" + }, + "CVE-2020-14314": { + "cmt_msg": "ext4: fix potential negative array index in do_split()" + }, + "CVE-2019-9003": { + "cmt_msg": "ipmi: fix use-after-free of user->release_barrier.rda" + }, + "CVE-2023-6356": { + "cmt_msg": "nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length" + }, + "CVE-2022-26373": { + "cmt_msg": "x86/speculation: Add RSB VM Exit protections" + }, + "CVE-2019-18660": { + "cmt_msg": "powerpc/book3s64: Fix link stack flush on context switch" + }, + "CVE-2019-15291": { + "cmt_msg": "media: b2c2-flexcop-usb: add sanity checking" + }, + "CVE-2019-15290": { + "cmt_msg": "" + }, + "CVE-2023-3212": { + "cmt_msg": "gfs2: Don't deref jdesc in evict" + }, + "CVE-2024-23848": { + "cmt_msg": "" + }, + "CVE-2021-46904": { + "cmt_msg": "net: hso: fix null-ptr-deref during tty device unregistration" + }, + "CVE-2021-47159": { + "cmt_msg": "net: dsa: fix a crash if ->get_sset_count() fails" + }, + "CVE-2022-0617": { + "cmt_msg": "udf: Fix NULL ptr deref when converting from inline format" + }, + "CVE-2023-4459": { + "cmt_msg": "net: vmxnet3: fix possible NULL pointer dereference in vmxnet3_rq_cleanup()" + }, + "CVE-2024-26625": { + "cmt_msg": "llc: call sock_orphan() at release time" + }, + "CVE-2024-26635": { + "cmt_msg": "llc: Drop support for ETH_P_TR_802_2." + }, + "CVE-2022-41218": { + "cmt_msg": "media: dvb-core: Fix UAF due to refcount races at releasing" + }, + "CVE-2022-23036": { + "cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()" + }, + "CVE-2023-52639": { + "cmt_msg": "KVM: s390: vsie: fix race during shadow creation" + }, + "CVE-2022-2153": { + "cmt_msg": "KVM: x86: Avoid theoretical NULL pointer dereference in kvm_irq_delivery_to_apic_fast()" + }, + "CVE-2024-2193": { + "cmt_msg": "" + }, + "CVE-2022-20566": { + "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free caused by l2cap_chan_put" + }, + "CVE-2018-12930": { + "cmt_msg": "" + }, + "CVE-2018-12931": { + "cmt_msg": "" + }, + "CVE-2022-20424": { + "cmt_msg": "io_uring: remove io_identity" + }, + "CVE-2024-23196": { + "cmt_msg": "ALSA: hda: fix a possible null-pointer dereference due to data race in snd_hdac_regmap_sync()" + }, + "CVE-2020-12768": { + "cmt_msg": "KVM: SVM: Fix potential memory leak in svm_cpu_init()" + }, + "CVE-2020-12769": { + "cmt_msg": "spi: spi-dw: Add lock protect dw_spi rx/tx to prevent concurrent calls" + }, + "CVE-2024-26765": { + "cmt_msg": "LoongArch: Disable IRQ before init_fn() for nonboot CPUs" + }, + "CVE-2023-52609": { + "cmt_msg": "binder: fix race between mmput() and do_exit()" + }, + "CVE-2021-32399": { + "cmt_msg": "bluetooth: eliminate the potential race condition when removing the HCI controller" + }, + "CVE-2023-3863": { + "cmt_msg": "net: nfc: Fix use-after-free caused by nfc_llcp_find_local" + }, + "CVE-2019-12380": { + "cmt_msg": "efi/x86/Add missing error handling to old_memmap 1:1 mapping code" + }, + "CVE-2019-12381": { + "cmt_msg": "ip_sockglue: Fix missing-check bug in ip_ra_control()" + }, + "CVE-2019-12382": { + "cmt_msg": "drm/edid: Fix a missing-check bug in drm_load_edid_firmware()" + }, + "CVE-2023-52634": { + "cmt_msg": "drm/amd/display: Fix disable_otg_wa logic" + }, + "CVE-2022-22942": { + "cmt_msg": "drm/vmwgfx: Fix stale file descriptors on failed usercopy" + }, + "CVE-2018-20669": { + "cmt_msg": "make 'user_access_begin()' do 'access_ok()'" + }, + "CVE-2022-21499": { + "cmt_msg": "lockdown: also lock down previous kgdb use" + }, + "CVE-2019-19543": { + "cmt_msg": "media: serial_ir: Fix use-after-free in serial_ir_init_module" + }, + "CVE-2020-36783": { + "cmt_msg": "i2c: img-scb: fix reference leak when pm_runtime_get_sync fails" + }, + "CVE-2020-36780": { + "cmt_msg": "i2c: sprd: fix reference leak when pm_runtime_get_sync fails" + }, + "CVE-2020-36781": { + "cmt_msg": "i2c: imx: fix reference leak when pm_runtime_get_sync fails" + }, + "CVE-2021-3732": { + "cmt_msg": "ovl: prevent private clone if bind mount is not allowed" + }, + "CVE-2020-36784": { + "cmt_msg": "i2c: cadence: fix reference leak when pm_runtime_get_sync fails" + }, + "CVE-2022-25375": { + "cmt_msg": "usb: gadget: rndis: check size of RNDIS_MSG_SET command" + }, + "CVE-2020-10766": { + "cmt_msg": "x86/speculation: Prevent rogue cross-process SSBD shutdown" + }, + "CVE-2020-10767": { + "cmt_msg": "x86/speculation: Avoid force-disabling IBPB based on STIBP and enhanced IBRS." + }, + "CVE-2019-25162": { + "cmt_msg": "i2c: Fix a potential use after free" + }, + "CVE-2019-25160": { + "cmt_msg": "netlabel: fix out-of-bounds memory accesses" + }, + "CVE-2018-12207": { + "cmt_msg": "kvm: x86, powerpc: do not allow clearing largepages debugfs entry" + }, + "CVE-2024-26627": { + "cmt_msg": "scsi: core: Move scsi_host_busy() out of host lock for waking up EH handler" + }, + "CVE-2020-13143": { + "cmt_msg": "USB: gadget: fix illegal array access in binding with UDC" + }, + "CVE-2020-10768": { + "cmt_msg": "x86/speculation: PR_SPEC_FORCE_DISABLE enforcement for indirect branches." + }, + "CVE-2020-10769": { + "cmt_msg": "crypto: authenc - fix parsing key with misaligned rta_len" + }, + "CVE-2023-39198": { + "cmt_msg": "drm/qxl: fix UAF on handle creation" + }, + "CVE-2019-0148": { + "cmt_msg": "i40e: Wrong truncation from u16 to u8" + }, + "CVE-2019-0149": { + "cmt_msg": "i40e: Add bounds check for ch[] array" + }, + "CVE-2019-17075": { + "cmt_msg": "RDMA/cxgb4: Do not dma memory off of the stack" + }, + "CVE-2022-48626": { + "cmt_msg": "moxart: fix potential use-after-free on remove path" + }, + "CVE-2022-3903": { + "cmt_msg": "media: mceusb: Use new usb_control_msg_*() routines" + }, + "CVE-2024-26642": { + "cmt_msg": "netfilter: nf_tables: disallow anonymous set with timeout flag" + }, + "CVE-2019-19447": { + "cmt_msg": "ext4: work around deleting a file with i_nlink == 0 safely" + }, + "CVE-2019-0146": { + "cmt_msg": "i40e: add num_vectors checker in iwarp handler" + }, + "CVE-2019-0147": { + "cmt_msg": "i40e: add num_vectors checker in iwarp handler" + }, + "CVE-2020-10942": { + "cmt_msg": "vhost: Check docket sk_family instead of call getname" + }, + "CVE-2019-0145": { + "cmt_msg": "i40e: add num_vectors checker in iwarp handler" + }, + "CVE-2021-47070": { + "cmt_msg": "uio_hv_generic: Fix another memory leak in error handling paths" + }, + "CVE-2021-47073": { + "cmt_msg": "platform/x86: dell-smbios-wmi: Fix oops on rmmod dell_smbios" + }, + "CVE-2022-44034": { + "cmt_msg": "char: pcmcia: remove all the drivers" + }, + "CVE-2021-47075": { + "cmt_msg": "nvmet: fix memory leak in nvmet_alloc_ctrl()" + }, + "CVE-2019-11191": { + "cmt_msg": "x86: Deprecate a.out support" + }, + "CVE-2021-47077": { + "cmt_msg": "scsi: qedf: Add pointer checks in qedf_update_link_speed()" + }, + "CVE-2021-47076": { + "cmt_msg": "RDMA/rxe: Return CQE error if invalid lkey was supplied" + }, + "CVE-2021-47170": { + "cmt_msg": "USB: usbfs: Don't WARN about excessively large memory allocations" + }, + "CVE-2021-47078": { + "cmt_msg": "RDMA/rxe: Clear all QP fields if creation failed" + }, + "CVE-2021-47172": { + "cmt_msg": "iio: adc: ad7124: Fix potential overflow due to non sequential channel numbers" + }, + "CVE-2021-47173": { + "cmt_msg": "misc/uss720: fix memory leak in uss720_probe" + }, + "CVE-2022-36123": { + "cmt_msg": "x86: Clear .brk area at early boot" + }, + "CVE-2021-47175": { + "cmt_msg": "net/sched: fq_pie: fix OOB access in the traffic path" + }, + "CVE-2020-10781": { + "cmt_msg": "Revert \"zram: convert remaining CLASS_ATTR() to CLASS_ATTR_RO()\"" + }, + "CVE-2021-46951": { + "cmt_msg": "tpm: efi: Use local variable for calculating final log size" + }, + "CVE-2021-46950": { + "cmt_msg": "md/raid1: properly indicate failure when ending a failed write request" + }, + "CVE-2021-46953": { + "cmt_msg": "ACPI: GTDT: Don't corrupt interrupt mappings on watchdow probe failure" + }, + "CVE-2021-46952": { + "cmt_msg": "NFS: fs_context: validate UDP retrans to prevent shift out-of-bounds" + }, + "CVE-2021-46955": { + "cmt_msg": "openvswitch: fix stack OOB read while fragmenting IPv4 packets" + }, + "CVE-2024-0607": { + "cmt_msg": "netfilter: nf_tables: fix pointer math issue in nft_byteorder_eval()" + }, + "CVE-2021-46959": { + "cmt_msg": "spi: Fix use-after-free with devm_spi_alloc_*" + }, + "CVE-2020-26139": { + "cmt_msg": "mac80211: do not accept/forward invalid EAPOL frames" + }, + "CVE-2024-26772": { + "cmt_msg": "ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal()" + }, + "CVE-2019-10220": { + "cmt_msg": "Convert filldir[64]() from __put_user() to unsafe_put_user()" + }, + "CVE-2021-3609": { + "cmt_msg": "can: bcm: delay release of struct bcm_op after synchronize_rcu()" + }, + "CVE-2023-52595": { + "cmt_msg": "wifi: rt2x00: restart beacon queue when hardware reset" + }, + "CVE-2019-19536": { + "cmt_msg": "can: peak_usb: pcan_usb_pro: Fix info-leaks to USB devices" + }, + "CVE-2019-19537": { + "cmt_msg": "USB: core: Fix races in character device registration and deregistraion" + }, + "CVE-2019-19534": { + "cmt_msg": "can: peak_usb: fix slab info leak" + }, + "CVE-2019-19535": { + "cmt_msg": "can: peak_usb: pcan_usb_fd: Fix info-leaks to USB devices" + }, + "CVE-2020-11565": { + "cmt_msg": "mm: mempolicy: require at least one nodeid for MPOL_PREFERRED" + }, + "CVE-2019-19533": { + "cmt_msg": "media: ttusb-dec: Fix info-leak in ttusb_dec_send_command()" + }, + "CVE-2019-19530": { + "cmt_msg": "usb: cdc-acm: make sure a refcount is taken early enough" + }, + "CVE-2019-19531": { + "cmt_msg": "usb: yurex: Fix use-after-free in yurex_delete" + }, + "CVE-2022-33981": { + "cmt_msg": "floppy: disable FDRAWCMD by default" + }, + "CVE-2021-0929": { + "cmt_msg": "staging/android/ion: delete dma_buf->kmap/unmap implemenation" + }, + "CVE-2018-14616": { + "cmt_msg": "f2fs: fix to do sanity check with block address in main area v2" + }, + "CVE-2019-20095": { + "cmt_msg": "mwifiex: Fix mem leak in mwifiex_tm_cmd" + }, + "CVE-2023-52590": { + "cmt_msg": "ocfs2: Avoid touching renamed directory if parent does not change" + }, + "CVE-2018-19985": { + "cmt_msg": "USB: hso: Fix OOB memory access in hso_probe/hso_get_config_data" + }, + "CVE-2021-0920": { + "cmt_msg": "af_unix: fix garbage collect vs MSG_PEEK" + }, + "CVE-2022-0168": { + "cmt_msg": "cifs: fix NULL ptr dereference in smb2_ioctl_query_info()" + }, + "CVE-2023-51043": { + "cmt_msg": "drm/atomic: Fix potential use-after-free in nonblocking commits" + }, + "CVE-2020-28374": { + "cmt_msg": "scsi: target: Fix XCOPY NAA identifier lookup" + }, + "CVE-2019-9213": { + "cmt_msg": "mm: enforce min addr even if capable() in expand_downwards()" + }, + "CVE-2023-0615": { + "cmt_msg": "media: vivid: dev->bitmap_cap wasn't freed in all cases" + }, + "CVE-2024-26672": { + "cmt_msg": "drm/amdgpu: Fix variable 'mca_funcs' dereferenced before NULL check in 'amdgpu_mca_smu_get_mca_entry()'" + }, + "CVE-2019-14896": { + "cmt_msg": "libertas: Fix two buffer overflows at parsing bss descriptor" + }, + "CVE-2019-14897": { + "cmt_msg": "libertas: Fix two buffer overflows at parsing bss descriptor" + }, + "CVE-2019-14895": { + "cmt_msg": "mwifiex: fix possible heap overflow in mwifiex_process_country_ie()" + }, + "CVE-2023-52522": { + "cmt_msg": "net: fix possible store tearing in neigh_periodic_work()" + }, + "CVE-2022-3586": { + "cmt_msg": "sch_sfb: Don't assume the skb is still around after enqueueing to child" + }, + "CVE-2024-26636": { + "cmt_msg": "llc: make llc_ui_sendmsg() more robust against bonding changes" + }, + "CVE-2022-43750": { + "cmt_msg": "usb: mon: make mmapped memory read only" + }, + "CVE-2024-26594": { + "cmt_msg": "ksmbd: validate mech token in session setup" + }, + "CVE-2023-52528": { + "cmt_msg": "net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg" + }, + "CVE-2020-27825": { + "cmt_msg": "tracing: Fix race in trace_open and buffer resize call" + }, + "CVE-2019-2181": { + "cmt_msg": "binder: check for overflow when alloc for security context" + }, + "CVE-2022-20422": { + "cmt_msg": "arm64: fix oops in concurrently setting insn_emulation sysctls" + }, + "CVE-2020-27820": { + "cmt_msg": "drm/nouveau: use drm_dev_unplug() during device removal" + }, + "CVE-2023-1078": { + "cmt_msg": "rds: rds_rm_zerocopy_callback() use list_first_entry()" + }, + "CVE-2020-0067": { + "cmt_msg": "f2fs: fix to avoid memory leakage in f2fs_listxattr" + }, + "CVE-2021-47151": { + "cmt_msg": "interconnect: qcom: bcm-voter: add a missing of_node_put()" + }, + "CVE-2023-4622": { + "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES" + }, + "CVE-2020-26558": { + "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical" + }, + "CVE-2023-39193": { + "cmt_msg": "netfilter: xt_sctp: validate the flag_info count" + }, + "CVE-2023-1079": { + "cmt_msg": "HID: asus: use spinlock to safely schedule workers" + }, + "CVE-2020-26541": { + "cmt_msg": "certs: Add EFI_CERT_X509_GUID support for dbx entries" + }, + "CVE-2019-20811": { + "cmt_msg": "net-sysfs: call dev_hold if kobject_init_and_add success" + }, + "CVE-2024-26600": { + "cmt_msg": "phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP" + }, + "CVE-2023-3390": { + "cmt_msg": "netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE" + }, + "CVE-2021-20317": { + "cmt_msg": "lib/timerqueue: Rely on rbtree semantics for next timer" + }, + "CVE-2021-43389": { + "cmt_msg": "isdn: cpai: check ctr->cnr to avoid array index out of bound" + }, + "CVE-2023-3111": { + "cmt_msg": "btrfs: unset reloc control if transaction commit fails in prepare_to_relocate()" + }, + "CVE-2021-33061": { + "cmt_msg": "ixgbe: add improvement for MDD response functionality" + }, + "CVE-2023-52559": { + "cmt_msg": "iommu/vt-d: Avoid memory allocation in iommu_suspend()" + }, + "CVE-2024-26767": { + "cmt_msg": "drm/amd/display: fixed integer types and null check locations" + }, + "CVE-2024-26766": { + "cmt_msg": "IB/hfi1: Fix sdma.h tx->num_descs off-by-one error" + }, + "CVE-2024-26763": { + "cmt_msg": "dm-crypt: don't modify the data when using authenticated encryption" + }, + "CVE-2023-1476": { + "cmt_msg": "" + }, + "CVE-2023-4010": { + "cmt_msg": "" + }, + "CVE-2023-1074": { + "cmt_msg": "sctp: fail if no bound addresses can be used for a given scope" + }, + "CVE-2021-3864": { + "cmt_msg": "" + }, + "CVE-2024-26770": { + "cmt_msg": "HID: nvidia-shield: Add missing null pointer checks to LED initialization" + }, + "CVE-2024-26584": { + "cmt_msg": "net: tls: handle backlogging of crypto requests" + }, + "CVE-2022-1652": { + "cmt_msg": "floppy: use a statically allocated error counter" + }, + "CVE-2023-4623": { + "cmt_msg": "net/sched: sch_hfsc: Ensure inner classes have fsc curve" + }, + "CVE-2024-26771": { + "cmt_msg": "dmaengine: ti: edma: Add some null pointer checks to the edma_probe" + }, + "CVE-2024-23849": { + "cmt_msg": "net/rds: Fix UBSAN: array-index-out-of-bounds in rds_cmsg_recv" + }, + "CVE-2020-29568": { + "cmt_msg": "xen/xenbus: Allow watches discard events before queueing" + }, + "CVE-2020-29569": { + "cmt_msg": "xen-blkback: set ring->xenblkd to NULL after kthread_stop()" + }, + "CVE-2020-14351": { + "cmt_msg": "perf/core: Fix race in the perf_mmap_close() function" + }, + "CVE-2019-19054": { + "cmt_msg": "media: rc: prevent memory leak in cx23888_ir_probe" + }, + "CVE-2019-19057": { + "cmt_msg": "mwifiex: pcie: Fix memory leak in mwifiex_pcie_init_evt_ring" + }, + "CVE-2019-19056": { + "cmt_msg": "mwifiex: pcie: Fix memory leak in mwifiex_pcie_alloc_cmdrsp_buf" + }, + "CVE-2019-9453": { + "cmt_msg": "f2fs: fix to avoid accessing xattr across the boundary" + }, + "CVE-2023-52574": { + "cmt_msg": "team: fix null-ptr-deref when team device type is changed" + }, + "CVE-2019-19052": { + "cmt_msg": "can: gs_usb: gs_can_open(): prevent memory leak" + }, + "CVE-2019-3846": { + "cmt_msg": "mwifiex: Fix possible buffer overflows at parsing bss descriptor" + }, + "CVE-2023-46838": { + "cmt_msg": "xen-netback: don't produce zero-size SKB frags" + }, + "CVE-2020-0427": { + "cmt_msg": "pinctrl: devicetree: Avoid taking direct reference to device name string" + }, + "CVE-2022-2977": { + "cmt_msg": "tpm: fix reference counting for struct tpm_chip" + }, + "CVE-2019-19058": { + "cmt_msg": "iwlwifi: dbg_ini: fix memory leak in alloc_sgtable" + }, + "CVE-2020-0423": { + "cmt_msg": "binder: fix UAF when releasing todo list" + }, + "CVE-2022-23222": { + "cmt_msg": "bpf: Replace PTR_TO_XXX_OR_NULL with PTR_TO_XXX | PTR_MAYBE_NULL" + }, + "CVE-2023-40283": { + "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb" + }, + "CVE-2016-8660": { + "cmt_msg": "" + }, + "CVE-2023-6270": { + "cmt_msg": "aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts" + }, + "CVE-2023-3090": { + "cmt_msg": "ipvlan:Fix out-of-bounds caused by unclear skb->cb" + }, + "CVE-2019-13272": { + "cmt_msg": "ptrace: Fix ->ptracer_cred handling for PTRACE_TRACEME" + }, + "CVE-2023-1073": { + "cmt_msg": "HID: check empty report_list in hid_validate_values()" + }, + "CVE-2023-45862": { + "cmt_msg": "USB: ene_usb6250: Allocate enough memory for full object" + }, + "CVE-2023-45863": { + "cmt_msg": "kobject: Fix slab-out-of-bounds in fill_kobj_path()" + }, + "CVE-2023-1582": { + "cmt_msg": "fs/proc: task_mmu.c: don't read mapcount for migration entry" + }, + "CVE-2021-47162": { + "cmt_msg": "tipc: skb_linearize the head skb when reassembling msgs" + }, + "CVE-2019-17351": { + "cmt_msg": "xen: let alloc_xenballooned_pages() fail if not enough memory free" + }, + "CVE-2022-21166": { + "cmt_msg": "x86/speculation/mmio: Enable CPU Fill buffer clearing on idle" + }, + "CVE-2020-25669": { + "cmt_msg": "Input: sunkbd - avoid use-after-free in teardown paths" + }, + "CVE-2020-25668": { + "cmt_msg": "tty: make FONTX ioctl use the tty pointer they were actually passed" + }, + "CVE-2008-4609": { + "cmt_msg": "" + }, + "CVE-2020-25705": { + "cmt_msg": "icmp: randomize the global rate limiter" + }, + "CVE-2022-20421": { + "cmt_msg": "binder: fix UAF of ref->proc caused by race condition" + }, + "CVE-2022-0435": { + "cmt_msg": "tipc: improve size validations for received domain records" + }, + "CVE-2022-20565": { + "cmt_msg": "HID: core: Correctly handle ReportSize being zero" + }, + "CVE-2018-5391": { + "cmt_msg": "ip: discard IPv4 datagrams with overlapping segments." + }, + "CVE-2022-3533": { + "cmt_msg": "" + }, + "CVE-2024-26648": { + "cmt_msg": "drm/amd/display: Fix variable deferencing before NULL check in edp_setup_replay()" + }, + "CVE-2021-4135": { + "cmt_msg": "netdevsim: Zero-initialize memory for new map's value in function nsim_bpf_map_alloc" + }, + "CVE-2023-26607": { + "cmt_msg": "ntfs: fix out-of-bounds read in ntfs_attr_find()" + }, + "CVE-2021-46965": { + "cmt_msg": "mtd: physmap: physmap-bt1-rom: Fix unintentional stack access" + }, + "CVE-2019-15239": { + "cmt_msg": "unknown" + }, + "CVE-2024-26743": { + "cmt_msg": "RDMA/qedr: Fix qedr_create_user_qp error flow" + }, + "CVE-2023-52635": { + "cmt_msg": "PM / devfreq: Synchronize devfreq_monitor_[start/stop]" + }, + "CVE-2021-46938": { + "cmt_msg": "dm rq: fix double free of blk_mq_tag_set in dev remove after table load fails" + }, + "CVE-2023-52633": { + "cmt_msg": "um: time-travel: fix time corruption" + }, + "CVE-2023-52632": { + "cmt_msg": "drm/amdkfd: Fix lock dependency warning with srcu" + }, + "CVE-2021-4037": { + "cmt_msg": "xfs: fix up non-directory creation in SGID directories" + }, + "CVE-2021-22543": { + "cmt_msg": "KVM: do not allow mapping valid but non-reference-counted pages" + }, + "CVE-2022-45884": { + "cmt_msg": "" + }, + "CVE-2021-3348": { + "cmt_msg": "nbd: freeze the queue while we're adding connections" + }, + "CVE-2019-1999": { + "cmt_msg": "binder: fix race between munmap() and direct reclaim" + }, + "CVE-2023-20941": { + "cmt_msg": "" + }, + "CVE-2019-15292": { + "cmt_msg": "appletalk: Fix use-after-free in atalk_proc_exit" + }, + "CVE-2018-20836": { + "cmt_msg": "scsi: libsas: fix a race condition when smp task timeout" + }, + "CVE-2024-26740": { + "cmt_msg": "net/sched: act_mirred: use the backlog for mirred ingress" + }, + "CVE-2021-44733": { + "cmt_msg": "tee: handle lookup of shm with reference count 0" + }, + "CVE-2021-3347": { + "cmt_msg": "futex: Ensure the correct return value from futex_lock_pi()" + }, + "CVE-2020-10135": { + "cmt_msg": "Bluetooth: Consolidate encryption handling in hci_encrypt_cfm" + }, + "CVE-2020-25285": { + "cmt_msg": "mm/hugetlb: fix a race between hugetlb sysctl handlers" + }, + "CVE-2019-7308": { + "cmt_msg": "bpf: fix sanitation of alu op with pointer / scalar type from different paths" + }, + "CVE-2021-45868": { + "cmt_msg": "quota: check block number when reading the block in quota file" + }, + "CVE-2022-1966": { + "cmt_msg": "netfilter: nf_tables: disallow non-stateful expression in sets earlier" + }, + "CVE-2021-3587": { + "cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect" + }, + "CVE-2019-16995": { + "cmt_msg": "net: hsr: fix memory leak in hsr_dev_finalize()" + }, + "CVE-2019-16994": { + "cmt_msg": "net: sit: fix memory leak in sit_init_net()" + }, + "CVE-2021-47137": { + "cmt_msg": "net: lantiq: fix memory corruption in RX ring" + }, + "CVE-2022-3534": { + "cmt_msg": "libbpf: Fix use-after-free in btf_dump_name_dups" + }, + "CVE-2023-34256": { + "cmt_msg": "ext4: avoid a potential slab-out-of-bounds in ext4_group_desc_csum" + }, + "CVE-2021-47135": { + "cmt_msg": "mt76: mt7921: fix possible AOOB issue in mt7921_mcu_tx_rate_report" + }, + "CVE-2021-47136": { + "cmt_msg": "net: zero-initialize tc skb extension on allocation" + }, + "CVE-2020-36516": { + "cmt_msg": "ipv4: avoid using shared IP generator for connected sockets" + }, + "CVE-2024-26808": { + "cmt_msg": "netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain" + }, + "CVE-2021-47131": { + "cmt_msg": "net/tls: Fix use-after-free after the TLS device goes down and up" + }, + "CVE-2020-36766": { + "cmt_msg": "cec-api: prevent leaking memory through hole in structure" + }, + "CVE-2021-47133": { + "cmt_msg": "HID: amd_sfh: Fix memory leak in amd_sfh_work" + }, + "CVE-2024-26633": { + "cmt_msg": "ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim()" + }, + "CVE-2024-26675": { + "cmt_msg": "ppp_async: limit MRU to 64K" + }, + "CVE-2022-3061": { + "cmt_msg": "video: fbdev: i740fb: Error out if 'pixclock' equals zero" + }, + "CVE-2021-46991": { + "cmt_msg": "i40e: Fix use-after-free in i40e_client_subtask()" + }, + "CVE-2022-0322": { + "cmt_msg": "sctp: account stream padding length for reconf chunk" + }, + "CVE-2021-46992": { + "cmt_msg": "netfilter: nftables: avoid overflows in nft_hash_buckets()" + }, + "CVE-2023-6121": { + "cmt_msg": "nvmet: nul-terminate the NQNs passed in the connect command" + }, + "CVE-2023-52638": { + "cmt_msg": "can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock" + }, + "CVE-2021-46998": { + "cmt_msg": "ethernet:enic: Fix a use after free bug in enic_hard_start_xmit" + }, + "CVE-2017-13693": { + "cmt_msg": "" + }, + "CVE-2017-13694": { + "cmt_msg": "" + }, + "CVE-2024-26764": { + "cmt_msg": "fs/aio: Restrict kiocb_set_cancel_fn() to I/O submitted via libaio" + }, + "CVE-2021-4149": { + "cmt_msg": "btrfs: unlock newly allocated extent buffer after error" + }, + "CVE-2022-21385": { + "cmt_msg": "net/rds: fix warn in rds_message_alloc_sgs" + }, + "CVE-2022-42895": { + "cmt_msg": "Bluetooth: L2CAP: Fix attempting to access uninitialized memory" + }, + "CVE-2021-3640": { + "cmt_msg": "Bluetooth: sco: Fix lock_sock() blockage by memcpy_from_msg()" + }, + "CVE-2021-3764": { + "cmt_msg": "crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd()" + }, + "CVE-2020-1749": { + "cmt_msg": "net: ipv6_stub: use ip6_dst_lookup_flow instead of ip6_dst_lookup" + }, + "CVE-2022-42896": { + "cmt_msg": "Bluetooth: L2CAP: Fix accepting connection request for invalid SPSM" + }, + "CVE-2021-3760": { + "cmt_msg": "nfc: nci: fix the UAF of rf_conn_info object" + }, + "CVE-2022-48627": { + "cmt_msg": "vt: fix memory overlapping when deleting chars in the buffer" + }, + "CVE-2021-47180": { + "cmt_msg": "NFC: nci: fix memory leak in nci_allocate_device" + }, + "CVE-2022-48628": { + "cmt_msg": "ceph: drop messages from MDS when unmounting" + }, + "CVE-2020-11608": { + "cmt_msg": "media: ov519: add missing endpoint sanity checks" + }, + "CVE-2020-11609": { + "cmt_msg": "media: stv06xx: add missing descriptor sanity checks" + }, + "CVE-2020-28097": { + "cmt_msg": "vgacon: remove software scrollback support" + }, + "CVE-2024-24859": { + "cmt_msg": "" + }, + "CVE-2019-11884": { + "cmt_msg": "Bluetooth: hidp: fix buffer overflow" + }, + "CVE-2024-24855": { + "cmt_msg": "scsi: lpfc: Fix a possible data race in lpfc_unregister_fcf_rescan()" + }, + "CVE-2024-24857": { + "cmt_msg": "" + }, + "CVE-2019-3892": { + "cmt_msg": "coredump: fix race condition between mmget_not_zero()/get_task_mm() and core dumping" + }, + "CVE-2021-29264": { + "cmt_msg": "gianfar: fix jumbo packets+napi+rx overrun crash" + }, + "CVE-2021-29265": { + "cmt_msg": "usbip: fix stub_dev usbip_sockfd_store() races leading to gpf" + }, + "CVE-2021-39648": { + "cmt_msg": "usb: gadget: configfs: Fix use-after-free issue with udc_name" + }, + "CVE-2022-3545": { + "cmt_msg": "nfp: fix use-after-free in area_cache_get()" + }, + "CVE-2023-52569": { + "cmt_msg": "btrfs: remove BUG() after failure to insert delayed dir index item" + }, + "CVE-2023-52568": { + "cmt_msg": "x86/sgx: Resolves SECS reclaim vs. page fault for EAUG race" + }, + "CVE-2020-14416": { + "cmt_msg": "can, slip: Protect tty->disc_data in write_wakeup and close with RCU" + }, + "CVE-2019-0136": { + "cmt_msg": "mac80211: drop robust management frames from unknown TA" + }, + "CVE-2022-3542": { + "cmt_msg": "bnx2x: fix potential memory leak in bnx2x_tpa_stop()" + }, + "CVE-2023-52563": { + "cmt_msg": "drm/meson: fix memory leak on ->hpd_notify callback" + }, + "CVE-2023-52561": { + "cmt_msg": "arm64: dts: qcom: sdm845-db845c: Mark cont splash memory region as reserved" + }, + "CVE-2022-3344": { + "cmt_msg": "KVM: x86: nSVM: harden svm_free_nested against freeing vmcb02 while still in use" + }, + "CVE-2023-52566": { + "cmt_msg": "nilfs2: fix potential use after free in nilfs_gccache_submit_read_data()" + }, + "CVE-2021-21781": { + "cmt_msg": "ARM: ensure the signal page contains defined contents" + }, + "CVE-2021-0512": { + "cmt_msg": "HID: make arrays usage and value to be the same" + }, + "CVE-2021-46929": { + "cmt_msg": "sctp: use call_rcu to free endpoint" + }, + "CVE-2023-1382": { + "cmt_msg": "tipc: set con sock in tipc_conn_alloc" + }, + "CVE-2019-19073": { + "cmt_msg": "ath9k_htc: release allocated buffer if timed out" + }, + "CVE-2023-1380": { + "cmt_msg": "wifi: brcmfmac: slab-out-of-bounds read in brcmf_get_assoc_ies()" + }, + "CVE-2021-46924": { + "cmt_msg": "NFC: st21nfca: Fix memory leak in device probe and remove" + }, + "CVE-2021-46925": { + "cmt_msg": "net/smc: fix kernel panic caused by race of smc_sock" + }, + "CVE-2021-46926": { + "cmt_msg": "ALSA: hda: intel-sdw-acpi: harden detection of controller" + }, + "CVE-2020-0347": { + "cmt_msg": "" + }, + "CVE-2019-18809": { + "cmt_msg": "media: usb: fix memory leak in af9005_identify_state" + }, + "CVE-2019-18808": { + "cmt_msg": "crypto: ccp - Release all allocated memory if sha type is invalid" + }, + "CVE-2023-52591": { + "cmt_msg": "reiserfs: Avoid touching renamed directory if parent does not change" + }, + "CVE-2022-41222": { + "cmt_msg": "mm/mremap: hold the rmap lock in write mode when moving page table entries." + }, + "CVE-2021-40490": { + "cmt_msg": "ext4: fix race writing to an inline_data file while its xattrs are changing" + }, + "CVE-2021-33909": { + "cmt_msg": "seq_file: disallow extremely large seq buffer allocations" + }, + "CVE-2019-12455": { + "cmt_msg": "clk-sunxi: fix a missing-check bug in sunxi_divs_clk_setup()" + }, + "CVE-2019-12456": { + "cmt_msg": "" + }, + "CVE-2019-19070": { + "cmt_msg": "spi: gpio: prevent memory leak in spi_gpio_probe" + }, + "CVE-2019-18805": { + "cmt_msg": "ipv4: set the tcp_min_rtt_wlen range from 0 to one day" + }, + "CVE-2021-29647": { + "cmt_msg": "net: qrtr: fix a kernel-infoleak in qrtr_recvmsg()" + }, + "CVE-2019-18806": { + "cmt_msg": "net: qlogic: Fix memory leak in ql_alloc_large_buffers" + }, + "CVE-2021-33656": { + "cmt_msg": "vt: drop old FONT ioctls" + }, + "CVE-2024-26713": { + "cmt_msg": "powerpc/pseries/iommu: Fix iommu initialisation during DLPAR add" + }, + "CVE-2021-33655": { + "cmt_msg": "fbcon: Disallow setting font bigger than screen size" + }, + "CVE-2024-26804": { + "cmt_msg": "net: ip_tunnel: prevent perpetual headroom growth" + }, + "CVE-2023-3611": { + "cmt_msg": "net/sched: sch_qfq: account for stab overhead in qfq_enqueue" + }, + "CVE-2022-41858": { + "cmt_msg": "drivers: net: slip: fix NPD bug in sl_tx_timeout()" + }, + "CVE-2024-26726": { + "cmt_msg": "btrfs: don't drop extent_map for free space inode on write error" + }, + "CVE-2024-26671": { + "cmt_msg": "blk-mq: fix IO hang from sbitmap wakeup race" + }, + "CVE-2019-6974": { + "cmt_msg": "kvm: fix kvm_ioctl_create_device() reference counting (CVE-2019-6974)" + }, + "CVE-2022-41850": { + "cmt_msg": "HID: roccat: Fix use-after-free in roccat_read()" + }, + "CVE-2020-24503": { + "cmt_msg": "" + }, + "CVE-2023-52607": { + "cmt_msg": "powerpc/mm: Fix null-pointer dereference in pgtable_cache_add" + }, + "CVE-2023-2985": { + "cmt_msg": "fs: hfsplus: fix UAF issue in hfsplus_put_super" + }, + "CVE-2020-14390": { + "cmt_msg": "fbcon: remove soft scrollback code" + }, + "CVE-2023-32269": { + "cmt_msg": "netrom: Fix use-after-free caused by accept on already connected socket" + }, + "CVE-2020-24502": { + "cmt_msg": "" + }, + "CVE-2022-3646": { + "cmt_msg": "nilfs2: fix leak of nilfs_root in case of writer thread creation failure" + }, + "CVE-2021-45469": { + "cmt_msg": "f2fs: fix to do sanity check on last xattr entry in __f2fs_setxattr()" + }, + "CVE-2022-1184": { + "cmt_msg": "ext4: verify dir block before splitting it" + }, + "CVE-2022-3642": { + "cmt_msg": "" + }, + "CVE-2019-19448": { + "cmt_msg": "btrfs: only search for left_info if there is no right_info in try_merge_free_space" + }, + "CVE-2024-0584": { + "cmt_msg": "ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet" + }, + "CVE-2019-19449": { + "cmt_msg": "f2fs: fix to do sanity check on segment/section count" + }, + "CVE-2020-0465": { + "cmt_msg": "HID: core: Sanitize event code and type when mapping input" + }, + "CVE-2023-6931": { + "cmt_msg": "perf: Fix perf_event_validate_size()" + }, + "CVE-2020-0466": { + "cmt_msg": "do_epoll_ctl(): clean the failure exits up a bit" + }, + "CVE-2023-52516": { + "cmt_msg": "dma-debug: don't call __dma_entry_alloc_check_leak() under free_entries_lock" + }, + "CVE-2021-4218": { + "cmt_msg": "sysctl: pass kernel pointers to ->proc_handler" + }, + "CVE-2023-52515": { + "cmt_msg": "RDMA/srp: Do not call scsi_done() from srp_abort()" + }, + "CVE-2020-0543": { + "cmt_msg": "x86/cpu: Add 'table' argument to cpu_matches()" + }, + "CVE-2023-52510": { + "cmt_msg": "ieee802154: ca8210: Fix a potential UAF in ca8210_probe" + }, + "CVE-2023-3358": { + "cmt_msg": "HID: intel_ish-hid: Add check for ishtp_dma_tx_map" + }, + "CVE-2019-20054": { + "cmt_msg": "fs/proc/proc_sysctl.c: fix NULL pointer dereference in put_links" + }, + "CVE-2024-0340": { + "cmt_msg": "vhost: use kzalloc() instead of kmalloc() followed by memset()" + }, + "CVE-2021-3753": { + "cmt_msg": "vt_kdsetmode: extend console locking" + }, + "CVE-2023-6536": { + "cmt_msg": "nvmet-tcp: fix a crash in nvmet_req_complete()" + }, + "CVE-2019-11135": { + "cmt_msg": "x86/msr: Add the IA32_TSX_CTRL MSR" + }, + "CVE-2019-11811": { + "cmt_msg": "ipmi_si: fix use-after-free of resource->name" + }, + "CVE-2019-11810": { + "cmt_msg": "scsi: megaraid_sas: return error when create DMA pool failed" + }, + "CVE-2021-27365": { + "cmt_msg": "scsi: iscsi: Ensure sysfs attributes are limited to PAGE_SIZE" + }, + "CVE-2021-27364": { + "cmt_msg": "scsi: iscsi: Restrict sessions and handles to admin capabilities" + }, + "CVE-2019-11815": { + "cmt_msg": "net: rds: force to destroy connection if t_sock is NULL in rds_tcp_kill_sock()." + }, + "CVE-2020-0431": { + "cmt_msg": "HID: hid-input: clear unmapped usages" + }, + "CVE-2022-39842": { + "cmt_msg": "video: fbdev: pxa3xx-gcu: Fix integer overflow in pxa3xx_gcu_write" + }, + "CVE-2018-17977": { + "cmt_msg": "" + }, + "CVE-2024-1151": { + "cmt_msg": "net: openvswitch: limit the number of recursions from action sets" + }, + "CVE-2024-26659": { + "cmt_msg": "xhci: handle isoc Babble and Buffer Overrun events properly" + }, + "CVE-2024-26658": { + "cmt_msg": "bcachefs: grab s_umount only if snapshotting" + }, + "CVE-2023-31081": { + "cmt_msg": "" + }, + "CVE-2010-5321": { + "cmt_msg": "" + }, + "CVE-2021-20322": { + "cmt_msg": "ipv6: make exception cache less predictible" + }, + "CVE-2024-26654": { + "cmt_msg": "ALSA: sh: aica: reorder cleanup operations to avoid UAF bugs" + }, + "CVE-2021-20320": { + "cmt_msg": "s390/bpf: Fix optimizing out zero-extensions" + }, + "CVE-2021-20321": { + "cmt_msg": "ovl: fix missing negative dentry check in ovl_rename()" + }, + "CVE-2024-26651": { + "cmt_msg": "sr9800: Add check for usbnet_get_endpoints" + }, + "CVE-2024-26650": { + "cmt_msg": "platform/x86: p2sb: Allow p2sb_bar() calls during PCI device probe" + }, + "CVE-2022-26490": { + "cmt_msg": "nfc: st21nfca: Fix potential buffer overflows in EVT_TRANSACTION" + }, + "CVE-2023-3812": { + "cmt_msg": "net: tun: fix bugs for oversize packet when napi frags enabled" + }, + "CVE-2023-7192": { + "cmt_msg": "netfilter: ctnetlink: fix possible refcount leak in ctnetlink_create_conntrack()" + }, + "CVE-2022-3169": { + "cmt_msg": "nvme: ensure subsystem reset is single threaded" + }, + "CVE-2022-4744": { + "cmt_msg": "tun: avoid double free in tun_free_netdev" + }, + "CVE-2022-36280": { + "cmt_msg": "drm/vmwgfx: Validate the box size for the snooped cursor" + }, + "CVE-2022-1048": { + "cmt_msg": "ALSA: pcm: Fix races among concurrent hw_params and hw_free calls" + }, + "CVE-2024-26696": { + "cmt_msg": "nilfs2: fix hang in nilfs_lookup_dirty_data_buffers()" + }, + "CVE-2024-26803": { + "cmt_msg": "net: veth: clear GRO when clearing XDP even when down" + }, + "CVE-2023-52475": { + "cmt_msg": "Input: powermate - fix use-after-free in powermate_config_complete" + }, + "CVE-2021-0342": { + "cmt_msg": "tun: correct header offsets in napi frags mode" + }, + "CVE-2023-52477": { + "cmt_msg": "usb: hub: Guard against accesses to uninitialized BOS descriptors" + }, + "CVE-2023-52476": { + "cmt_msg": "perf/x86/lbr: Filter vsyscall addresses" + }, + "CVE-2023-22995": { + "cmt_msg": "usb: dwc3: dwc3-qcom: Add missing platform_device_put() in dwc3_qcom_acpi_register_core" + }, + "CVE-2023-52470": { + "cmt_msg": "drm/radeon: check the alloc_workqueue return value in radeon_crtc_init()" + }, + "CVE-2024-21803": { + "cmt_msg": "" + }, + "CVE-2023-52479": { + "cmt_msg": "ksmbd: fix uaf in smb20_oplock_break_ack" + }, + "CVE-2019-15927": { + "cmt_msg": "ALSA: usb-audio: Avoid access before bLength check in build_audio_procunit()" + }, + "CVE-2021-3542": { + "cmt_msg": "" + }, + "CVE-2019-16413": { + "cmt_msg": "9p: use inode->i_lock to protect i_size_write() under 32-bit" + }, + "CVE-2024-24860": { + "cmt_msg": "Bluetooth: Fix atomicity violation in {min,max}_key_size_set" + }, + "CVE-2020-12659": { + "cmt_msg": "xsk: Add missing check on user supplied headroom size" + }, + "CVE-2024-22099": { + "cmt_msg": "Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security" + }, + "CVE-2023-2194": { + "cmt_msg": "i2c: xgene-slimpro: Fix out-of-bounds bug in xgene_slimpro_i2c_xfer()" + }, + "CVE-2023-30456": { + "cmt_msg": "KVM: nVMX: add missing consistency checks for CR0 and CR4" + }, + "CVE-2020-12652": { + "cmt_msg": "scsi: mptfusion: Fix double fetch bug in ioctl" + }, + "CVE-2020-12653": { + "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_cmd_append_vsie_tlv()" + }, + "CVE-2019-7222": { + "cmt_msg": "KVM: x86: work around leak of uninitialized stack contents (CVE-2019-7222)" + }, + "CVE-2020-12657": { + "cmt_msg": "block, bfq: fix use-after-free in bfq_idle_slice_timer_body" + }, + "CVE-2020-12654": { + "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_ret_wmm_get_status()" + }, + "CVE-2019-7221": { + "cmt_msg": "KVM: nVMX: unconditionally cancel preemption timer in free_nested (CVE-2019-7221)" + }, + "CVE-2018-12929": { + "cmt_msg": "" + }, + "CVE-2018-12928": { + "cmt_msg": "" + }, + "CVE-2024-26700": { + "cmt_msg": "drm/amd/display: Fix MST Null Ptr for RV" + }, + "CVE-2020-36311": { + "cmt_msg": "KVM: SVM: Periodically schedule when unregistering regions on destroy" + }, + "CVE-2020-36310": { + "cmt_msg": "KVM: SVM: avoid infinite loop on NPF from bad address" + }, + "CVE-2020-36313": { + "cmt_msg": "KVM: Fix out of range accesses to memslots" + }, + "CVE-2020-35519": { + "cmt_msg": "net/x25: prevent a couple of overflows" + }, + "CVE-2024-26592": { + "cmt_msg": "ksmbd: fix UAF issue in ksmbd_tcp_new_connection()" + }, + "CVE-2021-28971": { + "cmt_msg": "perf/x86/intel: Fix a crash caused by zero PEBS status" + }, + "CVE-2020-10708": { + "cmt_msg": "" + }, + "CVE-2020-25673": { + "cmt_msg": "nfc: Avoid endless loops caused by repeated llcp_sock_connect()" + }, + "CVE-2022-0400": { + "cmt_msg": "" + }, + "CVE-2024-25741": { + "cmt_msg": "" + }, + "CVE-2024-26778": { + "cmt_msg": "fbdev: savage: Error out if pixclock equals zero" + }, + "CVE-2024-26809": { + "cmt_msg": "netfilter: nft_set_pipapo: release elements in clone only from destroy path" + }, + "CVE-2021-38160": { + "cmt_msg": "virtio_console: Assure used length from device is limited" + }, + "CVE-2021-42739": { + "cmt_msg": "media: firewire: firedtv-avc: fix a buffer overflow in avc_ca_pmt()" + }, + "CVE-2023-1989": { + "cmt_msg": "Bluetooth: btsdio: fix use after free bug in btsdio_remove due to unfinished work" + }, + "CVE-2024-26806": { + "cmt_msg": "spi: cadence-qspi: remove system-wide suspend helper calls from runtime PM hooks" + }, + "CVE-2020-12771": { + "cmt_msg": "bcache: fix potential deadlock problem in btree_gc_coalesce" + }, + "CVE-2020-12770": { + "cmt_msg": "scsi: sg: add sg_remove_request in sg_write" + }, + "CVE-2024-26802": { + "cmt_msg": "stmmac: Clear variable when destroying workqueue" + }, + "CVE-2023-52508": { + "cmt_msg": "nvme-fc: Prevent null pointer dereference in nvme_fc_io_getuuid()" + }, + "CVE-2023-52606": { + "cmt_msg": "powerpc/lib: Validate size for vector operations" + }, + "CVE-2022-20369": { + "cmt_msg": "media: v4l2-mem2mem: Apply DST_QUEUE_OFF_BASE on MMAP buffers across ioctls" + }, + "CVE-2023-52604": { + "cmt_msg": "FS:JFS:UBSAN:array-index-out-of-bounds in dbAdjTree" + }, + "CVE-2023-52531": { + "cmt_msg": "wifi: iwlwifi: mvm: Fix a memory corruption issue" + }, + "CVE-2023-52602": { + "cmt_msg": "jfs: fix slab-out-of-bounds Read in dtSearch" + }, + "CVE-2023-52603": { + "cmt_msg": "UBSAN: array-index-out-of-bounds in dtSplitRoot" + }, + "CVE-2022-25265": { + "cmt_msg": "" + }, + "CVE-2022-20368": { + "cmt_msg": "net/packet: fix slab-out-of-bounds access in packet_recvmsg()" + }, + "CVE-2024-26779": { + "cmt_msg": "wifi: mac80211: fix race condition on enabling fast-xmit" + }, + "CVE-2019-15220": { + "cmt_msg": "p54usb: Fix race between disconnect and firmware loading" + }, + "CVE-2020-10732": { + "cmt_msg": "fs/binfmt_elf.c: allocate initialized memory in fill_thread_core_info()" + }, + "CVE-2020-10773": { + "cmt_msg": "s390/cmm: fix information leak in cmm_timeout_handler()" + }, + "CVE-2020-36782": { + "cmt_msg": "i2c: imx-lpi2c: fix reference leak when pm_runtime_get_sync fails" + }, + "CVE-2020-25284": { + "cmt_msg": "rbd: require global CAP_SYS_ADMIN for mapping and unmapping" + }, + "CVE-2023-4208": { + "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free" + }, + "CVE-2022-3606": { + "cmt_msg": "" + }, + "CVE-2023-4206": { + "cmt_msg": "net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free" + }, + "CVE-2023-4207": { + "cmt_msg": "net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free" + }, + "CVE-2023-3640": { + "cmt_msg": "" + }, + "CVE-2023-20593": { + "cmt_msg": "x86/cpu/amd: Add a Zenbleed fix" + }, + "CVE-2023-3022": { + "cmt_msg": "ipv6: Use result arg in fib_lookup_arg consistently" + }, + "CVE-2022-2663": { + "cmt_msg": "netfilter: nf_conntrack_irc: Fix forged IP logic" + }, + "CVE-2021-47049": { + "cmt_msg": "Drivers: hv: vmbus: Use after free in __vmbus_open()" + }, + "CVE-2019-8912": { + "cmt_msg": "net: crypto set sk to NULL when af_alg_release." + }, + "CVE-2023-51780": { + "cmt_msg": "atm: Fix Use-After-Free in do_vcc_ioctl" + }, + "CVE-2023-0047": { + "cmt_msg": "mm, oom: do not trigger out_of_memory from the #PF" + }, + "CVE-2021-47046": { + "cmt_msg": "drm/amd/display: Fix off by one in hdmi_14_process_transaction()" + }, + "CVE-2020-29370": { + "cmt_msg": "mm: slub: add missing TID bump in kmem_cache_alloc_bulk()" + }, + "CVE-2019-15219": { + "cmt_msg": "USB: sisusbvga: fix oops in error path of sisusb_probe" + }, + "CVE-2021-47167": { + "cmt_msg": "NFS: Fix an Oopsable condition in __nfs_pageio_add_request()" + }, + "CVE-2021-47166": { + "cmt_msg": "NFS: Don't corrupt the value of pg_bytes_written in nfs_do_recoalesce()" + }, + "CVE-2021-47165": { + "cmt_msg": "drm/meson: fix shutdown crash when component not probed" + }, + "CVE-2021-47163": { + "cmt_msg": "tipc: wait and exit until all work queues are done" + }, + "CVE-2021-46969": { + "cmt_msg": "bus: mhi: core: Fix invalid error returning in mhi_queue" + }, + "CVE-2021-47161": { + "cmt_msg": "spi: spi-fsl-dspi: Fix a resource leak in an error handling path" + }, + "CVE-2021-47160": { + "cmt_msg": "net: dsa: mt7530: fix VLAN traffic leaks" + }, + "CVE-2023-4385": { + "cmt_msg": "fs: jfs: fix possible NULL pointer dereference in dbFree()" + }, + "CVE-2020-25643": { + "cmt_msg": "hdlc_ppp: add range checks in ppp_cp_parse_cr()" + }, + "CVE-2023-4387": { + "cmt_msg": "net: vmxnet3: fix possible use-after-free bugs in vmxnet3_rq_alloc_rx_buf()" + }, + "CVE-2021-46960": { + "cmt_msg": "cifs: Return correct error code from smb2_get_enc_key" + }, + "CVE-2021-46962": { + "cmt_msg": "mmc: uniphier-sd: Fix a resource leak in the remove function" + }, + "CVE-2021-47168": { + "cmt_msg": "NFS: fix an incorrect limit in filelayout_decode_layout()" + }, + "CVE-2019-19378": { + "cmt_msg": "" + }, + "CVE-2023-52482": { + "cmt_msg": "x86/srso: Add SRSO mitigation for Hygon processors" + }, + "CVE-2023-52599": { + "cmt_msg": "jfs: fix array-index-out-of-bounds in diNewExt" + }, + "CVE-2022-1016": { + "cmt_msg": "netfilter: nf_tables: initialize registers in nft_do_chain()" + }, + "CVE-2020-4788": { + "cmt_msg": "powerpc/64s: flush L1D on kernel entry" + }, + "CVE-2024-26744": { + "cmt_msg": "RDMA/srpt: Support specifying the srpt_service_guid parameter" + }, + "CVE-2022-36879": { + "cmt_msg": "xfrm: xfrm_policy: fix a possible double xfrm_pols_put() in xfrm_bundle_lookup()" + }, + "CVE-2021-39698": { + "cmt_msg": "wait: add wake_up_pollfree()" + }, + "CVE-2022-45934": { + "cmt_msg": "Bluetooth: L2CAP: Fix u8 overflow" + }, + "CVE-2022-1247": { + "cmt_msg": "" + }, + "CVE-2019-19377": { + "cmt_msg": "btrfs: Don't submit any btree write bio if the fs has errors" + }, + "CVE-2022-2380": { + "cmt_msg": "video: fbdev: sm712fb: Fix crash in smtcfb_read()" + }, + "CVE-2023-20569": { + "cmt_msg": "x86/bugs: Increase the x86 bugs vector size to two u32s" + }, + "CVE-2022-0850": { + "cmt_msg": "ext4: fix kernel infoleak via ext4_extent_header" + }, + "CVE-2019-19529": { + "cmt_msg": "can: mcba_usb: fix use-after-free on disconnect" + }, + "CVE-2019-19528": { + "cmt_msg": "USB: iowarrior: fix use-after-free on disconnect" + }, + "CVE-2021-3612": { + "cmt_msg": "Input: joydev - prevent potential read overflow in ioctl" + }, + "CVE-2019-19525": { + "cmt_msg": "ieee802154: atusb: fix use-after-free at disconnect" + }, + "CVE-2019-19524": { + "cmt_msg": "Input: ff-memless - kill timer in destroy()" + }, + "CVE-2019-19527": { + "cmt_msg": "HID: hiddev: do cleanup in failure of opening a device" + }, + "CVE-2019-19526": { + "cmt_msg": "NFC: pn533: fix use-after-free and memleaks" + }, + "CVE-2023-31085": { + "cmt_msg": "ubi: Refuse attaching if mtd's erasesize is 0" + }, + "CVE-2019-19523": { + "cmt_msg": "USB: adutux: fix use-after-free on disconnect" + }, + "CVE-2020-24504": { + "cmt_msg": "ice: create scheduler aggregator node config and move VSIs" + }, + "CVE-2020-11725": { + "cmt_msg": "" + }, + "CVE-2021-0937": { + "cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write" + }, + "CVE-2023-52621": { + "cmt_msg": "bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers" + }, + "CVE-2022-1263": { + "cmt_msg": "KVM: avoid NULL pointer dereference in kvm_dirty_ring_push" + }, + "CVE-2021-35477": { + "cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4" + }, + "CVE-2023-31436": { + "cmt_msg": "net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg" + }, + "CVE-2022-3521": { + "cmt_msg": "kcm: avoid potential race in kcm_tx_work" + }, + "CVE-2023-31082": { + "cmt_msg": "" + }, + "CVE-2022-47929": { + "cmt_msg": "net: sched: disallow noqueue for qdisc classes" + }, + "CVE-2019-16746": { + "cmt_msg": "nl80211: validate beacon head" + }, + "CVE-2023-52623": { + "cmt_msg": "SUNRPC: Fix a suspicious RCU usage warning" + }, + "CVE-2021-41864": { + "cmt_msg": "bpf: Fix integer overflow in prealloc_elems_and_freelist()" + }, + "CVE-2020-10757": { + "cmt_msg": "mm: Fix mremap not considering huge pmd devmap" + }, + "CVE-2022-2209": { + "cmt_msg": "" + }, + "CVE-2023-52624": { + "cmt_msg": "drm/amd/display: Wake DMCUB before executing GPINT commands" + }, + "CVE-2022-45887": { + "cmt_msg": "media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb()" + }, + "CVE-2021-37576": { + "cmt_msg": "KVM: PPC: Book3S: Fix H_RTAS rets buffer overflow" + }, + "CVE-2019-8980": { + "cmt_msg": "exec: Fix mem leak in kernel_read_file" + }, + "CVE-2024-26775": { + "cmt_msg": "aoe: avoid potential deadlock at set_capacity" + }, + "CVE-2023-7042": { + "cmt_msg": "wifi: ath10k: fix NULL pointer dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev()" + }, + "CVE-2022-3594": { + "cmt_msg": "r8152: Rate limit overflow messages" + }, + "CVE-2022-3595": { + "cmt_msg": "cifs: fix double-fault crash during ntlmssp" + }, + "CVE-2023-35824": { + "cmt_msg": "media: dm1105: Fix use after free bug in dm1105_remove due to race condition" + }, + "CVE-2021-33098": { + "cmt_msg": "ixgbe: fix large MTU request from VF" + }, + "CVE-2023-1390": { + "cmt_msg": "tipc: fix NULL deref in tipc_link_xmit()" + }, + "CVE-2023-47233": { + "cmt_msg": "wifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach" + }, + "CVE-2021-35039": { + "cmt_msg": "module: limit enabling module.sig_enforce" + }, + "CVE-2020-27815": { + "cmt_msg": "jfs: Fix array index bounds check in dbAdjTree" + }, + "CVE-2021-26934": { + "cmt_msg": "" + }, + "CVE-2024-26736": { + "cmt_msg": "afs: Increase buffer size in afs_update_volume_status()" + }, + "CVE-2022-23041": { + "cmt_msg": "xen/9p: use alloc/free_pages_exact()" + }, + "CVE-2022-1462": { + "cmt_msg": "tty: use new tty_insert_flip_string_and_push_buffer() in pty_write()" + }, + "CVE-2024-26758": { + "cmt_msg": "md: Don't ignore suspended array in md_check_recovery()" + }, + "CVE-2024-26759": { + "cmt_msg": "mm/swap: fix race when skipping swapcache" + }, + "CVE-2022-3115": { + "cmt_msg": "drm: mali-dp: potential dereference of null pointer" + }, + "CVE-2023-6606": { + "cmt_msg": "smb: client: fix OOB in smbCalcSize()" + }, + "CVE-2024-26614": { + "cmt_msg": "tcp: make sure init the accept_queue's spinlocks once" + }, + "CVE-2020-27777": { + "cmt_msg": "powerpc/rtas: Restrict RTAS requests from userspace" + }, + "CVE-2019-20636": { + "cmt_msg": "Input: add safety guards to input_set_keycode()" + }, + "CVE-2019-11486": { + "cmt_msg": "tty: mark Siemens R3964 line discipline as BROKEN" + }, + "CVE-2019-11487": { + "cmt_msg": "fs: prevent page refcount overflow in pipe_buf_get" + }, + "CVE-2024-26752": { + "cmt_msg": "l2tp: pass correct message length to ip6_append_data" + }, + "CVE-2020-27673": { + "cmt_msg": "xen/events: add a proper barrier to 2-level uevent unmasking" + }, + "CVE-2024-26754": { + "cmt_msg": "gtp: fix use-after-free and null-ptr-deref in gtp_genl_dump_pdp()" + }, + "CVE-2020-27675": { + "cmt_msg": "xen/events: avoid removing an event channel while handling it" + }, + "CVE-2024-26756": { + "cmt_msg": "md: Don't register sync_thread for reshape directly" + }, + "CVE-2024-26757": { + "cmt_msg": "md: Don't ignore read-only array in md_check_recovery()" + }, + "CVE-2023-52439": { + "cmt_msg": "uio: Fix use-after-free in uio_open" + }, + "CVE-2020-28915": { + "cmt_msg": "fbcon: Fix global-out-of-bounds read in fbcon_get_font()" + }, + "CVE-2021-47169": { + "cmt_msg": "serial: rp2: use 'request_firmware' instead of 'request_firmware_nowait'" + }, + "CVE-2019-20908": { + "cmt_msg": "efi: Restrict efivar_ssdt_load when the kernel is locked down" + }, + "CVE-2023-3776": { + "cmt_msg": "net/sched: cls_fw: Fix improper refcount update leads to use-after-free" + }, + "CVE-2021-28038": { + "cmt_msg": "Xen/gnttab: handle p2m update errors on a per-slot basis" + }, + "CVE-2022-23040": { + "cmt_msg": "xen/xenbus: don't let xenbus_grant_ring() remove grants in error case" + }, + "CVE-2024-26805": { + "cmt_msg": "netlink: Fix kernel-infoleak-after-free in __skb_datagram_iter" + }, + "CVE-2022-3111": { + "cmt_msg": "power: supply: wm8350-power: Add missing free in free_charger_irq" + }, + "CVE-2023-52435": { + "cmt_msg": "net: prevent mss overflow in skb_segment()" + }, + "CVE-2023-52434": { + "cmt_msg": "smb: client: fix potential OOBs in smb2_parse_contexts()" + }, + "CVE-2023-3161": { + "cmt_msg": "fbcon: Check font dimension limits" + }, + "CVE-2023-52436": { + "cmt_msg": "f2fs: explicitly null-terminate the xattr list" + }, + "CVE-2019-19060": { + "cmt_msg": "iio: imu: adis16400: release allocated memory on failure" + }, + "CVE-2019-19061": { + "cmt_msg": "iio: imu: adis16400: fix memory leak" + }, + "CVE-2019-19062": { + "cmt_msg": "crypto: user - fix memory leak in crypto_report" + }, + "CVE-2019-19063": { + "cmt_msg": "rtlwifi: prevent memory leak in rtl_usb_probe" + }, + "CVE-2024-26784": { + "cmt_msg": "pmdomain: arm: Fix NULL dereference on scmi_perf_domain removal" + }, + "CVE-2019-19065": { + "cmt_msg": "RDMA/hfi1: Prevent memory leak in sdma_init" + }, + "CVE-2019-19066": { + "cmt_msg": "scsi: bfa: release allocated memory in case of error" + }, + "CVE-2019-19067": { + "cmt_msg": "drm/amdgpu: fix multiple memory leaks in acp_hw_init" + }, + "CVE-2019-19068": { + "cmt_msg": "rtl8xxxu: prevent leaking urb" + }, + "CVE-2020-0435": { + "cmt_msg": "f2fs: fix to do sanity check with i_extra_isize" + }, + "CVE-2020-0432": { + "cmt_msg": "staging: most: net: fix buffer overflow" + }, + "CVE-2020-0433": { + "cmt_msg": "blk-mq: sync the update nr_hw_queues with blk_mq_queue_tag_busy_iter" + }, + "CVE-2023-51779": { + "cmt_msg": "Bluetooth: af_bluetooth: Fix Use-After-Free in bt_sock_recvmsg" + }, + "CVE-2019-3874": { + "cmt_msg": "sctp: implement memory accounting on tx path" + }, + "CVE-2023-6915": { + "cmt_msg": "ida: Fix crash in ida_free when the bitmap is empty" + }, + "CVE-2010-4563": { + "cmt_msg": "" + }, + "CVE-2021-47006": { + "cmt_msg": "ARM: 9064/1: hw_breakpoint: Do not directly check the event's overflow_handler hook" + }, + "CVE-2023-1249": { + "cmt_msg": "coredump: Use the vma snapshot in fill_files_note" + }, + "CVE-2020-14331": { + "cmt_msg": "vgacon: Fix for missing check in scrollback handling" + }, + "CVE-2023-45871": { + "cmt_msg": "igb: set max size RX buffer when store bad packet is enabled" + }, + "CVE-2020-12114": { + "cmt_msg": "make struct mountpoint bear the dentry reference to mountpoint, not struct mount" + }, + "CVE-2023-2248": { + "cmt_msg": "net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg" + }, + "CVE-2023-0266": { + "cmt_msg": "ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF" + }, + "CVE-2021-46928": { + "cmt_msg": "parisc: Clear stale IIR value on instruction access rights trap" + }, + "CVE-2021-3483": { + "cmt_msg": "firewire: nosy: Fix a use-after-free bug in nosy_ioctl()" + }, + "CVE-2024-26663": { + "cmt_msg": "tipc: Check the bearer type before calling tipc_udp_nl_bearer_add()" + }, + "CVE-2024-26598": { + "cmt_msg": "KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache" + }, + "CVE-2023-6040": { + "cmt_msg": "netfilter: nf_tables: Reject tables of unsupported family" + }, + "CVE-2023-20588": { + "cmt_msg": "x86/CPU/AMD: Do not leak quotient data after a division by 0" + }, + "CVE-2021-38300": { + "cmt_msg": "bpf, mips: Validate conditional branch offsets" + }, + "CVE-2020-25656": { + "cmt_msg": "vt: keyboard, extend func_buf_lock to readers" + }, + "CVE-2021-3759": { + "cmt_msg": "memcg: enable accounting of ipc resources" + }, + "CVE-2022-24448": { + "cmt_msg": "NFSv4: Handle case where the lookup of a directory fails" + }, + "CVE-2023-52498": { + "cmt_msg": "PM: sleep: Fix possible deadlocks in core system-wide PM code" + }, + "CVE-2022-23042": { + "cmt_msg": "xen/netfront: react properly to failing gnttab_end_foreign_access_ref()" + }, + "CVE-2019-10142": { + "cmt_msg": "drivers/virt/fsl_hypervisor.c: prevent integer overflow in ioctl" + }, + "CVE-2021-4023": { + "cmt_msg": "io-wq: fix cancellation on create-worker failure" + }, + "CVE-2023-52640": { + "cmt_msg": "fs/ntfs3: Fix oob in ntfs_listxattr" + }, + "CVE-2023-3268": { + "cmt_msg": "relayfs: fix out-of-bounds access in relay_file_read" + }, + "CVE-2021-22555": { + "cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write" + }, + "CVE-2020-36694": { + "cmt_msg": "netfilter: x_tables: Switch synchronization to RCU" + }, + "CVE-2021-0399": { + "cmt_msg": "" + }, + "CVE-2023-52488": { + "cmt_msg": "serial: sc16is7xx: convert from _raw_ to _noinc_ regmap functions for FIFO" + }, + "CVE-2020-36691": { + "cmt_msg": "netlink: limit recursion depth in policy validation" + }, + "CVE-2021-47179": { + "cmt_msg": "NFSv4: Fix a NULL pointer dereference in pnfs_mark_matching_lsegs_return()" + }, + "CVE-2023-42755": { + "cmt_msg": "net/sched: Retire rsvp classifier" + }, + "CVE-2020-2732": { + "cmt_msg": "KVM: nVMX: Don't emulate instructions in guest mode" + }, + "CVE-2023-52486": { + "cmt_msg": "drm: Don't unref the same fb many times by mistake due to deadlock handling" + }, + "CVE-2023-52480": { + "cmt_msg": "ksmbd: fix race condition between session lookup and expire" + }, + "CVE-2012-4542": { + "cmt_msg": "" + }, + "CVE-2022-1729": { + "cmt_msg": "perf: Fix sys_perf_event_open() race against self" + }, + "CVE-2023-1838": { + "cmt_msg": "Fix double fget() in vhost_net_set_backend()" + }, + "CVE-2023-28328": { + "cmt_msg": "media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer()" + }, + "CVE-2023-4128": { + "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free" + }, + "CVE-2021-3573": { + "cmt_msg": "Bluetooth: use correct lock to prevent UAF of hdev object" + }, + "CVE-2021-46921": { + "cmt_msg": "locking/qrwlock: Fix ordering in queued_write_lock_slowpath()" + }, + "CVE-2023-3609": { + "cmt_msg": "net/sched: cls_u32: Fix reference counter leak leading to overflow" + }, + "CVE-2022-44033": { + "cmt_msg": "char: pcmcia: remove all the drivers" + }, + "CVE-2022-1974": { + "cmt_msg": "nfc: replace improper check device_is_registered() in netlink related functions" + }, + "CVE-2022-1975": { + "cmt_msg": "NFC: netlink: fix sleep in atomic bug when firmware download timeout" + }, + "CVE-2023-52491": { + "cmt_msg": "media: mtk-jpeg: Fix use after free bug due to error path handling in mtk_jpeg_dec_device_run" + }, + "CVE-2021-47074": { + "cmt_msg": "nvme-loop: fix memory leak in nvme_loop_create_ctrl()" + }, + "CVE-2020-36777": { + "cmt_msg": "media: dvbdev: Fix memory leak in dvb_media_device_free()" + }, + "CVE-2021-28972": { + "cmt_msg": "PCI: rpadlpar: Fix potential drc_name corruption in store functions" + }, + "CVE-2018-12130": { + "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" + }, + "CVE-2021-47083": { + "cmt_msg": "pinctrl: mediatek: fix global-out-of-bounds issue" + }, + "CVE-2021-20292": { + "cmt_msg": "drm/ttm/nouveau: don't call tt destroy callback on alloc failure." + }, + "CVE-2021-31916": { + "cmt_msg": "dm ioctl: fix out of bounds array access when no devices" + }, + "CVE-2021-47086": { + "cmt_msg": "phonet/pep: refuse to enable an unbound pipe" + }, + "CVE-2022-32981": { + "cmt_msg": "powerpc/32: Fix overread/overwrite of thread_struct via ptrace" + }, + "CVE-2021-47122": { + "cmt_msg": "net: caif: fix memory leak in caif_device_notify" + }, + "CVE-2020-25645": { + "cmt_msg": "geneve: add transport ports in route lookup for geneve" + }, + "CVE-2022-1280": { + "cmt_msg": "drm: avoid circular locks in drm_mode_getconnector" + }, + "CVE-2023-3772": { + "cmt_msg": "xfrm: add NULL check in xfrm_update_ae_params" + }, + "CVE-2020-11668": { + "cmt_msg": "media: xirlink_cit: add missing descriptor sanity checks" + }, + "CVE-2020-11669": { + "cmt_msg": "powerpc/powernv/idle: Restore AMR/UAMOR/AMOR after idle" + }, + "CVE-2019-15118": { + "cmt_msg": "ALSA: usb-audio: Fix a stack buffer overflow bug in check_input_term" + }, + "CVE-2019-12818": { + "cmt_msg": "net: nfc: Fix NULL dereference on nfc_llcp_build_tlv fails" + }, + "CVE-2019-12819": { + "cmt_msg": "mdio_bus: Fix use-after-free on device_register fails" + }, + "CVE-2023-0394": { + "cmt_msg": "ipv6: raw: Deduct extension header length in rawv6_push_pending_frames" + }, + "CVE-2021-47171": { + "cmt_msg": "net: usb: fix memory leak in smsc75xx_bind" + }, + "CVE-2020-10690": { + "cmt_msg": "ptp: fix the race between the release of ptp_clock and cdev" + }, + "CVE-2019-12817": { + "cmt_msg": "powerpc/mm/64s/hash: Reallocate context ids on fork" + }, + "CVE-2022-3108": { + "cmt_msg": "drm/amdkfd: Check for null pointer after calling kmemdup" + }, + "CVE-2019-19332": { + "cmt_msg": "KVM: x86: fix out-of-bounds write in KVM_GET_EMULATED_CPUID (CVE-2019-19332)" + }, + "CVE-2019-15117": { + "cmt_msg": "ALSA: usb-audio: Fix an OOB bug in parse_audio_mixer_unit" + }, + "CVE-2023-0386": { + "cmt_msg": "ovl: fail on invalid uid/gid mapping at copy up" + }, + "CVE-2021-3659": { + "cmt_msg": "net: mac802154: Fix general protection fault" + }, + "CVE-2022-25258": { + "cmt_msg": "USB: gadget: validate interface OS descriptor requests" + }, + "CVE-2021-4155": { + "cmt_msg": "xfs: map unwritten blocks in XFS_IOC_{ALLOC,FREE}SP just like fallocate" + }, + "CVE-2019-14901": { + "cmt_msg": "mwifiex: Fix heap overflow in mmwifiex_process_tdls_action_frame()" + }, + "CVE-2021-4150": { + "cmt_msg": "block: fix incorrect references to disk objects" + }, + "CVE-2020-3702": { + "cmt_msg": "ath: Use safer key clearing with key cache entries" + }, + "CVE-2023-52485": { + "cmt_msg": "drm/amd/display: Wake DMCUB before sending a command" + }, + "CVE-2021-3653": { + "cmt_msg": "KVM: nSVM: avoid picking up unsupported bits from L2 in int_ctl (CVE-2021-3653)" + }, + "CVE-2021-3564": { + "cmt_msg": "Bluetooth: fix the erroneous flush_work() order" + }, + "CVE-2020-8694": { + "cmt_msg": "powercap: restrict energy meter to root access" + }, + "CVE-2021-4159": { + "cmt_msg": "bpf: Verifer, adjust_scalar_min_max_vals to always call update_reg_bounds()" + }, + "CVE-2023-0461": { + "cmt_msg": "net/ulp: prevent ULP without clone op from entering the LISTEN status" + }, + "CVE-2019-12614": { + "cmt_msg": "powerpc/pseries/dlpar: Fix a missing check in dlpar_parse_cc_property()" + }, + "CVE-2019-12615": { + "cmt_msg": "mdesc: fix a missing-check bug in get_vdev_port_node_info()" + }, + "CVE-2021-3715": { + "cmt_msg": "net_sched: cls_route: remove the right filter from hashtable" + }, + "CVE-2021-3714": { + "cmt_msg": "" + }, + "CVE-2021-47103": { + "cmt_msg": "inet: fully convert sk->sk_rx_dst to RCU rules" + }, + "CVE-2021-46932": { + "cmt_msg": "Input: appletouch - initialize work before device registration" + }, + "CVE-2019-16230": { + "cmt_msg": "drm/amdkfd: fix a potential NULL pointer dereference (v2)" + }, + "CVE-2019-16231": { + "cmt_msg": "fjes: Handle workqueue allocation failure" + }, + "CVE-2019-16232": { + "cmt_msg": "libertas: fix a potential NULL pointer dereference" + }, + "CVE-2019-16233": { + "cmt_msg": "scsi: qla2xxx: fix a potential NULL pointer dereference" + }, + "CVE-2019-16234": { + "cmt_msg": "iwlwifi: pcie: fix rb_allocator workqueue allocation" + }, + "CVE-2023-52445": { + "cmt_msg": "media: pvrusb2: fix use after free on context disconnection" + }, + "CVE-2019-6133": { + "cmt_msg": "fork: record start_time late" + }, + "CVE-2019-3016": { + "cmt_msg": "x86/kvm: Be careful not to clear KVM_VCPU_FLUSH_TLB bit" + }, + "CVE-2021-39633": { + "cmt_msg": "ip_gre: add validation for csum_start" + }, + "CVE-2022-27223": { + "cmt_msg": "USB: gadget: validate endpoint index for xilinx udc" + }, + "CVE-2021-39634": { + "cmt_msg": "epoll: do not insert into poll queues until all sanity checks are done" + }, + "CVE-2024-23851": { + "cmt_msg": "dm: limit the number of targets and parameter size area" + }, + "CVE-2019-3882": { + "cmt_msg": "vfio/type1: Limit DMA mappings per container" + }, + "CVE-2022-33742": { + "cmt_msg": "xen/blkfront: force data bouncing when backend is untrusted" + }, + "CVE-2022-33741": { + "cmt_msg": "xen/netfront: force data bouncing when backend is untrusted" + }, + "CVE-2022-33740": { + "cmt_msg": "xen/netfront: fix leaking data in shared pages" + }, + "CVE-2024-24864": { + "cmt_msg": "" + }, + "CVE-2019-3887": { + "cmt_msg": "KVM: x86: nVMX: close leak of L0's x2APIC MSRs (CVE-2019-3887)" + }, + "CVE-2022-33744": { + "cmt_msg": "xen/arm: Fix race in RB-tree based P2M accounting" + }, + "CVE-2023-52596": { + "cmt_msg": "sysctl: Fix out of bounds access for empty sysctl registers" + }, + "CVE-2023-52597": { + "cmt_msg": "KVM: s390: fix setting of fpc register" + }, + "CVE-2023-52594": { + "cmt_msg": "wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus()" + }, + "CVE-2022-40768": { + "cmt_msg": "scsi: stex: Properly zero out the passthrough command structure" + }, + "CVE-2021-47013": { + "cmt_msg": "net:emac/emac-mac: Fix a use after free in emac_mac_tx_buf_send" + }, + "CVE-2023-52593": { + "cmt_msg": "wifi: wfx: fix possible NULL pointer dereference in wfx_set_mfp_ap()" + }, + "CVE-2021-47158": { + "cmt_msg": "net: dsa: sja1105: add error handling in sja1105_setup()" + }, + "CVE-2021-47010": { + "cmt_msg": "net: Only allow init netns to set default tcp cong to a restricted algo" + }, + "CVE-2021-45486": { + "cmt_msg": "inet: use bigger hash table for IP ID generation" + }, + "CVE-2020-12888": { + "cmt_msg": "vfio-pci: Invalidate mmaps and block MMIO access on disabled memory" + }, + "CVE-2021-47153": { + "cmt_msg": "i2c: i801: Don't generate an interrupt on bus reset" + }, + "CVE-2021-47150": { + "cmt_msg": "net: fec: fix the potential memory leak in fec_enet_init()" + }, + "CVE-2021-3923": { + "cmt_msg": "RDMA/core: Don't infoleak GRH fields" + }, + "CVE-2021-46936": { + "cmt_msg": "net: fix use-after-free in tw_timer_handler" + }, + "CVE-2021-46935": { + "cmt_msg": "binder: fix async_free_space accounting for empty parcels" + }, + "CVE-2021-46934": { + "cmt_msg": "i2c: validate user data in compat ioctl" + }, + "CVE-2021-46933": { + "cmt_msg": "usb: gadget: f_fs: Clear ffs_eventfd in ffs_data_clear." + }, + "CVE-2011-4917": { + "cmt_msg": "" + }, + "CVE-2022-36946": { + "cmt_msg": "netfilter: nf_queue: do not allow packet truncation below transport header offset" + }, + "CVE-2022-0812": { + "cmt_msg": "xprtrdma: fix incorrect header size calculations" + }, + "CVE-2021-45485": { + "cmt_msg": "ipv6: use prandom_u32() for ID generation" + }, + "CVE-2021-0448": { + "cmt_msg": "netfilter: ctnetlink: add a range check for l3/l4 protonum" + }, + "CVE-2018-19824": { + "cmt_msg": "ALSA: usb-audio: Fix UAF decrement if card has no live interfaces in card.c" + }, + "CVE-2021-46939": { + "cmt_msg": "tracing: Restructure trace_clock_global() to never block" + }, + "CVE-2020-29374": { + "cmt_msg": "gup: document and work around \"COW can break either way\" issue" + }, + "CVE-2019-25045": { + "cmt_msg": "xfrm: clean up xfrm protocol checks" + }, + "CVE-2024-26622": { + "cmt_msg": "tomoyo: fix UAF write bug in tomoyo_write_control()" + }, + "CVE-2018-16862": { + "cmt_msg": "mm: cleancache: fix corruption on missed inode invalidation" + }, + "CVE-2023-52449": { + "cmt_msg": "mtd: Fix gluebi NULL pointer dereference caused by ftl notifier" + }, + "CVE-2023-52629": { + "cmt_msg": "sh: push-switch: Reorder cleanup operations to avoid use-after-free bug" + }, + "CVE-2021-29650": { + "cmt_msg": "netfilter: x_tables: Use correct memory barriers." + }, + "CVE-2019-17133": { + "cmt_msg": "cfg80211: wext: avoid copying malformed SSIDs" + }, + "CVE-2018-20169": { + "cmt_msg": "USB: check usb_get_extra_descriptor for proper size" + }, + "CVE-2019-8956": { + "cmt_msg": "sctp: walk the list of asoc safely" + }, + "CVE-2020-36558": { + "cmt_msg": "vt: vt_ioctl: fix race in VT_RESIZEX" + }, + "CVE-2022-41849": { + "cmt_msg": "fbdev: smscufx: Fix use-after-free in ufx_ops_open()" + }, + "CVE-2022-41848": { + "cmt_msg": "" + }, + "CVE-2020-36312": { + "cmt_msg": "KVM: fix memory leak in kvm_io_bus_unregister_dev()" + }, + "CVE-2024-26720": { + "cmt_msg": "mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again" + }, + "CVE-2022-1353": { + "cmt_msg": "af_key: add __GFP_ZERO flag for compose_sadb_supported in function pfkey_register" + }, + "CVE-2022-28356": { + "cmt_msg": "llc: fix netdevice reference leaks in llc_ui_bind()" + }, + "CVE-2020-16119": { + "cmt_msg": "dccp: don't duplicate ccid when cloning dccp sock" + }, + "CVE-2022-1198": { + "cmt_msg": "drivers: hamradio: 6pack: fix UAF bug caused by mod_timer()" + }, + "CVE-2022-1199": { + "cmt_msg": "ax25: Fix NULL pointer dereference in ax25_kill_by_device" + }, + "CVE-2023-6546": { + "cmt_msg": "tty: n_gsm: fix the UAF caused by race condition in gsm_cleanup_mux" + }, + "CVE-2021-39801": { + "cmt_msg": "" + }, + "CVE-2021-39800": { + "cmt_msg": "" + }, + "CVE-2024-26676": { + "cmt_msg": "af_unix: Call kfree_skb() for dead unix_(sk)->oob_skb in GC." + }, + "CVE-2018-16884": { + "cmt_msg": "sunrpc: use-after-free in svc_process_common()" + }, + "CVE-2018-16882": { + "cmt_msg": "KVM: Fix UAF in nested posted interrupt processing" + }, + "CVE-2022-1195": { + "cmt_msg": "hamradio: improve the incomplete fix to avoid NPD" + }, + "CVE-2018-16880": { + "cmt_msg": "vhost: fix OOB in get_rx_bufs()" + }, + "CVE-2021-4202": { + "cmt_msg": "NFC: reorganize the functions in nci_request" + }, + "CVE-2021-4203": { + "cmt_msg": "af_unix: fix races in sk_peer_pid and sk_peer_cred accesses" + }, + "CVE-2022-4269": { + "cmt_msg": "act_mirred: use the backlog for nested calls to mirred ingress" + }, + "CVE-2022-45886": { + "cmt_msg": "media: dvb-core: Fix use-after-free due on race condition at dvb_net" + }, + "CVE-2023-52509": { + "cmt_msg": "ravb: Fix use-after-free issue in ravb_tx_timeout_work()" + }, + "CVE-2023-46343": { + "cmt_msg": "nfc: nci: fix possible NULL pointer dereference in send_acknowledge()" + }, + "CVE-2024-25744": { + "cmt_msg": "x86/coco: Disable 32-bit emulation by default on TDX and SEV" + }, + "CVE-2023-5178": { + "cmt_msg": "nvmet-tcp: Fix a possible UAF in queue intialization setup" + }, + "CVE-2023-52504": { + "cmt_msg": "x86/alternatives: Disable KASAN in apply_alternatives()" + }, + "CVE-2023-52507": { + "cmt_msg": "nfc: nci: assert requested protocol is valid" + }, + "CVE-2023-2124": { + "cmt_msg": "xfs: verify buffer contents when we skip log replay" + }, + "CVE-2023-52501": { + "cmt_msg": "ring-buffer: Do not attempt to read past \"commit\"" + }, + "CVE-2023-52500": { + "cmt_msg": "scsi: pm80xx: Avoid leaking tags when processing OPC_INB_SET_CONTROLLER_CONFIG command" + }, + "CVE-2023-52502": { + "cmt_msg": "net: nfc: fix races in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn()" + }, + "CVE-2023-1281": { + "cmt_msg": "net/sched: tcindex: update imperfect hash filters respecting rcu" + }, + "CVE-2023-2860": { + "cmt_msg": "ipv6: sr: fix out-of-bounds read when setting HMAC data." + }, + "CVE-2021-44879": { + "cmt_msg": "f2fs: fix to do sanity check on inode type during garbage collection" + }, + "CVE-2019-15505": { + "cmt_msg": "media: technisat-usb2: break out of loop at end of buffer" + }, + "CVE-2019-15504": { + "cmt_msg": "rsi: fix a double free bug in rsi_91x_deinit()" + }, + "CVE-2023-2513": { + "cmt_msg": "ext4: fix use-after-free in ext4_xattr_set_entry" + }, + "CVE-2023-1855": { + "cmt_msg": "hwmon: (xgene) Fix use after free bug in xgene_hwmon_remove due to race condition" + }, + "CVE-2022-27672": { + "cmt_msg": "x86/speculation: Identify processors vulnerable to SMT RSB predictions" + }, + "CVE-2024-26623": { + "cmt_msg": "pds_core: Prevent race issues involving the adminq" + }, + "CVE-2024-26719": { + "cmt_msg": "nouveau: offload fence uevents work to workqueue" + }, + "CVE-2024-26668": { + "cmt_msg": "netfilter: nft_limit: reject configurations that cause integer overflow" + }, + "CVE-2022-2964": { + "cmt_msg": "net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup" + }, + "CVE-2021-47146": { + "cmt_msg": "mld: fix panic in mld_newpack()" + }, + "CVE-2015-2877": { + "cmt_msg": "" + }, + "CVE-2020-9383": { + "cmt_msg": "floppy: check FDC index for errors before assigning it" + }, + "CVE-2023-52601": { + "cmt_msg": "jfs: fix array-index-out-of-bounds in dbAdjTree" + }, + "CVE-2024-26664": { + "cmt_msg": "hwmon: (coretemp) Fix out-of-bounds memory access" + }, + "CVE-2019-16089": { + "cmt_msg": "" + }, + "CVE-2023-1206": { + "cmt_msg": "tcp: Reduce chance of collisions in inet6_hashfn()." + }, + "CVE-2021-38198": { + "cmt_msg": "KVM: X86: MMU: Use the correct inherited permissions to get shadow page" + }, + "CVE-2021-38199": { + "cmt_msg": "NFSv4: Initialise connection to the server in nfs4_alloc_client()" + }, + "CVE-2024-26689": { + "cmt_msg": "ceph: prevent use-after-free in encode_cap_msg()" + }, + "CVE-2022-1679": { + "cmt_msg": "ath9k: fix use-after-free in ath9k_hif_usb_rx_cb" + }, + "CVE-2022-1678": { + "cmt_msg": "tcp: optimize tcp internal pacing" + }, + "CVE-2024-26715": { + "cmt_msg": "usb: dwc3: gadget: Fix NULL pointer dereference in dwc3_gadget_suspend" + }, + "CVE-2023-1513": { + "cmt_msg": "kvm: initialize all of the kvm_debugregs structure before sending it to userspace" + }, + "CVE-2021-26401": { + "cmt_msg": "x86/speculation: Use generic retpoline by default on AMD" + }, + "CVE-2024-1312": { + "cmt_msg": "mm: lock_vma_under_rcu() must check vma->anon_vma under vma lock" + }, + "CVE-2020-28941": { + "cmt_msg": "speakup: Do not let the line discipline be used several times" + }, + "CVE-2019-9445": { + "cmt_msg": "f2fs: check if file namelen exceeds max value" + }, + "CVE-2023-52442": { + "cmt_msg": "ksmbd: validate session id and tree id in compound request" + }, + "CVE-2021-3600": { + "cmt_msg": "bpf: Fix 32 bit src register truncation on div/mod" + }, + "CVE-2020-36557": { + "cmt_msg": "vt: vt_ioctl: fix VT_DISALLOCATE freeing in-use virtual console" + }, + "CVE-2021-3506": { + "cmt_msg": "f2fs: fix to avoid out-of-bounds memory access" + }, + "CVE-2019-20934": { + "cmt_msg": "sched/fair: Don't free p->numa_faults with concurrent readers" + }, + "CVE-2011-4916": { + "cmt_msg": "" + }, + "CVE-2019-19532": { + "cmt_msg": "HID: Fix assumption that devices have inputs" + }, + "CVE-2019-3900": { + "cmt_msg": "vhost_net: fix possible infinite loop" + }, + "CVE-2021-23133": { + "cmt_msg": "net/sctp: fix race condition in sctp_destroy_sock" + }, + "CVE-2023-23039": { + "cmt_msg": "" + }, + "CVE-2019-15807": { + "cmt_msg": "scsi: libsas: delete sas port if expander discover failed" + }, + "CVE-2024-26733": { + "cmt_msg": "arp: Prevent overflow in arp_req_get()." + }, + "CVE-2019-10638": { + "cmt_msg": "inet: switch IP ID generator to siphash" + }, + "CVE-2023-31083": { + "cmt_msg": "Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO" + }, + "CVE-2019-5489": { + "cmt_msg": "Change mincore() to count \"mapped\" pages rather than \"cached\" pages" + }, + "CVE-2021-47082": { + "cmt_msg": "tun: avoid double free in tun_free_netdev" + }, + "CVE-2019-14284": { + "cmt_msg": "floppy: fix div-by-zero in setup_format_params" + }, + "CVE-2019-14283": { + "cmt_msg": "floppy: fix out-of-bounds read in copy_buffer" + }, + "CVE-2023-3338": { + "cmt_msg": "Remove DECnet support from kernel" + }, + "CVE-2023-1637": { + "cmt_msg": "x86/speculation: Restore speculation related MSRs during S3 resume" + } + } + }, + "3.12": { + "3.12": { + "CVE-2013-6383": { + "cmt_msg": "aacraid: missing capable() check in compat ioctl", + "cmt_id": "f856567b930dfcdbc3323261bf77240ccdde01f5" + }, + "CVE-2013-4513": { + "cmt_msg": "staging: ozwpan: prevent overflow in oz_cdev_write()", + "cmt_id": "c2c65cd2e14ada6de44cb527e7f1990bede24e15" + }, + "CVE-2013-4512": { + "cmt_msg": "uml: check length in exitcode_proc_write()", + "cmt_id": "201f99f170df14ba52ea4c52847779042b7a623b" + }, + "CVE-2013-4511": { + "cmt_msg": "uml: check length in exitcode_proc_write()", + "cmt_id": "201f99f170df14ba52ea4c52847779042b7a623b" + }, + "CVE-2013-4516": { + "cmt_msg": "Staging: sb105x: info leak in mp_get_count()", + "cmt_id": "a8b33654b1e3b0c74d4a1fed041c9aae50b3c427" + }, + "CVE-2013-4515": { + "cmt_msg": "Staging: bcm: info leak in ioctl", + "cmt_id": "8d1e72250c847fa96498ec029891de4dc638a5ba" + }, + "CVE-2013-4514": { + "cmt_msg": "staging: wlags49_h2: buffer overflow setting station name", + "cmt_id": "b5e2f339865fb443107e5b10603e53bbc92dc054" + } + }, + "3.12.1": { + "CVE-2013-4348": { + "cmt_msg": "net: flow_dissector: fail on evil iph->ihl", + "cmt_id": "cec64fecff2eff7dd701b883ed3f5f6faf1aab92" + } + }, + "3.12.2": { + "CVE-2013-4345": { + "cmt_msg": "crypto: ansi_cprng - Fix off by one error in non-block size request", + "cmt_id": "8ea7fffd97835f4e3ffd5f757df152a79835f65f" + }, + "CVE-2013-7026": { + "cmt_msg": "ipc,shm: fix shm_file deletion races", + "cmt_id": "dd272212175ad47ee84cf38e9d5f99502df2d930" + }, + "CVE-2013-6378": { + "cmt_msg": "libertas: potential oops in debugfs", + "cmt_id": "0f6ff65ed8d3630118c3149a4fbc493dd3b8fdc4" + }, + "CVE-2013-6380": { + "cmt_msg": "aacraid: prevent invalid pointer dereference", + "cmt_id": "12cc2209deeda65c963c84a5e6aaf0c39aca8e6d" + }, + "CVE-2013-2930": { + "cmt_msg": "perf/ftrace: Fix paranoid level for enabling function tracer", + "cmt_id": "539ddb09c46389cc22d35543e40ccde2c2e20244" + }, + "CVE-2013-2929": { + "cmt_msg": "exec/ptrace: fix get_dumpable() incorrect tests", + "cmt_id": "9d4dd888b4b5799ecadfb0d8c9adda7a76779806" + } + }, + "3.12.3": { + "CVE-2013-6381": { + "cmt_msg": "qeth: avoid buffer overflow in snmp ioctl", + "cmt_id": "8abbf7ceaece5ea0dd23f2b6d2b135186da7a96b" + } + }, + "3.12.4": { + "CVE-2013-7281": { + "cmt_msg": "inet: prevent leakage of uninitialized memory to user in recv syscalls", + "cmt_id": "7a9b8e64a5706d62d5a5ab54fe3d0320845b1d4a" + }, + "CVE-2013-7348": { + "cmt_msg": "aio: prevent double free in ioctx_alloc", + "cmt_id": "f50db974cb75e31d98b176c3c9ea92e57aa97a1b" + }, + "CVE-2013-4563": { + "cmt_msg": "ipv6: fix headroom calculation in udp6_ufo_fragment", + "cmt_id": "d68268e60d0ec51e6c269f8dc34bb9fcfee970a7" + }, + "CVE-2013-7264": { + "cmt_msg": "inet: prevent leakage of uninitialized memory to user in recv syscalls", + "cmt_id": "7a9b8e64a5706d62d5a5ab54fe3d0320845b1d4a" + }, + "CVE-2013-7265": { + "cmt_msg": "inet: prevent leakage of uninitialized memory to user in recv syscalls", + "cmt_id": "7a9b8e64a5706d62d5a5ab54fe3d0320845b1d4a" + }, + "CVE-2013-7266": { + "cmt_msg": "net: rework recvmsg handler msg_name and msg_namelen logic", + "cmt_id": "0cefe287488ca07c0d7962a7b4d3fbb829d09917" + }, + "CVE-2013-7267": { + "cmt_msg": "net: rework recvmsg handler msg_name and msg_namelen logic", + "cmt_id": "0cefe287488ca07c0d7962a7b4d3fbb829d09917" + }, + "CVE-2013-7263": { + "cmt_msg": "inet: prevent leakage of uninitialized memory to user in recv syscalls", + "cmt_id": "7a9b8e64a5706d62d5a5ab54fe3d0320845b1d4a" + }, + "CVE-2013-7271": { + "cmt_msg": "net: rework recvmsg handler msg_name and msg_namelen logic", + "cmt_id": "0cefe287488ca07c0d7962a7b4d3fbb829d09917" + }, + "CVE-2013-7270": { + "cmt_msg": "net: rework recvmsg handler msg_name and msg_namelen logic", + "cmt_id": "0cefe287488ca07c0d7962a7b4d3fbb829d09917" + }, + "CVE-2013-6432": { + "cmt_msg": "ping: prevent NULL pointer dereference on write to msg_name", + "cmt_id": "086663e065ba2383382d6bb7d8a3d9bc9cba7cdf" + }, + "CVE-2013-7269": { + "cmt_msg": "net: rework recvmsg handler msg_name and msg_namelen logic", + "cmt_id": "0cefe287488ca07c0d7962a7b4d3fbb829d09917" + }, + "CVE-2013-7268": { + "cmt_msg": "net: rework recvmsg handler msg_name and msg_namelen logic", + "cmt_id": "0cefe287488ca07c0d7962a7b4d3fbb829d09917" + } + }, + "3.12.6": { + "CVE-2013-6368": { + "cmt_msg": "KVM: x86: Convert vapic synchronization to _cached functions (CVE-2013-6368)", + "cmt_id": "c0149f684726ef4a5e91b8ba1d408a64dfb40385" + }, + "CVE-2013-4587": { + "cmt_msg": "KVM: Improve create VCPU parameter (CVE-2013-4587)", + "cmt_id": "41fe7fa8fdeaa5a2a9f3ecaa9a47e2d2afa1b2b1" + }, + "CVE-2013-6367": { + "cmt_msg": "KVM: x86: Fix potential divide by 0 in lapic (CVE-2013-6367)", + "cmt_id": "10958718b005e046244d2b4a1f1bb9a3ab6e3d29" + }, + "CVE-2013-6382": { + "cmt_msg": "xfs: underflow bug in xfs_attrlist_by_handle()", + "cmt_id": "f5e6d588f847fba87394926284cc4a7a3b79c6bf" + }, + "CVE-2013-6376": { + "cmt_msg": "KVM: x86: fix guest-initiated crash with x2apic (CVE-2013-6376)", + "cmt_id": "48849efc2e3c58d170e32d081f83f6c070dfd0a3" + } + }, + "3.12.7": { + "CVE-2013-4579": { + "cmt_msg": "ath9k_htc: properly set MAC address and BSSID mask", + "cmt_id": "d10d0a2337097fa907f22af6ad0ae0dc0ff39fbf" + }, + "CVE-2015-4170": { + "cmt_msg": "tty: Fix hang at ldsem_down_read()", + "cmt_id": "ab69be3e59d79c56bfe16930f0c761daf4837e48" + } + }, + "3.12.8": { + "CVE-2012-2372": { + "cmt_msg": "rds: prevent BUG_ON triggered on congestion update to loopback", + "cmt_id": "0a743164c25fc0c5c4ba0f581ab9d4e5dd9772f8" + }, + "CVE-2014-1446": { + "cmt_msg": "hamradio/yam: fix info leak in ioctl", + "cmt_id": "e7834c71c2cacc621ddc64bd71f83ef2054f6539" + }, + "CVE-2014-1690": { + "cmt_msg": "netfilter: nf_nat: fix access to uninitialized buffer in IRC NAT helper", + "cmt_id": "6aeebffeb297e84f5b73bb87deacd9571a84da16" + }, + "CVE-2014-1438": { + "cmt_msg": "x86, fpu, amd: Clear exceptions in AMD FXSAVE workaround", + "cmt_id": "807a0c12941850ddaff2ed62ba26a748e542c599" + }, + "CVE-2013-7339": { + "cmt_msg": "rds: prevent dereference of a NULL device", + "cmt_id": "aca33677723eb132dd91a30c4f8ac15f01be27c8" + } + }, + "3.12.10": { + "CVE-2014-0038": { + "cmt_msg": "x86, x32: Correct invalid use of user timespec in the kernel", + "cmt_id": "c1769bfb6aa93250f83d6d9d3ac85d15f990849f" + }, + "CVE-2013-6885": { + "cmt_msg": "x86, cpu, amd: Add workaround for family 16h, erratum 793", + "cmt_id": "c5e16510e3454393fa8e40591bff28c190be2faa" + } + }, + "3.12.11": { + "CVE-2014-2038": { + "cmt_msg": "nfs: always make sure page is up-to-date before extending a write to cover the entire page", + "cmt_id": "4a3cbb28c3bbb4cb24ea59a91c2607d806818b73" + } + }, + "3.12.13": { + "CVE-2014-8709": { + "cmt_msg": "mac80211: fix fragmentation code, particularly for encryption", + "cmt_id": "5258fec859e55f79a80a00b3ca05181a488de766" + }, + "CVE-2014-2039": { + "cmt_msg": "s390: fix kernel crash due to linkage stack instructions", + "cmt_id": "9ee59d9a5b03f45d9b421b020947846d13f27d08" + } + }, + "3.12.14": { + "CVE-2014-0049": { + "cmt_msg": "kvm: x86: fix emulator buffer overflow (CVE-2014-0049)", + "cmt_id": "ee593d3a91514d37f19251daa9d57edfb27e45e7" + }, + "CVE-2014-0069": { + "cmt_msg": "cifs: ensure that uncached writes handle unmapped areas correctly", + "cmt_id": "90d369693d48ec7ffa4ca039e6fd14e861486251" + } + }, + "3.12.15": { + "CVE-2014-0101": { + "cmt_msg": "net: sctp: fix sctp_sf_do_5_1D_ce to verify if we/peer is AUTH capable", + "cmt_id": "00c53b02cb01976b35d37670a4b5c5d7a6ad3c62" + }, + "CVE-2014-7207": { + "cmt_msg": "ipv6: reuse ip6_frag_id from ip6_ufo_append_data", + "cmt_id": "3bbb02a1ba7a2ad0dbbd979ed715c9229b12e36a" + }, + "CVE-2014-2673": { + "cmt_msg": "powerpc/tm: Fix crash when forking inside a transaction", + "cmt_id": "2725f34b41f8e3f444688a814cc2763a1c2b138b" + }, + "CVE-2014-2672": { + "cmt_msg": "ath9k: protect tid->sched check", + "cmt_id": "46e70384f21825caab1a55f64e9fe6d3d16c28cc" + }, + "CVE-2014-2706": { + "cmt_msg": "mac80211: fix AP powersave TX vs. wakeup race", + "cmt_id": "58d4310586466840dab77e56e53f4508853a5268" + } + }, + "3.12.17": { + "CVE-2014-2523": { + "cmt_msg": "netfilter: nf_conntrack_dccp: fix skb_header_pointer API usages", + "cmt_id": "f9c8e356e5c574cfa6ace53bb9956b4469fe606a" + } + }, + "3.12.18": { + "CVE-2014-2309": { + "cmt_msg": "ipv6: don't set DST_NOCOUNT for remotely added routes", + "cmt_id": "50fb0fafd1546f2dc6bf931f3a44f63704ce78ac" + }, + "CVE-2014-0100": { + "cmt_msg": "net: fix for a race condition in the inet frag code", + "cmt_id": "e8443124a1ba9ceee59fb611c534957278f7d44e" + }, + "CVE-2014-2580": { + "cmt_msg": "xen-netback: disable rogue vif in kthread context", + "cmt_id": "699dfec4e90e73bac6455560187c34f77115bc2f" + }, + "CVE-2014-2678": { + "cmt_msg": "rds: prevent dereference of a NULL device in rds_iw_laddr_check", + "cmt_id": "64005923ffdefe53e87138ec472c88877196d405" + }, + "CVE-2014-0077": { + "cmt_msg": "vhost: fix total length when packets are too short", + "cmt_id": "c66635949a08858e6d588b8a32489bca7972cf87" + }, + "CVE-2014-0055": { + "cmt_msg": "vhost: validate vhost_get_vq_desc return value", + "cmt_id": "a2a366ebac39dbb437b893b8705d4b6ce04e062e" + } + }, + "3.12.19": { + "CVE-2014-7283": { + "cmt_msg": "xfs: fix directory hash ordering bug", + "cmt_id": "fd4037cadecf7b5c0e288c19d958917ac1c62a83" + }, + "CVE-2014-0155": { + "cmt_msg": "KVM: ioapic: fix assignment of ioapic->rtc_status.pending_eoi (CVE-2014-0155)", + "cmt_id": "95846d96fc3739c515e6c20b0fcea97ab290f09c" + }, + "CVE-2014-2851": { + "cmt_msg": "net: ipv4: current group_info should be put after using.", + "cmt_id": "95c3a5624ae783081cc9d9b0e3d24ea19b36590e" + } + }, + "3.12.20": { + "CVE-2014-3122": { + "cmt_msg": "mm: try_to_unmap_cluster() should lock_page() before mlocking", + "cmt_id": "400fc13141fe947c38e8485ee9d37066d4533363" + }, + "CVE-2014-1738": { + "cmt_msg": "floppy: don't write kernel-only members to FDRAWCMD ioctl output", + "cmt_id": "3d43edf5868f260dbfd1353bf243a78f030a08b0" + }, + "CVE-2014-0196": { + "cmt_msg": "n_tty: Fix n_tty_write crash when echoing in raw mode", + "cmt_id": "61461fa9182895c6396ee9704d80fe8ff9d1135d" + }, + "CVE-2014-1737": { + "cmt_msg": "floppy: ignore kernel-only members in FDRAWCMD ioctl input", + "cmt_id": "36cdf95db237630373162e20142df4d11efdd543" + } + }, + "3.12.21": { + "CVE-2014-3144": { + "cmt_msg": "filter: prevent nla extensions to peek beyond the end of the message", + "cmt_id": "dd6e370c0083e0382782893708b5241490ea6832" + }, + "CVE-2014-3145": { + "cmt_msg": "filter: prevent nla extensions to peek beyond the end of the message", + "cmt_id": "dd6e370c0083e0382782893708b5241490ea6832" + }, + "CVE-2014-9715": { + "cmt_msg": "netfilter: nf_conntrack: reserve two bytes for nf_ct_ext->len", + "cmt_id": "62c97a8612f753ffa6c5c7bebe140cc0951e539f" + } + }, + "3.12.22": { + "CVE-2014-1739": { + "cmt_msg": "media-device: fix infoleak in ioctl media_enum_entities()", + "cmt_id": "2f1831612c94ee7b1819c4a6d21b9d5efac5297c" + }, + "CVE-2014-3153": { + "cmt_msg": "futex: Make lookup_pi_state more robust", + "cmt_id": "888f1a0f8c36e6982040ec06447a1dcc15686562" + } + }, + "3.12.23": { + "CVE-2014-4157": { + "cmt_msg": "MIPS: asm: thread_info: Add _TIF_SECCOMP flag", + "cmt_id": "649066ce296368e2733ce1d4005f10dc673a9e8f" + }, + "CVE-2014-0181": { + "cmt_msg": "net: Use netlink_ns_capable to verify the permisions of netlink messages", + "cmt_id": "50b8b6e75fa0c08cef1e1ed30a7ab91f05bcb779" + }, + "CVE-2014-4014": { + "cmt_msg": "fs,userns: Change inode_capable to capable_wrt_inode_uidgid", + "cmt_id": "2246a472bce19c0d373fb5488a0e612e3328ce0a" + }, + "CVE-2014-4667": { + "cmt_msg": "sctp: Fix sk_ack_backlog wrap-around problem", + "cmt_id": "ddb638e68690ca61959775b262a5ef0719c5c066" + }, + "CVE-2014-9914": { + "cmt_msg": "ipv4: fix a race in ip4_datagram_release_cb()", + "cmt_id": "c671113b05eb8cdcc5ed8610e9cc45a653ea7558" + }, + "CVE-2014-3917": { + "cmt_msg": "auditsc: audit_krule mask accesses need bounds checking", + "cmt_id": "6004b0e5ac2e8e9e1bb0f012dc9242e03cca95df" + }, + "CVE-2014-0131": { + "cmt_msg": "skbuff: skb_segment: orphan frags before copying", + "cmt_id": "07d054ef6765b307277f02c11b51f0695d6b3d7c" + } + }, + "3.12.24": { + "CVE-2014-4508": { + "cmt_msg": "x86_32, entry: Do syscall exit work on badsys (CVE-2014-4508)", + "cmt_id": "b8f4d2179757e17cf16644feb44879c05b5b61ef" + }, + "CVE-2014-3940": { + "cmt_msg": "mm: add !pte_present() check on existing hugetlb_entry callbacks", + "cmt_id": "7032d5fbbf1b08586e1463684d6c8f456889c293" + }, + "CVE-2014-0206": { + "cmt_msg": "aio: fix kernel memory disclosure in io_getevents() introduced in v3.10", + "cmt_id": "bee3f7b8188d4b2a5dfaeb2eb4a68d99f67daecf" + }, + "CVE-2014-4611": { + "cmt_msg": "lz4: ensure length does not wrap", + "cmt_id": "f1bac1ba17822414d4031f840913b4ea27793ba8" + }, + "CVE-2014-4655": { + "cmt_msg": "ALSA: control: Fix replacing user controls", + "cmt_id": "d8eaff7517ee11b2e7cbc158abbdf899b8351ed3" + }, + "CVE-2014-4654": { + "cmt_msg": "ALSA: control: Fix replacing user controls", + "cmt_id": "d8eaff7517ee11b2e7cbc158abbdf899b8351ed3" + }, + "CVE-2014-4656": { + "cmt_msg": "ALSA: control: Handle numid overflow", + "cmt_id": "669982364299f6f22bea4324f0f7ee8f8a361b87" + }, + "CVE-2014-4653": { + "cmt_msg": "ALSA: control: Don't access controls outside of protected regions", + "cmt_id": "0bf595fd311aa4d6e82c43879f2c0d0650e83271" + }, + "CVE-2014-4652": { + "cmt_msg": "ALSA: control: Protect user controls against concurrent access", + "cmt_id": "ed81e6b21790b717cda5f5bab2bdb07d2ce17ab1" + } + }, + "3.12.25": { + "CVE-2014-4699": { + "cmt_msg": "ptrace,x86: force IRET path after a ptrace_stop()", + "cmt_id": "2f1824407bf18b019d2c821881dd0956c6f0a254" + } + }, + "3.12.26": { + "CVE-2014-4171": { + "cmt_msg": "shmem: fix faulting into a hole while it's punched", + "cmt_id": "8685789bd8ec12a02b07ea76df4527b055efbf20" + }, + "CVE-2014-5045": { + "cmt_msg": "fs: umount on symlink leaks mnt count", + "cmt_id": "37b0ade4c681de6e0d7762c948c400496bc1b27b" + } + }, + "3.12.27": { + "CVE-2014-3534": { + "cmt_msg": "s390/ptrace: fix PSW mask check", + "cmt_id": "cbcbb4c4826ff594b091e143b0f049f13ab7a64e" + }, + "CVE-2014-5077": { + "cmt_msg": "net: sctp: inherit auth_capable on INIT collisions", + "cmt_id": "4a07c786e3d9fbe989d8b5bf9920a1e34afd8b91" + }, + "CVE-2014-5207": { + "cmt_msg": "mnt: Correct permission checks in do_remount", + "cmt_id": "8b18c0adbc5d0cb1530692e72bcfb88fd7bb77bb" + }, + "CVE-2014-5206": { + "cmt_msg": "mnt: Only change user settable mount flags in remount", + "cmt_id": "25c1def33a2f74079f3062b7afdf98fcf9f34e6d" + } + }, + "3.12.28": { + "CVE-2014-5472": { + "cmt_msg": "isofs: Fix unbounded recursion when processing relocated directories", + "cmt_id": "e4ca8b780c82c04ec03fcd05d9e3f92fc6de6347" + }, + "CVE-2014-3182": { + "cmt_msg": "HID: logitech: perform bounds checking on device_id early enough", + "cmt_id": "2ae8a66674a4cd7f2cfee757ee29cb63dce755fe" + }, + "CVE-2014-3184": { + "cmt_msg": "HID: fix a couple of off-by-ones", + "cmt_id": "1f78f21b43f2c69f2ea06ed35b77759d000dd2b4" + }, + "CVE-2014-3601": { + "cmt_msg": "kvm: iommu: fix the third parameter of kvm_iommu_put_pages (CVE-2014-3601)", + "cmt_id": "e35b1e9f17e0567f96502f3a2a31dace727ed3da" + }, + "CVE-2014-5471": { + "cmt_msg": "isofs: Fix unbounded recursion when processing relocated directories", + "cmt_id": "e4ca8b780c82c04ec03fcd05d9e3f92fc6de6347" + } + }, + "3.12.29": { + "CVE-2014-6418": { + "cmt_msg": "libceph: do not hard code max auth ticket len", + "cmt_id": "0884f8d4139431deb0b98ba0d6fb2d17e2c25c84" + }, + "CVE-2014-3185": { + "cmt_msg": "USB: whiteheat: Added bounds checking for bulk command response", + "cmt_id": "b3d60c320f6597c2be0bcf580cf8093c12c4555f" + }, + "CVE-2014-6417": { + "cmt_msg": "libceph: do not hard code max auth ticket len", + "cmt_id": "0884f8d4139431deb0b98ba0d6fb2d17e2c25c84" + }, + "CVE-2014-6416": { + "cmt_msg": "libceph: do not hard code max auth ticket len", + "cmt_id": "0884f8d4139431deb0b98ba0d6fb2d17e2c25c84" + } + }, + "3.12.31": { + "CVE-2014-3181": { + "cmt_msg": "HID: magicmouse: sanity check report size in raw_event() callback", + "cmt_id": "ae81c27a53af5310f1fe47e9252146d79ab3157d" + }, + "CVE-2014-3186": { + "cmt_msg": "HID: picolcd: sanity check report size in raw_event() callback", + "cmt_id": "2dffad6784f0c5f10727a20a333db11eef0b572a" + }, + "CVE-2014-6410": { + "cmt_msg": "udf: Avoid infinite loop when processing indirect ICBs", + "cmt_id": "8ec4e9789b8b4c05ee979daad2a27088e29fac5d" + } + }, + "3.12.32": { + "CVE-2014-4608": { + "cmt_msg": "lzo: check for length overrun in variable length encoding.", + "cmt_id": "4277fc429c1ae9f815aa4e5713514d952032f2fa" + }, + "CVE-2014-7975": { + "cmt_msg": "fs: Add a missing permission check to do_umount", + "cmt_id": "8d9c8c3980a85d79db13c5ce4bb118fef32d4f50" + } + }, + "3.12.33": { + "CVE-2014-3647": { + "cmt_msg": "KVM: x86: Emulator fixes for eip canonical checks on near branches", + "cmt_id": "a20e81cb2b2b8aebdca9d11b6fa2133f1b97251d" + }, + "CVE-2014-3646": { + "cmt_msg": "kvm: vmx: handle invvpid vm exit gracefully", + "cmt_id": "5838e85ea0a3c77a83465dfd87257f96d0ceb6ae" + }, + "CVE-2014-7970": { + "cmt_msg": "mnt: Prevent pivot_root from creating a loop in the mount tree", + "cmt_id": "365446fe1c7bf1b481cedfb9e50cfc8a86fdde89" + }, + "CVE-2014-8884": { + "cmt_msg": "ttusb-dec: buffer overflow in ioctl", + "cmt_id": "482c6cb2dfb40838d67b0ba844b4b3d0af0f3d20" + }, + "CVE-2014-3610": { + "cmt_msg": "KVM: x86: Check non-canonical addresses upon WRMSR", + "cmt_id": "7e60cb9b5f7ad5a47404db9e7a974ab82a054544" + }, + "CVE-2014-3611": { + "cmt_msg": "KVM: x86: Improve thread safety in pit", + "cmt_id": "5671c6a9229edd1b1587b4ea1014d540a7e74797" + }, + "CVE-2014-7826": { + "cmt_msg": "tracing/syscalls: Ignore numbers outside NR_syscalls' range", + "cmt_id": "abc07cd01c51fb54088c6bc8ee654d104a5ec7d9" + }, + "CVE-2014-7825": { + "cmt_msg": "tracing/syscalls: Ignore numbers outside NR_syscalls' range", + "cmt_id": "abc07cd01c51fb54088c6bc8ee654d104a5ec7d9" + } + }, + "3.12.34": { + "CVE-2014-3687": { + "cmt_msg": "net: sctp: fix panic on duplicate ASCONF chunks", + "cmt_id": "a723db0be941b8aebaa1a98b33d17a91b16603e4" + }, + "CVE-2014-3673": { + "cmt_msg": "net: sctp: fix skb_over_panic when receiving malformed ASCONF chunks", + "cmt_id": "bbd951a21e0fd555cd9ede44c7196af09d04d171" + }, + "CVE-2014-3688": { + "cmt_msg": "net: sctp: fix remote memory pressure from excessive queueing", + "cmt_id": "e476841415c1b7b54e4118d8a219f5db71878675" + }, + "CVE-2014-7841": { + "cmt_msg": "net: sctp: fix NULL pointer dereference in af->from_addr_param on malformed packet", + "cmt_id": "4008f1dbe6fea8114e7f79ed2d238e369dc9138f" + }, + "CVE-2014-7843": { + "cmt_msg": "arm64: __clear_user: handle exceptions on strb", + "cmt_id": "beb762ba2a940ce1f87a03b1c5820ce2d433db6e" + }, + "CVE-2014-7842": { + "cmt_msg": "KVM: x86: Don't report guest userspace emulation error to userspace", + "cmt_id": "7e1ebf020aff9b3e4c0d52e8ace6e3278e8f8762" + } + }, + "3.12.35": { + "CVE-2014-9090": { + "cmt_msg": "x86_64, traps: Stop using IST for #SS", + "cmt_id": "e40598270a40040461c8b8d3a8656d54fb59b9cd" + }, + "CVE-2014-9322": { + "cmt_msg": "x86_64, traps: Stop using IST for #SS", + "cmt_id": "e40598270a40040461c8b8d3a8656d54fb59b9cd" + } + }, + "3.12.36": { + "CVE-2014-9420": { + "cmt_msg": "isofs: Fix infinite looping over CE entries", + "cmt_id": "fbce0d7dc8965c9fb8d411862040239d4a768c71" + }, + "CVE-2014-9584": { + "cmt_msg": "isofs: Fix unchecked printing of ER records", + "cmt_id": "2329c797a9dc66982946026cbc1783e072ab8e33" + }, + "CVE-2014-8989": { + "cmt_msg": "userns: Don't allow setgroups until a gid mapping has been setablished", + "cmt_id": "ae254fcf53097d6d83502c1a75366c7e4eface8b" + }, + "CVE-2014-9683": { + "cmt_msg": "eCryptfs: Remove buggy and unnecessary write in file name decode routine", + "cmt_id": "8ffea99d6f2be99790611282f326da95a84a8cab" + }, + "CVE-2014-8133": { + "cmt_msg": "x86/tls: Validate TLS entries to protect espfix", + "cmt_id": "107436a25547580118fd93e5aaf808f6b533b639" + }, + "CVE-2014-8134": { + "cmt_msg": "x86, kvm: Clear paravirt_enabled on KVM guests for espfix32's benefit", + "cmt_id": "a82297838bb23d83795661c55a6b9494c05ac68d" + } + }, + "3.12.37": { + "CVE-2014-9529": { + "cmt_msg": "KEYS: close race between key lookup and freeing", + "cmt_id": "1bb0aca1e0881dfd34a6f39fd44e1e995fc302a1" + }, + "CVE-2014-9585": { + "cmt_msg": "x86_64, vdso: Fix the vdso address randomization algorithm", + "cmt_id": "0c9312164d6e069707dd96a001849f4b853c546d" + }, + "CVE-2014-8559": { + "cmt_msg": "move d_rcu from overlapping d_child to overlapping d_alias", + "cmt_id": "4b2f6663ebde6bed50209a05041b34c203116253" + }, + "CVE-2014-9644": { + "cmt_msg": "crypto: include crypto- module prefix in template", + "cmt_id": "f753253c2c19423b0d6743ca9eae725549299245" + }, + "CVE-2013-7421": { + "cmt_msg": "crypto: prefix module autoloading with \"crypto-\"", + "cmt_id": "7f655881c786824340b0bee70f9738e10d427494" + } + }, + "3.12.38": { + "CVE-2014-3690": { + "cmt_msg": "x86,kvm,vmx: Preserve CR4 across VM entry", + "cmt_id": "2e70fb5dcbaec195febf1eee3b96e8b47e432c35" + }, + "CVE-2014-9728": { + "cmt_msg": "udf: Verify i_size when loading inode", + "cmt_id": "4ff6c40be897225cf818c5202871cfb91ed064f6" + }, + "CVE-2014-9729": { + "cmt_msg": "udf: Verify i_size when loading inode", + "cmt_id": "4ff6c40be897225cf818c5202871cfb91ed064f6" + }, + "CVE-2014-9731": { + "cmt_msg": "udf: Check path length when reading symlink", + "cmt_id": "ebfce5ccba81292a5e34710a602117769118fa9a" + }, + "CVE-2014-9730": { + "cmt_msg": "udf: Check component length before reading it", + "cmt_id": "c94011ac6ae0bbfc8966ec256ad7b1bf30feaeec" + }, + "CVE-2015-1421": { + "cmt_msg": "net: sctp: fix slab corruption from use after free on INIT collisions", + "cmt_id": "43e39c2f63240f67a67b4060882f67dac1a6f339" + } + }, + "3.12.39": { + "CVE-2014-7822": { + "cmt_msg": "->splice_write() via ->write_iter()", + "cmt_id": "d7e3ae47c441894b11dce376ff8d110780872d0d" + }, + "CVE-2015-2830": { + "cmt_msg": "x86/asm/entry/64: Remove a bogus 'ret_from_fork' optimization", + "cmt_id": "93ba6108cd76089d6ae16abec65ade5b11546d76" + }, + "CVE-2015-1593": { + "cmt_msg": "x86, mm/ASLR: Fix stack randomization on 64-bit systems", + "cmt_id": "5fb6f0aa14db88c62ca141279ab71f20d6814788" + } + }, + "3.12.40": { + "CVE-2016-0823": { + "cmt_msg": "pagemap: do not leak physical addresses to non-privileged userspace", + "cmt_id": "91e9d77039485b57ddf632638acc0a968a39b856" + }, + "CVE-2015-2666": { + "cmt_msg": "x86/microcode/intel: Guard against stack overflow in the loader", + "cmt_id": "c5988181af3b41381c4d20e08ca6852f99f95417" + }, + "CVE-2015-3331": { + "cmt_msg": "crypto: aesni - fix memory usage in GCM decryption", + "cmt_id": "0585664d17325265ea7cc51aa4f1ff492972b611" + }, + "CVE-2014-2568": { + "cmt_msg": "core, nfqueue, openvswitch: Orphan frags in skb_zerocopy and handle errors", + "cmt_id": "1674b4bf3eea3cac51b70778e89f8025f7cfe695" + }, + "CVE-2015-2150": { + "cmt_msg": "xen-pciback: limit guest control of command register", + "cmt_id": "f82a9cff66e3158a3f86706ff55feba2b22ec8cb" + } + }, + "3.12.41": { + "CVE-2014-8160": { + "cmt_msg": "netfilter: conntrack: disable generic tracking for known protocols", + "cmt_id": "2fb11da9d9016f6c0a4fcb99b8ebd63495c79005" + }, + "CVE-2014-8159": { + "cmt_msg": "IB/uverbs: Prevent integer overflow in ib_umem_get address arithmetic", + "cmt_id": "f6094cbab915952132434cc50d738c2976cb4457" + }, + "CVE-2015-2041": { + "cmt_msg": "net: llc: use correct size for sysctl timeout entries", + "cmt_id": "553dd569ff29bc38cebbf9f9dd7c791863ee9113" + }, + "CVE-2015-2042": { + "cmt_msg": "net: rds: use correct size for max unacked packets and bytes", + "cmt_id": "b4482b533bfb54232f31d72c8ab70c1400385040" + }, + "CVE-2015-2922": { + "cmt_msg": "ipv6: Don't reduce hop limit for an interface", + "cmt_id": "ac12ff18b11259e10c2d543aa58c73ff88a68e77" + }, + "CVE-2015-3332": { + "cmt_msg": "tcp: Fix crash in TCP Fast Open", + "cmt_id": "221ff9c56696e9e02d39ecb844528ebb4f8abf0f" + }, + "CVE-2015-0239": { + "cmt_msg": "KVM: x86: SYSENTER emulation is broken", + "cmt_id": "4483ef98b020b9d4cdafef95ee84b18eaccea61a" + } + }, + "3.12.43": { + "CVE-2015-6526": { + "cmt_msg": "powerpc/perf: Cap 64bit userspace backtraces to PERF_MAX_STACK_DEPTH", + "cmt_id": "d15e6bc4606b27f53ef70a99d05690fa5a0e6c45" + }, + "CVE-2017-1000253": { + "cmt_msg": "fs/binfmt_elf.c: fix bug in loading of PIE binaries", + "cmt_id": "b255044d68f190693d799263eb4dab66813f2de9" + }, + "CVE-2015-3636": { + "cmt_msg": "ipv4: Missing sk_nulls_node_init() in ping_unhash().", + "cmt_id": "8a9a51ba2eff62e1a899daad7b623becfed8f3f1" + }, + "CVE-2015-3339": { + "cmt_msg": "fs: take i_mutex during prepare_binprm for set[ug]id executables", + "cmt_id": "5176b77f1aacdc560eaeac4685ade444bb814689" + }, + "CVE-2014-8173": { + "cmt_msg": "mm: Fix NULL pointer dereference in madvise(MADV_WILLNEED) support", + "cmt_id": "5f30307e19b93df1e80b073b15967f53850ad33d" + } + }, + "3.12.44": { + "CVE-2015-4177": { + "cmt_msg": "mnt: Fail collect_mounts when applied to unmounted mounts", + "cmt_id": "6ab282fe6d43027b3b1ef820b3798aae8fdb432b" + }, + "CVE-2015-4700": { + "cmt_msg": "x86: bpf_jit: fix compilation of large bpf programs", + "cmt_id": "0fa9520e7b08f00138cf9a4a95d066492cbcc18d" + }, + "CVE-2015-4036": { + "cmt_msg": "vhost/scsi: potential memory corruption", + "cmt_id": "266ed50f2a81a882d54c4ff7452bca370f396bae" + }, + "CVE-2015-1420": { + "cmt_msg": "vfs: read file_handle only once in handle_to_path", + "cmt_id": "330c542ff8f659055de1992935abaa18b121379e" + }, + "CVE-2015-5364": { + "cmt_msg": "udp: fix behavior of wrong checksums", + "cmt_id": "a97b54dd69cb05df4c57f5d5b40c761f7835ce4e" + }, + "CVE-2015-5366": { + "cmt_msg": "udp: fix behavior of wrong checksums", + "cmt_id": "a97b54dd69cb05df4c57f5d5b40c761f7835ce4e" + } + }, + "3.12.45": { + "CVE-2015-4167": { + "cmt_msg": "udf: Check length of extended attributes and allocation descriptors", + "cmt_id": "aa826bb1953a0a40b460e053efcf9c5f8cab554b" + }, + "CVE-2014-9710": { + "cmt_msg": "Btrfs: make xattr replace operations atomic", + "cmt_id": "a873146ce4fb025c0b5c1322af5a6bad042f5363" + }, + "CVE-2015-3212": { + "cmt_msg": "sctp: fix ASCONF list handling", + "cmt_id": "bee9ad8fe88affc985755c97511637a8672b0fb2" + }, + "CVE-2015-4003": { + "cmt_msg": "ozwpan: divide-by-zero leading to panic", + "cmt_id": "31c39eb8bdf7226a472d910f36ae7a2f3cbace85" + }, + "CVE-2015-4002": { + "cmt_msg": "ozwpan: Use proper check to prevent heap overflow", + "cmt_id": "b042a31d19ad9780c3eba768eef8db5a8c048653" + }, + "CVE-2014-8172": { + "cmt_msg": "get rid of s_files and files_lock", + "cmt_id": "0da9ac29cddaaf0911fbeaf46e7b4e155cdc792e" + } + }, + "3.12.46": { + "CVE-2015-4692": { + "cmt_msg": "kvm: x86: fix kvm_apic_has_events to check for NULL pointer", + "cmt_id": "cda28549b632e62f662ce15242b7266cce90c128" + }, + "CVE-2015-5707": { + "cmt_msg": "sg_start_req(): make sure that there's not too many elements in iovec", + "cmt_id": "aba300b9c26f063efcaee374e54264c79a611f22" + }, + "CVE-2015-9289": { + "cmt_msg": "cx24116: fix a buffer overflow when checking userspace params", + "cmt_id": "da0f41c912a624883a79ff47321b0e9f76d7f27a" + } + }, + "3.12.47": { + "CVE-2015-3290": { + "cmt_msg": "x86/nmi/64: Switch stacks on userspace NMI entry", + "cmt_id": "e0de15fc45a83f94d1ef578f54b427b86a33ab21" + }, + "CVE-2015-5697": { + "cmt_msg": "md: use kzalloc() when bitmap is disabled", + "cmt_id": "6578b22cd80381c9fbab152e1ababd8bfce8b5d0" + }, + "CVE-2015-5157": { + "cmt_msg": "x86/nmi/64: Switch stacks on userspace NMI entry", + "cmt_id": "e0de15fc45a83f94d1ef578f54b427b86a33ab21" + }, + "CVE-2015-6252": { + "cmt_msg": "vhost: actually track log eventfd file", + "cmt_id": "a5b3343b05e58b8f8ce7481426f89c048229b50d" + }, + "CVE-2015-3288": { + "cmt_msg": "mm: avoid setting up anonymous pages into file mapping", + "cmt_id": "bf653833fc72668cadcb1f54310f3d0bd6b36393" + }, + "CVE-2015-5706": { + "cmt_msg": "path_openat(): fix double fput()", + "cmt_id": "da59de4cfa5f3562d02fcbc24fe96a08aebea628" + } + }, + "3.12.49": { + "CVE-2015-5283": { + "cmt_msg": "sctp: fix race on protocol/netns initialization", + "cmt_id": "540a0bd97d4e790b9526e266c22f4c12cf732a1f" + }, + "CVE-2015-3291": { + "cmt_msg": "x86/nmi/64: Use DF to avoid userspace RSP confusing nested NMI detection", + "cmt_id": "864c198bbd4e091577602ad42016ccc835af3b93" + }, + "CVE-2015-2925": { + "cmt_msg": "dcache: Handle escaped paths in prepend_path", + "cmt_id": "b32388c040d559d26feef31fa02b4119c76be474" + } + }, + "3.12.50": { + "CVE-2015-7613": { + "cmt_msg": "Initialize msg/shm IPC objects before doing ipc_addid()", + "cmt_id": "89c7ab1494f614bf8323490c79d4a562e90db61b" + }, + "CVE-2015-5257": { + "cmt_msg": "USB: whiteheat: fix potential null-deref at probe", + "cmt_id": "c43eff0a37cc308eab7489701ced35afd4d491d9" + }, + "CVE-2015-8019": { + "cmt_msg": "net: add length argument to skb_copy_and_csum_datagram_iovec", + "cmt_id": "3e1ac3aafbd0cf1f7c81cb7099a8a1d0407e021d" + } + }, + "3.12.51": { + "CVE-2015-8215": { + "cmt_msg": "ipv6: addrconf: validate new MTU before applying it", + "cmt_id": "49f9add06964fe16997aa34099e7bb31c39b0314" + }, + "CVE-2015-7872": { + "cmt_msg": "KEYS: Fix crash when attempt to garbage collect an uninstantiated keyring", + "cmt_id": "bd6e04696299ce030e8650a96151fe383c431dce" + }, + "CVE-2015-8104": { + "cmt_msg": "KVM: svm: unconditionally intercept #DB", + "cmt_id": "4c6a0e0edfe824edd777a496f46817b4fb465cbd" + }, + "CVE-2015-5156": { + "cmt_msg": "virtio-net: drop NETIF_F_FRAGLIST", + "cmt_id": "7c11e86ec40e52468fe65acf89c6da7a6d833a44" + }, + "CVE-2015-5307": { + "cmt_msg": "KVM: x86: work around infinite loop in microcode when #AC is delivered", + "cmt_id": "0ccaee7be83eb288e8baacf6eebd4d8b8593f462" + }, + "CVE-2015-6937": { + "cmt_msg": "RDS: verify the underlying transport exists before creating a connection", + "cmt_id": "2a3466123f0cb310c2201f0ae4ad3f72905b061b" + } + }, + "3.12.52": { + "CVE-2015-8543": { + "cmt_msg": "net: add validation for the socket syscall protocol argument", + "cmt_id": "0295617f822f630711f5af03316d3cbda6e737d4" + }, + "CVE-2015-8575": { + "cmt_msg": "bluetooth: Validate socket address length in sco_sock_bind().", + "cmt_id": "1d9e57809a93e4083d2b898126ed2165f5200d60" + }, + "CVE-2016-3841": { + "cmt_msg": "ipv6: add complete rcu protection around np->opt", + "cmt_id": "71781d1f85bc02bcdb29b18e9e76f1d49118ddc8" + }, + "CVE-2013-7446": { + "cmt_msg": "unix: avoid use-after-free in ep_remove_wait_queue", + "cmt_id": "9964b4c4ee925b2910723e509abd7241cff1ef84" + }, + "CVE-2015-8569": { + "cmt_msg": "pptp: verify sockaddr_len in pptp_bind() and pptp_connect()", + "cmt_id": "d470ffbe3fe914d176ced4cf330a297c523c5711" + } + }, + "3.12.53": { + "CVE-2016-10229": { + "cmt_msg": "udp: properly support MSG_PEEK with truncated buffers", + "cmt_id": "c3bfbecb1bb575278ce4812746a29c04875a2926" + }, + "CVE-2015-7515": { + "cmt_msg": "Input: aiptek - fix crash on detecting device without endpoints", + "cmt_id": "a7c0ba06670f99c252d5bb74258dddbf50fef837" + }, + "CVE-2016-0728": { + "cmt_msg": "KEYS: Fix keyring ref leak in join_session_keyring()", + "cmt_id": "6849cd97b0511913e17ef8bb53bd5558c4b51fc8" + }, + "CVE-2015-7799": { + "cmt_msg": "isdn_ppp: Add checks for allocation failure in isdn_ppp_open()", + "cmt_id": "a4c5c2262fc842e0323043a23a84be706760d628" + }, + "CVE-2015-7550": { + "cmt_msg": "KEYS: Fix race between read and revoke", + "cmt_id": "2d783600fdeafa5d7e5079c7aa79212116f60e51" + }, + "CVE-2015-7885": { + "cmt_msg": "staging/dgnc: fix info leak in ioctl", + "cmt_id": "39c9944afb08c26ff36ae1967497d44fcf5a87ed" + }, + "CVE-2015-8767": { + "cmt_msg": "sctp: Prevent soft lockup when sctp_accept() is called during a timeout event", + "cmt_id": "6b1a4c8425acde6b3725e9ca5dc7af544c656fda" + } + }, + "3.12.54": { + "CVE-2016-8646": { + "cmt_msg": "crypto: algif_hash - Only export and import on sockets with data", + "cmt_id": "231304036a751d3b6bd736fc81d3b8037d87350d" + }, + "CVE-2015-8844": { + "cmt_msg": "powerpc/tm: Block signal return setting invalid MSR state", + "cmt_id": "e9214d1047a5f215b2275ba6374fb076b9c73245" + }, + "CVE-2016-2545": { + "cmt_msg": "ALSA: timer: Fix double unlink of active_list", + "cmt_id": "d8f5adeeed06acd63b93bc757a7e09adc8c33e64" + }, + "CVE-2016-2544": { + "cmt_msg": "ALSA: seq: Fix race at timer setup and close", + "cmt_id": "49386ca9bcb24608ed22e19fb61599e6049f8a44" + }, + "CVE-2016-2547": { + "cmt_msg": "ALSA: timer: Harden slave timer list handling", + "cmt_id": "6e74b2deb63c48ddcd318b6c3d69f4f503e65d18" + }, + "CVE-2016-2546": { + "cmt_msg": "ALSA: timer: Fix race among timer ioctls", + "cmt_id": "7210b17187111e20afca4b4e30a31fa13c71a61b" + }, + "CVE-2016-2543": { + "cmt_msg": "ALSA: seq: Fix missing NULL check at remove_events ioctl", + "cmt_id": "2e17cb8c3553b2d61d9d70344bbec8a82c56e7d7" + }, + "CVE-2016-2549": { + "cmt_msg": "ALSA: hrtimer: Fix stall by hrtimer_cancel()", + "cmt_id": "30e269d8d1af5ab11e613eab94af33693e95ade6" + }, + "CVE-2016-2548": { + "cmt_msg": "ALSA: timer: Harden slave timer list handling", + "cmt_id": "6e74b2deb63c48ddcd318b6c3d69f4f503e65d18" + } + }, + "3.12.55": { + "CVE-2015-8785": { + "cmt_msg": "fuse: break infinite loop in fuse_fill_write_pages()", + "cmt_id": "affc1b9e84738b96f2e4e24a6fc95e09ef9a7b4b" + }, + "CVE-2015-8970": { + "cmt_msg": "crypto: algif_skcipher - Require setkey before accept(2)", + "cmt_id": "82a0aa2c08de674191cf5e99b649af145c5ade25" + }, + "CVE-2015-7566": { + "cmt_msg": "USB: serial: visor: fix crash on detecting device without write_urbs", + "cmt_id": "c88ff183d8a3b3599394885f458b40eb838c0850" + }, + "CVE-2016-0723": { + "cmt_msg": "tty: Fix unsafe ldisc reference via ioctl(TIOCGETD)", + "cmt_id": "4e6d2e76232ae19658064746fd5e5d800b8b5964" + }, + "CVE-2016-2384": { + "cmt_msg": "ALSA: usb-audio: avoid freeing umidi object twice", + "cmt_id": "563b627dbd698b2ae2f385718f1682ec20a51119" + } + }, + "3.12.56": { + "CVE-2021-20265": { + "cmt_msg": "af_unix: fix struct pid memory leak", + "cmt_id": "45c4c852c8ab5fb7e879892afa665dc47e55956d" + }, + "CVE-2015-8812": { + "cmt_msg": "iw_cxgb3: Fix incorrectly returning error on success", + "cmt_id": "aec2e8966c788ccb1d7beed3401adfb470676877" + } + }, + "3.12.57": { + "CVE-2015-8551": { + "cmt_msg": "xen/pciback: Return error on XEN_PCI_OP_enable_msi when device has MSI or MSI-X enabled", + "cmt_id": "0842f7d8a78ff7f9c3a176abaa620a220fc82e75" + }, + "CVE-2015-8553": { + "cmt_msg": "xen/pciback: Don't allow MSI-X ops if PCI_COMMAND_MEMORY is not set.", + "cmt_id": "bb7aa305af0fd136dde25ad65ec0d3279d809d8b" + }, + "CVE-2013-4312": { + "cmt_msg": "unix: properly account for FDs passed over unix sockets", + "cmt_id": "3d024dcef2548028e9f9b7876a544e6e0af00175" + }, + "CVE-2015-8552": { + "cmt_msg": "xen/pciback: Return error on XEN_PCI_OP_enable_msi when device has MSI or MSI-X enabled", + "cmt_id": "0842f7d8a78ff7f9c3a176abaa620a220fc82e75" + } + }, + "3.12.58": { + "CVE-2015-8550": { + "cmt_msg": "xen: Add RING_COPY_REQUEST()", + "cmt_id": "120b649bd2f6699ed56dfa93c4a8b070babe9984" + }, + "CVE-2016-2143": { + "cmt_msg": "s390/mm: four page table levels vs. fork", + "cmt_id": "bf06b31b00b2bc7427e567c67d11c01513044557" + }, + "CVE-2016-3156": { + "cmt_msg": "ipv4: Don't do expensive useless work during inetdev destroy.", + "cmt_id": "5cc4ff312ac06ee4c49801f5b288c1118c3e5785" + }, + "CVE-2016-3137": { + "cmt_msg": "USB: cypress_m8: add endpoint sanity check", + "cmt_id": "4a77ba7a4e8567821f3e77054f23b3daade25999" + }, + "CVE-2016-9685": { + "cmt_msg": "xfs: fix two memory leaks in xfs_attr_list.c error paths", + "cmt_id": "36f5207148d48433625966162d03f804d81e1a23" + }, + "CVE-2016-3140": { + "cmt_msg": "USB: digi_acceleport: do sanity checking for the number of ports", + "cmt_id": "cd4d737344639d7225d0232ec99a1b833d7e2324" + }, + "CVE-2016-2782": { + "cmt_msg": "USB: visor: fix null-deref at probe", + "cmt_id": "d53a0262f6738c81193e000b2975a7183be521f3" + }, + "CVE-2016-3157": { + "cmt_msg": "x86/iopl/64: Properly context-switch IOPL on Xen PV", + "cmt_id": "a2a4370a312ac4793b165768f8fc69495b05b23e" + }, + "CVE-2016-2185": { + "cmt_msg": "Input: ati_remote2 - fix crashes on detecting device with invalid descriptor", + "cmt_id": "ca216547bc4a3e7d73043f4d9b42d6461cf3067f" + }, + "CVE-2016-2184": { + "cmt_msg": "ALSA: usb-audio: Fix NULL dereference in create_fixed_stream_quirk()", + "cmt_id": "3b8dbf6b7b4e4fd1274fe2e5b04eda5a3394c543" + }, + "CVE-2015-8816": { + "cmt_msg": "USB: fix invalid memory access in hub_activate()", + "cmt_id": "a706ac408da4994438d995d2cf4d2f7943086ca4" + }, + "CVE-2016-2186": { + "cmt_msg": "Input: powermate - fix oops with malicious USB descriptors", + "cmt_id": "4f5d9400a57200b8a9f6a683a7beadd159ac09e1" + }, + "CVE-2016-3689": { + "cmt_msg": "Input: ims-pcu - sanity check against missing interfaces", + "cmt_id": "b18626baf7a8b5bef098204516641b0701419d85" + }, + "CVE-2016-3136": { + "cmt_msg": "USB: mct_u232: add sanity checking in probe", + "cmt_id": "f9dbb3666b3ddb5f9a7e44a433383cb6880a03f5" + }, + "CVE-2016-3138": { + "cmt_msg": "USB: cdc-acm: more sanity checking", + "cmt_id": "f475db149d75bf100084a813ce9e1e9f4fa508e7" + } + }, + "3.12.59": { + "CVE-2015-7513": { + "cmt_msg": "KVM: x86: Reload pit counters for all channels when restoring state", + "cmt_id": "e31a2100a342288b665c31af0a5f01e794866cda" + }, + "CVE-2016-3955": { + "cmt_msg": "USB: usbip: fix potential out-of-bounds write", + "cmt_id": "3b86e790417645fa899ed658a8e17f6832cf3936" + }, + "CVE-2016-2085": { + "cmt_msg": "EVM: Use crypto_memneq() for digest comparisons", + "cmt_id": "afe5a791d374e50a06ada7f4eda4e921e1b77996" + }, + "CVE-2016-7117": { + "cmt_msg": "net: Fix use after free in the recvmmsg exit path", + "cmt_id": "2c7a8d368b3bef1cf97ea000ba0c07b27562af15" + }, + "CVE-2016-3951": { + "cmt_msg": "cdc_ncm: do not call usbnet_link_change from cdc_ncm_bind", + "cmt_id": "f0592d355da50713a25c943a08142363237f1a41" + }, + "CVE-2016-4805": { + "cmt_msg": "ppp: take reference on channels netns", + "cmt_id": "736a17fe375978bce54cff359a3f76fb2676f872" + }, + "CVE-2016-3134": { + "cmt_msg": "netfilter: x_tables: fix unconditional helper", + "cmt_id": "9192d640a3917d7daf313795b4b7fc6329b3f6e5" + }, + "CVE-2016-2847": { + "cmt_msg": "pipe: limit the per-user amount of pages allocated in pipes", + "cmt_id": "2a032e307d35402306c6464537b8bc6a0a3ac91d" + } + }, + "3.12.60": { + "CVE-2016-4580": { + "cmt_msg": "net: fix a kernel infoleak in x25 module", + "cmt_id": "aeb14f1738e3c6a703213cb103e0f89f143bd276" + }, + "CVE-2016-4486": { + "cmt_msg": "net: fix infoleak in rtnetlink", + "cmt_id": "3248734d04fe4140b66aca5ce0372d7eae093293" + }, + "CVE-2016-2117": { + "cmt_msg": "atl2: Disable unimplemented scatter/gather feature", + "cmt_id": "59e126bf0fefcc03f309d3893a921637064fc2ee" + }, + "CVE-2016-4485": { + "cmt_msg": "net: fix infoleak in llc", + "cmt_id": "734b9658068b9b2ecb3aff06e125a66e02306386" + }, + "CVE-2016-4913": { + "cmt_msg": "get_rock_ridge_filename(): handle malformed NM entries", + "cmt_id": "7721094c03d1caad50b04eb60b06369b8a2e52d3" + }, + "CVE-2016-2187": { + "cmt_msg": "Input: gtco - fix crash on detecting device without endpoints", + "cmt_id": "8c29c640402a7baf7fa9a31cd5bda288090a19ac" + }, + "CVE-2016-7916": { + "cmt_msg": "proc: prevent accessing /proc//environ until it's ready", + "cmt_id": "cdfaba237820a99bad60d947530725151a611ca0" + }, + "CVE-2016-0758": { + "cmt_msg": "KEYS: Fix ASN.1 indefinite length object parsing", + "cmt_id": "012d81589afb85807b7ebe72f3505d90f34aa265" + }, + "CVE-2016-0821": { + "cmt_msg": "include/linux/poison.h: fix LIST_POISON{1,2} offset", + "cmt_id": "c7ecfa39d66c62ee662ae6906a2eec3d28a96e6a" + } + }, + "3.12.61": { + "CVE-2016-4565": { + "cmt_msg": "IB/security: Restrict use of the write() interface", + "cmt_id": "0ab923b3982c323bd95e63a9b93dc65d1aebb94f" + }, + "CVE-2016-9754": { + "cmt_msg": "ring-buffer: Prevent overflow of size in ring_buffer_resize()", + "cmt_id": "5feada97176f05f92088911fa807d30445c6a0c6" + } + }, + "3.12.62": { + "CVE-2016-4997": { + "cmt_msg": "netfilter: x_tables: check for bogus target offset", + "cmt_id": "1812c704ac70a37c06f239d7c06fd4331a25c779" + }, + "CVE-2016-4569": { + "cmt_msg": "ALSA: timer: Fix leak in SNDRV_TIMER_IOCTL_PARAMS", + "cmt_id": "16e5f4c6ea671ffce2ee49e308c1e812144547d2" + }, + "CVE-2016-4578": { + "cmt_msg": "ALSA: timer: Fix leak in events via snd_timer_user_ccallback", + "cmt_id": "640b1f79615c2b7dfba517aba7a8164c489da10c" + }, + "CVE-2016-4470": { + "cmt_msg": "KEYS: potential uninitialized variable", + "cmt_id": "8c903c052ddf107cdbf4e0ccb54ad20be75c899f" + }, + "CVE-2016-4998": { + "cmt_msg": "netfilter: x_tables: check for bogus target offset", + "cmt_id": "1812c704ac70a37c06f239d7c06fd4331a25c779" + }, + "CVE-2016-5244": { + "cmt_msg": "rds: fix an infoleak in rds_inc_info_copy", + "cmt_id": "3360c51768c3c589e7db3f2a4308b729ebcc7bae" + }, + "CVE-2016-4482": { + "cmt_msg": "USB: usbfs: fix potential infoleak in devio", + "cmt_id": "fd0d40b9370853c02102c22b91ff7c3cd1077e8b" + }, + "CVE-2016-9806": { + "cmt_msg": "netlink: Fix dump skb leak/double free", + "cmt_id": "461dbb3855305ad7e841799ef573d6fc2abf6ed3" + }, + "CVE-2016-5829": { + "cmt_msg": "HID: hiddev: validate num_values for HIDIOCGUSAGES, HIDIOCSUSAGES commands", + "cmt_id": "5b9003297640242a33bb325f57ac60359ed0be43" + }, + "CVE-2014-9904": { + "cmt_msg": "ALSA: compress: fix an integer overflow check", + "cmt_id": "9deea4ddcc8f6b9708075aa307042c43b4fde732" + } + }, + "3.12.63": { + "CVE-2016-3070": { + "cmt_msg": "mm: migrate dirty page without clear_page_dirty_for_io etc", + "cmt_id": "2c789028e7390ca050752f659a82c6cdad357b67" + }, + "CVE-2016-2069": { + "cmt_msg": "x86/mm: Add barriers and document switch_mm()-vs-flush synchronization", + "cmt_id": "aa8f21d06e61b029341c51b17edd68ba15fe0e47" + }, + "CVE-2016-7910": { + "cmt_msg": "block: fix use-after-free in seq file", + "cmt_id": "8b85bc8b9e08482c7450b83e0a85532d8d87da49" + }, + "CVE-2016-5696": { + "cmt_msg": "tcp: make challenge acks less predictable", + "cmt_id": "56d86b8ad437e6c19dcade9ff7c3d9c0522df6f3" + }, + "CVE-2016-3857": { + "cmt_msg": "arm: oabi compat: add missing access checks", + "cmt_id": "3d207c4c414adc515aa666f2b010f6e85c5528a7" + } + }, + "3.12.64": { + "CVE-2016-6130": { + "cmt_msg": "s390/sclp_ctl: fix potential information leak with /dev/sclp", + "cmt_id": "6ec8ba03f408beac5bad1e9ec06c8a90b373f3ac" + }, + "CVE-2016-9178": { + "cmt_msg": "fix minor infoleak in get_user_ex()", + "cmt_id": "d42924ab1ec523c0671f5560d51750996be31d3a" + }, + "CVE-2016-6828": { + "cmt_msg": "tcp: fix use after free in tcp_xmit_retransmit_queue()", + "cmt_id": "1f25ea564d810767b4ce3302530156dd5ddaa0f4" + }, + "CVE-2016-6480": { + "cmt_msg": "aacraid: Check size values after double-fetch from user", + "cmt_id": "bcc85e09fc60d2e99053eae3fd0515c343189375" + } + }, + "3.12.65": { + "CVE-2016-6327": { + "cmt_msg": "IB/srpt: Simplify srpt_handle_tsk_mgmt()", + "cmt_id": "979f1b7344634315d895025b53b002896057c09d" + }, + "CVE-2017-15102": { + "cmt_msg": "usb: misc: legousbtower: Fix NULL pointer deference", + "cmt_id": "55b6c165bdf9b2808137cc5d49066e8a5344622a" + } + }, + "3.12.66": { + "CVE-2016-5195": { + "cmt_msg": "mm: remove gup_flags FOLL_WRITE games from __get_user_pages()", + "cmt_id": "f949fcd7414197b8e04b07c480d36bc39332ff7b" + }, + "CVE-2016-8658": { + "cmt_msg": "brcmfmac: avoid potential stack overflow in brcmf_cfg80211_start_ap()", + "cmt_id": "bfce0a403535f6071a08d6365b8c4b3cfeba2d67" + } + }, + "3.12.67": { + "CVE-2016-7425": { + "cmt_msg": "scsi: arcmsr: Buffer overflow in arcmsr_iop_message_xfer()", + "cmt_id": "e50a611253c70bdb3fad29b7a3411c3b1237cc8e" + } + }, + "3.12.68": { + "CVE-2015-9004": { + "cmt_msg": "perf: Tighten (and fix) the grouping condition", + "cmt_id": "5e08a111b0a076648039fb2a08d6e101a6af9388" + }, + "CVE-2016-3961": { + "cmt_msg": "x86/mm/xen: Suppress hugetlbfs in PV guests", + "cmt_id": "b0363263e57199808d17e597df74cbdb28abbe55" + }, + "CVE-2016-7042": { + "cmt_msg": "KEYS: Fix short sprintf buffer in /proc/keys show function", + "cmt_id": "cd93b7f830c1fa1cb35146c701ce8eecb2b19c44" + }, + "CVE-2016-8645": { + "cmt_msg": "tcp: take care of truncations done by sk_filter()", + "cmt_id": "9edbcfdced9628dfdc6dc54d625e571aef81a8a5" + }, + "CVE-2016-8633": { + "cmt_msg": "firewire: net: guard against rx buffer overflows", + "cmt_id": "488c5d8218f38a4c6aa90a65b81492e868a251fd" + }, + "CVE-2015-8964": { + "cmt_msg": "tty: Prevent ldisc drivers from re-using stale tty fields", + "cmt_id": "e1a77178a3ecee0f5e70568e9ddb99bd7d0c5ee7" + }, + "CVE-2016-9555": { + "cmt_msg": "sctp: validate chunk len before actually using it", + "cmt_id": "fb77271c550e1414597dfac77202d85bd866f0a9" + } + }, + "3.12.69": { + "CVE-2016-9793": { + "cmt_msg": "net: avoid signed overflows for SO_{SND|RCV}BUFFORCE", + "cmt_id": "40c753f1714416931dc093b960aa3fcac4a545c5" + }, + "CVE-2016-8650": { + "cmt_msg": "mpi: Fix NULL ptr dereference in mpi_powm()", + "cmt_id": "18fb7a8fb3d55275fc17f4ff5c7e34dd2b6d74e5" + }, + "CVE-2016-10200": { + "cmt_msg": "l2tp: fix racy SOCK_ZAPPED flag check in l2tp_ip{,6}_bind()", + "cmt_id": "c20932ae0d412f1aabf3514891cdd6ae6a08ae01" + }, + "CVE-2016-9794": { + "cmt_msg": "ALSA: pcm : Call kill_fasync() in stream lock", + "cmt_id": "3af0be0536e71b0ed55620aca65f9144bf2c1088" + }, + "CVE-2016-8655": { + "cmt_msg": "packet: fix race condition in packet_set_ring", + "cmt_id": "c80480c4ad5208431a7fb003472bd576bbe6ebb7" + } + }, + "3.12.70": { + "CVE-2016-9083": { + "cmt_msg": "vfio/pci: Fix integer overflows, bitmask check", + "cmt_id": "e4f13c5f27d6bfb2fea565d346273b0c74023ae6" + }, + "CVE-2016-10088": { + "cmt_msg": "sg_write()/bsg_write() is not fit to be called under KERNEL_DS", + "cmt_id": "7eb9e6472cbdd8e2df774ae91531c8959e21dbbc" + }, + "CVE-2017-5549": { + "cmt_msg": "USB: serial: kl5kusb105: fix line-state error handling", + "cmt_id": "9ed06d4fa06cce8f37637771000f0eded3a6d572" + }, + "CVE-2017-7273": { + "cmt_msg": "HID: hid-cypress: validate length of report", + "cmt_id": "5bc00ccfce098d09c1aa097806660d9709fbe956" + }, + "CVE-2017-7495": { + "cmt_msg": "ext4: fix data exposure after a crash", + "cmt_id": "10de8b686e90eb57066cf4d04d7ddbc54b4f1833" + }, + "CVE-2016-7097": { + "cmt_msg": "posix_acl: Clear SGID bit when setting file permissions", + "cmt_id": "a88a2be387d1d8a5843826e12009c79e32fb46c8" + }, + "CVE-2016-9588": { + "cmt_msg": "kvm: nVMX: Allow L1 to intercept software exceptions (#BP and #OF)", + "cmt_id": "aaa9f982f5dc0a64bcc6d83cc78e690c757bcad8" + }, + "CVE-2016-9084": { + "cmt_msg": "vfio/pci: Fix integer overflows, bitmask check", + "cmt_id": "e4f13c5f27d6bfb2fea565d346273b0c74023ae6" + }, + "CVE-2016-9191": { + "cmt_msg": "sysctl: Drop reference added by grab_header in proc_sys_readdir", + "cmt_id": "baa7295e1d686a443c0c23156b0bc9058d783aa4" + }, + "CVE-2016-7911": { + "cmt_msg": "block: fix use-after-free in sys_ioprio_get()", + "cmt_id": "075030bd3251283bd380b60eeecc8e4ba8778f22" + }, + "CVE-2016-7913": { + "cmt_msg": "xc2028: avoid use after free", + "cmt_id": "74e3d04ca992bedac5080ed1a817fabf71667210" + }, + "CVE-2017-5551": { + "cmt_msg": "tmpfs: clear S_ISGID when setting posix ACLs", + "cmt_id": "b0369e53c851f8cd87afd059d360a4f646840c8c" + }, + "CVE-2017-2583": { + "cmt_msg": "KVM: x86: fix emulation of \"MOV SS, null selector\"", + "cmt_id": "f043f20c055e3485fb82e0955a9f94f50cdffe15" + }, + "CVE-2015-8962": { + "cmt_msg": "sg: Fix double-free when drives detach during SG_IO", + "cmt_id": "969541196ff043df0bde0c4beae9d83185ea3d81" + }, + "CVE-2017-2584": { + "cmt_msg": "KVM: x86: Introduce segmented_write_std", + "cmt_id": "544a81ed7dc176f400e2272595ac02f2791385a8" + } + }, + "3.12.71": { + "CVE-2017-6345": { + "cmt_msg": "net/llc: avoid BUG_ON() in skb_orphan()", + "cmt_id": "c112a93ae0bf3906150d3c7badd8ccc2708ad031" + }, + "CVE-2017-2618": { + "cmt_msg": "selinux: fix off-by-one in setprocattr", + "cmt_id": "8f52584d2277df36b41b45d0caa716640d562e09" + }, + "CVE-2017-6074": { + "cmt_msg": "dccp: fix freeing skb too early for IPV6_RECVPKTINFO", + "cmt_id": "336d459d464a2d23b5df724ae5fb5cd92bc9074c" + }, + "CVE-2016-10208": { + "cmt_msg": "ext4: validate s_first_meta_bg at mount time", + "cmt_id": "bb878bdeaf6c48268322c2e4bdef0879902867aa" + }, + "CVE-2017-5897": { + "cmt_msg": "ip6_gre: fix ip6gre_err() invalid reads", + "cmt_id": "1ae4b12d7643d9bdde764ef671440a8eaf6cfd55" + }, + "CVE-2017-6348": { + "cmt_msg": "irda: Fix lockdep annotations in hashbin_delete().", + "cmt_id": "7132afee391a91d58daa332e1851f1139889b0e3" + }, + "CVE-2017-5970": { + "cmt_msg": "ipv4: keep skb->dst around in presence of IP options", + "cmt_id": "e5a82d662d35933e5511c0280e8513d38d9d4fa0" + }, + "CVE-2016-8405": { + "cmt_msg": "fbdev: color map copying bounds checking", + "cmt_id": "63f6df889c8eff7d9455659941b615a428d6a7b4" + }, + "CVE-2017-5986": { + "cmt_msg": "sctp: avoid BUG_ON on sctp_wait_for_sndbuf", + "cmt_id": "7a814bf5fc8b6738af64bc05d824a22d269962c6" + }, + "CVE-2017-6346": { + "cmt_msg": "packet: fix races in fanout_add()", + "cmt_id": "6d46193d7ccae0758a8e887a6897a3e133eb9610" + }, + "CVE-2017-6214": { + "cmt_msg": "tcp: avoid infinite loop in tcp_splice_read()", + "cmt_id": "917c66630a6ab8a71464c9d57ea6fe14eca9b9fa" + } + }, + "3.12.72": { + "CVE-2017-6353": { + "cmt_msg": "sctp: deny peeloff operation on asocs with threads sleeping on it", + "cmt_id": "8aee8e6c2f0e8a9531a98a227e112fd4835a1881" + }, + "CVE-2017-2636": { + "cmt_msg": "tty: n_hdlc: get rid of racy n_hdlc.tbuf", + "cmt_id": "63075fbddd5151d2e98fa7cf0608a2113e23607d" + }, + "CVE-2017-5669": { + "cmt_msg": "ipc/shm: Fix shmat mmap nil-page protection", + "cmt_id": "afa870b96a40e523f96130beeef6cdc51de4e8d9" + } + }, + "3.12.73": { + "CVE-2017-7184": { + "cmt_msg": "xfrm_user: validate XFRM_MSG_NEWAE XFRMA_REPLAY_ESN_VAL replay_window", + "cmt_id": "be4f4140ab3e8d4142f47c79b0a29f0ec53540b5" + }, + "CVE-2016-2188": { + "cmt_msg": "USB: iowarrior: fix NULL-deref at probe", + "cmt_id": "793b927173199800010a37da93c92e603a1136ce" + }, + "CVE-2017-8924": { + "cmt_msg": "USB: serial: io_ti: fix information leak in completion handler", + "cmt_id": "ef598b806384182a74f2aa9bc24a0284faf3940e" + }, + "CVE-2017-8925": { + "cmt_msg": "USB: serial: omninet: fix reference leaks at open", + "cmt_id": "5b6983c42e4406e92b51a705c24190e1054cb60d" + } + }, + "3.12.74": { + "CVE-2017-7294": { + "cmt_msg": "drm/vmwgfx: fix integer overflow in vmw_surface_define_ioctl()", + "cmt_id": "e7fea2a4fa3719517f9a48389e7f3c8b1cc8c299" + }, + "CVE-2017-7645": { + "cmt_msg": "nfsd: check for oversized NFSv2/v3 arguments", + "cmt_id": "7a6875988a7fce567e4ee22481d6e7dd82a33eff" + }, + "CVE-2017-6951": { + "cmt_msg": "KEYS: Remove key_type::match in favour of overriding default by match_preparse", + "cmt_id": "716aa8781692706c78bea54b1efd4269d15d4071" + }, + "CVE-2017-8064": { + "cmt_msg": "dvb-usb-v2: avoid use-after-free", + "cmt_id": "03662cd00e03d0fe34f9f91217313a4544b71c60" + }, + "CVE-2017-7261": { + "cmt_msg": "drm/vmwgfx: NULL pointer dereference in vmw_surface_define_ioctl()", + "cmt_id": "13a6a971c9165237531c2870da03084a6becc905" + }, + "CVE-2017-2671": { + "cmt_msg": "ping: implement proper locking", + "cmt_id": "10e710684943bfd0653d7f0bcf430cdaf25a0d2f" + }, + "CVE-2017-7308": { + "cmt_msg": "net/packet: fix overflow in check for priv area size", + "cmt_id": "0a39eb8a881e83154aadacc36fc8bda8258f1991" + }, + "CVE-2017-2647": { + "cmt_msg": "KEYS: Remove key_type::match in favour of overriding default by match_preparse", + "cmt_id": "716aa8781692706c78bea54b1efd4269d15d4071" + }, + "CVE-2017-7889": { + "cmt_msg": "mm: Tighten x86 /dev/mem with zeroing reads", + "cmt_id": "59546b98395d875f4f85cb1cbac0b5396e3ffe45" + }, + "CVE-2017-7472": { + "cmt_msg": "KEYS: fix keyctl_set_reqkey_keyring() to not leak thread keyrings", + "cmt_id": "e5b32c157bdd74cb0b402506c647222e59c6c11c" + }, + "CVE-2017-7616": { + "cmt_msg": "mm/mempolicy.c: fix error handling in set_mempolicy and mbind.", + "cmt_id": "9840e8fb9edaa9a930eb6f922f61cfbf91073c51" + }, + "CVE-2016-9604": { + "cmt_msg": "KEYS: Disallow keyrings beginning with '.' to be joined as session keyrings", + "cmt_id": "7c46e24ef54c73c7db075d3ff4df0d3b996ac759" + } + }, + "outstanding": { + "CVE-2020-36322": { + "cmt_msg": "fuse: fix bad inode" + }, + "CVE-2020-35508": { + "cmt_msg": "fork: fix copy_process(CLONE_PARENT) race with the exiting ->real_parent" + }, + "CVE-2024-26686": { + "cmt_msg": "fs/proc: do_task_stat: use sig->stats_lock to gather the threads/children stats" + }, + "CVE-2022-3649": { + "cmt_msg": "nilfs2: fix use-after-free bug of struct nilfs_root" + }, + "CVE-2020-35501": { + "cmt_msg": "" + }, + "CVE-2019-15098": { + "cmt_msg": "ath6kl: fix a NULL-ptr-deref bug in ath6kl_usb_alloc_urb_from_pipe()" + }, + "CVE-2024-26687": { + "cmt_msg": "xen/events: close evtchn after mapping cleanup" + }, + "CVE-2021-45095": { + "cmt_msg": "phonet: refcount leak in pep_sock_accep" + }, + "CVE-2017-10663": { + "cmt_msg": "f2fs: sanity check checkpoint segno and blkoff" + }, + "CVE-2023-3611": { + "cmt_msg": "net/sched: sch_qfq: account for stab overhead in qfq_enqueue" + }, + "CVE-2022-0001": { + "cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE" + }, + "CVE-2020-12464": { + "cmt_msg": "USB: core: Fix free-while-in-use bug in the USB S-Glibrary" + }, + "CVE-2017-10662": { + "cmt_msg": "f2fs: sanity check segment count" + }, + "CVE-2019-19965": { + "cmt_msg": "scsi: libsas: stop discovering if oob mode is disconnected" + }, + "CVE-2019-19966": { + "cmt_msg": "media: cpia2: Fix use-after-free in cpia2_exit" + }, + "CVE-2023-52615": { + "cmt_msg": "hwrng: core - Fix page fault dead lock on mmap-ed hwrng" + }, + "CVE-2023-52614": { + "cmt_msg": "PM / devfreq: Fix buffer overflow in trans_stat_show" + }, + "CVE-2023-52617": { + "cmt_msg": "PCI: switchtec: Fix stdev_release() crash after surprise hot remove" + }, + "CVE-2022-1184": { + "cmt_msg": "ext4: verify dir block before splitting it" + }, + "CVE-2020-24587": { + "cmt_msg": "mac80211: prevent mixed key and fragment cache attacks" + }, + "CVE-2020-24586": { + "cmt_msg": "mac80211: prevent mixed key and fragment cache attacks" + }, + "CVE-2017-1000410": { + "cmt_msg": "Bluetooth: Prevent stack info leak from the EFS element." + }, + "CVE-2022-3642": { + "cmt_msg": "" + }, + "CVE-2021-0129": { + "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical" + }, + "CVE-2019-20096": { + "cmt_msg": "dccp: Fix memleak in __feat_register_sp" + }, + "CVE-2023-52619": { + "cmt_msg": "pstore/ram: Fix crash when setting number of cpus to an odd number" + }, + "CVE-2023-42755": { + "cmt_msg": "net/sched: Retire rsvp classifier" + }, + "CVE-2016-10044": { + "cmt_msg": "aio: mark AIO pseudo-fs noexec" + }, + "CVE-2018-10940": { + "cmt_msg": "cdrom: information leak in cdrom_ioctl_media_changed()" + }, + "CVE-2023-31081": { + "cmt_msg": "" + }, + "CVE-2018-10087": { + "cmt_msg": "kernel/exit.c: avoid undefined behaviour when calling wait4()" + }, + "CVE-2021-39634": { + "cmt_msg": "epoll: do not insert into poll queues until all sanity checks are done" + }, + "CVE-2019-9503": { + "cmt_msg": "brcmfmac: add subtype check for event handling in data path" + }, + "CVE-2020-36158": { + "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_cmd_802_11_ad_hoc_start" + }, + "CVE-2023-3159": { + "cmt_msg": "firewire: fix potential uaf in outbound_phy_packet_callback()" + }, + "CVE-2022-0480": { + "cmt_msg": "memcg: enable accounting for file lock caches" + }, + "CVE-2018-10124": { + "cmt_msg": "kernel/signal.c: avoid undefined behaviour in kill_something_info" + }, + "CVE-2023-52429": { + "cmt_msg": "dm: limit the number of targets and parameter size area" + }, + "CVE-2021-28964": { + "cmt_msg": "btrfs: fix race when cloning extent buffer during rewind of an old root" + }, + "CVE-2020-26558": { + "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical" + }, + "CVE-2021-0920": { + "cmt_msg": "af_unix: fix garbage collect vs MSG_PEEK" + }, + "CVE-2022-23825": { + "cmt_msg": "" + }, + "CVE-2021-3847": { + "cmt_msg": "" + }, + "CVE-2021-47052": { + "cmt_msg": "crypto: sa2ul - Fix memory leak of rxd" + }, + "CVE-2023-52629": { + "cmt_msg": "sh: push-switch: Reorder cleanup operations to avoid use-after-free bug" + }, + "CVE-2021-47112": { + "cmt_msg": "x86/kvm: Teardown PV features on boot CPU as well" + }, + "CVE-2021-47113": { + "cmt_msg": "btrfs: abort in rename_exchange if we fail to insert the second ref" + }, + "CVE-2021-47110": { + "cmt_msg": "x86/kvm: Disable kvmclock on all CPUs on shutdown" + }, + "CVE-2021-47116": { + "cmt_msg": "ext4: fix memory leak in ext4_mb_init_backend on error path." + }, + "CVE-2021-47117": { + "cmt_msg": "ext4: fix bug on in ext4_es_cache_extent as ext4_split_extent_at failed" + }, + "CVE-2021-47114": { + "cmt_msg": "ocfs2: fix data corruption by fallocate" + }, + "CVE-2022-21125": { + "cmt_msg": "x86/speculation/mmio: Reuse SRBDS mitigation for SBDS" + }, + "CVE-2021-47118": { + "cmt_msg": "pid: take a reference when initializing `cad_pid`" + }, + "CVE-2021-46970": { + "cmt_msg": "bus: mhi: pci_generic: Remove WQ_MEM_RECLAIM flag from state workqueue" + }, + "CVE-2022-1679": { + "cmt_msg": "ath9k: fix use-after-free in ath9k_hif_usb_rx_cb" + }, + "CVE-2019-19241": { + "cmt_msg": "io_uring: async workers should inherit the user creds" + }, + "CVE-2022-21123": { + "cmt_msg": "x86/speculation/mmio: Add mitigation for Processor MMIO Stale Data" + }, + "CVE-2021-28688": { + "cmt_msg": "xen-blkback: don't leak persistent grants from xen_blkbk_map()" + }, + "CVE-2021-39686": { + "cmt_msg": "binder: use euid from cred instead of using task" + }, + "CVE-2021-39685": { + "cmt_msg": "USB: gadget: detect too-big endpoint 0 requests" + }, + "CVE-2023-6535": { + "cmt_msg": "" + }, + "CVE-2021-43975": { + "cmt_msg": "atlantic: Fix OOB read and write in hw_atl_utils_fw_rpc_wait" + }, + "CVE-2018-6927": { + "cmt_msg": "futex: Prevent overflow by strengthen input validation" + }, + "CVE-2020-0466": { + "cmt_msg": "do_epoll_ctl(): clean the failure exits up a bit" + }, + "CVE-2019-10207": { + "cmt_msg": "Bluetooth: hci_uart: check for missing tty operations" + }, + "CVE-2019-14835": { + "cmt_msg": "vhost: make sure log_num < in_num" + }, + "CVE-2023-0459": { + "cmt_msg": "uaccess: Add speculation barrier to copy_from_user()" + }, + "CVE-2023-0458": { + "cmt_msg": "prlimit: do_prlimit needs to have a speculation check" + }, + "CVE-2021-47086": { + "cmt_msg": "phonet/pep: refuse to enable an unbound pipe" + }, + "CVE-2018-1000204": { + "cmt_msg": "scsi: sg: allocate with __GFP_ZERO in sg_build_indirect()" + }, + "CVE-2023-0597": { + "cmt_msg": "x86/mm: Randomize per-cpu entry area" + }, + "CVE-2019-12379": { + "cmt_msg": "consolemap: Fix a memory leaking bug in drivers/tty/vt/consolemap.c" + }, + "CVE-2017-12134": { + "cmt_msg": "xen: fix bio vec merging" + }, + "CVE-2021-30002": { + "cmt_msg": "media: v4l: ioctl: Fix memory leak in video_usercopy" + }, + "CVE-2017-17450": { + "cmt_msg": "netfilter: xt_osf: Add missing permission checks" + }, + "CVE-2021-0941": { + "cmt_msg": "bpf: Remove MTU check in __bpf_skb_max_len" + }, + "CVE-2015-4176": { + "cmt_msg": "mnt: Update detach_mounts to leave mounts connected" + }, + "CVE-2016-3672": { + "cmt_msg": "x86/mm/32: Enable full randomization on i386 and X86_32" + }, + "CVE-2023-52515": { + "cmt_msg": "RDMA/srp: Do not call scsi_done() from srp_abort()" + }, + "CVE-2020-15802": { + "cmt_msg": "" + }, + "CVE-2024-26594": { + "cmt_msg": "ksmbd: validate mech token in session setup" + }, + "CVE-2023-4623": { + "cmt_msg": "net/sched: sch_hfsc: Ensure inner classes have fsc curve" + }, + "CVE-2017-18270": { + "cmt_msg": "KEYS: prevent creating a different user's keyrings" + }, + "CVE-2022-3636": { + "cmt_msg": "net: ethernet: mtk_eth_soc: use after free in __mtk_ppe_check_skb()" + }, + "CVE-2022-3635": { + "cmt_msg": "atm: idt77252: fix use-after-free bugs caused by tst_timer" + }, + "CVE-2022-0002": { + "cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE" + }, + "CVE-2023-5178": { + "cmt_msg": "nvmet-tcp: Fix a possible UAF in queue intialization setup" + }, + "CVE-2015-4178": { + "cmt_msg": "fs_pin: Allow for the possibility that m_list or s_list go unused." + }, + "CVE-2016-10906": { + "cmt_msg": "net: arc_emac: fix koops caused by sk_buff free" + }, + "CVE-2016-10905": { + "cmt_msg": "GFS2: don't set rgrp gl_object until it's inserted into rgrp tree" + }, + "CVE-2022-3202": { + "cmt_msg": "jfs: prevent NULL deref in diFree" + }, + "CVE-2021-47028": { + "cmt_msg": "mt76: mt7915: fix txrate reporting" + }, + "CVE-2021-47128": { + "cmt_msg": "bpf, lockdown, audit: Fix buggy SELinux lockdown permission checks" + }, + "CVE-2018-3646": { + "cmt_msg": "x86/microcode: Allow late microcode loading with SMT disabled" + }, + "CVE-2017-7518": { + "cmt_msg": "KVM: x86: fix singlestepping over syscall" + }, + "CVE-2024-24861": { + "cmt_msg": "media: xc4000: Fix atomicity violation in xc4000_get_frequency" + }, + "CVE-2019-11477": { + "cmt_msg": "tcp: limit payload size of sacked skbs" + }, + "CVE-2023-51043": { + "cmt_msg": "drm/atomic: Fix potential use-after-free in nonblocking commits" + }, + "CVE-2017-7895": { + "cmt_msg": "nfsd: stricter decoding of write-like NFSv2/v3 ops" + }, + "CVE-2021-46906": { + "cmt_msg": "HID: usbhid: fix info leak in hid_submit_ctrl" + }, + "CVE-2018-14614": { + "cmt_msg": "f2fs: fix to do sanity check with cp_pack_start_sum" + }, + "CVE-2019-11479": { + "cmt_msg": "tcp: add tcp_min_snd_mss sysctl" + }, + "CVE-2019-11478": { + "cmt_msg": "tcp: tcp_fragment() should apply sane memory limits" + }, + "CVE-2018-14611": { + "cmt_msg": "btrfs: validate type when reading a chunk" + }, + "CVE-2018-14610": { + "cmt_msg": "btrfs: Check that each block group has corresponding chunk at mount time" + }, + "CVE-2018-14613": { + "cmt_msg": "btrfs: tree-checker: Verify block_group_item" + }, + "CVE-2018-14612": { + "cmt_msg": "btrfs: tree-checker: Detect invalid and empty essential trees" + }, + "CVE-2020-26145": { + "cmt_msg": "ath10k: drop fragments with multicast DA for PCIe" + }, + "CVE-2017-13216": { + "cmt_msg": "staging: android: ashmem: fix a race condition in ASHMEM_SET_SIZE ioctl" + }, + "CVE-2017-13215": { + "cmt_msg": "crypto: algif_skcipher - Load TX SG list after waiting" + }, + "CVE-2018-5814": { + "cmt_msg": "usbip: usbip_host: fix NULL-ptr deref and use-after-free errors" + }, + "CVE-2020-26140": { + "cmt_msg": "" + }, + "CVE-2020-26143": { + "cmt_msg": "" + }, + "CVE-2020-26142": { + "cmt_msg": "" + }, + "CVE-2019-17053": { + "cmt_msg": "ieee802154: enforce CAP_NET_RAW for raw sockets" + }, + "CVE-2019-17052": { + "cmt_msg": "ax25: enforce CAP_NET_RAW for raw sockets" + }, + "CVE-2023-1077": { + "cmt_msg": "sched/rt: pick_next_rt_entity(): check list_entry" + }, + "CVE-2020-27418": { + "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region" + }, + "CVE-2019-17056": { + "cmt_msg": "nfc: enforce CAP_NET_RAW for raw sockets" + }, + "CVE-2019-17055": { + "cmt_msg": "mISDN: enforce CAP_NET_RAW for raw sockets" + }, + "CVE-2019-17054": { + "cmt_msg": "appletalk: enforce CAP_NET_RAW for raw sockets" + }, + "CVE-2018-13093": { + "cmt_msg": "xfs: validate cached inodes are free when allocated" + }, + "CVE-2024-26745": { + "cmt_msg": "powerpc/pseries/iommu: IOMMU table is not initialized for kdump over SR-IOV" + }, + "CVE-2023-51781": { + "cmt_msg": "appletalk: Fix Use-After-Free in atalk_ioctl" + }, + "CVE-2018-13096": { + "cmt_msg": "f2fs: fix to do sanity check with node footer and iblocks" + }, + "CVE-2018-13097": { + "cmt_msg": "f2fs: fix to do sanity check with user_block_count" + }, + "CVE-2018-13094": { + "cmt_msg": "xfs: don't call xfs_da_shrink_inode with NULL bp" + }, + "CVE-2018-13095": { + "cmt_msg": "xfs: More robust inode extent count validation" + }, + "CVE-2020-29661": { + "cmt_msg": "tty: Fix ->pgrp locking in tiocspgrp()" + }, + "CVE-2020-29660": { + "cmt_msg": "tty: Fix ->session locking" + }, + "CVE-2018-13098": { + "cmt_msg": "f2fs: fix to do sanity check with extra_attr feature" + }, + "CVE-2024-26748": { + "cmt_msg": "usb: cdns3: fix memory double free when handle zero packet" + }, + "CVE-2014-9717": { + "cmt_msg": "mnt: Update detach_mounts to leave mounts connected" + }, + "CVE-2023-28772": { + "cmt_msg": "seq_buf: Fix overflow in seq_buf_putmem_hex()" + }, + "CVE-2019-14895": { + "cmt_msg": "mwifiex: fix possible heap overflow in mwifiex_process_country_ie()" + }, + "CVE-2022-2588": { + "cmt_msg": "net_sched: cls_route: remove from list when handle is 0" + }, + "CVE-2019-11884": { + "cmt_msg": "Bluetooth: hidp: fix buffer overflow" + }, + "CVE-2015-8955": { + "cmt_msg": "arm64: perf: reject groups spanning multiple HW PMUs" + }, + "CVE-2019-19074": { + "cmt_msg": "ath9k: release allocated buffer if timed out" + }, + "CVE-2019-19073": { + "cmt_msg": "ath9k_htc: release allocated buffer if timed out" + }, + "CVE-2015-9016": { + "cmt_msg": "blk-mq: fix race between timeout and freeing request" + }, + "CVE-2015-8952": { + "cmt_msg": "ext2: convert to mbcache2" + }, + "CVE-2024-26699": { + "cmt_msg": "drm/amd/display: Fix array-index-out-of-bounds in dcn35_clkmgr" + }, + "CVE-2022-23038": { + "cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()" + }, + "CVE-2022-23039": { + "cmt_msg": "xen/gntalloc: don't use gnttab_query_foreign_access()" + }, + "CVE-2024-26691": { + "cmt_msg": "KVM: arm64: Fix circular locking dependency" + }, + "CVE-2021-27363": { + "cmt_msg": "scsi: iscsi: Restrict sessions and handles to admin capabilities" + }, + "CVE-2022-20158": { + "cmt_msg": "net/packet: fix slab-out-of-bounds access in packet_recvmsg()" + }, + "CVE-2022-23037": { + "cmt_msg": "xen/netfront: don't use gnttab_query_foreign_access() for mapped status" + }, + "CVE-2024-26697": { + "cmt_msg": "nilfs2: fix data corruption in dsync block recovery for small block sizes" + }, + "CVE-2020-0404": { + "cmt_msg": "media: uvcvideo: Avoid cyclic entity chains due to malformed USB descriptors" + }, + "CVE-2019-15927": { + "cmt_msg": "ALSA: usb-audio: Avoid access before bLength check in build_audio_procunit()" + }, + "CVE-2019-15926": { + "cmt_msg": "ath6kl: add some bounds checking" + }, + "CVE-2019-14821": { + "cmt_msg": "KVM: coalesced_mmio: add bounds checking" + }, + "CVE-2020-12826": { + "cmt_msg": "signal: Extend exec_id to 64bits" + }, + "CVE-2019-3701": { + "cmt_msg": "can: gw: ensure DLC boundaries after CAN frame modification" + }, + "CVE-2021-42008": { + "cmt_msg": "net: 6pack: fix slab-out-of-bounds in decode_data" + }, + "CVE-2022-44033": { + "cmt_msg": "char: pcmcia: remove all the drivers" + }, + "CVE-2024-26789": { + "cmt_msg": "crypto: arm64/neonbs - fix out-of-bounds access on short input" + }, + "CVE-2022-39188": { + "cmt_msg": "mmu_gather: Force tlb-flush VM_PFNMAP vmas" + }, + "CVE-2018-20511": { + "cmt_msg": "net/appletalk: fix minor pointer leak to userspace in SIOCFINDIPDDPRT" + }, + "CVE-2019-1125": { + "cmt_msg": "x86/speculation: Prepare entry code for Spectre v1 swapgs mitigations" + }, + "CVE-2019-15218": { + "cmt_msg": "media: usb: siano: Fix general protection fault in smsusb" + }, + "CVE-2020-25643": { + "cmt_msg": "hdlc_ppp: add range checks in ppp_cp_parse_cr()" + }, + "CVE-2005-3660": { + "cmt_msg": "" + }, + "CVE-2017-14106": { + "cmt_msg": "tcp: initialize rcv_mss to TCP_MIN_MSS instead of 0" + }, + "CVE-2019-15212": { + "cmt_msg": "USB: rio500: refuse more than one device at a time" + }, + "CVE-2023-31085": { + "cmt_msg": "ubi: Refuse attaching if mtd's erasesize is 0" + }, + "CVE-2023-31084": { + "cmt_msg": "media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*()" + }, + "CVE-2015-1350": { + "cmt_msg": "fs: Avoid premature clearing of capabilities" + }, + "CVE-2019-14896": { + "cmt_msg": "libertas: Fix two buffer overflows at parsing bss descriptor" + }, + "CVE-2017-1000380": { + "cmt_msg": "ALSA: timer: Fix race between read and ioctl" + }, + "CVE-2017-16538": { + "cmt_msg": "media: dvb-usb-v2: lmedm04: Improve logic checking of warm start" + }, + "CVE-2020-24588": { + "cmt_msg": "cfg80211: mitigate A-MSDU aggregation attacks" + }, + "CVE-2021-33034": { + "cmt_msg": "Bluetooth: verify AMP hci_chan before amp_destroy" + }, + "CVE-2019-19922": { + "cmt_msg": "sched/fair: Fix low cpu usage with high throttling by removing expiration of cpu-local slices" + }, + "CVE-2019-19927": { + "cmt_msg": "drm/ttm: fix incrementing the page pointer for huge pages" + }, + "CVE-2017-18509": { + "cmt_msg": "ipv6: check sk sk_type and protocol early in ip_mroute_set/getsockopt" + }, + "CVE-2020-27068": { + "cmt_msg": "cfg80211: add missing policy for NL80211_ATTR_STATUS_CODE" + }, + "CVE-2023-52528": { + "cmt_msg": "net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg" + }, + "CVE-2023-52640": { + "cmt_msg": "fs/ntfs3: Fix oob in ntfs_listxattr" + }, + "CVE-2020-8648": { + "cmt_msg": "vt: selection, close sel_buffer race" + }, + "CVE-2022-32296": { + "cmt_msg": "tcp: increase source port perturb table to 2^16" + }, + "CVE-2017-11600": { + "cmt_msg": "xfrm: policy: check policy direction value" + }, + "CVE-2023-3567": { + "cmt_msg": "vc_screen: move load of struct vc_data pointer in vcs_read() to avoid UAF" + }, + "CVE-2019-20806": { + "cmt_msg": "media: tw5864: Fix possible NULL pointer dereference in tw5864_handle_frame" + }, + "CVE-2023-3108": { + "cmt_msg": "crypto: fix af_alg_make_sg() conversion to iov_iter" + }, + "CVE-2022-3028": { + "cmt_msg": "af_key: Do not call xfrm_probe_algs in parallel" + }, + "CVE-2020-0305": { + "cmt_msg": "chardev: Avoid potential use-after-free in 'chrdev_open()'" + }, + "CVE-2020-14304": { + "cmt_msg": "" + }, + "CVE-2010-5321": { + "cmt_msg": "" + }, + "CVE-2020-15393": { + "cmt_msg": "usb: usbtest: fix missing kfree(dev->buf) in usbtest_disconnect" + }, + "CVE-2022-33981": { + "cmt_msg": "floppy: disable FDRAWCMD by default" + }, + "CVE-2021-3564": { + "cmt_msg": "Bluetooth: fix the erroneous flush_work() order" + }, + "CVE-2019-9506": { + "cmt_msg": "Bluetooth: Fix faulty expression for minimum encryption key size check" + }, + "CVE-2023-1476": { + "cmt_msg": "" + }, + "CVE-2017-16995": { + "cmt_msg": "bpf: fix incorrect sign extension in check_alu_op()" + }, + "CVE-2019-18675": { + "cmt_msg": "mmap: introduce sane default mmap limits" + }, + "CVE-2019-2025": { + "cmt_msg": "binder: fix race that allows malicious free of live buffer" + }, + "CVE-2024-26625": { + "cmt_msg": "llc: call sock_orphan() at release time" + }, + "CVE-2020-26560": { + "cmt_msg": "" + }, + "CVE-2023-4134": { + "cmt_msg": "Input: cyttsp4_core - change del_timer_sync() to timer_shutdown_sync()" + }, + "CVE-2023-39198": { + "cmt_msg": "drm/qxl: fix UAF on handle creation" + }, + "CVE-2017-13080": { + "cmt_msg": "mac80211: accept key reinstall without changing anything" + }, + "CVE-2021-20321": { + "cmt_msg": "ovl: fix missing negative dentry check in ovl_rename()" + }, + "CVE-2018-12127": { + "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" + }, + "CVE-2018-12126": { + "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" + }, + "CVE-2024-26651": { + "cmt_msg": "sr9800: Add check for usbnet_get_endpoints" + }, + "CVE-2022-1048": { + "cmt_msg": "ALSA: pcm: Fix races among concurrent hw_params and hw_free calls" + }, + "CVE-2017-9077": { + "cmt_msg": "ipv6/dccp: do not inherit ipv6_mc_list from parent" + }, + "CVE-2017-9076": { + "cmt_msg": "ipv6/dccp: do not inherit ipv6_mc_list from parent" + }, + "CVE-2017-9075": { + "cmt_msg": "sctp: do not inherit ipv6_{mc|ac|fl}_list from parent" + }, + "CVE-2017-9074": { + "cmt_msg": "ipv6: Prevent overrun when parsing v6 header options" + }, + "CVE-2022-20572": { + "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag" + }, + "CVE-2018-10021": { + "cmt_msg": "scsi: libsas: defer ata device eh commands to libata" + }, + "CVE-2022-20132": { + "cmt_msg": "HID: add hid_is_usb() function to make it simpler for USB detection" + }, + "CVE-2024-26675": { + "cmt_msg": "ppp_async: limit MRU to 64K" + }, + "CVE-2020-0067": { + "cmt_msg": "f2fs: fix to avoid memory leakage in f2fs_listxattr" + }, + "CVE-2023-52489": { + "cmt_msg": "mm/sparsemem: fix race in accessing memory_section->usage" + }, + "CVE-2019-10126": { + "cmt_msg": "mwifiex: Fix heap overflow in mwifiex_uap_parse_tail_ies()" + }, + "CVE-2019-13631": { + "cmt_msg": "Input: gtco - bounds check collection indent level" + }, + "CVE-2023-52584": { + "cmt_msg": "spmi: mediatek: Fix UAF on device remove" + }, + "CVE-2020-13974": { + "cmt_msg": "vt: keyboard: avoid signed integer overflow in k_ascii" + }, + "CVE-2016-6213": { + "cmt_msg": "mnt: Add a per mount namespace limit on the number of mounts" + }, + "CVE-2021-4083": { + "cmt_msg": "fget: check that the fd still exists after getting a ref to it" + }, + "CVE-2022-28356": { + "cmt_msg": "llc: fix netdevice reference leaks in llc_ui_bind()" + }, + "CVE-2023-33288": { + "cmt_msg": "power: supply: bq24190: Fix use after free bug in bq24190_remove due to race condition" + }, + "CVE-2017-17558": { + "cmt_msg": "USB: core: prevent malicious bNumInterfaces overflow" + }, + "CVE-2017-1000251": { + "cmt_msg": "Bluetooth: Properly check L2CAP config option output buffer length" + }, + "CVE-2022-29900": { + "cmt_msg": "x86/kvm/vmx: Make noinstr clean" + }, + "CVE-2022-29901": { + "cmt_msg": "x86/kvm/vmx: Make noinstr clean" + }, + "CVE-2017-8106": { + "cmt_msg": "KVM: nVMX: Don't advertise single context invalidation for invept" + }, + "CVE-2023-3161": { + "cmt_msg": "fbcon: Check font dimension limits" + }, + "CVE-2020-10751": { + "cmt_msg": "selinux: properly handle multiple messages in selinux_netlink_send()" + }, + "CVE-2022-3567": { + "cmt_msg": "ipv6: Fix data races around sk->sk_prot." + }, + "CVE-2021-4002": { + "cmt_msg": "hugetlbfs: flush TLBs correctly after huge_pmd_unshare" + }, + "CVE-2018-9465": { + "cmt_msg": "binder: fix proc->files use-after-free" + }, + "CVE-2018-20510": { + "cmt_msg": "binder: replace \"%p\" with \"%pK\"" + }, + "CVE-2020-15437": { + "cmt_msg": "serial: 8250: fix null-ptr-deref in serial8250_start_tx()" + }, + "CVE-2020-15436": { + "cmt_msg": "block: Fix use-after-free in blkdev_get()" + }, + "CVE-2022-1116": { + "cmt_msg": "" + }, + "CVE-2021-28660": { + "cmt_msg": "staging: rtl8188eu: prevent ->ssid overflow in rtw_wx_set_scan()" + }, + "CVE-2024-0775": { + "cmt_msg": "ext4: improve error recovery code paths in __ext4_remount()" + }, + "CVE-2020-8647": { + "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region" + }, + "CVE-2022-3564": { + "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free caused by l2cap_reassemble_sdu" + }, + "CVE-2022-23816": { + "cmt_msg": "x86/kvm/vmx: Make noinstr clean" + }, + "CVE-2019-0154": { + "cmt_msg": "drm/i915: Lower RM timeout to avoid DSI hard hangs" + }, + "CVE-2023-52481": { + "cmt_msg": "arm64: errata: Add Cortex-A520 speculative unprivileged load workaround" + }, + "CVE-2023-52585": { + "cmt_msg": "drm/amdgpu: Fix possible NULL dereference in amdgpu_ras_query_error_status_helper()" + }, + "CVE-2021-47145": { + "cmt_msg": "btrfs: do not BUG_ON in link_to_fixup_dir" + }, + "CVE-2023-52587": { + "cmt_msg": "IB/ipoib: Fix mcast list locking" + }, + "CVE-2023-52586": { + "cmt_msg": "drm/msm/dpu: Add mutex lock in control vblank irq" + }, + "CVE-2021-47149": { + "cmt_msg": "net: fujitsu: fix potential null-ptr-deref" + }, + "CVE-2022-3566": { + "cmt_msg": "tcp: Fix data races around icsk->icsk_af_ops." + }, + "CVE-2014-9922": { + "cmt_msg": "fs: limit filesystem stacking depth" + }, + "CVE-2021-47065": { + "cmt_msg": "rtw88: Fix array overrun in rtw_get_tx_power_params()" + }, + "CVE-2020-36386": { + "cmt_msg": "Bluetooth: Fix slab-out-of-bounds read in hci_extended_inquiry_result_evt()" + }, + "CVE-2021-47144": { + "cmt_msg": "drm/amd/amdgpu: fix refcount leak" + }, + "CVE-2021-47147": { + "cmt_msg": "ptp: ocp: Fix a resource leak in an error handling path" + }, + "CVE-2020-36385": { + "cmt_msg": "RDMA/ucma: Rework ucma_migrate_id() to avoid races with destroy" + }, + "CVE-2023-52589": { + "cmt_msg": "media: rkisp1: Fix IRQ disable race issue" + }, + "CVE-2021-47140": { + "cmt_msg": "iommu/amd: Clear DMA ops when switching domain" + }, + "CVE-2021-47143": { + "cmt_msg": "net/smc: remove device from smcd_dev_list after failed device_add()" + }, + "CVE-2021-47142": { + "cmt_msg": "drm/amdgpu: Fix a use-after-free" + }, + "CVE-2021-47146": { + "cmt_msg": "mld: fix panic in mld_newpack()" + }, + "CVE-2020-0009": { + "cmt_msg": "staging: android: ashmem: Disallow ashmem memory from being remapped" + }, + "CVE-2023-52340": { + "cmt_msg": "ipv6: remove max_size check inline with ipv4" + }, + "CVE-2023-31082": { + "cmt_msg": "" + }, + "CVE-2018-7480": { + "cmt_msg": "blkcg: fix double free of new_blkg in blkcg_init_queue" + }, + "CVE-2023-52588": { + "cmt_msg": "f2fs: fix to tag gcing flag on page during block migration" + }, + "CVE-2019-14615": { + "cmt_msg": "drm/i915/gen9: Clear residual context state on context switch" + }, + "CVE-2022-2503": { + "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag" + }, + "CVE-2023-52578": { + "cmt_msg": "net: bridge: use DEV_STATS_INC()" + }, + "CVE-2024-26764": { + "cmt_msg": "fs/aio: Restrict kiocb_set_cancel_fn() to I/O submitted via libaio" + }, + "CVE-2016-3139": { + "cmt_msg": "Input: wacom - compute the HID report size to get the actual packet size" + }, + "CVE-2023-0030": { + "cmt_msg": "drm/nouveau/mmu: add more general vmm free/node handling functions" + }, + "CVE-2020-16120": { + "cmt_msg": "ovl: switch to mounter creds in readdir" + }, + "CVE-2019-11599": { + "cmt_msg": "coredump: fix race condition between mmget_not_zero()/get_task_mm() and core dumping" + }, + "CVE-2018-16658": { + "cmt_msg": "cdrom: Fix info leak/OOB read in cdrom_ioctl_drive_status" + }, + "CVE-2018-15572": { + "cmt_msg": "x86/speculation: Protect against userspace-userspace spectreRSB" + }, + "CVE-2024-26777": { + "cmt_msg": "fbdev: sis: Error out if pixclock equals zero" + }, + "CVE-2022-1204": { + "cmt_msg": "ax25: Fix refcount leaks caused by ax25_cb_del()" + }, + "CVE-2019-2101": { + "cmt_msg": "media: uvcvideo: Fix 'type' check leading to overflow" + }, + "CVE-2019-17666": { + "cmt_msg": "rtlwifi: Fix potential overflow on P2P code" + }, + "CVE-2016-10723": { + "cmt_msg": "mm, oom: remove sleep from under oom_lock" + }, + "CVE-2021-3573": { + "cmt_msg": "Bluetooth: use correct lock to prevent UAF of hdev object" + }, + "CVE-2020-25212": { + "cmt_msg": "nfs: Fix getxattr kernel panic and memory overflow" + }, + "CVE-2019-19036": { + "cmt_msg": "btrfs: Detect unbalanced tree with empty leaf before crashing btree operations" + }, + "CVE-2019-3459": { + "cmt_msg": "Bluetooth: Verify that l2cap_get_conf_opt provides large enough buffer" + }, + "CVE-2020-11494": { + "cmt_msg": "slcan: Don't transmit uninitialized stack data in padding" + }, + "CVE-2017-8797": { + "cmt_msg": "nfsd: fix undefined behavior in nfsd4_layout_verify" + }, + "CVE-2023-6270": { + "cmt_msg": "aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts" + }, + "CVE-2018-10675": { + "cmt_msg": "mm/mempolicy: fix use after free when calling get_mempolicy" + }, + "CVE-2017-16526": { + "cmt_msg": "uwb: properly check kthread_run return value" + }, + "CVE-2017-16527": { + "cmt_msg": "ALSA: usb-audio: Kill stray URB at exiting" + }, + "CVE-2021-47125": { + "cmt_msg": "sch_htb: fix refcount leak in htb_parent_to_leaf_offload" + }, + "CVE-2017-16525": { + "cmt_msg": "USB: serial: console: fix use-after-free after failed setup" + }, + "CVE-2018-12233": { + "cmt_msg": "jfs: Fix inconsistency between memory allocation and ea_buf->max_size" + }, + "CVE-2022-3565": { + "cmt_msg": "mISDN: fix use-after-free bugs in l1oip timer handlers" + }, + "CVE-2024-26793": { + "cmt_msg": "gtp: fix use-after-free and null-ptr-deref in gtp_newlink()" + }, + "CVE-2021-32078": { + "cmt_msg": "ARM: footbridge: remove personal server platform" + }, + "CVE-2014-1874": { + "cmt_msg": "SELinux: Fix kernel BUG on empty security contexts." + }, + "CVE-2024-26798": { + "cmt_msg": "fbcon: always restore the old font data in fbcon_do_set_font()" + }, + "CVE-2022-20148": { + "cmt_msg": "f2fs: fix UAF in f2fs_available_free_memory" + }, + "CVE-2017-16528": { + "cmt_msg": "ALSA: seq: Cancel pending autoload work at unbinding device" + }, + "CVE-2017-16529": { + "cmt_msg": "ALSA: usb-audio: Check out-of-bounds access by corrupted buffer descriptor" + }, + "CVE-2019-11833": { + "cmt_msg": "ext4: zero out the unused memory region in the extent tree block" + }, + "CVE-2021-38205": { + "cmt_msg": "net: xilinx_emaclite: Do not print real IOMEM pointer" + }, + "CVE-2021-3864": { + "cmt_msg": "" + }, + "CVE-2020-0255": { + "cmt_msg": "selinux: properly handle multiple messages in selinux_netlink_send()" + }, + "CVE-2019-2215": { + "cmt_msg": "ANDROID: binder: remove waitqueue when thread exits." + }, + "CVE-2024-26769": { + "cmt_msg": "nvmet-fc: avoid deadlock on delete association path" + }, + "CVE-2021-38208": { + "cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect" + }, + "CVE-2017-18232": { + "cmt_msg": "scsi: libsas: direct call probe and destruct" + }, + "CVE-2019-2213": { + "cmt_msg": "binder: fix possible UAF when freeing buffer" + }, + "CVE-2024-26677": { + "cmt_msg": "rxrpc: Fix delayed ACKs to not set the reference serial number" + }, + "CVE-2020-25211": { + "cmt_msg": "netfilter: ctnetlink: add a range check for l3/l4 protonum" + }, + "CVE-2017-14140": { + "cmt_msg": "Sanitize 'move_pages()' permission checks" + }, + "CVE-2020-26556": { + "cmt_msg": "" + }, + "CVE-2018-9518": { + "cmt_msg": "NFC: llcp: Limit size of SDP URI" + }, + "CVE-2024-26671": { + "cmt_msg": "blk-mq: fix IO hang from sbitmap wakeup race" + }, + "CVE-2020-26555": { + "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical" + }, + "CVE-2024-26776": { + "cmt_msg": "spi: hisi-sfc-v3xx: Return IRQ_NONE if no interrupts were detected" + }, + "CVE-2023-52479": { + "cmt_msg": "ksmbd: fix uaf in smb20_oplock_break_ack" + }, + "CVE-2018-9517": { + "cmt_msg": "l2tp: pass tunnel pointer to ->session_create()" + }, + "CVE-2018-9516": { + "cmt_msg": "HID: debug: check length before copy_to_user()" + }, + "CVE-2023-3397": { + "cmt_msg": "" + }, + "CVE-2020-36775": { + "cmt_msg": "f2fs: fix to avoid potential deadlock" + }, + "CVE-2024-26770": { + "cmt_msg": "HID: nvidia-shield: Add missing null pointer checks to LED initialization" + }, + "CVE-2023-52478": { + "cmt_msg": "HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect" + }, + "CVE-2018-1128": { + "cmt_msg": "libceph: add authorizer challenge" + }, + "CVE-2018-1129": { + "cmt_msg": "libceph: implement CEPHX_V2 calculation mode" + }, + "CVE-2021-47083": { + "cmt_msg": "pinctrl: mediatek: fix global-out-of-bounds issue" + }, + "CVE-2018-1087": { + "cmt_msg": "kvm/x86: fix icebp instruction handling" + }, + "CVE-2022-26365": { + "cmt_msg": "xen/blkfront: fix leaking data in shared pages" + }, + "CVE-2023-52458": { + "cmt_msg": "block: add check that partition length needs to be aligned with block size" + }, + "CVE-2018-1120": { + "cmt_msg": "proc: do not access cmdline nor environ from file-backed areas" + }, + "CVE-2018-1121": { + "cmt_msg": "" + }, + "CVE-2023-28746": { + "cmt_msg": "x86/mmio: Disable KVM mitigation when X86_FEATURE_CLEAR_CPU_BUF is set" + }, + "CVE-2017-5754": { + "cmt_msg": "x86/cpufeatures: Add Intel feature bits for Speculation Control" + }, + "CVE-2021-47119": { + "cmt_msg": "ext4: fix memory leak in ext4_fill_super" + }, + "CVE-2017-5753": { + "cmt_msg": "x86/cpufeatures: Add X86_BUG_SPECTRE_V[12]" + }, + "CVE-2022-2961": { + "cmt_msg": "" + }, + "CVE-2022-20369": { + "cmt_msg": "media: v4l2-mem2mem: Apply DST_QUEUE_OFF_BASE on MMAP buffers across ioctls" + }, + "CVE-2024-22386": { + "cmt_msg": "" + }, + "CVE-2019-9466": { + "cmt_msg": "brcmfmac: add subtype check for event handling in data path" + }, + "CVE-2020-11565": { + "cmt_msg": "mm: mempolicy: require at least one nodeid for MPOL_PREFERRED" + }, + "CVE-2022-3344": { + "cmt_msg": "KVM: x86: nSVM: harden svm_free_nested against freeing vmcb02 while still in use" + }, + "CVE-2018-9568": { + "cmt_msg": "net: Set sk_prot_creator when cloning sockets to the right proto" + }, + "CVE-2018-13053": { + "cmt_msg": "alarmtimer: Prevent overflow for relative nanosleep" + }, + "CVE-2020-27786": { + "cmt_msg": "ALSA: rawmidi: Fix racy buffer resize under concurrent accesses" + }, + "CVE-2019-14816": { + "cmt_msg": "mwifiex: Fix three heap overflow at parsing element in cfg80211_ap_settings" + }, + "CVE-2019-14814": { + "cmt_msg": "mwifiex: Fix three heap overflow at parsing element in cfg80211_ap_settings" + }, + "CVE-2023-51780": { + "cmt_msg": "atm: Fix Use-After-Free in do_vcc_ioctl" + }, + "CVE-2024-26706": { + "cmt_msg": "parisc: Fix random data corruption from exception handler" + }, + "CVE-2023-6240": { + "cmt_msg": "" + }, + "CVE-2023-23559": { + "cmt_msg": "wifi: rndis_wlan: Prevent buffer overflow in rndis_query_oid" + }, + "CVE-2022-39842": { + "cmt_msg": "video: fbdev: pxa3xx-gcu: Fix integer overflow in pxa3xx_gcu_write" + }, + "CVE-2020-14351": { + "cmt_msg": "perf/core: Fix race in the perf_mmap_close() function" + }, + "CVE-2024-26739": { + "cmt_msg": "net/sched: act_mirred: don't override retval if we already lost the skb" + }, + "CVE-2022-0382": { + "cmt_msg": "net ticp:fix a kernel-infoleak in __tipc_sendmsg()" + }, + "CVE-2019-9456": { + "cmt_msg": "usb: usbmon: Read text within supplied buffer size" + }, + "CVE-2023-32233": { + "cmt_msg": "netfilter: nf_tables: deactivate anonymous set from preparation phase" + }, + "CVE-2024-26685": { + "cmt_msg": "nilfs2: fix potential bug in end_buffer_async_write" + }, + "CVE-2020-25672": { + "cmt_msg": "nfc: fix memory leak in llcp_sock_connect()" + }, + "CVE-2020-14353": { + "cmt_msg": "KEYS: prevent creating a different user's keyrings" + }, + "CVE-2020-25670": { + "cmt_msg": "nfc: fix refcount leak in llcp_sock_bind()" + }, + "CVE-2020-25671": { + "cmt_msg": "nfc: fix refcount leak in llcp_sock_connect()" + }, + "CVE-2018-21008": { + "cmt_msg": "rsi: add fix for crash during assertions" + }, + "CVE-2019-15223": { + "cmt_msg": "ALSA: line6: Assure canceling delayed work at disconnection" + }, + "CVE-2019-15220": { + "cmt_msg": "p54usb: Fix race between disconnect and firmware loading" + }, + "CVE-2019-15221": { + "cmt_msg": "ALSA: line6: Fix write on zero-sized buffer" + }, + "CVE-2019-19814": { + "cmt_msg": "" + }, + "CVE-2020-29371": { + "cmt_msg": "romfs: fix uninitialized memory leak in romfs_dev_read()" + }, + "CVE-2019-19816": { + "cmt_msg": "btrfs: inode: Verify inode mode to avoid NULL pointer dereference" + }, + "CVE-2017-16939": { + "cmt_msg": "ipsec: Fix aborted xfrm policy dump crash" + }, + "CVE-2019-9453": { + "cmt_msg": "f2fs: fix to avoid accessing xattr across the boundary" + }, + "CVE-2021-47124": { + "cmt_msg": "io_uring: fix link timeout refs" + }, + "CVE-2018-18710": { + "cmt_msg": "cdrom: fix improper type cast, which can leat to information leak." + }, + "CVE-2019-5108": { + "cmt_msg": "mac80211: Do not send Layer 2 Update frame before authorization" + }, + "CVE-2022-1012": { + "cmt_msg": "secure_seq: use the 64 bits of the siphash for port offset calculation" + }, + "CVE-2023-31436": { + "cmt_msg": "net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg" + }, + "CVE-2020-12114": { + "cmt_msg": "make struct mountpoint bear the dentry reference to mountpoint, not struct mount" + }, + "CVE-2023-52622": { + "cmt_msg": "ext4: avoid online resizing failures due to oversized flex bg" + }, + "CVE-2020-8649": { + "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region" + }, + "CVE-2023-52624": { + "cmt_msg": "drm/amd/display: Wake DMCUB before executing GPINT commands" + }, + "CVE-2023-52625": { + "cmt_msg": "drm/amd/display: Refactor DMCUB enter/exit idle interface" + }, + "CVE-2023-52527": { + "cmt_msg": "ipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data()" + }, + "CVE-2020-12656": { + "cmt_msg": "sunrpc: check that domain table is empty at module unload." + }, + "CVE-2017-1000405": { + "cmt_msg": "mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d()" + }, + "CVE-2021-26930": { + "cmt_msg": "xen-blkback: fix error handling in xen_blkbk_map()" + }, + "CVE-2017-1000407": { + "cmt_msg": "KVM: VMX: remove I/O port 0x80 bypass on Intel hosts" + }, + "CVE-2021-26932": { + "cmt_msg": "Xen/x86: don't bail early from clear_foreign_p2m_mapping()" + }, + "CVE-2024-25740": { + "cmt_msg": "" + }, + "CVE-2023-3141": { + "cmt_msg": "memstick: r592: Fix UAF bug in r592_remove due to race condition" + }, + "CVE-2023-37454": { + "cmt_msg": "" + }, + "CVE-2019-13648": { + "cmt_msg": "powerpc/tm: Fix oops on sigreturn on systems without TM" + }, + "CVE-2022-0492": { + "cmt_msg": "cgroup-v1: Require capabilities to set release_agent" + }, + "CVE-2020-12352": { + "cmt_msg": "Bluetooth: A2MP: Fix not initializing all members" + }, + "CVE-2014-4943": { + "cmt_msg": "net/l2tp: don't fall back on UDP [get|set]sockopt" + }, + "CVE-2022-23042": { + "cmt_msg": "xen/netfront: react properly to failing gnttab_end_foreign_access_ref()" + }, + "CVE-2021-43976": { + "cmt_msg": "mwifiex: Fix skb_over_panic in mwifiex_usb_recv()" + }, + "CVE-2022-0494": { + "cmt_msg": "block-map: add __GFP_ZERO flag for alloc_page in function bio_copy_kern" + }, + "CVE-2021-26931": { + "cmt_msg": "xen-blkback: don't \"handle\" error by BUG()" + }, + "CVE-2022-3524": { + "cmt_msg": "tcp/udp: Fix memory leak in ipv6_renew_options()." + }, + "CVE-2022-3523": { + "cmt_msg": "mm/memory.c: fix race when faulting a device private page" + }, + "CVE-2022-3522": { + "cmt_msg": "mm/hugetlb: use hugetlb_pte_stable in migration race check" + }, + "CVE-2008-2544": { + "cmt_msg": "" + }, + "CVE-2021-3178": { + "cmt_msg": "nfsd4: readdirplus shouldn't return parent of export" + }, + "CVE-2021-47101": { + "cmt_msg": "asix: fix uninit-value in asix_mdio_read()" + }, + "CVE-2020-10690": { + "cmt_msg": "ptp: fix the race between the release of ptp_clock and cdev" + }, + "CVE-2021-47103": { + "cmt_msg": "inet: fully convert sk->sk_rx_dst to RCU rules" + }, + "CVE-2018-7755": { + "cmt_msg": "floppy: Do not copy a kernel pointer to user memory in FDGETPRM ioctl" + }, + "CVE-2018-7754": { + "cmt_msg": "printk: hash addresses printed with %p" + }, + "CVE-2018-7757": { + "cmt_msg": "scsi: libsas: fix memory leak in sas_smp_get_phy_events()" + }, + "CVE-2023-7192": { + "cmt_msg": "netfilter: ctnetlink: fix possible refcount leak in ctnetlink_create_conntrack()" + }, + "CVE-2022-0330": { + "cmt_msg": "drm/i915: Flush TLBs before releasing backing store" + }, + "CVE-2007-3719": { + "cmt_msg": "" + }, + "CVE-2023-3863": { + "cmt_msg": "net: nfc: Fix use-after-free caused by nfc_llcp_find_local" + }, + "CVE-2024-26606": { + "cmt_msg": "binder: signal epoll threads of self-work" + }, + "CVE-2023-0590": { + "cmt_msg": "net: sched: fix race condition in qdisc_graft()" + }, + "CVE-2023-52583": { + "cmt_msg": "ceph: fix deadlock or deadcode of misusing dget()" + }, + "CVE-2022-4095": { + "cmt_msg": "staging: rtl8712: fix use after free bugs" + }, + "CVE-2017-10911": { + "cmt_msg": "xen-blkback: don't leak stack data via response ring" + }, + "CVE-2023-34255": { + "cmt_msg": "xfs: verify buffer contents when we skip log replay" + }, + "CVE-2022-45919": { + "cmt_msg": "media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221" + }, + "CVE-2019-19319": { + "cmt_msg": "ext4: protect journal inode's blocks using block_validity" + }, + "CVE-2023-2248": { + "cmt_msg": "net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg" + }, + "CVE-2017-18017": { + "cmt_msg": "netfilter: xt_TCPMSS: add more sanity tests on tcph->doff" + }, + "CVE-2022-24958": { + "cmt_msg": "usb: gadget: don't release an existing dev->buf" + }, + "CVE-2024-26676": { + "cmt_msg": "af_unix: Call kfree_skb() for dead unix_(sk)->oob_skb in GC." + }, + "CVE-2023-1611": { + "cmt_msg": "btrfs: fix race between quota disable and quota assign ioctls" + }, + "CVE-2021-3772": { + "cmt_msg": "sctp: use init_tag from inithdr for ABORT chunk" + }, + "CVE-2021-3679": { + "cmt_msg": "tracing: Fix bug in rb_per_cpu_empty() that might cause deadloop." + }, + "CVE-2021-37159": { + "cmt_msg": "usb: hso: fix error handling code of hso_create_net_device" + }, + "CVE-2023-52517": { + "cmt_msg": "spi: sun6i: fix race between DMA RX transfer completion and RX FIFO drain" + }, + "CVE-2022-3628": { + "cmt_msg": "wifi: brcmfmac: Fix potential buffer overflow in brcmf_fweh_event_worker()" + }, + "CVE-2022-3629": { + "cmt_msg": "vsock: Fix memory leak in vsock_connect()" + }, + "CVE-2021-34556": { + "cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4" + }, + "CVE-2021-28713": { + "cmt_msg": "xen/console: harden hvc_xen against event channel storms" + }, + "CVE-2021-28712": { + "cmt_msg": "xen/netfront: harden netfront against event channel storms" + }, + "CVE-2021-28711": { + "cmt_msg": "xen/blkfront: harden blkfront against event channel storms" + }, + "CVE-2022-1247": { + "cmt_msg": "" + }, + "CVE-2023-51782": { + "cmt_msg": "net/rose: Fix Use-After-Free in rose_ioctl" + }, + "CVE-2022-3621": { + "cmt_msg": "nilfs2: fix NULL pointer dereference at nilfs_bmap_lookup_at_level()" + }, + "CVE-2017-11473": { + "cmt_msg": "x86/acpi: Prevent out of bound access caused by broken ACPI tables" + }, + "CVE-2017-11472": { + "cmt_msg": "ACPICA: Namespace: fix operand cache leak" + }, + "CVE-2022-3624": { + "cmt_msg": "bonding: fix reference count leak in balance-alb mode" + }, + "CVE-2016-9120": { + "cmt_msg": "staging/android/ion : fix a race condition in the ion driver" + }, + "CVE-2021-39657": { + "cmt_msg": "scsi: ufs: Correct the LUN used in eh_device_reset_handler() callback" + }, + "CVE-2021-3669": { + "cmt_msg": "ipc: replace costly bailout check in sysvipc_find_ipc()" + }, + "CVE-2019-18885": { + "cmt_msg": "btrfs: merge btrfs_find_device and find_device" + }, + "CVE-2022-4744": { + "cmt_msg": "tun: avoid double free in tun_free_netdev" + }, + "CVE-2019-12378": { + "cmt_msg": "ipv6_sockglue: Fix a missing-check bug in ip6_ra_control()" + }, + "CVE-2019-11091": { + "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" + }, + "CVE-2022-4543": { + "cmt_msg": "" + }, + "CVE-2023-52571": { + "cmt_msg": "power: supply: rk817: Fix node refcount leak" + }, + "CVE-2023-52572": { + "cmt_msg": "cifs: Fix UAF in cifs_demultiplex_thread()" + }, + "CVE-2019-18660": { + "cmt_msg": "powerpc/book3s64: Fix link stack flush on context switch" + }, + "CVE-2023-4921": { + "cmt_msg": "net: sched: sch_qfq: Fix UAF in qfq_dequeue()" + }, + "CVE-2022-3424": { + "cmt_msg": "misc: sgi-gru: fix use-after-free error in gru_set_context_option, gru_fault and gru_handle_user_call_os" + }, + "CVE-2017-15649": { + "cmt_msg": "packet: in packet_do_bind, test fanout with bind_lock held" + }, + "CVE-2017-11089": { + "cmt_msg": "cfg80211: Define nla_policy for NL80211_ATTR_LOCAL_MESH_POWER_MODE" + }, + "CVE-2023-1829": { + "cmt_msg": "net/sched: Retire tcindex classifier" + }, + "CVE-2019-19227": { + "cmt_msg": "appletalk: Fix potential NULL pointer dereference in unregister_snap_client" + }, + "CVE-2021-34981": { + "cmt_msg": "Bluetooth: cmtp: fix file refcount when cmtp_attach_device fails" + }, + "CVE-2023-1670": { + "cmt_msg": "xirc2ps_cs: Fix use after free bug in xirc2ps_detach" + }, + "CVE-2017-14489": { + "cmt_msg": "scsi: scsi_transport_iscsi: fix the issue that iscsi_if_rx doesn't parse nlmsg properly" + }, + "CVE-2023-6915": { + "cmt_msg": "ida: Fix crash in ida_free when the bitmap is empty" + }, + "CVE-2016-5828": { + "cmt_msg": "powerpc/tm: Always reclaim in start_thread() for exec() class syscalls" + }, + "CVE-2023-30456": { + "cmt_msg": "KVM: nVMX: add missing consistency checks for CR0 and CR4" + }, + "CVE-2018-9422": { + "cmt_msg": "futex: Remove requirement for lock_page() in get_futex_key()" + }, + "CVE-2013-7445": { + "cmt_msg": "" + }, + "CVE-2022-3646": { + "cmt_msg": "nilfs2: fix leak of nilfs_root in case of writer thread creation failure" + }, + "CVE-2022-28390": { + "cmt_msg": "can: ems_usb: ems_usb_start_xmit(): fix double dev_kfree_skb() in error path" + }, + "CVE-2019-15292": { + "cmt_msg": "appletalk: Fix use-after-free in atalk_proc_exit" + }, + "CVE-2020-12652": { + "cmt_msg": "scsi: mptfusion: Fix double fetch bug in ioctl" + }, + "CVE-2022-45934": { + "cmt_msg": "Bluetooth: L2CAP: Fix u8 overflow" + }, + "CVE-2017-14340": { + "cmt_msg": "xfs: XFS_IS_REALTIME_INODE() should be false if no rt device present" + }, + "CVE-2017-15868": { + "cmt_msg": "Bluetooth: bnep: bnep_add_connection() should verify that it's dealing with l2cap socket" + }, + "CVE-2022-26966": { + "cmt_msg": "sr9700: sanity check for packet length" + }, + "CVE-2022-38096": { + "cmt_msg": "" + }, + "CVE-2021-34693": { + "cmt_msg": "can: bcm: fix infoleak in struct bcm_msg_head" + }, + "CVE-2023-52506": { + "cmt_msg": "LoongArch: Set all reserved memblocks on Node#0 at initialization" + }, + "CVE-2020-14381": { + "cmt_msg": "futex: Fix inode life-time issue" + }, + "CVE-2014-3180": { + "cmt_msg": "compat: nanosleep: Clarify error handling" + }, + "CVE-2019-19768": { + "cmt_msg": "blktrace: Protect q->blk_trace with RCU" + }, + "CVE-2022-3303": { + "cmt_msg": "ALSA: pcm: oss: Fix race at SNDCTL_DSP_SYNC" + }, + "CVE-2019-19039": { + "cmt_msg": "btrfs: Don't submit any btree write bio if the fs has errors" + }, + "CVE-2017-5715": { + "cmt_msg": "x86/cpufeatures: Add X86_BUG_SPECTRE_V[12]" + }, + "CVE-2022-20141": { + "cmt_msg": "igmp: Add ip_mc_list lock in ip_check_mc_rcu" + }, + "CVE-2023-23455": { + "cmt_msg": "net: sched: atm: dont intepret cls results when asked to drop" + }, + "CVE-2023-23454": { + "cmt_msg": "net: sched: cbq: dont intepret cls results when asked to drop" + }, + "CVE-2017-15116": { + "cmt_msg": "crypto: rng - Remove old low-level rng interface" + }, + "CVE-2023-52641": { + "cmt_msg": "fs/ntfs3: Add NULL ptr dereference checking at the end of attr_allocate_frame()" + }, + "CVE-2016-8632": { + "cmt_msg": "tipc: check minimum bearer MTU" + }, + "CVE-2018-3620": { + "cmt_msg": "x86/microcode: Allow late microcode loading with SMT disabled" + }, + "CVE-2023-6932": { + "cmt_msg": "ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet" + }, + "CVE-2019-3460": { + "cmt_msg": "Bluetooth: Check L2CAP option sizes returned from l2cap_get_conf_opt" + }, + "CVE-2018-8781": { + "cmt_msg": "drm: udl: Properly check framebuffer mmap offsets" + }, + "CVE-2021-29155": { + "cmt_msg": "bpf: Use correct permission flag for mixed signed bounds arithmetic" + }, + "CVE-2021-33631": { + "cmt_msg": "ext4: fix kernel BUG in 'ext4_write_inline_data_end()'" + }, + "CVE-2019-15916": { + "cmt_msg": "net-sysfs: Fix mem leak in netdev_register_kobject" + }, + "CVE-2019-15917": { + "cmt_msg": "Bluetooth: hci_ldisc: Postpone HCI_UART_PROTO_READY bit set in hci_uart_set_proto()" + }, + "CVE-2017-18344": { + "cmt_msg": "posix-timer: Properly check sigevent->sigev_notify" + }, + "CVE-2017-15115": { + "cmt_msg": "sctp: do not peel off an assoc from one netns to another one" + }, + "CVE-2017-15265": { + "cmt_msg": "ALSA: seq: Fix use-after-free at creating a port" + }, + "CVE-2024-26768": { + "cmt_msg": "LoongArch: Change acpi_core_pic[NR_CPUS] to acpi_core_pic[MAX_CORE_PIC]" + }, + "CVE-2020-12362": { + "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" + }, + "CVE-2020-12363": { + "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" + }, + "CVE-2019-12881": { + "cmt_msg": "drm/i915/userptr: reject zero user_size" + }, + "CVE-2022-4129": { + "cmt_msg": "l2tp: Serialize access to sk_user_data with sk_callback_lock" + }, + "CVE-2018-1000004": { + "cmt_msg": "ALSA: seq: Make ioctls race-free" + }, + "CVE-2023-52607": { + "cmt_msg": "powerpc/mm: Fix null-pointer dereference in pgtable_cache_add" + }, + "CVE-2024-26646": { + "cmt_msg": "thermal: intel: hfi: Add syscore callbacks for system-wide PM" + }, + "CVE-2018-18690": { + "cmt_msg": "xfs: don't fail when converting shortform attr to long form during ATTR_REPLACE" + }, + "CVE-2024-26644": { + "cmt_msg": "btrfs: don't abort filesystem when attempting to snapshot deleted subvolume" + }, + "CVE-2022-28388": { + "cmt_msg": "can: usb_8dev: usb_8dev_start_xmit(): fix double dev_kfree_skb() in error path" + }, + "CVE-2017-0627": { + "cmt_msg": "media: uvcvideo: Prevent heap overflow when accessing mapped controls" + }, + "CVE-2016-7915": { + "cmt_msg": "HID: core: prevent out-of-bound readings" + }, + "CVE-2021-3896": { + "cmt_msg": "isdn: cpai: check ctr->cnr to avoid array index out of bound" + }, + "CVE-2016-7917": { + "cmt_msg": "netfilter: nfnetlink: correctly validate length of batch messages" + }, + "CVE-2024-26797": { + "cmt_msg": "drm/amd/display: Prevent potential buffer overflow in map_hw_resources" + }, + "CVE-2024-26627": { + "cmt_msg": "scsi: core: Move scsi_host_busy() out of host lock for waking up EH handler" + }, + "CVE-2023-52519": { + "cmt_msg": "HID: intel-ish-hid: ipc: Disable and reenable ACPI GPE bit" + }, + "CVE-2023-52445": { + "cmt_msg": "media: pvrusb2: fix use after free on context disconnection" + }, + "CVE-2019-16232": { + "cmt_msg": "libertas: fix a potential NULL pointer dereference" + }, + "CVE-2022-1836": { + "cmt_msg": "floppy: disable FDRAWCMD by default" + }, + "CVE-2019-20811": { + "cmt_msg": "net-sysfs: call dev_hold if kobject_init_and_add success" + }, + "CVE-2019-20812": { + "cmt_msg": "af_packet: set defaule value for tmo" + }, + "CVE-2023-52600": { + "cmt_msg": "jfs: fix uaf in jfs_evict_inode" + }, + "CVE-2019-19530": { + "cmt_msg": "usb: cdc-acm: make sure a refcount is taken early enough" + }, + "CVE-2023-52601": { + "cmt_msg": "jfs: fix array-index-out-of-bounds in dbAdjTree" + }, + "CVE-2023-6040": { + "cmt_msg": "netfilter: nf_tables: Reject tables of unsupported family" + }, + "CVE-2018-25020": { + "cmt_msg": "bpf: fix truncated jump targets on heavy expansions" + }, + "CVE-2022-26373": { + "cmt_msg": "x86/speculation: Add RSB VM Exit protections" + }, + "CVE-2018-5995": { + "cmt_msg": "printk: hash addresses printed with %p" + }, + "CVE-2018-18386": { + "cmt_msg": "n_tty: fix EXTPROC vs ICANON interaction with TIOCINQ (aka FIONREAD)" + }, + "CVE-2019-15291": { + "cmt_msg": "media: b2c2-flexcop-usb: add sanity checking" + }, + "CVE-2019-15290": { + "cmt_msg": "" + }, + "CVE-2023-3212": { + "cmt_msg": "gfs2: Don't deref jdesc in evict" + }, + "CVE-2024-23848": { + "cmt_msg": "" + }, + "CVE-2021-46904": { + "cmt_msg": "net: hso: fix null-ptr-deref during tty device unregistration" + }, + "CVE-2024-26633": { + "cmt_msg": "ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim()" + }, + "CVE-2018-7273": { + "cmt_msg": "printk: hash addresses printed with %p" + }, + "CVE-2024-26778": { + "cmt_msg": "fbdev: savage: Error out if pixclock equals zero" + }, + "CVE-2023-4459": { + "cmt_msg": "net: vmxnet3: fix possible NULL pointer dereference in vmxnet3_rq_cleanup()" + }, + "CVE-2023-52532": { + "cmt_msg": "net: mana: Fix TX CQE error handling" + }, + "CVE-2024-26635": { + "cmt_msg": "llc: Drop support for ETH_P_TR_802_2." + }, + "CVE-2022-23036": { + "cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()" + }, + "CVE-2023-52639": { + "cmt_msg": "KVM: s390: vsie: fix race during shadow creation" + }, + "CVE-2022-2153": { + "cmt_msg": "KVM: x86: Avoid theoretical NULL pointer dereference in kvm_irq_delivery_to_apic_fast()" + }, + "CVE-2019-19531": { + "cmt_msg": "usb: yurex: Fix use-after-free in yurex_delete" + }, + "CVE-2024-2193": { + "cmt_msg": "" + }, + "CVE-2022-20566": { + "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free caused by l2cap_chan_put" + }, + "CVE-2018-12930": { + "cmt_msg": "" + }, + "CVE-2018-12931": { + "cmt_msg": "" + }, + "CVE-2022-20424": { + "cmt_msg": "io_uring: remove io_identity" + }, + "CVE-2024-23196": { + "cmt_msg": "ALSA: hda: fix a possible null-pointer dereference due to data race in snd_hdac_regmap_sync()" + }, + "CVE-2020-12769": { + "cmt_msg": "spi: spi-dw: Add lock protect dw_spi rx/tx to prevent concurrent calls" + }, + "CVE-2024-26765": { + "cmt_msg": "LoongArch: Disable IRQ before init_fn() for nonboot CPUs" + }, + "CVE-2017-8890": { + "cmt_msg": "dccp/tcp: do not inherit mc_list from parent" + }, + "CVE-2022-4662": { + "cmt_msg": "USB: core: Prevent nested device-reset calls" + }, + "CVE-2021-32399": { + "cmt_msg": "bluetooth: eliminate the potential race condition when removing the HCI controller" + }, + "CVE-2021-45868": { + "cmt_msg": "quota: check block number when reading the block in quota file" + }, + "CVE-2019-12380": { + "cmt_msg": "efi/x86/Add missing error handling to old_memmap 1:1 mapping code" + }, + "CVE-2019-12381": { + "cmt_msg": "ip_sockglue: Fix missing-check bug in ip_ra_control()" + }, + "CVE-2019-12382": { + "cmt_msg": "drm/edid: Fix a missing-check bug in drm_load_edid_firmware()" + }, + "CVE-2017-10810": { + "cmt_msg": "drm/virtio: don't leak bo on drm_gem_object_init failure" + }, + "CVE-2020-12364": { + "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" + }, + "CVE-2022-20166": { + "cmt_msg": "drivers core: Use sysfs_emit and sysfs_emit_at for show(device *...) functions" + }, + "CVE-2023-52633": { + "cmt_msg": "um: time-travel: fix time corruption" + }, + "CVE-2020-36780": { + "cmt_msg": "i2c: sprd: fix reference leak when pm_runtime_get_sync fails" + }, + "CVE-2020-36781": { + "cmt_msg": "i2c: imx: fix reference leak when pm_runtime_get_sync fails" + }, + "CVE-2024-26647": { + "cmt_msg": "drm/amd/display: Fix late derefrence 'dsc' check in 'link_set_dsc_pps_packet()'" + }, + "CVE-2024-26784": { + "cmt_msg": "pmdomain: arm: Fix NULL dereference on scmi_perf_domain removal" + }, + "CVE-2022-25375": { + "cmt_msg": "usb: gadget: rndis: check size of RNDIS_MSG_SET command" + }, + "CVE-2017-13167": { + "cmt_msg": "ALSA: timer: Fix race at concurrent reads" + }, + "CVE-2017-13166": { + "cmt_msg": "media: v4l2-ioctl.c: use check_fmt for enum/g/s/try_fmt" + }, + "CVE-2019-25160": { + "cmt_msg": "netlabel: fix out-of-bounds memory accesses" + }, + "CVE-2018-12207": { + "cmt_msg": "kvm: x86, powerpc: do not allow clearing largepages debugfs entry" + }, + "CVE-2017-1000364": { + "cmt_msg": "mm: larger stack guard gap, between vmas" + }, + "CVE-2017-1000365": { + "cmt_msg": "fs/exec.c: account for argv/envp pointers" + }, + "CVE-2020-13143": { + "cmt_msg": "USB: gadget: fix illegal array access in binding with UDC" + }, + "CVE-2020-10768": { + "cmt_msg": "x86/speculation: PR_SPEC_FORCE_DISABLE enforcement for indirect branches." + }, + "CVE-2017-13168": { + "cmt_msg": "scsi: sg: mitigate read/write abuse" + }, + "CVE-2017-1000363": { + "cmt_msg": "char: lp: fix possible integer overflow in lp_setup()" + }, + "CVE-2019-0148": { + "cmt_msg": "i40e: Wrong truncation from u16 to u8" + }, + "CVE-2022-2978": { + "cmt_msg": "fs: fix UAF/GPF bug in nilfs_mdt_destroy" + }, + "CVE-2019-17075": { + "cmt_msg": "RDMA/cxgb4: Do not dma memory off of the stack" + }, + "CVE-2014-7145": { + "cmt_msg": "[CIFS] Possible null ptr deref in SMB2_tcon" + }, + "CVE-2022-3903": { + "cmt_msg": "media: mceusb: Use new usb_control_msg_*() routines" + }, + "CVE-2022-23960": { + "cmt_msg": "ARM: report Spectre v2 status through sysfs" + }, + "CVE-2023-39189": { + "cmt_msg": "netfilter: nfnetlink_osf: avoid OOB read" + }, + "CVE-2023-20588": { + "cmt_msg": "x86/CPU/AMD: Do not leak quotient data after a division by 0" + }, + "CVE-2020-10942": { + "cmt_msg": "vhost: Check docket sk_family instead of call getname" + }, + "CVE-2018-3693": { + "cmt_msg": "ext4: fix spectre gadget in ext4_mb_regular_allocator()" + }, + "CVE-2017-15299": { + "cmt_msg": "KEYS: don't let add_key() update an uninstantiated key" + }, + "CVE-2017-0750": { + "cmt_msg": "f2fs: do more integrity verification for superblock" + }, + "CVE-2023-42752": { + "cmt_msg": "igmp: limit igmpv3_newpack() packet size to IP_MAX_MTU" + }, + "CVE-2023-3338": { + "cmt_msg": "Remove DECnet support from kernel" + }, + "CVE-2019-11190": { + "cmt_msg": "binfmt_elf: switch to new creds when switching to new mm" + }, + "CVE-2019-11191": { + "cmt_msg": "x86: Deprecate a.out support" + }, + "CVE-2021-47076": { + "cmt_msg": "RDMA/rxe: Return CQE error if invalid lkey was supplied" + }, + "CVE-2021-47136": { + "cmt_msg": "net: zero-initialize tc skb extension on allocation" + }, + "CVE-2021-47171": { + "cmt_msg": "net: usb: fix memory leak in smsc75xx_bind" + }, + "CVE-2021-47172": { + "cmt_msg": "iio: adc: ad7124: Fix potential overflow due to non sequential channel numbers" + }, + "CVE-2021-47173": { + "cmt_msg": "misc/uss720: fix memory leak in uss720_probe" + }, + "CVE-2022-36123": { + "cmt_msg": "x86: Clear .brk area at early boot" + }, + "CVE-2021-47175": { + "cmt_msg": "net/sched: fq_pie: fix OOB access in the traffic path" + }, + "CVE-2018-10323": { + "cmt_msg": "xfs: set format back to extents if xfs_bmap_extents_to_btree" + }, + "CVE-2018-10322": { + "cmt_msg": "xfs: enhance dinode verifier" + }, + "CVE-2021-46951": { + "cmt_msg": "tpm: efi: Use local variable for calculating final log size" + }, + "CVE-2021-46950": { + "cmt_msg": "md/raid1: properly indicate failure when ending a failed write request" + }, + "CVE-2021-46952": { + "cmt_msg": "NFS: fs_context: validate UDP retrans to prevent shift out-of-bounds" + }, + "CVE-2021-46908": { + "cmt_msg": "bpf: Use correct permission flag for mixed signed bounds arithmetic" + }, + "CVE-2021-46959": { + "cmt_msg": "spi: Fix use-after-free with devm_spi_alloc_*" + }, + "CVE-2017-8824": { + "cmt_msg": "dccp: CVE-2017-8824: use-after-free in DCCP code" + }, + "CVE-2018-7492": { + "cmt_msg": "rds: Fix NULL pointer dereference in __rds_rdma_map" + }, + "CVE-2020-26139": { + "cmt_msg": "mac80211: do not accept/forward invalid EAPOL frames" + }, + "CVE-2024-26772": { + "cmt_msg": "ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal()" + }, + "CVE-2019-10220": { + "cmt_msg": "Convert filldir[64]() from __put_user() to unsafe_put_user()" + }, + "CVE-2021-3609": { + "cmt_msg": "can: bcm: delay release of struct bcm_op after synchronize_rcu()" + }, + "CVE-2023-52595": { + "cmt_msg": "wifi: rt2x00: restart beacon queue when hardware reset" + }, + "CVE-2017-13305": { + "cmt_msg": "KEYS: encrypted: fix buffer overread in valid_master_desc()" + }, + "CVE-2017-13220": { + "cmt_msg": "Bluetooth: hidp_connection_add() unsafe use of l2cap_pi()" + }, + "CVE-2021-47137": { + "cmt_msg": "net: lantiq: fix memory corruption in RX ring" + }, + "CVE-2019-19536": { + "cmt_msg": "can: peak_usb: pcan_usb_pro: Fix info-leaks to USB devices" + }, + "CVE-2019-19537": { + "cmt_msg": "USB: core: Fix races in character device registration and deregistraion" + }, + "CVE-2019-19534": { + "cmt_msg": "can: peak_usb: fix slab info leak" + }, + "CVE-2019-19532": { + "cmt_msg": "HID: Fix assumption that devices have inputs" + }, + "CVE-2018-14617": { + "cmt_msg": "hfsplus: fix NULL dereference in hfsplus_lookup()" + }, + "CVE-2019-10638": { + "cmt_msg": "inet: switch IP ID generator to siphash" + }, + "CVE-2019-10639": { + "cmt_msg": "netns: provide pure entropy for net_hash_mix()" + }, + "CVE-2021-0929": { + "cmt_msg": "staging/android/ion: delete dma_buf->kmap/unmap implemenation" + }, + "CVE-2018-14616": { + "cmt_msg": "f2fs: fix to do sanity check with block address in main area v2" + }, + "CVE-2023-52590": { + "cmt_msg": "ocfs2: Avoid touching renamed directory if parent does not change" + }, + "CVE-2018-19985": { + "cmt_msg": "USB: hso: Fix OOB memory access in hso_probe/hso_get_config_data" + }, + "CVE-2018-6554": { + "cmt_msg": "staging: irda: remove the irda network stack and drivers" + }, + "CVE-2018-6555": { + "cmt_msg": "staging: irda: remove the irda network stack and drivers" + }, + "CVE-2023-6546": { + "cmt_msg": "tty: n_gsm: fix the UAF caused by race condition in gsm_cleanup_mux" + }, + "CVE-2017-18255": { + "cmt_msg": "perf/core: Fix the perf_cpu_time_max_percent check" + }, + "CVE-2018-5953": { + "cmt_msg": "printk: hash addresses printed with %p" + }, + "CVE-2024-26622": { + "cmt_msg": "tomoyo: fix UAF write bug in tomoyo_write_control()" + }, + "CVE-2020-28374": { + "cmt_msg": "scsi: target: Fix XCOPY NAA identifier lookup" + }, + "CVE-2019-9213": { + "cmt_msg": "mm: enforce min addr even if capable() in expand_downwards()" + }, + "CVE-2023-2007": { + "cmt_msg": "scsi: dpt_i2o: Remove obsolete driver" + }, + "CVE-2020-26557": { + "cmt_msg": "" + }, + "CVE-2017-16535": { + "cmt_msg": "USB: core: fix out-of-bounds access bug in usb_get_bos_descriptor()" + }, + "CVE-2019-14897": { + "cmt_msg": "libertas: Fix two buffer overflows at parsing bss descriptor" + }, + "CVE-2017-16537": { + "cmt_msg": "media: imon: Fix null-ptr-deref in imon_probe" + }, + "CVE-2017-16536": { + "cmt_msg": "[media] cx231xx-cards: fix NULL-deref on missing association descriptor" + }, + "CVE-2017-16531": { + "cmt_msg": "USB: fix out-of-bounds in usb_set_configuration" + }, + "CVE-2023-52522": { + "cmt_msg": "net: fix possible store tearing in neigh_periodic_work()" + }, + "CVE-2017-16533": { + "cmt_msg": "HID: usbhid: fix out-of-bounds bug" + }, + "CVE-2017-16532": { + "cmt_msg": "usb: usbtest: fix NULL pointer dereference" + }, + "CVE-2023-35824": { + "cmt_msg": "media: dm1105: Fix use after free bug in dm1105_remove due to race condition" + }, + "CVE-2024-26636": { + "cmt_msg": "llc: make llc_ui_sendmsg() more robust against bonding changes" + }, + "CVE-2024-26779": { + "cmt_msg": "wifi: mac80211: fix race condition on enabling fast-xmit" + }, + "CVE-2014-9419": { + "cmt_msg": "x86_64, switch_to(): Load TLS descriptors before switching DS and ES" + }, + "CVE-2023-3006": { + "cmt_msg": "arm64: Add AMPERE1 to the Spectre-BHB affected list" + }, + "CVE-2020-27825": { + "cmt_msg": "tracing: Fix race in trace_open and buffer resize call" + }, + "CVE-2019-2181": { + "cmt_msg": "binder: check for overflow when alloc for security context" + }, + "CVE-2020-27820": { + "cmt_msg": "drm/nouveau: use drm_dev_unplug() during device removal" + }, + "CVE-2023-0047": { + "cmt_msg": "mm, oom: do not trigger out_of_memory from the #PF" + }, + "CVE-2020-26141": { + "cmt_msg": "ath10k: Fix TKIP Michael MIC verification for PCIe" + }, + "CVE-2017-18221": { + "cmt_msg": "mlock: fix mlock count can not decrease in race condition" + }, + "CVE-2020-0066": { + "cmt_msg": "netlink: Trim skb to alloc size to avoid MSG_TRUNC" + }, + "CVE-2019-20794": { + "cmt_msg": "" + }, + "CVE-2023-39193": { + "cmt_msg": "netfilter: xt_sctp: validate the flag_info count" + }, + "CVE-2023-39192": { + "cmt_msg": "netfilter: xt_u32: validate user space input" + }, + "CVE-2020-26541": { + "cmt_msg": "certs: Add EFI_CERT_X509_GUID support for dbx entries" + }, + "CVE-2023-6610": { + "cmt_msg": "smb: client: fix potential OOB in smb2_dump_detail()" + }, + "CVE-2024-26600": { + "cmt_msg": "phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP" + }, + "CVE-2020-26559": { + "cmt_msg": "" + }, + "CVE-2021-20317": { + "cmt_msg": "lib/timerqueue: Rely on rbtree semantics for next timer" + }, + "CVE-2021-43389": { + "cmt_msg": "isdn: cpai: check ctr->cnr to avoid array index out of bound" + }, + "CVE-2017-14156": { + "cmt_msg": "video: fbdev: aty: do not leak uninitialized padding in clk to userspace" + }, + "CVE-2021-33061": { + "cmt_msg": "ixgbe: add improvement for MDD response functionality" + }, + "CVE-2024-26592": { + "cmt_msg": "ksmbd: fix UAF issue in ksmbd_tcp_new_connection()" + }, + "CVE-2024-26767": { + "cmt_msg": "drm/amd/display: fixed integer types and null check locations" + }, + "CVE-2024-26766": { + "cmt_msg": "IB/hfi1: Fix sdma.h tx->num_descs off-by-one error" + }, + "CVE-2024-26763": { + "cmt_msg": "dm-crypt: don't modify the data when using authenticated encryption" + }, + "CVE-2023-52618": { + "cmt_msg": "block/rnbd-srv: Check for unlikely string overflow" + }, + "CVE-2018-1092": { + "cmt_msg": "ext4: fail ext4_iget for root directory if unallocated" + }, + "CVE-2018-1093": { + "cmt_msg": "ext4: add validity checks for bitmap block numbers" + }, + "CVE-2017-18551": { + "cmt_msg": "i2c: core-smbus: prevent stack corruption on read I2C_BLOCK_DATA" + }, + "CVE-2023-1074": { + "cmt_msg": "sctp: fail if no bound addresses can be used for a given scope" + }, + "CVE-2017-18552": { + "cmt_msg": "RDS: validate the requested traces user input against max supported" + }, + "CVE-2024-25744": { + "cmt_msg": "x86/coco: Disable 32-bit emulation by default on TDX and SEV" + }, + "CVE-2015-8839": { + "cmt_msg": "ext4: fix races between page faults and hole punching" + }, + "CVE-2022-1652": { + "cmt_msg": "floppy: use a statically allocated error counter" + }, + "CVE-2024-26771": { + "cmt_msg": "dmaengine: ti: edma: Add some null pointer checks to the edma_probe" + }, + "CVE-2015-8830": { + "cmt_msg": "aio: lift iov_iter_init() into aio_setup_..._rw()" + }, + "CVE-2021-46932": { + "cmt_msg": "Input: appletouch - initialize work before device registration" + }, + "CVE-2019-9457": { + "cmt_msg": "exec: Limit arg stack to at most 75% of _STK_LIM" + }, + "CVE-2019-19054": { + "cmt_msg": "media: rc: prevent memory leak in cx23888_ir_probe" + }, + "CVE-2019-19057": { + "cmt_msg": "mwifiex: pcie: Fix memory leak in mwifiex_pcie_init_evt_ring" + }, + "CVE-2019-19056": { + "cmt_msg": "mwifiex: pcie: Fix memory leak in mwifiex_pcie_alloc_cmdrsp_buf" + }, + "CVE-2016-10741": { + "cmt_msg": "xfs: don't BUG() on mixed direct and mapped I/O" + }, + "CVE-2023-23039": { + "cmt_msg": "" + }, + "CVE-2023-20569": { + "cmt_msg": "x86/bugs: Increase the x86 bugs vector size to two u32s" + }, + "CVE-2019-3846": { + "cmt_msg": "mwifiex: Fix possible buffer overflows at parsing bss descriptor" + }, + "CVE-2023-46838": { + "cmt_msg": "xen-netback: don't produce zero-size SKB frags" + }, + "CVE-2020-0427": { + "cmt_msg": "pinctrl: devicetree: Avoid taking direct reference to device name string" + }, + "CVE-2021-47165": { + "cmt_msg": "drm/meson: fix shutdown crash when component not probed" + }, + "CVE-2019-9458": { + "cmt_msg": "media: v4l: event: Prevent freeing event subscriptions while accessed" + }, + "CVE-2023-39197": { + "cmt_msg": "netfilter: conntrack: dccp: copy entire header to stack buffer, not just basic one" + }, + "CVE-2017-9242": { + "cmt_msg": "ipv6: fix out of bound writes in __ip6_append_data()" + }, + "CVE-2020-14314": { + "cmt_msg": "ext4: fix potential negative array index in do_split()" + }, + "CVE-2019-13272": { + "cmt_msg": "ptrace: Fix ->ptracer_cred handling for PTRACE_TRACEME" + }, + "CVE-2021-3587": { + "cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect" + }, + "CVE-2023-45862": { + "cmt_msg": "USB: ene_usb6250: Allocate enough memory for full object" + }, + "CVE-2023-45863": { + "cmt_msg": "kobject: Fix slab-out-of-bounds in fill_kobj_path()" + }, + "CVE-2017-15537": { + "cmt_msg": "x86/fpu: Don't let userspace set bogus xcomp_bv" + }, + "CVE-2019-17351": { + "cmt_msg": "xen: let alloc_xenballooned_pages() fail if not enough memory free" + }, + "CVE-2022-23222": { + "cmt_msg": "bpf: Replace PTR_TO_XXX_OR_NULL with PTR_TO_XXX | PTR_MAYBE_NULL" + }, + "CVE-2020-25669": { + "cmt_msg": "Input: sunkbd - avoid use-after-free in teardown paths" + }, + "CVE-2020-25668": { + "cmt_msg": "tty: make FONTX ioctl use the tty pointer they were actually passed" + }, + "CVE-2008-4609": { + "cmt_msg": "" + }, + "CVE-2024-26738": { + "cmt_msg": "powerpc/pseries/iommu: DLPAR add doesn't completely initialize pci_controller" + }, + "CVE-2023-40283": { + "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb" + }, + "CVE-2018-19824": { + "cmt_msg": "ALSA: usb-audio: Fix UAF decrement if card has no live interfaces in card.c" + }, + "CVE-2018-20854": { + "cmt_msg": "phy: ocelot-serdes: fix out-of-bounds read" + }, + "CVE-2018-5391": { + "cmt_msg": "ip: discard IPv4 datagrams with overlapping segments." + }, + "CVE-2022-3533": { + "cmt_msg": "" + }, + "CVE-2024-26648": { + "cmt_msg": "drm/amd/display: Fix variable deferencing before NULL check in edp_setup_replay()" + }, + "CVE-2022-21166": { + "cmt_msg": "x86/speculation/mmio: Enable CPU Fill buffer clearing on idle" + }, + "CVE-2023-26607": { + "cmt_msg": "ntfs: fix out-of-bounds read in ntfs_attr_find()" + }, + "CVE-2018-20855": { + "cmt_msg": "IB/mlx5: Fix leaking stack memory to userspace" + }, + "CVE-2019-15239": { + "cmt_msg": "" + }, + "CVE-2024-26743": { + "cmt_msg": "RDMA/qedr: Fix qedr_create_user_qp error flow" + }, + "CVE-2023-52635": { + "cmt_msg": "PM / devfreq: Synchronize devfreq_monitor_[start/stop]" + }, + "CVE-2023-52634": { + "cmt_msg": "drm/amd/display: Fix disable_otg_wa logic" + }, + "CVE-2023-52594": { + "cmt_msg": "wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus()" + }, + "CVE-2023-52632": { + "cmt_msg": "drm/amdkfd: Fix lock dependency warning with srcu" + }, + "CVE-2021-4037": { + "cmt_msg": "xfs: fix up non-directory creation in SGID directories" + }, + "CVE-2021-22543": { + "cmt_msg": "KVM: do not allow mapping valid but non-reference-counted pages" + }, + "CVE-2022-45884": { + "cmt_msg": "" + }, + "CVE-2019-1999": { + "cmt_msg": "binder: fix race between munmap() and direct reclaim" + }, + "CVE-2023-20941": { + "cmt_msg": "" + }, + "CVE-2018-1066": { + "cmt_msg": "CIFS: Enable encryption during session setup phase" + }, + "CVE-2018-20836": { + "cmt_msg": "scsi: libsas: fix a race condition when smp task timeout" + }, + "CVE-2018-1068": { + "cmt_msg": "netfilter: ebtables: CONFIG_COMPAT: don't trust userland offsets" + }, + "CVE-2020-10135": { + "cmt_msg": "Bluetooth: Consolidate encryption handling in hci_encrypt_cfm" + }, + "CVE-2024-26656": { + "cmt_msg": "drm/amdgpu: fix use-after-free bug" + }, + "CVE-2020-25285": { + "cmt_msg": "mm/hugetlb: fix a race between hugetlb sysctl handlers" + }, + "CVE-2019-7308": { + "cmt_msg": "bpf: fix sanitation of alu op with pointer / scalar type from different paths" + }, + "CVE-2018-1000199": { + "cmt_msg": "perf/hwbp: Simplify the perf-hwbp code, fix documentation" + }, + "CVE-2022-1966": { + "cmt_msg": "netfilter: nf_tables: disallow non-stateful expression in sets earlier" + }, + "CVE-2015-8967": { + "cmt_msg": "arm64: make sys_call_table const" + }, + "CVE-2017-9986": { + "cmt_msg": "sound: Retire OSS" + }, + "CVE-2017-9985": { + "cmt_msg": "ALSA: msnd: Optimize / harden DSP and MIDI loops" + }, + "CVE-2017-9984": { + "cmt_msg": "ALSA: msnd: Optimize / harden DSP and MIDI loops" + }, + "CVE-2019-9454": { + "cmt_msg": "i2c: core-smbus: prevent stack corruption on read I2C_BLOCK_DATA" + }, + "CVE-2022-3534": { + "cmt_msg": "libbpf: Fix use-after-free in btf_dump_name_dups" + }, + "CVE-2023-34256": { + "cmt_msg": "ext4: avoid a potential slab-out-of-bounds in ext4_group_desc_csum" + }, + "CVE-2021-47135": { + "cmt_msg": "mt76: mt7921: fix possible AOOB issue in mt7921_mcu_tx_rate_report" + }, + "CVE-2021-20261": { + "cmt_msg": "floppy: fix lock_fdc() signal handling" + }, + "CVE-2019-15214": { + "cmt_msg": "ALSA: core: Fix card races between register and disconnect" + }, + "CVE-2021-47131": { + "cmt_msg": "net/tls: Fix use-after-free after the TLS device goes down and up" + }, + "CVE-2017-18079": { + "cmt_msg": "Input: i8042 - fix crash at boot time" + }, + "CVE-2020-25284": { + "cmt_msg": "rbd: require global CAP_SYS_ADMIN for mapping and unmapping" + }, + "CVE-2022-3061": { + "cmt_msg": "video: fbdev: i740fb: Error out if 'pixclock' equals zero" + }, + "CVE-2023-28328": { + "cmt_msg": "media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer()" + }, + "CVE-2023-0386": { + "cmt_msg": "ovl: fail on invalid uid/gid mapping at copy up" + }, + "CVE-2016-6136": { + "cmt_msg": "audit: fix a double fetch in audit_log_single_execve_arg()" + }, + "CVE-2021-47133": { + "cmt_msg": "HID: amd_sfh: Fix memory leak in amd_sfh_work" + }, + "CVE-2023-52638": { + "cmt_msg": "can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock" + }, + "CVE-2022-48627": { + "cmt_msg": "vt: fix memory overlapping when deleting chars in the buffer" + }, + "CVE-2017-13693": { + "cmt_msg": "" + }, + "CVE-2017-13695": { + "cmt_msg": "ACPICA: acpi: acpica: fix acpi operand cache leak in nseval.c" + }, + "CVE-2017-13694": { + "cmt_msg": "" + }, + "CVE-2021-4149": { + "cmt_msg": "btrfs: unlock newly allocated extent buffer after error" + }, + "CVE-2022-21385": { + "cmt_msg": "net/rds: fix warn in rds_message_alloc_sgs" + }, + "CVE-2022-42895": { + "cmt_msg": "Bluetooth: L2CAP: Fix attempting to access uninitialized memory" + }, + "CVE-2021-3640": { + "cmt_msg": "Bluetooth: sco: Fix lock_sock() blockage by memcpy_from_msg()" + }, + "CVE-2017-7618": { + "cmt_msg": "crypto: ahash - Fix EINPROGRESS notification callback" + }, + "CVE-2020-1749": { + "cmt_msg": "net: ipv6_stub: use ip6_dst_lookup_flow instead of ip6_dst_lookup" + }, + "CVE-2022-48626": { + "cmt_msg": "moxart: fix potential use-after-free on remove path" + }, + "CVE-2022-1786": { + "cmt_msg": "io_uring: remove io_identity" + }, + "CVE-2021-47180": { + "cmt_msg": "NFC: nci: fix memory leak in nci_allocate_device" + }, + "CVE-2022-48628": { + "cmt_msg": "ceph: drop messages from MDS when unmounting" + }, + "CVE-2020-11608": { + "cmt_msg": "media: ov519: add missing endpoint sanity checks" + }, + "CVE-2020-10732": { + "cmt_msg": "fs/binfmt_elf.c: allocate initialized memory in fill_thread_core_info()" + }, + "CVE-2020-28097": { + "cmt_msg": "vgacon: remove software scrollback support" + }, + "CVE-2017-18216": { + "cmt_msg": "ocfs2: subsystem.su_mutex is required while accessing the item->ci_parent" + }, + "CVE-2017-1000112": { + "cmt_msg": "udp: consistently apply ufo or fragmentation" + }, + "CVE-2017-1000111": { + "cmt_msg": "packet: fix tp_reserve race in packet_set_ring" + }, + "CVE-2024-24855": { + "cmt_msg": "scsi: lpfc: Fix a possible data race in lpfc_unregister_fcf_rescan()" + }, + "CVE-2015-8374": { + "cmt_msg": "Btrfs: fix truncation of compressed and inlined extents" + }, + "CVE-2018-5848": { + "cmt_msg": "wil6210: missing length check in wmi_set_ie" + }, + "CVE-2018-8897": { + "cmt_msg": "x86/entry/64: Don't use IST entry for #BP stack" + }, + "CVE-2021-29265": { + "cmt_msg": "usbip: fix stub_dev usbip_sockfd_store() races leading to gpf" + }, + "CVE-2021-39648": { + "cmt_msg": "usb: gadget: configfs: Fix use-after-free issue with udc_name" + }, + "CVE-2022-3545": { + "cmt_msg": "nfp: fix use-after-free in area_cache_get()" + }, + "CVE-2023-52484": { + "cmt_msg": "iommu/arm-smmu-v3: Fix soft lockup triggered by arm_smmu_mm_invalidate_range" + }, + "CVE-2023-52568": { + "cmt_msg": "x86/sgx: Resolves SECS reclaim vs. page fault for EAUG race" + }, + "CVE-2020-14416": { + "cmt_msg": "can, slip: Protect tty->disc_data in write_wakeup and close with RCU" + }, + "CVE-2019-0136": { + "cmt_msg": "mac80211: drop robust management frames from unknown TA" + }, + "CVE-2023-52563": { + "cmt_msg": "drm/meson: fix memory leak on ->hpd_notify callback" + }, + "CVE-2019-16921": { + "cmt_msg": "RDMA/hns: Fix init resp when alloc ucontext" + }, + "CVE-2023-52561": { + "cmt_msg": "arm64: dts: qcom: sdm845-db845c: Mark cont splash memory region as reserved" + }, + "CVE-2019-19377": { + "cmt_msg": "btrfs: Don't submit any btree write bio if the fs has errors" + }, + "CVE-2023-52566": { + "cmt_msg": "nilfs2: fix potential use after free in nilfs_gccache_submit_read_data()" + }, + "CVE-2021-21781": { + "cmt_msg": "ARM: ensure the signal page contains defined contents" + }, + "CVE-2021-0512": { + "cmt_msg": "HID: make arrays usage and value to be the same" + }, + "CVE-2018-14634": { + "cmt_msg": "exec: Limit arg stack to at most 75% of _STK_LIM" + }, + "CVE-2018-14633": { + "cmt_msg": "scsi: target: iscsi: Use hex2bin instead of a re-implementation" + }, + "CVE-2018-12896": { + "cmt_msg": "posix-timers: Sanitize overrun handling" + }, + "CVE-2023-1382": { + "cmt_msg": "tipc: set con sock in tipc_conn_alloc" + }, + "CVE-2018-14734": { + "cmt_msg": "infiniband: fix a possible use-after-free bug" + }, + "CVE-2024-26672": { + "cmt_msg": "drm/amdgpu: Fix variable 'mca_funcs' dereferenced before NULL check in 'amdgpu_mca_smu_get_mca_entry()'" + }, + "CVE-2022-0850": { + "cmt_msg": "ext4: fix kernel infoleak via ext4_extent_header" + }, + "CVE-2021-46926": { + "cmt_msg": "ALSA: hda: intel-sdw-acpi: harden detection of controller" + }, + "CVE-2015-8950": { + "cmt_msg": "arm64: dma-mapping: always clear allocated buffers" + }, + "CVE-2015-1805": { + "cmt_msg": "new helper: copy_page_from_iter()" + }, + "CVE-2022-41222": { + "cmt_msg": "mm/mremap: hold the rmap lock in write mode when moving page table entries." + }, + "CVE-2018-8822": { + "cmt_msg": "staging: ncpfs: memory corruption in ncp_read_kernel()" + }, + "CVE-2021-40490": { + "cmt_msg": "ext4: fix race writing to an inline_data file while its xattrs are changing" + }, + "CVE-2022-40982": { + "cmt_msg": "x86/speculation: Add Gather Data Sampling mitigation" + }, + "CVE-2019-12456": { + "cmt_msg": "" + }, + "CVE-2019-18680": { + "cmt_msg": "" + }, + "CVE-2022-20565": { + "cmt_msg": "HID: core: Correctly handle ReportSize being zero" + }, + "CVE-2019-17133": { + "cmt_msg": "cfg80211: wext: avoid copying malformed SSIDs" + }, + "CVE-2017-18595": { + "cmt_msg": "tracing: Fix possible double free on failure of allocating trace buffer" + }, + "CVE-2024-26713": { + "cmt_msg": "powerpc/pseries/iommu: Fix iommu initialisation during DLPAR add" + }, + "CVE-2021-33655": { + "cmt_msg": "fbcon: Disallow setting font bigger than screen size" + }, + "CVE-2024-26804": { + "cmt_msg": "net: ip_tunnel: prevent perpetual headroom growth" + }, + "CVE-2021-3612": { + "cmt_msg": "Input: joydev - prevent potential read overflow in ioctl" + }, + "CVE-2022-41858": { + "cmt_msg": "drivers: net: slip: fix NPD bug in sl_tx_timeout()" + }, + "CVE-2024-26726": { + "cmt_msg": "btrfs: don't drop extent_map for free space inode on write error" + }, + "CVE-2017-7487": { + "cmt_msg": "ipx: call ipxitf_put() in ioctl error path" + }, + "CVE-2019-6974": { + "cmt_msg": "kvm: fix kvm_ioctl_create_device() reference counting (CVE-2019-6974)" + }, + "CVE-2022-41850": { + "cmt_msg": "HID: roccat: Fix use-after-free in roccat_read()" + }, + "CVE-2022-0168": { + "cmt_msg": "cifs: fix NULL ptr dereference in smb2_ioctl_query_info()" + }, + "CVE-2023-2985": { + "cmt_msg": "fs: hfsplus: fix UAF issue in hfsplus_put_super" + }, + "CVE-2020-14390": { + "cmt_msg": "fbcon: remove soft scrollback code" + }, + "CVE-2020-24502": { + "cmt_msg": "" + }, + "CVE-2017-17806": { + "cmt_msg": "crypto: hmac - require that the underlying hash algorithm is unkeyed" + }, + "CVE-2017-17807": { + "cmt_msg": "KEYS: add missing permission check for request_key() destination" + }, + "CVE-2017-10661": { + "cmt_msg": "timerfd: Protect the might cancel mechanism proper" + }, + "CVE-2017-17805": { + "cmt_msg": "crypto: salsa20 - fix blkcipher_walk API usage" + }, + "CVE-2017-7541": { + "cmt_msg": "brcmfmac: fix possible buffer overflow in brcmf_cfg80211_mgmt_tx()" + }, + "CVE-2019-19527": { + "cmt_msg": "HID: hiddev: do cleanup in failure of opening a device" + }, + "CVE-2017-7542": { + "cmt_msg": "ipv6: avoid overflow of offset in ip6_find_1stfragopt" + }, + "CVE-2024-0584": { + "cmt_msg": "ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet" + }, + "CVE-2024-26700": { + "cmt_msg": "drm/amd/display: Fix MST Null Ptr for RV" + }, + "CVE-2020-0465": { + "cmt_msg": "HID: core: Sanitize event code and type when mapping input" + }, + "CVE-2018-3639": { + "cmt_msg": "x86/nospec: Simplify alternative_msr_write()" + }, + "CVE-2023-52516": { + "cmt_msg": "dma-debug: don't call __dma_entry_alloc_check_leak() under free_entries_lock" + }, + "CVE-2021-4218": { + "cmt_msg": "sysctl: pass kernel pointers to ->proc_handler" + }, + "CVE-2023-22995": { + "cmt_msg": "usb: dwc3: dwc3-qcom: Add missing platform_device_put() in dwc3_qcom_acpi_register_core" + }, + "CVE-2019-15902": { + "cmt_msg": "" + }, + "CVE-2024-25739": { + "cmt_msg": "" + }, + "CVE-2023-52511": { + "cmt_msg": "spi: sun6i: reduce DMA RX transfer width to single byte" + }, + "CVE-2019-20054": { + "cmt_msg": "fs/proc/proc_sysctl.c: fix NULL pointer dereference in put_links" + }, + "CVE-2021-46982": { + "cmt_msg": "f2fs: compress: fix race condition of overwrite vs truncate" + }, + "CVE-2017-15274": { + "cmt_msg": "KEYS: fix dereferencing NULL payload with nonzero length" + }, + "CVE-2024-0340": { + "cmt_msg": "vhost: use kzalloc() instead of kmalloc() followed by memset()" + }, + "CVE-2021-3753": { + "cmt_msg": "vt_kdsetmode: extend console locking" + }, + "CVE-2023-6536": { + "cmt_msg": "nvmet-tcp: fix a crash in nvmet_req_complete()" + }, + "CVE-2019-11135": { + "cmt_msg": "x86/msr: Add the IA32_TSX_CTRL MSR" + }, + "CVE-2019-11810": { + "cmt_msg": "scsi: megaraid_sas: return error when create DMA pool failed" + }, + "CVE-2021-27365": { + "cmt_msg": "scsi: iscsi: Ensure sysfs attributes are limited to PAGE_SIZE" + }, + "CVE-2021-27364": { + "cmt_msg": "scsi: iscsi: Restrict sessions and handles to admin capabilities" + }, + "CVE-2017-14991": { + "cmt_msg": "scsi: sg: fixup infoleak when using SG_GET_REQUEST_TABLE" + }, + "CVE-2020-0431": { + "cmt_msg": "HID: hid-input: clear unmapped usages" + }, + "CVE-2018-17977": { + "cmt_msg": "" + }, + "CVE-2024-26659": { + "cmt_msg": "xhci: handle isoc Babble and Buffer Overrun events properly" + }, + "CVE-2024-26658": { + "cmt_msg": "bcachefs: grab s_umount only if snapshotting" + }, + "CVE-2018-17972": { + "cmt_msg": "proc: restrict kernel stack dumps to root" + }, + "CVE-2024-26655": { + "cmt_msg": "Fix memory leak in posix_clock_open()" + }, + "CVE-2024-26654": { + "cmt_msg": "ALSA: sh: aica: reorder cleanup operations to avoid UAF bugs" + }, + "CVE-2020-28974": { + "cmt_msg": "vt: Disable KD_FONT_OP_COPY" + }, + "CVE-2018-7566": { + "cmt_msg": "ALSA: seq: Fix racy pool initializations" + }, + "CVE-2024-26650": { + "cmt_msg": "platform/x86: p2sb: Allow p2sb_bar() calls during PCI device probe" + }, + "CVE-2022-33742": { + "cmt_msg": "xen/blkfront: force data bouncing when backend is untrusted" + }, + "CVE-2022-42896": { + "cmt_msg": "Bluetooth: L2CAP: Fix accepting connection request for invalid SPSM" + }, + "CVE-2017-5967": { + "cmt_msg": "time: Remove CONFIG_TIMER_STATS" + }, + "CVE-2021-0937": { + "cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write" + }, + "CVE-2022-3169": { + "cmt_msg": "nvme: ensure subsystem reset is single threaded" + }, + "CVE-2022-36280": { + "cmt_msg": "drm/vmwgfx: Validate the box size for the snooped cursor" + }, + "CVE-2019-2054": { + "cmt_msg": "arm/ptrace: run seccomp after ptrace" + }, + "CVE-2024-26696": { + "cmt_msg": "nilfs2: fix hang in nilfs_lookup_dirty_data_buffers()" + }, + "CVE-2018-20976": { + "cmt_msg": "xfs: clear sb->s_fs_info on mount failure" + }, + "CVE-2023-52475": { + "cmt_msg": "Input: powermate - fix use-after-free in powermate_config_complete" + }, + "CVE-2023-52477": { + "cmt_msg": "usb: hub: Guard against accesses to uninitialized BOS descriptors" + }, + "CVE-2023-52476": { + "cmt_msg": "perf/x86/lbr: Filter vsyscall addresses" + }, + "CVE-2016-10147": { + "cmt_msg": "crypto: mcryptd - Check mcryptd algorithm compatibility" + }, + "CVE-2024-21803": { + "cmt_msg": "" + }, + "CVE-2018-7995": { + "cmt_msg": "x86/MCE: Serialize sysfs changes" + }, + "CVE-2018-16276": { + "cmt_msg": "USB: yurex: fix out-of-bounds uaccess in read handler" + }, + "CVE-2020-29568": { + "cmt_msg": "xen/xenbus: Allow watches discard events before queueing" + }, + "CVE-2023-2176": { + "cmt_msg": "RDMA/core: Refactor rdma_bind_addr" + }, + "CVE-2021-3542": { + "cmt_msg": "" + }, + "CVE-2019-16413": { + "cmt_msg": "9p: use inode->i_lock to protect i_size_write() under 32-bit" + }, + "CVE-2022-1263": { + "cmt_msg": "KVM: avoid NULL pointer dereference in kvm_dirty_ring_push" + }, + "CVE-2017-16650": { + "cmt_msg": "net: qmi_wwan: fix divide by 0 on bad descriptors" + }, + "CVE-2020-12653": { + "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_cmd_append_vsie_tlv()" + }, + "CVE-2019-7222": { + "cmt_msg": "KVM: x86: work around leak of uninitialized stack contents (CVE-2019-7222)" + }, + "CVE-2017-14051": { + "cmt_msg": "scsi: qla2xxx: Fix an integer overflow in sysfs code" + }, + "CVE-2020-12654": { + "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_ret_wmm_get_status()" + }, + "CVE-2020-12655": { + "cmt_msg": "xfs: add agf freeblocks verify in xfs_agf_verify" + }, + "CVE-2018-12929": { + "cmt_msg": "" + }, + "CVE-2018-12928": { + "cmt_msg": "" + }, + "CVE-2021-47059": { + "cmt_msg": "crypto: sun8i-ss - fix result memory leak on error path" + }, + "CVE-2020-36310": { + "cmt_msg": "KVM: SVM: avoid infinite loop on NPF from bad address" + }, + "CVE-2020-36313": { + "cmt_msg": "KVM: Fix out of range accesses to memslots" + }, + "CVE-2020-35519": { + "cmt_msg": "net/x25: prevent a couple of overflows" + }, + "CVE-2017-18241": { + "cmt_msg": "f2fs: fix a panic caused by NULL flush_cmd_control" + }, + "CVE-2022-33740": { + "cmt_msg": "xen/netfront: fix leaking data in shared pages" + }, + "CVE-2022-48619": { + "cmt_msg": "Input: add bounds checking to input_set_capability()" + }, + "CVE-2020-10708": { + "cmt_msg": "" + }, + "CVE-2020-25673": { + "cmt_msg": "nfc: Avoid endless loops caused by repeated llcp_sock_connect()" + }, + "CVE-2022-0400": { + "cmt_msg": "" + }, + "CVE-2024-25741": { + "cmt_msg": "" + }, + "CVE-2024-26808": { + "cmt_msg": "netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain" + }, + "CVE-2024-26809": { + "cmt_msg": "netfilter: nft_set_pipapo: release elements in clone only from destroy path" + }, + "CVE-2014-9888": { + "cmt_msg": "ARM: dma-mapping: don't allow DMA mappings to be marked executable" + }, + "CVE-2021-42739": { + "cmt_msg": "media: firewire: firedtv-avc: fix a buffer overflow in avc_ca_pmt()" + }, + "CVE-2023-1989": { + "cmt_msg": "Bluetooth: btsdio: fix use after free bug in btsdio_remove due to unfinished work" + }, + "CVE-2024-26806": { + "cmt_msg": "spi: cadence-qspi: remove system-wide suspend helper calls from runtime PM hooks" + }, + "CVE-2022-3111": { + "cmt_msg": "power: supply: wm8350-power: Add missing free in free_charger_irq" + }, + "CVE-2018-5344": { + "cmt_msg": "loop: fix concurrent lo_open/lo_release" + }, + "CVE-2020-12770": { + "cmt_msg": "scsi: sg: add sg_remove_request in sg_write" + }, + "CVE-2024-26802": { + "cmt_msg": "stmmac: Clear variable when destroying workqueue" + }, + "CVE-2018-6412": { + "cmt_msg": "fbdev: Fixing arbitrary kernel leak in case FBIOGETCMAP_SPARC in sbusfb_ioctl_helper()." + }, + "CVE-2023-52606": { + "cmt_msg": "powerpc/lib: Validate size for vector operations" + }, + "CVE-2019-15222": { + "cmt_msg": "ALSA: usb-audio: Fix gpf in snd_usb_pipe_sanity_check" + }, + "CVE-2023-52604": { + "cmt_msg": "FS:JFS:UBSAN:array-index-out-of-bounds in dbAdjTree" + }, + "CVE-2023-52531": { + "cmt_msg": "wifi: iwlwifi: mvm: Fix a memory corruption issue" + }, + "CVE-2023-52602": { + "cmt_msg": "jfs: fix slab-out-of-bounds Read in dtSearch" + }, + "CVE-2023-52603": { + "cmt_msg": "UBSAN: array-index-out-of-bounds in dtSplitRoot" + }, + "CVE-2022-25265": { + "cmt_msg": "" + }, + "CVE-2022-20368": { + "cmt_msg": "net/packet: fix slab-out-of-bounds access in packet_recvmsg()" + }, + "CVE-2017-12153": { + "cmt_msg": "nl80211: check for the required netlink attributes presence" + }, + "CVE-2019-19813": { + "cmt_msg": "btrfs: inode: Verify inode mode to avoid NULL pointer dereference" + }, + "CVE-2017-12154": { + "cmt_msg": "kvm: nVMX: Don't allow L2 to access the hardware CR8" + }, + "CVE-2020-10773": { + "cmt_msg": "s390/cmm: fix information leak in cmm_timeout_handler()" + }, + "CVE-2022-21499": { + "cmt_msg": "lockdown: also lock down previous kgdb use" + }, + "CVE-2016-1583": { + "cmt_msg": "proc: prevent stacking filesystems on top" + }, + "CVE-2017-1000379": { + "cmt_msg": "mm: larger stack guard gap, between vmas" + }, + "CVE-2023-52574": { + "cmt_msg": "team: fix null-ptr-deref when team device type is changed" + }, + "CVE-2023-3640": { + "cmt_msg": "" + }, + "CVE-2018-18281": { + "cmt_msg": "mremap: properly flush TLB before releasing the page" + }, + "CVE-2023-20593": { + "cmt_msg": "x86/cpu/amd: Add a Zenbleed fix" + }, + "CVE-2023-3022": { + "cmt_msg": "ipv6: Use result arg in fib_lookup_arg consistently" + }, + "CVE-2022-2663": { + "cmt_msg": "netfilter: nf_conntrack_irc: Fix forged IP logic" + }, + "CVE-2022-43750": { + "cmt_msg": "usb: mon: make mmapped memory read only" + }, + "CVE-2016-6787": { + "cmt_msg": "perf: Fix event->ctx locking" + }, + "CVE-2016-6786": { + "cmt_msg": "perf: Fix event->ctx locking" + }, + "CVE-2021-47046": { + "cmt_msg": "drm/amd/display: Fix off by one in hdmi_14_process_transaction()" + }, + "CVE-2019-15219": { + "cmt_msg": "USB: sisusbvga: fix oops in error path of sisusb_probe" + }, + "CVE-2014-9940": { + "cmt_msg": "regulator: core: Fix regualtor_ena_gpio_free not to access pin after freeing" + }, + "CVE-2024-26774": { + "cmt_msg": "ext4: avoid dividing by 0 in mb_update_avg_fragment_size() when block bitmap corrupt" + }, + "CVE-2021-46969": { + "cmt_msg": "bus: mhi: core: Fix invalid error returning in mhi_queue" + }, + "CVE-2024-26803": { + "cmt_msg": "net: veth: clear GRO when clearing XDP even when down" + }, + "CVE-2021-47160": { + "cmt_msg": "net: dsa: mt7530: fix VLAN traffic leaks" + }, + "CVE-2023-4385": { + "cmt_msg": "fs: jfs: fix possible NULL pointer dereference in dbFree()" + }, + "CVE-2021-46965": { + "cmt_msg": "mtd: physmap: physmap-bt1-rom: Fix unintentional stack access" + }, + "CVE-2021-46962": { + "cmt_msg": "mmc: uniphier-sd: Fix a resource leak in the remove function" + }, + "CVE-2021-47168": { + "cmt_msg": "NFS: fix an incorrect limit in filelayout_decode_layout()" + }, + "CVE-2019-19378": { + "cmt_msg": "" + }, + "CVE-2023-52599": { + "cmt_msg": "jfs: fix array-index-out-of-bounds in diNewExt" + }, + "CVE-2020-4788": { + "cmt_msg": "powerpc/64s: flush L1D on kernel entry" + }, + "CVE-2024-26744": { + "cmt_msg": "RDMA/srpt: Support specifying the srpt_service_guid parameter" + }, + "CVE-2022-36879": { + "cmt_msg": "xfrm: xfrm_policy: fix a possible double xfrm_pols_put() in xfrm_bundle_lookup()" + }, + "CVE-2017-8831": { + "cmt_msg": "[media] saa7164: fix double fetch PCIe access condition" + }, + "CVE-2021-39698": { + "cmt_msg": "wait: add wake_up_pollfree()" + }, + "CVE-2020-10766": { + "cmt_msg": "x86/speculation: Prevent rogue cross-process SSBD shutdown" + }, + "CVE-2018-5333": { + "cmt_msg": "RDS: null pointer dereference in rds_atomic_free_op" + }, + "CVE-2018-5332": { + "cmt_msg": "RDS: Heap OOB write in rds_message_alloc_sgs()" + }, + "CVE-2022-2380": { + "cmt_msg": "video: fbdev: sm712fb: Fix crash in smtcfb_read()" + }, + "CVE-2017-7482": { + "cmt_msg": "rxrpc: Fix several cases where a padded len isn't checked in ticket decode" + }, + "CVE-2020-10767": { + "cmt_msg": "x86/speculation: Avoid force-disabling IBPB based on STIBP and enhanced IBRS." + }, + "CVE-2019-19447": { + "cmt_msg": "ext4: work around deleting a file with i_nlink == 0 safely" + }, + "CVE-2017-17448": { + "cmt_msg": "netfilter: nfnetlink_cthelper: Add missing permission checks" + }, + "CVE-2017-17449": { + "cmt_msg": "netlink: Add netns check on taps" + }, + "CVE-2020-24503": { + "cmt_msg": "" + }, + "CVE-2019-19524": { + "cmt_msg": "Input: ff-memless - kill timer in destroy()" + }, + "CVE-2019-19448": { + "cmt_msg": "btrfs: only search for left_info if there is no right_info in try_merge_free_space" + }, + "CVE-2019-19449": { + "cmt_msg": "f2fs: fix to do sanity check on segment/section count" + }, + "CVE-2019-19523": { + "cmt_msg": "USB: adutux: fix use-after-free on disconnect" + }, + "CVE-2021-3752": { + "cmt_msg": "Bluetooth: fix use-after-free error in lock_sock_nested()" + }, + "CVE-2023-52620": { + "cmt_msg": "netfilter: nf_tables: disallow timeout for anonymous sets" + }, + "CVE-2017-18360": { + "cmt_msg": "USB: serial: io_ti: fix div-by-zero in set_termios" + }, + "CVE-2019-3892": { + "cmt_msg": "coredump: fix race condition between mmget_not_zero()/get_task_mm() and core dumping" + }, + "CVE-2017-18249": { + "cmt_msg": "f2fs: fix race condition in between free nid allocator/initializer" + }, + "CVE-2023-52621": { + "cmt_msg": "bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers" + }, + "CVE-2019-15217": { + "cmt_msg": "media: usb:zr364xx:Fix KASAN:null-ptr-deref Read in zr364xx_vidioc_querycap" + }, + "CVE-2021-35477": { + "cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4" + }, + "CVE-2016-5243": { + "cmt_msg": "tipc: fix an infoleak in tipc_nl_compat_link_dump" + }, + "CVE-2019-15216": { + "cmt_msg": "USB: yurex: Fix protection fault after device removal" + }, + "CVE-2019-16746": { + "cmt_msg": "nl80211: validate beacon head" + }, + "CVE-2023-52623": { + "cmt_msg": "SUNRPC: Fix a suspicious RCU usage warning" + }, + "CVE-2022-3606": { + "cmt_msg": "" + }, + "CVE-2019-15215": { + "cmt_msg": "media: cpia2_usb: first wake up, then free in disconnect" + }, + "CVE-2022-2209": { + "cmt_msg": "" + }, + "CVE-2018-18021": { + "cmt_msg": "arm64: KVM: Tighten guest core register access from userspace" + }, + "CVE-2021-37576": { + "cmt_msg": "KVM: PPC: Book3S: Fix H_RTAS rets buffer overflow" + }, + "CVE-2017-9725": { + "cmt_msg": "mm: cma: fix incorrect type conversion for size during dma allocation" + }, + "CVE-2023-7042": { + "cmt_msg": "wifi: ath10k: fix NULL pointer dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev()" + }, + "CVE-2024-26775": { + "cmt_msg": "aoe: avoid potential deadlock at set_capacity" + }, + "CVE-2023-45871": { + "cmt_msg": "igb: set max size RX buffer when store bad packet is enabled" + }, + "CVE-2021-47179": { + "cmt_msg": "NFSv4: Fix a NULL pointer dereference in pnfs_mark_matching_lsegs_return()" + }, + "CVE-2022-1974": { + "cmt_msg": "nfc: replace improper check device_is_registered() in netlink related functions" + }, + "CVE-2022-3594": { + "cmt_msg": "r8152: Rate limit overflow messages" + }, + "CVE-2018-14609": { + "cmt_msg": "btrfs: relocation: Only remove reloc rb_trees if reloc control has been initialized" + }, + "CVE-2014-4027": { + "cmt_msg": "target/rd: Refactor rd_build_device_space + rd_release_device_space" + }, + "CVE-2021-33098": { + "cmt_msg": "ixgbe: fix large MTU request from VF" + }, + "CVE-2022-3595": { + "cmt_msg": "cifs: fix double-fault crash during ntlmssp" + }, + "CVE-2023-52569": { + "cmt_msg": "btrfs: remove BUG() after failure to insert delayed dir index item" + }, + "CVE-2023-47233": { + "cmt_msg": "wifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach" + }, + "CVE-2020-10769": { + "cmt_msg": "crypto: authenc - fix parsing key with misaligned rta_len" + }, + "CVE-2018-5803": { + "cmt_msg": "sctp: verify size of a new chunk in _sctp_make_chunk()" + }, + "CVE-2020-27815": { + "cmt_msg": "jfs: Fix array index bounds check in dbAdjTree" + }, + "CVE-2020-0543": { + "cmt_msg": "x86/cpu: Add 'table' argument to cpu_matches()" + }, + "CVE-2021-38160": { + "cmt_msg": "virtio_console: Assure used length from device is limited" + }, + "CVE-2022-1462": { + "cmt_msg": "tty: use new tty_insert_flip_string_and_push_buffer() in pty_write()" + }, + "CVE-2024-26758": { + "cmt_msg": "md: Don't ignore suspended array in md_check_recovery()" + }, + "CVE-2024-26759": { + "cmt_msg": "mm/swap: fix race when skipping swapcache" + }, + "CVE-2023-52559": { + "cmt_msg": "iommu/vt-d: Avoid memory allocation in iommu_suspend()" + }, + "CVE-2023-6606": { + "cmt_msg": "smb: client: fix OOB in smbCalcSize()" + }, + "CVE-2020-27067": { + "cmt_msg": "l2tp: fix l2tp_eth module loading" + }, + "CVE-2020-27777": { + "cmt_msg": "powerpc/rtas: Restrict RTAS requests from userspace" + }, + "CVE-2019-20636": { + "cmt_msg": "Input: add safety guards to input_set_keycode()" + }, + "CVE-2019-11486": { + "cmt_msg": "tty: mark Siemens R3964 line discipline as BROKEN" + }, + "CVE-2019-11487": { + "cmt_msg": "fs: prevent page refcount overflow in pipe_buf_get" + }, + "CVE-2024-26752": { + "cmt_msg": "l2tp: pass correct message length to ip6_append_data" + }, + "CVE-2020-27066": { + "cmt_msg": "xfrm: policy: Fix doulbe free in xfrm_policy_timer" + }, + "CVE-2020-27675": { + "cmt_msg": "xen/events: avoid removing an event channel while handling it" + }, + "CVE-2024-26756": { + "cmt_msg": "md: Don't register sync_thread for reshape directly" + }, + "CVE-2020-28915": { + "cmt_msg": "fbcon: Fix global-out-of-bounds read in fbcon_get_font()" + }, + "CVE-2021-47169": { + "cmt_msg": "serial: rp2: use 'request_firmware' instead of 'request_firmware_nowait'" + }, + "CVE-2019-20908": { + "cmt_msg": "efi: Restrict efivar_ssdt_load when the kernel is locked down" + }, + "CVE-2023-3776": { + "cmt_msg": "net/sched: cls_fw: Fix improper refcount update leads to use-after-free" + }, + "CVE-2021-28038": { + "cmt_msg": "Xen/gnttab: handle p2m update errors on a per-slot basis" + }, + "CVE-2022-23040": { + "cmt_msg": "xen/xenbus: don't let xenbus_grant_ring() remove grants in error case" + }, + "CVE-2021-29154": { + "cmt_msg": "bpf, x86: Validate computation of branch displacements for x86-64" + }, + "CVE-2024-26773": { + "cmt_msg": "ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found()" + }, + "CVE-2023-52434": { + "cmt_msg": "smb: client: fix potential OOBs in smb2_parse_contexts()" + }, + "CVE-2021-45469": { + "cmt_msg": "f2fs: fix to do sanity check on last xattr entry in __f2fs_setxattr()" + }, + "CVE-2023-52436": { + "cmt_msg": "f2fs: explicitly null-terminate the xattr list" + }, + "CVE-2019-19060": { + "cmt_msg": "iio: imu: adis16400: release allocated memory on failure" + }, + "CVE-2019-19061": { + "cmt_msg": "iio: imu: adis16400: fix memory leak" + }, + "CVE-2019-19062": { + "cmt_msg": "crypto: user - fix memory leak in crypto_report" + }, + "CVE-2019-19063": { + "cmt_msg": "rtlwifi: prevent memory leak in rtl_usb_probe" + }, + "CVE-2017-17741": { + "cmt_msg": "KVM: Fix stack-out-of-bounds read in write_mmio" + }, + "CVE-2019-9445": { + "cmt_msg": "f2fs: check if file namelen exceeds max value" + }, + "CVE-2019-19066": { + "cmt_msg": "scsi: bfa: release allocated memory in case of error" + }, + "CVE-2020-0435": { + "cmt_msg": "f2fs: fix to do sanity check with i_extra_isize" + }, + "CVE-2020-0432": { + "cmt_msg": "staging: most: net: fix buffer overflow" + }, + "CVE-2020-0433": { + "cmt_msg": "blk-mq: sync the update nr_hw_queues with blk_mq_queue_tag_busy_iter" + }, + "CVE-2023-51779": { + "cmt_msg": "Bluetooth: af_bluetooth: Fix Use-After-Free in bt_sock_recvmsg" + }, + "CVE-2019-3874": { + "cmt_msg": "sctp: implement memory accounting on tx path" + }, + "CVE-2018-10877": { + "cmt_msg": "ext4: verify the depth of extent tree in ext4_find_extent()" + }, + "CVE-2018-10876": { + "cmt_msg": "ext4: only look at the bg_flags field if it is valid" + }, + "CVE-2010-4563": { + "cmt_msg": "" + }, + "CVE-2023-52565": { + "cmt_msg": "media: uvcvideo: Fix OOB read" + }, + "CVE-2023-1249": { + "cmt_msg": "coredump: Use the vma snapshot in fill_files_note" + }, + "CVE-2023-2162": { + "cmt_msg": "scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress" + }, + "CVE-2018-10879": { + "cmt_msg": "ext4: make sure bitmaps and the inode table don't overlap with bg descriptors" + }, + "CVE-2018-10878": { + "cmt_msg": "ext4: always check block group bounds in ext4_init_block_bitmap()" + }, + "CVE-2024-23851": { + "cmt_msg": "dm: limit the number of targets and parameter size area" + }, + "CVE-2023-0266": { + "cmt_msg": "ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF" + }, + "CVE-2021-46928": { + "cmt_msg": "parisc: Clear stale IIR value on instruction access rights trap" + }, + "CVE-2021-3483": { + "cmt_msg": "firewire: nosy: Fix a use-after-free bug in nosy_ioctl()" + }, + "CVE-2024-26598": { + "cmt_msg": "KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache" + }, + "CVE-2017-16913": { + "cmt_msg": "usbip: fix stub_rx: harden CMD_SUBMIT path to handle malicious input" + }, + "CVE-2017-16912": { + "cmt_msg": "usbip: fix stub_rx: get_pipe() to validate endpoint number" + }, + "CVE-2017-16911": { + "cmt_msg": "usbip: prevent vhci_hcd driver from leaking a socket pointer address" + }, + "CVE-2017-0861": { + "cmt_msg": "ALSA: pcm: prevent UAF in snd_pcm_info" + }, + "CVE-2020-25656": { + "cmt_msg": "vt: keyboard, extend func_buf_lock to readers" + }, + "CVE-2017-16914": { + "cmt_msg": "usbip: fix stub_send_ret_submit() vulnerability to null transfer_buffer" + }, + "CVE-2022-24448": { + "cmt_msg": "NFSv4: Handle case where the lookup of a directory fails" + }, + "CVE-2023-52498": { + "cmt_msg": "PM: sleep: Fix possible deadlocks in core system-wide PM code" + }, + "CVE-2019-10142": { + "cmt_msg": "drivers/virt/fsl_hypervisor.c: prevent integer overflow in ioctl" + }, + "CVE-2021-4023": { + "cmt_msg": "io-wq: fix cancellation on create-worker failure" + }, + "CVE-2017-11176": { + "cmt_msg": "mqueue: fix a use-after-free in sys_mq_notify()" + }, + "CVE-2023-3268": { + "cmt_msg": "relayfs: fix out-of-bounds access in relay_file_read" + }, + "CVE-2022-2318": { + "cmt_msg": "net: rose: fix UAF bugs caused by timer handler" + }, + "CVE-2021-22555": { + "cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write" + }, + "CVE-2017-12190": { + "cmt_msg": "fix unbalanced page refcounting in bio_map_user_iov" + }, + "CVE-2022-1011": { + "cmt_msg": "fuse: fix pipe buffer lifetime for direct_io" + }, + "CVE-2021-0399": { + "cmt_msg": "" + }, + "CVE-2020-36691": { + "cmt_msg": "netlink: limit recursion depth in policy validation" + }, + "CVE-2021-47070": { + "cmt_msg": "uio_hv_generic: Fix another memory leak in error handling paths" + }, + "CVE-2023-3111": { + "cmt_msg": "btrfs: unset reloc control if transaction commit fails in prepare_to_relocate()" + }, + "CVE-2020-2732": { + "cmt_msg": "KVM: nVMX: Don't emulate instructions in guest mode" + }, + "CVE-2023-52486": { + "cmt_msg": "drm: Don't unref the same fb many times by mistake due to deadlock handling" + }, + "CVE-2024-26791": { + "cmt_msg": "btrfs: dev-replace: properly validate device names" + }, + "CVE-2023-52480": { + "cmt_msg": "ksmbd: fix race condition between session lookup and expire" + }, + "CVE-2012-4542": { + "cmt_msg": "" + }, + "CVE-2023-52482": { + "cmt_msg": "x86/srso: Add SRSO mitigation for Hygon processors" + }, + "CVE-2023-1838": { + "cmt_msg": "Fix double fget() in vhost_net_set_backend()" + }, + "CVE-2018-1000028": { + "cmt_msg": "nfsd: auth: Fix gid sorting when rootsquash enabled" + }, + "CVE-2023-1118": { + "cmt_msg": "media: rc: Fix use-after-free bugs caused by ene_tx_irqsim()" + }, + "CVE-2018-7191": { + "cmt_msg": "tun: call dev_get_valid_name() before register_netdevice()" + }, + "CVE-2023-52609": { + "cmt_msg": "binder: fix race between mmput() and do_exit()" + }, + "CVE-2021-47075": { + "cmt_msg": "nvmet: fix memory leak in nvmet_alloc_ctrl()" + }, + "CVE-2018-1000026": { + "cmt_msg": "bnx2x: disable GSO where gso_size is too big for hardware" + }, + "CVE-2022-1975": { + "cmt_msg": "NFC: netlink: fix sleep in atomic bug when firmware download timeout" + }, + "CVE-2023-1380": { + "cmt_msg": "wifi: brcmfmac: slab-out-of-bounds read in brcmf_get_assoc_ies()" + }, + "CVE-2022-44032": { + "cmt_msg": "char: pcmcia: remove all the drivers" + }, + "CVE-2017-0786": { + "cmt_msg": "brcmfmac: add length check in brcmf_cfg80211_escan_handler()" + }, + "CVE-2021-28972": { + "cmt_msg": "PCI: rpadlpar: Fix potential drc_name corruption in store functions" + }, + "CVE-2018-12130": { + "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" + }, + "CVE-2020-14305": { + "cmt_msg": "netfilter: helpers: remove data_len usage for inkernel helpers" + }, + "CVE-2021-20292": { + "cmt_msg": "drm/ttm/nouveau: don't call tt destroy callback on alloc failure." + }, + "CVE-2021-31916": { + "cmt_msg": "dm ioctl: fix out of bounds array access when no devices" + }, + "CVE-2017-8065": { + "cmt_msg": "crypto: ccm - move cbcmac input off the stack" + }, + "CVE-2018-13405": { + "cmt_msg": "Fix up non-directory creation in SGID directories" + }, + "CVE-2021-47122": { + "cmt_msg": "net: caif: fix memory leak in caif_device_notify" + }, + "CVE-2021-47121": { + "cmt_msg": "net: caif: fix memory leak in cfusbl_device_notify" + }, + "CVE-2018-13406": { + "cmt_msg": "video: uvesafb: Fix integer overflow in allocation" + }, + "CVE-2023-3772": { + "cmt_msg": "xfrm: add NULL check in xfrm_update_ae_params" + }, + "CVE-2020-11668": { + "cmt_msg": "media: xirlink_cit: add missing descriptor sanity checks" + }, + "CVE-2020-11669": { + "cmt_msg": "powerpc/powernv/idle: Restore AMR/UAMOR/AMOR after idle" + }, + "CVE-2019-15118": { + "cmt_msg": "ALSA: usb-audio: Fix a stack buffer overflow bug in check_input_term" + }, + "CVE-2021-47170": { + "cmt_msg": "USB: usbfs: Don't WARN about excessively large memory allocations" + }, + "CVE-2019-12818": { + "cmt_msg": "net: nfc: Fix NULL dereference on nfc_llcp_build_tlv fails" + }, + "CVE-2023-2269": { + "cmt_msg": "dm ioctl: fix nested locking in table_clear() to remove deadlock concern" + }, + "CVE-2023-0394": { + "cmt_msg": "ipv6: raw: Deduct extension header length in rawv6_push_pending_frames" + }, + "CVE-2015-0274": { + "cmt_msg": "xfs: remote attribute overwrite causes transaction overrun" + }, + "CVE-2020-0347": { + "cmt_msg": "" + }, + "CVE-2019-15117": { + "cmt_msg": "ALSA: usb-audio: Fix an OOB bug in parse_audio_mixer_unit" + }, + "CVE-2021-3659": { + "cmt_msg": "net: mac802154: Fix general protection fault" + }, + "CVE-2021-4155": { + "cmt_msg": "xfs: map unwritten blocks in XFS_IOC_{ALLOC,FREE}SP just like fallocate" + }, + "CVE-2019-14901": { + "cmt_msg": "mwifiex: Fix heap overflow in mmwifiex_process_tdls_action_frame()" + }, + "CVE-2021-4150": { + "cmt_msg": "block: fix incorrect references to disk objects" + }, + "CVE-2020-3702": { + "cmt_msg": "ath: Use safer key clearing with key cache entries" + }, + "CVE-2023-52485": { + "cmt_msg": "drm/amd/display: Wake DMCUB before sending a command" + }, + "CVE-2020-16166": { + "cmt_msg": "random32: update the net random state on interrupt and activity" + }, + "CVE-2021-3653": { + "cmt_msg": "KVM: nSVM: avoid picking up unsupported bits from L2 in int_ctl (CVE-2021-3653)" + }, + "CVE-2021-3655": { + "cmt_msg": "sctp: validate from_addr_param return" + }, + "CVE-2021-4159": { + "cmt_msg": "bpf: Verifer, adjust_scalar_min_max_vals to always call update_reg_bounds()" + }, + "CVE-2019-12614": { + "cmt_msg": "powerpc/pseries/dlpar: Fix a missing check in dlpar_parse_cc_property()" + }, + "CVE-2019-12615": { + "cmt_msg": "mdesc: fix a missing-check bug in get_vdev_port_node_info()" + }, + "CVE-2021-3714": { + "cmt_msg": "" + }, + "CVE-2024-26733": { + "cmt_msg": "arp: Prevent overflow in arp_req_get()." + }, + "CVE-2020-10742": { + "cmt_msg": "new helper: iov_iter_get_pages_alloc()" + }, + "CVE-2017-12168": { + "cmt_msg": "arm64: KVM: pmu: Fix AArch32 cycle counter access" + }, + "CVE-2019-16233": { + "cmt_msg": "scsi: qla2xxx: fix a potential NULL pointer dereference" + }, + "CVE-2021-3892": { + "cmt_msg": "" + }, + "CVE-2019-6133": { + "cmt_msg": "fork: record start_time late" + }, + "CVE-2018-10902": { + "cmt_msg": "ALSA: rawmidi: Change resized buffers atomically" + }, + "CVE-2021-39633": { + "cmt_msg": "ip_gre: add validation for csum_start" + }, + "CVE-2017-18203": { + "cmt_msg": "dm: fix race between dm_get_from_kobject() and __dm_destroy()" + }, + "CVE-2020-27673": { + "cmt_msg": "xen/events: add a proper barrier to 2-level uevent unmasking" + }, + "CVE-2021-39636": { + "cmt_msg": "netfilter: x_tables: fix pointer leaks to userspace" + }, + "CVE-2017-18204": { + "cmt_msg": "ocfs2: should wait dio before inode lock in ocfs2_setattr()" + }, + "CVE-2020-26147": { + "cmt_msg": "mac80211: assure all fragments are encrypted" + }, + "CVE-2019-3882": { + "cmt_msg": "vfio/type1: Limit DMA mappings per container" + }, + "CVE-2017-18208": { + "cmt_msg": "mm/madvise.c: fix madvise() infinite loop under special circumstances" + }, + "CVE-2022-33741": { + "cmt_msg": "xen/netfront: force data bouncing when backend is untrusted" + }, + "CVE-2018-20509": { + "cmt_msg": "binder: refactor binder ref inc/dec for thread safety" + }, + "CVE-2024-24864": { + "cmt_msg": "" + }, + "CVE-2022-45885": { + "cmt_msg": "" + }, + "CVE-2022-33744": { + "cmt_msg": "xen/arm: Fix race in RB-tree based P2M accounting" + }, + "CVE-2023-52596": { + "cmt_msg": "sysctl: Fix out of bounds access for empty sysctl registers" + }, + "CVE-2023-52597": { + "cmt_msg": "KVM: s390: fix setting of fpc register" + }, + "CVE-2017-18193": { + "cmt_msg": "f2fs: fix a bug caused by NULL extent tree" + }, + "CVE-2022-40768": { + "cmt_msg": "scsi: stex: Properly zero out the passthrough command structure" + }, + "CVE-2023-52593": { + "cmt_msg": "wifi: wfx: fix possible NULL pointer dereference in wfx_set_mfp_ap()" + }, + "CVE-2021-47158": { + "cmt_msg": "net: dsa: sja1105: add error handling in sja1105_setup()" + }, + "CVE-2023-52591": { + "cmt_msg": "reiserfs: Avoid touching renamed directory if parent does not change" + }, + "CVE-2022-1280": { + "cmt_msg": "drm: avoid circular locks in drm_mode_getconnector" + }, + "CVE-2020-12888": { + "cmt_msg": "vfio-pci: Invalidate mmaps and block MMIO access on disabled memory" + }, + "CVE-2021-47153": { + "cmt_msg": "i2c: i801: Don't generate an interrupt on bus reset" + }, + "CVE-2023-52598": { + "cmt_msg": "s390/ptrace: handle setting of fpc register correctly" + }, + "CVE-2021-47151": { + "cmt_msg": "interconnect: qcom: bcm-voter: add a missing of_node_put()" + }, + "CVE-2021-46936": { + "cmt_msg": "net: fix use-after-free in tw_timer_handler" + }, + "CVE-2016-6198": { + "cmt_msg": "vfs: add vfs_select_inode() helper" + }, + "CVE-2021-0447": { + "cmt_msg": "l2tp: protect sock pointer of struct pppol2tp_session with RCU" + }, + "CVE-2022-41218": { + "cmt_msg": "media: dvb-core: Fix UAF due to refcount races at releasing" + }, + "CVE-2020-14331": { + "cmt_msg": "vgacon: Fix for missing check in scrollback handling" + }, + "CVE-2022-36946": { + "cmt_msg": "netfilter: nf_queue: do not allow packet truncation below transport header offset" + }, + "CVE-2021-45485": { + "cmt_msg": "ipv6: use prandom_u32() for ID generation" + }, + "CVE-2021-0448": { + "cmt_msg": "netfilter: ctnetlink: add a range check for l3/l4 protonum" + }, + "CVE-2016-6197": { + "cmt_msg": "ovl: verify upper dentry before unlink and rename" + }, + "CVE-2021-46939": { + "cmt_msg": "tracing: Restructure trace_clock_global() to never block" + }, + "CVE-2020-29374": { + "cmt_msg": "gup: document and work around \"COW can break either way\" issue" + }, + "CVE-2020-0030": { + "cmt_msg": "ANDROID: binder: synchronize_rcu() when using POLLFREE." + }, + "CVE-2015-8709": { + "cmt_msg": "mm: Add a user_ns owner to mm_struct and fix ptrace permission checks" + }, + "CVE-2017-6001": { + "cmt_msg": "perf/core: Fix concurrent sys_perf_event_open() vs. 'move_group' race" + }, + "CVE-2023-52449": { + "cmt_msg": "mtd: Fix gluebi NULL pointer dereference caused by ftl notifier" + }, + "CVE-2021-29650": { + "cmt_msg": "netfilter: x_tables: Use correct memory barriers." + }, + "CVE-2019-18806": { + "cmt_msg": "net: qlogic: Fix memory leak in ql_alloc_large_buffers" + }, + "CVE-2023-4010": { + "cmt_msg": "" + }, + "CVE-2018-20169": { + "cmt_msg": "USB: check usb_get_extra_descriptor for proper size" + }, + "CVE-2017-12762": { + "cmt_msg": "isdn/i4l: fix buffer overflow" + }, + "CVE-2021-33656": { + "cmt_msg": "vt: drop old FONT ioctls" + }, + "CVE-2016-9644": { + "cmt_msg": "x86/mm: Expand the exception table logic to allow new handling options" + }, + "CVE-2022-41849": { + "cmt_msg": "fbdev: smscufx: Fix use-after-free in ufx_ops_open()" + }, + "CVE-2022-41848": { + "cmt_msg": "" + }, + "CVE-2023-6356": { + "cmt_msg": "nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length" + }, + "CVE-2022-1353": { + "cmt_msg": "af_key: add __GFP_ZERO flag for compose_sadb_supported in function pfkey_register" + }, + "CVE-2015-8845": { + "cmt_msg": "powerpc/tm: Check for already reclaimed tasks" + }, + "CVE-2022-1198": { + "cmt_msg": "drivers: hamradio: 6pack: fix UAF bug caused by mod_timer()" + }, + "CVE-2022-1199": { + "cmt_msg": "ax25: Fix NULL pointer dereference in ax25_kill_by_device" + }, + "CVE-2015-8966": { + "cmt_msg": "[PATCH] arm: fix handling of F_OFD_... in oabi_fcntl64()" + }, + "CVE-2018-5750": { + "cmt_msg": "ACPI: sbshc: remove raw pointer from printk() message" + }, + "CVE-2021-39801": { + "cmt_msg": "" + }, + "CVE-2021-39800": { + "cmt_msg": "" + }, + "CVE-2015-8963": { + "cmt_msg": "perf: Fix race in swevent hash" + }, + "CVE-2019-3837": { + "cmt_msg": "net_dma: simple removal" + }, + "CVE-2018-16884": { + "cmt_msg": "sunrpc: use-after-free in svc_process_common()" + }, + "CVE-2022-1195": { + "cmt_msg": "hamradio: improve the incomplete fix to avoid NPD" + }, + "CVE-2024-22099": { + "cmt_msg": "Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security" + }, + "CVE-2021-4202": { + "cmt_msg": "NFC: reorganize the functions in nci_request" + }, + "CVE-2021-4203": { + "cmt_msg": "af_unix: fix races in sk_peer_pid and sk_peer_cred accesses" + }, + "CVE-2022-45887": { + "cmt_msg": "media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb()" + }, + "CVE-2022-45886": { + "cmt_msg": "media: dvb-core: Fix use-after-free due on race condition at dvb_net" + }, + "CVE-2023-52509": { + "cmt_msg": "ravb: Fix use-after-free issue in ravb_tx_timeout_work()" + }, + "CVE-2023-46343": { + "cmt_msg": "nfc: nci: fix possible NULL pointer dereference in send_acknowledge()" + }, + "CVE-2024-24859": { + "cmt_msg": "" + }, + "CVE-2019-15807": { + "cmt_msg": "scsi: libsas: delete sas port if expander discover failed" + }, + "CVE-2023-52507": { + "cmt_msg": "nfc: nci: assert requested protocol is valid" + }, + "CVE-2023-2124": { + "cmt_msg": "xfs: verify buffer contents when we skip log replay" + }, + "CVE-2023-52501": { + "cmt_msg": "ring-buffer: Do not attempt to read past \"commit\"" + }, + "CVE-2023-52500": { + "cmt_msg": "scsi: pm80xx: Avoid leaking tags when processing OPC_INB_SET_CONTROLLER_CONFIG command" + }, + "CVE-2023-52502": { + "cmt_msg": "net: nfc: fix races in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn()" + }, + "CVE-2021-44879": { + "cmt_msg": "f2fs: fix to do sanity check on inode type during garbage collection" + }, + "CVE-2019-15505": { + "cmt_msg": "media: technisat-usb2: break out of loop at end of buffer" + }, + "CVE-2023-2513": { + "cmt_msg": "ext4: fix use-after-free in ext4_xattr_set_entry" + }, + "CVE-2017-1000": { + "cmt_msg": "udp: consistently apply ufo or fragmentation" + }, + "CVE-2020-11609": { + "cmt_msg": "media: stv06xx: add missing descriptor sanity checks" + }, + "CVE-2022-27672": { + "cmt_msg": "x86/speculation: Identify processors vulnerable to SMT RSB predictions" + }, + "CVE-2020-0429": { + "cmt_msg": "l2tp: fix race between l2tp_session_delete() and l2tp_tunnel_closeall()" + }, + "CVE-2024-26623": { + "cmt_msg": "pds_core: Prevent race issues involving the adminq" + }, + "CVE-2024-26719": { + "cmt_msg": "nouveau: offload fence uevents work to workqueue" + }, + "CVE-2022-2964": { + "cmt_msg": "net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup" + }, + "CVE-2017-0605": { + "cmt_msg": "tracing: Use strlcpy() instead of strcpy() in __trace_find_cmdline()" + }, + "CVE-2021-1048": { + "cmt_msg": "fix regression in \"epoll: Keep a reference on files added to the check list\"" + }, + "CVE-2014-9803": { + "cmt_msg": "Revert \"arm64: Introduce execute-only page access permissions\"" + }, + "CVE-2015-2877": { + "cmt_msg": "" + }, + "CVE-2020-9383": { + "cmt_msg": "floppy: check FDC index for errors before assigning it" + }, + "CVE-2024-26664": { + "cmt_msg": "hwmon: (coretemp) Fix out-of-bounds memory access" + }, + "CVE-2022-3586": { + "cmt_msg": "sch_sfb: Don't assume the skb is still around after enqueueing to child" + }, + "CVE-2023-32269": { + "cmt_msg": "netrom: Fix use-after-free caused by accept on already connected socket" + }, + "CVE-2023-1206": { + "cmt_msg": "tcp: Reduce chance of collisions in inet6_hashfn()." + }, + "CVE-2021-38198": { + "cmt_msg": "KVM: X86: MMU: Use the correct inherited permissions to get shadow page" + }, + "CVE-2024-26689": { + "cmt_msg": "ceph: prevent use-after-free in encode_cap_msg()" + }, + "CVE-2017-5972": { + "cmt_msg": "tcp: do not lock listener to process SYN packets" + }, + "CVE-2020-8832": { + "cmt_msg": "drm/i915: Record the default hw state after reset upon load" + }, + "CVE-2023-1513": { + "cmt_msg": "kvm: initialize all of the kvm_debugregs structure before sending it to userspace" + }, + "CVE-2023-52508": { + "cmt_msg": "nvme-fc: Prevent null pointer dereference in nvme_fc_io_getuuid()" + }, + "CVE-2015-4004": { + "cmt_msg": "staging: ozwpan: Remove from tree" + }, + "CVE-2021-26401": { + "cmt_msg": "x86/speculation: Use generic retpoline by default on AMD" + }, + "CVE-2024-1312": { + "cmt_msg": "mm: lock_vma_under_rcu() must check vma->anon_vma under vma lock" + }, + "CVE-2015-4001": { + "cmt_msg": "ozwpan: Use unsigned ints to prevent heap overflow" + }, + "CVE-2018-1130": { + "cmt_msg": "dccp: check sk for closed state in dccp_sendmsg()" + }, + "CVE-2023-52442": { + "cmt_msg": "ksmbd: validate session id and tree id in compound request" + }, + "CVE-2019-14284": { + "cmt_msg": "floppy: fix div-by-zero in setup_format_params" + }, + "CVE-2020-36557": { + "cmt_msg": "vt: vt_ioctl: fix VT_DISALLOCATE freeing in-use virtual console" + }, + "CVE-2021-3506": { + "cmt_msg": "f2fs: fix to avoid out-of-bounds memory access" + }, + "CVE-2011-4917": { + "cmt_msg": "" + }, + "CVE-2011-4916": { + "cmt_msg": "" + }, + "CVE-2019-14283": { + "cmt_msg": "floppy: fix out-of-bounds read in copy_buffer" + }, + "CVE-2019-3901": { + "cmt_msg": "perf/core: Fix perf_event_open() vs. execve() race" + }, + "CVE-2020-36558": { + "cmt_msg": "vt: vt_ioctl: fix race in VT_RESIZEX" + }, + "CVE-2019-19528": { + "cmt_msg": "USB: iowarrior: fix use-after-free on disconnect" + }, + "CVE-2019-19533": { + "cmt_msg": "media: ttusb-dec: Fix info-leak in ttusb_dec_send_command()" + }, + "CVE-2018-13100": { + "cmt_msg": "f2fs: fix to do sanity check with secs_per_zone" + }, + "CVE-2017-16646": { + "cmt_msg": "media: dib0700: fix invalid dvb_detach argument" + }, + "CVE-2017-16645": { + "cmt_msg": "Input: ims-psu - check if CDC union descriptor is sane" + }, + "CVE-2017-16643": { + "cmt_msg": "Input: gtco - fix potential out-of-bound access" + }, + "CVE-2017-16649": { + "cmt_msg": "net: cdc_ether: fix divide by 0 on bad descriptors" + }, + "CVE-2023-31083": { + "cmt_msg": "Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO" + }, + "CVE-2019-5489": { + "cmt_msg": "Change mincore() to count \"mapped\" pages rather than \"cached\" pages" + }, + "CVE-2021-47082": { + "cmt_msg": "tun: avoid double free in tun_free_netdev" + }, + "CVE-2017-16648": { + "cmt_msg": "dvb_frontend: don't use-after-free the frontend struct" + }, + "CVE-2018-10880": { + "cmt_msg": "ext4: never move the system.data xattr out of the inode body" + }, + "CVE-2018-10881": { + "cmt_msg": "ext4: clear i_data in ext4_inode_info when removing inline data" + }, + "CVE-2018-10882": { + "cmt_msg": "ext4: add more inode number paranoia checks" + }, + "CVE-2018-10883": { + "cmt_msg": "jbd2: don't mark block as modified if the handle is out of credits" + } + } + }, + "3.14": { + "3.14": { + "CVE-2014-0077": { + "cmt_msg": "vhost: fix total length when packets are too short", + "cmt_id": "d8316f3991d207fe32881a9ac20241be8fa2bad0" + }, + "CVE-2014-2568": { + "cmt_msg": "core, nfqueue, openvswitch: Orphan frags in skb_zerocopy and handle errors", + "cmt_id": "36d5fe6a000790f56039afe26834265db0a3ad4c" + }, + "CVE-2014-0055": { + "cmt_msg": "vhost: validate vhost_get_vq_desc return value", + "cmt_id": "a39ee449f96a2cd44ce056d8a0a112211a9b1a1f" + } + }, + "3.14.1": { + "CVE-2014-2678": { + "cmt_msg": "rds: prevent dereference of a NULL device in rds_iw_laddr_check", + "cmt_id": "eb3d1ebaa77c257872264015644f182c7888c021" + }, + "CVE-2014-2580": { + "cmt_msg": "xen-netback: disable rogue vif in kthread context", + "cmt_id": "7caaadd87daa11474872b63ff4edf745c6cb8550" + } + }, + "3.14.2": { + "CVE-2014-7283": { + "cmt_msg": "xfs: fix directory hash ordering bug", + "cmt_id": "7de24f7b0ddb815d7a8375354a9612264092edcb" + } + }, + "3.14.3": { + "CVE-2014-3122": { + "cmt_msg": "mm: try_to_unmap_cluster() should lock_page() before mlocking", + "cmt_id": "9eef7172d412d1886b51f8c75b7e9b71c50203e3" + }, + "CVE-2014-2739": { + "cmt_msg": "IB/core: Don't resolve passive side RoCE L2 address in CMA REQ handler", + "cmt_id": "5daac1bcbb85cbf03e7e7d3cafeeb31977d82113" + } + }, + "3.14.4": { + "CVE-2014-1738": { + "cmt_msg": "floppy: don't write kernel-only members to FDRAWCMD ioctl output", + "cmt_id": "b487c62505afbd87654773562fbf2e89bcd52147" + }, + "CVE-2014-0155": { + "cmt_msg": "KVM: ioapic: fix assignment of ioapic->rtc_status.pending_eoi (CVE-2014-0155)", + "cmt_id": "f8944acc97ceebf902e5b26b900aefef987ab4be" + }, + "CVE-2014-0196": { + "cmt_msg": "n_tty: Fix n_tty_write crash when echoing in raw mode", + "cmt_id": "6d194d6e0d832e622d87b8dab4e2122c555a82e9" + }, + "CVE-2014-1737": { + "cmt_msg": "floppy: ignore kernel-only members in FDRAWCMD ioctl input", + "cmt_id": "fb9a2011887416ffdc576d10711dc196343aab69" + } + }, + "3.14.5": { + "CVE-2014-3144": { + "cmt_msg": "filter: prevent nla extensions to peek beyond the end of the message", + "cmt_id": "72beb5639e05f940135ed00bc2fa0200d62074a6" + }, + "CVE-2014-3145": { + "cmt_msg": "filter: prevent nla extensions to peek beyond the end of the message", + "cmt_id": "72beb5639e05f940135ed00bc2fa0200d62074a6" + }, + "CVE-2014-9715": { + "cmt_msg": "netfilter: nf_conntrack: reserve two bytes for nf_ct_ext->len", + "cmt_id": "7a6f558b35e2b196eca1d40b48d37e8bcdc73d19" + }, + "CVE-2014-7284": { + "cmt_msg": "net: avoid dependency of net_get_random_once on nop patching", + "cmt_id": "adeb3fe4ef6621793d7f1d6f0b9c9cc88827c5b7" + }, + "CVE-2014-2851": { + "cmt_msg": "net: ipv4: current group_info should be put after using.", + "cmt_id": "2089f7346ae535fa444853426adfafef25107247" + } + }, + "3.14.6": { + "CVE-2014-1739": { + "cmt_msg": "media-device: fix infoleak in ioctl media_enum_entities()", + "cmt_id": "429f444ee6aea8146c115dded7b8b0214cea5e2d" + }, + "CVE-2014-3153": { + "cmt_msg": "futex: Make lookup_pi_state more robust", + "cmt_id": "b1f9d594668d008cacd5679cfde675dcdb9f5f8f" + } + }, + "3.14.7": { + "CVE-2014-3940": { + "cmt_msg": "mm: add !pte_present() check on existing hugetlb_entry callbacks", + "cmt_id": "395982ce12b3aba14a197ead3e5828e77e11aec1" + } + }, + "3.14.8": { + "CVE-2014-3917": { + "cmt_msg": "auditsc: audit_krule mask accesses need bounds checking", + "cmt_id": "732eafc78bba8e18a51c169f3dc7f33cddcdc401" + }, + "CVE-2014-4157": { + "cmt_msg": "MIPS: asm: thread_info: Add _TIF_SECCOMP flag", + "cmt_id": "2cbbc2f411bebb054f258c648272f38e2a23e052" + }, + "CVE-2014-4014": { + "cmt_msg": "fs,userns: Change inode_capable to capable_wrt_inode_uidgid", + "cmt_id": "5bacea89dc8dfd3f7d7dfbed798f3b41d4f53c78" + } + }, + "3.14.9": { + "CVE-2014-0181": { + "cmt_msg": "net: Use netlink_ns_capable to verify the permisions of netlink messages", + "cmt_id": "be0ef855baab7248d0fc71cdf78a47fcfd3708f1" + }, + "CVE-2014-4611": { + "cmt_msg": "lz4: ensure length does not wrap", + "cmt_id": "5f32449c2863adf190b83402e9a4069cee054f9d" + }, + "CVE-2014-4667": { + "cmt_msg": "sctp: Fix sk_ack_backlog wrap-around problem", + "cmt_id": "4c6c201fa9aa76b57b98c993826c4bd9ecb0f264" + }, + "CVE-2014-9914": { + "cmt_msg": "ipv4: fix a race in ip4_datagram_release_cb()", + "cmt_id": "3480c0154964f155afef8abceb1118debaf3d5b3" + }, + "CVE-2014-4655": { + "cmt_msg": "ALSA: control: Fix replacing user controls", + "cmt_id": "99e6d92ad48b8df440f9466c82c839b74ce95dcd" + }, + "CVE-2014-4654": { + "cmt_msg": "ALSA: control: Fix replacing user controls", + "cmt_id": "99e6d92ad48b8df440f9466c82c839b74ce95dcd" + }, + "CVE-2014-4656": { + "cmt_msg": "ALSA: control: Handle numid overflow", + "cmt_id": "8e1853b436edc41ee4e0214cf5a2fc04201915f8" + }, + "CVE-2014-4653": { + "cmt_msg": "ALSA: control: Don't access controls outside of protected regions", + "cmt_id": "1637a83bb15491efb3e7c8cd746471ef3710e79d" + }, + "CVE-2014-4652": { + "cmt_msg": "ALSA: control: Protect user controls against concurrent access", + "cmt_id": "d8e2983ef545510f39b3b67d639d807672ee0893" + } + }, + "3.14.10": { + "CVE-2014-4508": { + "cmt_msg": "x86_32, entry: Do syscall exit work on badsys (CVE-2014-4508)", + "cmt_id": "b83627d417975fa8681344384ac55a1c4751f55f" + }, + "CVE-2014-0206": { + "cmt_msg": "aio: fix kernel memory disclosure in io_getevents() introduced in v3.10", + "cmt_id": "aa011e29c725b391e614ee7babe6f890a00e3fc5" + } + }, + "3.14.11": { + "CVE-2014-4699": { + "cmt_msg": "ptrace,x86: force IRET path after a ptrace_stop()", + "cmt_id": "b897eba830537e68a1a0a4b741c975ff705a4662" + } + }, + "3.14.14": { + "CVE-2014-4171": { + "cmt_msg": "shmem: fix faulting into a hole while it's punched", + "cmt_id": "dd78e88404ef8091f5f0132a53fdc084b3a6080b" + } + }, + "3.14.15": { + "CVE-2014-3534": { + "cmt_msg": "s390/ptrace: fix PSW mask check", + "cmt_id": "1967b156fd85702f52c5cffaaf7f8f03332ef49e" + }, + "CVE-2014-5045": { + "cmt_msg": "fs: umount on symlink leaks mnt count", + "cmt_id": "9b32e18d7ba2838991794893f10bf48805ef01ce" + } + }, + "3.14.17": { + "CVE-2014-5077": { + "cmt_msg": "net: sctp: inherit auth_capable on INIT collisions", + "cmt_id": "672fcd4d4631dc45c650cad3576f880c0907e2e3" + } + }, + "3.14.18": { + "CVE-2014-5472": { + "cmt_msg": "isofs: Fix unbounded recursion when processing relocated directories", + "cmt_id": "3ca762283e2af911674dea8c54631d2d45b04dbf" + }, + "CVE-2014-5471": { + "cmt_msg": "isofs: Fix unbounded recursion when processing relocated directories", + "cmt_id": "3ca762283e2af911674dea8c54631d2d45b04dbf" + }, + "CVE-2014-3182": { + "cmt_msg": "HID: logitech: perform bounds checking on device_id early enough", + "cmt_id": "b165b85cb5359d7d223b6d4fa645302891c44013" + }, + "CVE-2014-3184": { + "cmt_msg": "HID: fix a couple of off-by-ones", + "cmt_id": "1de1376b8e805c553d28354c9ae5d5fddb8bbff8" + }, + "CVE-2014-3185": { + "cmt_msg": "USB: whiteheat: Added bounds checking for bulk command response", + "cmt_id": "ebc8083c7fe92a2a4ab8eed0572882c3dfd3746a" + }, + "CVE-2014-3601": { + "cmt_msg": "kvm: iommu: fix the third parameter of kvm_iommu_put_pages (CVE-2014-3601)", + "cmt_id": "42a1927a7a1d9e9992a7d1cd43a797e461019e01" + } + }, + "3.14.19": { + "CVE-2014-3631": { + "cmt_msg": "KEYS: Fix termination condition in assoc array garbage collection", + "cmt_id": "1143261f66aec99fdfbc98903b55d51bb55572a1" + }, + "CVE-2014-6418": { + "cmt_msg": "libceph: do not hard code max auth ticket len", + "cmt_id": "9956752afa398ea6e0c9c69b258be6afd73da4b1" + }, + "CVE-2014-5207": { + "cmt_msg": "mnt: Correct permission checks in do_remount", + "cmt_id": "92ecaf8784ebb728f2b147f5bfd9af5aa8a35f4e" + }, + "CVE-2014-5206": { + "cmt_msg": "mnt: Only change user settable mount flags in remount", + "cmt_id": "98e68ce8f4a6d3ad72243eecd1022ba120b515d2" + }, + "CVE-2014-6417": { + "cmt_msg": "libceph: do not hard code max auth ticket len", + "cmt_id": "9956752afa398ea6e0c9c69b258be6afd73da4b1" + }, + "CVE-2014-6416": { + "cmt_msg": "libceph: do not hard code max auth ticket len", + "cmt_id": "9956752afa398ea6e0c9c69b258be6afd73da4b1" + } + }, + "3.14.20": { + "CVE-2014-3181": { + "cmt_msg": "HID: magicmouse: sanity check report size in raw_event() callback", + "cmt_id": "6e4106ec619b16593d66ad6384f6f983d423ee0b" + }, + "CVE-2014-3186": { + "cmt_msg": "HID: picolcd: sanity check report size in raw_event() callback", + "cmt_id": "2c40d59997ed0b885ac31862e21cb5b84a3e7dca" + } + }, + "3.14.21": { + "CVE-2014-6410": { + "cmt_msg": "udf: Avoid infinite loop when processing indirect ICBs", + "cmt_id": "82335226733fdf82ee3f231c08269a17fd62a3fc" + } + }, + "3.14.23": { + "CVE-2014-4608": { + "cmt_msg": "lzo: check for length overrun in variable length encoding.", + "cmt_id": "7f5f71a9265d9829577393d9005b165f28b1cd77" + }, + "CVE-2014-7975": { + "cmt_msg": "fs: Add a missing permission check to do_umount", + "cmt_id": "dc3980ea4ad9d8d0b63b3cde732c9b95750208ce" + } + }, + "3.14.24": { + "CVE-2014-3647": { + "cmt_msg": "KVM: x86: Emulator fixes for eip canonical checks on near branches", + "cmt_id": "6dae4910cabb03b3a677facd8d1768fc47eef6ae" + }, + "CVE-2014-3646": { + "cmt_msg": "kvm: vmx: handle invvpid vm exit gracefully", + "cmt_id": "8b74c6f87d4baf5e48e44af2f90cda91ed7b848e" + }, + "CVE-2014-7970": { + "cmt_msg": "mnt: Prevent pivot_root from creating a loop in the mount tree", + "cmt_id": "f78da43d95e7331e4b6bb983eb393e404d51f372" + }, + "CVE-2014-3610": { + "cmt_msg": "KVM: x86: Check non-canonical addresses upon WRMSR", + "cmt_id": "44d1efb927e6dadb74b6620d1eed232708d75bac" + }, + "CVE-2014-3611": { + "cmt_msg": "KVM: x86: Improve thread safety in pit", + "cmt_id": "449a72277a5dc2a12cd114af3be81a56ad10cbd1" + }, + "CVE-2014-7826": { + "cmt_msg": "tracing/syscalls: Ignore numbers outside NR_syscalls' range", + "cmt_id": "14f83fe6c5d7cc0fcbaad7cbecb862fa48d92086" + }, + "CVE-2014-7825": { + "cmt_msg": "tracing/syscalls: Ignore numbers outside NR_syscalls' range", + "cmt_id": "14f83fe6c5d7cc0fcbaad7cbecb862fa48d92086" + } + }, + "3.14.25": { + "CVE-2014-3687": { + "cmt_msg": "net: sctp: fix panic on duplicate ASCONF chunks", + "cmt_id": "59ea8663e3a7fc3a0c2841e310b83f7aaec1c017" + }, + "CVE-2014-3673": { + "cmt_msg": "net: sctp: fix skb_over_panic when receiving malformed ASCONF chunks", + "cmt_id": "e36b6ac9e011205eb7ad3af329dbd27a21bacd50" + }, + "CVE-2014-3688": { + "cmt_msg": "net: sctp: fix remote memory pressure from excessive queueing", + "cmt_id": "75680aa393f12465fc10642d2d55be49a333d828" + }, + "CVE-2014-7841": { + "cmt_msg": "net: sctp: fix NULL pointer dereference in af->from_addr_param on malformed packet", + "cmt_id": "358905266ed83d4a9e693ae7ff86c1595220ec60" + }, + "CVE-2014-7843": { + "cmt_msg": "arm64: __clear_user: handle exceptions on strb", + "cmt_id": "c6f8075d3934e493980fe83f8a746d74b98f5e51" + }, + "CVE-2014-7842": { + "cmt_msg": "KVM: x86: Don't report guest userspace emulation error to userspace", + "cmt_id": "d8af79d3cb4a181d3265b1419e63828d2487b3df" + }, + "CVE-2014-8884": { + "cmt_msg": "ttusb-dec: buffer overflow in ioctl", + "cmt_id": "c8e0fd4818f29aaafafb01f0bacf376b86e82830" + } + }, + "3.14.26": { + "CVE-2014-9090": { + "cmt_msg": "x86_64, traps: Stop using IST for #SS", + "cmt_id": "c6328855c41c28b2a53c7c6821af60dd3b41ddba" + }, + "CVE-2014-9322": { + "cmt_msg": "x86_64, traps: Stop using IST for #SS", + "cmt_id": "c6328855c41c28b2a53c7c6821af60dd3b41ddba" + } + }, + "3.14.28": { + "CVE-2014-9419": { + "cmt_msg": "x86_64, switch_to(): Load TLS descriptors before switching DS and ES", + "cmt_id": "b7e804ab2e46308e54c0ec2b9e242271a455ddb8" + }, + "CVE-2014-9584": { + "cmt_msg": "isofs: Fix unchecked printing of ER records", + "cmt_id": "a3d4f59634f38d5236b182b403df74bbceeac7c9" + }, + "CVE-2014-9420": { + "cmt_msg": "isofs: Fix infinite looping over CE entries", + "cmt_id": "8190393a88f2b0321263a54f2a9eb5a2aa43be7e" + }, + "CVE-2014-8989": { + "cmt_msg": "userns: Don't allow setgroups until a gid mapping has been setablished", + "cmt_id": "f077e88fc9f0befcf0441be2fed9516881ab02ef" + }, + "CVE-2014-9683": { + "cmt_msg": "eCryptfs: Remove buggy and unnecessary write in file name decode routine", + "cmt_id": "a306ae6aaca17d46f63143c0c8a5f1c9cfe75b4b" + }, + "CVE-2014-8133": { + "cmt_msg": "x86/tls: Validate TLS entries to protect espfix", + "cmt_id": "aeb83c03a8f584ce0b9386761c22f145caced232" + }, + "CVE-2014-8134": { + "cmt_msg": "x86, kvm: Clear paravirt_enabled on KVM guests for espfix32's benefit", + "cmt_id": "c06c656494797804aa7f603df37208b61792d0d1" + } + }, + "3.14.29": { + "CVE-2014-9585": { + "cmt_msg": "x86_64, vdso: Fix the vdso address randomization algorithm", + "cmt_id": "67ff8e53620c9aa941a7e4abbbfd921b0c4f97f0" + } + }, + "3.14.30": { + "CVE-2014-9428": { + "cmt_msg": "batman-adv: Calculate extra tail size based on queued fragments", + "cmt_id": "73ef2a1c62d46a3260b0bceab99ca7b642f670dc" + } + }, + "3.14.31": { + "CVE-2014-9529": { + "cmt_msg": "KEYS: close race between key lookup and freeing", + "cmt_id": "cf69173f59163182c12e0ecbda52721397468763" + }, + "CVE-2014-9644": { + "cmt_msg": "crypto: include crypto- module prefix in template", + "cmt_id": "f6e8b55035cb1cc1b6ac054fbfed633177524362" + }, + "CVE-2013-7421": { + "cmt_msg": "crypto: prefix module autoloading with \"crypto-\"", + "cmt_id": "31c8446aacd8595a9de61610b2625bcf84e1b7aa" + } + }, + "3.14.33": { + "CVE-2014-3690": { + "cmt_msg": "x86,kvm,vmx: Preserve CR4 across VM entry", + "cmt_id": "5fb88e88031daf17e29ba5c679fe5ec4b8047e1a" + } + }, + "3.14.34": { + "CVE-2015-1421": { + "cmt_msg": "net: sctp: fix slab corruption from use after free on INIT collisions", + "cmt_id": "faf1368dedf9cc98ef35c9ec6d2677ff5e98b090" + } + }, + "3.14.35": { + "CVE-2015-1593": { + "cmt_msg": "x86, mm/ASLR: Fix stack randomization on 64-bit systems", + "cmt_id": "14a3e0c960668a161880301cb90f48f331117073" + } + }, + "3.14.36": { + "CVE-2015-2830": { + "cmt_msg": "x86/asm/entry/64: Remove a bogus 'ret_from_fork' optimization", + "cmt_id": "213c9f19d733b067b278901acf49d67e805a38b0" + } + }, + "3.14.37": { + "CVE-2016-0823": { + "cmt_msg": "pagemap: do not leak physical addresses to non-privileged userspace", + "cmt_id": "26f7f4d46a2cbfa6fbb633d228ec34cf969589d5" + }, + "CVE-2015-3331": { + "cmt_msg": "crypto: aesni - fix memory usage in GCM decryption", + "cmt_id": "e9b15363c10104a0823e5e2d360eab188f2b122f" + }, + "CVE-2015-2150": { + "cmt_msg": "xen-pciback: limit guest control of command register", + "cmt_id": "9cb8c24e612f1724fa85872205a1dfae7603d874" + } + }, + "3.14.39": { + "CVE-2015-2041": { + "cmt_msg": "net: llc: use correct size for sysctl timeout entries", + "cmt_id": "ecca64226ce2960280921e09ae33e90f82b5c408" + }, + "CVE-2015-2042": { + "cmt_msg": "net: rds: use correct size for max unacked packets and bytes", + "cmt_id": "2a9eb844a4c126b7e975a086f99f35699e88c011" + }, + "CVE-2015-3332": { + "cmt_msg": "tcp: Fix crash in TCP Fast Open", + "cmt_id": "79ea2bfc7d9cac1949bec2cb09b622becb7d54b6" + }, + "CVE-2014-8159": { + "cmt_msg": "IB/uverbs: Prevent integer overflow in ib_umem_get address arithmetic", + "cmt_id": "f40fc98d0b046ba153442b3bfd7887437f2ebd30" + } + }, + "3.14.40": { + "CVE-2014-8559": { + "cmt_msg": "move d_rcu from overlapping d_child to overlapping d_alias", + "cmt_id": "5c48ea64a86415fde0859267a194442d26d2e70c" + }, + "CVE-2014-8160": { + "cmt_msg": "netfilter: conntrack: disable generic tracking for known protocols", + "cmt_id": "efbf300ed821a533c3af71b1b122227febc28142" + }, + "CVE-2015-2922": { + "cmt_msg": "ipv6: Don't reduce hop limit for an interface", + "cmt_id": "01f69adac109867f892f12057660d891b34182f6" + }, + "CVE-2015-0239": { + "cmt_msg": "KVM: x86: SYSENTER emulation is broken", + "cmt_id": "ce5996929f2df50b1e37037a5a78d1269fbb5309" + } + }, + "3.14.41": { + "CVE-2015-6526": { + "cmt_msg": "powerpc/perf: Cap 64bit userspace backtraces to PERF_MAX_STACK_DEPTH", + "cmt_id": "83dffc246d8b217cd9f577a8859c97b6054806cb" + }, + "CVE-2017-1000253": { + "cmt_msg": "fs/binfmt_elf.c: fix bug in loading of PIE binaries", + "cmt_id": "3d262151b457c3af845e460bd32a746691898a53" + }, + "CVE-2015-3339": { + "cmt_msg": "fs: take i_mutex during prepare_binprm for set[ug]id executables", + "cmt_id": "de70236fbe30749fb8c317088c16a97e700fe232" + } + }, + "3.14.42": { + "CVE-2015-3636": { + "cmt_msg": "ipv4: Missing sk_nulls_node_init() in ping_unhash().", + "cmt_id": "f493b53864236c924b61ef3ccbb759ac46419a32" + } + }, + "3.14.44": { + "CVE-2015-1420": { + "cmt_msg": "vfs: read file_handle only once in handle_to_path", + "cmt_id": "be647ca464ebd9e54bd142da8150b31492aa1878" + } + }, + "3.14.45": { + "CVE-2015-4700": { + "cmt_msg": "x86: bpf_jit: fix compilation of large bpf programs", + "cmt_id": "4ca11e9fe811defdf228d7f579e77b5350c96d02" + }, + "CVE-2015-5366": { + "cmt_msg": "udp: fix behavior of wrong checksums", + "cmt_id": "542744f265e23eca08f14a8748a3cbf5feb56cdf" + }, + "CVE-2015-4003": { + "cmt_msg": "ozwpan: divide-by-zero leading to panic", + "cmt_id": "c352bbe0f4b610a9f9f1327a63fd558a840afc85" + }, + "CVE-2015-4002": { + "cmt_msg": "ozwpan: Use proper check to prevent heap overflow", + "cmt_id": "b440eec2f2729ef6b224030894ea8880f2937371" + }, + "CVE-2015-5364": { + "cmt_msg": "udp: fix behavior of wrong checksums", + "cmt_id": "542744f265e23eca08f14a8748a3cbf5feb56cdf" + } + }, + "3.14.47": { + "CVE-2014-7822": { + "cmt_msg": "->splice_write() via ->write_iter()", + "cmt_id": "b292fc7723b66d9796ae550b284223d95019ac44" + }, + "CVE-2015-2666": { + "cmt_msg": "x86/microcode/intel: Guard against stack overflow in the loader", + "cmt_id": "77544e78c388cc755c056f451b322dedba991c0a" + }, + "CVE-2015-8950": { + "cmt_msg": "arm64: dma-mapping: always clear allocated buffers", + "cmt_id": "22ff38e850b7fc87bdcccbebe92c3e7764ffe389" + }, + "CVE-2014-9710": { + "cmt_msg": "Btrfs: make xattr replace operations atomic", + "cmt_id": "02590fd855d1690568b2fa439c942e933221b57a" + } + }, + "3.14.48": { + "CVE-2015-3212": { + "cmt_msg": "sctp: fix ASCONF list handling", + "cmt_id": "21eceec537c215824aa5939c0a4aab4a5a8978a4" + } + }, + "3.14.49": { + "CVE-2015-1333": { + "cmt_msg": "KEYS: ensure we free the assoc array edit if edit is valid", + "cmt_id": "c9cd9b18dac801040ada16562dc579d5ac366d75" + }, + "CVE-2015-9289": { + "cmt_msg": "cx24116: fix a buffer overflow when checking userspace params", + "cmt_id": "5cceed3976af74c7565636f0dfbcd1fc6817dc5d" + } + }, + "3.14.50": { + "CVE-2015-6252": { + "cmt_msg": "vhost: actually track log eventfd file", + "cmt_id": "a0a45c374d8478fb4ec2e3b4949e394d75ceb11a" + }, + "CVE-2015-3288": { + "cmt_msg": "mm: avoid setting up anonymous pages into file mapping", + "cmt_id": "9f7fa1bc5fb4414a75ea451859154a9930e47daf" + } + }, + "3.14.51": { + "CVE-2015-4692": { + "cmt_msg": "kvm: x86: fix kvm_apic_has_events to check for NULL pointer", + "cmt_id": "c76b576d5e9c2966847b08fa634ed395ac8f97b8" + }, + "CVE-2015-5706": { + "cmt_msg": "path_openat(): fix double fput()", + "cmt_id": "88b4f377466cb673777d27693acf70108a908106" + }, + "CVE-2015-5697": { + "cmt_msg": "md: use kzalloc() when bitmap is disabled", + "cmt_id": "adbbaa36dd55ff0bde07391d898779760b5206df" + }, + "CVE-2015-5707": { + "cmt_msg": "sg_start_req(): make sure that there's not too many elements in iovec", + "cmt_id": "08ac1787579cb8bd9e7333836269e76801905597" + } + }, + "3.14.54": { + "CVE-2015-3291": { + "cmt_msg": "x86/nmi/64: Use DF to avoid userspace RSP confusing nested NMI detection", + "cmt_id": "5f521316a9d5c70842744b8f3f872ab1a932711b" + }, + "CVE-2015-3290": { + "cmt_msg": "x86/nmi/64: Switch stacks on userspace NMI entry", + "cmt_id": "66af900f21c6b0b1b59ac156245ca8d2b5d7b696" + }, + "CVE-2015-4167": { + "cmt_msg": "udf: Check length of extended attributes and allocation descriptors", + "cmt_id": "34820fc89c5e635b7381e4060931ca30a63d110a" + }, + "CVE-2015-5157": { + "cmt_msg": "x86/nmi/64: Switch stacks on userspace NMI entry", + "cmt_id": "66af900f21c6b0b1b59ac156245ca8d2b5d7b696" + }, + "CVE-2015-8746": { + "cmt_msg": "NFS: Fix a NULL pointer dereference of migration recovery ops for v4.2 client", + "cmt_id": "05c5d5c75b6e30af9b00ecd07eb9f2733741e8df" + }, + "CVE-2015-5283": { + "cmt_msg": "sctp: fix race on protocol/netns initialization", + "cmt_id": "62f575aaba7ae93a4e02029d30f9dcf69b84470f" + } + }, + "3.14.55": { + "CVE-2015-7613": { + "cmt_msg": "Initialize msg/shm IPC objects before doing ipc_addid()", + "cmt_id": "58c01a5074bc551a151b6b44f56ed40debd6b99d" + }, + "CVE-2015-5257": { + "cmt_msg": "USB: whiteheat: fix potential null-deref at probe", + "cmt_id": "fe6689e03318d5745d88328395fd326e08238533" + }, + "CVE-2015-2925": { + "cmt_msg": "dcache: Handle escaped paths in prepend_path", + "cmt_id": "cb1320693b9d8d32651a2bb7cd15498408732b8f" + } + }, + "3.14.57": { + "CVE-2015-4036": { + "cmt_msg": "vhost/scsi: potential memory corruption", + "cmt_id": "6c6216a01ac816230882c35de819e36ad1c40b0d" + } + }, + "3.14.58": { + "CVE-2015-5156": { + "cmt_msg": "virtio-net: drop NETIF_F_FRAGLIST", + "cmt_id": "6d419a0b5bcdfe5b2cc8821d11b102dba01b28f6" + }, + "CVE-2015-6937": { + "cmt_msg": "RDS: verify the underlying transport exists before creating a connection", + "cmt_id": "98a01278b20d7554be58dae60c9f25e62bcde9f6" + } + }, + "3.14.59": { + "CVE-2015-8543": { + "cmt_msg": "net: add validation for the socket syscall protocol argument", + "cmt_id": "49c9b76db37ecfbac70b0841438fbe9d446ceb52" + }, + "CVE-2016-0728": { + "cmt_msg": "KEYS: Fix keyring ref leak in join_session_keyring()", + "cmt_id": "2e647bca7a2c885acdcd89da631b8dd5edc9e310" + }, + "CVE-2015-7872": { + "cmt_msg": "KEYS: Fix crash when attempt to garbage collect an uninstantiated keyring", + "cmt_id": "aad1f1b859a047397ffe0f0044d12408b2df94c9" + }, + "CVE-2015-7550": { + "cmt_msg": "KEYS: Fix race between read and revoke", + "cmt_id": "92264cc9c4636340a492d78f8f2ae3b3424e7fdd" + }, + "CVE-2015-8569": { + "cmt_msg": "pptp: verify sockaddr_len in pptp_bind() and pptp_connect()", + "cmt_id": "0b21a04d1ff604297995fe4a21bde8ba7333d42c" + }, + "CVE-2015-8575": { + "cmt_msg": "bluetooth: Validate socket address length in sco_sock_bind().", + "cmt_id": "f32e7aeb2d4e7b6427dc0ab630b851eed38b6d0a" + }, + "CVE-2013-7446": { + "cmt_msg": "unix: avoid use-after-free in ep_remove_wait_queue", + "cmt_id": "9d054f57adc981a5f503d5eb9b259aa450b90dc5" + } + }, + "3.14.60": { + "CVE-2015-7799": { + "cmt_msg": "isdn_ppp: Add checks for allocation failure in isdn_ppp_open()", + "cmt_id": "b22b5281ff0fae948bda39e2ecb7c135410eeee5" + }, + "CVE-2015-8845": { + "cmt_msg": "powerpc/tm: Check for already reclaimed tasks", + "cmt_id": "70812a4226708100041da6715a1d5bb2e3aebc34" + }, + "CVE-2015-8844": { + "cmt_msg": "powerpc/tm: Block signal return setting invalid MSR state", + "cmt_id": "a327f0569b21b62942dc28aacb9dbbda236ef7a2" + }, + "CVE-2016-2545": { + "cmt_msg": "ALSA: timer: Fix double unlink of active_list", + "cmt_id": "d7b84f78c7a0b8ba3fde43a64faf0d69ada4d987" + }, + "CVE-2016-2544": { + "cmt_msg": "ALSA: seq: Fix race at timer setup and close", + "cmt_id": "7038cd337653a65b779aeff9f161b937339b40e3" + }, + "CVE-2016-2547": { + "cmt_msg": "ALSA: timer: Harden slave timer list handling", + "cmt_id": "ac5f6f7d25339feacc5f1dc39d3100e5520e7ca2" + }, + "CVE-2016-2546": { + "cmt_msg": "ALSA: timer: Fix race among timer ioctls", + "cmt_id": "7510c77227536d85013016289c96dd1fe212db77" + }, + "CVE-2016-2543": { + "cmt_msg": "ALSA: seq: Fix missing NULL check at remove_events ioctl", + "cmt_id": "9174b70002e1497e93242de7570a842497b3de97" + }, + "CVE-2013-4312": { + "cmt_msg": "unix: properly account for FDs passed over unix sockets", + "cmt_id": "aa51d1c24ec3b6605f7cc7ef500c96cd71d7ef90" + }, + "CVE-2016-2549": { + "cmt_msg": "ALSA: hrtimer: Fix stall by hrtimer_cancel()", + "cmt_id": "73672733af0278e554eec8fc33de13b0d4a860be" + }, + "CVE-2016-2548": { + "cmt_msg": "ALSA: timer: Harden slave timer list handling", + "cmt_id": "ac5f6f7d25339feacc5f1dc39d3100e5520e7ca2" + } + }, + "3.14.61": { + "CVE-2016-2782": { + "cmt_msg": "USB: visor: fix null-deref at probe", + "cmt_id": "897d109d4b52532f7ecf24c4294f42d1e62b1289" + }, + "CVE-2016-2384": { + "cmt_msg": "ALSA: usb-audio: avoid freeing umidi object twice", + "cmt_id": "05dd81eafd796a5f1db09cc9fe2bff44cfd56dfe" + }, + "CVE-2016-2085": { + "cmt_msg": "EVM: Use crypto_memneq() for digest comparisons", + "cmt_id": "6121dabef629c5b584abd617bba87f420b7f4011" + }, + "CVE-2016-8646": { + "cmt_msg": "crypto: algif_hash - Only export and import on sockets with data", + "cmt_id": "d5cdc58aa3dca63c94e70c19199b795a362b0583" + }, + "CVE-2016-0723": { + "cmt_msg": "tty: Fix unsafe ldisc reference via ioctl(TIOCGETD)", + "cmt_id": "a08f833c45a2e803183ae82c153694711dccc16f" + }, + "CVE-2015-7566": { + "cmt_msg": "USB: serial: visor: fix crash on detecting device without write_urbs", + "cmt_id": "e3b75da93491acc980573d6f06472225f81c93fe" + } + }, + "3.14.62": { + "CVE-2015-8785": { + "cmt_msg": "fuse: break infinite loop in fuse_fill_write_pages()", + "cmt_id": "7b54d4eea25df0cac10c9ccf353b36a62253547d" + } + }, + "3.14.63": { + "CVE-2015-8812": { + "cmt_msg": "iw_cxgb3: Fix incorrectly returning error on success", + "cmt_id": "8e0cb6c1f8c403c189b45b969540284862b30f85" + }, + "CVE-2015-8215": { + "cmt_msg": "ipv6: addrconf: validate new MTU before applying it", + "cmt_id": "db449d873870aee9161edb9259d72254987ad7c0" + } + }, + "3.14.65": { + "CVE-2016-3044": { + "cmt_msg": "KVM: PPC: Book3S HV: Sanitize special-purpose register values on guest exit", + "cmt_id": "ef9dd54d0208f2bfb904f80a04bd963d10377b4e" + } + }, + "3.14.66": { + "CVE-2016-3137": { + "cmt_msg": "USB: cypress_m8: add endpoint sanity check", + "cmt_id": "59abff9d0ce434487cbfd8c25e75bb30d8be1a52" + }, + "CVE-2016-3689": { + "cmt_msg": "Input: ims-pcu - sanity check against missing interfaces", + "cmt_id": "665bbcb66051e1176a159d270e53d439f9dc8c80" + }, + "CVE-2016-9685": { + "cmt_msg": "xfs: fix two memory leaks in xfs_attr_list.c error paths", + "cmt_id": "8896de9c26019c13812015ccc5a4fc42c0e8402a" + }, + "CVE-2016-3140": { + "cmt_msg": "USB: digi_acceleport: do sanity checking for the number of ports", + "cmt_id": "91c4c149606657236e4a735778c7ca632e92bcd4" + }, + "CVE-2016-3136": { + "cmt_msg": "USB: mct_u232: add sanity checking in probe", + "cmt_id": "26f205bf2fa5aef26fd0762dbdf66198dfde924c" + }, + "CVE-2016-2185": { + "cmt_msg": "Input: ati_remote2 - fix crashes on detecting device with invalid descriptor", + "cmt_id": "52844be6f96c447577de40ea7d2f4019457a7dd9" + }, + "CVE-2016-2184": { + "cmt_msg": "ALSA: usb-audio: Fix NULL dereference in create_fixed_stream_quirk()", + "cmt_id": "7963d34edc58f8e40c0891262cac6e443346313f" + }, + "CVE-2016-2186": { + "cmt_msg": "Input: powermate - fix oops with malicious USB descriptors", + "cmt_id": "5c91a520b0d6d2700c96d3b8198d7e3cfddce538" + }, + "CVE-2016-3138": { + "cmt_msg": "USB: cdc-acm: more sanity checking", + "cmt_id": "180aa6e45eb471aec123854df40d787c634943eb" + } + }, + "3.14.67": { + "CVE-2016-7117": { + "cmt_msg": "net: Fix use after free in the recvmmsg exit path", + "cmt_id": "902b916d00ba73095b58a9a8dfe926c6a7f635d5" + }, + "CVE-2016-4805": { + "cmt_msg": "ppp: take reference on channels netns", + "cmt_id": "2d6c3459438d6c0bab867b79c35db7e154648ad1" + } + }, + "3.14.68": { + "CVE-2016-3157": { + "cmt_msg": "x86/iopl/64: Properly context-switch IOPL on Xen PV", + "cmt_id": "c216658f5fda233ae3c27f8fbfe3b2498ebe75ab" + }, + "CVE-2016-3955": { + "cmt_msg": "USB: usbip: fix potential out-of-bounds write", + "cmt_id": "c9104ee05af3ecb2943872287da3d576b145c55f" + }, + "CVE-2016-2187": { + "cmt_msg": "Input: gtco - fix crash on detecting device without endpoints", + "cmt_id": "f090502c9f10046d293508f022ed00796a541b37" + }, + "CVE-2016-0821": { + "cmt_msg": "include/linux/poison.h: fix LIST_POISON{1,2} offset", + "cmt_id": "703d87a503141999a6749263d0a8caf038ce5b75" + }, + "CVE-2016-7914": { + "cmt_msg": "assoc_array: don't call compare_object() on a node", + "cmt_id": "523ef4db4dc8f2bdbe10262a7931d01a0c02d560" + } + }, + "3.14.69": { + "CVE-2016-7916": { + "cmt_msg": "proc: prevent accessing /proc//environ until it's ready", + "cmt_id": "e9abb59f46beadb8d80d9e40c9c5e15b5e61b8d1" + } + }, + "3.14.70": { + "CVE-2016-4486": { + "cmt_msg": "net: fix infoleak in rtnetlink", + "cmt_id": "c1e797692b97ec480bc0e940cc022823e3cc40c9" + }, + "CVE-2016-2117": { + "cmt_msg": "atl2: Disable unimplemented scatter/gather feature", + "cmt_id": "d6b8a68ac7b6d2e241f8d34b769c98a1793d9124" + }, + "CVE-2016-4485": { + "cmt_msg": "net: fix infoleak in llc", + "cmt_id": "f3a0b05e04b862ffc549b5635339a5cee00da34d" + }, + "CVE-2016-4913": { + "cmt_msg": "get_rock_ridge_filename(): handle malformed NM entries", + "cmt_id": "dc7e3177f3cefcbecda0e4266cd554866ff2caea" + }, + "CVE-2016-4580": { + "cmt_msg": "net: fix a kernel infoleak in x25 module", + "cmt_id": "a1f85b3a66d74389417e86505013e51a06b789f0" + } + }, + "3.14.71": { + "CVE-2016-9754": { + "cmt_msg": "ring-buffer: Prevent overflow of size in ring_buffer_resize()", + "cmt_id": "50b139ab8606ebe66da507dddbc838baa5cfbf61" + } + }, + "3.14.73": { + "CVE-2016-4998": { + "cmt_msg": "netfilter: x_tables: check for bogus target offset", + "cmt_id": "f216289025f02e99628d6783f251f3a9d1966cad" + }, + "CVE-2016-3134": { + "cmt_msg": "netfilter: x_tables: fix unconditional helper", + "cmt_id": "a1a184a2f31575dba677514f2de22ddf1671ad81" + }, + "CVE-2016-4997": { + "cmt_msg": "netfilter: x_tables: check for bogus target offset", + "cmt_id": "f216289025f02e99628d6783f251f3a9d1966cad" + }, + "CVE-2016-9806": { + "cmt_msg": "netlink: Fix dump skb leak/double free", + "cmt_id": "33f04a1a2c102c19673b95709c0246509fd24f25" + }, + "CVE-2016-2847": { + "cmt_msg": "pipe: limit the per-user amount of pages allocated in pipes", + "cmt_id": "c098acd272f1323e47ca52ec016f1a62d26b6573" + } + }, + "3.14.74": { + "CVE-2016-5828": { + "cmt_msg": "powerpc/tm: Always reclaim in start_thread() for exec() class syscalls", + "cmt_id": "ff19f63ed47309550b47831ac39176d9910fadfe" + }, + "CVE-2016-1237": { + "cmt_msg": "posix_acl: Add set_posix_acl", + "cmt_id": "8977f46fff476e4a5c5ab270a78c9ab8b548d645" + }, + "CVE-2016-5829": { + "cmt_msg": "HID: hiddev: validate num_values for HIDIOCGUSAGES, HIDIOCSUSAGES commands", + "cmt_id": "22e658d19a1a64512d49de2632ad2124e6f9e429" + }, + "CVE-2016-4470": { + "cmt_msg": "KEYS: potential uninitialized variable", + "cmt_id": "ff1dcd2a19f8203324cba737a54707a1ee3f98ea" + } + }, + "3.14.75": { + "CVE-2016-4569": { + "cmt_msg": "ALSA: timer: Fix leak in SNDRV_TIMER_IOCTL_PARAMS", + "cmt_id": "a4eabc8c16004cc41f6a71c31cf7e349fa6efe50" + }, + "CVE-2016-4578": { + "cmt_msg": "ALSA: timer: Fix leak in events via snd_timer_user_ccallback", + "cmt_id": "414d03573fe4e942f07b1c3c8750227c6be0b061" + } + }, + "3.14.76": { + "CVE-2016-5696": { + "cmt_msg": "tcp: make challenge acks less predictable", + "cmt_id": "860c53258e634c54f70252c352bae7bac30724a9" + }, + "CVE-2016-4565": { + "cmt_msg": "IB/security: Restrict use of the write() interface", + "cmt_id": "c96c87e19293995d5adde47bb20ae827e8b73607" + }, + "CVE-2016-2069": { + "cmt_msg": "x86/mm: Add barriers and document switch_mm()-vs-flush synchronization", + "cmt_id": "1b8542cd64724bb7b61dcc0ccfe0ccbefff1bc2d" + }, + "CVE-2016-3951": { + "cmt_msg": "cdc_ncm: do not call usbnet_link_change from cdc_ncm_bind", + "cmt_id": "0c17e10854221a4b59bb0266f60cac96f2ad225a" + }, + "CVE-2017-7495": { + "cmt_msg": "ext4: fix data exposure after a crash", + "cmt_id": "6e853b165d44b259960e6c99e030962dda957475" + }, + "CVE-2015-8816": { + "cmt_msg": "USB: fix invalid memory access in hub_activate()", + "cmt_id": "627c25d08197bafc328d9ac841dfc1a143806a71" + }, + "CVE-2016-7910": { + "cmt_msg": "block: fix use-after-free in seq file", + "cmt_id": "8cb3a41575d84a56f9dd7686286aafd84e5313c3" + }, + "CVE-2016-3070": { + "cmt_msg": "mm: migrate dirty page without clear_page_dirty_for_io etc", + "cmt_id": "53a35fd395a1d7fdcab6477621358833ea27897b" + }, + "CVE-2015-8767": { + "cmt_msg": "sctp: Prevent soft lockup when sctp_accept() is called during a timeout event", + "cmt_id": "a4377c6e467b0b8420ee2d4384ae582ed506ee86" + }, + "CVE-2016-3857": { + "cmt_msg": "arm: oabi compat: add missing access checks", + "cmt_id": "e380a2712ff17b87a0fee55143862c998098144c" + } + }, + "3.14.77": { + "CVE-2016-10229": { + "cmt_msg": "udp: properly support MSG_PEEK with truncated buffers", + "cmt_id": "3acd7bf39cdb109aaaef2ec4819cca7088218a4b" + }, + "CVE-2016-4482": { + "cmt_msg": "USB: usbfs: fix potential infoleak in devio", + "cmt_id": "fd13a6831e1c770e20619efb48be360c24574717" + } + }, + "3.14.78": { + "CVE-2016-6480": { + "cmt_msg": "aacraid: Check size values after double-fetch from user", + "cmt_id": "67d4aa44188d0da7f661972a88f9ac448e4fd2fe" + } + }, + "3.14.79": { + "CVE-2016-6130": { + "cmt_msg": "s390/sclp_ctl: fix potential information leak with /dev/sclp", + "cmt_id": "78a4260f1fad5cfc6ad7cf6e01a93a2fed0d0e3e" + }, + "CVE-2016-5244": { + "cmt_msg": "rds: fix an infoleak in rds_inc_info_copy", + "cmt_id": "d57906c6850c5bb9a93841da3deb6df53135d133" + } + }, + "outstanding": { + "CVE-2019-15098": { + "cmt_msg": "ath6kl: fix a NULL-ptr-deref bug in ath6kl_usb_alloc_urb_from_pipe()" + }, + "CVE-2022-0001": { + "cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE" + }, + "CVE-2022-0002": { + "cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE" + }, + "CVE-2019-19965": { + "cmt_msg": "scsi: libsas: stop discovering if oob mode is disconnected" + }, + "CVE-2017-15102": { + "cmt_msg": "usb: misc: legousbtower: Fix NULL pointer deference" + }, + "CVE-2023-52615": { + "cmt_msg": "hwrng: core - Fix page fault dead lock on mmap-ed hwrng" + }, + "CVE-2023-52614": { + "cmt_msg": "PM / devfreq: Fix buffer overflow in trans_stat_show" + }, + "CVE-2023-52617": { + "cmt_msg": "PCI: switchtec: Fix stdev_release() crash after surprise hot remove" + }, + "CVE-2020-24587": { + "cmt_msg": "mac80211: prevent mixed key and fragment cache attacks" + }, + "CVE-2020-24586": { + "cmt_msg": "mac80211: prevent mixed key and fragment cache attacks" + }, + "CVE-2021-0129": { + "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical" + }, + "CVE-2020-24588": { + "cmt_msg": "cfg80211: mitigate A-MSDU aggregation attacks" + }, + "CVE-2023-52619": { + "cmt_msg": "pstore/ram: Fix crash when setting number of cpus to an odd number" + }, + "CVE-2023-52618": { + "cmt_msg": "block/rnbd-srv: Check for unlikely string overflow" + }, + "CVE-2018-10940": { + "cmt_msg": "cdrom: information leak in cdrom_ioctl_media_changed()" + }, + "CVE-2019-9506": { + "cmt_msg": "Bluetooth: Fix faulty expression for minimum encryption key size check" + }, + "CVE-2019-9503": { + "cmt_msg": "brcmfmac: add subtype check for event handling in data path" + }, + "CVE-2022-0480": { + "cmt_msg": "memcg: enable accounting for file lock caches" + }, + "CVE-2018-10124": { + "cmt_msg": "kernel/signal.c: avoid undefined behaviour in kill_something_info" + }, + "CVE-2022-23825": { + "cmt_msg": "" + }, + "CVE-2021-47112": { + "cmt_msg": "x86/kvm: Teardown PV features on boot CPU as well" + }, + "CVE-2021-47113": { + "cmt_msg": "btrfs: abort in rename_exchange if we fail to insert the second ref" + }, + "CVE-2021-47110": { + "cmt_msg": "x86/kvm: Disable kvmclock on all CPUs on shutdown" + }, + "CVE-2021-47116": { + "cmt_msg": "ext4: fix memory leak in ext4_mb_init_backend on error path." + }, + "CVE-2021-47117": { + "cmt_msg": "ext4: fix bug on in ext4_es_cache_extent as ext4_split_extent_at failed" + }, + "CVE-2021-47114": { + "cmt_msg": "ocfs2: fix data corruption by fallocate" + }, + "CVE-2021-47118": { + "cmt_msg": "pid: take a reference when initializing `cad_pid`" + }, + "CVE-2021-46970": { + "cmt_msg": "bus: mhi: pci_generic: Remove WQ_MEM_RECLAIM flag from state workqueue" + }, + "CVE-2019-10207": { + "cmt_msg": "Bluetooth: hci_uart: check for missing tty operations" + }, + "CVE-2023-0459": { + "cmt_msg": "uaccess: Add speculation barrier to copy_from_user()" + }, + "CVE-2023-0458": { + "cmt_msg": "prlimit: do_prlimit needs to have a speculation check" + }, + "CVE-2017-8924": { + "cmt_msg": "USB: serial: io_ti: fix information leak in completion handler" + }, + "CVE-2017-8925": { + "cmt_msg": "USB: serial: omninet: fix reference leaks at open" + }, + "CVE-2021-30002": { + "cmt_msg": "media: v4l: ioctl: Fix memory leak in video_usercopy" + }, + "CVE-2015-4177": { + "cmt_msg": "mnt: Fail collect_mounts when applied to unmounted mounts" + }, + "CVE-2017-7294": { + "cmt_msg": "drm/vmwgfx: fix integer overflow in vmw_surface_define_ioctl()" + }, + "CVE-2020-15802": { + "cmt_msg": "" + }, + "CVE-2022-3636": { + "cmt_msg": "net: ethernet: mtk_eth_soc: use after free in __mtk_ppe_check_skb()" + }, + "CVE-2022-3635": { + "cmt_msg": "atm: idt77252: fix use-after-free bugs caused by tst_timer" + }, + "CVE-2015-4178": { + "cmt_msg": "fs_pin: Allow for the possibility that m_list or s_list go unused." + }, + "CVE-2016-10906": { + "cmt_msg": "net: arc_emac: fix koops caused by sk_buff free" + }, + "CVE-2016-10905": { + "cmt_msg": "GFS2: don't set rgrp gl_object until it's inserted into rgrp tree" + }, + "CVE-2021-47028": { + "cmt_msg": "mt76: mt7915: fix txrate reporting" + }, + "CVE-2019-19966": { + "cmt_msg": "media: cpia2: Fix use-after-free in cpia2_exit" + }, + "CVE-2017-18261": { + "cmt_msg": "clocksource/drivers/arm_arch_timer: Avoid infinite recursion when ftrace is enabled" + }, + "CVE-2018-5814": { + "cmt_msg": "usbip: usbip_host: fix NULL-ptr deref and use-after-free errors" + }, + "CVE-2021-43389": { + "cmt_msg": "isdn: cpai: check ctr->cnr to avoid array index out of bound" + }, + "CVE-2023-1074": { + "cmt_msg": "sctp: fail if no bound addresses can be used for a given scope" + }, + "CVE-2023-1077": { + "cmt_msg": "sched/rt: pick_next_rt_entity(): check list_entry" + }, + "CVE-2023-40283": { + "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb" + }, + "CVE-2018-13093": { + "cmt_msg": "xfs: validate cached inodes are free when allocated" + }, + "CVE-2018-13096": { + "cmt_msg": "f2fs: fix to do sanity check with node footer and iblocks" + }, + "CVE-2018-13097": { + "cmt_msg": "f2fs: fix to do sanity check with user_block_count" + }, + "CVE-2018-13094": { + "cmt_msg": "xfs: don't call xfs_da_shrink_inode with NULL bp" + }, + "CVE-2018-13095": { + "cmt_msg": "xfs: More robust inode extent count validation" + }, + "CVE-2018-13098": { + "cmt_msg": "f2fs: fix to do sanity check with extra_attr feature" + }, + "CVE-2018-13099": { + "cmt_msg": "f2fs: fix to do sanity check with reserved blkaddr of inline inode" + }, + "CVE-2019-11884": { + "cmt_msg": "Bluetooth: hidp: fix buffer overflow" + }, + "CVE-2015-9016": { + "cmt_msg": "blk-mq: fix race between timeout and freeing request" + }, + "CVE-2019-18680": { + "cmt_msg": "" + }, + "CVE-2021-45868": { + "cmt_msg": "quota: check block number when reading the block in quota file" + }, + "CVE-2022-20158": { + "cmt_msg": "net/packet: fix slab-out-of-bounds access in packet_recvmsg()" + }, + "CVE-2020-0404": { + "cmt_msg": "media: uvcvideo: Avoid cyclic entity chains due to malformed USB descriptors" + }, + "CVE-2022-39188": { + "cmt_msg": "mmu_gather: Force tlb-flush VM_PFNMAP vmas" + }, + "CVE-2020-27067": { + "cmt_msg": "l2tp: fix l2tp_eth module loading" + }, + "CVE-2020-27066": { + "cmt_msg": "xfrm: policy: Fix doulbe free in xfrm_policy_timer" + }, + "CVE-2017-5986": { + "cmt_msg": "sctp: avoid BUG_ON on sctp_wait_for_sndbuf" + }, + "CVE-2017-0861": { + "cmt_msg": "ALSA: pcm: prevent UAF in snd_pcm_info" + }, + "CVE-2020-15393": { + "cmt_msg": "usb: usbtest: fix missing kfree(dev->buf) in usbtest_disconnect" + }, + "CVE-2021-3564": { + "cmt_msg": "Bluetooth: fix the erroneous flush_work() order" + }, + "CVE-2017-13080": { + "cmt_msg": "mac80211: accept key reinstall without changing anything" + }, + "CVE-2018-12127": { + "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" + }, + "CVE-2018-12126": { + "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" + }, + "CVE-2021-28964": { + "cmt_msg": "btrfs: fix race when cloning extent buffer during rewind of an old root" + }, + "CVE-2019-13631": { + "cmt_msg": "Input: gtco - bounds check collection indent level" + }, + "CVE-2017-2647": { + "cmt_msg": "KEYS: Remove key_type::match in favour of overriding default by match_preparse" + }, + "CVE-2018-12233": { + "cmt_msg": "jfs: Fix inconsistency between memory allocation and ea_buf->max_size" + }, + "CVE-2018-9465": { + "cmt_msg": "binder: fix proc->files use-after-free" + }, + "CVE-2020-8649": { + "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region" + }, + "CVE-2020-8648": { + "cmt_msg": "vt: selection, close sel_buffer race" + }, + "CVE-2020-8647": { + "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region" + }, + "CVE-2019-0154": { + "cmt_msg": "drm/i915: Lower RM timeout to avoid DSI hard hangs" + }, + "CVE-2023-52585": { + "cmt_msg": "drm/amdgpu: Fix possible NULL dereference in amdgpu_ras_query_error_status_helper()" + }, + "CVE-2023-52584": { + "cmt_msg": "spmi: mediatek: Fix UAF on device remove" + }, + "CVE-2023-52587": { + "cmt_msg": "IB/ipoib: Fix mcast list locking" + }, + "CVE-2023-52586": { + "cmt_msg": "drm/msm/dpu: Add mutex lock in control vblank irq" + }, + "CVE-2023-52583": { + "cmt_msg": "ceph: fix deadlock or deadcode of misusing dget()" + }, + "CVE-2023-52589": { + "cmt_msg": "media: rkisp1: Fix IRQ disable race issue" + }, + "CVE-2023-52588": { + "cmt_msg": "f2fs: fix to tag gcing flag on page during block migration" + }, + "CVE-2023-52340": { + "cmt_msg": "ipv6: remove max_size check inline with ipv4" + }, + "CVE-2020-16120": { + "cmt_msg": "ovl: switch to mounter creds in readdir" + }, + "CVE-2019-17666": { + "cmt_msg": "rtlwifi: Fix potential overflow on P2P code" + }, + "CVE-2015-7885": { + "cmt_msg": "staging/dgnc: fix info leak in ioctl" + }, + "CVE-2021-34693": { + "cmt_msg": "can: bcm: fix infoleak in struct bcm_msg_head" + }, + "CVE-2020-11494": { + "cmt_msg": "slcan: Don't transmit uninitialized stack data in padding" + }, + "CVE-2024-26797": { + "cmt_msg": "drm/amd/display: Prevent potential buffer overflow in map_hw_resources" + }, + "CVE-2024-26791": { + "cmt_msg": "btrfs: dev-replace: properly validate device names" + }, + "CVE-2024-26793": { + "cmt_msg": "gtp: fix use-after-free and null-ptr-deref in gtp_newlink()" + }, + "CVE-2024-26798": { + "cmt_msg": "fbcon: always restore the old font data in fbcon_do_set_font()" + }, + "CVE-2021-38205": { + "cmt_msg": "net: xilinx_emaclite: Do not print real IOMEM pointer" + }, + "CVE-2020-0255": { + "cmt_msg": "selinux: properly handle multiple messages in selinux_netlink_send()" + }, + "CVE-2023-35001": { + "cmt_msg": "netfilter: nf_tables: prevent OOB access in nft_byteorder_eval" + }, + "CVE-2021-38208": { + "cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect" + }, + "CVE-2017-18232": { + "cmt_msg": "scsi: libsas: direct call probe and destruct" + }, + "CVE-2022-0168": { + "cmt_msg": "cifs: fix NULL ptr dereference in smb2_ioctl_query_info()" + }, + "CVE-2020-26556": { + "cmt_msg": "" + }, + "CVE-2018-9518": { + "cmt_msg": "NFC: llcp: Limit size of SDP URI" + }, + "CVE-2024-26778": { + "cmt_msg": "fbdev: savage: Error out if pixclock equals zero" + }, + "CVE-2020-26555": { + "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical" + }, + "CVE-2024-26776": { + "cmt_msg": "spi: hisi-sfc-v3xx: Return IRQ_NONE if no interrupts were detected" + }, + "CVE-2024-26777": { + "cmt_msg": "fbdev: sis: Error out if pixclock equals zero" + }, + "CVE-2020-26558": { + "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical" + }, + "CVE-2018-9516": { + "cmt_msg": "HID: debug: check length before copy_to_user()" + }, + "CVE-2023-3397": { + "cmt_msg": "" + }, + "CVE-2024-26773": { + "cmt_msg": "ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found()" + }, + "CVE-2024-26770": { + "cmt_msg": "HID: nvidia-shield: Add missing null pointer checks to LED initialization" + }, + "CVE-2024-26771": { + "cmt_msg": "dmaengine: ti: edma: Add some null pointer checks to the edma_probe" + }, + "CVE-2023-28746": { + "cmt_msg": "x86/mmio: Disable KVM mitigation when X86_FEATURE_CLEAR_CPU_BUF is set" + }, + "CVE-2017-5754": { + "cmt_msg": "x86/cpufeatures: Add Intel feature bits for Speculation Control" + }, + "CVE-2021-47119": { + "cmt_msg": "ext4: fix memory leak in ext4_fill_super" + }, + "CVE-2016-10200": { + "cmt_msg": "l2tp: fix racy SOCK_ZAPPED flag check in l2tp_ip{,6}_bind()" + }, + "CVE-2017-5753": { + "cmt_msg": "x86/cpufeatures: Add X86_BUG_SPECTRE_V[12]" + }, + "CVE-2019-9466": { + "cmt_msg": "brcmfmac: add subtype check for event handling in data path" + }, + "CVE-2022-0382": { + "cmt_msg": "net ticp:fix a kernel-infoleak in __tipc_sendmsg()" + }, + "CVE-2023-32233": { + "cmt_msg": "netfilter: nf_tables: deactivate anonymous set from preparation phase" + }, + "CVE-2019-15222": { + "cmt_msg": "ALSA: usb-audio: Fix gpf in snd_usb_pipe_sanity_check" + }, + "CVE-2019-15223": { + "cmt_msg": "ALSA: line6: Assure canceling delayed work at disconnection" + }, + "CVE-2019-15220": { + "cmt_msg": "p54usb: Fix race between disconnect and firmware loading" + }, + "CVE-2019-15221": { + "cmt_msg": "ALSA: line6: Fix write on zero-sized buffer" + }, + "CVE-2022-1016": { + "cmt_msg": "netfilter: nf_tables: initialize registers in nft_do_chain()" + }, + "CVE-2022-1011": { + "cmt_msg": "fuse: fix pipe buffer lifetime for direct_io" + }, + "CVE-2022-1012": { + "cmt_msg": "secure_seq: use the 64 bits of the siphash for port offset calculation" + }, + "CVE-2023-52620": { + "cmt_msg": "netfilter: nf_tables: disallow timeout for anonymous sets" + }, + "CVE-2023-52621": { + "cmt_msg": "bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers" + }, + "CVE-2023-52622": { + "cmt_msg": "ext4: avoid online resizing failures due to oversized flex bg" + }, + "CVE-2023-52623": { + "cmt_msg": "SUNRPC: Fix a suspicious RCU usage warning" + }, + "CVE-2023-52624": { + "cmt_msg": "drm/amd/display: Wake DMCUB before executing GPINT commands" + }, + "CVE-2023-52625": { + "cmt_msg": "drm/amd/display: Refactor DMCUB enter/exit idle interface" + }, + "CVE-2023-52629": { + "cmt_msg": "sh: push-switch: Reorder cleanup operations to avoid use-after-free bug" + }, + "CVE-2016-9555": { + "cmt_msg": "sctp: validate chunk len before actually using it" + }, + "CVE-2022-0492": { + "cmt_msg": "cgroup-v1: Require capabilities to set release_agent" + }, + "CVE-2020-12352": { + "cmt_msg": "Bluetooth: A2MP: Fix not initializing all members" + }, + "CVE-2021-43976": { + "cmt_msg": "mwifiex: Fix skb_over_panic in mwifiex_usb_recv()" + }, + "CVE-2022-0494": { + "cmt_msg": "block-map: add __GFP_ZERO flag for alloc_page in function bio_copy_kern" + }, + "CVE-2021-47101": { + "cmt_msg": "asix: fix uninit-value in asix_mdio_read()" + }, + "CVE-2021-47103": { + "cmt_msg": "inet: fully convert sk->sk_rx_dst to RCU rules" + }, + "CVE-2021-46982": { + "cmt_msg": "f2fs: compress: fix race condition of overwrite vs truncate" + }, + "CVE-2007-3719": { + "cmt_msg": "" + }, + "CVE-2023-3863": { + "cmt_msg": "net: nfc: Fix use-after-free caused by nfc_llcp_find_local" + }, + "CVE-2019-19319": { + "cmt_msg": "ext4: protect journal inode's blocks using block_validity" + }, + "CVE-2022-3628": { + "cmt_msg": "wifi: brcmfmac: Fix potential buffer overflow in brcmf_fweh_event_worker()" + }, + "CVE-2022-3629": { + "cmt_msg": "vsock: Fix memory leak in vsock_connect()" + }, + "CVE-2022-3621": { + "cmt_msg": "nilfs2: fix NULL pointer dereference at nilfs_bmap_lookup_at_level()" + }, + "CVE-2022-23960": { + "cmt_msg": "ARM: report Spectre v2 status through sysfs" + }, + "CVE-2022-3624": { + "cmt_msg": "bonding: fix reference count leak in balance-alb mode" + }, + "CVE-2019-11091": { + "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" + }, + "CVE-2023-4921": { + "cmt_msg": "net: sched: sch_qfq: Fix UAF in qfq_dequeue()" + }, + "CVE-2017-15649": { + "cmt_msg": "packet: in packet_do_bind, test fanout with bind_lock held" + }, + "CVE-2023-1829": { + "cmt_msg": "net/sched: Retire tcindex classifier" + }, + "CVE-2019-19227": { + "cmt_msg": "appletalk: Fix potential NULL pointer dereference in unregister_snap_client" + }, + "CVE-2024-0775": { + "cmt_msg": "ext4: improve error recovery code paths in __ext4_remount()" + }, + "CVE-2016-9604": { + "cmt_msg": "KEYS: Disallow keyrings beginning with '.' to be joined as session keyrings" + }, + "CVE-2021-0941": { + "cmt_msg": "bpf: Remove MTU check in __bpf_skb_max_len" + }, + "CVE-2015-4176": { + "cmt_msg": "mnt: Update detach_mounts to leave mounts connected" + }, + "CVE-2017-15868": { + "cmt_msg": "Bluetooth: bnep: bnep_add_connection() should verify that it's dealing with l2cap socket" + }, + "CVE-2015-9004": { + "cmt_msg": "perf: Tighten (and fix) the grouping condition" + }, + "CVE-2020-14381": { + "cmt_msg": "futex: Fix inode life-time issue" + }, + "CVE-2019-19768": { + "cmt_msg": "blktrace: Protect q->blk_trace with RCU" + }, + "CVE-2022-20141": { + "cmt_msg": "igmp: Add ip_mc_list lock in ip_check_mc_rcu" + }, + "CVE-2023-23455": { + "cmt_msg": "net: sched: atm: dont intepret cls results when asked to drop" + }, + "CVE-2023-23454": { + "cmt_msg": "net: sched: cbq: dont intepret cls results when asked to drop" + }, + "CVE-2022-20148": { + "cmt_msg": "f2fs: fix UAF in f2fs_available_free_memory" + }, + "CVE-2023-6932": { + "cmt_msg": "ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet" + }, + "CVE-2018-8781": { + "cmt_msg": "drm: udl: Properly check framebuffer mmap offsets" + }, + "CVE-2017-15265": { + "cmt_msg": "ALSA: seq: Fix use-after-free at creating a port" + }, + "CVE-2018-5995": { + "cmt_msg": "printk: hash addresses printed with %p" + }, + "CVE-2022-2153": { + "cmt_msg": "KVM: x86: Avoid theoretical NULL pointer dereference in kvm_irq_delivery_to_apic_fast()" + }, + "CVE-2024-2193": { + "cmt_msg": "" + }, + "CVE-2018-12930": { + "cmt_msg": "" + }, + "CVE-2018-12931": { + "cmt_msg": "" + }, + "CVE-2021-28972": { + "cmt_msg": "PCI: rpadlpar: Fix potential drc_name corruption in store functions" + }, + "CVE-2020-36780": { + "cmt_msg": "i2c: sprd: fix reference leak when pm_runtime_get_sync fails" + }, + "CVE-2020-36781": { + "cmt_msg": "i2c: imx: fix reference leak when pm_runtime_get_sync fails" + }, + "CVE-2017-13167": { + "cmt_msg": "ALSA: timer: Fix race at concurrent reads" + }, + "CVE-2017-13166": { + "cmt_msg": "media: v4l2-ioctl.c: use check_fmt for enum/g/s/try_fmt" + }, + "CVE-2024-26647": { + "cmt_msg": "drm/amd/display: Fix late derefrence 'dsc' check in 'link_set_dsc_pps_packet()'" + }, + "CVE-2017-13168": { + "cmt_msg": "scsi: sg: mitigate read/write abuse" + }, + "CVE-2019-0148": { + "cmt_msg": "i40e: Wrong truncation from u16 to u8" + }, + "CVE-2016-3156": { + "cmt_msg": "ipv4: Don't do expensive useless work during inetdev destroy." + }, + "CVE-2019-17075": { + "cmt_msg": "RDMA/cxgb4: Do not dma memory off of the stack" + }, + "CVE-2023-20588": { + "cmt_msg": "x86/CPU/AMD: Do not leak quotient data after a division by 0" + }, + "CVE-2018-3693": { + "cmt_msg": "ext4: fix spectre gadget in ext4_mb_regular_allocator()" + }, + "CVE-2022-44033": { + "cmt_msg": "char: pcmcia: remove all the drivers" + }, + "CVE-2022-44032": { + "cmt_msg": "char: pcmcia: remove all the drivers" + }, + "CVE-2021-3609": { + "cmt_msg": "can: bcm: delay release of struct bcm_op after synchronize_rcu()" + }, + "CVE-2017-13305": { + "cmt_msg": "KEYS: encrypted: fix buffer overread in valid_master_desc()" + }, + "CVE-2021-46904": { + "cmt_msg": "net: hso: fix null-ptr-deref during tty device unregistration" + }, + "CVE-2019-11478": { + "cmt_msg": "tcp: tcp_fragment() should apply sane memory limits" + }, + "CVE-2019-20096": { + "cmt_msg": "dccp: Fix memleak in __feat_register_sp" + }, + "CVE-2018-6554": { + "cmt_msg": "staging: irda: remove the irda network stack and drivers" + }, + "CVE-2018-6555": { + "cmt_msg": "staging: irda: remove the irda network stack and drivers" + }, + "CVE-2016-7097": { + "cmt_msg": "posix_acl: Clear SGID bit when setting file permissions" + }, + "CVE-2019-9213": { + "cmt_msg": "mm: enforce min addr even if capable() in expand_downwards()" + }, + "CVE-2019-14896": { + "cmt_msg": "libertas: Fix two buffer overflows at parsing bss descriptor" + }, + "CVE-2019-14897": { + "cmt_msg": "libertas: Fix two buffer overflows at parsing bss descriptor" + }, + "CVE-2019-14895": { + "cmt_msg": "mwifiex: fix possible heap overflow in mwifiex_process_country_ie()" + }, + "CVE-2024-26784": { + "cmt_msg": "pmdomain: arm: Fix NULL dereference on scmi_perf_domain removal" + }, + "CVE-2024-26789": { + "cmt_msg": "crypto: arm64/neonbs - fix out-of-bounds access on short input" + }, + "CVE-2020-0067": { + "cmt_msg": "f2fs: fix to avoid memory leakage in f2fs_listxattr" + }, + "CVE-2020-0066": { + "cmt_msg": "netlink: Trim skb to alloc size to avoid MSG_TRUNC" + }, + "CVE-2020-26541": { + "cmt_msg": "certs: Add EFI_CERT_X509_GUID support for dbx entries" + }, + "CVE-2019-20794": { + "cmt_msg": "" + }, + "CVE-2024-26769": { + "cmt_msg": "nvmet-fc: avoid deadlock on delete association path" + }, + "CVE-2024-26768": { + "cmt_msg": "LoongArch: Change acpi_core_pic[NR_CPUS] to acpi_core_pic[MAX_CORE_PIC]" + }, + "CVE-2024-26765": { + "cmt_msg": "LoongArch: Disable IRQ before init_fn() for nonboot CPUs" + }, + "CVE-2024-26764": { + "cmt_msg": "fs/aio: Restrict kiocb_set_cancel_fn() to I/O submitted via libaio" + }, + "CVE-2024-26767": { + "cmt_msg": "drm/amd/display: fixed integer types and null check locations" + }, + "CVE-2024-26766": { + "cmt_msg": "IB/hfi1: Fix sdma.h tx->num_descs off-by-one error" + }, + "CVE-2024-26763": { + "cmt_msg": "dm-crypt: don't modify the data when using authenticated encryption" + }, + "CVE-2017-18551": { + "cmt_msg": "i2c: core-smbus: prevent stack corruption on read I2C_BLOCK_DATA" + }, + "CVE-2017-18552": { + "cmt_msg": "RDS: validate the requested traces user input against max supported" + }, + "CVE-2019-9457": { + "cmt_msg": "exec: Limit arg stack to at most 75% of _STK_LIM" + }, + "CVE-2019-9456": { + "cmt_msg": "usb: usbmon: Read text within supplied buffer size" + }, + "CVE-2023-51043": { + "cmt_msg": "drm/atomic: Fix potential use-after-free in nonblocking commits" + }, + "CVE-2022-2978": { + "cmt_msg": "fs: fix UAF/GPF bug in nilfs_mdt_destroy" + }, + "CVE-2019-9453": { + "cmt_msg": "f2fs: fix to avoid accessing xattr across the boundary" + }, + "CVE-2023-20569": { + "cmt_msg": "x86/bugs: Increase the x86 bugs vector size to two u32s" + }, + "CVE-2023-46838": { + "cmt_msg": "xen-netback: don't produce zero-size SKB frags" + }, + "CVE-2019-9458": { + "cmt_msg": "media: v4l: event: Prevent freeing event subscriptions while accessed" + }, + "CVE-2023-45862": { + "cmt_msg": "USB: ene_usb6250: Allocate enough memory for full object" + }, + "CVE-2023-45863": { + "cmt_msg": "kobject: Fix slab-out-of-bounds in fill_kobj_path()" + }, + "CVE-2023-52639": { + "cmt_msg": "KVM: s390: vsie: fix race during shadow creation" + }, + "CVE-2023-52638": { + "cmt_msg": "can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock" + }, + "CVE-2019-15239": { + "cmt_msg": "" + }, + "CVE-2023-52635": { + "cmt_msg": "PM / devfreq: Synchronize devfreq_monitor_[start/stop]" + }, + "CVE-2023-52634": { + "cmt_msg": "drm/amd/display: Fix disable_otg_wa logic" + }, + "CVE-2023-52633": { + "cmt_msg": "um: time-travel: fix time corruption" + }, + "CVE-2023-52632": { + "cmt_msg": "drm/amdkfd: Fix lock dependency warning with srcu" + }, + "CVE-2017-9986": { + "cmt_msg": "sound: Retire OSS" + }, + "CVE-2017-9985": { + "cmt_msg": "ALSA: msnd: Optimize / harden DSP and MIDI loops" + }, + "CVE-2017-9984": { + "cmt_msg": "ALSA: msnd: Optimize / harden DSP and MIDI loops" + }, + "CVE-2021-47135": { + "cmt_msg": "mt76: mt7921: fix possible AOOB issue in mt7921_mcu_tx_rate_report" + }, + "CVE-2021-47136": { + "cmt_msg": "net: zero-initialize tc skb extension on allocation" + }, + "CVE-2021-47137": { + "cmt_msg": "net: lantiq: fix memory corruption in RX ring" + }, + "CVE-2021-47131": { + "cmt_msg": "net/tls: Fix use-after-free after the TLS device goes down and up" + }, + "CVE-2021-47133": { + "cmt_msg": "HID: amd_sfh: Fix memory leak in amd_sfh_work" + }, + "CVE-2023-0386": { + "cmt_msg": "ovl: fail on invalid uid/gid mapping at copy up" + }, + "CVE-2016-6136": { + "cmt_msg": "audit: fix a double fetch in audit_log_single_execve_arg()" + }, + "CVE-2022-42896": { + "cmt_msg": "Bluetooth: L2CAP: Fix accepting connection request for invalid SPSM" + }, + "CVE-2022-42895": { + "cmt_msg": "Bluetooth: L2CAP: Fix attempting to access uninitialized memory" + }, + "CVE-2017-7618": { + "cmt_msg": "crypto: ahash - Fix EINPROGRESS notification callback" + }, + "CVE-2022-48626": { + "cmt_msg": "moxart: fix potential use-after-free on remove path" + }, + "CVE-2022-48627": { + "cmt_msg": "vt: fix memory overlapping when deleting chars in the buffer" + }, + "CVE-2022-48628": { + "cmt_msg": "ceph: drop messages from MDS when unmounting" + }, + "CVE-2017-7616": { + "cmt_msg": "mm/mempolicy.c: fix error handling in set_mempolicy and mbind." + }, + "CVE-2024-24859": { + "cmt_msg": "" + }, + "CVE-2017-1000112": { + "cmt_msg": "udp: consistently apply ufo or fragmentation" + }, + "CVE-2017-1000111": { + "cmt_msg": "packet: fix tp_reserve race in packet_set_ring" }, "CVE-2024-24855": { "cmt_msg": "scsi: lpfc: Fix a possible data race in lpfc_unregister_fcf_rescan()" }, - "CVE-2024-24857": { - "cmt_msg": "" + "CVE-2019-3892": { + "cmt_msg": "coredump: fix race condition between mmget_not_zero()/get_task_mm() and core dumping" + }, + "CVE-2021-29265": { + "cmt_msg": "usbip: fix stub_dev usbip_sockfd_store() races leading to gpf" + }, + "CVE-2022-3545": { + "cmt_msg": "nfp: fix use-after-free in area_cache_get()" + }, + "CVE-2021-21781": { + "cmt_msg": "ARM: ensure the signal page contains defined contents" + }, + "CVE-2023-1838": { + "cmt_msg": "Fix double fget() in vhost_net_set_backend()" + }, + "CVE-2023-1382": { + "cmt_msg": "tipc: set con sock in tipc_conn_alloc" + }, + "CVE-2018-14734": { + "cmt_msg": "infiniband: fix a possible use-after-free bug" + }, + "CVE-2018-8822": { + "cmt_msg": "staging: ncpfs: memory corruption in ncp_read_kernel()" + }, + "CVE-2023-6546": { + "cmt_msg": "tty: n_gsm: fix the UAF caused by race condition in gsm_cleanup_mux" + }, + "CVE-2020-14390": { + "cmt_msg": "fbcon: remove soft scrollback code" + }, + "CVE-2021-45469": { + "cmt_msg": "f2fs: fix to do sanity check on last xattr entry in __f2fs_setxattr()" + }, + "CVE-2017-7541": { + "cmt_msg": "brcmfmac: fix possible buffer overflow in brcmf_cfg80211_mgmt_tx()" + }, + "CVE-2017-7542": { + "cmt_msg": "ipv6: avoid overflow of offset in ip6_find_1stfragopt" + }, + "CVE-2024-0584": { + "cmt_msg": "ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet" + }, + "CVE-2020-0465": { + "cmt_msg": "HID: core: Sanitize event code and type when mapping input" + }, + "CVE-2020-0466": { + "cmt_msg": "do_epoll_ctl(): clean the failure exits up a bit" + }, + "CVE-2017-15274": { + "cmt_msg": "KEYS: fix dereferencing NULL payload with nonzero length" + }, + "CVE-2024-0340": { + "cmt_msg": "vhost: use kzalloc() instead of kmalloc() followed by memset()" + }, + "CVE-2019-19523": { + "cmt_msg": "USB: adutux: fix use-after-free on disconnect" + }, + "CVE-2019-11135": { + "cmt_msg": "x86/msr: Add the IA32_TSX_CTRL MSR" + }, + "CVE-2021-27365": { + "cmt_msg": "scsi: iscsi: Ensure sysfs attributes are limited to PAGE_SIZE" + }, + "CVE-2021-27364": { + "cmt_msg": "scsi: iscsi: Restrict sessions and handles to admin capabilities" + }, + "CVE-2021-27363": { + "cmt_msg": "scsi: iscsi: Restrict sessions and handles to admin capabilities" + }, + "CVE-2021-20321": { + "cmt_msg": "ovl: fix missing negative dentry check in ovl_rename()" + }, + "CVE-2017-5967": { + "cmt_msg": "time: Remove CONFIG_TIMER_STATS" + }, + "CVE-2022-3169": { + "cmt_msg": "nvme: ensure subsystem reset is single threaded" + }, + "CVE-2019-2054": { + "cmt_msg": "arm/ptrace: run seccomp after ptrace" + }, + "CVE-2018-20976": { + "cmt_msg": "xfs: clear sb->s_fs_info on mount failure" + }, + "CVE-2023-22995": { + "cmt_msg": "usb: dwc3: dwc3-qcom: Add missing platform_device_put() in dwc3_qcom_acpi_register_core" + }, + "CVE-2021-3542": { + "cmt_msg": "" + }, + "CVE-2017-16650": { + "cmt_msg": "net: qmi_wwan: fix divide by 0 on bad descriptors" + }, + "CVE-2018-12929": { + "cmt_msg": "" + }, + "CVE-2018-12928": { + "cmt_msg": "" + }, + "CVE-2020-36310": { + "cmt_msg": "KVM: SVM: avoid infinite loop on NPF from bad address" + }, + "CVE-2020-36313": { + "cmt_msg": "KVM: Fix out of range accesses to memslots" + }, + "CVE-2020-35519": { + "cmt_msg": "net/x25: prevent a couple of overflows" + }, + "CVE-2020-10708": { + "cmt_msg": "" + }, + "CVE-2018-5344": { + "cmt_msg": "loop: fix concurrent lo_open/lo_release" + }, + "CVE-2017-12153": { + "cmt_msg": "nl80211: check for the required netlink attributes presence" + }, + "CVE-2017-12154": { + "cmt_msg": "kvm: nVMX: Don't allow L2 to access the hardware CR8" + }, + "CVE-2022-21499": { + "cmt_msg": "lockdown: also lock down previous kgdb use" + }, + "CVE-2023-20593": { + "cmt_msg": "x86/cpu/amd: Add a Zenbleed fix" + }, + "CVE-2017-5549": { + "cmt_msg": "USB: serial: kl5kusb105: fix line-state error handling" + }, + "CVE-2022-2380": { + "cmt_msg": "video: fbdev: sm712fb: Fix crash in smtcfb_read()" + }, + "CVE-2022-0850": { + "cmt_msg": "ext4: fix kernel infoleak via ext4_extent_header" + }, + "CVE-2019-19447": { + "cmt_msg": "ext4: work around deleting a file with i_nlink == 0 safely" + }, + "CVE-2021-3612": { + "cmt_msg": "Input: joydev - prevent potential read overflow in ioctl" + }, + "CVE-2019-19448": { + "cmt_msg": "btrfs: only search for left_info if there is no right_info in try_merge_free_space" + }, + "CVE-2019-19449": { + "cmt_msg": "f2fs: fix to do sanity check on segment/section count" + }, + "CVE-2017-18360": { + "cmt_msg": "USB: serial: io_ti: fix div-by-zero in set_termios" + }, + "CVE-2023-30456": { + "cmt_msg": "KVM: nVMX: add missing consistency checks for CR0 and CR4" + }, + "CVE-2021-35477": { + "cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4" + }, + "CVE-2024-26758": { + "cmt_msg": "md: Don't ignore suspended array in md_check_recovery()" + }, + "CVE-2024-26759": { + "cmt_msg": "mm/swap: fix race when skipping swapcache" + }, + "CVE-2024-26752": { + "cmt_msg": "l2tp: pass correct message length to ip6_append_data" + }, + "CVE-2024-26756": { + "cmt_msg": "md: Don't register sync_thread for reshape directly" + }, + "CVE-2021-28038": { + "cmt_msg": "Xen/gnttab: handle p2m update errors on a per-slot basis" + }, + "CVE-2020-27068": { + "cmt_msg": "cfg80211: add missing policy for NL80211_ATTR_STATUS_CODE" + }, + "CVE-2020-14305": { + "cmt_msg": "netfilter: helpers: remove data_len usage for inkernel helpers" + }, + "CVE-2022-2964": { + "cmt_msg": "net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup" + }, + "CVE-2024-26689": { + "cmt_msg": "ceph: prevent use-after-free in encode_cap_msg()" + }, + "CVE-2022-2961": { + "cmt_msg": "" + }, + "CVE-2024-26686": { + "cmt_msg": "fs/proc: do_task_stat: use sig->stats_lock to gather the threads/children stats" + }, + "CVE-2024-26687": { + "cmt_msg": "xen/events: close evtchn after mapping cleanup" + }, + "CVE-2024-26685": { + "cmt_msg": "nilfs2: fix potential bug in end_buffer_async_write" + }, + "CVE-2023-45871": { + "cmt_msg": "igb: set max size RX buffer when store bad packet is enabled" + }, + "CVE-2020-12114": { + "cmt_msg": "make struct mountpoint bear the dentry reference to mountpoint, not struct mount" + }, + "CVE-2021-4218": { + "cmt_msg": "sysctl: pass kernel pointers to ->proc_handler" + }, + "CVE-2023-0266": { + "cmt_msg": "ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF" + }, + "CVE-2019-10142": { + "cmt_msg": "drivers/virt/fsl_hypervisor.c: prevent integer overflow in ioctl" + }, + "CVE-2023-52640": { + "cmt_msg": "fs/ntfs3: Fix oob in ntfs_listxattr" + }, + "CVE-2023-52641": { + "cmt_msg": "fs/ntfs3: Add NULL ptr dereference checking at the end of attr_allocate_frame()" + }, + "CVE-2021-0399": { + "cmt_msg": "" + }, + "CVE-2023-52489": { + "cmt_msg": "mm/sparsemem: fix race in accessing memory_section->usage" + }, + "CVE-2021-47070": { + "cmt_msg": "uio_hv_generic: Fix another memory leak in error handling paths" + }, + "CVE-2023-52484": { + "cmt_msg": "iommu/arm-smmu-v3: Fix soft lockup triggered by arm_smmu_mm_invalidate_range" + }, + "CVE-2020-2732": { + "cmt_msg": "KVM: nVMX: Don't emulate instructions in guest mode" + }, + "CVE-2023-52486": { + "cmt_msg": "drm: Don't unref the same fb many times by mistake due to deadlock handling" + }, + "CVE-2023-52480": { + "cmt_msg": "ksmbd: fix race condition between session lookup and expire" + }, + "CVE-2023-52481": { + "cmt_msg": "arm64: errata: Add Cortex-A520 speculative unprivileged load workaround" + }, + "CVE-2023-52482": { + "cmt_msg": "x86/srso: Add SRSO mitigation for Hygon processors" + }, + "CVE-2021-47128": { + "cmt_msg": "bpf, lockdown, audit: Fix buggy SELinux lockdown permission checks" + }, + "CVE-2017-6214": { + "cmt_msg": "tcp: avoid infinite loop in tcp_splice_read()" + }, + "CVE-2017-8065": { + "cmt_msg": "crypto: ccm - move cbcmac input off the stack" + }, + "CVE-2017-8064": { + "cmt_msg": "[media] dvb-usb-v2: avoid use-after-free" + }, + "CVE-2021-47122": { + "cmt_msg": "net: caif: fix memory leak in caif_device_notify" + }, + "CVE-2021-47121": { + "cmt_msg": "net: caif: fix memory leak in cfusbl_device_notify" + }, + "CVE-2021-47125": { + "cmt_msg": "sch_htb: fix refcount leak in htb_parent_to_leaf_offload" + }, + "CVE-2021-47124": { + "cmt_msg": "io_uring: fix link timeout refs" + }, + "CVE-2019-15118": { + "cmt_msg": "ALSA: usb-audio: Fix a stack buffer overflow bug in check_input_term" + }, + "CVE-2019-12818": { + "cmt_msg": "net: nfc: Fix NULL dereference on nfc_llcp_build_tlv fails" + }, + "CVE-2019-12819": { + "cmt_msg": "mdio_bus: Fix use-after-free on device_register fails" + }, + "CVE-2023-0394": { + "cmt_msg": "ipv6: raw: Deduct extension header length in rawv6_push_pending_frames" + }, + "CVE-2019-19332": { + "cmt_msg": "KVM: x86: fix out-of-bounds write in KVM_GET_EMULATED_CPUID (CVE-2019-19332)" + }, + "CVE-2019-15117": { + "cmt_msg": "ALSA: usb-audio: Fix an OOB bug in parse_audio_mixer_unit" + }, + "CVE-2020-3702": { + "cmt_msg": "ath: Use safer key clearing with key cache entries" + }, + "CVE-2023-3111": { + "cmt_msg": "btrfs: unset reloc control if transaction commit fails in prepare_to_relocate()" + }, + "CVE-2017-6951": { + "cmt_msg": "KEYS: Remove key_type::match in favour of overriding default by match_preparse" + }, + "CVE-2019-3882": { + "cmt_msg": "vfio/type1: Limit DMA mappings per container" + }, + "CVE-2024-24861": { + "cmt_msg": "media: xc4000: Fix atomicity violation in xc4000_get_frequency" + }, + "CVE-2018-20509": { + "cmt_msg": "binder: refactor binder ref inc/dec for thread safety" + }, + "CVE-2024-24864": { + "cmt_msg": "" + }, + "CVE-2017-9605": { + "cmt_msg": "drm/vmwgfx: Make sure backup_handle is always valid" + }, + "CVE-2022-36946": { + "cmt_msg": "netfilter: nf_queue: do not allow packet truncation below transport header offset" + }, + "CVE-2018-19824": { + "cmt_msg": "ALSA: usb-audio: Fix UAF decrement if card has no live interfaces in card.c" + }, + "CVE-2022-21166": { + "cmt_msg": "x86/speculation/mmio: Enable CPU Fill buffer clearing on idle" + }, + "CVE-2016-9191": { + "cmt_msg": "sysctl: Drop reference added by grab_header in proc_sys_readdir" + }, + "CVE-2021-29650": { + "cmt_msg": "netfilter: x_tables: Use correct memory barriers." + }, + "CVE-2018-20169": { + "cmt_msg": "USB: check usb_get_extra_descriptor for proper size" + }, + "CVE-2016-9644": { + "cmt_msg": "x86/mm: Expand the exception table logic to allow new handling options" + }, + "CVE-2022-28356": { + "cmt_msg": "llc: fix netdevice reference leaks in llc_ui_bind()" + }, + "CVE-2018-5750": { + "cmt_msg": "ACPI: sbshc: remove raw pointer from printk() message" + }, + "CVE-2022-20166": { + "cmt_msg": "drivers core: Use sysfs_emit and sysfs_emit_at for show(device *...) functions" + }, + "CVE-2019-10220": { + "cmt_msg": "Convert filldir[64]() from __put_user() to unsafe_put_user()" + }, + "CVE-2021-44879": { + "cmt_msg": "f2fs: fix to do sanity check on inode type during garbage collection" + }, + "CVE-2020-9383": { + "cmt_msg": "floppy: check FDC index for errors before assigning it" + }, + "CVE-2017-5972": { + "cmt_msg": "tcp: do not lock listener to process SYN packets" + }, + "CVE-2017-5970": { + "cmt_msg": "ipv4: keep skb->dst around in presence of IP options" + }, + "CVE-2023-1513": { + "cmt_msg": "kvm: initialize all of the kvm_debugregs structure before sending it to userspace" + }, + "CVE-2021-26401": { + "cmt_msg": "x86/speculation: Use generic retpoline by default on AMD" + }, + "CVE-2021-3847": { + "cmt_msg": "" + }, + "CVE-2019-9445": { + "cmt_msg": "f2fs: check if file namelen exceeds max value" + }, + "CVE-2019-20934": { + "cmt_msg": "sched/fair: Don't free p->numa_faults with concurrent readers" + }, + "CVE-2011-4916": { + "cmt_msg": "" + }, + "CVE-2023-23039": { + "cmt_msg": "" + }, + "CVE-2017-16646": { + "cmt_msg": "media: dib0700: fix invalid dvb_detach argument" + }, + "CVE-2017-16645": { + "cmt_msg": "Input: ims-psu - check if CDC union descriptor is sane" + }, + "CVE-2017-16643": { + "cmt_msg": "Input: gtco - fix potential out-of-bound access" + }, + "CVE-2019-5489": { + "cmt_msg": "Change mincore() to count \"mapped\" pages rather than \"cached\" pages" + }, + "CVE-2017-16649": { + "cmt_msg": "net: cdc_ether: fix divide by 0 on bad descriptors" + }, + "CVE-2017-16648": { + "cmt_msg": "dvb_frontend: don't use-after-free the frontend struct" + }, + "CVE-2020-36322": { + "cmt_msg": "fuse: fix bad inode" + }, + "CVE-2020-35508": { + "cmt_msg": "fork: fix copy_process(CLONE_PARENT) race with the exiting ->real_parent" + }, + "CVE-2020-35501": { + "cmt_msg": "" + }, + "CVE-2021-45095": { + "cmt_msg": "phonet: refcount leak in pep_sock_accep" + }, + "CVE-2023-3268": { + "cmt_msg": "relayfs: fix out-of-bounds access in relay_file_read" + }, + "CVE-2021-32399": { + "cmt_msg": "bluetooth: eliminate the potential race condition when removing the HCI controller" + }, + "CVE-2017-1000410": { + "cmt_msg": "Bluetooth: Prevent stack info leak from the EFS element." + }, + "CVE-2016-8650": { + "cmt_msg": "mpi: Fix NULL ptr dereference in mpi_powm() " + }, + "CVE-2016-2143": { + "cmt_msg": "s390/mm: four page table levels vs. fork" + }, + "CVE-2017-5551": { + "cmt_msg": "tmpfs: clear S_ISGID when setting posix ACLs" + }, + "CVE-2021-28688": { + "cmt_msg": "xen-blkback: don't leak persistent grants from xen_blkbk_map()" + }, + "CVE-2018-10878": { + "cmt_msg": "ext4: always check block group bounds in ext4_init_block_bitmap()" + }, + "CVE-2019-12379": { + "cmt_msg": "consolemap: Fix a memory leaking bug in drivers/tty/vt/consolemap.c" + }, + "CVE-2019-12378": { + "cmt_msg": "ipv6_sockglue: Fix a missing-check bug in ip6_ra_control()" + }, + "CVE-2016-6213": { + "cmt_msg": "mnt: Add a per mount namespace limit on the number of mounts" + }, + "CVE-2015-8551": { + "cmt_msg": "xen/pciback: Return error on XEN_PCI_OP_enable_msi when device has MSI or MSI-X enabled" + }, + "CVE-2015-8550": { + "cmt_msg": "xen: Add RING_COPY_REQUEST()" + }, + "CVE-2015-8553": { + "cmt_msg": "xen/pciback: Don't allow MSI-X ops if PCI_COMMAND_MEMORY is not set." + }, + "CVE-2015-8552": { + "cmt_msg": "xen/pciback: Return error on XEN_PCI_OP_enable_msi when device has MSI or MSI-X enabled" + }, + "CVE-2017-7895": { + "cmt_msg": "nfsd: stricter decoding of write-like NFSv2/v3 ops" + }, + "CVE-2020-26145": { + "cmt_msg": "ath10k: drop fragments with multicast DA for PCIe" + }, + "CVE-2017-13216": { + "cmt_msg": "staging: android: ashmem: fix a race condition in ASHMEM_SET_SIZE ioctl" + }, + "CVE-2017-13215": { + "cmt_msg": "crypto: algif_skcipher - Load TX SG list after waiting" + }, + "CVE-2020-26141": { + "cmt_msg": "ath10k: Fix TKIP Michael MIC verification for PCIe" + }, + "CVE-2020-26140": { + "cmt_msg": "" + }, + "CVE-2020-26143": { + "cmt_msg": "" + }, + "CVE-2020-26142": { + "cmt_msg": "" + }, + "CVE-2019-17053": { + "cmt_msg": "ieee802154: enforce CAP_NET_RAW for raw sockets" + }, + "CVE-2019-17052": { + "cmt_msg": "ax25: enforce CAP_NET_RAW for raw sockets" + }, + "CVE-2019-17056": { + "cmt_msg": "nfc: enforce CAP_NET_RAW for raw sockets" + }, + "CVE-2019-17055": { + "cmt_msg": "mISDN: enforce CAP_NET_RAW for raw sockets" + }, + "CVE-2019-17054": { + "cmt_msg": "appletalk: enforce CAP_NET_RAW for raw sockets" + }, + "CVE-2024-26745": { + "cmt_msg": "powerpc/pseries/iommu: IOMMU table is not initialized for kdump over SR-IOV" + }, + "CVE-2024-26744": { + "cmt_msg": "RDMA/srpt: Support specifying the srpt_service_guid parameter" + }, + "CVE-2024-26743": { + "cmt_msg": "RDMA/qedr: Fix qedr_create_user_qp error flow" + }, + "CVE-2020-29661": { + "cmt_msg": "tty: Fix ->pgrp locking in tiocspgrp()" + }, + "CVE-2020-29660": { + "cmt_msg": "tty: Fix ->session locking" + }, + "CVE-2024-26748": { + "cmt_msg": "usb: cdns3: fix memory double free when handle zero packet" + }, + "CVE-2023-28772": { + "cmt_msg": "seq_buf: Fix overflow in seq_buf_putmem_hex()" + }, + "CVE-2015-8955": { + "cmt_msg": "arm64: perf: reject groups spanning multiple HW PMUs" + }, + "CVE-2015-8952": { + "cmt_msg": "ext2: convert to mbcache2" + }, + "CVE-2024-26699": { + "cmt_msg": "drm/amd/display: Fix array-index-out-of-bounds in dcn35_clkmgr" + }, + "CVE-2024-26691": { + "cmt_msg": "KVM: arm64: Fix circular locking dependency" + }, + "CVE-2024-26697": { + "cmt_msg": "nilfs2: fix data corruption in dsync block recovery for small block sizes" + }, + "CVE-2024-26696": { + "cmt_msg": "nilfs2: fix hang in nilfs_lookup_dirty_data_buffers()" + }, + "CVE-2019-15927": { + "cmt_msg": "ALSA: usb-audio: Avoid access before bLength check in build_audio_procunit()" + }, + "CVE-2019-15926": { + "cmt_msg": "ath6kl: add some bounds checking" + }, + "CVE-2021-38160": { + "cmt_msg": "virtio_console: Assure used length from device is limited" + }, + "CVE-2019-15219": { + "cmt_msg": "USB: sisusbvga: fix oops in error path of sisusb_probe" + }, + "CVE-2019-15218": { + "cmt_msg": "media: usb: siano: Fix general protection fault in smsusb" + }, + "CVE-2005-3660": { + "cmt_msg": "" + }, + "CVE-2017-14106": { + "cmt_msg": "tcp: initialize rcv_mss to TCP_MIN_MSS instead of 0" + }, + "CVE-2019-15212": { + "cmt_msg": "USB: rio500: refuse more than one device at a time" + }, + "CVE-2019-15211": { + "cmt_msg": "media: radio-raremono: change devm_k*alloc to k*alloc" + }, + "CVE-2019-15217": { + "cmt_msg": "media: usb:zr364xx:Fix KASAN:null-ptr-deref Read in zr364xx_vidioc_querycap" + }, + "CVE-2019-15216": { + "cmt_msg": "USB: yurex: Fix protection fault after device removal" + }, + "CVE-2017-1000380": { + "cmt_msg": "ALSA: timer: Fix race between read and ioctl" + }, + "CVE-2019-15214": { + "cmt_msg": "ALSA: core: Fix card races between register and disconnect" + }, + "CVE-2019-19922": { + "cmt_msg": "sched/fair: Fix low cpu usage with high throttling by removing expiration of cpu-local slices" + }, + "CVE-2019-19927": { + "cmt_msg": "drm/ttm: fix incrementing the page pointer for huge pages" + }, + "CVE-2017-11176": { + "cmt_msg": "mqueue: fix a use-after-free in sys_mq_notify()" + }, + "CVE-2023-52498": { + "cmt_msg": "PM: sleep: Fix possible deadlocks in core system-wide PM code" + }, + "CVE-2022-2318": { + "cmt_msg": "net: rose: fix UAF bugs caused by timer handler" + }, + "CVE-2023-3611": { + "cmt_msg": "net/sched: sch_qfq: account for stab overhead in qfq_enqueue" + }, + "CVE-2016-3841": { + "cmt_msg": "ipv6: add complete rcu protection around np->opt" + }, + "CVE-2020-26560": { + "cmt_msg": "" + }, + "CVE-2023-4134": { + "cmt_msg": "Input: cyttsp4_core - change del_timer_sync() to timer_shutdown_sync()" + }, + "CVE-2017-9077": { + "cmt_msg": "ipv6/dccp: do not inherit ipv6_mc_list from parent" + }, + "CVE-2017-9076": { + "cmt_msg": "ipv6/dccp: do not inherit ipv6_mc_list from parent" + }, + "CVE-2017-9075": { + "cmt_msg": "sctp: do not inherit ipv6_{mc|ac|fl}_list from parent" + }, + "CVE-2017-9074": { + "cmt_msg": "ipv6: Prevent overrun when parsing v6 header options" + }, + "CVE-2022-20572": { + "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag" + }, + "CVE-2016-3961": { + "cmt_msg": "x86/mm/xen: Suppress hugetlbfs in PV guests" + }, + "CVE-2021-4083": { + "cmt_msg": "fget: check that the fd still exists after getting a ref to it" + }, + "CVE-2023-33288": { + "cmt_msg": "power: supply: bq24190: Fix use after free bug in bq24190_remove due to race condition" + }, + "CVE-2017-1000251": { + "cmt_msg": "Bluetooth: Properly check L2CAP config option output buffer length" + }, + "CVE-2022-29900": { + "cmt_msg": "x86/kvm/vmx: Make noinstr clean" + }, + "CVE-2022-29901": { + "cmt_msg": "x86/kvm/vmx: Make noinstr clean" + }, + "CVE-2023-3108": { + "cmt_msg": "crypto: fix af_alg_make_sg() conversion to iov_iter" + }, + "CVE-2023-52485": { + "cmt_msg": "drm/amd/display: Wake DMCUB before sending a command" + }, + "CVE-2018-20511": { + "cmt_msg": "net/appletalk: fix minor pointer leak to userspace in SIOCFINDIPDDPRT" + }, + "CVE-2018-20510": { + "cmt_msg": "binder: replace \"%p\" with \"%pK\"" + }, + "CVE-2016-5728": { + "cmt_msg": "misc: mic: Fix for double fetch security bug in VOP driver" + }, + "CVE-2022-3567": { + "cmt_msg": "ipv6: Fix data races around sk->sk_prot." + }, + "CVE-2022-3566": { + "cmt_msg": "tcp: Fix data races around icsk->icsk_af_ops." + }, + "CVE-2022-3565": { + "cmt_msg": "mISDN: fix use-after-free bugs in l1oip timer handlers" + }, + "CVE-2022-3564": { + "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free caused by l2cap_reassemble_sdu" + }, + "CVE-2018-7480": { + "cmt_msg": "blkcg: fix double free of new_blkg in blkcg_init_queue" + }, + "CVE-2023-0030": { + "cmt_msg": "drm/nouveau/mmu: add more general vmm free/node handling functions" + }, + "CVE-2019-11599": { + "cmt_msg": "coredump: fix race condition between mmget_not_zero()/get_task_mm() and core dumping" + }, + "CVE-2019-2101": { + "cmt_msg": "media: uvcvideo: Fix 'type' check leading to overflow" + }, + "CVE-2019-3459": { + "cmt_msg": "Bluetooth: Verify that l2cap_get_conf_opt provides large enough buffer" + }, + "CVE-2017-16526": { + "cmt_msg": "uwb: properly check kthread_run return value" + }, + "CVE-2017-16527": { + "cmt_msg": "ALSA: usb-audio: Kill stray URB at exiting" + }, + "CVE-2017-16525": { + "cmt_msg": "USB: serial: console: fix use-after-free after failed setup" + }, + "CVE-2022-1836": { + "cmt_msg": "floppy: disable FDRAWCMD by default" + }, + "CVE-2017-16528": { + "cmt_msg": "ALSA: seq: Cancel pending autoload work at unbinding device" + }, + "CVE-2017-16529": { + "cmt_msg": "ALSA: usb-audio: Check out-of-bounds access by corrupted buffer descriptor" + }, + "CVE-2019-2215": { + "cmt_msg": "ANDROID: binder: remove waitqueue when thread exits." + }, + "CVE-2019-2213": { + "cmt_msg": "binder: fix possible UAF when freeing buffer" + }, + "CVE-2018-1087": { + "cmt_msg": "kvm/x86: fix icebp instruction handling" + }, + "CVE-2022-3344": { + "cmt_msg": "KVM: x86: nSVM: harden svm_free_nested against freeing vmcb02 while still in use" + }, + "CVE-2018-13053": { + "cmt_msg": "alarmtimer: Prevent overflow for relative nanosleep" + }, + "CVE-2023-23559": { + "cmt_msg": "wifi: rndis_wlan: Prevent buffer overflow in rndis_query_oid" + }, + "CVE-2022-20369": { + "cmt_msg": "media: v4l2-mem2mem: Apply DST_QUEUE_OFF_BASE on MMAP buffers across ioctls" + }, + "CVE-2022-20368": { + "cmt_msg": "net/packet: fix slab-out-of-bounds access in packet_recvmsg()" + }, + "CVE-2022-3424": { + "cmt_msg": "misc: sgi-gru: fix use-after-free error in gru_set_context_option, gru_fault and gru_handle_user_call_os" + }, + "CVE-2016-2188": { + "cmt_msg": "USB: iowarrior: fix NULL-deref at probe" + }, + "CVE-2017-1000405": { + "cmt_msg": "mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d()" + }, + "CVE-2017-1000407": { + "cmt_msg": "KVM: VMX: remove I/O port 0x80 bypass on Intel hosts" + }, + "CVE-2019-13648": { + "cmt_msg": "powerpc/tm: Fix oops on sigreturn on systems without TM" + }, + "CVE-2022-24448": { + "cmt_msg": "NFSv4: Handle case where the lookup of a directory fails" + }, + "CVE-2020-0427": { + "cmt_msg": "pinctrl: devicetree: Avoid taking direct reference to device name string" + }, + "CVE-2015-7513": { + "cmt_msg": "KVM: x86: Reload pit counters for all channels when restoring state" + }, + "CVE-2015-7515": { + "cmt_msg": "Input: aiptek - fix crash on detecting device without endpoints" + }, + "CVE-2008-2544": { + "cmt_msg": "" + }, + "CVE-2023-2248": { + "cmt_msg": "net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg" + }, + "CVE-2017-18017": { + "cmt_msg": "netfilter: xt_TCPMSS: add more sanity tests on tcph->doff" + }, + "CVE-2021-3679": { + "cmt_msg": "tracing: Fix bug in rb_per_cpu_empty() that might cause deadloop." + }, + "CVE-2016-7042": { + "cmt_msg": "KEYS: Fix short sprintf buffer in /proc/keys show function" + }, + "CVE-2021-39714": { + "cmt_msg": "staging: android: ion: Drop ion_map_kernel interface" + }, + "CVE-2023-51782": { + "cmt_msg": "net/rose: Fix Use-After-Free in rose_ioctl" + }, + "CVE-2023-51780": { + "cmt_msg": "atm: Fix Use-After-Free in do_vcc_ioctl" + }, + "CVE-2023-51781": { + "cmt_msg": "appletalk: Fix Use-After-Free in atalk_ioctl" + }, + "CVE-2022-2588": { + "cmt_msg": "net_sched: cls_route: remove from list when handle is 0" + }, + "CVE-2019-18885": { + "cmt_msg": "btrfs: merge btrfs_find_device and find_device" + }, + "CVE-2017-7889": { + "cmt_msg": "mm: Tighten x86 /dev/mem with zeroing reads" + }, + "CVE-2017-14489": { + "cmt_msg": "scsi: scsi_transport_iscsi: fix the issue that iscsi_if_rx doesn't parse nlmsg properly" + }, + "CVE-2018-9422": { + "cmt_msg": "futex: Remove requirement for lock_page() in get_futex_key()" + }, + "CVE-2024-26733": { + "cmt_msg": "arp: Prevent overflow in arp_req_get()." + }, + "CVE-2024-26738": { + "cmt_msg": "powerpc/pseries/iommu: DLPAR add doesn't completely initialize pci_controller" + }, + "CVE-2024-26739": { + "cmt_msg": "net/sched: act_mirred: don't override retval if we already lost the skb" + }, + "CVE-2022-38096": { + "cmt_msg": "" + }, + "CVE-2017-5715": { + "cmt_msg": "x86/cpufeatures: Add X86_BUG_SPECTRE_V[12]" + }, + "CVE-2018-3620": { + "cmt_msg": "x86/microcode: Allow late microcode loading with SMT disabled" + }, + "CVE-2020-16166": { + "cmt_msg": "random32: update the net random state on interrupt and activity" + }, + "CVE-2021-33631": { + "cmt_msg": "ext4: fix kernel BUG in 'ext4_write_inline_data_end()'" + }, + "CVE-2019-15916": { + "cmt_msg": "net-sysfs: Fix mem leak in netdev_register_kobject" + }, + "CVE-2019-15917": { + "cmt_msg": "Bluetooth: hci_ldisc: Postpone HCI_UART_PROTO_READY bit set in hci_uart_set_proto()" + }, + "CVE-2017-18344": { + "cmt_msg": "posix-timer: Properly check sigevent->sigev_notify" + }, + "CVE-2024-26648": { + "cmt_msg": "drm/amd/display: Fix variable deferencing before NULL check in edp_setup_replay()" + }, + "CVE-2024-26646": { + "cmt_msg": "thermal: intel: hfi: Add syscore callbacks for system-wide PM" + }, + "CVE-2018-18690": { + "cmt_msg": "xfs: don't fail when converting shortform attr to long form during ATTR_REPLACE" + }, + "CVE-2024-26644": { + "cmt_msg": "btrfs: don't abort filesystem when attempting to snapshot deleted subvolume" + }, + "CVE-2017-0627": { + "cmt_msg": "media: uvcvideo: Prevent heap overflow when accessing mapped controls" + }, + "CVE-2016-7915": { + "cmt_msg": "HID: core: prevent out-of-bound readings" + }, + "CVE-2016-7917": { + "cmt_msg": "netfilter: nfnetlink: correctly validate length of batch messages" + }, + "CVE-2016-7911": { + "cmt_msg": "block: fix use-after-free in sys_ioprio_get()" + }, + "CVE-2016-7913": { + "cmt_msg": "[media] xc2028: avoid use after free" + }, + "CVE-2018-25020": { + "cmt_msg": "bpf: fix truncated jump targets on heavy expansions" + }, + "CVE-2022-26373": { + "cmt_msg": "x86/speculation: Add RSB VM Exit protections" + }, + "CVE-2018-7273": { + "cmt_msg": "printk: hash addresses printed with %p" + }, + "CVE-2023-4459": { + "cmt_msg": "net: vmxnet3: fix possible NULL pointer dereference in vmxnet3_rq_cleanup()" + }, + "CVE-2022-20566": { + "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free caused by l2cap_chan_put" + }, + "CVE-2022-20565": { + "cmt_msg": "HID: core: Correctly handle ReportSize being zero" + }, + "CVE-2021-33098": { + "cmt_msg": "ixgbe: fix large MTU request from VF" + }, + "CVE-2022-48619": { + "cmt_msg": "Input: add bounds checking to input_set_capability()" + }, + "CVE-2017-10810": { + "cmt_msg": "drm/virtio: don't leak bo on drm_gem_object_init failure" + }, + "CVE-2017-0750": { + "cmt_msg": "f2fs: do more integrity verification for superblock" + }, + "CVE-2021-47075": { + "cmt_msg": "nvmet: fix memory leak in nvmet_alloc_ctrl()" + }, + "CVE-2021-47076": { + "cmt_msg": "RDMA/rxe: Return CQE error if invalid lkey was supplied" + }, + "CVE-2016-5195": { + "cmt_msg": "mm: remove gup_flags FOLL_WRITE games from __get_user_pages()" + }, + "CVE-2017-8824": { + "cmt_msg": "dccp: CVE-2017-8824: use-after-free in DCCP code" + }, + "CVE-2018-7492": { + "cmt_msg": "rds: Fix NULL pointer dereference in __rds_rdma_map" + }, + "CVE-2017-13220": { + "cmt_msg": "Bluetooth: hidp_connection_add() unsafe use of l2cap_pi()" + }, + "CVE-2018-5848": { + "cmt_msg": "wil6210: missing length check in wmi_set_ie" + }, + "CVE-2019-10638": { + "cmt_msg": "inet: switch IP ID generator to siphash" + }, + "CVE-2019-10639": { + "cmt_msg": "netns: provide pure entropy for net_hash_mix()" + }, + "CVE-2024-26676": { + "cmt_msg": "af_unix: Call kfree_skb() for dead unix_(sk)->oob_skb in GC." + }, + "CVE-2020-25212": { + "cmt_msg": "nfs: Fix getxattr kernel panic and memory overflow" + }, + "CVE-2020-26557": { + "cmt_msg": "" + }, + "CVE-2017-16535": { + "cmt_msg": "USB: core: fix out-of-bounds access bug in usb_get_bos_descriptor()" + }, + "CVE-2017-16537": { + "cmt_msg": "media: imon: Fix null-ptr-deref in imon_probe" + }, + "CVE-2017-16536": { + "cmt_msg": "[media] cx231xx-cards: fix NULL-deref on missing association descriptor" + }, + "CVE-2017-16531": { + "cmt_msg": "USB: fix out-of-bounds in usb_set_configuration" + }, + "CVE-2017-16533": { + "cmt_msg": "HID: usbhid: fix out-of-bounds bug" + }, + "CVE-2017-16532": { + "cmt_msg": "usb: usbtest: fix NULL pointer dereference" + }, + "CVE-2024-26779": { + "cmt_msg": "wifi: mac80211: fix race condition on enabling fast-xmit" + }, + "CVE-2017-16538": { + "cmt_msg": "media: dvb-usb-v2: lmedm04: Improve logic checking of warm start" + }, + "CVE-2016-9084": { + "cmt_msg": "vfio/pci: Fix integer overflows, bitmask check" + }, + "CVE-2016-9083": { + "cmt_msg": "vfio/pci: Fix integer overflows, bitmask check" + }, + "CVE-2018-9517": { + "cmt_msg": "l2tp: pass tunnel pointer to ->session_create()" + }, + "CVE-2020-26559": { + "cmt_msg": "" + }, + "CVE-2021-20317": { + "cmt_msg": "lib/timerqueue: Rely on rbtree semantics for next timer" + }, + "CVE-2024-26772": { + "cmt_msg": "ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal()" + }, + "CVE-2017-2671": { + "cmt_msg": "ping: implement proper locking" + }, + "CVE-2018-1092": { + "cmt_msg": "ext4: fail ext4_iget for root directory if unallocated" + }, + "CVE-2018-1093": { + "cmt_msg": "ext4: add validity checks for bitmap block numbers" + }, + "CVE-2021-3864": { + "cmt_msg": "" + }, + "CVE-2014-9731": { + "cmt_msg": "udf: Check path length when reading symlink" + }, + "CVE-2014-9730": { + "cmt_msg": "udf: Check component length before reading it" + }, + "CVE-2019-19054": { + "cmt_msg": "media: rc: prevent memory leak in cx23888_ir_probe" + }, + "CVE-2019-19057": { + "cmt_msg": "mwifiex: pcie: Fix memory leak in mwifiex_pcie_init_evt_ring" + }, + "CVE-2019-19056": { + "cmt_msg": "mwifiex: pcie: Fix memory leak in mwifiex_pcie_alloc_cmdrsp_buf" + }, + "CVE-2019-3846": { + "cmt_msg": "mwifiex: Fix possible buffer overflows at parsing bss descriptor" + }, + "CVE-2017-15537": { + "cmt_msg": "x86/fpu: Don't let userspace set bogus xcomp_bv" + }, + "CVE-2018-5391": { + "cmt_msg": "ip: discard IPv4 datagrams with overlapping segments." + }, + "CVE-2023-20941": { + "cmt_msg": "" + }, + "CVE-2018-20836": { + "cmt_msg": "scsi: libsas: fix a race condition when smp task timeout" + }, + "CVE-2020-10135": { + "cmt_msg": "Bluetooth: Consolidate encryption handling in hci_encrypt_cfm" + }, + "CVE-2021-20261": { + "cmt_msg": "floppy: fix lock_fdc() signal handling" + }, + "CVE-2021-20265": { + "cmt_msg": "af_unix: fix struct pid memory leak" + }, + "CVE-2023-28328": { + "cmt_msg": "media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer()" + }, + "CVE-2017-13693": { + "cmt_msg": "" + }, + "CVE-2017-13695": { + "cmt_msg": "ACPICA: acpi: acpica: fix acpi operand cache leak in nseval.c" + }, + "CVE-2017-13694": { + "cmt_msg": "" + }, + "CVE-2021-3640": { + "cmt_msg": "Bluetooth: sco: Fix lock_sock() blockage by memcpy_from_msg()" + }, + "CVE-2020-11608": { + "cmt_msg": "media: ov519: add missing endpoint sanity checks" + }, + "CVE-2020-10732": { + "cmt_msg": "fs/binfmt_elf.c: allocate initialized memory in fill_thread_core_info()" + }, + "CVE-2016-10208": { + "cmt_msg": "ext4: validate s_first_meta_bg at mount time" + }, + "CVE-2019-16921": { + "cmt_msg": "RDMA/hns: Fix init resp when alloc ucontext" + }, + "CVE-2021-0512": { + "cmt_msg": "HID: make arrays usage and value to be the same" + }, + "CVE-2022-41222": { + "cmt_msg": "mm/mremap: hold the rmap lock in write mode when moving page table entries." + }, + "CVE-2017-18595": { + "cmt_msg": "tracing: Fix possible double free on failure of allocating trace buffer" + }, + "CVE-2024-26726": { + "cmt_msg": "btrfs: don't drop extent_map for free space inode on write error" + }, + "CVE-2019-6974": { + "cmt_msg": "kvm: fix kvm_ioctl_create_device() reference counting (CVE-2019-6974)" + }, + "CVE-2023-2985": { + "cmt_msg": "fs: hfsplus: fix UAF issue in hfsplus_put_super" + }, + "CVE-2017-17806": { + "cmt_msg": "crypto: hmac - require that the underlying hash algorithm is unkeyed" + }, + "CVE-2017-17807": { + "cmt_msg": "KEYS: add missing permission check for request_key() destination" + }, + "CVE-2017-17805": { + "cmt_msg": "crypto: salsa20 - fix blkcipher_walk API usage" + }, + "CVE-2023-52519": { + "cmt_msg": "HID: intel-ish-hid: ipc: Disable and reenable ACPI GPE bit" + }, + "CVE-2023-52516": { + "cmt_msg": "dma-debug: don't call __dma_entry_alloc_check_leak() under free_entries_lock" + }, + "CVE-2023-52517": { + "cmt_msg": "spi: sun6i: fix race between DMA RX transfer completion and RX FIFO drain" + }, + "CVE-2023-52515": { + "cmt_msg": "RDMA/srp: Do not call scsi_done() from srp_abort()" + }, + "CVE-2019-15902": { + "cmt_msg": "" + }, + "CVE-2023-52511": { + "cmt_msg": "spi: sun6i: reduce DMA RX transfer width to single byte" + }, + "CVE-2019-20054": { + "cmt_msg": "fs/proc/proc_sysctl.c: fix NULL pointer dereference in put_links" + }, + "CVE-2018-17977": { + "cmt_msg": "" + }, + "CVE-2024-26659": { + "cmt_msg": "xhci: handle isoc Babble and Buffer Overrun events properly" + }, + "CVE-2024-26658": { + "cmt_msg": "bcachefs: grab s_umount only if snapshotting" + }, + "CVE-2018-17972": { + "cmt_msg": "proc: restrict kernel stack dumps to root" + }, + "CVE-2024-26655": { + "cmt_msg": "Fix memory leak in posix_clock_open()" + }, + "CVE-2024-26654": { + "cmt_msg": "ALSA: sh: aica: reorder cleanup operations to avoid UAF bugs" + }, + "CVE-2024-26656": { + "cmt_msg": "drm/amdgpu: fix use-after-free bug" + }, + "CVE-2024-26651": { + "cmt_msg": "sr9800: Add check for usbnet_get_endpoints" + }, + "CVE-2024-26650": { + "cmt_msg": "platform/x86: p2sb: Allow p2sb_bar() calls during PCI device probe" + }, + "CVE-2022-1048": { + "cmt_msg": "ALSA: pcm: Fix races among concurrent hw_params and hw_free calls" + }, + "CVE-2023-52475": { + "cmt_msg": "Input: powermate - fix use-after-free in powermate_config_complete" + }, + "CVE-2023-52477": { + "cmt_msg": "usb: hub: Guard against accesses to uninitialized BOS descriptors" + }, + "CVE-2023-52476": { + "cmt_msg": "perf/x86/lbr: Filter vsyscall addresses" + }, + "CVE-2016-10147": { + "cmt_msg": "crypto: mcryptd - Check mcryptd algorithm compatibility" + }, + "CVE-2023-52479": { + "cmt_msg": "ksmbd: fix uaf in smb20_oplock_break_ack" + }, + "CVE-2023-52478": { + "cmt_msg": "HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect" + }, + "CVE-2022-26365": { + "cmt_msg": "xen/blkfront: fix leaking data in shared pages" + }, + "CVE-2020-12652": { + "cmt_msg": "scsi: mptfusion: Fix double fetch bug in ioctl" + }, + "CVE-2020-12653": { + "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_cmd_append_vsie_tlv()" + }, + "CVE-2020-12656": { + "cmt_msg": "sunrpc: check that domain table is empty at module unload." + }, + "CVE-2017-14051": { + "cmt_msg": "scsi: qla2xxx: Fix an integer overflow in sysfs code" + }, + "CVE-2020-12654": { + "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_ret_wmm_get_status()" + }, + "CVE-2022-23042": { + "cmt_msg": "xen/netfront: react properly to failing gnttab_end_foreign_access_ref()" + }, + "CVE-2022-45887": { + "cmt_msg": "media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb()" + }, + "CVE-2022-4744": { + "cmt_msg": "tun: avoid double free in tun_free_netdev" + }, + "CVE-2022-0400": { + "cmt_msg": "" + }, + "CVE-2022-45886": { + "cmt_msg": "media: dvb-core: Fix use-after-free due on race condition at dvb_net" + }, + "CVE-2022-26966": { + "cmt_msg": "sr9700: sanity check for packet length" + }, + "CVE-2023-1989": { + "cmt_msg": "Bluetooth: btsdio: fix use after free bug in btsdio_remove due to unfinished work" + }, + "CVE-2022-25265": { + "cmt_msg": "" + }, + "CVE-2020-25285": { + "cmt_msg": "mm/hugetlb: fix a race between hugetlb sysctl handlers" + }, + "CVE-2020-11609": { + "cmt_msg": "media: stv06xx: add missing descriptor sanity checks" + }, + "CVE-2020-25284": { + "cmt_msg": "rbd: require global CAP_SYS_ADMIN for mapping and unmapping" + }, + "CVE-2021-47046": { + "cmt_msg": "drm/amd/display: Fix off by one in hdmi_14_process_transaction()" + }, + "CVE-2022-20424": { + "cmt_msg": "io_uring: remove io_identity" + }, + "CVE-2017-8831": { + "cmt_msg": "[media] saa7164: fix double fetch PCIe access condition" + }, + "CVE-2022-45934": { + "cmt_msg": "Bluetooth: L2CAP: Fix u8 overflow" + }, + "CVE-2015-8374": { + "cmt_msg": "Btrfs: fix truncation of compressed and inlined extents" + }, + "CVE-2020-24503": { + "cmt_msg": "" + }, + "CVE-2020-24502": { + "cmt_msg": "" + }, + "CVE-2024-26774": { + "cmt_msg": "ext4: avoid dividing by 0 in mb_update_avg_fragment_size() when block bitmap corrupt" + }, + "CVE-2023-31436": { + "cmt_msg": "net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg" + }, + "CVE-2017-9725": { + "cmt_msg": "mm: cma: fix incorrect type conversion for size during dma allocation" + }, + "CVE-2024-26775": { + "cmt_msg": "aoe: avoid potential deadlock at set_capacity" + }, + "CVE-2018-14609": { + "cmt_msg": "btrfs: relocation: Only remove reloc rb_trees if reloc control has been initialized" + }, + "CVE-2024-23851": { + "cmt_msg": "dm: limit the number of targets and parameter size area" + }, + "CVE-2020-27777": { + "cmt_msg": "powerpc/rtas: Restrict RTAS requests from userspace" + }, + "CVE-2019-11486": { + "cmt_msg": "tty: mark Siemens R3964 line discipline as BROKEN" + }, + "CVE-2019-11487": { + "cmt_msg": "fs: prevent page refcount overflow in pipe_buf_get" + }, + "CVE-2014-9728": { + "cmt_msg": "udf: Verify i_size when loading inode" + }, + "CVE-2014-9729": { + "cmt_msg": "udf: Verify i_size when loading inode" + }, + "CVE-2019-19060": { + "cmt_msg": "iio: imu: adis16400: release allocated memory on failure" + }, + "CVE-2019-19061": { + "cmt_msg": "iio: imu: adis16400: fix memory leak" + }, + "CVE-2019-19062": { + "cmt_msg": "crypto: user - fix memory leak in crypto_report" + }, + "CVE-2019-19063": { + "cmt_msg": "rtlwifi: prevent memory leak in rtl_usb_probe" + }, + "CVE-2017-17741": { + "cmt_msg": "KVM: Fix stack-out-of-bounds read in write_mmio" + }, + "CVE-2019-19066": { + "cmt_msg": "scsi: bfa: release allocated memory in case of error" + }, + "CVE-2017-7184": { + "cmt_msg": "xfrm_user: validate XFRM_MSG_NEWAE XFRMA_REPLAY_ESN_VAL replay_window" + }, + "CVE-2019-3874": { + "cmt_msg": "sctp: implement memory accounting on tx path" + }, + "CVE-2017-12193": { + "cmt_msg": "assoc_array: Fix a buggy node-splitting case" + }, + "CVE-2017-12192": { + "cmt_msg": "KEYS: prevent KEYCTL_READ on negative key" + }, + "CVE-2017-12190": { + "cmt_msg": "fix unbalanced page refcounting in bio_map_user_iov" + }, + "CVE-2012-4542": { + "cmt_msg": "" + }, + "CVE-2018-1000028": { + "cmt_msg": "nfsd: auth: Fix gid sorting when rootsquash enabled" + }, + "CVE-2018-1000026": { + "cmt_msg": "bnx2x: disable GSO where gso_size is too big for hardware" + }, + "CVE-2020-36775": { + "cmt_msg": "f2fs: fix to avoid potential deadlock" + }, + "CVE-2021-20292": { + "cmt_msg": "drm/ttm/nouveau: don't call tt destroy callback on alloc failure." + }, + "CVE-2023-2269": { + "cmt_msg": "dm ioctl: fix nested locking in table_clear() to remove deadlock concern" + }, + "CVE-2020-10690": { + "cmt_msg": "ptp: fix the race between the release of ptp_clock and cdev" + }, + "CVE-2021-3659": { + "cmt_msg": "net: mac802154: Fix general protection fault" + }, + "CVE-2021-3653": { + "cmt_msg": "KVM: nSVM: avoid picking up unsupported bits from L2 in int_ctl (CVE-2021-3653)" + }, + "CVE-2021-3655": { + "cmt_msg": "sctp: validate from_addr_param return" + }, + "CVE-2019-12614": { + "cmt_msg": "powerpc/pseries/dlpar: Fix a missing check in dlpar_parse_cc_property()" + }, + "CVE-2019-12615": { + "cmt_msg": "mdesc: fix a missing-check bug in get_vdev_port_node_info()" + }, + "CVE-2021-3896": { + "cmt_msg": "isdn: cpai: check ctr->cnr to avoid array index out of bound" + }, + "CVE-2021-3892": { + "cmt_msg": "" + }, + "CVE-2022-24958": { + "cmt_msg": "usb: gadget: don't release an existing dev->buf" + }, + "CVE-2020-12888": { + "cmt_msg": "vfio-pci: Invalidate mmaps and block MMIO access on disabled memory" + }, + "CVE-2017-6353": { + "cmt_msg": "sctp: deny peeloff operation on asocs with threads sleeping on it" + }, + "CVE-2016-6198": { + "cmt_msg": "vfs: add vfs_select_inode() helper" + }, + "CVE-2022-41218": { + "cmt_msg": "media: dvb-core: Fix UAF due to refcount races at releasing" + }, + "CVE-2011-4917": { + "cmt_msg": "" + }, + "CVE-2021-45485": { + "cmt_msg": "ipv6: use prandom_u32() for ID generation" + }, + "CVE-2016-6197": { + "cmt_msg": "ovl: verify upper dentry before unlink and rename" + }, + "CVE-2020-0030": { + "cmt_msg": "ANDROID: binder: synchronize_rcu() when using POLLFREE." + }, + "CVE-2015-8709": { + "cmt_msg": "mm: Add a user_ns owner to mm_struct and fix ptrace permission checks" + }, + "CVE-2019-18806": { + "cmt_msg": "net: qlogic: Fix memory leak in ql_alloc_large_buffers" + }, + "CVE-2018-7754": { + "cmt_msg": "printk: hash addresses printed with %p" + }, + "CVE-2019-3900": { + "cmt_msg": "vhost_net: fix possible infinite loop" + }, + "CVE-2022-40982": { + "cmt_msg": "x86/speculation: Add Gather Data Sampling mitigation" + }, + "CVE-2015-8964": { + "cmt_msg": "tty: Prevent ldisc drivers from re-using stale tty fields" + }, + "CVE-2015-8966": { + "cmt_msg": "[PATCH] arm: fix handling of F_OFD_... in oabi_fcntl64()" + }, + "CVE-2015-8967": { + "cmt_msg": "arm64: make sys_call_table const" + }, + "CVE-2021-39801": { + "cmt_msg": "" + }, + "CVE-2021-39800": { + "cmt_msg": "" + }, + "CVE-2015-8962": { + "cmt_msg": "sg: Fix double-free when drives detach during SG_IO" + }, + "CVE-2015-8963": { + "cmt_msg": "perf: Fix race in swevent hash" + }, + "CVE-2024-22099": { + "cmt_msg": "Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security" + }, + "CVE-2021-4202": { + "cmt_msg": "NFC: reorganize the functions in nci_request" + }, + "CVE-2021-4203": { + "cmt_msg": "af_unix: fix races in sk_peer_pid and sk_peer_cred accesses" + }, + "CVE-2023-52509": { + "cmt_msg": "ravb: Fix use-after-free issue in ravb_tx_timeout_work()" + }, + "CVE-2023-46343": { + "cmt_msg": "nfc: nci: fix possible NULL pointer dereference in send_acknowledge()" + }, + "CVE-2023-52507": { + "cmt_msg": "nfc: nci: assert requested protocol is valid" + }, + "CVE-2023-52506": { + "cmt_msg": "LoongArch: Set all reserved memblocks on Node#0 at initialization" + }, + "CVE-2023-52501": { + "cmt_msg": "ring-buffer: Do not attempt to read past \"commit\"" + }, + "CVE-2023-52500": { + "cmt_msg": "scsi: pm80xx: Avoid leaking tags when processing OPC_INB_SET_CONTROLLER_CONFIG command" + }, + "CVE-2023-52502": { + "cmt_msg": "net: nfc: fix races in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn()" + }, + "CVE-2023-2513": { + "cmt_msg": "ext4: fix use-after-free in ext4_xattr_set_entry" + }, + "CVE-2017-1000": { + "cmt_msg": "udp: consistently apply ufo or fragmentation" + }, + "CVE-2017-0605": { + "cmt_msg": "tracing: Use strlcpy() instead of strcpy() in __trace_find_cmdline()" + }, + "CVE-2024-24858": { + "cmt_msg": "" + }, + "CVE-2024-26664": { + "cmt_msg": "hwmon: (coretemp) Fix out-of-bounds memory access" + }, + "CVE-2021-38198": { + "cmt_msg": "KVM: X86: MMU: Use the correct inherited permissions to get shadow page" + }, + "CVE-2022-1679": { + "cmt_msg": "ath9k: fix use-after-free in ath9k_hif_usb_rx_cb" + }, + "CVE-2023-52442": { + "cmt_msg": "ksmbd: validate session id and tree id in compound request" + }, + "CVE-2022-40768": { + "cmt_msg": "scsi: stex: Properly zero out the passthrough command structure" + }, + "CVE-2023-52445": { + "cmt_msg": "media: pvrusb2: fix use after free on context disconnection" + }, + "CVE-2023-52449": { + "cmt_msg": "mtd: Fix gluebi NULL pointer dereference caused by ftl notifier" + }, + "CVE-2019-15807": { + "cmt_msg": "scsi: libsas: delete sas port if expander discover failed" + }, + "CVE-2024-26719": { + "cmt_msg": "nouveau: offload fence uevents work to workqueue" + }, + "CVE-2024-1312": { + "cmt_msg": "mm: lock_vma_under_rcu() must check vma->anon_vma under vma lock" + }, + "CVE-2019-14284": { + "cmt_msg": "floppy: fix div-by-zero in setup_format_params" + }, + "CVE-2019-14283": { + "cmt_msg": "floppy: fix out-of-bounds read in copy_buffer" + }, + "CVE-2023-3338": { + "cmt_msg": "Remove DECnet support from kernel" + }, + "CVE-2018-10882": { + "cmt_msg": "ext4: add more inode number paranoia checks" + }, + "CVE-2024-26713": { + "cmt_msg": "powerpc/pseries/iommu: Fix iommu initialisation during DLPAR add" + }, + "CVE-2020-12464": { + "cmt_msg": "USB: core: Fix free-while-in-use bug in the USB S-Glibrary" + }, + "CVE-2016-9793": { + "cmt_msg": "net: avoid signed overflows for SO_{SND|RCV}BUFFORCE" + }, + "CVE-2016-9794": { + "cmt_msg": "ALSA: pcm : Call kill_fasync() in stream lock" + }, + "CVE-2015-8970": { + "cmt_msg": "crypto: algif_skcipher - Require setkey before accept(2)" + }, + "CVE-2016-10044": { + "cmt_msg": "aio: mark AIO pseudo-fs noexec" + }, + "CVE-2018-10087": { + "cmt_msg": "kernel/exit.c: avoid undefined behaviour when calling wait4()" + }, + "CVE-2023-3159": { + "cmt_msg": "firewire: fix potential uaf in outbound_phy_packet_callback()" + }, + "CVE-2021-47059": { + "cmt_msg": "crypto: sun8i-ss - fix result memory leak on error path" + }, + "CVE-2021-47052": { + "cmt_msg": "crypto: sa2ul - Fix memory leak of rxd" + }, + "CVE-2022-21125": { + "cmt_msg": "x86/speculation/mmio: Reuse SRBDS mitigation for SBDS" + }, + "CVE-2019-19241": { + "cmt_msg": "io_uring: async workers should inherit the user creds" + }, + "CVE-2022-21123": { + "cmt_msg": "x86/speculation/mmio: Add mitigation for Processor MMIO Stale Data" + }, + "CVE-2021-43975": { + "cmt_msg": "atlantic: Fix OOB read and write in hw_atl_utils_fw_rpc_wait" + }, + "CVE-2018-6927": { + "cmt_msg": "futex: Prevent overflow by strengthen input validation" + }, + "CVE-2018-3639": { + "cmt_msg": "x86/nospec: Simplify alternative_msr_write()" + }, + "CVE-2023-0590": { + "cmt_msg": "net: sched: fix race condition in qdisc_graft()" + }, + "CVE-2023-0597": { + "cmt_msg": "x86/mm: Randomize per-cpu entry area" + }, + "CVE-2022-28390": { + "cmt_msg": "can: ems_usb: ems_usb_start_xmit(): fix double dev_kfree_skb() in error path" + }, + "CVE-2019-3460": { + "cmt_msg": "Bluetooth: Check L2CAP option sizes returned from l2cap_get_conf_opt" + }, + "CVE-2022-3202": { + "cmt_msg": "jfs: prevent NULL deref in diFree" + }, + "CVE-2017-7518": { + "cmt_msg": "KVM: x86: fix singlestepping over syscall" + }, + "CVE-2019-11477": { + "cmt_msg": "tcp: limit payload size of sacked skbs" + }, + "CVE-2021-46908": { + "cmt_msg": "bpf: Use correct permission flag for mixed signed bounds arithmetic" + }, + "CVE-2021-46906": { + "cmt_msg": "HID: usbhid: fix info leak in hid_submit_ctrl" + }, + "CVE-2018-14614": { + "cmt_msg": "f2fs: fix to do sanity check with cp_pack_start_sum" + }, + "CVE-2018-14617": { + "cmt_msg": "hfsplus: fix NULL dereference in hfsplus_lookup()" + }, + "CVE-2018-14616": { + "cmt_msg": "f2fs: fix to do sanity check with block address in main area v2" + }, + "CVE-2018-14611": { + "cmt_msg": "btrfs: validate type when reading a chunk" + }, + "CVE-2018-14610": { + "cmt_msg": "btrfs: Check that each block group has corresponding chunk at mount time" + }, + "CVE-2018-14613": { + "cmt_msg": "btrfs: tree-checker: Verify block_group_item" + }, + "CVE-2018-14612": { + "cmt_msg": "btrfs: tree-checker: Detect invalid and empty essential trees" + }, + "CVE-2024-23848": { + "cmt_msg": "" + }, + "CVE-2020-27418": { + "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region" + }, + "CVE-2017-2618": { + "cmt_msg": "selinux: fix off-by-one in setprocattr" + }, + "CVE-2019-2025": { + "cmt_msg": "binder: fix race that allows malicious free of live buffer" + }, + "CVE-2014-9717": { + "cmt_msg": "mnt: Update detach_mounts to leave mounts connected" + }, + "CVE-2019-19074": { + "cmt_msg": "ath9k: release allocated buffer if timed out" + }, + "CVE-2019-19073": { + "cmt_msg": "ath9k_htc: release allocated buffer if timed out" + }, + "CVE-2019-1125": { + "cmt_msg": "x86/speculation: Prepare entry code for Spectre v1 swapgs mitigations" + }, + "CVE-2023-31085": { + "cmt_msg": "ubi: Refuse attaching if mtd's erasesize is 0" + }, + "CVE-2023-31084": { + "cmt_msg": "media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*()" + }, + "CVE-2023-31083": { + "cmt_msg": "Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO" + }, + "CVE-2023-31082": { + "cmt_msg": "" + }, + "CVE-2023-31081": { + "cmt_msg": "" + }, + "CVE-2022-32296": { + "cmt_msg": "tcp: increase source port perturb table to 2^16" + }, + "CVE-2020-28974": { + "cmt_msg": "vt: Disable KD_FONT_OP_COPY" + }, + "CVE-2019-20806": { + "cmt_msg": "media: tw5864: Fix possible NULL pointer dereference in tw5864_handle_frame" + }, + "CVE-2022-3028": { + "cmt_msg": "af_key: Do not call xfrm_probe_algs in parallel" + }, + "CVE-2020-14304": { + "cmt_msg": "" + }, + "CVE-2010-5321": { + "cmt_msg": "" + }, + "CVE-2022-33981": { + "cmt_msg": "floppy: disable FDRAWCMD by default" + }, + "CVE-2017-16995": { + "cmt_msg": "bpf: fix incorrect sign extension in check_alu_op()" + }, + "CVE-2019-18675": { + "cmt_msg": "mmap: introduce sane default mmap limits" + }, + "CVE-2017-2583": { + "cmt_msg": "KVM: x86: fix emulation of \"MOV SS, null selector\"" + }, + "CVE-2017-2584": { + "cmt_msg": "KVM: x86: Introduce segmented_write_std" + }, + "CVE-2017-6001": { + "cmt_msg": "perf/core: Fix concurrent sys_perf_event_open() vs. 'move_group' race" + }, + "CVE-2017-17558": { + "cmt_msg": "USB: core: prevent malicious bNumInterfaces overflow" + }, + "CVE-2019-11479": { + "cmt_msg": "tcp: add tcp_min_snd_mss sysctl" + }, + "CVE-2020-10751": { + "cmt_msg": "selinux: properly handle multiple messages in selinux_netlink_send()" + }, + "CVE-2022-1116": { + "cmt_msg": "" + }, + "CVE-2021-28660": { + "cmt_msg": "staging: rtl8188eu: prevent ->ssid overflow in rtw_wx_set_scan()" + }, + "CVE-2017-6348": { + "cmt_msg": "irda: Fix lockdep annotations in hashbin_delete()." + }, + "CVE-2020-36386": { + "cmt_msg": "Bluetooth: Fix slab-out-of-bounds read in hci_extended_inquiry_result_evt()" + }, + "CVE-2017-6345": { + "cmt_msg": "net/llc: avoid BUG_ON() in skb_orphan()" + }, + "CVE-2017-6346": { + "cmt_msg": "packet: fix races in fanout_add()" + }, + "CVE-2020-36385": { + "cmt_msg": "RDMA/ucma: Rework ucma_migrate_id() to avoid races with destroy" + }, + "CVE-2020-0009": { + "cmt_msg": "staging: android: ashmem: Disallow ashmem memory from being remapped" + }, + "CVE-2019-14615": { + "cmt_msg": "drm/i915/gen9: Clear residual context state on context switch" + }, + "CVE-2016-6327": { + "cmt_msg": "IB/srpt: Simplify srpt_handle_tsk_mgmt()" + }, + "CVE-2016-3139": { + "cmt_msg": "Input: wacom - compute the HID report size to get the actual packet size" + }, + "CVE-2018-15572": { + "cmt_msg": "x86/speculation: Protect against userspace-userspace spectreRSB" + }, + "CVE-2022-1204": { + "cmt_msg": "ax25: Fix refcount leaks caused by ax25_cb_del()" + }, + "CVE-2018-9363": { + "cmt_msg": "Bluetooth: hidp: buffer overflow in hidp_process_report" + }, + "CVE-2016-10723": { + "cmt_msg": "mm, oom: remove sleep from under oom_lock" + }, + "CVE-2020-8832": { + "cmt_msg": "drm/i915: Record the default hw state after reset upon load" + }, + "CVE-2023-52531": { + "cmt_msg": "wifi: iwlwifi: mvm: Fix a memory corruption issue" + }, + "CVE-2023-52532": { + "cmt_msg": "net: mana: Fix TX CQE error handling" + }, + "CVE-2023-39189": { + "cmt_msg": "netfilter: nfnetlink_osf: avoid OOB read" + }, + "CVE-2024-26677": { + "cmt_msg": "rxrpc: Fix delayed ACKs to not set the reference serial number" + }, + "CVE-2020-25211": { + "cmt_msg": "netfilter: ctnetlink: add a range check for l3/l4 protonum" + }, + "CVE-2024-26675": { + "cmt_msg": "ppp_async: limit MRU to 64K" + }, + "CVE-2020-28374": { + "cmt_msg": "scsi: target: Fix XCOPY NAA identifier lookup" + }, + "CVE-2024-26672": { + "cmt_msg": "drm/amdgpu: Fix variable 'mca_funcs' dereferenced before NULL check in 'amdgpu_mca_smu_get_mca_entry()'" + }, + "CVE-2024-26671": { + "cmt_msg": "blk-mq: fix IO hang from sbitmap wakeup race" + }, + "CVE-2023-52458": { + "cmt_msg": "block: add check that partition length needs to be aligned with block size" + }, + "CVE-2018-9568": { + "cmt_msg": "net: Set sk_prot_creator when cloning sockets to the right proto" + }, + "CVE-2019-14816": { + "cmt_msg": "mwifiex: Fix three heap overflow at parsing element in cfg80211_ap_settings" + }, + "CVE-2019-14814": { + "cmt_msg": "mwifiex: Fix three heap overflow at parsing element in cfg80211_ap_settings" + }, + "CVE-2024-26700": { + "cmt_msg": "drm/amd/display: Fix MST Null Ptr for RV" + }, + "CVE-2024-26706": { + "cmt_msg": "parisc: Fix random data corruption from exception handler" + }, + "CVE-2020-25672": { + "cmt_msg": "nfc: fix memory leak in llcp_sock_connect()" + }, + "CVE-2020-25673": { + "cmt_msg": "nfc: Avoid endless loops caused by repeated llcp_sock_connect()" + }, + "CVE-2020-25670": { + "cmt_msg": "nfc: fix refcount leak in llcp_sock_bind()" + }, + "CVE-2020-25671": { + "cmt_msg": "nfc: fix refcount leak in llcp_sock_connect()" + }, + "CVE-2019-19813": { + "cmt_msg": "btrfs: inode: Verify inode mode to avoid NULL pointer dereference" + }, + "CVE-2020-29374": { + "cmt_msg": "gup: document and work around \"COW can break either way\" issue" + }, + "CVE-2019-19814": { + "cmt_msg": "" + }, + "CVE-2020-29371": { + "cmt_msg": "romfs: fix uninitialized memory leak in romfs_dev_read()" + }, + "CVE-2019-19816": { + "cmt_msg": "btrfs: inode: Verify inode mode to avoid NULL pointer dereference" + }, + "CVE-2018-18710": { + "cmt_msg": "cdrom: fix improper type cast, which can leat to information leak." + }, + "CVE-2023-34255": { + "cmt_msg": "xfs: verify buffer contents when we skip log replay" + }, + "CVE-2022-23040": { + "cmt_msg": "xen/xenbus: don't let xenbus_grant_ring() remove grants in error case" + }, + "CVE-2023-3141": { + "cmt_msg": "memstick: r592: Fix UAF bug in r592_remove due to race condition" + }, + "CVE-2014-4943": { + "cmt_msg": "net/l2tp: don't fall back on UDP [get|set]sockopt" + }, + "CVE-2023-34256": { + "cmt_msg": "ext4: avoid a potential slab-out-of-bounds in ext4_group_desc_csum" + }, + "CVE-2022-3524": { + "cmt_msg": "tcp/udp: Fix memory leak in ipv6_renew_options()." + }, + "CVE-2022-3523": { + "cmt_msg": "mm/memory.c: fix race when faulting a device private page" + }, + "CVE-2022-3522": { + "cmt_msg": "mm/hugetlb: use hugetlb_pte_stable in migration race check" + }, + "CVE-2018-7755": { + "cmt_msg": "floppy: Do not copy a kernel pointer to user memory in FDGETPRM ioctl" + }, + "CVE-2017-7346": { + "cmt_msg": "drm/vmwgfx: limit the number of mip levels in vmw_gb_surface_define_ioctl()" + }, + "CVE-2018-7757": { + "cmt_msg": "scsi: libsas: fix memory leak in sas_smp_get_phy_events()" + }, + "CVE-2022-0330": { + "cmt_msg": "drm/i915: Flush TLBs before releasing backing store" + }, + "CVE-2022-4095": { + "cmt_msg": "staging: rtl8712: fix use after free bugs" + }, + "CVE-2017-10911": { + "cmt_msg": "xen-blkback: don't leak stack data via response ring" + }, + "CVE-2022-45919": { + "cmt_msg": "media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221" + }, + "CVE-2016-9120": { + "cmt_msg": "staging/android/ion : fix a race condition in the ion driver" + }, + "CVE-2021-3669": { + "cmt_msg": "ipc: replace costly bailout check in sysvipc_find_ipc()" + }, + "CVE-2019-3701": { + "cmt_msg": "can: gw: ensure DLC boundaries after CAN frame modification" + }, + "CVE-2022-4543": { + "cmt_msg": "" + }, + "CVE-2017-11089": { + "cmt_msg": "cfg80211: Define nla_policy for NL80211_ATTR_LOCAL_MESH_POWER_MODE" + }, + "CVE-2021-34981": { + "cmt_msg": "Bluetooth: cmtp: fix file refcount when cmtp_attach_device fails" + }, + "CVE-2013-7445": { + "cmt_msg": "" + }, + "CVE-2024-26804": { + "cmt_msg": "net: ip_tunnel: prevent perpetual headroom growth" + }, + "CVE-2022-3303": { + "cmt_msg": "ALSA: pcm: oss: Fix race at SNDCTL_DSP_SYNC" + }, + "CVE-2017-15116": { + "cmt_msg": "crypto: rng - Remove old low-level rng interface" + }, + "CVE-2022-28388": { + "cmt_msg": "can: usb_8dev: usb_8dev_start_xmit(): fix double dev_kfree_skb() in error path" + }, + "CVE-2017-15115": { + "cmt_msg": "sctp: do not peel off an assoc from one netns to another one" + }, + "CVE-2018-1000004": { + "cmt_msg": "ALSA: seq: Make ioctls race-free" + }, + "CVE-2023-52607": { + "cmt_msg": "powerpc/mm: Fix null-pointer dereference in pgtable_cache_add" + }, + "CVE-2019-20811": { + "cmt_msg": "net-sysfs: call dev_hold if kobject_init_and_add success" + }, + "CVE-2019-20812": { + "cmt_msg": "af_packet: set defaule value for tmo" + }, + "CVE-2020-14314": { + "cmt_msg": "ext4: fix potential negative array index in do_split()" + }, + "CVE-2019-18660": { + "cmt_msg": "powerpc/book3s64: Fix link stack flush on context switch" + }, + "CVE-2019-12380": { + "cmt_msg": "efi/x86/Add missing error handling to old_memmap 1:1 mapping code" + }, + "CVE-2019-12381": { + "cmt_msg": "ip_sockglue: Fix missing-check bug in ip_ra_control()" + }, + "CVE-2019-12382": { + "cmt_msg": "drm/edid: Fix a missing-check bug in drm_load_edid_firmware()" + }, + "CVE-2020-10766": { + "cmt_msg": "x86/speculation: Prevent rogue cross-process SSBD shutdown" + }, + "CVE-2020-10767": { + "cmt_msg": "x86/speculation: Avoid force-disabling IBPB based on STIBP and enhanced IBRS." + }, + "CVE-2019-25160": { + "cmt_msg": "netlabel: fix out-of-bounds memory accesses" + }, + "CVE-2020-10768": { + "cmt_msg": "x86/speculation: PR_SPEC_FORCE_DISABLE enforcement for indirect branches." + }, + "CVE-2020-10769": { + "cmt_msg": "crypto: authenc - fix parsing key with misaligned rta_len" + }, + "CVE-2014-7145": { + "cmt_msg": "[CIFS] Possible null ptr deref in SMB2_tcon" + }, + "CVE-2020-10942": { + "cmt_msg": "vhost: Check docket sk_family instead of call getname" + }, + "CVE-2020-12655": { + "cmt_msg": "xfs: add agf freeblocks verify in xfs_agf_verify" + }, + "CVE-2020-26139": { + "cmt_msg": "mac80211: do not accept/forward invalid EAPOL frames" + }, + "CVE-2019-19536": { + "cmt_msg": "can: peak_usb: pcan_usb_pro: Fix info-leaks to USB devices" + }, + "CVE-2019-19537": { + "cmt_msg": "USB: core: Fix races in character device registration and deregistraion" + }, + "CVE-2019-19534": { + "cmt_msg": "can: peak_usb: fix slab info leak" + }, + "CVE-2020-11565": { + "cmt_msg": "mm: mempolicy: require at least one nodeid for MPOL_PREFERRED" + }, + "CVE-2019-19533": { + "cmt_msg": "media: ttusb-dec: Fix info-leak in ttusb_dec_send_command()" + }, + "CVE-2019-19530": { + "cmt_msg": "usb: cdc-acm: make sure a refcount is taken early enough" + }, + "CVE-2019-19531": { + "cmt_msg": "usb: yurex: Fix use-after-free in yurex_delete" + }, + "CVE-2017-18255": { + "cmt_msg": "perf/core: Fix the perf_cpu_time_max_percent check" + }, + "CVE-2023-52527": { + "cmt_msg": "ipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data()" + }, + "CVE-2023-3006": { + "cmt_msg": "arm64: Add AMPERE1 to the Spectre-BHB affected list" + }, + "CVE-2023-52522": { + "cmt_msg": "net: fix possible store tearing in neigh_periodic_work()" + }, + "CVE-2020-26147": { + "cmt_msg": "mac80211: assure all fragments are encrypted" + }, + "CVE-2023-52528": { + "cmt_msg": "net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg" + }, + "CVE-2020-0305": { + "cmt_msg": "chardev: Avoid potential use-after-free in 'chrdev_open()'" + }, + "CVE-2023-39198": { + "cmt_msg": "drm/qxl: fix UAF on handle creation" + }, + "CVE-2023-39197": { + "cmt_msg": "netfilter: conntrack: dccp: copy entire header to stack buffer, not just basic one" + }, + "CVE-2023-39193": { + "cmt_msg": "netfilter: xt_sctp: validate the flag_info count" + }, + "CVE-2023-39192": { + "cmt_msg": "netfilter: xt_u32: validate user space input" + }, + "CVE-2024-26600": { + "cmt_msg": "phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP" + }, + "CVE-2024-26606": { + "cmt_msg": "binder: signal epoll threads of self-work" + }, + "CVE-2017-14156": { + "cmt_msg": "video: fbdev: aty: do not leak uninitialized padding in clk to userspace" + }, + "CVE-2023-52429": { + "cmt_msg": "dm: limit the number of targets and parameter size area" + }, + "CVE-2015-8839": { + "cmt_msg": "ext4: fix races between page faults and hole punching" + }, + "CVE-2022-1652": { + "cmt_msg": "floppy: use a statically allocated error counter" + }, + "CVE-2015-8830": { + "cmt_msg": "aio: lift iov_iter_init() into aio_setup_..._rw()" + }, + "CVE-2014-9940": { + "cmt_msg": "regulator: core: Fix regualtor_ena_gpio_free not to access pin after freeing" + }, + "CVE-2016-8666": { + "cmt_msg": "tunnels: Don't apply GRO to multiple layers of encapsulation." + }, + "CVE-2019-13272": { + "cmt_msg": "ptrace: Fix ->ptracer_cred handling for PTRACE_TRACEME" + }, + "CVE-2022-1786": { + "cmt_msg": "io_uring: remove io_identity" + }, + "CVE-2020-25669": { + "cmt_msg": "Input: sunkbd - avoid use-after-free in teardown paths" + }, + "CVE-2020-25668": { + "cmt_msg": "tty: make FONTX ioctl use the tty pointer they were actually passed" + }, + "CVE-2008-4609": { + "cmt_msg": "" + }, + "CVE-2023-26607": { + "cmt_msg": "ntfs: fix out-of-bounds read in ntfs_attr_find()" + }, + "CVE-2021-4037": { + "cmt_msg": "xfs: fix up non-directory creation in SGID directories" + }, + "CVE-2021-22543": { + "cmt_msg": "KVM: do not allow mapping valid but non-reference-counted pages" + }, + "CVE-2018-18386": { + "cmt_msg": "n_tty: fix EXTPROC vs ICANON interaction with TIOCINQ (aka FIONREAD)" + }, + "CVE-2021-46962": { + "cmt_msg": "mmc: uniphier-sd: Fix a resource leak in the remove function" + }, + "CVE-2016-8405": { + "cmt_msg": "fbdev: color map copying bounds checking" + }, + "CVE-2023-3776": { + "cmt_msg": "net/sched: cls_fw: Fix improper refcount update leads to use-after-free" + }, + "CVE-2017-9242": { + "cmt_msg": "ipv6: fix out of bound writes in __ip6_append_data()" + }, + "CVE-2023-3772": { + "cmt_msg": "xfrm: add NULL check in xfrm_update_ae_params" + }, + "CVE-2022-3533": { + "cmt_msg": "" + }, + "CVE-2022-3534": { + "cmt_msg": "libbpf: Fix use-after-free in btf_dump_name_dups" + }, + "CVE-2016-10088": { + "cmt_msg": "sg_write()/bsg_write() is not fit to be called under KERNEL_DS" + }, + "CVE-2017-14140": { + "cmt_msg": "Sanitize 'move_pages()' permission checks" + }, + "CVE-2021-4149": { + "cmt_msg": "btrfs: unlock newly allocated extent buffer after error" + }, + "CVE-2022-21385": { + "cmt_msg": "net/rds: fix warn in rds_message_alloc_sgs" + }, + "CVE-2021-47180": { + "cmt_msg": "NFC: nci: fix memory leak in nci_allocate_device" + }, + "CVE-2020-28097": { + "cmt_msg": "vgacon: remove software scrollback support" + }, + "CVE-2017-7533": { + "cmt_msg": "dentry name snapshots" + }, + "CVE-2018-8897": { + "cmt_msg": "x86/entry/64: Don't use IST entry for #BP stack" + }, + "CVE-2020-14416": { + "cmt_msg": "can, slip: Protect tty->disc_data in write_wakeup and close with RCU" + }, + "CVE-2014-9904": { + "cmt_msg": "ALSA: compress: fix an integer overflow check" + }, + "CVE-2021-46928": { + "cmt_msg": "parisc: Clear stale IIR value on instruction access rights trap" + }, + "CVE-2018-14634": { + "cmt_msg": "exec: Limit arg stack to at most 75% of _STK_LIM" + }, + "CVE-2018-14633": { + "cmt_msg": "scsi: target: iscsi: Use hex2bin instead of a re-implementation" + }, + "CVE-2021-46926": { + "cmt_msg": "ALSA: hda: intel-sdw-acpi: harden detection of controller" + }, + "CVE-2017-2636": { + "cmt_msg": "tty: n_hdlc: get rid of racy n_hdlc.tbuf" + }, + "CVE-2023-1206": { + "cmt_msg": "tcp: Reduce chance of collisions in inet6_hashfn()." + }, + "CVE-2022-3649": { + "cmt_msg": "nilfs2: fix use-after-free bug of struct nilfs_root" + }, + "CVE-2022-3646": { + "cmt_msg": "nilfs2: fix leak of nilfs_root in case of writer thread creation failure" + }, + "CVE-2022-3642": { + "cmt_msg": "" + }, + "CVE-2021-1048": { + "cmt_msg": "fix regression in \"epoll: Keep a reference on files added to the check list\"" + }, + "CVE-2020-0543": { + "cmt_msg": "x86/cpu: Add 'table' argument to cpu_matches()" + }, + "CVE-2024-25739": { + "cmt_msg": "" + }, + "CVE-2023-6535": { + "cmt_msg": "" + }, + "CVE-2023-6536": { + "cmt_msg": "nvmet-tcp: fix a crash in nvmet_req_complete()" + }, + "CVE-2019-11810": { + "cmt_msg": "scsi: megaraid_sas: return error when create DMA pool failed" + }, + "CVE-2022-36280": { + "cmt_msg": "drm/vmwgfx: Validate the box size for the snooped cursor" + }, + "CVE-2024-21803": { + "cmt_msg": "" + }, + "CVE-2018-7995": { + "cmt_msg": "x86/MCE: Serialize sysfs changes" + }, + "CVE-2018-16276": { + "cmt_msg": "USB: yurex: fix out-of-bounds uaccess in read handler" + }, + "CVE-2019-16413": { + "cmt_msg": "9p: use inode->i_lock to protect i_size_write() under 32-bit" + }, + "CVE-2019-7222": { + "cmt_msg": "KVM: x86: work around leak of uninitialized stack contents (CVE-2019-7222)" + }, + "CVE-2020-10773": { + "cmt_msg": "s390/cmm: fix information leak in cmm_timeout_handler()" + }, + "CVE-2018-18281": { + "cmt_msg": "mremap: properly flush TLB before releasing the page" + }, + "CVE-2022-2663": { + "cmt_msg": "netfilter: nf_conntrack_irc: Fix forged IP logic" + }, + "CVE-2016-6787": { + "cmt_msg": "perf: Fix event->ctx locking" + }, + "CVE-2016-6786": { + "cmt_msg": "perf: Fix event->ctx locking" + }, + "CVE-2024-26803": { + "cmt_msg": "net: veth: clear GRO when clearing XDP even when down" + }, + "CVE-2020-25643": { + "cmt_msg": "hdlc_ppp: add range checks in ppp_cp_parse_cr()" + }, + "CVE-2020-4788": { + "cmt_msg": "powerpc/64s: flush L1D on kernel entry" + }, + "CVE-2021-39698": { + "cmt_msg": "wait: add wake_up_pollfree()" + }, + "CVE-2018-5333": { + "cmt_msg": "RDS: null pointer dereference in rds_atomic_free_op" + }, + "CVE-2018-5332": { + "cmt_msg": "RDS: Heap OOB write in rds_message_alloc_sgs()" + }, + "CVE-2019-19528": { + "cmt_msg": "USB: iowarrior: fix use-after-free on disconnect" + }, + "CVE-2017-17448": { + "cmt_msg": "netfilter: nfnetlink_cthelper: Add missing permission checks" + }, + "CVE-2017-17449": { + "cmt_msg": "netlink: Add netns check on taps" + }, + "CVE-2019-19524": { + "cmt_msg": "Input: ff-memless - kill timer in destroy()" + }, + "CVE-2019-19527": { + "cmt_msg": "HID: hiddev: do cleanup in failure of opening a device" + }, + "CVE-2021-3753": { + "cmt_msg": "vt_kdsetmode: extend console locking" + }, + "CVE-2021-3752": { + "cmt_msg": "Bluetooth: fix use-after-free error in lock_sock_nested()" + }, + "CVE-2023-7192": { + "cmt_msg": "netfilter: ctnetlink: fix possible refcount leak in ctnetlink_create_conntrack()" + }, + "CVE-2017-18249": { + "cmt_msg": "f2fs: fix race condition in between free nid allocator/initializer" + }, + "CVE-2022-1263": { + "cmt_msg": "KVM: avoid NULL pointer dereference in kvm_dirty_ring_push" + }, + "CVE-2018-12207": { + "cmt_msg": "kvm: x86, powerpc: do not allow clearing largepages debugfs entry" + }, + "CVE-2017-18241": { + "cmt_msg": "f2fs: fix a panic caused by NULL flush_cmd_control" + }, + "CVE-2019-15215": { + "cmt_msg": "media: cpia2_usb: first wake up, then free in disconnect" + }, + "CVE-2022-2209": { + "cmt_msg": "" + }, + "CVE-2023-7042": { + "cmt_msg": "wifi: ath10k: fix NULL pointer dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev()" + }, + "CVE-2023-52559": { + "cmt_msg": "iommu/vt-d: Avoid memory allocation in iommu_suspend()" + }, + "CVE-2023-47233": { + "cmt_msg": "wifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach" + }, + "CVE-2022-1462": { + "cmt_msg": "tty: use new tty_insert_flip_string_and_push_buffer() in pty_write()" + }, + "CVE-2019-20636": { + "cmt_msg": "Input: add safety guards to input_set_keycode()" + }, + "CVE-2023-52434": { + "cmt_msg": "smb: client: fix potential OOBs in smb2_parse_contexts()" + }, + "CVE-2023-52436": { + "cmt_msg": "f2fs: explicitly null-terminate the xattr list" + }, + "CVE-2023-51779": { + "cmt_msg": "Bluetooth: af_bluetooth: Fix Use-After-Free in bt_sock_recvmsg" + }, + "CVE-2018-10877": { + "cmt_msg": "ext4: verify the depth of extent tree in ext4_find_extent()" + }, + "CVE-2018-10876": { + "cmt_msg": "ext4: only look at the bg_flags field if it is valid" + }, + "CVE-2010-4563": { + "cmt_msg": "" + }, + "CVE-2016-8655": { + "cmt_msg": "packet: fix race condition in packet_set_ring" + }, + "CVE-2023-2162": { + "cmt_msg": "scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress" + }, + "CVE-2016-8658": { + "cmt_msg": "brcmfmac: avoid potential stack overflow in brcmf_cfg80211_start_ap()" + }, + "CVE-2018-10879": { + "cmt_msg": "ext4: make sure bitmaps and the inode table don't overlap with bg descriptors" + }, + "CVE-2019-14835": { + "cmt_msg": "vhost: make sure log_num < in_num" + }, + "CVE-2023-4623": { + "cmt_msg": "net/sched: sch_hfsc: Ensure inner classes have fsc curve" + }, + "CVE-2020-25656": { + "cmt_msg": "vt: keyboard, extend func_buf_lock to readers" + }, + "CVE-2021-4023": { + "cmt_msg": "io-wq: fix cancellation on create-worker failure" + }, + "CVE-2021-22555": { + "cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write" + }, + "CVE-2023-3161": { + "cmt_msg": "fbcon: Check font dimension limits" + }, + "CVE-2018-7191": { + "cmt_msg": "tun: call dev_get_valid_name() before register_netdevice()" + }, + "CVE-2018-10675": { + "cmt_msg": "mm/mempolicy: fix use after free when calling get_mempolicy" + }, + "CVE-2017-0786": { + "cmt_msg": "brcmfmac: add length check in brcmf_cfg80211_escan_handler()" + }, + "CVE-2021-47082": { + "cmt_msg": "tun: avoid double free in tun_free_netdev" + }, + "CVE-2021-47083": { + "cmt_msg": "pinctrl: mediatek: fix global-out-of-bounds issue" + }, + "CVE-2021-31916": { + "cmt_msg": "dm ioctl: fix out of bounds array access when no devices" + }, + "CVE-2021-47086": { + "cmt_msg": "phonet/pep: refuse to enable an unbound pipe" + }, + "CVE-2023-32269": { + "cmt_msg": "netrom: Fix use-after-free caused by accept on already connected socket" + }, + "CVE-2021-4155": { + "cmt_msg": "xfs: map unwritten blocks in XFS_IOC_{ALLOC,FREE}SP just like fallocate" + }, + "CVE-2021-4150": { + "cmt_msg": "block: fix incorrect references to disk objects" + }, + "CVE-2021-4159": { + "cmt_msg": "bpf: Verifer, adjust_scalar_min_max_vals to always call update_reg_bounds()" + }, + "CVE-2021-29154": { + "cmt_msg": "bpf, x86: Validate computation of branch displacements for x86-64" + }, + "CVE-2021-29155": { + "cmt_msg": "bpf: Use correct permission flag for mixed signed bounds arithmetic" + }, + "CVE-2018-10902": { + "cmt_msg": "ALSA: rawmidi: Change resized buffers atomically" + }, + "CVE-2022-25375": { + "cmt_msg": "usb: gadget: rndis: check size of RNDIS_MSG_SET command" + }, + "CVE-2021-47158": { + "cmt_msg": "net: dsa: sja1105: add error handling in sja1105_setup()" + }, + "CVE-2021-47153": { + "cmt_msg": "i2c: i801: Don't generate an interrupt on bus reset" + }, + "CVE-2021-47151": { + "cmt_msg": "interconnect: qcom: bcm-voter: add a missing of_node_put()" + }, + "CVE-2021-46936": { + "cmt_msg": "net: fix use-after-free in tw_timer_handler" + }, + "CVE-2021-46932": { + "cmt_msg": "Input: appletouch - initialize work before device registration" + }, + "CVE-2021-46939": { + "cmt_msg": "tracing: Restructure trace_clock_global() to never block" + }, + "CVE-2019-20908": { + "cmt_msg": "efi: Restrict efivar_ssdt_load when the kernel is locked down" + }, + "CVE-2024-26623": { + "cmt_msg": "pds_core: Prevent race issues involving the adminq" + }, + "CVE-2019-3837": { + "cmt_msg": "net_dma: simple removal" + }, + "CVE-2018-16884": { + "cmt_msg": "sunrpc: use-after-free in svc_process_common()" + }, + "CVE-2022-45885": { + "cmt_msg": "" + }, + "CVE-2022-45884": { + "cmt_msg": "" + }, + "CVE-2024-25740": { + "cmt_msg": "" + }, + "CVE-2024-25741": { + "cmt_msg": "" + }, + "CVE-2024-25744": { + "cmt_msg": "x86/coco: Disable 32-bit emulation by default on TDX and SEV" + }, + "CVE-2015-2877": { + "cmt_msg": "" + }, + "CVE-2023-37454": { + "cmt_msg": "" + }, + "CVE-2015-4004": { + "cmt_msg": "staging: ozwpan: Remove from tree" + }, + "CVE-2015-4001": { + "cmt_msg": "ozwpan: Use unsigned ints to prevent heap overflow" + }, + "CVE-2018-1130": { + "cmt_msg": "dccp: check sk for closed state in dccp_sendmsg()" + }, + "CVE-2020-36557": { + "cmt_msg": "vt: vt_ioctl: fix VT_DISALLOCATE freeing in-use virtual console" + }, + "CVE-2021-3506": { + "cmt_msg": "f2fs: fix to avoid out-of-bounds memory access" + }, + "CVE-2020-14331": { + "cmt_msg": "vgacon: Fix for missing check in scrollback handling" + }, + "CVE-2022-36123": { + "cmt_msg": "x86: Clear .brk area at early boot" + }, + "CVE-2019-19532": { + "cmt_msg": "HID: Fix assumption that devices have inputs" + }, + "CVE-2019-3901": { + "cmt_msg": "perf/core: Fix perf_event_open() vs. execve() race" + }, + "CVE-2020-36558": { + "cmt_msg": "vt: vt_ioctl: fix race in VT_RESIZEX" + }, + "CVE-2018-13100": { + "cmt_msg": "f2fs: fix to do sanity check with secs_per_zone" + }, + "CVE-2017-5897": { + "cmt_msg": "ip6_gre: fix ip6gre_err() invalid reads" + }, + "CVE-2017-6074": { + "cmt_msg": "dccp: fix freeing skb too early for IPV6_RECVPKTINFO" + }, + "CVE-2015-8104": { + "cmt_msg": "KVM: svm: unconditionally intercept #DB" + }, + "CVE-2020-36158": { + "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_cmd_802_11_ad_hoc_start" + }, + "CVE-2016-6828": { + "cmt_msg": "tcp: fix use after free in tcp_xmit_retransmit_queue()" + }, + "CVE-2021-39686": { + "cmt_msg": "binder: use euid from cred instead of using task" + }, + "CVE-2021-39685": { + "cmt_msg": "USB: gadget: detect too-big endpoint 0 requests" + }, + "CVE-2018-1000204": { + "cmt_msg": "scsi: sg: allocate with __GFP_ZERO in sg_build_indirect()" + }, + "CVE-2017-12134": { + "cmt_msg": "xen: fix bio vec merging" + }, + "CVE-2017-17450": { + "cmt_msg": "netfilter: xt_osf: Add missing permission checks" + }, + "CVE-2024-26592": { + "cmt_msg": "ksmbd: fix UAF issue in ksmbd_tcp_new_connection()" + }, + "CVE-2016-3672": { + "cmt_msg": "x86/mm/32: Enable full randomization on i386 and X86_32" + }, + "CVE-2024-26594": { + "cmt_msg": "ksmbd: validate mech token in session setup" + }, + "CVE-2017-18270": { + "cmt_msg": "KEYS: prevent creating a different user's keyrings" + }, + "CVE-2024-26598": { + "cmt_msg": "KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache" + }, + "CVE-2018-3646": { + "cmt_msg": "x86/microcode: Allow late microcode loading with SMT disabled" + }, + "CVE-2023-2007": { + "cmt_msg": "scsi: dpt_i2o: Remove obsolete driver" + }, + "CVE-2017-16913": { + "cmt_msg": "usbip: fix stub_rx: harden CMD_SUBMIT path to handle malicious input" + }, + "CVE-2017-8106": { + "cmt_msg": "KVM: nVMX: Don't advertise single context invalidation for invept" + }, + "CVE-2022-2503": { + "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag" + }, + "CVE-2022-23038": { + "cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()" + }, + "CVE-2022-23039": { + "cmt_msg": "xen/gntalloc: don't use gnttab_query_foreign_access()" + }, + "CVE-2016-8645": { + "cmt_msg": "tcp: take care of truncations done by sk_filter()" + }, + "CVE-2022-23036": { + "cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()" + }, + "CVE-2022-23037": { + "cmt_msg": "xen/netfront: don't use gnttab_query_foreign_access() for mapped status" + }, + "CVE-2017-5669": { + "cmt_msg": "ipc/shm: Fix shmat mmap nil-page protection" + }, + "CVE-2023-2176": { + "cmt_msg": "RDMA/core: Refactor rdma_bind_addr" + }, + "CVE-2019-14821": { + "cmt_msg": "KVM: coalesced_mmio: add bounds checking" + }, + "CVE-2020-12826": { + "cmt_msg": "signal: Extend exec_id to 64bits" + }, + "CVE-2021-42008": { + "cmt_msg": "net: 6pack: fix slab-out-of-bounds in decode_data" + }, + "CVE-2019-15666": { + "cmt_msg": "xfrm: policy: Fix out-of-bound array accesses in __xfrm_policy_unlink" + }, + "CVE-2015-1350": { + "cmt_msg": "fs: Avoid premature clearing of capabilities" + }, + "CVE-2021-33034": { + "cmt_msg": "Bluetooth: verify AMP hci_chan before amp_destroy" + }, + "CVE-2017-18509": { + "cmt_msg": "ipv6: check sk sk_type and protocol early in ip_mroute_set/getsockopt" + }, + "CVE-2017-11600": { + "cmt_msg": "xfrm: policy: check policy direction value" + }, + "CVE-2024-26625": { + "cmt_msg": "llc: call sock_orphan() at release time" + }, + "CVE-2024-26627": { + "cmt_msg": "scsi: core: Move scsi_host_busy() out of host lock for waking up EH handler" + }, + "CVE-2024-26622": { + "cmt_msg": "tomoyo: fix UAF write bug in tomoyo_write_control()" + }, + "CVE-2024-22386": { + "cmt_msg": "" + }, + "CVE-2018-10021": { + "cmt_msg": "scsi: libsas: defer ata device eh commands to libata" + }, + "CVE-2017-18221": { + "cmt_msg": "mlock: fix mlock count can not decrease in race condition" + }, + "CVE-2019-10126": { + "cmt_msg": "mwifiex: Fix heap overflow in mwifiex_uap_parse_tail_ies()" + }, + "CVE-2020-13974": { + "cmt_msg": "vt: keyboard: avoid signed integer overflow in k_ascii" + }, + "CVE-2020-15437": { + "cmt_msg": "serial: 8250: fix null-ptr-deref in serial8250_start_tx()" + }, + "CVE-2020-15436": { + "cmt_msg": "block: Fix use-after-free in blkdev_get()" + }, + "CVE-2016-9178": { + "cmt_msg": "fix minor infoleak in get_user_ex()" + }, + "CVE-2021-47065": { + "cmt_msg": "rtw88: Fix array overrun in rtw_get_tx_power_params()" + }, + "CVE-2022-23816": { + "cmt_msg": "x86/kvm/vmx: Make noinstr clean" + }, + "CVE-2021-47149": { + "cmt_msg": "net: fujitsu: fix potential null-ptr-deref" + }, + "CVE-2014-9922": { + "cmt_msg": "fs: limit filesystem stacking depth" + }, + "CVE-2021-47145": { + "cmt_msg": "btrfs: do not BUG_ON in link_to_fixup_dir" + }, + "CVE-2021-47144": { + "cmt_msg": "drm/amd/amdgpu: fix refcount leak" + }, + "CVE-2021-47147": { + "cmt_msg": "ptp: ocp: Fix a resource leak in an error handling path" + }, + "CVE-2021-47146": { + "cmt_msg": "mld: fix panic in mld_newpack()" + }, + "CVE-2021-47140": { + "cmt_msg": "iommu/amd: Clear DMA ops when switching domain" + }, + "CVE-2021-47143": { + "cmt_msg": "net/smc: remove device from smcd_dev_list after failed device_add()" + }, + "CVE-2021-47142": { + "cmt_msg": "drm/amdgpu: Fix a use-after-free" + }, + "CVE-2021-33061": { + "cmt_msg": "ixgbe: add improvement for MDD response functionality" + }, + "CVE-2018-16658": { + "cmt_msg": "cdrom: Fix info leak/OOB read in cdrom_ioctl_drive_status" + }, + "CVE-2019-19036": { + "cmt_msg": "btrfs: Detect unbalanced tree with empty leaf before crashing btree operations" + }, + "CVE-2017-8797": { + "cmt_msg": "nfsd: fix undefined behavior in nfsd4_layout_verify" + }, + "CVE-2015-5307": { + "cmt_msg": "KVM: x86: work around infinite loop in microcode when #AC is delivered" + }, + "CVE-2021-32078": { + "cmt_msg": "ARM: footbridge: remove personal server platform" + }, + "CVE-2022-4662": { + "cmt_msg": "USB: core: Prevent nested device-reset calls" + }, + "CVE-2019-11833": { + "cmt_msg": "ext4: zero out the unused memory region in the extent tree block" + }, + "CVE-2018-5953": { + "cmt_msg": "printk: hash addresses printed with %p" + }, + "CVE-2018-1128": { + "cmt_msg": "libceph: add authorizer challenge" + }, + "CVE-2018-1129": { + "cmt_msg": "libceph: implement CEPHX_V2 calculation mode" + }, + "CVE-2018-1120": { + "cmt_msg": "proc: do not access cmdline nor environ from file-backed areas" + }, + "CVE-2018-1121": { + "cmt_msg": "" + }, + "CVE-2022-3061": { + "cmt_msg": "video: fbdev: i740fb: Error out if 'pixclock' equals zero" + }, + "CVE-2020-29568": { + "cmt_msg": "xen/xenbus: Allow watches discard events before queueing" + }, + "CVE-2020-27786": { + "cmt_msg": "ALSA: rawmidi: Fix racy buffer resize under concurrent accesses" + }, + "CVE-2023-6240": { + "cmt_msg": "" + }, + "CVE-2022-39842": { + "cmt_msg": "video: fbdev: pxa3xx-gcu: Fix integer overflow in pxa3xx_gcu_write" + }, + "CVE-2024-23196": { + "cmt_msg": "ALSA: hda: fix a possible null-pointer dereference due to data race in snd_hdac_regmap_sync()" + }, + "CVE-2017-16939": { + "cmt_msg": "ipsec: Fix aborted xfrm policy dump crash" + }, + "CVE-2016-10741": { + "cmt_msg": "xfs: don't BUG() on mixed direct and mapped I/O" + }, + "CVE-2021-26931": { + "cmt_msg": "xen-blkback: don't \"handle\" error by BUG()" + }, + "CVE-2021-26930": { + "cmt_msg": "xen-blkback: fix error handling in xen_blkbk_map()" + }, + "CVE-2021-26932": { + "cmt_msg": "Xen/x86: don't bail early from clear_foreign_p2m_mapping()" + }, + "CVE-2021-3178": { + "cmt_msg": "nfsd4: readdirplus shouldn't return parent of export" + }, + "CVE-2023-1611": { + "cmt_msg": "btrfs: fix race between quota disable and quota assign ioctls" + }, + "CVE-2021-3772": { + "cmt_msg": "sctp: use init_tag from inithdr for ABORT chunk" + }, + "CVE-2021-34556": { + "cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4" + }, + "CVE-2021-28713": { + "cmt_msg": "xen/console: harden hvc_xen against event channel storms" + }, + "CVE-2021-28712": { + "cmt_msg": "xen/netfront: harden netfront against event channel storms" + }, + "CVE-2021-28711": { + "cmt_msg": "xen/blkfront: harden blkfront against event channel storms" + }, + "CVE-2022-1247": { + "cmt_msg": "" + }, + "CVE-2017-11473": { + "cmt_msg": "x86/acpi: Prevent out of bound access caused by broken ACPI tables" + }, + "CVE-2017-11472": { + "cmt_msg": "ACPICA: Namespace: fix operand cache leak" + }, + "CVE-2021-39657": { + "cmt_msg": "scsi: ufs: Correct the LUN used in eh_device_reset_handler() callback" + }, + "CVE-2023-52578": { + "cmt_msg": "net: bridge: use DEV_STATS_INC()" + }, + "CVE-2023-52574": { + "cmt_msg": "team: fix null-ptr-deref when team device type is changed" + }, + "CVE-2023-3567": { + "cmt_msg": "vc_screen: move load of struct vc_data pointer in vcs_read() to avoid UAF" + }, + "CVE-2023-52571": { + "cmt_msg": "power: supply: rk817: Fix node refcount leak" + }, + "CVE-2023-52572": { + "cmt_msg": "cifs: Fix UAF in cifs_demultiplex_thread()" + }, + "CVE-2017-14340": { + "cmt_msg": "xfs: XFS_IS_REALTIME_INODE() should be false if no rt device present" + }, + "CVE-2014-3180": { + "cmt_msg": "compat: nanosleep: Clarify error handling" + }, + "CVE-2019-19039": { + "cmt_msg": "btrfs: Don't submit any btree write bio if the fs has errors" + }, + "CVE-2016-8633": { + "cmt_msg": "firewire: net: guard against rx buffer overflows" + }, + "CVE-2016-8632": { + "cmt_msg": "tipc: check minimum bearer MTU" + }, + "CVE-2020-12362": { + "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" + }, + "CVE-2020-12363": { + "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" + }, + "CVE-2019-12881": { + "cmt_msg": "drm/i915/userptr: reject zero user_size" + }, + "CVE-2022-4129": { + "cmt_msg": "l2tp: Serialize access to sk_user_data with sk_callback_lock" + }, + "CVE-2020-12364": { + "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" + }, + "CVE-2020-10742": { + "cmt_msg": "new helper: iov_iter_get_pages_alloc()" + }, + "CVE-2021-4002": { + "cmt_msg": "hugetlbfs: flush TLBs correctly after huge_pmd_unshare" + }, + "CVE-2017-12168": { + "cmt_msg": "arm64: KVM: pmu: Fix AArch32 cycle counter access" + }, + "CVE-2019-15292": { + "cmt_msg": "appletalk: Fix use-after-free in atalk_proc_exit" + }, + "CVE-2019-15291": { + "cmt_msg": "media: b2c2-flexcop-usb: add sanity checking" + }, + "CVE-2019-15290": { + "cmt_msg": "" + }, + "CVE-2023-3212": { + "cmt_msg": "gfs2: Don't deref jdesc in evict" + }, + "CVE-2024-26633": { + "cmt_msg": "ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim()" + }, + "CVE-2024-26636": { + "cmt_msg": "llc: make llc_ui_sendmsg() more robust against bonding changes" + }, + "CVE-2024-26635": { + "cmt_msg": "llc: Drop support for ETH_P_TR_802_2." + }, + "CVE-2017-7308": { + "cmt_msg": "net/packet: fix overflow in check for priv area size" + }, + "CVE-2016-0758": { + "cmt_msg": "KEYS: Fix ASN.1 indefinite length object parsing" + }, + "CVE-2020-12769": { + "cmt_msg": "spi: spi-dw: Add lock protect dw_spi rx/tx to prevent concurrent calls" + }, + "CVE-2017-8890": { + "cmt_msg": "dccp/tcp: do not inherit mc_list from parent" + }, + "CVE-2016-9588": { + "cmt_msg": "kvm: nVMX: Allow L1 to intercept software exceptions (#BP and #OF)" + }, + "CVE-2017-18208": { + "cmt_msg": "mm/madvise.c: fix madvise() infinite loop under special circumstances" + }, + "CVE-2017-1000364": { + "cmt_msg": "mm: larger stack guard gap, between vmas" + }, + "CVE-2017-1000365": { + "cmt_msg": "fs/exec.c: account for argv/envp pointers" + }, + "CVE-2020-13143": { + "cmt_msg": "USB: gadget: fix illegal array access in binding with UDC" + }, + "CVE-2017-1000363": { + "cmt_msg": "char: lp: fix possible integer overflow in lp_setup()" + }, + "CVE-2022-3903": { + "cmt_msg": "media: mceusb: Use new usb_control_msg_*() routines" + }, + "CVE-2017-15299": { + "cmt_msg": "KEYS: don't let add_key() update an uninstantiated key" + }, + "CVE-2021-47179": { + "cmt_msg": "NFSv4: Fix a NULL pointer dereference in pnfs_mark_matching_lsegs_return()" + }, + "CVE-2019-11190": { + "cmt_msg": "binfmt_elf: switch to new creds when switching to new mm" + }, + "CVE-2019-11191": { + "cmt_msg": "x86: Deprecate a.out support" + }, + "CVE-2021-47170": { + "cmt_msg": "USB: usbfs: Don't WARN about excessively large memory allocations" + }, + "CVE-2021-47171": { + "cmt_msg": "net: usb: fix memory leak in smsc75xx_bind" + }, + "CVE-2021-47172": { + "cmt_msg": "iio: adc: ad7124: Fix potential overflow due to non sequential channel numbers" + }, + "CVE-2021-47173": { + "cmt_msg": "misc/uss720: fix memory leak in uss720_probe" + }, + "CVE-2021-47175": { + "cmt_msg": "net/sched: fq_pie: fix OOB access in the traffic path" + }, + "CVE-2018-10323": { + "cmt_msg": "xfs: set format back to extents if xfs_bmap_extents_to_btree" + }, + "CVE-2018-10322": { + "cmt_msg": "xfs: enhance dinode verifier" + }, + "CVE-2021-46951": { + "cmt_msg": "tpm: efi: Use local variable for calculating final log size" + }, + "CVE-2021-46950": { + "cmt_msg": "md/raid1: properly indicate failure when ending a failed write request" + }, + "CVE-2021-46952": { + "cmt_msg": "NFS: fs_context: validate UDP retrans to prevent shift out-of-bounds" + }, + "CVE-2021-46959": { + "cmt_msg": "spi: Fix use-after-free with devm_spi_alloc_*" + }, + "CVE-2017-18193": { + "cmt_msg": "f2fs: fix a bug caused by NULL extent tree" + }, + "CVE-2023-5178": { + "cmt_msg": "nvmet-tcp: Fix a possible UAF in queue intialization setup" + }, + "CVE-2021-0929": { + "cmt_msg": "staging/android/ion: delete dma_buf->kmap/unmap implemenation" + }, + "CVE-2018-19985": { + "cmt_msg": "USB: hso: Fix OOB memory access in hso_probe/hso_get_config_data" + }, + "CVE-2021-0920": { + "cmt_msg": "af_unix: fix garbage collect vs MSG_PEEK" + }, + "CVE-2017-7273": { + "cmt_msg": "HID: hid-cypress: validate length of report" + }, + "CVE-2017-7472": { + "cmt_msg": "KEYS: fix keyctl_set_reqkey_keyring() to not leak thread keyrings" + }, + "CVE-2022-3586": { + "cmt_msg": "sch_sfb: Don't assume the skb is still around after enqueueing to child" + }, + "CVE-2020-27825": { + "cmt_msg": "tracing: Fix race in trace_open and buffer resize call" + }, + "CVE-2019-2181": { + "cmt_msg": "binder: check for overflow when alloc for security context" + }, + "CVE-2020-27820": { + "cmt_msg": "drm/nouveau: use drm_dev_unplug() during device removal" + }, + "CVE-2023-6610": { + "cmt_msg": "smb: client: fix potential OOB in smb2_dump_detail()" + }, + "CVE-2023-1476": { + "cmt_msg": "" + }, + "CVE-2023-1670": { + "cmt_msg": "xirc2ps_cs: Fix use after free bug in xirc2ps_detach" + }, + "CVE-2020-14351": { + "cmt_msg": "perf/core: Fix race in the perf_mmap_close() function" + }, + "CVE-2020-14353": { + "cmt_msg": "KEYS: prevent creating a different user's keyrings" + }, + "CVE-2020-0429": { + "cmt_msg": "l2tp: fix race between l2tp_session_delete() and l2tp_tunnel_closeall()" + }, + "CVE-2022-20132": { + "cmt_msg": "HID: add hid_is_usb() function to make it simpler for USB detection" + }, + "CVE-2023-6270": { + "cmt_msg": "aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts" + }, + "CVE-2019-17351": { + "cmt_msg": "xen: let alloc_xenballooned_pages() fail if not enough memory free" + }, + "CVE-2018-20854": { + "cmt_msg": "phy: ocelot-serdes: fix out-of-bounds read" + }, + "CVE-2018-20855": { + "cmt_msg": "IB/mlx5: Fix leaking stack memory to userspace" + }, + "CVE-2023-35824": { + "cmt_msg": "media: dm1105: Fix use after free bug in dm1105_remove due to race condition" + }, + "CVE-2016-2053": { + "cmt_msg": "ASN.1: Fix non-match detection failure on data overrun" + }, + "CVE-2019-1999": { + "cmt_msg": "binder: fix race between munmap() and direct reclaim" + }, + "CVE-2018-1066": { + "cmt_msg": "CIFS: Enable encryption during session setup phase" + }, + "CVE-2018-1068": { + "cmt_msg": "netfilter: ebtables: CONFIG_COMPAT: don't trust userland offsets" + }, + "CVE-2019-7308": { + "cmt_msg": "bpf: fix sanitation of alu op with pointer / scalar type from different paths" + }, + "CVE-2018-1000199": { + "cmt_msg": "perf/hwbp: Simplify the perf-hwbp code, fix documentation" + }, + "CVE-2022-1966": { + "cmt_msg": "netfilter: nf_tables: disallow non-stateful expression in sets earlier" + }, + "CVE-2021-3587": { + "cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect" + }, + "CVE-2017-18079": { + "cmt_msg": "Input: i8042 - fix crash at boot time" + }, + "CVE-2015-8019": { + "cmt_msg": "net: add length argument to skb_copy_and_csum_datagram_iovec" + }, + "CVE-2020-1749": { + "cmt_msg": "net: ipv6_stub: use ip6_dst_lookup_flow instead of ip6_dst_lookup" + }, + "CVE-2017-18216": { + "cmt_msg": "ocfs2: subsystem.su_mutex is required while accessing the item->ci_parent" + }, + "CVE-2021-39648": { + "cmt_msg": "usb: gadget: configfs: Fix use-after-free issue with udc_name" + }, + "CVE-2023-52569": { + "cmt_msg": "btrfs: remove BUG() after failure to insert delayed dir index item" + }, + "CVE-2023-52568": { + "cmt_msg": "x86/sgx: Resolves SECS reclaim vs. page fault for EAUG race" + }, + "CVE-2019-0136": { + "cmt_msg": "mac80211: drop robust management frames from unknown TA" + }, + "CVE-2023-52563": { + "cmt_msg": "drm/meson: fix memory leak on ->hpd_notify callback" + }, + "CVE-2023-52561": { + "cmt_msg": "arm64: dts: qcom: sdm845-db845c: Mark cont splash memory region as reserved" + }, + "CVE-2023-52566": { + "cmt_msg": "nilfs2: fix potential use after free in nilfs_gccache_submit_read_data()" + }, + "CVE-2023-52565": { + "cmt_msg": "media: uvcvideo: Fix OOB read" + }, + "CVE-2018-12896": { + "cmt_msg": "posix-timers: Sanitize overrun handling" + }, + "CVE-2020-0347": { + "cmt_msg": "" + }, + "CVE-2015-1805": { + "cmt_msg": "new helper: copy_page_from_iter()" + }, + "CVE-2021-40490": { + "cmt_msg": "ext4: fix race writing to an inline_data file while its xattrs are changing" + }, + "CVE-2019-12456": { + "cmt_msg": "" + }, + "CVE-2019-5108": { + "cmt_msg": "mac80211: Do not send Layer 2 Update frame before authorization" + }, + "CVE-2019-17133": { + "cmt_msg": "cfg80211: wext: avoid copying malformed SSIDs" + }, + "CVE-2021-33656": { + "cmt_msg": "vt: drop old FONT ioctls" + }, + "CVE-2021-33655": { + "cmt_msg": "fbcon: Disallow setting font bigger than screen size" + }, + "CVE-2022-41858": { + "cmt_msg": "drivers: net: slip: fix NPD bug in sl_tx_timeout()" + }, + "CVE-2022-41850": { + "cmt_msg": "HID: roccat: Fix use-after-free in roccat_read()" + }, + "CVE-2017-10663": { + "cmt_msg": "f2fs: sanity check checkpoint segno and blkoff" + }, + "CVE-2017-10662": { + "cmt_msg": "f2fs: sanity check segment count" + }, + "CVE-2017-10661": { + "cmt_msg": "timerfd: Protect the might cancel mechanism proper" + }, + "CVE-2022-1184": { + "cmt_msg": "ext4: verify dir block before splitting it" + }, + "CVE-2016-7425": { + "cmt_msg": "scsi: arcmsr: Buffer overflow in arcmsr_iop_message_xfer()" + }, + "CVE-2017-14991": { + "cmt_msg": "scsi: sg: fixup infoleak when using SG_GET_REQUEST_TABLE" + }, + "CVE-2018-7566": { + "cmt_msg": "ALSA: seq: Fix racy pool initializations" + }, + "CVE-2017-7645": { + "cmt_msg": "nfsd: check for oversized NFSv2/v3 arguments" + }, + "CVE-2024-26808": { + "cmt_msg": "netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain" + }, + "CVE-2024-26809": { + "cmt_msg": "netfilter: nft_set_pipapo: release elements in clone only from destroy path" + }, + "CVE-2021-42739": { + "cmt_msg": "media: firewire: firedtv-avc: fix a buffer overflow in avc_ca_pmt()" + }, + "CVE-2024-26806": { + "cmt_msg": "spi: cadence-qspi: remove system-wide suspend helper calls from runtime PM hooks" + }, + "CVE-2021-37159": { + "cmt_msg": "usb: hso: fix error handling code of hso_create_net_device" + }, + "CVE-2020-12770": { + "cmt_msg": "scsi: sg: add sg_remove_request in sg_write" + }, + "CVE-2024-26802": { + "cmt_msg": "stmmac: Clear variable when destroying workqueue" + }, + "CVE-2018-6412": { + "cmt_msg": "fbdev: Fixing arbitrary kernel leak in case FBIOGETCMAP_SPARC in sbusfb_ioctl_helper()." + }, + "CVE-2023-52606": { + "cmt_msg": "powerpc/lib: Validate size for vector operations" + }, + "CVE-2018-21008": { + "cmt_msg": "rsi: add fix for crash during assertions" + }, + "CVE-2023-52604": { + "cmt_msg": "FS:JFS:UBSAN:array-index-out-of-bounds in dbAdjTree" + }, + "CVE-2023-52602": { + "cmt_msg": "jfs: fix slab-out-of-bounds Read in dtSearch" + }, + "CVE-2023-52603": { + "cmt_msg": "UBSAN: array-index-out-of-bounds in dtSplitRoot" + }, + "CVE-2023-52600": { + "cmt_msg": "jfs: fix uaf in jfs_evict_inode" + }, + "CVE-2023-52601": { + "cmt_msg": "jfs: fix array-index-out-of-bounds in dbAdjTree" + }, + "CVE-2023-52609": { + "cmt_msg": "binder: fix race between mmput() and do_exit()" + }, + "CVE-2016-1583": { + "cmt_msg": "proc: prevent stacking filesystems on top" + }, + "CVE-2017-1000379": { + "cmt_msg": "mm: larger stack guard gap, between vmas" + }, + "CVE-2023-3640": { + "cmt_msg": "" + }, + "CVE-2023-3022": { + "cmt_msg": "ipv6: Use result arg in fib_lookup_arg consistently" + }, + "CVE-2022-43750": { + "cmt_msg": "usb: mon: make mmapped memory read only" + }, + "CVE-2023-0047": { + "cmt_msg": "mm, oom: do not trigger out_of_memory from the #PF" + }, + "CVE-2023-4010": { + "cmt_msg": "" + }, + "CVE-2021-47165": { + "cmt_msg": "drm/meson: fix shutdown crash when component not probed" + }, + "CVE-2021-46969": { + "cmt_msg": "bus: mhi: core: Fix invalid error returning in mhi_queue" + }, + "CVE-2021-47160": { + "cmt_msg": "net: dsa: mt7530: fix VLAN traffic leaks" + }, + "CVE-2023-4385": { + "cmt_msg": "fs: jfs: fix possible NULL pointer dereference in dbFree()" + }, + "CVE-2021-46965": { + "cmt_msg": "mtd: physmap: physmap-bt1-rom: Fix unintentional stack access" + }, + "CVE-2021-47169": { + "cmt_msg": "serial: rp2: use 'request_firmware' instead of 'request_firmware_nowait'" + }, + "CVE-2021-47168": { + "cmt_msg": "NFS: fix an incorrect limit in filelayout_decode_layout()" + }, + "CVE-2019-19378": { + "cmt_msg": "" + }, + "CVE-2022-36879": { + "cmt_msg": "xfrm: xfrm_policy: fix a possible double xfrm_pols_put() in xfrm_bundle_lookup()" + }, + "CVE-2019-19377": { + "cmt_msg": "btrfs: Don't submit any btree write bio if the fs has errors" + }, + "CVE-2017-7482": { + "cmt_msg": "rxrpc: Fix several cases where a padded len isn't checked in ticket decode" + }, + "CVE-2017-7487": { + "cmt_msg": "ipx: call ipxitf_put() in ioctl error path" + }, + "CVE-2023-1118": { + "cmt_msg": "media: rc: Fix use-after-free bugs caused by ene_tx_irqsim()" + }, + "CVE-2021-0937": { + "cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write" + }, + "CVE-2017-7261": { + "cmt_msg": "drm/vmwgfx: NULL pointer dereference in vmw_surface_define_ioctl()" + }, + "CVE-2016-5243": { + "cmt_msg": "tipc: fix an infoleak in tipc_nl_compat_link_dump" + }, + "CVE-2019-16746": { + "cmt_msg": "nl80211: validate beacon head" + }, + "CVE-2022-3606": { + "cmt_msg": "" + }, + "CVE-2018-18021": { + "cmt_msg": "arm64: KVM: Tighten guest core register access from userspace" + }, + "CVE-2021-37576": { + "cmt_msg": "KVM: PPC: Book3S: Fix H_RTAS rets buffer overflow" + }, + "CVE-2022-3594": { + "cmt_msg": "r8152: Rate limit overflow messages" + }, + "CVE-2022-3595": { + "cmt_msg": "cifs: fix double-fault crash during ntlmssp" + }, + "CVE-2018-5803": { + "cmt_msg": "sctp: verify size of a new chunk in _sctp_make_chunk()" + }, + "CVE-2020-27815": { + "cmt_msg": "jfs: Fix array index bounds check in dbAdjTree" + }, + "CVE-2023-6606": { + "cmt_msg": "smb: client: fix OOB in smbCalcSize()" + }, + "CVE-2020-27673": { + "cmt_msg": "xen/events: add a proper barrier to 2-level uevent unmasking" + }, + "CVE-2020-27675": { + "cmt_msg": "xen/events: avoid removing an event channel while handling it" + }, + "CVE-2020-28915": { + "cmt_msg": "fbcon: Fix global-out-of-bounds read in fbcon_get_font()" + }, + "CVE-2022-3111": { + "cmt_msg": "power: supply: wm8350-power: Add missing free in free_charger_irq" + }, + "CVE-2020-0435": { + "cmt_msg": "f2fs: fix to do sanity check with i_extra_isize" + }, + "CVE-2020-0432": { + "cmt_msg": "staging: most: net: fix buffer overflow" + }, + "CVE-2020-0433": { + "cmt_msg": "blk-mq: sync the update nr_hw_queues with blk_mq_queue_tag_busy_iter" + }, + "CVE-2020-0431": { + "cmt_msg": "HID: hid-input: clear unmapped usages" + }, + "CVE-2023-6915": { + "cmt_msg": "ida: Fix crash in ida_free when the bitmap is empty" + }, + "CVE-2023-1249": { + "cmt_msg": "coredump: Use the vma snapshot in fill_files_note" + }, + "CVE-2021-3483": { + "cmt_msg": "firewire: nosy: Fix a use-after-free bug in nosy_ioctl()" + }, + "CVE-2023-6040": { + "cmt_msg": "netfilter: nf_tables: Reject tables of unsupported family" + }, + "CVE-2017-16912": { + "cmt_msg": "usbip: fix stub_rx: get_pipe() to validate endpoint number" + }, + "CVE-2017-16911": { + "cmt_msg": "usbip: prevent vhci_hcd driver from leaking a socket pointer address" + }, + "CVE-2017-16914": { + "cmt_msg": "usbip: fix stub_send_ret_submit() vulnerability to null transfer_buffer" + }, + "CVE-2020-36691": { + "cmt_msg": "netlink: limit recursion depth in policy validation" + }, + "CVE-2023-42755": { + "cmt_msg": "net/sched: Retire rsvp classifier" + }, + "CVE-2023-42752": { + "cmt_msg": "igmp: limit igmpv3_newpack() packet size to IP_MAX_MTU" + }, + "CVE-2021-3573": { + "cmt_msg": "Bluetooth: use correct lock to prevent UAF of hdev object" + }, + "CVE-2022-1974": { + "cmt_msg": "nfc: replace improper check device_is_registered() in netlink related functions" + }, + "CVE-2022-1975": { + "cmt_msg": "NFC: netlink: fix sleep in atomic bug when firmware download timeout" + }, + "CVE-2023-1380": { + "cmt_msg": "wifi: brcmfmac: slab-out-of-bounds read in brcmf_get_assoc_ies()" + }, + "CVE-2018-12130": { + "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" + }, + "CVE-2022-32981": { + "cmt_msg": "powerpc/32: Fix overread/overwrite of thread_struct via ptrace" + }, + "CVE-2018-13405": { + "cmt_msg": "Fix up non-directory creation in SGID directories" + }, + "CVE-2018-13406": { + "cmt_msg": "video: uvesafb: Fix integer overflow in allocation" + }, + "CVE-2020-11668": { + "cmt_msg": "media: xirlink_cit: add missing descriptor sanity checks" + }, + "CVE-2020-11669": { + "cmt_msg": "powerpc/powernv/idle: Restore AMR/UAMOR/AMOR after idle" + }, + "CVE-2015-0274": { + "cmt_msg": "xfs: remote attribute overwrite causes transaction overrun" + }, + "CVE-2019-14901": { + "cmt_msg": "mwifiex: Fix heap overflow in mmwifiex_process_tdls_action_frame()" + }, + "CVE-2020-8694": { + "cmt_msg": "powercap: restrict energy meter to root access" + }, + "CVE-2021-3714": { + "cmt_msg": "" + }, + "CVE-2019-16232": { + "cmt_msg": "libertas: fix a potential NULL pointer dereference" + }, + "CVE-2019-16233": { + "cmt_msg": "scsi: qla2xxx: fix a potential NULL pointer dereference" + }, + "CVE-2019-6133": { + "cmt_msg": "fork: record start_time late" + }, + "CVE-2021-39633": { + "cmt_msg": "ip_gre: add validation for csum_start" + }, + "CVE-2017-18203": { + "cmt_msg": "dm: fix race between dm_get_from_kobject() and __dm_destroy()" + }, + "CVE-2021-39636": { + "cmt_msg": "netfilter: x_tables: fix pointer leaks to userspace" + }, + "CVE-2017-18204": { + "cmt_msg": "ocfs2: should wait dio before inode lock in ocfs2_setattr()" + }, + "CVE-2021-39634": { + "cmt_msg": "epoll: do not insert into poll queues until all sanity checks are done" + }, + "CVE-2022-33742": { + "cmt_msg": "xen/blkfront: force data bouncing when backend is untrusted" + }, + "CVE-2022-33741": { + "cmt_msg": "xen/netfront: force data bouncing when backend is untrusted" + }, + "CVE-2022-33740": { + "cmt_msg": "xen/netfront: fix leaking data in shared pages" + }, + "CVE-2022-33744": { + "cmt_msg": "xen/arm: Fix race in RB-tree based P2M accounting" + }, + "CVE-2023-52596": { + "cmt_msg": "sysctl: Fix out of bounds access for empty sysctl registers" + }, + "CVE-2023-52597": { + "cmt_msg": "KVM: s390: fix setting of fpc register" + }, + "CVE-2023-52594": { + "cmt_msg": "wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus()" + }, + "CVE-2023-52595": { + "cmt_msg": "wifi: rt2x00: restart beacon queue when hardware reset" + }, + "CVE-2023-52593": { + "cmt_msg": "wifi: wfx: fix possible NULL pointer dereference in wfx_set_mfp_ap()" + }, + "CVE-2023-52590": { + "cmt_msg": "ocfs2: Avoid touching renamed directory if parent does not change" + }, + "CVE-2023-52591": { + "cmt_msg": "reiserfs: Avoid touching renamed directory if parent does not change" + }, + "CVE-2019-9454": { + "cmt_msg": "i2c: core-smbus: prevent stack corruption on read I2C_BLOCK_DATA" + }, + "CVE-2023-52598": { + "cmt_msg": "s390/ptrace: handle setting of fpc register correctly" + }, + "CVE-2023-52599": { + "cmt_msg": "jfs: fix array-index-out-of-bounds in diNewExt" + }, + "CVE-2021-0447": { + "cmt_msg": "l2tp: protect sock pointer of struct pppol2tp_session with RCU" + }, + "CVE-2022-23222": { + "cmt_msg": "bpf: Replace PTR_TO_XXX_OR_NULL with PTR_TO_XXX | PTR_MAYBE_NULL" + }, + "CVE-2021-0448": { + "cmt_msg": "netfilter: ctnetlink: add a range check for l3/l4 protonum" + }, + "CVE-2017-12762": { + "cmt_msg": "isdn/i4l: fix buffer overflow" + }, + "CVE-2022-41849": { + "cmt_msg": "fbdev: smscufx: Fix use-after-free in ufx_ops_open()" + }, + "CVE-2022-41848": { + "cmt_msg": "" + }, + "CVE-2023-6356": { + "cmt_msg": "nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length" + }, + "CVE-2022-1353": { + "cmt_msg": "af_key: add __GFP_ZERO flag for compose_sadb_supported in function pfkey_register" + }, + "CVE-2022-1198": { + "cmt_msg": "drivers: hamradio: 6pack: fix UAF bug caused by mod_timer()" + }, + "CVE-2022-1199": { + "cmt_msg": "ax25: Fix NULL pointer dereference in ax25_kill_by_device" + }, + "CVE-2022-1195": { + "cmt_msg": "hamradio: improve the incomplete fix to avoid NPD" + }, + "CVE-2023-2124": { + "cmt_msg": "xfs: verify buffer contents when we skip log replay" + }, + "CVE-2019-15505": { + "cmt_msg": "media: technisat-usb2: break out of loop at end of buffer" + }, + "CVE-2022-27672": { + "cmt_msg": "x86/speculation: Identify processors vulnerable to SMT RSB predictions" + }, + "CVE-2014-9803": { + "cmt_msg": "Revert \"arm64: Introduce execute-only page access permissions\"" + }, + "CVE-2023-52508": { + "cmt_msg": "nvme-fc: Prevent null pointer dereference in nvme_fc_io_getuuid()" + }, + "CVE-2022-1280": { + "cmt_msg": "drm: avoid circular locks in drm_mode_getconnector" + }, + "CVE-2018-10880": { + "cmt_msg": "ext4: never move the system.data xattr out of the inode body" + }, + "CVE-2018-10881": { + "cmt_msg": "ext4: clear i_data in ext4_inode_info when removing inline data" + }, + "CVE-2018-10883": { + "cmt_msg": "jbd2: don't mark block as modified if the handle is out of credits" + } + } + }, + "3.16": { + "3.16": { + "CVE-2014-5077": { + "cmt_msg": "net: sctp: inherit auth_capable on INIT collisions", + "cmt_id": "1be9a950c646c9092fb3618197f7b6bfb50e82aa" + } + }, + "3.16.2": { + "CVE-2014-5472": { + "cmt_msg": "isofs: Fix unbounded recursion when processing relocated directories", + "cmt_id": "32134a15e8a2a5024806dc8f794df18ae3564f00" + }, + "CVE-2014-5471": { + "cmt_msg": "isofs: Fix unbounded recursion when processing relocated directories", + "cmt_id": "32134a15e8a2a5024806dc8f794df18ae3564f00" + }, + "CVE-2014-3182": { + "cmt_msg": "HID: logitech: perform bounds checking on device_id early enough", + "cmt_id": "e98c81884fe28d29a48a6dfa6512deccb8482fb7" + }, + "CVE-2014-3183": { + "cmt_msg": "HID: logitech: fix bounds checking on LED report size", + "cmt_id": "b8c0d10f1f43301bab6146874963749003a3d567" + }, + "CVE-2014-3184": { + "cmt_msg": "HID: fix a couple of off-by-ones", + "cmt_id": "fc1d74628298b9c14bd978ada534731e369dc29c" + }, + "CVE-2014-3185": { + "cmt_msg": "USB: whiteheat: Added bounds checking for bulk command response", + "cmt_id": "cf89514aaaf8004b3d180b797e7e6d4bc95a4c74" + }, + "CVE-2014-3601": { + "cmt_msg": "kvm: iommu: fix the third parameter of kvm_iommu_put_pages (CVE-2014-3601)", + "cmt_id": "35df08d69519d3a0e92c18b62e434c926ba63164" + } + }, + "3.16.3": { + "CVE-2014-3631": { + "cmt_msg": "KEYS: Fix termination condition in assoc array garbage collection", + "cmt_id": "a4b9e45fed010808c2b0c38d243a7a2b4adb512b" + }, + "CVE-2014-6418": { + "cmt_msg": "libceph: do not hard code max auth ticket len", + "cmt_id": "346acdffbb4a12f7f77a3fb0f6453a2bc1454b4f" + }, + "CVE-2014-5207": { + "cmt_msg": "mnt: Correct permission checks in do_remount", + "cmt_id": "3ed889bb32afa24e5ee77a3b40c7c8088b16eedf" + }, + "CVE-2014-5206": { + "cmt_msg": "mnt: Only change user settable mount flags in remount", + "cmt_id": "3995f446f4e51fb781467d6da1673cf4631634ff" + }, + "CVE-2014-6417": { + "cmt_msg": "libceph: do not hard code max auth ticket len", + "cmt_id": "346acdffbb4a12f7f77a3fb0f6453a2bc1454b4f" + }, + "CVE-2014-6416": { + "cmt_msg": "libceph: do not hard code max auth ticket len", + "cmt_id": "346acdffbb4a12f7f77a3fb0f6453a2bc1454b4f" + } + }, + "3.16.4": { + "CVE-2014-3181": { + "cmt_msg": "HID: magicmouse: sanity check report size in raw_event() callback", + "cmt_id": "249b61a6ba71975a83031c06b22013a37619a8b7" + }, + "CVE-2014-3186": { + "cmt_msg": "HID: picolcd: sanity check report size in raw_event() callback", + "cmt_id": "0db6de5fa66e02a03089d69bdc5db6d6947ed76b" + } + }, + "3.16.5": { + "CVE-2014-6410": { + "cmt_msg": "udf: Avoid infinite loop when processing indirect ICBs", + "cmt_id": "7478bcf7d5594fba7a98b8fef615e8924caf7977" + } + }, + "3.16.7": { + "CVE-2014-3690": { + "cmt_msg": "x86,kvm,vmx: Preserve CR4 across VM entry", + "cmt_id": "c047faa77f4324ed8f3b3a5c48f6e3ae0f658d8f" + }, + "CVE-2014-4608": { + "cmt_msg": "lzo: check for length overrun in variable length encoding.", + "cmt_id": "7e70a797fb587ed0ce86f8d52cbb3a0f88d3ac3f" + }, + "CVE-2014-7975": { + "cmt_msg": "fs: Add a missing permission check to do_umount", + "cmt_id": "c436c9115dab21fbdcae850e324d7ac3f73f04b7" + } + }, + "3.16.35": { + "CVE-2016-7913": { + "cmt_msg": "xc2028: avoid use after free", + "cmt_id": "e6cb39ac3f31cb5409f4078a0f0f8e7c25e48a98" + }, + "CVE-2016-3140": { + "cmt_msg": "USB: digi_acceleport: do sanity checking for the number of ports", + "cmt_id": "68833f4975aa22c57a99a84987d5158912406acb" + }, + "CVE-2016-2782": { + "cmt_msg": "USB: visor: fix null-deref at probe", + "cmt_id": "2e943fbce619e71cd28adc23abe2104f5675bdc3" + }, + "CVE-2015-6526": { + "cmt_msg": "powerpc/perf: Cap 64bit userspace backtraces to PERF_MAX_STACK_DEPTH", + "cmt_id": "1564ecf19e3b5e92b48531d580c3da04131596d5" + }, + "CVE-2015-9289": { + "cmt_msg": "cx24116: fix a buffer overflow when checking userspace params", + "cmt_id": "9bd2b656ff48dd870cc89679edf122cdca21399a" + }, + "CVE-2015-5707": { + "cmt_msg": "sg_start_req(): make sure that there's not too many elements in iovec", + "cmt_id": "2558b5b7ab218804ee03f5f13c0d3036e409dabe" + }, + "CVE-2015-0239": { + "cmt_msg": "KVM: x86: SYSENTER emulation is broken", + "cmt_id": "f280f83b5240101dc90d9b702b49c977ed097458" + }, + "CVE-2015-5257": { + "cmt_msg": "USB: whiteheat: fix potential null-deref at probe", + "cmt_id": "73e6391770a65856100661b56bcfa4b37bd0a98e" + }, + "CVE-2015-8970": { + "cmt_msg": "crypto: algif_skcipher - Require setkey before accept(2)", + "cmt_id": "21a017c3cb97b376833e1b70898ef3f95bc9fc2a" + }, + "CVE-2016-3136": { + "cmt_msg": "USB: mct_u232: add sanity checking in probe", + "cmt_id": "f3b7e0bf67ed9e3ecffbf1260f01794668398125" + }, + "CVE-2016-3955": { + "cmt_msg": "USB: usbip: fix potential out-of-bounds write", + "cmt_id": "87cfd54498d490a8bc460fd24f7e55b202c4cacd" + }, + "CVE-2016-3951": { + "cmt_msg": "cdc_ncm: do not call usbnet_link_change from cdc_ncm_bind", + "cmt_id": "40180f6f7410d7e6a2472eef65c408c9648c9ef3" + }, + "CVE-2014-9419": { + "cmt_msg": "x86_64, switch_to(): Load TLS descriptors before switching DS and ES", + "cmt_id": "82def0d6911ef554d8e3df4223755c2cbb1dd64d" + }, + "CVE-2015-8104": { + "cmt_msg": "KVM: svm: unconditionally intercept #DB", + "cmt_id": "13961a1784d20cc45210b664c6c2d0df6d2983c1" + }, + "CVE-2020-0066": { + "cmt_msg": "netlink: Trim skb to alloc size to avoid MSG_TRUNC", + "cmt_id": "9a11693d3def10330247d13f2db043d185002b8f" + }, + "CVE-2015-4700": { + "cmt_msg": "x86: bpf_jit: fix compilation of large bpf programs", + "cmt_id": "e0373a44e98aaf3b1c2ca0830b7b9e2e516f9bba" + }, + "CVE-2015-8551": { + "cmt_msg": "xen/pciback: Return error on XEN_PCI_OP_enable_msi when device has MSI or MSI-X enabled", + "cmt_id": "cb968d816e128f3c652f5a493d9a5cdd91490570" + }, + "CVE-2015-5156": { + "cmt_msg": "virtio-net: drop NETIF_F_FRAGLIST", + "cmt_id": "319e98c7b06b67d7005911d47949bfbc1be4eaaf" + }, + "CVE-2015-5157": { + "cmt_msg": "x86/nmi/64: Switch stacks on userspace NMI entry", + "cmt_id": "67b91ab31375fb40d66673ec4dd3f2d135e986dc" + }, + "CVE-2016-2186": { + "cmt_msg": "Input: powermate - fix oops with malicious USB descriptors", + "cmt_id": "f1782c9cd0966146457368672a25e4509a484ef6" + }, + "CVE-2015-5364": { + "cmt_msg": "udp: fix behavior of wrong checksums", + "cmt_id": "95ffa33e3c2706f1da6f2b4a695a416cf7edf759" + }, + "CVE-2015-5366": { + "cmt_msg": "udp: fix behavior of wrong checksums", + "cmt_id": "95ffa33e3c2706f1da6f2b4a695a416cf7edf759" + }, + "CVE-2014-9731": { + "cmt_msg": "udf: Check path length when reading symlink", + "cmt_id": "05e7da65962e15223e2783c09158e0a3aa1e1028" + }, + "CVE-2014-9730": { + "cmt_msg": "udf: Check component length before reading it", + "cmt_id": "eee3ed05f6f33ce7f226119713c572db9b71060c" + }, + "CVE-2013-4312": { + "cmt_msg": "unix: properly account for FDs passed over unix sockets", + "cmt_id": "660f0e9358bc1a8e05a2675f4320935ad5c249bf" + }, + "CVE-2016-0821": { + "cmt_msg": "include/linux/poison.h: fix LIST_POISON{1,2} offset", + "cmt_id": "eb99153be3ae70672c8074dc89ac8c01828840fc" + }, + "CVE-2016-0823": { + "cmt_msg": "pagemap: do not leak physical addresses to non-privileged userspace", + "cmt_id": "948e681e8731ab8b49d81d4a5b61b5bf3b3e6152" + }, + "CVE-2015-3291": { + "cmt_msg": "x86/nmi/64: Use DF to avoid userspace RSP confusing nested NMI detection", + "cmt_id": "84b6f86649f5e84d2619c569ea0d3dc88d47d4ad" + }, + "CVE-2015-3290": { + "cmt_msg": "x86/nmi/64: Switch stacks on userspace NMI entry", + "cmt_id": "67b91ab31375fb40d66673ec4dd3f2d135e986dc" + }, + "CVE-2016-2069": { + "cmt_msg": "x86/mm: Add barriers and document switch_mm()-vs-flush synchronization", + "cmt_id": "bab48cc44e14c26385de1f887f4bf320e8c3a6f0" + }, + "CVE-2016-8666": { + "cmt_msg": "tunnels: Don't apply GRO to multiple layers of encapsulation.", + "cmt_id": "23cca87ff225c1c7327a715db1bcc98a241b0efa" + }, + "CVE-2015-8746": { + "cmt_msg": "NFS: Fix a NULL pointer dereference of migration recovery ops for v4.2 client", + "cmt_id": "6a64d8c4c07c176abee384803f28fa1507963369" + }, + "CVE-2015-3212": { + "cmt_msg": "sctp: fix ASCONF list handling", + "cmt_id": "0eb5cd451203706dad35fd971a420c3cfaf371c8" + }, + "CVE-2014-3687": { + "cmt_msg": "net: sctp: fix panic on duplicate ASCONF chunks", + "cmt_id": "790395f95e3b8d81bf681a2a535443c70a111f66" + }, + "CVE-2015-8550": { + "cmt_msg": "xen: Add RING_COPY_REQUEST()", + "cmt_id": "f75855ceeff75ea8cebcd3e8df79e76292493735" + }, + "CVE-2015-8553": { + "cmt_msg": "xen/pciback: Don't allow MSI-X ops if PCI_COMMAND_MEMORY is not set.", + "cmt_id": "68f3d7217c7407311a9ca974f3506faaa1a7f4bf" + }, + "CVE-2015-7513": { + "cmt_msg": "KVM: x86: Reload pit counters for all channels when restoring state", + "cmt_id": "a3aa388ced6b0b224d3a6dc3acfb12f525d2ee5c" + }, + "CVE-2016-4805": { + "cmt_msg": "ppp: take reference on channels netns", + "cmt_id": "6ab3a4331a1de5a20c3dc97f5211d00f1b35ce50" + }, + "CVE-2015-7515": { + "cmt_msg": "Input: aiptek - fix crash on detecting device without endpoints", + "cmt_id": "24b12688c53a46545a723cf084e25afde2ba39f3" + }, + "CVE-2014-9420": { + "cmt_msg": "isofs: Fix infinite looping over CE entries", + "cmt_id": "56221fafe328a503579a49b5157543f7eaa2204a" + }, + "CVE-2015-7613": { + "cmt_msg": "Initialize msg/shm IPC objects before doing ipc_addid()", + "cmt_id": "792d3057eb976a74671c406a6b70a73652cd01e2" + }, + "CVE-2014-9728": { + "cmt_msg": "udf: Verify i_size when loading inode", + "cmt_id": "66c88eab4e8c6bb36afa48bf524870d957547f2e" + }, + "CVE-2014-8133": { + "cmt_msg": "x86/tls: Validate TLS entries to protect espfix", + "cmt_id": "339ee067d034ba302e2b43100a2b04be7b7f586c" + }, + "CVE-2014-8134": { + "cmt_msg": "x86, kvm: Clear paravirt_enabled on KVM guests for espfix32's benefit", + "cmt_id": "757328f36af0eeb6c6bb3c16a3ff84c669ead5bb" + }, + "CVE-2015-5706": { + "cmt_msg": "path_openat(): fix double fput()", + "cmt_id": "bedf03d0b88db4de0b66a1ef81df4faec7a0ceb4" + }, + "CVE-2015-1465": { + "cmt_msg": "ipv4: try to cache dst_entries which would cause a redirect", + "cmt_id": "569a4ccdd320abaf7cb7d9a70757dc84b42420d9" + }, + "CVE-2016-2053": { + "cmt_msg": "ASN.1: Fix non-match detection failure on data overrun", + "cmt_id": "15430f775ee686b61569a0c3e74cf0b2ad57c8eb" + }, + "CVE-2015-6937": { + "cmt_msg": "RDS: verify the underlying transport exists before creating a connection", + "cmt_id": "a93002fa8bd6495b88ae9196151008902d7e7774" + }, + "CVE-2014-9644": { + "cmt_msg": "crypto: include crypto- module prefix in template", + "cmt_id": "9f213efca416d0b3af786d2b2284f5e5f1f61d51" + }, + "CVE-2015-8552": { + "cmt_msg": "xen/pciback: Return error on XEN_PCI_OP_enable_msi when device has MSI or MSI-X enabled", + "cmt_id": "cb968d816e128f3c652f5a493d9a5cdd91490570" + }, + "CVE-2016-0728": { + "cmt_msg": "KEYS: Fix keyring ref leak in join_session_keyring()", + "cmt_id": "63b2438cd504e776ec056150857d2a541718da88" + }, + "CVE-2017-13215": { + "cmt_msg": "crypto: algif_skcipher - Load TX SG list after waiting", + "cmt_id": "f608afd0ae111abb0edc3e64a2e7e69b44f02702" + }, + "CVE-2017-1000253": { + "cmt_msg": "fs/binfmt_elf.c: fix bug in loading of PIE binaries", + "cmt_id": "ea08dc5191d9a22242893768e4c3be8efb546c62" + }, + "CVE-2014-8884": { + "cmt_msg": "ttusb-dec: buffer overflow in ioctl", + "cmt_id": "36bb34da20d9e641310f5153239f65b34495b7ae" + }, + "CVE-2014-9322": { + "cmt_msg": "x86_64, traps: Stop using IST for #SS", + "cmt_id": "09f581ba6439450b04b1062ad257d0bb447189f9" + }, + "CVE-2014-7826": { + "cmt_msg": "tracing/syscalls: Ignore numbers outside NR_syscalls' range", + "cmt_id": "9f156016096dd656971d153234fc4b9c0323bb2c" + }, + "CVE-2014-7825": { + "cmt_msg": "tracing/syscalls: Ignore numbers outside NR_syscalls' range", + "cmt_id": "9f156016096dd656971d153234fc4b9c0323bb2c" + }, + "CVE-2015-8543": { + "cmt_msg": "net: add validation for the socket syscall protocol argument", + "cmt_id": "c289dc9feaee8faae78973d0b0dc36dbc2476f49" + }, + "CVE-2015-4167": { + "cmt_msg": "udf: Check length of extended attributes and allocation descriptors", + "cmt_id": "24a10af7859205540358f2f58bfbd89b0962027a" + }, + "CVE-2016-0723": { + "cmt_msg": "tty: Fix unsafe ldisc reference via ioctl(TIOCGETD)", + "cmt_id": "3991600fc141223ba7b88026a187e4562c7acd00" + }, + "CVE-2016-7117": { + "cmt_msg": "net: Fix use after free in the recvmmsg exit path", + "cmt_id": "fc49d04ae148b205c3817d901ce0f846869effa8" + }, + "CVE-2015-2830": { + "cmt_msg": "x86/asm/entry/64: Remove a bogus 'ret_from_fork' optimization", + "cmt_id": "c1dc5bb3c7e51084423e5fff2537c1922849b829" + }, + "CVE-2021-20265": { + "cmt_msg": "af_unix: fix struct pid memory leak", + "cmt_id": "1906035dff2763a1c17a3f2a4d8706ef960e7a62" + }, + "CVE-2014-9090": { + "cmt_msg": "x86_64, traps: Stop using IST for #SS", + "cmt_id": "09f581ba6439450b04b1062ad257d0bb447189f9" + }, + "CVE-2015-8816": { + "cmt_msg": "USB: fix invalid memory access in hub_activate()", + "cmt_id": "7d7ded5440d763c75023f39ca1a1a85672803ad8" + }, + "CVE-2015-7566": { + "cmt_msg": "USB: serial: visor: fix crash on detecting device without write_urbs", + "cmt_id": "d80e009beb81b05f0ddf69a3bcc7e328272b0117" + }, + "CVE-2015-8812": { + "cmt_msg": "iw_cxgb3: Fix incorrectly returning error on success", + "cmt_id": "f95bf9a80850d49cce96ef0da4a1bd68f8f57dbe" + }, + "CVE-2014-9710": { + "cmt_msg": "Btrfs: make xattr replace operations atomic", + "cmt_id": "1d9c16e6463f33c247cd9b33369aba7d05ebbb49" + }, + "CVE-2014-3610": { + "cmt_msg": "KVM: x86: Check non-canonical addresses upon WRMSR", + "cmt_id": "604acafa52b9651054b816f19c172ee07384a0d3" + }, + "CVE-2014-3611": { + "cmt_msg": "KVM: x86: Improve thread safety in pit", + "cmt_id": "262400a71a3ebbb98c800cdd20094d3ea06a281c" + }, + "CVE-2015-8950": { + "cmt_msg": "arm64: dma-mapping: always clear allocated buffers", + "cmt_id": "a92a43a16c9fc3f257dd28e5b0c82297b80e1ce3" + }, + "CVE-2016-3841": { + "cmt_msg": "ipv6: add complete rcu protection around np->opt", + "cmt_id": "93d2f2509b98181f3f0630ae3a5a45e8ddcd75a3" + }, + "CVE-2016-3689": { + "cmt_msg": "Input: ims-pcu - sanity check against missing interfaces", + "cmt_id": "2b1d2df1ab77cf0d096516bb636e18168ec8d5b8" + }, + "CVE-2015-8019": { + "cmt_msg": "net: add length argument to skb_copy_and_csum_datagram_iovec", + "cmt_id": "fa89ae5548ed282f0ceb4660b3b93e4e2ee875f3" + }, + "CVE-2016-9685": { + "cmt_msg": "xfs: fix two memory leaks in xfs_attr_list.c error paths", + "cmt_id": "f7a39c8e72338d5d0f24ba38debf2d96c893d24b" + }, + "CVE-2016-8646": { + "cmt_msg": "crypto: algif_hash - Only export and import on sockets with data", + "cmt_id": "214fcf7977ef7579530609c24b94164a3b306d13" + }, + "CVE-2016-3044": { + "cmt_msg": "KVM: PPC: Book3S HV: Sanitize special-purpose register values on guest exit", + "cmt_id": "ea51a643e950c2b51f9afcd6b72c586bcf8ccdf0" + }, + "CVE-2015-7872": { + "cmt_msg": "KEYS: Fix crash when attempt to garbage collect an uninstantiated keyring", + "cmt_id": "4944cea73316e816c30533d02f6c0434a5011751" + }, + "CVE-2013-7446": { + "cmt_msg": "unix: avoid use-after-free in ep_remove_wait_queue", + "cmt_id": "6e238517b4addfb28ba8a94687af174200227b89" + }, + "CVE-2017-13167": { + "cmt_msg": "ALSA: timer: Fix race at concurrent reads", + "cmt_id": "d2fe56f9b3f8bace0b645d6c6634eba854b6b7f0" + }, + "CVE-2015-4177": { + "cmt_msg": "mnt: Fail collect_mounts when applied to unmounted mounts", + "cmt_id": "4bcf842df09d2cbcd32db82a501383bc6b851fa8" + }, + "CVE-2015-8374": { + "cmt_msg": "Btrfs: fix truncation of compressed and inlined extents", + "cmt_id": "c40009c43c849713cad7a850af0e522e3132bc5d" + }, + "CVE-2016-3672": { + "cmt_msg": "x86/mm/32: Enable full randomization on i386 and X86_32", + "cmt_id": "89df0e7a8ac3e51fc02d1a6ceff194da02abdd96" + }, + "CVE-2013-7421": { + "cmt_msg": "crypto: prefix module autoloading with \"crypto-\"", + "cmt_id": "6359ca00be9de08b4495d036ea1f1935dfe65022" + }, + "CVE-2015-9004": { + "cmt_msg": "perf: Tighten (and fix) the grouping condition", + "cmt_id": "08446eea4a583919b979915f4dec2fa94ac6186c" + }, + "CVE-2015-8785": { + "cmt_msg": "fuse: break infinite loop in fuse_fill_write_pages()", + "cmt_id": "e595f1d352d3531f5295b45ce7feab29d483ec69" + }, + "CVE-2015-2925": { + "cmt_msg": "dcache: Handle escaped paths in prepend_path", + "cmt_id": "a75ff8a85153c785ff1ba70ba2a652f6c1f99a5b" + }, + "CVE-2015-2922": { + "cmt_msg": "ipv6: Don't reduce hop limit for an interface", + "cmt_id": "150193b96666abb34d0c0d24c1e8a3068eb34317" + }, + "CVE-2015-0275": { + "cmt_msg": "ext4: allocate entire range in zero range", + "cmt_id": "7e11ae290de5fd20b099fe34d113c6cc39b42f55" + }, + "CVE-2015-2150": { + "cmt_msg": "xen-pciback: limit guest control of command register", + "cmt_id": "e321556ce29b9fd4579f4c2f00f9a8e95edd9d22" + }, + "CVE-2015-4692": { + "cmt_msg": "kvm: x86: fix kvm_apic_has_events to check for NULL pointer", + "cmt_id": "f1fe527bdd0664bc65148278d259762e4e15396d" + }, + "CVE-2014-7841": { + "cmt_msg": "net: sctp: fix NULL pointer dereference in af->from_addr_param on malformed packet", + "cmt_id": "1cfecc6bca7a8a81ded208b5b2e0a56a6b52ad9a" + }, + "CVE-2015-4003": { + "cmt_msg": "ozwpan: divide-by-zero leading to panic", + "cmt_id": "a422e82cbf16bb16cbe6e3f5d87edd787cb874d8" + }, + "CVE-2014-8159": { + "cmt_msg": "IB/uverbs: Prevent integer overflow in ib_umem_get address arithmetic", + "cmt_id": "c8f7da00f74c25e260a763446cc332196a6a1d13" + }, + "CVE-2014-8989": { + "cmt_msg": "userns: Don't allow setgroups until a gid mapping has been setablished", + "cmt_id": "88e91dce8d462daaa4bf71b591e3f095ab3b084a" + }, + "CVE-2014-7843": { + "cmt_msg": "arm64: __clear_user: handle exceptions on strb", + "cmt_id": "73d908ca212dfa4a27e6ba4c272a651c979594d4" + }, + "CVE-2014-7842": { + "cmt_msg": "KVM: x86: Don't report guest userspace emulation error to userspace", + "cmt_id": "7dd767fff08a6603b1b14d1e078a1f4721eb8eb4" + }, + "CVE-2015-1593": { + "cmt_msg": "x86, mm/ASLR: Fix stack randomization on 64-bit systems", + "cmt_id": "b515b1b0f296d699dab273cdab68acb88f4f2add" + }, + "CVE-2014-8559": { + "cmt_msg": "move d_rcu from overlapping d_child to overlapping d_alias", + "cmt_id": "f185f12c4a26bf317e070697d3cf9ec17fc11864" + }, + "CVE-2016-2384": { + "cmt_msg": "ALSA: usb-audio: avoid freeing umidi object twice", + "cmt_id": "6c0fa0936aa173fbecc956d62865a91ef13dad62" + }, + "CVE-2014-9584": { + "cmt_msg": "isofs: Fix unchecked printing of ER records", + "cmt_id": "4948220ac9ba5774512f1f9aef4bb23e202e8a23" + }, + "CVE-2014-9585": { + "cmt_msg": "x86_64, vdso: Fix the vdso address randomization algorithm", + "cmt_id": "869f828db156fcb10893c1197315ac85780925b0" + }, + "CVE-2016-2545": { + "cmt_msg": "ALSA: timer: Fix double unlink of active_list", + "cmt_id": "4a7ff8dcf12fae2b2368ba89dffa3743a9996e39" + }, + "CVE-2016-2544": { + "cmt_msg": "ALSA: seq: Fix race at timer setup and close", + "cmt_id": "712df95de8324fb208c3e8dd147cea69f8554ffb" + }, + "CVE-2016-2547": { + "cmt_msg": "ALSA: timer: Harden slave timer list handling", + "cmt_id": "c8ca4c5acf7f9825baa63dc5a956bd8ecec45e1b" + }, + "CVE-2016-2546": { + "cmt_msg": "ALSA: timer: Fix race among timer ioctls", + "cmt_id": "ffa534e36806d454e7d7d4c2019093365846da65" + }, + "CVE-2016-2543": { + "cmt_msg": "ALSA: seq: Fix missing NULL check at remove_events ioctl", + "cmt_id": "f9d7022955974997f1ba707ddfe8caf297e1a909" + }, + "CVE-2014-3688": { + "cmt_msg": "net: sctp: fix remote memory pressure from excessive queueing", + "cmt_id": "565d3c2b451cb7078128ee834ddabb02d02af3e5" + }, + "CVE-2016-2549": { + "cmt_msg": "ALSA: hrtimer: Fix stall by hrtimer_cancel()", + "cmt_id": "4238f492b693a43607f7a02007421d954769531a" + }, + "CVE-2016-2548": { + "cmt_msg": "ALSA: timer: Harden slave timer list handling", + "cmt_id": "c8ca4c5acf7f9825baa63dc5a956bd8ecec45e1b" + }, + "CVE-2016-2143": { + "cmt_msg": "s390/mm: four page table levels vs. fork", + "cmt_id": "97520d8491a514f98022802a200c27aa49dfd697" + }, + "CVE-2014-8160": { + "cmt_msg": "netfilter: conntrack: disable generic tracking for known protocols", + "cmt_id": "85c981d1b144ddea85cf8827e7afafda024cf684" + }, + "CVE-2014-9428": { + "cmt_msg": "batman-adv: Calculate extra tail size based on queued fragments", + "cmt_id": "55074679b401d834d999b8b71877065cfeaeef73" + }, + "CVE-2015-5697": { + "cmt_msg": "md: use kzalloc() when bitmap is disabled", + "cmt_id": "0624b99bab2b572b28edc1fab3e2a6d8619ead3a" + }, + "CVE-2014-3673": { + "cmt_msg": "net: sctp: fix skb_over_panic when receiving malformed ASCONF chunks", + "cmt_id": "240432f953757528abd23c5f76abfb092f05fc86" + }, + "CVE-2014-8086": { + "cmt_msg": "ext4: prevent bugon on race between write/fcntl", + "cmt_id": "01eca100c06d5b043e828fc2838189ae0c785285" + }, + "CVE-2016-6327": { + "cmt_msg": "IB/srpt: Simplify srpt_handle_tsk_mgmt()", + "cmt_id": "c8db91d65f8322202d663432f7ac84014a77b2fc" + }, + "CVE-2015-6252": { + "cmt_msg": "vhost: actually track log eventfd file", + "cmt_id": "c433ad7a9131631517880c74d6415473b2103f0d" + }, + "CVE-2014-9729": { + "cmt_msg": "udf: Verify i_size when loading inode", + "cmt_id": "66c88eab4e8c6bb36afa48bf524870d957547f2e" + }, + "CVE-2015-3288": { + "cmt_msg": "mm: avoid setting up anonymous pages into file mapping", + "cmt_id": "9760c0f9a5a7dbfb696b799189609a3471151cb5" + }, + "CVE-2015-8575": { + "cmt_msg": "bluetooth: Validate socket address length in sco_sock_bind().", + "cmt_id": "2296bb5b70594120aaf3900f4c965c5cf10ede99" + }, + "CVE-2015-8215": { + "cmt_msg": "ipv6: addrconf: validate new MTU before applying it", + "cmt_id": "fd0ad1be8dfb877e31f07f11c120badce12ba09f" + }, + "CVE-2015-1333": { + "cmt_msg": "KEYS: ensure we free the assoc array edit if edit is valid", + "cmt_id": "9bc34abfec8f083cb5ea50534d22d114ab12c4e3" + }, + "CVE-2015-8845": { + "cmt_msg": "powerpc/tm: Check for already reclaimed tasks", + "cmt_id": "2682034aabc6fc07cf5fc088cca1e96f36a4e4bc" + }, + "CVE-2015-8844": { + "cmt_msg": "powerpc/tm: Block signal return setting invalid MSR state", + "cmt_id": "368d31a3656ce7df52a229f6375442ac529db201" + }, + "CVE-2015-7550": { + "cmt_msg": "KEYS: Fix race between read and revoke", + "cmt_id": "1558fc1a018aa7e2943c413a4de17ae138e855b8" + }, + "CVE-2015-1420": { + "cmt_msg": "vfs: read file_handle only once in handle_to_path", + "cmt_id": "3b73bcf30f8cf56f6635bb5a8fcfbc9e650f8d9b" + }, + "CVE-2015-1421": { + "cmt_msg": "net: sctp: fix slab corruption from use after free on INIT collisions", + "cmt_id": "72d7e0fe4d22352f69c87bd3c058b05a68101706" + }, + "CVE-2016-10229": { + "cmt_msg": "udp: properly support MSG_PEEK with truncated buffers", + "cmt_id": "f7f4fb819a8dc620ce43a435ef91327274e2a875" + }, + "CVE-2015-4036": { + "cmt_msg": "vhost/scsi: potential memory corruption", + "cmt_id": "3aa1e327028e3b510a5c166df593f8637b25abe4" + }, + "CVE-2015-2666": { + "cmt_msg": "x86/microcode/intel: Guard against stack overflow in the loader", + "cmt_id": "caccf691912359293bc4dfce740b62b202a5dba6" + }, + "CVE-2014-3647": { + "cmt_msg": "KVM: x86: Emulator fixes for eip canonical checks on near branches", + "cmt_id": "8a909b2c6e6a4037a8c0e01cf7fae674c427ccc4" + }, + "CVE-2014-3646": { + "cmt_msg": "kvm: vmx: handle invvpid vm exit gracefully", + "cmt_id": "67fe3bc3d284f82e204ad2925479483eb21692b8" + }, + "CVE-2016-3137": { + "cmt_msg": "USB: cypress_m8: add endpoint sanity check", + "cmt_id": "768c09c4493020b018bc52c75f75cbafa915894f" + }, + "CVE-2015-8569": { + "cmt_msg": "pptp: verify sockaddr_len in pptp_bind() and pptp_connect()", + "cmt_id": "485724cdc8f8898d77eb7a0f3d896facf55f6be1" + }, + "CVE-2014-9683": { + "cmt_msg": "eCryptfs: Remove buggy and unnecessary write in file name decode routine", + "cmt_id": "ea447345243f8e594c45d413364832a01b3d9751" + }, + "CVE-2016-3134": { + "cmt_msg": "netfilter: x_tables: fix unconditional helper", + "cmt_id": "366d36a8136fd4b34f6d30935693cb6b85915a25" + }, + "CVE-2015-5283": { + "cmt_msg": "sctp: fix race on protocol/netns initialization", + "cmt_id": "eb084bd187c25f0b63556a4f6c440e3ac96ecaf5" + }, + "CVE-2016-3138": { + "cmt_msg": "USB: cdc-acm: more sanity checking", + "cmt_id": "173d111b4a26744a2c8f230901a0a418d083efa0" + }, + "CVE-2016-3157": { + "cmt_msg": "x86/iopl/64: Properly context-switch IOPL on Xen PV", + "cmt_id": "a6a2cb781be75d0a135a8e4ddd87854f09377928" + }, + "CVE-2016-3156": { + "cmt_msg": "ipv4: Don't do expensive useless work during inetdev destroy.", + "cmt_id": "8b03d9086461070caa263541bf83508ab30f52cc" + }, + "CVE-2016-2085": { + "cmt_msg": "EVM: Use crypto_memneq() for digest comparisons", + "cmt_id": "50e2fe0e98fffd08cb81b1785174db30902271c6" + }, + "CVE-2016-2847": { + "cmt_msg": "pipe: limit the per-user amount of pages allocated in pipes", + "cmt_id": "74f8c94db4565dc3b89bc9571e999227a98e972f" + }, + "CVE-2015-7885": { + "cmt_msg": "staging/dgnc: fix info leak in ioctl", + "cmt_id": "df3a19b81c9449249f89babdca8a716a2f92d0ac" + }, + "CVE-2014-9529": { + "cmt_msg": "KEYS: close race between key lookup and freeing", + "cmt_id": "43e6badd6f821916946216504c23e56bd8bba2e1" + }, + "CVE-2015-5307": { + "cmt_msg": "KVM: x86: work around infinite loop in microcode when #AC is delivered", + "cmt_id": "033edc3a7d4c3fd1560aa41e051d6e79b9545ed0" + }, + "CVE-2015-4002": { + "cmt_msg": "ozwpan: Use proper check to prevent heap overflow", + "cmt_id": "239e380248e92150c2e2fe485679fb1b72b3711e" + }, + "CVE-2015-4001": { + "cmt_msg": "ozwpan: Use unsigned ints to prevent heap overflow", + "cmt_id": "cd6bcf08bfc93c0c86c9be7d5de0f2f9e5b47e76" + }, + "CVE-2015-3636": { + "cmt_msg": "ipv4: Missing sk_nulls_node_init() in ping_unhash().", + "cmt_id": "f91222b61038729728090fdac38fd819ec6e26ef" + }, + "CVE-2016-2185": { + "cmt_msg": "Input: ati_remote2 - fix crashes on detecting device with invalid descriptor", + "cmt_id": "7ea6b63a62afde28feaae499cc8094426b0b4241" + }, + "CVE-2016-2184": { + "cmt_msg": "ALSA: usb-audio: Fix NULL dereference in create_fixed_stream_quirk()", + "cmt_id": "b92dbabac3053baaf83bcae270bf058cd5839e35" + }, + "CVE-2015-7799": { + "cmt_msg": "isdn_ppp: Add checks for allocation failure in isdn_ppp_open()", + "cmt_id": "bcd596b01fd5cea4591cd1cc8c1183f3da4bed68" + }, + "CVE-2015-2041": { + "cmt_msg": "net: llc: use correct size for sysctl timeout entries", + "cmt_id": "4218278977f7bb99190f239a708e9ee7836fd11c" + }, + "CVE-2014-7970": { + "cmt_msg": "mnt: Prevent pivot_root from creating a loop in the mount tree", + "cmt_id": "31b7cb6b454d1d5279ddc5a3574ae9cf5456615d" + }, + "CVE-2015-2042": { + "cmt_msg": "net: rds: use correct size for max unacked packets and bytes", + "cmt_id": "065f373545d11d7dfe22d6fa1381b214522f187a" + }, + "CVE-2015-3331": { + "cmt_msg": "crypto: aesni - fix memory usage in GCM decryption", + "cmt_id": "da3d3856b47cddbdc6b4d676bfaadd91c7571993" + }, + "CVE-2015-3332": { + "cmt_msg": "tcp: Fix crash in TCP Fast Open", + "cmt_id": "53411a80e3449952336582f8689c458b63f85455" + }, + "CVE-2015-8767": { + "cmt_msg": "sctp: Prevent soft lockup when sctp_accept() is called during a timeout event", + "cmt_id": "26e0e9c2b06c3d9cc62ac25c1e410642205234f1" + } + }, + "3.16.36": { + "CVE-2016-3961": { + "cmt_msg": "x86/mm/xen: Suppress hugetlbfs in PV guests", + "cmt_id": "27c03f880236b5e3c48af4d8848916bea8a5d88a" + }, + "CVE-2016-4581": { + "cmt_msg": "propogate_mnt: Handle the first propogated copy being a slave", + "cmt_id": "816d889b22613b946de7ab6458d7c7cc250fcdca" + }, + "CVE-2016-4580": { + "cmt_msg": "net: fix a kernel infoleak in x25 module", + "cmt_id": "66a315418f82f9d97f4233cd71e3b54105ffefd1" + }, + "CVE-2016-4486": { + "cmt_msg": "net: fix infoleak in rtnetlink", + "cmt_id": "935f8a3274efedc93d5e6c8183915ac4fad81924" + }, + "CVE-2016-2117": { + "cmt_msg": "atl2: Disable unimplemented scatter/gather feature", + "cmt_id": "801b07f4e84bcbc59118e582e861e34f404e0c15" + }, + "CVE-2016-4485": { + "cmt_msg": "net: fix infoleak in llc", + "cmt_id": "c922f1c07ac330685d6603c619239bdb645d7bdd" + }, + "CVE-2016-4913": { + "cmt_msg": "get_rock_ridge_filename(): handle malformed NM entries", + "cmt_id": "122352cc76bf0018b094a3051ca47f3d63cf5668" + }, + "CVE-2016-4565": { + "cmt_msg": "IB/security: Restrict use of the write() interface", + "cmt_id": "f4b592cb05dce29cd4c6778400ece68a45a1a223" + }, + "CVE-2016-2187": { + "cmt_msg": "Input: gtco - fix crash on detecting device without endpoints", + "cmt_id": "772703cadb1bf378bcd5ae87db4c150da37351b6" + }, + "CVE-2016-7916": { + "cmt_msg": "proc: prevent accessing /proc//environ until it's ready", + "cmt_id": "eee69c92529e82e48e088f21137220c516c4b8ed" + }, + "CVE-2016-0758": { + "cmt_msg": "KEYS: Fix ASN.1 indefinite length object parsing", + "cmt_id": "af00ae6ef5a2c73f21ba215c476570b7772a14fb" + }, + "CVE-2016-3070": { + "cmt_msg": "mm: migrate dirty page without clear_page_dirty_for_io etc", + "cmt_id": "77f7f67dbd37ab3eebd98e2764bd1e0900028a33" + }, + "CVE-2016-7914": { + "cmt_msg": "assoc_array: don't call compare_object() on a node", + "cmt_id": "d513fcfdc14b44cc22f85bd1a5206fc6cd68d354" + } + }, + "3.16.37": { + "CVE-2016-4997": { + "cmt_msg": "netfilter: x_tables: check for bogus target offset", + "cmt_id": "35ea6762cc084057963af3833c77cf2906461b75" + }, + "CVE-2016-5728": { + "cmt_msg": "misc: mic: Fix for double fetch security bug in VOP driver", + "cmt_id": "72aaf646fb6b6f8f7befb44cbd5b1acd3bb5b483" + }, + "CVE-2016-4470": { + "cmt_msg": "KEYS: potential uninitialized variable", + "cmt_id": "91c854934664bf4d713b12f663de77397840d5bd" + }, + "CVE-2016-4482": { + "cmt_msg": "USB: usbfs: fix potential infoleak in devio", + "cmt_id": "502c7a5b24af01f64d6812a0a382c6beebef9c55" + }, + "CVE-2016-4998": { + "cmt_msg": "netfilter: x_tables: check for bogus target offset", + "cmt_id": "35ea6762cc084057963af3833c77cf2906461b75" + }, + "CVE-2016-1237": { + "cmt_msg": "posix_acl: Add set_posix_acl", + "cmt_id": "8e31c40b13640f7990ae0038ae4e7a6685998e3a" + }, + "CVE-2014-9922": { + "cmt_msg": "fs: limit filesystem stacking depth", + "cmt_id": "54c202bbeb9a00042d374561c6bf2bf5d586fc11" + }, + "CVE-2014-9904": { + "cmt_msg": "ALSA: compress: fix an integer overflow check", + "cmt_id": "bd5ab00affa19dcc491318cbb1e0891ffa49c645" + }, + "CVE-2016-4578": { + "cmt_msg": "ALSA: timer: Fix leak in events via snd_timer_user_ccallback", + "cmt_id": "d5b7dbe55864c6bb1b966971f6d4ef90d5b95e46" + }, + "CVE-2016-9754": { + "cmt_msg": "ring-buffer: Prevent overflow of size in ring_buffer_resize()", + "cmt_id": "e5e2cbc7f25c06266bba5072adab68cc64f71401" + }, + "CVE-2016-5696": { + "cmt_msg": "tcp: make challenge acks less predictable", + "cmt_id": "c6287499662db0b0caee72d6453e445a2c6162af" + }, + "CVE-2016-5244": { + "cmt_msg": "rds: fix an infoleak in rds_inc_info_copy", + "cmt_id": "5343d1779fd944a3937dafc56f3e853a5e063a3d" + }, + "CVE-2016-5243": { + "cmt_msg": "tipc: fix an infoleak in tipc_nl_compat_link_dump", + "cmt_id": "3d4997da790d035dc4cc61f254d4de467a1bbf90" + }, + "CVE-2016-7911": { + "cmt_msg": "block: fix use-after-free in sys_ioprio_get()", + "cmt_id": "60b67e2584e080c42ae23a9518738591969544e1" + }, + "CVE-2016-9806": { + "cmt_msg": "netlink: Fix dump skb leak/double free", + "cmt_id": "ed8ab6b2bb3f3714dad70216b94e1bb8bc8df223" + }, + "CVE-2016-4569": { + "cmt_msg": "ALSA: timer: Fix leak in SNDRV_TIMER_IOCTL_PARAMS", + "cmt_id": "84d8697290dd3b2c08be651651a02d30f62d91a7" + }, + "CVE-2016-5412": { + "cmt_msg": "KVM: PPC: Book3S HV: Pull out TM state save/restore into separate procedures", + "cmt_id": "b16e5c4a51094b5fbf6e2543f8d1c260429c946d" + }, + "CVE-2017-7495": { + "cmt_msg": "ext4: fix data exposure after a crash", + "cmt_id": "b274508ecc4388f00de57fc6641bf8be2b671908" + }, + "CVE-2016-1583": { + "cmt_msg": "proc: prevent stacking filesystems on top", + "cmt_id": "a0b5c04dfca69e9728b1c454c6f9fde9f8f38613" + }, + "CVE-2016-5829": { + "cmt_msg": "HID: hiddev: validate num_values for HIDIOCGUSAGES, HIDIOCSUSAGES commands", + "cmt_id": "4ef3e38d4e0726ec7f63f8d9c6b4c3aa1cbeec7b" + }, + "CVE-2016-5828": { + "cmt_msg": "powerpc/tm: Always reclaim in start_thread() for exec() class syscalls", + "cmt_id": "8c96b416de2acc010c9e7f90c9d2dde9b1418444" + }, + "CVE-2016-6130": { + "cmt_msg": "s390/sclp_ctl: fix potential information leak with /dev/sclp", + "cmt_id": "8229d94adedd2cad31fee2e90b1becb2fdc09b9d" + }, + "CVE-2016-6136": { + "cmt_msg": "audit: fix a double fetch in audit_log_single_execve_arg()", + "cmt_id": "c8a3667e957a498865ec82c3d19160f1a330daef" + } + }, + "3.16.38": { + "CVE-2016-5195": { + "cmt_msg": "mm: remove gup_flags FOLL_WRITE games from __get_user_pages()", + "cmt_id": "2649c26fdeb99f1c104c387ae63fd72e119c2b96" + } + }, + "3.16.39": { + "CVE-2016-7042": { + "cmt_msg": "KEYS: Fix short sprintf buffer in /proc/keys show function", + "cmt_id": "dbc969a232a97c001f6c5f7b4b5e0de4dca4fe84" + }, + "CVE-2016-6828": { + "cmt_msg": "tcp: fix use after free in tcp_xmit_retransmit_queue()", + "cmt_id": "3a7dc8f4b37d2c2b12b805aee4a41e706c43ded1" + }, + "CVE-2016-8658": { + "cmt_msg": "brcmfmac: avoid potential stack overflow in brcmf_cfg80211_start_ap()", + "cmt_id": "df523e7adf0595cf509f6382af7ed801ab0bd108" + }, + "CVE-2016-8633": { + "cmt_msg": "firewire: net: guard against rx buffer overflows", + "cmt_id": "88eadd913f235ffd29767b504fd68caaa1394f76" + }, + "CVE-2015-1350": { + "cmt_msg": "fs: Avoid premature clearing of capabilities", + "cmt_id": "3418703a9d04fa65f993e89a3fa6bfeed3c1fe7c" + }, + "CVE-2016-7097": { + "cmt_msg": "posix_acl: Clear SGID bit when setting file permissions", + "cmt_id": "f2ba3e2310b3967720b83126db8684c69ce41894" + }, + "CVE-2016-7425": { + "cmt_msg": "scsi: arcmsr: Buffer overflow in arcmsr_iop_message_xfer()", + "cmt_id": "400ce4d1a8ea346d95b36f6c72b993de69f8a0b0" + }, + "CVE-2016-9084": { + "cmt_msg": "vfio/pci: Fix integer overflows, bitmask check", + "cmt_id": "6593fe0cbdc77241f58e75d049296d1fba37d484" + }, + "CVE-2016-6480": { + "cmt_msg": "aacraid: Check size values after double-fetch from user", + "cmt_id": "962b0f29a59ec0dd32c18001ffcd2ba23ab4eada" + }, + "CVE-2016-7910": { + "cmt_msg": "block: fix use-after-free in seq file", + "cmt_id": "2dabc3a663edfc35c2ab48f4d6b51114757b858c" + }, + "CVE-2016-9083": { + "cmt_msg": "vfio/pci: Fix integer overflows, bitmask check", + "cmt_id": "6593fe0cbdc77241f58e75d049296d1fba37d484" + }, + "CVE-2015-8955": { + "cmt_msg": "arm64: perf: reject groups spanning multiple HW PMUs", + "cmt_id": "b2aa2e250fe40b8413aefd8762b488d81f292c34" + }, + "CVE-2015-8956": { + "cmt_msg": "Bluetooth: Fix potential NULL dereference in RFCOMM bind callback", + "cmt_id": "8c996f7322f988a074896c135f90d6c4c6d173ab" + }, + "CVE-2023-3106": { + "cmt_msg": "xfrm: fix crash in XFRM_MSG_GETSA netlink handler", + "cmt_id": "2dcb72918e387fd1d0af40c1c351822bfe1acf63" + }, + "CVE-2016-3857": { + "cmt_msg": "arm: oabi compat: add missing access checks", + "cmt_id": "7e7aaf7b1bf53b5b0abd380efe7fc430bc8a590d" + } + }, + "3.16.40": { + "CVE-2016-6787": { + "cmt_msg": "perf: Fix event->ctx locking", + "cmt_id": "18163dd15627bfa34af63299998523d8dd1a109e" + }, + "CVE-2016-6786": { + "cmt_msg": "perf: Fix event->ctx locking", + "cmt_id": "18163dd15627bfa34af63299998523d8dd1a109e" + }, + "CVE-2015-8964": { + "cmt_msg": "tty: Prevent ldisc drivers from re-using stale tty fields", + "cmt_id": "16c30eea9553b0ccbb379eed34f85fbed5e2cdcd" + }, + "CVE-2015-8962": { + "cmt_msg": "sg: Fix double-free when drives detach during SG_IO", + "cmt_id": "79cfd63480a7c4b48c6c329fab1bde569e0a4ac2" + }, + "CVE-2015-8963": { + "cmt_msg": "perf: Fix race in swevent hash", + "cmt_id": "311c3b32f1e591b88e1b290efdcbc79c081f8e0f" + }, + "CVE-2016-9793": { + "cmt_msg": "net: avoid signed overflows for SO_{SND|RCV}BUFFORCE", + "cmt_id": "756826fd4e4a25589a2e77a7ceb791314c73cf48" + }, + "CVE-2017-15102": { + "cmt_msg": "usb: misc: legousbtower: Fix NULL pointer deference", + "cmt_id": "5d1d4fb4ab35b8eebf3b9112c460cb25edb89143" + }, + "CVE-2016-9794": { + "cmt_msg": "ALSA: pcm : Call kill_fasync() in stream lock", + "cmt_id": "afd9c2402bdfdbc813587faf7f0e8e1f94c2ee91" + }, + "CVE-2016-10200": { + "cmt_msg": "l2tp: fix racy SOCK_ZAPPED flag check in l2tp_ip{,6}_bind()", + "cmt_id": "7c3ad0d86f80618c00a5d6a267080238185038f6" + }, + "CVE-2016-8632": { + "cmt_msg": "tipc: check minimum bearer MTU", + "cmt_id": "cd53924265a9d328af37722c6b682e4ea793d04e" + }, + "CVE-2016-8650": { + "cmt_msg": "mpi: Fix NULL ptr dereference in mpi_powm()", + "cmt_id": "0a74b364c4c2ce4bfffdbefd62cced99ad76bec9" + }, + "CVE-2016-8655": { + "cmt_msg": "packet: fix race condition in packet_set_ring", + "cmt_id": "943e7299c0fec28de9df8985953f45633b071690" + }, + "CVE-2016-8405": { + "cmt_msg": "fbdev: color map copying bounds checking", + "cmt_id": "4952d0fe7849840bf3767051eb296e84c0e6ed52" + }, + "CVE-2016-10088": { + "cmt_msg": "sg_write()/bsg_write() is not fit to be called under KERNEL_DS", + "cmt_id": "249741c2c0d7a905da66efc6d1292d3915aef1fc" + }, + "CVE-2016-9120": { + "cmt_msg": "staging/android/ion : fix a race condition in the ion driver", + "cmt_id": "ce626e14b2fd8f1f0ff6d17a8503f12d3e991cd3" + }, + "CVE-2016-7915": { + "cmt_msg": "HID: core: prevent out-of-bound readings", + "cmt_id": "e137da9c2207aa45c353b224a12b1cecfdcb54cb" + }, + "CVE-2016-7917": { + "cmt_msg": "netfilter: nfnetlink: correctly validate length of batch messages", + "cmt_id": "8a984a4795fd4432da09e170efe7d9766d0e91cf" + }, + "CVE-2016-7912": { + "cmt_msg": "usb: gadget: f_fs: Fix use-after-free", + "cmt_id": "0fbed614ccd7ab27d77bc129a9d8539181d7d275" + }, + "CVE-2016-8645": { + "cmt_msg": "tcp: take care of truncations done by sk_filter()", + "cmt_id": "3d59e6e25fd0cbe700d3f2910291729227dcfd23" + }, + "CVE-2017-6001": { + "cmt_msg": "perf/core: Fix concurrent sys_perf_event_open() vs. 'move_group' race", + "cmt_id": "fe525a280e8b5f04c7666fe22d1a4ef592f7b953" + }, + "CVE-2016-9191": { + "cmt_msg": "sysctl: Drop reference added by grab_header in proc_sys_readdir", + "cmt_id": "0b66ea3bca021aea839c526d7643df085c5dadbc" + }, + "CVE-2016-9555": { + "cmt_msg": "sctp: validate chunk len before actually using it", + "cmt_id": "1685cd22d7ebda79ea519457499f9cc4ced1e966" + } + }, + "3.16.41": { + "CVE-2017-2618": { + "cmt_msg": "selinux: fix off-by-one in setprocattr", + "cmt_id": "0646217322101c829aaabf95294ce9b8b02ab807" + }, + "CVE-2017-5970": { + "cmt_msg": "ipv4: keep skb->dst around in presence of IP options", + "cmt_id": "631f00df1b2fa51492de8ab93a91a3876b697aeb" + }, + "CVE-2017-6074": { + "cmt_msg": "dccp: fix freeing skb too early for IPV6_RECVPKTINFO", + "cmt_id": "c21341fd2c2e0e840864062707825d6d0d5e13b2" + }, + "CVE-2016-6213": { + "cmt_msg": "mnt: Add a per mount namespace limit on the number of mounts", + "cmt_id": "b71f455440fd7ed03f088580b3a117352fc815dd" + }, + "CVE-2016-10208": { + "cmt_msg": "ext4: validate s_first_meta_bg at mount time", + "cmt_id": "cde863587b6809fdf61ea3c5391ecf06884b5516" + }, + "CVE-2017-5897": { + "cmt_msg": "ip6_gre: fix ip6gre_err() invalid reads", + "cmt_id": "3a997b28bbc69f7637ccd62c5a37379dec34f36b" + }, + "CVE-2016-9588": { + "cmt_msg": "kvm: nVMX: Allow L1 to intercept software exceptions (#BP and #OF)", + "cmt_id": "8cebcee992c81aaec741311db337705a4949261c" + }, + "CVE-2017-6214": { + "cmt_msg": "tcp: avoid infinite loop in tcp_splice_read()", + "cmt_id": "5b746247d798a6061d213bf3f64c6e434bb4f23d" + }, + "CVE-2017-5549": { + "cmt_msg": "USB: serial: kl5kusb105: fix line-state error handling", + "cmt_id": "59021c058a0bd2af81d1e8116995d7119be15145" + }, + "CVE-2017-5551": { + "cmt_msg": "tmpfs: clear S_ISGID when setting posix ACLs", + "cmt_id": "b35e1587153b27e12747137ce7a0df0eb921cd85" + }, + "CVE-2017-2583": { + "cmt_msg": "KVM: x86: fix emulation of \"MOV SS, null selector\"", + "cmt_id": "448ec74e72bf4c5952e3d369720a862da99c0895" + }, + "CVE-2017-2584": { + "cmt_msg": "KVM: x86: Introduce segmented_write_std", + "cmt_id": "8be074a1f62ff51ffdf5b4634327dee351a5c2c2" + } + }, + "3.16.42": { + "CVE-2017-6353": { + "cmt_msg": "sctp: deny peeloff operation on asocs with threads sleeping on it", + "cmt_id": "ae722d6df3efc7a2df272644d82639f2679042ed" + }, + "CVE-2017-2636": { + "cmt_msg": "tty: n_hdlc: get rid of racy n_hdlc.tbuf", + "cmt_id": "2e523bd949e3bc43cf61cc8a690350fa778e3f88" + }, + "CVE-2017-7273": { + "cmt_msg": "HID: hid-cypress: validate length of report", + "cmt_id": "60a990276a03f9a11d86017b1217f3698443c47b" + }, + "CVE-2017-5669": { + "cmt_msg": "ipc/shm: Fix shmat mmap nil-page protection", + "cmt_id": "13508cb3bf17a73b91957e7070112b710bdfadc2" + }, + "CVE-2017-6348": { + "cmt_msg": "irda: Fix lockdep annotations in hashbin_delete().", + "cmt_id": "55429dd9c16006c5f2edc53c25a3594d299fbf98" + }, + "CVE-2017-5986": { + "cmt_msg": "sctp: avoid BUG_ON on sctp_wait_for_sndbuf", + "cmt_id": "2ad78d37e15d7adba80deb103068faf6d88f95ac" + }, + "CVE-2017-6345": { + "cmt_msg": "net/llc: avoid BUG_ON() in skb_orphan()", + "cmt_id": "8e822a0f8b3b8d2907ae7fba62258562b7ef800c" + }, + "CVE-2017-6346": { + "cmt_msg": "packet: fix races in fanout_add()", + "cmt_id": "bf7916239a591920427b0ee8022c222eeccba840" + }, + "CVE-2017-2596": { + "cmt_msg": "kvm: fix page struct leak in handle_vmon", + "cmt_id": "591fc80b6369a886a1d21cacf11f91b455781df3" + } + }, + "3.16.43": { + "CVE-2016-10044": { + "cmt_msg": "aio: mark AIO pseudo-fs noexec", + "cmt_id": "880366a6e2ef182c37b7c7317dc6d449f625b97d" + } + }, + "3.16.44": { + "CVE-2017-7294": { + "cmt_msg": "drm/vmwgfx: fix integer overflow in vmw_surface_define_ioctl()", + "cmt_id": "629655f798b92fd309fdde494a3cfb8a37f807ad" + }, + "CVE-2017-8064": { + "cmt_msg": "dvb-usb-v2: avoid use-after-free", + "cmt_id": "522182342410708c54eb2b33ff36e85f0b045a6d" + }, + "CVE-2017-7308": { + "cmt_msg": "net/packet: fix overflow in check for priv area size", + "cmt_id": "a481ab4edd87bc2dc6f1fa9029866dd69c86fc5c" + }, + "CVE-2017-8890": { + "cmt_msg": "dccp/tcp: do not inherit mc_list from parent", + "cmt_id": "e4d8daa3b0d195c8aead116dd70aad8124be60c3" + }, + "CVE-2017-7472": { + "cmt_msg": "KEYS: fix keyctl_set_reqkey_keyring() to not leak thread keyrings", + "cmt_id": "f7ce1014bc5e4bb42d6b9f5afb308f59534067ea" + }, + "CVE-2017-7895": { + "cmt_msg": "nfsd: stricter decoding of write-like NFSv2/v3 ops", + "cmt_id": "bb0ea8af0b69259f5ea1d2fcff52948c98129c5e" + }, + "CVE-2017-7184": { + "cmt_msg": "xfrm_user: validate XFRM_MSG_NEWAE XFRMA_REPLAY_ESN_VAL replay_window", + "cmt_id": "811f5600db1a0a9c4f1abad5017e09f43d7088f3" + }, + "CVE-2017-7487": { + "cmt_msg": "ipx: call ipxitf_put() in ioctl error path", + "cmt_id": "c64988b55a19fc5c85f85c433976d6e5210f54dc" + }, + "CVE-2017-9242": { + "cmt_msg": "ipv6: fix out of bound writes in __ip6_append_data()", + "cmt_id": "55c51263ff43e3bf5deb1425f4221696f94db1be" + }, + "CVE-2017-0605": { + "cmt_msg": "tracing: Use strlcpy() instead of strcpy() in __trace_find_cmdline()", + "cmt_id": "a1141b19b23a0605d46f3fab63fd2d76207096c4" + }, + "CVE-2017-7645": { + "cmt_msg": "nfsd: check for oversized NFSv2/v3 arguments", + "cmt_id": "1d4ab03084d4bace93b1573c57a309e954d05c09" + }, + "CVE-2017-7261": { + "cmt_msg": "drm/vmwgfx: NULL pointer dereference in vmw_surface_define_ioctl()", + "cmt_id": "61cabe967321767052498032178d56a1ea03a7bc" + }, + "CVE-2017-9077": { + "cmt_msg": "ipv6/dccp: do not inherit ipv6_mc_list from parent", + "cmt_id": "53d48f98b800059504da76d12bf0074581aa0fe2" + }, + "CVE-2017-2671": { + "cmt_msg": "ping: implement proper locking", + "cmt_id": "c3f18d2a809b563ef078130ab3758899625e4cfb" + }, + "CVE-2017-9075": { + "cmt_msg": "sctp: do not inherit ipv6_{mc|ac|fl}_list from parent", + "cmt_id": "60e7579f4b71e2e8b252d2f1b3ef5ffb3b971a4e" + }, + "CVE-2017-9074": { + "cmt_msg": "ipv6: Prevent overrun when parsing v6 header options", + "cmt_id": "3bff722de601acaf593a1ade13fbbee54b688e9b" + }, + "CVE-2017-9076": { + "cmt_msg": "ipv6/dccp: do not inherit ipv6_mc_list from parent", + "cmt_id": "53d48f98b800059504da76d12bf0074581aa0fe2" + }, + "CVE-2016-2188": { + "cmt_msg": "USB: iowarrior: fix NULL-deref at probe", + "cmt_id": "d2d603cf8fd51f0da5e4bc809d17824faa7630f7" + }, + "CVE-2017-7618": { + "cmt_msg": "crypto: ahash - Fix EINPROGRESS notification callback", + "cmt_id": "13af702256f8b7d9bb51b86c982fe08e96c589c8" + }, + "CVE-2017-8924": { + "cmt_msg": "USB: serial: io_ti: fix information leak in completion handler", + "cmt_id": "f7287278eea268132ab71b30a0425ccf3a13a323" + }, + "CVE-2017-8925": { + "cmt_msg": "USB: serial: omninet: fix reference leaks at open", + "cmt_id": "e766215595e90b7a307cc7c7054ff43e96340731" + }, + "CVE-2016-9604": { + "cmt_msg": "KEYS: Disallow keyrings beginning with '.' to be joined as session keyrings", + "cmt_id": "41bd08bfce7c33e0d383e7678e6d6c7e8e041524" + }, + "CVE-2017-7616": { + "cmt_msg": "mm/mempolicy.c: fix error handling in set_mempolicy and mbind.", + "cmt_id": "4474624a1a496e4dc93a2cd49ea915d9c90d80e9" + } + }, + "3.16.45": { + "CVE-2017-7482": { + "cmt_msg": "rxrpc: Fix several cases where a padded len isn't checked in ticket decode", + "cmt_id": "e3378be9d9cbe1f77ecfc03b4350991be58f3f82" + }, + "CVE-2014-9940": { + "cmt_msg": "regulator: core: Fix regualtor_ena_gpio_free not to access pin after freeing", + "cmt_id": "702f4dd27ccf3bae7915ef1f8790db3af435d211" + }, + "CVE-2017-7346": { + "cmt_msg": "drm/vmwgfx: limit the number of mip levels in vmw_gb_surface_define_ioctl()", + "cmt_id": "7943d19453aa1a1acf93bdb2812e0bef970ec23c" + }, + "CVE-2017-1000379": { + "cmt_msg": "mm: larger stack guard gap, between vmas", + "cmt_id": "978b8aa1646d4e023edd121c7f1b8f938ccb813d" + }, + "CVE-2017-1000364": { + "cmt_msg": "mm: larger stack guard gap, between vmas", + "cmt_id": "978b8aa1646d4e023edd121c7f1b8f938ccb813d" + }, + "CVE-2017-7518": { + "cmt_msg": "KVM: x86: fix singlestepping over syscall", + "cmt_id": "24ee2a286de7ac680ad4b2423c2dcee68444e567" + } + }, + "3.16.46": { + "CVE-2017-6951": { + "cmt_msg": "KEYS: Remove key_type::match in favour of overriding default by match_preparse", + "cmt_id": "89a5900ac15faa45244b42423ff4febd6d35520b" + }, + "CVE-2017-10911": { + "cmt_msg": "xen-blkback: don't leak stack data via response ring", + "cmt_id": "d2cc7a18d6342a7025afd16aac6753ad02d788e5" + }, + "CVE-2017-1000380": { + "cmt_msg": "ALSA: timer: Fix race between read and ioctl", + "cmt_id": "334e9205dd0c61ec83dfafac51b1947584179bf1" + }, + "CVE-2017-9605": { + "cmt_msg": "drm/vmwgfx: Make sure backup_handle is always valid", + "cmt_id": "26823129d84c6ca3e12b17af7a8e78c579b3bca5" + }, + "CVE-2017-2647": { + "cmt_msg": "KEYS: Remove key_type::match in favour of overriding default by match_preparse", + "cmt_id": "89a5900ac15faa45244b42423ff4febd6d35520b" + }, + "CVE-2017-7889": { + "cmt_msg": "mm: Tighten x86 /dev/mem with zeroing reads", + "cmt_id": "3cbd86d25eeb61e57cb3367fe302c271b0c70fb2" + }, + "CVE-2017-1000365": { + "cmt_msg": "fs/exec.c: account for argv/envp pointers", + "cmt_id": "d7575b387f81c1a92e32c25dcb6a0e14458ae66c" + }, + "CVE-2017-1000363": { + "cmt_msg": "char: lp: fix possible integer overflow in lp_setup()", + "cmt_id": "0a56616d2ca35da4397c48b95e71e35a26e67be5" + } + }, + "3.16.47": { + "CVE-2017-1000112": { + "cmt_msg": "udp: consistently apply ufo or fragmentation", + "cmt_id": "08676246d893e3a42a541a2ef1291f2ea62c5b06" + }, + "CVE-2017-1000111": { + "cmt_msg": "packet: fix tp_reserve race in packet_set_ring", + "cmt_id": "ec26c86f4d9fe22ceb9b997aa9134f684b756282" + }, + "CVE-2017-7533": { + "cmt_msg": "dentry name snapshots", + "cmt_id": "2cbc76ab0654c9759e390899584c5f788e21dc5a" + }, + "CVE-2017-11176": { + "cmt_msg": "mqueue: fix a use-after-free in sys_mq_notify()", + "cmt_id": "b6ec053486fa50c169eb377e53c72b2a481fbd00" + }, + "CVE-2017-10661": { + "cmt_msg": "timerfd: Protect the might cancel mechanism proper", + "cmt_id": "e7467c79d7dfa504587f9bc95bf180d92715c07d" + }, + "CVE-2017-1000": { + "cmt_msg": "udp: consistently apply ufo or fragmentation", + "cmt_id": "08676246d893e3a42a541a2ef1291f2ea62c5b06" + }, + "CVE-2017-7542": { + "cmt_msg": "ipv6: avoid overflow of offset in ip6_find_1stfragopt", + "cmt_id": "276cb60b67f5c99bf278b5371c6643e4af63f75d" + } + }, + "3.16.48": { + "CVE-2017-11600": { + "cmt_msg": "xfrm: policy: check policy direction value", + "cmt_id": "60166dc935e2af97cae9432c0247856e2deb0b3f" + }, + "CVE-2017-14106": { + "cmt_msg": "tcp: initialize rcv_mss to TCP_MIN_MSS instead of 0", + "cmt_id": "32cb2d4a59d0512aa825e7f0352f66063482cc07" + }, + "CVE-2017-14140": { + "cmt_msg": "Sanitize 'move_pages()' permission checks", + "cmt_id": "b5a16892623afec2d3212b963dd688b258002b4b" + }, + "CVE-2017-15274": { + "cmt_msg": "KEYS: fix dereferencing NULL payload with nonzero length", + "cmt_id": "400773b3c6b7faffafc6adedecdd4882fc677d64" + }, + "CVE-2017-18360": { + "cmt_msg": "USB: serial: io_ti: fix div-by-zero in set_termios", + "cmt_id": "5626cf5977b54cda89f620070dc85c96f01ef359" + }, + "CVE-2017-12134": { + "cmt_msg": "xen: fix bio vec merging", + "cmt_id": "f664b0113d2bb8d4bcdf5d03b72eb4c433ded452" + }, + "CVE-2017-18221": { + "cmt_msg": "mlock: fix mlock count can not decrease in race condition", + "cmt_id": "d30435bdee3ce282537814d96138a22879522c2f" + }, + "CVE-2017-7541": { + "cmt_msg": "brcmfmac: fix possible buffer overflow in brcmf_cfg80211_mgmt_tx()", + "cmt_id": "c63048a29cf222bcd75823b4ca898e2aa6311f8f" + } + }, + "3.16.49": { + "CVE-2017-11089": { + "cmt_msg": "cfg80211: Define nla_policy for NL80211_ATTR_LOCAL_MESH_POWER_MODE", + "cmt_id": "2a5d2a519162f5c52121c1053439535f2de705af" + }, + "CVE-2017-14156": { + "cmt_msg": "video: fbdev: aty: do not leak uninitialized padding in clk to userspace", + "cmt_id": "093d5ecdeb49c6ad4ea4c1fb39c481e9bcfc1871" + }, + "CVE-2017-12153": { + "cmt_msg": "nl80211: check for the required netlink attributes presence", + "cmt_id": "ed2305f2eba403d41dc4213746f60d47273980f6" + }, + "CVE-2017-8831": { + "cmt_msg": "saa7164: fix double fetch PCIe access condition", + "cmt_id": "f6c711a2f630b15479466f5b25b25850b04a7106" + }, + "CVE-2017-14340": { + "cmt_msg": "xfs: XFS_IS_REALTIME_INODE() should be false if no rt device present", + "cmt_id": "1e48f7b93c3a8f1d7bb136ab7fa61e763893a6fd" + }, + "CVE-2017-12154": { + "cmt_msg": "kvm: nVMX: Don't allow L2 to access the hardware CR8", + "cmt_id": "423a7a81efb8da25dbbcfe7a33bd8bfdce34150b" + }, + "CVE-2017-1000251": { + "cmt_msg": "Bluetooth: Properly check L2CAP config option output buffer length", + "cmt_id": "8a7b081660857a80c3efc463b3da790c4fa0c801" + }, + "CVE-2017-14489": { + "cmt_msg": "scsi: scsi_transport_iscsi: fix the issue that iscsi_if_rx doesn't parse nlmsg properly", + "cmt_id": "a1b438ad8590add8f6b0b679171bf5e0d45e2da1" + }, + "CVE-2017-18079": { + "cmt_msg": "Input: i8042 - fix crash at boot time", + "cmt_id": "b8e534a556b1a6a6eca8fcdca79725f0dea21555" + } + }, + "3.16.50": { + "CVE-2017-0786": { + "cmt_msg": "brcmfmac: add length check in brcmf_cfg80211_escan_handler()", + "cmt_id": "7df83adfc5d38bf960ef7ff0e4cb1c2c92715f63" + }, + "CVE-2017-16527": { + "cmt_msg": "ALSA: usb-audio: Kill stray URB at exiting", + "cmt_id": "6a6488e8d231fa1fca2408e59e819f64fecb45f3" + }, + "CVE-2017-13080": { + "cmt_msg": "mac80211: accept key reinstall without changing anything", + "cmt_id": "a0a8a11d1630cd648dc1ce86da620b4e240e0315" + }, + "CVE-2017-15649": { + "cmt_msg": "packet: in packet_do_bind, test fanout with bind_lock held", + "cmt_id": "70abad3796f52ed593d5d31bf9f0b5410a522548" + }, + "CVE-2017-16531": { + "cmt_msg": "USB: fix out-of-bounds in usb_set_configuration", + "cmt_id": "cc81fff9d62e32a27b1f16dab1a6172935792ab7" + }, + "CVE-2017-16530": { + "cmt_msg": "USB: uas: fix bug in handling of alternate settings", + "cmt_id": "c0003557dbdec4ec1976ea7be9534abef758297b" + }, + "CVE-2017-16533": { + "cmt_msg": "HID: usbhid: fix out-of-bounds bug", + "cmt_id": "8d675aa967d3927ac100f7af48f2a2af8a041d2d" + }, + "CVE-2017-16532": { + "cmt_msg": "usb: usbtest: fix NULL pointer dereference", + "cmt_id": "824f2a5ccdd9ddfb53418c13f493aa46ae0c2c00" + }, + "CVE-2017-11473": { + "cmt_msg": "x86/acpi: Prevent out of bound access caused by broken ACPI tables", + "cmt_id": "52b12e5aeae7f71567348776d4f7f12b83788d15" + }, + "CVE-2017-16535": { + "cmt_msg": "USB: core: fix out-of-bounds access bug in usb_get_bos_descriptor()", + "cmt_id": "6514189e83d470af2f35735038c1b096410ab98d" + }, + "CVE-2017-15265": { + "cmt_msg": "ALSA: seq: Fix use-after-free at creating a port", + "cmt_id": "853c65fe1db498563bdeea5b7e733441db34d330" + }, + "CVE-2017-15299": { + "cmt_msg": "KEYS: don't let add_key() update an uninstantiated key", + "cmt_id": "24832178de3ab7b6fb42f2730d8d675e3d30adb2" + }, + "CVE-2018-10675": { + "cmt_msg": "mm/mempolicy: fix use after free when calling get_mempolicy", + "cmt_id": "7bd0cdad74409e093556f200b788f45cdb2064ee" + }, + "CVE-2017-16529": { + "cmt_msg": "ALSA: usb-audio: Check out-of-bounds access by corrupted buffer descriptor", + "cmt_id": "9992800cfd0b367369407d62a4c228c454c5d0e3" + }, + "CVE-2017-12193": { + "cmt_msg": "assoc_array: Fix a buggy node-splitting case", + "cmt_id": "c42ab77ec3454fc0d9710bd6734e241e4202d8b3" + }, + "CVE-2017-12192": { + "cmt_msg": "KEYS: prevent KEYCTL_READ on negative key", + "cmt_id": "3eab231a5b5382067ab3ead172780144f9c0f721" + }, + "CVE-2017-12190": { + "cmt_msg": "fix unbalanced page refcounting in bio_map_user_iov", + "cmt_id": "3c885aa3b459aabc5fa04251a5fdd88e29b1de70" + } + }, + "3.16.51": { + "CVE-2017-16537": { + "cmt_msg": "media: imon: Fix null-ptr-deref in imon_probe", + "cmt_id": "7f3ca02c7ed55f7d524fb5c06e2de36ab65f5e20" + }, + "CVE-2017-16536": { + "cmt_msg": "cx231xx-cards: fix NULL-deref on missing association descriptor", + "cmt_id": "99a3c1bb0ed332c64cfcd53a84fea2468ab9e11e" + }, + "CVE-2018-9517": { + "cmt_msg": "l2tp: pass tunnel pointer to ->session_create()", + "cmt_id": "0b3ca265e81f5e1d9f7f66ad416cbabecca914cf" + }, + "CVE-2017-0627": { + "cmt_msg": "media: uvcvideo: Prevent heap overflow when accessing mapped controls", + "cmt_id": "a5f9c8992ea254dc7a80d24257083a666dd600f2" + }, + "CVE-2017-16525": { + "cmt_msg": "USB: serial: console: fix use-after-free after failed setup", + "cmt_id": "96b62489bc4200803cb77a0ca69aa3d179c7e9f5" + }, + "CVE-2017-16643": { + "cmt_msg": "Input: gtco - fix potential out-of-bound access", + "cmt_id": "9d399eba105c6e311db9ec78ce62579ffc403c0d" + }, + "CVE-2017-16650": { + "cmt_msg": "net: qmi_wwan: fix divide by 0 on bad descriptors", + "cmt_id": "4a14bd934b40b1a9f7fe3e0546f9873bb55e5b61" + }, + "CVE-2017-14051": { + "cmt_msg": "scsi: qla2xxx: Fix an integer overflow in sysfs code", + "cmt_id": "71ee8480093a46d245f61e2c2c5cfb0d5a6bc61d" + }, + "CVE-2017-16649": { + "cmt_msg": "net: cdc_ether: fix divide by 0 on bad descriptors", + "cmt_id": "fac4f4657e16d3457963d4c8ee6a356103155141" + }, + "CVE-2017-15115": { + "cmt_msg": "sctp: do not peel off an assoc from one netns to another one", + "cmt_id": "7adde0289baa8d51c2bd072d80cb82a278d24363" + } + }, + "3.16.52": { + "CVE-2017-16526": { + "cmt_msg": "uwb: properly check kthread_run return value", + "cmt_id": "8a088612bc35033159077fa7bee6f3761d712725" + }, + "CVE-2020-14353": { + "cmt_msg": "KEYS: prevent creating a different user's keyrings", + "cmt_id": "9d62d5d2f4130bd7c6986cfde8becb4fa0cf4f7f" + }, + "CVE-2020-27067": { + "cmt_msg": "l2tp: fix l2tp_eth module loading", + "cmt_id": "84f9cf6ecccd86254bc6e2cfac0050543269852a" + }, + "CVE-2017-17741": { + "cmt_msg": "KVM: Fix stack-out-of-bounds read in write_mmio", + "cmt_id": "7cc7f67418296f829a284b6e2d4c62d937f15faa" + }, + "CVE-2018-7191": { + "cmt_msg": "tun: call dev_get_valid_name() before register_netdevice()", + "cmt_id": "ff31768dd6814abefb7724fa6dc0976b33edce0e" + }, + "CVE-2017-18270": { + "cmt_msg": "KEYS: prevent creating a different user's keyrings", + "cmt_id": "9d62d5d2f4130bd7c6986cfde8becb4fa0cf4f7f" + }, + "CVE-2017-15868": { + "cmt_msg": "Bluetooth: bnep: bnep_add_connection() should verify that it's dealing with l2cap socket", + "cmt_id": "77369e6ee42b28a529932f5f7a5522de73310d21" + }, + "CVE-2017-8824": { + "cmt_msg": "dccp: CVE-2017-8824: use-after-free in DCCP code", + "cmt_id": "37e923d49eb8219cab4e49237d026755276484a0" + }, + "CVE-2017-1000407": { + "cmt_msg": "KVM: VMX: remove I/O port 0x80 bypass on Intel hosts", + "cmt_id": "02b1dd5472cee5286ab1a9eb916c036ab2f86b78" + }, + "CVE-2017-17558": { + "cmt_msg": "USB: core: prevent malicious bNumInterfaces overflow", + "cmt_id": "072bee30c5d314af02c211112697ab0931ab5039" + }, + "CVE-2017-17806": { + "cmt_msg": "crypto: hmac - require that the underlying hash algorithm is unkeyed", + "cmt_id": "150fbc1221d1352db7dc830074586e0ee28e2a15" + }, + "CVE-2017-16645": { + "cmt_msg": "Input: ims-psu - check if CDC union descriptor is sane", + "cmt_id": "eb791765b62b2a615fb692c3394d86f370d72681" + }, + "CVE-2015-8709": { + "cmt_msg": "mm: Add a user_ns owner to mm_struct and fix ptrace permission checks", + "cmt_id": "d5b3e840dbf6dd2c0f30b5982b6f5ecd49e46b12" + }, + "CVE-2017-17448": { + "cmt_msg": "netfilter: nfnetlink_cthelper: Add missing permission checks", + "cmt_id": "fad6474d43e985338e4c2b3bb1a7668cca1f041a" + }, + "CVE-2017-17449": { + "cmt_msg": "netlink: Add netns check on taps", + "cmt_id": "df524750e2d1ead01cceed5ffc0b62166c7630dd" + }, + "CVE-2017-16939": { + "cmt_msg": "ipsec: Fix aborted xfrm policy dump crash", + "cmt_id": "a7d7387cc169e912055faca1b0f123e5bce78f53" + }, + "CVE-2017-17807": { + "cmt_msg": "KEYS: add missing permission check for request_key() destination", + "cmt_id": "d3dc1ffed4044437339a22acebebaf1c5bc141ee" + }, + "CVE-2017-17805": { + "cmt_msg": "crypto: salsa20 - fix blkcipher_walk API usage", + "cmt_id": "9517d9d0c1d62515d33c0405b5a86e88647012a2" + }, + "CVE-2017-17450": { + "cmt_msg": "netfilter: xt_osf: Add missing permission checks", + "cmt_id": "06b6060a61b14a747b0f29890fcb20ece18a0944" + } + }, + "3.16.54": { + "CVE-2017-18203": { + "cmt_msg": "dm: fix race between dm_get_from_kobject() and __dm_destroy()", + "cmt_id": "e9546d2629dd45650d9b9035198d7e8ce907e7de" + }, + "CVE-2021-0447": { + "cmt_msg": "l2tp: protect sock pointer of struct pppol2tp_session with RCU", + "cmt_id": "9bcc0508576b2d50efd958f2ea1c5906749c2c89" + }, + "CVE-2018-1000004": { + "cmt_msg": "ALSA: seq: Make ioctls race-free", + "cmt_id": "02cbce8576a31df8fca54aaec91ee081076bd79d" + }, + "CVE-2017-1000410": { + "cmt_msg": "Bluetooth: Prevent stack info leak from the EFS element.", + "cmt_id": "bf101edbb0ad37a6cd970cb98a9f1ae950b719f1" + }, + "CVE-2017-16913": { + "cmt_msg": "usbip: fix stub_rx: harden CMD_SUBMIT path to handle malicious input", + "cmt_id": "61aa1e63c06961e77b6f63823e05af637c1e3acd" + }, + "CVE-2017-16912": { + "cmt_msg": "usbip: fix stub_rx: get_pipe() to validate endpoint number", + "cmt_id": "65060ba29cc54b3d5f76ceacf3c820f2087c35e6" + }, + "CVE-2017-16911": { + "cmt_msg": "usbip: prevent vhci_hcd driver from leaking a socket pointer address", + "cmt_id": "789998181fc4fe5d48d1b95d796e8b62df17c1d9" + }, + "CVE-2018-5333": { + "cmt_msg": "RDS: null pointer dereference in rds_atomic_free_op", + "cmt_id": "c8b61a6ecfb90c7fb4f824df2448b923954de170" + }, + "CVE-2017-16914": { + "cmt_msg": "usbip: fix stub_send_ret_submit() vulnerability to null transfer_buffer", + "cmt_id": "49afc374a23c093faabd155e332c927bf0e69af0" + }, + "CVE-2017-13216": { + "cmt_msg": "staging: android: ashmem: fix a race condition in ASHMEM_SET_SIZE ioctl", + "cmt_id": "63aa20e4f4760249339c7771bd7e4a01d82a95ad" + }, + "CVE-2017-18017": { + "cmt_msg": "netfilter: xt_TCPMSS: add more sanity tests on tcph->doff", + "cmt_id": "d2e769238e6079e1e16c856cc352b0061a111f1d" + }, + "CVE-2018-5332": { + "cmt_msg": "RDS: Heap OOB write in rds_message_alloc_sgs()", + "cmt_id": "a64a21f6de4faf41b74800275be0552f55e83699" + } + }, + "3.16.55": { + "CVE-2017-18595": { + "cmt_msg": "tracing: Fix possible double free on failure of allocating trace buffer", + "cmt_id": "dd520da215e1f8558206ddade1f55b239730bd4f" + }, + "CVE-2017-0861": { + "cmt_msg": "ALSA: pcm: prevent UAF in snd_pcm_info", + "cmt_id": "da7bce9e41266e17c98a997c154cb126a7ed8e98" + }, + "CVE-2019-9454": { + "cmt_msg": "i2c: core-smbus: prevent stack corruption on read I2C_BLOCK_DATA", + "cmt_id": "4a6efb0107eb5cb91dc19efc0a518ee12793190e" + }, + "CVE-2018-6927": { + "cmt_msg": "futex: Prevent overflow by strengthen input validation", + "cmt_id": "762c02e688cd2e326dec50e030ad559a3c943192" + }, + "CVE-2018-7492": { + "cmt_msg": "rds: Fix NULL pointer dereference in __rds_rdma_map", + "cmt_id": "39961200584fe03d2915886ac49e7ec7a8b5a4ae" + }, + "CVE-2017-18551": { + "cmt_msg": "i2c: core-smbus: prevent stack corruption on read I2C_BLOCK_DATA", + "cmt_id": "4a6efb0107eb5cb91dc19efc0a518ee12793190e" + }, + "CVE-2018-18386": { + "cmt_msg": "n_tty: fix EXTPROC vs ICANON interaction with TIOCINQ (aka FIONREAD)", + "cmt_id": "7ed9e0c29f0dfae1f249d3d36142a6474ea77895" + }, + "CVE-2018-5750": { + "cmt_msg": "ACPI: sbshc: remove raw pointer from printk() message", + "cmt_id": "0c2575631cae6894ed82e4883ecb6d097157a063" + }, + "CVE-2018-1000028": { + "cmt_msg": "nfsd: auth: Fix gid sorting when rootsquash enabled", + "cmt_id": "76a90eeac5d1935405d646f9c3cbf76be87936e5" + }, + "CVE-2017-18344": { + "cmt_msg": "posix-timer: Properly check sigevent->sigev_notify", + "cmt_id": "115659c998ba0adf97d6c3e9706f618000fa90e2" + }, + "CVE-2015-9016": { + "cmt_msg": "blk-mq: fix race between timeout and freeing request", + "cmt_id": "7acba7c0621efdfb09bb514500ba22f965aba68b" + } + }, + "3.16.57": { + "CVE-2018-20510": { + "cmt_msg": "binder: replace \"%p\" with \"%pK\"", + "cmt_id": "c2c37cd0a0f45dd883fc03b38b04a7f0a269a1ca" + }, + "CVE-2017-18216": { + "cmt_msg": "ocfs2: subsystem.su_mutex is required while accessing the item->ci_parent", + "cmt_id": "d9b4d618a22bf30a1c82dffc5c7cb3b1abda48dc" + }, + "CVE-2018-9518": { + "cmt_msg": "NFC: llcp: Limit size of SDP URI", + "cmt_id": "3b3a343e2442a4fb2730967df4e2a29f0fa66c84" + }, + "CVE-2018-8897": { + "cmt_msg": "x86/entry/64: Don't use IST entry for #BP stack", + "cmt_id": "45dc1e88fb5a728c1f2186edafccf6581c9c99b8" + }, + "CVE-2018-1087": { + "cmt_msg": "kvm/x86: fix icebp instruction handling", + "cmt_id": "e6c4cf2c7cbd5fd81f9a323c30ee0e3e1d2cae4b" + }, + "CVE-2018-7757": { + "cmt_msg": "scsi: libsas: fix memory leak in sas_smp_get_phy_events()", + "cmt_id": "c1184c59b37ed607a1193fc4fde0ffda56844bd6" + }, + "CVE-2017-5754": { + "cmt_msg": "x86/cpufeatures: Add Intel feature bits for Speculation Control", + "cmt_id": "13056af0ca8213eb800ada9b2b73eb602bb943e0" + }, + "CVE-2018-1068": { + "cmt_msg": "netfilter: ebtables: CONFIG_COMPAT: don't trust userland offsets", + "cmt_id": "71a00fe67dde7d2ed206a0db2a67f29fad90cc72" + }, + "CVE-2018-7995": { + "cmt_msg": "x86/MCE: Serialize sysfs changes", + "cmt_id": "290e29104bf6863d75a8049e501e47815665d39d" + }, + "CVE-2017-16538": { + "cmt_msg": "media: dvb-usb-v2: lmedm04: Improve logic checking of warm start", + "cmt_id": "c8f3c2e5c507a41f303bbd6e1beeeb830c327881" + }, + "CVE-2018-10940": { + "cmt_msg": "cdrom: information leak in cdrom_ioctl_media_changed()", + "cmt_id": "319975e893eebe88c6695c6876ab75d316aa518b" + }, + "CVE-2018-8781": { + "cmt_msg": "drm: udl: Properly check framebuffer mmap offsets", + "cmt_id": "c2f377300d828234a16a6dc35402bc313bb15bed" + }, + "CVE-2018-8822": { + "cmt_msg": "staging: ncpfs: memory corruption in ncp_read_kernel()", + "cmt_id": "13a0dfcedbaa682bbb720685778185aead8ce996" + }, + "CVE-2018-1000199": { + "cmt_msg": "perf/hwbp: Simplify the perf-hwbp code, fix documentation", + "cmt_id": "6aa1edde1030eb98f6c810709ce4c9d257ecbe5c" + }, + "CVE-2018-1130": { + "cmt_msg": "dccp: check sk for closed state in dccp_sendmsg()", + "cmt_id": "e86c8c8cdf47ce06f29a080f9ab9ee8eee71b374" + }, + "CVE-2017-18208": { + "cmt_msg": "mm/madvise.c: fix madvise() infinite loop under special circumstances", + "cmt_id": "302212255813b55c0daeb8f15bcf25ff542e36cf" + }, + "CVE-2017-18241": { + "cmt_msg": "f2fs: fix a panic caused by NULL flush_cmd_control", + "cmt_id": "1f0db424c8770c7b31296d5c66a52fffdec1d24c" + }, + "CVE-2018-1092": { + "cmt_msg": "ext4: fail ext4_iget for root directory if unallocated", + "cmt_id": "43ef70b328eddc46938878a270895a9ff7b51059" + }, + "CVE-2018-1093": { + "cmt_msg": "ext4: add validity checks for bitmap block numbers", + "cmt_id": "91a9c8e8ac7da66d7159fd758464808d2a1c979a" + }, + "CVE-2018-7566": { + "cmt_msg": "ALSA: seq: Fix racy pool initializations", + "cmt_id": "1786e202fe5a52fe6d4026b9e40c6a824efce148" }, - "CVE-2019-3892": { - "cmt_msg": "coredump: fix race condition between mmget_not_zero()/get_task_mm() and core dumping" + "CVE-2018-6412": { + "cmt_msg": "fbdev: Fixing arbitrary kernel leak in case FBIOGETCMAP_SPARC in sbusfb_ioctl_helper().", + "cmt_id": "b57ed0f08e1ef7bb138f92f71f143e03a5d52136" }, - "CVE-2021-29264": { - "cmt_msg": "gianfar: fix jumbo packets+napi+rx overrun crash" + "CVE-2019-9456": { + "cmt_msg": "usb: usbmon: Read text within supplied buffer size", + "cmt_id": "cdbb101ef935de73f430019996045d45a653d1a5" }, - "CVE-2021-29265": { - "cmt_msg": "usbip: fix stub_dev usbip_sockfd_store() races leading to gpf" + "CVE-2018-5803": { + "cmt_msg": "sctp: verify size of a new chunk in _sctp_make_chunk()", + "cmt_id": "ca566c761ec34bb6bce3a65d1a3688818f29b64f" }, - "CVE-2021-39648": { - "cmt_msg": "usb: gadget: configfs: Fix use-after-free issue with udc_name" + "CVE-2017-13220": { + "cmt_msg": "Bluetooth: hidp_connection_add() unsafe use of l2cap_pi()", + "cmt_id": "3738d7b1da4d6f306ca6d5a6a96dd70c36f53f94" + } + }, + "3.16.58": { + "CVE-2018-17182": { + "cmt_msg": "mm: get rid of vmacache_flush_all() entirely", + "cmt_id": "536c4d174c0402c5fbf6f7a995f7c9539d124410" }, - "CVE-2022-3545": { - "cmt_msg": "nfp: fix use-after-free in area_cache_get()" + "CVE-2018-13405": { + "cmt_msg": "Fix up non-directory creation in SGID directories", + "cmt_id": "0b3369840cd61c23e2b9241093737b4c395cb406" }, - "CVE-2020-14416": { - "cmt_msg": "can, slip: Protect tty->disc_data in write_wakeup and close with RCU" + "CVE-2018-13406": { + "cmt_msg": "video: uvesafb: Fix integer overflow in allocation", + "cmt_id": "ab6d43c1c7c298cacaae180b2232fe8abc18075f" }, - "CVE-2019-0136": { - "cmt_msg": "mac80211: drop robust management frames from unknown TA" + "CVE-2018-14734": { + "cmt_msg": "infiniband: fix a possible use-after-free bug", + "cmt_id": "c62b25af5f51f49e9f93f828cc38a82c23e8a0c5" }, - "CVE-2022-3542": { - "cmt_msg": "bnx2x: fix potential memory leak in bnx2x_tpa_stop()" + "CVE-2018-14617": { + "cmt_msg": "hfsplus: fix NULL dereference in hfsplus_lookup()", + "cmt_id": "5c8e78e811123b61c8a194a28b48df984b540ec7" }, - "CVE-2023-1078": { - "cmt_msg": "rds: rds_rm_zerocopy_callback() use list_first_entry()" + "CVE-2018-16276": { + "cmt_msg": "USB: yurex: fix out-of-bounds uaccess in read handler", + "cmt_id": "189254a6aa0cc823b55e624ba77ad3bd0637bbd9" }, - "CVE-2022-3344": { - "cmt_msg": "KVM: x86: nSVM: harden svm_free_nested against freeing vmcb02 while still in use" + "CVE-2018-9568": { + "cmt_msg": "net: Set sk_prot_creator when cloning sockets to the right proto", + "cmt_id": "51556151d0c82515934a0feb7c61f3bcad0e73d8" }, - "CVE-2021-21781": { - "cmt_msg": "ARM: ensure the signal page contains defined contents" + "CVE-2018-10877": { + "cmt_msg": "ext4: verify the depth of extent tree in ext4_find_extent()", + "cmt_id": "09999807edd836f8d96ca5a5b8bf007856c5f268" }, - "CVE-2021-0512": { - "cmt_msg": "HID: make arrays usage and value to be the same" + "CVE-2018-10876": { + "cmt_msg": "ext4: only look at the bg_flags field if it is valid", + "cmt_id": "9c2e1d0691bfc68ebc914043497330bd530c6ed6" + }, + "CVE-2018-5814": { + "cmt_msg": "usbip: usbip_host: fix NULL-ptr deref and use-after-free errors", + "cmt_id": "896b00bd9c66cc72ae6800ff6dba65a9e83ea5fd" + }, + "CVE-2018-10879": { + "cmt_msg": "ext4: make sure bitmaps and the inode table don't overlap with bg descriptors", + "cmt_id": "96e340bf132e16be02fdbd6d03c4946f824c085d" + }, + "CVE-2018-10878": { + "cmt_msg": "ext4: always check block group bounds in ext4_init_block_bitmap()", + "cmt_id": "e6eacb6555474a49b1aa29f4e98b38348d3c45fd" + }, + "CVE-2018-10902": { + "cmt_msg": "ALSA: rawmidi: Change resized buffers atomically", + "cmt_id": "c95e0783eab0d1f31c7f8baa6e4ff8b0b8e7eb72" + }, + "CVE-2018-13093": { + "cmt_msg": "xfs: validate cached inodes are free when allocated", + "cmt_id": "7744e6b42712dd27e2457e1eb03b1c73920364c2" + }, + "CVE-2018-16658": { + "cmt_msg": "cdrom: Fix info leak/OOB read in cdrom_ioctl_drive_status", + "cmt_id": "585e054220cd820aeac2436c29ff9c06e483dc83" + }, + "CVE-2018-15572": { + "cmt_msg": "x86/speculation: Protect against userspace-userspace spectreRSB", + "cmt_id": "ba4a6140b84f5a86be14c2511431004bc4b9be69" + }, + "CVE-2018-13094": { + "cmt_msg": "xfs: don't call xfs_da_shrink_inode with NULL bp", + "cmt_id": "991ec538e6683859b065467b8406c7e57526e212" + }, + "CVE-2018-9363": { + "cmt_msg": "Bluetooth: hidp: buffer overflow in hidp_process_report", + "cmt_id": "556fa3e5feba266ebfb14df4509ef0a69b0b1f24" + }, + "CVE-2018-10021": { + "cmt_msg": "scsi: libsas: defer ata device eh commands to libata", + "cmt_id": "0643adfa36b54ea5948e48383d8549ac5c2fb69e" + }, + "CVE-2018-10323": { + "cmt_msg": "xfs: set format back to extents if xfs_bmap_extents_to_btree", + "cmt_id": "00fe22e3f801fd5225aeecc6bf79630ec201f8e4" + }, + "CVE-2018-14609": { + "cmt_msg": "btrfs: relocation: Only remove reloc rb_trees if reloc control has been initialized", + "cmt_id": "7cd49306b9e47333e097ea586feef596ba708771" + }, + "CVE-2018-1000204": { + "cmt_msg": "scsi: sg: allocate with __GFP_ZERO in sg_build_indirect()", + "cmt_id": "582802e7c617cfb07cc15f280c128e6decbc57b8" + }, + "CVE-2018-12233": { + "cmt_msg": "jfs: Fix inconsistency between memory allocation and ea_buf->max_size", + "cmt_id": "63bd05e42208647417f421504ea70db00f046d21" + }, + "CVE-2018-9422": { + "cmt_msg": "futex: Remove requirement for lock_page() in get_futex_key()", + "cmt_id": "862b19bc43313fadad14334760d447f715003500" + }, + "CVE-2018-10880": { + "cmt_msg": "ext4: never move the system.data xattr out of the inode body", + "cmt_id": "42a6cd12f1f0728e7c09a0c1dde8f6d9e8a5fbd6" + }, + "CVE-2018-10881": { + "cmt_msg": "ext4: clear i_data in ext4_inode_info when removing inline data", + "cmt_id": "e2e3ff3ad042fba28c0b49e9534f3b281b105c48" + }, + "CVE-2018-10882": { + "cmt_msg": "ext4: add more inode number paranoia checks", + "cmt_id": "f8d710be66f6f85084331734d7795a7fc80d99de" + }, + "CVE-2018-10883": { + "cmt_msg": "jbd2: don't mark block as modified if the handle is out of credits", + "cmt_id": "005c9f88b625b204e5f80d0241cbf38963f263bf" + } + }, + "3.16.59": { + "CVE-2019-9457": { + "cmt_msg": "exec: Limit arg stack to at most 75% of _STK_LIM", + "cmt_id": "3c270e64a394ea5e52be9e371f5676fa974f6deb" + }, + "CVE-2018-14634": { + "cmt_msg": "exec: Limit arg stack to at most 75% of _STK_LIM", + "cmt_id": "3c270e64a394ea5e52be9e371f5676fa974f6deb" }, "CVE-2018-14633": { - "cmt_msg": "scsi: target: iscsi: Use hex2bin instead of a re-implementation" + "cmt_msg": "scsi: target: iscsi: Use hex2bin instead of a re-implementation", + "cmt_id": "aba97ce870f92835fa3385861f850e3e992dc42a" }, - "CVE-2018-12896": { - "cmt_msg": "posix-timers: Sanitize overrun handling" + "CVE-2018-3639": { + "cmt_msg": "x86/nospec: Simplify alternative_msr_write()", + "cmt_id": "4172af7e06994104deeb53e344f53cf4173ce144" }, - "CVE-2023-1382": { - "cmt_msg": "tipc: set con sock in tipc_conn_alloc" + "CVE-2018-6554": { + "cmt_msg": "staging: irda: remove the irda network stack and drivers", + "cmt_id": "af8f681e48239817afb290f4e8ee3ca094f513e6" }, - "CVE-2019-19073": { - "cmt_msg": "ath9k_htc: release allocated buffer if timed out" + "CVE-2018-6555": { + "cmt_msg": "staging: irda: remove the irda network stack and drivers", + "cmt_id": "46b57f819163e3a84ff00b31485ee0638dbf1fdc" }, - "CVE-2023-1380": { - "cmt_msg": "wifi: brcmfmac: slab-out-of-bounds read in brcmf_get_assoc_ies()" + "CVE-2018-9516": { + "cmt_msg": "HID: debug: check length before copy_to_user()", + "cmt_id": "e44ab03f41ba55e181f4ed64e546feac8f8e69dc" }, - "CVE-2020-0347": { - "cmt_msg": "" + "CVE-2018-7755": { + "cmt_msg": "floppy: Do not copy a kernel pointer to user memory in FDGETPRM ioctl", + "cmt_id": "3141e0750231be243bd4cd0fa6eebeb6a1578537" + } + }, + "3.16.60": { + "CVE-2019-12881": { + "cmt_msg": "drm/i915/userptr: reject zero user_size", + "cmt_id": "fd55b13e6434a47a82080e1b34b1b29cca8fe98e" }, - "CVE-2019-18809": { - "cmt_msg": "media: usb: fix memory leak in af9005_identify_state" + "CVE-2019-18675": { + "cmt_msg": "mmap: introduce sane default mmap limits", + "cmt_id": "72d8a061cbfbee3a357d38ef80688df9e878de43" + } + }, + "3.16.61": { + "CVE-2017-13168": { + "cmt_msg": "scsi: sg: mitigate read/write abuse", + "cmt_id": "3f084a4d285d695b2008533f1b28a5538748e174" }, - "CVE-2019-18808": { - "cmt_msg": "crypto: ccp - Release all allocated memory if sha type is invalid" + "CVE-2019-9458": { + "cmt_msg": "media: v4l: event: Prevent freeing event subscriptions while accessed", + "cmt_id": "a37099499a019538386ef53ca1485cafa6095e0b" + } + }, + "3.16.62": { + "CVE-2018-5848": { + "cmt_msg": "wil6210: missing length check in wmi_set_ie", + "cmt_id": "921c1539170bf690cad59b3dbebf7d46843d28e2" }, - "CVE-2022-41222": { - "cmt_msg": "mm/mremap: hold the rmap lock in write mode when moving page table entries." + "CVE-2018-17972": { + "cmt_msg": "proc: restrict kernel stack dumps to root", + "cmt_id": "6e8e3ad9d57f70fc58e2ecbafbfd1b3f37973cfc" }, - "CVE-2021-40490": { - "cmt_msg": "ext4: fix race writing to an inline_data file while its xattrs are changing" + "CVE-2018-18690": { + "cmt_msg": "xfs: don't fail when converting shortform attr to long form during ATTR_REPLACE", + "cmt_id": "789a4317666e599e487ec1983643de1b519c431e" }, - "CVE-2021-33909": { - "cmt_msg": "seq_file: disallow extremely large seq buffer allocations" + "CVE-2018-12896": { + "cmt_msg": "posix-timers: Sanitize overrun handling", + "cmt_id": "f795b11fdc99a3d4d7d6b9d48c5e44e17c287a27" }, - "CVE-2019-12455": { - "cmt_msg": "clk-sunxi: fix a missing-check bug in sunxi_divs_clk_setup()" + "CVE-2018-3693": { + "cmt_msg": "ext4: fix spectre gadget in ext4_mb_regular_allocator()", + "cmt_id": "e94d8cd6012da14cf18296d6342c16b295c12cbe" }, - "CVE-2019-12456": { - "cmt_msg": "" + "CVE-2017-13305": { + "cmt_msg": "KEYS: encrypted: fix buffer overread in valid_master_desc()", + "cmt_id": "bfe535bf4ab73e41922c7a58d6a858a2c435ff29" }, - "CVE-2019-19070": { - "cmt_msg": "spi: gpio: prevent memory leak in spi_gpio_probe" + "CVE-2018-13053": { + "cmt_msg": "alarmtimer: Prevent overflow for relative nanosleep", + "cmt_id": "b396dc52e302a0610abfd6467e20fb58352cdb69" }, - "CVE-2019-18805": { - "cmt_msg": "ipv4: set the tcp_min_rtt_wlen range from 0 to one day" + "CVE-2018-16862": { + "cmt_msg": "mm: cleancache: fix corruption on missed inode invalidation", + "cmt_id": "56a7ebd4a3adc001b18a8feeb5cdf0b9fb2684fa" }, - "CVE-2021-29647": { - "cmt_msg": "net: qrtr: fix a kernel-infoleak in qrtr_recvmsg()" + "CVE-2018-18021": { + "cmt_msg": "arm64: KVM: Tighten guest core register access from userspace", + "cmt_id": "2fdce53c4a81397774363dfda8be635b8a4468db" }, - "CVE-2019-18806": { - "cmt_msg": "net: qlogic: Fix memory leak in ql_alloc_large_buffers" + "CVE-2018-18710": { + "cmt_msg": "cdrom: fix improper type cast, which can leat to information leak.", + "cmt_id": "4d0f2564603d1ef8cce8a083751442342e9c9474" }, - "CVE-2021-33656": { - "cmt_msg": "vt: drop old FONT ioctls" + "CVE-2018-18281": { + "cmt_msg": "mremap: properly flush TLB before releasing the page", + "cmt_id": "2567a342d707b1245e837f16cb7555b360e2c580" + } + }, + "3.16.63": { + "CVE-2018-19824": { + "cmt_msg": "ALSA: usb-audio: Fix UAF decrement if card has no live interfaces in card.c", + "cmt_id": "1c38b9d9e74a24a8ed9089429031f6d7721b6df0" }, - "CVE-2021-33655": { - "cmt_msg": "fbcon: Disallow setting font bigger than screen size" + "CVE-2018-20169": { + "cmt_msg": "USB: check usb_get_extra_descriptor for proper size", + "cmt_id": "f8860a91d7538022c1c3f0bdddeec9a9d83e0c09" + } + }, + "3.16.64": { + "CVE-2018-20511": { + "cmt_msg": "net/appletalk: fix minor pointer leak to userspace in SIOCFINDIPDDPRT", + "cmt_id": "0c4d7b52773b227211d311858f3c3b56f7c44874" }, - "CVE-2022-41858": { - "cmt_msg": "drivers: net: slip: fix NPD bug in sl_tx_timeout()" + "CVE-2018-5953": { + "cmt_msg": "printk: hash addresses printed with %p", + "cmt_id": "9ebdc41f7115c2fb37da946dd50e531d00533ca1" + }, + "CVE-2016-10741": { + "cmt_msg": "xfs: don't BUG() on mixed direct and mapped I/O", + "cmt_id": "96cbb7e99d66cef46c62dc691664d38d5ae2cd8d" + }, + "CVE-2018-19985": { + "cmt_msg": "USB: hso: Fix OOB memory access in hso_probe/hso_get_config_data", + "cmt_id": "2d955f32f4ab31294447a01cf401cec2cef9013e" }, "CVE-2019-6974": { - "cmt_msg": "kvm: fix kvm_ioctl_create_device() reference counting (CVE-2019-6974)" + "cmt_msg": "kvm: fix kvm_ioctl_create_device() reference counting (CVE-2019-6974)", + "cmt_id": "2aa9f75791601aab7bd02b8783aa9a8f5105f68f" }, - "CVE-2022-41850": { - "cmt_msg": "HID: roccat: Fix use-after-free in roccat_read()" + "CVE-2019-3701": { + "cmt_msg": "can: gw: ensure DLC boundaries after CAN frame modification", + "cmt_id": "1c7dcfd106f42f09e3b7520c26e6eee70a939928" }, - "CVE-2020-24503": { - "cmt_msg": "" + "CVE-2018-16884": { + "cmt_msg": "sunrpc: use-after-free in svc_process_common()", + "cmt_id": "801f9d2fb42e450a67f83c18fd5d8450ad29224f" }, - "CVE-2023-2985": { - "cmt_msg": "fs: hfsplus: fix UAF issue in hfsplus_put_super" + "CVE-2019-7222": { + "cmt_msg": "KVM: x86: work around leak of uninitialized stack contents (CVE-2019-7222)", + "cmt_id": "234a2dee1b06502face184e241e03582d7946f80" }, - "CVE-2020-14390": { - "cmt_msg": "fbcon: remove soft scrollback code" + "CVE-2017-9725": { + "cmt_msg": "mm: cma: fix incorrect type conversion for size during dma allocation", + "cmt_id": "cc12c0099168b416f6c3eff1cd560a771f4b7c3f" }, - "CVE-2020-24502": { - "cmt_msg": "" + "CVE-2019-7221": { + "cmt_msg": "KVM: nVMX: unconditionally cancel preemption timer in free_nested (CVE-2019-7221)", + "cmt_id": "69c7b3bb99c621f44fb46c20ccef737e86e1c5c8" + } + }, + "3.16.65": { + "CVE-2018-1066": { + "cmt_msg": "CIFS: Enable encryption during session setup phase", + "cmt_id": "cbf513cb2080cc507f4b1f2d1a95141e64c87db3" + } + }, + "3.16.66": { + "CVE-2019-11599": { + "cmt_msg": "coredump: fix race condition between mmget_not_zero()/get_task_mm() and core dumping", + "cmt_id": "a301e6a651037c11d2d9932a35fb56a04eedba8c" }, - "CVE-2022-3646": { - "cmt_msg": "nilfs2: fix leak of nilfs_root in case of writer thread creation failure" + "CVE-2019-3892": { + "cmt_msg": "coredump: fix race condition between mmget_not_zero()/get_task_mm() and core dumping", + "cmt_id": "a301e6a651037c11d2d9932a35fb56a04eedba8c" }, - "CVE-2021-45469": { - "cmt_msg": "f2fs: fix to do sanity check on last xattr entry in __f2fs_setxattr()" + "CVE-2019-9503": { + "cmt_msg": "brcmfmac: add subtype check for event handling in data path", + "cmt_id": "52b1af5e74cc3f4d513eacf49f71d9855a9ccbec" }, - "CVE-2022-1184": { - "cmt_msg": "ext4: verify dir block before splitting it" + "CVE-2019-11486": { + "cmt_msg": "tty: mark Siemens R3964 line discipline as BROKEN", + "cmt_id": "e0d2ad5eaec135bb79a7045b1c0718557bac4c4d" }, - "CVE-2022-3642": { - "cmt_msg": "" + "CVE-2019-3901": { + "cmt_msg": "perf/core: Fix perf_event_open() vs. execve() race", + "cmt_id": "92cb82fec63d558f7eecc97afbbbdf3fe5ef95b5" }, - "CVE-2019-19448": { - "cmt_msg": "btrfs: only search for left_info if there is no right_info in try_merge_free_space" + "CVE-2019-2024": { + "cmt_msg": "media: em28xx: Fix use-after-free when disconnecting", + "cmt_id": "abbb5cf0c8e9995defed43a6c98296f357098b5b" }, - "CVE-2024-0584": { - "cmt_msg": "ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet" + "CVE-2019-9466": { + "cmt_msg": "brcmfmac: add subtype check for event handling in data path", + "cmt_id": "52b1af5e74cc3f4d513eacf49f71d9855a9ccbec" }, - "CVE-2019-19449": { - "cmt_msg": "f2fs: fix to do sanity check on segment/section count" + "CVE-2019-3882": { + "cmt_msg": "vfio/type1: Limit DMA mappings per container", + "cmt_id": "d3334471c34797ab1729cbadddd411118d51c584" }, - "CVE-2020-0465": { - "cmt_msg": "HID: core: Sanitize event code and type when mapping input" + "CVE-2019-3460": { + "cmt_msg": "Bluetooth: Check L2CAP option sizes returned from l2cap_get_conf_opt", + "cmt_id": "c5c6a5c7eb7e3d7859e7ec78a2872360e4bab6aa" }, - "CVE-2020-0466": { - "cmt_msg": "do_epoll_ctl(): clean the failure exits up a bit" + "CVE-2019-15927": { + "cmt_msg": "ALSA: usb-audio: Avoid access before bLength check in build_audio_procunit()", + "cmt_id": "cacb39e5e4b7de790939b174165503bbe8c82208" }, - "CVE-2021-4218": { - "cmt_msg": "sysctl: pass kernel pointers to ->proc_handler" + "CVE-2019-11190": { + "cmt_msg": "binfmt_elf: switch to new creds when switching to new mm", + "cmt_id": "1e06334afa7199cc86c6c4830b71a7c1ea8e7901" }, - "CVE-2020-0543": { - "cmt_msg": "x86/cpu: Add 'table' argument to cpu_matches()" + "CVE-2019-12819": { + "cmt_msg": "mdio_bus: Fix use-after-free on device_register fails", + "cmt_id": "8a5e2f4be5d08d16964ce2adb8da6fc42052c6f1" }, - "CVE-2024-25739": { - "cmt_msg": "" + "CVE-2019-25160": { + "cmt_msg": "netlabel: fix out-of-bounds memory accesses", + "cmt_id": "97bc3683c24999ee621d847c9348c75d2fe86272" }, - "CVE-2023-3358": { - "cmt_msg": "HID: intel_ish-hid: Add check for ishtp_dma_tx_map" + "CVE-2019-3459": { + "cmt_msg": "Bluetooth: Verify that l2cap_get_conf_opt provides large enough buffer", + "cmt_id": "78c2887130f1a7d1883195732be1b6cdab667487" }, - "CVE-2019-20054": { - "cmt_msg": "fs/proc/proc_sysctl.c: fix NULL pointer dereference in put_links" + "CVE-2019-12818": { + "cmt_msg": "net: nfc: Fix NULL dereference on nfc_llcp_build_tlv fails", + "cmt_id": "2c716db6f80cef6159972be0dab86892c39de277" }, - "CVE-2024-0340": { - "cmt_msg": "vhost: use kzalloc() instead of kmalloc() followed by memset()" + "CVE-2019-9213": { + "cmt_msg": "mm: enforce min addr even if capable() in expand_downwards()", + "cmt_id": "c90030281dc8b6a25ac8850e98e15877f80b8d66" }, - "CVE-2021-3753": { - "cmt_msg": "vt_kdsetmode: extend console locking" + "CVE-2020-10769": { + "cmt_msg": "crypto: authenc - fix parsing key with misaligned rta_len", + "cmt_id": "ccd67cd15b3e3b2f3d1b03fd4336ea7ab5d35211" + } + }, + "3.16.67": { + "CVE-2018-5995": { + "cmt_msg": "printk: hash addresses printed with %p", + "cmt_id": "14c2d9209a135872def8508e3f19c74f0f3fee52" }, - "CVE-2023-6536": { - "cmt_msg": "" + "CVE-2019-6133": { + "cmt_msg": "fork: record start_time late", + "cmt_id": "971081984266d7934b2f0253215e3f31f9337915" }, - "CVE-2019-11135": { - "cmt_msg": "x86/msr: Add the IA32_TSX_CTRL MSR" + "CVE-2019-10639": { + "cmt_msg": "netns: provide pure entropy for net_hash_mix()", + "cmt_id": "8b197d3ce585d6777197e0633d71e5af7d98cb35" + } + }, + "3.16.69": { + "CVE-2019-11477": { + "cmt_msg": "tcp: limit payload size of sacked skbs", + "cmt_id": "ef27e3c531782ec8213108e11e5515f9724303c7" + }, + "CVE-2019-11884": { + "cmt_msg": "Bluetooth: hidp: fix buffer overflow", + "cmt_id": "acaf43aa7ede1e500532f1f5d910e207f89d5e1f" + }, + "CVE-2019-11479": { + "cmt_msg": "tcp: add tcp_min_snd_mss sysctl", + "cmt_id": "6b7e7997ad3505db7de85ff12276fc84659481d3" + }, + "CVE-2019-11478": { + "cmt_msg": "tcp: tcp_fragment() should apply sane memory limits", + "cmt_id": "dc97a907bc76b71c08e7e99a5b1b30ef4d5e4a85" + }, + "CVE-2019-11833": { + "cmt_msg": "ext4: zero out the unused memory region in the extent tree block", + "cmt_id": "13c4be25bdcbe5045f9b17ad875c3253a4888e45" + }, + "CVE-2019-10142": { + "cmt_msg": "drivers/virt/fsl_hypervisor.c: prevent integer overflow in ioctl", + "cmt_id": "bfa8c73482dae6bafc0741cbfd63f84d11311b36" }, "CVE-2019-11810": { - "cmt_msg": "scsi: megaraid_sas: return error when create DMA pool failed" + "cmt_msg": "scsi: megaraid_sas: return error when create DMA pool failed", + "cmt_id": "bd0908fbd84009cb5f01cf1a258a6f7fd78b6b3a" + } + }, + "3.16.70": { + "CVE-2019-10126": { + "cmt_msg": "mwifiex: Fix heap overflow in mwifiex_uap_parse_tail_ies()", + "cmt_id": "a62393d7eb63bd075c51154002825cc7ab4dd3eb" }, - "CVE-2021-27365": { - "cmt_msg": "scsi: iscsi: Ensure sysfs attributes are limited to PAGE_SIZE" + "CVE-2019-2101": { + "cmt_msg": "media: uvcvideo: Fix 'type' check leading to overflow", + "cmt_id": "1ea04ca97ab7f4d583949825dd7d55467aa2536f" }, - "CVE-2021-27364": { - "cmt_msg": "scsi: iscsi: Restrict sessions and handles to admin capabilities" + "CVE-2019-3846": { + "cmt_msg": "mwifiex: Fix possible buffer overflows at parsing bss descriptor", + "cmt_id": "a24ac7326f38ffab2b63141496d075da144cec7d" }, - "CVE-2019-11815": { - "cmt_msg": "net: rds: force to destroy connection if t_sock is NULL in rds_tcp_kill_sock()." + "CVE-2019-15916": { + "cmt_msg": "net-sysfs: Fix mem leak in netdev_register_kobject", + "cmt_id": "3c169c57e6c00c36b16c59ccb0e5adbd784b157b" }, - "CVE-2020-0431": { - "cmt_msg": "HID: hid-input: clear unmapped usages" + "CVE-2019-16413": { + "cmt_msg": "9p: use inode->i_lock to protect i_size_write() under 32-bit", + "cmt_id": "8463eed58e131d0cc4db4c9f84fb8454e09e48dd" + } + }, + "3.16.71": { + "CVE-2019-13272": { + "cmt_msg": "ptrace: Fix ->ptracer_cred handling for PTRACE_TRACEME", + "cmt_id": "d5d5bd909a4f03f132ee3fd3f6f0568c8344eee5" + } + }, + "3.16.72": { + "CVE-2019-20811": { + "cmt_msg": "net-sysfs: call dev_hold if kobject_init_and_add success", + "cmt_id": "1b75034a1bb506abcabb2c2f9d7360020a7e2c42" }, - "CVE-2022-39842": { - "cmt_msg": "video: fbdev: pxa3xx-gcu: Fix integer overflow in pxa3xx_gcu_write" + "CVE-2019-17351": { + "cmt_msg": "xen: let alloc_xenballooned_pages() fail if not enough memory free", + "cmt_id": "2ed58e578b03269b23eb7119fb38478725ae6470" }, - "CVE-2018-17977": { - "cmt_msg": "" + "CVE-2019-1125": { + "cmt_msg": "x86/speculation: Prepare entry code for Spectre v1 swapgs mitigations", + "cmt_id": "79969c78fd8622fa7e7f925acd483eb01714efa4" }, - "CVE-2024-1151": { - "cmt_msg": "net: openvswitch: limit the number of recursions from action sets" + "CVE-2019-15666": { + "cmt_msg": "xfrm: policy: Fix out-of-bound array accesses in __xfrm_policy_unlink", + "cmt_id": "056bd2ff271dd62e52efb09c96399a7ef9d68455" }, - "CVE-2018-17972": { - "cmt_msg": "proc: restrict kernel stack dumps to root" + "CVE-2019-20096": { + "cmt_msg": "dccp: Fix memleak in __feat_register_sp", + "cmt_id": "6f5a5f7e229e3ec71d729f3fd4479a11a0a21fd8" }, - "CVE-2021-20322": { - "cmt_msg": "ipv6: make exception cache less predictible" + "CVE-2018-20836": { + "cmt_msg": "scsi: libsas: fix a race condition when smp task timeout", + "cmt_id": "d5534b2998f7c7009e600d57f27f68ed45779da2" }, - "CVE-2021-20320": { - "cmt_msg": "s390/bpf: Fix optimizing out zero-extensions" + "CVE-2019-3900": { + "cmt_msg": "vhost_net: fix possible infinite loop", + "cmt_id": "f3a64b1071c414e59233b769110872a026f8d254" }, - "CVE-2021-20321": { - "cmt_msg": "ovl: fix missing negative dentry check in ovl_rename()" + "CVE-2019-10207": { + "cmt_msg": "Bluetooth: hci_uart: check for missing tty operations", + "cmt_id": "ebb8302ce770e8c455d9209cb598f4cd03021e42" }, - "CVE-2022-26490": { - "cmt_msg": "nfc: st21nfca: Fix potential buffer overflows in EVT_TRANSACTION" + "CVE-2019-13631": { + "cmt_msg": "Input: gtco - bounds check collection indent level", + "cmt_id": "754d0ca82fed0ad682e875bea824c348d597ca28" }, - "CVE-2023-3812": { - "cmt_msg": "net: tun: fix bugs for oversize packet when napi frags enabled" + "CVE-2019-15214": { + "cmt_msg": "ALSA: core: Fix card races between register and disconnect", + "cmt_id": "dbcb50792a5175b222c181bafa51f470550ba827" }, - "CVE-2023-7192": { - "cmt_msg": "netfilter: ctnetlink: fix possible refcount leak in ctnetlink_create_conntrack()" + "CVE-2019-20054": { + "cmt_msg": "fs/proc/proc_sysctl.c: fix NULL pointer dereference in put_links", + "cmt_id": "79c7d53c4e3df6bc0c41b62adb0aefe10d28a888" }, - "CVE-2022-3169": { - "cmt_msg": "nvme: ensure subsystem reset is single threaded" + "CVE-2019-15216": { + "cmt_msg": "USB: yurex: Fix protection fault after device removal", + "cmt_id": "5133454a1f3a7f22412ab083f7ff53f822d50f49" }, - "CVE-2022-4744": { - "cmt_msg": "tun: avoid double free in tun_free_netdev" + "CVE-2019-13648": { + "cmt_msg": "powerpc/tm: Fix oops on sigreturn on systems without TM", + "cmt_id": "929606ae749185c940a5476d3a0e8d8e7c9c1db6" }, - "CVE-2022-36280": { - "cmt_msg": "drm/vmwgfx: Validate the box size for the snooped cursor" + "CVE-2017-18509": { + "cmt_msg": "ipv6: check sk sk_type and protocol early in ip_mroute_set/getsockopt", + "cmt_id": "2b8d63b97d78835d3cd75b0ee344d21489df4edc" }, - "CVE-2022-1048": { - "cmt_msg": "ALSA: pcm: Fix races among concurrent hw_params and hw_free calls" + "CVE-2019-14284": { + "cmt_msg": "floppy: fix div-by-zero in setup_format_params", + "cmt_id": "a36b6459cbff32a0ef228241c99d6586ca7e944c" + }, + "CVE-2019-14283": { + "cmt_msg": "floppy: fix out-of-bounds read in copy_buffer", + "cmt_id": "05429983fa0fa3bfa1b8436beb63913d9d4aad1a" + }, + "CVE-2019-10638": { + "cmt_msg": "inet: switch IP ID generator to siphash", + "cmt_id": "9ebeec41ed3f52fd94267f25f8b9bf3f4cbf1e4e" + } + }, + "3.16.74": { + "CVE-2019-15219": { + "cmt_msg": "USB: sisusbvga: fix oops in error path of sisusb_probe", + "cmt_id": "135b5e3371cdba62761dee1cf6c0e20e48a41ac3" + }, + "CVE-2019-15218": { + "cmt_msg": "media: usb: siano: Fix general protection fault in smsusb", + "cmt_id": "b38d52375b92e1a1ddca9a79cf08bf8d536e8cbb" + }, + "CVE-2019-15212": { + "cmt_msg": "USB: rio500: refuse more than one device at a time", + "cmt_id": "365d2bc245d2b1b2628f80463bdf284544d69c36" + }, + "CVE-2019-15211": { + "cmt_msg": "media: radio-raremono: change devm_k*alloc to k*alloc", + "cmt_id": "cc1b36d4dd926df07d970cb78346a3bda082fe65" + }, + "CVE-2019-15215": { + "cmt_msg": "media: cpia2_usb: first wake up, then free in disconnect", + "cmt_id": "136f9120ecef4d43b5d87000542f16e87c93e2b1" + }, + "CVE-2019-15118": { + "cmt_msg": "ALSA: usb-audio: Fix a stack buffer overflow bug in check_input_term", + "cmt_id": "d6e2b6dd35b6f83fd0166745d8ca65f191a3a468" + }, + "CVE-2016-10906": { + "cmt_msg": "net: arc_emac: fix koops caused by sk_buff free", + "cmt_id": "fe2292f42aa20799497099a88771b4bbf6afdc4e" + }, + "CVE-2016-10905": { + "cmt_msg": "GFS2: don't set rgrp gl_object until it's inserted into rgrp tree", + "cmt_id": "b0699c8e33f2fdf5396da2d41cf2f7ffe9a140a9" + }, + "CVE-2019-0136": { + "cmt_msg": "mac80211: drop robust management frames from unknown TA", + "cmt_id": "62909f7d0b1360ddb147bae8f546228dd93588e1" }, "CVE-2018-20976": { - "cmt_msg": "xfs: clear sb->s_fs_info on mount failure" + "cmt_msg": "xfs: clear sb->s_fs_info on mount failure", + "cmt_id": "bf3878994377a97143f5f6b6e60a18f9b76e0476" }, - "CVE-2021-0342": { - "cmt_msg": "tun: correct header offsets in napi frags mode" + "CVE-2019-15117": { + "cmt_msg": "ALSA: usb-audio: Fix an OOB bug in parse_audio_mixer_unit", + "cmt_id": "b5807684982f4dd978a2a5496514ecc3132bce91" }, - "CVE-2023-22995": { - "cmt_msg": "usb: dwc3: dwc3-qcom: Add missing platform_device_put() in dwc3_qcom_acpi_register_core" + "CVE-2019-15292": { + "cmt_msg": "appletalk: Fix use-after-free in atalk_proc_exit", + "cmt_id": "8a8b481d1908d18213a55260498c5b0af6f12892" }, - "CVE-2024-21803": { - "cmt_msg": "" + "CVE-2019-9506": { + "cmt_msg": "Bluetooth: Fix faulty expression for minimum encryption key size check", + "cmt_id": "e683e0c25ce62690fb5445ac1156c68b785d186e" }, - "CVE-2019-15927": { - "cmt_msg": "ALSA: usb-audio: Avoid access before bLength check in build_audio_procunit()" + "CVE-2019-15917": { + "cmt_msg": "Bluetooth: hci_ldisc: Postpone HCI_UART_PROTO_READY bit set in hci_uart_set_proto()", + "cmt_id": "a79897227b81d588130813e83084b836733cb146" }, - "CVE-2021-3542": { - "cmt_msg": "" + "CVE-2019-14816": { + "cmt_msg": "mwifiex: Fix three heap overflow at parsing element in cfg80211_ap_settings", + "cmt_id": "fb8186b15518423646f0e2105c34b3e620623b4e" }, - "CVE-2019-16413": { - "cmt_msg": "9p: use inode->i_lock to protect i_size_write() under 32-bit" + "CVE-2019-14814": { + "cmt_msg": "mwifiex: Fix three heap overflow at parsing element in cfg80211_ap_settings", + "cmt_id": "fb8186b15518423646f0e2105c34b3e620623b4e" }, - "CVE-2024-24860": { - "cmt_msg": "Bluetooth: Fix atomicity violation in {min,max}_key_size_set" + "CVE-2019-14835": { + "cmt_msg": "vhost: make sure log_num < in_num", + "cmt_id": "8041c3ee83638f34d4c6b52f432601ad12ea4850" }, - "CVE-2023-2177": { - "cmt_msg": "sctp: leave the err path free in sctp_stream_init to sctp_stream_free" + "CVE-2018-21008": { + "cmt_msg": "rsi: add fix for crash during assertions", + "cmt_id": "fd56118648c89adbd7a64bc8e3e26ac4871d1c1a" }, - "CVE-2024-22099": { - "cmt_msg": "" + "CVE-2019-15220": { + "cmt_msg": "p54usb: Fix race between disconnect and firmware loading", + "cmt_id": "450e350ba7c383dc74b181e4eeb50526df68433e" }, - "CVE-2023-30456": { - "cmt_msg": "KVM: nVMX: add missing consistency checks for CR0 and CR4" + "CVE-2019-15221": { + "cmt_msg": "ALSA: line6: Fix write on zero-sized buffer", + "cmt_id": "f1508f326a3b8f29beef9ca399bec516ecfd0b2a" }, - "CVE-2020-12652": { - "cmt_msg": "scsi: mptfusion: Fix double fetch bug in ioctl" + "CVE-2019-15807": { + "cmt_msg": "scsi: libsas: delete sas port if expander discover failed", + "cmt_id": "03e6d05e78d421221bca0f7480c59e1c202c54e9" }, - "CVE-2020-12653": { - "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_cmd_append_vsie_tlv()" + "CVE-2019-15926": { + "cmt_msg": "ath6kl: add some bounds checking", + "cmt_id": "65e2043814c7d6096521199ae8e18d5b40254a3e" }, - "CVE-2019-7222": { - "cmt_msg": "KVM: x86: work around leak of uninitialized stack contents (CVE-2019-7222)" + "CVE-2019-14821": { + "cmt_msg": "KVM: coalesced_mmio: add bounds checking", + "cmt_id": "0bd118896b6a82a42845a6148d2f0f4a3694d178" + } + }, + "3.16.75": { + "CVE-2020-10720": { + "cmt_msg": "net-gro: fix use-after-free read in napi_gro_frags()", + "cmt_id": "f41184b4ba5bbf98b8eecae2a16fca34a669376f" + } + }, + "3.16.77": { + "CVE-2019-17666": { + "cmt_msg": "rtlwifi: Fix potential overflow on P2P code", + "cmt_id": "b78c8469ceff4288d1092e22bfb277d3bd0d7147" }, - "CVE-2020-12657": { - "cmt_msg": "block, bfq: fix use-after-free in bfq_idle_slice_timer_body" + "CVE-2019-15217": { + "cmt_msg": "media: usb:zr364xx:Fix KASAN:null-ptr-deref Read in zr364xx_vidioc_querycap", + "cmt_id": "4accfbf9527ed191513f4d2d738caf15ad4e8657" }, - "CVE-2020-12654": { - "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_ret_wmm_get_status()" + "CVE-2019-15098": { + "cmt_msg": "ath6kl: fix a NULL-ptr-deref bug in ath6kl_usb_alloc_urb_from_pipe()", + "cmt_id": "3e8e6f9a952c9a7e0be92518906dcdb7c8d1ca29" }, - "CVE-2019-7221": { - "cmt_msg": "KVM: nVMX: unconditionally cancel preemption timer in free_nested (CVE-2019-7221)" + "CVE-2019-15505": { + "cmt_msg": "media: technisat-usb2: break out of loop at end of buffer", + "cmt_id": "2389a6543a1c2b3bd1ab5dae04d23c3ed9c95752" }, - "CVE-2018-12929": { - "cmt_msg": "" + "CVE-2019-11135": { + "cmt_msg": "x86/msr: Add the IA32_TSX_CTRL MSR", + "cmt_id": "6608a10cecfd899b4e8650aa9149ca5a6171fc43" }, - "CVE-2018-12928": { - "cmt_msg": "" + "CVE-2019-17053": { + "cmt_msg": "ieee802154: enforce CAP_NET_RAW for raw sockets", + "cmt_id": "b8a15d59a9b26a734f6d8d5f10376f336f7d021b" }, - "CVE-2020-36311": { - "cmt_msg": "KVM: SVM: Periodically schedule when unregistering regions on destroy" + "CVE-2019-17052": { + "cmt_msg": "ax25: enforce CAP_NET_RAW for raw sockets", + "cmt_id": "2c675dab816278a1724c1e93b384c2f05a11cb31" }, - "CVE-2020-36310": { - "cmt_msg": "KVM: SVM: avoid infinite loop on NPF from bad address" + "CVE-2019-17133": { + "cmt_msg": "cfg80211: wext: avoid copying malformed SSIDs", + "cmt_id": "e70efb76ea2eb9f08dc627d93d35a8e5c065346d" }, - "CVE-2020-36313": { - "cmt_msg": "KVM: Fix out of range accesses to memslots" + "CVE-2019-17056": { + "cmt_msg": "nfc: enforce CAP_NET_RAW for raw sockets", + "cmt_id": "bc3d2e9cfdc5c1b7e5ed34eb5279e47d462b4d5c" }, - "CVE-2020-35519": { - "cmt_msg": "net/x25: prevent a couple of overflows" + "CVE-2019-17055": { + "cmt_msg": "mISDN: enforce CAP_NET_RAW for raw sockets", + "cmt_id": "f49bd6510620b9cd434b87bea639f07dfde56f09" }, - "CVE-2024-26592": { - "cmt_msg": "ksmbd: fix UAF issue in ksmbd_tcp_new_connection()" + "CVE-2019-17054": { + "cmt_msg": "appletalk: enforce CAP_NET_RAW for raw sockets", + "cmt_id": "2d4020439bd19f2a498a7fccd8755521a90b2886" + } + }, + "3.16.78": { + "CVE-2019-19536": { + "cmt_msg": "can: peak_usb: pcan_usb_pro: Fix info-leaks to USB devices", + "cmt_id": "06d7546f7b115a266a9bb81887479f38e166964e" }, - "CVE-2021-28971": { - "cmt_msg": "perf/x86/intel: Fix a crash caused by zero PEBS status" + "CVE-2019-19537": { + "cmt_msg": "USB: core: Fix races in character device registration and deregistraion", + "cmt_id": "7e0af4e53ee2cf9b5e4ee761bd8dc4f25a9c885a" }, - "CVE-2020-10708": { - "cmt_msg": "" + "CVE-2019-20934": { + "cmt_msg": "sched/fair: Don't free p->numa_faults with concurrent readers", + "cmt_id": "e65d89d6e78cf1463e755a33e013bde15b894cf5" }, - "CVE-2020-25673": { - "cmt_msg": "nfc: Avoid endless loops caused by repeated llcp_sock_connect()" + "CVE-2019-19530": { + "cmt_msg": "usb: cdc-acm: make sure a refcount is taken early enough", + "cmt_id": "3a8f54a68c9868ddae64603f2ddee082c1737075" }, - "CVE-2022-0400": { - "cmt_msg": "" + "CVE-2019-19531": { + "cmt_msg": "usb: yurex: Fix use-after-free in yurex_delete", + "cmt_id": "8f6204f2adba5354b65bd0f37b8d930e49df6420" + } + }, + "3.16.79": { + "CVE-2019-19062": { + "cmt_msg": "crypto: user - fix memory leak in crypto_report", + "cmt_id": "52373b487ee420c43e1d9d01b4b8c11bb6e9bdbf" }, - "CVE-2024-25741": { - "cmt_msg": "" + "CVE-2019-19056": { + "cmt_msg": "mwifiex: pcie: Fix memory leak in mwifiex_pcie_alloc_cmdrsp_buf", + "cmt_id": "f0eed3b1a34f1e7d8b2c06ad5ddf0ea60aea71ca" }, - "CVE-2021-38160": { - "cmt_msg": "virtio_console: Assure used length from device is limited" + "CVE-2019-19057": { + "cmt_msg": "mwifiex: pcie: Fix memory leak in mwifiex_pcie_init_evt_ring", + "cmt_id": "914927c7bac4ecd2351bdee0cd5b2b1c11150342" }, - "CVE-2021-42739": { - "cmt_msg": "media: firewire: firedtv-avc: fix a buffer overflow in avc_ca_pmt()" + "CVE-2019-19066": { + "cmt_msg": "scsi: bfa: release allocated memory in case of error", + "cmt_id": "0669f62b66de87c6628edc6b5e7e7b317a4b8876" }, - "CVE-2023-1989": { - "cmt_msg": "Bluetooth: btsdio: fix use after free bug in btsdio_remove due to unfinished work" + "CVE-2019-19052": { + "cmt_msg": "can: gs_usb: gs_can_open(): prevent memory leak", + "cmt_id": "f26d980434a06f44b693a26a87aa5300fa4016fd" }, - "CVE-2020-12771": { - "cmt_msg": "bcache: fix potential deadlock problem in btree_gc_coalesce" + "CVE-2019-19227": { + "cmt_msg": "appletalk: Fix potential NULL pointer dereference in unregister_snap_client", + "cmt_id": "1551894964c90588b285d3a4f7da516e0ee9025a" }, - "CVE-2020-12770": { - "cmt_msg": "scsi: sg: add sg_remove_request in sg_write" + "CVE-2019-16746": { + "cmt_msg": "nl80211: validate beacon head", + "cmt_id": "9eec2aca63328997846b52e91e88dab94ccd1414" }, - "CVE-2019-15222": { - "cmt_msg": "ALSA: usb-audio: Fix gpf in snd_usb_pipe_sanity_check" + "CVE-2019-19534": { + "cmt_msg": "can: peak_usb: fix slab info leak", + "cmt_id": "f13615187cd8069c0f1c492e8f244a0c69d0663e" }, - "CVE-2022-25265": { - "cmt_msg": "" + "CVE-2019-15291": { + "cmt_msg": "media: b2c2-flexcop-usb: add sanity checking", + "cmt_id": "470a2d36f614f40b7f032071cfa6662dfcc1eda4" }, - "CVE-2022-20368": { - "cmt_msg": "net/packet: fix slab-out-of-bounds access in packet_recvmsg()" + "CVE-2019-19523": { + "cmt_msg": "USB: adutux: fix use-after-free on disconnect", + "cmt_id": "22cbb8fb12b3b5101260915162ad2b0b56a9284d" }, - "CVE-2019-15220": { - "cmt_msg": "p54usb: Fix race between disconnect and firmware loading" + "CVE-2019-2215": { + "cmt_msg": "ANDROID: binder: remove waitqueue when thread exits.", + "cmt_id": "3a593dd8bd7505f9acbc7b6f8928ec6b7978c125" }, - "CVE-2020-11609": { - "cmt_msg": "media: stv06xx: add missing descriptor sanity checks" + "CVE-2019-19524": { + "cmt_msg": "Input: ff-memless - kill timer in destroy()", + "cmt_id": "8145f2181955c7c95f42a7f71b81ff91bc9e7b8c" + }, + "CVE-2019-19527": { + "cmt_msg": "HID: hiddev: do cleanup in failure of opening a device", + "cmt_id": "a2133df2ca08f0d320e651f682f66a1097e6b752" + }, + "CVE-2019-19532": { + "cmt_msg": "HID: Fix assumption that devices have inputs", + "cmt_id": "f703c175f8e428959a33cdadb3e09986f14390ce" + }, + "CVE-2019-19533": { + "cmt_msg": "media: ttusb-dec: Fix info-leak in ttusb_dec_send_command()", + "cmt_id": "89577bea6adf8cd2a1b97c91f7266bb56aa181b0" + }, + "CVE-2019-19332": { + "cmt_msg": "KVM: x86: fix out-of-bounds write in KVM_GET_EMULATED_CPUID (CVE-2019-19332)", + "cmt_id": "21377f88c2757c6ee3e28407fb1c44b4bdf7e6b2" }, + "CVE-2019-19528": { + "cmt_msg": "USB: iowarrior: fix use-after-free on disconnect", + "cmt_id": "bc5b704c76044bf22be57e5adcd100d6005115cc" + } + }, + "3.16.80": { "CVE-2020-10773": { - "cmt_msg": "s390/cmm: fix information leak in cmm_timeout_handler()" + "cmt_msg": "s390/cmm: fix information leak in cmm_timeout_handler()", + "cmt_id": "c97d5d87f654979c81a36fbd75844a41e5a82cdc" + } + }, + "3.16.81": { + "CVE-2019-19965": { + "cmt_msg": "scsi: libsas: stop discovering if oob mode is disconnected", + "cmt_id": "f4e74a1371c84cca35e53afda50759e2d44e0507" }, - "CVE-2022-21499": { - "cmt_msg": "lockdown: also lock down previous kgdb use" + "CVE-2019-19966": { + "cmt_msg": "media: cpia2: Fix use-after-free in cpia2_exit", + "cmt_id": "56c2514ac65214bfcf60b6df324e3a1d2f31e3b2" }, - "CVE-2020-25284": { - "cmt_msg": "rbd: require global CAP_SYS_ADMIN for mapping and unmapping" + "CVE-2019-14895": { + "cmt_msg": "mwifiex: fix possible heap overflow in mwifiex_process_country_ie()", + "cmt_id": "3b2f9bd867e1a288b470da440992a908c5972644" }, - "CVE-2023-4208": { - "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free" + "CVE-2019-18806": { + "cmt_msg": "net: qlogic: Fix memory leak in ql_alloc_large_buffers", + "cmt_id": "e1db96134ab329054b73c4075949053e43ac7208" + } + }, + "3.16.82": { + "CVE-2019-19447": { + "cmt_msg": "ext4: work around deleting a file with i_nlink == 0 safely", + "cmt_id": "75b201c2fdfb3cecc3eb6a1dc85b87055de642e9" + } + }, + "3.16.83": { + "CVE-2020-8649": { + "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region", + "cmt_id": "bca2e2e83484ff63ca82c9c2c905d4e580f1a35a" }, - "CVE-2022-3606": { - "cmt_msg": "" + "CVE-2020-8648": { + "cmt_msg": "vt: selection, close sel_buffer race", + "cmt_id": "a93c3b40fc3d2264b1b11c469319c7cbefb80c46" }, - "CVE-2023-4206": { - "cmt_msg": "net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free" + "CVE-2019-20636": { + "cmt_msg": "Input: add safety guards to input_set_keycode()", + "cmt_id": "4af47d3cc875e43a523f6d3b3edef2ca785ccf27" }, - "CVE-2023-4207": { - "cmt_msg": "net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free" + "CVE-2020-8647": { + "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region", + "cmt_id": "bca2e2e83484ff63ca82c9c2c905d4e580f1a35a" }, - "CVE-2023-3640": { - "cmt_msg": "" + "CVE-2020-11668": { + "cmt_msg": "media: xirlink_cit: add missing descriptor sanity checks", + "cmt_id": "9e236e2465ff5858bed537b94b15134e3ba55e75" }, - "CVE-2018-18281": { - "cmt_msg": "mremap: properly flush TLB before releasing the page" + "CVE-2020-14416": { + "cmt_msg": "can, slip: Protect tty->disc_data in write_wakeup and close with RCU", + "cmt_id": "10912babe0dff14eea532492a6b9c55f1471fd75" }, - "CVE-2023-20593": { - "cmt_msg": "x86/cpu/amd: Add a Zenbleed fix" + "CVE-2020-14381": { + "cmt_msg": "futex: Fix inode life-time issue", + "cmt_id": "87903c4d3a9b422cd1d254b693e84b95f9df0706" }, - "CVE-2023-3022": { - "cmt_msg": "ipv6: Use result arg in fib_lookup_arg consistently" + "CVE-2020-10690": { + "cmt_msg": "ptp: fix the race between the release of ptp_clock and cdev", + "cmt_id": "5230ef61882d2d14deb846eb6b48370694816e4c" }, - "CVE-2022-2663": { - "cmt_msg": "netfilter: nf_conntrack_irc: Fix forged IP logic" + "CVE-2020-0431": { + "cmt_msg": "HID: hid-input: clear unmapped usages", + "cmt_id": "5a1f8cc7d9dde54ab941fc8dbcb4239307d2efb4" }, - "CVE-2019-8912": { - "cmt_msg": "net: crypto set sk to NULL when af_alg_release." + "CVE-2019-14896": { + "cmt_msg": "libertas: Fix two buffer overflows at parsing bss descriptor", + "cmt_id": "e4646070f91312414af0ca9332a79b7153150fae" }, - "CVE-2023-51780": { - "cmt_msg": "atm: Fix Use-After-Free in do_vcc_ioctl" + "CVE-2019-14897": { + "cmt_msg": "libertas: Fix two buffer overflows at parsing bss descriptor", + "cmt_id": "e4646070f91312414af0ca9332a79b7153150fae" + }, + "CVE-2019-19768": { + "cmt_msg": "blktrace: Protect q->blk_trace with RCU", + "cmt_id": "4398bce1bdf258f7d67bcc38c46f5fa9546448bd" + }, + "CVE-2019-14901": { + "cmt_msg": "mwifiex: Fix heap overflow in mmwifiex_process_tdls_action_frame()", + "cmt_id": "ef0449fb4c94e52c1f5f7170b52a738acf9af5ff" + }, + "CVE-2020-0009": { + "cmt_msg": "staging: android: ashmem: Disallow ashmem memory from being remapped", + "cmt_id": "85216b0a3fc5f3eb08e68750175f8507d5608e37" + }, + "CVE-2018-14611": { + "cmt_msg": "btrfs: validate type when reading a chunk", + "cmt_id": "cdfef40f9557b91384c392a9150bf0bb2b3802c7" + }, + "CVE-2018-14610": { + "cmt_msg": "btrfs: Check that each block group has corresponding chunk at mount time", + "cmt_id": "5203a4d55c2c6a0c86a0ab21bfd071d407ca95a1" + }, + "CVE-2018-14613": { + "cmt_msg": "btrfs: tree-checker: Verify block_group_item", + "cmt_id": "df8ecef7a35de12986676edc45fd841e6d788ba8" + }, + "CVE-2018-14612": { + "cmt_msg": "btrfs: tree-checker: Detect invalid and empty essential trees", + "cmt_id": "e3f6c37c31522cc99cea96e0f0f6f536026fb058" + }, + "CVE-2020-0305": { + "cmt_msg": "chardev: Avoid potential use-after-free in 'chrdev_open()'", + "cmt_id": "6a0a5980a6092c82258858c7588f8bbb36df6026" + }, + "CVE-2020-27418": { + "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region", + "cmt_id": "bca2e2e83484ff63ca82c9c2c905d4e580f1a35a" + }, + "CVE-2020-9383": { + "cmt_msg": "floppy: check FDC index for errors before assigning it", + "cmt_id": "2f9ac30a54dc0181ddac3705cdcf4775d863c530" + }, + "CVE-2020-10942": { + "cmt_msg": "vhost: Check docket sk_family instead of call getname", + "cmt_id": "e4d98e5299b19e1caad03f0b38fd41b046d0de56" + }, + "CVE-2015-8839": { + "cmt_msg": "ext4: fix races between page faults and hole punching", + "cmt_id": "81a2281115c28be55d3489c3a79c84db294b722a" + }, + "CVE-2020-11494": { + "cmt_msg": "slcan: Don't transmit uninitialized stack data in padding", + "cmt_id": "08fadc32ce6239dc75fd5e869590e29bc62bbc28" + }, + "CVE-2019-5108": { + "cmt_msg": "mac80211: Do not send Layer 2 Update frame before authorization", + "cmt_id": "93864704f211e55eddec0c03ca300b1cf6414d8c" + }, + "CVE-2019-20812": { + "cmt_msg": "af_packet: set defaule value for tmo", + "cmt_id": "8c1a8e6dba6a09d65ec7eef54ac13e36b7be9536" + }, + "CVE-2020-11565": { + "cmt_msg": "mm: mempolicy: require at least one nodeid for MPOL_PREFERRED", + "cmt_id": "7ca9aeb9a22b50841c401164703c5b0a4a510aff" + }, + "CVE-2020-1749": { + "cmt_msg": "net: ipv6_stub: use ip6_dst_lookup_flow instead of ip6_dst_lookup", + "cmt_id": "b9f3e457098ea76f2d69bfc369bae1fd0cf2a6e5" + }, + "CVE-2020-2732": { + "cmt_msg": "KVM: nVMX: Don't emulate instructions in guest mode", + "cmt_id": "5d7476c40cd352ec82aec26f6c6d8c413eb2b17b" + }, + "CVE-2020-11608": { + "cmt_msg": "media: ov519: add missing endpoint sanity checks", + "cmt_id": "39a4c51860e9695369b640962be4eb6984175384" + }, + "CVE-2020-11609": { + "cmt_msg": "media: stv06xx: add missing descriptor sanity checks", + "cmt_id": "98d33c0103b16e64a6a4788cf81e22baf229f48e" + } + }, + "3.16.84": { + "CVE-2020-12769": { + "cmt_msg": "spi: spi-dw: Add lock protect dw_spi rx/tx to prevent concurrent calls", + "cmt_id": "f358118d34cdd7e898685205bb62e41e9a3246aa" + }, + "CVE-2020-12114": { + "cmt_msg": "make struct mountpoint bear the dentry reference to mountpoint, not struct mount", + "cmt_id": "172f22d527862eb5aa9dd767826f5d68562943db" }, - "CVE-2023-0047": { - "cmt_msg": "mm, oom: do not trigger out_of_memory from the #PF" + "CVE-2020-0404": { + "cmt_msg": "media: uvcvideo: Avoid cyclic entity chains due to malformed USB descriptors", + "cmt_id": "320230e4875672908b1ec29251b13548e16af1ef" + } + }, + "3.16.85": { + "CVE-2019-19319": { + "cmt_msg": "ext4: protect journal inode's blocks using block_validity", + "cmt_id": "51890201da4d654f6ca131bc45a0e892bb10de1d" }, - "CVE-2020-29370": { - "cmt_msg": "mm: slub: add missing TID bump in kmem_cache_alloc_bulk()" + "CVE-2020-0543": { + "cmt_msg": "x86/cpu: Add 'table' argument to cpu_matches()", + "cmt_id": "98a637c406eefe95f2428739c1397f250bb7fadd" }, - "CVE-2019-15219": { - "cmt_msg": "USB: sisusbvga: fix oops in error path of sisusb_probe" + "CVE-2020-12770": { + "cmt_msg": "scsi: sg: add sg_remove_request in sg_write", + "cmt_id": "f5eb337df20a24a9f9c7f96181ace9d61b590def" }, - "CVE-2022-20424": { - "cmt_msg": "io_uring: remove io_identity" + "CVE-2020-12652": { + "cmt_msg": "scsi: mptfusion: Fix double fetch bug in ioctl", + "cmt_id": "a226f907bd999713e9349bc35aa133cf519a864e" }, - "CVE-2022-20422": { - "cmt_msg": "arm64: fix oops in concurrently setting insn_emulation sysctls" + "CVE-2020-12464": { + "cmt_msg": "USB: core: Fix free-while-in-use bug in the USB S-Glibrary", + "cmt_id": "575f200adca1fe48df15063b1a5673a9b5f713bd" }, - "CVE-2022-20421": { - "cmt_msg": "binder: fix UAF of ref->proc caused by race condition" + "CVE-2020-0255": { + "cmt_msg": "selinux: properly handle multiple messages in selinux_netlink_send()", + "cmt_id": "9592b90cdc99f58e0674e64037c422ea7e9aa367" }, - "CVE-2023-4385": { - "cmt_msg": "fs: jfs: fix possible NULL pointer dereference in dbFree()" + "CVE-2020-10751": { + "cmt_msg": "selinux: properly handle multiple messages in selinux_netlink_send()", + "cmt_id": "9592b90cdc99f58e0674e64037c422ea7e9aa367" }, - "CVE-2020-25643": { - "cmt_msg": "hdlc_ppp: add range checks in ppp_cp_parse_cr()" + "CVE-2020-12653": { + "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_cmd_append_vsie_tlv()", + "cmt_id": "f0c210c885dbc5000d3c3e27723beedda5988cee" }, - "CVE-2023-4387": { - "cmt_msg": "net: vmxnet3: fix possible use-after-free bugs in vmxnet3_rq_alloc_rx_buf()" + "CVE-2020-13143": { + "cmt_msg": "USB: gadget: fix illegal array access in binding with UDC", + "cmt_id": "d126cf46f829d146dde3e6a8963e095ac6cfcd1c" }, - "CVE-2019-19378": { - "cmt_msg": "" + "CVE-2017-14991": { + "cmt_msg": "scsi: sg: fixup infoleak when using SG_GET_REQUEST_TABLE", + "cmt_id": "f37de82d22dc41e9748b788655fab4bfea465a02" }, - "CVE-2020-4788": { - "cmt_msg": "powerpc/64s: flush L1D on kernel entry" + "CVE-2020-10732": { + "cmt_msg": "fs/binfmt_elf.c: allocate initialized memory in fill_thread_core_info()", + "cmt_id": "d03daec2e50aa2a0b6de2c3572af5e1d61f9d132" }, - "CVE-2022-36879": { - "cmt_msg": "xfrm: xfrm_policy: fix a possible double xfrm_pols_put() in xfrm_bundle_lookup()" + "CVE-2020-12654": { + "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_ret_wmm_get_status()", + "cmt_id": "60a613dc22ee9932c3ba67eadb08de357e36f01f" }, - "CVE-2022-1011": { - "cmt_msg": "fuse: fix pipe buffer lifetime for direct_io" + "CVE-2020-12826": { + "cmt_msg": "signal: Extend exec_id to 64bits", + "cmt_id": "303c5366d664e0b860041e0647952dafcd71c5a1" + } + }, + "outstanding": { + "CVE-2020-36322": { + "cmt_msg": "fuse: fix bad inode" }, - "CVE-2021-39698": { - "cmt_msg": "wait: add wake_up_pollfree()" + "CVE-2020-35508": { + "cmt_msg": "fork: fix copy_process(CLONE_PARENT) race with the exiting ->real_parent" }, - "CVE-2022-45934": { - "cmt_msg": "Bluetooth: L2CAP: Fix u8 overflow" + "CVE-2024-26686": { + "cmt_msg": "fs/proc: do_task_stat: use sig->stats_lock to gather the threads/children stats" }, - "CVE-2022-1247": { + "CVE-2020-35501": { "cmt_msg": "" }, - "CVE-2019-19377": { - "cmt_msg": "btrfs: Don't submit any btree write bio if the fs has errors" + "CVE-2024-26687": { + "cmt_msg": "xen/events: close evtchn after mapping cleanup" }, - "CVE-2022-2380": { - "cmt_msg": "video: fbdev: sm712fb: Fix crash in smtcfb_read()" + "CVE-2021-45095": { + "cmt_msg": "phonet: refcount leak in pep_sock_accep" }, - "CVE-2023-20569": { - "cmt_msg": "x86/bugs: Increase the x86 bugs vector size to two u32s" + "CVE-2022-3646": { + "cmt_msg": "nilfs2: fix leak of nilfs_root in case of writer thread creation failure" }, - "CVE-2022-0850": { - "cmt_msg": "ext4: fix kernel infoleak via ext4_extent_header" + "CVE-2022-0001": { + "cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE" }, - "CVE-2019-19529": { - "cmt_msg": "can: mcba_usb: fix use-after-free on disconnect" + "CVE-2021-45469": { + "cmt_msg": "f2fs: fix to do sanity check on last xattr entry in __f2fs_setxattr()" }, - "CVE-2019-19528": { - "cmt_msg": "USB: iowarrior: fix use-after-free on disconnect" + "CVE-2023-3268": { + "cmt_msg": "relayfs: fix out-of-bounds access in relay_file_read" }, - "CVE-2021-3612": { - "cmt_msg": "Input: joydev - prevent potential read overflow in ioctl" + "CVE-2023-52615": { + "cmt_msg": "hwrng: core - Fix page fault dead lock on mmap-ed hwrng" }, - "CVE-2019-19525": { - "cmt_msg": "ieee802154: atusb: fix use-after-free at disconnect" + "CVE-2023-52614": { + "cmt_msg": "PM / devfreq: Fix buffer overflow in trans_stat_show" }, - "CVE-2019-19524": { - "cmt_msg": "Input: ff-memless - kill timer in destroy()" + "CVE-2023-52617": { + "cmt_msg": "PCI: switchtec: Fix stdev_release() crash after surprise hot remove" }, - "CVE-2019-19527": { - "cmt_msg": "HID: hiddev: do cleanup in failure of opening a device" + "CVE-2020-24587": { + "cmt_msg": "mac80211: prevent mixed key and fragment cache attacks" }, - "CVE-2019-19526": { - "cmt_msg": "NFC: pn533: fix use-after-free and memleaks" + "CVE-2020-24586": { + "cmt_msg": "mac80211: prevent mixed key and fragment cache attacks" }, - "CVE-2023-31085": { - "cmt_msg": "ubi: Refuse attaching if mtd's erasesize is 0" + "CVE-2021-0129": { + "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical" }, - "CVE-2019-19523": { - "cmt_msg": "USB: adutux: fix use-after-free on disconnect" + "CVE-2020-24588": { + "cmt_msg": "cfg80211: mitigate A-MSDU aggregation attacks" }, - "CVE-2020-24504": { - "cmt_msg": "ice: create scheduler aggregator node config and move VSIs" + "CVE-2023-52619": { + "cmt_msg": "pstore/ram: Fix crash when setting number of cpus to an odd number" }, - "CVE-2020-11725": { - "cmt_msg": "" + "CVE-2023-52618": { + "cmt_msg": "block/rnbd-srv: Check for unlikely string overflow" }, - "CVE-2021-0937": { - "cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write" + "CVE-2018-10087": { + "cmt_msg": "kernel/exit.c: avoid undefined behaviour when calling wait4()" }, - "CVE-2022-1263": { - "cmt_msg": "KVM: avoid NULL pointer dereference in kvm_dirty_ring_push" + "CVE-2020-36158": { + "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_cmd_802_11_ad_hoc_start" }, - "CVE-2021-35477": { - "cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4" + "CVE-2023-3159": { + "cmt_msg": "firewire: fix potential uaf in outbound_phy_packet_callback()" }, - "CVE-2023-31436": { - "cmt_msg": "net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg" + "CVE-2022-0480": { + "cmt_msg": "memcg: enable accounting for file lock caches" }, - "CVE-2022-3521": { - "cmt_msg": "kcm: avoid potential race in kcm_tx_work" + "CVE-2018-10124": { + "cmt_msg": "kernel/signal.c: avoid undefined behaviour in kill_something_info" }, - "CVE-2023-31082": { - "cmt_msg": "" + "CVE-2022-0487": { + "cmt_msg": "moxart: fix potential use-after-free on remove path" }, - "CVE-2022-47929": { - "cmt_msg": "net: sched: disallow noqueue for qdisc classes" + "CVE-2023-52429": { + "cmt_msg": "dm: limit the number of targets and parameter size area" }, - "CVE-2019-16746": { - "cmt_msg": "nl80211: validate beacon head" + "CVE-2021-47059": { + "cmt_msg": "crypto: sun8i-ss - fix result memory leak on error path" }, - "CVE-2021-41864": { - "cmt_msg": "bpf: Fix integer overflow in prealloc_elems_and_freelist()" + "CVE-2021-0920": { + "cmt_msg": "af_unix: fix garbage collect vs MSG_PEEK" }, - "CVE-2023-31081": { + "CVE-2022-23825": { "cmt_msg": "" }, - "CVE-2022-2209": { - "cmt_msg": "" + "CVE-2021-47052": { + "cmt_msg": "crypto: sa2ul - Fix memory leak of rxd" }, - "CVE-2018-18021": { - "cmt_msg": "arm64: KVM: Tighten guest core register access from userspace" + "CVE-2021-47112": { + "cmt_msg": "x86/kvm: Teardown PV features on boot CPU as well" }, - "CVE-2022-45887": { - "cmt_msg": "media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb()" + "CVE-2021-47113": { + "cmt_msg": "btrfs: abort in rename_exchange if we fail to insert the second ref" }, - "CVE-2021-37576": { - "cmt_msg": "KVM: PPC: Book3S: Fix H_RTAS rets buffer overflow" + "CVE-2021-47110": { + "cmt_msg": "x86/kvm: Disable kvmclock on all CPUs on shutdown" }, - "CVE-2019-8980": { - "cmt_msg": "exec: Fix mem leak in kernel_read_file" + "CVE-2021-47116": { + "cmt_msg": "ext4: fix memory leak in ext4_mb_init_backend on error path." }, - "CVE-2023-7042": { - "cmt_msg": "" + "CVE-2021-47117": { + "cmt_msg": "ext4: fix bug on in ext4_es_cache_extent as ext4_split_extent_at failed" }, - "CVE-2022-3594": { - "cmt_msg": "r8152: Rate limit overflow messages" + "CVE-2021-47114": { + "cmt_msg": "ocfs2: fix data corruption by fallocate" }, - "CVE-2018-14609": { - "cmt_msg": "btrfs: relocation: Only remove reloc rb_trees if reloc control has been initialized" + "CVE-2022-21125": { + "cmt_msg": "x86/speculation/mmio: Reuse SRBDS mitigation for SBDS" }, - "CVE-2023-35824": { - "cmt_msg": "media: dm1105: Fix use after free bug in dm1105_remove due to race condition" + "CVE-2021-47118": { + "cmt_msg": "pid: take a reference when initializing `cad_pid`" }, - "CVE-2021-33098": { - "cmt_msg": "ixgbe: fix large MTU request from VF" + "CVE-2021-46970": { + "cmt_msg": "bus: mhi: pci_generic: Remove WQ_MEM_RECLAIM flag from state workqueue" }, - "CVE-2022-3595": { - "cmt_msg": "cifs: fix double-fault crash during ntlmssp" + "CVE-2019-19241": { + "cmt_msg": "io_uring: async workers should inherit the user creds" }, - "CVE-2023-47233": { - "cmt_msg": "" + "CVE-2022-21123": { + "cmt_msg": "x86/speculation/mmio: Add mitigation for Processor MMIO Stale Data" }, - "CVE-2021-35039": { - "cmt_msg": "module: limit enabling module.sig_enforce" + "CVE-2021-28688": { + "cmt_msg": "xen-blkback: don't leak persistent grants from xen_blkbk_map()" }, - "CVE-2020-27815": { - "cmt_msg": "jfs: Fix array index bounds check in dbAdjTree" + "CVE-2021-39686": { + "cmt_msg": "binder: use euid from cred instead of using task" }, - "CVE-2022-23041": { - "cmt_msg": "xen/9p: use alloc/free_pages_exact()" + "CVE-2021-39685": { + "cmt_msg": "USB: gadget: detect too-big endpoint 0 requests" }, - "CVE-2021-33624": { - "cmt_msg": "bpf: Inherit expanded/patched seen count from old aux data" + "CVE-2021-43975": { + "cmt_msg": "atlantic: Fix OOB read and write in hw_atl_utils_fw_rpc_wait" }, - "CVE-2022-1462": { - "cmt_msg": "tty: use new tty_insert_flip_string_and_push_buffer() in pty_write()" + "CVE-2021-43976": { + "cmt_msg": "mwifiex: Fix skb_over_panic in mwifiex_usb_recv()" }, - "CVE-2022-3115": { - "cmt_msg": "drm: mali-dp: potential dereference of null pointer" + "CVE-2020-0466": { + "cmt_msg": "do_epoll_ctl(): clean the failure exits up a bit" }, - "CVE-2023-6606": { - "cmt_msg": "smb: client: fix OOB in smbCalcSize()" + "CVE-2023-0459": { + "cmt_msg": "uaccess: Add speculation barrier to copy_from_user()" }, - "CVE-2023-3006": { - "cmt_msg": "arm64: Add AMPERE1 to the Spectre-BHB affected list" + "CVE-2023-0458": { + "cmt_msg": "prlimit: do_prlimit needs to have a speculation check" }, - "CVE-2020-27777": { - "cmt_msg": "powerpc/rtas: Restrict RTAS requests from userspace" + "CVE-2021-47086": { + "cmt_msg": "phonet/pep: refuse to enable an unbound pipe" }, - "CVE-2019-20636": { - "cmt_msg": "Input: add safety guards to input_set_keycode()" + "CVE-2023-0597": { + "cmt_msg": "x86/mm: Randomize per-cpu entry area" }, - "CVE-2019-11486": { - "cmt_msg": "tty: mark Siemens R3964 line discipline as BROKEN" + "CVE-2019-12379": { + "cmt_msg": "consolemap: Fix a memory leaking bug in drivers/tty/vt/consolemap.c" }, - "CVE-2019-11487": { - "cmt_msg": "fs: prevent page refcount overflow in pipe_buf_get" + "CVE-2019-12378": { + "cmt_msg": "ipv6_sockglue: Fix a missing-check bug in ip6_ra_control()" }, - "CVE-2022-28390": { - "cmt_msg": "can: ems_usb: ems_usb_start_xmit(): fix double dev_kfree_skb() in error path" + "CVE-2021-30002": { + "cmt_msg": "media: v4l: ioctl: Fix memory leak in video_usercopy" }, - "CVE-2020-27673": { - "cmt_msg": "xen/events: add a proper barrier to 2-level uevent unmasking" + "CVE-2021-0941": { + "cmt_msg": "bpf: Remove MTU check in __bpf_skb_max_len" }, - "CVE-2020-27675": { - "cmt_msg": "xen/events: avoid removing an event channel while handling it" + "CVE-2015-4176": { + "cmt_msg": "mnt: Update detach_mounts to leave mounts connected" }, - "CVE-2020-28915": { - "cmt_msg": "fbcon: Fix global-out-of-bounds read in fbcon_get_font()" + "CVE-2020-15802": { + "cmt_msg": "" }, - "CVE-2019-20908": { - "cmt_msg": "efi: Restrict efivar_ssdt_load when the kernel is locked down" + "CVE-2024-26594": { + "cmt_msg": "ksmbd: validate mech token in session setup" }, - "CVE-2023-3776": { - "cmt_msg": "net/sched: cls_fw: Fix improper refcount update leads to use-after-free" + "CVE-2023-4623": { + "cmt_msg": "net/sched: sch_hfsc: Ensure inner classes have fsc curve" }, - "CVE-2021-28038": { - "cmt_msg": "Xen/gnttab: handle p2m update errors on a per-slot basis" + "CVE-2022-3636": { + "cmt_msg": "net: ethernet: mtk_eth_soc: use after free in __mtk_ppe_check_skb()" }, - "CVE-2022-23040": { - "cmt_msg": "xen/xenbus: don't let xenbus_grant_ring() remove grants in error case" + "CVE-2022-3635": { + "cmt_msg": "atm: idt77252: fix use-after-free bugs caused by tst_timer" }, - "CVE-2022-3111": { - "cmt_msg": "power: supply: wm8350-power: Add missing free in free_charger_irq" + "CVE-2022-0002": { + "cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE" }, - "CVE-2023-52435": { - "cmt_msg": "net: prevent mss overflow in skb_segment()" + "CVE-2023-52506": { + "cmt_msg": "LoongArch: Set all reserved memblocks on Node#0 at initialization" }, - "CVE-2023-52434": { - "cmt_msg": "smb: client: fix potential OOBs in smb2_parse_contexts()" + "CVE-2015-4178": { + "cmt_msg": "fs_pin: Allow for the possibility that m_list or s_list go unused." }, - "CVE-2023-3161": { - "cmt_msg": "fbcon: Check font dimension limits" + "CVE-2022-40982": { + "cmt_msg": "x86/speculation: Add Gather Data Sampling mitigation" }, - "CVE-2023-52436": { - "cmt_msg": "f2fs: explicitly null-terminate the xattr list" + "CVE-2022-3202": { + "cmt_msg": "jfs: prevent NULL deref in diFree" }, - "CVE-2019-19060": { - "cmt_msg": "iio: imu: adis16400: release allocated memory on failure" + "CVE-2021-47028": { + "cmt_msg": "mt76: mt7915: fix txrate reporting" }, - "CVE-2019-19061": { - "cmt_msg": "iio: imu: adis16400: fix memory leak" + "CVE-2018-3646": { + "cmt_msg": "x86/microcode: Allow late microcode loading with SMT disabled" }, - "CVE-2019-19062": { - "cmt_msg": "crypto: user - fix memory leak in crypto_report" + "CVE-2021-39714": { + "cmt_msg": "staging: android: ion: Drop ion_map_kernel interface" }, - "CVE-2019-19063": { - "cmt_msg": "rtlwifi: prevent memory leak in rtl_usb_probe" + "CVE-2024-24861": { + "cmt_msg": "media: xc4000: Fix atomicity violation in xc4000_get_frequency" }, - "CVE-2019-19065": { - "cmt_msg": "RDMA/hfi1: Prevent memory leak in sdma_init" + "CVE-2021-28711": { + "cmt_msg": "xen/blkfront: harden blkfront against event channel storms" }, - "CVE-2019-19066": { - "cmt_msg": "scsi: bfa: release allocated memory in case of error" + "CVE-2021-46908": { + "cmt_msg": "bpf: Use correct permission flag for mixed signed bounds arithmetic" }, - "CVE-2019-19067": { - "cmt_msg": "drm/amdgpu: fix multiple memory leaks in acp_hw_init" + "CVE-2021-46906": { + "cmt_msg": "HID: usbhid: fix info leak in hid_submit_ctrl" }, - "CVE-2019-19068": { - "cmt_msg": "rtl8xxxu: prevent leaking urb" + "CVE-2018-14614": { + "cmt_msg": "f2fs: fix to do sanity check with cp_pack_start_sum" }, - "CVE-2020-0435": { - "cmt_msg": "f2fs: fix to do sanity check with i_extra_isize" + "CVE-2021-46904": { + "cmt_msg": "net: hso: fix null-ptr-deref during tty device unregistration" }, - "CVE-2020-0432": { - "cmt_msg": "staging: most: net: fix buffer overflow" + "CVE-2018-14616": { + "cmt_msg": "f2fs: fix to do sanity check with block address in main area v2" }, - "CVE-2020-0433": { - "cmt_msg": "blk-mq: sync the update nr_hw_queues with blk_mq_queue_tag_busy_iter" + "CVE-2023-2007": { + "cmt_msg": "scsi: dpt_i2o: Remove obsolete driver" }, - "CVE-2023-51779": { - "cmt_msg": "Bluetooth: af_bluetooth: Fix Use-After-Free in bt_sock_recvmsg" + "CVE-2020-26145": { + "cmt_msg": "ath10k: drop fragments with multicast DA for PCIe" }, - "CVE-2019-3874": { - "cmt_msg": "sctp: implement memory accounting on tx path" + "CVE-2020-26147": { + "cmt_msg": "mac80211: assure all fragments are encrypted" }, - "CVE-2023-6915": { - "cmt_msg": "ida: Fix crash in ida_free when the bitmap is empty" + "CVE-2020-26141": { + "cmt_msg": "ath10k: Fix TKIP Michael MIC verification for PCIe" }, - "CVE-2010-4563": { + "CVE-2020-26140": { "cmt_msg": "" }, - "CVE-2023-1249": { - "cmt_msg": "coredump: Use the vma snapshot in fill_files_note" - }, - "CVE-2020-14331": { - "cmt_msg": "vgacon: Fix for missing check in scrollback handling" - }, - "CVE-2023-45871": { - "cmt_msg": "igb: set max size RX buffer when store bad packet is enabled" - }, - "CVE-2019-14835": { - "cmt_msg": "vhost: make sure log_num < in_num" - }, - "CVE-2023-2248": { - "cmt_msg": "net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg" + "CVE-2020-26143": { + "cmt_msg": "" }, - "CVE-2023-0266": { - "cmt_msg": "ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF" + "CVE-2020-26142": { + "cmt_msg": "" }, - "CVE-2023-1838": { - "cmt_msg": "Fix double fget() in vhost_net_set_backend()" + "CVE-2023-1074": { + "cmt_msg": "sctp: fail if no bound addresses can be used for a given scope" }, - "CVE-2021-3483": { - "cmt_msg": "firewire: nosy: Fix a use-after-free bug in nosy_ioctl()" + "CVE-2023-1077": { + "cmt_msg": "sched/rt: pick_next_rt_entity(): check list_entry" }, - "CVE-2023-6040": { - "cmt_msg": "netfilter: nf_tables: Reject tables of unsupported family" + "CVE-2023-46838": { + "cmt_msg": "xen-netback: don't produce zero-size SKB frags" }, - "CVE-2023-20588": { - "cmt_msg": "x86/CPU/AMD: Do not leak quotient data after a division by 0" + "CVE-2023-51780": { + "cmt_msg": "atm: Fix Use-After-Free in do_vcc_ioctl" }, - "CVE-2021-38300": { - "cmt_msg": "bpf, mips: Validate conditional branch offsets" + "CVE-2023-40283": { + "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb" }, - "CVE-2020-25656": { - "cmt_msg": "vt: keyboard, extend func_buf_lock to readers" + "CVE-2023-1073": { + "cmt_msg": "HID: check empty report_list in hid_validate_values()" }, - "CVE-2021-3759": { - "cmt_msg": "memcg: enable accounting of ipc resources" + "CVE-2024-26745": { + "cmt_msg": "powerpc/pseries/iommu: IOMMU table is not initialized for kdump over SR-IOV" }, - "CVE-2023-1390": { - "cmt_msg": "tipc: fix NULL deref in tipc_link_xmit()" + "CVE-2023-51781": { + "cmt_msg": "appletalk: Fix Use-After-Free in atalk_ioctl" }, - "CVE-2022-24448": { - "cmt_msg": "NFSv4: Handle case where the lookup of a directory fails" + "CVE-2018-13096": { + "cmt_msg": "f2fs: fix to do sanity check with node footer and iblocks" }, - "CVE-2024-26598": { - "cmt_msg": "KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache" + "CVE-2018-13097": { + "cmt_msg": "f2fs: fix to do sanity check with user_block_count" }, - "CVE-2022-23042": { - "cmt_msg": "xen/netfront: react properly to failing gnttab_end_foreign_access_ref()" + "CVE-2018-13095": { + "cmt_msg": "xfs: More robust inode extent count validation" }, - "CVE-2019-10142": { - "cmt_msg": "drivers/virt/fsl_hypervisor.c: prevent integer overflow in ioctl" + "CVE-2020-29661": { + "cmt_msg": "tty: Fix ->pgrp locking in tiocspgrp()" }, - "CVE-2021-4023": { - "cmt_msg": "io-wq: fix cancellation on create-worker failure" + "CVE-2020-29660": { + "cmt_msg": "tty: Fix ->session locking" }, - "CVE-2023-3268": { - "cmt_msg": "relayfs: fix out-of-bounds access in relay_file_read" + "CVE-2018-13098": { + "cmt_msg": "f2fs: fix to do sanity check with extra_attr feature" }, - "CVE-2022-2318": { - "cmt_msg": "net: rose: fix UAF bugs caused by timer handler" + "CVE-2018-13099": { + "cmt_msg": "f2fs: fix to do sanity check with reserved blkaddr of inline inode" }, - "CVE-2021-22555": { - "cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write" + "CVE-2024-26748": { + "cmt_msg": "usb: cdns3: fix memory double free when handle zero packet" }, - "CVE-2020-36694": { - "cmt_msg": "netfilter: x_tables: Switch synchronization to RCU" + "CVE-2014-9717": { + "cmt_msg": "mnt: Update detach_mounts to leave mounts connected" }, - "CVE-2021-0399": { - "cmt_msg": "" + "CVE-2023-28772": { + "cmt_msg": "seq_buf: Fix overflow in seq_buf_putmem_hex()" }, - "CVE-2020-36691": { - "cmt_msg": "netlink: limit recursion depth in policy validation" + "CVE-2019-19074": { + "cmt_msg": "ath9k: release allocated buffer if timed out" }, - "CVE-2023-42755": { - "cmt_msg": "net/sched: Retire rsvp classifier" + "CVE-2019-19073": { + "cmt_msg": "ath9k_htc: release allocated buffer if timed out" }, - "CVE-2020-2732": { - "cmt_msg": "KVM: nVMX: Don't emulate instructions in guest mode" + "CVE-2022-2503": { + "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag" }, - "CVE-2012-4542": { + "CVE-2019-18680": { "cmt_msg": "" }, - "CVE-2022-1729": { - "cmt_msg": "perf: Fix sys_perf_event_open() race against self" - }, - "CVE-2023-42752": { - "cmt_msg": "igmp: limit igmpv3_newpack() packet size to IP_MAX_MTU" + "CVE-2024-26699": { + "cmt_msg": "drm/amd/display: Fix array-index-out-of-bounds in dcn35_clkmgr" }, - "CVE-2023-4128": { - "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free" + "CVE-2022-23038": { + "cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()" }, - "CVE-2021-3573": { - "cmt_msg": "Bluetooth: use correct lock to prevent UAF of hdev object" + "CVE-2022-23039": { + "cmt_msg": "xen/gntalloc: don't use gnttab_query_foreign_access()" }, - "CVE-2023-3609": { - "cmt_msg": "net/sched: cls_u32: Fix reference counter leak leading to overflow" + "CVE-2024-26691": { + "cmt_msg": "KVM: arm64: Fix circular locking dependency" }, - "CVE-2022-1974": { - "cmt_msg": "nfc: replace improper check device_is_registered() in netlink related functions" + "CVE-2021-45868": { + "cmt_msg": "quota: check block number when reading the block in quota file" }, - "CVE-2022-1975": { - "cmt_msg": "NFC: netlink: fix sleep in atomic bug when firmware download timeout" + "CVE-2022-20158": { + "cmt_msg": "net/packet: fix slab-out-of-bounds access in packet_recvmsg()" }, - "CVE-2022-44032": { - "cmt_msg": "char: pcmcia: remove all the drivers" + "CVE-2022-23037": { + "cmt_msg": "xen/netfront: don't use gnttab_query_foreign_access() for mapped status" }, - "CVE-2021-28972": { - "cmt_msg": "PCI: rpadlpar: Fix potential drc_name corruption in store functions" + "CVE-2024-26697": { + "cmt_msg": "nilfs2: fix data corruption in dsync block recovery for small block sizes" }, - "CVE-2018-12130": { - "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" + "CVE-2024-26696": { + "cmt_msg": "nilfs2: fix hang in nilfs_lookup_dirty_data_buffers()" }, - "CVE-2021-20292": { - "cmt_msg": "drm/ttm/nouveau: don't call tt destroy callback on alloc failure." + "CVE-2023-2176": { + "cmt_msg": "RDMA/core: Refactor rdma_bind_addr" }, - "CVE-2021-31916": { - "cmt_msg": "dm ioctl: fix out of bounds array access when no devices" + "CVE-2021-38160": { + "cmt_msg": "virtio_console: Assure used length from device is limited" }, - "CVE-2018-17182": { - "cmt_msg": "mm: get rid of vmacache_flush_all() entirely" + "CVE-2021-42008": { + "cmt_msg": "net: 6pack: fix slab-out-of-bounds in decode_data" }, - "CVE-2022-32981": { - "cmt_msg": "powerpc/32: Fix overread/overwrite of thread_struct via ptrace" + "CVE-2022-44033": { + "cmt_msg": "char: pcmcia: remove all the drivers" }, - "CVE-2020-25645": { - "cmt_msg": "geneve: add transport ports in route lookup for geneve" + "CVE-2022-39188": { + "cmt_msg": "mmu_gather: Force tlb-flush VM_PFNMAP vmas" }, - "CVE-2022-1280": { - "cmt_msg": "drm: avoid circular locks in drm_mode_getconnector" + "CVE-2020-25643": { + "cmt_msg": "hdlc_ppp: add range checks in ppp_cp_parse_cr()" }, - "CVE-2023-3772": { - "cmt_msg": "xfrm: add NULL check in xfrm_update_ae_params" + "CVE-2005-3660": { + "cmt_msg": "" }, - "CVE-2020-11668": { - "cmt_msg": "media: xirlink_cit: add missing descriptor sanity checks" + "CVE-2023-31085": { + "cmt_msg": "ubi: Refuse attaching if mtd's erasesize is 0" }, - "CVE-2020-11669": { - "cmt_msg": "powerpc/powernv/idle: Restore AMR/UAMOR/AMOR after idle" + "CVE-2023-31084": { + "cmt_msg": "media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*()" }, - "CVE-2019-15118": { - "cmt_msg": "ALSA: usb-audio: Fix a stack buffer overflow bug in check_input_term" + "CVE-2023-31083": { + "cmt_msg": "Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO" }, - "CVE-2019-12818": { - "cmt_msg": "net: nfc: Fix NULL dereference on nfc_llcp_build_tlv fails" + "CVE-2023-31082": { + "cmt_msg": "" }, - "CVE-2019-12819": { - "cmt_msg": "mdio_bus: Fix use-after-free on device_register fails" + "CVE-2023-31081": { + "cmt_msg": "" }, - "CVE-2023-0394": { - "cmt_msg": "ipv6: raw: Deduct extension header length in rawv6_push_pending_frames" + "CVE-2023-52574": { + "cmt_msg": "team: fix null-ptr-deref when team device type is changed" }, - "CVE-2020-10690": { - "cmt_msg": "ptp: fix the race between the release of ptp_clock and cdev" + "CVE-2021-33034": { + "cmt_msg": "Bluetooth: verify AMP hci_chan before amp_destroy" }, - "CVE-2019-12817": { - "cmt_msg": "powerpc/mm/64s/hash: Reallocate context ids on fork" + "CVE-2019-19922": { + "cmt_msg": "sched/fair: Fix low cpu usage with high throttling by removing expiration of cpu-local slices" }, - "CVE-2022-3108": { - "cmt_msg": "drm/amdkfd: Check for null pointer after calling kmemdup" + "CVE-2019-19927": { + "cmt_msg": "drm/ttm: fix incrementing the page pointer for huge pages" }, - "CVE-2019-19332": { - "cmt_msg": "KVM: x86: fix out-of-bounds write in KVM_GET_EMULATED_CPUID (CVE-2019-19332)" + "CVE-2020-27066": { + "cmt_msg": "xfrm: policy: Fix doulbe free in xfrm_policy_timer" }, - "CVE-2019-15117": { - "cmt_msg": "ALSA: usb-audio: Fix an OOB bug in parse_audio_mixer_unit" + "CVE-2020-27068": { + "cmt_msg": "cfg80211: add missing policy for NL80211_ATTR_STATUS_CODE" }, - "CVE-2021-3659": { - "cmt_msg": "net: mac802154: Fix general protection fault" + "CVE-2022-32296": { + "cmt_msg": "tcp: increase source port perturb table to 2^16" }, - "CVE-2022-25258": { - "cmt_msg": "USB: gadget: validate interface OS descriptor requests" + "CVE-2020-28974": { + "cmt_msg": "vt: Disable KD_FONT_OP_COPY" }, - "CVE-2021-4155": { - "cmt_msg": "xfs: map unwritten blocks in XFS_IOC_{ALLOC,FREE}SP just like fallocate" + "CVE-2023-3567": { + "cmt_msg": "vc_screen: move load of struct vc_data pointer in vcs_read() to avoid UAF" }, - "CVE-2019-14901": { - "cmt_msg": "mwifiex: Fix heap overflow in mmwifiex_process_tdls_action_frame()" + "CVE-2019-20806": { + "cmt_msg": "media: tw5864: Fix possible NULL pointer dereference in tw5864_handle_frame" }, - "CVE-2021-4150": { - "cmt_msg": "block: fix incorrect references to disk objects" + "CVE-2022-3028": { + "cmt_msg": "af_key: Do not call xfrm_probe_algs in parallel" }, - "CVE-2020-3702": { - "cmt_msg": "ath: Use safer key clearing with key cache entries" + "CVE-2020-14304": { + "cmt_msg": "" }, - "CVE-2021-3653": { - "cmt_msg": "KVM: nSVM: avoid picking up unsupported bits from L2 in int_ctl (CVE-2021-3653)" + "CVE-2020-14305": { + "cmt_msg": "netfilter: helpers: remove data_len usage for inkernel helpers" }, - "CVE-2021-3655": { - "cmt_msg": "sctp: validate from_addr_param return" + "CVE-2020-15393": { + "cmt_msg": "usb: usbtest: fix missing kfree(dev->buf) in usbtest_disconnect" }, - "CVE-2020-8694": { - "cmt_msg": "powercap: restrict energy meter to root access" + "CVE-2022-33981": { + "cmt_msg": "floppy: disable FDRAWCMD by default" }, - "CVE-2021-4159": { - "cmt_msg": "bpf: Verifer, adjust_scalar_min_max_vals to always call update_reg_bounds()" + "CVE-2021-3564": { + "cmt_msg": "Bluetooth: fix the erroneous flush_work() order" }, - "CVE-2023-0461": { - "cmt_msg": "net/ulp: prevent ULP without clone op from entering the LISTEN status" + "CVE-2023-3611": { + "cmt_msg": "net/sched: sch_qfq: account for stab overhead in qfq_enqueue" }, - "CVE-2019-12614": { - "cmt_msg": "powerpc/pseries/dlpar: Fix a missing check in dlpar_parse_cc_property()" + "CVE-2017-16995": { + "cmt_msg": "bpf: fix incorrect sign extension in check_alu_op()" }, - "CVE-2019-12615": { - "cmt_msg": "mdesc: fix a missing-check bug in get_vdev_port_node_info()" + "CVE-2019-2025": { + "cmt_msg": "binder: fix race that allows malicious free of live buffer" }, - "CVE-2021-3715": { - "cmt_msg": "net_sched: cls_route: remove the right filter from hashtable" + "CVE-2024-26625": { + "cmt_msg": "llc: call sock_orphan() at release time" }, - "CVE-2021-3714": { + "CVE-2020-26560": { "cmt_msg": "" }, - "CVE-2019-16230": { - "cmt_msg": "drm/amdkfd: fix a potential NULL pointer dereference (v2)" + "CVE-2023-4134": { + "cmt_msg": "Input: cyttsp4_core - change del_timer_sync() to timer_shutdown_sync()" }, - "CVE-2019-16231": { - "cmt_msg": "fjes: Handle workqueue allocation failure" + "CVE-2023-39198": { + "cmt_msg": "drm/qxl: fix UAF on handle creation" }, - "CVE-2019-16232": { - "cmt_msg": "libertas: fix a potential NULL pointer dereference" + "CVE-2023-42752": { + "cmt_msg": "igmp: limit igmpv3_newpack() packet size to IP_MAX_MTU" }, - "CVE-2019-16233": { - "cmt_msg": "scsi: qla2xxx: fix a potential NULL pointer dereference" + "CVE-2018-12127": { + "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" }, - "CVE-2019-16234": { - "cmt_msg": "iwlwifi: pcie: fix rb_allocator workqueue allocation" + "CVE-2018-12126": { + "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" }, - "CVE-2023-52445": { - "cmt_msg": "media: pvrusb2: fix use after free on context disconnection" + "CVE-2022-1048": { + "cmt_msg": "ALSA: pcm: Fix races among concurrent hw_params and hw_free calls" }, - "CVE-2019-6133": { - "cmt_msg": "fork: record start_time late" + "CVE-2023-37454": { + "cmt_msg": "" }, - "CVE-2019-3016": { - "cmt_msg": "x86/kvm: Be careful not to clear KVM_VCPU_FLUSH_TLB bit" + "CVE-2023-35824": { + "cmt_msg": "media: dm1105: Fix use after free bug in dm1105_remove due to race condition" }, - "CVE-2021-39633": { - "cmt_msg": "ip_gre: add validation for csum_start" + "CVE-2022-20572": { + "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag" }, - "CVE-2022-27223": { - "cmt_msg": "USB: gadget: validate endpoint index for xilinx udc" + "CVE-2023-39197": { + "cmt_msg": "netfilter: conntrack: dccp: copy entire header to stack buffer, not just basic one" }, - "CVE-2021-39634": { - "cmt_msg": "epoll: do not insert into poll queues until all sanity checks are done" + "CVE-2023-52489": { + "cmt_msg": "mm/sparsemem: fix race in accessing memory_section->usage" }, - "CVE-2024-23851": { - "cmt_msg": "dm: limit the number of targets and parameter size area" + "CVE-2021-28964": { + "cmt_msg": "btrfs: fix race when cloning extent buffer during rewind of an old root" }, - "CVE-2019-3882": { - "cmt_msg": "vfio/type1: Limit DMA mappings per container" + "CVE-2023-52584": { + "cmt_msg": "spmi: mediatek: Fix UAF on device remove" }, - "CVE-2022-33742": { - "cmt_msg": "xen/blkfront: force data bouncing when backend is untrusted" + "CVE-2020-13974": { + "cmt_msg": "vt: keyboard: avoid signed integer overflow in k_ascii" }, - "CVE-2022-33741": { - "cmt_msg": "xen/netfront: force data bouncing when backend is untrusted" + "CVE-2021-4083": { + "cmt_msg": "fget: check that the fd still exists after getting a ref to it" }, - "CVE-2022-33740": { - "cmt_msg": "xen/netfront: fix leaking data in shared pages" + "CVE-2023-33288": { + "cmt_msg": "power: supply: bq24190: Fix use after free bug in bq24190_remove due to race condition" }, - "CVE-2024-24864": { - "cmt_msg": "" + "CVE-2023-52484": { + "cmt_msg": "iommu/arm-smmu-v3: Fix soft lockup triggered by arm_smmu_mm_invalidate_range" }, - "CVE-2019-3887": { - "cmt_msg": "KVM: x86: nVMX: close leak of L0's x2APIC MSRs (CVE-2019-3887)" + "CVE-2022-29900": { + "cmt_msg": "x86/kvm/vmx: Make noinstr clean" }, - "CVE-2022-33744": { - "cmt_msg": "xen/arm: Fix race in RB-tree based P2M accounting" + "CVE-2022-29901": { + "cmt_msg": "x86/kvm/vmx: Make noinstr clean" }, - "CVE-2022-40768": { - "cmt_msg": "scsi: stex: Properly zero out the passthrough command structure" + "CVE-2023-3108": { + "cmt_msg": "crypto: fix af_alg_make_sg() conversion to iov_iter" }, - "CVE-2021-45486": { - "cmt_msg": "inet: use bigger hash table for IP ID generation" + "CVE-2023-3161": { + "cmt_msg": "fbcon: Check font dimension limits" }, - "CVE-2020-12888": { - "cmt_msg": "vfio-pci: Invalidate mmaps and block MMIO access on disabled memory" + "CVE-2022-3567": { + "cmt_msg": "ipv6: Fix data races around sk->sk_prot." }, - "CVE-2023-2194": { - "cmt_msg": "i2c: xgene-slimpro: Fix out-of-bounds bug in xgene_slimpro_i2c_xfer()" + "CVE-2018-9465": { + "cmt_msg": "binder: fix proc->files use-after-free" }, - "CVE-2021-3923": { - "cmt_msg": "RDMA/core: Don't infoleak GRH fields" + "CVE-2020-15437": { + "cmt_msg": "serial: 8250: fix null-ptr-deref in serial8250_start_tx()" }, - "CVE-2022-41218": { - "cmt_msg": "media: dvb-core: Fix UAF due to refcount races at releasing" + "CVE-2020-15436": { + "cmt_msg": "block: Fix use-after-free in blkdev_get()" }, - "CVE-2011-4917": { + "CVE-2022-1116": { "cmt_msg": "" }, - "CVE-2022-36946": { - "cmt_msg": "netfilter: nf_queue: do not allow packet truncation below transport header offset" - }, - "CVE-2022-0812": { - "cmt_msg": "xprtrdma: fix incorrect header size calculations" - }, - "CVE-2021-45485": { - "cmt_msg": "ipv6: use prandom_u32() for ID generation" - }, - "CVE-2021-0448": { - "cmt_msg": "netfilter: ctnetlink: add a range check for l3/l4 protonum" - }, - "CVE-2018-19824": { - "cmt_msg": "ALSA: usb-audio: Fix UAF decrement if card has no live interfaces in card.c" + "CVE-2021-28660": { + "cmt_msg": "staging: rtl8188eu: prevent ->ssid overflow in rtw_wx_set_scan()" }, - "CVE-2022-21166": { - "cmt_msg": "x86/speculation/mmio: Enable CPU Fill buffer clearing on idle" + "CVE-2016-9178": { + "cmt_msg": "fix minor infoleak in get_user_ex()" }, - "CVE-2020-29374": { - "cmt_msg": "gup: document and work around \"COW can break either way\" issue" + "CVE-2022-3564": { + "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free caused by l2cap_reassemble_sdu" }, - "CVE-2019-25045": { - "cmt_msg": "xfrm: clean up xfrm protocol checks" + "CVE-2022-23816": { + "cmt_msg": "x86/kvm/vmx: Make noinstr clean" }, - "CVE-2018-16862": { - "cmt_msg": "mm: cleancache: fix corruption on missed inode invalidation" + "CVE-2019-0154": { + "cmt_msg": "drm/i915: Lower RM timeout to avoid DSI hard hangs" }, - "CVE-2023-52449": { - "cmt_msg": "mtd: Fix gluebi NULL pointer dereference caused by ftl notifier" + "CVE-2023-52481": { + "cmt_msg": "arm64: errata: Add Cortex-A520 speculative unprivileged load workaround" }, - "CVE-2021-29650": { - "cmt_msg": "netfilter: x_tables: Use correct memory barriers." + "CVE-2023-52585": { + "cmt_msg": "drm/amdgpu: Fix possible NULL dereference in amdgpu_ras_query_error_status_helper()" }, - "CVE-2019-17133": { - "cmt_msg": "cfg80211: wext: avoid copying malformed SSIDs" + "CVE-2021-47145": { + "cmt_msg": "btrfs: do not BUG_ON in link_to_fixup_dir" }, - "CVE-2018-20169": { - "cmt_msg": "USB: check usb_get_extra_descriptor for proper size" + "CVE-2023-52587": { + "cmt_msg": "IB/ipoib: Fix mcast list locking" }, - "CVE-2019-8956": { - "cmt_msg": "sctp: walk the list of asoc safely" + "CVE-2023-52586": { + "cmt_msg": "drm/msm/dpu: Add mutex lock in control vblank irq" }, - "CVE-2020-36558": { - "cmt_msg": "vt: vt_ioctl: fix race in VT_RESIZEX" + "CVE-2021-47149": { + "cmt_msg": "net: fujitsu: fix potential null-ptr-deref" }, - "CVE-2022-41849": { - "cmt_msg": "fbdev: smscufx: Fix use-after-free in ufx_ops_open()" + "CVE-2022-3566": { + "cmt_msg": "tcp: Fix data races around icsk->icsk_af_ops." }, - "CVE-2022-41848": { - "cmt_msg": "" + "CVE-2022-3565": { + "cmt_msg": "mISDN: fix use-after-free bugs in l1oip timer handlers" }, - "CVE-2020-36312": { - "cmt_msg": "KVM: fix memory leak in kvm_io_bus_unregister_dev()" + "CVE-2021-47065": { + "cmt_msg": "rtw88: Fix array overrun in rtw_get_tx_power_params()" }, - "CVE-2022-1353": { - "cmt_msg": "af_key: add __GFP_ZERO flag for compose_sadb_supported in function pfkey_register" + "CVE-2020-36386": { + "cmt_msg": "Bluetooth: Fix slab-out-of-bounds read in hci_extended_inquiry_result_evt()" }, - "CVE-2022-28356": { - "cmt_msg": "llc: fix netdevice reference leaks in llc_ui_bind()" + "CVE-2021-47144": { + "cmt_msg": "drm/amd/amdgpu: fix refcount leak" }, - "CVE-2020-16119": { - "cmt_msg": "dccp: don't duplicate ccid when cloning dccp sock" + "CVE-2021-47147": { + "cmt_msg": "ptp: ocp: Fix a resource leak in an error handling path" }, - "CVE-2022-1198": { - "cmt_msg": "drivers: hamradio: 6pack: fix UAF bug caused by mod_timer()" + "CVE-2020-36385": { + "cmt_msg": "RDMA/ucma: Rework ucma_migrate_id() to avoid races with destroy" }, - "CVE-2022-1199": { - "cmt_msg": "ax25: Fix NULL pointer dereference in ax25_kill_by_device" + "CVE-2022-3628": { + "cmt_msg": "wifi: brcmfmac: Fix potential buffer overflow in brcmf_fweh_event_worker()" }, - "CVE-2023-6546": { - "cmt_msg": "tty: n_gsm: fix the UAF caused by race condition in gsm_cleanup_mux" + "CVE-2021-47140": { + "cmt_msg": "iommu/amd: Clear DMA ops when switching domain" }, - "CVE-2021-39801": { - "cmt_msg": "" + "CVE-2021-47143": { + "cmt_msg": "net/smc: remove device from smcd_dev_list after failed device_add()" }, - "CVE-2021-39800": { - "cmt_msg": "" + "CVE-2021-47142": { + "cmt_msg": "drm/amdgpu: Fix a use-after-free" }, - "CVE-2018-16884": { - "cmt_msg": "sunrpc: use-after-free in svc_process_common()" + "CVE-2021-47146": { + "cmt_msg": "mld: fix panic in mld_newpack()" }, - "CVE-2018-16882": { - "cmt_msg": "KVM: Fix UAF in nested posted interrupt processing" + "CVE-2023-52340": { + "cmt_msg": "ipv6: remove max_size check inline with ipv4" }, - "CVE-2022-1195": { - "cmt_msg": "hamradio: improve the incomplete fix to avoid NPD" + "CVE-2023-52589": { + "cmt_msg": "media: rkisp1: Fix IRQ disable race issue" }, - "CVE-2018-16880": { - "cmt_msg": "vhost: fix OOB in get_rx_bufs()" + "CVE-2018-7480": { + "cmt_msg": "blkcg: fix double free of new_blkg in blkcg_init_queue" }, - "CVE-2021-4202": { - "cmt_msg": "NFC: reorganize the functions in nci_request" + "CVE-2023-52588": { + "cmt_msg": "f2fs: fix to tag gcing flag on page during block migration" }, - "CVE-2021-4203": { - "cmt_msg": "af_unix: fix races in sk_peer_pid and sk_peer_cred accesses" + "CVE-2019-14615": { + "cmt_msg": "drm/i915/gen9: Clear residual context state on context switch" }, - "CVE-2022-4269": { - "cmt_msg": "act_mirred: use the backlog for nested calls to mirred ingress" + "CVE-2023-52578": { + "cmt_msg": "net: bridge: use DEV_STATS_INC()" }, - "CVE-2022-45886": { - "cmt_msg": "media: dvb-core: Fix use-after-free due on race condition at dvb_net" + "CVE-2016-3139": { + "cmt_msg": "Input: wacom - compute the HID report size to get the actual packet size" }, - "CVE-2023-46343": { - "cmt_msg": "nfc: nci: fix possible NULL pointer dereference in send_acknowledge()" + "CVE-2023-0030": { + "cmt_msg": "drm/nouveau/mmu: add more general vmm free/node handling functions" }, - "CVE-2024-25744": { - "cmt_msg": "x86/coco: Disable 32-bit emulation by default on TDX and SEV" + "CVE-2020-16120": { + "cmt_msg": "ovl: switch to mounter creds in readdir" }, - "CVE-2023-5178": { - "cmt_msg": "nvmet-tcp: Fix a possible UAF in queue intialization setup" + "CVE-2024-0775": { + "cmt_msg": "ext4: improve error recovery code paths in __ext4_remount()" }, - "CVE-2023-2124": { - "cmt_msg": "xfs: verify buffer contents when we skip log replay" + "CVE-2022-1204": { + "cmt_msg": "ax25: Fix refcount leaks caused by ax25_cb_del()" }, - "CVE-2024-26594": { - "cmt_msg": "ksmbd: validate mech token in session setup" + "CVE-2023-1611": { + "cmt_msg": "btrfs: fix race between quota disable and quota assign ioctls" }, - "CVE-2023-1281": { - "cmt_msg": "net/sched: tcindex: update imperfect hash filters respecting rcu" + "CVE-2016-10723": { + "cmt_msg": "mm, oom: remove sleep from under oom_lock" }, - "CVE-2023-2860": { - "cmt_msg": "ipv6: sr: fix out-of-bounds read when setting HMAC data." + "CVE-2019-19036": { + "cmt_msg": "btrfs: Detect unbalanced tree with empty leaf before crashing btree operations" }, - "CVE-2021-44879": { - "cmt_msg": "f2fs: fix to do sanity check on inode type during garbage collection" + "CVE-2021-34693": { + "cmt_msg": "can: bcm: fix infoleak in struct bcm_msg_head" }, - "CVE-2019-15505": { - "cmt_msg": "media: technisat-usb2: break out of loop at end of buffer" + "CVE-2023-22995": { + "cmt_msg": "usb: dwc3: dwc3-qcom: Add missing platform_device_put() in dwc3_qcom_acpi_register_core" }, - "CVE-2019-15504": { - "cmt_msg": "rsi: fix a double free bug in rsi_91x_deinit()" + "CVE-2019-19039": { + "cmt_msg": "btrfs: Don't submit any btree write bio if the fs has errors" }, - "CVE-2023-2513": { - "cmt_msg": "ext4: fix use-after-free in ext4_xattr_set_entry" + "CVE-2022-1974": { + "cmt_msg": "nfc: replace improper check device_is_registered() in netlink related functions" }, - "CVE-2023-1855": { - "cmt_msg": "hwmon: (xgene) Fix use after free bug in xgene_hwmon_remove due to race condition" + "CVE-2020-8832": { + "cmt_msg": "drm/i915: Record the default hw state after reset upon load" }, - "CVE-2022-27672": { - "cmt_msg": "x86/speculation: Identify processors vulnerable to SMT RSB predictions" + "CVE-2024-26797": { + "cmt_msg": "drm/amd/display: Prevent potential buffer overflow in map_hw_resources" }, - "CVE-2022-2964": { - "cmt_msg": "net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup" + "CVE-2022-1836": { + "cmt_msg": "floppy: disable FDRAWCMD by default" }, - "CVE-2015-2877": { - "cmt_msg": "" + "CVE-2024-26793": { + "cmt_msg": "gtp: fix use-after-free and null-ptr-deref in gtp_newlink()" }, - "CVE-2020-9383": { - "cmt_msg": "floppy: check FDC index for errors before assigning it" + "CVE-2021-32078": { + "cmt_msg": "ARM: footbridge: remove personal server platform" }, - "CVE-2019-16089": { - "cmt_msg": "" + "CVE-2023-52532": { + "cmt_msg": "net: mana: Fix TX CQE error handling" }, - "CVE-2023-1206": { - "cmt_msg": "tcp: Reduce chance of collisions in inet6_hashfn()." + "CVE-2024-26798": { + "cmt_msg": "fbcon: always restore the old font data in fbcon_do_set_font()" }, - "CVE-2021-38198": { - "cmt_msg": "KVM: X86: MMU: Use the correct inherited permissions to get shadow page" + "CVE-2017-16528": { + "cmt_msg": "ALSA: seq: Cancel pending autoload work at unbinding device" }, - "CVE-2021-38199": { - "cmt_msg": "NFSv4: Initialise connection to the server in nfs4_alloc_client()" + "CVE-2022-4662": { + "cmt_msg": "USB: core: Prevent nested device-reset calls" }, - "CVE-2022-1679": { - "cmt_msg": "ath9k: fix use-after-free in ath9k_hif_usb_rx_cb" + "CVE-2021-38204": { + "cmt_msg": "usb: max-3421: Prevent corruption of freed memory" }, - "CVE-2023-34256": { - "cmt_msg": "ext4: avoid a potential slab-out-of-bounds in ext4_group_desc_csum" + "CVE-2021-38205": { + "cmt_msg": "net: xilinx_emaclite: Do not print real IOMEM pointer" }, - "CVE-2023-1513": { - "cmt_msg": "kvm: initialize all of the kvm_debugregs structure before sending it to userspace" + "CVE-2021-3864": { + "cmt_msg": "" }, - "CVE-2021-26401": { - "cmt_msg": "x86/speculation: Use generic retpoline by default on AMD" + "CVE-2023-39189": { + "cmt_msg": "netfilter: nfnetlink_osf: avoid OOB read" }, - "CVE-2020-28941": { - "cmt_msg": "speakup: Do not let the line discipline be used several times" + "CVE-2023-35001": { + "cmt_msg": "netfilter: nf_tables: prevent OOB access in nft_byteorder_eval" }, - "CVE-2019-9445": { - "cmt_msg": "f2fs: check if file namelen exceeds max value" + "CVE-2021-38208": { + "cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect" }, - "CVE-2023-52442": { - "cmt_msg": "ksmbd: validate session id and tree id in compound request" + "CVE-2017-18232": { + "cmt_msg": "scsi: libsas: direct call probe and destruct" }, - "CVE-2021-3600": { - "cmt_msg": "bpf: Fix 32 bit src register truncation on div/mod" + "CVE-2019-2213": { + "cmt_msg": "binder: fix possible UAF when freeing buffer" }, - "CVE-2020-36557": { - "cmt_msg": "vt: vt_ioctl: fix VT_DISALLOCATE freeing in-use virtual console" + "CVE-2024-26677": { + "cmt_msg": "rxrpc: Fix delayed ACKs to not set the reference serial number" }, - "CVE-2021-3506": { - "cmt_msg": "f2fs: fix to avoid out-of-bounds memory access" + "CVE-2020-25211": { + "cmt_msg": "netfilter: ctnetlink: add a range check for l3/l4 protonum" }, - "CVE-2019-20934": { - "cmt_msg": "sched/fair: Don't free p->numa_faults with concurrent readers" + "CVE-2020-25212": { + "cmt_msg": "nfs: Fix getxattr kernel panic and memory overflow" }, - "CVE-2011-4916": { + "CVE-2020-26556": { "cmt_msg": "" }, - "CVE-2020-11565": { - "cmt_msg": "mm: mempolicy: require at least one nodeid for MPOL_PREFERRED" - }, - "CVE-2019-3900": { - "cmt_msg": "vhost_net: fix possible infinite loop" - }, - "CVE-2021-23133": { - "cmt_msg": "net/sctp: fix race condition in sctp_destroy_sock" - }, - "CVE-2018-13100": { - "cmt_msg": "f2fs: fix to do sanity check with secs_per_zone" - }, - "CVE-2019-15807": { - "cmt_msg": "scsi: libsas: delete sas port if expander discover failed" + "CVE-2020-26557": { + "cmt_msg": "" }, - "CVE-2019-10638": { - "cmt_msg": "inet: switch IP ID generator to siphash" + "CVE-2024-26671": { + "cmt_msg": "blk-mq: fix IO hang from sbitmap wakeup race" }, - "CVE-2023-31083": { - "cmt_msg": "Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO" + "CVE-2020-26555": { + "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical" }, - "CVE-2019-5489": { - "cmt_msg": "Change mincore() to count \"mapped\" pages rather than \"cached\" pages" + "CVE-2024-26776": { + "cmt_msg": "spi: hisi-sfc-v3xx: Return IRQ_NONE if no interrupts were detected" }, - "CVE-2024-1312": { - "cmt_msg": "mm: lock_vma_under_rcu() must check vma->anon_vma under vma lock" + "CVE-2024-26777": { + "cmt_msg": "fbdev: sis: Error out if pixclock equals zero" }, - "CVE-2019-14284": { - "cmt_msg": "floppy: fix div-by-zero in setup_format_params" + "CVE-2019-20794": { + "cmt_msg": "" }, - "CVE-2019-14283": { - "cmt_msg": "floppy: fix out-of-bounds read in copy_buffer" + "CVE-2020-26559": { + "cmt_msg": "" }, - "CVE-2023-3338": { - "cmt_msg": "Remove DECnet support from kernel" + "CVE-2023-3397": { + "cmt_msg": "" }, - "CVE-2023-1637": { - "cmt_msg": "x86/speculation: Restore speculation related MSRs during S3 resume" - } - } - }, - "4.16": { - "4.16": { - "CVE-2018-1000199": { - "cmt_msg": "perf/hwbp: Simplify the perf-hwbp code, fix documentation", - "cmt_id": "f67b15037a7a50c57f72e69a6d59941ad90a0f0f" - } - }, - "4.16-rc1": { - "CVE-2019-19083": { - "cmt_msg": "drm/amd/display: memory leak", - "cmt_id": "9ea29a1f8b9da52d8eca8b0996f1d84eac548d3b" - } - }, - "4.16.1": { - "CVE-2017-17975": { - "cmt_msg": "media: usbtv: prevent double free in error case", - "cmt_id": "8b862cf0bfd4357408500d3254dd1e0119d57059" - } - }, - "4.16.3": { - "CVE-2020-35513": { - "cmt_msg": "nfsd: fix incorrect umasks", - "cmt_id": "35ed0996e1f726c4638b3609898313f5f4013ef8" - } - }, - "4.16.4": { - "CVE-2019-14763": { - "cmt_msg": "usb: dwc3: gadget: never call ->complete() from ->ep_queue()", - "cmt_id": "c3d0f44576923b0106197adf269e6ac377c20df3" + "CVE-2020-36775": { + "cmt_msg": "f2fs: fix to avoid potential deadlock" }, - "CVE-2018-1094": { - "cmt_msg": "ext4: always initialize the crc32c checksum driver", - "cmt_id": "114c42aaa63152d31d3c18d5b750de9560f38a63" + "CVE-2024-26770": { + "cmt_msg": "HID: nvidia-shield: Add missing null pointer checks to LED initialization" }, - "CVE-2018-1095": { - "cmt_msg": "ext4: limit xattr size to INT_MAX", - "cmt_id": "d97c42e8f9bc9054101d04d715ff322379bfa1c9" + "CVE-2024-26771": { + "cmt_msg": "dmaengine: ti: edma: Add some null pointer checks to the edma_probe" }, - "CVE-2018-1108": { - "cmt_msg": "random: fix crng_ready() test", - "cmt_id": "cd8d7a5778a4abf76ee8fe8f1bfcf78976029f8d" + "CVE-2018-1128": { + "cmt_msg": "libceph: add authorizer challenge" }, - "CVE-2018-1092": { - "cmt_msg": "ext4: fail ext4_iget for root directory if unallocated", - "cmt_id": "510c85c3f0bcfa6111e866b8f3c1a5a58d42da58" + "CVE-2018-1129": { + "cmt_msg": "libceph: implement CEPHX_V2 calculation mode" }, - "CVE-2018-20961": { - "cmt_msg": "USB: gadget: f_midi: fixing a possible double-free in f_midi", - "cmt_id": "786513e10cac3cd45b82668fe50d2e9f033c667b" - } - }, - "4.16.6": { - "CVE-2018-10940": { - "cmt_msg": "cdrom: information leak in cdrom_ioctl_media_changed()", - "cmt_id": "9ee2c2beb5ba8f96ca8af41b7da2e3d756026842" - } - }, - "4.16.7": { - "CVE-2018-9415": { - "cmt_msg": "ARM: amba: Fix race condition with driver_override", - "cmt_id": "9c1c4f09f70d7f543f7495e1f047b23a561f00de" + "CVE-2021-47128": { + "cmt_msg": "bpf, lockdown, audit: Fix buggy SELinux lockdown permission checks" }, - "CVE-2018-9385": { - "cmt_msg": "ARM: amba: Don't read past the end of sysfs \"driver_override\" buffer", - "cmt_id": "064edf1191f5e0255ba3f030400b07abf2a6fe99" + "CVE-2022-26365": { + "cmt_msg": "xen/blkfront: fix leaking data in shared pages" }, - "CVE-2018-1093": { - "cmt_msg": "ext4: add validity checks for bitmap block numbers", - "cmt_id": "169c851575ece8ae4be7a36ee30caa01a43a1b0f" - } - }, - "4.16.9": { - "CVE-2018-1000200": { - "cmt_msg": "mm, oom: fix concurrent munlock and oom reaper unmap, v3", - "cmt_id": "092d4bd6bdf55899d238737d6870adef6f225211" + "CVE-2023-52458": { + "cmt_msg": "block: add check that partition length needs to be aligned with block size" }, - "CVE-2018-11508": { - "cmt_msg": "compat: fix 4-byte infoleak via uninitialized struct field", - "cmt_id": "1c2117b6ee880d70dbed1845e187225303317928" - } - }, - "4.16.10": { "CVE-2018-1120": { - "cmt_msg": "proc: do not access cmdline nor environ from file-backed areas", - "cmt_id": "b7458b534b56b9b4d9297ba7a6708aa8071ac8ba" - } - }, - "4.16.11": { - "CVE-2018-5814": { - "cmt_msg": "usbip: usbip_host: fix NULL-ptr deref and use-after-free errors", - "cmt_id": "8fa17d2b620c615a5a1723184e968275dc26a896" + "cmt_msg": "proc: do not access cmdline nor environ from file-backed areas" }, - "CVE-2018-3639": { - "cmt_msg": "x86/nospec: Simplify alternative_msr_write()", - "cmt_id": "2cd883a4cc87871db17dbc52398a58321af209b1" - } - }, - "4.16.12": { - "CVE-2018-1000204": { - "cmt_msg": "scsi: sg: allocate with __GFP_ZERO in sg_build_indirect()", - "cmt_id": "39169410574503c6e901de1aa6eac5108475e017" - } - }, - "4.16.13": { - "CVE-2018-11506": { - "cmt_msg": "sr: pass down correctly sized SCSI sense buffer", - "cmt_id": "98d02fd4618c48d75589820e8fc39e60c3d3728e" + "CVE-2018-1121": { + "cmt_msg": "" }, - "CVE-2017-13695": { - "cmt_msg": "ACPICA: acpi: acpica: fix acpi operand cache leak in nseval.c", - "cmt_id": "1313bbe2d4a7dfd1fc503a2a9b7af4c88e2f68ec" - } - }, - "4.16.15": { - "CVE-2019-18675": { - "cmt_msg": "mmap: introduce sane default mmap limits", - "cmt_id": "0c19efdfe9533b4fca0a733088abab912cc8e391" - } - }, - "4.16.16": { - "CVE-2018-10853": { - "cmt_msg": "kvm: x86: use correct privilege level for sgdt/sidt/fxsave/fxrstor access", - "cmt_id": "3e4717b5bfaebac92f892e50270f001f66f9cb4f" + "CVE-2023-28746": { + "cmt_msg": "x86/mmio: Disable KVM mitigation when X86_FEATURE_CLEAR_CPU_BUF is set" }, - "CVE-2018-12904": { - "cmt_msg": "kvm: nVMX: Enforce cpl=0 for VMX instructions", - "cmt_id": "b775e0be2c1006a540cdf4982dc588d641e09b2e" - } - }, - "4.16.18": { - "CVE-2018-10840": { - "cmt_msg": "ext4: correctly handle a zero-length xattr with a non-zero e_value_offs", - "cmt_id": "e236c837fbaeb666d66966ba150015016fad901e" + "CVE-2021-47119": { + "cmt_msg": "ext4: fix memory leak in ext4_fill_super" }, - "CVE-2018-1118": { - "cmt_msg": "vhost: fix info leak due to uninitialized memory", - "cmt_id": "5e479dbd7083adaa1032e44957438583f2d91e44" + "CVE-2017-5753": { + "cmt_msg": "x86/cpufeatures: Add X86_BUG_SPECTRE_V[12]" }, - "CVE-2018-11412": { - "cmt_msg": "ext4: do not allow external inodes for inline data", - "cmt_id": "ebff7cb0666c47a7ee37dfc815fc85fcaf19be3e" + "CVE-2024-1086": { + "cmt_msg": "netfilter: nf_tables: reject QUEUE/DROP verdict parameters" }, - "CVE-2018-12232": { - "cmt_msg": "socket: close race condition between sock_close() and sockfs_setattr()", - "cmt_id": "abaa1bb5e3652593a22a51e289bf9dfd4d4a8542" - } - }, - "outstanding": { - "CVE-2020-36322": { - "cmt_msg": "fuse: fix bad inode" + "CVE-2024-22386": { + "cmt_msg": "" }, - "CVE-2020-10711": { - "cmt_msg": "netlabel: cope with NULL catmap" + "CVE-2022-3344": { + "cmt_msg": "KVM: x86: nSVM: harden svm_free_nested against freeing vmcb02 while still in use" }, - "CVE-2019-15090": { - "cmt_msg": "scsi: qedi: remove memset/memcpy to nfunc and use func instead" + "CVE-2020-29568": { + "cmt_msg": "xen/xenbus: Allow watches discard events before queueing" }, - "CVE-2022-3649": { - "cmt_msg": "nilfs2: fix use-after-free bug of struct nilfs_root" + "CVE-2020-27786": { + "cmt_msg": "ALSA: rawmidi: Fix racy buffer resize under concurrent accesses" }, - "CVE-2019-15099": { - "cmt_msg": "ath6kl: fix a NULL-ptr-deref bug in ath6kl_usb_alloc_urb_from_pipe()" + "CVE-2023-6240": { + "cmt_msg": "" }, - "CVE-2019-15098": { - "cmt_msg": "ath6kl: fix a NULL-ptr-deref bug in ath6kl_usb_alloc_urb_from_pipe()" + "CVE-2024-26700": { + "cmt_msg": "drm/amd/display: Fix MST Null Ptr for RV" }, - "CVE-2020-29368": { - "cmt_msg": "mm: thp: make the THP mapcount atomic against __split_huge_pmd_locked()" + "CVE-2024-26706": { + "cmt_msg": "parisc: Fix random data corruption from exception handler" }, - "CVE-2020-12465": { - "cmt_msg": "mt76: fix array overflow on receiving too many fragments for a packet" + "CVE-2023-23559": { + "cmt_msg": "wifi: rndis_wlan: Prevent buffer overflow in rndis_query_oid" }, - "CVE-2020-12464": { - "cmt_msg": "USB: core: Fix free-while-in-use bug in the USB S-Glibrary" + "CVE-2022-39842": { + "cmt_msg": "video: fbdev: pxa3xx-gcu: Fix integer overflow in pxa3xx_gcu_write" }, - "CVE-2022-0002": { - "cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE" + "CVE-2022-0382": { + "cmt_msg": "net ticp:fix a kernel-infoleak in __tipc_sendmsg()" }, - "CVE-2019-19965": { - "cmt_msg": "scsi: libsas: stop discovering if oob mode is disconnected" + "CVE-2023-32233": { + "cmt_msg": "netfilter: nf_tables: deactivate anonymous set from preparation phase" }, - "CVE-2019-19966": { - "cmt_msg": "media: cpia2: Fix use-after-free in cpia2_exit" + "CVE-2020-25672": { + "cmt_msg": "nfc: fix memory leak in llcp_sock_connect()" }, - "CVE-2020-35508": { - "cmt_msg": "fork: fix copy_process(CLONE_PARENT) race with the exiting ->real_parent" + "CVE-2020-25673": { + "cmt_msg": "nfc: Avoid endless loops caused by repeated llcp_sock_connect()" }, - "CVE-2020-24587": { - "cmt_msg": "mac80211: prevent mixed key and fragment cache attacks" + "CVE-2020-25670": { + "cmt_msg": "nfc: fix refcount leak in llcp_sock_bind()" }, - "CVE-2020-24586": { - "cmt_msg": "mac80211: prevent mixed key and fragment cache attacks" + "CVE-2020-25671": { + "cmt_msg": "nfc: fix refcount leak in llcp_sock_connect()" }, - "CVE-2021-0129": { - "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical" + "CVE-2019-15222": { + "cmt_msg": "ALSA: usb-audio: Fix gpf in snd_usb_pipe_sanity_check" }, - "CVE-2019-20096": { - "cmt_msg": "dccp: Fix memleak in __feat_register_sp" + "CVE-2019-15223": { + "cmt_msg": "ALSA: line6: Assure canceling delayed work at disconnection" }, - "CVE-2022-47520": { - "cmt_msg": "wifi: wilc1000: validate pairwise and authentication suite offsets" + "CVE-2019-19813": { + "cmt_msg": "btrfs: inode: Verify inode mode to avoid NULL pointer dereference" }, - "CVE-2023-5717": { - "cmt_msg": "perf: Disallow mis-matched inherited group reads" + "CVE-2020-29374": { + "cmt_msg": "gup: document and work around \"COW can break either way\" issue" }, - "CVE-2022-3643": { - "cmt_msg": "xen/netback: Ensure protocol headers don't fall in the non-linear area" + "CVE-2019-19814": { + "cmt_msg": "" }, - "CVE-2021-3444": { - "cmt_msg": "bpf: Fix truncation handling for mod32 dst reg wrt zero" + "CVE-2020-29371": { + "cmt_msg": "romfs: fix uninitialized memory leak in romfs_dev_read()" }, - "CVE-2022-32250": { - "cmt_msg": "netfilter: nf_tables: disallow non-stateful expression in sets earlier" + "CVE-2019-19816": { + "cmt_msg": "btrfs: inode: Verify inode mode to avoid NULL pointer dereference" }, - "CVE-2019-9506": { - "cmt_msg": "Bluetooth: Fix faulty expression for minimum encryption key size check" + "CVE-2019-9453": { + "cmt_msg": "f2fs: fix to avoid accessing xattr across the boundary" }, - "CVE-2019-9500": { - "cmt_msg": "brcmfmac: assure SSID length from firmware is limited" + "CVE-2021-47124": { + "cmt_msg": "io_uring: fix link timeout refs" }, - "CVE-2019-9503": { - "cmt_msg": "brcmfmac: add subtype check for event handling in data path" + "CVE-2022-1011": { + "cmt_msg": "fuse: fix pipe buffer lifetime for direct_io" }, - "CVE-2020-36158": { - "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_cmd_802_11_ad_hoc_start" + "CVE-2022-1012": { + "cmt_msg": "secure_seq: use the 64 bits of the siphash for port offset calculation" }, - "CVE-2023-3159": { - "cmt_msg": "firewire: fix potential uaf in outbound_phy_packet_callback()" + "CVE-2023-52620": { + "cmt_msg": "netfilter: nf_tables: disallow timeout for anonymous sets" }, - "CVE-2022-0480": { - "cmt_msg": "memcg: enable accounting for file lock caches" + "CVE-2023-52621": { + "cmt_msg": "bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers" }, - "CVE-2022-0487": { - "cmt_msg": "moxart: fix potential use-after-free on remove path" + "CVE-2023-52622": { + "cmt_msg": "ext4: avoid online resizing failures due to oversized flex bg" }, - "CVE-2023-52429": { - "cmt_msg": "dm: limit the number of targets and parameter size area" + "CVE-2023-52623": { + "cmt_msg": "SUNRPC: Fix a suspicious RCU usage warning" }, - "CVE-2021-28964": { - "cmt_msg": "btrfs: fix race when cloning extent buffer during rewind of an old root" + "CVE-2023-52624": { + "cmt_msg": "drm/amd/display: Wake DMCUB before executing GPINT commands" }, - "CVE-2022-23825": { - "cmt_msg": "" + "CVE-2023-52625": { + "cmt_msg": "drm/amd/display: Refactor DMCUB enter/exit idle interface" }, - "CVE-2021-3847": { - "cmt_msg": "" + "CVE-2023-34255": { + "cmt_msg": "xfs: verify buffer contents when we skip log replay" }, - "CVE-2020-35501": { - "cmt_msg": "" + "CVE-2021-26931": { + "cmt_msg": "xen-blkback: don't \"handle\" error by BUG()" }, - "CVE-2018-20784": { - "cmt_msg": "sched/fair: Fix infinite loop in update_blocked_averages() by reverting a9e7f6544b9c" + "CVE-2021-26930": { + "cmt_msg": "xen-blkback: fix error handling in xen_blkbk_map()" }, - "CVE-2019-10124": { - "cmt_msg": "mm: hwpoison: fix thp split handing in soft_offline_in_use_page()" + "CVE-2021-26932": { + "cmt_msg": "Xen/x86: don't bail early from clear_foreign_p2m_mapping()" }, - "CVE-2019-9245": { - "cmt_msg": "f2fs: sanity check of xattr entry size" + "CVE-2023-3141": { + "cmt_msg": "memstick: r592: Fix UAF bug in r592_remove due to race condition" }, - "CVE-2024-26588": { - "cmt_msg": "LoongArch: BPF: Prevent out-of-bounds memory access" + "CVE-2022-0492": { + "cmt_msg": "cgroup-v1: Require capabilities to set release_agent" }, - "CVE-2023-2162": { - "cmt_msg": "scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress" + "CVE-2020-12352": { + "cmt_msg": "Bluetooth: A2MP: Fix not initializing all members" }, - "CVE-2022-21125": { - "cmt_msg": "x86/speculation/mmio: Reuse SRBDS mitigation for SBDS" + "CVE-2022-23042": { + "cmt_msg": "xen/netfront: react properly to failing gnttab_end_foreign_access_ref()" }, - "CVE-2019-19241": { - "cmt_msg": "io_uring: async workers should inherit the user creds" + "CVE-2022-20132": { + "cmt_msg": "HID: add hid_is_usb() function to make it simpler for USB detection" }, - "CVE-2022-40307": { - "cmt_msg": "efi: capsule-loader: Fix use-after-free in efi_capsule_write" + "CVE-2022-0494": { + "cmt_msg": "block-map: add __GFP_ZERO flag for alloc_page in function bio_copy_kern" }, - "CVE-2022-21123": { - "cmt_msg": "x86/speculation/mmio: Add mitigation for Processor MMIO Stale Data" + "CVE-2020-26088": { + "cmt_msg": "net/nfc/rawsock.c: add CAP_NET_RAW check." }, - "CVE-2023-3390": { - "cmt_msg": "netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE" + "CVE-2022-3524": { + "cmt_msg": "tcp/udp: Fix memory leak in ipv6_renew_options()." }, - "CVE-2021-28688": { - "cmt_msg": "xen-blkback: don't leak persistent grants from xen_blkbk_map()" + "CVE-2022-3523": { + "cmt_msg": "mm/memory.c: fix race when faulting a device private page" }, - "CVE-2021-39686": { - "cmt_msg": "binder: use euid from cred instead of using task" + "CVE-2022-3522": { + "cmt_msg": "mm/hugetlb: use hugetlb_pte_stable in migration race check" }, - "CVE-2021-39685": { - "cmt_msg": "USB: gadget: detect too-big endpoint 0 requests" + "CVE-2008-2544": { + "cmt_msg": "" }, - "CVE-2023-6535": { + "CVE-2018-12928": { "cmt_msg": "" }, - "CVE-2021-43975": { - "cmt_msg": "atlantic: Fix OOB read and write in hw_atl_utils_fw_rpc_wait" + "CVE-2021-3178": { + "cmt_msg": "nfsd4: readdirplus shouldn't return parent of export" }, - "CVE-2021-43976": { - "cmt_msg": "mwifiex: Fix skb_over_panic in mwifiex_usb_recv()" + "CVE-2021-47101": { + "cmt_msg": "asix: fix uninit-value in asix_mdio_read()" }, - "CVE-2021-1048": { - "cmt_msg": "fix regression in \"epoll: Keep a reference on files added to the check list\"" + "CVE-2021-47103": { + "cmt_msg": "inet: fully convert sk->sk_rx_dst to RCU rules" }, - "CVE-2019-10207": { - "cmt_msg": "Bluetooth: hci_uart: check for missing tty operations" + "CVE-2021-46982": { + "cmt_msg": "f2fs: compress: fix race condition of overwrite vs truncate" }, - "CVE-2023-39189": { - "cmt_msg": "netfilter: nfnetlink_osf: avoid OOB read" + "CVE-2018-7754": { + "cmt_msg": "printk: hash addresses printed with %p" }, - "CVE-2018-10878": { - "cmt_msg": "ext4: always check block group bounds in ext4_init_block_bitmap()" + "CVE-2022-0330": { + "cmt_msg": "drm/i915: Flush TLBs before releasing backing store" }, - "CVE-2023-0459": { - "cmt_msg": "uaccess: Add speculation barrier to copy_from_user()" + "CVE-2007-3719": { + "cmt_msg": "" }, - "CVE-2023-0458": { - "cmt_msg": "prlimit: do_prlimit needs to have a speculation check" + "CVE-2023-3863": { + "cmt_msg": "net: nfc: Fix use-after-free caused by nfc_llcp_find_local" }, - "CVE-2023-0597": { - "cmt_msg": "x86/mm: Randomize per-cpu entry area" + "CVE-2024-26606": { + "cmt_msg": "binder: signal epoll threads of self-work" }, - "CVE-2019-12379": { - "cmt_msg": "consolemap: Fix a memory leaking bug in drivers/tty/vt/consolemap.c" + "CVE-2023-0590": { + "cmt_msg": "net: sched: fix race condition in qdisc_graft()" }, - "CVE-2019-12378": { - "cmt_msg": "ipv6_sockglue: Fix a missing-check bug in ip6_ra_control()" + "CVE-2023-52583": { + "cmt_msg": "ceph: fix deadlock or deadcode of misusing dget()" }, - "CVE-2021-3744": { - "cmt_msg": "crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd()" + "CVE-2022-4095": { + "cmt_msg": "staging: rtl8712: fix use after free bugs" }, - "CVE-2021-30002": { - "cmt_msg": "media: v4l: ioctl: Fix memory leak in video_usercopy" + "CVE-2022-45919": { + "cmt_msg": "media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221" }, - "CVE-2021-3743": { - "cmt_msg": "net: qrtr: fix OOB Read in qrtr_endpoint_post" + "CVE-2023-2248": { + "cmt_msg": "net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg" }, - "CVE-2021-0941": { - "cmt_msg": "bpf: Remove MTU check in __bpf_skb_max_len" + "CVE-2021-3772": { + "cmt_msg": "sctp: use init_tag from inithdr for ABORT chunk" + }, + "CVE-2021-3679": { + "cmt_msg": "tracing: Fix bug in rb_per_cpu_empty() that might cause deadloop." + }, + "CVE-2021-37159": { + "cmt_msg": "usb: hso: fix error handling code of hso_create_net_device" + }, + "CVE-2023-52517": { + "cmt_msg": "spi: sun6i: fix race between DMA RX transfer completion and RX FIFO drain" }, "CVE-2022-2586": { "cmt_msg": "netfilter: nf_tables: do not allow SET_ID to refer to another table" }, - "CVE-2024-26591": { - "cmt_msg": "bpf: Fix re-attachment branch in bpf_tracing_prog_attach" + "CVE-2022-3629": { + "cmt_msg": "vsock: Fix memory leak in vsock_connect()" }, - "CVE-2020-15802": { + "CVE-2021-34556": { + "cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4" + }, + "CVE-2021-28713": { + "cmt_msg": "xen/console: harden hvc_xen against event channel storms" + }, + "CVE-2021-28712": { + "cmt_msg": "xen/netfront: harden netfront against event channel storms" + }, + "CVE-2017-18261": { + "cmt_msg": "clocksource/drivers/arm_arch_timer: Avoid infinite recursion when ftrace is enabled" + }, + "CVE-2022-1247": { "cmt_msg": "" }, - "CVE-2023-6610": { - "cmt_msg": "smb: client: fix potential OOB in smb2_dump_detail()" + "CVE-2023-51782": { + "cmt_msg": "net/rose: Fix Use-After-Free in rose_ioctl" }, - "CVE-2023-2483": { - "cmt_msg": "net: qcom/emac: Fix use after free bug in emac_remove due to race condition" + "CVE-2022-3621": { + "cmt_msg": "nilfs2: fix NULL pointer dereference at nilfs_bmap_lookup_at_level()" }, - "CVE-2019-3460": { - "cmt_msg": "Bluetooth: Check L2CAP option sizes returned from l2cap_get_conf_opt" + "CVE-2022-23960": { + "cmt_msg": "ARM: report Spectre v2 status through sysfs" }, - "CVE-2022-3636": { - "cmt_msg": "net: ethernet: mtk_eth_soc: use after free in __mtk_ppe_check_skb()" + "CVE-2017-11472": { + "cmt_msg": "ACPICA: Namespace: fix operand cache leak" }, - "CVE-2022-3635": { - "cmt_msg": "atm: idt77252: fix use-after-free bugs caused by tst_timer" + "CVE-2022-3624": { + "cmt_msg": "bonding: fix reference count leak in balance-alb mode" }, - "CVE-2021-34556": { - "cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4" + "CVE-2022-2588": { + "cmt_msg": "net_sched: cls_route: remove from list when handle is 0" }, - "CVE-2020-0543": { - "cmt_msg": "x86/cpu: Add 'table' argument to cpu_matches()" + "CVE-2021-39657": { + "cmt_msg": "scsi: ufs: Correct the LUN used in eh_device_reset_handler() callback" }, - "CVE-2022-40982": { - "cmt_msg": "x86/speculation: Add Gather Data Sampling mitigation" + "CVE-2021-3669": { + "cmt_msg": "ipc: replace costly bailout check in sysvipc_find_ipc()" }, - "CVE-2022-3202": { - "cmt_msg": "jfs: prevent NULL deref in diFree" + "CVE-2019-18885": { + "cmt_msg": "btrfs: merge btrfs_find_device and find_device" }, - "CVE-2022-45919": { - "cmt_msg": "media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221" + "CVE-2022-4744": { + "cmt_msg": "tun: avoid double free in tun_free_netdev" }, - "CVE-2018-3646": { - "cmt_msg": "x86/microcode: Allow late microcode loading with SMT disabled" + "CVE-2023-1095": { + "cmt_msg": "netfilter: nf_tables: fix null deref due to zeroed list head" }, - "CVE-2019-11085": { - "cmt_msg": "drm/i915/gvt: Fix mmap range check" + "CVE-2019-11091": { + "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" }, - "CVE-2024-24861": { + "CVE-2022-3239": { + "cmt_msg": "media: em28xx: initialize refcount before kref_get" + }, + "CVE-2022-4543": { "cmt_msg": "" }, - "CVE-2019-11477": { - "cmt_msg": "tcp: limit payload size of sacked skbs" + "CVE-2023-52571": { + "cmt_msg": "power: supply: rk817: Fix node refcount leak" }, - "CVE-2021-28711": { - "cmt_msg": "xen/blkfront: harden blkfront against event channel storms" + "CVE-2023-52572": { + "cmt_msg": "cifs: Fix UAF in cifs_demultiplex_thread()" }, - "CVE-2018-14615": { - "cmt_msg": "f2fs: fix to do sanity check with i_extra_isize" + "CVE-2023-4921": { + "cmt_msg": "net: sched: sch_qfq: Fix UAF in qfq_dequeue()" }, - "CVE-2018-14614": { - "cmt_msg": "f2fs: fix to do sanity check with cp_pack_start_sum" + "CVE-2022-3424": { + "cmt_msg": "misc: sgi-gru: fix use-after-free error in gru_set_context_option, gru_fault and gru_handle_user_call_os" }, - "CVE-2019-11479": { - "cmt_msg": "tcp: add tcp_min_snd_mss sysctl" + "CVE-2023-1829": { + "cmt_msg": "net/sched: Retire tcindex classifier" }, - "CVE-2019-11478": { - "cmt_msg": "tcp: tcp_fragment() should apply sane memory limits" + "CVE-2021-34981": { + "cmt_msg": "Bluetooth: cmtp: fix file refcount when cmtp_attach_device fails" }, - "CVE-2018-14611": { - "cmt_msg": "btrfs: validate type when reading a chunk" + "CVE-2023-1670": { + "cmt_msg": "xirc2ps_cs: Fix use after free bug in xirc2ps_detach" }, - "CVE-2018-15594": { - "cmt_msg": "x86/paravirt: Fix spectre-v2 mitigations for paravirt guests" + "CVE-2024-26769": { + "cmt_msg": "nvmet-fc: avoid deadlock on delete association path" }, - "CVE-2018-14613": { - "cmt_msg": "btrfs: tree-checker: Verify block_group_item" + "CVE-2022-20148": { + "cmt_msg": "f2fs: fix UAF in f2fs_available_free_memory" }, - "CVE-2018-14612": { - "cmt_msg": "btrfs: tree-checker: Detect invalid and empty essential trees" + "CVE-2022-1786": { + "cmt_msg": "io_uring: remove io_identity" }, - "CVE-2020-26145": { - "cmt_msg": "ath10k: drop fragments with multicast DA for PCIe" + "CVE-2013-7445": { + "cmt_msg": "" }, - "CVE-2023-51782": { - "cmt_msg": "net/rose: Fix Use-After-Free in rose_ioctl" + "CVE-2022-28390": { + "cmt_msg": "can: ems_usb: ems_usb_start_xmit(): fix double dev_kfree_skb() in error path" }, - "CVE-2020-26147": { - "cmt_msg": "mac80211: assure all fragments are encrypted" + "CVE-2024-26738": { + "cmt_msg": "powerpc/pseries/iommu: DLPAR add doesn't completely initialize pci_controller" }, - "CVE-2018-19854": { - "cmt_msg": "crypto: user - fix leaking uninitialized memory to userspace" + "CVE-2024-26739": { + "cmt_msg": "net/sched: act_mirred: don't override retval if we already lost the skb" }, - "CVE-2020-26140": { + "CVE-2022-38096": { "cmt_msg": "" }, - "CVE-2020-26143": { - "cmt_msg": "" + "CVE-2024-26804": { + "cmt_msg": "net: ip_tunnel: prevent perpetual headroom growth" }, - "CVE-2020-26142": { - "cmt_msg": "" + "CVE-2014-3180": { + "cmt_msg": "compat: nanosleep: Clarify error handling" }, - "CVE-2019-17053": { - "cmt_msg": "ieee802154: enforce CAP_NET_RAW for raw sockets" + "CVE-2022-3303": { + "cmt_msg": "ALSA: pcm: oss: Fix race at SNDCTL_DSP_SYNC" }, - "CVE-2019-17052": { - "cmt_msg": "ax25: enforce CAP_NET_RAW for raw sockets" + "CVE-2017-8797": { + "cmt_msg": "nfsd: fix undefined behavior in nfsd4_layout_verify" }, - "CVE-2023-1076": { - "cmt_msg": "tun: tun_chr_open(): correctly initialize socket uid" + "CVE-2017-5715": { + "cmt_msg": "x86/cpufeatures: Add X86_BUG_SPECTRE_V[12]" }, - "CVE-2023-1077": { - "cmt_msg": "sched/rt: pick_next_rt_entity(): check list_entry" + "CVE-2022-20141": { + "cmt_msg": "igmp: Add ip_mc_list lock in ip_check_mc_rcu" }, - "CVE-2020-27418": { - "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region" + "CVE-2023-23455": { + "cmt_msg": "net: sched: atm: dont intepret cls results when asked to drop" }, - "CVE-2019-17056": { - "cmt_msg": "nfc: enforce CAP_NET_RAW for raw sockets" + "CVE-2023-23454": { + "cmt_msg": "net: sched: cbq: dont intepret cls results when asked to drop" }, - "CVE-2019-17055": { - "cmt_msg": "mISDN: enforce CAP_NET_RAW for raw sockets" + "CVE-2018-5344": { + "cmt_msg": "loop: fix concurrent lo_open/lo_release" }, - "CVE-2019-17054": { - "cmt_msg": "appletalk: enforce CAP_NET_RAW for raw sockets" + "CVE-2018-3620": { + "cmt_msg": "x86/microcode: Allow late microcode loading with SMT disabled" }, - "CVE-2018-13093": { - "cmt_msg": "xfs: validate cached inodes are free when allocated" + "CVE-2023-6932": { + "cmt_msg": "ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet" }, - "CVE-2023-51042": { - "cmt_msg": "drm/amdgpu: Fix potential fence use-after-free v2" + "CVE-2020-16166": { + "cmt_msg": "random32: update the net random state on interrupt and activity" }, - "CVE-2018-13096": { - "cmt_msg": "f2fs: fix to do sanity check with node footer and iblocks" + "CVE-2021-29155": { + "cmt_msg": "bpf: Use correct permission flag for mixed signed bounds arithmetic" }, - "CVE-2018-13097": { - "cmt_msg": "f2fs: fix to do sanity check with user_block_count" + "CVE-2021-33631": { + "cmt_msg": "ext4: fix kernel BUG in 'ext4_write_inline_data_end()'" }, - "CVE-2018-13094": { - "cmt_msg": "xfs: don't call xfs_da_shrink_inode with NULL bp" + "CVE-2022-28388": { + "cmt_msg": "can: usb_8dev: usb_8dev_start_xmit(): fix double dev_kfree_skb() in error path" }, - "CVE-2018-13095": { - "cmt_msg": "xfs: More robust inode extent count validation" + "CVE-2024-26803": { + "cmt_msg": "net: veth: clear GRO when clearing XDP even when down" }, - "CVE-2020-29661": { - "cmt_msg": "tty: Fix ->pgrp locking in tiocspgrp()" + "CVE-2024-26598": { + "cmt_msg": "KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache" }, - "CVE-2020-29660": { - "cmt_msg": "tty: Fix ->session locking" + "CVE-2024-26768": { + "cmt_msg": "LoongArch: Change acpi_core_pic[NR_CPUS] to acpi_core_pic[MAX_CORE_PIC]" }, - "CVE-2018-13098": { - "cmt_msg": "f2fs: fix to do sanity check with extra_attr feature" + "CVE-2020-12362": { + "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" }, - "CVE-2018-13099": { - "cmt_msg": "f2fs: fix to do sanity check with reserved blkaddr of inline inode" + "CVE-2020-12363": { + "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" }, - "CVE-2022-1734": { - "cmt_msg": "nfc: nfcmrvl: main: reorder destructive operations in nfcmrvl_nci_unregister_dev to avoid bugs" + "CVE-2022-4129": { + "cmt_msg": "l2tp: Serialize access to sk_user_data with sk_callback_lock" }, - "CVE-2023-28772": { - "cmt_msg": "seq_buf: Fix overflow in seq_buf_putmem_hex()" + "CVE-2023-3117": { + "cmt_msg": "netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE" }, - "CVE-2019-19770": { - "cmt_msg": "blktrace: fix debugfs use after free" + "CVE-2020-12364": { + "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" }, - "CVE-2019-11884": { - "cmt_msg": "Bluetooth: hidp: fix buffer overflow" + "CVE-2023-52607": { + "cmt_msg": "powerpc/mm: Fix null-pointer dereference in pgtable_cache_add" }, - "CVE-2019-19078": { - "cmt_msg": "ath10k: fix memory leak" + "CVE-2024-26646": { + "cmt_msg": "thermal: intel: hfi: Add syscore callbacks for system-wide PM" }, - "CVE-2019-19077": { - "cmt_msg": "RDMA: Fix goto target to release the allocated memory" + "CVE-2024-26647": { + "cmt_msg": "drm/amd/display: Fix late derefrence 'dsc' check in 'link_set_dsc_pps_packet()'" }, - "CVE-2019-19075": { - "cmt_msg": "ieee802154: ca8210: prevent memory leak" + "CVE-2024-26644": { + "cmt_msg": "btrfs: don't abort filesystem when attempting to snapshot deleted subvolume" }, - "CVE-2019-19074": { - "cmt_msg": "ath9k: release allocated buffer if timed out" + "CVE-2021-0605": { + "cmt_msg": "af_key: pfkey_dump needs parameter validation" }, - "CVE-2019-18683": { - "cmt_msg": "media: vivid: Fix wrong locking that causes race conditions on streaming stop" + "CVE-2024-26656": { + "cmt_msg": "drm/amdgpu: fix use-after-free bug" }, - "CVE-2022-2503": { - "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag" + "CVE-2021-3896": { + "cmt_msg": "isdn: cpai: check ctr->cnr to avoid array index out of bound" }, - "CVE-2019-19071": { - "cmt_msg": "rsi: release skb if rsi_prepare_beacon fails" + "CVE-2021-4002": { + "cmt_msg": "hugetlbfs: flush TLBs correctly after huge_pmd_unshare" }, - "CVE-2019-18680": { - "cmt_msg": "" + "CVE-2023-52519": { + "cmt_msg": "HID: intel-ish-hid: ipc: Disable and reenable ACPI GPE bit" }, - "CVE-2022-23038": { - "cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()" + "CVE-2019-16232": { + "cmt_msg": "libertas: fix a potential NULL pointer dereference" }, - "CVE-2022-23039": { - "cmt_msg": "xen/gntalloc: don't use gnttab_query_foreign_access()" + "CVE-2024-26791": { + "cmt_msg": "btrfs: dev-replace: properly validate device names" }, - "CVE-2022-20154": { - "cmt_msg": "sctp: use call_rcu to free endpoint" + "CVE-2019-20810": { + "cmt_msg": "media: go7007: fix a miss of snd_card_free" }, - "CVE-2021-27363": { - "cmt_msg": "scsi: iscsi: Restrict sessions and handles to admin capabilities" + "CVE-2023-52600": { + "cmt_msg": "jfs: fix uaf in jfs_evict_inode" }, - "CVE-2022-20158": { - "cmt_msg": "net/packet: fix slab-out-of-bounds access in packet_recvmsg()" + "CVE-2020-14314": { + "cmt_msg": "ext4: fix potential negative array index in do_split()" }, - "CVE-2022-23037": { - "cmt_msg": "xen/netfront: don't use gnttab_query_foreign_access() for mapped status" + "CVE-2023-52601": { + "cmt_msg": "jfs: fix array-index-out-of-bounds in dbAdjTree" }, - "CVE-2024-0564": { - "cmt_msg": "" + "CVE-2018-5391": { + "cmt_msg": "ip: discard IPv4 datagrams with overlapping segments." }, - "CVE-2020-0404": { - "cmt_msg": "media: uvcvideo: Avoid cyclic entity chains due to malformed USB descriptors" + "CVE-2022-26373": { + "cmt_msg": "x86/speculation: Add RSB VM Exit protections" }, - "CVE-2019-15925": { - "cmt_msg": "net: hns3: add some error checking in hclge_tm module" + "CVE-2019-18660": { + "cmt_msg": "powerpc/book3s64: Fix link stack flush on context switch" }, - "CVE-2019-15924": { - "cmt_msg": "fm10k: Fix a potential NULL pointer dereference" + "CVE-2019-15290": { + "cmt_msg": "" }, - "CVE-2019-15538": { - "cmt_msg": "xfs: fix missing ILOCK unlock when xfs_setattr_nonsize fails due to EDQUOT" + "CVE-2023-3212": { + "cmt_msg": "gfs2: Don't deref jdesc in evict" }, - "CVE-2019-15926": { - "cmt_msg": "ath6kl: add some bounds checking" + "CVE-2024-23848": { + "cmt_msg": "" }, - "CVE-2019-15921": { - "cmt_msg": "genetlink: Fix a memory leak on error path" + "CVE-2023-52531": { + "cmt_msg": "wifi: iwlwifi: mvm: Fix a memory corruption issue" }, - "CVE-2020-10757": { - "cmt_msg": "mm: Fix mremap not considering huge pmd devmap" + "CVE-2024-26633": { + "cmt_msg": "ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim()" }, - "CVE-2019-14821": { - "cmt_msg": "KVM: coalesced_mmio: add bounds checking" + "CVE-2018-7273": { + "cmt_msg": "printk: hash addresses printed with %p" }, - "CVE-2020-12826": { - "cmt_msg": "signal: Extend exec_id to 64bits" + "CVE-2024-26778": { + "cmt_msg": "fbdev: savage: Error out if pixclock equals zero" }, - "CVE-2019-18885": { - "cmt_msg": "btrfs: merge btrfs_find_device and find_device" + "CVE-2023-4459": { + "cmt_msg": "net: vmxnet3: fix possible NULL pointer dereference in vmxnet3_rq_cleanup()" }, - "CVE-2021-42008": { - "cmt_msg": "net: 6pack: fix slab-out-of-bounds in decode_data" + "CVE-2024-26636": { + "cmt_msg": "llc: make llc_ui_sendmsg() more robust against bonding changes" }, - "CVE-2022-39189": { - "cmt_msg": "KVM: x86: do not report a vCPU as preempted outside instruction boundaries" + "CVE-2024-26635": { + "cmt_msg": "llc: Drop support for ETH_P_TR_802_2." }, - "CVE-2022-39188": { - "cmt_msg": "mmu_gather: Force tlb-flush VM_PFNMAP vmas" + "CVE-2023-52639": { + "cmt_msg": "KVM: s390: vsie: fix race during shadow creation" }, - "CVE-2019-1125": { - "cmt_msg": "x86/speculation: Prepare entry code for Spectre v1 swapgs mitigations" + "CVE-2022-2153": { + "cmt_msg": "KVM: x86: Avoid theoretical NULL pointer dereference in kvm_irq_delivery_to_apic_fast()" }, - "CVE-2019-15218": { - "cmt_msg": "media: usb: siano: Fix general protection fault in smsusb" + "CVE-2024-2193": { + "cmt_msg": "" }, - "CVE-2019-15666": { - "cmt_msg": "xfrm: policy: Fix out-of-bound array accesses in __xfrm_policy_unlink" + "CVE-2022-20566": { + "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free caused by l2cap_chan_put" }, - "CVE-2020-25641": { - "cmt_msg": "block: allow for_each_bvec to support zero len bvec" + "CVE-2018-12930": { + "cmt_msg": "" }, - "CVE-2005-3660": { + "CVE-2018-12931": { "cmt_msg": "" }, - "CVE-2019-15212": { - "cmt_msg": "USB: rio500: refuse more than one device at a time" + "CVE-2024-23196": { + "cmt_msg": "ALSA: hda: fix a possible null-pointer dereference due to data race in snd_hdac_regmap_sync()" }, - "CVE-2019-15211": { - "cmt_msg": "media: radio-raremono: change devm_k*alloc to k*alloc" + "CVE-2024-26765": { + "cmt_msg": "LoongArch: Disable IRQ before init_fn() for nonboot CPUs" }, - "CVE-2023-31084": { - "cmt_msg": "media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*()" + "CVE-2021-32399": { + "cmt_msg": "bluetooth: eliminate the potential race condition when removing the HCI controller" }, - "CVE-2019-15217": { - "cmt_msg": "media: usb:zr364xx:Fix KASAN:null-ptr-deref Read in zr364xx_vidioc_querycap" + "CVE-2021-33098": { + "cmt_msg": "ixgbe: fix large MTU request from VF" }, - "CVE-2019-15216": { - "cmt_msg": "USB: yurex: Fix protection fault after device removal" + "CVE-2021-28972": { + "cmt_msg": "PCI: rpadlpar: Fix potential drc_name corruption in store functions" }, - "CVE-2019-15215": { - "cmt_msg": "media: cpia2_usb: first wake up, then free in disconnect" + "CVE-2019-12382": { + "cmt_msg": "drm/edid: Fix a missing-check bug in drm_load_edid_firmware()" }, - "CVE-2019-15214": { - "cmt_msg": "ALSA: core: Fix card races between register and disconnect" + "CVE-2017-10810": { + "cmt_msg": "drm/virtio: don't leak bo on drm_gem_object_init failure" }, - "CVE-2022-45885": { - "cmt_msg": "" + "CVE-2022-24958": { + "cmt_msg": "usb: gadget: don't release an existing dev->buf" }, - "CVE-2020-24588": { - "cmt_msg": "cfg80211: mitigate A-MSDU aggregation attacks" + "CVE-2023-52633": { + "cmt_msg": "um: time-travel: fix time corruption" }, - "CVE-2021-33034": { - "cmt_msg": "Bluetooth: verify AMP hci_chan before amp_destroy" + "CVE-2020-36780": { + "cmt_msg": "i2c: sprd: fix reference leak when pm_runtime_get_sync fails" }, - "CVE-2019-19922": { - "cmt_msg": "sched/fair: Fix low cpu usage with high throttling by removing expiration of cpu-local slices" + "CVE-2020-36781": { + "cmt_msg": "i2c: imx: fix reference leak when pm_runtime_get_sync fails" }, - "CVE-2021-33033": { - "cmt_msg": "cipso,calipso: resolve a number of problems with the DOI refcounts" + "CVE-2020-10766": { + "cmt_msg": "x86/speculation: Prevent rogue cross-process SSBD shutdown" }, - "CVE-2019-19927": { - "cmt_msg": "drm/ttm: fix incrementing the page pointer for huge pages" + "CVE-2020-10767": { + "cmt_msg": "x86/speculation: Avoid force-disabling IBPB based on STIBP and enhanced IBRS." }, - "CVE-2020-27066": { - "cmt_msg": "xfrm: policy: Fix doulbe free in xfrm_policy_timer" + "CVE-2018-12207": { + "cmt_msg": "kvm: x86, powerpc: do not allow clearing largepages debugfs entry" }, - "CVE-2020-27068": { - "cmt_msg": "cfg80211: add missing policy for NL80211_ATTR_STATUS_CODE" + "CVE-2020-10768": { + "cmt_msg": "x86/speculation: PR_SPEC_FORCE_DISABLE enforcement for indirect branches." }, - "CVE-2024-23307": { + "CVE-2024-26685": { + "cmt_msg": "nilfs2: fix potential bug in end_buffer_async_write" + }, + "CVE-2024-25740": { "cmt_msg": "" }, - "CVE-2020-8648": { - "cmt_msg": "vt: selection, close sel_buffer race" + "CVE-2019-0148": { + "cmt_msg": "i40e: Wrong truncation from u16 to u8" }, - "CVE-2022-32296": { - "cmt_msg": "tcp: increase source port perturb table to 2^16" + "CVE-2022-33740": { + "cmt_msg": "xen/netfront: fix leaking data in shared pages" }, - "CVE-2020-28974": { - "cmt_msg": "vt: Disable KD_FONT_OP_COPY" + "CVE-2019-17075": { + "cmt_msg": "RDMA/cxgb4: Do not dma memory off of the stack" }, - "CVE-2023-3567": { - "cmt_msg": "vc_screen: move load of struct vc_data pointer in vcs_read() to avoid UAF" + "CVE-2014-7145": { + "cmt_msg": "[CIFS] Possible null ptr deref in SMB2_tcon" }, - "CVE-2019-20806": { - "cmt_msg": "media: tw5864: Fix possible NULL pointer dereference in tw5864_handle_frame" + "CVE-2022-3903": { + "cmt_msg": "media: mceusb: Use new usb_control_msg_*() routines" }, - "CVE-2022-3028": { - "cmt_msg": "af_key: Do not call xfrm_probe_algs in parallel" + "CVE-2023-20588": { + "cmt_msg": "x86/CPU/AMD: Do not leak quotient data after a division by 0" }, - "CVE-2020-0305": { - "cmt_msg": "chardev: Avoid potential use-after-free in 'chrdev_open()'" + "CVE-2017-0750": { + "cmt_msg": "f2fs: do more integrity verification for superblock" }, - "CVE-2020-14304": { - "cmt_msg": "" + "CVE-2021-47075": { + "cmt_msg": "nvmet: fix memory leak in nvmet_alloc_ctrl()" }, - "CVE-2010-5321": { - "cmt_msg": "" + "CVE-2019-11191": { + "cmt_msg": "x86: Deprecate a.out support" }, - "CVE-2020-15393": { - "cmt_msg": "usb: usbtest: fix missing kfree(dev->buf) in usbtest_disconnect" + "CVE-2021-47076": { + "cmt_msg": "RDMA/rxe: Return CQE error if invalid lkey was supplied" }, - "CVE-2023-23000": { - "cmt_msg": "phy: tegra: xusb: Fix return value of tegra_xusb_find_port_node function" + "CVE-2021-47136": { + "cmt_msg": "net: zero-initialize tc skb extension on allocation" }, - "CVE-2019-19082": { - "cmt_msg": "drm/amd/display: prevent memory leak" + "CVE-2021-47171": { + "cmt_msg": "net: usb: fix memory leak in smsc75xx_bind" }, - "CVE-2021-3564": { - "cmt_msg": "Bluetooth: fix the erroneous flush_work() order" + "CVE-2021-47172": { + "cmt_msg": "iio: adc: ad7124: Fix potential overflow due to non sequential channel numbers" }, - "CVE-2023-3611": { - "cmt_msg": "net/sched: sch_qfq: account for stab overhead in qfq_enqueue" + "CVE-2021-47173": { + "cmt_msg": "misc/uss720: fix memory leak in uss720_probe" }, - "CVE-2023-4132": { - "cmt_msg": "media: usb: siano: Fix warning due to null work_func_t function pointer" + "CVE-2022-36123": { + "cmt_msg": "x86: Clear .brk area at early boot" }, - "CVE-2023-4133": { - "cmt_msg": "cxgb4: fix use after free bugs caused by circular dependency problem" + "CVE-2021-47175": { + "cmt_msg": "net/sched: fq_pie: fix OOB access in the traffic path" }, - "CVE-2020-26560": { - "cmt_msg": "" + "CVE-2018-10322": { + "cmt_msg": "xfs: enhance dinode verifier" }, - "CVE-2023-35823": { - "cmt_msg": "media: saa7134: fix use after free bug in saa7134_finidev due to race condition" + "CVE-2021-46951": { + "cmt_msg": "tpm: efi: Use local variable for calculating final log size" }, - "CVE-2022-38096": { - "cmt_msg": "" + "CVE-2021-46950": { + "cmt_msg": "md/raid1: properly indicate failure when ending a failed write request" }, - "CVE-2018-18397": { - "cmt_msg": "userfaultfd: use ENOENT instead of EFAULT if the atomic copy user fails" + "CVE-2021-46952": { + "cmt_msg": "NFS: fs_context: validate UDP retrans to prevent shift out-of-bounds" }, - "CVE-2018-12127": { - "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" + "CVE-2021-46959": { + "cmt_msg": "spi: Fix use-after-free with devm_spi_alloc_*" }, - "CVE-2018-12126": { - "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" + "CVE-2016-9644": { + "cmt_msg": "x86/mm: Expand the exception table logic to allow new handling options" }, - "CVE-2022-23816": { - "cmt_msg": "x86/kvm/vmx: Make noinstr clean" + "CVE-2020-26139": { + "cmt_msg": "mac80211: do not accept/forward invalid EAPOL frames" }, - "CVE-2023-37454": { + "CVE-2023-3640": { "cmt_msg": "" }, - "CVE-2021-3892": { - "cmt_msg": "" + "CVE-2024-26772": { + "cmt_msg": "ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal()" }, - "CVE-2022-20572": { - "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag" + "CVE-2019-10220": { + "cmt_msg": "Convert filldir[64]() from __put_user() to unsafe_put_user()" }, - "CVE-2023-39194": { - "cmt_msg": "net: xfrm: Fix xfrm_address_filter OOB read" + "CVE-2021-3609": { + "cmt_msg": "can: bcm: delay release of struct bcm_op after synchronize_rcu()" }, - "CVE-2023-2002": { - "cmt_msg": "bluetooth: Perform careful capability checks in hci_sock_ioctl()" + "CVE-2021-0929": { + "cmt_msg": "staging/android/ion: delete dma_buf->kmap/unmap implemenation" }, - "CVE-2023-39197": { - "cmt_msg": "netfilter: conntrack: dccp: copy entire header to stack buffer, not just basic one" + "CVE-2023-52590": { + "cmt_msg": "ocfs2: Avoid touching renamed directory if parent does not change" }, - "CVE-2019-10126": { - "cmt_msg": "mwifiex: Fix heap overflow in mwifiex_uap_parse_tail_ies()" + "CVE-2024-26676": { + "cmt_msg": "af_unix: Call kfree_skb() for dead unix_(sk)->oob_skb in GC." }, - "CVE-2019-13631": { - "cmt_msg": "Input: gtco - bounds check collection indent level" + "CVE-2023-6546": { + "cmt_msg": "tty: n_gsm: fix the UAF caused by race condition in gsm_cleanup_mux" }, - "CVE-2020-13974": { - "cmt_msg": "vt: keyboard: avoid signed integer overflow in k_ascii" + "CVE-2017-18255": { + "cmt_msg": "perf/core: Fix the perf_cpu_time_max_percent check" }, - "CVE-2021-4083": { - "cmt_msg": "fget: check that the fd still exists after getting a ref to it" + "CVE-2022-0168": { + "cmt_msg": "cifs: fix NULL ptr dereference in smb2_ioctl_query_info()" }, - "CVE-2023-33288": { - "cmt_msg": "power: supply: bq24190: Fix use after free bug in bq24190_remove due to race condition" + "CVE-2020-28374": { + "cmt_msg": "scsi: target: Fix XCOPY NAA identifier lookup" }, - "CVE-2022-36402": { - "cmt_msg": "drm/vmwgfx: Fix shader stage validation" + "CVE-2024-26672": { + "cmt_msg": "drm/amdgpu: Fix variable 'mca_funcs' dereferenced before NULL check in 'amdgpu_mca_smu_get_mca_entry()'" }, - "CVE-2022-29900": { - "cmt_msg": "x86/kvm/vmx: Make noinstr clean" + "CVE-2023-52527": { + "cmt_msg": "ipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data()" }, - "CVE-2022-29901": { - "cmt_msg": "x86/kvm/vmx: Make noinstr clean" + "CVE-2023-3006": { + "cmt_msg": "arm64: Add AMPERE1 to the Spectre-BHB affected list" }, - "CVE-2021-4197": { - "cmt_msg": "cgroup: Use open-time credentials for process migraton perm checks" + "CVE-2023-52522": { + "cmt_msg": "net: fix possible store tearing in neigh_periodic_work()" }, - "CVE-2018-12233": { - "cmt_msg": "jfs: Fix inconsistency between memory allocation and ea_buf->max_size" + "CVE-2022-3586": { + "cmt_msg": "sch_sfb: Don't assume the skb is still around after enqueueing to child" }, - "CVE-2019-19227": { - "cmt_msg": "appletalk: Fix potential NULL pointer dereference in unregister_snap_client" + "CVE-2024-26789": { + "cmt_msg": "crypto: arm64/neonbs - fix out-of-bounds access on short input" }, - "CVE-2020-10751": { - "cmt_msg": "selinux: properly handle multiple messages in selinux_netlink_send()" + "CVE-2024-26779": { + "cmt_msg": "wifi: mac80211: fix race condition on enabling fast-xmit" }, - "CVE-2019-9162": { - "cmt_msg": "netfilter: nf_nat_snmp_basic: add missing length checks in ASN.1 cbs" + "CVE-2023-52528": { + "cmt_msg": "net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg" + }, + "CVE-2020-27825": { + "cmt_msg": "tracing: Fix race in trace_open and buffer resize call" + }, + "CVE-2019-2181": { + "cmt_msg": "binder: check for overflow when alloc for security context" + }, + "CVE-2020-27820": { + "cmt_msg": "drm/nouveau: use drm_dev_unplug() during device removal" + }, + "CVE-2023-39194": { + "cmt_msg": "net: xfrm: Fix xfrm_address_filter OOB read" + }, + "CVE-2020-0067": { + "cmt_msg": "f2fs: fix to avoid memory leakage in f2fs_listxattr" + }, + "CVE-2023-52599": { + "cmt_msg": "jfs: fix array-index-out-of-bounds in diNewExt" + }, + "CVE-2020-26558": { + "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical" + }, + "CVE-2023-39193": { + "cmt_msg": "netfilter: xt_sctp: validate the flag_info count" }, "CVE-2023-39192": { "cmt_msg": "netfilter: xt_u32: validate user space input" }, - "CVE-2019-16229": { - "cmt_msg": "drm/amdkfd: fix a potential NULL pointer dereference (v2)" + "CVE-2020-26541": { + "cmt_msg": "certs: Add EFI_CERT_X509_GUID support for dbx entries" }, - "CVE-2018-20511": { - "cmt_msg": "net/appletalk: fix minor pointer leak to userspace in SIOCFINDIPDDPRT" + "CVE-2023-6610": { + "cmt_msg": "smb: client: fix potential OOB in smb2_dump_detail()" }, - "CVE-2022-20166": { - "cmt_msg": "drivers core: Use sysfs_emit and sysfs_emit_at for show(device *...) functions" + "CVE-2024-26600": { + "cmt_msg": "phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP" }, - "CVE-2020-15437": { - "cmt_msg": "serial: 8250: fix null-ptr-deref in serial8250_start_tx()" + "CVE-2023-3390": { + "cmt_msg": "netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE" }, - "CVE-2020-15436": { - "cmt_msg": "block: Fix use-after-free in blkdev_get()" + "CVE-2021-20317": { + "cmt_msg": "lib/timerqueue: Rely on rbtree semantics for next timer" }, - "CVE-2022-1116": { + "CVE-2021-43389": { + "cmt_msg": "isdn: cpai: check ctr->cnr to avoid array index out of bound" + }, + "CVE-2023-3111": { + "cmt_msg": "btrfs: unset reloc control if transaction commit fails in prepare_to_relocate()" + }, + "CVE-2021-33061": { + "cmt_msg": "ixgbe: add improvement for MDD response functionality" + }, + "CVE-2024-26764": { + "cmt_msg": "fs/aio: Restrict kiocb_set_cancel_fn() to I/O submitted via libaio" + }, + "CVE-2024-26767": { + "cmt_msg": "drm/amd/display: fixed integer types and null check locations" + }, + "CVE-2024-26766": { + "cmt_msg": "IB/hfi1: Fix sdma.h tx->num_descs off-by-one error" + }, + "CVE-2024-26763": { + "cmt_msg": "dm-crypt: don't modify the data when using authenticated encryption" + }, + "CVE-2023-1476": { "cmt_msg": "" }, - "CVE-2021-28660": { - "cmt_msg": "staging: rtl8188eu: prevent ->ssid overflow in rtw_wx_set_scan()" + "CVE-2024-26773": { + "cmt_msg": "ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found()" }, - "CVE-2024-0775": { - "cmt_msg": "ext4: improve error recovery code paths in __ext4_remount()" + "CVE-2017-18552": { + "cmt_msg": "RDS: validate the requested traces user input against max supported" }, - "CVE-2020-8647": { - "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region" + "CVE-2022-1652": { + "cmt_msg": "floppy: use a statically allocated error counter" }, - "CVE-2019-0155": { - "cmt_msg": "drm/i915: Rename gen7 cmdparser tables" + "CVE-2015-8830": { + "cmt_msg": "aio: lift iov_iter_init() into aio_setup_..._rw()" }, - "CVE-2019-0154": { - "cmt_msg": "drm/i915: Lower RM timeout to avoid DSI hard hangs" + "CVE-2021-46932": { + "cmt_msg": "Input: appletouch - initialize work before device registration" }, - "CVE-2023-35827": { - "cmt_msg": "ravb: Fix use-after-free issue in ravb_tx_timeout_work()" + "CVE-2020-14351": { + "cmt_msg": "perf/core: Fix race in the perf_mmap_close() function" }, - "CVE-2021-3600": { - "cmt_msg": "bpf: Fix 32 bit src register truncation on div/mod" + "CVE-2019-19054": { + "cmt_msg": "media: rc: prevent memory leak in cx23888_ir_probe" }, - "CVE-2020-36386": { - "cmt_msg": "Bluetooth: Fix slab-out-of-bounds read in hci_extended_inquiry_result_evt()" + "CVE-2023-51043": { + "cmt_msg": "drm/atomic: Fix potential use-after-free in nonblocking commits" }, - "CVE-2022-3567": { - "cmt_msg": "ipv6: Fix data races around sk->sk_prot." + "CVE-2022-2978": { + "cmt_msg": "fs: fix UAF/GPF bug in nilfs_mdt_destroy" }, - "CVE-2022-3566": { - "cmt_msg": "tcp: Fix data races around icsk->icsk_af_ops." + "CVE-2020-0429": { + "cmt_msg": "l2tp: fix race between l2tp_session_delete() and l2tp_tunnel_closeall()" }, - "CVE-2022-3565": { - "cmt_msg": "mISDN: fix use-after-free bugs in l1oip timer handlers" + "CVE-2023-23039": { + "cmt_msg": "" }, - "CVE-2022-3564": { - "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free caused by l2cap_reassemble_sdu" + "CVE-2023-20569": { + "cmt_msg": "x86/bugs: Increase the x86 bugs vector size to two u32s" }, - "CVE-2018-19407": { - "cmt_msg": "KVM: X86: Fix scan ioapic use-before-initialization" + "CVE-2020-0427": { + "cmt_msg": "pinctrl: devicetree: Avoid taking direct reference to device name string" }, - "CVE-2020-36385": { - "cmt_msg": "RDMA/ucma: Rework ucma_migrate_id() to avoid races with destroy" + "CVE-2022-20424": { + "cmt_msg": "io_uring: remove io_identity" }, - "CVE-2022-3628": { - "cmt_msg": "wifi: brcmfmac: Fix potential buffer overflow in brcmf_fweh_event_worker()" + "CVE-2023-6270": { + "cmt_msg": "aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts" }, - "CVE-2020-0009": { - "cmt_msg": "staging: android: ashmem: Disallow ashmem memory from being remapped" + "CVE-2017-9984": { + "cmt_msg": "ALSA: msnd: Optimize / harden DSP and MIDI loops" }, - "CVE-2023-52340": { - "cmt_msg": "ipv6: remove max_size check inline with ipv4" + "CVE-2023-45862": { + "cmt_msg": "USB: ene_usb6250: Allocate enough memory for full object" }, - "CVE-2020-7053": { - "cmt_msg": "drm/i915: Introduce a mutex for file_priv->context_idr" + "CVE-2023-45863": { + "cmt_msg": "kobject: Fix slab-out-of-bounds in fill_kobj_path()" }, - "CVE-2023-28466": { - "cmt_msg": "net: tls: fix possible race condition between do_tls_getsockopt_conf() and do_tls_setsockopt_conf()" + "CVE-2017-15537": { + "cmt_msg": "x86/fpu: Don't let userspace set bogus xcomp_bv" }, - "CVE-2019-14615": { - "cmt_msg": "drm/i915/gen9: Clear residual context state on context switch" + "CVE-2022-23222": { + "cmt_msg": "bpf: Replace PTR_TO_XXX_OR_NULL with PTR_TO_XXX | PTR_MAYBE_NULL" }, - "CVE-2018-16871": { - "cmt_msg": "nfsd: COPY and CLONE operations require the saved filehandle to be set" + "CVE-2020-25669": { + "cmt_msg": "Input: sunkbd - avoid use-after-free in teardown paths" }, - "CVE-2021-3635": { - "cmt_msg": "netfilter: nf_tables: fix flowtable list del corruption" + "CVE-2020-25668": { + "cmt_msg": "tty: make FONTX ioctl use the tty pointer they were actually passed" }, - "CVE-2019-13648": { - "cmt_msg": "powerpc/tm: Fix oops on sigreturn on systems without TM" + "CVE-2008-4609": { + "cmt_msg": "" }, - "CVE-2023-0030": { - "cmt_msg": "drm/nouveau/mmu: add more general vmm free/node handling functions" + "CVE-2018-20854": { + "cmt_msg": "phy: ocelot-serdes: fix out-of-bounds read" }, - "CVE-2020-16120": { - "cmt_msg": "ovl: switch to mounter creds in readdir" + "CVE-2018-25020": { + "cmt_msg": "bpf: fix truncated jump targets on heavy expansions" }, - "CVE-2019-11599": { - "cmt_msg": "coredump: fix race condition between mmget_not_zero()/get_task_mm() and core dumping" + "CVE-2024-26744": { + "cmt_msg": "RDMA/srpt: Support specifying the srpt_service_guid parameter" }, - "CVE-2018-16658": { - "cmt_msg": "cdrom: Fix info leak/OOB read in cdrom_ioctl_drive_status" + "CVE-2024-26648": { + "cmt_msg": "drm/amd/display: Fix variable deferencing before NULL check in edp_setup_replay()" }, - "CVE-2018-15572": { - "cmt_msg": "x86/speculation: Protect against userspace-userspace spectreRSB" + "CVE-2022-21166": { + "cmt_msg": "x86/speculation/mmio: Enable CPU Fill buffer clearing on idle" }, - "CVE-2022-29581": { - "cmt_msg": "net/sched: cls_u32: fix netns refcount changes in u32_change()" + "CVE-2023-26607": { + "cmt_msg": "ntfs: fix out-of-bounds read in ntfs_attr_find()" }, - "CVE-2022-1204": { - "cmt_msg": "ax25: Fix refcount leaks caused by ax25_cb_del()" + "CVE-2018-20855": { + "cmt_msg": "IB/mlx5: Fix leaking stack memory to userspace" }, - "CVE-2019-2101": { - "cmt_msg": "media: uvcvideo: Fix 'type' check leading to overflow" + "CVE-2019-15239": { + "cmt_msg": "" }, - "CVE-2019-17666": { - "cmt_msg": "rtlwifi: Fix potential overflow on P2P code" + "CVE-2024-26743": { + "cmt_msg": "RDMA/qedr: Fix qedr_create_user_qp error flow" }, - "CVE-2021-23133": { - "cmt_msg": "net/sctp: fix race condition in sctp_destroy_sock" + "CVE-2023-52635": { + "cmt_msg": "PM / devfreq: Synchronize devfreq_monitor_[start/stop]" }, - "CVE-2018-9363": { - "cmt_msg": "Bluetooth: hidp: buffer overflow in hidp_process_report" + "CVE-2023-52634": { + "cmt_msg": "drm/amd/display: Fix disable_otg_wa logic" }, - "CVE-2018-15471": { - "cmt_msg": "xen-netback: fix input validation in xenvif_set_hash_mapping()" + "CVE-2023-52594": { + "cmt_msg": "wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus()" }, - "CVE-2016-10723": { - "cmt_msg": "mm, oom: remove sleep from under oom_lock" + "CVE-2023-52632": { + "cmt_msg": "drm/amdkfd: Fix lock dependency warning with srcu" }, - "CVE-2019-19036": { - "cmt_msg": "btrfs: Detect unbalanced tree with empty leaf before crashing btree operations" + "CVE-2021-4037": { + "cmt_msg": "xfs: fix up non-directory creation in SGID directories" }, - "CVE-2019-3459": { - "cmt_msg": "Bluetooth: Verify that l2cap_get_conf_opt provides large enough buffer" + "CVE-2021-22543": { + "cmt_msg": "KVM: do not allow mapping valid but non-reference-counted pages" }, - "CVE-2020-11494": { - "cmt_msg": "slcan: Don't transmit uninitialized stack data in padding" + "CVE-2022-45884": { + "cmt_msg": "" }, - "CVE-2019-19039": { - "cmt_msg": "btrfs: Don't submit any btree write bio if the fs has errors" + "CVE-2019-1999": { + "cmt_msg": "binder: fix race between munmap() and direct reclaim" }, - "CVE-2020-0444": { - "cmt_msg": "audit: fix error handling in audit_data_to_entry()" + "CVE-2023-20941": { + "cmt_msg": "" }, - "CVE-2022-1419": { - "cmt_msg": "drm/vgem: Close use-after-free race in vgem_gem_create" + "CVE-2020-10135": { + "cmt_msg": "Bluetooth: Consolidate encryption handling in hci_encrypt_cfm" }, - "CVE-2022-1836": { - "cmt_msg": "floppy: disable FDRAWCMD by default" + "CVE-2019-7308": { + "cmt_msg": "bpf: fix sanitation of alu op with pointer / scalar type from different paths" }, - "CVE-2020-11884": { - "cmt_msg": "s390/mm: fix page table upgrade vs 2ndary address mode accesses" + "CVE-2024-26784": { + "cmt_msg": "pmdomain: arm: Fix NULL dereference on scmi_perf_domain removal" }, - "CVE-2021-32078": { - "cmt_msg": "ARM: footbridge: remove personal server platform" + "CVE-2022-1966": { + "cmt_msg": "netfilter: nf_tables: disallow non-stateful expression in sets earlier" }, - "CVE-2022-30594": { - "cmt_msg": "ptrace: Check PTRACE_O_SUSPEND_SECCOMP permission on PTRACE_SEIZE" + "CVE-2017-9986": { + "cmt_msg": "sound: Retire OSS" + }, + "CVE-2017-9985": { + "cmt_msg": "ALSA: msnd: Optimize / harden DSP and MIDI loops" + }, + "CVE-2021-3587": { + "cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect" }, - "CVE-2022-4662": { - "cmt_msg": "USB: core: Prevent nested device-reset calls" + "CVE-2022-3533": { + "cmt_msg": "" }, - "CVE-2019-11833": { - "cmt_msg": "ext4: zero out the unused memory region in the extent tree block" + "CVE-2022-3534": { + "cmt_msg": "libbpf: Fix use-after-free in btf_dump_name_dups" }, - "CVE-2021-38205": { - "cmt_msg": "net: xilinx_emaclite: Do not print real IOMEM pointer" + "CVE-2021-47135": { + "cmt_msg": "mt76: mt7921: fix possible AOOB issue in mt7921_mcu_tx_rate_report" }, - "CVE-2020-27835": { - "cmt_msg": "IB/hfi1: Ensure correct mm is used at all times" + "CVE-2021-20261": { + "cmt_msg": "floppy: fix lock_fdc() signal handling" }, - "CVE-2020-27830": { - "cmt_msg": "speakup: Reject setting the speakup line discipline outside of speakup" + "CVE-2021-47137": { + "cmt_msg": "net: lantiq: fix memory corruption in RX ring" }, - "CVE-2020-0255": { - "cmt_msg": "selinux: properly handle multiple messages in selinux_netlink_send()" + "CVE-2021-47131": { + "cmt_msg": "net/tls: Fix use-after-free after the TLS device goes down and up" }, - "CVE-2023-35001": { - "cmt_msg": "netfilter: nf_tables: prevent OOB access in nft_byteorder_eval" + "CVE-2021-47133": { + "cmt_msg": "HID: amd_sfh: Fix memory leak in amd_sfh_work" }, - "CVE-2022-27666": { - "cmt_msg": "esp: Fix possible buffer overflow in ESP transformation" + "CVE-2024-26675": { + "cmt_msg": "ppp_async: limit MRU to 64K" }, - "CVE-2021-38208": { - "cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect" + "CVE-2022-3061": { + "cmt_msg": "video: fbdev: i740fb: Error out if 'pixclock' equals zero" }, - "CVE-2019-2213": { - "cmt_msg": "binder: fix possible UAF when freeing buffer" + "CVE-2023-28328": { + "cmt_msg": "media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer()" }, - "CVE-2020-25211": { - "cmt_msg": "netfilter: ctnetlink: add a range check for l3/l4 protonum" + "CVE-2023-0386": { + "cmt_msg": "ovl: fail on invalid uid/gid mapping at copy up" }, - "CVE-2020-25212": { - "cmt_msg": "nfs: Fix getxattr kernel panic and memory overflow" + "CVE-2023-52638": { + "cmt_msg": "can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock" }, - "CVE-2020-26556": { + "CVE-2017-13693": { "cmt_msg": "" }, - "CVE-2020-26557": { + "CVE-2017-13695": { + "cmt_msg": "ACPICA: acpi: acpica: fix acpi operand cache leak in nseval.c" + }, + "CVE-2017-13694": { "cmt_msg": "" }, - "CVE-2022-48619": { - "cmt_msg": "Input: add bounds checking to input_set_capability()" + "CVE-2021-4149": { + "cmt_msg": "btrfs: unlock newly allocated extent buffer after error" }, - "CVE-2020-26555": { - "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical" + "CVE-2022-21385": { + "cmt_msg": "net/rds: fix warn in rds_message_alloc_sgs" }, - "CVE-2019-20794": { - "cmt_msg": "" + "CVE-2022-42895": { + "cmt_msg": "Bluetooth: L2CAP: Fix attempting to access uninitialized memory" }, - "CVE-2018-9516": { - "cmt_msg": "HID: debug: check length before copy_to_user()" + "CVE-2021-3640": { + "cmt_msg": "Bluetooth: sco: Fix lock_sock() blockage by memcpy_from_msg()" }, - "CVE-2023-3397": { - "cmt_msg": "" + "CVE-2022-48626": { + "cmt_msg": "moxart: fix potential use-after-free on remove path" }, - "CVE-2018-1128": { - "cmt_msg": "libceph: add authorizer challenge" + "CVE-2022-48627": { + "cmt_msg": "vt: fix memory overlapping when deleting chars in the buffer" }, - "CVE-2018-1129": { - "cmt_msg": "libceph: implement CEPHX_V2 calculation mode" + "CVE-2021-47180": { + "cmt_msg": "NFC: nci: fix memory leak in nci_allocate_device" }, - "CVE-2022-26365": { - "cmt_msg": "xen/blkfront: fix leaking data in shared pages" + "CVE-2022-48628": { + "cmt_msg": "ceph: drop messages from MDS when unmounting" }, - "CVE-2023-52458": { - "cmt_msg": "block: add check that partition length needs to be aligned with block size" + "CVE-2020-28097": { + "cmt_msg": "vgacon: remove software scrollback support" }, - "CVE-2018-20854": { - "cmt_msg": "phy: ocelot-serdes: fix out-of-bounds read" + "CVE-2024-24859": { + "cmt_msg": "" }, - "CVE-2018-1121": { + "CVE-2024-24858": { "cmt_msg": "" }, - "CVE-2018-20856": { - "cmt_msg": "block: blk_init_allocated_queue() set q->fq as NULL in the fail case" + "CVE-2024-24855": { + "cmt_msg": "scsi: lpfc: Fix a possible data race in lpfc_unregister_fcf_rescan()" }, - "CVE-2023-52451": { - "cmt_msg": "powerpc/pseries/memhp: Fix access beyond end of drmem array" + "CVE-2024-24857": { + "cmt_msg": "" }, - "CVE-2019-19046": { - "cmt_msg": "ipmi: Fix memory leak in __ipmi_bmc_register" + "CVE-2021-29265": { + "cmt_msg": "usbip: fix stub_dev usbip_sockfd_store() races leading to gpf" }, - "CVE-2019-19045": { - "cmt_msg": "net/mlx5: prevent memory leak in mlx5_fpga_conn_create_cq" + "CVE-2021-39648": { + "cmt_msg": "usb: gadget: configfs: Fix use-after-free issue with udc_name" }, - "CVE-2022-2961": { - "cmt_msg": "" + "CVE-2022-3545": { + "cmt_msg": "nfp: fix use-after-free in area_cache_get()" }, - "CVE-2023-2176": { - "cmt_msg": "RDMA/core: Refactor rdma_bind_addr" + "CVE-2023-52569": { + "cmt_msg": "btrfs: remove BUG() after failure to insert delayed dir index item" }, - "CVE-2024-1086": { - "cmt_msg": "netfilter: nf_tables: reject QUEUE/DROP verdict parameters" + "CVE-2023-52568": { + "cmt_msg": "x86/sgx: Resolves SECS reclaim vs. page fault for EAUG race" }, - "CVE-2024-22386": { - "cmt_msg": "" + "CVE-2022-3542": { + "cmt_msg": "bnx2x: fix potential memory leak in bnx2x_tpa_stop()" }, - "CVE-2019-9466": { - "cmt_msg": "brcmfmac: add subtype check for event handling in data path" + "CVE-2023-52563": { + "cmt_msg": "drm/meson: fix memory leak on ->hpd_notify callback" }, - "CVE-2020-11565": { - "cmt_msg": "mm: mempolicy: require at least one nodeid for MPOL_PREFERRED" + "CVE-2019-16921": { + "cmt_msg": "RDMA/hns: Fix init resp when alloc ucontext" }, - "CVE-2019-19048": { - "cmt_msg": "virt: vbox: fix memory leak in hgcm_call_preprocess_linaddr" + "CVE-2023-52561": { + "cmt_msg": "arm64: dts: qcom: sdm845-db845c: Mark cont splash memory region as reserved" }, - "CVE-2019-19049": { - "cmt_msg": "of: unittest: fix memory leak in unittest_data_add" + "CVE-2023-52566": { + "cmt_msg": "nilfs2: fix potential use after free in nilfs_gccache_submit_read_data()" }, - "CVE-2022-0644": { - "cmt_msg": "vfs: check fd has read access in kernel_read_file_from_fd()" + "CVE-2021-21781": { + "cmt_msg": "ARM: ensure the signal page contains defined contents" }, - "CVE-2020-27784": { - "cmt_msg": "usb: gadget: function: printer: fix use-after-free in __lock_acquire" + "CVE-2021-0512": { + "cmt_msg": "HID: make arrays usage and value to be the same" }, - "CVE-2018-13053": { - "cmt_msg": "alarmtimer: Prevent overflow for relative nanosleep" + "CVE-2023-1382": { + "cmt_msg": "tipc: set con sock in tipc_conn_alloc" }, - "CVE-2020-27786": { - "cmt_msg": "ALSA: rawmidi: Fix racy buffer resize under concurrent accesses" + "CVE-2023-1380": { + "cmt_msg": "wifi: brcmfmac: slab-out-of-bounds read in brcmf_get_assoc_ies()" }, - "CVE-2019-14816": { - "cmt_msg": "mwifiex: Fix three heap overflow at parsing element in cfg80211_ap_settings" + "CVE-2021-46924": { + "cmt_msg": "NFC: st21nfca: Fix memory leak in device probe and remove" }, - "CVE-2019-14814": { - "cmt_msg": "mwifiex: Fix three heap overflow at parsing element in cfg80211_ap_settings" + "CVE-2021-46926": { + "cmt_msg": "ALSA: hda: intel-sdw-acpi: harden detection of controller" }, - "CVE-2019-14815": { - "cmt_msg": "mwifiex: Fix three heap overflow at parsing element in cfg80211_ap_settings" + "CVE-2020-0347": { + "cmt_msg": "" }, - "CVE-2023-6240": { + "CVE-2022-41222": { + "cmt_msg": "mm/mremap: hold the rmap lock in write mode when moving page table entries." + }, + "CVE-2021-40490": { + "cmt_msg": "ext4: fix race writing to an inline_data file while its xattrs are changing" + }, + "CVE-2021-33909": { + "cmt_msg": "seq_file: disallow extremely large seq buffer allocations" + }, + "CVE-2019-12456": { "cmt_msg": "" }, - "CVE-2023-23559": { - "cmt_msg": "wifi: rndis_wlan: Prevent buffer overflow in rndis_query_oid" + "CVE-2015-8952": { + "cmt_msg": "ext2: convert to mbcache2" }, - "CVE-2020-10720": { - "cmt_msg": "net-gro: fix use-after-free read in napi_gro_frags()" + "CVE-2022-20565": { + "cmt_msg": "HID: core: Correctly handle ReportSize being zero" }, - "CVE-2022-0382": { - "cmt_msg": "net ticp:fix a kernel-infoleak in __tipc_sendmsg()" + "CVE-2021-33656": { + "cmt_msg": "vt: drop old FONT ioctls" }, - "CVE-2023-32233": { - "cmt_msg": "netfilter: nf_tables: deactivate anonymous set from preparation phase" + "CVE-2024-26720": { + "cmt_msg": "mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again" }, - "CVE-2020-25672": { - "cmt_msg": "nfc: fix memory leak in llcp_sock_connect()" + "CVE-2021-33655": { + "cmt_msg": "fbcon: Disallow setting font bigger than screen size" }, - "CVE-2019-9455": { - "cmt_msg": "media: videobuf2-v4l2: drop WARN_ON in vb2_warn_zero_bytesused()" + "CVE-2022-41858": { + "cmt_msg": "drivers: net: slip: fix NPD bug in sl_tx_timeout()" }, - "CVE-2020-25670": { - "cmt_msg": "nfc: fix refcount leak in llcp_sock_bind()" + "CVE-2024-26726": { + "cmt_msg": "btrfs: don't drop extent_map for free space inode on write error" }, - "CVE-2020-25671": { - "cmt_msg": "nfc: fix refcount leak in llcp_sock_connect()" + "CVE-2023-1206": { + "cmt_msg": "tcp: Reduce chance of collisions in inet6_hashfn()." }, - "CVE-2018-21008": { - "cmt_msg": "rsi: add fix for crash during assertions" + "CVE-2022-41850": { + "cmt_msg": "HID: roccat: Fix use-after-free in roccat_read()" }, - "CVE-2019-15223": { - "cmt_msg": "ALSA: line6: Assure canceling delayed work at disconnection" + "CVE-2023-2985": { + "cmt_msg": "fs: hfsplus: fix UAF issue in hfsplus_put_super" }, - "CVE-2019-19813": { - "cmt_msg": "btrfs: inode: Verify inode mode to avoid NULL pointer dereference" + "CVE-2020-14390": { + "cmt_msg": "fbcon: remove soft scrollback code" }, - "CVE-2019-15221": { - "cmt_msg": "ALSA: line6: Fix write on zero-sized buffer" + "CVE-2022-3649": { + "cmt_msg": "nilfs2: fix use-after-free bug of struct nilfs_root" }, - "CVE-2019-19815": { - "cmt_msg": "f2fs: support swap file w/ DIO" + "CVE-2017-10663": { + "cmt_msg": "f2fs: sanity check checkpoint segno and blkoff" }, - "CVE-2019-19814": { + "CVE-2017-10662": { + "cmt_msg": "f2fs: sanity check segment count" + }, + "CVE-2022-1184": { + "cmt_msg": "ext4: verify dir block before splitting it" + }, + "CVE-2022-3642": { "cmt_msg": "" }, - "CVE-2020-29371": { - "cmt_msg": "romfs: fix uninitialized memory leak in romfs_dev_read()" + "CVE-2024-0584": { + "cmt_msg": "ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet" }, - "CVE-2019-19816": { - "cmt_msg": "btrfs: inode: Verify inode mode to avoid NULL pointer dereference" + "CVE-2020-0465": { + "cmt_msg": "HID: core: Sanitize event code and type when mapping input" }, - "CVE-2023-1118": { - "cmt_msg": "media: rc: Fix use-after-free bugs caused by ene_tx_irqsim()" + "CVE-2021-1048": { + "cmt_msg": "fix regression in \"epoll: Keep a reference on files added to the check list\"" }, - "CVE-2022-1016": { - "cmt_msg": "netfilter: nf_tables: initialize registers in nft_do_chain()" + "CVE-2023-52516": { + "cmt_msg": "dma-debug: don't call __dma_entry_alloc_check_leak() under free_entries_lock" }, - "CVE-2018-18710": { - "cmt_msg": "cdrom: fix improper type cast, which can leat to information leak." + "CVE-2021-4218": { + "cmt_msg": "sysctl: pass kernel pointers to ->proc_handler" }, - "CVE-2019-5108": { - "cmt_msg": "mac80211: Do not send Layer 2 Update frame before authorization" + "CVE-2023-52515": { + "cmt_msg": "RDMA/srp: Do not call scsi_done() from srp_abort()" }, - "CVE-2022-0001": { - "cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE" + "CVE-2019-15902": { + "cmt_msg": "" }, - "CVE-2022-1012": { - "cmt_msg": "secure_seq: use the 64 bits of the siphash for port offset calculation" + "CVE-2024-25739": { + "cmt_msg": "" }, - "CVE-2020-12114": { - "cmt_msg": "make struct mountpoint bear the dentry reference to mountpoint, not struct mount" + "CVE-2023-52511": { + "cmt_msg": "spi: sun6i: reduce DMA RX transfer width to single byte" }, - "CVE-2020-8649": { - "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region" + "CVE-2024-0340": { + "cmt_msg": "vhost: use kzalloc() instead of kmalloc() followed by memset()" }, - "CVE-2020-12656": { - "cmt_msg": "sunrpc: check that domain table is empty at module unload." + "CVE-2023-6535": { + "cmt_msg": "" }, - "CVE-2020-14356": { - "cmt_msg": "cgroup: fix cgroup_sk_alloc() for sk_clone_lock()" + "CVE-2023-6536": { + "cmt_msg": "nvmet-tcp: fix a crash in nvmet_req_complete()" }, - "CVE-2021-26931": { - "cmt_msg": "xen-blkback: don't \"handle\" error by BUG()" + "CVE-2021-27365": { + "cmt_msg": "scsi: iscsi: Ensure sysfs attributes are limited to PAGE_SIZE" }, - "CVE-2021-26930": { - "cmt_msg": "xen-blkback: fix error handling in xen_blkbk_map()" + "CVE-2021-27364": { + "cmt_msg": "scsi: iscsi: Restrict sessions and handles to admin capabilities" }, - "CVE-2021-42252": { - "cmt_msg": "soc: aspeed: lpc-ctrl: Fix boundary check for mmap" + "CVE-2021-27363": { + "cmt_msg": "scsi: iscsi: Restrict sessions and handles to admin capabilities" }, - "CVE-2021-26932": { - "cmt_msg": "Xen/x86: don't bail early from clear_foreign_p2m_mapping()" + "CVE-2022-23036": { + "cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()" }, - "CVE-2023-52456": { - "cmt_msg": "serial: imx: fix tx statemachine deadlock" + "CVE-2018-17977": { + "cmt_msg": "" }, - "CVE-2023-3141": { - "cmt_msg": "memstick: r592: Fix UAF bug in r592_remove due to race condition" + "CVE-2024-26659": { + "cmt_msg": "xhci: handle isoc Babble and Buffer Overrun events properly" }, - "CVE-2022-0492": { - "cmt_msg": "cgroup-v1: Require capabilities to set release_agent" + "CVE-2024-26658": { + "cmt_msg": "bcachefs: grab s_umount only if snapshotting" }, - "CVE-2020-12352": { - "cmt_msg": "Bluetooth: A2MP: Fix not initializing all members" + "CVE-2010-5321": { + "cmt_msg": "" }, - "CVE-2020-12351": { - "cmt_msg": "Bluetooth: L2CAP: Fix calling sk_filter on non-socket based channel" + "CVE-2024-26655": { + "cmt_msg": "Fix memory leak in posix_clock_open()" }, - "CVE-2020-12655": { - "cmt_msg": "xfs: add agf freeblocks verify in xfs_agf_verify" + "CVE-2024-26654": { + "cmt_msg": "ALSA: sh: aica: reorder cleanup operations to avoid UAF bugs" }, - "CVE-2022-20132": { - "cmt_msg": "HID: add hid_is_usb() function to make it simpler for USB detection" + "CVE-2021-20321": { + "cmt_msg": "ovl: fix missing negative dentry check in ovl_rename()" }, - "CVE-2022-0494": { - "cmt_msg": "block-map: add __GFP_ZERO flag for alloc_page in function bio_copy_kern" + "CVE-2024-26651": { + "cmt_msg": "sr9800: Add check for usbnet_get_endpoints" }, - "CVE-2023-2269": { - "cmt_msg": "dm ioctl: fix nested locking in table_clear() to remove deadlock concern" + "CVE-2024-26650": { + "cmt_msg": "platform/x86: p2sb: Allow p2sb_bar() calls during PCI device probe" }, - "CVE-2020-26088": { - "cmt_msg": "net/nfc/rawsock.c: add CAP_NET_RAW check." + "CVE-2022-42896": { + "cmt_msg": "Bluetooth: L2CAP: Fix accepting connection request for invalid SPSM" }, - "CVE-2022-3524": { - "cmt_msg": "tcp/udp: Fix memory leak in ipv6_renew_options()." + "CVE-2017-5967": { + "cmt_msg": "time: Remove CONFIG_TIMER_STATS" }, - "CVE-2022-3523": { - "cmt_msg": "mm/memory.c: fix race when faulting a device private page" + "CVE-2023-7192": { + "cmt_msg": "netfilter: ctnetlink: fix possible refcount leak in ctnetlink_create_conntrack()" }, - "CVE-2022-3522": { - "cmt_msg": "mm/hugetlb: use hugetlb_pte_stable in migration race check" + "CVE-2022-3169": { + "cmt_msg": "nvme: ensure subsystem reset is single threaded" }, - "CVE-2008-2544": { - "cmt_msg": "" + "CVE-2022-36280": { + "cmt_msg": "drm/vmwgfx: Validate the box size for the snooped cursor" }, - "CVE-2021-3178": { - "cmt_msg": "nfsd4: readdirplus shouldn't return parent of export" + "CVE-2019-2054": { + "cmt_msg": "arm/ptrace: run seccomp after ptrace" }, - "CVE-2022-42703": { - "cmt_msg": "mm/rmap: Fix anon_vma->degree ambiguity leading to double-reuse" + "CVE-2023-52475": { + "cmt_msg": "Input: powermate - fix use-after-free in powermate_config_complete" }, - "CVE-2018-7755": { - "cmt_msg": "floppy: Do not copy a kernel pointer to user memory in FDGETPRM ioctl" + "CVE-2023-52477": { + "cmt_msg": "usb: hub: Guard against accesses to uninitialized BOS descriptors" }, - "CVE-2019-15031": { - "cmt_msg": "powerpc/tm: Fix restoring FP/VMX facility incorrectly on interrupts" + "CVE-2023-52476": { + "cmt_msg": "perf/x86/lbr: Filter vsyscall addresses" }, - "CVE-2019-15030": { - "cmt_msg": "powerpc/tm: Fix FP/VMX unavailable exceptions inside a transaction" + "CVE-2016-10147": { + "cmt_msg": "crypto: mcryptd - Check mcryptd algorithm compatibility" }, - "CVE-2022-0330": { - "cmt_msg": "drm/i915: Flush TLBs before releasing backing store" + "CVE-2023-52470": { + "cmt_msg": "drm/radeon: check the alloc_workqueue return value in radeon_crtc_init()" }, - "CVE-2007-3719": { + "CVE-2024-21803": { "cmt_msg": "" }, - "CVE-2023-3863": { - "cmt_msg": "net: nfc: Fix use-after-free caused by nfc_llcp_find_local" + "CVE-2023-52479": { + "cmt_msg": "ksmbd: fix uaf in smb20_oplock_break_ack" }, - "CVE-2023-0590": { - "cmt_msg": "net: sched: fix race condition in qdisc_graft()" + "CVE-2023-52478": { + "cmt_msg": "HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect" }, - "CVE-2022-4095": { - "cmt_msg": "staging: rtl8712: fix use after free bugs" + "CVE-2021-3542": { + "cmt_msg": "" }, - "CVE-2022-3621": { - "cmt_msg": "nilfs2: fix NULL pointer dereference at nilfs_bmap_lookup_at_level()" + "CVE-2022-20166": { + "cmt_msg": "drivers core: Use sysfs_emit and sysfs_emit_at for show(device *...) functions" }, - "CVE-2019-19319": { - "cmt_msg": "ext4: protect journal inode's blocks using block_validity" + "CVE-2023-30456": { + "cmt_msg": "KVM: nVMX: add missing consistency checks for CR0 and CR4" }, - "CVE-2019-19462": { - "cmt_msg": "kernel/relay.c: handle alloc_percpu returning NULL in relay_open" + "CVE-2020-12656": { + "cmt_msg": "sunrpc: check that domain table is empty at module unload." }, - "CVE-2023-30772": { - "cmt_msg": "power: supply: da9150: Fix use after free bug in da9150_charger_remove due to race condition" + "CVE-2022-23040": { + "cmt_msg": "xen/xenbus: don't let xenbus_grant_ring() remove grants in error case" }, - "CVE-2022-24958": { - "cmt_msg": "usb: gadget: don't release an existing dev->buf" + "CVE-2020-12655": { + "cmt_msg": "xfs: add agf freeblocks verify in xfs_agf_verify" }, - "CVE-2023-1611": { - "cmt_msg": "btrfs: fix race between quota disable and quota assign ioctls" + "CVE-2018-12929": { + "cmt_msg": "" }, - "CVE-2021-3772": { - "cmt_msg": "sctp: use init_tag from inithdr for ABORT chunk" + "CVE-2019-12380": { + "cmt_msg": "efi/x86/Add missing error handling to old_memmap 1:1 mapping code" }, - "CVE-2023-3268": { - "cmt_msg": "relayfs: fix out-of-bounds access in relay_file_read" + "CVE-2019-12381": { + "cmt_msg": "ip_sockglue: Fix missing-check bug in ip_ra_control()" }, - "CVE-2021-3679": { - "cmt_msg": "tracing: Fix bug in rb_per_cpu_empty() that might cause deadloop." + "CVE-2020-36310": { + "cmt_msg": "KVM: SVM: avoid infinite loop on NPF from bad address" }, - "CVE-2021-39711": { - "cmt_msg": "bpf: fix panic due to oob in bpf_prog_test_run_skb" + "CVE-2020-36313": { + "cmt_msg": "KVM: Fix out of range accesses to memslots" }, - "CVE-2022-3629": { - "cmt_msg": "vsock: Fix memory leak in vsock_connect()" + "CVE-2020-35519": { + "cmt_msg": "net/x25: prevent a couple of overflows" }, - "CVE-2021-28715": { - "cmt_msg": "xen/netback: don't queue unlimited number of packages" + "CVE-2024-26592": { + "cmt_msg": "ksmbd: fix UAF issue in ksmbd_tcp_new_connection()" }, - "CVE-2021-28714": { - "cmt_msg": "xen/netback: fix rx queue stall detection" + "CVE-2022-48619": { + "cmt_msg": "Input: add bounds checking to input_set_capability()" }, - "CVE-2021-28713": { - "cmt_msg": "xen/console: harden hvc_xen against event channel storms" + "CVE-2020-10708": { + "cmt_msg": "" }, - "CVE-2021-28712": { - "cmt_msg": "xen/netfront: harden netfront against event channel storms" + "CVE-2022-0400": { + "cmt_msg": "" }, - "CVE-2020-10781": { - "cmt_msg": "Revert \"zram: convert remaining CLASS_ATTR() to CLASS_ATTR_RO()\"" + "CVE-2024-25741": { + "cmt_msg": "" }, - "CVE-2021-4157": { - "cmt_msg": "pNFS/flexfiles: fix incorrect size check in decode_nfs_fh()" + "CVE-2024-26808": { + "cmt_msg": "netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain" }, - "CVE-2022-2991": { - "cmt_msg": "remove the lightnvm subsystem" + "CVE-2024-26809": { + "cmt_msg": "netfilter: nft_set_pipapo: release elements in clone only from destroy path" }, - "CVE-2021-35039": { - "cmt_msg": "module: limit enabling module.sig_enforce" + "CVE-2022-26966": { + "cmt_msg": "sr9700: sanity check for packet length" }, - "CVE-2022-23960": { - "cmt_msg": "ARM: report Spectre v2 status through sysfs" + "CVE-2021-42739": { + "cmt_msg": "media: firewire: firedtv-avc: fix a buffer overflow in avc_ca_pmt()" }, - "CVE-2023-51781": { - "cmt_msg": "appletalk: Fix Use-After-Free in atalk_ioctl" + "CVE-2023-1989": { + "cmt_msg": "Bluetooth: btsdio: fix use after free bug in btsdio_remove due to unfinished work" }, - "CVE-2022-3624": { - "cmt_msg": "bonding: fix reference count leak in balance-alb mode" + "CVE-2024-26806": { + "cmt_msg": "spi: cadence-qspi: remove system-wide suspend helper calls from runtime PM hooks" }, - "CVE-2022-2588": { - "cmt_msg": "net_sched: cls_route: remove from list when handle is 0" + "CVE-2020-12771": { + "cmt_msg": "bcache: fix potential deadlock problem in btree_gc_coalesce" }, - "CVE-2021-39657": { - "cmt_msg": "scsi: ufs: Correct the LUN used in eh_device_reset_handler() callback" + "CVE-2024-26802": { + "cmt_msg": "stmmac: Clear variable when destroying workqueue" }, - "CVE-2021-3669": { - "cmt_msg": "ipc: replace costly bailout check in sysvipc_find_ipc()" + "CVE-2023-52508": { + "cmt_msg": "nvme-fc: Prevent null pointer dereference in nvme_fc_io_getuuid()" }, - "CVE-2019-3701": { - "cmt_msg": "can: gw: ensure DLC boundaries after CAN frame modification" + "CVE-2023-52606": { + "cmt_msg": "powerpc/lib: Validate size for vector operations" }, - "CVE-2020-10708": { - "cmt_msg": "" + "CVE-2022-20369": { + "cmt_msg": "media: v4l2-mem2mem: Apply DST_QUEUE_OFF_BASE on MMAP buffers across ioctls" }, - "CVE-2023-1095": { - "cmt_msg": "netfilter: nf_tables: fix null deref due to zeroed list head" + "CVE-2023-52604": { + "cmt_msg": "FS:JFS:UBSAN:array-index-out-of-bounds in dbAdjTree" }, - "CVE-2019-11091": { - "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" + "CVE-2023-52602": { + "cmt_msg": "jfs: fix slab-out-of-bounds Read in dtSearch" }, - "CVE-2022-3239": { - "cmt_msg": "media: em28xx: initialize refcount before kref_get" + "CVE-2023-52603": { + "cmt_msg": "UBSAN: array-index-out-of-bounds in dtSplitRoot" }, - "CVE-2022-4543": { + "CVE-2022-25265": { "cmt_msg": "" }, - "CVE-2021-37576": { - "cmt_msg": "KVM: PPC: Book3S: Fix H_RTAS rets buffer overflow" + "CVE-2022-20368": { + "cmt_msg": "net/packet: fix slab-out-of-bounds access in packet_recvmsg()" }, - "CVE-2020-15780": { - "cmt_msg": "ACPI: configfs: Disallow loading ACPI tables when locked down" + "CVE-2020-25285": { + "cmt_msg": "mm/hugetlb: fix a race between hugetlb sysctl handlers" }, - "CVE-2023-4921": { - "cmt_msg": "net: sched: sch_qfq: Fix UAF in qfq_dequeue()" + "CVE-2023-52609": { + "cmt_msg": "binder: fix race between mmput() and do_exit()" }, - "CVE-2022-3424": { - "cmt_msg": "misc: sgi-gru: fix use-after-free error in gru_set_context_option, gru_fault and gru_handle_user_call_os" + "CVE-2022-21499": { + "cmt_msg": "lockdown: also lock down previous kgdb use" }, - "CVE-2023-23455": { - "cmt_msg": "net: sched: atm: dont intepret cls results when asked to drop" + "CVE-2020-25284": { + "cmt_msg": "rbd: require global CAP_SYS_ADMIN for mapping and unmapping" }, - "CVE-2023-1829": { - "cmt_msg": "net/sched: Retire tcindex classifier" + "CVE-2015-3339": { + "cmt_msg": "fs: take i_mutex during prepare_binprm for set[ug]id executables" }, - "CVE-2019-18282": { - "cmt_msg": "net/flow_dissector: switch to siphash" + "CVE-2023-20593": { + "cmt_msg": "x86/cpu/amd: Add a Zenbleed fix" }, - "CVE-2021-34981": { - "cmt_msg": "Bluetooth: cmtp: fix file refcount when cmtp_attach_device fails" + "CVE-2023-3022": { + "cmt_msg": "ipv6: Use result arg in fib_lookup_arg consistently" }, - "CVE-2023-1670": { - "cmt_msg": "xirc2ps_cs: Fix use after free bug in xirc2ps_detach" + "CVE-2022-2663": { + "cmt_msg": "netfilter: nf_conntrack_irc: Fix forged IP logic" }, - "CVE-2018-14625": { - "cmt_msg": "vhost/vsock: fix use-after-free in network stack callers" + "CVE-2022-43750": { + "cmt_msg": "usb: mon: make mmapped memory read only" }, - "CVE-2023-4881": { - "cmt_msg": "netfilter: nftables: exthdr: fix 4-byte stack OOB write" + "CVE-2023-0047": { + "cmt_msg": "mm, oom: do not trigger out_of_memory from the #PF" }, - "CVE-2020-24394": { - "cmt_msg": "nfsd: apply umask on fs without ACL support" + "CVE-2021-47046": { + "cmt_msg": "drm/amd/display: Fix off by one in hdmi_14_process_transaction()" }, - "CVE-2023-6915": { - "cmt_msg": "ida: Fix crash in ida_free when the bitmap is empty" + "CVE-2023-4010": { + "cmt_msg": "" }, - "CVE-2022-20148": { - "cmt_msg": "f2fs: fix UAF in f2fs_available_free_memory" + "CVE-2021-47165": { + "cmt_msg": "drm/meson: fix shutdown crash when component not probed" }, - "CVE-2024-0607": { - "cmt_msg": "netfilter: nf_tables: fix pointer math issue in nft_byteorder_eval()" + "CVE-2021-46969": { + "cmt_msg": "bus: mhi: core: Fix invalid error returning in mhi_queue" }, - "CVE-2013-7445": { - "cmt_msg": "" + "CVE-2021-47160": { + "cmt_msg": "net: dsa: mt7530: fix VLAN traffic leaks" }, - "CVE-2023-32269": { - "cmt_msg": "netrom: Fix use-after-free caused by accept on already connected socket" + "CVE-2023-4385": { + "cmt_msg": "fs: jfs: fix possible NULL pointer dereference in dbFree()" }, - "CVE-2018-18445": { - "cmt_msg": "bpf: 32-bit RSH verification must truncate input before the ALU op" + "CVE-2021-46965": { + "cmt_msg": "mtd: physmap: physmap-bt1-rom: Fix unintentional stack access" }, - "CVE-2023-34255": { - "cmt_msg": "xfs: verify buffer contents when we skip log replay" + "CVE-2021-46962": { + "cmt_msg": "mmc: uniphier-sd: Fix a resource leak in the remove function" }, - "CVE-2019-13233": { - "cmt_msg": "x86/insn-eval: Fix use-after-free access to LDT entry" + "CVE-2021-47168": { + "cmt_msg": "NFS: fix an incorrect limit in filelayout_decode_layout()" }, - "CVE-2022-26966": { - "cmt_msg": "sr9700: sanity check for packet length" + "CVE-2019-19378": { + "cmt_msg": "" }, - "CVE-2023-6931": { - "cmt_msg": "perf: Fix perf_event_validate_size()" + "CVE-2022-1016": { + "cmt_msg": "netfilter: nf_tables: initialize registers in nft_do_chain()" }, - "CVE-2020-14386": { - "cmt_msg": "net/packet: fix overflow in tpacket_rcv" + "CVE-2020-4788": { + "cmt_msg": "powerpc/64s: flush L1D on kernel entry" }, - "CVE-2021-34693": { - "cmt_msg": "can: bcm: fix infoleak in struct bcm_msg_head" + "CVE-2022-36879": { + "cmt_msg": "xfrm: xfrm_policy: fix a possible double xfrm_pols_put() in xfrm_bundle_lookup()" }, - "CVE-2020-14385": { - "cmt_msg": "xfs: fix boundary test in xfs_attr_shortform_verify" + "CVE-2021-39698": { + "cmt_msg": "wait: add wake_up_pollfree()" }, - "CVE-2019-19767": { - "cmt_msg": "ext4: add more paranoia checking in ext4_expand_extra_isize handling" + "CVE-2022-45934": { + "cmt_msg": "Bluetooth: L2CAP: Fix u8 overflow" }, - "CVE-2021-3656": { - "cmt_msg": "KVM: nSVM: always intercept VMLOAD/VMSAVE when nested (CVE-2021-3656)" + "CVE-2019-19377": { + "cmt_msg": "btrfs: Don't submit any btree write bio if the fs has errors" }, - "CVE-2020-14381": { - "cmt_msg": "futex: Fix inode life-time issue" + "CVE-2022-2380": { + "cmt_msg": "video: fbdev: sm712fb: Fix crash in smtcfb_read()" }, - "CVE-2019-19768": { - "cmt_msg": "blktrace: Protect q->blk_trace with RCU" + "CVE-2022-0850": { + "cmt_msg": "ext4: fix kernel infoleak via ext4_extent_header" }, - "CVE-2022-3303": { - "cmt_msg": "ALSA: pcm: oss: Fix race at SNDCTL_DSP_SYNC" + "CVE-2017-13166": { + "cmt_msg": "media: v4l2-ioctl.c: use check_fmt for enum/g/s/try_fmt" }, - "CVE-2023-52443": { - "cmt_msg": "apparmor: avoid crash when parsed profile name is empty" + "CVE-2021-3612": { + "cmt_msg": "Input: joydev - prevent potential read overflow in ioctl" }, - "CVE-2022-20141": { - "cmt_msg": "igmp: Add ip_mc_list lock in ip_check_mc_rcu" + "CVE-2020-24503": { + "cmt_msg": "" }, - "CVE-2020-25704": { - "cmt_msg": "perf/core: Fix a memory leak in perf_event_parse_addr_filter()" + "CVE-2020-24502": { + "cmt_msg": "" }, - "CVE-2021-45095": { - "cmt_msg": "phonet: refcount leak in pep_sock_accep" + "CVE-2019-19448": { + "cmt_msg": "btrfs: only search for left_info if there is no right_info in try_merge_free_space" }, - "CVE-2023-23454": { - "cmt_msg": "net: sched: cbq: dont intepret cls results when asked to drop" + "CVE-2019-19449": { + "cmt_msg": "f2fs: fix to do sanity check on segment/section count" }, - "CVE-2021-37159": { - "cmt_msg": "usb: hso: fix error handling code of hso_create_net_device" + "CVE-2021-3753": { + "cmt_msg": "vt_kdsetmode: extend console locking" }, - "CVE-2024-26595": { - "cmt_msg": "mlxsw: spectrum_acl_tcam: Fix NULL pointer dereference in error path" + "CVE-2021-3752": { + "cmt_msg": "Bluetooth: fix use-after-free error in lock_sock_nested()" }, - "CVE-2018-3620": { - "cmt_msg": "x86/microcode: Allow late microcode loading with SMT disabled" + "CVE-2024-26774": { + "cmt_msg": "ext4: avoid dividing by 0 in mb_update_avg_fragment_size() when block bitmap corrupt" }, - "CVE-2023-6932": { - "cmt_msg": "ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet" + "CVE-2021-0937": { + "cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write" }, - "CVE-2020-16166": { - "cmt_msg": "random32: update the net random state on interrupt and activity" + "CVE-2017-18249": { + "cmt_msg": "f2fs: fix race condition in between free nid allocator/initializer" }, - "CVE-2021-29155": { - "cmt_msg": "bpf: Use correct permission flag for mixed signed bounds arithmetic" + "CVE-2022-1263": { + "cmt_msg": "KVM: avoid NULL pointer dereference in kvm_dirty_ring_push" }, - "CVE-2021-33631": { - "cmt_msg": "ext4: fix kernel BUG in 'ext4_write_inline_data_end()'" + "CVE-2021-35477": { + "cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4" }, - "CVE-2019-15916": { - "cmt_msg": "net-sysfs: Fix mem leak in netdev_register_kobject" + "CVE-2023-31436": { + "cmt_msg": "net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg" }, - "CVE-2019-15917": { - "cmt_msg": "Bluetooth: hci_ldisc: Postpone HCI_UART_PROTO_READY bit set in hci_uart_set_proto()" + "CVE-2022-3606": { + "cmt_msg": "" }, - "CVE-2019-15918": { - "cmt_msg": "cifs: Fix lease buffer length error" + "CVE-2022-2209": { + "cmt_msg": "" }, - "CVE-2023-52444": { - "cmt_msg": "f2fs: fix to avoid dirent corruption" + "CVE-2019-12614": { + "cmt_msg": "powerpc/pseries/dlpar: Fix a missing check in dlpar_parse_cc_property()" }, - "CVE-2020-12362": { - "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" + "CVE-2021-37576": { + "cmt_msg": "KVM: PPC: Book3S: Fix H_RTAS rets buffer overflow" }, - "CVE-2020-12363": { - "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" + "CVE-2024-26775": { + "cmt_msg": "aoe: avoid potential deadlock at set_capacity" }, - "CVE-2019-12881": { - "cmt_msg": "drm/i915/userptr: reject zero user_size" + "CVE-2023-45871": { + "cmt_msg": "igb: set max size RX buffer when store bad packet is enabled" }, - "CVE-2022-4129": { - "cmt_msg": "l2tp: Serialize access to sk_user_data with sk_callback_lock" + "CVE-2021-47179": { + "cmt_msg": "NFSv4: Fix a NULL pointer dereference in pnfs_mark_matching_lsegs_return()" }, - "CVE-2023-3117": { - "cmt_msg": "netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE" + "CVE-2023-7042": { + "cmt_msg": "wifi: ath10k: fix NULL pointer dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev()" }, - "CVE-2022-28389": { - "cmt_msg": "can: mcba_usb: mcba_usb_start_xmit(): fix double dev_kfree_skb in error path" + "CVE-2022-3594": { + "cmt_msg": "r8152: Rate limit overflow messages" }, - "CVE-2020-12364": { - "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" + "CVE-2022-3595": { + "cmt_msg": "cifs: fix double-fault crash during ntlmssp" }, - "CVE-2018-18690": { - "cmt_msg": "xfs: don't fail when converting shortform attr to long form during ATTR_REPLACE" + "CVE-2023-52559": { + "cmt_msg": "iommu/vt-d: Avoid memory allocation in iommu_suspend()" }, - "CVE-2022-28388": { - "cmt_msg": "can: usb_8dev: usb_8dev_start_xmit(): fix double dev_kfree_skb() in error path" + "CVE-2023-47233": { + "cmt_msg": "wifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach" }, - "CVE-2023-33203": { - "cmt_msg": "net: qcom/emac: Fix use after free bug in emac_remove due to race condition" + "CVE-2020-27815": { + "cmt_msg": "jfs: Fix array index bounds check in dbAdjTree" }, - "CVE-2021-0605": { - "cmt_msg": "af_key: pfkey_dump needs parameter validation" + "CVE-2023-52629": { + "cmt_msg": "sh: push-switch: Reorder cleanup operations to avoid use-after-free bug" }, - "CVE-2021-3896": { - "cmt_msg": "isdn: cpai: check ctr->cnr to avoid array index out of bound" + "CVE-2022-1462": { + "cmt_msg": "tty: use new tty_insert_flip_string_and_push_buffer() in pty_write()" }, - "CVE-2021-4002": { - "cmt_msg": "hugetlbfs: flush TLBs correctly after huge_pmd_unshare" + "CVE-2024-26758": { + "cmt_msg": "md: Don't ignore suspended array in md_check_recovery()" }, - "CVE-2023-26545": { - "cmt_msg": "net: mpls: fix stale pointer if allocation fails during device rename" + "CVE-2024-26759": { + "cmt_msg": "mm/swap: fix race when skipping swapcache" }, - "CVE-2021-38204": { - "cmt_msg": "usb: max-3421: Prevent corruption of freed memory" + "CVE-2023-6606": { + "cmt_msg": "smb: client: fix OOB in smbCalcSize()" }, - "CVE-2022-34918": { - "cmt_msg": "netfilter: nf_tables: stricter validation of element data" + "CVE-2020-27777": { + "cmt_msg": "powerpc/rtas: Restrict RTAS requests from userspace" }, - "CVE-2022-20008": { - "cmt_msg": "mmc: block: fix read single on recovery logic" + "CVE-2017-1000405": { + "cmt_msg": "mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d()" }, - "CVE-2021-3894": { - "cmt_msg": "sctp: account stream padding length for reconf chunk" + "CVE-2024-26752": { + "cmt_msg": "l2tp: pass correct message length to ip6_append_data" }, - "CVE-2019-18786": { - "cmt_msg": "media: rcar_drif: fix a memory disclosure" + "CVE-2020-27673": { + "cmt_msg": "xen/events: add a proper barrier to 2-level uevent unmasking" }, - "CVE-2019-20810": { - "cmt_msg": "media: go7007: fix a miss of snd_card_free" + "CVE-2020-27675": { + "cmt_msg": "xen/events: avoid removing an event channel while handling it" }, - "CVE-2023-52464": { - "cmt_msg": "EDAC/thunderx: Fix possible out-of-bounds string access" + "CVE-2024-26756": { + "cmt_msg": "md: Don't register sync_thread for reshape directly" }, - "CVE-2019-20812": { - "cmt_msg": "af_packet: set defaule value for tmo" + "CVE-2020-28915": { + "cmt_msg": "fbcon: Fix global-out-of-bounds read in fbcon_get_font()" }, - "CVE-2020-8834": { - "cmt_msg": "KVM: PPC: Book3S HV: Factor fake-suspend handling out of kvmppc_save/restore_tm" + "CVE-2021-47169": { + "cmt_msg": "serial: rp2: use 'request_firmware' instead of 'request_firmware_nowait'" }, - "CVE-2023-1990": { - "cmt_msg": "nfc: st-nci: Fix use after free bug in ndlc_remove due to race condition" + "CVE-2019-20908": { + "cmt_msg": "efi: Restrict efivar_ssdt_load when the kernel is locked down" }, - "CVE-2020-14314": { - "cmt_msg": "ext4: fix potential negative array index in do_split()" + "CVE-2023-3776": { + "cmt_msg": "net/sched: cls_fw: Fix improper refcount update leads to use-after-free" }, - "CVE-2018-5391": { - "cmt_msg": "ip: discard IPv4 datagrams with overlapping segments." + "CVE-2021-28038": { + "cmt_msg": "Xen/gnttab: handle p2m update errors on a per-slot basis" }, - "CVE-2018-18955": { - "cmt_msg": "userns: also map extents in the reverse map to kernel IDs" + "CVE-2022-3111": { + "cmt_msg": "power: supply: wm8350-power: Add missing free in free_charger_irq" }, - "CVE-2019-18660": { - "cmt_msg": "powerpc/book3s64: Fix link stack flush on context switch" + "CVE-2023-52434": { + "cmt_msg": "smb: client: fix potential OOBs in smb2_parse_contexts()" }, - "CVE-2019-15291": { - "cmt_msg": "media: b2c2-flexcop-usb: add sanity checking" + "CVE-2023-52436": { + "cmt_msg": "f2fs: explicitly null-terminate the xattr list" }, - "CVE-2019-15290": { - "cmt_msg": "" + "CVE-2019-19060": { + "cmt_msg": "iio: imu: adis16400: release allocated memory on failure" }, - "CVE-2023-3212": { - "cmt_msg": "gfs2: Don't deref jdesc in evict" + "CVE-2019-19061": { + "cmt_msg": "iio: imu: adis16400: fix memory leak" }, - "CVE-2024-23848": { - "cmt_msg": "" + "CVE-2019-19063": { + "cmt_msg": "rtlwifi: prevent memory leak in rtl_usb_probe" }, - "CVE-2018-10902": { - "cmt_msg": "ALSA: rawmidi: Change resized buffers atomically" + "CVE-2019-9445": { + "cmt_msg": "f2fs: check if file namelen exceeds max value" }, - "CVE-2023-4459": { - "cmt_msg": "net: vmxnet3: fix possible NULL pointer dereference in vmxnet3_rq_cleanup()" + "CVE-2021-3506": { + "cmt_msg": "f2fs: fix to avoid out-of-bounds memory access" }, - "CVE-2022-23036": { - "cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()" + "CVE-2020-0435": { + "cmt_msg": "f2fs: fix to do sanity check with i_extra_isize" }, - "CVE-2022-2153": { - "cmt_msg": "KVM: x86: Avoid theoretical NULL pointer dereference in kvm_irq_delivery_to_apic_fast()" + "CVE-2020-0432": { + "cmt_msg": "staging: most: net: fix buffer overflow" }, - "CVE-2022-20566": { - "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free caused by l2cap_chan_put" + "CVE-2020-0433": { + "cmt_msg": "blk-mq: sync the update nr_hw_queues with blk_mq_queue_tag_busy_iter" }, - "CVE-2018-12930": { - "cmt_msg": "" + "CVE-2023-51779": { + "cmt_msg": "Bluetooth: af_bluetooth: Fix Use-After-Free in bt_sock_recvmsg" }, - "CVE-2018-12931": { - "cmt_msg": "" + "CVE-2019-3874": { + "cmt_msg": "sctp: implement memory accounting on tx path" }, - "CVE-2024-23196": { + "CVE-2023-6915": { + "cmt_msg": "ida: Fix crash in ida_free when the bitmap is empty" + }, + "CVE-2010-4563": { "cmt_msg": "" }, - "CVE-2020-12768": { - "cmt_msg": "KVM: SVM: Fix potential memory leak in svm_cpu_init()" + "CVE-2023-52565": { + "cmt_msg": "media: uvcvideo: Fix OOB read" }, - "CVE-2020-12769": { - "cmt_msg": "spi: spi-dw: Add lock protect dw_spi rx/tx to prevent concurrent calls" + "CVE-2023-1249": { + "cmt_msg": "coredump: Use the vma snapshot in fill_files_note" }, - "CVE-2021-32399": { - "cmt_msg": "bluetooth: eliminate the potential race condition when removing the HCI controller" + "CVE-2023-2162": { + "cmt_msg": "scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress" }, - "CVE-2023-3338": { - "cmt_msg": "Remove DECnet support from kernel" + "CVE-2017-15116": { + "cmt_msg": "crypto: rng - Remove old low-level rng interface" }, - "CVE-2019-12380": { - "cmt_msg": "efi/x86/Add missing error handling to old_memmap 1:1 mapping code" + "CVE-2022-1280": { + "cmt_msg": "drm: avoid circular locks in drm_mode_getconnector" }, - "CVE-2019-12381": { - "cmt_msg": "ip_sockglue: Fix missing-check bug in ip_ra_control()" + "CVE-2024-23851": { + "cmt_msg": "dm: limit the number of targets and parameter size area" }, - "CVE-2019-12382": { - "cmt_msg": "drm/edid: Fix a missing-check bug in drm_load_edid_firmware()" + "CVE-2023-0266": { + "cmt_msg": "ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF" }, - "CVE-2022-22942": { - "cmt_msg": "drm/vmwgfx: Fix stale file descriptors on failed usercopy" + "CVE-2021-46928": { + "cmt_msg": "parisc: Clear stale IIR value on instruction access rights trap" }, - "CVE-2018-20669": { - "cmt_msg": "make 'user_access_begin()' do 'access_ok()'" + "CVE-2021-3483": { + "cmt_msg": "firewire: nosy: Fix a use-after-free bug in nosy_ioctl()" }, - "CVE-2019-19543": { - "cmt_msg": "media: serial_ir: Fix use-after-free in serial_ir_init_module" + "CVE-2023-6040": { + "cmt_msg": "netfilter: nf_tables: Reject tables of unsupported family" }, - "CVE-2021-3732": { - "cmt_msg": "ovl: prevent private clone if bind mount is not allowed" + "CVE-2021-38300": { + "cmt_msg": "bpf, mips: Validate conditional branch offsets" }, - "CVE-2022-25375": { - "cmt_msg": "usb: gadget: rndis: check size of RNDIS_MSG_SET command" + "CVE-2020-25656": { + "cmt_msg": "vt: keyboard, extend func_buf_lock to readers" }, - "CVE-2020-10766": { - "cmt_msg": "x86/speculation: Prevent rogue cross-process SSBD shutdown" + "CVE-2022-24448": { + "cmt_msg": "NFSv4: Handle case where the lookup of a directory fails" }, - "CVE-2020-10767": { - "cmt_msg": "x86/speculation: Avoid force-disabling IBPB based on STIBP and enhanced IBRS." + "CVE-2023-52498": { + "cmt_msg": "PM: sleep: Fix possible deadlocks in core system-wide PM code" }, - "CVE-2018-12207": { - "cmt_msg": "kvm: x86, powerpc: do not allow clearing largepages debugfs entry" + "CVE-2021-4023": { + "cmt_msg": "io-wq: fix cancellation on create-worker failure" }, - "CVE-2022-20369": { - "cmt_msg": "media: v4l2-mem2mem: Apply DST_QUEUE_OFF_BASE on MMAP buffers across ioctls" + "CVE-2023-52640": { + "cmt_msg": "fs/ntfs3: Fix oob in ntfs_listxattr" }, - "CVE-2018-12633": { - "cmt_msg": "virt: vbox: Only copy_from_user the request-header once" + "CVE-2023-52641": { + "cmt_msg": "fs/ntfs3: Add NULL ptr dereference checking at the end of attr_allocate_frame()" }, - "CVE-2020-10768": { - "cmt_msg": "x86/speculation: PR_SPEC_FORCE_DISABLE enforcement for indirect branches." + "CVE-2022-2318": { + "cmt_msg": "net: rose: fix UAF bugs caused by timer handler" }, - "CVE-2017-13168": { - "cmt_msg": "scsi: sg: mitigate read/write abuse" + "CVE-2021-22555": { + "cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write" }, - "CVE-2024-25740": { + "CVE-2021-0399": { "cmt_msg": "" }, - "CVE-2019-0148": { - "cmt_msg": "i40e: Wrong truncation from u16 to u8" + "CVE-2023-52488": { + "cmt_msg": "serial: sc16is7xx: convert from _raw_ to _noinc_ regmap functions for FIFO" }, - "CVE-2022-2978": { - "cmt_msg": "fs: fix UAF/GPF bug in nilfs_mdt_destroy" + "CVE-2020-36691": { + "cmt_msg": "netlink: limit recursion depth in policy validation" }, - "CVE-2019-17075": { - "cmt_msg": "RDMA/cxgb4: Do not dma memory off of the stack" + "CVE-2021-47070": { + "cmt_msg": "uio_hv_generic: Fix another memory leak in error handling paths" }, - "CVE-2022-3903": { - "cmt_msg": "media: mceusb: Use new usb_control_msg_*() routines" + "CVE-2023-42755": { + "cmt_msg": "net/sched: Retire rsvp classifier" }, - "CVE-2019-19447": { - "cmt_msg": "ext4: work around deleting a file with i_nlink == 0 safely" + "CVE-2020-36516": { + "cmt_msg": "ipv4: avoid using shared IP generator for connected sockets" }, - "CVE-2019-0146": { - "cmt_msg": "i40e: add num_vectors checker in iwarp handler" + "CVE-2023-52486": { + "cmt_msg": "drm: Don't unref the same fb many times by mistake due to deadlock handling" }, - "CVE-2019-0147": { - "cmt_msg": "i40e: add num_vectors checker in iwarp handler" + "CVE-2023-52480": { + "cmt_msg": "ksmbd: fix race condition between session lookup and expire" }, - "CVE-2020-10942": { - "cmt_msg": "vhost: Check docket sk_family instead of call getname" + "CVE-2012-4542": { + "cmt_msg": "" }, - "CVE-2019-0145": { - "cmt_msg": "i40e: add num_vectors checker in iwarp handler" + "CVE-2023-52482": { + "cmt_msg": "x86/srso: Add SRSO mitigation for Hygon processors" }, - "CVE-2022-44034": { - "cmt_msg": "char: pcmcia: remove all the drivers" + "CVE-2023-1838": { + "cmt_msg": "Fix double fget() in vhost_net_set_backend()" }, - "CVE-2022-44033": { - "cmt_msg": "char: pcmcia: remove all the drivers" + "CVE-2023-1118": { + "cmt_msg": "media: rc: Fix use-after-free bugs caused by ene_tx_irqsim()" }, - "CVE-2019-11191": { - "cmt_msg": "x86: Deprecate a.out support" + "CVE-2021-3573": { + "cmt_msg": "Bluetooth: use correct lock to prevent UAF of hdev object" }, - "CVE-2023-39198": { - "cmt_msg": "drm/qxl: fix UAF on handle creation" + "CVE-2022-1679": { + "cmt_msg": "ath9k: fix use-after-free in ath9k_hif_usb_rx_cb" }, - "CVE-2018-10323": { - "cmt_msg": "xfs: set format back to extents if xfs_bmap_extents_to_btree" + "CVE-2018-1000026": { + "cmt_msg": "bnx2x: disable GSO where gso_size is too big for hardware" }, - "CVE-2018-10322": { - "cmt_msg": "xfs: enhance dinode verifier" + "CVE-2022-1975": { + "cmt_msg": "NFC: netlink: fix sleep in atomic bug when firmware download timeout" }, - "CVE-2020-26139": { - "cmt_msg": "mac80211: do not accept/forward invalid EAPOL frames" + "CVE-2022-44032": { + "cmt_msg": "char: pcmcia: remove all the drivers" }, - "CVE-2019-10220": { - "cmt_msg": "Convert filldir[64]() from __put_user() to unsafe_put_user()" + "CVE-2018-12130": { + "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" }, - "CVE-2021-3609": { - "cmt_msg": "can: bcm: delay release of struct bcm_op after synchronize_rcu()" + "CVE-2021-47083": { + "cmt_msg": "pinctrl: mediatek: fix global-out-of-bounds issue" }, - "CVE-2019-19536": { - "cmt_msg": "can: peak_usb: pcan_usb_pro: Fix info-leaks to USB devices" + "CVE-2021-20292": { + "cmt_msg": "drm/ttm/nouveau: don't call tt destroy callback on alloc failure." }, - "CVE-2019-19537": { - "cmt_msg": "USB: core: Fix races in character device registration and deregistraion" + "CVE-2021-31916": { + "cmt_msg": "dm ioctl: fix out of bounds array access when no devices" }, - "CVE-2019-19534": { - "cmt_msg": "can: peak_usb: fix slab info leak" + "CVE-2017-8065": { + "cmt_msg": "crypto: ccm - move cbcmac input off the stack" }, - "CVE-2019-19535": { - "cmt_msg": "can: peak_usb: pcan_usb_fd: Fix info-leaks to USB devices" + "CVE-2022-32981": { + "cmt_msg": "powerpc/32: Fix overread/overwrite of thread_struct via ptrace" }, - "CVE-2019-19532": { - "cmt_msg": "HID: Fix assumption that devices have inputs" + "CVE-2021-47122": { + "cmt_msg": "net: caif: fix memory leak in caif_device_notify" }, - "CVE-2018-14617": { - "cmt_msg": "hfsplus: fix NULL dereference in hfsplus_lookup()" + "CVE-2021-47121": { + "cmt_msg": "net: caif: fix memory leak in cfusbl_device_notify" }, - "CVE-2019-19530": { - "cmt_msg": "usb: cdc-acm: make sure a refcount is taken early enough" + "CVE-2023-3772": { + "cmt_msg": "xfrm: add NULL check in xfrm_update_ae_params" }, - "CVE-2019-10639": { - "cmt_msg": "netns: provide pure entropy for net_hash_mix()" + "CVE-2021-47125": { + "cmt_msg": "sch_htb: fix refcount leak in htb_parent_to_leaf_offload" }, - "CVE-2022-33981": { - "cmt_msg": "floppy: disable FDRAWCMD by default" + "CVE-2020-11669": { + "cmt_msg": "powerpc/powernv/idle: Restore AMR/UAMOR/AMOR after idle" }, - "CVE-2021-0929": { - "cmt_msg": "staging/android/ion: delete dma_buf->kmap/unmap implemenation" + "CVE-2021-47170": { + "cmt_msg": "USB: usbfs: Don't WARN about excessively large memory allocations" }, - "CVE-2018-14616": { - "cmt_msg": "f2fs: fix to do sanity check with block address in main area v2" + "CVE-2023-2269": { + "cmt_msg": "dm ioctl: fix nested locking in table_clear() to remove deadlock concern" }, - "CVE-2019-20095": { - "cmt_msg": "mwifiex: Fix mem leak in mwifiex_tm_cmd" + "CVE-2023-0394": { + "cmt_msg": "ipv6: raw: Deduct extension header length in rawv6_push_pending_frames" }, - "CVE-2018-19985": { - "cmt_msg": "USB: hso: Fix OOB memory access in hso_probe/hso_get_config_data" + "CVE-2023-32269": { + "cmt_msg": "netrom: Fix use-after-free caused by accept on already connected socket" }, - "CVE-2018-6554": { - "cmt_msg": "staging: irda: remove the irda network stack and drivers" + "CVE-2021-3659": { + "cmt_msg": "net: mac802154: Fix general protection fault" }, - "CVE-2018-6555": { - "cmt_msg": "staging: irda: remove the irda network stack and drivers" + "CVE-2022-25258": { + "cmt_msg": "USB: gadget: validate interface OS descriptor requests" }, - "CVE-2021-0920": { - "cmt_msg": "af_unix: fix garbage collect vs MSG_PEEK" + "CVE-2021-4155": { + "cmt_msg": "xfs: map unwritten blocks in XFS_IOC_{ALLOC,FREE}SP just like fallocate" }, - "CVE-2022-0168": { - "cmt_msg": "cifs: fix NULL ptr dereference in smb2_ioctl_query_info()" + "CVE-2021-4150": { + "cmt_msg": "block: fix incorrect references to disk objects" }, - "CVE-2018-14610": { - "cmt_msg": "btrfs: Check that each block group has corresponding chunk at mount time" + "CVE-2020-3702": { + "cmt_msg": "ath: Use safer key clearing with key cache entries" }, - "CVE-2024-26587": { - "cmt_msg": "net: netdevsim: don't try to destroy PHC on VFs" + "CVE-2023-52485": { + "cmt_msg": "drm/amd/display: Wake DMCUB before sending a command" }, - "CVE-2023-51043": { - "cmt_msg": "drm/atomic: Fix potential use-after-free in nonblocking commits" + "CVE-2021-3653": { + "cmt_msg": "KVM: nSVM: avoid picking up unsupported bits from L2 in int_ctl (CVE-2021-3653)" }, - "CVE-2020-28374": { - "cmt_msg": "scsi: target: Fix XCOPY NAA identifier lookup" + "CVE-2021-3655": { + "cmt_msg": "sctp: validate from_addr_param return" }, - "CVE-2019-9213": { - "cmt_msg": "mm: enforce min addr even if capable() in expand_downwards()" + "CVE-2020-8694": { + "cmt_msg": "powercap: restrict energy meter to root access" }, - "CVE-2023-2007": { - "cmt_msg": "scsi: dpt_i2o: Remove obsolete driver" + "CVE-2021-4159": { + "cmt_msg": "bpf: Verifer, adjust_scalar_min_max_vals to always call update_reg_bounds()" }, - "CVE-2023-0615": { - "cmt_msg": "media: vivid: dev->bitmap_cap wasn't freed in all cases" + "CVE-2021-29154": { + "cmt_msg": "bpf, x86: Validate computation of branch displacements for x86-64" }, - "CVE-2019-14896": { - "cmt_msg": "libertas: Fix two buffer overflows at parsing bss descriptor" + "CVE-2019-12615": { + "cmt_msg": "mdesc: fix a missing-check bug in get_vdev_port_node_info()" }, - "CVE-2019-14897": { - "cmt_msg": "libertas: Fix two buffer overflows at parsing bss descriptor" + "CVE-2021-3714": { + "cmt_msg": "" }, - "CVE-2019-14895": { - "cmt_msg": "mwifiex: fix possible heap overflow in mwifiex_process_country_ie()" + "CVE-2019-11487": { + "cmt_msg": "fs: prevent page refcount overflow in pipe_buf_get" }, - "CVE-2022-3586": { - "cmt_msg": "sch_sfb: Don't assume the skb is still around after enqueueing to child" + "CVE-2019-16230": { + "cmt_msg": "drm/amdkfd: fix a potential NULL pointer dereference (v2)" }, - "CVE-2022-43750": { - "cmt_msg": "usb: mon: make mmapped memory read only" + "CVE-2017-12168": { + "cmt_msg": "arm64: KVM: pmu: Fix AArch32 cycle counter access" }, - "CVE-2020-27825": { - "cmt_msg": "tracing: Fix race in trace_open and buffer resize call" + "CVE-2019-16233": { + "cmt_msg": "scsi: qla2xxx: fix a potential NULL pointer dereference" }, - "CVE-2019-2181": { - "cmt_msg": "binder: check for overflow when alloc for security context" + "CVE-2021-3892": { + "cmt_msg": "" }, - "CVE-2020-27820": { - "cmt_msg": "drm/nouveau: use drm_dev_unplug() during device removal" + "CVE-2021-39633": { + "cmt_msg": "ip_gre: add validation for csum_start" }, - "CVE-2020-26141": { - "cmt_msg": "ath10k: Fix TKIP Michael MIC verification for PCIe" + "CVE-2021-39636": { + "cmt_msg": "netfilter: x_tables: fix pointer leaks to userspace" }, - "CVE-2020-0067": { - "cmt_msg": "f2fs: fix to avoid memory leakage in f2fs_listxattr" + "CVE-2017-18204": { + "cmt_msg": "ocfs2: should wait dio before inode lock in ocfs2_setattr()" }, - "CVE-2023-4622": { - "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES" + "CVE-2021-39634": { + "cmt_msg": "epoll: do not insert into poll queues until all sanity checks are done" }, - "CVE-2020-26558": { - "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical" + "CVE-2022-25375": { + "cmt_msg": "usb: gadget: rndis: check size of RNDIS_MSG_SET command" }, - "CVE-2023-39193": { - "cmt_msg": "netfilter: xt_sctp: validate the flag_info count" + "CVE-2022-33742": { + "cmt_msg": "xen/blkfront: force data bouncing when backend is untrusted" }, - "CVE-2023-1079": { - "cmt_msg": "HID: asus: use spinlock to safely schedule workers" + "CVE-2022-33741": { + "cmt_msg": "xen/netfront: force data bouncing when backend is untrusted" }, - "CVE-2020-26541": { - "cmt_msg": "certs: Add EFI_CERT_X509_GUID support for dbx entries" + "CVE-2018-20509": { + "cmt_msg": "binder: refactor binder ref inc/dec for thread safety" }, - "CVE-2019-20811": { - "cmt_msg": "net-sysfs: call dev_hold if kobject_init_and_add success" + "CVE-2024-24864": { + "cmt_msg": "" }, - "CVE-2020-26559": { + "CVE-2022-45885": { "cmt_msg": "" }, - "CVE-2021-20317": { - "cmt_msg": "lib/timerqueue: Rely on rbtree semantics for next timer" + "CVE-2022-33744": { + "cmt_msg": "xen/arm: Fix race in RB-tree based P2M accounting" }, - "CVE-2021-43389": { - "cmt_msg": "isdn: cpai: check ctr->cnr to avoid array index out of bound" + "CVE-2023-52596": { + "cmt_msg": "sysctl: Fix out of bounds access for empty sysctl registers" }, - "CVE-2023-3111": { - "cmt_msg": "btrfs: unset reloc control if transaction commit fails in prepare_to_relocate()" + "CVE-2023-52597": { + "cmt_msg": "KVM: s390: fix setting of fpc register" }, - "CVE-2021-33061": { - "cmt_msg": "ixgbe: add improvement for MDD response functionality" + "CVE-2017-18193": { + "cmt_msg": "f2fs: fix a bug caused by NULL extent tree" }, - "CVE-2023-1476": { - "cmt_msg": "" + "CVE-2023-52595": { + "cmt_msg": "wifi: rt2x00: restart beacon queue when hardware reset" }, - "CVE-2023-4010": { - "cmt_msg": "" + "CVE-2023-52593": { + "cmt_msg": "wifi: wfx: fix possible NULL pointer dereference in wfx_set_mfp_ap()" }, - "CVE-2023-1074": { - "cmt_msg": "sctp: fail if no bound addresses can be used for a given scope" + "CVE-2021-47158": { + "cmt_msg": "net: dsa: sja1105: add error handling in sja1105_setup()" }, - "CVE-2021-3864": { - "cmt_msg": "" + "CVE-2023-52591": { + "cmt_msg": "reiserfs: Avoid touching renamed directory if parent does not change" }, - "CVE-2024-26584": { - "cmt_msg": "net: tls: handle backlogging of crypto requests" + "CVE-2021-45486": { + "cmt_msg": "inet: use bigger hash table for IP ID generation" }, - "CVE-2022-1652": { - "cmt_msg": "floppy: use a statically allocated error counter" + "CVE-2020-12888": { + "cmt_msg": "vfio-pci: Invalidate mmaps and block MMIO access on disabled memory" }, - "CVE-2023-4623": { - "cmt_msg": "net/sched: sch_hfsc: Ensure inner classes have fsc curve" + "CVE-2021-47153": { + "cmt_msg": "i2c: i801: Don't generate an interrupt on bus reset" }, - "CVE-2024-23849": { - "cmt_msg": "net/rds: Fix UBSAN: array-index-out-of-bounds in rds_cmsg_recv" + "CVE-2023-52598": { + "cmt_msg": "s390/ptrace: handle setting of fpc register correctly" }, - "CVE-2020-29568": { - "cmt_msg": "xen/xenbus: Allow watches discard events before queueing" + "CVE-2021-47151": { + "cmt_msg": "interconnect: qcom: bcm-voter: add a missing of_node_put()" }, - "CVE-2020-29569": { - "cmt_msg": "xen-blkback: set ring->xenblkd to NULL after kthread_stop()" + "CVE-2021-46936": { + "cmt_msg": "net: fix use-after-free in tw_timer_handler" }, - "CVE-2020-14351": { - "cmt_msg": "perf/core: Fix race in the perf_mmap_close() function" + "CVE-2016-6198": { + "cmt_msg": "vfs: add vfs_select_inode() helper" }, - "CVE-2019-19054": { - "cmt_msg": "media: rc: prevent memory leak in cx23888_ir_probe" + "CVE-2024-26627": { + "cmt_msg": "scsi: core: Move scsi_host_busy() out of host lock for waking up EH handler" }, - "CVE-2019-19057": { - "cmt_msg": "mwifiex: pcie: Fix memory leak in mwifiex_pcie_init_evt_ring" + "CVE-2022-41218": { + "cmt_msg": "media: dvb-core: Fix UAF due to refcount races at releasing" }, - "CVE-2019-19056": { - "cmt_msg": "mwifiex: pcie: Fix memory leak in mwifiex_pcie_alloc_cmdrsp_buf" + "CVE-2011-4917": { + "cmt_msg": "" }, - "CVE-2019-9453": { - "cmt_msg": "f2fs: fix to avoid accessing xattr across the boundary" + "CVE-2022-36946": { + "cmt_msg": "netfilter: nf_queue: do not allow packet truncation below transport header offset" }, - "CVE-2023-23039": { - "cmt_msg": "" + "CVE-2021-45485": { + "cmt_msg": "ipv6: use prandom_u32() for ID generation" }, - "CVE-2019-19052": { - "cmt_msg": "can: gs_usb: gs_can_open(): prevent memory leak" + "CVE-2021-0448": { + "cmt_msg": "netfilter: ctnetlink: add a range check for l3/l4 protonum" }, - "CVE-2019-3846": { - "cmt_msg": "mwifiex: Fix possible buffer overflows at parsing bss descriptor" + "CVE-2016-6197": { + "cmt_msg": "ovl: verify upper dentry before unlink and rename" }, - "CVE-2023-46838": { - "cmt_msg": "xen-netback: don't produce zero-size SKB frags" + "CVE-2021-46939": { + "cmt_msg": "tracing: Restructure trace_clock_global() to never block" }, - "CVE-2020-0427": { - "cmt_msg": "pinctrl: devicetree: Avoid taking direct reference to device name string" + "CVE-2020-0030": { + "cmt_msg": "ANDROID: binder: synchronize_rcu() when using POLLFREE." }, - "CVE-2022-2977": { - "cmt_msg": "tpm: fix reference counting for struct tpm_chip" + "CVE-2024-26622": { + "cmt_msg": "tomoyo: fix UAF write bug in tomoyo_write_control()" }, - "CVE-2019-19058": { - "cmt_msg": "iwlwifi: dbg_ini: fix memory leak in alloc_sgtable" + "CVE-2021-29650": { + "cmt_msg": "netfilter: x_tables: Use correct memory barriers." }, - "CVE-2020-0423": { - "cmt_msg": "binder: fix UAF when releasing todo list" + "CVE-2024-26623": { + "cmt_msg": "pds_core: Prevent race issues involving the adminq" }, - "CVE-2019-9458": { - "cmt_msg": "media: v4l: event: Prevent freeing event subscriptions while accessed" + "CVE-2017-12762": { + "cmt_msg": "isdn/i4l: fix buffer overflow" }, - "CVE-2023-40283": { - "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb" + "CVE-2022-41849": { + "cmt_msg": "fbdev: smscufx: Fix use-after-free in ufx_ops_open()" }, - "CVE-2016-8660": { + "CVE-2022-41848": { "cmt_msg": "" }, - "CVE-2023-6270": { - "cmt_msg": "" + "CVE-2023-6356": { + "cmt_msg": "nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length" }, - "CVE-2023-3090": { - "cmt_msg": "ipvlan:Fix out-of-bounds caused by unclear skb->cb" + "CVE-2022-1353": { + "cmt_msg": "af_key: add __GFP_ZERO flag for compose_sadb_supported in function pfkey_register" }, - "CVE-2019-13272": { - "cmt_msg": "ptrace: Fix ->ptracer_cred handling for PTRACE_TRACEME" + "CVE-2022-28356": { + "cmt_msg": "llc: fix netdevice reference leaks in llc_ui_bind()" }, - "CVE-2023-1073": { - "cmt_msg": "HID: check empty report_list in hid_validate_values()" + "CVE-2022-1198": { + "cmt_msg": "drivers: hamradio: 6pack: fix UAF bug caused by mod_timer()" }, - "CVE-2023-45862": { - "cmt_msg": "USB: ene_usb6250: Allocate enough memory for full object" + "CVE-2022-1199": { + "cmt_msg": "ax25: Fix NULL pointer dereference in ax25_kill_by_device" }, - "CVE-2023-45863": { - "cmt_msg": "kobject: Fix slab-out-of-bounds in fill_kobj_path()" + "CVE-2015-8966": { + "cmt_msg": "[PATCH] arm: fix handling of F_OFD_... in oabi_fcntl64()" }, - "CVE-2023-1582": { - "cmt_msg": "fs/proc: task_mmu.c: don't read mapcount for migration entry" + "CVE-2015-8967": { + "cmt_msg": "arm64: make sys_call_table const" }, - "CVE-2022-1786": { - "cmt_msg": "io_uring: remove io_identity" + "CVE-2021-39801": { + "cmt_msg": "" }, - "CVE-2019-17351": { - "cmt_msg": "xen: let alloc_xenballooned_pages() fail if not enough memory free" + "CVE-2021-39800": { + "cmt_msg": "" }, - "CVE-2022-23222": { - "cmt_msg": "bpf: Replace PTR_TO_XXX_OR_NULL with PTR_TO_XXX | PTR_MAYBE_NULL" + "CVE-2019-3837": { + "cmt_msg": "net_dma: simple removal" }, - "CVE-2020-25669": { - "cmt_msg": "Input: sunkbd - avoid use-after-free in teardown paths" + "CVE-2022-1195": { + "cmt_msg": "hamradio: improve the incomplete fix to avoid NPD" }, - "CVE-2020-25668": { - "cmt_msg": "tty: make FONTX ioctl use the tty pointer they were actually passed" + "CVE-2024-22099": { + "cmt_msg": "Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security" }, - "CVE-2008-4609": { - "cmt_msg": "" + "CVE-2021-4202": { + "cmt_msg": "NFC: reorganize the functions in nci_request" }, - "CVE-2020-25705": { - "cmt_msg": "icmp: randomize the global rate limiter" + "CVE-2021-4203": { + "cmt_msg": "af_unix: fix races in sk_peer_pid and sk_peer_cred accesses" }, - "CVE-2022-0435": { - "cmt_msg": "tipc: improve size validations for received domain records" + "CVE-2022-45887": { + "cmt_msg": "media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb()" }, - "CVE-2022-20565": { - "cmt_msg": "HID: core: Correctly handle ReportSize being zero" + "CVE-2022-45886": { + "cmt_msg": "media: dvb-core: Fix use-after-free due on race condition at dvb_net" }, - "CVE-2023-52457": { - "cmt_msg": "serial: 8250: omap: Don't skip resource freeing if pm_runtime_resume_and_get() failed" + "CVE-2023-52509": { + "cmt_msg": "ravb: Fix use-after-free issue in ravb_tx_timeout_work()" }, - "CVE-2018-25020": { - "cmt_msg": "bpf: fix truncated jump targets on heavy expansions" + "CVE-2023-46343": { + "cmt_msg": "nfc: nci: fix possible NULL pointer dereference in send_acknowledge()" }, - "CVE-2018-5390": { - "cmt_msg": "tcp: free batches of packets in tcp_prune_ofo_queue()" + "CVE-2024-25744": { + "cmt_msg": "x86/coco: Disable 32-bit emulation by default on TDX and SEV" }, - "CVE-2021-4135": { - "cmt_msg": "netdevsim: Zero-initialize memory for new map's value in function nsim_bpf_map_alloc" + "CVE-2023-5178": { + "cmt_msg": "nvmet-tcp: Fix a possible UAF in queue intialization setup" }, - "CVE-2023-26607": { - "cmt_msg": "ntfs: fix out-of-bounds read in ntfs_attr_find()" + "CVE-2023-52507": { + "cmt_msg": "nfc: nci: assert requested protocol is valid" }, - "CVE-2018-20855": { - "cmt_msg": "IB/mlx5: Fix leaking stack memory to userspace" + "CVE-2023-2124": { + "cmt_msg": "xfs: verify buffer contents when we skip log replay" }, - "CVE-2019-15239": { - "cmt_msg": "unknown" + "CVE-2023-52501": { + "cmt_msg": "ring-buffer: Do not attempt to read past \"commit\"" }, - "CVE-2022-26373": { - "cmt_msg": "x86/speculation: Add RSB VM Exit protections" + "CVE-2023-52500": { + "cmt_msg": "scsi: pm80xx: Avoid leaking tags when processing OPC_INB_SET_CONTROLLER_CONFIG command" }, - "CVE-2021-4037": { - "cmt_msg": "xfs: fix up non-directory creation in SGID directories" + "CVE-2023-52502": { + "cmt_msg": "net: nfc: fix races in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn()" }, - "CVE-2021-22543": { - "cmt_msg": "KVM: do not allow mapping valid but non-reference-counted pages" + "CVE-2021-44879": { + "cmt_msg": "f2fs: fix to do sanity check on inode type during garbage collection" }, - "CVE-2022-45884": { - "cmt_msg": "" + "CVE-2023-2513": { + "cmt_msg": "ext4: fix use-after-free in ext4_xattr_set_entry" }, - "CVE-2021-3348": { - "cmt_msg": "nbd: freeze the queue while we're adding connections" + "CVE-2022-27672": { + "cmt_msg": "x86/speculation: Identify processors vulnerable to SMT RSB predictions" }, - "CVE-2019-1999": { - "cmt_msg": "binder: fix race between munmap() and direct reclaim" + "CVE-2022-2964": { + "cmt_msg": "net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup" }, - "CVE-2023-20941": { + "CVE-2015-2877": { "cmt_msg": "" }, - "CVE-2019-15292": { - "cmt_msg": "appletalk: Fix use-after-free in atalk_proc_exit" + "CVE-2024-26664": { + "cmt_msg": "hwmon: (coretemp) Fix out-of-bounds memory access" }, - "CVE-2018-20836": { - "cmt_msg": "scsi: libsas: fix a race condition when smp task timeout" + "CVE-2021-38198": { + "cmt_msg": "KVM: X86: MMU: Use the correct inherited permissions to get shadow page" }, - "CVE-2021-44733": { - "cmt_msg": "tee: handle lookup of shm with reference count 0" + "CVE-2024-26689": { + "cmt_msg": "ceph: prevent use-after-free in encode_cap_msg()" }, - "CVE-2021-3347": { - "cmt_msg": "futex: Ensure the correct return value from futex_lock_pi()" + "CVE-2017-5972": { + "cmt_msg": "tcp: do not lock listener to process SYN packets" }, - "CVE-2020-10135": { - "cmt_msg": "Bluetooth: Consolidate encryption handling in hci_encrypt_cfm" + "CVE-2023-34256": { + "cmt_msg": "ext4: avoid a potential slab-out-of-bounds in ext4_group_desc_csum" }, - "CVE-2020-25285": { - "cmt_msg": "mm/hugetlb: fix a race between hugetlb sysctl handlers" + "CVE-2023-1513": { + "cmt_msg": "kvm: initialize all of the kvm_debugregs structure before sending it to userspace" }, - "CVE-2019-7308": { - "cmt_msg": "bpf: fix sanitation of alu op with pointer / scalar type from different paths" + "CVE-2015-4004": { + "cmt_msg": "staging: ozwpan: Remove from tree" }, - "CVE-2021-45868": { - "cmt_msg": "quota: check block number when reading the block in quota file" + "CVE-2021-26401": { + "cmt_msg": "x86/speculation: Use generic retpoline by default on AMD" }, - "CVE-2022-1966": { - "cmt_msg": "netfilter: nf_tables: disallow non-stateful expression in sets earlier" + "CVE-2024-1312": { + "cmt_msg": "mm: lock_vma_under_rcu() must check vma->anon_vma under vma lock" }, - "CVE-2019-2025": { - "cmt_msg": "binder: fix race that allows malicious free of live buffer" + "CVE-2021-3847": { + "cmt_msg": "" }, - "CVE-2021-3587": { - "cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect" + "CVE-2022-2961": { + "cmt_msg": "" }, - "CVE-2019-16995": { - "cmt_msg": "net: hsr: fix memory leak in hsr_dev_finalize()" + "CVE-2023-52442": { + "cmt_msg": "ksmbd: validate session id and tree id in compound request" }, - "CVE-2019-16994": { - "cmt_msg": "net: sit: fix memory leak in sit_init_net()" + "CVE-2022-40768": { + "cmt_msg": "scsi: stex: Properly zero out the passthrough command structure" }, - "CVE-2022-3533": { + "CVE-2020-36557": { + "cmt_msg": "vt: vt_ioctl: fix VT_DISALLOCATE freeing in-use virtual console" + }, + "CVE-2023-52445": { + "cmt_msg": "media: pvrusb2: fix use after free on context disconnection" + }, + "CVE-2020-14331": { + "cmt_msg": "vgacon: Fix for missing check in scrollback handling" + }, + "CVE-2011-4916": { "cmt_msg": "" }, - "CVE-2022-3534": { - "cmt_msg": "libbpf: Fix use-after-free in btf_dump_name_dups" + "CVE-2023-52449": { + "cmt_msg": "mtd: Fix gluebi NULL pointer dereference caused by ftl notifier" }, - "CVE-2020-36516": { - "cmt_msg": "ipv4: avoid using shared IP generator for connected sockets" + "CVE-2020-36558": { + "cmt_msg": "vt: vt_ioctl: fix race in VT_RESIZEX" }, - "CVE-2020-36766": { - "cmt_msg": "cec-api: prevent leaking memory through hole in structure" + "CVE-2018-13100": { + "cmt_msg": "f2fs: fix to do sanity check with secs_per_zone" }, - "CVE-2022-3061": { - "cmt_msg": "video: fbdev: i740fb: Error out if 'pixclock' equals zero" + "CVE-2017-16646": { + "cmt_msg": "media: dib0700: fix invalid dvb_detach argument" }, - "CVE-2023-28328": { - "cmt_msg": "media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer()" + "CVE-2024-26733": { + "cmt_msg": "arp: Prevent overflow in arp_req_get()." }, - "CVE-2022-0322": { - "cmt_msg": "sctp: account stream padding length for reconf chunk" + "CVE-2024-26719": { + "cmt_msg": "nouveau: offload fence uevents work to workqueue" }, - "CVE-2023-0386": { - "cmt_msg": "ovl: fail on invalid uid/gid mapping at copy up" + "CVE-2019-5489": { + "cmt_msg": "Change mincore() to count \"mapped\" pages rather than \"cached\" pages" }, - "CVE-2023-6121": { - "cmt_msg": "nvmet: nul-terminate the NQNs passed in the connect command" + "CVE-2021-47082": { + "cmt_msg": "tun: avoid double free in tun_free_netdev" }, - "CVE-2017-13693": { - "cmt_msg": "" + "CVE-2024-26713": { + "cmt_msg": "powerpc/pseries/iommu: Fix iommu initialisation during DLPAR add" }, - "CVE-2022-0617": { - "cmt_msg": "udf: Fix NULL ptr deref when converting from inline format" + "CVE-2023-3338": { + "cmt_msg": "Remove DECnet support from kernel" }, - "CVE-2017-13694": { - "cmt_msg": "" + "CVE-2017-16648": { + "cmt_msg": "dvb_frontend: don't use-after-free the frontend struct" + } + } + }, + "6.7": { + "6.7": { + "CVE-2024-0193": { + "cmt_msg": "netfilter: nf_tables: skip set commit for deleted/destroyed sets", + "cmt_id": "7315dc1e122c85ffdfc8defffbb8f8b616c2eb1a" + } + }, + "6.7.1": { + "CVE-2023-52439": { + "cmt_msg": "uio: Fix use-after-free in uio_open", + "cmt_id": "913205930da6213305616ac539447702eaa85e41" }, - "CVE-2021-4149": { - "cmt_msg": "btrfs: unlock newly allocated extent buffer after error" + "CVE-2023-52438": { + "cmt_msg": "binder: fix use-after-free in shinker's callback", + "cmt_id": "e074686e993ff1be5f21b085a3b1b4275ccd5727" }, - "CVE-2022-21385": { - "cmt_msg": "net/rds: fix warn in rds_message_alloc_sgs" + "CVE-2023-52436": { + "cmt_msg": "f2fs: explicitly null-terminate the xattr list", + "cmt_id": "f6c30bfe5a49bc38cae985083a11016800708fea" + } + }, + "6.7.2": { + "CVE-2024-26592": { + "cmt_msg": "ksmbd: fix UAF issue in ksmbd_tcp_new_connection()", + "cmt_id": "69d54650b751532d1e1613a4fb433e591aeef126" }, - "CVE-2022-42895": { - "cmt_msg": "Bluetooth: L2CAP: Fix attempting to access uninitialized memory" + "CVE-2024-26590": { + "cmt_msg": "erofs: fix inconsistent per-file compression format", + "cmt_id": "eed24b816e50c6cd18cbee0ff0d7218c8fced199" }, - "CVE-2021-3640": { - "cmt_msg": "Bluetooth: sco: Fix lock_sock() blockage by memcpy_from_msg()" + "CVE-2024-26591": { + "cmt_msg": "bpf: Fix re-attachment branch in bpf_tracing_prog_attach", + "cmt_id": "50ae82f080cf87e84828f066c31723b781d68f5b" }, - "CVE-2021-3764": { - "cmt_msg": "crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd()" + "CVE-2024-26596": { + "cmt_msg": "net: dsa: fix netdev_priv() dereference before check on non-DSA netdevice events", + "cmt_id": "dbd909c20c11f0d29c0054d41e0d1f668a60e8c8" }, - "CVE-2020-1749": { - "cmt_msg": "net: ipv6_stub: use ip6_dst_lookup_flow instead of ip6_dst_lookup" + "CVE-2024-26597": { + "cmt_msg": "net: qualcomm: rmnet: fix global oob in rmnet_policy", + "cmt_id": "17d06a5c44d8fd2e8e61bac295b09153496f87e1" }, - "CVE-2022-42896": { - "cmt_msg": "Bluetooth: L2CAP: Fix accepting connection request for invalid SPSM" + "CVE-2024-26594": { + "cmt_msg": "ksmbd: validate mech token in session setup", + "cmt_id": "5e6dfec95833edc54c48605a98365a7325e5541e" }, - "CVE-2021-3760": { - "cmt_msg": "nfc: nci: fix the UAF of rf_conn_info object" + "CVE-2024-26595": { + "cmt_msg": "mlxsw: spectrum_acl_tcam: Fix NULL pointer dereference in error path", + "cmt_id": "d0a1efe417c97a1e9b914056ee6b86f1ef75fe1f" }, - "CVE-2022-36123": { - "cmt_msg": "x86: Clear .brk area at early boot" + "CVE-2024-26598": { + "cmt_msg": "KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache", + "cmt_id": "dd3956a1b3dd11f46488c928cb890d6937d1ca80" }, - "CVE-2020-11608": { - "cmt_msg": "media: ov519: add missing endpoint sanity checks" + "CVE-2024-26599": { + "cmt_msg": "pwm: Fix out-of-bounds access in of_pwm_single_xlate()", + "cmt_id": "bae45b7ebb31984b63b13c3519fd724b3ce92123" }, - "CVE-2020-10732": { - "cmt_msg": "fs/binfmt_elf.c: allocate initialized memory in fill_thread_core_info()" + "CVE-2023-6356": { + "cmt_msg": "nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length", + "cmt_id": "70154e8d015c9b4fb56c1a2ef1fc8b83d45c7f68" }, - "CVE-2020-28097": { - "cmt_msg": "vgacon: remove software scrollback support" + "CVE-2023-52459": { + "cmt_msg": "media: v4l: async: Fix duplicated list deletion", + "cmt_id": "49d82811428469566667f22749610b8c132cdb3e" }, - "CVE-2024-24859": { - "cmt_msg": "" + "CVE-2023-52458": { + "cmt_msg": "block: add check that partition length needs to be aligned with block size", + "cmt_id": "bcdc288e7bc008daf38ef0401b53e4a8bb61bbe5" }, - "CVE-2024-24858": { - "cmt_msg": "" + "CVE-2023-52457": { + "cmt_msg": "serial: 8250: omap: Don't skip resource freeing if pm_runtime_resume_and_get() failed", + "cmt_id": "95e4e0031effad9837af557ecbfd4294a4d8aeee" }, - "CVE-2024-24855": { - "cmt_msg": "scsi: lpfc: Fix a possible data race in lpfc_unregister_fcf_rescan()" + "CVE-2023-52456": { + "cmt_msg": "serial: imx: fix tx statemachine deadlock", + "cmt_id": "9a662d06c22ddfa371958c2071dc350436be802b" }, - "CVE-2024-24857": { - "cmt_msg": "" + "CVE-2023-52455": { + "cmt_msg": "iommu: Don't reserve 0-length IOVA region", + "cmt_id": "5e23e283910c9f30248732ae0770bcb0c9438abf" }, - "CVE-2019-3892": { - "cmt_msg": "coredump: fix race condition between mmget_not_zero()/get_task_mm() and core dumping" + "CVE-2023-52454": { + "cmt_msg": "nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length", + "cmt_id": "70154e8d015c9b4fb56c1a2ef1fc8b83d45c7f68" }, - "CVE-2021-29264": { - "cmt_msg": "gianfar: fix jumbo packets+napi+rx overrun crash" + "CVE-2023-52453": { + "cmt_msg": "hisi_acc_vfio_pci: Update migration data pointer correctly on saving/resume", + "cmt_id": "6bda81e24a35a856f58e6a5786de579b07371603" }, - "CVE-2021-29265": { - "cmt_msg": "usbip: fix stub_dev usbip_sockfd_store() races leading to gpf" + "CVE-2023-52452": { + "cmt_msg": "bpf: Fix accesses to uninit stack slots", + "cmt_id": "fbcf372c8eda2290470268e0afb5ab5d5f5d5fde" }, - "CVE-2021-39648": { - "cmt_msg": "usb: gadget: configfs: Fix use-after-free issue with udc_name" + "CVE-2023-52451": { + "cmt_msg": "powerpc/pseries/memhp: Fix access beyond end of drmem array", + "cmt_id": "708a4b59baad96c4718dc0bd3a3427d3ab22fedc" }, - "CVE-2022-3545": { - "cmt_msg": "nfp: fix use-after-free in area_cache_get()" + "CVE-2023-52450": { + "cmt_msg": "perf/x86/intel/uncore: Fix NULL pointer dereference issue in upi_fill_topology()", + "cmt_id": "3d6f4a78b104c65e4256c3776c9949f49a1b459e" }, - "CVE-2020-14416": { - "cmt_msg": "can, slip: Protect tty->disc_data in write_wakeup and close with RCU" + "CVE-2023-52471": { + "cmt_msg": "ice: Fix some null pointer dereference issues in ice_ptp.c", + "cmt_id": "3cd9b9bee33f39f6c6d52360fe381b89a7b12695" }, - "CVE-2019-0136": { - "cmt_msg": "mac80211: drop robust management frames from unknown TA" + "CVE-2023-52470": { + "cmt_msg": "drm/radeon: check the alloc_workqueue return value in radeon_crtc_init()", + "cmt_id": "fb2d8bc9b5e55848b8a7c3c028e2ee8d49f28f97" }, - "CVE-2022-3542": { - "cmt_msg": "bnx2x: fix potential memory leak in bnx2x_tpa_stop()" + "CVE-2023-52473": { + "cmt_msg": "thermal: core: Fix NULL pointer dereference in zone registration error path", + "cmt_id": "02871710b93058eb1249d5847c0b2d1c2c3c98ae" }, - "CVE-2019-16921": { - "cmt_msg": "RDMA/hns: Fix init resp when alloc ucontext" + "CVE-2023-52472": { + "cmt_msg": "crypto: rsa - add a check for allocation failure", + "cmt_id": "95ad8b6879e2e49d02e3bfc0e1fb46421633fe2a" }, - "CVE-2022-3344": { - "cmt_msg": "KVM: x86: nSVM: harden svm_free_nested against freeing vmcb02 while still in use" + "CVE-2024-1085": { + "cmt_msg": "netfilter: nf_tables: check if catch-all set element is active in next generation", + "cmt_id": "7e0f5f8ae3e5f17e367f7040ade7a467f1f0e3b9" }, - "CVE-2021-21781": { - "cmt_msg": "ARM: ensure the signal page contains defined contents" + "CVE-2024-26589": { + "cmt_msg": "bpf: Reject variable offset alu on PTR_TO_FLOW_KEYS", + "cmt_id": "1b500d5d6cecf98dd6ca88bc9e7ae1783c83e6d3" }, - "CVE-2021-0512": { - "cmt_msg": "HID: make arrays usage and value to be the same" + "CVE-2023-46838": { + "cmt_msg": "xen-netback: don't produce zero-size SKB frags", + "cmt_id": "0179c6b07f7ed2f3ea7309596169e15a59e7ee0e" }, - "CVE-2018-14633": { - "cmt_msg": "scsi: target: iscsi: Use hex2bin instead of a re-implementation" + "CVE-2023-52611": { + "cmt_msg": "wifi: rtw88: sdio: Honor the host max_req_size in the RX path", + "cmt_id": "0e9ffff72a0674cd6656314dbd99cdd2123a3030" }, - "CVE-2018-12896": { - "cmt_msg": "posix-timers: Sanitize overrun handling" + "CVE-2023-6536": { + "cmt_msg": "nvmet-tcp: fix a crash in nvmet_req_complete()", + "cmt_id": "c32d355f507fa81cf23aaa4dd4150e696cb8ebaf" }, - "CVE-2023-1382": { - "cmt_msg": "tipc: set con sock in tipc_conn_alloc" + "CVE-2024-26587": { + "cmt_msg": "net: netdevsim: don't try to destroy PHC on VFs", + "cmt_id": "c5068e442eed063d2f1658e6b6d3c1c6fcf1e588" }, - "CVE-2019-19073": { - "cmt_msg": "ath9k_htc: release allocated buffer if timed out" + "CVE-2024-26586": { + "cmt_msg": "mlxsw: spectrum_acl_tcam: Fix stack corruption", + "cmt_id": "a361c2c1da5dbb13ca67601cf961ab3ad68af383" }, - "CVE-2018-14734": { - "cmt_msg": "infiniband: fix a possible use-after-free bug" + "CVE-2024-24860": { + "cmt_msg": "Bluetooth: Fix atomicity violation in {min,max}_key_size_set", + "cmt_id": "d1c6a77d6d48215ba723f910eaabdb6e60d21a37" }, - "CVE-2020-0347": { - "cmt_msg": "" + "CVE-2024-26588": { + "cmt_msg": "LoongArch: BPF: Prevent out-of-bounds memory access", + "cmt_id": "7924ade13a49c0067da6ea13e398102979c0654a" }, - "CVE-2019-18809": { - "cmt_msg": "media: usb: fix memory leak in af9005_identify_state" + "CVE-2023-52465": { + "cmt_msg": "power: supply: Fix null pointer dereference in smb2_probe", + "cmt_id": "bd3d2ec447ede9da822addf3960a5f4275e3ae76" }, - "CVE-2019-18808": { - "cmt_msg": "crypto: ccp - Release all allocated memory if sha type is invalid" + "CVE-2023-52460": { + "cmt_msg": "drm/amd/display: Fix NULL pointer dereference at hibernate", + "cmt_id": "6b80326efff093d037e0971831dca6ebddba9b45" }, - "CVE-2022-41222": { - "cmt_msg": "mm/mremap: hold the rmap lock in write mode when moving page table entries." + "CVE-2023-52462": { + "cmt_msg": "bpf: fix check for attempt to corrupt spilled pointer", + "cmt_id": "40617d45ea05535105e202a8a819e388a2b1f036" }, - "CVE-2021-40490": { - "cmt_msg": "ext4: fix race writing to an inline_data file while its xattrs are changing" + "CVE-2023-50431": { + "cmt_msg": "accel/habanalabs: fix information leak in sec_attest_info()", + "cmt_id": "db43f2eabdceedc41b8c3e0621ac42ca19b13b7d" }, - "CVE-2021-33909": { - "cmt_msg": "seq_file: disallow extremely large seq buffer allocations" + "CVE-2023-52610": { + "cmt_msg": "net/sched: act_ct: fix skb leak and crash on ooo frags", + "cmt_id": "f5346df0591d10bc948761ca854b1fae6d2ef441" }, - "CVE-2019-12455": { - "cmt_msg": "clk-sunxi: fix a missing-check bug in sunxi_divs_clk_setup()" + "CVE-2023-52463": { + "cmt_msg": "efivarfs: force RO when remounting if SetVariable is not supported", + "cmt_id": "d4a714873db0866cc471521114eeac4a5072d548" }, - "CVE-2019-12456": { - "cmt_msg": "" + "CVE-2023-52467": { + "cmt_msg": "mfd: syscon: Fix null pointer dereference in of_syscon_register()", + "cmt_id": "7f2c410ac470959b88e03dadd94b7a0b71df7973" }, - "CVE-2023-20569": { - "cmt_msg": "x86/bugs: Increase the x86 bugs vector size to two u32s" + "CVE-2023-52464": { + "cmt_msg": "EDAC/thunderx: Fix possible out-of-bounds string access", + "cmt_id": "426fae93c01dffa379225eb2bd4d3cdc42c6eec5" }, - "CVE-2019-18805": { - "cmt_msg": "ipv4: set the tcp_min_rtt_wlen range from 0 to one day" + "CVE-2023-52443": { + "cmt_msg": "apparmor: avoid crash when parsed profile name is empty", + "cmt_id": "77ab09b92f16c8439a948d1af489196953dc4a0e" }, - "CVE-2021-29647": { - "cmt_msg": "net: qrtr: fix a kernel-infoleak in qrtr_recvmsg()" + "CVE-2023-52444": { + "cmt_msg": "f2fs: fix to avoid dirent corruption", + "cmt_id": "2fb4867f4405aea8c0519d7d188207f232a57862" }, - "CVE-2019-18806": { - "cmt_msg": "net: qlogic: Fix memory leak in ql_alloc_large_buffers" + "CVE-2023-52445": { + "cmt_msg": "media: pvrusb2: fix use after free on context disconnection", + "cmt_id": "437b5f57732bb4cc32cc9f8895d2010ee9ff521c" }, - "CVE-2021-33656": { - "cmt_msg": "vt: drop old FONT ioctls" + "CVE-2023-52446": { + "cmt_msg": "bpf: Fix a race condition between btf_put() and map_free()", + "cmt_id": "f9ff6ef1c73cd9e1a6bb1ab3e57c5d141a536306" }, - "CVE-2021-33655": { - "cmt_msg": "fbcon: Disallow setting font bigger than screen size" + "CVE-2023-52447": { + "cmt_msg": "bpf: Defer the free of inner map when necessary", + "cmt_id": "bfd9b20c4862f41d4590fde11d70a5eeae53dcc5" }, - "CVE-2022-41858": { - "cmt_msg": "drivers: net: slip: fix NPD bug in sl_tx_timeout()" + "CVE-2023-52448": { + "cmt_msg": "gfs2: Fix kernel NULL pointer dereference in gfs2_rgrp_dump", + "cmt_id": "c323efd620c741168c8e0cc6fc0be04ab57e331a" }, - "CVE-2019-6974": { - "cmt_msg": "kvm: fix kvm_ioctl_create_device() reference counting (CVE-2019-6974)" + "CVE-2023-52449": { + "cmt_msg": "mtd: Fix gluebi NULL pointer dereference caused by ftl notifier", + "cmt_id": "b36aaa64d58aaa2f2cbc8275e89bae76a2b6c3dc" }, - "CVE-2022-41850": { - "cmt_msg": "HID: roccat: Fix use-after-free in roccat_read()" + "CVE-2023-52461": { + "cmt_msg": "drm/sched: Fix bounds limiting when given a malformed entity", + "cmt_id": "1470d173925d697b497656b93f7c5bddae2e64b2" }, - "CVE-2020-24503": { - "cmt_msg": "" + "CVE-2023-52468": { + "cmt_msg": "class: fix use-after-free in class_register()", + "cmt_id": "0f1486dafca3398c4c46b9f6e6452fa27e73b559" }, - "CVE-2023-2985": { - "cmt_msg": "fs: hfsplus: fix UAF issue in hfsplus_put_super" + "CVE-2023-52469": { + "cmt_msg": "drivers/amd/pm: fix a use-after-free in kv_parse_power_table", + "cmt_id": "3426f059eacc33ecc676b0d66539297e1cfafd02" }, - "CVE-2020-14390": { - "cmt_msg": "fbcon: remove soft scrollback code" + "CVE-2023-52612": { + "cmt_msg": "crypto: scomp - fix req->dst buffer overflow", + "cmt_id": "71c6670f9f032ec67d8f4e3f8db4646bf5a62883" }, - "CVE-2020-24502": { - "cmt_msg": "" + "CVE-2023-52609": { + "cmt_msg": "binder: fix race between mmput() and do_exit()", + "cmt_id": "77d210e8db4d61d43b2d16df66b1ec46fad2ee01" }, - "CVE-2022-3646": { - "cmt_msg": "nilfs2: fix leak of nilfs_root in case of writer thread creation failure" + "CVE-2024-26633": { + "cmt_msg": "ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim()", + "cmt_id": "ba8d904c274268b18ef3dc11d3ca7b24a96cb087" }, - "CVE-2021-45469": { - "cmt_msg": "f2fs: fix to do sanity check on last xattr entry in __f2fs_setxattr()" + "CVE-2024-26632": { + "cmt_msg": "block: Fix iterating over an empty bio with bio_for_each_folio_all", + "cmt_id": "ca3ede3f5893e2d26d4dbdef1eec28a8487fafde" }, - "CVE-2022-1184": { - "cmt_msg": "ext4: verify dir block before splitting it" + "CVE-2024-26631": { + "cmt_msg": "ipv6: mcast: fix data-race in ipv6_mc_down / mld_ifc_work", + "cmt_id": "3bb5849675ae1d592929798a2b37ea450879c855" }, - "CVE-2022-3642": { - "cmt_msg": "" + "CVE-2023-52613": { + "cmt_msg": "drivers/thermal/loongson2_thermal: Fix incorrect PTR_ERR() judgment", + "cmt_id": "6010a9fc14eb1feab5cafd84422001134fe8ec58" + } + }, + "6.7.3": { + "CVE-2024-26611": { + "cmt_msg": "xsk: fix usage of multi-buffer BPF helpers for ZC XDP", + "cmt_id": "5cd781f7216f980207af09c5e0e1bb1eda284540" }, - "CVE-2019-19448": { - "cmt_msg": "btrfs: only search for left_info if there is no right_info in try_merge_free_space" + "CVE-2024-26610": { + "cmt_msg": "wifi: iwlwifi: fix a memory corruption", + "cmt_id": "f32a81999d0b8e5ce60afb5f6a3dd7241c17dd67" }, - "CVE-2024-0584": { - "cmt_msg": "ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet" + "CVE-2024-26612": { + "cmt_msg": "netfs, fscache: Prevent Oops in fscache_put_cache()", + "cmt_id": "4200ad3e46ce50f410fdda302745489441bc70f0" }, - "CVE-2019-19449": { - "cmt_msg": "f2fs: fix to do sanity check on segment/section count" + "CVE-2024-26615": { + "cmt_msg": "net/smc: fix illegal rmb_desc access in SMC-D connection dump", + "cmt_id": "8f3f9186e5bb96a9c9654c41653210e3ea7e48a6" }, - "CVE-2020-0465": { - "cmt_msg": "HID: core: Sanitize event code and type when mapping input" + "CVE-2024-26614": { + "cmt_msg": "tcp: make sure init the accept_queue's spinlocks once", + "cmt_id": "3982fe726a63fb3de6005e534e2ac8ca7e0aca2a" }, - "CVE-2020-0466": { - "cmt_msg": "do_epoll_ctl(): clean the failure exits up a bit" + "CVE-2024-26617": { + "cmt_msg": "fs/proc/task_mmu: move mmu notification mechanism inside mm lock", + "cmt_id": "05509adf297924f51e1493aa86f9fcde1433ed80" }, - "CVE-2021-4218": { - "cmt_msg": "sysctl: pass kernel pointers to ->proc_handler" + "CVE-2024-26616": { + "cmt_msg": "btrfs: scrub: avoid use-after-free when chunk length is not 64K aligned", + "cmt_id": "34de0f04684ec00c093a0455648be055f0e8e24f" }, - "CVE-2019-15902": { - "cmt_msg": "unknown" + "CVE-2024-26619": { + "cmt_msg": "riscv: Fix module loading free order", + "cmt_id": "2fa79badf4bfeffda6b5032cf62b828486ec9a99" }, - "CVE-2024-25739": { - "cmt_msg": "" + "CVE-2024-26618": { + "cmt_msg": "arm64/sme: Always exit sme_alloc() early with existing storage", + "cmt_id": "814af6b4e6000e574e74d92197190edf07cc3680" }, - "CVE-2023-3358": { - "cmt_msg": "HID: intel_ish-hid: Add check for ishtp_dma_tx_map" + "CVE-2024-26650": { + "cmt_msg": "platform/x86: p2sb: Allow p2sb_bar() calls during PCI device probe", + "cmt_id": "d281ac9a987c553d93211b90fd4fe97d8eca32cd" }, - "CVE-2019-20054": { - "cmt_msg": "fs/proc/proc_sysctl.c: fix NULL pointer dereference in put_links" + "CVE-2023-52615": { + "cmt_msg": "hwrng: core - Fix page fault dead lock on mmap-ed hwrng", + "cmt_id": "6822a14271786150e178869f1495cc03e74c5029" }, - "CVE-2024-0340": { - "cmt_msg": "vhost: use kzalloc() instead of kmalloc() followed by memset()" + "CVE-2023-52614": { + "cmt_msg": "PM / devfreq: Fix buffer overflow in trans_stat_show", + "cmt_id": "eaef4650fa2050147ca25fd7ee43bc0082e03c87" }, - "CVE-2021-3753": { - "cmt_msg": "vt_kdsetmode: extend console locking" + "CVE-2023-52498": { + "cmt_msg": "PM: sleep: Fix possible deadlocks in core system-wide PM code", + "cmt_id": "9bd3dce27b01c51295b60e1433e1dadfb16649f7" }, - "CVE-2023-6536": { - "cmt_msg": "" + "CVE-2023-52493": { + "cmt_msg": "bus: mhi: host: Drop chan lock before queuing buffers", + "cmt_id": "b8eff20d87092e14cac976d057cb0aea2f1d0830" }, - "CVE-2019-11135": { - "cmt_msg": "x86/msr: Add the IA32_TSX_CTRL MSR" + "CVE-2023-52492": { + "cmt_msg": "dmaengine: fix NULL pointer in channel unregistration function", + "cmt_id": "9263fd2a63487c6d04cbb7b74a48fb12e1e352d0" }, - "CVE-2019-11810": { - "cmt_msg": "scsi: megaraid_sas: return error when create DMA pool failed" + "CVE-2024-1086": { + "cmt_msg": "netfilter: nf_tables: reject QUEUE/DROP verdict parameters", + "cmt_id": "f05a497e7bc8851eeeb3a58da180ba469efebb05" }, - "CVE-2021-27365": { - "cmt_msg": "scsi: iscsi: Ensure sysfs attributes are limited to PAGE_SIZE" + "CVE-2023-52490": { + "cmt_msg": "mm: migrate: fix getting incorrect page mapping during page migration", + "cmt_id": "3889a418b6eb9a1113fb989aaadecf2f64964767" }, - "CVE-2021-27364": { - "cmt_msg": "scsi: iscsi: Restrict sessions and handles to admin capabilities" + "CVE-2023-52497": { + "cmt_msg": "erofs: fix lz4 inplace decompression", + "cmt_id": "bffc4cc334c5bb31ded54bc3cfd651735a3cb79e" }, - "CVE-2019-11815": { - "cmt_msg": "net: rds: force to destroy connection if t_sock is NULL in rds_tcp_kill_sock()." + "CVE-2023-52495": { + "cmt_msg": "soc: qcom: pmic_glink_altmode: fix port sanity check", + "cmt_id": "d26edf4ee3672cc9828f2a3ffae34086a712574d" }, - "CVE-2020-0431": { - "cmt_msg": "HID: hid-input: clear unmapped usages" + "CVE-2023-52494": { + "cmt_msg": "bus: mhi: host: Add alignment check for event ring read pointer", + "cmt_id": "ecf8320111822a1ae5d5fc512953eab46d543d0b" }, - "CVE-2022-39842": { - "cmt_msg": "video: fbdev: pxa3xx-gcu: Fix integer overflow in pxa3xx_gcu_write" + "CVE-2024-26629": { + "cmt_msg": "nfsd: fix RELEASE_LOCKOWNER", + "cmt_id": "8f5b860de87039b007e84a28a5eefc888154e098" }, - "CVE-2018-17977": { - "cmt_msg": "" + "CVE-2024-23849": { + "cmt_msg": "net/rds: Fix UBSAN: array-index-out-of-bounds in rds_cmsg_recv", + "cmt_id": "0b787c2dea15e7a2828fa3a74a5447df4ed57711" }, - "CVE-2024-1151": { - "cmt_msg": "net: openvswitch: limit the number of recursions from action sets" + "CVE-2024-26620": { + "cmt_msg": "s390/vfio-ap: always filter entire AP matrix", + "cmt_id": "cdd134d56138302976685e6c7bc4755450b3880e" }, - "CVE-2018-17972": { - "cmt_msg": "proc: restrict kernel stack dumps to root" + "CVE-2024-26644": { + "cmt_msg": "btrfs: don't abort filesystem when attempting to snapshot deleted subvolume", + "cmt_id": "d8680b722f0ff6d7a01ddacc1844e0d52354d6ff" }, - "CVE-2021-20322": { - "cmt_msg": "ipv6: make exception cache less predictible" + "CVE-2024-26668": { + "cmt_msg": "netfilter: nft_limit: reject configurations that cause integer overflow", + "cmt_id": "00c2c29aa36d1d1827c51a3720e9f893a22c7c6a" }, - "CVE-2021-20320": { - "cmt_msg": "s390/bpf: Fix optimizing out zero-extensions" + "CVE-2024-26669": { + "cmt_msg": "net/sched: flower: Fix chain template offload", + "cmt_id": "c04709b2cc99ae31c346f79f0211752d7b74df01" }, - "CVE-2021-20321": { - "cmt_msg": "ovl: fix missing negative dentry check in ovl_rename()" + "CVE-2024-26607": { + "cmt_msg": "drm/bridge: sii902x: Fix probing race issue", + "cmt_id": "2a4c6af7934a7b4c304542c38fee35e09cc1770c" }, - "CVE-2022-26490": { - "cmt_msg": "nfc: st21nfca: Fix potential buffer overflows in EVT_TRANSACTION" + "CVE-2024-26648": { + "cmt_msg": "drm/amd/display: Fix variable deferencing before NULL check in edp_setup_replay()", + "cmt_id": "c02d257c654191ecda1dc1af6875d527e85310e7" }, - "CVE-2023-3812": { - "cmt_msg": "net: tun: fix bugs for oversize packet when napi frags enabled" + "CVE-2024-26649": { + "cmt_msg": "drm/amdgpu: Fix the null pointer when load rlc firmware", + "cmt_id": "d3887448486caeef9687fb5dfebd4ff91e0f25aa" }, - "CVE-2023-7192": { - "cmt_msg": "netfilter: ctnetlink: fix possible refcount leak in ctnetlink_create_conntrack()" + "CVE-2024-26646": { + "cmt_msg": "thermal: intel: hfi: Add syscore callbacks for system-wide PM", + "cmt_id": "c9d6d63b6c03afaa6f185df249af693a7939577c" }, - "CVE-2022-3169": { - "cmt_msg": "nvme: ensure subsystem reset is single threaded" + "CVE-2024-26647": { + "cmt_msg": "drm/amd/display: Fix late derefrence 'dsc' check in 'link_set_dsc_pps_packet()'", + "cmt_id": "cf656fc7276e5b3709a81bc9d9639459be2b2647" }, - "CVE-2022-4744": { - "cmt_msg": "tun: avoid double free in tun_free_netdev" + "CVE-2024-26608": { + "cmt_msg": "ksmbd: fix global oob in ksmbd_nl_policy", + "cmt_id": "6993328a4cd62a24df254b587c0796a4a1eecc95" }, - "CVE-2022-36280": { - "cmt_msg": "drm/vmwgfx: Validate the box size for the snooped cursor" + "CVE-2024-26645": { + "cmt_msg": "tracing: Ensure visibility when inserting an element into tracing_map", + "cmt_id": "bf4aeff7da85c3becd39fb73bac94122331c30fb" }, - "CVE-2022-1048": { - "cmt_msg": "ALSA: pcm: Fix races among concurrent hw_params and hw_free calls" + "CVE-2023-52616": { + "cmt_msg": "crypto: lib/mpi - Fix unexpected pointer access in mpi_ec_init", + "cmt_id": "7abdfd45a650c714d5ebab564bb1b988f14d9b49" }, - "CVE-2018-20976": { - "cmt_msg": "xfs: clear sb->s_fs_info on mount failure" + "CVE-2024-26808": { + "cmt_msg": "netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain", + "cmt_id": "36a0a80f32209238469deb481967d777a3d539ee" }, - "CVE-2021-0342": { - "cmt_msg": "tun: correct header offsets in napi frags mode" + "CVE-2023-52624": { + "cmt_msg": "drm/amd/display: Wake DMCUB before executing GPINT commands", + "cmt_id": "2ef98c6d753a744e333b7e34b9cf687040fba57d" }, - "CVE-2023-22995": { - "cmt_msg": "usb: dwc3: dwc3-qcom: Add missing platform_device_put() in dwc3_qcom_acpi_register_core" + "CVE-2023-52625": { + "cmt_msg": "drm/amd/display: Refactor DMCUB enter/exit idle interface", + "cmt_id": "820c3870c491946a78950cdf961bf40e28c1025f" }, - "CVE-2024-21803": { - "cmt_msg": "" + "CVE-2023-52488": { + "cmt_msg": "serial: sc16is7xx: convert from _raw_ to _noinc_ regmap functions for FIFO", + "cmt_id": "aa7cb4787698add9367b19f7afc667662c9bdb23" }, - "CVE-2018-16276": { - "cmt_msg": "USB: yurex: fix out-of-bounds uaccess in read handler" + "CVE-2023-52489": { + "cmt_msg": "mm/sparsemem: fix race in accessing memory_section->usage", + "cmt_id": "3a01daace71b521563c38bbbf874e14c3e58adb7" }, - "CVE-2019-15927": { - "cmt_msg": "ALSA: usb-audio: Avoid access before bLength check in build_audio_procunit()" + "CVE-2023-52626": { + "cmt_msg": "net/mlx5e: Fix operation precedence bug in port timestamping napi_poll context", + "cmt_id": "33cdeae8c6fb58cc445f859b67c014dc9f60b4e0" }, - "CVE-2021-3542": { - "cmt_msg": "" + "CVE-2023-52627": { + "cmt_msg": "iio: adc: ad7091r: Allow users to configure device events", + "cmt_id": "55aca2ce91a63740278502066beaddbd841af9c6" }, - "CVE-2019-16413": { - "cmt_msg": "9p: use inode->i_lock to protect i_size_write() under 32-bit" + "CVE-2024-26670": { + "cmt_msg": "arm64: entry: fix ARM64_WORKAROUND_SPECULATIVE_UNPRIV_LOAD", + "cmt_id": "baa0aaac16432019651e0d60c41cd34a0c3c3477" }, - "CVE-2024-24860": { - "cmt_msg": "Bluetooth: Fix atomicity violation in {min,max}_key_size_set" + "CVE-2023-52485": { + "cmt_msg": "drm/amd/display: Wake DMCUB before sending a command", + "cmt_id": "303197775a97416b62d4da69280d0c120a20e009" }, - "CVE-2023-2177": { - "cmt_msg": "sctp: leave the err path free in sctp_stream_init to sctp_stream_free" + "CVE-2023-52486": { + "cmt_msg": "drm: Don't unref the same fb many times by mistake due to deadlock handling", + "cmt_id": "bfd0feb1b109cb63b87fdcd00122603787c75a1a" }, - "CVE-2024-22099": { - "cmt_msg": "" + "CVE-2023-52487": { + "cmt_msg": "net/mlx5e: Fix peer flow lists handling", + "cmt_id": "e24d6f5a7f2d95a98a46257a5a5a5381d572894f" }, - "CVE-2023-30456": { - "cmt_msg": "KVM: nVMX: add missing consistency checks for CR0 and CR4" + "CVE-2023-52608": { + "cmt_msg": "firmware: arm_scmi: Check mailbox/SMT channel for consistency", + "cmt_id": "12dc4217f16551d6dee9cbefc23fdb5659558cda" }, - "CVE-2020-12652": { - "cmt_msg": "scsi: mptfusion: Fix double fetch bug in ioctl" + "CVE-2024-26636": { + "cmt_msg": "llc: make llc_ui_sendmsg() more robust against bonding changes", + "cmt_id": "c451c008f563d56d5e676c9dcafae565fcad84bb" }, - "CVE-2020-12653": { - "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_cmd_append_vsie_tlv()" + "CVE-2024-26638": { + "cmt_msg": "nbd: always initialize struct msghdr completely", + "cmt_id": "b0028f333420a65a53a63978522db680b37379dd" }, - "CVE-2019-7222": { - "cmt_msg": "KVM: x86: work around leak of uninitialized stack contents (CVE-2019-7222)" + "CVE-2024-26637": { + "cmt_msg": "wifi: ath11k: rely on mac80211 debugfs handling for vif", + "cmt_id": "aa74ce30a8a40d19a4256de4ae5322e71344a274" }, - "CVE-2020-12657": { - "cmt_msg": "block, bfq: fix use-after-free in bfq_idle_slice_timer_body" + "CVE-2023-52491": { + "cmt_msg": "media: mtk-jpeg: Fix use after free bug due to error path handling in mtk_jpeg_dec_device_run", + "cmt_id": "6e2f37022f0fc0893da4d85a0500c9d547fffd4c" }, - "CVE-2020-12654": { - "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_ret_wmm_get_status()" + "CVE-2024-26635": { + "cmt_msg": "llc: Drop support for ETH_P_TR_802_2.", + "cmt_id": "df57fc2f2abf548aa889a36ab0bdcc94a75399dc" }, - "CVE-2019-7221": { - "cmt_msg": "KVM: nVMX: unconditionally cancel preemption timer in free_nested (CVE-2019-7221)" + "CVE-2024-26634": { + "cmt_msg": "net: fix removing a namespace with conflicting altnames", + "cmt_id": "8072699aa9e67d1727692cfb3c347263bb627fb9" + } + }, + "6.7.4": { + "CVE-2024-26673": { + "cmt_msg": "netfilter: nft_ct: sanitize layer 3 and 4 protocol number in custom expectations", + "cmt_id": "38cc1605338d99205a263707f4dde76408d3e0e8" }, - "CVE-2018-12929": { - "cmt_msg": "" + "CVE-2024-26672": { + "cmt_msg": "drm/amdgpu: Fix variable 'mca_funcs' dereferenced before NULL check in 'amdgpu_mca_smu_get_mca_entry()'", + "cmt_id": "7b5d58c07024516c0e81b95e98f37710cf402c53" }, - "CVE-2018-12928": { - "cmt_msg": "" + "CVE-2024-26671": { + "cmt_msg": "blk-mq: fix IO hang from sbitmap wakeup race", + "cmt_id": "f1bc0d8163f8ee84a8d5affdf624cfad657df1d2" }, - "CVE-2020-36311": { - "cmt_msg": "KVM: SVM: Periodically schedule when unregistering regions on destroy" + "CVE-2023-52585": { + "cmt_msg": "drm/amdgpu: Fix possible NULL dereference in amdgpu_ras_query_error_status_helper()", + "cmt_id": "195a6289282e039024ad30ba66e6f94a4d0fbe49" }, - "CVE-2020-36310": { - "cmt_msg": "KVM: SVM: avoid infinite loop on NPF from bad address" + "CVE-2023-52584": { + "cmt_msg": "spmi: mediatek: Fix UAF on device remove", + "cmt_id": "9a3881b1f07db1bb55cb0108e6f05cfd027eaf2e" }, - "CVE-2020-36313": { - "cmt_msg": "KVM: Fix out of range accesses to memslots" + "CVE-2023-52587": { + "cmt_msg": "IB/ipoib: Fix mcast list locking", + "cmt_id": "7c7bd4d561e9dc6f5b7df9e184974915f6701a89" }, - "CVE-2020-35519": { - "cmt_msg": "net/x25: prevent a couple of overflows" + "CVE-2023-52586": { + "cmt_msg": "drm/msm/dpu: Add mutex lock in control vblank irq", + "cmt_id": "14f109bf74dd67e1d0469fed859c8e506b0df53f" }, - "CVE-2024-26592": { - "cmt_msg": "ksmbd: fix UAF issue in ksmbd_tcp_new_connection()" + "CVE-2023-52583": { + "cmt_msg": "ceph: fix deadlock or deadcode of misusing dget()", + "cmt_id": "76cb2aa3421fee4fde706dec41b1344bc0a9ad67" }, - "CVE-2021-28971": { - "cmt_msg": "perf/x86/intel: Fix a crash caused by zero PEBS status" + "CVE-2023-52635": { + "cmt_msg": "PM / devfreq: Synchronize devfreq_monitor_[start/stop]", + "cmt_id": "ae815e2fdc284ab31651d52460698bd89c0fce22" }, - "CVE-2019-12984": { - "cmt_msg": "nfc: Ensure presence of required attributes in the deactivate_target handler" + "CVE-2023-52634": { + "cmt_msg": "drm/amd/display: Fix disable_otg_wa logic", + "cmt_id": "ce29728ef6485a367934cc100249c66dd3cde5b6" }, - "CVE-2020-25673": { - "cmt_msg": "nfc: Avoid endless loops caused by repeated llcp_sock_connect()" + "CVE-2023-52589": { + "cmt_msg": "media: rkisp1: Fix IRQ disable race issue", + "cmt_id": "7bb1a2822aa2c2de4e09bf7c56dd93bd532f1fa7" }, - "CVE-2022-0400": { - "cmt_msg": "" + "CVE-2023-52588": { + "cmt_msg": "f2fs: fix to tag gcing flag on page during block migration", + "cmt_id": "b8094c0f1aae329b1c60a275a780d6c2c9ff7aa3" }, - "CVE-2023-6356": { - "cmt_msg": "" + "CVE-2023-52617": { + "cmt_msg": "PCI: switchtec: Fix stdev_release() crash after surprise hot remove", + "cmt_id": "e129c7fa7070fbce57feb0bfc5eaa65eef44b693" }, - "CVE-2024-25741": { - "cmt_msg": "" + "CVE-2023-52633": { + "cmt_msg": "um: time-travel: fix time corruption", + "cmt_id": "b427f55e9d4185f6f17cc1e3296eb8d0c4425283" }, - "CVE-2021-38160": { - "cmt_msg": "virtio_console: Assure used length from device is limited" + "CVE-2023-52619": { + "cmt_msg": "pstore/ram: Fix crash when setting number of cpus to an odd number", + "cmt_id": "cd40e43f870cf21726b22487a95ed223790b3542" }, - "CVE-2021-42739": { - "cmt_msg": "media: firewire: firedtv-avc: fix a buffer overflow in avc_ca_pmt()" + "CVE-2023-52618": { + "cmt_msg": "block/rnbd-srv: Check for unlikely string overflow", + "cmt_id": "a2c6206f18104fba7f887bf4dbbfe4c41adc4339" }, - "CVE-2023-1989": { - "cmt_msg": "Bluetooth: btsdio: fix use after free bug in btsdio_remove due to unfinished work" + "CVE-2023-52632": { + "cmt_msg": "drm/amdkfd: Fix lock dependency warning with srcu", + "cmt_id": "1556c242e64cdffe58736aa650b0b395854fe4d4" }, - "CVE-2022-3111": { - "cmt_msg": "power: supply: wm8350-power: Add missing free in free_charger_irq" + "CVE-2024-26625": { + "cmt_msg": "llc: call sock_orphan() at release time", + "cmt_id": "8e51f084b5716653f19e291ed5f026791d4b3ed4" }, - "CVE-2020-12771": { - "cmt_msg": "bcache: fix potential deadlock problem in btree_gc_coalesce" + "CVE-2024-26627": { + "cmt_msg": "scsi: core: Move scsi_host_busy() out of host lock for waking up EH handler", + "cmt_id": "07e3ca0f17f579491b5f54e9ed05173d6c1d6fcb" }, - "CVE-2020-12770": { - "cmt_msg": "scsi: sg: add sg_remove_request in sg_write" + "CVE-2024-26623": { + "cmt_msg": "pds_core: Prevent race issues involving the adminq", + "cmt_id": "5939feb63ea1f011027576c64b68b681cbad31ca" }, - "CVE-2019-15222": { - "cmt_msg": "ALSA: usb-audio: Fix gpf in snd_usb_pipe_sanity_check" + "CVE-2023-52621": { + "cmt_msg": "bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers", + "cmt_id": "c7f1b6146f4a46d727c0d046284c28b6882c6304" }, - "CVE-2022-25265": { - "cmt_msg": "" + "CVE-2023-52622": { + "cmt_msg": "ext4: avoid online resizing failures due to oversized flex bg", + "cmt_id": "dc3e0f55bec4410f3d74352c4a7c79f518088ee2" }, - "CVE-2022-20368": { - "cmt_msg": "net/packet: fix slab-out-of-bounds access in packet_recvmsg()" + "CVE-2024-26640": { + "cmt_msg": "tcp: add sanity checks to rx zerocopy", + "cmt_id": "1b8adcc0e2c584fec778add7777fe28e20781e60" }, - "CVE-2019-15220": { - "cmt_msg": "p54usb: Fix race between disconnect and firmware loading" + "CVE-2024-26641": { + "cmt_msg": "ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv()", + "cmt_id": "c835df3bcc14858ae9b27315dd7de76370b94f3a" }, - "CVE-2020-11609": { - "cmt_msg": "media: stv06xx: add missing descriptor sanity checks" + "CVE-2023-52596": { + "cmt_msg": "sysctl: Fix out of bounds access for empty sysctl registers", + "cmt_id": "2ae7081bc10123b187e36a4f3a8e53768de31489" }, - "CVE-2020-10773": { - "cmt_msg": "s390/cmm: fix information leak in cmm_timeout_handler()" + "CVE-2023-52597": { + "cmt_msg": "KVM: s390: fix setting of fpc register", + "cmt_id": "2823db0010c400e4b2b12d02aa5d0d3ecb15d7c7" }, - "CVE-2022-21499": { - "cmt_msg": "lockdown: also lock down previous kgdb use" + "CVE-2023-52594": { + "cmt_msg": "wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus()", + "cmt_id": "be609c7002dd4504b15b069cb7582f4c778548d1" }, - "CVE-2020-25284": { - "cmt_msg": "rbd: require global CAP_SYS_ADMIN for mapping and unmapping" + "CVE-2023-52595": { + "cmt_msg": "wifi: rt2x00: restart beacon queue when hardware reset", + "cmt_id": "fdb580ed05df8973aa5149cafa598c64bebcd0cb" }, - "CVE-2023-4208": { - "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free" + "CVE-2023-52593": { + "cmt_msg": "wifi: wfx: fix possible NULL pointer dereference in wfx_set_mfp_ap()", + "cmt_id": "3739121443f5114c6bcf6d841a5124deb006b878" }, - "CVE-2022-3606": { - "cmt_msg": "" + "CVE-2023-52590": { + "cmt_msg": "ocfs2: Avoid touching renamed directory if parent does not change", + "cmt_id": "de940cede3c41624e2de27f805b490999f419df9" }, - "CVE-2023-4206": { - "cmt_msg": "net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free" + "CVE-2023-52591": { + "cmt_msg": "reiserfs: Avoid touching renamed directory if parent does not change", + "cmt_id": "c04c162f82ac403917780eb6d1654694455d4e7c" }, - "CVE-2023-4207": { - "cmt_msg": "net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free" + "CVE-2023-52598": { + "cmt_msg": "s390/ptrace: handle setting of fpc register correctly", + "cmt_id": "bdce67df7f12fb0409fbc604ce7c4254703f56d4" }, - "CVE-2023-3640": { - "cmt_msg": "" + "CVE-2023-52599": { + "cmt_msg": "jfs: fix array-index-out-of-bounds in diNewExt", + "cmt_id": "5a6660139195f5e2fbbda459eeecb8788f3885fe" }, - "CVE-2018-18281": { - "cmt_msg": "mremap: properly flush TLB before releasing the page" + "CVE-2023-52606": { + "cmt_msg": "powerpc/lib: Validate size for vector operations", + "cmt_id": "848e1d7fd710900397e1d0e7584680c1c04e3afd" }, - "CVE-2023-20593": { - "cmt_msg": "x86/cpu/amd: Add a Zenbleed fix" + "CVE-2023-52607": { + "cmt_msg": "powerpc/mm: Fix null-pointer dereference in pgtable_cache_add", + "cmt_id": "ffd29dc45bc0355393859049f6becddc3ed08f74" }, - "CVE-2023-3022": { - "cmt_msg": "ipv6: Use result arg in fib_lookup_arg consistently" + "CVE-2023-52604": { + "cmt_msg": "FS:JFS:UBSAN:array-index-out-of-bounds in dbAdjTree", + "cmt_id": "59342822276f753e49d27ef5eebffbba990572b9" }, - "CVE-2022-2663": { - "cmt_msg": "netfilter: nf_conntrack_irc: Fix forged IP logic" + "CVE-2023-52623": { + "cmt_msg": "SUNRPC: Fix a suspicious RCU usage warning", + "cmt_id": "8f860c8407470baff2beb9982ad6b172c94f1d0a" }, - "CVE-2019-8912": { - "cmt_msg": "net: crypto set sk to NULL when af_alg_release." + "CVE-2023-52602": { + "cmt_msg": "jfs: fix slab-out-of-bounds Read in dtSearch", + "cmt_id": "bff9d4078a232c01e42e9377d005fb2f4d31a472" }, - "CVE-2023-51780": { - "cmt_msg": "atm: Fix Use-After-Free in do_vcc_ioctl" + "CVE-2023-52603": { + "cmt_msg": "UBSAN: array-index-out-of-bounds in dtSplitRoot", + "cmt_id": "6e2902ecc77e9760a9fc447f56d598383e2372d2" }, - "CVE-2023-0047": { - "cmt_msg": "mm, oom: do not trigger out_of_memory from the #PF" + "CVE-2023-52600": { + "cmt_msg": "jfs: fix uaf in jfs_evict_inode", + "cmt_id": "bacdaa04251382d7efd4f09f9a0686bfcc297e2e" }, - "CVE-2020-29370": { - "cmt_msg": "mm: slub: add missing TID bump in kmem_cache_alloc_bulk()" + "CVE-2023-52601": { + "cmt_msg": "jfs: fix array-index-out-of-bounds in dbAdjTree", + "cmt_id": "fc67a2e18f4c4e3f07e9f9ae463da24530470e73" + } + }, + "6.7.5": { + "CVE-2024-26677": { + "cmt_msg": "rxrpc: Fix delayed ACKs to not set the reference serial number", + "cmt_id": "63719f490e6a89896e9a463d2b45e8203eab23ae" }, - "CVE-2019-15219": { - "cmt_msg": "USB: sisusbvga: fix oops in error path of sisusb_probe" + "CVE-2024-26676": { + "cmt_msg": "af_unix: Call kfree_skb() for dead unix_(sk)->oob_skb in GC.", + "cmt_id": "82ae47c5c3a6b27fdc0f9e83c1499cb439c56140" }, - "CVE-2022-20424": { - "cmt_msg": "io_uring: remove io_identity" + "CVE-2024-26675": { + "cmt_msg": "ppp_async: limit MRU to 64K", + "cmt_id": "210d938f963dddc543b07e66a79b7d8d4bd00bd8" }, - "CVE-2018-14678": { - "cmt_msg": "x86/entry/64: Remove %ebx handling from error_entry/exit" + "CVE-2024-26674": { + "cmt_msg": "x86/lib: Revert to _ASM_EXTABLE_UA() for {get,put}_user() fixups", + "cmt_id": "2da241c5ed78d0978228a1150735539fe1a60eca" }, - "CVE-2022-20422": { - "cmt_msg": "arm64: fix oops in concurrently setting insn_emulation sysctls" + "CVE-2024-26659": { + "cmt_msg": "xhci: handle isoc Babble and Buffer Overrun events properly", + "cmt_id": "418456c0ce56209610523f21734c5612ee634134" }, - "CVE-2022-20421": { - "cmt_msg": "binder: fix UAF of ref->proc caused by race condition" + "CVE-2024-26658": { + "cmt_msg": "bcachefs: grab s_umount only if snapshotting", + "cmt_id": "5b41d3fd04c6757b9c2a60a0c5b2609cae9999df" }, - "CVE-2023-4385": { - "cmt_msg": "fs: jfs: fix possible NULL pointer dereference in dbFree()" + "CVE-2024-26679": { + "cmt_msg": "inet: read sk->sk_family once in inet_recv_error()", + "cmt_id": "307fa8a75ab7423fa5c73573ec3d192de5027830" }, - "CVE-2020-25643": { - "cmt_msg": "hdlc_ppp: add range checks in ppp_cp_parse_cr()" + "CVE-2024-26678": { + "cmt_msg": "x86/efistub: Use 1:1 file:memory mapping for PE/COFF .compat section", + "cmt_id": "4adeeff8c12321cd453412a659c3c0eeb9bb2397" }, - "CVE-2023-4387": { - "cmt_msg": "net: vmxnet3: fix possible use-after-free bugs in vmxnet3_rq_alloc_rx_buf()" + "CVE-2023-52636": { + "cmt_msg": "libceph: just wait for more data to be available on the socket", + "cmt_id": "bd9442e553ab8bf74b8be3b3c0a43bf4af4dc9b8" }, - "CVE-2019-19378": { - "cmt_msg": "" + "CVE-2023-52631": { + "cmt_msg": "fs/ntfs3: Fix an NULL dereference bug", + "cmt_id": "686820fe141ea0220fc6fdfc7e5694f915cf64b2" }, - "CVE-2020-4788": { - "cmt_msg": "powerpc/64s: flush L1D on kernel entry" + "CVE-2023-52630": { + "cmt_msg": "blk-iocost: Fix an UBSAN shift-out-of-bounds warning", + "cmt_id": "cd33b330cb21675189e747953845f5c3689e4912" }, - "CVE-2022-36879": { - "cmt_msg": "xfrm: xfrm_policy: fix a possible double xfrm_pols_put() in xfrm_bundle_lookup()" + "CVE-2024-26682": { + "cmt_msg": "wifi: mac80211: improve CSA/ECSA connection refusal", + "cmt_id": "ea88bde8e3fefbe4268f6991375dd629895a090a" }, - "CVE-2022-1011": { - "cmt_msg": "fuse: fix pipe buffer lifetime for direct_io" + "CVE-2024-26683": { + "cmt_msg": "wifi: cfg80211: detect stuck ECSA element in probe resp", + "cmt_id": "ce112c941c2b172afba3e913a90c380647d53975" }, - "CVE-2021-39698": { - "cmt_msg": "wait: add wake_up_pollfree()" + "CVE-2024-26680": { + "cmt_msg": "net: atlantic: Fix DMA mapping for PTP hwts ring", + "cmt_id": "e42e334c645575be5432adee224975d4f536fdb1" }, - "CVE-2022-45934": { - "cmt_msg": "Bluetooth: L2CAP: Fix u8 overflow" + "CVE-2024-26681": { + "cmt_msg": "netdevsim: avoid potential loop in nsim_dev_trap_report_work()", + "cmt_id": "d91964cdada76740811b7c621239f9c407820dbc" }, - "CVE-2022-1247": { - "cmt_msg": "" + "CVE-2024-26684": { + "cmt_msg": "net: stmmac: xgmac: fix handling of DPP safety error for DMA channels", + "cmt_id": "3b48c9e258c8691c2f093ee07b1ea3764caaa1b2" }, - "CVE-2019-19377": { - "cmt_msg": "btrfs: Don't submit any btree write bio if the fs has errors" + "CVE-2024-26581": { + "cmt_msg": "netfilter: nft_set_rbtree: skip end interval element from gc", + "cmt_id": "6eb14441f10602fa1cf691da9d685718b68b78a9" }, - "CVE-2022-2380": { - "cmt_msg": "video: fbdev: sm712fb: Fix crash in smtcfb_read()" + "CVE-2024-26600": { + "cmt_msg": "phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP", + "cmt_id": "396e17af6761b3cc9e6e4ca94b4de7f642bfece1" }, - "CVE-2022-0850": { - "cmt_msg": "ext4: fix kernel infoleak via ext4_extent_header" + "CVE-2024-26601": { + "cmt_msg": "ext4: regenerate buddy after block freeing failed if under fc replay", + "cmt_id": "6b0d48647935e4b8c7b75d1eccb9043fcd4ee581" }, - "CVE-2019-19529": { - "cmt_msg": "can: mcba_usb: fix use-after-free on disconnect" + "CVE-2024-26605": { + "cmt_msg": "PCI/ASPM: Fix deadlock when enabling ASPM", + "cmt_id": "ef90508574d7af48420bdc5f7b9a4f1cdd26bc70" }, - "CVE-2019-19528": { - "cmt_msg": "USB: iowarrior: fix use-after-free on disconnect" + "CVE-2024-26660": { + "cmt_msg": "drm/amd/display: Implement bounds check for stream encoder creation in DCN301", + "cmt_id": "a938eab9586eea31cfd129a507f552efae14d738" }, - "CVE-2021-3612": { - "cmt_msg": "Input: joydev - prevent potential read overflow in ioctl" + "CVE-2024-26661": { + "cmt_msg": "drm/amd/display: Add NULL test for 'timing generator' in 'dcn21_set_pipe()'", + "cmt_id": "39f24c08363af1cd945abad84e3c87fd3e3c845a" }, - "CVE-2019-19525": { - "cmt_msg": "ieee802154: atusb: fix use-after-free at disconnect" + "CVE-2024-26662": { + "cmt_msg": "drm/amd/display: Fix 'panel_cntl' could be null in 'dcn21_set_backlight_level()'", + "cmt_id": "0c863cab0e9173f8b6c7bc328bee3b8625f131b5" }, - "CVE-2019-19524": { - "cmt_msg": "Input: ff-memless - kill timer in destroy()" + "CVE-2024-26663": { + "cmt_msg": "tipc: Check the bearer type before calling tipc_udp_nl_bearer_add()", + "cmt_id": "0cd331dfd6023640c9669d0592bc0fd491205f87" }, - "CVE-2019-19527": { - "cmt_msg": "HID: hiddev: do cleanup in failure of opening a device" + "CVE-2024-26664": { + "cmt_msg": "hwmon: (coretemp) Fix out-of-bounds memory access", + "cmt_id": "3a7753bda55985dc26fae17795cb10d825453ad1" }, - "CVE-2019-19526": { - "cmt_msg": "NFC: pn533: fix use-after-free and memleaks" + "CVE-2024-26665": { + "cmt_msg": "tunnels: fix out of bounds access when building IPv6 PMTU error", + "cmt_id": "7dc9feb8b1705cf00de20563b6bc4831f4c99dab" }, - "CVE-2023-31085": { - "cmt_msg": "ubi: Refuse attaching if mtd's erasesize is 0" + "CVE-2024-26666": { + "cmt_msg": "wifi: mac80211: fix RCU use in TDLS fast-xmit", + "cmt_id": "c255c3b653c6e8b52ac658c305e2fece2825f7ad" }, - "CVE-2019-19523": { - "cmt_msg": "USB: adutux: fix use-after-free on disconnect" + "CVE-2024-26667": { + "cmt_msg": "drm/msm/dpu: check for valid hw_pp in dpu_encoder_helper_phys_cleanup", + "cmt_id": "eb4f56f3ff5799ca754ae6d811803a63fe25a4a2" + } + }, + "6.7.6": { + "CVE-2024-26593": { + "cmt_msg": "i2c: i801: Fix block process call transactions", + "cmt_id": "609c7c1cc976e740d0fed4dbeec688b3ecb5dce2" }, - "CVE-2021-3752": { - "cmt_msg": "Bluetooth: fix use-after-free error in lock_sock_nested()" + "CVE-2024-1151": { + "cmt_msg": "net: openvswitch: limit the number of recursions from action sets", + "cmt_id": "da05eb129c0208ef907420480c5859083408dc2c" }, - "CVE-2020-11725": { - "cmt_msg": "" + "CVE-2024-26720": { + "cmt_msg": "mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again", + "cmt_id": "65977bed167a92e87085e757fffa5798f7314c9f" }, - "CVE-2021-0937": { - "cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write" + "CVE-2024-26723": { + "cmt_msg": "lan966x: Fix crash when adding interface under a lag", + "cmt_id": "2a492f01228b7d091dfe38974ef40dccf8f9f2f1" }, - "CVE-2022-1263": { - "cmt_msg": "KVM: avoid NULL pointer dereference in kvm_dirty_ring_push" + "CVE-2024-26719": { + "cmt_msg": "nouveau: offload fence uevents work to workqueue", + "cmt_id": "985d053f7633d8b539ab1531738d538efac678a9" }, - "CVE-2021-35477": { - "cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4" + "CVE-2023-52639": { + "cmt_msg": "KVM: s390: vsie: fix race during shadow creation", + "cmt_id": "28bb27824f25f36e5f80229a358d66ee09244082" }, - "CVE-2023-31436": { - "cmt_msg": "net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg" + "CVE-2023-52638": { + "cmt_msg": "can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock", + "cmt_id": "559b6322f9480bff68cfa98d108991e945a4f284" }, - "CVE-2022-3521": { - "cmt_msg": "kcm: avoid potential race in kcm_tx_work" + "CVE-2023-52637": { + "cmt_msg": "can: j1939: Fix UAF in j1939_sk_match_filter during setsockopt(SO_J1939_FILTER)", + "cmt_id": "fc74b9cb789cae061bbca7b203a3842e059f6b5d" }, - "CVE-2023-31082": { - "cmt_msg": "" + "CVE-2024-26606": { + "cmt_msg": "binder: signal epoll threads of self-work", + "cmt_id": "93b372c39c40cbf179e56621e6bc48240943af69" }, - "CVE-2022-47929": { - "cmt_msg": "net: sched: disallow noqueue for qdisc classes" + "CVE-2024-26718": { + "cmt_msg": "dm-crypt, dm-verity: disable tasklets", + "cmt_id": "0c45a20cbe68bc4d681734f5c03891124a274257" }, - "CVE-2019-16746": { - "cmt_msg": "nl80211: validate beacon head" + "CVE-2024-26724": { + "cmt_msg": "net/mlx5: DPLL, Fix possible use after free after delayed work timer triggers", + "cmt_id": "1596126ea50228f0ed96697bae4e9368fda02c56" }, - "CVE-2021-41864": { - "cmt_msg": "bpf: Fix integer overflow in prealloc_elems_and_freelist()" + "CVE-2024-26688": { + "cmt_msg": "fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super", + "cmt_id": "ec78418801ef7b0c22cd6a30145ec480dd48db39" }, - "CVE-2023-31081": { - "cmt_msg": "" + "CVE-2024-26689": { + "cmt_msg": "ceph: prevent use-after-free in encode_cap_msg()", + "cmt_id": "7958c1bf5b03c6f1f58e724dbdec93f8f60b96fc" }, - "CVE-2022-2209": { - "cmt_msg": "" + "CVE-2024-26725": { + "cmt_msg": "dpll: fix possible deadlock during netlink dump operation", + "cmt_id": "087739cbd0d0b87b6cec2c0799436ac66e24acc8" }, - "CVE-2018-18021": { - "cmt_msg": "arm64: KVM: Tighten guest core register access from userspace" + "CVE-2024-26727": { + "cmt_msg": "btrfs: do not ASSERT() if the newly created subvolume already got read", + "cmt_id": "5a172344bfdabb46458e03708735d7b1a918c468" }, - "CVE-2022-45887": { - "cmt_msg": "media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb()" + "CVE-2024-26686": { + "cmt_msg": "fs/proc: do_task_stat: use sig->stats_lock to gather the threads/children stats", + "cmt_id": "27978243f165b44e342f28f449b91327944ea071" }, - "CVE-2020-13143": { - "cmt_msg": "USB: gadget: fix illegal array access in binding with UDC" + "CVE-2024-26687": { + "cmt_msg": "xen/events: close evtchn after mapping cleanup", + "cmt_id": "9be71aa12afa91dfe457b3fb4a444c42b1ee036b" }, - "CVE-2019-8980": { - "cmt_msg": "exec: Fix mem leak in kernel_read_file" + "CVE-2024-26685": { + "cmt_msg": "nilfs2: fix potential bug in end_buffer_async_write", + "cmt_id": "626daab3811b772086aef1bf8eed3ffe6f523eff" }, - "CVE-2023-45871": { - "cmt_msg": "igb: set max size RX buffer when store bad packet is enabled" + "CVE-2024-26709": { + "cmt_msg": "powerpc/iommu: Fix the missing iommu_group_put() during platform domain attach", + "cmt_id": "c90fdea9cac9eb419fc266e75d625cb60c8f7f6c" }, - "CVE-2023-7042": { - "cmt_msg": "" + "CVE-2024-26708": { + "cmt_msg": "mptcp: really cope with fastopen race", + "cmt_id": "e158fb9679d15a2317ec13b4f6301bd26265df2f" }, - "CVE-2022-3594": { - "cmt_msg": "r8152: Rate limit overflow messages" + "CVE-2024-26703": { + "cmt_msg": "tracing/timerlat: Move hrtimer_init to timerlat_fd open()", + "cmt_id": "2354d29986ebd138f89c2b73fecf8237e0a4ad6b" }, - "CVE-2018-14609": { - "cmt_msg": "btrfs: relocation: Only remove reloc rb_trees if reloc control has been initialized" + "CVE-2024-26702": { + "cmt_msg": "iio: magnetometer: rm3100: add boundary check for the value read from RM3100_REG_TMRC", + "cmt_id": "57d05dbbcd0b3dc0c252103b43012eef5d6430d1" }, - "CVE-2023-35824": { - "cmt_msg": "media: dm1105: Fix use after free bug in dm1105_remove due to race condition" + "CVE-2024-26700": { + "cmt_msg": "drm/amd/display: Fix MST Null Ptr for RV", + "cmt_id": "5cd7185d2db76c42a9b7e69adad9591d9fca093f" }, - "CVE-2021-33098": { - "cmt_msg": "ixgbe: fix large MTU request from VF" + "CVE-2024-26707": { + "cmt_msg": "net: hsr: remove WARN_ONCE() in send_hsr_supervision_frame()", + "cmt_id": "547545e50c913861219947ce490c68a1776b9b51" }, - "CVE-2022-3595": { - "cmt_msg": "cifs: fix double-fault crash during ntlmssp" + "CVE-2024-26621": { + "cmt_msg": "mm: huge_memory: don't force huge page alignment on 32 bit", + "cmt_id": "7432376c913381c5f24d373a87ff629bbde94b47" }, - "CVE-2023-47233": { - "cmt_msg": "" + "CVE-2024-0841": { + "cmt_msg": "fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super", + "cmt_id": "ec78418801ef7b0c22cd6a30145ec480dd48db39" }, - "CVE-2020-10769": { - "cmt_msg": "crypto: authenc - fix parsing key with misaligned rta_len" + "CVE-2024-26704": { + "cmt_msg": "ext4: fix double-free of blocks due to wrong extents moved_len", + "cmt_id": "559ddacb90da1d8786dd8ec4fd76bbfa404eaef6" }, - "CVE-2020-27815": { - "cmt_msg": "jfs: Fix array index bounds check in dbAdjTree" + "CVE-2024-26602": { + "cmt_msg": "sched/membarrier: reduce the ability to hammer on sys_membarrier", + "cmt_id": "c5b2063c65d05e79fad8029324581d86cfba7eea" }, - "CVE-2022-23041": { - "cmt_msg": "xen/9p: use alloc/free_pages_exact()" + "CVE-2024-26603": { + "cmt_msg": "x86/fpu: Stop relying on userspace for info to fault in xsave buffer", + "cmt_id": "627e28cbb65564e55008315d9e02fbb90478beda" }, - "CVE-2021-33624": { - "cmt_msg": "bpf: Inherit expanded/patched seen count from old aux data" + "CVE-2024-26583": { + "cmt_msg": "tls: fix race between async notify and socket close", + "cmt_id": "6209319b2efdd8524691187ee99c40637558fa33" }, - "CVE-2022-1462": { - "cmt_msg": "tty: use new tty_insert_flip_string_and_push_buffer() in pty_write()" + "CVE-2024-26582": { + "cmt_msg": "net: tls: fix use-after-free with partial reads and async decrypt", + "cmt_id": "754c9bab77a1b895b97bd99d754403c505bc79df" }, - "CVE-2022-3115": { - "cmt_msg": "drm: mali-dp: potential dereference of null pointer" + "CVE-2024-26585": { + "cmt_msg": "tls: fix race between tx work scheduling and socket close", + "cmt_id": "e327ed60bff4a991cd7a709c47c4f0c5b4a4fd57" }, - "CVE-2023-6606": { - "cmt_msg": "smb: client: fix OOB in smbCalcSize()" + "CVE-2024-26584": { + "cmt_msg": "net: tls: handle backlogging of crypto requests", + "cmt_id": "ab6397f072e5097f267abf5cb08a8004e6b17694" }, - "CVE-2023-3006": { - "cmt_msg": "arm64: Add AMPERE1 to the Spectre-BHB affected list" + "CVE-2024-26604": { + "cmt_msg": "Revert \"kobject: Remove redundant checks for whether ktype is NULL\"", + "cmt_id": "b746d52ce7bcac325a2fa264216ead85b7fbbfaa" }, - "CVE-2020-27777": { - "cmt_msg": "powerpc/rtas: Restrict RTAS requests from userspace" + "CVE-2024-26726": { + "cmt_msg": "btrfs: don't drop extent_map for free space inode on write error", + "cmt_id": "a4b7741c8302e28073bfc6dd1c2e73598e5e535e" }, - "CVE-2019-20636": { - "cmt_msg": "Input: add safety guards to input_set_keycode()" + "CVE-2024-26722": { + "cmt_msg": "ASoC: rt5645: Fix deadlock in rt5645_jack_detect_work()", + "cmt_id": "ed5b8b735369b40d6c1f8ef3e62d369f74b4c491" }, - "CVE-2019-11486": { - "cmt_msg": "tty: mark Siemens R3964 line discipline as BROKEN" + "CVE-2024-26721": { + "cmt_msg": "drm/i915/dsc: Fix the macro that calculates DSCC_/DSCA_ PPS reg address", + "cmt_id": "ff5999fb03f467e1e7159f0ddb199c787f7512b9" }, - "CVE-2019-11487": { - "cmt_msg": "fs: prevent page refcount overflow in pipe_buf_get" + "CVE-2023-52429": { + "cmt_msg": "dm: limit the number of targets and parameter size area", + "cmt_id": "cd70175481f63af31901dd463e44386f033c3f4c" }, - "CVE-2022-28390": { - "cmt_msg": "can: ems_usb: ems_usb_start_xmit(): fix double dev_kfree_skb() in error path" + "CVE-2024-26705": { + "cmt_msg": "parisc: BTLB: Fix crash when setting up BTLB at CPU bringup", + "cmt_id": "aa52be55276614d33f22fbe7da36c40d6432d10b" }, - "CVE-2020-27673": { - "cmt_msg": "xen/events: add a proper barrier to 2-level uevent unmasking" + "CVE-2024-26699": { + "cmt_msg": "drm/amd/display: Fix array-index-out-of-bounds in dcn35_clkmgr", + "cmt_id": "ca400d8e0c1c9d79c08dfb6b7f966e26c8cae7fb" }, - "CVE-2020-27675": { - "cmt_msg": "xen/events: avoid removing an event channel while handling it" + "CVE-2024-26698": { + "cmt_msg": "hv_netvsc: Fix race condition between netvsc_probe and netvsc_remove", + "cmt_id": "0e8875de9dad12805ff66e92cd5edea6a421f1cd" }, - "CVE-2020-28915": { - "cmt_msg": "fbcon: Fix global-out-of-bounds read in fbcon_get_font()" + "CVE-2024-26691": { + "cmt_msg": "KVM: arm64: Fix circular locking dependency", + "cmt_id": "3ab1c40a1e915e350d9181a4603af393141970cc" }, - "CVE-2019-20908": { - "cmt_msg": "efi: Restrict efivar_ssdt_load when the kernel is locked down" + "CVE-2024-26690": { + "cmt_msg": "net: stmmac: protect updates of 64-bit statistics counters", + "cmt_id": "e6af0f082a4b87b99ad033003be2a904a1791b3f" }, - "CVE-2023-3776": { - "cmt_msg": "net/sched: cls_fw: Fix improper refcount update leads to use-after-free" + "CVE-2024-26693": { + "cmt_msg": "wifi: iwlwifi: mvm: fix a crash when we run out of stations", + "cmt_id": "c12f0f4d4caf23b1bfdc2602b6b70d56bdcd6aa7" }, - "CVE-2021-28038": { - "cmt_msg": "Xen/gnttab: handle p2m update errors on a per-slot basis" + "CVE-2024-26692": { + "cmt_msg": "smb: Fix regression in writes when non-standard maximum write size negotiated", + "cmt_id": "63c35afd50e28b49c5b75542045a8c42b696dab9" }, - "CVE-2022-23040": { - "cmt_msg": "xen/xenbus: don't let xenbus_grant_ring() remove grants in error case" + "CVE-2024-26695": { + "cmt_msg": "crypto: ccp - Fix null pointer dereference in __sev_platform_shutdown_locked", + "cmt_id": "b5909f197f3b26aebedca7d8ac7b688fd993a266" }, - "CVE-2021-29154": { - "cmt_msg": "bpf, x86: Validate computation of branch displacements for x86-64" + "CVE-2024-26694": { + "cmt_msg": "wifi: iwlwifi: fix double-free bug", + "cmt_id": "d24eb9a27bea8fe5237fa71be274391d9d51eff2" }, - "CVE-2023-52435": { - "cmt_msg": "net: prevent mss overflow in skb_segment()" + "CVE-2024-26697": { + "cmt_msg": "nilfs2: fix data corruption in dsync block recovery for small block sizes", + "cmt_id": "2000016bab499074e6248ea85aeea7dd762355d9" }, - "CVE-2023-52434": { - "cmt_msg": "smb: client: fix potential OOBs in smb2_parse_contexts()" + "CVE-2024-26696": { + "cmt_msg": "nilfs2: fix hang in nilfs_lookup_dirty_data_buffers()", + "cmt_id": "e38585401d464578d30f5868ff4ca54475c34f7d" }, - "CVE-2023-3161": { - "cmt_msg": "fbcon: Check font dimension limits" + "CVE-2024-26706": { + "cmt_msg": "parisc: Fix random data corruption from exception handler", + "cmt_id": "ce31d79aa1f13a2345791f84935281a2c194e003" }, - "CVE-2023-52436": { - "cmt_msg": "f2fs: explicitly null-terminate the xattr list" + "CVE-2024-23850": { + "cmt_msg": "btrfs: do not ASSERT() if the newly created subvolume already got read", + "cmt_id": "5a172344bfdabb46458e03708735d7b1a918c468" }, - "CVE-2019-19060": { - "cmt_msg": "iio: imu: adis16400: release allocated memory on failure" + "CVE-2024-23851": { + "cmt_msg": "dm: limit the number of targets and parameter size area", + "cmt_id": "cd70175481f63af31901dd463e44386f033c3f4c" }, - "CVE-2019-19061": { - "cmt_msg": "iio: imu: adis16400: fix memory leak" + "CVE-2024-26714": { + "cmt_msg": "interconnect: qcom: sc8180x: Mark CO0 BCM keepalive", + "cmt_id": "7a3a70dd08e4b7dffc2f86f2c68fc3812804b9d0" }, - "CVE-2019-19062": { - "cmt_msg": "crypto: user - fix memory leak in crypto_report" + "CVE-2024-26715": { + "cmt_msg": "usb: dwc3: gadget: Fix NULL pointer dereference in dwc3_gadget_suspend", + "cmt_id": "36695d5eeeefe5a64b47d0336e7c8fc144e78182" }, - "CVE-2019-19063": { - "cmt_msg": "rtlwifi: prevent memory leak in rtl_usb_probe" + "CVE-2024-26716": { + "cmt_msg": "usb: core: Prevent null pointer dereference in update_port_device_state", + "cmt_id": "465b545d1d7ef282192ddd4439b08279bdb13f6f" }, - "CVE-2019-19065": { - "cmt_msg": "RDMA/hfi1: Prevent memory leak in sdma_init" + "CVE-2024-26717": { + "cmt_msg": "HID: i2c-hid-of: fix NULL-deref on failed power up", + "cmt_id": "e28d6b63aeecbda450935fb58db0e682ea8212d3" }, - "CVE-2019-19066": { - "cmt_msg": "scsi: bfa: release allocated memory in case of error" + "CVE-2024-26711": { + "cmt_msg": "iio: adc: ad4130: zero-initialize clock init data", + "cmt_id": "02876e2df02f8b17a593d77a0a7879a8109b27e1" }, - "CVE-2019-19067": { - "cmt_msg": "drm/amdgpu: fix multiple memory leaks in acp_hw_init" + "CVE-2024-26712": { + "cmt_msg": "powerpc/kasan: Fix addr error caused by page alignment", + "cmt_id": "70ef2ba1f4286b2b73675aeb424b590c92d57b25" }, - "CVE-2019-19068": { - "cmt_msg": "rtl8xxxu: prevent leaking urb" + "CVE-2024-26713": { + "cmt_msg": "powerpc/pseries/iommu: Fix iommu initialisation during DLPAR add", + "cmt_id": "12b55cfdd3ab91c70cc945cf8b5f45984ea0abf1" + } + }, + "6.7.7": { + "CVE-2024-26732": { + "cmt_msg": "net: implement lockless setsockopt(SO_PEEK_OFF)", + "cmt_id": "897f75e2cde8a5f9f7529b55249af1fa4248c83b" }, - "CVE-2020-0435": { - "cmt_msg": "f2fs: fix to do sanity check with i_extra_isize" + "CVE-2024-26733": { + "cmt_msg": "arp: Prevent overflow in arp_req_get().", + "cmt_id": "3ab0d6f8289ba8402ca95a9fc61a34909d5e1f3a" }, - "CVE-2020-0432": { - "cmt_msg": "staging: most: net: fix buffer overflow" + "CVE-2024-26730": { + "cmt_msg": "hwmon: (nct6775) Fix access to temperature configuration registers", + "cmt_id": "c196387820c9214c5ceaff56d77303c82514b8b1" }, - "CVE-2020-0433": { - "cmt_msg": "blk-mq: sync the update nr_hw_queues with blk_mq_queue_tag_busy_iter" + "CVE-2024-26731": { + "cmt_msg": "bpf, sockmap: Fix NULL pointer dereference in sk_psock_verdict_data_ready()", + "cmt_id": "d61608a4e394f23e0dca099df9eb8e555453d949" }, - "CVE-2020-0430": { - "cmt_msg": "bpf: reject passing modified ctx to helper functions" + "CVE-2024-26736": { + "cmt_msg": "afs: Increase buffer size in afs_update_volume_status()", + "cmt_id": "d34a5e57632bb5ff825196ddd9a48ca403626dfa" }, - "CVE-2019-3874": { - "cmt_msg": "sctp: implement memory accounting on tx path" + "CVE-2024-26737": { + "cmt_msg": "bpf: Fix racing between bpf_timer_cancel_and_free and bpf_timer_cancel", + "cmt_id": "7d80a9e745fa5b47da3bca001f186c02485c7c33" }, - "CVE-2018-10877": { - "cmt_msg": "ext4: verify the depth of extent tree in ext4_find_extent()" + "CVE-2024-26734": { + "cmt_msg": "devlink: fix possible use-after-free and memory leaks in devlink_init()", + "cmt_id": "e91d3561e28d7665f4f837880501dc8755f635a9" }, - "CVE-2018-10876": { - "cmt_msg": "ext4: only look at the bg_flags field if it is valid" + "CVE-2024-26735": { + "cmt_msg": "ipv6: sr: fix possible use-after-free and null-ptr-deref", + "cmt_id": "02b08db594e8218cfbc0e4680d4331b457968a9b" }, - "CVE-2010-4563": { - "cmt_msg": "" + "CVE-2024-26776": { + "cmt_msg": "spi: hisi-sfc-v3xx: Return IRQ_NONE if no interrupts were detected", + "cmt_id": "e4168ac25b4bd378bd7dda322d589482a136c1fd" }, - "CVE-2023-1249": { - "cmt_msg": "coredump: Use the vma snapshot in fill_files_note" + "CVE-2024-26751": { + "cmt_msg": "ARM: ep93xx: Add terminator to gpiod_lookup_table", + "cmt_id": "6abe0895b63c20de06685c8544b908c7e413efa8" }, - "CVE-2020-14331": { - "cmt_msg": "vgacon: Fix for missing check in scrollback handling" + "CVE-2024-26738": { + "cmt_msg": "powerpc/pseries/iommu: DLPAR add doesn't completely initialize pci_controller", + "cmt_id": "46e36ebd5e00a148b67ed77c1d31675996f77c25" }, - "CVE-2018-10879": { - "cmt_msg": "ext4: make sure bitmaps and the inode table don't overlap with bg descriptors" + "CVE-2024-26739": { + "cmt_msg": "net/sched: act_mirred: don't override retval if we already lost the skb", + "cmt_id": "f4e294bbdca8ac8757db436fc82214f3882fc7e7" }, - "CVE-2019-14835": { - "cmt_msg": "vhost: make sure log_num < in_num" + "CVE-2024-26754": { + "cmt_msg": "gtp: fix use-after-free and null-ptr-deref in gtp_genl_dump_pdp()", + "cmt_id": "5013bd54d283eda5262c9ae3bcc966d01daf8576" }, - "CVE-2023-2248": { - "cmt_msg": "net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg" + "CVE-2024-26755": { + "cmt_msg": "md: Don't suspend the array for interrupted reshape", + "cmt_id": "60d6130d0ac1d883ed93c2a1e10aadb60967fd48" }, - "CVE-2023-0266": { - "cmt_msg": "ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF" + "CVE-2024-26756": { + "cmt_msg": "md: Don't register sync_thread for reshape directly", + "cmt_id": "13b520fb62b772e408f9b79c5fe18ad414e90417" }, - "CVE-2023-1838": { - "cmt_msg": "Fix double fget() in vhost_net_set_backend()" + "CVE-2024-26757": { + "cmt_msg": "md: Don't ignore read-only array in md_check_recovery()", + "cmt_id": "2ea169c5a0b1134d573d07fc27a16f327ad0e7d3" }, - "CVE-2021-3483": { - "cmt_msg": "firewire: nosy: Fix a use-after-free bug in nosy_ioctl()" + "CVE-2024-26769": { + "cmt_msg": "nvmet-fc: avoid deadlock on delete association path", + "cmt_id": "1d86f79287206deec36d63b89c741cf542b6cadd" }, - "CVE-2023-6040": { - "cmt_msg": "netfilter: nf_tables: Reject tables of unsupported family" + "CVE-2024-26773": { + "cmt_msg": "ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found()", + "cmt_id": "a2576ae9a35c078e488f2c573e9e6821d651fbbe" }, - "CVE-2023-20588": { - "cmt_msg": "x86/CPU/AMD: Do not leak quotient data after a division by 0" + "CVE-2024-26768": { + "cmt_msg": "LoongArch: Change acpi_core_pic[NR_CPUS] to acpi_core_pic[MAX_CORE_PIC]", + "cmt_id": "0f6810e39898af2d2cabd9313e4dbc945fb5dfdd" }, - "CVE-2021-38300": { - "cmt_msg": "bpf, mips: Validate conditional branch offsets" + "CVE-2024-26777": { + "cmt_msg": "fbdev: sis: Error out if pixclock equals zero", + "cmt_id": "1d11dd3ea5d039c7da089f309f39c4cd363b924b" }, - "CVE-2020-25656": { - "cmt_msg": "vt: keyboard, extend func_buf_lock to readers" + "CVE-2024-26778": { + "cmt_msg": "fbdev: savage: Error out if pixclock equals zero", + "cmt_id": "a9ca4e80d23474f90841251f4ac0d941fa337a01" }, - "CVE-2021-3759": { - "cmt_msg": "memcg: enable accounting of ipc resources" + "CVE-2024-26770": { + "cmt_msg": "HID: nvidia-shield: Add missing null pointer checks to LED initialization", + "cmt_id": "e71cc4a1e584293deafff1a7dea614b0210d0443" }, - "CVE-2023-1390": { - "cmt_msg": "tipc: fix NULL deref in tipc_link_xmit()" + "CVE-2024-26765": { + "cmt_msg": "LoongArch: Disable IRQ before init_fn() for nonboot CPUs", + "cmt_id": "8bf2ca8c60712af288b88ba80f8e4df4573d923f" }, - "CVE-2022-24448": { - "cmt_msg": "NFSv4: Handle case where the lookup of a directory fails" + "CVE-2024-26764": { + "cmt_msg": "fs/aio: Restrict kiocb_set_cancel_fn() to I/O submitted via libaio", + "cmt_id": "1dc7d74fe456944a9b1c57bd776280249f441ac6" }, - "CVE-2024-26598": { - "cmt_msg": "KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache" + "CVE-2024-26758": { + "cmt_msg": "md: Don't ignore suspended array in md_check_recovery()", + "cmt_id": "a55f0d6179a19c6b982e2dc344d58c98647a3be0" }, - "CVE-2022-23042": { - "cmt_msg": "xen/netfront: react properly to failing gnttab_end_foreign_access_ref()" + "CVE-2024-26752": { + "cmt_msg": "l2tp: pass correct message length to ip6_append_data", + "cmt_id": "83340c66b498e49353530e41542500fc8a4782d6" }, - "CVE-2019-10142": { - "cmt_msg": "drivers/virt/fsl_hypervisor.c: prevent integer overflow in ioctl" + "CVE-2024-26753": { + "cmt_msg": "crypto: virtio/akcipher - Fix stack overflow on memcpy", + "cmt_id": "ef1e47d50324e232d2da484fe55a54274eeb9bc1" }, - "CVE-2021-4023": { - "cmt_msg": "io-wq: fix cancellation on create-worker failure" + "CVE-2024-26747": { + "cmt_msg": "usb: roles: fix NULL pointer issue when put module's reference", + "cmt_id": "01f82de440f2ab07c259b7573371e1c42e5565db" }, - "CVE-2018-3693": { - "cmt_msg": "ext4: fix spectre gadget in ext4_mb_regular_allocator()" + "CVE-2024-26771": { + "cmt_msg": "dmaengine: ti: edma: Add some null pointer checks to the edma_probe", + "cmt_id": "f2a5e30d1e9a629de6179fa23923a318d5feb29e" }, - "CVE-2022-2318": { - "cmt_msg": "net: rose: fix UAF bugs caused by timer handler" + "CVE-2024-26774": { + "cmt_msg": "ext4: avoid dividing by 0 in mb_update_avg_fragment_size() when block bitmap corrupt", + "cmt_id": "8cf9cc602cfb40085967c0d140e32691c8b71cf3" }, - "CVE-2021-22555": { - "cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write" + "CVE-2024-26744": { + "cmt_msg": "RDMA/srpt: Support specifying the srpt_service_guid parameter", + "cmt_id": "c99a827d3cff9f84e1cb997b7cc6386d107aa74d" }, - "CVE-2020-36694": { - "cmt_msg": "netfilter: x_tables: Switch synchronization to RCU" + "CVE-2024-26743": { + "cmt_msg": "RDMA/qedr: Fix qedr_create_user_qp error flow", + "cmt_id": "bab8875c06ebda5e01c5c4cab30022aed85c14e6" }, - "CVE-2021-0399": { - "cmt_msg": "" + "CVE-2024-26742": { + "cmt_msg": "scsi: smartpqi: Fix disable_managed_interrupts", + "cmt_id": "b9433b25cb06c415c9cb24782599649a406c8d6d" }, - "CVE-2020-36691": { - "cmt_msg": "netlink: limit recursion depth in policy validation" + "CVE-2024-26741": { + "cmt_msg": "dccp/tcp: Unhash sk from ehash for tb2 alloc failure after check_estalblished().", + "cmt_id": "f8c4a6b850882bc47aaa864b720c7a2ee3102f39" }, - "CVE-2023-42755": { - "cmt_msg": "net/sched: Retire rsvp classifier" + "CVE-2024-26740": { + "cmt_msg": "net/sched: act_mirred: use the backlog for mirred ingress", + "cmt_id": "60ddea1600bc476e0f5e02bce0e29a460ccbf0be" }, - "CVE-2020-2732": { - "cmt_msg": "KVM: nVMX: Don't emulate instructions in guest mode" + "CVE-2024-26729": { + "cmt_msg": "drm/amd/display: Fix potential null pointer dereference in dc_dmub_srv", + "cmt_id": "351080ba3414c96afff0f1338b4aeb2983195b80" }, - "CVE-2012-4542": { - "cmt_msg": "" + "CVE-2024-26728": { + "cmt_msg": "drm/amd/display: fix null-pointer dereference on edid reading", + "cmt_id": "2d392f7268a1a9bfbd98c831f0f4c964e59aa145" }, - "CVE-2022-1729": { - "cmt_msg": "perf: Fix sys_perf_event_open() race against self" + "CVE-2024-26767": { + "cmt_msg": "drm/amd/display: fixed integer types and null check locations", + "cmt_id": "beea9ab9080cd2ef46296070bb327af066ee09d7" }, - "CVE-2023-42752": { - "cmt_msg": "igmp: limit igmpv3_newpack() packet size to IP_MAX_MTU" + "CVE-2024-26766": { + "cmt_msg": "IB/hfi1: Fix sdma.h tx->num_descs off-by-one error", + "cmt_id": "9034a1bec35e9f725315a3bb6002ef39666114d9" }, - "CVE-2023-4128": { - "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free" + "CVE-2024-26761": { + "cmt_msg": "cxl/pci: Fix disabling memory if DVSEC CXL Range does not match a CFMWS window", + "cmt_id": "3a3181a71935774bda2398451256d7441426420b" }, - "CVE-2021-3573": { - "cmt_msg": "Bluetooth: use correct lock to prevent UAF of hdev object" + "CVE-2024-26760": { + "cmt_msg": "scsi: target: pscsi: Fix bio_put() for error case", + "cmt_id": "1cfe9489fb563e9a0c9cdc5ca68257a44428c2ec" }, - "CVE-2023-3609": { - "cmt_msg": "net/sched: cls_u32: Fix reference counter leak leading to overflow" + "CVE-2024-26749": { + "cmt_msg": "usb: cdns3: fixed memory use after free at cdns3_gadget_ep_disable()", + "cmt_id": "9a07244f614bc417de527b799da779dcae780b5d" }, - "CVE-2022-1974": { - "cmt_msg": "nfc: replace improper check device_is_registered() in netlink related functions" + "CVE-2024-26748": { + "cmt_msg": "usb: cdns3: fix memory double free when handle zero packet", + "cmt_id": "92d20406a3d4ff3e8be667c79209dc9ed31df5b3" }, - "CVE-2022-1975": { - "cmt_msg": "NFC: netlink: fix sleep in atomic bug when firmware download timeout" + "CVE-2024-26763": { + "cmt_msg": "dm-crypt: don't modify the data when using authenticated encryption", + "cmt_id": "d9e3763a505e50ba3bd22846f2a8db99429fb857" }, - "CVE-2023-1380": { - "cmt_msg": "wifi: brcmfmac: slab-out-of-bounds read in brcmf_get_assoc_ies()" + "CVE-2024-26759": { + "cmt_msg": "mm/swap: fix race when skipping swapcache", + "cmt_id": "d183a4631acfc7af955c02a02e739cec15f5234d" }, - "CVE-2022-44032": { - "cmt_msg": "char: pcmcia: remove all the drivers" + "CVE-2023-52640": { + "cmt_msg": "fs/ntfs3: Fix oob in ntfs_listxattr", + "cmt_id": "0830c5cf19bdec50d0ede4755ddc463663deb21c" }, - "CVE-2021-28972": { - "cmt_msg": "PCI: rpadlpar: Fix potential drc_name corruption in store functions" + "CVE-2023-52641": { + "cmt_msg": "fs/ntfs3: Add NULL ptr dereference checking at the end of attr_allocate_frame()", + "cmt_id": "847b68f58c212f0439c5a8101b3841f32caffccd" }, - "CVE-2018-12130": { - "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" + "CVE-2024-26775": { + "cmt_msg": "aoe: avoid potential deadlock at set_capacity", + "cmt_id": "19a77b27163820f793b4d022979ffdca8f659b77" }, - "CVE-2021-20292": { - "cmt_msg": "drm/ttm/nouveau: don't call tt destroy callback on alloc failure." + "CVE-2024-26779": { + "cmt_msg": "wifi: mac80211: fix race condition on enabling fast-xmit", + "cmt_id": "281280276b70c822f55ce15b661f6d1d3228aaa9" }, - "CVE-2021-31916": { - "cmt_msg": "dm ioctl: fix out of bounds array access when no devices" + "CVE-2024-26762": { + "cmt_msg": "cxl/pci: Skip to handle RAS errors if CXL.mem device is detached", + "cmt_id": "21e5e84f3f63fdf44e49642a6e45cd895e921a84" }, - "CVE-2018-17182": { - "cmt_msg": "mm: get rid of vmacache_flush_all() entirely" + "CVE-2024-26772": { + "cmt_msg": "ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal()", + "cmt_id": "21dbe20589c7f48e9c5d336ce6402bcebfa6d76a" + } + }, + "6.7.9": { + "CVE-2024-26783": { + "cmt_msg": "mm/vmscan: fix a bug calling wakeup_kswapd() with a wrong zone index", + "cmt_id": "bdd21eed8b72f9e28d6c279f6db258e090c79080" }, - "CVE-2022-32981": { - "cmt_msg": "powerpc/32: Fix overread/overwrite of thread_struct via ptrace" + "CVE-2024-26782": { + "cmt_msg": "mptcp: fix double-free on socket dismantle", + "cmt_id": "85933e80d077c9ae2227226beb86c22f464059cc" }, - "CVE-2018-13405": { - "cmt_msg": "Fix up non-directory creation in SGID directories" + "CVE-2024-26787": { + "cmt_msg": "mmc: mmci: stm32: fix DMA API overlapping mappings warning", + "cmt_id": "d610a307225951929b9dff807788439454476f85" }, - "CVE-2020-25645": { - "cmt_msg": "geneve: add transport ports in route lookup for geneve" + "CVE-2024-26786": { + "cmt_msg": "iommufd: Fix iopt_access_list_id overwrite bug", + "cmt_id": "9526a46cc0c378d381560279bea9aa34c84298a0" }, - "CVE-2018-13406": { - "cmt_msg": "video: uvesafb: Fix integer overflow in allocation" + "CVE-2024-26785": { + "cmt_msg": "iommufd: Fix protection fault in iommufd_test_syz_conv_iova", + "cmt_id": "fc719ecbca45c9c046640d72baddba3d83e0bc0b" }, - "CVE-2022-1280": { - "cmt_msg": "drm: avoid circular locks in drm_mode_getconnector" + "CVE-2024-26784": { + "cmt_msg": "pmdomain: arm: Fix NULL dereference on scmi_perf_domain removal", + "cmt_id": "f6aaf131e4d4a9a26040ecc018eb70ab8b3d355d" }, - "CVE-2023-3772": { - "cmt_msg": "xfrm: add NULL check in xfrm_update_ae_params" + "CVE-2024-26789": { + "cmt_msg": "crypto: arm64/neonbs - fix out-of-bounds access on short input", + "cmt_id": "9e8ecd4908b53941ab6f0f51584ab80c6c6606c4" }, - "CVE-2020-11668": { - "cmt_msg": "media: xirlink_cit: add missing descriptor sanity checks" + "CVE-2024-26788": { + "cmt_msg": "dmaengine: fsl-qdma: init irq after reg initialization", + "cmt_id": "677102a930643c31f1b4c512b041407058bdfef8" }, - "CVE-2020-11669": { - "cmt_msg": "powerpc/powernv/idle: Restore AMR/UAMOR/AMOR after idle" + "CVE-2024-26622": { + "cmt_msg": "tomoyo: fix UAF write bug in tomoyo_write_control()", + "cmt_id": "6edefe1b6c29a9932f558a898968a9fcbeec5711" }, - "CVE-2019-15118": { - "cmt_msg": "ALSA: usb-audio: Fix a stack buffer overflow bug in check_input_term" + "CVE-2024-26746": { + "cmt_msg": "dmaengine: idxd: Ensure safe user copy of completion record", + "cmt_id": "bb71e040323175e18c233a9afef32ba14fa64eb7" }, - "CVE-2019-12818": { - "cmt_msg": "net: nfc: Fix NULL dereference on nfc_llcp_build_tlv fails" + "CVE-2024-26745": { + "cmt_msg": "powerpc/pseries/iommu: IOMMU table is not initialized for kdump over SR-IOV", + "cmt_id": "5da6d306f315344af1ca2eff4bd9b10b130f0c28" }, - "CVE-2019-12819": { - "cmt_msg": "mdio_bus: Fix use-after-free on device_register fails" + "CVE-2024-26804": { + "cmt_msg": "net: ip_tunnel: prevent perpetual headroom growth", + "cmt_id": "049d7989c67e8dd50f07a2096dbafdb41331fb9b" }, - "CVE-2023-0394": { - "cmt_msg": "ipv6: raw: Deduct extension header length in rawv6_push_pending_frames" + "CVE-2024-26805": { + "cmt_msg": "netlink: Fix kernel-infoleak-after-free in __skb_datagram_iter", + "cmt_id": "59fc3e3d049e39e7d0d271f20dd5fb47c57faf1d" }, - "CVE-2020-10690": { - "cmt_msg": "ptp: fix the race between the release of ptp_clock and cdev" + "CVE-2024-26806": { + "cmt_msg": "spi: cadence-qspi: remove system-wide suspend helper calls from runtime PM hooks", + "cmt_id": "041562ebc4759c9932b59a06527f8753b86da365" }, - "CVE-2022-3108": { - "cmt_msg": "drm/amdkfd: Check for null pointer after calling kmemdup" + "CVE-2024-26807": { + "cmt_msg": "spi: cadence-qspi: fix pointer reference in runtime PM hooks", + "cmt_id": "34e1d5c4407c78de0e3473e1fbf8fb74dbe66d03" }, - "CVE-2019-19332": { - "cmt_msg": "KVM: x86: fix out-of-bounds write in KVM_GET_EMULATED_CPUID (CVE-2019-19332)" + "CVE-2024-26801": { + "cmt_msg": "Bluetooth: Avoid potential use-after-free in hci_error_reset", + "cmt_id": "dd594cdc24f2e48dab441732e6dfcafd6b0711d1" }, - "CVE-2019-15117": { - "cmt_msg": "ALSA: usb-audio: Fix an OOB bug in parse_audio_mixer_unit" + "CVE-2024-26802": { + "cmt_msg": "stmmac: Clear variable when destroying workqueue", + "cmt_id": "f72cf22dccc94038cbbaa1029cb575bf52e5cbc8" }, - "CVE-2021-3659": { - "cmt_msg": "net: mac802154: Fix general protection fault" + "CVE-2024-26803": { + "cmt_msg": "net: veth: clear GRO when clearing XDP even when down", + "cmt_id": "8f7a3894e58e6f5d5815533cfde60e3838947941" }, - "CVE-2022-25258": { - "cmt_msg": "USB: gadget: validate interface OS descriptor requests" + "CVE-2024-26795": { + "cmt_msg": "riscv: Sparse-Memory/vmemmap out-of-bounds fix", + "cmt_id": "2a1728c15ec4f45ed9248ae22f626541c179bfbe" }, - "CVE-2021-4155": { - "cmt_msg": "xfs: map unwritten blocks in XFS_IOC_{ALLOC,FREE}SP just like fallocate" + "CVE-2024-26796": { + "cmt_msg": "drivers: perf: ctr_get_width function for legacy is not defined", + "cmt_id": "e4f50e85de5a6b21dfdc0d7ca435eba4f62935c3" }, - "CVE-2019-14901": { - "cmt_msg": "mwifiex: Fix heap overflow in mmwifiex_process_tdls_action_frame()" + "CVE-2024-26797": { + "cmt_msg": "drm/amd/display: Prevent potential buffer overflow in map_hw_resources", + "cmt_id": "50a6302cf881f67f1410461a68fe9eabd00ff31d" }, - "CVE-2021-4150": { - "cmt_msg": "block: fix incorrect references to disk objects" + "CVE-2024-26790": { + "cmt_msg": "dmaengine: fsl-qdma: fix SoC may hang on 16 byte unaligned read", + "cmt_id": "ad2f8920c314e0a2d9e984fc94b729eca3cda471" }, - "CVE-2020-3702": { - "cmt_msg": "ath: Use safer key clearing with key cache entries" + "CVE-2024-26791": { + "cmt_msg": "btrfs: dev-replace: properly validate device names", + "cmt_id": "343eecb4ff49a7b1cc1dfe86958a805cf2341cfb" }, - "CVE-2021-3653": { - "cmt_msg": "KVM: nSVM: avoid picking up unsupported bits from L2 in int_ctl (CVE-2021-3653)" + "CVE-2024-26793": { + "cmt_msg": "gtp: fix use-after-free and null-ptr-deref in gtp_newlink()", + "cmt_id": "5366969a19a8a0d2ffb3d27ef6e8905e5e4216f8" }, - "CVE-2021-3655": { - "cmt_msg": "sctp: validate from_addr_param return" + "CVE-2024-26798": { + "cmt_msg": "fbcon: always restore the old font data in fbcon_do_set_font()", + "cmt_id": "a2c881413dcc5d801bdc9535e51270cc88cb9cd8" }, - "CVE-2020-8694": { - "cmt_msg": "powercap: restrict energy meter to root access" + "CVE-2024-26799": { + "cmt_msg": "ASoC: qcom: Fix uninitialized pointer dmactl", + "cmt_id": "d5a7726e6ea62d447b79ab5baeb537ea6bdb225b" }, - "CVE-2021-4159": { - "cmt_msg": "bpf: Verifer, adjust_scalar_min_max_vals to always call update_reg_bounds()" + "CVE-2024-26630": { + "cmt_msg": "mm: cachestat: fix folio read-after-free in cache walk", + "cmt_id": "fe7e008e0ce728252e4ec652cceebcc62211657c" + } + }, + "6.7.10": { + "CVE-2023-28746": { + "cmt_msg": "x86/mmio: Disable KVM mitigation when X86_FEATURE_CLEAR_CPU_BUF is set", + "cmt_id": "18867a204511d032c2a6ed083461a10905061fac" }, - "CVE-2023-0461": { - "cmt_msg": "net/ulp: prevent ULP without clone op from entering the LISTEN status" + "CVE-2024-26652": { + "cmt_msg": "net: pds_core: Fix possible double free in error handling path", + "cmt_id": "ffda0e962f270b3ec937660afd15b685263232d3" + } + }, + "6.7.11": { + "CVE-2024-26809": { + "cmt_msg": "netfilter: nft_set_pipapo: release elements in clone only from destroy path", + "cmt_id": "821e28d5b506e6a73ccc367ff792bd894050d48b" }, - "CVE-2019-12614": { - "cmt_msg": "powerpc/pseries/dlpar: Fix a missing check in dlpar_parse_cc_property()" + "CVE-2024-26651": { + "cmt_msg": "sr9800: Add check for usbnet_get_endpoints", + "cmt_id": "efba65777f98457773c5b65e3135c6132d3b015f" }, - "CVE-2019-12615": { - "cmt_msg": "mdesc: fix a missing-check bug in get_vdev_port_node_info()" + "CVE-2023-7042": { + "cmt_msg": "wifi: ath10k: fix NULL pointer dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev()", + "cmt_id": "db755cf93f5895bbac491d27a8e2fe04c5f9ae4a" }, - "CVE-2021-3715": { - "cmt_msg": "net_sched: cls_route: remove the right filter from hashtable" + "CVE-2024-22099": { + "cmt_msg": "Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security", + "cmt_id": "5f9fe302dd3a9bbc50f4888464c1773f45166bfd" }, - "CVE-2021-3714": { - "cmt_msg": "" + "CVE-2023-6270": { + "cmt_msg": "aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts", + "cmt_id": "079cba4f4e307c69878226fdf5228c20aa1c969c" + } + }, + "6.7.12": { + "CVE-2024-26655": { + "cmt_msg": "Fix memory leak in posix_clock_open()", + "cmt_id": "a88649b49523e8cbe95254440d803e38c19d2341" }, - "CVE-2019-16230": { - "cmt_msg": "drm/amdkfd: fix a potential NULL pointer dereference (v2)" + "CVE-2024-24861": { + "cmt_msg": "media: xc4000: Fix atomicity violation in xc4000_get_frequency", + "cmt_id": "b0864de231dece0f7226b909521bebc86105743a" }, - "CVE-2019-16231": { - "cmt_msg": "fjes: Handle workqueue allocation failure" + "CVE-2024-26657": { + "cmt_msg": "drm/sched: fix null-ptr-deref in init entity", + "cmt_id": "74cd204c7afe498aa9dcc3ebf0ecac53d477a429" }, - "CVE-2019-16232": { - "cmt_msg": "libertas: fix a potential NULL pointer dereference" + "CVE-2024-26656": { + "cmt_msg": "drm/amdgpu: fix use-after-free bug", + "cmt_id": "af054a5fb24a144f99895afce9519d709891894c" }, - "CVE-2019-16233": { - "cmt_msg": "scsi: qla2xxx: fix a potential NULL pointer dereference" + "CVE-2024-26642": { + "cmt_msg": "netfilter: nf_tables: disallow anonymous set with timeout flag", + "cmt_id": "8e07c16695583a66e81f67ce4c46e94dece47ba7" }, - "CVE-2019-16234": { - "cmt_msg": "iwlwifi: pcie: fix rb_allocator workqueue allocation" + "CVE-2024-26643": { + "cmt_msg": "netfilter: nf_tables: mark set as dead when unbinding anonymous set with timeout", + "cmt_id": "5224afbc30c3ca9ba23e752f0f138729b2c48dd8" }, - "CVE-2023-52445": { - "cmt_msg": "media: pvrusb2: fix use after free on context disconnection" + "CVE-2024-26653": { + "cmt_msg": "usb: misc: ljca: Fix double free in error handling path", + "cmt_id": "420babea4f1881a7c4ea22a8e218b8c6895d3f21" }, - "CVE-2019-6133": { - "cmt_msg": "fork: record start_time late" + "CVE-2023-47233": { + "cmt_msg": "wifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach", + "cmt_id": "6678a1e7d896c00030b31491690e8ddc9a90767a" }, - "CVE-2019-3016": { - "cmt_msg": "x86/kvm: Be careful not to clear KVM_VCPU_FLUSH_TLB bit" + "CVE-2024-26654": { + "cmt_msg": "ALSA: sh: aica: reorder cleanup operations to avoid UAF bugs", + "cmt_id": "e955e8a7f38a856fc6534ba4e6bffd4d5cc80ac3" }, - "CVE-2021-39633": { - "cmt_msg": "ip_gre: add validation for csum_start" + "CVE-2024-23307": { + "cmt_msg": "md/raid5: fix atomicity violation in raid5_cache_count", + "cmt_id": "1191f9391105e49115715e55030476849f6f6da5" + } + }, + "outstanding": { + "CVE-2020-26556": { + "cmt_msg": "" }, - "CVE-2022-27223": { - "cmt_msg": "USB: gadget: validate endpoint index for xilinx udc" + "CVE-2020-26557": { + "cmt_msg": "" }, - "CVE-2021-39634": { - "cmt_msg": "epoll: do not insert into poll queues until all sanity checks are done" + "CVE-2019-20794": { + "cmt_msg": "" }, - "CVE-2024-23851": { - "cmt_msg": "dm: limit the number of targets and parameter size area" + "CVE-2020-26559": { + "cmt_msg": "" }, - "CVE-2019-3882": { - "cmt_msg": "vfio/type1: Limit DMA mappings per container" + "CVE-2020-35501": { + "cmt_msg": "" }, - "CVE-2022-33742": { - "cmt_msg": "xen/blkfront: force data bouncing when backend is untrusted" + "CVE-2023-4010": { + "cmt_msg": "" }, - "CVE-2022-33741": { - "cmt_msg": "xen/netfront: force data bouncing when backend is untrusted" + "CVE-2018-1121": { + "cmt_msg": "" }, - "CVE-2022-33740": { - "cmt_msg": "xen/netfront: fix leaking data in shared pages" + "CVE-2019-19378": { + "cmt_msg": "" }, - "CVE-2024-24864": { + "CVE-2024-22386": { "cmt_msg": "" }, - "CVE-2019-3887": { - "cmt_msg": "KVM: x86: nVMX: close leak of L0's x2APIC MSRs (CVE-2019-3887)" + "CVE-2020-24503": { + "cmt_msg": "" }, - "CVE-2022-33744": { - "cmt_msg": "xen/arm: Fix race in RB-tree based P2M accounting" + "CVE-2020-24502": { + "cmt_msg": "" }, - "CVE-2022-40768": { - "cmt_msg": "scsi: stex: Properly zero out the passthrough command structure" + "CVE-2023-6240": { + "cmt_msg": "" }, - "CVE-2021-45486": { - "cmt_msg": "inet: use bigger hash table for IP ID generation" + "CVE-2020-11725": { + "cmt_msg": "" }, - "CVE-2020-12888": { - "cmt_msg": "vfio-pci: Invalidate mmaps and block MMIO access on disabled memory" + "CVE-2022-23825": { + "cmt_msg": "" }, - "CVE-2023-2194": { - "cmt_msg": "i2c: xgene-slimpro: Fix out-of-bounds bug in xgene_slimpro_i2c_xfer()" + "CVE-2023-3397": { + "cmt_msg": "" }, - "CVE-2021-3923": { - "cmt_msg": "RDMA/core: Don't infoleak GRH fields" + "CVE-2023-1476": { + "cmt_msg": "" }, - "CVE-2022-41218": { - "cmt_msg": "media: dvb-core: Fix UAF due to refcount races at releasing" + "CVE-2021-3864": { + "cmt_msg": "" }, - "CVE-2011-4917": { + "CVE-2022-3606": { "cmt_msg": "" }, - "CVE-2022-36946": { - "cmt_msg": "netfilter: nf_queue: do not allow packet truncation below transport header offset" + "CVE-2019-19814": { + "cmt_msg": "" }, - "CVE-2022-0812": { - "cmt_msg": "xprtrdma: fix incorrect header size calculations" + "CVE-2022-2209": { + "cmt_msg": "" }, - "CVE-2021-45485": { - "cmt_msg": "ipv6: use prandom_u32() for ID generation" + "CVE-2021-26934": { + "cmt_msg": "" }, - "CVE-2021-0448": { - "cmt_msg": "netfilter: ctnetlink: add a range check for l3/l4 protonum" + "CVE-2016-8660": { + "cmt_msg": "" }, - "CVE-2018-19824": { - "cmt_msg": "ALSA: usb-audio: Fix UAF decrement if card has no live interfaces in card.c" + "CVE-2020-15802": { + "cmt_msg": "" }, - "CVE-2022-21166": { - "cmt_msg": "x86/speculation/mmio: Enable CPU Fill buffer clearing on idle" + "CVE-2008-2544": { + "cmt_msg": "" }, - "CVE-2020-29374": { - "cmt_msg": "gup: document and work around \"COW can break either way\" issue" + "CVE-2019-15239": { + "cmt_msg": "unknown" }, - "CVE-2019-25045": { - "cmt_msg": "xfrm: clean up xfrm protocol checks" + "CVE-2007-3719": { + "cmt_msg": "" }, - "CVE-2023-4134": { - "cmt_msg": "Input: cyttsp4_core - change del_timer_sync() to timer_shutdown_sync()" + "CVE-2023-20941": { + "cmt_msg": "" }, - "CVE-2018-16862": { - "cmt_msg": "mm: cleancache: fix corruption on missed inode invalidation" + "CVE-2023-21400": { + "cmt_msg": "" }, - "CVE-2023-52449": { - "cmt_msg": "mtd: Fix gluebi NULL pointer dereference caused by ftl notifier" + "CVE-2023-2640": { + "cmt_msg": "" }, - "CVE-2021-29650": { - "cmt_msg": "netfilter: x_tables: Use correct memory barriers." + "CVE-2010-4563": { + "cmt_msg": "" }, - "CVE-2019-17133": { - "cmt_msg": "cfg80211: wext: avoid copying malformed SSIDs" + "CVE-2020-26140": { + "cmt_msg": "" }, - "CVE-2018-20169": { - "cmt_msg": "USB: check usb_get_extra_descriptor for proper size" + "CVE-2020-26143": { + "cmt_msg": "" }, - "CVE-2020-36558": { - "cmt_msg": "vt: vt_ioctl: fix race in VT_RESIZEX" + "CVE-2020-26142": { + "cmt_msg": "" }, - "CVE-2022-41849": { - "cmt_msg": "fbdev: smscufx: Fix use-after-free in ufx_ops_open()" + "CVE-2024-23848": { + "cmt_msg": "" }, - "CVE-2022-41848": { + "CVE-2022-3533": { "cmt_msg": "" }, - "CVE-2020-36312": { - "cmt_msg": "KVM: fix memory leak in kvm_io_bus_unregister_dev()" + "CVE-2022-1247": { + "cmt_msg": "" }, - "CVE-2022-1353": { - "cmt_msg": "af_key: add __GFP_ZERO flag for compose_sadb_supported in function pfkey_register" + "CVE-2020-10708": { + "cmt_msg": "" }, - "CVE-2022-28356": { - "cmt_msg": "llc: fix netdevice reference leaks in llc_ui_bind()" + "CVE-2022-4543": { + "cmt_msg": "" }, - "CVE-2022-1198": { - "cmt_msg": "drivers: hamradio: 6pack: fix UAF bug caused by mod_timer()" + "CVE-2017-13693": { + "cmt_msg": "" }, - "CVE-2022-1199": { - "cmt_msg": "ax25: Fix NULL pointer dereference in ax25_kill_by_device" + "CVE-2021-0399": { + "cmt_msg": "" }, - "CVE-2023-6546": { - "cmt_msg": "tty: n_gsm: fix the UAF caused by race condition in gsm_cleanup_mux" + "CVE-2017-13694": { + "cmt_msg": "" }, - "CVE-2021-39801": { + "CVE-2024-0564": { "cmt_msg": "" }, - "CVE-2021-39800": { + "CVE-2012-4542": { "cmt_msg": "" }, - "CVE-2018-16884": { - "cmt_msg": "sunrpc: use-after-free in svc_process_common()" + "CVE-2013-7445": { + "cmt_msg": "" }, - "CVE-2018-16882": { - "cmt_msg": "KVM: Fix UAF in nested posted interrupt processing" + "CVE-2024-24859": { + "cmt_msg": "" }, - "CVE-2022-1195": { - "cmt_msg": "hamradio: improve the incomplete fix to avoid NPD" + "CVE-2024-24858": { + "cmt_msg": "" }, - "CVE-2018-16880": { - "cmt_msg": "vhost: fix OOB in get_rx_bufs()" + "CVE-2005-3660": { + "cmt_msg": "" }, - "CVE-2021-4202": { - "cmt_msg": "NFC: reorganize the functions in nci_request" + "CVE-2024-24857": { + "cmt_msg": "" }, - "CVE-2021-4203": { - "cmt_msg": "af_unix: fix races in sk_peer_pid and sk_peer_cred accesses" + "CVE-2023-6238": { + "cmt_msg": "" }, - "CVE-2022-4269": { - "cmt_msg": "act_mirred: use the backlog for nested calls to mirred ingress" + "CVE-2023-31082": { + "cmt_msg": "" }, - "CVE-2022-45886": { - "cmt_msg": "media: dvb-core: Fix use-after-free due on race condition at dvb_net" + "CVE-2023-31081": { + "cmt_msg": "" }, - "CVE-2023-46343": { - "cmt_msg": "nfc: nci: fix possible NULL pointer dereference in send_acknowledge()" + "CVE-2022-38096": { + "cmt_msg": "" }, - "CVE-2024-25744": { - "cmt_msg": "x86/coco: Disable 32-bit emulation by default on TDX and SEV" + "CVE-2022-3544": { + "cmt_msg": "" }, - "CVE-2023-5178": { - "cmt_msg": "nvmet-tcp: Fix a possible UAF in queue intialization setup" + "CVE-2022-3238": { + "cmt_msg": "" }, - "CVE-2023-51779": { - "cmt_msg": "Bluetooth: af_bluetooth: Fix Use-After-Free in bt_sock_recvmsg" + "CVE-2008-4609": { + "cmt_msg": "" }, - "CVE-2023-2124": { - "cmt_msg": "xfs: verify buffer contents when we skip log replay" + "CVE-2020-14304": { + "cmt_msg": "" }, - "CVE-2024-26594": { - "cmt_msg": "ksmbd: validate mech token in session setup" + "CVE-2020-0347": { + "cmt_msg": "" }, - "CVE-2023-1281": { - "cmt_msg": "net/sched: tcindex: update imperfect hash filters respecting rcu" + "CVE-2021-3714": { + "cmt_msg": "" }, - "CVE-2023-2860": { - "cmt_msg": "ipv6: sr: fix out-of-bounds read when setting HMAC data." + "CVE-2019-12456": { + "cmt_msg": "" }, - "CVE-2021-44879": { - "cmt_msg": "f2fs: fix to do sanity check on inode type during garbage collection" + "CVE-2020-26560": { + "cmt_msg": "" }, - "CVE-2019-15505": { - "cmt_msg": "media: technisat-usb2: break out of loop at end of buffer" + "CVE-2021-3892": { + "cmt_msg": "" }, - "CVE-2023-1859": { - "cmt_msg": "9p/xen : Fix use after free bug in xen_9pfs_front_remove due to race condition" + "CVE-2024-24864": { + "cmt_msg": "" }, - "CVE-2023-2513": { - "cmt_msg": "ext4: fix use-after-free in ext4_xattr_set_entry" + "CVE-2023-37454": { + "cmt_msg": "" }, - "CVE-2023-1855": { - "cmt_msg": "hwmon: (xgene) Fix use after free bug in xgene_hwmon_remove due to race condition" + "CVE-2022-3642": { + "cmt_msg": "" }, - "CVE-2022-27672": { - "cmt_msg": "x86/speculation: Identify processors vulnerable to SMT RSB predictions" + "CVE-2011-4917": { + "cmt_msg": "" }, - "CVE-2022-2964": { - "cmt_msg": "net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup" + "CVE-2019-15902": { + "cmt_msg": "unknown" }, - "CVE-2015-2877": { + "CVE-2024-25739": { "cmt_msg": "" }, - "CVE-2020-9383": { - "cmt_msg": "floppy: check FDC index for errors before assigning it" + "CVE-2019-15290": { + "cmt_msg": "" }, - "CVE-2019-16089": { + "CVE-2023-6535": { "cmt_msg": "" }, - "CVE-2023-1206": { - "cmt_msg": "tcp: Reduce chance of collisions in inet6_hashfn()." + "CVE-2018-17977": { + "cmt_msg": "" }, - "CVE-2021-38198": { - "cmt_msg": "KVM: X86: MMU: Use the correct inherited permissions to get shadow page" + "CVE-2022-26878": { + "cmt_msg": "" }, - "CVE-2021-38199": { - "cmt_msg": "NFSv4: Initialise connection to the server in nfs4_alloc_client()" + "CVE-2022-41848": { + "cmt_msg": "" }, - "CVE-2022-1679": { - "cmt_msg": "ath9k: fix use-after-free in ath9k_hif_usb_rx_cb" + "CVE-2022-1116": { + "cmt_msg": "" }, - "CVE-2023-34256": { - "cmt_msg": "ext4: avoid a potential slab-out-of-bounds in ext4_group_desc_csum" + "CVE-2010-5321": { + "cmt_msg": "" }, - "CVE-2023-1513": { - "cmt_msg": "kvm: initialize all of the kvm_debugregs structure before sending it to userspace" + "CVE-2024-2193": { + "cmt_msg": "" }, - "CVE-2021-26401": { - "cmt_msg": "x86/speculation: Use generic retpoline by default on AMD" + "CVE-2018-12930": { + "cmt_msg": "" }, - "CVE-2020-28941": { - "cmt_msg": "speakup: Do not let the line discipline be used several times" + "CVE-2018-12931": { + "cmt_msg": "" }, - "CVE-2019-9445": { - "cmt_msg": "f2fs: check if file namelen exceeds max value" + "CVE-2021-39801": { + "cmt_msg": "" }, - "CVE-2023-52442": { - "cmt_msg": "ksmbd: validate session id and tree id in compound request" + "CVE-2021-39800": { + "cmt_msg": "" }, - "CVE-2019-14284": { - "cmt_msg": "floppy: fix div-by-zero in setup_format_params" + "CVE-2022-45885": { + "cmt_msg": "" }, - "CVE-2020-36557": { - "cmt_msg": "vt: vt_ioctl: fix VT_DISALLOCATE freeing in-use virtual console" + "CVE-2022-45884": { + "cmt_msg": "" }, - "CVE-2021-3506": { - "cmt_msg": "f2fs: fix to avoid out-of-bounds memory access" + "CVE-2024-25740": { + "cmt_msg": "" }, - "CVE-2019-20934": { - "cmt_msg": "sched/fair: Don't free p->numa_faults with concurrent readers" + "CVE-2024-25741": { + "cmt_msg": "" }, - "CVE-2011-4916": { + "CVE-2024-21803": { "cmt_msg": "" }, - "CVE-2018-10880": { - "cmt_msg": "ext4: never move the system.data xattr out of the inode body" + "CVE-2021-3542": { + "cmt_msg": "" }, - "CVE-2019-3900": { - "cmt_msg": "vhost_net: fix possible infinite loop" + "CVE-2018-12929": { + "cmt_msg": "" }, - "CVE-2019-19533": { - "cmt_msg": "media: ttusb-dec: Fix info-leak in ttusb_dec_send_command()" + "CVE-2018-12928": { + "cmt_msg": "" }, - "CVE-2018-13100": { - "cmt_msg": "f2fs: fix to do sanity check with secs_per_zone" + "CVE-2020-25220": { + "cmt_msg": "" }, - "CVE-2019-15807": { - "cmt_msg": "scsi: libsas: delete sas port if expander discover failed" + "CVE-2015-2877": { + "cmt_msg": "" }, - "CVE-2019-10638": { - "cmt_msg": "inet: switch IP ID generator to siphash" + "CVE-2023-26242": { + "cmt_msg": "" }, - "CVE-2023-31083": { - "cmt_msg": "Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO" + "CVE-2019-16089": { + "cmt_msg": "" }, - "CVE-2019-5489": { - "cmt_msg": "Change mincore() to count \"mapped\" pages rather than \"cached\" pages" + "CVE-2023-32629": { + "cmt_msg": "" }, - "CVE-2024-1312": { - "cmt_msg": "mm: lock_vma_under_rcu() must check vma->anon_vma under vma lock" + "CVE-2022-0400": { + "cmt_msg": "" }, - "CVE-2019-19531": { - "cmt_msg": "usb: yurex: Fix use-after-free in yurex_delete" + "CVE-2021-3847": { + "cmt_msg": "" }, - "CVE-2019-14283": { - "cmt_msg": "floppy: fix out-of-bounds read in copy_buffer" + "CVE-2022-2961": { + "cmt_msg": "" }, - "CVE-2018-10881": { - "cmt_msg": "ext4: clear i_data in ext4_inode_info when removing inline data" + "CVE-2022-25265": { + "cmt_msg": "" }, - "CVE-2018-10882": { - "cmt_msg": "ext4: add more inode number paranoia checks" + "CVE-2011-4916": { + "cmt_msg": "" }, - "CVE-2018-10883": { - "cmt_msg": "jbd2: don't mark block as modified if the handle is out of credits" + "CVE-2023-23039": { + "cmt_msg": "" + }, + "CVE-2023-3640": { + "cmt_msg": "" } } }, - "4.19": { - "4.19": { - "CVE-2018-18281": { - "cmt_msg": "mremap: properly flush TLB before releasing the page", - "cmt_id": "eb66ae030829605d61fbef1909ce310e29f78821" + "6.6": { + "6.6": { + "CVE-2023-46862": { + "cmt_msg": "io_uring/fdinfo: lock SQ thread while retrieving thread cpu/pid", + "cmt_id": "7644b1a1c9a7ae8ab99175989bfc8676055edb46" } }, - "4.19-rc1": { - "CVE-2019-19083": { - "cmt_msg": "drm/amd/display: memory leak", - "cmt_id": "9ea29a1f8b9da52d8eca8b0996f1d84eac548d3b" + "6.6.3": { + "CVE-2024-0607": { + "cmt_msg": "netfilter: nf_tables: fix pointer math issue in nft_byteorder_eval()", + "cmt_id": "013deed31ab15ef287b0045e4e7bd8f250e75b94" + }, + "CVE-2023-6111": { + "cmt_msg": "netfilter: nf_tables: remove catchall element in GC sync path", + "cmt_id": "80d6a9236ab6d2c0fd241514d1af2e325d16a210" } }, - "4.19.2": { - "CVE-2018-18955": { - "cmt_msg": "userns: also map extents in the reverse map to kernel IDs", - "cmt_id": "9a7a80fb02cc7515b273dbb4249374d6e6a35b70" + "6.6.4": { + "CVE-2023-6121": { + "cmt_msg": "nvmet: nul-terminate the NQNs passed in the connect command", + "cmt_id": "2291653c27236d34ca7df3bfd3427ce6e30c2d95" } }, - "4.19.3": { - "CVE-2018-19854": { - "cmt_msg": "crypto: user - fix leaking uninitialized memory to userspace", - "cmt_id": "a0f044f025e9a023e1e2b33c0731291059e2748d" + "6.6.5": { + "CVE-2024-0584": { + "cmt_msg": "ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet", + "cmt_id": "bf8601dabed0c134a7d58085824e3e466840c5d1" }, - "CVE-2018-16871": { - "cmt_msg": "nfsd: COPY and CLONE operations require the saved filehandle to be set", - "cmt_id": "20965de7f47207394ffe03d70a4806f5e1cfcd7f" + "CVE-2023-6560": { + "cmt_msg": "io_uring: don't allow discontig pages for IORING_SETUP_NO_MMAP", + "cmt_id": "4be625ba36bcfdfb9c72b712acd4ef943a269ebb" }, - "CVE-2018-18710": { - "cmt_msg": "cdrom: fix improper type cast, which can leat to information leak.", - "cmt_id": "c8099dbf492b565a4f75ae7b8c08b76ca18c4c3f" + "CVE-2024-0582": { + "cmt_msg": "io_uring/kbuf: defer release of mapped buffer rings", + "cmt_id": "7138ebbe65caf65f52b923d4ef819c77d04ea671" + }, + "CVE-2023-6932": { + "cmt_msg": "ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet", + "cmt_id": "bf8601dabed0c134a7d58085824e3e466840c5d1" } }, - "4.19.7": { - "CVE-2018-19407": { - "cmt_msg": "KVM: X86: Fix scan ioapic use-before-initialization", - "cmt_id": "61c42d657c859ccc95e53afdac64f73a0053b8ea" + "6.6.7": { + "CVE-2024-25744": { + "cmt_msg": "x86/coco: Disable 32-bit emulation by default on TDX and SEV", + "cmt_id": "34c686e5be2fa1c03ae09568159a9ef37d1c7cf5" }, - "CVE-2018-19406": { - "cmt_msg": "KVM: LAPIC: Fix pv ipis use-before-initialization", - "cmt_id": "ffb01e73737b4d3e66734c901ee666ae8a23a857" + "CVE-2023-6931": { + "cmt_msg": "perf: Fix perf_event_validate_size()", + "cmt_id": "cfe9295db0932f1b8e0d94ffc75521898e5a5a8a" }, - "CVE-2019-2025": { - "cmt_msg": "binder: fix race that allows malicious free of live buffer", - "cmt_id": "553927d6aab993e1297d0c69274cd0c2df5440ca" + "CVE-2024-0646": { + "cmt_msg": "net: tls, update curr on splice as well", + "cmt_id": "eb30a025982f61910f32e99778db3c0ceceaff5c" }, - "CVE-2018-16862": { - "cmt_msg": "mm: cleancache: fix corruption on missed inode invalidation", - "cmt_id": "16a2d602244ff5327cecd210fdd50ad5ad443c9c" - } - }, - "4.19.8": { - "CVE-2018-18397": { - "cmt_msg": "userfaultfd: use ENOENT instead of EFAULT if the atomic copy user fails", - "cmt_id": "10f98c134b02d11923d45ce6688c2479435e8ec9" - } - }, - "4.19.9": { - "CVE-2018-20169": { - "cmt_msg": "USB: check usb_get_extra_descriptor for proper size", - "cmt_id": "1b2e742bf7230ce04cda5b7348f922174bef2d7a" + "CVE-2023-6531": { + "cmt_msg": "io_uring/af_unix: disable sending io_uring over sockets", + "cmt_id": "5a33d385eb36991a91e3dddb189d8679e2aac2be" }, - "CVE-2018-14625": { - "cmt_msg": "vhost/vsock: fix use-after-free in network stack callers", - "cmt_id": "f9cd25b1e5e575a5f18547bdc04ea40a23ad511a" + "CVE-2023-6817": { + "cmt_msg": "netfilter: nft_set_pipapo: skip inactive elements during set walk", + "cmt_id": "c66d39f18e0ef16bac8c8491b657051f531a1eba" }, - "CVE-2018-19824": { - "cmt_msg": "ALSA: usb-audio: Fix UAF decrement if card has no live interfaces in card.c", - "cmt_id": "a7e719ace75e4451b7958cb73cbc12c627760007" + "CVE-2023-6622": { + "cmt_msg": "netfilter: nf_tables: bail out on mismatching dynset and set expressions", + "cmt_id": "5eeba00a89c5c6be4e45b69bef20d1d1b9edb968" } }, - "4.19.13": { - "CVE-2018-16882": { - "cmt_msg": "KVM: Fix UAF in nested posted interrupt processing", - "cmt_id": "1972ca04708330b0edd52956e644e3974065a613" + "6.6.8": { + "CVE-2023-51782": { + "cmt_msg": "net/rose: Fix Use-After-Free in rose_ioctl", + "cmt_id": "63caa51833e8701248a8a89d83effe96f30e4c80" }, - "CVE-2018-19985": { - "cmt_msg": "USB: hso: Fix OOB memory access in hso_probe/hso_get_config_data", - "cmt_id": "8f980122236c1fc8e11ffb57ec73315d01dc88e0" - } - }, - "4.19.14": { - "CVE-2019-9245": { - "cmt_msg": "f2fs: sanity check of xattr entry size", - "cmt_id": "5036fcd9b14516f62efae6ed0c42dfbb9798b643" - } - }, - "4.19.15": { - "CVE-2019-15927": { - "cmt_msg": "ALSA: usb-audio: Avoid access before bLength check in build_audio_procunit()", - "cmt_id": "8ee6f180d56fe760b275ab7f060c7b12fc05d7b7" + "CVE-2023-51780": { + "cmt_msg": "atm: Fix Use-After-Free in do_vcc_ioctl", + "cmt_id": "531fd46f92895bcdc41bedd12533266c397196da" }, - "CVE-2018-20784": { - "cmt_msg": "sched/fair: Fix infinite loop in update_blocked_averages() by reverting a9e7f6544b9c", - "cmt_id": "dc8408ea0b22ab181ee541f3786b4fd6161e0ce3" + "CVE-2023-51781": { + "cmt_msg": "appletalk: Fix Use-After-Free in atalk_ioctl", + "cmt_id": "e15ded324a3911358e8541a1b573665f99f216ef" }, - "CVE-2019-6133": { - "cmt_msg": "fork: record start_time late", - "cmt_id": "bc999b5099d70030a9cb1aff2c48b073f65e0f8f" - } - }, - "4.19.16": { - "CVE-2018-16884": { - "cmt_msg": "sunrpc: use-after-free in svc_process_common()", - "cmt_id": "44e7bab39f877c9c095bfaaee943b0807574a7f7" + "CVE-2023-52434": { + "cmt_msg": "smb: client: fix potential OOBs in smb2_parse_contexts()", + "cmt_id": "17a0f64cc02d4972e21c733d9f21d1c512963afa" + }, + "CVE-2024-0565": { + "cmt_msg": "smb: client: fix OOB in receive_encrypted_standard()", + "cmt_id": "534733397da26de0303057ce0b93a22bda150365" } }, - "4.19.17": { - "CVE-2019-3701": { - "cmt_msg": "can: gw: ensure DLC boundaries after CAN frame modification", - "cmt_id": "8db82a6f2b76d42ec2615f8def6e797e064e7822" + "6.6.9": { + "CVE-2023-6606": { + "cmt_msg": "smb: client: fix OOB in smbCalcSize()", + "cmt_id": "ac48fcef5ec2e9ac85c0b39045d874e60eac75d7" }, - "CVE-2020-10769": { - "cmt_msg": "crypto: authenc - fix parsing key with misaligned rta_len", - "cmt_id": "44c67402c3f738b7048de4464c02461bc8d0fd37" + "CVE-2023-6200": { + "cmt_msg": "net/ipv6: Revert remove expired routes with a separated list of routes", + "cmt_id": "b577b9aa1340ee7f36441b0740691550abaad5f2" }, - "CVE-2019-11085": { - "cmt_msg": "drm/i915/gvt: Fix mmap range check", - "cmt_id": "ac8b9e8e7ddd69f3efa91e8a99312de5729382c0" - } - }, - "4.19.18": { - "CVE-2019-9003": { - "cmt_msg": "ipmi: fix use-after-free of user->release_barrier.rda", - "cmt_id": "1c393ca118cfaf36c95270b9bed295bba109fafa" + "CVE-2023-51779": { + "cmt_msg": "Bluetooth: af_bluetooth: Fix Use-After-Free in bt_sock_recvmsg", + "cmt_id": "1d576c3a5af850bf11fbd103f9ba11aa6d6061fb" } }, - "4.19.19": { - "CVE-2019-7308": { - "cmt_msg": "bpf: fix sanitation of alu op with pointer / scalar type from different paths", - "cmt_id": "eed84f94ff8d97abcbc5706f6f9427520fd60a10" + "6.6.10": { + "CVE-2024-0193": { + "cmt_msg": "netfilter: nf_tables: skip set commit for deleted/destroyed sets", + "cmt_id": "b7f1c01b55ad2a5da12f08e5ec3c76dabb99882a" + }, + "CVE-2024-22705": { + "cmt_msg": "ksmbd: fix slab-out-of-bounds in smb_strndup_from_utf16()", + "cmt_id": "7d5f219f1ef69f27eb8cbfb794d634fc9c4d24ac" } }, - "4.19.20": { - "CVE-2018-16880": { - "cmt_msg": "vhost: fix OOB in get_rx_bufs()", - "cmt_id": "aafe74b726891386cd139d3432ec619ed5189b29" + "6.6.11": { + "CVE-2023-52435": { + "cmt_msg": "net: prevent mss overflow in skb_segment()", + "cmt_id": "95b3904a261a9f810205da560e802cc326f50d77" } }, - "4.19.21": { - "CVE-2019-3819": { - "cmt_msg": "HID: debug: fix the ring buffer implementation", - "cmt_id": "c70374ce418e7ae9276d3dc26aed0301e4da5e35" + "6.6.13": { + "CVE-2023-52439": { + "cmt_msg": "uio: Fix use-after-free in uio_open", + "cmt_id": "35f102607054faafe78d2a6994b18d5d9d6e92ad" }, - "CVE-2019-8956": { - "cmt_msg": "sctp: walk the list of asoc safely", - "cmt_id": "7c2361308e1727c3135ebb3b5c6906fb781bb261" + "CVE-2023-52438": { + "cmt_msg": "binder: fix use-after-free in shinker's callback", + "cmt_id": "a49087ab93508b60d9b8add91707a22dda832869" }, - "CVE-2019-7222": { - "cmt_msg": "KVM: x86: work around leak of uninitialized stack contents (CVE-2019-7222)", - "cmt_id": "5a45d3720b5437515f8c094f1c3d61f6afe211c1" + "CVE-2023-6915": { + "cmt_msg": "ida: Fix crash in ida_free when the bitmap is empty", + "cmt_id": "ffcaafdb8be64555e9928d943a3655c755dba92b" }, - "CVE-2019-6974": { - "cmt_msg": "kvm: fix kvm_ioctl_create_device() reference counting (CVE-2019-6974)", - "cmt_id": "24b027d2b1386da03aafb2aaac69d4fa67ee7d9c" + "CVE-2023-6610": { + "cmt_msg": "smb: client: fix potential OOB in smb2_dump_detail()", + "cmt_id": "c5e0ed716c52fddea5e625668e75658c3b81d3fc" }, - "CVE-2019-7221": { - "cmt_msg": "KVM: nVMX: unconditionally cancel preemption timer in free_nested (CVE-2019-7221)", - "cmt_id": "236fd677125f974aaf39f09074d226a884b4fe0e" + "CVE-2023-52436": { + "cmt_msg": "f2fs: explicitly null-terminate the xattr list", + "cmt_id": "2525d1ba225b5c167162fa344013c408e8b4de36" } }, - "4.19.25": { - "CVE-2019-9162": { - "cmt_msg": "netfilter: nf_nat_snmp_basic: add missing length checks in ASN.1 cbs", - "cmt_id": "6a3f7237871c4d5c090ab9a6fce3ba6a1baf1f82" + "6.6.14": { + "CVE-2024-26592": { + "cmt_msg": "ksmbd: fix UAF issue in ksmbd_tcp_new_connection()", + "cmt_id": "24290ba94cd0136e417283b0dbf8fcdabcf62111" }, - "CVE-2019-8912": { - "cmt_msg": "net: crypto set sk to NULL when af_alg_release.", - "cmt_id": "eb5e6869125f69dd28513f92992d97ec62bb9773" - } - }, - "4.19.27": { - "CVE-2019-9213": { - "cmt_msg": "mm: enforce min addr even if capable() in expand_downwards()", - "cmt_id": "de04d2973a62e4efb3de45e93bd46acd6d510e0a" - } - }, - "4.19.28": { - "CVE-2019-16994": { - "cmt_msg": "net: sit: fix memory leak in sit_init_net()", - "cmt_id": "d0bedaac932f4c02c080a50d4a30b2a1fec5d682" + "CVE-2024-26590": { + "cmt_msg": "erofs: fix inconsistent per-file compression format", + "cmt_id": "823ba1d2106019ddf195287ba53057aee33cf724" }, - "CVE-2019-12818": { - "cmt_msg": "net: nfc: Fix NULL dereference on nfc_llcp_build_tlv fails", - "cmt_id": "f132b3f5f1ad1cbe818474ab8d0b555ff39369d5" + "CVE-2024-26591": { + "cmt_msg": "bpf: Fix re-attachment branch in bpf_tracing_prog_attach", + "cmt_id": "8c8bcd45e9b10eef12321f08d2e5be33d615509c" }, - "CVE-2019-8980": { - "cmt_msg": "exec: Fix mem leak in kernel_read_file", - "cmt_id": "b60d90b2d3d14c426693a0a34041db11be66d29e" + "CVE-2024-26597": { + "cmt_msg": "net: qualcomm: rmnet: fix global oob in rmnet_policy", + "cmt_id": "c4734535034672f59f2652e1e0058c490da62a5c" }, - "CVE-2019-15916": { - "cmt_msg": "net-sysfs: Fix mem leak in netdev_register_kobject", - "cmt_id": "7ce2a517fd8b7742e381d3b3551b9b03e667ad79" - } - }, - "4.19.29": { - "CVE-2019-2101": { - "cmt_msg": "media: uvcvideo: Fix 'type' check leading to overflow", - "cmt_id": "ac8befb6dd601fd35c1d64167750c6698bc27c80" - } - }, - "4.19.30": { - "CVE-2019-16995": { - "cmt_msg": "net: hsr: fix memory leak in hsr_dev_finalize()", - "cmt_id": "996ee1aca7def6125e9d96f58151799d44082cfc" + "CVE-2024-26594": { + "cmt_msg": "ksmbd: validate mech token in session setup", + "cmt_id": "a2b21ef1ea4cf632d19b3a7cc4d4245b8e63202a" }, - "CVE-2019-12819": { - "cmt_msg": "mdio_bus: Fix use-after-free on device_register fails", - "cmt_id": "96a3b14450afa83f4f3ffdeafaca19db8e05c2fd" - } - }, - "4.19.31": { - "CVE-2019-11811": { - "cmt_msg": "ipmi_si: fix use-after-free of resource->name", - "cmt_id": "a441fdaf8c3034436fb6045ee285e515628fc555" + "CVE-2024-26595": { + "cmt_msg": "mlxsw: spectrum_acl_tcam: Fix NULL pointer dereference in error path", + "cmt_id": "817840d125a370626895df269c50c923b79b0a39" }, - "CVE-2019-10124": { - "cmt_msg": "mm: hwpoison: fix thp split handing in soft_offline_in_use_page()", - "cmt_id": "234c0cc982211bb5539db632f31490bf0ad54827" + "CVE-2024-26598": { + "cmt_msg": "KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache", + "cmt_id": "65b201bf3e9af1b0254243a5881390eda56f72d1" }, - "CVE-2019-9455": { - "cmt_msg": "media: videobuf2-v4l2: drop WARN_ON in vb2_warn_zero_bytesused()", - "cmt_id": "573d423a9bd76b396954ddf847ff24d97658453d" + "CVE-2024-26599": { + "cmt_msg": "pwm: Fix out-of-bounds access in of_pwm_single_xlate()", + "cmt_id": "e5f2b4b62977fb6c2efcbc5779e0c9dce18215f7" }, - "CVE-2019-16413": { - "cmt_msg": "9p: use inode->i_lock to protect i_size_write() under 32-bit", - "cmt_id": "e08ba890dc29250fafdfa7c9dba62ccfeec8ef7f" - } - }, - "4.19.32": { - "CVE-2019-15917": { - "cmt_msg": "Bluetooth: hci_ldisc: Postpone HCI_UART_PROTO_READY bit set in hci_uart_set_proto()", - "cmt_id": "e365b94086f9dec02ddfcc193dcad72858c6d973" - } - }, - "4.19.33": { - "CVE-2019-20811": { - "cmt_msg": "net-sysfs: call dev_hold if kobject_init_and_add success", - "cmt_id": "d9d215be3a3aa8b3638f2705826f52a7fb84cf24" + "CVE-2023-6356": { + "cmt_msg": "nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length", + "cmt_id": "24e05760186dc070d3db190ca61efdbce23afc88" }, - "CVE-2019-20054": { - "cmt_msg": "fs/proc/proc_sysctl.c: fix NULL pointer dereference in put_links", - "cmt_id": "07d0d2bd957ad922cf571e7cabb6c34067142b93" + "CVE-2023-52459": { + "cmt_msg": "media: v4l: async: Fix duplicated list deletion", + "cmt_id": "b7062628caeaec90e8f691ebab2d70f31b7b6b91" }, - "CVE-2019-3460": { - "cmt_msg": "Bluetooth: Check L2CAP option sizes returned from l2cap_get_conf_opt", - "cmt_id": "2318c0e4b87e590c9d8e88db185477cfac18abe2" + "CVE-2023-52458": { + "cmt_msg": "block: add check that partition length needs to be aligned with block size", + "cmt_id": "cb16cc1abda18a9514106d2ac8c8d7abc0be5ed8" }, - "CVE-2019-15921": { - "cmt_msg": "genetlink: Fix a memory leak on error path", - "cmt_id": "9b8ef421b481d6e648438131d867986c649c297c" + "CVE-2023-52457": { + "cmt_msg": "serial: 8250: omap: Don't skip resource freeing if pm_runtime_resume_and_get() failed", + "cmt_id": "887a558d0298d36297daea039954c39940228d9b" }, - "CVE-2019-3459": { - "cmt_msg": "Bluetooth: Verify that l2cap_get_conf_opt provides large enough buffer", - "cmt_id": "15d6538a0d6e0f6de5116081a948cba7cc3e1d3d" - } - }, - "4.19.34": { - "CVE-2019-11810": { - "cmt_msg": "scsi: megaraid_sas: return error when create DMA pool failed", - "cmt_id": "8032fc9120c211cd40beef4c91c8206f4167e523" - } - }, - "4.19.35": { - "CVE-2019-11486": { - "cmt_msg": "tty: mark Siemens R3964 line discipline as BROKEN", - "cmt_id": "894dc8495898cf6075eadf99fd496374decd3986" + "CVE-2023-52456": { + "cmt_msg": "serial: imx: fix tx statemachine deadlock", + "cmt_id": "763cd68746317b5d746dc2649a3295c1efb41181" }, - "CVE-2019-11815": { - "cmt_msg": "net: rds: force to destroy connection if t_sock is NULL in rds_tcp_kill_sock().", - "cmt_id": "78b4bf26a8a76569fd6d0b47d98fb553c333b06f" + "CVE-2023-52455": { + "cmt_msg": "iommu: Don't reserve 0-length IOVA region", + "cmt_id": "98b8a550da83cc392a14298c4b3eaaf0332ae6ad" }, - "CVE-2019-3887": { - "cmt_msg": "KVM: x86: nVMX: close leak of L0's x2APIC MSRs (CVE-2019-3887)", - "cmt_id": "119031be7b0a2ce4ff4cd5525bec6d42817ff53d" + "CVE-2023-52454": { + "cmt_msg": "nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length", + "cmt_id": "24e05760186dc070d3db190ca61efdbce23afc88" }, - "CVE-2019-10639": { - "cmt_msg": "netns: provide pure entropy for net_hash_mix()", - "cmt_id": "a1c2f3229734a4bb8d5ac008c0a67e025aa11547" - } - }, - "4.19.36": { - "CVE-2019-15292": { - "cmt_msg": "appletalk: Fix use-after-free in atalk_proc_exit", - "cmt_id": "6c42507f426b40c63e8eb98ce6dd4afbc7efcdb5" + "CVE-2023-52453": { + "cmt_msg": "hisi_acc_vfio_pci: Update migration data pointer correctly on saving/resume", + "cmt_id": "45f80b2f230df10600e6fa1b83b28bf1c334185e" }, - "CVE-2019-9857": { - "cmt_msg": "inotify: Fix fsnotify_mark refcount leak in inotify_update_existing_watch()", - "cmt_id": "ca306c17d2edcc8aa3bf1724a5cb1ecefc31ef3b" + "CVE-2023-52452": { + "cmt_msg": "bpf: Fix accesses to uninit stack slots", + "cmt_id": "0954982db8283016bf38e9db2da5adf47a102e19" }, - "CVE-2022-21385": { - "cmt_msg": "net/rds: fix warn in rds_message_alloc_sgs", - "cmt_id": "5be4bb315de29ad3ae558a8f6b92f13a1b4bfb84" + "CVE-2023-52451": { + "cmt_msg": "powerpc/pseries/memhp: Fix access beyond end of drmem array", + "cmt_id": "df16afba2378d985359812c865a15c05c70a967e" + }, + "CVE-2023-52450": { + "cmt_msg": "perf/x86/intel/uncore: Fix NULL pointer dereference issue in upi_fill_topology()", + "cmt_id": "bf1bf09e6b599758851457f3999779622a48d015" + }, + "CVE-2023-52611": { + "cmt_msg": "wifi: rtw88: sdio: Honor the host max_req_size in the RX path", + "cmt_id": "5b5ddf21b978ec315cab9d9e7e6ac7374791a8c7" + }, + "CVE-2023-52470": { + "cmt_msg": "drm/radeon: check the alloc_workqueue return value in radeon_crtc_init()", + "cmt_id": "0b813a6a0087451cb702b6eb841f10856f49d088" + }, + "CVE-2023-52473": { + "cmt_msg": "thermal: core: Fix NULL pointer dereference in zone registration error path", + "cmt_id": "335176dd8ebaca6493807dceea33c478305667fa" + }, + "CVE-2023-52472": { + "cmt_msg": "crypto: rsa - add a check for allocation failure", + "cmt_id": "2831f4d3bfa68e64c5f83e96688be779c87b3511" + }, + "CVE-2024-1085": { + "cmt_msg": "netfilter: nf_tables: check if catch-all set element is active in next generation", + "cmt_id": "7baa33837ee2473eb0afd9755e29a25cd3771eac" + }, + "CVE-2024-26589": { + "cmt_msg": "bpf: Reject variable offset alu on PTR_TO_FLOW_KEYS", + "cmt_id": "e8d3872b617c21100c5ee4f64e513997a68c2e3d" + }, + "CVE-2023-46838": { + "cmt_msg": "xen-netback: don't produce zero-size SKB frags", + "cmt_id": "78376d4415602d97773f20b49f4aa5fc8666f7a9" + }, + "CVE-2024-26587": { + "cmt_msg": "net: netdevsim: don't try to destroy PHC on VFs", + "cmt_id": "08aca65997fb6f233066883b1f1e653bcb1f26ca" + }, + "CVE-2024-26586": { + "cmt_msg": "mlxsw: spectrum_acl_tcam: Fix stack corruption", + "cmt_id": "2f5e1565740490706332c06f36211d4ce0f88e62" + }, + "CVE-2024-24860": { + "cmt_msg": "Bluetooth: Fix atomicity violation in {min,max}_key_size_set", + "cmt_id": "f56e715ef1c19c42c6aa6cb9280947dea13aab2e" + }, + "CVE-2024-26588": { + "cmt_msg": "LoongArch: BPF: Prevent out-of-bounds memory access", + "cmt_id": "9aeb09f4d85a87bac46c010d75a2ea299d462f28" + }, + "CVE-2023-52465": { + "cmt_msg": "power: supply: Fix null pointer dereference in smb2_probe", + "cmt_id": "e2717302fbc20f148bcda362facee0444b949a3a" + }, + "CVE-2023-52462": { + "cmt_msg": "bpf: fix check for attempt to corrupt spilled pointer", + "cmt_id": "8dc15b0670594543c356567a1a45b0182ec63174" + }, + "CVE-2023-50431": { + "cmt_msg": "accel/habanalabs: fix information leak in sec_attest_info()", + "cmt_id": "975aaaddc226303d382baa0d0ece84e8bec1fcf5" + }, + "CVE-2023-52610": { + "cmt_msg": "net/sched: act_ct: fix skb leak and crash on ooo frags", + "cmt_id": "73f7da5fd124f2cda9161e2e46114915e6e82e97" + }, + "CVE-2023-52463": { + "cmt_msg": "efivarfs: force RO when remounting if SetVariable is not supported", + "cmt_id": "0049fe7e4a85849bdd778cdb72e51a791ff3d737" + }, + "CVE-2023-52467": { + "cmt_msg": "mfd: syscon: Fix null pointer dereference in of_syscon_register()", + "cmt_id": "3ef1130deee98997275904d9bfc37af75e1e906c" + }, + "CVE-2023-52464": { + "cmt_msg": "EDAC/thunderx: Fix possible out-of-bounds string access", + "cmt_id": "e1c86511241588efffaa49556196f09a498d5057" + }, + "CVE-2023-52443": { + "cmt_msg": "apparmor: avoid crash when parsed profile name is empty", + "cmt_id": "5c0392fdafb0a2321311900be83ffa572bef8203" + }, + "CVE-2023-52444": { + "cmt_msg": "f2fs: fix to avoid dirent corruption", + "cmt_id": "d3c0b49aaa12a61d560528f5d605029ab57f0728" + }, + "CVE-2023-52445": { + "cmt_msg": "media: pvrusb2: fix use after free on context disconnection", + "cmt_id": "2cf0005d315549b8d2b940ff96a66c2a889aa795" + }, + "CVE-2023-52446": { + "cmt_msg": "bpf: Fix a race condition between btf_put() and map_free()", + "cmt_id": "d048dced8ea5eac6723ae873a40567e6f101ea42" + }, + "CVE-2023-52447": { + "cmt_msg": "bpf: Defer the free of inner map when necessary", + "cmt_id": "f91cd728b10c51f6d4a39957ccd56d1e802fc8ee" + }, + "CVE-2023-52448": { + "cmt_msg": "gfs2: Fix kernel NULL pointer dereference in gfs2_rgrp_dump", + "cmt_id": "067a7c48c2c70f05f9460d6f0e8423e234729f05" + }, + "CVE-2023-52449": { + "cmt_msg": "mtd: Fix gluebi NULL pointer dereference caused by ftl notifier", + "cmt_id": "cfd7c9d260dc0a3baaea05a122a19ab91e193c65" + }, + "CVE-2023-52612": { + "cmt_msg": "crypto: scomp - fix req->dst buffer overflow", + "cmt_id": "7d9e5bed036a7f9e2062a137e97e3c1e77fb8759" + }, + "CVE-2023-52468": { + "cmt_msg": "class: fix use-after-free in class_register()", + "cmt_id": "b57196a5ec5e4c0ffecde8348b085b778c7dce04" + }, + "CVE-2023-52469": { + "cmt_msg": "drivers/amd/pm: fix a use-after-free in kv_parse_power_table", + "cmt_id": "95084632a65d5c0d682a83b55935560bdcd2a1e3" + }, + "CVE-2023-6536": { + "cmt_msg": "nvmet-tcp: fix a crash in nvmet_req_complete()", + "cmt_id": "2f00fd8d50a7d5eedc85e62efdc1a29213168998" + }, + "CVE-2023-52609": { + "cmt_msg": "binder: fix race between mmput() and do_exit()", + "cmt_id": "67f16bf2cc1698fd50e01ee8a2becc5a8e6d3a3e" + }, + "CVE-2024-26633": { + "cmt_msg": "ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim()", + "cmt_id": "687c5d52fe53e602e76826dbd4d7af412747e183" + }, + "CVE-2024-26632": { + "cmt_msg": "block: Fix iterating over an empty bio with bio_for_each_folio_all", + "cmt_id": "a6bd8182137a12d22d3f2cee463271bdcb491659" + }, + "CVE-2024-26631": { + "cmt_msg": "ipv6: mcast: fix data-race in ipv6_mc_down / mld_ifc_work", + "cmt_id": "3cc283fd16fba72e2cefe3a6f48d7a36b0438900" + }, + "CVE-2023-52613": { + "cmt_msg": "drivers/thermal/loongson2_thermal: Fix incorrect PTR_ERR() judgment", + "cmt_id": "70481755ed77400e783200e2d022e5fea16060ce" } }, - "4.19.37": { - "CVE-2019-3892": { - "cmt_msg": "coredump: fix race condition between mmget_not_zero()/get_task_mm() and core dumping", - "cmt_id": "6ff17bc5936e5fab33de8064dc0690f6c8c789ca" + "6.6.15": { + "CVE-2024-26611": { + "cmt_msg": "xsk: fix usage of multi-buffer BPF helpers for ZC XDP", + "cmt_id": "82ee4781b8200e44669a354140d5c6bd966b8768" }, - "CVE-2019-11599": { - "cmt_msg": "coredump: fix race condition between mmget_not_zero()/get_task_mm() and core dumping", - "cmt_id": "6ff17bc5936e5fab33de8064dc0690f6c8c789ca" + "CVE-2024-26610": { + "cmt_msg": "wifi: iwlwifi: fix a memory corruption", + "cmt_id": "870171899d75d43e3d14360f3a4850e90a9c289b" }, - "CVE-2019-15920": { - "cmt_msg": "cifs: Fix use-after-free in SMB2_read", - "cmt_id": "c69330a855ab4342d304f67f8c1e7d1fa2686bec" + "CVE-2024-26612": { + "cmt_msg": "netfs, fscache: Prevent Oops in fscache_put_cache()", + "cmt_id": "1c45256e599061021e2c848952e50f406457e448" + }, + "CVE-2024-26615": { + "cmt_msg": "net/smc: fix illegal rmb_desc access in SMC-D connection dump", + "cmt_id": "a164c2922675d7051805cdaf2b07daffe44f20d9" + }, + "CVE-2024-26614": { + "cmt_msg": "tcp: make sure init the accept_queue's spinlocks once", + "cmt_id": "168e7e599860654876c2a1102a82610285c02f02" + }, + "CVE-2024-26616": { + "cmt_msg": "btrfs: scrub: avoid use-after-free when chunk length is not 64K aligned", + "cmt_id": "642b9c520ef2f104277ad1f902f8526edbe087fb" + }, + "CVE-2024-26618": { + "cmt_msg": "arm64/sme: Always exit sme_alloc() early with existing storage", + "cmt_id": "569156e4fa347237f8fa2a7e935d860109c55ac4" + }, + "CVE-2024-26650": { + "cmt_msg": "platform/x86: p2sb: Allow p2sb_bar() calls during PCI device probe", + "cmt_id": "847e1eb30e269a094da046c08273abe3f3361cf2" + }, + "CVE-2023-52615": { + "cmt_msg": "hwrng: core - Fix page fault dead lock on mmap-ed hwrng", + "cmt_id": "ecabe8cd456d3bf81e92c53b074732f3140f170d" + }, + "CVE-2023-52614": { + "cmt_msg": "PM / devfreq: Fix buffer overflow in trans_stat_show", + "cmt_id": "a979f56aa4b93579cf0e4265ae04d7e9300fd3e8" + }, + "CVE-2023-52498": { + "cmt_msg": "PM: sleep: Fix possible deadlocks in core system-wide PM code", + "cmt_id": "e681e29d1f59a04ef773296e4bebb17b1b79f8fe" + }, + "CVE-2023-52493": { + "cmt_msg": "bus: mhi: host: Drop chan lock before queuing buffers", + "cmt_id": "eaefb9464031215d63c0a8a7e2bfaa00736aa17e" + }, + "CVE-2023-52492": { + "cmt_msg": "dmaengine: fix NULL pointer in channel unregistration function", + "cmt_id": "7f0ccfad2031eddcc510caf4e57f2d4aa2d8a50b" + }, + "CVE-2024-1086": { + "cmt_msg": "netfilter: nf_tables: reject QUEUE/DROP verdict parameters", + "cmt_id": "6653118b176a00915125521c6572ae8e507621db" }, - "CVE-2019-15919": { - "cmt_msg": "cifs: Fix use-after-free in SMB2_write", - "cmt_id": "8fb89b43b65fcd35f15d982712904b96fc64c68a" + "CVE-2023-52490": { + "cmt_msg": "mm: migrate: fix getting incorrect page mapping during page migration", + "cmt_id": "9128bfbc5c80d8f4874dd0a0424d1f5fb010df1b" }, - "CVE-2019-15214": { - "cmt_msg": "ALSA: core: Fix card races between register and disconnect", - "cmt_id": "b50e435df2d8b9a1d3e956e1c767dfc7e30a441b" - } - }, - "4.19.38": { - "CVE-2019-3882": { - "cmt_msg": "vfio/type1: Limit DMA mappings per container", - "cmt_id": "f7b467ad1be0478f0341afa8a9ac112732def088" + "CVE-2023-52497": { + "cmt_msg": "erofs: fix lz4 inplace decompression", + "cmt_id": "f36d200a80a3ca025532ed60dd1ac21b620e14ae" }, - "CVE-2019-15924": { - "cmt_msg": "fm10k: Fix a potential NULL pointer dereference", - "cmt_id": "9b9b0df4e7882638e53c55e8f556aa78915418b9" + "CVE-2023-52495": { + "cmt_msg": "soc: qcom: pmic_glink_altmode: fix port sanity check", + "cmt_id": "532a5557da6892a6b2d5793052e1bce1f4c9e177" }, - "CVE-2019-10125": { - "cmt_msg": "aio: simplify - and fix - fget/fput for io_submit()", - "cmt_id": "d6b2615f7d31d8e58b685d42dbafcc7dc1204bbd" + "CVE-2023-52494": { + "cmt_msg": "bus: mhi: host: Add alignment check for event ring read pointer", + "cmt_id": "a9ebfc405fe1be145f414eafadcbf09506082010" }, - "CVE-2019-18805": { - "cmt_msg": "ipv4: set the tcp_min_rtt_wlen range from 0 to one day", - "cmt_id": "250e51f856e1534e3e769add508f121966030462" - } - }, - "4.19.39": { - "CVE-2019-11487": { - "cmt_msg": "fs: prevent page refcount overflow in pipe_buf_get", - "cmt_id": "0311ff82b70fa12e80d188635bff24029ec06ae1" - } - }, - "4.19.41": { - "CVE-2019-15216": { - "cmt_msg": "USB: yurex: Fix protection fault after device removal", - "cmt_id": "9f632afe4f3989d77fdbf8ac6a015d6beb03ccb9" - } - }, - "4.19.42": { - "CVE-2018-20836": { - "cmt_msg": "scsi: libsas: fix a race condition when smp task timeout", - "cmt_id": "0f18e433b97bf74bb62e0caa95c61e8631967fb9" + "CVE-2024-26629": { + "cmt_msg": "nfsd: fix RELEASE_LOCKOWNER", + "cmt_id": "b7d2eee1f53899b53f069bba3a59a419fc3d331b" }, - "CVE-2019-11884": { - "cmt_msg": "Bluetooth: hidp: fix buffer overflow", - "cmt_id": "c6d1f9b4b2cb768e29f5d44af143f25ad89062b1" - } - }, - "4.19.43": { - "CVE-2019-11091": { - "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option", - "cmt_id": "59a14fb5832c370c63ab483f4f3718a0f729c7f5" + "CVE-2024-23849": { + "cmt_msg": "net/rds: Fix UBSAN: array-index-out-of-bounds in rds_cmsg_recv", + "cmt_id": "7a73190ea557e7f26914b0fe04c1f57a96cb771f" }, - "CVE-2018-12130": { - "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option", - "cmt_id": "59a14fb5832c370c63ab483f4f3718a0f729c7f5" + "CVE-2024-26620": { + "cmt_msg": "s390/vfio-ap: always filter entire AP matrix", + "cmt_id": "c69d821197611678533fb3eb784fc823b921349a" }, - "CVE-2018-12127": { - "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option", - "cmt_id": "59a14fb5832c370c63ab483f4f3718a0f729c7f5" + "CVE-2024-26644": { + "cmt_msg": "btrfs: don't abort filesystem when attempting to snapshot deleted subvolume", + "cmt_id": "ec794a7528199e1be6d47bec03f4755aa75df256" }, - "CVE-2018-12126": { - "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option", - "cmt_id": "59a14fb5832c370c63ab483f4f3718a0f729c7f5" - } - }, - "4.19.44": { - "CVE-2019-10142": { - "cmt_msg": "drivers/virt/fsl_hypervisor.c: prevent integer overflow in ioctl", - "cmt_id": "e9ec5073c90d6de2ca5338bd67f7935b19d7c0c7" - } - }, - "4.19.45": { - "CVE-2019-11833": { - "cmt_msg": "ext4: zero out the unused memory region in the extent tree block", - "cmt_id": "25d010f4e0ece1ddf0d8d57942c0b0f1568fe498" - } - }, - "4.19.46": { - "CVE-2019-25045": { - "cmt_msg": "xfrm: clean up xfrm protocol checks", - "cmt_id": "d410ef75886a4efb3c49b8bacd8e3c295235e744" + "CVE-2024-26668": { + "cmt_msg": "netfilter: nft_limit: reject configurations that cause integer overflow", + "cmt_id": "9882495d02ecc490604f747437a40626dc9160d0" }, - "CVE-2019-15666": { - "cmt_msg": "xfrm: policy: Fix out-of-bound array accesses in __xfrm_policy_unlink", - "cmt_id": "c9516503fe53c8960f180c1cc1cdf2341bed843d" - } - }, - "4.19.47": { - "CVE-2019-20095": { - "cmt_msg": "mwifiex: Fix mem leak in mwifiex_tm_cmd", - "cmt_id": "a27ce4840f89acd1e23efe2b4dfc0d512aa5b38a" + "CVE-2024-26669": { + "cmt_msg": "net/sched: flower: Fix chain template offload", + "cmt_id": "9ed46144cff3598a5cf79955630e795ff9af5b97" }, - "CVE-2019-19543": { - "cmt_msg": "media: serial_ir: Fix use-after-free in serial_ir_init_module", - "cmt_id": "aec118ecf579a6c70e505b39fc6eb6a2d878c89e" + "CVE-2024-26607": { + "cmt_msg": "drm/bridge: sii902x: Fix probing race issue", + "cmt_id": "56f96cf6eb11a1c2d594367c3becbfb06a855ec1" }, - "CVE-2019-9466": { - "cmt_msg": "brcmfmac: add subtype check for event handling in data path", - "cmt_id": "8783c4128c371668e401eee2f2ba3918c6211b81" + "CVE-2024-26648": { + "cmt_msg": "drm/amd/display: Fix variable deferencing before NULL check in edp_setup_replay()", + "cmt_id": "22ae604aea14756954e1c00ae653e34d2afd2935" }, - "CVE-2019-9500": { - "cmt_msg": "brcmfmac: assure SSID length from firmware is limited", - "cmt_id": "cc240e057c1d48665dde8036144114854bae058c" + "CVE-2024-26649": { + "cmt_msg": "drm/amdgpu: Fix the null pointer when load rlc firmware", + "cmt_id": "8b5bacce2d13dbe648f0bfd3f738ecce8db4978c" }, - "CVE-2019-9503": { - "cmt_msg": "brcmfmac: add subtype check for event handling in data path", - "cmt_id": "8783c4128c371668e401eee2f2ba3918c6211b81" + "CVE-2024-26646": { + "cmt_msg": "thermal: intel: hfi: Add syscore callbacks for system-wide PM", + "cmt_id": "019ccc66d56a696a4dfee3bfa2f04d0a7c3d89ee" }, - "CVE-2019-19966": { - "cmt_msg": "media: cpia2: Fix use-after-free in cpia2_exit", - "cmt_id": "bdf3da72ae79f0cfb88c720dedabe16b0d67334b" - } - }, - "4.19.48": { - "CVE-2020-10720": { - "cmt_msg": "net-gro: fix use-after-free read in napi_gro_frags()", - "cmt_id": "39fd0dc4a5565a1df7d84b1c92d2050233b15b5a" + "CVE-2024-26647": { + "cmt_msg": "drm/amd/display: Fix late derefrence 'dsc' check in 'link_set_dsc_pps_packet()'", + "cmt_id": "6aa5ede6665122f4c8abce3c6eba06b49e54d25c" }, - "CVE-2019-10638": { - "cmt_msg": "inet: switch IP ID generator to siphash", - "cmt_id": "07480da0c8a1979e0973d6dd783b6aed966dccf6" - } - }, - "4.19.49": { - "CVE-2019-15212": { - "cmt_msg": "USB: rio500: refuse more than one device at a time", - "cmt_id": "d2d93077bac37c6895d8c58f564699a3a897c5db" + "CVE-2024-26608": { + "cmt_msg": "ksmbd: fix global oob in ksmbd_nl_policy", + "cmt_id": "9863a53100f47652755545c2bd43e14a1855104d" }, - "CVE-2019-15219": { - "cmt_msg": "USB: sisusbvga: fix oops in error path of sisusb_probe", - "cmt_id": "d27ea5e9eb4ac45e0e4cf8250a45aa06b0944787" + "CVE-2024-26645": { + "cmt_msg": "tracing: Ensure visibility when inserting an element into tracing_map", + "cmt_id": "a1eebe76e187dbe11ca299f8dbb6e45d5b1889e7" }, - "CVE-2019-15218": { - "cmt_msg": "media: usb: siano: Fix general protection fault in smsusb", - "cmt_id": "35b1044566528b26d48b31a52069f45851d49885" + "CVE-2023-52616": { + "cmt_msg": "crypto: lib/mpi - Fix unexpected pointer access in mpi_ec_init", + "cmt_id": "7ebf812b7019fd2d4d5a7ca45ef4bf3a6f4bda0a" }, - "CVE-2019-1999": { - "cmt_msg": "binder: fix race between munmap() and direct reclaim", - "cmt_id": "9d57cfd4e9d81400c1fe2b7cd4503f54830b46c2" + "CVE-2024-26808": { + "cmt_msg": "netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain", + "cmt_id": "e5888acbf1a3d8d021990ce6c6061fd5b2bb21b4" }, - "CVE-2019-15223": { - "cmt_msg": "ALSA: line6: Assure canceling delayed work at disconnection", - "cmt_id": "eb2eeec920fb1b9b6faf8ea340f6295a2d03602b" - } - }, - "4.19.50": { - "CVE-2019-13233": { - "cmt_msg": "x86/insn-eval: Fix use-after-free access to LDT entry", - "cmt_id": "b598ddc7b9fc87b09bdadb63abf92b4ba46cd385" - } - }, - "4.19.52": { - "CVE-2019-11479": { - "cmt_msg": "tcp: add tcp_min_snd_mss sysctl", - "cmt_id": "7f9f8a37e563c67b24ccd57da1d541a95538e8d9" + "CVE-2023-52488": { + "cmt_msg": "serial: sc16is7xx: convert from _raw_ to _noinc_ regmap functions for FIFO", + "cmt_id": "084c24e788d9cf29c55564de368bf5284f2bb5db" }, - "CVE-2019-11478": { - "cmt_msg": "tcp: tcp_fragment() should apply sane memory limits", - "cmt_id": "ec83921899a571ad70d582934ee9e3e07f478848" + "CVE-2023-52489": { + "cmt_msg": "mm/sparsemem: fix race in accessing memory_section->usage", + "cmt_id": "70064241f2229f7ba7b9599a98f68d9142e81a97" }, - "CVE-2019-11477": { - "cmt_msg": "tcp: limit payload size of sacked skbs", - "cmt_id": "c09be31461ed140976c60a87364415454a2c3d42" - } - }, - "4.19.53": { - "CVE-2019-9453": { - "cmt_msg": "f2fs: fix to avoid accessing xattr across the boundary", - "cmt_id": "ae3787d433f7b87ebf6b916e524c6e280e4e5804" + "CVE-2023-52627": { + "cmt_msg": "iio: adc: ad7091r: Allow users to configure device events", + "cmt_id": "89c4e63324e208a23098f7fb15c00487cecbfed2" }, - "CVE-2019-15090": { - "cmt_msg": "scsi: qedi: remove memset/memcpy to nfunc and use func instead", - "cmt_id": "f3a7a1137ffc69e1f460eb9e1b5f4fd09d3c4ea9" - } - }, - "4.19.54": { - "CVE-2019-15807": { - "cmt_msg": "scsi: libsas: delete sas port if expander discover failed", - "cmt_id": "114e8135ae0031556ead1bcb67249ecb84b804de" + "CVE-2024-26670": { + "cmt_msg": "arm64: entry: fix ARM64_WORKAROUND_SPECULATIVE_UNPRIV_LOAD", + "cmt_id": "58eb5c07f41704464b9acc09ab0707b6769db6c0" }, - "CVE-2019-12984": { - "cmt_msg": "nfc: Ensure presence of required attributes in the deactivate_target handler", - "cmt_id": "4bb4ba362cc1ed3acb181a6d0b68c6de22be78e2" - } - }, - "4.19.56": { - "CVE-2019-12817": { - "cmt_msg": "powerpc/mm/64s/hash: Reallocate context ids on fork", - "cmt_id": "cd3e49394cb0f45c8dbf3c17c0818cd3d30b1332" + "CVE-2023-52486": { + "cmt_msg": "drm: Don't unref the same fb many times by mistake due to deadlock handling", + "cmt_id": "d7afdf360f4ac142832b098b4de974e867cc063c" }, - "CVE-2019-12615": { - "cmt_msg": "mdesc: fix a missing-check bug in get_vdev_port_node_info()", - "cmt_id": "7b460a9bb13db3f442f153c2ab8a9ff8520c368c" + "CVE-2023-52487": { + "cmt_msg": "net/mlx5e: Fix peer flow lists handling", + "cmt_id": "74cec142f89bf85c6c99c5db957da9f663f9f16f" }, - "CVE-2019-0136": { - "cmt_msg": "mac80211: drop robust management frames from unknown TA", - "cmt_id": "0e879ef1cb5baddebe1f12a9a3940a87d8e61558" - } - }, - "4.19.58": { - "CVE-2019-13272": { - "cmt_msg": "ptrace: Fix ->ptracer_cred handling for PTRACE_TRACEME", - "cmt_id": "54435b7fff7bfb9515cc457b71c3734c1c3fff76" + "CVE-2023-52608": { + "cmt_msg": "firmware: arm_scmi: Check mailbox/SMT channel for consistency", + "cmt_id": "9b5e1b93c83ee5fc9f5d7bd2d45b421bd87774a2" }, - "CVE-2019-15221": { - "cmt_msg": "ALSA: line6: Fix write on zero-sized buffer", - "cmt_id": "7f52af5e9baa9c478edcecdd4058eeef2835b1c3" + "CVE-2024-26636": { + "cmt_msg": "llc: make llc_ui_sendmsg() more robust against bonding changes", + "cmt_id": "cafd3ad3fe03ef4d6632747be9ee15dc0029db4b" }, - "CVE-2019-9506": { - "cmt_msg": "Bluetooth: Fix faulty expression for minimum encryption key size check", - "cmt_id": "5dd6139a0aa22112e46a6df5fd283046095822e0" - } - }, - "4.19.59": { - "CVE-2019-10126": { - "cmt_msg": "mwifiex: Fix heap overflow in mwifiex_uap_parse_tail_ies()", - "cmt_id": "c7e427e28a3a2d1b89b8f9fa7c3f559774d91a7b" + "CVE-2024-26638": { + "cmt_msg": "nbd: always initialize struct msghdr completely", + "cmt_id": "1960f2b534da1e6c65fb96f9e98bda773495f406" }, - "CVE-2019-3846": { - "cmt_msg": "mwifiex: Fix possible buffer overflows at parsing bss descriptor", - "cmt_id": "d4c0f752c1d2c6383cc7582c19b2ed7159d45937" + "CVE-2023-52491": { + "cmt_msg": "media: mtk-jpeg: Fix use after free bug due to error path handling in mtk_jpeg_dec_device_run", + "cmt_id": "8254d54d00eb6cdb8367399c7f912eb8d354ecd7" }, - "CVE-2019-15220": { - "cmt_msg": "p54usb: Fix race between disconnect and firmware loading", - "cmt_id": "449a8d08a4bc45101fa26e6d233b98258d33620a" + "CVE-2024-26635": { + "cmt_msg": "llc: Drop support for ETH_P_TR_802_2.", + "cmt_id": "f1f34a515fb1e25e85dee94f781e7869ae351fb8" + }, + "CVE-2024-26634": { + "cmt_msg": "net: fix removing a namespace with conflicting altnames", + "cmt_id": "e855dded4b70d1975ee7b9fed0c700391e3c8ea6" } }, - "4.19.61": { - "CVE-2019-17351": { - "cmt_msg": "xen: let alloc_xenballooned_pages() fail if not enough memory free", - "cmt_id": "e73db096691e5f2720049502a3794a2a0c6d1b1f" + "6.6.16": { + "CVE-2024-26673": { + "cmt_msg": "netfilter: nft_ct: sanitize layer 3 and 4 protocol number in custom expectations", + "cmt_id": "cfe3550ea5df292c9e2d608e8c4560032391847e" }, - "CVE-2019-13631": { - "cmt_msg": "Input: gtco - bounds check collection indent level", - "cmt_id": "d657077eda7b5572d86f2f618391bb016b5d9a64" + "CVE-2024-26671": { + "cmt_msg": "blk-mq: fix IO hang from sbitmap wakeup race", + "cmt_id": "6d8b01624a2540336a32be91f25187a433af53a0" }, - "CVE-2019-15213": { - "cmt_msg": "media: dvb: usb: fix use after free in dvb_usb_device_exit", - "cmt_id": "94f2b518a7882f562537796b77e3ce6a6461236d" + "CVE-2023-52584": { + "cmt_msg": "spmi: mediatek: Fix UAF on device remove", + "cmt_id": "f8dcafcb54632536684336161da8bdd52120f95e" }, - "CVE-2019-15925": { - "cmt_msg": "net: hns3: add some error checking in hclge_tm module", - "cmt_id": "26d86b29e806769adba91bd6fc1f077b94e9b64b" + "CVE-2023-52587": { + "cmt_msg": "IB/ipoib: Fix mcast list locking", + "cmt_id": "342258fb46d66c1b4c7e2c3717ac01e10c03cf18" }, - "CVE-2019-15926": { - "cmt_msg": "ath6kl: add some bounds checking", - "cmt_id": "83c911f4bd6846397017aa38c32dd18dc532f754" + "CVE-2023-52583": { + "cmt_msg": "ceph: fix deadlock or deadcode of misusing dget()", + "cmt_id": "196b87e5c00ce021e164a5de0f0d04f4116a9160" }, - "CVE-2019-14284": { - "cmt_msg": "floppy: fix div-by-zero in setup_format_params", - "cmt_id": "6e34fd07484a0622a17b40e0ca89ed451260ef45" + "CVE-2023-52635": { + "cmt_msg": "PM / devfreq: Synchronize devfreq_monitor_[start/stop]", + "cmt_id": "0aedb319ef3ed39e9e5a7b7726c8264ca627bbd9" }, - "CVE-2019-14283": { - "cmt_msg": "floppy: fix out-of-bounds read in copy_buffer", - "cmt_id": "ff54c44f103825a426e46d08b5d3d76e44791a87" - } - }, - "4.19.63": { - "CVE-2019-12382": { - "cmt_msg": "drm/edid: Fix a missing-check bug in drm_load_edid_firmware()", - "cmt_id": "2a18d76592e0d86c7fddcc6a7aa52509a2900f9d" + "CVE-2023-52589": { + "cmt_msg": "media: rkisp1: Fix IRQ disable race issue", + "cmt_id": "fab483438342984f2a315fe13c882a80f0f7e545" }, - "CVE-2019-13648": { - "cmt_msg": "powerpc/tm: Fix oops on sigreturn on systems without TM", - "cmt_id": "b993a66d8ddc1c26da0d9aa3471789cc170b28ee" - } - }, - "4.19.64": { - "CVE-2019-20934": { - "cmt_msg": "sched/fair: Don't free p->numa_faults with concurrent readers", - "cmt_id": "48046e092ad557a01d7daf53205624944793b19d" + "CVE-2023-52588": { + "cmt_msg": "f2fs: fix to tag gcing flag on page during block migration", + "cmt_id": "417b8a91f4e8831cadaf85c3f15c6991c1f54dde" }, - "CVE-2019-15211": { - "cmt_msg": "media: radio-raremono: change devm_k*alloc to k*alloc", - "cmt_id": "b3836af8560e27cd0d27940ff9c5a08b90b8d256" + "CVE-2023-52617": { + "cmt_msg": "PCI: switchtec: Fix stdev_release() crash after surprise hot remove", + "cmt_id": "0233b836312e39a3c763fb53512b3fa455b473b3" }, - "CVE-2019-3900": { - "cmt_msg": "vhost_net: fix possible infinite loop", - "cmt_id": "3af3b843aee41ed22343b011a4cf3812a80d2f38" + "CVE-2023-52633": { + "cmt_msg": "um: time-travel: fix time corruption", + "cmt_id": "de3e9d8e8d1ae0a4d301109d1ec140796901306c" }, - "CVE-2019-10207": { - "cmt_msg": "Bluetooth: hci_uart: check for missing tty operations", - "cmt_id": "56966212e23f82ced10831f7cca02f7339147428" + "CVE-2023-52619": { + "cmt_msg": "pstore/ram: Fix crash when setting number of cpus to an odd number", + "cmt_id": "0593cfd321df9001142a9d2c58d4144917dff7ee" }, - "CVE-2019-15215": { - "cmt_msg": "media: cpia2_usb: first wake up, then free in disconnect", - "cmt_id": "8b44cc225e6024174508164931cab9f01c79dca2" + "CVE-2023-52618": { + "cmt_msg": "block/rnbd-srv: Check for unlikely string overflow", + "cmt_id": "5b9ea86e662035a886ccb5c76d56793cba618827" }, - "CVE-2019-2213": { - "cmt_msg": "binder: fix possible UAF when freeing buffer", - "cmt_id": "22068d49d09d2b3890e19d7b2048a33340f992da" - } - }, - "4.19.65": { - "CVE-2019-1125": { - "cmt_msg": "x86/speculation: Prepare entry code for Spectre v1 swapgs mitigations", - "cmt_id": "befb822c062b4c3d93380a58d5fd479395e8b267" - } - }, - "4.19.67": { - "CVE-2019-19536": { - "cmt_msg": "can: peak_usb: pcan_usb_pro: Fix info-leaks to USB devices", - "cmt_id": "cab569a44a524709d95bbd88700860ac45e5d5cf" + "CVE-2023-52632": { + "cmt_msg": "drm/amdkfd: Fix lock dependency warning with srcu", + "cmt_id": "752312f6a79440086ac0f9b08d7776870037323c" }, - "CVE-2019-19535": { - "cmt_msg": "can: peak_usb: pcan_usb_fd: Fix info-leaks to USB devices", - "cmt_id": "9ce1b3eb5489416338b2fb2b40f30f0d425700b4" + "CVE-2024-26625": { + "cmt_msg": "llc: call sock_orphan() at release time", + "cmt_id": "3151051b787f7cd7e3329ea0016eb9113c248812" }, - "CVE-2019-19531": { - "cmt_msg": "usb: yurex: Fix use-after-free in yurex_delete", - "cmt_id": "33f2240acfa8b4017ee5dd64601c8a5ec7f53b4e" - } - }, - "4.19.68": { - "CVE-2019-15118": { - "cmt_msg": "ALSA: usb-audio: Fix a stack buffer overflow bug in check_input_term", - "cmt_id": "46f9a1bc60a4c15a14a6504168cee1c2e0bf3ab4" + "CVE-2024-26627": { + "cmt_msg": "scsi: core: Move scsi_host_busy() out of host lock for waking up EH handler", + "cmt_id": "65ead8468c21c2676d4d06f50b46beffdea69df1" }, - "CVE-2019-19537": { - "cmt_msg": "USB: core: Fix races in character device registration and deregistraion", - "cmt_id": "7f52d6d2a82df15d7ea01d69d0943d2abc201b43" + "CVE-2024-26623": { + "cmt_msg": "pds_core: Prevent race issues involving the adminq", + "cmt_id": "22cd6046eb2148b18990257505834dd45c672a1b" }, - "CVE-2019-19527": { - "cmt_msg": "HID: hiddev: do cleanup in failure of opening a device", - "cmt_id": "b545dc9debe69ca513b93f4a244451e9be14b0c5" + "CVE-2023-52621": { + "cmt_msg": "bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers", + "cmt_id": "483cb92334cd7f1d5387dccc0ab5d595d27a669d" }, - "CVE-2019-19530": { - "cmt_msg": "usb: cdc-acm: make sure a refcount is taken early enough", - "cmt_id": "c02c0249ce5523a7a264136ed36f857b85555bac" + "CVE-2023-52622": { + "cmt_msg": "ext4: avoid online resizing failures due to oversized flex bg", + "cmt_id": "8b1413dbfe49646eda2c00c0f1144ee9d3368e0c" }, - "CVE-2019-15117": { - "cmt_msg": "ALSA: usb-audio: Fix an OOB bug in parse_audio_mixer_unit", - "cmt_id": "58b9f19ee438990f6406e61943d0bc7c875a0921" - } - }, - "4.19.69": { - "CVE-2019-15538": { - "cmt_msg": "xfs: fix missing ILOCK unlock when xfs_setattr_nonsize fails due to EDQUOT", - "cmt_id": "11f85d4d77afb8f1cb1989f1565b26df21280118" - } - }, - "4.19.70": { - "CVE-2019-15902": { - "cmt_msg": "unknown", - "cmt_id": "b307f99dca5ab33edc1e04b9b479bcb0852ff85f" - } - }, - "4.19.73": { - "CVE-2019-15918": { - "cmt_msg": "cifs: Fix lease buffer length error", - "cmt_id": "4061e662c8e9f5fb796b05fd2ab58fed8cd16d59" + "CVE-2024-26640": { + "cmt_msg": "tcp: add sanity checks to rx zerocopy", + "cmt_id": "d15cc0f66884ef2bed28c7ccbb11c102aa3a0760" }, - "CVE-2019-19319": { - "cmt_msg": "ext4: protect journal inode's blocks using block_validity", - "cmt_id": "2fd4629de51974002f4e9cf1a35a1926dd6c9d99" + "CVE-2024-26641": { + "cmt_msg": "ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv()", + "cmt_id": "350a6640fac4b53564ec20aa3f4a0922cb0ba5e6" }, - "CVE-2019-14835": { - "cmt_msg": "vhost: make sure log_num < in_num", - "cmt_id": "ba03ee62aed0b0ee2eadfeb4a2fecc7d7eb47871" + "CVE-2023-52596": { + "cmt_msg": "sysctl: Fix out of bounds access for empty sysctl registers", + "cmt_id": "15893975e9e382f8294ea8d926f08dc2d8d39ede" }, - "CVE-2019-15031": { - "cmt_msg": "powerpc/tm: Fix restoring FP/VMX facility incorrectly on interrupts", - "cmt_id": "569775bd536416ed9049aa580d9f89a0b4307d60" + "CVE-2023-52597": { + "cmt_msg": "KVM: s390: fix setting of fpc register", + "cmt_id": "c87d7d910775a025e230fd6359b60627e392460f" }, - "CVE-2019-15030": { - "cmt_msg": "powerpc/tm: Fix FP/VMX unavailable exceptions inside a transaction", - "cmt_id": "47a0f70d7d9ac3d6b1a96b312d07bc67af3834e9" - } - }, - "4.19.74": { - "CVE-2019-15504": { - "cmt_msg": "rsi: fix a double free bug in rsi_91x_deinit()", - "cmt_id": "3622d621e9beca76d53cd3007eb7b1d6e724716b" - } - }, - "4.19.75": { - "CVE-2019-14816": { - "cmt_msg": "mwifiex: Fix three heap overflow at parsing element in cfg80211_ap_settings", - "cmt_id": "941431c491a68e0428bdfb46bbe4cbc52f7bfabb" + "CVE-2023-52594": { + "cmt_msg": "wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus()", + "cmt_id": "e4f4bac7d3b64eb75f70cd3345712de6f68a215d" }, - "CVE-2019-14814": { - "cmt_msg": "mwifiex: Fix three heap overflow at parsing element in cfg80211_ap_settings", - "cmt_id": "941431c491a68e0428bdfb46bbe4cbc52f7bfabb" + "CVE-2023-52595": { + "cmt_msg": "wifi: rt2x00: restart beacon queue when hardware reset", + "cmt_id": "04cfe4a5da57ab9358cdfadea22bcb37324aaf83" }, - "CVE-2019-14815": { - "cmt_msg": "mwifiex: Fix three heap overflow at parsing element in cfg80211_ap_settings", - "cmt_id": "941431c491a68e0428bdfb46bbe4cbc52f7bfabb" + "CVE-2023-52593": { + "cmt_msg": "wifi: wfx: fix possible NULL pointer dereference in wfx_set_mfp_ap()", + "cmt_id": "9ab224744a47363f74ea29c6894c405e3bcf5132" }, - "CVE-2019-15505": { - "cmt_msg": "media: technisat-usb2: break out of loop at end of buffer", - "cmt_id": "b841a9f58d9c778d8c2c5f636dc06a53b9a47fa1" + "CVE-2023-52591": { + "cmt_msg": "reiserfs: Avoid touching renamed directory if parent does not change", + "cmt_id": "17e1361cb91dc1325834da95d2ab532959d2debc" }, - "CVE-2019-14821": { - "cmt_msg": "KVM: coalesced_mmio: add bounds checking", - "cmt_id": "232a6462f43fceeac82bd99ef092b38e3a7ee296" - } - }, - "4.19.77": { - "CVE-2019-19533": { - "cmt_msg": "media: ttusb-dec: Fix info-leak in ttusb_dec_send_command()", - "cmt_id": "8630a4d13683095fbf14091d59a20e1ac71fdd6b" + "CVE-2023-52598": { + "cmt_msg": "s390/ptrace: handle setting of fpc register correctly", + "cmt_id": "02c6bbfb08bad78dd014e24c7b893723c15ec7a1" }, - "CVE-2019-19080": { - "cmt_msg": "nfp: flower: prevent memory leak in nfp_flower_spawn_phy_reprs", - "cmt_id": "5b6c791f494d5e770dfd015390386f321b9a94da" + "CVE-2023-52599": { + "cmt_msg": "jfs: fix array-index-out-of-bounds in diNewExt", + "cmt_id": "6996d43b14486f4a6655b10edc541ada1b580b4b" }, - "CVE-2019-19081": { - "cmt_msg": "nfp: flower: fix memory leak in nfp_flower_spawn_vnic_reprs", - "cmt_id": "587df35cbf654a063372fb1b523a0b56a5f789ab" + "CVE-2023-52606": { + "cmt_msg": "powerpc/lib: Validate size for vector operations", + "cmt_id": "28b8ba8eebf26f66d9f2df4ba550b6b3b136082c" }, - "CVE-2019-17053": { - "cmt_msg": "ieee802154: enforce CAP_NET_RAW for raw sockets", - "cmt_id": "dd651ab7a11436f787aed0a987c85864b261ff19" + "CVE-2023-52607": { + "cmt_msg": "powerpc/mm: Fix null-pointer dereference in pgtable_cache_add", + "cmt_id": "145febd85c3bcc5c74d87ef9a598fc7d9122d532" }, - "CVE-2019-17052": { - "cmt_msg": "ax25: enforce CAP_NET_RAW for raw sockets", - "cmt_id": "6f0f18e532693ecc1e0c7938e0d63531ea62bc3e" + "CVE-2023-52604": { + "cmt_msg": "FS:JFS:UBSAN:array-index-out-of-bounds in dbAdjTree", + "cmt_id": "6a44065dd604972ec1fbcccbdc4a70d266a89cdd" }, - "CVE-2019-17056": { - "cmt_msg": "nfc: enforce CAP_NET_RAW for raw sockets", - "cmt_id": "33fe1f517e29566d842535038be227c71a4bd54d" + "CVE-2023-52623": { + "cmt_msg": "SUNRPC: Fix a suspicious RCU usage warning", + "cmt_id": "69c7eeb4f622c2a28da965f970f982db171f3dc6" }, - "CVE-2019-17055": { - "cmt_msg": "mISDN: enforce CAP_NET_RAW for raw sockets", - "cmt_id": "50dddec689cb2105f6bccf4a2c6fe43dcc3295d7" + "CVE-2023-52602": { + "cmt_msg": "jfs: fix slab-out-of-bounds Read in dtSearch", + "cmt_id": "7110650b85dd2f1cee819acd1345a9013a1a62f7" }, - "CVE-2019-17054": { - "cmt_msg": "appletalk: enforce CAP_NET_RAW for raw sockets", - "cmt_id": "6fbf866276089853727dd9b31f1d251e61dde367" - } - }, - "4.19.78": { - "CVE-2019-18806": { - "cmt_msg": "net: qlogic: Fix memory leak in ql_alloc_large_buffers", - "cmt_id": "9d0995cc268b4a431dbfb29db5cac36546732bc0" - } - }, - "4.19.79": { - "CVE-2019-19525": { - "cmt_msg": "ieee802154: atusb: fix use-after-free at disconnect", - "cmt_id": "3f41e88f4bd44284c575ad3fb579581a16b39069" + "CVE-2023-52603": { + "cmt_msg": "UBSAN: array-index-out-of-bounds in dtSplitRoot", + "cmt_id": "edff092a59260bf0b0a2eba219cb3da6372c2f9f" }, - "CVE-2019-16746": { - "cmt_msg": "nl80211: validate beacon head", - "cmt_id": "1bd17a737c9e7e91483d9a603528b0e6d4c772f8" - } - }, - "4.19.80": { - "CVE-2019-19528": { - "cmt_msg": "USB: iowarrior: fix use-after-free on disconnect", - "cmt_id": "2fdcf7e19bdefc683da824264c0898af39bf8d50" + "CVE-2023-52600": { + "cmt_msg": "jfs: fix uaf in jfs_evict_inode", + "cmt_id": "1696d6d7d4a1b373e96428d0fe1166bd7c3c795e" }, - "CVE-2019-19523": { - "cmt_msg": "USB: adutux: fix use-after-free on disconnect", - "cmt_id": "316f51d7759735a5295301ab22a7c6231b49c24f" + "CVE-2023-52601": { + "cmt_msg": "jfs: fix array-index-out-of-bounds in dbAdjTree", + "cmt_id": "2e16a1389b5a7983b45cb2aa20b0e3f0ee364d6c" } }, - "4.19.81": { - "CVE-2019-19075": { - "cmt_msg": "ieee802154: ca8210: prevent memory leak", - "cmt_id": "960019214539ce75398eaf38d31c77b86aadd739" + "6.6.17": { + "CVE-2024-26677": { + "cmt_msg": "rxrpc: Fix delayed ACKs to not set the reference serial number", + "cmt_id": "200cb50b9e154434470c8969d32474d38475acc2" }, - "CVE-2019-17075": { - "cmt_msg": "RDMA/cxgb4: Do not dma memory off of the stack", - "cmt_id": "27414f90ff6e1d7f6657e4a820b04a7b2d760272" + "CVE-2024-26676": { + "cmt_msg": "af_unix: Call kfree_skb() for dead unix_(sk)->oob_skb in GC.", + "cmt_id": "b74aa9ce13d02b7fd37c5325b99854f91b9b4276" }, - "CVE-2019-17133": { - "cmt_msg": "cfg80211: wext: avoid copying malformed SSIDs", - "cmt_id": "73c066a9552a6d33ed7de002855337d1c966e8ce" - } - }, - "4.19.82": { - "CVE-2019-19060": { - "cmt_msg": "iio: imu: adis16400: release allocated memory on failure", - "cmt_id": "4a4206a83fc69782d4ef36d8f5eb28836d8b6814" + "CVE-2024-26675": { + "cmt_msg": "ppp_async: limit MRU to 64K", + "cmt_id": "7e5ef49670766c9742ffcd9cead7cdb018268719" }, - "CVE-2019-19065": { - "cmt_msg": "RDMA/hfi1: Prevent memory leak in sdma_init", - "cmt_id": "962cff4f3f89acf54b6fb418e7ff386b720b0fd6" + "CVE-2024-26674": { + "cmt_msg": "x86/lib: Revert to _ASM_EXTABLE_UA() for {get,put}_user() fixups", + "cmt_id": "2aed1b6c33afd8599d01c6532bbecb829480a674" }, - "CVE-2019-17666": { - "cmt_msg": "rtlwifi: Fix potential overflow on P2P code", - "cmt_id": "64efcbc7a5a3c7a14e42ccf7b8a7e7667d672a33" + "CVE-2024-26659": { + "cmt_msg": "xhci: handle isoc Babble and Buffer Overrun events properly", + "cmt_id": "f5e7ffa9269a448a720e21f1ed1384d118298c97" }, - "CVE-2019-15099": { - "cmt_msg": "ath6kl: fix a NULL-ptr-deref bug in ath6kl_usb_alloc_urb_from_pipe()", - "cmt_id": "696da02259463ea634821e117088f82afe7bf851" + "CVE-2024-26679": { + "cmt_msg": "inet: read sk->sk_family once in inet_recv_error()", + "cmt_id": "4a5e31bdd3c1702b520506d9cf8c41085f75c7f2" }, - "CVE-2019-15098": { - "cmt_msg": "ath6kl: fix a NULL-ptr-deref bug in ath6kl_usb_alloc_urb_from_pipe()", - "cmt_id": "696da02259463ea634821e117088f82afe7bf851" + "CVE-2023-52636": { + "cmt_msg": "libceph: just wait for more data to be available on the socket", + "cmt_id": "da9c33a70f095d5d55c36d0bfeba969e31de08ae" }, - "CVE-2019-19048": { - "cmt_msg": "virt: vbox: fix memory leak in hgcm_call_preprocess_linaddr", - "cmt_id": "c2ea451f22f180e9e46225f54b5ec50c50bb639f" + "CVE-2023-52631": { + "cmt_msg": "fs/ntfs3: Fix an NULL dereference bug", + "cmt_id": "fb7bcd1722bc9bc55160378f5f99c01198fd14a7" }, - "CVE-2020-10773": { - "cmt_msg": "s390/cmm: fix information leak in cmm_timeout_handler()", - "cmt_id": "ced8cb0230d070274cd26bec818dd7c67514d586" + "CVE-2023-52630": { + "cmt_msg": "blk-iocost: Fix an UBSAN shift-out-of-bounds warning", + "cmt_id": "27b216130e64651e76ed583742a1b4e4d08a67c3" }, - "CVE-2019-19526": { - "cmt_msg": "NFC: pn533: fix use-after-free and memleaks", - "cmt_id": "24aaf7f4528f0df0f29667d3921f4a63aa7b806c" + "CVE-2024-26680": { + "cmt_msg": "net: atlantic: Fix DMA mapping for PTP hwts ring", + "cmt_id": "004fe5b7f59286a926a45e0cafc7870e9cdddd56" }, - "CVE-2019-19532": { - "cmt_msg": "HID: Fix assumption that devices have inputs", - "cmt_id": "8a01c4b908cf0a5367d3309c1c0d4e9be655ce00" - } - }, - "4.19.83": { - "CVE-2019-18282": { - "cmt_msg": "net/flow_dissector: switch to siphash", - "cmt_id": "558d2bdad5f6a0dd65ed7ed4f74419e826a97759" + "CVE-2024-26681": { + "cmt_msg": "netdevsim: avoid potential loop in nsim_dev_trap_report_work()", + "cmt_id": "6eecddd9c3c8d6e3a097531cdc6d500335b35e46" }, - "CVE-2019-16233": { - "cmt_msg": "scsi: qla2xxx: fix a potential NULL pointer dereference", - "cmt_id": "3ee6a8bdae81a09c1dc9c27d3a50e6b1b6a24676" + "CVE-2024-26684": { + "cmt_msg": "net: stmmac: xgmac: fix handling of DPP safety error for DMA channels", + "cmt_id": "7e0ff50131e9d1aa507be8e670d38e9300a5f5bf" }, - "CVE-2019-19049": { - "cmt_msg": "of: unittest: fix memory leak in unittest_data_add", - "cmt_id": "fcc3f7c810c3bc595ce179ea4d9e18f506fd0d03" - } - }, - "4.19.84": { - "CVE-2019-19045": { - "cmt_msg": "net/mlx5: prevent memory leak in mlx5_fpga_conn_create_cq", - "cmt_id": "42de3a902443b64c6e3cf9c61d9cd6f30b2c0d67" + "CVE-2024-26581": { + "cmt_msg": "netfilter: nft_set_rbtree: skip end interval element from gc", + "cmt_id": "b734f7a47aeb32a5ba298e4ccc16bb0c52b6dbf7" }, - "CVE-2019-19052": { - "cmt_msg": "can: gs_usb: gs_can_open(): prevent memory leak", - "cmt_id": "9289226f69822de0b716c0fbfc31db0283f14e2b" + "CVE-2024-26600": { + "cmt_msg": "phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP", + "cmt_id": "14ef61594a5a286ae0d493b8acbf9eac46fd04c4" }, - "CVE-2019-18813": { - "cmt_msg": "usb: dwc3: pci: prevent memory leak in dwc3_pci_probe", - "cmt_id": "10eb9abd21bad2a9726f50557b38924cb8d81ccd" + "CVE-2024-26601": { + "cmt_msg": "ext4: regenerate buddy after block freeing failed if under fc replay", + "cmt_id": "ea42d6cffb0dd27a417f410b9d0011e9859328cb" }, - "CVE-2019-0155": { - "cmt_msg": "drm/i915: Rename gen7 cmdparser tables", - "cmt_id": "b4b1abdc6b181cb78a072b95557ae392d423c3eb" + "CVE-2024-26660": { + "cmt_msg": "drm/amd/display: Implement bounds check for stream encoder creation in DCN301", + "cmt_id": "cd9bd10c59e3c1446680514fd3097c5b00d3712d" }, - "CVE-2019-0154": { - "cmt_msg": "drm/i915: Lower RM timeout to avoid DSI hard hangs", - "cmt_id": "011b7173cbdbd1a5f1826656693ea51516f15dc1" + "CVE-2024-26661": { + "cmt_msg": "drm/amd/display: Add NULL test for 'timing generator' in 'dcn21_set_pipe()'", + "cmt_id": "3f3c237a706580326d3b7a1b97697e5031ca4667" }, - "CVE-2019-19922": { - "cmt_msg": "sched/fair: Fix low cpu usage with high throttling by removing expiration of cpu-local slices", - "cmt_id": "502bd151448c2c76a927b26783e5538875c534ff" + "CVE-2024-26662": { + "cmt_msg": "drm/amd/display: Fix 'panel_cntl' could be null in 'dcn21_set_backlight_level()'", + "cmt_id": "2e150ccea13129eb048679114808eb9770443e4d" }, - "CVE-2019-19529": { - "cmt_msg": "can: mcba_usb: fix use-after-free on disconnect", - "cmt_id": "ce9b94da0e043b7b0ec1bd3d0e451d956acff9c1" + "CVE-2024-26663": { + "cmt_msg": "tipc: Check the bearer type before calling tipc_udp_nl_bearer_add()", + "cmt_id": "888e3524be87f3df9fa3c083484e4b62b3e3bb59" }, - "CVE-2018-12207": { - "cmt_msg": "kvm: x86, powerpc: do not allow clearing largepages debugfs entry", - "cmt_id": "a991063ce57684a2259688886643cf1c430f8188" + "CVE-2024-26664": { + "cmt_msg": "hwmon: (coretemp) Fix out-of-bounds memory access", + "cmt_id": "853a6503c586a71abf27e60a7f8c4fb28092976d" }, - "CVE-2019-11135": { - "cmt_msg": "x86/msr: Add the IA32_TSX_CTRL MSR", - "cmt_id": "4002d16a2ae1e3bdc0aa36ce5089bd62b4b9eab6" + "CVE-2024-26665": { + "cmt_msg": "tunnels: fix out of bounds access when building IPv6 PMTU error", + "cmt_id": "510c869ffa4068c5f19ff4df51d1e2f3a30aaac1" }, - "CVE-2019-16231": { - "cmt_msg": "fjes: Handle workqueue allocation failure", - "cmt_id": "f09b99c883e82fd5d28a529e11e66c2e887da636" + "CVE-2024-26666": { + "cmt_msg": "wifi: mac80211: fix RCU use in TDLS fast-xmit", + "cmt_id": "fc3432ae8232ff4025e7c55012dd88db0e3d18eb" }, - "CVE-2019-19534": { - "cmt_msg": "can: peak_usb: fix slab info leak", - "cmt_id": "a7be2debb769092c7c07b9a866b055d8bee5afaf" + "CVE-2024-26667": { + "cmt_msg": "drm/msm/dpu: check for valid hw_pp in dpu_encoder_helper_phys_cleanup", + "cmt_id": "79592a6e7bdc1d05460c95f891f5e5263a107af8" } }, - "4.19.85": { - "CVE-2019-19524": { - "cmt_msg": "Input: ff-memless - kill timer in destroy()", - "cmt_id": "c02230815282a436366d3d0d6de6d2636dd71b74" - } - }, - "4.19.87": { - "CVE-2019-18660": { - "cmt_msg": "powerpc/book3s64: Fix link stack flush on context switch", - "cmt_id": "0a60d4bddc0ba6a7e06d10efa59f7861837860b0" - }, - "CVE-2019-15291": { - "cmt_msg": "media: b2c2-flexcop-usb: add sanity checking", - "cmt_id": "8b42c263ec1a348bf098e6255407486c1bf17ece" + "6.6.18": { + "CVE-2024-26593": { + "cmt_msg": "i2c: i801: Fix block process call transactions", + "cmt_id": "6be99c51829b24c914cef5bff6164877178e84d9" }, - "CVE-2019-18683": { - "cmt_msg": "media: vivid: Fix wrong locking that causes race conditions on streaming stop", - "cmt_id": "467052f6ea5a51524992e43f02b543550495c391" - } - }, - "4.19.88": { - "CVE-2019-12614": { - "cmt_msg": "powerpc/pseries/dlpar: Fix a missing check in dlpar_parse_cc_property()", - "cmt_id": "32a24a397aee35ca2bb0f835b8f3daabd88890fa" + "CVE-2024-1151": { + "cmt_msg": "net: openvswitch: limit the number of recursions from action sets", + "cmt_id": "5eeb2a9eaa5bc6e0aa655ac72a931b78f8f9b365" }, - "CVE-2019-19767": { - "cmt_msg": "ext4: add more paranoia checking in ext4_expand_extra_isize handling", - "cmt_id": "e91cce02f3025da559468729ea0ad9dea242d3eb" - } - }, - "4.19.89": { - "CVE-2019-19062": { - "cmt_msg": "crypto: user - fix memory leak in crypto_report", - "cmt_id": "351a567ebf2482de4dd5e5bbd539f2175540b717" + "CVE-2024-26720": { + "cmt_msg": "mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again", + "cmt_id": "ec18ec230301583395576915d274b407743d8f6c" }, - "CVE-2019-19227": { - "cmt_msg": "appletalk: Fix potential NULL pointer dereference in unregister_snap_client", - "cmt_id": "0977763a13fd87a7aebe376dc96385758de3aa9e" + "CVE-2024-26723": { + "cmt_msg": "lan966x: Fix crash when adding interface under a lag", + "cmt_id": "48fae67d837488c87379f0c9f27df7391718477c" }, - "CVE-2019-19071": { - "cmt_msg": "rsi: release skb if rsi_prepare_beacon fails", - "cmt_id": "5da96cc31633a9076404621ebb89bbe78f2c8676" + "CVE-2024-26719": { + "cmt_msg": "nouveau: offload fence uevents work to workqueue", + "cmt_id": "cc0037fa592d56e4abb9c7d1c52c4d2dc25cd906" }, - "CVE-2019-19079": { - "cmt_msg": "net: qrtr: fix memort leak in qrtr_tun_write_iter", - "cmt_id": "754e3c0c31c96cf3a4a54ed2a8c63cca28109136" + "CVE-2023-52638": { + "cmt_msg": "can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock", + "cmt_id": "26dfe112ec2e95fe0099681f6aec33da13c2dd8e" }, - "CVE-2019-19252": { - "cmt_msg": "vcs: prevent write access to vcsu devices", - "cmt_id": "627f3b9e4dd812dac9d93e578af80de751e704a4" + "CVE-2023-52637": { + "cmt_msg": "can: j1939: Fix UAF in j1939_sk_match_filter during setsockopt(SO_J1939_FILTER)", + "cmt_id": "f84e7534457dcd7835be743517c35378bb4e7c50" }, - "CVE-2019-19332": { - "cmt_msg": "KVM: x86: fix out-of-bounds write in KVM_GET_EMULATED_CPUID (CVE-2019-19332)", - "cmt_id": "5119ffd480b644d8bc9af741cc8ef435a7ec5ff7" - } - }, - "4.19.90": { - "CVE-2019-19447": { - "cmt_msg": "ext4: work around deleting a file with i_nlink == 0 safely", - "cmt_id": "8e7a865366105b978eef4108f49a12100eea4299" - } - }, - "4.19.92": { - "CVE-2019-18786": { - "cmt_msg": "media: rcar_drif: fix a memory disclosure", - "cmt_id": "debdd16cbd99ffc767227685e2738e5b495b7c54" + "CVE-2024-26606": { + "cmt_msg": "binder: signal epoll threads of self-work", + "cmt_id": "a7ae586f6f6024f490b8546c8c84670f96bb9b68" }, - "CVE-2019-19057": { - "cmt_msg": "mwifiex: pcie: Fix memory leak in mwifiex_pcie_init_evt_ring", - "cmt_id": "1b3e52db38471d5ac896eb9be111565e3734d5b5" + "CVE-2024-26718": { + "cmt_msg": "dm-crypt, dm-verity: disable tasklets", + "cmt_id": "5735a2671ffb70ea29ca83969fe01316ee2ed6fc" }, - "CVE-2019-19063": { - "cmt_msg": "rtlwifi: prevent memory leak in rtl_usb_probe", - "cmt_id": "3717a450f83945c481059a6921440e5e6fe3c856" + "CVE-2024-26688": { + "cmt_msg": "fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super", + "cmt_id": "13c5a9fb07105557a1fa9efdb4f23d7ef30b7274" }, - "CVE-2020-0427": { - "cmt_msg": "pinctrl: devicetree: Avoid taking direct reference to device name string", - "cmt_id": "f88ac1330779c5bfdd79f7d7f7d4d3343c782f92" + "CVE-2024-26689": { + "cmt_msg": "ceph: prevent use-after-free in encode_cap_msg()", + "cmt_id": "ae20db45e482303a20e56f2db667a9d9c54ac7e7" }, - "CVE-2019-19947": { - "cmt_msg": "can: kvaser_usb: kvaser_usb_leaf: Fix some info-leaks to USB devices", - "cmt_id": "9ed59600c3524f12144b30cfc1d86734cfb3927b" + "CVE-2024-26727": { + "cmt_msg": "btrfs: do not ASSERT() if the newly created subvolume already got read", + "cmt_id": "833775656d447c545133a744a0ed1e189ce61430" }, - "CVE-2019-20812": { - "cmt_msg": "af_packet: set defaule value for tmo", - "cmt_id": "e99af2cb552e3fe1ec6157fc15856a89a6388886" + "CVE-2024-26685": { + "cmt_msg": "nilfs2: fix potential bug in end_buffer_async_write", + "cmt_id": "2c3bdba00283a6c7a5b19481a59a730f46063803" }, - "CVE-2019-16230": { - "cmt_msg": "drm/amdkfd: fix a potential NULL pointer dereference (v2)", - "cmt_id": "55248674330101fb3ccf7cec8b729e8e067e5f71" + "CVE-2024-26708": { + "cmt_msg": "mptcp: really cope with fastopen race", + "cmt_id": "4bfe217e075d04e63c092df9d40c608e598c2ef2" }, - "CVE-2019-16232": { - "cmt_msg": "libertas: fix a potential NULL pointer dereference", - "cmt_id": "60bb6967b543be59f66f60526ca816e1b33ec480" + "CVE-2024-26703": { + "cmt_msg": "tracing/timerlat: Move hrtimer_init to timerlat_fd open()", + "cmt_id": "5f703935fdb559642d85b2088442ee55a557ae6d" }, - "CVE-2019-16229": { - "cmt_msg": "drm/amdkfd: fix a potential NULL pointer dereference (v2)", - "cmt_id": "55248674330101fb3ccf7cec8b729e8e067e5f71" - } - }, - "4.19.93": { - "CVE-2020-10690": { - "cmt_msg": "ptp: fix the race between the release of ptp_clock and cdev", - "cmt_id": "0393b8720128d5b39db8523e5bfbfc689f18c37c" - } - }, - "4.19.94": { - "CVE-2019-18809": { - "cmt_msg": "media: usb: fix memory leak in af9005_identify_state", - "cmt_id": "d933de8115f3263fd50cf3b1f1dac2faff02fd89" + "CVE-2024-26702": { + "cmt_msg": "iio: magnetometer: rm3100: add boundary check for the value read from RM3100_REG_TMRC", + "cmt_id": "1d8c67e94e9e977603473a543d4f322cf2c4aa01" }, - "CVE-2019-19965": { - "cmt_msg": "scsi: libsas: stop discovering if oob mode is disconnected", - "cmt_id": "8b9bf467061bc89ccf4a43be637e08d8a70fd76d" - } - }, - "4.19.95": { - "CVE-2019-14901": { - "cmt_msg": "mwifiex: Fix heap overflow in mmwifiex_process_tdls_action_frame()", - "cmt_id": "21f08020dd8519baf209348c345131a8967e3cef" - } - }, - "4.19.96": { - "CVE-2019-14895": { - "cmt_msg": "mwifiex: fix possible heap overflow in mwifiex_process_country_ie()", - "cmt_id": "0aa8632c57930243bea6fa4ebcbff8fac089e664" + "CVE-2024-26700": { + "cmt_msg": "drm/amd/display: Fix MST Null Ptr for RV", + "cmt_id": "7407c61f43b66e90ad127d0cdd13cbc9d87141a5" }, - "CVE-2020-0305": { - "cmt_msg": "chardev: Avoid potential use-after-free in 'chrdev_open()'", - "cmt_id": "ec576895d61356a2cab096e1ca23bf7cc765e5b2" + "CVE-2024-26707": { + "cmt_msg": "net: hsr: remove WARN_ONCE() in send_hsr_supervision_frame()", + "cmt_id": "923dea2a7ea9e1ef5ac4031fba461c1cc92e32b8" }, - "CVE-2019-19066": { - "cmt_msg": "scsi: bfa: release allocated memory in case of error", - "cmt_id": "486f51201528126bec2c647fa9d4216fc4fda91b" + "CVE-2024-26706": { + "cmt_msg": "parisc: Fix random data corruption from exception handler", + "cmt_id": "fa69a8063f8b27f3c7434a0d4f464a76a62f24d2" }, - "CVE-2019-20636": { - "cmt_msg": "Input: add safety guards to input_set_keycode()", - "cmt_id": "f5b9bfbe94a042a2e3806efa4c6e1b6ddb4292c4" + "CVE-2024-0841": { + "cmt_msg": "fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super", + "cmt_id": "13c5a9fb07105557a1fa9efdb4f23d7ef30b7274" }, - "CVE-2019-19068": { - "cmt_msg": "rtl8xxxu: prevent leaking urb", - "cmt_id": "0e27512c5d0bc2c3d33c1e7f73a8983015c82b83" + "CVE-2024-26704": { + "cmt_msg": "ext4: fix double-free of blocks due to wrong extents moved_len", + "cmt_id": "2883940b19c38d5884c8626483811acf4d7e148f" }, - "CVE-2020-0431": { - "cmt_msg": "HID: hid-input: clear unmapped usages", - "cmt_id": "64c8b76e69acdecab62b035e72b12775d6d35a3b" + "CVE-2024-26602": { + "cmt_msg": "sched/membarrier: reduce the ability to hammer on sys_membarrier", + "cmt_id": "b6a2a9cbb67545c825ec95f06adb7ff300a2ad71" }, - "CVE-2019-14615": { - "cmt_msg": "drm/i915/gen9: Clear residual context state on context switch", - "cmt_id": "dd4f3b3508f65fe37975db223365216316da3998" + "CVE-2024-26603": { + "cmt_msg": "x86/fpu: Stop relying on userspace for info to fault in xsave buffer", + "cmt_id": "b2479ab426cef7ab79a13005650eff956223ced2" }, - "CVE-2019-19056": { - "cmt_msg": "mwifiex: pcie: Fix memory leak in mwifiex_pcie_alloc_cmdrsp_buf", - "cmt_id": "f2bde0e9989e243345316e3c96b352ab94037340" + "CVE-2024-26583": { + "cmt_msg": "tls: fix race between async notify and socket close", + "cmt_id": "86dc27ee36f558fe223dbdfbfcb6856247356f4a" }, - "CVE-2019-19078": { - "cmt_msg": "ath10k: fix memory leak", - "cmt_id": "aed1b68eadf22513ac1fbd389f591f91c8bdaaf5" - } - }, - "4.19.97": { - "CVE-2019-9445": { - "cmt_msg": "f2fs: check if file namelen exceeds max value", - "cmt_id": "4124927e36b7753efb6faf1a508e2bc6783343cf" + "CVE-2024-26582": { + "cmt_msg": "net: tls: fix use-after-free with partial reads and async decrypt", + "cmt_id": "d684763534b969cca1022e2a28645c7cc91f7fa5" }, - "CVE-2019-20096": { - "cmt_msg": "dccp: Fix memleak in __feat_register_sp", - "cmt_id": "e58c590c772eb5dc5a3603c5aef4148f47ab2e20" + "CVE-2024-26585": { + "cmt_msg": "tls: fix race between tx work scheduling and socket close", + "cmt_id": "6db22d6c7a6dc914b12c0469b94eb639b6a8a146" }, - "CVE-2019-15217": { - "cmt_msg": "media: usb:zr364xx:Fix KASAN:null-ptr-deref Read in zr364xx_vidioc_querycap", - "cmt_id": "0648766cb7d336e5932278c316aef6aac35d60ab" + "CVE-2024-26584": { + "cmt_msg": "net: tls: handle backlogging of crypto requests", + "cmt_id": "13eca403876bbea3716e82cdfe6f1e6febb38754" }, - "CVE-2019-19059": { - "cmt_msg": "iwlwifi: pcie: fix memory leaks in iwl_pcie_ctxt_info_gen3_init", - "cmt_id": "6e41dd9731e13b0bdf2f57f84b9d25d009bd9f87" + "CVE-2024-26604": { + "cmt_msg": "Revert \"kobject: Remove redundant checks for whether ktype is NULL\"", + "cmt_id": "7f414d306320f837cc3df96cf52161cb8290fb1b" }, - "CVE-2019-19058": { - "cmt_msg": "iwlwifi: dbg_ini: fix memory leak in alloc_sgtable", - "cmt_id": "09044a4a142404799e519def0bbfcc98fa68c677" + "CVE-2024-26726": { + "cmt_msg": "btrfs: don't drop extent_map for free space inode on write error", + "cmt_id": "7bddf18f474f166c19f91b2baf67bf7c5eda03f7" }, - "CVE-2019-19927": { - "cmt_msg": "drm/ttm: fix incrementing the page pointer for huge pages", - "cmt_id": "8c2cdfb2c81bb533b9e6a3874ee5399102c4c580" + "CVE-2023-52429": { + "cmt_msg": "dm: limit the number of targets and parameter size area", + "cmt_id": "438d19492b7f002334573bae43276297eb234c80" }, - "CVE-2019-19077": { - "cmt_msg": "RDMA: Fix goto target to release the allocated memory", - "cmt_id": "d203ff6a3059b7fc3a9b48048eaf5641ed7fda2c" + "CVE-2024-26705": { + "cmt_msg": "parisc: BTLB: Fix crash when setting up BTLB at CPU bringup", + "cmt_id": "54944f45470af5965fb9c28cf962ec30f38a8f5b" }, - "CVE-2019-5108": { - "cmt_msg": "mac80211: Do not send Layer 2 Update frame before authorization", - "cmt_id": "8f483142b0bb278f67eabccbe3d6a0e8c45284ad" - } - }, - "4.19.98": { - "CVE-2020-12652": { - "cmt_msg": "scsi: mptfusion: Fix double fetch bug in ioctl", - "cmt_id": "3dae5041c65545ac65d610375b4ac30b00f174a3" + "CVE-2024-26698": { + "cmt_msg": "hv_netvsc: Fix race condition between netvsc_probe and netvsc_remove", + "cmt_id": "22a77c0f5b8233237731df3288d067af51a2fd7b" }, - "CVE-2021-3635": { - "cmt_msg": "netfilter: nf_tables: fix flowtable list del corruption", - "cmt_id": "8260ce5aeee4d7c4a6305e469edeae1066de2800" - } - }, - "4.19.99": { - "CVE-2019-19046": { - "cmt_msg": "ipmi: Fix memory leak in __ipmi_bmc_register", - "cmt_id": "211eabc55d07fc3709e967b08b6f5bb77198dbd0" + "CVE-2024-26691": { + "cmt_msg": "KVM: arm64: Fix circular locking dependency", + "cmt_id": "3d16cebf01127f459dcfeb79ed77bd68b124c228" }, - "CVE-2019-20806": { - "cmt_msg": "media: tw5864: Fix possible NULL pointer dereference in tw5864_handle_frame", - "cmt_id": "30fd5b16c9081afebe74d4d614fe582ff84ef6b2" - } - }, - "4.19.100": { - "CVE-2019-14896": { - "cmt_msg": "libertas: Fix two buffer overflows at parsing bss descriptor", - "cmt_id": "cbd56515be5a8ea97134ef762b7a2923b94cb9c4" + "CVE-2024-26690": { + "cmt_msg": "net: stmmac: protect updates of 64-bit statistics counters", + "cmt_id": "9680b2ab54ba8d72581100e8c45471306101836e" }, - "CVE-2019-14897": { - "cmt_msg": "libertas: Fix two buffer overflows at parsing bss descriptor", - "cmt_id": "cbd56515be5a8ea97134ef762b7a2923b94cb9c4" + "CVE-2024-26693": { + "cmt_msg": "wifi: iwlwifi: mvm: fix a crash when we run out of stations", + "cmt_id": "00f4eb31b8193f6070ce24df636883f9c104ca95" }, - "CVE-2020-14416": { - "cmt_msg": "can, slip: Protect tty->disc_data in write_wakeup and close with RCU", - "cmt_id": "bd1448458c6a67782d4e82c181b5540b5727546b" + "CVE-2024-26692": { + "cmt_msg": "smb: Fix regression in writes when non-standard maximum write size negotiated", + "cmt_id": "4145ccff546ea868428b3e0fe6818c6261b574a9" }, - "CVE-2020-8428": { - "cmt_msg": "do_last(): fetch directory ->i_mode and ->i_uid before it's too late", - "cmt_id": "752f72edea55f9b7c6fd019e71365def13a0f2b6" - } - }, - "4.19.101": { - "CVE-2020-0432": { - "cmt_msg": "staging: most: net: fix buffer overflow", - "cmt_id": "9dab6bbc9462c43001a88ee933a491a1502fa6f5" + "CVE-2024-26695": { + "cmt_msg": "crypto: ccp - Fix null pointer dereference in __sev_platform_shutdown_locked", + "cmt_id": "88aa493f393d2ee38ac140e1f6ac1881346e85d4" }, - "CVE-2020-12769": { - "cmt_msg": "spi: spi-dw: Add lock protect dw_spi rx/tx to prevent concurrent calls", - "cmt_id": "6fb12237c51e73e65899f9b1df69cd3999b4d90a" - } - }, - "4.19.103": { - "CVE-2020-0404": { - "cmt_msg": "media: uvcvideo: Avoid cyclic entity chains due to malformed USB descriptors", - "cmt_id": "3ceb3fcd6d1a6a65e7bf3873a63009d01ba4b05f" + "CVE-2024-26694": { + "cmt_msg": "wifi: iwlwifi: fix double-free bug", + "cmt_id": "ab9d4bb9a1892439b3123fc52b19e32b9cdf80ad" }, - "CVE-2019-3016": { - "cmt_msg": "x86/kvm: Be careful not to clear KVM_VCPU_FLUSH_TLB bit", - "cmt_id": "25a7898937f4a9f32ca2d1e9b7f5f07176af8037" - } - }, - "4.19.104": { - "CVE-2020-12653": { - "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_cmd_append_vsie_tlv()", - "cmt_id": "48247f7e14911a4d18e9c774ba3a1d368f5d8a6f" + "CVE-2024-26697": { + "cmt_msg": "nilfs2: fix data corruption in dsync block recovery for small block sizes", + "cmt_id": "2e1480538ef60bfee5473dfe02b1ecbaf1a4aa0d" }, - "CVE-2020-12654": { - "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_ret_wmm_get_status()", - "cmt_id": "fab5ca79960b7fbda4e9a79a4754c749fdea2bd0" - } - }, - "4.19.107": { - "CVE-2020-9383": { - "cmt_msg": "floppy: check FDC index for errors before assigning it", - "cmt_id": "c8fd87c53a1509162b910cec91c0c46753c58f9a" + "CVE-2024-26696": { + "cmt_msg": "nilfs2: fix hang in nilfs_lookup_dirty_data_buffers()", + "cmt_id": "ea5ddbc11613b55e5128c85f57b08f907abd9b28" }, - "CVE-2020-2732": { - "cmt_msg": "KVM: nVMX: Don't emulate instructions in guest mode", - "cmt_id": "ed9e97c35b454ceb1da4f65c318015a7ab298dae" + "CVE-2024-23850": { + "cmt_msg": "btrfs: do not ASSERT() if the newly created subvolume already got read", + "cmt_id": "833775656d447c545133a744a0ed1e189ce61430" }, - "CVE-2020-36558": { - "cmt_msg": "vt: vt_ioctl: fix race in VT_RESIZEX", - "cmt_id": "ec9645f1a77eab98951944273754307e192e69ae" + "CVE-2024-23851": { + "cmt_msg": "dm: limit the number of targets and parameter size area", + "cmt_id": "438d19492b7f002334573bae43276297eb234c80" }, - "CVE-2020-0009": { - "cmt_msg": "staging: android: ashmem: Disallow ashmem memory from being remapped", - "cmt_id": "a4307700608e43dcf9b8abf1ee74f68227e9c61a" - } - }, - "4.19.108": { - "CVE-2020-27068": { - "cmt_msg": "cfg80211: add missing policy for NL80211_ATTR_STATUS_CODE", - "cmt_id": "0fb31bd53a5e27394916758173eb748c5e0dbd47" + "CVE-2024-26714": { + "cmt_msg": "interconnect: qcom: sc8180x: Mark CO0 BCM keepalive", + "cmt_id": "d8e36ff40cf9dadb135f3a97341c02c9a7afcc43" }, - "CVE-2020-0444": { - "cmt_msg": "audit: fix error handling in audit_data_to_entry()", - "cmt_id": "c24d457a824f641ca328a20dd28872cfd97a005a" + "CVE-2024-26715": { + "cmt_msg": "usb: dwc3: gadget: Fix NULL pointer dereference in dwc3_gadget_suspend", + "cmt_id": "c7ebd8149ee519d27232e6e4940e9c02071b568b" }, - "CVE-2019-16234": { - "cmt_msg": "iwlwifi: pcie: fix rb_allocator workqueue allocation", - "cmt_id": "1d8780188c8d7f009a05d40fbb8a111eab89746d" + "CVE-2024-26716": { + "cmt_msg": "usb: core: Prevent null pointer dereference in update_port_device_state", + "cmt_id": "ed85777c640cf9e6920bb1b60ed8cd48e1f4d873" }, - "CVE-2020-10942": { - "cmt_msg": "vhost: Check docket sk_family instead of call getname", - "cmt_id": "ad598a48fe61c6c2407f08a807cb7a2ea83386b3" - } - }, - "4.19.109": { - "CVE-2020-8649": { - "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region", - "cmt_id": "7abe1e0a874418b07524c9e07225df1cbb421ce9" + "CVE-2024-26717": { + "cmt_msg": "HID: i2c-hid-of: fix NULL-deref on failed power up", + "cmt_id": "4cad91344a62536a2949873bad6365fbb6232776" }, - "CVE-2020-8647": { - "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region", - "cmt_id": "7abe1e0a874418b07524c9e07225df1cbb421ce9" + "CVE-2024-26711": { + "cmt_msg": "iio: adc: ad4130: zero-initialize clock init data", + "cmt_id": "0e0dab37750926d4fb0144edb1c1ea0612fea273" }, - "CVE-2020-27418": { - "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region", - "cmt_id": "7abe1e0a874418b07524c9e07225df1cbb421ce9" + "CVE-2024-26712": { + "cmt_msg": "powerpc/kasan: Fix addr error caused by page alignment", + "cmt_id": "0516c06b19dc64807c10e01bb99b552bdf2d7dbe" }, - "CVE-2020-8648": { - "cmt_msg": "vt: selection, close sel_buffer race", - "cmt_id": "31559b59040fc0e6ad363642112d4eb03ad4ebb7" - } - }, - "4.19.111": { - "CVE-2020-12465": { - "cmt_msg": "mt76: fix array overflow on receiving too many fragments for a packet", - "cmt_id": "319478cbd2be90995b011ca6adbd834121eb7acf" - } - }, - "4.19.112": { - "CVE-2020-29370": { - "cmt_msg": "mm: slub: add missing TID bump in kmem_cache_alloc_bulk()", - "cmt_id": "30f6cae722654caef2ab4bacb2e910bfd766866b" - } - }, - "4.19.113": { - "CVE-2020-14381": { - "cmt_msg": "futex: Fix inode life-time issue", - "cmt_id": "e6d506cd2243aa8f6e19fdb4dc61d85275c2c918" + "CVE-2024-26713": { + "cmt_msg": "powerpc/pseries/iommu: Fix iommu initialisation during DLPAR add", + "cmt_id": "0040386b0b7187bd9c9665ac8b6dad93420bce79" } }, - "4.19.114": { - "CVE-2020-36557": { - "cmt_msg": "vt: vt_ioctl: fix VT_DISALLOCATE freeing in-use virtual console", - "cmt_id": "54584f79579b9f6ed49b93cadcd2361223ecce28" + "6.6.19": { + "CVE-2024-26733": { + "cmt_msg": "arp: Prevent overflow in arp_req_get().", + "cmt_id": "a3f2c083cb575d80a7627baf3339e78fedccbb91" }, - "CVE-2020-11668": { - "cmt_msg": "media: xirlink_cit: add missing descriptor sanity checks", - "cmt_id": "5d064d7f0327d9425c5f63fa96efc70a74032d8b" + "CVE-2024-26730": { + "cmt_msg": "hwmon: (nct6775) Fix access to temperature configuration registers", + "cmt_id": "f006c45a3ea424f8f6c8e4b9283bc245ce2a4d0f" }, - "CVE-2021-3715": { - "cmt_msg": "net_sched: cls_route: remove the right filter from hashtable", - "cmt_id": "ea3d6652c240978736a91b9e85fde9fee9359be4" + "CVE-2024-26731": { + "cmt_msg": "bpf, sockmap: Fix NULL pointer dereference in sk_psock_verdict_data_ready()", + "cmt_id": "9b099ed46dcaf1403c531ff02c3d7400fa37fa26" }, - "CVE-2020-27066": { - "cmt_msg": "xfrm: policy: Fix doulbe free in xfrm_policy_timer", - "cmt_id": "7ad217a824f7fab1e8534a6dfa82899ae1900bcb" + "CVE-2024-26736": { + "cmt_msg": "afs: Increase buffer size in afs_update_volume_status()", + "cmt_id": "6e6065dd25b661420fac19c34282b6c626fcd35e" }, - "CVE-2020-11608": { - "cmt_msg": "media: ov519: add missing endpoint sanity checks", - "cmt_id": "747a7431661ab3c22ad1e721558bdf9e3d53d4a6" + "CVE-2024-26737": { + "cmt_msg": "bpf: Fix racing between bpf_timer_cancel_and_free and bpf_timer_cancel", + "cmt_id": "8327ed12e8ebc5436bfaa1786c49988894f9c8a6" }, - "CVE-2020-11609": { - "cmt_msg": "media: stv06xx: add missing descriptor sanity checks", - "cmt_id": "70764334b2bcb15c67dfbd912d9a9f7076f6d0df" - } - }, - "4.19.115": { - "CVE-2020-11494": { - "cmt_msg": "slcan: Don't transmit uninitialized stack data in padding", - "cmt_id": "b774578329afb238ccd504477731129aa15e9ec2" + "CVE-2024-26734": { + "cmt_msg": "devlink: fix possible use-after-free and memory leaks in devlink_init()", + "cmt_id": "919092bd5482b7070ae66d1daef73b600738f3a2" }, - "CVE-2020-11565": { - "cmt_msg": "mm: mempolicy: require at least one nodeid for MPOL_PREFERRED", - "cmt_id": "fa138035f104ae14651ee3217d81fc16cd3aba4d" - } - }, - "4.19.116": { - "CVE-2020-12826": { - "cmt_msg": "signal: Extend exec_id to 64bits", - "cmt_id": "a2a1be2de7e4d9a3a2c6cf8512d38eb24bbeb059" + "CVE-2024-26735": { + "cmt_msg": "ipv6: sr: fix possible use-after-free and null-ptr-deref", + "cmt_id": "9e02973dbc6a91e40aa4f5d87b8c47446fbfce44" }, - "CVE-2020-12657": { - "cmt_msg": "block, bfq: fix use-after-free in bfq_idle_slice_timer_body", - "cmt_id": "d999063be0cf91bff8e0d6daaea21e1a4f70d336" + "CVE-2024-26776": { + "cmt_msg": "spi: hisi-sfc-v3xx: Return IRQ_NONE if no interrupts were detected", + "cmt_id": "d637b5118274701e8448f35953877daf04df18b4" }, - "CVE-2020-11669": { - "cmt_msg": "powerpc/powernv/idle: Restore AMR/UAMOR/AMOR after idle", - "cmt_id": "1855c5436fa50e8dc930b0a24c52157dceef9a54" - } - }, - "4.19.118": { - "CVE-2020-12659": { - "cmt_msg": "xsk: Add missing check on user supplied headroom size", - "cmt_id": "ad8fb61c184fe0f8d1e0b5b954d010fb9f94a6ee" - } - }, - "4.19.119": { - "CVE-2020-11884": { - "cmt_msg": "s390/mm: fix page table upgrade vs 2ndary address mode accesses", - "cmt_id": "215d1f3928713d6eaec67244bcda72105b898000" + "CVE-2024-26751": { + "cmt_msg": "ARM: ep93xx: Add terminator to gpiod_lookup_table", + "cmt_id": "97ba7c1f9c0a2401e644760d857b2386aa895997" }, - "CVE-2020-1749": { - "cmt_msg": "net: ipv6_stub: use ip6_dst_lookup_flow instead of ip6_dst_lookup", - "cmt_id": "5dd6835278454a7c7a045462253625de7c16b13e" + "CVE-2024-26738": { + "cmt_msg": "powerpc/pseries/iommu: DLPAR add doesn't completely initialize pci_controller", + "cmt_id": "b8315b2e25b4e68e42fcb74630f824b9a5067765" }, - "CVE-2020-12464": { - "cmt_msg": "USB: core: Fix free-while-in-use bug in the USB S-Glibrary", - "cmt_id": "45ea77b75a604da875186519fea94997175c38e3" + "CVE-2024-26739": { + "cmt_msg": "net/sched: act_mirred: don't override retval if we already lost the skb", + "cmt_id": "28cdbbd38a4413b8eff53399b3f872fd4e80db9d" }, - "CVE-2020-0067": { - "cmt_msg": "f2fs: fix to avoid memory leakage in f2fs_listxattr", - "cmt_id": "ed523cbd4a6594edf123dc03ec9d70ea4f793671" + "CVE-2024-26754": { + "cmt_msg": "gtp: fix use-after-free and null-ptr-deref in gtp_genl_dump_pdp()", + "cmt_id": "ba6b8b02a3314e62571a540efa96560888c5f03e" }, - "CVE-2019-19768": { - "cmt_msg": "blktrace: Protect q->blk_trace with RCU", - "cmt_id": "473d7f5ed75b8c3750f0c6b442c8e23090d6da8f" + "CVE-2024-26773": { + "cmt_msg": "ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found()", + "cmt_id": "0184747b552d6b5a14db3b7fcc3b792ce64dedd1" }, - "CVE-2020-12114": { - "cmt_msg": "make struct mountpoint bear the dentry reference to mountpoint, not struct mount", - "cmt_id": "f511dc75d22e0c000fc70b54f670c2c17f5fba9a" - } - }, - "4.19.121": { - "CVE-2020-10751": { - "cmt_msg": "selinux: properly handle multiple messages in selinux_netlink_send()", - "cmt_id": "23075857ad192731fd9edcce3b5cd5db93602c26" + "CVE-2024-26770": { + "cmt_msg": "HID: nvidia-shield: Add missing null pointer checks to LED initialization", + "cmt_id": "83527a13740f57b45f162e3af4c7db4b88521100" }, - "CVE-2020-0255": { - "cmt_msg": "selinux: properly handle multiple messages in selinux_netlink_send()", - "cmt_id": "23075857ad192731fd9edcce3b5cd5db93602c26" - } - }, - "4.19.124": { - "CVE-2020-13143": { - "cmt_msg": "USB: gadget: fix illegal array access in binding with UDC", - "cmt_id": "a105bb549252e3e8bd9db0bdd81cdd6a853e4238" + "CVE-2024-26771": { + "cmt_msg": "dmaengine: ti: edma: Add some null pointer checks to the edma_probe", + "cmt_id": "7b24760f3a3c7ae1a176d343136b6c25174b7b27" }, - "CVE-2020-10711": { - "cmt_msg": "netlabel: cope with NULL catmap", - "cmt_id": "caf6c20c6421ca687751d27b96c8021c655e56e6" + "CVE-2024-26769": { + "cmt_msg": "nvmet-fc: avoid deadlock on delete association path", + "cmt_id": "eaf0971fdabf2a93c1429dc6bedf3bbe85dffa30" }, - "CVE-2020-12770": { - "cmt_msg": "scsi: sg: add sg_remove_request in sg_write", - "cmt_id": "34fcb4291e234468f9bf9d4b851c9f522f3bbb13" + "CVE-2024-26768": { + "cmt_msg": "LoongArch: Change acpi_core_pic[NR_CPUS] to acpi_core_pic[MAX_CORE_PIC]", + "cmt_id": "88e189bd16e5889e44a41b3309558ebab78b9280" }, - "CVE-2020-27786": { - "cmt_msg": "ALSA: rawmidi: Fix racy buffer resize under concurrent accesses", - "cmt_id": "a507658fdb2ad8ca282b0eb42f2a40b805deb1e6" - } - }, - "4.19.125": { - "CVE-2020-12768": { - "cmt_msg": "KVM: SVM: Fix potential memory leak in svm_cpu_init()", - "cmt_id": "008708152ebb229c29e065135599984fa9c4a51c" + "CVE-2024-26778": { + "cmt_msg": "fbdev: savage: Error out if pixclock equals zero", + "cmt_id": "bc3c2e58d73b28b9a8789fca84778ee165a72d13" }, - "CVE-2019-18814": { - "cmt_msg": "apparmor: Fix use-after-free in aa_audit_rule_init", - "cmt_id": "f1738ae012a106c6c8fa7d33ed47fb478d9d3c75" - } - }, - "4.19.126": { - "CVE-2020-10732": { - "cmt_msg": "fs/binfmt_elf.c: allocate initialized memory in fill_thread_core_info()", - "cmt_id": "d16b0abe2687f7f0a2f6343a09797e8aac045c86" - } - }, - "4.19.127": { - "CVE-2020-10757": { - "cmt_msg": "mm: Fix mremap not considering huge pmd devmap", - "cmt_id": "78385480fd6572a83e7541e37658d9a7de6dc9b1" + "CVE-2024-26779": { + "cmt_msg": "wifi: mac80211: fix race condition on enabling fast-xmit", + "cmt_id": "54b79d8786964e2f840e8a2ec4a9f9a50f3d4954" }, - "CVE-2019-19462": { - "cmt_msg": "kernel/relay.c: handle alloc_percpu returning NULL in relay_open", - "cmt_id": "8b5dfa53eeb6c8bba5a035d38f6f8b981aebb622" - } - }, - "4.19.128": { - "CVE-2020-13974": { - "cmt_msg": "vt: keyboard: avoid signed integer overflow in k_ascii", - "cmt_id": "18059925dbb6a7b6be1c0166ecca29d6b7977c9a" + "CVE-2024-26687": { + "cmt_msg": "xen/events: close evtchn after mapping cleanup", + "cmt_id": "20980195ec8d2e41653800c45c8c367fa1b1f2b4" }, - "CVE-2020-0543": { - "cmt_msg": "x86/cpu: Add 'table' argument to cpu_matches()", - "cmt_id": "6682fe2fca22e45153e69f5b7ce7282bcba3565f" - } - }, - "4.19.129": { - "CVE-2019-20810": { - "cmt_msg": "media: go7007: fix a miss of snd_card_free", - "cmt_id": "95b58c96a28e6174661dcd5bc543618973fc43d3" + "CVE-2024-26777": { + "cmt_msg": "fbdev: sis: Error out if pixclock equals zero", + "cmt_id": "99f1abc34a6dde248d2219d64aa493c76bbdd9eb" }, - "CVE-2018-20669": { - "cmt_msg": "make 'user_access_begin()' do 'access_ok()'", - "cmt_id": "216284c4a126b28469eb0bf4994c669e251f47ba" + "CVE-2024-26752": { + "cmt_msg": "l2tp: pass correct message length to ip6_append_data", + "cmt_id": "804bd8650a3a2bf3432375f8c97d5049d845ce56" }, - "CVE-2021-0342": { - "cmt_msg": "tun: correct header offsets in napi frags mode", - "cmt_id": "75e36c19ff10836e5d03f87cf17793cf83b59430" + "CVE-2024-26753": { + "cmt_msg": "crypto: virtio/akcipher - Fix stack overflow on memcpy", + "cmt_id": "b0365460e945e1117b47cf7329d86de752daff63" }, - "CVE-2020-29368": { - "cmt_msg": "mm: thp: make the THP mapcount atomic against __split_huge_pmd_locked()", - "cmt_id": "453d8a481b127edfa7fb76af1bc7586b7a63bdd2" + "CVE-2024-26747": { + "cmt_msg": "usb: roles: fix NULL pointer issue when put module's reference", + "cmt_id": "4b45829440b1b208948b39cc71f77a37a2536734" }, - "CVE-2020-10766": { - "cmt_msg": "x86/speculation: Prevent rogue cross-process SSBD shutdown", - "cmt_id": "5aaf72a0dcb82d5c98f3b7df149baf4c7cf63e19" + "CVE-2024-26774": { + "cmt_msg": "ext4: avoid dividing by 0 in mb_update_avg_fragment_size() when block bitmap corrupt", + "cmt_id": "f32d2a745b02123258026e105a008f474f896d6a" }, - "CVE-2020-10767": { - "cmt_msg": "x86/speculation: Avoid force-disabling IBPB based on STIBP and enhanced IBRS.", - "cmt_id": "5d9d55cf4733c5ced8e1d19ea242a128ab9612d2" + "CVE-2024-26744": { + "cmt_msg": "RDMA/srpt: Support specifying the srpt_service_guid parameter", + "cmt_id": "fe2a73d57319feab4b3b175945671ce43492172f" }, - "CVE-2019-18885": { - "cmt_msg": "btrfs: merge btrfs_find_device and find_device", - "cmt_id": "8cb9b069fa631b613bbbd6f63887190e55cafa3c" + "CVE-2024-26743": { + "cmt_msg": "RDMA/qedr: Fix qedr_create_user_qp error flow", + "cmt_id": "95175dda017cd4982cd47960536fa1de003d3298" }, - "CVE-2019-19036": { - "cmt_msg": "btrfs: Detect unbalanced tree with empty leaf before crashing btree operations", - "cmt_id": "227af79e6cb0ee3faeb8c70be4bc0aec0b09ea25" + "CVE-2024-26742": { + "cmt_msg": "scsi: smartpqi: Fix disable_managed_interrupts", + "cmt_id": "4f5b15c15e6016efb3e14582d02cc4ddf57227df" }, - "CVE-2020-10768": { - "cmt_msg": "x86/speculation: PR_SPEC_FORCE_DISABLE enforcement for indirect branches.", - "cmt_id": "52c419ba4c96880abd61b38e6e08e4ecd17350f3" - } - }, - "4.19.130": { - "CVE-2020-12771": { - "cmt_msg": "bcache: fix potential deadlock problem in btree_gc_coalesce", - "cmt_id": "2ee8f6e72269eb06649ebab3da6bbf59aed3eabe" + "CVE-2024-26741": { + "cmt_msg": "dccp/tcp: Unhash sk from ehash for tb2 alloc failure after check_estalblished().", + "cmt_id": "334a8348b2df26526f3298848ad6864285592caf" }, - "CVE-2020-15436": { - "cmt_msg": "block: Fix use-after-free in blkdev_get()", - "cmt_id": "49289b1fa5a67011c4010e4e9c801b9d565ce395" - } - }, - "4.19.131": { - "CVE-2020-12655": { - "cmt_msg": "xfs: add agf freeblocks verify in xfs_agf_verify", - "cmt_id": "135eccd83909e75389a5754577b0336bbd0939ef" - } - }, - "4.19.132": { - "CVE-2020-24394": { - "cmt_msg": "nfsd: apply umask on fs without ACL support", - "cmt_id": "2b3faab744b04de198aee4ed8dd74fca7a2a8306" + "CVE-2024-26740": { + "cmt_msg": "net/sched: act_mirred: use the backlog for mirred ingress", + "cmt_id": "7c787888d164689da8b1b115f3ef562c1e843af4" }, - "CVE-2020-15393": { - "cmt_msg": "usb: usbtest: fix missing kfree(dev->buf) in usbtest_disconnect", - "cmt_id": "7b0f1f89a0dd6e257367eddc840179e85195ca18" - } - }, - "4.19.134": { - "CVE-2020-14356": { - "cmt_msg": "cgroup: fix cgroup_sk_alloc() for sk_clone_lock()", - "cmt_id": "0505cc4c908f46a4d22c4994dbbe7bc489d0c52d" + "CVE-2024-26765": { + "cmt_msg": "LoongArch: Disable IRQ before init_fn() for nonboot CPUs", + "cmt_id": "dffdf7c783ef291eef38a5a0037584fd1a7fa464" }, - "CVE-2020-10781": { - "cmt_msg": "Revert \"zram: convert remaining CLASS_ATTR() to CLASS_ATTR_RO()\"", - "cmt_id": "81a91bf266dd7f2dd56fc3472b7bb54348ac62c7" - } - }, - "4.19.135": { - "CVE-2020-15437": { - "cmt_msg": "serial: 8250: fix null-ptr-deref in serial8250_start_tx()", - "cmt_id": "c358255ff1dfa51ddbcbc8dfcc4eaa5719008daa" - } - }, - "4.19.137": { - "CVE-2019-19061": { - "cmt_msg": "iio: imu: adis16400: fix memory leak", - "cmt_id": "c57c213538156bff971aa352d9d7749196dfbfd8" + "CVE-2024-26764": { + "cmt_msg": "fs/aio: Restrict kiocb_set_cancel_fn() to I/O submitted via libaio", + "cmt_id": "e7e23fc5d5fe422827c9a43ecb579448f73876c7" }, - "CVE-2019-19067": { - "cmt_msg": "drm/amdgpu: fix multiple memory leaks in acp_hw_init", - "cmt_id": "e15f8a9b0046418295d09db24c1ec306c80d013b" + "CVE-2024-26767": { + "cmt_msg": "drm/amd/display: fixed integer types and null check locations", + "cmt_id": "71783d1ff65204d69207fd156d4b2eb1d3882375" }, - "CVE-2020-24490": { - "cmt_msg": "Bluetooth: fix kernel oops in store_pending_adv_report", - "cmt_id": "5df9e5613d1c51e16b1501a4c75e139fbbe0fb6c" + "CVE-2024-26766": { + "cmt_msg": "IB/hfi1: Fix sdma.h tx->num_descs off-by-one error", + "cmt_id": "a2fef1d81becf4ff60e1a249477464eae3c3bc2a" }, - "CVE-2019-19816": { - "cmt_msg": "btrfs: inode: Verify inode mode to avoid NULL pointer dereference", - "cmt_id": "4e986ab36ed11ecf21de9b5aab0e46ac3342df93" + "CVE-2024-26761": { + "cmt_msg": "cxl/pci: Fix disabling memory if DVSEC CXL Range does not match a CFMWS window", + "cmt_id": "2cc1a530ab31c65b52daf3cb5d0883c8b614ea69" }, - "CVE-2019-3874": { - "cmt_msg": "sctp: implement memory accounting on tx path", - "cmt_id": "9a84bb13816fe3b361a75e10ee9821ab68aa36f5" + "CVE-2024-26760": { + "cmt_msg": "scsi: target: pscsi: Fix bio_put() for error case", + "cmt_id": "4ebc079f0c7dcda1270843ab0f38ab4edb8f7921" }, - "CVE-2019-19082": { - "cmt_msg": "drm/amd/display: prevent memory leak", - "cmt_id": "60e1b411bf0fd9fda2d2de7f45dc3b1d9960b85e" + "CVE-2024-26749": { + "cmt_msg": "usb: cdns3: fixed memory use after free at cdns3_gadget_ep_disable()", + "cmt_id": "29e42e1578a10c611b3f1a38f3229b2d664b5d16" }, - "CVE-2019-18808": { - "cmt_msg": "crypto: ccp - Release all allocated memory if sha type is invalid", - "cmt_id": "167edeeb034f65f57790ff70b1af84a501274d15" + "CVE-2024-26748": { + "cmt_msg": "usb: cdns3: fix memory double free when handle zero packet", + "cmt_id": "70e8038813f9d3e72df966748ebbc40efe466019" }, - "CVE-2019-19813": { - "cmt_msg": "btrfs: inode: Verify inode mode to avoid NULL pointer dereference", - "cmt_id": "4e986ab36ed11ecf21de9b5aab0e46ac3342df93" + "CVE-2024-26763": { + "cmt_msg": "dm-crypt: don't modify the data when using authenticated encryption", + "cmt_id": "64ba01a365980755732972523600a961c4266b75" + }, + "CVE-2024-26759": { + "cmt_msg": "mm/swap: fix race when skipping swapcache", + "cmt_id": "305152314df82b22cf9b181f3dc5fc411002079a" }, - "CVE-2019-19054": { - "cmt_msg": "media: rc: prevent memory leak in cx23888_ir_probe", - "cmt_id": "17271f33fd8811b364ae3c54671566434d46d3eb" + "CVE-2023-52640": { + "cmt_msg": "fs/ntfs3: Fix oob in ntfs_listxattr", + "cmt_id": "52fff5799e3d1b5803ecd2f5f19c13c65f4f7b23" }, - "CVE-2019-19074": { - "cmt_msg": "ath9k: release allocated buffer if timed out", - "cmt_id": "e0cf3ebfcf93dbce123b8bef00f549712efe1135" + "CVE-2023-52641": { + "cmt_msg": "fs/ntfs3: Add NULL ptr dereference checking at the end of attr_allocate_frame()", + "cmt_id": "947c3f3d31ea185ddc8e7f198873f17d36deb24c" }, - "CVE-2019-19073": { - "cmt_msg": "ath9k_htc: release allocated buffer if timed out", - "cmt_id": "5b8464dc9a6e81a16481549c77d0d341041e425e" + "CVE-2024-26775": { + "cmt_msg": "aoe: avoid potential deadlock at set_capacity", + "cmt_id": "673629018ba04906899dcb631beec34d871f709c" }, - "CVE-2019-19072": { - "cmt_msg": "tracing: Have error path in predicate_parse() free its allocated memory", - "cmt_id": "7deb2dcb8963812742ed08420cfa4e23bbeda074" - } - }, - "4.19.138": { - "CVE-2020-16166": { - "cmt_msg": "random32: update the net random state on interrupt and activity", - "cmt_id": "29204c846894d73108f87e78aea4757a8ec52c74" + "CVE-2024-26772": { + "cmt_msg": "ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal()", + "cmt_id": "d3bbe77a76bc52e9d4d0a120f1509be36e25c916" } }, - "4.19.139": { - "CVE-2019-0148": { - "cmt_msg": "i40e: Wrong truncation from u16 to u8", - "cmt_id": "48a9be93ff2c5a09e308ef93560ea1f4ecbd22f6" + "6.6.21": { + "CVE-2024-26782": { + "cmt_msg": "mptcp: fix double-free on socket dismantle", + "cmt_id": "ce0809ada38dca8d6d41bb57ab40494855c30582" }, - "CVE-2020-14331": { - "cmt_msg": "vgacon: Fix for missing check in scrollback handling", - "cmt_id": "61219546f3036d2b4a1898be7a38da22e97a3b62" + "CVE-2024-26787": { + "cmt_msg": "mmc: mmci: stm32: fix DMA API overlapping mappings warning", + "cmt_id": "176e66269f0de327375fc0ea51c12c2f5a97e4c4" }, - "CVE-2019-0146": { - "cmt_msg": "i40e: add num_vectors checker in iwarp handler", - "cmt_id": "43a7e1cf606e96ee43f8897129972f0b79390367" + "CVE-2024-26786": { + "cmt_msg": "iommufd: Fix iopt_access_list_id overwrite bug", + "cmt_id": "f1fb745ee0a6fe43f1d84ec369c7e6af2310fda9" }, - "CVE-2019-0147": { - "cmt_msg": "i40e: add num_vectors checker in iwarp handler", - "cmt_id": "43a7e1cf606e96ee43f8897129972f0b79390367" + "CVE-2024-26789": { + "cmt_msg": "crypto: arm64/neonbs - fix out-of-bounds access on short input", + "cmt_id": "1291d278b5574819a7266568ce4c28bce9438705" }, - "CVE-2019-0145": { - "cmt_msg": "i40e: add num_vectors checker in iwarp handler", - "cmt_id": "43a7e1cf606e96ee43f8897129972f0b79390367" + "CVE-2024-26788": { + "cmt_msg": "dmaengine: fsl-qdma: init irq after reg initialization", + "cmt_id": "a69c8bbb946936ac4eb6a6ae1e849435aa8d947d" }, - "CVE-2020-36386": { - "cmt_msg": "Bluetooth: Fix slab-out-of-bounds read in hci_extended_inquiry_result_evt()", - "cmt_id": "8c4a649c20fec015ebb326f36b47d4e39d9ff5b7" - } - }, - "4.19.140": { - "CVE-2020-26088": { - "cmt_msg": "net/nfc/rawsock.c: add CAP_NET_RAW check.", - "cmt_id": "b200620cada4eaa63108be32e040ed557a1965fd" + "CVE-2024-26622": { + "cmt_msg": "tomoyo: fix UAF write bug in tomoyo_write_control()", + "cmt_id": "2caa605079488da9601099fbda460cfc1702839f" }, - "CVE-2021-20292": { - "cmt_msg": "drm/ttm/nouveau: don't call tt destroy callback on alloc failure.", - "cmt_id": "10c8a526b2db1fcdf9e2d59d4885377b91939c55" - } - }, - "4.19.141": { - "CVE-2019-19448": { - "cmt_msg": "btrfs: only search for left_info if there is no right_info in try_merge_free_space", - "cmt_id": "627fa9d8071daad6aa84316c1fcb114a62db914f" + "CVE-2024-26746": { + "cmt_msg": "dmaengine: idxd: Ensure safe user copy of completion record", + "cmt_id": "5e3022ea42e490a36ec6f2cfa6fc603deb0bace4" }, - "CVE-2020-25212": { - "cmt_msg": "nfs: Fix getxattr kernel panic and memory overflow", - "cmt_id": "a906b868953a9c9bba44649a8fe760e818dd7224" - } - }, - "4.19.142": { - "CVE-2020-14314": { - "cmt_msg": "ext4: fix potential negative array index in do_split()", - "cmt_id": "b3ddf6ba5e28a57729fff1605ae08e21be5c92e3" + "CVE-2024-26745": { + "cmt_msg": "powerpc/pseries/iommu: IOMMU table is not initialized for kdump over SR-IOV", + "cmt_id": "d4d1e4b1513d975961de7bb4f75e450a92d65ebf" }, - "CVE-2020-29371": { - "cmt_msg": "romfs: fix uninitialized memory leak in romfs_dev_read()", - "cmt_id": "9660983738399465fd0e3b1977a61bbd29b2e5be" + "CVE-2024-26804": { + "cmt_msg": "net: ip_tunnel: prevent perpetual headroom growth", + "cmt_id": "a0a1db40b23e8ff86dea2786c5ea1470bb23ecb9" }, - "CVE-2020-0466": { - "cmt_msg": "do_epoll_ctl(): clean the failure exits up a bit", - "cmt_id": "dcb6e6efb3298e59d90ee05c6ed33de810314892" - } - }, - "4.19.143": { - "CVE-2020-36766": { - "cmt_msg": "cec-api: prevent leaking memory through hole in structure", - "cmt_id": "da489549711e61bd43f3fd6fe19bb538eb575b39" - } - }, - "4.19.144": { - "CVE-2020-0465": { - "cmt_msg": "HID: core: Sanitize event code and type when mapping input", - "cmt_id": "a47b8511d90528c77346597e2012100dfc28cd8c" + "CVE-2024-26805": { + "cmt_msg": "netlink: Fix kernel-infoleak-after-free in __skb_datagram_iter", + "cmt_id": "d3ada42e534a83b618bbc1e490d23bf0fdae4736" }, - "CVE-2020-25641": { - "cmt_msg": "block: allow for_each_bvec to support zero len bvec", - "cmt_id": "b48bcb664b657ae94b19c0728978c88e012f7a37" + "CVE-2024-26807": { + "cmt_msg": "spi: cadence-qspi: fix pointer reference in runtime PM hooks", + "cmt_id": "03f1573c9587029730ca68503f5062105b122f61" }, - "CVE-2021-1048": { - "cmt_msg": "fix regression in \"epoll: Keep a reference on files added to the check list\"", - "cmt_id": "37d933e8b41b83bb8278815e366aec5a542b7e31" + "CVE-2024-26801": { + "cmt_msg": "Bluetooth: Avoid potential use-after-free in hci_error_reset", + "cmt_id": "2ab9a19d896f5a0dd386e1f001c5309bc35f433b" }, - "CVE-2022-20565": { - "cmt_msg": "HID: core: Correctly handle ReportSize being zero", - "cmt_id": "abae259fdccc5e41ff302dd80a2b944ce385c970" + "CVE-2024-26802": { + "cmt_msg": "stmmac: Clear variable when destroying workqueue", + "cmt_id": "699b103e48ce32d03fc86c35b37ee8ae4288c7e3" }, - "CVE-2020-25285": { - "cmt_msg": "mm/hugetlb: fix a race between hugetlb sysctl handlers", - "cmt_id": "221ea9a3da9169dc3c9a364a5f938e215db6419e" + "CVE-2024-26803": { + "cmt_msg": "net: veth: clear GRO when clearing XDP even when down", + "cmt_id": "16edf51f33f52dff70ed455bc40a6cc443c04664" }, - "CVE-2020-14385": { - "cmt_msg": "xfs: fix boundary test in xfs_attr_shortform_verify", - "cmt_id": "017265f1421529a473c25dc46a0cee98facbb1a3" + "CVE-2024-26795": { + "cmt_msg": "riscv: Sparse-Memory/vmemmap out-of-bounds fix", + "cmt_id": "a278d5c60f21aa15d540abb2f2da6e6d795c3e6e" }, - "CVE-2020-12888": { - "cmt_msg": "vfio-pci: Invalidate mmaps and block MMIO access on disabled memory", - "cmt_id": "da7aea6eb5608695f590dcd72523536b709d0399" - } - }, - "4.19.146": { - "CVE-2020-25284": { - "cmt_msg": "rbd: require global CAP_SYS_ADMIN for mapping and unmapping", - "cmt_id": "0070f9906d7190d4c69e338403db4abfec81fe7f" + "CVE-2024-26796": { + "cmt_msg": "drivers: perf: ctr_get_width function for legacy is not defined", + "cmt_id": "e0d17ee872cf8d0f51cc561329b8e1a0aa792bbb" }, - "CVE-2020-14390": { - "cmt_msg": "fbcon: remove soft scrollback code", - "cmt_id": "770adb5d2b8ebe94a92e4c9510f4f2517f4204eb" + "CVE-2024-26790": { + "cmt_msg": "dmaengine: fsl-qdma: fix SoC may hang on 16 byte unaligned read", + "cmt_id": "5b696e9c388251f1c7373be92293769a489fd367" }, - "CVE-2020-28097": { - "cmt_msg": "vgacon: remove software scrollback support", - "cmt_id": "f5fa64c8daf7b97280865c73903edc0a3eea819e" - } - }, - "4.19.148": { - "CVE-2020-25645": { - "cmt_msg": "geneve: add transport ports in route lookup for geneve", - "cmt_id": "c797110d97c48054d1491251fd713900ff51615c" + "CVE-2024-26791": { + "cmt_msg": "btrfs: dev-replace: properly validate device names", + "cmt_id": "b1690ced4d2d8b28868811fb81cd33eee5aefee1" }, - "CVE-2021-0605": { - "cmt_msg": "af_key: pfkey_dump needs parameter validation", - "cmt_id": "b59a23d596807a5aa88d8dd5655a66c6843729b3" + "CVE-2024-26793": { + "cmt_msg": "gtp: fix use-after-free and null-ptr-deref in gtp_newlink()", + "cmt_id": "93dd420bc41531c9a31498b9538ca83ba6ec191e" }, - "CVE-2020-25643": { - "cmt_msg": "hdlc_ppp: add range checks in ppp_cp_parse_cr()", - "cmt_id": "45676c0bc28eff8f46455b28e2db80a77676488b" + "CVE-2024-26798": { + "cmt_msg": "fbcon: always restore the old font data in fbcon_do_set_font()", + "cmt_id": "73a6bd68a1342f3a44cac9dffad81ad6a003e520" }, - "CVE-2020-36312": { - "cmt_msg": "KVM: fix memory leak in kvm_io_bus_unregister_dev()", - "cmt_id": "19184bd06f488af62924ff1747614a8cb284ad63" + "CVE-2024-26799": { + "cmt_msg": "ASoC: qcom: Fix uninitialized pointer dmactl", + "cmt_id": "99adc8b4d2f38bf0d06483ec845bc48f60c3f8cf" + }, + "CVE-2024-26630": { + "cmt_msg": "mm: cachestat: fix folio read-after-free in cache walk", + "cmt_id": "ba60fdf75e89ea762bb617be578dc47f27655117" } }, - "4.19.150": { - "CVE-2020-14386": { - "cmt_msg": "net/packet: fix overflow in tpacket_rcv", - "cmt_id": "1c3886dc302329f199cc04f8a56ba44d17a0df16" + "6.6.22": { + "CVE-2024-26783": { + "cmt_msg": "mm/vmscan: fix a bug calling wakeup_kswapd() with a wrong zone index", + "cmt_id": "d6159bd4c00594249e305bfe02304c67c506264e" }, - "CVE-2020-25211": { - "cmt_msg": "netfilter: ctnetlink: add a range check for l3/l4 protonum", - "cmt_id": "289fe546ea16c2dcb57c5198c5a7b7387604530e" + "CVE-2023-28746": { + "cmt_msg": "x86/mmio: Disable KVM mitigation when X86_FEATURE_CLEAR_CPU_BUF is set", + "cmt_id": "c35ca0968de41952af2ad7d22881e4a7c6e1b145" }, - "CVE-2021-0448": { - "cmt_msg": "netfilter: ctnetlink: add a range check for l3/l4 protonum", - "cmt_id": "289fe546ea16c2dcb57c5198c5a7b7387604530e" + "CVE-2023-52639": { + "cmt_msg": "KVM: s390: vsie: fix race during shadow creation", + "cmt_id": "f5572c0323cf8b4f1f0618178648a25b8fb8a380" }, - "CVE-2021-39634": { - "cmt_msg": "epoll: do not insert into poll queues until all sanity checks are done", - "cmt_id": "3e3bbc4d23eeb90bf282e98c7dfeca7702df3169" - } - }, - "4.19.151": { - "CVE-2020-28915": { - "cmt_msg": "fbcon: Fix global-out-of-bounds read in fbcon_get_font()", - "cmt_id": "43198a5b1c42e3d8aadc6524a73bb3aa3666cd43" + "CVE-2024-26652": { + "cmt_msg": "net: pds_core: Fix possible double free in error handling path", + "cmt_id": "995f802abff209514ac2ee03b96224237646cec3" } }, - "4.19.152": { - "CVE-2020-10135": { - "cmt_msg": "Bluetooth: Consolidate encryption handling in hci_encrypt_cfm", - "cmt_id": "0c75831bc108ec23c663d969181a4dd7e4b651bb" + "6.6.23": { + "CVE-2024-26809": { + "cmt_msg": "netfilter: nft_set_pipapo: release elements in clone only from destroy path", + "cmt_id": "ff90050771412b91e928093ccd8736ae680063c2" }, - "CVE-2020-12352": { - "cmt_msg": "Bluetooth: A2MP: Fix not initializing all members", - "cmt_id": "128278f444ab3a0d38759c4935092d256edc77d0" + "CVE-2024-26651": { + "cmt_msg": "sr9800: Add check for usbnet_get_endpoints", + "cmt_id": "e39a3a14eafcf17f03c037290b78c8f483529028" }, - "CVE-2020-12351": { - "cmt_msg": "Bluetooth: L2CAP: Fix calling sk_filter on non-socket based channel", - "cmt_id": "360f80e34292dbe91c23e893f90cd357aff8b68a" - } - }, - "4.19.153": { - "CVE-2020-0423": { - "cmt_msg": "binder: fix UAF when releasing todo list", - "cmt_id": "35cc2facc2a5ff52b9aa03f2dc81dcb000d97da3" + "CVE-2023-7042": { + "cmt_msg": "wifi: ath10k: fix NULL pointer dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev()", + "cmt_id": "10a342fa2fe4c4dd22f2c8fe917d3b1929582076" }, - "CVE-2020-25705": { - "cmt_msg": "icmp: randomize the global rate limiter", - "cmt_id": "d6c552505c0d1719dda42b4af2def0618bd7bf54" - } - }, - "4.19.154": { - "CVE-2020-27784": { - "cmt_msg": "usb: gadget: function: printer: fix use-after-free in __lock_acquire", - "cmt_id": "cedb0187b8ba929c3f76f28e6bc25804d65f8a54" + "CVE-2024-22099": { + "cmt_msg": "Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security", + "cmt_id": "3ead59bafad05f2967ae2438c0528d53244cfde5" + }, + "CVE-2023-6270": { + "cmt_msg": "aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts", + "cmt_id": "eb48680b0255a9e8a9bdc93d6a55b11c31262e62" } }, - "4.19.155": { - "CVE-2020-27777": { - "cmt_msg": "powerpc/rtas: Restrict RTAS requests from userspace", - "cmt_id": "94e8f0bbc475228c93d28b2e0f7e37303db80ffe" + "6.6.24": { + "CVE-2024-24861": { + "cmt_msg": "media: xc4000: Fix atomicity violation in xc4000_get_frequency", + "cmt_id": "dc5e4f240473b64f7b2f24424e96c92435ebd8d7" }, - "CVE-2020-27673": { - "cmt_msg": "xen/events: add a proper barrier to 2-level uevent unmasking", - "cmt_id": "25f6b08895d579b461487291d6e48b3953a8bf65" + "CVE-2024-26656": { + "cmt_msg": "drm/amdgpu: fix use-after-free bug", + "cmt_id": "e87e08c94c9541b4e18c4c13f2f605935f512605" }, - "CVE-2020-25668": { - "cmt_msg": "tty: make FONTX ioctl use the tty pointer they were actually passed", - "cmt_id": "619e366268e0430687d07b24b48f7382fc088c9f" + "CVE-2024-26642": { + "cmt_msg": "netfilter: nf_tables: disallow anonymous set with timeout flag", + "cmt_id": "c0c2176d1814b92ea4c8e7eb7c9cd94cd99c1b12" }, - "CVE-2020-25656": { - "cmt_msg": "vt: keyboard, extend func_buf_lock to readers", - "cmt_id": "7e3ba72e5b9376e12839ea347c49fc4108244b0c" + "CVE-2024-26643": { + "cmt_msg": "netfilter: nf_tables: mark set as dead when unbinding anonymous set with timeout", + "cmt_id": "b2d6f9a5b1cf968f1eaa71085ceeb09c2cb276b1" }, - "CVE-2020-27675": { - "cmt_msg": "xen/events: avoid removing an event channel while handling it", - "cmt_id": "61d359d51a1cce8a5913843c8c3601dc878cc519" + "CVE-2023-47233": { + "cmt_msg": "wifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach", + "cmt_id": "190794848e2b9d15de92d502b6ac652806904f5a" + }, + "CVE-2024-26654": { + "cmt_msg": "ALSA: sh: aica: reorder cleanup operations to avoid UAF bugs", + "cmt_id": "61d4787692c1fccdc268ffa7a891f9c149f50901" + }, + "CVE-2024-23307": { + "cmt_msg": "md/raid5: fix atomicity violation in raid5_cache_count", + "cmt_id": "8ec4a68a25a231e2303716a0aba8ff1413d47c87" } }, - "4.19.156": { - "CVE-2020-28974": { - "cmt_msg": "vt: Disable KD_FONT_OP_COPY", - "cmt_id": "6612b754ac0c85ca8b1181b5d3ea4461a8c1bbcb" + "outstanding": { + "CVE-2020-26556": { + "cmt_msg": "" }, - "CVE-2020-35508": { - "cmt_msg": "fork: fix copy_process(CLONE_PARENT) race with the exiting ->real_parent", - "cmt_id": "b177d2d915cea2d0a590f0034a20299dd1ee3ef2" + "CVE-2020-26557": { + "cmt_msg": "" }, - "CVE-2020-25704": { - "cmt_msg": "perf/core: Fix a memory leak in perf_event_parse_addr_filter()", - "cmt_id": "29a975bcc107d68e379a55048813ddf3e7b120b8" + "CVE-2019-20794": { + "cmt_msg": "" }, - "CVE-2019-19377": { - "cmt_msg": "btrfs: Don't submit any btree write bio if the fs has errors", - "cmt_id": "1527c0e0229d2dd1c8ae1e73b1579bd8d5866b5b" + "CVE-2020-26559": { + "cmt_msg": "" }, - "CVE-2019-19770": { - "cmt_msg": "blktrace: fix debugfs use after free", - "cmt_id": "8a78b4c0d6292d32d76b4268b5a33ae089a5d791" + "CVE-2020-35501": { + "cmt_msg": "" }, - "CVE-2019-19039": { - "cmt_msg": "btrfs: Don't submit any btree write bio if the fs has errors", - "cmt_id": "1527c0e0229d2dd1c8ae1e73b1579bd8d5866b5b" - } - }, - "4.19.157": { - "CVE-2020-8694": { - "cmt_msg": "powercap: restrict energy meter to root access", - "cmt_id": "900281e167f45e0c0e5df6e59fa00334b5e38133" - } - }, - "4.19.158": { - "CVE-2020-14351": { - "cmt_msg": "perf/core: Fix race in the perf_mmap_close() function", - "cmt_id": "1cbfb60332f4e62224440f6d38a6b3114b2355f0" - } - }, - "4.19.159": { - "CVE-2020-4788": { - "cmt_msg": "powerpc/64s: flush L1D on kernel entry", - "cmt_id": "f69bb4e51f41973fb7594be1479fa689831efe1a" + "CVE-2023-4010": { + "cmt_msg": "" }, - "CVE-2020-25669": { - "cmt_msg": "Input: sunkbd - avoid use-after-free in teardown paths", - "cmt_id": "8bf2e8fe8a8e2e05246215697bb55f8901faef44" - } - }, - "4.19.160": { - "CVE-2020-28941": { - "cmt_msg": "speakup: Do not let the line discipline be used several times", - "cmt_id": "3560603ef82f11277143a433170bca05bd9288a8" - } - }, - "4.19.162": { - "CVE-2020-35519": { - "cmt_msg": "net/x25: prevent a couple of overflows", - "cmt_id": "304c080fc33258e3b177b6f0736b97d54e6fea3b" - } - }, - "4.19.163": { - "CVE-2020-29661": { - "cmt_msg": "tty: Fix ->pgrp locking in tiocspgrp()", - "cmt_id": "13f10a78097df2f14d4e1fd390dbaa3e28502ca7" + "CVE-2018-1121": { + "cmt_msg": "" }, - "CVE-2020-29660": { - "cmt_msg": "tty: Fix ->session locking", - "cmt_id": "361e822b7d8a9d06d88f7cea0fdb0fb6e41c4d45" + "CVE-2024-26672": { + "cmt_msg": "drm/amdgpu: Fix variable 'mca_funcs' dereferenced before NULL check in 'amdgpu_mca_smu_get_mca_entry()'" }, - "CVE-2020-27830": { - "cmt_msg": "speakup: Reject setting the speakup line discipline outside of speakup", - "cmt_id": "de867367f35237729e285ff6efa3fd4e4b0b9008" - } - }, - "4.19.164": { - "CVE-2020-36694": { - "cmt_msg": "netfilter: x_tables: Switch synchronization to RCU", - "cmt_id": "98ab3ff5e789985ec8c24f813c7a989b445da084" + "CVE-2019-19378": { + "cmt_msg": "" }, - "CVE-2021-0938": { - "cmt_msg": "compiler.h: fix barrier_data() on clang", - "cmt_id": "b207caff4176e3a6ba273243da2db2e595e4aad2" + "CVE-2024-26785": { + "cmt_msg": "iommufd: Fix protection fault in iommufd_test_syz_conv_iova" }, - "CVE-2020-27815": { - "cmt_msg": "jfs: Fix array index bounds check in dbAdjTree", - "cmt_id": "c7e31b2fecfe0ebd5bd6a8274b2fbfb9c9401738" + "CVE-2024-26784": { + "cmt_msg": "pmdomain: arm: Fix NULL dereference on scmi_perf_domain removal" }, - "CVE-2020-29568": { - "cmt_msg": "xen/xenbus: Allow watches discard events before queueing", - "cmt_id": "9039eb22f99545fa80a5897496452cf9962e3289" + "CVE-2024-22386": { + "cmt_msg": "" }, - "CVE-2020-29569": { - "cmt_msg": "xen-blkback: set ring->xenblkd to NULL after kthread_stop()", - "cmt_id": "014ee1c7d184acb8986152014a570ba7c69d3616" - } - }, - "4.19.166": { - "CVE-2020-36158": { - "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_cmd_802_11_ad_hoc_start", - "cmt_id": "b35029a1f24fe511af750537e6565dcf68e5c862" - } - }, - "4.19.167": { - "CVE-2020-28374": { - "cmt_msg": "scsi: target: Fix XCOPY NAA identifier lookup", - "cmt_id": "fff1180d24e68d697f98642d71444316036a81ff" + "CVE-2020-24503": { + "cmt_msg": "" }, - "CVE-2021-39648": { - "cmt_msg": "usb: gadget: configfs: Fix use-after-free issue with udc_name", - "cmt_id": "83b74059fdf1c4fa6ed261725e6f301552ad23f7" - } - }, - "4.19.170": { - "CVE-2021-3178": { - "cmt_msg": "nfsd4: readdirplus shouldn't return parent of export", - "cmt_id": "a08c2e586ad047fcea3f75664cca0915c77934fe" + "CVE-2020-24502": { + "cmt_msg": "" }, - "CVE-2023-1390": { - "cmt_msg": "tipc: fix NULL deref in tipc_link_xmit()", - "cmt_id": "4d1d3dddcb3f26000e66cd0a9b8b16f7c2eb41bb" - } - }, - "4.19.171": { - "CVE-2021-39657": { - "cmt_msg": "scsi: ufs: Correct the LUN used in eh_device_reset_handler() callback", - "cmt_id": "b397fcae2207963747c6f947ef4d06575553eaef" - } - }, - "4.19.172": { - "CVE-2020-27825": { - "cmt_msg": "tracing: Fix race in trace_open and buffer resize call", - "cmt_id": "acfa7ad7b7f6489e2bed20880ce090fdabdbb841" + "CVE-2023-6240": { + "cmt_msg": "" }, - "CVE-2021-3347": { - "cmt_msg": "futex: Ensure the correct return value from futex_lock_pi()", - "cmt_id": "72f38fffa4758b878f819f8a47761b3f03443f36" - } - }, - "4.19.173": { - "CVE-2021-3348": { - "cmt_msg": "nbd: freeze the queue while we're adding connections", - "cmt_id": "424838c0f727f1d11ce2ccaabba96f4346c03906" - } - }, - "4.19.177": { - "CVE-2021-26931": { - "cmt_msg": "xen-blkback: don't \"handle\" error by BUG()", - "cmt_id": "a01b49a9bf91a723f541139c063c1ff681ac536a" + "CVE-2020-11725": { + "cmt_msg": "" }, - "CVE-2021-26930": { - "cmt_msg": "xen-blkback: fix error handling in xen_blkbk_map()", - "cmt_id": "98f16e171e2849dba76e2e0346e914452c030dc5" + "CVE-2022-23825": { + "cmt_msg": "" }, - "CVE-2021-21781": { - "cmt_msg": "ARM: ensure the signal page contains defined contents", - "cmt_id": "80ef523d2cb719c3de66787e922a96b5099d2fbb" + "CVE-2023-3397": { + "cmt_msg": "" }, - "CVE-2021-26932": { - "cmt_msg": "Xen/x86: don't bail early from clear_foreign_p2m_mapping()", - "cmt_id": "dfed59ee4b41b0937163dfed36752d29e72d0712" - } - }, - "4.19.178": { - "CVE-2021-0512": { - "cmt_msg": "HID: make arrays usage and value to be the same", - "cmt_id": "ffca531f71d078c6caf752d64bc2a592f420f7c6" + "CVE-2023-1476": { + "cmt_msg": "" }, - "CVE-2021-3612": { - "cmt_msg": "Input: joydev - prevent potential read overflow in ioctl", - "cmt_id": "88438fdeeffe11dcb05c2dd0ddd22cb6e3f024b4" - } - }, - "4.19.179": { - "CVE-2021-30002": { - "cmt_msg": "media: v4l: ioctl: Fix memory leak in video_usercopy", - "cmt_id": "ff2111a6fab31923685b6ca8ea466ea0576b8a0e" + "CVE-2021-3864": { + "cmt_msg": "" }, - "CVE-2021-27365": { - "cmt_msg": "scsi: iscsi: Ensure sysfs attributes are limited to PAGE_SIZE", - "cmt_id": "b2957d7baff77b399c7408dc12bacc7f63765897" + "CVE-2022-3606": { + "cmt_msg": "" }, - "CVE-2021-27364": { - "cmt_msg": "scsi: iscsi: Restrict sessions and handles to admin capabilities", - "cmt_id": "ae84b246a76c4ace5997e5ca7e9fde3e1a526bc3" + "CVE-2019-19814": { + "cmt_msg": "" }, - "CVE-2021-27363": { - "cmt_msg": "scsi: iscsi: Restrict sessions and handles to admin capabilities", - "cmt_id": "ae84b246a76c4ace5997e5ca7e9fde3e1a526bc3" + "CVE-2022-2209": { + "cmt_msg": "" }, - "CVE-2021-28038": { - "cmt_msg": "Xen/gnttab: handle p2m update errors on a per-slot basis", - "cmt_id": "1a999d25ef536a14f6a7c25778836857adfba3f8" - } - }, - "4.19.181": { - "CVE-2021-33033": { - "cmt_msg": "cipso,calipso: resolve a number of problems with the DOI refcounts", - "cmt_id": "a44af1c69737f9e64d5134c34eb9d5c4c2e04da1" + "CVE-2023-52624": { + "cmt_msg": "drm/amd/display: Wake DMCUB before executing GPINT commands" }, - "CVE-2021-29265": { - "cmt_msg": "usbip: fix stub_dev usbip_sockfd_store() races leading to gpf", - "cmt_id": "c6b0ca71d3cd561decd39c1c4132c2d10a496e1a" + "CVE-2023-52625": { + "cmt_msg": "drm/amd/display: Refactor DMCUB enter/exit idle interface" }, - "CVE-2021-28660": { - "cmt_msg": "staging: rtl8188eu: prevent ->ssid overflow in rtw_wx_set_scan()", - "cmt_id": "eda4378094de16090d74eacea3d8c10f7719ed25" - } - }, - "4.19.183": { - "CVE-2021-28964": { - "cmt_msg": "btrfs: fix race when cloning extent buffer during rewind of an old root", - "cmt_id": "12dc6889bcff1bc2921a1587afca55ca4091b73e" + "CVE-2021-26934": { + "cmt_msg": "" }, - "CVE-2021-28972": { - "cmt_msg": "PCI: rpadlpar: Fix potential drc_name corruption in store functions", - "cmt_id": "f27a00f0d5b0646a52633e98f5fc3ef719004dcd" + "CVE-2016-8660": { + "cmt_msg": "" }, - "CVE-2021-28971": { - "cmt_msg": "perf/x86/intel: Fix a crash caused by zero PEBS status", - "cmt_id": "b35214c541365c7dd7c9d5f44a02b0633a1cc83f" - } - }, - "4.19.184": { - "CVE-2021-28688": { - "cmt_msg": "xen-blkback: don't leak persistent grants from xen_blkbk_map()", - "cmt_id": "16356ddb587867c2a5ab85407eeb75f2b8818207" + "CVE-2024-26758": { + "cmt_msg": "md: Don't ignore suspended array in md_check_recovery()" }, - "CVE-2021-31916": { - "cmt_msg": "dm ioctl: fix out of bounds array access when no devices", - "cmt_id": "76aa61c55279fdaa8d428236ba8834edf313b372" + "CVE-2020-15802": { + "cmt_msg": "" }, - "CVE-2021-29264": { - "cmt_msg": "gianfar: fix jumbo packets+napi+rx overrun crash", - "cmt_id": "9943741c2792a7f1d091aad38f496ed6eb7681c4" + "CVE-2008-2544": { + "cmt_msg": "" }, - "CVE-2021-29647": { - "cmt_msg": "net: qrtr: fix a kernel-infoleak in qrtr_recvmsg()", - "cmt_id": "5f09be2a1a35cb8bd6c178d5f205b7265bd68646" + "CVE-2024-26756": { + "cmt_msg": "md: Don't register sync_thread for reshape directly" }, - "CVE-2021-29650": { - "cmt_msg": "netfilter: x_tables: Use correct memory barriers.", - "cmt_id": "81bc258370c6eeb1f41d350325e8a2c8e20fafad" - } - }, - "4.19.185": { - "CVE-2021-0941": { - "cmt_msg": "bpf: Remove MTU check in __bpf_skb_max_len", - "cmt_id": "8c1a77ae15ce70a72f26f4bb83c50f769011220c" + "CVE-2024-26757": { + "cmt_msg": "md: Don't ignore read-only array in md_check_recovery()" }, - "CVE-2021-3483": { - "cmt_msg": "firewire: nosy: Fix a use-after-free bug in nosy_ioctl()", - "cmt_id": "89a2c28a3b67c7d918218f57e4bb7b591f7e5d0f" - } - }, - "4.19.186": { - "CVE-2021-29154": { - "cmt_msg": "bpf, x86: Validate computation of branch displacements for x86-64", - "cmt_id": "5f26f1f838aa960045c712e13dbab8ff451fed74" - } - }, - "4.19.187": { - "CVE-2021-3659": { - "cmt_msg": "net: mac802154: Fix general protection fault", - "cmt_id": "c166c0f5311dc9de687b8985574a5ee5166d367e" + "CVE-2019-15239": { + "cmt_msg": "unknown" }, - "CVE-2020-25672": { - "cmt_msg": "nfc: fix memory leak in llcp_sock_connect()", - "cmt_id": "301a4264d6ab56d2b9230066b060d7ceaa000d68" + "CVE-2023-52634": { + "cmt_msg": "drm/amd/display: Fix disable_otg_wa logic" }, - "CVE-2020-25673": { - "cmt_msg": "nfc: Avoid endless loops caused by repeated llcp_sock_connect()", - "cmt_id": "eab391e0766ed88262160b14bb7131f331f6af1a" + "CVE-2007-3719": { + "cmt_msg": "" }, - "CVE-2020-25670": { - "cmt_msg": "nfc: fix refcount leak in llcp_sock_bind()", - "cmt_id": "adbb1d218c5f56dbae052765da83c0f57fce2a31" + "CVE-2023-20941": { + "cmt_msg": "" }, - "CVE-2020-25671": { - "cmt_msg": "nfc: fix refcount leak in llcp_sock_connect()", - "cmt_id": "c14b50185cd0d5ba6d7a5eb8acf9fbcc3663416d" - } - }, - "4.19.188": { - "CVE-2021-0937": { - "cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write", - "cmt_id": "12ec80252edefff00809d473a47e5f89c7485499" + "CVE-2024-26686": { + "cmt_msg": "fs/proc: do_task_stat: use sig->stats_lock to gather the threads/children stats" }, - "CVE-2021-22555": { - "cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write", - "cmt_id": "12ec80252edefff00809d473a47e5f89c7485499" - } - }, - "4.19.189": { - "CVE-2020-29374": { - "cmt_msg": "gup: document and work around \"COW can break either way\" issue", - "cmt_id": "5e24029791e809d641e9ea46a1f99806484e53fc" + "CVE-2023-21400": { + "cmt_msg": "" }, - "CVE-2021-23133": { - "cmt_msg": "net/sctp: fix race condition in sctp_destroy_sock", - "cmt_id": "301084de76eb5bfedddda41ec33e2913e90c99e7" - } - }, - "4.19.191": { - "CVE-2021-4157": { - "cmt_msg": "pNFS/flexfiles: fix incorrect size check in decode_nfs_fh()", - "cmt_id": "f27638a92f77d8107efbaf48a0d3bfa24da8cdad" + "CVE-2023-2640": { + "cmt_msg": "" }, - "CVE-2021-33034": { - "cmt_msg": "Bluetooth: verify AMP hci_chan before amp_destroy", - "cmt_id": "75e26178e26f910f7f26c79c2824b726eecf0dfb" + "CVE-2010-4563": { + "cmt_msg": "" }, - "CVE-2021-32399": { - "cmt_msg": "bluetooth: eliminate the potential race condition when removing the HCI controller", - "cmt_id": "35113c4c9fa7c970ff456982e381dc9e9594154a" + "CVE-2020-26140": { + "cmt_msg": "" }, - "CVE-2021-3506": { - "cmt_msg": "f2fs: fix to avoid out-of-bounds memory access", - "cmt_id": "bfa08a47cea2a9fab077c7135b9cfdf04e69c67a" - } - }, - "4.19.192": { - "CVE-2020-26558": { - "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical", - "cmt_id": "30126d4ba73119565f1748b116b9869ac6bbda6b" + "CVE-2020-26143": { + "cmt_msg": "" }, - "CVE-2021-0129": { - "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical", - "cmt_id": "30126d4ba73119565f1748b116b9869ac6bbda6b" + "CVE-2020-26142": { + "cmt_msg": "" }, - "CVE-2020-26555": { - "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical", - "cmt_id": "30126d4ba73119565f1748b116b9869ac6bbda6b" - } - }, - "4.19.193": { - "CVE-2021-33098": { - "cmt_msg": "ixgbe: fix large MTU request from VF", - "cmt_id": "938ffd6d2dd78fb83b9346c9b689e2a3a6fe7174" + "CVE-2024-23848": { + "cmt_msg": "" }, - "CVE-2020-24587": { - "cmt_msg": "mac80211: prevent mixed key and fragment cache attacks", - "cmt_id": "76ffc27967211afba6f0045ac840e7027fbeefcf" + "CVE-2022-3533": { + "cmt_msg": "" }, - "CVE-2020-24586": { - "cmt_msg": "mac80211: prevent mixed key and fragment cache attacks", - "cmt_id": "76ffc27967211afba6f0045ac840e7027fbeefcf" + "CVE-2022-1247": { + "cmt_msg": "" }, - "CVE-2021-34981": { - "cmt_msg": "Bluetooth: cmtp: fix file refcount when cmtp_attach_device fails", - "cmt_id": "f8be26b9950710fe50fb45358df5bd01ad18efb7" + "CVE-2020-10708": { + "cmt_msg": "" }, - "CVE-2020-24588": { - "cmt_msg": "cfg80211: mitigate A-MSDU aggregation attacks", - "cmt_id": "8ea9e997642360ea097710cfa7b1cd750a73fe64" + "CVE-2022-4543": { + "cmt_msg": "" }, - "CVE-2020-26139": { - "cmt_msg": "mac80211: do not accept/forward invalid EAPOL frames", - "cmt_id": "24347f561816634ab780bf7e03deeb049898b3bc" + "CVE-2017-13693": { + "cmt_msg": "" }, - "CVE-2020-26147": { - "cmt_msg": "mac80211: assure all fragments are encrypted", - "cmt_id": "3c919823e4cad7bdc2c92b0dd3b4dc463c9315bd" - } - }, - "4.19.194": { - "CVE-2021-3564": { - "cmt_msg": "Bluetooth: fix the erroneous flush_work() order", - "cmt_id": "64700748e8a7af4883538c72ada57999d9a78e92" + "CVE-2021-0399": { + "cmt_msg": "" }, - "CVE-2021-38208": { - "cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect", - "cmt_id": "93e4ac2a9979a9a4ecc158409ed9c3044dc0ae1f" + "CVE-2017-13694": { + "cmt_msg": "" }, - "CVE-2021-3573": { - "cmt_msg": "Bluetooth: use correct lock to prevent UAF of hdev object", - "cmt_id": "2b9e9c2ed0f1910b5201c5d37b355b60201df415" + "CVE-2023-52485": { + "cmt_msg": "drm/amd/display: Wake DMCUB before sending a command" }, - "CVE-2021-3587": { - "cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect", - "cmt_id": "93e4ac2a9979a9a4ecc158409ed9c3044dc0ae1f" - } - }, - "4.19.196": { - "CVE-2021-34693": { - "cmt_msg": "can: bcm: fix infoleak in struct bcm_msg_head", - "cmt_id": "8899857d7e450805e6410de5004126491f197146" + "CVE-2024-0564": { + "cmt_msg": "" }, - "CVE-2021-45486": { - "cmt_msg": "inet: use bigger hash table for IP ID generation", - "cmt_id": "7f7e23df8509e072593200400a4b094cc44376d2" + "CVE-2012-4542": { + "cmt_msg": "" }, - "CVE-2021-35039": { - "cmt_msg": "module: limit enabling module.sig_enforce", - "cmt_id": "ff660863628fb144badcb3395cde7821c82c13a6" + "CVE-2013-7445": { + "cmt_msg": "" }, - "CVE-2021-3743": { - "cmt_msg": "net: qrtr: fix OOB Read in qrtr_endpoint_post", - "cmt_id": "f8111c0d7ed42ede41a3d0d393b104de0730a8a6" - } - }, - "4.19.197": { - "CVE-2020-36311": { - "cmt_msg": "KVM: SVM: Periodically schedule when unregistering regions on destroy", - "cmt_id": "cadf5bbcefbd9717e51c61d6128b520583ffdf4f" - } - }, - "4.19.198": { - "CVE-2021-45485": { - "cmt_msg": "ipv6: use prandom_u32() for ID generation", - "cmt_id": "f0be58ec9931907e980cf21737e51d369808eb95" + "CVE-2024-24859": { + "cmt_msg": "" }, - "CVE-2023-28772": { - "cmt_msg": "seq_buf: Fix overflow in seq_buf_putmem_hex()", - "cmt_id": "1f4c6061fccee64b2072b28dfa3e93cf859c4c0a" + "CVE-2024-24858": { + "cmt_msg": "" }, - "CVE-2021-3655": { - "cmt_msg": "sctp: validate from_addr_param return", - "cmt_id": "c7a03ebace4f9cd40d9cd9dd5fb2af558025583c" + "CVE-2005-3660": { + "cmt_msg": "" }, - "CVE-2021-38199": { - "cmt_msg": "NFSv4: Initialise connection to the server in nfs4_alloc_client()", - "cmt_id": "743f6b973c8ba8a0a5ed15ab11e1d07fa00d5368" + "CVE-2024-24857": { + "cmt_msg": "" }, - "CVE-2021-3609": { - "cmt_msg": "can: bcm: delay release of struct bcm_op after synchronize_rcu()", - "cmt_id": "eabe65197876e4a0906eab784f5766c4c76098c7" + "CVE-2023-6238": { + "cmt_msg": "" }, - "CVE-2022-0850": { - "cmt_msg": "ext4: fix kernel infoleak via ext4_extent_header", - "cmt_id": "9ed3a3d3a8d2cbe99d9e4386a98856491f0eade0" + "CVE-2023-31082": { + "cmt_msg": "" }, - "CVE-2021-33909": { - "cmt_msg": "seq_file: disallow extremely large seq buffer allocations", - "cmt_id": "6de9f0bf7cacc772a618699f9ed5c9f6fca58a1d" + "CVE-2023-31081": { + "cmt_msg": "" }, - "CVE-2021-38160": { - "cmt_msg": "virtio_console: Assure used length from device is limited", - "cmt_id": "b5fba782ccd3d12a14f884cd20f255fc9c0eec0c" - } - }, - "4.19.199": { - "CVE-2021-38204": { - "cmt_msg": "usb: max-3421: Prevent corruption of freed memory", - "cmt_id": "51fc12f4d37622fa0c481604833f98f11b1cac4f" + "CVE-2022-38096": { + "cmt_msg": "" }, - "CVE-2021-3679": { - "cmt_msg": "tracing: Fix bug in rb_per_cpu_empty() that might cause deadloop.", - "cmt_id": "6a99bfee7f5625d2577a5c3b09a2bd2a845feb8a" + "CVE-2022-3544": { + "cmt_msg": "" }, - "CVE-2021-37576": { - "cmt_msg": "KVM: PPC: Book3S: Fix H_RTAS rets buffer overflow", - "cmt_id": "0493b10c06021796ba80cbe53c961defd5aca6e5" + "CVE-2024-26596": { + "cmt_msg": "net: dsa: fix netdev_priv() dereference before check on non-DSA netdevice events" }, - "CVE-2021-22543": { - "cmt_msg": "KVM: do not allow mapping valid but non-reference-counted pages", - "cmt_id": "117777467bc015f0dc5fc079eeba0fa80c965149" - } - }, - "4.19.200": { - "CVE-2021-0920": { - "cmt_msg": "af_unix: fix garbage collect vs MSG_PEEK", - "cmt_id": "1dabafa9f61118b1377fde424d9a94bf8dbf2813" - } - }, - "4.19.204": { - "CVE-2021-38198": { - "cmt_msg": "KVM: X86: MMU: Use the correct inherited permissions to get shadow page", - "cmt_id": "4c07e70141eebd3db64297515a427deea4822957" + "CVE-2024-26658": { + "cmt_msg": "bcachefs: grab s_umount only if snapshotting" }, - "CVE-2021-38205": { - "cmt_msg": "net: xilinx_emaclite: Do not print real IOMEM pointer", - "cmt_id": "9322401477a6d1f9de8f18e5d6eb43a68e0b113a" + "CVE-2022-3238": { + "cmt_msg": "" }, - "CVE-2021-3732": { - "cmt_msg": "ovl: prevent private clone if bind mount is not allowed", - "cmt_id": "963d85d630dabe75a3cfde44a006fec3304d07b8" + "CVE-2008-4609": { + "cmt_msg": "" }, - "CVE-2021-33624": { - "cmt_msg": "bpf: Inherit expanded/patched seen count from old aux data", - "cmt_id": "0abc8c9754c953f5cd0ac7488c668ca8d53ffc90" - } - }, - "4.19.205": { - "CVE-2021-42008": { - "cmt_msg": "net: 6pack: fix slab-out-of-bounds in decode_data", - "cmt_id": "4e370cc081a78ee23528311ca58fd98a06768ec7" + "CVE-2020-14304": { + "cmt_msg": "" }, - "CVE-2021-3653": { - "cmt_msg": "KVM: nSVM: avoid picking up unsupported bits from L2 in int_ctl (CVE-2021-3653)", - "cmt_id": "42f4312c0e8a225b5f1e3ed029509ef514f2157a" + "CVE-2020-0347": { + "cmt_msg": "" }, - "CVE-2021-3656": { - "cmt_msg": "KVM: nSVM: always intercept VMLOAD/VMSAVE when nested (CVE-2021-3656)", - "cmt_id": "119d547cbf7c055ba8100309ad71910478092f24" + "CVE-2024-26655": { + "cmt_msg": "Fix memory leak in posix_clock_open()" }, - "CVE-2020-3702": { - "cmt_msg": "ath: Use safer key clearing with key cache entries", - "cmt_id": "dd5815f023b89c9a28325d8a2a5f0779b57b7190" - } - }, - "4.19.206": { - "CVE-2021-3444": { - "cmt_msg": "bpf: Fix truncation handling for mod32 dst reg wrt zero", - "cmt_id": "39f74b7c81cca139c05757d9c8f9d1e35fbbf56b" + "CVE-2021-3714": { + "cmt_msg": "" }, - "CVE-2021-3600": { - "cmt_msg": "bpf: Fix 32 bit src register truncation on div/mod", - "cmt_id": "8313432df224d926590731ec3ace3e1bd7bc4a1a" + "CVE-2019-12456": { + "cmt_msg": "" }, - "CVE-2021-3753": { - "cmt_msg": "vt_kdsetmode: extend console locking", - "cmt_id": "0776c1a20babb4ad0b7ce7f2f4e0806a97663187" + "CVE-2020-26560": { + "cmt_msg": "" }, - "CVE-2021-39633": { - "cmt_msg": "ip_gre: add validation for csum_start", - "cmt_id": "c33471daf2763c5aee2b7926202c74b75c365119" - } - }, - "4.19.207": { - "CVE-2022-20141": { - "cmt_msg": "igmp: Add ip_mc_list lock in ip_check_mc_rcu", - "cmt_id": "4768973dffed4d0126854514335ed4fe87bec1ab" + "CVE-2021-3892": { + "cmt_msg": "" }, - "CVE-2021-34556": { - "cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4", - "cmt_id": "91cdb5b36234e6af69d6280f1510e4453707a2b8" + "CVE-2024-26699": { + "cmt_msg": "drm/amd/display: Fix array-index-out-of-bounds in dcn35_clkmgr" }, - "CVE-2020-16119": { - "cmt_msg": "dccp: don't duplicate ccid when cloning dccp sock", - "cmt_id": "dfec82f3e5b8bd93ab65b7417a64886ec8c42f14" + "CVE-2024-24864": { + "cmt_msg": "" }, - "CVE-2021-35477": { - "cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4", - "cmt_id": "91cdb5b36234e6af69d6280f1510e4453707a2b8" + "CVE-2023-37454": { + "cmt_msg": "" }, - "CVE-2021-42252": { - "cmt_msg": "soc: aspeed: lpc-ctrl: Fix boundary check for mmap", - "cmt_id": "9c8891b638319ddba9cfa330247922cd960c95b0" + "CVE-2023-52590": { + "cmt_msg": "ocfs2: Avoid touching renamed directory if parent does not change" }, - "CVE-2021-40490": { - "cmt_msg": "ext4: fix race writing to an inline_data file while its xattrs are changing", - "cmt_id": "c481607ba522e31e6ed01efefc19cc1d0e0a46fa" - } - }, - "4.19.208": { - "CVE-2021-20320": { - "cmt_msg": "s390/bpf: Fix optimizing out zero-extensions", - "cmt_id": "ddf58efd05b5d16d86ea4638675e8bd397320930" - } - }, - "4.19.209": { - "CVE-2021-3764": { - "cmt_msg": "crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd()", - "cmt_id": "710be7c42d2f724869e5b18b21998ceddaffc4a9" + "CVE-2022-3642": { + "cmt_msg": "" }, - "CVE-2021-4203": { - "cmt_msg": "af_unix: fix races in sk_peer_pid and sk_peer_cred accesses", - "cmt_id": "0512a9aede6e4417c4fa6e0042a7ca8bc7e06b86" + "CVE-2011-4917": { + "cmt_msg": "" }, - "CVE-2021-3744": { - "cmt_msg": "crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd()", - "cmt_id": "710be7c42d2f724869e5b18b21998ceddaffc4a9" + "CVE-2019-15902": { + "cmt_msg": "unknown" }, - "CVE-2021-37159": { - "cmt_msg": "usb: hso: fix error handling code of hso_create_net_device", - "cmt_id": "f6cf22a1ef49f8e131f99c3f5fd80ab6b23a2d21" - } - }, - "4.19.210": { - "CVE-2021-20317": { - "cmt_msg": "lib/timerqueue: Rely on rbtree semantics for next timer", - "cmt_id": "b9a1ac8e7c03fd09992352c7fb1a61cbbb9ad52b" - } - }, - "4.19.211": { - "CVE-2021-20321": { - "cmt_msg": "ovl: fix missing negative dentry check in ovl_rename()", - "cmt_id": "9d4969d8b5073d02059bae3f1b8d9a20cf023c55" + "CVE-2024-25739": { + "cmt_msg": "" }, - "CVE-2021-41864": { - "cmt_msg": "bpf: Fix integer overflow in prealloc_elems_and_freelist()", - "cmt_id": "078cdd572408176a3900a6eb5a403db0da22f8e0" + "CVE-2019-15290": { + "cmt_msg": "" }, - "CVE-2021-38300": { - "cmt_msg": "bpf, mips: Validate conditional branch offsets", - "cmt_id": "79f3a086dfc34887f9bbb0801768608b9470e942" - } - }, - "4.19.213": { - "CVE-2021-3894": { - "cmt_msg": "sctp: account stream padding length for reconf chunk", - "cmt_id": "c57fdeff69b152185fafabd37e6bfecfce51efda" + "CVE-2023-6535": { + "cmt_msg": "" }, - "CVE-2022-0322": { - "cmt_msg": "sctp: account stream padding length for reconf chunk", - "cmt_id": "c57fdeff69b152185fafabd37e6bfecfce51efda" - } - }, - "4.19.214": { - "CVE-2021-3896": { - "cmt_msg": "isdn: cpai: check ctr->cnr to avoid array index out of bound", - "cmt_id": "7d91adc0ccb060ce564103315189466eb822cc6a" + "CVE-2018-17977": { + "cmt_msg": "" }, - "CVE-2022-0644": { - "cmt_msg": "vfs: check fd has read access in kernel_read_file_from_fd()", - "cmt_id": "c1ba20965b59c2eeb54a845ca5cab4fc7bcf9735" + "CVE-2022-26878": { + "cmt_msg": "" }, - "CVE-2021-3760": { - "cmt_msg": "nfc: nci: fix the UAF of rf_conn_info object", - "cmt_id": "1ac0d736c8ae9b59ab44e4e80ad73c8fba5c6132" + "CVE-2022-41848": { + "cmt_msg": "" }, - "CVE-2021-43389": { - "cmt_msg": "isdn: cpai: check ctr->cnr to avoid array index out of bound", - "cmt_id": "7d91adc0ccb060ce564103315189466eb822cc6a" - } - }, - "4.19.215": { - "CVE-2021-20322": { - "cmt_msg": "ipv6: make exception cache less predictible", - "cmt_id": "c6d0d68d6da68159948cad3d808d61bb291a0283" + "CVE-2022-1116": { + "cmt_msg": "" }, - "CVE-2021-3772": { - "cmt_msg": "sctp: use init_tag from inithdr for ABORT chunk", - "cmt_id": "1f52dfacca7bb315d89f5ece5660b0337809798e" - } - }, - "4.19.216": { - "CVE-2021-42739": { - "cmt_msg": "media: firewire: firedtv-avc: fix a buffer overflow in avc_ca_pmt()", - "cmt_id": "53ec9dab4eb0a8140fc85760fb50effb526fe219" - } - }, - "4.19.218": { - "CVE-2021-4202": { - "cmt_msg": "NFC: reorganize the functions in nci_request", - "cmt_id": "62be2b1e7914b7340281f09412a7bbb62e6c8b67" + "CVE-2010-5321": { + "cmt_msg": "" }, - "CVE-2021-39686": { - "cmt_msg": "binder: use euid from cred instead of using task", - "cmt_id": "5d40061285b81a7e213dc9b37acc4a0545eedf32" + "CVE-2024-2193": { + "cmt_msg": "" }, - "CVE-2023-0047": { - "cmt_msg": "mm, oom: do not trigger out_of_memory from the #PF", - "cmt_id": "d508b70eaa8d6d994c289b757c0ca0355d4dbe29" + "CVE-2018-12930": { + "cmt_msg": "" }, - "CVE-2021-3640": { - "cmt_msg": "Bluetooth: sco: Fix lock_sock() blockage by memcpy_from_msg()", - "cmt_id": "c1c913f797f3d2441310182ad75b7bd855a327ff" + "CVE-2018-12931": { + "cmt_msg": "" }, - "CVE-2021-45868": { - "cmt_msg": "quota: check block number when reading the block in quota file", - "cmt_id": "e5222c87dc441dcc8a66e93cb3fd34dfff03d3ec" + "CVE-2023-52585": { + "cmt_msg": "drm/amdgpu: Fix possible NULL dereference in amdgpu_ras_query_error_status_helper()" }, - "CVE-2021-3752": { - "cmt_msg": "Bluetooth: fix use-after-free error in lock_sock_nested()", - "cmt_id": "72bb30165337b7bce77578ad151fbfab6c8e693c" - } - }, - "4.19.219": { - "CVE-2021-4002": { - "cmt_msg": "hugetlbfs: flush TLBs correctly after huge_pmd_unshare", - "cmt_id": "b0313bc7f5fbb6beee327af39d818ffdc921821a" - } - }, - "4.19.220": { - "CVE-2021-43975": { - "cmt_msg": "atlantic: Fix OOB read and write in hw_atl_utils_fw_rpc_wait", - "cmt_id": "0275fcd9b54f0364f66f2f3f6a0f3748648f3d35" + "CVE-2023-52586": { + "cmt_msg": "drm/msm/dpu: Add mutex lock in control vblank irq" }, - "CVE-2021-4083": { - "cmt_msg": "fget: check that the fd still exists after getting a ref to it", - "cmt_id": "8bf31f9d9395b71af3ed33166a057cd3ec0c59da" - } - }, - "4.19.221": { - "CVE-2021-39713": { - "cmt_msg": "net: sched: use Qdisc rcu API instead of relying on rtnl lock", - "cmt_id": "ae214e04b95ff64a4b0e9aab6742520bfde6ff0c" + "CVE-2021-39801": { + "cmt_msg": "" }, - "CVE-2021-39698": { - "cmt_msg": "wait: add wake_up_pollfree()", - "cmt_id": "8dd7c46a59756bdc29cb9783338b899cd3fb4b83" + "CVE-2021-39800": { + "cmt_msg": "" }, - "CVE-2022-20132": { - "cmt_msg": "HID: add hid_is_usb() function to make it simpler for USB detection", - "cmt_id": "b1efa723b986a84f84a95b6907cffe3a357338c9" + "CVE-2022-45885": { + "cmt_msg": "" }, - "CVE-2021-39685": { - "cmt_msg": "USB: gadget: detect too-big endpoint 0 requests", - "cmt_id": "13e45e7a262dd96e8161823314679543048709b9" - } - }, - "4.19.222": { - "CVE-2021-28715": { - "cmt_msg": "xen/netback: don't queue unlimited number of packages", - "cmt_id": "c9f17e92917fd5786be872626a3928979ecc4c39" + "CVE-2022-45884": { + "cmt_msg": "" }, - "CVE-2021-28714": { - "cmt_msg": "xen/netback: fix rx queue stall detection", - "cmt_id": "1de7644eac41981817fb66b74e0f82ca4477dc9d" + "CVE-2024-25740": { + "cmt_msg": "" }, - "CVE-2021-28713": { - "cmt_msg": "xen/console: harden hvc_xen against event channel storms", - "cmt_id": "57e46acb3b48ea4e8efb1e1bea2e89e0c6cc43e2" + "CVE-2024-25741": { + "cmt_msg": "" }, - "CVE-2021-28712": { - "cmt_msg": "xen/netfront: harden netfront against event channel storms", - "cmt_id": "3559ca594f15fcd23ed10c0056d40d71e5dab8e5" + "CVE-2024-21803": { + "cmt_msg": "" }, - "CVE-2021-28711": { - "cmt_msg": "xen/blkfront: harden blkfront against event channel storms", - "cmt_id": "269d7124bcfad2558d2329d0fe603ca20b20d3f4" + "CVE-2021-3542": { + "cmt_msg": "" }, - "CVE-2021-4135": { - "cmt_msg": "netdevsim: Zero-initialize memory for new map's value in function nsim_bpf_map_alloc", - "cmt_id": "d861443c4dc88650eed113310d933bd593d37b23" - } - }, - "4.19.223": { - "CVE-2021-45469": { - "cmt_msg": "f2fs: fix to do sanity check on last xattr entry in __f2fs_setxattr()", - "cmt_id": "f9dfa44be0fb5e8426183a70f69a246cf5827f49" + "CVE-2018-12929": { + "cmt_msg": "" }, - "CVE-2022-1195": { - "cmt_msg": "hamradio: improve the incomplete fix to avoid NPD", - "cmt_id": "b68f41c6320b2b7fbb54a95f07a69f3dc7e56c59" - } - }, - "4.19.224": { - "CVE-2021-44733": { - "cmt_msg": "tee: handle lookup of shm with reference count 0", - "cmt_id": "b4a661b4212b8fac8853ec3b68e4a909dccc88a1" + "CVE-2018-12928": { + "cmt_msg": "" }, - "CVE-2022-20154": { - "cmt_msg": "sctp: use call_rcu to free endpoint", - "cmt_id": "af6e6e58f7ebf86b4e7201694b1e4f3a62cbc3ec" - } - }, - "4.19.225": { - "CVE-2021-45095": { - "cmt_msg": "phonet: refcount leak in pep_sock_accep", - "cmt_id": "4dece2760af408ad91d6e43afc485d20386c2885" + "CVE-2020-25220": { + "cmt_msg": "" }, - "CVE-2021-4155": { - "cmt_msg": "xfs: map unwritten blocks in XFS_IOC_{ALLOC,FREE}SP just like fallocate", - "cmt_id": "1c3564fca0e7b8c9e96245a2cb35e198b036ee9a" + "CVE-2015-2877": { + "cmt_msg": "" }, - "CVE-2021-3923": { - "cmt_msg": "RDMA/core: Don't infoleak GRH fields", - "cmt_id": "153843e270459b08529f80a0a0d8258d91597594" - } - }, - "4.19.226": { - "CVE-2020-36322": { - "cmt_msg": "fuse: fix bad inode", - "cmt_id": "1e1bb4933f1faafc68db8e0ecd5838a65dd1aae9" + "CVE-2023-26242": { + "cmt_msg": "" }, - "CVE-2021-43976": { - "cmt_msg": "mwifiex: Fix skb_over_panic in mwifiex_usb_recv()", - "cmt_id": "2f4b037bf6e8c663a593b8149263c5b6940c7afd" - } - }, - "4.19.227": { - "CVE-2022-0330": { - "cmt_msg": "drm/i915: Flush TLBs before releasing backing store", - "cmt_id": "b188780649081782e341e52223db47c49f172712" + "CVE-2019-16089": { + "cmt_msg": "" }, - "CVE-2022-22942": { - "cmt_msg": "drm/vmwgfx: Fix stale file descriptors on failed usercopy", - "cmt_id": "0008a0c78fc33a84e2212a7c04e6b21a36ca6f4d" - } - }, - "4.19.228": { - "CVE-2022-24448": { - "cmt_msg": "NFSv4: Handle case where the lookup of a directory fails", - "cmt_id": "b00b4c6faad0f21e443fb1584f7a8ea222beb0de" + "CVE-2023-32629": { + "cmt_msg": "" }, - "CVE-2020-36516": { - "cmt_msg": "ipv4: avoid using shared IP generator for connected sockets", - "cmt_id": "eb04c6d1ec67e30f3aa5ef82112cbfdbddfd4f65" + "CVE-2022-0400": { + "cmt_msg": "" }, - "CVE-2022-0617": { - "cmt_msg": "udf: Fix NULL ptr deref when converting from inline format", - "cmt_id": "a23a59717f9f01a49394488f515550f9382fbada" + "CVE-2024-26806": { + "cmt_msg": "spi: cadence-qspi: remove system-wide suspend helper calls from runtime PM hooks" }, - "CVE-2022-1678": { - "cmt_msg": "tcp: optimize tcp internal pacing", - "cmt_id": "0a70f118475e037732557796accd0878a00fc25a" + "CVE-2021-3847": { + "cmt_msg": "" }, - "CVE-2022-24959": { - "cmt_msg": "yam: fix a memory leak in yam_siocdevprivate()", - "cmt_id": "4bd197ce18329e3725fe3af5bd27daa4256d3ac7" - } - }, - "4.19.229": { - "CVE-2022-0492": { - "cmt_msg": "cgroup-v1: Require capabilities to set release_agent", - "cmt_id": "939f8b491887c27585933ea7dc5ad4123de58ff3" + "CVE-2022-2961": { + "cmt_msg": "" }, - "CVE-2022-0435": { - "cmt_msg": "tipc: improve size validations for received domain records", - "cmt_id": "f1af11edd08dd8376f7a84487cbb0ea8203e3a1d" + "CVE-2024-26797": { + "cmt_msg": "drm/amd/display: Prevent potential buffer overflow in map_hw_resources" }, - "CVE-2022-0487": { - "cmt_msg": "moxart: fix potential use-after-free on remove path", - "cmt_id": "9c25d5ff1856b91bd4365e813f566cb59aaa9552" - } - }, - "4.19.230": { - "CVE-2022-25375": { - "cmt_msg": "usb: gadget: rndis: check size of RNDIS_MSG_SET command", - "cmt_id": "db9aaa3026298d652e98f777bc0f5756e2455dda" + "CVE-2022-25265": { + "cmt_msg": "" }, - "CVE-2022-25258": { - "cmt_msg": "USB: gadget: validate interface OS descriptor requests", - "cmt_id": "e5eb8d19aee115d8fb354d1eff1b8df700467164" - } - }, - "4.19.231": { - "CVE-2022-2964": { - "cmt_msg": "net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup", - "cmt_id": "1668781ed24da43498799aa4f65714a7de201930" + "CVE-2011-4916": { + "cmt_msg": "" }, - "CVE-2022-20008": { - "cmt_msg": "mmc: block: fix read single on recovery logic", - "cmt_id": "c91b06297563e84ac072464fe6cc141cc15435f0" - } - }, - "4.19.232": { - "CVE-2022-27223": { - "cmt_msg": "USB: gadget: validate endpoint index for xilinx udc", - "cmt_id": "ebc465e894890a534ce05e035eae4829a2a47ba1" + "CVE-2023-23039": { + "cmt_msg": "" }, - "CVE-2022-26966": { - "cmt_msg": "sr9700: sanity check for packet length", - "cmt_id": "dde5ddf02a47487dd6efcc7077307f1d4e1ba337" + "CVE-2023-3640": { + "cmt_msg": "" + } + } + }, + "6.5": { + "6.5": { + "CVE-2022-36402": { + "cmt_msg": "drm/vmwgfx: Fix shader stage validation", + "cmt_id": "14abdfae508228a7307f7491b5c4215ae70c6542" } }, - "4.19.233": { - "CVE-2022-24958": { - "cmt_msg": "usb: gadget: don't release an existing dev->buf", - "cmt_id": "70196d12856306a17ddc3eae0f022b9c1d748e52" + "6.5.2": { + "CVE-2023-52440": { + "cmt_msg": "ksmbd: fix slub overflow in ksmbd_decode_ntlmssp_auth_blob()", + "cmt_id": "ecd7e1c562cb08e41957fcd4b0e404de5ab38e20" } }, - "4.19.234": { - "CVE-2022-23038": { - "cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()", - "cmt_id": "17659846fe336366b1663194f5669d10f5947f53" + "6.5.3": { + "CVE-2023-4623": { + "cmt_msg": "net/sched: sch_hfsc: Ensure inner classes have fsc curve", + "cmt_id": "eb07894c51c7d6bb8d00948a3e6e7b52c791e93e" }, - "CVE-2022-23039": { - "cmt_msg": "xen/gntalloc: don't use gnttab_query_foreign_access()", - "cmt_id": "fbc57368ea527dcfa909908fc47a851a56e4e5ce" + "CVE-2023-25775": { + "cmt_msg": "RDMA/irdma: Prevent zero-length STAG registration", + "cmt_id": "782c5702b933477b088e80e6d07b9493145b2916" }, - "CVE-2022-23960": { - "cmt_msg": "ARM: report Spectre v2 status through sysfs", - "cmt_id": "dc64af755099d1e51fd64e99fe3a59b75595814a" + "CVE-2023-37453": { + "cmt_msg": "USB: core: Fix race by not overwriting udev->descriptor in hub_port_init()", + "cmt_id": "b9fbfb349eacc0820f91c797d7f0a3ac7a4935b5" }, - "CVE-2022-23041": { - "cmt_msg": "xen/9p: use alloc/free_pages_exact()", - "cmt_id": "2466bed361f3274e3e0ca9d8e539532481c06fea" + "CVE-2023-42753": { + "cmt_msg": "netfilter: ipset: add the missing IP_SET_HASH_WITH_NET0 macro for ip_set_hash_netportnet.c", + "cmt_id": "d95c8420efe684b964e3aa28108e9a354bcd7225" }, - "CVE-2022-23036": { - "cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()", - "cmt_id": "17659846fe336366b1663194f5669d10f5947f53" + "CVE-2023-42752": { + "cmt_msg": "igmp: limit igmpv3_newpack() packet size to IP_MAX_MTU", + "cmt_id": "3138192865c2a1f089dd27a7d80a7271ecd468e7" }, - "CVE-2022-23037": { - "cmt_msg": "xen/netfront: don't use gnttab_query_foreign_access() for mapped status", - "cmt_id": "927e4eb8ddf4968b6a33be992b28063f84552c72" + "CVE-2023-45871": { + "cmt_msg": "igb: set max size RX buffer when store bad packet is enabled", + "cmt_id": "dad92377fc6e012e481c6f4a75e32e48fe2777db" }, - "CVE-2022-0001": { - "cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE", - "cmt_id": "25440a8c77dd2fde6a8e9cfc0c616916febf408e" + "CVE-2023-39193": { + "cmt_msg": "netfilter: xt_sctp: validate the flag_info count", + "cmt_id": "85ebbbe845823be6f8c04b4901da9a0a6f866283" }, - "CVE-2022-0002": { - "cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE", - "cmt_id": "25440a8c77dd2fde6a8e9cfc0c616916febf408e" + "CVE-2023-39192": { + "cmt_msg": "netfilter: xt_u32: validate user space input", + "cmt_id": "799cc0fb184408f688b030ea381844b16d1d9c62" + } + }, + "6.5.4": { + "CVE-2023-4921": { + "cmt_msg": "net: sched: sch_qfq: Fix UAF in qfq_dequeue()", + "cmt_id": "e5471b82c36396e809817cb988dfc4bce0a688cb" }, - "CVE-2021-26401": { - "cmt_msg": "x86/speculation: Use generic retpoline by default on AMD", - "cmt_id": "d3cb3a6927222268a10b2f12dfb8c9444f7cc39e" + "CVE-2023-52628": { + "cmt_msg": "netfilter: nftables: exthdr: fix 4-byte stack OOB write", + "cmt_id": "c8f292322ff16b9a2272a67de396c09a50e09dce" }, - "CVE-2022-23040": { - "cmt_msg": "xen/xenbus: don't let xenbus_grant_ring() remove grants in error case", - "cmt_id": "8d521d960aef22781ff499e16899c30af899de8d" + "CVE-2023-52629": { + "cmt_msg": "sh: push-switch: Reorder cleanup operations to avoid use-after-free bug", + "cmt_id": "610dbd8ac271aa36080aac50b928d700ee3fe4de" }, - "CVE-2022-23042": { - "cmt_msg": "xen/netfront: react properly to failing gnttab_end_foreign_access_ref()", - "cmt_id": "c307029d811e03546d18d0e512fe295b3103b8e5" - } - }, - "4.19.235": { - "CVE-2022-1199": { - "cmt_msg": "ax25: Fix NULL pointer dereference in ax25_kill_by_device", - "cmt_id": "5ab8de9377edde3eaf1de9872e2f01d43157cd6c" + "CVE-2023-6176": { + "cmt_msg": "net/tls: do not free tls_rec on async operation in bpf_exec_tx_verdict()", + "cmt_id": "74aecad5da19004ccf6321fd397d14b10756622a" }, - "CVE-2021-4149": { - "cmt_msg": "btrfs: unlock newly allocated extent buffer after error", - "cmt_id": "73d55fa1b9310573f623195a4f7ab3170bbaf248" - } - }, - "4.19.236": { - "CVE-2022-20368": { - "cmt_msg": "net/packet: fix slab-out-of-bounds access in packet_recvmsg()", - "cmt_id": "a33dd1e6693f80d805155b3f69c18c2f642915da" + "CVE-2023-4881": { + "cmt_msg": "netfilter: nftables: exthdr: fix 4-byte stack OOB write", + "cmt_id": "c8f292322ff16b9a2272a67de396c09a50e09dce" }, - "CVE-2022-20158": { - "cmt_msg": "net/packet: fix slab-out-of-bounds access in packet_recvmsg()", - "cmt_id": "a33dd1e6693f80d805155b3f69c18c2f642915da" + "CVE-2023-39189": { + "cmt_msg": "netfilter: nfnetlink_osf: avoid OOB read", + "cmt_id": "a3d0f898b80ac9b049e590b3ee6391716002da17" }, - "CVE-2022-3107": { - "cmt_msg": "hv_netvsc: Add check for kvmalloc_array", - "cmt_id": "a30c7c81db60f7f7ad52f75a4f7de5f628063df4" + "CVE-2023-52433": { + "cmt_msg": "netfilter: nft_set_rbtree: skip sync GC for new elements in this transaction", + "cmt_id": "e3213ff99a355cda811b41e8dbb3472d13167a3a" + }, + "CVE-2023-45898": { + "cmt_msg": "ext4: fix slab-use-after-free in ext4_es_insert_extent()", + "cmt_id": "c15bf3330a9e3c01b23e59899a6a02432a62ddc3" } }, - "4.19.237": { - "CVE-2022-26490": { - "cmt_msg": "nfc: st21nfca: Fix potential buffer overflows in EVT_TRANSACTION", - "cmt_id": "0043b74987acb44f1ade537aad901695511cfebe" + "6.5.6": { + "CVE-2023-5345": { + "cmt_msg": "fs/smb/client: Reset password pointer to NULL", + "cmt_id": "0c116005af551e9cf437a9ec8c80204c2d4b1b53" }, - "CVE-2022-28356": { - "cmt_msg": "llc: fix netdevice reference leaks in llc_ui_bind()", - "cmt_id": "d14193111c436fc5de33206c67c7afd45c730099" + "CVE-2023-52569": { + "cmt_msg": "btrfs: remove BUG() after failure to insert delayed dir index item", + "cmt_id": "d10fd53393cc5de4b9cf1a4b8f9984f0a037aa51" }, - "CVE-2022-1016": { - "cmt_msg": "netfilter: nf_tables: initialize registers in nft_do_chain()", - "cmt_id": "88791b79a1eb2ba94e95d039243e28433583a67b" + "CVE-2023-52568": { + "cmt_msg": "x86/sgx: Resolves SECS reclaim vs. page fault for EAUG race", + "cmt_id": "1348f7f15d7c7798456856bee74a4235c2da994e" }, - "CVE-2022-27666": { - "cmt_msg": "esp: Fix possible buffer overflow in ESP transformation", - "cmt_id": "ce89087966651ad41e103770efc5ce2742046284" - } - }, - "4.19.238": { - "CVE-2022-28390": { - "cmt_msg": "can: ems_usb: ems_usb_start_xmit(): fix double dev_kfree_skb() in error path", - "cmt_id": "dec3ed0c76483748268bf36ec278af660b0f80ba" + "CVE-2023-52581": { + "cmt_msg": "netfilter: nf_tables: fix memleak when more than 255 elements expired", + "cmt_id": "4aea243b6853d06c1d160a9955b759189aa02b14" }, - "CVE-2022-2380": { - "cmt_msg": "video: fbdev: sm712fb: Fix crash in smtcfb_read()", - "cmt_id": "1caa40af491dcfe17b3ae870a854388d8ea01984" + "CVE-2023-52580": { + "cmt_msg": "net/core: Fix ETH_P_1588 flow dissector", + "cmt_id": "48e105a2a1a10adc21c0ae717969f5e8e990ba48" }, - "CVE-2022-1353": { - "cmt_msg": "af_key: add __GFP_ZERO flag for compose_sadb_supported in function pfkey_register", - "cmt_id": "693fe8af9a2625139de07bd1ae212a7d89c37795" + "CVE-2023-52582": { + "cmt_msg": "netfs: Only call folio_start_fscache() one time for each folio", + "cmt_id": "d9f5537479d4ec97ea92ff24e81a517d5772581a" }, - "CVE-2022-30594": { - "cmt_msg": "ptrace: Check PTRACE_O_SUSPEND_SECCOMP permission on PTRACE_SEIZE", - "cmt_id": "b1f438f872dcda10a79e6aeaf06fd52dfb15a6ab" + "CVE-2023-52563": { + "cmt_msg": "drm/meson: fix memory leak on ->hpd_notify callback", + "cmt_id": "43b63e088887a8b82750e16762f77100ffa76cba" }, - "CVE-2022-2977": { - "cmt_msg": "tpm: fix reference counting for struct tpm_chip", - "cmt_id": "cb64bd038beacb4331fe464a36c8b5481e8f51e2" + "CVE-2023-52562": { + "cmt_msg": "mm/slab_common: fix slab_caches list corruption after kmem_cache_destroy()", + "cmt_id": "51988be187b041e5355245957b0b9751fa382e0d" }, - "CVE-2022-3111": { - "cmt_msg": "power: supply: wm8350-power: Add missing free in free_charger_irq", - "cmt_id": "60dd1082322966f192f42fe2a6605dfa08eef41f" + "CVE-2023-52561": { + "cmt_msg": "arm64: dts: qcom: sdm845-db845c: Mark cont splash memory region as reserved", + "cmt_id": "82dacd0ca0d9640723824026d6fdf773c02de1d2" }, - "CVE-2022-1198": { - "cmt_msg": "drivers: hamradio: 6pack: fix UAF bug caused by mod_timer()", - "cmt_id": "79e2f40c210a47f283bca352745068207798fbb9" + "CVE-2023-52560": { + "cmt_msg": "mm/damon/vaddr-test: fix memory leak in damon_do_test_apply_three_regions()", + "cmt_id": "6b522001693aa113d97a985abc5f6932972e8e86" }, - "CVE-2022-3202": { - "cmt_msg": "jfs: prevent NULL deref in diFree", - "cmt_id": "2ef74e3e0089b6615ee124e1183746974c6bb561" + "CVE-2023-52567": { + "cmt_msg": "serial: 8250_port: Check IRQ data before use", + "cmt_id": "3345cc5f02f1fb4c4dcb114706f2210d879ab933" }, - "CVE-2021-4197": { - "cmt_msg": "cgroup: Use open-time credentials for process migraton perm checks", - "cmt_id": "0bd407959f7d6671ba0617e2dbda3e89d8a0419f" + "CVE-2023-52566": { + "cmt_msg": "nilfs2: fix potential use after free in nilfs_gccache_submit_read_data()", + "cmt_id": "28df4646ad8b433340772edc90ca709cdefc53e2" }, - "CVE-2022-28389": { - "cmt_msg": "can: mcba_usb: mcba_usb_start_xmit(): fix double dev_kfree_skb in error path", - "cmt_id": "a8bba9fd73775e66b4021b18f2193f769ce48a59" + "CVE-2023-52565": { + "cmt_msg": "media: uvcvideo: Fix OOB read", + "cmt_id": "8bcf70d787f7d53a3b85ad394f926cfef3eed023" }, - "CVE-2022-3239": { - "cmt_msg": "media: em28xx: initialize refcount before kref_get", - "cmt_id": "0113fa98a49a8e46a19b0ad80f29c904c6feec23" + "CVE-2023-52564": { + "cmt_msg": "Revert \"tty: n_gsm: fix UAF in gsm_cleanup_mux\"", + "cmt_id": "2bff660e0ff349dee84dc4f6f6d10da4497f5b28" }, - "CVE-2022-1011": { - "cmt_msg": "fuse: fix pipe buffer lifetime for direct_io", - "cmt_id": "99db28212be68030c1db3a525f6bbdce39b039e9" + "CVE-2023-52508": { + "cmt_msg": "nvme-fc: Prevent null pointer dereference in nvme_fc_io_getuuid()", + "cmt_id": "dd46b3ac7322baf3772b33b29726e94f98289db7" }, - "CVE-2023-1637": { - "cmt_msg": "x86/speculation: Restore speculation related MSRs during S3 resume", - "cmt_id": "edc7b755e8fce10009ac85bb234a035557301bc4" - } - }, - "4.19.239": { - "CVE-2022-41858": { - "cmt_msg": "drivers: net: slip: fix NPD bug in sl_tx_timeout()", - "cmt_id": "753b9d220a7d36dac70e7c6d05492d10d6f9dd36" - } - }, - "4.19.240": { - "CVE-2022-1204": { - "cmt_msg": "ax25: Fix refcount leaks caused by ax25_cb_del()", - "cmt_id": "de55a1338e6a48ff1e41ea8db1432496fbe2a62b" + "CVE-2023-5197": { + "cmt_msg": "netfilter: nf_tables: disallow rule removal from chain binding", + "cmt_id": "13f385f99147b4445a1ff151fabd44c12d366ab0" }, - "CVE-2022-28388": { - "cmt_msg": "can: usb_8dev: usb_8dev_start_xmit(): fix double dev_kfree_skb() in error path", - "cmt_id": "8eb78da898079c0d7250c32ebf0c35fb81737abe" - } - }, - "4.19.241": { - "CVE-2022-33981": { - "cmt_msg": "floppy: disable FDRAWCMD by default", - "cmt_id": "0e535976774504af36fab1dfb54f3d4d6cc577a9" + "CVE-2023-52506": { + "cmt_msg": "LoongArch: Set all reserved memblocks on Node#0 at initialization", + "cmt_id": "19878758accf6b2788091a771d9f9fee7bab11ab" }, - "CVE-2022-1836": { - "cmt_msg": "floppy: disable FDRAWCMD by default", - "cmt_id": "0e535976774504af36fab1dfb54f3d4d6cc577a9" + "CVE-2023-52501": { + "cmt_msg": "ring-buffer: Do not attempt to read past \"commit\"", + "cmt_id": "75fc9e99b3a71006720ad1e029db11a4b5c32d4a" }, - "CVE-2022-29581": { - "cmt_msg": "net/sched: cls_u32: fix netns refcount changes in u32_change()", - "cmt_id": "75b0cc7904da7b40c6e8f2cf3ec4223b292b1184" - } - }, - "4.19.242": { - "CVE-2022-1419": { - "cmt_msg": "drm/vgem: Close use-after-free race in vgem_gem_create", - "cmt_id": "df2c1f38939aabb8c6beca108f08b90f050b9ebc" + "CVE-2023-52500": { + "cmt_msg": "scsi: pm80xx: Avoid leaking tags when processing OPC_INB_SET_CONTROLLER_CONFIG command", + "cmt_id": "22e6d783a33015bcdf0979015e4eac603912bea7" }, - "CVE-2023-3159": { - "cmt_msg": "firewire: fix potential uaf in outbound_phy_packet_callback()", - "cmt_id": "34380b5647f13fecb458fea9a3eb3d8b3a454709" + "CVE-2023-52578": { + "cmt_msg": "net: bridge: use DEV_STATS_INC()", + "cmt_id": "f2ef4cb4d418fa64fe73eb84d10cc5c0e52e00fa" }, - "CVE-2022-1974": { - "cmt_msg": "nfc: replace improper check device_is_registered() in netlink related functions", - "cmt_id": "7deebb94a311da0e02e621e765c3aef3d5936572" + "CVE-2023-52574": { + "cmt_msg": "team: fix null-ptr-deref when team device type is changed", + "cmt_id": "cac50d9f5d876be32cb9aa21c74018468900284d" }, - "CVE-2022-1975": { - "cmt_msg": "NFC: netlink: fix sleep in atomic bug when firmware download timeout", - "cmt_id": "d360fc8df363ecd7892d755d69ffc8c61d699e38" + "CVE-2023-52575": { + "cmt_msg": "x86/srso: Fix SBPB enablement for spec_rstack_overflow=off", + "cmt_id": "e3cb8b2c391b1f287eb76df4ba37880f4ea56d8a" }, - "CVE-2022-1734": { - "cmt_msg": "nfc: nfcmrvl: main: reorder destructive operations in nfcmrvl_nci_unregister_dev to avoid bugs", - "cmt_id": "b266f492b2af82269aaaab871ac3949420ae678c" - } - }, - "4.19.243": { - "CVE-2022-1048": { - "cmt_msg": "ALSA: pcm: Fix races among concurrent hw_params and hw_free calls", - "cmt_id": "9cb6c40a6ebe4a0cfc9d6a181958211682cffea9" - } - }, - "4.19.245": { - "CVE-2023-1838": { - "cmt_msg": "Fix double fget() in vhost_net_set_backend()", - "cmt_id": "6ca70982c646cc32e458150ee7f2530a24369b8c" + "CVE-2023-52576": { + "cmt_msg": "x86/mm, kexec, ima: Use memblock_free_late() from ima_free_kexec_buffer()", + "cmt_id": "d2dfbc0e3b7a04c2d941421a958dc31c897fb204" }, - "CVE-2022-48619": { - "cmt_msg": "Input: add bounds checking to input_set_capability()", - "cmt_id": "01d41d7e7fc7eef99ae5b1065d9186f91ff099e7" + "CVE-2023-52570": { + "cmt_msg": "vfio/mdev: Fix a null-ptr-deref bug for mdev_unregister_parent()", + "cmt_id": "52093779b1830ac184a23848d971f06404cf513e" }, - "CVE-2022-1729": { - "cmt_msg": "perf: Fix sys_perf_event_open() race against self", - "cmt_id": "6cdd53a49aa7413e53c14ece27d826f0b628b18a" + "CVE-2023-52571": { + "cmt_msg": "power: supply: rk817: Fix node refcount leak", + "cmt_id": "70326b46b6a043f7e7404b2ff678b033c06d6577" }, - "CVE-2022-1652": { - "cmt_msg": "floppy: use a statically allocated error counter", - "cmt_id": "3392d8711ad9e5b688999c948fd36d798c0d075d" + "CVE-2023-52572": { + "cmt_msg": "cifs: Fix UAF in cifs_demultiplex_thread()", + "cmt_id": "76569e3819e0bb59fc19b1b8688b017e627c268a" }, - "CVE-2023-4387": { - "cmt_msg": "net: vmxnet3: fix possible use-after-free bugs in vmxnet3_rq_alloc_rx_buf()", - "cmt_id": "3adaaf3472e8ea410cb1330e5dd8372b0483dc78" + "CVE-2023-52573": { + "cmt_msg": "net: rds: Fix possible NULL-pointer dereference", + "cmt_id": "069ac51c37a6f07a51f7134d8c34289075786a35" }, - "CVE-2023-4459": { - "cmt_msg": "net: vmxnet3: fix possible NULL pointer dereference in vmxnet3_rq_cleanup()", - "cmt_id": "248a37ffd81c7121d30702d8caa31db48450680d" - } - }, - "4.19.246": { - "CVE-2022-20572": { - "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag", - "cmt_id": "6bff6107d1364c95109609c3fd680e6c8d7fa503" + "CVE-2023-52484": { + "cmt_msg": "iommu/arm-smmu-v3: Fix soft lockup triggered by arm_smmu_mm_invalidate_range", + "cmt_id": "3283a1bce9bbc978059f790b84f3c10c32492429" }, - "CVE-2022-2503": { - "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag", - "cmt_id": "6bff6107d1364c95109609c3fd680e6c8d7fa503" + "CVE-2023-42754": { + "cmt_msg": "ipv4: fix null-deref in ipv4_link_failure", + "cmt_id": "cda20fcddf53f0f959641c8ef4d50ab87ffa5124" }, - "CVE-2022-0494": { - "cmt_msg": "block-map: add __GFP_ZERO flag for alloc_page in function bio_copy_kern", - "cmt_id": "18243d8479fd77952bdb6340024169d30b173a40" + "CVE-2023-42756": { + "cmt_msg": "netfilter: ipset: Fix race between IPSET_CMD_CREATE and IPSET_CMD_SWAP", + "cmt_id": "20a93d402b6fe6757e14b0eeb400dfac8b8aa3ad" }, - "CVE-2022-1012": { - "cmt_msg": "secure_seq: use the 64 bits of the siphash for port offset calculation", - "cmt_id": "695309c5c71526d32f5539f008bbf20ed2218528" - } - }, - "4.19.247": { - "CVE-2023-4385": { - "cmt_msg": "fs: jfs: fix possible NULL pointer dereference in dbFree()", - "cmt_id": "c381558c278a540c61dfef1f2b77ab817d5d302d" + "CVE-2023-52482": { + "cmt_msg": "x86/srso: Add SRSO mitigation for Hygon processors", + "cmt_id": "cf43b304b6952b549d58feabc342807b334f03d4" }, - "CVE-2022-32250": { - "cmt_msg": "netfilter: nf_tables: disallow non-stateful expression in sets earlier", - "cmt_id": "ed44398b45add3d9be56b7457cc9e05282e518b4" + "CVE-2023-52511": { + "cmt_msg": "spi: sun6i: reduce DMA RX transfer width to single byte", + "cmt_id": "b3c21c9c7289692f4019f163c3b06d8bdf78b355" }, - "CVE-2022-1184": { - "cmt_msg": "ext4: verify dir block before splitting it", - "cmt_id": "78398c2b2cc14f9a9c8592cf6d334c5a479ed611" + "CVE-2023-52516": { + "cmt_msg": "dma-debug: don't call __dma_entry_alloc_check_leak() under free_entries_lock", + "cmt_id": "fe2b811a02c3244ebf6059039e4a9e715e26a9e3" }, - "CVE-2022-1966": { - "cmt_msg": "netfilter: nf_tables: disallow non-stateful expression in sets earlier", - "cmt_id": "ed44398b45add3d9be56b7457cc9e05282e518b4" + "CVE-2023-52517": { + "cmt_msg": "spi: sun6i: fix race between DMA RX transfer completion and RX FIFO drain", + "cmt_id": "4e149d524678431638ff378ef6025e4e89b71097" }, - "CVE-2022-32981": { - "cmt_msg": "powerpc/32: Fix overread/overwrite of thread_struct via ptrace", - "cmt_id": "a0e38a2808ea708beb4196a8873cecc23efb8e64" + "CVE-2022-48628": { + "cmt_msg": "ceph: drop messages from MDS when unmounting", + "cmt_id": "47f82395f04a976d4fa97de7f2acffa1c1096571" } }, - "4.19.248": { - "CVE-2022-21125": { - "cmt_msg": "x86/speculation/mmio: Reuse SRBDS mitigation for SBDS", - "cmt_id": "0e94464009ee37217a7e450c96ea1f8d42d3a6b5" + "6.5.7": { + "CVE-2023-34324": { + "cmt_msg": "xen/events: replace evtchn_rwlock with RCU", + "cmt_id": "76b33722e2d2336a6e2a7d9eacbbb8988478cf98" }, - "CVE-2022-21166": { - "cmt_msg": "x86/speculation/mmio: Enable CPU Fill buffer clearing on idle", - "cmt_id": "8b42145e8c9903d4805651e08f4fca628e166642" + "CVE-2023-52559": { + "cmt_msg": "iommu/vt-d: Avoid memory allocation in iommu_suspend()", + "cmt_id": "496c591f0b389eb782f36d9d4c2564b9a865eed0" }, - "CVE-2022-21123": { - "cmt_msg": "x86/speculation/mmio: Add mitigation for Processor MMIO Stale Data", - "cmt_id": "9f2ce43ebc33713ba02a89a66bd5f93c2f3a82cf" - } - }, - "4.19.249": { - "CVE-2022-32296": { - "cmt_msg": "tcp: increase source port perturb table to 2^16", - "cmt_id": "514cd2859c5017fdc487165b093b328e24afe954" + "CVE-2023-31085": { + "cmt_msg": "ubi: Refuse attaching if mtd's erasesize is 0", + "cmt_id": "87b9858e404069817cd4b31830e0a1b9b3d183c4" }, - "CVE-2022-0812": { - "cmt_msg": "xprtrdma: fix incorrect header size calculations", - "cmt_id": "4103bc54d8684a099615ae1fbab0590cf2167024" - } - }, - "4.19.250": { - "CVE-2021-33656": { - "cmt_msg": "vt: drop old FONT ioctls", - "cmt_id": "b15d5731b708a2190fec836990b8aefbbf36b07a" - } - }, - "4.19.251": { - "CVE-2022-2318": { - "cmt_msg": "net: rose: fix UAF bugs caused by timer handler", - "cmt_id": "2661f2d88f40e35791257d73def0319b4560b74b" + "CVE-2023-52513": { + "cmt_msg": "RDMA/siw: Fix connection failure handling", + "cmt_id": "eeafc50a77f6a783c2c44e7ec3674a7b693e06f8" }, - "CVE-2022-33742": { - "cmt_msg": "xen/blkfront: force data bouncing when backend is untrusted", - "cmt_id": "981de55fb6b5253fa7ae345827c6c3ca77912e5c" + "CVE-2023-52527": { + "cmt_msg": "ipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data()", + "cmt_id": "fe80658c08e3001c80c5533cd41abfbb0e0e28fd" }, - "CVE-2022-33741": { - "cmt_msg": "xen/netfront: force data bouncing when backend is untrusted", - "cmt_id": "4b67d8e42dbba42cfafe22ac3e4117d9573fdd74" + "CVE-2023-52526": { + "cmt_msg": "erofs: fix memory leak of LZMA global compressed deduplication", + "cmt_id": "c955751cbf864cf2055117dd3fe7f780d2a57b56" }, - "CVE-2022-33740": { - "cmt_msg": "xen/netfront: fix leaking data in shared pages", - "cmt_id": "3650ac3218c1640a3d597a8cee17d8e2fcf0ed4e" + "CVE-2023-52524": { + "cmt_msg": "net: nfc: llcp: Add lock when modifying device list", + "cmt_id": "29c16c2bf5866326d5fbc4a537b3997fcac23391" }, - "CVE-2022-26365": { - "cmt_msg": "xen/blkfront: fix leaking data in shared pages", - "cmt_id": "f4a1391185e30c977bfe1648435c152f806211c7" + "CVE-2023-52523": { + "cmt_msg": "bpf, sockmap: Reject sk_msg egress redirects to non-TCP sockets", + "cmt_id": "ded6e448028f0f91b6af35985afca01fa02a9089" }, - "CVE-2022-33744": { - "cmt_msg": "xen/arm: Fix race in RB-tree based P2M accounting", - "cmt_id": "274cb74da15ed13292fcec9097f04332eb3eea17" - } - }, - "4.19.252": { - "CVE-2021-33655": { - "cmt_msg": "fbcon: Disallow setting font bigger than screen size", - "cmt_id": "eae522ed28fe1c00375a8a0081a97dce7996e4d8" - } - }, - "4.19.253": { - "CVE-2022-36123": { - "cmt_msg": "x86: Clear .brk area at early boot", - "cmt_id": "36e2f161fb01795722f2ff1a24d95f08100333dd" - } - }, - "4.19.254": { - "CVE-2022-1462": { - "cmt_msg": "tty: use new tty_insert_flip_string_and_push_buffer() in pty_write()", - "cmt_id": "eb059bf8c237fe41fbaed4a6cccacce687b83222" + "CVE-2023-52522": { + "cmt_msg": "net: fix possible store tearing in neigh_periodic_work()", + "cmt_id": "a75152d233370362eebedb2643592e7c883cc9fc" }, - "CVE-2022-36879": { - "cmt_msg": "xfrm: xfrm_policy: fix a possible double xfrm_pols_put() in xfrm_bundle_lookup()", - "cmt_id": "fdb4fba1ba8512fa579a9d091dcb6c410f82f96a" - } - }, - "4.19.255": { - "CVE-2022-36946": { - "cmt_msg": "netfilter: nf_queue: do not allow packet truncation below transport header offset", - "cmt_id": "f295d365b30626f82423a923695274024016380e" + "CVE-2024-0641": { + "cmt_msg": "tipc: fix a potential deadlock on &tx->lock", + "cmt_id": "aa1a21681b94f59c67ca56601e05dc1573ecb6cb" }, - "CVE-2022-20566": { - "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free caused by l2cap_chan_put", - "cmt_id": "bbd1fdb0e1adf827997a93bf108f20ede038e56e" + "CVE-2023-52479": { + "cmt_msg": "ksmbd: fix uaf in smb20_oplock_break_ack", + "cmt_id": "d5b0e9d3563e7e314a850e81f42b2ef6f39882f9" }, - "CVE-2022-26373": { - "cmt_msg": "x86/speculation: Add RSB VM Exit protections", - "cmt_id": "b6c5011934a15762cd694e36fe74f2f2f93eac9b" - } - }, - "4.19.256": { - "CVE-2022-2586": { - "cmt_msg": "netfilter: nf_tables: do not allow SET_ID to refer to another table", - "cmt_id": "77d3b5038b7462318f5183e2ad704b01d57215a2" + "CVE-2023-52529": { + "cmt_msg": "HID: sony: Fix a potential memory leak in sony_probe()", + "cmt_id": "f566efa7de1e35e6523f4acbaf85068a540be07d" }, - "CVE-2022-3629": { - "cmt_msg": "vsock: Fix memory leak in vsock_connect()", - "cmt_id": "2fc2a7767f661e6083f69588718cdf6f07cb9330" + "CVE-2023-52528": { + "cmt_msg": "net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg", + "cmt_id": "4931e80da9463b03bfe42be54a9a19f213b0f76d" }, - "CVE-2022-2153": { - "cmt_msg": "KVM: x86: Avoid theoretical NULL pointer dereference in kvm_irq_delivery_to_apic_fast()", - "cmt_id": "b8127a0fd21d70ab42d8177f8bb97df74f503cc1" + "CVE-2023-52518": { + "cmt_msg": "Bluetooth: hci_codec: Fix leaking content of local_codecs", + "cmt_id": "eea5a8f0c3b7c884d2351e75fbdd0a3d7def5ae1" }, - "CVE-2022-3635": { - "cmt_msg": "atm: idt77252: fix use-after-free bugs caused by tst_timer", - "cmt_id": "52fddbd9754b249546c89315787075b7247b029d" + "CVE-2023-52519": { + "cmt_msg": "HID: intel-ish-hid: ipc: Disable and reenable ACPI GPE bit", + "cmt_id": "60fb3f054c99608ddb1f2466c07108da6292951e" }, - "CVE-2022-2588": { - "cmt_msg": "net_sched: cls_route: remove from list when handle is 0", - "cmt_id": "73584dab72d0a826f286a45544305819b58f7b92" + "CVE-2023-52530": { + "cmt_msg": "wifi: mac80211: fix potential key use-after-free", + "cmt_id": "65c72a7201704574dace708cbc96a8f367b1491d" }, - "CVE-2021-4159": { - "cmt_msg": "bpf: Verifer, adjust_scalar_min_max_vals to always call update_reg_bounds()", - "cmt_id": "6c6b84ef5ea8dc0ca3559ccf69810960e348c555" + "CVE-2023-52531": { + "cmt_msg": "wifi: iwlwifi: mvm: Fix a memory corruption issue", + "cmt_id": "f06cdd8d4ba5252986f51f80cc30263636397128" }, - "CVE-2022-20422": { - "cmt_msg": "arm64: fix oops in concurrently setting insn_emulation sysctls", - "cmt_id": "b51881b1da57fe9877125dfdd0aac5172958fcfd" + "CVE-2023-52532": { + "cmt_msg": "net: mana: Fix TX CQE error handling", + "cmt_id": "a910e0f6304726da30a212feecec65cb97ff7a80" }, - "CVE-2023-1095": { - "cmt_msg": "netfilter: nf_tables: fix null deref due to zeroed list head", - "cmt_id": "d3f409c375490a86d342eae1d0f6271d12dc19d0" + "CVE-2023-52515": { + "cmt_msg": "RDMA/srp: Do not call scsi_done() from srp_abort()", + "cmt_id": "05a10b316adaac1f322007ca9a0383b410d759cc" }, - "CVE-2022-1679": { - "cmt_msg": "ath9k: fix use-after-free in ath9k_hif_usb_rx_cb", - "cmt_id": "ab7a0ddf5f1cdec63cb21840369873806fc36d80" - } - }, - "4.19.257": { - "CVE-2022-42703": { - "cmt_msg": "mm/rmap: Fix anon_vma->degree ambiguity leading to double-reuse", - "cmt_id": "6dbfc25d68d922736381988d64156a649ccf7bf1" + "CVE-2023-52480": { + "cmt_msg": "ksmbd: fix race condition between session lookup and expire", + "cmt_id": "18ced78b0ebccc2d16f426143dc56ab3aad666be" }, - "CVE-2022-3028": { - "cmt_msg": "af_key: Do not call xfrm_probe_algs in parallel", - "cmt_id": "7dbfc8f25f22fe2a64dd808266e00c8d2661ebdd" + "CVE-2023-52481": { + "cmt_msg": "arm64: errata: Add Cortex-A520 speculative unprivileged load workaround", + "cmt_id": "32b0a4ffcaea44a00a61e40c0d1bcc50362aee25" + }, + "CVE-2023-5158": { + "cmt_msg": "vringh: don't use vringh_kiov_advance() in vringh_iov_xfer()", + "cmt_id": "0bf2b9c2f3545ffce5720de61c33fc171c0e480a" } }, - "4.19.258": { - "CVE-2022-2663": { - "cmt_msg": "netfilter: nf_conntrack_irc: Fix forged IP logic", - "cmt_id": "3275f7804f40de3c578d2253232349b07c25f146" - }, - "CVE-2023-2860": { - "cmt_msg": "ipv6: sr: fix out-of-bounds read when setting HMAC data.", - "cmt_id": "f684c16971ed5e77dfa25a9ad25b5297e1f58eab" - }, - "CVE-2022-3586": { - "cmt_msg": "sch_sfb: Don't assume the skb is still around after enqueueing to child", - "cmt_id": "9245ed20950afe225bc6d1c4b9d28d55aa152e25" + "6.5.8": { + "CVE-2023-52475": { + "cmt_msg": "Input: powermate - fix use-after-free in powermate_config_complete", + "cmt_id": "e528b1b9d60743e0b26224e3fe7aa74c24b8b2f8" }, - "CVE-2022-4095": { - "cmt_msg": "staging: rtl8712: fix use after free bugs", - "cmt_id": "9fd6170c5e2d0ccd027abe26f6f5ffc528e1bb27" + "CVE-2023-52477": { + "cmt_msg": "usb: hub: Guard against accesses to uninitialized BOS descriptors", + "cmt_id": "136f69a04e71ba3458d137aec3bb2ce1232c0289" }, - "CVE-2022-4662": { - "cmt_msg": "USB: core: Prevent nested device-reset calls", - "cmt_id": "cc9a12e12808af178c600cc485338bac2e37d2a8" + "CVE-2023-52476": { + "cmt_msg": "perf/x86/lbr: Filter vsyscall addresses", + "cmt_id": "f71edacbd4f99c0e12fe4a4007ab4d687d0688db" }, - "CVE-2022-20421": { - "cmt_msg": "binder: fix UAF of ref->proc caused by race condition", - "cmt_id": "06e5b43ca4dab06a92bf4c2f33766e6fb11b880a" + "CVE-2023-52509": { + "cmt_msg": "ravb: Fix use-after-free issue in ravb_tx_timeout_work()", + "cmt_id": "105abd68ad8f781985113aee2e92e0702b133705" }, - "CVE-2022-40307": { - "cmt_msg": "efi: capsule-loader: Fix use-after-free in efi_capsule_write", - "cmt_id": "021805af5bedeafc76c117fc771c100b358ab419" - } - }, - "4.19.260": { - "CVE-2022-39842": { - "cmt_msg": "video: fbdev: pxa3xx-gcu: Fix integer overflow in pxa3xx_gcu_write", - "cmt_id": "a34547fc43d02f2662b2b62c9a4c578594cf662d" - } - }, - "4.19.262": { - "CVE-2022-2978": { - "cmt_msg": "fs: fix UAF/GPF bug in nilfs_mdt_destroy", - "cmt_id": "ec2aab115eb38ac4992ea2fcc2a02fbe7af5cf48" + "CVE-2023-52510": { + "cmt_msg": "ieee802154: ca8210: Fix a potential UAF in ca8210_probe", + "cmt_id": "becf5c147198f4345243c5df0c4f035415491640" }, - "CVE-2022-41849": { - "cmt_msg": "fbdev: smscufx: Fix use-after-free in ufx_ops_open()", - "cmt_id": "6d8dbefc4de96d35d68c723e2e75b5a23173c08c" + "CVE-2023-52520": { + "cmt_msg": "platform/x86: think-lmi: Fix reference leak", + "cmt_id": "c6e3023579de8d33256771ac0745239029e81106" }, - "CVE-2022-3535": { - "cmt_msg": "net: mvpp2: fix mvpp2 debugfs leak", - "cmt_id": "84e2394b0be397f7198986aa9a28207f70b29bd4" + "CVE-2023-52505": { + "cmt_msg": "phy: lynx-28g: serialize concurrent phy_set_mode_ext() calls to shared registers", + "cmt_id": "c2d7c79898b427d263c64a4841987eec131f2d4e" }, - "CVE-2022-3594": { - "cmt_msg": "r8152: Rate limit overflow messages", - "cmt_id": "88d2a93972c369eb812952aa15a25c1385506c1d" + "CVE-2023-52504": { + "cmt_msg": "x86/alternatives: Disable KASAN in apply_alternatives()", + "cmt_id": "cd287cc208dfe6bd6da98e7f88e723209242c9b4" }, - "CVE-2022-43750": { - "cmt_msg": "usb: mon: make mmapped memory read only", - "cmt_id": "bf7e2cee3899ede4c7c6548f28159ee3775fb67f" + "CVE-2023-52507": { + "cmt_msg": "nfc: nci: assert requested protocol is valid", + "cmt_id": "6584eba7688dcf999542778b07f63828c21521da" }, - "CVE-2022-3621": { - "cmt_msg": "nilfs2: fix NULL pointer dereference at nilfs_bmap_lookup_at_level()", - "cmt_id": "fe8015680f383ea1dadec76972894dfabf8aefaa" + "CVE-2023-52499": { + "cmt_msg": "powerpc/47x: Fix 47x syscall return crash", + "cmt_id": "70f6756ad96dd70177dddcfac2fe4bd4bb320746" }, - "CVE-2022-3649": { - "cmt_msg": "nilfs2: fix use-after-free bug of struct nilfs_root", - "cmt_id": "bfc82a26545b5f61a64d51ca2179773706fb028f" + "CVE-2023-52512": { + "cmt_msg": "pinctrl: nuvoton: wpcm450: fix out of bounds write", + "cmt_id": "c9d7cac0fd27c74dd368e80dc4b5d0f9f2e13cf8" }, - "CVE-2022-41850": { - "cmt_msg": "HID: roccat: Fix use-after-free in roccat_read()", - "cmt_id": "13de81c7ea0fd68efb48a2d2957e349237905923" + "CVE-2023-52478": { + "cmt_msg": "HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect", + "cmt_id": "f7b2c7d9831af99369fe8ad9b2a68d78942f414e" }, - "CVE-2022-40768": { - "cmt_msg": "scsi: stex: Properly zero out the passthrough command structure", - "cmt_id": "a99c5e38dc6c3dc3da28489b78db09a4b9ffc8c3" + "CVE-2023-35827": { + "cmt_msg": "ravb: Fix use-after-free issue in ravb_tx_timeout_work()", + "cmt_id": "105abd68ad8f781985113aee2e92e0702b133705" }, - "CVE-2022-3565": { - "cmt_msg": "mISDN: fix use-after-free bugs in l1oip timer handlers", - "cmt_id": "27f74a47d5b1cf52d48af15993bb1caa31ad8f5b" + "CVE-2023-52483": { + "cmt_msg": "mctp: perform route lookups under a RCU read-side lock", + "cmt_id": "2405f64a95a7a094eb24cba9bcfaffd1ea264de4" }, - "CVE-2022-3542": { - "cmt_msg": "bnx2x: fix potential memory leak in bnx2x_tpa_stop()", - "cmt_id": "70421f9708d4cf14c2bd15de58862a3d22e00bbe" + "CVE-2023-52503": { + "cmt_msg": "tee: amdtee: fix use-after-free vulnerability in amdtee_close_session", + "cmt_id": "1c95574350cd63bc3c5c2fa06658010768f2a0ce" }, - "CVE-2022-3646": { - "cmt_msg": "nilfs2: fix leak of nilfs_root in case of writer thread creation failure", - "cmt_id": "4b748ef0f2afadd31c914623daa610f26385a4dc" - } - }, - "4.19.264": { - "CVE-2022-20369": { - "cmt_msg": "media: v4l2-mem2mem: Apply DST_QUEUE_OFF_BASE on MMAP buffers across ioctls", - "cmt_id": "95c4751705f7eef0f16a245e121259857f867c4a" + "CVE-2023-52502": { + "cmt_msg": "net: nfc: fix races in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn()", + "cmt_id": "d1af8a39cf839d93c8967fdd858f6bbdc3e4a15c" }, - "CVE-2023-0615": { - "cmt_msg": "media: vivid: dev->bitmap_cap wasn't freed in all cases", - "cmt_id": "29385e601f3420cfe46550271714b6685719eb33" + "CVE-2023-5633": { + "cmt_msg": "drm/vmwgfx: Keep a gem reference to user bos in surfaces", + "cmt_id": "1474b39f961703d0bb33833a6d6b112826839781" } }, - "4.19.265": { - "CVE-2022-3628": { - "cmt_msg": "wifi: brcmfmac: Fix potential buffer overflow in brcmf_fweh_event_worker()", - "cmt_id": "5e7d546917431400b7d6e5e38f588e0bd13083c9" + "6.5.9": { + "CVE-2023-46813": { + "cmt_msg": "x86/sev: Check for user-space IOIO pointing to kernel space", + "cmt_id": "11b975cb82cc6d88e8b04f77a673077ac5c30c8b" }, - "CVE-2023-3812": { - "cmt_msg": "net: tun: fix bugs for oversize packet when napi frags enabled", - "cmt_id": "aa815bf32acf560dad63c3dc46bc7b98ca9a9672" + "CVE-2023-5717": { + "cmt_msg": "perf: Disallow mis-matched inherited group reads", + "cmt_id": "20f925d38e1ecc1d36ee6bf6e325fb514a6f727d" }, - "CVE-2022-42895": { - "cmt_msg": "Bluetooth: L2CAP: Fix attempting to access uninitialized memory", - "cmt_id": "36919a82f335784d86b4def308739559bb47943d" + "CVE-2023-46343": { + "cmt_msg": "nfc: nci: fix possible NULL pointer dereference in send_acknowledge()", + "cmt_id": "bb6cacc439ddd2cd51227ab193f4f91cfc7f014f" }, - "CVE-2022-3564": { - "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free caused by l2cap_reassemble_sdu", - "cmt_id": "6c7407bfbeafc80a04e6eaedcf34d378532a04f2" - } - }, - "4.19.267": { - "CVE-2023-26607": { - "cmt_msg": "ntfs: fix out-of-bounds read in ntfs_attr_find()", - "cmt_id": "4301aa833a734257ad3715f607cbde17402eda94" + "CVE-2023-5090": { + "cmt_msg": "x86: KVM: SVM: always update the x2avic msr interception", + "cmt_id": "94805f9d3a3fb1f091bcc08b9c4846c4346706eb" }, - "CVE-2022-3521": { - "cmt_msg": "kcm: avoid potential race in kcm_tx_work", - "cmt_id": "23a0a5869749c7833772330313ae7aec6581ec60" + "CVE-2023-5972": { + "cmt_msg": "nf_tables: fix NULL pointer dereference in nft_expr_inner_parse()", + "cmt_id": "8a544721329e711f85358f73fe56964cdedeb531" } }, - "4.19.268": { - "CVE-2023-1382": { - "cmt_msg": "tipc: set con sock in tipc_conn_alloc", - "cmt_id": "2c9c64a95d97727c9ada0d35abc90ee5fdbaeff7" - }, - "CVE-2022-3524": { - "cmt_msg": "tcp/udp: Fix memory leak in ipv6_renew_options().", - "cmt_id": "bbfbdca680b0cbea0e57be597b5e2cae19747052" - }, - "CVE-2022-42896": { - "cmt_msg": "Bluetooth: L2CAP: Fix accepting connection request for invalid SPSM", - "cmt_id": "a2045d57e844864605d39e6cfd2237861d800f13" + "6.5.10": { + "CVE-2023-46862": { + "cmt_msg": "io_uring/fdinfo: lock SQ thread while retrieving thread cpu/pid", + "cmt_id": "56e08ccc969796168f0e6adf6642f8546f54ba6f" } }, - "4.19.269": { - "CVE-2022-3643": { - "cmt_msg": "xen/netback: Ensure protocol headers don't fall in the non-linear area", - "cmt_id": "44dfdecc288b8d5932e09f5e6a597a089d5a82b2" + "6.5.13": { + "CVE-2024-0607": { + "cmt_msg": "netfilter: nf_tables: fix pointer math issue in nft_byteorder_eval()", + "cmt_id": "1a605657adc58b3c8e2c1c66aaa5fecd29072135" } }, - "4.19.270": { - "CVE-2023-0266": { - "cmt_msg": "ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF", - "cmt_id": "5b2ea7e91352165054c5b3f8e5442cd31c3e73f9" - }, - "CVE-2022-41218": { - "cmt_msg": "media: dvb-core: Fix UAF due to refcount races at releasing", - "cmt_id": "8f537a1282cd877f132643ef8f9e9d6032f90025" + "outstanding": { + "CVE-2020-35501": { + "cmt_msg": "" }, - "CVE-2023-23455": { - "cmt_msg": "net: sched: atm: dont intepret cls results when asked to drop", - "cmt_id": "5374c455ebe6102e3d5f1842c6d8ff72b3ca659f" + "CVE-2024-26684": { + "cmt_msg": "net: stmmac: xgmac: fix handling of DPP safety error for DMA channels" }, - "CVE-2023-0461": { - "cmt_msg": "net/ulp: prevent ULP without clone op from entering the LISTEN status", - "cmt_id": "755193f2523ce5157c2f844a4b6d16b95593f830" + "CVE-2023-52615": { + "cmt_msg": "hwrng: core - Fix page fault dead lock on mmap-ed hwrng" }, - "CVE-2022-45934": { - "cmt_msg": "Bluetooth: L2CAP: Fix u8 overflow", - "cmt_id": "ad528fde0702903208d0a79d88d5a42ae3fc235b" + "CVE-2023-52614": { + "cmt_msg": "PM / devfreq: Fix buffer overflow in trans_stat_show" }, - "CVE-2022-3424": { - "cmt_msg": "misc: sgi-gru: fix use-after-free error in gru_set_context_option, gru_fault and gru_handle_user_call_os", - "cmt_id": "bcda4624e87d6b922e94f5c0fd0bd5f027b8b226" + "CVE-2023-52617": { + "cmt_msg": "PCI: switchtec: Fix stdev_release() crash after surprise hot remove" }, - "CVE-2022-3545": { - "cmt_msg": "nfp: fix use-after-free in area_cache_get()", - "cmt_id": "6ff23e9b9a04b833388862246838bb38ac0c46b6" + "CVE-2023-52616": { + "cmt_msg": "crypto: lib/mpi - Fix unexpected pointer access in mpi_ec_init" }, - "CVE-2022-47929": { - "cmt_msg": "net: sched: disallow noqueue for qdisc classes", - "cmt_id": "0195d5ad539382a83e1bfaab51b93b8685f0b7c7" + "CVE-2023-52611": { + "cmt_msg": "wifi: rtw88: sdio: Honor the host max_req_size in the RX path" }, - "CVE-2023-28328": { - "cmt_msg": "media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer()", - "cmt_id": "7abfe467cd685f5da7ecb415441e45e3e4e2baa8" + "CVE-2023-52610": { + "cmt_msg": "net/sched: act_ct: fix skb leak and crash on ooo frags" }, - "CVE-2023-0394": { - "cmt_msg": "ipv6: raw: Deduct extension header length in rawv6_push_pending_frames", - "cmt_id": "f487d636e49bc1fdfbd8105bc1ab159164e2d8bd" + "CVE-2023-52612": { + "cmt_msg": "crypto: scomp - fix req->dst buffer overflow" }, - "CVE-2022-36280": { - "cmt_msg": "drm/vmwgfx: Validate the box size for the snooped cursor", - "cmt_id": "6b4e70a428b5a11f56db94047b68e144529fe512" - } - }, - "4.19.271": { - "CVE-2023-0458": { - "cmt_msg": "prlimit: do_prlimit needs to have a speculation check", - "cmt_id": "d3ee91e50a6b3c5a45398e3dcb912a8a264f575c" - } - }, - "4.19.272": { - "CVE-2023-1074": { - "cmt_msg": "sctp: fail if no bound addresses can be used for a given scope", - "cmt_id": "26436553aabfd9b40e1daa537a099bf5bb13fb55" + "CVE-2023-52619": { + "cmt_msg": "pstore/ram: Fix crash when setting number of cpus to an odd number" }, - "CVE-2023-3358": { - "cmt_msg": "HID: intel_ish-hid: Add check for ishtp_dma_tx_map", - "cmt_id": "cc906a3a4432da143ab3d2e894f99ddeff500cd3" + "CVE-2023-52618": { + "cmt_msg": "block/rnbd-srv: Check for unlikely string overflow" }, - "CVE-2023-23559": { - "cmt_msg": "wifi: rndis_wlan: Prevent buffer overflow in rndis_query_oid", - "cmt_id": "b4cc9d7ae9bed976de5463958afea2983b4ca57f" + "CVE-2022-23825": { + "cmt_msg": "" }, - "CVE-2023-1073": { - "cmt_msg": "HID: check empty report_list in hid_validate_values()", - "cmt_id": "f958da03d9a71808548b2e5418d95482b106eb9a" - } - }, - "4.19.273": { - "CVE-2023-3161": { - "cmt_msg": "fbcon: Check font dimension limits", - "cmt_id": "1c3d4901fad1db6a4e2dcdd6b13ed0ea22f227a1" + "CVE-2024-26592": { + "cmt_msg": "ksmbd: fix UAF issue in ksmbd_tcp_new_connection()" }, - "CVE-2023-26545": { - "cmt_msg": "net: mpls: fix stale pointer if allocation fails during device rename", - "cmt_id": "aa07c86e43ed8780d610ecfb2ce13da326729201" + "CVE-2024-26593": { + "cmt_msg": "i2c: i801: Fix block process call transactions" }, - "CVE-2023-1078": { - "cmt_msg": "rds: rds_rm_zerocopy_callback() use list_first_entry()", - "cmt_id": "909d5eef5ce792bb76d7b5a9b7a6852b813d8cac" + "CVE-2024-26590": { + "cmt_msg": "erofs: fix inconsistent per-file compression format" }, - "CVE-2023-1513": { - "cmt_msg": "kvm: initialize all of the kvm_debugregs structure before sending it to userspace", - "cmt_id": "669c76e55de332fbcbce5b74fccef1b4698a8936" + "CVE-2024-26591": { + "cmt_msg": "bpf: Fix re-attachment branch in bpf_tracing_prog_attach" }, - "CVE-2023-2162": { - "cmt_msg": "scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress", - "cmt_id": "6abd4698f4c8a78e7bbfc421205c060c199554a0" + "CVE-2020-15802": { + "cmt_msg": "" }, - "CVE-2023-3567": { - "cmt_msg": "vc_screen: move load of struct vc_data pointer in vcs_read() to avoid UAF", - "cmt_id": "6332f52f44b9776568bf3c0b714ddfb0bb175e78" + "CVE-2024-26597": { + "cmt_msg": "net: qualcomm: rmnet: fix global oob in rmnet_policy" }, - "CVE-2023-32269": { - "cmt_msg": "netrom: Fix use-after-free caused by accept on already connected socket", - "cmt_id": "2c1984d101978e979783bdb2376eb6eca9f8f627" - } - }, - "4.19.274": { - "CVE-2023-0459": { - "cmt_msg": "uaccess: Add speculation barrier to copy_from_user()", - "cmt_id": "f8e54da1c729cc23d9a7b7bd42379323e7fb7979" + "CVE-2024-26594": { + "cmt_msg": "ksmbd: validate mech token in session setup" }, - "CVE-2022-3707": { - "cmt_msg": "drm/i915/gvt: fix double free bug in split_2MB_gtt_entry", - "cmt_id": "c5245a6cf83ca5c4b68d643f8b31ed0eb127126e" - } - }, - "4.19.276": { - "CVE-2023-7192": { - "cmt_msg": "netfilter: ctnetlink: fix possible refcount leak in ctnetlink_create_conntrack()", - "cmt_id": "43b9a9c78e37a5532c2a9260dff9d9989f2bbb23" + "CVE-2024-26595": { + "cmt_msg": "mlxsw: spectrum_acl_tcam: Fix NULL pointer dereference in error path" }, - "CVE-2023-1829": { - "cmt_msg": "net/sched: Retire tcindex classifier", - "cmt_id": "01d0d2b8b4e3cf2110baba9371c0c3d04ad5c77b" + "CVE-2024-26598": { + "cmt_msg": "KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache" }, - "CVE-2023-3220": { - "cmt_msg": "drm/msm/dpu: Add check for pstates", - "cmt_id": "c746a0b9210cebb29511f01d2becf240408327bf" + "CVE-2024-26599": { + "cmt_msg": "pwm: Fix out-of-bounds access in of_pwm_single_xlate()" }, - "CVE-2023-2985": { - "cmt_msg": "fs: hfsplus: fix UAF issue in hfsplus_put_super", - "cmt_id": "e226f1fdcee1ca6e68233b132718deb578a84e38" + "CVE-2022-1247": { + "cmt_msg": "" }, - "CVE-2023-1079": { - "cmt_msg": "HID: asus: use spinlock to safely schedule workers", - "cmt_id": "74b78391a9b6f67de90b13f5a85e329e3b3f5a72" + "CVE-2023-51782": { + "cmt_msg": "net/rose: Fix Use-After-Free in rose_ioctl" }, - "CVE-2023-45862": { - "cmt_msg": "USB: ene_usb6250: Allocate enough memory for full object", - "cmt_id": "cef5e33d8b893891817236db819982f87943e8fd" + "CVE-2020-26140": { + "cmt_msg": "" }, - "CVE-2023-1118": { - "cmt_msg": "media: rc: Fix use-after-free bugs caused by ene_tx_irqsim()", - "cmt_id": "52bde2754d76fc97390f097fba763413607f157a" - } - }, - "4.19.279": { - "CVE-2023-1855": { - "cmt_msg": "hwmon: (xgene) Fix use after free bug in xgene_hwmon_remove due to race condition", - "cmt_id": "e0a37b43cd732038e37b4e7f6c6c0658fe0b6d73" + "CVE-2020-26143": { + "cmt_msg": "" }, - "CVE-2023-1990": { - "cmt_msg": "nfc: st-nci: Fix use after free bug in ndlc_remove due to race condition", - "cmt_id": "3405eb641dafcc8b28d174784b203c1622c121bf" - } - }, - "4.19.280": { - "CVE-2023-23454": { - "cmt_msg": "net: sched: cbq: dont intepret cls results when asked to drop", - "cmt_id": "8ed4c82571d848d76877c4d70687686e607766e3" + "CVE-2020-26142": { + "cmt_msg": "" }, - "CVE-2023-30772": { - "cmt_msg": "power: supply: da9150: Fix use after free bug in da9150_charger_remove due to race condition", - "cmt_id": "533d915899b4a5a7b5b5a99eec24b2920ccd1f11" + "CVE-2024-23849": { + "cmt_msg": "net/rds: Fix UBSAN: array-index-out-of-bounds in rds_cmsg_recv" }, - "CVE-2023-2483": { - "cmt_msg": "net: qcom/emac: Fix use after free bug in emac_remove due to race condition", - "cmt_id": "4bbc59ec4feb1ea8d5cb3d9d38d4cb1317943ea4" + "CVE-2024-23848": { + "cmt_msg": "" }, - "CVE-2023-33203": { - "cmt_msg": "net: qcom/emac: Fix use after free bug in emac_remove due to race condition", - "cmt_id": "4bbc59ec4feb1ea8d5cb3d9d38d4cb1317943ea4" + "CVE-2023-46838": { + "cmt_msg": "xen-netback: don't produce zero-size SKB frags" }, - "CVE-2022-4744": { - "cmt_msg": "tun: avoid double free in tun_free_netdev", - "cmt_id": "8eb43d635950e27c29f1e9e49a23b31637f37757" + "CVE-2024-26747": { + "cmt_msg": "usb: roles: fix NULL pointer issue when put module's reference" }, - "CVE-2023-1670": { - "cmt_msg": "xirc2ps_cs: Fix use after free bug in xirc2ps_detach", - "cmt_id": "526660c25d3b93b1232a525b75469048388f0928" + "CVE-2024-26746": { + "cmt_msg": "dmaengine: idxd: Ensure safe user copy of completion record" }, - "CVE-2023-1989": { - "cmt_msg": "Bluetooth: btsdio: fix use after free bug in btsdio_remove due to unfinished work", - "cmt_id": "af4d48754d5517d33bac5e504ff1f1de0808e29e" + "CVE-2024-26745": { + "cmt_msg": "powerpc/pseries/iommu: IOMMU table is not initialized for kdump over SR-IOV" }, - "CVE-2023-2194": { - "cmt_msg": "i2c: xgene-slimpro: Fix out-of-bounds bug in xgene_slimpro_i2c_xfer()", - "cmt_id": "5fc2b9485a8722c8350c3379992f5931ccfeaf98" + "CVE-2024-26744": { + "cmt_msg": "RDMA/srpt: Support specifying the srpt_service_guid parameter" }, - "CVE-2021-33631": { - "cmt_msg": "ext4: fix kernel BUG in 'ext4_write_inline_data_end()'", - "cmt_id": "53bb0d3e0a3dfc9649add8133f1ecd9c1bc2dd70" - } - }, - "4.19.281": { - "CVE-2023-30456": { - "cmt_msg": "KVM: nVMX: add missing consistency checks for CR0 and CR4", - "cmt_id": "495adb06518bb10f50e1aa1a1dbd5daa47d118f2" + "CVE-2024-26743": { + "cmt_msg": "RDMA/qedr: Fix qedr_create_user_qp error flow" }, - "CVE-2023-1859": { - "cmt_msg": "9p/xen : Fix use after free bug in xen_9pfs_front_remove due to race condition", - "cmt_id": "c078fcd3f00ea5eadad07da169956d84f65af49b" - } - }, - "4.19.282": { - "CVE-2023-31436": { - "cmt_msg": "net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg", - "cmt_id": "6ef8120262dfa63d9ec517d724e6f15591473a78" + "CVE-2024-26742": { + "cmt_msg": "scsi: smartpqi: Fix disable_managed_interrupts" }, - "CVE-2023-2513": { - "cmt_msg": "ext4: fix use-after-free in ext4_xattr_set_entry", - "cmt_id": "50c3bf3865da5b4c2fb3fedb79093d3ebcfcae21" + "CVE-2024-26741": { + "cmt_msg": "dccp/tcp: Unhash sk from ehash for tb2 alloc failure after check_estalblished()." }, - "CVE-2023-2248": { - "cmt_msg": "net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg", - "cmt_id": "6ef8120262dfa63d9ec517d724e6f15591473a78" - } - }, - "4.19.283": { - "CVE-2023-35828": { - "cmt_msg": "usb: gadget: udc: renesas_usb3: Fix use after free bug in renesas_usb3_remove due to race condition", - "cmt_id": "ad03fe033a71ed1fd2cb68a067198ae0e342f991" + "CVE-2024-26740": { + "cmt_msg": "net/sched: act_mirred: use the backlog for mirred ingress" }, - "CVE-2023-1380": { - "cmt_msg": "wifi: brcmfmac: slab-out-of-bounds read in brcmf_get_assoc_ies()", - "cmt_id": "39f9bd880abac6068bedb24a4e16e7bd26bf92da" + "CVE-2024-26749": { + "cmt_msg": "usb: cdns3: fixed memory use after free at cdns3_gadget_ep_disable()" }, - "CVE-2024-0775": { - "cmt_msg": "ext4: improve error recovery code paths in __ext4_remount()", - "cmt_id": "37302d4c2724dc92be5f90a3718eafa29834d586" + "CVE-2024-26748": { + "cmt_msg": "usb: cdns3: fix memory double free when handle zero packet" }, - "CVE-2023-35824": { - "cmt_msg": "media: dm1105: Fix use after free bug in dm1105_remove due to race condition", - "cmt_id": "722c156c6eab40a6e7dda98dfa66724f9d5aeceb" + "CVE-2024-26699": { + "cmt_msg": "drm/amd/display: Fix array-index-out-of-bounds in dcn35_clkmgr" }, - "CVE-2023-3268": { - "cmt_msg": "relayfs: fix out-of-bounds access in relay_file_read", - "cmt_id": "ed32488417669568308b65ba5d45799418f9ed49" + "CVE-2024-26698": { + "cmt_msg": "hv_netvsc: Fix race condition between netvsc_probe and netvsc_remove" }, - "CVE-2023-2269": { - "cmt_msg": "dm ioctl: fix nested locking in table_clear() to remove deadlock concern", - "cmt_id": "b4b94b25c78ed03be0e07fa4e76fe51e64dac533" + "CVE-2024-26691": { + "cmt_msg": "KVM: arm64: Fix circular locking dependency" }, - "CVE-2023-2002": { - "cmt_msg": "bluetooth: Perform careful capability checks in hci_sock_ioctl()", - "cmt_id": "8d59548bae309000442c297bff3e54ab535f0ab7" + "CVE-2024-26693": { + "cmt_msg": "wifi: iwlwifi: mvm: fix a crash when we run out of stations" }, - "CVE-2023-32233": { - "cmt_msg": "netfilter: nf_tables: deactivate anonymous set from preparation phase", - "cmt_id": "c6989314fd809c5eaf4980d6fa474f19fc653d6c" + "CVE-2024-26692": { + "cmt_msg": "smb: Fix regression in writes when non-standard maximum write size negotiated" }, - "CVE-2023-35823": { - "cmt_msg": "media: saa7134: fix use after free bug in saa7134_finidev due to race condition", - "cmt_id": "95e684340470a95ff4957cb9a536ec7a0461c75b" + "CVE-2024-0564": { + "cmt_msg": "" }, - "CVE-2023-34256": { - "cmt_msg": "ext4: avoid a potential slab-out-of-bounds in ext4_group_desc_csum", - "cmt_id": "a733c466cedd1013a41fd8908d5810f2c161072f" - } - }, - "4.19.284": { - "CVE-2023-3090": { - "cmt_msg": "ipvlan:Fix out-of-bounds caused by unclear skb->cb", - "cmt_id": "b36dcf3ed547c103acef6f52bed000a0ac6c074f" + "CVE-2024-26694": { + "cmt_msg": "wifi: iwlwifi: fix double-free bug" }, - "CVE-2023-3141": { - "cmt_msg": "memstick: r592: Fix UAF bug in r592_remove due to race condition", - "cmt_id": "dce890c3dfaf631d0a8ac79c2792911f9fc551fa" + "CVE-2024-26697": { + "cmt_msg": "nilfs2: fix data corruption in dsync block recovery for small block sizes" }, - "CVE-2022-34918": { - "cmt_msg": "netfilter: nf_tables: stricter validation of element data", - "cmt_id": "835fd72f61c6162f10471df197f0e4b92b1a7b76" - } - }, - "4.19.285": { - "CVE-2022-45887": { - "cmt_msg": "media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb()", - "cmt_id": "3e5af0745a4702ab0df2f880bfe0431eb30f9164" + "CVE-2024-26696": { + "cmt_msg": "nilfs2: fix hang in nilfs_lookup_dirty_data_buffers()" }, - "CVE-2022-45886": { - "cmt_msg": "media: dvb-core: Fix use-after-free due on race condition at dvb_net", - "cmt_id": "7bb9c6e05efcecb15b0354d574efbc36ca321d75" + "CVE-2005-3660": { + "cmt_msg": "" }, - "CVE-2023-35788": { - "cmt_msg": "net/sched: flower: fix possible OOB write in fl_set_geneve_opt()", - "cmt_id": "59a27414bb00e48c4153a8b794fb4e69910a6a1b" + "CVE-2023-31083": { + "cmt_msg": "Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO" }, - "CVE-2022-45919": { - "cmt_msg": "media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221", - "cmt_id": "8624c7e048fa9ba584b7ba43715090ab1aed765c" - } - }, - "4.19.286": { - "CVE-2023-3111": { - "cmt_msg": "btrfs: unset reloc control if transaction commit fails in prepare_to_relocate()", - "cmt_id": "dcb11fe0a0a9cca2b7425191b9bf30dc29f2ad0f" - } - }, - "4.19.287": { - "CVE-2023-3338": { - "cmt_msg": "Remove DECnet support from kernel", - "cmt_id": "3e77bbc87342841db66c18a3afca0441c8c555e4" - } - }, - "4.19.289": { - "CVE-2023-20593": { - "cmt_msg": "x86/cpu/amd: Add a Zenbleed fix", - "cmt_id": "cfef7bbf0dca27209ea5d82d7060d4fc2c0d72ea" - } - }, - "4.19.290": { - "CVE-2022-40982": { - "cmt_msg": "x86/speculation: Add Gather Data Sampling mitigation", - "cmt_id": "e81494b7259b6b1ab81a9f9be3385b4aa99a7a59" - } - }, - "4.19.291": { - "CVE-2023-4206": { - "cmt_msg": "net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free", - "cmt_id": "ad8f36f96696a7f1d191da66637c415959bab6d8" + "CVE-2023-31082": { + "cmt_msg": "" }, - "CVE-2023-51043": { - "cmt_msg": "drm/atomic: Fix potential use-after-free in nonblocking commits", - "cmt_id": "73a82b22963defa87204f0f9f44a534adf7f831a" + "CVE-2023-31081": { + "cmt_msg": "" }, - "CVE-2023-3390": { - "cmt_msg": "netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE", - "cmt_id": "798aa8da13782fe472aa48841c5570d7439339b8" + "CVE-2024-23307": { + "cmt_msg": "md/raid5: fix atomicity violation in raid5_cache_count" }, - "CVE-2023-1206": { - "cmt_msg": "tcp: Reduce chance of collisions in inet6_hashfn().", - "cmt_id": "8fa0dea2fc96f192d81a12434e48deda2e556320" + "CVE-2023-52498": { + "cmt_msg": "PM: sleep: Fix possible deadlocks in core system-wide PM code" }, - "CVE-2023-4128": { - "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free", - "cmt_id": "4aae24015ecd70d824a953e2dc5b0ca2c4769243" + "CVE-2023-52493": { + "cmt_msg": "bus: mhi: host: Drop chan lock before queuing buffers" }, - "CVE-2023-3611": { - "cmt_msg": "net/sched: sch_qfq: account for stab overhead in qfq_enqueue", - "cmt_id": "ee3bc829f9b4df96d208d58b654e400fa1f3b46c" + "CVE-2023-52492": { + "cmt_msg": "dmaengine: fix NULL pointer in channel unregistration function" }, - "CVE-2023-3212": { - "cmt_msg": "gfs2: Don't deref jdesc in evict", - "cmt_id": "d3af9cea9a1ce56f427e41e5ffcdafe9280f099f" + "CVE-2020-14304": { + "cmt_msg": "" }, - "CVE-2023-3609": { - "cmt_msg": "net/sched: cls_u32: Fix reference counter leak leading to overflow", - "cmt_id": "8ffaf24a377519e4396f03da5ccda082edae1ac9" + "CVE-2023-52490": { + "cmt_msg": "mm: migrate: fix getting incorrect page mapping during page migration" }, - "CVE-2023-4208": { - "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free", - "cmt_id": "4aae24015ecd70d824a953e2dc5b0ca2c4769243" + "CVE-2023-52497": { + "cmt_msg": "erofs: fix lz4 inplace decompression" }, - "CVE-2023-35001": { - "cmt_msg": "netfilter: nf_tables: prevent OOB access in nft_byteorder_eval", - "cmt_id": "025fd7efe2639773540a5e425b7bc0dc10b6b023" + "CVE-2023-52495": { + "cmt_msg": "soc: qcom: pmic_glink_altmode: fix port sanity check" }, - "CVE-2023-3776": { - "cmt_msg": "net/sched: cls_fw: Fix improper refcount update leads to use-after-free", - "cmt_id": "612f468cfc3df83777ae21058419b1fc8e9037eb" + "CVE-2023-52494": { + "cmt_msg": "bus: mhi: host: Add alignment check for event ring read pointer" }, - "CVE-2023-3117": { - "cmt_msg": "netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE", - "cmt_id": "798aa8da13782fe472aa48841c5570d7439339b8" + "CVE-2024-26629": { + "cmt_msg": "nfsd: fix RELEASE_LOCKOWNER" }, - "CVE-2023-40283": { - "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb", - "cmt_id": "82cdb2ccbe43337798393369f0ceb98699fe6037" + "CVE-2024-26654": { + "cmt_msg": "ALSA: sh: aica: reorder cleanup operations to avoid UAF bugs" }, - "CVE-2023-4132": { - "cmt_msg": "media: usb: siano: Fix warning due to null work_func_t function pointer", - "cmt_id": "54073c46cbbd2c0c03d6f7d481540cb95cf181a1" - } - }, - "4.19.293": { - "CVE-2023-39194": { - "cmt_msg": "net: xfrm: Fix xfrm_address_filter OOB read", - "cmt_id": "a695f0e724330773283a6d67e149363b89087f76" + "CVE-2024-26625": { + "cmt_msg": "llc: call sock_orphan() at release time" }, - "CVE-2023-1077": { - "cmt_msg": "sched/rt: pick_next_rt_entity(): check list_entry", - "cmt_id": "84d90fb72a053c034b018fcc3cfaa6f606faf1c6" + "CVE-2020-26560": { + "cmt_msg": "" }, - "CVE-2023-51042": { - "cmt_msg": "drm/amdgpu: Fix potential fence use-after-free v2", - "cmt_id": "f9da11d96bde3db277f061ac5a665c234d505787" + "CVE-2024-26620": { + "cmt_msg": "s390/vfio-ap: always filter entire AP matrix" }, - "CVE-2023-3772": { - "cmt_msg": "xfrm: add NULL check in xfrm_update_ae_params", - "cmt_id": "44f69c96f8a147413c23c68cda4d6fb5e23137cd" - } - }, - "4.19.295": { - "CVE-2023-4921": { - "cmt_msg": "net: sched: sch_qfq: Fix UAF in qfq_dequeue()", - "cmt_id": "7ea1faa59c75336d86893378838ed1e6f20c0520" + "CVE-2024-26622": { + "cmt_msg": "tomoyo: fix UAF write bug in tomoyo_write_control()" }, - "CVE-2023-4623": { - "cmt_msg": "net/sched: sch_hfsc: Ensure inner classes have fsc curve", - "cmt_id": "7c62e0c3c6e9c9c15ead63339db6a0e158d22a66" + "CVE-2024-26623": { + "cmt_msg": "pds_core: Prevent race issues involving the adminq" }, - "CVE-2023-42755": { - "cmt_msg": "net/sched: Retire rsvp classifier", - "cmt_id": "6ca0ea6a46e7a2d70fb1b1f6a886efe2b2365e16" + "CVE-2022-3238": { + "cmt_msg": "" }, - "CVE-2023-42752": { - "cmt_msg": "igmp: limit igmpv3_newpack() packet size to IP_MAX_MTU", - "cmt_id": "76ce657a5db97ff4e26b284fedc33e8591a4be17" + "CVE-2023-37454": { + "cmt_msg": "" }, - "CVE-2023-39189": { - "cmt_msg": "netfilter: nfnetlink_osf: avoid OOB read", - "cmt_id": "40d427ffccf9e60bd7288ea3748c066404a35622" + "CVE-2022-1116": { + "cmt_msg": "" }, - "CVE-2023-4207": { - "cmt_msg": "net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free", - "cmt_id": "4f38dc8496d1991e2c055a0068dd98fb48affcc6" + "CVE-2024-26603": { + "cmt_msg": "x86/fpu: Stop relying on userspace for info to fault in xsave buffer" }, - "CVE-2023-45871": { - "cmt_msg": "igb: set max size RX buffer when store bad packet is enabled", - "cmt_id": "981d0bc43e8d5482294432677e80a1d15f4b790d" + "CVE-2023-52585": { + "cmt_msg": "drm/amdgpu: Fix possible NULL dereference in amdgpu_ras_query_error_status_helper()" }, - "CVE-2023-39193": { - "cmt_msg": "netfilter: xt_sctp: validate the flag_info count", - "cmt_id": "f25dbfadaf525d854597c16420dd753ca47b9396" + "CVE-2023-52584": { + "cmt_msg": "spmi: mediatek: Fix UAF on device remove" }, - "CVE-2023-39192": { - "cmt_msg": "netfilter: xt_u32: validate user space input", - "cmt_id": "ddf190be80ef0677629416a128f9da91e5800d21" - } - }, - "4.19.296": { - "CVE-2023-31085": { - "cmt_msg": "ubi: Refuse attaching if mtd's erasesize is 0", - "cmt_id": "a0d71e9e61da8a85a46774c67549739e28fda795" - } - }, - "4.19.297": { - "CVE-2023-46343": { - "cmt_msg": "nfc: nci: fix possible NULL pointer dereference in send_acknowledge()", - "cmt_id": "5622592f8f74ae3e594379af02e64ea84772d0dd" + "CVE-2023-52587": { + "cmt_msg": "IB/ipoib: Fix mcast list locking" }, - "CVE-2023-5717": { - "cmt_msg": "perf: Disallow mis-matched inherited group reads", - "cmt_id": "a714491fa92d2068358dd603cc50bf2062517bd8" - } - }, - "4.19.298": { - "CVE-2021-44879": { - "cmt_msg": "f2fs: fix to do sanity check on inode type during garbage collection", - "cmt_id": "45c9da086dded78a12bc580f5bb012545a910803" + "CVE-2023-52586": { + "cmt_msg": "drm/msm/dpu: Add mutex lock in control vblank irq" }, - "CVE-2023-45863": { - "cmt_msg": "kobject: Fix slab-out-of-bounds in fill_kobj_path()", - "cmt_id": "0af6c6c15681cf80aeb85fcb3a1928c63aa89deb" - } - }, - "4.19.300": { - "CVE-2023-0590": { - "cmt_msg": "net: sched: fix race condition in qdisc_graft()", - "cmt_id": "f782929b90b5ac88d4445c853949d9efa6db6bae" - } - }, - "4.19.301": { - "CVE-2024-0584": { - "cmt_msg": "ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet", - "cmt_id": "6b6f5c6671fdfde9c94efe6409fa9f39436017e7" + "CVE-2023-52583": { + "cmt_msg": "ceph: fix deadlock or deadcode of misusing dget()" }, - "CVE-2023-6932": { - "cmt_msg": "ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet", - "cmt_id": "6b6f5c6671fdfde9c94efe6409fa9f39436017e7" - } - }, - "4.19.302": { - "CVE-2023-6931": { - "cmt_msg": "perf: Fix perf_event_validate_size()", - "cmt_id": "f5d6ab016792c9d6d5280fdb7f8962eb3b8c620e" - } - }, - "4.19.303": { - "CVE-2023-51782": { - "cmt_msg": "net/rose: Fix Use-After-Free in rose_ioctl", - "cmt_id": "6c9afea8827dde62c4062185d22ac035090ba39b" + "CVE-2024-26769": { + "cmt_msg": "nvmet-fc: avoid deadlock on delete association path" }, - "CVE-2023-51780": { - "cmt_msg": "atm: Fix Use-After-Free in do_vcc_ioctl", - "cmt_id": "bff7ddb0d9d515170dcf133d239dba87c47c8cdb" + "CVE-2023-52589": { + "cmt_msg": "media: rkisp1: Fix IRQ disable race issue" }, - "CVE-2023-51781": { - "cmt_msg": "appletalk: Fix Use-After-Free in atalk_ioctl", - "cmt_id": "580ff9f59ab6537d8ce1d0d9f012cf970553ef3d" - } - }, - "4.19.304": { - "CVE-2023-6606": { - "cmt_msg": "smb: client: fix OOB in smbCalcSize()", - "cmt_id": "89b6ae907c6bcc175bc95a67d6936217530a29ff" - } - }, - "4.19.305": { - "CVE-2023-6040": { - "cmt_msg": "netfilter: nf_tables: Reject tables of unsupported family", - "cmt_id": "087d38ae0fd5a9a41b949e97601b4b0d09336f19" + "CVE-2023-52588": { + "cmt_msg": "f2fs: fix to tag gcing flag on page during block migration" }, - "CVE-2023-52340": { - "cmt_msg": "ipv6: remove max_size check inline with ipv4", - "cmt_id": "95372b040ae689293c6863b90049f1af68410c8b" - } - }, - "4.19.306": { - "CVE-2024-26597": { - "cmt_msg": "net: qualcomm: rmnet: fix global oob in rmnet_policy", - "cmt_id": "093dab655808207f7a9f54cf156240aeafc70590" + "CVE-2024-26768": { + "cmt_msg": "LoongArch: Change acpi_core_pic[NR_CPUS] to acpi_core_pic[MAX_CORE_PIC]" }, - "CVE-2023-52464": { - "cmt_msg": "EDAC/thunderx: Fix possible out-of-bounds string access", - "cmt_id": "71c17ee02538802ceafc830f0736aa35b564e601" + "CVE-2024-26767": { + "cmt_msg": "drm/amd/display: fixed integer types and null check locations" }, - "CVE-2023-52443": { - "cmt_msg": "apparmor: avoid crash when parsed profile name is empty", - "cmt_id": "9286ee97aa4803d99185768735011d0d65827c9e" + "CVE-2023-6560": { + "cmt_msg": "io_uring: don't allow discontig pages for IORING_SETUP_NO_MMAP" }, - "CVE-2023-52444": { - "cmt_msg": "f2fs: fix to avoid dirent corruption", - "cmt_id": "02160112e6d45c2610b049df6eb693d7a2e57b46" + "CVE-2024-26763": { + "cmt_msg": "dm-crypt: don't modify the data when using authenticated encryption" }, - "CVE-2023-52445": { - "cmt_msg": "media: pvrusb2: fix use after free on context disconnection", - "cmt_id": "ec36c134dd020d28e312c2f1766f85525e747aab" + "CVE-2024-26795": { + "cmt_msg": "riscv: Sparse-Memory/vmemmap out-of-bounds fix" }, - "CVE-2023-52449": { - "cmt_msg": "mtd: Fix gluebi NULL pointer dereference caused by ftl notifier", - "cmt_id": "aeba358bcc8ffddf9b4a9bd0e5ec9eb338d46022" + "CVE-2024-26797": { + "cmt_msg": "drm/amd/display: Prevent potential buffer overflow in map_hw_resources" }, - "CVE-2023-52439": { - "cmt_msg": "uio: Fix use-after-free in uio_open", - "cmt_id": "3174e0f7de1ba392dc191625da83df02d695b60c" + "CVE-2024-26790": { + "cmt_msg": "dmaengine: fsl-qdma: fix SoC may hang on 16 byte unaligned read" }, - "CVE-2023-46838": { - "cmt_msg": "xen-netback: don't produce zero-size SKB frags", - "cmt_id": "5bb8270789c88c0e4ad78c0de2f274f2275c7f6c" + "CVE-2024-21803": { + "cmt_msg": "" }, - "CVE-2023-52451": { - "cmt_msg": "powerpc/pseries/memhp: Fix access beyond end of drmem array", - "cmt_id": "bb79613a9a704469ddb8d6c6029d532a5cea384c" + "CVE-2024-26793": { + "cmt_msg": "gtp: fix use-after-free and null-ptr-deref in gtp_newlink()" }, - "CVE-2023-52436": { - "cmt_msg": "f2fs: explicitly null-terminate the xattr list", - "cmt_id": "16ae3132ff7746894894927c1892493693b89135" - } - }, - "4.19.307": { - "CVE-2024-0607": { - "cmt_msg": "netfilter: nf_tables: fix pointer math issue in nft_byteorder_eval()", - "cmt_id": "fca41e5b687e029f69e3a35a2fa31e2560e538dc" + "CVE-2024-26798": { + "cmt_msg": "fbcon: always restore the old font data in fbcon_do_set_font()" }, - "CVE-2024-0340": { - "cmt_msg": "vhost: use kzalloc() instead of kmalloc() followed by memset()", - "cmt_id": "95eab1039625d54d1770665756dd34e9fe926638" + "CVE-2024-26799": { + "cmt_msg": "ASoC: qcom: Fix uninitialized pointer dmactl" }, - "CVE-2024-1086": { - "cmt_msg": "netfilter: nf_tables: reject QUEUE/DROP verdict parameters", - "cmt_id": "8365e9d92b85fda975a5ece7a3a139cb964018c8" + "CVE-2023-52429": { + "cmt_msg": "dm: limit the number of targets and parameter size area" }, - "CVE-2024-23849": { - "cmt_msg": "net/rds: Fix UBSAN: array-index-out-of-bounds in rds_cmsg_recv", - "cmt_id": "344350bfa3b4b37d7c3d5a00536e6fbf0e953fbf" - } - }, - "outstanding": { - "CVE-2021-0929": { - "cmt_msg": "staging/android/ion: delete dma_buf->kmap/unmap implemenation" + "CVE-2024-26677": { + "cmt_msg": "rxrpc: Fix delayed ACKs to not set the reference serial number" }, - "CVE-2023-3022": { - "cmt_msg": "ipv6: Use result arg in fib_lookup_arg consistently" + "CVE-2024-26676": { + "cmt_msg": "af_unix: Call kfree_skb() for dead unix_(sk)->oob_skb in GC." + }, + "CVE-2024-26675": { + "cmt_msg": "ppp_async: limit MRU to 64K" + }, + "CVE-2024-26674": { + "cmt_msg": "x86/lib: Revert to _ASM_EXTABLE_UA() for {get,put}_user() fixups" }, "CVE-2020-26556": { "cmt_msg": "" @@ -34323,206 +67348,395 @@ "CVE-2020-26557": { "cmt_msg": "" }, + "CVE-2024-26671": { + "cmt_msg": "blk-mq: fix IO hang from sbitmap wakeup race" + }, + "CVE-2024-26779": { + "cmt_msg": "wifi: mac80211: fix race condition on enabling fast-xmit" + }, + "CVE-2024-26776": { + "cmt_msg": "spi: hisi-sfc-v3xx: Return IRQ_NONE if no interrupts were detected" + }, + "CVE-2024-26777": { + "cmt_msg": "fbdev: sis: Error out if pixclock equals zero" + }, "CVE-2019-20794": { "cmt_msg": "" }, "CVE-2020-26559": { "cmt_msg": "" }, - "CVE-2020-35501": { + "CVE-2023-3397": { "cmt_msg": "" }, - "CVE-2022-0168": { - "cmt_msg": "cifs: fix NULL ptr dereference in smb2_ioctl_query_info()" + "CVE-2024-26773": { + "cmt_msg": "ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found()" }, - "CVE-2022-20424": { - "cmt_msg": "io_uring: remove io_identity" + "CVE-2024-26679": { + "cmt_msg": "inet: read sk->sk_family once in inet_recv_error()" + }, + "CVE-2024-26771": { + "cmt_msg": "dmaengine: ti: edma: Add some null pointer checks to the edma_probe" }, "CVE-2023-52458": { "cmt_msg": "block: add check that partition length needs to be aligned with block size" }, - "CVE-2018-20854": { - "cmt_msg": "phy: ocelot-serdes: fix out-of-bounds read" + "CVE-2023-52457": { + "cmt_msg": "serial: 8250: omap: Don't skip resource freeing if pm_runtime_resume_and_get() failed" }, "CVE-2018-1121": { "cmt_msg": "" }, - "CVE-2019-19378": { - "cmt_msg": "" + "CVE-2023-52455": { + "cmt_msg": "iommu: Don't reserve 0-length IOVA region" }, - "CVE-2023-3006": { - "cmt_msg": "arm64: Add AMPERE1 to the Spectre-BHB affected list" + "CVE-2023-52454": { + "cmt_msg": "nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length" }, - "CVE-2022-3061": { - "cmt_msg": "video: fbdev: i740fb: Error out if 'pixclock' equals zero" + "CVE-2023-28746": { + "cmt_msg": "x86/mmio: Disable KVM mitigation when X86_FEATURE_CLEAR_CPU_BUF is set" }, - "CVE-2022-3108": { - "cmt_msg": "drm/amdkfd: Check for null pointer after calling kmemdup" + "CVE-2023-52452": { + "cmt_msg": "bpf: Fix accesses to uninit stack slots" }, - "CVE-2022-47520": { - "cmt_msg": "wifi: wilc1000: validate pairwise and authentication suite offsets" + "CVE-2023-52451": { + "cmt_msg": "powerpc/pseries/memhp: Fix access beyond end of drmem array" }, - "CVE-2019-15794": { - "cmt_msg": "ovl: fix reference counting in ovl_mmap error path" + "CVE-2023-52450": { + "cmt_msg": "perf/x86/intel/uncore: Fix NULL pointer dereference issue in upi_fill_topology()" }, - "CVE-2022-3344": { - "cmt_msg": "KVM: x86: nSVM: harden svm_free_nested against freeing vmcb02 while still in use" + "CVE-2024-1085": { + "cmt_msg": "netfilter: nf_tables: check if catch-all set element is active in next generation" }, - "CVE-2019-2181": { - "cmt_msg": "binder: check for overflow when alloc for security context" + "CVE-2024-1086": { + "cmt_msg": "netfilter: nf_tables: reject QUEUE/DROP verdict parameters" }, - "CVE-2023-6915": { - "cmt_msg": "ida: Fix crash in ida_free when the bitmap is empty" + "CVE-2024-26708": { + "cmt_msg": "mptcp: really cope with fastopen race" }, - "CVE-2021-3759": { - "cmt_msg": "memcg: enable accounting of ipc resources" + "CVE-2024-26703": { + "cmt_msg": "tracing/timerlat: Move hrtimer_init to timerlat_fd open()" }, - "CVE-2020-27820": { - "cmt_msg": "drm/nouveau: use drm_dev_unplug() during device removal" + "CVE-2024-26702": { + "cmt_msg": "iio: magnetometer: rm3100: add boundary check for the value read from RM3100_REG_TMRC" }, - "CVE-2020-24503": { + "CVE-2023-6240": { "cmt_msg": "" }, - "CVE-2020-24502": { + "CVE-2024-26700": { + "cmt_msg": "drm/amd/display: Fix MST Null Ptr for RV" + }, + "CVE-2024-26707": { + "cmt_msg": "net: hsr: remove WARN_ONCE() in send_hsr_supervision_frame()" + }, + "CVE-2024-26706": { + "cmt_msg": "parisc: Fix random data corruption from exception handler" + }, + "CVE-2024-26704": { + "cmt_msg": "ext4: fix double-free of blocks due to wrong extents moved_len" + }, + "CVE-2024-26739": { + "cmt_msg": "net/sched: act_mirred: don't override retval if we already lost the skb" + }, + "CVE-2019-19814": { "cmt_msg": "" }, - "CVE-2023-39197": { - "cmt_msg": "netfilter: conntrack: dccp: copy entire header to stack buffer, not just basic one" + "CVE-2023-52621": { + "cmt_msg": "bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers" }, - "CVE-2019-19449": { - "cmt_msg": "f2fs: fix to do sanity check on segment/section count" + "CVE-2023-52622": { + "cmt_msg": "ext4: avoid online resizing failures due to oversized flex bg" }, - "CVE-2020-24504": { - "cmt_msg": "ice: create scheduler aggregator node config and move VSIs" + "CVE-2023-52623": { + "cmt_msg": "SUNRPC: Fix a suspicious RCU usage warning" }, - "CVE-2020-26541": { - "cmt_msg": "certs: Add EFI_CERT_X509_GUID support for dbx entries" + "CVE-2023-52624": { + "cmt_msg": "drm/amd/display: Wake DMCUB before executing GPINT commands" }, - "CVE-2023-6610": { - "cmt_msg": "smb: client: fix potential OOB in smb2_dump_detail()" + "CVE-2023-52625": { + "cmt_msg": "drm/amd/display: Refactor DMCUB enter/exit idle interface" }, - "CVE-2020-11725": { + "CVE-2023-52627": { + "cmt_msg": "iio: adc: ad7091r: Allow users to configure device events" + }, + "CVE-2021-26934": { "cmt_msg": "" }, - "CVE-2022-0382": { - "cmt_msg": "net ticp:fix a kernel-infoleak in __tipc_sendmsg()" + "CVE-2008-2544": { + "cmt_msg": "" }, - "CVE-2023-1249": { - "cmt_msg": "coredump: Use the vma snapshot in fill_files_note" + "CVE-2007-3719": { + "cmt_msg": "" }, - "CVE-2022-23825": { + "CVE-2023-21400": { "cmt_msg": "" }, - "CVE-2021-33061": { - "cmt_msg": "ixgbe: add improvement for MDD response functionality" + "CVE-2024-26581": { + "cmt_msg": "netfilter: nft_set_rbtree: skip end interval element from gc" }, - "CVE-2022-1263": { - "cmt_msg": "KVM: avoid NULL pointer dereference in kvm_dirty_ring_push" + "CVE-2024-26583": { + "cmt_msg": "tls: fix race between async notify and socket close" }, - "CVE-2023-1476": { + "CVE-2024-26582": { + "cmt_msg": "net: tls: fix use-after-free with partial reads and async decrypt" + }, + "CVE-2024-26585": { + "cmt_msg": "tls: fix race between tx work scheduling and socket close" + }, + "CVE-2024-26584": { + "cmt_msg": "net: tls: handle backlogging of crypto requests" + }, + "CVE-2024-26586": { + "cmt_msg": "mlxsw: spectrum_acl_tcam: Fix stack corruption" + }, + "CVE-2024-26589": { + "cmt_msg": "bpf: Reject variable offset alu on PTR_TO_FLOW_KEYS" + }, + "CVE-2024-26588": { + "cmt_msg": "LoongArch: BPF: Prevent out-of-bounds memory access" + }, + "CVE-2023-51780": { + "cmt_msg": "atm: Fix Use-After-Free in do_vcc_ioctl" + }, + "CVE-2023-51781": { + "cmt_msg": "appletalk: Fix Use-After-Free in atalk_ioctl" + }, + "CVE-2022-4543": { "cmt_msg": "" }, - "CVE-2023-4010": { + "CVE-2013-7445": { "cmt_msg": "" }, - "CVE-2019-15222": { - "cmt_msg": "ALSA: usb-audio: Fix gpf in snd_usb_pipe_sanity_check" + "CVE-2024-26733": { + "cmt_msg": "arp: Prevent overflow in arp_req_get()." }, - "CVE-2021-3864": { - "cmt_msg": "" + "CVE-2024-26731": { + "cmt_msg": "bpf, sockmap: Fix NULL pointer dereference in sk_psock_verdict_data_ready()" }, - "CVE-2019-19815": { - "cmt_msg": "f2fs: support swap file w/ DIO" + "CVE-2024-26736": { + "cmt_msg": "afs: Increase buffer size in afs_update_volume_status()" }, - "CVE-2019-19814": { + "CVE-2024-26737": { + "cmt_msg": "bpf: Fix racing between bpf_timer_cancel_and_free and bpf_timer_cancel" + }, + "CVE-2024-26734": { + "cmt_msg": "devlink: fix possible use-after-free and memory leaks in devlink_init()" + }, + "CVE-2024-26735": { + "cmt_msg": "ipv6: sr: fix possible use-after-free and null-ptr-deref" + }, + "CVE-2024-26738": { + "cmt_msg": "powerpc/pseries/iommu: DLPAR add doesn't completely initialize pci_controller" + }, + "CVE-2023-6238": { "cmt_msg": "" }, - "CVE-2022-2209": { + "CVE-2022-38096": { "cmt_msg": "" }, - "CVE-2019-19241": { - "cmt_msg": "io_uring: async workers should inherit the user creds" + "CVE-2024-26596": { + "cmt_msg": "net: dsa: fix netdev_priv() dereference before check on non-DSA netdevice events" }, - "CVE-2023-52429": { - "cmt_msg": "dm: limit the number of targets and parameter size area" + "CVE-2023-6931": { + "cmt_msg": "perf: Fix perf_event_validate_size()" }, - "CVE-2023-7042": { + "CVE-2023-6932": { + "cmt_msg": "ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet" + }, + "CVE-2024-26648": { + "cmt_msg": "drm/amd/display: Fix variable deferencing before NULL check in edp_setup_replay()" + }, + "CVE-2024-26649": { + "cmt_msg": "drm/amdgpu: Fix the null pointer when load rlc firmware" + }, + "CVE-2024-26646": { + "cmt_msg": "thermal: intel: hfi: Add syscore callbacks for system-wide PM" + }, + "CVE-2024-26647": { + "cmt_msg": "drm/amd/display: Fix late derefrence 'dsc' check in 'link_set_dsc_pps_packet()'" + }, + "CVE-2024-26644": { + "cmt_msg": "btrfs: don't abort filesystem when attempting to snapshot deleted subvolume" + }, + "CVE-2024-26645": { + "cmt_msg": "tracing: Ensure visibility when inserting an element into tracing_map" + }, + "CVE-2024-26642": { + "cmt_msg": "netfilter: nf_tables: disallow anonymous set with timeout flag" + }, + "CVE-2024-26643": { + "cmt_msg": "netfilter: nf_tables: mark set as dead when unbinding anonymous set with timeout" + }, + "CVE-2024-26640": { + "cmt_msg": "tcp: add sanity checks to rx zerocopy" + }, + "CVE-2024-26641": { + "cmt_msg": "ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv()" + }, + "CVE-2023-50431": { + "cmt_msg": "accel/habanalabs: fix information leak in sec_attest_info()" + }, + "CVE-2024-26791": { + "cmt_msg": "btrfs: dev-replace: properly validate device names" + }, + "CVE-2023-52467": { + "cmt_msg": "mfd: syscon: Fix null pointer dereference in of_syscon_register()" + }, + "CVE-2023-52464": { + "cmt_msg": "EDAC/thunderx: Fix possible out-of-bounds string access" + }, + "CVE-2023-52465": { + "cmt_msg": "power: supply: Fix null pointer dereference in smb2_probe" + }, + "CVE-2023-52462": { + "cmt_msg": "bpf: fix check for attempt to corrupt spilled pointer" + }, + "CVE-2023-52463": { + "cmt_msg": "efivarfs: force RO when remounting if SetVariable is not supported" + }, + "CVE-2022-25265": { "cmt_msg": "" }, - "CVE-2022-3595": { - "cmt_msg": "cifs: fix double-fault crash during ntlmssp" + "CVE-2023-52468": { + "cmt_msg": "class: fix use-after-free in class_register()" }, - "CVE-2021-26934": { + "CVE-2023-52469": { + "cmt_msg": "drivers/amd/pm: fix a use-after-free in kv_parse_power_table" + }, + "CVE-2024-26638": { + "cmt_msg": "nbd: always initialize struct msghdr completely" + }, + "CVE-2024-26633": { + "cmt_msg": "ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim()" + }, + "CVE-2024-26632": { + "cmt_msg": "block: Fix iterating over an empty bio with bio_for_each_folio_all" + }, + "CVE-2024-26631": { + "cmt_msg": "ipv6: mcast: fix data-race in ipv6_mc_down / mld_ifc_work" + }, + "CVE-2024-26630": { + "cmt_msg": "mm: cachestat: fix folio read-after-free in cache walk" + }, + "CVE-2024-26636": { + "cmt_msg": "llc: make llc_ui_sendmsg() more robust against bonding changes" + }, + "CVE-2024-26635": { + "cmt_msg": "llc: Drop support for ETH_P_TR_802_2." + }, + "CVE-2022-26878": { "cmt_msg": "" }, - "CVE-2022-3115": { - "cmt_msg": "drm: mali-dp: potential dereference of null pointer" + "CVE-2024-2193": { + "cmt_msg": "" }, - "CVE-2023-47233": { + "CVE-2018-12930": { "cmt_msg": "" }, - "CVE-2023-23000": { - "cmt_msg": "phy: tegra: xusb: Fix return value of tegra_xusb_find_port_node function" + "CVE-2023-52638": { + "cmt_msg": "can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock" }, - "CVE-2022-1789": { - "cmt_msg": "KVM: x86/mmu: fix NULL pointer dereference on guest INVPCID" + "CVE-2023-52637": { + "cmt_msg": "can: j1939: Fix UAF in j1939_sk_match_filter during setsockopt(SO_J1939_FILTER)" }, - "CVE-2024-23851": { - "cmt_msg": "dm: limit the number of targets and parameter size area" + "CVE-2024-22705": { + "cmt_msg": "ksmbd: fix slab-out-of-bounds in smb_strndup_from_utf16()" }, - "CVE-2016-8660": { - "cmt_msg": "" + "CVE-2024-26673": { + "cmt_msg": "netfilter: nft_ct: sanitize layer 3 and 4 protocol number in custom expectations" }, - "CVE-2023-0597": { - "cmt_msg": "x86/mm: Randomize per-cpu entry area" + "CVE-2024-26672": { + "cmt_msg": "drm/amdgpu: Fix variable 'mca_funcs' dereferenced before NULL check in 'amdgpu_mca_smu_get_mca_entry()'" }, - "CVE-2019-12379": { - "cmt_msg": "consolemap: Fix a memory leaking bug in drivers/tty/vt/consolemap.c" + "CVE-2024-26783": { + "cmt_msg": "mm/vmscan: fix a bug calling wakeup_kswapd() with a wrong zone index" }, - "CVE-2019-12378": { - "cmt_msg": "ipv6_sockglue: Fix a missing-check bug in ip6_ra_control()" + "CVE-2024-26782": { + "cmt_msg": "mptcp: fix double-free on socket dismantle" }, - "CVE-2023-1582": { - "cmt_msg": "fs/proc: task_mmu.c: don't read mapcount for migration entry" + "CVE-2024-26787": { + "cmt_msg": "mmc: mmci: stm32: fix DMA API overlapping mappings warning" }, - "CVE-2022-1786": { - "cmt_msg": "io_uring: remove io_identity" + "CVE-2024-26778": { + "cmt_msg": "fbdev: savage: Error out if pixclock equals zero" }, - "CVE-2024-26592": { - "cmt_msg": "ksmbd: fix UAF issue in ksmbd_tcp_new_connection()" + "CVE-2024-26784": { + "cmt_msg": "pmdomain: arm: Fix NULL dereference on scmi_perf_domain removal" }, - "CVE-2018-12929": { - "cmt_msg": "" + "CVE-2024-26789": { + "cmt_msg": "crypto: arm64/neonbs - fix out-of-bounds access on short input" }, - "CVE-2022-23222": { - "cmt_msg": "bpf: Replace PTR_TO_XXX_OR_NULL with PTR_TO_XXX | PTR_MAYBE_NULL" + "CVE-2024-26788": { + "cmt_msg": "dmaengine: fsl-qdma: init irq after reg initialization" }, - "CVE-2020-15802": { + "CVE-2024-0646": { + "cmt_msg": "net: tls, update curr on splice as well" + }, + "CVE-2024-22386": { "cmt_msg": "" }, - "CVE-2022-3522": { - "cmt_msg": "mm/hugetlb: use hugetlb_pte_stable in migration race check" + "CVE-2024-26774": { + "cmt_msg": "ext4: avoid dividing by 0 in mb_update_avg_fragment_size() when block bitmap corrupt" }, - "CVE-2008-2544": { + "CVE-2024-26602": { + "cmt_msg": "sched/membarrier: reduce the ability to hammer on sys_membarrier" + }, + "CVE-2023-6610": { + "cmt_msg": "smb: client: fix potential OOB in smb2_dump_detail()" + }, + "CVE-2024-26600": { + "cmt_msg": "phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP" + }, + "CVE-2024-26601": { + "cmt_msg": "ext4: regenerate buddy after block freeing failed if under fc replay" + }, + "CVE-2024-26606": { + "cmt_msg": "binder: signal epoll threads of self-work" + }, + "CVE-2024-26607": { + "cmt_msg": "drm/bridge: sii902x: Fix probing race issue" + }, + "CVE-2024-26765": { + "cmt_msg": "LoongArch: Disable IRQ before init_fn() for nonboot CPUs" + }, + "CVE-2024-26764": { + "cmt_msg": "fs/aio: Restrict kiocb_set_cancel_fn() to I/O submitted via libaio" + }, + "CVE-2024-26608": { + "cmt_msg": "ksmbd: fix global oob in ksmbd_nl_policy" + }, + "CVE-2024-26766": { + "cmt_msg": "IB/hfi1: Fix sdma.h tx->num_descs off-by-one error" + }, + "CVE-2024-26761": { + "cmt_msg": "cxl/pci: Fix disabling memory if DVSEC CXL Range does not match a CFMWS window" + }, + "CVE-2024-26760": { + "cmt_msg": "scsi: target: pscsi: Fix bio_put() for error case" + }, + "CVE-2023-1476": { "cmt_msg": "" }, - "CVE-2024-26595": { - "cmt_msg": "mlxsw: spectrum_acl_tcam: Fix NULL pointer dereference in error path" + "CVE-2021-3864": { + "cmt_msg": "" }, - "CVE-2022-3636": { - "cmt_msg": "net: ethernet: mtk_eth_soc: use after free in __mtk_ppe_check_skb()" + "CVE-2024-26770": { + "cmt_msg": "HID: nvidia-shield: Add missing null pointer checks to LED initialization" }, - "CVE-2024-26598": { - "cmt_msg": "KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache" + "CVE-2016-8660": { + "cmt_msg": "" }, - "CVE-2023-52457": { - "cmt_msg": "serial: 8250: omap: Don't skip resource freeing if pm_runtime_resume_and_get() failed" + "CVE-2023-6270": { + "cmt_msg": "aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts" }, - "CVE-2023-6356": { + "CVE-2008-4609": { "cmt_msg": "" }, - "CVE-2019-20908": { - "cmt_msg": "efi: Restrict efivar_ssdt_load when the kernel is locked down" + "CVE-2023-6356": { + "cmt_msg": "nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length" + }, + "CVE-2023-52639": { + "cmt_msg": "KVM: s390: vsie: fix race during shadow creation" }, "CVE-2023-52456": { "cmt_msg": "serial: imx: fix tx statemachine deadlock" @@ -34530,15676 +67744,16192 @@ "CVE-2019-15239": { "cmt_msg": "unknown" }, - "CVE-2022-3534": { - "cmt_msg": "libbpf: Fix use-after-free in btf_dump_name_dups" + "CVE-2023-52635": { + "cmt_msg": "PM / devfreq: Synchronize devfreq_monitor_[start/stop]" }, - "CVE-2007-3719": { - "cmt_msg": "" + "CVE-2023-52634": { + "cmt_msg": "drm/amd/display: Fix disable_otg_wa logic" }, - "CVE-2023-52434": { - "cmt_msg": "smb: client: fix potential OOBs in smb2_parse_contexts()" + "CVE-2023-52633": { + "cmt_msg": "um: time-travel: fix time corruption" }, - "CVE-2021-4037": { - "cmt_msg": "xfs: fix up non-directory creation in SGID directories" + "CVE-2023-52632": { + "cmt_msg": "drm/amdkfd: Fix lock dependency warning with srcu" }, - "CVE-2022-45884": { - "cmt_msg": "" + "CVE-2023-52631": { + "cmt_msg": "fs/ntfs3: Fix an NULL dereference bug" }, - "CVE-2022-2961": { + "CVE-2023-52630": { + "cmt_msg": "blk-iocost: Fix an UBSAN shift-out-of-bounds warning" + }, + "CVE-2023-20941": { "cmt_msg": "" }, - "CVE-2024-26586": { - "cmt_msg": "mlxsw: spectrum_acl_tcam: Fix stack corruption" + "CVE-2023-52453": { + "cmt_msg": "hisi_acc_vfio_pci: Update migration data pointer correctly on saving/resume" }, - "CVE-2023-51779": { - "cmt_msg": "Bluetooth: af_bluetooth: Fix Use-After-Free in bt_sock_recvmsg" + "CVE-2019-15290": { + "cmt_msg": "" }, - "CVE-2023-2007": { - "cmt_msg": "scsi: dpt_i2o: Remove obsolete driver" + "CVE-2022-3533": { + "cmt_msg": "" }, - "CVE-2020-26145": { - "cmt_msg": "ath10k: drop fragments with multicast DA for PCIe" + "CVE-2023-6121": { + "cmt_msg": "nvmet: nul-terminate the NQNs passed in the connect command" }, - "CVE-2022-29901": { - "cmt_msg": "x86/kvm/vmx: Make noinstr clean" + "CVE-2023-6622": { + "cmt_msg": "netfilter: nf_tables: bail out on mismatching dynset and set expressions" }, - "CVE-2010-4563": { + "CVE-2017-13693": { "cmt_msg": "" }, - "CVE-2020-26140": { + "CVE-2017-13694": { "cmt_msg": "" }, - "CVE-2020-26143": { + "CVE-2024-24859": { "cmt_msg": "" }, - "CVE-2020-26142": { + "CVE-2024-24858": { "cmt_msg": "" }, - "CVE-2023-1076": { - "cmt_msg": "tun: tun_chr_open(): correctly initialize socket uid" - }, - "CVE-2024-23848": { + "CVE-2024-24857": { "cmt_msg": "" }, - "CVE-2023-4622": { - "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES" + "CVE-2022-3544": { + "cmt_msg": "" }, - "CVE-2022-3533": { + "CVE-2020-0347": { "cmt_msg": "" }, - "CVE-2021-20177": { - "cmt_msg": "netfilter: add and use nf_hook_slow_list()" + "CVE-2024-0193": { + "cmt_msg": "netfilter: nf_tables: skip set commit for deleted/destroyed sets" }, - "CVE-2024-26584": { - "cmt_msg": "net: tls: handle backlogging of crypto requests" + "CVE-2019-12456": { + "cmt_msg": "" }, - "CVE-2024-26587": { - "cmt_msg": "net: netdevsim: don't try to destroy PHC on VFs" + "CVE-2024-26720": { + "cmt_msg": "mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again" }, - "CVE-2022-1247": { + "CVE-2024-26723": { + "cmt_msg": "lan966x: Fix crash when adding interface under a lag" + }, + "CVE-2018-12931": { "cmt_msg": "" }, - "CVE-2022-2991": { - "cmt_msg": "remove the lightnvm subsystem" + "CVE-2024-26727": { + "cmt_msg": "btrfs: do not ASSERT() if the newly created subvolume already got read" }, - "CVE-2024-26588": { - "cmt_msg": "LoongArch: BPF: Prevent out-of-bounds memory access" + "CVE-2024-26726": { + "cmt_msg": "btrfs: don't drop extent_map for free space inode on write error" }, - "CVE-2023-6270": { + "CVE-2022-3642": { "cmt_msg": "" }, - "CVE-2022-3624": { - "cmt_msg": "bonding: fix reference count leak in balance-alb mode" + "CVE-2024-0584": { + "cmt_msg": "ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet" }, - "CVE-2022-3625": { - "cmt_msg": "devlink: Fix use-after-free after a failed reload" + "CVE-2024-0582": { + "cmt_msg": "io_uring/kbuf: defer release of mapped buffer rings" }, - "CVE-2022-3606": { + "CVE-2019-15902": { + "cmt_msg": "unknown" + }, + "CVE-2024-25739": { "cmt_msg": "" }, - "CVE-2021-3669": { - "cmt_msg": "ipc: replace costly bailout check in sysvipc_find_ipc()" + "CVE-2023-6531": { + "cmt_msg": "io_uring/af_unix: disable sending io_uring over sockets" }, - "CVE-2020-10708": { + "CVE-2023-6535": { "cmt_msg": "" }, - "CVE-2023-0386": { - "cmt_msg": "ovl: fail on invalid uid/gid mapping at copy up" + "CVE-2023-6536": { + "cmt_msg": "nvmet-tcp: fix a crash in nvmet_req_complete()" }, - "CVE-2021-4023": { - "cmt_msg": "io-wq: fix cancellation on create-worker failure" + "CVE-2018-17977": { + "cmt_msg": "" }, - "CVE-2023-6121": { - "cmt_msg": "nvmet: nul-terminate the NQNs passed in the connect command" + "CVE-2024-1151": { + "cmt_msg": "net: openvswitch: limit the number of recursions from action sets" }, - "CVE-2022-4543": { - "cmt_msg": "" + "CVE-2024-26659": { + "cmt_msg": "xhci: handle isoc Babble and Buffer Overrun events properly" }, - "CVE-2024-22386": { + "CVE-2024-26658": { + "cmt_msg": "bcachefs: grab s_umount only if snapshotting" + }, + "CVE-2010-5321": { "cmt_msg": "" }, - "CVE-2019-19070": { - "cmt_msg": "spi: gpio: prevent memory leak in spi_gpio_probe" + "CVE-2024-26655": { + "cmt_msg": "Fix memory leak in posix_clock_open()" }, - "CVE-2017-13693": { + "CVE-2024-26695": { + "cmt_msg": "crypto: ccp - Fix null pointer dereference in __sev_platform_shutdown_locked" + }, + "CVE-2024-26656": { + "cmt_msg": "drm/amdgpu: fix use-after-free bug" + }, + "CVE-2024-26651": { + "cmt_msg": "sr9800: Add check for usbnet_get_endpoints" + }, + "CVE-2024-26650": { + "cmt_msg": "platform/x86: p2sb: Allow p2sb_bar() calls during PCI device probe" + }, + "CVE-2024-26652": { + "cmt_msg": "net: pds_core: Fix possible double free in error handling path" + }, + "CVE-2023-52470": { + "cmt_msg": "drm/radeon: check the alloc_workqueue return value in radeon_crtc_init()" + }, + "CVE-2023-52473": { + "cmt_msg": "thermal: core: Fix NULL pointer dereference in zone registration error path" + }, + "CVE-2023-52472": { + "cmt_msg": "crypto: rsa - add a check for allocation failure" + }, + "CVE-2021-3542": { "cmt_msg": "" }, - "CVE-2021-0399": { + "CVE-2018-12929": { "cmt_msg": "" }, - "CVE-2020-36691": { - "cmt_msg": "netlink: limit recursion depth in policy validation" + "CVE-2018-12928": { + "cmt_msg": "" }, - "CVE-2017-13694": { + "CVE-2020-10708": { "cmt_msg": "" }, - "CVE-2024-0564": { + "CVE-2023-32629": { "cmt_msg": "" }, - "CVE-2012-4542": { + "CVE-2022-0400": { "cmt_msg": "" }, - "CVE-2023-4881": { - "cmt_msg": "netfilter: nftables: exthdr: fix 4-byte stack OOB write" + "CVE-2024-26808": { + "cmt_msg": "netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain" }, - "CVE-2023-2176": { - "cmt_msg": "RDMA/core: Refactor rdma_bind_addr" + "CVE-2024-26809": { + "cmt_msg": "netfilter: nft_set_pipapo: release elements in clone only from destroy path" }, - "CVE-2023-2177": { - "cmt_msg": "sctp: leave the err path free in sctp_stream_init to sctp_stream_free" + "CVE-2024-26804": { + "cmt_msg": "net: ip_tunnel: prevent perpetual headroom growth" }, - "CVE-2013-7445": { - "cmt_msg": "" + "CVE-2024-26805": { + "cmt_msg": "netlink: Fix kernel-infoleak-after-free in __skb_datagram_iter" }, - "CVE-2022-39189": { - "cmt_msg": "KVM: x86: do not report a vCPU as preempted outside instruction boundaries" + "CVE-2024-26806": { + "cmt_msg": "spi: cadence-qspi: remove system-wide suspend helper calls from runtime PM hooks" }, - "CVE-2022-39188": { - "cmt_msg": "mmu_gather: Force tlb-flush VM_PFNMAP vmas" + "CVE-2024-26807": { + "cmt_msg": "spi: cadence-qspi: fix pointer reference in runtime PM hooks" }, - "CVE-2022-27672": { - "cmt_msg": "x86/speculation: Identify processors vulnerable to SMT RSB predictions" + "CVE-2024-26801": { + "cmt_msg": "Bluetooth: Avoid potential use-after-free in hci_error_reset" }, - "CVE-2023-52435": { - "cmt_msg": "net: prevent mss overflow in skb_segment()" + "CVE-2024-26802": { + "cmt_msg": "stmmac: Clear variable when destroying workqueue" }, - "CVE-2024-24859": { - "cmt_msg": "" + "CVE-2024-26803": { + "cmt_msg": "net: veth: clear GRO when clearing XDP even when down" }, - "CVE-2024-24858": { - "cmt_msg": "" + "CVE-2023-52606": { + "cmt_msg": "powerpc/lib: Validate size for vector operations" }, - "CVE-2005-3660": { + "CVE-2023-52607": { + "cmt_msg": "powerpc/mm: Fix null-pointer dereference in pgtable_cache_add" + }, + "CVE-2023-52604": { + "cmt_msg": "FS:JFS:UBSAN:array-index-out-of-bounds in dbAdjTree" + }, + "CVE-2023-52602": { + "cmt_msg": "jfs: fix slab-out-of-bounds Read in dtSearch" + }, + "CVE-2023-52603": { + "cmt_msg": "UBSAN: array-index-out-of-bounds in dtSplitRoot" + }, + "CVE-2023-52600": { + "cmt_msg": "jfs: fix uaf in jfs_evict_inode" + }, + "CVE-2023-52601": { + "cmt_msg": "jfs: fix array-index-out-of-bounds in dbAdjTree" + }, + "CVE-2023-52608": { + "cmt_msg": "firmware: arm_scmi: Check mailbox/SMT channel for consistency" + }, + "CVE-2023-52609": { + "cmt_msg": "binder: fix race between mmput() and do_exit()" + }, + "CVE-2023-3640": { "cmt_msg": "" }, - "CVE-2024-24855": { - "cmt_msg": "scsi: lpfc: Fix a possible data race in lpfc_unregister_fcf_rescan()" + "CVE-2023-4010": { + "cmt_msg": "" }, - "CVE-2024-24857": { + "CVE-2019-19378": { "cmt_msg": "" }, - "CVE-2023-31084": { - "cmt_msg": "media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*()" + "CVE-2020-24503": { + "cmt_msg": "" }, - "CVE-2023-31083": { - "cmt_msg": "Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO" + "CVE-2020-24502": { + "cmt_msg": "" }, - "CVE-2023-31082": { + "CVE-2020-11725": { "cmt_msg": "" }, - "CVE-2023-31081": { + "CVE-2022-3606": { "cmt_msg": "" }, - "CVE-2022-38096": { + "CVE-2022-2209": { "cmt_msg": "" }, - "CVE-2024-26591": { - "cmt_msg": "bpf: Fix re-attachment branch in bpf_tracing_prog_attach" + "CVE-2024-26775": { + "cmt_msg": "aoe: avoid potential deadlock at set_capacity" }, - "CVE-2022-3903": { - "cmt_msg": "media: mceusb: Use new usb_control_msg_*() routines" + "CVE-2023-7042": { + "cmt_msg": "wifi: ath10k: fix NULL pointer dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev()" }, - "CVE-2022-3523": { - "cmt_msg": "mm/memory.c: fix race when faulting a device private page" + "CVE-2023-47233": { + "cmt_msg": "wifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach" }, - "CVE-2022-44032": { - "cmt_msg": "char: pcmcia: remove all the drivers" + "CVE-2024-23850": { + "cmt_msg": "btrfs: do not ASSERT() if the newly created subvolume already got read" }, - "CVE-2024-23307": { - "cmt_msg": "" + "CVE-2024-23851": { + "cmt_msg": "dm: limit the number of targets and parameter size area" }, - "CVE-2022-3303": { - "cmt_msg": "ALSA: pcm: oss: Fix race at SNDCTL_DSP_SYNC" + "CVE-2024-26772": { + "cmt_msg": "ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal()" }, - "CVE-2023-28466": { - "cmt_msg": "net: tls: fix possible race condition between do_tls_getsockopt_conf() and do_tls_setsockopt_conf()" + "CVE-2024-26758": { + "cmt_msg": "md: Don't ignore suspended array in md_check_recovery()" }, - "CVE-2022-36402": { - "cmt_msg": "drm/vmwgfx: Fix shader stage validation" + "CVE-2024-26610": { + "cmt_msg": "wifi: iwlwifi: fix a memory corruption" }, - "CVE-2023-5178": { - "cmt_msg": "nvmet-tcp: Fix a possible UAF in queue intialization setup" + "CVE-2024-26612": { + "cmt_msg": "netfs, fscache: Prevent Oops in fscache_put_cache()" }, - "CVE-2008-4609": { - "cmt_msg": "" + "CVE-2024-26615": { + "cmt_msg": "net/smc: fix illegal rmb_desc access in SMC-D connection dump" }, - "CVE-2021-4150": { - "cmt_msg": "block: fix incorrect references to disk objects" + "CVE-2024-26614": { + "cmt_msg": "tcp: make sure init the accept_queue's spinlocks once" }, - "CVE-2022-20148": { - "cmt_msg": "f2fs: fix UAF in f2fs_available_free_memory" + "CVE-2024-26616": { + "cmt_msg": "btrfs: scrub: avoid use-after-free when chunk length is not 64K aligned" }, - "CVE-2020-14304": { + "CVE-2024-26618": { + "cmt_msg": "arm64/sme: Always exit sme_alloc() early with existing storage" + }, + "CVE-2024-26752": { + "cmt_msg": "l2tp: pass correct message length to ip6_append_data" + }, + "CVE-2024-26753": { + "cmt_msg": "crypto: virtio/akcipher - Fix stack overflow on memcpy" + }, + "CVE-2024-26754": { + "cmt_msg": "gtp: fix use-after-free and null-ptr-deref in gtp_genl_dump_pdp()" + }, + "CVE-2024-26756": { + "cmt_msg": "md: Don't register sync_thread for reshape directly" + }, + "CVE-2024-26757": { + "cmt_msg": "md: Don't ignore read-only array in md_check_recovery()" + }, + "CVE-2023-52439": { + "cmt_msg": "uio: Fix use-after-free in uio_open" + }, + "CVE-2023-52438": { + "cmt_msg": "binder: fix use-after-free in shinker's callback" + }, + "CVE-2023-52435": { + "cmt_msg": "net: prevent mss overflow in skb_segment()" + }, + "CVE-2023-52434": { + "cmt_msg": "smb: client: fix potential OOBs in smb2_parse_contexts()" + }, + "CVE-2023-52436": { + "cmt_msg": "f2fs: explicitly null-terminate the xattr list" + }, + "CVE-2024-26688": { + "cmt_msg": "fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super" + }, + "CVE-2024-26689": { + "cmt_msg": "ceph: prevent use-after-free in encode_cap_msg()" + }, + "CVE-2022-2961": { "cmt_msg": "" }, - "CVE-2020-0347": { + "CVE-2024-26680": { + "cmt_msg": "net: atlantic: Fix DMA mapping for PTP hwts ring" + }, + "CVE-2024-26681": { + "cmt_msg": "netdevsim: avoid potential loop in nsim_dev_trap_report_work()" + }, + "CVE-2024-26686": { + "cmt_msg": "fs/proc: do_task_stat: use sig->stats_lock to gather the threads/children stats" + }, + "CVE-2024-26687": { + "cmt_msg": "xen/events: close evtchn after mapping cleanup" + }, + "CVE-2023-51779": { + "cmt_msg": "Bluetooth: af_bluetooth: Fix Use-After-Free in bt_sock_recvmsg" + }, + "CVE-2024-26685": { + "cmt_msg": "nilfs2: fix potential bug in end_buffer_async_write" + }, + "CVE-2023-2640": { "cmt_msg": "" }, - "CVE-2021-29155": { - "cmt_msg": "bpf: Use correct permission flag for mixed signed bounds arithmetic" + "CVE-2023-6915": { + "cmt_msg": "ida: Fix crash in ida_free when the bitmap is empty" }, - "CVE-2021-3714": { + "CVE-2010-4563": { "cmt_msg": "" }, - "CVE-2019-12455": { - "cmt_msg": "clk-sunxi: fix a missing-check bug in sunxi_divs_clk_setup()" + "CVE-2023-26242": { + "cmt_msg": "" }, - "CVE-2019-12456": { + "CVE-2019-16089": { "cmt_msg": "" }, - "CVE-2020-26560": { + "CVE-2023-52640": { + "cmt_msg": "fs/ntfs3: Fix oob in ntfs_listxattr" + }, + "CVE-2023-52641": { + "cmt_msg": "fs/ntfs3: Add NULL ptr dereference checking at the end of attr_allocate_frame()" + }, + "CVE-2021-0399": { "cmt_msg": "" }, - "CVE-2021-3892": { + "CVE-2023-52488": { + "cmt_msg": "serial: sc16is7xx: convert from _raw_ to _noinc_ regmap functions for FIFO" + }, + "CVE-2023-52489": { + "cmt_msg": "mm/sparsemem: fix race in accessing memory_section->usage" + }, + "CVE-2023-52485": { + "cmt_msg": "drm/amd/display: Wake DMCUB before sending a command" + }, + "CVE-2023-52486": { + "cmt_msg": "drm: Don't unref the same fb many times by mistake due to deadlock handling" + }, + "CVE-2023-52487": { + "cmt_msg": "net/mlx5e: Fix peer flow lists handling" + }, + "CVE-2012-4542": { "cmt_msg": "" }, - "CVE-2023-4134": { - "cmt_msg": "Input: cyttsp4_core - change del_timer_sync() to timer_shutdown_sync()" + "CVE-2023-52491": { + "cmt_msg": "media: mtk-jpeg: Fix use after free bug due to error path handling in mtk_jpeg_dec_device_run" }, - "CVE-2023-39198": { - "cmt_msg": "drm/qxl: fix UAF on handle creation" + "CVE-2024-26759": { + "cmt_msg": "mm/swap: fix race when skipping swapcache" }, - "CVE-2020-12362": { - "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" + "CVE-2023-6606": { + "cmt_msg": "smb: client: fix OOB in smbCalcSize()" }, - "CVE-2020-12363": { - "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" + "CVE-2021-3714": { + "cmt_msg": "" }, - "CVE-2022-4129": { - "cmt_msg": "l2tp: Serialize access to sk_user_data with sk_callback_lock" + "CVE-2024-26751": { + "cmt_msg": "ARM: ep93xx: Add terminator to gpiod_lookup_table" }, - "CVE-2020-12364": { - "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" + "CVE-2021-3892": { + "cmt_msg": "" }, "CVE-2024-24860": { "cmt_msg": "Bluetooth: Fix atomicity violation in {min,max}_key_size_set" }, "CVE-2024-24861": { - "cmt_msg": "" + "cmt_msg": "media: xc4000: Fix atomicity violation in xc4000_get_frequency" }, "CVE-2024-24864": { "cmt_msg": "" }, - "CVE-2022-45885": { - "cmt_msg": "" + "CVE-2023-52596": { + "cmt_msg": "sysctl: Fix out of bounds access for empty sysctl registers" }, - "CVE-2023-37454": { - "cmt_msg": "" + "CVE-2023-52597": { + "cmt_msg": "KVM: s390: fix setting of fpc register" }, - "CVE-2022-0480": { - "cmt_msg": "memcg: enable accounting for file lock caches" + "CVE-2023-52594": { + "cmt_msg": "wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus()" }, - "CVE-2022-3642": { - "cmt_msg": "" + "CVE-2023-52595": { + "cmt_msg": "wifi: rt2x00: restart beacon queue when hardware reset" }, - "CVE-2023-6240": { - "cmt_msg": "" + "CVE-2023-52593": { + "cmt_msg": "wifi: wfx: fix possible NULL pointer dereference in wfx_set_mfp_ap()" }, - "CVE-2024-0565": { - "cmt_msg": "smb: client: fix OOB in receive_encrypted_standard()" + "CVE-2023-52590": { + "cmt_msg": "ocfs2: Avoid touching renamed directory if parent does not change" }, - "CVE-2020-26141": { - "cmt_msg": "ath10k: Fix TKIP Michael MIC verification for PCIe" + "CVE-2023-52591": { + "cmt_msg": "reiserfs: Avoid touching renamed directory if parent does not change" }, - "CVE-2022-25265": { - "cmt_msg": "" + "CVE-2023-52598": { + "cmt_msg": "s390/ptrace: handle setting of fpc register correctly" }, - "CVE-2021-4218": { - "cmt_msg": "sysctl: pass kernel pointers to ->proc_handler" + "CVE-2023-52599": { + "cmt_msg": "jfs: fix array-index-out-of-bounds in diNewExt" }, - "CVE-2022-3567": { - "cmt_msg": "ipv6: Fix data races around sk->sk_prot." + "CVE-2024-26627": { + "cmt_msg": "scsi: core: Move scsi_host_busy() out of host lock for waking up EH handler" + }, + "CVE-2023-52446": { + "cmt_msg": "bpf: Fix a race condition between btf_put() and map_free()" }, "CVE-2011-4916": { "cmt_msg": "" }, - "CVE-2024-25739": { + "CVE-2024-0841": { + "cmt_msg": "fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super" + }, + "CVE-2022-41848": { "cmt_msg": "" }, - "CVE-2023-33288": { - "cmt_msg": "power: supply: bq24190: Fix use after free bug in bq24190_remove due to race condition" + "CVE-2021-39801": { + "cmt_msg": "" }, - "CVE-2022-29900": { - "cmt_msg": "x86/kvm/vmx: Make noinstr clean" + "CVE-2021-39800": { + "cmt_msg": "" }, - "CVE-2019-15290": { + "CVE-2024-22099": { + "cmt_msg": "Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security" + }, + "CVE-2022-45885": { "cmt_msg": "" }, - "CVE-2023-6535": { + "CVE-2022-45884": { "cmt_msg": "" }, - "CVE-2023-6536": { + "CVE-2024-25740": { "cmt_msg": "" }, - "CVE-2020-15780": { - "cmt_msg": "ACPI: configfs: Disallow loading ACPI tables when locked down" + "CVE-2024-25741": { + "cmt_msg": "" }, - "CVE-2023-34255": { - "cmt_msg": "xfs: verify buffer contents when we skip log replay" + "CVE-2024-25744": { + "cmt_msg": "x86/coco: Disable 32-bit emulation by default on TDX and SEV" }, - "CVE-2022-3566": { - "cmt_msg": "tcp: Fix data races around icsk->icsk_af_ops." + "CVE-2023-6817": { + "cmt_msg": "netfilter: nft_set_pipapo: skip inactive elements during set walk" }, - "CVE-2018-17977": { - "cmt_msg": "" + "CVE-2024-26668": { + "cmt_msg": "netfilter: nft_limit: reject configurations that cause integer overflow" }, - "CVE-2024-1151": { - "cmt_msg": "net: openvswitch: limit the number of recursions from action sets" + "CVE-2024-26669": { + "cmt_msg": "net/sched: flower: Fix chain template offload" }, - "CVE-2022-41848": { + "CVE-2020-25220": { "cmt_msg": "" }, - "CVE-2022-1116": { + "CVE-2015-2877": { "cmt_msg": "" }, - "CVE-2010-5321": { - "cmt_msg": "" + "CVE-2024-26660": { + "cmt_msg": "drm/amd/display: Implement bounds check for stream encoder creation in DCN301" }, - "CVE-2018-12930": { - "cmt_msg": "" + "CVE-2024-26661": { + "cmt_msg": "drm/amd/display: Add NULL test for 'timing generator' in 'dcn21_set_pipe()'" }, - "CVE-2018-12931": { - "cmt_msg": "" + "CVE-2024-26662": { + "cmt_msg": "drm/amd/display: Fix 'panel_cntl' could be null in 'dcn21_set_backlight_level()'" }, - "CVE-2022-23816": { - "cmt_msg": "x86/kvm/vmx: Make noinstr clean" + "CVE-2024-26663": { + "cmt_msg": "tipc: Check the bearer type before calling tipc_udp_nl_bearer_add()" }, - "CVE-2023-35827": { - "cmt_msg": "ravb: Fix use-after-free issue in ravb_tx_timeout_work()" + "CVE-2024-26664": { + "cmt_msg": "hwmon: (coretemp) Fix out-of-bounds memory access" }, - "CVE-2023-3397": { - "cmt_msg": "" + "CVE-2024-26665": { + "cmt_msg": "tunnels: fix out of bounds access when building IPv6 PMTU error" }, - "CVE-2024-23196": { + "CVE-2024-26666": { + "cmt_msg": "wifi: mac80211: fix RCU use in TDLS fast-xmit" + }, + "CVE-2024-26667": { + "cmt_msg": "drm/msm/dpu: check for valid hw_pp in dpu_encoder_helper_phys_cleanup" + }, + "CVE-2024-0565": { + "cmt_msg": "smb: client: fix OOB in receive_encrypted_standard()" + }, + "CVE-2021-3847": { "cmt_msg": "" }, - "CVE-2023-6546": { - "cmt_msg": "tty: n_gsm: fix the UAF caused by race condition in gsm_cleanup_mux" + "CVE-2023-52443": { + "cmt_msg": "apparmor: avoid crash when parsed profile name is empty" }, - "CVE-2021-39801": { + "CVE-2023-52444": { + "cmt_msg": "f2fs: fix to avoid dirent corruption" + }, + "CVE-2023-52445": { + "cmt_msg": "media: pvrusb2: fix use after free on context disconnection" + }, + "CVE-2011-4917": { "cmt_msg": "" }, - "CVE-2021-39800": { + "CVE-2023-52447": { + "cmt_msg": "bpf: Defer the free of inner map when necessary" + }, + "CVE-2023-52448": { + "cmt_msg": "gfs2: Fix kernel NULL pointer dereference in gfs2_rgrp_dump" + }, + "CVE-2023-52449": { + "cmt_msg": "mtd: Fix gluebi NULL pointer dereference caused by ftl notifier" + }, + "CVE-2023-23039": { "cmt_msg": "" }, - "CVE-2022-3169": { - "cmt_msg": "nvme: ensure subsystem reset is single threaded" + "CVE-2024-26718": { + "cmt_msg": "dm-crypt, dm-verity: disable tasklets" }, - "CVE-2022-4269": { - "cmt_msg": "act_mirred: use the backlog for nested calls to mirred ingress" + "CVE-2024-26719": { + "cmt_msg": "nouveau: offload fence uevents work to workqueue" }, - "CVE-2020-36385": { - "cmt_msg": "RDMA/ucma: Rework ucma_migrate_id() to avoid races with destroy" + "CVE-2024-26714": { + "cmt_msg": "interconnect: qcom: sc8180x: Mark CO0 BCM keepalive" }, - "CVE-2022-20166": { - "cmt_msg": "drivers core: Use sysfs_emit and sysfs_emit_at for show(device *...) functions" + "CVE-2024-26715": { + "cmt_msg": "usb: dwc3: gadget: Fix NULL pointer dereference in dwc3_gadget_suspend" }, - "CVE-2024-22099": { - "cmt_msg": "" + "CVE-2024-26716": { + "cmt_msg": "usb: core: Prevent null pointer dereference in update_port_device_state" }, - "CVE-2019-12380": { - "cmt_msg": "efi/x86/Add missing error handling to old_memmap 1:1 mapping code" + "CVE-2024-26717": { + "cmt_msg": "HID: i2c-hid-of: fix NULL-deref on failed power up" }, - "CVE-2019-12381": { - "cmt_msg": "ip_sockglue: Fix missing-check bug in ip_ra_control()" + "CVE-2024-26711": { + "cmt_msg": "iio: adc: ad4130: zero-initialize clock init data" }, - "CVE-2024-25740": { - "cmt_msg": "" + "CVE-2024-26712": { + "cmt_msg": "powerpc/kasan: Fix addr error caused by page alignment" }, - "CVE-2024-25741": { - "cmt_msg": "" + "CVE-2024-26713": { + "cmt_msg": "powerpc/pseries/iommu: Fix iommu initialisation during DLPAR add" + } + } + }, + "6.4": { + "6.4": { + "CVE-2023-52620": { + "cmt_msg": "netfilter: nf_tables: disallow timeout for anonymous sets", + "cmt_id": "e26d3009efda338f19016df4175f354a9bd0a4ab" }, - "CVE-2023-22995": { - "cmt_msg": "usb: dwc3: dwc3-qcom: Add missing platform_device_put() in dwc3_qcom_acpi_register_core" + "CVE-2023-38432": { + "cmt_msg": "ksmbd: validate command payload size", + "cmt_id": "2b9b8f3b68edb3d67d79962f02e26dbb5ae3808d" }, - "CVE-2024-21803": { - "cmt_msg": "" + "CVE-2023-3610": { + "cmt_msg": "netfilter: nf_tables: fix chain binding transaction logic", + "cmt_id": "4bedf9eee016286c835e3d8fa981ddece5338795" + }, + "CVE-2023-3865": { + "cmt_msg": "ksmbd: fix out-of-bound read in smb2_write", + "cmt_id": "5fe7f7b78290638806211046a99f031ff26164e1" + }, + "CVE-2023-3866": { + "cmt_msg": "ksmbd: validate session id and tree id in the compound request", + "cmt_id": "5005bcb4219156f1bf7587b185080ec1da08518e" + }, + "CVE-2023-4610": { + "cmt_msg": "Revert \"mm: vmscan: make global slab shrink lockless\"", + "cmt_id": "71c3ad65fabec9620d3f548b2da948c79c7ad9d5" + } + }, + "6.4.1": { + "CVE-2023-3269": { + "cmt_msg": "mm: introduce new 'lock_mm_and_find_vma()' page fault helper", + "cmt_id": "b11fa3d22ac0fbc0bfaa740b3b3669d43ec48503" + } + }, + "6.4.4": { + "CVE-2023-31248": { + "cmt_msg": "netfilter: nf_tables: do not ignore genmask when looking up chain by id", + "cmt_id": "5e5e967e8505fbdabfb6497367ec1b808cadc356" + }, + "CVE-2023-33250": { + "cmt_msg": "iommufd: Call iopt_area_contig_done() under the lock", + "cmt_id": "dbe65261fe1367dc307a89466a1a75c0d80b8233" + }, + "CVE-2024-0639": { + "cmt_msg": "sctp: fix potential deadlock on &net->sctp.addr_wq_lock", + "cmt_id": "f8d77336af38e71435f92c5f271fd0b40f33fe66" + }, + "CVE-2023-2898": { + "cmt_msg": "f2fs: fix to avoid NULL pointer dereference f2fs_write_end_io()", + "cmt_id": "5619e9aabbd2b369cde2114ad6f55f6eb3e0b5be" + }, + "CVE-2023-4134": { + "cmt_msg": "Input: cyttsp4_core - change del_timer_sync() to timer_shutdown_sync()", + "cmt_id": "28dc11949357f10712bd641b724ab373a92318de" + }, + "CVE-2023-4132": { + "cmt_msg": "media: usb: siano: Fix warning due to null work_func_t function pointer", + "cmt_id": "ae65238d3f5a2df48341a7112820e04fb1017422" + }, + "CVE-2023-35001": { + "cmt_msg": "netfilter: nf_tables: prevent OOB access in nft_byteorder_eval", + "cmt_id": "b79c09c2bf2d7643902a6ef26152de602c5c5e4b" + }, + "CVE-2023-39197": { + "cmt_msg": "netfilter: conntrack: dccp: copy entire header to stack buffer, not just basic one", + "cmt_id": "8c0980493beed3a80d6329c44ab293dc8c032927" + }, + "CVE-2023-3863": { + "cmt_msg": "net: nfc: Fix use-after-free caused by nfc_llcp_find_local", + "cmt_id": "e5207c1d69b1a9707615ab6ff9376e59fc096815" + } + }, + "6.4.5": { + "CVE-2023-51043": { + "cmt_msg": "drm/atomic: Fix potential use-after-free in nonblocking commits", + "cmt_id": "328f520540db49a7ab40db2835b5027a30bcd6ce" + }, + "CVE-2023-3867": { + "cmt_msg": "ksmbd: add missing compound request handing in some commands", + "cmt_id": "ffaa0c85edd9245594a94918c09db9163b71767a" + }, + "CVE-2023-3611": { + "cmt_msg": "net/sched: sch_qfq: account for stab overhead in qfq_enqueue", + "cmt_id": "bd2333fa86dc520823e8c317980b29ba91ee6b87" + }, + "CVE-2023-3776": { + "cmt_msg": "net/sched: cls_fw: Fix improper refcount update leads to use-after-free", + "cmt_id": "0a2e3f49febda459252f58cec2d659623d582800" + }, + "CVE-2023-44466": { + "cmt_msg": "libceph: harden msgr2.1 frame segment length checks", + "cmt_id": "0a6db56467773851e4ea4d652308314d8f9c4f91" + } + }, + "6.4.6": { + "CVE-2023-20593": { + "cmt_msg": "x86/cpu/amd: Add a Zenbleed fix", + "cmt_id": "9b8bb5c4e25678af895dc9dd4a1e82b2f948cacc" + } + }, + "6.4.7": { + "CVE-2023-3777": { + "cmt_msg": "netfilter: nf_tables: skip bound chain on rule flush", + "cmt_id": "ab87c6b43822a56ae0aadc715364b5f8d4a96037" + }, + "CVE-2023-4004": { + "cmt_msg": "netfilter: nft_set_pipapo: fix improper element removal", + "cmt_id": "48dbb5d24c667bf26bc2fea8caa7fe51fcc6aa62" + } + }, + "6.4.8": { + "CVE-2023-4015": { + "cmt_msg": "netfilter: nf_tables: skip immediate deactivate in _PREPARE_ERROR", + "cmt_id": "027d00132487bcf2a4ee7493bb8de9d6331d48e3" + }, + "CVE-2023-4147": { + "cmt_msg": "netfilter: nf_tables: disallow rule addition to bound chain via NFTA_RULE_CHAIN_ID", + "cmt_id": "14448359681062bf51d9c67e0264869548b79853" + }, + "CVE-2023-1206": { + "cmt_msg": "tcp: Reduce chance of collisions in inet6_hashfn().", + "cmt_id": "1e50c11ed44e28a57c6215a5e7643ae85c6297fa" + }, + "CVE-2023-4611": { + "cmt_msg": "mm/mempolicy: Take VMA lock before replacing policy", + "cmt_id": "e872d6b6ea4947fb87f0d6ea1ef814019dbed89e" + } + }, + "6.4.9": { + "CVE-2022-40982": { + "cmt_msg": "x86/speculation: Add Gather Data Sampling mitigation", + "cmt_id": "ff0642207e24f9a7011e8982ab7da1e16db75a38" + }, + "CVE-2023-34319": { + "cmt_msg": "xen/netback: Fix buffer overrun triggered by unusual packet", + "cmt_id": "cf482893f721f76ac60c0a43482a59b2f194156b" + }, + "CVE-2023-20569": { + "cmt_msg": "x86/bugs: Increase the x86 bugs vector size to two u32s", + "cmt_id": "d351cc7c14a6e2af73bfea4aa5ee093321f4c307" + } + }, + "6.4.10": { + "CVE-2023-20588": { + "cmt_msg": "x86/CPU/AMD: Do not leak quotient data after a division by 0", + "cmt_id": "c9c0b889e2d33d49b06bb716b95a192ed3449173" + }, + "CVE-2023-4194": { + "cmt_msg": "net: tun_chr_open(): set sk_uid from current_fsuid()", + "cmt_id": "36161e7d40e7293d7f213e16d881042d15c8a53a" + }, + "CVE-2023-4128": { + "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free", + "cmt_id": "4b717802428fa02cbcbb61209f638f65f9cd4710" + }, + "CVE-2023-4208": { + "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free", + "cmt_id": "4b717802428fa02cbcbb61209f638f65f9cd4710" + }, + "CVE-2023-6039": { + "cmt_msg": "net: usb: lan78xx: reorder cleanup operations to avoid UAF bugs", + "cmt_id": "a54bf862ccad27c8b91795b69a9ca105f8e6295e" + }, + "CVE-2023-4206": { + "cmt_msg": "net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free", + "cmt_id": "a836184b670f59e24d3a0f7c07115ec6e6ce6900" + }, + "CVE-2023-4207": { + "cmt_msg": "net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free", + "cmt_id": "7d848d718aeb3b482e177b682dd04e76dd413afb" + }, + "CVE-2023-4273": { + "cmt_msg": "exfat: check if filename entries exceeds max filename length", + "cmt_id": "e1a73ba43cf883cb37f6331aca5a4c5be6350982" }, - "CVE-2022-21499": { - "cmt_msg": "lockdown: also lock down previous kgdb use" + "CVE-2023-40283": { + "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb", + "cmt_id": "10426afe65c8bf7b24dd0c7be4dcc65f86fc99f9" }, - "CVE-2022-41222": { - "cmt_msg": "mm/mremap: hold the rmap lock in write mode when moving page table entries." + "CVE-2024-1312": { + "cmt_msg": "mm: lock_vma_under_rcu() must check vma->anon_vma under vma lock", + "cmt_id": "93a0b7d43de51b38c4c91d4121e447018132119a" + } + }, + "6.4.11": { + "CVE-2023-4155": { + "cmt_msg": "KVM: SEV: only access GHCB fields once", + "cmt_id": "ab8e9a874574ce511eca21caa5d7ef5426963a54" }, - "CVE-2020-7053": { - "cmt_msg": "drm/i915: Introduce a mutex for file_priv->context_idr" + "CVE-2023-4563": { + "cmt_msg": "netfilter: nf_tables: don't skip expired elements during walk", + "cmt_id": "bd156ce9553dcaf2d6ee2c825d1a5a1718e86524" + } + }, + "6.4.12": { + "CVE-2023-4569": { + "cmt_msg": "netfilter: nf_tables: deactivate catchall elements in next generation", + "cmt_id": "83ff16e449a675e215125d97a2c4a7f097d291d0" }, - "CVE-2023-2124": { - "cmt_msg": "xfs: verify buffer contents when we skip log replay" + "CVE-2023-51042": { + "cmt_msg": "drm/amdgpu: Fix potential fence use-after-free v2", + "cmt_id": "f5db29ce2502c4fc8a33ed7989950ba43875e322" }, - "CVE-2024-26594": { - "cmt_msg": "ksmbd: validate mech token in session setup" + "CVE-2023-40791": { + "cmt_msg": "crypto, cifs: fix error handling in extract_iter_to_sg()", + "cmt_id": "0ba71114c3af9fa44a474d16a12cecd12e3779b9" }, - "CVE-2021-3542": { - "cmt_msg": "" + "CVE-2024-23196": { + "cmt_msg": "ALSA: hda: fix a possible null-pointer dereference due to data race in snd_hdac_regmap_sync()", + "cmt_id": "b32e40379e5b2814de0c4bc199edc2d82317dc07" }, - "CVE-2023-1281": { - "cmt_msg": "net/sched: tcindex: update imperfect hash filters respecting rcu" + "CVE-2023-6546": { + "cmt_msg": "tty: n_gsm: fix the UAF caused by race condition in gsm_cleanup_mux", + "cmt_id": "f40e70d7f40bd44ecf6f35b946a899e59744fbe1" }, - "CVE-2023-3863": { - "cmt_msg": "net: nfc: Fix use-after-free caused by nfc_llcp_find_local" + "CVE-2023-4244": { + "cmt_msg": "netfilter: nf_tables: fix GC transaction races with netns and netlink event exit path", + "cmt_id": "3bdf400a1ad166274e85fa537f8a993a4553e36d" }, - "CVE-2020-12656": { - "cmt_msg": "sunrpc: check that domain table is empty at module unload." + "CVE-2023-39198": { + "cmt_msg": "drm/qxl: fix UAF on handle creation", + "cmt_id": "a79aebe5bb68266ce9c7f8714fad166a3216460d" }, - "CVE-2023-0030": { - "cmt_msg": "drm/nouveau/mmu: add more general vmm free/node handling functions" + "CVE-2023-39194": { + "cmt_msg": "net: xfrm: Fix xfrm_address_filter OOB read", + "cmt_id": "5713c7ca31f563a493281c25cbdbd3f4ef53a9e9" }, - "CVE-2020-16120": { - "cmt_msg": "ovl: switch to mounter creds in readdir" + "CVE-2023-3773": { + "cmt_msg": "xfrm: add forgotten nla_policy for XFRMA_MTIMER_THRESH", + "cmt_id": "a9020514f175ef15bb68eea9345782abfd9afea3" }, - "CVE-2018-12928": { - "cmt_msg": "" + "CVE-2023-3772": { + "cmt_msg": "xfrm: add NULL check in xfrm_update_ae_params", + "cmt_id": "53df4be4f5221e90dc7aa9ce745a9a21bb7024f4" + } + }, + "6.4.13": { + "CVE-2022-36402": { + "cmt_msg": "drm/vmwgfx: Fix shader stage validation", + "cmt_id": "5574b0cbb493f3b3cbb2c381e8e1dac52a70213f" + } + }, + "6.4.15": { + "CVE-2023-52440": { + "cmt_msg": "ksmbd: fix slub overflow in ksmbd_decode_ntlmssp_auth_blob()", + "cmt_id": "7f1d6cb0eb6af3a8088dc24b7ddee9a9711538c4" + } + }, + "6.4.16": { + "CVE-2023-4623": { + "cmt_msg": "net/sched: sch_hfsc: Ensure inner classes have fsc curve", + "cmt_id": "5293f466d41d6c2eaad8b833576ea3dbee630dc2" }, - "CVE-2019-0149": { - "cmt_msg": "i40e: Add bounds check for ch[] array" + "CVE-2023-52442": { + "cmt_msg": "ksmbd: validate session id and tree id in compound request", + "cmt_id": "4c2b350b2e269e3fd17bbfa42de1b42775b777ac" }, - "CVE-2020-36310": { - "cmt_msg": "KVM: SVM: avoid infinite loop on NPF from bad address" + "CVE-2023-25775": { + "cmt_msg": "RDMA/irdma: Prevent zero-length STAG registration", + "cmt_id": "ceba966f1d6391800cab3c1c9ac1661b5166bc5b" }, - "CVE-2020-36313": { - "cmt_msg": "KVM: Fix out of range accesses to memslots" + "CVE-2023-52441": { + "cmt_msg": "ksmbd: fix out of bounds in init_smb2_rsp_hdr()", + "cmt_id": "aa669ef229ae8dd779da9caa24e254964545895f" }, - "CVE-2015-2877": { - "cmt_msg": "" + "CVE-2023-37453": { + "cmt_msg": "USB: core: Fix race by not overwriting udev->descriptor in hub_port_init()", + "cmt_id": "b4a074b1fb222164ed7d5c0b8c922dc4a0840848" }, - "CVE-2023-1611": { - "cmt_msg": "btrfs: fix race between quota disable and quota assign ioctls" + "CVE-2023-42753": { + "cmt_msg": "netfilter: ipset: add the missing IP_SET_HASH_WITH_NET0 macro for ip_set_hash_netportnet.c", + "cmt_id": "d59b6fc405549f7caf31f6aa5da1d6bef746b166" }, - "CVE-2023-26242": { - "cmt_msg": "" + "CVE-2023-42752": { + "cmt_msg": "igmp: limit igmpv3_newpack() packet size to IP_MAX_MTU", + "cmt_id": "87f07ec534e39e29bc715753df2e77509e8fafc3" }, - "CVE-2023-20588": { - "cmt_msg": "x86/CPU/AMD: Do not leak quotient data after a division by 0" + "CVE-2023-45871": { + "cmt_msg": "igb: set max size RX buffer when store bad packet is enabled", + "cmt_id": "6a9abbccaac418e965f42e8a8f6dd826e341a6f9" }, - "CVE-2019-16089": { - "cmt_msg": "" + "CVE-2023-39193": { + "cmt_msg": "netfilter: xt_sctp: validate the flag_info count", + "cmt_id": "b63b4e114593073a1c25087526782258c9dd5347" }, - "CVE-2022-0400": { + "CVE-2023-39192": { + "cmt_msg": "netfilter: xt_u32: validate user space input", + "cmt_id": "83b995321eaaa0176041d9d79c7d0415cb6ed7e1" + } + }, + "outstanding": { + "CVE-2020-35501": { "cmt_msg": "" }, - "CVE-2022-44034": { - "cmt_msg": "char: pcmcia: remove all the drivers" - }, - "CVE-2022-44033": { - "cmt_msg": "char: pcmcia: remove all the drivers" + "CVE-2023-6176": { + "cmt_msg": "net/tls: do not free tls_rec on async operation in bpf_exec_tx_verdict()" }, - "CVE-2019-11191": { - "cmt_msg": "x86: Deprecate a.out support" + "CVE-2024-26684": { + "cmt_msg": "net: stmmac: xgmac: fix handling of DPP safety error for DMA channels" }, - "CVE-2023-20569": { - "cmt_msg": "x86/bugs: Increase the x86 bugs vector size to two u32s" + "CVE-2023-52615": { + "cmt_msg": "hwrng: core - Fix page fault dead lock on mmap-ed hwrng" }, - "CVE-2021-3847": { - "cmt_msg": "" + "CVE-2023-52614": { + "cmt_msg": "PM / devfreq: Fix buffer overflow in trans_stat_show" }, - "CVE-2023-20941": { - "cmt_msg": "" + "CVE-2023-52617": { + "cmt_msg": "PCI: switchtec: Fix stdev_release() crash after surprise hot remove" }, - "CVE-2023-52442": { - "cmt_msg": "ksmbd: validate session id and tree id in compound request" + "CVE-2023-52616": { + "cmt_msg": "crypto: lib/mpi - Fix unexpected pointer access in mpi_ec_init" }, - "CVE-2022-1280": { - "cmt_msg": "drm: avoid circular locks in drm_mode_getconnector" + "CVE-2023-52611": { + "cmt_msg": "wifi: rtw88: sdio: Honor the host max_req_size in the RX path" }, - "CVE-2024-25744": { - "cmt_msg": "x86/coco: Disable 32-bit emulation by default on TDX and SEV" + "CVE-2023-52610": { + "cmt_msg": "net/sched: act_ct: fix skb leak and crash on ooo frags" }, - "CVE-2011-4917": { - "cmt_msg": "" + "CVE-2023-52612": { + "cmt_msg": "crypto: scomp - fix req->dst buffer overflow" }, - "CVE-2019-18680": { - "cmt_msg": "" + "CVE-2023-52619": { + "cmt_msg": "pstore/ram: Fix crash when setting number of cpus to an odd number" }, - "CVE-2021-32078": { - "cmt_msg": "ARM: footbridge: remove personal server platform" + "CVE-2023-52618": { + "cmt_msg": "block/rnbd-srv: Check for unlikely string overflow" }, - "CVE-2023-4133": { - "cmt_msg": "cxgb4: fix use after free bugs caused by circular dependency problem" + "CVE-2023-5717": { + "cmt_msg": "perf: Disallow mis-matched inherited group reads" }, - "CVE-2023-23039": { + "CVE-2022-23825": { "cmt_msg": "" }, - "CVE-2019-10220": { - "cmt_msg": "Convert filldir[64]() from __put_user() to unsafe_put_user()" - }, - "CVE-2020-27835": { - "cmt_msg": "IB/hfi1: Ensure correct mm is used at all times" + "CVE-2023-5158": { + "cmt_msg": "vringh: don't use vringh_kiov_advance() in vringh_iov_xfer()" }, - "CVE-2019-5489": { - "cmt_msg": "Change mincore() to count \"mapped\" pages rather than \"cached\" pages" + "CVE-2024-26592": { + "cmt_msg": "ksmbd: fix UAF issue in ksmbd_tcp_new_connection()" }, - "CVE-2024-1312": { - "cmt_msg": "mm: lock_vma_under_rcu() must check vma->anon_vma under vma lock" + "CVE-2024-26593": { + "cmt_msg": "i2c: i801: Fix block process call transactions" }, - "CVE-2023-3640": { - "cmt_msg": "" - } - } - }, - "4.18": { - "4.18-rc1": { - "CVE-2019-19083": { - "cmt_msg": "drm/amd/display: memory leak", - "cmt_id": "9ea29a1f8b9da52d8eca8b0996f1d84eac548d3b" - } - }, - "4.18.1": { - "CVE-2018-3646": { - "cmt_msg": "x86/microcode: Allow late microcode loading with SMT disabled", - "cmt_id": "abf914eefa19098727455f11acd895c57621a822" + "CVE-2024-26590": { + "cmt_msg": "erofs: fix inconsistent per-file compression format" }, - "CVE-2018-3620": { - "cmt_msg": "x86/microcode: Allow late microcode loading with SMT disabled", - "cmt_id": "abf914eefa19098727455f11acd895c57621a822" + "CVE-2024-26591": { + "cmt_msg": "bpf: Fix re-attachment branch in bpf_tracing_prog_attach" }, - "CVE-2018-15572": { - "cmt_msg": "x86/speculation: Protect against userspace-userspace spectreRSB", - "cmt_id": "f8a0aeefc2f6e1bfd6653fcc30453ce7e582fac8" + "CVE-2020-15802": { + "cmt_msg": "" }, - "CVE-2018-15594": { - "cmt_msg": "x86/paravirt: Fix spectre-v2 mitigations for paravirt guests", - "cmt_id": "b13b271933eea6161e741825487d6e73e800bedf" - } - }, - "4.18.2": { - "CVE-2018-9363": { - "cmt_msg": "Bluetooth: hidp: buffer overflow in hidp_process_report", - "cmt_id": "f47e3431b15ae9cae8acc0fdf20fc083422c9f61" - } - }, - "4.18.5": { - "CVE-2018-3693": { - "cmt_msg": "ext4: fix spectre gadget in ext4_mb_regular_allocator()", - "cmt_id": "5b6ea348768d5b26adeeef384971820e24710ad0" - } - }, - "4.18.6": { - "CVE-2018-16658": { - "cmt_msg": "cdrom: Fix info leak/OOB read in cdrom_ioctl_drive_status", - "cmt_id": "6575b15002bfe33cc8345c6b6c3845365e154c85" + "CVE-2024-26597": { + "cmt_msg": "net: qualcomm: rmnet: fix global oob in rmnet_policy" }, - "CVE-2018-14656": { - "cmt_msg": "x86/dumpstack: Don't dump kernel memory based on usermode RIP", - "cmt_id": "8e6d15678656e3770e7d3720600a41a02d9a841f" - } - }, - "4.18.7": { - "CVE-2018-20855": { - "cmt_msg": "IB/mlx5: Fix leaking stack memory to userspace", - "cmt_id": "103a3a62e0fbe718f2c85f029544163f332d19d3" + "CVE-2024-26594": { + "cmt_msg": "ksmbd: validate mech token in session setup" }, - "CVE-2018-20856": { - "cmt_msg": "block: blk_init_allocated_queue() set q->fq as NULL in the fail case", - "cmt_id": "cde67159df4d6faab6816f7847219eb2b29f3c8b" - } - }, - "4.18.8": { - "CVE-2018-14617": { - "cmt_msg": "hfsplus: fix NULL dereference in hfsplus_lookup()", - "cmt_id": "d30de7347e2993a99a647fa5887ed227466e17ab" + "CVE-2024-26595": { + "cmt_msg": "mlxsw: spectrum_acl_tcam: Fix NULL pointer dereference in error path" }, - "CVE-2018-14612": { - "cmt_msg": "btrfs: tree-checker: Detect invalid and empty essential trees", - "cmt_id": "4fb2799b05c2358453eaf25c9a1352d35e13b9cf" + "CVE-2024-26598": { + "cmt_msg": "KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache" }, - "CVE-2018-14609": { - "cmt_msg": "btrfs: relocation: Only remove reloc rb_trees if reloc control has been initialized", - "cmt_id": "13b0dbef7dd51d845f17fd43fef46f356283b797" - } - }, - "4.18.9": { - "CVE-2018-13100": { - "cmt_msg": "f2fs: fix to do sanity check with secs_per_zone", - "cmt_id": "0342426f2bf7298a91efee659ddc033082f6918b" + "CVE-2024-26599": { + "cmt_msg": "pwm: Fix out-of-bounds access in of_pwm_single_xlate()" }, - "CVE-2018-13098": { - "cmt_msg": "f2fs: fix to do sanity check with extra_attr feature", - "cmt_id": "b6f493453c78311598fdd204f7815e683818512a" + "CVE-2019-15902": { + "cmt_msg": "unknown" }, - "CVE-2018-13099": { - "cmt_msg": "f2fs: fix to do sanity check with reserved blkaddr of inline inode", - "cmt_id": "235fd393825b8b79d962eb2f9a2d6aa454eb17a5" + "CVE-2023-52510": { + "cmt_msg": "ieee802154: ca8210: Fix a potential UAF in ca8210_probe" }, - "CVE-2018-17182": { - "cmt_msg": "mm: get rid of vmacache_flush_all() entirely", - "cmt_id": "175ad0cbd818529ec1d642531c51af6006660b7f" - } - }, - "4.18.11": { - "CVE-2018-20511": { - "cmt_msg": "net/appletalk: fix minor pointer leak to userspace in SIOCFINDIPDDPRT", - "cmt_id": "6a9c934f04e6e6351742eb68a6899b964e1d01b5" + "CVE-2022-1247": { + "cmt_msg": "" }, - "CVE-2018-14633": { - "cmt_msg": "scsi: target: iscsi: Use hex2bin instead of a re-implementation", - "cmt_id": "8e31c95fe08501af201f4e8470af1f68d52d6e7e" - } - }, - "4.18.12": { - "CVE-2019-9458": { - "cmt_msg": "media: v4l: event: Prevent freeing event subscriptions while accessed", - "cmt_id": "c483061d46103aa34daa8e53545a8a3f8cde5c2d" + "CVE-2023-51782": { + "cmt_msg": "net/rose: Fix Use-After-Free in rose_ioctl" }, - "CVE-2018-18021": { - "cmt_msg": "arm64: KVM: Tighten guest core register access from userspace", - "cmt_id": "4435064439c68cfa80a7a1ec69733db7b9030884" + "CVE-2020-26140": { + "cmt_msg": "" }, - "CVE-2018-7755": { - "cmt_msg": "floppy: Do not copy a kernel pointer to user memory in FDGETPRM ioctl", - "cmt_id": "0051646c2cc2fbb9ff134a80775c0dc23baa7d35" + "CVE-2020-26143": { + "cmt_msg": "" }, - "CVE-2018-13053": { - "cmt_msg": "alarmtimer: Prevent overflow for relative nanosleep", - "cmt_id": "04937aaaf8c795481580c323d91ee40a74cc66af" + "CVE-2020-26142": { + "cmt_msg": "" }, - "CVE-2018-12896": { - "cmt_msg": "posix-timers: Sanitize overrun handling", - "cmt_id": "5f6b9cd5c5f22603363b181adb5671f6d17e7a4e" - } - }, - "4.18.13": { - "CVE-2018-18445": { - "cmt_msg": "bpf: 32-bit RSH verification must truncate input before the ALU op", - "cmt_id": "11b165210c7214645c183dc7f74aca8d51381691" + "CVE-2024-23849": { + "cmt_msg": "net/rds: Fix UBSAN: array-index-out-of-bounds in rds_cmsg_recv" }, - "CVE-2018-17972": { - "cmt_msg": "proc: restrict kernel stack dumps to root", - "cmt_id": "2b89f7ad519d8e89e1602901c5a56212080ed455" - } - }, - "4.18.14": { - "CVE-2018-15471": { - "cmt_msg": "xen-netback: fix input validation in xenvif_set_hash_mapping()", - "cmt_id": "7e62c2fbc1fe943ea487f88a26c100d024283ff3" - } - }, - "4.18.16": { - "CVE-2018-18281": { - "cmt_msg": "mremap: properly flush TLB before releasing the page", - "cmt_id": "d80183541e6006563334eaec9e8d1dc6e40efeb7" - } - }, - "4.18.19": { - "CVE-2018-18955": { - "cmt_msg": "userns: also map extents in the reverse map to kernel IDs", - "cmt_id": "bbfed258eb08070e051a1c086282623cc562ff24" - } - }, - "4.18.20": { - "CVE-2018-19854": { - "cmt_msg": "crypto: user - fix leaking uninitialized memory to userspace", - "cmt_id": "f4ae32cf258910c6db2b7adb1832f50c6aae3929" + "CVE-2024-23848": { + "cmt_msg": "" }, - "CVE-2018-16871": { - "cmt_msg": "nfsd: COPY and CLONE operations require the saved filehandle to be set", - "cmt_id": "651c5d16f3a90db286fb6d83a31eda29a2c07cda" + "CVE-2023-46838": { + "cmt_msg": "xen-netback: don't produce zero-size SKB frags" }, - "CVE-2018-18710": { - "cmt_msg": "cdrom: fix improper type cast, which can leat to information leak.", - "cmt_id": "1dffd49a92ddaba101375e3157f90b5510d3cb46" - } - }, - "outstanding": { - "CVE-2020-36322": { - "cmt_msg": "fuse: fix bad inode" + "CVE-2024-26747": { + "cmt_msg": "usb: roles: fix NULL pointer issue when put module's reference" }, - "CVE-2020-10711": { - "cmt_msg": "netlabel: cope with NULL catmap" + "CVE-2024-26746": { + "cmt_msg": "dmaengine: idxd: Ensure safe user copy of completion record" }, - "CVE-2019-15090": { - "cmt_msg": "scsi: qedi: remove memset/memcpy to nfunc and use func instead" + "CVE-2024-26745": { + "cmt_msg": "powerpc/pseries/iommu: IOMMU table is not initialized for kdump over SR-IOV" }, - "CVE-2022-3649": { - "cmt_msg": "nilfs2: fix use-after-free bug of struct nilfs_root" + "CVE-2024-26744": { + "cmt_msg": "RDMA/srpt: Support specifying the srpt_service_guid parameter" }, - "CVE-2019-15099": { - "cmt_msg": "ath6kl: fix a NULL-ptr-deref bug in ath6kl_usb_alloc_urb_from_pipe()" + "CVE-2024-26743": { + "cmt_msg": "RDMA/qedr: Fix qedr_create_user_qp error flow" }, - "CVE-2019-15098": { - "cmt_msg": "ath6kl: fix a NULL-ptr-deref bug in ath6kl_usb_alloc_urb_from_pipe()" + "CVE-2024-26742": { + "cmt_msg": "scsi: smartpqi: Fix disable_managed_interrupts" }, - "CVE-2020-29368": { - "cmt_msg": "mm: thp: make the THP mapcount atomic against __split_huge_pmd_locked()" + "CVE-2024-26741": { + "cmt_msg": "dccp/tcp: Unhash sk from ehash for tb2 alloc failure after check_estalblished()." }, - "CVE-2020-12465": { - "cmt_msg": "mt76: fix array overflow on receiving too many fragments for a packet" + "CVE-2024-26740": { + "cmt_msg": "net/sched: act_mirred: use the backlog for mirred ingress" }, - "CVE-2020-12464": { - "cmt_msg": "USB: core: Fix free-while-in-use bug in the USB S-Glibrary" + "CVE-2024-26749": { + "cmt_msg": "usb: cdns3: fixed memory use after free at cdns3_gadget_ep_disable()" }, - "CVE-2022-0002": { - "cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE" + "CVE-2024-26748": { + "cmt_msg": "usb: cdns3: fix memory double free when handle zero packet" }, - "CVE-2019-19965": { - "cmt_msg": "scsi: libsas: stop discovering if oob mode is disconnected" + "CVE-2024-26787": { + "cmt_msg": "mmc: mmci: stm32: fix DMA API overlapping mappings warning" }, - "CVE-2021-3752": { - "cmt_msg": "Bluetooth: fix use-after-free error in lock_sock_nested()" + "CVE-2024-26699": { + "cmt_msg": "drm/amd/display: Fix array-index-out-of-bounds in dcn35_clkmgr" }, - "CVE-2019-19966": { - "cmt_msg": "media: cpia2: Fix use-after-free in cpia2_exit" + "CVE-2024-26698": { + "cmt_msg": "hv_netvsc: Fix race condition between netvsc_probe and netvsc_remove" }, - "CVE-2020-35508": { - "cmt_msg": "fork: fix copy_process(CLONE_PARENT) race with the exiting ->real_parent" + "CVE-2024-26691": { + "cmt_msg": "KVM: arm64: Fix circular locking dependency" }, - "CVE-2020-24587": { - "cmt_msg": "mac80211: prevent mixed key and fragment cache attacks" + "CVE-2024-0646": { + "cmt_msg": "net: tls, update curr on splice as well" }, - "CVE-2020-24586": { - "cmt_msg": "mac80211: prevent mixed key and fragment cache attacks" + "CVE-2024-26693": { + "cmt_msg": "wifi: iwlwifi: mvm: fix a crash when we run out of stations" }, - "CVE-2021-0129": { - "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical" + "CVE-2024-26692": { + "cmt_msg": "smb: Fix regression in writes when non-standard maximum write size negotiated" }, - "CVE-2019-20096": { - "cmt_msg": "dccp: Fix memleak in __feat_register_sp" + "CVE-2024-0564": { + "cmt_msg": "" }, - "CVE-2022-47520": { - "cmt_msg": "wifi: wilc1000: validate pairwise and authentication suite offsets" + "CVE-2024-0565": { + "cmt_msg": "smb: client: fix OOB in receive_encrypted_standard()" }, - "CVE-2023-5717": { - "cmt_msg": "perf: Disallow mis-matched inherited group reads" + "CVE-2024-26697": { + "cmt_msg": "nilfs2: fix data corruption in dsync block recovery for small block sizes" }, - "CVE-2022-3643": { - "cmt_msg": "xen/netback: Ensure protocol headers don't fall in the non-linear area" + "CVE-2024-26696": { + "cmt_msg": "nilfs2: fix hang in nilfs_lookup_dirty_data_buffers()" }, - "CVE-2021-3444": { - "cmt_msg": "bpf: Fix truncation handling for mod32 dst reg wrt zero" + "CVE-2024-26695": { + "cmt_msg": "crypto: ccp - Fix null pointer dereference in __sev_platform_shutdown_locked" }, - "CVE-2022-32250": { - "cmt_msg": "netfilter: nf_tables: disallow non-stateful expression in sets earlier" + "CVE-2024-26788": { + "cmt_msg": "dmaengine: fsl-qdma: init irq after reg initialization" }, - "CVE-2019-9506": { - "cmt_msg": "Bluetooth: Fix faulty expression for minimum encryption key size check" + "CVE-2005-3660": { + "cmt_msg": "" }, - "CVE-2019-9500": { - "cmt_msg": "brcmfmac: assure SSID length from firmware is limited" + "CVE-2023-31085": { + "cmt_msg": "ubi: Refuse attaching if mtd's erasesize is 0" }, - "CVE-2019-9503": { - "cmt_msg": "brcmfmac: add subtype check for event handling in data path" + "CVE-2023-31083": { + "cmt_msg": "Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO" }, - "CVE-2020-36158": { - "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_cmd_802_11_ad_hoc_start" + "CVE-2023-31082": { + "cmt_msg": "" }, - "CVE-2023-3159": { - "cmt_msg": "firewire: fix potential uaf in outbound_phy_packet_callback()" + "CVE-2023-31081": { + "cmt_msg": "" }, - "CVE-2022-0480": { - "cmt_msg": "memcg: enable accounting for file lock caches" + "CVE-2024-26694": { + "cmt_msg": "wifi: iwlwifi: fix double-free bug" }, - "CVE-2022-0487": { - "cmt_msg": "moxart: fix potential use-after-free on remove path" + "CVE-2024-23307": { + "cmt_msg": "md/raid5: fix atomicity violation in raid5_cache_count" }, - "CVE-2023-52429": { - "cmt_msg": "dm: limit the number of targets and parameter size area" + "CVE-2023-52499": { + "cmt_msg": "powerpc/47x: Fix 47x syscall return crash" }, - "CVE-2021-28964": { - "cmt_msg": "btrfs: fix race when cloning extent buffer during rewind of an old root" + "CVE-2023-52498": { + "cmt_msg": "PM: sleep: Fix possible deadlocks in core system-wide PM code" }, - "CVE-2022-23825": { - "cmt_msg": "" + "CVE-2023-52493": { + "cmt_msg": "bus: mhi: host: Drop chan lock before queuing buffers" }, - "CVE-2021-3847": { - "cmt_msg": "" + "CVE-2023-52492": { + "cmt_msg": "dmaengine: fix NULL pointer in channel unregistration function" }, - "CVE-2020-35501": { + "CVE-2020-14304": { "cmt_msg": "" }, - "CVE-2018-20784": { - "cmt_msg": "sched/fair: Fix infinite loop in update_blocked_averages() by reverting a9e7f6544b9c" - }, - "CVE-2019-10124": { - "cmt_msg": "mm: hwpoison: fix thp split handing in soft_offline_in_use_page()" + "CVE-2023-52490": { + "cmt_msg": "mm: migrate: fix getting incorrect page mapping during page migration" }, - "CVE-2019-9245": { - "cmt_msg": "f2fs: sanity check of xattr entry size" + "CVE-2023-52497": { + "cmt_msg": "erofs: fix lz4 inplace decompression" }, - "CVE-2024-26588": { - "cmt_msg": "LoongArch: BPF: Prevent out-of-bounds memory access" + "CVE-2023-52495": { + "cmt_msg": "soc: qcom: pmic_glink_altmode: fix port sanity check" }, - "CVE-2023-2162": { - "cmt_msg": "scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress" + "CVE-2023-52494": { + "cmt_msg": "bus: mhi: host: Add alignment check for event ring read pointer" }, - "CVE-2022-21125": { - "cmt_msg": "x86/speculation/mmio: Reuse SRBDS mitigation for SBDS" + "CVE-2024-26629": { + "cmt_msg": "nfsd: fix RELEASE_LOCKOWNER" }, - "CVE-2019-19241": { - "cmt_msg": "io_uring: async workers should inherit the user creds" + "CVE-2024-26625": { + "cmt_msg": "llc: call sock_orphan() at release time" }, - "CVE-2022-40307": { - "cmt_msg": "efi: capsule-loader: Fix use-after-free in efi_capsule_write" + "CVE-2020-26560": { + "cmt_msg": "" }, - "CVE-2022-21123": { - "cmt_msg": "x86/speculation/mmio: Add mitigation for Processor MMIO Stale Data" + "CVE-2024-26620": { + "cmt_msg": "s390/vfio-ap: always filter entire AP matrix" }, - "CVE-2021-28688": { - "cmt_msg": "xen-blkback: don't leak persistent grants from xen_blkbk_map()" + "CVE-2024-0841": { + "cmt_msg": "fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super" }, - "CVE-2021-39686": { - "cmt_msg": "binder: use euid from cred instead of using task" + "CVE-2024-26623": { + "cmt_msg": "pds_core: Prevent race issues involving the adminq" }, - "CVE-2021-39685": { - "cmt_msg": "USB: gadget: detect too-big endpoint 0 requests" + "CVE-2022-3238": { + "cmt_msg": "" }, - "CVE-2023-6535": { + "CVE-2023-37454": { "cmt_msg": "" }, - "CVE-2021-43975": { - "cmt_msg": "atlantic: Fix OOB read and write in hw_atl_utils_fw_rpc_wait" + "CVE-2023-52485": { + "cmt_msg": "drm/amd/display: Wake DMCUB before sending a command" }, - "CVE-2021-43976": { - "cmt_msg": "mwifiex: Fix skb_over_panic in mwifiex_usb_recv()" + "CVE-2022-1116": { + "cmt_msg": "" }, - "CVE-2021-1048": { - "cmt_msg": "fix regression in \"epoll: Keep a reference on files added to the check list\"" + "CVE-2024-26603": { + "cmt_msg": "x86/fpu: Stop relying on userspace for info to fault in xsave buffer" }, - "CVE-2019-10207": { - "cmt_msg": "Bluetooth: hci_uart: check for missing tty operations" + "CVE-2023-35827": { + "cmt_msg": "ravb: Fix use-after-free issue in ravb_tx_timeout_work()" }, - "CVE-2019-14835": { - "cmt_msg": "vhost: make sure log_num < in_num" + "CVE-2023-52481": { + "cmt_msg": "arm64: errata: Add Cortex-A520 speculative unprivileged load workaround" }, - "CVE-2023-0459": { - "cmt_msg": "uaccess: Add speculation barrier to copy_from_user()" + "CVE-2023-52585": { + "cmt_msg": "drm/amdgpu: Fix possible NULL dereference in amdgpu_ras_query_error_status_helper()" }, - "CVE-2023-0458": { - "cmt_msg": "prlimit: do_prlimit needs to have a speculation check" + "CVE-2023-52584": { + "cmt_msg": "spmi: mediatek: Fix UAF on device remove" }, - "CVE-2023-0597": { - "cmt_msg": "x86/mm: Randomize per-cpu entry area" + "CVE-2023-52587": { + "cmt_msg": "IB/ipoib: Fix mcast list locking" }, - "CVE-2019-12379": { - "cmt_msg": "consolemap: Fix a memory leaking bug in drivers/tty/vt/consolemap.c" + "CVE-2023-52586": { + "cmt_msg": "drm/msm/dpu: Add mutex lock in control vblank irq" }, - "CVE-2019-12378": { - "cmt_msg": "ipv6_sockglue: Fix a missing-check bug in ip6_ra_control()" + "CVE-2023-52580": { + "cmt_msg": "net/core: Fix ETH_P_1588 flow dissector" }, - "CVE-2021-3744": { - "cmt_msg": "crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd()" + "CVE-2023-52583": { + "cmt_msg": "ceph: fix deadlock or deadcode of misusing dget()" }, - "CVE-2021-30002": { - "cmt_msg": "media: v4l: ioctl: Fix memory leak in video_usercopy" + "CVE-2023-52582": { + "cmt_msg": "netfs: Only call folio_start_fscache() one time for each folio" }, - "CVE-2021-3743": { - "cmt_msg": "net: qrtr: fix OOB Read in qrtr_endpoint_post" + "CVE-2024-26769": { + "cmt_msg": "nvmet-fc: avoid deadlock on delete association path" }, - "CVE-2021-0941": { - "cmt_msg": "bpf: Remove MTU check in __bpf_skb_max_len" + "CVE-2023-52589": { + "cmt_msg": "media: rkisp1: Fix IRQ disable race issue" }, - "CVE-2022-3628": { - "cmt_msg": "wifi: brcmfmac: Fix potential buffer overflow in brcmf_fweh_event_worker()" + "CVE-2023-52588": { + "cmt_msg": "f2fs: fix to tag gcing flag on page during block migration" }, - "CVE-2024-26591": { - "cmt_msg": "bpf: Fix re-attachment branch in bpf_tracing_prog_attach" + "CVE-2024-26768": { + "cmt_msg": "LoongArch: Change acpi_core_pic[NR_CPUS] to acpi_core_pic[MAX_CORE_PIC]" }, - "CVE-2020-15802": { - "cmt_msg": "" + "CVE-2024-26767": { + "cmt_msg": "drm/amd/display: fixed integer types and null check locations" }, - "CVE-2024-26597": { - "cmt_msg": "net: qualcomm: rmnet: fix global oob in rmnet_policy" + "CVE-2023-6560": { + "cmt_msg": "io_uring: don't allow discontig pages for IORING_SETUP_NO_MMAP" }, - "CVE-2023-6610": { - "cmt_msg": "smb: client: fix potential OOB in smb2_dump_detail()" + "CVE-2024-26763": { + "cmt_msg": "dm-crypt: don't modify the data when using authenticated encryption" }, - "CVE-2023-2483": { - "cmt_msg": "net: qcom/emac: Fix use after free bug in emac_remove due to race condition" + "CVE-2024-26795": { + "cmt_msg": "riscv: Sparse-Memory/vmemmap out-of-bounds fix" }, - "CVE-2019-3460": { - "cmt_msg": "Bluetooth: Check L2CAP option sizes returned from l2cap_get_conf_opt" + "CVE-2024-26797": { + "cmt_msg": "drm/amd/display: Prevent potential buffer overflow in map_hw_resources" }, - "CVE-2022-3636": { - "cmt_msg": "net: ethernet: mtk_eth_soc: use after free in __mtk_ppe_check_skb()" + "CVE-2024-26790": { + "cmt_msg": "dmaengine: fsl-qdma: fix SoC may hang on 16 byte unaligned read" }, - "CVE-2022-3635": { - "cmt_msg": "atm: idt77252: fix use-after-free bugs caused by tst_timer" + "CVE-2024-21803": { + "cmt_msg": "" }, - "CVE-2021-34556": { - "cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4" + "CVE-2024-26793": { + "cmt_msg": "gtp: fix use-after-free and null-ptr-deref in gtp_newlink()" }, - "CVE-2019-15902": { - "cmt_msg": "unknown" + "CVE-2023-52530": { + "cmt_msg": "wifi: mac80211: fix potential key use-after-free" }, - "CVE-2022-40982": { - "cmt_msg": "x86/speculation: Add Gather Data Sampling mitigation" + "CVE-2023-52531": { + "cmt_msg": "wifi: iwlwifi: mvm: Fix a memory corruption issue" }, - "CVE-2022-3202": { - "cmt_msg": "jfs: prevent NULL deref in diFree" + "CVE-2023-52532": { + "cmt_msg": "net: mana: Fix TX CQE error handling" }, - "CVE-2019-11085": { - "cmt_msg": "drm/i915/gvt: Fix mmap range check" + "CVE-2024-26798": { + "cmt_msg": "fbcon: always restore the old font data in fbcon_do_set_font()" }, - "CVE-2024-24861": { - "cmt_msg": "" + "CVE-2024-26799": { + "cmt_msg": "ASoC: qcom: Fix uninitialized pointer dmactl" }, - "CVE-2019-11477": { - "cmt_msg": "tcp: limit payload size of sacked skbs" + "CVE-2023-52429": { + "cmt_msg": "dm: limit the number of targets and parameter size area" }, "CVE-2023-39189": { "cmt_msg": "netfilter: nfnetlink_osf: avoid OOB read" }, - "CVE-2018-14615": { - "cmt_msg": "f2fs: fix to do sanity check with i_extra_isize" - }, - "CVE-2018-14614": { - "cmt_msg": "f2fs: fix to do sanity check with cp_pack_start_sum" + "CVE-2023-46862": { + "cmt_msg": "io_uring/fdinfo: lock SQ thread while retrieving thread cpu/pid" }, - "CVE-2019-11479": { - "cmt_msg": "tcp: add tcp_min_snd_mss sysctl" + "CVE-2024-26677": { + "cmt_msg": "rxrpc: Fix delayed ACKs to not set the reference serial number" }, - "CVE-2019-11478": { - "cmt_msg": "tcp: tcp_fragment() should apply sane memory limits" + "CVE-2024-26676": { + "cmt_msg": "af_unix: Call kfree_skb() for dead unix_(sk)->oob_skb in GC." }, - "CVE-2018-14611": { - "cmt_msg": "btrfs: validate type when reading a chunk" + "CVE-2024-26675": { + "cmt_msg": "ppp_async: limit MRU to 64K" }, - "CVE-2018-14610": { - "cmt_msg": "btrfs: Check that each block group has corresponding chunk at mount time" + "CVE-2024-26674": { + "cmt_msg": "x86/lib: Revert to _ASM_EXTABLE_UA() for {get,put}_user() fixups" }, - "CVE-2018-14613": { - "cmt_msg": "btrfs: tree-checker: Verify block_group_item" + "CVE-2020-26556": { + "cmt_msg": "" }, - "CVE-2023-2007": { - "cmt_msg": "scsi: dpt_i2o: Remove obsolete driver" + "CVE-2020-26557": { + "cmt_msg": "" }, - "CVE-2020-26145": { - "cmt_msg": "ath10k: drop fragments with multicast DA for PCIe" + "CVE-2024-26671": { + "cmt_msg": "blk-mq: fix IO hang from sbitmap wakeup race" }, - "CVE-2023-51782": { - "cmt_msg": "net/rose: Fix Use-After-Free in rose_ioctl" + "CVE-2024-26733": { + "cmt_msg": "arp: Prevent overflow in arp_req_get()." }, - "CVE-2020-26147": { - "cmt_msg": "mac80211: assure all fragments are encrypted" + "CVE-2024-26776": { + "cmt_msg": "spi: hisi-sfc-v3xx: Return IRQ_NONE if no interrupts were detected" }, - "CVE-2020-26141": { - "cmt_msg": "ath10k: Fix TKIP Michael MIC verification for PCIe" + "CVE-2024-26777": { + "cmt_msg": "fbdev: sis: Error out if pixclock equals zero" }, - "CVE-2020-26140": { + "CVE-2019-20794": { "cmt_msg": "" }, - "CVE-2020-26143": { + "CVE-2020-26559": { "cmt_msg": "" }, - "CVE-2020-26142": { + "CVE-2023-3397": { "cmt_msg": "" }, - "CVE-2019-17053": { - "cmt_msg": "ieee802154: enforce CAP_NET_RAW for raw sockets" - }, - "CVE-2019-17052": { - "cmt_msg": "ax25: enforce CAP_NET_RAW for raw sockets" + "CVE-2024-26773": { + "cmt_msg": "ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found()" }, - "CVE-2023-1076": { - "cmt_msg": "tun: tun_chr_open(): correctly initialize socket uid" + "CVE-2024-26679": { + "cmt_msg": "inet: read sk->sk_family once in inet_recv_error()" }, - "CVE-2023-1077": { - "cmt_msg": "sched/rt: pick_next_rt_entity(): check list_entry" + "CVE-2024-26771": { + "cmt_msg": "dmaengine: ti: edma: Add some null pointer checks to the edma_probe" }, - "CVE-2020-27418": { - "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region" + "CVE-2023-52458": { + "cmt_msg": "block: add check that partition length needs to be aligned with block size" }, - "CVE-2019-17056": { - "cmt_msg": "nfc: enforce CAP_NET_RAW for raw sockets" + "CVE-2023-52457": { + "cmt_msg": "serial: 8250: omap: Don't skip resource freeing if pm_runtime_resume_and_get() failed" }, - "CVE-2019-17055": { - "cmt_msg": "mISDN: enforce CAP_NET_RAW for raw sockets" + "CVE-2018-1121": { + "cmt_msg": "" }, - "CVE-2019-17054": { - "cmt_msg": "appletalk: enforce CAP_NET_RAW for raw sockets" + "CVE-2023-52455": { + "cmt_msg": "iommu: Don't reserve 0-length IOVA region" }, - "CVE-2023-51042": { - "cmt_msg": "drm/amdgpu: Fix potential fence use-after-free v2" + "CVE-2023-52454": { + "cmt_msg": "nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length" }, - "CVE-2018-13096": { - "cmt_msg": "f2fs: fix to do sanity check with node footer and iblocks" + "CVE-2023-28746": { + "cmt_msg": "x86/mmio: Disable KVM mitigation when X86_FEATURE_CLEAR_CPU_BUF is set" }, - "CVE-2018-13097": { - "cmt_msg": "f2fs: fix to do sanity check with user_block_count" + "CVE-2023-52452": { + "cmt_msg": "bpf: Fix accesses to uninit stack slots" }, - "CVE-2023-3006": { - "cmt_msg": "arm64: Add AMPERE1 to the Spectre-BHB affected list" + "CVE-2023-52451": { + "cmt_msg": "powerpc/pseries/memhp: Fix access beyond end of drmem array" }, - "CVE-2020-29661": { - "cmt_msg": "tty: Fix ->pgrp locking in tiocspgrp()" + "CVE-2023-52450": { + "cmt_msg": "perf/x86/intel/uncore: Fix NULL pointer dereference issue in upi_fill_topology()" }, - "CVE-2020-29660": { - "cmt_msg": "tty: Fix ->session locking" + "CVE-2024-1085": { + "cmt_msg": "netfilter: nf_tables: check if catch-all set element is active in next generation" }, - "CVE-2019-2025": { - "cmt_msg": "binder: fix race that allows malicious free of live buffer" + "CVE-2024-1086": { + "cmt_msg": "netfilter: nf_tables: reject QUEUE/DROP verdict parameters" }, - "CVE-2021-33624": { - "cmt_msg": "bpf: Inherit expanded/patched seen count from old aux data" + "CVE-2024-26708": { + "cmt_msg": "mptcp: really cope with fastopen race" }, - "CVE-2022-1734": { - "cmt_msg": "nfc: nfcmrvl: main: reorder destructive operations in nfcmrvl_nci_unregister_dev to avoid bugs" + "CVE-2024-26702": { + "cmt_msg": "iio: magnetometer: rm3100: add boundary check for the value read from RM3100_REG_TMRC" }, - "CVE-2023-28772": { - "cmt_msg": "seq_buf: Fix overflow in seq_buf_putmem_hex()" + "CVE-2023-6240": { + "cmt_msg": "" }, - "CVE-2019-19770": { - "cmt_msg": "blktrace: fix debugfs use after free" + "CVE-2024-26700": { + "cmt_msg": "drm/amd/display: Fix MST Null Ptr for RV" }, - "CVE-2019-19079": { - "cmt_msg": "net: qrtr: fix memort leak in qrtr_tun_write_iter" + "CVE-2024-26707": { + "cmt_msg": "net: hsr: remove WARN_ONCE() in send_hsr_supervision_frame()" }, - "CVE-2019-19078": { - "cmt_msg": "ath10k: fix memory leak" + "CVE-2024-26706": { + "cmt_msg": "parisc: Fix random data corruption from exception handler" }, - "CVE-2019-19077": { - "cmt_msg": "RDMA: Fix goto target to release the allocated memory" + "CVE-2024-26704": { + "cmt_msg": "ext4: fix double-free of blocks due to wrong extents moved_len" }, - "CVE-2019-19075": { - "cmt_msg": "ieee802154: ca8210: prevent memory leak" + "CVE-2024-26739": { + "cmt_msg": "net/sched: act_mirred: don't override retval if we already lost the skb" }, - "CVE-2019-19074": { - "cmt_msg": "ath9k: release allocated buffer if timed out" + "CVE-2019-19814": { + "cmt_msg": "" }, - "CVE-2019-18683": { - "cmt_msg": "media: vivid: Fix wrong locking that causes race conditions on streaming stop" + "CVE-2023-52621": { + "cmt_msg": "bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers" }, - "CVE-2019-19072": { - "cmt_msg": "tracing: Have error path in predicate_parse() free its allocated memory" + "CVE-2023-52622": { + "cmt_msg": "ext4: avoid online resizing failures due to oversized flex bg" }, - "CVE-2019-19071": { - "cmt_msg": "rsi: release skb if rsi_prepare_beacon fails" + "CVE-2023-52623": { + "cmt_msg": "SUNRPC: Fix a suspicious RCU usage warning" }, - "CVE-2019-18680": { - "cmt_msg": "" + "CVE-2023-52624": { + "cmt_msg": "drm/amd/display: Wake DMCUB before executing GPINT commands" }, - "CVE-2022-23038": { - "cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()" + "CVE-2023-52625": { + "cmt_msg": "drm/amd/display: Refactor DMCUB enter/exit idle interface" }, - "CVE-2022-23039": { - "cmt_msg": "xen/gntalloc: don't use gnttab_query_foreign_access()" + "CVE-2023-52627": { + "cmt_msg": "iio: adc: ad7091r: Allow users to configure device events" }, - "CVE-2022-20154": { - "cmt_msg": "sctp: use call_rcu to free endpoint" + "CVE-2023-52628": { + "cmt_msg": "netfilter: nftables: exthdr: fix 4-byte stack OOB write" }, - "CVE-2021-27363": { - "cmt_msg": "scsi: iscsi: Restrict sessions and handles to admin capabilities" + "CVE-2021-26934": { + "cmt_msg": "" }, - "CVE-2022-20158": { - "cmt_msg": "net/packet: fix slab-out-of-bounds access in packet_recvmsg()" + "CVE-2008-2544": { + "cmt_msg": "" }, - "CVE-2022-23037": { - "cmt_msg": "xen/netfront: don't use gnttab_query_foreign_access() for mapped status" + "CVE-2007-3719": { + "cmt_msg": "" }, - "CVE-2024-0564": { + "CVE-2023-21400": { "cmt_msg": "" }, - "CVE-2020-0404": { - "cmt_msg": "media: uvcvideo: Avoid cyclic entity chains due to malformed USB descriptors" + "CVE-2023-5633": { + "cmt_msg": "drm/vmwgfx: Keep a gem reference to user bos in surfaces" }, - "CVE-2019-15925": { - "cmt_msg": "net: hns3: add some error checking in hclge_tm module" + "CVE-2024-26583": { + "cmt_msg": "tls: fix race between async notify and socket close" }, - "CVE-2019-15924": { - "cmt_msg": "fm10k: Fix a potential NULL pointer dereference" + "CVE-2024-26582": { + "cmt_msg": "net: tls: fix use-after-free with partial reads and async decrypt" }, - "CVE-2019-15538": { - "cmt_msg": "xfs: fix missing ILOCK unlock when xfs_setattr_nonsize fails due to EDQUOT" + "CVE-2024-26585": { + "cmt_msg": "tls: fix race between tx work scheduling and socket close" }, - "CVE-2019-15926": { - "cmt_msg": "ath6kl: add some bounds checking" + "CVE-2024-26584": { + "cmt_msg": "net: tls: handle backlogging of crypto requests" }, - "CVE-2019-15921": { - "cmt_msg": "genetlink: Fix a memory leak on error path" + "CVE-2024-26586": { + "cmt_msg": "mlxsw: spectrum_acl_tcam: Fix stack corruption" }, - "CVE-2019-15920": { - "cmt_msg": "cifs: Fix use-after-free in SMB2_read" + "CVE-2024-26589": { + "cmt_msg": "bpf: Reject variable offset alu on PTR_TO_FLOW_KEYS" }, - "CVE-2019-14821": { - "cmt_msg": "KVM: coalesced_mmio: add bounds checking" + "CVE-2024-26588": { + "cmt_msg": "LoongArch: BPF: Prevent out-of-bounds memory access" }, - "CVE-2020-12826": { - "cmt_msg": "signal: Extend exec_id to 64bits" + "CVE-2023-51780": { + "cmt_msg": "atm: Fix Use-After-Free in do_vcc_ioctl" }, - "CVE-2019-18885": { - "cmt_msg": "btrfs: merge btrfs_find_device and find_device" + "CVE-2023-51781": { + "cmt_msg": "appletalk: Fix Use-After-Free in atalk_ioctl" }, - "CVE-2021-42008": { - "cmt_msg": "net: 6pack: fix slab-out-of-bounds in decode_data" + "CVE-2023-52578": { + "cmt_msg": "net: bridge: use DEV_STATS_INC()" }, - "CVE-2022-39189": { - "cmt_msg": "KVM: x86: do not report a vCPU as preempted outside instruction boundaries" + "CVE-2023-52574": { + "cmt_msg": "team: fix null-ptr-deref when team device type is changed" }, - "CVE-2022-39188": { - "cmt_msg": "mmu_gather: Force tlb-flush VM_PFNMAP vmas" + "CVE-2023-52576": { + "cmt_msg": "x86/mm, kexec, ima: Use memblock_free_late() from ima_free_kexec_buffer()" }, - "CVE-2019-1125": { - "cmt_msg": "x86/speculation: Prepare entry code for Spectre v1 swapgs mitigations" + "CVE-2022-4543": { + "cmt_msg": "" }, - "CVE-2019-15218": { - "cmt_msg": "media: usb: siano: Fix general protection fault in smsusb" + "CVE-2023-52570": { + "cmt_msg": "vfio/mdev: Fix a null-ptr-deref bug for mdev_unregister_parent()" }, - "CVE-2019-15666": { - "cmt_msg": "xfrm: policy: Fix out-of-bound array accesses in __xfrm_policy_unlink" + "CVE-2023-52571": { + "cmt_msg": "power: supply: rk817: Fix node refcount leak" }, - "CVE-2020-25641": { - "cmt_msg": "block: allow for_each_bvec to support zero len bvec" + "CVE-2023-52572": { + "cmt_msg": "cifs: Fix UAF in cifs_demultiplex_thread()" }, - "CVE-2005-3660": { + "CVE-2023-52573": { + "cmt_msg": "net: rds: Fix possible NULL-pointer dereference" + }, + "CVE-2023-4921": { + "cmt_msg": "net: sched: sch_qfq: Fix UAF in qfq_dequeue()" + }, + "CVE-2023-4881": { + "cmt_msg": "netfilter: nftables: exthdr: fix 4-byte stack OOB write" + }, + "CVE-2013-7445": { "cmt_msg": "" }, - "CVE-2019-15212": { - "cmt_msg": "USB: rio500: refuse more than one device at a time" + "CVE-2023-34324": { + "cmt_msg": "xen/events: replace evtchn_rwlock with RCU" }, - "CVE-2019-15211": { - "cmt_msg": "media: radio-raremono: change devm_k*alloc to k*alloc" + "CVE-2024-26731": { + "cmt_msg": "bpf, sockmap: Fix NULL pointer dereference in sk_psock_verdict_data_ready()" }, - "CVE-2023-31084": { - "cmt_msg": "media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*()" + "CVE-2024-26736": { + "cmt_msg": "afs: Increase buffer size in afs_update_volume_status()" }, - "CVE-2019-15217": { - "cmt_msg": "media: usb:zr364xx:Fix KASAN:null-ptr-deref Read in zr364xx_vidioc_querycap" + "CVE-2024-26737": { + "cmt_msg": "bpf: Fix racing between bpf_timer_cancel_and_free and bpf_timer_cancel" }, - "CVE-2019-15216": { - "cmt_msg": "USB: yurex: Fix protection fault after device removal" + "CVE-2024-26734": { + "cmt_msg": "devlink: fix possible use-after-free and memory leaks in devlink_init()" }, - "CVE-2019-15215": { - "cmt_msg": "media: cpia2_usb: first wake up, then free in disconnect" + "CVE-2024-26735": { + "cmt_msg": "ipv6: sr: fix possible use-after-free and null-ptr-deref" }, - "CVE-2019-15214": { - "cmt_msg": "ALSA: core: Fix card races between register and disconnect" + "CVE-2024-26738": { + "cmt_msg": "powerpc/pseries/iommu: DLPAR add doesn't completely initialize pci_controller" }, - "CVE-2022-45885": { + "CVE-2023-6238": { "cmt_msg": "" }, - "CVE-2020-24588": { - "cmt_msg": "cfg80211: mitigate A-MSDU aggregation attacks" + "CVE-2022-38096": { + "cmt_msg": "" }, - "CVE-2021-33034": { - "cmt_msg": "Bluetooth: verify AMP hci_chan before amp_destroy" + "CVE-2024-26596": { + "cmt_msg": "net: dsa: fix netdev_priv() dereference before check on non-DSA netdevice events" }, - "CVE-2019-19922": { - "cmt_msg": "sched/fair: Fix low cpu usage with high throttling by removing expiration of cpu-local slices" + "CVE-2023-52443": { + "cmt_msg": "apparmor: avoid crash when parsed profile name is empty" }, - "CVE-2021-33033": { - "cmt_msg": "cipso,calipso: resolve a number of problems with the DOI refcounts" + "CVE-2023-6931": { + "cmt_msg": "perf: Fix perf_event_validate_size()" }, - "CVE-2019-19927": { - "cmt_msg": "drm/ttm: fix incrementing the page pointer for huge pages" + "CVE-2023-6932": { + "cmt_msg": "ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet" }, - "CVE-2020-27066": { - "cmt_msg": "xfrm: policy: Fix doulbe free in xfrm_policy_timer" + "CVE-2024-0607": { + "cmt_msg": "netfilter: nf_tables: fix pointer math issue in nft_byteorder_eval()" }, - "CVE-2020-27068": { - "cmt_msg": "cfg80211: add missing policy for NL80211_ATTR_STATUS_CODE" + "CVE-2024-26803": { + "cmt_msg": "net: veth: clear GRO when clearing XDP even when down" }, - "CVE-2024-23307": { - "cmt_msg": "" + "CVE-2024-26648": { + "cmt_msg": "drm/amd/display: Fix variable deferencing before NULL check in edp_setup_replay()" }, - "CVE-2020-8648": { - "cmt_msg": "vt: selection, close sel_buffer race" + "CVE-2024-26649": { + "cmt_msg": "drm/amdgpu: Fix the null pointer when load rlc firmware" }, - "CVE-2022-32296": { - "cmt_msg": "tcp: increase source port perturb table to 2^16" + "CVE-2024-26646": { + "cmt_msg": "thermal: intel: hfi: Add syscore callbacks for system-wide PM" }, - "CVE-2020-28974": { - "cmt_msg": "vt: Disable KD_FONT_OP_COPY" + "CVE-2024-26647": { + "cmt_msg": "drm/amd/display: Fix late derefrence 'dsc' check in 'link_set_dsc_pps_packet()'" }, - "CVE-2023-3567": { - "cmt_msg": "vc_screen: move load of struct vc_data pointer in vcs_read() to avoid UAF" + "CVE-2024-26644": { + "cmt_msg": "btrfs: don't abort filesystem when attempting to snapshot deleted subvolume" }, - "CVE-2019-20806": { - "cmt_msg": "media: tw5864: Fix possible NULL pointer dereference in tw5864_handle_frame" + "CVE-2024-26645": { + "cmt_msg": "tracing: Ensure visibility when inserting an element into tracing_map" }, - "CVE-2022-3028": { - "cmt_msg": "af_key: Do not call xfrm_probe_algs in parallel" + "CVE-2024-26642": { + "cmt_msg": "netfilter: nf_tables: disallow anonymous set with timeout flag" }, - "CVE-2020-0305": { - "cmt_msg": "chardev: Avoid potential use-after-free in 'chrdev_open()'" + "CVE-2024-26640": { + "cmt_msg": "tcp: add sanity checks to rx zerocopy" }, - "CVE-2020-14304": { - "cmt_msg": "" + "CVE-2024-26641": { + "cmt_msg": "ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv()" }, - "CVE-2022-2318": { - "cmt_msg": "net: rose: fix UAF bugs caused by timer handler" + "CVE-2023-50431": { + "cmt_msg": "accel/habanalabs: fix information leak in sec_attest_info()" }, - "CVE-2020-15393": { - "cmt_msg": "usb: usbtest: fix missing kfree(dev->buf) in usbtest_disconnect" + "CVE-2024-26791": { + "cmt_msg": "btrfs: dev-replace: properly validate device names" }, - "CVE-2023-23000": { - "cmt_msg": "phy: tegra: xusb: Fix return value of tegra_xusb_find_port_node function" + "CVE-2023-52467": { + "cmt_msg": "mfd: syscon: Fix null pointer dereference in of_syscon_register()" }, - "CVE-2019-19082": { - "cmt_msg": "drm/amd/display: prevent memory leak" + "CVE-2023-52464": { + "cmt_msg": "EDAC/thunderx: Fix possible out-of-bounds string access" }, - "CVE-2019-19080": { - "cmt_msg": "nfp: flower: prevent memory leak in nfp_flower_spawn_phy_reprs" + "CVE-2023-52462": { + "cmt_msg": "bpf: fix check for attempt to corrupt spilled pointer" }, - "CVE-2019-19081": { - "cmt_msg": "nfp: flower: fix memory leak in nfp_flower_spawn_vnic_reprs" + "CVE-2023-52463": { + "cmt_msg": "efivarfs: force RO when remounting if SetVariable is not supported" }, - "CVE-2023-4132": { - "cmt_msg": "media: usb: siano: Fix warning due to null work_func_t function pointer" + "CVE-2022-25265": { + "cmt_msg": "" }, - "CVE-2023-4133": { - "cmt_msg": "cxgb4: fix use after free bugs caused by circular dependency problem" + "CVE-2023-52468": { + "cmt_msg": "class: fix use-after-free in class_register()" }, - "CVE-2020-26560": { + "CVE-2023-52469": { + "cmt_msg": "drivers/amd/pm: fix a use-after-free in kv_parse_power_table" + }, + "CVE-2019-15290": { "cmt_msg": "" }, - "CVE-2023-35823": { - "cmt_msg": "media: saa7134: fix use after free bug in saa7134_finidev due to race condition" + "CVE-2024-26633": { + "cmt_msg": "ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim()" }, - "CVE-2023-4134": { - "cmt_msg": "Input: cyttsp4_core - change del_timer_sync() to timer_shutdown_sync()" + "CVE-2024-26632": { + "cmt_msg": "block: Fix iterating over an empty bio with bio_for_each_folio_all" }, - "CVE-2018-18397": { - "cmt_msg": "userfaultfd: use ENOENT instead of EFAULT if the atomic copy user fails" + "CVE-2023-6622": { + "cmt_msg": "netfilter: nf_tables: bail out on mismatching dynset and set expressions" }, - "CVE-2018-12127": { - "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" + "CVE-2024-26636": { + "cmt_msg": "llc: make llc_ui_sendmsg() more robust against bonding changes" }, - "CVE-2018-12126": { - "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" + "CVE-2024-26635": { + "cmt_msg": "llc: Drop support for ETH_P_TR_802_2." }, - "CVE-2022-23816": { - "cmt_msg": "x86/kvm/vmx: Make noinstr clean" + "CVE-2022-26878": { + "cmt_msg": "" }, - "CVE-2023-37454": { + "CVE-2024-2193": { "cmt_msg": "" }, - "CVE-2021-3892": { + "CVE-2018-12930": { "cmt_msg": "" }, - "CVE-2022-2978": { - "cmt_msg": "fs: fix UAF/GPF bug in nilfs_mdt_destroy" + "CVE-2018-12931": { + "cmt_msg": "" }, - "CVE-2022-20572": { - "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag" + "CVE-2023-52637": { + "cmt_msg": "can: j1939: Fix UAF in j1939_sk_match_filter during setsockopt(SO_J1939_FILTER)" }, - "CVE-2023-39194": { - "cmt_msg": "net: xfrm: Fix xfrm_address_filter OOB read" + "CVE-2024-26783": { + "cmt_msg": "mm/vmscan: fix a bug calling wakeup_kswapd() with a wrong zone index" }, - "CVE-2023-2002": { - "cmt_msg": "bluetooth: Perform careful capability checks in hci_sock_ioctl()" + "CVE-2024-26782": { + "cmt_msg": "mptcp: fix double-free on socket dismantle" }, - "CVE-2023-39197": { - "cmt_msg": "netfilter: conntrack: dccp: copy entire header to stack buffer, not just basic one" + "CVE-2024-22705": { + "cmt_msg": "ksmbd: fix slab-out-of-bounds in smb_strndup_from_utf16()" }, - "CVE-2019-10126": { - "cmt_msg": "mwifiex: Fix heap overflow in mwifiex_uap_parse_tail_ies()" + "CVE-2024-26673": { + "cmt_msg": "netfilter: nft_ct: sanitize layer 3 and 4 protocol number in custom expectations" }, - "CVE-2019-13631": { - "cmt_msg": "Input: gtco - bounds check collection indent level" + "CVE-2023-5090": { + "cmt_msg": "x86: KVM: SVM: always update the x2avic msr interception" }, - "CVE-2020-13974": { - "cmt_msg": "vt: keyboard: avoid signed integer overflow in k_ascii" + "CVE-2024-26672": { + "cmt_msg": "drm/amdgpu: Fix variable 'mca_funcs' dereferenced before NULL check in 'amdgpu_mca_smu_get_mca_entry()'" }, - "CVE-2021-4083": { - "cmt_msg": "fget: check that the fd still exists after getting a ref to it" + "CVE-2023-52527": { + "cmt_msg": "ipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data()" }, - "CVE-2023-33288": { - "cmt_msg": "power: supply: bq24190: Fix use after free bug in bq24190_remove due to race condition" + "CVE-2023-52526": { + "cmt_msg": "erofs: fix memory leak of LZMA global compressed deduplication" }, - "CVE-2022-36402": { - "cmt_msg": "drm/vmwgfx: Fix shader stage validation" + "CVE-2023-52523": { + "cmt_msg": "bpf, sockmap: Reject sk_msg egress redirects to non-TCP sockets" }, - "CVE-2022-29900": { - "cmt_msg": "x86/kvm/vmx: Make noinstr clean" + "CVE-2023-52522": { + "cmt_msg": "net: fix possible store tearing in neigh_periodic_work()" }, - "CVE-2022-29901": { - "cmt_msg": "x86/kvm/vmx: Make noinstr clean" + "CVE-2023-52520": { + "cmt_msg": "platform/x86: think-lmi: Fix reference leak" }, - "CVE-2021-4197": { - "cmt_msg": "cgroup: Use open-time credentials for process migraton perm checks" + "CVE-2024-0641": { + "cmt_msg": "tipc: fix a potential deadlock on &tx->lock" }, - "CVE-2019-18282": { - "cmt_msg": "net/flow_dissector: switch to siphash" + "CVE-2024-26789": { + "cmt_msg": "crypto: arm64/neonbs - fix out-of-bounds access on short input" }, - "CVE-2020-10751": { - "cmt_msg": "selinux: properly handle multiple messages in selinux_netlink_send()" + "CVE-2024-26779": { + "cmt_msg": "wifi: mac80211: fix race condition on enabling fast-xmit" }, - "CVE-2019-9162": { - "cmt_msg": "netfilter: nf_nat_snmp_basic: add missing length checks in ASN.1 cbs" + "CVE-2023-52529": { + "cmt_msg": "HID: sony: Fix a potential memory leak in sony_probe()" }, - "CVE-2023-39192": { - "cmt_msg": "netfilter: xt_u32: validate user space input" + "CVE-2023-52528": { + "cmt_msg": "net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg" }, - "CVE-2019-16229": { - "cmt_msg": "drm/amdkfd: fix a potential NULL pointer dereference (v2)" + "CVE-2024-22386": { + "cmt_msg": "" }, - "CVE-2022-20166": { - "cmt_msg": "drivers core: Use sysfs_emit and sysfs_emit_at for show(device *...) functions" + "CVE-2023-46813": { + "cmt_msg": "x86/sev: Check for user-space IOIO pointing to kernel space" }, - "CVE-2020-15437": { - "cmt_msg": "serial: 8250: fix null-ptr-deref in serial8250_start_tx()" + "CVE-2024-26774": { + "cmt_msg": "ext4: avoid dividing by 0 in mb_update_avg_fragment_size() when block bitmap corrupt" }, - "CVE-2020-15436": { - "cmt_msg": "block: Fix use-after-free in blkdev_get()" + "CVE-2024-26602": { + "cmt_msg": "sched/membarrier: reduce the ability to hammer on sys_membarrier" }, - "CVE-2022-1116": { - "cmt_msg": "" + "CVE-2023-6610": { + "cmt_msg": "smb: client: fix potential OOB in smb2_dump_detail()" }, - "CVE-2021-28660": { - "cmt_msg": "staging: rtl8188eu: prevent ->ssid overflow in rtw_wx_set_scan()" + "CVE-2024-26600": { + "cmt_msg": "phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP" }, - "CVE-2020-8647": { - "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region" + "CVE-2024-26601": { + "cmt_msg": "ext4: regenerate buddy after block freeing failed if under fc replay" }, - "CVE-2019-0155": { - "cmt_msg": "drm/i915: Rename gen7 cmdparser tables" + "CVE-2024-26606": { + "cmt_msg": "binder: signal epoll threads of self-work" }, - "CVE-2019-0154": { - "cmt_msg": "drm/i915: Lower RM timeout to avoid DSI hard hangs" + "CVE-2024-26607": { + "cmt_msg": "drm/bridge: sii902x: Fix probing race issue" }, - "CVE-2023-35827": { - "cmt_msg": "ravb: Fix use-after-free issue in ravb_tx_timeout_work()" + "CVE-2024-26765": { + "cmt_msg": "LoongArch: Disable IRQ before init_fn() for nonboot CPUs" }, - "CVE-2023-1859": { - "cmt_msg": "9p/xen : Fix use after free bug in xen_9pfs_front_remove due to race condition" + "CVE-2024-26764": { + "cmt_msg": "fs/aio: Restrict kiocb_set_cancel_fn() to I/O submitted via libaio" }, - "CVE-2020-36386": { - "cmt_msg": "Bluetooth: Fix slab-out-of-bounds read in hci_extended_inquiry_result_evt()" + "CVE-2024-26608": { + "cmt_msg": "ksmbd: fix global oob in ksmbd_nl_policy" }, - "CVE-2022-3567": { - "cmt_msg": "ipv6: Fix data races around sk->sk_prot." + "CVE-2024-26766": { + "cmt_msg": "IB/hfi1: Fix sdma.h tx->num_descs off-by-one error" }, - "CVE-2022-3566": { - "cmt_msg": "tcp: Fix data races around icsk->icsk_af_ops." + "CVE-2024-26761": { + "cmt_msg": "cxl/pci: Fix disabling memory if DVSEC CXL Range does not match a CFMWS window" }, - "CVE-2022-3565": { - "cmt_msg": "mISDN: fix use-after-free bugs in l1oip timer handlers" + "CVE-2024-26760": { + "cmt_msg": "scsi: target: pscsi: Fix bio_put() for error case" }, - "CVE-2022-3564": { - "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free caused by l2cap_reassemble_sdu" + "CVE-2023-1476": { + "cmt_msg": "" }, - "CVE-2018-19407": { - "cmt_msg": "KVM: X86: Fix scan ioapic use-before-initialization" + "CVE-2021-3864": { + "cmt_msg": "" }, - "CVE-2020-36385": { - "cmt_msg": "RDMA/ucma: Rework ucma_migrate_id() to avoid races with destroy" + "CVE-2024-26770": { + "cmt_msg": "HID: nvidia-shield: Add missing null pointer checks to LED initialization" }, - "CVE-2020-0009": { - "cmt_msg": "staging: android: ashmem: Disallow ashmem memory from being remapped" + "CVE-2016-8660": { + "cmt_msg": "" }, - "CVE-2023-52340": { - "cmt_msg": "ipv6: remove max_size check inline with ipv4" + "CVE-2023-6270": { + "cmt_msg": "aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts" }, - "CVE-2020-7053": { - "cmt_msg": "drm/i915: Introduce a mutex for file_priv->context_idr" + "CVE-2008-4609": { + "cmt_msg": "" }, - "CVE-2023-28466": { - "cmt_msg": "net: tls: fix possible race condition between do_tls_getsockopt_conf() and do_tls_setsockopt_conf()" + "CVE-2023-6356": { + "cmt_msg": "nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length" }, - "CVE-2019-14615": { - "cmt_msg": "drm/i915/gen9: Clear residual context state on context switch" + "CVE-2023-52639": { + "cmt_msg": "KVM: s390: vsie: fix race during shadow creation" }, - "CVE-2022-2503": { - "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag" + "CVE-2023-52456": { + "cmt_msg": "serial: imx: fix tx statemachine deadlock" }, - "CVE-2021-3635": { - "cmt_msg": "netfilter: nf_tables: fix flowtable list del corruption" + "CVE-2019-15239": { + "cmt_msg": "unknown" }, - "CVE-2019-13648": { - "cmt_msg": "powerpc/tm: Fix oops on sigreturn on systems without TM" + "CVE-2023-52635": { + "cmt_msg": "PM / devfreq: Synchronize devfreq_monitor_[start/stop]" }, - "CVE-2023-0030": { - "cmt_msg": "drm/nouveau/mmu: add more general vmm free/node handling functions" + "CVE-2023-52634": { + "cmt_msg": "drm/amd/display: Fix disable_otg_wa logic" }, - "CVE-2020-16120": { - "cmt_msg": "ovl: switch to mounter creds in readdir" + "CVE-2023-52633": { + "cmt_msg": "um: time-travel: fix time corruption" }, - "CVE-2019-11599": { - "cmt_msg": "coredump: fix race condition between mmget_not_zero()/get_task_mm() and core dumping" + "CVE-2023-52632": { + "cmt_msg": "drm/amdkfd: Fix lock dependency warning with srcu" }, - "CVE-2022-29581": { - "cmt_msg": "net/sched: cls_u32: fix netns refcount changes in u32_change()" + "CVE-2023-52631": { + "cmt_msg": "fs/ntfs3: Fix an NULL dereference bug" }, - "CVE-2022-1204": { - "cmt_msg": "ax25: Fix refcount leaks caused by ax25_cb_del()" + "CVE-2023-52630": { + "cmt_msg": "blk-iocost: Fix an UBSAN shift-out-of-bounds warning" }, - "CVE-2019-2101": { - "cmt_msg": "media: uvcvideo: Fix 'type' check leading to overflow" + "CVE-2023-20941": { + "cmt_msg": "" }, - "CVE-2019-17666": { - "cmt_msg": "rtlwifi: Fix potential overflow on P2P code" + "CVE-2023-52453": { + "cmt_msg": "hisi_acc_vfio_pci: Update migration data pointer correctly on saving/resume" }, - "CVE-2016-10723": { - "cmt_msg": "mm, oom: remove sleep from under oom_lock" + "CVE-2024-26638": { + "cmt_msg": "nbd: always initialize struct msghdr completely" }, - "CVE-2019-19036": { - "cmt_msg": "btrfs: Detect unbalanced tree with empty leaf before crashing btree operations" + "CVE-2024-26784": { + "cmt_msg": "pmdomain: arm: Fix NULL dereference on scmi_perf_domain removal" }, - "CVE-2019-3459": { - "cmt_msg": "Bluetooth: Verify that l2cap_get_conf_opt provides large enough buffer" + "CVE-2022-3533": { + "cmt_msg": "" }, - "CVE-2020-11494": { - "cmt_msg": "slcan: Don't transmit uninitialized stack data in padding" + "CVE-2023-6121": { + "cmt_msg": "nvmet: nul-terminate the NQNs passed in the connect command" }, - "CVE-2019-19039": { - "cmt_msg": "btrfs: Don't submit any btree write bio if the fs has errors" + "CVE-2023-52638": { + "cmt_msg": "can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock" }, - "CVE-2020-0444": { - "cmt_msg": "audit: fix error handling in audit_data_to_entry()" + "CVE-2024-26631": { + "cmt_msg": "ipv6: mcast: fix data-race in ipv6_mc_down / mld_ifc_work" + }, + "CVE-2017-13693": { + "cmt_msg": "" }, - "CVE-2022-1419": { - "cmt_msg": "drm/vgem: Close use-after-free race in vgem_gem_create" + "CVE-2017-13694": { + "cmt_msg": "" }, - "CVE-2022-1836": { - "cmt_msg": "floppy: disable FDRAWCMD by default" + "CVE-2022-48628": { + "cmt_msg": "ceph: drop messages from MDS when unmounting" }, - "CVE-2020-11884": { - "cmt_msg": "s390/mm: fix page table upgrade vs 2ndary address mode accesses" + "CVE-2024-24859": { + "cmt_msg": "" }, - "CVE-2021-32078": { - "cmt_msg": "ARM: footbridge: remove personal server platform" + "CVE-2024-24858": { + "cmt_msg": "" }, - "CVE-2022-30594": { - "cmt_msg": "ptrace: Check PTRACE_O_SUSPEND_SECCOMP permission on PTRACE_SEIZE" + "CVE-2023-5345": { + "cmt_msg": "fs/smb/client: Reset password pointer to NULL" }, - "CVE-2022-4662": { - "cmt_msg": "USB: core: Prevent nested device-reset calls" + "CVE-2024-24855": { + "cmt_msg": "scsi: lpfc: Fix a possible data race in lpfc_unregister_fcf_rescan()" }, - "CVE-2019-11833": { - "cmt_msg": "ext4: zero out the unused memory region in the extent tree block" + "CVE-2024-24857": { + "cmt_msg": "" }, - "CVE-2021-38205": { - "cmt_msg": "net: xilinx_emaclite: Do not print real IOMEM pointer" + "CVE-2022-3544": { + "cmt_msg": "" }, - "CVE-2020-27835": { - "cmt_msg": "IB/hfi1: Ensure correct mm is used at all times" + "CVE-2023-52569": { + "cmt_msg": "btrfs: remove BUG() after failure to insert delayed dir index item" }, - "CVE-2020-27830": { - "cmt_msg": "speakup: Reject setting the speakup line discipline outside of speakup" + "CVE-2023-52568": { + "cmt_msg": "x86/sgx: Resolves SECS reclaim vs. page fault for EAUG race" }, - "CVE-2020-0255": { - "cmt_msg": "selinux: properly handle multiple messages in selinux_netlink_send()" + "CVE-2023-52563": { + "cmt_msg": "drm/meson: fix memory leak on ->hpd_notify callback" }, - "CVE-2023-35001": { - "cmt_msg": "netfilter: nf_tables: prevent OOB access in nft_byteorder_eval" + "CVE-2023-52562": { + "cmt_msg": "mm/slab_common: fix slab_caches list corruption after kmem_cache_destroy()" }, - "CVE-2022-27666": { - "cmt_msg": "esp: Fix possible buffer overflow in ESP transformation" + "CVE-2023-52561": { + "cmt_msg": "arm64: dts: qcom: sdm845-db845c: Mark cont splash memory region as reserved" }, - "CVE-2021-38208": { - "cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect" + "CVE-2023-52560": { + "cmt_msg": "mm/damon/vaddr-test: fix memory leak in damon_do_test_apply_three_regions()" }, - "CVE-2019-2213": { - "cmt_msg": "binder: fix possible UAF when freeing buffer" + "CVE-2023-52567": { + "cmt_msg": "serial: 8250_port: Check IRQ data before use" }, - "CVE-2020-25211": { - "cmt_msg": "netfilter: ctnetlink: add a range check for l3/l4 protonum" + "CVE-2023-52566": { + "cmt_msg": "nilfs2: fix potential use after free in nilfs_gccache_submit_read_data()" }, - "CVE-2020-25212": { - "cmt_msg": "nfs: Fix getxattr kernel panic and memory overflow" + "CVE-2023-52565": { + "cmt_msg": "media: uvcvideo: Fix OOB read" }, - "CVE-2020-26556": { + "CVE-2020-0347": { "cmt_msg": "" }, - "CVE-2020-26557": { + "CVE-2019-12456": { "cmt_msg": "" }, - "CVE-2022-48619": { - "cmt_msg": "Input: add bounds checking to input_set_capability()" + "CVE-2024-26720": { + "cmt_msg": "mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again" }, - "CVE-2020-26555": { - "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical" + "CVE-2024-26723": { + "cmt_msg": "lan966x: Fix crash when adding interface under a lag" }, - "CVE-2019-20794": { - "cmt_msg": "" + "CVE-2024-26727": { + "cmt_msg": "btrfs: do not ASSERT() if the newly created subvolume already got read" }, - "CVE-2020-26559": { - "cmt_msg": "" + "CVE-2024-26726": { + "cmt_msg": "btrfs: don't drop extent_map for free space inode on write error" }, - "CVE-2023-3397": { + "CVE-2022-3642": { "cmt_msg": "" }, - "CVE-2018-1128": { - "cmt_msg": "libceph: add authorizer challenge" + "CVE-2024-0584": { + "cmt_msg": "ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet" }, - "CVE-2018-1129": { - "cmt_msg": "libceph: implement CEPHX_V2 calculation mode" + "CVE-2024-0582": { + "cmt_msg": "io_uring/kbuf: defer release of mapped buffer rings" }, - "CVE-2022-26365": { - "cmt_msg": "xen/blkfront: fix leaking data in shared pages" + "CVE-2023-52518": { + "cmt_msg": "Bluetooth: hci_codec: Fix leaking content of local_codecs" }, - "CVE-2023-52458": { - "cmt_msg": "block: add check that partition length needs to be aligned with block size" + "CVE-2023-52519": { + "cmt_msg": "HID: intel-ish-hid: ipc: Disable and reenable ACPI GPE bit" }, - "CVE-2018-20854": { - "cmt_msg": "phy: ocelot-serdes: fix out-of-bounds read" + "CVE-2023-52516": { + "cmt_msg": "dma-debug: don't call __dma_entry_alloc_check_leak() under free_entries_lock" }, - "CVE-2018-1121": { - "cmt_msg": "" + "CVE-2023-52517": { + "cmt_msg": "spi: sun6i: fix race between DMA RX transfer completion and RX FIFO drain" }, - "CVE-2023-52451": { - "cmt_msg": "powerpc/pseries/memhp: Fix access beyond end of drmem array" + "CVE-2023-52515": { + "cmt_msg": "RDMA/srp: Do not call scsi_done() from srp_abort()" }, - "CVE-2019-19046": { - "cmt_msg": "ipmi: Fix memory leak in __ipmi_bmc_register" + "CVE-2023-52512": { + "cmt_msg": "pinctrl: nuvoton: wpcm450: fix out of bounds write" }, - "CVE-2019-19045": { - "cmt_msg": "net/mlx5: prevent memory leak in mlx5_fpga_conn_create_cq" + "CVE-2023-52513": { + "cmt_msg": "RDMA/siw: Fix connection failure handling" }, - "CVE-2022-2961": { + "CVE-2024-25739": { "cmt_msg": "" }, - "CVE-2023-2176": { - "cmt_msg": "RDMA/core: Refactor rdma_bind_addr" + "CVE-2023-52511": { + "cmt_msg": "spi: sun6i: reduce DMA RX transfer width to single byte" }, - "CVE-2024-1086": { - "cmt_msg": "netfilter: nf_tables: reject QUEUE/DROP verdict parameters" + "CVE-2023-6531": { + "cmt_msg": "io_uring/af_unix: disable sending io_uring over sockets" }, - "CVE-2024-22386": { + "CVE-2023-6535": { "cmt_msg": "" }, - "CVE-2019-9466": { - "cmt_msg": "brcmfmac: add subtype check for event handling in data path" + "CVE-2023-6536": { + "cmt_msg": "nvmet-tcp: fix a crash in nvmet_req_complete()" }, - "CVE-2019-19048": { - "cmt_msg": "virt: vbox: fix memory leak in hgcm_call_preprocess_linaddr" + "CVE-2018-17977": { + "cmt_msg": "" }, - "CVE-2019-19049": { - "cmt_msg": "of: unittest: fix memory leak in unittest_data_add" + "CVE-2024-1151": { + "cmt_msg": "net: openvswitch: limit the number of recursions from action sets" }, - "CVE-2022-0644": { - "cmt_msg": "vfs: check fd has read access in kernel_read_file_from_fd()" + "CVE-2024-26659": { + "cmt_msg": "xhci: handle isoc Babble and Buffer Overrun events properly" }, - "CVE-2020-27784": { - "cmt_msg": "usb: gadget: function: printer: fix use-after-free in __lock_acquire" + "CVE-2024-26658": { + "cmt_msg": "bcachefs: grab s_umount only if snapshotting" }, - "CVE-2023-1670": { - "cmt_msg": "xirc2ps_cs: Fix use after free bug in xirc2ps_detach" + "CVE-2010-5321": { + "cmt_msg": "" }, - "CVE-2020-27786": { - "cmt_msg": "ALSA: rawmidi: Fix racy buffer resize under concurrent accesses" + "CVE-2024-26655": { + "cmt_msg": "Fix memory leak in posix_clock_open()" }, - "CVE-2019-14816": { - "cmt_msg": "mwifiex: Fix three heap overflow at parsing element in cfg80211_ap_settings" + "CVE-2024-26654": { + "cmt_msg": "ALSA: sh: aica: reorder cleanup operations to avoid UAF bugs" }, - "CVE-2019-14814": { - "cmt_msg": "mwifiex: Fix three heap overflow at parsing element in cfg80211_ap_settings" + "CVE-2024-26656": { + "cmt_msg": "drm/amdgpu: fix use-after-free bug" }, - "CVE-2019-14815": { - "cmt_msg": "mwifiex: Fix three heap overflow at parsing element in cfg80211_ap_settings" + "CVE-2024-26651": { + "cmt_msg": "sr9800: Add check for usbnet_get_endpoints" }, - "CVE-2023-6240": { - "cmt_msg": "" + "CVE-2024-26650": { + "cmt_msg": "platform/x86: p2sb: Allow p2sb_bar() calls during PCI device probe" }, - "CVE-2023-23559": { - "cmt_msg": "wifi: rndis_wlan: Prevent buffer overflow in rndis_query_oid" + "CVE-2024-26652": { + "cmt_msg": "net: pds_core: Fix possible double free in error handling path" }, - "CVE-2020-10720": { - "cmt_msg": "net-gro: fix use-after-free read in napi_gro_frags()" + "CVE-2023-52475": { + "cmt_msg": "Input: powermate - fix use-after-free in powermate_config_complete" }, - "CVE-2022-0382": { - "cmt_msg": "net ticp:fix a kernel-infoleak in __tipc_sendmsg()" + "CVE-2023-52477": { + "cmt_msg": "usb: hub: Guard against accesses to uninitialized BOS descriptors" }, - "CVE-2023-2177": { - "cmt_msg": "sctp: leave the err path free in sctp_stream_init to sctp_stream_free" + "CVE-2023-52476": { + "cmt_msg": "perf/x86/lbr: Filter vsyscall addresses" }, - "CVE-2023-32233": { - "cmt_msg": "netfilter: nf_tables: deactivate anonymous set from preparation phase" + "CVE-2023-52470": { + "cmt_msg": "drm/radeon: check the alloc_workqueue return value in radeon_crtc_init()" }, - "CVE-2020-25672": { - "cmt_msg": "nfc: fix memory leak in llcp_sock_connect()" + "CVE-2023-52473": { + "cmt_msg": "thermal: core: Fix NULL pointer dereference in zone registration error path" }, - "CVE-2019-9455": { - "cmt_msg": "media: videobuf2-v4l2: drop WARN_ON in vb2_warn_zero_bytesused()" + "CVE-2023-52479": { + "cmt_msg": "ksmbd: fix uaf in smb20_oplock_break_ack" }, - "CVE-2020-25670": { - "cmt_msg": "nfc: fix refcount leak in llcp_sock_bind()" + "CVE-2023-52478": { + "cmt_msg": "HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect" }, - "CVE-2020-25671": { - "cmt_msg": "nfc: fix refcount leak in llcp_sock_connect()" + "CVE-2021-3542": { + "cmt_msg": "" }, - "CVE-2019-15222": { - "cmt_msg": "ALSA: usb-audio: Fix gpf in snd_usb_pipe_sanity_check" + "CVE-2018-12929": { + "cmt_msg": "" }, - "CVE-2019-15223": { - "cmt_msg": "ALSA: line6: Assure canceling delayed work at disconnection" + "CVE-2018-12928": { + "cmt_msg": "" }, - "CVE-2019-19813": { - "cmt_msg": "btrfs: inode: Verify inode mode to avoid NULL pointer dereference" + "CVE-2024-26778": { + "cmt_msg": "fbdev: savage: Error out if pixclock equals zero" }, - "CVE-2019-15221": { - "cmt_msg": "ALSA: line6: Fix write on zero-sized buffer" + "CVE-2020-10708": { + "cmt_msg": "" }, - "CVE-2019-19815": { - "cmt_msg": "f2fs: support swap file w/ DIO" + "CVE-2023-32629": { + "cmt_msg": "" }, - "CVE-2019-19814": { + "CVE-2022-0400": { "cmt_msg": "" }, - "CVE-2020-29371": { - "cmt_msg": "romfs: fix uninitialized memory leak in romfs_dev_read()" + "CVE-2024-26808": { + "cmt_msg": "netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain" }, - "CVE-2019-19816": { - "cmt_msg": "btrfs: inode: Verify inode mode to avoid NULL pointer dereference" + "CVE-2024-26809": { + "cmt_msg": "netfilter: nft_set_pipapo: release elements in clone only from destroy path" }, - "CVE-2023-1118": { - "cmt_msg": "media: rc: Fix use-after-free bugs caused by ene_tx_irqsim()" + "CVE-2024-26804": { + "cmt_msg": "net: ip_tunnel: prevent perpetual headroom growth" }, - "CVE-2022-1016": { - "cmt_msg": "netfilter: nf_tables: initialize registers in nft_do_chain()" + "CVE-2024-26805": { + "cmt_msg": "netlink: Fix kernel-infoleak-after-free in __skb_datagram_iter" }, - "CVE-2022-1011": { - "cmt_msg": "fuse: fix pipe buffer lifetime for direct_io" + "CVE-2024-26806": { + "cmt_msg": "spi: cadence-qspi: remove system-wide suspend helper calls from runtime PM hooks" }, - "CVE-2019-5108": { - "cmt_msg": "mac80211: Do not send Layer 2 Update frame before authorization" + "CVE-2024-26807": { + "cmt_msg": "spi: cadence-qspi: fix pointer reference in runtime PM hooks" }, - "CVE-2022-0001": { - "cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE" + "CVE-2024-26801": { + "cmt_msg": "Bluetooth: Avoid potential use-after-free in hci_error_reset" }, - "CVE-2022-1012": { - "cmt_msg": "secure_seq: use the 64 bits of the siphash for port offset calculation" + "CVE-2024-26802": { + "cmt_msg": "stmmac: Clear variable when destroying workqueue" }, - "CVE-2022-38096": { - "cmt_msg": "" + "CVE-2023-52508": { + "cmt_msg": "nvme-fc: Prevent null pointer dereference in nvme_fc_io_getuuid()" }, - "CVE-2020-8649": { - "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region" + "CVE-2023-52606": { + "cmt_msg": "powerpc/lib: Validate size for vector operations" }, - "CVE-2020-12656": { - "cmt_msg": "sunrpc: check that domain table is empty at module unload." + "CVE-2023-52607": { + "cmt_msg": "powerpc/mm: Fix null-pointer dereference in pgtable_cache_add" }, - "CVE-2020-14356": { - "cmt_msg": "cgroup: fix cgroup_sk_alloc() for sk_clone_lock()" + "CVE-2023-52604": { + "cmt_msg": "FS:JFS:UBSAN:array-index-out-of-bounds in dbAdjTree" }, - "CVE-2021-26931": { - "cmt_msg": "xen-blkback: don't \"handle\" error by BUG()" + "CVE-2023-52602": { + "cmt_msg": "jfs: fix slab-out-of-bounds Read in dtSearch" }, - "CVE-2021-26930": { - "cmt_msg": "xen-blkback: fix error handling in xen_blkbk_map()" + "CVE-2023-52603": { + "cmt_msg": "UBSAN: array-index-out-of-bounds in dtSplitRoot" }, - "CVE-2021-42252": { - "cmt_msg": "soc: aspeed: lpc-ctrl: Fix boundary check for mmap" + "CVE-2023-52600": { + "cmt_msg": "jfs: fix uaf in jfs_evict_inode" }, - "CVE-2021-26932": { - "cmt_msg": "Xen/x86: don't bail early from clear_foreign_p2m_mapping()" + "CVE-2023-52601": { + "cmt_msg": "jfs: fix array-index-out-of-bounds in dbAdjTree" }, - "CVE-2023-3141": { - "cmt_msg": "memstick: r592: Fix UAF bug in r592_remove due to race condition" + "CVE-2023-52608": { + "cmt_msg": "firmware: arm_scmi: Check mailbox/SMT channel for consistency" }, - "CVE-2022-0492": { - "cmt_msg": "cgroup-v1: Require capabilities to set release_agent" + "CVE-2023-52609": { + "cmt_msg": "binder: fix race between mmput() and do_exit()" }, - "CVE-2020-12352": { - "cmt_msg": "Bluetooth: A2MP: Fix not initializing all members" + "CVE-2023-3640": { + "cmt_msg": "" }, - "CVE-2020-12351": { - "cmt_msg": "Bluetooth: L2CAP: Fix calling sk_filter on non-socket based channel" + "CVE-2023-4010": { + "cmt_msg": "" }, - "CVE-2020-12655": { - "cmt_msg": "xfs: add agf freeblocks verify in xfs_agf_verify" + "CVE-2019-19378": { + "cmt_msg": "" }, - "CVE-2022-20132": { - "cmt_msg": "HID: add hid_is_usb() function to make it simpler for USB detection" + "CVE-2020-24503": { + "cmt_msg": "" }, - "CVE-2022-0494": { - "cmt_msg": "block-map: add __GFP_ZERO flag for alloc_page in function bio_copy_kern" + "CVE-2020-24502": { + "cmt_msg": "" }, - "CVE-2023-2269": { - "cmt_msg": "dm ioctl: fix nested locking in table_clear() to remove deadlock concern" + "CVE-2020-11725": { + "cmt_msg": "" }, - "CVE-2020-26088": { - "cmt_msg": "net/nfc/rawsock.c: add CAP_NET_RAW check." + "CVE-2022-3606": { + "cmt_msg": "" }, - "CVE-2022-3524": { - "cmt_msg": "tcp/udp: Fix memory leak in ipv6_renew_options()." + "CVE-2022-2209": { + "cmt_msg": "" }, - "CVE-2022-3523": { - "cmt_msg": "mm/memory.c: fix race when faulting a device private page" + "CVE-2024-26775": { + "cmt_msg": "aoe: avoid potential deadlock at set_capacity" }, - "CVE-2022-3522": { - "cmt_msg": "mm/hugetlb: use hugetlb_pte_stable in migration race check" + "CVE-2023-7042": { + "cmt_msg": "wifi: ath10k: fix NULL pointer dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev()" }, - "CVE-2008-2544": { - "cmt_msg": "" + "CVE-2023-52559": { + "cmt_msg": "iommu/vt-d: Avoid memory allocation in iommu_suspend()" }, - "CVE-2021-3178": { - "cmt_msg": "nfsd4: readdirplus shouldn't return parent of export" + "CVE-2023-47233": { + "cmt_msg": "wifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach" }, - "CVE-2022-42703": { - "cmt_msg": "mm/rmap: Fix anon_vma->degree ambiguity leading to double-reuse" + "CVE-2024-23850": { + "cmt_msg": "btrfs: do not ASSERT() if the newly created subvolume already got read" }, - "CVE-2019-15031": { - "cmt_msg": "powerpc/tm: Fix restoring FP/VMX facility incorrectly on interrupts" + "CVE-2024-23851": { + "cmt_msg": "dm: limit the number of targets and parameter size area" }, - "CVE-2019-15030": { - "cmt_msg": "powerpc/tm: Fix FP/VMX unavailable exceptions inside a transaction" + "CVE-2023-52629": { + "cmt_msg": "sh: push-switch: Reorder cleanup operations to avoid use-after-free bug" }, - "CVE-2022-0330": { - "cmt_msg": "drm/i915: Flush TLBs before releasing backing store" + "CVE-2024-26772": { + "cmt_msg": "ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal()" }, - "CVE-2007-3719": { - "cmt_msg": "" + "CVE-2024-26758": { + "cmt_msg": "md: Don't ignore suspended array in md_check_recovery()" }, - "CVE-2023-3863": { - "cmt_msg": "net: nfc: Fix use-after-free caused by nfc_llcp_find_local" + "CVE-2024-26610": { + "cmt_msg": "wifi: iwlwifi: fix a memory corruption" }, - "CVE-2023-0590": { - "cmt_msg": "net: sched: fix race condition in qdisc_graft()" + "CVE-2024-26612": { + "cmt_msg": "netfs, fscache: Prevent Oops in fscache_put_cache()" }, - "CVE-2022-4095": { - "cmt_msg": "staging: rtl8712: fix use after free bugs" + "CVE-2023-6606": { + "cmt_msg": "smb: client: fix OOB in smbCalcSize()" }, - "CVE-2022-45919": { - "cmt_msg": "media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221" + "CVE-2024-26614": { + "cmt_msg": "tcp: make sure init the accept_queue's spinlocks once" }, - "CVE-2019-19319": { - "cmt_msg": "ext4: protect journal inode's blocks using block_validity" + "CVE-2024-26616": { + "cmt_msg": "btrfs: scrub: avoid use-after-free when chunk length is not 64K aligned" }, - "CVE-2019-19462": { - "cmt_msg": "kernel/relay.c: handle alloc_percpu returning NULL in relay_open" + "CVE-2024-26751": { + "cmt_msg": "ARM: ep93xx: Add terminator to gpiod_lookup_table" }, - "CVE-2023-30772": { - "cmt_msg": "power: supply: da9150: Fix use after free bug in da9150_charger_remove due to race condition" + "CVE-2024-26752": { + "cmt_msg": "l2tp: pass correct message length to ip6_append_data" }, - "CVE-2022-24958": { - "cmt_msg": "usb: gadget: don't release an existing dev->buf" + "CVE-2024-26753": { + "cmt_msg": "crypto: virtio/akcipher - Fix stack overflow on memcpy" }, - "CVE-2023-1611": { - "cmt_msg": "btrfs: fix race between quota disable and quota assign ioctls" + "CVE-2024-26754": { + "cmt_msg": "gtp: fix use-after-free and null-ptr-deref in gtp_genl_dump_pdp()" }, - "CVE-2021-3772": { - "cmt_msg": "sctp: use init_tag from inithdr for ABORT chunk" + "CVE-2024-26756": { + "cmt_msg": "md: Don't register sync_thread for reshape directly" }, - "CVE-2021-3679": { - "cmt_msg": "tracing: Fix bug in rb_per_cpu_empty() that might cause deadloop." + "CVE-2024-26757": { + "cmt_msg": "md: Don't ignore read-only array in md_check_recovery()" }, - "CVE-2022-2586": { - "cmt_msg": "netfilter: nf_tables: do not allow SET_ID to refer to another table" + "CVE-2023-52439": { + "cmt_msg": "uio: Fix use-after-free in uio_open" }, - "CVE-2022-3629": { - "cmt_msg": "vsock: Fix memory leak in vsock_connect()" + "CVE-2023-52438": { + "cmt_msg": "binder: fix use-after-free in shinker's callback" }, - "CVE-2021-28715": { - "cmt_msg": "xen/netback: don't queue unlimited number of packages" + "CVE-2023-52435": { + "cmt_msg": "net: prevent mss overflow in skb_segment()" }, - "CVE-2021-28714": { - "cmt_msg": "xen/netback: fix rx queue stall detection" + "CVE-2023-52434": { + "cmt_msg": "smb: client: fix potential OOBs in smb2_parse_contexts()" }, - "CVE-2021-28713": { - "cmt_msg": "xen/console: harden hvc_xen against event channel storms" + "CVE-2023-52436": { + "cmt_msg": "f2fs: explicitly null-terminate the xattr list" }, - "CVE-2021-28712": { - "cmt_msg": "xen/netfront: harden netfront against event channel storms" + "CVE-2024-26688": { + "cmt_msg": "fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super" }, - "CVE-2021-28711": { - "cmt_msg": "xen/blkfront: harden blkfront against event channel storms" + "CVE-2024-26689": { + "cmt_msg": "ceph: prevent use-after-free in encode_cap_msg()" }, - "CVE-2021-4157": { - "cmt_msg": "pNFS/flexfiles: fix incorrect size check in decode_nfs_fh()" + "CVE-2022-2961": { + "cmt_msg": "" }, - "CVE-2022-2991": { - "cmt_msg": "remove the lightnvm subsystem" + "CVE-2023-5197": { + "cmt_msg": "netfilter: nf_tables: disallow rule removal from chain binding" }, - "CVE-2022-3621": { - "cmt_msg": "nilfs2: fix NULL pointer dereference at nilfs_bmap_lookup_at_level()" + "CVE-2024-26680": { + "cmt_msg": "net: atlantic: Fix DMA mapping for PTP hwts ring" }, - "CVE-2022-23960": { - "cmt_msg": "ARM: report Spectre v2 status through sysfs" + "CVE-2024-26681": { + "cmt_msg": "netdevsim: avoid potential loop in nsim_dev_trap_report_work()" }, - "CVE-2023-51781": { - "cmt_msg": "appletalk: Fix Use-After-Free in atalk_ioctl" + "CVE-2024-26686": { + "cmt_msg": "fs/proc: do_task_stat: use sig->stats_lock to gather the threads/children stats" }, - "CVE-2022-3624": { - "cmt_msg": "bonding: fix reference count leak in balance-alb mode" + "CVE-2024-26687": { + "cmt_msg": "xen/events: close evtchn after mapping cleanup" }, - "CVE-2022-2588": { - "cmt_msg": "net_sched: cls_route: remove from list when handle is 0" + "CVE-2023-51779": { + "cmt_msg": "Bluetooth: af_bluetooth: Fix Use-After-Free in bt_sock_recvmsg" }, - "CVE-2021-39657": { - "cmt_msg": "scsi: ufs: Correct the LUN used in eh_device_reset_handler() callback" + "CVE-2024-26685": { + "cmt_msg": "nilfs2: fix potential bug in end_buffer_async_write" }, - "CVE-2021-3669": { - "cmt_msg": "ipc: replace costly bailout check in sysvipc_find_ipc()" + "CVE-2023-2640": { + "cmt_msg": "" }, - "CVE-2019-3701": { - "cmt_msg": "can: gw: ensure DLC boundaries after CAN frame modification" + "CVE-2023-6915": { + "cmt_msg": "ida: Fix crash in ida_free when the bitmap is empty" }, - "CVE-2019-12984": { - "cmt_msg": "nfc: Ensure presence of required attributes in the deactivate_target handler" + "CVE-2010-4563": { + "cmt_msg": "" }, - "CVE-2023-1095": { - "cmt_msg": "netfilter: nf_tables: fix null deref due to zeroed list head" + "CVE-2023-4622": { + "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES" }, - "CVE-2019-11091": { - "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" + "CVE-2024-26663": { + "cmt_msg": "tipc: Check the bearer type before calling tipc_udp_nl_bearer_add()" }, - "CVE-2022-3239": { - "cmt_msg": "media: em28xx: initialize refcount before kref_get" + "CVE-2023-52640": { + "cmt_msg": "fs/ntfs3: Fix oob in ntfs_listxattr" }, - "CVE-2022-4543": { + "CVE-2023-52641": { + "cmt_msg": "fs/ntfs3: Add NULL ptr dereference checking at the end of attr_allocate_frame()" + }, + "CVE-2021-0399": { "cmt_msg": "" }, - "CVE-2020-15780": { - "cmt_msg": "ACPI: configfs: Disallow loading ACPI tables when locked down" + "CVE-2023-52488": { + "cmt_msg": "serial: sc16is7xx: convert from _raw_ to _noinc_ regmap functions for FIFO" }, - "CVE-2023-4921": { - "cmt_msg": "net: sched: sch_qfq: Fix UAF in qfq_dequeue()" + "CVE-2023-52489": { + "cmt_msg": "mm/sparsemem: fix race in accessing memory_section->usage" }, - "CVE-2022-3424": { - "cmt_msg": "misc: sgi-gru: fix use-after-free error in gru_set_context_option, gru_fault and gru_handle_user_call_os" + "CVE-2023-52484": { + "cmt_msg": "iommu/arm-smmu-v3: Fix soft lockup triggered by arm_smmu_mm_invalidate_range" }, - "CVE-2023-23455": { - "cmt_msg": "net: sched: atm: dont intepret cls results when asked to drop" + "CVE-2023-42754": { + "cmt_msg": "ipv4: fix null-deref in ipv4_link_failure" }, - "CVE-2023-1829": { - "cmt_msg": "net/sched: Retire tcindex classifier" + "CVE-2023-52486": { + "cmt_msg": "drm: Don't unref the same fb many times by mistake due to deadlock handling" }, - "CVE-2019-19227": { - "cmt_msg": "appletalk: Fix potential NULL pointer dereference in unregister_snap_client" + "CVE-2023-42756": { + "cmt_msg": "netfilter: ipset: Fix race between IPSET_CMD_CREATE and IPSET_CMD_SWAP" }, - "CVE-2021-34981": { - "cmt_msg": "Bluetooth: cmtp: fix file refcount when cmtp_attach_device fails" + "CVE-2023-52480": { + "cmt_msg": "ksmbd: fix race condition between session lookup and expire" }, - "CVE-2024-0775": { - "cmt_msg": "ext4: improve error recovery code paths in __ext4_remount()" + "CVE-2012-4542": { + "cmt_msg": "" }, - "CVE-2018-14625": { - "cmt_msg": "vhost/vsock: fix use-after-free in network stack callers" + "CVE-2023-52482": { + "cmt_msg": "x86/srso: Add SRSO mitigation for Hygon processors" }, - "CVE-2023-4881": { - "cmt_msg": "netfilter: nftables: exthdr: fix 4-byte stack OOB write" + "CVE-2023-52483": { + "cmt_msg": "mctp: perform route lookups under a RCU read-side lock" }, - "CVE-2020-24394": { - "cmt_msg": "nfsd: apply umask on fs without ACL support" + "CVE-2023-52491": { + "cmt_msg": "media: mtk-jpeg: Fix use after free bug due to error path handling in mtk_jpeg_dec_device_run" }, - "CVE-2022-20148": { - "cmt_msg": "f2fs: fix UAF in f2fs_available_free_memory" + "CVE-2024-26759": { + "cmt_msg": "mm/swap: fix race when skipping swapcache" }, - "CVE-2024-0607": { - "cmt_msg": "netfilter: nf_tables: fix pointer math issue in nft_byteorder_eval()" + "CVE-2024-26615": { + "cmt_msg": "net/smc: fix illegal rmb_desc access in SMC-D connection dump" }, - "CVE-2013-7445": { + "CVE-2021-3714": { "cmt_msg": "" }, - "CVE-2019-18814": { - "cmt_msg": "apparmor: Fix use-after-free in aa_audit_rule_init" + "CVE-2021-3892": { + "cmt_msg": "" }, - "CVE-2022-28390": { - "cmt_msg": "can: ems_usb: ems_usb_start_xmit(): fix double dev_kfree_skb() in error path" + "CVE-2024-24860": { + "cmt_msg": "Bluetooth: Fix atomicity violation in {min,max}_key_size_set" }, - "CVE-2023-34255": { - "cmt_msg": "xfs: verify buffer contents when we skip log replay" + "CVE-2024-24861": { + "cmt_msg": "media: xc4000: Fix atomicity violation in xc4000_get_frequency" }, - "CVE-2019-13233": { - "cmt_msg": "x86/insn-eval: Fix use-after-free access to LDT entry" + "CVE-2024-24864": { + "cmt_msg": "" }, - "CVE-2022-26966": { - "cmt_msg": "sr9700: sanity check for packet length" + "CVE-2023-52596": { + "cmt_msg": "sysctl: Fix out of bounds access for empty sysctl registers" }, - "CVE-2021-3655": { - "cmt_msg": "sctp: validate from_addr_param return" + "CVE-2023-52597": { + "cmt_msg": "KVM: s390: fix setting of fpc register" }, - "CVE-2020-14386": { - "cmt_msg": "net/packet: fix overflow in tpacket_rcv" + "CVE-2023-52594": { + "cmt_msg": "wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus()" }, - "CVE-2021-34693": { - "cmt_msg": "can: bcm: fix infoleak in struct bcm_msg_head" + "CVE-2023-52595": { + "cmt_msg": "wifi: rt2x00: restart beacon queue when hardware reset" }, - "CVE-2020-14385": { - "cmt_msg": "xfs: fix boundary test in xfs_attr_shortform_verify" + "CVE-2023-52593": { + "cmt_msg": "wifi: wfx: fix possible NULL pointer dereference in wfx_set_mfp_ap()" }, - "CVE-2019-19767": { - "cmt_msg": "ext4: add more paranoia checking in ext4_expand_extra_isize handling" + "CVE-2023-52590": { + "cmt_msg": "ocfs2: Avoid touching renamed directory if parent does not change" }, - "CVE-2021-3656": { - "cmt_msg": "KVM: nSVM: always intercept VMLOAD/VMSAVE when nested (CVE-2021-3656)" + "CVE-2023-52591": { + "cmt_msg": "reiserfs: Avoid touching renamed directory if parent does not change" }, - "CVE-2020-14381": { - "cmt_msg": "futex: Fix inode life-time issue" + "CVE-2023-52598": { + "cmt_msg": "s390/ptrace: handle setting of fpc register correctly" }, - "CVE-2019-19768": { - "cmt_msg": "blktrace: Protect q->blk_trace with RCU" + "CVE-2023-52599": { + "cmt_msg": "jfs: fix array-index-out-of-bounds in diNewExt" }, - "CVE-2022-3303": { - "cmt_msg": "ALSA: pcm: oss: Fix race at SNDCTL_DSP_SYNC" + "CVE-2024-26627": { + "cmt_msg": "scsi: core: Move scsi_host_busy() out of host lock for waking up EH handler" }, - "CVE-2023-52443": { - "cmt_msg": "apparmor: avoid crash when parsed profile name is empty" + "CVE-2023-52446": { + "cmt_msg": "bpf: Fix a race condition between btf_put() and map_free()" }, - "CVE-2022-20141": { - "cmt_msg": "igmp: Add ip_mc_list lock in ip_check_mc_rcu" + "CVE-2011-4916": { + "cmt_msg": "" }, - "CVE-2020-25704": { - "cmt_msg": "perf/core: Fix a memory leak in perf_event_parse_addr_filter()" + "CVE-2024-26622": { + "cmt_msg": "tomoyo: fix UAF write bug in tomoyo_write_control()" }, - "CVE-2021-45095": { - "cmt_msg": "phonet: refcount leak in pep_sock_accep" + "CVE-2022-41848": { + "cmt_msg": "" }, - "CVE-2023-23454": { - "cmt_msg": "net: sched: cbq: dont intepret cls results when asked to drop" + "CVE-2021-39801": { + "cmt_msg": "" }, - "CVE-2019-3819": { - "cmt_msg": "HID: debug: fix the ring buffer implementation" + "CVE-2021-39800": { + "cmt_msg": "" }, - "CVE-2021-37159": { - "cmt_msg": "usb: hso: fix error handling code of hso_create_net_device" + "CVE-2024-22099": { + "cmt_msg": "Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security" }, - "CVE-2024-26595": { - "cmt_msg": "mlxsw: spectrum_acl_tcam: Fix NULL pointer dereference in error path" + "CVE-2022-45885": { + "cmt_msg": "" }, - "CVE-2021-29154": { - "cmt_msg": "bpf, x86: Validate computation of branch displacements for x86-64" + "CVE-2022-45884": { + "cmt_msg": "" }, - "CVE-2023-6932": { - "cmt_msg": "ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet" + "CVE-2024-25740": { + "cmt_msg": "" }, - "CVE-2020-16166": { - "cmt_msg": "random32: update the net random state on interrupt and activity" + "CVE-2024-25741": { + "cmt_msg": "" }, - "CVE-2021-29155": { - "cmt_msg": "bpf: Use correct permission flag for mixed signed bounds arithmetic" + "CVE-2023-52509": { + "cmt_msg": "ravb: Fix use-after-free issue in ravb_tx_timeout_work()" }, - "CVE-2021-33631": { - "cmt_msg": "ext4: fix kernel BUG in 'ext4_write_inline_data_end()'" + "CVE-2023-46343": { + "cmt_msg": "nfc: nci: fix possible NULL pointer dereference in send_acknowledge()" }, - "CVE-2019-15916": { - "cmt_msg": "net-sysfs: Fix mem leak in netdev_register_kobject" + "CVE-2024-25744": { + "cmt_msg": "x86/coco: Disable 32-bit emulation by default on TDX and SEV" }, - "CVE-2019-15917": { - "cmt_msg": "Bluetooth: hci_ldisc: Postpone HCI_UART_PROTO_READY bit set in hci_uart_set_proto()" + "CVE-2023-52505": { + "cmt_msg": "phy: lynx-28g: serialize concurrent phy_set_mode_ext() calls to shared registers" }, - "CVE-2019-15918": { - "cmt_msg": "cifs: Fix lease buffer length error" + "CVE-2023-52504": { + "cmt_msg": "x86/alternatives: Disable KASAN in apply_alternatives()" }, - "CVE-2019-15919": { - "cmt_msg": "cifs: Fix use-after-free in SMB2_write" + "CVE-2023-52507": { + "cmt_msg": "nfc: nci: assert requested protocol is valid" }, - "CVE-2023-52444": { - "cmt_msg": "f2fs: fix to avoid dirent corruption" + "CVE-2023-52506": { + "cmt_msg": "LoongArch: Set all reserved memblocks on Node#0 at initialization" }, - "CVE-2020-12362": { - "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" + "CVE-2023-52501": { + "cmt_msg": "ring-buffer: Do not attempt to read past \"commit\"" }, - "CVE-2020-12363": { - "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" + "CVE-2023-52500": { + "cmt_msg": "scsi: pm80xx: Avoid leaking tags when processing OPC_INB_SET_CONTROLLER_CONFIG command" }, - "CVE-2022-4129": { - "cmt_msg": "l2tp: Serialize access to sk_user_data with sk_callback_lock" + "CVE-2023-52503": { + "cmt_msg": "tee: amdtee: fix use-after-free vulnerability in amdtee_close_session" }, - "CVE-2023-3117": { - "cmt_msg": "netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE" + "CVE-2023-52502": { + "cmt_msg": "net: nfc: fix races in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn()" }, - "CVE-2022-28389": { - "cmt_msg": "can: mcba_usb: mcba_usb_start_xmit(): fix double dev_kfree_skb in error path" + "CVE-2023-6817": { + "cmt_msg": "netfilter: nft_set_pipapo: skip inactive elements during set walk" }, - "CVE-2020-12364": { - "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" + "CVE-2024-26668": { + "cmt_msg": "netfilter: nft_limit: reject configurations that cause integer overflow" }, - "CVE-2019-10639": { - "cmt_msg": "netns: provide pure entropy for net_hash_mix()" + "CVE-2024-26669": { + "cmt_msg": "net/sched: flower: Fix chain template offload" }, - "CVE-2022-28388": { - "cmt_msg": "can: usb_8dev: usb_8dev_start_xmit(): fix double dev_kfree_skb() in error path" + "CVE-2020-25220": { + "cmt_msg": "" }, - "CVE-2023-33203": { - "cmt_msg": "net: qcom/emac: Fix use after free bug in emac_remove due to race condition" + "CVE-2015-2877": { + "cmt_msg": "" }, - "CVE-2021-0605": { - "cmt_msg": "af_key: pfkey_dump needs parameter validation" + "CVE-2024-26660": { + "cmt_msg": "drm/amd/display: Implement bounds check for stream encoder creation in DCN301" }, - "CVE-2021-3896": { - "cmt_msg": "isdn: cpai: check ctr->cnr to avoid array index out of bound" + "CVE-2024-26661": { + "cmt_msg": "drm/amd/display: Add NULL test for 'timing generator' in 'dcn21_set_pipe()'" }, - "CVE-2021-4002": { - "cmt_msg": "hugetlbfs: flush TLBs correctly after huge_pmd_unshare" + "CVE-2024-26662": { + "cmt_msg": "drm/amd/display: Fix 'panel_cntl' could be null in 'dcn21_set_backlight_level()'" }, - "CVE-2023-26545": { - "cmt_msg": "net: mpls: fix stale pointer if allocation fails during device rename" + "CVE-2023-26242": { + "cmt_msg": "" }, - "CVE-2021-38204": { - "cmt_msg": "usb: max-3421: Prevent corruption of freed memory" + "CVE-2024-26664": { + "cmt_msg": "hwmon: (coretemp) Fix out-of-bounds memory access" }, - "CVE-2022-34918": { - "cmt_msg": "netfilter: nf_tables: stricter validation of element data" + "CVE-2024-26665": { + "cmt_msg": "tunnels: fix out of bounds access when building IPv6 PMTU error" }, - "CVE-2022-20008": { - "cmt_msg": "mmc: block: fix read single on recovery logic" + "CVE-2019-16089": { + "cmt_msg": "" }, - "CVE-2021-3894": { - "cmt_msg": "sctp: account stream padding length for reconf chunk" + "CVE-2024-26667": { + "cmt_msg": "drm/msm/dpu: check for valid hw_pp in dpu_encoder_helper_phys_cleanup" }, - "CVE-2019-18786": { - "cmt_msg": "media: rcar_drif: fix a memory disclosure" + "CVE-2021-3847": { + "cmt_msg": "" }, - "CVE-2019-20810": { - "cmt_msg": "media: go7007: fix a miss of snd_card_free" + "CVE-2023-5972": { + "cmt_msg": "nf_tables: fix NULL pointer dereference in nft_expr_inner_parse()" }, - "CVE-2023-52464": { - "cmt_msg": "EDAC/thunderx: Fix possible out-of-bounds string access" + "CVE-2023-52444": { + "cmt_msg": "f2fs: fix to avoid dirent corruption" }, - "CVE-2019-20812": { - "cmt_msg": "af_packet: set defaule value for tmo" + "CVE-2023-52445": { + "cmt_msg": "media: pvrusb2: fix use after free on context disconnection" }, - "CVE-2023-1990": { - "cmt_msg": "nfc: st-nci: Fix use after free bug in ndlc_remove due to race condition" + "CVE-2011-4917": { + "cmt_msg": "" }, - "CVE-2020-14314": { - "cmt_msg": "ext4: fix potential negative array index in do_split()" + "CVE-2023-52447": { + "cmt_msg": "bpf: Defer the free of inner map when necessary" }, - "CVE-2019-9003": { - "cmt_msg": "ipmi: fix use-after-free of user->release_barrier.rda" + "CVE-2023-52448": { + "cmt_msg": "gfs2: Fix kernel NULL pointer dereference in gfs2_rgrp_dump" }, - "CVE-2023-6356": { + "CVE-2023-52449": { + "cmt_msg": "mtd: Fix gluebi NULL pointer dereference caused by ftl notifier" + }, + "CVE-2023-23039": { "cmt_msg": "" }, - "CVE-2022-26373": { - "cmt_msg": "x86/speculation: Add RSB VM Exit protections" + "CVE-2024-26718": { + "cmt_msg": "dm-crypt, dm-verity: disable tasklets" }, - "CVE-2019-18660": { - "cmt_msg": "powerpc/book3s64: Fix link stack flush on context switch" + "CVE-2024-26719": { + "cmt_msg": "nouveau: offload fence uevents work to workqueue" }, - "CVE-2019-15291": { - "cmt_msg": "media: b2c2-flexcop-usb: add sanity checking" + "CVE-2024-26714": { + "cmt_msg": "interconnect: qcom: sc8180x: Mark CO0 BCM keepalive" }, - "CVE-2019-15290": { - "cmt_msg": "" + "CVE-2024-26715": { + "cmt_msg": "usb: dwc3: gadget: Fix NULL pointer dereference in dwc3_gadget_suspend" }, - "CVE-2023-3212": { - "cmt_msg": "gfs2: Don't deref jdesc in evict" + "CVE-2024-26717": { + "cmt_msg": "HID: i2c-hid-of: fix NULL-deref on failed power up" }, - "CVE-2024-23848": { - "cmt_msg": "" + "CVE-2024-26711": { + "cmt_msg": "iio: adc: ad4130: zero-initialize clock init data" }, - "CVE-2022-0617": { - "cmt_msg": "udf: Fix NULL ptr deref when converting from inline format" + "CVE-2024-26712": { + "cmt_msg": "powerpc/kasan: Fix addr error caused by page alignment" }, - "CVE-2023-4459": { - "cmt_msg": "net: vmxnet3: fix possible NULL pointer dereference in vmxnet3_rq_cleanup()" + "CVE-2024-26713": { + "cmt_msg": "powerpc/pseries/iommu: Fix iommu initialisation during DLPAR add" + } + } + }, + "3.2": { + "3.2.2": { + "CVE-2011-4131": { + "cmt_msg": "NFSv4: include bitmap in nfsv4 get acl data", + "cmt_id": "628fc192adbaae0c6178b9015fb916ce61d72b36" + } + }, + "3.2.15": { + "CVE-2012-2745": { + "cmt_msg": "cred: copy_process() should clear child->replacement_session_keyring", + "cmt_id": "fbb67524e89163c020c3588aec36f3013da0e56e" }, - "CVE-2022-23036": { - "cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()" + "CVE-2012-2375": { + "cmt_msg": "Fix length of buffer copied in __nfs4_get_acl_uncached", + "cmt_id": "a94841724154dac38ce5239d1d88c00e758dc20d" + } + }, + "3.2.17": { + "CVE-2012-2319": { + "cmt_msg": "hfsplus: Fix potential buffer overflows", + "cmt_id": "d4af6eb924ce29b9e46037134ca69ce085b5c36c" + } + }, + "3.2.19": { + "CVE-2012-6701": { + "cmt_msg": "vfs: make AIO use the proper rw_verify_area() area helpers", + "cmt_id": "07343eab681bf8c22a2b31d978569a5f65253171" }, - "CVE-2022-2153": { - "cmt_msg": "KVM: x86: Avoid theoretical NULL pointer dereference in kvm_irq_delivery_to_apic_fast()" + "CVE-2012-2313": { + "cmt_msg": "dl2k: Clean up rio_ioctl", + "cmt_id": "bdd06be083b51fa7bdf04d8c8b699870f29bae69" + } + }, + "3.2.20": { + "CVE-2012-2390": { + "cmt_msg": "hugetlb: fix resv_map leak in error path", + "cmt_id": "73436db332d5b4dd792f115cf0b500521badf3e5" + } + }, + "3.2.22": { + "CVE-2012-2669": { + "cmt_msg": "Tools: hv: verify origin of netlink connector message", + "cmt_id": "10682d24d003b44cc4dac217047d26f9b210a514" + } + }, + "3.2.23": { + "CVE-2012-3511": { + "cmt_msg": "mm: Hold a file reference in madvise_remove", + "cmt_id": "1935549ba38cf30ebe8748ccb88fb99d009241d4" }, - "CVE-2022-20566": { - "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free caused by l2cap_chan_put" + "CVE-2012-3400": { + "cmt_msg": "udf: Fortify loading of sparing table", + "cmt_id": "a9f1af04f086656246f30354fb4564ce3b08c4a0" }, - "CVE-2018-12930": { - "cmt_msg": "" + "CVE-2012-3364": { + "cmt_msg": "NFC: Prevent multiple buffer overflows in NCI", + "cmt_id": "ec5b2b02eedb2c3471d5a87ba0f72d11b04c2af1" }, - "CVE-2018-12931": { - "cmt_msg": "" + "CVE-2012-2136": { + "cmt_msg": "net: sock: validate data_len before allocating skb in sock_alloc_send_pskb()", + "cmt_id": "caade06b9bc468620636953b15d7d36a12d2b88e" + } + }, + "3.2.24": { + "CVE-2012-6638": { + "cmt_msg": "tcp: drop SYN+FIN messages", + "cmt_id": "e6364fb003c0bc98c5fcde51aac6fd3b6a1337c3" }, - "CVE-2024-23196": { - "cmt_msg": "" + "CVE-2012-2119": { + "cmt_msg": "macvtap: zerocopy: fix offset calculation when building skb", + "cmt_id": "c1b5b21b540f22a8e008d30545c044a6c949b47b" }, - "CVE-2020-12768": { - "cmt_msg": "KVM: SVM: Fix potential memory leak in svm_cpu_init()" + "CVE-2012-2137": { + "cmt_msg": "KVM: Fix buffer overflow in kvm_set_irq()", + "cmt_id": "0f3cbc35d2097d2c655789dd4996e7b87bdb5d34" + } + }, + "3.2.27": { + "CVE-2012-6647": { + "cmt_msg": "futex: Forbid uaddr == uaddr2 in futex_wait_requeue_pi()", + "cmt_id": "4344b8578fb31bb06abd397219ac0376f116f6f2" + } + }, + "3.2.28": { + "CVE-2012-6547": { + "cmt_msg": "net/tun: fix ioctl() based info leaks", + "cmt_id": "9deaafcd3ee894ef714c44e0414e85db36e62641" }, - "CVE-2020-12769": { - "cmt_msg": "spi: spi-dw: Add lock protect dw_spi rx/tx to prevent concurrent calls" + "CVE-2013-0310": { + "cmt_msg": "cipso: don't follow a NULL pointer when setsockopt() is called", + "cmt_id": "7f6453d8c6f68e26fa6086c654b7fca39b960637" + } + }, + "3.2.29": { + "CVE-2013-1827": { + "cmt_msg": "dccp: check ccid before dereferencing", + "cmt_id": "372c463a7c5ea46eca693ea52bd95cb8512247f8" + } + }, + "3.2.30": { + "CVE-2012-6689": { + "cmt_msg": "netlink: fix possible spoofing from non-root processes", + "cmt_id": "e6ae7506816cdf4d702c501ceb5202eecf7e4a07" }, - "CVE-2021-32399": { - "cmt_msg": "bluetooth: eliminate the potential race condition when removing the HCI controller" + "CVE-2012-3412": { + "cmt_msg": "net: Allow driver to limit number of GSO segments per skb", + "cmt_id": "99ea81edff2135603588fe12bd95cca2dd76a5cb" }, - "CVE-2019-12380": { - "cmt_msg": "efi/x86/Add missing error handling to old_memmap 1:1 mapping code" + "CVE-2012-6545": { + "cmt_msg": "Bluetooth: RFCOMM - Fix info leak via getsockname()", + "cmt_id": "18fc748c13b0a15152bd711c3d42560f833af9e5" }, - "CVE-2019-12381": { - "cmt_msg": "ip_sockglue: Fix missing-check bug in ip_ra_control()" + "CVE-2012-6544": { + "cmt_msg": "Bluetooth: L2CAP - Fix info leak via getsockname()", + "cmt_id": "79690021eba0738861965187af2f75035f846d6f" }, - "CVE-2019-12382": { - "cmt_msg": "drm/edid: Fix a missing-check bug in drm_load_edid_firmware()" + "CVE-2012-6546": { + "cmt_msg": "atm: fix info leak via getsockname()", + "cmt_id": "86cbb1ef4f7b1e6ac6cb65bb34b6949cd5b90c6e" }, - "CVE-2022-22942": { - "cmt_msg": "drm/vmwgfx: Fix stale file descriptors on failed usercopy" + "CVE-2012-6541": { + "cmt_msg": "dccp: fix info leak via getsockopt(DCCP_SOCKOPT_CCID_TX_INFO)", + "cmt_id": "24635bcd494892f4fce7b2504f3f1c65cc2d6ad2" }, - "CVE-2018-20669": { - "cmt_msg": "make 'user_access_begin()' do 'access_ok()'" + "CVE-2012-6540": { + "cmt_msg": "ipvs: fix info leak in getsockopt(IP_VS_SO_GET_TIMEOUT)", + "cmt_id": "9b2a14018c8a62cf910e10efb4b24787549de5c4" }, - "CVE-2019-19543": { - "cmt_msg": "media: serial_ir: Fix use-after-free in serial_ir_init_module" + "CVE-2012-6542": { + "cmt_msg": "llc: fix info leak via getsockname()", + "cmt_id": "3f497daadeeb2b84dc8e97b32416d98b34485b99" }, - "CVE-2021-3732": { - "cmt_msg": "ovl: prevent private clone if bind mount is not allowed" + "CVE-2012-6539": { + "cmt_msg": "net: fix info leak in compat dev_ifconf()", + "cmt_id": "daf8fa93325e55ec605c4e725e6dc07d63d0d5c1" }, - "CVE-2022-25375": { - "cmt_msg": "usb: gadget: rndis: check size of RNDIS_MSG_SET command" + "CVE-2012-3520": { + "cmt_msg": "af_netlink: force credentials passing [CVE-2012-3520]", + "cmt_id": "dc77000f6fa5f7dd5eac1d02fa7812a131a67b89" + } + }, + "3.2.31": { + "CVE-2013-1826": { + "cmt_msg": "xfrm_user: return error pointer instead of NULL", + "cmt_id": "468bf9f70353872173b11b92dc15fe84d3dacbb4" }, - "CVE-2020-10766": { - "cmt_msg": "x86/speculation: Prevent rogue cross-process SSBD shutdown" + "CVE-2012-3430": { + "cmt_msg": "rds: set correct msg_namelen", + "cmt_id": "2a181c85136b1d5481dd5334037ad160450fa09d" }, - "CVE-2020-10767": { - "cmt_msg": "x86/speculation: Avoid force-disabling IBPB based on STIBP and enhanced IBRS." + "CVE-2012-6538": { + "cmt_msg": "xfrm_user: fix info leak in copy_to_user_auth()", + "cmt_id": "744e0a9c51333d712e76850bf58b4aeb277016fe" }, - "CVE-2018-12207": { - "cmt_msg": "kvm: x86, powerpc: do not allow clearing largepages debugfs entry" + "CVE-2012-6657": { + "cmt_msg": "net: guard tcp_set_keepalive() to tcp sockets", + "cmt_id": "9a2ed90a493c0b955d973b25d81c78621e49af93" }, - "CVE-2020-13143": { - "cmt_msg": "USB: gadget: fix illegal array access in binding with UDC" + "CVE-2012-6536": { + "cmt_msg": "xfrm_user: ensure user supplied esn replay window is valid", + "cmt_id": "ab98741ba1888af9aeb4a88423bda1e2d93932e5" }, - "CVE-2020-10768": { - "cmt_msg": "x86/speculation: PR_SPEC_FORCE_DISABLE enforcement for indirect branches." + "CVE-2012-6537": { + "cmt_msg": "xfrm_user: fix info leak in copy_to_user_tmpl()", + "cmt_id": "26d560eb8ee3e6dd505a5a8a43ff904c279f60ce" + } + }, + "3.2.32": { + "CVE-2013-0309": { + "cmt_msg": "mm: thp: fix pmd_present for split_huge_page and PROT_NONE with THP", + "cmt_id": "ddd937a27bb51cda5a5400df8e18e9a29d7fa8ec" + } + }, + "3.2.33": { + "CVE-2013-1928": { + "cmt_msg": "fs/compat_ioctl.c: VIDEO_SET_SPU_PALETTE missing error check", + "cmt_id": "5bbeedc3110bbb1b5c6b01fc1f027ab5d2eb40d6" }, - "CVE-2020-10769": { - "cmt_msg": "crypto: authenc - fix parsing key with misaligned rta_len" + "CVE-2012-4508": { + "cmt_msg": "ext4: race-condition protection for ext4_convert_unwritten_extents_endio", + "cmt_id": "814a7833df19e1de7447f870ae890adb12561627" }, - "CVE-2024-25740": { - "cmt_msg": "" + "CVE-2012-0957": { + "cmt_msg": "kernel/sys.c: fix stack memory content leak via UNAME26", + "cmt_id": "3042c7c2ee52f0ebfc8e09bc2c4cdbff3fc4ec61" + } + }, + "3.2.34": { + "CVE-2012-4565": { + "cmt_msg": "net: fix divide by zero in tcp algorithm illinois", + "cmt_id": "df769f065d7bebf0ddc5f61605dbb1d8ea5ee2d8" + } + }, + "3.2.36": { + "CVE-2012-4461": { + "cmt_msg": "KVM: x86: invalid opcode oops on SET_SREGS with OSXSAVE bit set (CVE-2012-4461)", + "cmt_id": "53f02039f794725f843494a36d82f045d78ba697" + } + }, + "3.2.37": { + "CVE-2004-0230": { + "cmt_msg": "tcp: implement RFC 5961 3.2", + "cmt_id": "61f69dc4e40e41b0018f00fa4aeb23d3239556fb" + } + }, + "3.2.38": { + "CVE-2013-1774": { + "cmt_msg": "USB: io_ti: Fix NULL dereference in chase_port()", + "cmt_id": "7b4992729ddd232f6026c109f93d8296ca58b3ed" }, - "CVE-2019-0148": { - "cmt_msg": "i40e: Wrong truncation from u16 to u8" + "CVE-2013-0349": { + "cmt_msg": "Bluetooth: Fix incorrect strncpy() in hidp_setup_hid()", + "cmt_id": "150df53ab8dfcdf0b3872a60f7a092c4e541f138" }, - "CVE-2019-0149": { - "cmt_msg": "i40e: Add bounds check for ch[] array" + "CVE-2013-0190": { + "cmt_msg": "xen: Fix stack corruption in xen_failsafe_callback for 32bit PVOPS guests.", + "cmt_id": "5c0ce9fed10a58f65fe2784b664e03bdeaaac650" }, - "CVE-2019-17075": { - "cmt_msg": "RDMA/cxgb4: Do not dma memory off of the stack" + "CVE-2013-0268": { + "cmt_msg": "x86/msr: Add capabilities check", + "cmt_id": "6ebf5f3dfa9dfd384169f001eecf4e5119c670cc" }, - "CVE-2022-3903": { - "cmt_msg": "media: mceusb: Use new usb_control_msg_*() routines" + "CVE-2013-0313": { + "cmt_msg": "evm: checking if removexattr is not a NULL", + "cmt_id": "f666957665d9c9b2ec308963333dbd224271b4d6" + } + }, + "3.2.39": { + "CVE-2013-0228": { + "cmt_msg": "x86/xen: don't assume %ds is usable in xen_iret for 32-bit PVOPS.", + "cmt_id": "9a9adb457bc2665cac647e4c90d76acf23f1a65e" }, - "CVE-2019-19447": { - "cmt_msg": "ext4: work around deleting a file with i_nlink == 0 safely" + "CVE-2013-0871": { + "cmt_msg": "ptrace: introduce signal_wake_up_state() and ptrace_signal_wake_up()", + "cmt_id": "bb24eda9eee7a1cc865bb10dbb89edf7c1f5cdc7" }, - "CVE-2019-0146": { - "cmt_msg": "i40e: add num_vectors checker in iwarp handler" + "CVE-2013-0216": { + "cmt_msg": "netback: correct netbk_tx_err to handle wrap around.", + "cmt_id": "adecb7c418057a934b327c1177d738e17f0cf98a" }, - "CVE-2019-0147": { - "cmt_msg": "i40e: add num_vectors checker in iwarp handler" + "CVE-2013-0217": { + "cmt_msg": "xen/netback: don't leak pages on failure in xen_netbk_tx_check_gop.", + "cmt_id": "dd4d2748d11f601975b78c88130bd274d3e90eb5" + } + }, + "3.2.40": { + "CVE-2013-1767": { + "cmt_msg": "tmpfs: fix use-after-free of mempolicy object", + "cmt_id": "2b82b58d6d1a3c79e28ce80c559a442e3d034b1a" }, - "CVE-2020-10942": { - "cmt_msg": "vhost: Check docket sk_family instead of call getname" + "CVE-2013-0231": { + "cmt_msg": "xen-pciback: rate limit error messages from xen_pcibk_enable_msi{,x}()", + "cmt_id": "ecb1d58c0722e593e50317a63294a52ac2308ace" }, - "CVE-2019-0145": { - "cmt_msg": "i40e: add num_vectors checker in iwarp handler" + "CVE-2013-0311": { + "cmt_msg": "vhost: fix length for cross region descriptor", + "cmt_id": "e188567f35fe514253b2e46a31cf03272ab8c030" }, - "CVE-2022-44034": { - "cmt_msg": "char: pcmcia: remove all the drivers" + "CVE-2012-4530": { + "cmt_msg": "exec: use -ELOOP for max recursion depth", + "cmt_id": "511d07bc0a060049009954eeb8b34eda016c9c0e" + } + }, + "3.2.41": { + "CVE-2012-5517": { + "cmt_msg": "mm/hotplug: correctly add new zone to all other nodes' zone lists", + "cmt_id": "1bdb24f5ab52e64658f496a0dbfe04ffb56edaf6" }, - "CVE-2022-44033": { - "cmt_msg": "char: pcmcia: remove all the drivers" + "CVE-2013-1860": { + "cmt_msg": "USB: cdc-wdm: fix buffer overflow", + "cmt_id": "8e535446a78958888b16db9d619d0f60c1950622" }, - "CVE-2019-11191": { - "cmt_msg": "x86: Deprecate a.out support" + "CVE-2013-1792": { + "cmt_msg": "keys: fix race with concurrent install_user_keyrings()", + "cmt_id": "c1dd1f576c5ce265bb8e186f01c91340a5138f49" }, - "CVE-2023-39198": { - "cmt_msg": "drm/qxl: fix UAF on handle creation" + "CVE-2013-2548": { + "cmt_msg": "crypto: user - fix info leaks in report API", + "cmt_id": "f56cb892159202ee6486c7fd3c5dec3f82bd5114" }, - "CVE-2020-10781": { - "cmt_msg": "Revert \"zram: convert remaining CLASS_ATTR() to CLASS_ATTR_RO()\"" + "CVE-2013-0914": { + "cmt_msg": "signal: always clear sa_restorer on execve", + "cmt_id": "125664f0332d57735ba5b79aed4d94a3c04f1090" }, - "CVE-2020-26139": { - "cmt_msg": "mac80211: do not accept/forward invalid EAPOL frames" + "CVE-2013-1848": { + "cmt_msg": "ext3: Fix format string issues", + "cmt_id": "058f677c359d91e6692dc9a9da36b2e3eadf36ba" }, - "CVE-2019-10220": { - "cmt_msg": "Convert filldir[64]() from __put_user() to unsafe_put_user()" + "CVE-2013-2546": { + "cmt_msg": "crypto: user - fix info leaks in report API", + "cmt_id": "f56cb892159202ee6486c7fd3c5dec3f82bd5114" }, - "CVE-2021-3609": { - "cmt_msg": "can: bcm: delay release of struct bcm_op after synchronize_rcu()" + "CVE-2013-2547": { + "cmt_msg": "crypto: user - fix info leaks in report API", + "cmt_id": "f56cb892159202ee6486c7fd3c5dec3f82bd5114" }, - "CVE-2019-19536": { - "cmt_msg": "can: peak_usb: pcan_usb_pro: Fix info-leaks to USB devices" + "CVE-2013-1773": { + "cmt_msg": "NLS: improve UTF8 -> UTF16 string conversion routine", + "cmt_id": "6022b67230dcb25c267e832d72223ffb54703cc8" + } + }, + "3.2.42": { + "CVE-2013-0913": { + "cmt_msg": "drm/i915: bounds check execbuffer relocation count", + "cmt_id": "48e308efbd714ce74b0db89cfa78941cdebc3568" }, - "CVE-2019-19537": { - "cmt_msg": "USB: core: Fix races in character device registration and deregistraion" + "CVE-2013-2634": { + "cmt_msg": "dcbnl: fix various netlink info leaks", + "cmt_id": "42d4afd275648c190ec1efc13491c294dadfa49d" }, - "CVE-2019-19534": { - "cmt_msg": "can: peak_usb: fix slab info leak" + "CVE-2012-6549": { + "cmt_msg": "isofs: avoid info leak on export", + "cmt_id": "edea8d0998c2b2bdade2b6c44fa6fac27ecfd2b7" }, - "CVE-2019-19535": { - "cmt_msg": "can: peak_usb: pcan_usb_fd: Fix info-leaks to USB devices" + "CVE-2012-6548": { + "cmt_msg": "udf: avoid info leak on export", + "cmt_id": "ac23922b930695ed3178cab78b0a9c31a9fa226b" + } + }, + "3.2.43": { + "CVE-2013-1929": { + "cmt_msg": "tg3: fix length overflow in VPD firmware parsing", + "cmt_id": "2b79fa8fddde2d070ca28a2d94394c39bfd8d741" + } + }, + "3.2.44": { + "CVE-2013-3301": { + "cmt_msg": "tracing: Fix possible NULL pointer dereferences", + "cmt_id": "ee3c9aabb636fcfc21d53c506362620b55fdd8c6" }, - "CVE-2020-11565": { - "cmt_msg": "mm: mempolicy: require at least one nodeid for MPOL_PREFERRED" + "CVE-2013-2141": { + "cmt_msg": "kernel/signal.c: stop info leak via the tkill and the tgkill syscalls", + "cmt_id": "ffe1341edbe2878134f3083625d5c916670d0fca" }, - "CVE-2019-19533": { - "cmt_msg": "media: ttusb-dec: Fix info-leak in ttusb_dec_send_command()" + "CVE-2013-1796": { + "cmt_msg": "KVM: x86: fix for buffer overflow in handling of MSR_KVM_SYSTEM_TIME (CVE-2013-1796)", + "cmt_id": "b7c5ee6d49b7cf5a52ae87b955d7ab984cb9c974" }, - "CVE-2019-19530": { - "cmt_msg": "usb: cdc-acm: make sure a refcount is taken early enough" + "CVE-2013-1797": { + "cmt_msg": "KVM: x86: Convert MSR_KVM_SYSTEM_TIME to use gfn_to_hva_cache functions (CVE-2013-1797)", + "cmt_id": "767d3d43c0a02485a8574c0efe39524f246d698b" }, - "CVE-2019-19531": { - "cmt_msg": "usb: yurex: Fix use-after-free in yurex_delete" + "CVE-2013-1798": { + "cmt_msg": "KVM: Fix bounds checking in ioapic indirect register reads (CVE-2013-1798)", + "cmt_id": "6d29de40486edf7d5a61d40f4b18431e2c644ad0" }, - "CVE-2022-33981": { - "cmt_msg": "floppy: disable FDRAWCMD by default" + "CVE-2013-1979": { + "cmt_msg": "net: fix incorrect credentials passing", + "cmt_id": "5428146ebea24b916eb9e3684449699cb6a5c8c0" + } + }, + "3.2.45": { + "CVE-2013-2094": { + "cmt_msg": "perf: Treat attr.config as u64 in perf_swevent_init()", + "cmt_id": "3fc8fc1cc2d585c1f695f7de914063258aafe50e" }, - "CVE-2021-0929": { - "cmt_msg": "staging/android/ion: delete dma_buf->kmap/unmap implemenation" + "CVE-2013-3076": { + "cmt_msg": "crypto: algif - suppress sending source address information in recvmsg", + "cmt_id": "419f4ba0f032c8d906153d24e017f4bee6df26f5" }, - "CVE-2018-14616": { - "cmt_msg": "f2fs: fix to do sanity check with block address in main area v2" + "CVE-2013-3224": { + "cmt_msg": "Bluetooth: fix possible info leak in bt_sock_recvmsg()", + "cmt_id": "95ee0fb7a014cdf80be37b329fa462ff3847f7c0" }, - "CVE-2019-20095": { - "cmt_msg": "mwifiex: Fix mem leak in mwifiex_tm_cmd" + "CVE-2013-2146": { + "cmt_msg": "perf/x86: Fix offcore_rsp valid mask for SNB/IVB", + "cmt_id": "4fcd6db795fa0f317deb7b64cce89ca2502ff934" }, - "CVE-2018-19985": { - "cmt_msg": "USB: hso: Fix OOB memory access in hso_probe/hso_get_config_data" + "CVE-2013-0160": { + "cmt_msg": "TTY: do not update atime/mtime on read/write", + "cmt_id": "c29ad805df8c54a9f5d74c66bf5d4a2d449bd99a" }, - "CVE-2021-0920": { - "cmt_msg": "af_unix: fix garbage collect vs MSG_PEEK" + "CVE-2013-3222": { + "cmt_msg": "atm: update msg_namelen in vcc_recvmsg()", + "cmt_id": "2a8c07b253bac436358adb9eb96a37dd223ef120" }, - "CVE-2022-0168": { - "cmt_msg": "cifs: fix NULL ptr dereference in smb2_ioctl_query_info()" + "CVE-2013-3223": { + "cmt_msg": "ax25: fix info leak via msg_name in ax25_recvmsg()", + "cmt_id": "e72f86d5b6602c86efb08443c58086c40228b81b" }, - "CVE-2024-26587": { - "cmt_msg": "net: netdevsim: don't try to destroy PHC on VFs" + "CVE-2013-3232": { + "cmt_msg": "netrom: fix info leak via msg_name in nr_recvmsg()", + "cmt_id": "c0bf432a4c3e6870fc87debb9393cb93f638dcba" }, - "CVE-2023-51043": { - "cmt_msg": "drm/atomic: Fix potential use-after-free in nonblocking commits" + "CVE-2013-2596": { + "cmt_msg": "vm: convert fb_mmap to vm_iomap_memory() helper", + "cmt_id": "fc6b92e0aa98ec9547bf779f4e71c0f259f794f3" }, - "CVE-2020-28374": { - "cmt_msg": "scsi: target: Fix XCOPY NAA identifier lookup" + "CVE-2013-3234": { + "cmt_msg": "rose: fix info leak via msg_name in rose_recvmsg()", + "cmt_id": "f05503a9ef115c505b36fcd75f77b341811e9169" + } + }, + "3.2.47": { + "CVE-2013-2850": { + "cmt_msg": "iscsi-target: fix heap buffer overflow on error", + "cmt_id": "ba73be1c56e3a459f5cd4580177e865b362d76a7" }, - "CVE-2019-9213": { - "cmt_msg": "mm: enforce min addr even if capable() in expand_downwards()" + "CVE-2013-2852": { + "cmt_msg": "b43: stop format string leaking into error msgs", + "cmt_id": "bfb624e7fd41437a2c256adaf4041fe4414f8f26" + } + }, + "3.2.49": { + "CVE-2013-1059": { + "cmt_msg": "libceph: Fix NULL pointer dereference in auth client code", + "cmt_id": "88a4055704b39e5c67c9cbc837cc15ec6a6d8671" }, - "CVE-2023-0615": { - "cmt_msg": "media: vivid: dev->bitmap_cap wasn't freed in all cases" + "CVE-2013-2164": { + "cmt_msg": "drivers/cdrom/cdrom.c: use kzalloc() for failing hardware", + "cmt_id": "6dfd19d0d4d5dd081e1312a550ffae6acc85d70a" }, - "CVE-2019-14896": { - "cmt_msg": "libertas: Fix two buffer overflows at parsing bss descriptor" + "CVE-2013-2851": { + "cmt_msg": "block: do not pass disk names as format strings", + "cmt_id": "b442223040adf969fd02124c29c856a06cf5649c" + } + }, + "3.2.50": { + "CVE-2013-4162": { + "cmt_msg": "ipv6: call udp_push_pending_frames when uncorking a socket with AF_INET pending data", + "cmt_id": "5d14d39515e0149b5fcd319e4409d8304e7688c7" }, - "CVE-2019-14897": { - "cmt_msg": "libertas: Fix two buffer overflows at parsing bss descriptor" + "CVE-2013-2232": { + "cmt_msg": "ipv6: ip6_sk_dst_check() must not assume ipv6 dst", + "cmt_id": "a7cdf6bc2abd64f94622fe12a1a212a07a316a83" }, - "CVE-2019-14895": { - "cmt_msg": "mwifiex: fix possible heap overflow in mwifiex_process_country_ie()" + "CVE-2013-2234": { + "cmt_msg": "af_key: fix info leaks in notify messages", + "cmt_id": "31bd7d1943f42c22850bb3bc6a7dd89fc4cf9b08" }, - "CVE-2022-3586": { - "cmt_msg": "sch_sfb: Don't assume the skb is still around after enqueueing to child" + "CVE-2013-2148": { + "cmt_msg": "fanotify: info leak in copy_event_to_user()", + "cmt_id": "72925fa9b85b0501a4e96c5066af3214292d36d2" + } + }, + "3.2.51": { + "CVE-2013-2237": { + "cmt_msg": "af_key: initialize satype in key_notify_policy_flush()", + "cmt_id": "54811a1992e2c5e318ae91b99ea94c9724bc8f66" + } + }, + "3.2.52": { + "CVE-2013-4350": { + "cmt_msg": "net: sctp: fix ipv6 ipsec encryption bug in sctp_v6_xmit", + "cmt_id": "af7e0f4a91ca9049ee9e541f8a98e762a12e9b9b" }, - "CVE-2022-43750": { - "cmt_msg": "usb: mon: make mmapped memory read only" + "CVE-2013-2147": { + "cmt_msg": "cpqarray: fix info leak in ida_locked_ioctl()", + "cmt_id": "e1fd636836ca3c883c172dc619a909e988a2f4b5" }, - "CVE-2020-27825": { - "cmt_msg": "tracing: Fix race in trace_open and buffer resize call" + "CVE-2013-2896": { + "cmt_msg": "HID: ntrig: validate feature report details", + "cmt_id": "c790976bda06884d78a1f8208d74e566ac41954e" }, - "CVE-2019-2181": { - "cmt_msg": "binder: check for overflow when alloc for security context" + "CVE-2013-2895": { + "cmt_msg": "HID: logitech-dj: validate output report details", + "cmt_id": "1eb7b3faf9357f481238a3237f637f77fce974a5" }, - "CVE-2020-27820": { - "cmt_msg": "drm/nouveau: use drm_dev_unplug() during device removal" + "CVE-2013-2889": { + "cmt_msg": "HID: zeroplus: validate output report details", + "cmt_id": "e0f897f0929d27dc5d7de5cc24ccbeac572e5176" }, - "CVE-2023-1078": { - "cmt_msg": "rds: rds_rm_zerocopy_callback() use list_first_entry()" + "CVE-2013-2888": { + "cmt_msg": "HID: validate HID report id size", + "cmt_id": "1ccd1fd4c43407721caa38ae034359bf8d9a1b34" }, - "CVE-2020-0067": { - "cmt_msg": "f2fs: fix to avoid memory leakage in f2fs_listxattr" + "CVE-2013-4387": { + "cmt_msg": "ipv6: udp packets following an UFO enqueued packet need also be handled by UFO", + "cmt_id": "e381c716ed158b0b77879625fa58929f1a59a940" }, - "CVE-2023-4622": { - "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES" + "CVE-2013-2892": { + "cmt_msg": "HID: pantherlord: validate output report details", + "cmt_id": "db841e0c2b59b27c521512930d4e818d92ee1caa" }, - "CVE-2020-26558": { - "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical" + "CVE-2013-2893": { + "cmt_msg": "HID: LG: validate HID output report details", + "cmt_id": "3da8b771809032cf829869cabbffbed96cd47bc4" }, - "CVE-2023-39193": { - "cmt_msg": "netfilter: xt_sctp: validate the flag_info count" + "CVE-2013-0343": { + "cmt_msg": "ipv6: remove max_addresses check from ipv6_create_tempaddr", + "cmt_id": "7319901766396653fae51d2f37c5d23eb4537766" }, - "CVE-2023-1079": { - "cmt_msg": "HID: asus: use spinlock to safely schedule workers" + "CVE-2013-2899": { + "cmt_msg": "HID: picolcd_core: validate output report details", + "cmt_id": "49ad1670d8a0a8e9a7f84272e3054c80563b87bc" + } + }, + "3.2.53": { + "CVE-2013-4470": { + "cmt_msg": "ip6_output: do skb ufo init for peeked non ufo skb as well", + "cmt_id": "5124ae99ac8a8f63d0fca9b75adaef40b20678ff" }, - "CVE-2020-26541": { - "cmt_msg": "certs: Add EFI_CERT_X509_GUID support for dbx entries" + "CVE-2013-7470": { + "cmt_msg": "net: fix cipso packet validation when !NETLABEL", + "cmt_id": "55bf9001c5311b9a3e06c2be94e59b70881adea1" }, - "CVE-2019-20811": { - "cmt_msg": "net-sysfs: call dev_hold if kobject_init_and_add success" + "CVE-2014-1445": { + "cmt_msg": "wanxl: fix info leak in ioctl", + "cmt_id": "e6c24ff286f37711185fe1b6ce1cea58d7fc8c50" }, - "CVE-2023-3390": { - "cmt_msg": "netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE" + "CVE-2014-1444": { + "cmt_msg": "farsync: fix info leak in ioctl", + "cmt_id": "5bf019ebfa38379d51698b7f0fefcd44d6f0447d" }, - "CVE-2021-20317": { - "cmt_msg": "lib/timerqueue: Rely on rbtree semantics for next timer" + "CVE-2013-7027": { + "cmt_msg": "wireless: radiotap: fix parsing buffer overrun", + "cmt_id": "d58900877a2845d03b40638fc3b4f2b2d0afe652" }, - "CVE-2021-43389": { - "cmt_msg": "isdn: cpai: check ctr->cnr to avoid array index out of bound" + "CVE-2013-6383": { + "cmt_msg": "aacraid: missing capable() check in compat ioctl", + "cmt_id": "a88f5ccd2ac9798c046609a8aec18c3f522a6334" }, - "CVE-2023-3111": { - "cmt_msg": "btrfs: unset reloc control if transaction commit fails in prepare_to_relocate()" + "CVE-2013-4512": { + "cmt_msg": "uml: check length in exitcode_proc_write()", + "cmt_id": "02c54b6cf2b7bd1089bef485d7a81bdf0c5999d8" }, - "CVE-2021-33061": { - "cmt_msg": "ixgbe: add improvement for MDD response functionality" + "CVE-2013-4511": { + "cmt_msg": "uml: check length in exitcode_proc_write()", + "cmt_id": "02c54b6cf2b7bd1089bef485d7a81bdf0c5999d8" }, - "CVE-2023-1476": { - "cmt_msg": "" + "CVE-2013-4515": { + "cmt_msg": "Staging: bcm: info leak in ioctl", + "cmt_id": "43455e8604586d80d43ebb23f9cbb31d6321ef7d" }, - "CVE-2023-4010": { - "cmt_msg": "" + "CVE-2013-4514": { + "cmt_msg": "staging: wlags49_h2: buffer overflow setting station name", + "cmt_id": "840834b578803d8153b6fd8526d23e615916208b" }, - "CVE-2023-1074": { - "cmt_msg": "sctp: fail if no bound addresses can be used for a given scope" + "CVE-2013-4299": { + "cmt_msg": "dm snapshot: fix data corruption", + "cmt_id": "7a14369589fd368dd0a83e6b70d0a3eddef071e8" + } + }, + "3.2.54": { + "CVE-2013-7264": { + "cmt_msg": "inet: prevent leakage of uninitialized memory to user in recv syscalls", + "cmt_id": "05d3c1eece356052d8119663d5415c2fcb4680d8" }, - "CVE-2021-3864": { - "cmt_msg": "" + "CVE-2013-4345": { + "cmt_msg": "crypto: ansi_cprng - Fix off by one error in non-block size request", + "cmt_id": "d1b8de7813fc2127dc16cd9f282bb63611583997" }, - "CVE-2024-26584": { - "cmt_msg": "net: tls: handle backlogging of crypto requests" + "CVE-2013-6367": { + "cmt_msg": "KVM: x86: Fix potential divide by 0 in lapic (CVE-2013-6367)", + "cmt_id": "245d4b4480c20ffb50f0eddadcc6516b9017d863" }, - "CVE-2022-1652": { - "cmt_msg": "floppy: use a statically allocated error counter" + "CVE-2013-4592": { + "cmt_msg": "KVM: perform an invalid memslot step for gpa base change", + "cmt_id": "c2152747e746aceaa85360eb20b719a835c9d101" }, - "CVE-2023-4623": { - "cmt_msg": "net/sched: sch_hfsc: Ensure inner classes have fsc curve" + "CVE-2013-7263": { + "cmt_msg": "inet: prevent leakage of uninitialized memory to user in recv syscalls", + "cmt_id": "05d3c1eece356052d8119663d5415c2fcb4680d8" }, - "CVE-2024-23849": { - "cmt_msg": "net/rds: Fix UBSAN: array-index-out-of-bounds in rds_cmsg_recv" + "CVE-2013-6380": { + "cmt_msg": "aacraid: prevent invalid pointer dereference", + "cmt_id": "1016f060cfaf7c575fce3a92c987d21202da3261" }, - "CVE-2020-29568": { - "cmt_msg": "xen/xenbus: Allow watches discard events before queueing" + "CVE-2013-6381": { + "cmt_msg": "qeth: avoid buffer overflow in snmp ioctl", + "cmt_id": "a3e38398c95c83c06c1b8028e406f3aca23ec43d" }, - "CVE-2020-29569": { - "cmt_msg": "xen-blkback: set ring->xenblkd to NULL after kthread_stop()" + "CVE-2013-4348": { + "cmt_msg": "net: flow_dissector: fail on evil iph->ihl", + "cmt_id": "f7d537dc8714abf422238419d057376a772be9fd" }, - "CVE-2020-14351": { - "cmt_msg": "perf/core: Fix race in the perf_mmap_close() function" + "CVE-2013-7270": { + "cmt_msg": "net: rework recvmsg handler msg_name and msg_namelen logic", + "cmt_id": "a598f7fa9c24c3ef458043d59c237b8fc5d1adad" }, - "CVE-2019-19054": { - "cmt_msg": "media: rc: prevent memory leak in cx23888_ir_probe" + "CVE-2013-6378": { + "cmt_msg": "libertas: potential oops in debugfs", + "cmt_id": "e3715d06207f877ac6c15b2627515f63e2c59f57" }, - "CVE-2019-19057": { - "cmt_msg": "mwifiex: pcie: Fix memory leak in mwifiex_pcie_init_evt_ring" + "CVE-2013-7265": { + "cmt_msg": "inet: prevent leakage of uninitialized memory to user in recv syscalls", + "cmt_id": "05d3c1eece356052d8119663d5415c2fcb4680d8" }, - "CVE-2019-19056": { - "cmt_msg": "mwifiex: pcie: Fix memory leak in mwifiex_pcie_alloc_cmdrsp_buf" + "CVE-2013-7266": { + "cmt_msg": "net: rework recvmsg handler msg_name and msg_namelen logic", + "cmt_id": "a598f7fa9c24c3ef458043d59c237b8fc5d1adad" }, - "CVE-2019-9453": { - "cmt_msg": "f2fs: fix to avoid accessing xattr across the boundary" + "CVE-2013-4587": { + "cmt_msg": "KVM: Improve create VCPU parameter (CVE-2013-4587)", + "cmt_id": "4a94970b318e0d7387c2d84fa7c92ea782ae52b3" }, - "CVE-2019-19052": { - "cmt_msg": "can: gs_usb: gs_can_open(): prevent memory leak" + "CVE-2013-7281": { + "cmt_msg": "inet: prevent leakage of uninitialized memory to user in recv syscalls", + "cmt_id": "05d3c1eece356052d8119663d5415c2fcb4680d8" }, - "CVE-2019-3846": { - "cmt_msg": "mwifiex: Fix possible buffer overflows at parsing bss descriptor" + "CVE-2013-6382": { + "cmt_msg": "xfs: underflow bug in xfs_attrlist_by_handle()", + "cmt_id": "cc5285f4c67a48e5775d633267f8e284626a990a" }, - "CVE-2023-46838": { - "cmt_msg": "xen-netback: don't produce zero-size SKB frags" + "CVE-2013-6282": { + "cmt_msg": "ARM: 7527/1: uaccess: explicitly check __user pointer when !CPU_USE_DOMAINS", + "cmt_id": "b5c70f452589114e6a551803bf312eed1b57f964" }, - "CVE-2020-0427": { - "cmt_msg": "pinctrl: devicetree: Avoid taking direct reference to device name string" + "CVE-2013-2929": { + "cmt_msg": "exec/ptrace: fix get_dumpable() incorrect tests", + "cmt_id": "983e0bc2210a853af015841de33a06abd873a4fe" }, - "CVE-2022-2977": { - "cmt_msg": "tpm: fix reference counting for struct tpm_chip" + "CVE-2013-7271": { + "cmt_msg": "net: rework recvmsg handler msg_name and msg_namelen logic", + "cmt_id": "a598f7fa9c24c3ef458043d59c237b8fc5d1adad" }, - "CVE-2019-19058": { - "cmt_msg": "iwlwifi: dbg_ini: fix memory leak in alloc_sgtable" + "CVE-2013-7267": { + "cmt_msg": "net: rework recvmsg handler msg_name and msg_namelen logic", + "cmt_id": "a598f7fa9c24c3ef458043d59c237b8fc5d1adad" }, - "CVE-2020-0423": { - "cmt_msg": "binder: fix UAF when releasing todo list" + "CVE-2013-7268": { + "cmt_msg": "net: rework recvmsg handler msg_name and msg_namelen logic", + "cmt_id": "a598f7fa9c24c3ef458043d59c237b8fc5d1adad" }, - "CVE-2023-40283": { - "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb" + "CVE-2013-7269": { + "cmt_msg": "net: rework recvmsg handler msg_name and msg_namelen logic", + "cmt_id": "a598f7fa9c24c3ef458043d59c237b8fc5d1adad" + } + }, + "3.2.55": { + "CVE-2012-2372": { + "cmt_msg": "rds: prevent BUG_ON triggered on congestion update to loopback", + "cmt_id": "2c3178865b995398e3516a3e260c23c65efad90f" }, - "CVE-2016-8660": { - "cmt_msg": "" + "CVE-2013-4579": { + "cmt_msg": "ath9k_htc: properly set MAC address and BSSID mask", + "cmt_id": "f7a9877cc68188252558001c9f6907fcb8af0b0f" }, - "CVE-2023-6270": { - "cmt_msg": "" + "CVE-2014-1446": { + "cmt_msg": "hamradio/yam: fix info leak in ioctl", + "cmt_id": "794ce89c4585d8679fae8c06ddabf8d3a4c4fa53" }, - "CVE-2023-3090": { - "cmt_msg": "ipvlan:Fix out-of-bounds caused by unclear skb->cb" + "CVE-2013-6368": { + "cmt_msg": "KVM: x86: Convert vapic synchronization to _cached functions (CVE-2013-6368)", + "cmt_id": "6aa82e036079eaf208bd581c201dc61c9200bb2e" }, - "CVE-2019-13272": { - "cmt_msg": "ptrace: Fix ->ptracer_cred handling for PTRACE_TRACEME" + "CVE-2013-7339": { + "cmt_msg": "rds: prevent dereference of a NULL device", + "cmt_id": "95ae36775c086d7549bc65281d22a54b4788f933" }, - "CVE-2023-1073": { - "cmt_msg": "HID: check empty report_list in hid_validate_values()" + "CVE-2014-1438": { + "cmt_msg": "x86, fpu, amd: Clear exceptions in AMD FXSAVE workaround", + "cmt_id": "bbc220abf9c3e4dbfb7372596661f580fb15a7c8" + } + }, + "3.2.56": { + "CVE-2014-0101": { + "cmt_msg": "net: sctp: fix sctp_sf_do_5_1D_ce to verify if we/peer is AUTH capable", + "cmt_id": "c7160985f53fe845eb5e882a492196a844962650" }, - "CVE-2023-45862": { - "cmt_msg": "USB: ene_usb6250: Allocate enough memory for full object" + "CVE-2014-2672": { + "cmt_msg": "ath9k: protect tid->sched check", + "cmt_id": "cf117670cf074367290d5993fe3111ac6d6b1777" }, - "CVE-2023-45863": { - "cmt_msg": "kobject: Fix slab-out-of-bounds in fill_kobj_path()" + "CVE-2014-8709": { + "cmt_msg": "mac80211: fix fragmentation code, particularly for encryption", + "cmt_id": "c7b18cdf1887e8ce91e04342cfd2d8fe1630be92" }, - "CVE-2023-1582": { - "cmt_msg": "fs/proc: task_mmu.c: don't read mapcount for migration entry" + "CVE-2014-2706": { + "cmt_msg": "mac80211: fix AP powersave TX vs. wakeup race", + "cmt_id": "ad64b463d919a18be70b281efb135231169caf4a" + } + }, + "3.2.57": { + "CVE-2014-2523": { + "cmt_msg": "netfilter: nf_conntrack_dccp: fix skb_header_pointer API usages", + "cmt_id": "5b866eaa34e4ddc312c927030fde5f6a6184ddc5" }, - "CVE-2022-1786": { - "cmt_msg": "io_uring: remove io_identity" + "CVE-2014-2039": { + "cmt_msg": "s390: fix kernel crash due to linkage stack instructions", + "cmt_id": "1664028240024d96721a5328c93ff206661cd9e1" }, - "CVE-2019-17351": { - "cmt_msg": "xen: let alloc_xenballooned_pages() fail if not enough memory free" + "CVE-2013-4483": { + "cmt_msg": "ipc,sem: fine grained locking for semtimedop", + "cmt_id": "91182754daa6ca26dd2e97ee0b0f6e9e37d33324" }, - "CVE-2022-23222": { - "cmt_msg": "bpf: Replace PTR_TO_XXX_OR_NULL with PTR_TO_XXX | PTR_MAYBE_NULL" + "CVE-2014-0069": { + "cmt_msg": "cifs: ensure that uncached writes handle unmapped areas correctly", + "cmt_id": "b1a292f3ccbbfe864cb4931e8fed4baea6b17eb8" + } + }, + "3.2.58": { + "CVE-2014-2309": { + "cmt_msg": "ipv6: don't set DST_NOCOUNT for remotely added routes", + "cmt_id": "5aa3bcddc8ddc4a8c09541d4b608bfa765631a6d" }, - "CVE-2020-25669": { - "cmt_msg": "Input: sunkbd - avoid use-after-free in teardown paths" + "CVE-2014-2678": { + "cmt_msg": "rds: prevent dereference of a NULL device in rds_iw_laddr_check", + "cmt_id": "710da494970f1d73c7df3fc0997e565cf4396e9d" }, - "CVE-2020-25668": { - "cmt_msg": "tty: make FONTX ioctl use the tty pointer they were actually passed" + "CVE-2014-0077": { + "cmt_msg": "vhost: fix total length when packets are too short", + "cmt_id": "cb505037a28ad1d8c378b40366e17fbbc44d10e6" }, - "CVE-2008-4609": { - "cmt_msg": "" + "CVE-2014-3122": { + "cmt_msg": "mm: try_to_unmap_cluster() should lock_page() before mlocking", + "cmt_id": "8e8836abf74a0b227c651cf76466b8d711470a76" }, - "CVE-2020-25705": { - "cmt_msg": "icmp: randomize the global rate limiter" + "CVE-2014-0055": { + "cmt_msg": "vhost: validate vhost_get_vq_desc return value", + "cmt_id": "4334fca3512d179726666ad18459965916a1f189" + } + }, + "3.2.59": { + "CVE-2014-1738": { + "cmt_msg": "floppy: don't write kernel-only members to FDRAWCMD ioctl output", + "cmt_id": "629cbea2961ec001a85a4ac8821dcd45226dd29c" }, - "CVE-2022-0435": { - "cmt_msg": "tipc: improve size validations for received domain records" + "CVE-2014-0196": { + "cmt_msg": "n_tty: Fix n_tty_write crash when echoing in raw mode", + "cmt_id": "1e5099713cefc67aa562f6d8fe43444f41baf52d" }, - "CVE-2022-20565": { - "cmt_msg": "HID: core: Correctly handle ReportSize being zero" + "CVE-2014-1737": { + "cmt_msg": "floppy: ignore kernel-only members in FDRAWCMD ioctl input", + "cmt_id": "d79119d4089defc81a49c6a7e26ff5ff86f4b342" + } + }, + "3.2.60": { + "CVE-2014-1739": { + "cmt_msg": "media-device: fix infoleak in ioctl media_enum_entities()", + "cmt_id": "5003eea6cec931203469521351918d4a54c18185" }, - "CVE-2023-52457": { - "cmt_msg": "serial: 8250: omap: Don't skip resource freeing if pm_runtime_resume_and_get() failed" + "CVE-2014-3144": { + "cmt_msg": "filter: prevent nla extensions to peek beyond the end of the message", + "cmt_id": "d41eb74e53d94aba656ffda647d106808e636cd6" }, - "CVE-2018-5391": { - "cmt_msg": "ip: discard IPv4 datagrams with overlapping segments." + "CVE-2014-2851": { + "cmt_msg": "net: ipv4: current group_info should be put after using.", + "cmt_id": "a8a695a43272a19b08004a3632da23d03170bd87" }, - "CVE-2021-4135": { - "cmt_msg": "netdevsim: Zero-initialize memory for new map's value in function nsim_bpf_map_alloc" + "CVE-2014-3153": { + "cmt_msg": "futex: Make lookup_pi_state more robust", + "cmt_id": "5957ab36e4d0b027f2f32618d30dcc135fbd7077" }, - "CVE-2023-26607": { - "cmt_msg": "ntfs: fix out-of-bounds read in ntfs_attr_find()" + "CVE-2014-3145": { + "cmt_msg": "filter: prevent nla extensions to peek beyond the end of the message", + "cmt_id": "d41eb74e53d94aba656ffda647d106808e636cd6" + } + }, + "3.2.61": { + "CVE-2014-4508": { + "cmt_msg": "x86_32, entry: Do syscall exit work on badsys (CVE-2014-4508)", + "cmt_id": "bb99d6796995968ca6a42b17fbfb48d073bb234c" }, - "CVE-2023-52456": { - "cmt_msg": "serial: imx: fix tx statemachine deadlock" + "CVE-2014-4157": { + "cmt_msg": "MIPS: asm: thread_info: Add _TIF_SECCOMP flag", + "cmt_id": "f50bf61a3282988b2fe46e8cb88c9b8698a2d8d2" }, - "CVE-2019-15239": { - "cmt_msg": "unknown" + "CVE-2014-4699": { + "cmt_msg": "ptrace,x86: force IRET path after a ptrace_stop()", + "cmt_id": "a0eb191eff753e790def174b3fbe66efadfd401d" }, - "CVE-2021-4037": { - "cmt_msg": "xfs: fix up non-directory creation in SGID directories" + "CVE-2014-4655": { + "cmt_msg": "ALSA: control: Fix replacing user controls", + "cmt_id": "0e2e43eca302b31f64ebfe4734fd2cc7358c4555" }, - "CVE-2021-22543": { - "cmt_msg": "KVM: do not allow mapping valid but non-reference-counted pages" + "CVE-2014-4667": { + "cmt_msg": "sctp: Fix sk_ack_backlog wrap-around problem", + "cmt_id": "fe33a3ee987dac85ac24b2d8147d2165051c80d9" }, - "CVE-2022-45884": { - "cmt_msg": "" + "CVE-2014-4654": { + "cmt_msg": "ALSA: control: Fix replacing user controls", + "cmt_id": "0e2e43eca302b31f64ebfe4734fd2cc7358c4555" }, - "CVE-2021-3348": { - "cmt_msg": "nbd: freeze the queue while we're adding connections" + "CVE-2014-3917": { + "cmt_msg": "auditsc: audit_krule mask accesses need bounds checking", + "cmt_id": "38831a0a5984c10d6763aba7e3fffe7fe04a1741" }, - "CVE-2019-1999": { - "cmt_msg": "binder: fix race between munmap() and direct reclaim" + "CVE-2014-0131": { + "cmt_msg": "skbuff: skb_segment: orphan frags before copying", + "cmt_id": "77c01a54cde87eb3bf6685fb44398352f11db3fa" }, - "CVE-2023-20941": { - "cmt_msg": "" + "CVE-2014-4656": { + "cmt_msg": "ALSA: control: Handle numid overflow", + "cmt_id": "e3ca27c942102af152aabb2d2a4ab5fa0abe7d95" }, - "CVE-2019-15292": { - "cmt_msg": "appletalk: Fix use-after-free in atalk_proc_exit" + "CVE-2014-4653": { + "cmt_msg": "ALSA: control: Don't access controls outside of protected regions", + "cmt_id": "79b789d8e20e22196285ac98247b5aeee2cade17" }, - "CVE-2018-20836": { - "cmt_msg": "scsi: libsas: fix a race condition when smp task timeout" + "CVE-2014-4652": { + "cmt_msg": "ALSA: control: Protect user controls against concurrent access", + "cmt_id": "7a3e84b9fd584f2f41600a69fe3cc317b2c34b14" + } + }, + "3.2.62": { + "CVE-2014-3534": { + "cmt_msg": "s390/ptrace: fix PSW mask check", + "cmt_id": "438127dd5b66029f904e96900d0f90b1c5a80bf9" }, - "CVE-2021-44733": { - "cmt_msg": "tee: handle lookup of shm with reference count 0" + "CVE-2014-4943": { + "cmt_msg": "net/l2tp: don't fall back on UDP [get|set]sockopt", + "cmt_id": "1179c8f1caca90caf4ce0eec54b499de4f1551c4" }, - "CVE-2021-3347": { - "cmt_msg": "futex: Ensure the correct return value from futex_lock_pi()" + "CVE-2014-4171": { + "cmt_msg": "shmem: fix faulting into a hole while it's punched", + "cmt_id": "f159cc257190477cece829606cfb879612f52f2c" + } + }, + "3.2.63": { + "CVE-2014-5077": { + "cmt_msg": "net: sctp: inherit auth_capable on INIT collisions", + "cmt_id": "38710dd12b99b31bd21b0eac5f457915eaf5e04b" }, - "CVE-2020-10135": { - "cmt_msg": "Bluetooth: Consolidate encryption handling in hci_encrypt_cfm" + "CVE-2014-5472": { + "cmt_msg": "isofs: Fix unbounded recursion when processing relocated directories", + "cmt_id": "d6621d0d6de4b00498cf1bcd8b78f3caa80edf13" }, - "CVE-2020-25285": { - "cmt_msg": "mm/hugetlb: fix a race between hugetlb sysctl handlers" + "CVE-2014-3186": { + "cmt_msg": "HID: picolcd: sanity check report size in raw_event() callback", + "cmt_id": "b23ea023ee26e97ba6ffdc3c9d54448a77f1b894" }, - "CVE-2019-7308": { - "cmt_msg": "bpf: fix sanitation of alu op with pointer / scalar type from different paths" + "CVE-2014-5471": { + "cmt_msg": "isofs: Fix unbounded recursion when processing relocated directories", + "cmt_id": "d6621d0d6de4b00498cf1bcd8b78f3caa80edf13" }, - "CVE-2021-45868": { - "cmt_msg": "quota: check block number when reading the block in quota file" + "CVE-2014-3181": { + "cmt_msg": "HID: magicmouse: sanity check report size in raw_event() callback", + "cmt_id": "e3ead9249d874dbb7a8e7c3e6e54de35a481986c" }, - "CVE-2022-1966": { - "cmt_msg": "netfilter: nf_tables: disallow non-stateful expression in sets earlier" + "CVE-2014-3182": { + "cmt_msg": "HID: logitech: perform bounds checking on device_id early enough", + "cmt_id": "e6bc6f668be4ada3a23c136035cb2b83e8521da5" }, - "CVE-2021-3587": { - "cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect" + "CVE-2014-3184": { + "cmt_msg": "HID: fix a couple of off-by-ones", + "cmt_id": "328538d74181a95fa26fa354314f6079945fd5ee" }, - "CVE-2019-16995": { - "cmt_msg": "net: hsr: fix memory leak in hsr_dev_finalize()" + "CVE-2014-3185": { + "cmt_msg": "USB: whiteheat: Added bounds checking for bulk command response", + "cmt_id": "f92c5bd2c6fcbc55377645c6c023dff1e8849c3b" }, - "CVE-2019-16994": { - "cmt_msg": "net: sit: fix memory leak in sit_init_net()" + "CVE-2014-3601": { + "cmt_msg": "kvm: iommu: fix the third parameter of kvm_iommu_put_pages (CVE-2014-3601)", + "cmt_id": "1bc6485405f05ff9912055c67b43fc86b183eec3" + } + }, + "3.2.64": { + "CVE-2014-3687": { + "cmt_msg": "net: sctp: fix panic on duplicate ASCONF chunks", + "cmt_id": "9a3c6f2e051b608181aff9345481e586b2d54fc9" }, - "CVE-2022-3533": { - "cmt_msg": "" + "CVE-2014-3690": { + "cmt_msg": "x86,kvm,vmx: Preserve CR4 across VM entry", + "cmt_id": "9e793c5ed9204271ecc2cb7c899010e70561a452" }, - "CVE-2022-3534": { - "cmt_msg": "libbpf: Fix use-after-free in btf_dump_name_dups" + "CVE-2014-7207": { + "cmt_msg": "ipv6: reuse ip6_frag_id from ip6_ufo_append_data", + "cmt_id": "8db33010af3020af7f4904b2dfffc9841ffc42e4" }, - "CVE-2023-34256": { - "cmt_msg": "ext4: avoid a potential slab-out-of-bounds in ext4_group_desc_csum" + "CVE-2014-3647": { + "cmt_msg": "KVM: x86: Emulator fixes for eip canonical checks on near branches", + "cmt_id": "71ca9dc31fd6cd39ade2b3b6f1fa8fe4f2a915fa" }, - "CVE-2020-36516": { - "cmt_msg": "ipv4: avoid using shared IP generator for connected sockets" + "CVE-2014-3646": { + "cmt_msg": "kvm: vmx: handle invvpid vm exit gracefully", + "cmt_id": "3f09b1f1033b9a6350b72649c6abdafdf81e5c2d" }, - "CVE-2020-36766": { - "cmt_msg": "cec-api: prevent leaking memory through hole in structure" + "CVE-2014-3645": { + "cmt_msg": "nEPT: Nested INVEPT", + "cmt_id": "02a988e6e4511b1f6d83525710a12db9c5a45149" }, - "CVE-2022-3061": { - "cmt_msg": "video: fbdev: i740fb: Error out if 'pixclock' equals zero" + "CVE-2014-3673": { + "cmt_msg": "net: sctp: fix skb_over_panic when receiving malformed ASCONF chunks", + "cmt_id": "aa001b043dde50e2856fe9460bc819d2a70dc309" }, - "CVE-2023-28328": { - "cmt_msg": "media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer()" + "CVE-2014-6418": { + "cmt_msg": "libceph: do not hard code max auth ticket len", + "cmt_id": "3ab3b3b67868458de3b047e199c0efe8119ef0de" }, - "CVE-2022-0322": { - "cmt_msg": "sctp: account stream padding length for reconf chunk" + "CVE-2014-3610": { + "cmt_msg": "KVM: x86: Check non-canonical addresses upon WRMSR", + "cmt_id": "76715b56c6fcdafae8d47d4fcfe8c940e76f0553" }, - "CVE-2023-0386": { - "cmt_msg": "ovl: fail on invalid uid/gid mapping at copy up" + "CVE-2014-3611": { + "cmt_msg": "KVM: x86: Improve thread safety in pit", + "cmt_id": "30a340f59414f02434e8b7a880241b2bd657cb7b" }, - "CVE-2023-6121": { - "cmt_msg": "nvmet: nul-terminate the NQNs passed in the connect command" + "CVE-2014-3688": { + "cmt_msg": "net: sctp: fix remote memory pressure from excessive queueing", + "cmt_id": "3a8c709ba4cf6fe86f5069c71325029d412bcf1e" }, - "CVE-2017-13693": { - "cmt_msg": "" + "CVE-2014-6417": { + "cmt_msg": "libceph: do not hard code max auth ticket len", + "cmt_id": "3ab3b3b67868458de3b047e199c0efe8119ef0de" }, - "CVE-2017-13694": { - "cmt_msg": "" + "CVE-2014-6416": { + "cmt_msg": "libceph: do not hard code max auth ticket len", + "cmt_id": "3ab3b3b67868458de3b047e199c0efe8119ef0de" + } + }, + "3.2.65": { + "CVE-2014-9090": { + "cmt_msg": "x86_64, traps: Stop using IST for #SS", + "cmt_id": "4c414592a79b82ddca76945c7afb4843684aa9a8" }, - "CVE-2021-4149": { - "cmt_msg": "btrfs: unlock newly allocated extent buffer after error" + "CVE-2014-4608": { + "cmt_msg": "lzo: check for length overrun in variable length encoding.", + "cmt_id": "69d33070a8f165c4bd69fe208085f262201d10fb" }, - "CVE-2022-21385": { - "cmt_msg": "net/rds: fix warn in rds_message_alloc_sgs" + "CVE-2014-9322": { + "cmt_msg": "x86_64, traps: Stop using IST for #SS", + "cmt_id": "4c414592a79b82ddca76945c7afb4843684aa9a8" }, - "CVE-2022-42895": { - "cmt_msg": "Bluetooth: L2CAP: Fix attempting to access uninitialized memory" + "CVE-2014-7826": { + "cmt_msg": "tracing/syscalls: Ignore numbers outside NR_syscalls' range", + "cmt_id": "8043761416d5ae6d8fe5e95331d26465d52e8c6e" }, - "CVE-2021-3640": { - "cmt_msg": "Bluetooth: sco: Fix lock_sock() blockage by memcpy_from_msg()" + "CVE-2014-7825": { + "cmt_msg": "tracing/syscalls: Ignore numbers outside NR_syscalls' range", + "cmt_id": "8043761416d5ae6d8fe5e95331d26465d52e8c6e" + } + }, + "3.2.66": { + "CVE-2014-8133": { + "cmt_msg": "x86/tls: Validate TLS entries to protect espfix", + "cmt_id": "106ed96d46fcaf9f2e72555035fa585403cf4dd3" }, - "CVE-2021-3764": { - "cmt_msg": "crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd()" + "CVE-2015-7509": { + "cmt_msg": "ext4: make orphan functions be no-op in no-journal mode", + "cmt_id": "6d9f360c00512f6a6fded2efcfcbe78ec73e5b1b" }, - "CVE-2020-1749": { - "cmt_msg": "net: ipv6_stub: use ip6_dst_lookup_flow instead of ip6_dst_lookup" + "CVE-2014-7841": { + "cmt_msg": "net: sctp: fix NULL pointer dereference in af->from_addr_param on malformed packet", + "cmt_id": "590461b16c5464b9d4377898abc057239a6afc3a" }, - "CVE-2022-42896": { - "cmt_msg": "Bluetooth: L2CAP: Fix accepting connection request for invalid SPSM" + "CVE-2014-7842": { + "cmt_msg": "KVM: x86: Don't report guest userspace emulation error to userspace", + "cmt_id": "1aded21661bda559a407cfb7c69d0e53b72bc671" }, - "CVE-2021-3760": { - "cmt_msg": "nfc: nci: fix the UAF of rf_conn_info object" + "CVE-2014-8134": { + "cmt_msg": "x86, kvm: Clear paravirt_enabled on KVM guests for espfix32's benefit", + "cmt_id": "060d11323f35afb752a7ba6c5bead732c204de55" }, - "CVE-2022-36123": { - "cmt_msg": "x86: Clear .brk area at early boot" + "CVE-2014-6410": { + "cmt_msg": "udf: Avoid infinite loop when processing indirect ICBs", + "cmt_id": "7ecef8c8b70c21c944ccdf8b8406292e71038a98" }, - "CVE-2020-11608": { - "cmt_msg": "media: ov519: add missing endpoint sanity checks" + "CVE-2014-8559": { + "cmt_msg": "move d_rcu from overlapping d_child to overlapping d_alias", + "cmt_id": "026181647a6262f4ba6d60c0847d306ad685468c" }, - "CVE-2020-11609": { - "cmt_msg": "media: stv06xx: add missing descriptor sanity checks" + "CVE-2014-8884": { + "cmt_msg": "ttusb-dec: buffer overflow in ioctl", + "cmt_id": "2f67670174ad4bd1c48e8b97cc107e3232d422ce" + } + }, + "3.2.67": { + "CVE-2014-9644": { + "cmt_msg": "crypto: include crypto- module prefix in template", + "cmt_id": "bed7f528031d6c800615380990af22cd8b0e3577" }, - "CVE-2020-28097": { - "cmt_msg": "vgacon: remove software scrollback support" + "CVE-2014-8160": { + "cmt_msg": "netfilter: conntrack: disable generic tracking for known protocols", + "cmt_id": "d7cde286daad20dd171247ea47fc5ff4868591f0" }, - "CVE-2024-24859": { - "cmt_msg": "" + "CVE-2013-6885": { + "cmt_msg": "x86, cpu, amd: Add workaround for family 16h, erratum 793", + "cmt_id": "9ec2b3153415ca412de6471baec2e61ec89997e1" }, - "CVE-2019-11884": { - "cmt_msg": "Bluetooth: hidp: fix buffer overflow" + "CVE-2014-9419": { + "cmt_msg": "x86_64, switch_to(): Load TLS descriptors before switching DS and ES", + "cmt_id": "cca3e6170e186ad88c11ee91cfd37d400dcaa9b0" }, - "CVE-2024-24855": { - "cmt_msg": "scsi: lpfc: Fix a possible data race in lpfc_unregister_fcf_rescan()" + "CVE-2014-9584": { + "cmt_msg": "isofs: Fix unchecked printing of ER records", + "cmt_id": "48c47581acba6c3cc9739b33a1107c5446db0a82" }, - "CVE-2024-24857": { - "cmt_msg": "" + "CVE-2014-9420": { + "cmt_msg": "isofs: Fix infinite looping over CE entries", + "cmt_id": "212c4d33ca83e2144064fe9c2911607fbed5386f" }, - "CVE-2019-3892": { - "cmt_msg": "coredump: fix race condition between mmget_not_zero()/get_task_mm() and core dumping" + "CVE-2014-9529": { + "cmt_msg": "KEYS: close race between key lookup and freeing", + "cmt_id": "dc4a2f40de419c01b538c87f6bdfc15d574d9f7e" }, - "CVE-2021-29264": { - "cmt_msg": "gianfar: fix jumbo packets+napi+rx overrun crash" + "CVE-2014-9585": { + "cmt_msg": "x86_64, vdso: Fix the vdso address randomization algorithm", + "cmt_id": "ba4055175ea39c9f0c16da025c908d3049d2f791" }, - "CVE-2021-29265": { - "cmt_msg": "usbip: fix stub_dev usbip_sockfd_store() races leading to gpf" + "CVE-2014-9729": { + "cmt_msg": "udf: Verify i_size when loading inode", + "cmt_id": "24282850119ea4dc29afeb3b2e670f85a9755955" }, - "CVE-2021-39648": { - "cmt_msg": "usb: gadget: configfs: Fix use-after-free issue with udc_name" + "CVE-2015-0239": { + "cmt_msg": "KVM: x86: SYSENTER emulation is broken", + "cmt_id": "038911f3d317d331d9637531c13710b8435fe96e" }, - "CVE-2022-3545": { - "cmt_msg": "nfp: fix use-after-free in area_cache_get()" + "CVE-2014-9728": { + "cmt_msg": "udf: Verify i_size when loading inode", + "cmt_id": "24282850119ea4dc29afeb3b2e670f85a9755955" }, - "CVE-2020-14416": { - "cmt_msg": "can, slip: Protect tty->disc_data in write_wakeup and close with RCU" + "CVE-2014-9730": { + "cmt_msg": "udf: Check component length before reading it", + "cmt_id": "1e21fa3ab68b261aa6086c49567963f6f3ad87b9" }, - "CVE-2019-0136": { - "cmt_msg": "mac80211: drop robust management frames from unknown TA" + "CVE-2014-9731": { + "cmt_msg": "udf: Check path length when reading symlink", + "cmt_id": "fbdbac7bd9def21be7ac4e680c25d880661c10d9" }, - "CVE-2022-3542": { - "cmt_msg": "bnx2x: fix potential memory leak in bnx2x_tpa_stop()" + "CVE-2014-7822": { + "cmt_msg": "->splice_write() via ->write_iter()", + "cmt_id": "894c6350eaad7e613ae267504014a456e00a3e2a" }, - "CVE-2022-3344": { - "cmt_msg": "KVM: x86: nSVM: harden svm_free_nested against freeing vmcb02 while still in use" + "CVE-2013-7421": { + "cmt_msg": "crypto: prefix module autoloading with \"crypto-\"", + "cmt_id": "9ffea4cb2306945b5df5f28bb8686333fe666bf1" }, - "CVE-2021-21781": { - "cmt_msg": "ARM: ensure the signal page contains defined contents" + "CVE-2015-1421": { + "cmt_msg": "net: sctp: fix slab corruption from use after free on INIT collisions", + "cmt_id": "8662a896ae1ff85dca6797a0e9977a4794b67847" }, - "CVE-2021-0512": { - "cmt_msg": "HID: make arrays usage and value to be the same" + "CVE-2014-9683": { + "cmt_msg": "eCryptfs: Remove buggy and unnecessary write in file name decode routine", + "cmt_id": "f2d130454e46c3989af1b4f882b6a666d24fa2e0" + } + }, + "3.2.69": { + "CVE-2015-4167": { + "cmt_msg": "udf: Check length of extended attributes and allocation descriptors", + "cmt_id": "925cab7b6a683f791644dfde345f91e87017a023" }, - "CVE-2023-1382": { - "cmt_msg": "tipc: set con sock in tipc_conn_alloc" + "CVE-2016-0823": { + "cmt_msg": "pagemap: do not leak physical addresses to non-privileged userspace", + "cmt_id": "1ffc3cd9a36b504c20ce98fe5eeb5463f389e1ac" }, - "CVE-2019-19073": { - "cmt_msg": "ath9k_htc: release allocated buffer if timed out" + "CVE-2015-2830": { + "cmt_msg": "x86/asm/entry/64: Remove a bogus 'ret_from_fork' optimization", + "cmt_id": "159891c0953a89a28f793fc52373b031262c44d2" }, - "CVE-2023-1380": { - "cmt_msg": "wifi: brcmfmac: slab-out-of-bounds read in brcmf_get_assoc_ies()" + "CVE-2015-2150": { + "cmt_msg": "xen-pciback: limit guest control of command register", + "cmt_id": "6dc77dfffb8317d01fc9c2d25d0288c7b31b8623" }, - "CVE-2020-0347": { - "cmt_msg": "" + "CVE-2015-2041": { + "cmt_msg": "net: llc: use correct size for sysctl timeout entries", + "cmt_id": "88fe14be08a475ad0eea4ca7c51f32437baf41af" }, - "CVE-2019-18809": { - "cmt_msg": "media: usb: fix memory leak in af9005_identify_state" + "CVE-2015-2042": { + "cmt_msg": "net: rds: use correct size for max unacked packets and bytes", + "cmt_id": "3760b67b3e419b9ac42a45417491360a14a35357" }, - "CVE-2019-18808": { - "cmt_msg": "crypto: ccp - Release all allocated memory if sha type is invalid" + "CVE-2015-2922": { + "cmt_msg": "ipv6: Don't reduce hop limit for an interface", + "cmt_id": "f10f7d2a8200fe33c5030c7e32df3a2b3561f3cd" }, - "CVE-2022-41222": { - "cmt_msg": "mm/mremap: hold the rmap lock in write mode when moving page table entries." + "CVE-2015-3331": { + "cmt_msg": "crypto: aesni - fix memory usage in GCM decryption", + "cmt_id": "217e17258ab5f5540aef2769c78ff6b3e2b08dde" }, - "CVE-2021-40490": { - "cmt_msg": "ext4: fix race writing to an inline_data file while its xattrs are changing" + "CVE-2015-1593": { + "cmt_msg": "x86, mm/ASLR: Fix stack randomization on 64-bit systems", + "cmt_id": "766dde0195e427b2371fa2e00cd86a88e2c948bf" }, - "CVE-2021-33909": { - "cmt_msg": "seq_file: disallow extremely large seq buffer allocations" + "CVE-2014-8159": { + "cmt_msg": "IB/uverbs: Prevent integer overflow in ib_umem_get address arithmetic", + "cmt_id": "485f16b743d98527620396639b73d7214006f3c7" }, - "CVE-2019-12455": { - "cmt_msg": "clk-sunxi: fix a missing-check bug in sunxi_divs_clk_setup()" + "CVE-2015-3636": { + "cmt_msg": "ipv4: Missing sk_nulls_node_init() in ping_unhash().", + "cmt_id": "d3df672020a93355bc8f683fc19694e0316381ab" + } + }, + "3.2.70": { + "CVE-2015-4700": { + "cmt_msg": "x86: bpf_jit: fix compilation of large bpf programs", + "cmt_id": "a8139dccd98bdece27deac8da46b4145ec7f61c1" }, - "CVE-2019-12456": { - "cmt_msg": "" + "CVE-2015-6526": { + "cmt_msg": "powerpc/perf: Cap 64bit userspace backtraces to PERF_MAX_STACK_DEPTH", + "cmt_id": "3c9d9d2cc60b5063cda0e92d4b6cdb92da268e7b" }, - "CVE-2019-19070": { - "cmt_msg": "spi: gpio: prevent memory leak in spi_gpio_probe" + "CVE-2015-1420": { + "cmt_msg": "vfs: read file_handle only once in handle_to_path", + "cmt_id": "8dfc8b9e8432f50606820b40a7d63618d9d61a07" }, - "CVE-2019-18805": { - "cmt_msg": "ipv4: set the tcp_min_rtt_wlen range from 0 to one day" + "CVE-2017-1000253": { + "cmt_msg": "fs/binfmt_elf.c: fix bug in loading of PIE binaries", + "cmt_id": "c3727815f928a838e845b5755b4dde4efb2841c9" }, - "CVE-2021-29647": { - "cmt_msg": "net: qrtr: fix a kernel-infoleak in qrtr_recvmsg()" + "CVE-2015-5364": { + "cmt_msg": "udp: fix behavior of wrong checksums", + "cmt_id": "556574d97b6e0c2970b7e5ab693bcf35f73195fa" }, - "CVE-2019-18806": { - "cmt_msg": "net: qlogic: Fix memory leak in ql_alloc_large_buffers" + "CVE-2015-5366": { + "cmt_msg": "udp: fix behavior of wrong checksums", + "cmt_id": "556574d97b6e0c2970b7e5ab693bcf35f73195fa" }, - "CVE-2021-33656": { - "cmt_msg": "vt: drop old FONT ioctls" + "CVE-2015-5707": { + "cmt_msg": "sg_start_req(): make sure that there's not too many elements in iovec", + "cmt_id": "07213eed86c17c544bb10568fc04e49e03730ab7" }, - "CVE-2021-33655": { - "cmt_msg": "fbcon: Disallow setting font bigger than screen size" + "CVE-2015-3212": { + "cmt_msg": "sctp: fix ASCONF list handling", + "cmt_id": "001b7cc921ce608997f2796ecf95fe05b7288457" + } + }, + "3.2.71": { + "CVE-2015-6252": { + "cmt_msg": "vhost: actually track log eventfd file", + "cmt_id": "403652a78799f25e3c0d07326805cc1ffcce0f87" }, - "CVE-2023-3611": { - "cmt_msg": "net/sched: sch_qfq: account for stab overhead in qfq_enqueue" + "CVE-2015-3288": { + "cmt_msg": "mm: avoid setting up anonymous pages into file mapping", + "cmt_id": "e2506476534cff7bb3697fbe0654fdefd101bc80" }, - "CVE-2022-41858": { - "cmt_msg": "drivers: net: slip: fix NPD bug in sl_tx_timeout()" + "CVE-2015-9289": { + "cmt_msg": "cx24116: fix a buffer overflow when checking userspace params", + "cmt_id": "729c8c5e3700410e3436573abfa5b68e8d3c89d6" + } + }, + "3.2.72": { + "CVE-2015-7613": { + "cmt_msg": "Initialize msg/shm IPC objects before doing ipc_addid()", + "cmt_id": "2ef259c0f5b2f3ca28ccb7bf126a0a2177012f89" }, - "CVE-2019-6974": { - "cmt_msg": "kvm: fix kvm_ioctl_create_device() reference counting (CVE-2019-6974)" + "CVE-2015-8215": { + "cmt_msg": "ipv6: addrconf: validate new MTU before applying it", + "cmt_id": "1c825dacb615430cb384e0e3be07700013291742" }, - "CVE-2022-41850": { - "cmt_msg": "HID: roccat: Fix use-after-free in roccat_read()" + "CVE-2015-5697": { + "cmt_msg": "md: use kzalloc() when bitmap is disabled", + "cmt_id": "06f0f9d843af52573c7dad0d81ee9df984e0b6be" }, - "CVE-2020-24503": { - "cmt_msg": "" + "CVE-2015-5156": { + "cmt_msg": "virtio-net: drop NETIF_F_FRAGLIST", + "cmt_id": "e4afe1f118e136464da2faeb18c6c9a791ce25bc" }, - "CVE-2023-2985": { - "cmt_msg": "fs: hfsplus: fix UAF issue in hfsplus_put_super" + "CVE-2015-2925": { + "cmt_msg": "dcache: Handle escaped paths in prepend_path", + "cmt_id": "722632af3c2b4828e79f143e356489c6761035ec" }, - "CVE-2020-14390": { - "cmt_msg": "fbcon: remove soft scrollback code" + "CVE-2015-5257": { + "cmt_msg": "USB: whiteheat: fix potential null-deref at probe", + "cmt_id": "cbea57119272755ccfd710fdaf4669ae05512b02" }, - "CVE-2023-32269": { - "cmt_msg": "netrom: Fix use-after-free caused by accept on already connected socket" + "CVE-2015-6937": { + "cmt_msg": "RDS: verify the underlying transport exists before creating a connection", + "cmt_id": "987ad6eef35223b149baf453171b74917c372cbc" + } + }, + "3.2.73": { + "CVE-2015-7872": { + "cmt_msg": "KEYS: Fix crash when attempt to garbage collect an uninstantiated keyring", + "cmt_id": "a6826ecbeab9c832ed742653de895ad4de61c858" }, - "CVE-2020-24502": { - "cmt_msg": "" + "CVE-2015-5307": { + "cmt_msg": "KVM: x86: work around infinite loop in microcode when #AC is delivered", + "cmt_id": "3553e5d34d72a3aac5d967ec8b4d45a88340d679" }, - "CVE-2022-3646": { - "cmt_msg": "nilfs2: fix leak of nilfs_root in case of writer thread creation failure" + "CVE-2015-8019": { + "cmt_msg": "net: add length argument to skb_copy_and_csum_datagram_iovec", + "cmt_id": "127500d724f8c43f452610c9080444eedb5eaa6c" + } + }, + "3.2.74": { + "CVE-2015-8374": { + "cmt_msg": "Btrfs: fix truncation of compressed and inlined extents", + "cmt_id": "2a97932f99303b32c6683f136628298da7f85323" }, - "CVE-2021-45469": { - "cmt_msg": "f2fs: fix to do sanity check on last xattr entry in __f2fs_setxattr()" + "CVE-2016-8646": { + "cmt_msg": "crypto: algif_hash - Only export and import on sockets with data", + "cmt_id": "bd65107fc1d80498ea8d8185edb48d05a1a85255" }, - "CVE-2022-1184": { - "cmt_msg": "ext4: verify dir block before splitting it" + "CVE-2015-8104": { + "cmt_msg": "KVM: svm: unconditionally intercept #DB", + "cmt_id": "b42506c6c820764f26e3036dfd733e0401525c88" + } + }, + "3.2.75": { + "CVE-2015-8543": { + "cmt_msg": "net: add validation for the socket syscall protocol argument", + "cmt_id": "ef6d51d24d878be2291d7af783441356eb77649d" }, - "CVE-2022-3642": { - "cmt_msg": "" + "CVE-2015-8785": { + "cmt_msg": "fuse: break infinite loop in fuse_fill_write_pages()", + "cmt_id": "a5b234167a1ff46f311f5835828eec2f971b9bb4" }, - "CVE-2019-19448": { - "cmt_msg": "btrfs: only search for left_info if there is no right_info in try_merge_free_space" + "CVE-2015-7799": { + "cmt_msg": "isdn_ppp: Add checks for allocation failure in isdn_ppp_open()", + "cmt_id": "3ed88ba9e848aac74ae150b089ed36c25016faca" }, - "CVE-2024-0584": { - "cmt_msg": "ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet" + "CVE-2015-8569": { + "cmt_msg": "pptp: verify sockaddr_len in pptp_bind() and pptp_connect()", + "cmt_id": "1e44aafdd1181dd5e5b0638f9d3498b73c4d89e9" }, - "CVE-2019-19449": { - "cmt_msg": "f2fs: fix to do sanity check on segment/section count" + "CVE-2016-3841": { + "cmt_msg": "ipv6: add complete rcu protection around np->opt", + "cmt_id": "5bf369b4470d3618af67b572a82d76b92ce1abd1" }, - "CVE-2020-0465": { - "cmt_msg": "HID: core: Sanitize event code and type when mapping input" + "CVE-2015-8575": { + "cmt_msg": "bluetooth: Validate socket address length in sco_sock_bind().", + "cmt_id": "805ce945362d9e496563c9885e7fde00cbd83635" }, - "CVE-2023-6931": { - "cmt_msg": "perf: Fix perf_event_validate_size()" + "CVE-2013-7446": { + "cmt_msg": "unix: avoid use-after-free in ep_remove_wait_queue", + "cmt_id": "a3b0f6e8a21ef02f69a15abac440572d8cde8c2a" + } + }, + "3.2.76": { + "CVE-2015-8551": { + "cmt_msg": "xen/pciback: Return error on XEN_PCI_OP_enable_msi when device has MSI or MSI-X enabled", + "cmt_id": "9bb38c41353fa56c8d5c0a18becab89a503a514e" }, - "CVE-2020-0466": { - "cmt_msg": "do_epoll_ctl(): clean the failure exits up a bit" + "CVE-2015-8550": { + "cmt_msg": "xen: Add RING_COPY_REQUEST()", + "cmt_id": "a489a13bfc648d5d3764d2fe064135f83ff34ee8" }, - "CVE-2021-4218": { - "cmt_msg": "sysctl: pass kernel pointers to ->proc_handler" + "CVE-2015-8553": { + "cmt_msg": "xen/pciback: Don't allow MSI-X ops if PCI_COMMAND_MEMORY is not set.", + "cmt_id": "16f592aba4a0e7741823a37b0e5064f08c5f6dc1" }, - "CVE-2020-0543": { - "cmt_msg": "x86/cpu: Add 'table' argument to cpu_matches()" + "CVE-2015-7513": { + "cmt_msg": "KVM: x86: Reload pit counters for all channels when restoring state", + "cmt_id": "08b8d1a6ccdefd3d517d04c472b7f42f51b3059b" }, - "CVE-2024-25739": { - "cmt_msg": "" + "CVE-2015-7550": { + "cmt_msg": "KEYS: Fix race between read and revoke", + "cmt_id": "027466a78ea676dcb831fef6ec9092f25b8fa624" }, - "CVE-2023-3358": { - "cmt_msg": "HID: intel_ish-hid: Add check for ishtp_dma_tx_map" + "CVE-2016-10229": { + "cmt_msg": "udp: properly support MSG_PEEK with truncated buffers", + "cmt_id": "18a6eba2eabbcb50a78210b16f7dd43d888a537b" }, - "CVE-2019-20054": { - "cmt_msg": "fs/proc/proc_sysctl.c: fix NULL pointer dereference in put_links" + "CVE-2015-8816": { + "cmt_msg": "USB: fix invalid memory access in hub_activate()", + "cmt_id": "10037421b529bc1fc18994e94e37d745184c4ea9" }, - "CVE-2024-0340": { - "cmt_msg": "vhost: use kzalloc() instead of kmalloc() followed by memset()" + "CVE-2015-8552": { + "cmt_msg": "xen/pciback: Return error on XEN_PCI_OP_enable_msi when device has MSI or MSI-X enabled", + "cmt_id": "9bb38c41353fa56c8d5c0a18becab89a503a514e" + } + }, + "3.2.77": { + "CVE-2016-2069": { + "cmt_msg": "x86/mm: Add barriers and document switch_mm()-vs-flush synchronization", + "cmt_id": "72e67165876432b2803c02ba8a8f0168f18ab3c7" }, - "CVE-2021-3753": { - "cmt_msg": "vt_kdsetmode: extend console locking" + "CVE-2017-13215": { + "cmt_msg": "crypto: algif_skcipher - Load TX SG list after waiting", + "cmt_id": "9cf50c3ff1d3286a25781c8d6f81e83f7835c5c8" }, - "CVE-2023-6536": { - "cmt_msg": "" + "CVE-2016-2548": { + "cmt_msg": "ALSA: timer: Harden slave timer list handling", + "cmt_id": "65b6e4a0b6497a57608821c20149e83f256dc32c" }, - "CVE-2019-11135": { - "cmt_msg": "x86/msr: Add the IA32_TSX_CTRL MSR" + "CVE-2016-2545": { + "cmt_msg": "ALSA: timer: Fix double unlink of active_list", + "cmt_id": "0e8f916d7dc9170ab2ef4b9a9ed19b640720029b" }, - "CVE-2019-11811": { - "cmt_msg": "ipmi_si: fix use-after-free of resource->name" + "CVE-2016-2544": { + "cmt_msg": "ALSA: seq: Fix race at timer setup and close", + "cmt_id": "d60262682193d5098dc1e13cd374ddfa49ee4c8d" }, - "CVE-2019-11810": { - "cmt_msg": "scsi: megaraid_sas: return error when create DMA pool failed" + "CVE-2016-2547": { + "cmt_msg": "ALSA: timer: Harden slave timer list handling", + "cmt_id": "65b6e4a0b6497a57608821c20149e83f256dc32c" }, - "CVE-2021-27365": { - "cmt_msg": "scsi: iscsi: Ensure sysfs attributes are limited to PAGE_SIZE" + "CVE-2016-2546": { + "cmt_msg": "ALSA: timer: Fix race among timer ioctls", + "cmt_id": "12f88515e0e99a220afdfaeeeedf2fe206fbdc24" }, - "CVE-2021-27364": { - "cmt_msg": "scsi: iscsi: Restrict sessions and handles to admin capabilities" + "CVE-2016-2543": { + "cmt_msg": "ALSA: seq: Fix missing NULL check at remove_events ioctl", + "cmt_id": "4cc2016fc314d14eb406dbd654120ae5a1bc2423" }, - "CVE-2019-11815": { - "cmt_msg": "net: rds: force to destroy connection if t_sock is NULL in rds_tcp_kill_sock()." + "CVE-2015-8970": { + "cmt_msg": "crypto: algif_skcipher - Require setkey before accept(2)", + "cmt_id": "e249f66acd1096c07a64cf59b6add21b0edbc7f3" }, - "CVE-2020-0431": { - "cmt_msg": "HID: hid-input: clear unmapped usages" + "CVE-2016-2549": { + "cmt_msg": "ALSA: hrtimer: Fix stall by hrtimer_cancel()", + "cmt_id": "f35e5e1204e0017f4011fd2896b16c6d30e2e827" }, - "CVE-2022-39842": { - "cmt_msg": "video: fbdev: pxa3xx-gcu: Fix integer overflow in pxa3xx_gcu_write" + "CVE-2015-8767": { + "cmt_msg": "sctp: Prevent soft lockup when sctp_accept() is called during a timeout event", + "cmt_id": "a655ba1a8c185ef3d8ecc2709df568c1a7840b74" + } + }, + "3.2.78": { + "CVE-2016-2782": { + "cmt_msg": "USB: visor: fix null-deref at probe", + "cmt_id": "eff70986a653dbf87ede52a1293dc499b6eb829e" }, - "CVE-2018-17977": { - "cmt_msg": "" + "CVE-2016-2384": { + "cmt_msg": "ALSA: usb-audio: avoid freeing umidi object twice", + "cmt_id": "78a6b3f7be7ae07c7e60f638c77c87701a703559" }, - "CVE-2024-1151": { - "cmt_msg": "net: openvswitch: limit the number of recursions from action sets" + "CVE-2016-0723": { + "cmt_msg": "tty: Fix unsafe ldisc reference via ioctl(TIOCGETD)", + "cmt_id": "710dbb61210c0546cd1bfd9ebd0ad29207202d26" }, - "CVE-2023-31081": { - "cmt_msg": "" + "CVE-2021-20265": { + "cmt_msg": "af_unix: fix struct pid memory leak", + "cmt_id": "60bfb26f95813ca8c779fbc16ade031dc85f5394" }, - "CVE-2010-5321": { - "cmt_msg": "" + "CVE-2017-13167": { + "cmt_msg": "ALSA: timer: Fix race at concurrent reads", + "cmt_id": "c65409e6175adaaf9430a8b12111afcda58c7dce" }, - "CVE-2021-20322": { - "cmt_msg": "ipv6: make exception cache less predictible" + "CVE-2015-7566": { + "cmt_msg": "USB: serial: visor: fix crash on detecting device without write_urbs", + "cmt_id": "8bc91d462570df465937a516c721ff0f4ae0e0ed" }, - "CVE-2021-20320": { - "cmt_msg": "s390/bpf: Fix optimizing out zero-extensions" + "CVE-2015-8812": { + "cmt_msg": "iw_cxgb3: Fix incorrectly returning error on success", + "cmt_id": "4249217f43bc2d1f0ba71895a566d28d8d097d52" }, - "CVE-2021-20321": { - "cmt_msg": "ovl: fix missing negative dentry check in ovl_rename()" + "CVE-2016-2847": { + "cmt_msg": "pipe: limit the per-user amount of pages allocated in pipes", + "cmt_id": "92375b85b70395c8180991084c05e8d78e55d066" }, - "CVE-2022-26490": { - "cmt_msg": "nfc: st21nfca: Fix potential buffer overflows in EVT_TRANSACTION" + "CVE-2013-4312": { + "cmt_msg": "unix: properly account for FDs passed over unix sockets", + "cmt_id": "a5a6cf8c405e826ff7ed1308dde72560c0ed4854" + } + }, + "3.2.79": { + "CVE-2016-2143": { + "cmt_msg": "s390/mm: four page table levels vs. fork", + "cmt_id": "03aeac3050c3ec92a50e1409e0b5037a97a20834" }, - "CVE-2023-3812": { - "cmt_msg": "net: tun: fix bugs for oversize packet when napi frags enabled" + "CVE-2015-7515": { + "cmt_msg": "Input: aiptek - fix crash on detecting device without endpoints", + "cmt_id": "90eb3c037fe3f0f25f01713a92725a8daa2b41f3" }, - "CVE-2023-7192": { - "cmt_msg": "netfilter: ctnetlink: fix possible refcount leak in ctnetlink_create_conntrack()" + "CVE-2016-0821": { + "cmt_msg": "include/linux/poison.h: fix LIST_POISON{1,2} offset", + "cmt_id": "d7a1adecfd8254ea61c79585a9c56dd6e3d0f5b7" + } + }, + "3.2.80": { + "CVE-2016-3137": { + "cmt_msg": "USB: cypress_m8: add endpoint sanity check", + "cmt_id": "2f974f8dc1e451dedb79eeac94f24e667c09917a" }, - "CVE-2022-3169": { - "cmt_msg": "nvme: ensure subsystem reset is single threaded" + "CVE-2016-3157": { + "cmt_msg": "x86/iopl/64: Properly context-switch IOPL on Xen PV", + "cmt_id": "880ee9d2f52a511bb603ef79030d6fbd30c5d878" }, - "CVE-2022-4744": { - "cmt_msg": "tun: avoid double free in tun_free_netdev" + "CVE-2016-3156": { + "cmt_msg": "ipv4: Don't do expensive useless work during inetdev destroy.", + "cmt_id": "d72b450666d8d0ee1dc01911c4193bc27b71af3d" }, - "CVE-2022-36280": { - "cmt_msg": "drm/vmwgfx: Validate the box size for the snooped cursor" + "CVE-2016-3672": { + "cmt_msg": "x86/mm/32: Enable full randomization on i386 and X86_32", + "cmt_id": "84f60bacb3084374a161bcb3e847dd22ed65f0a2" }, - "CVE-2022-1048": { - "cmt_msg": "ALSA: pcm: Fix races among concurrent hw_params and hw_free calls" + "CVE-2016-3140": { + "cmt_msg": "USB: digi_acceleport: do sanity checking for the number of ports", + "cmt_id": "3867082924673a9371792e822fe3ed403eeff4d9" }, - "CVE-2021-0342": { - "cmt_msg": "tun: correct header offsets in napi frags mode" + "CVE-2016-3136": { + "cmt_msg": "USB: mct_u232: add sanity checking in probe", + "cmt_id": "b323f6de337f4904272172958322b5f2bf50984d" }, - "CVE-2023-22995": { - "cmt_msg": "usb: dwc3: dwc3-qcom: Add missing platform_device_put() in dwc3_qcom_acpi_register_core" + "CVE-2016-3955": { + "cmt_msg": "USB: usbip: fix potential out-of-bounds write", + "cmt_id": "7ce55b83fbf2ff341aacfe825001d40e7bbccbe2" }, - "CVE-2024-21803": { - "cmt_msg": "" + "CVE-2016-7117": { + "cmt_msg": "net: Fix use after free in the recvmmsg exit path", + "cmt_id": "61934d093bc3acbd3d968b4b2f31c7c98b3edc10" }, - "CVE-2019-15927": { - "cmt_msg": "ALSA: usb-audio: Avoid access before bLength check in build_audio_procunit()" + "CVE-2016-9685": { + "cmt_msg": "xfs: fix two memory leaks in xfs_attr_list.c error paths", + "cmt_id": "f9b3ef7e5d25db9c35ebb61ba70bb502174c8b5d" }, - "CVE-2021-3542": { - "cmt_msg": "" + "CVE-2016-3134": { + "cmt_msg": "netfilter: x_tables: fix unconditional helper", + "cmt_id": "985970fd0118576d9853d1d1a9c4309ae4d248bb" }, - "CVE-2019-16413": { - "cmt_msg": "9p: use inode->i_lock to protect i_size_write() under 32-bit" + "CVE-2016-4805": { + "cmt_msg": "ppp: take reference on channels netns", + "cmt_id": "7fda126c5155acc3e61596ce4c5dcf3859e22444" }, - "CVE-2024-24860": { - "cmt_msg": "Bluetooth: Fix atomicity violation in {min,max}_key_size_set" + "CVE-2016-2185": { + "cmt_msg": "Input: ati_remote2 - fix crashes on detecting device with invalid descriptor", + "cmt_id": "ae211053c771562a27a53c2a49f20f720a7c473d" }, - "CVE-2020-12659": { - "cmt_msg": "xsk: Add missing check on user supplied headroom size" + "CVE-2016-2184": { + "cmt_msg": "ALSA: usb-audio: Fix NULL dereference in create_fixed_stream_quirk()", + "cmt_id": "8e5c3482b5c7bcbd7df6b10ddb6d7bcc578f3553" }, - "CVE-2024-22099": { - "cmt_msg": "" + "CVE-2016-2186": { + "cmt_msg": "Input: powermate - fix oops with malicious USB descriptors", + "cmt_id": "615fd7f1ce2ced5bd401aeac55cda44295c2ae58" }, - "CVE-2023-30456": { - "cmt_msg": "KVM: nVMX: add missing consistency checks for CR0 and CR4" + "CVE-2016-3138": { + "cmt_msg": "USB: cdc-acm: more sanity checking", + "cmt_id": "c50eccdcbb5df7830e4a0229844a154855ac13ff" + } + }, + "3.2.81": { + "CVE-2016-3961": { + "cmt_msg": "x86/mm/xen: Suppress hugetlbfs in PV guests", + "cmt_id": "2ecc8cfb833a45c8df005209fbd6e0382cf3c0b1" }, - "CVE-2020-12652": { - "cmt_msg": "scsi: mptfusion: Fix double fetch bug in ioctl" + "CVE-2016-4580": { + "cmt_msg": "net: fix a kernel infoleak in x25 module", + "cmt_id": "132c5255a23f505ffefe03cfc1f01ee9c82f3e09" }, - "CVE-2020-12653": { - "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_cmd_append_vsie_tlv()" + "CVE-2016-4486": { + "cmt_msg": "net: fix infoleak in rtnetlink", + "cmt_id": "114253841cddf0f87b19ab8b0091abea41c58735" }, - "CVE-2019-7222": { - "cmt_msg": "KVM: x86: work around leak of uninitialized stack contents (CVE-2019-7222)" + "CVE-2016-4485": { + "cmt_msg": "net: fix infoleak in llc", + "cmt_id": "3ec6a22dc6ded2c350e1d47513d316c55e9330c1" }, - "CVE-2020-12657": { - "cmt_msg": "block, bfq: fix use-after-free in bfq_idle_slice_timer_body" + "CVE-2016-4913": { + "cmt_msg": "get_rock_ridge_filename(): handle malformed NM entries", + "cmt_id": "d4203ded7550f38e69b18c37c1e0a67064fc02a8" }, - "CVE-2020-12654": { - "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_ret_wmm_get_status()" + "CVE-2016-4565": { + "cmt_msg": "IB/security: Restrict use of the write() interface", + "cmt_id": "7cd419255d03561d98c94fad1a027a539c4a7484" }, - "CVE-2019-7221": { - "cmt_msg": "KVM: nVMX: unconditionally cancel preemption timer in free_nested (CVE-2019-7221)" + "CVE-2016-2187": { + "cmt_msg": "Input: gtco - fix crash on detecting device without endpoints", + "cmt_id": "315085d5f39f1be90960b9ee4749c2e5df21096e" }, - "CVE-2018-12929": { - "cmt_msg": "" + "CVE-2016-7916": { + "cmt_msg": "proc: prevent accessing /proc//environ until it's ready", + "cmt_id": "99cfe931aa948c3af2f288f9d603bddbbc456a90" + } + }, + "3.2.82": { + "CVE-2016-4569": { + "cmt_msg": "ALSA: timer: Fix leak in SNDRV_TIMER_IOCTL_PARAMS", + "cmt_id": "c76456ef3f9371a7647f6dea87e8cdcc38cb33db" }, - "CVE-2018-12928": { - "cmt_msg": "" + "CVE-2016-5829": { + "cmt_msg": "HID: hiddev: validate num_values for HIDIOCGUSAGES, HIDIOCSUSAGES commands", + "cmt_id": "7cb5ee0e7e734969b39370ac739d473e0ae367bd" }, - "CVE-2020-36311": { - "cmt_msg": "KVM: SVM: Periodically schedule when unregistering regions on destroy" + "CVE-2016-4578": { + "cmt_msg": "ALSA: timer: Fix leak in events via snd_timer_user_ccallback", + "cmt_id": "506a6ad7e521baf8e554eedfd09873f490c8a304" }, - "CVE-2020-36310": { - "cmt_msg": "KVM: SVM: avoid infinite loop on NPF from bad address" + "CVE-2016-4470": { + "cmt_msg": "KEYS: potential uninitialized variable", + "cmt_id": "2145d937988c272cf59be94cc8a9669a6f0508e7" }, - "CVE-2020-36313": { - "cmt_msg": "KVM: Fix out of range accesses to memslots" + "CVE-2016-5243": { + "cmt_msg": "tipc: fix an infoleak in tipc_nl_compat_link_dump", + "cmt_id": "9fa075340941fc16110bca226c50819b2453fa9b" }, - "CVE-2020-35519": { - "cmt_msg": "net/x25: prevent a couple of overflows" + "CVE-2016-5244": { + "cmt_msg": "rds: fix an infoleak in rds_inc_info_copy", + "cmt_id": "948969a457e89903d180d01cbcbfee59c16f5bb5" }, - "CVE-2024-26592": { - "cmt_msg": "ksmbd: fix UAF issue in ksmbd_tcp_new_connection()" + "CVE-2016-4482": { + "cmt_msg": "USB: usbfs: fix potential infoleak in devio", + "cmt_id": "05b352b3503450e32a6b3b4fad6358d7bf1290f5" }, - "CVE-2021-28971": { - "cmt_msg": "perf/x86/intel: Fix a crash caused by zero PEBS status" + "CVE-2016-1583": { + "cmt_msg": "proc: prevent stacking filesystems on top", + "cmt_id": "cf3069a14a9cccdd89d2b482f9eee5e37ebe25a6" }, - "CVE-2020-10708": { - "cmt_msg": "" + "CVE-2014-9922": { + "cmt_msg": "fs: limit filesystem stacking depth", + "cmt_id": "9d6c5babc04522ff85b550f14563970279ab8f90" }, - "CVE-2020-25673": { - "cmt_msg": "nfc: Avoid endless loops caused by repeated llcp_sock_connect()" + "CVE-2016-6136": { + "cmt_msg": "audit: fix a double fetch in audit_log_single_execve_arg()", + "cmt_id": "143d0f1678e19294b33de07309013c8ff4777ebe" + } + }, + "3.2.84": { + "CVE-2016-7042": { + "cmt_msg": "KEYS: Fix short sprintf buffer in /proc/keys show function", + "cmt_id": "b70315cfd846c29a85c7348c4ff948fa54252d3a" }, - "CVE-2022-0400": { - "cmt_msg": "" + "CVE-2016-6828": { + "cmt_msg": "tcp: fix use after free in tcp_xmit_retransmit_queue()", + "cmt_id": "dce1c887660cb96ee0ba5e3751aa6845589c6fec" }, - "CVE-2024-25741": { - "cmt_msg": "" + "CVE-2016-8633": { + "cmt_msg": "firewire: net: guard against rx buffer overflows", + "cmt_id": "4538dfea79538a98e1468088b05627f82ac69789" }, - "CVE-2021-38160": { - "cmt_msg": "virtio_console: Assure used length from device is limited" + "CVE-2015-1350": { + "cmt_msg": "fs: Avoid premature clearing of capabilities", + "cmt_id": "7230a82ecc91aaf0c62b048afb15f3b8e2d8059f" }, - "CVE-2021-42739": { - "cmt_msg": "media: firewire: firedtv-avc: fix a buffer overflow in avc_ca_pmt()" + "CVE-2016-7097": { + "cmt_msg": "posix_acl: Clear SGID bit when setting file permissions", + "cmt_id": "a06d3be52bce98746341cfb290203603fd028290" }, - "CVE-2023-1989": { - "cmt_msg": "Bluetooth: btsdio: fix use after free bug in btsdio_remove due to unfinished work" + "CVE-2016-7425": { + "cmt_msg": "scsi: arcmsr: Buffer overflow in arcmsr_iop_message_xfer()", + "cmt_id": "5d14051db0eb5b81f1e5814681f3c60c232a33d8" }, - "CVE-2020-12771": { - "cmt_msg": "bcache: fix potential deadlock problem in btree_gc_coalesce" + "CVE-2016-6480": { + "cmt_msg": "aacraid: Check size values after double-fetch from user", + "cmt_id": "8c7c27347bf94d568353a539dfff6578b6181b82" }, - "CVE-2020-12770": { - "cmt_msg": "scsi: sg: add sg_remove_request in sg_write" + "CVE-2016-7910": { + "cmt_msg": "block: fix use-after-free in seq file", + "cmt_id": "48e28a20b22794a94a65305299f83d183d274a39" }, - "CVE-2022-20369": { - "cmt_msg": "media: v4l2-mem2mem: Apply DST_QUEUE_OFF_BASE on MMAP buffers across ioctls" + "CVE-2016-3857": { + "cmt_msg": "arm: oabi compat: add missing access checks", + "cmt_id": "b1038b4e5e64547052f91767ddf369683ebf2697" + } + }, + "3.2.85": { + "CVE-2017-15102": { + "cmt_msg": "usb: misc: legousbtower: Fix NULL pointer deference", + "cmt_id": "dde8322a694ca0c466775c3463fccd74a8ce14e2" }, - "CVE-2022-25265": { - "cmt_msg": "" + "CVE-2016-7915": { + "cmt_msg": "HID: core: prevent out-of-bound readings", + "cmt_id": "119e11a50fc0e5218e0a0f2d7d87c0cbf1d54940" }, - "CVE-2022-20368": { - "cmt_msg": "net/packet: fix slab-out-of-bounds access in packet_recvmsg()" + "CVE-2016-8632": { + "cmt_msg": "tipc: check minimum bearer MTU", + "cmt_id": "29273d459fb00a86bfb1ffed026033b152a99870" }, - "CVE-2019-15220": { - "cmt_msg": "p54usb: Fix race between disconnect and firmware loading" + "CVE-2016-8655": { + "cmt_msg": "packet: fix race condition in packet_set_ring", + "cmt_id": "a9aaf8204feb497bb47aab977f04f5cea69b174e" }, - "CVE-2020-10732": { - "cmt_msg": "fs/binfmt_elf.c: allocate initialized memory in fill_thread_core_info()" + "CVE-2016-10088": { + "cmt_msg": "sg_write()/bsg_write() is not fit to be called under KERNEL_DS", + "cmt_id": "e30250c95b840896da4cb71e84bead5803ee1ff6" }, - "CVE-2020-10773": { - "cmt_msg": "s390/cmm: fix information leak in cmm_timeout_handler()" + "CVE-2016-8405": { + "cmt_msg": "fbdev: color map copying bounds checking", + "cmt_id": "00a188b0e63feb83d7e78a91dee6f621a0dcbdda" }, - "CVE-2022-21499": { - "cmt_msg": "lockdown: also lock down previous kgdb use" + "CVE-2016-6787": { + "cmt_msg": "perf: Fix event->ctx locking", + "cmt_id": "f8ab792cab4a7c86288b8fba946a27a3e3119f46" }, - "CVE-2020-25284": { - "cmt_msg": "rbd: require global CAP_SYS_ADMIN for mapping and unmapping" + "CVE-2016-6786": { + "cmt_msg": "perf: Fix event->ctx locking", + "cmt_id": "f8ab792cab4a7c86288b8fba946a27a3e3119f46" }, - "CVE-2023-4208": { - "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free" + "CVE-2017-6001": { + "cmt_msg": "perf/core: Fix concurrent sys_perf_event_open() vs. 'move_group' race", + "cmt_id": "9eb0e01be831d0f37ea6278a92c32424141f55fb" }, - "CVE-2022-3606": { - "cmt_msg": "" + "CVE-2015-8963": { + "cmt_msg": "perf: Fix race in swevent hash", + "cmt_id": "d96703774345ffb7513b76058f4879ae14c298be" }, - "CVE-2023-4206": { - "cmt_msg": "net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free" + "CVE-2016-9555": { + "cmt_msg": "sctp: validate chunk len before actually using it", + "cmt_id": "ba43cdd87d0aaed69ef1bb14a91c3e767a4c210f" }, - "CVE-2023-4207": { - "cmt_msg": "net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free" + "CVE-2016-9794": { + "cmt_msg": "ALSA: pcm : Call kill_fasync() in stream lock", + "cmt_id": "5409b6c1f1b38d3fb461704d02addf55119c5230" }, - "CVE-2023-3640": { - "cmt_msg": "" + "CVE-2015-8964": { + "cmt_msg": "tty: Prevent ldisc drivers from re-using stale tty fields", + "cmt_id": "72bc3e471e03421dd6e1dd71762b3208af8e02a5" }, - "CVE-2023-20593": { - "cmt_msg": "x86/cpu/amd: Add a Zenbleed fix" + "CVE-2012-6704": { + "cmt_msg": "net: cleanups in sock_setsockopt()", + "cmt_id": "3e21b29fc335c07161b01459a4123721da2e4642" }, - "CVE-2023-3022": { - "cmt_msg": "ipv6: Use result arg in fib_lookup_arg consistently" + "CVE-2015-8962": { + "cmt_msg": "sg: Fix double-free when drives detach during SG_IO", + "cmt_id": "08f231da62d5a411ac5594409e76606e80107e02" }, - "CVE-2022-2663": { - "cmt_msg": "netfilter: nf_conntrack_irc: Fix forged IP logic" + "CVE-2014-9888": { + "cmt_msg": "ARM: dma-mapping: don't allow DMA mappings to be marked executable", + "cmt_id": "d05fedab817c43171d355d3aad5a9281ff80a7ba" }, - "CVE-2019-8912": { - "cmt_msg": "net: crypto set sk to NULL when af_alg_release." + "CVE-2016-7911": { + "cmt_msg": "block: fix use-after-free in sys_ioprio_get()", + "cmt_id": "1691990a88bdc50085de174b24861fbca12fcc57" }, - "CVE-2023-51780": { - "cmt_msg": "atm: Fix Use-After-Free in do_vcc_ioctl" + "CVE-2016-8645": { + "cmt_msg": "tcp: take care of truncations done by sk_filter()", + "cmt_id": "1433b66208118028d7f1a5fc235f2660badb6c05" }, - "CVE-2023-0047": { - "cmt_msg": "mm, oom: do not trigger out_of_memory from the #PF" + "CVE-2014-9895": { + "cmt_msg": "media: info leak in __media_device_enum_links()", + "cmt_id": "f43c83348acdbdd8ca1af3c52f6ace629f5b386d" + } + }, + "3.2.86": { + "CVE-2016-9588": { + "cmt_msg": "kvm: nVMX: Allow L1 to intercept software exceptions (#BP and #OF)", + "cmt_id": "b54f0df42fbd30cd1c6fdf4e72fd398b713a539e" }, - "CVE-2020-29370": { - "cmt_msg": "mm: slub: add missing TID bump in kmem_cache_alloc_bulk()" + "CVE-2017-6214": { + "cmt_msg": "tcp: avoid infinite loop in tcp_splice_read()", + "cmt_id": "cd3b9e464ca54547965df76463bdfb26e6712287" }, - "CVE-2019-15219": { - "cmt_msg": "USB: sisusbvga: fix oops in error path of sisusb_probe" + "CVE-2017-6074": { + "cmt_msg": "dccp: fix freeing skb too early for IPV6_RECVPKTINFO", + "cmt_id": "fd75b79ea9c7cf89d5b95f9896c6b4dcdac8c4cb" }, - "CVE-2022-20424": { - "cmt_msg": "io_uring: remove io_identity" + "CVE-2017-5549": { + "cmt_msg": "USB: serial: kl5kusb105: fix line-state error handling", + "cmt_id": "70c3dd409057dfe3a5d3486a0600bba340aab664" + } + }, + "3.2.87": { + "CVE-2017-6353": { + "cmt_msg": "sctp: deny peeloff operation on asocs with threads sleeping on it", + "cmt_id": "6c24f53714319676adf7ab0d2d081e4b9de35bad" }, - "CVE-2022-20422": { - "cmt_msg": "arm64: fix oops in concurrently setting insn_emulation sysctls" + "CVE-2017-2636": { + "cmt_msg": "tty: n_hdlc: get rid of racy n_hdlc.tbuf", + "cmt_id": "d7ac6cf6751a0ffa00f9e46022024f79b0daa771" }, - "CVE-2022-20421": { - "cmt_msg": "binder: fix UAF of ref->proc caused by race condition" + "CVE-2017-7273": { + "cmt_msg": "HID: hid-cypress: validate length of report", + "cmt_id": "4faec4a2ef5dd481682cc155cb9ea14ba2534b76" }, - "CVE-2023-4385": { - "cmt_msg": "fs: jfs: fix possible NULL pointer dereference in dbFree()" + "CVE-2017-5669": { + "cmt_msg": "ipc/shm: Fix shmat mmap nil-page protection", + "cmt_id": "c14d51ebac238f5bb6148c6999a54b02821445c6" }, - "CVE-2020-25643": { - "cmt_msg": "hdlc_ppp: add range checks in ppp_cp_parse_cr()" + "CVE-2017-6348": { + "cmt_msg": "irda: Fix lockdep annotations in hashbin_delete().", + "cmt_id": "c512d1770f6731d7c34eb71d7463852d3ad0e452" }, - "CVE-2023-4387": { - "cmt_msg": "net: vmxnet3: fix possible use-after-free bugs in vmxnet3_rq_alloc_rx_buf()" + "CVE-2017-5986": { + "cmt_msg": "sctp: avoid BUG_ON on sctp_wait_for_sndbuf", + "cmt_id": "8b9f297cd4171ffaec7441b38cecd61f9c5b3a7f" }, - "CVE-2024-24858": { - "cmt_msg": "" + "CVE-2017-6346": { + "cmt_msg": "packet: fix races in fanout_add()", + "cmt_id": "382299a020add34cc75ac501bbcb655195c123b8" + } + }, + "3.2.88": { + "CVE-2016-10200": { + "cmt_msg": "l2tp: fix racy SOCK_ZAPPED flag check in l2tp_ip{,6}_bind()", + "cmt_id": "2147a17048314f069838aace1d08b8c719448b50" }, - "CVE-2019-19378": { - "cmt_msg": "" + "CVE-2017-5970": { + "cmt_msg": "ipv4: keep skb->dst around in presence of IP options", + "cmt_id": "6892986c7db05c281322f1f8870f5a46d4080e99" + } + }, + "3.2.89": { + "CVE-2017-7294": { + "cmt_msg": "drm/vmwgfx: fix integer overflow in vmw_surface_define_ioctl()", + "cmt_id": "c2e7959f2ea446a417bf2cdb79792575852d17bb" }, - "CVE-2020-4788": { - "cmt_msg": "powerpc/64s: flush L1D on kernel entry" + "CVE-2017-7308": { + "cmt_msg": "net/packet: fix overflow in check for priv area size", + "cmt_id": "091a6de006536c50f8a30db60d994a5b083b1c7b" }, - "CVE-2022-36879": { - "cmt_msg": "xfrm: xfrm_policy: fix a possible double xfrm_pols_put() in xfrm_bundle_lookup()" + "CVE-2017-8890": { + "cmt_msg": "dccp/tcp: do not inherit mc_list from parent", + "cmt_id": "3d221359fedfc759661fb4a72804b6e798886e8f" }, - "CVE-2021-39698": { - "cmt_msg": "wait: add wake_up_pollfree()" + "CVE-2017-7472": { + "cmt_msg": "KEYS: fix keyctl_set_reqkey_keyring() to not leak thread keyrings", + "cmt_id": "0ebd7208190d2f7b16fee3cea05665e212cebaab" }, - "CVE-2022-45934": { - "cmt_msg": "Bluetooth: L2CAP: Fix u8 overflow" + "CVE-2017-7895": { + "cmt_msg": "nfsd: stricter decoding of write-like NFSv2/v3 ops", + "cmt_id": "6b9ba0c00cb068a50a409bbdc7cfbe473f1c01a3" }, - "CVE-2022-1247": { - "cmt_msg": "" + "CVE-2017-7184": { + "cmt_msg": "xfrm_user: validate XFRM_MSG_NEWAE XFRMA_REPLAY_ESN_VAL replay_window", + "cmt_id": "04dba730e9d4798184b4769f74ef14c20f8c6f9a" }, - "CVE-2019-19377": { - "cmt_msg": "btrfs: Don't submit any btree write bio if the fs has errors" + "CVE-2017-7487": { + "cmt_msg": "ipx: call ipxitf_put() in ioctl error path", + "cmt_id": "48dc185bcc73e1bb42d007cbaf96ad55cefaf4cb" }, - "CVE-2022-2380": { - "cmt_msg": "video: fbdev: sm712fb: Fix crash in smtcfb_read()" + "CVE-2017-9242": { + "cmt_msg": "ipv6: fix out of bound writes in __ip6_append_data()", + "cmt_id": "e5238fca9694d61861096d5fb80685c9f6581555" }, - "CVE-2023-20569": { - "cmt_msg": "x86/bugs: Increase the x86 bugs vector size to two u32s" + "CVE-2017-0605": { + "cmt_msg": "tracing: Use strlcpy() instead of strcpy() in __trace_find_cmdline()", + "cmt_id": "e39e64193a8a611d11d4c62579a7246c1af70d1c" }, - "CVE-2022-0850": { - "cmt_msg": "ext4: fix kernel infoleak via ext4_extent_header" + "CVE-2017-7645": { + "cmt_msg": "nfsd: check for oversized NFSv2/v3 arguments", + "cmt_id": "1eb3e42d91d63fc757a8da38683f417bcdf953a2" }, - "CVE-2019-19529": { - "cmt_msg": "can: mcba_usb: fix use-after-free on disconnect" + "CVE-2017-7261": { + "cmt_msg": "drm/vmwgfx: NULL pointer dereference in vmw_surface_define_ioctl()", + "cmt_id": "20996e6d81c907b10a5ab57c4172be97cb1a7de1" }, - "CVE-2019-19528": { - "cmt_msg": "USB: iowarrior: fix use-after-free on disconnect" + "CVE-2017-9077": { + "cmt_msg": "ipv6/dccp: do not inherit ipv6_mc_list from parent", + "cmt_id": "0767192a2c4ac9145a7e8fb00370963bc145a920" }, - "CVE-2021-3612": { - "cmt_msg": "Input: joydev - prevent potential read overflow in ioctl" + "CVE-2017-2671": { + "cmt_msg": "ping: implement proper locking", + "cmt_id": "352651a0a07649e4ee03e294da069b5c3e42aae4" }, - "CVE-2019-19525": { - "cmt_msg": "ieee802154: atusb: fix use-after-free at disconnect" + "CVE-2017-9075": { + "cmt_msg": "sctp: do not inherit ipv6_{mc|ac|fl}_list from parent", + "cmt_id": "cc1fa7814bdb7ebee2ee79bbce181c0783de9ad5" }, - "CVE-2019-19524": { - "cmt_msg": "Input: ff-memless - kill timer in destroy()" + "CVE-2017-9074": { + "cmt_msg": "ipv6: Prevent overrun when parsing v6 header options", + "cmt_id": "ad8a4d9d3f255a783d534a47d4b4ac611bb291d8" }, - "CVE-2019-19527": { - "cmt_msg": "HID: hiddev: do cleanup in failure of opening a device" + "CVE-2017-9076": { + "cmt_msg": "ipv6/dccp: do not inherit ipv6_mc_list from parent", + "cmt_id": "0767192a2c4ac9145a7e8fb00370963bc145a920" }, - "CVE-2019-19526": { - "cmt_msg": "NFC: pn533: fix use-after-free and memleaks" + "CVE-2016-2188": { + "cmt_msg": "USB: iowarrior: fix NULL-deref at probe", + "cmt_id": "6598f3d653a85dccfb4a472504ec6fd12cec8e42" }, - "CVE-2023-31085": { - "cmt_msg": "ubi: Refuse attaching if mtd's erasesize is 0" + "CVE-2017-7618": { + "cmt_msg": "crypto: ahash - Fix EINPROGRESS notification callback", + "cmt_id": "82ef3e7b16e777db114a0c3699b91134417fe8c9" }, - "CVE-2019-19523": { - "cmt_msg": "USB: adutux: fix use-after-free on disconnect" + "CVE-2017-8924": { + "cmt_msg": "USB: serial: io_ti: fix information leak in completion handler", + "cmt_id": "6d0c587048c85ca94723fc1bd900130cbe875eb3" }, - "CVE-2020-24504": { - "cmt_msg": "ice: create scheduler aggregator node config and move VSIs" + "CVE-2017-8925": { + "cmt_msg": "USB: serial: omninet: fix reference leaks at open", + "cmt_id": "8b236342396140be22ab9b486c412666f161af78" }, - "CVE-2020-11725": { - "cmt_msg": "" + "CVE-2016-9604": { + "cmt_msg": "KEYS: Disallow keyrings beginning with '.' to be joined as session keyrings", + "cmt_id": "7488aaea277dc17eb12bda22c91332c804c62965" }, - "CVE-2021-0937": { - "cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write" + "CVE-2017-7616": { + "cmt_msg": "mm/mempolicy.c: fix error handling in set_mempolicy and mbind.", + "cmt_id": "3f3b4a9db31af279e793229177b63ea201e24629" + } + }, + "3.2.90": { + "CVE-2017-1000364": { + "cmt_msg": "mm: larger stack guard gap, between vmas", + "cmt_id": "640c7dfdc7c723143b1ce42f5569ec8565cbbde7" }, - "CVE-2022-1263": { - "cmt_msg": "KVM: avoid NULL pointer dereference in kvm_dirty_ring_push" + "CVE-2017-7482": { + "cmt_msg": "rxrpc: Fix several cases where a padded len isn't checked in ticket decode", + "cmt_id": "09c9faacebb3c1e279ec962cff3072995328ca29" }, - "CVE-2021-35477": { - "cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4" + "CVE-2017-1000379": { + "cmt_msg": "mm: larger stack guard gap, between vmas", + "cmt_id": "640c7dfdc7c723143b1ce42f5569ec8565cbbde7" + } + }, + "3.2.91": { + "CVE-2017-6951": { + "cmt_msg": "KEYS: Remove key_type::match in favour of overriding default by match_preparse", + "cmt_id": "206659fcb63b2ba078a0c288e470ea12cacce316" }, - "CVE-2023-31436": { - "cmt_msg": "net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg" + "CVE-2017-10911": { + "cmt_msg": "xen-blkback: don't leak stack data via response ring", + "cmt_id": "cc21fe1ff77acfab555df5577ea46fc89932f3b2" }, - "CVE-2022-3521": { - "cmt_msg": "kcm: avoid potential race in kcm_tx_work" + "CVE-2017-1000380": { + "cmt_msg": "ALSA: timer: Fix race between read and ioctl", + "cmt_id": "7aba7242b83b6e9a56a8eb875d669cfab4eff542" }, - "CVE-2023-31082": { - "cmt_msg": "" + "CVE-2017-2647": { + "cmt_msg": "KEYS: Remove key_type::match in favour of overriding default by match_preparse", + "cmt_id": "206659fcb63b2ba078a0c288e470ea12cacce316" }, - "CVE-2022-47929": { - "cmt_msg": "net: sched: disallow noqueue for qdisc classes" + "CVE-2017-7889": { + "cmt_msg": "mm: Tighten x86 /dev/mem with zeroing reads", + "cmt_id": "b8f254aa17f720053054c4ecff3920973a83b9d6" }, - "CVE-2019-16746": { - "cmt_msg": "nl80211: validate beacon head" + "CVE-2017-1000365": { + "cmt_msg": "fs/exec.c: account for argv/envp pointers", + "cmt_id": "cea299eb189fca09c413432b807abd607385b3bc" }, - "CVE-2021-41864": { - "cmt_msg": "bpf: Fix integer overflow in prealloc_elems_and_freelist()" + "CVE-2017-1000363": { + "cmt_msg": "char: lp: fix possible integer overflow in lp_setup()", + "cmt_id": "550845d02afb926d50d1487f9e2b954270c83963" + } + }, + "3.2.92": { + "CVE-2017-10661": { + "cmt_msg": "timerfd: Protect the might cancel mechanism proper", + "cmt_id": "1b31fcb21779ddbe0b49f519830e203fe0586688" }, - "CVE-2020-10757": { - "cmt_msg": "mm: Fix mremap not considering huge pmd devmap" + "CVE-2017-11176": { + "cmt_msg": "mqueue: fix a use-after-free in sys_mq_notify()", + "cmt_id": "3557f62ec91e10cb2ac8e5f312bec0977d67803f" }, - "CVE-2022-2209": { - "cmt_msg": "" + "CVE-2017-1000111": { + "cmt_msg": "packet: fix tp_reserve race in packet_set_ring", + "cmt_id": "8f716035da0ad35d5a65668eb3c10aad6c439d7b" }, - "CVE-2022-45887": { - "cmt_msg": "media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb()" + "CVE-2017-7542": { + "cmt_msg": "ipv6: avoid overflow of offset in ip6_find_1stfragopt", + "cmt_id": "c5a5d1b1cb8449c77d3cb1663649391635228cff" + } + }, + "3.2.93": { + "CVE-2017-11600": { + "cmt_msg": "xfrm: policy: check policy direction value", + "cmt_id": "31f11713f7bb0a4cb90466331832658c0b9c9e80" }, - "CVE-2021-37576": { - "cmt_msg": "KVM: PPC: Book3S: Fix H_RTAS rets buffer overflow" + "CVE-2017-14106": { + "cmt_msg": "tcp: initialize rcv_mss to TCP_MIN_MSS instead of 0", + "cmt_id": "16a0303d3f6b222044de5d33c01cbdf590050473" }, - "CVE-2019-8980": { - "cmt_msg": "exec: Fix mem leak in kernel_read_file" + "CVE-2017-18360": { + "cmt_msg": "USB: serial: io_ti: fix div-by-zero in set_termios", + "cmt_id": "5b044cee0ef9b5f61bca80be15a019eb4ffa6a09" }, - "CVE-2023-7042": { - "cmt_msg": "" + "CVE-2017-14140": { + "cmt_msg": "Sanitize 'move_pages()' permission checks", + "cmt_id": "a9a659c916c81b3385479ee00d4547912f08abf6" }, - "CVE-2022-3594": { - "cmt_msg": "r8152: Rate limit overflow messages" + "CVE-2017-15274": { + "cmt_msg": "KEYS: fix dereferencing NULL payload with nonzero length", + "cmt_id": "134a3099ea5bb3d13126321ac48bfc48c72784ed" }, - "CVE-2022-3595": { - "cmt_msg": "cifs: fix double-fault crash during ntlmssp" + "CVE-2017-12134": { + "cmt_msg": "xen: fix bio vec merging", + "cmt_id": "33bab9221e22bab4ddc167f6c49b6ca9c35c2ccf" + } + }, + "3.2.94": { + "CVE-2017-14156": { + "cmt_msg": "video: fbdev: aty: do not leak uninitialized padding in clk to userspace", + "cmt_id": "71b8eab658c3569c1b3fe3d4df3334bb3fe85903" }, - "CVE-2023-35824": { - "cmt_msg": "media: dm1105: Fix use after free bug in dm1105_remove due to race condition" + "CVE-2017-12153": { + "cmt_msg": "nl80211: check for the required netlink attributes presence", + "cmt_id": "082d8a6a55d2b6583d9e93ac9796efdf4c412658" }, - "CVE-2021-33098": { - "cmt_msg": "ixgbe: fix large MTU request from VF" + "CVE-2017-8831": { + "cmt_msg": "saa7164: fix double fetch PCIe access condition", + "cmt_id": "10c59d27363eba9fece1965293f83d865ba532be" }, - "CVE-2023-1390": { - "cmt_msg": "tipc: fix NULL deref in tipc_link_xmit()" + "CVE-2017-14340": { + "cmt_msg": "xfs: XFS_IS_REALTIME_INODE() should be false if no rt device present", + "cmt_id": "90b59e69283444326907eb6c6b447366814d0960" }, - "CVE-2023-47233": { - "cmt_msg": "" + "CVE-2017-12154": { + "cmt_msg": "kvm: nVMX: Don't allow L2 to access the hardware CR8", + "cmt_id": "7999f7fc5b2ca4c0b2a96b7fb3dfa4e30274da27" }, - "CVE-2021-35039": { - "cmt_msg": "module: limit enabling module.sig_enforce" + "CVE-2017-1000251": { + "cmt_msg": "Bluetooth: Properly check L2CAP config option output buffer length", + "cmt_id": "26d624204b5243a0c928bad4bf62560bb63f385d" }, - "CVE-2020-27815": { - "cmt_msg": "jfs: Fix array index bounds check in dbAdjTree" + "CVE-2017-14489": { + "cmt_msg": "scsi: scsi_transport_iscsi: fix the issue that iscsi_if_rx doesn't parse nlmsg properly", + "cmt_id": "7d38a8202c4a6acf91d6163f53f3253a261bbd22" }, - "CVE-2021-26934": { - "cmt_msg": "" + "CVE-2017-18079": { + "cmt_msg": "Input: i8042 - fix crash at boot time", + "cmt_id": "87f5229f69b4bfc48c97c631d823dea5444029c3" + } + }, + "3.2.95": { + "CVE-2017-16535": { + "cmt_msg": "USB: core: fix out-of-bounds access bug in usb_get_bos_descriptor()", + "cmt_id": "7c27b82fad16d2804c7c8405316a636f57edeabd" }, - "CVE-2022-23041": { - "cmt_msg": "xen/9p: use alloc/free_pages_exact()" + "CVE-2017-15299": { + "cmt_msg": "KEYS: don't let add_key() update an uninstantiated key", + "cmt_id": "57f94e88bb255bf7b7d267c999aefbe4557307c1" }, - "CVE-2022-1462": { - "cmt_msg": "tty: use new tty_insert_flip_string_and_push_buffer() in pty_write()" + "CVE-2017-13080": { + "cmt_msg": "mac80211: accept key reinstall without changing anything", + "cmt_id": "ef810e7c3d2a8fb3bbd23726599c487c30ea747e" }, - "CVE-2022-3115": { - "cmt_msg": "drm: mali-dp: potential dereference of null pointer" + "CVE-2017-15649": { + "cmt_msg": "packet: in packet_do_bind, test fanout with bind_lock held", + "cmt_id": "ca3d015d39f0357889fa3ef6a88028162de17d7d" }, - "CVE-2023-6606": { - "cmt_msg": "smb: client: fix OOB in smbCalcSize()" + "CVE-2017-16531": { + "cmt_msg": "USB: fix out-of-bounds in usb_set_configuration", + "cmt_id": "a0e0a5850211dd09725c819a8915c2cbe9067317" }, - "CVE-2020-27777": { - "cmt_msg": "powerpc/rtas: Restrict RTAS requests from userspace" + "CVE-2017-16533": { + "cmt_msg": "HID: usbhid: fix out-of-bounds bug", + "cmt_id": "99de0781e0de7c866f762b931351c2a501c3074f" }, - "CVE-2019-20636": { - "cmt_msg": "Input: add safety guards to input_set_keycode()" + "CVE-2017-16527": { + "cmt_msg": "ALSA: usb-audio: Kill stray URB at exiting", + "cmt_id": "72f4b1c7114c1b34302999d72bc5b16c8c1a1945" }, - "CVE-2019-11486": { - "cmt_msg": "tty: mark Siemens R3964 line discipline as BROKEN" + "CVE-2017-11473": { + "cmt_msg": "x86/acpi: Prevent out of bound access caused by broken ACPI tables", + "cmt_id": "96301209473afd3f2f274b91cb7082d161b9be65" }, - "CVE-2019-11487": { - "cmt_msg": "fs: prevent page refcount overflow in pipe_buf_get" + "CVE-2017-16532": { + "cmt_msg": "usb: usbtest: fix NULL pointer dereference", + "cmt_id": "f2a780301ae85dbe704499675832487130b8e267" }, - "CVE-2020-27673": { - "cmt_msg": "xen/events: add a proper barrier to 2-level uevent unmasking" + "CVE-2017-16529": { + "cmt_msg": "ALSA: usb-audio: Check out-of-bounds access by corrupted buffer descriptor", + "cmt_id": "8a930044f0b100d6b28a94525e9cf62787b3ec3a" }, - "CVE-2020-27675": { - "cmt_msg": "xen/events: avoid removing an event channel while handling it" + "CVE-2015-9004": { + "cmt_msg": "perf: Tighten (and fix) the grouping condition", + "cmt_id": "5f542f7740bc8db862b8078e6a621ee7a13427b8" }, - "CVE-2023-52439": { - "cmt_msg": "uio: Fix use-after-free in uio_open" + "CVE-2018-10675": { + "cmt_msg": "mm/mempolicy: fix use after free when calling get_mempolicy", + "cmt_id": "cb46e434ba111d1fd83dcb8bcc44c404e9d12a16" }, - "CVE-2020-28915": { - "cmt_msg": "fbcon: Fix global-out-of-bounds read in fbcon_get_font()" + "CVE-2017-15265": { + "cmt_msg": "ALSA: seq: Fix use-after-free at creating a port", + "cmt_id": "c3895a053b2505f9e409e6d6c57dcece714ab486" }, - "CVE-2019-20908": { - "cmt_msg": "efi: Restrict efivar_ssdt_load when the kernel is locked down" + "CVE-2017-12190": { + "cmt_msg": "fix unbalanced page refcounting in bio_map_user_iov", + "cmt_id": "9ff5d8fe36745867da8a028b3ea58629f7546155" + } + }, + "3.2.96": { + "CVE-2017-16537": { + "cmt_msg": "media: imon: Fix null-ptr-deref in imon_probe", + "cmt_id": "0df873c63e8e99a8fb6e068d182b860e6e6e07a9" }, - "CVE-2023-3776": { - "cmt_msg": "net/sched: cls_fw: Fix improper refcount update leads to use-after-free" + "CVE-2017-16536": { + "cmt_msg": "cx231xx-cards: fix NULL-deref on missing association descriptor", + "cmt_id": "59a7195cd497d430d9f76bc9f71cf53ed4102743" }, - "CVE-2021-28038": { - "cmt_msg": "Xen/gnttab: handle p2m update errors on a per-slot basis" + "CVE-2018-9517": { + "cmt_msg": "l2tp: pass tunnel pointer to ->session_create()", + "cmt_id": "ca8172873304dbc6c6047b698452d9c89d86f037" }, - "CVE-2022-23040": { - "cmt_msg": "xen/xenbus: don't let xenbus_grant_ring() remove grants in error case" + "CVE-2017-0627": { + "cmt_msg": "media: uvcvideo: Prevent heap overflow when accessing mapped controls", + "cmt_id": "c889e4cbe9b3975b3f8d109c397b0b8ef2d7bd2f" }, - "CVE-2022-3111": { - "cmt_msg": "power: supply: wm8350-power: Add missing free in free_charger_irq" + "CVE-2017-16525": { + "cmt_msg": "USB: serial: console: fix use-after-free after failed setup", + "cmt_id": "b92072aadd839c9379190979edac63285ae2b790" }, - "CVE-2023-52435": { - "cmt_msg": "net: prevent mss overflow in skb_segment()" + "CVE-2017-16643": { + "cmt_msg": "Input: gtco - fix potential out-of-bound access", + "cmt_id": "2de544fd1b16f76f8dd1213d585ce611155ccd34" }, - "CVE-2023-52434": { - "cmt_msg": "smb: client: fix potential OOBs in smb2_parse_contexts()" + "CVE-2017-14051": { + "cmt_msg": "scsi: qla2xxx: Fix an integer overflow in sysfs code", + "cmt_id": "1714a066d71dc00bc336aa1565ec86551e388704" }, - "CVE-2023-3161": { - "cmt_msg": "fbcon: Check font dimension limits" + "CVE-2017-16649": { + "cmt_msg": "net: cdc_ether: fix divide by 0 on bad descriptors", + "cmt_id": "d7d24810ac55e2f3fb213d6acf80016a0d337c50" }, - "CVE-2023-52436": { - "cmt_msg": "f2fs: explicitly null-terminate the xattr list" + "CVE-2017-15115": { + "cmt_msg": "sctp: do not peel off an assoc from one netns to another one", + "cmt_id": "16585babafe54375f23f73a8fc323bd51e7955d7" + } + }, + "3.2.97": { + "CVE-2017-16526": { + "cmt_msg": "uwb: properly check kthread_run return value", + "cmt_id": "c95d921ebf9e02853bd090f3b3845085082185f8" }, - "CVE-2019-19060": { - "cmt_msg": "iio: imu: adis16400: release allocated memory on failure" + "CVE-2020-14353": { + "cmt_msg": "KEYS: prevent creating a different user's keyrings", + "cmt_id": "a0ff43031db9d248f659a5db3a819f5498203775" }, - "CVE-2019-19061": { - "cmt_msg": "iio: imu: adis16400: fix memory leak" + "CVE-2017-17741": { + "cmt_msg": "KVM: Fix stack-out-of-bounds read in write_mmio", + "cmt_id": "26a8a3c531ae847048ee9126f07cb07424bd4724" }, - "CVE-2019-19062": { - "cmt_msg": "crypto: user - fix memory leak in crypto_report" + "CVE-2017-18270": { + "cmt_msg": "KEYS: prevent creating a different user's keyrings", + "cmt_id": "a0ff43031db9d248f659a5db3a819f5498203775" }, - "CVE-2019-19063": { - "cmt_msg": "rtlwifi: prevent memory leak in rtl_usb_probe" + "CVE-2017-15868": { + "cmt_msg": "Bluetooth: bnep: bnep_add_connection() should verify that it's dealing with l2cap socket", + "cmt_id": "d5623517462d7bdf03cae13e8b713389b0cdd381" }, - "CVE-2019-19065": { - "cmt_msg": "RDMA/hfi1: Prevent memory leak in sdma_init" + "CVE-2017-8824": { + "cmt_msg": "dccp: CVE-2017-8824: use-after-free in DCCP code", + "cmt_id": "e23d13a89d8ca5fe717d75248672e1b8bc4a3be8" }, - "CVE-2019-19066": { - "cmt_msg": "scsi: bfa: release allocated memory in case of error" + "CVE-2017-1000407": { + "cmt_msg": "KVM: VMX: remove I/O port 0x80 bypass on Intel hosts", + "cmt_id": "13b86808f7fabea496c02131f49fec46a84fb3c9" }, - "CVE-2019-19067": { - "cmt_msg": "drm/amdgpu: fix multiple memory leaks in acp_hw_init" + "CVE-2017-17558": { + "cmt_msg": "USB: core: prevent malicious bNumInterfaces overflow", + "cmt_id": "11a1db99b93dbb5f7b78cffe9b85e616ab749776" }, - "CVE-2019-19068": { - "cmt_msg": "rtl8xxxu: prevent leaking urb" + "CVE-2017-17806": { + "cmt_msg": "crypto: hmac - require that the underlying hash algorithm is unkeyed", + "cmt_id": "a63785d3294e9d7704db04500400fd8bb4b59a69" }, - "CVE-2020-0435": { - "cmt_msg": "f2fs: fix to do sanity check with i_extra_isize" + "CVE-2020-27067": { + "cmt_msg": "l2tp: fix l2tp_eth module loading", + "cmt_id": "1e44d4e0c0ef21599f86e0b7adb2dc6bcd0c35dd" }, - "CVE-2020-0432": { - "cmt_msg": "staging: most: net: fix buffer overflow" + "CVE-2017-16939": { + "cmt_msg": "ipsec: Fix aborted xfrm policy dump crash", + "cmt_id": "43ce9bf0770f22048156e7b36fe812a3352da842" }, - "CVE-2020-0433": { - "cmt_msg": "blk-mq: sync the update nr_hw_queues with blk_mq_queue_tag_busy_iter" + "CVE-2017-17807": { + "cmt_msg": "KEYS: add missing permission check for request_key() destination", + "cmt_id": "5d8207e99e9baadab32d815772da60bff3a07eb5" }, - "CVE-2023-51779": { - "cmt_msg": "Bluetooth: af_bluetooth: Fix Use-After-Free in bt_sock_recvmsg" + "CVE-2017-17805": { + "cmt_msg": "crypto: salsa20 - fix blkcipher_walk API usage", + "cmt_id": "a1eb10d948c39388c5dea527aa4e76ac90a6a7e1" + } + }, + "3.2.99": { + "CVE-2017-18203": { + "cmt_msg": "dm: fix race between dm_get_from_kobject() and __dm_destroy()", + "cmt_id": "90c6762af0480451a1c32cf33dcf075795f5d3ed" }, - "CVE-2019-3874": { - "cmt_msg": "sctp: implement memory accounting on tx path" + "CVE-2021-0447": { + "cmt_msg": "l2tp: protect sock pointer of struct pppol2tp_session with RCU", + "cmt_id": "d36e5ba7bbed5d7bd26e8609ffed503c2def401b" }, - "CVE-2023-6915": { - "cmt_msg": "ida: Fix crash in ida_free when the bitmap is empty" + "CVE-2018-1000004": { + "cmt_msg": "ALSA: seq: Make ioctls race-free", + "cmt_id": "d6693160906d55ba376bf0b88b7c129762170162" }, - "CVE-2010-4563": { - "cmt_msg": "" + "CVE-2017-16913": { + "cmt_msg": "usbip: fix stub_rx: harden CMD_SUBMIT path to handle malicious input", + "cmt_id": "629f509078f02bf65da3ecca8363104b08a3fdd7" }, - "CVE-2023-1249": { - "cmt_msg": "coredump: Use the vma snapshot in fill_files_note" + "CVE-2017-16912": { + "cmt_msg": "usbip: fix stub_rx: get_pipe() to validate endpoint number", + "cmt_id": "95ac81780575f669db047b30511d56400c67099e" }, - "CVE-2020-14331": { - "cmt_msg": "vgacon: Fix for missing check in scrollback handling" + "CVE-2017-16911": { + "cmt_msg": "usbip: prevent vhci_hcd driver from leaking a socket pointer address", + "cmt_id": "11406025161a8745167414687bca1f8c04b5eb6c" }, - "CVE-2023-45871": { - "cmt_msg": "igb: set max size RX buffer when store bad packet is enabled" + "CVE-2018-5333": { + "cmt_msg": "RDS: null pointer dereference in rds_atomic_free_op", + "cmt_id": "57e49cc5d8048f4274b3b2c8ec075f656f8a3ed1" }, - "CVE-2020-12114": { - "cmt_msg": "make struct mountpoint bear the dentry reference to mountpoint, not struct mount" + "CVE-2017-16914": { + "cmt_msg": "usbip: fix stub_send_ret_submit() vulnerability to null transfer_buffer", + "cmt_id": "41ffa4f1c1480fe4392c6e1c48346a49d048ff4a" }, - "CVE-2023-2248": { - "cmt_msg": "net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg" + "CVE-2017-18017": { + "cmt_msg": "netfilter: xt_TCPMSS: add more sanity tests on tcph->doff", + "cmt_id": "d84eeff84e9869d29f442ff652ce1352cfa63e84" }, - "CVE-2023-0266": { - "cmt_msg": "ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF" + "CVE-2018-5332": { + "cmt_msg": "RDS: Heap OOB write in rds_message_alloc_sgs()", + "cmt_id": "60daca9efbb3e4109ebc1f7069543e5573fc124e" + } + }, + "3.2.100": { + "CVE-2017-0861": { + "cmt_msg": "ALSA: pcm: prevent UAF in snd_pcm_info", + "cmt_id": "c51f80d4d3a47dbc97b9b1b67d81e763afe9c398" }, - "CVE-2023-1838": { - "cmt_msg": "Fix double fget() in vhost_net_set_backend()" + "CVE-2019-9454": { + "cmt_msg": "i2c: core-smbus: prevent stack corruption on read I2C_BLOCK_DATA", + "cmt_id": "fa05746dcb3132105d634eb72ec0d455af3be3cf" }, - "CVE-2021-3483": { - "cmt_msg": "firewire: nosy: Fix a use-after-free bug in nosy_ioctl()" + "CVE-2018-6927": { + "cmt_msg": "futex: Prevent overflow by strengthen input validation", + "cmt_id": "9d4265fc8f485089645dca8c688eedd890a165af" }, - "CVE-2023-6040": { - "cmt_msg": "netfilter: nf_tables: Reject tables of unsupported family" + "CVE-2018-7492": { + "cmt_msg": "rds: Fix NULL pointer dereference in __rds_rdma_map", + "cmt_id": "cbe131eb2d7bab9b3332094ae279fed7cb170a85" }, - "CVE-2023-20588": { - "cmt_msg": "x86/CPU/AMD: Do not leak quotient data after a division by 0" + "CVE-2017-18551": { + "cmt_msg": "i2c: core-smbus: prevent stack corruption on read I2C_BLOCK_DATA", + "cmt_id": "fa05746dcb3132105d634eb72ec0d455af3be3cf" }, - "CVE-2021-38300": { - "cmt_msg": "bpf, mips: Validate conditional branch offsets" + "CVE-2018-18386": { + "cmt_msg": "n_tty: fix EXTPROC vs ICANON interaction with TIOCINQ (aka FIONREAD)", + "cmt_id": "8711719778f9e003be82bba0362e87b97b46c891" }, - "CVE-2020-25656": { - "cmt_msg": "vt: keyboard, extend func_buf_lock to readers" + "CVE-2018-5750": { + "cmt_msg": "ACPI: sbshc: remove raw pointer from printk() message", + "cmt_id": "d019cd4409c70839ea5c8568ea861dcddf2d831c" }, - "CVE-2021-3759": { - "cmt_msg": "memcg: enable accounting of ipc resources" + "CVE-2018-1000028": { + "cmt_msg": "nfsd: auth: Fix gid sorting when rootsquash enabled", + "cmt_id": "b520f2dc407ffcb097efd2282b42c26bed8492b7" + } + }, + "3.2.101": { + "CVE-2017-5715": { + "cmt_msg": "x86/cpufeatures: Add X86_BUG_SPECTRE_V[12]", + "cmt_id": "0605c9a548fb39e5b0ee4765ffe828742ecf02ae" + } + }, + "3.2.102": { + "CVE-2019-9456": { + "cmt_msg": "usb: usbmon: Read text within supplied buffer size", + "cmt_id": "b8021dfb921a69ec50ccb866178367f95c7b7878" }, - "CVE-2022-24448": { - "cmt_msg": "NFSv4: Handle case where the lookup of a directory fails" + "CVE-2017-18216": { + "cmt_msg": "ocfs2: subsystem.su_mutex is required while accessing the item->ci_parent", + "cmt_id": "dfd9f20a2db71ca01033040ecf69d5c0e67db629" }, - "CVE-2024-26598": { - "cmt_msg": "KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache" + "CVE-2018-8822": { + "cmt_msg": "staging: ncpfs: memory corruption in ncp_read_kernel()", + "cmt_id": "38643d20b4d4ac378046e51b15556f0f7dc489ea" }, - "CVE-2022-23042": { - "cmt_msg": "xen/netfront: react properly to failing gnttab_end_foreign_access_ref()" + "CVE-2017-18208": { + "cmt_msg": "mm/madvise.c: fix madvise() infinite loop under special circumstances", + "cmt_id": "3d886ff142e713000aec6bf6f82944eb03dab28c" }, - "CVE-2019-10142": { - "cmt_msg": "drivers/virt/fsl_hypervisor.c: prevent integer overflow in ioctl" + "CVE-2018-7995": { + "cmt_msg": "x86/MCE: Serialize sysfs changes", + "cmt_id": "65e38566ae2600cebb885af0b58dc8732e25ee52" }, - "CVE-2021-4023": { - "cmt_msg": "io-wq: fix cancellation on create-worker failure" + "CVE-2018-7566": { + "cmt_msg": "ALSA: seq: Fix racy pool initializations", + "cmt_id": "b5c3d49b3d5889f334d519d7a4535a3bd8632d47" }, - "CVE-2023-3268": { - "cmt_msg": "relayfs: fix out-of-bounds access in relay_file_read" + "CVE-2018-1092": { + "cmt_msg": "ext4: fail ext4_iget for root directory if unallocated", + "cmt_id": "bf7fc655f12864b4c12d902cf60ae37a708cc344" }, - "CVE-2021-22555": { - "cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write" + "CVE-2018-1093": { + "cmt_msg": "ext4: add validity checks for bitmap block numbers", + "cmt_id": "f278235ce148485cdb9dc990673943addafbd577" }, - "CVE-2020-36694": { - "cmt_msg": "netfilter: x_tables: Switch synchronization to RCU" + "CVE-2018-10940": { + "cmt_msg": "cdrom: information leak in cdrom_ioctl_media_changed()", + "cmt_id": "15bad6c8291a04692b928e9037844fde6f32a798" }, - "CVE-2021-0399": { - "cmt_msg": "" + "CVE-2018-5803": { + "cmt_msg": "sctp: verify size of a new chunk in _sctp_make_chunk()", + "cmt_id": "61079d7091f4a673a337b5d63e7e7e38ac405d37" }, - "CVE-2020-36691": { - "cmt_msg": "netlink: limit recursion depth in policy validation" + "CVE-2018-8897": { + "cmt_msg": "x86/entry/64: Don't use IST entry for #BP stack", + "cmt_id": "5a1f747c7f58e9820ebfb6b4811934a1f48bc4fe" }, - "CVE-2023-42755": { - "cmt_msg": "net/sched: Retire rsvp classifier" + "CVE-2018-7757": { + "cmt_msg": "scsi: libsas: fix memory leak in sas_smp_get_phy_events()", + "cmt_id": "2a690a408dee7a9d51b17dfe93b116bd7ab6177a" }, - "CVE-2020-2732": { - "cmt_msg": "KVM: nVMX: Don't emulate instructions in guest mode" + "CVE-2018-1068": { + "cmt_msg": "netfilter: ebtables: CONFIG_COMPAT: don't trust userland offsets", + "cmt_id": "dccc6e2c9b486b99b6ec356e14f7de58832b3833" }, - "CVE-2012-4542": { - "cmt_msg": "" + "CVE-2018-1000199": { + "cmt_msg": "perf/hwbp: Simplify the perf-hwbp code, fix documentation", + "cmt_id": "03e58a520044e3ea80a3ea43586f956e2e86c74d" }, - "CVE-2022-1729": { - "cmt_msg": "perf: Fix sys_perf_event_open() race against self" + "CVE-2018-6412": { + "cmt_msg": "fbdev: Fixing arbitrary kernel leak in case FBIOGETCMAP_SPARC in sbusfb_ioctl_helper().", + "cmt_id": "e553bcf09a6390e7f52e47132b27b4574d0ad71a" }, - "CVE-2023-42752": { - "cmt_msg": "igmp: limit igmpv3_newpack() packet size to IP_MAX_MTU" + "CVE-2018-1130": { + "cmt_msg": "dccp: check sk for closed state in dccp_sendmsg()", + "cmt_id": "109503b8cccb3b803d875b88d21d49eab921969e" + } + }, + "outstanding": { + "CVE-2020-36322": { + "cmt_msg": "fuse: fix bad inode" }, - "CVE-2023-4128": { - "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free" + "CVE-2024-26686": { + "cmt_msg": "fs/proc: do_task_stat: use sig->stats_lock to gather the threads/children stats" }, - "CVE-2021-3573": { - "cmt_msg": "Bluetooth: use correct lock to prevent UAF of hdev object" + "CVE-2022-3649": { + "cmt_msg": "nilfs2: fix use-after-free bug of struct nilfs_root" }, - "CVE-2023-3609": { - "cmt_msg": "net/sched: cls_u32: Fix reference counter leak leading to overflow" + "CVE-2020-35501": { + "cmt_msg": "" }, - "CVE-2022-1974": { - "cmt_msg": "nfc: replace improper check device_is_registered() in netlink related functions" + "CVE-2024-26687": { + "cmt_msg": "xen/events: close evtchn after mapping cleanup" }, - "CVE-2022-1975": { - "cmt_msg": "NFC: netlink: fix sleep in atomic bug when firmware download timeout" + "CVE-2021-45095": { + "cmt_msg": "phonet: refcount leak in pep_sock_accep" }, - "CVE-2022-44032": { - "cmt_msg": "char: pcmcia: remove all the drivers" + "CVE-2022-3646": { + "cmt_msg": "nilfs2: fix leak of nilfs_root in case of writer thread creation failure" }, - "CVE-2021-28972": { - "cmt_msg": "PCI: rpadlpar: Fix potential drc_name corruption in store functions" + "CVE-2022-0001": { + "cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE" }, - "CVE-2018-12130": { - "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" + "CVE-2020-12464": { + "cmt_msg": "USB: core: Fix free-while-in-use bug in the USB S-Glibrary" }, - "CVE-2021-20292": { - "cmt_msg": "drm/ttm/nouveau: don't call tt destroy callback on alloc failure." + "CVE-2022-0002": { + "cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE" }, - "CVE-2021-31916": { - "cmt_msg": "dm ioctl: fix out of bounds array access when no devices" + "CVE-2019-19965": { + "cmt_msg": "scsi: libsas: stop discovering if oob mode is disconnected" }, - "CVE-2022-32981": { - "cmt_msg": "powerpc/32: Fix overread/overwrite of thread_struct via ptrace" + "CVE-2021-3752": { + "cmt_msg": "Bluetooth: fix use-after-free error in lock_sock_nested()" }, - "CVE-2020-25645": { - "cmt_msg": "geneve: add transport ports in route lookup for geneve" + "CVE-2019-19966": { + "cmt_msg": "media: cpia2: Fix use-after-free in cpia2_exit" }, - "CVE-2022-1280": { - "cmt_msg": "drm: avoid circular locks in drm_mode_getconnector" + "CVE-2023-52615": { + "cmt_msg": "hwrng: core - Fix page fault dead lock on mmap-ed hwrng" }, - "CVE-2023-3772": { - "cmt_msg": "xfrm: add NULL check in xfrm_update_ae_params" + "CVE-2023-52614": { + "cmt_msg": "PM / devfreq: Fix buffer overflow in trans_stat_show" }, - "CVE-2020-11668": { - "cmt_msg": "media: xirlink_cit: add missing descriptor sanity checks" + "CVE-2023-52617": { + "cmt_msg": "PCI: switchtec: Fix stdev_release() crash after surprise hot remove" }, - "CVE-2020-11669": { - "cmt_msg": "powerpc/powernv/idle: Restore AMR/UAMOR/AMOR after idle" + "CVE-2020-24587": { + "cmt_msg": "mac80211: prevent mixed key and fragment cache attacks" }, - "CVE-2019-15118": { - "cmt_msg": "ALSA: usb-audio: Fix a stack buffer overflow bug in check_input_term" + "CVE-2020-24586": { + "cmt_msg": "mac80211: prevent mixed key and fragment cache attacks" }, - "CVE-2019-12818": { - "cmt_msg": "net: nfc: Fix NULL dereference on nfc_llcp_build_tlv fails" + "CVE-2021-0129": { + "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical" }, - "CVE-2019-12819": { - "cmt_msg": "mdio_bus: Fix use-after-free on device_register fails" + "CVE-2019-20096": { + "cmt_msg": "dccp: Fix memleak in __feat_register_sp" }, - "CVE-2023-0394": { - "cmt_msg": "ipv6: raw: Deduct extension header length in rawv6_push_pending_frames" + "CVE-2023-52619": { + "cmt_msg": "pstore/ram: Fix crash when setting number of cpus to an odd number" }, - "CVE-2020-10690": { - "cmt_msg": "ptp: fix the race between the release of ptp_clock and cdev" + "CVE-2023-52618": { + "cmt_msg": "block/rnbd-srv: Check for unlikely string overflow" }, - "CVE-2019-12817": { - "cmt_msg": "powerpc/mm/64s/hash: Reallocate context ids on fork" + "CVE-2016-10044": { + "cmt_msg": "aio: mark AIO pseudo-fs noexec" }, - "CVE-2022-3108": { - "cmt_msg": "drm/amdkfd: Check for null pointer after calling kmemdup" + "CVE-2018-10087": { + "cmt_msg": "kernel/exit.c: avoid undefined behaviour when calling wait4()" }, - "CVE-2019-19332": { - "cmt_msg": "KVM: x86: fix out-of-bounds write in KVM_GET_EMULATED_CPUID (CVE-2019-19332)" + "CVE-2019-9503": { + "cmt_msg": "brcmfmac: add subtype check for event handling in data path" }, - "CVE-2019-15117": { - "cmt_msg": "ALSA: usb-audio: Fix an OOB bug in parse_audio_mixer_unit" + "CVE-2020-36158": { + "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_cmd_802_11_ad_hoc_start" }, - "CVE-2021-3659": { - "cmt_msg": "net: mac802154: Fix general protection fault" + "CVE-2023-3159": { + "cmt_msg": "firewire: fix potential uaf in outbound_phy_packet_callback()" }, - "CVE-2022-25258": { - "cmt_msg": "USB: gadget: validate interface OS descriptor requests" + "CVE-2022-0480": { + "cmt_msg": "memcg: enable accounting for file lock caches" }, - "CVE-2021-4155": { - "cmt_msg": "xfs: map unwritten blocks in XFS_IOC_{ALLOC,FREE}SP just like fallocate" + "CVE-2018-10124": { + "cmt_msg": "kernel/signal.c: avoid undefined behaviour in kill_something_info" }, - "CVE-2019-14901": { - "cmt_msg": "mwifiex: Fix heap overflow in mmwifiex_process_tdls_action_frame()" + "CVE-2023-52429": { + "cmt_msg": "dm: limit the number of targets and parameter size area" }, - "CVE-2021-4150": { - "cmt_msg": "block: fix incorrect references to disk objects" + "CVE-2021-47059": { + "cmt_msg": "crypto: sun8i-ss - fix result memory leak on error path" }, - "CVE-2020-3702": { - "cmt_msg": "ath: Use safer key clearing with key cache entries" + "CVE-2021-0920": { + "cmt_msg": "af_unix: fix garbage collect vs MSG_PEEK" }, - "CVE-2021-3653": { - "cmt_msg": "KVM: nSVM: avoid picking up unsupported bits from L2 in int_ctl (CVE-2021-3653)" + "CVE-2022-23825": { + "cmt_msg": "" }, - "CVE-2021-3564": { - "cmt_msg": "Bluetooth: fix the erroneous flush_work() order" + "CVE-2021-47052": { + "cmt_msg": "crypto: sa2ul - Fix memory leak of rxd" }, - "CVE-2020-8694": { - "cmt_msg": "powercap: restrict energy meter to root access" + "CVE-2023-52629": { + "cmt_msg": "sh: push-switch: Reorder cleanup operations to avoid use-after-free bug" }, - "CVE-2021-4159": { - "cmt_msg": "bpf: Verifer, adjust_scalar_min_max_vals to always call update_reg_bounds()" + "CVE-2021-47112": { + "cmt_msg": "x86/kvm: Teardown PV features on boot CPU as well" }, - "CVE-2023-0461": { - "cmt_msg": "net/ulp: prevent ULP without clone op from entering the LISTEN status" + "CVE-2015-5157": { + "cmt_msg": "x86/nmi/64: Switch stacks on userspace NMI entry" }, - "CVE-2019-12614": { - "cmt_msg": "powerpc/pseries/dlpar: Fix a missing check in dlpar_parse_cc_property()" + "CVE-2021-47110": { + "cmt_msg": "x86/kvm: Disable kvmclock on all CPUs on shutdown" }, - "CVE-2019-12615": { - "cmt_msg": "mdesc: fix a missing-check bug in get_vdev_port_node_info()" + "CVE-2013-4254": { + "cmt_msg": "ARM: 7810/1: perf: Fix array out of bounds access in armpmu_map_hw_event()" }, - "CVE-2021-3715": { - "cmt_msg": "net_sched: cls_route: remove the right filter from hashtable" + "CVE-2021-47117": { + "cmt_msg": "ext4: fix bug on in ext4_es_cache_extent as ext4_split_extent_at failed" }, - "CVE-2021-3714": { - "cmt_msg": "" + "CVE-2021-47114": { + "cmt_msg": "ocfs2: fix data corruption by fallocate" }, - "CVE-2019-16230": { - "cmt_msg": "drm/amdkfd: fix a potential NULL pointer dereference (v2)" + "CVE-2017-5551": { + "cmt_msg": "tmpfs: clear S_ISGID when setting posix ACLs" }, - "CVE-2019-16231": { - "cmt_msg": "fjes: Handle workqueue allocation failure" + "CVE-2021-47118": { + "cmt_msg": "pid: take a reference when initializing `cad_pid`" }, - "CVE-2019-16232": { - "cmt_msg": "libertas: fix a potential NULL pointer dereference" + "CVE-2021-46970": { + "cmt_msg": "bus: mhi: pci_generic: Remove WQ_MEM_RECLAIM flag from state workqueue" }, - "CVE-2019-16233": { - "cmt_msg": "scsi: qla2xxx: fix a potential NULL pointer dereference" + "CVE-2022-1679": { + "cmt_msg": "ath9k: fix use-after-free in ath9k_hif_usb_rx_cb" }, - "CVE-2019-16234": { - "cmt_msg": "iwlwifi: pcie: fix rb_allocator workqueue allocation" + "CVE-2019-19241": { + "cmt_msg": "io_uring: async workers should inherit the user creds" }, - "CVE-2023-52445": { - "cmt_msg": "media: pvrusb2: fix use after free on context disconnection" + "CVE-2022-21123": { + "cmt_msg": "x86/speculation/mmio: Add mitigation for Processor MMIO Stale Data" }, - "CVE-2019-6133": { - "cmt_msg": "fork: record start_time late" + "CVE-2021-28688": { + "cmt_msg": "xen-blkback: don't leak persistent grants from xen_blkbk_map()" }, - "CVE-2019-3016": { - "cmt_msg": "x86/kvm: Be careful not to clear KVM_VCPU_FLUSH_TLB bit" + "CVE-2021-39686": { + "cmt_msg": "binder: use euid from cred instead of using task" }, - "CVE-2021-39633": { - "cmt_msg": "ip_gre: add validation for csum_start" + "CVE-2021-39685": { + "cmt_msg": "USB: gadget: detect too-big endpoint 0 requests" }, - "CVE-2022-27223": { - "cmt_msg": "USB: gadget: validate endpoint index for xilinx udc" + "CVE-2023-6535": { + "cmt_msg": "" }, - "CVE-2021-39634": { - "cmt_msg": "epoll: do not insert into poll queues until all sanity checks are done" + "CVE-2021-43975": { + "cmt_msg": "atlantic: Fix OOB read and write in hw_atl_utils_fw_rpc_wait" }, - "CVE-2024-23851": { - "cmt_msg": "dm: limit the number of targets and parameter size area" + "CVE-2021-43976": { + "cmt_msg": "mwifiex: Fix skb_over_panic in mwifiex_usb_recv()" }, - "CVE-2019-3882": { - "cmt_msg": "vfio/type1: Limit DMA mappings per container" + "CVE-2020-0466": { + "cmt_msg": "do_epoll_ctl(): clean the failure exits up a bit" }, - "CVE-2022-33742": { - "cmt_msg": "xen/blkfront: force data bouncing when backend is untrusted" + "CVE-2019-10207": { + "cmt_msg": "Bluetooth: hci_uart: check for missing tty operations" }, - "CVE-2022-33741": { - "cmt_msg": "xen/netfront: force data bouncing when backend is untrusted" + "CVE-2019-14835": { + "cmt_msg": "vhost: make sure log_num < in_num" }, - "CVE-2022-33740": { - "cmt_msg": "xen/netfront: fix leaking data in shared pages" + "CVE-2023-0459": { + "cmt_msg": "uaccess: Add speculation barrier to copy_from_user()" }, - "CVE-2024-24864": { - "cmt_msg": "" + "CVE-2023-0458": { + "cmt_msg": "prlimit: do_prlimit needs to have a speculation check" }, - "CVE-2019-3887": { - "cmt_msg": "KVM: x86: nVMX: close leak of L0's x2APIC MSRs (CVE-2019-3887)" + "CVE-2018-1000204": { + "cmt_msg": "scsi: sg: allocate with __GFP_ZERO in sg_build_indirect()" }, - "CVE-2022-33744": { - "cmt_msg": "xen/arm: Fix race in RB-tree based P2M accounting" + "CVE-2023-0597": { + "cmt_msg": "x86/mm: Randomize per-cpu entry area" }, - "CVE-2022-40768": { - "cmt_msg": "scsi: stex: Properly zero out the passthrough command structure" + "CVE-2019-12379": { + "cmt_msg": "consolemap: Fix a memory leaking bug in drivers/tty/vt/consolemap.c" }, - "CVE-2021-45486": { - "cmt_msg": "inet: use bigger hash table for IP ID generation" + "CVE-2019-12378": { + "cmt_msg": "ipv6_sockglue: Fix a missing-check bug in ip6_ra_control()" }, - "CVE-2020-12888": { - "cmt_msg": "vfio-pci: Invalidate mmaps and block MMIO access on disabled memory" + "CVE-2021-30002": { + "cmt_msg": "media: v4l: ioctl: Fix memory leak in video_usercopy" }, - "CVE-2023-2194": { - "cmt_msg": "i2c: xgene-slimpro: Fix out-of-bounds bug in xgene_slimpro_i2c_xfer()" + "CVE-2017-17450": { + "cmt_msg": "netfilter: xt_osf: Add missing permission checks" }, - "CVE-2021-3923": { - "cmt_msg": "RDMA/core: Don't infoleak GRH fields" + "CVE-2015-4177": { + "cmt_msg": "mnt: Fail collect_mounts when applied to unmounted mounts" }, - "CVE-2022-41218": { - "cmt_msg": "media: dvb-core: Fix UAF due to refcount races at releasing" + "CVE-2015-4176": { + "cmt_msg": "mnt: Update detach_mounts to leave mounts connected" }, - "CVE-2011-4917": { + "CVE-2020-15802": { "cmt_msg": "" }, - "CVE-2022-36946": { - "cmt_msg": "netfilter: nf_queue: do not allow packet truncation below transport header offset" - }, - "CVE-2022-0812": { - "cmt_msg": "xprtrdma: fix incorrect header size calculations" + "CVE-2024-26594": { + "cmt_msg": "ksmbd: validate mech token in session setup" }, - "CVE-2021-45485": { - "cmt_msg": "ipv6: use prandom_u32() for ID generation" + "CVE-2023-4623": { + "cmt_msg": "net/sched: sch_hfsc: Ensure inner classes have fsc curve" }, - "CVE-2021-0448": { - "cmt_msg": "netfilter: ctnetlink: add a range check for l3/l4 protonum" + "CVE-2019-3460": { + "cmt_msg": "Bluetooth: Check L2CAP option sizes returned from l2cap_get_conf_opt" }, - "CVE-2018-19824": { - "cmt_msg": "ALSA: usb-audio: Fix UAF decrement if card has no live interfaces in card.c" + "CVE-2022-3636": { + "cmt_msg": "net: ethernet: mtk_eth_soc: use after free in __mtk_ppe_check_skb()" }, - "CVE-2022-21166": { - "cmt_msg": "x86/speculation/mmio: Enable CPU Fill buffer clearing on idle" + "CVE-2022-3635": { + "cmt_msg": "atm: idt77252: fix use-after-free bugs caused by tst_timer" }, - "CVE-2020-29374": { - "cmt_msg": "gup: document and work around \"COW can break either way\" issue" + "CVE-2023-5178": { + "cmt_msg": "nvmet-tcp: Fix a possible UAF in queue intialization setup" }, - "CVE-2019-25045": { - "cmt_msg": "xfrm: clean up xfrm protocol checks" + "CVE-2015-4178": { + "cmt_msg": "fs_pin: Allow for the possibility that m_list or s_list go unused." }, - "CVE-2018-16862": { - "cmt_msg": "mm: cleancache: fix corruption on missed inode invalidation" + "CVE-2022-3202": { + "cmt_msg": "jfs: prevent NULL deref in diFree" }, - "CVE-2023-52449": { - "cmt_msg": "mtd: Fix gluebi NULL pointer dereference caused by ftl notifier" + "CVE-2021-47028": { + "cmt_msg": "mt76: mt7915: fix txrate reporting" }, - "CVE-2021-29650": { - "cmt_msg": "netfilter: x_tables: Use correct memory barriers." + "CVE-2018-3646": { + "cmt_msg": "x86/microcode: Allow late microcode loading with SMT disabled" }, - "CVE-2019-17133": { - "cmt_msg": "cfg80211: wext: avoid copying malformed SSIDs" + "CVE-2017-7518": { + "cmt_msg": "KVM: x86: fix singlestepping over syscall" }, - "CVE-2018-20169": { - "cmt_msg": "USB: check usb_get_extra_descriptor for proper size" + "CVE-2024-24861": { + "cmt_msg": "media: xc4000: Fix atomicity violation in xc4000_get_frequency" }, - "CVE-2019-8956": { - "cmt_msg": "sctp: walk the list of asoc safely" + "CVE-2019-11477": { + "cmt_msg": "tcp: limit payload size of sacked skbs" }, - "CVE-2020-36558": { - "cmt_msg": "vt: vt_ioctl: fix race in VT_RESIZEX" + "CVE-2023-39189": { + "cmt_msg": "netfilter: nfnetlink_osf: avoid OOB read" }, - "CVE-2022-41849": { - "cmt_msg": "fbdev: smscufx: Fix use-after-free in ufx_ops_open()" + "CVE-2021-46908": { + "cmt_msg": "bpf: Use correct permission flag for mixed signed bounds arithmetic" }, - "CVE-2022-41848": { - "cmt_msg": "" + "CVE-2021-46906": { + "cmt_msg": "HID: usbhid: fix info leak in hid_submit_ctrl" }, - "CVE-2020-36312": { - "cmt_msg": "KVM: fix memory leak in kvm_io_bus_unregister_dev()" + "CVE-2018-14614": { + "cmt_msg": "f2fs: fix to do sanity check with cp_pack_start_sum" }, - "CVE-2022-1353": { - "cmt_msg": "af_key: add __GFP_ZERO flag for compose_sadb_supported in function pfkey_register" + "CVE-2019-11479": { + "cmt_msg": "tcp: add tcp_min_snd_mss sysctl" }, - "CVE-2022-28356": { - "cmt_msg": "llc: fix netdevice reference leaks in llc_ui_bind()" + "CVE-2019-11478": { + "cmt_msg": "tcp: tcp_fragment() should apply sane memory limits" }, - "CVE-2020-16119": { - "cmt_msg": "dccp: don't duplicate ccid when cloning dccp sock" + "CVE-2018-14611": { + "cmt_msg": "btrfs: validate type when reading a chunk" }, - "CVE-2022-1198": { - "cmt_msg": "drivers: hamradio: 6pack: fix UAF bug caused by mod_timer()" + "CVE-2018-14610": { + "cmt_msg": "btrfs: Check that each block group has corresponding chunk at mount time" }, - "CVE-2022-1199": { - "cmt_msg": "ax25: Fix NULL pointer dereference in ax25_kill_by_device" + "CVE-2018-14613": { + "cmt_msg": "btrfs: tree-checker: Verify block_group_item" }, - "CVE-2023-6546": { - "cmt_msg": "tty: n_gsm: fix the UAF caused by race condition in gsm_cleanup_mux" + "CVE-2018-14612": { + "cmt_msg": "btrfs: tree-checker: Detect invalid and empty essential trees" }, - "CVE-2021-39801": { - "cmt_msg": "" + "CVE-2020-26145": { + "cmt_msg": "ath10k: drop fragments with multicast DA for PCIe" }, - "CVE-2021-39800": { - "cmt_msg": "" + "CVE-2020-26147": { + "cmt_msg": "mac80211: assure all fragments are encrypted" }, - "CVE-2018-16884": { - "cmt_msg": "sunrpc: use-after-free in svc_process_common()" + "CVE-2018-5814": { + "cmt_msg": "usbip: usbip_host: fix NULL-ptr deref and use-after-free errors" }, - "CVE-2018-16882": { - "cmt_msg": "KVM: Fix UAF in nested posted interrupt processing" + "CVE-2020-26140": { + "cmt_msg": "" }, - "CVE-2022-1195": { - "cmt_msg": "hamradio: improve the incomplete fix to avoid NPD" + "CVE-2020-26143": { + "cmt_msg": "" }, - "CVE-2018-16880": { - "cmt_msg": "vhost: fix OOB in get_rx_bufs()" + "CVE-2020-26142": { + "cmt_msg": "" }, - "CVE-2021-4202": { - "cmt_msg": "NFC: reorganize the functions in nci_request" + "CVE-2019-17053": { + "cmt_msg": "ieee802154: enforce CAP_NET_RAW for raw sockets" }, - "CVE-2021-4203": { - "cmt_msg": "af_unix: fix races in sk_peer_pid and sk_peer_cred accesses" + "CVE-2019-17052": { + "cmt_msg": "ax25: enforce CAP_NET_RAW for raw sockets" }, - "CVE-2022-4269": { - "cmt_msg": "act_mirred: use the backlog for nested calls to mirred ingress" + "CVE-2016-3070": { + "cmt_msg": "mm: migrate dirty page without clear_page_dirty_for_io etc" }, - "CVE-2022-45886": { - "cmt_msg": "media: dvb-core: Fix use-after-free due on race condition at dvb_net" + "CVE-2023-1077": { + "cmt_msg": "sched/rt: pick_next_rt_entity(): check list_entry" }, - "CVE-2023-46343": { - "cmt_msg": "nfc: nci: fix possible NULL pointer dereference in send_acknowledge()" + "CVE-2020-27418": { + "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region" }, - "CVE-2024-25744": { - "cmt_msg": "x86/coco: Disable 32-bit emulation by default on TDX and SEV" + "CVE-2023-51780": { + "cmt_msg": "atm: Fix Use-After-Free in do_vcc_ioctl" }, - "CVE-2023-5178": { - "cmt_msg": "nvmet-tcp: Fix a possible UAF in queue intialization setup" + "CVE-2019-17055": { + "cmt_msg": "mISDN: enforce CAP_NET_RAW for raw sockets" }, - "CVE-2023-2124": { - "cmt_msg": "xfs: verify buffer contents when we skip log replay" + "CVE-2019-17054": { + "cmt_msg": "appletalk: enforce CAP_NET_RAW for raw sockets" }, - "CVE-2024-26594": { - "cmt_msg": "ksmbd: validate mech token in session setup" + "CVE-2018-13093": { + "cmt_msg": "xfs: validate cached inodes are free when allocated" }, - "CVE-2023-1281": { - "cmt_msg": "net/sched: tcindex: update imperfect hash filters respecting rcu" + "CVE-2024-26745": { + "cmt_msg": "powerpc/pseries/iommu: IOMMU table is not initialized for kdump over SR-IOV" }, - "CVE-2023-2860": { - "cmt_msg": "ipv6: sr: fix out-of-bounds read when setting HMAC data." + "CVE-2023-51781": { + "cmt_msg": "appletalk: Fix Use-After-Free in atalk_ioctl" }, - "CVE-2021-44879": { - "cmt_msg": "f2fs: fix to do sanity check on inode type during garbage collection" + "CVE-2024-26743": { + "cmt_msg": "RDMA/qedr: Fix qedr_create_user_qp error flow" }, - "CVE-2019-15505": { - "cmt_msg": "media: technisat-usb2: break out of loop at end of buffer" + "CVE-2023-3108": { + "cmt_msg": "crypto: fix af_alg_make_sg() conversion to iov_iter" }, - "CVE-2019-15504": { - "cmt_msg": "rsi: fix a double free bug in rsi_91x_deinit()" + "CVE-2018-13094": { + "cmt_msg": "xfs: don't call xfs_da_shrink_inode with NULL bp" }, - "CVE-2023-2513": { - "cmt_msg": "ext4: fix use-after-free in ext4_xattr_set_entry" + "CVE-2018-13095": { + "cmt_msg": "xfs: More robust inode extent count validation" }, - "CVE-2023-1855": { - "cmt_msg": "hwmon: (xgene) Fix use after free bug in xgene_hwmon_remove due to race condition" + "CVE-2020-29661": { + "cmt_msg": "tty: Fix ->pgrp locking in tiocspgrp()" }, - "CVE-2022-27672": { - "cmt_msg": "x86/speculation: Identify processors vulnerable to SMT RSB predictions" + "CVE-2020-29660": { + "cmt_msg": "tty: Fix ->session locking" }, - "CVE-2022-2964": { - "cmt_msg": "net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup" + "CVE-2019-2025": { + "cmt_msg": "binder: fix race that allows malicious free of live buffer" }, - "CVE-2015-2877": { - "cmt_msg": "" + "CVE-2024-26748": { + "cmt_msg": "usb: cdns3: fix memory double free when handle zero packet" }, - "CVE-2020-9383": { - "cmt_msg": "floppy: check FDC index for errors before assigning it" + "CVE-2014-9717": { + "cmt_msg": "mnt: Update detach_mounts to leave mounts connected" }, - "CVE-2019-16089": { - "cmt_msg": "" + "CVE-2023-28772": { + "cmt_msg": "seq_buf: Fix overflow in seq_buf_putmem_hex()" }, - "CVE-2023-1206": { - "cmt_msg": "tcp: Reduce chance of collisions in inet6_hashfn()." + "CVE-2022-2588": { + "cmt_msg": "net_sched: cls_route: remove from list when handle is 0" }, - "CVE-2021-38198": { - "cmt_msg": "KVM: X86: MMU: Use the correct inherited permissions to get shadow page" + "CVE-2019-11884": { + "cmt_msg": "Bluetooth: hidp: fix buffer overflow" }, - "CVE-2021-38199": { - "cmt_msg": "NFSv4: Initialise connection to the server in nfs4_alloc_client()" + "CVE-2014-9710": { + "cmt_msg": "Btrfs: make xattr replace operations atomic" }, - "CVE-2022-1679": { - "cmt_msg": "ath9k: fix use-after-free in ath9k_hif_usb_rx_cb" + "CVE-2015-8955": { + "cmt_msg": "arm64: perf: reject groups spanning multiple HW PMUs" }, - "CVE-2022-1678": { - "cmt_msg": "tcp: optimize tcp internal pacing" + "CVE-2019-19074": { + "cmt_msg": "ath9k: release allocated buffer if timed out" }, - "CVE-2023-1513": { - "cmt_msg": "kvm: initialize all of the kvm_debugregs structure before sending it to userspace" + "CVE-2019-19073": { + "cmt_msg": "ath9k_htc: release allocated buffer if timed out" }, - "CVE-2021-26401": { - "cmt_msg": "x86/speculation: Use generic retpoline by default on AMD" + "CVE-2015-9016": { + "cmt_msg": "blk-mq: fix race between timeout and freeing request" }, - "CVE-2020-28941": { - "cmt_msg": "speakup: Do not let the line discipline be used several times" + "CVE-2015-8952": { + "cmt_msg": "ext2: convert to mbcache2" }, - "CVE-2019-9445": { - "cmt_msg": "f2fs: check if file namelen exceeds max value" + "CVE-2024-26699": { + "cmt_msg": "drm/amd/display: Fix array-index-out-of-bounds in dcn35_clkmgr" }, - "CVE-2023-52442": { - "cmt_msg": "ksmbd: validate session id and tree id in compound request" + "CVE-2022-23038": { + "cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()" }, - "CVE-2021-3600": { - "cmt_msg": "bpf: Fix 32 bit src register truncation on div/mod" + "CVE-2022-23039": { + "cmt_msg": "xen/gntalloc: don't use gnttab_query_foreign_access()" }, - "CVE-2020-36557": { - "cmt_msg": "vt: vt_ioctl: fix VT_DISALLOCATE freeing in-use virtual console" + "CVE-2024-26691": { + "cmt_msg": "KVM: arm64: Fix circular locking dependency" }, - "CVE-2021-3506": { - "cmt_msg": "f2fs: fix to avoid out-of-bounds memory access" + "CVE-2021-27363": { + "cmt_msg": "scsi: iscsi: Restrict sessions and handles to admin capabilities" }, - "CVE-2019-20934": { - "cmt_msg": "sched/fair: Don't free p->numa_faults with concurrent readers" + "CVE-2022-20158": { + "cmt_msg": "net/packet: fix slab-out-of-bounds access in packet_recvmsg()" }, - "CVE-2011-4916": { - "cmt_msg": "" + "CVE-2022-23037": { + "cmt_msg": "xen/netfront: don't use gnttab_query_foreign_access() for mapped status" }, - "CVE-2019-19532": { - "cmt_msg": "HID: Fix assumption that devices have inputs" + "CVE-2024-26697": { + "cmt_msg": "nilfs2: fix data corruption in dsync block recovery for small block sizes" }, - "CVE-2019-3900": { - "cmt_msg": "vhost_net: fix possible infinite loop" + "CVE-2020-0404": { + "cmt_msg": "media: uvcvideo: Avoid cyclic entity chains due to malformed USB descriptors" }, - "CVE-2021-23133": { - "cmt_msg": "net/sctp: fix race condition in sctp_destroy_sock" + "CVE-2019-15927": { + "cmt_msg": "ALSA: usb-audio: Avoid access before bLength check in build_audio_procunit()" }, - "CVE-2023-23039": { - "cmt_msg": "" + "CVE-2019-15926": { + "cmt_msg": "ath6kl: add some bounds checking" }, - "CVE-2019-15807": { - "cmt_msg": "scsi: libsas: delete sas port if expander discover failed" + "CVE-2019-14821": { + "cmt_msg": "KVM: coalesced_mmio: add bounds checking" }, - "CVE-2019-10638": { - "cmt_msg": "inet: switch IP ID generator to siphash" + "CVE-2020-12826": { + "cmt_msg": "signal: Extend exec_id to 64bits" }, - "CVE-2023-31083": { - "cmt_msg": "Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO" + "CVE-2019-3701": { + "cmt_msg": "can: gw: ensure DLC boundaries after CAN frame modification" }, - "CVE-2019-5489": { - "cmt_msg": "Change mincore() to count \"mapped\" pages rather than \"cached\" pages" + "CVE-2021-42008": { + "cmt_msg": "net: 6pack: fix slab-out-of-bounds in decode_data" }, - "CVE-2024-1312": { - "cmt_msg": "mm: lock_vma_under_rcu() must check vma->anon_vma under vma lock" + "CVE-2022-44033": { + "cmt_msg": "char: pcmcia: remove all the drivers" }, - "CVE-2019-14284": { - "cmt_msg": "floppy: fix div-by-zero in setup_format_params" + "CVE-2024-26789": { + "cmt_msg": "crypto: arm64/neonbs - fix out-of-bounds access on short input" }, - "CVE-2019-14283": { - "cmt_msg": "floppy: fix out-of-bounds read in copy_buffer" + "CVE-2022-39188": { + "cmt_msg": "mmu_gather: Force tlb-flush VM_PFNMAP vmas" }, - "CVE-2023-3338": { - "cmt_msg": "Remove DECnet support from kernel" + "CVE-2018-20511": { + "cmt_msg": "net/appletalk: fix minor pointer leak to userspace in SIOCFINDIPDDPRT" }, - "CVE-2023-1637": { - "cmt_msg": "x86/speculation: Restore speculation related MSRs during S3 resume" - } - } - }, - "3.12": { - "3.12": { - "CVE-2013-6383": { - "cmt_msg": "aacraid: missing capable() check in compat ioctl", - "cmt_id": "f856567b930dfcdbc3323261bf77240ccdde01f5" + "CVE-2019-1125": { + "cmt_msg": "x86/speculation: Prepare entry code for Spectre v1 swapgs mitigations" }, - "CVE-2013-4513": { - "cmt_msg": "staging: ozwpan: prevent overflow in oz_cdev_write()", - "cmt_id": "c2c65cd2e14ada6de44cb527e7f1990bede24e15" + "CVE-2020-24588": { + "cmt_msg": "cfg80211: mitigate A-MSDU aggregation attacks" }, - "CVE-2013-4512": { - "cmt_msg": "uml: check length in exitcode_proc_write()", - "cmt_id": "201f99f170df14ba52ea4c52847779042b7a623b" + "CVE-2020-25643": { + "cmt_msg": "hdlc_ppp: add range checks in ppp_cp_parse_cr()" }, - "CVE-2013-4511": { - "cmt_msg": "uml: check length in exitcode_proc_write()", - "cmt_id": "201f99f170df14ba52ea4c52847779042b7a623b" + "CVE-2005-3660": { + "cmt_msg": "" }, - "CVE-2013-4516": { - "cmt_msg": "Staging: sb105x: info leak in mp_get_count()", - "cmt_id": "a8b33654b1e3b0c74d4a1fed041c9aae50b3c427" + "CVE-2019-15212": { + "cmt_msg": "USB: rio500: refuse more than one device at a time" }, - "CVE-2013-4515": { - "cmt_msg": "Staging: bcm: info leak in ioctl", - "cmt_id": "8d1e72250c847fa96498ec029891de4dc638a5ba" + "CVE-2023-31085": { + "cmt_msg": "ubi: Refuse attaching if mtd's erasesize is 0" }, - "CVE-2013-4514": { - "cmt_msg": "staging: wlags49_h2: buffer overflow setting station name", - "cmt_id": "b5e2f339865fb443107e5b10603e53bbc92dc054" - } - }, - "3.12.1": { - "CVE-2013-4348": { - "cmt_msg": "net: flow_dissector: fail on evil iph->ihl", - "cmt_id": "cec64fecff2eff7dd701b883ed3f5f6faf1aab92" - } - }, - "3.12.2": { - "CVE-2013-4345": { - "cmt_msg": "crypto: ansi_cprng - Fix off by one error in non-block size request", - "cmt_id": "8ea7fffd97835f4e3ffd5f757df152a79835f65f" + "CVE-2023-31084": { + "cmt_msg": "media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*()" }, - "CVE-2013-7026": { - "cmt_msg": "ipc,shm: fix shm_file deletion races", - "cmt_id": "dd272212175ad47ee84cf38e9d5f99502df2d930" + "CVE-2019-15217": { + "cmt_msg": "media: usb:zr364xx:Fix KASAN:null-ptr-deref Read in zr364xx_vidioc_querycap" }, - "CVE-2013-6378": { - "cmt_msg": "libertas: potential oops in debugfs", - "cmt_id": "0f6ff65ed8d3630118c3149a4fbc493dd3b8fdc4" + "CVE-2019-15216": { + "cmt_msg": "USB: yurex: Fix protection fault after device removal" }, - "CVE-2013-6380": { - "cmt_msg": "aacraid: prevent invalid pointer dereference", - "cmt_id": "12cc2209deeda65c963c84a5e6aaf0c39aca8e6d" + "CVE-2023-31081": { + "cmt_msg": "" }, - "CVE-2013-2930": { - "cmt_msg": "perf/ftrace: Fix paranoid level for enabling function tracer", - "cmt_id": "539ddb09c46389cc22d35543e40ccde2c2e20244" + "CVE-2019-15214": { + "cmt_msg": "ALSA: core: Fix card races between register and disconnect" }, - "CVE-2013-2929": { - "cmt_msg": "exec/ptrace: fix get_dumpable() incorrect tests", - "cmt_id": "9d4dd888b4b5799ecadfb0d8c9adda7a76779806" - } - }, - "3.12.3": { - "CVE-2013-6381": { - "cmt_msg": "qeth: avoid buffer overflow in snmp ioctl", - "cmt_id": "8abbf7ceaece5ea0dd23f2b6d2b135186da7a96b" - } - }, - "3.12.4": { - "CVE-2013-7281": { - "cmt_msg": "inet: prevent leakage of uninitialized memory to user in recv syscalls", - "cmt_id": "7a9b8e64a5706d62d5a5ab54fe3d0320845b1d4a" + "CVE-2023-52574": { + "cmt_msg": "team: fix null-ptr-deref when team device type is changed" }, - "CVE-2013-7348": { - "cmt_msg": "aio: prevent double free in ioctx_alloc", - "cmt_id": "f50db974cb75e31d98b176c3c9ea92e57aa97a1b" + "CVE-2021-33034": { + "cmt_msg": "Bluetooth: verify AMP hci_chan before amp_destroy" }, - "CVE-2013-4563": { - "cmt_msg": "ipv6: fix headroom calculation in udp6_ufo_fragment", - "cmt_id": "d68268e60d0ec51e6c269f8dc34bb9fcfee970a7" + "CVE-2019-19922": { + "cmt_msg": "sched/fair: Fix low cpu usage with high throttling by removing expiration of cpu-local slices" }, - "CVE-2013-7264": { - "cmt_msg": "inet: prevent leakage of uninitialized memory to user in recv syscalls", - "cmt_id": "7a9b8e64a5706d62d5a5ab54fe3d0320845b1d4a" + "CVE-2019-19927": { + "cmt_msg": "drm/ttm: fix incrementing the page pointer for huge pages" }, - "CVE-2013-7265": { - "cmt_msg": "inet: prevent leakage of uninitialized memory to user in recv syscalls", - "cmt_id": "7a9b8e64a5706d62d5a5ab54fe3d0320845b1d4a" + "CVE-2017-18509": { + "cmt_msg": "ipv6: check sk sk_type and protocol early in ip_mroute_set/getsockopt" }, - "CVE-2013-7266": { - "cmt_msg": "net: rework recvmsg handler msg_name and msg_namelen logic", - "cmt_id": "0cefe287488ca07c0d7962a7b4d3fbb829d09917" + "CVE-2020-27068": { + "cmt_msg": "cfg80211: add missing policy for NL80211_ATTR_STATUS_CODE" }, - "CVE-2013-7267": { - "cmt_msg": "net: rework recvmsg handler msg_name and msg_namelen logic", - "cmt_id": "0cefe287488ca07c0d7962a7b4d3fbb829d09917" + "CVE-2020-8648": { + "cmt_msg": "vt: selection, close sel_buffer race" }, - "CVE-2013-7263": { - "cmt_msg": "inet: prevent leakage of uninitialized memory to user in recv syscalls", - "cmt_id": "7a9b8e64a5706d62d5a5ab54fe3d0320845b1d4a" + "CVE-2022-32296": { + "cmt_msg": "tcp: increase source port perturb table to 2^16" }, - "CVE-2013-7271": { - "cmt_msg": "net: rework recvmsg handler msg_name and msg_namelen logic", - "cmt_id": "0cefe287488ca07c0d7962a7b4d3fbb829d09917" + "CVE-2020-28974": { + "cmt_msg": "vt: Disable KD_FONT_OP_COPY" }, - "CVE-2013-7270": { - "cmt_msg": "net: rework recvmsg handler msg_name and msg_namelen logic", - "cmt_id": "0cefe287488ca07c0d7962a7b4d3fbb829d09917" + "CVE-2023-3567": { + "cmt_msg": "vc_screen: move load of struct vc_data pointer in vcs_read() to avoid UAF" }, - "CVE-2013-6432": { - "cmt_msg": "ping: prevent NULL pointer dereference on write to msg_name", - "cmt_id": "086663e065ba2383382d6bb7d8a3d9bc9cba7cdf" + "CVE-2019-20806": { + "cmt_msg": "media: tw5864: Fix possible NULL pointer dereference in tw5864_handle_frame" }, - "CVE-2013-7269": { - "cmt_msg": "net: rework recvmsg handler msg_name and msg_namelen logic", - "cmt_id": "0cefe287488ca07c0d7962a7b4d3fbb829d09917" + "CVE-2022-3028": { + "cmt_msg": "af_key: Do not call xfrm_probe_algs in parallel" }, - "CVE-2013-7268": { - "cmt_msg": "net: rework recvmsg handler msg_name and msg_namelen logic", - "cmt_id": "0cefe287488ca07c0d7962a7b4d3fbb829d09917" - } - }, - "3.12.6": { - "CVE-2013-6368": { - "cmt_msg": "KVM: x86: Convert vapic synchronization to _cached functions (CVE-2013-6368)", - "cmt_id": "c0149f684726ef4a5e91b8ba1d408a64dfb40385" + "CVE-2017-16648": { + "cmt_msg": "dvb_frontend: don't use-after-free the frontend struct" }, - "CVE-2013-4587": { - "cmt_msg": "KVM: Improve create VCPU parameter (CVE-2013-4587)", - "cmt_id": "41fe7fa8fdeaa5a2a9f3ecaa9a47e2d2afa1b2b1" + "CVE-2020-14304": { + "cmt_msg": "" }, - "CVE-2013-6367": { - "cmt_msg": "KVM: x86: Fix potential divide by 0 in lapic (CVE-2013-6367)", - "cmt_id": "10958718b005e046244d2b4a1f1bb9a3ab6e3d29" + "CVE-2010-5321": { + "cmt_msg": "" }, - "CVE-2013-6382": { - "cmt_msg": "xfs: underflow bug in xfs_attrlist_by_handle()", - "cmt_id": "f5e6d588f847fba87394926284cc4a7a3b79c6bf" + "CVE-2020-15393": { + "cmt_msg": "usb: usbtest: fix missing kfree(dev->buf) in usbtest_disconnect" }, - "CVE-2013-6376": { - "cmt_msg": "KVM: x86: fix guest-initiated crash with x2apic (CVE-2013-6376)", - "cmt_id": "48849efc2e3c58d170e32d081f83f6c070dfd0a3" - } - }, - "3.12.7": { - "CVE-2013-4579": { - "cmt_msg": "ath9k_htc: properly set MAC address and BSSID mask", - "cmt_id": "d10d0a2337097fa907f22af6ad0ae0dc0ff39fbf" + "CVE-2014-8989": { + "cmt_msg": "userns: Don't allow setgroups until a gid mapping has been setablished" }, - "CVE-2015-4170": { - "cmt_msg": "tty: Fix hang at ldsem_down_read()", - "cmt_id": "ab69be3e59d79c56bfe16930f0c761daf4837e48" - } - }, - "3.12.8": { - "CVE-2012-2372": { - "cmt_msg": "rds: prevent BUG_ON triggered on congestion update to loopback", - "cmt_id": "0a743164c25fc0c5c4ba0f581ab9d4e5dd9772f8" + "CVE-2021-3564": { + "cmt_msg": "Bluetooth: fix the erroneous flush_work() order" }, - "CVE-2014-1446": { - "cmt_msg": "hamradio/yam: fix info leak in ioctl", - "cmt_id": "e7834c71c2cacc621ddc64bd71f83ef2054f6539" + "CVE-2019-9506": { + "cmt_msg": "Bluetooth: Fix faulty expression for minimum encryption key size check" }, - "CVE-2014-1690": { - "cmt_msg": "netfilter: nf_nat: fix access to uninitialized buffer in IRC NAT helper", - "cmt_id": "6aeebffeb297e84f5b73bb87deacd9571a84da16" + "CVE-2017-16995": { + "cmt_msg": "bpf: fix incorrect sign extension in check_alu_op()" }, - "CVE-2014-1438": { - "cmt_msg": "x86, fpu, amd: Clear exceptions in AMD FXSAVE workaround", - "cmt_id": "807a0c12941850ddaff2ed62ba26a748e542c599" + "CVE-2019-18675": { + "cmt_msg": "mmap: introduce sane default mmap limits" }, - "CVE-2013-7339": { - "cmt_msg": "rds: prevent dereference of a NULL device", - "cmt_id": "aca33677723eb132dd91a30c4f8ac15f01be27c8" - } - }, - "3.12.10": { - "CVE-2014-0038": { - "cmt_msg": "x86, x32: Correct invalid use of user timespec in the kernel", - "cmt_id": "c1769bfb6aa93250f83d6d9d3ac85d15f990849f" + "CVE-2024-26625": { + "cmt_msg": "llc: call sock_orphan() at release time" }, - "CVE-2013-6885": { - "cmt_msg": "x86, cpu, amd: Add workaround for family 16h, erratum 793", - "cmt_id": "c5e16510e3454393fa8e40591bff28c190be2faa" - } - }, - "3.12.11": { - "CVE-2014-2038": { - "cmt_msg": "nfs: always make sure page is up-to-date before extending a write to cover the entire page", - "cmt_id": "4a3cbb28c3bbb4cb24ea59a91c2607d806818b73" - } - }, - "3.12.13": { - "CVE-2014-8709": { - "cmt_msg": "mac80211: fix fragmentation code, particularly for encryption", - "cmt_id": "5258fec859e55f79a80a00b3ca05181a488de766" + "CVE-2020-26560": { + "cmt_msg": "" }, - "CVE-2014-2039": { - "cmt_msg": "s390: fix kernel crash due to linkage stack instructions", - "cmt_id": "9ee59d9a5b03f45d9b421b020947846d13f27d08" - } - }, - "3.12.14": { - "CVE-2014-0049": { - "cmt_msg": "kvm: x86: fix emulator buffer overflow (CVE-2014-0049)", - "cmt_id": "ee593d3a91514d37f19251daa9d57edfb27e45e7" + "CVE-2024-26622": { + "cmt_msg": "tomoyo: fix UAF write bug in tomoyo_write_control()" }, - "CVE-2014-0069": { - "cmt_msg": "cifs: ensure that uncached writes handle unmapped areas correctly", - "cmt_id": "90d369693d48ec7ffa4ca039e6fd14e861486251" - } - }, - "3.12.15": { - "CVE-2014-0101": { - "cmt_msg": "net: sctp: fix sctp_sf_do_5_1D_ce to verify if we/peer is AUTH capable", - "cmt_id": "00c53b02cb01976b35d37670a4b5c5d7a6ad3c62" + "CVE-2024-22386": { + "cmt_msg": "" }, - "CVE-2014-7207": { - "cmt_msg": "ipv6: reuse ip6_frag_id from ip6_ufo_append_data", - "cmt_id": "3bbb02a1ba7a2ad0dbbd979ed715c9229b12e36a" + "CVE-2023-42752": { + "cmt_msg": "igmp: limit igmpv3_newpack() packet size to IP_MAX_MTU" }, - "CVE-2014-2673": { - "cmt_msg": "powerpc/tm: Fix crash when forking inside a transaction", - "cmt_id": "2725f34b41f8e3f444688a814cc2763a1c2b138b" + "CVE-2018-12127": { + "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" }, - "CVE-2014-2672": { - "cmt_msg": "ath9k: protect tid->sched check", - "cmt_id": "46e70384f21825caab1a55f64e9fe6d3d16c28cc" + "CVE-2018-12126": { + "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" }, - "CVE-2014-2706": { - "cmt_msg": "mac80211: fix AP powersave TX vs. wakeup race", - "cmt_id": "58d4310586466840dab77e56e53f4508853a5268" - } - }, - "3.12.17": { - "CVE-2014-2523": { - "cmt_msg": "netfilter: nf_conntrack_dccp: fix skb_header_pointer API usages", - "cmt_id": "f9c8e356e5c574cfa6ace53bb9956b4469fe606a" - } - }, - "3.12.18": { - "CVE-2014-2309": { - "cmt_msg": "ipv6: don't set DST_NOCOUNT for remotely added routes", - "cmt_id": "50fb0fafd1546f2dc6bf931f3a44f63704ce78ac" + "CVE-2024-26651": { + "cmt_msg": "sr9800: Add check for usbnet_get_endpoints" }, - "CVE-2014-0100": { - "cmt_msg": "net: fix for a race condition in the inet frag code", - "cmt_id": "e8443124a1ba9ceee59fb611c534957278f7d44e" + "CVE-2022-1048": { + "cmt_msg": "ALSA: pcm: Fix races among concurrent hw_params and hw_free calls" }, - "CVE-2014-2580": { - "cmt_msg": "xen-netback: disable rogue vif in kthread context", - "cmt_id": "699dfec4e90e73bac6455560187c34f77115bc2f" + "CVE-2023-37454": { + "cmt_msg": "" }, - "CVE-2014-2678": { - "cmt_msg": "rds: prevent dereference of a NULL device in rds_iw_laddr_check", - "cmt_id": "64005923ffdefe53e87138ec472c88877196d405" + "CVE-2023-35824": { + "cmt_msg": "media: dm1105: Fix use after free bug in dm1105_remove due to race condition" }, - "CVE-2014-0077": { - "cmt_msg": "vhost: fix total length when packets are too short", - "cmt_id": "c66635949a08858e6d588b8a32489bca7972cf87" + "CVE-2018-10021": { + "cmt_msg": "scsi: libsas: defer ata device eh commands to libata" }, - "CVE-2014-0055": { - "cmt_msg": "vhost: validate vhost_get_vq_desc return value", - "cmt_id": "a2a366ebac39dbb437b893b8705d4b6ce04e062e" - } - }, - "3.12.19": { - "CVE-2014-7283": { - "cmt_msg": "xfs: fix directory hash ordering bug", - "cmt_id": "fd4037cadecf7b5c0e288c19d958917ac1c62a83" + "CVE-2023-52489": { + "cmt_msg": "mm/sparsemem: fix race in accessing memory_section->usage" }, - "CVE-2014-0155": { - "cmt_msg": "KVM: ioapic: fix assignment of ioapic->rtc_status.pending_eoi (CVE-2014-0155)", - "cmt_id": "95846d96fc3739c515e6c20b0fcea97ab290f09c" + "CVE-2019-10126": { + "cmt_msg": "mwifiex: Fix heap overflow in mwifiex_uap_parse_tail_ies()" }, - "CVE-2014-2851": { - "cmt_msg": "net: ipv4: current group_info should be put after using.", - "cmt_id": "95c3a5624ae783081cc9d9b0e3d24ea19b36590e" - } - }, - "3.12.20": { - "CVE-2014-3122": { - "cmt_msg": "mm: try_to_unmap_cluster() should lock_page() before mlocking", - "cmt_id": "400fc13141fe947c38e8485ee9d37066d4533363" + "CVE-2019-13631": { + "cmt_msg": "Input: gtco - bounds check collection indent level" }, - "CVE-2014-1738": { - "cmt_msg": "floppy: don't write kernel-only members to FDRAWCMD ioctl output", - "cmt_id": "3d43edf5868f260dbfd1353bf243a78f030a08b0" + "CVE-2023-52584": { + "cmt_msg": "spmi: mediatek: Fix UAF on device remove" }, - "CVE-2014-0196": { - "cmt_msg": "n_tty: Fix n_tty_write crash when echoing in raw mode", - "cmt_id": "61461fa9182895c6396ee9704d80fe8ff9d1135d" + "CVE-2020-13974": { + "cmt_msg": "vt: keyboard: avoid signed integer overflow in k_ascii" }, - "CVE-2014-1737": { - "cmt_msg": "floppy: ignore kernel-only members in FDRAWCMD ioctl input", - "cmt_id": "36cdf95db237630373162e20142df4d11efdd543" - } - }, - "3.12.21": { - "CVE-2014-3144": { - "cmt_msg": "filter: prevent nla extensions to peek beyond the end of the message", - "cmt_id": "dd6e370c0083e0382782893708b5241490ea6832" + "CVE-2016-6213": { + "cmt_msg": "mnt: Add a per mount namespace limit on the number of mounts" }, - "CVE-2014-3145": { - "cmt_msg": "filter: prevent nla extensions to peek beyond the end of the message", - "cmt_id": "dd6e370c0083e0382782893708b5241490ea6832" + "CVE-2021-4083": { + "cmt_msg": "fget: check that the fd still exists after getting a ref to it" }, - "CVE-2014-9715": { - "cmt_msg": "netfilter: nf_conntrack: reserve two bytes for nf_ct_ext->len", - "cmt_id": "62c97a8612f753ffa6c5c7bebe140cc0951e539f" - } - }, - "3.12.22": { - "CVE-2014-1739": { - "cmt_msg": "media-device: fix infoleak in ioctl media_enum_entities()", - "cmt_id": "2f1831612c94ee7b1819c4a6d21b9d5efac5297c" + "CVE-2023-33288": { + "cmt_msg": "power: supply: bq24190: Fix use after free bug in bq24190_remove due to race condition" }, - "CVE-2014-3153": { - "cmt_msg": "futex: Make lookup_pi_state more robust", - "cmt_id": "888f1a0f8c36e6982040ec06447a1dcc15686562" - } - }, - "3.12.23": { - "CVE-2014-4157": { - "cmt_msg": "MIPS: asm: thread_info: Add _TIF_SECCOMP flag", - "cmt_id": "649066ce296368e2733ce1d4005f10dc673a9e8f" + "CVE-2023-52484": { + "cmt_msg": "iommu/arm-smmu-v3: Fix soft lockup triggered by arm_smmu_mm_invalidate_range" }, - "CVE-2014-0181": { - "cmt_msg": "net: Use netlink_ns_capable to verify the permisions of netlink messages", - "cmt_id": "50b8b6e75fa0c08cef1e1ed30a7ab91f05bcb779" + "CVE-2022-29900": { + "cmt_msg": "x86/kvm/vmx: Make noinstr clean" }, - "CVE-2014-4014": { - "cmt_msg": "fs,userns: Change inode_capable to capable_wrt_inode_uidgid", - "cmt_id": "2246a472bce19c0d373fb5488a0e612e3328ce0a" + "CVE-2022-29901": { + "cmt_msg": "x86/kvm/vmx: Make noinstr clean" }, - "CVE-2014-4667": { - "cmt_msg": "sctp: Fix sk_ack_backlog wrap-around problem", - "cmt_id": "ddb638e68690ca61959775b262a5ef0719c5c066" + "CVE-2018-12233": { + "cmt_msg": "jfs: Fix inconsistency between memory allocation and ea_buf->max_size" }, - "CVE-2014-9914": { - "cmt_msg": "ipv4: fix a race in ip4_datagram_release_cb()", - "cmt_id": "c671113b05eb8cdcc5ed8610e9cc45a653ea7558" + "CVE-2023-3161": { + "cmt_msg": "fbcon: Check font dimension limits" }, - "CVE-2014-3917": { - "cmt_msg": "auditsc: audit_krule mask accesses need bounds checking", - "cmt_id": "6004b0e5ac2e8e9e1bb0f012dc9242e03cca95df" + "CVE-2020-10751": { + "cmt_msg": "selinux: properly handle multiple messages in selinux_netlink_send()" }, - "CVE-2014-0131": { - "cmt_msg": "skbuff: skb_segment: orphan frags before copying", - "cmt_id": "07d054ef6765b307277f02c11b51f0695d6b3d7c" - } - }, - "3.12.24": { - "CVE-2014-4508": { - "cmt_msg": "x86_32, entry: Do syscall exit work on badsys (CVE-2014-4508)", - "cmt_id": "b8f4d2179757e17cf16644feb44879c05b5b61ef" + "CVE-2022-3567": { + "cmt_msg": "ipv6: Fix data races around sk->sk_prot." }, - "CVE-2014-3940": { - "cmt_msg": "mm: add !pte_present() check on existing hugetlb_entry callbacks", - "cmt_id": "7032d5fbbf1b08586e1463684d6c8f456889c293" + "CVE-2012-4398": { + "cmt_msg": "usermodehelper: use UMH_WAIT_PROC consistently" }, - "CVE-2014-0206": { - "cmt_msg": "aio: fix kernel memory disclosure in io_getevents() introduced in v3.10", - "cmt_id": "bee3f7b8188d4b2a5dfaeb2eb4a68d99f67daecf" + "CVE-2018-9465": { + "cmt_msg": "binder: fix proc->files use-after-free" }, - "CVE-2014-4611": { - "cmt_msg": "lz4: ensure length does not wrap", - "cmt_id": "f1bac1ba17822414d4031f840913b4ea27793ba8" + "CVE-2018-20510": { + "cmt_msg": "binder: replace \"%p\" with \"%pK\"" }, - "CVE-2014-4655": { - "cmt_msg": "ALSA: control: Fix replacing user controls", - "cmt_id": "d8eaff7517ee11b2e7cbc158abbdf899b8351ed3" + "CVE-2014-7970": { + "cmt_msg": "mnt: Prevent pivot_root from creating a loop in the mount tree" }, - "CVE-2014-4654": { - "cmt_msg": "ALSA: control: Fix replacing user controls", - "cmt_id": "d8eaff7517ee11b2e7cbc158abbdf899b8351ed3" + "CVE-2020-15437": { + "cmt_msg": "serial: 8250: fix null-ptr-deref in serial8250_start_tx()" }, - "CVE-2014-4656": { - "cmt_msg": "ALSA: control: Handle numid overflow", - "cmt_id": "669982364299f6f22bea4324f0f7ee8f8a361b87" + "CVE-2020-15436": { + "cmt_msg": "block: Fix use-after-free in blkdev_get()" }, - "CVE-2014-4653": { - "cmt_msg": "ALSA: control: Don't access controls outside of protected regions", - "cmt_id": "0bf595fd311aa4d6e82c43879f2c0d0650e83271" + "CVE-2022-1116": { + "cmt_msg": "" }, - "CVE-2014-4652": { - "cmt_msg": "ALSA: control: Protect user controls against concurrent access", - "cmt_id": "ed81e6b21790b717cda5f5bab2bdb07d2ce17ab1" - } - }, - "3.12.25": { - "CVE-2014-4699": { - "cmt_msg": "ptrace,x86: force IRET path after a ptrace_stop()", - "cmt_id": "2f1824407bf18b019d2c821881dd0956c6f0a254" - } - }, - "3.12.26": { - "CVE-2014-4171": { - "cmt_msg": "shmem: fix faulting into a hole while it's punched", - "cmt_id": "8685789bd8ec12a02b07ea76df4527b055efbf20" + "CVE-2022-2318": { + "cmt_msg": "net: rose: fix UAF bugs caused by timer handler" }, - "CVE-2014-5045": { - "cmt_msg": "fs: umount on symlink leaks mnt count", - "cmt_id": "37b0ade4c681de6e0d7762c948c400496bc1b27b" - } - }, - "3.12.27": { - "CVE-2014-3534": { - "cmt_msg": "s390/ptrace: fix PSW mask check", - "cmt_id": "cbcbb4c4826ff594b091e143b0f049f13ab7a64e" + "CVE-2016-9178": { + "cmt_msg": "fix minor infoleak in get_user_ex()" }, - "CVE-2014-5077": { - "cmt_msg": "net: sctp: inherit auth_capable on INIT collisions", - "cmt_id": "4a07c786e3d9fbe989d8b5bf9920a1e34afd8b91" + "CVE-2020-8647": { + "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region" }, - "CVE-2014-5207": { - "cmt_msg": "mnt: Correct permission checks in do_remount", - "cmt_id": "8b18c0adbc5d0cb1530692e72bcfb88fd7bb77bb" + "CVE-2022-23816": { + "cmt_msg": "x86/kvm/vmx: Make noinstr clean" }, - "CVE-2014-5206": { - "cmt_msg": "mnt: Only change user settable mount flags in remount", - "cmt_id": "25c1def33a2f74079f3062b7afdf98fcf9f34e6d" - } - }, - "3.12.28": { - "CVE-2014-5472": { - "cmt_msg": "isofs: Fix unbounded recursion when processing relocated directories", - "cmt_id": "e4ca8b780c82c04ec03fcd05d9e3f92fc6de6347" + "CVE-2019-0154": { + "cmt_msg": "drm/i915: Lower RM timeout to avoid DSI hard hangs" }, - "CVE-2014-3182": { - "cmt_msg": "HID: logitech: perform bounds checking on device_id early enough", - "cmt_id": "2ae8a66674a4cd7f2cfee757ee29cb63dce755fe" + "CVE-2023-52481": { + "cmt_msg": "arm64: errata: Add Cortex-A520 speculative unprivileged load workaround" }, - "CVE-2014-3184": { - "cmt_msg": "HID: fix a couple of off-by-ones", - "cmt_id": "1f78f21b43f2c69f2ea06ed35b77759d000dd2b4" + "CVE-2023-52585": { + "cmt_msg": "drm/amdgpu: Fix possible NULL dereference in amdgpu_ras_query_error_status_helper()" }, - "CVE-2014-3601": { - "cmt_msg": "kvm: iommu: fix the third parameter of kvm_iommu_put_pages (CVE-2014-3601)", - "cmt_id": "e35b1e9f17e0567f96502f3a2a31dace727ed3da" + "CVE-2021-47145": { + "cmt_msg": "btrfs: do not BUG_ON in link_to_fixup_dir" }, - "CVE-2014-5471": { - "cmt_msg": "isofs: Fix unbounded recursion when processing relocated directories", - "cmt_id": "e4ca8b780c82c04ec03fcd05d9e3f92fc6de6347" - } - }, - "3.12.29": { - "CVE-2014-6418": { - "cmt_msg": "libceph: do not hard code max auth ticket len", - "cmt_id": "0884f8d4139431deb0b98ba0d6fb2d17e2c25c84" + "CVE-2023-52587": { + "cmt_msg": "IB/ipoib: Fix mcast list locking" }, - "CVE-2014-3185": { - "cmt_msg": "USB: whiteheat: Added bounds checking for bulk command response", - "cmt_id": "b3d60c320f6597c2be0bcf580cf8093c12c4555f" + "CVE-2023-52586": { + "cmt_msg": "drm/msm/dpu: Add mutex lock in control vblank irq" }, - "CVE-2014-6417": { - "cmt_msg": "libceph: do not hard code max auth ticket len", - "cmt_id": "0884f8d4139431deb0b98ba0d6fb2d17e2c25c84" + "CVE-2021-47149": { + "cmt_msg": "net: fujitsu: fix potential null-ptr-deref" }, - "CVE-2014-6416": { - "cmt_msg": "libceph: do not hard code max auth ticket len", - "cmt_id": "0884f8d4139431deb0b98ba0d6fb2d17e2c25c84" - } - }, - "3.12.31": { - "CVE-2014-3181": { - "cmt_msg": "HID: magicmouse: sanity check report size in raw_event() callback", - "cmt_id": "ae81c27a53af5310f1fe47e9252146d79ab3157d" + "CVE-2022-3566": { + "cmt_msg": "tcp: Fix data races around icsk->icsk_af_ops." }, - "CVE-2014-3186": { - "cmt_msg": "HID: picolcd: sanity check report size in raw_event() callback", - "cmt_id": "2dffad6784f0c5f10727a20a333db11eef0b572a" + "CVE-2022-3565": { + "cmt_msg": "mISDN: fix use-after-free bugs in l1oip timer handlers" }, - "CVE-2014-6410": { - "cmt_msg": "udf: Avoid infinite loop when processing indirect ICBs", - "cmt_id": "8ec4e9789b8b4c05ee979daad2a27088e29fac5d" - } - }, - "3.12.32": { - "CVE-2014-4608": { - "cmt_msg": "lzo: check for length overrun in variable length encoding.", - "cmt_id": "4277fc429c1ae9f815aa4e5713514d952032f2fa" + "CVE-2021-47065": { + "cmt_msg": "rtw88: Fix array overrun in rtw_get_tx_power_params()" }, - "CVE-2014-7975": { - "cmt_msg": "fs: Add a missing permission check to do_umount", - "cmt_id": "8d9c8c3980a85d79db13c5ce4bb118fef32d4f50" - } - }, - "3.12.33": { - "CVE-2014-3647": { - "cmt_msg": "KVM: x86: Emulator fixes for eip canonical checks on near branches", - "cmt_id": "a20e81cb2b2b8aebdca9d11b6fa2133f1b97251d" + "CVE-2020-36386": { + "cmt_msg": "Bluetooth: Fix slab-out-of-bounds read in hci_extended_inquiry_result_evt()" }, - "CVE-2014-3646": { - "cmt_msg": "kvm: vmx: handle invvpid vm exit gracefully", - "cmt_id": "5838e85ea0a3c77a83465dfd87257f96d0ceb6ae" + "CVE-2021-47144": { + "cmt_msg": "drm/amd/amdgpu: fix refcount leak" }, - "CVE-2014-7970": { - "cmt_msg": "mnt: Prevent pivot_root from creating a loop in the mount tree", - "cmt_id": "365446fe1c7bf1b481cedfb9e50cfc8a86fdde89" + "CVE-2021-47147": { + "cmt_msg": "ptp: ocp: Fix a resource leak in an error handling path" }, - "CVE-2014-8884": { - "cmt_msg": "ttusb-dec: buffer overflow in ioctl", - "cmt_id": "482c6cb2dfb40838d67b0ba844b4b3d0af0f3d20" + "CVE-2020-36385": { + "cmt_msg": "RDMA/ucma: Rework ucma_migrate_id() to avoid races with destroy" }, - "CVE-2014-3610": { - "cmt_msg": "KVM: x86: Check non-canonical addresses upon WRMSR", - "cmt_id": "7e60cb9b5f7ad5a47404db9e7a974ab82a054544" + "CVE-2023-52589": { + "cmt_msg": "media: rkisp1: Fix IRQ disable race issue" }, - "CVE-2014-3611": { - "cmt_msg": "KVM: x86: Improve thread safety in pit", - "cmt_id": "5671c6a9229edd1b1587b4ea1014d540a7e74797" + "CVE-2021-47140": { + "cmt_msg": "iommu/amd: Clear DMA ops when switching domain" }, - "CVE-2014-7826": { - "cmt_msg": "tracing/syscalls: Ignore numbers outside NR_syscalls' range", - "cmt_id": "abc07cd01c51fb54088c6bc8ee654d104a5ec7d9" + "CVE-2021-47143": { + "cmt_msg": "net/smc: remove device from smcd_dev_list after failed device_add()" }, - "CVE-2014-7825": { - "cmt_msg": "tracing/syscalls: Ignore numbers outside NR_syscalls' range", - "cmt_id": "abc07cd01c51fb54088c6bc8ee654d104a5ec7d9" - } - }, - "3.12.34": { - "CVE-2014-3687": { - "cmt_msg": "net: sctp: fix panic on duplicate ASCONF chunks", - "cmt_id": "a723db0be941b8aebaa1a98b33d17a91b16603e4" + "CVE-2021-47142": { + "cmt_msg": "drm/amdgpu: Fix a use-after-free" }, - "CVE-2014-3673": { - "cmt_msg": "net: sctp: fix skb_over_panic when receiving malformed ASCONF chunks", - "cmt_id": "bbd951a21e0fd555cd9ede44c7196af09d04d171" + "CVE-2021-47146": { + "cmt_msg": "mld: fix panic in mld_newpack()" }, - "CVE-2014-3688": { - "cmt_msg": "net: sctp: fix remote memory pressure from excessive queueing", - "cmt_id": "e476841415c1b7b54e4118d8a219f5db71878675" + "CVE-2023-52340": { + "cmt_msg": "ipv6: remove max_size check inline with ipv4" }, - "CVE-2014-7841": { - "cmt_msg": "net: sctp: fix NULL pointer dereference in af->from_addr_param on malformed packet", - "cmt_id": "4008f1dbe6fea8114e7f79ed2d238e369dc9138f" + "CVE-2023-52516": { + "cmt_msg": "dma-debug: don't call __dma_entry_alloc_check_leak() under free_entries_lock" }, - "CVE-2014-7843": { - "cmt_msg": "arm64: __clear_user: handle exceptions on strb", - "cmt_id": "beb762ba2a940ce1f87a03b1c5820ce2d433db6e" + "CVE-2018-7480": { + "cmt_msg": "blkcg: fix double free of new_blkg in blkcg_init_queue" }, - "CVE-2014-7842": { - "cmt_msg": "KVM: x86: Don't report guest userspace emulation error to userspace", - "cmt_id": "7e1ebf020aff9b3e4c0d52e8ace6e3278e8f8762" - } - }, - "3.12.35": { - "CVE-2014-9090": { - "cmt_msg": "x86_64, traps: Stop using IST for #SS", - "cmt_id": "e40598270a40040461c8b8d3a8656d54fb59b9cd" + "CVE-2023-52588": { + "cmt_msg": "f2fs: fix to tag gcing flag on page during block migration" }, - "CVE-2014-9322": { - "cmt_msg": "x86_64, traps: Stop using IST for #SS", - "cmt_id": "e40598270a40040461c8b8d3a8656d54fb59b9cd" - } - }, - "3.12.36": { - "CVE-2014-9420": { - "cmt_msg": "isofs: Fix infinite looping over CE entries", - "cmt_id": "fbce0d7dc8965c9fb8d411862040239d4a768c71" + "CVE-2019-14615": { + "cmt_msg": "drm/i915/gen9: Clear residual context state on context switch" }, - "CVE-2014-9584": { - "cmt_msg": "isofs: Fix unchecked printing of ER records", - "cmt_id": "2329c797a9dc66982946026cbc1783e072ab8e33" + "CVE-2023-52578": { + "cmt_msg": "net: bridge: use DEV_STATS_INC()" }, - "CVE-2014-8989": { - "cmt_msg": "userns: Don't allow setgroups until a gid mapping has been setablished", - "cmt_id": "ae254fcf53097d6d83502c1a75366c7e4eface8b" + "CVE-2016-3139": { + "cmt_msg": "Input: wacom - compute the HID report size to get the actual packet size" }, - "CVE-2014-9683": { - "cmt_msg": "eCryptfs: Remove buggy and unnecessary write in file name decode routine", - "cmt_id": "8ffea99d6f2be99790611282f326da95a84a8cab" + "CVE-2023-0030": { + "cmt_msg": "drm/nouveau/mmu: add more general vmm free/node handling functions" }, - "CVE-2014-8133": { - "cmt_msg": "x86/tls: Validate TLS entries to protect espfix", - "cmt_id": "107436a25547580118fd93e5aaf808f6b533b639" + "CVE-2020-16120": { + "cmt_msg": "ovl: switch to mounter creds in readdir" }, - "CVE-2014-8134": { - "cmt_msg": "x86, kvm: Clear paravirt_enabled on KVM guests for espfix32's benefit", - "cmt_id": "a82297838bb23d83795661c55a6b9494c05ac68d" - } - }, - "3.12.37": { - "CVE-2014-9529": { - "cmt_msg": "KEYS: close race between key lookup and freeing", - "cmt_id": "1bb0aca1e0881dfd34a6f39fd44e1e995fc302a1" + "CVE-2019-11599": { + "cmt_msg": "coredump: fix race condition between mmget_not_zero()/get_task_mm() and core dumping" }, - "CVE-2014-9585": { - "cmt_msg": "x86_64, vdso: Fix the vdso address randomization algorithm", - "cmt_id": "0c9312164d6e069707dd96a001849f4b853c546d" + "CVE-2018-16658": { + "cmt_msg": "cdrom: Fix info leak/OOB read in cdrom_ioctl_drive_status" }, - "CVE-2014-8559": { - "cmt_msg": "move d_rcu from overlapping d_child to overlapping d_alias", - "cmt_id": "4b2f6663ebde6bed50209a05041b34c203116253" + "CVE-2018-15572": { + "cmt_msg": "x86/speculation: Protect against userspace-userspace spectreRSB" }, - "CVE-2014-9644": { - "cmt_msg": "crypto: include crypto- module prefix in template", - "cmt_id": "f753253c2c19423b0d6743ca9eae725549299245" + "CVE-2022-1204": { + "cmt_msg": "ax25: Fix refcount leaks caused by ax25_cb_del()" }, - "CVE-2013-7421": { - "cmt_msg": "crypto: prefix module autoloading with \"crypto-\"", - "cmt_id": "7f655881c786824340b0bee70f9738e10d427494" - } - }, - "3.12.38": { - "CVE-2014-3690": { - "cmt_msg": "x86,kvm,vmx: Preserve CR4 across VM entry", - "cmt_id": "2e70fb5dcbaec195febf1eee3b96e8b47e432c35" + "CVE-2019-2101": { + "cmt_msg": "media: uvcvideo: Fix 'type' check leading to overflow" }, - "CVE-2014-9728": { - "cmt_msg": "udf: Verify i_size when loading inode", - "cmt_id": "4ff6c40be897225cf818c5202871cfb91ed064f6" + "CVE-2016-10723": { + "cmt_msg": "mm, oom: remove sleep from under oom_lock" }, - "CVE-2014-9729": { - "cmt_msg": "udf: Verify i_size when loading inode", - "cmt_id": "4ff6c40be897225cf818c5202871cfb91ed064f6" + "CVE-2019-19036": { + "cmt_msg": "btrfs: Detect unbalanced tree with empty leaf before crashing btree operations" }, - "CVE-2014-9731": { - "cmt_msg": "udf: Check path length when reading symlink", - "cmt_id": "ebfce5ccba81292a5e34710a602117769118fa9a" + "CVE-2019-3459": { + "cmt_msg": "Bluetooth: Verify that l2cap_get_conf_opt provides large enough buffer" }, - "CVE-2014-9730": { - "cmt_msg": "udf: Check component length before reading it", - "cmt_id": "c94011ac6ae0bbfc8966ec256ad7b1bf30feaeec" + "CVE-2020-11494": { + "cmt_msg": "slcan: Don't transmit uninitialized stack data in padding" }, - "CVE-2015-1421": { - "cmt_msg": "net: sctp: fix slab corruption from use after free on INIT collisions", - "cmt_id": "43e39c2f63240f67a67b4060882f67dac1a6f339" - } - }, - "3.12.39": { - "CVE-2014-7822": { - "cmt_msg": "->splice_write() via ->write_iter()", - "cmt_id": "d7e3ae47c441894b11dce376ff8d110780872d0d" + "CVE-2019-19039": { + "cmt_msg": "btrfs: Don't submit any btree write bio if the fs has errors" }, - "CVE-2015-2830": { - "cmt_msg": "x86/asm/entry/64: Remove a bogus 'ret_from_fork' optimization", - "cmt_id": "93ba6108cd76089d6ae16abec65ade5b11546d76" + "CVE-2022-1974": { + "cmt_msg": "nfc: replace improper check device_is_registered() in netlink related functions" }, - "CVE-2015-1593": { - "cmt_msg": "x86, mm/ASLR: Fix stack randomization on 64-bit systems", - "cmt_id": "5fb6f0aa14db88c62ca141279ab71f20d6814788" - } - }, - "3.12.40": { - "CVE-2016-0823": { - "cmt_msg": "pagemap: do not leak physical addresses to non-privileged userspace", - "cmt_id": "91e9d77039485b57ddf632638acc0a968a39b856" + "CVE-2020-8832": { + "cmt_msg": "drm/i915: Record the default hw state after reset upon load" }, - "CVE-2015-2666": { - "cmt_msg": "x86/microcode/intel: Guard against stack overflow in the loader", - "cmt_id": "c5988181af3b41381c4d20e08ca6852f99f95417" + "CVE-2021-47125": { + "cmt_msg": "sch_htb: fix refcount leak in htb_parent_to_leaf_offload" }, - "CVE-2015-3331": { - "cmt_msg": "crypto: aesni - fix memory usage in GCM decryption", - "cmt_id": "0585664d17325265ea7cc51aa4f1ff492972b611" + "CVE-2024-26797": { + "cmt_msg": "drm/amd/display: Prevent potential buffer overflow in map_hw_resources" }, - "CVE-2014-2568": { - "cmt_msg": "core, nfqueue, openvswitch: Orphan frags in skb_zerocopy and handle errors", - "cmt_id": "1674b4bf3eea3cac51b70778e89f8025f7cfe695" + "CVE-2022-1836": { + "cmt_msg": "floppy: disable FDRAWCMD by default" }, - "CVE-2015-2150": { - "cmt_msg": "xen-pciback: limit guest control of command register", - "cmt_id": "f82a9cff66e3158a3f86706ff55feba2b22ec8cb" - } - }, - "3.12.41": { - "CVE-2014-8160": { - "cmt_msg": "netfilter: conntrack: disable generic tracking for known protocols", - "cmt_id": "2fb11da9d9016f6c0a4fcb99b8ebd63495c79005" + "CVE-2021-47113": { + "cmt_msg": "btrfs: abort in rename_exchange if we fail to insert the second ref" }, - "CVE-2014-8159": { - "cmt_msg": "IB/uverbs: Prevent integer overflow in ib_umem_get address arithmetic", - "cmt_id": "f6094cbab915952132434cc50d738c2976cb4457" + "CVE-2021-32078": { + "cmt_msg": "ARM: footbridge: remove personal server platform" }, - "CVE-2015-2041": { - "cmt_msg": "net: llc: use correct size for sysctl timeout entries", - "cmt_id": "553dd569ff29bc38cebbf9f9dd7c791863ee9113" + "CVE-2014-1874": { + "cmt_msg": "SELinux: Fix kernel BUG on empty security contexts." }, - "CVE-2015-2042": { - "cmt_msg": "net: rds: use correct size for max unacked packets and bytes", - "cmt_id": "b4482b533bfb54232f31d72c8ab70c1400385040" + "CVE-2024-26798": { + "cmt_msg": "fbcon: always restore the old font data in fbcon_do_set_font()" }, - "CVE-2015-2922": { - "cmt_msg": "ipv6: Don't reduce hop limit for an interface", - "cmt_id": "ac12ff18b11259e10c2d543aa58c73ff88a68e77" + "CVE-2017-16528": { + "cmt_msg": "ALSA: seq: Cancel pending autoload work at unbinding device" }, - "CVE-2015-3332": { - "cmt_msg": "tcp: Fix crash in TCP Fast Open", - "cmt_id": "221ff9c56696e9e02d39ecb844528ebb4f8abf0f" + "CVE-2022-4662": { + "cmt_msg": "USB: core: Prevent nested device-reset calls" }, - "CVE-2015-0239": { - "cmt_msg": "KVM: x86: SYSENTER emulation is broken", - "cmt_id": "4483ef98b020b9d4cdafef95ee84b18eaccea61a" - } - }, - "3.12.43": { - "CVE-2015-6526": { - "cmt_msg": "powerpc/perf: Cap 64bit userspace backtraces to PERF_MAX_STACK_DEPTH", - "cmt_id": "d15e6bc4606b27f53ef70a99d05690fa5a0e6c45" + "CVE-2019-11833": { + "cmt_msg": "ext4: zero out the unused memory region in the extent tree block" }, - "CVE-2017-1000253": { - "cmt_msg": "fs/binfmt_elf.c: fix bug in loading of PIE binaries", - "cmt_id": "b255044d68f190693d799263eb4dab66813f2de9" + "CVE-2021-38205": { + "cmt_msg": "net: xilinx_emaclite: Do not print real IOMEM pointer" }, - "CVE-2015-3636": { - "cmt_msg": "ipv4: Missing sk_nulls_node_init() in ping_unhash().", - "cmt_id": "8a9a51ba2eff62e1a899daad7b623becfed8f3f1" + "CVE-2021-3864": { + "cmt_msg": "" }, - "CVE-2015-3339": { - "cmt_msg": "fs: take i_mutex during prepare_binprm for set[ug]id executables", - "cmt_id": "5176b77f1aacdc560eaeac4685ade444bb814689" + "CVE-2020-0255": { + "cmt_msg": "selinux: properly handle multiple messages in selinux_netlink_send()" }, - "CVE-2014-8173": { - "cmt_msg": "mm: Fix NULL pointer dereference in madvise(MADV_WILLNEED) support", - "cmt_id": "5f30307e19b93df1e80b073b15967f53850ad33d" - } - }, - "3.12.44": { - "CVE-2015-4177": { - "cmt_msg": "mnt: Fail collect_mounts when applied to unmounted mounts", - "cmt_id": "6ab282fe6d43027b3b1ef820b3798aae8fdb432b" + "CVE-2019-2215": { + "cmt_msg": "ANDROID: binder: remove waitqueue when thread exits." }, - "CVE-2015-4700": { - "cmt_msg": "x86: bpf_jit: fix compilation of large bpf programs", - "cmt_id": "0fa9520e7b08f00138cf9a4a95d066492cbcc18d" + "CVE-2024-26769": { + "cmt_msg": "nvmet-fc: avoid deadlock on delete association path" }, - "CVE-2015-4036": { - "cmt_msg": "vhost/scsi: potential memory corruption", - "cmt_id": "266ed50f2a81a882d54c4ff7452bca370f396bae" + "CVE-2019-2213": { + "cmt_msg": "binder: fix possible UAF when freeing buffer" }, - "CVE-2015-1420": { - "cmt_msg": "vfs: read file_handle only once in handle_to_path", - "cmt_id": "330c542ff8f659055de1992935abaa18b121379e" + "CVE-2024-26677": { + "cmt_msg": "rxrpc: Fix delayed ACKs to not set the reference serial number" }, - "CVE-2015-5364": { - "cmt_msg": "udp: fix behavior of wrong checksums", - "cmt_id": "a97b54dd69cb05df4c57f5d5b40c761f7835ce4e" + "CVE-2020-25211": { + "cmt_msg": "netfilter: ctnetlink: add a range check for l3/l4 protonum" }, - "CVE-2015-5366": { - "cmt_msg": "udp: fix behavior of wrong checksums", - "cmt_id": "a97b54dd69cb05df4c57f5d5b40c761f7835ce4e" - } - }, - "3.12.45": { - "CVE-2015-4167": { - "cmt_msg": "udf: Check length of extended attributes and allocation descriptors", - "cmt_id": "aa826bb1953a0a40b460e053efcf9c5f8cab554b" + "CVE-2018-5953": { + "cmt_msg": "printk: hash addresses printed with %p" }, - "CVE-2014-9710": { - "cmt_msg": "Btrfs: make xattr replace operations atomic", - "cmt_id": "a873146ce4fb025c0b5c1322af5a6bad042f5363" + "CVE-2020-26556": { + "cmt_msg": "" }, - "CVE-2015-3212": { - "cmt_msg": "sctp: fix ASCONF list handling", - "cmt_id": "bee9ad8fe88affc985755c97511637a8672b0fb2" + "CVE-2020-26557": { + "cmt_msg": "" }, - "CVE-2015-4003": { - "cmt_msg": "ozwpan: divide-by-zero leading to panic", - "cmt_id": "31c39eb8bdf7226a472d910f36ae7a2f3cbace85" + "CVE-2024-26671": { + "cmt_msg": "blk-mq: fix IO hang from sbitmap wakeup race" }, - "CVE-2015-4002": { - "cmt_msg": "ozwpan: Use proper check to prevent heap overflow", - "cmt_id": "b042a31d19ad9780c3eba768eef8db5a8c048653" + "CVE-2020-26555": { + "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical" }, - "CVE-2014-8172": { - "cmt_msg": "get rid of s_files and files_lock", - "cmt_id": "0da9ac29cddaaf0911fbeaf46e7b4e155cdc792e" - } - }, - "3.12.46": { - "CVE-2015-4692": { - "cmt_msg": "kvm: x86: fix kvm_apic_has_events to check for NULL pointer", - "cmt_id": "cda28549b632e62f662ce15242b7266cce90c128" + "CVE-2024-26776": { + "cmt_msg": "spi: hisi-sfc-v3xx: Return IRQ_NONE if no interrupts were detected" }, - "CVE-2015-5707": { - "cmt_msg": "sg_start_req(): make sure that there's not too many elements in iovec", - "cmt_id": "aba300b9c26f063efcaee374e54264c79a611f22" + "CVE-2024-26777": { + "cmt_msg": "fbdev: sis: Error out if pixclock equals zero" }, - "CVE-2015-9289": { - "cmt_msg": "cx24116: fix a buffer overflow when checking userspace params", - "cmt_id": "da0f41c912a624883a79ff47321b0e9f76d7f27a" - } - }, - "3.12.47": { - "CVE-2015-3290": { - "cmt_msg": "x86/nmi/64: Switch stacks on userspace NMI entry", - "cmt_id": "e0de15fc45a83f94d1ef578f54b427b86a33ab21" + "CVE-2019-20794": { + "cmt_msg": "" }, - "CVE-2015-5697": { - "cmt_msg": "md: use kzalloc() when bitmap is disabled", - "cmt_id": "6578b22cd80381c9fbab152e1ababd8bfce8b5d0" + "CVE-2018-9516": { + "cmt_msg": "HID: debug: check length before copy_to_user()" }, - "CVE-2015-5157": { - "cmt_msg": "x86/nmi/64: Switch stacks on userspace NMI entry", - "cmt_id": "e0de15fc45a83f94d1ef578f54b427b86a33ab21" + "CVE-2023-3397": { + "cmt_msg": "" }, - "CVE-2015-6252": { - "cmt_msg": "vhost: actually track log eventfd file", - "cmt_id": "a5b3343b05e58b8f8ce7481426f89c048229b50d" + "CVE-2020-36775": { + "cmt_msg": "f2fs: fix to avoid potential deadlock" }, - "CVE-2015-3288": { - "cmt_msg": "mm: avoid setting up anonymous pages into file mapping", - "cmt_id": "bf653833fc72668cadcb1f54310f3d0bd6b36393" + "CVE-2024-26770": { + "cmt_msg": "HID: nvidia-shield: Add missing null pointer checks to LED initialization" }, - "CVE-2015-5706": { - "cmt_msg": "path_openat(): fix double fput()", - "cmt_id": "da59de4cfa5f3562d02fcbc24fe96a08aebea628" - } - }, - "3.12.49": { - "CVE-2015-5283": { - "cmt_msg": "sctp: fix race on protocol/netns initialization", - "cmt_id": "540a0bd97d4e790b9526e266c22f4c12cf732a1f" + "CVE-2023-52478": { + "cmt_msg": "HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect" }, - "CVE-2015-3291": { - "cmt_msg": "x86/nmi/64: Use DF to avoid userspace RSP confusing nested NMI detection", - "cmt_id": "864c198bbd4e091577602ad42016ccc835af3b93" + "CVE-2018-1128": { + "cmt_msg": "libceph: add authorizer challenge" }, - "CVE-2015-2925": { - "cmt_msg": "dcache: Handle escaped paths in prepend_path", - "cmt_id": "b32388c040d559d26feef31fa02b4119c76be474" - } - }, - "3.12.50": { - "CVE-2015-7613": { - "cmt_msg": "Initialize msg/shm IPC objects before doing ipc_addid()", - "cmt_id": "89c7ab1494f614bf8323490c79d4a562e90db61b" + "CVE-2018-1129": { + "cmt_msg": "libceph: implement CEPHX_V2 calculation mode" }, - "CVE-2015-5257": { - "cmt_msg": "USB: whiteheat: fix potential null-deref at probe", - "cmt_id": "c43eff0a37cc308eab7489701ced35afd4d491d9" + "CVE-2021-47128": { + "cmt_msg": "bpf, lockdown, audit: Fix buggy SELinux lockdown permission checks" }, - "CVE-2015-8019": { - "cmt_msg": "net: add length argument to skb_copy_and_csum_datagram_iovec", - "cmt_id": "3e1ac3aafbd0cf1f7c81cb7099a8a1d0407e021d" - } - }, - "3.12.51": { - "CVE-2015-8215": { - "cmt_msg": "ipv6: addrconf: validate new MTU before applying it", - "cmt_id": "49f9add06964fe16997aa34099e7bb31c39b0314" + "CVE-2018-1087": { + "cmt_msg": "kvm/x86: fix icebp instruction handling" }, - "CVE-2015-7872": { - "cmt_msg": "KEYS: Fix crash when attempt to garbage collect an uninstantiated keyring", - "cmt_id": "bd6e04696299ce030e8650a96151fe383c431dce" + "CVE-2022-26365": { + "cmt_msg": "xen/blkfront: fix leaking data in shared pages" }, - "CVE-2015-8104": { - "cmt_msg": "KVM: svm: unconditionally intercept #DB", - "cmt_id": "4c6a0e0edfe824edd777a496f46817b4fb465cbd" + "CVE-2022-21125": { + "cmt_msg": "x86/speculation/mmio: Reuse SRBDS mitigation for SBDS" }, - "CVE-2015-5156": { - "cmt_msg": "virtio-net: drop NETIF_F_FRAGLIST", - "cmt_id": "7c11e86ec40e52468fe65acf89c6da7a6d833a44" + "CVE-2018-1120": { + "cmt_msg": "proc: do not access cmdline nor environ from file-backed areas" }, - "CVE-2015-5307": { - "cmt_msg": "KVM: x86: work around infinite loop in microcode when #AC is delivered", - "cmt_id": "0ccaee7be83eb288e8baacf6eebd4d8b8593f462" + "CVE-2018-1121": { + "cmt_msg": "" }, - "CVE-2015-6937": { - "cmt_msg": "RDS: verify the underlying transport exists before creating a connection", - "cmt_id": "2a3466123f0cb310c2201f0ae4ad3f72905b061b" - } - }, - "3.12.52": { - "CVE-2015-8543": { - "cmt_msg": "net: add validation for the socket syscall protocol argument", - "cmt_id": "0295617f822f630711f5af03316d3cbda6e737d4" + "CVE-2023-28746": { + "cmt_msg": "x86/mmio: Disable KVM mitigation when X86_FEATURE_CLEAR_CPU_BUF is set" }, - "CVE-2015-8575": { - "cmt_msg": "bluetooth: Validate socket address length in sco_sock_bind().", - "cmt_id": "1d9e57809a93e4083d2b898126ed2165f5200d60" + "CVE-2017-5754": { + "cmt_msg": "x86/cpufeatures: Add Intel feature bits for Speculation Control" }, - "CVE-2016-3841": { - "cmt_msg": "ipv6: add complete rcu protection around np->opt", - "cmt_id": "71781d1f85bc02bcdb29b18e9e76f1d49118ddc8" + "CVE-2021-47119": { + "cmt_msg": "ext4: fix memory leak in ext4_fill_super" }, - "CVE-2013-7446": { - "cmt_msg": "unix: avoid use-after-free in ep_remove_wait_queue", - "cmt_id": "9964b4c4ee925b2910723e509abd7241cff1ef84" + "CVE-2017-5753": { + "cmt_msg": "x86/cpufeatures: Add X86_BUG_SPECTRE_V[12]" }, - "CVE-2015-8569": { - "cmt_msg": "pptp: verify sockaddr_len in pptp_bind() and pptp_connect()", - "cmt_id": "d470ffbe3fe914d176ced4cf330a297c523c5711" - } - }, - "3.12.53": { - "CVE-2016-10229": { - "cmt_msg": "udp: properly support MSG_PEEK with truncated buffers", - "cmt_id": "c3bfbecb1bb575278ce4812746a29c04875a2926" + "CVE-2014-0181": { + "cmt_msg": "net: Use netlink_ns_capable to verify the permisions of netlink messages" }, - "CVE-2015-7515": { - "cmt_msg": "Input: aiptek - fix crash on detecting device without endpoints", - "cmt_id": "a7c0ba06670f99c252d5bb74258dddbf50fef837" + "CVE-2019-9466": { + "cmt_msg": "brcmfmac: add subtype check for event handling in data path" }, - "CVE-2016-0728": { - "cmt_msg": "KEYS: Fix keyring ref leak in join_session_keyring()", - "cmt_id": "6849cd97b0511913e17ef8bb53bd5558c4b51fc8" + "CVE-2020-11565": { + "cmt_msg": "mm: mempolicy: require at least one nodeid for MPOL_PREFERRED" }, - "CVE-2015-7799": { - "cmt_msg": "isdn_ppp: Add checks for allocation failure in isdn_ppp_open()", - "cmt_id": "a4c5c2262fc842e0323043a23a84be706760d628" + "CVE-2022-3344": { + "cmt_msg": "KVM: x86: nSVM: harden svm_free_nested against freeing vmcb02 while still in use" }, - "CVE-2015-7550": { - "cmt_msg": "KEYS: Fix race between read and revoke", - "cmt_id": "2d783600fdeafa5d7e5079c7aa79212116f60e51" + "CVE-2018-9568": { + "cmt_msg": "net: Set sk_prot_creator when cloning sockets to the right proto" }, - "CVE-2015-7885": { - "cmt_msg": "staging/dgnc: fix info leak in ioctl", - "cmt_id": "39c9944afb08c26ff36ae1967497d44fcf5a87ed" + "CVE-2018-13053": { + "cmt_msg": "alarmtimer: Prevent overflow for relative nanosleep" }, - "CVE-2015-8767": { - "cmt_msg": "sctp: Prevent soft lockup when sctp_accept() is called during a timeout event", - "cmt_id": "6b1a4c8425acde6b3725e9ca5dc7af544c656fda" - } - }, - "3.12.54": { - "CVE-2016-8646": { - "cmt_msg": "crypto: algif_hash - Only export and import on sockets with data", - "cmt_id": "231304036a751d3b6bd736fc81d3b8037d87350d" + "CVE-2020-27786": { + "cmt_msg": "ALSA: rawmidi: Fix racy buffer resize under concurrent accesses" }, - "CVE-2015-8844": { - "cmt_msg": "powerpc/tm: Block signal return setting invalid MSR state", - "cmt_id": "e9214d1047a5f215b2275ba6374fb076b9c73245" + "CVE-2023-6240": { + "cmt_msg": "" }, - "CVE-2016-2545": { - "cmt_msg": "ALSA: timer: Fix double unlink of active_list", - "cmt_id": "d8f5adeeed06acd63b93bc757a7e09adc8c33e64" + "CVE-2024-26700": { + "cmt_msg": "drm/amd/display: Fix MST Null Ptr for RV" }, - "CVE-2016-2544": { - "cmt_msg": "ALSA: seq: Fix race at timer setup and close", - "cmt_id": "49386ca9bcb24608ed22e19fb61599e6049f8a44" + "CVE-2024-26706": { + "cmt_msg": "parisc: Fix random data corruption from exception handler" }, - "CVE-2016-2547": { - "cmt_msg": "ALSA: timer: Harden slave timer list handling", - "cmt_id": "6e74b2deb63c48ddcd318b6c3d69f4f503e65d18" + "CVE-2023-23559": { + "cmt_msg": "wifi: rndis_wlan: Prevent buffer overflow in rndis_query_oid" }, - "CVE-2016-2546": { - "cmt_msg": "ALSA: timer: Fix race among timer ioctls", - "cmt_id": "7210b17187111e20afca4b4e30a31fa13c71a61b" + "CVE-2022-39842": { + "cmt_msg": "video: fbdev: pxa3xx-gcu: Fix integer overflow in pxa3xx_gcu_write" }, - "CVE-2016-2543": { - "cmt_msg": "ALSA: seq: Fix missing NULL check at remove_events ioctl", - "cmt_id": "2e17cb8c3553b2d61d9d70344bbec8a82c56e7d7" + "CVE-2022-0382": { + "cmt_msg": "net ticp:fix a kernel-infoleak in __tipc_sendmsg()" }, - "CVE-2016-2549": { - "cmt_msg": "ALSA: hrtimer: Fix stall by hrtimer_cancel()", - "cmt_id": "30e269d8d1af5ab11e613eab94af33693e95ade6" + "CVE-2023-32233": { + "cmt_msg": "netfilter: nf_tables: deactivate anonymous set from preparation phase" }, - "CVE-2016-2548": { - "cmt_msg": "ALSA: timer: Harden slave timer list handling", - "cmt_id": "6e74b2deb63c48ddcd318b6c3d69f4f503e65d18" - } - }, - "3.12.55": { - "CVE-2015-8785": { - "cmt_msg": "fuse: break infinite loop in fuse_fill_write_pages()", - "cmt_id": "affc1b9e84738b96f2e4e24a6fc95e09ef9a7b4b" + "CVE-2018-21008": { + "cmt_msg": "rsi: add fix for crash during assertions" }, - "CVE-2015-8970": { - "cmt_msg": "crypto: algif_skcipher - Require setkey before accept(2)", - "cmt_id": "82a0aa2c08de674191cf5e99b649af145c5ade25" + "CVE-2019-15223": { + "cmt_msg": "ALSA: line6: Assure canceling delayed work at disconnection" }, - "CVE-2015-7566": { - "cmt_msg": "USB: serial: visor: fix crash on detecting device without write_urbs", - "cmt_id": "c88ff183d8a3b3599394885f458b40eb838c0850" + "CVE-2019-19813": { + "cmt_msg": "btrfs: inode: Verify inode mode to avoid NULL pointer dereference" }, - "CVE-2016-0723": { - "cmt_msg": "tty: Fix unsafe ldisc reference via ioctl(TIOCGETD)", - "cmt_id": "4e6d2e76232ae19658064746fd5e5d800b8b5964" + "CVE-2019-15221": { + "cmt_msg": "ALSA: line6: Fix write on zero-sized buffer" }, - "CVE-2016-2384": { - "cmt_msg": "ALSA: usb-audio: avoid freeing umidi object twice", - "cmt_id": "563b627dbd698b2ae2f385718f1682ec20a51119" - } - }, - "3.12.56": { - "CVE-2021-20265": { - "cmt_msg": "af_unix: fix struct pid memory leak", - "cmt_id": "45c4c852c8ab5fb7e879892afa665dc47e55956d" + "CVE-2019-19814": { + "cmt_msg": "" }, - "CVE-2015-8812": { - "cmt_msg": "iw_cxgb3: Fix incorrectly returning error on success", - "cmt_id": "aec2e8966c788ccb1d7beed3401adfb470676877" - } - }, - "3.12.57": { - "CVE-2015-8551": { - "cmt_msg": "xen/pciback: Return error on XEN_PCI_OP_enable_msi when device has MSI or MSI-X enabled", - "cmt_id": "0842f7d8a78ff7f9c3a176abaa620a220fc82e75" + "CVE-2020-29371": { + "cmt_msg": "romfs: fix uninitialized memory leak in romfs_dev_read()" }, - "CVE-2015-8553": { - "cmt_msg": "xen/pciback: Don't allow MSI-X ops if PCI_COMMAND_MEMORY is not set.", - "cmt_id": "bb7aa305af0fd136dde25ad65ec0d3279d809d8b" + "CVE-2019-19816": { + "cmt_msg": "btrfs: inode: Verify inode mode to avoid NULL pointer dereference" }, - "CVE-2013-4312": { - "cmt_msg": "unix: properly account for FDs passed over unix sockets", - "cmt_id": "3d024dcef2548028e9f9b7876a544e6e0af00175" + "CVE-2020-0429": { + "cmt_msg": "l2tp: fix race between l2tp_session_delete() and l2tp_tunnel_closeall()" }, - "CVE-2015-8552": { - "cmt_msg": "xen/pciback: Return error on XEN_PCI_OP_enable_msi when device has MSI or MSI-X enabled", - "cmt_id": "0842f7d8a78ff7f9c3a176abaa620a220fc82e75" - } - }, - "3.12.58": { - "CVE-2015-8550": { - "cmt_msg": "xen: Add RING_COPY_REQUEST()", - "cmt_id": "120b649bd2f6699ed56dfa93c4a8b070babe9984" + "CVE-2021-47124": { + "cmt_msg": "io_uring: fix link timeout refs" }, - "CVE-2016-2143": { - "cmt_msg": "s390/mm: four page table levels vs. fork", - "cmt_id": "bf06b31b00b2bc7427e567c67d11c01513044557" + "CVE-2018-18710": { + "cmt_msg": "cdrom: fix improper type cast, which can leat to information leak." }, - "CVE-2016-3156": { - "cmt_msg": "ipv4: Don't do expensive useless work during inetdev destroy.", - "cmt_id": "5cc4ff312ac06ee4c49801f5b288c1118c3e5785" + "CVE-2019-5108": { + "cmt_msg": "mac80211: Do not send Layer 2 Update frame before authorization" }, - "CVE-2016-3137": { - "cmt_msg": "USB: cypress_m8: add endpoint sanity check", - "cmt_id": "4a77ba7a4e8567821f3e77054f23b3daade25999" + "CVE-2022-1012": { + "cmt_msg": "secure_seq: use the 64 bits of the siphash for port offset calculation" }, - "CVE-2016-9685": { - "cmt_msg": "xfs: fix two memory leaks in xfs_attr_list.c error paths", - "cmt_id": "36f5207148d48433625966162d03f804d81e1a23" + "CVE-2023-52620": { + "cmt_msg": "netfilter: nf_tables: disallow timeout for anonymous sets" }, - "CVE-2016-3140": { - "cmt_msg": "USB: digi_acceleport: do sanity checking for the number of ports", - "cmt_id": "cd4d737344639d7225d0232ec99a1b833d7e2324" + "CVE-2023-52621": { + "cmt_msg": "bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers" }, - "CVE-2016-2782": { - "cmt_msg": "USB: visor: fix null-deref at probe", - "cmt_id": "d53a0262f6738c81193e000b2975a7183be521f3" + "CVE-2023-52622": { + "cmt_msg": "ext4: avoid online resizing failures due to oversized flex bg" }, - "CVE-2016-3157": { - "cmt_msg": "x86/iopl/64: Properly context-switch IOPL on Xen PV", - "cmt_id": "a2a4370a312ac4793b165768f8fc69495b05b23e" + "CVE-2020-8649": { + "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region" }, - "CVE-2016-2185": { - "cmt_msg": "Input: ati_remote2 - fix crashes on detecting device with invalid descriptor", - "cmt_id": "ca216547bc4a3e7d73043f4d9b42d6461cf3067f" + "CVE-2023-52624": { + "cmt_msg": "drm/amd/display: Wake DMCUB before executing GPINT commands" }, - "CVE-2016-2184": { - "cmt_msg": "ALSA: usb-audio: Fix NULL dereference in create_fixed_stream_quirk()", - "cmt_id": "3b8dbf6b7b4e4fd1274fe2e5b04eda5a3394c543" + "CVE-2023-52625": { + "cmt_msg": "drm/amd/display: Refactor DMCUB enter/exit idle interface" }, - "CVE-2015-8816": { - "cmt_msg": "USB: fix invalid memory access in hub_activate()", - "cmt_id": "a706ac408da4994438d995d2cf4d2f7943086ca4" + "CVE-2023-52641": { + "cmt_msg": "fs/ntfs3: Add NULL ptr dereference checking at the end of attr_allocate_frame()" }, - "CVE-2016-2186": { - "cmt_msg": "Input: powermate - fix oops with malicious USB descriptors", - "cmt_id": "4f5d9400a57200b8a9f6a683a7beadd159ac09e1" + "CVE-2020-12656": { + "cmt_msg": "sunrpc: check that domain table is empty at module unload." }, - "CVE-2016-3689": { - "cmt_msg": "Input: ims-pcu - sanity check against missing interfaces", - "cmt_id": "b18626baf7a8b5bef098204516641b0701419d85" + "CVE-2017-1000405": { + "cmt_msg": "mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d()" }, - "CVE-2016-3136": { - "cmt_msg": "USB: mct_u232: add sanity checking in probe", - "cmt_id": "f9dbb3666b3ddb5f9a7e44a433383cb6880a03f5" + "CVE-2021-26930": { + "cmt_msg": "xen-blkback: fix error handling in xen_blkbk_map()" }, - "CVE-2016-3138": { - "cmt_msg": "USB: cdc-acm: more sanity checking", - "cmt_id": "f475db149d75bf100084a813ce9e1e9f4fa508e7" - } - }, - "3.12.59": { - "CVE-2015-7513": { - "cmt_msg": "KVM: x86: Reload pit counters for all channels when restoring state", - "cmt_id": "e31a2100a342288b665c31af0a5f01e794866cda" + "CVE-2021-26932": { + "cmt_msg": "Xen/x86: don't bail early from clear_foreign_p2m_mapping()" }, - "CVE-2016-3955": { - "cmt_msg": "USB: usbip: fix potential out-of-bounds write", - "cmt_id": "3b86e790417645fa899ed658a8e17f6832cf3936" + "CVE-2023-3141": { + "cmt_msg": "memstick: r592: Fix UAF bug in r592_remove due to race condition" }, - "CVE-2016-2085": { - "cmt_msg": "EVM: Use crypto_memneq() for digest comparisons", - "cmt_id": "afe5a791d374e50a06ada7f4eda4e921e1b77996" + "CVE-2018-14617": { + "cmt_msg": "hfsplus: fix NULL dereference in hfsplus_lookup()" }, - "CVE-2016-7117": { - "cmt_msg": "net: Fix use after free in the recvmmsg exit path", - "cmt_id": "2c7a8d368b3bef1cf97ea000ba0c07b27562af15" + "CVE-2022-0492": { + "cmt_msg": "cgroup-v1: Require capabilities to set release_agent" }, - "CVE-2016-3951": { - "cmt_msg": "cdc_ncm: do not call usbnet_link_change from cdc_ncm_bind", - "cmt_id": "f0592d355da50713a25c943a08142363237f1a41" + "CVE-2024-26647": { + "cmt_msg": "drm/amd/display: Fix late derefrence 'dsc' check in 'link_set_dsc_pps_packet()'" }, - "CVE-2016-4805": { - "cmt_msg": "ppp: take reference on channels netns", - "cmt_id": "736a17fe375978bce54cff359a3f76fb2676f872" + "CVE-2022-23042": { + "cmt_msg": "xen/netfront: react properly to failing gnttab_end_foreign_access_ref()" }, - "CVE-2016-3134": { - "cmt_msg": "netfilter: x_tables: fix unconditional helper", - "cmt_id": "9192d640a3917d7daf313795b4b7fc6329b3f6e5" + "CVE-2022-20132": { + "cmt_msg": "HID: add hid_is_usb() function to make it simpler for USB detection" }, - "CVE-2016-2847": { - "cmt_msg": "pipe: limit the per-user amount of pages allocated in pipes", - "cmt_id": "2a032e307d35402306c6464537b8bc6a0a3ac91d" - } - }, - "3.12.60": { - "CVE-2016-4580": { - "cmt_msg": "net: fix a kernel infoleak in x25 module", - "cmt_id": "aeb14f1738e3c6a703213cb103e0f89f143bd276" + "CVE-2022-0494": { + "cmt_msg": "block-map: add __GFP_ZERO flag for alloc_page in function bio_copy_kern" }, - "CVE-2016-4486": { - "cmt_msg": "net: fix infoleak in rtnetlink", - "cmt_id": "3248734d04fe4140b66aca5ce0372d7eae093293" + "CVE-2021-26931": { + "cmt_msg": "xen-blkback: don't \"handle\" error by BUG()" }, - "CVE-2016-2117": { - "cmt_msg": "atl2: Disable unimplemented scatter/gather feature", - "cmt_id": "59e126bf0fefcc03f309d3893a921637064fc2ee" + "CVE-2022-3524": { + "cmt_msg": "tcp/udp: Fix memory leak in ipv6_renew_options()." }, - "CVE-2016-4485": { - "cmt_msg": "net: fix infoleak in llc", - "cmt_id": "734b9658068b9b2ecb3aff06e125a66e02306386" + "CVE-2022-3523": { + "cmt_msg": "mm/memory.c: fix race when faulting a device private page" }, - "CVE-2016-4913": { - "cmt_msg": "get_rock_ridge_filename(): handle malformed NM entries", - "cmt_id": "7721094c03d1caad50b04eb60b06369b8a2e52d3" + "CVE-2022-3522": { + "cmt_msg": "mm/hugetlb: use hugetlb_pte_stable in migration race check" }, - "CVE-2016-2187": { - "cmt_msg": "Input: gtco - fix crash on detecting device without endpoints", - "cmt_id": "8c29c640402a7baf7fa9a31cd5bda288090a19ac" + "CVE-2008-2544": { + "cmt_msg": "" }, - "CVE-2016-7916": { - "cmt_msg": "proc: prevent accessing /proc//environ until it's ready", - "cmt_id": "cdfaba237820a99bad60d947530725151a611ca0" + "CVE-2021-3178": { + "cmt_msg": "nfsd4: readdirplus shouldn't return parent of export" }, - "CVE-2016-0758": { - "cmt_msg": "KEYS: Fix ASN.1 indefinite length object parsing", - "cmt_id": "012d81589afb85807b7ebe72f3505d90f34aa265" + "CVE-2021-47101": { + "cmt_msg": "asix: fix uninit-value in asix_mdio_read()" }, - "CVE-2016-0821": { - "cmt_msg": "include/linux/poison.h: fix LIST_POISON{1,2} offset", - "cmt_id": "c7ecfa39d66c62ee662ae6906a2eec3d28a96e6a" - } - }, - "3.12.61": { - "CVE-2016-4565": { - "cmt_msg": "IB/security: Restrict use of the write() interface", - "cmt_id": "0ab923b3982c323bd95e63a9b93dc65d1aebb94f" + "CVE-2021-47103": { + "cmt_msg": "inet: fully convert sk->sk_rx_dst to RCU rules" }, - "CVE-2016-9754": { - "cmt_msg": "ring-buffer: Prevent overflow of size in ring_buffer_resize()", - "cmt_id": "5feada97176f05f92088911fa807d30445c6a0c6" - } - }, - "3.12.62": { - "CVE-2016-4997": { - "cmt_msg": "netfilter: x_tables: check for bogus target offset", - "cmt_id": "1812c704ac70a37c06f239d7c06fd4331a25c779" + "CVE-2018-7755": { + "cmt_msg": "floppy: Do not copy a kernel pointer to user memory in FDGETPRM ioctl" }, - "CVE-2016-4569": { - "cmt_msg": "ALSA: timer: Fix leak in SNDRV_TIMER_IOCTL_PARAMS", - "cmt_id": "16e5f4c6ea671ffce2ee49e308c1e812144547d2" + "CVE-2022-0330": { + "cmt_msg": "drm/i915: Flush TLBs before releasing backing store" }, - "CVE-2016-4578": { - "cmt_msg": "ALSA: timer: Fix leak in events via snd_timer_user_ccallback", - "cmt_id": "640b1f79615c2b7dfba517aba7a8164c489da10c" + "CVE-2007-3719": { + "cmt_msg": "" }, - "CVE-2016-4470": { - "cmt_msg": "KEYS: potential uninitialized variable", - "cmt_id": "8c903c052ddf107cdbf4e0ccb54ad20be75c899f" + "CVE-2024-26606": { + "cmt_msg": "binder: signal epoll threads of self-work" }, - "CVE-2016-4998": { - "cmt_msg": "netfilter: x_tables: check for bogus target offset", - "cmt_id": "1812c704ac70a37c06f239d7c06fd4331a25c779" + "CVE-2023-0590": { + "cmt_msg": "net: sched: fix race condition in qdisc_graft()" }, - "CVE-2016-5244": { - "cmt_msg": "rds: fix an infoleak in rds_inc_info_copy", - "cmt_id": "3360c51768c3c589e7db3f2a4308b729ebcc7bae" + "CVE-2023-52583": { + "cmt_msg": "ceph: fix deadlock or deadcode of misusing dget()" }, - "CVE-2016-4482": { - "cmt_msg": "USB: usbfs: fix potential infoleak in devio", - "cmt_id": "fd0d40b9370853c02102c22b91ff7c3cd1077e8b" + "CVE-2022-4095": { + "cmt_msg": "staging: rtl8712: fix use after free bugs" }, - "CVE-2016-9806": { - "cmt_msg": "netlink: Fix dump skb leak/double free", - "cmt_id": "461dbb3855305ad7e841799ef573d6fc2abf6ed3" + "CVE-2022-45919": { + "cmt_msg": "media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221" }, - "CVE-2016-5829": { - "cmt_msg": "HID: hiddev: validate num_values for HIDIOCGUSAGES, HIDIOCSUSAGES commands", - "cmt_id": "5b9003297640242a33bb325f57ac60359ed0be43" + "CVE-2019-19319": { + "cmt_msg": "ext4: protect journal inode's blocks using block_validity" }, - "CVE-2014-9904": { - "cmt_msg": "ALSA: compress: fix an integer overflow check", - "cmt_id": "9deea4ddcc8f6b9708075aa307042c43b4fde732" - } - }, - "3.12.63": { - "CVE-2016-3070": { - "cmt_msg": "mm: migrate dirty page without clear_page_dirty_for_io etc", - "cmt_id": "2c789028e7390ca050752f659a82c6cdad357b67" + "CVE-2023-1611": { + "cmt_msg": "btrfs: fix race between quota disable and quota assign ioctls" }, - "CVE-2016-2069": { - "cmt_msg": "x86/mm: Add barriers and document switch_mm()-vs-flush synchronization", - "cmt_id": "aa8f21d06e61b029341c51b17edd68ba15fe0e47" + "CVE-2021-3772": { + "cmt_msg": "sctp: use init_tag from inithdr for ABORT chunk" }, - "CVE-2016-7910": { - "cmt_msg": "block: fix use-after-free in seq file", - "cmt_id": "8b85bc8b9e08482c7450b83e0a85532d8d87da49" + "CVE-2013-3231": { + "cmt_msg": "llc: Fix missing msg_namelen update in llc_ui_recvmsg()" }, - "CVE-2016-5696": { - "cmt_msg": "tcp: make challenge acks less predictable", - "cmt_id": "56d86b8ad437e6c19dcade9ff7c3d9c0522df6f3" + "CVE-2021-3679": { + "cmt_msg": "tracing: Fix bug in rb_per_cpu_empty() that might cause deadloop." }, - "CVE-2016-3857": { - "cmt_msg": "arm: oabi compat: add missing access checks", - "cmt_id": "3d207c4c414adc515aa666f2b010f6e85c5528a7" - } - }, - "3.12.64": { - "CVE-2016-6130": { - "cmt_msg": "s390/sclp_ctl: fix potential information leak with /dev/sclp", - "cmt_id": "6ec8ba03f408beac5bad1e9ec06c8a90b373f3ac" + "CVE-2021-37159": { + "cmt_msg": "usb: hso: fix error handling code of hso_create_net_device" }, - "CVE-2016-9178": { - "cmt_msg": "fix minor infoleak in get_user_ex()", - "cmt_id": "d42924ab1ec523c0671f5560d51750996be31d3a" + "CVE-2013-3235": { + "cmt_msg": "tipc: fix info leaks via msg_name in recv_msg/recv_stream" }, - "CVE-2016-6828": { - "cmt_msg": "tcp: fix use after free in tcp_xmit_retransmit_queue()", - "cmt_id": "1f25ea564d810767b4ce3302530156dd5ddaa0f4" + "CVE-2023-52517": { + "cmt_msg": "spi: sun6i: fix race between DMA RX transfer completion and RX FIFO drain" }, - "CVE-2016-6480": { - "cmt_msg": "aacraid: Check size values after double-fetch from user", - "cmt_id": "bcc85e09fc60d2e99053eae3fd0515c343189375" - } - }, - "3.12.65": { - "CVE-2016-6327": { - "cmt_msg": "IB/srpt: Simplify srpt_handle_tsk_mgmt()", - "cmt_id": "979f1b7344634315d895025b53b002896057c09d" + "CVE-2021-34556": { + "cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4" }, - "CVE-2017-15102": { - "cmt_msg": "usb: misc: legousbtower: Fix NULL pointer deference", - "cmt_id": "55b6c165bdf9b2808137cc5d49066e8a5344622a" - } - }, - "3.12.66": { - "CVE-2016-5195": { - "cmt_msg": "mm: remove gup_flags FOLL_WRITE games from __get_user_pages()", - "cmt_id": "f949fcd7414197b8e04b07c480d36bc39332ff7b" + "CVE-2021-28713": { + "cmt_msg": "xen/console: harden hvc_xen against event channel storms" }, - "CVE-2016-8658": { - "cmt_msg": "brcmfmac: avoid potential stack overflow in brcmf_cfg80211_start_ap()", - "cmt_id": "bfce0a403535f6071a08d6365b8c4b3cfeba2d67" - } - }, - "3.12.67": { - "CVE-2016-7425": { - "cmt_msg": "scsi: arcmsr: Buffer overflow in arcmsr_iop_message_xfer()", - "cmt_id": "e50a611253c70bdb3fad29b7a3411c3b1237cc8e" - } - }, - "3.12.68": { - "CVE-2015-9004": { - "cmt_msg": "perf: Tighten (and fix) the grouping condition", - "cmt_id": "5e08a111b0a076648039fb2a08d6e101a6af9388" + "CVE-2021-28712": { + "cmt_msg": "xen/netfront: harden netfront against event channel storms" }, - "CVE-2016-3961": { - "cmt_msg": "x86/mm/xen: Suppress hugetlbfs in PV guests", - "cmt_id": "b0363263e57199808d17e597df74cbdb28abbe55" + "CVE-2021-28711": { + "cmt_msg": "xen/blkfront: harden blkfront against event channel storms" }, - "CVE-2016-7042": { - "cmt_msg": "KEYS: Fix short sprintf buffer in /proc/keys show function", - "cmt_id": "cd93b7f830c1fa1cb35146c701ce8eecb2b19c44" + "CVE-2022-1247": { + "cmt_msg": "" }, - "CVE-2016-8645": { - "cmt_msg": "tcp: take care of truncations done by sk_filter()", - "cmt_id": "9edbcfdced9628dfdc6dc54d625e571aef81a8a5" + "CVE-2023-51782": { + "cmt_msg": "net/rose: Fix Use-After-Free in rose_ioctl" }, - "CVE-2016-8633": { - "cmt_msg": "firewire: net: guard against rx buffer overflows", - "cmt_id": "488c5d8218f38a4c6aa90a65b81492e868a251fd" + "CVE-2022-3621": { + "cmt_msg": "nilfs2: fix NULL pointer dereference at nilfs_bmap_lookup_at_level()" }, - "CVE-2015-8964": { - "cmt_msg": "tty: Prevent ldisc drivers from re-using stale tty fields", - "cmt_id": "e1a77178a3ecee0f5e70568e9ddb99bd7d0c5ee7" + "CVE-2022-23960": { + "cmt_msg": "ARM: report Spectre v2 status through sysfs" }, - "CVE-2016-9555": { - "cmt_msg": "sctp: validate chunk len before actually using it", - "cmt_id": "fb77271c550e1414597dfac77202d85bd866f0a9" - } - }, - "3.12.69": { - "CVE-2016-9793": { - "cmt_msg": "net: avoid signed overflows for SO_{SND|RCV}BUFFORCE", - "cmt_id": "40c753f1714416931dc093b960aa3fcac4a545c5" + "CVE-2017-11472": { + "cmt_msg": "ACPICA: Namespace: fix operand cache leak" }, - "CVE-2016-8650": { - "cmt_msg": "mpi: Fix NULL ptr dereference in mpi_powm()", - "cmt_id": "18fb7a8fb3d55275fc17f4ff5c7e34dd2b6d74e5" + "CVE-2022-3624": { + "cmt_msg": "bonding: fix reference count leak in balance-alb mode" }, - "CVE-2016-10200": { - "cmt_msg": "l2tp: fix racy SOCK_ZAPPED flag check in l2tp_ip{,6}_bind()", - "cmt_id": "c20932ae0d412f1aabf3514891cdd6ae6a08ae01" + "CVE-2016-9120": { + "cmt_msg": "staging/android/ion : fix a race condition in the ion driver" }, - "CVE-2016-9794": { - "cmt_msg": "ALSA: pcm : Call kill_fasync() in stream lock", - "cmt_id": "3af0be0536e71b0ed55620aca65f9144bf2c1088" + "CVE-2021-3669": { + "cmt_msg": "ipc: replace costly bailout check in sysvipc_find_ipc()" }, - "CVE-2016-8655": { - "cmt_msg": "packet: fix race condition in packet_set_ring", - "cmt_id": "c80480c4ad5208431a7fb003472bd576bbe6ebb7" - } - }, - "3.12.70": { - "CVE-2016-9083": { - "cmt_msg": "vfio/pci: Fix integer overflows, bitmask check", - "cmt_id": "e4f13c5f27d6bfb2fea565d346273b0c74023ae6" + "CVE-2019-18885": { + "cmt_msg": "btrfs: merge btrfs_find_device and find_device" }, - "CVE-2016-10088": { - "cmt_msg": "sg_write()/bsg_write() is not fit to be called under KERNEL_DS", - "cmt_id": "7eb9e6472cbdd8e2df774ae91531c8959e21dbbc" + "CVE-2020-10708": { + "cmt_msg": "" }, - "CVE-2017-5549": { - "cmt_msg": "USB: serial: kl5kusb105: fix line-state error handling", - "cmt_id": "9ed06d4fa06cce8f37637771000f0eded3a6d572" + "CVE-2019-11091": { + "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" }, - "CVE-2017-7273": { - "cmt_msg": "HID: hid-cypress: validate length of report", - "cmt_id": "5bc00ccfce098d09c1aa097806660d9709fbe956" + "CVE-2014-9914": { + "cmt_msg": "ipv4: fix a race in ip4_datagram_release_cb()" }, - "CVE-2017-7495": { - "cmt_msg": "ext4: fix data exposure after a crash", - "cmt_id": "10de8b686e90eb57066cf4d04d7ddbc54b4f1833" + "CVE-2022-4543": { + "cmt_msg": "" }, - "CVE-2016-7097": { - "cmt_msg": "posix_acl: Clear SGID bit when setting file permissions", - "cmt_id": "a88a2be387d1d8a5843826e12009c79e32fb46c8" + "CVE-2023-52571": { + "cmt_msg": "power: supply: rk817: Fix node refcount leak" }, - "CVE-2016-9588": { - "cmt_msg": "kvm: nVMX: Allow L1 to intercept software exceptions (#BP and #OF)", - "cmt_id": "aaa9f982f5dc0a64bcc6d83cc78e690c757bcad8" + "CVE-2023-52572": { + "cmt_msg": "cifs: Fix UAF in cifs_demultiplex_thread()" }, - "CVE-2016-9084": { - "cmt_msg": "vfio/pci: Fix integer overflows, bitmask check", - "cmt_id": "e4f13c5f27d6bfb2fea565d346273b0c74023ae6" + "CVE-2022-3424": { + "cmt_msg": "misc: sgi-gru: fix use-after-free error in gru_set_context_option, gru_fault and gru_handle_user_call_os" }, - "CVE-2016-9191": { - "cmt_msg": "sysctl: Drop reference added by grab_header in proc_sys_readdir", - "cmt_id": "baa7295e1d686a443c0c23156b0bc9058d783aa4" + "CVE-2023-1829": { + "cmt_msg": "net/sched: Retire tcindex classifier" }, - "CVE-2016-7911": { - "cmt_msg": "block: fix use-after-free in sys_ioprio_get()", - "cmt_id": "075030bd3251283bd380b60eeecc8e4ba8778f22" + "CVE-2019-19227": { + "cmt_msg": "appletalk: Fix potential NULL pointer dereference in unregister_snap_client" }, - "CVE-2016-7913": { - "cmt_msg": "xc2028: avoid use after free", - "cmt_id": "74e3d04ca992bedac5080ed1a817fabf71667210" + "CVE-2021-34981": { + "cmt_msg": "Bluetooth: cmtp: fix file refcount when cmtp_attach_device fails" }, - "CVE-2017-5551": { - "cmt_msg": "tmpfs: clear S_ISGID when setting posix ACLs", - "cmt_id": "b0369e53c851f8cd87afd059d360a4f646840c8c" + "CVE-2023-1670": { + "cmt_msg": "xirc2ps_cs: Fix use after free bug in xirc2ps_detach" }, - "CVE-2017-2583": { - "cmt_msg": "KVM: x86: fix emulation of \"MOV SS, null selector\"", - "cmt_id": "f043f20c055e3485fb82e0955a9f94f50cdffe15" + "CVE-2023-6915": { + "cmt_msg": "ida: Fix crash in ida_free when the bitmap is empty" }, - "CVE-2015-8962": { - "cmt_msg": "sg: Fix double-free when drives detach during SG_IO", - "cmt_id": "969541196ff043df0bde0c4beae9d83185ea3d81" + "CVE-2022-20148": { + "cmt_msg": "f2fs: fix UAF in f2fs_available_free_memory" }, - "CVE-2017-2584": { - "cmt_msg": "KVM: x86: Introduce segmented_write_std", - "cmt_id": "544a81ed7dc176f400e2272595ac02f2791385a8" - } - }, - "3.12.71": { - "CVE-2017-6345": { - "cmt_msg": "net/llc: avoid BUG_ON() in skb_orphan()", - "cmt_id": "c112a93ae0bf3906150d3c7badd8ccc2708ad031" + "CVE-2018-9422": { + "cmt_msg": "futex: Remove requirement for lock_page() in get_futex_key()" }, - "CVE-2017-2618": { - "cmt_msg": "selinux: fix off-by-one in setprocattr", - "cmt_id": "8f52584d2277df36b41b45d0caa716640d562e09" + "CVE-2013-7445": { + "cmt_msg": "" }, - "CVE-2017-6074": { - "cmt_msg": "dccp: fix freeing skb too early for IPV6_RECVPKTINFO", - "cmt_id": "336d459d464a2d23b5df724ae5fb5cd92bc9074c" + "CVE-2021-0941": { + "cmt_msg": "bpf: Remove MTU check in __bpf_skb_max_len" }, - "CVE-2016-10208": { - "cmt_msg": "ext4: validate s_first_meta_bg at mount time", - "cmt_id": "bb878bdeaf6c48268322c2e4bdef0879902867aa" + "CVE-2023-34255": { + "cmt_msg": "xfs: verify buffer contents when we skip log replay" }, - "CVE-2017-5897": { - "cmt_msg": "ip6_gre: fix ip6gre_err() invalid reads", - "cmt_id": "1ae4b12d7643d9bdde764ef671440a8eaf6cfd55" + "CVE-2024-26738": { + "cmt_msg": "powerpc/pseries/iommu: DLPAR add doesn't completely initialize pci_controller" }, - "CVE-2017-6348": { - "cmt_msg": "irda: Fix lockdep annotations in hashbin_delete().", - "cmt_id": "7132afee391a91d58daa332e1851f1139889b0e3" + "CVE-2024-26739": { + "cmt_msg": "net/sched: act_mirred: don't override retval if we already lost the skb" }, - "CVE-2017-5970": { - "cmt_msg": "ipv4: keep skb->dst around in presence of IP options", - "cmt_id": "e5a82d662d35933e5511c0280e8513d38d9d4fa0" + "CVE-2022-38096": { + "cmt_msg": "" }, - "CVE-2016-8405": { - "cmt_msg": "fbdev: color map copying bounds checking", - "cmt_id": "63f6df889c8eff7d9455659941b615a428d6a7b4" + "CVE-2021-34693": { + "cmt_msg": "can: bcm: fix infoleak in struct bcm_msg_head" }, - "CVE-2017-5986": { - "cmt_msg": "sctp: avoid BUG_ON on sctp_wait_for_sndbuf", - "cmt_id": "7a814bf5fc8b6738af64bc05d824a22d269962c6" + "CVE-2020-14381": { + "cmt_msg": "futex: Fix inode life-time issue" }, - "CVE-2017-6346": { - "cmt_msg": "packet: fix races in fanout_add()", - "cmt_id": "6d46193d7ccae0758a8e887a6897a3e133eb9610" + "CVE-2014-3180": { + "cmt_msg": "compat: nanosleep: Clarify error handling" }, - "CVE-2017-6214": { - "cmt_msg": "tcp: avoid infinite loop in tcp_splice_read()", - "cmt_id": "917c66630a6ab8a71464c9d57ea6fe14eca9b9fa" - } - }, - "3.12.72": { - "CVE-2017-6353": { - "cmt_msg": "sctp: deny peeloff operation on asocs with threads sleeping on it", - "cmt_id": "8aee8e6c2f0e8a9531a98a227e112fd4835a1881" + "CVE-2019-19768": { + "cmt_msg": "blktrace: Protect q->blk_trace with RCU" }, - "CVE-2017-2636": { - "cmt_msg": "tty: n_hdlc: get rid of racy n_hdlc.tbuf", - "cmt_id": "63075fbddd5151d2e98fa7cf0608a2113e23607d" + "CVE-2022-3303": { + "cmt_msg": "ALSA: pcm: oss: Fix race at SNDCTL_DSP_SYNC" }, - "CVE-2017-5669": { - "cmt_msg": "ipc/shm: Fix shmat mmap nil-page protection", - "cmt_id": "afa870b96a40e523f96130beeef6cdc51de4e8d9" - } - }, - "3.12.73": { - "CVE-2017-7184": { - "cmt_msg": "xfrm_user: validate XFRM_MSG_NEWAE XFRMA_REPLAY_ESN_VAL replay_window", - "cmt_id": "be4f4140ab3e8d4142f47c79b0a29f0ec53540b5" + "CVE-2017-8797": { + "cmt_msg": "nfsd: fix undefined behavior in nfsd4_layout_verify" }, - "CVE-2016-2188": { - "cmt_msg": "USB: iowarrior: fix NULL-deref at probe", - "cmt_id": "793b927173199800010a37da93c92e603a1136ce" + "CVE-2022-20141": { + "cmt_msg": "igmp: Add ip_mc_list lock in ip_check_mc_rcu" }, - "CVE-2017-8924": { - "cmt_msg": "USB: serial: io_ti: fix information leak in completion handler", - "cmt_id": "ef598b806384182a74f2aa9bc24a0284faf3940e" + "CVE-2023-23455": { + "cmt_msg": "net: sched: atm: dont intepret cls results when asked to drop" }, - "CVE-2017-8925": { - "cmt_msg": "USB: serial: omninet: fix reference leaks at open", - "cmt_id": "5b6983c42e4406e92b51a705c24190e1054cb60d" - } - }, - "3.12.74": { - "CVE-2017-7294": { - "cmt_msg": "drm/vmwgfx: fix integer overflow in vmw_surface_define_ioctl()", - "cmt_id": "e7fea2a4fa3719517f9a48389e7f3c8b1cc8c299" + "CVE-2023-23454": { + "cmt_msg": "net: sched: cbq: dont intepret cls results when asked to drop" }, - "CVE-2017-7645": { - "cmt_msg": "nfsd: check for oversized NFSv2/v3 arguments", - "cmt_id": "7a6875988a7fce567e4ee22481d6e7dd82a33eff" + "CVE-2017-15116": { + "cmt_msg": "crypto: rng - Remove old low-level rng interface" }, - "CVE-2017-6951": { - "cmt_msg": "KEYS: Remove key_type::match in favour of overriding default by match_preparse", - "cmt_id": "716aa8781692706c78bea54b1efd4269d15d4071" + "CVE-2018-3620": { + "cmt_msg": "x86/microcode: Allow late microcode loading with SMT disabled" }, - "CVE-2017-8064": { - "cmt_msg": "dvb-usb-v2: avoid use-after-free", - "cmt_id": "03662cd00e03d0fe34f9f91217313a4544b71c60" + "CVE-2023-6932": { + "cmt_msg": "ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet" }, - "CVE-2017-7261": { - "cmt_msg": "drm/vmwgfx: NULL pointer dereference in vmw_surface_define_ioctl()", - "cmt_id": "13a6a971c9165237531c2870da03084a6becc905" + "CVE-2020-16166": { + "cmt_msg": "random32: update the net random state on interrupt and activity" }, - "CVE-2017-2671": { - "cmt_msg": "ping: implement proper locking", - "cmt_id": "10e710684943bfd0653d7f0bcf430cdaf25a0d2f" + "CVE-2021-29155": { + "cmt_msg": "bpf: Use correct permission flag for mixed signed bounds arithmetic" }, - "CVE-2017-7308": { - "cmt_msg": "net/packet: fix overflow in check for priv area size", - "cmt_id": "0a39eb8a881e83154aadacc36fc8bda8258f1991" + "CVE-2019-15916": { + "cmt_msg": "net-sysfs: Fix mem leak in netdev_register_kobject" }, - "CVE-2017-2647": { - "cmt_msg": "KEYS: Remove key_type::match in favour of overriding default by match_preparse", - "cmt_id": "716aa8781692706c78bea54b1efd4269d15d4071" + "CVE-2019-15917": { + "cmt_msg": "Bluetooth: hci_ldisc: Postpone HCI_UART_PROTO_READY bit set in hci_uart_set_proto()" }, - "CVE-2017-7889": { - "cmt_msg": "mm: Tighten x86 /dev/mem with zeroing reads", - "cmt_id": "59546b98395d875f4f85cb1cbac0b5396e3ffe45" + "CVE-2013-4129": { + "cmt_msg": "bridge: fix some kernel warning in multicast timer" }, - "CVE-2017-7472": { - "cmt_msg": "KEYS: fix keyctl_set_reqkey_keyring() to not leak thread keyrings", - "cmt_id": "e5b32c157bdd74cb0b402506c647222e59c6c11c" + "CVE-2024-26598": { + "cmt_msg": "KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache" }, - "CVE-2017-7616": { - "cmt_msg": "mm/mempolicy.c: fix error handling in set_mempolicy and mbind.", - "cmt_id": "9840e8fb9edaa9a930eb6f922f61cfbf91073c51" + "CVE-2024-26768": { + "cmt_msg": "LoongArch: Change acpi_core_pic[NR_CPUS] to acpi_core_pic[MAX_CORE_PIC]" }, - "CVE-2016-9604": { - "cmt_msg": "KEYS: Disallow keyrings beginning with '.' to be joined as session keyrings", - "cmt_id": "7c46e24ef54c73c7db075d3ff4df0d3b996ac759" - } - }, - "outstanding": { - "CVE-2020-36322": { - "cmt_msg": "fuse: fix bad inode" + "CVE-2020-12362": { + "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" }, - "CVE-2020-35508": { - "cmt_msg": "fork: fix copy_process(CLONE_PARENT) race with the exiting ->real_parent" + "CVE-2020-12363": { + "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" }, - "CVE-2022-3649": { - "cmt_msg": "nilfs2: fix use-after-free bug of struct nilfs_root" + "CVE-2019-12881": { + "cmt_msg": "drm/i915/userptr: reject zero user_size" }, - "CVE-2020-35501": { - "cmt_msg": "" + "CVE-2022-4129": { + "cmt_msg": "l2tp: Serialize access to sk_user_data with sk_callback_lock" }, - "CVE-2019-15098": { - "cmt_msg": "ath6kl: fix a NULL-ptr-deref bug in ath6kl_usb_alloc_urb_from_pipe()" + "CVE-2020-12364": { + "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" }, - "CVE-2021-45095": { - "cmt_msg": "phonet: refcount leak in pep_sock_accep" + "CVE-2023-52607": { + "cmt_msg": "powerpc/mm: Fix null-pointer dereference in pgtable_cache_add" }, - "CVE-2017-10663": { - "cmt_msg": "f2fs: sanity check checkpoint segno and blkoff" + "CVE-2024-26646": { + "cmt_msg": "thermal: intel: hfi: Add syscore callbacks for system-wide PM" }, - "CVE-2023-3611": { - "cmt_msg": "net/sched: sch_qfq: account for stab overhead in qfq_enqueue" + "CVE-2018-18690": { + "cmt_msg": "xfs: don't fail when converting shortform attr to long form during ATTR_REPLACE" }, - "CVE-2022-0001": { - "cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE" + "CVE-2024-26644": { + "cmt_msg": "btrfs: don't abort filesystem when attempting to snapshot deleted subvolume" }, - "CVE-2020-12464": { - "cmt_msg": "USB: core: Fix free-while-in-use bug in the USB S-Glibrary" + "CVE-2024-26656": { + "cmt_msg": "drm/amdgpu: fix use-after-free bug" }, - "CVE-2017-10662": { - "cmt_msg": "f2fs: sanity check segment count" + "CVE-2021-3896": { + "cmt_msg": "isdn: cpai: check ctr->cnr to avoid array index out of bound" }, - "CVE-2019-19965": { - "cmt_msg": "scsi: libsas: stop discovering if oob mode is disconnected" + "CVE-2016-7917": { + "cmt_msg": "netfilter: nfnetlink: correctly validate length of batch messages" }, - "CVE-2019-19966": { - "cmt_msg": "media: cpia2: Fix use-after-free in cpia2_exit" + "CVE-2023-52519": { + "cmt_msg": "HID: intel-ish-hid: ipc: Disable and reenable ACPI GPE bit" }, - "CVE-2022-1184": { - "cmt_msg": "ext4: verify dir block before splitting it" + "CVE-2023-52445": { + "cmt_msg": "media: pvrusb2: fix use after free on context disconnection" }, - "CVE-2020-24587": { - "cmt_msg": "mac80211: prevent mixed key and fragment cache attacks" + "CVE-2019-16232": { + "cmt_msg": "libertas: fix a potential NULL pointer dereference" }, - "CVE-2020-24586": { - "cmt_msg": "mac80211: prevent mixed key and fragment cache attacks" + "CVE-2024-26791": { + "cmt_msg": "btrfs: dev-replace: properly validate device names" }, - "CVE-2017-1000410": { - "cmt_msg": "Bluetooth: Prevent stack info leak from the EFS element." + "CVE-2019-20811": { + "cmt_msg": "net-sysfs: call dev_hold if kobject_init_and_add success" }, - "CVE-2022-3642": { - "cmt_msg": "" + "CVE-2019-20812": { + "cmt_msg": "af_packet: set defaule value for tmo" }, - "CVE-2021-0129": { - "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical" + "CVE-2023-52600": { + "cmt_msg": "jfs: fix uaf in jfs_evict_inode" }, - "CVE-2019-20096": { - "cmt_msg": "dccp: Fix memleak in __feat_register_sp" + "CVE-2020-14314": { + "cmt_msg": "ext4: fix potential negative array index in do_split()" }, - "CVE-2023-42755": { - "cmt_msg": "net/sched: Retire rsvp classifier" + "CVE-2023-52601": { + "cmt_msg": "jfs: fix array-index-out-of-bounds in dbAdjTree" }, - "CVE-2016-10044": { - "cmt_msg": "aio: mark AIO pseudo-fs noexec" + "CVE-2018-25020": { + "cmt_msg": "bpf: fix truncated jump targets on heavy expansions" }, - "CVE-2018-10940": { - "cmt_msg": "cdrom: information leak in cdrom_ioctl_media_changed()" + "CVE-2022-26373": { + "cmt_msg": "x86/speculation: Add RSB VM Exit protections" }, - "CVE-2023-31081": { + "CVE-2018-5995": { + "cmt_msg": "printk: hash addresses printed with %p" + }, + "CVE-2019-18660": { + "cmt_msg": "powerpc/book3s64: Fix link stack flush on context switch" + }, + "CVE-2019-15291": { + "cmt_msg": "media: b2c2-flexcop-usb: add sanity checking" + }, + "CVE-2019-15290": { "cmt_msg": "" }, - "CVE-2018-10087": { - "cmt_msg": "kernel/exit.c: avoid undefined behaviour when calling wait4()" + "CVE-2023-3212": { + "cmt_msg": "gfs2: Don't deref jdesc in evict" }, - "CVE-2021-39634": { - "cmt_msg": "epoll: do not insert into poll queues until all sanity checks are done" + "CVE-2024-23848": { + "cmt_msg": "" }, - "CVE-2019-9503": { - "cmt_msg": "brcmfmac: add subtype check for event handling in data path" + "CVE-2021-46904": { + "cmt_msg": "net: hso: fix null-ptr-deref during tty device unregistration" }, - "CVE-2020-36158": { - "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_cmd_802_11_ad_hoc_start" + "CVE-2024-26633": { + "cmt_msg": "ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim()" }, - "CVE-2023-3159": { - "cmt_msg": "firewire: fix potential uaf in outbound_phy_packet_callback()" + "CVE-2018-7273": { + "cmt_msg": "printk: hash addresses printed with %p" }, - "CVE-2022-0480": { - "cmt_msg": "memcg: enable accounting for file lock caches" + "CVE-2024-26778": { + "cmt_msg": "fbdev: savage: Error out if pixclock equals zero" }, - "CVE-2018-10124": { - "cmt_msg": "kernel/signal.c: avoid undefined behaviour in kill_something_info" + "CVE-2023-4459": { + "cmt_msg": "net: vmxnet3: fix possible NULL pointer dereference in vmxnet3_rq_cleanup()" }, - "CVE-2023-52429": { - "cmt_msg": "dm: limit the number of targets and parameter size area" + "CVE-2023-52532": { + "cmt_msg": "net: mana: Fix TX CQE error handling" }, - "CVE-2021-28964": { - "cmt_msg": "btrfs: fix race when cloning extent buffer during rewind of an old root" + "CVE-2024-26635": { + "cmt_msg": "llc: Drop support for ETH_P_TR_802_2." }, - "CVE-2020-26558": { - "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical" + "CVE-2022-23036": { + "cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()" }, - "CVE-2021-0920": { - "cmt_msg": "af_unix: fix garbage collect vs MSG_PEEK" + "CVE-2023-52639": { + "cmt_msg": "KVM: s390: vsie: fix race during shadow creation" }, - "CVE-2022-23825": { + "CVE-2024-2193": { "cmt_msg": "" }, - "CVE-2021-3847": { - "cmt_msg": "" + "CVE-2022-20566": { + "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free caused by l2cap_chan_put" }, - "CVE-2022-1974": { - "cmt_msg": "nfc: replace improper check device_is_registered() in netlink related functions" + "CVE-2018-12930": { + "cmt_msg": "" }, - "CVE-2024-26588": { - "cmt_msg": "LoongArch: BPF: Prevent out-of-bounds memory access" + "CVE-2018-12931": { + "cmt_msg": "" }, - "CVE-2022-21125": { - "cmt_msg": "x86/speculation/mmio: Reuse SRBDS mitigation for SBDS" + "CVE-2024-23196": { + "cmt_msg": "ALSA: hda: fix a possible null-pointer dereference due to data race in snd_hdac_regmap_sync()" }, - "CVE-2019-19241": { - "cmt_msg": "io_uring: async workers should inherit the user creds" + "CVE-2020-12769": { + "cmt_msg": "spi: spi-dw: Add lock protect dw_spi rx/tx to prevent concurrent calls" }, - "CVE-2022-21123": { - "cmt_msg": "x86/speculation/mmio: Add mitigation for Processor MMIO Stale Data" + "CVE-2024-26765": { + "cmt_msg": "LoongArch: Disable IRQ before init_fn() for nonboot CPUs" }, - "CVE-2021-28688": { - "cmt_msg": "xen-blkback: don't leak persistent grants from xen_blkbk_map()" + "CVE-2019-15292": { + "cmt_msg": "appletalk: Fix use-after-free in atalk_proc_exit" }, - "CVE-2021-39686": { - "cmt_msg": "binder: use euid from cred instead of using task" + "CVE-2023-52609": { + "cmt_msg": "binder: fix race between mmput() and do_exit()" }, - "CVE-2021-39685": { - "cmt_msg": "USB: gadget: detect too-big endpoint 0 requests" + "CVE-2021-32399": { + "cmt_msg": "bluetooth: eliminate the potential race condition when removing the HCI controller" }, - "CVE-2023-6535": { - "cmt_msg": "" + "CVE-2019-12381": { + "cmt_msg": "ip_sockglue: Fix missing-check bug in ip_ra_control()" }, - "CVE-2021-43975": { - "cmt_msg": "atlantic: Fix OOB read and write in hw_atl_utils_fw_rpc_wait" + "CVE-2019-12382": { + "cmt_msg": "drm/edid: Fix a missing-check bug in drm_load_edid_firmware()" }, - "CVE-2018-6927": { - "cmt_msg": "futex: Prevent overflow by strengthen input validation" + "CVE-2017-10810": { + "cmt_msg": "drm/virtio: don't leak bo on drm_gem_object_init failure" }, - "CVE-2020-0466": { - "cmt_msg": "do_epoll_ctl(): clean the failure exits up a bit" + "CVE-2022-24958": { + "cmt_msg": "usb: gadget: don't release an existing dev->buf" }, - "CVE-2019-10207": { - "cmt_msg": "Bluetooth: hci_uart: check for missing tty operations" + "CVE-2022-20166": { + "cmt_msg": "drivers core: Use sysfs_emit and sysfs_emit_at for show(device *...) functions" }, - "CVE-2019-14835": { - "cmt_msg": "vhost: make sure log_num < in_num" + "CVE-2023-52633": { + "cmt_msg": "um: time-travel: fix time corruption" }, - "CVE-2023-0459": { - "cmt_msg": "uaccess: Add speculation barrier to copy_from_user()" + "CVE-2020-36780": { + "cmt_msg": "i2c: sprd: fix reference leak when pm_runtime_get_sync fails" }, - "CVE-2023-0458": { - "cmt_msg": "prlimit: do_prlimit needs to have a speculation check" + "CVE-2020-36781": { + "cmt_msg": "i2c: imx: fix reference leak when pm_runtime_get_sync fails" }, - "CVE-2018-1000204": { - "cmt_msg": "scsi: sg: allocate with __GFP_ZERO in sg_build_indirect()" + "CVE-2020-10766": { + "cmt_msg": "x86/speculation: Prevent rogue cross-process SSBD shutdown" }, - "CVE-2023-0597": { - "cmt_msg": "x86/mm: Randomize per-cpu entry area" + "CVE-2017-13166": { + "cmt_msg": "media: v4l2-ioctl.c: use check_fmt for enum/g/s/try_fmt" }, - "CVE-2019-12379": { - "cmt_msg": "consolemap: Fix a memory leaking bug in drivers/tty/vt/consolemap.c" + "CVE-2019-25160": { + "cmt_msg": "netlabel: fix out-of-bounds memory accesses" }, - "CVE-2017-12134": { - "cmt_msg": "xen: fix bio vec merging" + "CVE-2018-12207": { + "cmt_msg": "kvm: x86, powerpc: do not allow clearing largepages debugfs entry" }, - "CVE-2021-30002": { - "cmt_msg": "media: v4l: ioctl: Fix memory leak in video_usercopy" + "CVE-2022-20369": { + "cmt_msg": "media: v4l2-mem2mem: Apply DST_QUEUE_OFF_BASE on MMAP buffers across ioctls" }, - "CVE-2017-17450": { - "cmt_msg": "netfilter: xt_osf: Add missing permission checks" + "CVE-2020-10768": { + "cmt_msg": "x86/speculation: PR_SPEC_FORCE_DISABLE enforcement for indirect branches." }, - "CVE-2021-0941": { - "cmt_msg": "bpf: Remove MTU check in __bpf_skb_max_len" + "CVE-2017-13168": { + "cmt_msg": "scsi: sg: mitigate read/write abuse" }, - "CVE-2015-4176": { - "cmt_msg": "mnt: Update detach_mounts to leave mounts connected" + "CVE-2024-25740": { + "cmt_msg": "" }, - "CVE-2016-3672": { - "cmt_msg": "x86/mm/32: Enable full randomization on i386 and X86_32" + "CVE-2022-2978": { + "cmt_msg": "fs: fix UAF/GPF bug in nilfs_mdt_destroy" }, - "CVE-2024-26591": { - "cmt_msg": "bpf: Fix re-attachment branch in bpf_tracing_prog_attach" + "CVE-2019-17075": { + "cmt_msg": "RDMA/cxgb4: Do not dma memory off of the stack" }, - "CVE-2020-15802": { - "cmt_msg": "" + "CVE-2022-3903": { + "cmt_msg": "media: mceusb: Use new usb_control_msg_*() routines" }, - "CVE-2024-26594": { - "cmt_msg": "ksmbd: validate mech token in session setup" + "CVE-2019-19447": { + "cmt_msg": "ext4: work around deleting a file with i_nlink == 0 safely" }, - "CVE-2023-4623": { - "cmt_msg": "net/sched: sch_hfsc: Ensure inner classes have fsc curve" + "CVE-2023-20588": { + "cmt_msg": "x86/CPU/AMD: Do not leak quotient data after a division by 0" }, - "CVE-2017-18270": { - "cmt_msg": "KEYS: prevent creating a different user's keyrings" + "CVE-2020-10942": { + "cmt_msg": "vhost: Check docket sk_family instead of call getname" }, - "CVE-2022-3636": { - "cmt_msg": "net: ethernet: mtk_eth_soc: use after free in __mtk_ppe_check_skb()" + "CVE-2018-3693": { + "cmt_msg": "ext4: fix spectre gadget in ext4_mb_regular_allocator()" }, - "CVE-2022-3635": { - "cmt_msg": "atm: idt77252: fix use-after-free bugs caused by tst_timer" + "CVE-2021-47070": { + "cmt_msg": "uio_hv_generic: Fix another memory leak in error handling paths" }, - "CVE-2022-0002": { - "cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE" + "CVE-2019-1999": { + "cmt_msg": "binder: fix race between munmap() and direct reclaim" }, - "CVE-2023-5178": { - "cmt_msg": "nvmet-tcp: Fix a possible UAF in queue intialization setup" + "CVE-2019-11190": { + "cmt_msg": "binfmt_elf: switch to new creds when switching to new mm" }, - "CVE-2015-4178": { - "cmt_msg": "fs_pin: Allow for the possibility that m_list or s_list go unused." + "CVE-2019-11191": { + "cmt_msg": "x86: Deprecate a.out support" }, - "CVE-2016-10906": { - "cmt_msg": "net: arc_emac: fix koops caused by sk_buff free" + "CVE-2021-47076": { + "cmt_msg": "RDMA/rxe: Return CQE error if invalid lkey was supplied" }, - "CVE-2016-10905": { - "cmt_msg": "GFS2: don't set rgrp gl_object until it's inserted into rgrp tree" + "CVE-2021-47136": { + "cmt_msg": "net: zero-initialize tc skb extension on allocation" }, - "CVE-2022-3202": { - "cmt_msg": "jfs: prevent NULL deref in diFree" + "CVE-2021-47171": { + "cmt_msg": "net: usb: fix memory leak in smsc75xx_bind" }, - "CVE-2018-3646": { - "cmt_msg": "x86/microcode: Allow late microcode loading with SMT disabled" + "CVE-2016-5195": { + "cmt_msg": "mm: remove gup_flags FOLL_WRITE games from __get_user_pages()" }, - "CVE-2017-7518": { - "cmt_msg": "KVM: x86: fix singlestepping over syscall" + "CVE-2021-47173": { + "cmt_msg": "misc/uss720: fix memory leak in uss720_probe" }, - "CVE-2024-26584": { - "cmt_msg": "net: tls: handle backlogging of crypto requests" + "CVE-2022-36123": { + "cmt_msg": "x86: Clear .brk area at early boot" }, - "CVE-2024-24861": { - "cmt_msg": "" + "CVE-2021-47175": { + "cmt_msg": "net/sched: fq_pie: fix OOB access in the traffic path" }, - "CVE-2019-11477": { - "cmt_msg": "tcp: limit payload size of sacked skbs" + "CVE-2018-10323": { + "cmt_msg": "xfs: set format back to extents if xfs_bmap_extents_to_btree" }, - "CVE-2023-51043": { - "cmt_msg": "drm/atomic: Fix potential use-after-free in nonblocking commits" + "CVE-2018-10322": { + "cmt_msg": "xfs: enhance dinode verifier" }, - "CVE-2017-7895": { - "cmt_msg": "nfsd: stricter decoding of write-like NFSv2/v3 ops" + "CVE-2021-46951": { + "cmt_msg": "tpm: efi: Use local variable for calculating final log size" }, - "CVE-2018-14614": { - "cmt_msg": "f2fs: fix to do sanity check with cp_pack_start_sum" + "CVE-2021-46950": { + "cmt_msg": "md/raid1: properly indicate failure when ending a failed write request" }, - "CVE-2019-11479": { - "cmt_msg": "tcp: add tcp_min_snd_mss sysctl" + "CVE-2021-46952": { + "cmt_msg": "NFS: fs_context: validate UDP retrans to prevent shift out-of-bounds" }, - "CVE-2019-11478": { - "cmt_msg": "tcp: tcp_fragment() should apply sane memory limits" + "CVE-2021-46959": { + "cmt_msg": "spi: Fix use-after-free with devm_spi_alloc_*" }, - "CVE-2018-14611": { - "cmt_msg": "btrfs: validate type when reading a chunk" + "CVE-2013-1956": { + "cmt_msg": "userns: Don't allow creation if the user is chrooted" }, - "CVE-2018-14610": { - "cmt_msg": "btrfs: Check that each block group has corresponding chunk at mount time" + "CVE-2016-9644": { + "cmt_msg": "x86/mm: Expand the exception table logic to allow new handling options" }, - "CVE-2018-14613": { - "cmt_msg": "btrfs: tree-checker: Verify block_group_item" + "CVE-2020-26139": { + "cmt_msg": "mac80211: do not accept/forward invalid EAPOL frames" }, - "CVE-2018-14612": { - "cmt_msg": "btrfs: tree-checker: Detect invalid and empty essential trees" + "CVE-2023-3640": { + "cmt_msg": "" }, - "CVE-2020-26145": { - "cmt_msg": "ath10k: drop fragments with multicast DA for PCIe" + "CVE-2024-26772": { + "cmt_msg": "ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal()" }, - "CVE-2017-13216": { - "cmt_msg": "staging: android: ashmem: fix a race condition in ASHMEM_SET_SIZE ioctl" + "CVE-2019-10220": { + "cmt_msg": "Convert filldir[64]() from __put_user() to unsafe_put_user()" }, - "CVE-2017-13215": { - "cmt_msg": "crypto: algif_skcipher - Load TX SG list after waiting" + "CVE-2021-3609": { + "cmt_msg": "can: bcm: delay release of struct bcm_op after synchronize_rcu()" }, - "CVE-2018-5814": { - "cmt_msg": "usbip: usbip_host: fix NULL-ptr deref and use-after-free errors" + "CVE-2023-52595": { + "cmt_msg": "wifi: rt2x00: restart beacon queue when hardware reset" }, - "CVE-2020-26140": { - "cmt_msg": "" + "CVE-2017-13305": { + "cmt_msg": "KEYS: encrypted: fix buffer overread in valid_master_desc()" }, - "CVE-2020-26143": { - "cmt_msg": "" + "CVE-2019-19537": { + "cmt_msg": "USB: core: Fix races in character device registration and deregistraion" }, - "CVE-2020-26142": { - "cmt_msg": "" + "CVE-2019-19532": { + "cmt_msg": "HID: Fix assumption that devices have inputs" }, - "CVE-2019-17053": { - "cmt_msg": "ieee802154: enforce CAP_NET_RAW for raw sockets" + "CVE-2019-19533": { + "cmt_msg": "media: ttusb-dec: Fix info-leak in ttusb_dec_send_command()" }, - "CVE-2019-17052": { - "cmt_msg": "ax25: enforce CAP_NET_RAW for raw sockets" + "CVE-2019-10638": { + "cmt_msg": "inet: switch IP ID generator to siphash" }, - "CVE-2023-1077": { - "cmt_msg": "sched/rt: pick_next_rt_entity(): check list_entry" + "CVE-2019-10639": { + "cmt_msg": "netns: provide pure entropy for net_hash_mix()" }, - "CVE-2020-27418": { - "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region" + "CVE-2022-33981": { + "cmt_msg": "floppy: disable FDRAWCMD by default" }, - "CVE-2019-17056": { - "cmt_msg": "nfc: enforce CAP_NET_RAW for raw sockets" + "CVE-2021-0929": { + "cmt_msg": "staging/android/ion: delete dma_buf->kmap/unmap implemenation" }, - "CVE-2019-17055": { - "cmt_msg": "mISDN: enforce CAP_NET_RAW for raw sockets" + "CVE-2018-14616": { + "cmt_msg": "f2fs: fix to do sanity check with block address in main area v2" }, - "CVE-2019-17054": { - "cmt_msg": "appletalk: enforce CAP_NET_RAW for raw sockets" + "CVE-2023-52590": { + "cmt_msg": "ocfs2: Avoid touching renamed directory if parent does not change" }, - "CVE-2018-13093": { - "cmt_msg": "xfs: validate cached inodes are free when allocated" + "CVE-2018-19985": { + "cmt_msg": "USB: hso: Fix OOB memory access in hso_probe/hso_get_config_data" }, - "CVE-2023-51781": { - "cmt_msg": "appletalk: Fix Use-After-Free in atalk_ioctl" + "CVE-2018-6554": { + "cmt_msg": "staging: irda: remove the irda network stack and drivers" }, - "CVE-2018-13096": { - "cmt_msg": "f2fs: fix to do sanity check with node footer and iblocks" + "CVE-2018-6555": { + "cmt_msg": "staging: irda: remove the irda network stack and drivers" }, - "CVE-2018-13097": { - "cmt_msg": "f2fs: fix to do sanity check with user_block_count" + "CVE-2023-6546": { + "cmt_msg": "tty: n_gsm: fix the UAF caused by race condition in gsm_cleanup_mux" }, - "CVE-2018-13094": { - "cmt_msg": "xfs: don't call xfs_da_shrink_inode with NULL bp" + "CVE-2017-18255": { + "cmt_msg": "perf/core: Fix the perf_cpu_time_max_percent check" }, - "CVE-2018-13095": { - "cmt_msg": "xfs: More robust inode extent count validation" + "CVE-2022-0168": { + "cmt_msg": "cifs: fix NULL ptr dereference in smb2_ioctl_query_info()" }, - "CVE-2020-29661": { - "cmt_msg": "tty: Fix ->pgrp locking in tiocspgrp()" + "CVE-2019-9213": { + "cmt_msg": "mm: enforce min addr even if capable() in expand_downwards()" }, - "CVE-2020-29660": { - "cmt_msg": "tty: Fix ->session locking" + "CVE-2023-2007": { + "cmt_msg": "scsi: dpt_i2o: Remove obsolete driver" }, - "CVE-2018-13098": { - "cmt_msg": "f2fs: fix to do sanity check with extra_attr feature" + "CVE-2024-26672": { + "cmt_msg": "drm/amdgpu: Fix variable 'mca_funcs' dereferenced before NULL check in 'amdgpu_mca_smu_get_mca_entry()'" }, - "CVE-2014-9717": { - "cmt_msg": "mnt: Update detach_mounts to leave mounts connected" + "CVE-2019-14896": { + "cmt_msg": "libertas: Fix two buffer overflows at parsing bss descriptor" }, - "CVE-2023-28772": { - "cmt_msg": "seq_buf: Fix overflow in seq_buf_putmem_hex()" + "CVE-2019-14897": { + "cmt_msg": "libertas: Fix two buffer overflows at parsing bss descriptor" }, "CVE-2019-14895": { "cmt_msg": "mwifiex: fix possible heap overflow in mwifiex_process_country_ie()" }, - "CVE-2022-2588": { - "cmt_msg": "net_sched: cls_route: remove from list when handle is 0" + "CVE-2018-3665": { + "cmt_msg": "x86, fpu: decouple non-lazy/eager fpu restore from xsave" }, - "CVE-2019-11884": { - "cmt_msg": "Bluetooth: hidp: fix buffer overflow" + "CVE-2023-52522": { + "cmt_msg": "net: fix possible store tearing in neigh_periodic_work()" }, - "CVE-2015-8955": { - "cmt_msg": "arm64: perf: reject groups spanning multiple HW PMUs" + "CVE-2022-3586": { + "cmt_msg": "sch_sfb: Don't assume the skb is still around after enqueueing to child" }, - "CVE-2019-19074": { - "cmt_msg": "ath9k: release allocated buffer if timed out" + "CVE-2024-26592": { + "cmt_msg": "ksmbd: fix UAF issue in ksmbd_tcp_new_connection()" }, - "CVE-2019-19073": { - "cmt_msg": "ath9k_htc: release allocated buffer if timed out" + "CVE-2024-26636": { + "cmt_msg": "llc: make llc_ui_sendmsg() more robust against bonding changes" }, - "CVE-2015-9016": { - "cmt_msg": "blk-mq: fix race between timeout and freeing request" + "CVE-2024-26779": { + "cmt_msg": "wifi: mac80211: fix race condition on enabling fast-xmit" }, - "CVE-2015-8952": { - "cmt_msg": "ext2: convert to mbcache2" + "CVE-2023-52528": { + "cmt_msg": "net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg" }, - "CVE-2022-23038": { - "cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()" + "CVE-2019-2181": { + "cmt_msg": "binder: check for overflow when alloc for security context" }, - "CVE-2022-23039": { - "cmt_msg": "xen/gntalloc: don't use gnttab_query_foreign_access()" + "CVE-2020-27820": { + "cmt_msg": "drm/nouveau: use drm_dev_unplug() during device removal" }, - "CVE-2021-27363": { - "cmt_msg": "scsi: iscsi: Restrict sessions and handles to admin capabilities" + "CVE-2020-26141": { + "cmt_msg": "ath10k: Fix TKIP Michael MIC verification for PCIe" }, - "CVE-2022-20158": { - "cmt_msg": "net/packet: fix slab-out-of-bounds access in packet_recvmsg()" + "CVE-2023-39197": { + "cmt_msg": "netfilter: conntrack: dccp: copy entire header to stack buffer, not just basic one" }, - "CVE-2022-23037": { - "cmt_msg": "xen/netfront: don't use gnttab_query_foreign_access() for mapped status" + "CVE-2020-0066": { + "cmt_msg": "netlink: Trim skb to alloc size to avoid MSG_TRUNC" }, - "CVE-2020-0404": { - "cmt_msg": "media: uvcvideo: Avoid cyclic entity chains due to malformed USB descriptors" + "CVE-2020-26558": { + "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical" }, - "CVE-2019-15927": { - "cmt_msg": "ALSA: usb-audio: Avoid access before bLength check in build_audio_procunit()" + "CVE-2023-39193": { + "cmt_msg": "netfilter: xt_sctp: validate the flag_info count" }, - "CVE-2019-15926": { - "cmt_msg": "ath6kl: add some bounds checking" + "CVE-2023-39192": { + "cmt_msg": "netfilter: xt_u32: validate user space input" }, - "CVE-2019-14821": { - "cmt_msg": "KVM: coalesced_mmio: add bounds checking" + "CVE-2020-26541": { + "cmt_msg": "certs: Add EFI_CERT_X509_GUID support for dbx entries" }, - "CVE-2020-12826": { - "cmt_msg": "signal: Extend exec_id to 64bits" + "CVE-2023-6610": { + "cmt_msg": "smb: client: fix potential OOB in smb2_dump_detail()" }, - "CVE-2019-3701": { - "cmt_msg": "can: gw: ensure DLC boundaries after CAN frame modification" + "CVE-2020-26559": { + "cmt_msg": "" }, - "CVE-2021-42008": { - "cmt_msg": "net: 6pack: fix slab-out-of-bounds in decode_data" + "CVE-2021-20317": { + "cmt_msg": "lib/timerqueue: Rely on rbtree semantics for next timer" }, - "CVE-2022-44033": { - "cmt_msg": "char: pcmcia: remove all the drivers" + "CVE-2021-43389": { + "cmt_msg": "isdn: cpai: check ctr->cnr to avoid array index out of bound" }, - "CVE-2022-39188": { - "cmt_msg": "mmu_gather: Force tlb-flush VM_PFNMAP vmas" + "CVE-2023-3111": { + "cmt_msg": "btrfs: unset reloc control if transaction commit fails in prepare_to_relocate()" }, - "CVE-2018-20511": { - "cmt_msg": "net/appletalk: fix minor pointer leak to userspace in SIOCFINDIPDDPRT" + "CVE-2021-33061": { + "cmt_msg": "ixgbe: add improvement for MDD response functionality" }, - "CVE-2019-1125": { - "cmt_msg": "x86/speculation: Prepare entry code for Spectre v1 swapgs mitigations" + "CVE-2024-26764": { + "cmt_msg": "fs/aio: Restrict kiocb_set_cancel_fn() to I/O submitted via libaio" }, - "CVE-2019-15218": { - "cmt_msg": "media: usb: siano: Fix general protection fault in smsusb" + "CVE-2024-26767": { + "cmt_msg": "drm/amd/display: fixed integer types and null check locations" }, - "CVE-2020-25643": { - "cmt_msg": "hdlc_ppp: add range checks in ppp_cp_parse_cr()" + "CVE-2024-26766": { + "cmt_msg": "IB/hfi1: Fix sdma.h tx->num_descs off-by-one error" }, - "CVE-2005-3660": { + "CVE-2024-26763": { + "cmt_msg": "dm-crypt: don't modify the data when using authenticated encryption" + }, + "CVE-2023-1476": { "cmt_msg": "" }, - "CVE-2017-14106": { - "cmt_msg": "tcp: initialize rcv_mss to TCP_MIN_MSS instead of 0" + "CVE-2023-4010": { + "cmt_msg": "" }, - "CVE-2019-15212": { - "cmt_msg": "USB: rio500: refuse more than one device at a time" + "CVE-2023-1074": { + "cmt_msg": "sctp: fail if no bound addresses can be used for a given scope" }, - "CVE-2023-31085": { - "cmt_msg": "ubi: Refuse attaching if mtd's erasesize is 0" + "CVE-2017-18552": { + "cmt_msg": "RDS: validate the requested traces user input against max supported" }, - "CVE-2023-31084": { - "cmt_msg": "media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*()" + "CVE-2015-8839": { + "cmt_msg": "ext4: fix races between page faults and hole punching" }, - "CVE-2015-1350": { - "cmt_msg": "fs: Avoid premature clearing of capabilities" + "CVE-2022-1652": { + "cmt_msg": "floppy: use a statically allocated error counter" }, - "CVE-2019-14896": { - "cmt_msg": "libertas: Fix two buffer overflows at parsing bss descriptor" + "CVE-2024-26771": { + "cmt_msg": "dmaengine: ti: edma: Add some null pointer checks to the edma_probe" }, - "CVE-2017-1000380": { - "cmt_msg": "ALSA: timer: Fix race between read and ioctl" + "CVE-2020-29568": { + "cmt_msg": "xen/xenbus: Allow watches discard events before queueing" }, - "CVE-2017-16538": { - "cmt_msg": "media: dvb-usb-v2: lmedm04: Improve logic checking of warm start" + "CVE-2021-46932": { + "cmt_msg": "Input: appletouch - initialize work before device registration" }, - "CVE-2020-24588": { - "cmt_msg": "cfg80211: mitigate A-MSDU aggregation attacks" + "CVE-2019-9457": { + "cmt_msg": "exec: Limit arg stack to at most 75% of _STK_LIM" }, - "CVE-2021-33034": { - "cmt_msg": "Bluetooth: verify AMP hci_chan before amp_destroy" + "CVE-2019-19054": { + "cmt_msg": "media: rc: prevent memory leak in cx23888_ir_probe" }, - "CVE-2019-19922": { - "cmt_msg": "sched/fair: Fix low cpu usage with high throttling by removing expiration of cpu-local slices" + "CVE-2023-51043": { + "cmt_msg": "drm/atomic: Fix potential use-after-free in nonblocking commits" }, - "CVE-2019-19927": { - "cmt_msg": "drm/ttm: fix incrementing the page pointer for huge pages" + "CVE-2015-3290": { + "cmt_msg": "x86/nmi/64: Switch stacks on userspace NMI entry" }, - "CVE-2017-18509": { - "cmt_msg": "ipv6: check sk sk_type and protocol early in ip_mroute_set/getsockopt" + "CVE-2016-10741": { + "cmt_msg": "xfs: don't BUG() on mixed direct and mapped I/O" }, - "CVE-2020-27068": { - "cmt_msg": "cfg80211: add missing policy for NL80211_ATTR_STATUS_CODE" + "CVE-2023-20569": { + "cmt_msg": "x86/bugs: Increase the x86 bugs vector size to two u32s" }, - "CVE-2020-8648": { - "cmt_msg": "vt: selection, close sel_buffer race" + "CVE-2019-3846": { + "cmt_msg": "mwifiex: Fix possible buffer overflows at parsing bss descriptor" }, - "CVE-2022-32296": { - "cmt_msg": "tcp: increase source port perturb table to 2^16" + "CVE-2023-46838": { + "cmt_msg": "xen-netback: don't produce zero-size SKB frags" }, - "CVE-2017-11600": { - "cmt_msg": "xfrm: policy: check policy direction value" + "CVE-2020-0427": { + "cmt_msg": "pinctrl: devicetree: Avoid taking direct reference to device name string" }, - "CVE-2023-3567": { - "cmt_msg": "vc_screen: move load of struct vc_data pointer in vcs_read() to avoid UAF" + "CVE-2022-20424": { + "cmt_msg": "io_uring: remove io_identity" }, - "CVE-2019-20806": { - "cmt_msg": "media: tw5864: Fix possible NULL pointer dereference in tw5864_handle_frame" + "CVE-2019-9458": { + "cmt_msg": "media: v4l: event: Prevent freeing event subscriptions while accessed" }, - "CVE-2023-3108": { - "cmt_msg": "crypto: fix af_alg_make_sg() conversion to iov_iter" + "CVE-2023-40283": { + "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb" }, - "CVE-2022-3028": { - "cmt_msg": "af_key: Do not call xfrm_probe_algs in parallel" + "CVE-2023-6270": { + "cmt_msg": "aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts" }, - "CVE-2020-0305": { - "cmt_msg": "chardev: Avoid potential use-after-free in 'chrdev_open()'" + "CVE-2019-13272": { + "cmt_msg": "ptrace: Fix ->ptracer_cred handling for PTRACE_TRACEME" }, - "CVE-2020-14304": { - "cmt_msg": "" + "CVE-2023-3772": { + "cmt_msg": "xfrm: add NULL check in xfrm_update_ae_params" }, - "CVE-2010-5321": { - "cmt_msg": "" + "CVE-2023-45862": { + "cmt_msg": "USB: ene_usb6250: Allocate enough memory for full object" }, - "CVE-2020-15393": { - "cmt_msg": "usb: usbtest: fix missing kfree(dev->buf) in usbtest_disconnect" + "CVE-2023-45863": { + "cmt_msg": "kobject: Fix slab-out-of-bounds in fill_kobj_path()" }, - "CVE-2022-33981": { - "cmt_msg": "floppy: disable FDRAWCMD by default" + "CVE-2017-15537": { + "cmt_msg": "x86/fpu: Don't let userspace set bogus xcomp_bv" }, - "CVE-2021-3564": { - "cmt_msg": "Bluetooth: fix the erroneous flush_work() order" + "CVE-2019-17351": { + "cmt_msg": "xen: let alloc_xenballooned_pages() fail if not enough memory free" }, - "CVE-2019-9506": { - "cmt_msg": "Bluetooth: Fix faulty expression for minimum encryption key size check" + "CVE-2022-23222": { + "cmt_msg": "bpf: Replace PTR_TO_XXX_OR_NULL with PTR_TO_XXX | PTR_MAYBE_NULL" }, - "CVE-2023-1476": { + "CVE-2020-25669": { + "cmt_msg": "Input: sunkbd - avoid use-after-free in teardown paths" + }, + "CVE-2020-25668": { + "cmt_msg": "tty: make FONTX ioctl use the tty pointer they were actually passed" + }, + "CVE-2008-4609": { "cmt_msg": "" }, - "CVE-2017-16995": { - "cmt_msg": "bpf: fix incorrect sign extension in check_alu_op()" + "CVE-2023-52458": { + "cmt_msg": "block: add check that partition length needs to be aligned with block size" }, - "CVE-2019-18675": { - "cmt_msg": "mmap: introduce sane default mmap limits" + "CVE-2018-19824": { + "cmt_msg": "ALSA: usb-audio: Fix UAF decrement if card has no live interfaces in card.c" }, - "CVE-2019-2025": { - "cmt_msg": "binder: fix race that allows malicious free of live buffer" + "CVE-2018-20854": { + "cmt_msg": "phy: ocelot-serdes: fix out-of-bounds read" }, - "CVE-2020-26560": { - "cmt_msg": "" + "CVE-2017-15121": { + "cmt_msg": "mm: teach truncate_inode_pages_range() to handle non page aligned ranges" }, - "CVE-2023-4134": { - "cmt_msg": "Input: cyttsp4_core - change del_timer_sync() to timer_shutdown_sync()" + "CVE-2024-26648": { + "cmt_msg": "drm/amd/display: Fix variable deferencing before NULL check in edp_setup_replay()" }, - "CVE-2023-39198": { - "cmt_msg": "drm/qxl: fix UAF on handle creation" + "CVE-2022-21166": { + "cmt_msg": "x86/speculation/mmio: Enable CPU Fill buffer clearing on idle" }, - "CVE-2017-13080": { - "cmt_msg": "mac80211: accept key reinstall without changing anything" + "CVE-2023-26607": { + "cmt_msg": "ntfs: fix out-of-bounds read in ntfs_attr_find()" }, - "CVE-2021-20321": { - "cmt_msg": "ovl: fix missing negative dentry check in ovl_rename()" + "CVE-2023-52638": { + "cmt_msg": "can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock" }, - "CVE-2018-12127": { - "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" + "CVE-2019-15239": { + "cmt_msg": "" }, - "CVE-2018-12126": { - "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" + "CVE-2023-52635": { + "cmt_msg": "PM / devfreq: Synchronize devfreq_monitor_[start/stop]" }, - "CVE-2017-9077": { - "cmt_msg": "ipv6/dccp: do not inherit ipv6_mc_list from parent" + "CVE-2023-52634": { + "cmt_msg": "drm/amd/display: Fix disable_otg_wa logic" }, - "CVE-2017-9076": { - "cmt_msg": "ipv6/dccp: do not inherit ipv6_mc_list from parent" + "CVE-2023-52594": { + "cmt_msg": "wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus()" }, - "CVE-2017-9075": { - "cmt_msg": "sctp: do not inherit ipv6_{mc|ac|fl}_list from parent" + "CVE-2023-52632": { + "cmt_msg": "drm/amdkfd: Fix lock dependency warning with srcu" }, - "CVE-2017-9074": { - "cmt_msg": "ipv6: Prevent overrun when parsing v6 header options" + "CVE-2021-4037": { + "cmt_msg": "xfs: fix up non-directory creation in SGID directories" }, - "CVE-2022-20572": { - "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag" + "CVE-2021-22543": { + "cmt_msg": "KVM: do not allow mapping valid but non-reference-counted pages" }, - "CVE-2018-10021": { - "cmt_msg": "scsi: libsas: defer ata device eh commands to libata" + "CVE-2022-45884": { + "cmt_msg": "" }, - "CVE-2022-20132": { - "cmt_msg": "HID: add hid_is_usb() function to make it simpler for USB detection" + "CVE-2012-5375": { + "cmt_msg": "Btrfs: fix hash overflow handling" }, - "CVE-2020-0067": { - "cmt_msg": "f2fs: fix to avoid memory leakage in f2fs_listxattr" + "CVE-2012-5374": { + "cmt_msg": "Btrfs: fix hash overflow handling" }, - "CVE-2019-10126": { - "cmt_msg": "mwifiex: Fix heap overflow in mwifiex_uap_parse_tail_ies()" + "CVE-2023-20941": { + "cmt_msg": "" }, - "CVE-2019-13631": { - "cmt_msg": "Input: gtco - bounds check collection indent level" + "CVE-2018-1066": { + "cmt_msg": "CIFS: Enable encryption during session setup phase" }, - "CVE-2020-13974": { - "cmt_msg": "vt: keyboard: avoid signed integer overflow in k_ascii" + "CVE-2018-20836": { + "cmt_msg": "scsi: libsas: fix a race condition when smp task timeout" }, - "CVE-2016-6213": { - "cmt_msg": "mnt: Add a per mount namespace limit on the number of mounts" + "CVE-2020-10135": { + "cmt_msg": "Bluetooth: Consolidate encryption handling in hci_encrypt_cfm" }, - "CVE-2021-4083": { - "cmt_msg": "fget: check that the fd still exists after getting a ref to it" + "CVE-2024-26676": { + "cmt_msg": "af_unix: Call kfree_skb() for dead unix_(sk)->oob_skb in GC." }, - "CVE-2022-28356": { - "cmt_msg": "llc: fix netdevice reference leaks in llc_ui_bind()" + "CVE-2019-7308": { + "cmt_msg": "bpf: fix sanitation of alu op with pointer / scalar type from different paths" }, - "CVE-2023-33288": { - "cmt_msg": "power: supply: bq24190: Fix use after free bug in bq24190_remove due to race condition" + "CVE-2021-45868": { + "cmt_msg": "quota: check block number when reading the block in quota file" }, - "CVE-2017-17558": { - "cmt_msg": "USB: core: prevent malicious bNumInterfaces overflow" + "CVE-2022-1966": { + "cmt_msg": "netfilter: nf_tables: disallow non-stateful expression in sets earlier" }, - "CVE-2017-1000251": { - "cmt_msg": "Bluetooth: Properly check L2CAP config option output buffer length" + "CVE-2017-9986": { + "cmt_msg": "sound: Retire OSS" }, - "CVE-2022-29900": { - "cmt_msg": "x86/kvm/vmx: Make noinstr clean" + "CVE-2017-9985": { + "cmt_msg": "ALSA: msnd: Optimize / harden DSP and MIDI loops" }, - "CVE-2022-29901": { - "cmt_msg": "x86/kvm/vmx: Make noinstr clean" + "CVE-2017-9984": { + "cmt_msg": "ALSA: msnd: Optimize / harden DSP and MIDI loops" }, - "CVE-2017-8106": { - "cmt_msg": "KVM: nVMX: Don't advertise single context invalidation for invept" + "CVE-2022-3533": { + "cmt_msg": "" }, - "CVE-2023-3161": { - "cmt_msg": "fbcon: Check font dimension limits" + "CVE-2022-3534": { + "cmt_msg": "libbpf: Fix use-after-free in btf_dump_name_dups" }, - "CVE-2020-10751": { - "cmt_msg": "selinux: properly handle multiple messages in selinux_netlink_send()" + "CVE-2021-47135": { + "cmt_msg": "mt76: mt7921: fix possible AOOB issue in mt7921_mcu_tx_rate_report" }, - "CVE-2021-4002": { - "cmt_msg": "hugetlbfs: flush TLBs correctly after huge_pmd_unshare" + "CVE-2021-20261": { + "cmt_msg": "floppy: fix lock_fdc() signal handling" }, - "CVE-2018-9465": { - "cmt_msg": "binder: fix proc->files use-after-free" + "CVE-2021-47137": { + "cmt_msg": "net: lantiq: fix memory corruption in RX ring" }, - "CVE-2018-20510": { - "cmt_msg": "binder: replace \"%p\" with \"%pK\"" + "CVE-2021-47131": { + "cmt_msg": "net/tls: Fix use-after-free after the TLS device goes down and up" }, - "CVE-2020-15437": { - "cmt_msg": "serial: 8250: fix null-ptr-deref in serial8250_start_tx()" + "CVE-2021-47133": { + "cmt_msg": "HID: amd_sfh: Fix memory leak in amd_sfh_work" }, - "CVE-2020-15436": { - "cmt_msg": "block: Fix use-after-free in blkdev_get()" + "CVE-2024-26675": { + "cmt_msg": "ppp_async: limit MRU to 64K" }, - "CVE-2022-1116": { + "CVE-2023-28328": { + "cmt_msg": "media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer()" + }, + "CVE-2023-0386": { + "cmt_msg": "ovl: fail on invalid uid/gid mapping at copy up" + }, + "CVE-2017-13693": { "cmt_msg": "" }, - "CVE-2021-28660": { - "cmt_msg": "staging: rtl8188eu: prevent ->ssid overflow in rtw_wx_set_scan()" + "CVE-2017-13695": { + "cmt_msg": "ACPICA: acpi: acpica: fix acpi operand cache leak in nseval.c" }, - "CVE-2024-0775": { - "cmt_msg": "ext4: improve error recovery code paths in __ext4_remount()" + "CVE-2017-13694": { + "cmt_msg": "" }, - "CVE-2020-8647": { - "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region" + "CVE-2022-36879": { + "cmt_msg": "xfrm: xfrm_policy: fix a possible double xfrm_pols_put() in xfrm_bundle_lookup()" }, - "CVE-2022-23816": { - "cmt_msg": "x86/kvm/vmx: Make noinstr clean" + "CVE-2021-4149": { + "cmt_msg": "btrfs: unlock newly allocated extent buffer after error" }, - "CVE-2019-0154": { - "cmt_msg": "drm/i915: Lower RM timeout to avoid DSI hard hangs" + "CVE-2022-21385": { + "cmt_msg": "net/rds: fix warn in rds_message_alloc_sgs" }, - "CVE-2022-2961": { - "cmt_msg": "" + "CVE-2022-42895": { + "cmt_msg": "Bluetooth: L2CAP: Fix attempting to access uninitialized memory" }, - "CVE-2022-3567": { - "cmt_msg": "ipv6: Fix data races around sk->sk_prot." + "CVE-2021-3640": { + "cmt_msg": "Bluetooth: sco: Fix lock_sock() blockage by memcpy_from_msg()" }, - "CVE-2022-3566": { - "cmt_msg": "tcp: Fix data races around icsk->icsk_af_ops." + "CVE-2013-3225": { + "cmt_msg": "Bluetooth: RFCOMM - Fix missing msg_namelen update in rfcomm_sock_recvmsg()" }, - "CVE-2014-9922": { - "cmt_msg": "fs: limit filesystem stacking depth" + "CVE-2020-1749": { + "cmt_msg": "net: ipv6_stub: use ip6_dst_lookup_flow instead of ip6_dst_lookup" }, - "CVE-2022-3564": { - "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free caused by l2cap_reassemble_sdu" + "CVE-2013-3227": { + "cmt_msg": "caif: Fix missing msg_namelen update in caif_seqpkt_recvmsg()" }, - "CVE-2020-36386": { - "cmt_msg": "Bluetooth: Fix slab-out-of-bounds read in hci_extended_inquiry_result_evt()" + "CVE-2022-48626": { + "cmt_msg": "moxart: fix potential use-after-free on remove path" }, - "CVE-2020-36385": { - "cmt_msg": "RDMA/ucma: Rework ucma_migrate_id() to avoid races with destroy" + "CVE-2022-1786": { + "cmt_msg": "io_uring: remove io_identity" }, - "CVE-2022-1048": { - "cmt_msg": "ALSA: pcm: Fix races among concurrent hw_params and hw_free calls" + "CVE-2021-47180": { + "cmt_msg": "NFC: nci: fix memory leak in nci_allocate_device" }, - "CVE-2020-0009": { - "cmt_msg": "staging: android: ashmem: Disallow ashmem memory from being remapped" + "CVE-2022-48628": { + "cmt_msg": "ceph: drop messages from MDS when unmounting" }, - "CVE-2023-52340": { - "cmt_msg": "ipv6: remove max_size check inline with ipv4" + "CVE-2013-3228": { + "cmt_msg": "irda: Fix missing msg_namelen update in irda_recvmsg_dgram()" + }, + "CVE-2013-3229": { + "cmt_msg": "iucv: Fix missing msg_namelen update in iucv_sock_recvmsg()" + }, + "CVE-2020-28097": { + "cmt_msg": "vgacon: remove software scrollback support" + }, + "CVE-2024-24859": { + "cmt_msg": "" + }, + "CVE-2017-1000112": { + "cmt_msg": "udp: consistently apply ufo or fragmentation" + }, + "CVE-2024-24855": { + "cmt_msg": "scsi: lpfc: Fix a possible data race in lpfc_unregister_fcf_rescan()" + }, + "CVE-2018-5848": { + "cmt_msg": "wil6210: missing length check in wmi_set_ie" + }, + "CVE-2021-29265": { + "cmt_msg": "usbip: fix stub_dev usbip_sockfd_store() races leading to gpf" + }, + "CVE-2013-2140": { + "cmt_msg": "xen/blkback: Check device permissions before allowing OP_DISCARD" + }, + "CVE-2021-39648": { + "cmt_msg": "usb: gadget: configfs: Fix use-after-free issue with udc_name" }, - "CVE-2023-31082": { - "cmt_msg": "" + "CVE-2022-3545": { + "cmt_msg": "nfp: fix use-after-free in area_cache_get()" }, - "CVE-2018-7480": { - "cmt_msg": "blkcg: fix double free of new_blkg in blkcg_init_queue" + "CVE-2023-52569": { + "cmt_msg": "btrfs: remove BUG() after failure to insert delayed dir index item" }, - "CVE-2019-14615": { - "cmt_msg": "drm/i915/gen9: Clear residual context state on context switch" + "CVE-2023-52568": { + "cmt_msg": "x86/sgx: Resolves SECS reclaim vs. page fault for EAUG race" }, - "CVE-2022-2503": { - "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag" + "CVE-2020-14416": { + "cmt_msg": "can, slip: Protect tty->disc_data in write_wakeup and close with RCU" }, - "CVE-2016-3139": { - "cmt_msg": "Input: wacom - compute the HID report size to get the actual packet size" + "CVE-2019-0136": { + "cmt_msg": "mac80211: drop robust management frames from unknown TA" }, - "CVE-2023-0030": { - "cmt_msg": "drm/nouveau/mmu: add more general vmm free/node handling functions" + "CVE-2023-52563": { + "cmt_msg": "drm/meson: fix memory leak on ->hpd_notify callback" }, - "CVE-2020-16120": { - "cmt_msg": "ovl: switch to mounter creds in readdir" + "CVE-2019-16921": { + "cmt_msg": "RDMA/hns: Fix init resp when alloc ucontext" }, - "CVE-2019-11599": { - "cmt_msg": "coredump: fix race condition between mmget_not_zero()/get_task_mm() and core dumping" + "CVE-2023-52561": { + "cmt_msg": "arm64: dts: qcom: sdm845-db845c: Mark cont splash memory region as reserved" }, - "CVE-2018-16658": { - "cmt_msg": "cdrom: Fix info leak/OOB read in cdrom_ioctl_drive_status" + "CVE-2023-52566": { + "cmt_msg": "nilfs2: fix potential use after free in nilfs_gccache_submit_read_data()" }, - "CVE-2018-15572": { - "cmt_msg": "x86/speculation: Protect against userspace-userspace spectreRSB" + "CVE-2021-21781": { + "cmt_msg": "ARM: ensure the signal page contains defined contents" }, - "CVE-2022-1204": { - "cmt_msg": "ax25: Fix refcount leaks caused by ax25_cb_del()" + "CVE-2021-0512": { + "cmt_msg": "HID: make arrays usage and value to be the same" }, - "CVE-2019-2101": { - "cmt_msg": "media: uvcvideo: Fix 'type' check leading to overflow" + "CVE-2018-14634": { + "cmt_msg": "exec: Limit arg stack to at most 75% of _STK_LIM" }, - "CVE-2019-17666": { - "cmt_msg": "rtlwifi: Fix potential overflow on P2P code" + "CVE-2018-14633": { + "cmt_msg": "scsi: target: iscsi: Use hex2bin instead of a re-implementation" }, - "CVE-2016-10723": { - "cmt_msg": "mm, oom: remove sleep from under oom_lock" + "CVE-2018-12896": { + "cmt_msg": "posix-timers: Sanitize overrun handling" }, - "CVE-2021-3573": { - "cmt_msg": "Bluetooth: use correct lock to prevent UAF of hdev object" + "CVE-2018-14734": { + "cmt_msg": "infiniband: fix a possible use-after-free bug" }, - "CVE-2020-25212": { - "cmt_msg": "nfs: Fix getxattr kernel panic and memory overflow" + "CVE-2021-46926": { + "cmt_msg": "ALSA: hda: intel-sdw-acpi: harden detection of controller" }, - "CVE-2019-19036": { - "cmt_msg": "btrfs: Detect unbalanced tree with empty leaf before crashing btree operations" + "CVE-2015-8950": { + "cmt_msg": "arm64: dma-mapping: always clear allocated buffers" }, - "CVE-2019-3459": { - "cmt_msg": "Bluetooth: Verify that l2cap_get_conf_opt provides large enough buffer" + "CVE-2015-1805": { + "cmt_msg": "new helper: copy_page_from_iter()" }, - "CVE-2020-11494": { - "cmt_msg": "slcan: Don't transmit uninitialized stack data in padding" + "CVE-2022-41222": { + "cmt_msg": "mm/mremap: hold the rmap lock in write mode when moving page table entries." }, - "CVE-2017-8797": { - "cmt_msg": "nfsd: fix undefined behavior in nfsd4_layout_verify" + "CVE-2022-40982": { + "cmt_msg": "x86/speculation: Add Gather Data Sampling mitigation" }, - "CVE-2023-6270": { + "CVE-2016-9754": { + "cmt_msg": "ring-buffer: Prevent overflow of size in ring_buffer_resize()" + }, + "CVE-2019-18680": { "cmt_msg": "" }, - "CVE-2018-10675": { - "cmt_msg": "mm/mempolicy: fix use after free when calling get_mempolicy" + "CVE-2022-20565": { + "cmt_msg": "HID: core: Correctly handle ReportSize being zero" }, - "CVE-2017-16526": { - "cmt_msg": "uwb: properly check kthread_run return value" + "CVE-2019-18806": { + "cmt_msg": "net: qlogic: Fix memory leak in ql_alloc_large_buffers" }, - "CVE-2017-16527": { - "cmt_msg": "ALSA: usb-audio: Kill stray URB at exiting" + "CVE-2021-33656": { + "cmt_msg": "vt: drop old FONT ioctls" }, - "CVE-2017-16525": { - "cmt_msg": "USB: serial: console: fix use-after-free after failed setup" + "CVE-2024-26713": { + "cmt_msg": "powerpc/pseries/iommu: Fix iommu initialisation during DLPAR add" }, - "CVE-2018-12233": { - "cmt_msg": "jfs: Fix inconsistency between memory allocation and ea_buf->max_size" + "CVE-2021-33655": { + "cmt_msg": "fbcon: Disallow setting font bigger than screen size" }, - "CVE-2022-3565": { - "cmt_msg": "mISDN: fix use-after-free bugs in l1oip timer handlers" + "CVE-2024-26804": { + "cmt_msg": "net: ip_tunnel: prevent perpetual headroom growth" }, - "CVE-2021-32078": { - "cmt_msg": "ARM: footbridge: remove personal server platform" + "CVE-2022-41858": { + "cmt_msg": "drivers: net: slip: fix NPD bug in sl_tx_timeout()" }, - "CVE-2014-1874": { - "cmt_msg": "SELinux: Fix kernel BUG on empty security contexts." + "CVE-2024-26726": { + "cmt_msg": "btrfs: don't drop extent_map for free space inode on write error" }, - "CVE-2022-20148": { - "cmt_msg": "f2fs: fix UAF in f2fs_available_free_memory" + "CVE-2024-26623": { + "cmt_msg": "pds_core: Prevent race issues involving the adminq" }, - "CVE-2017-16528": { - "cmt_msg": "ALSA: seq: Cancel pending autoload work at unbinding device" + "CVE-2023-1206": { + "cmt_msg": "tcp: Reduce chance of collisions in inet6_hashfn()." }, - "CVE-2017-16529": { - "cmt_msg": "ALSA: usb-audio: Check out-of-bounds access by corrupted buffer descriptor" + "CVE-2022-41850": { + "cmt_msg": "HID: roccat: Fix use-after-free in roccat_read()" }, - "CVE-2019-11833": { - "cmt_msg": "ext4: zero out the unused memory region in the extent tree block" + "CVE-2023-2985": { + "cmt_msg": "fs: hfsplus: fix UAF issue in hfsplus_put_super" }, - "CVE-2021-38205": { - "cmt_msg": "net: xilinx_emaclite: Do not print real IOMEM pointer" + "CVE-2020-14390": { + "cmt_msg": "fbcon: remove soft scrollback code" }, - "CVE-2021-3864": { + "CVE-2020-24502": { "cmt_msg": "" }, - "CVE-2020-0255": { - "cmt_msg": "selinux: properly handle multiple messages in selinux_netlink_send()" + "CVE-2017-10663": { + "cmt_msg": "f2fs: sanity check checkpoint segno and blkoff" }, - "CVE-2019-2215": { - "cmt_msg": "ANDROID: binder: remove waitqueue when thread exits." + "CVE-2017-10662": { + "cmt_msg": "f2fs: sanity check segment count" }, - "CVE-2021-38208": { - "cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect" + "CVE-2022-1184": { + "cmt_msg": "ext4: verify dir block before splitting it" }, - "CVE-2017-18232": { - "cmt_msg": "scsi: libsas: direct call probe and destruct" + "CVE-2022-3642": { + "cmt_msg": "" }, - "CVE-2019-2213": { - "cmt_msg": "binder: fix possible UAF when freeing buffer" + "CVE-2019-19527": { + "cmt_msg": "HID: hiddev: do cleanup in failure of opening a device" }, - "CVE-2020-25211": { - "cmt_msg": "netfilter: ctnetlink: add a range check for l3/l4 protonum" + "CVE-2024-0584": { + "cmt_msg": "ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet" }, - "CVE-2017-14140": { - "cmt_msg": "Sanitize 'move_pages()' permission checks" + "CVE-2020-0465": { + "cmt_msg": "HID: core: Sanitize event code and type when mapping input" }, - "CVE-2020-26556": { - "cmt_msg": "" + "CVE-2020-0305": { + "cmt_msg": "chardev: Avoid potential use-after-free in 'chrdev_open()'" }, - "CVE-2018-9518": { - "cmt_msg": "NFC: llcp: Limit size of SDP URI" + "CVE-2018-3639": { + "cmt_msg": "x86/nospec: Simplify alternative_msr_write()" }, - "CVE-2020-26555": { - "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical" + "CVE-2022-1195": { + "cmt_msg": "hamradio: improve the incomplete fix to avoid NPD" }, - "CVE-2018-9517": { - "cmt_msg": "l2tp: pass tunnel pointer to ->session_create()" + "CVE-2021-4218": { + "cmt_msg": "sysctl: pass kernel pointers to ->proc_handler" }, - "CVE-2018-9516": { - "cmt_msg": "HID: debug: check length before copy_to_user()" + "CVE-2023-22995": { + "cmt_msg": "usb: dwc3: dwc3-qcom: Add missing platform_device_put() in dwc3_qcom_acpi_register_core" }, - "CVE-2023-3397": { + "CVE-2019-15902": { "cmt_msg": "" }, - "CVE-2018-1128": { - "cmt_msg": "libceph: add authorizer challenge" + "CVE-2024-25739": { + "cmt_msg": "" }, - "CVE-2018-1129": { - "cmt_msg": "libceph: implement CEPHX_V2 calculation mode" + "CVE-2023-52511": { + "cmt_msg": "spi: sun6i: reduce DMA RX transfer width to single byte" }, - "CVE-2018-1087": { - "cmt_msg": "kvm/x86: fix icebp instruction handling" + "CVE-2021-46982": { + "cmt_msg": "f2fs: compress: fix race condition of overwrite vs truncate" }, - "CVE-2022-26365": { - "cmt_msg": "xen/blkfront: fix leaking data in shared pages" + "CVE-2024-0340": { + "cmt_msg": "vhost: use kzalloc() instead of kmalloc() followed by memset()" }, - "CVE-2023-52458": { - "cmt_msg": "block: add check that partition length needs to be aligned with block size" + "CVE-2021-3753": { + "cmt_msg": "vt_kdsetmode: extend console locking" }, - "CVE-2018-1120": { - "cmt_msg": "proc: do not access cmdline nor environ from file-backed areas" + "CVE-2023-6536": { + "cmt_msg": "nvmet-tcp: fix a crash in nvmet_req_complete()" }, - "CVE-2018-1121": { - "cmt_msg": "" + "CVE-2019-11135": { + "cmt_msg": "x86/msr: Add the IA32_TSX_CTRL MSR" }, - "CVE-2017-5754": { - "cmt_msg": "x86/cpufeatures: Add Intel feature bits for Speculation Control" + "CVE-2019-11810": { + "cmt_msg": "scsi: megaraid_sas: return error when create DMA pool failed" }, - "CVE-2022-3061": { - "cmt_msg": "video: fbdev: i740fb: Error out if 'pixclock' equals zero" + "CVE-2021-27365": { + "cmt_msg": "scsi: iscsi: Ensure sysfs attributes are limited to PAGE_SIZE" }, - "CVE-2017-5753": { - "cmt_msg": "x86/cpufeatures: Add X86_BUG_SPECTRE_V[12]" + "CVE-2021-27364": { + "cmt_msg": "scsi: iscsi: Restrict sessions and handles to admin capabilities" }, - "CVE-2022-20369": { - "cmt_msg": "media: v4l2-mem2mem: Apply DST_QUEUE_OFF_BASE on MMAP buffers across ioctls" + "CVE-2017-14991": { + "cmt_msg": "scsi: sg: fixup infoleak when using SG_GET_REQUEST_TABLE" }, - "CVE-2024-22386": { + "CVE-2020-0431": { + "cmt_msg": "HID: hid-input: clear unmapped usages" + }, + "CVE-2018-17977": { "cmt_msg": "" }, - "CVE-2019-9466": { - "cmt_msg": "brcmfmac: add subtype check for event handling in data path" + "CVE-2016-4997": { + "cmt_msg": "netfilter: x_tables: check for bogus target offset" }, - "CVE-2020-11565": { - "cmt_msg": "mm: mempolicy: require at least one nodeid for MPOL_PREFERRED" + "CVE-2024-26659": { + "cmt_msg": "xhci: handle isoc Babble and Buffer Overrun events properly" }, - "CVE-2022-3344": { - "cmt_msg": "KVM: x86: nSVM: harden svm_free_nested against freeing vmcb02 while still in use" + "CVE-2024-26658": { + "cmt_msg": "bcachefs: grab s_umount only if snapshotting" }, - "CVE-2018-9568": { - "cmt_msg": "net: Set sk_prot_creator when cloning sockets to the right proto" + "CVE-2018-17972": { + "cmt_msg": "proc: restrict kernel stack dumps to root" }, - "CVE-2018-13053": { - "cmt_msg": "alarmtimer: Prevent overflow for relative nanosleep" + "CVE-2024-26655": { + "cmt_msg": "Fix memory leak in posix_clock_open()" }, - "CVE-2020-27786": { - "cmt_msg": "ALSA: rawmidi: Fix racy buffer resize under concurrent accesses" + "CVE-2024-26654": { + "cmt_msg": "ALSA: sh: aica: reorder cleanup operations to avoid UAF bugs" }, - "CVE-2019-14816": { - "cmt_msg": "mwifiex: Fix three heap overflow at parsing element in cfg80211_ap_settings" + "CVE-2021-20321": { + "cmt_msg": "ovl: fix missing negative dentry check in ovl_rename()" }, - "CVE-2019-14814": { - "cmt_msg": "mwifiex: Fix three heap overflow at parsing element in cfg80211_ap_settings" + "CVE-2016-4998": { + "cmt_msg": "netfilter: x_tables: check for bogus target offset" }, - "CVE-2023-51780": { - "cmt_msg": "atm: Fix Use-After-Free in do_vcc_ioctl" + "CVE-2024-26650": { + "cmt_msg": "platform/x86: p2sb: Allow p2sb_bar() calls during PCI device probe" }, - "CVE-2023-6240": { - "cmt_msg": "" + "CVE-2022-42896": { + "cmt_msg": "Bluetooth: L2CAP: Fix accepting connection request for invalid SPSM" }, - "CVE-2023-23559": { - "cmt_msg": "wifi: rndis_wlan: Prevent buffer overflow in rndis_query_oid" + "CVE-2017-5967": { + "cmt_msg": "time: Remove CONFIG_TIMER_STATS" }, - "CVE-2022-39842": { - "cmt_msg": "video: fbdev: pxa3xx-gcu: Fix integer overflow in pxa3xx_gcu_write" + "CVE-2021-0937": { + "cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write" }, - "CVE-2020-14351": { - "cmt_msg": "perf/core: Fix race in the perf_mmap_close() function" + "CVE-2022-3169": { + "cmt_msg": "nvme: ensure subsystem reset is single threaded" }, - "CVE-2022-0382": { - "cmt_msg": "net ticp:fix a kernel-infoleak in __tipc_sendmsg()" + "CVE-2022-4744": { + "cmt_msg": "tun: avoid double free in tun_free_netdev" }, - "CVE-2019-9456": { - "cmt_msg": "usb: usbmon: Read text within supplied buffer size" + "CVE-2022-36280": { + "cmt_msg": "drm/vmwgfx: Validate the box size for the snooped cursor" }, - "CVE-2023-32233": { - "cmt_msg": "netfilter: nf_tables: deactivate anonymous set from preparation phase" + "CVE-2019-2054": { + "cmt_msg": "arm/ptrace: run seccomp after ptrace" }, - "CVE-2020-25672": { - "cmt_msg": "nfc: fix memory leak in llcp_sock_connect()" + "CVE-2018-20976": { + "cmt_msg": "xfs: clear sb->s_fs_info on mount failure" }, - "CVE-2020-14353": { - "cmt_msg": "KEYS: prevent creating a different user's keyrings" + "CVE-2023-52475": { + "cmt_msg": "Input: powermate - fix use-after-free in powermate_config_complete" }, - "CVE-2020-25670": { - "cmt_msg": "nfc: fix refcount leak in llcp_sock_bind()" + "CVE-2023-52477": { + "cmt_msg": "usb: hub: Guard against accesses to uninitialized BOS descriptors" }, - "CVE-2020-25671": { - "cmt_msg": "nfc: fix refcount leak in llcp_sock_connect()" + "CVE-2023-52476": { + "cmt_msg": "perf/x86/lbr: Filter vsyscall addresses" }, - "CVE-2018-21008": { - "cmt_msg": "rsi: add fix for crash during assertions" + "CVE-2016-10147": { + "cmt_msg": "crypto: mcryptd - Check mcryptd algorithm compatibility" }, - "CVE-2019-15223": { - "cmt_msg": "ALSA: line6: Assure canceling delayed work at disconnection" + "CVE-2024-21803": { + "cmt_msg": "" }, - "CVE-2019-15220": { - "cmt_msg": "p54usb: Fix race between disconnect and firmware loading" + "CVE-2018-16276": { + "cmt_msg": "USB: yurex: fix out-of-bounds uaccess in read handler" }, - "CVE-2019-15221": { - "cmt_msg": "ALSA: line6: Fix write on zero-sized buffer" + "CVE-2023-52479": { + "cmt_msg": "ksmbd: fix uaf in smb20_oplock_break_ack" }, - "CVE-2019-19814": { + "CVE-2023-2176": { + "cmt_msg": "RDMA/core: Refactor rdma_bind_addr" + }, + "CVE-2021-3542": { "cmt_msg": "" }, - "CVE-2020-29371": { - "cmt_msg": "romfs: fix uninitialized memory leak in romfs_dev_read()" + "CVE-2019-16413": { + "cmt_msg": "9p: use inode->i_lock to protect i_size_write() under 32-bit" }, - "CVE-2019-19816": { - "cmt_msg": "btrfs: inode: Verify inode mode to avoid NULL pointer dereference" + "CVE-2013-1819": { + "cmt_msg": "xfs: fix _xfs_buf_find oops on blocks beyond the filesystem end" }, - "CVE-2017-16939": { - "cmt_msg": "ipsec: Fix aborted xfrm policy dump crash" + "CVE-2024-22099": { + "cmt_msg": "Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security" }, - "CVE-2019-9453": { - "cmt_msg": "f2fs: fix to avoid accessing xattr across the boundary" + "CVE-2023-30456": { + "cmt_msg": "KVM: nVMX: add missing consistency checks for CR0 and CR4" }, - "CVE-2018-18710": { - "cmt_msg": "cdrom: fix improper type cast, which can leat to information leak." + "CVE-2020-12652": { + "cmt_msg": "scsi: mptfusion: Fix double fetch bug in ioctl" }, - "CVE-2019-5108": { - "cmt_msg": "mac80211: Do not send Layer 2 Update frame before authorization" + "CVE-2020-12653": { + "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_cmd_append_vsie_tlv()" }, - "CVE-2022-1012": { - "cmt_msg": "secure_seq: use the 64 bits of the siphash for port offset calculation" + "CVE-2019-7222": { + "cmt_msg": "KVM: x86: work around leak of uninitialized stack contents (CVE-2019-7222)" }, - "CVE-2023-31436": { - "cmt_msg": "net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg" + "CVE-2022-23040": { + "cmt_msg": "xen/xenbus: don't let xenbus_grant_ring() remove grants in error case" }, - "CVE-2020-12114": { - "cmt_msg": "make struct mountpoint bear the dentry reference to mountpoint, not struct mount" + "CVE-2020-12654": { + "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_ret_wmm_get_status()" }, - "CVE-2020-8649": { - "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region" + "CVE-2020-12655": { + "cmt_msg": "xfs: add agf freeblocks verify in xfs_agf_verify" }, - "CVE-2020-12656": { - "cmt_msg": "sunrpc: check that domain table is empty at module unload." + "CVE-2018-12929": { + "cmt_msg": "" }, - "CVE-2017-1000405": { - "cmt_msg": "mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d()" + "CVE-2018-12928": { + "cmt_msg": "" }, - "CVE-2021-26930": { - "cmt_msg": "xen-blkback: fix error handling in xen_blkbk_map()" + "CVE-2020-36310": { + "cmt_msg": "KVM: SVM: avoid infinite loop on NPF from bad address" }, - "CVE-2017-1000407": { - "cmt_msg": "KVM: VMX: remove I/O port 0x80 bypass on Intel hosts" + "CVE-2020-36313": { + "cmt_msg": "KVM: Fix out of range accesses to memslots" }, - "CVE-2021-26932": { - "cmt_msg": "Xen/x86: don't bail early from clear_foreign_p2m_mapping()" + "CVE-2020-35519": { + "cmt_msg": "net/x25: prevent a couple of overflows" }, - "CVE-2024-25740": { - "cmt_msg": "" + "CVE-2022-33740": { + "cmt_msg": "xen/netfront: fix leaking data in shared pages" }, - "CVE-2023-52456": { - "cmt_msg": "serial: imx: fix tx statemachine deadlock" + "CVE-2022-48619": { + "cmt_msg": "Input: add bounds checking to input_set_capability()" }, - "CVE-2023-3141": { - "cmt_msg": "memstick: r592: Fix UAF bug in r592_remove due to race condition" + "CVE-2012-6712": { + "cmt_msg": "iwlwifi: Sanity check for sta_id" }, - "CVE-2023-37454": { + "CVE-2022-0400": { "cmt_msg": "" }, - "CVE-2019-13648": { - "cmt_msg": "powerpc/tm: Fix oops on sigreturn on systems without TM" - }, - "CVE-2022-0492": { - "cmt_msg": "cgroup-v1: Require capabilities to set release_agent" + "CVE-2024-25741": { + "cmt_msg": "" }, - "CVE-2020-12352": { - "cmt_msg": "Bluetooth: A2MP: Fix not initializing all members" + "CVE-2024-26808": { + "cmt_msg": "netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain" }, - "CVE-2014-4943": { - "cmt_msg": "net/l2tp: don't fall back on UDP [get|set]sockopt" + "CVE-2024-26809": { + "cmt_msg": "netfilter: nft_set_pipapo: release elements in clone only from destroy path" }, - "CVE-2022-23042": { - "cmt_msg": "xen/netfront: react properly to failing gnttab_end_foreign_access_ref()" + "CVE-2021-38160": { + "cmt_msg": "virtio_console: Assure used length from device is limited" }, - "CVE-2021-43976": { - "cmt_msg": "mwifiex: Fix skb_over_panic in mwifiex_usb_recv()" + "CVE-2021-42739": { + "cmt_msg": "media: firewire: firedtv-avc: fix a buffer overflow in avc_ca_pmt()" }, - "CVE-2022-0494": { - "cmt_msg": "block-map: add __GFP_ZERO flag for alloc_page in function bio_copy_kern" + "CVE-2023-1989": { + "cmt_msg": "Bluetooth: btsdio: fix use after free bug in btsdio_remove due to unfinished work" }, - "CVE-2021-26931": { - "cmt_msg": "xen-blkback: don't \"handle\" error by BUG()" + "CVE-2024-26806": { + "cmt_msg": "spi: cadence-qspi: remove system-wide suspend helper calls from runtime PM hooks" }, - "CVE-2022-3524": { - "cmt_msg": "tcp/udp: Fix memory leak in ipv6_renew_options()." + "CVE-2022-3111": { + "cmt_msg": "power: supply: wm8350-power: Add missing free in free_charger_irq" }, - "CVE-2022-3523": { - "cmt_msg": "mm/memory.c: fix race when faulting a device private page" + "CVE-2018-5344": { + "cmt_msg": "loop: fix concurrent lo_open/lo_release" }, - "CVE-2022-3522": { - "cmt_msg": "mm/hugetlb: use hugetlb_pte_stable in migration race check" + "CVE-2020-12770": { + "cmt_msg": "scsi: sg: add sg_remove_request in sg_write" }, - "CVE-2008-2544": { - "cmt_msg": "" + "CVE-2024-26802": { + "cmt_msg": "stmmac: Clear variable when destroying workqueue" }, - "CVE-2021-3178": { - "cmt_msg": "nfsd4: readdirplus shouldn't return parent of export" + "CVE-2024-26803": { + "cmt_msg": "net: veth: clear GRO when clearing XDP even when down" }, - "CVE-2020-10690": { - "cmt_msg": "ptp: fix the race between the release of ptp_clock and cdev" + "CVE-2023-52606": { + "cmt_msg": "powerpc/lib: Validate size for vector operations" }, - "CVE-2018-7755": { - "cmt_msg": "floppy: Do not copy a kernel pointer to user memory in FDGETPRM ioctl" + "CVE-2019-15222": { + "cmt_msg": "ALSA: usb-audio: Fix gpf in snd_usb_pipe_sanity_check" }, - "CVE-2018-7754": { - "cmt_msg": "printk: hash addresses printed with %p" + "CVE-2023-52604": { + "cmt_msg": "FS:JFS:UBSAN:array-index-out-of-bounds in dbAdjTree" }, - "CVE-2018-7757": { - "cmt_msg": "scsi: libsas: fix memory leak in sas_smp_get_phy_events()" + "CVE-2023-52602": { + "cmt_msg": "jfs: fix slab-out-of-bounds Read in dtSearch" }, - "CVE-2022-0330": { - "cmt_msg": "drm/i915: Flush TLBs before releasing backing store" + "CVE-2023-52603": { + "cmt_msg": "UBSAN: array-index-out-of-bounds in dtSplitRoot" }, - "CVE-2007-3719": { + "CVE-2022-25265": { "cmt_msg": "" }, - "CVE-2023-3863": { - "cmt_msg": "net: nfc: Fix use-after-free caused by nfc_llcp_find_local" + "CVE-2022-20368": { + "cmt_msg": "net/packet: fix slab-out-of-bounds access in packet_recvmsg()" }, - "CVE-2023-0590": { - "cmt_msg": "net: sched: fix race condition in qdisc_graft()" + "CVE-2020-11608": { + "cmt_msg": "media: ov519: add missing endpoint sanity checks" }, - "CVE-2022-4095": { - "cmt_msg": "staging: rtl8712: fix use after free bugs" + "CVE-2020-25285": { + "cmt_msg": "mm/hugetlb: fix a race between hugetlb sysctl handlers" }, - "CVE-2017-10911": { - "cmt_msg": "xen-blkback: don't leak stack data via response ring" + "CVE-2020-10732": { + "cmt_msg": "fs/binfmt_elf.c: allocate initialized memory in fill_thread_core_info()" }, - "CVE-2023-34255": { - "cmt_msg": "xfs: verify buffer contents when we skip log replay" + "CVE-2020-10773": { + "cmt_msg": "s390/cmm: fix information leak in cmm_timeout_handler()" }, - "CVE-2022-45919": { - "cmt_msg": "media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221" + "CVE-2022-21499": { + "cmt_msg": "lockdown: also lock down previous kgdb use" }, - "CVE-2019-19319": { - "cmt_msg": "ext4: protect journal inode's blocks using block_validity" + "CVE-2020-25284": { + "cmt_msg": "rbd: require global CAP_SYS_ADMIN for mapping and unmapping" }, - "CVE-2023-2248": { - "cmt_msg": "net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg" + "CVE-2015-3332": { + "cmt_msg": "tcp: Fix crash in TCP Fast Open" }, - "CVE-2017-18017": { - "cmt_msg": "netfilter: xt_TCPMSS: add more sanity tests on tcph->doff" + "CVE-2015-3339": { + "cmt_msg": "fs: take i_mutex during prepare_binprm for set[ug]id executables" }, - "CVE-2022-24958": { - "cmt_msg": "usb: gadget: don't release an existing dev->buf" + "CVE-2018-18281": { + "cmt_msg": "mremap: properly flush TLB before releasing the page" }, - "CVE-2023-1611": { - "cmt_msg": "btrfs: fix race between quota disable and quota assign ioctls" + "CVE-2023-20593": { + "cmt_msg": "x86/cpu/amd: Add a Zenbleed fix" }, - "CVE-2021-3772": { - "cmt_msg": "sctp: use init_tag from inithdr for ABORT chunk" + "CVE-2023-52506": { + "cmt_msg": "LoongArch: Set all reserved memblocks on Node#0 at initialization" }, - "CVE-2021-3679": { - "cmt_msg": "tracing: Fix bug in rb_per_cpu_empty() that might cause deadloop." + "CVE-2022-2663": { + "cmt_msg": "netfilter: nf_conntrack_irc: Fix forged IP logic" }, - "CVE-2021-37159": { - "cmt_msg": "usb: hso: fix error handling code of hso_create_net_device" + "CVE-2022-43750": { + "cmt_msg": "usb: mon: make mmapped memory read only" }, - "CVE-2022-3628": { - "cmt_msg": "wifi: brcmfmac: Fix potential buffer overflow in brcmf_fweh_event_worker()" + "CVE-2023-0047": { + "cmt_msg": "mm, oom: do not trigger out_of_memory from the #PF" }, - "CVE-2022-3629": { - "cmt_msg": "vsock: Fix memory leak in vsock_connect()" + "CVE-2021-47046": { + "cmt_msg": "drm/amd/display: Fix off by one in hdmi_14_process_transaction()" }, - "CVE-2021-34556": { - "cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4" + "CVE-2019-15219": { + "cmt_msg": "USB: sisusbvga: fix oops in error path of sisusb_probe" }, - "CVE-2021-28713": { - "cmt_msg": "xen/console: harden hvc_xen against event channel storms" + "CVE-2021-47165": { + "cmt_msg": "drm/meson: fix shutdown crash when component not probed" }, - "CVE-2021-28712": { - "cmt_msg": "xen/netfront: harden netfront against event channel storms" + "CVE-2021-46969": { + "cmt_msg": "bus: mhi: core: Fix invalid error returning in mhi_queue" }, - "CVE-2021-28711": { - "cmt_msg": "xen/blkfront: harden blkfront against event channel storms" + "CVE-2021-47160": { + "cmt_msg": "net: dsa: mt7530: fix VLAN traffic leaks" }, - "CVE-2022-1247": { - "cmt_msg": "" + "CVE-2023-4385": { + "cmt_msg": "fs: jfs: fix possible NULL pointer dereference in dbFree()" }, - "CVE-2023-51782": { - "cmt_msg": "net/rose: Fix Use-After-Free in rose_ioctl" + "CVE-2021-46965": { + "cmt_msg": "mtd: physmap: physmap-bt1-rom: Fix unintentional stack access" }, - "CVE-2022-3621": { - "cmt_msg": "nilfs2: fix NULL pointer dereference at nilfs_bmap_lookup_at_level()" + "CVE-2021-46962": { + "cmt_msg": "mmc: uniphier-sd: Fix a resource leak in the remove function" }, - "CVE-2017-11473": { - "cmt_msg": "x86/acpi: Prevent out of bound access caused by broken ACPI tables" + "CVE-2021-47168": { + "cmt_msg": "NFS: fix an incorrect limit in filelayout_decode_layout()" }, - "CVE-2017-11472": { - "cmt_msg": "ACPICA: Namespace: fix operand cache leak" + "CVE-2023-52599": { + "cmt_msg": "jfs: fix array-index-out-of-bounds in diNewExt" }, - "CVE-2022-3624": { - "cmt_msg": "bonding: fix reference count leak in balance-alb mode" + "CVE-2020-4788": { + "cmt_msg": "powerpc/64s: flush L1D on kernel entry" }, - "CVE-2016-9120": { - "cmt_msg": "staging/android/ion : fix a race condition in the ion driver" + "CVE-2013-7348": { + "cmt_msg": "aio: prevent double free in ioctx_alloc" }, - "CVE-2021-39657": { - "cmt_msg": "scsi: ufs: Correct the LUN used in eh_device_reset_handler() callback" + "CVE-2022-1011": { + "cmt_msg": "fuse: fix pipe buffer lifetime for direct_io" }, - "CVE-2021-3669": { - "cmt_msg": "ipc: replace costly bailout check in sysvipc_find_ipc()" + "CVE-2021-39698": { + "cmt_msg": "wait: add wake_up_pollfree()" }, - "CVE-2019-18885": { - "cmt_msg": "btrfs: merge btrfs_find_device and find_device" + "CVE-2022-45934": { + "cmt_msg": "Bluetooth: L2CAP: Fix u8 overflow" }, - "CVE-2022-4744": { - "cmt_msg": "tun: avoid double free in tun_free_netdev" + "CVE-2019-19377": { + "cmt_msg": "btrfs: Don't submit any btree write bio if the fs has errors" }, - "CVE-2019-12378": { - "cmt_msg": "ipv6_sockglue: Fix a missing-check bug in ip6_ra_control()" + "CVE-2022-2380": { + "cmt_msg": "video: fbdev: sm712fb: Fix crash in smtcfb_read()" }, - "CVE-2019-11091": { - "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" + "CVE-2022-0850": { + "cmt_msg": "ext4: fix kernel infoleak via ext4_extent_header" }, - "CVE-2022-4543": { + "CVE-2020-10767": { + "cmt_msg": "x86/speculation: Avoid force-disabling IBPB based on STIBP and enhanced IBRS." + }, + "CVE-2019-19528": { + "cmt_msg": "USB: iowarrior: fix use-after-free on disconnect" + }, + "CVE-2021-3612": { + "cmt_msg": "Input: joydev - prevent potential read overflow in ioctl" + }, + "CVE-2020-24503": { "cmt_msg": "" }, - "CVE-2019-18660": { - "cmt_msg": "powerpc/book3s64: Fix link stack flush on context switch" + "CVE-2019-19524": { + "cmt_msg": "Input: ff-memless - kill timer in destroy()" }, - "CVE-2023-4921": { - "cmt_msg": "net: sched: sch_qfq: Fix UAF in qfq_dequeue()" + "CVE-2019-19448": { + "cmt_msg": "btrfs: only search for left_info if there is no right_info in try_merge_free_space" }, - "CVE-2022-3424": { - "cmt_msg": "misc: sgi-gru: fix use-after-free error in gru_set_context_option, gru_fault and gru_handle_user_call_os" + "CVE-2019-19449": { + "cmt_msg": "f2fs: fix to do sanity check on segment/section count" }, - "CVE-2017-15649": { - "cmt_msg": "packet: in packet_do_bind, test fanout with bind_lock held" + "CVE-2019-19523": { + "cmt_msg": "USB: adutux: fix use-after-free on disconnect" }, - "CVE-2017-11089": { - "cmt_msg": "cfg80211: Define nla_policy for NL80211_ATTR_LOCAL_MESH_POWER_MODE" + "CVE-2013-2206": { + "cmt_msg": "sctp: Use correct sideffect command in duplicate cookie handling" }, - "CVE-2023-1829": { - "cmt_msg": "net/sched: Retire tcindex classifier" + "CVE-2024-26774": { + "cmt_msg": "ext4: avoid dividing by 0 in mb_update_avg_fragment_size() when block bitmap corrupt" }, - "CVE-2019-19227": { - "cmt_msg": "appletalk: Fix potential NULL pointer dereference in unregister_snap_client" + "CVE-2019-3892": { + "cmt_msg": "coredump: fix race condition between mmget_not_zero()/get_task_mm() and core dumping" }, - "CVE-2021-34981": { - "cmt_msg": "Bluetooth: cmtp: fix file refcount when cmtp_attach_device fails" + "CVE-2017-18249": { + "cmt_msg": "f2fs: fix race condition in between free nid allocator/initializer" }, - "CVE-2023-1670": { - "cmt_msg": "xirc2ps_cs: Fix use after free bug in xirc2ps_detach" + "CVE-2022-1263": { + "cmt_msg": "KVM: avoid NULL pointer dereference in kvm_dirty_ring_push" }, - "CVE-2017-14489": { - "cmt_msg": "scsi: scsi_transport_iscsi: fix the issue that iscsi_if_rx doesn't parse nlmsg properly" + "CVE-2021-35477": { + "cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4" }, - "CVE-2023-6915": { - "cmt_msg": "ida: Fix crash in ida_free when the bitmap is empty" + "CVE-2017-18241": { + "cmt_msg": "f2fs: fix a panic caused by NULL flush_cmd_control" }, - "CVE-2016-5828": { - "cmt_msg": "powerpc/tm: Always reclaim in start_thread() for exec() class syscalls" + "CVE-2023-31082": { + "cmt_msg": "" }, - "CVE-2023-30456": { - "cmt_msg": "KVM: nVMX: add missing consistency checks for CR0 and CR4" + "CVE-2019-16746": { + "cmt_msg": "nl80211: validate beacon head" }, - "CVE-2018-9422": { - "cmt_msg": "futex: Remove requirement for lock_page() in get_futex_key()" + "CVE-2023-52623": { + "cmt_msg": "SUNRPC: Fix a suspicious RCU usage warning" }, - "CVE-2013-7445": { + "CVE-2022-3606": { "cmt_msg": "" }, - "CVE-2022-3646": { - "cmt_msg": "nilfs2: fix leak of nilfs_root in case of writer thread creation failure" + "CVE-2022-2209": { + "cmt_msg": "" }, - "CVE-2022-28390": { - "cmt_msg": "can: ems_usb: ems_usb_start_xmit(): fix double dev_kfree_skb() in error path" + "CVE-2017-9725": { + "cmt_msg": "mm: cma: fix incorrect type conversion for size during dma allocation" }, - "CVE-2019-15292": { - "cmt_msg": "appletalk: Fix use-after-free in atalk_proc_exit" + "CVE-2024-26775": { + "cmt_msg": "aoe: avoid potential deadlock at set_capacity" }, - "CVE-2020-12652": { - "cmt_msg": "scsi: mptfusion: Fix double fetch bug in ioctl" + "CVE-2018-14609": { + "cmt_msg": "btrfs: relocation: Only remove reloc rb_trees if reloc control has been initialized" }, - "CVE-2022-45934": { - "cmt_msg": "Bluetooth: L2CAP: Fix u8 overflow" + "CVE-2014-4027": { + "cmt_msg": "target/rd: Refactor rd_build_device_space + rd_release_device_space" }, - "CVE-2017-14340": { - "cmt_msg": "xfs: XFS_IS_REALTIME_INODE() should be false if no rt device present" + "CVE-2022-3595": { + "cmt_msg": "cifs: fix double-fault crash during ntlmssp" }, - "CVE-2017-15868": { - "cmt_msg": "Bluetooth: bnep: bnep_add_connection() should verify that it's dealing with l2cap socket" + "CVE-2020-10769": { + "cmt_msg": "crypto: authenc - fix parsing key with misaligned rta_len" }, - "CVE-2022-26966": { - "cmt_msg": "sr9700: sanity check for packet length" + "CVE-2020-27815": { + "cmt_msg": "jfs: Fix array index bounds check in dbAdjTree" }, - "CVE-2022-38096": { - "cmt_msg": "" + "CVE-2020-0543": { + "cmt_msg": "x86/cpu: Add 'table' argument to cpu_matches()" }, - "CVE-2021-34693": { - "cmt_msg": "can: bcm: fix infoleak in struct bcm_msg_head" + "CVE-2022-1462": { + "cmt_msg": "tty: use new tty_insert_flip_string_and_push_buffer() in pty_write()" }, - "CVE-2020-14381": { - "cmt_msg": "futex: Fix inode life-time issue" + "CVE-2024-26758": { + "cmt_msg": "md: Don't ignore suspended array in md_check_recovery()" }, - "CVE-2014-3180": { - "cmt_msg": "compat: nanosleep: Clarify error handling" + "CVE-2024-26759": { + "cmt_msg": "mm/swap: fix race when skipping swapcache" }, - "CVE-2019-19768": { - "cmt_msg": "blktrace: Protect q->blk_trace with RCU" + "CVE-2023-52559": { + "cmt_msg": "iommu/vt-d: Avoid memory allocation in iommu_suspend()" }, - "CVE-2022-3303": { - "cmt_msg": "ALSA: pcm: oss: Fix race at SNDCTL_DSP_SYNC" + "CVE-2023-6606": { + "cmt_msg": "smb: client: fix OOB in smbCalcSize()" }, - "CVE-2019-19039": { - "cmt_msg": "btrfs: Don't submit any btree write bio if the fs has errors" + "CVE-2023-3006": { + "cmt_msg": "arm64: Add AMPERE1 to the Spectre-BHB affected list" }, - "CVE-2017-5715": { - "cmt_msg": "x86/cpufeatures: Add X86_BUG_SPECTRE_V[12]" + "CVE-2020-27777": { + "cmt_msg": "powerpc/rtas: Restrict RTAS requests from userspace" }, - "CVE-2022-20141": { - "cmt_msg": "igmp: Add ip_mc_list lock in ip_check_mc_rcu" + "CVE-2019-20636": { + "cmt_msg": "Input: add safety guards to input_set_keycode()" }, - "CVE-2023-23455": { - "cmt_msg": "net: sched: atm: dont intepret cls results when asked to drop" + "CVE-2019-11486": { + "cmt_msg": "tty: mark Siemens R3964 line discipline as BROKEN" }, - "CVE-2023-23454": { - "cmt_msg": "net: sched: cbq: dont intepret cls results when asked to drop" + "CVE-2019-11487": { + "cmt_msg": "fs: prevent page refcount overflow in pipe_buf_get" }, - "CVE-2017-15116": { - "cmt_msg": "crypto: rng - Remove old low-level rng interface" + "CVE-2022-28390": { + "cmt_msg": "can: ems_usb: ems_usb_start_xmit(): fix double dev_kfree_skb() in error path" }, - "CVE-2016-8632": { - "cmt_msg": "tipc: check minimum bearer MTU" + "CVE-2020-27066": { + "cmt_msg": "xfrm: policy: Fix doulbe free in xfrm_policy_timer" }, - "CVE-2018-3620": { - "cmt_msg": "x86/microcode: Allow late microcode loading with SMT disabled" + "CVE-2020-27675": { + "cmt_msg": "xen/events: avoid removing an event channel while handling it" }, - "CVE-2023-6932": { - "cmt_msg": "ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet" + "CVE-2024-26756": { + "cmt_msg": "md: Don't register sync_thread for reshape directly" }, - "CVE-2019-3460": { - "cmt_msg": "Bluetooth: Check L2CAP option sizes returned from l2cap_get_conf_opt" + "CVE-2013-2635": { + "cmt_msg": "rtnl: fix info leak on RTM_GETLINK request for VF devices" }, - "CVE-2018-8781": { - "cmt_msg": "drm: udl: Properly check framebuffer mmap offsets" + "CVE-2021-47169": { + "cmt_msg": "serial: rp2: use 'request_firmware' instead of 'request_firmware_nowait'" }, - "CVE-2021-29155": { - "cmt_msg": "bpf: Use correct permission flag for mixed signed bounds arithmetic" + "CVE-2019-20908": { + "cmt_msg": "efi: Restrict efivar_ssdt_load when the kernel is locked down" }, - "CVE-2021-33631": { - "cmt_msg": "ext4: fix kernel BUG in 'ext4_write_inline_data_end()'" + "CVE-2023-3776": { + "cmt_msg": "net/sched: cls_fw: Fix improper refcount update leads to use-after-free" }, - "CVE-2019-15916": { - "cmt_msg": "net-sysfs: Fix mem leak in netdev_register_kobject" + "CVE-2021-28038": { + "cmt_msg": "Xen/gnttab: handle p2m update errors on a per-slot basis" }, - "CVE-2019-15917": { - "cmt_msg": "Bluetooth: hci_ldisc: Postpone HCI_UART_PROTO_READY bit set in hci_uart_set_proto()" + "CVE-2021-29154": { + "cmt_msg": "bpf, x86: Validate computation of branch displacements for x86-64" }, - "CVE-2017-18344": { - "cmt_msg": "posix-timer: Properly check sigevent->sigev_notify" + "CVE-2024-26773": { + "cmt_msg": "ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found()" }, - "CVE-2017-15115": { - "cmt_msg": "sctp: do not peel off an assoc from one netns to another one" + "CVE-2023-52434": { + "cmt_msg": "smb: client: fix potential OOBs in smb2_parse_contexts()" }, - "CVE-2017-15265": { - "cmt_msg": "ALSA: seq: Fix use-after-free at creating a port" + "CVE-2021-47116": { + "cmt_msg": "ext4: fix memory leak in ext4_mb_init_backend on error path." }, - "CVE-2020-12362": { - "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" + "CVE-2023-52436": { + "cmt_msg": "f2fs: explicitly null-terminate the xattr list" }, - "CVE-2020-12363": { - "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" + "CVE-2019-19062": { + "cmt_msg": "crypto: user - fix memory leak in crypto_report" }, - "CVE-2019-12881": { - "cmt_msg": "drm/i915/userptr: reject zero user_size" + "CVE-2024-26689": { + "cmt_msg": "ceph: prevent use-after-free in encode_cap_msg()" }, - "CVE-2022-4129": { - "cmt_msg": "l2tp: Serialize access to sk_user_data with sk_callback_lock" + "CVE-2022-2961": { + "cmt_msg": "" }, - "CVE-2018-1000004": { - "cmt_msg": "ALSA: seq: Make ioctls race-free" + "CVE-2019-19066": { + "cmt_msg": "scsi: bfa: release allocated memory in case of error" }, - "CVE-2018-18690": { - "cmt_msg": "xfs: don't fail when converting shortform attr to long form during ATTR_REPLACE" + "CVE-2020-0435": { + "cmt_msg": "f2fs: fix to do sanity check with i_extra_isize" }, - "CVE-2022-28388": { - "cmt_msg": "can: usb_8dev: usb_8dev_start_xmit(): fix double dev_kfree_skb() in error path" + "CVE-2020-0432": { + "cmt_msg": "staging: most: net: fix buffer overflow" }, - "CVE-2017-0627": { - "cmt_msg": "media: uvcvideo: Prevent heap overflow when accessing mapped controls" + "CVE-2020-0433": { + "cmt_msg": "blk-mq: sync the update nr_hw_queues with blk_mq_queue_tag_busy_iter" }, - "CVE-2016-7915": { - "cmt_msg": "HID: core: prevent out-of-bound readings" + "CVE-2023-51779": { + "cmt_msg": "Bluetooth: af_bluetooth: Fix Use-After-Free in bt_sock_recvmsg" }, - "CVE-2021-3896": { - "cmt_msg": "isdn: cpai: check ctr->cnr to avoid array index out of bound" + "CVE-2019-3874": { + "cmt_msg": "sctp: implement memory accounting on tx path" }, - "CVE-2016-7917": { - "cmt_msg": "netfilter: nfnetlink: correctly validate length of batch messages" + "CVE-2018-10877": { + "cmt_msg": "ext4: verify the depth of extent tree in ext4_find_extent()" }, - "CVE-2019-16232": { - "cmt_msg": "libertas: fix a potential NULL pointer dereference" + "CVE-2018-10876": { + "cmt_msg": "ext4: only look at the bg_flags field if it is valid" }, - "CVE-2022-1836": { - "cmt_msg": "floppy: disable FDRAWCMD by default" + "CVE-2010-4563": { + "cmt_msg": "" }, - "CVE-2019-20811": { - "cmt_msg": "net-sysfs: call dev_hold if kobject_init_and_add success" + "CVE-2023-52565": { + "cmt_msg": "media: uvcvideo: Fix OOB read" }, - "CVE-2019-20812": { - "cmt_msg": "af_packet: set defaule value for tmo" + "CVE-2023-2162": { + "cmt_msg": "scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress" }, - "CVE-2019-19530": { - "cmt_msg": "usb: cdc-acm: make sure a refcount is taken early enough" + "CVE-2018-10879": { + "cmt_msg": "ext4: make sure bitmaps and the inode table don't overlap with bg descriptors" + }, + "CVE-2018-10878": { + "cmt_msg": "ext4: always check block group bounds in ext4_init_block_bitmap()" + }, + "CVE-2024-23851": { + "cmt_msg": "dm: limit the number of targets and parameter size area" + }, + "CVE-2023-0266": { + "cmt_msg": "ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF" + }, + "CVE-2021-46928": { + "cmt_msg": "parisc: Clear stale IIR value on instruction access rights trap" + }, + "CVE-2021-3483": { + "cmt_msg": "firewire: nosy: Fix a use-after-free bug in nosy_ioctl()" }, "CVE-2023-6040": { "cmt_msg": "netfilter: nf_tables: Reject tables of unsupported family" }, - "CVE-2018-25020": { - "cmt_msg": "bpf: fix truncated jump targets on heavy expansions" + "CVE-2020-25656": { + "cmt_msg": "vt: keyboard, extend func_buf_lock to readers" }, - "CVE-2022-26373": { - "cmt_msg": "x86/speculation: Add RSB VM Exit protections" + "CVE-2023-52498": { + "cmt_msg": "PM: sleep: Fix possible deadlocks in core system-wide PM code" }, - "CVE-2018-5995": { - "cmt_msg": "printk: hash addresses printed with %p" + "CVE-2019-10142": { + "cmt_msg": "drivers/virt/fsl_hypervisor.c: prevent integer overflow in ioctl" }, - "CVE-2018-18386": { - "cmt_msg": "n_tty: fix EXTPROC vs ICANON interaction with TIOCINQ (aka FIONREAD)" + "CVE-2021-4023": { + "cmt_msg": "io-wq: fix cancellation on create-worker failure" }, - "CVE-2019-15291": { - "cmt_msg": "media: b2c2-flexcop-usb: add sanity checking" + "CVE-2023-52640": { + "cmt_msg": "fs/ntfs3: Fix oob in ntfs_listxattr" }, - "CVE-2019-15290": { - "cmt_msg": "" + "CVE-2023-3268": { + "cmt_msg": "relayfs: fix out-of-bounds access in relay_file_read" }, - "CVE-2023-3212": { - "cmt_msg": "gfs2: Don't deref jdesc in evict" + "CVE-2021-22555": { + "cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write" }, - "CVE-2024-23848": { + "CVE-2021-0399": { "cmt_msg": "" }, - "CVE-2018-7273": { - "cmt_msg": "printk: hash addresses printed with %p" + "CVE-2020-36691": { + "cmt_msg": "netlink: limit recursion depth in policy validation" }, - "CVE-2023-4459": { - "cmt_msg": "net: vmxnet3: fix possible NULL pointer dereference in vmxnet3_rq_cleanup()" + "CVE-2021-47179": { + "cmt_msg": "NFSv4: Fix a NULL pointer dereference in pnfs_mark_matching_lsegs_return()" }, - "CVE-2022-23036": { - "cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()" + "CVE-2023-42755": { + "cmt_msg": "net/sched: Retire rsvp classifier" }, - "CVE-2022-2153": { - "cmt_msg": "KVM: x86: Avoid theoretical NULL pointer dereference in kvm_irq_delivery_to_apic_fast()" + "CVE-2020-2732": { + "cmt_msg": "KVM: nVMX: Don't emulate instructions in guest mode" }, - "CVE-2019-19531": { - "cmt_msg": "usb: yurex: Fix use-after-free in yurex_delete" + "CVE-2023-52486": { + "cmt_msg": "drm: Don't unref the same fb many times by mistake due to deadlock handling" }, - "CVE-2022-20566": { - "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free caused by l2cap_chan_put" + "CVE-2023-52480": { + "cmt_msg": "ksmbd: fix race condition between session lookup and expire" }, - "CVE-2018-12930": { + "CVE-2012-4542": { "cmt_msg": "" }, - "CVE-2018-12931": { - "cmt_msg": "" + "CVE-2023-52482": { + "cmt_msg": "x86/srso: Add SRSO mitigation for Hygon processors" }, - "CVE-2024-23196": { - "cmt_msg": "" + "CVE-2023-1838": { + "cmt_msg": "Fix double fget() in vhost_net_set_backend()" }, - "CVE-2020-12769": { - "cmt_msg": "spi: spi-dw: Add lock protect dw_spi rx/tx to prevent concurrent calls" + "CVE-2023-1118": { + "cmt_msg": "media: rc: Fix use-after-free bugs caused by ene_tx_irqsim()" }, - "CVE-2017-8890": { - "cmt_msg": "dccp/tcp: do not inherit mc_list from parent" + "CVE-2021-3573": { + "cmt_msg": "Bluetooth: use correct lock to prevent UAF of hdev object" }, - "CVE-2022-4662": { - "cmt_msg": "USB: core: Prevent nested device-reset calls" + "CVE-2021-47075": { + "cmt_msg": "nvmet: fix memory leak in nvmet_alloc_ctrl()" }, - "CVE-2021-32399": { - "cmt_msg": "bluetooth: eliminate the potential race condition when removing the HCI controller" + "CVE-2018-1000026": { + "cmt_msg": "bnx2x: disable GSO where gso_size is too big for hardware" }, - "CVE-2021-45868": { - "cmt_msg": "quota: check block number when reading the block in quota file" + "CVE-2023-1380": { + "cmt_msg": "wifi: brcmfmac: slab-out-of-bounds read in brcmf_get_assoc_ies()" }, - "CVE-2019-12380": { - "cmt_msg": "efi/x86/Add missing error handling to old_memmap 1:1 mapping code" + "CVE-2022-44032": { + "cmt_msg": "char: pcmcia: remove all the drivers" }, - "CVE-2019-12381": { - "cmt_msg": "ip_sockglue: Fix missing-check bug in ip_ra_control()" + "CVE-2017-0786": { + "cmt_msg": "brcmfmac: add length check in brcmf_cfg80211_escan_handler()" }, - "CVE-2019-12382": { - "cmt_msg": "drm/edid: Fix a missing-check bug in drm_load_edid_firmware()" + "CVE-2021-28972": { + "cmt_msg": "PCI: rpadlpar: Fix potential drc_name corruption in store functions" }, - "CVE-2017-10810": { - "cmt_msg": "drm/virtio: don't leak bo on drm_gem_object_init failure" + "CVE-2018-12130": { + "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" }, - "CVE-2020-12364": { - "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" + "CVE-2021-47083": { + "cmt_msg": "pinctrl: mediatek: fix global-out-of-bounds issue" }, - "CVE-2022-20166": { - "cmt_msg": "drivers core: Use sysfs_emit and sysfs_emit_at for show(device *...) functions" + "CVE-2021-20292": { + "cmt_msg": "drm/ttm/nouveau: don't call tt destroy callback on alloc failure." }, - "CVE-2022-25375": { - "cmt_msg": "usb: gadget: rndis: check size of RNDIS_MSG_SET command" + "CVE-2021-31916": { + "cmt_msg": "dm ioctl: fix out of bounds array access when no devices" }, - "CVE-2017-13167": { - "cmt_msg": "ALSA: timer: Fix race at concurrent reads" + "CVE-2017-8065": { + "cmt_msg": "crypto: ccm - move cbcmac input off the stack" }, - "CVE-2017-13166": { - "cmt_msg": "media: v4l2-ioctl.c: use check_fmt for enum/g/s/try_fmt" + "CVE-2018-13405": { + "cmt_msg": "Fix up non-directory creation in SGID directories" }, - "CVE-2018-12207": { - "cmt_msg": "kvm: x86, powerpc: do not allow clearing largepages debugfs entry" + "CVE-2018-13406": { + "cmt_msg": "video: uvesafb: Fix integer overflow in allocation" }, - "CVE-2017-1000364": { - "cmt_msg": "mm: larger stack guard gap, between vmas" + "CVE-2020-11668": { + "cmt_msg": "media: xirlink_cit: add missing descriptor sanity checks" }, - "CVE-2017-1000365": { - "cmt_msg": "fs/exec.c: account for argv/envp pointers" + "CVE-2020-11669": { + "cmt_msg": "powerpc/powernv/idle: Restore AMR/UAMOR/AMOR after idle" }, - "CVE-2020-13143": { - "cmt_msg": "USB: gadget: fix illegal array access in binding with UDC" + "CVE-2019-15118": { + "cmt_msg": "ALSA: usb-audio: Fix a stack buffer overflow bug in check_input_term" }, - "CVE-2020-10768": { - "cmt_msg": "x86/speculation: PR_SPEC_FORCE_DISABLE enforcement for indirect branches." + "CVE-2021-47170": { + "cmt_msg": "USB: usbfs: Don't WARN about excessively large memory allocations" }, - "CVE-2017-13168": { - "cmt_msg": "scsi: sg: mitigate read/write abuse" + "CVE-2019-12818": { + "cmt_msg": "net: nfc: Fix NULL dereference on nfc_llcp_build_tlv fails" }, - "CVE-2017-1000363": { - "cmt_msg": "char: lp: fix possible integer overflow in lp_setup()" + "CVE-2023-2269": { + "cmt_msg": "dm ioctl: fix nested locking in table_clear() to remove deadlock concern" }, - "CVE-2019-0148": { - "cmt_msg": "i40e: Wrong truncation from u16 to u8" + "CVE-2023-0394": { + "cmt_msg": "ipv6: raw: Deduct extension header length in rawv6_push_pending_frames" }, - "CVE-2022-2978": { - "cmt_msg": "fs: fix UAF/GPF bug in nilfs_mdt_destroy" + "CVE-2020-10690": { + "cmt_msg": "ptp: fix the race between the release of ptp_clock and cdev" }, - "CVE-2019-17075": { - "cmt_msg": "RDMA/cxgb4: Do not dma memory off of the stack" + "CVE-2020-0347": { + "cmt_msg": "" }, - "CVE-2014-7145": { - "cmt_msg": "[CIFS] Possible null ptr deref in SMB2_tcon" + "CVE-2021-47172": { + "cmt_msg": "iio: adc: ad7124: Fix potential overflow due to non sequential channel numbers" }, - "CVE-2022-3903": { - "cmt_msg": "media: mceusb: Use new usb_control_msg_*() routines" + "CVE-2019-15117": { + "cmt_msg": "ALSA: usb-audio: Fix an OOB bug in parse_audio_mixer_unit" }, - "CVE-2022-23960": { - "cmt_msg": "ARM: report Spectre v2 status through sysfs" + "CVE-2021-3659": { + "cmt_msg": "net: mac802154: Fix general protection fault" }, - "CVE-2023-39189": { - "cmt_msg": "netfilter: nfnetlink_osf: avoid OOB read" + "CVE-2021-4155": { + "cmt_msg": "xfs: map unwritten blocks in XFS_IOC_{ALLOC,FREE}SP just like fallocate" }, - "CVE-2023-20588": { - "cmt_msg": "x86/CPU/AMD: Do not leak quotient data after a division by 0" + "CVE-2019-14901": { + "cmt_msg": "mwifiex: Fix heap overflow in mmwifiex_process_tdls_action_frame()" }, - "CVE-2020-10942": { - "cmt_msg": "vhost: Check docket sk_family instead of call getname" + "CVE-2021-4150": { + "cmt_msg": "block: fix incorrect references to disk objects" }, - "CVE-2018-3693": { - "cmt_msg": "ext4: fix spectre gadget in ext4_mb_regular_allocator()" + "CVE-2020-3702": { + "cmt_msg": "ath: Use safer key clearing with key cache entries" }, - "CVE-2017-15299": { - "cmt_msg": "KEYS: don't let add_key() update an uninstantiated key" + "CVE-2023-52485": { + "cmt_msg": "drm/amd/display: Wake DMCUB before sending a command" }, - "CVE-2017-0750": { - "cmt_msg": "f2fs: do more integrity verification for superblock" + "CVE-2021-3653": { + "cmt_msg": "KVM: nSVM: avoid picking up unsupported bits from L2 in int_ctl (CVE-2021-3653)" }, - "CVE-2023-3338": { - "cmt_msg": "Remove DECnet support from kernel" + "CVE-2021-3655": { + "cmt_msg": "sctp: validate from_addr_param return" }, - "CVE-2019-11190": { - "cmt_msg": "binfmt_elf: switch to new creds when switching to new mm" + "CVE-2021-4159": { + "cmt_msg": "bpf: Verifer, adjust_scalar_min_max_vals to always call update_reg_bounds()" }, - "CVE-2019-11191": { - "cmt_msg": "x86: Deprecate a.out support" + "CVE-2019-12614": { + "cmt_msg": "powerpc/pseries/dlpar: Fix a missing check in dlpar_parse_cc_property()" }, - "CVE-2018-10323": { - "cmt_msg": "xfs: set format back to extents if xfs_bmap_extents_to_btree" + "CVE-2019-12615": { + "cmt_msg": "mdesc: fix a missing-check bug in get_vdev_port_node_info()" }, - "CVE-2018-10322": { - "cmt_msg": "xfs: enhance dinode verifier" + "CVE-2021-3714": { + "cmt_msg": "" }, - "CVE-2017-8824": { - "cmt_msg": "dccp: CVE-2017-8824: use-after-free in DCCP code" + "CVE-2024-26733": { + "cmt_msg": "arp: Prevent overflow in arp_req_get()." }, - "CVE-2018-7492": { - "cmt_msg": "rds: Fix NULL pointer dereference in __rds_rdma_map" + "CVE-2020-10742": { + "cmt_msg": "new helper: iov_iter_get_pages_alloc()" }, - "CVE-2020-26139": { - "cmt_msg": "mac80211: do not accept/forward invalid EAPOL frames" + "CVE-2017-12168": { + "cmt_msg": "arm64: KVM: pmu: Fix AArch32 cycle counter access" }, - "CVE-2019-10220": { - "cmt_msg": "Convert filldir[64]() from __put_user() to unsafe_put_user()" + "CVE-2019-16233": { + "cmt_msg": "scsi: qla2xxx: fix a potential NULL pointer dereference" }, - "CVE-2021-3609": { - "cmt_msg": "can: bcm: delay release of struct bcm_op after synchronize_rcu()" + "CVE-2021-3892": { + "cmt_msg": "" }, - "CVE-2017-13305": { - "cmt_msg": "KEYS: encrypted: fix buffer overread in valid_master_desc()" + "CVE-2024-26752": { + "cmt_msg": "l2tp: pass correct message length to ip6_append_data" + }, + "CVE-2019-6133": { + "cmt_msg": "fork: record start_time late" + }, + "CVE-2018-10902": { + "cmt_msg": "ALSA: rawmidi: Change resized buffers atomically" + }, + "CVE-2020-27673": { + "cmt_msg": "xen/events: add a proper barrier to 2-level uevent unmasking" + }, + "CVE-2021-39636": { + "cmt_msg": "netfilter: x_tables: fix pointer leaks to userspace" + }, + "CVE-2017-18204": { + "cmt_msg": "ocfs2: should wait dio before inode lock in ocfs2_setattr()" + }, + "CVE-2021-39634": { + "cmt_msg": "epoll: do not insert into poll queues until all sanity checks are done" + }, + "CVE-2022-25375": { + "cmt_msg": "usb: gadget: rndis: check size of RNDIS_MSG_SET command" + }, + "CVE-2022-33742": { + "cmt_msg": "xen/blkfront: force data bouncing when backend is untrusted" }, - "CVE-2017-13220": { - "cmt_msg": "Bluetooth: hidp_connection_add() unsafe use of l2cap_pi()" + "CVE-2022-33741": { + "cmt_msg": "xen/netfront: force data bouncing when backend is untrusted" }, - "CVE-2019-19536": { - "cmt_msg": "can: peak_usb: pcan_usb_pro: Fix info-leaks to USB devices" + "CVE-2018-20509": { + "cmt_msg": "binder: refactor binder ref inc/dec for thread safety" }, - "CVE-2019-19537": { - "cmt_msg": "USB: core: Fix races in character device registration and deregistraion" + "CVE-2024-24864": { + "cmt_msg": "" }, - "CVE-2019-19534": { - "cmt_msg": "can: peak_usb: fix slab info leak" + "CVE-2022-45885": { + "cmt_msg": "" }, - "CVE-2019-19532": { - "cmt_msg": "HID: Fix assumption that devices have inputs" + "CVE-2022-33744": { + "cmt_msg": "xen/arm: Fix race in RB-tree based P2M accounting" }, - "CVE-2018-14617": { - "cmt_msg": "hfsplus: fix NULL dereference in hfsplus_lookup()" + "CVE-2023-52596": { + "cmt_msg": "sysctl: Fix out of bounds access for empty sysctl registers" }, - "CVE-2019-10638": { - "cmt_msg": "inet: switch IP ID generator to siphash" + "CVE-2023-52597": { + "cmt_msg": "KVM: s390: fix setting of fpc register" }, - "CVE-2019-10639": { - "cmt_msg": "netns: provide pure entropy for net_hash_mix()" + "CVE-2017-18193": { + "cmt_msg": "f2fs: fix a bug caused by NULL extent tree" }, - "CVE-2021-0929": { - "cmt_msg": "staging/android/ion: delete dma_buf->kmap/unmap implemenation" + "CVE-2022-40768": { + "cmt_msg": "scsi: stex: Properly zero out the passthrough command structure" }, - "CVE-2018-14616": { - "cmt_msg": "f2fs: fix to do sanity check with block address in main area v2" + "CVE-2023-52593": { + "cmt_msg": "wifi: wfx: fix possible NULL pointer dereference in wfx_set_mfp_ap()" }, - "CVE-2018-19985": { - "cmt_msg": "USB: hso: Fix OOB memory access in hso_probe/hso_get_config_data" + "CVE-2021-47158": { + "cmt_msg": "net: dsa: sja1105: add error handling in sja1105_setup()" }, - "CVE-2018-6554": { - "cmt_msg": "staging: irda: remove the irda network stack and drivers" + "CVE-2023-52591": { + "cmt_msg": "reiserfs: Avoid touching renamed directory if parent does not change" }, - "CVE-2018-6555": { - "cmt_msg": "staging: irda: remove the irda network stack and drivers" + "CVE-2020-12888": { + "cmt_msg": "vfio-pci: Invalidate mmaps and block MMIO access on disabled memory" }, - "CVE-2023-6546": { - "cmt_msg": "tty: n_gsm: fix the UAF caused by race condition in gsm_cleanup_mux" + "CVE-2023-52598": { + "cmt_msg": "s390/ptrace: handle setting of fpc register correctly" }, - "CVE-2017-18255": { - "cmt_msg": "perf/core: Fix the perf_cpu_time_max_percent check" + "CVE-2021-47151": { + "cmt_msg": "interconnect: qcom: bcm-voter: add a missing of_node_put()" }, - "CVE-2018-5953": { - "cmt_msg": "printk: hash addresses printed with %p" + "CVE-2021-46936": { + "cmt_msg": "net: fix use-after-free in tw_timer_handler" }, - "CVE-2024-26587": { - "cmt_msg": "net: netdevsim: don't try to destroy PHC on VFs" + "CVE-2016-6198": { + "cmt_msg": "vfs: add vfs_select_inode() helper" }, - "CVE-2020-28374": { - "cmt_msg": "scsi: target: Fix XCOPY NAA identifier lookup" + "CVE-2024-26627": { + "cmt_msg": "scsi: core: Move scsi_host_busy() out of host lock for waking up EH handler" }, - "CVE-2019-9213": { - "cmt_msg": "mm: enforce min addr even if capable() in expand_downwards()" + "CVE-2022-41218": { + "cmt_msg": "media: dvb-core: Fix UAF due to refcount races at releasing" }, - "CVE-2023-2007": { - "cmt_msg": "scsi: dpt_i2o: Remove obsolete driver" + "CVE-2020-14331": { + "cmt_msg": "vgacon: Fix for missing check in scrollback handling" }, - "CVE-2020-26557": { - "cmt_msg": "" + "CVE-2020-28915": { + "cmt_msg": "fbcon: Fix global-out-of-bounds read in fbcon_get_font()" }, - "CVE-2017-16535": { - "cmt_msg": "USB: core: fix out-of-bounds access bug in usb_get_bos_descriptor()" + "CVE-2022-36946": { + "cmt_msg": "netfilter: nf_queue: do not allow packet truncation below transport header offset" }, - "CVE-2019-14897": { - "cmt_msg": "libertas: Fix two buffer overflows at parsing bss descriptor" + "CVE-2021-45485": { + "cmt_msg": "ipv6: use prandom_u32() for ID generation" }, - "CVE-2017-16537": { - "cmt_msg": "media: imon: Fix null-ptr-deref in imon_probe" + "CVE-2021-0448": { + "cmt_msg": "netfilter: ctnetlink: add a range check for l3/l4 protonum" }, - "CVE-2017-16536": { - "cmt_msg": "[media] cx231xx-cards: fix NULL-deref on missing association descriptor" + "CVE-2016-6197": { + "cmt_msg": "ovl: verify upper dentry before unlink and rename" }, - "CVE-2017-16531": { - "cmt_msg": "USB: fix out-of-bounds in usb_set_configuration" + "CVE-2021-46939": { + "cmt_msg": "tracing: Restructure trace_clock_global() to never block" }, - "CVE-2017-16533": { - "cmt_msg": "HID: usbhid: fix out-of-bounds bug" + "CVE-2020-29374": { + "cmt_msg": "gup: document and work around \"COW can break either way\" issue" }, - "CVE-2017-16532": { - "cmt_msg": "usb: usbtest: fix NULL pointer dereference" + "CVE-2020-0030": { + "cmt_msg": "ANDROID: binder: synchronize_rcu() when using POLLFREE." }, - "CVE-2023-35824": { - "cmt_msg": "media: dm1105: Fix use after free bug in dm1105_remove due to race condition" + "CVE-2015-8709": { + "cmt_msg": "mm: Add a user_ns owner to mm_struct and fix ptrace permission checks" }, - "CVE-2014-9419": { - "cmt_msg": "x86_64, switch_to(): Load TLS descriptors before switching DS and ES" + "CVE-2023-52449": { + "cmt_msg": "mtd: Fix gluebi NULL pointer dereference caused by ftl notifier" }, - "CVE-2023-3006": { - "cmt_msg": "arm64: Add AMPERE1 to the Spectre-BHB affected list" + "CVE-2021-29650": { + "cmt_msg": "netfilter: x_tables: Use correct memory barriers." }, - "CVE-2020-27825": { - "cmt_msg": "tracing: Fix race in trace_open and buffer resize call" + "CVE-2019-17133": { + "cmt_msg": "cfg80211: wext: avoid copying malformed SSIDs" }, - "CVE-2019-2181": { - "cmt_msg": "binder: check for overflow when alloc for security context" + "CVE-2018-20169": { + "cmt_msg": "USB: check usb_get_extra_descriptor for proper size" }, - "CVE-2020-27820": { - "cmt_msg": "drm/nouveau: use drm_dev_unplug() during device removal" + "CVE-2017-12762": { + "cmt_msg": "isdn/i4l: fix buffer overflow" }, - "CVE-2023-0047": { - "cmt_msg": "mm, oom: do not trigger out_of_memory from the #PF" + "CVE-2022-41849": { + "cmt_msg": "fbdev: smscufx: Fix use-after-free in ufx_ops_open()" }, - "CVE-2020-26141": { - "cmt_msg": "ath10k: Fix TKIP Michael MIC verification for PCIe" + "CVE-2022-41848": { + "cmt_msg": "" }, - "CVE-2017-18221": { - "cmt_msg": "mlock: fix mlock count can not decrease in race condition" + "CVE-2023-6356": { + "cmt_msg": "nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length" }, - "CVE-2020-0066": { - "cmt_msg": "netlink: Trim skb to alloc size to avoid MSG_TRUNC" + "CVE-2022-1353": { + "cmt_msg": "af_key: add __GFP_ZERO flag for compose_sadb_supported in function pfkey_register" }, - "CVE-2019-20794": { - "cmt_msg": "" + "CVE-2022-28356": { + "cmt_msg": "llc: fix netdevice reference leaks in llc_ui_bind()" }, - "CVE-2023-39193": { - "cmt_msg": "netfilter: xt_sctp: validate the flag_info count" + "CVE-2022-1198": { + "cmt_msg": "drivers: hamradio: 6pack: fix UAF bug caused by mod_timer()" }, - "CVE-2023-39192": { - "cmt_msg": "netfilter: xt_u32: validate user space input" + "CVE-2022-1199": { + "cmt_msg": "ax25: Fix NULL pointer dereference in ax25_kill_by_device" }, - "CVE-2020-26541": { - "cmt_msg": "certs: Add EFI_CERT_X509_GUID support for dbx entries" + "CVE-2015-8966": { + "cmt_msg": "[PATCH] arm: fix handling of F_OFD_... in oabi_fcntl64()" }, - "CVE-2023-6610": { - "cmt_msg": "smb: client: fix potential OOB in smb2_dump_detail()" + "CVE-2015-8967": { + "cmt_msg": "arm64: make sys_call_table const" }, - "CVE-2020-26559": { + "CVE-2021-39801": { "cmt_msg": "" }, - "CVE-2021-20317": { - "cmt_msg": "lib/timerqueue: Rely on rbtree semantics for next timer" + "CVE-2021-39800": { + "cmt_msg": "" }, - "CVE-2021-43389": { - "cmt_msg": "isdn: cpai: check ctr->cnr to avoid array index out of bound" + "CVE-2019-3837": { + "cmt_msg": "net_dma: simple removal" }, - "CVE-2017-14156": { - "cmt_msg": "video: fbdev: aty: do not leak uninitialized padding in clk to userspace" + "CVE-2024-26784": { + "cmt_msg": "pmdomain: arm: Fix NULL dereference on scmi_perf_domain removal" }, - "CVE-2021-33061": { - "cmt_msg": "ixgbe: add improvement for MDD response functionality" + "CVE-2014-8171": { + "cmt_msg": "mm: memcg: do not trap chargers with full callstack on OOM" }, - "CVE-2024-26592": { - "cmt_msg": "ksmbd: fix UAF issue in ksmbd_tcp_new_connection()" + "CVE-2014-8172": { + "cmt_msg": "get rid of s_files and files_lock" }, - "CVE-2018-1092": { - "cmt_msg": "ext4: fail ext4_iget for root directory if unallocated" + "CVE-2021-4202": { + "cmt_msg": "NFC: reorganize the functions in nci_request" }, - "CVE-2018-1093": { - "cmt_msg": "ext4: add validity checks for bitmap block numbers" + "CVE-2021-4203": { + "cmt_msg": "af_unix: fix races in sk_peer_pid and sk_peer_cred accesses" }, - "CVE-2017-18551": { - "cmt_msg": "i2c: core-smbus: prevent stack corruption on read I2C_BLOCK_DATA" + "CVE-2022-45887": { + "cmt_msg": "media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb()" }, - "CVE-2023-1074": { - "cmt_msg": "sctp: fail if no bound addresses can be used for a given scope" + "CVE-2022-45886": { + "cmt_msg": "media: dvb-core: Fix use-after-free due on race condition at dvb_net" }, - "CVE-2017-18552": { - "cmt_msg": "RDS: validate the requested traces user input against max supported" + "CVE-2023-52509": { + "cmt_msg": "ravb: Fix use-after-free issue in ravb_tx_timeout_work()" }, - "CVE-2015-8839": { - "cmt_msg": "ext4: fix races between page faults and hole punching" + "CVE-2023-52508": { + "cmt_msg": "nvme-fc: Prevent null pointer dereference in nvme_fc_io_getuuid()" }, - "CVE-2022-1652": { - "cmt_msg": "floppy: use a statically allocated error counter" + "CVE-2024-25744": { + "cmt_msg": "x86/coco: Disable 32-bit emulation by default on TDX and SEV" }, - "CVE-2015-8830": { - "cmt_msg": "aio: lift iov_iter_init() into aio_setup_..._rw()" + "CVE-2017-16646": { + "cmt_msg": "media: dib0700: fix invalid dvb_detach argument" }, - "CVE-2019-9457": { - "cmt_msg": "exec: Limit arg stack to at most 75% of _STK_LIM" + "CVE-2023-52507": { + "cmt_msg": "nfc: nci: assert requested protocol is valid" }, - "CVE-2019-19054": { - "cmt_msg": "media: rc: prevent memory leak in cx23888_ir_probe" + "CVE-2023-3022": { + "cmt_msg": "ipv6: Use result arg in fib_lookup_arg consistently" }, - "CVE-2019-19057": { - "cmt_msg": "mwifiex: pcie: Fix memory leak in mwifiex_pcie_init_evt_ring" + "CVE-2023-52501": { + "cmt_msg": "ring-buffer: Do not attempt to read past \"commit\"" }, - "CVE-2019-19056": { - "cmt_msg": "mwifiex: pcie: Fix memory leak in mwifiex_pcie_alloc_cmdrsp_buf" + "CVE-2023-52500": { + "cmt_msg": "scsi: pm80xx: Avoid leaking tags when processing OPC_INB_SET_CONTROLLER_CONFIG command" }, - "CVE-2016-10741": { - "cmt_msg": "xfs: don't BUG() on mixed direct and mapped I/O" + "CVE-2024-26793": { + "cmt_msg": "gtp: fix use-after-free and null-ptr-deref in gtp_newlink()" }, - "CVE-2023-23039": { - "cmt_msg": "" + "CVE-2021-44879": { + "cmt_msg": "f2fs: fix to do sanity check on inode type during garbage collection" }, - "CVE-2023-20569": { - "cmt_msg": "x86/bugs: Increase the x86 bugs vector size to two u32s" + "CVE-2019-15505": { + "cmt_msg": "media: technisat-usb2: break out of loop at end of buffer" }, - "CVE-2019-3846": { - "cmt_msg": "mwifiex: Fix possible buffer overflows at parsing bss descriptor" + "CVE-2023-2513": { + "cmt_msg": "ext4: fix use-after-free in ext4_xattr_set_entry" }, - "CVE-2023-46838": { - "cmt_msg": "xen-netback: don't produce zero-size SKB frags" + "CVE-2017-1000": { + "cmt_msg": "udp: consistently apply ufo or fragmentation" }, - "CVE-2020-0427": { - "cmt_msg": "pinctrl: devicetree: Avoid taking direct reference to device name string" + "CVE-2020-11609": { + "cmt_msg": "media: stv06xx: add missing descriptor sanity checks" }, - "CVE-2022-20424": { - "cmt_msg": "io_uring: remove io_identity" + "CVE-2022-27672": { + "cmt_msg": "x86/speculation: Identify processors vulnerable to SMT RSB predictions" }, - "CVE-2019-9458": { - "cmt_msg": "media: v4l: event: Prevent freeing event subscriptions while accessed" + "CVE-2013-1772": { + "cmt_msg": "printk: convert byte-buffer to variable-length record buffer" }, - "CVE-2023-39197": { - "cmt_msg": "netfilter: conntrack: dccp: copy entire header to stack buffer, not just basic one" + "CVE-2021-1048": { + "cmt_msg": "fix regression in \"epoll: Keep a reference on files added to the check list\"" }, - "CVE-2017-9242": { - "cmt_msg": "ipv6: fix out of bound writes in __ip6_append_data()" + "CVE-2014-9803": { + "cmt_msg": "Revert \"arm64: Introduce execute-only page access permissions\"" }, - "CVE-2020-14314": { - "cmt_msg": "ext4: fix potential negative array index in do_split()" + "CVE-2015-2877": { + "cmt_msg": "" }, - "CVE-2019-13272": { - "cmt_msg": "ptrace: Fix ->ptracer_cred handling for PTRACE_TRACEME" + "CVE-2020-9383": { + "cmt_msg": "floppy: check FDC index for errors before assigning it" }, - "CVE-2021-3587": { - "cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect" + "CVE-2024-26664": { + "cmt_msg": "hwmon: (coretemp) Fix out-of-bounds memory access" }, - "CVE-2023-45862": { - "cmt_msg": "USB: ene_usb6250: Allocate enough memory for full object" + "CVE-2023-32269": { + "cmt_msg": "netrom: Fix use-after-free caused by accept on already connected socket" }, - "CVE-2023-45863": { - "cmt_msg": "kobject: Fix slab-out-of-bounds in fill_kobj_path()" + "CVE-2021-38198": { + "cmt_msg": "KVM: X86: MMU: Use the correct inherited permissions to get shadow page" }, - "CVE-2017-15537": { - "cmt_msg": "x86/fpu: Don't let userspace set bogus xcomp_bv" + "CVE-2017-5972": { + "cmt_msg": "tcp: do not lock listener to process SYN packets" }, - "CVE-2019-17351": { - "cmt_msg": "xen: let alloc_xenballooned_pages() fail if not enough memory free" + "CVE-2023-34256": { + "cmt_msg": "ext4: avoid a potential slab-out-of-bounds in ext4_group_desc_csum" }, - "CVE-2022-23222": { - "cmt_msg": "bpf: Replace PTR_TO_XXX_OR_NULL with PTR_TO_XXX | PTR_MAYBE_NULL" + "CVE-2023-1513": { + "cmt_msg": "kvm: initialize all of the kvm_debugregs structure before sending it to userspace" }, - "CVE-2020-25669": { - "cmt_msg": "Input: sunkbd - avoid use-after-free in teardown paths" + "CVE-2021-26401": { + "cmt_msg": "x86/speculation: Use generic retpoline by default on AMD" }, - "CVE-2020-25668": { - "cmt_msg": "tty: make FONTX ioctl use the tty pointer they were actually passed" + "CVE-2024-1312": { + "cmt_msg": "mm: lock_vma_under_rcu() must check vma->anon_vma under vma lock" }, - "CVE-2008-4609": { + "CVE-2021-3847": { "cmt_msg": "" }, - "CVE-2023-40283": { - "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb" + "CVE-2023-52442": { + "cmt_msg": "ksmbd: validate session id and tree id in compound request" }, - "CVE-2018-19824": { - "cmt_msg": "ALSA: usb-audio: Fix UAF decrement if card has no live interfaces in card.c" + "CVE-2019-14284": { + "cmt_msg": "floppy: fix div-by-zero in setup_format_params" }, - "CVE-2018-20854": { - "cmt_msg": "phy: ocelot-serdes: fix out-of-bounds read" + "CVE-2022-1280": { + "cmt_msg": "drm: avoid circular locks in drm_mode_getconnector" }, - "CVE-2018-5391": { - "cmt_msg": "ip: discard IPv4 datagrams with overlapping segments." + "CVE-2021-3506": { + "cmt_msg": "f2fs: fix to avoid out-of-bounds memory access" }, - "CVE-2022-3533": { + "CVE-2011-4917": { "cmt_msg": "" }, - "CVE-2023-26607": { - "cmt_msg": "ntfs: fix out-of-bounds read in ntfs_attr_find()" - }, - "CVE-2018-20855": { - "cmt_msg": "IB/mlx5: Fix leaking stack memory to userspace" - }, - "CVE-2019-15239": { + "CVE-2011-4916": { "cmt_msg": "" }, - "CVE-2021-4037": { - "cmt_msg": "xfs: fix up non-directory creation in SGID directories" + "CVE-2018-10880": { + "cmt_msg": "ext4: never move the system.data xattr out of the inode body" }, - "CVE-2021-22543": { - "cmt_msg": "KVM: do not allow mapping valid but non-reference-counted pages" + "CVE-2019-3901": { + "cmt_msg": "perf/core: Fix perf_event_open() vs. execve() race" }, - "CVE-2022-45884": { - "cmt_msg": "" + "CVE-2020-36558": { + "cmt_msg": "vt: vt_ioctl: fix race in VT_RESIZEX" }, - "CVE-2019-1999": { - "cmt_msg": "binder: fix race between munmap() and direct reclaim" + "CVE-2023-3338": { + "cmt_msg": "Remove DECnet support from kernel" }, - "CVE-2023-20941": { + "CVE-2023-23039": { "cmt_msg": "" }, - "CVE-2018-1066": { - "cmt_msg": "CIFS: Enable encryption during session setup phase" + "CVE-2019-15807": { + "cmt_msg": "scsi: libsas: delete sas port if expander discover failed" }, - "CVE-2018-20836": { - "cmt_msg": "scsi: libsas: fix a race condition when smp task timeout" + "CVE-2014-7975": { + "cmt_msg": "fs: Add a missing permission check to do_umount" }, - "CVE-2018-1068": { - "cmt_msg": "netfilter: ebtables: CONFIG_COMPAT: don't trust userland offsets" + "CVE-2024-26719": { + "cmt_msg": "nouveau: offload fence uevents work to workqueue" }, - "CVE-2020-10135": { - "cmt_msg": "Bluetooth: Consolidate encryption handling in hci_encrypt_cfm" + "CVE-2023-31083": { + "cmt_msg": "Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO" }, - "CVE-2020-25285": { - "cmt_msg": "mm/hugetlb: fix a race between hugetlb sysctl handlers" + "CVE-2019-5489": { + "cmt_msg": "Change mincore() to count \"mapped\" pages rather than \"cached\" pages" }, - "CVE-2019-7308": { - "cmt_msg": "bpf: fix sanitation of alu op with pointer / scalar type from different paths" + "CVE-2021-47082": { + "cmt_msg": "tun: avoid double free in tun_free_netdev" }, - "CVE-2018-1000199": { - "cmt_msg": "perf/hwbp: Simplify the perf-hwbp code, fix documentation" + "CVE-2019-19531": { + "cmt_msg": "usb: yurex: Fix use-after-free in yurex_delete" }, - "CVE-2022-1966": { - "cmt_msg": "netfilter: nf_tables: disallow non-stateful expression in sets earlier" + "CVE-2019-14283": { + "cmt_msg": "floppy: fix out-of-bounds read in copy_buffer" }, - "CVE-2015-8967": { - "cmt_msg": "arm64: make sys_call_table const" + "CVE-2018-10881": { + "cmt_msg": "ext4: clear i_data in ext4_inode_info when removing inline data" }, - "CVE-2017-9986": { - "cmt_msg": "sound: Retire OSS" + "CVE-2018-10882": { + "cmt_msg": "ext4: add more inode number paranoia checks" }, - "CVE-2017-9985": { - "cmt_msg": "ALSA: msnd: Optimize / harden DSP and MIDI loops" + "CVE-2018-10883": { + "cmt_msg": "jbd2: don't mark block as modified if the handle is out of credits" + } + } + }, + "6.2": { + "6.2": { + "CVE-2023-1281": { + "cmt_msg": "net/sched: tcindex: update imperfect hash filters respecting rcu", + "cmt_id": "ee059170b1f7e94e55fa6cadee544e176a6e59c2" }, - "CVE-2017-9984": { - "cmt_msg": "ALSA: msnd: Optimize / harden DSP and MIDI loops" + "CVE-2023-26545": { + "cmt_msg": "net: mpls: fix stale pointer if allocation fails during device rename", + "cmt_id": "fda6c89fe3d9aca073495a664e1d5aea28cd4377" }, - "CVE-2019-9454": { - "cmt_msg": "i2c: core-smbus: prevent stack corruption on read I2C_BLOCK_DATA" + "CVE-2023-33952": { + "cmt_msg": "drm/vmwgfx: Do not drop the reference to the handle too soon", + "cmt_id": "a950b989ea29ab3b38ea7f6e3d2540700a3c54e8" }, - "CVE-2022-3534": { - "cmt_msg": "libbpf: Fix use-after-free in btf_dump_name_dups" + "CVE-2023-33951": { + "cmt_msg": "drm/vmwgfx: Do not drop the reference to the handle too soon", + "cmt_id": "a950b989ea29ab3b38ea7f6e3d2540700a3c54e8" }, - "CVE-2023-34256": { - "cmt_msg": "ext4: avoid a potential slab-out-of-bounds in ext4_group_desc_csum" + "CVE-2023-1513": { + "cmt_msg": "kvm: initialize all of the kvm_debugregs structure before sending it to userspace", + "cmt_id": "2c10b61421a28e95a46ab489fd56c0f442ff6952" }, - "CVE-2021-20261": { - "cmt_msg": "floppy: fix lock_fdc() signal handling" + "CVE-2022-27672": { + "cmt_msg": "x86/speculation: Identify processors vulnerable to SMT RSB predictions", + "cmt_id": "be8de49bea505e7777a69ef63d60e02ac1712683" + } + }, + "6.2.1": { + "CVE-2023-0459": { + "cmt_msg": "uaccess: Add speculation barrier to copy_from_user()", + "cmt_id": "2c8ee21d78942cf48bc836612ad365fd6f06cfbb" + } + }, + "6.2.3": { + "CVE-2023-3355": { + "cmt_msg": "drm/msm/gem: Add check for kmalloc", + "cmt_id": "abadeef9a82f86e6668759259adbcf8be6f44a9b" }, - "CVE-2019-15214": { - "cmt_msg": "ALSA: core: Fix card races between register and disconnect" + "CVE-2023-1998": { + "cmt_msg": "x86/speculation: Allow enabling STIBP with legacy IBRS", + "cmt_id": "ead3c8e54d28fa1d5454b1f8a21b96b4a969b1cb" }, - "CVE-2017-18079": { - "cmt_msg": "Input: i8042 - fix crash at boot time" + "CVE-2024-26766": { + "cmt_msg": "IB/hfi1: Fix sdma.h tx->num_descs off-by-one error", + "cmt_id": "0ef9594936d1f078e8599a1cf683b052df2bec00" }, - "CVE-2020-25284": { - "cmt_msg": "rbd: require global CAP_SYS_ADMIN for mapping and unmapping" + "CVE-2023-1032": { + "cmt_msg": "net: avoid double iput when sock_alloc_file fails", + "cmt_id": "cb6aedc1fd9d808d7319db2f953f4886dd46c627" }, - "CVE-2023-28328": { - "cmt_msg": "media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer()" + "CVE-2023-3220": { + "cmt_msg": "drm/msm/dpu: Add check for pstates", + "cmt_id": "c745fd463ccf21943cfc35cb8842a33dda2ae259" }, - "CVE-2023-0386": { - "cmt_msg": "ovl: fail on invalid uid/gid mapping at copy up" + "CVE-2023-2985": { + "cmt_msg": "fs: hfsplus: fix UAF issue in hfsplus_put_super", + "cmt_id": "f348b373cebeaa91bf3552099026951189f14436" }, - "CVE-2016-6136": { - "cmt_msg": "audit: fix a double fetch in audit_log_single_execve_arg()" + "CVE-2023-1079": { + "cmt_msg": "HID: asus: use spinlock to safely schedule workers", + "cmt_id": "b08bcfb4c97d7bd41b362cff44b2c537ce9e8540" }, - "CVE-2017-13693": { - "cmt_msg": "" + "CVE-2023-25012": { + "cmt_msg": "HID: bigben: use spinlock to safely schedule workers", + "cmt_id": "90289e71514e9533a9c44d694e2b492be9ed2b77" }, - "CVE-2017-13695": { - "cmt_msg": "ACPICA: acpi: acpica: fix acpi operand cache leak in nseval.c" + "CVE-2023-1076": { + "cmt_msg": "tun: tun_chr_open(): correctly initialize socket uid", + "cmt_id": "4aa4b4b3b3e9551c4de2bf2987247c28805fb8f6" }, - "CVE-2017-13694": { - "cmt_msg": "" + "CVE-2023-1077": { + "cmt_msg": "sched/rt: pick_next_rt_entity(): check list_entry", + "cmt_id": "1099004ae1664703ec573fc4c61ffb24144bcb63" }, - "CVE-2021-4149": { - "cmt_msg": "btrfs: unlock newly allocated extent buffer after error" + "CVE-2023-39191": { + "cmt_msg": "bpf: Fix state pruning for STACK_DYNPTR stack slots", + "cmt_id": "720d2504791a93becde81c335abcea2f42d066a7" }, - "CVE-2022-21385": { - "cmt_msg": "net/rds: fix warn in rds_message_alloc_sgs" + "CVE-2023-45863": { + "cmt_msg": "kobject: Fix slab-out-of-bounds in fill_kobj_path()", + "cmt_id": "e6ca1549afb2b495e61a8fb53ae942193ef823e0" }, - "CVE-2022-42895": { - "cmt_msg": "Bluetooth: L2CAP: Fix attempting to access uninitialized memory" + "CVE-2023-1118": { + "cmt_msg": "media: rc: Fix use-after-free bugs caused by ene_tx_irqsim()", + "cmt_id": "182ea492aae5b64067277e60a4ea5995c4628555" + } + }, + "6.2.5": { + "CVE-2023-7192": { + "cmt_msg": "netfilter: ctnetlink: fix possible refcount leak in ctnetlink_create_conntrack()", + "cmt_id": "033ac6ea4b513f9a4a20882f431f68cea307ba87" }, - "CVE-2021-3640": { - "cmt_msg": "Bluetooth: sco: Fix lock_sock() blockage by memcpy_from_msg()" + "CVE-2023-45862": { + "cmt_msg": "USB: ene_usb6250: Allocate enough memory for full object", + "cmt_id": "5ee39d2216dc98a894ffc38d15e1ef2d41e2266b" }, - "CVE-2017-7618": { - "cmt_msg": "crypto: ahash - Fix EINPROGRESS notification callback" + "CVE-2023-1829": { + "cmt_msg": "net/sched: Retire tcindex classifier", + "cmt_id": "372ae77cf11d11fb118cbe2d37def9dd5f826abd" + } + }, + "6.2.7": { + "CVE-2023-28466": { + "cmt_msg": "net: tls: fix possible race condition between do_tls_getsockopt_conf() and do_tls_setsockopt_conf()", + "cmt_id": "5231fa057bb0e52095591b303cf95ebd17bc62ce" + } + }, + "6.2.8": { + "CVE-2023-30456": { + "cmt_msg": "KVM: nVMX: add missing consistency checks for CR0 and CR4", + "cmt_id": "71d05b9fa0bfc131a6e2250dea045a818ff25550" }, - "CVE-2020-1749": { - "cmt_msg": "net: ipv6_stub: use ip6_dst_lookup_flow instead of ip6_dst_lookup" + "CVE-2023-2235": { + "cmt_msg": "perf: Fix check before add_event_to_groups() in perf_group_detach()", + "cmt_id": "2c6d1b32838d8cf0114dfdbbb93f4d808e498760" }, - "CVE-2022-1786": { - "cmt_msg": "io_uring: remove io_identity" + "CVE-2023-1855": { + "cmt_msg": "hwmon: (xgene) Fix use after free bug in xgene_hwmon_remove due to race condition", + "cmt_id": "eacd1f6bb43ac4b9de3bf886083a71c18d5f329f" }, - "CVE-2022-36123": { - "cmt_msg": "x86: Clear .brk area at early boot" + "CVE-2023-1990": { + "cmt_msg": "nfc: st-nci: Fix use after free bug in ndlc_remove due to race condition", + "cmt_id": "f589e5b56c562d99ea74e05b1c3f0eab78aa17a3" + } + }, + "6.2.9": { + "CVE-2023-2483": { + "cmt_msg": "net: qcom/emac: Fix use after free bug in emac_remove due to race condition", + "cmt_id": "514dc3d0f176d280dc2d3cd25e898a7ec329e878" }, - "CVE-2020-11608": { - "cmt_msg": "media: ov519: add missing endpoint sanity checks" + "CVE-2023-30772": { + "cmt_msg": "power: supply: da9150: Fix use after free bug in da9150_charger_remove due to race condition", + "cmt_id": "a7d686b36aa8021ee96128290ac3b58c4c1f6297" }, - "CVE-2020-10732": { - "cmt_msg": "fs/binfmt_elf.c: allocate initialized memory in fill_thread_core_info()" + "CVE-2023-33203": { + "cmt_msg": "net: qcom/emac: Fix use after free bug in emac_remove due to race condition", + "cmt_id": "514dc3d0f176d280dc2d3cd25e898a7ec329e878" }, - "CVE-2020-28097": { - "cmt_msg": "vgacon: remove software scrollback support" + "CVE-2023-33288": { + "cmt_msg": "power: supply: bq24190: Fix use after free bug in bq24190_remove due to race condition", + "cmt_id": "2da4b860f3055ae40a809c020398778e6c27b856" }, - "CVE-2017-18216": { - "cmt_msg": "ocfs2: subsystem.su_mutex is required while accessing the item->ci_parent" + "CVE-2023-28866": { + "cmt_msg": "Bluetooth: HCI: Fix global-out-of-bounds", + "cmt_id": "8497222b22b591c6b2d106e0e3c1672ffe4e10e0" }, - "CVE-2017-1000112": { - "cmt_msg": "udp: consistently apply ufo or fragmentation" + "CVE-2023-1670": { + "cmt_msg": "xirc2ps_cs: Fix use after free bug in xirc2ps_detach", + "cmt_id": "9c515f3290456bb6850bd7ee29d5bf6652d7f103" }, - "CVE-2017-1000111": { - "cmt_msg": "packet: fix tp_reserve race in packet_set_ring" + "CVE-2022-4269": { + "cmt_msg": "act_mirred: use the backlog for nested calls to mirred ingress", + "cmt_id": "8c9e553c58a491ad328c622441e08178373442dc" }, - "CVE-2024-24855": { - "cmt_msg": "scsi: lpfc: Fix a possible data race in lpfc_unregister_fcf_rescan()" + "CVE-2023-1989": { + "cmt_msg": "Bluetooth: btsdio: fix use after free bug in btsdio_remove due to unfinished work", + "cmt_id": "c59c65a14e8f7d738429648833f3bb3f9df0513f" }, - "CVE-2015-8374": { - "cmt_msg": "Btrfs: fix truncation of compressed and inlined extents" + "CVE-2023-2194": { + "cmt_msg": "i2c: xgene-slimpro: Fix out-of-bounds bug in xgene_slimpro_i2c_xfer()", + "cmt_id": "cc3c3ee6d035d38f116a6dec88acf7f74598aebd" }, - "CVE-2018-5848": { - "cmt_msg": "wil6210: missing length check in wmi_set_ie" + "CVE-2023-1583": { + "cmt_msg": "io_uring/rsrc: fix null-ptr-deref in io_file_bitmap_get()", + "cmt_id": "2ff9f7319b915acc42cf8fcf743589f926f4a014" + } + }, + "6.2.10": { + "CVE-2023-1611": { + "cmt_msg": "btrfs: fix race between quota disable and quota assign ioctls", + "cmt_id": "4caab245b0469ce9258ba099a41e909f5d307b33" + } + }, + "6.2.12": { + "CVE-2023-38409": { + "cmt_msg": "fbcon: set_con2fb_map needs to set con2fb_map!", + "cmt_id": "62055fa6fbf8f1f1457f5d6a7d17ce1a45972613" }, - "CVE-2018-8897": { - "cmt_msg": "x86/entry/64: Don't use IST entry for #BP stack" + "CVE-2023-1859": { + "cmt_msg": "9p/xen : Fix use after free bug in xen_9pfs_front_remove due to race condition", + "cmt_id": "e7dcd834af53c79418ca3cd1c42749a314b9f7dc" + } + }, + "6.2.13": { + "CVE-2023-2156": { + "cmt_msg": "net: rpl: fix rpl header size calculation", + "cmt_id": "191642f5cfb38c0e44fb4783a37530bae15b8f8e" }, - "CVE-2021-29265": { - "cmt_msg": "usbip: fix stub_dev usbip_sockfd_store() races leading to gpf" + "CVE-2023-2163": { + "cmt_msg": "bpf: Fix incorrect verifier pruning due to missing register precision taints", + "cmt_id": "71035a0508c04827b91a5bfeb2c9ef374f321e65" }, - "CVE-2021-39648": { - "cmt_msg": "usb: gadget: configfs: Fix use-after-free issue with udc_name" + "CVE-2023-31436": { + "cmt_msg": "net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg", + "cmt_id": "420d014b19ff119e210ecc075ff611fe7844690c" }, - "CVE-2022-3545": { - "cmt_msg": "nfp: fix use-after-free in area_cache_get()" + "CVE-2023-2248": { + "cmt_msg": "net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg", + "cmt_id": "420d014b19ff119e210ecc075ff611fe7844690c" }, - "CVE-2020-14416": { - "cmt_msg": "can, slip: Protect tty->disc_data in write_wakeup and close with RCU" + "CVE-2023-4133": { + "cmt_msg": "cxgb4: fix use after free bugs caused by circular dependency problem", + "cmt_id": "7977bb80817b552d97bcc8a1ddf2b3029ca5b6a8" + } + }, + "6.2.14": { + "CVE-2023-1380": { + "cmt_msg": "wifi: brcmfmac: slab-out-of-bounds read in brcmf_get_assoc_ies()", + "cmt_id": "228186629ea970cc78b7d7d5f593f2d32fddf9f6" }, - "CVE-2019-0136": { - "cmt_msg": "mac80211: drop robust management frames from unknown TA" + "CVE-2023-2002": { + "cmt_msg": "bluetooth: Perform careful capability checks in hci_sock_ioctl()", + "cmt_id": "727b3ea80f3fdda6c686806ce3579face0415c76" + } + }, + "6.2.15": { + "CVE-2023-35829": { + "cmt_msg": "media: rkvdec: fix use after free bug in rkvdec_remove", + "cmt_id": "26f55569eeb045db9fceda0a5523521c2e76d8aa" }, - "CVE-2019-16921": { - "cmt_msg": "RDMA/hns: Fix init resp when alloc ucontext" + "CVE-2023-0160": { + "cmt_msg": "bpf, sockmap: fix deadlocks in the sockhash and sockmap", + "cmt_id": "d0e34aaea13391e28069c50de5519300d408e985" }, - "CVE-2019-19377": { - "cmt_msg": "btrfs: Don't submit any btree write bio if the fs has errors" + "CVE-2023-35828": { + "cmt_msg": "usb: gadget: udc: renesas_usb3: Fix use after free bug in renesas_usb3_remove due to race condition", + "cmt_id": "1029639643c326396ce8e07a9f52ce7165c021c3" }, - "CVE-2021-21781": { - "cmt_msg": "ARM: ensure the signal page contains defined contents" + "CVE-2023-32233": { + "cmt_msg": "netfilter: nf_tables: deactivate anonymous set from preparation phase", + "cmt_id": "6b0801dcc1aa4373d28ac8ee396788d2e715c495" }, - "CVE-2021-0512": { - "cmt_msg": "HID: make arrays usage and value to be the same" + "CVE-2023-32254": { + "cmt_msg": "ksmbd: fix racy issue under cocurrent smb2 tree disconnect", + "cmt_id": "dc1c17716c099c90948ebb83e2170dd75a3be6b6" }, - "CVE-2018-14634": { - "cmt_msg": "exec: Limit arg stack to at most 75% of _STK_LIM" + "CVE-2023-35824": { + "cmt_msg": "media: dm1105: Fix use after free bug in dm1105_remove due to race condition", + "cmt_id": "ad998076d42b394ca22e41e91c59a6056be6098d" }, - "CVE-2018-14633": { - "cmt_msg": "scsi: target: iscsi: Use hex2bin instead of a re-implementation" + "CVE-2023-3268": { + "cmt_msg": "relayfs: fix out-of-bounds access in relay_file_read", + "cmt_id": "c86ec32b864d5247602c71986e0494d12f6c4d70" }, - "CVE-2018-12896": { - "cmt_msg": "posix-timers: Sanitize overrun handling" + "CVE-2023-3312": { + "cmt_msg": "cpufreq: qcom-cpufreq-hw: fix double IO unmap and resource release on exit", + "cmt_id": "0dac12ab5780e293b8dc24e513f5c2bf9f93c524" }, - "CVE-2023-1382": { - "cmt_msg": "tipc: set con sock in tipc_conn_alloc" + "CVE-2023-3317": { + "cmt_msg": "wifi: mt76: mt7921: Fix use-after-free in fw features query.", + "cmt_id": "f1d2977584eb315a88956e457de7c800cb010478" }, - "CVE-2018-14734": { - "cmt_msg": "infiniband: fix a possible use-after-free bug" + "CVE-2023-2269": { + "cmt_msg": "dm ioctl: fix nested locking in table_clear() to remove deadlock concern", + "cmt_id": "243093d536fe3cc78b450f1beb8d584505ea3193" }, - "CVE-2022-0850": { - "cmt_msg": "ext4: fix kernel infoleak via ext4_extent_header" + "CVE-2023-32248": { + "cmt_msg": "ksmbd: fix NULL pointer dereference in smb2_get_info_filesystem()", + "cmt_id": "b35f6c031b87d9e51f141ff6de0ea59756a8e313" }, - "CVE-2015-8950": { - "cmt_msg": "arm64: dma-mapping: always clear allocated buffers" + "CVE-2023-52474": { + "cmt_msg": "IB/hfi1: Fix bugs with non-PAGE_SIZE-end multi-iovec user SDMA requests", + "cmt_id": "c76cb8f4bdf26d04cfa5485a93ce297dba5e6a80" }, - "CVE-2015-1805": { - "cmt_msg": "new helper: copy_page_from_iter()" + "CVE-2023-35826": { + "cmt_msg": "media: cedrus: fix use after free bug in cedrus_remove due to race condition", + "cmt_id": "a858e35c62966761cc2bed2e4123cf68d7df546c" }, - "CVE-2022-41222": { - "cmt_msg": "mm/mremap: hold the rmap lock in write mode when moving page table entries." + "CVE-2023-35823": { + "cmt_msg": "media: saa7134: fix use after free bug in saa7134_finidev due to race condition", + "cmt_id": "efccd54c41887e66a03bf7af860ff5eb77c47fcf" + } + }, + "6.2.16": { + "CVE-2023-32258": { + "cmt_msg": "ksmbd: fix racy issue from smb2 close and logoff with multichannel", + "cmt_id": "de428966b40c8b8abe35592ded2e9f4d366ffc38" }, - "CVE-2018-8822": { - "cmt_msg": "staging: ncpfs: memory corruption in ncp_read_kernel()" + "CVE-2023-32257": { + "cmt_msg": "ksmbd: fix racy issue from session setup and logoff", + "cmt_id": "d270631c21e68fb8016d6e231d022d7023a2df6f" }, - "CVE-2021-40490": { - "cmt_msg": "ext4: fix race writing to an inline_data file while its xattrs are changing" + "CVE-2024-0775": { + "cmt_msg": "ext4: improve error recovery code paths in __ext4_remount()", + "cmt_id": "d2e11d152824deeeaa0d70eb8906a65261838ce2" }, - "CVE-2022-40982": { - "cmt_msg": "x86/speculation: Add Gather Data Sampling mitigation" + "CVE-2023-32252": { + "cmt_msg": "ksmbd: fix racy issue from session setup and logoff", + "cmt_id": "d270631c21e68fb8016d6e231d022d7023a2df6f" }, - "CVE-2019-12456": { - "cmt_msg": "" + "CVE-2023-32250": { + "cmt_msg": "ksmbd: fix racy issue from session setup and logoff", + "cmt_id": "d270631c21e68fb8016d6e231d022d7023a2df6f" }, - "CVE-2019-18680": { + "CVE-2023-32247": { + "cmt_msg": "ksmbd: destroy expired sessions", + "cmt_id": "750a2d772e9d9ff377fd32e3b6797bf2cd847a7a" + }, + "CVE-2023-34256": { + "cmt_msg": "ext4: avoid a potential slab-out-of-bounds in ext4_group_desc_csum", + "cmt_id": "c06f5f1ecab83772b1e06ea5dcfe5ebb5927a43f" + } + }, + "outstanding": { + "CVE-2020-35501": { "cmt_msg": "" }, - "CVE-2022-20565": { - "cmt_msg": "HID: core: Correctly handle ReportSize being zero" + "CVE-2023-6176": { + "cmt_msg": "net/tls: do not free tls_rec on async operation in bpf_exec_tx_verdict()" }, - "CVE-2019-17133": { - "cmt_msg": "cfg80211: wext: avoid copying malformed SSIDs" + "CVE-2023-51779": { + "cmt_msg": "Bluetooth: af_bluetooth: Fix Use-After-Free in bt_sock_recvmsg" }, - "CVE-2017-18595": { - "cmt_msg": "tracing: Fix possible double free on failure of allocating trace buffer" + "CVE-2023-52615": { + "cmt_msg": "hwrng: core - Fix page fault dead lock on mmap-ed hwrng" }, - "CVE-2021-33655": { - "cmt_msg": "fbcon: Disallow setting font bigger than screen size" + "CVE-2023-52614": { + "cmt_msg": "PM / devfreq: Fix buffer overflow in trans_stat_show" }, - "CVE-2021-3612": { - "cmt_msg": "Input: joydev - prevent potential read overflow in ioctl" + "CVE-2023-52617": { + "cmt_msg": "PCI: switchtec: Fix stdev_release() crash after surprise hot remove" }, - "CVE-2022-41858": { - "cmt_msg": "drivers: net: slip: fix NPD bug in sl_tx_timeout()" + "CVE-2023-52616": { + "cmt_msg": "crypto: lib/mpi - Fix unexpected pointer access in mpi_ec_init" }, - "CVE-2017-7487": { - "cmt_msg": "ipx: call ipxitf_put() in ioctl error path" + "CVE-2023-52610": { + "cmt_msg": "net/sched: act_ct: fix skb leak and crash on ooo frags" }, - "CVE-2019-6974": { - "cmt_msg": "kvm: fix kvm_ioctl_create_device() reference counting (CVE-2019-6974)" + "CVE-2023-52612": { + "cmt_msg": "crypto: scomp - fix req->dst buffer overflow" }, - "CVE-2022-41850": { - "cmt_msg": "HID: roccat: Fix use-after-free in roccat_read()" + "CVE-2023-52619": { + "cmt_msg": "pstore/ram: Fix crash when setting number of cpus to an odd number" }, - "CVE-2022-0168": { - "cmt_msg": "cifs: fix NULL ptr dereference in smb2_ioctl_query_info()" + "CVE-2023-52618": { + "cmt_msg": "block/rnbd-srv: Check for unlikely string overflow" }, - "CVE-2023-2985": { - "cmt_msg": "fs: hfsplus: fix UAF issue in hfsplus_put_super" + "CVE-2023-5717": { + "cmt_msg": "perf: Disallow mis-matched inherited group reads" }, - "CVE-2020-14390": { - "cmt_msg": "fbcon: remove soft scrollback code" + "CVE-2023-4273": { + "cmt_msg": "exfat: check if filename entries exceeds max filename length" }, - "CVE-2020-24502": { + "CVE-2022-23825": { "cmt_msg": "" }, - "CVE-2017-17806": { - "cmt_msg": "crypto: hmac - require that the underlying hash algorithm is unkeyed" + "CVE-2023-4004": { + "cmt_msg": "netfilter: nft_set_pipapo: fix improper element removal" }, - "CVE-2017-17807": { - "cmt_msg": "KEYS: add missing permission check for request_key() destination" + "CVE-2023-5972": { + "cmt_msg": "nf_tables: fix NULL pointer dereference in nft_expr_inner_parse()" }, - "CVE-2017-10661": { - "cmt_msg": "timerfd: Protect the might cancel mechanism proper" + "CVE-2023-5158": { + "cmt_msg": "vringh: don't use vringh_kiov_advance() in vringh_iov_xfer()" }, - "CVE-2017-17805": { - "cmt_msg": "crypto: salsa20 - fix blkcipher_walk API usage" + "CVE-2024-26592": { + "cmt_msg": "ksmbd: fix UAF issue in ksmbd_tcp_new_connection()" }, - "CVE-2017-7541": { - "cmt_msg": "brcmfmac: fix possible buffer overflow in brcmf_cfg80211_mgmt_tx()" + "CVE-2024-26593": { + "cmt_msg": "i2c: i801: Fix block process call transactions" }, - "CVE-2019-19527": { - "cmt_msg": "HID: hiddev: do cleanup in failure of opening a device" + "CVE-2024-26590": { + "cmt_msg": "erofs: fix inconsistent per-file compression format" }, - "CVE-2017-7542": { - "cmt_msg": "ipv6: avoid overflow of offset in ip6_find_1stfragopt" + "CVE-2024-26591": { + "cmt_msg": "bpf: Fix re-attachment branch in bpf_tracing_prog_attach" }, - "CVE-2024-0584": { - "cmt_msg": "ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet" + "CVE-2020-15802": { + "cmt_msg": "" }, - "CVE-2020-0465": { - "cmt_msg": "HID: core: Sanitize event code and type when mapping input" + "CVE-2024-26597": { + "cmt_msg": "net: qualcomm: rmnet: fix global oob in rmnet_policy" }, - "CVE-2018-3639": { - "cmt_msg": "x86/nospec: Simplify alternative_msr_write()" + "CVE-2024-26594": { + "cmt_msg": "ksmbd: validate mech token in session setup" }, - "CVE-2021-4218": { - "cmt_msg": "sysctl: pass kernel pointers to ->proc_handler" + "CVE-2023-2898": { + "cmt_msg": "f2fs: fix to avoid NULL pointer dereference f2fs_write_end_io()" }, - "CVE-2023-22995": { - "cmt_msg": "usb: dwc3: dwc3-qcom: Add missing platform_device_put() in dwc3_qcom_acpi_register_core" + "CVE-2024-26598": { + "cmt_msg": "KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache" + }, + "CVE-2024-26599": { + "cmt_msg": "pwm: Fix out-of-bounds access in of_pwm_single_xlate()" }, "CVE-2019-15902": { - "cmt_msg": "" + "cmt_msg": "unknown" }, "CVE-2024-25739": { "cmt_msg": "" }, - "CVE-2019-20054": { - "cmt_msg": "fs/proc/proc_sysctl.c: fix NULL pointer dereference in put_links" + "CVE-2024-26586": { + "cmt_msg": "mlxsw: spectrum_acl_tcam: Fix stack corruption" }, - "CVE-2017-15274": { - "cmt_msg": "KEYS: fix dereferencing NULL payload with nonzero length" + "CVE-2024-26589": { + "cmt_msg": "bpf: Reject variable offset alu on PTR_TO_FLOW_KEYS" }, - "CVE-2024-0340": { - "cmt_msg": "vhost: use kzalloc() instead of kmalloc() followed by memset()" + "CVE-2020-26140": { + "cmt_msg": "" }, - "CVE-2021-3753": { - "cmt_msg": "vt_kdsetmode: extend console locking" + "CVE-2020-26143": { + "cmt_msg": "" }, - "CVE-2023-6536": { + "CVE-2020-26142": { "cmt_msg": "" }, - "CVE-2019-11135": { - "cmt_msg": "x86/msr: Add the IA32_TSX_CTRL MSR" + "CVE-2024-23849": { + "cmt_msg": "net/rds: Fix UBSAN: array-index-out-of-bounds in rds_cmsg_recv" }, - "CVE-2019-11810": { - "cmt_msg": "scsi: megaraid_sas: return error when create DMA pool failed" + "CVE-2024-23848": { + "cmt_msg": "" }, - "CVE-2021-27365": { - "cmt_msg": "scsi: iscsi: Ensure sysfs attributes are limited to PAGE_SIZE" + "CVE-2023-46838": { + "cmt_msg": "xen-netback: don't produce zero-size SKB frags" }, - "CVE-2021-27364": { - "cmt_msg": "scsi: iscsi: Restrict sessions and handles to admin capabilities" + "CVE-2023-40283": { + "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb" }, - "CVE-2017-14991": { - "cmt_msg": "scsi: sg: fixup infoleak when using SG_GET_REQUEST_TABLE" + "CVE-2024-26747": { + "cmt_msg": "usb: roles: fix NULL pointer issue when put module's reference" }, - "CVE-2020-0431": { - "cmt_msg": "HID: hid-input: clear unmapped usages" + "CVE-2024-26783": { + "cmt_msg": "mm/vmscan: fix a bug calling wakeup_kswapd() with a wrong zone index" }, - "CVE-2018-17977": { - "cmt_msg": "" + "CVE-2024-26745": { + "cmt_msg": "powerpc/pseries/iommu: IOMMU table is not initialized for kdump over SR-IOV" }, - "CVE-2018-17972": { - "cmt_msg": "proc: restrict kernel stack dumps to root" + "CVE-2024-26744": { + "cmt_msg": "RDMA/srpt: Support specifying the srpt_service_guid parameter" }, - "CVE-2020-28974": { - "cmt_msg": "vt: Disable KD_FONT_OP_COPY" + "CVE-2024-26743": { + "cmt_msg": "RDMA/qedr: Fix qedr_create_user_qp error flow" }, - "CVE-2018-7566": { - "cmt_msg": "ALSA: seq: Fix racy pool initializations" + "CVE-2024-26742": { + "cmt_msg": "scsi: smartpqi: Fix disable_managed_interrupts" }, - "CVE-2022-33742": { - "cmt_msg": "xen/blkfront: force data bouncing when backend is untrusted" + "CVE-2024-26741": { + "cmt_msg": "dccp/tcp: Unhash sk from ehash for tb2 alloc failure after check_estalblished()." }, - "CVE-2022-42896": { - "cmt_msg": "Bluetooth: L2CAP: Fix accepting connection request for invalid SPSM" + "CVE-2024-26740": { + "cmt_msg": "net/sched: act_mirred: use the backlog for mirred ingress" }, - "CVE-2017-5967": { - "cmt_msg": "time: Remove CONFIG_TIMER_STATS" + "CVE-2024-26749": { + "cmt_msg": "usb: cdns3: fixed memory use after free at cdns3_gadget_ep_disable()" }, - "CVE-2021-0937": { - "cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write" + "CVE-2024-26748": { + "cmt_msg": "usb: cdns3: fix memory double free when handle zero packet" }, - "CVE-2022-3169": { - "cmt_msg": "nvme: ensure subsystem reset is single threaded" + "CVE-2024-26787": { + "cmt_msg": "mmc: mmci: stm32: fix DMA API overlapping mappings warning" }, - "CVE-2022-36280": { - "cmt_msg": "drm/vmwgfx: Validate the box size for the snooped cursor" + "CVE-2024-26699": { + "cmt_msg": "drm/amd/display: Fix array-index-out-of-bounds in dcn35_clkmgr" }, - "CVE-2019-2054": { - "cmt_msg": "arm/ptrace: run seccomp after ptrace" + "CVE-2023-42753": { + "cmt_msg": "netfilter: ipset: add the missing IP_SET_HASH_WITH_NET0 macro for ip_set_hash_netportnet.c" }, - "CVE-2018-20976": { - "cmt_msg": "xfs: clear sb->s_fs_info on mount failure" + "CVE-2024-26691": { + "cmt_msg": "KVM: arm64: Fix circular locking dependency" }, - "CVE-2016-10147": { - "cmt_msg": "crypto: mcryptd - Check mcryptd algorithm compatibility" + "CVE-2024-26784": { + "cmt_msg": "pmdomain: arm: Fix NULL dereference on scmi_perf_domain removal" }, - "CVE-2024-21803": { + "CVE-2024-0564": { "cmt_msg": "" }, - "CVE-2018-7995": { - "cmt_msg": "x86/MCE: Serialize sysfs changes" + "CVE-2024-0565": { + "cmt_msg": "smb: client: fix OOB in receive_encrypted_standard()" }, - "CVE-2018-16276": { - "cmt_msg": "USB: yurex: fix out-of-bounds uaccess in read handler" + "CVE-2024-26697": { + "cmt_msg": "nilfs2: fix data corruption in dsync block recovery for small block sizes" }, - "CVE-2020-29568": { - "cmt_msg": "xen/xenbus: Allow watches discard events before queueing" + "CVE-2024-26696": { + "cmt_msg": "nilfs2: fix hang in nilfs_lookup_dirty_data_buffers()" }, "CVE-2023-2176": { "cmt_msg": "RDMA/core: Refactor rdma_bind_addr" }, - "CVE-2021-3542": { - "cmt_msg": "" - }, - "CVE-2019-16413": { - "cmt_msg": "9p: use inode->i_lock to protect i_size_write() under 32-bit" - }, - "CVE-2022-1263": { - "cmt_msg": "KVM: avoid NULL pointer dereference in kvm_dirty_ring_push" - }, - "CVE-2017-16650": { - "cmt_msg": "net: qmi_wwan: fix divide by 0 on bad descriptors" - }, - "CVE-2020-12653": { - "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_cmd_append_vsie_tlv()" - }, - "CVE-2019-7222": { - "cmt_msg": "KVM: x86: work around leak of uninitialized stack contents (CVE-2019-7222)" - }, - "CVE-2017-14051": { - "cmt_msg": "scsi: qla2xxx: Fix an integer overflow in sysfs code" - }, - "CVE-2020-12654": { - "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_ret_wmm_get_status()" + "CVE-2024-26695": { + "cmt_msg": "crypto: ccp - Fix null pointer dereference in __sev_platform_shutdown_locked" }, - "CVE-2020-12655": { - "cmt_msg": "xfs: add agf freeblocks verify in xfs_agf_verify" + "CVE-2023-38432": { + "cmt_msg": "ksmbd: validate command payload size" }, - "CVE-2018-12929": { - "cmt_msg": "" + "CVE-2024-26788": { + "cmt_msg": "dmaengine: fsl-qdma: init irq after reg initialization" }, - "CVE-2018-12928": { + "CVE-2005-3660": { "cmt_msg": "" }, - "CVE-2020-36310": { - "cmt_msg": "KVM: SVM: avoid infinite loop on NPF from bad address" - }, - "CVE-2020-36313": { - "cmt_msg": "KVM: Fix out of range accesses to memslots" - }, - "CVE-2020-35519": { - "cmt_msg": "net/x25: prevent a couple of overflows" - }, - "CVE-2017-18241": { - "cmt_msg": "f2fs: fix a panic caused by NULL flush_cmd_control" - }, - "CVE-2022-33740": { - "cmt_msg": "xen/netfront: fix leaking data in shared pages" - }, - "CVE-2022-48619": { - "cmt_msg": "Input: add bounds checking to input_set_capability()" + "CVE-2023-31085": { + "cmt_msg": "ubi: Refuse attaching if mtd's erasesize is 0" }, - "CVE-2020-10708": { - "cmt_msg": "" + "CVE-2023-31084": { + "cmt_msg": "media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*()" }, - "CVE-2020-25673": { - "cmt_msg": "nfc: Avoid endless loops caused by repeated llcp_sock_connect()" + "CVE-2023-31083": { + "cmt_msg": "Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO" }, - "CVE-2022-0400": { + "CVE-2023-31082": { "cmt_msg": "" }, - "CVE-2024-25741": { + "CVE-2023-31081": { "cmt_msg": "" }, - "CVE-2014-9888": { - "cmt_msg": "ARM: dma-mapping: don't allow DMA mappings to be marked executable" - }, - "CVE-2021-42739": { - "cmt_msg": "media: firewire: firedtv-avc: fix a buffer overflow in avc_ca_pmt()" - }, - "CVE-2023-1989": { - "cmt_msg": "Bluetooth: btsdio: fix use after free bug in btsdio_remove due to unfinished work" - }, - "CVE-2022-3111": { - "cmt_msg": "power: supply: wm8350-power: Add missing free in free_charger_irq" + "CVE-2024-0646": { + "cmt_msg": "net: tls, update curr on splice as well" }, - "CVE-2018-5344": { - "cmt_msg": "loop: fix concurrent lo_open/lo_release" + "CVE-2023-52499": { + "cmt_msg": "powerpc/47x: Fix 47x syscall return crash" }, - "CVE-2020-12770": { - "cmt_msg": "scsi: sg: add sg_remove_request in sg_write" + "CVE-2023-52498": { + "cmt_msg": "PM: sleep: Fix possible deadlocks in core system-wide PM code" }, - "CVE-2018-6412": { - "cmt_msg": "fbdev: Fixing arbitrary kernel leak in case FBIOGETCMAP_SPARC in sbusfb_ioctl_helper()." + "CVE-2023-52493": { + "cmt_msg": "bus: mhi: host: Drop chan lock before queuing buffers" }, - "CVE-2019-15222": { - "cmt_msg": "ALSA: usb-audio: Fix gpf in snd_usb_pipe_sanity_check" + "CVE-2023-52492": { + "cmt_msg": "dmaengine: fix NULL pointer in channel unregistration function" }, - "CVE-2022-25265": { + "CVE-2020-14304": { "cmt_msg": "" }, - "CVE-2022-20368": { - "cmt_msg": "net/packet: fix slab-out-of-bounds access in packet_recvmsg()" - }, - "CVE-2017-12153": { - "cmt_msg": "nl80211: check for the required netlink attributes presence" + "CVE-2023-52497": { + "cmt_msg": "erofs: fix lz4 inplace decompression" }, - "CVE-2019-19813": { - "cmt_msg": "btrfs: inode: Verify inode mode to avoid NULL pointer dereference" + "CVE-2023-52494": { + "cmt_msg": "bus: mhi: host: Add alignment check for event ring read pointer" }, - "CVE-2017-12154": { - "cmt_msg": "kvm: nVMX: Don't allow L2 to access the hardware CR8" + "CVE-2023-3610": { + "cmt_msg": "netfilter: nf_tables: fix chain binding transaction logic" }, - "CVE-2020-10773": { - "cmt_msg": "s390/cmm: fix information leak in cmm_timeout_handler()" + "CVE-2023-3611": { + "cmt_msg": "net/sched: sch_qfq: account for stab overhead in qfq_enqueue" }, - "CVE-2022-21499": { - "cmt_msg": "lockdown: also lock down previous kgdb use" + "CVE-2024-26629": { + "cmt_msg": "nfsd: fix RELEASE_LOCKOWNER" }, - "CVE-2016-1583": { - "cmt_msg": "proc: prevent stacking filesystems on top" + "CVE-2023-4132": { + "cmt_msg": "media: usb: siano: Fix warning due to null work_func_t function pointer" }, - "CVE-2017-1000379": { - "cmt_msg": "mm: larger stack guard gap, between vmas" + "CVE-2024-26625": { + "cmt_msg": "llc: call sock_orphan() at release time" }, - "CVE-2023-3640": { + "CVE-2020-26560": { "cmt_msg": "" }, - "CVE-2018-18281": { - "cmt_msg": "mremap: properly flush TLB before releasing the page" - }, - "CVE-2023-20593": { - "cmt_msg": "x86/cpu/amd: Add a Zenbleed fix" - }, - "CVE-2023-3022": { - "cmt_msg": "ipv6: Use result arg in fib_lookup_arg consistently" + "CVE-2024-26620": { + "cmt_msg": "s390/vfio-ap: always filter entire AP matrix" }, - "CVE-2022-2663": { - "cmt_msg": "netfilter: nf_conntrack_irc: Fix forged IP logic" + "CVE-2023-4134": { + "cmt_msg": "Input: cyttsp4_core - change del_timer_sync() to timer_shutdown_sync()" }, - "CVE-2022-43750": { - "cmt_msg": "usb: mon: make mmapped memory read only" + "CVE-2024-22386": { + "cmt_msg": "" }, - "CVE-2016-6787": { - "cmt_msg": "perf: Fix event->ctx locking" + "CVE-2022-3238": { + "cmt_msg": "" }, - "CVE-2016-6786": { - "cmt_msg": "perf: Fix event->ctx locking" + "CVE-2023-37454": { + "cmt_msg": "" }, - "CVE-2019-15219": { - "cmt_msg": "USB: sisusbvga: fix oops in error path of sisusb_probe" + "CVE-2023-46813": { + "cmt_msg": "x86/sev: Check for user-space IOIO pointing to kernel space" }, - "CVE-2014-9940": { - "cmt_msg": "regulator: core: Fix regualtor_ena_gpio_free not to access pin after freeing" + "CVE-2023-52484": { + "cmt_msg": "iommu/arm-smmu-v3: Fix soft lockup triggered by arm_smmu_mm_invalidate_range" }, - "CVE-2023-4385": { - "cmt_msg": "fs: jfs: fix possible NULL pointer dereference in dbFree()" + "CVE-2023-52485": { + "cmt_msg": "drm/amd/display: Wake DMCUB before sending a command" }, - "CVE-2024-24859": { - "cmt_msg": "" + "CVE-2024-26602": { + "cmt_msg": "sched/membarrier: reduce the ability to hammer on sys_membarrier" }, - "CVE-2019-19378": { + "CVE-2022-1116": { "cmt_msg": "" }, - "CVE-2020-4788": { - "cmt_msg": "powerpc/64s: flush L1D on kernel entry" + "CVE-2023-6610": { + "cmt_msg": "smb: client: fix potential OOB in smb2_dump_detail()" }, - "CVE-2022-36879": { - "cmt_msg": "xfrm: xfrm_policy: fix a possible double xfrm_pols_put() in xfrm_bundle_lookup()" + "CVE-2023-35827": { + "cmt_msg": "ravb: Fix use-after-free issue in ravb_tx_timeout_work()" }, - "CVE-2017-8831": { - "cmt_msg": "[media] saa7164: fix double fetch PCIe access condition" + "CVE-2023-52481": { + "cmt_msg": "arm64: errata: Add Cortex-A520 speculative unprivileged load workaround" }, - "CVE-2021-39698": { - "cmt_msg": "wait: add wake_up_pollfree()" + "CVE-2023-52585": { + "cmt_msg": "drm/amdgpu: Fix possible NULL dereference in amdgpu_ras_query_error_status_helper()" }, - "CVE-2020-10766": { - "cmt_msg": "x86/speculation: Prevent rogue cross-process SSBD shutdown" + "CVE-2023-52584": { + "cmt_msg": "spmi: mediatek: Fix UAF on device remove" }, - "CVE-2018-5333": { - "cmt_msg": "RDS: null pointer dereference in rds_atomic_free_op" + "CVE-2023-52587": { + "cmt_msg": "IB/ipoib: Fix mcast list locking" }, - "CVE-2018-5332": { - "cmt_msg": "RDS: Heap OOB write in rds_message_alloc_sgs()" + "CVE-2023-52586": { + "cmt_msg": "drm/msm/dpu: Add mutex lock in control vblank irq" }, - "CVE-2022-2380": { - "cmt_msg": "video: fbdev: sm712fb: Fix crash in smtcfb_read()" + "CVE-2023-52580": { + "cmt_msg": "net/core: Fix ETH_P_1588 flow dissector" }, - "CVE-2017-7482": { - "cmt_msg": "rxrpc: Fix several cases where a padded len isn't checked in ticket decode" + "CVE-2023-52583": { + "cmt_msg": "ceph: fix deadlock or deadcode of misusing dget()" }, - "CVE-2020-10767": { - "cmt_msg": "x86/speculation: Avoid force-disabling IBPB based on STIBP and enhanced IBRS." + "CVE-2023-52582": { + "cmt_msg": "netfs: Only call folio_start_fscache() one time for each folio" }, - "CVE-2019-19447": { - "cmt_msg": "ext4: work around deleting a file with i_nlink == 0 safely" + "CVE-2024-26769": { + "cmt_msg": "nvmet-fc: avoid deadlock on delete association path" }, - "CVE-2017-17448": { - "cmt_msg": "netfilter: nfnetlink_cthelper: Add missing permission checks" + "CVE-2023-42752": { + "cmt_msg": "igmp: limit igmpv3_newpack() packet size to IP_MAX_MTU" }, - "CVE-2017-17449": { - "cmt_msg": "netlink: Add netns check on taps" + "CVE-2023-52589": { + "cmt_msg": "media: rkisp1: Fix IRQ disable race issue" }, - "CVE-2020-24503": { - "cmt_msg": "" + "CVE-2023-52588": { + "cmt_msg": "f2fs: fix to tag gcing flag on page during block migration" }, - "CVE-2019-19524": { - "cmt_msg": "Input: ff-memless - kill timer in destroy()" + "CVE-2024-26768": { + "cmt_msg": "LoongArch: Change acpi_core_pic[NR_CPUS] to acpi_core_pic[MAX_CORE_PIC]" }, - "CVE-2019-19448": { - "cmt_msg": "btrfs: only search for left_info if there is no right_info in try_merge_free_space" + "CVE-2023-52340": { + "cmt_msg": "ipv6: remove max_size check inline with ipv4" }, - "CVE-2019-19449": { - "cmt_msg": "f2fs: fix to do sanity check on segment/section count" + "CVE-2024-26767": { + "cmt_msg": "drm/amd/display: fixed integer types and null check locations" }, - "CVE-2019-19523": { - "cmt_msg": "USB: adutux: fix use-after-free on disconnect" + "CVE-2023-4569": { + "cmt_msg": "netfilter: nf_tables: deactivate catchall elements in next generation" }, - "CVE-2021-3752": { - "cmt_msg": "Bluetooth: fix use-after-free error in lock_sock_nested()" + "CVE-2024-26726": { + "cmt_msg": "btrfs: don't drop extent_map for free space inode on write error" }, - "CVE-2017-18360": { - "cmt_msg": "USB: serial: io_ti: fix div-by-zero in set_termios" + "CVE-2023-6560": { + "cmt_msg": "io_uring: don't allow discontig pages for IORING_SETUP_NO_MMAP" }, - "CVE-2019-3892": { - "cmt_msg": "coredump: fix race condition between mmget_not_zero()/get_task_mm() and core dumping" + "CVE-2024-26763": { + "cmt_msg": "dm-crypt: don't modify the data when using authenticated encryption" }, - "CVE-2017-18249": { - "cmt_msg": "f2fs: fix race condition in between free nid allocator/initializer" + "CVE-2024-26756": { + "cmt_msg": "md: Don't register sync_thread for reshape directly" }, - "CVE-2019-15217": { - "cmt_msg": "media: usb:zr364xx:Fix KASAN:null-ptr-deref Read in zr364xx_vidioc_querycap" + "CVE-2024-26795": { + "cmt_msg": "riscv: Sparse-Memory/vmemmap out-of-bounds fix" }, - "CVE-2021-35477": { - "cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4" + "CVE-2024-26797": { + "cmt_msg": "drm/amd/display: Prevent potential buffer overflow in map_hw_resources" }, - "CVE-2016-5243": { - "cmt_msg": "tipc: fix an infoleak in tipc_nl_compat_link_dump" + "CVE-2024-26790": { + "cmt_msg": "dmaengine: fsl-qdma: fix SoC may hang on 16 byte unaligned read" }, - "CVE-2019-15216": { - "cmt_msg": "USB: yurex: Fix protection fault after device removal" + "CVE-2024-0639": { + "cmt_msg": "sctp: fix potential deadlock on &net->sctp.addr_wq_lock" }, - "CVE-2019-16746": { - "cmt_msg": "nl80211: validate beacon head" + "CVE-2024-26793": { + "cmt_msg": "gtp: fix use-after-free and null-ptr-deref in gtp_newlink()" }, - "CVE-2022-3606": { - "cmt_msg": "" + "CVE-2023-52530": { + "cmt_msg": "wifi: mac80211: fix potential key use-after-free" }, - "CVE-2019-15215": { - "cmt_msg": "media: cpia2_usb: first wake up, then free in disconnect" + "CVE-2023-52531": { + "cmt_msg": "wifi: iwlwifi: mvm: Fix a memory corruption issue" }, - "CVE-2022-2209": { - "cmt_msg": "" + "CVE-2023-52532": { + "cmt_msg": "net: mana: Fix TX CQE error handling" }, - "CVE-2018-18021": { - "cmt_msg": "arm64: KVM: Tighten guest core register access from userspace" + "CVE-2024-26798": { + "cmt_msg": "fbcon: always restore the old font data in fbcon_do_set_font()" }, - "CVE-2021-37576": { - "cmt_msg": "KVM: PPC: Book3S: Fix H_RTAS rets buffer overflow" + "CVE-2024-26799": { + "cmt_msg": "ASoC: qcom: Fix uninitialized pointer dmactl" }, - "CVE-2017-9725": { - "cmt_msg": "mm: cma: fix incorrect type conversion for size during dma allocation" + "CVE-2013-7445": { + "cmt_msg": "" }, - "CVE-2023-45871": { - "cmt_msg": "igb: set max size RX buffer when store bad packet is enabled" + "CVE-2023-52429": { + "cmt_msg": "dm: limit the number of targets and parameter size area" }, - "CVE-2023-7042": { - "cmt_msg": "" + "CVE-2023-39189": { + "cmt_msg": "netfilter: nfnetlink_osf: avoid OOB read" }, - "CVE-2022-3594": { - "cmt_msg": "r8152: Rate limit overflow messages" + "CVE-2023-35001": { + "cmt_msg": "netfilter: nf_tables: prevent OOB access in nft_byteorder_eval" }, - "CVE-2018-14609": { - "cmt_msg": "btrfs: relocation: Only remove reloc rb_trees if reloc control has been initialized" + "CVE-2023-46862": { + "cmt_msg": "io_uring/fdinfo: lock SQ thread while retrieving thread cpu/pid" }, - "CVE-2014-4027": { - "cmt_msg": "target/rd: Refactor rd_build_device_space + rd_release_device_space" + "CVE-2024-26677": { + "cmt_msg": "rxrpc: Fix delayed ACKs to not set the reference serial number" }, - "CVE-2021-33098": { - "cmt_msg": "ixgbe: fix large MTU request from VF" + "CVE-2024-26676": { + "cmt_msg": "af_unix: Call kfree_skb() for dead unix_(sk)->oob_skb in GC." }, - "CVE-2022-3595": { - "cmt_msg": "cifs: fix double-fault crash during ntlmssp" + "CVE-2024-26675": { + "cmt_msg": "ppp_async: limit MRU to 64K" }, - "CVE-2023-47233": { + "CVE-2020-26556": { "cmt_msg": "" }, - "CVE-2020-10769": { - "cmt_msg": "crypto: authenc - fix parsing key with misaligned rta_len" + "CVE-2020-26557": { + "cmt_msg": "" }, - "CVE-2018-5803": { - "cmt_msg": "sctp: verify size of a new chunk in _sctp_make_chunk()" + "CVE-2024-26671": { + "cmt_msg": "blk-mq: fix IO hang from sbitmap wakeup race" }, - "CVE-2020-27815": { - "cmt_msg": "jfs: Fix array index bounds check in dbAdjTree" + "CVE-2023-31248": { + "cmt_msg": "netfilter: nf_tables: do not ignore genmask when looking up chain by id" }, - "CVE-2020-0543": { - "cmt_msg": "x86/cpu: Add 'table' argument to cpu_matches()" + "CVE-2024-26776": { + "cmt_msg": "spi: hisi-sfc-v3xx: Return IRQ_NONE if no interrupts were detected" }, - "CVE-2021-38160": { - "cmt_msg": "virtio_console: Assure used length from device is limited" + "CVE-2024-26777": { + "cmt_msg": "fbdev: sis: Error out if pixclock equals zero" }, - "CVE-2022-1462": { - "cmt_msg": "tty: use new tty_insert_flip_string_and_push_buffer() in pty_write()" + "CVE-2019-20794": { + "cmt_msg": "" }, - "CVE-2023-6606": { - "cmt_msg": "smb: client: fix OOB in smbCalcSize()" + "CVE-2020-26559": { + "cmt_msg": "" }, - "CVE-2020-27067": { - "cmt_msg": "l2tp: fix l2tp_eth module loading" + "CVE-2023-3397": { + "cmt_msg": "" }, - "CVE-2020-27777": { - "cmt_msg": "powerpc/rtas: Restrict RTAS requests from userspace" + "CVE-2024-26773": { + "cmt_msg": "ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found()" }, - "CVE-2019-20636": { - "cmt_msg": "Input: add safety guards to input_set_keycode()" + "CVE-2024-26679": { + "cmt_msg": "inet: read sk->sk_family once in inet_recv_error()" }, - "CVE-2019-11486": { - "cmt_msg": "tty: mark Siemens R3964 line discipline as BROKEN" + "CVE-2024-26771": { + "cmt_msg": "dmaengine: ti: edma: Add some null pointer checks to the edma_probe" }, - "CVE-2019-11487": { - "cmt_msg": "fs: prevent page refcount overflow in pipe_buf_get" + "CVE-2023-52458": { + "cmt_msg": "block: add check that partition length needs to be aligned with block size" }, - "CVE-2020-27066": { - "cmt_msg": "xfrm: policy: Fix doulbe free in xfrm_policy_timer" + "CVE-2023-52457": { + "cmt_msg": "serial: 8250: omap: Don't skip resource freeing if pm_runtime_resume_and_get() failed" }, - "CVE-2020-27675": { - "cmt_msg": "xen/events: avoid removing an event channel while handling it" + "CVE-2018-1121": { + "cmt_msg": "" }, - "CVE-2020-28915": { - "cmt_msg": "fbcon: Fix global-out-of-bounds read in fbcon_get_font()" + "CVE-2023-52454": { + "cmt_msg": "nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length" }, - "CVE-2023-7192": { - "cmt_msg": "netfilter: ctnetlink: fix possible refcount leak in ctnetlink_create_conntrack()" + "CVE-2023-28746": { + "cmt_msg": "x86/mmio: Disable KVM mitigation when X86_FEATURE_CLEAR_CPU_BUF is set" }, - "CVE-2019-20908": { - "cmt_msg": "efi: Restrict efivar_ssdt_load when the kernel is locked down" + "CVE-2023-52452": { + "cmt_msg": "bpf: Fix accesses to uninit stack slots" }, - "CVE-2023-3776": { - "cmt_msg": "net/sched: cls_fw: Fix improper refcount update leads to use-after-free" + "CVE-2023-52451": { + "cmt_msg": "powerpc/pseries/memhp: Fix access beyond end of drmem array" }, - "CVE-2021-28038": { - "cmt_msg": "Xen/gnttab: handle p2m update errors on a per-slot basis" + "CVE-2023-52450": { + "cmt_msg": "perf/x86/intel/uncore: Fix NULL pointer dereference issue in upi_fill_topology()" }, - "CVE-2022-23040": { - "cmt_msg": "xen/xenbus: don't let xenbus_grant_ring() remove grants in error case" + "CVE-2024-1085": { + "cmt_msg": "netfilter: nf_tables: check if catch-all set element is active in next generation" }, - "CVE-2021-29154": { - "cmt_msg": "bpf, x86: Validate computation of branch displacements for x86-64" + "CVE-2024-1086": { + "cmt_msg": "netfilter: nf_tables: reject QUEUE/DROP verdict parameters" }, - "CVE-2023-52435": { - "cmt_msg": "net: prevent mss overflow in skb_segment()" + "CVE-2024-26708": { + "cmt_msg": "mptcp: really cope with fastopen race" }, - "CVE-2023-52434": { - "cmt_msg": "smb: client: fix potential OOBs in smb2_parse_contexts()" + "CVE-2024-26702": { + "cmt_msg": "iio: magnetometer: rm3100: add boundary check for the value read from RM3100_REG_TMRC" }, - "CVE-2021-45469": { - "cmt_msg": "f2fs: fix to do sanity check on last xattr entry in __f2fs_setxattr()" + "CVE-2023-6240": { + "cmt_msg": "" }, - "CVE-2023-52436": { - "cmt_msg": "f2fs: explicitly null-terminate the xattr list" + "CVE-2024-26700": { + "cmt_msg": "drm/amd/display: Fix MST Null Ptr for RV" }, - "CVE-2019-19060": { - "cmt_msg": "iio: imu: adis16400: release allocated memory on failure" + "CVE-2024-26707": { + "cmt_msg": "net: hsr: remove WARN_ONCE() in send_hsr_supervision_frame()" }, - "CVE-2019-19061": { - "cmt_msg": "iio: imu: adis16400: fix memory leak" + "CVE-2024-26706": { + "cmt_msg": "parisc: Fix random data corruption from exception handler" }, - "CVE-2019-19062": { - "cmt_msg": "crypto: user - fix memory leak in crypto_report" + "CVE-2024-26704": { + "cmt_msg": "ext4: fix double-free of blocks due to wrong extents moved_len" }, - "CVE-2019-19063": { - "cmt_msg": "rtlwifi: prevent memory leak in rtl_usb_probe" + "CVE-2024-26739": { + "cmt_msg": "net/sched: act_mirred: don't override retval if we already lost the skb" }, - "CVE-2017-17741": { - "cmt_msg": "KVM: Fix stack-out-of-bounds read in write_mmio" + "CVE-2024-26603": { + "cmt_msg": "x86/fpu: Stop relying on userspace for info to fault in xsave buffer" }, - "CVE-2019-9445": { - "cmt_msg": "f2fs: check if file namelen exceeds max value" + "CVE-2023-44466": { + "cmt_msg": "libceph: harden msgr2.1 frame segment length checks" }, - "CVE-2019-19066": { - "cmt_msg": "scsi: bfa: release allocated memory in case of error" + "CVE-2024-23196": { + "cmt_msg": "ALSA: hda: fix a possible null-pointer dereference due to data race in snd_hdac_regmap_sync()" }, - "CVE-2020-0435": { - "cmt_msg": "f2fs: fix to do sanity check with i_extra_isize" + "CVE-2019-19814": { + "cmt_msg": "" }, - "CVE-2020-0432": { - "cmt_msg": "staging: most: net: fix buffer overflow" + "CVE-2023-52620": { + "cmt_msg": "netfilter: nf_tables: disallow timeout for anonymous sets" }, - "CVE-2020-0433": { - "cmt_msg": "blk-mq: sync the update nr_hw_queues with blk_mq_queue_tag_busy_iter" + "CVE-2023-52621": { + "cmt_msg": "bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers" }, - "CVE-2023-51779": { - "cmt_msg": "Bluetooth: af_bluetooth: Fix Use-After-Free in bt_sock_recvmsg" + "CVE-2023-52622": { + "cmt_msg": "ext4: avoid online resizing failures due to oversized flex bg" }, - "CVE-2019-3874": { - "cmt_msg": "sctp: implement memory accounting on tx path" + "CVE-2023-52623": { + "cmt_msg": "SUNRPC: Fix a suspicious RCU usage warning" }, - "CVE-2018-10877": { - "cmt_msg": "ext4: verify the depth of extent tree in ext4_find_extent()" + "CVE-2023-52624": { + "cmt_msg": "drm/amd/display: Wake DMCUB before executing GPINT commands" }, - "CVE-2018-10876": { - "cmt_msg": "ext4: only look at the bg_flags field if it is valid" + "CVE-2023-52625": { + "cmt_msg": "drm/amd/display: Refactor DMCUB enter/exit idle interface" }, - "CVE-2010-4563": { + "CVE-2023-52627": { + "cmt_msg": "iio: adc: ad7091r: Allow users to configure device events" + }, + "CVE-2023-52628": { + "cmt_msg": "netfilter: nftables: exthdr: fix 4-byte stack OOB write" + }, + "CVE-2021-26934": { "cmt_msg": "" }, - "CVE-2023-1249": { - "cmt_msg": "coredump: Use the vma snapshot in fill_files_note" + "CVE-2023-3141": { + "cmt_msg": "memstick: r592: Fix UAF bug in r592_remove due to race condition" }, - "CVE-2023-2162": { - "cmt_msg": "scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress" + "CVE-2024-26601": { + "cmt_msg": "ext4: regenerate buddy after block freeing failed if under fc replay" }, - "CVE-2018-10879": { - "cmt_msg": "ext4: make sure bitmaps and the inode table don't overlap with bg descriptors" + "CVE-2022-36402": { + "cmt_msg": "drm/vmwgfx: Fix shader stage validation" }, - "CVE-2018-10878": { - "cmt_msg": "ext4: always check block group bounds in ext4_init_block_bitmap()" + "CVE-2008-2544": { + "cmt_msg": "" }, - "CVE-2024-23851": { - "cmt_msg": "dm: limit the number of targets and parameter size area" + "CVE-2023-3865": { + "cmt_msg": "ksmbd: fix out-of-bound read in smb2_write" }, - "CVE-2023-0266": { - "cmt_msg": "ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF" + "CVE-2023-3867": { + "cmt_msg": "ksmbd: add missing compound request handing in some commands" }, - "CVE-2023-1838": { - "cmt_msg": "Fix double fget() in vhost_net_set_backend()" + "CVE-2023-3866": { + "cmt_msg": "ksmbd: validate session id and tree id in the compound request" }, - "CVE-2021-3483": { - "cmt_msg": "firewire: nosy: Fix a use-after-free bug in nosy_ioctl()" + "CVE-2007-3719": { + "cmt_msg": "" }, - "CVE-2017-16913": { - "cmt_msg": "usbip: fix stub_rx: harden CMD_SUBMIT path to handle malicious input" + "CVE-2023-3863": { + "cmt_msg": "net: nfc: Fix use-after-free caused by nfc_llcp_find_local" }, - "CVE-2017-16912": { - "cmt_msg": "usbip: fix stub_rx: get_pipe() to validate endpoint number" + "CVE-2022-45919": { + "cmt_msg": "media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221" }, - "CVE-2017-16911": { - "cmt_msg": "usbip: prevent vhci_hcd driver from leaking a socket pointer address" + "CVE-2023-21400": { + "cmt_msg": "" }, - "CVE-2017-0861": { - "cmt_msg": "ALSA: pcm: prevent UAF in snd_pcm_info" + "CVE-2023-5633": { + "cmt_msg": "drm/vmwgfx: Keep a gem reference to user bos in surfaces" }, - "CVE-2020-25656": { - "cmt_msg": "vt: keyboard, extend func_buf_lock to readers" + "CVE-2024-26583": { + "cmt_msg": "tls: fix race between async notify and socket close" }, - "CVE-2017-16914": { - "cmt_msg": "usbip: fix stub_send_ret_submit() vulnerability to null transfer_buffer" + "CVE-2024-26582": { + "cmt_msg": "net: tls: fix use-after-free with partial reads and async decrypt" }, - "CVE-2022-24448": { - "cmt_msg": "NFSv4: Handle case where the lookup of a directory fails" + "CVE-2024-26585": { + "cmt_msg": "tls: fix race between tx work scheduling and socket close" }, - "CVE-2024-26598": { - "cmt_msg": "KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache" + "CVE-2024-26584": { + "cmt_msg": "net: tls: handle backlogging of crypto requests" }, - "CVE-2019-10142": { - "cmt_msg": "drivers/virt/fsl_hypervisor.c: prevent integer overflow in ioctl" + "CVE-2022-1247": { + "cmt_msg": "" }, - "CVE-2021-4023": { - "cmt_msg": "io-wq: fix cancellation on create-worker failure" + "CVE-2023-51782": { + "cmt_msg": "net/rose: Fix Use-After-Free in rose_ioctl" }, - "CVE-2017-11176": { - "cmt_msg": "mqueue: fix a use-after-free in sys_mq_notify()" + "CVE-2024-26588": { + "cmt_msg": "LoongArch: BPF: Prevent out-of-bounds memory access" }, - "CVE-2023-3268": { - "cmt_msg": "relayfs: fix out-of-bounds access in relay_file_read" + "CVE-2023-51780": { + "cmt_msg": "atm: Fix Use-After-Free in do_vcc_ioctl" }, - "CVE-2022-2318": { - "cmt_msg": "net: rose: fix UAF bugs caused by timer handler" + "CVE-2023-51781": { + "cmt_msg": "appletalk: Fix Use-After-Free in atalk_ioctl" }, - "CVE-2021-22555": { - "cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write" + "CVE-2023-52578": { + "cmt_msg": "net: bridge: use DEV_STATS_INC()" }, - "CVE-2017-12190": { - "cmt_msg": "fix unbalanced page refcounting in bio_map_user_iov" + "CVE-2023-52574": { + "cmt_msg": "team: fix null-ptr-deref when team device type is changed" }, - "CVE-2022-1011": { - "cmt_msg": "fuse: fix pipe buffer lifetime for direct_io" + "CVE-2023-52576": { + "cmt_msg": "x86/mm, kexec, ima: Use memblock_free_late() from ima_free_kexec_buffer()" }, - "CVE-2021-0399": { + "CVE-2022-4543": { "cmt_msg": "" }, - "CVE-2020-36691": { - "cmt_msg": "netlink: limit recursion depth in policy validation" - }, - "CVE-2023-3111": { - "cmt_msg": "btrfs: unset reloc control if transaction commit fails in prepare_to_relocate()" + "CVE-2023-52570": { + "cmt_msg": "vfio/mdev: Fix a null-ptr-deref bug for mdev_unregister_parent()" }, - "CVE-2020-2732": { - "cmt_msg": "KVM: nVMX: Don't emulate instructions in guest mode" + "CVE-2023-52571": { + "cmt_msg": "power: supply: rk817: Fix node refcount leak" }, - "CVE-2012-4542": { - "cmt_msg": "" + "CVE-2023-52572": { + "cmt_msg": "cifs: Fix UAF in cifs_demultiplex_thread()" }, - "CVE-2023-42752": { - "cmt_msg": "igmp: limit igmpv3_newpack() packet size to IP_MAX_MTU" + "CVE-2023-52573": { + "cmt_msg": "net: rds: Fix possible NULL-pointer dereference" }, - "CVE-2018-1000028": { - "cmt_msg": "nfsd: auth: Fix gid sorting when rootsquash enabled" + "CVE-2023-4921": { + "cmt_msg": "net: sched: sch_qfq: Fix UAF in qfq_dequeue()" }, - "CVE-2023-1118": { - "cmt_msg": "media: rc: Fix use-after-free bugs caused by ene_tx_irqsim()" + "CVE-2023-4881": { + "cmt_msg": "netfilter: nftables: exthdr: fix 4-byte stack OOB write" }, - "CVE-2018-7191": { - "cmt_msg": "tun: call dev_get_valid_name() before register_netdevice()" + "CVE-2022-48425": { + "cmt_msg": "fs/ntfs3: Validate MFT flags before replaying logs" }, - "CVE-2022-1679": { - "cmt_msg": "ath9k: fix use-after-free in ath9k_hif_usb_rx_cb" + "CVE-2023-34324": { + "cmt_msg": "xen/events: replace evtchn_rwlock with RCU" }, - "CVE-2018-1000026": { - "cmt_msg": "bnx2x: disable GSO where gso_size is too big for hardware" + "CVE-2024-26736": { + "cmt_msg": "afs: Increase buffer size in afs_update_volume_status()" }, - "CVE-2022-1975": { - "cmt_msg": "NFC: netlink: fix sleep in atomic bug when firmware download timeout" + "CVE-2024-26737": { + "cmt_msg": "bpf: Fix racing between bpf_timer_cancel_and_free and bpf_timer_cancel" }, - "CVE-2023-1380": { - "cmt_msg": "wifi: brcmfmac: slab-out-of-bounds read in brcmf_get_assoc_ies()" + "CVE-2024-26735": { + "cmt_msg": "ipv6: sr: fix possible use-after-free and null-ptr-deref" }, - "CVE-2022-44032": { - "cmt_msg": "char: pcmcia: remove all the drivers" + "CVE-2024-26738": { + "cmt_msg": "powerpc/pseries/iommu: DLPAR add doesn't completely initialize pci_controller" }, - "CVE-2017-0786": { - "cmt_msg": "brcmfmac: add length check in brcmf_cfg80211_escan_handler()" + "CVE-2023-6238": { + "cmt_msg": "" }, - "CVE-2021-28972": { - "cmt_msg": "PCI: rpadlpar: Fix potential drc_name corruption in store functions" + "CVE-2022-38096": { + "cmt_msg": "" }, - "CVE-2018-12130": { - "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" + "CVE-2024-26596": { + "cmt_msg": "net: dsa: fix netdev_priv() dereference before check on non-DSA netdevice events" }, - "CVE-2020-14305": { - "cmt_msg": "netfilter: helpers: remove data_len usage for inkernel helpers" + "CVE-2024-26595": { + "cmt_msg": "mlxsw: spectrum_acl_tcam: Fix NULL pointer dereference in error path" }, - "CVE-2021-20292": { - "cmt_msg": "drm/ttm/nouveau: don't call tt destroy callback on alloc failure." + "CVE-2023-6931": { + "cmt_msg": "perf: Fix perf_event_validate_size()" }, - "CVE-2021-31916": { - "cmt_msg": "dm ioctl: fix out of bounds array access when no devices" + "CVE-2023-6932": { + "cmt_msg": "ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet" }, - "CVE-2017-8065": { - "cmt_msg": "crypto: ccm - move cbcmac input off the stack" + "CVE-2024-0607": { + "cmt_msg": "netfilter: nf_tables: fix pointer math issue in nft_byteorder_eval()" }, - "CVE-2018-13405": { - "cmt_msg": "Fix up non-directory creation in SGID directories" + "CVE-2024-26803": { + "cmt_msg": "net: veth: clear GRO when clearing XDP even when down" }, - "CVE-2018-13406": { - "cmt_msg": "video: uvesafb: Fix integer overflow in allocation" + "CVE-2024-26648": { + "cmt_msg": "drm/amd/display: Fix variable deferencing before NULL check in edp_setup_replay()" }, - "CVE-2023-3772": { - "cmt_msg": "xfrm: add NULL check in xfrm_update_ae_params" + "CVE-2024-26646": { + "cmt_msg": "thermal: intel: hfi: Add syscore callbacks for system-wide PM" }, - "CVE-2020-11668": { - "cmt_msg": "media: xirlink_cit: add missing descriptor sanity checks" + "CVE-2024-26647": { + "cmt_msg": "drm/amd/display: Fix late derefrence 'dsc' check in 'link_set_dsc_pps_packet()'" }, - "CVE-2020-11669": { - "cmt_msg": "powerpc/powernv/idle: Restore AMR/UAMOR/AMOR after idle" + "CVE-2024-26644": { + "cmt_msg": "btrfs: don't abort filesystem when attempting to snapshot deleted subvolume" }, - "CVE-2019-15118": { - "cmt_msg": "ALSA: usb-audio: Fix a stack buffer overflow bug in check_input_term" + "CVE-2024-26645": { + "cmt_msg": "tracing: Ensure visibility when inserting an element into tracing_map" }, - "CVE-2019-12818": { - "cmt_msg": "net: nfc: Fix NULL dereference on nfc_llcp_build_tlv fails" + "CVE-2024-26642": { + "cmt_msg": "netfilter: nf_tables: disallow anonymous set with timeout flag" }, - "CVE-2023-2269": { - "cmt_msg": "dm ioctl: fix nested locking in table_clear() to remove deadlock concern" + "CVE-2024-26640": { + "cmt_msg": "tcp: add sanity checks to rx zerocopy" }, - "CVE-2023-0394": { - "cmt_msg": "ipv6: raw: Deduct extension header length in rawv6_push_pending_frames" + "CVE-2024-26641": { + "cmt_msg": "ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv()" }, - "CVE-2015-0274": { - "cmt_msg": "xfs: remote attribute overwrite causes transaction overrun" + "CVE-2023-50431": { + "cmt_msg": "accel/habanalabs: fix information leak in sec_attest_info()" }, - "CVE-2020-0347": { - "cmt_msg": "" + "CVE-2024-26791": { + "cmt_msg": "btrfs: dev-replace: properly validate device names" }, - "CVE-2019-15117": { - "cmt_msg": "ALSA: usb-audio: Fix an OOB bug in parse_audio_mixer_unit" + "CVE-2023-52467": { + "cmt_msg": "mfd: syscon: Fix null pointer dereference in of_syscon_register()" }, - "CVE-2021-3659": { - "cmt_msg": "net: mac802154: Fix general protection fault" + "CVE-2023-52464": { + "cmt_msg": "EDAC/thunderx: Fix possible out-of-bounds string access" }, - "CVE-2021-4155": { - "cmt_msg": "xfs: map unwritten blocks in XFS_IOC_{ALLOC,FREE}SP just like fallocate" + "CVE-2023-52462": { + "cmt_msg": "bpf: fix check for attempt to corrupt spilled pointer" }, - "CVE-2019-14901": { - "cmt_msg": "mwifiex: Fix heap overflow in mmwifiex_process_tdls_action_frame()" + "CVE-2023-52463": { + "cmt_msg": "efivarfs: force RO when remounting if SetVariable is not supported" }, - "CVE-2021-4150": { - "cmt_msg": "block: fix incorrect references to disk objects" + "CVE-2022-25265": { + "cmt_msg": "" }, - "CVE-2020-3702": { - "cmt_msg": "ath: Use safer key clearing with key cache entries" + "CVE-2023-52469": { + "cmt_msg": "drivers/amd/pm: fix a use-after-free in kv_parse_power_table" }, - "CVE-2020-16166": { - "cmt_msg": "random32: update the net random state on interrupt and activity" + "CVE-2019-15290": { + "cmt_msg": "" }, - "CVE-2021-3653": { - "cmt_msg": "KVM: nSVM: avoid picking up unsupported bits from L2 in int_ctl (CVE-2021-3653)" + "CVE-2023-3212": { + "cmt_msg": "gfs2: Don't deref jdesc in evict" }, - "CVE-2021-3655": { - "cmt_msg": "sctp: validate from_addr_param return" + "CVE-2024-26633": { + "cmt_msg": "ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim()" }, - "CVE-2021-4159": { - "cmt_msg": "bpf: Verifer, adjust_scalar_min_max_vals to always call update_reg_bounds()" + "CVE-2024-26632": { + "cmt_msg": "block: Fix iterating over an empty bio with bio_for_each_folio_all" }, - "CVE-2019-12614": { - "cmt_msg": "powerpc/pseries/dlpar: Fix a missing check in dlpar_parse_cc_property()" + "CVE-2023-6622": { + "cmt_msg": "netfilter: nf_tables: bail out on mismatching dynset and set expressions" }, - "CVE-2019-12615": { - "cmt_msg": "mdesc: fix a missing-check bug in get_vdev_port_node_info()" + "CVE-2024-26733": { + "cmt_msg": "arp: Prevent overflow in arp_req_get()." }, - "CVE-2021-3714": { - "cmt_msg": "" + "CVE-2024-26636": { + "cmt_msg": "llc: make llc_ui_sendmsg() more robust against bonding changes" }, - "CVE-2020-10742": { - "cmt_msg": "new helper: iov_iter_get_pages_alloc()" + "CVE-2024-26635": { + "cmt_msg": "llc: Drop support for ETH_P_TR_802_2." }, - "CVE-2017-12168": { - "cmt_msg": "arm64: KVM: pmu: Fix AArch32 cycle counter access" + "CVE-2022-26878": { + "cmt_msg": "" }, - "CVE-2019-16233": { - "cmt_msg": "scsi: qla2xxx: fix a potential NULL pointer dereference" + "CVE-2024-2193": { + "cmt_msg": "" }, - "CVE-2021-3892": { + "CVE-2018-12930": { "cmt_msg": "" }, - "CVE-2019-6133": { - "cmt_msg": "fork: record start_time late" + "CVE-2018-12931": { + "cmt_msg": "" }, - "CVE-2018-10902": { - "cmt_msg": "ALSA: rawmidi: Change resized buffers atomically" + "CVE-2023-38426": { + "cmt_msg": "ksmbd: fix global-out-of-bounds in smb2_find_context_vals" }, - "CVE-2021-39633": { - "cmt_msg": "ip_gre: add validation for csum_start" + "CVE-2023-52637": { + "cmt_msg": "can: j1939: Fix UAF in j1939_sk_match_filter during setsockopt(SO_J1939_FILTER)" }, - "CVE-2017-18203": { - "cmt_msg": "dm: fix race between dm_get_from_kobject() and __dm_destroy()" + "CVE-2024-26684": { + "cmt_msg": "net: stmmac: xgmac: fix handling of DPP safety error for DMA channels" }, - "CVE-2020-27673": { - "cmt_msg": "xen/events: add a proper barrier to 2-level uevent unmasking" + "CVE-2023-1194": { + "cmt_msg": "ksmbd: fix out-of-bound read in parse_lease_state()" }, - "CVE-2021-39636": { - "cmt_msg": "netfilter: x_tables: fix pointer leaks to userspace" + "CVE-2023-20588": { + "cmt_msg": "x86/CPU/AMD: Do not leak quotient data after a division by 0" }, - "CVE-2017-18204": { - "cmt_msg": "ocfs2: should wait dio before inode lock in ocfs2_setattr()" + "CVE-2023-1192": { + "cmt_msg": "fs/ntfs3: Validate MFT flags before replaying logs" }, - "CVE-2020-26147": { - "cmt_msg": "mac80211: assure all fragments are encrypted" + "CVE-2022-44034": { + "cmt_msg": "char: pcmcia: remove all the drivers" }, - "CVE-2019-3882": { - "cmt_msg": "vfio/type1: Limit DMA mappings per container" + "CVE-2022-44033": { + "cmt_msg": "char: pcmcia: remove all the drivers" }, - "CVE-2017-18208": { - "cmt_msg": "mm/madvise.c: fix madvise() infinite loop under special circumstances" + "CVE-2022-44032": { + "cmt_msg": "char: pcmcia: remove all the drivers" }, - "CVE-2022-33741": { - "cmt_msg": "xen/netfront: force data bouncing when backend is untrusted" + "CVE-2024-26782": { + "cmt_msg": "mptcp: fix double-free on socket dismantle" }, - "CVE-2018-20509": { - "cmt_msg": "binder: refactor binder ref inc/dec for thread safety" + "CVE-2024-22705": { + "cmt_msg": "ksmbd: fix slab-out-of-bounds in smb_strndup_from_utf16()" }, - "CVE-2024-24864": { - "cmt_msg": "" + "CVE-2024-26622": { + "cmt_msg": "tomoyo: fix UAF write bug in tomoyo_write_control()" }, - "CVE-2022-45885": { - "cmt_msg": "" + "CVE-2023-4147": { + "cmt_msg": "netfilter: nf_tables: disallow rule addition to bound chain via NFTA_RULE_CHAIN_ID" }, - "CVE-2022-33744": { - "cmt_msg": "xen/arm: Fix race in RB-tree based P2M accounting" + "CVE-2023-5090": { + "cmt_msg": "x86: KVM: SVM: always update the x2avic msr interception" }, - "CVE-2017-18193": { - "cmt_msg": "f2fs: fix a bug caused by NULL extent tree" + "CVE-2023-38427": { + "cmt_msg": "ksmbd: fix out-of-bound read in deassemble_neg_contexts()" }, - "CVE-2022-40768": { - "cmt_msg": "scsi: stex: Properly zero out the passthrough command structure" + "CVE-2023-52527": { + "cmt_msg": "ipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data()" }, - "CVE-2022-1280": { - "cmt_msg": "drm: avoid circular locks in drm_mode_getconnector" + "CVE-2023-52526": { + "cmt_msg": "erofs: fix memory leak of LZMA global compressed deduplication" }, - "CVE-2020-12888": { - "cmt_msg": "vfio-pci: Invalidate mmaps and block MMIO access on disabled memory" + "CVE-2023-52523": { + "cmt_msg": "bpf, sockmap: Reject sk_msg egress redirects to non-TCP sockets" }, - "CVE-2023-52445": { - "cmt_msg": "media: pvrusb2: fix use after free on context disconnection" + "CVE-2023-52522": { + "cmt_msg": "net: fix possible store tearing in neigh_periodic_work()" }, - "CVE-2016-6198": { - "cmt_msg": "vfs: add vfs_select_inode() helper" + "CVE-2023-52520": { + "cmt_msg": "platform/x86: think-lmi: Fix reference leak" }, - "CVE-2021-0447": { - "cmt_msg": "l2tp: protect sock pointer of struct pppol2tp_session with RCU" + "CVE-2024-0641": { + "cmt_msg": "tipc: fix a potential deadlock on &tx->lock" }, - "CVE-2022-41218": { - "cmt_msg": "media: dvb-core: Fix UAF due to refcount races at releasing" + "CVE-2024-26789": { + "cmt_msg": "crypto: arm64/neonbs - fix out-of-bounds access on short input" }, - "CVE-2020-14331": { - "cmt_msg": "vgacon: Fix for missing check in scrollback handling" + "CVE-2024-26779": { + "cmt_msg": "wifi: mac80211: fix race condition on enabling fast-xmit" }, - "CVE-2023-52457": { - "cmt_msg": "serial: 8250: omap: Don't skip resource freeing if pm_runtime_resume_and_get() failed" + "CVE-2023-52529": { + "cmt_msg": "HID: sony: Fix a potential memory leak in sony_probe()" }, - "CVE-2022-36946": { - "cmt_msg": "netfilter: nf_queue: do not allow packet truncation below transport header offset" + "CVE-2023-52528": { + "cmt_msg": "net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg" }, - "CVE-2021-45485": { - "cmt_msg": "ipv6: use prandom_u32() for ID generation" + "CVE-2023-39198": { + "cmt_msg": "drm/qxl: fix UAF on handle creation" }, - "CVE-2021-0448": { - "cmt_msg": "netfilter: ctnetlink: add a range check for l3/l4 protonum" + "CVE-2023-39194": { + "cmt_msg": "net: xfrm: Fix xfrm_address_filter OOB read" }, - "CVE-2016-6197": { - "cmt_msg": "ovl: verify upper dentry before unlink and rename" + "CVE-2023-39197": { + "cmt_msg": "netfilter: conntrack: dccp: copy entire header to stack buffer, not just basic one" }, - "CVE-2022-21166": { - "cmt_msg": "x86/speculation/mmio: Enable CPU Fill buffer clearing on idle" + "CVE-2023-38428": { + "cmt_msg": "ksmbd: fix wrong UserName check in session_user" }, - "CVE-2020-29374": { - "cmt_msg": "gup: document and work around \"COW can break either way\" issue" + "CVE-2023-39193": { + "cmt_msg": "netfilter: xt_sctp: validate the flag_info count" }, - "CVE-2020-0030": { - "cmt_msg": "ANDROID: binder: synchronize_rcu() when using POLLFREE." + "CVE-2023-39192": { + "cmt_msg": "netfilter: xt_u32: validate user space input" }, - "CVE-2015-8709": { - "cmt_msg": "mm: Add a user_ns owner to mm_struct and fix ptrace permission checks" + "CVE-2023-38431": { + "cmt_msg": "ksmbd: check the validation of pdu_size in ksmbd_conn_handler_loop" }, - "CVE-2017-6001": { - "cmt_msg": "perf/core: Fix concurrent sys_perf_event_open() vs. 'move_group' race" + "CVE-2023-38430": { + "cmt_msg": "ksmbd: validate smb request protocol id" }, - "CVE-2023-52449": { - "cmt_msg": "mtd: Fix gluebi NULL pointer dereference caused by ftl notifier" + "CVE-2024-26600": { + "cmt_msg": "phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP" }, - "CVE-2021-29650": { - "cmt_msg": "netfilter: x_tables: Use correct memory barriers." + "CVE-2023-3390": { + "cmt_msg": "netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE" }, - "CVE-2019-18806": { - "cmt_msg": "net: qlogic: Fix memory leak in ql_alloc_large_buffers" + "CVE-2024-26606": { + "cmt_msg": "binder: signal epoll threads of self-work" }, - "CVE-2023-4010": { - "cmt_msg": "" + "CVE-2024-26607": { + "cmt_msg": "drm/bridge: sii902x: Fix probing race issue" }, - "CVE-2018-20169": { - "cmt_msg": "USB: check usb_get_extra_descriptor for proper size" + "CVE-2024-26765": { + "cmt_msg": "LoongArch: Disable IRQ before init_fn() for nonboot CPUs" }, - "CVE-2017-12762": { - "cmt_msg": "isdn/i4l: fix buffer overflow" + "CVE-2024-26764": { + "cmt_msg": "fs/aio: Restrict kiocb_set_cancel_fn() to I/O submitted via libaio" }, - "CVE-2021-33656": { - "cmt_msg": "vt: drop old FONT ioctls" + "CVE-2024-26608": { + "cmt_msg": "ksmbd: fix global oob in ksmbd_nl_policy" }, - "CVE-2016-9644": { - "cmt_msg": "x86/mm: Expand the exception table logic to allow new handling options" + "CVE-2024-26761": { + "cmt_msg": "cxl/pci: Fix disabling memory if DVSEC CXL Range does not match a CFMWS window" }, - "CVE-2022-41849": { - "cmt_msg": "fbdev: smscufx: Fix use-after-free in ufx_ops_open()" + "CVE-2024-26760": { + "cmt_msg": "scsi: target: pscsi: Fix bio_put() for error case" }, - "CVE-2022-41848": { + "CVE-2023-1476": { "cmt_msg": "" }, - "CVE-2023-6356": { + "CVE-2021-3864": { "cmt_msg": "" }, - "CVE-2022-1353": { - "cmt_msg": "af_key: add __GFP_ZERO flag for compose_sadb_supported in function pfkey_register" - }, - "CVE-2015-8845": { - "cmt_msg": "powerpc/tm: Check for already reclaimed tasks" + "CVE-2024-26770": { + "cmt_msg": "HID: nvidia-shield: Add missing null pointer checks to LED initialization" }, - "CVE-2022-1198": { - "cmt_msg": "drivers: hamradio: 6pack: fix UAF bug caused by mod_timer()" + "CVE-2023-38429": { + "cmt_msg": "ksmbd: allocate one more byte for implied bcc[0]" }, - "CVE-2022-1199": { - "cmt_msg": "ax25: Fix NULL pointer dereference in ax25_kill_by_device" + "CVE-2023-51043": { + "cmt_msg": "drm/atomic: Fix potential use-after-free in nonblocking commits" }, - "CVE-2015-8966": { - "cmt_msg": "[PATCH] arm: fix handling of F_OFD_... in oabi_fcntl64()" + "CVE-2023-51042": { + "cmt_msg": "drm/amdgpu: Fix potential fence use-after-free v2" }, - "CVE-2018-5750": { - "cmt_msg": "ACPI: sbshc: remove raw pointer from printk() message" + "CVE-2023-20569": { + "cmt_msg": "x86/bugs: Increase the x86 bugs vector size to two u32s" }, - "CVE-2021-39801": { + "CVE-2016-8660": { "cmt_msg": "" }, - "CVE-2021-39800": { - "cmt_msg": "" + "CVE-2023-6270": { + "cmt_msg": "aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts" }, - "CVE-2015-8963": { - "cmt_msg": "perf: Fix race in swevent hash" + "CVE-2023-3090": { + "cmt_msg": "ipvlan:Fix out-of-bounds caused by unclear skb->cb" }, - "CVE-2019-3837": { - "cmt_msg": "net_dma: simple removal" + "CVE-2008-4609": { + "cmt_msg": "" }, - "CVE-2018-16884": { - "cmt_msg": "sunrpc: use-after-free in svc_process_common()" + "CVE-2023-6356": { + "cmt_msg": "nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length" }, - "CVE-2022-1195": { - "cmt_msg": "hamradio: improve the incomplete fix to avoid NPD" + "CVE-2023-52639": { + "cmt_msg": "KVM: s390: vsie: fix race during shadow creation" }, - "CVE-2024-22099": { - "cmt_msg": "" + "CVE-2023-52456": { + "cmt_msg": "serial: imx: fix tx statemachine deadlock" }, - "CVE-2021-4202": { - "cmt_msg": "NFC: reorganize the functions in nci_request" + "CVE-2019-15239": { + "cmt_msg": "unknown" }, - "CVE-2021-4203": { - "cmt_msg": "af_unix: fix races in sk_peer_pid and sk_peer_cred accesses" + "CVE-2023-52635": { + "cmt_msg": "PM / devfreq: Synchronize devfreq_monitor_[start/stop]" }, - "CVE-2022-45887": { - "cmt_msg": "media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb()" + "CVE-2023-52634": { + "cmt_msg": "drm/amd/display: Fix disable_otg_wa logic" }, - "CVE-2022-45886": { - "cmt_msg": "media: dvb-core: Fix use-after-free due on race condition at dvb_net" + "CVE-2023-52633": { + "cmt_msg": "um: time-travel: fix time corruption" }, - "CVE-2023-46343": { - "cmt_msg": "nfc: nci: fix possible NULL pointer dereference in send_acknowledge()" + "CVE-2023-52632": { + "cmt_msg": "drm/amdkfd: Fix lock dependency warning with srcu" }, - "CVE-2024-25744": { - "cmt_msg": "x86/coco: Disable 32-bit emulation by default on TDX and SEV" + "CVE-2023-52631": { + "cmt_msg": "fs/ntfs3: Fix an NULL dereference bug" }, - "CVE-2019-15807": { - "cmt_msg": "scsi: libsas: delete sas port if expander discover failed" + "CVE-2023-52630": { + "cmt_msg": "blk-iocost: Fix an UBSAN shift-out-of-bounds warning" }, - "CVE-2023-2124": { - "cmt_msg": "xfs: verify buffer contents when we skip log replay" + "CVE-2023-20941": { + "cmt_msg": "" }, - "CVE-2021-44879": { - "cmt_msg": "f2fs: fix to do sanity check on inode type during garbage collection" + "CVE-2023-52453": { + "cmt_msg": "hisi_acc_vfio_pci: Update migration data pointer correctly on saving/resume" }, - "CVE-2019-15505": { - "cmt_msg": "media: technisat-usb2: break out of loop at end of buffer" + "CVE-2024-26638": { + "cmt_msg": "nbd: always initialize struct msghdr completely" }, - "CVE-2023-2513": { - "cmt_msg": "ext4: fix use-after-free in ext4_xattr_set_entry" + "CVE-2023-4155": { + "cmt_msg": "KVM: SEV: only access GHCB fields once" }, - "CVE-2017-1000": { - "cmt_msg": "udp: consistently apply ufo or fragmentation" + "CVE-2023-3777": { + "cmt_msg": "netfilter: nf_tables: skip bound chain on rule flush" }, - "CVE-2020-11609": { - "cmt_msg": "media: stv06xx: add missing descriptor sanity checks" + "CVE-2023-3776": { + "cmt_msg": "net/sched: cls_fw: Fix improper refcount update leads to use-after-free" }, - "CVE-2022-27672": { - "cmt_msg": "x86/speculation: Identify processors vulnerable to SMT RSB predictions" + "CVE-2023-3773": { + "cmt_msg": "xfrm: add forgotten nla_policy for XFRMA_MTIMER_THRESH" }, - "CVE-2020-0429": { - "cmt_msg": "l2tp: fix race between l2tp_session_delete() and l2tp_tunnel_closeall()" + "CVE-2023-3772": { + "cmt_msg": "xfrm: add NULL check in xfrm_update_ae_params" }, - "CVE-2022-2964": { - "cmt_msg": "net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup" + "CVE-2022-3533": { + "cmt_msg": "" }, - "CVE-2017-0605": { - "cmt_msg": "tracing: Use strlcpy() instead of strcpy() in __trace_find_cmdline()" + "CVE-2023-6121": { + "cmt_msg": "nvmet: nul-terminate the NQNs passed in the connect command" }, - "CVE-2021-1048": { - "cmt_msg": "fix regression in \"epoll: Keep a reference on files added to the check list\"" + "CVE-2023-52638": { + "cmt_msg": "can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock" }, - "CVE-2014-9803": { - "cmt_msg": "Revert \"arm64: Introduce execute-only page access permissions\"" + "CVE-2024-26631": { + "cmt_msg": "ipv6: mcast: fix data-race in ipv6_mc_down / mld_ifc_work" }, - "CVE-2015-2877": { + "CVE-2017-13693": { "cmt_msg": "" }, - "CVE-2020-9383": { - "cmt_msg": "floppy: check FDC index for errors before assigning it" + "CVE-2017-13694": { + "cmt_msg": "" }, - "CVE-2022-3586": { - "cmt_msg": "sch_sfb: Don't assume the skb is still around after enqueueing to child" + "CVE-2022-48628": { + "cmt_msg": "ceph: drop messages from MDS when unmounting" }, - "CVE-2023-32269": { - "cmt_msg": "netrom: Fix use-after-free caused by accept on already connected socket" + "CVE-2024-24859": { + "cmt_msg": "" }, - "CVE-2023-1206": { - "cmt_msg": "tcp: Reduce chance of collisions in inet6_hashfn()." + "CVE-2024-24858": { + "cmt_msg": "" }, - "CVE-2021-38198": { - "cmt_msg": "KVM: X86: MMU: Use the correct inherited permissions to get shadow page" + "CVE-2023-5345": { + "cmt_msg": "fs/smb/client: Reset password pointer to NULL" }, - "CVE-2017-5972": { - "cmt_msg": "tcp: do not lock listener to process SYN packets" + "CVE-2024-24855": { + "cmt_msg": "scsi: lpfc: Fix a possible data race in lpfc_unregister_fcf_rescan()" }, - "CVE-2020-8832": { - "cmt_msg": "drm/i915: Record the default hw state after reset upon load" + "CVE-2024-24857": { + "cmt_msg": "" }, - "CVE-2023-1513": { - "cmt_msg": "kvm: initialize all of the kvm_debugregs structure before sending it to userspace" + "CVE-2024-26673": { + "cmt_msg": "netfilter: nft_ct: sanitize layer 3 and 4 protocol number in custom expectations" }, - "CVE-2015-4004": { - "cmt_msg": "staging: ozwpan: Remove from tree" + "CVE-2022-3544": { + "cmt_msg": "" }, - "CVE-2021-26401": { - "cmt_msg": "x86/speculation: Use generic retpoline by default on AMD" + "CVE-2023-52569": { + "cmt_msg": "btrfs: remove BUG() after failure to insert delayed dir index item" }, - "CVE-2015-4001": { - "cmt_msg": "ozwpan: Use unsigned ints to prevent heap overflow" + "CVE-2023-52568": { + "cmt_msg": "x86/sgx: Resolves SECS reclaim vs. page fault for EAUG race" }, - "CVE-2018-1130": { - "cmt_msg": "dccp: check sk for closed state in dccp_sendmsg()" + "CVE-2023-52563": { + "cmt_msg": "drm/meson: fix memory leak on ->hpd_notify callback" }, - "CVE-2023-52442": { - "cmt_msg": "ksmbd: validate session id and tree id in compound request" + "CVE-2023-52562": { + "cmt_msg": "mm/slab_common: fix slab_caches list corruption after kmem_cache_destroy()" }, - "CVE-2019-14284": { - "cmt_msg": "floppy: fix div-by-zero in setup_format_params" + "CVE-2023-52561": { + "cmt_msg": "arm64: dts: qcom: sdm845-db845c: Mark cont splash memory region as reserved" }, - "CVE-2020-36557": { - "cmt_msg": "vt: vt_ioctl: fix VT_DISALLOCATE freeing in-use virtual console" + "CVE-2023-52560": { + "cmt_msg": "mm/damon/vaddr-test: fix memory leak in damon_do_test_apply_three_regions()" }, - "CVE-2021-3506": { - "cmt_msg": "f2fs: fix to avoid out-of-bounds memory access" + "CVE-2023-5197": { + "cmt_msg": "netfilter: nf_tables: disallow rule removal from chain binding" }, - "CVE-2011-4917": { - "cmt_msg": "" + "CVE-2023-52566": { + "cmt_msg": "nilfs2: fix potential use after free in nilfs_gccache_submit_read_data()" }, - "CVE-2011-4916": { - "cmt_msg": "" + "CVE-2023-52565": { + "cmt_msg": "media: uvcvideo: Fix OOB read" }, - "CVE-2019-14283": { - "cmt_msg": "floppy: fix out-of-bounds read in copy_buffer" + "CVE-2024-26672": { + "cmt_msg": "drm/amdgpu: Fix variable 'mca_funcs' dereferenced before NULL check in 'amdgpu_mca_smu_get_mca_entry()'" }, - "CVE-2019-3901": { - "cmt_msg": "perf/core: Fix perf_event_open() vs. execve() race" + "CVE-2020-0347": { + "cmt_msg": "" }, - "CVE-2020-36558": { - "cmt_msg": "vt: vt_ioctl: fix race in VT_RESIZEX" + "CVE-2024-0443": { + "cmt_msg": "blk-cgroup: Flush stats before releasing blkcg_gq" }, - "CVE-2019-19528": { - "cmt_msg": "USB: iowarrior: fix use-after-free on disconnect" + "CVE-2019-12456": { + "cmt_msg": "" }, - "CVE-2019-19533": { - "cmt_msg": "media: ttusb-dec: Fix info-leak in ttusb_dec_send_command()" + "CVE-2024-26720": { + "cmt_msg": "mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again" }, - "CVE-2018-13100": { - "cmt_msg": "f2fs: fix to do sanity check with secs_per_zone" + "CVE-2024-26723": { + "cmt_msg": "lan966x: Fix crash when adding interface under a lag" }, - "CVE-2017-16646": { - "cmt_msg": "media: dib0700: fix invalid dvb_detach argument" + "CVE-2023-6546": { + "cmt_msg": "tty: n_gsm: fix the UAF caused by race condition in gsm_cleanup_mux" }, - "CVE-2017-16645": { - "cmt_msg": "Input: ims-psu - check if CDC union descriptor is sane" + "CVE-2024-26727": { + "cmt_msg": "btrfs: do not ASSERT() if the newly created subvolume already got read" }, - "CVE-2017-16643": { - "cmt_msg": "Input: gtco - fix potential out-of-bound access" + "CVE-2024-26698": { + "cmt_msg": "hv_netvsc: Fix race condition between netvsc_probe and netvsc_remove" }, - "CVE-2017-16649": { - "cmt_msg": "net: cdc_ether: fix divide by 0 on bad descriptors" + "CVE-2023-34319": { + "cmt_msg": "xen/netback: Fix buffer overrun triggered by unusual packet" }, - "CVE-2023-31083": { - "cmt_msg": "Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO" + "CVE-2023-1206": { + "cmt_msg": "tcp: Reduce chance of collisions in inet6_hashfn()." }, - "CVE-2019-5489": { - "cmt_msg": "Change mincore() to count \"mapped\" pages rather than \"cached\" pages" + "CVE-2022-3642": { + "cmt_msg": "" }, - "CVE-2024-1312": { - "cmt_msg": "mm: lock_vma_under_rcu() must check vma->anon_vma under vma lock" + "CVE-2024-0584": { + "cmt_msg": "ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet" }, - "CVE-2017-16648": { - "cmt_msg": "dvb_frontend: don't use-after-free the frontend struct" + "CVE-2023-52518": { + "cmt_msg": "Bluetooth: hci_codec: Fix leaking content of local_codecs" }, - "CVE-2018-10880": { - "cmt_msg": "ext4: never move the system.data xattr out of the inode body" + "CVE-2023-52519": { + "cmt_msg": "HID: intel-ish-hid: ipc: Disable and reenable ACPI GPE bit" }, - "CVE-2018-10881": { - "cmt_msg": "ext4: clear i_data in ext4_inode_info when removing inline data" + "CVE-2023-52516": { + "cmt_msg": "dma-debug: don't call __dma_entry_alloc_check_leak() under free_entries_lock" }, - "CVE-2018-10882": { - "cmt_msg": "ext4: add more inode number paranoia checks" + "CVE-2023-52517": { + "cmt_msg": "spi: sun6i: fix race between DMA RX transfer completion and RX FIFO drain" }, - "CVE-2018-10883": { - "cmt_msg": "jbd2: don't mark block as modified if the handle is out of credits" - } - } - }, - "3.14": { - "3.14": { - "CVE-2014-0077": { - "cmt_msg": "vhost: fix total length when packets are too short", - "cmt_id": "d8316f3991d207fe32881a9ac20241be8fa2bad0" + "CVE-2023-52515": { + "cmt_msg": "RDMA/srp: Do not call scsi_done() from srp_abort()" }, - "CVE-2014-2568": { - "cmt_msg": "core, nfqueue, openvswitch: Orphan frags in skb_zerocopy and handle errors", - "cmt_id": "36d5fe6a000790f56039afe26834265db0a3ad4c" + "CVE-2023-52512": { + "cmt_msg": "pinctrl: nuvoton: wpcm450: fix out of bounds write" }, - "CVE-2014-0055": { - "cmt_msg": "vhost: validate vhost_get_vq_desc return value", - "cmt_id": "a39ee449f96a2cd44ce056d8a0a112211a9b1a1f" - } - }, - "3.14.1": { - "CVE-2014-2678": { - "cmt_msg": "rds: prevent dereference of a NULL device in rds_iw_laddr_check", - "cmt_id": "eb3d1ebaa77c257872264015644f182c7888c021" + "CVE-2023-52513": { + "cmt_msg": "RDMA/siw: Fix connection failure handling" }, - "CVE-2014-2580": { - "cmt_msg": "xen-netback: disable rogue vif in kthread context", - "cmt_id": "7caaadd87daa11474872b63ff4edf745c6cb8550" - } - }, - "3.14.2": { - "CVE-2014-7283": { - "cmt_msg": "xfs: fix directory hash ordering bug", - "cmt_id": "7de24f7b0ddb815d7a8375354a9612264092edcb" - } - }, - "3.14.3": { - "CVE-2014-3122": { - "cmt_msg": "mm: try_to_unmap_cluster() should lock_page() before mlocking", - "cmt_id": "9eef7172d412d1886b51f8c75b7e9b71c50203e3" + "CVE-2023-52510": { + "cmt_msg": "ieee802154: ca8210: Fix a potential UAF in ca8210_probe" }, - "CVE-2014-2739": { - "cmt_msg": "IB/core: Don't resolve passive side RoCE L2 address in CMA REQ handler", - "cmt_id": "5daac1bcbb85cbf03e7e7d3cafeeb31977d82113" - } - }, - "3.14.4": { - "CVE-2014-1738": { - "cmt_msg": "floppy: don't write kernel-only members to FDRAWCMD ioctl output", - "cmt_id": "b487c62505afbd87654773562fbf2e89bcd52147" + "CVE-2023-52511": { + "cmt_msg": "spi: sun6i: reduce DMA RX transfer width to single byte" }, - "CVE-2014-0155": { - "cmt_msg": "KVM: ioapic: fix assignment of ioapic->rtc_status.pending_eoi (CVE-2014-0155)", - "cmt_id": "f8944acc97ceebf902e5b26b900aefef987ab4be" + "CVE-2023-6531": { + "cmt_msg": "io_uring/af_unix: disable sending io_uring over sockets" }, - "CVE-2014-0196": { - "cmt_msg": "n_tty: Fix n_tty_write crash when echoing in raw mode", - "cmt_id": "6d194d6e0d832e622d87b8dab4e2122c555a82e9" + "CVE-2024-0340": { + "cmt_msg": "vhost: use kzalloc() instead of kmalloc() followed by memset()" }, - "CVE-2014-1737": { - "cmt_msg": "floppy: ignore kernel-only members in FDRAWCMD ioctl input", - "cmt_id": "fb9a2011887416ffdc576d10711dc196343aab69" - } - }, - "3.14.5": { - "CVE-2014-3144": { - "cmt_msg": "filter: prevent nla extensions to peek beyond the end of the message", - "cmt_id": "72beb5639e05f940135ed00bc2fa0200d62074a6" + "CVE-2023-6535": { + "cmt_msg": "" }, - "CVE-2014-3145": { - "cmt_msg": "filter: prevent nla extensions to peek beyond the end of the message", - "cmt_id": "72beb5639e05f940135ed00bc2fa0200d62074a6" + "CVE-2023-6536": { + "cmt_msg": "nvmet-tcp: fix a crash in nvmet_req_complete()" }, - "CVE-2014-9715": { - "cmt_msg": "netfilter: nf_conntrack: reserve two bytes for nf_ct_ext->len", - "cmt_id": "7a6f558b35e2b196eca1d40b48d37e8bcdc73d19" + "CVE-2018-17977": { + "cmt_msg": "" }, - "CVE-2014-7284": { - "cmt_msg": "net: avoid dependency of net_get_random_once on nop patching", - "cmt_id": "adeb3fe4ef6621793d7f1d6f0b9c9cc88827c5b7" + "CVE-2024-1151": { + "cmt_msg": "net: openvswitch: limit the number of recursions from action sets" }, - "CVE-2014-2851": { - "cmt_msg": "net: ipv4: current group_info should be put after using.", - "cmt_id": "2089f7346ae535fa444853426adfafef25107247" - } - }, - "3.14.6": { - "CVE-2014-1739": { - "cmt_msg": "media-device: fix infoleak in ioctl media_enum_entities()", - "cmt_id": "429f444ee6aea8146c115dded7b8b0214cea5e2d" + "CVE-2024-26659": { + "cmt_msg": "xhci: handle isoc Babble and Buffer Overrun events properly" }, - "CVE-2014-3153": { - "cmt_msg": "futex: Make lookup_pi_state more robust", - "cmt_id": "b1f9d594668d008cacd5679cfde675dcdb9f5f8f" - } - }, - "3.14.7": { - "CVE-2014-3940": { - "cmt_msg": "mm: add !pte_present() check on existing hugetlb_entry callbacks", - "cmt_id": "395982ce12b3aba14a197ead3e5828e77e11aec1" - } - }, - "3.14.8": { - "CVE-2014-3917": { - "cmt_msg": "auditsc: audit_krule mask accesses need bounds checking", - "cmt_id": "732eafc78bba8e18a51c169f3dc7f33cddcdc401" + "CVE-2024-26658": { + "cmt_msg": "bcachefs: grab s_umount only if snapshotting" }, - "CVE-2014-4157": { - "cmt_msg": "MIPS: asm: thread_info: Add _TIF_SECCOMP flag", - "cmt_id": "2cbbc2f411bebb054f258c648272f38e2a23e052" + "CVE-2010-5321": { + "cmt_msg": "" }, - "CVE-2014-4014": { - "cmt_msg": "fs,userns: Change inode_capable to capable_wrt_inode_uidgid", - "cmt_id": "5bacea89dc8dfd3f7d7dfbed798f3b41d4f53c78" - } - }, - "3.14.9": { - "CVE-2014-0181": { - "cmt_msg": "net: Use netlink_ns_capable to verify the permisions of netlink messages", - "cmt_id": "be0ef855baab7248d0fc71cdf78a47fcfd3708f1" + "CVE-2024-26655": { + "cmt_msg": "Fix memory leak in posix_clock_open()" }, - "CVE-2014-4611": { - "cmt_msg": "lz4: ensure length does not wrap", - "cmt_id": "5f32449c2863adf190b83402e9a4069cee054f9d" + "CVE-2024-26654": { + "cmt_msg": "ALSA: sh: aica: reorder cleanup operations to avoid UAF bugs" }, - "CVE-2014-4667": { - "cmt_msg": "sctp: Fix sk_ack_backlog wrap-around problem", - "cmt_id": "4c6c201fa9aa76b57b98c993826c4bd9ecb0f264" + "CVE-2024-26656": { + "cmt_msg": "drm/amdgpu: fix use-after-free bug" }, - "CVE-2014-9914": { - "cmt_msg": "ipv4: fix a race in ip4_datagram_release_cb()", - "cmt_id": "3480c0154964f155afef8abceb1118debaf3d5b3" + "CVE-2024-26651": { + "cmt_msg": "sr9800: Add check for usbnet_get_endpoints" }, - "CVE-2014-4655": { - "cmt_msg": "ALSA: control: Fix replacing user controls", - "cmt_id": "99e6d92ad48b8df440f9466c82c839b74ce95dcd" + "CVE-2024-26650": { + "cmt_msg": "platform/x86: p2sb: Allow p2sb_bar() calls during PCI device probe" }, - "CVE-2014-4654": { - "cmt_msg": "ALSA: control: Fix replacing user controls", - "cmt_id": "99e6d92ad48b8df440f9466c82c839b74ce95dcd" + "CVE-2023-33250": { + "cmt_msg": "iommufd: Call iopt_area_contig_done() under the lock" }, - "CVE-2014-4656": { - "cmt_msg": "ALSA: control: Handle numid overflow", - "cmt_id": "8e1853b436edc41ee4e0214cf5a2fc04201915f8" + "CVE-2023-52475": { + "cmt_msg": "Input: powermate - fix use-after-free in powermate_config_complete" }, - "CVE-2014-4653": { - "cmt_msg": "ALSA: control: Don't access controls outside of protected regions", - "cmt_id": "1637a83bb15491efb3e7c8cd746471ef3710e79d" + "CVE-2023-52477": { + "cmt_msg": "usb: hub: Guard against accesses to uninitialized BOS descriptors" }, - "CVE-2014-4652": { - "cmt_msg": "ALSA: control: Protect user controls against concurrent access", - "cmt_id": "d8e2983ef545510f39b3b67d639d807672ee0893" - } - }, - "3.14.10": { - "CVE-2014-4508": { - "cmt_msg": "x86_32, entry: Do syscall exit work on badsys (CVE-2014-4508)", - "cmt_id": "b83627d417975fa8681344384ac55a1c4751f55f" + "CVE-2023-52476": { + "cmt_msg": "perf/x86/lbr: Filter vsyscall addresses" }, - "CVE-2014-0206": { - "cmt_msg": "aio: fix kernel memory disclosure in io_getevents() introduced in v3.10", - "cmt_id": "aa011e29c725b391e614ee7babe6f890a00e3fc5" - } - }, - "3.14.11": { - "CVE-2014-4699": { - "cmt_msg": "ptrace,x86: force IRET path after a ptrace_stop()", - "cmt_id": "b897eba830537e68a1a0a4b741c975ff705a4662" - } - }, - "3.14.14": { - "CVE-2014-4171": { - "cmt_msg": "shmem: fix faulting into a hole while it's punched", - "cmt_id": "dd78e88404ef8091f5f0132a53fdc084b3a6080b" - } - }, - "3.14.15": { - "CVE-2014-3534": { - "cmt_msg": "s390/ptrace: fix PSW mask check", - "cmt_id": "1967b156fd85702f52c5cffaaf7f8f03332ef49e" + "CVE-2023-52470": { + "cmt_msg": "drm/radeon: check the alloc_workqueue return value in radeon_crtc_init()" }, - "CVE-2014-5045": { - "cmt_msg": "fs: umount on symlink leaks mnt count", - "cmt_id": "9b32e18d7ba2838991794893f10bf48805ef01ce" - } - }, - "3.14.17": { - "CVE-2014-5077": { - "cmt_msg": "net: sctp: inherit auth_capable on INIT collisions", - "cmt_id": "672fcd4d4631dc45c650cad3576f880c0907e2e3" - } - }, - "3.14.18": { - "CVE-2014-5472": { - "cmt_msg": "isofs: Fix unbounded recursion when processing relocated directories", - "cmt_id": "3ca762283e2af911674dea8c54631d2d45b04dbf" + "CVE-2024-21803": { + "cmt_msg": "" }, - "CVE-2014-5471": { - "cmt_msg": "isofs: Fix unbounded recursion when processing relocated directories", - "cmt_id": "3ca762283e2af911674dea8c54631d2d45b04dbf" + "CVE-2023-4563": { + "cmt_msg": "netfilter: nf_tables: don't skip expired elements during walk" }, - "CVE-2014-3182": { - "cmt_msg": "HID: logitech: perform bounds checking on device_id early enough", - "cmt_id": "b165b85cb5359d7d223b6d4fa645302891c44013" + "CVE-2023-52479": { + "cmt_msg": "ksmbd: fix uaf in smb20_oplock_break_ack" }, - "CVE-2014-3184": { - "cmt_msg": "HID: fix a couple of off-by-ones", - "cmt_id": "1de1376b8e805c553d28354c9ae5d5fddb8bbff8" + "CVE-2023-52478": { + "cmt_msg": "HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect" }, - "CVE-2014-3185": { - "cmt_msg": "USB: whiteheat: Added bounds checking for bulk command response", - "cmt_id": "ebc8083c7fe92a2a4ab8eed0572882c3dfd3746a" + "CVE-2021-3542": { + "cmt_msg": "" }, - "CVE-2014-3601": { - "cmt_msg": "kvm: iommu: fix the third parameter of kvm_iommu_put_pages (CVE-2014-3601)", - "cmt_id": "42a1927a7a1d9e9992a7d1cd43a797e461019e01" - } - }, - "3.14.19": { - "CVE-2014-3631": { - "cmt_msg": "KEYS: Fix termination condition in assoc array garbage collection", - "cmt_id": "1143261f66aec99fdfbc98903b55d51bb55572a1" + "CVE-2023-34255": { + "cmt_msg": "xfs: verify buffer contents when we skip log replay" }, - "CVE-2014-6418": { - "cmt_msg": "libceph: do not hard code max auth ticket len", - "cmt_id": "9956752afa398ea6e0c9c69b258be6afd73da4b1" + "CVE-2018-12929": { + "cmt_msg": "" }, - "CVE-2014-5207": { - "cmt_msg": "mnt: Correct permission checks in do_remount", - "cmt_id": "92ecaf8784ebb728f2b147f5bfd9af5aa8a35f4e" + "CVE-2018-12928": { + "cmt_msg": "" }, - "CVE-2014-5206": { - "cmt_msg": "mnt: Only change user settable mount flags in remount", - "cmt_id": "98e68ce8f4a6d3ad72243eecd1022ba120b515d2" + "CVE-2023-25775": { + "cmt_msg": "RDMA/irdma: Prevent zero-length STAG registration" }, - "CVE-2014-6417": { - "cmt_msg": "libceph: do not hard code max auth ticket len", - "cmt_id": "9956752afa398ea6e0c9c69b258be6afd73da4b1" + "CVE-2024-26778": { + "cmt_msg": "fbdev: savage: Error out if pixclock equals zero" }, - "CVE-2014-6416": { - "cmt_msg": "libceph: do not hard code max auth ticket len", - "cmt_id": "9956752afa398ea6e0c9c69b258be6afd73da4b1" - } - }, - "3.14.20": { - "CVE-2014-3181": { - "cmt_msg": "HID: magicmouse: sanity check report size in raw_event() callback", - "cmt_id": "6e4106ec619b16593d66ad6384f6f983d423ee0b" + "CVE-2024-25740": { + "cmt_msg": "" }, - "CVE-2014-3186": { - "cmt_msg": "HID: picolcd: sanity check report size in raw_event() callback", - "cmt_id": "2c40d59997ed0b885ac31862e21cb5b84a3e7dca" - } - }, - "3.14.21": { - "CVE-2014-6410": { - "cmt_msg": "udf: Avoid infinite loop when processing indirect ICBs", - "cmt_id": "82335226733fdf82ee3f231c08269a17fd62a3fc" - } - }, - "3.14.23": { - "CVE-2014-4608": { - "cmt_msg": "lzo: check for length overrun in variable length encoding.", - "cmt_id": "7f5f71a9265d9829577393d9005b165f28b1cd77" + "CVE-2020-10708": { + "cmt_msg": "" }, - "CVE-2014-7975": { - "cmt_msg": "fs: Add a missing permission check to do_umount", - "cmt_id": "dc3980ea4ad9d8d0b63b3cde732c9b95750208ce" - } - }, - "3.14.24": { - "CVE-2014-3647": { - "cmt_msg": "KVM: x86: Emulator fixes for eip canonical checks on near branches", - "cmt_id": "6dae4910cabb03b3a677facd8d1768fc47eef6ae" + "CVE-2023-32629": { + "cmt_msg": "" }, - "CVE-2014-3646": { - "cmt_msg": "kvm: vmx: handle invvpid vm exit gracefully", - "cmt_id": "8b74c6f87d4baf5e48e44af2f90cda91ed7b848e" + "CVE-2022-0400": { + "cmt_msg": "" }, - "CVE-2014-7970": { - "cmt_msg": "mnt: Prevent pivot_root from creating a loop in the mount tree", - "cmt_id": "f78da43d95e7331e4b6bb983eb393e404d51f372" + "CVE-2024-25741": { + "cmt_msg": "" }, - "CVE-2014-3610": { - "cmt_msg": "KVM: x86: Check non-canonical addresses upon WRMSR", - "cmt_id": "44d1efb927e6dadb74b6620d1eed232708d75bac" + "CVE-2024-26808": { + "cmt_msg": "netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain" }, - "CVE-2014-3611": { - "cmt_msg": "KVM: x86: Improve thread safety in pit", - "cmt_id": "449a72277a5dc2a12cd114af3be81a56ad10cbd1" + "CVE-2024-26809": { + "cmt_msg": "netfilter: nft_set_pipapo: release elements in clone only from destroy path" }, - "CVE-2014-7826": { - "cmt_msg": "tracing/syscalls: Ignore numbers outside NR_syscalls' range", - "cmt_id": "14f83fe6c5d7cc0fcbaad7cbecb862fa48d92086" + "CVE-2024-26804": { + "cmt_msg": "net: ip_tunnel: prevent perpetual headroom growth" }, - "CVE-2014-7825": { - "cmt_msg": "tracing/syscalls: Ignore numbers outside NR_syscalls' range", - "cmt_id": "14f83fe6c5d7cc0fcbaad7cbecb862fa48d92086" - } - }, - "3.14.25": { - "CVE-2014-3687": { - "cmt_msg": "net: sctp: fix panic on duplicate ASCONF chunks", - "cmt_id": "59ea8663e3a7fc3a0c2841e310b83f7aaec1c017" + "CVE-2024-26805": { + "cmt_msg": "netlink: Fix kernel-infoleak-after-free in __skb_datagram_iter" }, - "CVE-2014-3673": { - "cmt_msg": "net: sctp: fix skb_over_panic when receiving malformed ASCONF chunks", - "cmt_id": "e36b6ac9e011205eb7ad3af329dbd27a21bacd50" + "CVE-2024-26806": { + "cmt_msg": "spi: cadence-qspi: remove system-wide suspend helper calls from runtime PM hooks" }, - "CVE-2014-3688": { - "cmt_msg": "net: sctp: fix remote memory pressure from excessive queueing", - "cmt_id": "75680aa393f12465fc10642d2d55be49a333d828" + "CVE-2024-26801": { + "cmt_msg": "Bluetooth: Avoid potential use-after-free in hci_error_reset" }, - "CVE-2014-7841": { - "cmt_msg": "net: sctp: fix NULL pointer dereference in af->from_addr_param on malformed packet", - "cmt_id": "358905266ed83d4a9e693ae7ff86c1595220ec60" + "CVE-2024-26802": { + "cmt_msg": "stmmac: Clear variable when destroying workqueue" }, - "CVE-2014-7843": { - "cmt_msg": "arm64: __clear_user: handle exceptions on strb", - "cmt_id": "c6f8075d3934e493980fe83f8a746d74b98f5e51" + "CVE-2023-52508": { + "cmt_msg": "nvme-fc: Prevent null pointer dereference in nvme_fc_io_getuuid()" }, - "CVE-2014-7842": { - "cmt_msg": "KVM: x86: Don't report guest userspace emulation error to userspace", - "cmt_id": "d8af79d3cb4a181d3265b1419e63828d2487b3df" + "CVE-2023-52606": { + "cmt_msg": "powerpc/lib: Validate size for vector operations" }, - "CVE-2014-8884": { - "cmt_msg": "ttusb-dec: buffer overflow in ioctl", - "cmt_id": "c8e0fd4818f29aaafafb01f0bacf376b86e82830" - } - }, - "3.14.26": { - "CVE-2014-9090": { - "cmt_msg": "x86_64, traps: Stop using IST for #SS", - "cmt_id": "c6328855c41c28b2a53c7c6821af60dd3b41ddba" + "CVE-2023-52607": { + "cmt_msg": "powerpc/mm: Fix null-pointer dereference in pgtable_cache_add" }, - "CVE-2014-9322": { - "cmt_msg": "x86_64, traps: Stop using IST for #SS", - "cmt_id": "c6328855c41c28b2a53c7c6821af60dd3b41ddba" - } - }, - "3.14.28": { - "CVE-2014-9419": { - "cmt_msg": "x86_64, switch_to(): Load TLS descriptors before switching DS and ES", - "cmt_id": "b7e804ab2e46308e54c0ec2b9e242271a455ddb8" + "CVE-2023-52604": { + "cmt_msg": "FS:JFS:UBSAN:array-index-out-of-bounds in dbAdjTree" }, - "CVE-2014-9584": { - "cmt_msg": "isofs: Fix unchecked printing of ER records", - "cmt_id": "a3d4f59634f38d5236b182b403df74bbceeac7c9" + "CVE-2023-52602": { + "cmt_msg": "jfs: fix slab-out-of-bounds Read in dtSearch" }, - "CVE-2014-9420": { - "cmt_msg": "isofs: Fix infinite looping over CE entries", - "cmt_id": "8190393a88f2b0321263a54f2a9eb5a2aa43be7e" + "CVE-2023-52603": { + "cmt_msg": "UBSAN: array-index-out-of-bounds in dtSplitRoot" }, - "CVE-2014-8989": { - "cmt_msg": "userns: Don't allow setgroups until a gid mapping has been setablished", - "cmt_id": "f077e88fc9f0befcf0441be2fed9516881ab02ef" + "CVE-2023-52600": { + "cmt_msg": "jfs: fix uaf in jfs_evict_inode" }, - "CVE-2014-9683": { - "cmt_msg": "eCryptfs: Remove buggy and unnecessary write in file name decode routine", - "cmt_id": "a306ae6aaca17d46f63143c0c8a5f1c9cfe75b4b" + "CVE-2023-52601": { + "cmt_msg": "jfs: fix array-index-out-of-bounds in dbAdjTree" }, - "CVE-2014-8133": { - "cmt_msg": "x86/tls: Validate TLS entries to protect espfix", - "cmt_id": "aeb83c03a8f584ce0b9386761c22f145caced232" + "CVE-2023-52608": { + "cmt_msg": "firmware: arm_scmi: Check mailbox/SMT channel for consistency" }, - "CVE-2014-8134": { - "cmt_msg": "x86, kvm: Clear paravirt_enabled on KVM guests for espfix32's benefit", - "cmt_id": "c06c656494797804aa7f603df37208b61792d0d1" - } - }, - "3.14.29": { - "CVE-2014-9585": { - "cmt_msg": "x86_64, vdso: Fix the vdso address randomization algorithm", - "cmt_id": "67ff8e53620c9aa941a7e4abbbfd921b0c4f97f0" - } - }, - "3.14.30": { - "CVE-2014-9428": { - "cmt_msg": "batman-adv: Calculate extra tail size based on queued fragments", - "cmt_id": "73ef2a1c62d46a3260b0bceab99ca7b642f670dc" - } - }, - "3.14.31": { - "CVE-2014-9529": { - "cmt_msg": "KEYS: close race between key lookup and freeing", - "cmt_id": "cf69173f59163182c12e0ecbda52721397468763" + "CVE-2023-52609": { + "cmt_msg": "binder: fix race between mmput() and do_exit()" }, - "CVE-2014-9644": { - "cmt_msg": "crypto: include crypto- module prefix in template", - "cmt_id": "f6e8b55035cb1cc1b6ac054fbfed633177524362" + "CVE-2023-4208": { + "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free" }, - "CVE-2013-7421": { - "cmt_msg": "crypto: prefix module autoloading with \"crypto-\"", - "cmt_id": "31c8446aacd8595a9de61610b2625bcf84e1b7aa" - } - }, - "3.14.33": { - "CVE-2014-3690": { - "cmt_msg": "x86,kvm,vmx: Preserve CR4 across VM entry", - "cmt_id": "5fb88e88031daf17e29ba5c679fe5ec4b8047e1a" - } - }, - "3.14.34": { - "CVE-2015-1421": { - "cmt_msg": "net: sctp: fix slab corruption from use after free on INIT collisions", - "cmt_id": "faf1368dedf9cc98ef35c9ec6d2677ff5e98b090" - } - }, - "3.14.35": { - "CVE-2015-1593": { - "cmt_msg": "x86, mm/ASLR: Fix stack randomization on 64-bit systems", - "cmt_id": "14a3e0c960668a161880301cb90f48f331117073" - } - }, - "3.14.36": { - "CVE-2015-2830": { - "cmt_msg": "x86/asm/entry/64: Remove a bogus 'ret_from_fork' optimization", - "cmt_id": "213c9f19d733b067b278901acf49d67e805a38b0" - } - }, - "3.14.37": { - "CVE-2016-0823": { - "cmt_msg": "pagemap: do not leak physical addresses to non-privileged userspace", - "cmt_id": "26f7f4d46a2cbfa6fbb633d228ec34cf969589d5" + "CVE-2023-4206": { + "cmt_msg": "net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free" }, - "CVE-2015-3331": { - "cmt_msg": "crypto: aesni - fix memory usage in GCM decryption", - "cmt_id": "e9b15363c10104a0823e5e2d360eab188f2b122f" + "CVE-2023-4207": { + "cmt_msg": "net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free" }, - "CVE-2015-2150": { - "cmt_msg": "xen-pciback: limit guest control of command register", - "cmt_id": "9cb8c24e612f1724fa85872205a1dfae7603d874" - } - }, - "3.14.39": { - "CVE-2015-2041": { - "cmt_msg": "net: llc: use correct size for sysctl timeout entries", - "cmt_id": "ecca64226ce2960280921e09ae33e90f82b5c408" + "CVE-2023-3640": { + "cmt_msg": "" }, - "CVE-2015-2042": { - "cmt_msg": "net: rds: use correct size for max unacked packets and bytes", - "cmt_id": "2a9eb844a4c126b7e975a086f99f35699e88c011" + "CVE-2023-20593": { + "cmt_msg": "x86/cpu/amd: Add a Zenbleed fix" }, - "CVE-2015-3332": { - "cmt_msg": "tcp: Fix crash in TCP Fast Open", - "cmt_id": "79ea2bfc7d9cac1949bec2cb09b622becb7d54b6" + "CVE-2023-2124": { + "cmt_msg": "xfs: verify buffer contents when we skip log replay" }, - "CVE-2014-8159": { - "cmt_msg": "IB/uverbs: Prevent integer overflow in ib_umem_get address arithmetic", - "cmt_id": "f40fc98d0b046ba153442b3bfd7887437f2ebd30" - } - }, - "3.14.40": { - "CVE-2014-8559": { - "cmt_msg": "move d_rcu from overlapping d_child to overlapping d_alias", - "cmt_id": "5c48ea64a86415fde0859267a194442d26d2e70c" + "CVE-2023-4015": { + "cmt_msg": "netfilter: nf_tables: skip immediate deactivate in _PREPARE_ERROR" }, - "CVE-2014-8160": { - "cmt_msg": "netfilter: conntrack: disable generic tracking for known protocols", - "cmt_id": "efbf300ed821a533c3af71b1b122227febc28142" + "CVE-2023-4010": { + "cmt_msg": "" }, - "CVE-2015-2922": { - "cmt_msg": "ipv6: Don't reduce hop limit for an interface", - "cmt_id": "01f69adac109867f892f12057660d891b34182f6" + "CVE-2024-26774": { + "cmt_msg": "ext4: avoid dividing by 0 in mb_update_avg_fragment_size() when block bitmap corrupt" }, - "CVE-2015-0239": { - "cmt_msg": "KVM: x86: SYSENTER emulation is broken", - "cmt_id": "ce5996929f2df50b1e37037a5a78d1269fbb5309" - } - }, - "3.14.41": { - "CVE-2015-6526": { - "cmt_msg": "powerpc/perf: Cap 64bit userspace backtraces to PERF_MAX_STACK_DEPTH", - "cmt_id": "83dffc246d8b217cd9f577a8859c97b6054806cb" + "CVE-2019-19378": { + "cmt_msg": "" }, - "CVE-2017-1000253": { - "cmt_msg": "fs/binfmt_elf.c: fix bug in loading of PIE binaries", - "cmt_id": "3d262151b457c3af845e460bd32a746691898a53" + "CVE-2020-24503": { + "cmt_msg": "" }, - "CVE-2015-3339": { - "cmt_msg": "fs: take i_mutex during prepare_binprm for set[ug]id executables", - "cmt_id": "de70236fbe30749fb8c317088c16a97e700fe232" - } - }, - "3.14.42": { - "CVE-2015-3636": { - "cmt_msg": "ipv4: Missing sk_nulls_node_init() in ping_unhash().", - "cmt_id": "f493b53864236c924b61ef3ccbb759ac46419a32" - } - }, - "3.14.44": { - "CVE-2015-1420": { - "cmt_msg": "vfs: read file_handle only once in handle_to_path", - "cmt_id": "be647ca464ebd9e54bd142da8150b31492aa1878" - } - }, - "3.14.45": { - "CVE-2015-4700": { - "cmt_msg": "x86: bpf_jit: fix compilation of large bpf programs", - "cmt_id": "4ca11e9fe811defdf228d7f579e77b5350c96d02" + "CVE-2020-24502": { + "cmt_msg": "" }, - "CVE-2015-5366": { - "cmt_msg": "udp: fix behavior of wrong checksums", - "cmt_id": "542744f265e23eca08f14a8748a3cbf5feb56cdf" + "CVE-2020-11725": { + "cmt_msg": "" }, - "CVE-2015-4003": { - "cmt_msg": "ozwpan: divide-by-zero leading to panic", - "cmt_id": "c352bbe0f4b610a9f9f1327a63fd558a840afc85" + "CVE-2022-3606": { + "cmt_msg": "" }, - "CVE-2015-4002": { - "cmt_msg": "ozwpan: Use proper check to prevent heap overflow", - "cmt_id": "b440eec2f2729ef6b224030894ea8880f2937371" + "CVE-2022-2209": { + "cmt_msg": "" }, - "CVE-2015-5364": { - "cmt_msg": "udp: fix behavior of wrong checksums", - "cmt_id": "542744f265e23eca08f14a8748a3cbf5feb56cdf" - } - }, - "3.14.47": { - "CVE-2014-7822": { - "cmt_msg": "->splice_write() via ->write_iter()", - "cmt_id": "b292fc7723b66d9796ae550b284223d95019ac44" + "CVE-2024-26775": { + "cmt_msg": "aoe: avoid potential deadlock at set_capacity" }, - "CVE-2015-2666": { - "cmt_msg": "x86/microcode/intel: Guard against stack overflow in the loader", - "cmt_id": "77544e78c388cc755c056f451b322dedba991c0a" + "CVE-2023-7042": { + "cmt_msg": "wifi: ath10k: fix NULL pointer dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev()" }, - "CVE-2015-8950": { - "cmt_msg": "arm64: dma-mapping: always clear allocated buffers", - "cmt_id": "22ff38e850b7fc87bdcccbebe92c3e7764ffe389" + "CVE-2023-52559": { + "cmt_msg": "iommu/vt-d: Avoid memory allocation in iommu_suspend()" }, - "CVE-2014-9710": { - "cmt_msg": "Btrfs: make xattr replace operations atomic", - "cmt_id": "02590fd855d1690568b2fa439c942e933221b57a" - } - }, - "3.14.48": { - "CVE-2015-3212": { - "cmt_msg": "sctp: fix ASCONF list handling", - "cmt_id": "21eceec537c215824aa5939c0a4aab4a5a8978a4" - } - }, - "3.14.49": { - "CVE-2015-1333": { - "cmt_msg": "KEYS: ensure we free the assoc array edit if edit is valid", - "cmt_id": "c9cd9b18dac801040ada16562dc579d5ac366d75" + "CVE-2023-47233": { + "cmt_msg": "wifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach" }, - "CVE-2015-9289": { - "cmt_msg": "cx24116: fix a buffer overflow when checking userspace params", - "cmt_id": "5cceed3976af74c7565636f0dfbcd1fc6817dc5d" - } - }, - "3.14.50": { - "CVE-2015-6252": { - "cmt_msg": "vhost: actually track log eventfd file", - "cmt_id": "a0a45c374d8478fb4ec2e3b4949e394d75ceb11a" + "CVE-2024-23850": { + "cmt_msg": "btrfs: do not ASSERT() if the newly created subvolume already got read" }, - "CVE-2015-3288": { - "cmt_msg": "mm: avoid setting up anonymous pages into file mapping", - "cmt_id": "9f7fa1bc5fb4414a75ea451859154a9930e47daf" - } - }, - "3.14.51": { - "CVE-2015-4692": { - "cmt_msg": "kvm: x86: fix kvm_apic_has_events to check for NULL pointer", - "cmt_id": "c76b576d5e9c2966847b08fa634ed395ac8f97b8" + "CVE-2024-23851": { + "cmt_msg": "dm: limit the number of targets and parameter size area" }, - "CVE-2015-5706": { - "cmt_msg": "path_openat(): fix double fput()", - "cmt_id": "88b4f377466cb673777d27693acf70108a908106" + "CVE-2023-52629": { + "cmt_msg": "sh: push-switch: Reorder cleanup operations to avoid use-after-free bug" }, - "CVE-2015-5697": { - "cmt_msg": "md: use kzalloc() when bitmap is disabled", - "cmt_id": "adbbaa36dd55ff0bde07391d898779760b5206df" + "CVE-2024-26772": { + "cmt_msg": "ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal()" }, - "CVE-2015-5707": { - "cmt_msg": "sg_start_req(): make sure that there's not too many elements in iovec", - "cmt_id": "08ac1787579cb8bd9e7333836269e76801905597" - } - }, - "3.14.54": { - "CVE-2015-3291": { - "cmt_msg": "x86/nmi/64: Use DF to avoid userspace RSP confusing nested NMI detection", - "cmt_id": "5f521316a9d5c70842744b8f3f872ab1a932711b" + "CVE-2024-26758": { + "cmt_msg": "md: Don't ignore suspended array in md_check_recovery()" }, - "CVE-2015-3290": { - "cmt_msg": "x86/nmi/64: Switch stacks on userspace NMI entry", - "cmt_id": "66af900f21c6b0b1b59ac156245ca8d2b5d7b696" + "CVE-2024-26610": { + "cmt_msg": "wifi: iwlwifi: fix a memory corruption" }, - "CVE-2015-4167": { - "cmt_msg": "udf: Check length of extended attributes and allocation descriptors", - "cmt_id": "34820fc89c5e635b7381e4060931ca30a63d110a" + "CVE-2024-26612": { + "cmt_msg": "netfs, fscache: Prevent Oops in fscache_put_cache()" }, - "CVE-2015-5157": { - "cmt_msg": "x86/nmi/64: Switch stacks on userspace NMI entry", - "cmt_id": "66af900f21c6b0b1b59ac156245ca8d2b5d7b696" + "CVE-2023-6606": { + "cmt_msg": "smb: client: fix OOB in smbCalcSize()" }, - "CVE-2015-8746": { - "cmt_msg": "NFS: Fix a NULL pointer dereference of migration recovery ops for v4.2 client", - "cmt_id": "05c5d5c75b6e30af9b00ecd07eb9f2733741e8df" + "CVE-2024-26614": { + "cmt_msg": "tcp: make sure init the accept_queue's spinlocks once" }, - "CVE-2015-5283": { - "cmt_msg": "sctp: fix race on protocol/netns initialization", - "cmt_id": "62f575aaba7ae93a4e02029d30f9dcf69b84470f" - } - }, - "3.14.55": { - "CVE-2015-7613": { - "cmt_msg": "Initialize msg/shm IPC objects before doing ipc_addid()", - "cmt_id": "58c01a5074bc551a151b6b44f56ed40debd6b99d" + "CVE-2024-26751": { + "cmt_msg": "ARM: ep93xx: Add terminator to gpiod_lookup_table" }, - "CVE-2015-5257": { - "cmt_msg": "USB: whiteheat: fix potential null-deref at probe", - "cmt_id": "fe6689e03318d5745d88328395fd326e08238533" + "CVE-2024-26752": { + "cmt_msg": "l2tp: pass correct message length to ip6_append_data" }, - "CVE-2015-2925": { - "cmt_msg": "dcache: Handle escaped paths in prepend_path", - "cmt_id": "cb1320693b9d8d32651a2bb7cd15498408732b8f" - } - }, - "3.14.57": { - "CVE-2015-4036": { - "cmt_msg": "vhost/scsi: potential memory corruption", - "cmt_id": "6c6216a01ac816230882c35de819e36ad1c40b0d" - } - }, - "3.14.58": { - "CVE-2015-5156": { - "cmt_msg": "virtio-net: drop NETIF_F_FRAGLIST", - "cmt_id": "6d419a0b5bcdfe5b2cc8821d11b102dba01b28f6" + "CVE-2024-26753": { + "cmt_msg": "crypto: virtio/akcipher - Fix stack overflow on memcpy" }, - "CVE-2015-6937": { - "cmt_msg": "RDS: verify the underlying transport exists before creating a connection", - "cmt_id": "98a01278b20d7554be58dae60c9f25e62bcde9f6" - } - }, - "3.14.59": { - "CVE-2015-8543": { - "cmt_msg": "net: add validation for the socket syscall protocol argument", - "cmt_id": "49c9b76db37ecfbac70b0841438fbe9d446ceb52" + "CVE-2024-26754": { + "cmt_msg": "gtp: fix use-after-free and null-ptr-deref in gtp_genl_dump_pdp()" }, - "CVE-2016-0728": { - "cmt_msg": "KEYS: Fix keyring ref leak in join_session_keyring()", - "cmt_id": "2e647bca7a2c885acdcd89da631b8dd5edc9e310" + "CVE-2023-21255": { + "cmt_msg": "binder: fix UAF caused by faulty buffer cleanup" }, - "CVE-2015-7872": { - "cmt_msg": "KEYS: Fix crash when attempt to garbage collect an uninstantiated keyring", - "cmt_id": "aad1f1b859a047397ffe0f0044d12408b2df94c9" + "CVE-2024-26757": { + "cmt_msg": "md: Don't ignore read-only array in md_check_recovery()" }, - "CVE-2015-7550": { - "cmt_msg": "KEYS: Fix race between read and revoke", - "cmt_id": "92264cc9c4636340a492d78f8f2ae3b3424e7fdd" + "CVE-2023-52439": { + "cmt_msg": "uio: Fix use-after-free in uio_open" }, - "CVE-2015-8569": { - "cmt_msg": "pptp: verify sockaddr_len in pptp_bind() and pptp_connect()", - "cmt_id": "0b21a04d1ff604297995fe4a21bde8ba7333d42c" + "CVE-2023-52438": { + "cmt_msg": "binder: fix use-after-free in shinker's callback" }, - "CVE-2015-8575": { - "cmt_msg": "bluetooth: Validate socket address length in sco_sock_bind().", - "cmt_id": "f32e7aeb2d4e7b6427dc0ab630b851eed38b6d0a" + "CVE-2023-52435": { + "cmt_msg": "net: prevent mss overflow in skb_segment()" }, - "CVE-2013-7446": { - "cmt_msg": "unix: avoid use-after-free in ep_remove_wait_queue", - "cmt_id": "9d054f57adc981a5f503d5eb9b259aa450b90dc5" - } - }, - "3.14.60": { - "CVE-2015-7799": { - "cmt_msg": "isdn_ppp: Add checks for allocation failure in isdn_ppp_open()", - "cmt_id": "b22b5281ff0fae948bda39e2ecb7c135410eeee5" + "CVE-2023-52434": { + "cmt_msg": "smb: client: fix potential OOBs in smb2_parse_contexts()" }, - "CVE-2015-8845": { - "cmt_msg": "powerpc/tm: Check for already reclaimed tasks", - "cmt_id": "70812a4226708100041da6715a1d5bb2e3aebc34" + "CVE-2023-52436": { + "cmt_msg": "f2fs: explicitly null-terminate the xattr list" }, - "CVE-2015-8844": { - "cmt_msg": "powerpc/tm: Block signal return setting invalid MSR state", - "cmt_id": "a327f0569b21b62942dc28aacb9dbbda236ef7a2" + "CVE-2024-26688": { + "cmt_msg": "fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super" }, - "CVE-2016-2545": { - "cmt_msg": "ALSA: timer: Fix double unlink of active_list", - "cmt_id": "d7b84f78c7a0b8ba3fde43a64faf0d69ada4d987" + "CVE-2024-23307": { + "cmt_msg": "md/raid5: fix atomicity violation in raid5_cache_count" }, - "CVE-2016-2544": { - "cmt_msg": "ALSA: seq: Fix race at timer setup and close", - "cmt_id": "7038cd337653a65b779aeff9f161b937339b40e3" + "CVE-2022-2961": { + "cmt_msg": "" }, - "CVE-2016-2547": { - "cmt_msg": "ALSA: timer: Harden slave timer list handling", - "cmt_id": "ac5f6f7d25339feacc5f1dc39d3100e5520e7ca2" + "CVE-2024-26680": { + "cmt_msg": "net: atlantic: Fix DMA mapping for PTP hwts ring" }, - "CVE-2016-2546": { - "cmt_msg": "ALSA: timer: Fix race among timer ioctls", - "cmt_id": "7510c77227536d85013016289c96dd1fe212db77" + "CVE-2024-26681": { + "cmt_msg": "netdevsim: avoid potential loop in nsim_dev_trap_report_work()" }, - "CVE-2016-2543": { - "cmt_msg": "ALSA: seq: Fix missing NULL check at remove_events ioctl", - "cmt_id": "9174b70002e1497e93242de7570a842497b3de97" + "CVE-2024-26686": { + "cmt_msg": "fs/proc: do_task_stat: use sig->stats_lock to gather the threads/children stats" }, - "CVE-2013-4312": { - "cmt_msg": "unix: properly account for FDs passed over unix sockets", - "cmt_id": "aa51d1c24ec3b6605f7cc7ef500c96cd71d7ef90" + "CVE-2024-26687": { + "cmt_msg": "xen/events: close evtchn after mapping cleanup" }, - "CVE-2016-2549": { - "cmt_msg": "ALSA: hrtimer: Fix stall by hrtimer_cancel()", - "cmt_id": "73672733af0278e554eec8fc33de13b0d4a860be" + "CVE-2023-3269": { + "cmt_msg": "mm: introduce new 'lock_mm_and_find_vma()' page fault helper" }, - "CVE-2016-2548": { - "cmt_msg": "ALSA: timer: Harden slave timer list handling", - "cmt_id": "ac5f6f7d25339feacc5f1dc39d3100e5520e7ca2" - } - }, - "3.14.61": { - "CVE-2016-2782": { - "cmt_msg": "USB: visor: fix null-deref at probe", - "cmt_id": "897d109d4b52532f7ecf24c4294f42d1e62b1289" + "CVE-2024-26685": { + "cmt_msg": "nilfs2: fix potential bug in end_buffer_async_write" }, - "CVE-2016-2384": { - "cmt_msg": "ALSA: usb-audio: avoid freeing umidi object twice", - "cmt_id": "05dd81eafd796a5f1db09cc9fe2bff44cfd56dfe" + "CVE-2023-2640": { + "cmt_msg": "" }, - "CVE-2016-2085": { - "cmt_msg": "EVM: Use crypto_memneq() for digest comparisons", - "cmt_id": "6121dabef629c5b584abd617bba87f420b7f4011" + "CVE-2023-6915": { + "cmt_msg": "ida: Fix crash in ida_free when the bitmap is empty" }, - "CVE-2016-8646": { - "cmt_msg": "crypto: algif_hash - Only export and import on sockets with data", - "cmt_id": "d5cdc58aa3dca63c94e70c19199b795a362b0583" + "CVE-2010-4563": { + "cmt_msg": "" }, - "CVE-2016-0723": { - "cmt_msg": "tty: Fix unsafe ldisc reference via ioctl(TIOCGETD)", - "cmt_id": "a08f833c45a2e803183ae82c153694711dccc16f" + "CVE-2023-45871": { + "cmt_msg": "igb: set max size RX buffer when store bad packet is enabled" }, - "CVE-2015-7566": { - "cmt_msg": "USB: serial: visor: fix crash on detecting device without write_urbs", - "cmt_id": "e3b75da93491acc980573d6f06472225f81c93fe" - } - }, - "3.14.62": { - "CVE-2015-8785": { - "cmt_msg": "fuse: break infinite loop in fuse_fill_write_pages()", - "cmt_id": "7b54d4eea25df0cac10c9ccf353b36a62253547d" - } - }, - "3.14.63": { - "CVE-2015-8812": { - "cmt_msg": "iw_cxgb3: Fix incorrectly returning error on success", - "cmt_id": "8e0cb6c1f8c403c189b45b969540284862b30f85" + "CVE-2023-4622": { + "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES" }, - "CVE-2015-8215": { - "cmt_msg": "ipv6: addrconf: validate new MTU before applying it", - "cmt_id": "db449d873870aee9161edb9259d72254987ad7c0" - } - }, - "3.14.65": { - "CVE-2016-3044": { - "cmt_msg": "KVM: PPC: Book3S HV: Sanitize special-purpose register values on guest exit", - "cmt_id": "ef9dd54d0208f2bfb904f80a04bd963d10377b4e" - } - }, - "3.14.66": { - "CVE-2016-3137": { - "cmt_msg": "USB: cypress_m8: add endpoint sanity check", - "cmt_id": "59abff9d0ce434487cbfd8c25e75bb30d8be1a52" + "CVE-2023-4623": { + "cmt_msg": "net/sched: sch_hfsc: Ensure inner classes have fsc curve" }, - "CVE-2016-3689": { - "cmt_msg": "Input: ims-pcu - sanity check against missing interfaces", - "cmt_id": "665bbcb66051e1176a159d270e53d439f9dc8c80" + "CVE-2024-26663": { + "cmt_msg": "tipc: Check the bearer type before calling tipc_udp_nl_bearer_add()" }, - "CVE-2016-9685": { - "cmt_msg": "xfs: fix two memory leaks in xfs_attr_list.c error paths", - "cmt_id": "8896de9c26019c13812015ccc5a4fc42c0e8402a" + "CVE-2023-1193": { + "cmt_msg": "ksmbd: delete asynchronous work from list" }, - "CVE-2016-3140": { - "cmt_msg": "USB: digi_acceleport: do sanity checking for the number of ports", - "cmt_id": "91c4c149606657236e4a735778c7ca632e92bcd4" + "CVE-2023-52640": { + "cmt_msg": "fs/ntfs3: Fix oob in ntfs_listxattr" }, - "CVE-2016-3136": { - "cmt_msg": "USB: mct_u232: add sanity checking in probe", - "cmt_id": "26f205bf2fa5aef26fd0762dbdf66198dfde924c" + "CVE-2023-52641": { + "cmt_msg": "fs/ntfs3: Add NULL ptr dereference checking at the end of attr_allocate_frame()" }, - "CVE-2016-2185": { - "cmt_msg": "Input: ati_remote2 - fix crashes on detecting device with invalid descriptor", - "cmt_id": "52844be6f96c447577de40ea7d2f4019457a7dd9" + "CVE-2021-0399": { + "cmt_msg": "" }, - "CVE-2016-2184": { - "cmt_msg": "ALSA: usb-audio: Fix NULL dereference in create_fixed_stream_quirk()", - "cmt_id": "7963d34edc58f8e40c0891262cac6e443346313f" + "CVE-2023-52488": { + "cmt_msg": "serial: sc16is7xx: convert from _raw_ to _noinc_ regmap functions for FIFO" }, - "CVE-2016-2186": { - "cmt_msg": "Input: powermate - fix oops with malicious USB descriptors", - "cmt_id": "5c91a520b0d6d2700c96d3b8198d7e3cfddce538" + "CVE-2023-52489": { + "cmt_msg": "mm/sparsemem: fix race in accessing memory_section->usage" }, - "CVE-2016-3138": { - "cmt_msg": "USB: cdc-acm: more sanity checking", - "cmt_id": "180aa6e45eb471aec123854df40d787c634943eb" - } - }, - "3.14.67": { - "CVE-2016-7117": { - "cmt_msg": "net: Fix use after free in the recvmmsg exit path", - "cmt_id": "902b916d00ba73095b58a9a8dfe926c6a7f635d5" + "CVE-2023-42755": { + "cmt_msg": "net/sched: Retire rsvp classifier" }, - "CVE-2016-4805": { - "cmt_msg": "ppp: take reference on channels netns", - "cmt_id": "2d6c3459438d6c0bab867b79c35db7e154648ad1" - } - }, - "3.14.68": { - "CVE-2016-3157": { - "cmt_msg": "x86/iopl/64: Properly context-switch IOPL on Xen PV", - "cmt_id": "c216658f5fda233ae3c27f8fbfe3b2498ebe75ab" + "CVE-2023-42754": { + "cmt_msg": "ipv4: fix null-deref in ipv4_link_failure" }, - "CVE-2016-3955": { - "cmt_msg": "USB: usbip: fix potential out-of-bounds write", - "cmt_id": "c9104ee05af3ecb2943872287da3d576b145c55f" + "CVE-2023-52486": { + "cmt_msg": "drm: Don't unref the same fb many times by mistake due to deadlock handling" }, - "CVE-2016-2187": { - "cmt_msg": "Input: gtco - fix crash on detecting device without endpoints", - "cmt_id": "f090502c9f10046d293508f022ed00796a541b37" + "CVE-2023-52480": { + "cmt_msg": "ksmbd: fix race condition between session lookup and expire" }, - "CVE-2016-0821": { - "cmt_msg": "include/linux/poison.h: fix LIST_POISON{1,2} offset", - "cmt_id": "703d87a503141999a6749263d0a8caf038ce5b75" + "CVE-2012-4542": { + "cmt_msg": "" }, - "CVE-2016-7914": { - "cmt_msg": "assoc_array: don't call compare_object() on a node", - "cmt_id": "523ef4db4dc8f2bdbe10262a7931d01a0c02d560" - } - }, - "3.14.69": { - "CVE-2016-7916": { - "cmt_msg": "proc: prevent accessing /proc//environ until it's ready", - "cmt_id": "e9abb59f46beadb8d80d9e40c9c5e15b5e61b8d1" - } - }, - "3.14.70": { - "CVE-2016-4486": { - "cmt_msg": "net: fix infoleak in rtnetlink", - "cmt_id": "c1e797692b97ec480bc0e940cc022823e3cc40c9" + "CVE-2023-52482": { + "cmt_msg": "x86/srso: Add SRSO mitigation for Hygon processors" }, - "CVE-2016-2117": { - "cmt_msg": "atl2: Disable unimplemented scatter/gather feature", - "cmt_id": "d6b8a68ac7b6d2e241f8d34b769c98a1793d9124" + "CVE-2023-52483": { + "cmt_msg": "mctp: perform route lookups under a RCU read-side lock" }, - "CVE-2016-4485": { - "cmt_msg": "net: fix infoleak in llc", - "cmt_id": "f3a0b05e04b862ffc549b5635339a5cee00da34d" + "CVE-2023-4128": { + "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free" }, - "CVE-2016-4913": { - "cmt_msg": "get_rock_ridge_filename(): handle malformed NM entries", - "cmt_id": "dc7e3177f3cefcbecda0e4266cd554866ff2caea" + "CVE-2023-4244": { + "cmt_msg": "netfilter: nf_tables: fix GC transaction races with netns and netlink event exit path" }, - "CVE-2016-4580": { - "cmt_msg": "net: fix a kernel infoleak in x25 module", - "cmt_id": "a1f85b3a66d74389417e86505013e51a06b789f0" - } - }, - "3.14.71": { - "CVE-2016-9754": { - "cmt_msg": "ring-buffer: Prevent overflow of size in ring_buffer_resize()", - "cmt_id": "50b139ab8606ebe66da507dddbc838baa5cfbf61" - } - }, - "3.14.73": { - "CVE-2016-4998": { - "cmt_msg": "netfilter: x_tables: check for bogus target offset", - "cmt_id": "f216289025f02e99628d6783f251f3a9d1966cad" + "CVE-2023-3609": { + "cmt_msg": "net/sched: cls_u32: Fix reference counter leak leading to overflow" }, - "CVE-2016-3134": { - "cmt_msg": "netfilter: x_tables: fix unconditional helper", - "cmt_id": "a1a184a2f31575dba677514f2de22ddf1671ad81" + "CVE-2023-52491": { + "cmt_msg": "media: mtk-jpeg: Fix use after free bug due to error path handling in mtk_jpeg_dec_device_run" }, - "CVE-2016-4997": { - "cmt_msg": "netfilter: x_tables: check for bogus target offset", - "cmt_id": "f216289025f02e99628d6783f251f3a9d1966cad" + "CVE-2024-26759": { + "cmt_msg": "mm/swap: fix race when skipping swapcache" }, - "CVE-2016-9806": { - "cmt_msg": "netlink: Fix dump skb leak/double free", - "cmt_id": "33f04a1a2c102c19673b95709c0246509fd24f25" + "CVE-2023-6039": { + "cmt_msg": "net: usb: lan78xx: reorder cleanup operations to avoid UAF bugs" }, - "CVE-2016-2847": { - "cmt_msg": "pipe: limit the per-user amount of pages allocated in pipes", - "cmt_id": "c098acd272f1323e47ca52ec016f1a62d26b6573" - } - }, - "3.14.74": { - "CVE-2016-5828": { - "cmt_msg": "powerpc/tm: Always reclaim in start_thread() for exec() class syscalls", - "cmt_id": "ff19f63ed47309550b47831ac39176d9910fadfe" + "CVE-2024-26615": { + "cmt_msg": "net/smc: fix illegal rmb_desc access in SMC-D connection dump" }, - "CVE-2016-1237": { - "cmt_msg": "posix_acl: Add set_posix_acl", - "cmt_id": "8977f46fff476e4a5c5ab270a78c9ab8b548d645" + "CVE-2021-3714": { + "cmt_msg": "" }, - "CVE-2016-5829": { - "cmt_msg": "HID: hiddev: validate num_values for HIDIOCGUSAGES, HIDIOCSUSAGES commands", - "cmt_id": "22e658d19a1a64512d49de2632ad2124e6f9e429" + "CVE-2023-3117": { + "cmt_msg": "netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE" }, - "CVE-2016-4470": { - "cmt_msg": "KEYS: potential uninitialized variable", - "cmt_id": "ff1dcd2a19f8203324cba737a54707a1ee3f98ea" - } - }, - "3.14.75": { - "CVE-2016-4569": { - "cmt_msg": "ALSA: timer: Fix leak in SNDRV_TIMER_IOCTL_PARAMS", - "cmt_id": "a4eabc8c16004cc41f6a71c31cf7e349fa6efe50" + "CVE-2021-3892": { + "cmt_msg": "" }, - "CVE-2016-4578": { - "cmt_msg": "ALSA: timer: Fix leak in events via snd_timer_user_ccallback", - "cmt_id": "414d03573fe4e942f07b1c3c8750227c6be0b061" - } - }, - "3.14.76": { - "CVE-2016-5696": { - "cmt_msg": "tcp: make challenge acks less predictable", - "cmt_id": "860c53258e634c54f70252c352bae7bac30724a9" + "CVE-2023-35788": { + "cmt_msg": "net/sched: flower: fix possible OOB write in fl_set_geneve_opt()" }, - "CVE-2016-4565": { - "cmt_msg": "IB/security: Restrict use of the write() interface", - "cmt_id": "c96c87e19293995d5adde47bb20ae827e8b73607" + "CVE-2024-24860": { + "cmt_msg": "Bluetooth: Fix atomicity violation in {min,max}_key_size_set" }, - "CVE-2016-2069": { - "cmt_msg": "x86/mm: Add barriers and document switch_mm()-vs-flush synchronization", - "cmt_id": "1b8542cd64724bb7b61dcc0ccfe0ccbefff1bc2d" + "CVE-2024-24861": { + "cmt_msg": "media: xc4000: Fix atomicity violation in xc4000_get_frequency" }, - "CVE-2016-3951": { - "cmt_msg": "cdc_ncm: do not call usbnet_link_change from cdc_ncm_bind", - "cmt_id": "0c17e10854221a4b59bb0266f60cac96f2ad225a" + "CVE-2024-24864": { + "cmt_msg": "" }, - "CVE-2017-7495": { - "cmt_msg": "ext4: fix data exposure after a crash", - "cmt_id": "6e853b165d44b259960e6c99e030962dda957475" + "CVE-2023-52596": { + "cmt_msg": "sysctl: Fix out of bounds access for empty sysctl registers" }, - "CVE-2015-8816": { - "cmt_msg": "USB: fix invalid memory access in hub_activate()", - "cmt_id": "627c25d08197bafc328d9ac841dfc1a143806a71" + "CVE-2023-52597": { + "cmt_msg": "KVM: s390: fix setting of fpc register" }, - "CVE-2016-7910": { - "cmt_msg": "block: fix use-after-free in seq file", - "cmt_id": "8cb3a41575d84a56f9dd7686286aafd84e5313c3" + "CVE-2023-52594": { + "cmt_msg": "wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus()" }, - "CVE-2016-3070": { - "cmt_msg": "mm: migrate dirty page without clear_page_dirty_for_io etc", - "cmt_id": "53a35fd395a1d7fdcab6477621358833ea27897b" + "CVE-2023-52595": { + "cmt_msg": "wifi: rt2x00: restart beacon queue when hardware reset" }, - "CVE-2015-8767": { - "cmt_msg": "sctp: Prevent soft lockup when sctp_accept() is called during a timeout event", - "cmt_id": "a4377c6e467b0b8420ee2d4384ae582ed506ee86" + "CVE-2023-52593": { + "cmt_msg": "wifi: wfx: fix possible NULL pointer dereference in wfx_set_mfp_ap()" }, - "CVE-2016-3857": { - "cmt_msg": "arm: oabi compat: add missing access checks", - "cmt_id": "e380a2712ff17b87a0fee55143862c998098144c" - } - }, - "3.14.77": { - "CVE-2016-10229": { - "cmt_msg": "udp: properly support MSG_PEEK with truncated buffers", - "cmt_id": "3acd7bf39cdb109aaaef2ec4819cca7088218a4b" + "CVE-2023-52590": { + "cmt_msg": "ocfs2: Avoid touching renamed directory if parent does not change" }, - "CVE-2016-4482": { - "cmt_msg": "USB: usbfs: fix potential infoleak in devio", - "cmt_id": "fd13a6831e1c770e20619efb48be360c24574717" - } - }, - "3.14.78": { - "CVE-2016-6480": { - "cmt_msg": "aacraid: Check size values after double-fetch from user", - "cmt_id": "67d4aa44188d0da7f661972a88f9ac448e4fd2fe" - } - }, - "3.14.79": { - "CVE-2016-6130": { - "cmt_msg": "s390/sclp_ctl: fix potential information leak with /dev/sclp", - "cmt_id": "78a4260f1fad5cfc6ad7cf6e01a93a2fed0d0e3e" + "CVE-2023-52591": { + "cmt_msg": "reiserfs: Avoid touching renamed directory if parent does not change" }, - "CVE-2016-5244": { - "cmt_msg": "rds: fix an infoleak in rds_inc_info_copy", - "cmt_id": "d57906c6850c5bb9a93841da3deb6df53135d133" - } - }, - "outstanding": { - "CVE-2017-5897": { - "cmt_msg": "ip6_gre: fix ip6gre_err() invalid reads" + "CVE-2023-52598": { + "cmt_msg": "s390/ptrace: handle setting of fpc register correctly" }, - "CVE-2020-35508": { - "cmt_msg": "fork: fix copy_process(CLONE_PARENT) race with the exiting ->real_parent" + "CVE-2023-52599": { + "cmt_msg": "jfs: fix array-index-out-of-bounds in diNewExt" }, - "CVE-2022-3649": { - "cmt_msg": "nilfs2: fix use-after-free bug of struct nilfs_root" + "CVE-2024-26627": { + "cmt_msg": "scsi: core: Move scsi_host_busy() out of host lock for waking up EH handler" }, - "CVE-2020-35501": { + "CVE-2023-52446": { + "cmt_msg": "bpf: Fix a race condition between btf_put() and map_free()" + }, + "CVE-2011-4916": { "cmt_msg": "" }, - "CVE-2019-15098": { - "cmt_msg": "ath6kl: fix a NULL-ptr-deref bug in ath6kl_usb_alloc_urb_from_pipe()" + "CVE-2024-0841": { + "cmt_msg": "fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super" }, - "CVE-2021-45095": { - "cmt_msg": "phonet: refcount leak in pep_sock_accep" + "CVE-2024-26623": { + "cmt_msg": "pds_core: Prevent race issues involving the adminq" }, - "CVE-2017-10663": { - "cmt_msg": "f2fs: sanity check checkpoint segno and blkoff" + "CVE-2022-41848": { + "cmt_msg": "" }, - "CVE-2022-0001": { - "cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE" + "CVE-2022-40982": { + "cmt_msg": "x86/speculation: Add Gather Data Sampling mitigation" }, - "CVE-2020-12464": { - "cmt_msg": "USB: core: Fix free-while-in-use bug in the USB S-Glibrary" + "CVE-2021-39801": { + "cmt_msg": "" }, - "CVE-2017-10662": { - "cmt_msg": "f2fs: sanity check segment count" + "CVE-2021-39800": { + "cmt_msg": "" }, - "CVE-2019-19965": { - "cmt_msg": "scsi: libsas: stop discovering if oob mode is disconnected" + "CVE-2024-22099": { + "cmt_msg": "Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security" }, - "CVE-2016-9793": { - "cmt_msg": "net: avoid signed overflows for SO_{SND|RCV}BUFFORCE" + "CVE-2022-45885": { + "cmt_msg": "" }, - "CVE-2017-15102": { - "cmt_msg": "usb: misc: legousbtower: Fix NULL pointer deference" + "CVE-2022-45884": { + "cmt_msg": "" }, - "CVE-2016-9794": { - "cmt_msg": "ALSA: pcm : Call kill_fasync() in stream lock" + "CVE-2022-45887": { + "cmt_msg": "media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb()" }, - "CVE-2022-2503": { - "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag" + "CVE-2022-45886": { + "cmt_msg": "media: dvb-core: Fix use-after-free due on race condition at dvb_net" }, - "CVE-2017-17805": { - "cmt_msg": "crypto: salsa20 - fix blkcipher_walk API usage" + "CVE-2023-52509": { + "cmt_msg": "ravb: Fix use-after-free issue in ravb_tx_timeout_work()" }, - "CVE-2020-24587": { - "cmt_msg": "mac80211: prevent mixed key and fragment cache attacks" + "CVE-2023-46343": { + "cmt_msg": "nfc: nci: fix possible NULL pointer dereference in send_acknowledge()" }, - "CVE-2020-24586": { - "cmt_msg": "mac80211: prevent mixed key and fragment cache attacks" + "CVE-2024-25744": { + "cmt_msg": "x86/coco: Disable 32-bit emulation by default on TDX and SEV" }, - "CVE-2017-6074": { - "cmt_msg": "dccp: fix freeing skb too early for IPV6_RECVPKTINFO" + "CVE-2023-52505": { + "cmt_msg": "phy: lynx-28g: serialize concurrent phy_set_mode_ext() calls to shared registers" }, - "CVE-2022-3642": { - "cmt_msg": "" + "CVE-2023-52504": { + "cmt_msg": "x86/alternatives: Disable KASAN in apply_alternatives()" }, - "CVE-2021-0129": { - "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical" + "CVE-2023-52507": { + "cmt_msg": "nfc: nci: assert requested protocol is valid" }, - "CVE-2019-20096": { - "cmt_msg": "dccp: Fix memleak in __feat_register_sp" + "CVE-2023-52506": { + "cmt_msg": "LoongArch: Set all reserved memblocks on Node#0 at initialization" }, - "CVE-2023-42755": { - "cmt_msg": "net/sched: Retire rsvp classifier" + "CVE-2023-52501": { + "cmt_msg": "ring-buffer: Do not attempt to read past \"commit\"" }, - "CVE-2016-10044": { - "cmt_msg": "aio: mark AIO pseudo-fs noexec" + "CVE-2023-52500": { + "cmt_msg": "scsi: pm80xx: Avoid leaking tags when processing OPC_INB_SET_CONTROLLER_CONFIG command" }, - "CVE-2018-10940": { - "cmt_msg": "cdrom: information leak in cdrom_ioctl_media_changed()" + "CVE-2023-52503": { + "cmt_msg": "tee: amdtee: fix use-after-free vulnerability in amdtee_close_session" }, - "CVE-2023-31081": { - "cmt_msg": "" + "CVE-2023-52502": { + "cmt_msg": "net: nfc: fix races in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn()" }, - "CVE-2018-10087": { - "cmt_msg": "kernel/exit.c: avoid undefined behaviour when calling wait4()" + "CVE-2023-6817": { + "cmt_msg": "netfilter: nft_set_pipapo: skip inactive elements during set walk" }, - "CVE-2021-39634": { - "cmt_msg": "epoll: do not insert into poll queues until all sanity checks are done" + "CVE-2024-26668": { + "cmt_msg": "netfilter: nft_limit: reject configurations that cause integer overflow" }, - "CVE-2019-9503": { - "cmt_msg": "brcmfmac: add subtype check for event handling in data path" + "CVE-2024-26669": { + "cmt_msg": "net/sched: flower: Fix chain template offload" }, - "CVE-2020-36158": { - "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_cmd_802_11_ad_hoc_start" + "CVE-2020-25220": { + "cmt_msg": "" }, - "CVE-2023-3159": { - "cmt_msg": "firewire: fix potential uaf in outbound_phy_packet_callback()" + "CVE-2015-2877": { + "cmt_msg": "" }, - "CVE-2022-0480": { - "cmt_msg": "memcg: enable accounting for file lock caches" + "CVE-2024-26660": { + "cmt_msg": "drm/amd/display: Implement bounds check for stream encoder creation in DCN301" }, - "CVE-2018-10124": { - "cmt_msg": "kernel/signal.c: avoid undefined behaviour in kill_something_info" + "CVE-2024-26661": { + "cmt_msg": "drm/amd/display: Add NULL test for 'timing generator' in 'dcn21_set_pipe()'" }, - "CVE-2019-9466": { - "cmt_msg": "brcmfmac: add subtype check for event handling in data path" + "CVE-2024-26662": { + "cmt_msg": "drm/amd/display: Fix 'panel_cntl' could be null in 'dcn21_set_backlight_level()'" }, - "CVE-2023-52429": { - "cmt_msg": "dm: limit the number of targets and parameter size area" + "CVE-2023-26242": { + "cmt_msg": "" }, - "CVE-2021-28964": { - "cmt_msg": "btrfs: fix race when cloning extent buffer during rewind of an old root" + "CVE-2024-26664": { + "cmt_msg": "hwmon: (coretemp) Fix out-of-bounds memory access" }, - "CVE-2016-6828": { - "cmt_msg": "tcp: fix use after free in tcp_xmit_retransmit_queue()" + "CVE-2024-26665": { + "cmt_msg": "tunnels: fix out of bounds access when building IPv6 PMTU error" }, - "CVE-2021-0920": { - "cmt_msg": "af_unix: fix garbage collect vs MSG_PEEK" + "CVE-2019-16089": { + "cmt_msg": "" }, - "CVE-2023-1249": { - "cmt_msg": "coredump: Use the vma snapshot in fill_files_note" + "CVE-2024-26667": { + "cmt_msg": "drm/msm/dpu: check for valid hw_pp in dpu_encoder_helper_phys_cleanup" }, - "CVE-2022-23825": { - "cmt_msg": "" + "CVE-2024-26689": { + "cmt_msg": "ceph: prevent use-after-free in encode_cap_msg()" + }, + "CVE-2023-21264": { + "cmt_msg": "KVM: arm64: Prevent unconditional donation of unmapped regions from the host" }, "CVE-2021-3847": { "cmt_msg": "" }, - "CVE-2022-1974": { - "cmt_msg": "nfc: replace improper check device_is_registered() in netlink related functions" + "CVE-2023-52440": { + "cmt_msg": "ksmbd: fix slub overflow in ksmbd_decode_ntlmssp_auth_blob()" }, - "CVE-2019-13631": { - "cmt_msg": "Input: gtco - bounds check collection indent level" + "CVE-2023-52441": { + "cmt_msg": "ksmbd: fix out of bounds in init_smb2_rsp_hdr()" }, - "CVE-2024-26588": { - "cmt_msg": "LoongArch: BPF: Prevent out-of-bounds memory access" + "CVE-2023-52442": { + "cmt_msg": "ksmbd: validate session id and tree id in compound request" }, - "CVE-2023-2162": { - "cmt_msg": "scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress" + "CVE-2023-52443": { + "cmt_msg": "apparmor: avoid crash when parsed profile name is empty" }, - "CVE-2017-5551": { - "cmt_msg": "tmpfs: clear S_ISGID when setting posix ACLs" + "CVE-2023-52444": { + "cmt_msg": "f2fs: fix to avoid dirent corruption" }, - "CVE-2019-19241": { - "cmt_msg": "io_uring: async workers should inherit the user creds" + "CVE-2023-52445": { + "cmt_msg": "media: pvrusb2: fix use after free on context disconnection" }, - "CVE-2022-21123": { - "cmt_msg": "x86/speculation/mmio: Add mitigation for Processor MMIO Stale Data" + "CVE-2011-4917": { + "cmt_msg": "" }, - "CVE-2021-28688": { - "cmt_msg": "xen-blkback: don't leak persistent grants from xen_blkbk_map()" + "CVE-2023-52447": { + "cmt_msg": "bpf: Defer the free of inner map when necessary" }, - "CVE-2021-39686": { - "cmt_msg": "binder: use euid from cred instead of using task" + "CVE-2023-52448": { + "cmt_msg": "gfs2: Fix kernel NULL pointer dereference in gfs2_rgrp_dump" }, - "CVE-2021-39685": { - "cmt_msg": "USB: gadget: detect too-big endpoint 0 requests" + "CVE-2023-52449": { + "cmt_msg": "mtd: Fix gluebi NULL pointer dereference caused by ftl notifier" }, - "CVE-2023-6535": { + "CVE-2023-23039": { "cmt_msg": "" }, - "CVE-2021-43975": { - "cmt_msg": "atlantic: Fix OOB read and write in hw_atl_utils_fw_rpc_wait" + "CVE-2024-26718": { + "cmt_msg": "dm-crypt, dm-verity: disable tasklets" }, - "CVE-2018-6927": { - "cmt_msg": "futex: Prevent overflow by strengthen input validation" + "CVE-2024-26719": { + "cmt_msg": "nouveau: offload fence uevents work to workqueue" }, - "CVE-2020-0466": { - "cmt_msg": "do_epoll_ctl(): clean the failure exits up a bit" + "CVE-2024-26714": { + "cmt_msg": "interconnect: qcom: sc8180x: Mark CO0 BCM keepalive" }, - "CVE-2019-10207": { - "cmt_msg": "Bluetooth: hci_uart: check for missing tty operations" + "CVE-2024-26715": { + "cmt_msg": "usb: dwc3: gadget: Fix NULL pointer dereference in dwc3_gadget_suspend" }, - "CVE-2019-14835": { - "cmt_msg": "vhost: make sure log_num < in_num" + "CVE-2024-1312": { + "cmt_msg": "mm: lock_vma_under_rcu() must check vma->anon_vma under vma lock" }, - "CVE-2023-0459": { - "cmt_msg": "uaccess: Add speculation barrier to copy_from_user()" + "CVE-2024-26717": { + "cmt_msg": "HID: i2c-hid-of: fix NULL-deref on failed power up" }, - "CVE-2023-0458": { - "cmt_msg": "prlimit: do_prlimit needs to have a speculation check" + "CVE-2024-26711": { + "cmt_msg": "iio: adc: ad4130: zero-initialize clock init data" }, - "CVE-2018-1000204": { - "cmt_msg": "scsi: sg: allocate with __GFP_ZERO in sg_build_indirect()" + "CVE-2024-26712": { + "cmt_msg": "powerpc/kasan: Fix addr error caused by page alignment" }, - "CVE-2017-8924": { - "cmt_msg": "USB: serial: io_ti: fix information leak in completion handler" + "CVE-2024-26713": { + "cmt_msg": "powerpc/pseries/iommu: Fix iommu initialisation during DLPAR add" + } + } + }, + "6.1": { + "6.1": { + "CVE-2022-42329": { + "cmt_msg": "xen/netback: don't call kfree_skb() with interrupts disabled", + "cmt_id": "74e7e1efdad45580cc3839f2a155174cf158f9b5" }, - "CVE-2017-8925": { - "cmt_msg": "USB: serial: omninet: fix reference leaks at open" + "CVE-2022-42328": { + "cmt_msg": "xen/netback: don't call kfree_skb() with interrupts disabled", + "cmt_id": "74e7e1efdad45580cc3839f2a155174cf158f9b5" }, - "CVE-2019-12379": { - "cmt_msg": "consolemap: Fix a memory leaking bug in drivers/tty/vt/consolemap.c" + "CVE-2022-45934": { + "cmt_msg": "Bluetooth: L2CAP: Fix u8 overflow", + "cmt_id": "bcd70260ef56e0aee8a4fc6cd214a419900b0765" }, - "CVE-2017-12134": { - "cmt_msg": "xen: fix bio vec merging" + "CVE-2022-3643": { + "cmt_msg": "xen/netback: Ensure protocol headers don't fall in the non-linear area", + "cmt_id": "ad7f402ae4f466647c3a669b8a6f3e5d4271c84a" }, - "CVE-2023-0597": { - "cmt_msg": "x86/mm: Randomize per-cpu entry area" + "CVE-2022-4378": { + "cmt_msg": "proc: proc_skip_spaces() shouldn't think it is working on C strings", + "cmt_id": "bce9332220bd677d83b19d21502776ad555a0e73" }, - "CVE-2021-30002": { - "cmt_msg": "media: v4l: ioctl: Fix memory leak in video_usercopy" + "CVE-2023-28327": { + "cmt_msg": "af_unix: Get user_ns from in_skb in unix_diag_get_exact().", + "cmt_id": "b3abe42e94900bdd045c472f9c9be620ba5ce553" }, - "CVE-2017-17450": { - "cmt_msg": "netfilter: xt_osf: Add missing permission checks" + "CVE-2023-2166": { + "cmt_msg": "can: af_can: fix NULL pointer dereference in can_rcv_filter", + "cmt_id": "0acc442309a0a1b01bcdaa135e56e6398a49439c" + } + }, + "6.1.2": { + "CVE-2023-3357": { + "cmt_msg": "HID: amd_sfh: Add missing check for dma_alloc_coherent", + "cmt_id": "8a37cf11dc78b71a5e0ef18aa33af41415b5ca38" }, - "CVE-2015-4177": { - "cmt_msg": "mnt: Fail collect_mounts when applied to unmounted mounts" + "CVE-2022-3531": { + "cmt_msg": "selftest/bpf: Fix memory leak in kprobe_multi_test", + "cmt_id": "661e952bc9ef798d1d33ba67f2950a3e0bea455f" }, - "CVE-2017-7294": { - "cmt_msg": "drm/vmwgfx: fix integer overflow in vmw_surface_define_ioctl()" + "CVE-2022-3532": { + "cmt_msg": "selftests/bpf: Fix memory leak caused by not destroying skeleton", + "cmt_id": "d7dc8fad67fab906530c50155b12cf6117e99299" }, - "CVE-2015-8553": { - "cmt_msg": "xen/pciback: Don't allow MSI-X ops if PCI_COMMAND_MEMORY is not set." + "CVE-2022-3534": { + "cmt_msg": "libbpf: Fix use-after-free in btf_dump_name_dups", + "cmt_id": "fbe08093fb2334549859829ef81d42570812597d" }, - "CVE-2015-8552": { - "cmt_msg": "xen/pciback: Return error on XEN_PCI_OP_enable_msi when device has MSI or MSI-X enabled" + "CVE-2023-22997": { + "cmt_msg": "module: Fix NULL vs IS_ERR checking for module_get_next_page", + "cmt_id": "7a779e84b3c451ce4713456a413d3300143747a7" }, - "CVE-2020-15802": { - "cmt_msg": "" + "CVE-2022-3424": { + "cmt_msg": "misc: sgi-gru: fix use-after-free error in gru_set_context_option, gru_fault and gru_handle_user_call_os", + "cmt_id": "4e947fc71bec7c7da791f8562d5da233b235ba5e" }, - "CVE-2022-3522": { - "cmt_msg": "mm/hugetlb: use hugetlb_pte_stable in migration race check" + "CVE-2023-28328": { + "cmt_msg": "media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer()", + "cmt_id": "6b60cf73a931af34b7a0a3f467a79d9fe0df2d70" }, - "CVE-2024-26594": { - "cmt_msg": "ksmbd: validate mech token in session setup" + "CVE-2023-26606": { + "cmt_msg": "fs/ntfs3: Fix slab-out-of-bounds read in ntfs_trim_fs", + "cmt_id": "f2e58e95273ce072ca95a2afa1f274825a1e1772" + } + }, + "6.1.3": { + "CVE-2022-4379": { + "cmt_msg": "NFSD: fix use-after-free in __nfs42_ssc_open()", + "cmt_id": "650b69b17cfd79f51476d93c2c63bfb73280a77a" }, - "CVE-2022-3629": { - "cmt_msg": "vsock: Fix memory leak in vsock_connect()" + "CVE-2022-48423": { + "cmt_msg": "fs/ntfs3: Validate resident attribute name", + "cmt_id": "2f041a19f4eb72bcc851f9e3a15f3cfd1ae1addf" }, - "CVE-2017-18270": { - "cmt_msg": "KEYS: prevent creating a different user's keyrings" + "CVE-2022-48424": { + "cmt_msg": "fs/ntfs3: Validate attribute name offset", + "cmt_id": "b343c40bb7ff9095430c3f31468a59f8a760dabd" }, - "CVE-2022-3636": { - "cmt_msg": "net: ethernet: mtk_eth_soc: use after free in __mtk_ppe_check_skb()" + "CVE-2023-26544": { + "cmt_msg": "fs/ntfs3: Fix slab-out-of-bounds read in run_unpack", + "cmt_id": "d34485d40b6a263d65bc476554299c42b2ec0187" + } + }, + "6.1.4": { + "CVE-2022-36280": { + "cmt_msg": "drm/vmwgfx: Validate the box size for the snooped cursor", + "cmt_id": "622d527decaac0eb65512acada935a0fdc1d0202" }, - "CVE-2022-3635": { - "cmt_msg": "atm: idt77252: fix use-after-free bugs caused by tst_timer" + "CVE-2022-41218": { + "cmt_msg": "media: dvb-core: Fix UAF due to refcount races at releasing", + "cmt_id": "530ca64b44625f7d39eb1d5efb6f9ff21da991e2" }, - "CVE-2022-0002": { - "cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE" + "CVE-2021-33631": { + "cmt_msg": "ext4: fix kernel BUG in 'ext4_write_inline_data_end()'", + "cmt_id": "74ba281971618a76d5067cad7d8b14d549da5e9a" + } + }, + "6.1.5": { + "CVE-2023-23455": { + "cmt_msg": "net: sched: atm: dont intepret cls results when asked to drop", + "cmt_id": "85655c63877aeafdc23226510ea268a9fa0af807" }, - "CVE-2023-5178": { - "cmt_msg": "nvmet-tcp: Fix a possible UAF in queue intialization setup" + "CVE-2023-23454": { + "cmt_msg": "net: sched: cbq: dont intepret cls results when asked to drop", + "cmt_id": "dc46e39b727fddc5aacc0272ef83ee872d51be16" }, - "CVE-2015-4178": { - "cmt_msg": "fs_pin: Allow for the possibility that m_list or s_list go unused." + "CVE-2023-0045": { + "cmt_msg": "x86/bugs: Flush IBP in ib_prctl_set()", + "cmt_id": "e8377f0456fb6738a4668d4df16c13d7599925fd" }, - "CVE-2016-10906": { - "cmt_msg": "net: arc_emac: fix koops caused by sk_buff free" + "CVE-2023-0461": { + "cmt_msg": "net/ulp: prevent ULP without clone op from entering the LISTEN status", + "cmt_id": "7d242f4a0c8319821548c7176c09a6e0e71f223c" }, - "CVE-2016-10905": { - "cmt_msg": "GFS2: don't set rgrp gl_object until it's inserted into rgrp tree" + "CVE-2023-0210": { + "cmt_msg": "ksmbd: check nt_len to be at least CIFS_ENCPWD_SIZE in ksmbd_decode_ntlmssp_auth_blob", + "cmt_id": "5e7d97dbae25ab4cb0ac1b1b98aebc4915689a86" }, - "CVE-2022-3202": { - "cmt_msg": "jfs: prevent NULL deref in diFree" + "CVE-2022-3707": { + "cmt_msg": "drm/i915/gvt: fix double free bug in split_2MB_gtt_entry", + "cmt_id": "1022519da69d99d455c58ca181a6c499c562c70e" + } + }, + "6.1.6": { + "CVE-2023-0266": { + "cmt_msg": "ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF", + "cmt_id": "d6ad4bd1d896ae1daffd7628cd50f124280fb8b1" }, - "CVE-2018-3646": { - "cmt_msg": "x86/microcode: Allow late microcode loading with SMT disabled" + "CVE-2022-47929": { + "cmt_msg": "net: sched: disallow noqueue for qdisc classes", + "cmt_id": "e8988e878af693ac13b0fa80ba2e72d22d68f2dd" + } + }, + "6.1.7": { + "CVE-2022-38457": { + "cmt_msg": "drm/vmwgfx: Remove rcu locks from user resources", + "cmt_id": "7ac9578e45b20e3f3c0c8eb71f5417a499a7226a" }, - "CVE-2017-7518": { - "cmt_msg": "KVM: x86: fix singlestepping over syscall" + "CVE-2023-0179": { + "cmt_msg": "netfilter: nft_payload: incorrect arithmetics when fetching VLAN header bits", + "cmt_id": "76ef74d4a379faa451003621a84e3498044e7aa3" }, - "CVE-2021-39714": { - "cmt_msg": "staging: android: ion: Drop ion_map_kernel interface" + "CVE-2023-0394": { + "cmt_msg": "ipv6: raw: Deduct extension header length in rawv6_push_pending_frames", + "cmt_id": "0afa5f0736584411771299074bbeca8c1f9706d4" }, - "CVE-2024-24861": { - "cmt_msg": "" + "CVE-2022-40133": { + "cmt_msg": "drm/vmwgfx: Remove rcu locks from user resources", + "cmt_id": "7ac9578e45b20e3f3c0c8eb71f5417a499a7226a" + } + }, + "6.1.8": { + "CVE-2022-4382": { + "cmt_msg": "USB: gadgetfs: Fix race between mounting and unmounting", + "cmt_id": "616fd34d017000ecf9097368b13d8a266f4920b3" }, - "CVE-2019-19966": { - "cmt_msg": "media: cpia2: Fix use-after-free in cpia2_exit" + "CVE-2023-0458": { + "cmt_msg": "prlimit: do_prlimit needs to have a speculation check", + "cmt_id": "91185568c99d60534bacf38439846103962d1e2c" }, - "CVE-2019-11477": { - "cmt_msg": "tcp: limit payload size of sacked skbs" + "CVE-2023-21102": { + "cmt_msg": "efi: rt-wrapper: Add missing include", + "cmt_id": "72b0e5faa5149f09c6a7a74e4012f29e33509bab" }, - "CVE-2021-28711": { - "cmt_msg": "xen/blkfront: harden blkfront against event channel storms" + "CVE-2022-4842": { + "cmt_msg": "fs/ntfs3: Fix attr_punch_hole() null pointer derenference", + "cmt_id": "ff3b1a624380c14b81f4e51c48e404a45f047aab" + } + }, + "6.1.9": { + "CVE-2023-21106": { + "cmt_msg": "drm/msm/gpu: Fix potential double-free", + "cmt_id": "8103d53f25ec7b9aa99c134642c6e840e896be71" }, - "CVE-2017-7895": { - "cmt_msg": "nfsd: stricter decoding of write-like NFSv2/v3 ops" + "CVE-2023-3358": { + "cmt_msg": "HID: intel_ish-hid: Add check for ishtp_dma_tx_map", + "cmt_id": "9a65e90179ba06eb299badc3e4dc4aa2b1e35af3" }, - "CVE-2018-14614": { - "cmt_msg": "f2fs: fix to do sanity check with cp_pack_start_sum" + "CVE-2023-1652": { + "cmt_msg": "NFSD: fix use-after-free in nfsd4_ssc_setup_dul()", + "cmt_id": "32d5eb95f8f0e362e37c393310b13b9e95404560" }, - "CVE-2018-14617": { - "cmt_msg": "hfsplus: fix NULL dereference in hfsplus_lookup()" + "CVE-2023-0386": { + "cmt_msg": "ovl: fail on invalid uid/gid mapping at copy up", + "cmt_id": "42fea1c35254c49cce07c600d026cbc00c6d3c81" }, - "CVE-2018-14616": { - "cmt_msg": "f2fs: fix to do sanity check with block address in main area v2" + "CVE-2023-1074": { + "cmt_msg": "sctp: fail if no bound addresses can be used for a given scope", + "cmt_id": "9f08bb650078dca24a13fea1c375358ed6292df3" }, - "CVE-2018-14611": { - "cmt_msg": "btrfs: validate type when reading a chunk" + "CVE-2023-1073": { + "cmt_msg": "HID: check empty report_list in hid_validate_values()", + "cmt_id": "cdcdc0531a51659527fea4b4d064af343452062d" }, - "CVE-2018-14610": { - "cmt_msg": "btrfs: Check that each block group has corresponding chunk at mount time" + "CVE-2023-23559": { + "cmt_msg": "wifi: rndis_wlan: Prevent buffer overflow in rndis_query_oid", + "cmt_id": "7794efa358bca8b8a2a80070c6e088a74945f018" + } + }, + "6.1.11": { + "CVE-2023-3161": { + "cmt_msg": "fbcon: Check font dimension limits", + "cmt_id": "5e7f6e2ade57dfd6d133ff7c643abd2079248943" }, - "CVE-2018-14613": { - "cmt_msg": "btrfs: tree-checker: Verify block_group_item" + "CVE-2023-3359": { + "cmt_msg": "nvmem: brcm_nvram: Add check for kzalloc", + "cmt_id": "f5249bbae0e736d612d2095ad79dc1389b3e89b5" }, - "CVE-2018-14612": { - "cmt_msg": "btrfs: tree-checker: Detect invalid and empty essential trees" + "CVE-2023-2162": { + "cmt_msg": "scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress", + "cmt_id": "61e43ebfd243bcbad11be26bd921723027b77441" }, - "CVE-2020-26145": { - "cmt_msg": "ath10k: drop fragments with multicast DA for PCIe" + "CVE-2023-1075": { + "cmt_msg": "net/tls: tls_is_tx_ready() checked list_entry", + "cmt_id": "37c0cdf7e4919e5f76381ac60817b67bcbdacb50" }, - "CVE-2017-13216": { - "cmt_msg": "staging: android: ashmem: fix a race condition in ASHMEM_SET_SIZE ioctl" + "CVE-2023-3567": { + "cmt_msg": "vc_screen: move load of struct vc_data pointer in vcs_read() to avoid UAF", + "cmt_id": "8506f16aae9daf354e3732bcfd447e2a97f023df" }, - "CVE-2017-13215": { - "cmt_msg": "crypto: algif_skcipher - Load TX SG list after waiting" + "CVE-2023-32269": { + "cmt_msg": "netrom: Fix use-after-free caused by accept on already connected socket", + "cmt_id": "5c2227f3f17782d5262ee0979ad30609b3e01f6e" + } + }, + "6.1.12": { + "CVE-2023-1078": { + "cmt_msg": "rds: rds_rm_zerocopy_callback() use list_first_entry()", + "cmt_id": "1d52bbfd469af69fbcae88c67f160ce1b968e7f3" }, - "CVE-2018-5814": { - "cmt_msg": "usbip: usbip_host: fix NULL-ptr deref and use-after-free errors" + "CVE-2022-27672": { + "cmt_msg": "x86/speculation: Identify processors vulnerable to SMT RSB predictions", + "cmt_id": "cc95b5d240b631e42e2863e1dcb6ad83920cc449" + } + }, + "6.1.13": { + "CVE-2023-1513": { + "cmt_msg": "kvm: initialize all of the kvm_debugregs structure before sending it to userspace", + "cmt_id": "747ca7c8a0c7bce004709143d1cd6596b79b1deb" }, - "CVE-2020-26140": { - "cmt_msg": "" + "CVE-2023-1281": { + "cmt_msg": "net/sched: tcindex: update imperfect hash filters respecting rcu", + "cmt_id": "bd662ba56187b5ef8a62a3511371cd38299a507f" }, - "CVE-2020-26143": { - "cmt_msg": "" + "CVE-2023-26545": { + "cmt_msg": "net: mpls: fix stale pointer if allocation fails during device rename", + "cmt_id": "c376227845eef8f2e62e2c29c3cf2140d35dd8e8" }, - "CVE-2020-26142": { - "cmt_msg": "" + "CVE-2023-33952": { + "cmt_msg": "drm/vmwgfx: Do not drop the reference to the handle too soon", + "cmt_id": "0a127ac972404600c99eb141c8d5b5348e53ee4f" }, - "CVE-2019-17053": { - "cmt_msg": "ieee802154: enforce CAP_NET_RAW for raw sockets" + "CVE-2023-33951": { + "cmt_msg": "drm/vmwgfx: Do not drop the reference to the handle too soon", + "cmt_id": "0a127ac972404600c99eb141c8d5b5348e53ee4f" + } + }, + "6.1.14": { + "CVE-2023-0459": { + "cmt_msg": "uaccess: Add speculation barrier to copy_from_user()", + "cmt_id": "684db631a15779c8f3b2235d507efdfe6bb10278" }, - "CVE-2019-17052": { - "cmt_msg": "ax25: enforce CAP_NET_RAW for raw sockets" + "CVE-2022-2196": { + "cmt_msg": "KVM: VMX: Execute IBPB on emulated VM-exit when guest has IBRS", + "cmt_id": "63fada296062e91ad9f871970d4e7f19e21a6a15" + } + }, + "6.1.16": { + "CVE-2023-3355": { + "cmt_msg": "drm/msm/gem: Add check for kmalloc", + "cmt_id": "31c4251a20fd7addc1bf4fe801f95f9ba1b38990" }, - "CVE-2023-1077": { - "cmt_msg": "sched/rt: pick_next_rt_entity(): check list_entry" + "CVE-2023-1998": { + "cmt_msg": "x86/speculation: Allow enabling STIBP with legacy IBRS", + "cmt_id": "08d87c87d6461d16827c9b88d84c48c26b6c994a" }, - "CVE-2020-27418": { - "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region" + "CVE-2023-1032": { + "cmt_msg": "net: avoid double iput when sock_alloc_file fails", + "cmt_id": "7c7570791b15c3b78e3229ae97825e7eb869c7da" }, - "CVE-2019-17056": { - "cmt_msg": "nfc: enforce CAP_NET_RAW for raw sockets" + "CVE-2023-3220": { + "cmt_msg": "drm/msm/dpu: Add check for pstates", + "cmt_id": "dd49cef313e6a62541b55e739261c5943cb06c47" }, - "CVE-2019-17055": { - "cmt_msg": "mISDN: enforce CAP_NET_RAW for raw sockets" + "CVE-2023-2985": { + "cmt_msg": "fs: hfsplus: fix UAF issue in hfsplus_put_super", + "cmt_id": "0c80bef0b7d297ea86e5408fe79c45479e504a26" }, - "CVE-2019-17054": { - "cmt_msg": "appletalk: enforce CAP_NET_RAW for raw sockets" + "CVE-2023-1079": { + "cmt_msg": "HID: asus: use spinlock to safely schedule workers", + "cmt_id": "ee907829b36949c452c6f89485cb2a58e97c048e" }, - "CVE-2018-13093": { - "cmt_msg": "xfs: validate cached inodes are free when allocated" + "CVE-2023-25012": { + "cmt_msg": "HID: bigben: use spinlock to safely schedule workers", + "cmt_id": "f2bf592ebd5077661e00aa11e12e054c4c8f6dd0" }, - "CVE-2017-2618": { - "cmt_msg": "selinux: fix off-by-one in setprocattr" + "CVE-2023-1076": { + "cmt_msg": "tun: tun_chr_open(): correctly initialize socket uid", + "cmt_id": "b4ada752eaf1341f47bfa3d8ada377eca75a8d44" }, - "CVE-2023-51781": { - "cmt_msg": "appletalk: Fix Use-After-Free in atalk_ioctl" + "CVE-2023-1077": { + "cmt_msg": "sched/rt: pick_next_rt_entity(): check list_entry", + "cmt_id": "6b4fcc4e8a3016e85766c161daf0732fca16c3a3" }, - "CVE-2018-13096": { - "cmt_msg": "f2fs: fix to do sanity check with node footer and iblocks" + "CVE-2023-45863": { + "cmt_msg": "kobject: Fix slab-out-of-bounds in fill_kobj_path()", + "cmt_id": "fe4dd80d58ec5633daf5d50671d1341f738508bf" }, - "CVE-2018-13097": { - "cmt_msg": "f2fs: fix to do sanity check with user_block_count" + "CVE-2023-1118": { + "cmt_msg": "media: rc: Fix use-after-free bugs caused by ene_tx_irqsim()", + "cmt_id": "029c1410e345ce579db5c007276340d072aac54a" + } + }, + "6.1.18": { + "CVE-2023-7192": { + "cmt_msg": "netfilter: ctnetlink: fix possible refcount leak in ctnetlink_create_conntrack()", + "cmt_id": "4f25d1dff80535f088b8f8568dd731fb098e29b4" }, - "CVE-2018-13094": { - "cmt_msg": "xfs: don't call xfs_da_shrink_inode with NULL bp" + "CVE-2023-45862": { + "cmt_msg": "USB: ene_usb6250: Allocate enough memory for full object", + "cmt_id": "ff542083b105c9c72d83899d3f74eeec354f808e" }, - "CVE-2018-13095": { - "cmt_msg": "xfs: More robust inode extent count validation" + "CVE-2023-1829": { + "cmt_msg": "net/sched: Retire tcindex classifier", + "cmt_id": "3abebc503a5148072052c229c6b04b329a420ecd" + } + }, + "6.1.20": { + "CVE-2023-28466": { + "cmt_msg": "net: tls: fix possible race condition between do_tls_getsockopt_conf() and do_tls_setsockopt_conf()", + "cmt_id": "14c17c673e1bba08032d245d5fb025d1cbfee123" + } + }, + "6.1.21": { + "CVE-2023-30456": { + "cmt_msg": "KVM: nVMX: add missing consistency checks for CR0 and CR4", + "cmt_id": "4bba9c8adec804f03d12dc762e50d083ee88b6b0" }, - "CVE-2020-29661": { - "cmt_msg": "tty: Fix ->pgrp locking in tiocspgrp()" + "CVE-2023-2235": { + "cmt_msg": "perf: Fix check before add_event_to_groups() in perf_group_detach()", + "cmt_id": "529546ea2834ce58aa075837d57918740accf713" }, - "CVE-2020-29660": { - "cmt_msg": "tty: Fix ->session locking" + "CVE-2023-1855": { + "cmt_msg": "hwmon: (xgene) Fix use after free bug in xgene_hwmon_remove due to race condition", + "cmt_id": "b2ae1f15cd6fe0cb36e432a179ae7d479ae2e6e0" }, - "CVE-2018-13098": { - "cmt_msg": "f2fs: fix to do sanity check with extra_attr feature" + "CVE-2023-1990": { + "cmt_msg": "nfc: st-nci: Fix use after free bug in ndlc_remove due to race condition", + "cmt_id": "5e331022b448fbc5e76f24349cd0246844dcad25" + } + }, + "6.1.22": { + "CVE-2023-2483": { + "cmt_msg": "net: qcom/emac: Fix use after free bug in emac_remove due to race condition", + "cmt_id": "5fc2c4e311a9341a2b0e044ab5f33afa37b56226" }, - "CVE-2018-13099": { - "cmt_msg": "f2fs: fix to do sanity check with reserved blkaddr of inline inode" + "CVE-2023-30772": { + "cmt_msg": "power: supply: da9150: Fix use after free bug in da9150_charger_remove due to race condition", + "cmt_id": "47b2e1a67e6da172bb4cf69ef9dafde4458bde5f" }, - "CVE-2014-9717": { - "cmt_msg": "mnt: Update detach_mounts to leave mounts connected" + "CVE-2023-33203": { + "cmt_msg": "net: qcom/emac: Fix use after free bug in emac_remove due to race condition", + "cmt_id": "5fc2c4e311a9341a2b0e044ab5f33afa37b56226" }, - "CVE-2023-28772": { - "cmt_msg": "seq_buf: Fix overflow in seq_buf_putmem_hex()" + "CVE-2023-33288": { + "cmt_msg": "power: supply: bq24190: Fix use after free bug in bq24190_remove due to race condition", + "cmt_id": "84bdb3b76b07f2e62183913a1f5da2d4aa25580a" }, - "CVE-2019-14895": { - "cmt_msg": "mwifiex: fix possible heap overflow in mwifiex_process_country_ie()" + "CVE-2023-28866": { + "cmt_msg": "Bluetooth: HCI: Fix global-out-of-bounds", + "cmt_id": "b3168abd24245aa0775c5a387dcf94d36ca7e738" }, - "CVE-2022-24448": { - "cmt_msg": "NFSv4: Handle case where the lookup of a directory fails" + "CVE-2023-1670": { + "cmt_msg": "xirc2ps_cs: Fix use after free bug in xirc2ps_detach", + "cmt_id": "9d882229d365f68f74028252261ab14a8de7faed" }, - "CVE-2019-11884": { - "cmt_msg": "Bluetooth: hidp: fix buffer overflow" + "CVE-2022-4269": { + "cmt_msg": "act_mirred: use the backlog for nested calls to mirred ingress", + "cmt_id": "4c8fc3fe28e47e2a495444347375f7354c24b018" }, - "CVE-2015-8955": { - "cmt_msg": "arm64: perf: reject groups spanning multiple HW PMUs" + "CVE-2023-1989": { + "cmt_msg": "Bluetooth: btsdio: fix use after free bug in btsdio_remove due to unfinished work", + "cmt_id": "cbf8deacb7053ce3e3fed64b277c6c6989e65bba" }, - "CVE-2023-4134": { - "cmt_msg": "Input: cyttsp4_core - change del_timer_sync() to timer_shutdown_sync()" + "CVE-2023-2194": { + "cmt_msg": "i2c: xgene-slimpro: Fix out-of-bounds bug in xgene_slimpro_i2c_xfer()", + "cmt_id": "7c64e839585eac8048bf67b1c6dcb7a5ca189a2e" }, - "CVE-2019-19074": { - "cmt_msg": "ath9k: release allocated buffer if timed out" + "CVE-2023-1583": { + "cmt_msg": "io_uring/rsrc: fix null-ptr-deref in io_file_bitmap_get()", + "cmt_id": "7b100a45dc19ffd708f364ba66601efaca1ccf56" + } + }, + "6.1.23": { + "CVE-2023-1611": { + "cmt_msg": "btrfs: fix race between quota disable and quota assign ioctls", + "cmt_id": "a38ff2024805a30d9b96f52557c6ea0bbc31252a" + } + }, + "6.1.25": { + "CVE-2023-38409": { + "cmt_msg": "fbcon: set_con2fb_map needs to set con2fb_map!", + "cmt_id": "b15df140fe092c3ac28dab32c6b3acdda1a93c63" }, - "CVE-2019-19073": { - "cmt_msg": "ath9k_htc: release allocated buffer if timed out" + "CVE-2023-1859": { + "cmt_msg": "9p/xen : Fix use after free bug in xen_9pfs_front_remove due to race condition", + "cmt_id": "c4002b9d5e837f152a40d1333c56ccb84975147b" + } + }, + "6.1.26": { + "CVE-2023-2156": { + "cmt_msg": "net: rpl: fix rpl header size calculation", + "cmt_id": "9a0b96d03c59ba560b074cdb9b6233493fd5492d" }, - "CVE-2015-9016": { - "cmt_msg": "blk-mq: fix race between timeout and freeing request" + "CVE-2023-2163": { + "cmt_msg": "bpf: Fix incorrect verifier pruning due to missing register precision taints", + "cmt_id": "89603f4c9154e818b9ead1abe08545a053c66ded" }, - "CVE-2015-8952": { - "cmt_msg": "ext2: convert to mbcache2" + "CVE-2023-31436": { + "cmt_msg": "net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg", + "cmt_id": "ce729b06dc33b01f8a6ac84da5ef54154326bf7e" }, - "CVE-2020-26558": { - "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical" + "CVE-2023-2248": { + "cmt_msg": "net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg", + "cmt_id": "ce729b06dc33b01f8a6ac84da5ef54154326bf7e" + } + }, + "6.1.27": { + "CVE-2023-1380": { + "cmt_msg": "wifi: brcmfmac: slab-out-of-bounds read in brcmf_get_assoc_ies()", + "cmt_id": "e29661611e6e71027159a3140e818ef3b99f32dd" }, - "CVE-2022-23038": { - "cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()" + "CVE-2023-2002": { + "cmt_msg": "bluetooth: Perform careful capability checks in hci_sock_ioctl()", + "cmt_id": "47e6893a5b0ad14c0b1c25983a1facb1cf667b6e" + } + }, + "6.1.28": { + "CVE-2023-35829": { + "cmt_msg": "media: rkvdec: fix use after free bug in rkvdec_remove", + "cmt_id": "6a17add9c61030683b9c1fc86878f00a2d318a95" }, - "CVE-2017-1000410": { - "cmt_msg": "Bluetooth: Prevent stack info leak from the EFS element." + "CVE-2023-0160": { + "cmt_msg": "bpf, sockmap: fix deadlocks in the sockhash and sockmap", + "cmt_id": "1d4ac7b0ffc9dc683b8dafc78b8b93177071a02c" }, - "CVE-2016-8645": { - "cmt_msg": "tcp: take care of truncations done by sk_filter()" + "CVE-2023-35828": { + "cmt_msg": "usb: gadget: udc: renesas_usb3: Fix use after free bug in renesas_usb3_remove due to race condition", + "cmt_id": "df2380520926bdbc264cffab0f45da9a21f304c8" }, - "CVE-2022-20158": { - "cmt_msg": "net/packet: fix slab-out-of-bounds access in packet_recvmsg()" + "CVE-2023-32233": { + "cmt_msg": "netfilter: nf_tables: deactivate anonymous set from preparation phase", + "cmt_id": "4507918cd1f8b80f21a396fa0531d53e372bed66" }, - "CVE-2022-23037": { - "cmt_msg": "xen/netfront: don't use gnttab_query_foreign_access() for mapped status" + "CVE-2023-32254": { + "cmt_msg": "ksmbd: fix racy issue under cocurrent smb2 tree disconnect", + "cmt_id": "bd80d35725a0cf4df9307bfe2f1a3b2cb983d8e6" }, - "CVE-2017-5669": { - "cmt_msg": "ipc/shm: Fix shmat mmap nil-page protection" + "CVE-2023-35824": { + "cmt_msg": "media: dm1105: Fix use after free bug in dm1105_remove due to race condition", + "cmt_id": "305262a23c949010a056bd81b6e84051fd72a567" }, - "CVE-2019-15927": { - "cmt_msg": "ALSA: usb-audio: Avoid access before bLength check in build_audio_procunit()" + "CVE-2023-3268": { + "cmt_msg": "relayfs: fix out-of-bounds access in relay_file_read", + "cmt_id": "f6ee841ff2169d7a7d045340ee72b2b9de9f06c5" }, - "CVE-2019-15926": { - "cmt_msg": "ath6kl: add some bounds checking" + "CVE-2023-52474": { + "cmt_msg": "IB/hfi1: Fix bugs with non-PAGE_SIZE-end multi-iovec user SDMA requests", + "cmt_id": "dce59b5443700fbd0d2433ec6e4d4cf063448844" }, - "CVE-2019-14821": { - "cmt_msg": "KVM: coalesced_mmio: add bounds checking" + "CVE-2023-2269": { + "cmt_msg": "dm ioctl: fix nested locking in table_clear() to remove deadlock concern", + "cmt_id": "9a94ebc74c3540aba5aa2c7b05032da4610a08c9" }, - "CVE-2020-12826": { - "cmt_msg": "signal: Extend exec_id to 64bits" + "CVE-2023-32248": { + "cmt_msg": "ksmbd: fix NULL pointer dereference in smb2_get_info_filesystem()", + "cmt_id": "a70751dd7b60eab025e97e19b6b2477c6eaf2bbb" }, - "CVE-2019-3701": { - "cmt_msg": "can: gw: ensure DLC boundaries after CAN frame modification" + "CVE-2023-35826": { + "cmt_msg": "media: cedrus: fix use after free bug in cedrus_remove due to race condition", + "cmt_id": "2cdc8f729d953143b3bbdc56841bb6800752de7f" }, - "CVE-2021-42008": { - "cmt_msg": "net: 6pack: fix slab-out-of-bounds in decode_data" + "CVE-2023-35823": { + "cmt_msg": "media: saa7134: fix use after free bug in saa7134_finidev due to race condition", + "cmt_id": "5a72aea9acfe945353fb3a2f141f4e526a5f3684" + } + }, + "6.1.29": { + "CVE-2023-32258": { + "cmt_msg": "ksmbd: fix racy issue from smb2 close and logoff with multichannel", + "cmt_id": "4aba9ab6a007e41182454f84f95c0bddf7d6d7e1" }, - "CVE-2022-44033": { - "cmt_msg": "char: pcmcia: remove all the drivers" + "CVE-2023-32257": { + "cmt_msg": "ksmbd: fix racy issue from session setup and logoff", + "cmt_id": "f623f627ad2b1dc215ab3b0df53fb05cfd3a1c3b" }, - "CVE-2022-39188": { - "cmt_msg": "mmu_gather: Force tlb-flush VM_PFNMAP vmas" + "CVE-2024-0775": { + "cmt_msg": "ext4: improve error recovery code paths in __ext4_remount()", + "cmt_id": "25c9fca7b71c5045d6dc537430af5b2e79598fa1" }, - "CVE-2018-9465": { - "cmt_msg": "binder: fix proc->files use-after-free" + "CVE-2023-32252": { + "cmt_msg": "ksmbd: fix racy issue from session setup and logoff", + "cmt_id": "f623f627ad2b1dc215ab3b0df53fb05cfd3a1c3b" }, - "CVE-2019-1125": { - "cmt_msg": "x86/speculation: Prepare entry code for Spectre v1 swapgs mitigations" + "CVE-2023-32250": { + "cmt_msg": "ksmbd: fix racy issue from session setup and logoff", + "cmt_id": "f623f627ad2b1dc215ab3b0df53fb05cfd3a1c3b" }, - "CVE-2019-15218": { - "cmt_msg": "media: usb: siano: Fix general protection fault in smsusb" + "CVE-2023-32247": { + "cmt_msg": "ksmbd: destroy expired sessions", + "cmt_id": "1fc8a2b14ef5223f8e0b95faba2ee0a6e4d0f99d" }, - "CVE-2019-15666": { - "cmt_msg": "xfrm: policy: Fix out-of-bound array accesses in __xfrm_policy_unlink" + "CVE-2023-34256": { + "cmt_msg": "ext4: avoid a potential slab-out-of-bounds in ext4_group_desc_csum", + "cmt_id": "1fffe4750500148f3e744ed77cf233db8342603f" + } + }, + "6.1.30": { + "CVE-2023-3090": { + "cmt_msg": "ipvlan:Fix out-of-bounds caused by unclear skb->cb", + "cmt_id": "610a433810b277b3b77389733c07d22e8af68de2" }, - "CVE-2005-3660": { - "cmt_msg": "" + "CVE-2023-38429": { + "cmt_msg": "ksmbd: allocate one more byte for implied bcc[0]", + "cmt_id": "af7335a4b946f9f6f9d98398cbcea15cd9850409" }, - "CVE-2017-14106": { - "cmt_msg": "tcp: initialize rcv_mss to TCP_MIN_MSS instead of 0" + "CVE-2023-38428": { + "cmt_msg": "ksmbd: fix wrong UserName check in session_user", + "cmt_id": "40d90ee0275a1bfcd26fa7690adc4330b4227a69" }, - "CVE-2019-15212": { - "cmt_msg": "USB: rio500: refuse more than one device at a time" + "CVE-2023-3141": { + "cmt_msg": "memstick: r592: Fix UAF bug in r592_remove due to race condition", + "cmt_id": "9a342d4eb9fb8e52f7d1afe088a79513f3f9a9a5" }, - "CVE-2019-15211": { - "cmt_msg": "media: radio-raremono: change devm_k*alloc to k*alloc" + "CVE-2023-38426": { + "cmt_msg": "ksmbd: fix global-out-of-bounds in smb2_find_context_vals", + "cmt_id": "75378b03a90d75b1349bb03577ac8465194c883e" + } + }, + "6.1.31": { + "CVE-2023-21255": { + "cmt_msg": "binder: fix UAF caused by faulty buffer cleanup", + "cmt_id": "e1e198eff1fbaf56fd8022c4fbbf59c5324ea320" + } + }, + "6.1.33": { + "CVE-2022-45887": { + "cmt_msg": "media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb()", + "cmt_id": "ea2938c27b0212aaab6702c16b7385e073b35643" }, - "CVE-2023-31084": { - "cmt_msg": "media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*()" + "CVE-2022-45886": { + "cmt_msg": "media: dvb-core: Fix use-after-free due on race condition at dvb_net", + "cmt_id": "93b5dfebcb1821dde466e29404fcf1fb919f4c72" }, - "CVE-2015-1350": { - "cmt_msg": "fs: Avoid premature clearing of capabilities" + "CVE-2023-35788": { + "cmt_msg": "net/sched: flower: fix possible OOB write in fl_set_geneve_opt()", + "cmt_id": "eac615ed3c6d91f1196f16f0a0599fff479cb220" }, - "CVE-2019-14896": { - "cmt_msg": "libertas: Fix two buffer overflows at parsing bss descriptor" + "CVE-2022-45919": { + "cmt_msg": "media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221", + "cmt_id": "d5d61f747e3f1ff9042db66896f2f90afa5f3197" }, - "CVE-2017-1000380": { - "cmt_msg": "ALSA: timer: Fix race between read and ioctl" + "CVE-2023-2124": { + "cmt_msg": "xfs: verify buffer contents when we skip log replay", + "cmt_id": "a2961463d74f5c86a8dda3b41c484c28ccc4c289" }, - "CVE-2019-15214": { - "cmt_msg": "ALSA: core: Fix card races between register and disconnect" + "CVE-2023-1192": { + "cmt_msg": "fs/ntfs3: Validate MFT flags before replaying logs", + "cmt_id": "a8eaa9a06addbd9cb0238cb1c729921ecbb6504c" }, - "CVE-2020-24588": { - "cmt_msg": "cfg80211: mitigate A-MSDU aggregation attacks" + "CVE-2023-3212": { + "cmt_msg": "gfs2: Don't deref jdesc in evict", + "cmt_id": "5ae4a618a1558d2b536fdd5d42e53d3e2d73870c" }, - "CVE-2021-33034": { - "cmt_msg": "Bluetooth: verify AMP hci_chan before amp_destroy" + "CVE-2023-34255": { + "cmt_msg": "xfs: verify buffer contents when we skip log replay", + "cmt_id": "a2961463d74f5c86a8dda3b41c484c28ccc4c289" }, - "CVE-2019-19922": { - "cmt_msg": "sched/fair: Fix low cpu usage with high throttling by removing expiration of cpu-local slices" + "CVE-2022-48425": { + "cmt_msg": "fs/ntfs3: Validate MFT flags before replaying logs", + "cmt_id": "a8eaa9a06addbd9cb0238cb1c729921ecbb6504c" + } + }, + "6.1.34": { + "CVE-2023-38431": { + "cmt_msg": "ksmbd: check the validation of pdu_size in ksmbd_conn_handler_loop", + "cmt_id": "543c12c2644e772caa6880662c2a852cfdc5a10c" }, - "CVE-2015-8104": { - "cmt_msg": "KVM: svm: unconditionally intercept #DB" + "CVE-2023-1194": { + "cmt_msg": "ksmbd: fix out-of-bound read in parse_lease_state()", + "cmt_id": "8f2984233c87a1d08f4c45f077130590c7a2c991" }, - "CVE-2019-19927": { - "cmt_msg": "drm/ttm: fix incrementing the page pointer for huge pages" + "CVE-2023-38427": { + "cmt_msg": "ksmbd: fix out-of-bound read in deassemble_neg_contexts()", + "cmt_id": "bf12d7fb63b365fb766655cedcb5d5f292b0c35e" + } + }, + "6.1.35": { + "CVE-2023-3609": { + "cmt_msg": "net/sched: cls_u32: Fix reference counter leak leading to overflow", + "cmt_id": "07f9cc229b44cbcee6385802d390091d915f38c3" }, - "CVE-2017-18509": { - "cmt_msg": "ipv6: check sk sk_type and protocol early in ip_mroute_set/getsockopt" + "CVE-2023-38430": { + "cmt_msg": "ksmbd: validate smb request protocol id", + "cmt_id": "e01fc7caac9ce9ad76df9f42f7f61ef4bf1d27c9" }, - "CVE-2017-5986": { - "cmt_msg": "sctp: avoid BUG_ON on sctp_wait_for_sndbuf" + "CVE-2023-3117": { + "cmt_msg": "netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE", + "cmt_id": "4aaa3b730d16c13cc3feaa127bfca1af201d969d" }, - "CVE-2020-8648": { - "cmt_msg": "vt: selection, close sel_buffer race" + "CVE-2023-3390": { + "cmt_msg": "netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE", + "cmt_id": "4aaa3b730d16c13cc3feaa127bfca1af201d969d" + } + }, + "6.1.36": { + "CVE-2023-3865": { + "cmt_msg": "ksmbd: fix out-of-bound read in smb2_write", + "cmt_id": "c86211159bc3178b891e0d60e586a32c7b6a231b" }, - "CVE-2022-32296": { - "cmt_msg": "tcp: increase source port perturb table to 2^16" + "CVE-2023-3610": { + "cmt_msg": "netfilter: nf_tables: fix chain binding transaction logic", + "cmt_id": "891cd2edddc76c58e842706ad27e2ff96000bd5d" }, - "CVE-2017-11600": { - "cmt_msg": "xfrm: policy: check policy direction value" + "CVE-2023-38432": { + "cmt_msg": "ksmbd: validate command payload size", + "cmt_id": "9650cf70ec9d94ff34daa088b643229231723c26" }, - "CVE-2023-3567": { - "cmt_msg": "vc_screen: move load of struct vc_data pointer in vcs_read() to avoid UAF" + "CVE-2023-3866": { + "cmt_msg": "ksmbd: validate session id and tree id in the compound request", + "cmt_id": "854156d12caa9d36de1cf5f084591c7686cc8a9d" + } + }, + "6.1.37": { + "CVE-2023-3269": { + "cmt_msg": "mm: introduce new 'lock_mm_and_find_vma()' page fault helper", + "cmt_id": "d6a5c7a1a6e52d4c46fe181237ca96cd46a42386" + } + }, + "6.1.39": { + "CVE-2023-31248": { + "cmt_msg": "netfilter: nf_tables: do not ignore genmask when looking up chain by id", + "cmt_id": "fc95c8b02c6160936f1f3d8d9d7f4f66f3c84b49" }, - "CVE-2019-20806": { - "cmt_msg": "media: tw5864: Fix possible NULL pointer dereference in tw5864_handle_frame" + "CVE-2024-0639": { + "cmt_msg": "sctp: fix potential deadlock on &net->sctp.addr_wq_lock", + "cmt_id": "1aa5a6a6d28c77e364feaba35ff7f12d2d74fec1" }, - "CVE-2023-3108": { - "cmt_msg": "crypto: fix af_alg_make_sg() conversion to iov_iter" + "CVE-2023-2898": { + "cmt_msg": "f2fs: fix to avoid NULL pointer dereference f2fs_write_end_io()", + "cmt_id": "ebe83e9bb8a6b3db28603fe938ee80ccaa01ed53" }, - "CVE-2022-3028": { - "cmt_msg": "af_key: Do not call xfrm_probe_algs in parallel" + "CVE-2023-4132": { + "cmt_msg": "media: usb: siano: Fix warning due to null work_func_t function pointer", + "cmt_id": "8abb53c5167cfb5bb275512a3da4ec2468478626" }, - "CVE-2019-2181": { - "cmt_msg": "binder: check for overflow when alloc for security context" + "CVE-2023-35001": { + "cmt_msg": "netfilter: nf_tables: prevent OOB access in nft_byteorder_eval", + "cmt_id": "40f83dd66a823400d8592e3b71e190e3ad978eb5" }, - "CVE-2020-14304": { - "cmt_msg": "" + "CVE-2023-39197": { + "cmt_msg": "netfilter: conntrack: dccp: copy entire header to stack buffer, not just basic one", + "cmt_id": "5c618daa5038712c4a4ef8923905a2ea1b8836a1" }, - "CVE-2018-17972": { - "cmt_msg": "proc: restrict kernel stack dumps to root" + "CVE-2023-3863": { + "cmt_msg": "net: nfc: Fix use-after-free caused by nfc_llcp_find_local", + "cmt_id": "425d9d3a92df7d96b3cfb7ee5c240293a21cbde3" + } + }, + "6.1.40": { + "CVE-2023-51043": { + "cmt_msg": "drm/atomic: Fix potential use-after-free in nonblocking commits", + "cmt_id": "e4a0e09b79bd2c0895c508cdc5e0265a083cc05d" }, - "CVE-2020-15393": { - "cmt_msg": "usb: usbtest: fix missing kfree(dev->buf) in usbtest_disconnect" + "CVE-2023-44466": { + "cmt_msg": "libceph: harden msgr2.1 frame segment length checks", + "cmt_id": "183c0ae4fafcdcb95c06f40c0c35a39d89c1aa2d" }, - "CVE-2022-33981": { - "cmt_msg": "floppy: disable FDRAWCMD by default" + "CVE-2023-3611": { + "cmt_msg": "net/sched: sch_qfq: account for stab overhead in qfq_enqueue", + "cmt_id": "70feebdbfad85772ab3ef152812729cab5c6c426" }, - "CVE-2021-3564": { - "cmt_msg": "Bluetooth: fix the erroneous flush_work() order" + "CVE-2022-48502": { + "cmt_msg": "fs/ntfs3: Check fields while reading", + "cmt_id": "000a9a72efa4a9df289bab9c9e8ba1639c72e0d6" }, - "CVE-2019-9506": { - "cmt_msg": "Bluetooth: Fix faulty expression for minimum encryption key size check" + "CVE-2023-3867": { + "cmt_msg": "ksmbd: add missing compound request handing in some commands", + "cmt_id": "869ef4f2965bbb91157dad220133f76c16faba9b" }, - "CVE-2023-1476": { - "cmt_msg": "" + "CVE-2023-3776": { + "cmt_msg": "net/sched: cls_fw: Fix improper refcount update leads to use-after-free", + "cmt_id": "c91fb29bb07ee4dd40aabd1e41f19c0f92ac3199" + } + }, + "6.1.41": { + "CVE-2023-20593": { + "cmt_msg": "x86/cpu/amd: Add a Zenbleed fix", + "cmt_id": "ed9b87010aa84c157096f98c322491e9af8e8f07" + } + }, + "6.1.42": { + "CVE-2023-3777": { + "cmt_msg": "netfilter: nf_tables: skip bound chain on rule flush", + "cmt_id": "e18922ce3e3169eb97838d1dcba2d679bcca446c" }, - "CVE-2021-22555": { - "cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write" + "CVE-2023-4004": { + "cmt_msg": "netfilter: nft_set_pipapo: fix improper element removal", + "cmt_id": "90c3955beb858bb52a9e5c4380ed0e520e3730d1" + } + }, + "6.1.43": { + "CVE-2023-4015": { + "cmt_msg": "netfilter: nf_tables: skip immediate deactivate in _PREPARE_ERROR", + "cmt_id": "4237462a073e24f71c700f3e5929f07b6ee1bcaa" }, - "CVE-2017-16995": { - "cmt_msg": "bpf: fix incorrect sign extension in check_alu_op()" + "CVE-2023-4147": { + "cmt_msg": "netfilter: nf_tables: disallow rule addition to bound chain via NFTA_RULE_CHAIN_ID", + "cmt_id": "268cb07ef3ee17b5454a7c4b23376802c5b00c79" }, - "CVE-2019-18675": { - "cmt_msg": "mmap: introduce sane default mmap limits" + "CVE-2023-1206": { + "cmt_msg": "tcp: Reduce chance of collisions in inet6_hashfn().", + "cmt_id": "51aea7e9d5212adb8a3d198510cfcde4125988f9" + } + }, + "6.1.44": { + "CVE-2022-40982": { + "cmt_msg": "x86/speculation: Add Gather Data Sampling mitigation", + "cmt_id": "c66ebe070d9641c9339e42e1c2d707a5052e9904" }, - "CVE-2019-2025": { - "cmt_msg": "binder: fix race that allows malicious free of live buffer" + "CVE-2023-34319": { + "cmt_msg": "xen/netback: Fix buffer overrun triggered by unusual packet", + "cmt_id": "fa5b932b77c815d0e416612859d5899424bb4212" }, - "CVE-2017-2583": { - "cmt_msg": "KVM: x86: fix emulation of \"MOV SS, null selector\"" + "CVE-2023-20569": { + "cmt_msg": "x86/bugs: Increase the x86 bugs vector size to two u32s", + "cmt_id": "dfede4cb8ef732039b7a479d260bd89d3b474f14" + } + }, + "6.1.45": { + "CVE-2023-20588": { + "cmt_msg": "x86/CPU/AMD: Do not leak quotient data after a division by 0", + "cmt_id": "f2615bb47be4f53be92c81a6a8aa286c92ef04d9" }, - "CVE-2020-26560": { - "cmt_msg": "" + "CVE-2023-4128": { + "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free", + "cmt_id": "aab2d095ce4dd8d01ca484c0cc641fb497bf74db" }, - "CVE-2017-2584": { - "cmt_msg": "KVM: x86: Introduce segmented_write_std" + "CVE-2023-4208": { + "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free", + "cmt_id": "aab2d095ce4dd8d01ca484c0cc641fb497bf74db" }, - "CVE-2023-39198": { - "cmt_msg": "drm/qxl: fix UAF on handle creation" + "CVE-2023-4206": { + "cmt_msg": "net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free", + "cmt_id": "d4d3b53a4c66004e8e864fea744b3a2b86a73b62" }, - "CVE-2017-13080": { - "cmt_msg": "mac80211: accept key reinstall without changing anything" + "CVE-2023-4207": { + "cmt_msg": "net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free", + "cmt_id": "7f691439b29be0aae68f83ad5eecfddc11007724" }, - "CVE-2021-20321": { - "cmt_msg": "ovl: fix missing negative dentry check in ovl_rename()" + "CVE-2023-4273": { + "cmt_msg": "exfat: check if filename entries exceeds max filename length", + "cmt_id": "c2fdf827f8fc6a571e1b7cc38a61041f0321adf5" }, - "CVE-2018-12127": { - "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" + "CVE-2023-40283": { + "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb", + "cmt_id": "29fac18499332211b2615ade356e2bd8b3269f98" + } + }, + "6.1.46": { + "CVE-2023-4155": { + "cmt_msg": "KVM: SEV: only access GHCB fields once", + "cmt_id": "5bdf1c1f346c81996b6e36b5efd5c92aeda4fbe4" + } + }, + "6.1.47": { + "CVE-2023-4569": { + "cmt_msg": "netfilter: nf_tables: deactivate catchall elements in next generation", + "cmt_id": "00ea7eb1c69eec91cdf9259f0e427c56e7999fcd" }, - "CVE-2018-12126": { - "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" + "CVE-2023-51042": { + "cmt_msg": "drm/amdgpu: Fix potential fence use-after-free v2", + "cmt_id": "dd0b3b367c3839e439f36af908b39c98929a5e54" }, - "CVE-2017-9077": { - "cmt_msg": "ipv6/dccp: do not inherit ipv6_mc_list from parent" + "CVE-2024-23196": { + "cmt_msg": "ALSA: hda: fix a possible null-pointer dereference due to data race in snd_hdac_regmap_sync()", + "cmt_id": "cdd412b528dee6e0851c4735d6676ec138da13a4" }, - "CVE-2017-9076": { - "cmt_msg": "ipv6/dccp: do not inherit ipv6_mc_list from parent" + "CVE-2023-6546": { + "cmt_msg": "tty: n_gsm: fix the UAF caused by race condition in gsm_cleanup_mux", + "cmt_id": "31311a9a4baae0ad47c85e448af21b2120344ff0" }, - "CVE-2017-9075": { - "cmt_msg": "sctp: do not inherit ipv6_{mc|ac|fl}_list from parent" + "CVE-2023-39198": { + "cmt_msg": "drm/qxl: fix UAF on handle creation", + "cmt_id": "a1fa8f0fc58e0ec972f718030710efc442d7304b" }, - "CVE-2017-9074": { - "cmt_msg": "ipv6: Prevent overrun when parsing v6 header options" + "CVE-2023-39194": { + "cmt_msg": "net: xfrm: Fix xfrm_address_filter OOB read", + "cmt_id": "9a0056276f5f38e188732bd7b6949edca6a80ea1" }, - "CVE-2022-2978": { - "cmt_msg": "fs: fix UAF/GPF bug in nilfs_mdt_destroy" + "CVE-2023-3773": { + "cmt_msg": "xfrm: add forgotten nla_policy for XFRMA_MTIMER_THRESH", + "cmt_id": "a442cd17019385c53bbddf3bb92d91474081916b" }, - "CVE-2022-20572": { - "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag" + "CVE-2023-3772": { + "cmt_msg": "xfrm: add NULL check in xfrm_update_ae_params", + "cmt_id": "87b655f4936b6fc01f3658aa88a22c923b379ebd" + } + }, + "6.1.50": { + "CVE-2022-36402": { + "cmt_msg": "drm/vmwgfx: Fix shader stage validation", + "cmt_id": "115f2ccd3a998fe7247f59f8fb5feffc878bcbb7" }, - "CVE-2018-10021": { - "cmt_msg": "scsi: libsas: defer ata device eh commands to libata" + "CVE-2023-2430": { + "cmt_msg": "io_uring/msg_ring: fix missing lock on overflow for IOPOLL", + "cmt_id": "22a406b3629a10979916ea7cace47858410117b5" + } + }, + "6.1.52": { + "CVE-2023-52440": { + "cmt_msg": "ksmbd: fix slub overflow in ksmbd_decode_ntlmssp_auth_blob()", + "cmt_id": "30fd6521b2fbd9b767e438e31945e5ea3e3a2fba" + } + }, + "6.1.53": { + "CVE-2023-4623": { + "cmt_msg": "net/sched: sch_hfsc: Ensure inner classes have fsc curve", + "cmt_id": "a1e820fc7808e42b990d224f40e9b4895503ac40" }, - "CVE-2022-20132": { - "cmt_msg": "HID: add hid_is_usb() function to make it simpler for USB detection" + "CVE-2023-52442": { + "cmt_msg": "ksmbd: validate session id and tree id in compound request", + "cmt_id": "becb5191d1d5fdfca0198a2e37457bbbf4fe266f" }, - "CVE-2020-0067": { - "cmt_msg": "f2fs: fix to avoid memory leakage in f2fs_listxattr" + "CVE-2023-25775": { + "cmt_msg": "RDMA/irdma: Prevent zero-length STAG registration", + "cmt_id": "f01cfec8d3456bf389918eb898eda11f46d8b1b7" }, - "CVE-2020-36691": { - "cmt_msg": "netlink: limit recursion depth in policy validation" + "CVE-2023-52441": { + "cmt_msg": "ksmbd: fix out of bounds in init_smb2_rsp_hdr()", + "cmt_id": "330d900620dfc9893011d725b3620cd2ee0bc2bc" }, - "CVE-2019-10126": { - "cmt_msg": "mwifiex: Fix heap overflow in mwifiex_uap_parse_tail_ies()" + "CVE-2023-42753": { + "cmt_msg": "netfilter: ipset: add the missing IP_SET_HASH_WITH_NET0 macro for ip_set_hash_netportnet.c", + "cmt_id": "7ca0706c68adadf86a36b60dca090f5e9481e808" }, - "CVE-2016-2143": { - "cmt_msg": "s390/mm: four page table levels vs. fork" + "CVE-2023-42752": { + "cmt_msg": "igmp: limit igmpv3_newpack() packet size to IP_MAX_MTU", + "cmt_id": "6678912b4df1bfac6f7c80642d56dc22e23419e4" }, - "CVE-2020-13974": { - "cmt_msg": "vt: keyboard: avoid signed integer overflow in k_ascii" + "CVE-2023-45871": { + "cmt_msg": "igb: set max size RX buffer when store bad packet is enabled", + "cmt_id": "d2e906c725979c39ebf120a189e521ceae787d26" }, - "CVE-2017-6001": { - "cmt_msg": "perf/core: Fix concurrent sys_perf_event_open() vs. 'move_group' race" + "CVE-2023-39193": { + "cmt_msg": "netfilter: xt_sctp: validate the flag_info count", + "cmt_id": "4921f9349b66da7c5a2b6418fe45e9ae0ae72924" }, - "CVE-2021-4083": { - "cmt_msg": "fget: check that the fd still exists after getting a ref to it" + "CVE-2023-39192": { + "cmt_msg": "netfilter: xt_u32: validate user space input", + "cmt_id": "1c164c1e9e93b0a72a03a7edb754e3857d4e4302" + } + }, + "6.1.54": { + "CVE-2023-4921": { + "cmt_msg": "net: sched: sch_qfq: Fix UAF in qfq_dequeue()", + "cmt_id": "a18349dc8d916a64d7c93f05da98953e3386d8e9" }, - "CVE-2017-5967": { - "cmt_msg": "time: Remove CONFIG_TIMER_STATS" + "CVE-2023-52628": { + "cmt_msg": "netfilter: nftables: exthdr: fix 4-byte stack OOB write", + "cmt_id": "d9ebfc0f21377690837ebbd119e679243e0099cc" }, - "CVE-2023-33288": { - "cmt_msg": "power: supply: bq24190: Fix use after free bug in bq24190_remove due to race condition" + "CVE-2023-4881": { + "cmt_msg": "netfilter: nftables: exthdr: fix 4-byte stack OOB write", + "cmt_id": "d9ebfc0f21377690837ebbd119e679243e0099cc" }, - "CVE-2017-17558": { - "cmt_msg": "USB: core: prevent malicious bNumInterfaces overflow" + "CVE-2023-6176": { + "cmt_msg": "net/tls: do not free tls_rec on async operation in bpf_exec_tx_verdict()", + "cmt_id": "7f4116c6f98412a6e29ace6d6a7b41ebb4e8a392" }, - "CVE-2017-1000251": { - "cmt_msg": "Bluetooth: Properly check L2CAP config option output buffer length" + "CVE-2023-39189": { + "cmt_msg": "netfilter: nfnetlink_osf: avoid OOB read", + "cmt_id": "7bb8d52b4271be7527b6e3120ae6ce4c6cdf6e34" + } + }, + "6.1.55": { + "CVE-2023-42755": { + "cmt_msg": "net/sched: Retire rsvp classifier", + "cmt_id": "b93aeb6352b0229e3c5ca5ca4ff015b015aff33c" + } + }, + "6.1.56": { + "CVE-2023-5345": { + "cmt_msg": "fs/smb/client: Reset password pointer to NULL", + "cmt_id": "f555a508087ab8210b4658120ac6413d6fe2b4c7" }, - "CVE-2022-29900": { - "cmt_msg": "x86/kvm/vmx: Make noinstr clean" + "CVE-2023-52569": { + "cmt_msg": "btrfs: remove BUG() after failure to insert delayed dir index item", + "cmt_id": "39c4a9522db0072570d602e9b365119e17fb9f4f" }, - "CVE-2022-29901": { - "cmt_msg": "x86/kvm/vmx: Make noinstr clean" + "CVE-2023-52568": { + "cmt_msg": "x86/sgx: Resolves SECS reclaim vs. page fault for EAUG race", + "cmt_id": "811ba2ef0cb6402672e64ba1419d6ef95aa3405d" }, - "CVE-2017-8106": { - "cmt_msg": "KVM: nVMX: Don't advertise single context invalidation for invept" + "CVE-2023-52580": { + "cmt_msg": "net/core: Fix ETH_P_1588 flow dissector", + "cmt_id": "488ea2a3e2666022f79abfdd7d12e8305fc27a40" }, - "CVE-2023-3161": { - "cmt_msg": "fbcon: Check font dimension limits" + "CVE-2023-52582": { + "cmt_msg": "netfs: Only call folio_start_fscache() one time for each folio", + "cmt_id": "df9950d37df113db59495fa09d060754366a2b7c" }, - "CVE-2020-10751": { - "cmt_msg": "selinux: properly handle multiple messages in selinux_netlink_send()" + "CVE-2023-52563": { + "cmt_msg": "drm/meson: fix memory leak on ->hpd_notify callback", + "cmt_id": "ee335e0094add7fc2c7034e0534e1920d61d2078" }, - "CVE-2022-3567": { - "cmt_msg": "ipv6: Fix data races around sk->sk_prot." + "CVE-2023-52562": { + "cmt_msg": "mm/slab_common: fix slab_caches list corruption after kmem_cache_destroy()", + "cmt_id": "a5569bb187521432f509b69dda7d29f78b2d38b0" }, - "CVE-2021-4002": { - "cmt_msg": "hugetlbfs: flush TLBs correctly after huge_pmd_unshare" + "CVE-2023-52561": { + "cmt_msg": "arm64: dts: qcom: sdm845-db845c: Mark cont splash memory region as reserved", + "cmt_id": "dc1ab6577475b0460ba4261cd9caec37bd62ca0b" }, - "CVE-2018-20511": { - "cmt_msg": "net/appletalk: fix minor pointer leak to userspace in SIOCFINDIPDDPRT" + "CVE-2023-52560": { + "cmt_msg": "mm/damon/vaddr-test: fix memory leak in damon_do_test_apply_three_regions()", + "cmt_id": "9a4fe81a8644b717d57d81ce5849e16583b13fe8" }, - "CVE-2018-20510": { - "cmt_msg": "binder: replace \"%p\" with \"%pK\"" + "CVE-2023-5197": { + "cmt_msg": "netfilter: nf_tables: disallow rule removal from chain binding", + "cmt_id": "9af8bb2afea3705b58fe930f97a39322f46e5b8b" }, - "CVE-2016-5728": { - "cmt_msg": "misc: mic: Fix for double fetch security bug in VOP driver" + "CVE-2023-52566": { + "cmt_msg": "nilfs2: fix potential use after free in nilfs_gccache_submit_read_data()", + "cmt_id": "980663f1d189eedafd18d80053d9cf3e2ceb5c8c" }, - "CVE-2020-15436": { - "cmt_msg": "block: Fix use-after-free in blkdev_get()" + "CVE-2023-52565": { + "cmt_msg": "media: uvcvideo: Fix OOB read", + "cmt_id": "09635bf4cdd4adf2160198a6041bcc7ca46c0558" }, - "CVE-2022-1116": { - "cmt_msg": "" + "CVE-2023-52508": { + "cmt_msg": "nvme-fc: Prevent null pointer dereference in nvme_fc_io_getuuid()", + "cmt_id": "be90c9e29dd59b7d19a73297a1590ff3ec1d22ea" }, - "CVE-2021-28660": { - "cmt_msg": "staging: rtl8188eu: prevent ->ssid overflow in rtw_wx_set_scan()" + "CVE-2023-4563": { + "cmt_msg": "netfilter: nf_tables: don't skip expired elements during walk", + "cmt_id": "59dab3bf0b8fc08eb802721c0532f13dd89209b8" }, - "CVE-2016-9178": { - "cmt_msg": "fix minor infoleak in get_user_ex()" + "CVE-2023-52506": { + "cmt_msg": "LoongArch: Set all reserved memblocks on Node#0 at initialization", + "cmt_id": "f105e893a8edd48bdf4bef9fef845a9ff402f737" }, - "CVE-2020-8647": { - "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region" + "CVE-2023-52501": { + "cmt_msg": "ring-buffer: Do not attempt to read past \"commit\"", + "cmt_id": "b08a4938229dbb530a35c41b83002a1457c6ff49" }, - "CVE-2022-23816": { - "cmt_msg": "x86/kvm/vmx: Make noinstr clean" + "CVE-2023-52500": { + "cmt_msg": "scsi: pm80xx: Avoid leaking tags when processing OPC_INB_SET_CONTROLLER_CONFIG command", + "cmt_id": "2259e1901b2d8c0e8538fc99e77de443b939e749" }, - "CVE-2019-0154": { - "cmt_msg": "drm/i915: Lower RM timeout to avoid DSI hard hangs" + "CVE-2023-52578": { + "cmt_msg": "net: bridge: use DEV_STATS_INC()", + "cmt_id": "89f9f20b1cbd36d99d5a248a4bf8d11d4fd049a2" }, - "CVE-2022-2961": { - "cmt_msg": "" + "CVE-2023-52574": { + "cmt_msg": "team: fix null-ptr-deref when team device type is changed", + "cmt_id": "2f0acb0736ecc3eb85dc80ad2790d634dcb10b58" }, - "CVE-2017-6348": { - "cmt_msg": "irda: Fix lockdep annotations in hashbin_delete()." + "CVE-2023-52576": { + "cmt_msg": "x86/mm, kexec, ima: Use memblock_free_late() from ima_free_kexec_buffer()", + "cmt_id": "eef16bfdb212da60f5144689f2967fb25b051a2b" }, - "CVE-2022-3566": { - "cmt_msg": "tcp: Fix data races around icsk->icsk_af_ops." + "CVE-2023-52570": { + "cmt_msg": "vfio/mdev: Fix a null-ptr-deref bug for mdev_unregister_parent()", + "cmt_id": "c01b2e0ee22ef8b4dd7509a93aecc0ac0826bae4" }, - "CVE-2014-9922": { - "cmt_msg": "fs: limit filesystem stacking depth" + "CVE-2023-52571": { + "cmt_msg": "power: supply: rk817: Fix node refcount leak", + "cmt_id": "fe6406238d5a24e9fb0286c71edd67b99d8db58d" }, - "CVE-2022-3564": { - "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free caused by l2cap_reassemble_sdu" + "CVE-2023-52572": { + "cmt_msg": "cifs: Fix UAF in cifs_demultiplex_thread()", + "cmt_id": "908b3b5e97d25e879de3d1f172a255665491c2c3" }, - "CVE-2020-36386": { - "cmt_msg": "Bluetooth: Fix slab-out-of-bounds read in hci_extended_inquiry_result_evt()" + "CVE-2023-52573": { + "cmt_msg": "net: rds: Fix possible NULL-pointer dereference", + "cmt_id": "51fa66024a5eabf270164f2dc82a48ffb35a12e9" }, - "CVE-2017-6345": { - "cmt_msg": "net/llc: avoid BUG_ON() in skb_orphan()" + "CVE-2023-52484": { + "cmt_msg": "iommu/arm-smmu-v3: Fix soft lockup triggered by arm_smmu_mm_invalidate_range", + "cmt_id": "f90f4c562003ac3d3b135c5a40a5383313f27264" }, - "CVE-2017-6346": { - "cmt_msg": "packet: fix races in fanout_add()" + "CVE-2023-42754": { + "cmt_msg": "ipv4: fix null-deref in ipv4_link_failure", + "cmt_id": "2712545e535d7a2e4c53b9c9658a9c88c6055862" }, - "CVE-2020-36385": { - "cmt_msg": "RDMA/ucma: Rework ucma_migrate_id() to avoid races with destroy" + "CVE-2023-52482": { + "cmt_msg": "x86/srso: Add SRSO mitigation for Hygon processors", + "cmt_id": "6ce2f297a7168274547d0b5aea6c7c16268b8a96" + }, + "CVE-2023-52511": { + "cmt_msg": "spi: sun6i: reduce DMA RX transfer width to single byte", + "cmt_id": "e15bb292b24630ee832bfc7fd616bd72c7682bbb" }, - "CVE-2022-1048": { - "cmt_msg": "ALSA: pcm: Fix races among concurrent hw_params and hw_free calls" + "CVE-2023-52516": { + "cmt_msg": "dma-debug: don't call __dma_entry_alloc_check_leak() under free_entries_lock", + "cmt_id": "be8f49029eca3efbad0d74dbff3cb9129994ffab" }, - "CVE-2020-0009": { - "cmt_msg": "staging: android: ashmem: Disallow ashmem memory from being remapped" + "CVE-2023-4244": { + "cmt_msg": "netfilter: nf_tables: fix GC transaction races with netns and netlink event exit path", + "cmt_id": "41113aa5698ad7a82635bcb747d483e4458d518d" }, - "CVE-2023-52340": { - "cmt_msg": "ipv6: remove max_size check inline with ipv4" + "CVE-2023-52517": { + "cmt_msg": "spi: sun6i: fix race between DMA RX transfer completion and RX FIFO drain", + "cmt_id": "36b29974a7ad2ff604c24ad348f940506c7b1209" }, - "CVE-2023-31082": { - "cmt_msg": "" + "CVE-2022-48628": { + "cmt_msg": "ceph: drop messages from MDS when unmounting", + "cmt_id": "89744b64914426cbabceb3d8a149176b5dafdfb5" + } + }, + "6.1.57": { + "CVE-2023-52527": { + "cmt_msg": "ipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data()", + "cmt_id": "f6a7182179c0ed788e3755ee2ed18c888ddcc33f" }, - "CVE-2018-7480": { - "cmt_msg": "blkcg: fix double free of new_blkg in blkcg_init_queue" + "CVE-2023-34324": { + "cmt_msg": "xen/events: replace evtchn_rwlock with RCU", + "cmt_id": "a4cc925e2e12c3bbffb0860acdb9f9c1abde47dd" }, - "CVE-2019-14615": { - "cmt_msg": "drm/i915/gen9: Clear residual context state on context switch" + "CVE-2023-52531": { + "cmt_msg": "wifi: iwlwifi: mvm: Fix a memory corruption issue", + "cmt_id": "6b3223449c959a8be94a1f042288059e40fcccb0" }, - "CVE-2016-6327": { - "cmt_msg": "IB/srpt: Simplify srpt_handle_tsk_mgmt()" + "CVE-2023-52523": { + "cmt_msg": "bpf, sockmap: Reject sk_msg egress redirects to non-TCP sockets", + "cmt_id": "b8f97e47b6fb84fcf2f5a22e725eefb6cf5070c2" }, - "CVE-2016-3139": { - "cmt_msg": "Input: wacom - compute the HID report size to get the actual packet size" + "CVE-2023-52522": { + "cmt_msg": "net: fix possible store tearing in neigh_periodic_work()", + "cmt_id": "f82aac8162871e87027692b36af335a2375d4580" }, - "CVE-2023-0030": { - "cmt_msg": "drm/nouveau/mmu: add more general vmm free/node handling functions" + "CVE-2023-52518": { + "cmt_msg": "Bluetooth: hci_codec: Fix leaking content of local_codecs", + "cmt_id": "626535077ba9dc110787540d1fe24881094c15a1" }, - "CVE-2020-16120": { - "cmt_msg": "ovl: switch to mounter creds in readdir" + "CVE-2023-52519": { + "cmt_msg": "HID: intel-ish-hid: ipc: Disable and reenable ACPI GPE bit", + "cmt_id": "cdcc04e844a2d22d9d25cef1e8e504a174ea9f8f" }, - "CVE-2019-11599": { - "cmt_msg": "coredump: fix race condition between mmget_not_zero()/get_task_mm() and core dumping" + "CVE-2023-52530": { + "cmt_msg": "wifi: mac80211: fix potential key use-after-free", + "cmt_id": "2f4e16e39e4f5e78248dd9e51276a83203950b36" }, - "CVE-2018-16658": { - "cmt_msg": "cdrom: Fix info leak/OOB read in cdrom_ioctl_drive_status" + "CVE-2023-52480": { + "cmt_msg": "ksmbd: fix race condition between session lookup and expire", + "cmt_id": "a2ca5fd3dbcc665e1169044fa0c9e3eba779202b" }, - "CVE-2018-15572": { - "cmt_msg": "x86/speculation: Protect against userspace-userspace spectreRSB" + "CVE-2023-31085": { + "cmt_msg": "ubi: Refuse attaching if mtd's erasesize is 0", + "cmt_id": "91aeb418b9175d09fc858f0fdf01988cbf990c5d" }, - "CVE-2022-1204": { - "cmt_msg": "ax25: Fix refcount leaks caused by ax25_cb_del()" + "CVE-2023-52515": { + "cmt_msg": "RDMA/srp: Do not call scsi_done() from srp_abort()", + "cmt_id": "2b298f9181582270d5e95774e5a6c7a7fb5b1206" }, - "CVE-2019-2101": { - "cmt_msg": "media: uvcvideo: Fix 'type' check leading to overflow" + "CVE-2023-52479": { + "cmt_msg": "ksmbd: fix uaf in smb20_oplock_break_ack", + "cmt_id": "8226ffc759ea59f10067b9acdf7f94bae1c69930" }, - "CVE-2019-17666": { - "cmt_msg": "rtlwifi: Fix potential overflow on P2P code" + "CVE-2023-52481": { + "cmt_msg": "arm64: errata: Add Cortex-A520 speculative unprivileged load workaround", + "cmt_id": "6e3ae2927b432a3b7c8374f14dbc1bd9ebe4372c" }, - "CVE-2018-9363": { - "cmt_msg": "Bluetooth: hidp: buffer overflow in hidp_process_report" + "CVE-2023-52529": { + "cmt_msg": "HID: sony: Fix a potential memory leak in sony_probe()", + "cmt_id": "f237b17611fa3501f43f12d1cb64323e10fdcb4f" }, - "CVE-2015-7885": { - "cmt_msg": "staging/dgnc: fix info leak in ioctl" + "CVE-2023-52513": { + "cmt_msg": "RDMA/siw: Fix connection failure handling", + "cmt_id": "5cf38e638e5d01b68f9133968a85e8b3fd1ecf2f" }, - "CVE-2016-10723": { - "cmt_msg": "mm, oom: remove sleep from under oom_lock" + "CVE-2024-0641": { + "cmt_msg": "tipc: fix a potential deadlock on &tx->lock", + "cmt_id": "143e72757a902abcecd5f487553f44dc19a56cfc" }, - "CVE-2021-3573": { - "cmt_msg": "Bluetooth: use correct lock to prevent UAF of hdev object" + "CVE-2023-52559": { + "cmt_msg": "iommu/vt-d: Avoid memory allocation in iommu_suspend()", + "cmt_id": "c12ef025add77ca3a0902e8719d552b6d47b4282" }, - "CVE-2020-25212": { - "cmt_msg": "nfs: Fix getxattr kernel panic and memory overflow" + "CVE-2023-52526": { + "cmt_msg": "erofs: fix memory leak of LZMA global compressed deduplication", + "cmt_id": "6a5a8f0a9740f865693d5aa97a42cc4504538e18" }, - "CVE-2019-19036": { - "cmt_msg": "btrfs: Detect unbalanced tree with empty leaf before crashing btree operations" + "CVE-2023-52528": { + "cmt_msg": "net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg", + "cmt_id": "9ffc5018020fe646795a8dc1203224b8f776dc09" }, - "CVE-2019-3459": { - "cmt_msg": "Bluetooth: Verify that l2cap_get_conf_opt provides large enough buffer" + "CVE-2023-5158": { + "cmt_msg": "vringh: don't use vringh_kiov_advance() in vringh_iov_xfer()", + "cmt_id": "3a72decd6b49ff11a894aabd4d9b3025f046fe61" + } + }, + "6.1.59": { + "CVE-2023-52475": { + "cmt_msg": "Input: powermate - fix use-after-free in powermate_config_complete", + "cmt_id": "2efe67c581a2a6122b328d4bb6f21b3f36f40d46" }, - "CVE-2020-11494": { - "cmt_msg": "slcan: Don't transmit uninitialized stack data in padding" + "CVE-2023-52477": { + "cmt_msg": "usb: hub: Guard against accesses to uninitialized BOS descriptors", + "cmt_id": "fb9895ab9533534335fa83d70344b397ac862c81" }, - "CVE-2017-8797": { - "cmt_msg": "nfsd: fix undefined behavior in nfsd4_layout_verify" + "CVE-2023-52476": { + "cmt_msg": "perf/x86/lbr: Filter vsyscall addresses", + "cmt_id": "3863989497652488a50f00e96de4331e5efabc6c" }, - "CVE-2023-6270": { - "cmt_msg": "" + "CVE-2023-52509": { + "cmt_msg": "ravb: Fix use-after-free issue in ravb_tx_timeout_work()", + "cmt_id": "6f6fa8061f756aedb93af12a8a5d3cf659127965" }, - "CVE-2015-5307": { - "cmt_msg": "KVM: x86: work around infinite loop in microcode when #AC is delivered" + "CVE-2023-52510": { + "cmt_msg": "ieee802154: ca8210: Fix a potential UAF in ca8210_probe", + "cmt_id": "217efe32a45249eb07dcd7197e8403de98345e66" }, - "CVE-2018-10675": { - "cmt_msg": "mm/mempolicy: fix use after free when calling get_mempolicy" + "CVE-2023-52520": { + "cmt_msg": "platform/x86: think-lmi: Fix reference leak", + "cmt_id": "af21c9119a37cecb7ff27ce0c2f3cf721e9d0ec4" }, - "CVE-2017-16526": { - "cmt_msg": "uwb: properly check kthread_run return value" + "CVE-2023-52505": { + "cmt_msg": "phy: lynx-28g: serialize concurrent phy_set_mode_ext() calls to shared registers", + "cmt_id": "6f901f8448c6b25ed843796b114471d2a3fc5dfb" }, - "CVE-2017-16527": { - "cmt_msg": "ALSA: usb-audio: Kill stray URB at exiting" + "CVE-2023-52504": { + "cmt_msg": "x86/alternatives: Disable KASAN in apply_alternatives()", + "cmt_id": "5b784489c8158518bf7a466bb3cc045b0fb66b4b" }, - "CVE-2017-16525": { - "cmt_msg": "USB: serial: console: fix use-after-free after failed setup" + "CVE-2023-52507": { + "cmt_msg": "nfc: nci: assert requested protocol is valid", + "cmt_id": "853dda54ba59ea70d5580a298b7ede4707826848" }, - "CVE-2018-12233": { - "cmt_msg": "jfs: Fix inconsistency between memory allocation and ea_buf->max_size" + "CVE-2023-52499": { + "cmt_msg": "powerpc/47x: Fix 47x syscall return crash", + "cmt_id": "8ac2689502f986a46f4221e239d4ff2897f1ccb3" }, - "CVE-2022-3565": { - "cmt_msg": "mISDN: fix use-after-free bugs in l1oip timer handlers" + "CVE-2023-52512": { + "cmt_msg": "pinctrl: nuvoton: wpcm450: fix out of bounds write", + "cmt_id": "6c18c386fd13dbb3ff31a1086dabb526780d9bda" }, - "CVE-2021-32078": { - "cmt_msg": "ARM: footbridge: remove personal server platform" + "CVE-2023-52478": { + "cmt_msg": "HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect", + "cmt_id": "fd72ac9556a473fc7daf54efb6ca8a97180d621d" }, - "CVE-2017-16528": { - "cmt_msg": "ALSA: seq: Cancel pending autoload work at unbinding device" + "CVE-2023-35827": { + "cmt_msg": "ravb: Fix use-after-free issue in ravb_tx_timeout_work()", + "cmt_id": "6f6fa8061f756aedb93af12a8a5d3cf659127965" }, - "CVE-2017-16529": { - "cmt_msg": "ALSA: usb-audio: Check out-of-bounds access by corrupted buffer descriptor" + "CVE-2023-52483": { + "cmt_msg": "mctp: perform route lookups under a RCU read-side lock", + "cmt_id": "1db0724a01b558feb1ecae551782add1951a114a" }, - "CVE-2019-11833": { - "cmt_msg": "ext4: zero out the unused memory region in the extent tree block" + "CVE-2023-52503": { + "cmt_msg": "tee: amdtee: fix use-after-free vulnerability in amdtee_close_session", + "cmt_id": "60c3e7a00db954947c265b55099c21b216f2a05c" }, - "CVE-2021-38205": { - "cmt_msg": "net: xilinx_emaclite: Do not print real IOMEM pointer" + "CVE-2023-52502": { + "cmt_msg": "net: nfc: fix races in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn()", + "cmt_id": "e4f2611f07c87b3ddb57c4b9e8efcd1e330fc3dc" }, - "CVE-2021-3864": { - "cmt_msg": "" + "CVE-2023-52532": { + "cmt_msg": "net: mana: Fix TX CQE error handling", + "cmt_id": "b67d7b1bfc46d05c1a58b172516454698e8d5004" + } + }, + "6.1.60": { + "CVE-2023-46813": { + "cmt_msg": "x86/sev: Check for user-space IOIO pointing to kernel space", + "cmt_id": "57d0639f60f1ff04cbe7fd52823b94b894d7f812" }, - "CVE-2020-0255": { - "cmt_msg": "selinux: properly handle multiple messages in selinux_netlink_send()" + "CVE-2023-46343": { + "cmt_msg": "nfc: nci: fix possible NULL pointer dereference in send_acknowledge()", + "cmt_id": "d7dbdbe3800a908eecd4975c31be47dd45e2104a" }, - "CVE-2019-2215": { - "cmt_msg": "ANDROID: binder: remove waitqueue when thread exits." + "CVE-2023-5717": { + "cmt_msg": "perf: Disallow mis-matched inherited group reads", + "cmt_id": "f6952655a61264900ed08e9d642adad8222f8e29" + } + }, + "6.1.61": { + "CVE-2023-46862": { + "cmt_msg": "io_uring/fdinfo: lock SQ thread while retrieving thread cpu/pid", + "cmt_id": "9236d2ea6465b37c0a73d994c1ad31753d31e5f5" + } + }, + "6.1.62": { + "CVE-2023-5090": { + "cmt_msg": "x86: KVM: SVM: always update the x2avic msr interception", + "cmt_id": "7ab62e3415fb59289ab6dea31f0cc0237b949200" + } + }, + "6.1.64": { + "CVE-2024-0607": { + "cmt_msg": "netfilter: nf_tables: fix pointer math issue in nft_byteorder_eval()", + "cmt_id": "18a169810cff769a7a697b35058c756805f589e0" + } + }, + "6.1.65": { + "CVE-2023-6121": { + "cmt_msg": "nvmet: nul-terminate the NQNs passed in the connect command", + "cmt_id": "0e485f12ebb7b69b67c7f85195a1b4aad95d354a" + } + }, + "6.1.66": { + "CVE-2024-0584": { + "cmt_msg": "ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet", + "cmt_id": "94445d9583079e0ccc5dde1370076ff24800d86e" }, - "CVE-2023-35001": { - "cmt_msg": "netfilter: nf_tables: prevent OOB access in nft_byteorder_eval" + "CVE-2023-6932": { + "cmt_msg": "ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet", + "cmt_id": "94445d9583079e0ccc5dde1370076ff24800d86e" + } + }, + "6.1.68": { + "CVE-2023-6531": { + "cmt_msg": "io_uring/af_unix: disable sending io_uring over sockets", + "cmt_id": "f2f57f51b53be153a522300454ddb3887722fb2c" }, - "CVE-2021-38208": { - "cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect" + "CVE-2023-6622": { + "cmt_msg": "netfilter: nf_tables: bail out on mismatching dynset and set expressions", + "cmt_id": "96f8654b701f772af5f358b91807ce2836ff3444" }, - "CVE-2016-6213": { - "cmt_msg": "mnt: Add a per mount namespace limit on the number of mounts" + "CVE-2023-6817": { + "cmt_msg": "netfilter: nft_set_pipapo: skip inactive elements during set walk", + "cmt_id": "189c2a82933c67ad360c421258d5449f6647544a" }, - "CVE-2017-18232": { - "cmt_msg": "scsi: libsas: direct call probe and destruct" + "CVE-2023-6931": { + "cmt_msg": "perf: Fix perf_event_validate_size()", + "cmt_id": "06dec254c59afd01b7a44838cf8bfc382bef019b" }, - "CVE-2019-2213": { - "cmt_msg": "binder: fix possible UAF when freeing buffer" + "CVE-2024-25744": { + "cmt_msg": "x86/coco: Disable 32-bit emulation by default on TDX and SEV", + "cmt_id": "b8ec27ae221eee458b15b700706db311474ac619" + } + }, + "6.1.69": { + "CVE-2023-51782": { + "cmt_msg": "net/rose: Fix Use-After-Free in rose_ioctl", + "cmt_id": "01540ee2366a0a8671c35cd57a66bf0817106ffa" }, - "CVE-2020-25211": { - "cmt_msg": "netfilter: ctnetlink: add a range check for l3/l4 protonum" + "CVE-2023-51780": { + "cmt_msg": "atm: Fix Use-After-Free in do_vcc_ioctl", + "cmt_id": "2de2a6cbe14f7e949da59bddd5d69baf5dd893c0" }, - "CVE-2017-14140": { - "cmt_msg": "Sanitize 'move_pages()' permission checks" + "CVE-2023-51781": { + "cmt_msg": "appletalk: Fix Use-After-Free in atalk_ioctl", + "cmt_id": "1646b2929d5efc3861139ba58556b0f149c848f6" }, - "CVE-2020-26556": { - "cmt_msg": "" + "CVE-2024-0565": { + "cmt_msg": "smb: client: fix OOB in receive_encrypted_standard()", + "cmt_id": "9f528a8e68327117837b5e28b096f52af4c26a05" }, - "CVE-2018-9518": { - "cmt_msg": "NFC: llcp: Limit size of SDP URI" + "CVE-2024-0646": { + "cmt_msg": "net: tls, update curr on splice as well", + "cmt_id": "9b3d3a7f3c4d710c1dd3f723851c3eeaf42642bc" + } + }, + "6.1.70": { + "CVE-2023-6606": { + "cmt_msg": "smb: client: fix OOB in smbCalcSize()", + "cmt_id": "c60e10d1549f8748a68ec13dcd177c62843985ff" }, - "CVE-2020-26555": { - "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical" + "CVE-2023-51779": { + "cmt_msg": "Bluetooth: af_bluetooth: Fix Use-After-Free in bt_sock_recvmsg", + "cmt_id": "37f71e2c9f515834841826f4eb68ec33cfb2a1ff" + } + }, + "6.1.71": { + "CVE-2024-22705": { + "cmt_msg": "ksmbd: fix slab-out-of-bounds in smb_strndup_from_utf16()", + "cmt_id": "7a3bbbadac4be9d30b45e9f1134e94294f79ce77" }, - "CVE-2018-9517": { - "cmt_msg": "l2tp: pass tunnel pointer to ->session_create()" + "CVE-2023-1193": { + "cmt_msg": "ksmbd: delete asynchronous work from list", + "cmt_id": "8d271ef5e5cac8a470076891b248a28a2c57fb1e" + } + }, + "6.1.73": { + "CVE-2023-52340": { + "cmt_msg": "ipv6: remove max_size check inline with ipv4", + "cmt_id": "0f22c8a6efe63c16d1abf1e6c0317abbf121f883" + } + }, + "6.1.74": { + "CVE-2023-52439": { + "cmt_msg": "uio: Fix use-after-free in uio_open", + "cmt_id": "17a8519cb359c3b483fb5c7367efa9a8a508bdea" }, - "CVE-2018-9516": { - "cmt_msg": "HID: debug: check length before copy_to_user()" + "CVE-2023-52438": { + "cmt_msg": "binder: fix use-after-free in shinker's callback", + "cmt_id": "9fa04c93f24138747807fe75b5591bb680098f56" }, - "CVE-2023-3397": { - "cmt_msg": "" + "CVE-2023-6915": { + "cmt_msg": "ida: Fix crash in ida_free when the bitmap is empty", + "cmt_id": "9efdc0081ccae62c44a929e21d32bacc5f2e113f" }, - "CVE-2018-1128": { - "cmt_msg": "libceph: add authorizer challenge" + "CVE-2023-6610": { + "cmt_msg": "smb: client: fix potential OOB in smb2_dump_detail()", + "cmt_id": "5411e3292792be7dafd1fe948a87e3ca29c1f550" }, - "CVE-2018-1129": { - "cmt_msg": "libceph: implement CEPHX_V2 calculation mode" + "CVE-2023-52436": { + "cmt_msg": "f2fs: explicitly null-terminate the xattr list", + "cmt_id": "5de9e9dd1828db9b8b962f7ca42548bd596deb8a" + } + }, + "6.1.75": { + "CVE-2024-26592": { + "cmt_msg": "ksmbd: fix UAF issue in ksmbd_tcp_new_connection()", + "cmt_id": "380965e48e9c32ee4263c023e1d830ea7e462ed1" }, - "CVE-2018-1087": { - "cmt_msg": "kvm/x86: fix icebp instruction handling" + "CVE-2024-26591": { + "cmt_msg": "bpf: Fix re-attachment branch in bpf_tracing_prog_attach", + "cmt_id": "6cc9c0af0aa06f781fa515a1734b1a4239dfd2c0" }, - "CVE-2022-26365": { - "cmt_msg": "xen/blkfront: fix leaking data in shared pages" + "CVE-2024-26597": { + "cmt_msg": "net: qualcomm: rmnet: fix global oob in rmnet_policy", + "cmt_id": "ee1dc3bf86f2df777038506b139371a9add02534" }, - "CVE-2022-1652": { - "cmt_msg": "floppy: use a statically allocated error counter" + "CVE-2024-26594": { + "cmt_msg": "ksmbd: validate mech token in session setup", + "cmt_id": "6eb8015492bcc84e40646390e50a862b2c0529c9" }, - "CVE-2018-1120": { - "cmt_msg": "proc: do not access cmdline nor environ from file-backed areas" + "CVE-2024-26598": { + "cmt_msg": "KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache", + "cmt_id": "dba788e25f05209adf2b0175eb1691dc89fb1ba6" }, - "CVE-2018-1121": { - "cmt_msg": "" + "CVE-2024-26599": { + "cmt_msg": "pwm: Fix out-of-bounds access in of_pwm_single_xlate()", + "cmt_id": "7b85554c7c2aee91171e038e4d5442ffa130b282" }, - "CVE-2017-5754": { - "cmt_msg": "x86/cpufeatures: Add Intel feature bits for Speculation Control" + "CVE-2023-6356": { + "cmt_msg": "nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length", + "cmt_id": "2871aa407007f6f531fae181ad252486e022df42" }, - "CVE-2022-3061": { - "cmt_msg": "video: fbdev: i740fb: Error out if 'pixclock' equals zero" + "CVE-2023-52458": { + "cmt_msg": "block: add check that partition length needs to be aligned with block size", + "cmt_id": "ef31cc87794731ffcb578a195a2c47d744e25fb8" }, - "CVE-2016-10200": { - "cmt_msg": "l2tp: fix racy SOCK_ZAPPED flag check in l2tp_ip{,6}_bind()" + "CVE-2023-52457": { + "cmt_msg": "serial: 8250: omap: Don't skip resource freeing if pm_runtime_resume_and_get() failed", + "cmt_id": "d74173bda29aba58f822175d983d07c8ed335494" }, - "CVE-2017-5753": { - "cmt_msg": "x86/cpufeatures: Add X86_BUG_SPECTRE_V[12]" + "CVE-2023-52456": { + "cmt_msg": "serial: imx: fix tx statemachine deadlock", + "cmt_id": "63ee7be01a3f7d28b1ea8b8d7944f12bb7b0ed06" }, - "CVE-2022-20369": { - "cmt_msg": "media: v4l2-mem2mem: Apply DST_QUEUE_OFF_BASE on MMAP buffers across ioctls" + "CVE-2023-52609": { + "cmt_msg": "binder: fix race between mmput() and do_exit()", + "cmt_id": "6696f76c32ff67fec26823fc2df46498e70d9bf3" }, - "CVE-2022-32981": { - "cmt_msg": "powerpc/32: Fix overread/overwrite of thread_struct via ptrace" + "CVE-2023-52451": { + "cmt_msg": "powerpc/pseries/memhp: Fix access beyond end of drmem array", + "cmt_id": "026fd977dc50ff4a5e09bfb0603557f104d3f3a0" }, - "CVE-2016-10208": { - "cmt_msg": "ext4: validate s_first_meta_bg at mount time" + "CVE-2023-52454": { + "cmt_msg": "nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length", + "cmt_id": "2871aa407007f6f531fae181ad252486e022df42" }, - "CVE-2020-11565": { - "cmt_msg": "mm: mempolicy: require at least one nodeid for MPOL_PREFERRED" + "CVE-2023-52470": { + "cmt_msg": "drm/radeon: check the alloc_workqueue return value in radeon_crtc_init()", + "cmt_id": "c4ff55408187f2595066967047363ca84e76db85" }, - "CVE-2022-3344": { - "cmt_msg": "KVM: x86: nSVM: harden svm_free_nested against freeing vmcb02 while still in use" + "CVE-2023-52612": { + "cmt_msg": "crypto: scomp - fix req->dst buffer overflow", + "cmt_id": "4df0c942d04a67df174195ad8082f6e30e7f71a5" }, - "CVE-2018-9568": { - "cmt_msg": "net: Set sk_prot_creator when cloning sockets to the right proto" + "CVE-2024-1085": { + "cmt_msg": "netfilter: nf_tables: check if catch-all set element is active in next generation", + "cmt_id": "a372f1d01bc11aa85773a02353cd01aaf16dc18e" }, - "CVE-2018-13053": { - "cmt_msg": "alarmtimer: Prevent overflow for relative nanosleep" + "CVE-2024-26589": { + "cmt_msg": "bpf: Reject variable offset alu on PTR_TO_FLOW_KEYS", + "cmt_id": "4108b86e324da42f7ed425bd71632fd844300dc8" }, - "CVE-2020-27786": { - "cmt_msg": "ALSA: rawmidi: Fix racy buffer resize under concurrent accesses" + "CVE-2023-52463": { + "cmt_msg": "efivarfs: force RO when remounting if SetVariable is not supported", + "cmt_id": "d4a9aa7db574a0da64307729cc031fb68597aa8b" }, - "CVE-2019-14816": { - "cmt_msg": "mwifiex: Fix three heap overflow at parsing element in cfg80211_ap_settings" + "CVE-2023-46838": { + "cmt_msg": "xen-netback: don't produce zero-size SKB frags", + "cmt_id": "437360133cbd1e9fb88b122e84fff0df08f18e23" }, - "CVE-2019-14814": { - "cmt_msg": "mwifiex: Fix three heap overflow at parsing element in cfg80211_ap_settings" + "CVE-2024-24860": { + "cmt_msg": "Bluetooth: Fix atomicity violation in {min,max}_key_size_set", + "cmt_id": "96860d9ad462db61f4eeb09934235c38eab655c4" }, - "CVE-2023-51780": { - "cmt_msg": "atm: Fix Use-After-Free in do_vcc_ioctl" + "CVE-2024-26588": { + "cmt_msg": "LoongArch: BPF: Prevent out-of-bounds memory access", + "cmt_id": "4631c2dd69d928bca396f9f58baeddf85e14ced5" }, - "CVE-2023-6240": { - "cmt_msg": "" + "CVE-2023-52462": { + "cmt_msg": "bpf: fix check for attempt to corrupt spilled pointer", + "cmt_id": "fc3e3c50a0a4cac1463967c110686189e4a59104" }, - "CVE-2023-23559": { - "cmt_msg": "wifi: rndis_wlan: Prevent buffer overflow in rndis_query_oid" + "CVE-2023-50431": { + "cmt_msg": "accel/habanalabs: fix information leak in sec_attest_info()", + "cmt_id": "6d98d249175e568f72ca94cbd6f959bc4476414e" }, - "CVE-2022-39842": { - "cmt_msg": "video: fbdev: pxa3xx-gcu: Fix integer overflow in pxa3xx_gcu_write" + "CVE-2023-52610": { + "cmt_msg": "net/sched: act_ct: fix skb leak and crash on ooo frags", + "cmt_id": "0b5b831122fc3789fff75be433ba3e4dd7b779d4" }, - "CVE-2020-14351": { - "cmt_msg": "perf/core: Fix race in the perf_mmap_close() function" + "CVE-2023-52467": { + "cmt_msg": "mfd: syscon: Fix null pointer dereference in of_syscon_register()", + "cmt_id": "527e8c5f3d00299822612c495d5adf1f8f43c001" }, - "CVE-2022-0382": { - "cmt_msg": "net ticp:fix a kernel-infoleak in __tipc_sendmsg()" + "CVE-2023-52464": { + "cmt_msg": "EDAC/thunderx: Fix possible out-of-bounds string access", + "cmt_id": "9dbac9fdae6e3b411fc4c3fca3bf48f70609c398" }, - "CVE-2019-9456": { - "cmt_msg": "usb: usbmon: Read text within supplied buffer size" + "CVE-2023-52443": { + "cmt_msg": "apparmor: avoid crash when parsed profile name is empty", + "cmt_id": "9d4fa5fe2b1d56662afd14915a73b4d0783ffa45" }, - "CVE-2023-32233": { - "cmt_msg": "netfilter: nf_tables: deactivate anonymous set from preparation phase" + "CVE-2023-52444": { + "cmt_msg": "f2fs: fix to avoid dirent corruption", + "cmt_id": "f0145860c20be6bae6785c7a2249577674702ac7" }, - "CVE-2020-25672": { - "cmt_msg": "nfc: fix memory leak in llcp_sock_connect()" + "CVE-2023-52445": { + "cmt_msg": "media: pvrusb2: fix use after free on context disconnection", + "cmt_id": "30773ea47d41773f9611ffb4ebc9bda9d19a9e7e" }, - "CVE-2020-14353": { - "cmt_msg": "KEYS: prevent creating a different user's keyrings" + "CVE-2023-52447": { + "cmt_msg": "bpf: Defer the free of inner map when necessary", + "cmt_id": "62fca83303d608ad4fec3f7428c8685680bb01b0" }, - "CVE-2020-25670": { - "cmt_msg": "nfc: fix refcount leak in llcp_sock_bind()" + "CVE-2023-52448": { + "cmt_msg": "gfs2: Fix kernel NULL pointer dereference in gfs2_rgrp_dump", + "cmt_id": "d69d7804cf9e2ba171a27e5f98bc266f13d0414a" }, - "CVE-2020-25671": { - "cmt_msg": "nfc: fix refcount leak in llcp_sock_connect()" + "CVE-2023-52449": { + "cmt_msg": "mtd: Fix gluebi NULL pointer dereference caused by ftl notifier", + "cmt_id": "5389407bba1eab1266c6d83e226fb0840cb98dd5" }, - "CVE-2018-21008": { - "cmt_msg": "rsi: add fix for crash during assertions" + "CVE-2023-52469": { + "cmt_msg": "drivers/amd/pm: fix a use-after-free in kv_parse_power_table", + "cmt_id": "35fa2394d26e919f63600ce631e6aefc95ec2706" }, - "CVE-2019-15223": { - "cmt_msg": "ALSA: line6: Assure canceling delayed work at disconnection" + "CVE-2023-6536": { + "cmt_msg": "nvmet-tcp: fix a crash in nvmet_req_complete()", + "cmt_id": "83ccd15717ee2b6143df72df39685f0c832e3451" }, - "CVE-2019-15220": { - "cmt_msg": "p54usb: Fix race between disconnect and firmware loading" + "CVE-2024-26633": { + "cmt_msg": "ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim()", + "cmt_id": "62a1fedeb14c7ac0947ef33fadbabd35ed2400a2" }, - "CVE-2019-15221": { - "cmt_msg": "ALSA: line6: Fix write on zero-sized buffer" + "CVE-2024-26632": { + "cmt_msg": "block: Fix iterating over an empty bio with bio_for_each_folio_all", + "cmt_id": "c6350b5cb78e9024c49eaee6fdb914ad2903a5fe" }, - "CVE-2019-19814": { - "cmt_msg": "" + "CVE-2024-26631": { + "cmt_msg": "ipv6: mcast: fix data-race in ipv6_mc_down / mld_ifc_work", + "cmt_id": "380540bb06bb1d1b12bdc947d1b8f56cda6b5663" + } + }, + "6.1.76": { + "CVE-2024-26610": { + "cmt_msg": "wifi: iwlwifi: fix a memory corruption", + "cmt_id": "aa2cc9363926991ba74411e3aa0a0ea82c1ffe32" }, - "CVE-2020-29371": { - "cmt_msg": "romfs: fix uninitialized memory leak in romfs_dev_read()" + "CVE-2024-26612": { + "cmt_msg": "netfs, fscache: Prevent Oops in fscache_put_cache()", + "cmt_id": "82a9bc343ba019665d3ddc1d9a180bf0e0390cf3" }, - "CVE-2019-19816": { - "cmt_msg": "btrfs: inode: Verify inode mode to avoid NULL pointer dereference" + "CVE-2024-26615": { + "cmt_msg": "net/smc: fix illegal rmb_desc access in SMC-D connection dump", + "cmt_id": "6994dba06321e3c48fdad0ba796a063d9d82183a" }, - "CVE-2017-16939": { - "cmt_msg": "ipsec: Fix aborted xfrm policy dump crash" + "CVE-2024-26614": { + "cmt_msg": "tcp: make sure init the accept_queue's spinlocks once", + "cmt_id": "b1e0a68a0cd2a83259c444f638b417a8fffc6855" }, - "CVE-2019-9453": { - "cmt_msg": "f2fs: fix to avoid accessing xattr across the boundary" + "CVE-2024-26650": { + "cmt_msg": "platform/x86: p2sb: Allow p2sb_bar() calls during PCI device probe", + "cmt_id": "2841631a03652f32b595c563695d0461072e0de4" }, - "CVE-2022-1016": { - "cmt_msg": "netfilter: nf_tables: initialize registers in nft_do_chain()" + "CVE-2023-52615": { + "cmt_msg": "hwrng: core - Fix page fault dead lock on mmap-ed hwrng", + "cmt_id": "aa8aa16ed9adf1df05bb339d588cf485a011839e" }, - "CVE-2018-18710": { - "cmt_msg": "cdrom: fix improper type cast, which can leat to information leak." + "CVE-2023-52614": { + "cmt_msg": "PM / devfreq: Fix buffer overflow in trans_stat_show", + "cmt_id": "8a7729cda2dd276d7a3994638038fb89035b6f2c" }, - "CVE-2016-2188": { - "cmt_msg": "USB: iowarrior: fix NULL-deref at probe" + "CVE-2023-52498": { + "cmt_msg": "PM: sleep: Fix possible deadlocks in core system-wide PM code", + "cmt_id": "e1c9d32c98309ae764893a481552d3f99d46cb34" }, - "CVE-2022-1012": { - "cmt_msg": "secure_seq: use the 64 bits of the siphash for port offset calculation" + "CVE-2023-52493": { + "cmt_msg": "bus: mhi: host: Drop chan lock before queuing buffers", + "cmt_id": "3c5ec66b4b3f6816f3a6161538672e389e537690" }, - "CVE-2023-31436": { - "cmt_msg": "net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg" + "CVE-2023-52492": { + "cmt_msg": "dmaengine: fix NULL pointer in channel unregistration function", + "cmt_id": "2ab32986a0b9e329eb7f8f04dd57cc127f797c08" }, - "CVE-2020-12114": { - "cmt_msg": "make struct mountpoint bear the dentry reference to mountpoint, not struct mount" + "CVE-2024-1086": { + "cmt_msg": "netfilter: nf_tables: reject QUEUE/DROP verdict parameters", + "cmt_id": "8e34430e33b8a80bc014f3efe29cac76bc30a4b4" }, - "CVE-2020-8649": { - "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region" + "CVE-2023-52497": { + "cmt_msg": "erofs: fix lz4 inplace decompression", + "cmt_id": "33bf23c9940dbd3a22aad7f0cda4c84ed5701847" }, - "CVE-2020-12656": { - "cmt_msg": "sunrpc: check that domain table is empty at module unload." + "CVE-2023-52494": { + "cmt_msg": "bus: mhi: host: Add alignment check for event ring read pointer", + "cmt_id": "2df39ac8f813860f79782807c3f7acff40b3c551" }, - "CVE-2017-1000405": { - "cmt_msg": "mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d()" + "CVE-2024-23849": { + "cmt_msg": "net/rds: Fix UBSAN: array-index-out-of-bounds in rds_cmsg_recv", + "cmt_id": "71024928b3f71ce4529426f8692943205c58d30b" }, - "CVE-2021-26930": { - "cmt_msg": "xen-blkback: fix error handling in xen_blkbk_map()" + "CVE-2024-26620": { + "cmt_msg": "s390/vfio-ap: always filter entire AP matrix", + "cmt_id": "d6b8d034b576f406af920a7bee81606c027b24c6" }, - "CVE-2017-1000407": { - "cmt_msg": "KVM: VMX: remove I/O port 0x80 bypass on Intel hosts" + "CVE-2024-26644": { + "cmt_msg": "btrfs: don't abort filesystem when attempting to snapshot deleted subvolume", + "cmt_id": "6e6bca99e8d88d989a7cde4c064abea552d5219b" }, - "CVE-2021-26932": { - "cmt_msg": "Xen/x86: don't bail early from clear_foreign_p2m_mapping()" + "CVE-2024-26668": { + "cmt_msg": "netfilter: nft_limit: reject configurations that cause integer overflow", + "cmt_id": "bc6e242bb74e2ae616bfd2b250682b738e781c9b" }, - "CVE-2024-25740": { - "cmt_msg": "" + "CVE-2024-26607": { + "cmt_msg": "drm/bridge: sii902x: Fix probing race issue", + "cmt_id": "e0f83c234ea7a3dec1f84e5d02caa1c51664a076" }, - "CVE-2023-52456": { - "cmt_msg": "serial: imx: fix tx statemachine deadlock" + "CVE-2024-26646": { + "cmt_msg": "thermal: intel: hfi: Add syscore callbacks for system-wide PM", + "cmt_id": "28f010dc50df0f7987c04112114fcfa7e0803566" }, - "CVE-2023-3141": { - "cmt_msg": "memstick: r592: Fix UAF bug in r592_remove due to race condition" + "CVE-2024-26608": { + "cmt_msg": "ksmbd: fix global oob in ksmbd_nl_policy", + "cmt_id": "2c939c74ef0b74e99b92e32edc2a59f9b9ca3d5a" }, - "CVE-2023-37454": { - "cmt_msg": "" + "CVE-2024-26645": { + "cmt_msg": "tracing: Ensure visibility when inserting an element into tracing_map", + "cmt_id": "f4f7e696db0274ff560482cc52eddbf0551d4b7a" }, - "CVE-2019-13648": { - "cmt_msg": "powerpc/tm: Fix oops on sigreturn on systems without TM" + "CVE-2024-26808": { + "cmt_msg": "netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain", + "cmt_id": "af149a46890e8285d1618bd68b8d159bdb87fdb3" }, - "CVE-2016-9555": { - "cmt_msg": "sctp: validate chunk len before actually using it" + "CVE-2023-52488": { + "cmt_msg": "serial: sc16is7xx: convert from _raw_ to _noinc_ regmap functions for FIFO", + "cmt_id": "416b10d2817c94db86829fb92ad43ce7d002c573" }, - "CVE-2019-3892": { - "cmt_msg": "coredump: fix race condition between mmget_not_zero()/get_task_mm() and core dumping" + "CVE-2023-52489": { + "cmt_msg": "mm/sparsemem: fix race in accessing memory_section->usage", + "cmt_id": "68ed9e33324021e9d6b798e9db00ca3093d2012a" }, - "CVE-2020-12352": { - "cmt_msg": "Bluetooth: A2MP: Fix not initializing all members" + "CVE-2023-52627": { + "cmt_msg": "iio: adc: ad7091r: Allow users to configure device events", + "cmt_id": "137568aa540a9f587c48ff7d4c51cdba08cfe9a4" }, - "CVE-2014-4943": { - "cmt_msg": "net/l2tp: don't fall back on UDP [get|set]sockopt" + "CVE-2023-52486": { + "cmt_msg": "drm: Don't unref the same fb many times by mistake due to deadlock handling", + "cmt_id": "62f2e79cf9f4f47cc9dea9cebdf58d9f7b5695e0" }, - "CVE-2022-23042": { - "cmt_msg": "xen/netfront: react properly to failing gnttab_end_foreign_access_ref()" + "CVE-2023-52608": { + "cmt_msg": "firmware: arm_scmi: Check mailbox/SMT channel for consistency", + "cmt_id": "7f95f6997f4fdd17abec3200cae45420a5489350" }, - "CVE-2021-43976": { - "cmt_msg": "mwifiex: Fix skb_over_panic in mwifiex_usb_recv()" + "CVE-2024-26636": { + "cmt_msg": "llc: make llc_ui_sendmsg() more robust against bonding changes", + "cmt_id": "6d53b813ff8b177f86f149c2f744442681f720e4" }, - "CVE-2022-0494": { - "cmt_msg": "block-map: add __GFP_ZERO flag for alloc_page in function bio_copy_kern" + "CVE-2024-26638": { + "cmt_msg": "nbd: always initialize struct msghdr completely", + "cmt_id": "d9c54763e5cdbbd3f81868597fe8aca3c96e6387" }, - "CVE-2023-2269": { - "cmt_msg": "dm ioctl: fix nested locking in table_clear() to remove deadlock concern" + "CVE-2023-52491": { + "cmt_msg": "media: mtk-jpeg: Fix use after free bug due to error path handling in mtk_jpeg_dec_device_run", + "cmt_id": "9fec4db7fff54d9b0306a332bab31eac47eeb5f6" }, - "CVE-2021-26931": { - "cmt_msg": "xen-blkback: don't \"handle\" error by BUG()" + "CVE-2024-26635": { + "cmt_msg": "llc: Drop support for ETH_P_TR_802_2.", + "cmt_id": "660c3053d992b68fee893a0e9ec9159228cffdc6" + } + }, + "6.1.77": { + "CVE-2024-26673": { + "cmt_msg": "netfilter: nft_ct: sanitize layer 3 and 4 protocol number in custom expectations", + "cmt_id": "0f501dae16b7099e69ee9b0d5c70b8f40fd30e98" }, - "CVE-2015-7513": { - "cmt_msg": "KVM: x86: Reload pit counters for all channels when restoring state" + "CVE-2024-26671": { + "cmt_msg": "blk-mq: fix IO hang from sbitmap wakeup race", + "cmt_id": "1d9c777d3e70bdc57dddf7a14a80059d65919e56" }, - "CVE-2022-3523": { - "cmt_msg": "mm/memory.c: fix race when faulting a device private page" + "CVE-2023-52584": { + "cmt_msg": "spmi: mediatek: Fix UAF on device remove", + "cmt_id": "521f28eedd6b14228c46e3b81e3bf9b90c2818d8" }, - "CVE-2015-7515": { - "cmt_msg": "Input: aiptek - fix crash on detecting device without endpoints" + "CVE-2023-52587": { + "cmt_msg": "IB/ipoib: Fix mcast list locking", + "cmt_id": "5108a2dc2db5630fb6cd58b8be80a0c134bc310a" }, - "CVE-2008-2544": { - "cmt_msg": "" + "CVE-2023-52583": { + "cmt_msg": "ceph: fix deadlock or deadcode of misusing dget()", + "cmt_id": "7f2649c94264d00df6b6ac27161e9f4372a3450e" }, - "CVE-2021-3178": { - "cmt_msg": "nfsd4: readdirplus shouldn't return parent of export" + "CVE-2023-52635": { + "cmt_msg": "PM / devfreq: Synchronize devfreq_monitor_[start/stop]", + "cmt_id": "31569995fc65007b73a3fff605ec2b3401b435e9" }, - "CVE-2022-2318": { - "cmt_msg": "net: rose: fix UAF bugs caused by timer handler" + "CVE-2023-52589": { + "cmt_msg": "media: rkisp1: Fix IRQ disable race issue", + "cmt_id": "bf808f58681cab64c81cd814551814fd34e540fe" }, - "CVE-2020-10690": { - "cmt_msg": "ptp: fix the race between the release of ptp_clock and cdev" + "CVE-2023-52588": { + "cmt_msg": "f2fs: fix to tag gcing flag on page during block migration", + "cmt_id": "7c972c89457511007dfc933814c06786905e515c" }, - "CVE-2018-7755": { - "cmt_msg": "floppy: Do not copy a kernel pointer to user memory in FDGETPRM ioctl" + "CVE-2023-52617": { + "cmt_msg": "PCI: switchtec: Fix stdev_release() crash after surprise hot remove", + "cmt_id": "1d83c85922647758c1f1e4806a4c5c3cf591a20a" }, - "CVE-2017-7346": { - "cmt_msg": "drm/vmwgfx: limit the number of mip levels in vmw_gb_surface_define_ioctl()" + "CVE-2023-52633": { + "cmt_msg": "um: time-travel: fix time corruption", + "cmt_id": "4f7dad73df4cdb2b7042103d3922745d040ad025" }, - "CVE-2018-7757": { - "cmt_msg": "scsi: libsas: fix memory leak in sas_smp_get_phy_events()" + "CVE-2023-52619": { + "cmt_msg": "pstore/ram: Fix crash when setting number of cpus to an odd number", + "cmt_id": "75b0f71b26b3ad833c5c0670109c0af6e021e86a" }, - "CVE-2023-7192": { - "cmt_msg": "netfilter: ctnetlink: fix possible refcount leak in ctnetlink_create_conntrack()" + "CVE-2023-52618": { + "cmt_msg": "block/rnbd-srv: Check for unlikely string overflow", + "cmt_id": "af7bbdac89739e2e7380387fda598848d3b7010f" }, - "CVE-2022-0330": { - "cmt_msg": "drm/i915: Flush TLBs before releasing backing store" + "CVE-2023-52632": { + "cmt_msg": "drm/amdkfd: Fix lock dependency warning with srcu", + "cmt_id": "b602f098f716723fa5c6c96a486e0afba83b7b94" }, - "CVE-2007-3719": { - "cmt_msg": "" + "CVE-2024-26625": { + "cmt_msg": "llc: call sock_orphan() at release time", + "cmt_id": "9c333d9891f34cea8af1b229dc754552304c8eee" }, - "CVE-2023-3863": { - "cmt_msg": "net: nfc: Fix use-after-free caused by nfc_llcp_find_local" + "CVE-2024-26627": { + "cmt_msg": "scsi: core: Move scsi_host_busy() out of host lock for waking up EH handler", + "cmt_id": "db6338f45971b4285ea368432a84033690eaf53c" }, - "CVE-2023-0590": { - "cmt_msg": "net: sched: fix race condition in qdisc_graft()" + "CVE-2023-52621": { + "cmt_msg": "bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers", + "cmt_id": "d6d6fe4bb105595118f12abeed4a7bdd450853f3" }, - "CVE-2022-4095": { - "cmt_msg": "staging: rtl8712: fix use after free bugs" + "CVE-2023-52622": { + "cmt_msg": "ext4: avoid online resizing failures due to oversized flex bg", + "cmt_id": "6d2cbf517dcabc093159cf138ad5712c9c7fa954" }, - "CVE-2017-10911": { - "cmt_msg": "xen-blkback: don't leak stack data via response ring" + "CVE-2024-26640": { + "cmt_msg": "tcp: add sanity checks to rx zerocopy", + "cmt_id": "b383d4ea272fe5795877506dcce5aad1f6330e5e" }, - "CVE-2023-34255": { - "cmt_msg": "xfs: verify buffer contents when we skip log replay" + "CVE-2024-26641": { + "cmt_msg": "ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv()", + "cmt_id": "d54e4da98bbfa8c257bdca94c49652d81d18a4d8" }, - "CVE-2022-45919": { - "cmt_msg": "media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221" + "CVE-2023-52597": { + "cmt_msg": "KVM: s390: fix setting of fpc register", + "cmt_id": "0671f42a9c1084db10d68ac347d08dbf6689ecb3" }, - "CVE-2019-19319": { - "cmt_msg": "ext4: protect journal inode's blocks using block_validity" + "CVE-2023-52594": { + "cmt_msg": "wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus()", + "cmt_id": "25c6f49ef59b7a9b80a3f7ab9e95268a1b01a234" }, - "CVE-2023-2248": { - "cmt_msg": "net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg" + "CVE-2023-52595": { + "cmt_msg": "wifi: rt2x00: restart beacon queue when hardware reset", + "cmt_id": "739b3ccd9486dff04af95f9a890846d088a84957" }, - "CVE-2017-18017": { - "cmt_msg": "netfilter: xt_TCPMSS: add more sanity tests on tcph->doff" + "CVE-2023-52593": { + "cmt_msg": "wifi: wfx: fix possible NULL pointer dereference in wfx_set_mfp_ap()", + "cmt_id": "574dcd3126aa2eed75437137843f254b1190dd03" }, - "CVE-2022-24958": { - "cmt_msg": "usb: gadget: don't release an existing dev->buf" + "CVE-2023-52598": { + "cmt_msg": "s390/ptrace: handle setting of fpc register correctly", + "cmt_id": "7a4d6481fbdd661f9e40e95febb95e3dee82bad3" }, - "CVE-2023-1611": { - "cmt_msg": "btrfs: fix race between quota disable and quota assign ioctls" + "CVE-2023-52599": { + "cmt_msg": "jfs: fix array-index-out-of-bounds in diNewExt", + "cmt_id": "3537f92cd22c672db97fae6997481e678ad14641" }, - "CVE-2021-3772": { - "cmt_msg": "sctp: use init_tag from inithdr for ABORT chunk" + "CVE-2023-52606": { + "cmt_msg": "powerpc/lib: Validate size for vector operations", + "cmt_id": "abd26515d4b767ba48241eea77b28ce0872aef3e" }, - "CVE-2021-3679": { - "cmt_msg": "tracing: Fix bug in rb_per_cpu_empty() that might cause deadloop." + "CVE-2023-52607": { + "cmt_msg": "powerpc/mm: Fix null-pointer dereference in pgtable_cache_add", + "cmt_id": "d482d61025e303a2bef3733a011b6b740215cfa1" }, - "CVE-2021-37159": { - "cmt_msg": "usb: hso: fix error handling code of hso_create_net_device" + "CVE-2023-52604": { + "cmt_msg": "FS:JFS:UBSAN:array-index-out-of-bounds in dbAdjTree", + "cmt_id": "42f433785f108893de0dd5260bafb85d7d51db03" }, - "CVE-2022-3628": { - "cmt_msg": "wifi: brcmfmac: Fix potential buffer overflow in brcmf_fweh_event_worker()" + "CVE-2023-52623": { + "cmt_msg": "SUNRPC: Fix a suspicious RCU usage warning", + "cmt_id": "e8ca3e73301e23e8c0ac0ce2e6bac4545cd776e0" }, - "CVE-2016-7042": { - "cmt_msg": "KEYS: Fix short sprintf buffer in /proc/keys show function" + "CVE-2023-52602": { + "cmt_msg": "jfs: fix slab-out-of-bounds Read in dtSearch", + "cmt_id": "cab0c265ba182fd266c2aa3c69d7e40640a7f612" }, - "CVE-2021-34556": { - "cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4" + "CVE-2023-52603": { + "cmt_msg": "UBSAN: array-index-out-of-bounds in dtSplitRoot", + "cmt_id": "e4cbc857d75d4e22a1f75446e7480b1f305d8d60" }, - "CVE-2021-28713": { - "cmt_msg": "xen/console: harden hvc_xen against event channel storms" + "CVE-2023-52600": { + "cmt_msg": "jfs: fix uaf in jfs_evict_inode", + "cmt_id": "32e8f2d95528d45828c613417cb2827d866cbdce" }, - "CVE-2021-28712": { - "cmt_msg": "xen/netfront: harden netfront against event channel storms" + "CVE-2023-52601": { + "cmt_msg": "jfs: fix array-index-out-of-bounds in dbAdjTree", + "cmt_id": "70780914cb57e2ba711e0ac1b677aaaa75103603" + } + }, + "6.1.78": { + "CVE-2024-26676": { + "cmt_msg": "af_unix: Call kfree_skb() for dead unix_(sk)->oob_skb in GC.", + "cmt_id": "e0e09186d8821ad59806115d347ea32efa43ca4b" }, - "CVE-2017-18261": { - "cmt_msg": "clocksource/drivers/arm_arch_timer: Avoid infinite recursion when ftrace is enabled" + "CVE-2024-26600": { + "cmt_msg": "phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP", + "cmt_id": "0430bfcd46657d9116a26cd377f112cbc40826a4" }, - "CVE-2022-1247": { - "cmt_msg": "" + "CVE-2024-26601": { + "cmt_msg": "ext4: regenerate buddy after block freeing failed if under fc replay", + "cmt_id": "78327acd4cdc4a1601af718b781eece577b6b7d4" }, - "CVE-2023-51782": { - "cmt_msg": "net/rose: Fix Use-After-Free in rose_ioctl" + "CVE-2024-26681": { + "cmt_msg": "netdevsim: avoid potential loop in nsim_dev_trap_report_work()", + "cmt_id": "0193e0660cc6689c794794b471492923cfd7bfbc" }, - "CVE-2022-3621": { - "cmt_msg": "nilfs2: fix NULL pointer dereference at nilfs_bmap_lookup_at_level()" + "CVE-2024-26660": { + "cmt_msg": "drm/amd/display: Implement bounds check for stream encoder creation in DCN301", + "cmt_id": "efdd665ce1a1634b8c1dad5e7f6baaef3e131d0a" }, - "CVE-2017-11473": { - "cmt_msg": "x86/acpi: Prevent out of bound access caused by broken ACPI tables" + "CVE-2024-26680": { + "cmt_msg": "net: atlantic: Fix DMA mapping for PTP hwts ring", + "cmt_id": "466ceebe48cbba3f4506f165fca7111f9eb8bb12" }, - "CVE-2017-11472": { - "cmt_msg": "ACPICA: Namespace: fix operand cache leak" + "CVE-2024-26663": { + "cmt_msg": "tipc: Check the bearer type before calling tipc_udp_nl_bearer_add()", + "cmt_id": "3d3a5b31b43515b5752ff282702ca546ec3e48b6" }, - "CVE-2022-3624": { - "cmt_msg": "bonding: fix reference count leak in balance-alb mode" + "CVE-2024-26664": { + "cmt_msg": "hwmon: (coretemp) Fix out-of-bounds memory access", + "cmt_id": "9bce69419271eb8b2b3ab467387cb59c99d80deb" }, - "CVE-2016-9120": { - "cmt_msg": "staging/android/ion : fix a race condition in the ion driver" + "CVE-2024-26665": { + "cmt_msg": "tunnels: fix out of bounds access when building IPv6 PMTU error", + "cmt_id": "e37cde7a5716466ff2a76f7f27f0a29b05b9a732" }, - "CVE-2021-39657": { - "cmt_msg": "scsi: ufs: Correct the LUN used in eh_device_reset_handler() callback" + "CVE-2024-26679": { + "cmt_msg": "inet: read sk->sk_family once in inet_recv_error()", + "cmt_id": "54538752216bf89ee88d47ad07802063a498c299" }, - "CVE-2021-3669": { - "cmt_msg": "ipc: replace costly bailout check in sysvipc_find_ipc()" + "CVE-2024-26667": { + "cmt_msg": "drm/msm/dpu: check for valid hw_pp in dpu_encoder_helper_phys_cleanup", + "cmt_id": "fb8bfc6ea3cd8c5ac3d35711d064e2f6646aec17" }, - "CVE-2019-18885": { - "cmt_msg": "btrfs: merge btrfs_find_device and find_device" + "CVE-2024-26675": { + "cmt_msg": "ppp_async: limit MRU to 64K", + "cmt_id": "4e2c4846b2507f6dfc9bea72b7567c2693a82a16" }, - "CVE-2017-7889": { - "cmt_msg": "mm: Tighten x86 /dev/mem with zeroing reads" + "CVE-2024-0340": { + "cmt_msg": "vhost: use kzalloc() instead of kmalloc() followed by memset()", + "cmt_id": "4675661672e3730597babf97c4e9593a775c8917" }, - "CVE-2019-12378": { - "cmt_msg": "ipv6_sockglue: Fix a missing-check bug in ip6_ra_control()" + "CVE-2024-26684": { + "cmt_msg": "net: stmmac: xgmac: fix handling of DPP safety error for DMA channels", + "cmt_id": "e42ff0844fe418c7d03a14f9f90e1b91ba119591" }, - "CVE-2019-11091": { - "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" + "CVE-2023-52631": { + "cmt_msg": "fs/ntfs3: Fix an NULL dereference bug", + "cmt_id": "ec1bedd797588fe38fc11cba26d77bb1d9b194c6" }, - "CVE-2022-4543": { - "cmt_msg": "" + "CVE-2023-52630": { + "cmt_msg": "blk-iocost: Fix an UBSAN shift-out-of-bounds warning", + "cmt_id": "e5dc63f01e027721c29f82069f7e97e2149fa131" + } + }, + "6.1.79": { + "CVE-2024-26593": { + "cmt_msg": "i2c: i801: Fix block process call transactions", + "cmt_id": "491528935c9c48bf341d8b40eabc6c4fc5df6f2c" }, - "CVE-2019-18660": { - "cmt_msg": "powerpc/book3s64: Fix link stack flush on context switch" + "CVE-2024-1151": { + "cmt_msg": "net: openvswitch: limit the number of recursions from action sets", + "cmt_id": "65ded4eb220695909eee657758e824fc30f0b561" }, - "CVE-2023-4921": { - "cmt_msg": "net: sched: sch_qfq: Fix UAF in qfq_dequeue()" + "CVE-2024-26720": { + "cmt_msg": "mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again", + "cmt_id": "16b1025eaa8fc223ab4273ece20d1c3a4211a95d" }, - "CVE-2022-3424": { - "cmt_msg": "misc: sgi-gru: fix use-after-free error in gru_set_context_option, gru_fault and gru_handle_user_call_os" + "CVE-2024-26723": { + "cmt_msg": "lan966x: Fix crash when adding interface under a lag", + "cmt_id": "b9357489c46c7a43999964628db8b47d3a1f8672" }, - "CVE-2017-15649": { - "cmt_msg": "packet: in packet_do_bind, test fanout with bind_lock held" + "CVE-2023-52638": { + "cmt_msg": "can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock", + "cmt_id": "aedda066d717a0b4335d7e0a00b2e3a61e40afcf" }, - "CVE-2017-11089": { - "cmt_msg": "cfg80211: Define nla_policy for NL80211_ATTR_LOCAL_MESH_POWER_MODE" + "CVE-2023-52637": { + "cmt_msg": "can: j1939: Fix UAF in j1939_sk_match_filter during setsockopt(SO_J1939_FILTER)", + "cmt_id": "4dd684d4bb3cd5454e0bf6e2a1bdfbd5c9c872ed" }, - "CVE-2023-1829": { - "cmt_msg": "net/sched: Retire tcindex classifier" + "CVE-2023-52435": { + "cmt_msg": "net: prevent mss overflow in skb_segment()", + "cmt_id": "989b0ff35fe5fc9652ee5bafbe8483db6f27b137" }, - "CVE-2019-19227": { - "cmt_msg": "appletalk: Fix potential NULL pointer dereference in unregister_snap_client" + "CVE-2023-52434": { + "cmt_msg": "smb: client: fix potential OOBs in smb2_parse_contexts()", + "cmt_id": "1ae3c59355dc9882e09c020afe8ffbd895ad0f29" }, - "CVE-2021-34981": { - "cmt_msg": "Bluetooth: cmtp: fix file refcount when cmtp_attach_device fails" + "CVE-2024-26688": { + "cmt_msg": "fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super", + "cmt_id": "2e2c07104b4904aed1389a59b25799b95a85b5b9" }, - "CVE-2023-1670": { - "cmt_msg": "xirc2ps_cs: Fix use after free bug in xirc2ps_detach" + "CVE-2023-52616": { + "cmt_msg": "crypto: lib/mpi - Fix unexpected pointer access in mpi_ec_init", + "cmt_id": "bb44477d4506e52785693a39f03cdc6a2c5e8598" }, - "CVE-2017-14489": { - "cmt_msg": "scsi: scsi_transport_iscsi: fix the issue that iscsi_if_rx doesn't parse nlmsg properly" + "CVE-2024-26726": { + "cmt_msg": "btrfs: don't drop extent_map for free space inode on write error", + "cmt_id": "02f2b95b00bf57d20320ee168b30fb7f3db8e555" }, - "CVE-2023-6915": { - "cmt_msg": "ida: Fix crash in ida_free when the bitmap is empty" + "CVE-2024-26685": { + "cmt_msg": "nilfs2: fix potential bug in end_buffer_async_write", + "cmt_id": "6589f0f72f8edd1fa11adce4eedbd3615f2e78ab" }, - "CVE-2022-20148": { - "cmt_msg": "f2fs: fix UAF in f2fs_available_free_memory" + "CVE-2024-26629": { + "cmt_msg": "nfsd: fix RELEASE_LOCKOWNER", + "cmt_id": "e4cf8941664cae2f89f0189c29fe2ce8c6be0d03" }, - "CVE-2023-30456": { - "cmt_msg": "KVM: nVMX: add missing consistency checks for CR0 and CR4" + "CVE-2024-26702": { + "cmt_msg": "iio: magnetometer: rm3100: add boundary check for the value read from RM3100_REG_TMRC", + "cmt_id": "176256ff8abff29335ecff905a09fb49e8dcf513" }, - "CVE-2018-9422": { - "cmt_msg": "futex: Remove requirement for lock_page() in get_futex_key()" + "CVE-2024-26707": { + "cmt_msg": "net: hsr: remove WARN_ONCE() in send_hsr_supervision_frame()", + "cmt_id": "56440799fc4621c279df16176f83a995d056023a" }, - "CVE-2013-7445": { - "cmt_msg": "" + "CVE-2024-26706": { + "cmt_msg": "parisc: Fix random data corruption from exception handler", + "cmt_id": "23027309b099ffc4efca5477009a11dccbdae592" }, - "CVE-2016-9604": { - "cmt_msg": "KEYS: Disallow keyrings beginning with '.' to be joined as session keyrings" + "CVE-2024-0841": { + "cmt_msg": "fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super", + "cmt_id": "2e2c07104b4904aed1389a59b25799b95a85b5b9" }, - "CVE-2022-3646": { - "cmt_msg": "nilfs2: fix leak of nilfs_root in case of writer thread creation failure" + "CVE-2024-26704": { + "cmt_msg": "ext4: fix double-free of blocks due to wrong extents moved_len", + "cmt_id": "185eab30486ba3e7bf8b9c2e049c79a06ffd2bc1" }, - "CVE-2015-8551": { - "cmt_msg": "xen/pciback: Return error on XEN_PCI_OP_enable_msi when device has MSI or MSI-X enabled" + "CVE-2024-26602": { + "cmt_msg": "sched/membarrier: reduce the ability to hammer on sys_membarrier", + "cmt_id": "24ec7504a08a67247fbe798d1de995208a8c128a" }, - "CVE-2019-15292": { - "cmt_msg": "appletalk: Fix use-after-free in atalk_proc_exit" + "CVE-2024-26603": { + "cmt_msg": "x86/fpu: Stop relying on userspace for info to fault in xsave buffer", + "cmt_id": "627339cccdc9166792ecf96bc3c9f711a60ce996" }, - "CVE-2020-12652": { - "cmt_msg": "scsi: mptfusion: Fix double fetch bug in ioctl" + "CVE-2024-26583": { + "cmt_msg": "tls: fix race between async notify and socket close", + "cmt_id": "7a3ca06d04d589deec81f56229a9a9d62352ce01" }, - "CVE-2022-45934": { - "cmt_msg": "Bluetooth: L2CAP: Fix u8 overflow" + "CVE-2024-26582": { + "cmt_msg": "net: tls: fix use-after-free with partial reads and async decrypt", + "cmt_id": "20b4ed034872b4d024b26e2bc1092c3f80e5db96" }, - "CVE-2015-8550": { - "cmt_msg": "xen: Add RING_COPY_REQUEST()" + "CVE-2024-26606": { + "cmt_msg": "binder: signal epoll threads of self-work", + "cmt_id": "90e09c016d72b91e76de25f71c7b93d94cc3c769" }, - "CVE-2017-14340": { - "cmt_msg": "xfs: XFS_IS_REALTIME_INODE() should be false if no rt device present" + "CVE-2024-26727": { + "cmt_msg": "btrfs: do not ASSERT() if the newly created subvolume already got read", + "cmt_id": "66b317a2fc45b2ef66527ee3f8fa08fb5beab88d" }, - "CVE-2019-15217": { - "cmt_msg": "media: usb:zr364xx:Fix KASAN:null-ptr-deref Read in zr364xx_vidioc_querycap" + "CVE-2024-26586": { + "cmt_msg": "mlxsw: spectrum_acl_tcam: Fix stack corruption", + "cmt_id": "6fd24675188d354b1cad47462969afa2ab09d819" }, - "CVE-2017-15868": { - "cmt_msg": "Bluetooth: bnep: bnep_add_connection() should verify that it's dealing with l2cap socket" + "CVE-2024-26689": { + "cmt_msg": "ceph: prevent use-after-free in encode_cap_msg()", + "cmt_id": "f3f98d7d84b31828004545e29fd7262b9f444139" }, - "CVE-2022-26966": { - "cmt_msg": "sr9700: sanity check for packet length" + "CVE-2024-26698": { + "cmt_msg": "hv_netvsc: Fix race condition between netvsc_probe and netvsc_remove", + "cmt_id": "48a8ccccffbae10c91d31fc872db5c31aba07518" }, - "CVE-2016-3672": { - "cmt_msg": "x86/mm/32: Enable full randomization on i386 and X86_32" + "CVE-2024-26695": { + "cmt_msg": "crypto: ccp - Fix null pointer dereference in __sev_platform_shutdown_locked", + "cmt_id": "8731fe001a60581794ed9cf65da8cd304846a6fb" }, - "CVE-2015-9004": { - "cmt_msg": "perf: Tighten (and fix) the grouping condition" + "CVE-2024-26697": { + "cmt_msg": "nilfs2: fix data corruption in dsync block recovery for small block sizes", + "cmt_id": "9c9c68d64fd3284f7097ed6ae057c8441f39fcd3" }, - "CVE-2021-34693": { - "cmt_msg": "can: bcm: fix infoleak in struct bcm_msg_head" + "CVE-2024-26696": { + "cmt_msg": "nilfs2: fix hang in nilfs_lookup_dirty_data_buffers()", + "cmt_id": "8494ba2c9ea00a54d5b50e69b22c55a8958bce32" }, - "CVE-2024-26591": { - "cmt_msg": "bpf: Fix re-attachment branch in bpf_tracing_prog_attach" + "CVE-2023-52429": { + "cmt_msg": "dm: limit the number of targets and parameter size area", + "cmt_id": "c5d83ac2bf6ca668a39ffb1a576899a66153ba19" }, - "CVE-2020-14381": { - "cmt_msg": "futex: Fix inode life-time issue" + "CVE-2024-23850": { + "cmt_msg": "btrfs: do not ASSERT() if the newly created subvolume already got read", + "cmt_id": "66b317a2fc45b2ef66527ee3f8fa08fb5beab88d" }, - "CVE-2014-3180": { - "cmt_msg": "compat: nanosleep: Clarify error handling" + "CVE-2024-23851": { + "cmt_msg": "dm: limit the number of targets and parameter size area", + "cmt_id": "c5d83ac2bf6ca668a39ffb1a576899a66153ba19" }, - "CVE-2019-19768": { - "cmt_msg": "blktrace: Protect q->blk_trace with RCU" + "CVE-2024-26714": { + "cmt_msg": "interconnect: qcom: sc8180x: Mark CO0 BCM keepalive", + "cmt_id": "6616d3c4f8284a7b3ef978c916566bd240cea1c7" }, - "CVE-2022-3303": { - "cmt_msg": "ALSA: pcm: oss: Fix race at SNDCTL_DSP_SYNC" + "CVE-2024-26715": { + "cmt_msg": "usb: dwc3: gadget: Fix NULL pointer dereference in dwc3_gadget_suspend", + "cmt_id": "57e2e42ccd3cd6183228269715ed032f44536751" }, - "CVE-2019-19039": { - "cmt_msg": "btrfs: Don't submit any btree write bio if the fs has errors" + "CVE-2024-26717": { + "cmt_msg": "HID: i2c-hid-of: fix NULL-deref on failed power up", + "cmt_id": "d7d7a0e3b6f5adc45f23667cbb919e99093a5b5c" }, - "CVE-2017-5715": { - "cmt_msg": "x86/cpufeatures: Add X86_BUG_SPECTRE_V[12]" + "CVE-2024-26718": { + "cmt_msg": "dm-crypt, dm-verity: disable tasklets", + "cmt_id": "30884a44e0cedc3dfda8c22432f3ba4078ec2d94" }, - "CVE-2022-20141": { - "cmt_msg": "igmp: Add ip_mc_list lock in ip_check_mc_rcu" + "CVE-2024-26712": { + "cmt_msg": "powerpc/kasan: Fix addr error caused by page alignment", + "cmt_id": "0c09912dd8387e228afcc5e34ac5d79b1e3a1058" + } + }, + "6.1.80": { + "CVE-2024-26733": { + "cmt_msg": "arp: Prevent overflow in arp_req_get().", + "cmt_id": "f119f2325ba70cbfdec701000dcad4d88805d5b0" }, - "CVE-2023-23455": { - "cmt_msg": "net: sched: atm: dont intepret cls results when asked to drop" + "CVE-2024-26590": { + "cmt_msg": "erofs: fix inconsistent per-file compression format", + "cmt_id": "47467e04816cb297905c0f09bc2d11ef865942d9" }, - "CVE-2023-23454": { - "cmt_msg": "net: sched: cbq: dont intepret cls results when asked to drop" + "CVE-2024-26736": { + "cmt_msg": "afs: Increase buffer size in afs_update_volume_status()", + "cmt_id": "e8530b170e464017203e3b8c6c49af6e916aece1" }, - "CVE-2018-5344": { - "cmt_msg": "loop: fix concurrent lo_open/lo_release" + "CVE-2024-26737": { + "cmt_msg": "bpf: Fix racing between bpf_timer_cancel_and_free and bpf_timer_cancel", + "cmt_id": "addf5e297e6cbf5341f9c07720693ca9ba0057b5" }, - "CVE-2016-8633": { - "cmt_msg": "firewire: net: guard against rx buffer overflows" + "CVE-2024-26778": { + "cmt_msg": "fbdev: savage: Error out if pixclock equals zero", + "cmt_id": "070398d32c5f3ab0e890374904ad94551c76aec4" }, - "CVE-2016-8632": { - "cmt_msg": "tipc: check minimum bearer MTU" + "CVE-2024-26735": { + "cmt_msg": "ipv6: sr: fix possible use-after-free and null-ptr-deref", + "cmt_id": "8391b9b651cfdf80ab0f1dc4a489f9d67386e197" }, - "CVE-2018-3620": { - "cmt_msg": "x86/microcode: Allow late microcode loading with SMT disabled" + "CVE-2024-26776": { + "cmt_msg": "spi: hisi-sfc-v3xx: Return IRQ_NONE if no interrupts were detected", + "cmt_id": "f19361d570c67e7e014896fa2dacd7d721bf0aa8" }, - "CVE-2023-6932": { - "cmt_msg": "ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet" + "CVE-2024-26751": { + "cmt_msg": "ARM: ep93xx: Add terminator to gpiod_lookup_table", + "cmt_id": "786f089086b505372fb3f4f008d57e7845fff0d8" }, - "CVE-2019-3460": { - "cmt_msg": "Bluetooth: Check L2CAP option sizes returned from l2cap_get_conf_opt" + "CVE-2024-26752": { + "cmt_msg": "l2tp: pass correct message length to ip6_append_data", + "cmt_id": "13cd1daeea848614e585b2c6ecc11ca9c8ab2500" }, - "CVE-2018-8781": { - "cmt_msg": "drm: udl: Properly check framebuffer mmap offsets" + "CVE-2024-26753": { + "cmt_msg": "crypto: virtio/akcipher - Fix stack overflow on memcpy", + "cmt_id": "62f361bfea60c6afc3df09c1ad4152e6507f6f47" }, - "CVE-2021-29155": { - "cmt_msg": "bpf: Use correct permission flag for mixed signed bounds arithmetic" + "CVE-2024-26754": { + "cmt_msg": "gtp: fix use-after-free and null-ptr-deref in gtp_genl_dump_pdp()", + "cmt_id": "3963f16cc7643b461271989b712329520374ad2a" }, - "CVE-2024-22386": { - "cmt_msg": "" + "CVE-2024-26773": { + "cmt_msg": "ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found()", + "cmt_id": "f97e75fa4e12b0aa0224e83fcbda8853ac2adf36" }, - "CVE-2021-33631": { - "cmt_msg": "ext4: fix kernel BUG in 'ext4_write_inline_data_end()'" + "CVE-2024-26771": { + "cmt_msg": "dmaengine: ti: edma: Add some null pointer checks to the edma_probe", + "cmt_id": "9d508c897153ae8dd79303f7f035f078139f6b49" }, - "CVE-2019-15916": { - "cmt_msg": "net-sysfs: Fix mem leak in netdev_register_kobject" + "CVE-2024-26769": { + "cmt_msg": "nvmet-fc: avoid deadlock on delete association path", + "cmt_id": "9e6987f8937a7bd7516aa52f25cb7e12c0c92ee8" }, - "CVE-2019-15917": { - "cmt_msg": "Bluetooth: hci_ldisc: Postpone HCI_UART_PROTO_READY bit set in hci_uart_set_proto()" + "CVE-2024-26779": { + "cmt_msg": "wifi: mac80211: fix race condition on enabling fast-xmit", + "cmt_id": "eb39bb548bf974acad7bd6780fe11f9e6652d696" }, - "CVE-2017-18344": { - "cmt_msg": "posix-timer: Properly check sigevent->sigev_notify" + "CVE-2024-26777": { + "cmt_msg": "fbdev: sis: Error out if pixclock equals zero", + "cmt_id": "f329523f6a65c3bbce913ad35473d83a319d5d99" }, - "CVE-2018-6412": { - "cmt_msg": "fbdev: Fixing arbitrary kernel leak in case FBIOGETCMAP_SPARC in sbusfb_ioctl_helper()." + "CVE-2024-26774": { + "cmt_msg": "ext4: avoid dividing by 0 in mb_update_avg_fragment_size() when block bitmap corrupt", + "cmt_id": "8b40eb2e716b503f7a4e1090815a17b1341b2150" }, - "CVE-2017-15265": { - "cmt_msg": "ALSA: seq: Fix use-after-free at creating a port" + "CVE-2024-26747": { + "cmt_msg": "usb: roles: fix NULL pointer issue when put module's reference", + "cmt_id": "0158216805ca7e498d07de38840d2732166ae5fa" }, - "CVE-2021-27363": { - "cmt_msg": "scsi: iscsi: Restrict sessions and handles to admin capabilities" + "CVE-2024-26744": { + "cmt_msg": "RDMA/srpt: Support specifying the srpt_service_guid parameter", + "cmt_id": "aee4dcfe17219fe60f2821923adea98549060af8" }, - "CVE-2020-12362": { - "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" + "CVE-2024-26743": { + "cmt_msg": "RDMA/qedr: Fix qedr_create_user_qp error flow", + "cmt_id": "7f31a244c753aacf40b71d01f03ca6742f81bbbc" }, - "CVE-2020-12363": { - "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" + "CVE-2024-26742": { + "cmt_msg": "scsi: smartpqi: Fix disable_managed_interrupts", + "cmt_id": "3c31b18a8dd8b7bf36af1cd723d455853b8f94fe" }, - "CVE-2019-12881": { - "cmt_msg": "drm/i915/userptr: reject zero user_size" + "CVE-2024-26741": { + "cmt_msg": "dccp/tcp: Unhash sk from ehash for tb2 alloc failure after check_estalblished().", + "cmt_id": "729bc77af438a6e67914c97f6f3d3af8f72c0131" }, - "CVE-2022-4129": { - "cmt_msg": "l2tp: Serialize access to sk_user_data with sk_callback_lock" + "CVE-2024-26765": { + "cmt_msg": "LoongArch: Disable IRQ before init_fn() for nonboot CPUs", + "cmt_id": "a262b78dd085dbe9b3c75dc1d9c4cd102b110b53" }, - "CVE-2018-1000004": { - "cmt_msg": "ALSA: seq: Make ioctls race-free" + "CVE-2024-26764": { + "cmt_msg": "fs/aio: Restrict kiocb_set_cancel_fn() to I/O submitted via libaio", + "cmt_id": "18f614369def2a11a52f569fe0f910b199d13487" }, - "CVE-2018-18690": { - "cmt_msg": "xfs: don't fail when converting shortform attr to long form during ATTR_REPLACE" + "CVE-2024-26766": { + "cmt_msg": "IB/hfi1: Fix sdma.h tx->num_descs off-by-one error", + "cmt_id": "52dc9a7a573dbf778625a0efca0fca55489f084b" }, - "CVE-2022-28388": { - "cmt_msg": "can: usb_8dev: usb_8dev_start_xmit(): fix double dev_kfree_skb() in error path" + "CVE-2024-26761": { + "cmt_msg": "cxl/pci: Fix disabling memory if DVSEC CXL Range does not match a CFMWS window", + "cmt_id": "031217128990d7f0ab8c46db1afb3cf1e075fd29" }, - "CVE-2017-0627": { - "cmt_msg": "media: uvcvideo: Prevent heap overflow when accessing mapped controls" + "CVE-2024-26760": { + "cmt_msg": "scsi: target: pscsi: Fix bio_put() for error case", + "cmt_id": "f49b20fd0134da84a6bd8108f9e73c077b7d6231" }, - "CVE-2020-36558": { - "cmt_msg": "vt: vt_ioctl: fix race in VT_RESIZEX" + "CVE-2024-26749": { + "cmt_msg": "usb: cdns3: fixed memory use after free at cdns3_gadget_ep_disable()", + "cmt_id": "2134e9906e17b1e5284300fab547869ebacfd7d9" }, - "CVE-2016-7915": { - "cmt_msg": "HID: core: prevent out-of-bound readings" + "CVE-2024-26748": { + "cmt_msg": "usb: cdns3: fix memory double free when handle zero packet", + "cmt_id": "9a52b694b066f299d8b9800854a8503457a8b64c" }, - "CVE-2021-3896": { - "cmt_msg": "isdn: cpai: check ctr->cnr to avoid array index out of bound" + "CVE-2024-26763": { + "cmt_msg": "dm-crypt: don't modify the data when using authenticated encryption", + "cmt_id": "e08c2a8d27e989f0f5b0888792643027d7e691e6" }, - "CVE-2016-7917": { - "cmt_msg": "netfilter: nfnetlink: correctly validate length of batch messages" + "CVE-2024-26759": { + "cmt_msg": "mm/swap: fix race when skipping swapcache", + "cmt_id": "2dedda77d4493f3e92e414b272bfa60f1f51ed95" }, - "CVE-2016-7911": { - "cmt_msg": "block: fix use-after-free in sys_ioprio_get()" + "CVE-2023-52640": { + "cmt_msg": "fs/ntfs3: Fix oob in ntfs_listxattr", + "cmt_id": "6ed6cdbe88334ca3430c5aee7754dc4597498dfb" }, - "CVE-2016-7913": { - "cmt_msg": "[media] xc2028: avoid use after free" + "CVE-2023-52641": { + "cmt_msg": "fs/ntfs3: Add NULL ptr dereference checking at the end of attr_allocate_frame()", + "cmt_id": "50545eb6cd5f7ff852a01fa29b7372524ef948cc" }, - "CVE-2019-16232": { - "cmt_msg": "libertas: fix a potential NULL pointer dereference" + "CVE-2024-26775": { + "cmt_msg": "aoe: avoid potential deadlock at set_capacity", + "cmt_id": "2d623c94fbba3554f4446ba6f3c764994e8b0d26" }, - "CVE-2022-1836": { - "cmt_msg": "floppy: disable FDRAWCMD by default" + "CVE-2024-26772": { + "cmt_msg": "ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal()", + "cmt_id": "d639102f4cbd4cb65d1225dba3b9265596aab586" + } + }, + "6.1.81": { + "CVE-2023-52620": { + "cmt_msg": "netfilter: nf_tables: disallow timeout for anonymous sets", + "cmt_id": "b7be6c737a179a76901c872f6b4c1d00552d9a1b" }, - "CVE-2019-20811": { - "cmt_msg": "net-sysfs: call dev_hold if kobject_init_and_add success" + "CVE-2024-26782": { + "cmt_msg": "mptcp: fix double-free on socket dismantle", + "cmt_id": "d93fd40c62397326046902a2c5cb75af50882a85" }, - "CVE-2019-20812": { - "cmt_msg": "af_packet: set defaule value for tmo" + "CVE-2024-26745": { + "cmt_msg": "powerpc/pseries/iommu: IOMMU table is not initialized for kdump over SR-IOV", + "cmt_id": "7eb95e0af5c9c2e6fad50356eaf32d216d0e7bc3" }, - "CVE-2019-19530": { - "cmt_msg": "usb: cdc-acm: make sure a refcount is taken early enough" + "CVE-2024-26787": { + "cmt_msg": "mmc: mmci: stm32: fix DMA API overlapping mappings warning", + "cmt_id": "70af82bb9c897faa25a44e4181f36c60312b71ef" }, - "CVE-2023-6040": { - "cmt_msg": "netfilter: nf_tables: Reject tables of unsupported family" + "CVE-2024-26791": { + "cmt_msg": "btrfs: dev-replace: properly validate device names", + "cmt_id": "f590040ce2b712177306b03c2a63b16f7d48d3c8" }, - "CVE-2018-5391": { - "cmt_msg": "ip: discard IPv4 datagrams with overlapping segments." + "CVE-2024-26793": { + "cmt_msg": "gtp: fix use-after-free and null-ptr-deref in gtp_newlink()", + "cmt_id": "abd32d7f5c0294c1b2454c5a3b13b18446bac627" }, - "CVE-2022-26373": { - "cmt_msg": "x86/speculation: Add RSB VM Exit protections" + "CVE-2024-26789": { + "cmt_msg": "crypto: arm64/neonbs - fix out-of-bounds access on short input", + "cmt_id": "034e2d70b5c7f578200ad09955aeb2aa65d1164a" }, - "CVE-2018-5995": { - "cmt_msg": "printk: hash addresses printed with %p" + "CVE-2024-26788": { + "cmt_msg": "dmaengine: fsl-qdma: init irq after reg initialization", + "cmt_id": "474d521da890b3e3585335fb80a6044cb2553d99" }, - "CVE-2018-18386": { - "cmt_msg": "n_tty: fix EXTPROC vs ICANON interaction with TIOCINQ (aka FIONREAD)" + "CVE-2024-26798": { + "cmt_msg": "fbcon: always restore the old font data in fbcon_do_set_font()", + "cmt_id": "2f91a96b892fab2f2543b4a55740c5bee36b1a6b" }, - "CVE-2019-15291": { - "cmt_msg": "media: b2c2-flexcop-usb: add sanity checking" + "CVE-2024-26687": { + "cmt_msg": "xen/events: close evtchn after mapping cleanup", + "cmt_id": "585a344af6bcac222608a158fc2830ff02712af5" }, - "CVE-2019-15290": { - "cmt_msg": "" + "CVE-2023-2176": { + "cmt_msg": "RDMA/core: Refactor rdma_bind_addr", + "cmt_id": "88067197e97af3fcb104dd86030f788ec1b32fdb" }, - "CVE-2023-3212": { - "cmt_msg": "gfs2: Don't deref jdesc in evict" + "CVE-2024-26795": { + "cmt_msg": "riscv: Sparse-Memory/vmemmap out-of-bounds fix", + "cmt_id": "8310080799b40fd9f2a8b808c657269678c149af" }, - "CVE-2024-23848": { - "cmt_msg": "" + "CVE-2024-26802": { + "cmt_msg": "stmmac: Clear variable when destroying workqueue", + "cmt_id": "17ccd9798fe0beda3db212cfa3ebe373f605cbd6" }, - "CVE-2018-7273": { - "cmt_msg": "printk: hash addresses printed with %p" + "CVE-2024-26805": { + "cmt_msg": "netlink: Fix kernel-infoleak-after-free in __skb_datagram_iter", + "cmt_id": "0b27bf4c494d61e5663baa34c3edd7ccebf0ea44" }, - "CVE-2023-4459": { - "cmt_msg": "net: vmxnet3: fix possible NULL pointer dereference in vmxnet3_rq_cleanup()" + "CVE-2024-26804": { + "cmt_msg": "net: ip_tunnel: prevent perpetual headroom growth", + "cmt_id": "ab63de24ebea36fe73ac7121738595d704b66d96" }, - "CVE-2022-23036": { - "cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()" + "CVE-2024-26790": { + "cmt_msg": "dmaengine: fsl-qdma: fix SoC may hang on 16 byte unaligned read", + "cmt_id": "237ecf1afe6c22534fa43abdf2bf0b0f52de0aaa" }, - "CVE-2022-2153": { - "cmt_msg": "KVM: x86: Avoid theoretical NULL pointer dereference in kvm_irq_delivery_to_apic_fast()" + "CVE-2024-26801": { + "cmt_msg": "Bluetooth: Avoid potential use-after-free in hci_error_reset", + "cmt_id": "45085686b9559bfbe3a4f41d3d695a520668f5e1" }, - "CVE-2019-19531": { - "cmt_msg": "usb: yurex: Fix use-after-free in yurex_delete" + "CVE-2024-26622": { + "cmt_msg": "tomoyo: fix UAF write bug in tomoyo_write_control()", + "cmt_id": "3bfe04c1273d30b866f4c7c238331ed3b08e5824" }, - "CVE-2022-20566": { - "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free caused by l2cap_chan_put" + "CVE-2024-26803": { + "cmt_msg": "net: veth: clear GRO when clearing XDP even when down", + "cmt_id": "7985d73961bbb4e726c1be7b9cd26becc7be8325" + } + }, + "6.1.82": { + "CVE-2024-26659": { + "cmt_msg": "xhci: handle isoc Babble and Buffer Overrun events properly", + "cmt_id": "2e3ec80ea7ba58bbb210e83b5a0afefee7c171d3" }, - "CVE-2018-12930": { - "cmt_msg": "" + "CVE-2024-26700": { + "cmt_msg": "drm/amd/display: Fix MST Null Ptr for RV", + "cmt_id": "01d992088dce3945f70f49f34b0b911c5213c238" }, - "CVE-2018-12931": { - "cmt_msg": "" + "CVE-2024-26686": { + "cmt_msg": "fs/proc: do_task_stat: use sig->stats_lock to gather the threads/children stats", + "cmt_id": "cf4b8c39b9a0bd81c47afc7ef62914a62dd5ec4d" }, - "CVE-2017-7308": { - "cmt_msg": "net/packet: fix overflow in check for priv area size" + "CVE-2023-28746": { + "cmt_msg": "x86/mmio: Disable KVM mitigation when X86_FEATURE_CLEAR_CPU_BUF is set", + "cmt_id": "8b5760939db9c49c03b9e19f6c485a8812f48d83" }, - "CVE-2024-23196": { - "cmt_msg": "" + "CVE-2023-52639": { + "cmt_msg": "KVM: s390: vsie: fix race during shadow creation", + "cmt_id": "5df3b81a567eb565029563f26f374ae3803a1dfc" + } + }, + "6.1.83": { + "CVE-2024-26809": { + "cmt_msg": "netfilter: nft_set_pipapo: release elements in clone only from destroy path", + "cmt_id": "5ad233dc731ab64cdc47b84a5c1f78fff6c024af" }, - "CVE-2023-4010": { - "cmt_msg": "" + "CVE-2024-26651": { + "cmt_msg": "sr9800: Add check for usbnet_get_endpoints", + "cmt_id": "9c402819620a842cbfe39359a3ddfaac9adc8384" }, - "CVE-2016-0758": { - "cmt_msg": "KEYS: Fix ASN.1 indefinite length object parsing" + "CVE-2023-7042": { + "cmt_msg": "wifi: ath10k: fix NULL pointer dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev()", + "cmt_id": "90f089d77e38db1c48629f111f3c8c336be1bc38" }, - "CVE-2020-12769": { - "cmt_msg": "spi: spi-dw: Add lock protect dw_spi rx/tx to prevent concurrent calls" + "CVE-2024-22099": { + "cmt_msg": "Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security", + "cmt_id": "567c0411dc3b424fc7bd1e6109726d7ba32d4f73" }, - "CVE-2021-39636": { - "cmt_msg": "netfilter: x_tables: fix pointer leaks to userspace" + "CVE-2023-6270": { + "cmt_msg": "aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts", + "cmt_id": "74ca3ef68d2f449bc848c0a814cefc487bf755fa" + } + }, + "6.1.84": { + "CVE-2024-26585": { + "cmt_msg": "tls: fix race between tx work scheduling and socket close", + "cmt_id": "196f198ca6fce04ba6ce262f5a0e4d567d7d219d" }, - "CVE-2017-8890": { - "cmt_msg": "dccp/tcp: do not inherit mc_list from parent" + "CVE-2024-26584": { + "cmt_msg": "net: tls: handle backlogging of crypto requests", + "cmt_id": "cd1bbca03f3c1d845ce274c0d0a66de8e5929f72" }, - "CVE-2022-4662": { - "cmt_msg": "USB: core: Prevent nested device-reset calls" + "CVE-2024-24861": { + "cmt_msg": "media: xc4000: Fix atomicity violation in xc4000_get_frequency", + "cmt_id": "09c1be4d581d3356159abcc5a8a7a6c5f1bf1e77" }, - "CVE-2021-32399": { - "cmt_msg": "bluetooth: eliminate the potential race condition when removing the HCI controller" + "CVE-2024-26642": { + "cmt_msg": "netfilter: nf_tables: disallow anonymous set with timeout flag", + "cmt_id": "72c1efe3f247a581667b7d368fff3bd9a03cd57a" }, - "CVE-2021-45868": { - "cmt_msg": "quota: check block number when reading the block in quota file" + "CVE-2023-47233": { + "cmt_msg": "wifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach", + "cmt_id": "0b812f706fd7090be74812101114a0e165b36744" }, - "CVE-2019-12380": { - "cmt_msg": "efi/x86/Add missing error handling to old_memmap 1:1 mapping code" + "CVE-2024-26654": { + "cmt_msg": "ALSA: sh: aica: reorder cleanup operations to avoid UAF bugs", + "cmt_id": "9d66ae0e7bb78b54e1e0525456c6b54e1d132046" }, - "CVE-2019-12381": { - "cmt_msg": "ip_sockglue: Fix missing-check bug in ip_ra_control()" + "CVE-2024-23307": { + "cmt_msg": "md/raid5: fix atomicity violation in raid5_cache_count", + "cmt_id": "9477cfeb300823461b44223a7d5fac26a31df4fe" + } + }, + "outstanding": { + "CVE-2024-26677": { + "cmt_msg": "rxrpc: Fix delayed ACKs to not set the reference serial number" }, - "CVE-2019-12382": { - "cmt_msg": "drm/edid: Fix a missing-check bug in drm_load_edid_firmware()" + "CVE-2020-26556": { + "cmt_msg": "" }, - "CVE-2017-10810": { - "cmt_msg": "drm/virtio: don't leak bo on drm_gem_object_init failure" + "CVE-2020-26557": { + "cmt_msg": "" }, - "CVE-2020-12364": { - "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" + "CVE-2019-20794": { + "cmt_msg": "" }, - "CVE-2022-20166": { - "cmt_msg": "drivers core: Use sysfs_emit and sysfs_emit_at for show(device *...) functions" + "CVE-2020-26559": { + "cmt_msg": "" }, - "CVE-2024-0775": { - "cmt_msg": "ext4: improve error recovery code paths in __ext4_remount()" + "CVE-2020-35501": { + "cmt_msg": "" }, - "CVE-2016-9588": { - "cmt_msg": "kvm: nVMX: Allow L1 to intercept software exceptions (#BP and #OF)" + "CVE-2023-4010": { + "cmt_msg": "" }, - "CVE-2022-25375": { - "cmt_msg": "usb: gadget: rndis: check size of RNDIS_MSG_SET command" + "CVE-2024-26770": { + "cmt_msg": "HID: nvidia-shield: Add missing null pointer checks to LED initialization" }, - "CVE-2017-13167": { - "cmt_msg": "ALSA: timer: Fix race at concurrent reads" + "CVE-2018-1121": { + "cmt_msg": "" }, - "CVE-2017-13166": { - "cmt_msg": "media: v4l2-ioctl.c: use check_fmt for enum/g/s/try_fmt" + "CVE-2023-52452": { + "cmt_msg": "bpf: Fix accesses to uninit stack slots" }, - "CVE-2018-12207": { - "cmt_msg": "kvm: x86, powerpc: do not allow clearing largepages debugfs entry" + "CVE-2024-26672": { + "cmt_msg": "drm/amdgpu: Fix variable 'mca_funcs' dereferenced before NULL check in 'amdgpu_mca_smu_get_mca_entry()'" }, - "CVE-2017-1000364": { - "cmt_msg": "mm: larger stack guard gap, between vmas" + "CVE-2019-19378": { + "cmt_msg": "" }, - "CVE-2017-1000365": { - "cmt_msg": "fs/exec.c: account for argv/envp pointers" + "CVE-2024-26784": { + "cmt_msg": "pmdomain: arm: Fix NULL dereference on scmi_perf_domain removal" }, - "CVE-2020-13143": { - "cmt_msg": "USB: gadget: fix illegal array access in binding with UDC" + "CVE-2023-23005": { + "cmt_msg": "mm/demotion: fix NULL vs IS_ERR checking in memory_tier_init" }, - "CVE-2020-10768": { - "cmt_msg": "x86/speculation: PR_SPEC_FORCE_DISABLE enforcement for indirect branches." + "CVE-2024-22386": { + "cmt_msg": "" }, - "CVE-2017-13168": { - "cmt_msg": "scsi: sg: mitigate read/write abuse" + "CVE-2020-24503": { + "cmt_msg": "" }, - "CVE-2017-1000363": { - "cmt_msg": "char: lp: fix possible integer overflow in lp_setup()" + "CVE-2020-24502": { + "cmt_msg": "" }, - "CVE-2019-0148": { - "cmt_msg": "i40e: Wrong truncation from u16 to u8" + "CVE-2023-6240": { + "cmt_msg": "" }, - "CVE-2016-3156": { - "cmt_msg": "ipv4: Don't do expensive useless work during inetdev destroy." + "CVE-2023-39191": { + "cmt_msg": "bpf: Fix state pruning for STACK_DYNPTR stack slots" }, - "CVE-2019-17075": { - "cmt_msg": "RDMA/cxgb4: Do not dma memory off of the stack" + "CVE-2024-26738": { + "cmt_msg": "powerpc/pseries/iommu: DLPAR add doesn't completely initialize pci_controller" }, - "CVE-2014-7145": { - "cmt_msg": "[CIFS] Possible null ptr deref in SMB2_tcon" + "CVE-2020-11725": { + "cmt_msg": "" }, - "CVE-2022-3903": { - "cmt_msg": "media: mceusb: Use new usb_control_msg_*() routines" + "CVE-2024-26739": { + "cmt_msg": "net/sched: act_mirred: don't override retval if we already lost the skb" }, - "CVE-2022-23960": { - "cmt_msg": "ARM: report Spectre v2 status through sysfs" + "CVE-2024-26768": { + "cmt_msg": "LoongArch: Change acpi_core_pic[NR_CPUS] to acpi_core_pic[MAX_CORE_PIC]" }, - "CVE-2023-39189": { - "cmt_msg": "netfilter: nfnetlink_osf: avoid OOB read" + "CVE-2022-23825": { + "cmt_msg": "" }, - "CVE-2023-20588": { - "cmt_msg": "x86/CPU/AMD: Do not leak quotient data after a division by 0" + "CVE-2023-3397": { + "cmt_msg": "" }, - "CVE-2020-10942": { - "cmt_msg": "vhost: Check docket sk_family instead of call getname" + "CVE-2024-26767": { + "cmt_msg": "drm/amd/display: fixed integer types and null check locations" }, - "CVE-2018-3693": { - "cmt_msg": "ext4: fix spectre gadget in ext4_mb_regular_allocator()" + "CVE-2023-1476": { + "cmt_msg": "" }, - "CVE-2017-15299": { - "cmt_msg": "KEYS: don't let add_key() update an uninstantiated key" + "CVE-2021-3864": { + "cmt_msg": "" }, - "CVE-2017-0750": { - "cmt_msg": "f2fs: do more integrity verification for superblock" + "CVE-2022-3606": { + "cmt_msg": "" }, - "CVE-2023-3338": { - "cmt_msg": "Remove DECnet support from kernel" + "CVE-2019-19814": { + "cmt_msg": "" }, - "CVE-2019-11190": { - "cmt_msg": "binfmt_elf: switch to new creds when switching to new mm" + "CVE-2022-2209": { + "cmt_msg": "" }, - "CVE-2019-11191": { - "cmt_msg": "x86: Deprecate a.out support" + "CVE-2023-52624": { + "cmt_msg": "drm/amd/display: Wake DMCUB before executing GPINT commands" }, - "CVE-2016-5195": { - "cmt_msg": "mm: remove gup_flags FOLL_WRITE games from __get_user_pages()" + "CVE-2023-52625": { + "cmt_msg": "drm/amd/display: Refactor DMCUB enter/exit idle interface" }, - "CVE-2024-25741": { + "CVE-2021-26934": { "cmt_msg": "" }, - "CVE-2018-10323": { - "cmt_msg": "xfs: set format back to extents if xfs_bmap_extents_to_btree" + "CVE-2016-8660": { + "cmt_msg": "" }, - "CVE-2018-10322": { - "cmt_msg": "xfs: enhance dinode verifier" + "CVE-2023-0597": { + "cmt_msg": "x86/mm: Randomize per-cpu entry area" }, - "CVE-2017-8824": { - "cmt_msg": "dccp: CVE-2017-8824: use-after-free in DCCP code" + "CVE-2024-26758": { + "cmt_msg": "md: Don't ignore suspended array in md_check_recovery()" }, - "CVE-2018-7492": { - "cmt_msg": "rds: Fix NULL pointer dereference in __rds_rdma_map" + "CVE-2020-15802": { + "cmt_msg": "" }, - "CVE-2020-26139": { - "cmt_msg": "mac80211: do not accept/forward invalid EAPOL frames" + "CVE-2008-2544": { + "cmt_msg": "" }, - "CVE-2019-10220": { - "cmt_msg": "Convert filldir[64]() from __put_user() to unsafe_put_user()" + "CVE-2024-26595": { + "cmt_msg": "mlxsw: spectrum_acl_tcam: Fix NULL pointer dereference in error path" }, - "CVE-2021-3609": { - "cmt_msg": "can: bcm: delay release of struct bcm_op after synchronize_rcu()" + "CVE-2024-26756": { + "cmt_msg": "md: Don't register sync_thread for reshape directly" }, - "CVE-2017-13305": { - "cmt_msg": "KEYS: encrypted: fix buffer overread in valid_master_desc()" + "CVE-2024-26757": { + "cmt_msg": "md: Don't ignore read-only array in md_check_recovery()" }, - "CVE-2017-13220": { - "cmt_msg": "Bluetooth: hidp_connection_add() unsafe use of l2cap_pi()" + "CVE-2019-15239": { + "cmt_msg": "unknown" }, - "CVE-2022-21125": { - "cmt_msg": "x86/speculation/mmio: Reuse SRBDS mitigation for SBDS" + "CVE-2023-52634": { + "cmt_msg": "drm/amd/display: Fix disable_otg_wa logic" }, - "CVE-2019-19536": { - "cmt_msg": "can: peak_usb: pcan_usb_pro: Fix info-leaks to USB devices" + "CVE-2007-3719": { + "cmt_msg": "" }, - "CVE-2019-19537": { - "cmt_msg": "USB: core: Fix races in character device registration and deregistraion" + "CVE-2023-20941": { + "cmt_msg": "" }, - "CVE-2019-19534": { - "cmt_msg": "can: peak_usb: fix slab info leak" + "CVE-2024-26740": { + "cmt_msg": "net/sched: act_mirred: use the backlog for mirred ingress" }, - "CVE-2019-19532": { - "cmt_msg": "HID: Fix assumption that devices have inputs" + "CVE-2023-21400": { + "cmt_msg": "" }, - "CVE-2019-11479": { - "cmt_msg": "tcp: add tcp_min_snd_mss sysctl" + "CVE-2023-2640": { + "cmt_msg": "" }, - "CVE-2019-10638": { - "cmt_msg": "inet: switch IP ID generator to siphash" + "CVE-2010-4563": { + "cmt_msg": "" + }, + "CVE-2020-26140": { + "cmt_msg": "" }, - "CVE-2019-10639": { - "cmt_msg": "netns: provide pure entropy for net_hash_mix()" + "CVE-2020-26143": { + "cmt_msg": "" }, - "CVE-2021-0929": { - "cmt_msg": "staging/android/ion: delete dma_buf->kmap/unmap implemenation" + "CVE-2020-26142": { + "cmt_msg": "" }, - "CVE-2019-11478": { - "cmt_msg": "tcp: tcp_fragment() should apply sane memory limits" + "CVE-2024-23848": { + "cmt_msg": "" }, - "CVE-2018-19985": { - "cmt_msg": "USB: hso: Fix OOB memory access in hso_probe/hso_get_config_data" + "CVE-2023-4622": { + "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES" }, - "CVE-2018-6554": { - "cmt_msg": "staging: irda: remove the irda network stack and drivers" + "CVE-2024-26783": { + "cmt_msg": "mm/vmscan: fix a bug calling wakeup_kswapd() with a wrong zone index" }, - "CVE-2018-6555": { - "cmt_msg": "staging: irda: remove the irda network stack and drivers" + "CVE-2022-3533": { + "cmt_msg": "" }, - "CVE-2023-6546": { - "cmt_msg": "tty: n_gsm: fix the UAF caused by race condition in gsm_cleanup_mux" + "CVE-2022-1247": { + "cmt_msg": "" }, - "CVE-2017-18255": { - "cmt_msg": "perf/core: Fix the perf_cpu_time_max_percent check" + "CVE-2020-10708": { + "cmt_msg": "" }, - "CVE-2017-7273": { - "cmt_msg": "HID: hid-cypress: validate length of report" + "CVE-2022-4543": { + "cmt_msg": "" }, - "CVE-2018-5953": { - "cmt_msg": "printk: hash addresses printed with %p" + "CVE-2017-13693": { + "cmt_msg": "" }, - "CVE-2016-7097": { - "cmt_msg": "posix_acl: Clear SGID bit when setting file permissions" + "CVE-2021-0399": { + "cmt_msg": "" }, - "CVE-2024-26587": { - "cmt_msg": "net: netdevsim: don't try to destroy PHC on VFs" + "CVE-2017-13694": { + "cmt_msg": "" }, - "CVE-2023-51043": { - "cmt_msg": "drm/atomic: Fix potential use-after-free in nonblocking commits" + "CVE-2024-26691": { + "cmt_msg": "KVM: arm64: Fix circular locking dependency" }, - "CVE-2020-28374": { - "cmt_msg": "scsi: target: Fix XCOPY NAA identifier lookup" + "CVE-2023-52485": { + "cmt_msg": "drm/amd/display: Wake DMCUB before sending a command" }, - "CVE-2019-9213": { - "cmt_msg": "mm: enforce min addr even if capable() in expand_downwards()" + "CVE-2024-0564": { + "cmt_msg": "" }, - "CVE-2023-2007": { - "cmt_msg": "scsi: dpt_i2o: Remove obsolete driver" + "CVE-2012-4542": { + "cmt_msg": "" }, - "CVE-2017-7472": { - "cmt_msg": "KEYS: fix keyctl_set_reqkey_keyring() to not leak thread keyrings" + "CVE-2013-7445": { + "cmt_msg": "" }, - "CVE-2017-16535": { - "cmt_msg": "USB: core: fix out-of-bounds access bug in usb_get_bos_descriptor()" + "CVE-2024-24859": { + "cmt_msg": "" }, - "CVE-2019-14897": { - "cmt_msg": "libertas: Fix two buffer overflows at parsing bss descriptor" + "CVE-2024-24858": { + "cmt_msg": "" }, - "CVE-2017-16537": { - "cmt_msg": "media: imon: Fix null-ptr-deref in imon_probe" + "CVE-2005-3660": { + "cmt_msg": "" }, - "CVE-2017-16536": { - "cmt_msg": "[media] cx231xx-cards: fix NULL-deref on missing association descriptor" + "CVE-2024-24855": { + "cmt_msg": "scsi: lpfc: Fix a possible data race in lpfc_unregister_fcf_rescan()" }, - "CVE-2017-16531": { - "cmt_msg": "USB: fix out-of-bounds in usb_set_configuration" + "CVE-2024-24857": { + "cmt_msg": "" }, - "CVE-2017-16533": { - "cmt_msg": "HID: usbhid: fix out-of-bounds bug" + "CVE-2023-31084": { + "cmt_msg": "media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*()" }, - "CVE-2017-16532": { - "cmt_msg": "usb: usbtest: fix NULL pointer dereference" + "CVE-2023-31083": { + "cmt_msg": "Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO" }, - "CVE-2024-26592": { - "cmt_msg": "ksmbd: fix UAF issue in ksmbd_tcp_new_connection()" + "CVE-2023-31082": { + "cmt_msg": "" }, - "CVE-2017-16538": { - "cmt_msg": "media: dvb-usb-v2: lmedm04: Improve logic checking of warm start" + "CVE-2023-31081": { + "cmt_msg": "" }, - "CVE-2023-3006": { - "cmt_msg": "arm64: Add AMPERE1 to the Spectre-BHB affected list" + "CVE-2022-38096": { + "cmt_msg": "" }, - "CVE-2020-27825": { - "cmt_msg": "tracing: Fix race in trace_open and buffer resize call" + "CVE-2022-3544": { + "cmt_msg": "" }, - "CVE-2016-9084": { - "cmt_msg": "vfio/pci: Fix integer overflows, bitmask check" + "CVE-2023-6039": { + "cmt_msg": "net: usb: lan78xx: reorder cleanup operations to avoid UAF bugs" }, - "CVE-2020-27820": { - "cmt_msg": "drm/nouveau: use drm_dev_unplug() during device removal" + "CVE-2024-26596": { + "cmt_msg": "net: dsa: fix netdev_priv() dereference before check on non-DSA netdevice events" }, - "CVE-2016-9083": { - "cmt_msg": "vfio/pci: Fix integer overflows, bitmask check" + "CVE-2024-26658": { + "cmt_msg": "bcachefs: grab s_umount only if snapshotting" }, - "CVE-2023-0047": { - "cmt_msg": "mm, oom: do not trigger out_of_memory from the #PF" + "CVE-2024-26669": { + "cmt_msg": "net/sched: flower: Fix chain template offload" }, - "CVE-2020-26141": { - "cmt_msg": "ath10k: Fix TKIP Michael MIC verification for PCIe" + "CVE-2022-3238": { + "cmt_msg": "" }, - "CVE-2017-18221": { - "cmt_msg": "mlock: fix mlock count can not decrease in race condition" + "CVE-2008-4609": { + "cmt_msg": "" }, - "CVE-2020-0066": { - "cmt_msg": "netlink: Trim skb to alloc size to avoid MSG_TRUNC" + "CVE-2020-14304": { + "cmt_msg": "" }, - "CVE-2019-20794": { + "CVE-2020-0347": { "cmt_msg": "" }, - "CVE-2023-39193": { - "cmt_msg": "netfilter: xt_sctp: validate the flag_info count" + "CVE-2024-26655": { + "cmt_msg": "Fix memory leak in posix_clock_open()" }, - "CVE-2023-39192": { - "cmt_msg": "netfilter: xt_u32: validate user space input" + "CVE-2021-3714": { + "cmt_msg": "" }, - "CVE-2020-26541": { - "cmt_msg": "certs: Add EFI_CERT_X509_GUID support for dbx entries" + "CVE-2023-4133": { + "cmt_msg": "cxgb4: fix use after free bugs caused by circular dependency problem" }, - "CVE-2023-6610": { - "cmt_msg": "smb: client: fix potential OOB in smb2_dump_detail()" + "CVE-2019-12456": { + "cmt_msg": "" }, - "CVE-2020-26559": { + "CVE-2020-26560": { "cmt_msg": "" }, - "CVE-2021-20317": { - "cmt_msg": "lib/timerqueue: Rely on rbtree semantics for next timer" + "CVE-2021-3892": { + "cmt_msg": "" }, - "CVE-2021-43389": { - "cmt_msg": "isdn: cpai: check ctr->cnr to avoid array index out of bound" + "CVE-2023-4134": { + "cmt_msg": "Input: cyttsp4_core - change del_timer_sync() to timer_shutdown_sync()" }, - "CVE-2017-14156": { - "cmt_msg": "video: fbdev: aty: do not leak uninitialized padding in clk to userspace" + "CVE-2024-26623": { + "cmt_msg": "pds_core: Prevent race issues involving the adminq" }, - "CVE-2021-33061": { - "cmt_msg": "ixgbe: add improvement for MDD response functionality" + "CVE-2024-26699": { + "cmt_msg": "drm/amd/display: Fix array-index-out-of-bounds in dcn35_clkmgr" }, - "CVE-2017-2671": { - "cmt_msg": "ping: implement proper locking" + "CVE-2024-26656": { + "cmt_msg": "drm/amdgpu: fix use-after-free bug" }, - "CVE-2018-1092": { - "cmt_msg": "ext4: fail ext4_iget for root directory if unallocated" + "CVE-2024-26648": { + "cmt_msg": "drm/amd/display: Fix variable deferencing before NULL check in edp_setup_replay()" }, - "CVE-2018-1093": { - "cmt_msg": "ext4: add validity checks for bitmap block numbers" + "CVE-2024-26647": { + "cmt_msg": "drm/amd/display: Fix late derefrence 'dsc' check in 'link_set_dsc_pps_packet()'" }, - "CVE-2017-18551": { - "cmt_msg": "i2c: core-smbus: prevent stack corruption on read I2C_BLOCK_DATA" + "CVE-2024-24864": { + "cmt_msg": "" }, - "CVE-2023-1074": { - "cmt_msg": "sctp: fail if no bound addresses can be used for a given scope" + "CVE-2023-37454": { + "cmt_msg": "" }, - "CVE-2017-18552": { - "cmt_msg": "RDS: validate the requested traces user input against max supported" + "CVE-2023-52596": { + "cmt_msg": "sysctl: Fix out of bounds access for empty sysctl registers" }, - "CVE-2015-8839": { - "cmt_msg": "ext4: fix races between page faults and hole punching" + "CVE-2023-52590": { + "cmt_msg": "ocfs2: Avoid touching renamed directory if parent does not change" }, - "CVE-2014-9731": { - "cmt_msg": "udf: Check path length when reading symlink" + "CVE-2023-52591": { + "cmt_msg": "reiserfs: Avoid touching renamed directory if parent does not change" }, - "CVE-2014-9730": { - "cmt_msg": "udf: Check component length before reading it" + "CVE-2022-3642": { + "cmt_msg": "" }, - "CVE-2023-4623": { - "cmt_msg": "net/sched: sch_hfsc: Ensure inner classes have fsc curve" + "CVE-2011-4917": { + "cmt_msg": "" }, - "CVE-2015-8830": { - "cmt_msg": "aio: lift iov_iter_init() into aio_setup_..._rw()" + "CVE-2023-52629": { + "cmt_msg": "sh: push-switch: Reorder cleanup operations to avoid use-after-free bug" }, - "CVE-2019-9457": { - "cmt_msg": "exec: Limit arg stack to at most 75% of _STK_LIM" + "CVE-2019-15902": { + "cmt_msg": "unknown" }, - "CVE-2019-19054": { - "cmt_msg": "media: rc: prevent memory leak in cx23888_ir_probe" + "CVE-2024-25739": { + "cmt_msg": "" }, - "CVE-2019-19057": { - "cmt_msg": "mwifiex: pcie: Fix memory leak in mwifiex_pcie_init_evt_ring" + "CVE-2019-15290": { + "cmt_msg": "" }, - "CVE-2019-19056": { - "cmt_msg": "mwifiex: pcie: Fix memory leak in mwifiex_pcie_alloc_cmdrsp_buf" + "CVE-2023-6535": { + "cmt_msg": "" }, - "CVE-2016-10741": { - "cmt_msg": "xfs: don't BUG() on mixed direct and mapped I/O" + "CVE-2018-17977": { + "cmt_msg": "" }, - "CVE-2023-23039": { + "CVE-2022-26878": { "cmt_msg": "" }, - "CVE-2023-20569": { - "cmt_msg": "x86/bugs: Increase the x86 bugs vector size to two u32s" + "CVE-2022-41848": { + "cmt_msg": "" }, - "CVE-2019-3846": { - "cmt_msg": "mwifiex: Fix possible buffer overflows at parsing bss descriptor" + "CVE-2022-1116": { + "cmt_msg": "" }, - "CVE-2023-46838": { - "cmt_msg": "xen-netback: don't produce zero-size SKB frags" + "CVE-2010-5321": { + "cmt_msg": "" }, - "CVE-2020-0427": { - "cmt_msg": "pinctrl: devicetree: Avoid taking direct reference to device name string" + "CVE-2024-2193": { + "cmt_msg": "" }, - "CVE-2022-20424": { - "cmt_msg": "io_uring: remove io_identity" + "CVE-2018-12930": { + "cmt_msg": "" }, - "CVE-2019-9458": { - "cmt_msg": "media: v4l: event: Prevent freeing event subscriptions while accessed" + "CVE-2018-12931": { + "cmt_msg": "" }, - "CVE-2016-8666": { - "cmt_msg": "tunnels: Don't apply GRO to multiple layers of encapsulation." + "CVE-2023-52585": { + "cmt_msg": "drm/amdgpu: Fix possible NULL dereference in amdgpu_ras_query_error_status_helper()" }, - "CVE-2023-39197": { - "cmt_msg": "netfilter: conntrack: dccp: copy entire header to stack buffer, not just basic one" + "CVE-2023-52586": { + "cmt_msg": "drm/msm/dpu: Add mutex lock in control vblank irq" }, - "CVE-2017-9242": { - "cmt_msg": "ipv6: fix out of bound writes in __ip6_append_data()" + "CVE-2021-39801": { + "cmt_msg": "" }, - "CVE-2020-14314": { - "cmt_msg": "ext4: fix potential negative array index in do_split()" + "CVE-2021-39800": { + "cmt_msg": "" }, - "CVE-2019-13272": { - "cmt_msg": "ptrace: Fix ->ptracer_cred handling for PTRACE_TRACEME" + "CVE-2022-45885": { + "cmt_msg": "" }, - "CVE-2021-3587": { - "cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect" + "CVE-2022-45884": { + "cmt_msg": "" }, - "CVE-2023-45862": { - "cmt_msg": "USB: ene_usb6250: Allocate enough memory for full object" + "CVE-2024-25740": { + "cmt_msg": "" }, - "CVE-2023-45863": { - "cmt_msg": "kobject: Fix slab-out-of-bounds in fill_kobj_path()" + "CVE-2024-25741": { + "cmt_msg": "" }, - "CVE-2017-15537": { - "cmt_msg": "x86/fpu: Don't let userspace set bogus xcomp_bv" + "CVE-2024-21803": { + "cmt_msg": "" }, - "CVE-2022-2588": { - "cmt_msg": "net_sched: cls_route: remove from list when handle is 0" + "CVE-2022-45888": { + "cmt_msg": "char: xillybus: Prevent use-after-free due to race condition" }, - "CVE-2019-17351": { - "cmt_msg": "xen: let alloc_xenballooned_pages() fail if not enough memory free" + "CVE-2021-3542": { + "cmt_msg": "" }, - "CVE-2020-36322": { - "cmt_msg": "fuse: fix bad inode" + "CVE-2018-12929": { + "cmt_msg": "" }, - "CVE-2022-23222": { - "cmt_msg": "bpf: Replace PTR_TO_XXX_OR_NULL with PTR_TO_XXX | PTR_MAYBE_NULL" + "CVE-2018-12928": { + "cmt_msg": "" }, - "CVE-2020-25669": { - "cmt_msg": "Input: sunkbd - avoid use-after-free in teardown paths" + "CVE-2023-6560": { + "cmt_msg": "io_uring: don't allow discontig pages for IORING_SETUP_NO_MMAP" }, - "CVE-2020-25668": { - "cmt_msg": "tty: make FONTX ioctl use the tty pointer they were actually passed" + "CVE-2020-25220": { + "cmt_msg": "" }, - "CVE-2008-4609": { + "CVE-2015-2877": { "cmt_msg": "" }, - "CVE-2023-52458": { - "cmt_msg": "block: add check that partition length needs to be aligned with block size" + "CVE-2024-26661": { + "cmt_msg": "drm/amd/display: Add NULL test for 'timing generator' in 'dcn21_set_pipe()'" }, - "CVE-2023-40283": { - "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb" + "CVE-2024-26662": { + "cmt_msg": "drm/amd/display: Fix 'panel_cntl' could be null in 'dcn21_set_backlight_level()'" }, - "CVE-2018-19824": { - "cmt_msg": "ALSA: usb-audio: Fix UAF decrement if card has no live interfaces in card.c" + "CVE-2023-26242": { + "cmt_msg": "" }, - "CVE-2018-20854": { - "cmt_msg": "phy: ocelot-serdes: fix out-of-bounds read" + "CVE-2019-16089": { + "cmt_msg": "" }, - "CVE-2018-25020": { - "cmt_msg": "bpf: fix truncated jump targets on heavy expansions" + "CVE-2023-32629": { + "cmt_msg": "" }, - "CVE-2022-3533": { + "CVE-2022-0400": { "cmt_msg": "" }, - "CVE-2023-26607": { - "cmt_msg": "ntfs: fix out-of-bounds read in ntfs_attr_find()" + "CVE-2022-44034": { + "cmt_msg": "char: pcmcia: remove all the drivers" }, - "CVE-2018-20855": { - "cmt_msg": "IB/mlx5: Fix leaking stack memory to userspace" + "CVE-2022-44033": { + "cmt_msg": "char: pcmcia: remove all the drivers" }, - "CVE-2019-15239": { - "cmt_msg": "" + "CVE-2022-44032": { + "cmt_msg": "char: pcmcia: remove all the drivers" }, - "CVE-2016-2053": { - "cmt_msg": "ASN.1: Fix non-match detection failure on data overrun" + "CVE-2023-21264": { + "cmt_msg": "KVM: arm64: Prevent unconditional donation of unmapped regions from the host" }, - "CVE-2021-4037": { - "cmt_msg": "xfs: fix up non-directory creation in SGID directories" + "CVE-2024-26806": { + "cmt_msg": "spi: cadence-qspi: remove system-wide suspend helper calls from runtime PM hooks" }, - "CVE-2021-22543": { - "cmt_msg": "KVM: do not allow mapping valid but non-reference-counted pages" + "CVE-2021-3847": { + "cmt_msg": "" }, - "CVE-2022-45884": { + "CVE-2022-2961": { "cmt_msg": "" }, - "CVE-2019-1999": { - "cmt_msg": "binder: fix race between munmap() and direct reclaim" + "CVE-2024-26797": { + "cmt_msg": "drm/amd/display: Prevent potential buffer overflow in map_hw_resources" }, - "CVE-2023-20941": { + "CVE-2022-25265": { "cmt_msg": "" }, - "CVE-2018-1066": { - "cmt_msg": "CIFS: Enable encryption during session setup phase" + "CVE-2011-4916": { + "cmt_msg": "" }, - "CVE-2018-20836": { - "cmt_msg": "scsi: libsas: fix a race condition when smp task timeout" + "CVE-2024-26799": { + "cmt_msg": "ASoC: qcom: Fix uninitialized pointer dmactl" }, - "CVE-2018-1068": { - "cmt_msg": "netfilter: ebtables: CONFIG_COMPAT: don't trust userland offsets" + "CVE-2023-23039": { + "cmt_msg": "" }, - "CVE-2020-0030": { - "cmt_msg": "ANDROID: binder: synchronize_rcu() when using POLLFREE." + "CVE-2024-26719": { + "cmt_msg": "nouveau: offload fence uevents work to workqueue" }, - "CVE-2020-10135": { - "cmt_msg": "Bluetooth: Consolidate encryption handling in hci_encrypt_cfm" + "CVE-2024-1312": { + "cmt_msg": "mm: lock_vma_under_rcu() must check vma->anon_vma under vma lock" }, - "CVE-2020-25285": { - "cmt_msg": "mm/hugetlb: fix a race between hugetlb sysctl handlers" + "CVE-2023-3640": { + "cmt_msg": "" }, - "CVE-2019-7308": { - "cmt_msg": "bpf: fix sanitation of alu op with pointer / scalar type from different paths" + "CVE-2024-26713": { + "cmt_msg": "powerpc/pseries/iommu: Fix iommu initialisation during DLPAR add" + } + } + }, + "6.0": { + "6.0": { + "CVE-2022-2308": { + "cmt_msg": "vduse: prevent uninitialized memory accesses", + "cmt_id": "46f8a29272e51b6df7393d58fc5cb8967397ef2b" + } + }, + "6.0.1": { + "CVE-2022-2978": { + "cmt_msg": "fs: fix UAF/GPF bug in nilfs_mdt_destroy", + "cmt_id": "2a96b532098284ecf8e4849b8b9e5fc7a28bdee9" }, - "CVE-2016-8405": { - "cmt_msg": "fbdev: color map copying bounds checking" + "CVE-2022-43750": { + "cmt_msg": "usb: mon: make mmapped memory read only", + "cmt_id": "08e2c70e549b77f5f3af9c76da00779d5756f997" + } + }, + "6.0.2": { + "CVE-2022-40768": { + "cmt_msg": "scsi: stex: Properly zero out the passthrough command structure", + "cmt_id": "b9b7369d89924a366b20045dc26dc4dc6b0567a4" }, - "CVE-2018-1000199": { - "cmt_msg": "perf/hwbp: Simplify the perf-hwbp code, fix documentation" + "CVE-2022-42721": { + "cmt_msg": "wifi: cfg80211: avoid nontransmitted BSS list corruption", + "cmt_id": "377cb1ce85878c197904ca8383e6b41886e3994d" }, - "CVE-2022-1966": { - "cmt_msg": "netfilter: nf_tables: disallow non-stateful expression in sets earlier" + "CVE-2022-3621": { + "cmt_msg": "nilfs2: fix NULL pointer dereference at nilfs_bmap_lookup_at_level()", + "cmt_id": "037e760a4a009e9545a51e87c98c22d9aaf32df7" }, - "CVE-2023-3611": { - "cmt_msg": "net/sched: sch_qfq: account for stab overhead in qfq_enqueue" + "CVE-2022-3649": { + "cmt_msg": "nilfs2: fix use-after-free bug of struct nilfs_root", + "cmt_id": "6251c9c0430d70cc221d0bb907b278bd99d7b066" }, - "CVE-2017-9986": { - "cmt_msg": "sound: Retire OSS" + "CVE-2022-42719": { + "cmt_msg": "wifi: mac80211: fix MBSSID parsing use-after-free", + "cmt_id": "4afcb8886800131f8dd58d82754ee0c508303d46" }, - "CVE-2017-9985": { - "cmt_msg": "ALSA: msnd: Optimize / harden DSP and MIDI loops" + "CVE-2022-41674": { + "cmt_msg": "wifi: cfg80211: fix u8 overflow in cfg80211_update_notlisted_nontrans()", + "cmt_id": "fc1ed6d0c9898a68da7f1f7843560dfda57683e2" }, - "CVE-2017-9984": { - "cmt_msg": "ALSA: msnd: Optimize / harden DSP and MIDI loops" + "CVE-2022-3977": { + "cmt_msg": "mctp: prevent double key removal and unref", + "cmt_id": "3c7c84319833259b0bb8c879928700c9e42d6562" }, - "CVE-2019-9454": { - "cmt_msg": "i2c: core-smbus: prevent stack corruption on read I2C_BLOCK_DATA" + "CVE-2022-3646": { + "cmt_msg": "nilfs2: fix leak of nilfs_root in case of writer thread creation failure", + "cmt_id": "9dc48a360e7b6bb16c48625f8f80ab7665bc9648" }, - "CVE-2022-3534": { - "cmt_msg": "libbpf: Fix use-after-free in btf_dump_name_dups" + "CVE-2022-42720": { + "cmt_msg": "wifi: cfg80211: fix BSS refcounting bugs", + "cmt_id": "e97a5d7091e6d2df05f8378a518a9bbf81688b77" }, - "CVE-2023-34256": { - "cmt_msg": "ext4: avoid a potential slab-out-of-bounds in ext4_group_desc_csum" + "CVE-2022-42722": { + "cmt_msg": "wifi: mac80211: fix crash in beacon protection for P2P-device", + "cmt_id": "8ed62f2df8ebcf79c185f1bc3e4f346ea0905da6" + } + }, + "6.0.3": { + "CVE-2022-3543": { + "cmt_msg": "af_unix: Fix memory leaks of the whole sk due to OOB skb.", + "cmt_id": "2f415ad33bc1a729fb1050141921b5a9ec4e062c" }, - "CVE-2016-10088": { - "cmt_msg": "sg_write()/bsg_write() is not fit to be called under KERNEL_DS" + "CVE-2022-3623": { + "cmt_msg": "mm/hugetlb: fix races when looking up a CONT-PTE/PMD size hugetlb page", + "cmt_id": "7c7c79dd5a388758f8dfa3de89b131d5d84f25fd" }, - "CVE-2021-20261": { - "cmt_msg": "floppy: fix lock_fdc() signal handling" + "CVE-2022-41849": { + "cmt_msg": "fbdev: smscufx: Fix use-after-free in ufx_ops_open()", + "cmt_id": "e2e5264dcf5796559869750a2d6943ac88fe3918" }, - "CVE-2021-20265": { - "cmt_msg": "af_unix: fix struct pid memory leak" + "CVE-2022-3535": { + "cmt_msg": "net: mvpp2: fix mvpp2 debugfs leak", + "cmt_id": "218dbb2ef8597b837c1a8f248ad176c5f3f5b464" }, - "CVE-2017-18079": { - "cmt_msg": "Input: i8042 - fix crash at boot time" + "CVE-2022-3594": { + "cmt_msg": "r8152: Rate limit overflow messages", + "cmt_id": "21f2532974115026fdab1205aab275d6181fb89f" }, - "CVE-2020-25284": { - "cmt_msg": "rbd: require global CAP_SYS_ADMIN for mapping and unmapping" + "CVE-2022-2602": { + "cmt_msg": "io_uring/af_unix: defer registered files gc to io_uring release", + "cmt_id": "75e94c7e8859e58aadc15a98cc9704edff47d4f2" }, - "CVE-2023-28328": { - "cmt_msg": "media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer()" + "CVE-2022-41850": { + "cmt_msg": "HID: roccat: Fix use-after-free in roccat_read()", + "cmt_id": "8a251549ab577d64ece210a11c404354479bd635" }, - "CVE-2023-0386": { - "cmt_msg": "ovl: fail on invalid uid/gid mapping at copy up" + "CVE-2022-43945": { + "cmt_msg": "NFSD: Protect against send buffer overflow in NFSv2 READDIR", + "cmt_id": "f59c74df82f6ac9d2ea4e01aa3ae7c6c4481652d" }, - "CVE-2016-6136": { - "cmt_msg": "audit: fix a double fetch in audit_log_single_execve_arg()" + "CVE-2022-3541": { + "cmt_msg": "eth: sp7021: fix use after free bug in spl2sw_nvmem_get_mac_address", + "cmt_id": "99e229c7fe30a1661f9f306b3df06eaf1db064aa" }, - "CVE-2017-13693": { - "cmt_msg": "" + "CVE-2022-3565": { + "cmt_msg": "mISDN: fix use-after-free bugs in l1oip timer handlers", + "cmt_id": "5c9422e2d8563a3efe064493ff7ebbc2948441ea" }, - "CVE-2015-8019": { - "cmt_msg": "net: add length argument to skb_copy_and_csum_datagram_iovec" + "CVE-2022-3542": { + "cmt_msg": "bnx2x: fix potential memory leak in bnx2x_tpa_stop()", + "cmt_id": "a712737af79b4a9a75f9abbf812279062da75777" + } + }, + "6.0.6": { + "CVE-2023-0590": { + "cmt_msg": "net: sched: fix race condition in qdisc_graft()", + "cmt_id": "caee0b9d74119911423111a10c4e9f4e5c8e6d41" + } + }, + "6.0.7": { + "CVE-2023-3006": { + "cmt_msg": "arm64: Add AMPERE1 to the Spectre-BHB affected list", + "cmt_id": "5b962b004afa3c11e651c07232f2402b4678007b" }, - "CVE-2017-13695": { - "cmt_msg": "ACPICA: acpi: acpica: fix acpi operand cache leak in nseval.c" + "CVE-2022-3524": { + "cmt_msg": "tcp/udp: Fix memory leak in ipv6_renew_options().", + "cmt_id": "0c5d628f1e1d049c33595693fab1b6e9baf25795" }, - "CVE-2017-13694": { - "cmt_msg": "" + "CVE-2023-0615": { + "cmt_msg": "media: vivid: dev->bitmap_cap wasn't freed in all cases", + "cmt_id": "74e2e978d1e36c3b67e998e779c02cbc8f481527" + } + }, + "6.0.8": { + "CVE-2022-3628": { + "cmt_msg": "wifi: brcmfmac: Fix potential buffer overflow in brcmf_fweh_event_worker()", + "cmt_id": "631f73deedeb0fbc92ca5037d5a71c9fcae7974d" }, - "CVE-2021-4149": { - "cmt_msg": "btrfs: unlock newly allocated extent buffer after error" + "CVE-2023-3812": { + "cmt_msg": "net: tun: fix bugs for oversize packet when napi frags enabled", + "cmt_id": "d24ba55946e6bdcfacae989638621d7728ee0ec8" }, - "CVE-2022-21385": { - "cmt_msg": "net/rds: fix warn in rds_message_alloc_sgs" + "CVE-2022-42896": { + "cmt_msg": "Bluetooth: L2CAP: Fix accepting connection request for invalid SPSM", + "cmt_id": "d7efeb93213becae13c6a12e4150ce1e07bd2c49" }, "CVE-2022-42895": { - "cmt_msg": "Bluetooth: L2CAP: Fix attempting to access uninitialized memory" + "cmt_msg": "Bluetooth: L2CAP: Fix attempting to access uninitialized memory", + "cmt_id": "e1aada9b71493b2e11c2a239ece99a97e3f13431" }, - "CVE-2021-3640": { - "cmt_msg": "Bluetooth: sco: Fix lock_sock() blockage by memcpy_from_msg()" + "CVE-2022-3564": { + "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free caused by l2cap_reassemble_sdu", + "cmt_id": "9a04161244603f502c6e453913e51edd59cb70c1" }, - "CVE-2017-7618": { - "cmt_msg": "crypto: ahash - Fix EINPROGRESS notification callback" + "CVE-2022-3619": { + "cmt_msg": "Bluetooth: L2CAP: Fix memory leak in vhci_write", + "cmt_id": "5b4f039a2f487c5edae681d763fe1af505f84c13" }, - "CVE-2020-1749": { - "cmt_msg": "net: ipv6_stub: use ip6_dst_lookup_flow instead of ip6_dst_lookup" + "CVE-2022-3640": { + "cmt_msg": "Bluetooth: L2CAP: fix use-after-free in l2cap_conn_del()", + "cmt_id": "8f7e4cf0694149a5d999d676ebd9ecf1b4cb2cc9" + } + }, + "6.0.10": { + "CVE-2023-26607": { + "cmt_msg": "ntfs: fix out-of-bounds read in ntfs_attr_find()", + "cmt_id": "e9b64d1faa58a4ae3454acbf9c80483dd16692d4" }, - "CVE-2022-1786": { - "cmt_msg": "io_uring: remove io_identity" + "CVE-2022-3521": { + "cmt_msg": "kcm: avoid potential race in kcm_tx_work", + "cmt_id": "2526ac6b0f5a9b38e7e9073e37141cf78408078d" }, - "CVE-2022-36123": { - "cmt_msg": "x86: Clear .brk area at early boot" + "CVE-2022-3169": { + "cmt_msg": "nvme: ensure subsystem reset is single threaded", + "cmt_id": "0c2b1c56252bf19d3412137073c2c07e86f40ba1" + } + }, + "6.0.11": { + "CVE-2022-4139": { + "cmt_msg": "drm/i915: fix TLB invalidation for Gen12 video and compute engines", + "cmt_id": "aef39675ad33317c8badc0165ea882e172a633e6" }, - "CVE-2020-11608": { - "cmt_msg": "media: ov519: add missing endpoint sanity checks" + "CVE-2022-45869": { + "cmt_msg": "KVM: x86/mmu: Fix race condition in direct_page_fault", + "cmt_id": "34ced1da74eb975abdf7ef823512c7719f67601b" }, - "CVE-2020-10732": { - "cmt_msg": "fs/binfmt_elf.c: allocate initialized memory in fill_thread_core_info()" + "CVE-2023-2236": { + "cmt_msg": "io_uring/filetable: fix file reference underflow", + "cmt_id": "77a467a3e20978607c56aa4886f46f78ca287054" }, - "CVE-2020-28097": { - "cmt_msg": "vgacon: remove software scrollback support" + "CVE-2023-1382": { + "cmt_msg": "tipc: set con sock in tipc_conn_alloc", + "cmt_id": "66d7a37e2ec769fbb4b086cc03c320565be3fbb9" }, - "CVE-2017-7616": { - "cmt_msg": "mm/mempolicy.c: fix error handling in set_mempolicy and mbind." + "CVE-2022-47520": { + "cmt_msg": "wifi: wilc1000: validate pairwise and authentication suite offsets", + "cmt_id": "b3ac275fe82fb2e52085dace26ab65c91b3434b8" }, - "CVE-2017-18216": { - "cmt_msg": "ocfs2: subsystem.su_mutex is required while accessing the item->ci_parent" + "CVE-2022-47521": { + "cmt_msg": "wifi: wilc1000: validate length of IEEE80211_P2P_ATTR_CHANNEL_LIST attribute", + "cmt_id": "0269a353bb4bf49902c702e0b55dcab0d470f5aa" }, - "CVE-2017-1000112": { - "cmt_msg": "udp: consistently apply ufo or fragmentation" + "CVE-2023-2006": { + "cmt_msg": "rxrpc: Fix race between conn bundle lookup and bundle removal [ZDI-CAN-15975]", + "cmt_id": "60272ee9be89f5e8021898e65862f93e9fba90dc" }, - "CVE-2017-1000111": { - "cmt_msg": "packet: fix tp_reserve race in packet_set_ring" + "CVE-2022-3344": { + "cmt_msg": "KVM: x86: nSVM: harden svm_free_nested against freeing vmcb02 while still in use", + "cmt_id": "5ca2721b7d3ed4d3da6323a2ea7339f745866d83" }, - "CVE-2024-24855": { - "cmt_msg": "scsi: lpfc: Fix a possible data race in lpfc_unregister_fcf_rescan()" + "CVE-2023-0468": { + "cmt_msg": "io_uring: make poll refs more robust", + "cmt_id": "bc4e6ee16778149811333a969a7a893d4cc110c5" }, - "CVE-2015-8374": { - "cmt_msg": "Btrfs: fix truncation of compressed and inlined extents" + "CVE-2023-0469": { + "cmt_msg": "io_uring/filetable: fix file reference underflow", + "cmt_id": "77a467a3e20978607c56aa4886f46f78ca287054" }, - "CVE-2017-7533": { - "cmt_msg": "dentry name snapshots" + "CVE-2022-47519": { + "cmt_msg": "wifi: wilc1000: validate length of IEEE80211_P2P_ATTR_OPER_CHANNEL attribute", + "cmt_id": "c4b629c29a51344a99f279e0bc0caffd25897725" }, - "CVE-2018-8897": { - "cmt_msg": "x86/entry/64: Don't use IST entry for #BP stack" + "CVE-2022-47518": { + "cmt_msg": "wifi: wilc1000: validate number of channels", + "cmt_id": "6195b4838e10a557859862c4e7840dc0eafdd1cd" + } + }, + "6.0.12": { + "CVE-2022-4378": { + "cmt_msg": "proc: proc_skip_spaces() shouldn't think it is working on C strings", + "cmt_id": "fdf2c95f28bf197bfab421d21e8c697d4f149ea1" }, - "CVE-2021-29265": { - "cmt_msg": "usbip: fix stub_dev usbip_sockfd_store() races leading to gpf" + "CVE-2022-3435": { + "cmt_msg": "ipv4: Handle attempt to delete multipath route when fib_info contains an nh reference", + "cmt_id": "bb20a2ae241be846bc3c11ea4b3a3c69e41d51f2" + } + }, + "6.0.13": { + "CVE-2023-2166": { + "cmt_msg": "can: af_can: fix NULL pointer dereference in can_rcv_filter", + "cmt_id": "fcc63f2f7ee3038d53216edd0d8291e57c752557" }, - "CVE-2021-39648": { - "cmt_msg": "usb: gadget: configfs: Fix use-after-free issue with udc_name" + "CVE-2023-28327": { + "cmt_msg": "af_unix: Get user_ns from in_skb in unix_diag_get_exact().", + "cmt_id": "9c1d6f79a2c7b8221dcec27defc6dc461052ead4" }, - "CVE-2022-3545": { - "cmt_msg": "nfp: fix use-after-free in area_cache_get()" + "CVE-2022-42329": { + "cmt_msg": "xen/netback: don't call kfree_skb() with interrupts disabled", + "cmt_id": "3fb02db125bbcf8163e9e30d2824b4adf13f06cb" }, - "CVE-2020-14416": { - "cmt_msg": "can, slip: Protect tty->disc_data in write_wakeup and close with RCU" + "CVE-2022-3643": { + "cmt_msg": "xen/netback: Ensure protocol headers don't fall in the non-linear area", + "cmt_id": "e8851d841fe4f29b613a00de45f39c80dbfdb975" }, - "CVE-2019-0136": { - "cmt_msg": "mac80211: drop robust management frames from unknown TA" + "CVE-2022-42328": { + "cmt_msg": "xen/netback: don't call kfree_skb() with interrupts disabled", + "cmt_id": "3fb02db125bbcf8163e9e30d2824b4adf13f06cb" + } + }, + "6.0.15": { + "CVE-2022-45934": { + "cmt_msg": "Bluetooth: L2CAP: Fix u8 overflow", + "cmt_id": "5550bbf709c323194881737fd290c4bada9e6ead" + } + }, + "6.0.16": { + "CVE-2023-3357": { + "cmt_msg": "HID: amd_sfh: Add missing check for dma_alloc_coherent", + "cmt_id": "677766555ebd63a81b642a0165eed0dfc63add23" }, - "CVE-2019-16921": { - "cmt_msg": "RDMA/hns: Fix init resp when alloc ucontext" + "CVE-2022-3531": { + "cmt_msg": "selftest/bpf: Fix memory leak in kprobe_multi_test", + "cmt_id": "78b772629cc5adec02ab4182b62abe916f2254a0" }, - "CVE-2014-9904": { - "cmt_msg": "ALSA: compress: fix an integer overflow check" + "CVE-2022-3534": { + "cmt_msg": "libbpf: Fix use-after-free in btf_dump_name_dups", + "cmt_id": "8c64a8e76eb85d422af5ec60ccbf26e3ead8c333" }, - "CVE-2019-19377": { - "cmt_msg": "btrfs: Don't submit any btree write bio if the fs has errors" + "CVE-2023-22997": { + "cmt_msg": "module: Fix NULL vs IS_ERR checking for module_get_next_page", + "cmt_id": "052172bb0e4d816cdd3682e4d021d2911b83aa31" }, - "CVE-2021-21781": { - "cmt_msg": "ARM: ensure the signal page contains defined contents" + "CVE-2022-3595": { + "cmt_msg": "cifs: fix double-fault crash during ntlmssp", + "cmt_id": "983ec6379b9bab7bf790aa7df5dc3a461ebad72a" }, - "CVE-2021-0512": { - "cmt_msg": "HID: make arrays usage and value to be the same" + "CVE-2022-3424": { + "cmt_msg": "misc: sgi-gru: fix use-after-free error in gru_set_context_option, gru_fault and gru_handle_user_call_os", + "cmt_id": "dbc1bb8c8ea930f188b7ce45db162807b3f4b66a" }, - "CVE-2018-14634": { - "cmt_msg": "exec: Limit arg stack to at most 75% of _STK_LIM" + "CVE-2023-28328": { + "cmt_msg": "media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer()", + "cmt_id": "6fbc44731a4665cbe92a5090e9804a388a72214b" }, - "CVE-2018-14633": { - "cmt_msg": "scsi: target: iscsi: Use hex2bin instead of a re-implementation" + "CVE-2023-26606": { + "cmt_msg": "fs/ntfs3: Fix slab-out-of-bounds read in ntfs_trim_fs", + "cmt_id": "7e686013b7071f4c16644cfad8808e76097724c4" + } + }, + "6.0.17": { + "CVE-2023-26544": { + "cmt_msg": "fs/ntfs3: Fix slab-out-of-bounds read in run_unpack", + "cmt_id": "18f5468aadeef65501f1d0496a426ccdfd242e69" }, - "CVE-2018-12896": { - "cmt_msg": "posix-timers: Sanitize overrun handling" + "CVE-2022-48423": { + "cmt_msg": "fs/ntfs3: Validate resident attribute name", + "cmt_id": "6f6fc680b28a20b51156645c9f32908ec94eb8c9" }, - "CVE-2023-1382": { - "cmt_msg": "tipc: set con sock in tipc_conn_alloc" + "CVE-2022-48424": { + "cmt_msg": "fs/ntfs3: Validate attribute name offset", + "cmt_id": "16e8b2159002e45ed0725eea33860ef154818244" + } + }, + "6.0.18": { + "CVE-2022-36280": { + "cmt_msg": "drm/vmwgfx: Validate the box size for the snooped cursor", + "cmt_id": "4d54d11b49860686331c58a00f733b16a93edfc4" }, - "CVE-2018-14734": { - "cmt_msg": "infiniband: fix a possible use-after-free bug" + "CVE-2022-41218": { + "cmt_msg": "media: dvb-core: Fix UAF due to refcount races at releasing", + "cmt_id": "55870fc9e45faa9a65860bcd6b0f8ca8c99afe44" }, - "CVE-2022-0850": { - "cmt_msg": "ext4: fix kernel infoleak via ext4_extent_header" + "CVE-2021-33631": { + "cmt_msg": "ext4: fix kernel BUG in 'ext4_write_inline_data_end()'", + "cmt_id": "be4d62e6c0e11baeeeab1814dbc061d5cf90282c" + } + }, + "6.0.19": { + "CVE-2023-23455": { + "cmt_msg": "net: sched: atm: dont intepret cls results when asked to drop", + "cmt_id": "bbb870c88576239842602b0f7cc58c361dc8e061" }, - "CVE-2020-0347": { - "cmt_msg": "" + "CVE-2023-23454": { + "cmt_msg": "net: sched: cbq: dont intepret cls results when asked to drop", + "cmt_id": "cde7091efe3fcc0b19f736acd0163499d1fd6d31" }, - "CVE-2015-1805": { - "cmt_msg": "new helper: copy_page_from_iter()" + "CVE-2023-0045": { + "cmt_msg": "x86/bugs: Flush IBP in ib_prctl_set()", + "cmt_id": "09f4f4bf0472eaf6781966573ccd2c0eeacee60f" }, - "CVE-2022-41222": { - "cmt_msg": "mm/mremap: hold the rmap lock in write mode when moving page table entries." + "CVE-2023-0461": { + "cmt_msg": "net/ulp: prevent ULP without clone op from entering the LISTEN status", + "cmt_id": "c1b5dee463cc1e89cfa655d6beff81ec1c0c4258" }, - "CVE-2018-8822": { - "cmt_msg": "staging: ncpfs: memory corruption in ncp_read_kernel()" + "CVE-2023-0210": { + "cmt_msg": "ksmbd: check nt_len to be at least CIFS_ENCPWD_SIZE in ksmbd_decode_ntlmssp_auth_blob", + "cmt_id": "1e7ed525c60d8d51daf2700777071cd0dfb6f807" }, - "CVE-2021-40490": { - "cmt_msg": "ext4: fix race writing to an inline_data file while its xattrs are changing" + "CVE-2022-3707": { + "cmt_msg": "drm/i915/gvt: fix double free bug in split_2MB_gtt_entry", + "cmt_id": "bb84f2e119accfc65d5fa6ebe31751cdc3bca9fb" + } + }, + "outstanding": { + "CVE-2020-35501": { + "cmt_msg": "" }, - "CVE-2022-40982": { - "cmt_msg": "x86/speculation: Add Gather Data Sampling mitigation" + "CVE-2023-6176": { + "cmt_msg": "net/tls: do not free tls_rec on async operation in bpf_exec_tx_verdict()" }, - "CVE-2019-12456": { + "CVE-2023-21400": { "cmt_msg": "" }, - "CVE-2019-18680": { - "cmt_msg": "" + "CVE-2024-26685": { + "cmt_msg": "nilfs2: fix potential bug in end_buffer_async_write" }, - "CVE-2022-20565": { - "cmt_msg": "HID: core: Correctly handle ReportSize being zero" + "CVE-2023-52615": { + "cmt_msg": "hwrng: core - Fix page fault dead lock on mmap-ed hwrng" }, - "CVE-2019-5108": { - "cmt_msg": "mac80211: Do not send Layer 2 Update frame before authorization" + "CVE-2023-52614": { + "cmt_msg": "PM / devfreq: Fix buffer overflow in trans_stat_show" }, - "CVE-2019-17133": { - "cmt_msg": "cfg80211: wext: avoid copying malformed SSIDs" + "CVE-2023-52617": { + "cmt_msg": "PCI: switchtec: Fix stdev_release() crash after surprise hot remove" }, - "CVE-2017-18595": { - "cmt_msg": "tracing: Fix possible double free on failure of allocating trace buffer" + "CVE-2023-52616": { + "cmt_msg": "crypto: lib/mpi - Fix unexpected pointer access in mpi_ec_init" }, - "CVE-2021-33655": { - "cmt_msg": "fbcon: Disallow setting font bigger than screen size" + "CVE-2023-52610": { + "cmt_msg": "net/sched: act_ct: fix skb leak and crash on ooo frags" }, - "CVE-2021-3612": { - "cmt_msg": "Input: joydev - prevent potential read overflow in ioctl" + "CVE-2023-52612": { + "cmt_msg": "crypto: scomp - fix req->dst buffer overflow" }, - "CVE-2017-2636": { - "cmt_msg": "tty: n_hdlc: get rid of racy n_hdlc.tbuf" + "CVE-2023-52619": { + "cmt_msg": "pstore/ram: Fix crash when setting number of cpus to an odd number" }, - "CVE-2020-15437": { - "cmt_msg": "serial: 8250: fix null-ptr-deref in serial8250_start_tx()" + "CVE-2023-52618": { + "cmt_msg": "block/rnbd-srv: Check for unlikely string overflow" }, - "CVE-2017-7487": { - "cmt_msg": "ipx: call ipxitf_put() in ioctl error path" + "CVE-2023-5717": { + "cmt_msg": "perf: Disallow mis-matched inherited group reads" }, - "CVE-2019-6974": { - "cmt_msg": "kvm: fix kvm_ioctl_create_device() reference counting (CVE-2019-6974)" + "CVE-2023-4273": { + "cmt_msg": "exfat: check if filename entries exceeds max filename length" }, - "CVE-2022-41850": { - "cmt_msg": "HID: roccat: Fix use-after-free in roccat_read()" + "CVE-2024-26595": { + "cmt_msg": "mlxsw: spectrum_acl_tcam: Fix NULL pointer dereference in error path" }, - "CVE-2022-0168": { - "cmt_msg": "cifs: fix NULL ptr dereference in smb2_ioctl_query_info()" + "CVE-2022-23825": { + "cmt_msg": "" }, - "CVE-2023-2985": { - "cmt_msg": "fs: hfsplus: fix UAF issue in hfsplus_put_super" + "CVE-2023-4004": { + "cmt_msg": "netfilter: nft_set_pipapo: fix improper element removal" }, - "CVE-2020-14390": { - "cmt_msg": "fbcon: remove soft scrollback code" + "CVE-2023-0179": { + "cmt_msg": "netfilter: nft_payload: incorrect arithmetics when fetching VLAN header bits" }, - "CVE-2020-24502": { - "cmt_msg": "" + "CVE-2024-0584": { + "cmt_msg": "ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet" }, - "CVE-2017-17806": { - "cmt_msg": "crypto: hmac - require that the underlying hash algorithm is unkeyed" + "CVE-2023-28466": { + "cmt_msg": "net: tls: fix possible race condition between do_tls_getsockopt_conf() and do_tls_setsockopt_conf()" }, - "CVE-2017-17807": { - "cmt_msg": "KEYS: add missing permission check for request_key() destination" + "CVE-2023-0459": { + "cmt_msg": "uaccess: Add speculation barrier to copy_from_user()" }, - "CVE-2017-10661": { - "cmt_msg": "timerfd: Protect the might cancel mechanism proper" + "CVE-2023-0458": { + "cmt_msg": "prlimit: do_prlimit needs to have a speculation check" }, - "CVE-2015-8970": { - "cmt_msg": "crypto: algif_skcipher - Require setkey before accept(2)" + "CVE-2023-0597": { + "cmt_msg": "x86/mm: Randomize per-cpu entry area" }, - "CVE-2017-7541": { - "cmt_msg": "brcmfmac: fix possible buffer overflow in brcmf_cfg80211_mgmt_tx()" + "CVE-2023-5158": { + "cmt_msg": "vringh: don't use vringh_kiov_advance() in vringh_iov_xfer()" }, - "CVE-2019-19527": { - "cmt_msg": "HID: hiddev: do cleanup in failure of opening a device" + "CVE-2024-26592": { + "cmt_msg": "ksmbd: fix UAF issue in ksmbd_tcp_new_connection()" }, - "CVE-2017-7542": { - "cmt_msg": "ipv6: avoid overflow of offset in ip6_find_1stfragopt" + "CVE-2023-0266": { + "cmt_msg": "ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF" }, - "CVE-2022-1198": { - "cmt_msg": "drivers: hamradio: 6pack: fix UAF bug caused by mod_timer()" + "CVE-2024-26590": { + "cmt_msg": "erofs: fix inconsistent per-file compression format" }, - "CVE-2024-0584": { - "cmt_msg": "ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet" + "CVE-2024-26591": { + "cmt_msg": "bpf: Fix re-attachment branch in bpf_tracing_prog_attach" }, - "CVE-2020-0465": { - "cmt_msg": "HID: core: Sanitize event code and type when mapping input" + "CVE-2020-15802": { + "cmt_msg": "" }, - "CVE-2020-0305": { - "cmt_msg": "chardev: Avoid potential use-after-free in 'chrdev_open()'" + "CVE-2024-26597": { + "cmt_msg": "net: qualcomm: rmnet: fix global oob in rmnet_policy" }, - "CVE-2018-3639": { - "cmt_msg": "x86/nospec: Simplify alternative_msr_write()" + "CVE-2024-26594": { + "cmt_msg": "ksmbd: validate mech token in session setup" }, - "CVE-2021-4218": { - "cmt_msg": "sysctl: pass kernel pointers to ->proc_handler" + "CVE-2023-2483": { + "cmt_msg": "net: qcom/emac: Fix use after free bug in emac_remove due to race condition" }, - "CVE-2023-22995": { - "cmt_msg": "usb: dwc3: dwc3-qcom: Add missing platform_device_put() in dwc3_qcom_acpi_register_core" + "CVE-2024-26598": { + "cmt_msg": "KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache" }, - "CVE-2019-15902": { - "cmt_msg": "" + "CVE-2024-26599": { + "cmt_msg": "pwm: Fix out-of-bounds access in of_pwm_single_xlate()" }, - "CVE-2024-25739": { - "cmt_msg": "" + "CVE-2023-52513": { + "cmt_msg": "RDMA/siw: Fix connection failure handling" }, - "CVE-2016-7425": { - "cmt_msg": "scsi: arcmsr: Buffer overflow in arcmsr_iop_message_xfer()" + "CVE-2023-52510": { + "cmt_msg": "ieee802154: ca8210: Fix a potential UAF in ca8210_probe" }, - "CVE-2019-20054": { - "cmt_msg": "fs/proc/proc_sysctl.c: fix NULL pointer dereference in put_links" + "CVE-2023-25012": { + "cmt_msg": "HID: bigben: use spinlock to safely schedule workers" }, - "CVE-2017-15274": { - "cmt_msg": "KEYS: fix dereferencing NULL payload with nonzero length" + "CVE-2023-52511": { + "cmt_msg": "spi: sun6i: reduce DMA RX transfer width to single byte" }, - "CVE-2024-0340": { - "cmt_msg": "vhost: use kzalloc() instead of kmalloc() followed by memset()" + "CVE-2023-2002": { + "cmt_msg": "bluetooth: Perform careful capability checks in hci_sock_ioctl()" }, - "CVE-2021-3753": { - "cmt_msg": "vt_kdsetmode: extend console locking" + "CVE-2024-26586": { + "cmt_msg": "mlxsw: spectrum_acl_tcam: Fix stack corruption" }, - "CVE-2023-6536": { + "CVE-2024-26589": { + "cmt_msg": "bpf: Reject variable offset alu on PTR_TO_FLOW_KEYS" + }, + "CVE-2023-1078": { + "cmt_msg": "rds: rds_rm_zerocopy_callback() use list_first_entry()" + }, + "CVE-2023-1079": { + "cmt_msg": "HID: asus: use spinlock to safely schedule workers" + }, + "CVE-2020-26143": { "cmt_msg": "" }, - "CVE-2019-11135": { - "cmt_msg": "x86/msr: Add the IA32_TSX_CTRL MSR" + "CVE-2020-26142": { + "cmt_msg": "" }, - "CVE-2019-11810": { - "cmt_msg": "scsi: megaraid_sas: return error when create DMA pool failed" + "CVE-2023-1074": { + "cmt_msg": "sctp: fail if no bound addresses can be used for a given scope" }, - "CVE-2021-27365": { - "cmt_msg": "scsi: iscsi: Ensure sysfs attributes are limited to PAGE_SIZE" + "CVE-2023-1075": { + "cmt_msg": "net/tls: tls_is_tx_ready() checked list_entry" }, - "CVE-2021-27364": { - "cmt_msg": "scsi: iscsi: Restrict sessions and handles to admin capabilities" + "CVE-2023-1076": { + "cmt_msg": "tun: tun_chr_open(): correctly initialize socket uid" }, - "CVE-2017-14991": { - "cmt_msg": "scsi: sg: fixup infoleak when using SG_GET_REQUEST_TABLE" + "CVE-2023-1077": { + "cmt_msg": "sched/rt: pick_next_rt_entity(): check list_entry" }, - "CVE-2020-0431": { - "cmt_msg": "HID: hid-input: clear unmapped usages" + "CVE-2023-46838": { + "cmt_msg": "xen-netback: don't produce zero-size SKB frags" }, - "CVE-2018-17977": { - "cmt_msg": "" + "CVE-2023-40283": { + "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb" }, - "CVE-2010-5321": { - "cmt_msg": "" + "CVE-2023-1073": { + "cmt_msg": "HID: check empty report_list in hid_validate_values()" }, - "CVE-2020-28974": { - "cmt_msg": "vt: Disable KD_FONT_OP_COPY" + "CVE-2024-26747": { + "cmt_msg": "usb: roles: fix NULL pointer issue when put module's reference" }, - "CVE-2018-7566": { - "cmt_msg": "ALSA: seq: Fix racy pool initializations" + "CVE-2024-26783": { + "cmt_msg": "mm/vmscan: fix a bug calling wakeup_kswapd() with a wrong zone index" }, - "CVE-2022-33742": { - "cmt_msg": "xen/blkfront: force data bouncing when backend is untrusted" + "CVE-2024-26745": { + "cmt_msg": "powerpc/pseries/iommu: IOMMU table is not initialized for kdump over SR-IOV" }, - "CVE-2022-42896": { - "cmt_msg": "Bluetooth: L2CAP: Fix accepting connection request for invalid SPSM" + "CVE-2024-26744": { + "cmt_msg": "RDMA/srpt: Support specifying the srpt_service_guid parameter" }, - "CVE-2017-2647": { - "cmt_msg": "KEYS: Remove key_type::match in favour of overriding default by match_preparse" + "CVE-2024-26743": { + "cmt_msg": "RDMA/qedr: Fix qedr_create_user_qp error flow" }, - "CVE-2021-0937": { - "cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write" + "CVE-2024-26742": { + "cmt_msg": "scsi: smartpqi: Fix disable_managed_interrupts" }, - "CVE-2022-3169": { - "cmt_msg": "nvme: ensure subsystem reset is single threaded" + "CVE-2024-26740": { + "cmt_msg": "net/sched: act_mirred: use the backlog for mirred ingress" }, - "CVE-2022-4744": { - "cmt_msg": "tun: avoid double free in tun_free_netdev" + "CVE-2024-26749": { + "cmt_msg": "usb: cdns3: fixed memory use after free at cdns3_gadget_ep_disable()" }, - "CVE-2022-36280": { - "cmt_msg": "drm/vmwgfx: Validate the box size for the snooped cursor" + "CVE-2024-26748": { + "cmt_msg": "usb: cdns3: fix memory double free when handle zero packet" }, - "CVE-2019-2054": { - "cmt_msg": "arm/ptrace: run seccomp after ptrace" + "CVE-2023-1652": { + "cmt_msg": "NFSD: fix use-after-free in nfsd4_ssc_setup_dul()" }, - "CVE-2020-0404": { - "cmt_msg": "media: uvcvideo: Avoid cyclic entity chains due to malformed USB descriptors" + "CVE-2024-26787": { + "cmt_msg": "mmc: mmci: stm32: fix DMA API overlapping mappings warning" }, - "CVE-2018-20976": { - "cmt_msg": "xfs: clear sb->s_fs_info on mount failure" + "CVE-2024-22386": { + "cmt_msg": "" }, - "CVE-2016-10147": { - "cmt_msg": "crypto: mcryptd - Check mcryptd algorithm compatibility" + "CVE-2024-26699": { + "cmt_msg": "drm/amd/display: Fix array-index-out-of-bounds in dcn35_clkmgr" }, - "CVE-2024-21803": { + "CVE-2024-26698": { + "cmt_msg": "hv_netvsc: Fix race condition between netvsc_probe and netvsc_remove" + }, + "CVE-2024-26691": { + "cmt_msg": "KVM: arm64: Fix circular locking dependency" + }, + "CVE-2024-26784": { + "cmt_msg": "pmdomain: arm: Fix NULL dereference on scmi_perf_domain removal" + }, + "CVE-2024-0564": { "cmt_msg": "" }, - "CVE-2018-7995": { - "cmt_msg": "x86/MCE: Serialize sysfs changes" + "CVE-2024-0565": { + "cmt_msg": "smb: client: fix OOB in receive_encrypted_standard()" }, - "CVE-2018-16276": { - "cmt_msg": "USB: yurex: fix out-of-bounds uaccess in read handler" + "CVE-2024-26697": { + "cmt_msg": "nilfs2: fix data corruption in dsync block recovery for small block sizes" }, - "CVE-2020-29568": { - "cmt_msg": "xen/xenbus: Allow watches discard events before queueing" + "CVE-2024-26696": { + "cmt_msg": "nilfs2: fix hang in nilfs_lookup_dirty_data_buffers()" }, "CVE-2023-2176": { "cmt_msg": "RDMA/core: Refactor rdma_bind_addr" }, - "CVE-2021-3542": { - "cmt_msg": "" + "CVE-2024-26695": { + "cmt_msg": "crypto: ccp - Fix null pointer dereference in __sev_platform_shutdown_locked" }, - "CVE-2019-16413": { - "cmt_msg": "9p: use inode->i_lock to protect i_size_write() under 32-bit" + "CVE-2024-26788": { + "cmt_msg": "dmaengine: fsl-qdma: init irq after reg initialization" }, - "CVE-2018-10876": { - "cmt_msg": "ext4: only look at the bg_flags field if it is valid" + "CVE-2005-3660": { + "cmt_msg": "" }, - "CVE-2022-1263": { - "cmt_msg": "KVM: avoid NULL pointer dereference in kvm_dirty_ring_push" + "CVE-2023-31085": { + "cmt_msg": "ubi: Refuse attaching if mtd's erasesize is 0" }, - "CVE-2017-16650": { - "cmt_msg": "net: qmi_wwan: fix divide by 0 on bad descriptors" + "CVE-2023-31084": { + "cmt_msg": "media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*()" }, - "CVE-2020-12653": { - "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_cmd_append_vsie_tlv()" + "CVE-2023-31083": { + "cmt_msg": "Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO" }, - "CVE-2019-7222": { - "cmt_msg": "KVM: x86: work around leak of uninitialized stack contents (CVE-2019-7222)" + "CVE-2023-31082": { + "cmt_msg": "" }, - "CVE-2017-14051": { - "cmt_msg": "scsi: qla2xxx: Fix an integer overflow in sysfs code" + "CVE-2023-31081": { + "cmt_msg": "" }, - "CVE-2020-12654": { - "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_ret_wmm_get_status()" + "CVE-2024-0646": { + "cmt_msg": "net: tls, update curr on splice as well" }, - "CVE-2020-12655": { - "cmt_msg": "xfs: add agf freeblocks verify in xfs_agf_verify" + "CVE-2023-52499": { + "cmt_msg": "powerpc/47x: Fix 47x syscall return crash" + }, + "CVE-2023-52498": { + "cmt_msg": "PM: sleep: Fix possible deadlocks in core system-wide PM code" }, - "CVE-2018-12929": { - "cmt_msg": "" + "CVE-2023-52493": { + "cmt_msg": "bus: mhi: host: Drop chan lock before queuing buffers" }, - "CVE-2018-12928": { + "CVE-2023-52492": { + "cmt_msg": "dmaengine: fix NULL pointer in channel unregistration function" + }, + "CVE-2020-14304": { "cmt_msg": "" }, - "CVE-2017-7645": { - "cmt_msg": "nfsd: check for oversized NFSv2/v3 arguments" + "CVE-2023-52497": { + "cmt_msg": "erofs: fix lz4 inplace decompression" }, - "CVE-2020-36310": { - "cmt_msg": "KVM: SVM: avoid infinite loop on NPF from bad address" + "CVE-2023-52494": { + "cmt_msg": "bus: mhi: host: Add alignment check for event ring read pointer" }, - "CVE-2020-36313": { - "cmt_msg": "KVM: Fix out of range accesses to memslots" + "CVE-2023-3610": { + "cmt_msg": "netfilter: nf_tables: fix chain binding transaction logic" }, - "CVE-2020-35519": { - "cmt_msg": "net/x25: prevent a couple of overflows" + "CVE-2023-3611": { + "cmt_msg": "net/sched: sch_qfq: account for stab overhead in qfq_enqueue" }, - "CVE-2017-18241": { - "cmt_msg": "f2fs: fix a panic caused by NULL flush_cmd_control" + "CVE-2024-26629": { + "cmt_msg": "nfsd: fix RELEASE_LOCKOWNER" }, - "CVE-2022-33740": { - "cmt_msg": "xen/netfront: fix leaking data in shared pages" + "CVE-2023-4132": { + "cmt_msg": "media: usb: siano: Fix warning due to null work_func_t function pointer" }, - "CVE-2022-48619": { - "cmt_msg": "Input: add bounds checking to input_set_capability()" + "CVE-2023-4133": { + "cmt_msg": "cxgb4: fix use after free bugs caused by circular dependency problem" }, - "CVE-2020-10708": { + "CVE-2020-26560": { "cmt_msg": "" }, - "CVE-2020-25673": { - "cmt_msg": "nfc: Avoid endless loops caused by repeated llcp_sock_connect()" + "CVE-2024-26620": { + "cmt_msg": "s390/vfio-ap: always filter entire AP matrix" }, - "CVE-2022-0400": { + "CVE-2023-4134": { + "cmt_msg": "Input: cyttsp4_core - change del_timer_sync() to timer_shutdown_sync()" + }, + "CVE-2023-39198": { + "cmt_msg": "drm/qxl: fix UAF on handle creation" + }, + "CVE-2024-26656": { + "cmt_msg": "drm/amdgpu: fix use-after-free bug" + }, + "CVE-2023-37454": { "cmt_msg": "" }, - "CVE-2022-45886": { - "cmt_msg": "media: dvb-core: Fix use-after-free due on race condition at dvb_net" + "CVE-2023-46813": { + "cmt_msg": "x86/sev: Check for user-space IOIO pointing to kernel space" }, - "CVE-2021-38160": { - "cmt_msg": "virtio_console: Assure used length from device is limited" + "CVE-2023-35826": { + "cmt_msg": "media: cedrus: fix use after free bug in cedrus_remove due to race condition" }, - "CVE-2021-42739": { - "cmt_msg": "media: firewire: firedtv-avc: fix a buffer overflow in avc_ca_pmt()" + "CVE-2023-33288": { + "cmt_msg": "power: supply: bq24190: Fix use after free bug in bq24190_remove due to race condition" }, - "CVE-2023-1989": { - "cmt_msg": "Bluetooth: btsdio: fix use after free bug in btsdio_remove due to unfinished work" + "CVE-2023-52484": { + "cmt_msg": "iommu/arm-smmu-v3: Fix soft lockup triggered by arm_smmu_mm_invalidate_range" }, - "CVE-2022-3111": { - "cmt_msg": "power: supply: wm8350-power: Add missing free in free_charger_irq" + "CVE-2023-52586": { + "cmt_msg": "drm/msm/dpu: Add mutex lock in control vblank irq" }, - "CVE-2017-15116": { - "cmt_msg": "crypto: rng - Remove old low-level rng interface" + "CVE-2023-52485": { + "cmt_msg": "drm/amd/display: Wake DMCUB before sending a command" }, - "CVE-2020-12770": { - "cmt_msg": "scsi: sg: add sg_remove_request in sg_write" + "CVE-2023-39192": { + "cmt_msg": "netfilter: xt_u32: validate user space input" }, - "CVE-2017-15115": { - "cmt_msg": "sctp: do not peel off an assoc from one netns to another one" + "CVE-2022-3566": { + "cmt_msg": "tcp: Fix data races around icsk->icsk_af_ops." }, - "CVE-2019-15222": { - "cmt_msg": "ALSA: usb-audio: Fix gpf in snd_usb_pipe_sanity_check" + "CVE-2023-35829": { + "cmt_msg": "media: rkvdec: fix use after free bug in rkvdec_remove" }, - "CVE-2024-25744": { - "cmt_msg": "x86/coco: Disable 32-bit emulation by default on TDX and SEV" + "CVE-2023-35828": { + "cmt_msg": "usb: gadget: udc: renesas_usb3: Fix use after free bug in renesas_usb3_remove due to race condition" }, - "CVE-2022-25265": { + "CVE-2022-1116": { "cmt_msg": "" }, - "CVE-2022-20368": { - "cmt_msg": "net/packet: fix slab-out-of-bounds access in packet_recvmsg()" + "CVE-2023-6610": { + "cmt_msg": "smb: client: fix potential OOB in smb2_dump_detail()" }, - "CVE-2017-12153": { - "cmt_msg": "nl80211: check for the required netlink attributes presence" + "CVE-2023-35823": { + "cmt_msg": "media: saa7134: fix use after free bug in saa7134_finidev due to race condition" }, - "CVE-2019-19813": { - "cmt_msg": "btrfs: inode: Verify inode mode to avoid NULL pointer dereference" + "CVE-2023-35824": { + "cmt_msg": "media: dm1105: Fix use after free bug in dm1105_remove due to race condition" }, - "CVE-2017-12154": { - "cmt_msg": "kvm: nVMX: Don't allow L2 to access the hardware CR8" + "CVE-2023-35827": { + "cmt_msg": "ravb: Fix use-after-free issue in ravb_tx_timeout_work()" }, - "CVE-2020-10773": { - "cmt_msg": "s390/cmm: fix information leak in cmm_timeout_handler()" + "CVE-2012-4542": { + "cmt_msg": "" }, - "CVE-2022-21499": { - "cmt_msg": "lockdown: also lock down previous kgdb use" + "CVE-2023-52585": { + "cmt_msg": "drm/amdgpu: Fix possible NULL dereference in amdgpu_ras_query_error_status_helper()" }, - "CVE-2016-1583": { - "cmt_msg": "proc: prevent stacking filesystems on top" + "CVE-2023-52584": { + "cmt_msg": "spmi: mediatek: Fix UAF on device remove" }, - "CVE-2017-1000379": { - "cmt_msg": "mm: larger stack guard gap, between vmas" + "CVE-2023-52587": { + "cmt_msg": "IB/ipoib: Fix mcast list locking" }, - "CVE-2023-3640": { - "cmt_msg": "" + "CVE-2023-38432": { + "cmt_msg": "ksmbd: validate command payload size" }, - "CVE-2018-18281": { - "cmt_msg": "mremap: properly flush TLB before releasing the page" + "CVE-2022-3567": { + "cmt_msg": "ipv6: Fix data races around sk->sk_prot." }, - "CVE-2023-20593": { - "cmt_msg": "x86/cpu/amd: Add a Zenbleed fix" + "CVE-2023-42753": { + "cmt_msg": "netfilter: ipset: add the missing IP_SET_HASH_WITH_NET0 macro for ip_set_hash_netportnet.c" }, - "CVE-2023-3022": { - "cmt_msg": "ipv6: Use result arg in fib_lookup_arg consistently" + "CVE-2023-52583": { + "cmt_msg": "ceph: fix deadlock or deadcode of misusing dget()" }, - "CVE-2022-2663": { - "cmt_msg": "netfilter: nf_conntrack_irc: Fix forged IP logic" + "CVE-2023-52582": { + "cmt_msg": "netfs: Only call folio_start_fscache() one time for each folio" }, - "CVE-2022-43750": { - "cmt_msg": "usb: mon: make mmapped memory read only" + "CVE-2022-4269": { + "cmt_msg": "act_mirred: use the backlog for nested calls to mirred ingress" }, - "CVE-2016-6787": { - "cmt_msg": "perf: Fix event->ctx locking" + "CVE-2024-26769": { + "cmt_msg": "nvmet-fc: avoid deadlock on delete association path" }, - "CVE-2016-6786": { - "cmt_msg": "perf: Fix event->ctx locking" + "CVE-2023-42752": { + "cmt_msg": "igmp: limit igmpv3_newpack() packet size to IP_MAX_MTU" }, - "CVE-2019-15219": { - "cmt_msg": "USB: sisusbvga: fix oops in error path of sisusb_probe" + "CVE-2023-52589": { + "cmt_msg": "media: rkisp1: Fix IRQ disable race issue" }, - "CVE-2014-9940": { - "cmt_msg": "regulator: core: Fix regualtor_ena_gpio_free not to access pin after freeing" + "CVE-2023-52588": { + "cmt_msg": "f2fs: fix to tag gcing flag on page during block migration" }, - "CVE-2017-5549": { - "cmt_msg": "USB: serial: kl5kusb105: fix line-state error handling" + "CVE-2024-26768": { + "cmt_msg": "LoongArch: Change acpi_core_pic[NR_CPUS] to acpi_core_pic[MAX_CORE_PIC]" }, - "CVE-2023-4385": { - "cmt_msg": "fs: jfs: fix possible NULL pointer dereference in dbFree()" + "CVE-2023-52340": { + "cmt_msg": "ipv6: remove max_size check inline with ipv4" }, - "CVE-2020-25643": { - "cmt_msg": "hdlc_ppp: add range checks in ppp_cp_parse_cr()" + "CVE-2023-1032": { + "cmt_msg": "net: avoid double iput when sock_alloc_file fails" }, - "CVE-2024-24858": { - "cmt_msg": "" + "CVE-2024-26684": { + "cmt_msg": "net: stmmac: xgmac: fix handling of DPP safety error for DMA channels" }, - "CVE-2019-19378": { - "cmt_msg": "" + "CVE-2024-26767": { + "cmt_msg": "drm/amd/display: fixed integer types and null check locations" }, - "CVE-2020-4788": { - "cmt_msg": "powerpc/64s: flush L1D on kernel entry" + "CVE-2023-4569": { + "cmt_msg": "netfilter: nf_tables: deactivate catchall elements in next generation" }, - "CVE-2022-36879": { - "cmt_msg": "xfrm: xfrm_policy: fix a possible double xfrm_pols_put() in xfrm_bundle_lookup()" + "CVE-2023-6560": { + "cmt_msg": "io_uring: don't allow discontig pages for IORING_SETUP_NO_MMAP" }, - "CVE-2017-8831": { - "cmt_msg": "[media] saa7164: fix double fetch PCIe access condition" + "CVE-2023-30772": { + "cmt_msg": "power: supply: da9150: Fix use after free bug in da9150_charger_remove due to race condition" }, - "CVE-2021-39698": { - "cmt_msg": "wait: add wake_up_pollfree()" + "CVE-2023-1611": { + "cmt_msg": "btrfs: fix race between quota disable and quota assign ioctls" }, - "CVE-2020-10766": { - "cmt_msg": "x86/speculation: Prevent rogue cross-process SSBD shutdown" + "CVE-2024-25739": { + "cmt_msg": "" }, - "CVE-2018-5333": { - "cmt_msg": "RDS: null pointer dereference in rds_atomic_free_op" + "CVE-2024-26763": { + "cmt_msg": "dm-crypt: don't modify the data when using authenticated encryption" }, - "CVE-2018-5332": { - "cmt_msg": "RDS: Heap OOB write in rds_message_alloc_sgs()" + "CVE-2024-26756": { + "cmt_msg": "md: Don't register sync_thread for reshape directly" }, - "CVE-2022-2380": { - "cmt_msg": "video: fbdev: sm712fb: Fix crash in smtcfb_read()" + "CVE-2024-26795": { + "cmt_msg": "riscv: Sparse-Memory/vmemmap out-of-bounds fix" }, - "CVE-2017-7482": { - "cmt_msg": "rxrpc: Fix several cases where a padded len isn't checked in ticket decode" + "CVE-2024-26797": { + "cmt_msg": "drm/amd/display: Prevent potential buffer overflow in map_hw_resources" }, - "CVE-2020-10767": { - "cmt_msg": "x86/speculation: Avoid force-disabling IBPB based on STIBP and enhanced IBRS." + "CVE-2024-26790": { + "cmt_msg": "dmaengine: fsl-qdma: fix SoC may hang on 16 byte unaligned read" }, - "CVE-2019-19447": { - "cmt_msg": "ext4: work around deleting a file with i_nlink == 0 safely" + "CVE-2024-0639": { + "cmt_msg": "sctp: fix potential deadlock on &net->sctp.addr_wq_lock" }, - "CVE-2017-17448": { - "cmt_msg": "netfilter: nfnetlink_cthelper: Add missing permission checks" + "CVE-2024-26793": { + "cmt_msg": "gtp: fix use-after-free and null-ptr-deref in gtp_newlink()" }, - "CVE-2017-17449": { - "cmt_msg": "netlink: Add netns check on taps" + "CVE-2023-52530": { + "cmt_msg": "wifi: mac80211: fix potential key use-after-free" }, - "CVE-2020-24503": { - "cmt_msg": "" + "CVE-2023-52531": { + "cmt_msg": "wifi: iwlwifi: mvm: Fix a memory corruption issue" }, - "CVE-2019-19524": { - "cmt_msg": "Input: ff-memless - kill timer in destroy()" + "CVE-2023-52532": { + "cmt_msg": "net: mana: Fix TX CQE error handling" }, - "CVE-2019-19448": { - "cmt_msg": "btrfs: only search for left_info if there is no right_info in try_merge_free_space" + "CVE-2024-26798": { + "cmt_msg": "fbcon: always restore the old font data in fbcon_do_set_font()" }, - "CVE-2019-19449": { - "cmt_msg": "f2fs: fix to do sanity check on segment/section count" + "CVE-2024-26799": { + "cmt_msg": "ASoC: qcom: Fix uninitialized pointer dmactl" }, - "CVE-2023-31085": { - "cmt_msg": "ubi: Refuse attaching if mtd's erasesize is 0" + "CVE-2022-48425": { + "cmt_msg": "fs/ntfs3: Validate MFT flags before replaying logs" }, - "CVE-2019-19523": { - "cmt_msg": "USB: adutux: fix use-after-free on disconnect" + "CVE-2023-52429": { + "cmt_msg": "dm: limit the number of targets and parameter size area" }, - "CVE-2021-3752": { - "cmt_msg": "Bluetooth: fix use-after-free error in lock_sock_nested()" + "CVE-2023-39189": { + "cmt_msg": "netfilter: nfnetlink_osf: avoid OOB read" }, - "CVE-2017-18360": { - "cmt_msg": "USB: serial: io_ti: fix div-by-zero in set_termios" + "CVE-2023-35001": { + "cmt_msg": "netfilter: nf_tables: prevent OOB access in nft_byteorder_eval" }, - "CVE-2018-5848": { - "cmt_msg": "wil6210: missing length check in wmi_set_ie" + "CVE-2023-46862": { + "cmt_msg": "io_uring/fdinfo: lock SQ thread while retrieving thread cpu/pid" }, - "CVE-2017-18249": { - "cmt_msg": "f2fs: fix race condition in between free nid allocator/initializer" + "CVE-2024-26677": { + "cmt_msg": "rxrpc: Fix delayed ACKs to not set the reference serial number" }, - "CVE-2017-7261": { - "cmt_msg": "drm/vmwgfx: NULL pointer dereference in vmw_surface_define_ioctl()" + "CVE-2024-26676": { + "cmt_msg": "af_unix: Call kfree_skb() for dead unix_(sk)->oob_skb in GC." }, - "CVE-2021-35477": { - "cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4" + "CVE-2024-26675": { + "cmt_msg": "ppp_async: limit MRU to 64K" }, - "CVE-2016-5243": { - "cmt_msg": "tipc: fix an infoleak in tipc_nl_compat_link_dump" + "CVE-2020-26556": { + "cmt_msg": "" }, - "CVE-2019-15216": { - "cmt_msg": "USB: yurex: Fix protection fault after device removal" + "CVE-2020-26557": { + "cmt_msg": "" }, - "CVE-2019-16746": { - "cmt_msg": "nl80211: validate beacon head" + "CVE-2024-26671": { + "cmt_msg": "blk-mq: fix IO hang from sbitmap wakeup race" }, - "CVE-2022-3606": { + "CVE-2023-34324": { + "cmt_msg": "xen/events: replace evtchn_rwlock with RCU" + }, + "CVE-2024-26776": { + "cmt_msg": "spi: hisi-sfc-v3xx: Return IRQ_NONE if no interrupts were detected" + }, + "CVE-2024-26777": { + "cmt_msg": "fbdev: sis: Error out if pixclock equals zero" + }, + "CVE-2019-20794": { "cmt_msg": "" }, - "CVE-2019-15215": { - "cmt_msg": "media: cpia2_usb: first wake up, then free in disconnect" + "CVE-2020-26559": { + "cmt_msg": "" }, - "CVE-2022-2209": { + "CVE-2023-3397": { "cmt_msg": "" }, - "CVE-2018-18021": { - "cmt_msg": "arm64: KVM: Tighten guest core register access from userspace" + "CVE-2024-26773": { + "cmt_msg": "ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found()" }, - "CVE-2021-37576": { - "cmt_msg": "KVM: PPC: Book3S: Fix H_RTAS rets buffer overflow" + "CVE-2024-26679": { + "cmt_msg": "inet: read sk->sk_family once in inet_recv_error()" }, - "CVE-2017-9725": { - "cmt_msg": "mm: cma: fix incorrect type conversion for size during dma allocation" + "CVE-2024-26771": { + "cmt_msg": "dmaengine: ti: edma: Add some null pointer checks to the edma_probe" }, - "CVE-2023-7042": { + "CVE-2023-52458": { + "cmt_msg": "block: add check that partition length needs to be aligned with block size" + }, + "CVE-2018-1121": { "cmt_msg": "" }, - "CVE-2023-45871": { - "cmt_msg": "igb: set max size RX buffer when store bad packet is enabled" + "CVE-2023-52454": { + "cmt_msg": "nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length" }, - "CVE-2023-46343": { - "cmt_msg": "nfc: nci: fix possible NULL pointer dereference in send_acknowledge()" + "CVE-2023-28746": { + "cmt_msg": "x86/mmio: Disable KVM mitigation when X86_FEATURE_CLEAR_CPU_BUF is set" }, - "CVE-2022-3594": { - "cmt_msg": "r8152: Rate limit overflow messages" + "CVE-2023-52452": { + "cmt_msg": "bpf: Fix accesses to uninit stack slots" }, - "CVE-2018-14609": { - "cmt_msg": "btrfs: relocation: Only remove reloc rb_trees if reloc control has been initialized" + "CVE-2023-52451": { + "cmt_msg": "powerpc/pseries/memhp: Fix access beyond end of drmem array" }, - "CVE-2023-35824": { - "cmt_msg": "media: dm1105: Fix use after free bug in dm1105_remove due to race condition" + "CVE-2024-26602": { + "cmt_msg": "sched/membarrier: reduce the ability to hammer on sys_membarrier" }, - "CVE-2021-33098": { - "cmt_msg": "ixgbe: fix large MTU request from VF" + "CVE-2024-1085": { + "cmt_msg": "netfilter: nf_tables: check if catch-all set element is active in next generation" }, - "CVE-2022-3595": { - "cmt_msg": "cifs: fix double-fault crash during ntlmssp" + "CVE-2024-1086": { + "cmt_msg": "netfilter: nf_tables: reject QUEUE/DROP verdict parameters" }, - "CVE-2022-38096": { - "cmt_msg": "" + "CVE-2024-26735": { + "cmt_msg": "ipv6: sr: fix possible use-after-free and null-ptr-deref" }, - "CVE-2023-47233": { + "CVE-2023-32250": { + "cmt_msg": "ksmbd: fix racy issue from session setup and logoff" + }, + "CVE-2024-26702": { + "cmt_msg": "iio: magnetometer: rm3100: add boundary check for the value read from RM3100_REG_TMRC" + }, + "CVE-2023-6240": { "cmt_msg": "" }, - "CVE-2020-10769": { - "cmt_msg": "crypto: authenc - fix parsing key with misaligned rta_len" + "CVE-2024-26700": { + "cmt_msg": "drm/amd/display: Fix MST Null Ptr for RV" }, - "CVE-2018-5803": { - "cmt_msg": "sctp: verify size of a new chunk in _sctp_make_chunk()" + "CVE-2024-26707": { + "cmt_msg": "net: hsr: remove WARN_ONCE() in send_hsr_supervision_frame()" }, - "CVE-2020-27815": { - "cmt_msg": "jfs: Fix array index bounds check in dbAdjTree" + "CVE-2024-26706": { + "cmt_msg": "parisc: Fix random data corruption from exception handler" }, - "CVE-2020-0543": { - "cmt_msg": "x86/cpu: Add 'table' argument to cpu_matches()" + "CVE-2023-23559": { + "cmt_msg": "wifi: rndis_wlan: Prevent buffer overflow in rndis_query_oid" }, - "CVE-2022-1462": { - "cmt_msg": "tty: use new tty_insert_flip_string_and_push_buffer() in pty_write()" + "CVE-2024-26603": { + "cmt_msg": "x86/fpu: Stop relying on userspace for info to fault in xsave buffer" }, - "CVE-2023-6606": { - "cmt_msg": "smb: client: fix OOB in smbCalcSize()" + "CVE-2023-32233": { + "cmt_msg": "netfilter: nf_tables: deactivate anonymous set from preparation phase" }, - "CVE-2020-27067": { - "cmt_msg": "l2tp: fix l2tp_eth module loading" + "CVE-2023-44466": { + "cmt_msg": "libceph: harden msgr2.1 frame segment length checks" }, - "CVE-2020-27777": { - "cmt_msg": "powerpc/rtas: Restrict RTAS requests from userspace" + "CVE-2024-23196": { + "cmt_msg": "ALSA: hda: fix a possible null-pointer dereference due to data race in snd_hdac_regmap_sync()" }, - "CVE-2019-20636": { - "cmt_msg": "Input: add safety guards to input_set_keycode()" + "CVE-2019-19814": { + "cmt_msg": "" }, - "CVE-2019-11486": { - "cmt_msg": "tty: mark Siemens R3964 line discipline as BROKEN" + "CVE-2023-52620": { + "cmt_msg": "netfilter: nf_tables: disallow timeout for anonymous sets" }, - "CVE-2019-11487": { - "cmt_msg": "fs: prevent page refcount overflow in pipe_buf_get" + "CVE-2023-52621": { + "cmt_msg": "bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers" }, - "CVE-2022-28390": { - "cmt_msg": "can: ems_usb: ems_usb_start_xmit(): fix double dev_kfree_skb() in error path" + "CVE-2023-52622": { + "cmt_msg": "ext4: avoid online resizing failures due to oversized flex bg" }, - "CVE-2020-27066": { - "cmt_msg": "xfrm: policy: Fix doulbe free in xfrm_policy_timer" + "CVE-2023-52623": { + "cmt_msg": "SUNRPC: Fix a suspicious RCU usage warning" }, - "CVE-2020-27675": { - "cmt_msg": "xen/events: avoid removing an event channel while handling it" + "CVE-2023-52624": { + "cmt_msg": "drm/amd/display: Wake DMCUB before executing GPINT commands" }, - "CVE-2020-28915": { - "cmt_msg": "fbcon: Fix global-out-of-bounds read in fbcon_get_font()" + "CVE-2023-52625": { + "cmt_msg": "drm/amd/display: Refactor DMCUB enter/exit idle interface" }, - "CVE-2014-9728": { - "cmt_msg": "udf: Verify i_size when loading inode" + "CVE-2023-52627": { + "cmt_msg": "iio: adc: ad7091r: Allow users to configure device events" }, - "CVE-2014-9729": { - "cmt_msg": "udf: Verify i_size when loading inode" + "CVE-2023-52628": { + "cmt_msg": "netfilter: nftables: exthdr: fix 4-byte stack OOB write" }, - "CVE-2023-3776": { - "cmt_msg": "net/sched: cls_fw: Fix improper refcount update leads to use-after-free" + "CVE-2021-26934": { + "cmt_msg": "" }, - "CVE-2021-28038": { - "cmt_msg": "Xen/gnttab: handle p2m update errors on a per-slot basis" + "CVE-2023-3141": { + "cmt_msg": "memstick: r592: Fix UAF bug in r592_remove due to race condition" }, - "CVE-2020-27068": { - "cmt_msg": "cfg80211: add missing policy for NL80211_ATTR_STATUS_CODE" + "CVE-2023-34256": { + "cmt_msg": "ext4: avoid a potential slab-out-of-bounds in ext4_group_desc_csum" }, - "CVE-2022-23040": { - "cmt_msg": "xen/xenbus: don't let xenbus_grant_ring() remove grants in error case" + "CVE-2024-26601": { + "cmt_msg": "ext4: regenerate buddy after block freeing failed if under fc replay" }, - "CVE-2021-29154": { - "cmt_msg": "bpf, x86: Validate computation of branch displacements for x86-64" + "CVE-2022-3523": { + "cmt_msg": "mm/memory.c: fix race when faulting a device private page" }, - "CVE-2023-52435": { - "cmt_msg": "net: prevent mss overflow in skb_segment()" + "CVE-2022-3522": { + "cmt_msg": "mm/hugetlb: use hugetlb_pte_stable in migration race check" }, - "CVE-2023-52434": { - "cmt_msg": "smb: client: fix potential OOBs in smb2_parse_contexts()" + "CVE-2008-2544": { + "cmt_msg": "" }, - "CVE-2021-45469": { - "cmt_msg": "f2fs: fix to do sanity check on last xattr entry in __f2fs_setxattr()" + "CVE-2023-52580": { + "cmt_msg": "net/core: Fix ETH_P_1588 flow dissector" }, - "CVE-2023-52436": { - "cmt_msg": "f2fs: explicitly null-terminate the xattr list" + "CVE-2022-2196": { + "cmt_msg": "KVM: VMX: Execute IBPB on emulated VM-exit when guest has IBRS" }, - "CVE-2019-19060": { - "cmt_msg": "iio: imu: adis16400: release allocated memory on failure" + "CVE-2023-3865": { + "cmt_msg": "ksmbd: fix out-of-bound read in smb2_write" }, - "CVE-2019-19061": { - "cmt_msg": "iio: imu: adis16400: fix memory leak" + "CVE-2023-3867": { + "cmt_msg": "ksmbd: add missing compound request handing in some commands" }, - "CVE-2019-19062": { - "cmt_msg": "crypto: user - fix memory leak in crypto_report" + "CVE-2023-3866": { + "cmt_msg": "ksmbd: validate session id and tree id in the compound request" }, - "CVE-2019-19063": { - "cmt_msg": "rtlwifi: prevent memory leak in rtl_usb_probe" + "CVE-2007-3719": { + "cmt_msg": "" }, - "CVE-2017-17741": { - "cmt_msg": "KVM: Fix stack-out-of-bounds read in write_mmio" + "CVE-2023-3863": { + "cmt_msg": "net: nfc: Fix use-after-free caused by nfc_llcp_find_local" }, - "CVE-2019-9445": { - "cmt_msg": "f2fs: check if file namelen exceeds max value" + "CVE-2022-45919": { + "cmt_msg": "media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221" }, - "CVE-2019-19066": { - "cmt_msg": "scsi: bfa: release allocated memory in case of error" + "CVE-2023-2248": { + "cmt_msg": "net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg" }, - "CVE-2017-7184": { - "cmt_msg": "xfrm_user: validate XFRM_MSG_NEWAE XFRMA_REPLAY_ESN_VAL replay_window" + "CVE-2023-32269": { + "cmt_msg": "netrom: Fix use-after-free caused by accept on already connected socket" }, - "CVE-2020-0435": { - "cmt_msg": "f2fs: fix to do sanity check with i_extra_isize" + "CVE-2024-26583": { + "cmt_msg": "tls: fix race between async notify and socket close" }, - "CVE-2020-0432": { - "cmt_msg": "staging: most: net: fix buffer overflow" + "CVE-2024-26582": { + "cmt_msg": "net: tls: fix use-after-free with partial reads and async decrypt" }, - "CVE-2020-0433": { - "cmt_msg": "blk-mq: sync the update nr_hw_queues with blk_mq_queue_tag_busy_iter" + "CVE-2024-26585": { + "cmt_msg": "tls: fix race between tx work scheduling and socket close" }, - "CVE-2023-51779": { - "cmt_msg": "Bluetooth: af_bluetooth: Fix Use-After-Free in bt_sock_recvmsg" + "CVE-2024-26584": { + "cmt_msg": "net: tls: handle backlogging of crypto requests" }, - "CVE-2019-3874": { - "cmt_msg": "sctp: implement memory accounting on tx path" + "CVE-2022-1247": { + "cmt_msg": "" }, - "CVE-2018-10877": { - "cmt_msg": "ext4: verify the depth of extent tree in ext4_find_extent()" + "CVE-2023-51782": { + "cmt_msg": "net/rose: Fix Use-After-Free in rose_ioctl" }, - "CVE-2016-8650": { - "cmt_msg": "mpi: Fix NULL ptr dereference in mpi_powm() " + "CVE-2023-51780": { + "cmt_msg": "atm: Fix Use-After-Free in do_vcc_ioctl" }, - "CVE-2010-4563": { - "cmt_msg": "" + "CVE-2023-51781": { + "cmt_msg": "appletalk: Fix Use-After-Free in atalk_ioctl" }, - "CVE-2016-8655": { - "cmt_msg": "packet: fix race condition in packet_set_ring" + "CVE-2023-3090": { + "cmt_msg": "ipvlan:Fix out-of-bounds caused by unclear skb->cb" }, - "CVE-2020-14331": { - "cmt_msg": "vgacon: Fix for missing check in scrollback handling" + "CVE-2023-52578": { + "cmt_msg": "net: bridge: use DEV_STATS_INC()" }, - "CVE-2016-8658": { - "cmt_msg": "brcmfmac: avoid potential stack overflow in brcmf_cfg80211_start_ap()" + "CVE-2023-52574": { + "cmt_msg": "team: fix null-ptr-deref when team device type is changed" }, - "CVE-2018-10879": { - "cmt_msg": "ext4: make sure bitmaps and the inode table don't overlap with bg descriptors" + "CVE-2023-52576": { + "cmt_msg": "x86/mm, kexec, ima: Use memblock_free_late() from ima_free_kexec_buffer()" }, - "CVE-2018-10878": { - "cmt_msg": "ext4: always check block group bounds in ext4_init_block_bitmap()" + "CVE-2022-3238": { + "cmt_msg": "" }, - "CVE-2024-23851": { - "cmt_msg": "dm: limit the number of targets and parameter size area" + "CVE-2023-52571": { + "cmt_msg": "power: supply: rk817: Fix node refcount leak" }, - "CVE-2023-0266": { - "cmt_msg": "ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF" + "CVE-2023-52572": { + "cmt_msg": "cifs: Fix UAF in cifs_demultiplex_thread()" }, - "CVE-2023-1838": { - "cmt_msg": "Fix double fget() in vhost_net_set_backend()" + "CVE-2023-52573": { + "cmt_msg": "net: rds: Fix possible NULL-pointer dereference" }, - "CVE-2021-3483": { - "cmt_msg": "firewire: nosy: Fix a use-after-free bug in nosy_ioctl()" + "CVE-2023-4921": { + "cmt_msg": "net: sched: sch_qfq: Fix UAF in qfq_dequeue()" }, - "CVE-2017-16913": { - "cmt_msg": "usbip: fix stub_rx: harden CMD_SUBMIT path to handle malicious input" + "CVE-2023-1829": { + "cmt_msg": "net/sched: Retire tcindex classifier" }, - "CVE-2017-16912": { - "cmt_msg": "usbip: fix stub_rx: get_pipe() to validate endpoint number" + "CVE-2024-0775": { + "cmt_msg": "ext4: improve error recovery code paths in __ext4_remount()" }, - "CVE-2017-16911": { - "cmt_msg": "usbip: prevent vhci_hcd driver from leaking a socket pointer address" + "CVE-2023-4881": { + "cmt_msg": "netfilter: nftables: exthdr: fix 4-byte stack OOB write" }, - "CVE-2017-0861": { - "cmt_msg": "ALSA: pcm: prevent UAF in snd_pcm_info" + "CVE-2013-7445": { + "cmt_msg": "" }, - "CVE-2020-25656": { - "cmt_msg": "vt: keyboard, extend func_buf_lock to readers" + "CVE-2023-31248": { + "cmt_msg": "netfilter: nf_tables: do not ignore genmask when looking up chain by id" }, - "CVE-2017-16914": { - "cmt_msg": "usbip: fix stub_send_ret_submit() vulnerability to null transfer_buffer" + "CVE-2024-26736": { + "cmt_msg": "afs: Increase buffer size in afs_update_volume_status()" }, - "CVE-2022-0492": { - "cmt_msg": "cgroup-v1: Require capabilities to set release_agent" + "CVE-2024-26737": { + "cmt_msg": "bpf: Fix racing between bpf_timer_cancel_and_free and bpf_timer_cancel" }, - "CVE-2024-26598": { - "cmt_msg": "KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache" + "CVE-2024-26593": { + "cmt_msg": "i2c: i801: Fix block process call transactions" }, - "CVE-2019-10142": { - "cmt_msg": "drivers/virt/fsl_hypervisor.c: prevent integer overflow in ioctl" + "CVE-2024-26738": { + "cmt_msg": "powerpc/pseries/iommu: DLPAR add doesn't completely initialize pci_controller" }, - "CVE-2021-4023": { - "cmt_msg": "io-wq: fix cancellation on create-worker failure" + "CVE-2024-26739": { + "cmt_msg": "net/sched: act_mirred: don't override retval if we already lost the skb" }, - "CVE-2017-11176": { - "cmt_msg": "mqueue: fix a use-after-free in sys_mq_notify()" + "CVE-2022-38096": { + "cmt_msg": "" }, - "CVE-2023-3268": { - "cmt_msg": "relayfs: fix out-of-bounds access in relay_file_read" + "CVE-2024-26805": { + "cmt_msg": "netlink: Fix kernel-infoleak-after-free in __skb_datagram_iter" }, - "CVE-2017-12193": { - "cmt_msg": "assoc_array: Fix a buggy node-splitting case" + "CVE-2023-2898": { + "cmt_msg": "f2fs: fix to avoid NULL pointer dereference f2fs_write_end_io()" }, - "CVE-2017-12192": { - "cmt_msg": "KEYS: prevent KEYCTL_READ on negative key" + "CVE-2023-6931": { + "cmt_msg": "perf: Fix perf_event_validate_size()" }, - "CVE-2016-3841": { - "cmt_msg": "ipv6: add complete rcu protection around np->opt" + "CVE-2023-6932": { + "cmt_msg": "ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet" }, - "CVE-2017-12190": { - "cmt_msg": "fix unbalanced page refcounting in bio_map_user_iov" + "CVE-2024-0607": { + "cmt_msg": "netfilter: nf_tables: fix pointer math issue in nft_byteorder_eval()" }, - "CVE-2022-1011": { - "cmt_msg": "fuse: fix pipe buffer lifetime for direct_io" + "CVE-2024-26803": { + "cmt_msg": "net: veth: clear GRO when clearing XDP even when down" }, - "CVE-2021-0399": { + "CVE-2022-4129": { + "cmt_msg": "l2tp: Serialize access to sk_user_data with sk_callback_lock" + }, + "CVE-2022-4543": { "cmt_msg": "" }, - "CVE-2016-3961": { - "cmt_msg": "x86/mm/xen: Suppress hugetlbfs in PV guests" + "CVE-2024-26646": { + "cmt_msg": "thermal: intel: hfi: Add syscore callbacks for system-wide PM" }, - "CVE-2023-3111": { - "cmt_msg": "btrfs: unset reloc control if transaction commit fails in prepare_to_relocate()" + "CVE-2024-26647": { + "cmt_msg": "drm/amd/display: Fix late derefrence 'dsc' check in 'link_set_dsc_pps_packet()'" }, - "CVE-2020-2732": { - "cmt_msg": "KVM: nVMX: Don't emulate instructions in guest mode" + "CVE-2024-26644": { + "cmt_msg": "btrfs: don't abort filesystem when attempting to snapshot deleted subvolume" }, - "CVE-2012-4542": { - "cmt_msg": "" + "CVE-2024-26645": { + "cmt_msg": "tracing: Ensure visibility when inserting an element into tracing_map" }, - "CVE-2023-42752": { - "cmt_msg": "igmp: limit igmpv3_newpack() packet size to IP_MAX_MTU" + "CVE-2023-33203": { + "cmt_msg": "net: qcom/emac: Fix use after free bug in emac_remove due to race condition" }, - "CVE-2018-1000028": { - "cmt_msg": "nfsd: auth: Fix gid sorting when rootsquash enabled" + "CVE-2024-26640": { + "cmt_msg": "tcp: add sanity checks to rx zerocopy" }, - "CVE-2023-1118": { - "cmt_msg": "media: rc: Fix use-after-free bugs caused by ene_tx_irqsim()" + "CVE-2024-26641": { + "cmt_msg": "ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv()" }, - "CVE-2018-7191": { - "cmt_msg": "tun: call dev_get_valid_name() before register_netdevice()" + "CVE-2023-26545": { + "cmt_msg": "net: mpls: fix stale pointer if allocation fails during device rename" }, - "CVE-2022-1679": { - "cmt_msg": "ath9k: fix use-after-free in ath9k_hif_usb_rx_cb" + "CVE-2023-50431": { + "cmt_msg": "accel/habanalabs: fix information leak in sec_attest_info()" }, - "CVE-2018-1000026": { - "cmt_msg": "bnx2x: disable GSO where gso_size is too big for hardware" + "CVE-2024-26791": { + "cmt_msg": "btrfs: dev-replace: properly validate device names" }, - "CVE-2022-1975": { - "cmt_msg": "NFC: netlink: fix sleep in atomic bug when firmware download timeout" + "CVE-2023-52467": { + "cmt_msg": "mfd: syscon: Fix null pointer dereference in of_syscon_register()" }, - "CVE-2023-1380": { - "cmt_msg": "wifi: brcmfmac: slab-out-of-bounds read in brcmf_get_assoc_ies()" + "CVE-2023-52464": { + "cmt_msg": "EDAC/thunderx: Fix possible out-of-bounds string access" }, - "CVE-2022-44032": { - "cmt_msg": "char: pcmcia: remove all the drivers" + "CVE-2023-52462": { + "cmt_msg": "bpf: fix check for attempt to corrupt spilled pointer" }, - "CVE-2017-0786": { - "cmt_msg": "brcmfmac: add length check in brcmf_cfg80211_escan_handler()" + "CVE-2023-52463": { + "cmt_msg": "efivarfs: force RO when remounting if SetVariable is not supported" }, - "CVE-2021-28972": { - "cmt_msg": "PCI: rpadlpar: Fix potential drc_name corruption in store functions" + "CVE-2023-52469": { + "cmt_msg": "drivers/amd/pm: fix a use-after-free in kv_parse_power_table" }, - "CVE-2018-12130": { - "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" + "CVE-2019-15290": { + "cmt_msg": "" }, - "CVE-2020-14305": { - "cmt_msg": "netfilter: helpers: remove data_len usage for inkernel helpers" + "CVE-2023-3212": { + "cmt_msg": "gfs2: Don't deref jdesc in evict" }, - "CVE-2021-20292": { - "cmt_msg": "drm/ttm/nouveau: don't call tt destroy callback on alloc failure." + "CVE-2024-23848": { + "cmt_msg": "" }, - "CVE-2021-31916": { - "cmt_msg": "dm ioctl: fix out of bounds array access when no devices" + "CVE-2024-26633": { + "cmt_msg": "ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim()" }, - "CVE-2017-8065": { - "cmt_msg": "crypto: ccm - move cbcmac input off the stack" + "CVE-2024-26632": { + "cmt_msg": "block: Fix iterating over an empty bio with bio_for_each_folio_all" }, - "CVE-2017-8064": { - "cmt_msg": "[media] dvb-usb-v2: avoid use-after-free" + "CVE-2023-6622": { + "cmt_msg": "netfilter: nf_tables: bail out on mismatching dynset and set expressions" }, - "CVE-2018-13405": { - "cmt_msg": "Fix up non-directory creation in SGID directories" + "CVE-2024-26733": { + "cmt_msg": "arp: Prevent overflow in arp_req_get()." }, - "CVE-2021-0941": { - "cmt_msg": "bpf: Remove MTU check in __bpf_skb_max_len" + "CVE-2024-26625": { + "cmt_msg": "llc: call sock_orphan() at release time" }, - "CVE-2018-13406": { - "cmt_msg": "video: uvesafb: Fix integer overflow in allocation" + "CVE-2024-26635": { + "cmt_msg": "llc: Drop support for ETH_P_TR_802_2." }, - "CVE-2023-3772": { - "cmt_msg": "xfrm: add NULL check in xfrm_update_ae_params" + "CVE-2022-26878": { + "cmt_msg": "" }, - "CVE-2020-11668": { - "cmt_msg": "media: xirlink_cit: add missing descriptor sanity checks" + "CVE-2024-2193": { + "cmt_msg": "" }, - "CVE-2020-11669": { - "cmt_msg": "powerpc/powernv/idle: Restore AMR/UAMOR/AMOR after idle" + "CVE-2018-12930": { + "cmt_msg": "" }, - "CVE-2019-15118": { - "cmt_msg": "ALSA: usb-audio: Fix a stack buffer overflow bug in check_input_term" + "CVE-2018-12931": { + "cmt_msg": "" }, - "CVE-2022-3524": { - "cmt_msg": "tcp/udp: Fix memory leak in ipv6_renew_options()." + "CVE-2023-38426": { + "cmt_msg": "ksmbd: fix global-out-of-bounds in smb2_find_context_vals" }, - "CVE-2019-12818": { - "cmt_msg": "net: nfc: Fix NULL dereference on nfc_llcp_build_tlv fails" + "CVE-2023-52637": { + "cmt_msg": "can: j1939: Fix UAF in j1939_sk_match_filter during setsockopt(SO_J1939_FILTER)" }, - "CVE-2019-12819": { - "cmt_msg": "mdio_bus: Fix use-after-free on device_register fails" + "CVE-2023-32247": { + "cmt_msg": "ksmbd: destroy expired sessions" }, - "CVE-2023-0394": { - "cmt_msg": "ipv6: raw: Deduct extension header length in rawv6_push_pending_frames" + "CVE-2023-32248": { + "cmt_msg": "ksmbd: fix NULL pointer dereference in smb2_get_info_filesystem()" }, - "CVE-2015-0274": { - "cmt_msg": "xfs: remote attribute overwrite causes transaction overrun" + "CVE-2023-1998": { + "cmt_msg": "x86/speculation: Allow enabling STIBP with legacy IBRS" }, - "CVE-2019-19332": { - "cmt_msg": "KVM: x86: fix out-of-bounds write in KVM_GET_EMULATED_CPUID (CVE-2019-19332)" + "CVE-2024-26648": { + "cmt_msg": "drm/amd/display: Fix variable deferencing before NULL check in edp_setup_replay()" }, - "CVE-2019-15117": { - "cmt_msg": "ALSA: usb-audio: Fix an OOB bug in parse_audio_mixer_unit" + "CVE-2024-25740": { + "cmt_msg": "" }, - "CVE-2021-3659": { - "cmt_msg": "net: mac802154: Fix general protection fault" + "CVE-2022-3903": { + "cmt_msg": "media: mceusb: Use new usb_control_msg_*() routines" }, - "CVE-2021-4155": { - "cmt_msg": "xfs: map unwritten blocks in XFS_IOC_{ALLOC,FREE}SP just like fallocate" + "CVE-2024-26642": { + "cmt_msg": "netfilter: nf_tables: disallow anonymous set with timeout flag" }, - "CVE-2019-14901": { - "cmt_msg": "mwifiex: Fix heap overflow in mmwifiex_process_tdls_action_frame()" + "CVE-2023-1195": { + "cmt_msg": "cifs: fix use-after-free caused by invalid pointer `hostname`" }, - "CVE-2021-4150": { - "cmt_msg": "block: fix incorrect references to disk objects" + "CVE-2023-1194": { + "cmt_msg": "ksmbd: fix out-of-bound read in parse_lease_state()" }, - "CVE-2020-3702": { - "cmt_msg": "ath: Use safer key clearing with key cache entries" + "CVE-2023-20588": { + "cmt_msg": "x86/CPU/AMD: Do not leak quotient data after a division by 0" }, - "CVE-2015-4176": { - "cmt_msg": "mnt: Update detach_mounts to leave mounts connected" + "CVE-2023-1192": { + "cmt_msg": "fs/ntfs3: Validate MFT flags before replaying logs" }, - "CVE-2020-16166": { - "cmt_msg": "random32: update the net random state on interrupt and activity" + "CVE-2022-4379": { + "cmt_msg": "NFSD: fix use-after-free in __nfs42_ssc_open()" }, - "CVE-2021-3653": { - "cmt_msg": "KVM: nSVM: avoid picking up unsupported bits from L2 in int_ctl (CVE-2021-3653)" + "CVE-2022-44034": { + "cmt_msg": "char: pcmcia: remove all the drivers" }, - "CVE-2021-3655": { - "cmt_msg": "sctp: validate from_addr_param return" + "CVE-2022-44033": { + "cmt_msg": "char: pcmcia: remove all the drivers" }, - "CVE-2020-8694": { - "cmt_msg": "powercap: restrict energy meter to root access" + "CVE-2022-44032": { + "cmt_msg": "char: pcmcia: remove all the drivers" }, - "CVE-2021-4159": { - "cmt_msg": "bpf: Verifer, adjust_scalar_min_max_vals to always call update_reg_bounds()" + "CVE-2022-48502": { + "cmt_msg": "fs/ntfs3: Check fields while reading" }, - "CVE-2024-26584": { - "cmt_msg": "net: tls: handle backlogging of crypto requests" + "CVE-2023-21102": { + "cmt_msg": "efi: rt-wrapper: Add missing include" }, - "CVE-2019-12614": { - "cmt_msg": "powerpc/pseries/dlpar: Fix a missing check in dlpar_parse_cc_property()" + "CVE-2024-22705": { + "cmt_msg": "ksmbd: fix slab-out-of-bounds in smb_strndup_from_utf16()" }, - "CVE-2019-12615": { - "cmt_msg": "mdesc: fix a missing-check bug in get_vdev_port_node_info()" + "CVE-2024-26622": { + "cmt_msg": "tomoyo: fix UAF write bug in tomoyo_write_control()" }, - "CVE-2021-3714": { - "cmt_msg": "" + "CVE-2023-4147": { + "cmt_msg": "netfilter: nf_tables: disallow rule addition to bound chain via NFTA_RULE_CHAIN_ID" }, - "CVE-2020-10742": { - "cmt_msg": "new helper: iov_iter_get_pages_alloc()" + "CVE-2023-5090": { + "cmt_msg": "x86: KVM: SVM: always update the x2avic msr interception" }, - "CVE-2017-12168": { - "cmt_msg": "arm64: KVM: pmu: Fix AArch32 cycle counter access" + "CVE-2023-38427": { + "cmt_msg": "ksmbd: fix out-of-bound read in deassemble_neg_contexts()" }, - "CVE-2019-16233": { - "cmt_msg": "scsi: qla2xxx: fix a potential NULL pointer dereference" + "CVE-2023-52527": { + "cmt_msg": "ipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data()" }, - "CVE-2021-3892": { - "cmt_msg": "" + "CVE-2024-26782": { + "cmt_msg": "mptcp: fix double-free on socket dismantle" }, - "CVE-2019-6133": { - "cmt_msg": "fork: record start_time late" + "CVE-2023-52523": { + "cmt_msg": "bpf, sockmap: Reject sk_msg egress redirects to non-TCP sockets" }, - "CVE-2018-10902": { - "cmt_msg": "ALSA: rawmidi: Change resized buffers atomically" + "CVE-2023-52522": { + "cmt_msg": "net: fix possible store tearing in neigh_periodic_work()" }, - "CVE-2021-39633": { - "cmt_msg": "ip_gre: add validation for csum_start" + "CVE-2023-52520": { + "cmt_msg": "platform/x86: think-lmi: Fix reference leak" }, - "CVE-2017-18203": { - "cmt_msg": "dm: fix race between dm_get_from_kobject() and __dm_destroy()" + "CVE-2024-0641": { + "cmt_msg": "tipc: fix a potential deadlock on &tx->lock" }, - "CVE-2020-27673": { - "cmt_msg": "xen/events: add a proper barrier to 2-level uevent unmasking" + "CVE-2024-26789": { + "cmt_msg": "crypto: arm64/neonbs - fix out-of-bounds access on short input" }, - "CVE-2017-6951": { - "cmt_msg": "KEYS: Remove key_type::match in favour of overriding default by match_preparse" + "CVE-2024-26779": { + "cmt_msg": "wifi: mac80211: fix race condition on enabling fast-xmit" }, - "CVE-2017-18204": { - "cmt_msg": "ocfs2: should wait dio before inode lock in ocfs2_setattr()" + "CVE-2023-52529": { + "cmt_msg": "HID: sony: Fix a potential memory leak in sony_probe()" }, - "CVE-2020-26147": { - "cmt_msg": "mac80211: assure all fragments are encrypted" + "CVE-2023-52528": { + "cmt_msg": "net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg" }, - "CVE-2019-3882": { - "cmt_msg": "vfio/type1: Limit DMA mappings per container" + "CVE-2023-2430": { + "cmt_msg": "io_uring/msg_ring: fix missing lock on overflow for IOPOLL" }, - "CVE-2017-18208": { - "cmt_msg": "mm/madvise.c: fix madvise() infinite loop under special circumstances" + "CVE-2023-39194": { + "cmt_msg": "net: xfrm: Fix xfrm_address_filter OOB read" }, - "CVE-2022-33741": { - "cmt_msg": "xen/netfront: force data bouncing when backend is untrusted" + "CVE-2023-39197": { + "cmt_msg": "netfilter: conntrack: dccp: copy entire header to stack buffer, not just basic one" }, - "CVE-2018-20509": { - "cmt_msg": "binder: refactor binder ref inc/dec for thread safety" + "CVE-2023-39191": { + "cmt_msg": "bpf: Fix state pruning for STACK_DYNPTR stack slots" }, - "CVE-2024-24864": { - "cmt_msg": "" + "CVE-2023-38428": { + "cmt_msg": "ksmbd: fix wrong UserName check in session_user" }, - "CVE-2022-45885": { + "CVE-2023-39193": { + "cmt_msg": "netfilter: xt_sctp: validate the flag_info count" + }, + "CVE-2020-26140": { "cmt_msg": "" }, - "CVE-2022-33744": { - "cmt_msg": "xen/arm: Fix race in RB-tree based P2M accounting" + "CVE-2023-38431": { + "cmt_msg": "ksmbd: check the validation of pdu_size in ksmbd_conn_handler_loop" }, - "CVE-2017-9605": { - "cmt_msg": "drm/vmwgfx: Make sure backup_handle is always valid" + "CVE-2023-38430": { + "cmt_msg": "ksmbd: validate smb request protocol id" }, - "CVE-2017-18193": { - "cmt_msg": "f2fs: fix a bug caused by NULL extent tree" + "CVE-2024-26600": { + "cmt_msg": "phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP" }, - "CVE-2022-40768": { - "cmt_msg": "scsi: stex: Properly zero out the passthrough command structure" + "CVE-2023-3390": { + "cmt_msg": "netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE" }, - "CVE-2022-1280": { - "cmt_msg": "drm: avoid circular locks in drm_mode_getconnector" + "CVE-2024-26606": { + "cmt_msg": "binder: signal epoll threads of self-work" }, - "CVE-2020-12888": { - "cmt_msg": "vfio-pci: Invalidate mmaps and block MMIO access on disabled memory" + "CVE-2024-26607": { + "cmt_msg": "drm/bridge: sii902x: Fix probing race issue" }, - "CVE-2017-6214": { - "cmt_msg": "tcp: avoid infinite loop in tcp_splice_read()" + "CVE-2024-26765": { + "cmt_msg": "LoongArch: Disable IRQ before init_fn() for nonboot CPUs" }, - "CVE-2023-52445": { - "cmt_msg": "media: pvrusb2: fix use after free on context disconnection" + "CVE-2024-26764": { + "cmt_msg": "fs/aio: Restrict kiocb_set_cancel_fn() to I/O submitted via libaio" }, - "CVE-2017-6353": { - "cmt_msg": "sctp: deny peeloff operation on asocs with threads sleeping on it" + "CVE-2024-26608": { + "cmt_msg": "ksmbd: fix global oob in ksmbd_nl_policy" }, - "CVE-2016-6198": { - "cmt_msg": "vfs: add vfs_select_inode() helper" + "CVE-2024-26766": { + "cmt_msg": "IB/hfi1: Fix sdma.h tx->num_descs off-by-one error" }, - "CVE-2021-0447": { - "cmt_msg": "l2tp: protect sock pointer of struct pppol2tp_session with RCU" + "CVE-2024-26761": { + "cmt_msg": "cxl/pci: Fix disabling memory if DVSEC CXL Range does not match a CFMWS window" }, - "CVE-2022-41218": { - "cmt_msg": "media: dvb-core: Fix UAF due to refcount races at releasing" + "CVE-2024-26760": { + "cmt_msg": "scsi: target: pscsi: Fix bio_put() for error case" }, - "CVE-2019-20934": { - "cmt_msg": "sched/fair: Don't free p->numa_faults with concurrent readers" + "CVE-2023-1476": { + "cmt_msg": "" }, - "CVE-2023-52457": { - "cmt_msg": "serial: 8250: omap: Don't skip resource freeing if pm_runtime_resume_and_get() failed" + "CVE-2021-3864": { + "cmt_msg": "" }, - "CVE-2022-36946": { - "cmt_msg": "netfilter: nf_queue: do not allow packet truncation below transport header offset" + "CVE-2024-26770": { + "cmt_msg": "HID: nvidia-shield: Add missing null pointer checks to LED initialization" }, - "CVE-2022-1184": { - "cmt_msg": "ext4: verify dir block before splitting it" + "CVE-2024-23849": { + "cmt_msg": "net/rds: Fix UBSAN: array-index-out-of-bounds in rds_cmsg_recv" }, - "CVE-2021-45485": { - "cmt_msg": "ipv6: use prandom_u32() for ID generation" + "CVE-2023-1670": { + "cmt_msg": "xirc2ps_cs: Fix use after free bug in xirc2ps_detach" }, - "CVE-2021-0448": { - "cmt_msg": "netfilter: ctnetlink: add a range check for l3/l4 protonum" + "CVE-2023-38429": { + "cmt_msg": "ksmbd: allocate one more byte for implied bcc[0]" }, - "CVE-2016-6197": { - "cmt_msg": "ovl: verify upper dentry before unlink and rename" + "CVE-2023-51043": { + "cmt_msg": "drm/atomic: Fix potential use-after-free in nonblocking commits" }, - "CVE-2022-21166": { - "cmt_msg": "x86/speculation/mmio: Enable CPU Fill buffer clearing on idle" + "CVE-2023-51042": { + "cmt_msg": "drm/amdgpu: Fix potential fence use-after-free v2" }, - "CVE-2020-29374": { - "cmt_msg": "gup: document and work around \"COW can break either way\" issue" + "CVE-2023-20569": { + "cmt_msg": "x86/bugs: Increase the x86 bugs vector size to two u32s" }, - "CVE-2016-9191": { - "cmt_msg": "sysctl: Drop reference added by grab_header in proc_sys_readdir" + "CVE-2016-8660": { + "cmt_msg": "" }, - "CVE-2019-20908": { - "cmt_msg": "efi: Restrict efivar_ssdt_load when the kernel is locked down" + "CVE-2023-6270": { + "cmt_msg": "aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts" }, - "CVE-2015-8709": { - "cmt_msg": "mm: Add a user_ns owner to mm_struct and fix ptrace permission checks" + "CVE-2023-2156": { + "cmt_msg": "net: rpl: fix rpl header size calculation" }, - "CVE-2023-52449": { - "cmt_msg": "mtd: Fix gluebi NULL pointer dereference caused by ftl notifier" + "CVE-2023-45862": { + "cmt_msg": "USB: ene_usb6250: Allocate enough memory for full object" }, - "CVE-2021-29650": { - "cmt_msg": "netfilter: x_tables: Use correct memory barriers." + "CVE-2023-45863": { + "cmt_msg": "kobject: Fix slab-out-of-bounds in fill_kobj_path()" }, - "CVE-2019-18806": { - "cmt_msg": "net: qlogic: Fix memory leak in ql_alloc_large_buffers" + "CVE-2023-1583": { + "cmt_msg": "io_uring/rsrc: fix null-ptr-deref in io_file_bitmap_get()" }, - "CVE-2018-5750": { - "cmt_msg": "ACPI: sbshc: remove raw pointer from printk() message" + "CVE-2008-4609": { + "cmt_msg": "" }, - "CVE-2018-20169": { - "cmt_msg": "USB: check usb_get_extra_descriptor for proper size" + "CVE-2023-6356": { + "cmt_msg": "nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length" }, - "CVE-2017-12762": { - "cmt_msg": "isdn/i4l: fix buffer overflow" + "CVE-2023-52639": { + "cmt_msg": "KVM: s390: vsie: fix race during shadow creation" }, - "CVE-2018-7754": { - "cmt_msg": "printk: hash addresses printed with %p" + "CVE-2023-52456": { + "cmt_msg": "serial: imx: fix tx statemachine deadlock" }, - "CVE-2021-33656": { - "cmt_msg": "vt: drop old FONT ioctls" + "CVE-2019-15239": { + "cmt_msg": "unknown" }, - "CVE-2016-9644": { - "cmt_msg": "x86/mm: Expand the exception table logic to allow new handling options" + "CVE-2023-52635": { + "cmt_msg": "PM / devfreq: Synchronize devfreq_monitor_[start/stop]" }, - "CVE-2022-41849": { - "cmt_msg": "fbdev: smscufx: Fix use-after-free in ufx_ops_open()" + "CVE-2023-52634": { + "cmt_msg": "drm/amd/display: Fix disable_otg_wa logic" }, - "CVE-2022-41848": { - "cmt_msg": "" + "CVE-2023-52633": { + "cmt_msg": "um: time-travel: fix time corruption" }, - "CVE-2023-6356": { + "CVE-2023-52632": { + "cmt_msg": "drm/amdkfd: Fix lock dependency warning with srcu" + }, + "CVE-2023-52631": { + "cmt_msg": "fs/ntfs3: Fix an NULL dereference bug" + }, + "CVE-2023-52630": { + "cmt_msg": "blk-iocost: Fix an UBSAN shift-out-of-bounds warning" + }, + "CVE-2023-20941": { "cmt_msg": "" }, - "CVE-2022-1353": { - "cmt_msg": "af_key: add __GFP_ZERO flag for compose_sadb_supported in function pfkey_register" + "CVE-2024-26638": { + "cmt_msg": "nbd: always initialize struct msghdr completely" }, - "CVE-2022-28356": { - "cmt_msg": "llc: fix netdevice reference leaks in llc_ui_bind()" + "CVE-2023-4155": { + "cmt_msg": "KVM: SEV: only access GHCB fields once" }, - "CVE-2015-8964": { - "cmt_msg": "tty: Prevent ldisc drivers from re-using stale tty fields" + "CVE-2023-3777": { + "cmt_msg": "netfilter: nf_tables: skip bound chain on rule flush" }, - "CVE-2022-1199": { - "cmt_msg": "ax25: Fix NULL pointer dereference in ax25_kill_by_device" + "CVE-2023-3776": { + "cmt_msg": "net/sched: cls_fw: Fix improper refcount update leads to use-after-free" }, - "CVE-2015-8966": { - "cmt_msg": "[PATCH] arm: fix handling of F_OFD_... in oabi_fcntl64()" + "CVE-2023-3773": { + "cmt_msg": "xfrm: add forgotten nla_policy for XFRMA_MTIMER_THRESH" }, - "CVE-2015-8967": { - "cmt_msg": "arm64: make sys_call_table const" + "CVE-2023-3772": { + "cmt_msg": "xfrm: add NULL check in xfrm_update_ae_params" }, - "CVE-2021-39801": { + "CVE-2022-3533": { "cmt_msg": "" }, - "CVE-2021-39800": { - "cmt_msg": "" + "CVE-2022-4842": { + "cmt_msg": "fs/ntfs3: Fix attr_punch_hole() null pointer derenference" }, - "CVE-2015-8962": { - "cmt_msg": "sg: Fix double-free when drives detach during SG_IO" + "CVE-2023-0386": { + "cmt_msg": "ovl: fail on invalid uid/gid mapping at copy up" }, - "CVE-2015-8963": { - "cmt_msg": "perf: Fix race in swevent hash" + "CVE-2023-6121": { + "cmt_msg": "nvmet: nul-terminate the NQNs passed in the connect command" }, - "CVE-2019-3837": { - "cmt_msg": "net_dma: simple removal" + "CVE-2023-52638": { + "cmt_msg": "can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock" }, - "CVE-2018-16884": { - "cmt_msg": "sunrpc: use-after-free in svc_process_common()" + "CVE-2024-26631": { + "cmt_msg": "ipv6: mcast: fix data-race in ipv6_mc_down / mld_ifc_work" }, - "CVE-2022-1195": { - "cmt_msg": "hamradio: improve the incomplete fix to avoid NPD" + "CVE-2017-13693": { + "cmt_msg": "" }, - "CVE-2024-22099": { + "CVE-2017-13694": { "cmt_msg": "" }, - "CVE-2021-4202": { - "cmt_msg": "NFC: reorganize the functions in nci_request" + "CVE-2024-26636": { + "cmt_msg": "llc: make llc_ui_sendmsg() more robust against bonding changes" }, - "CVE-2021-4203": { - "cmt_msg": "af_unix: fix races in sk_peer_pid and sk_peer_cred accesses" + "CVE-2023-33952": { + "cmt_msg": "drm/vmwgfx: Do not drop the reference to the handle too soon" }, - "CVE-2022-45887": { - "cmt_msg": "media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb()" + "CVE-2023-33951": { + "cmt_msg": "drm/vmwgfx: Do not drop the reference to the handle too soon" }, - "CVE-2022-23039": { - "cmt_msg": "xen/gntalloc: don't use gnttab_query_foreign_access()" + "CVE-2022-4382": { + "cmt_msg": "USB: gadgetfs: Fix race between mounting and unmounting" }, - "CVE-2022-41858": { - "cmt_msg": "drivers: net: slip: fix NPD bug in sl_tx_timeout()" + "CVE-2022-48628": { + "cmt_msg": "ceph: drop messages from MDS when unmounting" }, "CVE-2024-24859": { "cmt_msg": "" }, - "CVE-2019-15807": { - "cmt_msg": "scsi: libsas: delete sas port if expander discover failed" + "CVE-2024-24858": { + "cmt_msg": "" }, - "CVE-2023-2124": { - "cmt_msg": "xfs: verify buffer contents when we skip log replay" + "CVE-2024-24855": { + "cmt_msg": "scsi: lpfc: Fix a possible data race in lpfc_unregister_fcf_rescan()" }, - "CVE-2020-26557": { + "CVE-2024-24857": { "cmt_msg": "" }, - "CVE-2021-44879": { - "cmt_msg": "f2fs: fix to do sanity check on inode type during garbage collection" + "CVE-2024-26673": { + "cmt_msg": "netfilter: nft_ct: sanitize layer 3 and 4 protocol number in custom expectations" }, - "CVE-2019-15505": { - "cmt_msg": "media: technisat-usb2: break out of loop at end of buffer" + "CVE-2022-3544": { + "cmt_msg": "" }, - "CVE-2023-2513": { - "cmt_msg": "ext4: fix use-after-free in ext4_xattr_set_entry" + "CVE-2023-52569": { + "cmt_msg": "btrfs: remove BUG() after failure to insert delayed dir index item" }, - "CVE-2017-1000": { - "cmt_msg": "udp: consistently apply ufo or fragmentation" + "CVE-2023-52568": { + "cmt_msg": "x86/sgx: Resolves SECS reclaim vs. page fault for EAUG race" }, - "CVE-2020-11609": { - "cmt_msg": "media: stv06xx: add missing descriptor sanity checks" + "CVE-2023-52563": { + "cmt_msg": "drm/meson: fix memory leak on ->hpd_notify callback" }, - "CVE-2022-27672": { - "cmt_msg": "x86/speculation: Identify processors vulnerable to SMT RSB predictions" + "CVE-2023-52562": { + "cmt_msg": "mm/slab_common: fix slab_caches list corruption after kmem_cache_destroy()" }, - "CVE-2020-0429": { - "cmt_msg": "l2tp: fix race between l2tp_session_delete() and l2tp_tunnel_closeall()" + "CVE-2023-52561": { + "cmt_msg": "arm64: dts: qcom: sdm845-db845c: Mark cont splash memory region as reserved" }, - "CVE-2022-2964": { - "cmt_msg": "net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup" + "CVE-2023-52560": { + "cmt_msg": "mm/damon/vaddr-test: fix memory leak in damon_do_test_apply_three_regions()" }, - "CVE-2017-0605": { - "cmt_msg": "tracing: Use strlcpy() instead of strcpy() in __trace_find_cmdline()" + "CVE-2023-5197": { + "cmt_msg": "netfilter: nf_tables: disallow rule removal from chain binding" }, - "CVE-2021-1048": { - "cmt_msg": "fix regression in \"epoll: Keep a reference on files added to the check list\"" + "CVE-2023-52566": { + "cmt_msg": "nilfs2: fix potential use after free in nilfs_gccache_submit_read_data()" }, - "CVE-2014-9803": { - "cmt_msg": "Revert \"arm64: Introduce execute-only page access permissions\"" + "CVE-2023-52565": { + "cmt_msg": "media: uvcvideo: Fix OOB read" }, - "CVE-2015-2877": { + "CVE-2023-1380": { + "cmt_msg": "wifi: brcmfmac: slab-out-of-bounds read in brcmf_get_assoc_ies()" + }, + "CVE-2024-26672": { + "cmt_msg": "drm/amdgpu: Fix variable 'mca_funcs' dereferenced before NULL check in 'amdgpu_mca_smu_get_mca_entry()'" + }, + "CVE-2020-0347": { "cmt_msg": "" }, - "CVE-2020-9383": { - "cmt_msg": "floppy: check FDC index for errors before assigning it" + "CVE-2019-12456": { + "cmt_msg": "" }, - "CVE-2022-3586": { - "cmt_msg": "sch_sfb: Don't assume the skb is still around after enqueueing to child" + "CVE-2024-26720": { + "cmt_msg": "mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again" }, - "CVE-2023-32269": { - "cmt_msg": "netrom: Fix use-after-free caused by accept on already connected socket" + "CVE-2023-6546": { + "cmt_msg": "tty: n_gsm: fix the UAF caused by race condition in gsm_cleanup_mux" + }, + "CVE-2024-26727": { + "cmt_msg": "btrfs: do not ASSERT() if the newly created subvolume already got read" + }, + "CVE-2024-26726": { + "cmt_msg": "btrfs: don't drop extent_map for free space inode on write error" }, "CVE-2023-1206": { "cmt_msg": "tcp: Reduce chance of collisions in inet6_hashfn()." }, - "CVE-2021-38198": { - "cmt_msg": "KVM: X86: MMU: Use the correct inherited permissions to get shadow page" + "CVE-2023-2985": { + "cmt_msg": "fs: hfsplus: fix UAF issue in hfsplus_put_super" }, - "CVE-2017-5972": { - "cmt_msg": "tcp: do not lock listener to process SYN packets" + "CVE-2022-3642": { + "cmt_msg": "" }, - "CVE-2020-8832": { - "cmt_msg": "drm/i915: Record the default hw state after reset upon load" + "CVE-2023-3355": { + "cmt_msg": "drm/msm/gem: Add check for kmalloc" }, - "CVE-2017-5970": { - "cmt_msg": "ipv4: keep skb->dst around in presence of IP options" + "CVE-2023-52518": { + "cmt_msg": "Bluetooth: hci_codec: Fix leaking content of local_codecs" }, - "CVE-2023-1513": { - "cmt_msg": "kvm: initialize all of the kvm_debugregs structure before sending it to userspace" + "CVE-2023-52519": { + "cmt_msg": "HID: intel-ish-hid: ipc: Disable and reenable ACPI GPE bit" }, - "CVE-2015-4004": { - "cmt_msg": "staging: ozwpan: Remove from tree" + "CVE-2023-52516": { + "cmt_msg": "dma-debug: don't call __dma_entry_alloc_check_leak() under free_entries_lock" }, - "CVE-2021-26401": { - "cmt_msg": "x86/speculation: Use generic retpoline by default on AMD" + "CVE-2023-52517": { + "cmt_msg": "spi: sun6i: fix race between DMA RX transfer completion and RX FIFO drain" }, - "CVE-2015-4001": { - "cmt_msg": "ozwpan: Use unsigned ints to prevent heap overflow" + "CVE-2023-52515": { + "cmt_msg": "RDMA/srp: Do not call scsi_done() from srp_abort()" }, - "CVE-2018-1130": { - "cmt_msg": "dccp: check sk for closed state in dccp_sendmsg()" + "CVE-2023-52512": { + "cmt_msg": "pinctrl: nuvoton: wpcm450: fix out of bounds write" }, - "CVE-2023-52442": { - "cmt_msg": "ksmbd: validate session id and tree id in compound request" + "CVE-2019-15902": { + "cmt_msg": "unknown" }, - "CVE-2019-14284": { - "cmt_msg": "floppy: fix div-by-zero in setup_format_params" + "CVE-2023-3359": { + "cmt_msg": "nvmem: brcm_nvram: Add check for kzalloc" }, - "CVE-2020-36557": { - "cmt_msg": "vt: vt_ioctl: fix VT_DISALLOCATE freeing in-use virtual console" + "CVE-2023-3358": { + "cmt_msg": "HID: intel_ish-hid: Add check for ishtp_dma_tx_map" }, - "CVE-2021-3506": { - "cmt_msg": "f2fs: fix to avoid out-of-bounds memory access" + "CVE-2024-0340": { + "cmt_msg": "vhost: use kzalloc() instead of kmalloc() followed by memset()" }, - "CVE-2011-4917": { + "CVE-2023-6535": { "cmt_msg": "" }, - "CVE-2011-4916": { + "CVE-2023-6536": { + "cmt_msg": "nvmet-tcp: fix a crash in nvmet_req_complete()" + }, + "CVE-2024-26704": { + "cmt_msg": "ext4: fix double-free of blocks due to wrong extents moved_len" + }, + "CVE-2018-17977": { "cmt_msg": "" }, - "CVE-2019-14283": { - "cmt_msg": "floppy: fix out-of-bounds read in copy_buffer" + "CVE-2024-1151": { + "cmt_msg": "net: openvswitch: limit the number of recursions from action sets" }, - "CVE-2019-3901": { - "cmt_msg": "perf/core: Fix perf_event_open() vs. execve() race" + "CVE-2024-26659": { + "cmt_msg": "xhci: handle isoc Babble and Buffer Overrun events properly" }, - "CVE-2019-3900": { - "cmt_msg": "vhost_net: fix possible infinite loop" + "CVE-2024-26658": { + "cmt_msg": "bcachefs: grab s_umount only if snapshotting" + }, + "CVE-2010-5321": { + "cmt_msg": "" + }, + "CVE-2024-26655": { + "cmt_msg": "Fix memory leak in posix_clock_open()" + }, + "CVE-2024-26654": { + "cmt_msg": "ALSA: sh: aica: reorder cleanup operations to avoid UAF bugs" + }, + "CVE-2023-1990": { + "cmt_msg": "nfc: st-nci: Fix use after free bug in ndlc_remove due to race condition" + }, + "CVE-2024-26651": { + "cmt_msg": "sr9800: Add check for usbnet_get_endpoints" }, - "CVE-2019-19528": { - "cmt_msg": "USB: iowarrior: fix use-after-free on disconnect" + "CVE-2024-26650": { + "cmt_msg": "platform/x86: p2sb: Allow p2sb_bar() calls during PCI device probe" }, - "CVE-2019-19533": { - "cmt_msg": "media: ttusb-dec: Fix info-leak in ttusb_dec_send_command()" + "CVE-2023-52475": { + "cmt_msg": "Input: powermate - fix use-after-free in powermate_config_complete" }, - "CVE-2018-13100": { - "cmt_msg": "f2fs: fix to do sanity check with secs_per_zone" + "CVE-2023-52474": { + "cmt_msg": "IB/hfi1: Fix bugs with non-PAGE_SIZE-end multi-iovec user SDMA requests" }, - "CVE-2017-16646": { - "cmt_msg": "media: dib0700: fix invalid dvb_detach argument" + "CVE-2023-52477": { + "cmt_msg": "usb: hub: Guard against accesses to uninitialized BOS descriptors" }, - "CVE-2017-16645": { - "cmt_msg": "Input: ims-psu - check if CDC union descriptor is sane" + "CVE-2023-52476": { + "cmt_msg": "perf/x86/lbr: Filter vsyscall addresses" }, - "CVE-2017-16643": { - "cmt_msg": "Input: gtco - fix potential out-of-bound access" + "CVE-2023-52470": { + "cmt_msg": "drm/radeon: check the alloc_workqueue return value in radeon_crtc_init()" }, - "CVE-2018-10882": { - "cmt_msg": "ext4: add more inode number paranoia checks" + "CVE-2024-21803": { + "cmt_msg": "" }, - "CVE-2023-31083": { - "cmt_msg": "Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO" + "CVE-2023-4563": { + "cmt_msg": "netfilter: nf_tables: don't skip expired elements during walk" }, - "CVE-2019-5489": { - "cmt_msg": "Change mincore() to count \"mapped\" pages rather than \"cached\" pages" + "CVE-2023-52479": { + "cmt_msg": "ksmbd: fix uaf in smb20_oplock_break_ack" }, - "CVE-2024-1312": { - "cmt_msg": "mm: lock_vma_under_rcu() must check vma->anon_vma under vma lock" + "CVE-2023-52478": { + "cmt_msg": "HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect" }, - "CVE-2017-16648": { - "cmt_msg": "dvb_frontend: don't use-after-free the frontend struct" + "CVE-2021-3542": { + "cmt_msg": "" }, - "CVE-2018-10880": { - "cmt_msg": "ext4: never move the system.data xattr out of the inode body" + "CVE-2023-3220": { + "cmt_msg": "drm/msm/dpu: Add check for pstates" }, - "CVE-2018-10881": { - "cmt_msg": "ext4: clear i_data in ext4_inode_info when removing inline data" + "CVE-2023-34255": { + "cmt_msg": "xfs: verify buffer contents when we skip log replay" }, - "CVE-2017-16649": { - "cmt_msg": "net: cdc_ether: fix divide by 0 on bad descriptors" + "CVE-2023-42754": { + "cmt_msg": "ipv4: fix null-deref in ipv4_link_failure" }, - "CVE-2018-10883": { - "cmt_msg": "jbd2: don't mark block as modified if the handle is out of credits" - } - } - }, - "3.16": { - "3.16": { - "CVE-2014-5077": { - "cmt_msg": "net: sctp: inherit auth_capable on INIT collisions", - "cmt_id": "1be9a950c646c9092fb3618197f7b6bfb50e82aa" - } - }, - "3.16.2": { - "CVE-2014-5472": { - "cmt_msg": "isofs: Fix unbounded recursion when processing relocated directories", - "cmt_id": "32134a15e8a2a5024806dc8f794df18ae3564f00" + "CVE-2018-12929": { + "cmt_msg": "" }, - "CVE-2014-5471": { - "cmt_msg": "isofs: Fix unbounded recursion when processing relocated directories", - "cmt_id": "32134a15e8a2a5024806dc8f794df18ae3564f00" + "CVE-2018-12928": { + "cmt_msg": "" }, - "CVE-2014-3182": { - "cmt_msg": "HID: logitech: perform bounds checking on device_id early enough", - "cmt_id": "e98c81884fe28d29a48a6dfa6512deccb8482fb7" + "CVE-2023-25775": { + "cmt_msg": "RDMA/irdma: Prevent zero-length STAG registration" }, - "CVE-2014-3183": { - "cmt_msg": "HID: logitech: fix bounds checking on LED report size", - "cmt_id": "b8c0d10f1f43301bab6146874963749003a3d567" + "CVE-2023-32258": { + "cmt_msg": "ksmbd: fix racy issue from smb2 close and logoff with multichannel" }, - "CVE-2014-3184": { - "cmt_msg": "HID: fix a couple of off-by-ones", - "cmt_id": "fc1d74628298b9c14bd978ada534731e369dc29c" + "CVE-2023-32257": { + "cmt_msg": "ksmbd: fix racy issue from session setup and logoff" }, - "CVE-2014-3185": { - "cmt_msg": "USB: whiteheat: Added bounds checking for bulk command response", - "cmt_id": "cf89514aaaf8004b3d180b797e7e6d4bc95a4c74" + "CVE-2024-26778": { + "cmt_msg": "fbdev: savage: Error out if pixclock equals zero" }, - "CVE-2014-3601": { - "cmt_msg": "kvm: iommu: fix the third parameter of kvm_iommu_put_pages (CVE-2014-3601)", - "cmt_id": "35df08d69519d3a0e92c18b62e434c926ba63164" - } - }, - "3.16.3": { - "CVE-2014-3631": { - "cmt_msg": "KEYS: Fix termination condition in assoc array garbage collection", - "cmt_id": "a4b9e45fed010808c2b0c38d243a7a2b4adb512b" + "CVE-2023-32254": { + "cmt_msg": "ksmbd: fix racy issue under cocurrent smb2 tree disconnect" }, - "CVE-2014-6418": { - "cmt_msg": "libceph: do not hard code max auth ticket len", - "cmt_id": "346acdffbb4a12f7f77a3fb0f6453a2bc1454b4f" + "CVE-2023-32252": { + "cmt_msg": "ksmbd: fix racy issue from session setup and logoff" }, - "CVE-2014-5207": { - "cmt_msg": "mnt: Correct permission checks in do_remount", - "cmt_id": "3ed889bb32afa24e5ee77a3b40c7c8088b16eedf" + "CVE-2020-10708": { + "cmt_msg": "" }, - "CVE-2014-5206": { - "cmt_msg": "mnt: Only change user settable mount flags in remount", - "cmt_id": "3995f446f4e51fb781467d6da1673cf4631634ff" + "CVE-2023-32629": { + "cmt_msg": "" }, - "CVE-2014-6417": { - "cmt_msg": "libceph: do not hard code max auth ticket len", - "cmt_id": "346acdffbb4a12f7f77a3fb0f6453a2bc1454b4f" + "CVE-2022-0400": { + "cmt_msg": "" }, - "CVE-2014-6416": { - "cmt_msg": "libceph: do not hard code max auth ticket len", - "cmt_id": "346acdffbb4a12f7f77a3fb0f6453a2bc1454b4f" - } - }, - "3.16.4": { - "CVE-2014-3181": { - "cmt_msg": "HID: magicmouse: sanity check report size in raw_event() callback", - "cmt_id": "249b61a6ba71975a83031c06b22013a37619a8b7" + "CVE-2023-2235": { + "cmt_msg": "perf: Fix check before add_event_to_groups() in perf_group_detach()" }, - "CVE-2014-3186": { - "cmt_msg": "HID: picolcd: sanity check report size in raw_event() callback", - "cmt_id": "0db6de5fa66e02a03089d69bdc5db6d6947ed76b" - } - }, - "3.16.5": { - "CVE-2014-6410": { - "cmt_msg": "udf: Avoid infinite loop when processing indirect ICBs", - "cmt_id": "7478bcf7d5594fba7a98b8fef615e8924caf7977" - } - }, - "3.16.7": { - "CVE-2014-3690": { - "cmt_msg": "x86,kvm,vmx: Preserve CR4 across VM entry", - "cmt_id": "c047faa77f4324ed8f3b3a5c48f6e3ae0f658d8f" + "CVE-2024-25741": { + "cmt_msg": "" }, - "CVE-2014-4608": { - "cmt_msg": "lzo: check for length overrun in variable length encoding.", - "cmt_id": "7e70a797fb587ed0ce86f8d52cbb3a0f88d3ac3f" + "CVE-2024-26808": { + "cmt_msg": "netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain" }, - "CVE-2014-7975": { - "cmt_msg": "fs: Add a missing permission check to do_umount", - "cmt_id": "c436c9115dab21fbdcae850e324d7ac3f73f04b7" - } - }, - "3.16.35": { - "CVE-2016-7913": { - "cmt_msg": "xc2028: avoid use after free", - "cmt_id": "e6cb39ac3f31cb5409f4078a0f0f8e7c25e48a98" + "CVE-2024-26809": { + "cmt_msg": "netfilter: nft_set_pipapo: release elements in clone only from destroy path" }, - "CVE-2016-3140": { - "cmt_msg": "USB: digi_acceleport: do sanity checking for the number of ports", - "cmt_id": "68833f4975aa22c57a99a84987d5158912406acb" + "CVE-2024-26804": { + "cmt_msg": "net: ip_tunnel: prevent perpetual headroom growth" }, - "CVE-2016-2782": { - "cmt_msg": "USB: visor: fix null-deref at probe", - "cmt_id": "2e943fbce619e71cd28adc23abe2104f5675bdc3" + "CVE-2023-1989": { + "cmt_msg": "Bluetooth: btsdio: fix use after free bug in btsdio_remove due to unfinished work" }, - "CVE-2015-6526": { - "cmt_msg": "powerpc/perf: Cap 64bit userspace backtraces to PERF_MAX_STACK_DEPTH", - "cmt_id": "1564ecf19e3b5e92b48531d580c3da04131596d5" + "CVE-2024-26806": { + "cmt_msg": "spi: cadence-qspi: remove system-wide suspend helper calls from runtime PM hooks" }, - "CVE-2015-9289": { - "cmt_msg": "cx24116: fix a buffer overflow when checking userspace params", - "cmt_id": "9bd2b656ff48dd870cc89679edf122cdca21399a" + "CVE-2024-26801": { + "cmt_msg": "Bluetooth: Avoid potential use-after-free in hci_error_reset" }, - "CVE-2015-5707": { - "cmt_msg": "sg_start_req(): make sure that there's not too many elements in iovec", - "cmt_id": "2558b5b7ab218804ee03f5f13c0d3036e409dabe" + "CVE-2024-26802": { + "cmt_msg": "stmmac: Clear variable when destroying workqueue" }, - "CVE-2015-0239": { - "cmt_msg": "KVM: x86: SYSENTER emulation is broken", - "cmt_id": "f280f83b5240101dc90d9b702b49c977ed097458" + "CVE-2023-52508": { + "cmt_msg": "nvme-fc: Prevent null pointer dereference in nvme_fc_io_getuuid()" }, - "CVE-2015-5257": { - "cmt_msg": "USB: whiteheat: fix potential null-deref at probe", - "cmt_id": "73e6391770a65856100661b56bcfa4b37bd0a98e" + "CVE-2023-52606": { + "cmt_msg": "powerpc/lib: Validate size for vector operations" }, - "CVE-2015-8970": { - "cmt_msg": "crypto: algif_skcipher - Require setkey before accept(2)", - "cmt_id": "21a017c3cb97b376833e1b70898ef3f95bc9fc2a" + "CVE-2023-52607": { + "cmt_msg": "powerpc/mm: Fix null-pointer dereference in pgtable_cache_add" }, - "CVE-2016-3136": { - "cmt_msg": "USB: mct_u232: add sanity checking in probe", - "cmt_id": "f3b7e0bf67ed9e3ecffbf1260f01794668398125" + "CVE-2023-52604": { + "cmt_msg": "FS:JFS:UBSAN:array-index-out-of-bounds in dbAdjTree" }, - "CVE-2016-3955": { - "cmt_msg": "USB: usbip: fix potential out-of-bounds write", - "cmt_id": "87cfd54498d490a8bc460fd24f7e55b202c4cacd" + "CVE-2023-52602": { + "cmt_msg": "jfs: fix slab-out-of-bounds Read in dtSearch" }, - "CVE-2016-3951": { - "cmt_msg": "cdc_ncm: do not call usbnet_link_change from cdc_ncm_bind", - "cmt_id": "40180f6f7410d7e6a2472eef65c408c9648c9ef3" + "CVE-2023-52603": { + "cmt_msg": "UBSAN: array-index-out-of-bounds in dtSplitRoot" }, - "CVE-2014-9419": { - "cmt_msg": "x86_64, switch_to(): Load TLS descriptors before switching DS and ES", - "cmt_id": "82def0d6911ef554d8e3df4223755c2cbb1dd64d" + "CVE-2022-25265": { + "cmt_msg": "" }, - "CVE-2015-8104": { - "cmt_msg": "KVM: svm: unconditionally intercept #DB", - "cmt_id": "13961a1784d20cc45210b664c6c2d0df6d2983c1" + "CVE-2023-52601": { + "cmt_msg": "jfs: fix array-index-out-of-bounds in dbAdjTree" }, - "CVE-2020-0066": { - "cmt_msg": "netlink: Trim skb to alloc size to avoid MSG_TRUNC", - "cmt_id": "9a11693d3def10330247d13f2db043d185002b8f" + "CVE-2023-52600": { + "cmt_msg": "jfs: fix uaf in jfs_evict_inode" }, - "CVE-2015-4700": { - "cmt_msg": "x86: bpf_jit: fix compilation of large bpf programs", - "cmt_id": "e0373a44e98aaf3b1c2ca0830b7b9e2e516f9bba" + "CVE-2023-52608": { + "cmt_msg": "firmware: arm_scmi: Check mailbox/SMT channel for consistency" }, - "CVE-2015-8551": { - "cmt_msg": "xen/pciback: Return error on XEN_PCI_OP_enable_msi when device has MSI or MSI-X enabled", - "cmt_id": "cb968d816e128f3c652f5a493d9a5cdd91490570" + "CVE-2023-52609": { + "cmt_msg": "binder: fix race between mmput() and do_exit()" }, - "CVE-2015-5156": { - "cmt_msg": "virtio-net: drop NETIF_F_FRAGLIST", - "cmt_id": "319e98c7b06b67d7005911d47949bfbc1be4eaaf" + "CVE-2023-4208": { + "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free" }, - "CVE-2015-5157": { - "cmt_msg": "x86/nmi/64: Switch stacks on userspace NMI entry", - "cmt_id": "67b91ab31375fb40d66673ec4dd3f2d135e986dc" + "CVE-2023-4206": { + "cmt_msg": "net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free" }, - "CVE-2016-2186": { - "cmt_msg": "Input: powermate - fix oops with malicious USB descriptors", - "cmt_id": "f1782c9cd0966146457368672a25e4509a484ef6" + "CVE-2023-4207": { + "cmt_msg": "net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free" }, - "CVE-2015-5364": { - "cmt_msg": "udp: fix behavior of wrong checksums", - "cmt_id": "95ffa33e3c2706f1da6f2b4a695a416cf7edf759" + "CVE-2023-3640": { + "cmt_msg": "" }, - "CVE-2015-5366": { - "cmt_msg": "udp: fix behavior of wrong checksums", - "cmt_id": "95ffa33e3c2706f1da6f2b4a695a416cf7edf759" + "CVE-2023-20593": { + "cmt_msg": "x86/cpu/amd: Add a Zenbleed fix" }, - "CVE-2014-9731": { - "cmt_msg": "udf: Check path length when reading symlink", - "cmt_id": "05e7da65962e15223e2783c09158e0a3aa1e1028" + "CVE-2023-0160": { + "cmt_msg": "bpf, sockmap: fix deadlocks in the sockhash and sockmap" }, - "CVE-2014-9730": { - "cmt_msg": "udf: Check component length before reading it", - "cmt_id": "eee3ed05f6f33ce7f226119713c572db9b71060c" + "CVE-2023-52506": { + "cmt_msg": "LoongArch: Set all reserved memblocks on Node#0 at initialization" }, - "CVE-2013-4312": { - "cmt_msg": "unix: properly account for FDs passed over unix sockets", - "cmt_id": "660f0e9358bc1a8e05a2675f4320935ad5c249bf" + "CVE-2023-52598": { + "cmt_msg": "s390/ptrace: handle setting of fpc register correctly" }, - "CVE-2016-0821": { - "cmt_msg": "include/linux/poison.h: fix LIST_POISON{1,2} offset", - "cmt_id": "eb99153be3ae70672c8074dc89ac8c01828840fc" + "CVE-2023-21106": { + "cmt_msg": "drm/msm/gpu: Fix potential double-free" }, - "CVE-2016-0823": { - "cmt_msg": "pagemap: do not leak physical addresses to non-privileged userspace", - "cmt_id": "948e681e8731ab8b49d81d4a5b61b5bf3b3e6152" + "CVE-2023-4015": { + "cmt_msg": "netfilter: nf_tables: skip immediate deactivate in _PREPARE_ERROR" }, - "CVE-2015-3291": { - "cmt_msg": "x86/nmi/64: Use DF to avoid userspace RSP confusing nested NMI detection", - "cmt_id": "84b6f86649f5e84d2619c569ea0d3dc88d47d4ad" + "CVE-2023-4010": { + "cmt_msg": "" }, - "CVE-2015-3290": { - "cmt_msg": "x86/nmi/64: Switch stacks on userspace NMI entry", - "cmt_id": "67b91ab31375fb40d66673ec4dd3f2d135e986dc" + "CVE-2022-45888": { + "cmt_msg": "char: xillybus: Prevent use-after-free due to race condition" }, - "CVE-2016-2069": { - "cmt_msg": "x86/mm: Add barriers and document switch_mm()-vs-flush synchronization", - "cmt_id": "bab48cc44e14c26385de1f887f4bf320e8c3a6f0" + "CVE-2022-38457": { + "cmt_msg": "drm/vmwgfx: Remove rcu locks from user resources" }, - "CVE-2016-8666": { - "cmt_msg": "tunnels: Don't apply GRO to multiple layers of encapsulation.", - "cmt_id": "23cca87ff225c1c7327a715db1bcc98a241b0efa" + "CVE-2024-26774": { + "cmt_msg": "ext4: avoid dividing by 0 in mb_update_avg_fragment_size() when block bitmap corrupt" }, - "CVE-2015-8746": { - "cmt_msg": "NFS: Fix a NULL pointer dereference of migration recovery ops for v4.2 client", - "cmt_id": "6a64d8c4c07c176abee384803f28fa1507963369" + "CVE-2019-19378": { + "cmt_msg": "" }, - "CVE-2015-3212": { - "cmt_msg": "sctp: fix ASCONF list handling", - "cmt_id": "0eb5cd451203706dad35fd971a420c3cfaf371c8" + "CVE-2020-24503": { + "cmt_msg": "" }, - "CVE-2014-3687": { - "cmt_msg": "net: sctp: fix panic on duplicate ASCONF chunks", - "cmt_id": "790395f95e3b8d81bf681a2a535443c70a111f66" + "CVE-2020-24502": { + "cmt_msg": "" }, - "CVE-2015-8550": { - "cmt_msg": "xen: Add RING_COPY_REQUEST()", - "cmt_id": "f75855ceeff75ea8cebcd3e8df79e76292493735" + "CVE-2023-1118": { + "cmt_msg": "media: rc: Fix use-after-free bugs caused by ene_tx_irqsim()" }, - "CVE-2015-8553": { - "cmt_msg": "xen/pciback: Don't allow MSI-X ops if PCI_COMMAND_MEMORY is not set.", - "cmt_id": "68f3d7217c7407311a9ca974f3506faaa1a7f4bf" + "CVE-2020-11725": { + "cmt_msg": "" }, - "CVE-2015-7513": { - "cmt_msg": "KVM: x86: Reload pit counters for all channels when restoring state", - "cmt_id": "a3aa388ced6b0b224d3a6dc3acfb12f525d2ee5c" + "CVE-2023-7192": { + "cmt_msg": "netfilter: ctnetlink: fix possible refcount leak in ctnetlink_create_conntrack()" }, - "CVE-2016-4805": { - "cmt_msg": "ppp: take reference on channels netns", - "cmt_id": "6ab3a4331a1de5a20c3dc97f5211d00f1b35ce50" + "CVE-2023-30456": { + "cmt_msg": "KVM: nVMX: add missing consistency checks for CR0 and CR4" }, - "CVE-2015-7515": { - "cmt_msg": "Input: aiptek - fix crash on detecting device without endpoints", - "cmt_id": "24b12688c53a46545a723cf084e25afde2ba39f3" + "CVE-2023-31436": { + "cmt_msg": "net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg" }, - "CVE-2014-9420": { - "cmt_msg": "isofs: Fix infinite looping over CE entries", - "cmt_id": "56221fafe328a503579a49b5157543f7eaa2204a" + "CVE-2022-47929": { + "cmt_msg": "net: sched: disallow noqueue for qdisc classes" }, - "CVE-2015-7613": { - "cmt_msg": "Initialize msg/shm IPC objects before doing ipc_addid()", - "cmt_id": "792d3057eb976a74671c406a6b70a73652cd01e2" + "CVE-2022-3606": { + "cmt_msg": "" }, - "CVE-2014-9728": { - "cmt_msg": "udf: Verify i_size when loading inode", - "cmt_id": "66c88eab4e8c6bb36afa48bf524870d957547f2e" + "CVE-2022-2209": { + "cmt_msg": "" }, - "CVE-2014-8133": { - "cmt_msg": "x86/tls: Validate TLS entries to protect espfix", - "cmt_id": "339ee067d034ba302e2b43100a2b04be7b7f586c" + "CVE-2024-26775": { + "cmt_msg": "aoe: avoid potential deadlock at set_capacity" }, - "CVE-2014-8134": { - "cmt_msg": "x86, kvm: Clear paravirt_enabled on KVM guests for espfix32's benefit", - "cmt_id": "757328f36af0eeb6c6bb3c16a3ff84c669ead5bb" + "CVE-2023-7042": { + "cmt_msg": "wifi: ath10k: fix NULL pointer dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev()" }, - "CVE-2015-5706": { - "cmt_msg": "path_openat(): fix double fput()", - "cmt_id": "bedf03d0b88db4de0b66a1ef81df4faec7a0ceb4" + "CVE-2023-52559": { + "cmt_msg": "iommu/vt-d: Avoid memory allocation in iommu_suspend()" }, - "CVE-2015-1465": { - "cmt_msg": "ipv4: try to cache dst_entries which would cause a redirect", - "cmt_id": "569a4ccdd320abaf7cb7d9a70757dc84b42420d9" + "CVE-2023-47233": { + "cmt_msg": "wifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach" }, - "CVE-2016-2053": { - "cmt_msg": "ASN.1: Fix non-match detection failure on data overrun", - "cmt_id": "15430f775ee686b61569a0c3e74cf0b2ad57c8eb" + "CVE-2024-23850": { + "cmt_msg": "btrfs: do not ASSERT() if the newly created subvolume already got read" }, - "CVE-2015-6937": { - "cmt_msg": "RDS: verify the underlying transport exists before creating a connection", - "cmt_id": "a93002fa8bd6495b88ae9196151008902d7e7774" + "CVE-2024-23851": { + "cmt_msg": "dm: limit the number of targets and parameter size area" }, - "CVE-2014-9644": { - "cmt_msg": "crypto: include crypto- module prefix in template", - "cmt_id": "9f213efca416d0b3af786d2b2284f5e5f1f61d51" + "CVE-2023-52629": { + "cmt_msg": "sh: push-switch: Reorder cleanup operations to avoid use-after-free bug" }, - "CVE-2015-8552": { - "cmt_msg": "xen/pciback: Return error on XEN_PCI_OP_enable_msi when device has MSI or MSI-X enabled", - "cmt_id": "cb968d816e128f3c652f5a493d9a5cdd91490570" + "CVE-2024-26772": { + "cmt_msg": "ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal()" }, - "CVE-2016-0728": { - "cmt_msg": "KEYS: Fix keyring ref leak in join_session_keyring()", - "cmt_id": "63b2438cd504e776ec056150857d2a541718da88" + "CVE-2024-26758": { + "cmt_msg": "md: Don't ignore suspended array in md_check_recovery()" }, - "CVE-2017-13215": { - "cmt_msg": "crypto: algif_skcipher - Load TX SG list after waiting", - "cmt_id": "f608afd0ae111abb0edc3e64a2e7e69b44f02702" + "CVE-2024-26610": { + "cmt_msg": "wifi: iwlwifi: fix a memory corruption" }, - "CVE-2017-1000253": { - "cmt_msg": "fs/binfmt_elf.c: fix bug in loading of PIE binaries", - "cmt_id": "ea08dc5191d9a22242893768e4c3be8efb546c62" + "CVE-2024-26612": { + "cmt_msg": "netfs, fscache: Prevent Oops in fscache_put_cache()" }, - "CVE-2014-8884": { - "cmt_msg": "ttusb-dec: buffer overflow in ioctl", - "cmt_id": "36bb34da20d9e641310f5153239f65b34495b7ae" + "CVE-2023-6606": { + "cmt_msg": "smb: client: fix OOB in smbCalcSize()" }, - "CVE-2014-9322": { - "cmt_msg": "x86_64, traps: Stop using IST for #SS", - "cmt_id": "09f581ba6439450b04b1062ad257d0bb447189f9" + "CVE-2024-26614": { + "cmt_msg": "tcp: make sure init the accept_queue's spinlocks once" }, - "CVE-2014-7826": { - "cmt_msg": "tracing/syscalls: Ignore numbers outside NR_syscalls' range", - "cmt_id": "9f156016096dd656971d153234fc4b9c0323bb2c" + "CVE-2024-26751": { + "cmt_msg": "ARM: ep93xx: Add terminator to gpiod_lookup_table" }, - "CVE-2014-7825": { - "cmt_msg": "tracing/syscalls: Ignore numbers outside NR_syscalls' range", - "cmt_id": "9f156016096dd656971d153234fc4b9c0323bb2c" + "CVE-2024-26752": { + "cmt_msg": "l2tp: pass correct message length to ip6_append_data" }, - "CVE-2015-8543": { - "cmt_msg": "net: add validation for the socket syscall protocol argument", - "cmt_id": "c289dc9feaee8faae78973d0b0dc36dbc2476f49" + "CVE-2024-26753": { + "cmt_msg": "crypto: virtio/akcipher - Fix stack overflow on memcpy" }, - "CVE-2015-4167": { - "cmt_msg": "udf: Check length of extended attributes and allocation descriptors", - "cmt_id": "24a10af7859205540358f2f58bfbd89b0962027a" + "CVE-2024-26754": { + "cmt_msg": "gtp: fix use-after-free and null-ptr-deref in gtp_genl_dump_pdp()" }, - "CVE-2016-0723": { - "cmt_msg": "tty: Fix unsafe ldisc reference via ioctl(TIOCGETD)", - "cmt_id": "3991600fc141223ba7b88026a187e4562c7acd00" + "CVE-2023-21255": { + "cmt_msg": "binder: fix UAF caused by faulty buffer cleanup" }, - "CVE-2016-7117": { - "cmt_msg": "net: Fix use after free in the recvmmsg exit path", - "cmt_id": "fc49d04ae148b205c3817d901ce0f846869effa8" + "CVE-2024-26757": { + "cmt_msg": "md: Don't ignore read-only array in md_check_recovery()" }, - "CVE-2015-2830": { - "cmt_msg": "x86/asm/entry/64: Remove a bogus 'ret_from_fork' optimization", - "cmt_id": "c1dc5bb3c7e51084423e5fff2537c1922849b829" + "CVE-2023-52439": { + "cmt_msg": "uio: Fix use-after-free in uio_open" }, - "CVE-2021-20265": { - "cmt_msg": "af_unix: fix struct pid memory leak", - "cmt_id": "1906035dff2763a1c17a3f2a4d8706ef960e7a62" + "CVE-2023-52438": { + "cmt_msg": "binder: fix use-after-free in shinker's callback" }, - "CVE-2014-9090": { - "cmt_msg": "x86_64, traps: Stop using IST for #SS", - "cmt_id": "09f581ba6439450b04b1062ad257d0bb447189f9" + "CVE-2023-52435": { + "cmt_msg": "net: prevent mss overflow in skb_segment()" }, - "CVE-2015-8816": { - "cmt_msg": "USB: fix invalid memory access in hub_activate()", - "cmt_id": "7d7ded5440d763c75023f39ca1a1a85672803ad8" + "CVE-2023-52434": { + "cmt_msg": "smb: client: fix potential OOBs in smb2_parse_contexts()" }, - "CVE-2015-7566": { - "cmt_msg": "USB: serial: visor: fix crash on detecting device without write_urbs", - "cmt_id": "d80e009beb81b05f0ddf69a3bcc7e328272b0117" + "CVE-2023-52436": { + "cmt_msg": "f2fs: explicitly null-terminate the xattr list" }, - "CVE-2015-8812": { - "cmt_msg": "iw_cxgb3: Fix incorrectly returning error on success", - "cmt_id": "f95bf9a80850d49cce96ef0da4a1bd68f8f57dbe" + "CVE-2024-26688": { + "cmt_msg": "fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super" }, - "CVE-2014-9710": { - "cmt_msg": "Btrfs: make xattr replace operations atomic", - "cmt_id": "1d9c16e6463f33c247cd9b33369aba7d05ebbb49" + "CVE-2024-23307": { + "cmt_msg": "md/raid5: fix atomicity violation in raid5_cache_count" }, - "CVE-2014-3610": { - "cmt_msg": "KVM: x86: Check non-canonical addresses upon WRMSR", - "cmt_id": "604acafa52b9651054b816f19c172ee07384a0d3" + "CVE-2022-2961": { + "cmt_msg": "" }, - "CVE-2014-3611": { - "cmt_msg": "KVM: x86: Improve thread safety in pit", - "cmt_id": "262400a71a3ebbb98c800cdd20094d3ea06a281c" + "CVE-2024-26680": { + "cmt_msg": "net: atlantic: Fix DMA mapping for PTP hwts ring" }, - "CVE-2015-8950": { - "cmt_msg": "arm64: dma-mapping: always clear allocated buffers", - "cmt_id": "a92a43a16c9fc3f257dd28e5b0c82297b80e1ce3" + "CVE-2024-26681": { + "cmt_msg": "netdevsim: avoid potential loop in nsim_dev_trap_report_work()" }, - "CVE-2016-3841": { - "cmt_msg": "ipv6: add complete rcu protection around np->opt", - "cmt_id": "93d2f2509b98181f3f0630ae3a5a45e8ddcd75a3" + "CVE-2024-26686": { + "cmt_msg": "fs/proc: do_task_stat: use sig->stats_lock to gather the threads/children stats" }, - "CVE-2016-3689": { - "cmt_msg": "Input: ims-pcu - sanity check against missing interfaces", - "cmt_id": "2b1d2df1ab77cf0d096516bb636e18168ec8d5b8" + "CVE-2024-26687": { + "cmt_msg": "xen/events: close evtchn after mapping cleanup" }, - "CVE-2015-8019": { - "cmt_msg": "net: add length argument to skb_copy_and_csum_datagram_iovec", - "cmt_id": "fa89ae5548ed282f0ceb4660b3b93e4e2ee875f3" + "CVE-2023-51779": { + "cmt_msg": "Bluetooth: af_bluetooth: Fix Use-After-Free in bt_sock_recvmsg" }, - "CVE-2016-9685": { - "cmt_msg": "xfs: fix two memory leaks in xfs_attr_list.c error paths", - "cmt_id": "f7a39c8e72338d5d0f24ba38debf2d96c893d24b" + "CVE-2023-3268": { + "cmt_msg": "relayfs: fix out-of-bounds access in relay_file_read" }, - "CVE-2016-8646": { - "cmt_msg": "crypto: algif_hash - Only export and import on sockets with data", - "cmt_id": "214fcf7977ef7579530609c24b94164a3b306d13" + "CVE-2022-40133": { + "cmt_msg": "drm/vmwgfx: Remove rcu locks from user resources" }, - "CVE-2016-3044": { - "cmt_msg": "KVM: PPC: Book3S HV: Sanitize special-purpose register values on guest exit", - "cmt_id": "ea51a643e950c2b51f9afcd6b72c586bcf8ccdf0" + "CVE-2023-2640": { + "cmt_msg": "" }, - "CVE-2015-7872": { - "cmt_msg": "KEYS: Fix crash when attempt to garbage collect an uninstantiated keyring", - "cmt_id": "4944cea73316e816c30533d02f6c0434a5011751" + "CVE-2023-6915": { + "cmt_msg": "ida: Fix crash in ida_free when the bitmap is empty" }, - "CVE-2013-7446": { - "cmt_msg": "unix: avoid use-after-free in ep_remove_wait_queue", - "cmt_id": "6e238517b4addfb28ba8a94687af174200227b89" + "CVE-2010-4563": { + "cmt_msg": "" }, - "CVE-2017-13167": { - "cmt_msg": "ALSA: timer: Fix race at concurrent reads", - "cmt_id": "d2fe56f9b3f8bace0b645d6c6634eba854b6b7f0" + "CVE-2023-2163": { + "cmt_msg": "bpf: Fix incorrect verifier pruning due to missing register precision taints" }, - "CVE-2015-4177": { - "cmt_msg": "mnt: Fail collect_mounts when applied to unmounted mounts", - "cmt_id": "4bcf842df09d2cbcd32db82a501383bc6b851fa8" + "CVE-2023-2162": { + "cmt_msg": "scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress" }, - "CVE-2015-8374": { - "cmt_msg": "Btrfs: fix truncation of compressed and inlined extents", - "cmt_id": "c40009c43c849713cad7a850af0e522e3132bc5d" + "CVE-2023-45871": { + "cmt_msg": "igb: set max size RX buffer when store bad packet is enabled" }, - "CVE-2016-3672": { - "cmt_msg": "x86/mm/32: Enable full randomization on i386 and X86_32", - "cmt_id": "89df0e7a8ac3e51fc02d1a6ceff194da02abdd96" + "CVE-2023-4622": { + "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES" }, - "CVE-2013-7421": { - "cmt_msg": "crypto: prefix module autoloading with \"crypto-\"", - "cmt_id": "6359ca00be9de08b4495d036ea1f1935dfe65022" + "CVE-2023-4623": { + "cmt_msg": "net/sched: sch_hfsc: Ensure inner classes have fsc curve" }, - "CVE-2015-9004": { - "cmt_msg": "perf: Tighten (and fix) the grouping condition", - "cmt_id": "08446eea4a583919b979915f4dec2fa94ac6186c" + "CVE-2024-26663": { + "cmt_msg": "tipc: Check the bearer type before calling tipc_udp_nl_bearer_add()" }, - "CVE-2015-8785": { - "cmt_msg": "fuse: break infinite loop in fuse_fill_write_pages()", - "cmt_id": "e595f1d352d3531f5295b45ce7feab29d483ec69" + "CVE-2023-1193": { + "cmt_msg": "ksmbd: delete asynchronous work from list" }, - "CVE-2015-2925": { - "cmt_msg": "dcache: Handle escaped paths in prepend_path", - "cmt_id": "a75ff8a85153c785ff1ba70ba2a652f6c1f99a5b" + "CVE-2023-52640": { + "cmt_msg": "fs/ntfs3: Fix oob in ntfs_listxattr" }, - "CVE-2015-2922": { - "cmt_msg": "ipv6: Don't reduce hop limit for an interface", - "cmt_id": "150193b96666abb34d0c0d24c1e8a3068eb34317" + "CVE-2023-52641": { + "cmt_msg": "fs/ntfs3: Add NULL ptr dereference checking at the end of attr_allocate_frame()" }, - "CVE-2015-0275": { - "cmt_msg": "ext4: allocate entire range in zero range", - "cmt_id": "7e11ae290de5fd20b099fe34d113c6cc39b42f55" + "CVE-2021-0399": { + "cmt_msg": "" }, - "CVE-2015-2150": { - "cmt_msg": "xen-pciback: limit guest control of command register", - "cmt_id": "e321556ce29b9fd4579f4c2f00f9a8e95edd9d22" + "CVE-2023-52488": { + "cmt_msg": "serial: sc16is7xx: convert from _raw_ to _noinc_ regmap functions for FIFO" }, - "CVE-2015-4692": { - "cmt_msg": "kvm: x86: fix kvm_apic_has_events to check for NULL pointer", - "cmt_id": "f1fe527bdd0664bc65148278d259762e4e15396d" + "CVE-2023-52489": { + "cmt_msg": "mm/sparsemem: fix race in accessing memory_section->usage" }, - "CVE-2014-7841": { - "cmt_msg": "net: sctp: fix NULL pointer dereference in af->from_addr_param on malformed packet", - "cmt_id": "1cfecc6bca7a8a81ded208b5b2e0a56a6b52ad9a" + "CVE-2023-42755": { + "cmt_msg": "net/sched: Retire rsvp classifier" }, - "CVE-2015-4003": { - "cmt_msg": "ozwpan: divide-by-zero leading to panic", - "cmt_id": "a422e82cbf16bb16cbe6e3f5d87edd787cb874d8" + "CVE-2023-3161": { + "cmt_msg": "fbcon: Check font dimension limits" }, - "CVE-2014-8159": { - "cmt_msg": "IB/uverbs: Prevent integer overflow in ib_umem_get address arithmetic", - "cmt_id": "c8f7da00f74c25e260a763446cc332196a6a1d13" + "CVE-2023-52486": { + "cmt_msg": "drm: Don't unref the same fb many times by mistake due to deadlock handling" }, - "CVE-2014-8989": { - "cmt_msg": "userns: Don't allow setgroups until a gid mapping has been setablished", - "cmt_id": "88e91dce8d462daaa4bf71b591e3f095ab3b084a" + "CVE-2023-52480": { + "cmt_msg": "ksmbd: fix race condition between session lookup and expire" }, - "CVE-2014-7843": { - "cmt_msg": "arm64: __clear_user: handle exceptions on strb", - "cmt_id": "73d908ca212dfa4a27e6ba4c272a651c979594d4" + "CVE-2023-52481": { + "cmt_msg": "arm64: errata: Add Cortex-A520 speculative unprivileged load workaround" }, - "CVE-2014-7842": { - "cmt_msg": "KVM: x86: Don't report guest userspace emulation error to userspace", - "cmt_id": "7dd767fff08a6603b1b14d1e078a1f4721eb8eb4" + "CVE-2023-52482": { + "cmt_msg": "x86/srso: Add SRSO mitigation for Hygon processors" }, - "CVE-2015-1593": { - "cmt_msg": "x86, mm/ASLR: Fix stack randomization on 64-bit systems", - "cmt_id": "b515b1b0f296d699dab273cdab68acb88f4f2add" + "CVE-2023-52483": { + "cmt_msg": "mctp: perform route lookups under a RCU read-side lock" }, - "CVE-2014-8559": { - "cmt_msg": "move d_rcu from overlapping d_child to overlapping d_alias", - "cmt_id": "f185f12c4a26bf317e070697d3cf9ec17fc11864" + "CVE-2023-4128": { + "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free" }, - "CVE-2016-2384": { - "cmt_msg": "ALSA: usb-audio: avoid freeing umidi object twice", - "cmt_id": "6c0fa0936aa173fbecc956d62865a91ef13dad62" + "CVE-2023-4244": { + "cmt_msg": "netfilter: nf_tables: fix GC transaction races with netns and netlink event exit path" }, - "CVE-2014-9584": { - "cmt_msg": "isofs: Fix unchecked printing of ER records", - "cmt_id": "4948220ac9ba5774512f1f9aef4bb23e202e8a23" + "CVE-2023-38409": { + "cmt_msg": "fbcon: set_con2fb_map needs to set con2fb_map!" }, - "CVE-2014-9585": { - "cmt_msg": "x86_64, vdso: Fix the vdso address randomization algorithm", - "cmt_id": "869f828db156fcb10893c1197315ac85780925b0" + "CVE-2023-3609": { + "cmt_msg": "net/sched: cls_u32: Fix reference counter leak leading to overflow" }, - "CVE-2016-2545": { - "cmt_msg": "ALSA: timer: Fix double unlink of active_list", - "cmt_id": "4a7ff8dcf12fae2b2368ba89dffa3743a9996e39" + "CVE-2023-52491": { + "cmt_msg": "media: mtk-jpeg: Fix use after free bug due to error path handling in mtk_jpeg_dec_device_run" }, - "CVE-2016-2544": { - "cmt_msg": "ALSA: seq: Fix race at timer setup and close", - "cmt_id": "712df95de8324fb208c3e8dd147cea69f8554ffb" + "CVE-2024-26759": { + "cmt_msg": "mm/swap: fix race when skipping swapcache" }, - "CVE-2016-2547": { - "cmt_msg": "ALSA: timer: Harden slave timer list handling", - "cmt_id": "c8ca4c5acf7f9825baa63dc5a956bd8ecec45e1b" + "CVE-2023-6039": { + "cmt_msg": "net: usb: lan78xx: reorder cleanup operations to avoid UAF bugs" }, - "CVE-2016-2546": { - "cmt_msg": "ALSA: timer: Fix race among timer ioctls", - "cmt_id": "ffa534e36806d454e7d7d4c2019093365846da65" + "CVE-2023-2269": { + "cmt_msg": "dm ioctl: fix nested locking in table_clear() to remove deadlock concern" }, - "CVE-2016-2543": { - "cmt_msg": "ALSA: seq: Fix missing NULL check at remove_events ioctl", - "cmt_id": "f9d7022955974997f1ba707ddfe8caf297e1a909" + "CVE-2023-0394": { + "cmt_msg": "ipv6: raw: Deduct extension header length in rawv6_push_pending_frames" }, - "CVE-2014-3688": { - "cmt_msg": "net: sctp: fix remote memory pressure from excessive queueing", - "cmt_id": "565d3c2b451cb7078128ee834ddabb02d02af3e5" + "CVE-2024-26615": { + "cmt_msg": "net/smc: fix illegal rmb_desc access in SMC-D connection dump" }, - "CVE-2016-2549": { - "cmt_msg": "ALSA: hrtimer: Fix stall by hrtimer_cancel()", - "cmt_id": "4238f492b693a43607f7a02007421d954769531a" + "CVE-2022-36402": { + "cmt_msg": "drm/vmwgfx: Fix shader stage validation" }, - "CVE-2016-2548": { - "cmt_msg": "ALSA: timer: Harden slave timer list handling", - "cmt_id": "c8ca4c5acf7f9825baa63dc5a956bd8ecec45e1b" + "CVE-2023-28866": { + "cmt_msg": "Bluetooth: HCI: Fix global-out-of-bounds" }, - "CVE-2016-2143": { - "cmt_msg": "s390/mm: four page table levels vs. fork", - "cmt_id": "97520d8491a514f98022802a200c27aa49dfd697" + "CVE-2021-3714": { + "cmt_msg": "" }, - "CVE-2014-8160": { - "cmt_msg": "netfilter: conntrack: disable generic tracking for known protocols", - "cmt_id": "85c981d1b144ddea85cf8827e7afafda024cf684" + "CVE-2023-3117": { + "cmt_msg": "netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE" }, - "CVE-2014-9428": { - "cmt_msg": "batman-adv: Calculate extra tail size based on queued fragments", - "cmt_id": "55074679b401d834d999b8b71877065cfeaeef73" + "CVE-2021-3892": { + "cmt_msg": "" }, - "CVE-2015-5697": { - "cmt_msg": "md: use kzalloc() when bitmap is disabled", - "cmt_id": "0624b99bab2b572b28edc1fab3e2a6d8619ead3a" + "CVE-2023-35788": { + "cmt_msg": "net/sched: flower: fix possible OOB write in fl_set_geneve_opt()" }, - "CVE-2014-3673": { - "cmt_msg": "net: sctp: fix skb_over_panic when receiving malformed ASCONF chunks", - "cmt_id": "240432f953757528abd23c5f76abfb092f05fc86" + "CVE-2023-3567": { + "cmt_msg": "vc_screen: move load of struct vc_data pointer in vcs_read() to avoid UAF" }, - "CVE-2014-8086": { - "cmt_msg": "ext4: prevent bugon on race between write/fcntl", - "cmt_id": "01eca100c06d5b043e828fc2838189ae0c785285" + "CVE-2024-24860": { + "cmt_msg": "Bluetooth: Fix atomicity violation in {min,max}_key_size_set" }, - "CVE-2016-6327": { - "cmt_msg": "IB/srpt: Simplify srpt_handle_tsk_mgmt()", - "cmt_id": "c8db91d65f8322202d663432f7ac84014a77b2fc" + "CVE-2024-24861": { + "cmt_msg": "media: xc4000: Fix atomicity violation in xc4000_get_frequency" }, - "CVE-2015-6252": { - "cmt_msg": "vhost: actually track log eventfd file", - "cmt_id": "c433ad7a9131631517880c74d6415473b2103f0d" + "CVE-2024-24864": { + "cmt_msg": "" }, - "CVE-2014-9729": { - "cmt_msg": "udf: Verify i_size when loading inode", - "cmt_id": "66c88eab4e8c6bb36afa48bf524870d957547f2e" + "CVE-2023-52596": { + "cmt_msg": "sysctl: Fix out of bounds access for empty sysctl registers" }, - "CVE-2015-3288": { - "cmt_msg": "mm: avoid setting up anonymous pages into file mapping", - "cmt_id": "9760c0f9a5a7dbfb696b799189609a3471151cb5" + "CVE-2023-52597": { + "cmt_msg": "KVM: s390: fix setting of fpc register" }, - "CVE-2015-8575": { - "cmt_msg": "bluetooth: Validate socket address length in sco_sock_bind().", - "cmt_id": "2296bb5b70594120aaf3900f4c965c5cf10ede99" + "CVE-2023-52594": { + "cmt_msg": "wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus()" }, - "CVE-2015-8215": { - "cmt_msg": "ipv6: addrconf: validate new MTU before applying it", - "cmt_id": "fd0ad1be8dfb877e31f07f11c120badce12ba09f" + "CVE-2023-52595": { + "cmt_msg": "wifi: rt2x00: restart beacon queue when hardware reset" }, - "CVE-2015-1333": { - "cmt_msg": "KEYS: ensure we free the assoc array edit if edit is valid", - "cmt_id": "9bc34abfec8f083cb5ea50534d22d114ab12c4e3" + "CVE-2023-52593": { + "cmt_msg": "wifi: wfx: fix possible NULL pointer dereference in wfx_set_mfp_ap()" }, - "CVE-2015-8845": { - "cmt_msg": "powerpc/tm: Check for already reclaimed tasks", - "cmt_id": "2682034aabc6fc07cf5fc088cca1e96f36a4e4bc" + "CVE-2023-52590": { + "cmt_msg": "ocfs2: Avoid touching renamed directory if parent does not change" }, - "CVE-2015-8844": { - "cmt_msg": "powerpc/tm: Block signal return setting invalid MSR state", - "cmt_id": "368d31a3656ce7df52a229f6375442ac529db201" + "CVE-2023-52591": { + "cmt_msg": "reiserfs: Avoid touching renamed directory if parent does not change" }, - "CVE-2015-7550": { - "cmt_msg": "KEYS: Fix race between read and revoke", - "cmt_id": "1558fc1a018aa7e2943c413a4de17ae138e855b8" + "CVE-2023-2194": { + "cmt_msg": "i2c: xgene-slimpro: Fix out-of-bounds bug in xgene_slimpro_i2c_xfer()" }, - "CVE-2015-1420": { - "cmt_msg": "vfs: read file_handle only once in handle_to_path", - "cmt_id": "3b73bcf30f8cf56f6635bb5a8fcfbc9e650f8d9b" + "CVE-2023-52599": { + "cmt_msg": "jfs: fix array-index-out-of-bounds in diNewExt" }, - "CVE-2015-1421": { - "cmt_msg": "net: sctp: fix slab corruption from use after free on INIT collisions", - "cmt_id": "72d7e0fe4d22352f69c87bd3c058b05a68101706" + "CVE-2024-26627": { + "cmt_msg": "scsi: core: Move scsi_host_busy() out of host lock for waking up EH handler" }, - "CVE-2016-10229": { - "cmt_msg": "udp: properly support MSG_PEEK with truncated buffers", - "cmt_id": "f7f4fb819a8dc620ce43a435ef91327274e2a875" + "CVE-2011-4916": { + "cmt_msg": "" }, - "CVE-2015-4036": { - "cmt_msg": "vhost/scsi: potential memory corruption", - "cmt_id": "3aa1e327028e3b510a5c166df593f8637b25abe4" + "CVE-2024-0841": { + "cmt_msg": "fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super" }, - "CVE-2015-2666": { - "cmt_msg": "x86/microcode/intel: Guard against stack overflow in the loader", - "cmt_id": "caccf691912359293bc4dfce740b62b202a5dba6" + "CVE-2024-26623": { + "cmt_msg": "pds_core: Prevent race issues involving the adminq" }, - "CVE-2014-3647": { - "cmt_msg": "KVM: x86: Emulator fixes for eip canonical checks on near branches", - "cmt_id": "8a909b2c6e6a4037a8c0e01cf7fae674c427ccc4" + "CVE-2022-41848": { + "cmt_msg": "" }, - "CVE-2014-3646": { - "cmt_msg": "kvm: vmx: handle invvpid vm exit gracefully", - "cmt_id": "67fe3bc3d284f82e204ad2925479483eb21692b8" + "CVE-2022-40982": { + "cmt_msg": "x86/speculation: Add Gather Data Sampling mitigation" }, - "CVE-2016-3137": { - "cmt_msg": "USB: cypress_m8: add endpoint sanity check", - "cmt_id": "768c09c4493020b018bc52c75f75cbafa915894f" + "CVE-2021-39801": { + "cmt_msg": "" }, - "CVE-2015-8569": { - "cmt_msg": "pptp: verify sockaddr_len in pptp_bind() and pptp_connect()", - "cmt_id": "485724cdc8f8898d77eb7a0f3d896facf55f6be1" + "CVE-2021-39800": { + "cmt_msg": "" }, - "CVE-2014-9683": { - "cmt_msg": "eCryptfs: Remove buggy and unnecessary write in file name decode routine", - "cmt_id": "ea447345243f8e594c45d413364832a01b3d9751" + "CVE-2024-22099": { + "cmt_msg": "Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security" }, - "CVE-2016-3134": { - "cmt_msg": "netfilter: x_tables: fix unconditional helper", - "cmt_id": "366d36a8136fd4b34f6d30935693cb6b85915a25" + "CVE-2022-45885": { + "cmt_msg": "" }, - "CVE-2015-5283": { - "cmt_msg": "sctp: fix race on protocol/netns initialization", - "cmt_id": "eb084bd187c25f0b63556a4f6c440e3ac96ecaf5" + "CVE-2022-45884": { + "cmt_msg": "" }, - "CVE-2016-3138": { - "cmt_msg": "USB: cdc-acm: more sanity checking", - "cmt_id": "173d111b4a26744a2c8f230901a0a418d083efa0" + "CVE-2022-45887": { + "cmt_msg": "media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb()" }, - "CVE-2016-3157": { - "cmt_msg": "x86/iopl/64: Properly context-switch IOPL on Xen PV", - "cmt_id": "a6a2cb781be75d0a135a8e4ddd87854f09377928" + "CVE-2022-45886": { + "cmt_msg": "media: dvb-core: Fix use-after-free due on race condition at dvb_net" }, - "CVE-2016-3156": { - "cmt_msg": "ipv4: Don't do expensive useless work during inetdev destroy.", - "cmt_id": "8b03d9086461070caa263541bf83508ab30f52cc" + "CVE-2023-52509": { + "cmt_msg": "ravb: Fix use-after-free issue in ravb_tx_timeout_work()" }, - "CVE-2016-2085": { - "cmt_msg": "EVM: Use crypto_memneq() for digest comparisons", - "cmt_id": "50e2fe0e98fffd08cb81b1785174db30902271c6" + "CVE-2023-46343": { + "cmt_msg": "nfc: nci: fix possible NULL pointer dereference in send_acknowledge()" }, - "CVE-2016-2847": { - "cmt_msg": "pipe: limit the per-user amount of pages allocated in pipes", - "cmt_id": "74f8c94db4565dc3b89bc9571e999227a98e972f" + "CVE-2024-25744": { + "cmt_msg": "x86/coco: Disable 32-bit emulation by default on TDX and SEV" }, - "CVE-2015-7885": { - "cmt_msg": "staging/dgnc: fix info leak in ioctl", - "cmt_id": "df3a19b81c9449249f89babdca8a716a2f92d0ac" + "CVE-2023-52505": { + "cmt_msg": "phy: lynx-28g: serialize concurrent phy_set_mode_ext() calls to shared registers" }, - "CVE-2014-9529": { - "cmt_msg": "KEYS: close race between key lookup and freeing", - "cmt_id": "43e6badd6f821916946216504c23e56bd8bba2e1" + "CVE-2023-52504": { + "cmt_msg": "x86/alternatives: Disable KASAN in apply_alternatives()" }, - "CVE-2015-5307": { - "cmt_msg": "KVM: x86: work around infinite loop in microcode when #AC is delivered", - "cmt_id": "033edc3a7d4c3fd1560aa41e051d6e79b9545ed0" + "CVE-2023-52507": { + "cmt_msg": "nfc: nci: assert requested protocol is valid" }, - "CVE-2015-4002": { - "cmt_msg": "ozwpan: Use proper check to prevent heap overflow", - "cmt_id": "239e380248e92150c2e2fe485679fb1b72b3711e" + "CVE-2023-2124": { + "cmt_msg": "xfs: verify buffer contents when we skip log replay" }, - "CVE-2015-4001": { - "cmt_msg": "ozwpan: Use unsigned ints to prevent heap overflow", - "cmt_id": "cd6bcf08bfc93c0c86c9be7d5de0f2f9e5b47e76" + "CVE-2023-52501": { + "cmt_msg": "ring-buffer: Do not attempt to read past \"commit\"" }, - "CVE-2015-3636": { - "cmt_msg": "ipv4: Missing sk_nulls_node_init() in ping_unhash().", - "cmt_id": "f91222b61038729728090fdac38fd819ec6e26ef" + "CVE-2023-52500": { + "cmt_msg": "scsi: pm80xx: Avoid leaking tags when processing OPC_INB_SET_CONTROLLER_CONFIG command" }, - "CVE-2016-2185": { - "cmt_msg": "Input: ati_remote2 - fix crashes on detecting device with invalid descriptor", - "cmt_id": "7ea6b63a62afde28feaae499cc8094426b0b4241" + "CVE-2023-52503": { + "cmt_msg": "tee: amdtee: fix use-after-free vulnerability in amdtee_close_session" }, - "CVE-2016-2184": { - "cmt_msg": "ALSA: usb-audio: Fix NULL dereference in create_fixed_stream_quirk()", - "cmt_id": "b92dbabac3053baaf83bcae270bf058cd5839e35" + "CVE-2023-52502": { + "cmt_msg": "net: nfc: fix races in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn()" }, - "CVE-2015-7799": { - "cmt_msg": "isdn_ppp: Add checks for allocation failure in isdn_ppp_open()", - "cmt_id": "bcd596b01fd5cea4591cd1cc8c1183f3da4bed68" + "CVE-2023-1281": { + "cmt_msg": "net/sched: tcindex: update imperfect hash filters respecting rcu" }, - "CVE-2015-2041": { - "cmt_msg": "net: llc: use correct size for sysctl timeout entries", - "cmt_id": "4218278977f7bb99190f239a708e9ee7836fd11c" + "CVE-2023-6817": { + "cmt_msg": "netfilter: nft_set_pipapo: skip inactive elements during set walk" }, - "CVE-2014-7970": { - "cmt_msg": "mnt: Prevent pivot_root from creating a loop in the mount tree", - "cmt_id": "31b7cb6b454d1d5279ddc5a3574ae9cf5456615d" + "CVE-2023-1859": { + "cmt_msg": "9p/xen : Fix use after free bug in xen_9pfs_front_remove due to race condition" }, - "CVE-2015-2042": { - "cmt_msg": "net: rds: use correct size for max unacked packets and bytes", - "cmt_id": "065f373545d11d7dfe22d6fa1381b214522f187a" + "CVE-2023-1855": { + "cmt_msg": "hwmon: (xgene) Fix use after free bug in xgene_hwmon_remove due to race condition" }, - "CVE-2015-3331": { - "cmt_msg": "crypto: aesni - fix memory usage in GCM decryption", - "cmt_id": "da3d3856b47cddbdc6b4d676bfaadd91c7571993" + "CVE-2022-27672": { + "cmt_msg": "x86/speculation: Identify processors vulnerable to SMT RSB predictions" }, - "CVE-2015-3332": { - "cmt_msg": "tcp: Fix crash in TCP Fast Open", - "cmt_id": "53411a80e3449952336582f8689c458b63f85455" + "CVE-2024-26668": { + "cmt_msg": "netfilter: nft_limit: reject configurations that cause integer overflow" }, - "CVE-2015-8767": { - "cmt_msg": "sctp: Prevent soft lockup when sctp_accept() is called during a timeout event", - "cmt_id": "26e0e9c2b06c3d9cc62ac25c1e410642205234f1" - } - }, - "3.16.36": { - "CVE-2016-3961": { - "cmt_msg": "x86/mm/xen: Suppress hugetlbfs in PV guests", - "cmt_id": "27c03f880236b5e3c48af4d8848916bea8a5d88a" + "CVE-2024-26669": { + "cmt_msg": "net/sched: flower: Fix chain template offload" }, - "CVE-2016-4581": { - "cmt_msg": "propogate_mnt: Handle the first propogated copy being a slave", - "cmt_id": "816d889b22613b946de7ab6458d7c7cc250fcdca" + "CVE-2020-25220": { + "cmt_msg": "" }, - "CVE-2016-4580": { - "cmt_msg": "net: fix a kernel infoleak in x25 module", - "cmt_id": "66a315418f82f9d97f4233cd71e3b54105ffefd1" + "CVE-2015-2877": { + "cmt_msg": "" }, - "CVE-2016-4486": { - "cmt_msg": "net: fix infoleak in rtnetlink", - "cmt_id": "935f8a3274efedc93d5e6c8183915ac4fad81924" + "CVE-2024-26660": { + "cmt_msg": "drm/amd/display: Implement bounds check for stream encoder creation in DCN301" }, - "CVE-2016-2117": { - "cmt_msg": "atl2: Disable unimplemented scatter/gather feature", - "cmt_id": "801b07f4e84bcbc59118e582e861e34f404e0c15" + "CVE-2024-26661": { + "cmt_msg": "drm/amd/display: Add NULL test for 'timing generator' in 'dcn21_set_pipe()'" }, - "CVE-2016-4485": { - "cmt_msg": "net: fix infoleak in llc", - "cmt_id": "c922f1c07ac330685d6603c619239bdb645d7bdd" + "CVE-2024-26662": { + "cmt_msg": "drm/amd/display: Fix 'panel_cntl' could be null in 'dcn21_set_backlight_level()'" }, - "CVE-2016-4913": { - "cmt_msg": "get_rock_ridge_filename(): handle malformed NM entries", - "cmt_id": "122352cc76bf0018b094a3051ca47f3d63cf5668" + "CVE-2023-26242": { + "cmt_msg": "" }, - "CVE-2016-4565": { - "cmt_msg": "IB/security: Restrict use of the write() interface", - "cmt_id": "f4b592cb05dce29cd4c6778400ece68a45a1a223" + "CVE-2024-26664": { + "cmt_msg": "hwmon: (coretemp) Fix out-of-bounds memory access" }, - "CVE-2016-2187": { - "cmt_msg": "Input: gtco - fix crash on detecting device without endpoints", - "cmt_id": "772703cadb1bf378bcd5ae87db4c150da37351b6" + "CVE-2024-26665": { + "cmt_msg": "tunnels: fix out of bounds access when building IPv6 PMTU error" }, - "CVE-2016-7916": { - "cmt_msg": "proc: prevent accessing /proc//environ until it's ready", - "cmt_id": "eee69c92529e82e48e088f21137220c516c4b8ed" + "CVE-2019-16089": { + "cmt_msg": "" }, - "CVE-2016-0758": { - "cmt_msg": "KEYS: Fix ASN.1 indefinite length object parsing", - "cmt_id": "af00ae6ef5a2c73f21ba215c476570b7772a14fb" + "CVE-2024-26667": { + "cmt_msg": "drm/msm/dpu: check for valid hw_pp in dpu_encoder_helper_phys_cleanup" }, - "CVE-2016-3070": { - "cmt_msg": "mm: migrate dirty page without clear_page_dirty_for_io etc", - "cmt_id": "77f7f67dbd37ab3eebd98e2764bd1e0900028a33" + "CVE-2024-26689": { + "cmt_msg": "ceph: prevent use-after-free in encode_cap_msg()" }, - "CVE-2016-7914": { - "cmt_msg": "assoc_array: don't call compare_object() on a node", - "cmt_id": "d513fcfdc14b44cc22f85bd1a5206fc6cd68d354" - } - }, - "3.16.37": { - "CVE-2016-4997": { - "cmt_msg": "netfilter: x_tables: check for bogus target offset", - "cmt_id": "35ea6762cc084057963af3833c77cf2906461b75" + "CVE-2023-21264": { + "cmt_msg": "KVM: arm64: Prevent unconditional donation of unmapped regions from the host" }, - "CVE-2016-5728": { - "cmt_msg": "misc: mic: Fix for double fetch security bug in VOP driver", - "cmt_id": "72aaf646fb6b6f8f7befb44cbd5b1acd3bb5b483" + "CVE-2023-1513": { + "cmt_msg": "kvm: initialize all of the kvm_debugregs structure before sending it to userspace" }, - "CVE-2016-4470": { - "cmt_msg": "KEYS: potential uninitialized variable", - "cmt_id": "91c854934664bf4d713b12f663de77397840d5bd" + "CVE-2021-3847": { + "cmt_msg": "" }, - "CVE-2016-4482": { - "cmt_msg": "USB: usbfs: fix potential infoleak in devio", - "cmt_id": "502c7a5b24af01f64d6812a0a382c6beebef9c55" + "CVE-2023-52440": { + "cmt_msg": "ksmbd: fix slub overflow in ksmbd_decode_ntlmssp_auth_blob()" }, - "CVE-2016-4998": { - "cmt_msg": "netfilter: x_tables: check for bogus target offset", - "cmt_id": "35ea6762cc084057963af3833c77cf2906461b75" + "CVE-2023-52441": { + "cmt_msg": "ksmbd: fix out of bounds in init_smb2_rsp_hdr()" }, - "CVE-2016-1237": { - "cmt_msg": "posix_acl: Add set_posix_acl", - "cmt_id": "8e31c40b13640f7990ae0038ae4e7a6685998e3a" + "CVE-2023-52442": { + "cmt_msg": "ksmbd: validate session id and tree id in compound request" }, - "CVE-2014-9922": { - "cmt_msg": "fs: limit filesystem stacking depth", - "cmt_id": "54c202bbeb9a00042d374561c6bf2bf5d586fc11" + "CVE-2023-52443": { + "cmt_msg": "apparmor: avoid crash when parsed profile name is empty" }, - "CVE-2014-9904": { - "cmt_msg": "ALSA: compress: fix an integer overflow check", - "cmt_id": "bd5ab00affa19dcc491318cbb1e0891ffa49c645" + "CVE-2023-52444": { + "cmt_msg": "f2fs: fix to avoid dirent corruption" }, - "CVE-2016-4578": { - "cmt_msg": "ALSA: timer: Fix leak in events via snd_timer_user_ccallback", - "cmt_id": "d5b7dbe55864c6bb1b966971f6d4ef90d5b95e46" + "CVE-2023-52445": { + "cmt_msg": "media: pvrusb2: fix use after free on context disconnection" }, - "CVE-2016-9754": { - "cmt_msg": "ring-buffer: Prevent overflow of size in ring_buffer_resize()", - "cmt_id": "e5e2cbc7f25c06266bba5072adab68cc64f71401" + "CVE-2011-4917": { + "cmt_msg": "" }, - "CVE-2016-5696": { - "cmt_msg": "tcp: make challenge acks less predictable", - "cmt_id": "c6287499662db0b0caee72d6453e445a2c6162af" + "CVE-2023-52447": { + "cmt_msg": "bpf: Defer the free of inner map when necessary" }, - "CVE-2016-5244": { - "cmt_msg": "rds: fix an infoleak in rds_inc_info_copy", - "cmt_id": "5343d1779fd944a3937dafc56f3e853a5e063a3d" + "CVE-2023-52448": { + "cmt_msg": "gfs2: Fix kernel NULL pointer dereference in gfs2_rgrp_dump" }, - "CVE-2016-5243": { - "cmt_msg": "tipc: fix an infoleak in tipc_nl_compat_link_dump", - "cmt_id": "3d4997da790d035dc4cc61f254d4de467a1bbf90" + "CVE-2023-52449": { + "cmt_msg": "mtd: Fix gluebi NULL pointer dereference caused by ftl notifier" }, - "CVE-2016-7911": { - "cmt_msg": "block: fix use-after-free in sys_ioprio_get()", - "cmt_id": "60b67e2584e080c42ae23a9518738591969544e1" + "CVE-2023-23039": { + "cmt_msg": "" }, - "CVE-2016-9806": { - "cmt_msg": "netlink: Fix dump skb leak/double free", - "cmt_id": "ed8ab6b2bb3f3714dad70216b94e1bb8bc8df223" + "CVE-2024-26718": { + "cmt_msg": "dm-crypt, dm-verity: disable tasklets" }, - "CVE-2016-4569": { - "cmt_msg": "ALSA: timer: Fix leak in SNDRV_TIMER_IOCTL_PARAMS", - "cmt_id": "84d8697290dd3b2c08be651651a02d30f62d91a7" + "CVE-2024-26719": { + "cmt_msg": "nouveau: offload fence uevents work to workqueue" }, - "CVE-2016-5412": { - "cmt_msg": "KVM: PPC: Book3S HV: Pull out TM state save/restore into separate procedures", - "cmt_id": "b16e5c4a51094b5fbf6e2543f8d1c260429c946d" + "CVE-2024-26714": { + "cmt_msg": "interconnect: qcom: sc8180x: Mark CO0 BCM keepalive" }, - "CVE-2017-7495": { - "cmt_msg": "ext4: fix data exposure after a crash", - "cmt_id": "b274508ecc4388f00de57fc6641bf8be2b671908" + "CVE-2024-26715": { + "cmt_msg": "usb: dwc3: gadget: Fix NULL pointer dereference in dwc3_gadget_suspend" }, - "CVE-2016-1583": { - "cmt_msg": "proc: prevent stacking filesystems on top", - "cmt_id": "a0b5c04dfca69e9728b1c454c6f9fde9f8f38613" + "CVE-2024-1312": { + "cmt_msg": "mm: lock_vma_under_rcu() must check vma->anon_vma under vma lock" }, - "CVE-2016-5829": { - "cmt_msg": "HID: hiddev: validate num_values for HIDIOCGUSAGES, HIDIOCSUSAGES commands", - "cmt_id": "4ef3e38d4e0726ec7f63f8d9c6b4c3aa1cbeec7b" + "CVE-2024-26717": { + "cmt_msg": "HID: i2c-hid-of: fix NULL-deref on failed power up" }, - "CVE-2016-5828": { - "cmt_msg": "powerpc/tm: Always reclaim in start_thread() for exec() class syscalls", - "cmt_id": "8c96b416de2acc010c9e7f90c9d2dde9b1418444" + "CVE-2023-3338": { + "cmt_msg": "Remove DECnet support from kernel" }, - "CVE-2016-6130": { - "cmt_msg": "s390/sclp_ctl: fix potential information leak with /dev/sclp", - "cmt_id": "8229d94adedd2cad31fee2e90b1becb2fdc09b9d" + "CVE-2024-26712": { + "cmt_msg": "powerpc/kasan: Fix addr error caused by page alignment" }, - "CVE-2016-6136": { - "cmt_msg": "audit: fix a double fetch in audit_log_single_execve_arg()", - "cmt_id": "c8a3667e957a498865ec82c3d19160f1a330daef" + "CVE-2024-26713": { + "cmt_msg": "powerpc/pseries/iommu: Fix iommu initialisation during DLPAR add" } - }, - "3.16.38": { - "CVE-2016-5195": { - "cmt_msg": "mm: remove gup_flags FOLL_WRITE games from __get_user_pages()", - "cmt_id": "2649c26fdeb99f1c104c387ae63fd72e119c2b96" + } + }, + "4.5": { + "4.5": { + "CVE-2016-2143": { + "cmt_msg": "s390/mm: four page table levels vs. fork", + "cmt_id": "3446c13b268af86391d06611327006b059b8bab1" + }, + "CVE-2016-3044": { + "cmt_msg": "KVM: PPC: Book3S HV: Sanitize special-purpose register values on guest exit", + "cmt_id": "ccec44563b18a0ce90e2d4f332784b3cb25c8e9c" + }, + "CVE-2016-3951": { + "cmt_msg": "cdc_ncm: do not call usbnet_link_change from cdc_ncm_bind", + "cmt_id": "4d06dd537f95683aba3651098ae288b7cbff8274" } }, - "3.16.39": { - "CVE-2016-7042": { - "cmt_msg": "KEYS: Fix short sprintf buffer in /proc/keys show function", - "cmt_id": "dbc969a232a97c001f6c5f7b4b5e0de4dca4fe84" + "4.5.1": { + "CVE-2016-3137": { + "cmt_msg": "USB: cypress_m8: add endpoint sanity check", + "cmt_id": "674044a0686c4bcb9c94282795de74b747c3b0f1" }, - "CVE-2016-6828": { - "cmt_msg": "tcp: fix use after free in tcp_xmit_retransmit_queue()", - "cmt_id": "3a7dc8f4b37d2c2b12b805aee4a41e706c43ded1" + "CVE-2016-3157": { + "cmt_msg": "x86/iopl/64: Properly context-switch IOPL on Xen PV", + "cmt_id": "3e30e998425d5406e7a7470f4e2680217d23acab" }, - "CVE-2016-8658": { - "cmt_msg": "brcmfmac: avoid potential stack overflow in brcmf_cfg80211_start_ap()", - "cmt_id": "df523e7adf0595cf509f6382af7ed801ab0bd108" + "CVE-2016-3689": { + "cmt_msg": "Input: ims-pcu - sanity check against missing interfaces", + "cmt_id": "cadaf14c349dfd9dae5113a53f0d7f6d49b9d4ef" }, - "CVE-2016-8633": { - "cmt_msg": "firewire: net: guard against rx buffer overflows", - "cmt_id": "88eadd913f235ffd29767b504fd68caaa1394f76" + "CVE-2016-9685": { + "cmt_msg": "xfs: fix two memory leaks in xfs_attr_list.c error paths", + "cmt_id": "2011d17edfff18785d4c97d18150750fc7a27678" }, - "CVE-2015-1350": { - "cmt_msg": "fs: Avoid premature clearing of capabilities", - "cmt_id": "3418703a9d04fa65f993e89a3fa6bfeed3c1fe7c" + "CVE-2016-3140": { + "cmt_msg": "USB: digi_acceleport: do sanity checking for the number of ports", + "cmt_id": "f1568bb7d4c28944ee8ab25e34f4bed86f7c4229" }, - "CVE-2016-7097": { - "cmt_msg": "posix_acl: Clear SGID bit when setting file permissions", - "cmt_id": "f2ba3e2310b3967720b83126db8684c69ce41894" + "CVE-2016-3136": { + "cmt_msg": "USB: mct_u232: add sanity checking in probe", + "cmt_id": "fc7f87747c9e174b97d7b81fb0b6e1614f60171b" + }, + "CVE-2016-2185": { + "cmt_msg": "Input: ati_remote2 - fix crashes on detecting device with invalid descriptor", + "cmt_id": "e0a40d844832eb90c6ac790dada3d060332d654c" + }, + "CVE-2016-2184": { + "cmt_msg": "ALSA: usb-audio: Fix NULL dereference in create_fixed_stream_quirk()", + "cmt_id": "7cb483b5cc96cb27d724497a737a3e3aa2126cd9" + }, + "CVE-2016-6327": { + "cmt_msg": "IB/srpt: Simplify srpt_handle_tsk_mgmt()", + "cmt_id": "ebd49ea0d0e29e9baafa657fc9e39f6c31f92107" + }, + "CVE-2016-2186": { + "cmt_msg": "Input: powermate - fix oops with malicious USB descriptors", + "cmt_id": "e97ae5113dd09d459d7f173710ba86ba2ad83a42" }, - "CVE-2016-7425": { - "cmt_msg": "scsi: arcmsr: Buffer overflow in arcmsr_iop_message_xfer()", - "cmt_id": "400ce4d1a8ea346d95b36f6c72b993de69f8a0b0" + "CVE-2016-3138": { + "cmt_msg": "USB: cdc-acm: more sanity checking", + "cmt_id": "347e1384659eadc8b6ccd520a5eb005df6493676" + } + }, + "4.5.2": { + "CVE-2016-7117": { + "cmt_msg": "net: Fix use after free in the recvmmsg exit path", + "cmt_id": "86de5ca8bb61875d92ee8d5c5531839fe8f47199" }, - "CVE-2016-9084": { - "cmt_msg": "vfio/pci: Fix integer overflows, bitmask check", - "cmt_id": "6593fe0cbdc77241f58e75d049296d1fba37d484" + "CVE-2016-3156": { + "cmt_msg": "ipv4: Don't do expensive useless work during inetdev destroy.", + "cmt_id": "1e52e21995ae66be8ce5c97bf715e2a66f622af1" }, - "CVE-2016-6480": { - "cmt_msg": "aacraid: Check size values after double-fetch from user", - "cmt_id": "962b0f29a59ec0dd32c18001ffcd2ba23ab4eada" + "CVE-2016-4805": { + "cmt_msg": "ppp: take reference on channels netns", + "cmt_id": "d1d87a48fa9731247424675f6abc5daba74ec3f8" + } + }, + "4.5.3": { + "CVE-2016-3961": { + "cmt_msg": "x86/mm/xen: Suppress hugetlbfs in PV guests", + "cmt_id": "d5e81d34ceadad4174a61c9bf910b89a32509581" }, - "CVE-2016-7910": { - "cmt_msg": "block: fix use-after-free in seq file", - "cmt_id": "2dabc3a663edfc35c2ab48f4d6b51114757b858c" + "CVE-2016-7914": { + "cmt_msg": "assoc_array: don't call compare_object() on a node", + "cmt_id": "3a8c16abfa42e287b586142297115986b8eeb8fb" }, - "CVE-2016-9083": { - "cmt_msg": "vfio/pci: Fix integer overflows, bitmask check", - "cmt_id": "6593fe0cbdc77241f58e75d049296d1fba37d484" + "CVE-2016-3955": { + "cmt_msg": "USB: usbip: fix potential out-of-bounds write", + "cmt_id": "4bca37b600a44859893b45ca87001b808907fff7" }, - "CVE-2015-8955": { - "cmt_msg": "arm64: perf: reject groups spanning multiple HW PMUs", - "cmt_id": "b2aa2e250fe40b8413aefd8762b488d81f292c34" + "CVE-2016-4565": { + "cmt_msg": "IB/security: Restrict use of the write() interface", + "cmt_id": "0919927a5c86e71655ebc3a96a465c6eb640927b" }, - "CVE-2015-8956": { - "cmt_msg": "Bluetooth: Fix potential NULL dereference in RFCOMM bind callback", - "cmt_id": "8c996f7322f988a074896c135f90d6c4c6d173ab" + "CVE-2016-2187": { + "cmt_msg": "Input: gtco - fix crash on detecting device without endpoints", + "cmt_id": "14e42e0a81bd16c8db80c686d97388c03d87e3fc" }, - "CVE-2023-3106": { - "cmt_msg": "xfrm: fix crash in XFRM_MSG_GETSA netlink handler", - "cmt_id": "2dcb72918e387fd1d0af40c1c351822bfe1acf63" + "CVE-2016-7912": { + "cmt_msg": "usb: gadget: f_fs: Fix use-after-free", + "cmt_id": "b1fb1321ed52927cfddc532af376d16e4abab866" }, - "CVE-2016-3857": { - "cmt_msg": "arm: oabi compat: add missing access checks", - "cmt_id": "7e7aaf7b1bf53b5b0abd380efe7fc430bc8a590d" + "CVE-2015-7833": { + "cmt_msg": "usbvision: revert commit 588afcc1", + "cmt_id": "119d57d1ed4c66172dd1a8f396c19c2a81479c10" + }, + "CVE-2016-4568": { + "cmt_msg": "videobuf2-v4l2: Verify planes array in buffer dequeueing", + "cmt_id": "922ff7af18370b752204c03e75e3dc3a2c50127d" } }, - "3.16.40": { - "CVE-2016-6787": { - "cmt_msg": "perf: Fix event->ctx locking", - "cmt_id": "18163dd15627bfa34af63299998523d8dd1a109e" - }, - "CVE-2016-6786": { - "cmt_msg": "perf: Fix event->ctx locking", - "cmt_id": "18163dd15627bfa34af63299998523d8dd1a109e" + "4.5.4": { + "CVE-2016-7916": { + "cmt_msg": "proc: prevent accessing /proc//environ until it's ready", + "cmt_id": "3e047c7357c2022dffdddd0b6484ed53571f13ba" }, - "CVE-2015-8964": { - "cmt_msg": "tty: Prevent ldisc drivers from re-using stale tty fields", - "cmt_id": "16c30eea9553b0ccbb379eed34f85fbed5e2cdcd" + "CVE-2016-4581": { + "cmt_msg": "propogate_mnt: Handle the first propogated copy being a slave", + "cmt_id": "b439d566d2219d9e1f05ae4cdb4fd19f132899c8" + } + }, + "4.5.5": { + "CVE-2016-6198": { + "cmt_msg": "vfs: add vfs_select_inode() helper", + "cmt_id": "ad56dcb2447522f6a165cb9bccff379e96acca8d" }, - "CVE-2015-8962": { - "cmt_msg": "sg: Fix double-free when drives detach during SG_IO", - "cmt_id": "79cfd63480a7c4b48c6c329fab1bde569e0a4ac2" + "CVE-2016-4557": { + "cmt_msg": "bpf: fix double-fdput in replace_map_fd_with_map_ptr()", + "cmt_id": "2ffd01aa8d12c83c43b611a74a09852ea4dd0111" }, - "CVE-2015-8963": { - "cmt_msg": "perf: Fix race in swevent hash", - "cmt_id": "311c3b32f1e591b88e1b290efdcbc79c081f8e0f" + "CVE-2016-4580": { + "cmt_msg": "net: fix a kernel infoleak in x25 module", + "cmt_id": "f7ee286fab0b55bf5908978c94e50d52e627b3ac" }, - "CVE-2016-9793": { - "cmt_msg": "net: avoid signed overflows for SO_{SND|RCV}BUFFORCE", - "cmt_id": "756826fd4e4a25589a2e77a7ceb791314c73cf48" + "CVE-2016-4486": { + "cmt_msg": "net: fix infoleak in rtnetlink", + "cmt_id": "ff82293b226fd3bbfbd6d3fcbb0ffbbd55c85862" }, - "CVE-2017-15102": { - "cmt_msg": "usb: misc: legousbtower: Fix NULL pointer deference", - "cmt_id": "5d1d4fb4ab35b8eebf3b9112c460cb25edb89143" + "CVE-2016-2117": { + "cmt_msg": "atl2: Disable unimplemented scatter/gather feature", + "cmt_id": "11236cf9aef1402ddc1734409d89d3ad76e5eddc" }, - "CVE-2016-9794": { - "cmt_msg": "ALSA: pcm : Call kill_fasync() in stream lock", - "cmt_id": "afd9c2402bdfdbc813587faf7f0e8e1f94c2ee91" + "CVE-2016-4485": { + "cmt_msg": "net: fix infoleak in llc", + "cmt_id": "33d437ee77122c4889d1e9c7ff6488f04b9cf05e" }, - "CVE-2016-10200": { - "cmt_msg": "l2tp: fix racy SOCK_ZAPPED flag check in l2tp_ip{,6}_bind()", - "cmt_id": "7c3ad0d86f80618c00a5d6a267080238185038f6" + "CVE-2016-4558": { + "cmt_msg": "bpf: fix refcnt overflow", + "cmt_id": "1b106ad23a72bba34c7f37574defa324fdd76fc7" }, - "CVE-2016-8632": { - "cmt_msg": "tipc: check minimum bearer MTU", - "cmt_id": "cd53924265a9d328af37722c6b682e4ea793d04e" + "CVE-2016-4913": { + "cmt_msg": "get_rock_ridge_filename(): handle malformed NM entries", + "cmt_id": "f18783e6ab935c8884e24c43d6e5d5c417e06923" + } + }, + "4.5.6": { + "CVE-2016-3713": { + "cmt_msg": "KVM: MTRR: remove MSR 0x2f8", + "cmt_id": "2aecd84724e43ea2f962ba54e10b9f304c258d16" }, - "CVE-2016-8650": { - "cmt_msg": "mpi: Fix NULL ptr dereference in mpi_powm()", - "cmt_id": "0a74b364c4c2ce4bfffdbefd62cced99ad76bec9" + "CVE-2016-9754": { + "cmt_msg": "ring-buffer: Prevent overflow of size in ring_buffer_resize()", + "cmt_id": "40677f4ae0cb6ebaa1e2f631ee277e0be3379c31" }, - "CVE-2016-8655": { - "cmt_msg": "packet: fix race condition in packet_set_ring", - "cmt_id": "943e7299c0fec28de9df8985953f45633b071690" + "CVE-2019-3901": { + "cmt_msg": "perf/core: Fix perf_event_open() vs. execve() race", + "cmt_id": "d276f428ef5549f414583963ba1f014e7746009e" + } + }, + "outstanding": { + "CVE-2019-15098": { + "cmt_msg": "ath6kl: fix a NULL-ptr-deref bug in ath6kl_usb_alloc_urb_from_pipe()" }, - "CVE-2016-8405": { - "cmt_msg": "fbdev: color map copying bounds checking", - "cmt_id": "4952d0fe7849840bf3767051eb296e84c0e6ed52" + "CVE-2017-17712": { + "cmt_msg": "net: ipv4: fix for a race condition in raw_sendmsg" }, - "CVE-2016-10088": { - "cmt_msg": "sg_write()/bsg_write() is not fit to be called under KERNEL_DS", - "cmt_id": "249741c2c0d7a905da66efc6d1292d3915aef1fc" + "CVE-2022-0001": { + "cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE" }, - "CVE-2016-9120": { - "cmt_msg": "staging/android/ion : fix a race condition in the ion driver", - "cmt_id": "ce626e14b2fd8f1f0ff6d17a8503f12d3e991cd3" + "CVE-2022-0002": { + "cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE" }, - "CVE-2016-7915": { - "cmt_msg": "HID: core: prevent out-of-bound readings", - "cmt_id": "e137da9c2207aa45c353b224a12b1cecfdcb54cb" + "CVE-2019-19965": { + "cmt_msg": "scsi: libsas: stop discovering if oob mode is disconnected" }, - "CVE-2016-7917": { - "cmt_msg": "netfilter: nfnetlink: correctly validate length of batch messages", - "cmt_id": "8a984a4795fd4432da09e170efe7d9766d0e91cf" + "CVE-2017-15102": { + "cmt_msg": "usb: misc: legousbtower: Fix NULL pointer deference" }, - "CVE-2016-7912": { - "cmt_msg": "usb: gadget: f_fs: Fix use-after-free", - "cmt_id": "0fbed614ccd7ab27d77bc129a9d8539181d7d275" + "CVE-2023-52615": { + "cmt_msg": "hwrng: core - Fix page fault dead lock on mmap-ed hwrng" }, - "CVE-2016-8645": { - "cmt_msg": "tcp: take care of truncations done by sk_filter()", - "cmt_id": "3d59e6e25fd0cbe700d3f2910291729227dcfd23" + "CVE-2023-52614": { + "cmt_msg": "PM / devfreq: Fix buffer overflow in trans_stat_show" }, - "CVE-2017-6001": { - "cmt_msg": "perf/core: Fix concurrent sys_perf_event_open() vs. 'move_group' race", - "cmt_id": "fe525a280e8b5f04c7666fe22d1a4ef592f7b953" + "CVE-2023-52617": { + "cmt_msg": "PCI: switchtec: Fix stdev_release() crash after surprise hot remove" }, - "CVE-2016-9191": { - "cmt_msg": "sysctl: Drop reference added by grab_header in proc_sys_readdir", - "cmt_id": "0b66ea3bca021aea839c526d7643df085c5dadbc" + "CVE-2020-24587": { + "cmt_msg": "mac80211: prevent mixed key and fragment cache attacks" }, - "CVE-2016-9555": { - "cmt_msg": "sctp: validate chunk len before actually using it", - "cmt_id": "1685cd22d7ebda79ea519457499f9cc4ced1e966" - } - }, - "3.16.41": { - "CVE-2017-2618": { - "cmt_msg": "selinux: fix off-by-one in setprocattr", - "cmt_id": "0646217322101c829aaabf95294ce9b8b02ab807" + "CVE-2020-24586": { + "cmt_msg": "mac80211: prevent mixed key and fragment cache attacks" }, - "CVE-2017-5970": { - "cmt_msg": "ipv4: keep skb->dst around in presence of IP options", - "cmt_id": "631f00df1b2fa51492de8ab93a91a3876b697aeb" + "CVE-2021-0129": { + "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical" }, - "CVE-2017-6074": { - "cmt_msg": "dccp: fix freeing skb too early for IPV6_RECVPKTINFO", - "cmt_id": "c21341fd2c2e0e840864062707825d6d0d5e13b2" + "CVE-2020-24588": { + "cmt_msg": "cfg80211: mitigate A-MSDU aggregation attacks" }, - "CVE-2016-6213": { - "cmt_msg": "mnt: Add a per mount namespace limit on the number of mounts", - "cmt_id": "b71f455440fd7ed03f088580b3a117352fc815dd" + "CVE-2023-52619": { + "cmt_msg": "pstore/ram: Fix crash when setting number of cpus to an odd number" }, - "CVE-2016-10208": { - "cmt_msg": "ext4: validate s_first_meta_bg at mount time", - "cmt_id": "cde863587b6809fdf61ea3c5391ecf06884b5516" + "CVE-2023-52618": { + "cmt_msg": "block/rnbd-srv: Check for unlikely string overflow" }, - "CVE-2017-5897": { - "cmt_msg": "ip6_gre: fix ip6gre_err() invalid reads", - "cmt_id": "3a997b28bbc69f7637ccd62c5a37379dec34f36b" + "CVE-2023-5717": { + "cmt_msg": "perf: Disallow mis-matched inherited group reads" }, - "CVE-2016-9588": { - "cmt_msg": "kvm: nVMX: Allow L1 to intercept software exceptions (#BP and #OF)", - "cmt_id": "8cebcee992c81aaec741311db337705a4949261c" + "CVE-2018-10940": { + "cmt_msg": "cdrom: information leak in cdrom_ioctl_media_changed()" }, - "CVE-2017-6214": { - "cmt_msg": "tcp: avoid infinite loop in tcp_splice_read()", - "cmt_id": "5b746247d798a6061d213bf3f64c6e434bb4f23d" + "CVE-2019-9506": { + "cmt_msg": "Bluetooth: Fix faulty expression for minimum encryption key size check" }, - "CVE-2017-5549": { - "cmt_msg": "USB: serial: kl5kusb105: fix line-state error handling", - "cmt_id": "59021c058a0bd2af81d1e8116995d7119be15145" + "CVE-2019-9500": { + "cmt_msg": "brcmfmac: assure SSID length from firmware is limited" }, - "CVE-2017-5551": { - "cmt_msg": "tmpfs: clear S_ISGID when setting posix ACLs", - "cmt_id": "b35e1587153b27e12747137ce7a0df0eb921cd85" + "CVE-2019-9503": { + "cmt_msg": "brcmfmac: add subtype check for event handling in data path" }, - "CVE-2017-2583": { - "cmt_msg": "KVM: x86: fix emulation of \"MOV SS, null selector\"", - "cmt_id": "448ec74e72bf4c5952e3d369720a862da99c0895" + "CVE-2022-0480": { + "cmt_msg": "memcg: enable accounting for file lock caches" }, - "CVE-2017-2584": { - "cmt_msg": "KVM: x86: Introduce segmented_write_std", - "cmt_id": "8be074a1f62ff51ffdf5b4634327dee351a5c2c2" - } - }, - "3.16.42": { - "CVE-2017-6353": { - "cmt_msg": "sctp: deny peeloff operation on asocs with threads sleeping on it", - "cmt_id": "ae722d6df3efc7a2df272644d82639f2679042ed" + "CVE-2018-10124": { + "cmt_msg": "kernel/signal.c: avoid undefined behaviour in kill_something_info" }, - "CVE-2017-2636": { - "cmt_msg": "tty: n_hdlc: get rid of racy n_hdlc.tbuf", - "cmt_id": "2e523bd949e3bc43cf61cc8a690350fa778e3f88" + "CVE-2022-0487": { + "cmt_msg": "moxart: fix potential use-after-free on remove path" }, - "CVE-2017-7273": { - "cmt_msg": "HID: hid-cypress: validate length of report", - "cmt_id": "60a990276a03f9a11d86017b1217f3698443c47b" + "CVE-2022-23825": { + "cmt_msg": "" }, - "CVE-2017-5669": { - "cmt_msg": "ipc/shm: Fix shmat mmap nil-page protection", - "cmt_id": "13508cb3bf17a73b91957e7070112b710bdfadc2" + "CVE-2021-47112": { + "cmt_msg": "x86/kvm: Teardown PV features on boot CPU as well" }, - "CVE-2017-6348": { - "cmt_msg": "irda: Fix lockdep annotations in hashbin_delete().", - "cmt_id": "55429dd9c16006c5f2edc53c25a3594d299fbf98" + "CVE-2021-47113": { + "cmt_msg": "btrfs: abort in rename_exchange if we fail to insert the second ref" }, - "CVE-2017-5986": { - "cmt_msg": "sctp: avoid BUG_ON on sctp_wait_for_sndbuf", - "cmt_id": "2ad78d37e15d7adba80deb103068faf6d88f95ac" + "CVE-2021-47110": { + "cmt_msg": "x86/kvm: Disable kvmclock on all CPUs on shutdown" }, - "CVE-2017-6345": { - "cmt_msg": "net/llc: avoid BUG_ON() in skb_orphan()", - "cmt_id": "8e822a0f8b3b8d2907ae7fba62258562b7ef800c" + "CVE-2021-47116": { + "cmt_msg": "ext4: fix memory leak in ext4_mb_init_backend on error path." }, - "CVE-2017-6346": { - "cmt_msg": "packet: fix races in fanout_add()", - "cmt_id": "bf7916239a591920427b0ee8022c222eeccba840" + "CVE-2021-47117": { + "cmt_msg": "ext4: fix bug on in ext4_es_cache_extent as ext4_split_extent_at failed" }, - "CVE-2017-2596": { - "cmt_msg": "kvm: fix page struct leak in handle_vmon", - "cmt_id": "591fc80b6369a886a1d21cacf11f91b455781df3" - } - }, - "3.16.43": { - "CVE-2016-10044": { - "cmt_msg": "aio: mark AIO pseudo-fs noexec", - "cmt_id": "880366a6e2ef182c37b7c7317dc6d449f625b97d" - } - }, - "3.16.44": { - "CVE-2017-7294": { - "cmt_msg": "drm/vmwgfx: fix integer overflow in vmw_surface_define_ioctl()", - "cmt_id": "629655f798b92fd309fdde494a3cfb8a37f807ad" + "CVE-2021-47114": { + "cmt_msg": "ocfs2: fix data corruption by fallocate" }, - "CVE-2017-8064": { - "cmt_msg": "dvb-usb-v2: avoid use-after-free", - "cmt_id": "522182342410708c54eb2b33ff36e85f0b045a6d" + "CVE-2021-47118": { + "cmt_msg": "pid: take a reference when initializing `cad_pid`" }, - "CVE-2017-7308": { - "cmt_msg": "net/packet: fix overflow in check for priv area size", - "cmt_id": "a481ab4edd87bc2dc6f1fa9029866dd69c86fc5c" + "CVE-2021-46970": { + "cmt_msg": "bus: mhi: pci_generic: Remove WQ_MEM_RECLAIM flag from state workqueue" }, - "CVE-2017-8890": { - "cmt_msg": "dccp/tcp: do not inherit mc_list from parent", - "cmt_id": "e4d8daa3b0d195c8aead116dd70aad8124be60c3" + "CVE-2019-10207": { + "cmt_msg": "Bluetooth: hci_uart: check for missing tty operations" }, - "CVE-2017-7472": { - "cmt_msg": "KEYS: fix keyctl_set_reqkey_keyring() to not leak thread keyrings", - "cmt_id": "f7ce1014bc5e4bb42d6b9f5afb308f59534067ea" + "CVE-2023-0459": { + "cmt_msg": "uaccess: Add speculation barrier to copy_from_user()" }, - "CVE-2017-7895": { - "cmt_msg": "nfsd: stricter decoding of write-like NFSv2/v3 ops", - "cmt_id": "bb0ea8af0b69259f5ea1d2fcff52948c98129c5e" + "CVE-2023-0458": { + "cmt_msg": "prlimit: do_prlimit needs to have a speculation check" }, - "CVE-2017-7184": { - "cmt_msg": "xfrm_user: validate XFRM_MSG_NEWAE XFRMA_REPLAY_ESN_VAL replay_window", - "cmt_id": "811f5600db1a0a9c4f1abad5017e09f43d7088f3" + "CVE-2017-8924": { + "cmt_msg": "USB: serial: io_ti: fix information leak in completion handler" }, - "CVE-2017-7487": { - "cmt_msg": "ipx: call ipxitf_put() in ioctl error path", - "cmt_id": "c64988b55a19fc5c85f85c433976d6e5210f54dc" + "CVE-2017-8925": { + "cmt_msg": "USB: serial: omninet: fix reference leaks at open" }, - "CVE-2017-9242": { - "cmt_msg": "ipv6: fix out of bound writes in __ip6_append_data()", - "cmt_id": "55c51263ff43e3bf5deb1425f4221696f94db1be" + "CVE-2021-30002": { + "cmt_msg": "media: v4l: ioctl: Fix memory leak in video_usercopy" }, - "CVE-2017-0605": { - "cmt_msg": "tracing: Use strlcpy() instead of strcpy() in __trace_find_cmdline()", - "cmt_id": "a1141b19b23a0605d46f3fab63fd2d76207096c4" + "CVE-2021-0941": { + "cmt_msg": "bpf: Remove MTU check in __bpf_skb_max_len" }, - "CVE-2017-7645": { - "cmt_msg": "nfsd: check for oversized NFSv2/v3 arguments", - "cmt_id": "1d4ab03084d4bace93b1573c57a309e954d05c09" + "CVE-2017-7294": { + "cmt_msg": "drm/vmwgfx: fix integer overflow in vmw_surface_define_ioctl()" }, - "CVE-2017-7261": { - "cmt_msg": "drm/vmwgfx: NULL pointer dereference in vmw_surface_define_ioctl()", - "cmt_id": "61cabe967321767052498032178d56a1ea03a7bc" + "CVE-2020-15802": { + "cmt_msg": "" }, - "CVE-2017-9077": { - "cmt_msg": "ipv6/dccp: do not inherit ipv6_mc_list from parent", - "cmt_id": "53d48f98b800059504da76d12bf0074581aa0fe2" + "CVE-2022-3636": { + "cmt_msg": "net: ethernet: mtk_eth_soc: use after free in __mtk_ppe_check_skb()" }, - "CVE-2017-2671": { - "cmt_msg": "ping: implement proper locking", - "cmt_id": "c3f18d2a809b563ef078130ab3758899625e4cfb" + "CVE-2022-3635": { + "cmt_msg": "atm: idt77252: fix use-after-free bugs caused by tst_timer" }, - "CVE-2017-9075": { - "cmt_msg": "sctp: do not inherit ipv6_{mc|ac|fl}_list from parent", - "cmt_id": "60e7579f4b71e2e8b252d2f1b3ef5ffb3b971a4e" + "CVE-2021-28715": { + "cmt_msg": "xen/netback: don't queue unlimited number of packages" }, - "CVE-2017-9074": { - "cmt_msg": "ipv6: Prevent overrun when parsing v6 header options", - "cmt_id": "3bff722de601acaf593a1ade13fbbee54b688e9b" + "CVE-2022-34918": { + "cmt_msg": "netfilter: nf_tables: stricter validation of element data" }, - "CVE-2017-9076": { - "cmt_msg": "ipv6/dccp: do not inherit ipv6_mc_list from parent", - "cmt_id": "53d48f98b800059504da76d12bf0074581aa0fe2" + "CVE-2016-10905": { + "cmt_msg": "GFS2: don't set rgrp gl_object until it's inserted into rgrp tree" }, - "CVE-2016-2188": { - "cmt_msg": "USB: iowarrior: fix NULL-deref at probe", - "cmt_id": "d2d603cf8fd51f0da5e4bc809d17824faa7630f7" + "CVE-2021-47028": { + "cmt_msg": "mt76: mt7915: fix txrate reporting" }, - "CVE-2017-7618": { - "cmt_msg": "crypto: ahash - Fix EINPROGRESS notification callback", - "cmt_id": "13af702256f8b7d9bb51b86c982fe08e96c589c8" + "CVE-2019-19966": { + "cmt_msg": "media: cpia2: Fix use-after-free in cpia2_exit" }, - "CVE-2017-8924": { - "cmt_msg": "USB: serial: io_ti: fix information leak in completion handler", - "cmt_id": "f7287278eea268132ab71b30a0425ccf3a13a323" + "CVE-2017-18261": { + "cmt_msg": "clocksource/drivers/arm_arch_timer: Avoid infinite recursion when ftrace is enabled" }, - "CVE-2017-8925": { - "cmt_msg": "USB: serial: omninet: fix reference leaks at open", - "cmt_id": "e766215595e90b7a307cc7c7054ff43e96340731" + "CVE-2018-5814": { + "cmt_msg": "usbip: usbip_host: fix NULL-ptr deref and use-after-free errors" }, - "CVE-2016-9604": { - "cmt_msg": "KEYS: Disallow keyrings beginning with '.' to be joined as session keyrings", - "cmt_id": "41bd08bfce7c33e0d383e7678e6d6c7e8e041524" + "CVE-2021-43389": { + "cmt_msg": "isdn: cpai: check ctr->cnr to avoid array index out of bound" }, - "CVE-2017-7616": { - "cmt_msg": "mm/mempolicy.c: fix error handling in set_mempolicy and mbind.", - "cmt_id": "4474624a1a496e4dc93a2cd49ea915d9c90d80e9" - } - }, - "3.16.45": { - "CVE-2017-7482": { - "cmt_msg": "rxrpc: Fix several cases where a padded len isn't checked in ticket decode", - "cmt_id": "e3378be9d9cbe1f77ecfc03b4350991be58f3f82" + "CVE-2023-1074": { + "cmt_msg": "sctp: fail if no bound addresses can be used for a given scope" }, - "CVE-2014-9940": { - "cmt_msg": "regulator: core: Fix regualtor_ena_gpio_free not to access pin after freeing", - "cmt_id": "702f4dd27ccf3bae7915ef1f8790db3af435d211" + "CVE-2023-1077": { + "cmt_msg": "sched/rt: pick_next_rt_entity(): check list_entry" }, - "CVE-2017-7346": { - "cmt_msg": "drm/vmwgfx: limit the number of mip levels in vmw_gb_surface_define_ioctl()", - "cmt_id": "7943d19453aa1a1acf93bdb2812e0bef970ec23c" + "CVE-2023-40283": { + "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb" }, - "CVE-2017-1000379": { - "cmt_msg": "mm: larger stack guard gap, between vmas", - "cmt_id": "978b8aa1646d4e023edd121c7f1b8f938ccb813d" + "CVE-2023-1073": { + "cmt_msg": "HID: check empty report_list in hid_validate_values()" }, - "CVE-2017-1000364": { - "cmt_msg": "mm: larger stack guard gap, between vmas", - "cmt_id": "978b8aa1646d4e023edd121c7f1b8f938ccb813d" + "CVE-2018-13093": { + "cmt_msg": "xfs: validate cached inodes are free when allocated" }, - "CVE-2017-7518": { - "cmt_msg": "KVM: x86: fix singlestepping over syscall", - "cmt_id": "24ee2a286de7ac680ad4b2423c2dcee68444e567" - } - }, - "3.16.46": { - "CVE-2017-6951": { - "cmt_msg": "KEYS: Remove key_type::match in favour of overriding default by match_preparse", - "cmt_id": "89a5900ac15faa45244b42423ff4febd6d35520b" + "CVE-2018-13096": { + "cmt_msg": "f2fs: fix to do sanity check with node footer and iblocks" }, - "CVE-2017-10911": { - "cmt_msg": "xen-blkback: don't leak stack data via response ring", - "cmt_id": "d2cc7a18d6342a7025afd16aac6753ad02d788e5" + "CVE-2018-13097": { + "cmt_msg": "f2fs: fix to do sanity check with user_block_count" }, - "CVE-2017-1000380": { - "cmt_msg": "ALSA: timer: Fix race between read and ioctl", - "cmt_id": "334e9205dd0c61ec83dfafac51b1947584179bf1" + "CVE-2018-13094": { + "cmt_msg": "xfs: don't call xfs_da_shrink_inode with NULL bp" }, - "CVE-2017-9605": { - "cmt_msg": "drm/vmwgfx: Make sure backup_handle is always valid", - "cmt_id": "26823129d84c6ca3e12b17af7a8e78c579b3bca5" + "CVE-2018-13095": { + "cmt_msg": "xfs: More robust inode extent count validation" }, - "CVE-2017-2647": { - "cmt_msg": "KEYS: Remove key_type::match in favour of overriding default by match_preparse", - "cmt_id": "89a5900ac15faa45244b42423ff4febd6d35520b" + "CVE-2018-13098": { + "cmt_msg": "f2fs: fix to do sanity check with extra_attr feature" }, - "CVE-2017-7889": { - "cmt_msg": "mm: Tighten x86 /dev/mem with zeroing reads", - "cmt_id": "3cbd86d25eeb61e57cb3367fe302c271b0c70fb2" + "CVE-2018-13099": { + "cmt_msg": "f2fs: fix to do sanity check with reserved blkaddr of inline inode" }, - "CVE-2017-1000365": { - "cmt_msg": "fs/exec.c: account for argv/envp pointers", - "cmt_id": "d7575b387f81c1a92e32c25dcb6a0e14458ae66c" + "CVE-2019-11884": { + "cmt_msg": "Bluetooth: hidp: fix buffer overflow" }, - "CVE-2017-1000363": { - "cmt_msg": "char: lp: fix possible integer overflow in lp_setup()", - "cmt_id": "0a56616d2ca35da4397c48b95e71e35a26e67be5" - } - }, - "3.16.47": { - "CVE-2017-1000112": { - "cmt_msg": "udp: consistently apply ufo or fragmentation", - "cmt_id": "08676246d893e3a42a541a2ef1291f2ea62c5b06" + "CVE-2019-18683": { + "cmt_msg": "media: vivid: Fix wrong locking that causes race conditions on streaming stop" }, - "CVE-2017-1000111": { - "cmt_msg": "packet: fix tp_reserve race in packet_set_ring", - "cmt_id": "ec26c86f4d9fe22ceb9b997aa9134f684b756282" + "CVE-2019-18680": { + "cmt_msg": "unknown" }, - "CVE-2017-7533": { - "cmt_msg": "dentry name snapshots", - "cmt_id": "2cbc76ab0654c9759e390899584c5f788e21dc5a" + "CVE-2021-45868": { + "cmt_msg": "quota: check block number when reading the block in quota file" }, - "CVE-2017-11176": { - "cmt_msg": "mqueue: fix a use-after-free in sys_mq_notify()", - "cmt_id": "b6ec053486fa50c169eb377e53c72b2a481fbd00" + "CVE-2022-20158": { + "cmt_msg": "net/packet: fix slab-out-of-bounds access in packet_recvmsg()" }, - "CVE-2017-10661": { - "cmt_msg": "timerfd: Protect the might cancel mechanism proper", - "cmt_id": "e7467c79d7dfa504587f9bc95bf180d92715c07d" + "CVE-2020-0404": { + "cmt_msg": "media: uvcvideo: Avoid cyclic entity chains due to malformed USB descriptors" }, - "CVE-2017-1000": { - "cmt_msg": "udp: consistently apply ufo or fragmentation", - "cmt_id": "08676246d893e3a42a541a2ef1291f2ea62c5b06" + "CVE-2022-39188": { + "cmt_msg": "mmu_gather: Force tlb-flush VM_PFNMAP vmas" }, - "CVE-2017-7542": { - "cmt_msg": "ipv6: avoid overflow of offset in ip6_find_1stfragopt", - "cmt_id": "276cb60b67f5c99bf278b5371c6643e4af63f75d" - } - }, - "3.16.48": { - "CVE-2017-11600": { - "cmt_msg": "xfrm: policy: check policy direction value", - "cmt_id": "60166dc935e2af97cae9432c0247856e2deb0b3f" + "CVE-2020-27067": { + "cmt_msg": "l2tp: fix l2tp_eth module loading" }, - "CVE-2017-14106": { - "cmt_msg": "tcp: initialize rcv_mss to TCP_MIN_MSS instead of 0", - "cmt_id": "32cb2d4a59d0512aa825e7f0352f66063482cc07" + "CVE-2020-27066": { + "cmt_msg": "xfrm: policy: Fix doulbe free in xfrm_policy_timer" }, - "CVE-2017-14140": { - "cmt_msg": "Sanitize 'move_pages()' permission checks", - "cmt_id": "b5a16892623afec2d3212b963dd688b258002b4b" + "CVE-2016-5696": { + "cmt_msg": "tcp: make challenge acks less predictable" }, - "CVE-2017-15274": { - "cmt_msg": "KEYS: fix dereferencing NULL payload with nonzero length", - "cmt_id": "400773b3c6b7faffafc6adedecdd4882fc677d64" + "CVE-2017-5986": { + "cmt_msg": "sctp: avoid BUG_ON on sctp_wait_for_sndbuf" }, - "CVE-2017-18360": { - "cmt_msg": "USB: serial: io_ti: fix div-by-zero in set_termios", - "cmt_id": "5626cf5977b54cda89f620070dc85c96f01ef359" + "CVE-2024-23307": { + "cmt_msg": "md/raid5: fix atomicity violation in raid5_cache_count" }, - "CVE-2017-12134": { - "cmt_msg": "xen: fix bio vec merging", - "cmt_id": "f664b0113d2bb8d4bcdf5d03b72eb4c433ded452" + "CVE-2017-0861": { + "cmt_msg": "ALSA: pcm: prevent UAF in snd_pcm_info" }, - "CVE-2017-18221": { - "cmt_msg": "mlock: fix mlock count can not decrease in race condition", - "cmt_id": "d30435bdee3ce282537814d96138a22879522c2f" + "CVE-2020-15393": { + "cmt_msg": "usb: usbtest: fix missing kfree(dev->buf) in usbtest_disconnect" }, - "CVE-2017-7541": { - "cmt_msg": "brcmfmac: fix possible buffer overflow in brcmf_cfg80211_mgmt_tx()", - "cmt_id": "c63048a29cf222bcd75823b4ca898e2aa6311f8f" - } - }, - "3.16.49": { - "CVE-2017-11089": { - "cmt_msg": "cfg80211: Define nla_policy for NL80211_ATTR_LOCAL_MESH_POWER_MODE", - "cmt_id": "2a5d2a519162f5c52121c1053439535f2de705af" + "CVE-2021-3564": { + "cmt_msg": "Bluetooth: fix the erroneous flush_work() order" }, - "CVE-2017-14156": { - "cmt_msg": "video: fbdev: aty: do not leak uninitialized padding in clk to userspace", - "cmt_id": "093d5ecdeb49c6ad4ea4c1fb39c481e9bcfc1871" + "CVE-2017-13080": { + "cmt_msg": "mac80211: accept key reinstall without changing anything" }, - "CVE-2017-12153": { - "cmt_msg": "nl80211: check for the required netlink attributes presence", - "cmt_id": "ed2305f2eba403d41dc4213746f60d47273980f6" + "CVE-2018-12127": { + "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" }, - "CVE-2017-8831": { - "cmt_msg": "saa7164: fix double fetch PCIe access condition", - "cmt_id": "f6c711a2f630b15479466f5b25b25850b04a7106" + "CVE-2018-12126": { + "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" }, - "CVE-2017-14340": { - "cmt_msg": "xfs: XFS_IS_REALTIME_INODE() should be false if no rt device present", - "cmt_id": "1e48f7b93c3a8f1d7bb136ab7fa61e763893a6fd" + "CVE-2021-28964": { + "cmt_msg": "btrfs: fix race when cloning extent buffer during rewind of an old root" }, - "CVE-2017-12154": { - "cmt_msg": "kvm: nVMX: Don't allow L2 to access the hardware CR8", - "cmt_id": "423a7a81efb8da25dbbcfe7a33bd8bfdce34150b" + "CVE-2019-13631": { + "cmt_msg": "Input: gtco - bounds check collection indent level" }, - "CVE-2017-1000251": { - "cmt_msg": "Bluetooth: Properly check L2CAP config option output buffer length", - "cmt_id": "8a7b081660857a80c3efc463b3da790c4fa0c801" + "CVE-2018-12233": { + "cmt_msg": "jfs: Fix inconsistency between memory allocation and ea_buf->max_size" }, - "CVE-2017-14489": { - "cmt_msg": "scsi: scsi_transport_iscsi: fix the issue that iscsi_if_rx doesn't parse nlmsg properly", - "cmt_id": "a1b438ad8590add8f6b0b679171bf5e0d45e2da1" + "CVE-2018-9465": { + "cmt_msg": "binder: fix proc->files use-after-free" }, - "CVE-2017-18079": { - "cmt_msg": "Input: i8042 - fix crash at boot time", - "cmt_id": "b8e534a556b1a6a6eca8fcdca79725f0dea21555" - } - }, - "3.16.50": { - "CVE-2017-0786": { - "cmt_msg": "brcmfmac: add length check in brcmf_cfg80211_escan_handler()", - "cmt_id": "7df83adfc5d38bf960ef7ff0e4cb1c2c92715f63" + "CVE-2020-8649": { + "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region" }, - "CVE-2017-16527": { - "cmt_msg": "ALSA: usb-audio: Kill stray URB at exiting", - "cmt_id": "6a6488e8d231fa1fca2408e59e819f64fecb45f3" + "CVE-2020-8648": { + "cmt_msg": "vt: selection, close sel_buffer race" }, - "CVE-2017-13080": { - "cmt_msg": "mac80211: accept key reinstall without changing anything", - "cmt_id": "a0a8a11d1630cd648dc1ce86da620b4e240e0315" + "CVE-2020-8647": { + "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region" }, - "CVE-2017-15649": { - "cmt_msg": "packet: in packet_do_bind, test fanout with bind_lock held", - "cmt_id": "70abad3796f52ed593d5d31bf9f0b5410a522548" + "CVE-2019-0155": { + "cmt_msg": "drm/i915: Rename gen7 cmdparser tables" }, - "CVE-2017-16531": { - "cmt_msg": "USB: fix out-of-bounds in usb_set_configuration", - "cmt_id": "cc81fff9d62e32a27b1f16dab1a6172935792ab7" + "CVE-2019-0154": { + "cmt_msg": "drm/i915: Lower RM timeout to avoid DSI hard hangs" }, - "CVE-2017-16530": { - "cmt_msg": "USB: uas: fix bug in handling of alternate settings", - "cmt_id": "c0003557dbdec4ec1976ea7be9534abef758297b" + "CVE-2023-35827": { + "cmt_msg": "ravb: Fix use-after-free issue in ravb_tx_timeout_work()" }, - "CVE-2017-16533": { - "cmt_msg": "HID: usbhid: fix out-of-bounds bug", - "cmt_id": "8d675aa967d3927ac100f7af48f2a2af8a041d2d" + "CVE-2023-52585": { + "cmt_msg": "drm/amdgpu: Fix possible NULL dereference in amdgpu_ras_query_error_status_helper()" }, - "CVE-2017-16532": { - "cmt_msg": "usb: usbtest: fix NULL pointer dereference", - "cmt_id": "824f2a5ccdd9ddfb53418c13f493aa46ae0c2c00" + "CVE-2023-52584": { + "cmt_msg": "spmi: mediatek: Fix UAF on device remove" }, - "CVE-2017-11473": { - "cmt_msg": "x86/acpi: Prevent out of bound access caused by broken ACPI tables", - "cmt_id": "52b12e5aeae7f71567348776d4f7f12b83788d15" + "CVE-2023-52587": { + "cmt_msg": "IB/ipoib: Fix mcast list locking" }, - "CVE-2017-16535": { - "cmt_msg": "USB: core: fix out-of-bounds access bug in usb_get_bos_descriptor()", - "cmt_id": "6514189e83d470af2f35735038c1b096410ab98d" + "CVE-2023-52586": { + "cmt_msg": "drm/msm/dpu: Add mutex lock in control vblank irq" }, - "CVE-2017-15265": { - "cmt_msg": "ALSA: seq: Fix use-after-free at creating a port", - "cmt_id": "853c65fe1db498563bdeea5b7e733441db34d330" + "CVE-2023-52583": { + "cmt_msg": "ceph: fix deadlock or deadcode of misusing dget()" }, - "CVE-2017-15299": { - "cmt_msg": "KEYS: don't let add_key() update an uninstantiated key", - "cmt_id": "24832178de3ab7b6fb42f2730d8d675e3d30adb2" + "CVE-2023-52589": { + "cmt_msg": "media: rkisp1: Fix IRQ disable race issue" }, - "CVE-2018-10675": { - "cmt_msg": "mm/mempolicy: fix use after free when calling get_mempolicy", - "cmt_id": "7bd0cdad74409e093556f200b788f45cdb2064ee" + "CVE-2023-52588": { + "cmt_msg": "f2fs: fix to tag gcing flag on page during block migration" }, - "CVE-2017-16529": { - "cmt_msg": "ALSA: usb-audio: Check out-of-bounds access by corrupted buffer descriptor", - "cmt_id": "9992800cfd0b367369407d62a4c228c454c5d0e3" + "CVE-2023-52340": { + "cmt_msg": "ipv6: remove max_size check inline with ipv4" }, - "CVE-2017-12193": { - "cmt_msg": "assoc_array: Fix a buggy node-splitting case", - "cmt_id": "c42ab77ec3454fc0d9710bd6734e241e4202d8b3" + "CVE-2021-46969": { + "cmt_msg": "bus: mhi: core: Fix invalid error returning in mhi_queue" }, - "CVE-2017-12192": { - "cmt_msg": "KEYS: prevent KEYCTL_READ on negative key", - "cmt_id": "3eab231a5b5382067ab3ead172780144f9c0f721" + "CVE-2020-16120": { + "cmt_msg": "ovl: switch to mounter creds in readdir" }, - "CVE-2017-12190": { - "cmt_msg": "fix unbalanced page refcounting in bio_map_user_iov", - "cmt_id": "3c885aa3b459aabc5fa04251a5fdd88e29b1de70" - } - }, - "3.16.51": { - "CVE-2017-16537": { - "cmt_msg": "media: imon: Fix null-ptr-deref in imon_probe", - "cmt_id": "7f3ca02c7ed55f7d524fb5c06e2de36ab65f5e20" + "CVE-2019-17666": { + "cmt_msg": "rtlwifi: Fix potential overflow on P2P code" }, - "CVE-2017-16536": { - "cmt_msg": "cx231xx-cards: fix NULL-deref on missing association descriptor", - "cmt_id": "99a3c1bb0ed332c64cfcd53a84fea2468ab9e11e" + "CVE-2021-34693": { + "cmt_msg": "can: bcm: fix infoleak in struct bcm_msg_head" }, - "CVE-2018-9517": { - "cmt_msg": "l2tp: pass tunnel pointer to ->session_create()", - "cmt_id": "0b3ca265e81f5e1d9f7f66ad416cbabecca914cf" + "CVE-2020-11494": { + "cmt_msg": "slcan: Don't transmit uninitialized stack data in padding" }, - "CVE-2017-0627": { - "cmt_msg": "media: uvcvideo: Prevent heap overflow when accessing mapped controls", - "cmt_id": "a5f9c8992ea254dc7a80d24257083a666dd600f2" + "CVE-2024-26797": { + "cmt_msg": "drm/amd/display: Prevent potential buffer overflow in map_hw_resources" }, - "CVE-2017-16525": { - "cmt_msg": "USB: serial: console: fix use-after-free after failed setup", - "cmt_id": "96b62489bc4200803cb77a0ca69aa3d179c7e9f5" + "CVE-2024-26791": { + "cmt_msg": "btrfs: dev-replace: properly validate device names" }, - "CVE-2017-16643": { - "cmt_msg": "Input: gtco - fix potential out-of-bound access", - "cmt_id": "9d399eba105c6e311db9ec78ce62579ffc403c0d" + "CVE-2024-26793": { + "cmt_msg": "gtp: fix use-after-free and null-ptr-deref in gtp_newlink()" }, - "CVE-2017-16650": { - "cmt_msg": "net: qmi_wwan: fix divide by 0 on bad descriptors", - "cmt_id": "4a14bd934b40b1a9f7fe3e0546f9873bb55e5b61" + "CVE-2022-30594": { + "cmt_msg": "ptrace: Check PTRACE_O_SUSPEND_SECCOMP permission on PTRACE_SEIZE" }, - "CVE-2017-14051": { - "cmt_msg": "scsi: qla2xxx: Fix an integer overflow in sysfs code", - "cmt_id": "71ee8480093a46d245f61e2c2c5cfb0d5a6bc61d" + "CVE-2024-26798": { + "cmt_msg": "fbcon: always restore the old font data in fbcon_do_set_font()" }, - "CVE-2017-16649": { - "cmt_msg": "net: cdc_ether: fix divide by 0 on bad descriptors", - "cmt_id": "fac4f4657e16d3457963d4c8ee6a356103155141" + "CVE-2021-38204": { + "cmt_msg": "usb: max-3421: Prevent corruption of freed memory" }, - "CVE-2017-15115": { - "cmt_msg": "sctp: do not peel off an assoc from one netns to another one", - "cmt_id": "7adde0289baa8d51c2bd072d80cb82a278d24363" - } - }, - "3.16.52": { - "CVE-2017-16526": { - "cmt_msg": "uwb: properly check kthread_run return value", - "cmt_id": "8a088612bc35033159077fa7bee6f3761d712725" + "CVE-2021-38205": { + "cmt_msg": "net: xilinx_emaclite: Do not print real IOMEM pointer" }, - "CVE-2020-14353": { - "cmt_msg": "KEYS: prevent creating a different user's keyrings", - "cmt_id": "9d62d5d2f4130bd7c6986cfde8becb4fa0cf4f7f" + "CVE-2020-0255": { + "cmt_msg": "selinux: properly handle multiple messages in selinux_netlink_send()" }, - "CVE-2020-27067": { - "cmt_msg": "l2tp: fix l2tp_eth module loading", - "cmt_id": "84f9cf6ecccd86254bc6e2cfac0050543269852a" + "CVE-2016-6130": { + "cmt_msg": "s390/sclp_ctl: fix potential information leak with /dev/sclp" }, - "CVE-2017-17741": { - "cmt_msg": "KVM: Fix stack-out-of-bounds read in write_mmio", - "cmt_id": "7cc7f67418296f829a284b6e2d4c62d937f15faa" + "CVE-2023-35001": { + "cmt_msg": "netfilter: nf_tables: prevent OOB access in nft_byteorder_eval" }, - "CVE-2018-7191": { - "cmt_msg": "tun: call dev_get_valid_name() before register_netdevice()", - "cmt_id": "ff31768dd6814abefb7724fa6dc0976b33edce0e" + "CVE-2021-38208": { + "cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect" }, - "CVE-2017-18270": { - "cmt_msg": "KEYS: prevent creating a different user's keyrings", - "cmt_id": "9d62d5d2f4130bd7c6986cfde8becb4fa0cf4f7f" + "CVE-2017-18232": { + "cmt_msg": "scsi: libsas: direct call probe and destruct" }, - "CVE-2017-15868": { - "cmt_msg": "Bluetooth: bnep: bnep_add_connection() should verify that it's dealing with l2cap socket", - "cmt_id": "77369e6ee42b28a529932f5f7a5522de73310d21" + "CVE-2022-0168": { + "cmt_msg": "cifs: fix NULL ptr dereference in smb2_ioctl_query_info()" }, - "CVE-2017-8824": { - "cmt_msg": "dccp: CVE-2017-8824: use-after-free in DCCP code", - "cmt_id": "37e923d49eb8219cab4e49237d026755276484a0" + "CVE-2020-26556": { + "cmt_msg": "" }, - "CVE-2017-1000407": { - "cmt_msg": "KVM: VMX: remove I/O port 0x80 bypass on Intel hosts", - "cmt_id": "02b1dd5472cee5286ab1a9eb916c036ab2f86b78" + "CVE-2018-9518": { + "cmt_msg": "NFC: llcp: Limit size of SDP URI" }, - "CVE-2017-17558": { - "cmt_msg": "USB: core: prevent malicious bNumInterfaces overflow", - "cmt_id": "072bee30c5d314af02c211112697ab0931ab5039" + "CVE-2024-26778": { + "cmt_msg": "fbdev: savage: Error out if pixclock equals zero" }, - "CVE-2017-17806": { - "cmt_msg": "crypto: hmac - require that the underlying hash algorithm is unkeyed", - "cmt_id": "150fbc1221d1352db7dc830074586e0ee28e2a15" + "CVE-2020-26555": { + "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical" }, - "CVE-2017-16645": { - "cmt_msg": "Input: ims-psu - check if CDC union descriptor is sane", - "cmt_id": "eb791765b62b2a615fb692c3394d86f370d72681" + "CVE-2024-26776": { + "cmt_msg": "spi: hisi-sfc-v3xx: Return IRQ_NONE if no interrupts were detected" }, - "CVE-2015-8709": { - "cmt_msg": "mm: Add a user_ns owner to mm_struct and fix ptrace permission checks", - "cmt_id": "d5b3e840dbf6dd2c0f30b5982b6f5ecd49e46b12" + "CVE-2024-26777": { + "cmt_msg": "fbdev: sis: Error out if pixclock equals zero" }, - "CVE-2017-17448": { - "cmt_msg": "netfilter: nfnetlink_cthelper: Add missing permission checks", - "cmt_id": "fad6474d43e985338e4c2b3bb1a7668cca1f041a" + "CVE-2020-26558": { + "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical" }, - "CVE-2017-17449": { - "cmt_msg": "netlink: Add netns check on taps", - "cmt_id": "df524750e2d1ead01cceed5ffc0b62166c7630dd" + "CVE-2023-3390": { + "cmt_msg": "netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE" }, - "CVE-2017-16939": { - "cmt_msg": "ipsec: Fix aborted xfrm policy dump crash", - "cmt_id": "a7d7387cc169e912055faca1b0f123e5bce78f53" + "CVE-2023-3397": { + "cmt_msg": "" }, - "CVE-2017-17807": { - "cmt_msg": "KEYS: add missing permission check for request_key() destination", - "cmt_id": "d3dc1ffed4044437339a22acebebaf1c5bc141ee" + "CVE-2024-26773": { + "cmt_msg": "ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found()" }, - "CVE-2017-17805": { - "cmt_msg": "crypto: salsa20 - fix blkcipher_walk API usage", - "cmt_id": "9517d9d0c1d62515d33c0405b5a86e88647012a2" + "CVE-2024-26770": { + "cmt_msg": "HID: nvidia-shield: Add missing null pointer checks to LED initialization" }, - "CVE-2017-17450": { - "cmt_msg": "netfilter: xt_osf: Add missing permission checks", - "cmt_id": "06b6060a61b14a747b0f29890fcb20ece18a0944" - } - }, - "3.16.54": { - "CVE-2017-18203": { - "cmt_msg": "dm: fix race between dm_get_from_kobject() and __dm_destroy()", - "cmt_id": "e9546d2629dd45650d9b9035198d7e8ce907e7de" + "CVE-2024-26771": { + "cmt_msg": "dmaengine: ti: edma: Add some null pointer checks to the edma_probe" }, - "CVE-2021-0447": { - "cmt_msg": "l2tp: protect sock pointer of struct pppol2tp_session with RCU", - "cmt_id": "9bcc0508576b2d50efd958f2ea1c5906749c2c89" + "CVE-2023-28746": { + "cmt_msg": "x86/mmio: Disable KVM mitigation when X86_FEATURE_CLEAR_CPU_BUF is set" }, - "CVE-2018-1000004": { - "cmt_msg": "ALSA: seq: Make ioctls race-free", - "cmt_id": "02cbce8576a31df8fca54aaec91ee081076bd79d" + "CVE-2017-5754": { + "cmt_msg": "x86/cpufeatures: Add Intel feature bits for Speculation Control" }, - "CVE-2017-1000410": { - "cmt_msg": "Bluetooth: Prevent stack info leak from the EFS element.", - "cmt_id": "bf101edbb0ad37a6cd970cb98a9f1ae950b719f1" + "CVE-2021-47119": { + "cmt_msg": "ext4: fix memory leak in ext4_fill_super" }, - "CVE-2017-16913": { - "cmt_msg": "usbip: fix stub_rx: harden CMD_SUBMIT path to handle malicious input", - "cmt_id": "61aa1e63c06961e77b6f63823e05af637c1e3acd" + "CVE-2016-10200": { + "cmt_msg": "l2tp: fix racy SOCK_ZAPPED flag check in l2tp_ip{,6}_bind()" }, - "CVE-2017-16912": { - "cmt_msg": "usbip: fix stub_rx: get_pipe() to validate endpoint number", - "cmt_id": "65060ba29cc54b3d5f76ceacf3c820f2087c35e6" + "CVE-2017-5753": { + "cmt_msg": "x86/cpufeatures: Add X86_BUG_SPECTRE_V[12]" }, - "CVE-2017-16911": { - "cmt_msg": "usbip: prevent vhci_hcd driver from leaking a socket pointer address", - "cmt_id": "789998181fc4fe5d48d1b95d796e8b62df17c1d9" + "CVE-2024-1086": { + "cmt_msg": "netfilter: nf_tables: reject QUEUE/DROP verdict parameters" }, - "CVE-2018-5333": { - "cmt_msg": "RDS: null pointer dereference in rds_atomic_free_op", - "cmt_id": "c8b61a6ecfb90c7fb4f824df2448b923954de170" + "CVE-2016-10208": { + "cmt_msg": "ext4: validate s_first_meta_bg at mount time" }, - "CVE-2017-16914": { - "cmt_msg": "usbip: fix stub_send_ret_submit() vulnerability to null transfer_buffer", - "cmt_id": "49afc374a23c093faabd155e332c927bf0e69af0" + "CVE-2022-0382": { + "cmt_msg": "net ticp:fix a kernel-infoleak in __tipc_sendmsg()" }, - "CVE-2017-13216": { - "cmt_msg": "staging: android: ashmem: fix a race condition in ASHMEM_SET_SIZE ioctl", - "cmt_id": "63aa20e4f4760249339c7771bd7e4a01d82a95ad" + "CVE-2016-4440": { + "cmt_msg": "kvm:vmx: more complete state update on APICv on/off" }, - "CVE-2017-18017": { - "cmt_msg": "netfilter: xt_TCPMSS: add more sanity tests on tcph->doff", - "cmt_id": "d2e769238e6079e1e16c856cc352b0061a111f1d" + "CVE-2019-15222": { + "cmt_msg": "ALSA: usb-audio: Fix gpf in snd_usb_pipe_sanity_check" }, - "CVE-2018-5332": { - "cmt_msg": "RDS: Heap OOB write in rds_message_alloc_sgs()", - "cmt_id": "a64a21f6de4faf41b74800275be0552f55e83699" - } - }, - "3.16.55": { - "CVE-2017-18595": { - "cmt_msg": "tracing: Fix possible double free on failure of allocating trace buffer", - "cmt_id": "dd520da215e1f8558206ddade1f55b239730bd4f" + "CVE-2019-15223": { + "cmt_msg": "ALSA: line6: Assure canceling delayed work at disconnection" }, - "CVE-2017-0861": { - "cmt_msg": "ALSA: pcm: prevent UAF in snd_pcm_info", - "cmt_id": "da7bce9e41266e17c98a997c154cb126a7ed8e98" + "CVE-2019-15220": { + "cmt_msg": "p54usb: Fix race between disconnect and firmware loading" }, - "CVE-2019-9454": { - "cmt_msg": "i2c: core-smbus: prevent stack corruption on read I2C_BLOCK_DATA", - "cmt_id": "4a6efb0107eb5cb91dc19efc0a518ee12793190e" + "CVE-2019-15221": { + "cmt_msg": "ALSA: line6: Fix write on zero-sized buffer" }, - "CVE-2018-6927": { - "cmt_msg": "futex: Prevent overflow by strengthen input validation", - "cmt_id": "762c02e688cd2e326dec50e030ad559a3c943192" + "CVE-2022-1016": { + "cmt_msg": "netfilter: nf_tables: initialize registers in nft_do_chain()" }, - "CVE-2018-7492": { - "cmt_msg": "rds: Fix NULL pointer dereference in __rds_rdma_map", - "cmt_id": "39961200584fe03d2915886ac49e7ec7a8b5a4ae" + "CVE-2022-1011": { + "cmt_msg": "fuse: fix pipe buffer lifetime for direct_io" }, - "CVE-2017-18551": { - "cmt_msg": "i2c: core-smbus: prevent stack corruption on read I2C_BLOCK_DATA", - "cmt_id": "4a6efb0107eb5cb91dc19efc0a518ee12793190e" + "CVE-2022-1012": { + "cmt_msg": "secure_seq: use the 64 bits of the siphash for port offset calculation" }, - "CVE-2018-18386": { - "cmt_msg": "n_tty: fix EXTPROC vs ICANON interaction with TIOCINQ (aka FIONREAD)", - "cmt_id": "7ed9e0c29f0dfae1f249d3d36142a6474ea77895" + "CVE-2023-52620": { + "cmt_msg": "netfilter: nf_tables: disallow timeout for anonymous sets" }, - "CVE-2018-5750": { - "cmt_msg": "ACPI: sbshc: remove raw pointer from printk() message", - "cmt_id": "0c2575631cae6894ed82e4883ecb6d097157a063" + "CVE-2023-52621": { + "cmt_msg": "bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers" }, - "CVE-2018-1000028": { - "cmt_msg": "nfsd: auth: Fix gid sorting when rootsquash enabled", - "cmt_id": "76a90eeac5d1935405d646f9c3cbf76be87936e5" + "CVE-2023-52622": { + "cmt_msg": "ext4: avoid online resizing failures due to oversized flex bg" }, - "CVE-2017-18344": { - "cmt_msg": "posix-timer: Properly check sigevent->sigev_notify", - "cmt_id": "115659c998ba0adf97d6c3e9706f618000fa90e2" + "CVE-2023-52623": { + "cmt_msg": "SUNRPC: Fix a suspicious RCU usage warning" }, - "CVE-2015-9016": { - "cmt_msg": "blk-mq: fix race between timeout and freeing request", - "cmt_id": "7acba7c0621efdfb09bb514500ba22f965aba68b" - } - }, - "3.16.57": { - "CVE-2018-20510": { - "cmt_msg": "binder: replace \"%p\" with \"%pK\"", - "cmt_id": "c2c37cd0a0f45dd883fc03b38b04a7f0a269a1ca" + "CVE-2023-52624": { + "cmt_msg": "drm/amd/display: Wake DMCUB before executing GPINT commands" }, - "CVE-2017-18216": { - "cmt_msg": "ocfs2: subsystem.su_mutex is required while accessing the item->ci_parent", - "cmt_id": "d9b4d618a22bf30a1c82dffc5c7cb3b1abda48dc" + "CVE-2023-52625": { + "cmt_msg": "drm/amd/display: Refactor DMCUB enter/exit idle interface" }, - "CVE-2018-9518": { - "cmt_msg": "NFC: llcp: Limit size of SDP URI", - "cmt_id": "3b3a343e2442a4fb2730967df4e2a29f0fa66c84" + "CVE-2023-52628": { + "cmt_msg": "netfilter: nftables: exthdr: fix 4-byte stack OOB write" }, - "CVE-2018-8897": { - "cmt_msg": "x86/entry/64: Don't use IST entry for #BP stack", - "cmt_id": "45dc1e88fb5a728c1f2186edafccf6581c9c99b8" + "CVE-2023-52629": { + "cmt_msg": "sh: push-switch: Reorder cleanup operations to avoid use-after-free bug" }, - "CVE-2018-1087": { - "cmt_msg": "kvm/x86: fix icebp instruction handling", - "cmt_id": "e6c4cf2c7cbd5fd81f9a323c30ee0e3e1d2cae4b" + "CVE-2016-9555": { + "cmt_msg": "sctp: validate chunk len before actually using it" }, - "CVE-2018-7757": { - "cmt_msg": "scsi: libsas: fix memory leak in sas_smp_get_phy_events()", - "cmt_id": "c1184c59b37ed607a1193fc4fde0ffda56844bd6" + "CVE-2022-0492": { + "cmt_msg": "cgroup-v1: Require capabilities to set release_agent" }, - "CVE-2017-5754": { - "cmt_msg": "x86/cpufeatures: Add Intel feature bits for Speculation Control", - "cmt_id": "13056af0ca8213eb800ada9b2b73eb602bb943e0" + "CVE-2020-12352": { + "cmt_msg": "Bluetooth: A2MP: Fix not initializing all members" }, - "CVE-2018-1068": { - "cmt_msg": "netfilter: ebtables: CONFIG_COMPAT: don't trust userland offsets", - "cmt_id": "71a00fe67dde7d2ed206a0db2a67f29fad90cc72" + "CVE-2021-43976": { + "cmt_msg": "mwifiex: Fix skb_over_panic in mwifiex_usb_recv()" }, - "CVE-2018-7995": { - "cmt_msg": "x86/MCE: Serialize sysfs changes", - "cmt_id": "290e29104bf6863d75a8049e501e47815665d39d" + "CVE-2022-0494": { + "cmt_msg": "block-map: add __GFP_ZERO flag for alloc_page in function bio_copy_kern" }, - "CVE-2017-16538": { - "cmt_msg": "media: dvb-usb-v2: lmedm04: Improve logic checking of warm start", - "cmt_id": "c8f3c2e5c507a41f303bbd6e1beeeb830c327881" + "CVE-2021-47101": { + "cmt_msg": "asix: fix uninit-value in asix_mdio_read()" }, - "CVE-2018-10940": { - "cmt_msg": "cdrom: information leak in cdrom_ioctl_media_changed()", - "cmt_id": "319975e893eebe88c6695c6876ab75d316aa518b" + "CVE-2021-47103": { + "cmt_msg": "inet: fully convert sk->sk_rx_dst to RCU rules" }, - "CVE-2018-8781": { - "cmt_msg": "drm: udl: Properly check framebuffer mmap offsets", - "cmt_id": "c2f377300d828234a16a6dc35402bc313bb15bed" + "CVE-2021-46982": { + "cmt_msg": "f2fs: compress: fix race condition of overwrite vs truncate" }, - "CVE-2018-8822": { - "cmt_msg": "staging: ncpfs: memory corruption in ncp_read_kernel()", - "cmt_id": "13a0dfcedbaa682bbb720685778185aead8ce996" + "CVE-2007-3719": { + "cmt_msg": "" }, - "CVE-2018-1000199": { - "cmt_msg": "perf/hwbp: Simplify the perf-hwbp code, fix documentation", - "cmt_id": "6aa1edde1030eb98f6c810709ce4c9d257ecbe5c" + "CVE-2023-3863": { + "cmt_msg": "net: nfc: Fix use-after-free caused by nfc_llcp_find_local" }, - "CVE-2018-1130": { - "cmt_msg": "dccp: check sk for closed state in dccp_sendmsg()", - "cmt_id": "e86c8c8cdf47ce06f29a080f9ab9ee8eee71b374" + "CVE-2019-19319": { + "cmt_msg": "ext4: protect journal inode's blocks using block_validity" }, - "CVE-2017-18208": { - "cmt_msg": "mm/madvise.c: fix madvise() infinite loop under special circumstances", - "cmt_id": "302212255813b55c0daeb8f15bcf25ff542e36cf" + "CVE-2016-8399": { + "cmt_msg": "net: ping: check minimum size on ICMP header length" }, - "CVE-2017-18241": { - "cmt_msg": "f2fs: fix a panic caused by NULL flush_cmd_control", - "cmt_id": "1f0db424c8770c7b31296d5c66a52fffdec1d24c" + "CVE-2022-3628": { + "cmt_msg": "wifi: brcmfmac: Fix potential buffer overflow in brcmf_fweh_event_worker()" }, - "CVE-2018-1092": { - "cmt_msg": "ext4: fail ext4_iget for root directory if unallocated", - "cmt_id": "43ef70b328eddc46938878a270895a9ff7b51059" + "CVE-2022-3629": { + "cmt_msg": "vsock: Fix memory leak in vsock_connect()" }, - "CVE-2018-1093": { - "cmt_msg": "ext4: add validity checks for bitmap block numbers", - "cmt_id": "91a9c8e8ac7da66d7159fd758464808d2a1c979a" + "CVE-2022-3621": { + "cmt_msg": "nilfs2: fix NULL pointer dereference at nilfs_bmap_lookup_at_level()" }, - "CVE-2018-7566": { - "cmt_msg": "ALSA: seq: Fix racy pool initializations", - "cmt_id": "1786e202fe5a52fe6d4026b9e40c6a824efce148" + "CVE-2022-23960": { + "cmt_msg": "ARM: report Spectre v2 status through sysfs" }, - "CVE-2018-6412": { - "cmt_msg": "fbdev: Fixing arbitrary kernel leak in case FBIOGETCMAP_SPARC in sbusfb_ioctl_helper().", - "cmt_id": "b57ed0f08e1ef7bb138f92f71f143e03a5d52136" + "CVE-2022-3624": { + "cmt_msg": "bonding: fix reference count leak in balance-alb mode" }, - "CVE-2019-9456": { - "cmt_msg": "usb: usbmon: Read text within supplied buffer size", - "cmt_id": "cdbb101ef935de73f430019996045d45a653d1a5" + "CVE-2019-11091": { + "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" }, - "CVE-2018-5803": { - "cmt_msg": "sctp: verify size of a new chunk in _sctp_make_chunk()", - "cmt_id": "ca566c761ec34bb6bce3a65d1a3688818f29b64f" + "CVE-2023-4921": { + "cmt_msg": "net: sched: sch_qfq: Fix UAF in qfq_dequeue()" }, - "CVE-2017-13220": { - "cmt_msg": "Bluetooth: hidp_connection_add() unsafe use of l2cap_pi()", - "cmt_id": "3738d7b1da4d6f306ca6d5a6a96dd70c36f53f94" - } - }, - "3.16.58": { - "CVE-2018-17182": { - "cmt_msg": "mm: get rid of vmacache_flush_all() entirely", - "cmt_id": "536c4d174c0402c5fbf6f7a995f7c9539d124410" + "CVE-2017-15649": { + "cmt_msg": "packet: in packet_do_bind, test fanout with bind_lock held" }, - "CVE-2018-13405": { - "cmt_msg": "Fix up non-directory creation in SGID directories", - "cmt_id": "0b3369840cd61c23e2b9241093737b4c395cb406" + "CVE-2023-1829": { + "cmt_msg": "net/sched: Retire tcindex classifier" }, - "CVE-2018-13406": { - "cmt_msg": "video: uvesafb: Fix integer overflow in allocation", - "cmt_id": "ab6d43c1c7c298cacaae180b2232fe8abc18075f" + "CVE-2019-19227": { + "cmt_msg": "appletalk: Fix potential NULL pointer dereference in unregister_snap_client" }, - "CVE-2018-14734": { - "cmt_msg": "infiniband: fix a possible use-after-free bug", - "cmt_id": "c62b25af5f51f49e9f93f828cc38a82c23e8a0c5" + "CVE-2024-0775": { + "cmt_msg": "ext4: improve error recovery code paths in __ext4_remount()" }, - "CVE-2018-14617": { - "cmt_msg": "hfsplus: fix NULL dereference in hfsplus_lookup()", - "cmt_id": "5c8e78e811123b61c8a194a28b48df984b540ec7" + "CVE-2016-5829": { + "cmt_msg": "HID: hiddev: validate num_values for HIDIOCGUSAGES, HIDIOCSUSAGES commands" }, - "CVE-2018-16276": { - "cmt_msg": "USB: yurex: fix out-of-bounds uaccess in read handler", - "cmt_id": "189254a6aa0cc823b55e624ba77ad3bd0637bbd9" + "CVE-2016-5828": { + "cmt_msg": "powerpc/tm: Always reclaim in start_thread() for exec() class syscalls" }, - "CVE-2018-9568": { - "cmt_msg": "net: Set sk_prot_creator when cloning sockets to the right proto", - "cmt_id": "51556151d0c82515934a0feb7c61f3bcad0e73d8" + "CVE-2016-9604": { + "cmt_msg": "KEYS: Disallow keyrings beginning with '.' to be joined as session keyrings" }, - "CVE-2018-10877": { - "cmt_msg": "ext4: verify the depth of extent tree in ext4_find_extent()", - "cmt_id": "09999807edd836f8d96ca5a5b8bf007856c5f268" + "CVE-2020-14381": { + "cmt_msg": "futex: Fix inode life-time issue" }, - "CVE-2018-10876": { - "cmt_msg": "ext4: only look at the bg_flags field if it is valid", - "cmt_id": "9c2e1d0691bfc68ebc914043497330bd530c6ed6" + "CVE-2019-19768": { + "cmt_msg": "blktrace: Protect q->blk_trace with RCU" }, - "CVE-2018-5814": { - "cmt_msg": "usbip: usbip_host: fix NULL-ptr deref and use-after-free errors", - "cmt_id": "896b00bd9c66cc72ae6800ff6dba65a9e83ea5fd" + "CVE-2022-20141": { + "cmt_msg": "igmp: Add ip_mc_list lock in ip_check_mc_rcu" }, - "CVE-2018-10879": { - "cmt_msg": "ext4: make sure bitmaps and the inode table don't overlap with bg descriptors", - "cmt_id": "96e340bf132e16be02fdbd6d03c4946f824c085d" + "CVE-2023-23455": { + "cmt_msg": "net: sched: atm: dont intepret cls results when asked to drop" }, - "CVE-2018-10878": { - "cmt_msg": "ext4: always check block group bounds in ext4_init_block_bitmap()", - "cmt_id": "e6eacb6555474a49b1aa29f4e98b38348d3c45fd" + "CVE-2023-23454": { + "cmt_msg": "net: sched: cbq: dont intepret cls results when asked to drop" }, - "CVE-2018-10902": { - "cmt_msg": "ALSA: rawmidi: Change resized buffers atomically", - "cmt_id": "c95e0783eab0d1f31c7f8baa6e4ff8b0b8e7eb72" + "CVE-2022-20148": { + "cmt_msg": "f2fs: fix UAF in f2fs_available_free_memory" }, - "CVE-2018-13093": { - "cmt_msg": "xfs: validate cached inodes are free when allocated", - "cmt_id": "7744e6b42712dd27e2457e1eb03b1c73920364c2" + "CVE-2023-6931": { + "cmt_msg": "perf: Fix perf_event_validate_size()" }, - "CVE-2018-16658": { - "cmt_msg": "cdrom: Fix info leak/OOB read in cdrom_ioctl_drive_status", - "cmt_id": "585e054220cd820aeac2436c29ff9c06e483dc83" + "CVE-2023-6932": { + "cmt_msg": "ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet" }, - "CVE-2018-15572": { - "cmt_msg": "x86/speculation: Protect against userspace-userspace spectreRSB", - "cmt_id": "ba4a6140b84f5a86be14c2511431004bc4b9be69" + "CVE-2018-8781": { + "cmt_msg": "drm: udl: Properly check framebuffer mmap offsets" }, - "CVE-2018-13094": { - "cmt_msg": "xfs: don't call xfs_da_shrink_inode with NULL bp", - "cmt_id": "991ec538e6683859b065467b8406c7e57526e212" + "CVE-2017-15265": { + "cmt_msg": "ALSA: seq: Fix use-after-free at creating a port" }, - "CVE-2018-9363": { - "cmt_msg": "Bluetooth: hidp: buffer overflow in hidp_process_report", - "cmt_id": "556fa3e5feba266ebfb14df4509ef0a69b0b1f24" + "CVE-2021-0605": { + "cmt_msg": "af_key: pfkey_dump needs parameter validation" }, - "CVE-2018-10021": { - "cmt_msg": "scsi: libsas: defer ata device eh commands to libata", - "cmt_id": "0643adfa36b54ea5948e48383d8549ac5c2fb69e" + "CVE-2018-20961": { + "cmt_msg": "USB: gadget: f_midi: fixing a possible double-free in f_midi" }, - "CVE-2018-10323": { - "cmt_msg": "xfs: set format back to extents if xfs_bmap_extents_to_btree", - "cmt_id": "00fe22e3f801fd5225aeecc6bf79630ec201f8e4" + "CVE-2018-5995": { + "cmt_msg": "printk: hash addresses printed with %p" }, - "CVE-2018-14609": { - "cmt_msg": "btrfs: relocation: Only remove reloc rb_trees if reloc control has been initialized", - "cmt_id": "7cd49306b9e47333e097ea586feef596ba708771" + "CVE-2022-2153": { + "cmt_msg": "KVM: x86: Avoid theoretical NULL pointer dereference in kvm_irq_delivery_to_apic_fast()" }, - "CVE-2018-1000204": { - "cmt_msg": "scsi: sg: allocate with __GFP_ZERO in sg_build_indirect()", - "cmt_id": "582802e7c617cfb07cc15f280c128e6decbc57b8" + "CVE-2024-2193": { + "cmt_msg": "" }, - "CVE-2018-12233": { - "cmt_msg": "jfs: Fix inconsistency between memory allocation and ea_buf->max_size", - "cmt_id": "63bd05e42208647417f421504ea70db00f046d21" + "CVE-2018-12930": { + "cmt_msg": "" }, - "CVE-2018-9422": { - "cmt_msg": "futex: Remove requirement for lock_page() in get_futex_key()", - "cmt_id": "862b19bc43313fadad14334760d447f715003500" + "CVE-2018-12931": { + "cmt_msg": "" }, - "CVE-2018-10880": { - "cmt_msg": "ext4: never move the system.data xattr out of the inode body", - "cmt_id": "42a6cd12f1f0728e7c09a0c1dde8f6d9e8a5fbd6" + "CVE-2021-28972": { + "cmt_msg": "PCI: rpadlpar: Fix potential drc_name corruption in store functions" }, - "CVE-2018-10881": { - "cmt_msg": "ext4: clear i_data in ext4_inode_info when removing inline data", - "cmt_id": "e2e3ff3ad042fba28c0b49e9534f3b281b105c48" + "CVE-2021-28971": { + "cmt_msg": "perf/x86/intel: Fix a crash caused by zero PEBS status" }, - "CVE-2018-10882": { - "cmt_msg": "ext4: add more inode number paranoia checks", - "cmt_id": "f8d710be66f6f85084331734d7795a7fc80d99de" + "CVE-2017-12146": { + "cmt_msg": "driver core: platform: fix race condition with driver_override" }, - "CVE-2018-10883": { - "cmt_msg": "jbd2: don't mark block as modified if the handle is out of credits", - "cmt_id": "005c9f88b625b204e5f80d0241cbf38963f263bf" - } - }, - "3.16.59": { - "CVE-2019-9457": { - "cmt_msg": "exec: Limit arg stack to at most 75% of _STK_LIM", - "cmt_id": "3c270e64a394ea5e52be9e371f5676fa974f6deb" + "CVE-2020-36781": { + "cmt_msg": "i2c: imx: fix reference leak when pm_runtime_get_sync fails" }, - "CVE-2018-14634": { - "cmt_msg": "exec: Limit arg stack to at most 75% of _STK_LIM", - "cmt_id": "3c270e64a394ea5e52be9e371f5676fa974f6deb" + "CVE-2021-3732": { + "cmt_msg": "ovl: prevent private clone if bind mount is not allowed" }, - "CVE-2018-14633": { - "cmt_msg": "scsi: target: iscsi: Use hex2bin instead of a re-implementation", - "cmt_id": "aba97ce870f92835fa3385861f850e3e992dc42a" + "CVE-2020-36784": { + "cmt_msg": "i2c: cadence: fix reference leak when pm_runtime_get_sync fails" }, - "CVE-2018-3639": { - "cmt_msg": "x86/nospec: Simplify alternative_msr_write()", - "cmt_id": "4172af7e06994104deeb53e344f53cf4173ce144" + "CVE-2017-13166": { + "cmt_msg": "media: v4l2-ioctl.c: use check_fmt for enum/g/s/try_fmt" }, - "CVE-2018-6554": { - "cmt_msg": "staging: irda: remove the irda network stack and drivers", - "cmt_id": "af8f681e48239817afb290f4e8ee3ca094f513e6" + "CVE-2018-12207": { + "cmt_msg": "kvm: x86, powerpc: do not allow clearing largepages debugfs entry" }, - "CVE-2018-6555": { - "cmt_msg": "staging: irda: remove the irda network stack and drivers", - "cmt_id": "46b57f819163e3a84ff00b31485ee0638dbf1fdc" + "CVE-2017-13168": { + "cmt_msg": "scsi: sg: mitigate read/write abuse" }, - "CVE-2018-9516": { - "cmt_msg": "HID: debug: check length before copy_to_user()", - "cmt_id": "e44ab03f41ba55e181f4ed64e546feac8f8e69dc" + "CVE-2019-0148": { + "cmt_msg": "i40e: Wrong truncation from u16 to u8" }, - "CVE-2018-7755": { - "cmt_msg": "floppy: Do not copy a kernel pointer to user memory in FDGETPRM ioctl", - "cmt_id": "3141e0750231be243bd4cd0fa6eebeb6a1578537" - } - }, - "3.16.60": { - "CVE-2019-12881": { - "cmt_msg": "drm/i915/userptr: reject zero user_size", - "cmt_id": "fd55b13e6434a47a82080e1b34b1b29cca8fe98e" + "CVE-2019-17075": { + "cmt_msg": "RDMA/cxgb4: Do not dma memory off of the stack" }, - "CVE-2019-18675": { - "cmt_msg": "mmap: introduce sane default mmap limits", - "cmt_id": "72d8a061cbfbee3a357d38ef80688df9e878de43" - } - }, - "3.16.61": { - "CVE-2017-13168": { - "cmt_msg": "scsi: sg: mitigate read/write abuse", - "cmt_id": "3f084a4d285d695b2008533f1b28a5538748e174" + "CVE-2023-20588": { + "cmt_msg": "x86/CPU/AMD: Do not leak quotient data after a division by 0" }, - "CVE-2019-9458": { - "cmt_msg": "media: v4l: event: Prevent freeing event subscriptions while accessed", - "cmt_id": "a37099499a019538386ef53ca1485cafa6095e0b" - } - }, - "3.16.62": { - "CVE-2018-5848": { - "cmt_msg": "wil6210: missing length check in wmi_set_ie", - "cmt_id": "921c1539170bf690cad59b3dbebf7d46843d28e2" + "CVE-2018-3693": { + "cmt_msg": "ext4: fix spectre gadget in ext4_mb_regular_allocator()" }, - "CVE-2018-17972": { - "cmt_msg": "proc: restrict kernel stack dumps to root", - "cmt_id": "6e8e3ad9d57f70fc58e2ecbafbfd1b3f37973cfc" + "CVE-2022-44033": { + "cmt_msg": "char: pcmcia: remove all the drivers" }, - "CVE-2018-18690": { - "cmt_msg": "xfs: don't fail when converting shortform attr to long form during ATTR_REPLACE", - "cmt_id": "789a4317666e599e487ec1983643de1b519c431e" + "CVE-2022-44032": { + "cmt_msg": "char: pcmcia: remove all the drivers" }, - "CVE-2018-12896": { - "cmt_msg": "posix-timers: Sanitize overrun handling", - "cmt_id": "f795b11fdc99a3d4d7d6b9d48c5e44e17c287a27" + "CVE-2017-5576": { + "cmt_msg": "drm/vc4: Fix an integer overflow in temporary allocation layout." }, - "CVE-2018-3693": { - "cmt_msg": "ext4: fix spectre gadget in ext4_mb_regular_allocator()", - "cmt_id": "e94d8cd6012da14cf18296d6342c16b295c12cbe" + "CVE-2021-46908": { + "cmt_msg": "bpf: Use correct permission flag for mixed signed bounds arithmetic" + }, + "CVE-2021-3609": { + "cmt_msg": "can: bcm: delay release of struct bcm_op after synchronize_rcu()" }, "CVE-2017-13305": { - "cmt_msg": "KEYS: encrypted: fix buffer overread in valid_master_desc()", - "cmt_id": "bfe535bf4ab73e41922c7a58d6a858a2c435ff29" + "cmt_msg": "KEYS: encrypted: fix buffer overread in valid_master_desc()" }, - "CVE-2018-13053": { - "cmt_msg": "alarmtimer: Prevent overflow for relative nanosleep", - "cmt_id": "b396dc52e302a0610abfd6467e20fb58352cdb69" + "CVE-2019-11479": { + "cmt_msg": "tcp: add tcp_min_snd_mss sysctl" }, - "CVE-2018-16862": { - "cmt_msg": "mm: cleancache: fix corruption on missed inode invalidation", - "cmt_id": "56a7ebd4a3adc001b18a8feeb5cdf0b9fb2684fa" + "CVE-2019-11478": { + "cmt_msg": "tcp: tcp_fragment() should apply sane memory limits" }, - "CVE-2018-18021": { - "cmt_msg": "arm64: KVM: Tighten guest core register access from userspace", - "cmt_id": "2fdce53c4a81397774363dfda8be635b8a4468db" + "CVE-2019-20096": { + "cmt_msg": "dccp: Fix memleak in __feat_register_sp" }, - "CVE-2018-18710": { - "cmt_msg": "cdrom: fix improper type cast, which can leat to information leak.", - "cmt_id": "4d0f2564603d1ef8cce8a083751442342e9c9474" + "CVE-2018-6554": { + "cmt_msg": "staging: irda: remove the irda network stack and drivers" }, - "CVE-2018-18281": { - "cmt_msg": "mremap: properly flush TLB before releasing the page", - "cmt_id": "2567a342d707b1245e837f16cb7555b360e2c580" - } - }, - "3.16.63": { - "CVE-2018-19824": { - "cmt_msg": "ALSA: usb-audio: Fix UAF decrement if card has no live interfaces in card.c", - "cmt_id": "1c38b9d9e74a24a8ed9089429031f6d7721b6df0" + "CVE-2018-6555": { + "cmt_msg": "staging: irda: remove the irda network stack and drivers" }, - "CVE-2018-20169": { - "cmt_msg": "USB: check usb_get_extra_descriptor for proper size", - "cmt_id": "f8860a91d7538022c1c3f0bdddeec9a9d83e0c09" - } - }, - "3.16.64": { - "CVE-2018-20511": { - "cmt_msg": "net/appletalk: fix minor pointer leak to userspace in SIOCFINDIPDDPRT", - "cmt_id": "0c4d7b52773b227211d311858f3c3b56f7c44874" + "CVE-2016-7097": { + "cmt_msg": "posix_acl: Clear SGID bit when setting file permissions" }, - "CVE-2018-5953": { - "cmt_msg": "printk: hash addresses printed with %p", - "cmt_id": "9ebdc41f7115c2fb37da946dd50e531d00533ca1" + "CVE-2019-9213": { + "cmt_msg": "mm: enforce min addr even if capable() in expand_downwards()" }, - "CVE-2016-10741": { - "cmt_msg": "xfs: don't BUG() on mixed direct and mapped I/O", - "cmt_id": "96cbb7e99d66cef46c62dc691664d38d5ae2cd8d" + "CVE-2019-14896": { + "cmt_msg": "libertas: Fix two buffer overflows at parsing bss descriptor" }, - "CVE-2018-19985": { - "cmt_msg": "USB: hso: Fix OOB memory access in hso_probe/hso_get_config_data", - "cmt_id": "2d955f32f4ab31294447a01cf401cec2cef9013e" + "CVE-2019-14897": { + "cmt_msg": "libertas: Fix two buffer overflows at parsing bss descriptor" }, - "CVE-2019-6974": { - "cmt_msg": "kvm: fix kvm_ioctl_create_device() reference counting (CVE-2019-6974)", - "cmt_id": "2aa9f75791601aab7bd02b8783aa9a8f5105f68f" + "CVE-2019-14895": { + "cmt_msg": "mwifiex: fix possible heap overflow in mwifiex_process_country_ie()" }, - "CVE-2019-3701": { - "cmt_msg": "can: gw: ensure DLC boundaries after CAN frame modification", - "cmt_id": "1c7dcfd106f42f09e3b7520c26e6eee70a939928" + "CVE-2024-26784": { + "cmt_msg": "pmdomain: arm: Fix NULL dereference on scmi_perf_domain removal" }, - "CVE-2018-16884": { - "cmt_msg": "sunrpc: use-after-free in svc_process_common()", - "cmt_id": "801f9d2fb42e450a67f83c18fd5d8450ad29224f" + "CVE-2024-26789": { + "cmt_msg": "crypto: arm64/neonbs - fix out-of-bounds access on short input" }, - "CVE-2019-7222": { - "cmt_msg": "KVM: x86: work around leak of uninitialized stack contents (CVE-2019-7222)", - "cmt_id": "234a2dee1b06502face184e241e03582d7946f80" + "CVE-2017-18222": { + "cmt_msg": "net: hns: fix ethtool_get_strings overflow in hns driver" }, - "CVE-2017-9725": { - "cmt_msg": "mm: cma: fix incorrect type conversion for size during dma allocation", - "cmt_id": "cc12c0099168b416f6c3eff1cd560a771f4b7c3f" + "CVE-2020-0067": { + "cmt_msg": "f2fs: fix to avoid memory leakage in f2fs_listxattr" }, - "CVE-2019-7221": { - "cmt_msg": "KVM: nVMX: unconditionally cancel preemption timer in free_nested (CVE-2019-7221)", - "cmt_id": "69c7b3bb99c621f44fb46c20ccef737e86e1c5c8" - } - }, - "3.16.65": { - "CVE-2018-1066": { - "cmt_msg": "CIFS: Enable encryption during session setup phase", - "cmt_id": "cbf513cb2080cc507f4b1f2d1a95141e64c87db3" - } - }, - "3.16.66": { - "CVE-2019-11599": { - "cmt_msg": "coredump: fix race condition between mmget_not_zero()/get_task_mm() and core dumping", - "cmt_id": "a301e6a651037c11d2d9932a35fb56a04eedba8c" + "CVE-2020-26541": { + "cmt_msg": "certs: Add EFI_CERT_X509_GUID support for dbx entries" }, - "CVE-2019-3892": { - "cmt_msg": "coredump: fix race condition between mmget_not_zero()/get_task_mm() and core dumping", - "cmt_id": "a301e6a651037c11d2d9932a35fb56a04eedba8c" + "CVE-2019-20794": { + "cmt_msg": "" }, - "CVE-2019-11486": { - "cmt_msg": "tty: mark Siemens R3964 line discipline as BROKEN", - "cmt_id": "e0d2ad5eaec135bb79a7045b1c0718557bac4c4d" + "CVE-2024-26769": { + "cmt_msg": "nvmet-fc: avoid deadlock on delete association path" }, - "CVE-2019-3901": { - "cmt_msg": "perf/core: Fix perf_event_open() vs. execve() race", - "cmt_id": "92cb82fec63d558f7eecc97afbbbdf3fe5ef95b5" + "CVE-2024-26768": { + "cmt_msg": "LoongArch: Change acpi_core_pic[NR_CPUS] to acpi_core_pic[MAX_CORE_PIC]" }, - "CVE-2019-2024": { - "cmt_msg": "media: em28xx: Fix use-after-free when disconnecting", - "cmt_id": "abbb5cf0c8e9995defed43a6c98296f357098b5b" + "CVE-2021-33061": { + "cmt_msg": "ixgbe: add improvement for MDD response functionality" }, - "CVE-2019-9466": { - "cmt_msg": "brcmfmac: add subtype check for event handling in data path", - "cmt_id": "52b1af5e74cc3f4d513eacf49f71d9855a9ccbec" + "CVE-2024-26764": { + "cmt_msg": "fs/aio: Restrict kiocb_set_cancel_fn() to I/O submitted via libaio" }, - "CVE-2019-3882": { - "cmt_msg": "vfio/type1: Limit DMA mappings per container", - "cmt_id": "d3334471c34797ab1729cbadddd411118d51c584" + "CVE-2024-26767": { + "cmt_msg": "drm/amd/display: fixed integer types and null check locations" }, - "CVE-2019-3460": { - "cmt_msg": "Bluetooth: Check L2CAP option sizes returned from l2cap_get_conf_opt", - "cmt_id": "c5c6a5c7eb7e3d7859e7ec78a2872360e4bab6aa" + "CVE-2024-26766": { + "cmt_msg": "IB/hfi1: Fix sdma.h tx->num_descs off-by-one error" }, - "CVE-2019-15927": { - "cmt_msg": "ALSA: usb-audio: Avoid access before bLength check in build_audio_procunit()", - "cmt_id": "cacb39e5e4b7de790939b174165503bbe8c82208" + "CVE-2024-26763": { + "cmt_msg": "dm-crypt: don't modify the data when using authenticated encryption" }, - "CVE-2019-11190": { - "cmt_msg": "binfmt_elf: switch to new creds when switching to new mm", - "cmt_id": "1e06334afa7199cc86c6c4830b71a7c1ea8e7901" + "CVE-2017-18551": { + "cmt_msg": "i2c: core-smbus: prevent stack corruption on read I2C_BLOCK_DATA" }, - "CVE-2019-12819": { - "cmt_msg": "mdio_bus: Fix use-after-free on device_register fails", - "cmt_id": "8a5e2f4be5d08d16964ce2adb8da6fc42052c6f1" + "CVE-2017-18552": { + "cmt_msg": "RDS: validate the requested traces user input against max supported" }, - "CVE-2019-9503": { - "cmt_msg": "brcmfmac: add subtype check for event handling in data path", - "cmt_id": "52b1af5e74cc3f4d513eacf49f71d9855a9ccbec" + "CVE-2018-18559": { + "cmt_msg": "net/packet: fix a race in packet_bind() and packet_notifier()" }, - "CVE-2019-3459": { - "cmt_msg": "Bluetooth: Verify that l2cap_get_conf_opt provides large enough buffer", - "cmt_id": "78c2887130f1a7d1883195732be1b6cdab667487" + "CVE-2019-9457": { + "cmt_msg": "exec: Limit arg stack to at most 75% of _STK_LIM" }, - "CVE-2019-12818": { - "cmt_msg": "net: nfc: Fix NULL dereference on nfc_llcp_build_tlv fails", - "cmt_id": "2c716db6f80cef6159972be0dab86892c39de277" + "CVE-2019-9456": { + "cmt_msg": "usb: usbmon: Read text within supplied buffer size" }, - "CVE-2019-9213": { - "cmt_msg": "mm: enforce min addr even if capable() in expand_downwards()", - "cmt_id": "c90030281dc8b6a25ac8850e98e15877f80b8d66" + "CVE-2019-9455": { + "cmt_msg": "media: videobuf2-v4l2: drop WARN_ON in vb2_warn_zero_bytesused()" }, - "CVE-2020-10769": { - "cmt_msg": "crypto: authenc - fix parsing key with misaligned rta_len", - "cmt_id": "ccd67cd15b3e3b2f3d1b03fd4336ea7ab5d35211" - } - }, - "3.16.67": { - "CVE-2018-5995": { - "cmt_msg": "printk: hash addresses printed with %p", - "cmt_id": "14c2d9209a135872def8508e3f19c74f0f3fee52" + "CVE-2022-2978": { + "cmt_msg": "fs: fix UAF/GPF bug in nilfs_mdt_destroy" }, - "CVE-2019-6133": { - "cmt_msg": "fork: record start_time late", - "cmt_id": "971081984266d7934b2f0253215e3f31f9337915" + "CVE-2019-9453": { + "cmt_msg": "f2fs: fix to avoid accessing xattr across the boundary" }, - "CVE-2019-10639": { - "cmt_msg": "netns: provide pure entropy for net_hash_mix()", - "cmt_id": "8b197d3ce585d6777197e0633d71e5af7d98cb35" - } - }, - "3.16.69": { - "CVE-2019-11477": { - "cmt_msg": "tcp: limit payload size of sacked skbs", - "cmt_id": "ef27e3c531782ec8213108e11e5515f9724303c7" + "CVE-2023-20569": { + "cmt_msg": "x86/bugs: Increase the x86 bugs vector size to two u32s" }, - "CVE-2019-11884": { - "cmt_msg": "Bluetooth: hidp: fix buffer overflow", - "cmt_id": "acaf43aa7ede1e500532f1f5d910e207f89d5e1f" + "CVE-2023-46838": { + "cmt_msg": "xen-netback: don't produce zero-size SKB frags" }, - "CVE-2019-11479": { - "cmt_msg": "tcp: add tcp_min_snd_mss sysctl", - "cmt_id": "6b7e7997ad3505db7de85ff12276fc84659481d3" + "CVE-2019-9458": { + "cmt_msg": "media: v4l: event: Prevent freeing event subscriptions while accessed" }, - "CVE-2019-11478": { - "cmt_msg": "tcp: tcp_fragment() should apply sane memory limits", - "cmt_id": "dc97a907bc76b71c08e7e99a5b1b30ef4d5e4a85" + "CVE-2023-3090": { + "cmt_msg": "ipvlan:Fix out-of-bounds caused by unclear skb->cb" }, - "CVE-2019-11833": { - "cmt_msg": "ext4: zero out the unused memory region in the extent tree block", - "cmt_id": "13c4be25bdcbe5045f9b17ad875c3253a4888e45" + "CVE-2023-45862": { + "cmt_msg": "USB: ene_usb6250: Allocate enough memory for full object" }, - "CVE-2019-10142": { - "cmt_msg": "drivers/virt/fsl_hypervisor.c: prevent integer overflow in ioctl", - "cmt_id": "bfa8c73482dae6bafc0741cbfd63f84d11311b36" + "CVE-2023-45863": { + "cmt_msg": "kobject: Fix slab-out-of-bounds in fill_kobj_path()" }, - "CVE-2019-11810": { - "cmt_msg": "scsi: megaraid_sas: return error when create DMA pool failed", - "cmt_id": "bd0908fbd84009cb5f01cf1a258a6f7fd78b6b3a" - } - }, - "3.16.70": { - "CVE-2019-10126": { - "cmt_msg": "mwifiex: Fix heap overflow in mwifiex_uap_parse_tail_ies()", - "cmt_id": "a62393d7eb63bd075c51154002825cc7ab4dd3eb" + "CVE-2016-4470": { + "cmt_msg": "KEYS: potential uninitialized variable" }, - "CVE-2019-2101": { - "cmt_msg": "media: uvcvideo: Fix 'type' check leading to overflow", - "cmt_id": "1ea04ca97ab7f4d583949825dd7d55467aa2536f" + "CVE-2023-52639": { + "cmt_msg": "KVM: s390: vsie: fix race during shadow creation" }, - "CVE-2019-3846": { - "cmt_msg": "mwifiex: Fix possible buffer overflows at parsing bss descriptor", - "cmt_id": "a24ac7326f38ffab2b63141496d075da144cec7d" + "CVE-2023-52638": { + "cmt_msg": "can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock" }, - "CVE-2019-15916": { - "cmt_msg": "net-sysfs: Fix mem leak in netdev_register_kobject", - "cmt_id": "3c169c57e6c00c36b16c59ccb0e5adbd784b157b" + "CVE-2019-15239": { + "cmt_msg": "unknown" }, - "CVE-2019-16413": { - "cmt_msg": "9p: use inode->i_lock to protect i_size_write() under 32-bit", - "cmt_id": "8463eed58e131d0cc4db4c9f84fb8454e09e48dd" - } - }, - "3.16.71": { - "CVE-2019-13272": { - "cmt_msg": "ptrace: Fix ->ptracer_cred handling for PTRACE_TRACEME", - "cmt_id": "d5d5bd909a4f03f132ee3fd3f6f0568c8344eee5" - } - }, - "3.16.72": { - "CVE-2019-20811": { - "cmt_msg": "net-sysfs: call dev_hold if kobject_init_and_add success", - "cmt_id": "1b75034a1bb506abcabb2c2f9d7360020a7e2c42" + "CVE-2017-15129": { + "cmt_msg": "net: Fix double free and memory corruption in get_net_ns_by_id()" }, - "CVE-2019-17351": { - "cmt_msg": "xen: let alloc_xenballooned_pages() fail if not enough memory free", - "cmt_id": "2ed58e578b03269b23eb7119fb38478725ae6470" + "CVE-2023-52469": { + "cmt_msg": "drivers/amd/pm: fix a use-after-free in kv_parse_power_table" }, - "CVE-2019-1125": { - "cmt_msg": "x86/speculation: Prepare entry code for Spectre v1 swapgs mitigations", - "cmt_id": "79969c78fd8622fa7e7f925acd483eb01714efa4" + "CVE-2023-52633": { + "cmt_msg": "um: time-travel: fix time corruption" }, - "CVE-2019-15666": { - "cmt_msg": "xfrm: policy: Fix out-of-bound array accesses in __xfrm_policy_unlink", - "cmt_id": "056bd2ff271dd62e52efb09c96399a7ef9d68455" + "CVE-2023-52632": { + "cmt_msg": "drm/amdkfd: Fix lock dependency warning with srcu" }, - "CVE-2019-20096": { - "cmt_msg": "dccp: Fix memleak in __feat_register_sp", - "cmt_id": "6f5a5f7e229e3ec71d729f3fd4479a11a0a21fd8" + "CVE-2017-9986": { + "cmt_msg": "sound: Retire OSS" }, - "CVE-2018-20836": { - "cmt_msg": "scsi: libsas: fix a race condition when smp task timeout", - "cmt_id": "d5534b2998f7c7009e600d57f27f68ed45779da2" + "CVE-2017-9985": { + "cmt_msg": "ALSA: msnd: Optimize / harden DSP and MIDI loops" }, - "CVE-2019-3900": { - "cmt_msg": "vhost_net: fix possible infinite loop", - "cmt_id": "f3a64b1071c414e59233b769110872a026f8d254" + "CVE-2017-9984": { + "cmt_msg": "ALSA: msnd: Optimize / harden DSP and MIDI loops" }, - "CVE-2019-10207": { - "cmt_msg": "Bluetooth: hci_uart: check for missing tty operations", - "cmt_id": "ebb8302ce770e8c455d9209cb598f4cd03021e42" + "CVE-2021-47135": { + "cmt_msg": "mt76: mt7921: fix possible AOOB issue in mt7921_mcu_tx_rate_report" }, - "CVE-2019-13631": { - "cmt_msg": "Input: gtco - bounds check collection indent level", - "cmt_id": "754d0ca82fed0ad682e875bea824c348d597ca28" + "CVE-2021-47136": { + "cmt_msg": "net: zero-initialize tc skb extension on allocation" }, - "CVE-2019-15214": { - "cmt_msg": "ALSA: core: Fix card races between register and disconnect", - "cmt_id": "dbcb50792a5175b222c181bafa51f470550ba827" + "CVE-2021-47137": { + "cmt_msg": "net: lantiq: fix memory corruption in RX ring" }, - "CVE-2019-20054": { - "cmt_msg": "fs/proc/proc_sysctl.c: fix NULL pointer dereference in put_links", - "cmt_id": "79c7d53c4e3df6bc0c41b62adb0aefe10d28a888" + "CVE-2021-47131": { + "cmt_msg": "net/tls: Fix use-after-free after the TLS device goes down and up" }, - "CVE-2019-15216": { - "cmt_msg": "USB: yurex: Fix protection fault after device removal", - "cmt_id": "5133454a1f3a7f22412ab083f7ff53f822d50f49" + "CVE-2021-47133": { + "cmt_msg": "HID: amd_sfh: Fix memory leak in amd_sfh_work" }, - "CVE-2019-13648": { - "cmt_msg": "powerpc/tm: Fix oops on sigreturn on systems without TM", - "cmt_id": "929606ae749185c940a5476d3a0e8d8e7c9c1db6" + "CVE-2024-26675": { + "cmt_msg": "ppp_async: limit MRU to 64K" }, - "CVE-2017-18509": { - "cmt_msg": "ipv6: check sk sk_type and protocol early in ip_mroute_set/getsockopt", - "cmt_id": "2b8d63b97d78835d3cd75b0ee344d21489df4edc" + "CVE-2023-0386": { + "cmt_msg": "ovl: fail on invalid uid/gid mapping at copy up" }, - "CVE-2019-14284": { - "cmt_msg": "floppy: fix div-by-zero in setup_format_params", - "cmt_id": "a36b6459cbff32a0ef228241c99d6586ca7e944c" + "CVE-2022-42896": { + "cmt_msg": "Bluetooth: L2CAP: Fix accepting connection request for invalid SPSM" }, - "CVE-2019-14283": { - "cmt_msg": "floppy: fix out-of-bounds read in copy_buffer", - "cmt_id": "05429983fa0fa3bfa1b8436beb63913d9d4aad1a" + "CVE-2022-42895": { + "cmt_msg": "Bluetooth: L2CAP: Fix attempting to access uninitialized memory" }, - "CVE-2019-10638": { - "cmt_msg": "inet: switch IP ID generator to siphash", - "cmt_id": "9ebeec41ed3f52fd94267f25f8b9bf3f4cbf1e4e" - } - }, - "3.16.74": { - "CVE-2019-15219": { - "cmt_msg": "USB: sisusbvga: fix oops in error path of sisusb_probe", - "cmt_id": "135b5e3371cdba62761dee1cf6c0e20e48a41ac3" + "CVE-2017-7618": { + "cmt_msg": "crypto: ahash - Fix EINPROGRESS notification callback" }, - "CVE-2019-15218": { - "cmt_msg": "media: usb: siano: Fix general protection fault in smsusb", - "cmt_id": "b38d52375b92e1a1ddca9a79cf08bf8d536e8cbb" + "CVE-2022-48626": { + "cmt_msg": "moxart: fix potential use-after-free on remove path" }, - "CVE-2019-15212": { - "cmt_msg": "USB: rio500: refuse more than one device at a time", - "cmt_id": "365d2bc245d2b1b2628f80463bdf284544d69c36" + "CVE-2022-48627": { + "cmt_msg": "vt: fix memory overlapping when deleting chars in the buffer" }, - "CVE-2019-15211": { - "cmt_msg": "media: radio-raremono: change devm_k*alloc to k*alloc", - "cmt_id": "cc1b36d4dd926df07d970cb78346a3bda082fe65" + "CVE-2022-48628": { + "cmt_msg": "ceph: drop messages from MDS when unmounting" }, - "CVE-2019-15215": { - "cmt_msg": "media: cpia2_usb: first wake up, then free in disconnect", - "cmt_id": "136f9120ecef4d43b5d87000542f16e87c93e2b1" + "CVE-2017-7616": { + "cmt_msg": "mm/mempolicy.c: fix error handling in set_mempolicy and mbind." }, - "CVE-2019-15118": { - "cmt_msg": "ALSA: usb-audio: Fix a stack buffer overflow bug in check_input_term", - "cmt_id": "d6e2b6dd35b6f83fd0166745d8ca65f191a3a468" + "CVE-2024-24859": { + "cmt_msg": "" }, - "CVE-2016-10906": { - "cmt_msg": "net: arc_emac: fix koops caused by sk_buff free", - "cmt_id": "fe2292f42aa20799497099a88771b4bbf6afdc4e" + "CVE-2017-1000112": { + "cmt_msg": "udp: consistently apply ufo or fragmentation" }, - "CVE-2016-10905": { - "cmt_msg": "GFS2: don't set rgrp gl_object until it's inserted into rgrp tree", - "cmt_id": "b0699c8e33f2fdf5396da2d41cf2f7ffe9a140a9" + "CVE-2017-1000111": { + "cmt_msg": "packet: fix tp_reserve race in packet_set_ring" }, - "CVE-2019-0136": { - "cmt_msg": "mac80211: drop robust management frames from unknown TA", - "cmt_id": "62909f7d0b1360ddb147bae8f546228dd93588e1" + "CVE-2024-24855": { + "cmt_msg": "scsi: lpfc: Fix a possible data race in lpfc_unregister_fcf_rescan()" }, - "CVE-2018-20976": { - "cmt_msg": "xfs: clear sb->s_fs_info on mount failure", - "cmt_id": "bf3878994377a97143f5f6b6e60a18f9b76e0476" + "CVE-2024-24857": { + "cmt_msg": "" }, - "CVE-2019-15117": { - "cmt_msg": "ALSA: usb-audio: Fix an OOB bug in parse_audio_mixer_unit", - "cmt_id": "b5807684982f4dd978a2a5496514ecc3132bce91" + "CVE-2019-3892": { + "cmt_msg": "coredump: fix race condition between mmget_not_zero()/get_task_mm() and core dumping" }, - "CVE-2019-15292": { - "cmt_msg": "appletalk: Fix use-after-free in atalk_proc_exit", - "cmt_id": "8a8b481d1908d18213a55260498c5b0af6f12892" + "CVE-2021-29265": { + "cmt_msg": "usbip: fix stub_dev usbip_sockfd_store() races leading to gpf" }, - "CVE-2019-9506": { - "cmt_msg": "Bluetooth: Fix faulty expression for minimum encryption key size check", - "cmt_id": "e683e0c25ce62690fb5445ac1156c68b785d186e" + "CVE-2022-3545": { + "cmt_msg": "nfp: fix use-after-free in area_cache_get()" }, - "CVE-2019-15917": { - "cmt_msg": "Bluetooth: hci_ldisc: Postpone HCI_UART_PROTO_READY bit set in hci_uart_set_proto()", - "cmt_id": "a79897227b81d588130813e83084b836733cb146" + "CVE-2022-3542": { + "cmt_msg": "bnx2x: fix potential memory leak in bnx2x_tpa_stop()" }, - "CVE-2019-14816": { - "cmt_msg": "mwifiex: Fix three heap overflow at parsing element in cfg80211_ap_settings", - "cmt_id": "fb8186b15518423646f0e2105c34b3e620623b4e" + "CVE-2018-16597": { + "cmt_msg": "ovl: modify ovl_permission() to do checks on two inodes" }, - "CVE-2019-14814": { - "cmt_msg": "mwifiex: Fix three heap overflow at parsing element in cfg80211_ap_settings", - "cmt_id": "fb8186b15518423646f0e2105c34b3e620623b4e" + "CVE-2021-21781": { + "cmt_msg": "ARM: ensure the signal page contains defined contents" }, - "CVE-2019-14835": { - "cmt_msg": "vhost: make sure log_num < in_num", - "cmt_id": "8041c3ee83638f34d4c6b52f432601ad12ea4850" + "CVE-2023-1838": { + "cmt_msg": "Fix double fget() in vhost_net_set_backend()" }, - "CVE-2018-21008": { - "cmt_msg": "rsi: add fix for crash during assertions", - "cmt_id": "fd56118648c89adbd7a64bc8e3e26ac4871d1c1a" + "CVE-2023-1382": { + "cmt_msg": "tipc: set con sock in tipc_conn_alloc" }, - "CVE-2019-15220": { - "cmt_msg": "p54usb: Fix race between disconnect and firmware loading", - "cmt_id": "450e350ba7c383dc74b181e4eeb50526df68433e" + "CVE-2018-14734": { + "cmt_msg": "infiniband: fix a possible use-after-free bug" }, - "CVE-2019-15221": { - "cmt_msg": "ALSA: line6: Fix write on zero-sized buffer", - "cmt_id": "f1508f326a3b8f29beef9ca399bec516ecfd0b2a" + "CVE-2018-8822": { + "cmt_msg": "staging: ncpfs: memory corruption in ncp_read_kernel()" }, - "CVE-2019-15807": { - "cmt_msg": "scsi: libsas: delete sas port if expander discover failed", - "cmt_id": "03e6d05e78d421221bca0f7480c59e1c202c54e9" + "CVE-2023-6546": { + "cmt_msg": "tty: n_gsm: fix the UAF caused by race condition in gsm_cleanup_mux" }, - "CVE-2019-15926": { - "cmt_msg": "ath6kl: add some bounds checking", - "cmt_id": "65e2043814c7d6096521199ae8e18d5b40254a3e" + "CVE-2020-25705": { + "cmt_msg": "icmp: randomize the global rate limiter" }, - "CVE-2019-14821": { - "cmt_msg": "KVM: coalesced_mmio: add bounds checking", - "cmt_id": "0bd118896b6a82a42845a6148d2f0f4a3694d178" - } - }, - "3.16.75": { - "CVE-2020-10720": { - "cmt_msg": "net-gro: fix use-after-free read in napi_gro_frags()", - "cmt_id": "f41184b4ba5bbf98b8eecae2a16fca34a669376f" - } - }, - "3.16.77": { - "CVE-2019-17666": { - "cmt_msg": "rtlwifi: Fix potential overflow on P2P code", - "cmt_id": "b78c8469ceff4288d1092e22bfb277d3bd0d7147" + "CVE-2020-14390": { + "cmt_msg": "fbcon: remove soft scrollback code" }, - "CVE-2019-15217": { - "cmt_msg": "media: usb:zr364xx:Fix KASAN:null-ptr-deref Read in zr364xx_vidioc_querycap", - "cmt_id": "4accfbf9527ed191513f4d2d738caf15ad4e8657" + "CVE-2021-45469": { + "cmt_msg": "f2fs: fix to do sanity check on last xattr entry in __f2fs_setxattr()" }, - "CVE-2019-15098": { - "cmt_msg": "ath6kl: fix a NULL-ptr-deref bug in ath6kl_usb_alloc_urb_from_pipe()", - "cmt_id": "3e8e6f9a952c9a7e0be92518906dcdb7c8d1ca29" + "CVE-2017-7541": { + "cmt_msg": "brcmfmac: fix possible buffer overflow in brcmf_cfg80211_mgmt_tx()" }, - "CVE-2019-15505": { - "cmt_msg": "media: technisat-usb2: break out of loop at end of buffer", - "cmt_id": "2389a6543a1c2b3bd1ab5dae04d23c3ed9c95752" + "CVE-2017-7542": { + "cmt_msg": "ipv6: avoid overflow of offset in ip6_find_1stfragopt" }, - "CVE-2019-11135": { - "cmt_msg": "x86/msr: Add the IA32_TSX_CTRL MSR", - "cmt_id": "6608a10cecfd899b4e8650aa9149ca5a6171fc43" + "CVE-2024-0584": { + "cmt_msg": "ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet" }, - "CVE-2019-17053": { - "cmt_msg": "ieee802154: enforce CAP_NET_RAW for raw sockets", - "cmt_id": "b8a15d59a9b26a734f6d8d5f10376f336f7d021b" + "CVE-2020-0465": { + "cmt_msg": "HID: core: Sanitize event code and type when mapping input" }, - "CVE-2019-17052": { - "cmt_msg": "ax25: enforce CAP_NET_RAW for raw sockets", - "cmt_id": "2c675dab816278a1724c1e93b384c2f05a11cb31" + "CVE-2020-0466": { + "cmt_msg": "do_epoll_ctl(): clean the failure exits up a bit" }, - "CVE-2019-17133": { - "cmt_msg": "cfg80211: wext: avoid copying malformed SSIDs", - "cmt_id": "e70efb76ea2eb9f08dc627d93d35a8e5c065346d" + "CVE-2017-15274": { + "cmt_msg": "KEYS: fix dereferencing NULL payload with nonzero length" }, - "CVE-2019-17056": { - "cmt_msg": "nfc: enforce CAP_NET_RAW for raw sockets", - "cmt_id": "bc3d2e9cfdc5c1b7e5ed34eb5279e47d462b4d5c" + "CVE-2024-0340": { + "cmt_msg": "vhost: use kzalloc() instead of kmalloc() followed by memset()" }, - "CVE-2019-17055": { - "cmt_msg": "mISDN: enforce CAP_NET_RAW for raw sockets", - "cmt_id": "f49bd6510620b9cd434b87bea639f07dfde56f09" + "CVE-2019-19523": { + "cmt_msg": "USB: adutux: fix use-after-free on disconnect" }, - "CVE-2019-17054": { - "cmt_msg": "appletalk: enforce CAP_NET_RAW for raw sockets", - "cmt_id": "2d4020439bd19f2a498a7fccd8755521a90b2886" - } - }, - "3.16.78": { - "CVE-2019-19536": { - "cmt_msg": "can: peak_usb: pcan_usb_pro: Fix info-leaks to USB devices", - "cmt_id": "06d7546f7b115a266a9bb81887479f38e166964e" + "CVE-2019-11135": { + "cmt_msg": "x86/msr: Add the IA32_TSX_CTRL MSR" }, - "CVE-2019-19537": { - "cmt_msg": "USB: core: Fix races in character device registration and deregistraion", - "cmt_id": "7e0af4e53ee2cf9b5e4ee761bd8dc4f25a9c885a" + "CVE-2021-27365": { + "cmt_msg": "scsi: iscsi: Ensure sysfs attributes are limited to PAGE_SIZE" }, - "CVE-2019-20934": { - "cmt_msg": "sched/fair: Don't free p->numa_faults with concurrent readers", - "cmt_id": "e65d89d6e78cf1463e755a33e013bde15b894cf5" + "CVE-2021-27364": { + "cmt_msg": "scsi: iscsi: Restrict sessions and handles to admin capabilities" }, - "CVE-2019-19530": { - "cmt_msg": "usb: cdc-acm: make sure a refcount is taken early enough", - "cmt_id": "3a8f54a68c9868ddae64603f2ddee082c1737075" + "CVE-2021-27363": { + "cmt_msg": "scsi: iscsi: Restrict sessions and handles to admin capabilities" }, - "CVE-2019-19531": { - "cmt_msg": "usb: yurex: Fix use-after-free in yurex_delete", - "cmt_id": "8f6204f2adba5354b65bd0f37b8d930e49df6420" - } - }, - "3.16.79": { - "CVE-2019-19062": { - "cmt_msg": "crypto: user - fix memory leak in crypto_report", - "cmt_id": "52373b487ee420c43e1d9d01b4b8c11bb6e9bdbf" + "CVE-2021-20320": { + "cmt_msg": "s390/bpf: Fix optimizing out zero-extensions" }, - "CVE-2019-19056": { - "cmt_msg": "mwifiex: pcie: Fix memory leak in mwifiex_pcie_alloc_cmdrsp_buf", - "cmt_id": "f0eed3b1a34f1e7d8b2c06ad5ddf0ea60aea71ca" + "CVE-2021-20321": { + "cmt_msg": "ovl: fix missing negative dentry check in ovl_rename()" }, - "CVE-2019-19057": { - "cmt_msg": "mwifiex: pcie: Fix memory leak in mwifiex_pcie_init_evt_ring", - "cmt_id": "914927c7bac4ecd2351bdee0cd5b2b1c11150342" + "CVE-2017-18360": { + "cmt_msg": "USB: serial: io_ti: fix div-by-zero in set_termios" }, - "CVE-2019-19066": { - "cmt_msg": "scsi: bfa: release allocated memory in case of error", - "cmt_id": "0669f62b66de87c6628edc6b5e7e7b317a4b8876" + "CVE-2017-5967": { + "cmt_msg": "time: Remove CONFIG_TIMER_STATS" }, - "CVE-2019-19052": { - "cmt_msg": "can: gs_usb: gs_can_open(): prevent memory leak", - "cmt_id": "f26d980434a06f44b693a26a87aa5300fa4016fd" + "CVE-2022-3169": { + "cmt_msg": "nvme: ensure subsystem reset is single threaded" }, - "CVE-2019-19227": { - "cmt_msg": "appletalk: Fix potential NULL pointer dereference in unregister_snap_client", - "cmt_id": "1551894964c90588b285d3a4f7da516e0ee9025a" + "CVE-2019-2054": { + "cmt_msg": "arm/ptrace: run seccomp after ptrace" }, - "CVE-2019-16746": { - "cmt_msg": "nl80211: validate beacon head", - "cmt_id": "9eec2aca63328997846b52e91e88dab94ccd1414" + "CVE-2018-20976": { + "cmt_msg": "xfs: clear sb->s_fs_info on mount failure" }, - "CVE-2019-19534": { - "cmt_msg": "can: peak_usb: fix slab info leak", - "cmt_id": "f13615187cd8069c0f1c492e8f244a0c69d0663e" + "CVE-2023-22995": { + "cmt_msg": "usb: dwc3: dwc3-qcom: Add missing platform_device_put() in dwc3_qcom_acpi_register_core" }, - "CVE-2019-15291": { - "cmt_msg": "media: b2c2-flexcop-usb: add sanity checking", - "cmt_id": "470a2d36f614f40b7f032071cfa6662dfcc1eda4" + "CVE-2021-3542": { + "cmt_msg": "" }, - "CVE-2019-19523": { - "cmt_msg": "USB: adutux: fix use-after-free on disconnect", - "cmt_id": "22cbb8fb12b3b5101260915162ad2b0b56a9284d" + "CVE-2017-16650": { + "cmt_msg": "net: qmi_wwan: fix divide by 0 on bad descriptors" }, - "CVE-2019-2215": { - "cmt_msg": "ANDROID: binder: remove waitqueue when thread exits.", - "cmt_id": "3a593dd8bd7505f9acbc7b6f8928ec6b7978c125" + "CVE-2018-12929": { + "cmt_msg": "" }, - "CVE-2019-19524": { - "cmt_msg": "Input: ff-memless - kill timer in destroy()", - "cmt_id": "8145f2181955c7c95f42a7f71b81ff91bc9e7b8c" + "CVE-2018-12928": { + "cmt_msg": "" }, - "CVE-2019-19527": { - "cmt_msg": "HID: hiddev: do cleanup in failure of opening a device", - "cmt_id": "a2133df2ca08f0d320e651f682f66a1097e6b752" + "CVE-2020-36310": { + "cmt_msg": "KVM: SVM: avoid infinite loop on NPF from bad address" }, - "CVE-2019-19532": { - "cmt_msg": "HID: Fix assumption that devices have inputs", - "cmt_id": "f703c175f8e428959a33cdadb3e09986f14390ce" + "CVE-2020-36313": { + "cmt_msg": "KVM: Fix out of range accesses to memslots" }, - "CVE-2019-19533": { - "cmt_msg": "media: ttusb-dec: Fix info-leak in ttusb_dec_send_command()", - "cmt_id": "89577bea6adf8cd2a1b97c91f7266bb56aa181b0" + "CVE-2020-35519": { + "cmt_msg": "net/x25: prevent a couple of overflows" }, - "CVE-2019-19332": { - "cmt_msg": "KVM: x86: fix out-of-bounds write in KVM_GET_EMULATED_CPUID (CVE-2019-19332)", - "cmt_id": "21377f88c2757c6ee3e28407fb1c44b4bdf7e6b2" + "CVE-2020-10708": { + "cmt_msg": "" }, - "CVE-2019-19528": { - "cmt_msg": "USB: iowarrior: fix use-after-free on disconnect", - "cmt_id": "bc5b704c76044bf22be57e5adcd100d6005115cc" - } - }, - "3.16.80": { - "CVE-2020-10773": { - "cmt_msg": "s390/cmm: fix information leak in cmm_timeout_handler()", - "cmt_id": "c97d5d87f654979c81a36fbd75844a41e5a82cdc" - } - }, - "3.16.81": { - "CVE-2019-19965": { - "cmt_msg": "scsi: libsas: stop discovering if oob mode is disconnected", - "cmt_id": "f4e74a1371c84cca35e53afda50759e2d44e0507" + "CVE-2018-5344": { + "cmt_msg": "loop: fix concurrent lo_open/lo_release" }, - "CVE-2019-19966": { - "cmt_msg": "media: cpia2: Fix use-after-free in cpia2_exit", - "cmt_id": "56c2514ac65214bfcf60b6df324e3a1d2f31e3b2" + "CVE-2017-12153": { + "cmt_msg": "nl80211: check for the required netlink attributes presence" }, - "CVE-2019-14895": { - "cmt_msg": "mwifiex: fix possible heap overflow in mwifiex_process_country_ie()", - "cmt_id": "3b2f9bd867e1a288b470da440992a908c5972644" + "CVE-2017-12154": { + "cmt_msg": "kvm: nVMX: Don't allow L2 to access the hardware CR8" }, - "CVE-2019-18806": { - "cmt_msg": "net: qlogic: Fix memory leak in ql_alloc_large_buffers", - "cmt_id": "e1db96134ab329054b73c4075949053e43ac7208" - } - }, - "3.16.82": { - "CVE-2019-19447": { - "cmt_msg": "ext4: work around deleting a file with i_nlink == 0 safely", - "cmt_id": "75b201c2fdfb3cecc3eb6a1dc85b87055de642e9" - } - }, - "3.16.83": { - "CVE-2020-8649": { - "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region", - "cmt_id": "bca2e2e83484ff63ca82c9c2c905d4e580f1a35a" + "CVE-2022-21499": { + "cmt_msg": "lockdown: also lock down previous kgdb use" }, - "CVE-2020-8648": { - "cmt_msg": "vt: selection, close sel_buffer race", - "cmt_id": "a93c3b40fc3d2264b1b11c469319c7cbefb80c46" + "CVE-2023-20593": { + "cmt_msg": "x86/cpu/amd: Add a Zenbleed fix" }, - "CVE-2019-20636": { - "cmt_msg": "Input: add safety guards to input_set_keycode()", - "cmt_id": "4af47d3cc875e43a523f6d3b3edef2ca785ccf27" + "CVE-2017-5549": { + "cmt_msg": "USB: serial: kl5kusb105: fix line-state error handling" }, - "CVE-2020-8647": { - "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region", - "cmt_id": "bca2e2e83484ff63ca82c9c2c905d4e580f1a35a" + "CVE-2017-5547": { + "cmt_msg": "HID: corsair: fix DMA buffers on stack" }, - "CVE-2020-11668": { - "cmt_msg": "media: xirlink_cit: add missing descriptor sanity checks", - "cmt_id": "9e236e2465ff5858bed537b94b15134e3ba55e75" + "CVE-2022-2380": { + "cmt_msg": "video: fbdev: sm712fb: Fix crash in smtcfb_read()" }, - "CVE-2020-14416": { - "cmt_msg": "can, slip: Protect tty->disc_data in write_wakeup and close with RCU", - "cmt_id": "10912babe0dff14eea532492a6b9c55f1471fd75" + "CVE-2022-0850": { + "cmt_msg": "ext4: fix kernel infoleak via ext4_extent_header" }, - "CVE-2020-14381": { - "cmt_msg": "futex: Fix inode life-time issue", - "cmt_id": "87903c4d3a9b422cd1d254b693e84b95f9df0706" + "CVE-2019-19447": { + "cmt_msg": "ext4: work around deleting a file with i_nlink == 0 safely" }, - "CVE-2020-10690": { - "cmt_msg": "ptp: fix the race between the release of ptp_clock and cdev", - "cmt_id": "5230ef61882d2d14deb846eb6b48370694816e4c" + "CVE-2021-3612": { + "cmt_msg": "Input: joydev - prevent potential read overflow in ioctl" }, - "CVE-2020-0431": { - "cmt_msg": "HID: hid-input: clear unmapped usages", - "cmt_id": "5a1f8cc7d9dde54ab941fc8dbcb4239307d2efb4" + "CVE-2019-19448": { + "cmt_msg": "btrfs: only search for left_info if there is no right_info in try_merge_free_space" }, - "CVE-2019-14896": { - "cmt_msg": "libertas: Fix two buffer overflows at parsing bss descriptor", - "cmt_id": "e4646070f91312414af0ca9332a79b7153150fae" + "CVE-2019-19449": { + "cmt_msg": "f2fs: fix to do sanity check on segment/section count" }, - "CVE-2019-14897": { - "cmt_msg": "libertas: Fix two buffer overflows at parsing bss descriptor", - "cmt_id": "e4646070f91312414af0ca9332a79b7153150fae" + "CVE-2020-11725": { + "cmt_msg": "" }, - "CVE-2019-19768": { - "cmt_msg": "blktrace: Protect q->blk_trace with RCU", - "cmt_id": "4398bce1bdf258f7d67bcc38c46f5fa9546448bd" + "CVE-2023-30456": { + "cmt_msg": "KVM: nVMX: add missing consistency checks for CR0 and CR4" }, - "CVE-2019-14901": { - "cmt_msg": "mwifiex: Fix heap overflow in mmwifiex_process_tdls_action_frame()", - "cmt_id": "ef0449fb4c94e52c1f5f7170b52a738acf9af5ff" + "CVE-2021-35477": { + "cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4" }, - "CVE-2020-0009": { - "cmt_msg": "staging: android: ashmem: Disallow ashmem memory from being remapped", - "cmt_id": "85216b0a3fc5f3eb08e68750175f8507d5608e37" + "CVE-2024-26758": { + "cmt_msg": "md: Don't ignore suspended array in md_check_recovery()" }, - "CVE-2018-14611": { - "cmt_msg": "btrfs: validate type when reading a chunk", - "cmt_id": "cdfef40f9557b91384c392a9150bf0bb2b3802c7" + "CVE-2024-26759": { + "cmt_msg": "mm/swap: fix race when skipping swapcache" }, - "CVE-2018-14610": { - "cmt_msg": "btrfs: Check that each block group has corresponding chunk at mount time", - "cmt_id": "5203a4d55c2c6a0c86a0ab21bfd071d407ca95a1" + "CVE-2022-1729": { + "cmt_msg": "perf: Fix sys_perf_event_open() race against self" }, - "CVE-2018-14613": { - "cmt_msg": "btrfs: tree-checker: Verify block_group_item", - "cmt_id": "df8ecef7a35de12986676edc45fd841e6d788ba8" + "CVE-2024-26752": { + "cmt_msg": "l2tp: pass correct message length to ip6_append_data" }, - "CVE-2018-14612": { - "cmt_msg": "btrfs: tree-checker: Detect invalid and empty essential trees", - "cmt_id": "e3f6c37c31522cc99cea96e0f0f6f536026fb058" + "CVE-2024-26756": { + "cmt_msg": "md: Don't register sync_thread for reshape directly" }, - "CVE-2020-0305": { - "cmt_msg": "chardev: Avoid potential use-after-free in 'chrdev_open()'", - "cmt_id": "6a0a5980a6092c82258858c7588f8bbb36df6026" + "CVE-2021-28038": { + "cmt_msg": "Xen/gnttab: handle p2m update errors on a per-slot basis" }, - "CVE-2020-27418": { - "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region", - "cmt_id": "bca2e2e83484ff63ca82c9c2c905d4e580f1a35a" + "CVE-2020-27068": { + "cmt_msg": "cfg80211: add missing policy for NL80211_ATTR_STATUS_CODE" }, - "CVE-2020-9383": { - "cmt_msg": "floppy: check FDC index for errors before assigning it", - "cmt_id": "2f9ac30a54dc0181ddac3705cdcf4775d863c530" + "CVE-2022-23040": { + "cmt_msg": "xen/xenbus: don't let xenbus_grant_ring() remove grants in error case" }, - "CVE-2020-10942": { - "cmt_msg": "vhost: Check docket sk_family instead of call getname", - "cmt_id": "e4d98e5299b19e1caad03f0b38fd41b046d0de56" + "CVE-2022-2964": { + "cmt_msg": "net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup" }, - "CVE-2015-8839": { - "cmt_msg": "ext4: fix races between page faults and hole punching", - "cmt_id": "81a2281115c28be55d3489c3a79c84db294b722a" + "CVE-2024-26689": { + "cmt_msg": "ceph: prevent use-after-free in encode_cap_msg()" }, - "CVE-2020-11494": { - "cmt_msg": "slcan: Don't transmit uninitialized stack data in padding", - "cmt_id": "08fadc32ce6239dc75fd5e869590e29bc62bbc28" + "CVE-2022-2961": { + "cmt_msg": "" }, - "CVE-2019-5108": { - "cmt_msg": "mac80211: Do not send Layer 2 Update frame before authorization", - "cmt_id": "93864704f211e55eddec0c03ca300b1cf6414d8c" + "CVE-2024-26686": { + "cmt_msg": "fs/proc: do_task_stat: use sig->stats_lock to gather the threads/children stats" }, - "CVE-2019-20812": { - "cmt_msg": "af_packet: set defaule value for tmo", - "cmt_id": "8c1a8e6dba6a09d65ec7eef54ac13e36b7be9536" + "CVE-2024-26687": { + "cmt_msg": "xen/events: close evtchn after mapping cleanup" }, - "CVE-2020-11565": { - "cmt_msg": "mm: mempolicy: require at least one nodeid for MPOL_PREFERRED", - "cmt_id": "7ca9aeb9a22b50841c401164703c5b0a4a510aff" + "CVE-2023-3268": { + "cmt_msg": "relayfs: fix out-of-bounds access in relay_file_read" }, - "CVE-2020-1749": { - "cmt_msg": "net: ipv6_stub: use ip6_dst_lookup_flow instead of ip6_dst_lookup", - "cmt_id": "b9f3e457098ea76f2d69bfc369bae1fd0cf2a6e5" + "CVE-2023-45871": { + "cmt_msg": "igb: set max size RX buffer when store bad packet is enabled" }, - "CVE-2020-2732": { - "cmt_msg": "KVM: nVMX: Don't emulate instructions in guest mode", - "cmt_id": "5d7476c40cd352ec82aec26f6c6d8c413eb2b17b" + "CVE-2020-12114": { + "cmt_msg": "make struct mountpoint bear the dentry reference to mountpoint, not struct mount" }, - "CVE-2020-11608": { - "cmt_msg": "media: ov519: add missing endpoint sanity checks", - "cmt_id": "39a4c51860e9695369b640962be4eb6984175384" + "CVE-2021-4218": { + "cmt_msg": "sysctl: pass kernel pointers to ->proc_handler" }, - "CVE-2020-11609": { - "cmt_msg": "media: stv06xx: add missing descriptor sanity checks", - "cmt_id": "98d33c0103b16e64a6a4788cf81e22baf229f48e" - } - }, - "3.16.84": { - "CVE-2020-12769": { - "cmt_msg": "spi: spi-dw: Add lock protect dw_spi rx/tx to prevent concurrent calls", - "cmt_id": "f358118d34cdd7e898685205bb62e41e9a3246aa" + "CVE-2023-0266": { + "cmt_msg": "ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF" }, - "CVE-2020-12114": { - "cmt_msg": "make struct mountpoint bear the dentry reference to mountpoint, not struct mount", - "cmt_id": "172f22d527862eb5aa9dd767826f5d68562943db" + "CVE-2022-23042": { + "cmt_msg": "xen/netfront: react properly to failing gnttab_end_foreign_access_ref()" }, - "CVE-2020-0404": { - "cmt_msg": "media: uvcvideo: Avoid cyclic entity chains due to malformed USB descriptors", - "cmt_id": "320230e4875672908b1ec29251b13548e16af1ef" - } - }, - "3.16.85": { - "CVE-2019-19319": { - "cmt_msg": "ext4: protect journal inode's blocks using block_validity", - "cmt_id": "51890201da4d654f6ca131bc45a0e892bb10de1d" + "CVE-2019-10142": { + "cmt_msg": "drivers/virt/fsl_hypervisor.c: prevent integer overflow in ioctl" }, - "CVE-2020-0543": { - "cmt_msg": "x86/cpu: Add 'table' argument to cpu_matches()", - "cmt_id": "98a637c406eefe95f2428739c1397f250bb7fadd" + "CVE-2017-11176": { + "cmt_msg": "mqueue: fix a use-after-free in sys_mq_notify()" }, - "CVE-2020-12770": { - "cmt_msg": "scsi: sg: add sg_remove_request in sg_write", - "cmt_id": "f5eb337df20a24a9f9c7f96181ace9d61b590def" + "CVE-2023-52641": { + "cmt_msg": "fs/ntfs3: Add NULL ptr dereference checking at the end of attr_allocate_frame()" }, - "CVE-2020-12652": { - "cmt_msg": "scsi: mptfusion: Fix double fetch bug in ioctl", - "cmt_id": "a226f907bd999713e9349bc35aa133cf519a864e" + "CVE-2021-0399": { + "cmt_msg": "" }, - "CVE-2020-12464": { - "cmt_msg": "USB: core: Fix free-while-in-use bug in the USB S-Glibrary", - "cmt_id": "575f200adca1fe48df15063b1a5673a9b5f713bd" + "CVE-2023-52488": { + "cmt_msg": "serial: sc16is7xx: convert from _raw_ to _noinc_ regmap functions for FIFO" }, - "CVE-2020-0255": { - "cmt_msg": "selinux: properly handle multiple messages in selinux_netlink_send()", - "cmt_id": "9592b90cdc99f58e0674e64037c422ea7e9aa367" + "CVE-2023-52489": { + "cmt_msg": "mm/sparsemem: fix race in accessing memory_section->usage" }, - "CVE-2020-10751": { - "cmt_msg": "selinux: properly handle multiple messages in selinux_netlink_send()", - "cmt_id": "9592b90cdc99f58e0674e64037c422ea7e9aa367" + "CVE-2023-52484": { + "cmt_msg": "iommu/arm-smmu-v3: Fix soft lockup triggered by arm_smmu_mm_invalidate_range" }, - "CVE-2020-12653": { - "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_cmd_append_vsie_tlv()", - "cmt_id": "f0c210c885dbc5000d3c3e27723beedda5988cee" + "CVE-2020-2732": { + "cmt_msg": "KVM: nVMX: Don't emulate instructions in guest mode" }, - "CVE-2020-13143": { - "cmt_msg": "USB: gadget: fix illegal array access in binding with UDC", - "cmt_id": "d126cf46f829d146dde3e6a8963e095ac6cfcd1c" + "CVE-2023-52486": { + "cmt_msg": "drm: Don't unref the same fb many times by mistake due to deadlock handling" }, - "CVE-2017-14991": { - "cmt_msg": "scsi: sg: fixup infoleak when using SG_GET_REQUEST_TABLE", - "cmt_id": "f37de82d22dc41e9748b788655fab4bfea465a02" + "CVE-2023-52480": { + "cmt_msg": "ksmbd: fix race condition between session lookup and expire" }, - "CVE-2020-10732": { - "cmt_msg": "fs/binfmt_elf.c: allocate initialized memory in fill_thread_core_info()", - "cmt_id": "d03daec2e50aa2a0b6de2c3572af5e1d61f9d132" + "CVE-2023-52481": { + "cmt_msg": "arm64: errata: Add Cortex-A520 speculative unprivileged load workaround" }, - "CVE-2020-12654": { - "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_ret_wmm_get_status()", - "cmt_id": "60a613dc22ee9932c3ba67eadb08de357e36f01f" + "CVE-2023-52482": { + "cmt_msg": "x86/srso: Add SRSO mitigation for Hygon processors" }, - "CVE-2020-12826": { - "cmt_msg": "signal: Extend exec_id to 64bits", - "cmt_id": "303c5366d664e0b860041e0647952dafcd71c5a1" - } - }, - "outstanding": { - "CVE-2020-36322": { - "cmt_msg": "fuse: fix bad inode" + "CVE-2023-4128": { + "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free" }, - "CVE-2020-35508": { - "cmt_msg": "fork: fix copy_process(CLONE_PARENT) race with the exiting ->real_parent" + "CVE-2021-47128": { + "cmt_msg": "bpf, lockdown, audit: Fix buggy SELinux lockdown permission checks" }, - "CVE-2020-35501": { - "cmt_msg": "" + "CVE-2017-6214": { + "cmt_msg": "tcp: avoid infinite loop in tcp_splice_read()" }, - "CVE-2021-45095": { - "cmt_msg": "phonet: refcount leak in pep_sock_accep" + "CVE-2018-17182": { + "cmt_msg": "mm: get rid of vmacache_flush_all() entirely" }, - "CVE-2022-3646": { - "cmt_msg": "nilfs2: fix leak of nilfs_root in case of writer thread creation failure" + "CVE-2017-8064": { + "cmt_msg": "[media] dvb-usb-v2: avoid use-after-free" }, - "CVE-2022-0001": { - "cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE" + "CVE-2021-47122": { + "cmt_msg": "net: caif: fix memory leak in caif_device_notify" }, - "CVE-2021-45469": { - "cmt_msg": "f2fs: fix to do sanity check on last xattr entry in __f2fs_setxattr()" + "CVE-2021-47121": { + "cmt_msg": "net: caif: fix memory leak in cfusbl_device_notify" }, - "CVE-2023-3268": { - "cmt_msg": "relayfs: fix out-of-bounds access in relay_file_read" + "CVE-2021-47125": { + "cmt_msg": "sch_htb: fix refcount leak in htb_parent_to_leaf_offload" }, - "CVE-2020-24587": { - "cmt_msg": "mac80211: prevent mixed key and fragment cache attacks" + "CVE-2021-47124": { + "cmt_msg": "io_uring: fix link timeout refs" }, - "CVE-2020-24586": { - "cmt_msg": "mac80211: prevent mixed key and fragment cache attacks" + "CVE-2019-15118": { + "cmt_msg": "ALSA: usb-audio: Fix a stack buffer overflow bug in check_input_term" }, - "CVE-2021-0129": { - "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical" + "CVE-2019-12818": { + "cmt_msg": "net: nfc: Fix NULL dereference on nfc_llcp_build_tlv fails" }, - "CVE-2020-24588": { - "cmt_msg": "cfg80211: mitigate A-MSDU aggregation attacks" + "CVE-2019-12819": { + "cmt_msg": "mdio_bus: Fix use-after-free on device_register fails" }, - "CVE-2018-10087": { - "cmt_msg": "kernel/exit.c: avoid undefined behaviour when calling wait4()" + "CVE-2023-0394": { + "cmt_msg": "ipv6: raw: Deduct extension header length in rawv6_push_pending_frames" }, - "CVE-2020-36158": { - "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_cmd_802_11_ad_hoc_start" + "CVE-2019-19332": { + "cmt_msg": "KVM: x86: fix out-of-bounds write in KVM_GET_EMULATED_CPUID (CVE-2019-19332)" }, - "CVE-2023-3159": { - "cmt_msg": "firewire: fix potential uaf in outbound_phy_packet_callback()" + "CVE-2019-15117": { + "cmt_msg": "ALSA: usb-audio: Fix an OOB bug in parse_audio_mixer_unit" }, - "CVE-2022-0480": { - "cmt_msg": "memcg: enable accounting for file lock caches" + "CVE-2022-25258": { + "cmt_msg": "USB: gadget: validate interface OS descriptor requests" }, - "CVE-2018-10124": { - "cmt_msg": "kernel/signal.c: avoid undefined behaviour in kill_something_info" + "CVE-2020-3702": { + "cmt_msg": "ath: Use safer key clearing with key cache entries" }, - "CVE-2022-0487": { - "cmt_msg": "moxart: fix potential use-after-free on remove path" + "CVE-2023-3117": { + "cmt_msg": "netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE" }, - "CVE-2023-52429": { - "cmt_msg": "dm: limit the number of targets and parameter size area" + "CVE-2023-3111": { + "cmt_msg": "btrfs: unset reloc control if transaction commit fails in prepare_to_relocate()" }, - "CVE-2021-0920": { - "cmt_msg": "af_unix: fix garbage collect vs MSG_PEEK" + "CVE-2019-3882": { + "cmt_msg": "vfio/type1: Limit DMA mappings per container" }, - "CVE-2022-23825": { + "CVE-2024-24861": { + "cmt_msg": "media: xc4000: Fix atomicity violation in xc4000_get_frequency" + }, + "CVE-2019-18675": { + "cmt_msg": "mmap: introduce sane default mmap limits" + }, + "CVE-2024-24864": { "cmt_msg": "" }, - "CVE-2024-26588": { - "cmt_msg": "LoongArch: BPF: Prevent out-of-bounds memory access" + "CVE-2017-9605": { + "cmt_msg": "drm/vmwgfx: Make sure backup_handle is always valid" }, - "CVE-2022-21125": { - "cmt_msg": "x86/speculation/mmio: Reuse SRBDS mitigation for SBDS" + "CVE-2022-36946": { + "cmt_msg": "netfilter: nf_queue: do not allow packet truncation below transport header offset" }, - "CVE-2019-19241": { - "cmt_msg": "io_uring: async workers should inherit the user creds" + "CVE-2016-4482": { + "cmt_msg": "USB: usbfs: fix potential infoleak in devio" }, - "CVE-2022-21123": { - "cmt_msg": "x86/speculation/mmio: Add mitigation for Processor MMIO Stale Data" + "CVE-2018-19824": { + "cmt_msg": "ALSA: usb-audio: Fix UAF decrement if card has no live interfaces in card.c" }, - "CVE-2021-28688": { - "cmt_msg": "xen-blkback: don't leak persistent grants from xen_blkbk_map()" + "CVE-2022-21166": { + "cmt_msg": "x86/speculation/mmio: Enable CPU Fill buffer clearing on idle" }, - "CVE-2021-39686": { - "cmt_msg": "binder: use euid from cred instead of using task" + "CVE-2016-9191": { + "cmt_msg": "sysctl: Drop reference added by grab_header in proc_sys_readdir" }, - "CVE-2021-39685": { - "cmt_msg": "USB: gadget: detect too-big endpoint 0 requests" + "CVE-2021-29650": { + "cmt_msg": "netfilter: x_tables: Use correct memory barriers." }, - "CVE-2021-43975": { - "cmt_msg": "atlantic: Fix OOB read and write in hw_atl_utils_fw_rpc_wait" + "CVE-2018-20169": { + "cmt_msg": "USB: check usb_get_extra_descriptor for proper size" }, - "CVE-2021-43976": { - "cmt_msg": "mwifiex: Fix skb_over_panic in mwifiex_usb_recv()" + "CVE-2016-9644": { + "cmt_msg": "x86/mm: Expand the exception table logic to allow new handling options" }, - "CVE-2020-0466": { - "cmt_msg": "do_epoll_ctl(): clean the failure exits up a bit" + "CVE-2022-28356": { + "cmt_msg": "llc: fix netdevice reference leaks in llc_ui_bind()" }, - "CVE-2023-0459": { - "cmt_msg": "uaccess: Add speculation barrier to copy_from_user()" + "CVE-2018-5750": { + "cmt_msg": "ACPI: sbshc: remove raw pointer from printk() message" }, - "CVE-2023-0458": { - "cmt_msg": "prlimit: do_prlimit needs to have a speculation check" + "CVE-2022-20166": { + "cmt_msg": "drivers core: Use sysfs_emit and sysfs_emit_at for show(device *...) functions" }, - "CVE-2023-0597": { - "cmt_msg": "x86/mm: Randomize per-cpu entry area" + "CVE-2019-10220": { + "cmt_msg": "Convert filldir[64]() from __put_user() to unsafe_put_user()" }, - "CVE-2019-12379": { - "cmt_msg": "consolemap: Fix a memory leaking bug in drivers/tty/vt/consolemap.c" + "CVE-2021-44879": { + "cmt_msg": "f2fs: fix to do sanity check on inode type during garbage collection" }, - "CVE-2019-12378": { - "cmt_msg": "ipv6_sockglue: Fix a missing-check bug in ip6_ra_control()" + "CVE-2020-9383": { + "cmt_msg": "floppy: check FDC index for errors before assigning it" }, - "CVE-2021-30002": { - "cmt_msg": "media: v4l: ioctl: Fix memory leak in video_usercopy" + "CVE-2017-5970": { + "cmt_msg": "ipv4: keep skb->dst around in presence of IP options" }, - "CVE-2021-0941": { - "cmt_msg": "bpf: Remove MTU check in __bpf_skb_max_len" + "CVE-2023-1513": { + "cmt_msg": "kvm: initialize all of the kvm_debugregs structure before sending it to userspace" }, - "CVE-2015-4176": { - "cmt_msg": "mnt: Update detach_mounts to leave mounts connected" + "CVE-2021-26401": { + "cmt_msg": "x86/speculation: Use generic retpoline by default on AMD" }, - "CVE-2024-26591": { - "cmt_msg": "bpf: Fix re-attachment branch in bpf_tracing_prog_attach" + "CVE-2021-3847": { + "cmt_msg": "" }, - "CVE-2020-15802": { + "CVE-2019-9445": { + "cmt_msg": "f2fs: check if file namelen exceeds max value" + }, + "CVE-2019-20934": { + "cmt_msg": "sched/fair: Don't free p->numa_faults with concurrent readers" + }, + "CVE-2011-4916": { "cmt_msg": "" }, - "CVE-2024-26594": { - "cmt_msg": "ksmbd: validate mech token in session setup" + "CVE-2023-23039": { + "cmt_msg": "" }, - "CVE-2023-4623": { - "cmt_msg": "net/sched: sch_hfsc: Ensure inner classes have fsc curve" + "CVE-2017-16646": { + "cmt_msg": "media: dib0700: fix invalid dvb_detach argument" }, - "CVE-2022-3636": { - "cmt_msg": "net: ethernet: mtk_eth_soc: use after free in __mtk_ppe_check_skb()" + "CVE-2017-16645": { + "cmt_msg": "Input: ims-psu - check if CDC union descriptor is sane" }, - "CVE-2022-3635": { - "cmt_msg": "atm: idt77252: fix use-after-free bugs caused by tst_timer" + "CVE-2017-16643": { + "cmt_msg": "Input: gtco - fix potential out-of-bound access" }, - "CVE-2022-0002": { - "cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE" + "CVE-2019-5489": { + "cmt_msg": "Change mincore() to count \"mapped\" pages rather than \"cached\" pages" }, - "CVE-2015-4178": { - "cmt_msg": "fs_pin: Allow for the possibility that m_list or s_list go unused." + "CVE-2017-16649": { + "cmt_msg": "net: cdc_ether: fix divide by 0 on bad descriptors" }, - "CVE-2022-40982": { - "cmt_msg": "x86/speculation: Add Gather Data Sampling mitigation" + "CVE-2017-16648": { + "cmt_msg": "dvb_frontend: don't use-after-free the frontend struct" }, - "CVE-2022-3202": { - "cmt_msg": "jfs: prevent NULL deref in diFree" + "CVE-2020-36322": { + "cmt_msg": "fuse: fix bad inode" }, - "CVE-2018-3646": { - "cmt_msg": "x86/microcode: Allow late microcode loading with SMT disabled" + "CVE-2020-10711": { + "cmt_msg": "netlabel: cope with NULL catmap" }, - "CVE-2021-39714": { - "cmt_msg": "staging: android: ion: Drop ion_map_kernel interface" + "CVE-2020-35508": { + "cmt_msg": "fork: fix copy_process(CLONE_PARENT) race with the exiting ->real_parent" }, - "CVE-2024-24861": { + "CVE-2020-35501": { "cmt_msg": "" }, - "CVE-2021-28711": { - "cmt_msg": "xen/blkfront: harden blkfront against event channel storms" + "CVE-2021-45095": { + "cmt_msg": "phonet: refcount leak in pep_sock_accep" }, - "CVE-2018-14614": { - "cmt_msg": "f2fs: fix to do sanity check with cp_pack_start_sum" + "CVE-2024-26685": { + "cmt_msg": "nilfs2: fix potential bug in end_buffer_async_write" }, - "CVE-2018-14616": { - "cmt_msg": "f2fs: fix to do sanity check with block address in main area v2" + "CVE-2021-32399": { + "cmt_msg": "bluetooth: eliminate the potential race condition when removing the HCI controller" }, - "CVE-2023-2007": { - "cmt_msg": "scsi: dpt_i2o: Remove obsolete driver" + "CVE-2017-1000410": { + "cmt_msg": "Bluetooth: Prevent stack info leak from the EFS element." + }, + "CVE-2022-32250": { + "cmt_msg": "netfilter: nf_tables: disallow non-stateful expression in sets earlier" + }, + "CVE-2016-8650": { + "cmt_msg": "mpi: Fix NULL ptr dereference in mpi_powm() " + }, + "CVE-2017-5551": { + "cmt_msg": "tmpfs: clear S_ISGID when setting posix ACLs" + }, + "CVE-2021-28688": { + "cmt_msg": "xen-blkback: don't leak persistent grants from xen_blkbk_map()" + }, + "CVE-2018-10878": { + "cmt_msg": "ext4: always check block group bounds in ext4_init_block_bitmap()" + }, + "CVE-2019-12379": { + "cmt_msg": "consolemap: Fix a memory leaking bug in drivers/tty/vt/consolemap.c" + }, + "CVE-2019-12378": { + "cmt_msg": "ipv6_sockglue: Fix a missing-check bug in ip6_ra_control()" + }, + "CVE-2017-6001": { + "cmt_msg": "perf/core: Fix concurrent sys_perf_event_open() vs. 'move_group' race" + }, + "CVE-2017-7895": { + "cmt_msg": "nfsd: stricter decoding of write-like NFSv2/v3 ops" }, "CVE-2020-26145": { "cmt_msg": "ath10k: drop fragments with multicast DA for PCIe" }, + "CVE-2017-13216": { + "cmt_msg": "staging: android: ashmem: fix a race condition in ASHMEM_SET_SIZE ioctl" + }, "CVE-2020-26147": { "cmt_msg": "mac80211: assure all fragments are encrypted" }, @@ -50215,35 +83945,29 @@ "CVE-2020-26142": { "cmt_msg": "" }, - "CVE-2023-1074": { - "cmt_msg": "sctp: fail if no bound addresses can be used for a given scope" - }, - "CVE-2023-1077": { - "cmt_msg": "sched/rt: pick_next_rt_entity(): check list_entry" - }, - "CVE-2023-46838": { - "cmt_msg": "xen-netback: don't produce zero-size SKB frags" + "CVE-2019-17053": { + "cmt_msg": "ieee802154: enforce CAP_NET_RAW for raw sockets" }, - "CVE-2023-51780": { - "cmt_msg": "atm: Fix Use-After-Free in do_vcc_ioctl" + "CVE-2019-17052": { + "cmt_msg": "ax25: enforce CAP_NET_RAW for raw sockets" }, - "CVE-2023-40283": { - "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb" + "CVE-2019-17056": { + "cmt_msg": "nfc: enforce CAP_NET_RAW for raw sockets" }, - "CVE-2023-1073": { - "cmt_msg": "HID: check empty report_list in hid_validate_values()" + "CVE-2019-17055": { + "cmt_msg": "mISDN: enforce CAP_NET_RAW for raw sockets" }, - "CVE-2023-51781": { - "cmt_msg": "appletalk: Fix Use-After-Free in atalk_ioctl" + "CVE-2019-17054": { + "cmt_msg": "appletalk: enforce CAP_NET_RAW for raw sockets" }, - "CVE-2018-13096": { - "cmt_msg": "f2fs: fix to do sanity check with node footer and iblocks" + "CVE-2024-26745": { + "cmt_msg": "powerpc/pseries/iommu: IOMMU table is not initialized for kdump over SR-IOV" }, - "CVE-2018-13097": { - "cmt_msg": "f2fs: fix to do sanity check with user_block_count" + "CVE-2024-26744": { + "cmt_msg": "RDMA/srpt: Support specifying the srpt_service_guid parameter" }, - "CVE-2018-13095": { - "cmt_msg": "xfs: More robust inode extent count validation" + "CVE-2024-26743": { + "cmt_msg": "RDMA/qedr: Fix qedr_create_user_qp error flow" }, "CVE-2020-29661": { "cmt_msg": "tty: Fix ->pgrp locking in tiocspgrp()" @@ -50251,80 +83975,68 @@ "CVE-2020-29660": { "cmt_msg": "tty: Fix ->session locking" }, - "CVE-2018-13098": { - "cmt_msg": "f2fs: fix to do sanity check with extra_attr feature" - }, - "CVE-2018-13099": { - "cmt_msg": "f2fs: fix to do sanity check with reserved blkaddr of inline inode" + "CVE-2022-1734": { + "cmt_msg": "nfc: nfcmrvl: main: reorder destructive operations in nfcmrvl_nci_unregister_dev to avoid bugs" }, - "CVE-2014-9717": { - "cmt_msg": "mnt: Update detach_mounts to leave mounts connected" + "CVE-2024-26748": { + "cmt_msg": "usb: cdns3: fix memory double free when handle zero packet" }, "CVE-2023-28772": { "cmt_msg": "seq_buf: Fix overflow in seq_buf_putmem_hex()" }, - "CVE-2019-19074": { - "cmt_msg": "ath9k: release allocated buffer if timed out" - }, - "CVE-2019-19073": { - "cmt_msg": "ath9k_htc: release allocated buffer if timed out" - }, - "CVE-2022-2503": { - "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag" - }, - "CVE-2019-18680": { - "cmt_msg": "" + "CVE-2015-8952": { + "cmt_msg": "ext2: convert to mbcache2" }, - "CVE-2022-23038": { - "cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()" + "CVE-2024-26699": { + "cmt_msg": "drm/amd/display: Fix array-index-out-of-bounds in dcn35_clkmgr" }, - "CVE-2022-23039": { - "cmt_msg": "xen/gntalloc: don't use gnttab_query_foreign_access()" + "CVE-2024-26691": { + "cmt_msg": "KVM: arm64: Fix circular locking dependency" }, - "CVE-2021-45868": { - "cmt_msg": "quota: check block number when reading the block in quota file" + "CVE-2024-26697": { + "cmt_msg": "nilfs2: fix data corruption in dsync block recovery for small block sizes" }, - "CVE-2022-20158": { - "cmt_msg": "net/packet: fix slab-out-of-bounds access in packet_recvmsg()" + "CVE-2024-26696": { + "cmt_msg": "nilfs2: fix hang in nilfs_lookup_dirty_data_buffers()" }, - "CVE-2022-23037": { - "cmt_msg": "xen/netfront: don't use gnttab_query_foreign_access() for mapped status" + "CVE-2019-15927": { + "cmt_msg": "ALSA: usb-audio: Avoid access before bLength check in build_audio_procunit()" }, - "CVE-2023-2176": { - "cmt_msg": "RDMA/core: Refactor rdma_bind_addr" + "CVE-2019-15926": { + "cmt_msg": "ath6kl: add some bounds checking" }, "CVE-2021-38160": { "cmt_msg": "virtio_console: Assure used length from device is limited" }, - "CVE-2021-42008": { - "cmt_msg": "net: 6pack: fix slab-out-of-bounds in decode_data" - }, - "CVE-2022-39188": { - "cmt_msg": "mmu_gather: Force tlb-flush VM_PFNMAP vmas" + "CVE-2019-15219": { + "cmt_msg": "USB: sisusbvga: fix oops in error path of sisusb_probe" }, - "CVE-2020-25643": { - "cmt_msg": "hdlc_ppp: add range checks in ppp_cp_parse_cr()" + "CVE-2019-15218": { + "cmt_msg": "media: usb: siano: Fix general protection fault in smsusb" }, "CVE-2005-3660": { "cmt_msg": "" }, - "CVE-2023-31085": { - "cmt_msg": "ubi: Refuse attaching if mtd's erasesize is 0" + "CVE-2017-14106": { + "cmt_msg": "tcp: initialize rcv_mss to TCP_MIN_MSS instead of 0" }, - "CVE-2023-31084": { - "cmt_msg": "media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*()" + "CVE-2019-15212": { + "cmt_msg": "USB: rio500: refuse more than one device at a time" }, - "CVE-2023-31083": { - "cmt_msg": "Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO" + "CVE-2019-15211": { + "cmt_msg": "media: radio-raremono: change devm_k*alloc to k*alloc" }, - "CVE-2023-31082": { - "cmt_msg": "" + "CVE-2019-15217": { + "cmt_msg": "media: usb:zr364xx:Fix KASAN:null-ptr-deref Read in zr364xx_vidioc_querycap" }, - "CVE-2023-31081": { - "cmt_msg": "" + "CVE-2019-15216": { + "cmt_msg": "USB: yurex: Fix protection fault after device removal" }, - "CVE-2021-33034": { - "cmt_msg": "Bluetooth: verify AMP hci_chan before amp_destroy" + "CVE-2017-1000380": { + "cmt_msg": "ALSA: timer: Fix race between read and ioctl" + }, + "CVE-2019-15214": { + "cmt_msg": "ALSA: core: Fix card races between register and disconnect" }, "CVE-2019-19922": { "cmt_msg": "sched/fair: Fix low cpu usage with high throttling by removing expiration of cpu-local slices" @@ -50332,83 +84044,41 @@ "CVE-2019-19927": { "cmt_msg": "drm/ttm: fix incrementing the page pointer for huge pages" }, - "CVE-2020-27066": { - "cmt_msg": "xfrm: policy: Fix doulbe free in xfrm_policy_timer" - }, - "CVE-2020-27068": { - "cmt_msg": "cfg80211: add missing policy for NL80211_ATTR_STATUS_CODE" - }, - "CVE-2022-32296": { - "cmt_msg": "tcp: increase source port perturb table to 2^16" - }, - "CVE-2020-28974": { - "cmt_msg": "vt: Disable KD_FONT_OP_COPY" - }, - "CVE-2023-3567": { - "cmt_msg": "vc_screen: move load of struct vc_data pointer in vcs_read() to avoid UAF" - }, - "CVE-2019-20806": { - "cmt_msg": "media: tw5864: Fix possible NULL pointer dereference in tw5864_handle_frame" - }, - "CVE-2022-3028": { - "cmt_msg": "af_key: Do not call xfrm_probe_algs in parallel" - }, - "CVE-2020-14304": { - "cmt_msg": "" - }, - "CVE-2020-14305": { - "cmt_msg": "netfilter: helpers: remove data_len usage for inkernel helpers" - }, - "CVE-2020-15393": { - "cmt_msg": "usb: usbtest: fix missing kfree(dev->buf) in usbtest_disconnect" + "CVE-2023-52640": { + "cmt_msg": "fs/ntfs3: Fix oob in ntfs_listxattr" }, - "CVE-2022-33981": { - "cmt_msg": "floppy: disable FDRAWCMD by default" + "CVE-2023-52498": { + "cmt_msg": "PM: sleep: Fix possible deadlocks in core system-wide PM code" }, - "CVE-2021-3564": { - "cmt_msg": "Bluetooth: fix the erroneous flush_work() order" + "CVE-2022-2318": { + "cmt_msg": "net: rose: fix UAF bugs caused by timer handler" }, "CVE-2023-3611": { "cmt_msg": "net/sched: sch_qfq: account for stab overhead in qfq_enqueue" }, - "CVE-2017-16995": { - "cmt_msg": "bpf: fix incorrect sign extension in check_alu_op()" - }, - "CVE-2019-2025": { - "cmt_msg": "binder: fix race that allows malicious free of live buffer" - }, "CVE-2020-26560": { "cmt_msg": "" }, "CVE-2023-4134": { "cmt_msg": "Input: cyttsp4_core - change del_timer_sync() to timer_shutdown_sync()" }, - "CVE-2023-39198": { - "cmt_msg": "drm/qxl: fix UAF on handle creation" - }, - "CVE-2018-12127": { - "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" + "CVE-2017-9077": { + "cmt_msg": "ipv6/dccp: do not inherit ipv6_mc_list from parent" }, - "CVE-2018-12126": { - "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" + "CVE-2017-9076": { + "cmt_msg": "ipv6/dccp: do not inherit ipv6_mc_list from parent" }, - "CVE-2023-37454": { - "cmt_msg": "" + "CVE-2017-9075": { + "cmt_msg": "sctp: do not inherit ipv6_{mc|ac|fl}_list from parent" }, - "CVE-2023-35824": { - "cmt_msg": "media: dm1105: Fix use after free bug in dm1105_remove due to race condition" + "CVE-2017-9074": { + "cmt_msg": "ipv6: Prevent overrun when parsing v6 header options" }, "CVE-2022-20572": { "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag" }, - "CVE-2023-39197": { - "cmt_msg": "netfilter: conntrack: dccp: copy entire header to stack buffer, not just basic one" - }, - "CVE-2021-28964": { - "cmt_msg": "btrfs: fix race when cloning extent buffer during rewind of an old root" - }, - "CVE-2020-13974": { - "cmt_msg": "vt: keyboard: avoid signed integer overflow in k_ascii" + "CVE-2022-42703": { + "cmt_msg": "mm/rmap: Fix anon_vma->degree ambiguity leading to double-reuse" }, "CVE-2021-4083": { "cmt_msg": "fget: check that the fd still exists after getting a ref to it" @@ -50416,41 +84086,29 @@ "CVE-2023-33288": { "cmt_msg": "power: supply: bq24190: Fix use after free bug in bq24190_remove due to race condition" }, - "CVE-2022-29900": { - "cmt_msg": "x86/kvm/vmx: Make noinstr clean" + "CVE-2017-1000251": { + "cmt_msg": "Bluetooth: Properly check L2CAP config option output buffer length" + }, + "CVE-2017-1000252": { + "cmt_msg": "KVM: VMX: Do not BUG() on out-of-bounds guest IRQ" }, "CVE-2022-29901": { "cmt_msg": "x86/kvm/vmx: Make noinstr clean" }, - "CVE-2023-3108": { - "cmt_msg": "crypto: fix af_alg_make_sg() conversion to iov_iter" - }, - "CVE-2023-3161": { - "cmt_msg": "fbcon: Check font dimension limits" - }, - "CVE-2018-9465": { - "cmt_msg": "binder: fix proc->files use-after-free" - }, - "CVE-2020-15437": { - "cmt_msg": "serial: 8250: fix null-ptr-deref in serial8250_start_tx()" + "CVE-2023-52485": { + "cmt_msg": "drm/amd/display: Wake DMCUB before sending a command" }, - "CVE-2020-15436": { - "cmt_msg": "block: Fix use-after-free in blkdev_get()" - }, - "CVE-2022-1116": { - "cmt_msg": "" - }, - "CVE-2021-28660": { - "cmt_msg": "staging: rtl8188eu: prevent ->ssid overflow in rtw_wx_set_scan()" + "CVE-2023-3106": { + "cmt_msg": "xfrm: fix crash in XFRM_MSG_GETSA netlink handler" }, - "CVE-2016-9178": { - "cmt_msg": "fix minor infoleak in get_user_ex()" + "CVE-2018-20511": { + "cmt_msg": "net/appletalk: fix minor pointer leak to userspace in SIOCFINDIPDDPRT" }, - "CVE-2022-23816": { - "cmt_msg": "x86/kvm/vmx: Make noinstr clean" + "CVE-2018-20510": { + "cmt_msg": "binder: replace \"%p\" with \"%pK\"" }, - "CVE-2019-0154": { - "cmt_msg": "drm/i915: Lower RM timeout to avoid DSI hard hangs" + "CVE-2016-5728": { + "cmt_msg": "misc: mic: Fix for double fetch security bug in VOP driver" }, "CVE-2022-3567": { "cmt_msg": "ipv6: Fix data races around sk->sk_prot." @@ -50464,12778 +84122,12785 @@ "CVE-2022-3564": { "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free caused by l2cap_reassemble_sdu" }, - "CVE-2020-36386": { - "cmt_msg": "Bluetooth: Fix slab-out-of-bounds read in hci_extended_inquiry_result_evt()" - }, "CVE-2020-36385": { "cmt_msg": "RDMA/ucma: Rework ucma_migrate_id() to avoid races with destroy" }, - "CVE-2022-3628": { - "cmt_msg": "wifi: brcmfmac: Fix potential buffer overflow in brcmf_fweh_event_worker()" + "CVE-2018-7480": { + "cmt_msg": "blkcg: fix double free of new_blkg in blkcg_init_queue" }, - "CVE-2022-1048": { - "cmt_msg": "ALSA: pcm: Fix races among concurrent hw_params and hw_free calls" + "CVE-2023-0030": { + "cmt_msg": "drm/nouveau/mmu: add more general vmm free/node handling functions" }, - "CVE-2023-52340": { - "cmt_msg": "ipv6: remove max_size check inline with ipv4" + "CVE-2019-11599": { + "cmt_msg": "coredump: fix race condition between mmget_not_zero()/get_task_mm() and core dumping" }, - "CVE-2018-7480": { - "cmt_msg": "blkcg: fix double free of new_blkg in blkcg_init_queue" + "CVE-2019-2101": { + "cmt_msg": "media: uvcvideo: Fix 'type' check leading to overflow" }, - "CVE-2019-14615": { - "cmt_msg": "drm/i915/gen9: Clear residual context state on context switch" + "CVE-2019-3459": { + "cmt_msg": "Bluetooth: Verify that l2cap_get_conf_opt provides large enough buffer" }, - "CVE-2016-3139": { - "cmt_msg": "Input: wacom - compute the HID report size to get the actual packet size" + "CVE-2020-0444": { + "cmt_msg": "audit: fix error handling in audit_data_to_entry()" }, - "CVE-2023-0030": { - "cmt_msg": "drm/nouveau/mmu: add more general vmm free/node handling functions" + "CVE-2017-16526": { + "cmt_msg": "uwb: properly check kthread_run return value" }, - "CVE-2020-16120": { - "cmt_msg": "ovl: switch to mounter creds in readdir" + "CVE-2017-16527": { + "cmt_msg": "ALSA: usb-audio: Kill stray URB at exiting" }, - "CVE-2024-0775": { - "cmt_msg": "ext4: improve error recovery code paths in __ext4_remount()" + "CVE-2017-16525": { + "cmt_msg": "USB: serial: console: fix use-after-free after failed setup" }, - "CVE-2022-1204": { - "cmt_msg": "ax25: Fix refcount leaks caused by ax25_cb_del()" + "CVE-2022-1836": { + "cmt_msg": "floppy: disable FDRAWCMD by default" }, - "CVE-2023-1611": { - "cmt_msg": "btrfs: fix race between quota disable and quota assign ioctls" + "CVE-2017-16528": { + "cmt_msg": "ALSA: seq: Cancel pending autoload work at unbinding device" }, - "CVE-2016-10723": { - "cmt_msg": "mm, oom: remove sleep from under oom_lock" + "CVE-2017-16529": { + "cmt_msg": "ALSA: usb-audio: Check out-of-bounds access by corrupted buffer descriptor" }, - "CVE-2019-19036": { - "cmt_msg": "btrfs: Detect unbalanced tree with empty leaf before crashing btree operations" + "CVE-2019-2215": { + "cmt_msg": "ANDROID: binder: remove waitqueue when thread exits." }, - "CVE-2021-34693": { - "cmt_msg": "can: bcm: fix infoleak in struct bcm_msg_head" + "CVE-2019-2213": { + "cmt_msg": "binder: fix possible UAF when freeing buffer" }, - "CVE-2023-22995": { - "cmt_msg": "usb: dwc3: dwc3-qcom: Add missing platform_device_put() in dwc3_qcom_acpi_register_core" + "CVE-2018-1087": { + "cmt_msg": "kvm/x86: fix icebp instruction handling" }, - "CVE-2019-19039": { - "cmt_msg": "btrfs: Don't submit any btree write bio if the fs has errors" + "CVE-2017-8065": { + "cmt_msg": "crypto: ccm - move cbcmac input off the stack" }, - "CVE-2022-1974": { - "cmt_msg": "nfc: replace improper check device_is_registered() in netlink related functions" + "CVE-2019-19049": { + "cmt_msg": "of: unittest: fix memory leak in unittest_data_add" }, - "CVE-2020-8832": { - "cmt_msg": "drm/i915: Record the default hw state after reset upon load" + "CVE-2018-13053": { + "cmt_msg": "alarmtimer: Prevent overflow for relative nanosleep" }, - "CVE-2022-1836": { - "cmt_msg": "floppy: disable FDRAWCMD by default" + "CVE-2023-23559": { + "cmt_msg": "wifi: rndis_wlan: Prevent buffer overflow in rndis_query_oid" }, - "CVE-2021-32078": { - "cmt_msg": "ARM: footbridge: remove personal server platform" + "CVE-2020-10720": { + "cmt_msg": "net-gro: fix use-after-free read in napi_gro_frags()" }, - "CVE-2017-16528": { - "cmt_msg": "ALSA: seq: Cancel pending autoload work at unbinding device" + "CVE-2022-20369": { + "cmt_msg": "media: v4l2-mem2mem: Apply DST_QUEUE_OFF_BASE on MMAP buffers across ioctls" }, - "CVE-2022-4662": { - "cmt_msg": "USB: core: Prevent nested device-reset calls" + "CVE-2022-20368": { + "cmt_msg": "net/packet: fix slab-out-of-bounds access in packet_recvmsg()" }, - "CVE-2021-38204": { - "cmt_msg": "usb: max-3421: Prevent corruption of freed memory" + "CVE-2022-3424": { + "cmt_msg": "misc: sgi-gru: fix use-after-free error in gru_set_context_option, gru_fault and gru_handle_user_call_os" }, - "CVE-2021-38205": { - "cmt_msg": "net: xilinx_emaclite: Do not print real IOMEM pointer" + "CVE-2016-2188": { + "cmt_msg": "USB: iowarrior: fix NULL-deref at probe" }, - "CVE-2021-3864": { + "CVE-2017-1000405": { + "cmt_msg": "mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d()" + }, + "CVE-2017-1000407": { + "cmt_msg": "KVM: VMX: remove I/O port 0x80 bypass on Intel hosts" + }, + "CVE-2022-24448": { + "cmt_msg": "NFSv4: Handle case where the lookup of a directory fails" + }, + "CVE-2020-0427": { + "cmt_msg": "pinctrl: devicetree: Avoid taking direct reference to device name string" + }, + "CVE-2020-26088": { + "cmt_msg": "net/nfc/rawsock.c: add CAP_NET_RAW check." + }, + "CVE-2008-2544": { "cmt_msg": "" }, - "CVE-2023-39189": { - "cmt_msg": "netfilter: nfnetlink_osf: avoid OOB read" + "CVE-2023-2248": { + "cmt_msg": "net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg" }, - "CVE-2023-35001": { - "cmt_msg": "netfilter: nf_tables: prevent OOB access in nft_byteorder_eval" + "CVE-2023-30772": { + "cmt_msg": "power: supply: da9150: Fix use after free bug in da9150_charger_remove due to race condition" }, - "CVE-2021-38208": { - "cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect" + "CVE-2017-18017": { + "cmt_msg": "netfilter: xt_TCPMSS: add more sanity tests on tcph->doff" }, - "CVE-2017-18232": { - "cmt_msg": "scsi: libsas: direct call probe and destruct" + "CVE-2021-3679": { + "cmt_msg": "tracing: Fix bug in rb_per_cpu_empty() that might cause deadloop." }, - "CVE-2019-2213": { - "cmt_msg": "binder: fix possible UAF when freeing buffer" + "CVE-2022-2586": { + "cmt_msg": "netfilter: nf_tables: do not allow SET_ID to refer to another table" }, - "CVE-2020-25211": { - "cmt_msg": "netfilter: ctnetlink: add a range check for l3/l4 protonum" + "CVE-2016-7042": { + "cmt_msg": "KEYS: Fix short sprintf buffer in /proc/keys show function" }, - "CVE-2020-25212": { - "cmt_msg": "nfs: Fix getxattr kernel panic and memory overflow" + "CVE-2021-39714": { + "cmt_msg": "staging: android: ion: Drop ion_map_kernel interface" }, - "CVE-2020-26556": { - "cmt_msg": "" + "CVE-2023-51782": { + "cmt_msg": "net/rose: Fix Use-After-Free in rose_ioctl" }, - "CVE-2020-26557": { - "cmt_msg": "" + "CVE-2023-51780": { + "cmt_msg": "atm: Fix Use-After-Free in do_vcc_ioctl" }, - "CVE-2020-26555": { - "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical" + "CVE-2023-51781": { + "cmt_msg": "appletalk: Fix Use-After-Free in atalk_ioctl" }, - "CVE-2019-20794": { - "cmt_msg": "" + "CVE-2022-2588": { + "cmt_msg": "net_sched: cls_route: remove from list when handle is 0" }, - "CVE-2020-26559": { - "cmt_msg": "" + "CVE-2019-18885": { + "cmt_msg": "btrfs: merge btrfs_find_device and find_device" }, - "CVE-2023-3397": { - "cmt_msg": "" + "CVE-2017-7889": { + "cmt_msg": "mm: Tighten x86 /dev/mem with zeroing reads" }, - "CVE-2018-1128": { - "cmt_msg": "libceph: add authorizer challenge" + "CVE-2017-14489": { + "cmt_msg": "scsi: scsi_transport_iscsi: fix the issue that iscsi_if_rx doesn't parse nlmsg properly" }, - "CVE-2018-1129": { - "cmt_msg": "libceph: implement CEPHX_V2 calculation mode" + "CVE-2018-9422": { + "cmt_msg": "futex: Remove requirement for lock_page() in get_futex_key()" }, - "CVE-2022-26365": { - "cmt_msg": "xen/blkfront: fix leaking data in shared pages" + "CVE-2024-26733": { + "cmt_msg": "arp: Prevent overflow in arp_req_get()." }, - "CVE-2023-52458": { - "cmt_msg": "block: add check that partition length needs to be aligned with block size" + "CVE-2024-26738": { + "cmt_msg": "powerpc/pseries/iommu: DLPAR add doesn't completely initialize pci_controller" }, - "CVE-2018-1120": { - "cmt_msg": "proc: do not access cmdline nor environ from file-backed areas" + "CVE-2024-26739": { + "cmt_msg": "net/sched: act_mirred: don't override retval if we already lost the skb" }, - "CVE-2018-1121": { + "CVE-2022-38096": { "cmt_msg": "" }, - "CVE-2022-3061": { - "cmt_msg": "video: fbdev: i740fb: Error out if 'pixclock' equals zero" + "CVE-2020-14305": { + "cmt_msg": "netfilter: helpers: remove data_len usage for inkernel helpers" }, - "CVE-2017-5753": { + "CVE-2017-5715": { "cmt_msg": "x86/cpufeatures: Add X86_BUG_SPECTRE_V[12]" }, - "CVE-2024-1086": { - "cmt_msg": "netfilter: nf_tables: reject QUEUE/DROP verdict parameters" + "CVE-2018-3620": { + "cmt_msg": "x86/microcode: Allow late microcode loading with SMT disabled" }, - "CVE-2024-22386": { - "cmt_msg": "" + "CVE-2020-16166": { + "cmt_msg": "random32: update the net random state on interrupt and activity" }, - "CVE-2022-3344": { - "cmt_msg": "KVM: x86: nSVM: harden svm_free_nested against freeing vmcb02 while still in use" + "CVE-2021-33631": { + "cmt_msg": "ext4: fix kernel BUG in 'ext4_write_inline_data_end()'" }, - "CVE-2020-29568": { - "cmt_msg": "xen/xenbus: Allow watches discard events before queueing" + "CVE-2019-15916": { + "cmt_msg": "net-sysfs: Fix mem leak in netdev_register_kobject" }, - "CVE-2020-27786": { - "cmt_msg": "ALSA: rawmidi: Fix racy buffer resize under concurrent accesses" + "CVE-2019-15917": { + "cmt_msg": "Bluetooth: hci_ldisc: Postpone HCI_UART_PROTO_READY bit set in hci_uart_set_proto()" }, - "CVE-2023-6240": { - "cmt_msg": "" + "CVE-2017-18344": { + "cmt_msg": "posix-timer: Properly check sigevent->sigev_notify" }, - "CVE-2023-23559": { - "cmt_msg": "wifi: rndis_wlan: Prevent buffer overflow in rndis_query_oid" + "CVE-2024-26648": { + "cmt_msg": "drm/amd/display: Fix variable deferencing before NULL check in edp_setup_replay()" }, - "CVE-2022-39842": { - "cmt_msg": "video: fbdev: pxa3xx-gcu: Fix integer overflow in pxa3xx_gcu_write" + "CVE-2024-26646": { + "cmt_msg": "thermal: intel: hfi: Add syscore callbacks for system-wide PM" }, - "CVE-2022-0382": { - "cmt_msg": "net ticp:fix a kernel-infoleak in __tipc_sendmsg()" + "CVE-2018-18690": { + "cmt_msg": "xfs: don't fail when converting shortform attr to long form during ATTR_REPLACE" }, - "CVE-2023-32233": { - "cmt_msg": "netfilter: nf_tables: deactivate anonymous set from preparation phase" + "CVE-2024-26644": { + "cmt_msg": "btrfs: don't abort filesystem when attempting to snapshot deleted subvolume" }, - "CVE-2020-25672": { - "cmt_msg": "nfc: fix memory leak in llcp_sock_connect()" + "CVE-2024-26642": { + "cmt_msg": "netfilter: nf_tables: disallow anonymous set with timeout flag" }, - "CVE-2020-25673": { - "cmt_msg": "nfc: Avoid endless loops caused by repeated llcp_sock_connect()" + "CVE-2017-0627": { + "cmt_msg": "media: uvcvideo: Prevent heap overflow when accessing mapped controls" }, - "CVE-2020-25670": { - "cmt_msg": "nfc: fix refcount leak in llcp_sock_bind()" + "CVE-2016-7915": { + "cmt_msg": "HID: core: prevent out-of-bound readings" }, - "CVE-2020-25671": { - "cmt_msg": "nfc: fix refcount leak in llcp_sock_connect()" + "CVE-2016-7911": { + "cmt_msg": "block: fix use-after-free in sys_ioprio_get()" }, - "CVE-2019-15222": { - "cmt_msg": "ALSA: usb-audio: Fix gpf in snd_usb_pipe_sanity_check" + "CVE-2016-7910": { + "cmt_msg": "block: fix use-after-free in seq file" }, - "CVE-2019-15223": { - "cmt_msg": "ALSA: line6: Assure canceling delayed work at disconnection" + "CVE-2016-7913": { + "cmt_msg": "[media] xc2028: avoid use after free" }, - "CVE-2019-19813": { - "cmt_msg": "btrfs: inode: Verify inode mode to avoid NULL pointer dereference" + "CVE-2018-25020": { + "cmt_msg": "bpf: fix truncated jump targets on heavy expansions" }, - "CVE-2020-29374": { - "cmt_msg": "gup: document and work around \"COW can break either way\" issue" + "CVE-2022-26373": { + "cmt_msg": "x86/speculation: Add RSB VM Exit protections" }, - "CVE-2019-19814": { - "cmt_msg": "" + "CVE-2021-46904": { + "cmt_msg": "net: hso: fix null-ptr-deref during tty device unregistration" }, - "CVE-2020-29371": { - "cmt_msg": "romfs: fix uninitialized memory leak in romfs_dev_read()" + "CVE-2018-7273": { + "cmt_msg": "printk: hash addresses printed with %p" }, - "CVE-2019-19816": { - "cmt_msg": "btrfs: inode: Verify inode mode to avoid NULL pointer dereference" + "CVE-2022-0617": { + "cmt_msg": "udf: Fix NULL ptr deref when converting from inline format" }, - "CVE-2019-9453": { - "cmt_msg": "f2fs: fix to avoid accessing xattr across the boundary" + "CVE-2023-4459": { + "cmt_msg": "net: vmxnet3: fix possible NULL pointer dereference in vmxnet3_rq_cleanup()" }, - "CVE-2022-1016": { - "cmt_msg": "netfilter: nf_tables: initialize registers in nft_do_chain()" + "CVE-2022-20566": { + "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free caused by l2cap_chan_put" }, - "CVE-2022-1011": { - "cmt_msg": "fuse: fix pipe buffer lifetime for direct_io" + "CVE-2022-20565": { + "cmt_msg": "HID: core: Correctly handle ReportSize being zero" }, - "CVE-2022-1012": { - "cmt_msg": "secure_seq: use the 64 bits of the siphash for port offset calculation" + "CVE-2023-1990": { + "cmt_msg": "nfc: st-nci: Fix use after free bug in ndlc_remove due to race condition" }, - "CVE-2023-34255": { - "cmt_msg": "xfs: verify buffer contents when we skip log replay" + "CVE-2021-33098": { + "cmt_msg": "ixgbe: fix large MTU request from VF" }, - "CVE-2021-26931": { - "cmt_msg": "xen-blkback: don't \"handle\" error by BUG()" + "CVE-2022-48619": { + "cmt_msg": "Input: add bounds checking to input_set_capability()" }, - "CVE-2021-26930": { - "cmt_msg": "xen-blkback: fix error handling in xen_blkbk_map()" + "CVE-2017-10810": { + "cmt_msg": "drm/virtio: don't leak bo on drm_gem_object_init failure" }, - "CVE-2021-26932": { - "cmt_msg": "Xen/x86: don't bail early from clear_foreign_p2m_mapping()" + "CVE-2024-24860": { + "cmt_msg": "Bluetooth: Fix atomicity violation in {min,max}_key_size_set" }, - "CVE-2023-52456": { - "cmt_msg": "serial: imx: fix tx statemachine deadlock" + "CVE-2018-20509": { + "cmt_msg": "binder: refactor binder ref inc/dec for thread safety" }, - "CVE-2023-3141": { - "cmt_msg": "memstick: r592: Fix UAF bug in r592_remove due to race condition" + "CVE-2021-47070": { + "cmt_msg": "uio_hv_generic: Fix another memory leak in error handling paths" }, - "CVE-2022-0492": { - "cmt_msg": "cgroup-v1: Require capabilities to set release_agent" + "CVE-2021-47075": { + "cmt_msg": "nvmet: fix memory leak in nvmet_alloc_ctrl()" }, - "CVE-2020-12352": { - "cmt_msg": "Bluetooth: A2MP: Fix not initializing all members" + "CVE-2021-47076": { + "cmt_msg": "RDMA/rxe: Return CQE error if invalid lkey was supplied" }, - "CVE-2022-23042": { - "cmt_msg": "xen/netfront: react properly to failing gnttab_end_foreign_access_ref()" + "CVE-2016-5195": { + "cmt_msg": "mm: remove gup_flags FOLL_WRITE games from __get_user_pages()" }, - "CVE-2022-20132": { - "cmt_msg": "HID: add hid_is_usb() function to make it simpler for USB detection" + "CVE-2017-8824": { + "cmt_msg": "dccp: CVE-2017-8824: use-after-free in DCCP code" }, - "CVE-2022-0494": { - "cmt_msg": "block-map: add __GFP_ZERO flag for alloc_page in function bio_copy_kern" + "CVE-2018-7492": { + "cmt_msg": "rds: Fix NULL pointer dereference in __rds_rdma_map" }, - "CVE-2020-26088": { - "cmt_msg": "net/nfc/rawsock.c: add CAP_NET_RAW check." + "CVE-2016-6136": { + "cmt_msg": "audit: fix a double fetch in audit_log_single_execve_arg()" }, - "CVE-2022-3524": { - "cmt_msg": "tcp/udp: Fix memory leak in ipv6_renew_options()." + "CVE-2018-5848": { + "cmt_msg": "wil6210: missing length check in wmi_set_ie" }, - "CVE-2022-3523": { - "cmt_msg": "mm/memory.c: fix race when faulting a device private page" + "CVE-2019-10638": { + "cmt_msg": "inet: switch IP ID generator to siphash" }, - "CVE-2022-3522": { - "cmt_msg": "mm/hugetlb: use hugetlb_pte_stable in migration race check" + "CVE-2019-10639": { + "cmt_msg": "netns: provide pure entropy for net_hash_mix()" }, - "CVE-2008-2544": { - "cmt_msg": "" + "CVE-2024-26676": { + "cmt_msg": "af_unix: Call kfree_skb() for dead unix_(sk)->oob_skb in GC." }, - "CVE-2018-12928": { + "CVE-2017-14140": { + "cmt_msg": "Sanitize 'move_pages()' permission checks" + }, + "CVE-2020-26557": { "cmt_msg": "" }, - "CVE-2021-3178": { - "cmt_msg": "nfsd4: readdirplus shouldn't return parent of export" + "CVE-2017-16535": { + "cmt_msg": "USB: core: fix out-of-bounds access bug in usb_get_bos_descriptor()" }, - "CVE-2018-7754": { - "cmt_msg": "printk: hash addresses printed with %p" + "CVE-2017-16534": { + "cmt_msg": "USB: core: harden cdc_parse_cdc_header" }, - "CVE-2022-0330": { - "cmt_msg": "drm/i915: Flush TLBs before releasing backing store" + "CVE-2017-16537": { + "cmt_msg": "media: imon: Fix null-ptr-deref in imon_probe" }, - "CVE-2007-3719": { - "cmt_msg": "" + "CVE-2017-16536": { + "cmt_msg": "[media] cx231xx-cards: fix NULL-deref on missing association descriptor" }, - "CVE-2023-3863": { - "cmt_msg": "net: nfc: Fix use-after-free caused by nfc_llcp_find_local" + "CVE-2017-16531": { + "cmt_msg": "USB: fix out-of-bounds in usb_set_configuration" }, - "CVE-2023-0590": { - "cmt_msg": "net: sched: fix race condition in qdisc_graft()" + "CVE-2017-16530": { + "cmt_msg": "USB: uas: fix bug in handling of alternate settings" }, - "CVE-2022-4095": { - "cmt_msg": "staging: rtl8712: fix use after free bugs" + "CVE-2017-16533": { + "cmt_msg": "HID: usbhid: fix out-of-bounds bug" }, - "CVE-2022-45919": { - "cmt_msg": "media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221" + "CVE-2017-16532": { + "cmt_msg": "usb: usbtest: fix NULL pointer dereference" }, - "CVE-2023-2248": { - "cmt_msg": "net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg" + "CVE-2024-26779": { + "cmt_msg": "wifi: mac80211: fix race condition on enabling fast-xmit" }, - "CVE-2021-3772": { - "cmt_msg": "sctp: use init_tag from inithdr for ABORT chunk" + "CVE-2017-16538": { + "cmt_msg": "media: dvb-usb-v2: lmedm04: Improve logic checking of warm start" }, - "CVE-2021-3679": { - "cmt_msg": "tracing: Fix bug in rb_per_cpu_empty() that might cause deadloop." + "CVE-2016-9084": { + "cmt_msg": "vfio/pci: Fix integer overflows, bitmask check" }, - "CVE-2021-37159": { - "cmt_msg": "usb: hso: fix error handling code of hso_create_net_device" + "CVE-2016-9083": { + "cmt_msg": "vfio/pci: Fix integer overflows, bitmask check" }, - "CVE-2022-2586": { - "cmt_msg": "netfilter: nf_tables: do not allow SET_ID to refer to another table" + "CVE-2018-9517": { + "cmt_msg": "l2tp: pass tunnel pointer to ->session_create()" }, - "CVE-2022-3629": { - "cmt_msg": "vsock: Fix memory leak in vsock_connect()" + "CVE-2018-9516": { + "cmt_msg": "HID: debug: check length before copy_to_user()" }, - "CVE-2021-34556": { - "cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4" + "CVE-2021-20317": { + "cmt_msg": "lib/timerqueue: Rely on rbtree semantics for next timer" }, - "CVE-2021-28713": { - "cmt_msg": "xen/console: harden hvc_xen against event channel storms" + "CVE-2024-26772": { + "cmt_msg": "ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal()" }, - "CVE-2021-28712": { - "cmt_msg": "xen/netfront: harden netfront against event channel storms" + "CVE-2017-2671": { + "cmt_msg": "ping: implement proper locking" }, - "CVE-2017-18261": { - "cmt_msg": "clocksource/drivers/arm_arch_timer: Avoid infinite recursion when ftrace is enabled" + "CVE-2018-1092": { + "cmt_msg": "ext4: fail ext4_iget for root directory if unallocated" }, - "CVE-2022-1247": { + "CVE-2018-1093": { + "cmt_msg": "ext4: add validity checks for bitmap block numbers" + }, + "CVE-2021-3864": { "cmt_msg": "" }, - "CVE-2023-51782": { - "cmt_msg": "net/rose: Fix Use-After-Free in rose_ioctl" + "CVE-2019-19054": { + "cmt_msg": "media: rc: prevent memory leak in cx23888_ir_probe" }, - "CVE-2022-3621": { - "cmt_msg": "nilfs2: fix NULL pointer dereference at nilfs_bmap_lookup_at_level()" + "CVE-2019-19057": { + "cmt_msg": "mwifiex: pcie: Fix memory leak in mwifiex_pcie_init_evt_ring" }, - "CVE-2022-23960": { - "cmt_msg": "ARM: report Spectre v2 status through sysfs" + "CVE-2019-19056": { + "cmt_msg": "mwifiex: pcie: Fix memory leak in mwifiex_pcie_alloc_cmdrsp_buf" }, - "CVE-2017-11472": { - "cmt_msg": "ACPICA: Namespace: fix operand cache leak" + "CVE-2019-19052": { + "cmt_msg": "can: gs_usb: gs_can_open(): prevent memory leak" }, - "CVE-2022-3624": { - "cmt_msg": "bonding: fix reference count leak in balance-alb mode" + "CVE-2019-3846": { + "cmt_msg": "mwifiex: Fix possible buffer overflows at parsing bss descriptor" }, - "CVE-2022-2588": { - "cmt_msg": "net_sched: cls_route: remove from list when handle is 0" + "CVE-2017-15537": { + "cmt_msg": "x86/fpu: Don't let userspace set bogus xcomp_bv" }, - "CVE-2021-39657": { - "cmt_msg": "scsi: ufs: Correct the LUN used in eh_device_reset_handler() callback" + "CVE-2018-5391": { + "cmt_msg": "ip: discard IPv4 datagrams with overlapping segments." }, - "CVE-2021-3669": { - "cmt_msg": "ipc: replace costly bailout check in sysvipc_find_ipc()" + "CVE-2023-20941": { + "cmt_msg": "" }, - "CVE-2019-18885": { - "cmt_msg": "btrfs: merge btrfs_find_device and find_device" + "CVE-2018-20836": { + "cmt_msg": "scsi: libsas: fix a race condition when smp task timeout" }, - "CVE-2022-4744": { - "cmt_msg": "tun: avoid double free in tun_free_netdev" + "CVE-2016-5400": { + "cmt_msg": "media: fix airspy usb probe error path" }, - "CVE-2023-1095": { - "cmt_msg": "netfilter: nf_tables: fix null deref due to zeroed list head" + "CVE-2020-10135": { + "cmt_msg": "Bluetooth: Consolidate encryption handling in hci_encrypt_cfm" }, - "CVE-2019-11091": { - "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" + "CVE-2023-28328": { + "cmt_msg": "media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer()" }, - "CVE-2022-3239": { - "cmt_msg": "media: em28xx: initialize refcount before kref_get" + "CVE-2017-13693": { + "cmt_msg": "" }, - "CVE-2022-4543": { + "CVE-2017-13695": { + "cmt_msg": "ACPICA: acpi: acpica: fix acpi operand cache leak in nseval.c" + }, + "CVE-2017-13694": { "cmt_msg": "" }, - "CVE-2023-4921": { - "cmt_msg": "net: sched: sch_qfq: Fix UAF in qfq_dequeue()" + "CVE-2024-26647": { + "cmt_msg": "drm/amd/display: Fix late derefrence 'dsc' check in 'link_set_dsc_pps_packet()'" }, - "CVE-2023-1829": { - "cmt_msg": "net/sched: Retire tcindex classifier" + "CVE-2021-3640": { + "cmt_msg": "Bluetooth: sco: Fix lock_sock() blockage by memcpy_from_msg()" }, - "CVE-2021-34981": { - "cmt_msg": "Bluetooth: cmtp: fix file refcount when cmtp_attach_device fails" + "CVE-2020-11608": { + "cmt_msg": "media: ov519: add missing endpoint sanity checks" }, - "CVE-2023-1670": { - "cmt_msg": "xirc2ps_cs: Fix use after free bug in xirc2ps_detach" + "CVE-2020-10732": { + "cmt_msg": "fs/binfmt_elf.c: allocate initialized memory in fill_thread_core_info()" }, - "CVE-2022-20148": { - "cmt_msg": "f2fs: fix UAF in f2fs_available_free_memory" + "CVE-2019-9466": { + "cmt_msg": "brcmfmac: add subtype check for event handling in data path" }, - "CVE-2022-1786": { - "cmt_msg": "io_uring: remove io_identity" + "CVE-2017-17975": { + "cmt_msg": "media: usbtv: prevent double free in error case" }, - "CVE-2013-7445": { - "cmt_msg": "" + "CVE-2019-16921": { + "cmt_msg": "RDMA/hns: Fix init resp when alloc ucontext" }, - "CVE-2022-28390": { - "cmt_msg": "can: ems_usb: ems_usb_start_xmit(): fix double dev_kfree_skb() in error path" + "CVE-2021-0512": { + "cmt_msg": "HID: make arrays usage and value to be the same" }, - "CVE-2022-38096": { - "cmt_msg": "" + "CVE-2016-6187": { + "cmt_msg": "apparmor: fix oops, validate buffer size in apparmor_setprocattr()" }, - "CVE-2014-3180": { - "cmt_msg": "compat: nanosleep: Clarify error handling" + "CVE-2022-41222": { + "cmt_msg": "mm/mremap: hold the rmap lock in write mode when moving page table entries." }, - "CVE-2022-3303": { - "cmt_msg": "ALSA: pcm: oss: Fix race at SNDCTL_DSP_SYNC" + "CVE-2017-18174": { + "cmt_msg": "pinctrl: amd: Use devm_pinctrl_register() for pinctrl registration" }, - "CVE-2017-8797": { - "cmt_msg": "nfsd: fix undefined behavior in nfsd4_layout_verify" + "CVE-2017-18595": { + "cmt_msg": "tracing: Fix possible double free on failure of allocating trace buffer" }, - "CVE-2017-5715": { - "cmt_msg": "x86/cpufeatures: Add X86_BUG_SPECTRE_V[12]" + "CVE-2024-26720": { + "cmt_msg": "mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again" + }, + "CVE-2024-26726": { + "cmt_msg": "btrfs: don't drop extent_map for free space inode on write error" + }, + "CVE-2019-6974": { + "cmt_msg": "kvm: fix kvm_ioctl_create_device() reference counting (CVE-2019-6974)" + }, + "CVE-2023-2985": { + "cmt_msg": "fs: hfsplus: fix UAF issue in hfsplus_put_super" + }, + "CVE-2017-17806": { + "cmt_msg": "crypto: hmac - require that the underlying hash algorithm is unkeyed" + }, + "CVE-2017-17807": { + "cmt_msg": "KEYS: add missing permission check for request_key() destination" }, - "CVE-2022-20141": { - "cmt_msg": "igmp: Add ip_mc_list lock in ip_check_mc_rcu" + "CVE-2017-17805": { + "cmt_msg": "crypto: salsa20 - fix blkcipher_walk API usage" }, - "CVE-2023-23455": { - "cmt_msg": "net: sched: atm: dont intepret cls results when asked to drop" + "CVE-2023-52519": { + "cmt_msg": "HID: intel-ish-hid: ipc: Disable and reenable ACPI GPE bit" }, - "CVE-2023-23454": { - "cmt_msg": "net: sched: cbq: dont intepret cls results when asked to drop" + "CVE-2023-52516": { + "cmt_msg": "dma-debug: don't call __dma_entry_alloc_check_leak() under free_entries_lock" }, - "CVE-2018-5344": { - "cmt_msg": "loop: fix concurrent lo_open/lo_release" + "CVE-2023-52517": { + "cmt_msg": "spi: sun6i: fix race between DMA RX transfer completion and RX FIFO drain" }, - "CVE-2018-3620": { - "cmt_msg": "x86/microcode: Allow late microcode loading with SMT disabled" + "CVE-2023-52515": { + "cmt_msg": "RDMA/srp: Do not call scsi_done() from srp_abort()" }, - "CVE-2023-6932": { - "cmt_msg": "ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet" + "CVE-2019-15902": { + "cmt_msg": "unknown" }, - "CVE-2020-16166": { - "cmt_msg": "random32: update the net random state on interrupt and activity" + "CVE-2023-52511": { + "cmt_msg": "spi: sun6i: reduce DMA RX transfer width to single byte" }, - "CVE-2021-29155": { - "cmt_msg": "bpf: Use correct permission flag for mixed signed bounds arithmetic" + "CVE-2019-20054": { + "cmt_msg": "fs/proc/proc_sysctl.c: fix NULL pointer dereference in put_links" }, - "CVE-2021-33631": { - "cmt_msg": "ext4: fix kernel BUG in 'ext4_write_inline_data_end()'" + "CVE-2018-17977": { + "cmt_msg": "" }, - "CVE-2022-28388": { - "cmt_msg": "can: usb_8dev: usb_8dev_start_xmit(): fix double dev_kfree_skb() in error path" + "CVE-2024-26659": { + "cmt_msg": "xhci: handle isoc Babble and Buffer Overrun events properly" }, - "CVE-2024-26598": { - "cmt_msg": "KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache" + "CVE-2024-26658": { + "cmt_msg": "bcachefs: grab s_umount only if snapshotting" }, - "CVE-2020-12362": { - "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" + "CVE-2018-17972": { + "cmt_msg": "proc: restrict kernel stack dumps to root" }, - "CVE-2020-12363": { - "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" + "CVE-2024-26655": { + "cmt_msg": "Fix memory leak in posix_clock_open()" }, - "CVE-2022-4129": { - "cmt_msg": "l2tp: Serialize access to sk_user_data with sk_callback_lock" + "CVE-2024-26654": { + "cmt_msg": "ALSA: sh: aica: reorder cleanup operations to avoid UAF bugs" }, - "CVE-2023-3117": { - "cmt_msg": "netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE" + "CVE-2024-26656": { + "cmt_msg": "drm/amdgpu: fix use-after-free bug" }, - "CVE-2020-12364": { - "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" + "CVE-2024-26651": { + "cmt_msg": "sr9800: Add check for usbnet_get_endpoints" }, - "CVE-2021-0605": { - "cmt_msg": "af_key: pfkey_dump needs parameter validation" + "CVE-2024-26650": { + "cmt_msg": "platform/x86: p2sb: Allow p2sb_bar() calls during PCI device probe" }, - "CVE-2021-3896": { - "cmt_msg": "isdn: cpai: check ctr->cnr to avoid array index out of bound" + "CVE-2022-1048": { + "cmt_msg": "ALSA: pcm: Fix races among concurrent hw_params and hw_free calls" }, - "CVE-2021-4002": { - "cmt_msg": "hugetlbfs: flush TLBs correctly after huge_pmd_unshare" + "CVE-2023-52475": { + "cmt_msg": "Input: powermate - fix use-after-free in powermate_config_complete" }, - "CVE-2019-16232": { - "cmt_msg": "libertas: fix a potential NULL pointer dereference" + "CVE-2023-52477": { + "cmt_msg": "usb: hub: Guard against accesses to uninitialized BOS descriptors" }, - "CVE-2019-20810": { - "cmt_msg": "media: go7007: fix a miss of snd_card_free" + "CVE-2023-52476": { + "cmt_msg": "perf/x86/lbr: Filter vsyscall addresses" }, - "CVE-2020-14314": { - "cmt_msg": "ext4: fix potential negative array index in do_split()" + "CVE-2016-10147": { + "cmt_msg": "crypto: mcryptd - Check mcryptd algorithm compatibility" }, - "CVE-2018-5391": { - "cmt_msg": "ip: discard IPv4 datagrams with overlapping segments." + "CVE-2023-52470": { + "cmt_msg": "drm/radeon: check the alloc_workqueue return value in radeon_crtc_init()" }, - "CVE-2022-26373": { - "cmt_msg": "x86/speculation: Add RSB VM Exit protections" + "CVE-2023-52479": { + "cmt_msg": "ksmbd: fix uaf in smb20_oplock_break_ack" }, - "CVE-2019-18660": { - "cmt_msg": "powerpc/book3s64: Fix link stack flush on context switch" + "CVE-2023-52478": { + "cmt_msg": "HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect" }, - "CVE-2019-15290": { - "cmt_msg": "" + "CVE-2022-26365": { + "cmt_msg": "xen/blkfront: fix leaking data in shared pages" }, - "CVE-2023-3212": { - "cmt_msg": "gfs2: Don't deref jdesc in evict" + "CVE-2020-12652": { + "cmt_msg": "scsi: mptfusion: Fix double fetch bug in ioctl" }, - "CVE-2024-23848": { - "cmt_msg": "" + "CVE-2020-12653": { + "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_cmd_append_vsie_tlv()" }, - "CVE-2018-7273": { - "cmt_msg": "printk: hash addresses printed with %p" + "CVE-2020-12656": { + "cmt_msg": "sunrpc: check that domain table is empty at module unload." }, - "CVE-2023-4459": { - "cmt_msg": "net: vmxnet3: fix possible NULL pointer dereference in vmxnet3_rq_cleanup()" + "CVE-2023-32233": { + "cmt_msg": "netfilter: nf_tables: deactivate anonymous set from preparation phase" }, - "CVE-2022-2153": { - "cmt_msg": "KVM: x86: Avoid theoretical NULL pointer dereference in kvm_irq_delivery_to_apic_fast()" + "CVE-2020-12654": { + "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_ret_wmm_get_status()" }, - "CVE-2022-20566": { - "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free caused by l2cap_chan_put" + "CVE-2023-34256": { + "cmt_msg": "ext4: avoid a potential slab-out-of-bounds in ext4_group_desc_csum" }, - "CVE-2018-12930": { + "CVE-2024-25740": { "cmt_msg": "" }, - "CVE-2018-12931": { - "cmt_msg": "" + "CVE-2022-4744": { + "cmt_msg": "tun: avoid double free in tun_free_netdev" }, - "CVE-2024-23196": { + "CVE-2022-0400": { "cmt_msg": "" }, - "CVE-2021-32399": { - "cmt_msg": "bluetooth: eliminate the potential race condition when removing the HCI controller" - }, - "CVE-2021-33098": { - "cmt_msg": "ixgbe: fix large MTU request from VF" + "CVE-2024-25741": { + "cmt_msg": "" }, - "CVE-2021-28972": { - "cmt_msg": "PCI: rpadlpar: Fix potential drc_name corruption in store functions" + "CVE-2022-26966": { + "cmt_msg": "sr9700: sanity check for packet length" }, - "CVE-2019-12382": { - "cmt_msg": "drm/edid: Fix a missing-check bug in drm_load_edid_firmware()" + "CVE-2023-1989": { + "cmt_msg": "Bluetooth: btsdio: fix use after free bug in btsdio_remove due to unfinished work" }, - "CVE-2017-10810": { - "cmt_msg": "drm/virtio: don't leak bo on drm_gem_object_init failure" + "CVE-2022-25265": { + "cmt_msg": "" }, - "CVE-2022-24958": { - "cmt_msg": "usb: gadget: don't release an existing dev->buf" + "CVE-2020-25285": { + "cmt_msg": "mm/hugetlb: fix a race between hugetlb sysctl handlers" }, - "CVE-2020-10766": { - "cmt_msg": "x86/speculation: Prevent rogue cross-process SSBD shutdown" + "CVE-2020-11609": { + "cmt_msg": "media: stv06xx: add missing descriptor sanity checks" }, - "CVE-2020-10767": { - "cmt_msg": "x86/speculation: Avoid force-disabling IBPB based on STIBP and enhanced IBRS." + "CVE-2020-25284": { + "cmt_msg": "rbd: require global CAP_SYS_ADMIN for mapping and unmapping" }, - "CVE-2018-12207": { - "cmt_msg": "kvm: x86, powerpc: do not allow clearing largepages debugfs entry" + "CVE-2023-4208": { + "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free" }, - "CVE-2020-10768": { - "cmt_msg": "x86/speculation: PR_SPEC_FORCE_DISABLE enforcement for indirect branches." + "CVE-2023-4206": { + "cmt_msg": "net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free" }, - "CVE-2024-25740": { - "cmt_msg": "" + "CVE-2023-4207": { + "cmt_msg": "net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free" }, - "CVE-2019-0148": { - "cmt_msg": "i40e: Wrong truncation from u16 to u8" + "CVE-2021-47046": { + "cmt_msg": "drm/amd/display: Fix off by one in hdmi_14_process_transaction()" }, - "CVE-2022-33740": { - "cmt_msg": "xen/netfront: fix leaking data in shared pages" + "CVE-2020-29370": { + "cmt_msg": "mm: slub: add missing TID bump in kmem_cache_alloc_bulk()" }, - "CVE-2019-17075": { - "cmt_msg": "RDMA/cxgb4: Do not dma memory off of the stack" + "CVE-2022-20424": { + "cmt_msg": "io_uring: remove io_identity" }, - "CVE-2014-7145": { - "cmt_msg": "[CIFS] Possible null ptr deref in SMB2_tcon" + "CVE-2022-20422": { + "cmt_msg": "arm64: fix oops in concurrently setting insn_emulation sysctls" }, - "CVE-2022-3903": { - "cmt_msg": "media: mceusb: Use new usb_control_msg_*() routines" + "CVE-2017-8831": { + "cmt_msg": "[media] saa7164: fix double fetch PCIe access condition" }, - "CVE-2023-20588": { - "cmt_msg": "x86/CPU/AMD: Do not leak quotient data after a division by 0" + "CVE-2022-45934": { + "cmt_msg": "Bluetooth: L2CAP: Fix u8 overflow" }, - "CVE-2017-0750": { - "cmt_msg": "f2fs: do more integrity verification for superblock" + "CVE-2021-4197": { + "cmt_msg": "cgroup: Use open-time credentials for process migraton perm checks" }, - "CVE-2022-44033": { - "cmt_msg": "char: pcmcia: remove all the drivers" + "CVE-2020-24503": { + "cmt_msg": "" }, - "CVE-2019-11191": { - "cmt_msg": "x86: Deprecate a.out support" + "CVE-2020-24502": { + "cmt_msg": "" }, - "CVE-2018-10322": { - "cmt_msg": "xfs: enhance dinode verifier" + "CVE-2024-26774": { + "cmt_msg": "ext4: avoid dividing by 0 in mb_update_avg_fragment_size() when block bitmap corrupt" }, - "CVE-2016-9644": { - "cmt_msg": "x86/mm: Expand the exception table logic to allow new handling options" + "CVE-2023-31436": { + "cmt_msg": "net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg" }, - "CVE-2020-26139": { - "cmt_msg": "mac80211: do not accept/forward invalid EAPOL frames" + "CVE-2024-26775": { + "cmt_msg": "aoe: avoid potential deadlock at set_capacity" }, - "CVE-2023-3640": { - "cmt_msg": "" + "CVE-2016-4569": { + "cmt_msg": "ALSA: timer: Fix leak in SNDRV_TIMER_IOCTL_PARAMS" }, - "CVE-2019-10220": { - "cmt_msg": "Convert filldir[64]() from __put_user() to unsafe_put_user()" + "CVE-2018-14609": { + "cmt_msg": "btrfs: relocation: Only remove reloc rb_trees if reloc control has been initialized" }, - "CVE-2021-3609": { - "cmt_msg": "can: bcm: delay release of struct bcm_op after synchronize_rcu()" + "CVE-2024-23851": { + "cmt_msg": "dm: limit the number of targets and parameter size area" }, - "CVE-2021-0929": { - "cmt_msg": "staging/android/ion: delete dma_buf->kmap/unmap implemenation" + "CVE-2020-27777": { + "cmt_msg": "powerpc/rtas: Restrict RTAS requests from userspace" }, - "CVE-2023-6546": { - "cmt_msg": "tty: n_gsm: fix the UAF caused by race condition in gsm_cleanup_mux" + "CVE-2019-11486": { + "cmt_msg": "tty: mark Siemens R3964 line discipline as BROKEN" }, - "CVE-2017-18255": { - "cmt_msg": "perf/core: Fix the perf_cpu_time_max_percent check" + "CVE-2019-11487": { + "cmt_msg": "fs: prevent page refcount overflow in pipe_buf_get" }, - "CVE-2022-0168": { - "cmt_msg": "cifs: fix NULL ptr dereference in smb2_ioctl_query_info()" + "CVE-2018-8043": { + "cmt_msg": "net: phy: mdio-bcm-unimac: fix potential NULL dereference in unimac_mdio_probe()" }, - "CVE-2024-26587": { - "cmt_msg": "net: netdevsim: don't try to destroy PHC on VFs" + "CVE-2019-20908": { + "cmt_msg": "efi: Restrict efivar_ssdt_load when the kernel is locked down" }, - "CVE-2020-28374": { - "cmt_msg": "scsi: target: Fix XCOPY NAA identifier lookup" + "CVE-2019-19060": { + "cmt_msg": "iio: imu: adis16400: release allocated memory on failure" }, - "CVE-2023-3006": { - "cmt_msg": "arm64: Add AMPERE1 to the Spectre-BHB affected list" + "CVE-2019-19061": { + "cmt_msg": "iio: imu: adis16400: fix memory leak" }, - "CVE-2022-3586": { - "cmt_msg": "sch_sfb: Don't assume the skb is still around after enqueueing to child" + "CVE-2019-19062": { + "cmt_msg": "crypto: user - fix memory leak in crypto_report" }, - "CVE-2020-27825": { - "cmt_msg": "tracing: Fix race in trace_open and buffer resize call" + "CVE-2019-19063": { + "cmt_msg": "rtlwifi: prevent memory leak in rtl_usb_probe" }, - "CVE-2019-2181": { - "cmt_msg": "binder: check for overflow when alloc for security context" + "CVE-2017-17741": { + "cmt_msg": "KVM: Fix stack-out-of-bounds read in write_mmio" }, - "CVE-2020-27820": { - "cmt_msg": "drm/nouveau: use drm_dev_unplug() during device removal" + "CVE-2019-19066": { + "cmt_msg": "scsi: bfa: release allocated memory in case of error" }, - "CVE-2023-39194": { - "cmt_msg": "net: xfrm: Fix xfrm_address_filter OOB read" + "CVE-2019-19068": { + "cmt_msg": "rtl8xxxu: prevent leaking urb" }, - "CVE-2020-0067": { - "cmt_msg": "f2fs: fix to avoid memory leakage in f2fs_listxattr" + "CVE-2017-7184": { + "cmt_msg": "xfrm_user: validate XFRM_MSG_NEWAE XFRMA_REPLAY_ESN_VAL replay_window" }, - "CVE-2020-26558": { - "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical" + "CVE-2017-7187": { + "cmt_msg": "scsi: sg: check length passed to SG_NEXT_CMD_LEN" }, - "CVE-2023-39193": { - "cmt_msg": "netfilter: xt_sctp: validate the flag_info count" + "CVE-2019-3874": { + "cmt_msg": "sctp: implement memory accounting on tx path" }, - "CVE-2023-39192": { - "cmt_msg": "netfilter: xt_u32: validate user space input" + "CVE-2017-12193": { + "cmt_msg": "assoc_array: Fix a buggy node-splitting case" }, - "CVE-2020-26541": { - "cmt_msg": "certs: Add EFI_CERT_X509_GUID support for dbx entries" + "CVE-2017-12192": { + "cmt_msg": "KEYS: prevent KEYCTL_READ on negative key" }, - "CVE-2023-6610": { - "cmt_msg": "smb: client: fix potential OOB in smb2_dump_detail()" + "CVE-2017-12190": { + "cmt_msg": "fix unbalanced page refcounting in bio_map_user_iov" }, - "CVE-2023-3390": { - "cmt_msg": "netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE" + "CVE-2020-36516": { + "cmt_msg": "ipv4: avoid using shared IP generator for connected sockets" }, - "CVE-2021-20317": { - "cmt_msg": "lib/timerqueue: Rely on rbtree semantics for next timer" + "CVE-2016-5412": { + "cmt_msg": "KVM: PPC: Book3S HV: Pull out TM state save/restore into separate procedures" }, - "CVE-2021-43389": { - "cmt_msg": "isdn: cpai: check ctr->cnr to avoid array index out of bound" + "CVE-2012-4542": { + "cmt_msg": "" }, - "CVE-2023-3111": { - "cmt_msg": "btrfs: unset reloc control if transaction commit fails in prepare_to_relocate()" + "CVE-2018-1000028": { + "cmt_msg": "nfsd: auth: Fix gid sorting when rootsquash enabled" }, - "CVE-2021-33061": { - "cmt_msg": "ixgbe: add improvement for MDD response functionality" + "CVE-2018-1000026": { + "cmt_msg": "bnx2x: disable GSO where gso_size is too big for hardware" }, - "CVE-2023-1476": { - "cmt_msg": "" + "CVE-2017-2596": { + "cmt_msg": "kvm: fix page struct leak in handle_vmon" }, - "CVE-2017-18552": { - "cmt_msg": "RDS: validate the requested traces user input against max supported" + "CVE-2020-36777": { + "cmt_msg": "media: dvbdev: Fix memory leak in dvb_media_device_free()" }, - "CVE-2022-1652": { - "cmt_msg": "floppy: use a statically allocated error counter" + "CVE-2020-36775": { + "cmt_msg": "f2fs: fix to avoid potential deadlock" }, - "CVE-2015-8830": { - "cmt_msg": "aio: lift iov_iter_init() into aio_setup_..._rw()" + "CVE-2021-20292": { + "cmt_msg": "drm/ttm/nouveau: don't call tt destroy callback on alloc failure." }, - "CVE-2020-14351": { - "cmt_msg": "perf/core: Fix race in the perf_mmap_close() function" + "CVE-2023-2269": { + "cmt_msg": "dm ioctl: fix nested locking in table_clear() to remove deadlock concern" }, - "CVE-2019-19054": { - "cmt_msg": "media: rc: prevent memory leak in cx23888_ir_probe" + "CVE-2020-10690": { + "cmt_msg": "ptp: fix the race between the release of ptp_clock and cdev" }, - "CVE-2023-51043": { - "cmt_msg": "drm/atomic: Fix potential use-after-free in nonblocking commits" + "CVE-2021-3659": { + "cmt_msg": "net: mac802154: Fix general protection fault" }, - "CVE-2022-2978": { - "cmt_msg": "fs: fix UAF/GPF bug in nilfs_mdt_destroy" + "CVE-2021-3653": { + "cmt_msg": "KVM: nSVM: avoid picking up unsupported bits from L2 in int_ctl (CVE-2021-3653)" }, - "CVE-2020-0429": { - "cmt_msg": "l2tp: fix race between l2tp_session_delete() and l2tp_tunnel_closeall()" + "CVE-2021-3655": { + "cmt_msg": "sctp: validate from_addr_param return" }, - "CVE-2023-23039": { - "cmt_msg": "" + "CVE-2019-12614": { + "cmt_msg": "powerpc/pseries/dlpar: Fix a missing check in dlpar_parse_cc_property()" }, - "CVE-2023-20569": { - "cmt_msg": "x86/bugs: Increase the x86 bugs vector size to two u32s" + "CVE-2019-12615": { + "cmt_msg": "mdesc: fix a missing-check bug in get_vdev_port_node_info()" }, - "CVE-2020-0427": { - "cmt_msg": "pinctrl: devicetree: Avoid taking direct reference to device name string" + "CVE-2021-3896": { + "cmt_msg": "isdn: cpai: check ctr->cnr to avoid array index out of bound" }, - "CVE-2023-6270": { + "CVE-2021-3892": { "cmt_msg": "" }, - "CVE-2017-9984": { - "cmt_msg": "ALSA: msnd: Optimize / harden DSP and MIDI loops" + "CVE-2016-6516": { + "cmt_msg": "vfs: ioctl: prevent double-fetch in dedupe ioctl" }, - "CVE-2023-45862": { - "cmt_msg": "USB: ene_usb6250: Allocate enough memory for full object" + "CVE-2022-27223": { + "cmt_msg": "USB: gadget: validate endpoint index for xilinx udc" }, - "CVE-2023-45863": { - "cmt_msg": "kobject: Fix slab-out-of-bounds in fill_kobj_path()" + "CVE-2022-24958": { + "cmt_msg": "usb: gadget: don't release an existing dev->buf" }, - "CVE-2017-15537": { - "cmt_msg": "x86/fpu: Don't let userspace set bogus xcomp_bv" + "CVE-2020-36557": { + "cmt_msg": "vt: vt_ioctl: fix VT_DISALLOCATE freeing in-use virtual console" }, - "CVE-2022-23222": { - "cmt_msg": "bpf: Replace PTR_TO_XXX_OR_NULL with PTR_TO_XXX | PTR_MAYBE_NULL" + "CVE-2020-12888": { + "cmt_msg": "vfio-pci: Invalidate mmaps and block MMIO access on disabled memory" }, - "CVE-2020-25669": { - "cmt_msg": "Input: sunkbd - avoid use-after-free in teardown paths" + "CVE-2023-2194": { + "cmt_msg": "i2c: xgene-slimpro: Fix out-of-bounds bug in xgene_slimpro_i2c_xfer()" }, - "CVE-2020-25668": { - "cmt_msg": "tty: make FONTX ioctl use the tty pointer they were actually passed" + "CVE-2017-6353": { + "cmt_msg": "sctp: deny peeloff operation on asocs with threads sleeping on it" }, - "CVE-2008-4609": { + "CVE-2022-41218": { + "cmt_msg": "media: dvb-core: Fix UAF due to refcount races at releasing" + }, + "CVE-2011-4917": { "cmt_msg": "" }, - "CVE-2018-20854": { - "cmt_msg": "phy: ocelot-serdes: fix out-of-bounds read" + "CVE-2021-45485": { + "cmt_msg": "ipv6: use prandom_u32() for ID generation" }, - "CVE-2018-25020": { - "cmt_msg": "bpf: fix truncated jump targets on heavy expansions" + "CVE-2016-6197": { + "cmt_msg": "ovl: verify upper dentry before unlink and rename" }, - "CVE-2023-26607": { - "cmt_msg": "ntfs: fix out-of-bounds read in ntfs_attr_find()" + "CVE-2020-0030": { + "cmt_msg": "ANDROID: binder: synchronize_rcu() when using POLLFREE." }, - "CVE-2018-20855": { - "cmt_msg": "IB/mlx5: Fix leaking stack memory to userspace" + "CVE-2015-8709": { + "cmt_msg": "mm: Add a user_ns owner to mm_struct and fix ptrace permission checks" }, - "CVE-2019-15239": { - "cmt_msg": "" + "CVE-2019-18806": { + "cmt_msg": "net: qlogic: Fix memory leak in ql_alloc_large_buffers" }, - "CVE-2021-4037": { - "cmt_msg": "xfs: fix up non-directory creation in SGID directories" + "CVE-2018-7754": { + "cmt_msg": "printk: hash addresses printed with %p" }, - "CVE-2021-22543": { - "cmt_msg": "KVM: do not allow mapping valid but non-reference-counted pages" + "CVE-2019-3900": { + "cmt_msg": "vhost_net: fix possible infinite loop" }, - "CVE-2022-45884": { - "cmt_msg": "" + "CVE-2022-40982": { + "cmt_msg": "x86/speculation: Add Gather Data Sampling mitigation" }, - "CVE-2019-1999": { - "cmt_msg": "binder: fix race between munmap() and direct reclaim" + "CVE-2021-39801": { + "cmt_msg": "" }, - "CVE-2023-20941": { + "CVE-2021-39800": { "cmt_msg": "" }, - "CVE-2020-10135": { - "cmt_msg": "Bluetooth: Consolidate encryption handling in hci_encrypt_cfm" + "CVE-2024-22099": { + "cmt_msg": "Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security" }, - "CVE-2019-7308": { - "cmt_msg": "bpf: fix sanitation of alu op with pointer / scalar type from different paths" + "CVE-2021-4202": { + "cmt_msg": "NFC: reorganize the functions in nci_request" }, - "CVE-2022-1966": { - "cmt_msg": "netfilter: nf_tables: disallow non-stateful expression in sets earlier" + "CVE-2021-4203": { + "cmt_msg": "af_unix: fix races in sk_peer_pid and sk_peer_cred accesses" }, - "CVE-2017-9986": { - "cmt_msg": "sound: Retire OSS" + "CVE-2023-52509": { + "cmt_msg": "ravb: Fix use-after-free issue in ravb_tx_timeout_work()" }, - "CVE-2017-9985": { - "cmt_msg": "ALSA: msnd: Optimize / harden DSP and MIDI loops" + "CVE-2023-46343": { + "cmt_msg": "nfc: nci: fix possible NULL pointer dereference in send_acknowledge()" }, - "CVE-2021-3587": { - "cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect" + "CVE-2023-52507": { + "cmt_msg": "nfc: nci: assert requested protocol is valid" }, - "CVE-2022-3533": { - "cmt_msg": "" + "CVE-2023-52506": { + "cmt_msg": "LoongArch: Set all reserved memblocks on Node#0 at initialization" }, - "CVE-2022-3534": { - "cmt_msg": "libbpf: Fix use-after-free in btf_dump_name_dups" + "CVE-2023-52501": { + "cmt_msg": "ring-buffer: Do not attempt to read past \"commit\"" }, - "CVE-2021-20261": { - "cmt_msg": "floppy: fix lock_fdc() signal handling" + "CVE-2023-52500": { + "cmt_msg": "scsi: pm80xx: Avoid leaking tags when processing OPC_INB_SET_CONTROLLER_CONFIG command" }, - "CVE-2023-28328": { - "cmt_msg": "media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer()" + "CVE-2023-52502": { + "cmt_msg": "net: nfc: fix races in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn()" }, - "CVE-2023-0386": { - "cmt_msg": "ovl: fail on invalid uid/gid mapping at copy up" + "CVE-2023-2513": { + "cmt_msg": "ext4: fix use-after-free in ext4_xattr_set_entry" }, - "CVE-2017-13693": { - "cmt_msg": "" + "CVE-2017-1000": { + "cmt_msg": "udp: consistently apply ufo or fragmentation" }, - "CVE-2017-13695": { - "cmt_msg": "ACPICA: acpi: acpica: fix acpi operand cache leak in nseval.c" + "CVE-2024-26668": { + "cmt_msg": "netfilter: nft_limit: reject configurations that cause integer overflow" }, - "CVE-2017-13694": { + "CVE-2017-0605": { + "cmt_msg": "tracing: Use strlcpy() instead of strcpy() in __trace_find_cmdline()" + }, + "CVE-2024-24858": { "cmt_msg": "" }, - "CVE-2021-4149": { - "cmt_msg": "btrfs: unlock newly allocated extent buffer after error" + "CVE-2024-26664": { + "cmt_msg": "hwmon: (coretemp) Fix out-of-bounds memory access" }, - "CVE-2022-21385": { - "cmt_msg": "net/rds: fix warn in rds_message_alloc_sgs" + "CVE-2021-38198": { + "cmt_msg": "KVM: X86: MMU: Use the correct inherited permissions to get shadow page" }, - "CVE-2022-42895": { - "cmt_msg": "Bluetooth: L2CAP: Fix attempting to access uninitialized memory" + "CVE-2022-1679": { + "cmt_msg": "ath9k: fix use-after-free in ath9k_hif_usb_rx_cb" }, - "CVE-2021-3640": { - "cmt_msg": "Bluetooth: sco: Fix lock_sock() blockage by memcpy_from_msg()" + "CVE-2023-52442": { + "cmt_msg": "ksmbd: validate session id and tree id in compound request" }, - "CVE-2022-36123": { - "cmt_msg": "x86: Clear .brk area at early boot" + "CVE-2022-40768": { + "cmt_msg": "scsi: stex: Properly zero out the passthrough command structure" }, - "CVE-2020-28097": { - "cmt_msg": "vgacon: remove software scrollback support" + "CVE-2023-52444": { + "cmt_msg": "f2fs: fix to avoid dirent corruption" }, - "CVE-2024-24859": { - "cmt_msg": "" + "CVE-2023-52445": { + "cmt_msg": "media: pvrusb2: fix use after free on context disconnection" }, - "CVE-2024-24858": { - "cmt_msg": "" + "CVE-2023-52449": { + "cmt_msg": "mtd: Fix gluebi NULL pointer dereference caused by ftl notifier" }, - "CVE-2024-24855": { - "cmt_msg": "scsi: lpfc: Fix a possible data race in lpfc_unregister_fcf_rescan()" + "CVE-2019-15807": { + "cmt_msg": "scsi: libsas: delete sas port if expander discover failed" }, - "CVE-2024-24857": { - "cmt_msg": "" + "CVE-2024-26719": { + "cmt_msg": "nouveau: offload fence uevents work to workqueue" }, - "CVE-2021-29265": { - "cmt_msg": "usbip: fix stub_dev usbip_sockfd_store() races leading to gpf" + "CVE-2024-1312": { + "cmt_msg": "mm: lock_vma_under_rcu() must check vma->anon_vma under vma lock" }, - "CVE-2021-39648": { - "cmt_msg": "usb: gadget: configfs: Fix use-after-free issue with udc_name" + "CVE-2019-14284": { + "cmt_msg": "floppy: fix div-by-zero in setup_format_params" }, - "CVE-2022-3545": { - "cmt_msg": "nfp: fix use-after-free in area_cache_get()" + "CVE-2019-14283": { + "cmt_msg": "floppy: fix out-of-bounds read in copy_buffer" }, - "CVE-2022-3542": { - "cmt_msg": "bnx2x: fix potential memory leak in bnx2x_tpa_stop()" + "CVE-2023-3338": { + "cmt_msg": "Remove DECnet support from kernel" }, - "CVE-2019-16921": { - "cmt_msg": "RDMA/hns: Fix init resp when alloc ucontext" + "CVE-2018-10882": { + "cmt_msg": "ext4: add more inode number paranoia checks" }, - "CVE-2021-21781": { - "cmt_msg": "ARM: ensure the signal page contains defined contents" + "CVE-2018-10883": { + "cmt_msg": "jbd2: don't mark block as modified if the handle is out of credits" }, - "CVE-2021-0512": { - "cmt_msg": "HID: make arrays usage and value to be the same" + "CVE-2020-12464": { + "cmt_msg": "USB: core: Fix free-while-in-use bug in the USB S-Glibrary" }, - "CVE-2023-1382": { - "cmt_msg": "tipc: set con sock in tipc_conn_alloc" + "CVE-2016-9793": { + "cmt_msg": "net: avoid signed overflows for SO_{SND|RCV}BUFFORCE" }, - "CVE-2023-1380": { - "cmt_msg": "wifi: brcmfmac: slab-out-of-bounds read in brcmf_get_assoc_ies()" + "CVE-2016-9794": { + "cmt_msg": "ALSA: pcm : Call kill_fasync() in stream lock" }, - "CVE-2020-0347": { - "cmt_msg": "" + "CVE-2022-47520": { + "cmt_msg": "wifi: wilc1000: validate pairwise and authentication suite offsets" }, - "CVE-2022-41222": { - "cmt_msg": "mm/mremap: hold the rmap lock in write mode when moving page table entries." + "CVE-2016-10044": { + "cmt_msg": "aio: mark AIO pseudo-fs noexec" }, - "CVE-2021-40490": { - "cmt_msg": "ext4: fix race writing to an inline_data file while its xattrs are changing" + "CVE-2018-10087": { + "cmt_msg": "kernel/exit.c: avoid undefined behaviour when calling wait4()" }, - "CVE-2021-33909": { - "cmt_msg": "seq_file: disallow extremely large seq buffer allocations" + "CVE-2023-3159": { + "cmt_msg": "firewire: fix potential uaf in outbound_phy_packet_callback()" }, - "CVE-2019-12456": { - "cmt_msg": "" + "CVE-2021-47059": { + "cmt_msg": "crypto: sun8i-ss - fix result memory leak on error path" }, - "CVE-2015-8952": { - "cmt_msg": "ext2: convert to mbcache2" + "CVE-2021-47052": { + "cmt_msg": "crypto: sa2ul - Fix memory leak of rxd" }, - "CVE-2022-20565": { - "cmt_msg": "HID: core: Correctly handle ReportSize being zero" + "CVE-2017-7374": { + "cmt_msg": "fscrypt: remove broken support for detecting keyring key revocation" }, - "CVE-2021-33656": { - "cmt_msg": "vt: drop old FONT ioctls" + "CVE-2022-21125": { + "cmt_msg": "x86/speculation/mmio: Reuse SRBDS mitigation for SBDS" }, - "CVE-2021-33655": { - "cmt_msg": "fbcon: Disallow setting font bigger than screen size" + "CVE-2019-19241": { + "cmt_msg": "io_uring: async workers should inherit the user creds" }, - "CVE-2022-41858": { - "cmt_msg": "drivers: net: slip: fix NPD bug in sl_tx_timeout()" + "CVE-2022-21123": { + "cmt_msg": "x86/speculation/mmio: Add mitigation for Processor MMIO Stale Data" }, - "CVE-2023-1206": { - "cmt_msg": "tcp: Reduce chance of collisions in inet6_hashfn()." + "CVE-2020-26559": { + "cmt_msg": "" }, - "CVE-2022-41850": { - "cmt_msg": "HID: roccat: Fix use-after-free in roccat_read()" + "CVE-2021-43975": { + "cmt_msg": "atlantic: Fix OOB read and write in hw_atl_utils_fw_rpc_wait" }, - "CVE-2023-2985": { - "cmt_msg": "fs: hfsplus: fix UAF issue in hfsplus_put_super" + "CVE-2018-6927": { + "cmt_msg": "futex: Prevent overflow by strengthen input validation" }, - "CVE-2020-14390": { - "cmt_msg": "fbcon: remove soft scrollback code" + "CVE-2018-3639": { + "cmt_msg": "x86/nospec: Simplify alternative_msr_write()" }, - "CVE-2022-3649": { - "cmt_msg": "nilfs2: fix use-after-free bug of struct nilfs_root" + "CVE-2023-0590": { + "cmt_msg": "net: sched: fix race condition in qdisc_graft()" }, - "CVE-2017-10663": { - "cmt_msg": "f2fs: sanity check checkpoint segno and blkoff" + "CVE-2023-0597": { + "cmt_msg": "x86/mm: Randomize per-cpu entry area" }, - "CVE-2017-10662": { - "cmt_msg": "f2fs: sanity check segment count" + "CVE-2022-28390": { + "cmt_msg": "can: ems_usb: ems_usb_start_xmit(): fix double dev_kfree_skb() in error path" }, - "CVE-2022-1184": { - "cmt_msg": "ext4: verify dir block before splitting it" + "CVE-2019-3460": { + "cmt_msg": "Bluetooth: Check L2CAP option sizes returned from l2cap_get_conf_opt" }, - "CVE-2022-3642": { - "cmt_msg": "" + "CVE-2022-3202": { + "cmt_msg": "jfs: prevent NULL deref in diFree" }, - "CVE-2024-0584": { - "cmt_msg": "ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet" + "CVE-2017-7518": { + "cmt_msg": "KVM: x86: fix singlestepping over syscall" }, - "CVE-2020-0465": { - "cmt_msg": "HID: core: Sanitize event code and type when mapping input" + "CVE-2019-11477": { + "cmt_msg": "tcp: limit payload size of sacked skbs" }, - "CVE-2021-1048": { - "cmt_msg": "fix regression in \"epoll: Keep a reference on files added to the check list\"" + "CVE-2016-4578": { + "cmt_msg": "ALSA: timer: Fix leak in events via snd_timer_user_ccallback" }, - "CVE-2021-4218": { - "cmt_msg": "sysctl: pass kernel pointers to ->proc_handler" + "CVE-2021-46906": { + "cmt_msg": "HID: usbhid: fix info leak in hid_submit_ctrl" }, - "CVE-2019-15902": { - "cmt_msg": "" + "CVE-2018-14614": { + "cmt_msg": "f2fs: fix to do sanity check with cp_pack_start_sum" }, - "CVE-2024-25739": { - "cmt_msg": "" + "CVE-2018-14617": { + "cmt_msg": "hfsplus: fix NULL dereference in hfsplus_lookup()" }, - "CVE-2024-0340": { - "cmt_msg": "vhost: use kzalloc() instead of kmalloc() followed by memset()" + "CVE-2018-14616": { + "cmt_msg": "f2fs: fix to do sanity check with block address in main area v2" }, - "CVE-2023-6535": { - "cmt_msg": "" + "CVE-2018-14611": { + "cmt_msg": "btrfs: validate type when reading a chunk" }, - "CVE-2023-6536": { - "cmt_msg": "" + "CVE-2018-14610": { + "cmt_msg": "btrfs: Check that each block group has corresponding chunk at mount time" }, - "CVE-2021-27365": { - "cmt_msg": "scsi: iscsi: Ensure sysfs attributes are limited to PAGE_SIZE" + "CVE-2018-14613": { + "cmt_msg": "btrfs: tree-checker: Verify block_group_item" }, - "CVE-2021-27364": { - "cmt_msg": "scsi: iscsi: Restrict sessions and handles to admin capabilities" + "CVE-2018-14612": { + "cmt_msg": "btrfs: tree-checker: Detect invalid and empty essential trees" }, - "CVE-2021-27363": { - "cmt_msg": "scsi: iscsi: Restrict sessions and handles to admin capabilities" + "CVE-2024-23848": { + "cmt_msg": "" }, - "CVE-2022-23036": { - "cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()" + "CVE-2020-27418": { + "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region" }, - "CVE-2018-17977": { - "cmt_msg": "" + "CVE-2017-2618": { + "cmt_msg": "selinux: fix off-by-one in setprocattr" }, - "CVE-2010-5321": { - "cmt_msg": "" + "CVE-2019-2025": { + "cmt_msg": "binder: fix race that allows malicious free of live buffer" }, - "CVE-2021-20321": { - "cmt_msg": "ovl: fix missing negative dentry check in ovl_rename()" + "CVE-2019-2024": { + "cmt_msg": "media: em28xx: Fix use-after-free when disconnecting" }, - "CVE-2022-42896": { - "cmt_msg": "Bluetooth: L2CAP: Fix accepting connection request for invalid SPSM" + "CVE-2017-15951": { + "cmt_msg": "KEYS: Fix race between updating and finding a negative key" }, - "CVE-2017-5967": { - "cmt_msg": "time: Remove CONFIG_TIMER_STATS" + "CVE-2019-19074": { + "cmt_msg": "ath9k: release allocated buffer if timed out" }, - "CVE-2023-7192": { - "cmt_msg": "netfilter: ctnetlink: fix possible refcount leak in ctnetlink_create_conntrack()" + "CVE-2019-19073": { + "cmt_msg": "ath9k_htc: release allocated buffer if timed out" }, - "CVE-2022-3169": { - "cmt_msg": "nvme: ensure subsystem reset is single threaded" + "CVE-2019-1125": { + "cmt_msg": "x86/speculation: Prepare entry code for Spectre v1 swapgs mitigations" }, - "CVE-2022-36280": { - "cmt_msg": "drm/vmwgfx: Validate the box size for the snooped cursor" + "CVE-2023-31085": { + "cmt_msg": "ubi: Refuse attaching if mtd's erasesize is 0" }, - "CVE-2019-2054": { - "cmt_msg": "arm/ptrace: run seccomp after ptrace" + "CVE-2023-31084": { + "cmt_msg": "media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*()" }, - "CVE-2016-10147": { - "cmt_msg": "crypto: mcryptd - Check mcryptd algorithm compatibility" + "CVE-2023-31083": { + "cmt_msg": "Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO" }, - "CVE-2024-21803": { + "CVE-2023-31082": { "cmt_msg": "" }, - "CVE-2021-3542": { + "CVE-2023-31081": { "cmt_msg": "" }, - "CVE-2022-20166": { - "cmt_msg": "drivers core: Use sysfs_emit and sysfs_emit_at for show(device *...) functions" + "CVE-2022-32296": { + "cmt_msg": "tcp: increase source port perturb table to 2^16" }, - "CVE-2023-30456": { - "cmt_msg": "KVM: nVMX: add missing consistency checks for CR0 and CR4" + "CVE-2020-28974": { + "cmt_msg": "vt: Disable KD_FONT_OP_COPY" }, - "CVE-2020-12656": { - "cmt_msg": "sunrpc: check that domain table is empty at module unload." + "CVE-2019-20806": { + "cmt_msg": "media: tw5864: Fix possible NULL pointer dereference in tw5864_handle_frame" }, - "CVE-2022-23040": { - "cmt_msg": "xen/xenbus: don't let xenbus_grant_ring() remove grants in error case" + "CVE-2022-3028": { + "cmt_msg": "af_key: Do not call xfrm_probe_algs in parallel" }, - "CVE-2020-12655": { - "cmt_msg": "xfs: add agf freeblocks verify in xfs_agf_verify" + "CVE-2020-14304": { + "cmt_msg": "" }, - "CVE-2018-12929": { + "CVE-2010-5321": { "cmt_msg": "" }, - "CVE-2019-12380": { - "cmt_msg": "efi/x86/Add missing error handling to old_memmap 1:1 mapping code" + "CVE-2022-33981": { + "cmt_msg": "floppy: disable FDRAWCMD by default" }, - "CVE-2019-12381": { - "cmt_msg": "ip_sockglue: Fix missing-check bug in ip_ra_control()" + "CVE-2017-16995": { + "cmt_msg": "bpf: fix incorrect sign extension in check_alu_op()" }, - "CVE-2020-36310": { - "cmt_msg": "KVM: SVM: avoid infinite loop on NPF from bad address" + "CVE-2017-16994": { + "cmt_msg": "mm/pagewalk.c: report holes in hugetlb ranges" }, - "CVE-2020-36313": { - "cmt_msg": "KVM: Fix out of range accesses to memslots" + "CVE-2017-2583": { + "cmt_msg": "KVM: x86: fix emulation of \"MOV SS, null selector\"" }, - "CVE-2020-35519": { - "cmt_msg": "net/x25: prevent a couple of overflows" + "CVE-2017-2584": { + "cmt_msg": "KVM: x86: Introduce segmented_write_std" }, - "CVE-2024-26592": { - "cmt_msg": "ksmbd: fix UAF issue in ksmbd_tcp_new_connection()" + "CVE-2016-4998": { + "cmt_msg": "netfilter: x_tables: check for bogus target offset" }, - "CVE-2022-48619": { - "cmt_msg": "Input: add bounds checking to input_set_capability()" + "CVE-2016-6213": { + "cmt_msg": "mnt: Add a per mount namespace limit on the number of mounts" }, - "CVE-2020-10708": { - "cmt_msg": "" + "CVE-2017-17558": { + "cmt_msg": "USB: core: prevent malicious bNumInterfaces overflow" }, - "CVE-2022-0400": { - "cmt_msg": "" + "CVE-2023-1390": { + "cmt_msg": "tipc: fix NULL deref in tipc_link_xmit()" }, - "CVE-2024-25741": { + "CVE-2020-10751": { + "cmt_msg": "selinux: properly handle multiple messages in selinux_netlink_send()" + }, + "CVE-2020-10757": { + "cmt_msg": "mm: Fix mremap not considering huge pmd devmap" + }, + "CVE-2022-1116": { "cmt_msg": "" }, - "CVE-2022-26966": { - "cmt_msg": "sr9700: sanity check for packet length" + "CVE-2021-28660": { + "cmt_msg": "staging: rtl8188eu: prevent ->ssid overflow in rtw_wx_set_scan()" }, - "CVE-2021-42739": { - "cmt_msg": "media: firewire: firedtv-avc: fix a buffer overflow in avc_ca_pmt()" + "CVE-2017-6348": { + "cmt_msg": "irda: Fix lockdep annotations in hashbin_delete()." }, - "CVE-2023-1989": { - "cmt_msg": "Bluetooth: btsdio: fix use after free bug in btsdio_remove due to unfinished work" + "CVE-2020-36386": { + "cmt_msg": "Bluetooth: Fix slab-out-of-bounds read in hci_extended_inquiry_result_evt()" }, - "CVE-2020-12771": { - "cmt_msg": "bcache: fix potential deadlock problem in btree_gc_coalesce" + "CVE-2017-6345": { + "cmt_msg": "net/llc: avoid BUG_ON() in skb_orphan()" }, - "CVE-2022-20369": { - "cmt_msg": "media: v4l2-mem2mem: Apply DST_QUEUE_OFF_BASE on MMAP buffers across ioctls" + "CVE-2017-6346": { + "cmt_msg": "packet: fix races in fanout_add()" }, - "CVE-2022-25265": { - "cmt_msg": "" + "CVE-2017-6347": { + "cmt_msg": "ip: fix IP_CHECKSUM handling" }, - "CVE-2022-20368": { - "cmt_msg": "net/packet: fix slab-out-of-bounds access in packet_recvmsg()" + "CVE-2018-9385": { + "cmt_msg": "ARM: amba: Don't read past the end of sysfs \"driver_override\" buffer" }, - "CVE-2020-25285": { - "cmt_msg": "mm/hugetlb: fix a race between hugetlb sysctl handlers" + "CVE-2020-0009": { + "cmt_msg": "staging: android: ashmem: Disallow ashmem memory from being remapped" }, - "CVE-2022-21499": { - "cmt_msg": "lockdown: also lock down previous kgdb use" + "CVE-2019-14615": { + "cmt_msg": "drm/i915/gen9: Clear residual context state on context switch" }, - "CVE-2020-25284": { - "cmt_msg": "rbd: require global CAP_SYS_ADMIN for mapping and unmapping" + "CVE-2016-3135": { + "cmt_msg": "netfilter: x_tables: check for size overflow" }, - "CVE-2015-3339": { - "cmt_msg": "fs: take i_mutex during prepare_binprm for set[ug]id executables" + "CVE-2016-3134": { + "cmt_msg": "netfilter: x_tables: fix unconditional helper" }, - "CVE-2023-20593": { - "cmt_msg": "x86/cpu/amd: Add a Zenbleed fix" + "CVE-2018-9415": { + "cmt_msg": "ARM: amba: Fix race condition with driver_override" }, - "CVE-2023-3022": { - "cmt_msg": "ipv6: Use result arg in fib_lookup_arg consistently" + "CVE-2019-13648": { + "cmt_msg": "powerpc/tm: Fix oops on sigreturn on systems without TM" }, - "CVE-2022-2663": { - "cmt_msg": "netfilter: nf_conntrack_irc: Fix forged IP logic" + "CVE-2018-15572": { + "cmt_msg": "x86/speculation: Protect against userspace-userspace spectreRSB" }, - "CVE-2022-43750": { - "cmt_msg": "usb: mon: make mmapped memory read only" + "CVE-2022-1204": { + "cmt_msg": "ax25: Fix refcount leaks caused by ax25_cb_del()" }, - "CVE-2023-0047": { - "cmt_msg": "mm, oom: do not trigger out_of_memory from the #PF" + "CVE-2018-9363": { + "cmt_msg": "Bluetooth: hidp: buffer overflow in hidp_process_report" }, - "CVE-2023-4010": { - "cmt_msg": "" + "CVE-2016-10723": { + "cmt_msg": "mm, oom: remove sleep from under oom_lock" }, - "CVE-2022-20424": { - "cmt_msg": "io_uring: remove io_identity" + "CVE-2022-26490": { + "cmt_msg": "nfc: st21nfca: Fix potential buffer overflows in EVT_TRANSACTION" }, - "CVE-2023-4385": { - "cmt_msg": "fs: jfs: fix possible NULL pointer dereference in dbFree()" + "CVE-2020-8832": { + "cmt_msg": "drm/i915: Record the default hw state after reset upon load" }, - "CVE-2019-19378": { - "cmt_msg": "" + "CVE-2023-52531": { + "cmt_msg": "wifi: iwlwifi: mvm: Fix a memory corruption issue" }, - "CVE-2020-4788": { - "cmt_msg": "powerpc/64s: flush L1D on kernel entry" + "CVE-2023-52532": { + "cmt_msg": "net: mana: Fix TX CQE error handling" }, - "CVE-2022-36879": { - "cmt_msg": "xfrm: xfrm_policy: fix a possible double xfrm_pols_put() in xfrm_bundle_lookup()" + "CVE-2016-7039": { + "cmt_msg": "net: add recursion limit to GRO" }, - "CVE-2021-39698": { - "cmt_msg": "wait: add wake_up_pollfree()" + "CVE-2023-39189": { + "cmt_msg": "netfilter: nfnetlink_osf: avoid OOB read" }, - "CVE-2022-45934": { - "cmt_msg": "Bluetooth: L2CAP: Fix u8 overflow" + "CVE-2024-26677": { + "cmt_msg": "rxrpc: Fix delayed ACKs to not set the reference serial number" }, - "CVE-2019-19377": { - "cmt_msg": "btrfs: Don't submit any btree write bio if the fs has errors" + "CVE-2020-25211": { + "cmt_msg": "netfilter: ctnetlink: add a range check for l3/l4 protonum" }, - "CVE-2022-2380": { - "cmt_msg": "video: fbdev: sm712fb: Fix crash in smtcfb_read()" + "CVE-2020-25212": { + "cmt_msg": "nfs: Fix getxattr kernel panic and memory overflow" }, - "CVE-2022-0850": { - "cmt_msg": "ext4: fix kernel infoleak via ext4_extent_header" + "CVE-2020-28374": { + "cmt_msg": "scsi: target: Fix XCOPY NAA identifier lookup" }, - "CVE-2017-13166": { - "cmt_msg": "media: v4l2-ioctl.c: use check_fmt for enum/g/s/try_fmt" + "CVE-2024-26672": { + "cmt_msg": "drm/amdgpu: Fix variable 'mca_funcs' dereferenced before NULL check in 'amdgpu_mca_smu_get_mca_entry()'" }, - "CVE-2021-3612": { - "cmt_msg": "Input: joydev - prevent potential read overflow in ioctl" + "CVE-2024-26671": { + "cmt_msg": "blk-mq: fix IO hang from sbitmap wakeup race" }, - "CVE-2020-24503": { - "cmt_msg": "" + "CVE-2024-26679": { + "cmt_msg": "inet: read sk->sk_family once in inet_recv_error()" }, - "CVE-2020-24502": { - "cmt_msg": "" + "CVE-2023-52458": { + "cmt_msg": "block: add check that partition length needs to be aligned with block size" }, - "CVE-2019-19448": { - "cmt_msg": "btrfs: only search for left_info if there is no right_info in try_merge_free_space" + "CVE-2023-52451": { + "cmt_msg": "powerpc/pseries/memhp: Fix access beyond end of drmem array" }, - "CVE-2019-19449": { - "cmt_msg": "f2fs: fix to do sanity check on segment/section count" + "CVE-2018-9568": { + "cmt_msg": "net: Set sk_prot_creator when cloning sockets to the right proto" }, - "CVE-2021-3753": { - "cmt_msg": "vt_kdsetmode: extend console locking" + "CVE-2019-14816": { + "cmt_msg": "mwifiex: Fix three heap overflow at parsing element in cfg80211_ap_settings" }, - "CVE-2021-3752": { - "cmt_msg": "Bluetooth: fix use-after-free error in lock_sock_nested()" + "CVE-2019-14814": { + "cmt_msg": "mwifiex: Fix three heap overflow at parsing element in cfg80211_ap_settings" }, - "CVE-2021-0937": { - "cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write" + "CVE-2024-26700": { + "cmt_msg": "drm/amd/display: Fix MST Null Ptr for RV" }, - "CVE-2017-18249": { - "cmt_msg": "f2fs: fix race condition in between free nid allocator/initializer" + "CVE-2024-26706": { + "cmt_msg": "parisc: Fix random data corruption from exception handler" }, - "CVE-2022-1263": { - "cmt_msg": "KVM: avoid NULL pointer dereference in kvm_dirty_ring_push" + "CVE-2024-26704": { + "cmt_msg": "ext4: fix double-free of blocks due to wrong extents moved_len" }, - "CVE-2021-35477": { - "cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4" + "CVE-2020-25672": { + "cmt_msg": "nfc: fix memory leak in llcp_sock_connect()" }, - "CVE-2023-31436": { - "cmt_msg": "net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg" + "CVE-2020-25673": { + "cmt_msg": "nfc: Avoid endless loops caused by repeated llcp_sock_connect()" }, - "CVE-2022-3606": { - "cmt_msg": "" + "CVE-2020-25670": { + "cmt_msg": "nfc: fix refcount leak in llcp_sock_bind()" }, - "CVE-2022-2209": { - "cmt_msg": "" + "CVE-2020-25671": { + "cmt_msg": "nfc: fix refcount leak in llcp_sock_connect()" }, - "CVE-2019-12614": { - "cmt_msg": "powerpc/pseries/dlpar: Fix a missing check in dlpar_parse_cc_property()" + "CVE-2019-19813": { + "cmt_msg": "btrfs: inode: Verify inode mode to avoid NULL pointer dereference" }, - "CVE-2021-37576": { - "cmt_msg": "KVM: PPC: Book3S: Fix H_RTAS rets buffer overflow" + "CVE-2020-29374": { + "cmt_msg": "gup: document and work around \"COW can break either way\" issue" }, - "CVE-2023-45871": { - "cmt_msg": "igb: set max size RX buffer when store bad packet is enabled" + "CVE-2019-19815": { + "cmt_msg": "f2fs: support swap file w/ DIO" }, - "CVE-2023-7042": { + "CVE-2019-19814": { "cmt_msg": "" }, - "CVE-2022-3594": { - "cmt_msg": "r8152: Rate limit overflow messages" + "CVE-2020-29371": { + "cmt_msg": "romfs: fix uninitialized memory leak in romfs_dev_read()" }, - "CVE-2022-3595": { - "cmt_msg": "cifs: fix double-fault crash during ntlmssp" + "CVE-2019-19816": { + "cmt_msg": "btrfs: inode: Verify inode mode to avoid NULL pointer dereference" }, - "CVE-2023-47233": { - "cmt_msg": "" + "CVE-2018-18710": { + "cmt_msg": "cdrom: fix improper type cast, which can leat to information leak." }, - "CVE-2020-27815": { - "cmt_msg": "jfs: Fix array index bounds check in dbAdjTree" + "CVE-2023-34255": { + "cmt_msg": "xfs: verify buffer contents when we skip log replay" }, - "CVE-2022-1462": { - "cmt_msg": "tty: use new tty_insert_flip_string_and_push_buffer() in pty_write()" + "CVE-2017-14051": { + "cmt_msg": "scsi: qla2xxx: Fix an integer overflow in sysfs code" }, - "CVE-2023-6606": { - "cmt_msg": "smb: client: fix OOB in smbCalcSize()" + "CVE-2023-3141": { + "cmt_msg": "memstick: r592: Fix UAF bug in r592_remove due to race condition" }, - "CVE-2020-27777": { - "cmt_msg": "powerpc/rtas: Restrict RTAS requests from userspace" + "CVE-2020-12655": { + "cmt_msg": "xfs: add agf freeblocks verify in xfs_agf_verify" }, - "CVE-2017-1000405": { - "cmt_msg": "mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d()" + "CVE-2022-3524": { + "cmt_msg": "tcp/udp: Fix memory leak in ipv6_renew_options()." }, - "CVE-2020-27673": { - "cmt_msg": "xen/events: add a proper barrier to 2-level uevent unmasking" + "CVE-2022-3523": { + "cmt_msg": "mm/memory.c: fix race when faulting a device private page" }, - "CVE-2020-27675": { - "cmt_msg": "xen/events: avoid removing an event channel while handling it" + "CVE-2022-3522": { + "cmt_msg": "mm/hugetlb: use hugetlb_pte_stable in migration race check" }, - "CVE-2020-28915": { - "cmt_msg": "fbcon: Fix global-out-of-bounds read in fbcon_get_font()" + "CVE-2018-7755": { + "cmt_msg": "floppy: Do not copy a kernel pointer to user memory in FDGETPRM ioctl" }, - "CVE-2019-20908": { - "cmt_msg": "efi: Restrict efivar_ssdt_load when the kernel is locked down" + "CVE-2017-7346": { + "cmt_msg": "drm/vmwgfx: limit the number of mip levels in vmw_gb_surface_define_ioctl()" }, - "CVE-2023-3776": { - "cmt_msg": "net/sched: cls_fw: Fix improper refcount update leads to use-after-free" + "CVE-2018-7757": { + "cmt_msg": "scsi: libsas: fix memory leak in sas_smp_get_phy_events()" }, - "CVE-2021-28038": { - "cmt_msg": "Xen/gnttab: handle p2m update errors on a per-slot basis" + "CVE-2022-0330": { + "cmt_msg": "drm/i915: Flush TLBs before releasing backing store" }, - "CVE-2022-3111": { - "cmt_msg": "power: supply: wm8350-power: Add missing free in free_charger_irq" + "CVE-2022-4095": { + "cmt_msg": "staging: rtl8712: fix use after free bugs" }, - "CVE-2023-52435": { - "cmt_msg": "net: prevent mss overflow in skb_segment()" + "CVE-2017-10911": { + "cmt_msg": "xen-blkback: don't leak stack data via response ring" }, - "CVE-2023-52434": { - "cmt_msg": "smb: client: fix potential OOBs in smb2_parse_contexts()" + "CVE-2022-45919": { + "cmt_msg": "media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221" }, - "CVE-2024-26584": { - "cmt_msg": "net: tls: handle backlogging of crypto requests" + "CVE-2018-5873": { + "cmt_msg": "nsfs: mark dentry with DCACHE_RCUACCESS" }, - "CVE-2023-52436": { - "cmt_msg": "f2fs: explicitly null-terminate the xattr list" + "CVE-2016-9120": { + "cmt_msg": "staging/android/ion : fix a race condition in the ion driver" }, - "CVE-2019-19060": { - "cmt_msg": "iio: imu: adis16400: release allocated memory on failure" + "CVE-2021-3669": { + "cmt_msg": "ipc: replace costly bailout check in sysvipc_find_ipc()" }, - "CVE-2019-19061": { - "cmt_msg": "iio: imu: adis16400: fix memory leak" + "CVE-2019-3701": { + "cmt_msg": "can: gw: ensure DLC boundaries after CAN frame modification" }, - "CVE-2019-19063": { - "cmt_msg": "rtlwifi: prevent memory leak in rtl_usb_probe" + "CVE-2023-1095": { + "cmt_msg": "netfilter: nf_tables: fix null deref due to zeroed list head" }, - "CVE-2019-9445": { - "cmt_msg": "f2fs: check if file namelen exceeds max value" + "CVE-2022-3239": { + "cmt_msg": "media: em28xx: initialize refcount before kref_get" }, - "CVE-2021-3506": { - "cmt_msg": "f2fs: fix to avoid out-of-bounds memory access" + "CVE-2022-4543": { + "cmt_msg": "" }, - "CVE-2020-0435": { - "cmt_msg": "f2fs: fix to do sanity check with i_extra_isize" + "CVE-2017-11089": { + "cmt_msg": "cfg80211: Define nla_policy for NL80211_ATTR_LOCAL_MESH_POWER_MODE" + }, + "CVE-2019-18282": { + "cmt_msg": "net/flow_dissector: switch to siphash" + }, + "CVE-2021-34981": { + "cmt_msg": "Bluetooth: cmtp: fix file refcount when cmtp_attach_device fails" }, - "CVE-2020-0432": { - "cmt_msg": "staging: most: net: fix buffer overflow" + "CVE-2023-4881": { + "cmt_msg": "netfilter: nftables: exthdr: fix 4-byte stack OOB write" }, - "CVE-2020-0433": { - "cmt_msg": "blk-mq: sync the update nr_hw_queues with blk_mq_queue_tag_busy_iter" + "CVE-2013-7445": { + "cmt_msg": "" }, - "CVE-2023-51779": { - "cmt_msg": "Bluetooth: af_bluetooth: Fix Use-After-Free in bt_sock_recvmsg" + "CVE-2024-26804": { + "cmt_msg": "net: ip_tunnel: prevent perpetual headroom growth" }, - "CVE-2019-3874": { - "cmt_msg": "sctp: implement memory accounting on tx path" + "CVE-2022-3303": { + "cmt_msg": "ALSA: pcm: oss: Fix race at SNDCTL_DSP_SYNC" }, - "CVE-2023-6915": { - "cmt_msg": "ida: Fix crash in ida_free when the bitmap is empty" + "CVE-2021-37159": { + "cmt_msg": "usb: hso: fix error handling code of hso_create_net_device" }, - "CVE-2010-4563": { - "cmt_msg": "" + "CVE-2024-0607": { + "cmt_msg": "netfilter: nf_tables: fix pointer math issue in nft_byteorder_eval()" }, - "CVE-2023-1249": { - "cmt_msg": "coredump: Use the vma snapshot in fill_files_note" + "CVE-2024-26801": { + "cmt_msg": "Bluetooth: Avoid potential use-after-free in hci_error_reset" }, - "CVE-2023-2162": { - "cmt_msg": "scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress" + "CVE-2022-28388": { + "cmt_msg": "can: usb_8dev: usb_8dev_start_xmit(): fix double dev_kfree_skb() in error path" }, - "CVE-2017-15116": { - "cmt_msg": "crypto: rng - Remove old low-level rng interface" + "CVE-2017-15115": { + "cmt_msg": "sctp: do not peel off an assoc from one netns to another one" }, - "CVE-2022-1280": { - "cmt_msg": "drm: avoid circular locks in drm_mode_getconnector" + "CVE-2018-1000004": { + "cmt_msg": "ALSA: seq: Make ioctls race-free" }, - "CVE-2024-23851": { - "cmt_msg": "dm: limit the number of targets and parameter size area" + "CVE-2023-52607": { + "cmt_msg": "powerpc/mm: Fix null-pointer dereference in pgtable_cache_add" }, - "CVE-2023-0266": { - "cmt_msg": "ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF" + "CVE-2019-20811": { + "cmt_msg": "net-sysfs: call dev_hold if kobject_init_and_add success" }, - "CVE-2023-1838": { - "cmt_msg": "Fix double fget() in vhost_net_set_backend()" + "CVE-2019-20810": { + "cmt_msg": "media: go7007: fix a miss of snd_card_free" }, - "CVE-2021-3483": { - "cmt_msg": "firewire: nosy: Fix a use-after-free bug in nosy_ioctl()" + "CVE-2019-20812": { + "cmt_msg": "af_packet: set defaule value for tmo" }, - "CVE-2023-6040": { - "cmt_msg": "netfilter: nf_tables: Reject tables of unsupported family" + "CVE-2020-14314": { + "cmt_msg": "ext4: fix potential negative array index in do_split()" }, - "CVE-2021-38300": { - "cmt_msg": "bpf, mips: Validate conditional branch offsets" + "CVE-2019-18660": { + "cmt_msg": "powerpc/book3s64: Fix link stack flush on context switch" }, - "CVE-2020-25656": { - "cmt_msg": "vt: keyboard, extend func_buf_lock to readers" + "CVE-2024-23196": { + "cmt_msg": "ALSA: hda: fix a possible null-pointer dereference due to data race in snd_hdac_regmap_sync()" }, - "CVE-2022-24448": { - "cmt_msg": "NFSv4: Handle case where the lookup of a directory fails" + "CVE-2019-12380": { + "cmt_msg": "efi/x86/Add missing error handling to old_memmap 1:1 mapping code" }, - "CVE-2021-4023": { - "cmt_msg": "io-wq: fix cancellation on create-worker failure" + "CVE-2019-12381": { + "cmt_msg": "ip_sockglue: Fix missing-check bug in ip_ra_control()" }, - "CVE-2022-2318": { - "cmt_msg": "net: rose: fix UAF bugs caused by timer handler" + "CVE-2019-12382": { + "cmt_msg": "drm/edid: Fix a missing-check bug in drm_load_edid_firmware()" }, - "CVE-2021-22555": { - "cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write" + "CVE-2020-10766": { + "cmt_msg": "x86/speculation: Prevent rogue cross-process SSBD shutdown" }, - "CVE-2021-0399": { - "cmt_msg": "" + "CVE-2020-10767": { + "cmt_msg": "x86/speculation: Avoid force-disabling IBPB based on STIBP and enhanced IBRS." }, - "CVE-2020-36691": { - "cmt_msg": "netlink: limit recursion depth in policy validation" + "CVE-2019-25162": { + "cmt_msg": "i2c: Fix a potential use after free" }, - "CVE-2023-42755": { - "cmt_msg": "net/sched: Retire rsvp classifier" + "CVE-2019-25160": { + "cmt_msg": "netlabel: fix out-of-bounds memory accesses" }, - "CVE-2020-36516": { - "cmt_msg": "ipv4: avoid using shared IP generator for connected sockets" + "CVE-2020-10768": { + "cmt_msg": "x86/speculation: PR_SPEC_FORCE_DISABLE enforcement for indirect branches." }, - "CVE-2012-4542": { - "cmt_msg": "" + "CVE-2020-10769": { + "cmt_msg": "crypto: authenc - fix parsing key with misaligned rta_len" }, - "CVE-2023-42752": { - "cmt_msg": "igmp: limit igmpv3_newpack() packet size to IP_MAX_MTU" + "CVE-2020-10942": { + "cmt_msg": "vhost: Check docket sk_family instead of call getname" }, - "CVE-2023-1118": { - "cmt_msg": "media: rc: Fix use-after-free bugs caused by ene_tx_irqsim()" + "CVE-2020-26139": { + "cmt_msg": "mac80211: do not accept/forward invalid EAPOL frames" }, - "CVE-2021-3573": { - "cmt_msg": "Bluetooth: use correct lock to prevent UAF of hdev object" + "CVE-2019-19536": { + "cmt_msg": "can: peak_usb: pcan_usb_pro: Fix info-leaks to USB devices" }, - "CVE-2022-1679": { - "cmt_msg": "ath9k: fix use-after-free in ath9k_hif_usb_rx_cb" + "CVE-2019-19537": { + "cmt_msg": "USB: core: Fix races in character device registration and deregistraion" }, - "CVE-2018-1000026": { - "cmt_msg": "bnx2x: disable GSO where gso_size is too big for hardware" + "CVE-2019-19534": { + "cmt_msg": "can: peak_usb: fix slab info leak" }, - "CVE-2022-1975": { - "cmt_msg": "NFC: netlink: fix sleep in atomic bug when firmware download timeout" + "CVE-2019-19535": { + "cmt_msg": "can: peak_usb: pcan_usb_fd: Fix info-leaks to USB devices" }, - "CVE-2022-44032": { - "cmt_msg": "char: pcmcia: remove all the drivers" + "CVE-2019-19532": { + "cmt_msg": "HID: Fix assumption that devices have inputs" }, - "CVE-2018-12130": { - "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" + "CVE-2019-19533": { + "cmt_msg": "media: ttusb-dec: Fix info-leak in ttusb_dec_send_command()" }, - "CVE-2021-20292": { - "cmt_msg": "drm/ttm/nouveau: don't call tt destroy callback on alloc failure." + "CVE-2019-19530": { + "cmt_msg": "usb: cdc-acm: make sure a refcount is taken early enough" }, - "CVE-2021-31916": { - "cmt_msg": "dm ioctl: fix out of bounds array access when no devices" + "CVE-2019-19531": { + "cmt_msg": "usb: yurex: Fix use-after-free in yurex_delete" }, - "CVE-2017-8065": { - "cmt_msg": "crypto: ccm - move cbcmac input off the stack" + "CVE-2016-6156": { + "cmt_msg": "platform/chrome: cros_ec_dev - double fetch bug in ioctl" }, - "CVE-2022-32981": { - "cmt_msg": "powerpc/32: Fix overread/overwrite of thread_struct via ptrace" + "CVE-2017-18257": { + "cmt_msg": "f2fs: fix a dead loop in f2fs_fiemap()" }, - "CVE-2023-3772": { - "cmt_msg": "xfrm: add NULL check in xfrm_update_ae_params" + "CVE-2017-18255": { + "cmt_msg": "perf/core: Fix the perf_cpu_time_max_percent check" }, - "CVE-2022-3424": { - "cmt_msg": "misc: sgi-gru: fix use-after-free error in gru_set_context_option, gru_fault and gru_handle_user_call_os" + "CVE-2023-52527": { + "cmt_msg": "ipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data()" }, - "CVE-2020-11669": { - "cmt_msg": "powerpc/powernv/idle: Restore AMR/UAMOR/AMOR after idle" + "CVE-2023-3006": { + "cmt_msg": "arm64: Add AMPERE1 to the Spectre-BHB affected list" }, - "CVE-2023-2269": { - "cmt_msg": "dm ioctl: fix nested locking in table_clear() to remove deadlock concern" + "CVE-2023-52522": { + "cmt_msg": "net: fix possible store tearing in neigh_periodic_work()" }, - "CVE-2023-0394": { - "cmt_msg": "ipv6: raw: Deduct extension header length in rawv6_push_pending_frames" + "CVE-2023-52528": { + "cmt_msg": "net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg" }, - "CVE-2023-32269": { - "cmt_msg": "netrom: Fix use-after-free caused by accept on already connected socket" + "CVE-2020-0305": { + "cmt_msg": "chardev: Avoid potential use-after-free in 'chrdev_open()'" }, - "CVE-2021-3659": { - "cmt_msg": "net: mac802154: Fix general protection fault" + "CVE-2023-39198": { + "cmt_msg": "drm/qxl: fix UAF on handle creation" }, - "CVE-2022-25258": { - "cmt_msg": "USB: gadget: validate interface OS descriptor requests" + "CVE-2023-39194": { + "cmt_msg": "net: xfrm: Fix xfrm_address_filter OOB read" }, - "CVE-2021-4155": { - "cmt_msg": "xfs: map unwritten blocks in XFS_IOC_{ALLOC,FREE}SP just like fallocate" + "CVE-2023-39197": { + "cmt_msg": "netfilter: conntrack: dccp: copy entire header to stack buffer, not just basic one" }, - "CVE-2021-4150": { - "cmt_msg": "block: fix incorrect references to disk objects" + "CVE-2023-39193": { + "cmt_msg": "netfilter: xt_sctp: validate the flag_info count" }, - "CVE-2020-3702": { - "cmt_msg": "ath: Use safer key clearing with key cache entries" + "CVE-2023-39192": { + "cmt_msg": "netfilter: xt_u32: validate user space input" }, - "CVE-2021-3653": { - "cmt_msg": "KVM: nSVM: avoid picking up unsupported bits from L2 in int_ctl (CVE-2021-3653)" + "CVE-2024-26600": { + "cmt_msg": "phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP" }, - "CVE-2021-3655": { - "cmt_msg": "sctp: validate from_addr_param return" + "CVE-2024-26606": { + "cmt_msg": "binder: signal epoll threads of self-work" }, - "CVE-2020-8694": { - "cmt_msg": "powercap: restrict energy meter to root access" + "CVE-2017-14156": { + "cmt_msg": "video: fbdev: aty: do not leak uninitialized padding in clk to userspace" }, - "CVE-2021-4159": { - "cmt_msg": "bpf: Verifer, adjust_scalar_min_max_vals to always call update_reg_bounds()" + "CVE-2023-52429": { + "cmt_msg": "dm: limit the number of targets and parameter size area" }, - "CVE-2021-29154": { - "cmt_msg": "bpf, x86: Validate computation of branch displacements for x86-64" + "CVE-2022-1652": { + "cmt_msg": "floppy: use a statically allocated error counter" }, - "CVE-2019-12615": { - "cmt_msg": "mdesc: fix a missing-check bug in get_vdev_port_node_info()" + "CVE-2020-29568": { + "cmt_msg": "xen/xenbus: Allow watches discard events before queueing" }, - "CVE-2021-3714": { + "CVE-2016-8666": { + "cmt_msg": "tunnels: Don't apply GRO to multiple layers of encapsulation." + }, + "CVE-2016-8660": { "cmt_msg": "" }, - "CVE-2019-11487": { - "cmt_msg": "fs: prevent page refcount overflow in pipe_buf_get" + "CVE-2019-13272": { + "cmt_msg": "ptrace: Fix ->ptracer_cred handling for PTRACE_TRACEME" }, - "CVE-2019-16230": { - "cmt_msg": "drm/amdkfd: fix a potential NULL pointer dereference (v2)" + "CVE-2022-1786": { + "cmt_msg": "io_uring: remove io_identity" }, - "CVE-2017-12168": { - "cmt_msg": "arm64: KVM: pmu: Fix AArch32 cycle counter access" + "CVE-2020-25669": { + "cmt_msg": "Input: sunkbd - avoid use-after-free in teardown paths" }, - "CVE-2019-16233": { - "cmt_msg": "scsi: qla2xxx: fix a potential NULL pointer dereference" + "CVE-2020-25668": { + "cmt_msg": "tty: make FONTX ioctl use the tty pointer they were actually passed" }, - "CVE-2021-3892": { + "CVE-2008-4609": { "cmt_msg": "" }, - "CVE-2021-39633": { - "cmt_msg": "ip_gre: add validation for csum_start" + "CVE-2023-26607": { + "cmt_msg": "ntfs: fix out-of-bounds read in ntfs_attr_find()" }, - "CVE-2021-39636": { - "cmt_msg": "netfilter: x_tables: fix pointer leaks to userspace" + "CVE-2021-4037": { + "cmt_msg": "xfs: fix up non-directory creation in SGID directories" }, - "CVE-2017-18204": { - "cmt_msg": "ocfs2: should wait dio before inode lock in ocfs2_setattr()" + "CVE-2021-22543": { + "cmt_msg": "KVM: do not allow mapping valid but non-reference-counted pages" }, - "CVE-2021-39634": { - "cmt_msg": "epoll: do not insert into poll queues until all sanity checks are done" + "CVE-2018-18386": { + "cmt_msg": "n_tty: fix EXTPROC vs ICANON interaction with TIOCINQ (aka FIONREAD)" }, - "CVE-2022-25375": { - "cmt_msg": "usb: gadget: rndis: check size of RNDIS_MSG_SET command" + "CVE-2021-47169": { + "cmt_msg": "serial: rp2: use 'request_firmware' instead of 'request_firmware_nowait'" }, - "CVE-2022-33742": { - "cmt_msg": "xen/blkfront: force data bouncing when backend is untrusted" + "CVE-2016-8405": { + "cmt_msg": "fbdev: color map copying bounds checking" }, - "CVE-2022-33741": { - "cmt_msg": "xen/netfront: force data bouncing when backend is untrusted" + "CVE-2023-3776": { + "cmt_msg": "net/sched: cls_fw: Fix improper refcount update leads to use-after-free" }, - "CVE-2018-20509": { - "cmt_msg": "binder: refactor binder ref inc/dec for thread safety" + "CVE-2017-9242": { + "cmt_msg": "ipv6: fix out of bound writes in __ip6_append_data()" }, - "CVE-2024-24864": { - "cmt_msg": "" + "CVE-2023-3772": { + "cmt_msg": "xfrm: add NULL check in xfrm_update_ae_params" }, - "CVE-2022-45885": { + "CVE-2022-3533": { "cmt_msg": "" }, - "CVE-2022-33744": { - "cmt_msg": "xen/arm: Fix race in RB-tree based P2M accounting" + "CVE-2022-3534": { + "cmt_msg": "libbpf: Fix use-after-free in btf_dump_name_dups" }, - "CVE-2017-18193": { - "cmt_msg": "f2fs: fix a bug caused by NULL extent tree" + "CVE-2016-10088": { + "cmt_msg": "sg_write()/bsg_write() is not fit to be called under KERNEL_DS" }, - "CVE-2021-45486": { - "cmt_msg": "inet: use bigger hash table for IP ID generation" + "CVE-2021-4149": { + "cmt_msg": "btrfs: unlock newly allocated extent buffer after error" }, - "CVE-2020-12888": { - "cmt_msg": "vfio-pci: Invalidate mmaps and block MMIO access on disabled memory" + "CVE-2022-21385": { + "cmt_msg": "net/rds: fix warn in rds_message_alloc_sgs" }, - "CVE-2016-6198": { - "cmt_msg": "vfs: add vfs_select_inode() helper" + "CVE-2021-47180": { + "cmt_msg": "NFC: nci: fix memory leak in nci_allocate_device" }, - "CVE-2022-41218": { - "cmt_msg": "media: dvb-core: Fix UAF due to refcount races at releasing" + "CVE-2020-28097": { + "cmt_msg": "vgacon: remove software scrollback support" }, - "CVE-2011-4917": { - "cmt_msg": "" + "CVE-2017-7533": { + "cmt_msg": "dentry name snapshots" }, - "CVE-2023-52457": { - "cmt_msg": "serial: 8250: omap: Don't skip resource freeing if pm_runtime_resume_and_get() failed" + "CVE-2018-8897": { + "cmt_msg": "x86/entry/64: Don't use IST entry for #BP stack" }, - "CVE-2022-36946": { - "cmt_msg": "netfilter: nf_queue: do not allow packet truncation below transport header offset" + "CVE-2016-4794": { + "cmt_msg": "percpu: fix synchronization between chunk->map_extend_work and chunk destruction" }, - "CVE-2021-45485": { - "cmt_msg": "ipv6: use prandom_u32() for ID generation" + "CVE-2020-14416": { + "cmt_msg": "can, slip: Protect tty->disc_data in write_wakeup and close with RCU" }, - "CVE-2021-0448": { - "cmt_msg": "netfilter: ctnetlink: add a range check for l3/l4 protonum" + "CVE-2021-46928": { + "cmt_msg": "parisc: Clear stale IIR value on instruction access rights trap" }, - "CVE-2016-6197": { - "cmt_msg": "ovl: verify upper dentry before unlink and rename" + "CVE-2018-14634": { + "cmt_msg": "exec: Limit arg stack to at most 75% of _STK_LIM" }, - "CVE-2022-21166": { - "cmt_msg": "x86/speculation/mmio: Enable CPU Fill buffer clearing on idle" + "CVE-2018-14633": { + "cmt_msg": "scsi: target: iscsi: Use hex2bin instead of a re-implementation" }, - "CVE-2020-0030": { - "cmt_msg": "ANDROID: binder: synchronize_rcu() when using POLLFREE." + "CVE-2021-46924": { + "cmt_msg": "NFC: st21nfca: Fix memory leak in device probe and remove" }, - "CVE-2021-29650": { - "cmt_msg": "netfilter: x_tables: Use correct memory barriers." + "CVE-2021-46926": { + "cmt_msg": "ALSA: hda: intel-sdw-acpi: harden detection of controller" }, - "CVE-2017-12762": { - "cmt_msg": "isdn/i4l: fix buffer overflow" + "CVE-2016-10318": { + "cmt_msg": "fscrypto: add authorization check for setting encryption policy" }, - "CVE-2022-41849": { - "cmt_msg": "fbdev: smscufx: Fix use-after-free in ufx_ops_open()" + "CVE-2016-9755": { + "cmt_msg": "netfilter: ipv6: nf_defrag: drop mangled skb on ream error" }, - "CVE-2022-41848": { - "cmt_msg": "" + "CVE-2016-9756": { + "cmt_msg": "KVM: x86: drop error recovery in em_jmp_far and em_ret_far" }, - "CVE-2023-6356": { - "cmt_msg": "" + "CVE-2017-2636": { + "cmt_msg": "tty: n_hdlc: get rid of racy n_hdlc.tbuf" }, - "CVE-2022-1353": { - "cmt_msg": "af_key: add __GFP_ZERO flag for compose_sadb_supported in function pfkey_register" + "CVE-2023-1206": { + "cmt_msg": "tcp: Reduce chance of collisions in inet6_hashfn()." }, - "CVE-2022-28356": { - "cmt_msg": "llc: fix netdevice reference leaks in llc_ui_bind()" + "CVE-2022-3649": { + "cmt_msg": "nilfs2: fix use-after-free bug of struct nilfs_root" }, - "CVE-2022-1198": { - "cmt_msg": "drivers: hamradio: 6pack: fix UAF bug caused by mod_timer()" + "CVE-2022-3646": { + "cmt_msg": "nilfs2: fix leak of nilfs_root in case of writer thread creation failure" }, - "CVE-2022-1199": { - "cmt_msg": "ax25: Fix NULL pointer dereference in ax25_kill_by_device" + "CVE-2022-3642": { + "cmt_msg": "" }, - "CVE-2015-8966": { - "cmt_msg": "[PATCH] arm: fix handling of F_OFD_... in oabi_fcntl64()" + "CVE-2022-3643": { + "cmt_msg": "xen/netback: Ensure protocol headers don't fall in the non-linear area" }, - "CVE-2015-8967": { - "cmt_msg": "arm64: make sys_call_table const" + "CVE-2021-1048": { + "cmt_msg": "fix regression in \"epoll: Keep a reference on files added to the check list\"" }, - "CVE-2021-39801": { + "CVE-2020-0543": { + "cmt_msg": "x86/cpu: Add 'table' argument to cpu_matches()" + }, + "CVE-2024-25739": { "cmt_msg": "" }, - "CVE-2021-39800": { + "CVE-2023-6535": { "cmt_msg": "" }, - "CVE-2019-3837": { - "cmt_msg": "net_dma: simple removal" + "CVE-2023-6536": { + "cmt_msg": "nvmet-tcp: fix a crash in nvmet_req_complete()" }, - "CVE-2022-1195": { - "cmt_msg": "hamradio: improve the incomplete fix to avoid NPD" + "CVE-2019-11810": { + "cmt_msg": "scsi: megaraid_sas: return error when create DMA pool failed" }, - "CVE-2024-22099": { - "cmt_msg": "" + "CVE-2019-11815": { + "cmt_msg": "net: rds: force to destroy connection if t_sock is NULL in rds_tcp_kill_sock()." }, - "CVE-2021-4202": { - "cmt_msg": "NFC: reorganize the functions in nci_request" + "CVE-2022-36280": { + "cmt_msg": "drm/vmwgfx: Validate the box size for the snooped cursor" }, - "CVE-2021-4203": { - "cmt_msg": "af_unix: fix races in sk_peer_pid and sk_peer_cred accesses" + "CVE-2024-21803": { + "cmt_msg": "" }, - "CVE-2022-45887": { - "cmt_msg": "media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb()" + "CVE-2018-7995": { + "cmt_msg": "x86/MCE: Serialize sysfs changes" }, - "CVE-2022-45886": { - "cmt_msg": "media: dvb-core: Fix use-after-free due on race condition at dvb_net" + "CVE-2018-16276": { + "cmt_msg": "USB: yurex: fix out-of-bounds uaccess in read handler" }, - "CVE-2023-46343": { - "cmt_msg": "nfc: nci: fix possible NULL pointer dereference in send_acknowledge()" + "CVE-2019-16413": { + "cmt_msg": "9p: use inode->i_lock to protect i_size_write() under 32-bit" }, - "CVE-2024-25744": { - "cmt_msg": "x86/coco: Disable 32-bit emulation by default on TDX and SEV" + "CVE-2019-7222": { + "cmt_msg": "KVM: x86: work around leak of uninitialized stack contents (CVE-2019-7222)" }, - "CVE-2023-5178": { - "cmt_msg": "nvmet-tcp: Fix a possible UAF in queue intialization setup" + "CVE-2019-7221": { + "cmt_msg": "KVM: nVMX: unconditionally cancel preemption timer in free_nested (CVE-2019-7221)" }, - "CVE-2023-2124": { - "cmt_msg": "xfs: verify buffer contents when we skip log replay" + "CVE-2020-10773": { + "cmt_msg": "s390/cmm: fix information leak in cmm_timeout_handler()" }, - "CVE-2021-44879": { - "cmt_msg": "f2fs: fix to do sanity check on inode type during garbage collection" + "CVE-2017-5577": { + "cmt_msg": "drm/vc4: Return -EINVAL on the overflow checks failing." }, - "CVE-2023-2513": { - "cmt_msg": "ext4: fix use-after-free in ext4_xattr_set_entry" + "CVE-2020-36780": { + "cmt_msg": "i2c: sprd: fix reference leak when pm_runtime_get_sync fails" }, - "CVE-2022-27672": { - "cmt_msg": "x86/speculation: Identify processors vulnerable to SMT RSB predictions" + "CVE-2018-18281": { + "cmt_msg": "mremap: properly flush TLB before releasing the page" }, - "CVE-2022-2964": { - "cmt_msg": "net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup" + "CVE-2022-2663": { + "cmt_msg": "netfilter: nf_conntrack_irc: Fix forged IP logic" }, - "CVE-2015-2877": { - "cmt_msg": "" + "CVE-2024-26803": { + "cmt_msg": "net: veth: clear GRO when clearing XDP even when down" }, - "CVE-2021-38198": { - "cmt_msg": "KVM: X86: MMU: Use the correct inherited permissions to get shadow page" + "CVE-2020-25643": { + "cmt_msg": "hdlc_ppp: add range checks in ppp_cp_parse_cr()" }, - "CVE-2017-5972": { - "cmt_msg": "tcp: do not lock listener to process SYN packets" + "CVE-2020-4788": { + "cmt_msg": "powerpc/64s: flush L1D on kernel entry" }, - "CVE-2023-34256": { - "cmt_msg": "ext4: avoid a potential slab-out-of-bounds in ext4_group_desc_csum" + "CVE-2021-39698": { + "cmt_msg": "wait: add wake_up_pollfree()" }, - "CVE-2023-1513": { - "cmt_msg": "kvm: initialize all of the kvm_debugregs structure before sending it to userspace" + "CVE-2018-5333": { + "cmt_msg": "RDS: null pointer dereference in rds_atomic_free_op" }, - "CVE-2015-4004": { - "cmt_msg": "staging: ozwpan: Remove from tree" + "CVE-2018-5332": { + "cmt_msg": "RDS: Heap OOB write in rds_message_alloc_sgs()" }, - "CVE-2021-26401": { - "cmt_msg": "x86/speculation: Use generic retpoline by default on AMD" + "CVE-2021-3759": { + "cmt_msg": "memcg: enable accounting of ipc resources" }, - "CVE-2021-3847": { - "cmt_msg": "" + "CVE-2019-19528": { + "cmt_msg": "USB: iowarrior: fix use-after-free on disconnect" }, - "CVE-2022-2961": { - "cmt_msg": "" + "CVE-2017-17448": { + "cmt_msg": "netfilter: nfnetlink_cthelper: Add missing permission checks" }, - "CVE-2023-52442": { - "cmt_msg": "ksmbd: validate session id and tree id in compound request" + "CVE-2017-17449": { + "cmt_msg": "netlink: Add netns check on taps" }, - "CVE-2022-40768": { - "cmt_msg": "scsi: stex: Properly zero out the passthrough command structure" + "CVE-2019-19525": { + "cmt_msg": "ieee802154: atusb: fix use-after-free at disconnect" }, - "CVE-2020-36557": { - "cmt_msg": "vt: vt_ioctl: fix VT_DISALLOCATE freeing in-use virtual console" + "CVE-2019-19524": { + "cmt_msg": "Input: ff-memless - kill timer in destroy()" }, - "CVE-2023-52445": { - "cmt_msg": "media: pvrusb2: fix use after free on context disconnection" + "CVE-2019-19527": { + "cmt_msg": "HID: hiddev: do cleanup in failure of opening a device" }, - "CVE-2020-14331": { - "cmt_msg": "vgacon: Fix for missing check in scrollback handling" + "CVE-2021-3753": { + "cmt_msg": "vt_kdsetmode: extend console locking" }, - "CVE-2011-4916": { - "cmt_msg": "" + "CVE-2021-3752": { + "cmt_msg": "Bluetooth: fix use-after-free error in lock_sock_nested()" }, - "CVE-2023-52449": { - "cmt_msg": "mtd: Fix gluebi NULL pointer dereference caused by ftl notifier" + "CVE-2023-7192": { + "cmt_msg": "netfilter: ctnetlink: fix possible refcount leak in ctnetlink_create_conntrack()" }, - "CVE-2020-36558": { - "cmt_msg": "vt: vt_ioctl: fix race in VT_RESIZEX" + "CVE-2017-18249": { + "cmt_msg": "f2fs: fix race condition in between free nid allocator/initializer" }, - "CVE-2018-13100": { - "cmt_msg": "f2fs: fix to do sanity check with secs_per_zone" + "CVE-2022-1263": { + "cmt_msg": "KVM: avoid NULL pointer dereference in kvm_dirty_ring_push" }, - "CVE-2017-16646": { - "cmt_msg": "media: dib0700: fix invalid dvb_detach argument" + "CVE-2017-18241": { + "cmt_msg": "f2fs: fix a panic caused by NULL flush_cmd_control" }, - "CVE-2019-5489": { - "cmt_msg": "Change mincore() to count \"mapped\" pages rather than \"cached\" pages" + "CVE-2019-15215": { + "cmt_msg": "media: cpia2_usb: first wake up, then free in disconnect" }, - "CVE-2024-1312": { - "cmt_msg": "mm: lock_vma_under_rcu() must check vma->anon_vma under vma lock" + "CVE-2022-2209": { + "cmt_msg": "" }, - "CVE-2023-3338": { - "cmt_msg": "Remove DECnet support from kernel" + "CVE-2023-7042": { + "cmt_msg": "wifi: ath10k: fix NULL pointer dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev()" }, - "CVE-2017-16648": { - "cmt_msg": "dvb_frontend: don't use-after-free the frontend struct" - } - } - }, - "6.7": { - "6.7": { - "CVE-2024-0193": { - "cmt_msg": "netfilter: nf_tables: skip set commit for deleted/destroyed sets", - "cmt_id": "7315dc1e122c85ffdfc8defffbb8f8b616c2eb1a" - } - }, - "6.7.1": { - "CVE-2023-52439": { - "cmt_msg": "uio: Fix use-after-free in uio_open", - "cmt_id": "913205930da6213305616ac539447702eaa85e41" + "CVE-2023-52559": { + "cmt_msg": "iommu/vt-d: Avoid memory allocation in iommu_suspend()" }, - "CVE-2023-52438": { - "cmt_msg": "binder: fix use-after-free in shinker's callback", - "cmt_id": "e074686e993ff1be5f21b085a3b1b4275ccd5727" + "CVE-2023-47233": { + "cmt_msg": "wifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach" }, - "CVE-2023-52436": { - "cmt_msg": "f2fs: explicitly null-terminate the xattr list", - "cmt_id": "f6c30bfe5a49bc38cae985083a11016800708fea" - } - }, - "6.7.2": { - "CVE-2024-26592": { - "cmt_msg": "ksmbd: fix UAF issue in ksmbd_tcp_new_connection()", - "cmt_id": "69d54650b751532d1e1613a4fb433e591aeef126" + "CVE-2022-1462": { + "cmt_msg": "tty: use new tty_insert_flip_string_and_push_buffer() in pty_write()" }, - "CVE-2024-26590": { - "cmt_msg": "erofs: fix inconsistent per-file compression format", - "cmt_id": "eed24b816e50c6cd18cbee0ff0d7218c8fced199" + "CVE-2024-26614": { + "cmt_msg": "tcp: make sure init the accept_queue's spinlocks once" }, - "CVE-2024-26591": { - "cmt_msg": "bpf: Fix re-attachment branch in bpf_tracing_prog_attach", - "cmt_id": "50ae82f080cf87e84828f066c31723b781d68f5b" + "CVE-2019-20636": { + "cmt_msg": "Input: add safety guards to input_set_keycode()" }, - "CVE-2024-26596": { - "cmt_msg": "net: dsa: fix netdev_priv() dereference before check on non-DSA netdevice events", - "cmt_id": "dbd909c20c11f0d29c0054d41e0d1f668a60e8c8" + "CVE-2023-52434": { + "cmt_msg": "smb: client: fix potential OOBs in smb2_parse_contexts()" }, - "CVE-2024-26597": { - "cmt_msg": "net: qualcomm: rmnet: fix global oob in rmnet_policy", - "cmt_id": "17d06a5c44d8fd2e8e61bac295b09153496f87e1" + "CVE-2023-52436": { + "cmt_msg": "f2fs: explicitly null-terminate the xattr list" }, - "CVE-2024-26594": { - "cmt_msg": "ksmbd: validate mech token in session setup", - "cmt_id": "5e6dfec95833edc54c48605a98365a7325e5541e" + "CVE-2023-51779": { + "cmt_msg": "Bluetooth: af_bluetooth: Fix Use-After-Free in bt_sock_recvmsg" }, - "CVE-2024-26595": { - "cmt_msg": "mlxsw: spectrum_acl_tcam: Fix NULL pointer dereference in error path", - "cmt_id": "d0a1efe417c97a1e9b914056ee6b86f1ef75fe1f" + "CVE-2018-10877": { + "cmt_msg": "ext4: verify the depth of extent tree in ext4_find_extent()" }, - "CVE-2024-26598": { - "cmt_msg": "KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache", - "cmt_id": "dd3956a1b3dd11f46488c928cb890d6937d1ca80" + "CVE-2018-10876": { + "cmt_msg": "ext4: only look at the bg_flags field if it is valid" }, - "CVE-2024-26599": { - "cmt_msg": "pwm: Fix out-of-bounds access in of_pwm_single_xlate()", - "cmt_id": "bae45b7ebb31984b63b13c3519fd724b3ce92123" + "CVE-2010-4563": { + "cmt_msg": "" }, - "CVE-2023-52459": { - "cmt_msg": "media: v4l: async: Fix duplicated list deletion", - "cmt_id": "49d82811428469566667f22749610b8c132cdb3e" + "CVE-2016-8655": { + "cmt_msg": "packet: fix race condition in packet_set_ring" }, - "CVE-2023-52458": { - "cmt_msg": "block: add check that partition length needs to be aligned with block size", - "cmt_id": "bcdc288e7bc008daf38ef0401b53e4a8bb61bbe5" + "CVE-2023-2162": { + "cmt_msg": "scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress" }, - "CVE-2023-52457": { - "cmt_msg": "serial: 8250: omap: Don't skip resource freeing if pm_runtime_resume_and_get() failed", - "cmt_id": "95e4e0031effad9837af557ecbfd4294a4d8aeee" + "CVE-2016-8658": { + "cmt_msg": "brcmfmac: avoid potential stack overflow in brcmf_cfg80211_start_ap()" }, - "CVE-2023-52456": { - "cmt_msg": "serial: imx: fix tx statemachine deadlock", - "cmt_id": "9a662d06c22ddfa371958c2071dc350436be802b" + "CVE-2018-10879": { + "cmt_msg": "ext4: make sure bitmaps and the inode table don't overlap with bg descriptors" }, - "CVE-2023-52455": { - "cmt_msg": "iommu: Don't reserve 0-length IOVA region", - "cmt_id": "5e23e283910c9f30248732ae0770bcb0c9438abf" + "CVE-2019-14835": { + "cmt_msg": "vhost: make sure log_num < in_num" }, - "CVE-2023-52454": { - "cmt_msg": "nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length", - "cmt_id": "70154e8d015c9b4fb56c1a2ef1fc8b83d45c7f68" + "CVE-2023-4622": { + "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES" }, - "CVE-2023-52453": { - "cmt_msg": "hisi_acc_vfio_pci: Update migration data pointer correctly on saving/resume", - "cmt_id": "6bda81e24a35a856f58e6a5786de579b07371603" + "CVE-2023-4623": { + "cmt_msg": "net/sched: sch_hfsc: Ensure inner classes have fsc curve" }, - "CVE-2023-52452": { - "cmt_msg": "bpf: Fix accesses to uninit stack slots", - "cmt_id": "fbcf372c8eda2290470268e0afb5ab5d5f5d5fde" + "CVE-2021-38300": { + "cmt_msg": "bpf, mips: Validate conditional branch offsets" }, - "CVE-2023-52451": { - "cmt_msg": "powerpc/pseries/memhp: Fix access beyond end of drmem array", - "cmt_id": "708a4b59baad96c4718dc0bd3a3427d3ab22fedc" + "CVE-2020-25656": { + "cmt_msg": "vt: keyboard, extend func_buf_lock to readers" }, - "CVE-2023-52450": { - "cmt_msg": "perf/x86/intel/uncore: Fix NULL pointer dereference issue in upi_fill_topology()", - "cmt_id": "3d6f4a78b104c65e4256c3776c9949f49a1b459e" + "CVE-2021-4023": { + "cmt_msg": "io-wq: fix cancellation on create-worker failure" }, - "CVE-2024-1085": { - "cmt_msg": "netfilter: nf_tables: check if catch-all set element is active in next generation", - "cmt_id": "7e0f5f8ae3e5f17e367f7040ade7a467f1f0e3b9" + "CVE-2021-22555": { + "cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write" }, - "CVE-2024-26589": { - "cmt_msg": "bpf: Reject variable offset alu on PTR_TO_FLOW_KEYS", - "cmt_id": "1b500d5d6cecf98dd6ca88bc9e7ae1783c83e6d3" + "CVE-2023-3161": { + "cmt_msg": "fbcon: Check font dimension limits" }, - "CVE-2023-46838": { - "cmt_msg": "xen-netback: don't produce zero-size SKB frags", - "cmt_id": "0179c6b07f7ed2f3ea7309596169e15a59e7ee0e" + "CVE-2018-7191": { + "cmt_msg": "tun: call dev_get_valid_name() before register_netdevice()" }, - "CVE-2024-26587": { - "cmt_msg": "net: netdevsim: don't try to destroy PHC on VFs", - "cmt_id": "c5068e442eed063d2f1658e6b6d3c1c6fcf1e588" + "CVE-2018-10675": { + "cmt_msg": "mm/mempolicy: fix use after free when calling get_mempolicy" }, - "CVE-2024-26586": { - "cmt_msg": "mlxsw: spectrum_acl_tcam: Fix stack corruption", - "cmt_id": "a361c2c1da5dbb13ca67601cf961ab3ad68af383" + "CVE-2017-0786": { + "cmt_msg": "brcmfmac: add length check in brcmf_cfg80211_escan_handler()" }, - "CVE-2024-24860": { - "cmt_msg": "Bluetooth: Fix atomicity violation in {min,max}_key_size_set", - "cmt_id": "d1c6a77d6d48215ba723f910eaabdb6e60d21a37" + "CVE-2021-47082": { + "cmt_msg": "tun: avoid double free in tun_free_netdev" }, - "CVE-2024-26588": { - "cmt_msg": "LoongArch: BPF: Prevent out-of-bounds memory access", - "cmt_id": "7924ade13a49c0067da6ea13e398102979c0654a" + "CVE-2021-47083": { + "cmt_msg": "pinctrl: mediatek: fix global-out-of-bounds issue" }, - "CVE-2023-52460": { - "cmt_msg": "drm/amd/display: Fix NULL pointer dereference at hibernate", - "cmt_id": "6b80326efff093d037e0971831dca6ebddba9b45" + "CVE-2021-31916": { + "cmt_msg": "dm ioctl: fix out of bounds array access when no devices" }, - "CVE-2023-52462": { - "cmt_msg": "bpf: fix check for attempt to corrupt spilled pointer", - "cmt_id": "40617d45ea05535105e202a8a819e388a2b1f036" + "CVE-2021-47086": { + "cmt_msg": "phonet/pep: refuse to enable an unbound pipe" }, - "CVE-2023-50431": { - "cmt_msg": "accel/habanalabs: fix information leak in sec_attest_info()", - "cmt_id": "db43f2eabdceedc41b8c3e0621ac42ca19b13b7d" + "CVE-2023-32269": { + "cmt_msg": "netrom: Fix use-after-free caused by accept on already connected socket" }, - "CVE-2023-52463": { - "cmt_msg": "efivarfs: force RO when remounting if SetVariable is not supported", - "cmt_id": "d4a714873db0866cc471521114eeac4a5072d548" + "CVE-2021-4157": { + "cmt_msg": "pNFS/flexfiles: fix incorrect size check in decode_nfs_fh()" }, - "CVE-2023-52464": { - "cmt_msg": "EDAC/thunderx: Fix possible out-of-bounds string access", - "cmt_id": "426fae93c01dffa379225eb2bd4d3cdc42c6eec5" + "CVE-2021-4155": { + "cmt_msg": "xfs: map unwritten blocks in XFS_IOC_{ALLOC,FREE}SP just like fallocate" }, - "CVE-2023-52443": { - "cmt_msg": "apparmor: avoid crash when parsed profile name is empty", - "cmt_id": "77ab09b92f16c8439a948d1af489196953dc4a0e" + "CVE-2021-4150": { + "cmt_msg": "block: fix incorrect references to disk objects" }, - "CVE-2023-52444": { - "cmt_msg": "f2fs: fix to avoid dirent corruption", - "cmt_id": "2fb4867f4405aea8c0519d7d188207f232a57862" + "CVE-2021-4159": { + "cmt_msg": "bpf: Verifer, adjust_scalar_min_max_vals to always call update_reg_bounds()" }, - "CVE-2023-52445": { - "cmt_msg": "media: pvrusb2: fix use after free on context disconnection", - "cmt_id": "437b5f57732bb4cc32cc9f8895d2010ee9ff521c" + "CVE-2021-29154": { + "cmt_msg": "bpf, x86: Validate computation of branch displacements for x86-64" }, - "CVE-2023-52446": { - "cmt_msg": "bpf: Fix a race condition between btf_put() and map_free()", - "cmt_id": "f9ff6ef1c73cd9e1a6bb1ab3e57c5d141a536306" + "CVE-2021-29155": { + "cmt_msg": "bpf: Use correct permission flag for mixed signed bounds arithmetic" }, - "CVE-2023-52447": { - "cmt_msg": "bpf: Defer the free of inner map when necessary", - "cmt_id": "bfd9b20c4862f41d4590fde11d70a5eeae53dcc5" + "CVE-2018-10902": { + "cmt_msg": "ALSA: rawmidi: Change resized buffers atomically" }, - "CVE-2023-52448": { - "cmt_msg": "gfs2: Fix kernel NULL pointer dereference in gfs2_rgrp_dump", - "cmt_id": "c323efd620c741168c8e0cc6fc0be04ab57e331a" + "CVE-2022-25375": { + "cmt_msg": "usb: gadget: rndis: check size of RNDIS_MSG_SET command" }, - "CVE-2023-52449": { - "cmt_msg": "mtd: Fix gluebi NULL pointer dereference caused by ftl notifier", - "cmt_id": "b36aaa64d58aaa2f2cbc8275e89bae76a2b6c3dc" + "CVE-2021-47158": { + "cmt_msg": "net: dsa: sja1105: add error handling in sja1105_setup()" }, - "CVE-2023-52461": { - "cmt_msg": "drm/sched: Fix bounds limiting when given a malformed entity", - "cmt_id": "1470d173925d697b497656b93f7c5bddae2e64b2" - } - }, - "6.7.3": { - "CVE-2024-1086": { - "cmt_msg": "netfilter: nf_tables: reject QUEUE/DROP verdict parameters", - "cmt_id": "f05a497e7bc8851eeeb3a58da180ba469efebb05" + "CVE-2021-47153": { + "cmt_msg": "i2c: i801: Don't generate an interrupt on bus reset" }, - "CVE-2024-23849": { - "cmt_msg": "net/rds: Fix UBSAN: array-index-out-of-bounds in rds_cmsg_recv", - "cmt_id": "0b787c2dea15e7a2828fa3a74a5447df4ed57711" - } - }, - "6.7.5": { - "CVE-2024-26581": { - "cmt_msg": "netfilter: nft_set_rbtree: skip end interval element from gc", - "cmt_id": "6eb14441f10602fa1cf691da9d685718b68b78a9" - } - }, - "6.7.6": { - "CVE-2024-26593": { - "cmt_msg": "i2c: i801: Fix block process call transactions", - "cmt_id": "609c7c1cc976e740d0fed4dbeec688b3ecb5dce2" + "CVE-2021-47150": { + "cmt_msg": "net: fec: fix the potential memory leak in fec_enet_init()" }, - "CVE-2024-26583": { - "cmt_msg": "tls: fix race between async notify and socket close", - "cmt_id": "6209319b2efdd8524691187ee99c40637558fa33" + "CVE-2021-47151": { + "cmt_msg": "interconnect: qcom: bcm-voter: add a missing of_node_put()" }, - "CVE-2024-1151": { - "cmt_msg": "net: openvswitch: limit the number of recursions from action sets", - "cmt_id": "da05eb129c0208ef907420480c5859083408dc2c" + "CVE-2021-46936": { + "cmt_msg": "net: fix use-after-free in tw_timer_handler" }, - "CVE-2024-26585": { - "cmt_msg": "tls: fix race between tx work scheduling and socket close", - "cmt_id": "e327ed60bff4a991cd7a709c47c4f0c5b4a4fd57" + "CVE-2021-46933": { + "cmt_msg": "usb: gadget: f_fs: Clear ffs_eventfd in ffs_data_clear." }, - "CVE-2024-26584": { - "cmt_msg": "net: tls: handle backlogging of crypto requests", - "cmt_id": "ab6397f072e5097f267abf5cb08a8004e6b17694" + "CVE-2021-46932": { + "cmt_msg": "Input: appletouch - initialize work before device registration" }, - "CVE-2023-52429": { - "cmt_msg": "dm: limit the number of targets and parameter size area", - "cmt_id": "cd70175481f63af31901dd463e44386f033c3f4c" + "CVE-2021-46939": { + "cmt_msg": "tracing: Restructure trace_clock_global() to never block" }, - "CVE-2024-23850": { - "cmt_msg": "btrfs: do not ASSERT() if the newly created subvolume already got read", - "cmt_id": "5a172344bfdabb46458e03708735d7b1a918c468" + "CVE-2018-16862": { + "cmt_msg": "mm: cleancache: fix corruption on missed inode invalidation" }, - "CVE-2024-23851": { - "cmt_msg": "dm: limit the number of targets and parameter size area", - "cmt_id": "cd70175481f63af31901dd463e44386f033c3f4c" + "CVE-2024-26623": { + "cmt_msg": "pds_core: Prevent race issues involving the adminq" }, - "CVE-2024-26582": { - "cmt_msg": "net: tls: fix use-after-free with partial reads and async decrypt", - "cmt_id": "754c9bab77a1b895b97bd99d754403c505bc79df" - } - }, - "outstanding": { - "CVE-2020-26556": { - "cmt_msg": "" + "CVE-2018-16884": { + "cmt_msg": "sunrpc: use-after-free in svc_process_common()" }, - "CVE-2020-26557": { + "CVE-2022-45885": { "cmt_msg": "" }, - "CVE-2019-20794": { + "CVE-2022-45884": { "cmt_msg": "" }, - "CVE-2020-26559": { - "cmt_msg": "" + "CVE-2022-45887": { + "cmt_msg": "media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb()" }, - "CVE-2020-35501": { - "cmt_msg": "" + "CVE-2022-45886": { + "cmt_msg": "media: dvb-core: Fix use-after-free due on race condition at dvb_net" }, - "CVE-2023-4010": { - "cmt_msg": "" + "CVE-2024-25744": { + "cmt_msg": "x86/coco: Disable 32-bit emulation by default on TDX and SEV" }, - "CVE-2018-1121": { + "CVE-2015-2877": { "cmt_msg": "" }, - "CVE-2019-19378": { + "CVE-2023-37454": { "cmt_msg": "" }, - "CVE-2024-22386": { - "cmt_msg": "" + "CVE-2018-1130": { + "cmt_msg": "dccp: check sk for closed state in dccp_sendmsg()" }, - "CVE-2020-24503": { - "cmt_msg": "" + "CVE-2021-45486": { + "cmt_msg": "inet: use bigger hash table for IP ID generation" }, - "CVE-2020-24502": { - "cmt_msg": "" + "CVE-2021-3506": { + "cmt_msg": "f2fs: fix to avoid out-of-bounds memory access" }, - "CVE-2023-6240": { - "cmt_msg": "" + "CVE-2020-14331": { + "cmt_msg": "vgacon: Fix for missing check in scrollback handling" }, - "CVE-2020-11725": { - "cmt_msg": "" + "CVE-2022-36123": { + "cmt_msg": "x86: Clear .brk area at early boot" }, - "CVE-2022-23825": { - "cmt_msg": "" + "CVE-2020-11565": { + "cmt_msg": "mm: mempolicy: require at least one nodeid for MPOL_PREFERRED" }, - "CVE-2023-3397": { - "cmt_msg": "" + "CVE-2020-36558": { + "cmt_msg": "vt: vt_ioctl: fix race in VT_RESIZEX" }, - "CVE-2023-1476": { - "cmt_msg": "" + "CVE-2018-13100": { + "cmt_msg": "f2fs: fix to do sanity check with secs_per_zone" }, - "CVE-2021-3864": { - "cmt_msg": "" + "CVE-2017-5897": { + "cmt_msg": "ip6_gre: fix ip6gre_err() invalid reads" }, - "CVE-2022-3606": { - "cmt_msg": "" + "CVE-2017-6074": { + "cmt_msg": "dccp: fix freeing skb too early for IPV6_RECVPKTINFO" }, - "CVE-2019-19814": { - "cmt_msg": "" + "CVE-2020-36158": { + "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_cmd_802_11_ad_hoc_start" }, - "CVE-2022-2209": { - "cmt_msg": "" + "CVE-2016-6828": { + "cmt_msg": "tcp: fix use after free in tcp_xmit_retransmit_queue()" }, - "CVE-2023-7042": { - "cmt_msg": "" + "CVE-2021-39686": { + "cmt_msg": "binder: use euid from cred instead of using task" }, - "CVE-2021-26934": { - "cmt_msg": "" + "CVE-2021-39685": { + "cmt_msg": "USB: gadget: detect too-big endpoint 0 requests" }, - "CVE-2023-47233": { - "cmt_msg": "" + "CVE-2018-1000204": { + "cmt_msg": "scsi: sg: allocate with __GFP_ZERO in sg_build_indirect()" }, - "CVE-2016-8660": { - "cmt_msg": "" + "CVE-2017-12134": { + "cmt_msg": "xen: fix bio vec merging" }, - "CVE-2023-6270": { - "cmt_msg": "" + "CVE-2017-17450": { + "cmt_msg": "netfilter: xt_osf: Add missing permission checks" }, - "CVE-2020-15802": { - "cmt_msg": "" + "CVE-2024-26592": { + "cmt_msg": "ksmbd: fix UAF issue in ksmbd_tcp_new_connection()" }, - "CVE-2008-2544": { - "cmt_msg": "" + "CVE-2016-3672": { + "cmt_msg": "x86/mm/32: Enable full randomization on i386 and X86_32" }, - "CVE-2023-6356": { - "cmt_msg": "" + "CVE-2024-26594": { + "cmt_msg": "ksmbd: validate mech token in session setup" }, - "CVE-2019-15239": { - "cmt_msg": "unknown" + "CVE-2017-18270": { + "cmt_msg": "KEYS: prevent creating a different user's keyrings" }, - "CVE-2007-3719": { - "cmt_msg": "" + "CVE-2024-26598": { + "cmt_msg": "KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache" }, - "CVE-2023-20941": { - "cmt_msg": "" + "CVE-2016-6480": { + "cmt_msg": "aacraid: Check size values after double-fetch from user" }, - "CVE-2023-21400": { - "cmt_msg": "" + "CVE-2018-3646": { + "cmt_msg": "x86/microcode: Allow late microcode loading with SMT disabled" }, - "CVE-2023-2640": { - "cmt_msg": "" + "CVE-2022-29900": { + "cmt_msg": "x86/kvm/vmx: Make noinstr clean" }, - "CVE-2010-4563": { - "cmt_msg": "" + "CVE-2023-2007": { + "cmt_msg": "scsi: dpt_i2o: Remove obsolete driver" }, - "CVE-2020-26140": { - "cmt_msg": "" + "CVE-2022-1419": { + "cmt_msg": "drm/vgem: Close use-after-free race in vgem_gem_create" }, - "CVE-2020-26143": { - "cmt_msg": "" + "CVE-2023-6040": { + "cmt_msg": "netfilter: nf_tables: Reject tables of unsupported family" }, - "CVE-2020-26142": { - "cmt_msg": "" + "CVE-2022-2503": { + "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag" }, - "CVE-2024-23848": { - "cmt_msg": "" + "CVE-2016-4951": { + "cmt_msg": "tipc: check nl sock before parsing nested attributes" }, - "CVE-2022-3533": { - "cmt_msg": "" + "CVE-2022-23038": { + "cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()" }, - "CVE-2022-1247": { - "cmt_msg": "" + "CVE-2022-23039": { + "cmt_msg": "xen/gntalloc: don't use gnttab_query_foreign_access()" }, - "CVE-2020-10708": { - "cmt_msg": "" + "CVE-2016-8645": { + "cmt_msg": "tcp: take care of truncations done by sk_filter()" }, - "CVE-2022-4543": { - "cmt_msg": "" + "CVE-2022-23036": { + "cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()" }, - "CVE-2017-13693": { - "cmt_msg": "" + "CVE-2022-23037": { + "cmt_msg": "xen/netfront: don't use gnttab_query_foreign_access() for mapped status" }, - "CVE-2021-0399": { - "cmt_msg": "" + "CVE-2017-5669": { + "cmt_msg": "ipc/shm: Fix shmat mmap nil-page protection" }, - "CVE-2017-13694": { - "cmt_msg": "" + "CVE-2023-2176": { + "cmt_msg": "RDMA/core: Refactor rdma_bind_addr" }, - "CVE-2024-0564": { - "cmt_msg": "" + "CVE-2019-14821": { + "cmt_msg": "KVM: coalesced_mmio: add bounds checking" }, - "CVE-2012-4542": { - "cmt_msg": "" + "CVE-2020-12826": { + "cmt_msg": "signal: Extend exec_id to 64bits" }, - "CVE-2013-7445": { - "cmt_msg": "" + "CVE-2021-42008": { + "cmt_msg": "net: 6pack: fix slab-out-of-bounds in decode_data" }, - "CVE-2024-24859": { - "cmt_msg": "" + "CVE-2020-25645": { + "cmt_msg": "geneve: add transport ports in route lookup for geneve" }, - "CVE-2024-24858": { - "cmt_msg": "" + "CVE-2019-15666": { + "cmt_msg": "xfrm: policy: Fix out-of-bound array accesses in __xfrm_policy_unlink" }, - "CVE-2005-3660": { - "cmt_msg": "" + "CVE-2015-1350": { + "cmt_msg": "fs: Avoid premature clearing of capabilities" }, - "CVE-2024-24857": { - "cmt_msg": "" + "CVE-2016-1237": { + "cmt_msg": "posix_acl: Add set_posix_acl" }, - "CVE-2023-6238": { - "cmt_msg": "" + "CVE-2021-33034": { + "cmt_msg": "Bluetooth: verify AMP hci_chan before amp_destroy" }, - "CVE-2023-31082": { - "cmt_msg": "" + "CVE-2017-18509": { + "cmt_msg": "ipv6: check sk sk_type and protocol early in ip_mroute_set/getsockopt" }, - "CVE-2023-31081": { - "cmt_msg": "" + "CVE-2016-3857": { + "cmt_msg": "arm: oabi compat: add missing access checks" }, - "CVE-2022-38096": { - "cmt_msg": "" + "CVE-2017-11600": { + "cmt_msg": "xfrm: policy: check policy direction value" }, - "CVE-2022-3544": { - "cmt_msg": "" + "CVE-2024-26625": { + "cmt_msg": "llc: call sock_orphan() at release time" }, - "CVE-2024-23307": { - "cmt_msg": "" + "CVE-2024-26627": { + "cmt_msg": "scsi: core: Move scsi_host_busy() out of host lock for waking up EH handler" }, - "CVE-2022-3238": { - "cmt_msg": "" + "CVE-2024-26622": { + "cmt_msg": "tomoyo: fix UAF write bug in tomoyo_write_control()" }, - "CVE-2008-4609": { + "CVE-2024-22386": { "cmt_msg": "" }, - "CVE-2020-14304": { - "cmt_msg": "" + "CVE-2018-10021": { + "cmt_msg": "scsi: libsas: defer ata device eh commands to libata" }, - "CVE-2020-0347": { - "cmt_msg": "" + "CVE-2017-18221": { + "cmt_msg": "mlock: fix mlock count can not decrease in race condition" }, - "CVE-2021-3714": { - "cmt_msg": "" + "CVE-2019-10126": { + "cmt_msg": "mwifiex: Fix heap overflow in mwifiex_uap_parse_tail_ies()" + }, + "CVE-2019-10124": { + "cmt_msg": "mm: hwpoison: fix thp split handing in soft_offline_in_use_page()" + }, + "CVE-2020-13974": { + "cmt_msg": "vt: keyboard: avoid signed integer overflow in k_ascii" + }, + "CVE-2018-10938": { + "cmt_msg": "Cipso: cipso_v4_optptr enter infinite loop" + }, + "CVE-2020-15437": { + "cmt_msg": "serial: 8250: fix null-ptr-deref in serial8250_start_tx()" + }, + "CVE-2020-15436": { + "cmt_msg": "block: Fix use-after-free in blkdev_get()" + }, + "CVE-2016-9178": { + "cmt_msg": "fix minor infoleak in get_user_ex()" + }, + "CVE-2021-47065": { + "cmt_msg": "rtw88: Fix array overrun in rtw_get_tx_power_params()" + }, + "CVE-2022-23816": { + "cmt_msg": "x86/kvm/vmx: Make noinstr clean" + }, + "CVE-2021-47145": { + "cmt_msg": "btrfs: do not BUG_ON in link_to_fixup_dir" + }, + "CVE-2021-47149": { + "cmt_msg": "net: fujitsu: fix potential null-ptr-deref" + }, + "CVE-2018-19407": { + "cmt_msg": "KVM: X86: Fix scan ioapic use-before-initialization" + }, + "CVE-2021-47144": { + "cmt_msg": "drm/amd/amdgpu: fix refcount leak" + }, + "CVE-2021-47147": { + "cmt_msg": "ptp: ocp: Fix a resource leak in an error handling path" }, - "CVE-2019-12456": { - "cmt_msg": "" + "CVE-2021-47146": { + "cmt_msg": "mld: fix panic in mld_newpack()" }, - "CVE-2020-26560": { - "cmt_msg": "" + "CVE-2021-47140": { + "cmt_msg": "iommu/amd: Clear DMA ops when switching domain" }, - "CVE-2021-3892": { - "cmt_msg": "" + "CVE-2021-47143": { + "cmt_msg": "net/smc: remove device from smcd_dev_list after failed device_add()" }, - "CVE-2024-0841": { - "cmt_msg": "" + "CVE-2021-47142": { + "cmt_msg": "drm/amdgpu: Fix a use-after-free" }, - "CVE-2024-24861": { - "cmt_msg": "" + "CVE-2024-26765": { + "cmt_msg": "LoongArch: Disable IRQ before init_fn() for nonboot CPUs" }, - "CVE-2024-24864": { - "cmt_msg": "" + "CVE-2018-16871": { + "cmt_msg": "nfsd: COPY and CLONE operations require the saved filehandle to be set" }, - "CVE-2023-37454": { - "cmt_msg": "" + "CVE-2018-16658": { + "cmt_msg": "cdrom: Fix info leak/OOB read in cdrom_ioctl_drive_status" }, - "CVE-2022-3642": { - "cmt_msg": "" + "CVE-2019-19036": { + "cmt_msg": "btrfs: Detect unbalanced tree with empty leaf before crashing btree operations" }, - "CVE-2011-4917": { - "cmt_msg": "" + "CVE-2017-8797": { + "cmt_msg": "nfsd: fix undefined behavior in nfsd4_layout_verify" }, - "CVE-2019-15902": { - "cmt_msg": "unknown" + "CVE-2021-32078": { + "cmt_msg": "ARM: footbridge: remove personal server platform" }, - "CVE-2024-25739": { - "cmt_msg": "" + "CVE-2022-4662": { + "cmt_msg": "USB: core: Prevent nested device-reset calls" }, - "CVE-2019-15290": { - "cmt_msg": "" + "CVE-2019-11833": { + "cmt_msg": "ext4: zero out the unused memory region in the extent tree block" }, - "CVE-2023-6535": { - "cmt_msg": "" + "CVE-2018-5953": { + "cmt_msg": "printk: hash addresses printed with %p" }, - "CVE-2023-6536": { - "cmt_msg": "" + "CVE-2018-1128": { + "cmt_msg": "libceph: add authorizer challenge" }, - "CVE-2018-17977": { - "cmt_msg": "" + "CVE-2018-1129": { + "cmt_msg": "libceph: implement CEPHX_V2 calculation mode" }, - "CVE-2022-26878": { - "cmt_msg": "" + "CVE-2018-1120": { + "cmt_msg": "proc: do not access cmdline nor environ from file-backed areas" }, - "CVE-2022-41848": { + "CVE-2018-1121": { "cmt_msg": "" }, - "CVE-2022-1116": { - "cmt_msg": "" + "CVE-2018-20856": { + "cmt_msg": "block: blk_init_allocated_queue() set q->fq as NULL in the fail case" }, - "CVE-2010-5321": { - "cmt_msg": "" + "CVE-2022-3061": { + "cmt_msg": "video: fbdev: i740fb: Error out if 'pixclock' equals zero" }, - "CVE-2018-12930": { - "cmt_msg": "" + "CVE-2020-27784": { + "cmt_msg": "usb: gadget: function: printer: fix use-after-free in __lock_acquire" }, - "CVE-2018-12931": { - "cmt_msg": "" + "CVE-2020-27786": { + "cmt_msg": "ALSA: rawmidi: Fix racy buffer resize under concurrent accesses" }, - "CVE-2021-39801": { + "CVE-2023-6240": { "cmt_msg": "" }, - "CVE-2021-39800": { - "cmt_msg": "" + "CVE-2022-39842": { + "cmt_msg": "video: fbdev: pxa3xx-gcu: Fix integer overflow in pxa3xx_gcu_write" }, - "CVE-2024-22099": { - "cmt_msg": "" + "CVE-2023-51043": { + "cmt_msg": "drm/atomic: Fix potential use-after-free in nonblocking commits" }, - "CVE-2022-45885": { - "cmt_msg": "" + "CVE-2019-9454": { + "cmt_msg": "i2c: core-smbus: prevent stack corruption on read I2C_BLOCK_DATA" }, - "CVE-2022-45884": { - "cmt_msg": "" + "CVE-2017-16939": { + "cmt_msg": "ipsec: Fix aborted xfrm policy dump crash" }, - "CVE-2024-25740": { - "cmt_msg": "" + "CVE-2016-10741": { + "cmt_msg": "xfs: don't BUG() on mixed direct and mapped I/O" }, - "CVE-2024-25741": { - "cmt_msg": "" + "CVE-2021-26931": { + "cmt_msg": "xen-blkback: don't \"handle\" error by BUG()" }, - "CVE-2024-21803": { - "cmt_msg": "" + "CVE-2021-26930": { + "cmt_msg": "xen-blkback: fix error handling in xen_blkbk_map()" }, - "CVE-2021-3542": { - "cmt_msg": "" + "CVE-2021-26932": { + "cmt_msg": "Xen/x86: don't bail early from clear_foreign_p2m_mapping()" }, - "CVE-2018-12929": { - "cmt_msg": "" + "CVE-2022-36402": { + "cmt_msg": "drm/vmwgfx: Fix shader stage validation" }, - "CVE-2018-12928": { - "cmt_msg": "" + "CVE-2021-3178": { + "cmt_msg": "nfsd4: readdirplus shouldn't return parent of export" }, - "CVE-2020-25220": { - "cmt_msg": "" + "CVE-2023-1611": { + "cmt_msg": "btrfs: fix race between quota disable and quota assign ioctls" }, - "CVE-2015-2877": { - "cmt_msg": "" + "CVE-2021-3772": { + "cmt_msg": "sctp: use init_tag from inithdr for ABORT chunk" }, - "CVE-2023-26242": { - "cmt_msg": "" + "CVE-2021-34556": { + "cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4" }, - "CVE-2019-16089": { - "cmt_msg": "" + "CVE-2021-28714": { + "cmt_msg": "xen/netback: fix rx queue stall detection" }, - "CVE-2023-32629": { - "cmt_msg": "" + "CVE-2021-28713": { + "cmt_msg": "xen/console: harden hvc_xen against event channel storms" }, - "CVE-2022-0400": { - "cmt_msg": "" + "CVE-2021-28712": { + "cmt_msg": "xen/netfront: harden netfront against event channel storms" }, - "CVE-2021-3847": { - "cmt_msg": "" + "CVE-2021-28711": { + "cmt_msg": "xen/blkfront: harden blkfront against event channel storms" }, - "CVE-2022-2961": { + "CVE-2022-1247": { "cmt_msg": "" }, - "CVE-2022-25265": { - "cmt_msg": "" + "CVE-2022-2991": { + "cmt_msg": "remove the lightnvm subsystem" }, - "CVE-2011-4916": { - "cmt_msg": "" + "CVE-2017-11473": { + "cmt_msg": "x86/acpi: Prevent out of bound access caused by broken ACPI tables" }, - "CVE-2023-23039": { - "cmt_msg": "" + "CVE-2017-11472": { + "cmt_msg": "ACPICA: Namespace: fix operand cache leak" }, - "CVE-2024-23196": { - "cmt_msg": "" + "CVE-2017-17862": { + "cmt_msg": "bpf: fix branch pruning logic" }, - "CVE-2023-3640": { - "cmt_msg": "" - } - } - }, - "6.6": { - "6.6": { - "CVE-2023-46862": { - "cmt_msg": "io_uring/fdinfo: lock SQ thread while retrieving thread cpu/pid", - "cmt_id": "7644b1a1c9a7ae8ab99175989bfc8676055edb46" - } - }, - "6.6.3": { - "CVE-2024-0607": { - "cmt_msg": "netfilter: nf_tables: fix pointer math issue in nft_byteorder_eval()", - "cmt_id": "013deed31ab15ef287b0045e4e7bd8f250e75b94" + "CVE-2021-39657": { + "cmt_msg": "scsi: ufs: Correct the LUN used in eh_device_reset_handler() callback" }, - "CVE-2023-6111": { - "cmt_msg": "netfilter: nf_tables: remove catchall element in GC sync path", - "cmt_id": "80d6a9236ab6d2c0fd241514d1af2e325d16a210" - } - }, - "6.6.4": { - "CVE-2023-6121": { - "cmt_msg": "nvmet: nul-terminate the NQNs passed in the connect command", - "cmt_id": "2291653c27236d34ca7df3bfd3427ce6e30c2d95" - } - }, - "6.6.5": { - "CVE-2024-0584": { - "cmt_msg": "ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet", - "cmt_id": "bf8601dabed0c134a7d58085824e3e466840c5d1" + "CVE-2023-52578": { + "cmt_msg": "net: bridge: use DEV_STATS_INC()" }, - "CVE-2023-6560": { - "cmt_msg": "io_uring: don't allow discontig pages for IORING_SETUP_NO_MMAP", - "cmt_id": "4be625ba36bcfdfb9c72b712acd4ef943a269ebb" + "CVE-2023-52574": { + "cmt_msg": "team: fix null-ptr-deref when team device type is changed" }, - "CVE-2024-0582": { - "cmt_msg": "io_uring/kbuf: defer release of mapped buffer rings", - "cmt_id": "7138ebbe65caf65f52b923d4ef819c77d04ea671" + "CVE-2023-3567": { + "cmt_msg": "vc_screen: move load of struct vc_data pointer in vcs_read() to avoid UAF" }, - "CVE-2023-6932": { - "cmt_msg": "ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet", - "cmt_id": "bf8601dabed0c134a7d58085824e3e466840c5d1" - } - }, - "6.6.7": { - "CVE-2024-25744": { - "cmt_msg": "x86/coco: Disable 32-bit emulation by default on TDX and SEV", - "cmt_id": "34c686e5be2fa1c03ae09568159a9ef37d1c7cf5" + "CVE-2023-52571": { + "cmt_msg": "power: supply: rk817: Fix node refcount leak" }, - "CVE-2023-6931": { - "cmt_msg": "perf: Fix perf_event_validate_size()", - "cmt_id": "cfe9295db0932f1b8e0d94ffc75521898e5a5a8a" + "CVE-2023-52572": { + "cmt_msg": "cifs: Fix UAF in cifs_demultiplex_thread()" }, - "CVE-2024-0646": { - "cmt_msg": "net: tls, update curr on splice as well", - "cmt_id": "eb30a025982f61910f32e99778db3c0ceceaff5c" + "CVE-2017-14340": { + "cmt_msg": "xfs: XFS_IS_REALTIME_INODE() should be false if no rt device present" }, - "CVE-2023-6531": { - "cmt_msg": "io_uring/af_unix: disable sending io_uring over sockets", - "cmt_id": "5a33d385eb36991a91e3dddb189d8679e2aac2be" + "CVE-2019-19039": { + "cmt_msg": "btrfs: Don't submit any btree write bio if the fs has errors" }, - "CVE-2023-6817": { - "cmt_msg": "netfilter: nft_set_pipapo: skip inactive elements during set walk", - "cmt_id": "c66d39f18e0ef16bac8c8491b657051f531a1eba" + "CVE-2016-8630": { + "cmt_msg": "kvm: x86: Check memopp before dereference (CVE-2016-8630)" }, - "CVE-2023-6622": { - "cmt_msg": "netfilter: nf_tables: bail out on mismatching dynset and set expressions", - "cmt_id": "5eeba00a89c5c6be4e45b69bef20d1d1b9edb968" - } - }, - "6.6.8": { - "CVE-2023-51782": { - "cmt_msg": "net/rose: Fix Use-After-Free in rose_ioctl", - "cmt_id": "63caa51833e8701248a8a89d83effe96f30e4c80" + "CVE-2016-8633": { + "cmt_msg": "firewire: net: guard against rx buffer overflows" }, - "CVE-2023-51780": { - "cmt_msg": "atm: Fix Use-After-Free in do_vcc_ioctl", - "cmt_id": "531fd46f92895bcdc41bedd12533266c397196da" + "CVE-2016-8632": { + "cmt_msg": "tipc: check minimum bearer MTU" }, - "CVE-2023-51781": { - "cmt_msg": "appletalk: Fix Use-After-Free in atalk_ioctl", - "cmt_id": "e15ded324a3911358e8541a1b573665f99f216ef" + "CVE-2020-12362": { + "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" }, - "CVE-2023-52434": { - "cmt_msg": "smb: client: fix potential OOBs in smb2_parse_contexts()", - "cmt_id": "17a0f64cc02d4972e21c733d9f21d1c512963afa" + "CVE-2020-12363": { + "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" }, - "CVE-2024-0565": { - "cmt_msg": "smb: client: fix OOB in receive_encrypted_standard()", - "cmt_id": "534733397da26de0303057ce0b93a22bda150365" - } - }, - "6.6.9": { - "CVE-2023-6606": { - "cmt_msg": "smb: client: fix OOB in smbCalcSize()", - "cmt_id": "ac48fcef5ec2e9ac85c0b39045d874e60eac75d7" + "CVE-2019-12881": { + "cmt_msg": "drm/i915/userptr: reject zero user_size" }, - "CVE-2023-6200": { - "cmt_msg": "net/ipv6: Revert remove expired routes with a separated list of routes", - "cmt_id": "b577b9aa1340ee7f36441b0740691550abaad5f2" + "CVE-2022-4129": { + "cmt_msg": "l2tp: Serialize access to sk_user_data with sk_callback_lock" }, - "CVE-2023-51779": { - "cmt_msg": "Bluetooth: af_bluetooth: Fix Use-After-Free in bt_sock_recvmsg", - "cmt_id": "1d576c3a5af850bf11fbd103f9ba11aa6d6061fb" - } - }, - "6.6.10": { - "CVE-2024-0193": { - "cmt_msg": "netfilter: nf_tables: skip set commit for deleted/destroyed sets", - "cmt_id": "b7f1c01b55ad2a5da12f08e5ec3c76dabb99882a" + "CVE-2020-12364": { + "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" }, - "CVE-2024-22705": { - "cmt_msg": "ksmbd: fix slab-out-of-bounds in smb_strndup_from_utf16()", - "cmt_id": "7d5f219f1ef69f27eb8cbfb794d634fc9c4d24ac" - } - }, - "6.6.11": { - "CVE-2023-52435": { - "cmt_msg": "net: prevent mss overflow in skb_segment()", - "cmt_id": "95b3904a261a9f810205da560e802cc326f50d77" - } - }, - "6.6.13": { - "CVE-2023-52439": { - "cmt_msg": "uio: Fix use-after-free in uio_open", - "cmt_id": "35f102607054faafe78d2a6994b18d5d9d6e92ad" + "CVE-2021-4002": { + "cmt_msg": "hugetlbfs: flush TLBs correctly after huge_pmd_unshare" }, - "CVE-2023-52438": { - "cmt_msg": "binder: fix use-after-free in shinker's callback", - "cmt_id": "a49087ab93508b60d9b8add91707a22dda832869" + "CVE-2023-26545": { + "cmt_msg": "net: mpls: fix stale pointer if allocation fails during device rename" }, - "CVE-2023-6915": { - "cmt_msg": "ida: Fix crash in ida_free when the bitmap is empty", - "cmt_id": "ffcaafdb8be64555e9928d943a3655c755dba92b" + "CVE-2017-12168": { + "cmt_msg": "arm64: KVM: pmu: Fix AArch32 cycle counter access" }, - "CVE-2023-6610": { - "cmt_msg": "smb: client: fix potential OOB in smb2_dump_detail()", - "cmt_id": "c5e0ed716c52fddea5e625668e75658c3b81d3fc" + "CVE-2019-15292": { + "cmt_msg": "appletalk: Fix use-after-free in atalk_proc_exit" }, - "CVE-2023-52436": { - "cmt_msg": "f2fs: explicitly null-terminate the xattr list", - "cmt_id": "2525d1ba225b5c167162fa344013c408e8b4de36" - } - }, - "6.6.14": { - "CVE-2024-26592": { - "cmt_msg": "ksmbd: fix UAF issue in ksmbd_tcp_new_connection()", - "cmt_id": "24290ba94cd0136e417283b0dbf8fcdabcf62111" + "CVE-2019-15291": { + "cmt_msg": "media: b2c2-flexcop-usb: add sanity checking" }, - "CVE-2024-26590": { - "cmt_msg": "erofs: fix inconsistent per-file compression format", - "cmt_id": "823ba1d2106019ddf195287ba53057aee33cf724" + "CVE-2019-15290": { + "cmt_msg": "" }, - "CVE-2024-26591": { - "cmt_msg": "bpf: Fix re-attachment branch in bpf_tracing_prog_attach", - "cmt_id": "8c8bcd45e9b10eef12321f08d2e5be33d615509c" + "CVE-2023-3212": { + "cmt_msg": "gfs2: Don't deref jdesc in evict" }, - "CVE-2024-26597": { - "cmt_msg": "net: qualcomm: rmnet: fix global oob in rmnet_policy", - "cmt_id": "c4734535034672f59f2652e1e0058c490da62a5c" + "CVE-2024-26633": { + "cmt_msg": "ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim()" }, - "CVE-2024-26594": { - "cmt_msg": "ksmbd: validate mech token in session setup", - "cmt_id": "a2b21ef1ea4cf632d19b3a7cc4d4245b8e63202a" + "CVE-2024-26636": { + "cmt_msg": "llc: make llc_ui_sendmsg() more robust against bonding changes" }, - "CVE-2024-26595": { - "cmt_msg": "mlxsw: spectrum_acl_tcam: Fix NULL pointer dereference in error path", - "cmt_id": "817840d125a370626895df269c50c923b79b0a39" + "CVE-2024-26635": { + "cmt_msg": "llc: Drop support for ETH_P_TR_802_2." }, - "CVE-2024-26598": { - "cmt_msg": "KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache", - "cmt_id": "65b201bf3e9af1b0254243a5881390eda56f72d1" + "CVE-2017-7308": { + "cmt_msg": "net/packet: fix overflow in check for priv area size" }, - "CVE-2024-26599": { - "cmt_msg": "pwm: Fix out-of-bounds access in of_pwm_single_xlate()", - "cmt_id": "e5f2b4b62977fb6c2efcbc5779e0c9dce18215f7" + "CVE-2016-0758": { + "cmt_msg": "KEYS: Fix ASN.1 indefinite length object parsing" }, - "CVE-2023-52459": { - "cmt_msg": "media: v4l: async: Fix duplicated list deletion", - "cmt_id": "b7062628caeaec90e8f691ebab2d70f31b7b6b91" + "CVE-2020-12769": { + "cmt_msg": "spi: spi-dw: Add lock protect dw_spi rx/tx to prevent concurrent calls" }, - "CVE-2023-52458": { - "cmt_msg": "block: add check that partition length needs to be aligned with block size", - "cmt_id": "cb16cc1abda18a9514106d2ac8c8d7abc0be5ed8" + "CVE-2017-8890": { + "cmt_msg": "dccp/tcp: do not inherit mc_list from parent" }, - "CVE-2023-52457": { - "cmt_msg": "serial: 8250: omap: Don't skip resource freeing if pm_runtime_resume_and_get() failed", - "cmt_id": "887a558d0298d36297daea039954c39940228d9b" + "CVE-2023-52635": { + "cmt_msg": "PM / devfreq: Synchronize devfreq_monitor_[start/stop]" }, - "CVE-2023-52456": { - "cmt_msg": "serial: imx: fix tx statemachine deadlock", - "cmt_id": "763cd68746317b5d746dc2649a3295c1efb41181" + "CVE-2023-52634": { + "cmt_msg": "drm/amd/display: Fix disable_otg_wa logic" }, - "CVE-2023-52455": { - "cmt_msg": "iommu: Don't reserve 0-length IOVA region", - "cmt_id": "98b8a550da83cc392a14298c4b3eaaf0332ae6ad" + "CVE-2016-9588": { + "cmt_msg": "kvm: nVMX: Allow L1 to intercept software exceptions (#BP and #OF)" }, - "CVE-2023-52454": { - "cmt_msg": "nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length", - "cmt_id": "24e05760186dc070d3db190ca61efdbce23afc88" + "CVE-2017-18208": { + "cmt_msg": "mm/madvise.c: fix madvise() infinite loop under special circumstances" }, - "CVE-2023-52453": { - "cmt_msg": "hisi_acc_vfio_pci: Update migration data pointer correctly on saving/resume", - "cmt_id": "45f80b2f230df10600e6fa1b83b28bf1c334185e" + "CVE-2017-1000364": { + "cmt_msg": "mm: larger stack guard gap, between vmas" }, - "CVE-2023-52452": { - "cmt_msg": "bpf: Fix accesses to uninit stack slots", - "cmt_id": "0954982db8283016bf38e9db2da5adf47a102e19" + "CVE-2017-1000365": { + "cmt_msg": "fs/exec.c: account for argv/envp pointers" }, - "CVE-2023-52451": { - "cmt_msg": "powerpc/pseries/memhp: Fix access beyond end of drmem array", - "cmt_id": "df16afba2378d985359812c865a15c05c70a967e" + "CVE-2020-13143": { + "cmt_msg": "USB: gadget: fix illegal array access in binding with UDC" }, - "CVE-2023-52450": { - "cmt_msg": "perf/x86/intel/uncore: Fix NULL pointer dereference issue in upi_fill_topology()", - "cmt_id": "bf1bf09e6b599758851457f3999779622a48d015" + "CVE-2017-1000363": { + "cmt_msg": "char: lp: fix possible integer overflow in lp_setup()" }, - "CVE-2024-1085": { - "cmt_msg": "netfilter: nf_tables: check if catch-all set element is active in next generation", - "cmt_id": "7baa33837ee2473eb0afd9755e29a25cd3771eac" + "CVE-2022-3903": { + "cmt_msg": "media: mceusb: Use new usb_control_msg_*() routines" }, - "CVE-2024-26589": { - "cmt_msg": "bpf: Reject variable offset alu on PTR_TO_FLOW_KEYS", - "cmt_id": "e8d3872b617c21100c5ee4f64e513997a68c2e3d" + "CVE-2017-15299": { + "cmt_msg": "KEYS: don't let add_key() update an uninstantiated key" }, - "CVE-2023-46838": { - "cmt_msg": "xen-netback: don't produce zero-size SKB frags", - "cmt_id": "78376d4415602d97773f20b49f4aa5fc8666f7a9" + "CVE-2021-47179": { + "cmt_msg": "NFSv4: Fix a NULL pointer dereference in pnfs_mark_matching_lsegs_return()" }, - "CVE-2024-26587": { - "cmt_msg": "net: netdevsim: don't try to destroy PHC on VFs", - "cmt_id": "08aca65997fb6f233066883b1f1e653bcb1f26ca" + "CVE-2019-11190": { + "cmt_msg": "binfmt_elf: switch to new creds when switching to new mm" }, - "CVE-2024-26586": { - "cmt_msg": "mlxsw: spectrum_acl_tcam: Fix stack corruption", - "cmt_id": "2f5e1565740490706332c06f36211d4ce0f88e62" + "CVE-2019-11191": { + "cmt_msg": "x86: Deprecate a.out support" }, - "CVE-2024-24860": { - "cmt_msg": "Bluetooth: Fix atomicity violation in {min,max}_key_size_set", - "cmt_id": "f56e715ef1c19c42c6aa6cb9280947dea13aab2e" + "CVE-2021-47170": { + "cmt_msg": "USB: usbfs: Don't WARN about excessively large memory allocations" }, - "CVE-2024-26588": { - "cmt_msg": "LoongArch: BPF: Prevent out-of-bounds memory access", - "cmt_id": "9aeb09f4d85a87bac46c010d75a2ea299d462f28" + "CVE-2021-47171": { + "cmt_msg": "net: usb: fix memory leak in smsc75xx_bind" }, - "CVE-2023-52462": { - "cmt_msg": "bpf: fix check for attempt to corrupt spilled pointer", - "cmt_id": "8dc15b0670594543c356567a1a45b0182ec63174" + "CVE-2021-47172": { + "cmt_msg": "iio: adc: ad7124: Fix potential overflow due to non sequential channel numbers" }, - "CVE-2023-50431": { - "cmt_msg": "accel/habanalabs: fix information leak in sec_attest_info()", - "cmt_id": "975aaaddc226303d382baa0d0ece84e8bec1fcf5" + "CVE-2021-47173": { + "cmt_msg": "misc/uss720: fix memory leak in uss720_probe" }, - "CVE-2023-52463": { - "cmt_msg": "efivarfs: force RO when remounting if SetVariable is not supported", - "cmt_id": "0049fe7e4a85849bdd778cdb72e51a791ff3d737" + "CVE-2021-47175": { + "cmt_msg": "net/sched: fq_pie: fix OOB access in the traffic path" }, - "CVE-2023-52464": { - "cmt_msg": "EDAC/thunderx: Fix possible out-of-bounds string access", - "cmt_id": "e1c86511241588efffaa49556196f09a498d5057" + "CVE-2018-10323": { + "cmt_msg": "xfs: set format back to extents if xfs_bmap_extents_to_btree" }, - "CVE-2023-52443": { - "cmt_msg": "apparmor: avoid crash when parsed profile name is empty", - "cmt_id": "5c0392fdafb0a2321311900be83ffa572bef8203" + "CVE-2018-10322": { + "cmt_msg": "xfs: enhance dinode verifier" }, - "CVE-2023-52444": { - "cmt_msg": "f2fs: fix to avoid dirent corruption", - "cmt_id": "d3c0b49aaa12a61d560528f5d605029ab57f0728" + "CVE-2021-46951": { + "cmt_msg": "tpm: efi: Use local variable for calculating final log size" }, - "CVE-2023-52445": { - "cmt_msg": "media: pvrusb2: fix use after free on context disconnection", - "cmt_id": "2cf0005d315549b8d2b940ff96a66c2a889aa795" + "CVE-2021-46950": { + "cmt_msg": "md/raid1: properly indicate failure when ending a failed write request" }, - "CVE-2023-52446": { - "cmt_msg": "bpf: Fix a race condition between btf_put() and map_free()", - "cmt_id": "d048dced8ea5eac6723ae873a40567e6f101ea42" + "CVE-2021-46952": { + "cmt_msg": "NFS: fs_context: validate UDP retrans to prevent shift out-of-bounds" }, - "CVE-2023-52447": { - "cmt_msg": "bpf: Defer the free of inner map when necessary", - "cmt_id": "f91cd728b10c51f6d4a39957ccd56d1e802fc8ee" + "CVE-2021-46959": { + "cmt_msg": "spi: Fix use-after-free with devm_spi_alloc_*" }, - "CVE-2023-52448": { - "cmt_msg": "gfs2: Fix kernel NULL pointer dereference in gfs2_rgrp_dump", - "cmt_id": "067a7c48c2c70f05f9460d6f0e8423e234729f05" + "CVE-2017-18193": { + "cmt_msg": "f2fs: fix a bug caused by NULL extent tree" }, - "CVE-2023-52449": { - "cmt_msg": "mtd: Fix gluebi NULL pointer dereference caused by ftl notifier", - "cmt_id": "cfd7c9d260dc0a3baaea05a122a19ab91e193c65" - } - }, - "6.6.15": { - "CVE-2024-1086": { - "cmt_msg": "netfilter: nf_tables: reject QUEUE/DROP verdict parameters", - "cmt_id": "6653118b176a00915125521c6572ae8e507621db" + "CVE-2023-5178": { + "cmt_msg": "nvmet-tcp: Fix a possible UAF in queue intialization setup" }, - "CVE-2024-23849": { - "cmt_msg": "net/rds: Fix UBSAN: array-index-out-of-bounds in rds_cmsg_recv", - "cmt_id": "7a73190ea557e7f26914b0fe04c1f57a96cb771f" - } - }, - "6.6.17": { - "CVE-2024-26581": { - "cmt_msg": "netfilter: nft_set_rbtree: skip end interval element from gc", - "cmt_id": "b734f7a47aeb32a5ba298e4ccc16bb0c52b6dbf7" - } - }, - "6.6.18": { - "CVE-2024-26593": { - "cmt_msg": "i2c: i801: Fix block process call transactions", - "cmt_id": "6be99c51829b24c914cef5bff6164877178e84d9" + "CVE-2017-7495": { + "cmt_msg": "ext4: fix data exposure after a crash" }, - "CVE-2024-26583": { - "cmt_msg": "tls: fix race between async notify and socket close", - "cmt_id": "86dc27ee36f558fe223dbdfbfcb6856247356f4a" + "CVE-2021-0929": { + "cmt_msg": "staging/android/ion: delete dma_buf->kmap/unmap implemenation" }, - "CVE-2024-1151": { - "cmt_msg": "net: openvswitch: limit the number of recursions from action sets", - "cmt_id": "5eeb2a9eaa5bc6e0aa655ac72a931b78f8f9b365" + "CVE-2018-19985": { + "cmt_msg": "USB: hso: Fix OOB memory access in hso_probe/hso_get_config_data" }, - "CVE-2024-26585": { - "cmt_msg": "tls: fix race between tx work scheduling and socket close", - "cmt_id": "6db22d6c7a6dc914b12c0469b94eb639b6a8a146" + "CVE-2021-0920": { + "cmt_msg": "af_unix: fix garbage collect vs MSG_PEEK" }, - "CVE-2024-26584": { - "cmt_msg": "net: tls: handle backlogging of crypto requests", - "cmt_id": "13eca403876bbea3716e82cdfe6f1e6febb38754" + "CVE-2017-7273": { + "cmt_msg": "HID: hid-cypress: validate length of report" }, - "CVE-2023-52429": { - "cmt_msg": "dm: limit the number of targets and parameter size area", - "cmt_id": "438d19492b7f002334573bae43276297eb234c80" + "CVE-2023-0615": { + "cmt_msg": "media: vivid: dev->bitmap_cap wasn't freed in all cases" }, - "CVE-2024-23850": { - "cmt_msg": "btrfs: do not ASSERT() if the newly created subvolume already got read", - "cmt_id": "833775656d447c545133a744a0ed1e189ce61430" + "CVE-2017-7472": { + "cmt_msg": "KEYS: fix keyctl_set_reqkey_keyring() to not leak thread keyrings" }, - "CVE-2024-23851": { - "cmt_msg": "dm: limit the number of targets and parameter size area", - "cmt_id": "438d19492b7f002334573bae43276297eb234c80" + "CVE-2022-3586": { + "cmt_msg": "sch_sfb: Don't assume the skb is still around after enqueueing to child" }, - "CVE-2024-26582": { - "cmt_msg": "net: tls: fix use-after-free with partial reads and async decrypt", - "cmt_id": "d684763534b969cca1022e2a28645c7cc91f7fa5" - } - }, - "outstanding": { - "CVE-2020-26556": { - "cmt_msg": "" + "CVE-2020-27825": { + "cmt_msg": "tracing: Fix race in trace_open and buffer resize call" }, - "CVE-2020-26557": { - "cmt_msg": "" + "CVE-2019-2181": { + "cmt_msg": "binder: check for overflow when alloc for security context" }, - "CVE-2019-20794": { - "cmt_msg": "" + "CVE-2020-27820": { + "cmt_msg": "drm/nouveau: use drm_dev_unplug() during device removal" }, - "CVE-2020-26559": { - "cmt_msg": "" + "CVE-2023-6610": { + "cmt_msg": "smb: client: fix potential OOB in smb2_dump_detail()" }, - "CVE-2020-35501": { + "CVE-2023-1476": { "cmt_msg": "" }, - "CVE-2023-4010": { - "cmt_msg": "" + "CVE-2023-1670": { + "cmt_msg": "xirc2ps_cs: Fix use after free bug in xirc2ps_detach" }, - "CVE-2018-1121": { - "cmt_msg": "" + "CVE-2020-14351": { + "cmt_msg": "perf/core: Fix race in the perf_mmap_close() function" }, - "CVE-2019-19378": { - "cmt_msg": "" + "CVE-2020-14353": { + "cmt_msg": "KEYS: prevent creating a different user's keyrings" }, - "CVE-2024-22386": { - "cmt_msg": "" + "CVE-2020-0429": { + "cmt_msg": "l2tp: fix race between l2tp_session_delete() and l2tp_tunnel_closeall()" }, - "CVE-2020-24503": { - "cmt_msg": "" + "CVE-2020-14356": { + "cmt_msg": "cgroup: fix cgroup_sk_alloc() for sk_clone_lock()" }, - "CVE-2020-24502": { - "cmt_msg": "" + "CVE-2022-20132": { + "cmt_msg": "HID: add hid_is_usb() function to make it simpler for USB detection" }, - "CVE-2023-6240": { - "cmt_msg": "" + "CVE-2023-6270": { + "cmt_msg": "aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts" }, - "CVE-2020-11725": { - "cmt_msg": "" + "CVE-2023-1582": { + "cmt_msg": "fs/proc: task_mmu.c: don't read mapcount for migration entry" }, - "CVE-2022-23825": { - "cmt_msg": "" + "CVE-2019-17351": { + "cmt_msg": "xen: let alloc_xenballooned_pages() fail if not enough memory free" }, - "CVE-2023-3397": { - "cmt_msg": "" + "CVE-2018-20854": { + "cmt_msg": "phy: ocelot-serdes: fix out-of-bounds read" }, - "CVE-2023-1476": { - "cmt_msg": "" + "CVE-2018-20855": { + "cmt_msg": "IB/mlx5: Fix leaking stack memory to userspace" }, - "CVE-2021-3864": { - "cmt_msg": "" + "CVE-2023-35824": { + "cmt_msg": "media: dm1105: Fix use after free bug in dm1105_remove due to race condition" }, - "CVE-2022-3606": { - "cmt_msg": "" + "CVE-2019-1999": { + "cmt_msg": "binder: fix race between munmap() and direct reclaim" }, - "CVE-2019-19814": { - "cmt_msg": "" + "CVE-2018-1065": { + "cmt_msg": "netfilter: add back stackpointer size checks" }, - "CVE-2022-2209": { - "cmt_msg": "" + "CVE-2018-1066": { + "cmt_msg": "CIFS: Enable encryption during session setup phase" }, - "CVE-2023-7042": { - "cmt_msg": "" + "CVE-2018-1068": { + "cmt_msg": "netfilter: ebtables: CONFIG_COMPAT: don't trust userland offsets" }, - "CVE-2021-26934": { - "cmt_msg": "" + "CVE-2019-7308": { + "cmt_msg": "bpf: fix sanitation of alu op with pointer / scalar type from different paths" }, - "CVE-2023-47233": { - "cmt_msg": "" + "CVE-2018-1000199": { + "cmt_msg": "perf/hwbp: Simplify the perf-hwbp code, fix documentation" }, - "CVE-2016-8660": { - "cmt_msg": "" + "CVE-2022-1966": { + "cmt_msg": "netfilter: nf_tables: disallow non-stateful expression in sets earlier" }, - "CVE-2023-6270": { - "cmt_msg": "" + "CVE-2021-3587": { + "cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect" }, - "CVE-2020-15802": { - "cmt_msg": "" + "CVE-2019-16995": { + "cmt_msg": "net: hsr: fix memory leak in hsr_dev_finalize()" }, - "CVE-2008-2544": { - "cmt_msg": "" + "CVE-2017-18075": { + "cmt_msg": "crypto: pcrypt - fix freeing pcrypt instances" }, - "CVE-2023-6356": { - "cmt_msg": "" + "CVE-2017-18079": { + "cmt_msg": "Input: i8042 - fix crash at boot time" }, - "CVE-2019-15239": { - "cmt_msg": "unknown" + "CVE-2020-1749": { + "cmt_msg": "net: ipv6_stub: use ip6_dst_lookup_flow instead of ip6_dst_lookup" }, - "CVE-2007-3719": { - "cmt_msg": "" + "CVE-2021-3760": { + "cmt_msg": "nfc: nci: fix the UAF of rf_conn_info object" }, - "CVE-2023-20941": { - "cmt_msg": "" + "CVE-2017-18216": { + "cmt_msg": "ocfs2: subsystem.su_mutex is required while accessing the item->ci_parent" }, - "CVE-2023-21400": { - "cmt_msg": "" + "CVE-2017-18218": { + "cmt_msg": "net: hns: Fix a skb used after free bug" }, - "CVE-2023-2640": { - "cmt_msg": "" + "CVE-2021-39648": { + "cmt_msg": "usb: gadget: configfs: Fix use-after-free issue with udc_name" }, - "CVE-2010-4563": { - "cmt_msg": "" + "CVE-2023-52569": { + "cmt_msg": "btrfs: remove BUG() after failure to insert delayed dir index item" }, - "CVE-2020-26140": { - "cmt_msg": "" + "CVE-2023-52568": { + "cmt_msg": "x86/sgx: Resolves SECS reclaim vs. page fault for EAUG race" }, - "CVE-2020-26143": { - "cmt_msg": "" + "CVE-2019-0136": { + "cmt_msg": "mac80211: drop robust management frames from unknown TA" }, - "CVE-2020-26142": { - "cmt_msg": "" + "CVE-2023-52563": { + "cmt_msg": "drm/meson: fix memory leak on ->hpd_notify callback" }, - "CVE-2024-23848": { - "cmt_msg": "" + "CVE-2023-52561": { + "cmt_msg": "arm64: dts: qcom: sdm845-db845c: Mark cont splash memory region as reserved" }, - "CVE-2022-3533": { - "cmt_msg": "" + "CVE-2022-3344": { + "cmt_msg": "KVM: x86: nSVM: harden svm_free_nested against freeing vmcb02 while still in use" }, - "CVE-2022-1247": { - "cmt_msg": "" + "CVE-2023-52566": { + "cmt_msg": "nilfs2: fix potential use after free in nilfs_gccache_submit_read_data()" }, - "CVE-2020-10708": { - "cmt_msg": "" + "CVE-2023-52565": { + "cmt_msg": "media: uvcvideo: Fix OOB read" }, - "CVE-2022-4543": { - "cmt_msg": "" + "CVE-2018-12896": { + "cmt_msg": "posix-timers: Sanitize overrun handling" }, - "CVE-2017-13693": { + "CVE-2020-0347": { "cmt_msg": "" }, - "CVE-2021-0399": { - "cmt_msg": "" + "CVE-2021-40490": { + "cmt_msg": "ext4: fix race writing to an inline_data file while its xattrs are changing" }, - "CVE-2017-13694": { - "cmt_msg": "" + "CVE-2021-33909": { + "cmt_msg": "seq_file: disallow extremely large seq buffer allocations" }, - "CVE-2024-0564": { + "CVE-2019-12456": { "cmt_msg": "" }, - "CVE-2012-4542": { - "cmt_msg": "" + "CVE-2019-5108": { + "cmt_msg": "mac80211: Do not send Layer 2 Update frame before authorization" }, - "CVE-2013-7445": { - "cmt_msg": "" + "CVE-2019-17133": { + "cmt_msg": "cfg80211: wext: avoid copying malformed SSIDs" }, - "CVE-2024-24859": { - "cmt_msg": "" + "CVE-2021-33656": { + "cmt_msg": "vt: drop old FONT ioctls" }, - "CVE-2024-24858": { - "cmt_msg": "" + "CVE-2021-33655": { + "cmt_msg": "fbcon: Disallow setting font bigger than screen size" }, - "CVE-2005-3660": { - "cmt_msg": "" + "CVE-2022-41858": { + "cmt_msg": "drivers: net: slip: fix NPD bug in sl_tx_timeout()" }, - "CVE-2024-24857": { - "cmt_msg": "" + "CVE-2022-41850": { + "cmt_msg": "HID: roccat: Fix use-after-free in roccat_read()" }, - "CVE-2023-6238": { - "cmt_msg": "" + "CVE-2017-10663": { + "cmt_msg": "f2fs: sanity check checkpoint segno and blkoff" }, - "CVE-2023-31082": { - "cmt_msg": "" + "CVE-2017-10662": { + "cmt_msg": "f2fs: sanity check segment count" }, - "CVE-2023-31081": { - "cmt_msg": "" + "CVE-2017-10661": { + "cmt_msg": "timerfd: Protect the might cancel mechanism proper" }, - "CVE-2022-38096": { - "cmt_msg": "" + "CVE-2022-1184": { + "cmt_msg": "ext4: verify dir block before splitting it" }, - "CVE-2022-3544": { - "cmt_msg": "" + "CVE-2016-7425": { + "cmt_msg": "scsi: arcmsr: Buffer overflow in arcmsr_iop_message_xfer()" }, - "CVE-2024-26596": { - "cmt_msg": "net: dsa: fix netdev_priv() dereference before check on non-DSA netdevice events" + "CVE-2017-14991": { + "cmt_msg": "scsi: sg: fixup infoleak when using SG_GET_REQUEST_TABLE" }, - "CVE-2024-23307": { - "cmt_msg": "" + "CVE-2016-4997": { + "cmt_msg": "netfilter: x_tables: check for bogus target offset" }, - "CVE-2022-3238": { - "cmt_msg": "" + "CVE-2018-7566": { + "cmt_msg": "ALSA: seq: Fix racy pool initializations" }, - "CVE-2008-4609": { - "cmt_msg": "" + "CVE-2017-7645": { + "cmt_msg": "nfsd: check for oversized NFSv2/v3 arguments" }, - "CVE-2020-14304": { - "cmt_msg": "" + "CVE-2024-26808": { + "cmt_msg": "netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain" }, - "CVE-2020-0347": { - "cmt_msg": "" + "CVE-2024-26809": { + "cmt_msg": "netfilter: nft_set_pipapo: release elements in clone only from destroy path" }, - "CVE-2021-3714": { - "cmt_msg": "" + "CVE-2021-42739": { + "cmt_msg": "media: firewire: firedtv-avc: fix a buffer overflow in avc_ca_pmt()" }, - "CVE-2019-12456": { - "cmt_msg": "" + "CVE-2024-26805": { + "cmt_msg": "netlink: Fix kernel-infoleak-after-free in __skb_datagram_iter" }, - "CVE-2020-26560": { - "cmt_msg": "" + "CVE-2024-26806": { + "cmt_msg": "spi: cadence-qspi: remove system-wide suspend helper calls from runtime PM hooks" }, - "CVE-2021-3892": { - "cmt_msg": "" + "CVE-2020-12771": { + "cmt_msg": "bcache: fix potential deadlock problem in btree_gc_coalesce" }, - "CVE-2024-0841": { - "cmt_msg": "" + "CVE-2020-12770": { + "cmt_msg": "scsi: sg: add sg_remove_request in sg_write" }, - "CVE-2024-24861": { - "cmt_msg": "" + "CVE-2024-26802": { + "cmt_msg": "stmmac: Clear variable when destroying workqueue" }, - "CVE-2024-24864": { - "cmt_msg": "" + "CVE-2018-6412": { + "cmt_msg": "fbdev: Fixing arbitrary kernel leak in case FBIOGETCMAP_SPARC in sbusfb_ioctl_helper()." }, - "CVE-2023-37454": { - "cmt_msg": "" + "CVE-2023-52606": { + "cmt_msg": "powerpc/lib: Validate size for vector operations" }, - "CVE-2022-3642": { - "cmt_msg": "" + "CVE-2018-21008": { + "cmt_msg": "rsi: add fix for crash during assertions" }, - "CVE-2011-4917": { - "cmt_msg": "" + "CVE-2023-52604": { + "cmt_msg": "FS:JFS:UBSAN:array-index-out-of-bounds in dbAdjTree" }, - "CVE-2019-15902": { - "cmt_msg": "unknown" + "CVE-2016-9806": { + "cmt_msg": "netlink: Fix dump skb leak/double free" }, - "CVE-2024-25739": { - "cmt_msg": "" + "CVE-2023-52602": { + "cmt_msg": "jfs: fix slab-out-of-bounds Read in dtSearch" }, - "CVE-2019-15290": { - "cmt_msg": "" + "CVE-2023-52603": { + "cmt_msg": "UBSAN: array-index-out-of-bounds in dtSplitRoot" }, - "CVE-2023-6535": { - "cmt_msg": "" + "CVE-2023-52600": { + "cmt_msg": "jfs: fix uaf in jfs_evict_inode" }, - "CVE-2023-6536": { - "cmt_msg": "" + "CVE-2023-52601": { + "cmt_msg": "jfs: fix array-index-out-of-bounds in dbAdjTree" }, - "CVE-2018-17977": { - "cmt_msg": "" + "CVE-2023-52609": { + "cmt_msg": "binder: fix race between mmput() and do_exit()" }, - "CVE-2022-26878": { - "cmt_msg": "" + "CVE-2016-1583": { + "cmt_msg": "proc: prevent stacking filesystems on top" }, - "CVE-2022-41848": { - "cmt_msg": "" + "CVE-2017-1000379": { + "cmt_msg": "mm: larger stack guard gap, between vmas" }, - "CVE-2022-1116": { + "CVE-2023-3640": { "cmt_msg": "" }, - "CVE-2010-5321": { - "cmt_msg": "" + "CVE-2017-1000371": { + "cmt_msg": "binfmt_elf: use ELF_ET_DYN_BASE only for PIE" }, - "CVE-2018-12930": { - "cmt_msg": "" + "CVE-2017-1000370": { + "cmt_msg": "binfmt_elf: use ELF_ET_DYN_BASE only for PIE" }, - "CVE-2018-12931": { - "cmt_msg": "" + "CVE-2023-3022": { + "cmt_msg": "ipv6: Use result arg in fib_lookup_arg consistently" }, - "CVE-2021-39801": { - "cmt_msg": "" + "CVE-2022-43750": { + "cmt_msg": "usb: mon: make mmapped memory read only" }, - "CVE-2021-39800": { - "cmt_msg": "" + "CVE-2023-0047": { + "cmt_msg": "mm, oom: do not trigger out_of_memory from the #PF" }, - "CVE-2024-22099": { + "CVE-2023-4010": { "cmt_msg": "" }, - "CVE-2022-45885": { - "cmt_msg": "" + "CVE-2021-47167": { + "cmt_msg": "NFS: Fix an Oopsable condition in __nfs_pageio_add_request()" }, - "CVE-2022-45884": { - "cmt_msg": "" + "CVE-2021-47166": { + "cmt_msg": "NFS: Don't corrupt the value of pg_bytes_written in nfs_do_recoalesce()" }, - "CVE-2024-25740": { - "cmt_msg": "" + "CVE-2021-47165": { + "cmt_msg": "drm/meson: fix shutdown crash when component not probed" }, - "CVE-2024-25741": { - "cmt_msg": "" + "CVE-2021-47163": { + "cmt_msg": "tipc: wait and exit until all work queues are done" }, - "CVE-2024-21803": { - "cmt_msg": "" + "CVE-2021-47162": { + "cmt_msg": "tipc: skb_linearize the head skb when reassembling msgs" }, - "CVE-2021-3542": { - "cmt_msg": "" + "CVE-2021-47160": { + "cmt_msg": "net: dsa: mt7530: fix VLAN traffic leaks" }, - "CVE-2018-12929": { - "cmt_msg": "" + "CVE-2023-4385": { + "cmt_msg": "fs: jfs: fix possible NULL pointer dereference in dbFree()" }, - "CVE-2018-12928": { - "cmt_msg": "" + "CVE-2021-46965": { + "cmt_msg": "mtd: physmap: physmap-bt1-rom: Fix unintentional stack access" }, - "CVE-2020-25220": { - "cmt_msg": "" + "CVE-2023-4387": { + "cmt_msg": "net: vmxnet3: fix possible use-after-free bugs in vmxnet3_rq_alloc_rx_buf()" }, - "CVE-2015-2877": { - "cmt_msg": "" + "CVE-2021-46962": { + "cmt_msg": "mmc: uniphier-sd: Fix a resource leak in the remove function" }, - "CVE-2023-26242": { - "cmt_msg": "" + "CVE-2021-47168": { + "cmt_msg": "NFS: fix an incorrect limit in filelayout_decode_layout()" }, - "CVE-2019-16089": { + "CVE-2019-19378": { "cmt_msg": "" }, - "CVE-2023-32629": { - "cmt_msg": "" + "CVE-2022-36879": { + "cmt_msg": "xfrm: xfrm_policy: fix a possible double xfrm_pols_put() in xfrm_bundle_lookup()" }, - "CVE-2022-0400": { - "cmt_msg": "" + "CVE-2019-19377": { + "cmt_msg": "btrfs: Don't submit any btree write bio if the fs has errors" }, - "CVE-2021-3847": { - "cmt_msg": "" + "CVE-2017-7482": { + "cmt_msg": "rxrpc: Fix several cases where a padded len isn't checked in ticket decode" }, - "CVE-2022-2961": { - "cmt_msg": "" + "CVE-2017-7487": { + "cmt_msg": "ipx: call ipxitf_put() in ioctl error path" }, - "CVE-2022-25265": { - "cmt_msg": "" + "CVE-2017-9150": { + "cmt_msg": "bpf: don't let ldimm64 leak map addresses on unprivileged" }, - "CVE-2011-4916": { - "cmt_msg": "" + "CVE-2023-1118": { + "cmt_msg": "media: rc: Fix use-after-free bugs caused by ene_tx_irqsim()" }, - "CVE-2023-23039": { - "cmt_msg": "" + "CVE-2021-0937": { + "cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write" }, - "CVE-2024-23196": { - "cmt_msg": "" + "CVE-2017-7261": { + "cmt_msg": "drm/vmwgfx: NULL pointer dereference in vmw_surface_define_ioctl()" }, - "CVE-2023-3640": { - "cmt_msg": "" - } - } - }, - "6.5": { - "6.5": { - "CVE-2022-36402": { - "cmt_msg": "drm/vmwgfx: Fix shader stage validation", - "cmt_id": "14abdfae508228a7307f7491b5c4215ae70c6542" - } - }, - "6.5.2": { - "CVE-2023-52440": { - "cmt_msg": "ksmbd: fix slub overflow in ksmbd_decode_ntlmssp_auth_blob()", - "cmt_id": "ecd7e1c562cb08e41957fcd4b0e404de5ab38e20" - } - }, - "6.5.3": { - "CVE-2023-4623": { - "cmt_msg": "net/sched: sch_hfsc: Ensure inner classes have fsc curve", - "cmt_id": "eb07894c51c7d6bb8d00948a3e6e7b52c791e93e" + "CVE-2016-5244": { + "cmt_msg": "rds: fix an infoleak in rds_inc_info_copy" }, - "CVE-2023-25775": { - "cmt_msg": "RDMA/irdma: Prevent zero-length STAG registration", - "cmt_id": "782c5702b933477b088e80e6d07b9493145b2916" + "CVE-2016-5243": { + "cmt_msg": "tipc: fix an infoleak in tipc_nl_compat_link_dump" }, - "CVE-2023-37453": { - "cmt_msg": "USB: core: Fix race by not overwriting udev->descriptor in hub_port_init()", - "cmt_id": "b9fbfb349eacc0820f91c797d7f0a3ac7a4935b5" + "CVE-2022-47929": { + "cmt_msg": "net: sched: disallow noqueue for qdisc classes" }, - "CVE-2023-42753": { - "cmt_msg": "netfilter: ipset: add the missing IP_SET_HASH_WITH_NET0 macro for ip_set_hash_netportnet.c", - "cmt_id": "d95c8420efe684b964e3aa28108e9a354bcd7225" + "CVE-2019-16746": { + "cmt_msg": "nl80211: validate beacon head" }, - "CVE-2023-42752": { - "cmt_msg": "igmp: limit igmpv3_newpack() packet size to IP_MAX_MTU", - "cmt_id": "3138192865c2a1f089dd27a7d80a7271ecd468e7" + "CVE-2022-3606": { + "cmt_msg": "" }, - "CVE-2023-45871": { - "cmt_msg": "igb: set max size RX buffer when store bad packet is enabled", - "cmt_id": "dad92377fc6e012e481c6f4a75e32e48fe2777db" + "CVE-2018-18021": { + "cmt_msg": "arm64: KVM: Tighten guest core register access from userspace" }, - "CVE-2023-39193": { - "cmt_msg": "netfilter: xt_sctp: validate the flag_info count", - "cmt_id": "85ebbbe845823be6f8c04b4901da9a0a6f866283" + "CVE-2021-37576": { + "cmt_msg": "KVM: PPC: Book3S: Fix H_RTAS rets buffer overflow" }, - "CVE-2023-39192": { - "cmt_msg": "netfilter: xt_u32: validate user space input", - "cmt_id": "799cc0fb184408f688b030ea381844b16d1d9c62" - } - }, - "6.5.4": { - "CVE-2023-4921": { - "cmt_msg": "net: sched: sch_qfq: Fix UAF in qfq_dequeue()", - "cmt_id": "e5471b82c36396e809817cb988dfc4bce0a688cb" + "CVE-2022-3594": { + "cmt_msg": "r8152: Rate limit overflow messages" }, - "CVE-2023-6176": { - "cmt_msg": "net/tls: do not free tls_rec on async operation in bpf_exec_tx_verdict()", - "cmt_id": "74aecad5da19004ccf6321fd397d14b10756622a" + "CVE-2022-3595": { + "cmt_msg": "cifs: fix double-fault crash during ntlmssp" }, - "CVE-2023-4881": { - "cmt_msg": "netfilter: nftables: exthdr: fix 4-byte stack OOB write", - "cmt_id": "c8f292322ff16b9a2272a67de396c09a50e09dce" + "CVE-2018-5803": { + "cmt_msg": "sctp: verify size of a new chunk in _sctp_make_chunk()" }, - "CVE-2023-39189": { - "cmt_msg": "netfilter: nfnetlink_osf: avoid OOB read", - "cmt_id": "a3d0f898b80ac9b049e590b3ee6391716002da17" + "CVE-2020-27815": { + "cmt_msg": "jfs: Fix array index bounds check in dbAdjTree" }, - "CVE-2023-52433": { - "cmt_msg": "netfilter: nft_set_rbtree: skip sync GC for new elements in this transaction", - "cmt_id": "e3213ff99a355cda811b41e8dbb3472d13167a3a" + "CVE-2023-6606": { + "cmt_msg": "smb: client: fix OOB in smbCalcSize()" }, - "CVE-2023-45898": { - "cmt_msg": "ext4: fix slab-use-after-free in ext4_es_insert_extent()", - "cmt_id": "c15bf3330a9e3c01b23e59899a6a02432a62ddc3" - } - }, - "6.5.6": { - "CVE-2023-42754": { - "cmt_msg": "ipv4: fix null-deref in ipv4_link_failure", - "cmt_id": "cda20fcddf53f0f959641c8ef4d50ab87ffa5124" + "CVE-2020-27673": { + "cmt_msg": "xen/events: add a proper barrier to 2-level uevent unmasking" }, - "CVE-2023-42756": { - "cmt_msg": "netfilter: ipset: Fix race between IPSET_CMD_CREATE and IPSET_CMD_SWAP", - "cmt_id": "20a93d402b6fe6757e14b0eeb400dfac8b8aa3ad" + "CVE-2020-27675": { + "cmt_msg": "xen/events: avoid removing an event channel while handling it" }, - "CVE-2023-5197": { - "cmt_msg": "netfilter: nf_tables: disallow rule removal from chain binding", - "cmt_id": "13f385f99147b4445a1ff151fabd44c12d366ab0" + "CVE-2020-28915": { + "cmt_msg": "fbcon: Fix global-out-of-bounds read in fbcon_get_font()" }, - "CVE-2023-5345": { - "cmt_msg": "fs/smb/client: Reset password pointer to NULL", - "cmt_id": "0c116005af551e9cf437a9ec8c80204c2d4b1b53" - } - }, - "6.5.7": { - "CVE-2024-0641": { - "cmt_msg": "tipc: fix a potential deadlock on &tx->lock", - "cmt_id": "aa1a21681b94f59c67ca56601e05dc1573ecb6cb" + "CVE-2022-3111": { + "cmt_msg": "power: supply: wm8350-power: Add missing free in free_charger_irq" }, - "CVE-2023-34324": { - "cmt_msg": "xen/events: replace evtchn_rwlock with RCU", - "cmt_id": "76b33722e2d2336a6e2a7d9eacbbb8988478cf98" + "CVE-2020-0435": { + "cmt_msg": "f2fs: fix to do sanity check with i_extra_isize" }, - "CVE-2023-31085": { - "cmt_msg": "ubi: Refuse attaching if mtd's erasesize is 0", - "cmt_id": "87b9858e404069817cd4b31830e0a1b9b3d183c4" + "CVE-2020-0432": { + "cmt_msg": "staging: most: net: fix buffer overflow" }, - "CVE-2023-5158": { - "cmt_msg": "vringh: don't use vringh_kiov_advance() in vringh_iov_xfer()", - "cmt_id": "0bf2b9c2f3545ffce5720de61c33fc171c0e480a" - } - }, - "6.5.8": { - "CVE-2023-5633": { - "cmt_msg": "drm/vmwgfx: Keep a gem reference to user bos in surfaces", - "cmt_id": "1474b39f961703d0bb33833a6d6b112826839781" + "CVE-2020-0433": { + "cmt_msg": "blk-mq: sync the update nr_hw_queues with blk_mq_queue_tag_busy_iter" }, - "CVE-2023-35827": { - "cmt_msg": "ravb: Fix use-after-free issue in ravb_tx_timeout_work()", - "cmt_id": "105abd68ad8f781985113aee2e92e0702b133705" - } - }, - "6.5.9": { - "CVE-2023-46813": { - "cmt_msg": "x86/sev: Check for user-space IOIO pointing to kernel space", - "cmt_id": "11b975cb82cc6d88e8b04f77a673077ac5c30c8b" + "CVE-2020-0431": { + "cmt_msg": "HID: hid-input: clear unmapped usages" }, - "CVE-2023-5717": { - "cmt_msg": "perf: Disallow mis-matched inherited group reads", - "cmt_id": "20f925d38e1ecc1d36ee6bf6e325fb514a6f727d" + "CVE-2023-6915": { + "cmt_msg": "ida: Fix crash in ida_free when the bitmap is empty" }, - "CVE-2023-46343": { - "cmt_msg": "nfc: nci: fix possible NULL pointer dereference in send_acknowledge()", - "cmt_id": "bb6cacc439ddd2cd51227ab193f4f91cfc7f014f" + "CVE-2023-1249": { + "cmt_msg": "coredump: Use the vma snapshot in fill_files_note" }, - "CVE-2023-5090": { - "cmt_msg": "x86: KVM: SVM: always update the x2avic msr interception", - "cmt_id": "94805f9d3a3fb1f091bcc08b9c4846c4346706eb" + "CVE-2021-3483": { + "cmt_msg": "firewire: nosy: Fix a use-after-free bug in nosy_ioctl()" }, - "CVE-2023-5972": { - "cmt_msg": "nf_tables: fix NULL pointer dereference in nft_expr_inner_parse()", - "cmt_id": "8a544721329e711f85358f73fe56964cdedeb531" - } - }, - "6.5.10": { - "CVE-2023-46862": { - "cmt_msg": "io_uring/fdinfo: lock SQ thread while retrieving thread cpu/pid", - "cmt_id": "56e08ccc969796168f0e6adf6642f8546f54ba6f" - } - }, - "6.5.13": { - "CVE-2024-0607": { - "cmt_msg": "netfilter: nf_tables: fix pointer math issue in nft_byteorder_eval()", - "cmt_id": "1a605657adc58b3c8e2c1c66aaa5fecd29072135" - } - }, - "outstanding": { - "CVE-2020-26556": { - "cmt_msg": "" + "CVE-2017-16913": { + "cmt_msg": "usbip: fix stub_rx: harden CMD_SUBMIT path to handle malicious input" }, - "CVE-2020-26557": { - "cmt_msg": "" + "CVE-2017-16912": { + "cmt_msg": "usbip: fix stub_rx: get_pipe() to validate endpoint number" }, - "CVE-2019-20794": { - "cmt_msg": "" + "CVE-2017-16911": { + "cmt_msg": "usbip: prevent vhci_hcd driver from leaking a socket pointer address" }, - "CVE-2020-26559": { - "cmt_msg": "" + "CVE-2017-16914": { + "cmt_msg": "usbip: fix stub_send_ret_submit() vulnerability to null transfer_buffer" }, - "CVE-2020-35501": { - "cmt_msg": "" + "CVE-2020-36691": { + "cmt_msg": "netlink: limit recursion depth in policy validation" }, - "CVE-2023-4010": { - "cmt_msg": "" + "CVE-2023-42755": { + "cmt_msg": "net/sched: Retire rsvp classifier" }, - "CVE-2023-51779": { - "cmt_msg": "Bluetooth: af_bluetooth: Fix Use-After-Free in bt_sock_recvmsg" + "CVE-2023-42752": { + "cmt_msg": "igmp: limit igmpv3_newpack() packet size to IP_MAX_MTU" }, - "CVE-2023-52458": { - "cmt_msg": "block: add check that partition length needs to be aligned with block size" + "CVE-2021-3573": { + "cmt_msg": "Bluetooth: use correct lock to prevent UAF of hdev object" }, - "CVE-2023-52457": { - "cmt_msg": "serial: 8250: omap: Don't skip resource freeing if pm_runtime_resume_and_get() failed" + "CVE-2022-1974": { + "cmt_msg": "nfc: replace improper check device_is_registered() in netlink related functions" }, - "CVE-2018-1121": { - "cmt_msg": "" + "CVE-2022-1975": { + "cmt_msg": "NFC: netlink: fix sleep in atomic bug when firmware download timeout" }, - "CVE-2023-52455": { - "cmt_msg": "iommu: Don't reserve 0-length IOVA region" + "CVE-2023-1380": { + "cmt_msg": "wifi: brcmfmac: slab-out-of-bounds read in brcmf_get_assoc_ies()" }, - "CVE-2023-52454": { - "cmt_msg": "nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length" + "CVE-2018-12130": { + "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" }, - "CVE-2023-52453": { - "cmt_msg": "hisi_acc_vfio_pci: Update migration data pointer correctly on saving/resume" + "CVE-2022-32981": { + "cmt_msg": "powerpc/32: Fix overread/overwrite of thread_struct via ptrace" }, - "CVE-2023-52452": { - "cmt_msg": "bpf: Fix accesses to uninit stack slots" + "CVE-2018-13405": { + "cmt_msg": "Fix up non-directory creation in SGID directories" }, - "CVE-2023-52451": { - "cmt_msg": "powerpc/pseries/memhp: Fix access beyond end of drmem array" + "CVE-2018-13406": { + "cmt_msg": "video: uvesafb: Fix integer overflow in allocation" }, - "CVE-2023-52450": { - "cmt_msg": "perf/x86/intel/uncore: Fix NULL pointer dereference issue in upi_fill_topology()" + "CVE-2020-11668": { + "cmt_msg": "media: xirlink_cit: add missing descriptor sanity checks" }, - "CVE-2019-19378": { - "cmt_msg": "" + "CVE-2020-11669": { + "cmt_msg": "powerpc/powernv/idle: Restore AMR/UAMOR/AMOR after idle" }, - "CVE-2024-1085": { - "cmt_msg": "netfilter: nf_tables: check if catch-all set element is active in next generation" + "CVE-2019-14901": { + "cmt_msg": "mwifiex: Fix heap overflow in mmwifiex_process_tdls_action_frame()" }, - "CVE-2024-1086": { - "cmt_msg": "netfilter: nf_tables: reject QUEUE/DROP verdict parameters" + "CVE-2020-8694": { + "cmt_msg": "powercap: restrict energy meter to root access" }, - "CVE-2024-0646": { - "cmt_msg": "net: tls, update curr on splice as well" + "CVE-2021-3715": { + "cmt_msg": "net_sched: cls_route: remove the right filter from hashtable" }, - "CVE-2024-22386": { + "CVE-2021-3714": { "cmt_msg": "" }, - "CVE-2024-25744": { - "cmt_msg": "x86/coco: Disable 32-bit emulation by default on TDX and SEV" + "CVE-2019-16230": { + "cmt_msg": "drm/amdkfd: fix a potential NULL pointer dereference (v2)" }, - "CVE-2020-24503": { - "cmt_msg": "" + "CVE-2019-16231": { + "cmt_msg": "fjes: Handle workqueue allocation failure" }, - "CVE-2020-24502": { - "cmt_msg": "" + "CVE-2019-16232": { + "cmt_msg": "libertas: fix a potential NULL pointer dereference" }, - "CVE-2023-6240": { - "cmt_msg": "" + "CVE-2019-16233": { + "cmt_msg": "scsi: qla2xxx: fix a potential NULL pointer dereference" }, - "CVE-2024-22705": { - "cmt_msg": "ksmbd: fix slab-out-of-bounds in smb_strndup_from_utf16()" + "CVE-2019-16234": { + "cmt_msg": "iwlwifi: pcie: fix rb_allocator workqueue allocation" }, - "CVE-2023-6610": { - "cmt_msg": "smb: client: fix potential OOB in smb2_dump_detail()" + "CVE-2019-6133": { + "cmt_msg": "fork: record start_time late" }, - "CVE-2020-11725": { - "cmt_msg": "" + "CVE-2021-39633": { + "cmt_msg": "ip_gre: add validation for csum_start" }, - "CVE-2022-23825": { - "cmt_msg": "" + "CVE-2017-18203": { + "cmt_msg": "dm: fix race between dm_get_from_kobject() and __dm_destroy()" }, - "CVE-2023-3397": { - "cmt_msg": "" + "CVE-2021-39636": { + "cmt_msg": "netfilter: x_tables: fix pointer leaks to userspace" }, - "CVE-2024-0584": { - "cmt_msg": "ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet" + "CVE-2017-18204": { + "cmt_msg": "ocfs2: should wait dio before inode lock in ocfs2_setattr()" }, - "CVE-2023-1476": { - "cmt_msg": "" + "CVE-2021-39634": { + "cmt_msg": "epoll: do not insert into poll queues until all sanity checks are done" }, - "CVE-2021-3864": { - "cmt_msg": "" + "CVE-2022-33742": { + "cmt_msg": "xen/blkfront: force data bouncing when backend is untrusted" }, - "CVE-2022-3606": { - "cmt_msg": "" + "CVE-2022-33741": { + "cmt_msg": "xen/netfront: force data bouncing when backend is untrusted" }, - "CVE-2019-19814": { - "cmt_msg": "" + "CVE-2022-33740": { + "cmt_msg": "xen/netfront: fix leaking data in shared pages" }, - "CVE-2022-2209": { - "cmt_msg": "" + "CVE-2022-33744": { + "cmt_msg": "xen/arm: Fix race in RB-tree based P2M accounting" }, - "CVE-2024-0582": { - "cmt_msg": "io_uring/kbuf: defer release of mapped buffer rings" + "CVE-2023-52596": { + "cmt_msg": "sysctl: Fix out of bounds access for empty sysctl registers" }, - "CVE-2023-52463": { - "cmt_msg": "efivarfs: force RO when remounting if SetVariable is not supported" + "CVE-2023-52597": { + "cmt_msg": "KVM: s390: fix setting of fpc register" }, - "CVE-2023-7042": { - "cmt_msg": "" + "CVE-2023-52594": { + "cmt_msg": "wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus()" }, - "CVE-2021-26934": { - "cmt_msg": "" + "CVE-2023-52595": { + "cmt_msg": "wifi: rt2x00: restart beacon queue when hardware reset" }, - "CVE-2023-47233": { - "cmt_msg": "" + "CVE-2023-52593": { + "cmt_msg": "wifi: wfx: fix possible NULL pointer dereference in wfx_set_mfp_ap()" }, - "CVE-2024-23850": { - "cmt_msg": "btrfs: do not ASSERT() if the newly created subvolume already got read" + "CVE-2023-52590": { + "cmt_msg": "ocfs2: Avoid touching renamed directory if parent does not change" }, - "CVE-2024-23851": { - "cmt_msg": "dm: limit the number of targets and parameter size area" + "CVE-2023-52591": { + "cmt_msg": "reiserfs: Avoid touching renamed directory if parent does not change" }, - "CVE-2016-8660": { - "cmt_msg": "" + "CVE-2023-52598": { + "cmt_msg": "s390/ptrace: handle setting of fpc register correctly" }, - "CVE-2023-6270": { - "cmt_msg": "" + "CVE-2023-52599": { + "cmt_msg": "jfs: fix array-index-out-of-bounds in diNewExt" }, - "CVE-2024-26594": { - "cmt_msg": "ksmbd: validate mech token in session setup" + "CVE-2021-0447": { + "cmt_msg": "l2tp: protect sock pointer of struct pppol2tp_session with RCU" }, - "CVE-2024-26592": { - "cmt_msg": "ksmbd: fix UAF issue in ksmbd_tcp_new_connection()" + "CVE-2022-23222": { + "cmt_msg": "bpf: Replace PTR_TO_XXX_OR_NULL with PTR_TO_XXX | PTR_MAYBE_NULL" }, - "CVE-2024-26593": { - "cmt_msg": "i2c: i801: Fix block process call transactions" + "CVE-2021-0448": { + "cmt_msg": "netfilter: ctnetlink: add a range check for l3/l4 protonum" }, - "CVE-2024-26590": { - "cmt_msg": "erofs: fix inconsistent per-file compression format" + "CVE-2017-12762": { + "cmt_msg": "isdn/i4l: fix buffer overflow" }, - "CVE-2024-26591": { - "cmt_msg": "bpf: Fix re-attachment branch in bpf_tracing_prog_attach" + "CVE-2022-41849": { + "cmt_msg": "fbdev: smscufx: Fix use-after-free in ufx_ops_open()" }, - "CVE-2020-15802": { + "CVE-2022-41848": { "cmt_msg": "" }, - "CVE-2024-26597": { - "cmt_msg": "net: qualcomm: rmnet: fix global oob in rmnet_policy" + "CVE-2023-6356": { + "cmt_msg": "nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length" }, - "CVE-2008-2544": { - "cmt_msg": "" + "CVE-2022-1353": { + "cmt_msg": "af_key: add __GFP_ZERO flag for compose_sadb_supported in function pfkey_register" }, - "CVE-2024-26595": { - "cmt_msg": "mlxsw: spectrum_acl_tcam: Fix NULL pointer dereference in error path" + "CVE-2022-1198": { + "cmt_msg": "drivers: hamradio: 6pack: fix UAF bug caused by mod_timer()" }, - "CVE-2024-26598": { - "cmt_msg": "KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache" + "CVE-2022-1199": { + "cmt_msg": "ax25: Fix NULL pointer dereference in ax25_kill_by_device" }, - "CVE-2024-26599": { - "cmt_msg": "pwm: Fix out-of-bounds access in of_pwm_single_xlate()" + "CVE-2022-1195": { + "cmt_msg": "hamradio: improve the incomplete fix to avoid NPD" }, - "CVE-2023-52439": { - "cmt_msg": "uio: Fix use-after-free in uio_open" + "CVE-2023-2124": { + "cmt_msg": "xfs: verify buffer contents when we skip log replay" }, - "CVE-2023-52438": { - "cmt_msg": "binder: fix use-after-free in shinker's callback" + "CVE-2019-15505": { + "cmt_msg": "media: technisat-usb2: break out of loop at end of buffer" }, - "CVE-2023-6356": { - "cmt_msg": "" + "CVE-2022-27672": { + "cmt_msg": "x86/speculation: Identify processors vulnerable to SMT RSB predictions" }, - "CVE-2024-26582": { - "cmt_msg": "net: tls: fix use-after-free with partial reads and async decrypt" + "CVE-2023-52508": { + "cmt_msg": "nvme-fc: Prevent null pointer dereference in nvme_fc_io_getuuid()" }, - "CVE-2023-52456": { - "cmt_msg": "serial: imx: fix tx statemachine deadlock" + "CVE-2022-1280": { + "cmt_msg": "drm: avoid circular locks in drm_mode_getconnector" }, - "CVE-2019-15239": { - "cmt_msg": "unknown" + "CVE-2018-10880": { + "cmt_msg": "ext4: never move the system.data xattr out of the inode body" }, - "CVE-2007-3719": { - "cmt_msg": "" + "CVE-2018-10881": { + "cmt_msg": "ext4: clear i_data in ext4_inode_info when removing inline data" }, - "CVE-2023-52434": { - "cmt_msg": "smb: client: fix potential OOBs in smb2_parse_contexts()" + "CVE-2024-26713": { + "cmt_msg": "powerpc/pseries/iommu: Fix iommu initialisation during DLPAR add" + } + } + }, + "4.4": { + "4.4": { + "CVE-2016-2070": { + "cmt_msg": "tcp: fix zero cwnd in tcp_cwnd_reduction", + "cmt_id": "8b8a321ff72c785ed5e8b4cf6eda20b35d427390" }, - "CVE-2023-52436": { - "cmt_msg": "f2fs: explicitly null-terminate the xattr list" + "CVE-2015-8963": { + "cmt_msg": "perf: Fix race in swevent hash", + "cmt_id": "12ca6ad2e3a896256f086497a7c7406a547ee373" + } + }, + "4.4.1": { + "CVE-2016-0728": { + "cmt_msg": "KEYS: Fix keyring ref leak in join_session_keyring()", + "cmt_id": "e4a46f02b1d0eaadea4e6b00e29922cd00d6de53" }, - "CVE-2023-20941": { - "cmt_msg": "" + "CVE-2016-2069": { + "cmt_msg": "x86/mm: Add barriers and document switch_mm()-vs-flush synchronization", + "cmt_id": "43a2ba8c1a003c82d9f411af8ebcf0fe1e4cbe3e" }, - "CVE-2024-26586": { - "cmt_msg": "mlxsw: spectrum_acl_tcam: Fix stack corruption" + "CVE-2016-2545": { + "cmt_msg": "ALSA: timer: Fix double unlink of active_list", + "cmt_id": "3c0e535fee2e67d06220e676cbf7b69099d741ce" }, - "CVE-2023-21400": { - "cmt_msg": "" + "CVE-2016-2544": { + "cmt_msg": "ALSA: seq: Fix race at timer setup and close", + "cmt_id": "0058ede73e1f441c003666f61671dfddfcbd5811" }, - "CVE-2024-26589": { - "cmt_msg": "bpf: Reject variable offset alu on PTR_TO_FLOW_KEYS" + "CVE-2016-2547": { + "cmt_msg": "ALSA: timer: Harden slave timer list handling", + "cmt_id": "8eff3aa0a9bbb593dce0ec0344ec1961318e44c8" }, - "CVE-2023-2640": { - "cmt_msg": "" + "CVE-2016-2546": { + "cmt_msg": "ALSA: timer: Fix race among timer ioctls", + "cmt_id": "d87622a1662af5782c94b88a613c09de0bde5288" }, - "CVE-2023-6915": { - "cmt_msg": "ida: Fix crash in ida_free when the bitmap is empty" + "CVE-2016-2543": { + "cmt_msg": "ALSA: seq: Fix missing NULL check at remove_events ioctl", + "cmt_id": "36d3fc15f50c22bbddfceb6c585f851130fb005f" }, - "CVE-2010-4563": { - "cmt_msg": "" + "CVE-2013-4312": { + "cmt_msg": "unix: properly account for FDs passed over unix sockets", + "cmt_id": "5e226f9689d90ad8ab21b4a969ae3058777f0aff" }, - "CVE-2020-26140": { - "cmt_msg": "" + "CVE-2016-2549": { + "cmt_msg": "ALSA: hrtimer: Fix stall by hrtimer_cancel()", + "cmt_id": "dafa57ee81748f6a6950c06f19a160d0a209795e" }, - "CVE-2020-26143": { - "cmt_msg": "" + "CVE-2016-2548": { + "cmt_msg": "ALSA: timer: Harden slave timer list handling", + "cmt_id": "8eff3aa0a9bbb593dce0ec0344ec1961318e44c8" + } + }, + "4.4.2": { + "CVE-2016-2782": { + "cmt_msg": "USB: visor: fix null-deref at probe", + "cmt_id": "ee4207bda5e15d0eecb834c4fc39c6069487279d" }, - "CVE-2020-26142": { - "cmt_msg": "" + "CVE-2016-2384": { + "cmt_msg": "ALSA: usb-audio: avoid freeing umidi object twice", + "cmt_id": "fbb430c51d7ac989b79bf1adb40cce7af581682a" }, - "CVE-2024-23849": { - "cmt_msg": "net/rds: Fix UBSAN: array-index-out-of-bounds in rds_cmsg_recv" + "CVE-2016-2085": { + "cmt_msg": "EVM: Use crypto_memneq() for digest comparisons", + "cmt_id": "8592536bcfcbc717a3bf7cec57d7c1b38f4eec1d" }, - "CVE-2024-23848": { - "cmt_msg": "" + "CVE-2016-0723": { + "cmt_msg": "tty: Fix unsafe ldisc reference via ioctl(TIOCGETD)", + "cmt_id": "d343601a19410f71bf1765df5e2edda66fe5de5f" }, - "CVE-2023-46838": { - "cmt_msg": "xen-netback: don't produce zero-size SKB frags" + "CVE-2017-13215": { + "cmt_msg": "crypto: algif_skcipher - Load TX SG list after waiting", + "cmt_id": "fec8beab63283003b546f83eebbbe32efb9acc53" }, - "CVE-2024-26581": { - "cmt_msg": "netfilter: nft_set_rbtree: skip end interval element from gc" + "CVE-2017-13167": { + "cmt_msg": "ALSA: timer: Fix race at concurrent reads", + "cmt_id": "925249d5172a31d7d430fdf364fc9229223c7942" }, - "CVE-2024-26583": { - "cmt_msg": "tls: fix race between async notify and socket close" + "CVE-2015-7566": { + "cmt_msg": "USB: serial: visor: fix crash on detecting device without write_urbs", + "cmt_id": "2dc803d0740f0c493a7db8a1baf6514d5b95b6a3" }, - "CVE-2022-3533": { - "cmt_msg": "" + "CVE-2015-8970": { + "cmt_msg": "crypto: algif_skcipher - Require setkey before accept(2)", + "cmt_id": "b238717c0bb4606e2e36fc0de745306b0c900d83" + } + }, + "4.4.3": { + "CVE-2016-0617": { + "cmt_msg": "fs/hugetlbfs/inode.c: fix bugs in hugetlb_vmtruncate_list()", + "cmt_id": "db33368ca32dd307cdcc191361de34f3937f513a" }, - "CVE-2024-26585": { - "cmt_msg": "tls: fix race between tx work scheduling and socket close" + "CVE-2016-1575": { + "cmt_msg": "ovl: setattr: check permissions before copy-up", + "cmt_id": "8373f6590f6b371bff2c5f2c0581548eb0192014" }, - "CVE-2024-26584": { - "cmt_msg": "net: tls: handle backlogging of crypto requests" + "CVE-2016-1576": { + "cmt_msg": "ovl: setattr: check permissions before copy-up", + "cmt_id": "8373f6590f6b371bff2c5f2c0581548eb0192014" + } + }, + "4.4.4": { + "CVE-2016-2383": { + "cmt_msg": "bpf: fix branch offset adjustment on backjumps after patching ctx expansion", + "cmt_id": "a34f2f9f2034f7984f9529002c6fffe9cb63189d" }, - "CVE-2024-26587": { - "cmt_msg": "net: netdevsim: don't try to destroy PHC on VFs" + "CVE-2021-20265": { + "cmt_msg": "af_unix: fix struct pid memory leak", + "cmt_id": "39770be4d6ad29c5ab1f21edbbf01db067f13b52" }, - "CVE-2022-1247": { - "cmt_msg": "" + "CVE-2015-8812": { + "cmt_msg": "iw_cxgb3: Fix incorrectly returning error on success", + "cmt_id": "64fb3e29bf47e5db029b81fc99ac40f6cd2620ac" + } + }, + "4.4.6": { + "CVE-2016-2143": { + "cmt_msg": "s390/mm: four page table levels vs. fork", + "cmt_id": "5833fac3b88d39b39402309399e8b0aaa54e5f75" }, - "CVE-2023-51782": { - "cmt_msg": "net/rose: Fix Use-After-Free in rose_ioctl" + "CVE-2016-3044": { + "cmt_msg": "KVM: PPC: Book3S HV: Sanitize special-purpose register values on guest exit", + "cmt_id": "1c463a390a89beb929ed2750c79d6eb6d06c7cdd" + } + }, + "4.4.7": { + "CVE-2016-3137": { + "cmt_msg": "USB: cypress_m8: add endpoint sanity check", + "cmt_id": "ca76906a7753052b00e491ba017393f9071b0406" }, - "CVE-2024-26588": { - "cmt_msg": "LoongArch: BPF: Prevent out-of-bounds memory access" + "CVE-2016-3157": { + "cmt_msg": "x86/iopl/64: Properly context-switch IOPL on Xen PV", + "cmt_id": "0f63ab5873ed78838afa4b2f8bfd9d18f806cf40" }, - "CVE-2023-51780": { - "cmt_msg": "atm: Fix Use-After-Free in do_vcc_ioctl" + "CVE-2016-3689": { + "cmt_msg": "Input: ims-pcu - sanity check against missing interfaces", + "cmt_id": "af18c4ca4b1728e2149844656bbf1aa8d7382682" }, - "CVE-2023-51781": { - "cmt_msg": "appletalk: Fix Use-After-Free in atalk_ioctl" + "CVE-2016-9685": { + "cmt_msg": "xfs: fix two memory leaks in xfs_attr_list.c error paths", + "cmt_id": "b34291f71d0fb3d09728fd43d6da350ff6a179d6" }, - "CVE-2020-10708": { - "cmt_msg": "" + "CVE-2016-3140": { + "cmt_msg": "USB: digi_acceleport: do sanity checking for the number of ports", + "cmt_id": "4f6ad5b0d28c84030693fe21b308c0b711fa66f6" }, - "CVE-2023-6121": { - "cmt_msg": "nvmet: nul-terminate the NQNs passed in the connect command" + "CVE-2016-3136": { + "cmt_msg": "USB: mct_u232: add sanity checking in probe", + "cmt_id": "9deac9454b7a5643a09829f4731276cea6697b72" }, - "CVE-2022-4543": { - "cmt_msg": "" + "CVE-2016-2185": { + "cmt_msg": "Input: ati_remote2 - fix crashes on detecting device with invalid descriptor", + "cmt_id": "a1d0a23831ccde9dbd5279a5d45790a96f18ad32" }, - "CVE-2017-13693": { - "cmt_msg": "" + "CVE-2016-2184": { + "cmt_msg": "ALSA: usb-audio: Fix NULL dereference in create_fixed_stream_quirk()", + "cmt_id": "57f6ad5f1580a5a06c573fb15ed6dcf701e037f6" }, - "CVE-2021-0399": { - "cmt_msg": "" + "CVE-2016-6327": { + "cmt_msg": "IB/srpt: Simplify srpt_handle_tsk_mgmt()", + "cmt_id": "84512e476ce92fbdb60d4687e3ea230dbf0655c8" }, - "CVE-2017-13694": { - "cmt_msg": "" + "CVE-2016-2186": { + "cmt_msg": "Input: powermate - fix oops with malicious USB descriptors", + "cmt_id": "fbd40d7beef0b17624bc1f838f4d44dfa4b0326b" }, - "CVE-2024-0564": { - "cmt_msg": "" + "CVE-2016-3138": { + "cmt_msg": "USB: cdc-acm: more sanity checking", + "cmt_id": "1ea680abf7640c777396909102bc22915107cb5b" + } + }, + "4.4.8": { + "CVE-2016-7117": { + "cmt_msg": "net: Fix use after free in the recvmmsg exit path", + "cmt_id": "405f10a39443ae9ccacf51f18511dfc827e09108" }, - "CVE-2012-4542": { - "cmt_msg": "" + "CVE-2016-3156": { + "cmt_msg": "ipv4: Don't do expensive useless work during inetdev destroy.", + "cmt_id": "54789759917f127cfadcca730f44ea67d557a9b0" }, - "CVE-2013-7445": { - "cmt_msg": "" + "CVE-2016-4805": { + "cmt_msg": "ppp: take reference on channels netns", + "cmt_id": "046ea8180ecaf5d8b5823e17714a09526ad7d321" + } + }, + "4.4.9": { + "CVE-2016-4568": { + "cmt_msg": "videobuf2-v4l2: Verify planes array in buffer dequeueing", + "cmt_id": "19a4e46b4513bab7d6b368175be2e24ad4665e5a" }, - "CVE-2024-24859": { - "cmt_msg": "" + "CVE-2016-7914": { + "cmt_msg": "assoc_array: don't call compare_object() on a node", + "cmt_id": "6905c7a4aa1ef675825bc2ab56fd965a573ffb74" }, - "CVE-2024-24858": { - "cmt_msg": "" + "CVE-2016-3955": { + "cmt_msg": "USB: usbip: fix potential out-of-bounds write", + "cmt_id": "4a1bb501e4b65908b102f0b371b0621ff18ad5c3" }, - "CVE-2005-3660": { - "cmt_msg": "" + "CVE-2016-7912": { + "cmt_msg": "usb: gadget: f_fs: Fix use-after-free", + "cmt_id": "e4c7ab76586146820b394e0176f286f5a2e70cb3" }, - "CVE-2024-24857": { - "cmt_msg": "" + "CVE-2016-4565": { + "cmt_msg": "IB/security: Restrict use of the write() interface", + "cmt_id": "c92003c18feb8159cbf64bc0afa7b048869fe3c6" }, - "CVE-2023-6238": { - "cmt_msg": "" + "CVE-2016-2187": { + "cmt_msg": "Input: gtco - fix crash on detecting device without endpoints", + "cmt_id": "197b6c5f0d976420c3eeacc7589ebc5869d2d70f" }, - "CVE-2023-31083": { - "cmt_msg": "Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO" + "CVE-2015-8839": { + "cmt_msg": "ext4: fix races between page faults and hole punching", + "cmt_id": "0b680de452570274716c2c9990903acea525f0d0" }, - "CVE-2023-31082": { - "cmt_msg": "" + "CVE-2016-3961": { + "cmt_msg": "x86/mm/xen: Suppress hugetlbfs in PV guests", + "cmt_id": "27b3cc048a5275c53e26c15ffcab3fcf9a03cda0" + } + }, + "4.4.10": { + "CVE-2016-7916": { + "cmt_msg": "proc: prevent accessing /proc//environ until it's ready", + "cmt_id": "898149d10b855a0d0a5a9f8f05e4359970919eb9" }, - "CVE-2023-31081": { - "cmt_msg": "" + "CVE-2016-4581": { + "cmt_msg": "propogate_mnt: Handle the first propogated copy being a slave", + "cmt_id": "b17580a3cb901c56e9b9a3dea4d12153f5fc879e" + } + }, + "4.4.11": { + "CVE-2016-6198": { + "cmt_msg": "vfs: add vfs_select_inode() helper", + "cmt_id": "b0dac61d2454b392dbdb4ad565f9dc3dc76fce96" }, - "CVE-2022-38096": { - "cmt_msg": "" + "CVE-2016-4557": { + "cmt_msg": "bpf: fix double-fdput in replace_map_fd_with_map_ptr()", + "cmt_id": "608d2c3c7a046c222cae2e857cf648a9f89e772b" }, - "CVE-2022-3544": { - "cmt_msg": "" + "CVE-2016-4580": { + "cmt_msg": "net: fix a kernel infoleak in x25 module", + "cmt_id": "83857201758ead21e19e36d9ab5b2f87be03dfe2" }, - "CVE-2024-1151": { - "cmt_msg": "net: openvswitch: limit the number of recursions from action sets" + "CVE-2016-4486": { + "cmt_msg": "net: fix infoleak in rtnetlink", + "cmt_id": "e0c0313681aaa0c4514c6794635aba82691d2154" }, - "CVE-2023-6606": { - "cmt_msg": "smb: client: fix OOB in smbCalcSize()" + "CVE-2016-2117": { + "cmt_msg": "atl2: Disable unimplemented scatter/gather feature", + "cmt_id": "b5c9a73c501e8aed86dd578309813c7818ca248c" }, - "CVE-2024-23307": { - "cmt_msg": "" + "CVE-2016-4485": { + "cmt_msg": "net: fix infoleak in llc", + "cmt_id": "52f307b18b1f070f0442fc98515575616b21fa20" }, - "CVE-2022-3238": { - "cmt_msg": "" + "CVE-2016-4558": { + "cmt_msg": "bpf: fix refcnt overflow", + "cmt_id": "3899251bdb9c2b31fc73d4cc132f52d3710101de" }, - "CVE-2008-4609": { - "cmt_msg": "" + "CVE-2016-4913": { + "cmt_msg": "get_rock_ridge_filename(): handle malformed NM entries", + "cmt_id": "007796c01f0b293c68585397211af2b390bf126d" + } + }, + "4.4.12": { + "CVE-2016-3713": { + "cmt_msg": "KVM: MTRR: remove MSR 0x2f8", + "cmt_id": "1716643bc4725bb92a1f527f759a93e37a2bc1f0" }, - "CVE-2020-14304": { - "cmt_msg": "" + "CVE-2016-9754": { + "cmt_msg": "ring-buffer: Prevent overflow of size in ring_buffer_resize()", + "cmt_id": "f199023137853eb1d46e8b7ebc274b29ba99028c" }, - "CVE-2023-6931": { - "cmt_msg": "perf: Fix perf_event_validate_size()" + "CVE-2019-3901": { + "cmt_msg": "perf/core: Fix perf_event_open() vs. execve() race", + "cmt_id": "c5174678e2e5bd691da58a116fbc123c6fbc7b2c" + } + }, + "4.4.13": { + "CVE-2016-2847": { + "cmt_msg": "pipe: limit the per-user amount of pages allocated in pipes", + "cmt_id": "fa6d0ba12a8eb6a2e9a1646c5816da307c1f93a7" + } + }, + "4.4.14": { + "CVE-2016-4951": { + "cmt_msg": "tipc: check nl sock before parsing nested attributes", + "cmt_id": "23cdd8c3cbe9d790f23d7f9ae14e9b828f56f69c" }, - "CVE-2023-6932": { - "cmt_msg": "ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet" + "CVE-2016-4997": { + "cmt_msg": "netfilter: x_tables: check for bogus target offset", + "cmt_id": "8a865621540c7bc7f03665a2b7029cb444a9593a" }, - "CVE-2020-0347": { - "cmt_msg": "" + "CVE-2016-4998": { + "cmt_msg": "netfilter: x_tables: check for bogus target offset", + "cmt_id": "8a865621540c7bc7f03665a2b7029cb444a9593a" }, - "CVE-2024-0193": { - "cmt_msg": "netfilter: nf_tables: skip set commit for deleted/destroyed sets" + "CVE-2016-3134": { + "cmt_msg": "netfilter: x_tables: fix unconditional helper", + "cmt_id": "5ebdccd7685f1c0b451c516f99082642d8d49003" }, - "CVE-2021-3714": { - "cmt_msg": "" + "CVE-2016-9806": { + "cmt_msg": "netlink: Fix dump skb leak/double free", + "cmt_id": "49543942beb1b9ca95709d6cfa67708932aa4d11" }, - "CVE-2019-12456": { - "cmt_msg": "" + "CVE-2016-1583": { + "cmt_msg": "proc: prevent stacking filesystems on top", + "cmt_id": "9beb96b344c846779f67d1be1cdafc66562b94ec" + } + }, + "4.4.16": { + "CVE-2016-4470": { + "cmt_msg": "KEYS: potential uninitialized variable", + "cmt_id": "398051f2f66ef4658c89388441d0c697d50c325c" }, - "CVE-2020-26560": { - "cmt_msg": "" + "CVE-2016-6197": { + "cmt_msg": "ovl: verify upper dentry before unlink and rename", + "cmt_id": "dbf72a4d4531e7e5fb28e76d902d66f05c1bfe12" }, - "CVE-2021-3892": { - "cmt_msg": "" + "CVE-2016-1237": { + "cmt_msg": "posix_acl: Add set_posix_acl", + "cmt_id": "c3fa141c1f288ac785c82ead9d06d1b5acd76d60" }, - "CVE-2024-0841": { - "cmt_msg": "" + "CVE-2016-4794": { + "cmt_msg": "percpu: fix synchronization between chunk->map_extend_work and chunk destruction", + "cmt_id": "c26ae537f16f653c2541df9e338013653fc3fcc7" }, - "CVE-2024-26596": { - "cmt_msg": "net: dsa: fix netdev_priv() dereference before check on non-DSA netdevice events" + "CVE-2016-5829": { + "cmt_msg": "HID: hiddev: validate num_values for HIDIOCGUSAGES, HIDIOCSUSAGES commands", + "cmt_id": "300851ff55f7777be2780207f1b60ad5e1fd1303" }, - "CVE-2024-24860": { - "cmt_msg": "Bluetooth: Fix atomicity violation in {min,max}_key_size_set" + "CVE-2016-5828": { + "cmt_msg": "powerpc/tm: Always reclaim in start_thread() for exec() class syscalls", + "cmt_id": "5a35d2f92f1011145315f86a481f4f3e3f853095" + } + }, + "4.4.17": { + "CVE-2016-6156": { + "cmt_msg": "platform/chrome: cros_ec_dev - double fetch bug in ioctl", + "cmt_id": "69ca969a2626dc4b3bb83b953c053a01e3b9f7e6" }, - "CVE-2024-24861": { - "cmt_msg": "" + "CVE-2016-7911": { + "cmt_msg": "block: fix use-after-free in sys_ioprio_get()", + "cmt_id": "5161144c3a9d6ea775b293edbb8523deaeff4442" }, - "CVE-2024-24864": { - "cmt_msg": "" + "CVE-2016-4569": { + "cmt_msg": "ALSA: timer: Fix leak in SNDRV_TIMER_IOCTL_PARAMS", + "cmt_id": "90bed827ea910f82ab17ee154f501b5ae71617e6" }, - "CVE-2023-37454": { - "cmt_msg": "" + "CVE-2016-5400": { + "cmt_msg": "media: fix airspy usb probe error path", + "cmt_id": "d863bec646a590584eabcb40550bff0708c26b0d" }, - "CVE-2023-50431": { - "cmt_msg": "accel/habanalabs: fix information leak in sec_attest_info()" + "CVE-2016-4578": { + "cmt_msg": "ALSA: timer: Fix leak in events via snd_timer_user_ccallback", + "cmt_id": "3e6af33c73fb7ec7be8dedd01047162ef64a26a5" + } + }, + "4.4.18": { + "CVE-2016-3672": { + "cmt_msg": "x86/mm/32: Enable full randomization on i386 and X86_32", + "cmt_id": "979a61a02992e2029fcedcdf32c05050aa652c9c" }, - "CVE-2022-3642": { - "cmt_msg": "" + "CVE-2016-5696": { + "cmt_msg": "tcp: make challenge acks less predictable", + "cmt_id": "72c2d3bccaba4a0a4de354f9d2d24eccd05bfccf" }, - "CVE-2023-52464": { - "cmt_msg": "EDAC/thunderx: Fix possible out-of-bounds string access" + "CVE-2016-3951": { + "cmt_msg": "cdc_ncm: do not call usbnet_link_change from cdc_ncm_bind", + "cmt_id": "66e5d7b47c864f1821041f77752930ec3b8dfc22" }, - "CVE-2023-52462": { - "cmt_msg": "bpf: fix check for attempt to corrupt spilled pointer" + "CVE-2017-7495": { + "cmt_msg": "ext4: fix data exposure after a crash", + "cmt_id": "5a7f477c725e866729307ff87011f8dd812a3cdf" }, - "CVE-2011-4917": { - "cmt_msg": "" + "CVE-2016-7910": { + "cmt_msg": "block: fix use-after-free in seq file", + "cmt_id": "9a95c0cfc6f21b9ac66269d4782ea5a0f58cdf91" }, - "CVE-2023-52447": { - "cmt_msg": "bpf: Defer the free of inner map when necessary" + "CVE-2016-3857": { + "cmt_msg": "arm: oabi compat: add missing access checks", + "cmt_id": "0107ea0e0928c8a077f0f912c809f2b86fa7496c" + } + }, + "4.4.19": { + "CVE-2016-5412": { + "cmt_msg": "KVM: PPC: Book3S HV: Pull out TM state save/restore into separate procedures", + "cmt_id": "e1a90eb8afa42b02f46897b881b9e19d3594159c" }, - "CVE-2019-15902": { - "cmt_msg": "unknown" + "CVE-2016-4482": { + "cmt_msg": "USB: usbfs: fix potential infoleak in devio", + "cmt_id": "4077ef4797a8ff007a2de091c9befee4882c4790" }, - "CVE-2024-25739": { - "cmt_msg": "" + "CVE-2016-6136": { + "cmt_msg": "audit: fix a double fetch in audit_log_single_execve_arg()", + "cmt_id": "53eaa3910ae67e497fb33188d515c14ed17a7a0e" + } + }, + "4.4.20": { + "CVE-2016-6480": { + "cmt_msg": "aacraid: Check size values after double-fetch from user", + "cmt_id": "e4878ef66e5b8d01d6734b1952f9abb3eeea454c" + } + }, + "4.4.21": { + "CVE-2016-10229": { + "cmt_msg": "udp: properly support MSG_PEEK with truncated buffers", + "cmt_id": "dfe2042d96065f044a794f684e9f7976a4ca6e24" }, - "CVE-2023-6531": { - "cmt_msg": "io_uring/af_unix: disable sending io_uring over sockets" + "CVE-2016-5244": { + "cmt_msg": "rds: fix an infoleak in rds_inc_info_copy", + "cmt_id": "ffd5ce2ad5fd140ddd492ab2064e29e86aaa64ea" }, - "CVE-2019-15290": { - "cmt_msg": "" + "CVE-2016-5243": { + "cmt_msg": "tipc: fix an infoleak in tipc_nl_compat_link_dump", + "cmt_id": "5fb71611925f734f7fe03a45527e14b296fd5167" }, - "CVE-2023-6535": { - "cmt_msg": "" + "CVE-2016-7915": { + "cmt_msg": "HID: core: prevent out-of-bound readings", + "cmt_id": "5349cdd3b49cea2d57dc05bbf3f313979751fed3" }, - "CVE-2023-6536": { - "cmt_msg": "" + "CVE-2016-3135": { + "cmt_msg": "netfilter: x_tables: check for size overflow", + "cmt_id": "cfd6e7fe434a378127e4964fc0b7ccf32ae2baed" }, - "CVE-2023-52446": { - "cmt_msg": "bpf: Fix a race condition between btf_put() and map_free()" + "CVE-2016-0758": { + "cmt_msg": "KEYS: Fix ASN.1 indefinite length object parsing", + "cmt_id": "5afbd223e60a130f66bddf7598165ebe2b51f8db" }, - "CVE-2023-6622": { - "cmt_msg": "netfilter: nf_tables: bail out on mismatching dynset and set expressions" + "CVE-2016-6130": { + "cmt_msg": "s390/sclp_ctl: fix potential information leak with /dev/sclp", + "cmt_id": "2d29d6cec3bc5473efdad3b143404d9e32817c86" + } + }, + "4.4.22": { + "CVE-2016-9178": { + "cmt_msg": "fix minor infoleak in get_user_ex()", + "cmt_id": "9d25c78ec01c402dc56272693c44ef9d72ecdd2e" }, - "CVE-2018-17977": { - "cmt_msg": "" + "CVE-2016-10318": { + "cmt_msg": "fscrypto: add authorization check for setting encryption policy", + "cmt_id": "8d693a2e67b5793ee58d106fded28902b7fd0f72" + } + }, + "4.4.23": { + "CVE-2016-6828": { + "cmt_msg": "tcp: fix use after free in tcp_xmit_retransmit_queue()", + "cmt_id": "0f55fa7541d7ff34a6690438bb00b78521b98b54" + } + }, + "4.4.24": { + "CVE-2017-15102": { + "cmt_msg": "usb: misc: legousbtower: Fix NULL pointer deference", + "cmt_id": "62dd9cf78b280c8cd08162f8c4a490fb76deeb23" }, - "CVE-2022-26878": { - "cmt_msg": "" + "CVE-2016-10044": { + "cmt_msg": "aio: mark AIO pseudo-fs noexec", + "cmt_id": "0d9529e1b881ae80b40270b55dcbf7468be0099c" + } + }, + "4.4.26": { + "CVE-2016-5195": { + "cmt_msg": "mm: remove gup_flags FOLL_WRITE games from __get_user_pages()", + "cmt_id": "1294d355881cc5c3421d24fee512f16974addb6c" + } + }, + "4.4.27": { + "CVE-2016-7425": { + "cmt_msg": "scsi: arcmsr: Buffer overflow in arcmsr_iop_message_xfer()", + "cmt_id": "24040922827859d1d69597c3bc0c31fad523fd21" + } + }, + "4.4.29": { + "CVE-2016-8666": { + "cmt_msg": "tunnels: Don't apply GRO to multiple layers of encapsulation.", + "cmt_id": "5699b3431e0b14736867484b8669ead2d40f575e" }, - "CVE-2022-41848": { - "cmt_msg": "" + "CVE-2016-8658": { + "cmt_msg": "brcmfmac: avoid potential stack overflow in brcmf_cfg80211_start_ap()", + "cmt_id": "b82a7f93b4e60d8689d8f4e687ef58ed2098739f" }, - "CVE-2022-1116": { - "cmt_msg": "" + "CVE-2016-9644": { + "cmt_msg": "x86/mm: Expand the exception table logic to allow new handling options", + "cmt_id": "fcf5e5198b447969ed2a56ec335dae3c695a6b46" }, - "CVE-2010-5321": { - "cmt_msg": "" + "CVE-2016-7097": { + "cmt_msg": "posix_acl: Clear SGID bit when setting file permissions", + "cmt_id": "57c9cfdb61ea270936fab76da99a742c6ef0b86f" + } + }, + "4.4.31": { + "CVE-2016-7042": { + "cmt_msg": "KEYS: Fix short sprintf buffer in /proc/keys show function", + "cmt_id": "940d7ecbc57c94d6cd174d9d3247e07fd1b1467d" }, - "CVE-2018-12930": { - "cmt_msg": "" + "CVE-2016-8633": { + "cmt_msg": "firewire: net: guard against rx buffer overflows", + "cmt_id": "46e14262a063714610b916404a20880fbd4cd0ce" }, - "CVE-2018-12931": { - "cmt_msg": "" + "CVE-2016-8630": { + "cmt_msg": "kvm: x86: Check memopp before dereference (CVE-2016-8630)", + "cmt_id": "91e1f7b0eb252ce8f88d69227ef5f52f9efb2aae" + } + }, + "4.4.32": { + "CVE-2016-7039": { + "cmt_msg": "net: add recursion limit to GRO", + "cmt_id": "3cb00b90e8b1bd59382f5e1304dd751f9674f027" }, - "CVE-2024-0565": { - "cmt_msg": "smb: client: fix OOB in receive_encrypted_standard()" + "CVE-2016-9555": { + "cmt_msg": "sctp: validate chunk len before actually using it", + "cmt_id": "bd891f40f04f8b96d9148ff8a5d538b60171409c" + } + }, + "4.4.34": { + "CVE-2015-8964": { + "cmt_msg": "tty: Prevent ldisc drivers from re-using stale tty fields", + "cmt_id": "4e772c53ab9836b083c21acf9d2d76805e1d133e" }, - "CVE-2024-23196": { - "cmt_msg": "" + "CVE-2016-8645": { + "cmt_msg": "tcp: take care of truncations done by sk_filter()", + "cmt_id": "225a24ae97331f3b9d97c1bb97b1e30b3633bcf4" + } + }, + "4.4.36": { + "CVE-2016-9756": { + "cmt_msg": "KVM: x86: drop error recovery in em_jmp_far and em_ret_far", + "cmt_id": "b7f9404d1b488b6773c7a2e6da92aa6cb5bd125e" }, - "CVE-2021-39801": { - "cmt_msg": "" + "CVE-2016-8650": { + "cmt_msg": "mpi: Fix NULL ptr dereference in mpi_powm()", + "cmt_id": "249090830942565fb0ce7c1e018d927a14282ead" + } + }, + "4.4.37": { + "CVE-2016-9794": { + "cmt_msg": "ALSA: pcm : Call kill_fasync() in stream lock", + "cmt_id": "58cebd1a08ed114e05cc9d16dee9e5423f564c82" + } + }, + "4.4.38": { + "CVE-2016-9793": { + "cmt_msg": "net: avoid signed overflows for SO_{SND|RCV}BUFFORCE", + "cmt_id": "77125815f058d587cac9217ac2c468038a7285c4" }, - "CVE-2021-39800": { - "cmt_msg": "" + "CVE-2016-10200": { + "cmt_msg": "l2tp: fix racy SOCK_ZAPPED flag check in l2tp_ip{,6}_bind()", + "cmt_id": "56366fa0ad46a59abe2460b8acb775f7f84fbf16" }, - "CVE-2024-22099": { - "cmt_msg": "" + "CVE-2016-8655": { + "cmt_msg": "packet: fix race condition in packet_set_ring", + "cmt_id": "5a01eaf19858278cc22525be118fe9c6a3c86e83" }, - "CVE-2022-45885": { - "cmt_msg": "" + "CVE-2016-8399": { + "cmt_msg": "net: ping: check minimum size on ICMP header length", + "cmt_id": "06cdad2b6d921dee33c8efc84922533dfb1458c6" + } + }, + "4.4.39": { + "CVE-2016-10147": { + "cmt_msg": "crypto: mcryptd - Check mcryptd algorithm compatibility", + "cmt_id": "9a3baed9103bc413a5e98e13e31cd8ae7c0b5563" + } + }, + "4.4.40": { + "CVE-2015-8709": { + "cmt_msg": "mm: Add a user_ns owner to mm_struct and fix ptrace permission checks", + "cmt_id": "03eed7afbc09e061f66b448daf7863174c3dc3f3" + } + }, + "4.4.41": { + "CVE-2016-9588": { + "cmt_msg": "kvm: nVMX: Allow L1 to intercept software exceptions (#BP and #OF)", + "cmt_id": "19aa9c14989e7a3fe04b444f146a05ff857b058e" }, - "CVE-2022-45884": { - "cmt_msg": "" + "CVE-2016-10088": { + "cmt_msg": "sg_write()/bsg_write() is not fit to be called under KERNEL_DS", + "cmt_id": "d85727365859108cbcf832c2b3c38358ddc7638b" + } + }, + "4.4.43": { + "CVE-2017-7273": { + "cmt_msg": "HID: hid-cypress: validate length of report", + "cmt_id": "a2f727149ee4e746da55d209a0179b68d31d3915" + } + }, + "4.4.44": { + "CVE-2017-2583": { + "cmt_msg": "KVM: x86: fix emulation of \"MOV SS, null selector\"", + "cmt_id": "816307c80d4ddad5414a05ff5861f063d29cda6f" }, - "CVE-2024-25740": { - "cmt_msg": "" + "CVE-2016-9191": { + "cmt_msg": "sysctl: Drop reference added by grab_header in proc_sys_readdir", + "cmt_id": "b9d6631395a1e25b210ce112b1bc10f3c665ea20" }, - "CVE-2024-25741": { - "cmt_msg": "" + "CVE-2017-5549": { + "cmt_msg": "USB: serial: kl5kusb105: fix line-state error handling", + "cmt_id": "3ef5bc0b385f81e88574c29a13edf80f092d515f" }, - "CVE-2024-21803": { - "cmt_msg": "" + "CVE-2017-2584": { + "cmt_msg": "KVM: x86: Introduce segmented_write_std", + "cmt_id": "9d3875c0c462808f4d59dfa18a79d4b5b235acbd" + } + }, + "4.4.45": { + "CVE-2017-5547": { + "cmt_msg": "HID: corsair: fix DMA buffers on stack", + "cmt_id": "0f37d20fdc70ee54f002bd77ce54a2a303ad0437" }, - "CVE-2023-52435": { - "cmt_msg": "net: prevent mss overflow in skb_segment()" + "CVE-2017-5551": { + "cmt_msg": "tmpfs: clear S_ISGID when setting posix ACLs", + "cmt_id": "36672b8b99e2cf2ab0587f08a19f394f8f65a861" + } + }, + "4.4.46": { + "CVE-2016-8405": { + "cmt_msg": "fbdev: color map copying bounds checking", + "cmt_id": "63db7c91a3c0ebe0e291feea53e4c63391db9465" + } + }, + "4.4.48": { + "CVE-2016-10208": { + "cmt_msg": "ext4: validate s_first_meta_bg at mount time", + "cmt_id": "e21a3cad35bc2f4c7fff317e2c7d38eed363a430" + } + }, + "4.4.49": { + "CVE-2017-2618": { + "cmt_msg": "selinux: fix off-by-one in setprocattr", + "cmt_id": "e72c13d93e9ed2b131ceb9a290ab056ce0dd41ab" + } + }, + "4.4.50": { + "CVE-2017-5986": { + "cmt_msg": "sctp: avoid BUG_ON on sctp_wait_for_sndbuf", + "cmt_id": "a4226c7ebfb5748447f1640c97f0306ed69e44f8" }, - "CVE-2021-3542": { - "cmt_msg": "" + "CVE-2017-5897": { + "cmt_msg": "ip6_gre: fix ip6gre_err() invalid reads", + "cmt_id": "eaa3a58f450383aaa8632eea23f2a70d85c55d9d" }, - "CVE-2023-6817": { - "cmt_msg": "netfilter: nft_set_pipapo: skip inactive elements during set walk" + "CVE-2017-6214": { + "cmt_msg": "tcp: avoid infinite loop in tcp_splice_read()", + "cmt_id": "82e9f6b90a0e7fbc017bdce23845c7580db6f657" }, - "CVE-2018-12929": { - "cmt_msg": "" + "CVE-2017-5970": { + "cmt_msg": "ipv4: keep skb->dst around in presence of IP options", + "cmt_id": "2d9c2e011fd3f1be4e5643d6ad186faa5e50d4d1" + } + }, + "4.4.52": { + "CVE-2017-6345": { + "cmt_msg": "net/llc: avoid BUG_ON() in skb_orphan()", + "cmt_id": "2b3eb43342a00d03e953208f45866925ca255e15" }, - "CVE-2018-12928": { - "cmt_msg": "" + "CVE-2017-6346": { + "cmt_msg": "packet: fix races in fanout_add()", + "cmt_id": "abd672deb170c4443e41173160de0ba2ae1abc08" }, - "CVE-2023-6560": { - "cmt_msg": "io_uring: don't allow discontig pages for IORING_SETUP_NO_MMAP" + "CVE-2017-6347": { + "cmt_msg": "ip: fix IP_CHECKSUM handling", + "cmt_id": "ce9ecb8d7f3c698c48b0885936d0b7275dacde9c" }, - "CVE-2020-25220": { - "cmt_msg": "" + "CVE-2017-6348": { + "cmt_msg": "irda: Fix lockdep annotations in hashbin_delete().", + "cmt_id": "353dd7290025bc33555282848ab015c1bbf21186" }, - "CVE-2015-2877": { - "cmt_msg": "" + "CVE-2017-6074": { + "cmt_msg": "dccp: fix freeing skb too early for IPV6_RECVPKTINFO", + "cmt_id": "a95df078e86624ee330e82aad34cfd3b5fcf21ce" + } + }, + "4.4.53": { + "CVE-2017-5669": { + "cmt_msg": "ipc/shm: Fix shmat mmap nil-page protection", + "cmt_id": "f0ae01568e0cf4b00071d1dfd27c90022c2b6d7e" + } + }, + "4.4.54": { + "CVE-2017-2636": { + "cmt_msg": "tty: n_hdlc: get rid of racy n_hdlc.tbuf", + "cmt_id": "999853d941b99ca2ac4a331552c388e2603a9b1d" + } + }, + "4.4.55": { + "CVE-2016-2188": { + "cmt_msg": "USB: iowarrior: fix NULL-deref at probe", + "cmt_id": "179295c38d23874357ca75af104fd6f1fe769cfd" }, - "CVE-2023-26242": { - "cmt_msg": "" + "CVE-2017-8924": { + "cmt_msg": "USB: serial: io_ti: fix information leak in completion handler", + "cmt_id": "72bb2b96b8568a74f28e2a2c39e005583595b2c2" }, - "CVE-2019-16089": { - "cmt_msg": "" + "CVE-2017-8925": { + "cmt_msg": "USB: serial: omninet: fix reference leaks at open", + "cmt_id": "54f11a9662b632defe4d75c7574fddbc5c503c9c" + } + }, + "4.4.59": { + "CVE-2017-7184": { + "cmt_msg": "xfrm_user: validate XFRM_MSG_NEWAE XFRMA_REPLAY_ESN_VAL replay_window", + "cmt_id": "cce7e56dd73f75fef0a7f594fb129285a660fec0" }, - "CVE-2023-32629": { - "cmt_msg": "" + "CVE-2017-7374": { + "cmt_msg": "fscrypt: remove broken support for detecting keyring key revocation", + "cmt_id": "7a5202190810dde1467718235c1f650fcf57592a" + } + }, + "4.4.60": { + "CVE-2017-7187": { + "cmt_msg": "scsi: sg: check length passed to SG_NEXT_CMD_LEN", + "cmt_id": "a92f411914cad6532e82e4607bc4075a5ffaa366" + } + }, + "4.4.61": { + "CVE-2017-7261": { + "cmt_msg": "drm/vmwgfx: NULL pointer dereference in vmw_surface_define_ioctl()", + "cmt_id": "b26629453c7b2a6c82000b36fbd1cfc4d9101808" }, - "CVE-2022-0400": { - "cmt_msg": "" + "CVE-2017-7616": { + "cmt_msg": "mm/mempolicy.c: fix error handling in set_mempolicy and mbind.", + "cmt_id": "b73d08ce20c5cb2e0cec8c019a27b9574e2c4ec2" }, - "CVE-2021-3847": { - "cmt_msg": "" + "CVE-2017-7294": { + "cmt_msg": "drm/vmwgfx: fix integer overflow in vmw_surface_define_ioctl()", + "cmt_id": "c21636bd64c511160846bdf87ef4c7ff48680c99" + } + }, + "4.4.62": { + "CVE-2017-7308": { + "cmt_msg": "net/packet: fix overflow in check for priv area size", + "cmt_id": "d35f8fa0b93e61dd95b8f86928a783c4d8a32d3e" + } + }, + "4.4.63": { + "CVE-2017-6353": { + "cmt_msg": "sctp: deny peeloff operation on asocs with threads sleeping on it", + "cmt_id": "e2f5fb9207a6bd7101ad94e73264ac8bb9e3b87a" }, - "CVE-2022-2961": { - "cmt_msg": "" + "CVE-2017-7618": { + "cmt_msg": "crypto: ahash - Fix EINPROGRESS notification callback", + "cmt_id": "2673d1c5122ee2492e24d9a135e230b2d0b2e630" }, - "CVE-2023-52443": { - "cmt_msg": "apparmor: avoid crash when parsed profile name is empty" + "CVE-2017-8064": { + "cmt_msg": "dvb-usb-v2: avoid use-after-free", + "cmt_id": "0cb03b6e7086e59647cf6eb79fec646cdec69691" }, - "CVE-2023-52444": { - "cmt_msg": "f2fs: fix to avoid dirent corruption" + "CVE-2017-7889": { + "cmt_msg": "mm: Tighten x86 /dev/mem with zeroing reads", + "cmt_id": "6739cc12f3dbd7e4b3795f6e809d44ea6b490bb6" }, - "CVE-2023-52445": { - "cmt_msg": "media: pvrusb2: fix use after free on context disconnection" + "CVE-2017-2596": { + "cmt_msg": "kvm: fix page struct leak in handle_vmon", + "cmt_id": "c1fc1d2f214e33f91565a65ad1b4c09dae618d84" + } + }, + "4.4.64": { + "CVE-2017-7472": { + "cmt_msg": "KEYS: fix keyctl_set_reqkey_keyring() to not leak thread keyrings", + "cmt_id": "c9460fbceb2f3efa1d20050cdbffa51ec025745a" }, - "CVE-2022-25265": { - "cmt_msg": "" + "CVE-2016-9604": { + "cmt_msg": "KEYS: Disallow keyrings beginning with '.' to be joined as session keyrings", + "cmt_id": "b5737b92560efcb956d2def4dcd3f4b6d4118e58" + } + }, + "4.4.65": { + "CVE-2016-7913": { + "cmt_msg": "xc2028: avoid use after free", + "cmt_id": "0d9dac5d7cc31df50757f26bcbdfbcf47277a1b2" }, - "CVE-2011-4916": { - "cmt_msg": "" + "CVE-2016-6213": { + "cmt_msg": "mnt: Add a per mount namespace limit on the number of mounts", + "cmt_id": "c50fd34e10897114a7be2120133bd7e0b4184024" }, - "CVE-2023-52448": { - "cmt_msg": "gfs2: Fix kernel NULL pointer dereference in gfs2_rgrp_dump" + "CVE-2016-8632": { + "cmt_msg": "tipc: check minimum bearer MTU", + "cmt_id": "65d30f7545ffdddcf10a59f3e54b032c5ade2e9d" }, - "CVE-2023-52449": { - "cmt_msg": "mtd: Fix gluebi NULL pointer dereference caused by ftl notifier" + "CVE-2017-2671": { + "cmt_msg": "ping: implement proper locking", + "cmt_id": "b7f47c794bc45eae975bf2a52a4463333111bb2a" }, - "CVE-2023-23039": { - "cmt_msg": "" + "CVE-2016-9120": { + "cmt_msg": "staging/android/ion : fix a race condition in the ion driver", + "cmt_id": "a7544fdd1626b65db635022c9d36007bb32dd6d8" }, - "CVE-2023-52429": { - "cmt_msg": "dm: limit the number of targets and parameter size area" + "CVE-2016-9084": { + "cmt_msg": "vfio/pci: Fix integer overflows, bitmask check", + "cmt_id": "d23ef85b123d3dbd3ba8a3c5f0ef5e556feb635e" }, - "CVE-2023-3640": { - "cmt_msg": "" - } - } - }, - "6.4": { - "6.4": { - "CVE-2023-3865": { - "cmt_msg": "ksmbd: fix out-of-bound read in smb2_write", - "cmt_id": "5fe7f7b78290638806211046a99f031ff26164e1" + "CVE-2016-7917": { + "cmt_msg": "netfilter: nfnetlink: correctly validate length of batch messages", + "cmt_id": "9540baadb61ba5ed08832bb2a4cbfd876db37ff4" }, - "CVE-2023-3610": { - "cmt_msg": "netfilter: nf_tables: fix chain binding transaction logic", - "cmt_id": "4bedf9eee016286c835e3d8fa981ddece5338795" + "CVE-2016-9083": { + "cmt_msg": "vfio/pci: Fix integer overflows, bitmask check", + "cmt_id": "d23ef85b123d3dbd3ba8a3c5f0ef5e556feb635e" }, - "CVE-2023-38432": { - "cmt_msg": "ksmbd: validate command payload size", - "cmt_id": "2b9b8f3b68edb3d67d79962f02e26dbb5ae3808d" + "CVE-2017-6001": { + "cmt_msg": "perf/core: Fix concurrent sys_perf_event_open() vs. 'move_group' race", + "cmt_id": "416bd4a366f3b4cd3f6a3246f91bd9f425891547" + } + }, + "4.4.66": { + "CVE-2017-0750": { + "cmt_msg": "f2fs: do more integrity verification for superblock", + "cmt_id": "716bcfeb12b8d55d278af47b927839b382d2837a" }, - "CVE-2023-3866": { - "cmt_msg": "ksmbd: validate session id and tree id in the compound request", - "cmt_id": "5005bcb4219156f1bf7587b185080ec1da08518e" + "CVE-2017-7645": { + "cmt_msg": "nfsd: check for oversized NFSv2/v3 arguments", + "cmt_id": "82a0d8aabe043ac94efa255502754c70363dab0e" + } + }, + "4.4.67": { + "CVE-2017-10661": { + "cmt_msg": "timerfd: Protect the might cancel mechanism proper", + "cmt_id": "911bd54922cdcc259daf73cb1a3a9d0305b9061d" }, - "CVE-2023-4610": { - "cmt_msg": "Revert \"mm: vmscan: make global slab shrink lockless\"", - "cmt_id": "71c3ad65fabec9620d3f548b2da948c79c7ad9d5" + "CVE-2017-7895": { + "cmt_msg": "nfsd: stricter decoding of write-like NFSv2/v3 ops", + "cmt_id": "da1ce38aaac7f08d319b4b76130aa4fd27c4489f" } }, - "6.4.1": { - "CVE-2023-3269": { - "cmt_msg": "mm: introduce new 'lock_mm_and_find_vma()' page fault helper", - "cmt_id": "b11fa3d22ac0fbc0bfaa740b3b3669d43ec48503" + "4.4.68": { + "CVE-2017-10662": { + "cmt_msg": "f2fs: sanity check segment count", + "cmt_id": "4edbdf57bc26a126aa3cbafd63fae4b00e002e2d" } }, - "6.4.4": { - "CVE-2023-31248": { - "cmt_msg": "netfilter: nf_tables: do not ignore genmask when looking up chain by id", - "cmt_id": "5e5e967e8505fbdabfb6497367ec1b808cadc356" + "4.4.70": { + "CVE-2017-18360": { + "cmt_msg": "USB: serial: io_ti: fix div-by-zero in set_termios", + "cmt_id": "1e6e9c4c36f9626d5ad2b63aa7ad5686dde737e7" }, - "CVE-2023-33250": { - "cmt_msg": "iommufd: Call iopt_area_contig_done() under the lock", - "cmt_id": "dbe65261fe1367dc307a89466a1a75c0d80b8233" + "CVE-2017-7487": { + "cmt_msg": "ipx: call ipxitf_put() in ioctl error path", + "cmt_id": "8a5b15e198f1701da75a8223cfe72c04bcb15160" }, - "CVE-2024-0639": { - "cmt_msg": "sctp: fix potential deadlock on &net->sctp.addr_wq_lock", - "cmt_id": "f8d77336af38e71435f92c5f271fd0b40f33fe66" + "CVE-2017-1000363": { + "cmt_msg": "char: lp: fix possible integer overflow in lp_setup()", + "cmt_id": "cda5c7e625cefed46311cb0b37816fb2ff42a8ee" + } + }, + "4.4.71": { + "CVE-2017-9077": { + "cmt_msg": "ipv6/dccp: do not inherit ipv6_mc_list from parent", + "cmt_id": "d1428ee5407396185aab56ca62d49e89726455e0" }, - "CVE-2023-2898": { - "cmt_msg": "f2fs: fix to avoid NULL pointer dereference f2fs_write_end_io()", - "cmt_id": "5619e9aabbd2b369cde2114ad6f55f6eb3e0b5be" + "CVE-2017-9076": { + "cmt_msg": "ipv6/dccp: do not inherit ipv6_mc_list from parent", + "cmt_id": "d1428ee5407396185aab56ca62d49e89726455e0" }, - "CVE-2023-4134": { - "cmt_msg": "Input: cyttsp4_core - change del_timer_sync() to timer_shutdown_sync()", - "cmt_id": "28dc11949357f10712bd641b724ab373a92318de" + "CVE-2017-9075": { + "cmt_msg": "sctp: do not inherit ipv6_{mc|ac|fl}_list from parent", + "cmt_id": "ffa551def59c9b0e1747955af6a742443ae152fc" }, - "CVE-2023-4132": { - "cmt_msg": "media: usb: siano: Fix warning due to null work_func_t function pointer", - "cmt_id": "ae65238d3f5a2df48341a7112820e04fb1017422" + "CVE-2017-9074": { + "cmt_msg": "ipv6: Prevent overrun when parsing v6 header options", + "cmt_id": "017fabead5c2aacb36df910bbfbfb1e813517ae3" }, - "CVE-2023-35001": { - "cmt_msg": "netfilter: nf_tables: prevent OOB access in nft_byteorder_eval", - "cmt_id": "b79c09c2bf2d7643902a6ef26152de602c5c5e4b" + "CVE-2017-18221": { + "cmt_msg": "mlock: fix mlock count can not decrease in race condition", + "cmt_id": "03489bfc78304a0be057ec827a67c0d87dd97b2e" }, - "CVE-2023-39197": { - "cmt_msg": "netfilter: conntrack: dccp: copy entire header to stack buffer, not just basic one", - "cmt_id": "8c0980493beed3a80d6329c44ab293dc8c032927" + "CVE-2017-8890": { + "cmt_msg": "dccp/tcp: do not inherit mc_list from parent", + "cmt_id": "5f67a1663c03a73962fb240cf821338f78981a23" }, - "CVE-2023-3863": { - "cmt_msg": "net: nfc: Fix use-after-free caused by nfc_llcp_find_local", - "cmt_id": "e5207c1d69b1a9707615ab6ff9376e59fc096815" + "CVE-2017-9242": { + "cmt_msg": "ipv6: fix out of bound writes in __ip6_append_data()", + "cmt_id": "38f02f2ce0ca58c45d95567a5d64f7dc90aa9c95" } }, - "6.4.5": { - "CVE-2023-51043": { - "cmt_msg": "drm/atomic: Fix potential use-after-free in nonblocking commits", - "cmt_id": "328f520540db49a7ab40db2835b5027a30bcd6ce" - }, - "CVE-2023-3867": { - "cmt_msg": "ksmbd: add missing compound request handing in some commands", - "cmt_id": "ffaa0c85edd9245594a94918c09db9163b71767a" + "4.4.72": { + "CVE-2017-9605": { + "cmt_msg": "drm/vmwgfx: Make sure backup_handle is always valid", + "cmt_id": "74276868b45585f77eae2372c95e016aacfd0d3c" }, - "CVE-2023-3611": { - "cmt_msg": "net/sched: sch_qfq: account for stab overhead in qfq_enqueue", - "cmt_id": "bd2333fa86dc520823e8c317980b29ba91ee6b87" + "CVE-2017-15274": { + "cmt_msg": "KEYS: fix dereferencing NULL payload with nonzero length", + "cmt_id": "bc6be3433e694d1ab1d0012b6053ae4e9a3b189e" }, - "CVE-2023-3776": { - "cmt_msg": "net/sched: cls_fw: Fix improper refcount update leads to use-after-free", - "cmt_id": "0a2e3f49febda459252f58cec2d659623d582800" + "CVE-2017-7346": { + "cmt_msg": "drm/vmwgfx: limit the number of mip levels in vmw_gb_surface_define_ioctl()", + "cmt_id": "619cc02fd85d69270c95e7db320b305e975aae00" }, - "CVE-2023-44466": { - "cmt_msg": "libceph: harden msgr2.1 frame segment length checks", - "cmt_id": "0a6db56467773851e4ea4d652308314d8f9c4f91" + "CVE-2017-1000380": { + "cmt_msg": "ALSA: timer: Fix race between read and ioctl", + "cmt_id": "f5bc918760c8100410847a6a6e4c25f24e358e0c" } }, - "6.4.6": { - "CVE-2023-20593": { - "cmt_msg": "x86/cpu/amd: Add a Zenbleed fix", - "cmt_id": "9b8bb5c4e25678af895dc9dd4a1e82b2f948cacc" + "4.4.74": { + "CVE-2017-1000364": { + "cmt_msg": "mm: larger stack guard gap, between vmas", + "cmt_id": "4b359430674caa2c98d0049a6941f157d2a33741" + }, + "CVE-2017-1000379": { + "cmt_msg": "mm: larger stack guard gap, between vmas", + "cmt_id": "4b359430674caa2c98d0049a6941f157d2a33741" } }, - "6.4.7": { - "CVE-2023-3777": { - "cmt_msg": "netfilter: nf_tables: skip bound chain on rule flush", - "cmt_id": "ab87c6b43822a56ae0aadc715364b5f8d4a96037" + "4.4.75": { + "CVE-2017-1000365": { + "cmt_msg": "fs/exec.c: account for argv/envp pointers", + "cmt_id": "1d3d0f8b7cf758136ed36b30620442d989601737" }, - "CVE-2023-4004": { - "cmt_msg": "netfilter: nft_set_pipapo: fix improper element removal", - "cmt_id": "48dbb5d24c667bf26bc2fea8caa7fe51fcc6aa62" + "CVE-2017-7482": { + "cmt_msg": "rxrpc: Fix several cases where a padded len isn't checked in ticket decode", + "cmt_id": "eab38dfd66d7f13b9eecfae7728ff0d2e49ff16f" } }, - "6.4.8": { - "CVE-2023-4015": { - "cmt_msg": "netfilter: nf_tables: skip immediate deactivate in _PREPARE_ERROR", - "cmt_id": "027d00132487bcf2a4ee7493bb8de9d6331d48e3" - }, - "CVE-2023-4147": { - "cmt_msg": "netfilter: nf_tables: disallow rule addition to bound chain via NFTA_RULE_CHAIN_ID", - "cmt_id": "14448359681062bf51d9c67e0264869548b79853" - }, - "CVE-2023-1206": { - "cmt_msg": "tcp: Reduce chance of collisions in inet6_hashfn().", - "cmt_id": "1e50c11ed44e28a57c6215a5e7643ae85c6297fa" - }, - "CVE-2023-4611": { - "cmt_msg": "mm/mempolicy: Take VMA lock before replacing policy", - "cmt_id": "e872d6b6ea4947fb87f0d6ea1ef814019dbed89e" + "4.4.76": { + "CVE-2017-18017": { + "cmt_msg": "netfilter: xt_TCPMSS: add more sanity tests on tcph->doff", + "cmt_id": "234e649840d191379cd132d89f4b01a2495cfcc3" } }, - "6.4.9": { - "CVE-2022-40982": { - "cmt_msg": "x86/speculation: Add Gather Data Sampling mitigation", - "cmt_id": "ff0642207e24f9a7011e8982ab7da1e16db75a38" + "4.4.77": { + "CVE-2017-11176": { + "cmt_msg": "mqueue: fix a use-after-free in sys_mq_notify()", + "cmt_id": "034e10b4f8348c2c267e491d1e2872023c35f310" }, - "CVE-2023-34319": { - "cmt_msg": "xen/netback: Fix buffer overrun triggered by unusual packet", - "cmt_id": "cf482893f721f76ac60c0a43482a59b2f194156b" + "CVE-2017-10810": { + "cmt_msg": "drm/virtio: don't leak bo on drm_gem_object_init failure", + "cmt_id": "a080ec466c3412dcf58cff69d6c05d1e670adc0c" }, - "CVE-2023-20569": { - "cmt_msg": "x86/bugs: Increase the x86 bugs vector size to two u32s", - "cmt_id": "d351cc7c14a6e2af73bfea4aa5ee093321f4c307" + "CVE-2017-12146": { + "cmt_msg": "driver core: platform: fix race condition with driver_override", + "cmt_id": "c01ace719ebe6353f0c96e56f6c75c22ad3f67b0" } }, - "6.4.10": { - "CVE-2023-20588": { - "cmt_msg": "x86/CPU/AMD: Do not leak quotient data after a division by 0", - "cmt_id": "c9c0b889e2d33d49b06bb716b95a192ed3449173" - }, - "CVE-2023-4194": { - "cmt_msg": "net: tun_chr_open(): set sk_uid from current_fsuid()", - "cmt_id": "36161e7d40e7293d7f213e16d881042d15c8a53a" - }, - "CVE-2023-4128": { - "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free", - "cmt_id": "4b717802428fa02cbcbb61209f638f65f9cd4710" - }, - "CVE-2023-4208": { - "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free", - "cmt_id": "4b717802428fa02cbcbb61209f638f65f9cd4710" - }, - "CVE-2023-6039": { - "cmt_msg": "net: usb: lan78xx: reorder cleanup operations to avoid UAF bugs", - "cmt_id": "a54bf862ccad27c8b91795b69a9ca105f8e6295e" + "4.4.78": { + "CVE-2019-9457": { + "cmt_msg": "exec: Limit arg stack to at most 75% of _STK_LIM", + "cmt_id": "86949eb96466ec182303afc3c386bd70cc67b991" }, - "CVE-2023-4206": { - "cmt_msg": "net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free", - "cmt_id": "a836184b670f59e24d3a0f7c07115ec6e6ce6900" + "CVE-2018-14634": { + "cmt_msg": "exec: Limit arg stack to at most 75% of _STK_LIM", + "cmt_id": "86949eb96466ec182303afc3c386bd70cc67b991" }, - "CVE-2023-4207": { - "cmt_msg": "net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free", - "cmt_id": "7d848d718aeb3b482e177b682dd04e76dd413afb" + "CVE-2017-11089": { + "cmt_msg": "cfg80211: Define nla_policy for NL80211_ATTR_LOCAL_MESH_POWER_MODE", + "cmt_id": "05bf0b6ef9ce7e8967c96fd419ad0ee5d7fe5418" }, - "CVE-2023-4273": { - "cmt_msg": "exfat: check if filename entries exceeds max filename length", - "cmt_id": "e1a73ba43cf883cb37f6331aca5a4c5be6350982" + "CVE-2017-7541": { + "cmt_msg": "brcmfmac: fix possible buffer overflow in brcmf_cfg80211_mgmt_tx()", + "cmt_id": "4c7021c2fb74047649c03845ce6fd13626a5a418" }, - "CVE-2023-40283": { - "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb", - "cmt_id": "10426afe65c8bf7b24dd0c7be4dcc65f86fc99f9" + "CVE-2017-1000371": { + "cmt_msg": "binfmt_elf: use ELF_ET_DYN_BASE only for PIE", + "cmt_id": "7eb968cd04d404e6c73cd82c1122f6e06ad2d1e8" }, - "CVE-2024-1312": { - "cmt_msg": "mm: lock_vma_under_rcu() must check vma->anon_vma under vma lock", - "cmt_id": "93a0b7d43de51b38c4c91d4121e447018132119a" + "CVE-2017-1000370": { + "cmt_msg": "binfmt_elf: use ELF_ET_DYN_BASE only for PIE", + "cmt_id": "7eb968cd04d404e6c73cd82c1122f6e06ad2d1e8" } }, - "6.4.11": { - "CVE-2023-4155": { - "cmt_msg": "KVM: SEV: only access GHCB fields once", - "cmt_id": "ab8e9a874574ce511eca21caa5d7ef5426963a54" + "4.4.79": { + "CVE-2017-11473": { + "cmt_msg": "x86/acpi: Prevent out of bound access caused by broken ACPI tables", + "cmt_id": "fa7ddee3485f17c28fe4079954c5716036de6152" }, - "CVE-2023-4563": { - "cmt_msg": "netfilter: nf_tables: don't skip expired elements during walk", - "cmt_id": "bd156ce9553dcaf2d6ee2c825d1a5a1718e86524" + "CVE-2017-18079": { + "cmt_msg": "Input: i8042 - fix crash at boot time", + "cmt_id": "bba6b69e11777695256619a77f90081ac7f99de7" } }, - "6.4.12": { - "CVE-2023-4569": { - "cmt_msg": "netfilter: nf_tables: deactivate catchall elements in next generation", - "cmt_id": "83ff16e449a675e215125d97a2c4a7f097d291d0" - }, - "CVE-2023-51042": { - "cmt_msg": "drm/amdgpu: Fix potential fence use-after-free v2", - "cmt_id": "f5db29ce2502c4fc8a33ed7989950ba43875e322" - }, - "CVE-2023-40791": { - "cmt_msg": "crypto, cifs: fix error handling in extract_iter_to_sg()", - "cmt_id": "0ba71114c3af9fa44a474d16a12cecd12e3779b9" + "4.4.80": { + "CVE-2017-7533": { + "cmt_msg": "dentry name snapshots", + "cmt_id": "407669f2c9fe9f32aeb39f715d748fe456718aac" }, - "CVE-2023-6546": { - "cmt_msg": "tty: n_gsm: fix the UAF caused by race condition in gsm_cleanup_mux", - "cmt_id": "f40e70d7f40bd44ecf6f35b946a899e59744fbe1" + "CVE-2016-10741": { + "cmt_msg": "xfs: don't BUG() on mixed direct and mapped I/O", + "cmt_id": "56548b6f505a6df1c43dcb151a18d6190c250ed6" }, - "CVE-2023-4244": { - "cmt_msg": "netfilter: nf_tables: fix GC transaction races with netns and netlink event exit path", - "cmt_id": "3bdf400a1ad166274e85fa537f8a993a4553e36d" + "CVE-2017-12762": { + "cmt_msg": "isdn/i4l: fix buffer overflow", + "cmt_id": "d4b159f14d612132fdb1ade6d5015ee03a263e62" + } + }, + "4.4.81": { + "CVE-2017-10663": { + "cmt_msg": "f2fs: sanity check checkpoint segno and blkoff", + "cmt_id": "76517ed2a7fe059840c1984165984e69cb488568" }, - "CVE-2023-39198": { - "cmt_msg": "drm/qxl: fix UAF on handle creation", - "cmt_id": "a79aebe5bb68266ce9c7f8714fad166a3216460d" + "CVE-2017-8831": { + "cmt_msg": "saa7164: fix double fetch PCIe access condition", + "cmt_id": "deae9956cfb42f3d480c71f416f934d3ce84c033" }, - "CVE-2023-39194": { - "cmt_msg": "net: xfrm: Fix xfrm_address_filter OOB read", - "cmt_id": "5713c7ca31f563a493281c25cbdbd3f4ef53a9e9" + "CVE-2017-7542": { + "cmt_msg": "ipv6: avoid overflow of offset in ip6_find_1stfragopt", + "cmt_id": "f09db7559c1faf6f7c2128a92050b978a480681c" + } + }, + "4.4.82": { + "CVE-2017-1000": { + "cmt_msg": "udp: consistently apply ufo or fragmentation", + "cmt_id": "938990d2433cdecd225e1ab54a442b3ffdce1f87" }, - "CVE-2023-3773": { - "cmt_msg": "xfrm: add forgotten nla_policy for XFRMA_MTIMER_THRESH", - "cmt_id": "a9020514f175ef15bb68eea9345782abfd9afea3" + "CVE-2017-1000112": { + "cmt_msg": "udp: consistently apply ufo or fragmentation", + "cmt_id": "938990d2433cdecd225e1ab54a442b3ffdce1f87" }, - "CVE-2023-3772": { - "cmt_msg": "xfrm: add NULL check in xfrm_update_ae_params", - "cmt_id": "53df4be4f5221e90dc7aa9ce745a9a21bb7024f4" + "CVE-2017-1000111": { + "cmt_msg": "packet: fix tp_reserve race in packet_set_ring", + "cmt_id": "63364a508d24944abb0975bd823cb11367c56283" } }, - "6.4.13": { - "CVE-2022-36402": { - "cmt_msg": "drm/vmwgfx: Fix shader stage validation", - "cmt_id": "5574b0cbb493f3b3cbb2c381e8e1dac52a70213f" + "4.4.84": { + "CVE-2017-12134": { + "cmt_msg": "xen: fix bio vec merging", + "cmt_id": "c0b397fd6b2b8ed7b39a717340b85b4b1add5332" + }, + "CVE-2017-14140": { + "cmt_msg": "Sanitize 'move_pages()' permission checks", + "cmt_id": "46d51a26efbc7cbaa2bc1f01628a00a604193856" + }, + "CVE-2018-10675": { + "cmt_msg": "mm/mempolicy: fix use after free when calling get_mempolicy", + "cmt_id": "cc971fa12bd2dff6c0432c860d784c6cdaf5a04b" } }, - "6.4.15": { - "CVE-2023-52440": { - "cmt_msg": "ksmbd: fix slub overflow in ksmbd_decode_ntlmssp_auth_blob()", - "cmt_id": "7f1d6cb0eb6af3a8088dc24b7ddee9a9711538c4" + "4.4.87": { + "CVE-2017-11600": { + "cmt_msg": "xfrm: policy: check policy direction value", + "cmt_id": "9b3dcc98d8df16913d260c8dae64ad6e5bfcb953" } }, - "6.4.16": { - "CVE-2023-4623": { - "cmt_msg": "net/sched: sch_hfsc: Ensure inner classes have fsc curve", - "cmt_id": "5293f466d41d6c2eaad8b833576ea3dbee630dc2" + "4.4.88": { + "CVE-2017-14340": { + "cmt_msg": "xfs: XFS_IS_REALTIME_INODE() should be false if no rt device present", + "cmt_id": "ad3903434142953a03b84ec8719ce80373a62266" }, - "CVE-2023-52442": { - "cmt_msg": "ksmbd: validate session id and tree id in compound request", - "cmt_id": "4c2b350b2e269e3fd17bbfa42de1b42775b777ac" + "CVE-2017-1000251": { + "cmt_msg": "Bluetooth: Properly check L2CAP config option output buffer length", + "cmt_id": "f7ec367c8ea7021517c9c04b0022c225d2d0785a" }, - "CVE-2023-25775": { - "cmt_msg": "RDMA/irdma: Prevent zero-length STAG registration", - "cmt_id": "ceba966f1d6391800cab3c1c9ac1661b5166bc5b" + "CVE-2017-9985": { + "cmt_msg": "ALSA: msnd: Optimize / harden DSP and MIDI loops", + "cmt_id": "55681470154567b4a8a30ec8b35a8ebd5a4f3608" }, - "CVE-2023-52441": { - "cmt_msg": "ksmbd: fix out of bounds in init_smb2_rsp_hdr()", - "cmt_id": "aa669ef229ae8dd779da9caa24e254964545895f" + "CVE-2017-9984": { + "cmt_msg": "ALSA: msnd: Optimize / harden DSP and MIDI loops", + "cmt_id": "55681470154567b4a8a30ec8b35a8ebd5a4f3608" + } + }, + "4.4.89": { + "CVE-2017-14106": { + "cmt_msg": "tcp: initialize rcv_mss to TCP_MIN_MSS instead of 0", + "cmt_id": "611a98c8eca3098173309642df187056c17e0f65" }, - "CVE-2023-37453": { - "cmt_msg": "USB: core: Fix race by not overwriting udev->descriptor in hub_port_init()", - "cmt_id": "b4a074b1fb222164ed7d5c0b8c922dc4a0840848" + "CVE-2017-14991": { + "cmt_msg": "scsi: sg: fixup infoleak when using SG_GET_REQUEST_TABLE", + "cmt_id": "72896ca30a7f6ceb5238714d5761e4ad4521ccc5" }, - "CVE-2023-42753": { - "cmt_msg": "netfilter: ipset: add the missing IP_SET_HASH_WITH_NET0 macro for ip_set_hash_netportnet.c", - "cmt_id": "d59b6fc405549f7caf31f6aa5da1d6bef746b166" + "CVE-2017-14051": { + "cmt_msg": "scsi: qla2xxx: Fix an integer overflow in sysfs code", + "cmt_id": "d8663aa2778965c75b5e75c7948b44f5de601a88" }, - "CVE-2023-42752": { - "cmt_msg": "igmp: limit igmpv3_newpack() packet size to IP_MAX_MTU", - "cmt_id": "87f07ec534e39e29bc715753df2e77509e8fafc3" + "CVE-2017-0627": { + "cmt_msg": "media: uvcvideo: Prevent heap overflow when accessing mapped controls", + "cmt_id": "4931578fbeb525e717a7aa96f83f4d85cf48d0b2" + } + }, + "4.4.90": { + "CVE-2020-14353": { + "cmt_msg": "KEYS: prevent creating a different user's keyrings", + "cmt_id": "539255aea88e47932a98ba7656775cbca4f3d27c" }, - "CVE-2023-45871": { - "cmt_msg": "igb: set max size RX buffer when store bad packet is enabled", - "cmt_id": "6a9abbccaac418e965f42e8a8f6dd826e341a6f9" + "CVE-2017-14156": { + "cmt_msg": "video: fbdev: aty: do not leak uninitialized padding in clk to userspace", + "cmt_id": "27323cb81eae618e68e4dea1345090c37dee5485" }, - "CVE-2023-39193": { - "cmt_msg": "netfilter: xt_sctp: validate the flag_info count", - "cmt_id": "b63b4e114593073a1c25087526782258c9dd5347" + "CVE-2017-12153": { + "cmt_msg": "nl80211: check for the required netlink attributes presence", + "cmt_id": "9d74367d1a35e87f46e5e0c2e8dd9f5d21f701b0" }, - "CVE-2023-39192": { - "cmt_msg": "netfilter: xt_u32: validate user space input", - "cmt_id": "83b995321eaaa0176041d9d79c7d0415cb6ed7e1" - } - }, - "outstanding": { - "CVE-2020-26556": { - "cmt_msg": "" + "CVE-2017-1000252": { + "cmt_msg": "KVM: VMX: Do not BUG() on out-of-bounds guest IRQ", + "cmt_id": "7520be6a454c28955e711fdb49c81519bc537b39" }, - "CVE-2020-26557": { - "cmt_msg": "" + "CVE-2017-12154": { + "cmt_msg": "kvm: nVMX: Don't allow L2 to access the hardware CR8", + "cmt_id": "21a638c5efd6ec7a10441bfb94e15e5288920f07" }, - "CVE-2019-20794": { - "cmt_msg": "" + "CVE-2017-18270": { + "cmt_msg": "KEYS: prevent creating a different user's keyrings", + "cmt_id": "539255aea88e47932a98ba7656775cbca4f3d27c" }, - "CVE-2020-26559": { - "cmt_msg": "" + "CVE-2017-14489": { + "cmt_msg": "scsi: scsi_transport_iscsi: fix the issue that iscsi_if_rx doesn't parse nlmsg properly", + "cmt_id": "9d2534917c25a58b67864ea1db930670d48dee75" }, - "CVE-2020-35501": { - "cmt_msg": "" + "CVE-2017-12192": { + "cmt_msg": "KEYS: prevent KEYCTL_READ on negative key", + "cmt_id": "638b38505045e1090313ff7ed284911870cd29f8" }, - "CVE-2023-4010": { - "cmt_msg": "" + "CVE-2017-15537": { + "cmt_msg": "x86/fpu: Don't let userspace set bogus xcomp_bv", + "cmt_id": "d25fea066a8ed4457a9f8b23eb78204b9b6896cf" + } + }, + "4.4.92": { + "CVE-2017-16526": { + "cmt_msg": "uwb: properly check kthread_run return value", + "cmt_id": "5a21af11c6810b936b17a2c5c69518be0da8f4c3" }, - "CVE-2023-6176": { - "cmt_msg": "net/tls: do not free tls_rec on async operation in bpf_exec_tx_verdict()" + "CVE-2017-16534": { + "cmt_msg": "USB: core: harden cdc_parse_cdc_header", + "cmt_id": "feab51a916ed07219dee38b898fe22bd2a98193a" }, - "CVE-2023-51779": { - "cmt_msg": "Bluetooth: af_bluetooth: Fix Use-After-Free in bt_sock_recvmsg" + "CVE-2017-16531": { + "cmt_msg": "USB: fix out-of-bounds in usb_set_configuration", + "cmt_id": "13713e63bdb306f9a58d359b15edd60f34eac5ee" }, - "CVE-2023-52458": { - "cmt_msg": "block: add check that partition length needs to be aligned with block size" + "CVE-2017-16530": { + "cmt_msg": "USB: uas: fix bug in handling of alternate settings", + "cmt_id": "5d9a9c3dcc1f63215b5a5b877be589974ec4f31d" }, - "CVE-2023-52457": { - "cmt_msg": "serial: 8250: omap: Don't skip resource freeing if pm_runtime_resume_and_get() failed" + "CVE-2017-16529": { + "cmt_msg": "ALSA: usb-audio: Check out-of-bounds access by corrupted buffer descriptor", + "cmt_id": "46c7b1fa4911a859a82575e3ffb55b34a89a222d" + } + }, + "4.4.93": { + "CVE-2017-0786": { + "cmt_msg": "brcmfmac: add length check in brcmf_cfg80211_escan_handler()", + "cmt_id": "6721969c7b8a35f85a41acaabdad190ed32cf704" }, - "CVE-2018-1121": { - "cmt_msg": "" + "CVE-2017-16527": { + "cmt_msg": "ALSA: usb-audio: Kill stray URB at exiting", + "cmt_id": "dc7c3bd09c7d2063c4d1be23d72ee85f1b3bb947" }, - "CVE-2023-52451": { - "cmt_msg": "powerpc/pseries/memhp: Fix access beyond end of drmem array" + "CVE-2017-16525": { + "cmt_msg": "USB: serial: console: fix use-after-free after failed setup", + "cmt_id": "208563455aac7540755bb9d8e8edaf7c5ef61d8c" }, - "CVE-2023-52454": { - "cmt_msg": "nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length" + "CVE-2017-16533": { + "cmt_msg": "HID: usbhid: fix out-of-bounds bug", + "cmt_id": "2929cb995378205bceda86d6fd3cbc22e522f97f" }, - "CVE-2023-52453": { - "cmt_msg": "hisi_acc_vfio_pci: Update migration data pointer correctly on saving/resume" + "CVE-2017-15265": { + "cmt_msg": "ALSA: seq: Fix use-after-free at creating a port", + "cmt_id": "23709ae9b61429502fcd4686e7a97333f3b3544a" }, - "CVE-2023-52452": { - "cmt_msg": "bpf: Fix accesses to uninit stack slots" + "CVE-2017-12190": { + "cmt_msg": "fix unbalanced page refcounting in bio_map_user_iov", + "cmt_id": "399c46095eb5d41934c8a99732028a9f1cf0ac50" + } + }, + "4.4.94": { + "CVE-2018-9568": { + "cmt_msg": "net: Set sk_prot_creator when cloning sockets to the right proto", + "cmt_id": "685699703a0a39896ba0af91e6d2a80103fe4966" }, - "CVE-2023-5090": { - "cmt_msg": "x86: KVM: SVM: always update the x2avic msr interception" + "CVE-2017-15649": { + "cmt_msg": "packet: in packet_do_bind, test fanout with bind_lock held", + "cmt_id": "1b6c80e797eeadf643861f8340ed5791d813d80c" + } + }, + "4.4.95": { + "CVE-2017-15299": { + "cmt_msg": "KEYS: don't let add_key() update an uninstantiated key", + "cmt_id": "33dea302f9bc1e2c41392a308cfb50f6c02bb096" }, - "CVE-2023-52450": { - "cmt_msg": "perf/x86/intel/uncore: Fix NULL pointer dereference issue in upi_fill_topology()" + "CVE-2017-16535": { + "cmt_msg": "USB: core: fix out-of-bounds access bug in usb_get_bos_descriptor()", + "cmt_id": "9dff499d822660c6dbb2a407a7d85be26f87da07" }, - "CVE-2019-19378": { - "cmt_msg": "" + "CVE-2017-15951": { + "cmt_msg": "KEYS: Fix race between updating and finding a negative key", + "cmt_id": "8a004caec12bf241e567e3640401256cc9bc2e45" + } + }, + "4.4.96": { + "CVE-2017-16643": { + "cmt_msg": "Input: gtco - fix potential out-of-bound access", + "cmt_id": "2c99438cf66d585ba939068c8b8562e9104cd5c4" }, - "CVE-2024-0641": { - "cmt_msg": "tipc: fix a potential deadlock on &tx->lock" + "CVE-2017-12193": { + "cmt_msg": "assoc_array: Fix a buggy node-splitting case", + "cmt_id": "1cbbd99f3bfe27115c05332e7db73e23651b9f8b" + } + }, + "4.4.99": { + "CVE-2018-7191": { + "cmt_msg": "tun: call dev_get_valid_name() before register_netdevice()", + "cmt_id": "4b27fe34a226dd9087cb2e93161ffec03952c05a" }, - "CVE-2024-1085": { - "cmt_msg": "netfilter: nf_tables: check if catch-all set element is active in next generation" + "CVE-2017-13080": { + "cmt_msg": "mac80211: accept key reinstall without changing anything", + "cmt_id": "6440f0ee8a1779f53526bccb9de00914daeb9094" }, - "CVE-2024-1086": { - "cmt_msg": "netfilter: nf_tables: reject QUEUE/DROP verdict parameters" + "CVE-2017-16645": { + "cmt_msg": "Input: ims-psu - check if CDC union descriptor is sane", + "cmt_id": "b7c625ce6d279bf3e138c25c0cd3f595923825f3" }, - "CVE-2023-5345": { - "cmt_msg": "fs/smb/client: Reset password pointer to NULL" + "CVE-2017-16528": { + "cmt_msg": "ALSA: seq: Cancel pending autoload work at unbinding device", + "cmt_id": "1e98fd54c356bb2bcf827a74949c9372c455409f" }, - "CVE-2023-5717": { - "cmt_msg": "perf: Disallow mis-matched inherited group reads" + "CVE-2017-16532": { + "cmt_msg": "usb: usbtest: fix NULL pointer dereference", + "cmt_id": "de46c1adbea694109036d3e7dee1fa6250b72660" + } + }, + "4.4.100": { + "CVE-2017-16537": { + "cmt_msg": "media: imon: Fix null-ptr-deref in imon_probe", + "cmt_id": "c344019c48a92e559b7f910e53e0c6f9018680fb" }, - "CVE-2024-0646": { - "cmt_msg": "net: tls, update curr on splice as well" + "CVE-2017-9150": { + "cmt_msg": "bpf: don't let ldimm64 leak map addresses on unprivileged", + "cmt_id": "49630dd2e10a3b2fee0cec19feb63f08453b876f" }, - "CVE-2024-22386": { - "cmt_msg": "" + "CVE-2017-10911": { + "cmt_msg": "xen-blkback: don't leak stack data via response ring", + "cmt_id": "11e8e55be18cd39c3d54674362aa18695b243e22" }, - "CVE-2024-25744": { - "cmt_msg": "x86/coco: Disable 32-bit emulation by default on TDX and SEV" + "CVE-2017-16646": { + "cmt_msg": "media: dib0700: fix invalid dvb_detach argument", + "cmt_id": "0a418e57717d2d33275e9340c726ded671be7698" }, - "CVE-2020-24503": { - "cmt_msg": "" + "CVE-2017-16650": { + "cmt_msg": "net: qmi_wwan: fix divide by 0 on bad descriptors", + "cmt_id": "e455048c7ae95633c8778a0282d1ee86f78c5349" }, - "CVE-2020-24502": { - "cmt_msg": "" + "CVE-2017-7518": { + "cmt_msg": "KVM: x86: fix singlestepping over syscall", + "cmt_id": "07e3aff243cdcb70d1e81e515aea553df3080f43" }, - "CVE-2023-6240": { - "cmt_msg": "" + "CVE-2017-16649": { + "cmt_msg": "net: cdc_ether: fix divide by 0 on bad descriptors", + "cmt_id": "caeeef8438c30e7d0e43293fcb7beb9f953bb2a9" }, - "CVE-2024-22705": { - "cmt_msg": "ksmbd: fix slab-out-of-bounds in smb_strndup_from_utf16()" + "CVE-2017-15115": { + "cmt_msg": "sctp: do not peel off an assoc from one netns to another one", + "cmt_id": "46bdabbca02ebabd292d0ea3f610aa54e53f0e25" + } + }, + "4.4.101": { + "CVE-2017-18204": { + "cmt_msg": "ocfs2: should wait dio before inode lock in ocfs2_setattr()", + "cmt_id": "c4baa4a5870cb02f713def1620052bfca7a82bbb" }, - "CVE-2023-5633": { - "cmt_msg": "drm/vmwgfx: Keep a gem reference to user bos in surfaces" + "CVE-2017-16994": { + "cmt_msg": "mm/pagewalk.c: report holes in hugetlb ranges", + "cmt_id": "a3805b10de80953db316985f567453fc18329423" + } + }, + "4.4.103": { + "CVE-2017-18203": { + "cmt_msg": "dm: fix race between dm_get_from_kobject() and __dm_destroy()", + "cmt_id": "4e82464aa4a398207e2ecbc4877c82319ecdbafa" }, - "CVE-2023-6610": { - "cmt_msg": "smb: client: fix potential OOB in smb2_dump_detail()" + "CVE-2017-16536": { + "cmt_msg": "cx231xx-cards: fix NULL-deref on missing association descriptor", + "cmt_id": "0870fb4c3566088dc222e582e43edbc9ececbce4" + } + }, + "4.4.104": { + "CVE-2017-16939": { + "cmt_msg": "ipsec: Fix aborted xfrm policy dump crash", + "cmt_id": "b377c453b3631531679cbe594b7d28c5ecd82cea" }, - "CVE-2020-11725": { - "cmt_msg": "" + "CVE-2017-18208": { + "cmt_msg": "mm/madvise.c: fix madvise() infinite loop under special circumstances", + "cmt_id": "0d05a5593f6309cb0df0df474a807a3220855703" + } + }, + "4.4.106": { + "CVE-2017-0861": { + "cmt_msg": "ALSA: pcm: prevent UAF in snd_pcm_info", + "cmt_id": "659e7d2588f0fd970044fe00d9edeb482d375288" }, - "CVE-2022-23825": { - "cmt_msg": "" + "CVE-2018-7492": { + "cmt_msg": "rds: Fix NULL pointer dereference in __rds_rdma_map", + "cmt_id": "6c154d536d9457bee261d057559e43d3f8ae5fd5" }, - "CVE-2023-3397": { - "cmt_msg": "" + "CVE-2017-1000407": { + "cmt_msg": "KVM: VMX: remove I/O port 0x80 bypass on Intel hosts", + "cmt_id": "477b837533a2f592702d2affab36b8052691287b" }, - "CVE-2024-0584": { - "cmt_msg": "ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet" + "CVE-2018-18559": { + "cmt_msg": "net/packet: fix a race in packet_bind() and packet_notifier()", + "cmt_id": "b90f87c641bc9af04f0d8a21008880ae032de72c" + } + }, + "4.4.107": { + "CVE-2017-17558": { + "cmt_msg": "USB: core: prevent malicious bNumInterfaces overflow", + "cmt_id": "dfdf5fa3e6647c0fc02be8d857b6b8b7098946ff" }, - "CVE-2023-1476": { - "cmt_msg": "" + "CVE-2017-17806": { + "cmt_msg": "crypto: hmac - require that the underlying hash algorithm is unkeyed", + "cmt_id": "43cd7f38612df31fbd929588c065cfbc42102aab" }, - "CVE-2021-3864": { - "cmt_msg": "" + "CVE-2017-17805": { + "cmt_msg": "crypto: salsa20 - fix blkcipher_walk API usage", + "cmt_id": "8a311b0462b59d12cb14e82e626d3612d988135b" }, - "CVE-2022-3606": { - "cmt_msg": "" + "CVE-2017-17807": { + "cmt_msg": "KEYS: add missing permission check for request_key() destination", + "cmt_id": "13e86efb2eee6bd1f2d0aae5b0273e8e65683c9d" }, - "CVE-2019-19814": { - "cmt_msg": "" + "CVE-2017-16914": { + "cmt_msg": "usbip: fix stub_send_ret_submit() vulnerability to null transfer_buffer", + "cmt_id": "2862cfca39894ac265fbb5cde9a3ff90c02201f3" + } + }, + "4.4.109": { + "CVE-2017-17712": { + "cmt_msg": "net: ipv4: fix for a race condition in raw_sendmsg", + "cmt_id": "be27b620a861dc2a143b78e81e23f5622d9105da" }, - "CVE-2022-2209": { - "cmt_msg": "" + "CVE-2017-18595": { + "cmt_msg": "tracing: Fix possible double free on failure of allocating trace buffer", + "cmt_id": "c2a62f84d49ff71cd7ffbe898c706ccc39955218" }, - "CVE-2024-0582": { - "cmt_msg": "io_uring/kbuf: defer release of mapped buffer rings" + "CVE-2017-15129": { + "cmt_msg": "net: Fix double free and memory corruption in get_net_ns_by_id()", + "cmt_id": "5854ca90c6c6c2ed65355eded45615bf8bcd6fd3" }, - "CVE-2024-24857": { - "cmt_msg": "" + "CVE-2018-18386": { + "cmt_msg": "n_tty: fix EXTPROC vs ICANON interaction with TIOCINQ (aka FIONREAD)", + "cmt_id": "2e3883922530aa25ecc23cc27bab1d3fda779f5a" }, - "CVE-2023-52463": { - "cmt_msg": "efivarfs: force RO when remounting if SetVariable is not supported" + "CVE-2017-17449": { + "cmt_msg": "netlink: Add netns check on taps", + "cmt_id": "f778ce6faa0d4c8d7a90b7bd11c3db7fb687c8cc" + } + }, + "4.4.111": { + "CVE-2017-18075": { + "cmt_msg": "crypto: pcrypt - fix freeing pcrypt instances", + "cmt_id": "3ad85176e78d6671ede52eed588c3588d087b587" + } + }, + "4.4.112": { + "CVE-2017-17741": { + "cmt_msg": "KVM: Fix stack-out-of-bounds read in write_mmio", + "cmt_id": "eb91461daa77eb0ddb4c24aa427051f3669ba1f3" }, - "CVE-2023-7042": { - "cmt_msg": "" + "CVE-2017-5753": { + "cmt_msg": "x86/cpufeatures: Add X86_BUG_SPECTRE_V[12]", + "cmt_id": "caae411b6ee026c7f43d67932e9b5008cf623293" }, - "CVE-2021-26934": { - "cmt_msg": "" + "CVE-2017-1000410": { + "cmt_msg": "Bluetooth: Prevent stack info leak from the EFS element.", + "cmt_id": "0ae86454c435e554d01c51535c3cd4312577cc74" }, - "CVE-2023-47233": { - "cmt_msg": "" + "CVE-2018-5333": { + "cmt_msg": "RDS: null pointer dereference in rds_atomic_free_op", + "cmt_id": "44496521c6bd65a3c525b490c762875a075cf73b" }, - "CVE-2024-23850": { - "cmt_msg": "btrfs: do not ASSERT() if the newly created subvolume already got read" + "CVE-2018-5332": { + "cmt_msg": "RDS: Heap OOB write in rds_message_alloc_sgs()", + "cmt_id": "10d06ed9a1899fcc1ecb7a1573f0f95b92dc470c" }, - "CVE-2024-23851": { - "cmt_msg": "dm: limit the number of targets and parameter size area" + "CVE-2017-13216": { + "cmt_msg": "staging: android: ashmem: fix a race condition in ASHMEM_SET_SIZE ioctl", + "cmt_id": "b4106c55b574fe37900b02ddf89cbe4b9d971392" + } + }, + "4.4.113": { + "CVE-2018-6927": { + "cmt_msg": "futex: Prevent overflow by strengthen input validation", + "cmt_id": "58c82be944f58561e77eb9db5039a4b0eca96ac5" + } + }, + "4.4.114": { + "CVE-2017-16913": { + "cmt_msg": "usbip: fix stub_rx: harden CMD_SUBMIT path to handle malicious input", + "cmt_id": "b6f826ba10dce86f74efd3c0953cb9982a3c51e2" }, - "CVE-2016-8660": { - "cmt_msg": "" + "CVE-2017-16912": { + "cmt_msg": "usbip: fix stub_rx: get_pipe() to validate endpoint number", + "cmt_id": "80e733a9b37fb6b40351bf1924d5a90d89c375ae" }, - "CVE-2023-6270": { - "cmt_msg": "" + "CVE-2017-16911": { + "cmt_msg": "usbip: prevent vhci_hcd driver from leaking a socket pointer address", + "cmt_id": "28f467e0bdda754aa36390fd90b01823f0d3b18d" }, - "CVE-2024-26594": { - "cmt_msg": "ksmbd: validate mech token in session setup" + "CVE-2017-11472": { + "cmt_msg": "ACPICA: Namespace: fix operand cache leak", + "cmt_id": "4c19b00e5588828f0d3198b926efade766dcf2c8" }, - "CVE-2023-5158": { - "cmt_msg": "vringh: don't use vringh_kiov_advance() in vringh_iov_xfer()" + "CVE-2018-1000028": { + "cmt_msg": "nfsd: auth: Fix gid sorting when rootsquash enabled", + "cmt_id": "3f84339bd344b2cf0afe64b78d3964bb6422d0f3" }, - "CVE-2024-26592": { - "cmt_msg": "ksmbd: fix UAF issue in ksmbd_tcp_new_connection()" + "CVE-2017-17448": { + "cmt_msg": "netfilter: nfnetlink_cthelper: Add missing permission checks", + "cmt_id": "a359a437fbc6bb08aa9cc8e25ef4ac3b77ca727b" }, - "CVE-2024-26593": { - "cmt_msg": "i2c: i801: Fix block process call transactions" + "CVE-2017-17450": { + "cmt_msg": "netfilter: xt_osf: Add missing permission checks", + "cmt_id": "d01ceb4722cd8d64176272434fe332b596750d9c" + } + }, + "4.4.115": { + "CVE-2018-5344": { + "cmt_msg": "loop: fix concurrent lo_open/lo_release", + "cmt_id": "b392225467b8066538dfa200dc925c844b76880b" }, - "CVE-2024-26590": { - "cmt_msg": "erofs: fix inconsistent per-file compression format" + "CVE-2018-1000004": { + "cmt_msg": "ALSA: seq: Make ioctls race-free", + "cmt_id": "623e5c8ae32b39cc8baea83478695dc624935318" }, - "CVE-2024-26591": { - "cmt_msg": "bpf: Fix re-attachment branch in bpf_tracing_prog_attach" + "CVE-2017-17862": { + "cmt_msg": "bpf: fix branch pruning logic", + "cmt_id": "1367d854b97493bfb1f3d24cf89ba60cb7f059ea" + } + }, + "4.4.116": { + "CVE-2018-5873": { + "cmt_msg": "nsfs: mark dentry with DCACHE_RCUACCESS", + "cmt_id": "49ffe04fcdf29c8925344bce314d9398b2d7743d" }, - "CVE-2020-15802": { - "cmt_msg": "" + "CVE-2017-8824": { + "cmt_msg": "dccp: CVE-2017-8824: use-after-free in DCCP code", + "cmt_id": "3196c1515ea683bb6f95673feb2998f605ab581d" + }, + "CVE-2017-16538": { + "cmt_msg": "media: dvb-usb-v2: lmedm04: Improve logic checking of warm start", + "cmt_id": "ca48c81cff0e5b56e525414b75990bcb64b7cbb9" }, - "CVE-2024-26597": { - "cmt_msg": "net: qualcomm: rmnet: fix global oob in rmnet_policy" + "CVE-2018-5750": { + "cmt_msg": "ACPI: sbshc: remove raw pointer from printk() message", + "cmt_id": "591060a7a0a09cbaa5b6c04bd309966586aa9d2e" }, - "CVE-2008-2544": { - "cmt_msg": "" + "CVE-2017-13305": { + "cmt_msg": "KEYS: encrypted: fix buffer overread in valid_master_desc()", + "cmt_id": "33813d43dd593e1c32c567c75483233212b825ae" }, - "CVE-2024-26595": { - "cmt_msg": "mlxsw: spectrum_acl_tcam: Fix NULL pointer dereference in error path" + "CVE-2017-18344": { + "cmt_msg": "posix-timer: Properly check sigevent->sigev_notify", + "cmt_id": "77f56f5d39e95a152a755d53b0d870b92fbf466b" + } + }, + "4.4.117": { + "CVE-2018-7566": { + "cmt_msg": "ALSA: seq: Fix racy pool initializations", + "cmt_id": "b374197df2deb08fec55d48763711ea1df8efde7" + } + }, + "4.4.120": { + "CVE-2017-18193": { + "cmt_msg": "f2fs: fix a bug caused by NULL extent tree", + "cmt_id": "023ca5b884d2759b56dc8d480942835881853513" + } + }, + "4.4.121": { + "CVE-2018-5803": { + "cmt_msg": "sctp: verify size of a new chunk in _sctp_make_chunk()", + "cmt_id": "54b183ea4fe96c7b80439971ee04cf634a6e0459" + } + }, + "4.4.122": { + "CVE-2018-1068": { + "cmt_msg": "netfilter: ebtables: CONFIG_COMPAT: don't trust userland offsets", + "cmt_id": "6d31b2ef34fd718386a73c983877461bca58d3db" }, - "CVE-2024-26598": { - "cmt_msg": "KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache" + "CVE-2018-7995": { + "cmt_msg": "x86/MCE: Serialize sysfs changes", + "cmt_id": "e882c0baab3325c409d21edc24254c515d90d160" }, - "CVE-2024-26599": { - "cmt_msg": "pwm: Fix out-of-bounds access in of_pwm_single_xlate()" + "CVE-2018-1065": { + "cmt_msg": "netfilter: add back stackpointer size checks", + "cmt_id": "48db3004d40d97d3ac205d2d64ab580a8cfcfe63" }, - "CVE-2023-52439": { - "cmt_msg": "uio: Fix use-after-free in uio_open" + "CVE-2019-9456": { + "cmt_msg": "usb: usbmon: Read text within supplied buffer size", + "cmt_id": "abe0ecd5597c31c6b70dc347145789000f4cf68f" + } + }, + "4.4.123": { + "CVE-2018-7480": { + "cmt_msg": "blkcg: fix double free of new_blkg in blkcg_init_queue", + "cmt_id": "633a5a5235d697b145171ca1e702d3a4f6778131" }, - "CVE-2023-52438": { - "cmt_msg": "binder: fix use-after-free in shinker's callback" + "CVE-2017-16995": { + "cmt_msg": "bpf: fix incorrect sign extension in check_alu_op()", + "cmt_id": "a6132276ab5dcc38b3299082efeb25b948263adb" + } + }, + "4.4.124": { + "CVE-2017-18222": { + "cmt_msg": "net: hns: fix ethtool_get_strings overflow in hns driver", + "cmt_id": "7d7100094cd83e84ce53c51155ee9f507e2e9028" }, - "CVE-2023-6356": { - "cmt_msg": "" + "CVE-2018-1066": { + "cmt_msg": "CIFS: Enable encryption during session setup phase", + "cmt_id": "26dc7476efad2151aadb7f72c0c8a253823ef289" + } + }, + "4.4.125": { + "CVE-2018-8822": { + "cmt_msg": "staging: ncpfs: memory corruption in ncp_read_kernel()", + "cmt_id": "badf74b65fc27112f5fee871c7ade9199c74b2e1" }, - "CVE-2024-26582": { - "cmt_msg": "net: tls: fix use-after-free with partial reads and async decrypt" + "CVE-2018-8781": { + "cmt_msg": "drm: udl: Properly check framebuffer mmap offsets", + "cmt_id": "224eaa8a8e644e0d3df35fe232b08fd8fead8864" }, - "CVE-2023-52456": { - "cmt_msg": "serial: imx: fix tx statemachine deadlock" + "CVE-2018-1087": { + "cmt_msg": "kvm/x86: fix icebp instruction handling", + "cmt_id": "5e4e65a940c91b61bfaf8d6e4448522577beb5ef" }, - "CVE-2019-15239": { - "cmt_msg": "unknown" + "CVE-2018-8897": { + "cmt_msg": "x86/entry/64: Don't use IST entry for #BP stack", + "cmt_id": "c6fe55e30bb6d431ee56cd4bbb582e30766c5e0e" + } + }, + "4.4.126": { + "CVE-2018-1130": { + "cmt_msg": "dccp: check sk for closed state in dccp_sendmsg()", + "cmt_id": "de31c391673aeb2c1d09552ac75a6b7ee96d65ac" + } + }, + "4.4.127": { + "CVE-2018-1000199": { + "cmt_msg": "perf/hwbp: Simplify the perf-hwbp code, fix documentation", + "cmt_id": "d60017da67463bd7a11a7f7e08115be324afe216" }, - "CVE-2007-3719": { - "cmt_msg": "" + "CVE-2017-17975": { + "cmt_msg": "media: usbtv: prevent double free in error case", + "cmt_id": "607a6b7b6a7ad995c4c9cf3c2df66dc3f4febb52" + } + }, + "4.4.128": { + "CVE-2018-9422": { + "cmt_msg": "futex: Remove requirement for lock_page() in get_futex_key()", + "cmt_id": "93dcb09e29bb24a86aa7b7eff65e424f7dc98af2" }, - "CVE-2023-52434": { - "cmt_msg": "smb: client: fix potential OOBs in smb2_parse_contexts()" + "CVE-2018-7757": { + "cmt_msg": "scsi: libsas: fix memory leak in sas_smp_get_phy_events()", + "cmt_id": "92b72d2f84389e27d81c93beaf9093f8cf1ef449" + } + }, + "4.4.129": { + "CVE-2018-1092": { + "cmt_msg": "ext4: fail ext4_iget for root directory if unallocated", + "cmt_id": "990251318b97ed7153d9adbf633035536c7d685b" + } + }, + "4.4.130": { + "CVE-2018-10940": { + "cmt_msg": "cdrom: information leak in cdrom_ioctl_media_changed()", + "cmt_id": "e47611257d7b46bfdc70726a8a236881180cf990" + } + }, + "4.4.131": { + "CVE-2018-9415": { + "cmt_msg": "ARM: amba: Fix race condition with driver_override", + "cmt_id": "7488404d3bab4eccb590c80c8827520394444630" }, - "CVE-2023-52436": { - "cmt_msg": "f2fs: explicitly null-terminate the xattr list" + "CVE-2018-9385": { + "cmt_msg": "ARM: amba: Don't read past the end of sysfs \"driver_override\" buffer", + "cmt_id": "30a80ca6dbbda67b0c902448993ed6a35b52612a" }, - "CVE-2023-20941": { - "cmt_msg": "" + "CVE-2018-1093": { + "cmt_msg": "ext4: add validity checks for bitmap block numbers", + "cmt_id": "ea057aed06d8f13d931652bc4faa604ac0c50aa2" + } + }, + "4.4.132": { + "CVE-2017-18257": { + "cmt_msg": "f2fs: fix a dead loop in f2fs_fiemap()", + "cmt_id": "0678adf8f8a99c66c48c608ea9a79588743bc615" }, - "CVE-2024-26586": { - "cmt_msg": "mlxsw: spectrum_acl_tcam: Fix stack corruption" + "CVE-2017-18255": { + "cmt_msg": "perf/core: Fix the perf_cpu_time_max_percent check", + "cmt_id": "609124d60341bf8870318c201cec50548824f2e2" + } + }, + "4.4.133": { + "CVE-2018-5814": { + "cmt_msg": "usbip: usbip_host: fix NULL-ptr deref and use-after-free errors", + "cmt_id": "02995a5882371a9fca3033fd356598a805d46040" }, - "CVE-2023-21400": { - "cmt_msg": "" + "CVE-2018-10087": { + "cmt_msg": "kernel/exit.c: avoid undefined behaviour when calling wait4()", + "cmt_id": "ea00b22b02f228cb58ee6c6707c86ec270e37fba" }, - "CVE-2024-26589": { - "cmt_msg": "bpf: Reject variable offset alu on PTR_TO_FLOW_KEYS" + "CVE-2018-10021": { + "cmt_msg": "scsi: libsas: defer ata device eh commands to libata", + "cmt_id": "6efcc74e1b0c16aebf5d8107543ce63475af35c1" }, - "CVE-2023-2640": { - "cmt_msg": "" + "CVE-2018-1000204": { + "cmt_msg": "scsi: sg: allocate with __GFP_ZERO in sg_build_indirect()", + "cmt_id": "93314640426ddb6af618d0802e622f6fa771792c" + } + }, + "4.4.134": { + "CVE-2018-10124": { + "cmt_msg": "kernel/signal.c: avoid undefined behaviour in kill_something_info", + "cmt_id": "cb1c92e55420dad73ce717ef4029dd6e984dcbd0" }, - "CVE-2023-6915": { - "cmt_msg": "ida: Fix crash in ida_free when the bitmap is empty" + "CVE-2018-9518": { + "cmt_msg": "NFC: llcp: Limit size of SDP URI", + "cmt_id": "50e54d56744cda70a1c3bc980c56e461ecde3a6d" }, - "CVE-2010-4563": { - "cmt_msg": "" + "CVE-2017-13695": { + "cmt_msg": "ACPICA: acpi: acpica: fix acpi operand cache leak in nseval.c", + "cmt_id": "dfcb739c20d88461fbd0dc007670f63ad82db881" }, - "CVE-2020-26140": { - "cmt_msg": "" + "CVE-2018-6412": { + "cmt_msg": "fbdev: Fixing arbitrary kernel leak in case FBIOGETCMAP_SPARC in sbusfb_ioctl_helper().", + "cmt_id": "bfffc2c3f56b462cdf5eeea639d898a69b323001" + } + }, + "4.4.137": { + "CVE-2019-18675": { + "cmt_msg": "mmap: introduce sane default mmap limits", + "cmt_id": "bd2f9ce5bacb15ad54fc6c345480c4df0c76c3ee" + } + }, + "4.4.139": { + "CVE-2018-13406": { + "cmt_msg": "video: uvesafb: Fix integer overflow in allocation", + "cmt_id": "842803e4a66bd2a0b663dae18b80535a575d427f" + } + }, + "4.4.140": { + "CVE-2018-10878": { + "cmt_msg": "ext4: always check block group bounds in ext4_init_block_bitmap()", + "cmt_id": "afa9c75025bd1e24ccdc56fa331e865b626769e6" }, - "CVE-2020-26143": { - "cmt_msg": "" + "CVE-2018-9516": { + "cmt_msg": "HID: debug: check length before copy_to_user()", + "cmt_id": "ef111ea31575bdc50c0c914fe036a1d0ad0cae4e" }, - "CVE-2020-26142": { - "cmt_msg": "" + "CVE-2017-13168": { + "cmt_msg": "scsi: sg: mitigate read/write abuse", + "cmt_id": "9a737329c7c4a341009b7398164db8fa8e5358f0" }, - "CVE-2024-23849": { - "cmt_msg": "net/rds: Fix UBSAN: array-index-out-of-bounds in rds_cmsg_recv" + "CVE-2018-10877": { + "cmt_msg": "ext4: verify the depth of extent tree in ext4_find_extent()", + "cmt_id": "353ebd3e98869b50ed47364d05acdf679c2c05c6" }, - "CVE-2024-23848": { - "cmt_msg": "" + "CVE-2018-10876": { + "cmt_msg": "ext4: only look at the bg_flags field if it is valid", + "cmt_id": "db3b00e3f392e9f879f7fd202437e68f90f35765" }, - "CVE-2023-46838": { - "cmt_msg": "xen-netback: don't produce zero-size SKB frags" + "CVE-2018-10879": { + "cmt_msg": "ext4: make sure bitmaps and the inode table don't overlap with bg descriptors", + "cmt_id": "b7d29dc8fe8d23243d3d87109099bdc34a684712" }, - "CVE-2023-4622": { - "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES" + "CVE-2018-10881": { + "cmt_msg": "ext4: clear i_data in ext4_inode_info when removing inline data", + "cmt_id": "b88fc699a023e0ef86f647c3d48a17d7cfff1f2a" }, - "CVE-2024-26583": { - "cmt_msg": "tls: fix race between async notify and socket close" + "CVE-2018-10882": { + "cmt_msg": "ext4: add more inode number paranoia checks", + "cmt_id": "ff6c96461be35381399466ad58f02b8d78ab480a" }, - "CVE-2022-3533": { - "cmt_msg": "" + "CVE-2018-10883": { + "cmt_msg": "jbd2: don't mark block as modified if the handle is out of credits", + "cmt_id": "2cd33a53177ce739fe5f68052b2a737f1c40b425" + } + }, + "4.4.141": { + "CVE-2018-13405": { + "cmt_msg": "Fix up non-directory creation in SGID directories", + "cmt_id": "e71dbad7563db674f91af9e12ef592c107d0c2cd" }, - "CVE-2024-26585": { - "cmt_msg": "tls: fix race between tx work scheduling and socket close" + "CVE-2018-16276": { + "cmt_msg": "USB: yurex: fix out-of-bounds uaccess in read handler", + "cmt_id": "2638a67a0c50a97e0564491325c24c2c12083dbb" + } + }, + "4.4.143": { + "CVE-2017-18216": { + "cmt_msg": "ocfs2: subsystem.su_mutex is required while accessing the item->ci_parent", + "cmt_id": "b9e22bd82856a794986d75bb3bb585b8bfbf4d99" + } + }, + "4.4.144": { + "CVE-2017-5754": { + "cmt_msg": "x86/cpufeatures: Add Intel feature bits for Speculation Control", + "cmt_id": "7169b43e7c68edd550efa812c295685947ffa8a0" }, - "CVE-2024-26584": { - "cmt_msg": "net: tls: handle backlogging of crypto requests" + "CVE-2018-3639": { + "cmt_msg": "x86/nospec: Simplify alternative_msr_write()", + "cmt_id": "b2dab2dc776cea8e1f190523456b32b850506ce3" }, - "CVE-2024-26587": { - "cmt_msg": "net: netdevsim: don't try to destroy PHC on VFs" + "CVE-2018-10902": { + "cmt_msg": "ALSA: rawmidi: Change resized buffers atomically", + "cmt_id": "01b6ca65e10f2669965fbc62440cb9b09a25d086" + } + }, + "4.4.146": { + "CVE-2018-14734": { + "cmt_msg": "infiniband: fix a possible use-after-free bug", + "cmt_id": "52175c849bd4c01dd14038b4401d5044d99a6b0a" + } + }, + "4.4.147": { + "CVE-2018-12233": { + "cmt_msg": "jfs: Fix inconsistency between memory allocation and ea_buf->max_size", + "cmt_id": "0749d5b3ec62310b747751ea7d4d5ccca51bc80f" + } + }, + "4.4.148": { + "CVE-2018-15572": { + "cmt_msg": "x86/speculation: Protect against userspace-userspace spectreRSB", + "cmt_id": "7744abbe29a59db367f59b0c9890356732f25a3b" + } + }, + "4.4.149": { + "CVE-2018-9363": { + "cmt_msg": "Bluetooth: hidp: buffer overflow in hidp_process_report", + "cmt_id": "17c1e0b1f6a161cc4f533d4869ff574273dbfe8d" + } + }, + "4.4.152": { + "CVE-2018-3693": { + "cmt_msg": "ext4: fix spectre gadget in ext4_mb_regular_allocator()", + "cmt_id": "a89f83823b97b6da1ecf7a51184b28822e78cc07" + } + }, + "4.4.154": { + "CVE-2018-10938": { + "cmt_msg": "Cipso: cipso_v4_optptr enter infinite loop", + "cmt_id": "8ed0ff83f5fd0ca412a52bd71af332598c01ca46" }, - "CVE-2022-1247": { - "cmt_msg": "" + "CVE-2018-16658": { + "cmt_msg": "cdrom: Fix info leak/OOB read in cdrom_ioctl_drive_status", + "cmt_id": "eb08a285899df82056f712421988c6ccd0b58ba6" + } + }, + "4.4.155": { + "CVE-2019-12881": { + "cmt_msg": "drm/i915/userptr: reject zero user_size", + "cmt_id": "182e963432d867384f2e55487ec60ca7a9f99cd1" + } + }, + "4.4.156": { + "CVE-2018-6554": { + "cmt_msg": "staging: irda: remove the irda network stack and drivers", + "cmt_id": "4a7811bb3ae10d76d9e76c2b0ce7b27bc02a9370" }, - "CVE-2023-51782": { - "cmt_msg": "net/rose: Fix Use-After-Free in rose_ioctl" + "CVE-2018-6555": { + "cmt_msg": "staging: irda: remove the irda network stack and drivers", + "cmt_id": "131a3b82c853483b1809cad06f8997421dd49500" }, - "CVE-2024-26588": { - "cmt_msg": "LoongArch: BPF: Prevent out-of-bounds memory access" + "CVE-2018-14617": { + "cmt_msg": "hfsplus: fix NULL dereference in hfsplus_lookup()", + "cmt_id": "fed5bd3352a3fbf9494449ffee3b4bab5e8cc3a6" }, - "CVE-2023-51780": { - "cmt_msg": "atm: Fix Use-After-Free in do_vcc_ioctl" + "CVE-2018-14609": { + "cmt_msg": "btrfs: relocation: Only remove reloc rb_trees if reloc control has been initialized", + "cmt_id": "510825b3f8c1f5dc29b81660e1eb68e7fb0b8d50" + } + }, + "4.4.157": { + "CVE-2018-17182": { + "cmt_msg": "mm: get rid of vmacache_flush_all() entirely", + "cmt_id": "88d6918401a4ecdc50fe77df3e1e77c1e49d8579" + } + }, + "4.4.159": { + "CVE-2018-20511": { + "cmt_msg": "net/appletalk: fix minor pointer leak to userspace in SIOCFINDIPDDPRT", + "cmt_id": "fee0d234419708192925c9e25a461f1f43dab24f" }, - "CVE-2023-51781": { - "cmt_msg": "appletalk: Fix Use-After-Free in atalk_ioctl" + "CVE-2018-14633": { + "cmt_msg": "scsi: target: iscsi: Use hex2bin instead of a re-implementation", + "cmt_id": "afba6121b3b7e1737b7e7dafbf6b7eafbcdc659c" + } + }, + "4.4.160": { + "CVE-2018-17972": { + "cmt_msg": "proc: restrict kernel stack dumps to root", + "cmt_id": "574757073482f77ec10caea5e57726190a2837fa" }, - "CVE-2020-10708": { - "cmt_msg": "" + "CVE-2019-9458": { + "cmt_msg": "media: v4l: event: Prevent freeing event subscriptions while accessed", + "cmt_id": "bbbc4dabca5d51c608b0fd608eb3cd8659266653" }, - "CVE-2023-6121": { - "cmt_msg": "nvmet: nul-terminate the NQNs passed in the connect command" + "CVE-2018-7755": { + "cmt_msg": "floppy: Do not copy a kernel pointer to user memory in FDGETPRM ioctl", + "cmt_id": "ef0a9f76fda4a7ffce6ceee5abdd554a719e8bd8" }, - "CVE-2022-4543": { - "cmt_msg": "" + "CVE-2018-13053": { + "cmt_msg": "alarmtimer: Prevent overflow for relative nanosleep", + "cmt_id": "2e17841715313cab2464b3b6360a289a1cb2744b" }, - "CVE-2017-13693": { - "cmt_msg": "" + "CVE-2018-18021": { + "cmt_msg": "arm64: KVM: Tighten guest core register access from userspace", + "cmt_id": "14a65511bc7c1eec560764fe53018b0765fb8d2d" }, - "CVE-2021-0399": { - "cmt_msg": "" + "CVE-2018-10880": { + "cmt_msg": "ext4: never move the system.data xattr out of the inode body", + "cmt_id": "cd3d6463759d21f4093d3434effacc358dd0caf8" + } + }, + "4.4.163": { + "CVE-2018-18281": { + "cmt_msg": "mremap: properly flush TLB before releasing the page", + "cmt_id": "2e3ae534fb98c7a6a5cf3e80a190181154328f80" + } + }, + "4.4.164": { + "CVE-2018-18710": { + "cmt_msg": "cdrom: fix improper type cast, which can leat to information leak.", + "cmt_id": "661aa0b46dfb23700b569ac319b95e0b0154832f" + } + }, + "4.4.167": { + "CVE-2019-2024": { + "cmt_msg": "media: em28xx: Fix use-after-free when disconnecting", + "cmt_id": "4de120cba4ed4ef009edb2b17b2fa21b679b00b2" }, - "CVE-2017-13694": { - "cmt_msg": "" + "CVE-2018-19824": { + "cmt_msg": "ALSA: usb-audio: Fix UAF decrement if card has no live interfaces in card.c", + "cmt_id": "82fa3e95432f95254fd07556c55b1018145e1439" }, - "CVE-2023-42754": { - "cmt_msg": "ipv4: fix null-deref in ipv4_link_failure" + "CVE-2018-16862": { + "cmt_msg": "mm: cleancache: fix corruption on missed inode invalidation", + "cmt_id": "78b572c9e3a1b7edf46da17ad96a86110dd65fe8" }, - "CVE-2023-42756": { - "cmt_msg": "netfilter: ipset: Fix race between IPSET_CMD_CREATE and IPSET_CMD_SWAP" + "CVE-2018-20169": { + "cmt_msg": "USB: check usb_get_extra_descriptor for proper size", + "cmt_id": "c380600bf71c35dc23aa0c3628a1013ec10cb349" + } + }, + "4.4.168": { + "CVE-2018-1120": { + "cmt_msg": "proc: do not access cmdline nor environ from file-backed areas", + "cmt_id": "adc143b97d06a3305707726e69b4247db050cb88" }, - "CVE-2024-0564": { - "cmt_msg": "" + "CVE-2018-5953": { + "cmt_msg": "printk: hash addresses printed with %p", + "cmt_id": "c873dfa0ccbdb08e9fb42f497503e148f79cdebb" }, - "CVE-2012-4542": { - "cmt_msg": "" + "CVE-2018-5848": { + "cmt_msg": "wil6210: missing length check in wmi_set_ie", + "cmt_id": "e47b9b2b005ab8b1b83bc0ac4aa2803cba57182a" }, - "CVE-2023-4881": { - "cmt_msg": "netfilter: nftables: exthdr: fix 4-byte stack OOB write" + "CVE-2018-12896": { + "cmt_msg": "posix-timers: Sanitize overrun handling", + "cmt_id": "954648ebf8e27fcbf23b7954b79a22a5cacc83b1" + } + }, + "4.4.169": { + "CVE-2017-18241": { + "cmt_msg": "f2fs: fix a panic caused by NULL flush_cmd_control", + "cmt_id": "0fd7726d69afb0b61817f8d51e80f385cbfb2b10" + } + }, + "4.4.170": { + "CVE-2019-15927": { + "cmt_msg": "ALSA: usb-audio: Avoid access before bLength check in build_audio_procunit()", + "cmt_id": "a5e09a908ea3c64bf522822b7923d2d8fc1a7af2" }, - "CVE-2013-7445": { - "cmt_msg": "" + "CVE-2019-6133": { + "cmt_msg": "fork: record start_time late", + "cmt_id": "d447cf0ceefa01ee9203145d011eedca6e1194e6" }, - "CVE-2023-34324": { - "cmt_msg": "xen/events: replace evtchn_rwlock with RCU" + "CVE-2018-19985": { + "cmt_msg": "USB: hso: Fix OOB memory access in hso_probe/hso_get_config_data", + "cmt_id": "8846b1dbfd2146b145d73ba31a4caa4a4789aefb" + } + }, + "4.4.171": { + "CVE-2018-16884": { + "cmt_msg": "sunrpc: use-after-free in svc_process_common()", + "cmt_id": "9615b6aeccbfb233fd672107aa6885bf039c3de3" }, - "CVE-2024-24859": { - "cmt_msg": "" + "CVE-2018-14611": { + "cmt_msg": "btrfs: validate type when reading a chunk", + "cmt_id": "50962a7b4877f26d1f3f49cd77ad1814a9e81bac" }, - "CVE-2024-24858": { - "cmt_msg": "" + "CVE-2018-14610": { + "cmt_msg": "btrfs: Check that each block group has corresponding chunk at mount time", + "cmt_id": "ee5e37a26791f9c842b3298e594c6e3c93bb1355" }, - "CVE-2005-3660": { - "cmt_msg": "" + "CVE-2018-14613": { + "cmt_msg": "btrfs: tree-checker: Verify block_group_item", + "cmt_id": "ae94efaf2b609e811bce6280d5c88cf557cd1238" }, - "CVE-2024-24855": { - "cmt_msg": "scsi: lpfc: Fix a possible data race in lpfc_unregister_fcf_rescan()" + "CVE-2018-14612": { + "cmt_msg": "btrfs: tree-checker: Detect invalid and empty essential trees", + "cmt_id": "42d263820480ab1f7eba54590f2c7283b3428723" + } + }, + "4.4.172": { + "CVE-2018-14616": { + "cmt_msg": "f2fs: fix to do sanity check with block address in main area v2", + "cmt_id": "4901e126b6e1677c90d3c0a668193e52ecdd4971" }, - "CVE-2023-31085": { - "cmt_msg": "ubi: Refuse attaching if mtd's erasesize is 0" + "CVE-2018-13096": { + "cmt_msg": "f2fs: fix to do sanity check with node footer and iblocks", + "cmt_id": "cbe5e5cd70c0f6fd187114e7f146f29830fedf9c" }, - "CVE-2023-6238": { - "cmt_msg": "" + "CVE-2018-13097": { + "cmt_msg": "f2fs: fix to do sanity check with user_block_count", + "cmt_id": "b31ccde086671b372957e1fe1c60968e6d7464d7" }, - "CVE-2023-31083": { - "cmt_msg": "Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO" + "CVE-2018-14614": { + "cmt_msg": "f2fs: fix to do sanity check with cp_pack_start_sum", + "cmt_id": "98beb84af7212a2ba50370497e569ae3f61b1c8b" }, - "CVE-2023-31082": { - "cmt_msg": "" + "CVE-2018-13099": { + "cmt_msg": "f2fs: fix to do sanity check with reserved blkaddr of inline inode", + "cmt_id": "3bfe2049c222b23342ff2a216cd5a869e8a14897" }, - "CVE-2023-31081": { - "cmt_msg": "" + "CVE-2018-13100": { + "cmt_msg": "f2fs: fix to do sanity check with secs_per_zone", + "cmt_id": "056120a8c192871c558e742f83ae18bf8721d97c" }, - "CVE-2022-38096": { - "cmt_msg": "" + "CVE-2019-3701": { + "cmt_msg": "can: gw: ensure DLC boundaries after CAN frame modification", + "cmt_id": "693ae291197429f404e7d9c191e1541f61925278" }, - "CVE-2022-3544": { - "cmt_msg": "" + "CVE-2018-18690": { + "cmt_msg": "xfs: don't fail when converting shortform attr to long form during ATTR_REPLACE", + "cmt_id": "f00ebf4f84ed2e9344743d86e274ff77269df02a" }, - "CVE-2024-1151": { - "cmt_msg": "net: openvswitch: limit the number of recursions from action sets" + "CVE-2017-18249": { + "cmt_msg": "f2fs: fix race condition in between free nid allocator/initializer", + "cmt_id": "a4f4f97573bfb057bbc30696d803cc37ed629d02" }, - "CVE-2023-6606": { - "cmt_msg": "smb: client: fix OOB in smbCalcSize()" + "CVE-2020-10769": { + "cmt_msg": "crypto: authenc - fix parsing key with misaligned rta_len", + "cmt_id": "461652efc1545a1a074bf0df826dcd3bce520db4" + } + }, + "4.4.174": { + "CVE-2018-5391": { + "cmt_msg": "ip: discard IPv4 datagrams with overlapping segments.", + "cmt_id": "ef0f963de1d2c5bc99d3d6ace3dd44a7d6002717" + } + }, + "4.4.175": { + "CVE-2019-7222": { + "cmt_msg": "KVM: x86: work around leak of uninitialized stack contents (CVE-2019-7222)", + "cmt_id": "1b5fd913a4eb07cb13e969bb8e3b1633a40e683f" }, - "CVE-2024-23307": { - "cmt_msg": "" + "CVE-2019-7221": { + "cmt_msg": "KVM: nVMX: unconditionally cancel preemption timer in free_nested (CVE-2019-7221)", + "cmt_id": "9872ddae1949b46d5310e0e71ca26bb5c4e52a70" + } + }, + "4.4.176": { + "CVE-2019-6974": { + "cmt_msg": "kvm: fix kvm_ioctl_create_device() reference counting (CVE-2019-6974)", + "cmt_id": "bc4db52485cc6edfd6861417d178bb71f743ced7" + } + }, + "4.4.177": { + "CVE-2019-16995": { + "cmt_msg": "net: hsr: fix memory leak in hsr_dev_finalize()", + "cmt_id": "453e3b319d28f2023d45073e6eb30c5efa2fd06b" }, - "CVE-2023-5197": { - "cmt_msg": "netfilter: nf_tables: disallow rule removal from chain binding" + "CVE-2019-9455": { + "cmt_msg": "media: videobuf2-v4l2: drop WARN_ON in vb2_warn_zero_bytesused()", + "cmt_id": "7b5115689bf9dafc5127b28ace4589f698d4adfa" }, - "CVE-2022-3238": { - "cmt_msg": "" + "CVE-2019-25160": { + "cmt_msg": "netlabel: fix out-of-bounds memory accesses", + "cmt_id": "dc18101f95fa6e815f426316b8b9a5cee28a334e" }, - "CVE-2008-4609": { - "cmt_msg": "" + "CVE-2019-2101": { + "cmt_msg": "media: uvcvideo: Fix 'type' check leading to overflow", + "cmt_id": "bba078c9fc3c7e44370f870d97c5eed64f6c5d1f" }, - "CVE-2020-14304": { - "cmt_msg": "" + "CVE-2019-16413": { + "cmt_msg": "9p: use inode->i_lock to protect i_size_write() under 32-bit", + "cmt_id": "f289ac1f6eb2d024793732ddb629595ab85674b7" }, - "CVE-2023-6931": { - "cmt_msg": "perf: Fix perf_event_validate_size()" + "CVE-2019-12818": { + "cmt_msg": "net: nfc: Fix NULL dereference on nfc_llcp_build_tlv fails", + "cmt_id": "6e7339d5ee302fcbfe8ef29c058cc85c360849b9" }, - "CVE-2023-6932": { - "cmt_msg": "ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet" + "CVE-2019-12819": { + "cmt_msg": "mdio_bus: Fix use-after-free on device_register fails", + "cmt_id": "a1b4ace43842791d908a8837304031e439c2ea39" }, - "CVE-2020-0347": { - "cmt_msg": "" + "CVE-2019-15916": { + "cmt_msg": "net-sysfs: Fix mem leak in netdev_register_kobject", + "cmt_id": "d28a029290fd80e9fb40850eb6eb2b7281f1f007" }, - "CVE-2024-0607": { - "cmt_msg": "netfilter: nf_tables: fix pointer math issue in nft_byteorder_eval()" + "CVE-2019-9213": { + "cmt_msg": "mm: enforce min addr even if capable() in expand_downwards()", + "cmt_id": "40952b6a649b9bfad11ae4fa2862fa0108c9ec24" + } + }, + "4.4.178": { + "CVE-2019-3459": { + "cmt_msg": "Bluetooth: Verify that l2cap_get_conf_opt provides large enough buffer", + "cmt_id": "ade4560e4fea198866e033fe1c02f063d6d7db2e" }, - "CVE-2021-3714": { - "cmt_msg": "" + "CVE-2019-20054": { + "cmt_msg": "fs/proc/proc_sysctl.c: fix NULL pointer dereference in put_links", + "cmt_id": "6271fa6fc366827c0249864157e8fd18c4eac68a" }, - "CVE-2019-12456": { - "cmt_msg": "" + "CVE-2019-3460": { + "cmt_msg": "Bluetooth: Check L2CAP option sizes returned from l2cap_get_conf_opt", + "cmt_id": "d22036003893cbe479404e20fdae10addc6c18dd" + } + }, + "4.4.179": { + "CVE-2019-9454": { + "cmt_msg": "i2c: core-smbus: prevent stack corruption on read I2C_BLOCK_DATA", + "cmt_id": "02bfc06ca2fa1158d6cd2e5688bfc4ef278d8425" }, - "CVE-2020-26560": { - "cmt_msg": "" + "CVE-2019-11486": { + "cmt_msg": "tty: mark Siemens R3964 line discipline as BROKEN", + "cmt_id": "c3e76f072adbcc426fbeef5d7469f847a2f700d6" }, - "CVE-2021-3892": { - "cmt_msg": "" + "CVE-2019-15214": { + "cmt_msg": "ALSA: core: Fix card races between register and disconnect", + "cmt_id": "f94135f92d97d85444691bcc4f79784d995a5458" }, - "CVE-2024-0841": { - "cmt_msg": "" + "CVE-2017-18551": { + "cmt_msg": "i2c: core-smbus: prevent stack corruption on read I2C_BLOCK_DATA", + "cmt_id": "02bfc06ca2fa1158d6cd2e5688bfc4ef278d8425" }, - "CVE-2024-26596": { - "cmt_msg": "net: dsa: fix netdev_priv() dereference before check on non-DSA netdevice events" + "CVE-2019-15292": { + "cmt_msg": "appletalk: Fix use-after-free in atalk_proc_exit", + "cmt_id": "d49a75f5add4543eb138fb0a8fe0560fb276352e" }, - "CVE-2023-4921": { - "cmt_msg": "net: sched: sch_qfq: Fix UAF in qfq_dequeue()" + "CVE-2019-11190": { + "cmt_msg": "binfmt_elf: switch to new creds when switching to new mm", + "cmt_id": "1eb40df35d99f353e7bdfcbb21f249428ec0f4b6" }, - "CVE-2024-24860": { - "cmt_msg": "Bluetooth: Fix atomicity violation in {min,max}_key_size_set" + "CVE-2019-11810": { + "cmt_msg": "scsi: megaraid_sas: return error when create DMA pool failed", + "cmt_id": "09a6db51dcb41990fe020e45af8b2e44010fc1e7" }, - "CVE-2024-24861": { - "cmt_msg": "" + "CVE-2019-11815": { + "cmt_msg": "net: rds: force to destroy connection if t_sock is NULL in rds_tcp_kill_sock().", + "cmt_id": "c4e97b06cfdc5213494c22dd5c2b41ff8b15e0ee" }, - "CVE-2024-24864": { - "cmt_msg": "" + "CVE-2019-10639": { + "cmt_msg": "netns: provide pure entropy for net_hash_mix()", + "cmt_id": "0ede14314f6d9e6a172eb4c4b6b9fe5477aa70bc" + } + }, + "4.4.180": { + "CVE-2018-20836": { + "cmt_msg": "scsi: libsas: fix a race condition when smp task timeout", + "cmt_id": "fe3f6511c9af47847e3547c1525de290a3d908eb" }, - "CVE-2023-37454": { - "cmt_msg": "" + "CVE-2019-3882": { + "cmt_msg": "vfio/type1: Limit DMA mappings per container", + "cmt_id": "e1a5cdbf7cb32a168d37a4804379b9b70d31b39b" }, - "CVE-2023-5972": { - "cmt_msg": "nf_tables: fix NULL pointer dereference in nft_expr_inner_parse()" + "CVE-2019-11884": { + "cmt_msg": "Bluetooth: hidp: fix buffer overflow", + "cmt_id": "dd150bcc93ffaa80ca67d5a71d7850fffe5eb549" }, - "CVE-2023-46813": { - "cmt_msg": "x86/sev: Check for user-space IOIO pointing to kernel space" + "CVE-2019-10142": { + "cmt_msg": "drivers/virt/fsl_hypervisor.c: prevent integer overflow in ioctl", + "cmt_id": "9db489ed49711d1575f631b68aaa911d3b6198f9" }, - "CVE-2023-50431": { - "cmt_msg": "accel/habanalabs: fix information leak in sec_attest_info()" + "CVE-2019-15216": { + "cmt_msg": "USB: yurex: Fix protection fault after device removal", + "cmt_id": "438b075fc77d63472892df735fe2a27d3f23dcbf" + } + }, + "4.4.181": { + "CVE-2020-10720": { + "cmt_msg": "net-gro: fix use-after-free read in napi_gro_frags()", + "cmt_id": "4f9c73aa293051359ef1f2f6d816895ab50c9f3e" }, - "CVE-2022-3642": { - "cmt_msg": "" + "CVE-2018-20510": { + "cmt_msg": "binder: replace \"%p\" with \"%pK\"", + "cmt_id": "c53c1a821d62eb8476425ebe79c0c0054ab45315" }, - "CVE-2023-52464": { - "cmt_msg": "EDAC/thunderx: Fix possible out-of-bounds string access" + "CVE-2019-15219": { + "cmt_msg": "USB: sisusbvga: fix oops in error path of sisusb_probe", + "cmt_id": "30e66d7d2fb978f7b59fbf6106bdc1092acbb7ef" }, - "CVE-2023-52462": { - "cmt_msg": "bpf: fix check for attempt to corrupt spilled pointer" + "CVE-2019-15218": { + "cmt_msg": "media: usb: siano: Fix general protection fault in smsusb", + "cmt_id": "b1782be70e1e281216f58ba283a0e55ad6364aaf" }, - "CVE-2011-4917": { - "cmt_msg": "" + "CVE-2019-15666": { + "cmt_msg": "xfrm: policy: Fix out-of-bound array accesses in __xfrm_policy_unlink", + "cmt_id": "86040d722b29976dfef0ef2b68eab832c358d04b" }, - "CVE-2023-52447": { - "cmt_msg": "bpf: Defer the free of inner map when necessary" + "CVE-2019-15212": { + "cmt_msg": "USB: rio500: refuse more than one device at a time", + "cmt_id": "b92be99a0c8b2c1c66fe37f1fb21ef069c7732f1" }, - "CVE-2019-15902": { - "cmt_msg": "unknown" + "CVE-2019-9466": { + "cmt_msg": "brcmfmac: add subtype check for event handling in data path", + "cmt_id": "4e06554db5e5c3d693141b84aba3a4f29b7d9ef5" }, - "CVE-2024-25739": { - "cmt_msg": "" + "CVE-2019-11833": { + "cmt_msg": "ext4: zero out the unused memory region in the extent tree block", + "cmt_id": "98529ecd313bbeff006930056dad26529510054f" }, - "CVE-2023-6531": { - "cmt_msg": "io_uring/af_unix: disable sending io_uring over sockets" + "CVE-2019-9503": { + "cmt_msg": "brcmfmac: add subtype check for event handling in data path", + "cmt_id": "4e06554db5e5c3d693141b84aba3a4f29b7d9ef5" }, - "CVE-2019-15290": { - "cmt_msg": "" + "CVE-2018-1000026": { + "cmt_msg": "bnx2x: disable GSO where gso_size is too big for hardware", + "cmt_id": "c55a2cffa5caaf72db415558f8058f995578a773" }, - "CVE-2023-6535": { - "cmt_msg": "" + "CVE-2019-19966": { + "cmt_msg": "media: cpia2: Fix use-after-free in cpia2_exit", + "cmt_id": "a04e71a0dbc62083bd31ae4d252d2c07a0035e4a" + } + }, + "4.4.182": { + "CVE-2019-11479": { + "cmt_msg": "tcp: add tcp_min_snd_mss sysctl", + "cmt_id": "e757d052f3b8ce739d068a1e890643376c16b7a9" }, - "CVE-2023-6536": { - "cmt_msg": "" + "CVE-2019-11478": { + "cmt_msg": "tcp: tcp_fragment() should apply sane memory limits", + "cmt_id": "ad472d3a9483abc155e1644ad740cd8c039b5170" }, - "CVE-2023-52446": { - "cmt_msg": "bpf: Fix a race condition between btf_put() and map_free()" + "CVE-2019-11477": { + "cmt_msg": "tcp: limit payload size of sacked skbs", + "cmt_id": "4657ee0fe05e15ab572b157f13a82e080d4b7d73" + } + }, + "4.4.183": { + "CVE-2019-11599": { + "cmt_msg": "coredump: fix race condition between mmget_not_zero()/get_task_mm() and core dumping", + "cmt_id": "8f6345a11caae324ad36abca8723a5710d099a85" }, - "CVE-2023-6622": { - "cmt_msg": "netfilter: nf_tables: bail out on mismatching dynset and set expressions" + "CVE-2019-3892": { + "cmt_msg": "coredump: fix race condition between mmget_not_zero()/get_task_mm() and core dumping", + "cmt_id": "8f6345a11caae324ad36abca8723a5710d099a85" }, - "CVE-2018-17977": { - "cmt_msg": "" + "CVE-2019-15807": { + "cmt_msg": "scsi: libsas: delete sas port if expander discover failed", + "cmt_id": "39c7c903c63db10c99b1083ea9a688f63fb2c4a7" + } + }, + "4.4.185": { + "CVE-2019-13272": { + "cmt_msg": "ptrace: Fix ->ptracer_cred handling for PTRACE_TRACEME", + "cmt_id": "54562d2b0be5c120b01c8bb94baef1aca37fd329" }, - "CVE-2022-26878": { - "cmt_msg": "" + "CVE-2018-16597": { + "cmt_msg": "ovl: modify ovl_permission() to do checks on two inodes", + "cmt_id": "b24be4acd17a8963a29b2a92e1d80b9ddf759c95" }, - "CVE-2022-41848": { - "cmt_msg": "" + "CVE-2019-0136": { + "cmt_msg": "mac80211: drop robust management frames from unknown TA", + "cmt_id": "c7c680979b503a1bb64ee26ffa34207f886090ab" }, - "CVE-2022-1116": { - "cmt_msg": "" + "CVE-2019-9506": { + "cmt_msg": "Bluetooth: Fix faulty expression for minimum encryption key size check", + "cmt_id": "993699d9de09097e2bfd49100b8904774e5304fb" + } + }, + "4.4.186": { + "CVE-2019-10126": { + "cmt_msg": "mwifiex: Fix heap overflow in mwifiex_uap_parse_tail_ies()", + "cmt_id": "3a611df229a90247c9a5159d136c60f4008c29a2" }, - "CVE-2010-5321": { - "cmt_msg": "" + "CVE-2019-3846": { + "cmt_msg": "mwifiex: Fix possible buffer overflows at parsing bss descriptor", + "cmt_id": "5d43b417e60ab25984fc7c41175f3ce8cee992bd" + } + }, + "4.4.187": { + "CVE-2019-13631": { + "cmt_msg": "Input: gtco - bounds check collection indent level", + "cmt_id": "3ca20e950203a6c7759186ec4e89cbd33ee2bf81" }, - "CVE-2018-12930": { - "cmt_msg": "" + "CVE-2019-20934": { + "cmt_msg": "sched/fair: Don't free p->numa_faults with concurrent readers", + "cmt_id": "da358f365dab8fea00c6254621e2cfb2fd817d01" }, - "CVE-2018-12931": { - "cmt_msg": "" + "CVE-2019-15211": { + "cmt_msg": "media: radio-raremono: change devm_k*alloc to k*alloc", + "cmt_id": "56ea214b175643476a7f2979118c2ac560f29b3f" }, - "CVE-2023-35827": { - "cmt_msg": "ravb: Fix use-after-free issue in ravb_tx_timeout_work()" + "CVE-2019-10207": { + "cmt_msg": "Bluetooth: hci_uart: check for missing tty operations", + "cmt_id": "37fb924139954a28a1f04959070c3cc762b0de4c" }, - "CVE-2024-0565": { - "cmt_msg": "smb: client: fix OOB in receive_encrypted_standard()" + "CVE-2019-15215": { + "cmt_msg": "media: cpia2_usb: first wake up, then free in disconnect", + "cmt_id": "63a80df0ea2b94813f60e8372f9ee93856bcfd5b" }, - "CVE-2024-23196": { - "cmt_msg": "" + "CVE-2019-15926": { + "cmt_msg": "ath6kl: add some bounds checking", + "cmt_id": "c1e1288d2e61727c1a9b9f28d0cf61da592a76bc" }, - "CVE-2021-39801": { - "cmt_msg": "" + "CVE-2017-18509": { + "cmt_msg": "ipv6: check sk sk_type and protocol early in ip_mroute_set/getsockopt", + "cmt_id": "ee2f25641633ffb03fb88e4fa8a6424d24d3f295" }, - "CVE-2021-39800": { - "cmt_msg": "" + "CVE-2019-15239": { + "cmt_msg": "unknown", + "cmt_id": "8f0b77b71f3fec09f86f80cd98c36a1a35109499" }, - "CVE-2024-22099": { - "cmt_msg": "" + "CVE-2019-14284": { + "cmt_msg": "floppy: fix div-by-zero in setup_format_params", + "cmt_id": "26d6284d5d392bd96c414f745bcbf3620e93c8fd" }, - "CVE-2022-45885": { - "cmt_msg": "" + "CVE-2019-14283": { + "cmt_msg": "floppy: fix out-of-bounds read in copy_buffer", + "cmt_id": "d105eaf5fb67a193df8fe72e64690c43e343a560" }, - "CVE-2022-45884": { - "cmt_msg": "" + "CVE-2019-13648": { + "cmt_msg": "powerpc/tm: Fix oops on sigreturn on systems without TM", + "cmt_id": "e67fd28f9ed887d0c8124bda96b66dab87823eac" + } + }, + "4.4.189": { + "CVE-2018-20856": { + "cmt_msg": "block: blk_init_allocated_queue() set q->fq as NULL in the fail case", + "cmt_id": "e6ea77dd5a6a72583453e8703583ce0ef538aea4" }, - "CVE-2023-52455": { - "cmt_msg": "iommu: Don't reserve 0-length IOVA region" + "CVE-2019-1125": { + "cmt_msg": "x86/speculation: Prepare entry code for Spectre v1 swapgs mitigations", + "cmt_id": "e3d8c979c49d6113566acf4b3002073979cd35c3" + } + }, + "4.4.190": { + "CVE-2019-19536": { + "cmt_msg": "can: peak_usb: pcan_usb_pro: Fix info-leaks to USB devices", + "cmt_id": "abea9fa28b64d0a875cc3659002dc87b64836265" }, - "CVE-2024-25741": { - "cmt_msg": "" + "CVE-2019-19537": { + "cmt_msg": "USB: core: Fix races in character device registration and deregistraion", + "cmt_id": "8f67bc7c8da8622fddf4d29a2f422678dfbadf77" }, - "CVE-2023-46343": { - "cmt_msg": "nfc: nci: fix possible NULL pointer dereference in send_acknowledge()" + "CVE-2019-19527": { + "cmt_msg": "HID: hiddev: do cleanup in failure of opening a device", + "cmt_id": "8e73f43b6772a262d1884511f694e0f90c3dfa68" }, - "CVE-2024-21803": { - "cmt_msg": "" + "CVE-2019-19535": { + "cmt_msg": "can: peak_usb: pcan_usb_fd: Fix info-leaks to USB devices", + "cmt_id": "67112944e756484c5d62529597a0181f846340d0" }, - "CVE-2023-52435": { - "cmt_msg": "net: prevent mss overflow in skb_segment()" + "CVE-2018-20961": { + "cmt_msg": "USB: gadget: f_midi: fixing a possible double-free in f_midi", + "cmt_id": "3dae85a803a265c65e6032cd68a13fb717d766d9" }, - "CVE-2021-3542": { - "cmt_msg": "" + "CVE-2019-19530": { + "cmt_msg": "usb: cdc-acm: make sure a refcount is taken early enough", + "cmt_id": "8fed007578dba671e131781360dd87c4683672e7" }, - "CVE-2023-6817": { - "cmt_msg": "netfilter: nft_set_pipapo: skip inactive elements during set walk" + "CVE-2019-19531": { + "cmt_msg": "usb: yurex: Fix use-after-free in yurex_delete", + "cmt_id": "2ef494ad6274e963dc0fe64a8b405d22e0700e9b" + } + }, + "4.4.191": { + "CVE-2019-3900": { + "cmt_msg": "vhost_net: fix possible infinite loop", + "cmt_id": "bb85b4cbd8f69cdea3a0caa9aa4edb1d4d7bc24f" }, - "CVE-2018-12929": { - "cmt_msg": "" + "CVE-2019-15902": { + "cmt_msg": "unknown", + "cmt_id": "61263fbe574b0b74c50552983bdcc2bb9a409b1e" }, - "CVE-2018-12928": { - "cmt_msg": "" + "CVE-2019-15118": { + "cmt_msg": "ALSA: usb-audio: Fix a stack buffer overflow bug in check_input_term", + "cmt_id": "735a16d1afc01320392669f4ea64c84d435faf1c" }, - "CVE-2023-6560": { - "cmt_msg": "io_uring: don't allow discontig pages for IORING_SETUP_NO_MMAP" + "CVE-2016-10906": { + "cmt_msg": "net: arc_emac: fix koops caused by sk_buff free", + "cmt_id": "b31c9932f84ce06b08735884ae7e19eca2b6c80a" }, - "CVE-2020-25220": { - "cmt_msg": "" + "CVE-2016-10905": { + "cmt_msg": "GFS2: don't set rgrp gl_object until it's inserted into rgrp tree", + "cmt_id": "d61e517e39149bff6be936c922f47af99d54509a" }, - "CVE-2015-2877": { - "cmt_msg": "" + "CVE-2019-10638": { + "cmt_msg": "inet: switch IP ID generator to siphash", + "cmt_id": "66f8c5ff8ed3d99dd21d8f24aac89410de7a4a05" }, - "CVE-2023-26242": { - "cmt_msg": "" + "CVE-2019-15117": { + "cmt_msg": "ALSA: usb-audio: Fix an OOB bug in parse_audio_mixer_unit", + "cmt_id": "a485888b5189845f0b6c58ae89661a402a80402a" + } + }, + "4.4.193": { + "CVE-2019-14835": { + "cmt_msg": "vhost: make sure log_num < in_num", + "cmt_id": "35b29a78cc9b2523f6b0c080e6b44d2eeb367023" + } + }, + "4.4.194": { + "CVE-2019-14816": { + "cmt_msg": "mwifiex: Fix three heap overflow at parsing element in cfg80211_ap_settings", + "cmt_id": "851224e62b5525f0a87a171905e5c144e1899cd2" }, - "CVE-2024-25740": { - "cmt_msg": "" + "CVE-2019-14814": { + "cmt_msg": "mwifiex: Fix three heap overflow at parsing element in cfg80211_ap_settings", + "cmt_id": "851224e62b5525f0a87a171905e5c144e1899cd2" }, - "CVE-2019-16089": { - "cmt_msg": "" + "CVE-2019-15505": { + "cmt_msg": "media: technisat-usb2: break out of loop at end of buffer", + "cmt_id": "db38be77199f16dd23d1504a9dfddf7e4479652a" }, - "CVE-2023-32629": { - "cmt_msg": "" + "CVE-2019-14821": { + "cmt_msg": "KVM: coalesced_mmio: add bounds checking", + "cmt_id": "ae41539657ce0a4e9f4588e89e5e19a8b8f11928" + } + }, + "4.4.195": { + "CVE-2019-19533": { + "cmt_msg": "media: ttusb-dec: Fix info-leak in ttusb_dec_send_command()", + "cmt_id": "b54d1e51bba72256f977912b6b4197bd1494c72e" }, - "CVE-2022-0400": { - "cmt_msg": "" + "CVE-2019-17053": { + "cmt_msg": "ieee802154: enforce CAP_NET_RAW for raw sockets", + "cmt_id": "a279cd311c1e3870de25fe48e948487b4785e9cd" }, - "CVE-2021-3847": { - "cmt_msg": "" + "CVE-2019-17052": { + "cmt_msg": "ax25: enforce CAP_NET_RAW for raw sockets", + "cmt_id": "c15d89b5cb86dfcdee536d093ece512091ed6e5c" + }, + "CVE-2019-17054": { + "cmt_msg": "appletalk: enforce CAP_NET_RAW for raw sockets", + "cmt_id": "ec1e04b8979464990e000850d14d3e562999a82d" }, - "CVE-2022-2961": { - "cmt_msg": "" + "CVE-2019-17056": { + "cmt_msg": "nfc: enforce CAP_NET_RAW for raw sockets", + "cmt_id": "001ff467264f3e51c8bb18de5cbe62e91d05cfc5" }, - "CVE-2023-52443": { - "cmt_msg": "apparmor: avoid crash when parsed profile name is empty" + "CVE-2019-17055": { + "cmt_msg": "mISDN: enforce CAP_NET_RAW for raw sockets", + "cmt_id": "a03818269bfbc2ff6d25e3e44eb2247df53648ca" }, - "CVE-2023-52444": { - "cmt_msg": "f2fs: fix to avoid dirent corruption" + "CVE-2019-18680": { + "cmt_msg": "unknown", + "cmt_id": "91573ae4aed0a49660abdad4d42f2a0db995ee5e" + } + }, + "4.4.196": { + "CVE-2019-2215": { + "cmt_msg": "ANDROID: binder: remove waitqueue when thread exits.", + "cmt_id": "80eb98a4ee70428d5b4b7202195a916385a76809" }, - "CVE-2023-52445": { - "cmt_msg": "media: pvrusb2: fix use after free on context disconnection" + "CVE-2020-0030": { + "cmt_msg": "ANDROID: binder: synchronize_rcu() when using POLLFREE.", + "cmt_id": "fcf46dcedbc419633771e16bfdf97a528f4d7dab" }, - "CVE-2022-25265": { - "cmt_msg": "" + "CVE-2019-18806": { + "cmt_msg": "net: qlogic: Fix memory leak in ql_alloc_large_buffers", + "cmt_id": "a35f1bb8c300a46c194bb5154ee8fc040c5ae392" + } + }, + "4.4.197": { + "CVE-2019-19525": { + "cmt_msg": "ieee802154: atusb: fix use-after-free at disconnect", + "cmt_id": "1fb673245b24832acb411db7ffe207fb470559ab" }, - "CVE-2011-4916": { - "cmt_msg": "" + "CVE-2019-16746": { + "cmt_msg": "nl80211: validate beacon head", + "cmt_id": "fd27e0779cf62f72bd8242d003d30742d11e451e" }, - "CVE-2023-52448": { - "cmt_msg": "gfs2: Fix kernel NULL pointer dereference in gfs2_rgrp_dump" + "CVE-2018-20976": { + "cmt_msg": "xfs: clear sb->s_fs_info on mount failure", + "cmt_id": "748edae843c30f41fdcb320f1a8335bc2238b961" }, - "CVE-2023-52449": { - "cmt_msg": "mtd: Fix gluebi NULL pointer dereference caused by ftl notifier" + "CVE-2019-19523": { + "cmt_msg": "USB: adutux: fix use-after-free on disconnect", + "cmt_id": "cd3cfbafe8eb9761950873c04c0147b40a85d29f" }, - "CVE-2023-46862": { - "cmt_msg": "io_uring/fdinfo: lock SQ thread while retrieving thread cpu/pid" + "CVE-2019-19528": { + "cmt_msg": "USB: iowarrior: fix use-after-free on disconnect", + "cmt_id": "f723d7ea08e2c69ac9ecd87828c650745270fb98" + } + }, + "4.4.198": { + "CVE-2019-17075": { + "cmt_msg": "RDMA/cxgb4: Do not dma memory off of the stack", + "cmt_id": "3cd0698561d3e9dcb7c969077932e072fbb4689e" }, - "CVE-2023-23039": { - "cmt_msg": "" + "CVE-2019-17133": { + "cmt_msg": "cfg80211: wext: avoid copying malformed SSIDs", + "cmt_id": "3ca40f2f6015580caf11a4fd23503ea7529ed861" + } + }, + "4.4.199": { + "CVE-2020-10773": { + "cmt_msg": "s390/cmm: fix information leak in cmm_timeout_handler()", + "cmt_id": "1cdb53607683a4fa8625a3f3eb65e5d9f4572166" }, - "CVE-2023-52429": { - "cmt_msg": "dm: limit the number of targets and parameter size area" + "CVE-2019-17666": { + "cmt_msg": "rtlwifi: Fix potential overflow on P2P code", + "cmt_id": "3da8d0e777fa8a0934a288b115373cf12d7800f8" }, - "CVE-2023-39189": { - "cmt_msg": "netfilter: nfnetlink_osf: avoid OOB read" + "CVE-2019-19532": { + "cmt_msg": "HID: Fix assumption that devices have inputs", + "cmt_id": "2be873faad369e0b6b70761506995fd2d4cb0257" }, - "CVE-2023-3640": { - "cmt_msg": "" + "CVE-2019-15098": { + "cmt_msg": "ath6kl: fix a NULL-ptr-deref bug in ath6kl_usb_alloc_urb_from_pipe()", + "cmt_id": "d7619be74f341630989c7edfd21a9ed8f51ab2d1" } - } - }, - "3.2": { - "3.2.2": { - "CVE-2011-4131": { - "cmt_msg": "NFSv4: include bitmap in nfsv4 get acl data", - "cmt_id": "628fc192adbaae0c6178b9015fb916ce61d72b36" + }, + "4.4.200": { + "CVE-2019-18282": { + "cmt_msg": "net/flow_dissector: switch to siphash", + "cmt_id": "491cd03f3b44f58f346ec15e2fc958d0def7b5a7" + }, + "CVE-2019-19049": { + "cmt_msg": "of: unittest: fix memory leak in unittest_data_add", + "cmt_id": "265c6b8ab54cf46ac4e3c768f2be1489dc13a494" } }, - "3.2.15": { - "CVE-2012-2745": { - "cmt_msg": "cred: copy_process() should clear child->replacement_session_keyring", - "cmt_id": "fbb67524e89163c020c3588aec36f3013da0e56e" + "4.4.201": { + "CVE-2019-19534": { + "cmt_msg": "can: peak_usb: fix slab info leak", + "cmt_id": "1afef2b7a5d8d97cee332aee1c4d5a96597c223d" }, - "CVE-2012-2375": { - "cmt_msg": "Fix length of buffer copied in __nfs4_get_acl_uncached", - "cmt_id": "a94841724154dac38ce5239d1d88c00e758dc20d" + "CVE-2019-0155": { + "cmt_msg": "drm/i915: Rename gen7 cmdparser tables", + "cmt_id": "e5e3c0154c19f2d8213e0af88b7a10d9de7fbafd" + }, + "CVE-2019-0154": { + "cmt_msg": "drm/i915: Lower RM timeout to avoid DSI hard hangs", + "cmt_id": "1433b8d41b1aa346e100b839c19fc033871ac5a6" + }, + "CVE-2019-19052": { + "cmt_msg": "can: gs_usb: gs_can_open(): prevent memory leak", + "cmt_id": "7f18860337d74fdf79e7152bee7117d945ff6945" } }, - "3.2.17": { - "CVE-2012-2319": { - "cmt_msg": "hfsplus: Fix potential buffer overflows", - "cmt_id": "d4af6eb924ce29b9e46037134ca69ce085b5c36c" + "4.4.202": { + "CVE-2019-11135": { + "cmt_msg": "x86/msr: Add the IA32_TSX_CTRL MSR", + "cmt_id": "124635392ef394772850172bd5370e62cfe781b4" } }, - "3.2.19": { - "CVE-2012-6701": { - "cmt_msg": "vfs: make AIO use the proper rw_verify_area() area helpers", - "cmt_id": "07343eab681bf8c22a2b31d978569a5f65253171" + "4.4.203": { + "CVE-2019-19524": { + "cmt_msg": "Input: ff-memless - kill timer in destroy()", + "cmt_id": "af618124c69794bf215bf8cefb67890f95246ef8" }, - "CVE-2012-2313": { - "cmt_msg": "dl2k: Clean up rio_ioctl", - "cmt_id": "bdd06be083b51fa7bdf04d8c8b699870f29bae69" + "CVE-2019-15917": { + "cmt_msg": "Bluetooth: hci_ldisc: Postpone HCI_UART_PROTO_READY bit set in hci_uart_set_proto()", + "cmt_id": "29d9c5714096a47ed8d2a1632e382c949b089563" } }, - "3.2.20": { - "CVE-2012-2390": { - "cmt_msg": "hugetlb: fix resv_map leak in error path", - "cmt_id": "73436db332d5b4dd792f115cf0b500521badf3e5" + "4.4.204": { + "CVE-2019-18660": { + "cmt_msg": "powerpc/book3s64: Fix link stack flush on context switch", + "cmt_id": "3a79351beb549634c217570a5a8e500b8f466ad0" + }, + "CVE-2019-15291": { + "cmt_msg": "media: b2c2-flexcop-usb: add sanity checking", + "cmt_id": "89660684ceca03bcaf5d1637709a4875e98387c6" + }, + "CVE-2019-18683": { + "cmt_msg": "media: vivid: Fix wrong locking that causes race conditions on streaming stop", + "cmt_id": "7f8286d2b526a86d9bbdf20690b4245d0ea1fac3" } }, - "3.2.22": { - "CVE-2012-2669": { - "cmt_msg": "Tools: hv: verify origin of netlink connector message", - "cmt_id": "10682d24d003b44cc4dac217047d26f9b210a514" + "4.4.206": { + "CVE-2019-12614": { + "cmt_msg": "powerpc/pseries/dlpar: Fix a missing check in dlpar_parse_cc_property()", + "cmt_id": "27cb5fbc84ed4d97a4bbcab04fb186705bac303e" } }, - "3.2.23": { - "CVE-2012-3511": { - "cmt_msg": "mm: Hold a file reference in madvise_remove", - "cmt_id": "1935549ba38cf30ebe8748ccb88fb99d009241d4" - }, - "CVE-2012-3400": { - "cmt_msg": "udf: Fortify loading of sparing table", - "cmt_id": "a9f1af04f086656246f30354fb4564ce3b08c4a0" + "4.4.207": { + "CVE-2019-19227": { + "cmt_msg": "appletalk: Fix potential NULL pointer dereference in unregister_snap_client", + "cmt_id": "7ae3525ee708f867a2d2321c246b285136cdbed8" }, - "CVE-2012-3364": { - "cmt_msg": "NFC: Prevent multiple buffer overflows in NCI", - "cmt_id": "ec5b2b02eedb2c3471d5a87ba0f72d11b04c2af1" + "CVE-2019-19062": { + "cmt_msg": "crypto: user - fix memory leak in crypto_report", + "cmt_id": "5020350fb0012816ee35f7b744ded18bb75ecc1e" }, - "CVE-2012-2136": { - "cmt_msg": "net: sock: validate data_len before allocating skb in sock_alloc_send_pskb()", - "cmt_id": "caade06b9bc468620636953b15d7d36a12d2b88e" + "CVE-2019-19332": { + "cmt_msg": "KVM: x86: fix out-of-bounds write in KVM_GET_EMULATED_CPUID (CVE-2019-19332)", + "cmt_id": "385bddaf5ee11acdf8d823ecc429c675b5416ac2" } }, - "3.2.24": { - "CVE-2012-6638": { - "cmt_msg": "tcp: drop SYN+FIN messages", - "cmt_id": "e6364fb003c0bc98c5fcde51aac6fd3b6a1337c3" + "4.4.208": { + "CVE-2019-19057": { + "cmt_msg": "mwifiex: pcie: Fix memory leak in mwifiex_pcie_init_evt_ring", + "cmt_id": "4a6cf20ca09434486bfbfc742c960157c23c931d" }, - "CVE-2012-2119": { - "cmt_msg": "macvtap: zerocopy: fix offset calculation when building skb", - "cmt_id": "c1b5b21b540f22a8e008d30545c044a6c949b47b" + "CVE-2019-19063": { + "cmt_msg": "rtlwifi: prevent memory leak in rtl_usb_probe", + "cmt_id": "ca4fb6974bb645ebf3352f5bba7699db4b44b75f" }, - "CVE-2012-2137": { - "cmt_msg": "KVM: Fix buffer overflow in kvm_set_irq()", - "cmt_id": "0f3cbc35d2097d2c655789dd4996e7b87bdb5d34" - } - }, - "3.2.27": { - "CVE-2012-6647": { - "cmt_msg": "futex: Forbid uaddr == uaddr2 in futex_wait_requeue_pi()", - "cmt_id": "4344b8578fb31bb06abd397219ac0376f116f6f2" - } - }, - "3.2.28": { - "CVE-2012-6547": { - "cmt_msg": "net/tun: fix ioctl() based info leaks", - "cmt_id": "9deaafcd3ee894ef714c44e0414e85db36e62641" + "CVE-2019-20812": { + "cmt_msg": "af_packet: set defaule value for tmo", + "cmt_id": "b424ed744453c1b0ce0e67f2e64e7719725f65a3" }, - "CVE-2013-0310": { - "cmt_msg": "cipso: don't follow a NULL pointer when setsockopt() is called", - "cmt_id": "7f6453d8c6f68e26fa6086c654b7fca39b960637" + "CVE-2019-19447": { + "cmt_msg": "ext4: work around deleting a file with i_nlink == 0 safely", + "cmt_id": "0a5a9d02428d4e8c181413a51f7bcf0d7080dbf3" } }, - "3.2.29": { - "CVE-2013-1827": { - "cmt_msg": "dccp: check ccid before dereferencing", - "cmt_id": "372c463a7c5ea46eca693ea52bd95cb8512247f8" + "4.4.209": { + "CVE-2019-19965": { + "cmt_msg": "scsi: libsas: stop discovering if oob mode is disconnected", + "cmt_id": "8febe765539fbcc7d47e4e2ad44a0bcb2adbf02b" } }, - "3.2.30": { - "CVE-2012-6689": { - "cmt_msg": "netlink: fix possible spoofing from non-root processes", - "cmt_id": "e6ae7506816cdf4d702c501ceb5202eecf7e4a07" - }, - "CVE-2012-3412": { - "cmt_msg": "net: Allow driver to limit number of GSO segments per skb", - "cmt_id": "99ea81edff2135603588fe12bd95cca2dd76a5cb" - }, - "CVE-2012-6545": { - "cmt_msg": "Bluetooth: RFCOMM - Fix info leak via getsockname()", - "cmt_id": "18fc748c13b0a15152bd711c3d42560f833af9e5" + "4.4.210": { + "CVE-2019-14895": { + "cmt_msg": "mwifiex: fix possible heap overflow in mwifiex_process_country_ie()", + "cmt_id": "d1bd8bd7e5ebda57580372d2b8b69182f9d8d113" }, - "CVE-2012-6544": { - "cmt_msg": "Bluetooth: L2CAP - Fix info leak via getsockname()", - "cmt_id": "79690021eba0738861965187af2f75035f846d6f" + "CVE-2020-0305": { + "cmt_msg": "chardev: Avoid potential use-after-free in 'chrdev_open()'", + "cmt_id": "3cce9309df73def742692ffddde05638b6eda6d9" }, - "CVE-2012-6546": { - "cmt_msg": "atm: fix info leak via getsockname()", - "cmt_id": "86cbb1ef4f7b1e6ac6cb65bb34b6949cd5b90c6e" + "CVE-2019-19066": { + "cmt_msg": "scsi: bfa: release allocated memory in case of error", + "cmt_id": "8c67bbd0754f8b35f28d8b5626c16d5721e9a8f7" }, - "CVE-2012-6541": { - "cmt_msg": "dccp: fix info leak via getsockopt(DCCP_SOCKOPT_CCID_TX_INFO)", - "cmt_id": "24635bcd494892f4fce7b2504f3f1c65cc2d6ad2" + "CVE-2019-20636": { + "cmt_msg": "Input: add safety guards to input_set_keycode()", + "cmt_id": "68442780f2c223531de9d25104fd04e1bfdb583b" }, - "CVE-2012-6540": { - "cmt_msg": "ipvs: fix info leak in getsockopt(IP_VS_SO_GET_TIMEOUT)", - "cmt_id": "9b2a14018c8a62cf910e10efb4b24787549de5c4" + "CVE-2019-19068": { + "cmt_msg": "rtl8xxxu: prevent leaking urb", + "cmt_id": "57d09152eef9e1afca04b2f7bebccd07e0efa881" }, - "CVE-2012-6542": { - "cmt_msg": "llc: fix info leak via getsockname()", - "cmt_id": "3f497daadeeb2b84dc8e97b32416d98b34485b99" + "CVE-2020-0431": { + "cmt_msg": "HID: hid-input: clear unmapped usages", + "cmt_id": "3be648c80db794a3bc1b22a1115071402a1f9803" }, - "CVE-2012-6539": { - "cmt_msg": "net: fix info leak in compat dev_ifconf()", - "cmt_id": "daf8fa93325e55ec605c4e725e6dc07d63d0d5c1" + "CVE-2019-14615": { + "cmt_msg": "drm/i915/gen9: Clear residual context state on context switch", + "cmt_id": "e2546a83a7e291f412978cf6a580e43698c308bc" }, - "CVE-2012-3520": { - "cmt_msg": "af_netlink: force credentials passing [CVE-2012-3520]", - "cmt_id": "dc77000f6fa5f7dd5eac1d02fa7812a131a67b89" + "CVE-2019-19056": { + "cmt_msg": "mwifiex: pcie: Fix memory leak in mwifiex_pcie_alloc_cmdrsp_buf", + "cmt_id": "c858dc3c047e2962994d28acaccd52272558c9ff" } }, - "3.2.31": { - "CVE-2013-1826": { - "cmt_msg": "xfrm_user: return error pointer instead of NULL", - "cmt_id": "468bf9f70353872173b11b92dc15fe84d3dacbb4" + "4.4.211": { + "CVE-2019-17351": { + "cmt_msg": "xen: let alloc_xenballooned_pages() fail if not enough memory free", + "cmt_id": "b39b4801d50956256711db83be28b9cff2620fda" }, - "CVE-2012-3430": { - "cmt_msg": "rds: set correct msg_namelen", - "cmt_id": "2a181c85136b1d5481dd5334037ad160450fa09d" + "CVE-2019-20096": { + "cmt_msg": "dccp: Fix memleak in __feat_register_sp", + "cmt_id": "a5c290ebb46d33f8700aab2edb996c9a0478b3b8" }, - "CVE-2012-6538": { - "cmt_msg": "xfrm_user: fix info leak in copy_to_user_auth()", - "cmt_id": "744e0a9c51333d712e76850bf58b4aeb277016fe" + "CVE-2019-15217": { + "cmt_msg": "media: usb:zr364xx:Fix KASAN:null-ptr-deref Read in zr364xx_vidioc_querycap", + "cmt_id": "e6c986b15703eb2e0d59a3f79e99fd2aa6221b51" }, - "CVE-2012-6657": { - "cmt_msg": "net: guard tcp_set_keepalive() to tcp sockets", - "cmt_id": "9a2ed90a493c0b955d973b25d81c78621e49af93" + "CVE-2018-21008": { + "cmt_msg": "rsi: add fix for crash during assertions", + "cmt_id": "80427a7b1195e7946992baffeb112b2635245198" }, - "CVE-2012-6536": { - "cmt_msg": "xfrm_user: ensure user supplied esn replay window is valid", - "cmt_id": "ab98741ba1888af9aeb4a88423bda1e2d93932e5" + "CVE-2019-15220": { + "cmt_msg": "p54usb: Fix race between disconnect and firmware loading", + "cmt_id": "e2c48c1e6ef5e806b68ca685216dda05e5267be2" }, - "CVE-2012-6537": { - "cmt_msg": "xfrm_user: fix info leak in copy_to_user_tmpl()", - "cmt_id": "26d560eb8ee3e6dd505a5a8a43ff904c279f60ce" - } - }, - "3.2.32": { - "CVE-2013-0309": { - "cmt_msg": "mm: thp: fix pmd_present for split_huge_page and PROT_NONE with THP", - "cmt_id": "ddd937a27bb51cda5a5400df8e18e9a29d7fa8ec" - } - }, - "3.2.33": { - "CVE-2013-1928": { - "cmt_msg": "fs/compat_ioctl.c: VIDEO_SET_SPU_PALETTE missing error check", - "cmt_id": "5bbeedc3110bbb1b5c6b01fc1f027ab5d2eb40d6" + "CVE-2019-15221": { + "cmt_msg": "ALSA: line6: Fix write on zero-sized buffer", + "cmt_id": "81b83ca3e45b83e632b8063cd27bdb072ecfc135" }, - "CVE-2012-4508": { - "cmt_msg": "ext4: race-condition protection for ext4_convert_unwritten_extents_endio", - "cmt_id": "814a7833df19e1de7447f870ae890adb12561627" + "CVE-2020-12652": { + "cmt_msg": "scsi: mptfusion: Fix double fetch bug in ioctl", + "cmt_id": "952fc03b38b8dca3923f3c61e3273c8f8ed2bd86" }, - "CVE-2012-0957": { - "cmt_msg": "kernel/sys.c: fix stack memory content leak via UNAME26", - "cmt_id": "3042c7c2ee52f0ebfc8e09bc2c4cdbff3fc4ec61" + "CVE-2019-5108": { + "cmt_msg": "mac80211: Do not send Layer 2 Update frame before authorization", + "cmt_id": "622c77a3addefa54d61205177635409de87a8a7c" } }, - "3.2.34": { - "CVE-2012-4565": { - "cmt_msg": "net: fix divide by zero in tcp algorithm illinois", - "cmt_id": "df769f065d7bebf0ddc5f61605dbb1d8ea5ee2d8" + "4.4.212": { + "CVE-2019-14896": { + "cmt_msg": "libertas: Fix two buffer overflows at parsing bss descriptor", + "cmt_id": "4d7f4d383230f6ef4f8a32e1fbfa4eb7c682522f" + }, + "CVE-2019-14897": { + "cmt_msg": "libertas: Fix two buffer overflows at parsing bss descriptor", + "cmt_id": "4d7f4d383230f6ef4f8a32e1fbfa4eb7c682522f" + }, + "CVE-2020-14416": { + "cmt_msg": "can, slip: Protect tty->disc_data in write_wakeup and close with RCU", + "cmt_id": "6169e11e1f14dd272ec9c746050820e5cc2cf853" } }, - "3.2.36": { - "CVE-2012-4461": { - "cmt_msg": "KVM: x86: invalid opcode oops on SET_SREGS with OSXSAVE bit set (CVE-2012-4461)", - "cmt_id": "53f02039f794725f843494a36d82f045d78ba697" + "4.4.213": { + "CVE-2020-0432": { + "cmt_msg": "staging: most: net: fix buffer overflow", + "cmt_id": "917c8fe39f4d42c3850b22d6a0bf3ffab1466d19" } }, - "3.2.37": { - "CVE-2004-0230": { - "cmt_msg": "tcp: implement RFC 5961 3.2", - "cmt_id": "61f69dc4e40e41b0018f00fa4aeb23d3239556fb" + "4.4.214": { + "CVE-2020-12653": { + "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_cmd_append_vsie_tlv()", + "cmt_id": "4dd90d14f902074f18238dc104868debbd3cd250" + }, + "CVE-2020-12654": { + "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_ret_wmm_get_status()", + "cmt_id": "91b836b01c788932d86a448d26561740d22e7c9b" + }, + "CVE-2020-0404": { + "cmt_msg": "media: uvcvideo: Avoid cyclic entity chains due to malformed USB descriptors", + "cmt_id": "f941047b5e5abd73be6c058a67a06533728c3422" } }, - "3.2.38": { - "CVE-2013-1774": { - "cmt_msg": "USB: io_ti: Fix NULL dereference in chase_port()", - "cmt_id": "7b4992729ddd232f6026c109f93d8296ca58b3ed" + "4.4.215": { + "CVE-2020-9383": { + "cmt_msg": "floppy: check FDC index for errors before assigning it", + "cmt_id": "3dd989efdd97a42dc18e9bd653b16f0d84f45fc2" }, - "CVE-2013-0349": { - "cmt_msg": "Bluetooth: Fix incorrect strncpy() in hidp_setup_hid()", - "cmt_id": "150df53ab8dfcdf0b3872a60f7a092c4e541f138" + "CVE-2020-2732": { + "cmt_msg": "KVM: nVMX: Don't emulate instructions in guest mode", + "cmt_id": "27021607e18ee2946cbbc74c19031ad966b9c883" }, - "CVE-2013-0190": { - "cmt_msg": "xen: Fix stack corruption in xen_failsafe_callback for 32bit PVOPS guests.", - "cmt_id": "5c0ce9fed10a58f65fe2784b664e03bdeaaac650" + "CVE-2019-16233": { + "cmt_msg": "scsi: qla2xxx: fix a potential NULL pointer dereference", + "cmt_id": "d50a2a486d941417ca7abaebfe433a3af3c773fb" }, - "CVE-2013-0268": { - "cmt_msg": "x86/msr: Add capabilities check", - "cmt_id": "6ebf5f3dfa9dfd384169f001eecf4e5119c670cc" + "CVE-2020-0009": { + "cmt_msg": "staging: android: ashmem: Disallow ashmem memory from being remapped", + "cmt_id": "a349db843c640ad1fbab6625a7a4e9d4dd45f26a" }, - "CVE-2013-0313": { - "cmt_msg": "evm: checking if removexattr is not a NULL", - "cmt_id": "f666957665d9c9b2ec308963333dbd224271b4d6" + "CVE-2020-36558": { + "cmt_msg": "vt: vt_ioctl: fix race in VT_RESIZEX", + "cmt_id": "803bc73a2d3238a60901f4d9427fc7f8ac1d0435" } }, - "3.2.39": { - "CVE-2013-0228": { - "cmt_msg": "x86/xen: don't assume %ds is usable in xen_iret for 32-bit PVOPS.", - "cmt_id": "9a9adb457bc2665cac647e4c90d76acf23f1a65e" + "4.4.216": { + "CVE-2020-8649": { + "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region", + "cmt_id": "c0950b28ad5ac18f35ad8fa3856d10be585547b4" }, - "CVE-2013-0871": { - "cmt_msg": "ptrace: introduce signal_wake_up_state() and ptrace_signal_wake_up()", - "cmt_id": "bb24eda9eee7a1cc865bb10dbb89edf7c1f5cdc7" + "CVE-2020-8648": { + "cmt_msg": "vt: selection, close sel_buffer race", + "cmt_id": "63f529ab35671d1c7433cb8283980289c8832bad" }, - "CVE-2013-0216": { - "cmt_msg": "netback: correct netbk_tx_err to handle wrap around.", - "cmt_id": "adecb7c418057a934b327c1177d738e17f0cf98a" + "CVE-2019-16234": { + "cmt_msg": "iwlwifi: pcie: fix rb_allocator workqueue allocation", + "cmt_id": "32b63f22e4c16aee095b2c116f0c7526b7fd3e66" }, - "CVE-2013-0217": { - "cmt_msg": "xen/netback: don't leak pages on failure in xen_netbk_tx_check_gop.", - "cmt_id": "dd4d2748d11f601975b78c88130bd274d3e90eb5" - } - }, - "3.2.40": { - "CVE-2013-1767": { - "cmt_msg": "tmpfs: fix use-after-free of mempolicy object", - "cmt_id": "2b82b58d6d1a3c79e28ce80c559a442e3d034b1a" + "CVE-2019-11487": { + "cmt_msg": "fs: prevent page refcount overflow in pipe_buf_get", + "cmt_id": "c326585619b99cce3240403faa56f599e06893cb" }, - "CVE-2013-0231": { - "cmt_msg": "xen-pciback: rate limit error messages from xen_pcibk_enable_msi{,x}()", - "cmt_id": "ecb1d58c0722e593e50317a63294a52ac2308ace" + "CVE-2020-8647": { + "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region", + "cmt_id": "c0950b28ad5ac18f35ad8fa3856d10be585547b4" }, - "CVE-2013-0311": { - "cmt_msg": "vhost: fix length for cross region descriptor", - "cmt_id": "e188567f35fe514253b2e46a31cf03272ab8c030" + "CVE-2020-27068": { + "cmt_msg": "cfg80211: add missing policy for NL80211_ATTR_STATUS_CODE", + "cmt_id": "bfb70b52540845bd1574de6f0e58fcc7907d8a07" }, - "CVE-2012-4530": { - "cmt_msg": "exec: use -ELOOP for max recursion depth", - "cmt_id": "511d07bc0a060049009954eeb8b34eda016c9c0e" + "CVE-2020-0444": { + "cmt_msg": "audit: fix error handling in audit_data_to_entry()", + "cmt_id": "c99bc56eba9e90c28d8bb42712b9b262d99df630" + }, + "CVE-2020-27418": { + "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region", + "cmt_id": "c0950b28ad5ac18f35ad8fa3856d10be585547b4" } }, - "3.2.41": { - "CVE-2012-5517": { - "cmt_msg": "mm/hotplug: correctly add new zone to all other nodes' zone lists", - "cmt_id": "1bdb24f5ab52e64658f496a0dbfe04ffb56edaf6" + "4.4.217": { + "CVE-2019-14901": { + "cmt_msg": "mwifiex: Fix heap overflow in mmwifiex_process_tdls_action_frame()", + "cmt_id": "4ca9ed6965cc0b9ace3758355ff13d71b97bf008" }, - "CVE-2013-1860": { - "cmt_msg": "USB: cdc-wdm: fix buffer overflow", - "cmt_id": "8e535446a78958888b16db9d619d0f60c1950622" + "CVE-2020-29370": { + "cmt_msg": "mm: slub: add missing TID bump in kmem_cache_alloc_bulk()", + "cmt_id": "3698fe758684cf3600a0aa91a5af3eba27722cfd" + } + }, + "4.4.218": { + "CVE-2020-36557": { + "cmt_msg": "vt: vt_ioctl: fix VT_DISALLOCATE freeing in-use virtual console", + "cmt_id": "7f4c99f8487c1dd7b7eb980c16bd256be0dc04d1" }, - "CVE-2013-1792": { - "cmt_msg": "keys: fix race with concurrent install_user_keyrings()", - "cmt_id": "c1dd1f576c5ce265bb8e186f01c91340a5138f49" + "CVE-2020-14381": { + "cmt_msg": "futex: Fix inode life-time issue", + "cmt_id": "24bbfe34bb44c036c3a0874bf74fc2387d5557bf" }, - "CVE-2013-2548": { - "cmt_msg": "crypto: user - fix info leaks in report API", - "cmt_id": "f56cb892159202ee6486c7fd3c5dec3f82bd5114" + "CVE-2020-11668": { + "cmt_msg": "media: xirlink_cit: add missing descriptor sanity checks", + "cmt_id": "89fb5aa765cf8e47ac168810dd76afe37312dff2" }, - "CVE-2013-0914": { - "cmt_msg": "signal: always clear sa_restorer on execve", - "cmt_id": "125664f0332d57735ba5b79aed4d94a3c04f1090" + "CVE-2021-3715": { + "cmt_msg": "net_sched: cls_route: remove the right filter from hashtable", + "cmt_id": "7518af6464b47a0d775173570c3d25f699da2a5e" }, - "CVE-2013-1848": { - "cmt_msg": "ext3: Fix format string issues", - "cmt_id": "058f677c359d91e6692dc9a9da36b2e3eadf36ba" + "CVE-2020-10942": { + "cmt_msg": "vhost: Check docket sk_family instead of call getname", + "cmt_id": "79152052fbb703ff5f66778b3e585c69b95d83d2" }, - "CVE-2013-2546": { - "cmt_msg": "crypto: user - fix info leaks in report API", - "cmt_id": "f56cb892159202ee6486c7fd3c5dec3f82bd5114" + "CVE-2020-27066": { + "cmt_msg": "xfrm: policy: Fix doulbe free in xfrm_policy_timer", + "cmt_id": "0ac1dd7bb8f1b40f1bf494f6a27235a7a3b36350" }, - "CVE-2013-2547": { - "cmt_msg": "crypto: user - fix info leaks in report API", - "cmt_id": "f56cb892159202ee6486c7fd3c5dec3f82bd5114" + "CVE-2020-11608": { + "cmt_msg": "media: ov519: add missing endpoint sanity checks", + "cmt_id": "3de5ed1a64b96f0a482e2a325bcea38d51a2a1fd" }, - "CVE-2013-1773": { - "cmt_msg": "NLS: improve UTF8 -> UTF16 string conversion routine", - "cmt_id": "6022b67230dcb25c267e832d72223ffb54703cc8" + "CVE-2020-11609": { + "cmt_msg": "media: stv06xx: add missing descriptor sanity checks", + "cmt_id": "eca73facbd01d15bd6f8c08c9c39d255a752e4b6" } }, - "3.2.42": { - "CVE-2013-0913": { - "cmt_msg": "drm/i915: bounds check execbuffer relocation count", - "cmt_id": "48e308efbd714ce74b0db89cfa78941cdebc3568" - }, - "CVE-2013-2634": { - "cmt_msg": "dcbnl: fix various netlink info leaks", - "cmt_id": "42d4afd275648c190ec1efc13491c294dadfa49d" + "4.4.219": { + "CVE-2020-11494": { + "cmt_msg": "slcan: Don't transmit uninitialized stack data in padding", + "cmt_id": "f7dd0134a169df7dd9b68b6c135fe10629e66599" }, - "CVE-2012-6549": { - "cmt_msg": "isofs: avoid info leak on export", - "cmt_id": "edea8d0998c2b2bdade2b6c44fa6fac27ecfd2b7" + "CVE-2020-0429": { + "cmt_msg": "l2tp: fix race between l2tp_session_delete() and l2tp_tunnel_closeall()", + "cmt_id": "d845bf594d68d309a39ce8df72942e2b3fbbb176" }, - "CVE-2012-6548": { - "cmt_msg": "udf: avoid info leak on export", - "cmt_id": "ac23922b930695ed3178cab78b0a9c31a9fa226b" + "CVE-2020-11565": { + "cmt_msg": "mm: mempolicy: require at least one nodeid for MPOL_PREFERRED", + "cmt_id": "4489253d0625c4841620160b2461925b695c651c" } }, - "3.2.43": { - "CVE-2013-1929": { - "cmt_msg": "tg3: fix length overflow in VPD firmware parsing", - "cmt_id": "2b79fa8fddde2d070ca28a2d94394c39bfd8d741" + "4.4.220": { + "CVE-2020-12826": { + "cmt_msg": "signal: Extend exec_id to 64bits", + "cmt_id": "6b9e27da8fc595e8abd4374c230d5b9404efac83" } }, - "3.2.44": { - "CVE-2013-3301": { - "cmt_msg": "tracing: Fix possible NULL pointer dereferences", - "cmt_id": "ee3c9aabb636fcfc21d53c506362620b55fdd8c6" - }, - "CVE-2013-2141": { - "cmt_msg": "kernel/signal.c: stop info leak via the tkill and the tgkill syscalls", - "cmt_id": "ffe1341edbe2878134f3083625d5c916670d0fca" - }, - "CVE-2013-1796": { - "cmt_msg": "KVM: x86: fix for buffer overflow in handling of MSR_KVM_SYSTEM_TIME (CVE-2013-1796)", - "cmt_id": "b7c5ee6d49b7cf5a52ae87b955d7ab984cb9c974" - }, - "CVE-2013-1797": { - "cmt_msg": "KVM: x86: Convert MSR_KVM_SYSTEM_TIME to use gfn_to_hva_cache functions (CVE-2013-1797)", - "cmt_id": "767d3d43c0a02485a8574c0efe39524f246d698b" + "4.4.221": { + "CVE-2019-19319": { + "cmt_msg": "ext4: protect journal inode's blocks using block_validity", + "cmt_id": "7eff961ca9f364be255d279346517ba0158ec8e3" }, - "CVE-2013-1798": { - "cmt_msg": "KVM: Fix bounds checking in ioapic indirect register reads (CVE-2013-1798)", - "cmt_id": "6d29de40486edf7d5a61d40f4b18431e2c644ad0" + "CVE-2020-12114": { + "cmt_msg": "make struct mountpoint bear the dentry reference to mountpoint, not struct mount", + "cmt_id": "83354adbd7a967230bd23a547c5b695567ddba2c" }, - "CVE-2013-1979": { - "cmt_msg": "net: fix incorrect credentials passing", - "cmt_id": "5428146ebea24b916eb9e3684449699cb6a5c8c0" + "CVE-2020-12464": { + "cmt_msg": "USB: core: Fix free-while-in-use bug in the USB S-Glibrary", + "cmt_id": "f613d830fae7cbf8799378338d4df977f8667d5c" } }, - "3.2.45": { - "CVE-2013-2094": { - "cmt_msg": "perf: Treat attr.config as u64 in perf_swevent_init()", - "cmt_id": "3fc8fc1cc2d585c1f695f7de914063258aafe50e" + "4.4.222": { + "CVE-2020-10751": { + "cmt_msg": "selinux: properly handle multiple messages in selinux_netlink_send()", + "cmt_id": "92b5848736395f4ea56738895acdd09cdc2a93da" }, - "CVE-2013-3076": { - "cmt_msg": "crypto: algif - suppress sending source address information in recvmsg", - "cmt_id": "419f4ba0f032c8d906153d24e017f4bee6df26f5" + "CVE-2020-0255": { + "cmt_msg": "selinux: properly handle multiple messages in selinux_netlink_send()", + "cmt_id": "92b5848736395f4ea56738895acdd09cdc2a93da" + } + }, + "4.4.223": { + "CVE-2023-3106": { + "cmt_msg": "xfrm: fix crash in XFRM_MSG_GETSA netlink handler", + "cmt_id": "0cbb0084fa2b444b7316a0967a0d93f5ae520216" + } + }, + "4.4.224": { + "CVE-2020-10711": { + "cmt_msg": "netlabel: cope with NULL catmap", + "cmt_id": "b8ff52e4bdaabfee050ae4e8c721305a924a8633" }, - "CVE-2013-3224": { - "cmt_msg": "Bluetooth: fix possible info leak in bt_sock_recvmsg()", - "cmt_id": "95ee0fb7a014cdf80be37b329fa462ff3847f7c0" + "CVE-2020-0433": { + "cmt_msg": "blk-mq: sync the update nr_hw_queues with blk_mq_queue_tag_busy_iter", + "cmt_id": "fa9355afd5b07707e15a5f75b854f04a9c14a798" }, - "CVE-2013-2146": { - "cmt_msg": "perf/x86: Fix offcore_rsp valid mask for SNB/IVB", - "cmt_id": "4fcd6db795fa0f317deb7b64cce89ca2502ff934" + "CVE-2020-1749": { + "cmt_msg": "net: ipv6_stub: use ip6_dst_lookup_flow instead of ip6_dst_lookup", + "cmt_id": "7c9d04e1c3ed58f60592329459d9ca7789442ff7" }, - "CVE-2013-0160": { - "cmt_msg": "TTY: do not update atime/mtime on read/write", - "cmt_id": "c29ad805df8c54a9f5d74c66bf5d4a2d449bd99a" + "CVE-2020-27786": { + "cmt_msg": "ALSA: rawmidi: Fix racy buffer resize under concurrent accesses", + "cmt_id": "718eede1eeb602531e09191d3107eb849bbe64eb" }, - "CVE-2013-3222": { - "cmt_msg": "atm: update msg_namelen in vcc_recvmsg()", - "cmt_id": "2a8c07b253bac436358adb9eb96a37dd223ef120" + "CVE-2020-12769": { + "cmt_msg": "spi: spi-dw: Add lock protect dw_spi rx/tx to prevent concurrent calls", + "cmt_id": "3549e7aaa20947df2338305509c534c79c43e765" }, - "CVE-2013-3223": { - "cmt_msg": "ax25: fix info leak via msg_name in ax25_recvmsg()", - "cmt_id": "e72f86d5b6602c86efb08443c58086c40228b81b" + "CVE-2020-10690": { + "cmt_msg": "ptp: fix the race between the release of ptp_clock and cdev", + "cmt_id": "6f5e3bb7879ee1eb71c6c3cbaaffbb0da6cd7d57" }, - "CVE-2013-3232": { - "cmt_msg": "netrom: fix info leak via msg_name in nr_recvmsg()", - "cmt_id": "c0bf432a4c3e6870fc87debb9393cb93f638dcba" + "CVE-2020-13143": { + "cmt_msg": "USB: gadget: fix illegal array access in binding with UDC", + "cmt_id": "c18a8b0d7b8fdb299bcfab2feb9c0f410580794a" }, - "CVE-2013-2596": { - "cmt_msg": "vm: convert fb_mmap to vm_iomap_memory() helper", - "cmt_id": "fc6b92e0aa98ec9547bf779f4e71c0f259f794f3" + "CVE-2019-19768": { + "cmt_msg": "blktrace: Protect q->blk_trace with RCU", + "cmt_id": "3d5d64aea941a45efda1bd02c0ec8dd57e8ce4ca" }, - "CVE-2013-3234": { - "cmt_msg": "rose: fix info leak via msg_name in rose_recvmsg()", - "cmt_id": "f05503a9ef115c505b36fcd75f77b341811e9169" + "CVE-2020-12770": { + "cmt_msg": "scsi: sg: add sg_remove_request in sg_write", + "cmt_id": "af9a86cc9f1acfc380e96a9beb59462f32a4b6c4" } }, - "3.2.47": { - "CVE-2013-2850": { - "cmt_msg": "iscsi-target: fix heap buffer overflow on error", - "cmt_id": "ba73be1c56e3a459f5cd4580177e865b362d76a7" + "4.4.225": { + "CVE-2018-9517": { + "cmt_msg": "l2tp: pass tunnel pointer to ->session_create()", + "cmt_id": "3ca51032627e9bfea7d609f008461efdfdba1a5c" }, - "CVE-2013-2852": { - "cmt_msg": "b43: stop format string leaking into error msgs", - "cmt_id": "bfb624e7fd41437a2c256adaf4041fe4414f8f26" + "CVE-2021-0447": { + "cmt_msg": "l2tp: protect sock pointer of struct pppol2tp_session with RCU", + "cmt_id": "c2984681fe15cfb803a9132aaaf1140ab20a72c1" + }, + "CVE-2020-27067": { + "cmt_msg": "l2tp: fix l2tp_eth module loading", + "cmt_id": "c30b34ce7944ec7026d4803cd51da2521df992a3" } }, - "3.2.49": { - "CVE-2013-1059": { - "cmt_msg": "libceph: Fix NULL pointer dereference in auth client code", - "cmt_id": "88a4055704b39e5c67c9cbc837cc15ec6a6d8671" - }, - "CVE-2013-2164": { - "cmt_msg": "drivers/cdrom/cdrom.c: use kzalloc() for failing hardware", - "cmt_id": "6dfd19d0d4d5dd081e1312a550ffae6acc85d70a" + "4.4.226": { + "CVE-2020-10732": { + "cmt_msg": "fs/binfmt_elf.c: allocate initialized memory in fill_thread_core_info()", + "cmt_id": "2673a0cb646affc7ff66970cfc884d9e2223bc60" + } + }, + "4.4.227": { + "CVE-2020-13974": { + "cmt_msg": "vt: keyboard: avoid signed integer overflow in k_ascii", + "cmt_id": "dad0bf9ce93fa40b667eccd3306783f4db4b932b" }, - "CVE-2013-2851": { - "cmt_msg": "block: do not pass disk names as format strings", - "cmt_id": "b442223040adf969fd02124c29c856a06cf5649c" + "CVE-2020-0543": { + "cmt_msg": "x86/cpu: Add 'table' argument to cpu_matches()", + "cmt_id": "4ebffa4b0a198d8671ee68742ba6d3f56164301f" } }, - "3.2.50": { - "CVE-2013-4162": { - "cmt_msg": "ipv6: call udp_push_pending_frames when uncorking a socket with AF_INET pending data", - "cmt_id": "5d14d39515e0149b5fcd319e4409d8304e7688c7" + "4.4.228": { + "CVE-2019-20810": { + "cmt_msg": "media: go7007: fix a miss of snd_card_free", + "cmt_id": "ce7fcdd544fbc07a2c327d18b0712754cf1557d2" }, - "CVE-2013-2232": { - "cmt_msg": "ipv6: ip6_sk_dst_check() must not assume ipv6 dst", - "cmt_id": "a7cdf6bc2abd64f94622fe12a1a212a07a316a83" + "CVE-2020-10766": { + "cmt_msg": "x86/speculation: Prevent rogue cross-process SSBD shutdown", + "cmt_id": "37368554eaf7815a3ef3c2cbbd242fc19d3cb32b" }, - "CVE-2013-2234": { - "cmt_msg": "af_key: fix info leaks in notify messages", - "cmt_id": "31bd7d1943f42c22850bb3bc6a7dd89fc4cf9b08" + "CVE-2020-10767": { + "cmt_msg": "x86/speculation: Avoid force-disabling IBPB based on STIBP and enhanced IBRS.", + "cmt_id": "317b9c418ea38089a6d5c42fcaa9a545334838c3" }, - "CVE-2013-2148": { - "cmt_msg": "fanotify: info leak in copy_event_to_user()", - "cmt_id": "72925fa9b85b0501a4e96c5066af3214292d36d2" + "CVE-2020-10768": { + "cmt_msg": "x86/speculation: PR_SPEC_FORCE_DISABLE enforcement for indirect branches.", + "cmt_id": "7a5764e8990096fd08e8566b87df3c111bf5a736" } }, - "3.2.51": { - "CVE-2013-2237": { - "cmt_msg": "af_key: initialize satype in key_notify_policy_flush()", - "cmt_id": "54811a1992e2c5e318ae91b99ea94c9724bc8f66" + "4.4.229": { + "CVE-2020-12771": { + "cmt_msg": "bcache: fix potential deadlock problem in btree_gc_coalesce", + "cmt_id": "9517bec2c1ff8f223f8f2d28c743731e8f216bbe" + }, + "CVE-2020-15436": { + "cmt_msg": "block: Fix use-after-free in blkdev_get()", + "cmt_id": "f9aa90e1b8aa2a133d4046223248ab61688445f5" } }, - "3.2.52": { - "CVE-2013-4350": { - "cmt_msg": "net: sctp: fix ipv6 ipsec encryption bug in sctp_v6_xmit", - "cmt_id": "af7e0f4a91ca9049ee9e541f8a98e762a12e9b9b" - }, - "CVE-2013-2147": { - "cmt_msg": "cpqarray: fix info leak in ida_locked_ioctl()", - "cmt_id": "e1fd636836ca3c883c172dc619a909e988a2f4b5" - }, - "CVE-2013-2896": { - "cmt_msg": "HID: ntrig: validate feature report details", - "cmt_id": "c790976bda06884d78a1f8208d74e566ac41954e" - }, - "CVE-2013-2895": { - "cmt_msg": "HID: logitech-dj: validate output report details", - "cmt_id": "1eb7b3faf9357f481238a3237f637f77fce974a5" - }, - "CVE-2013-2889": { - "cmt_msg": "HID: zeroplus: validate output report details", - "cmt_id": "e0f897f0929d27dc5d7de5cc24ccbeac572e5176" - }, - "CVE-2013-2888": { - "cmt_msg": "HID: validate HID report id size", - "cmt_id": "1ccd1fd4c43407721caa38ae034359bf8d9a1b34" - }, - "CVE-2013-4387": { - "cmt_msg": "ipv6: udp packets following an UFO enqueued packet need also be handled by UFO", - "cmt_id": "e381c716ed158b0b77879625fa58929f1a59a940" - }, - "CVE-2013-2892": { - "cmt_msg": "HID: pantherlord: validate output report details", - "cmt_id": "db841e0c2b59b27c521512930d4e818d92ee1caa" - }, - "CVE-2013-2893": { - "cmt_msg": "HID: LG: validate HID output report details", - "cmt_id": "3da8b771809032cf829869cabbffbed96cd47bc4" - }, - "CVE-2013-0343": { - "cmt_msg": "ipv6: remove max_addresses check from ipv6_create_tempaddr", - "cmt_id": "7319901766396653fae51d2f37c5d23eb4537766" + "4.4.230": { + "CVE-2020-15393": { + "cmt_msg": "usb: usbtest: fix missing kfree(dev->buf) in usbtest_disconnect", + "cmt_id": "831eebad70a25f55b5745453ac252d4afe997187" + } + }, + "4.4.232": { + "CVE-2020-15437": { + "cmt_msg": "serial: 8250: fix null-ptr-deref in serial8250_start_tx()", + "cmt_id": "f5e7de4f4232154835f4c3d87e01350457340c16" }, - "CVE-2013-2899": { - "cmt_msg": "HID: picolcd_core: validate output report details", - "cmt_id": "49ad1670d8a0a8e9a7f84272e3054c80563b87bc" + "CVE-2018-10323": { + "cmt_msg": "xfs: set format back to extents if xfs_bmap_extents_to_btree", + "cmt_id": "f88efa4d6cb1fcacb9591979bacc6c57ec9d7c53" } }, - "3.2.53": { - "CVE-2013-4470": { - "cmt_msg": "ip6_output: do skb ufo init for peeked non ufo skb as well", - "cmt_id": "5124ae99ac8a8f63d0fca9b75adaef40b20678ff" + "4.4.233": { + "CVE-2020-26088": { + "cmt_msg": "net/nfc/rawsock.c: add CAP_NET_RAW check.", + "cmt_id": "de7c8ab8cb412d21ffdac94a99ef2f29f7802fd1" }, - "CVE-2013-7470": { - "cmt_msg": "net: fix cipso packet validation when !NETLABEL", - "cmt_id": "55bf9001c5311b9a3e06c2be94e59b70881adea1" + "CVE-2019-19054": { + "cmt_msg": "media: rc: prevent memory leak in cx23888_ir_probe", + "cmt_id": "84c9c409286617385e71d4d0d0c9dd940b574469" }, - "CVE-2014-1445": { - "cmt_msg": "wanxl: fix info leak in ioctl", - "cmt_id": "e6c24ff286f37711185fe1b6ce1cea58d7fc8c50" + "CVE-2020-25212": { + "cmt_msg": "nfs: Fix getxattr kernel panic and memory overflow", + "cmt_id": "db61fb8278925f54ccb0172471164aeb56ec6537" }, - "CVE-2014-1444": { - "cmt_msg": "farsync: fix info leak in ioctl", - "cmt_id": "5bf019ebfa38379d51698b7f0fefcd44d6f0447d" + "CVE-2019-9445": { + "cmt_msg": "f2fs: check if file namelen exceeds max value", + "cmt_id": "559eff3dca325947bc3d88d17f4c454111884be5" }, - "CVE-2013-7027": { - "cmt_msg": "wireless: radiotap: fix parsing buffer overrun", - "cmt_id": "d58900877a2845d03b40638fc3b4f2b2d0afe652" + "CVE-2018-13094": { + "cmt_msg": "xfs: don't call xfs_da_shrink_inode with NULL bp", + "cmt_id": "3d5eb8428488648c544e82e6b8b9fd391b107ed9" }, - "CVE-2013-6383": { - "cmt_msg": "aacraid: missing capable() check in compat ioctl", - "cmt_id": "a88f5ccd2ac9798c046609a8aec18c3f522a6334" + "CVE-2018-8043": { + "cmt_msg": "net: phy: mdio-bcm-unimac: fix potential NULL dereference in unimac_mdio_probe()", + "cmt_id": "52e4b929c3bd6fac2a8cf4c2609d71486bde072c" }, - "CVE-2013-4512": { - "cmt_msg": "uml: check length in exitcode_proc_write()", - "cmt_id": "02c54b6cf2b7bd1089bef485d7a81bdf0c5999d8" + "CVE-2020-16166": { + "cmt_msg": "random32: update the net random state on interrupt and activity", + "cmt_id": "40713057d1d11fc86f0ed02383373281d87841a3" }, - "CVE-2013-4511": { - "cmt_msg": "uml: check length in exitcode_proc_write()", - "cmt_id": "02c54b6cf2b7bd1089bef485d7a81bdf0c5999d8" + "CVE-2020-36386": { + "cmt_msg": "Bluetooth: Fix slab-out-of-bounds read in hci_extended_inquiry_result_evt()", + "cmt_id": "491602ede684bb8554254f12f4b1bd242dd15c61" }, - "CVE-2013-4515": { - "cmt_msg": "Staging: bcm: info leak in ioctl", - "cmt_id": "43455e8604586d80d43ebb23f9cbb31d6321ef7d" + "CVE-2020-14331": { + "cmt_msg": "vgacon: Fix for missing check in scrollback handling", + "cmt_id": "cd44c411a441d994b234605f51f0d1ee5740e353" }, - "CVE-2013-4514": { - "cmt_msg": "staging: wlags49_h2: buffer overflow setting station name", - "cmt_id": "840834b578803d8153b6fd8526d23e615916208b" + "CVE-2019-19448": { + "cmt_msg": "btrfs: only search for left_info if there is no right_info in try_merge_free_space", + "cmt_id": "b086fe8442d20dbd660812337f152ec868c64c0e" }, - "CVE-2013-4299": { - "cmt_msg": "dm snapshot: fix data corruption", - "cmt_id": "7a14369589fd368dd0a83e6b70d0a3eddef071e8" + "CVE-2019-19074": { + "cmt_msg": "ath9k: release allocated buffer if timed out", + "cmt_id": "94e3650b2568ae7a06e10c282f588ddede5df1d6" + }, + "CVE-2019-19073": { + "cmt_msg": "ath9k_htc: release allocated buffer if timed out", + "cmt_id": "60fa3632210b1dc99296100227ae2d79ebbb4780" } }, - "3.2.54": { - "CVE-2013-7264": { - "cmt_msg": "inet: prevent leakage of uninitialized memory to user in recv syscalls", - "cmt_id": "05d3c1eece356052d8119663d5415c2fcb4680d8" + "4.4.234": { + "CVE-2020-14314": { + "cmt_msg": "ext4: fix potential negative array index in do_split()", + "cmt_id": "059b1480105478c5f68cf664301545b8cad6a7cf" }, - "CVE-2013-4345": { - "cmt_msg": "crypto: ansi_cprng - Fix off by one error in non-block size request", - "cmt_id": "d1b8de7813fc2127dc16cd9f282bb63611583997" + "CVE-2020-29371": { + "cmt_msg": "romfs: fix uninitialized memory leak in romfs_dev_read()", + "cmt_id": "2935e0a3cec1ffa558eea90db6279cff83aa3592" }, - "CVE-2013-6367": { - "cmt_msg": "KVM: x86: Fix potential divide by 0 in lapic (CVE-2013-6367)", - "cmt_id": "245d4b4480c20ffb50f0eddadcc6516b9017d863" + "CVE-2020-0466": { + "cmt_msg": "do_epoll_ctl(): clean the failure exits up a bit", + "cmt_id": "d85e2b06662e7f46d0f174ecc603fc1c3554d5cf" + } + }, + "4.4.236": { + "CVE-2020-25285": { + "cmt_msg": "mm/hugetlb: fix a race between hugetlb sysctl handlers", + "cmt_id": "9c9757b4a2cd8039dddc01e8b589d9157f5d756a" }, - "CVE-2013-4592": { - "cmt_msg": "KVM: perform an invalid memslot step for gpa base change", - "cmt_id": "c2152747e746aceaa85360eb20b719a835c9d101" + "CVE-2020-0465": { + "cmt_msg": "HID: core: Sanitize event code and type when mapping input", + "cmt_id": "de801a7d3228aed8ea2bbfe36ccf3af7f9ef6f39" }, - "CVE-2013-7263": { - "cmt_msg": "inet: prevent leakage of uninitialized memory to user in recv syscalls", - "cmt_id": "05d3c1eece356052d8119663d5415c2fcb4680d8" + "CVE-2022-20565": { + "cmt_msg": "HID: core: Correctly handle ReportSize being zero", + "cmt_id": "12b27c445f2fd4a2e2c49136f26be26635cc1c73" }, - "CVE-2013-6380": { - "cmt_msg": "aacraid: prevent invalid pointer dereference", - "cmt_id": "1016f060cfaf7c575fce3a92c987d21202da3261" + "CVE-2021-1048": { + "cmt_msg": "fix regression in \"epoll: Keep a reference on files added to the check list\"", + "cmt_id": "6504c100804870911f074fd67f280756b6805958" + } + }, + "4.4.237": { + "CVE-2020-25284": { + "cmt_msg": "rbd: require global CAP_SYS_ADMIN for mapping and unmapping", + "cmt_id": "e349a5786f4c23eb11d1e7385703ddbf94f3f061" }, - "CVE-2013-6381": { - "cmt_msg": "qeth: avoid buffer overflow in snmp ioctl", - "cmt_id": "a3e38398c95c83c06c1b8028e406f3aca23ec43d" + "CVE-2020-14390": { + "cmt_msg": "fbcon: remove soft scrollback code", + "cmt_id": "1f08e80ec5751b8f565139cd7a921fbee46f8a22" }, - "CVE-2013-4348": { - "cmt_msg": "net: flow_dissector: fail on evil iph->ihl", - "cmt_id": "f7d537dc8714abf422238419d057376a772be9fd" + "CVE-2020-28097": { + "cmt_msg": "vgacon: remove software scrollback support", + "cmt_id": "5f76b4c6ac297ce836abe17f495123f45bfc4fb3" + } + }, + "4.4.238": { + "CVE-2020-25643": { + "cmt_msg": "hdlc_ppp: add range checks in ppp_cp_parse_cr()", + "cmt_id": "a49ef91286776c3f095460112846cd85a063c29a" }, - "CVE-2013-7270": { - "cmt_msg": "net: rework recvmsg handler msg_name and msg_namelen logic", - "cmt_id": "a598f7fa9c24c3ef458043d59c237b8fc5d1adad" + "CVE-2021-0605": { + "cmt_msg": "af_key: pfkey_dump needs parameter validation", + "cmt_id": "831587619afe78cd72651b34a0f6ccb2acf3c503" + } + }, + "4.4.239": { + "CVE-2020-25211": { + "cmt_msg": "netfilter: ctnetlink: add a range check for l3/l4 protonum", + "cmt_id": "3f5bfa0a2c3401bfbc0cab5894df8262de619641" }, - "CVE-2013-6378": { - "cmt_msg": "libertas: potential oops in debugfs", - "cmt_id": "e3715d06207f877ac6c15b2627515f63e2c59f57" + "CVE-2021-0448": { + "cmt_msg": "netfilter: ctnetlink: add a range check for l3/l4 protonum", + "cmt_id": "3f5bfa0a2c3401bfbc0cab5894df8262de619641" }, - "CVE-2013-7265": { - "cmt_msg": "inet: prevent leakage of uninitialized memory to user in recv syscalls", - "cmt_id": "05d3c1eece356052d8119663d5415c2fcb4680d8" + "CVE-2021-39634": { + "cmt_msg": "epoll: do not insert into poll queues until all sanity checks are done", + "cmt_id": "ea984dfe0e7978cd294eb6a640ac27fa1834ac8d" }, - "CVE-2013-7266": { - "cmt_msg": "net: rework recvmsg handler msg_name and msg_namelen logic", - "cmt_id": "a598f7fa9c24c3ef458043d59c237b8fc5d1adad" + "CVE-2020-28915": { + "cmt_msg": "fbcon: Fix global-out-of-bounds read in fbcon_get_font()", + "cmt_id": "0e3e69e0a8bc516e37ee3b496779b60e660b5ea5" + } + }, + "4.4.240": { + "CVE-2020-10135": { + "cmt_msg": "Bluetooth: Consolidate encryption handling in hci_encrypt_cfm", + "cmt_id": "554ab8c6e143606bb205c7d694656fac3d6e3cc2" }, - "CVE-2013-4587": { - "cmt_msg": "KVM: Improve create VCPU parameter (CVE-2013-4587)", - "cmt_id": "4a94970b318e0d7387c2d84fa7c92ea782ae52b3" + "CVE-2020-12352": { + "cmt_msg": "Bluetooth: A2MP: Fix not initializing all members", + "cmt_id": "e7b465bda9b90bec5427775bcbbfc47fe7a6012b" + } + }, + "4.4.241": { + "CVE-2020-27784": { + "cmt_msg": "usb: gadget: function: printer: fix use-after-free in __lock_acquire", + "cmt_id": "25c95c6bd4dc50a3c20de0fa7f450ea02b2320fc" + }, + "CVE-2020-25705": { + "cmt_msg": "icmp: randomize the global rate limiter", + "cmt_id": "a9d0ba6aa7485aabed7b8f2ed5a3975684847e0b" + } + }, + "4.4.242": { + "CVE-2020-28974": { + "cmt_msg": "vt: Disable KD_FONT_OP_COPY", + "cmt_id": "81f26642406c16bf52015683511c814ecbe2abc3" }, - "CVE-2013-7281": { - "cmt_msg": "inet: prevent leakage of uninitialized memory to user in recv syscalls", - "cmt_id": "05d3c1eece356052d8119663d5415c2fcb4680d8" + "CVE-2020-25668": { + "cmt_msg": "tty: make FONTX ioctl use the tty pointer they were actually passed", + "cmt_id": "e847c4e2ccc80295338cc96136aec2877be82359" }, - "CVE-2013-6382": { - "cmt_msg": "xfs: underflow bug in xfs_attrlist_by_handle()", - "cmt_id": "cc5285f4c67a48e5775d633267f8e284626a990a" + "CVE-2020-25656": { + "cmt_msg": "vt: keyboard, extend func_buf_lock to readers", + "cmt_id": "f4cfdf9b1487d3512da27a1a542b4c33a4737bca" }, - "CVE-2013-6282": { - "cmt_msg": "ARM: 7527/1: uaccess: explicitly check __user pointer when !CPU_USE_DOMAINS", - "cmt_id": "b5c70f452589114e6a551803bf312eed1b57f964" + "CVE-2020-35508": { + "cmt_msg": "fork: fix copy_process(CLONE_PARENT) race with the exiting ->real_parent", + "cmt_id": "33175e2d8fdf7b07be9691ee7747a3982dcf52cd" + } + }, + "4.4.243": { + "CVE-2020-8694": { + "cmt_msg": "powercap: restrict energy meter to root access", + "cmt_id": "ed3691aa7e4ad0a987da49b9165a22255b39e9b7" + } + }, + "4.4.244": { + "CVE-2020-14351": { + "cmt_msg": "perf/core: Fix race in the perf_mmap_close() function", + "cmt_id": "17b235e6cc9d701a2eece74a64f89062072b81b1" }, - "CVE-2013-2929": { - "cmt_msg": "exec/ptrace: fix get_dumpable() incorrect tests", - "cmt_id": "983e0bc2210a853af015841de33a06abd873a4fe" + "CVE-2020-25645": { + "cmt_msg": "geneve: add transport ports in route lookup for geneve", + "cmt_id": "e98bcb65299870dfa98d2067d423da80555188c4" }, - "CVE-2013-7271": { - "cmt_msg": "net: rework recvmsg handler msg_name and msg_namelen logic", - "cmt_id": "a598f7fa9c24c3ef458043d59c237b8fc5d1adad" + "CVE-2020-0427": { + "cmt_msg": "pinctrl: devicetree: Avoid taking direct reference to device name string", + "cmt_id": "03f69244302d7954f42f528ea2d45903ebbf59f3" }, - "CVE-2013-7267": { - "cmt_msg": "net: rework recvmsg handler msg_name and msg_namelen logic", - "cmt_id": "a598f7fa9c24c3ef458043d59c237b8fc5d1adad" + "CVE-2020-27673": { + "cmt_msg": "xen/events: add a proper barrier to 2-level uevent unmasking", + "cmt_id": "33f38ccfe479fdb53bf0409e9b74e993e30d4d1f" }, - "CVE-2013-7268": { - "cmt_msg": "net: rework recvmsg handler msg_name and msg_namelen logic", - "cmt_id": "a598f7fa9c24c3ef458043d59c237b8fc5d1adad" + "CVE-2019-0148": { + "cmt_msg": "i40e: Wrong truncation from u16 to u8", + "cmt_id": "0f60ed1afff42f84dcba5a7950ee8712da8363d5" }, - "CVE-2013-7269": { - "cmt_msg": "net: rework recvmsg handler msg_name and msg_namelen logic", - "cmt_id": "a598f7fa9c24c3ef458043d59c237b8fc5d1adad" + "CVE-2020-27675": { + "cmt_msg": "xen/events: avoid removing an event channel while handling it", + "cmt_id": "c0e77192829a1a02983d672ac144e6196098cad7" } }, - "3.2.55": { - "CVE-2012-2372": { - "cmt_msg": "rds: prevent BUG_ON triggered on congestion update to loopback", - "cmt_id": "2c3178865b995398e3516a3e260c23c65efad90f" + "4.4.245": { + "CVE-2018-13093": { + "cmt_msg": "xfs: validate cached inodes are free when allocated", + "cmt_id": "f17ef9beebc7c55c5a791aacdc5992880ea15d8c" }, - "CVE-2013-4579": { - "cmt_msg": "ath9k_htc: properly set MAC address and BSSID mask", - "cmt_id": "f7a9877cc68188252558001c9f6907fcb8af0b0f" + "CVE-2020-25669": { + "cmt_msg": "Input: sunkbd - avoid use-after-free in teardown paths", + "cmt_id": "640ede0a21a0b9bd68e47ccbca87fd747e38ea0a" }, - "CVE-2014-1446": { - "cmt_msg": "hamradio/yam: fix info leak in ioctl", - "cmt_id": "794ce89c4585d8679fae8c06ddabf8d3a4c4fa53" + "CVE-2020-4788": { + "cmt_msg": "powerpc/64s: flush L1D on kernel entry", + "cmt_id": "4a1e90af718d1489ffcecc8f52486c4f5dc0f7a6" + } + }, + "4.4.247": { + "CVE-2019-19813": { + "cmt_msg": "btrfs: inode: Verify inode mode to avoid NULL pointer dereference", + "cmt_id": "d4d0b4f942fed5d5b69effe200c1df6108483385" }, - "CVE-2013-6368": { - "cmt_msg": "KVM: x86: Convert vapic synchronization to _cached functions (CVE-2013-6368)", - "cmt_id": "6aa82e036079eaf208bd581c201dc61c9200bb2e" + "CVE-2019-19816": { + "cmt_msg": "btrfs: inode: Verify inode mode to avoid NULL pointer dereference", + "cmt_id": "d4d0b4f942fed5d5b69effe200c1df6108483385" + } + }, + "4.4.248": { + "CVE-2020-29661": { + "cmt_msg": "tty: Fix ->pgrp locking in tiocspgrp()", + "cmt_id": "30f7752609a8030862f4c7faed5c845e2aa300be" }, - "CVE-2013-7339": { - "cmt_msg": "rds: prevent dereference of a NULL device", - "cmt_id": "95ae36775c086d7549bc65281d22a54b4788f933" + "CVE-2020-29660": { + "cmt_msg": "tty: Fix ->session locking", + "cmt_id": "7b4a4b9403c52343d00901babc3987588bc0b085" }, - "CVE-2014-1438": { - "cmt_msg": "x86, fpu, amd: Clear exceptions in AMD FXSAVE workaround", - "cmt_id": "bbc220abf9c3e4dbfb7372596661f580fb15a7c8" + "CVE-2020-35519": { + "cmt_msg": "net/x25: prevent a couple of overflows", + "cmt_id": "3cb72fe7ac64d5f647dbefd94ce7b54f6b92ede9" } }, - "3.2.56": { - "CVE-2014-0101": { - "cmt_msg": "net: sctp: fix sctp_sf_do_5_1D_ce to verify if we/peer is AUTH capable", - "cmt_id": "c7160985f53fe845eb5e882a492196a844962650" - }, - "CVE-2014-2672": { - "cmt_msg": "ath9k: protect tid->sched check", - "cmt_id": "cf117670cf074367290d5993fe3111ac6d6b1777" + "4.4.249": { + "CVE-2020-27815": { + "cmt_msg": "jfs: Fix array index bounds check in dbAdjTree", + "cmt_id": "b01bec9ec3b196a8a33d0d68991c8a45c8c24551" }, - "CVE-2014-8709": { - "cmt_msg": "mac80211: fix fragmentation code, particularly for encryption", - "cmt_id": "c7b18cdf1887e8ce91e04342cfd2d8fe1630be92" + "CVE-2020-29568": { + "cmt_msg": "xen/xenbus: Allow watches discard events before queueing", + "cmt_id": "de66402f45c0cae9566b1568cc1b2df2b5ccbbf8" + } + }, + "4.4.250": { + "CVE-2020-36158": { + "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_cmd_802_11_ad_hoc_start", + "cmt_id": "878ba6234c5827722d79767d39450340e228ce86" + } + }, + "4.4.252": { + "CVE-2020-28374": { + "cmt_msg": "scsi: target: Fix XCOPY NAA identifier lookup", + "cmt_id": "87be50177ddb789330e6c5ddcc2f301cec0017dc" + } + }, + "4.4.253": { + "CVE-2021-3178": { + "cmt_msg": "nfsd4: readdirplus shouldn't return parent of export", + "cmt_id": "c89b2b56fc536d4fd41745bcbf394aa21162e277" + } + }, + "4.4.254": { + "CVE-2020-27825": { + "cmt_msg": "tracing: Fix race in trace_open and buffer resize call", + "cmt_id": "a7c2dd4438056fb665a376860242463a30f2d2e8" }, - "CVE-2014-2706": { - "cmt_msg": "mac80211: fix AP powersave TX vs. wakeup race", - "cmt_id": "ad64b463d919a18be70b281efb135231169caf4a" + "CVE-2021-39657": { + "cmt_msg": "scsi: ufs: Correct the LUN used in eh_device_reset_handler() callback", + "cmt_id": "a4cdbf4805bfed8f39e6b25f113588064d9a6ac5" } }, - "3.2.57": { - "CVE-2014-2523": { - "cmt_msg": "netfilter: nf_conntrack_dccp: fix skb_header_pointer API usages", - "cmt_id": "5b866eaa34e4ddc312c927030fde5f6a6184ddc5" + "4.4.258": { + "CVE-2021-26931": { + "cmt_msg": "xen-blkback: don't \"handle\" error by BUG()", + "cmt_id": "74e38b7a6972fd6983e6fbd929b65746ce975aed" }, - "CVE-2014-2039": { - "cmt_msg": "s390: fix kernel crash due to linkage stack instructions", - "cmt_id": "1664028240024d96721a5328c93ff206661cd9e1" + "CVE-2021-26930": { + "cmt_msg": "xen-blkback: fix error handling in xen_blkbk_map()", + "cmt_id": "2e6cc64b7b56e5c2d2c01de8ff1b3986342c2b18" }, - "CVE-2013-4483": { - "cmt_msg": "ipc,sem: fine grained locking for semtimedop", - "cmt_id": "91182754daa6ca26dd2e97ee0b0f6e9e37d33324" + "CVE-2021-26932": { + "cmt_msg": "Xen/x86: don't bail early from clear_foreign_p2m_mapping()", + "cmt_id": "15b6ca2cef13f06ef41d9ebc094ef7770fd98ab3" + } + }, + "4.4.259": { + "CVE-2021-0512": { + "cmt_msg": "HID: make arrays usage and value to be the same", + "cmt_id": "795a8c31cabf1a452b0b63bb3f8d9159b353e5ce" }, - "CVE-2014-0069": { - "cmt_msg": "cifs: ensure that uncached writes handle unmapped areas correctly", - "cmt_id": "b1a292f3ccbbfe864cb4931e8fed4baea6b17eb8" + "CVE-2021-3612": { + "cmt_msg": "Input: joydev - prevent potential read overflow in ioctl", + "cmt_id": "ade5180681d778d36b569ad35cc175ab22196c5f" } }, - "3.2.58": { - "CVE-2014-2309": { - "cmt_msg": "ipv6: don't set DST_NOCOUNT for remotely added routes", - "cmt_id": "5aa3bcddc8ddc4a8c09541d4b608bfa765631a6d" + "4.4.260": { + "CVE-2021-30002": { + "cmt_msg": "media: v4l: ioctl: Fix memory leak in video_usercopy", + "cmt_id": "432b08869893ebd751e815465b822bb99cf710e7" }, - "CVE-2014-2678": { - "cmt_msg": "rds: prevent dereference of a NULL device in rds_iw_laddr_check", - "cmt_id": "710da494970f1d73c7df3fc0997e565cf4396e9d" + "CVE-2021-27365": { + "cmt_msg": "scsi: iscsi: Ensure sysfs attributes are limited to PAGE_SIZE", + "cmt_id": "b8a757b57ba3e27d6399106a78350af513fb0bb5" }, - "CVE-2014-0077": { - "cmt_msg": "vhost: fix total length when packets are too short", - "cmt_id": "cb505037a28ad1d8c378b40366e17fbbc44d10e6" + "CVE-2021-27364": { + "cmt_msg": "scsi: iscsi: Restrict sessions and handles to admin capabilities", + "cmt_id": "67c6818821a39fb50e1b84e7259aee5298d2c512" }, - "CVE-2014-3122": { - "cmt_msg": "mm: try_to_unmap_cluster() should lock_page() before mlocking", - "cmt_id": "8e8836abf74a0b227c651cf76466b8d711470a76" + "CVE-2021-27363": { + "cmt_msg": "scsi: iscsi: Restrict sessions and handles to admin capabilities", + "cmt_id": "67c6818821a39fb50e1b84e7259aee5298d2c512" }, - "CVE-2014-0055": { - "cmt_msg": "vhost: validate vhost_get_vq_desc return value", - "cmt_id": "4334fca3512d179726666ad18459965916a1f189" + "CVE-2021-28038": { + "cmt_msg": "Xen/gnttab: handle p2m update errors on a per-slot basis", + "cmt_id": "f2c9673ce689801ef3bee517013b0c9b94dd14fa" } }, - "3.2.59": { - "CVE-2014-1738": { - "cmt_msg": "floppy: don't write kernel-only members to FDRAWCMD ioctl output", - "cmt_id": "629cbea2961ec001a85a4ac8821dcd45226dd29c" + "4.4.262": { + "CVE-2019-19060": { + "cmt_msg": "iio: imu: adis16400: release allocated memory on failure", + "cmt_id": "00552ca5cae5e86311df6cfd5911213c89ece4e2" }, - "CVE-2014-0196": { - "cmt_msg": "n_tty: Fix n_tty_write crash when echoing in raw mode", - "cmt_id": "1e5099713cefc67aa562f6d8fe43444f41baf52d" + "CVE-2019-19061": { + "cmt_msg": "iio: imu: adis16400: fix memory leak", + "cmt_id": "7671c44edfd0411c7411266f0c90dd21b535c3d4" }, - "CVE-2014-1737": { - "cmt_msg": "floppy: ignore kernel-only members in FDRAWCMD ioctl input", - "cmt_id": "d79119d4089defc81a49c6a7e26ff5ff86f4b342" - } - }, - "3.2.60": { - "CVE-2014-1739": { - "cmt_msg": "media-device: fix infoleak in ioctl media_enum_entities()", - "cmt_id": "5003eea6cec931203469521351918d4a54c18185" + "CVE-2021-28660": { + "cmt_msg": "staging: rtl8188eu: prevent ->ssid overflow in rtw_wx_set_scan()", + "cmt_id": "36f8d0af46daf6eb4c7c5edf6adbfa02e9c70f92" }, - "CVE-2014-3144": { - "cmt_msg": "filter: prevent nla extensions to peek beyond the end of the message", - "cmt_id": "d41eb74e53d94aba656ffda647d106808e636cd6" + "CVE-2021-20261": { + "cmt_msg": "floppy: fix lock_fdc() signal handling", + "cmt_id": "b93c6b400ed51e526e724b430a115293fd147466" }, - "CVE-2014-2851": { - "cmt_msg": "net: ipv4: current group_info should be put after using.", - "cmt_id": "a8a695a43272a19b08004a3632da23d03170bd87" + "CVE-2021-29265": { + "cmt_msg": "usbip: fix stub_dev usbip_sockfd_store() races leading to gpf", + "cmt_id": "9ee196f307ec006cac386a0d8b7935dd2ccd0083" }, - "CVE-2014-3153": { - "cmt_msg": "futex: Make lookup_pi_state more robust", - "cmt_id": "5957ab36e4d0b027f2f32618d30dcc135fbd7077" + "CVE-2019-16232": { + "cmt_msg": "libertas: fix a potential NULL pointer dereference", + "cmt_id": "3b431b60940fa2cda06d6b4906e11acd222d471a" + } + }, + "4.4.263": { + "CVE-2021-28964": { + "cmt_msg": "btrfs: fix race when cloning extent buffer during rewind of an old root", + "cmt_id": "2922e2e894781c36ce014935f05163287635609c" }, - "CVE-2014-3145": { - "cmt_msg": "filter: prevent nla extensions to peek beyond the end of the message", - "cmt_id": "d41eb74e53d94aba656ffda647d106808e636cd6" + "CVE-2021-28972": { + "cmt_msg": "PCI: rpadlpar: Fix potential drc_name corruption in store functions", + "cmt_id": "4639466722c2ea832bc145c06cd5aa2012db9102" } }, - "3.2.61": { - "CVE-2014-4508": { - "cmt_msg": "x86_32, entry: Do syscall exit work on badsys (CVE-2014-4508)", - "cmt_id": "bb99d6796995968ca6a42b17fbfb48d073bb234c" + "4.4.264": { + "CVE-2021-28688": { + "cmt_msg": "xen-blkback: don't leak persistent grants from xen_blkbk_map()", + "cmt_id": "47b6b2742ee60334c40d75bfaab49028688f1510" + } + }, + "4.4.265": { + "CVE-2021-3483": { + "cmt_msg": "firewire: nosy: Fix a use-after-free bug in nosy_ioctl()", + "cmt_id": "63d8737a59ae58e5c2d5fd640c294e7b5bb1d394" + } + }, + "4.4.266": { + "CVE-2021-29154": { + "cmt_msg": "bpf, x86: Validate computation of branch displacements for x86-64", + "cmt_id": "ca97582a3fe79543de8e5905e829c5ad3661a1ef" + } + }, + "4.4.267": { + "CVE-2021-3659": { + "cmt_msg": "net: mac802154: Fix general protection fault", + "cmt_id": "cd19d85e6d4a361beb11431af3d22248190f5b48" }, - "CVE-2014-4157": { - "cmt_msg": "MIPS: asm: thread_info: Add _TIF_SECCOMP flag", - "cmt_id": "f50bf61a3282988b2fe46e8cb88c9b8698a2d8d2" + "CVE-2021-0937": { + "cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write", + "cmt_id": "b0d98b2193a38ef93c92e5e1953d134d0f426531" }, - "CVE-2014-4699": { - "cmt_msg": "ptrace,x86: force IRET path after a ptrace_stop()", - "cmt_id": "a0eb191eff753e790def174b3fbe66efadfd401d" + "CVE-2020-25672": { + "cmt_msg": "nfc: fix memory leak in llcp_sock_connect()", + "cmt_id": "7ed6c0c7db2099792768150c070efca71e85bdf3" }, - "CVE-2014-4655": { - "cmt_msg": "ALSA: control: Fix replacing user controls", - "cmt_id": "0e2e43eca302b31f64ebfe4734fd2cc7358c4555" + "CVE-2020-25673": { + "cmt_msg": "nfc: Avoid endless loops caused by repeated llcp_sock_connect()", + "cmt_id": "7f6c9e4314aa7d90b6261b8ae571d14c454ba964" }, - "CVE-2014-4667": { - "cmt_msg": "sctp: Fix sk_ack_backlog wrap-around problem", - "cmt_id": "fe33a3ee987dac85ac24b2d8147d2165051c80d9" + "CVE-2020-25670": { + "cmt_msg": "nfc: fix refcount leak in llcp_sock_bind()", + "cmt_id": "a1cdd18c49d23ec38097ac2c5b0d761146fc0109" }, - "CVE-2014-4654": { - "cmt_msg": "ALSA: control: Fix replacing user controls", - "cmt_id": "0e2e43eca302b31f64ebfe4734fd2cc7358c4555" + "CVE-2020-25671": { + "cmt_msg": "nfc: fix refcount leak in llcp_sock_connect()", + "cmt_id": "a524eabb5e309e49ee2d8422a771c5cedef003c4" }, - "CVE-2014-3917": { - "cmt_msg": "auditsc: audit_krule mask accesses need bounds checking", - "cmt_id": "38831a0a5984c10d6763aba7e3fffe7fe04a1741" + "CVE-2021-22555": { + "cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write", + "cmt_id": "b0d98b2193a38ef93c92e5e1953d134d0f426531" + } + }, + "4.4.268": { + "CVE-2021-46904": { + "cmt_msg": "net: hso: fix null-ptr-deref during tty device unregistration", + "cmt_id": "a462067d7c8e6953a733bf5ade8db947b1bb5449" + } + }, + "4.4.269": { + "CVE-2021-33034": { + "cmt_msg": "Bluetooth: verify AMP hci_chan before amp_destroy", + "cmt_id": "b27a218d166b7f07cd5616fb90e727b6ed662b1a" }, - "CVE-2014-0131": { - "cmt_msg": "skbuff: skb_segment: orphan frags before copying", - "cmt_id": "77c01a54cde87eb3bf6685fb44398352f11db3fa" + "CVE-2017-0605": { + "cmt_msg": "tracing: Use strlcpy() instead of strcpy() in __trace_find_cmdline()", + "cmt_id": "150381302389fa01425396489a21dc7c53383a5b" }, - "CVE-2014-4656": { - "cmt_msg": "ALSA: control: Handle numid overflow", - "cmt_id": "e3ca27c942102af152aabb2d2a4ab5fa0abe7d95" + "CVE-2021-31916": { + "cmt_msg": "dm ioctl: fix out of bounds array access when no devices", + "cmt_id": "0c0f93fbd20276d65ae0581edfcdc93579aa1dc7" }, - "CVE-2014-4653": { - "cmt_msg": "ALSA: control: Don't access controls outside of protected regions", - "cmt_id": "79b789d8e20e22196285ac98247b5aeee2cade17" + "CVE-2021-46939": { + "cmt_msg": "tracing: Restructure trace_clock_global() to never block", + "cmt_id": "91ca6f6a91f679c8645d7f3307e03ce86ad518c4" }, - "CVE-2014-4652": { - "cmt_msg": "ALSA: control: Protect user controls against concurrent access", - "cmt_id": "7a3e84b9fd584f2f41600a69fe3cc317b2c34b14" + "CVE-2021-4157": { + "cmt_msg": "pNFS/flexfiles: fix incorrect size check in decode_nfs_fh()", + "cmt_id": "0c5ccd5e2a2e291774618c24c459fa397fd1b7da" } }, - "3.2.62": { - "CVE-2014-3534": { - "cmt_msg": "s390/ptrace: fix PSW mask check", - "cmt_id": "438127dd5b66029f904e96900d0f90b1c5a80bf9" + "4.4.270": { + "CVE-2020-26558": { + "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical", + "cmt_id": "75523bbfb0eaead670c97fbcf096ca2ab556f0c0" }, - "CVE-2014-4943": { - "cmt_msg": "net/l2tp: don't fall back on UDP [get|set]sockopt", - "cmt_id": "1179c8f1caca90caf4ce0eec54b499de4f1551c4" + "CVE-2021-0129": { + "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical", + "cmt_id": "75523bbfb0eaead670c97fbcf096ca2ab556f0c0" }, - "CVE-2014-4171": { - "cmt_msg": "shmem: fix faulting into a hole while it's punched", - "cmt_id": "f159cc257190477cece829606cfb879612f52f2c" + "CVE-2020-26555": { + "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical", + "cmt_id": "75523bbfb0eaead670c97fbcf096ca2ab556f0c0" } }, - "3.2.63": { - "CVE-2014-5077": { - "cmt_msg": "net: sctp: inherit auth_capable on INIT collisions", - "cmt_id": "38710dd12b99b31bd21b0eac5f457915eaf5e04b" - }, - "CVE-2014-5472": { - "cmt_msg": "isofs: Fix unbounded recursion when processing relocated directories", - "cmt_id": "d6621d0d6de4b00498cf1bcd8b78f3caa80edf13" + "4.4.271": { + "CVE-2021-47146": { + "cmt_msg": "mld: fix panic in mld_newpack()", + "cmt_id": "0e35b7457b7b6e73ffeaaca1a577fdf1af0feca1" }, - "CVE-2014-3186": { - "cmt_msg": "HID: picolcd: sanity check report size in raw_event() callback", - "cmt_id": "b23ea023ee26e97ba6ffdc3c9d54448a77f1b894" + "CVE-2020-24587": { + "cmt_msg": "mac80211: prevent mixed key and fragment cache attacks", + "cmt_id": "229fa01b0bd72559e5c5b99e402f180e47ad86a8" }, - "CVE-2014-5471": { - "cmt_msg": "isofs: Fix unbounded recursion when processing relocated directories", - "cmt_id": "d6621d0d6de4b00498cf1bcd8b78f3caa80edf13" + "CVE-2020-24586": { + "cmt_msg": "mac80211: prevent mixed key and fragment cache attacks", + "cmt_id": "229fa01b0bd72559e5c5b99e402f180e47ad86a8" }, - "CVE-2014-3181": { - "cmt_msg": "HID: magicmouse: sanity check report size in raw_event() callback", - "cmt_id": "e3ead9249d874dbb7a8e7c3e6e54de35a481986c" + "CVE-2021-47168": { + "cmt_msg": "NFS: fix an incorrect limit in filelayout_decode_layout()", + "cmt_id": "9d280ab53df1d4a1043bd7a9e7c6a2f9cfbfe040" }, - "CVE-2014-3182": { - "cmt_msg": "HID: logitech: perform bounds checking on device_id early enough", - "cmt_id": "e6bc6f668be4ada3a23c136035cb2b83e8521da5" + "CVE-2021-34981": { + "cmt_msg": "Bluetooth: cmtp: fix file refcount when cmtp_attach_device fails", + "cmt_id": "61a811e8f5229264b822361f8b23d7638fd8c914" }, - "CVE-2014-3184": { - "cmt_msg": "HID: fix a couple of off-by-ones", - "cmt_id": "328538d74181a95fa26fa354314f6079945fd5ee" + "CVE-2020-24588": { + "cmt_msg": "cfg80211: mitigate A-MSDU aggregation attacks", + "cmt_id": "daea7ff51861cec93ff7f561095d9048b673b51f" }, - "CVE-2014-3185": { - "cmt_msg": "USB: whiteheat: Added bounds checking for bulk command response", - "cmt_id": "f92c5bd2c6fcbc55377645c6c023dff1e8849c3b" + "CVE-2020-26139": { + "cmt_msg": "mac80211: do not accept/forward invalid EAPOL frames", + "cmt_id": "e3d4030498c304d7c36bccc6acdedacf55402387" }, - "CVE-2014-3601": { - "cmt_msg": "kvm: iommu: fix the third parameter of kvm_iommu_put_pages (CVE-2014-3601)", - "cmt_id": "1bc6485405f05ff9912055c67b43fc86b183eec3" - } - }, - "3.2.64": { - "CVE-2014-3687": { - "cmt_msg": "net: sctp: fix panic on duplicate ASCONF chunks", - "cmt_id": "9a3c6f2e051b608181aff9345481e586b2d54fc9" + "CVE-2021-47173": { + "cmt_msg": "misc/uss720: fix memory leak in uss720_probe", + "cmt_id": "5f46b2410db2c8f26b8bb91b40deebf4ec184391" }, - "CVE-2014-3690": { - "cmt_msg": "x86,kvm,vmx: Preserve CR4 across VM entry", - "cmt_id": "9e793c5ed9204271ecc2cb7c899010e70561a452" + "CVE-2021-47166": { + "cmt_msg": "NFS: Don't corrupt the value of pg_bytes_written in nfs_do_recoalesce()", + "cmt_id": "e8b8418ce14ae66ee55179901edd12191ab06a9e" }, - "CVE-2014-7207": { - "cmt_msg": "ipv6: reuse ip6_frag_id from ip6_ufo_append_data", - "cmt_id": "8db33010af3020af7f4904b2dfffc9841ffc42e4" + "CVE-2020-26147": { + "cmt_msg": "mac80211: assure all fragments are encrypted", + "cmt_id": "16cbc9756dd84e870867f003a200553931dd461b" }, - "CVE-2014-3647": { - "cmt_msg": "KVM: x86: Emulator fixes for eip canonical checks on near branches", - "cmt_id": "71ca9dc31fd6cd39ade2b3b6f1fa8fe4f2a915fa" + "CVE-2021-47149": { + "cmt_msg": "net: fujitsu: fix potential null-ptr-deref", + "cmt_id": "b92170e209f7746ed72eaac98f2c2f4b9af734e6" }, - "CVE-2014-3646": { - "cmt_msg": "kvm: vmx: handle invvpid vm exit gracefully", - "cmt_id": "3f09b1f1033b9a6350b72649c6abdafdf81e5c2d" + "CVE-2021-47162": { + "cmt_msg": "tipc: skb_linearize the head skb when reassembling msgs", + "cmt_id": "b2c8d28c34b3070407cb1741f9ba3f15d0284b8b" }, - "CVE-2014-3645": { - "cmt_msg": "nEPT: Nested INVEPT", - "cmt_id": "02a988e6e4511b1f6d83525710a12db9c5a45149" + "CVE-2021-47171": { + "cmt_msg": "net: usb: fix memory leak in smsc75xx_bind", + "cmt_id": "200dbfcad8011e50c3cec269ed7b980836eeb1fa" }, - "CVE-2014-3673": { - "cmt_msg": "net: sctp: fix skb_over_panic when receiving malformed ASCONF chunks", - "cmt_id": "aa001b043dde50e2856fe9460bc819d2a70dc309" + "CVE-2021-47145": { + "cmt_msg": "btrfs: do not BUG_ON in link_to_fixup_dir", + "cmt_id": "76bfd8ac20bebeae599452a03dfc5724c0475dcf" }, - "CVE-2014-6418": { - "cmt_msg": "libceph: do not hard code max auth ticket len", - "cmt_id": "3ab3b3b67868458de3b047e199c0efe8119ef0de" + "CVE-2021-29650": { + "cmt_msg": "netfilter: x_tables: Use correct memory barriers.", + "cmt_id": "9bc6c1246941cf88cf06a27153d6a1108a240067" }, - "CVE-2014-3610": { - "cmt_msg": "KVM: x86: Check non-canonical addresses upon WRMSR", - "cmt_id": "76715b56c6fcdafae8d47d4fcfe8c940e76f0553" + "CVE-2021-47142": { + "cmt_msg": "drm/amdgpu: Fix a use-after-free", + "cmt_id": "0707c3fea8102d211631ba515ef2159707561b0d" }, - "CVE-2014-3611": { - "cmt_msg": "KVM: x86: Improve thread safety in pit", - "cmt_id": "30a340f59414f02434e8b7a880241b2bd657cb7b" + "CVE-2021-47180": { + "cmt_msg": "NFC: nci: fix memory leak in nci_allocate_device", + "cmt_id": "448a1cb12977f52142e6feb12022c59662d88dc1" }, - "CVE-2014-3688": { - "cmt_msg": "net: sctp: fix remote memory pressure from excessive queueing", - "cmt_id": "3a8c709ba4cf6fe86f5069c71325029d412bcf1e" + "CVE-2021-47153": { + "cmt_msg": "i2c: i801: Don't generate an interrupt on bus reset", + "cmt_id": "f9469082126cebb7337db3992d143f5e4edfe629" }, - "CVE-2014-6417": { - "cmt_msg": "libceph: do not hard code max auth ticket len", - "cmt_id": "3ab3b3b67868458de3b047e199c0efe8119ef0de" + "CVE-2021-47169": { + "cmt_msg": "serial: rp2: use 'request_firmware' instead of 'request_firmware_nowait'", + "cmt_id": "1e04d5d5fe5e76af68f834e1941fcbfa439653be" }, - "CVE-2014-6416": { - "cmt_msg": "libceph: do not hard code max auth ticket len", - "cmt_id": "3ab3b3b67868458de3b047e199c0efe8119ef0de" + "CVE-2021-32399": { + "cmt_msg": "bluetooth: eliminate the potential race condition when removing the HCI controller", + "cmt_id": "a7dc1c981038bbd5f7379148d7fd8821d2a7b9ae" } }, - "3.2.65": { - "CVE-2014-9090": { - "cmt_msg": "x86_64, traps: Stop using IST for #SS", - "cmt_id": "4c414592a79b82ddca76945c7afb4843684aa9a8" + "4.4.272": { + "CVE-2021-3573": { + "cmt_msg": "Bluetooth: use correct lock to prevent UAF of hdev object", + "cmt_id": "2260759b5300865dc209150e925aaeb9df758630" }, - "CVE-2014-4608": { - "cmt_msg": "lzo: check for length overrun in variable length encoding.", - "cmt_id": "69d33070a8f165c4bd69fe208085f262201d10fb" + "CVE-2021-47122": { + "cmt_msg": "net: caif: fix memory leak in caif_device_notify", + "cmt_id": "b042e2b2039565eb8f0eb51c14fbe1ef463c8cd8" }, - "CVE-2014-9322": { - "cmt_msg": "x86_64, traps: Stop using IST for #SS", - "cmt_id": "4c414592a79b82ddca76945c7afb4843684aa9a8" + "CVE-2021-47121": { + "cmt_msg": "net: caif: fix memory leak in cfusbl_device_notify", + "cmt_id": "cc302e30a504e6b60a9ac8df7988646f46cd0294" }, - "CVE-2014-7826": { - "cmt_msg": "tracing/syscalls: Ignore numbers outside NR_syscalls' range", - "cmt_id": "8043761416d5ae6d8fe5e95331d26465d52e8c6e" + "CVE-2021-3564": { + "cmt_msg": "Bluetooth: fix the erroneous flush_work() order", + "cmt_id": "054b0b4f9bf86baac0774e1ea38f4b65497089e5" }, - "CVE-2014-7825": { - "cmt_msg": "tracing/syscalls: Ignore numbers outside NR_syscalls' range", - "cmt_id": "8043761416d5ae6d8fe5e95331d26465d52e8c6e" + "CVE-2021-47117": { + "cmt_msg": "ext4: fix bug on in ext4_es_cache_extent as ext4_split_extent_at failed", + "cmt_id": "e33bafad30d34cfa5e9787cb099cab05e2677fcb" + }, + "CVE-2021-47114": { + "cmt_msg": "ocfs2: fix data corruption by fallocate", + "cmt_id": "624fa7baa3788dc9e57840ba5b94bc22b03cda57" + }, + "CVE-2021-47118": { + "cmt_msg": "pid: take a reference when initializing `cad_pid`", + "cmt_id": "764c2e892d1fe895392aff62fb353fdce43bb529" + }, + "CVE-2021-38208": { + "cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect", + "cmt_id": "eb6875d48590d8e564092e831ff07fa384d7e477" + }, + "CVE-2021-3587": { + "cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect", + "cmt_id": "eb6875d48590d8e564092e831ff07fa384d7e477" } }, - "3.2.66": { - "CVE-2014-8133": { - "cmt_msg": "x86/tls: Validate TLS entries to protect espfix", - "cmt_id": "106ed96d46fcaf9f2e72555035fa585403cf4dd3" + "4.4.274": { + "CVE-2021-34693": { + "cmt_msg": "can: bcm: fix infoleak in struct bcm_msg_head", + "cmt_id": "f638caa211e7a121a5596986d29ebbdaf9156398" }, - "CVE-2015-7509": { - "cmt_msg": "ext4: make orphan functions be no-op in no-journal mode", - "cmt_id": "6d9f360c00512f6a6fded2efcfcbe78ec73e5b1b" + "CVE-2021-46906": { + "cmt_msg": "HID: usbhid: fix info leak in hid_submit_ctrl", + "cmt_id": "c5d3c142f2d57d40c55e65d5622d319125a45366" }, - "CVE-2014-7841": { - "cmt_msg": "net: sctp: fix NULL pointer dereference in af->from_addr_param on malformed packet", - "cmt_id": "590461b16c5464b9d4377898abc057239a6afc3a" + "CVE-2021-45486": { + "cmt_msg": "inet: use bigger hash table for IP ID generation", + "cmt_id": "8fb8c138b5d69128964e54e1b5ee49fc395f011c" + } + }, + "4.4.276": { + "CVE-2021-45485": { + "cmt_msg": "ipv6: use prandom_u32() for ID generation", + "cmt_id": "c43fa9ee9f1de295474a28903607f84209d7e611" }, - "CVE-2014-7842": { - "cmt_msg": "KVM: x86: Don't report guest userspace emulation error to userspace", - "cmt_id": "1aded21661bda559a407cfb7c69d0e53b72bc671" + "CVE-2022-0850": { + "cmt_msg": "ext4: fix kernel infoleak via ext4_extent_header", + "cmt_id": "ce14bff239a107344b153bd6504a2f8165f672e9" }, - "CVE-2014-8134": { - "cmt_msg": "x86, kvm: Clear paravirt_enabled on KVM guests for espfix32's benefit", - "cmt_id": "060d11323f35afb752a7ba6c5bead732c204de55" + "CVE-2023-28772": { + "cmt_msg": "seq_buf: Fix overflow in seq_buf_putmem_hex()", + "cmt_id": "7ad5c2f4dff68a00d24f0692e027b99c7231b995" }, - "CVE-2014-6410": { - "cmt_msg": "udf: Avoid infinite loop when processing indirect ICBs", - "cmt_id": "7ecef8c8b70c21c944ccdf8b8406292e71038a98" + "CVE-2021-3609": { + "cmt_msg": "can: bcm: delay release of struct bcm_op after synchronize_rcu()", + "cmt_id": "9c47fa9295ce58433cae4376240b738b126637d4" }, - "CVE-2014-8559": { - "cmt_msg": "move d_rcu from overlapping d_child to overlapping d_alias", - "cmt_id": "026181647a6262f4ba6d60c0847d306ad685468c" + "CVE-2021-33909": { + "cmt_msg": "seq_file: disallow extremely large seq buffer allocations", + "cmt_id": "3533e50cbee8ff086bfa04176ac42a01ee3db37d" }, - "CVE-2014-8884": { - "cmt_msg": "ttusb-dec: buffer overflow in ioctl", - "cmt_id": "2f67670174ad4bd1c48e8b97cc107e3232d422ce" + "CVE-2021-38160": { + "cmt_msg": "virtio_console: Assure used length from device is limited", + "cmt_id": "187f14fb88a9e62d55924748a274816fe6f34de6" } }, - "3.2.67": { - "CVE-2014-9644": { - "cmt_msg": "crypto: include crypto- module prefix in template", - "cmt_id": "bed7f528031d6c800615380990af22cd8b0e3577" - }, - "CVE-2014-8160": { - "cmt_msg": "netfilter: conntrack: disable generic tracking for known protocols", - "cmt_id": "d7cde286daad20dd171247ea47fc5ff4868591f0" + "4.4.277": { + "CVE-2021-38204": { + "cmt_msg": "usb: max-3421: Prevent corruption of freed memory", + "cmt_id": "fc2a7c2280fa2be8ff9b5af702368fcd49a0acdb" }, - "CVE-2013-6885": { - "cmt_msg": "x86, cpu, amd: Add workaround for family 16h, erratum 793", - "cmt_id": "9ec2b3153415ca412de6471baec2e61ec89997e1" + "CVE-2021-3679": { + "cmt_msg": "tracing: Fix bug in rb_per_cpu_empty() that might cause deadloop.", + "cmt_id": "afa091792525dfa6c3c854069ec6b8a5ccc62c11" }, - "CVE-2014-9419": { - "cmt_msg": "x86_64, switch_to(): Load TLS descriptors before switching DS and ES", - "cmt_id": "cca3e6170e186ad88c11ee91cfd37d400dcaa9b0" + "CVE-2021-37576": { + "cmt_msg": "KVM: PPC: Book3S: Fix H_RTAS rets buffer overflow", + "cmt_id": "1e90a673f6ee09c668fe01aa1b94924f972c9811" + } + }, + "4.4.278": { + "CVE-2021-0920": { + "cmt_msg": "af_unix: fix garbage collect vs MSG_PEEK", + "cmt_id": "72247f34d90e25c1493436e45e193e8306082b19" }, - "CVE-2014-9584": { - "cmt_msg": "isofs: Fix unchecked printing of ER records", - "cmt_id": "48c47581acba6c3cc9739b33a1107c5446db0a82" + "CVE-2021-21781": { + "cmt_msg": "ARM: ensure the signal page contains defined contents", + "cmt_id": "8db77dca7e1d1d1d6aa9334207ead57853832bb7" + } + }, + "4.4.281": { + "CVE-2021-38205": { + "cmt_msg": "net: xilinx_emaclite: Do not print real IOMEM pointer", + "cmt_id": "3d4ba14fc5ffbe5712055af09a5c0cbab93c0f44" }, - "CVE-2014-9420": { - "cmt_msg": "isofs: Fix infinite looping over CE entries", - "cmt_id": "212c4d33ca83e2144064fe9c2911607fbed5386f" + "CVE-2021-3732": { + "cmt_msg": "ovl: prevent private clone if bind mount is not allowed", + "cmt_id": "c6e8810d25295acb40a7b69ed3962ff181919571" + } + }, + "4.4.282": { + "CVE-2021-3653": { + "cmt_msg": "KVM: nSVM: avoid picking up unsupported bits from L2 in int_ctl (CVE-2021-3653)", + "cmt_id": "53723b7be26ef31ad642ce5ffa8b42dec16db40e" }, - "CVE-2014-9529": { - "cmt_msg": "KEYS: close race between key lookup and freeing", - "cmt_id": "dc4a2f40de419c01b538c87f6bdfc15d574d9f7e" + "CVE-2021-42008": { + "cmt_msg": "net: 6pack: fix slab-out-of-bounds in decode_data", + "cmt_id": "d66736076bd84742c18397785476e9a84d5b54ef" + } + }, + "4.4.283": { + "CVE-2021-3753": { + "cmt_msg": "vt_kdsetmode: extend console locking", + "cmt_id": "01da584f08cbb1e04f22796cc49b10d570cd5ec1" + } + }, + "4.4.284": { + "CVE-2022-20141": { + "cmt_msg": "igmp: Add ip_mc_list lock in ip_check_mc_rcu", + "cmt_id": "b24065948ae6c48c9e20891f8cfe9850f1d748be" }, - "CVE-2014-9585": { - "cmt_msg": "x86_64, vdso: Fix the vdso address randomization algorithm", - "cmt_id": "ba4055175ea39c9f0c16da025c908d3049d2f791" + "CVE-2021-40490": { + "cmt_msg": "ext4: fix race writing to an inline_data file while its xattrs are changing", + "cmt_id": "69d82df68fbc5e368820123200d7b88f6c058350" }, - "CVE-2014-9729": { - "cmt_msg": "udf: Verify i_size when loading inode", - "cmt_id": "24282850119ea4dc29afeb3b2e670f85a9755955" + "CVE-2020-3702": { + "cmt_msg": "ath: Use safer key clearing with key cache entries", + "cmt_id": "4d6b4335838fd89419212e1e486c415ec36fb610" + } + }, + "4.4.285": { + "CVE-2021-20320": { + "cmt_msg": "s390/bpf: Fix optimizing out zero-extensions", + "cmt_id": "a738597a79e588bcf9817d4ec12740c99842db3b" }, - "CVE-2015-0239": { - "cmt_msg": "KVM: x86: SYSENTER emulation is broken", - "cmt_id": "038911f3d317d331d9637531c13710b8435fe96e" + "CVE-2021-3655": { + "cmt_msg": "sctp: validate from_addr_param return", + "cmt_id": "c299c5925ab774b64ca6aba87fb8c497f5663780" + } + }, + "4.4.288": { + "CVE-2021-4203": { + "cmt_msg": "af_unix: fix races in sk_peer_pid and sk_peer_cred accesses", + "cmt_id": "323f0968a81b082cf02ef15b447cd35e4328385e" + } + }, + "4.4.289": { + "CVE-2020-29374": { + "cmt_msg": "gup: document and work around \"COW can break either way\" issue", + "cmt_id": "58facc9c7ae307be5ecffc1697552550fedb55bd" + } + }, + "4.4.290": { + "CVE-2021-3896": { + "cmt_msg": "isdn: cpai: check ctr->cnr to avoid array index out of bound", + "cmt_id": "e8b8de17e164c9f1b7777f1c6f99d05539000036" }, - "CVE-2014-9728": { - "cmt_msg": "udf: Verify i_size when loading inode", - "cmt_id": "24282850119ea4dc29afeb3b2e670f85a9755955" + "CVE-2021-20321": { + "cmt_msg": "ovl: fix missing negative dentry check in ovl_rename()", + "cmt_id": "a4f281ffc1d128d7ea693cbc3a796e56e919fd7c" }, - "CVE-2014-9730": { - "cmt_msg": "udf: Check component length before reading it", - "cmt_id": "1e21fa3ab68b261aa6086c49567963f6f3ad87b9" + "CVE-2021-3760": { + "cmt_msg": "nfc: nci: fix the UAF of rf_conn_info object", + "cmt_id": "1d5e0107bfdbef6cc140fb5d7a1a817a40948528" }, - "CVE-2014-9731": { - "cmt_msg": "udf: Check path length when reading symlink", - "cmt_id": "fbdbac7bd9def21be7ac4e680c25d880661c10d9" + "CVE-2021-43389": { + "cmt_msg": "isdn: cpai: check ctr->cnr to avoid array index out of bound", + "cmt_id": "e8b8de17e164c9f1b7777f1c6f99d05539000036" + } + }, + "4.4.291": { + "CVE-2021-3772": { + "cmt_msg": "sctp: use init_tag from inithdr for ABORT chunk", + "cmt_id": "629d2823abf957bcbcba32154f1f6fd49bdb850c" + } + }, + "4.4.292": { + "CVE-2021-37159": { + "cmt_msg": "usb: hso: fix error handling code of hso_create_net_device", + "cmt_id": "cbefdf724282e6a948885f379dc92ab841c2fee0" + } + }, + "4.4.293": { + "CVE-2021-4202": { + "cmt_msg": "NFC: reorganize the functions in nci_request", + "cmt_id": "6dc051117ba0e1dac9324593ff2c1c520f67ad21" }, - "CVE-2014-7822": { - "cmt_msg": "->splice_write() via ->write_iter()", - "cmt_id": "894c6350eaad7e613ae267504014a456e00a3e2a" + "CVE-2021-3752": { + "cmt_msg": "Bluetooth: fix use-after-free error in lock_sock_nested()", + "cmt_id": "88aed7d67197d155260f09078835290adfa1debd" }, - "CVE-2013-7421": { - "cmt_msg": "crypto: prefix module autoloading with \"crypto-\"", - "cmt_id": "9ffea4cb2306945b5df5f28bb8686333fe666bf1" + "CVE-2021-45868": { + "cmt_msg": "quota: check block number when reading the block in quota file", + "cmt_id": "7a40f3e53f5de1d6876df8a9e8025b50616b8818" }, - "CVE-2015-1421": { - "cmt_msg": "net: sctp: fix slab corruption from use after free on INIT collisions", - "cmt_id": "8662a896ae1ff85dca6797a0e9977a4794b67847" + "CVE-2021-39686": { + "cmt_msg": "binder: use euid from cred instead of using task", + "cmt_id": "120ffcd83596fe94b6d6735d21349f118b60c936" }, - "CVE-2014-9683": { - "cmt_msg": "eCryptfs: Remove buggy and unnecessary write in file name decode routine", - "cmt_id": "f2d130454e46c3989af1b4f882b6a666d24fa2e0" + "CVE-2021-3640": { + "cmt_msg": "Bluetooth: sco: Fix lock_sock() blockage by memcpy_from_msg()", + "cmt_id": "f632f88fe209240f5cad853e33f74fda4d341004" } }, - "3.2.69": { - "CVE-2015-4167": { - "cmt_msg": "udf: Check length of extended attributes and allocation descriptors", - "cmt_id": "925cab7b6a683f791644dfde345f91e87017a023" + "4.4.294": { + "CVE-2021-4002": { + "cmt_msg": "hugetlbfs: flush TLBs correctly after huge_pmd_unshare", + "cmt_id": "8a8ae093b52ba76b650b493848d67e7b526c8751" }, - "CVE-2016-0823": { - "cmt_msg": "pagemap: do not leak physical addresses to non-privileged userspace", - "cmt_id": "1ffc3cd9a36b504c20ce98fe5eeb5463f389e1ac" + "CVE-2021-4083": { + "cmt_msg": "fget: check that the fd still exists after getting a ref to it", + "cmt_id": "8afa4ef999191477506b396fae518338b8996fec" + } + }, + "4.4.295": { + "CVE-2022-20132": { + "cmt_msg": "HID: add hid_is_usb() function to make it simpler for USB detection", + "cmt_id": "6a0bc60a84cb5186a84e7501616dacfd9e991b54" }, - "CVE-2015-2830": { - "cmt_msg": "x86/asm/entry/64: Remove a bogus 'ret_from_fork' optimization", - "cmt_id": "159891c0953a89a28f793fc52373b031262c44d2" + "CVE-2021-39698": { + "cmt_msg": "wait: add wake_up_pollfree()", + "cmt_id": "d0ceebaae0e406263b83462701b5645e075c1467" }, - "CVE-2015-2150": { - "cmt_msg": "xen-pciback: limit guest control of command register", - "cmt_id": "6dc77dfffb8317d01fc9c2d25d0288c7b31b8623" + "CVE-2021-39685": { + "cmt_msg": "USB: gadget: detect too-big endpoint 0 requests", + "cmt_id": "93cd7100fe471c5f76fb942358de4ed70dbcaf35" + } + }, + "4.4.296": { + "CVE-2021-28715": { + "cmt_msg": "xen/netback: don't queue unlimited number of packages", + "cmt_id": "0928efb09178e01d3dc8e8849aa1c807436c3c37" }, - "CVE-2015-2041": { - "cmt_msg": "net: llc: use correct size for sysctl timeout entries", - "cmt_id": "88fe14be08a475ad0eea4ca7c51f32437baf41af" + "CVE-2021-28713": { + "cmt_msg": "xen/console: harden hvc_xen against event channel storms", + "cmt_id": "c7eaa5082bccfc00dfdb500ac6cc86d6f24ca027" }, - "CVE-2015-2042": { - "cmt_msg": "net: rds: use correct size for max unacked packets and bytes", - "cmt_id": "3760b67b3e419b9ac42a45417491360a14a35357" + "CVE-2021-28712": { + "cmt_msg": "xen/netfront: harden netfront against event channel storms", + "cmt_id": "81900aa7d7a130dec4c55b68875e30fb8c9effec" }, - "CVE-2015-2922": { - "cmt_msg": "ipv6: Don't reduce hop limit for an interface", - "cmt_id": "f10f7d2a8200fe33c5030c7e32df3a2b3561f3cd" + "CVE-2021-28711": { + "cmt_msg": "xen/blkfront: harden blkfront against event channel storms", + "cmt_id": "3e04b9e6aa7d77287e70a400be83060d2b7b2cfe" + } + }, + "4.4.297": { + "CVE-2022-1195": { + "cmt_msg": "hamradio: improve the incomplete fix to avoid NPD", + "cmt_id": "371a874ea06f147d6ca30be43dad33683965eba6" }, - "CVE-2015-3331": { - "cmt_msg": "crypto: aesni - fix memory usage in GCM decryption", - "cmt_id": "217e17258ab5f5540aef2769c78ff6b3e2b08dde" + "CVE-2021-47086": { + "cmt_msg": "phonet/pep: refuse to enable an unbound pipe", + "cmt_id": "0bbdd62ce9d44f3a22059b3d20a0df977d9f6d59" + } + }, + "4.4.298": { + "CVE-2021-46936": { + "cmt_msg": "net: fix use-after-free in tw_timer_handler", + "cmt_id": "15579e1301f856ad9385d720c9267c11032a5022" }, - "CVE-2015-1593": { - "cmt_msg": "x86, mm/ASLR: Fix stack randomization on 64-bit systems", - "cmt_id": "766dde0195e427b2371fa2e00cd86a88e2c948bf" + "CVE-2021-46933": { + "cmt_msg": "usb: gadget: f_fs: Clear ffs_eventfd in ffs_data_clear.", + "cmt_id": "f976dd7011150244a7ba820f2c331e9fb253befa" }, - "CVE-2014-8159": { - "cmt_msg": "IB/uverbs: Prevent integer overflow in ib_umem_get address arithmetic", - "cmt_id": "485f16b743d98527620396639b73d7214006f3c7" + "CVE-2021-46932": { + "cmt_msg": "Input: appletouch - initialize work before device registration", + "cmt_id": "d2cb2bf39a6d17ef4bdc0e59c1a35cf5751ad8f4" + } + }, + "4.4.299": { + "CVE-2021-45095": { + "cmt_msg": "phonet: refcount leak in pep_sock_accep", + "cmt_id": "172b3f506c24a61805b3910b9acfe7159d980b9b" }, - "CVE-2015-3636": { - "cmt_msg": "ipv4: Missing sk_nulls_node_init() in ping_unhash().", - "cmt_id": "d3df672020a93355bc8f683fc19694e0316381ab" + "CVE-2021-4155": { + "cmt_msg": "xfs: map unwritten blocks in XFS_IOC_{ALLOC,FREE}SP just like fallocate", + "cmt_id": "56adcda55aa213e106224ff3d18ef4625e25f52b" } }, - "3.2.70": { - "CVE-2015-4700": { - "cmt_msg": "x86: bpf_jit: fix compilation of large bpf programs", - "cmt_id": "a8139dccd98bdece27deac8da46b4145ec7f61c1" + "4.4.300": { + "CVE-2021-43976": { + "cmt_msg": "mwifiex: Fix skb_over_panic in mwifiex_usb_recv()", + "cmt_id": "7d5e12e452771509d94db391a3b5e428325ed268" + } + }, + "4.4.301": { + "CVE-2022-0330": { + "cmt_msg": "drm/i915: Flush TLBs before releasing backing store", + "cmt_id": "db6a2082d5a2ebc5ffa41f7213a544d55f73793a" + } + }, + "4.4.302": { + "CVE-2020-36516": { + "cmt_msg": "ipv4: avoid using shared IP generator for connected sockets", + "cmt_id": "e1b3fa7b6471e1b2f4c7573711e7f8ee2e9f3dc3" }, - "CVE-2015-6526": { - "cmt_msg": "powerpc/perf: Cap 64bit userspace backtraces to PERF_MAX_STACK_DEPTH", - "cmt_id": "3c9d9d2cc60b5063cda0e92d4b6cdb92da268e7b" + "CVE-2022-0617": { + "cmt_msg": "udf: Fix NULL ptr deref when converting from inline format", + "cmt_id": "0f28e1a57baf48a583093e350ea2bd3e4c09b8ea" + } + }, + "outstanding": { + "CVE-2020-36322": { + "cmt_msg": "fuse: fix bad inode" }, - "CVE-2015-1420": { - "cmt_msg": "vfs: read file_handle only once in handle_to_path", - "cmt_id": "8dfc8b9e8432f50606820b40a7d63618d9d61a07" + "CVE-2020-35501": { + "cmt_msg": "" }, - "CVE-2017-1000253": { - "cmt_msg": "fs/binfmt_elf.c: fix bug in loading of PIE binaries", - "cmt_id": "c3727815f928a838e845b5755b4dde4efb2841c9" + "CVE-2022-0001": { + "cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE" }, - "CVE-2015-5364": { - "cmt_msg": "udp: fix behavior of wrong checksums", - "cmt_id": "556574d97b6e0c2970b7e5ab693bcf35f73195fa" + "CVE-2022-0002": { + "cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE" }, - "CVE-2015-5366": { - "cmt_msg": "udp: fix behavior of wrong checksums", - "cmt_id": "556574d97b6e0c2970b7e5ab693bcf35f73195fa" + "CVE-2023-3268": { + "cmt_msg": "relayfs: fix out-of-bounds access in relay_file_read" }, - "CVE-2015-5707": { - "cmt_msg": "sg_start_req(): make sure that there's not too many elements in iovec", - "cmt_id": "07213eed86c17c544bb10568fc04e49e03730ab7" + "CVE-2023-52615": { + "cmt_msg": "hwrng: core - Fix page fault dead lock on mmap-ed hwrng" }, - "CVE-2015-3212": { - "cmt_msg": "sctp: fix ASCONF list handling", - "cmt_id": "001b7cc921ce608997f2796ecf95fe05b7288457" - } - }, - "3.2.71": { - "CVE-2015-6252": { - "cmt_msg": "vhost: actually track log eventfd file", - "cmt_id": "403652a78799f25e3c0d07326805cc1ffcce0f87" + "CVE-2023-52614": { + "cmt_msg": "PM / devfreq: Fix buffer overflow in trans_stat_show" }, - "CVE-2015-3288": { - "cmt_msg": "mm: avoid setting up anonymous pages into file mapping", - "cmt_id": "e2506476534cff7bb3697fbe0654fdefd101bc80" + "CVE-2023-52617": { + "cmt_msg": "PCI: switchtec: Fix stdev_release() crash after surprise hot remove" }, - "CVE-2015-9289": { - "cmt_msg": "cx24116: fix a buffer overflow when checking userspace params", - "cmt_id": "729c8c5e3700410e3436573abfa5b68e8d3c89d6" - } - }, - "3.2.72": { - "CVE-2015-7613": { - "cmt_msg": "Initialize msg/shm IPC objects before doing ipc_addid()", - "cmt_id": "2ef259c0f5b2f3ca28ccb7bf126a0a2177012f89" + "CVE-2022-47520": { + "cmt_msg": "wifi: wilc1000: validate pairwise and authentication suite offsets" }, - "CVE-2015-8215": { - "cmt_msg": "ipv6: addrconf: validate new MTU before applying it", - "cmt_id": "1c825dacb615430cb384e0e3be07700013291742" + "CVE-2023-52618": { + "cmt_msg": "block/rnbd-srv: Check for unlikely string overflow" }, - "CVE-2015-5697": { - "cmt_msg": "md: use kzalloc() when bitmap is disabled", - "cmt_id": "06f0f9d843af52573c7dad0d81ee9df984e0b6be" + "CVE-2023-5717": { + "cmt_msg": "perf: Disallow mis-matched inherited group reads" }, - "CVE-2015-5156": { - "cmt_msg": "virtio-net: drop NETIF_F_FRAGLIST", - "cmt_id": "e4afe1f118e136464da2faeb18c6c9a791ce25bc" + "CVE-2022-32250": { + "cmt_msg": "netfilter: nf_tables: disallow non-stateful expression in sets earlier" }, - "CVE-2015-2925": { - "cmt_msg": "dcache: Handle escaped paths in prepend_path", - "cmt_id": "722632af3c2b4828e79f143e356489c6761035ec" + "CVE-2023-3159": { + "cmt_msg": "firewire: fix potential uaf in outbound_phy_packet_callback()" }, - "CVE-2015-5257": { - "cmt_msg": "USB: whiteheat: fix potential null-deref at probe", - "cmt_id": "cbea57119272755ccfd710fdaf4669ae05512b02" + "CVE-2022-0480": { + "cmt_msg": "memcg: enable accounting for file lock caches" }, - "CVE-2015-6937": { - "cmt_msg": "RDS: verify the underlying transport exists before creating a connection", - "cmt_id": "987ad6eef35223b149baf453171b74917c372cbc" - } - }, - "3.2.73": { - "CVE-2015-7872": { - "cmt_msg": "KEYS: Fix crash when attempt to garbage collect an uninstantiated keyring", - "cmt_id": "a6826ecbeab9c832ed742653de895ad4de61c858" + "CVE-2022-0487": { + "cmt_msg": "moxart: fix potential use-after-free on remove path" }, - "CVE-2015-5307": { - "cmt_msg": "KVM: x86: work around infinite loop in microcode when #AC is delivered", - "cmt_id": "3553e5d34d72a3aac5d967ec8b4d45a88340d679" + "CVE-2023-52429": { + "cmt_msg": "dm: limit the number of targets and parameter size area" }, - "CVE-2015-8019": { - "cmt_msg": "net: add length argument to skb_copy_and_csum_datagram_iovec", - "cmt_id": "127500d724f8c43f452610c9080444eedb5eaa6c" - } - }, - "3.2.74": { - "CVE-2015-8374": { - "cmt_msg": "Btrfs: fix truncation of compressed and inlined extents", - "cmt_id": "2a97932f99303b32c6683f136628298da7f85323" + "CVE-2021-47059": { + "cmt_msg": "crypto: sun8i-ss - fix result memory leak on error path" }, - "CVE-2016-8646": { - "cmt_msg": "crypto: algif_hash - Only export and import on sockets with data", - "cmt_id": "bd65107fc1d80498ea8d8185edb48d05a1a85255" + "CVE-2022-23825": { + "cmt_msg": "" }, - "CVE-2015-8104": { - "cmt_msg": "KVM: svm: unconditionally intercept #DB", - "cmt_id": "b42506c6c820764f26e3036dfd733e0401525c88" - } - }, - "3.2.75": { - "CVE-2015-8543": { - "cmt_msg": "net: add validation for the socket syscall protocol argument", - "cmt_id": "ef6d51d24d878be2291d7af783441356eb77649d" + "CVE-2021-47052": { + "cmt_msg": "crypto: sa2ul - Fix memory leak of rxd" }, - "CVE-2015-8785": { - "cmt_msg": "fuse: break infinite loop in fuse_fill_write_pages()", - "cmt_id": "a5b234167a1ff46f311f5835828eec2f971b9bb4" + "CVE-2021-47112": { + "cmt_msg": "x86/kvm: Teardown PV features on boot CPU as well" }, - "CVE-2015-7799": { - "cmt_msg": "isdn_ppp: Add checks for allocation failure in isdn_ppp_open()", - "cmt_id": "3ed88ba9e848aac74ae150b089ed36c25016faca" + "CVE-2021-47113": { + "cmt_msg": "btrfs: abort in rename_exchange if we fail to insert the second ref" }, - "CVE-2015-8569": { - "cmt_msg": "pptp: verify sockaddr_len in pptp_bind() and pptp_connect()", - "cmt_id": "1e44aafdd1181dd5e5b0638f9d3498b73c4d89e9" + "CVE-2021-47110": { + "cmt_msg": "x86/kvm: Disable kvmclock on all CPUs on shutdown" }, - "CVE-2016-3841": { - "cmt_msg": "ipv6: add complete rcu protection around np->opt", - "cmt_id": "5bf369b4470d3618af67b572a82d76b92ce1abd1" + "CVE-2021-47116": { + "cmt_msg": "ext4: fix memory leak in ext4_mb_init_backend on error path." }, - "CVE-2015-8575": { - "cmt_msg": "bluetooth: Validate socket address length in sco_sock_bind().", - "cmt_id": "805ce945362d9e496563c9885e7fde00cbd83635" + "CVE-2022-21125": { + "cmt_msg": "x86/speculation/mmio: Reuse SRBDS mitigation for SBDS" }, - "CVE-2013-7446": { - "cmt_msg": "unix: avoid use-after-free in ep_remove_wait_queue", - "cmt_id": "a3b0f6e8a21ef02f69a15abac440572d8cde8c2a" - } - }, - "3.2.76": { - "CVE-2015-8551": { - "cmt_msg": "xen/pciback: Return error on XEN_PCI_OP_enable_msi when device has MSI or MSI-X enabled", - "cmt_id": "9bb38c41353fa56c8d5c0a18becab89a503a514e" + "CVE-2021-47119": { + "cmt_msg": "ext4: fix memory leak in ext4_fill_super" }, - "CVE-2015-8550": { - "cmt_msg": "xen: Add RING_COPY_REQUEST()", - "cmt_id": "a489a13bfc648d5d3764d2fe064135f83ff34ee8" + "CVE-2019-19241": { + "cmt_msg": "io_uring: async workers should inherit the user creds" }, - "CVE-2015-8553": { - "cmt_msg": "xen/pciback: Don't allow MSI-X ops if PCI_COMMAND_MEMORY is not set.", - "cmt_id": "16f592aba4a0e7741823a37b0e5064f08c5f6dc1" + "CVE-2022-21123": { + "cmt_msg": "x86/speculation/mmio: Add mitigation for Processor MMIO Stale Data" }, - "CVE-2015-7513": { - "cmt_msg": "KVM: x86: Reload pit counters for all channels when restoring state", - "cmt_id": "08b8d1a6ccdefd3d517d04c472b7f42f51b3059b" + "CVE-2021-43975": { + "cmt_msg": "atlantic: Fix OOB read and write in hw_atl_utils_fw_rpc_wait" }, - "CVE-2015-7550": { - "cmt_msg": "KEYS: Fix race between read and revoke", - "cmt_id": "027466a78ea676dcb831fef6ec9092f25b8fa624" + "CVE-2023-0459": { + "cmt_msg": "uaccess: Add speculation barrier to copy_from_user()" }, - "CVE-2016-10229": { - "cmt_msg": "udp: properly support MSG_PEEK with truncated buffers", - "cmt_id": "18a6eba2eabbcb50a78210b16f7dd43d888a537b" + "CVE-2023-0458": { + "cmt_msg": "prlimit: do_prlimit needs to have a speculation check" }, - "CVE-2015-8816": { - "cmt_msg": "USB: fix invalid memory access in hub_activate()", - "cmt_id": "10037421b529bc1fc18994e94e37d745184c4ea9" + "CVE-2023-0597": { + "cmt_msg": "x86/mm: Randomize per-cpu entry area" }, - "CVE-2015-8552": { - "cmt_msg": "xen/pciback: Return error on XEN_PCI_OP_enable_msi when device has MSI or MSI-X enabled", - "cmt_id": "9bb38c41353fa56c8d5c0a18becab89a503a514e" - } - }, - "3.2.77": { - "CVE-2016-2069": { - "cmt_msg": "x86/mm: Add barriers and document switch_mm()-vs-flush synchronization", - "cmt_id": "72e67165876432b2803c02ba8a8f0168f18ab3c7" + "CVE-2019-12379": { + "cmt_msg": "consolemap: Fix a memory leaking bug in drivers/tty/vt/consolemap.c" }, - "CVE-2017-13215": { - "cmt_msg": "crypto: algif_skcipher - Load TX SG list after waiting", - "cmt_id": "9cf50c3ff1d3286a25781c8d6f81e83f7835c5c8" + "CVE-2019-12378": { + "cmt_msg": "ipv6_sockglue: Fix a missing-check bug in ip6_ra_control()" }, - "CVE-2016-2548": { - "cmt_msg": "ALSA: timer: Harden slave timer list handling", - "cmt_id": "65b6e4a0b6497a57608821c20149e83f256dc32c" + "CVE-2021-0941": { + "cmt_msg": "bpf: Remove MTU check in __bpf_skb_max_len" }, - "CVE-2016-2545": { - "cmt_msg": "ALSA: timer: Fix double unlink of active_list", - "cmt_id": "0e8f916d7dc9170ab2ef4b9a9ed19b640720029b" + "CVE-2022-3628": { + "cmt_msg": "wifi: brcmfmac: Fix potential buffer overflow in brcmf_fweh_event_worker()" }, - "CVE-2016-2544": { - "cmt_msg": "ALSA: seq: Fix race at timer setup and close", - "cmt_id": "d60262682193d5098dc1e13cd374ddfa49ee4c8d" + "CVE-2020-15802": { + "cmt_msg": "" }, - "CVE-2016-2547": { - "cmt_msg": "ALSA: timer: Harden slave timer list handling", - "cmt_id": "65b6e4a0b6497a57608821c20149e83f256dc32c" + "CVE-2024-26594": { + "cmt_msg": "ksmbd: validate mech token in session setup" }, - "CVE-2016-2546": { - "cmt_msg": "ALSA: timer: Fix race among timer ioctls", - "cmt_id": "12f88515e0e99a220afdfaeeeedf2fe206fbdc24" + "CVE-2023-4623": { + "cmt_msg": "net/sched: sch_hfsc: Ensure inner classes have fsc curve" }, - "CVE-2016-2543": { - "cmt_msg": "ALSA: seq: Fix missing NULL check at remove_events ioctl", - "cmt_id": "4cc2016fc314d14eb406dbd654120ae5a1bc2423" + "CVE-2022-3636": { + "cmt_msg": "net: ethernet: mtk_eth_soc: use after free in __mtk_ppe_check_skb()" }, - "CVE-2015-8970": { - "cmt_msg": "crypto: algif_skcipher - Require setkey before accept(2)", - "cmt_id": "e249f66acd1096c07a64cf59b6add21b0edbc7f3" + "CVE-2022-3635": { + "cmt_msg": "atm: idt77252: fix use-after-free bugs caused by tst_timer" }, - "CVE-2016-2549": { - "cmt_msg": "ALSA: hrtimer: Fix stall by hrtimer_cancel()", - "cmt_id": "f35e5e1204e0017f4011fd2896b16c6d30e2e827" + "CVE-2023-52506": { + "cmt_msg": "LoongArch: Set all reserved memblocks on Node#0 at initialization" }, - "CVE-2015-8767": { - "cmt_msg": "sctp: Prevent soft lockup when sctp_accept() is called during a timeout event", - "cmt_id": "a655ba1a8c185ef3d8ecc2709df568c1a7840b74" - } - }, - "3.2.78": { - "CVE-2016-2782": { - "cmt_msg": "USB: visor: fix null-deref at probe", - "cmt_id": "eff70986a653dbf87ede52a1293dc499b6eb829e" + "CVE-2022-34918": { + "cmt_msg": "netfilter: nf_tables: stricter validation of element data" }, - "CVE-2016-2384": { - "cmt_msg": "ALSA: usb-audio: avoid freeing umidi object twice", - "cmt_id": "78a6b3f7be7ae07c7e60f638c77c87701a703559" + "CVE-2022-3202": { + "cmt_msg": "jfs: prevent NULL deref in diFree" }, - "CVE-2016-0723": { - "cmt_msg": "tty: Fix unsafe ldisc reference via ioctl(TIOCGETD)", - "cmt_id": "710dbb61210c0546cd1bfd9ebd0ad29207202d26" + "CVE-2021-47028": { + "cmt_msg": "mt76: mt7915: fix txrate reporting" }, - "CVE-2021-20265": { - "cmt_msg": "af_unix: fix struct pid memory leak", - "cmt_id": "60bfb26f95813ca8c779fbc16ade031dc85f5394" + "CVE-2018-3646": { + "cmt_msg": "x86/microcode: Allow late microcode loading with SMT disabled" }, - "CVE-2017-13167": { - "cmt_msg": "ALSA: timer: Fix race at concurrent reads", - "cmt_id": "c65409e6175adaaf9430a8b12111afcda58c7dce" + "CVE-2024-24861": { + "cmt_msg": "media: xc4000: Fix atomicity violation in xc4000_get_frequency" }, - "CVE-2015-7566": { - "cmt_msg": "USB: serial: visor: fix crash on detecting device without write_urbs", - "cmt_id": "8bc91d462570df465937a516c721ff0f4ae0e0ed" + "CVE-2021-46908": { + "cmt_msg": "bpf: Use correct permission flag for mixed signed bounds arithmetic" }, - "CVE-2015-8812": { - "cmt_msg": "iw_cxgb3: Fix incorrectly returning error on success", - "cmt_id": "4249217f43bc2d1f0ba71895a566d28d8d097d52" + "CVE-2023-2007": { + "cmt_msg": "scsi: dpt_i2o: Remove obsolete driver" }, - "CVE-2016-2847": { - "cmt_msg": "pipe: limit the per-user amount of pages allocated in pipes", - "cmt_id": "92375b85b70395c8180991084c05e8d78e55d066" + "CVE-2022-1419": { + "cmt_msg": "drm/vgem: Close use-after-free race in vgem_gem_create" }, - "CVE-2013-4312": { - "cmt_msg": "unix: properly account for FDs passed over unix sockets", - "cmt_id": "a5a6cf8c405e826ff7ed1308dde72560c0ed4854" - } - }, - "3.2.79": { - "CVE-2016-2143": { - "cmt_msg": "s390/mm: four page table levels vs. fork", - "cmt_id": "03aeac3050c3ec92a50e1409e0b5037a97a20834" + "CVE-2023-51782": { + "cmt_msg": "net/rose: Fix Use-After-Free in rose_ioctl" }, - "CVE-2015-7515": { - "cmt_msg": "Input: aiptek - fix crash on detecting device without endpoints", - "cmt_id": "90eb3c037fe3f0f25f01713a92725a8daa2b41f3" + "CVE-2020-26141": { + "cmt_msg": "ath10k: Fix TKIP Michael MIC verification for PCIe" }, - "CVE-2016-0821": { - "cmt_msg": "include/linux/poison.h: fix LIST_POISON{1,2} offset", - "cmt_id": "d7a1adecfd8254ea61c79585a9c56dd6e3d0f5b7" - } - }, - "3.2.80": { - "CVE-2016-3137": { - "cmt_msg": "USB: cypress_m8: add endpoint sanity check", - "cmt_id": "2f974f8dc1e451dedb79eeac94f24e667c09917a" + "CVE-2020-26140": { + "cmt_msg": "" }, - "CVE-2016-3157": { - "cmt_msg": "x86/iopl/64: Properly context-switch IOPL on Xen PV", - "cmt_id": "880ee9d2f52a511bb603ef79030d6fbd30c5d878" + "CVE-2020-26143": { + "cmt_msg": "" }, - "CVE-2016-3156": { - "cmt_msg": "ipv4: Don't do expensive useless work during inetdev destroy.", - "cmt_id": "d72b450666d8d0ee1dc01911c4193bc27b71af3d" + "CVE-2020-26142": { + "cmt_msg": "" }, - "CVE-2016-3672": { - "cmt_msg": "x86/mm/32: Enable full randomization on i386 and X86_32", - "cmt_id": "84f60bacb3084374a161bcb3e847dd22ed65f0a2" + "CVE-2023-1074": { + "cmt_msg": "sctp: fail if no bound addresses can be used for a given scope" }, - "CVE-2016-3140": { - "cmt_msg": "USB: digi_acceleport: do sanity checking for the number of ports", - "cmt_id": "3867082924673a9371792e822fe3ed403eeff4d9" + "CVE-2023-1077": { + "cmt_msg": "sched/rt: pick_next_rt_entity(): check list_entry" }, - "CVE-2016-3136": { - "cmt_msg": "USB: mct_u232: add sanity checking in probe", - "cmt_id": "b323f6de337f4904272172958322b5f2bf50984d" + "CVE-2023-46838": { + "cmt_msg": "xen-netback: don't produce zero-size SKB frags" }, - "CVE-2016-3955": { - "cmt_msg": "USB: usbip: fix potential out-of-bounds write", - "cmt_id": "7ce55b83fbf2ff341aacfe825001d40e7bbccbe2" + "CVE-2023-51780": { + "cmt_msg": "atm: Fix Use-After-Free in do_vcc_ioctl" }, - "CVE-2016-7117": { - "cmt_msg": "net: Fix use after free in the recvmmsg exit path", - "cmt_id": "61934d093bc3acbd3d968b4b2f31c7c98b3edc10" + "CVE-2023-40283": { + "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb" }, - "CVE-2016-9685": { - "cmt_msg": "xfs: fix two memory leaks in xfs_attr_list.c error paths", - "cmt_id": "f9b3ef7e5d25db9c35ebb61ba70bb502174c8b5d" + "CVE-2023-1073": { + "cmt_msg": "HID: check empty report_list in hid_validate_values()" }, - "CVE-2016-3134": { - "cmt_msg": "netfilter: x_tables: fix unconditional helper", - "cmt_id": "985970fd0118576d9853d1d1a9c4309ae4d248bb" + "CVE-2024-26745": { + "cmt_msg": "powerpc/pseries/iommu: IOMMU table is not initialized for kdump over SR-IOV" }, - "CVE-2016-4805": { - "cmt_msg": "ppp: take reference on channels netns", - "cmt_id": "7fda126c5155acc3e61596ce4c5dcf3859e22444" + "CVE-2024-26744": { + "cmt_msg": "RDMA/srpt: Support specifying the srpt_service_guid parameter" }, - "CVE-2016-2185": { - "cmt_msg": "Input: ati_remote2 - fix crashes on detecting device with invalid descriptor", - "cmt_id": "ae211053c771562a27a53c2a49f20f720a7c473d" + "CVE-2024-26743": { + "cmt_msg": "RDMA/qedr: Fix qedr_create_user_qp error flow" }, - "CVE-2016-2184": { - "cmt_msg": "ALSA: usb-audio: Fix NULL dereference in create_fixed_stream_quirk()", - "cmt_id": "8e5c3482b5c7bcbd7df6b10ddb6d7bcc578f3553" + "CVE-2018-13095": { + "cmt_msg": "xfs: More robust inode extent count validation" }, - "CVE-2016-2186": { - "cmt_msg": "Input: powermate - fix oops with malicious USB descriptors", - "cmt_id": "615fd7f1ce2ced5bd401aeac55cda44295c2ae58" + "CVE-2024-22386": { + "cmt_msg": "" }, - "CVE-2016-3138": { - "cmt_msg": "USB: cdc-acm: more sanity checking", - "cmt_id": "c50eccdcbb5df7830e4a0229844a154855ac13ff" - } - }, - "3.2.81": { - "CVE-2016-3961": { - "cmt_msg": "x86/mm/xen: Suppress hugetlbfs in PV guests", - "cmt_id": "2ecc8cfb833a45c8df005209fbd6e0382cf3c0b1" + "CVE-2018-13098": { + "cmt_msg": "f2fs: fix to do sanity check with extra_attr feature" }, - "CVE-2016-4580": { - "cmt_msg": "net: fix a kernel infoleak in x25 module", - "cmt_id": "132c5255a23f505ffefe03cfc1f01ee9c82f3e09" + "CVE-2022-1734": { + "cmt_msg": "nfc: nfcmrvl: main: reorder destructive operations in nfcmrvl_nci_unregister_dev to avoid bugs" }, - "CVE-2016-4486": { - "cmt_msg": "net: fix infoleak in rtnetlink", - "cmt_id": "114253841cddf0f87b19ab8b0091abea41c58735" + "CVE-2024-26748": { + "cmt_msg": "usb: cdns3: fix memory double free when handle zero packet" }, - "CVE-2016-4485": { - "cmt_msg": "net: fix infoleak in llc", - "cmt_id": "3ec6a22dc6ded2c350e1d47513d316c55e9330c1" + "CVE-2022-2503": { + "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag" }, - "CVE-2016-4913": { - "cmt_msg": "get_rock_ridge_filename(): handle malformed NM entries", - "cmt_id": "d4203ded7550f38e69b18c37c1e0a67064fc02a8" + "CVE-2015-8952": { + "cmt_msg": "ext2: convert to mbcache2" }, - "CVE-2016-4565": { - "cmt_msg": "IB/security: Restrict use of the write() interface", - "cmt_id": "7cd419255d03561d98c94fad1a027a539c4a7484" + "CVE-2024-26699": { + "cmt_msg": "drm/amd/display: Fix array-index-out-of-bounds in dcn35_clkmgr" }, - "CVE-2016-2187": { - "cmt_msg": "Input: gtco - fix crash on detecting device without endpoints", - "cmt_id": "315085d5f39f1be90960b9ee4749c2e5df21096e" + "CVE-2022-23038": { + "cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()" }, - "CVE-2016-7916": { - "cmt_msg": "proc: prevent accessing /proc//environ until it's ready", - "cmt_id": "99cfe931aa948c3af2f288f9d603bddbbc456a90" - } - }, - "3.2.82": { - "CVE-2016-4569": { - "cmt_msg": "ALSA: timer: Fix leak in SNDRV_TIMER_IOCTL_PARAMS", - "cmt_id": "c76456ef3f9371a7647f6dea87e8cdcc38cb33db" + "CVE-2022-23039": { + "cmt_msg": "xen/gntalloc: don't use gnttab_query_foreign_access()" }, - "CVE-2016-5829": { - "cmt_msg": "HID: hiddev: validate num_values for HIDIOCGUSAGES, HIDIOCSUSAGES commands", - "cmt_id": "7cb5ee0e7e734969b39370ac739d473e0ae367bd" + "CVE-2024-26691": { + "cmt_msg": "KVM: arm64: Fix circular locking dependency" }, - "CVE-2016-4578": { - "cmt_msg": "ALSA: timer: Fix leak in events via snd_timer_user_ccallback", - "cmt_id": "506a6ad7e521baf8e554eedfd09873f490c8a304" + "CVE-2022-20158": { + "cmt_msg": "net/packet: fix slab-out-of-bounds access in packet_recvmsg()" }, - "CVE-2016-4470": { - "cmt_msg": "KEYS: potential uninitialized variable", - "cmt_id": "2145d937988c272cf59be94cc8a9669a6f0508e7" + "CVE-2022-23037": { + "cmt_msg": "xen/netfront: don't use gnttab_query_foreign_access() for mapped status" }, - "CVE-2016-5243": { - "cmt_msg": "tipc: fix an infoleak in tipc_nl_compat_link_dump", - "cmt_id": "9fa075340941fc16110bca226c50819b2453fa9b" + "CVE-2024-26697": { + "cmt_msg": "nilfs2: fix data corruption in dsync block recovery for small block sizes" }, - "CVE-2016-5244": { - "cmt_msg": "rds: fix an infoleak in rds_inc_info_copy", - "cmt_id": "948969a457e89903d180d01cbcbfee59c16f5bb5" + "CVE-2024-26696": { + "cmt_msg": "nilfs2: fix hang in nilfs_lookup_dirty_data_buffers()" }, - "CVE-2016-4482": { - "cmt_msg": "USB: usbfs: fix potential infoleak in devio", - "cmt_id": "05b352b3503450e32a6b3b4fad6358d7bf1290f5" + "CVE-2023-2176": { + "cmt_msg": "RDMA/core: Refactor rdma_bind_addr" }, - "CVE-2016-1583": { - "cmt_msg": "proc: prevent stacking filesystems on top", - "cmt_id": "cf3069a14a9cccdd89d2b482f9eee5e37ebe25a6" + "CVE-2023-52578": { + "cmt_msg": "net: bridge: use DEV_STATS_INC()" }, - "CVE-2014-9922": { - "cmt_msg": "fs: limit filesystem stacking depth", - "cmt_id": "9d6c5babc04522ff85b550f14563970279ab8f90" + "CVE-2022-39188": { + "cmt_msg": "mmu_gather: Force tlb-flush VM_PFNMAP vmas" }, - "CVE-2016-6136": { - "cmt_msg": "audit: fix a double fetch in audit_log_single_execve_arg()", - "cmt_id": "143d0f1678e19294b33de07309013c8ff4777ebe" - } - }, - "3.2.84": { - "CVE-2016-7042": { - "cmt_msg": "KEYS: Fix short sprintf buffer in /proc/keys show function", - "cmt_id": "b70315cfd846c29a85c7348c4ff948fa54252d3a" + "CVE-2005-3660": { + "cmt_msg": "" }, - "CVE-2016-6828": { - "cmt_msg": "tcp: fix use after free in tcp_xmit_retransmit_queue()", - "cmt_id": "dce1c887660cb96ee0ba5e3751aa6845589c6fec" + "CVE-2023-52619": { + "cmt_msg": "pstore/ram: Fix crash when setting number of cpus to an odd number" }, - "CVE-2016-8633": { - "cmt_msg": "firewire: net: guard against rx buffer overflows", - "cmt_id": "4538dfea79538a98e1468088b05627f82ac69789" + "CVE-2023-31085": { + "cmt_msg": "ubi: Refuse attaching if mtd's erasesize is 0" }, - "CVE-2015-1350": { - "cmt_msg": "fs: Avoid premature clearing of capabilities", - "cmt_id": "7230a82ecc91aaf0c62b048afb15f3b8e2d8059f" + "CVE-2023-31084": { + "cmt_msg": "media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*()" }, - "CVE-2016-7097": { - "cmt_msg": "posix_acl: Clear SGID bit when setting file permissions", - "cmt_id": "a06d3be52bce98746341cfb290203603fd028290" + "CVE-2015-1350": { + "cmt_msg": "fs: Avoid premature clearing of capabilities" }, - "CVE-2016-7425": { - "cmt_msg": "scsi: arcmsr: Buffer overflow in arcmsr_iop_message_xfer()", - "cmt_id": "5d14051db0eb5b81f1e5814681f3c60c232a33d8" + "CVE-2023-31082": { + "cmt_msg": "" }, - "CVE-2016-6480": { - "cmt_msg": "aacraid: Check size values after double-fetch from user", - "cmt_id": "8c7c27347bf94d568353a539dfff6578b6181b82" + "CVE-2023-31081": { + "cmt_msg": "" }, - "CVE-2016-7910": { - "cmt_msg": "block: fix use-after-free in seq file", - "cmt_id": "48e28a20b22794a94a65305299f83d183d274a39" + "CVE-2023-52574": { + "cmt_msg": "team: fix null-ptr-deref when team device type is changed" }, - "CVE-2016-3857": { - "cmt_msg": "arm: oabi compat: add missing access checks", - "cmt_id": "b1038b4e5e64547052f91767ddf369683ebf2697" - } - }, - "3.2.85": { - "CVE-2017-15102": { - "cmt_msg": "usb: misc: legousbtower: Fix NULL pointer deference", - "cmt_id": "dde8322a694ca0c466775c3463fccd74a8ce14e2" + "CVE-2019-19922": { + "cmt_msg": "sched/fair: Fix low cpu usage with high throttling by removing expiration of cpu-local slices" }, - "CVE-2016-7915": { - "cmt_msg": "HID: core: prevent out-of-bound readings", - "cmt_id": "119e11a50fc0e5218e0a0f2d7d87c0cbf1d54940" + "CVE-2019-19927": { + "cmt_msg": "drm/ttm: fix incrementing the page pointer for huge pages" }, - "CVE-2016-8632": { - "cmt_msg": "tipc: check minimum bearer MTU", - "cmt_id": "29273d459fb00a86bfb1ffed026033b152a99870" + "CVE-2024-23307": { + "cmt_msg": "md/raid5: fix atomicity violation in raid5_cache_count" }, - "CVE-2016-8655": { - "cmt_msg": "packet: fix race condition in packet_set_ring", - "cmt_id": "a9aaf8204feb497bb47aab977f04f5cea69b174e" + "CVE-2023-52598": { + "cmt_msg": "s390/ptrace: handle setting of fpc register correctly" }, - "CVE-2016-10088": { - "cmt_msg": "sg_write()/bsg_write() is not fit to be called under KERNEL_DS", - "cmt_id": "e30250c95b840896da4cb71e84bead5803ee1ff6" + "CVE-2022-32296": { + "cmt_msg": "tcp: increase source port perturb table to 2^16" }, - "CVE-2016-8405": { - "cmt_msg": "fbdev: color map copying bounds checking", - "cmt_id": "00a188b0e63feb83d7e78a91dee6f621a0dcbdda" + "CVE-2023-3567": { + "cmt_msg": "vc_screen: move load of struct vc_data pointer in vcs_read() to avoid UAF" }, - "CVE-2016-6787": { - "cmt_msg": "perf: Fix event->ctx locking", - "cmt_id": "f8ab792cab4a7c86288b8fba946a27a3e3119f46" + "CVE-2019-20806": { + "cmt_msg": "media: tw5864: Fix possible NULL pointer dereference in tw5864_handle_frame" }, - "CVE-2016-6786": { - "cmt_msg": "perf: Fix event->ctx locking", - "cmt_id": "f8ab792cab4a7c86288b8fba946a27a3e3119f46" + "CVE-2022-3028": { + "cmt_msg": "af_key: Do not call xfrm_probe_algs in parallel" }, - "CVE-2017-6001": { - "cmt_msg": "perf/core: Fix concurrent sys_perf_event_open() vs. 'move_group' race", - "cmt_id": "9eb0e01be831d0f37ea6278a92c32424141f55fb" + "CVE-2020-14304": { + "cmt_msg": "" }, - "CVE-2015-8963": { - "cmt_msg": "perf: Fix race in swevent hash", - "cmt_id": "d96703774345ffb7513b76058f4879ae14c298be" + "CVE-2020-14305": { + "cmt_msg": "netfilter: helpers: remove data_len usage for inkernel helpers" }, - "CVE-2016-9555": { - "cmt_msg": "sctp: validate chunk len before actually using it", - "cmt_id": "ba43cdd87d0aaed69ef1bb14a91c3e767a4c210f" + "CVE-2022-33981": { + "cmt_msg": "floppy: disable FDRAWCMD by default" }, - "CVE-2016-9794": { - "cmt_msg": "ALSA: pcm : Call kill_fasync() in stream lock", - "cmt_id": "5409b6c1f1b38d3fb461704d02addf55119c5230" + "CVE-2023-3611": { + "cmt_msg": "net/sched: sch_qfq: account for stab overhead in qfq_enqueue" }, - "CVE-2015-8964": { - "cmt_msg": "tty: Prevent ldisc drivers from re-using stale tty fields", - "cmt_id": "72bc3e471e03421dd6e1dd71762b3208af8e02a5" + "CVE-2019-2025": { + "cmt_msg": "binder: fix race that allows malicious free of live buffer" }, - "CVE-2012-6704": { - "cmt_msg": "net: cleanups in sock_setsockopt()", - "cmt_id": "3e21b29fc335c07161b01459a4123721da2e4642" + "CVE-2024-26625": { + "cmt_msg": "llc: call sock_orphan() at release time" }, - "CVE-2015-8962": { - "cmt_msg": "sg: Fix double-free when drives detach during SG_IO", - "cmt_id": "08f231da62d5a411ac5594409e76606e80107e02" + "CVE-2020-26560": { + "cmt_msg": "" }, - "CVE-2014-9888": { - "cmt_msg": "ARM: dma-mapping: don't allow DMA mappings to be marked executable", - "cmt_id": "d05fedab817c43171d355d3aad5a9281ff80a7ba" + "CVE-2023-4134": { + "cmt_msg": "Input: cyttsp4_core - change del_timer_sync() to timer_shutdown_sync()" }, - "CVE-2016-7911": { - "cmt_msg": "block: fix use-after-free in sys_ioprio_get()", - "cmt_id": "1691990a88bdc50085de174b24861fbca12fcc57" + "CVE-2023-39198": { + "cmt_msg": "drm/qxl: fix UAF on handle creation" }, - "CVE-2016-8645": { - "cmt_msg": "tcp: take care of truncations done by sk_filter()", - "cmt_id": "1433b66208118028d7f1a5fc235f2660badb6c05" + "CVE-2018-12127": { + "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" }, - "CVE-2014-9895": { - "cmt_msg": "media: info leak in __media_device_enum_links()", - "cmt_id": "f43c83348acdbdd8ca1af3c52f6ace629f5b386d" - } - }, - "3.2.86": { - "CVE-2016-9588": { - "cmt_msg": "kvm: nVMX: Allow L1 to intercept software exceptions (#BP and #OF)", - "cmt_id": "b54f0df42fbd30cd1c6fdf4e72fd398b713a539e" + "CVE-2018-12126": { + "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" }, - "CVE-2017-6214": { - "cmt_msg": "tcp: avoid infinite loop in tcp_splice_read()", - "cmt_id": "cd3b9e464ca54547965df76463bdfb26e6712287" + "CVE-2023-37454": { + "cmt_msg": "" }, - "CVE-2017-6074": { - "cmt_msg": "dccp: fix freeing skb too early for IPV6_RECVPKTINFO", - "cmt_id": "fd75b79ea9c7cf89d5b95f9896c6b4dcdac8c4cb" + "CVE-2022-20572": { + "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag" }, - "CVE-2017-5549": { - "cmt_msg": "USB: serial: kl5kusb105: fix line-state error handling", - "cmt_id": "70c3dd409057dfe3a5d3486a0600bba340aab664" - } - }, - "3.2.87": { - "CVE-2017-6353": { - "cmt_msg": "sctp: deny peeloff operation on asocs with threads sleeping on it", - "cmt_id": "6c24f53714319676adf7ab0d2d081e4b9de35bad" + "CVE-2023-39197": { + "cmt_msg": "netfilter: conntrack: dccp: copy entire header to stack buffer, not just basic one" }, - "CVE-2017-2636": { - "cmt_msg": "tty: n_hdlc: get rid of racy n_hdlc.tbuf", - "cmt_id": "d7ac6cf6751a0ffa00f9e46022024f79b0daa771" + "CVE-2023-52489": { + "cmt_msg": "mm/sparsemem: fix race in accessing memory_section->usage" }, - "CVE-2017-7273": { - "cmt_msg": "HID: hid-cypress: validate length of report", - "cmt_id": "4faec4a2ef5dd481682cc155cb9ea14ba2534b76" + "CVE-2022-42703": { + "cmt_msg": "mm/rmap: Fix anon_vma->degree ambiguity leading to double-reuse" }, - "CVE-2017-5669": { - "cmt_msg": "ipc/shm: Fix shmat mmap nil-page protection", - "cmt_id": "c14d51ebac238f5bb6148c6999a54b02821445c6" + "CVE-2023-33288": { + "cmt_msg": "power: supply: bq24190: Fix use after free bug in bq24190_remove due to race condition" }, - "CVE-2017-6348": { - "cmt_msg": "irda: Fix lockdep annotations in hashbin_delete().", - "cmt_id": "c512d1770f6731d7c34eb71d7463852d3ad0e452" + "CVE-2023-52484": { + "cmt_msg": "iommu/arm-smmu-v3: Fix soft lockup triggered by arm_smmu_mm_invalidate_range" }, - "CVE-2017-5986": { - "cmt_msg": "sctp: avoid BUG_ON on sctp_wait_for_sndbuf", - "cmt_id": "8b9f297cd4171ffaec7441b38cecd61f9c5b3a7f" + "CVE-2022-29900": { + "cmt_msg": "x86/kvm/vmx: Make noinstr clean" }, - "CVE-2017-6346": { - "cmt_msg": "packet: fix races in fanout_add()", - "cmt_id": "382299a020add34cc75ac501bbcb655195c123b8" - } - }, - "3.2.88": { - "CVE-2016-10200": { - "cmt_msg": "l2tp: fix racy SOCK_ZAPPED flag check in l2tp_ip{,6}_bind()", - "cmt_id": "2147a17048314f069838aace1d08b8c719448b50" + "CVE-2022-29901": { + "cmt_msg": "x86/kvm/vmx: Make noinstr clean" }, - "CVE-2017-5970": { - "cmt_msg": "ipv4: keep skb->dst around in presence of IP options", - "cmt_id": "6892986c7db05c281322f1f8870f5a46d4080e99" - } - }, - "3.2.89": { - "CVE-2017-7294": { - "cmt_msg": "drm/vmwgfx: fix integer overflow in vmw_surface_define_ioctl()", - "cmt_id": "c2e7959f2ea446a417bf2cdb79792575852d17bb" + "CVE-2023-52485": { + "cmt_msg": "drm/amd/display: Wake DMCUB before sending a command" }, - "CVE-2017-7308": { - "cmt_msg": "net/packet: fix overflow in check for priv area size", - "cmt_id": "091a6de006536c50f8a30db60d994a5b083b1c7b" + "CVE-2018-9465": { + "cmt_msg": "binder: fix proc->files use-after-free" }, - "CVE-2017-8890": { - "cmt_msg": "dccp/tcp: do not inherit mc_list from parent", - "cmt_id": "3d221359fedfc759661fb4a72804b6e798886e8f" + "CVE-2016-5728": { + "cmt_msg": "misc: mic: Fix for double fetch security bug in VOP driver" }, - "CVE-2017-7472": { - "cmt_msg": "KEYS: fix keyctl_set_reqkey_keyring() to not leak thread keyrings", - "cmt_id": "0ebd7208190d2f7b16fee3cea05665e212cebaab" + "CVE-2023-52583": { + "cmt_msg": "ceph: fix deadlock or deadcode of misusing dget()" }, - "CVE-2017-7895": { - "cmt_msg": "nfsd: stricter decoding of write-like NFSv2/v3 ops", - "cmt_id": "6b9ba0c00cb068a50a409bbdc7cfbe473f1c01a3" + "CVE-2022-1116": { + "cmt_msg": "" }, - "CVE-2017-7184": { - "cmt_msg": "xfrm_user: validate XFRM_MSG_NEWAE XFRMA_REPLAY_ESN_VAL replay_window", - "cmt_id": "04dba730e9d4798184b4769f74ef14c20f8c6f9a" + "CVE-2022-2318": { + "cmt_msg": "net: rose: fix UAF bugs caused by timer handler" }, - "CVE-2017-7487": { - "cmt_msg": "ipx: call ipxitf_put() in ioctl error path", - "cmt_id": "48dc185bcc73e1bb42d007cbaf96ad55cefaf4cb" + "CVE-2022-3564": { + "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free caused by l2cap_reassemble_sdu" }, - "CVE-2017-9242": { - "cmt_msg": "ipv6: fix out of bound writes in __ip6_append_data()", - "cmt_id": "e5238fca9694d61861096d5fb80685c9f6581555" + "CVE-2022-23816": { + "cmt_msg": "x86/kvm/vmx: Make noinstr clean" }, - "CVE-2017-0605": { - "cmt_msg": "tracing: Use strlcpy() instead of strcpy() in __trace_find_cmdline()", - "cmt_id": "e39e64193a8a611d11d4c62579a7246c1af70d1c" + "CVE-2023-35824": { + "cmt_msg": "media: dm1105: Fix use after free bug in dm1105_remove due to race condition" }, - "CVE-2017-7645": { - "cmt_msg": "nfsd: check for oversized NFSv2/v3 arguments", - "cmt_id": "1eb3e42d91d63fc757a8da38683f417bcdf953a2" + "CVE-2023-35827": { + "cmt_msg": "ravb: Fix use-after-free issue in ravb_tx_timeout_work()" }, - "CVE-2017-7261": { - "cmt_msg": "drm/vmwgfx: NULL pointer dereference in vmw_surface_define_ioctl()", - "cmt_id": "20996e6d81c907b10a5ab57c4172be97cb1a7de1" + "CVE-2023-52481": { + "cmt_msg": "arm64: errata: Add Cortex-A520 speculative unprivileged load workaround" }, - "CVE-2017-9077": { - "cmt_msg": "ipv6/dccp: do not inherit ipv6_mc_list from parent", - "cmt_id": "0767192a2c4ac9145a7e8fb00370963bc145a920" + "CVE-2023-52585": { + "cmt_msg": "drm/amdgpu: Fix possible NULL dereference in amdgpu_ras_query_error_status_helper()" }, - "CVE-2017-2671": { - "cmt_msg": "ping: implement proper locking", - "cmt_id": "352651a0a07649e4ee03e294da069b5c3e42aae4" + "CVE-2023-52584": { + "cmt_msg": "spmi: mediatek: Fix UAF on device remove" }, - "CVE-2017-9075": { - "cmt_msg": "sctp: do not inherit ipv6_{mc|ac|fl}_list from parent", - "cmt_id": "cc1fa7814bdb7ebee2ee79bbce181c0783de9ad5" + "CVE-2023-52587": { + "cmt_msg": "IB/ipoib: Fix mcast list locking" }, - "CVE-2017-9074": { - "cmt_msg": "ipv6: Prevent overrun when parsing v6 header options", - "cmt_id": "ad8a4d9d3f255a783d534a47d4b4ac611bb291d8" + "CVE-2023-52586": { + "cmt_msg": "drm/msm/dpu: Add mutex lock in control vblank irq" }, - "CVE-2017-9076": { - "cmt_msg": "ipv6/dccp: do not inherit ipv6_mc_list from parent", - "cmt_id": "0767192a2c4ac9145a7e8fb00370963bc145a920" + "CVE-2022-3567": { + "cmt_msg": "ipv6: Fix data races around sk->sk_prot." }, - "CVE-2016-2188": { - "cmt_msg": "USB: iowarrior: fix NULL-deref at probe", - "cmt_id": "6598f3d653a85dccfb4a472504ec6fd12cec8e42" + "CVE-2022-3566": { + "cmt_msg": "tcp: Fix data races around icsk->icsk_af_ops." }, - "CVE-2017-7618": { - "cmt_msg": "crypto: ahash - Fix EINPROGRESS notification callback", - "cmt_id": "82ef3e7b16e777db114a0c3699b91134417fe8c9" + "CVE-2022-3565": { + "cmt_msg": "mISDN: fix use-after-free bugs in l1oip timer handlers" }, - "CVE-2017-8924": { - "cmt_msg": "USB: serial: io_ti: fix information leak in completion handler", - "cmt_id": "6d0c587048c85ca94723fc1bd900130cbe875eb3" + "CVE-2021-47065": { + "cmt_msg": "rtw88: Fix array overrun in rtw_get_tx_power_params()" }, - "CVE-2017-8925": { - "cmt_msg": "USB: serial: omninet: fix reference leaks at open", - "cmt_id": "8b236342396140be22ab9b486c412666f161af78" + "CVE-2021-47144": { + "cmt_msg": "drm/amd/amdgpu: fix refcount leak" }, - "CVE-2016-9604": { - "cmt_msg": "KEYS: Disallow keyrings beginning with '.' to be joined as session keyrings", - "cmt_id": "7488aaea277dc17eb12bda22c91332c804c62965" + "CVE-2021-47147": { + "cmt_msg": "ptp: ocp: Fix a resource leak in an error handling path" }, - "CVE-2017-7616": { - "cmt_msg": "mm/mempolicy.c: fix error handling in set_mempolicy and mbind.", - "cmt_id": "3f3b4a9db31af279e793229177b63ea201e24629" - } - }, - "3.2.90": { - "CVE-2017-1000364": { - "cmt_msg": "mm: larger stack guard gap, between vmas", - "cmt_id": "640c7dfdc7c723143b1ce42f5569ec8565cbbde7" + "CVE-2020-36385": { + "cmt_msg": "RDMA/ucma: Rework ucma_migrate_id() to avoid races with destroy" }, - "CVE-2017-7482": { - "cmt_msg": "rxrpc: Fix several cases where a padded len isn't checked in ticket decode", - "cmt_id": "09c9faacebb3c1e279ec962cff3072995328ca29" + "CVE-2023-52589": { + "cmt_msg": "media: rkisp1: Fix IRQ disable race issue" }, - "CVE-2017-1000379": { - "cmt_msg": "mm: larger stack guard gap, between vmas", - "cmt_id": "640c7dfdc7c723143b1ce42f5569ec8565cbbde7" - } - }, - "3.2.91": { - "CVE-2017-6951": { - "cmt_msg": "KEYS: Remove key_type::match in favour of overriding default by match_preparse", - "cmt_id": "206659fcb63b2ba078a0c288e470ea12cacce316" + "CVE-2019-2054": { + "cmt_msg": "arm/ptrace: run seccomp after ptrace" }, - "CVE-2017-10911": { - "cmt_msg": "xen-blkback: don't leak stack data via response ring", - "cmt_id": "cc21fe1ff77acfab555df5577ea46fc89932f3b2" + "CVE-2021-47143": { + "cmt_msg": "net/smc: remove device from smcd_dev_list after failed device_add()" }, - "CVE-2017-1000380": { - "cmt_msg": "ALSA: timer: Fix race between read and ioctl", - "cmt_id": "7aba7242b83b6e9a56a8eb875d669cfab4eff542" + "CVE-2023-52340": { + "cmt_msg": "ipv6: remove max_size check inline with ipv4" }, - "CVE-2017-2647": { - "cmt_msg": "KEYS: Remove key_type::match in favour of overriding default by match_preparse", - "cmt_id": "206659fcb63b2ba078a0c288e470ea12cacce316" + "CVE-2021-47140": { + "cmt_msg": "iommu/amd: Clear DMA ops when switching domain" }, - "CVE-2017-7889": { - "cmt_msg": "mm: Tighten x86 /dev/mem with zeroing reads", - "cmt_id": "b8f254aa17f720053054c4ecff3920973a83b9d6" + "CVE-2024-26765": { + "cmt_msg": "LoongArch: Disable IRQ before init_fn() for nonboot CPUs" }, - "CVE-2017-1000365": { - "cmt_msg": "fs/exec.c: account for argv/envp pointers", - "cmt_id": "cea299eb189fca09c413432b807abd607385b3bc" + "CVE-2023-0030": { + "cmt_msg": "drm/nouveau/mmu: add more general vmm free/node handling functions" }, - "CVE-2017-1000363": { - "cmt_msg": "char: lp: fix possible integer overflow in lp_setup()", - "cmt_id": "550845d02afb926d50d1487f9e2b954270c83963" - } - }, - "3.2.92": { - "CVE-2017-10661": { - "cmt_msg": "timerfd: Protect the might cancel mechanism proper", - "cmt_id": "1b31fcb21779ddbe0b49f519830e203fe0586688" + "CVE-2020-16120": { + "cmt_msg": "ovl: switch to mounter creds in readdir" }, - "CVE-2017-11176": { - "cmt_msg": "mqueue: fix a use-after-free in sys_mq_notify()", - "cmt_id": "3557f62ec91e10cb2ac8e5f312bec0977d67803f" + "CVE-2022-1204": { + "cmt_msg": "ax25: Fix refcount leaks caused by ax25_cb_del()" }, - "CVE-2017-1000111": { - "cmt_msg": "packet: fix tp_reserve race in packet_set_ring", - "cmt_id": "8f716035da0ad35d5a65668eb3c10aad6c439d7b" + "CVE-2023-1611": { + "cmt_msg": "btrfs: fix race between quota disable and quota assign ioctls" }, - "CVE-2017-7542": { - "cmt_msg": "ipv6: avoid overflow of offset in ip6_find_1stfragopt", - "cmt_id": "c5a5d1b1cb8449c77d3cb1663649391635228cff" - } - }, - "3.2.93": { - "CVE-2017-11600": { - "cmt_msg": "xfrm: policy: check policy direction value", - "cmt_id": "31f11713f7bb0a4cb90466331832658c0b9c9e80" + "CVE-2016-10723": { + "cmt_msg": "mm, oom: remove sleep from under oom_lock" }, - "CVE-2017-14106": { - "cmt_msg": "tcp: initialize rcv_mss to TCP_MIN_MSS instead of 0", - "cmt_id": "16a0303d3f6b222044de5d33c01cbdf590050473" + "CVE-2019-19036": { + "cmt_msg": "btrfs: Detect unbalanced tree with empty leaf before crashing btree operations" }, - "CVE-2017-18360": { - "cmt_msg": "USB: serial: io_ti: fix div-by-zero in set_termios", - "cmt_id": "5b044cee0ef9b5f61bca80be15a019eb4ffa6a09" + "CVE-2022-26490": { + "cmt_msg": "nfc: st21nfca: Fix potential buffer overflows in EVT_TRANSACTION" }, - "CVE-2017-14140": { - "cmt_msg": "Sanitize 'move_pages()' permission checks", - "cmt_id": "a9a659c916c81b3385479ee00d4547912f08abf6" + "CVE-2017-8797": { + "cmt_msg": "nfsd: fix undefined behavior in nfsd4_layout_verify" }, - "CVE-2017-15274": { - "cmt_msg": "KEYS: fix dereferencing NULL payload with nonzero length", - "cmt_id": "134a3099ea5bb3d13126321ac48bfc48c72784ed" + "CVE-2020-8832": { + "cmt_msg": "drm/i915: Record the default hw state after reset upon load" }, - "CVE-2017-12134": { - "cmt_msg": "xen: fix bio vec merging", - "cmt_id": "33bab9221e22bab4ddc167f6c49b6ca9c35c2ccf" - } - }, - "3.2.94": { - "CVE-2017-14156": { - "cmt_msg": "video: fbdev: aty: do not leak uninitialized padding in clk to userspace", - "cmt_id": "71b8eab658c3569c1b3fe3d4df3334bb3fe85903" + "CVE-2021-47125": { + "cmt_msg": "sch_htb: fix refcount leak in htb_parent_to_leaf_offload" }, - "CVE-2017-12153": { - "cmt_msg": "nl80211: check for the required netlink attributes presence", - "cmt_id": "082d8a6a55d2b6583d9e93ac9796efdf4c412658" + "CVE-2024-26797": { + "cmt_msg": "drm/amd/display: Prevent potential buffer overflow in map_hw_resources" }, - "CVE-2017-8831": { - "cmt_msg": "saa7164: fix double fetch PCIe access condition", - "cmt_id": "10c59d27363eba9fece1965293f83d865ba532be" + "CVE-2022-1836": { + "cmt_msg": "floppy: disable FDRAWCMD by default" }, - "CVE-2017-14340": { - "cmt_msg": "xfs: XFS_IS_REALTIME_INODE() should be false if no rt device present", - "cmt_id": "90b59e69283444326907eb6c6b447366814d0960" + "CVE-2024-26793": { + "cmt_msg": "gtp: fix use-after-free and null-ptr-deref in gtp_newlink()" }, - "CVE-2017-12154": { - "cmt_msg": "kvm: nVMX: Don't allow L2 to access the hardware CR8", - "cmt_id": "7999f7fc5b2ca4c0b2a96b7fb3dfa4e30274da27" + "CVE-2021-32078": { + "cmt_msg": "ARM: footbridge: remove personal server platform" }, - "CVE-2017-1000251": { - "cmt_msg": "Bluetooth: Properly check L2CAP config option output buffer length", - "cmt_id": "26d624204b5243a0c928bad4bf62560bb63f385d" + "CVE-2023-52532": { + "cmt_msg": "net: mana: Fix TX CQE error handling" }, - "CVE-2017-14489": { - "cmt_msg": "scsi: scsi_transport_iscsi: fix the issue that iscsi_if_rx doesn't parse nlmsg properly", - "cmt_id": "7d38a8202c4a6acf91d6163f53f3253a261bbd22" + "CVE-2022-30594": { + "cmt_msg": "ptrace: Check PTRACE_O_SUSPEND_SECCOMP permission on PTRACE_SEIZE" }, - "CVE-2017-18079": { - "cmt_msg": "Input: i8042 - fix crash at boot time", - "cmt_id": "87f5229f69b4bfc48c97c631d823dea5444029c3" - } - }, - "3.2.95": { - "CVE-2017-16535": { - "cmt_msg": "USB: core: fix out-of-bounds access bug in usb_get_bos_descriptor()", - "cmt_id": "7c27b82fad16d2804c7c8405316a636f57edeabd" + "CVE-2024-26798": { + "cmt_msg": "fbcon: always restore the old font data in fbcon_do_set_font()" }, - "CVE-2017-15299": { - "cmt_msg": "KEYS: don't let add_key() update an uninstantiated key", - "cmt_id": "57f94e88bb255bf7b7d267c999aefbe4557307c1" + "CVE-2022-4662": { + "cmt_msg": "USB: core: Prevent nested device-reset calls" }, - "CVE-2017-13080": { - "cmt_msg": "mac80211: accept key reinstall without changing anything", - "cmt_id": "ef810e7c3d2a8fb3bbd23726599c487c30ea747e" + "CVE-2021-3864": { + "cmt_msg": "" }, - "CVE-2017-15649": { - "cmt_msg": "packet: in packet_do_bind, test fanout with bind_lock held", - "cmt_id": "ca3d015d39f0357889fa3ef6a88028162de17d7d" + "CVE-2023-39189": { + "cmt_msg": "netfilter: nfnetlink_osf: avoid OOB read" }, - "CVE-2017-16531": { - "cmt_msg": "USB: fix out-of-bounds in usb_set_configuration", - "cmt_id": "a0e0a5850211dd09725c819a8915c2cbe9067317" + "CVE-2023-35001": { + "cmt_msg": "netfilter: nf_tables: prevent OOB access in nft_byteorder_eval" }, - "CVE-2017-16533": { - "cmt_msg": "HID: usbhid: fix out-of-bounds bug", - "cmt_id": "99de0781e0de7c866f762b931351c2a501c3074f" + "CVE-2017-18232": { + "cmt_msg": "scsi: libsas: direct call probe and destruct" }, - "CVE-2017-16527": { - "cmt_msg": "ALSA: usb-audio: Kill stray URB at exiting", - "cmt_id": "72f4b1c7114c1b34302999d72bc5b16c8c1a1945" + "CVE-2019-2213": { + "cmt_msg": "binder: fix possible UAF when freeing buffer" }, - "CVE-2017-11473": { - "cmt_msg": "x86/acpi: Prevent out of bound access caused by broken ACPI tables", - "cmt_id": "96301209473afd3f2f274b91cb7082d161b9be65" + "CVE-2024-26677": { + "cmt_msg": "rxrpc: Fix delayed ACKs to not set the reference serial number" }, - "CVE-2017-16532": { - "cmt_msg": "usb: usbtest: fix NULL pointer dereference", - "cmt_id": "f2a780301ae85dbe704499675832487130b8e267" + "CVE-2024-26676": { + "cmt_msg": "af_unix: Call kfree_skb() for dead unix_(sk)->oob_skb in GC." }, - "CVE-2017-16529": { - "cmt_msg": "ALSA: usb-audio: Check out-of-bounds access by corrupted buffer descriptor", - "cmt_id": "8a930044f0b100d6b28a94525e9cf62787b3ec3a" + "CVE-2022-0168": { + "cmt_msg": "cifs: fix NULL ptr dereference in smb2_ioctl_query_info()" }, - "CVE-2015-9004": { - "cmt_msg": "perf: Tighten (and fix) the grouping condition", - "cmt_id": "5f542f7740bc8db862b8078e6a621ee7a13427b8" + "CVE-2020-26556": { + "cmt_msg": "" }, - "CVE-2018-10675": { - "cmt_msg": "mm/mempolicy: fix use after free when calling get_mempolicy", - "cmt_id": "cb46e434ba111d1fd83dcb8bcc44c404e9d12a16" + "CVE-2020-26557": { + "cmt_msg": "" }, - "CVE-2017-15265": { - "cmt_msg": "ALSA: seq: Fix use-after-free at creating a port", - "cmt_id": "c3895a053b2505f9e409e6d6c57dcece714ab486" + "CVE-2024-26671": { + "cmt_msg": "blk-mq: fix IO hang from sbitmap wakeup race" }, - "CVE-2017-12190": { - "cmt_msg": "fix unbalanced page refcounting in bio_map_user_iov", - "cmt_id": "9ff5d8fe36745867da8a028b3ea58629f7546155" - } - }, - "3.2.96": { - "CVE-2017-16537": { - "cmt_msg": "media: imon: Fix null-ptr-deref in imon_probe", - "cmt_id": "0df873c63e8e99a8fb6e068d182b860e6e6e07a9" + "CVE-2024-26733": { + "cmt_msg": "arp: Prevent overflow in arp_req_get()." }, - "CVE-2017-16536": { - "cmt_msg": "cx231xx-cards: fix NULL-deref on missing association descriptor", - "cmt_id": "59a7195cd497d430d9f76bc9f71cf53ed4102743" + "CVE-2024-26776": { + "cmt_msg": "spi: hisi-sfc-v3xx: Return IRQ_NONE if no interrupts were detected" }, - "CVE-2018-9517": { - "cmt_msg": "l2tp: pass tunnel pointer to ->session_create()", - "cmt_id": "ca8172873304dbc6c6047b698452d9c89d86f037" + "CVE-2024-26777": { + "cmt_msg": "fbdev: sis: Error out if pixclock equals zero" }, - "CVE-2017-0627": { - "cmt_msg": "media: uvcvideo: Prevent heap overflow when accessing mapped controls", - "cmt_id": "c889e4cbe9b3975b3f8d109c397b0b8ef2d7bd2f" + "CVE-2019-20794": { + "cmt_msg": "" }, - "CVE-2017-16525": { - "cmt_msg": "USB: serial: console: fix use-after-free after failed setup", - "cmt_id": "b92072aadd839c9379190979edac63285ae2b790" + "CVE-2020-26559": { + "cmt_msg": "" }, - "CVE-2017-16643": { - "cmt_msg": "Input: gtco - fix potential out-of-bound access", - "cmt_id": "2de544fd1b16f76f8dd1213d585ce611155ccd34" + "CVE-2023-3397": { + "cmt_msg": "" }, - "CVE-2017-14051": { - "cmt_msg": "scsi: qla2xxx: Fix an integer overflow in sysfs code", - "cmt_id": "1714a066d71dc00bc336aa1565ec86551e388704" + "CVE-2018-12130": { + "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" }, - "CVE-2017-16649": { - "cmt_msg": "net: cdc_ether: fix divide by 0 on bad descriptors", - "cmt_id": "d7d24810ac55e2f3fb213d6acf80016a0d337c50" + "CVE-2024-26679": { + "cmt_msg": "inet: read sk->sk_family once in inet_recv_error()" }, - "CVE-2017-15115": { - "cmt_msg": "sctp: do not peel off an assoc from one netns to another one", - "cmt_id": "16585babafe54375f23f73a8fc323bd51e7955d7" - } - }, - "3.2.97": { - "CVE-2017-16526": { - "cmt_msg": "uwb: properly check kthread_run return value", - "cmt_id": "c95d921ebf9e02853bd090f3b3845085082185f8" + "CVE-2024-26771": { + "cmt_msg": "dmaengine: ti: edma: Add some null pointer checks to the edma_probe" }, - "CVE-2020-14353": { - "cmt_msg": "KEYS: prevent creating a different user's keyrings", - "cmt_id": "a0ff43031db9d248f659a5db3a819f5498203775" + "CVE-2018-1128": { + "cmt_msg": "libceph: add authorizer challenge" }, - "CVE-2017-17741": { - "cmt_msg": "KVM: Fix stack-out-of-bounds read in write_mmio", - "cmt_id": "26a8a3c531ae847048ee9126f07cb07424bd4724" + "CVE-2018-1129": { + "cmt_msg": "libceph: implement CEPHX_V2 calculation mode" }, - "CVE-2017-18270": { - "cmt_msg": "KEYS: prevent creating a different user's keyrings", - "cmt_id": "a0ff43031db9d248f659a5db3a819f5498203775" + "CVE-2021-47083": { + "cmt_msg": "pinctrl: mediatek: fix global-out-of-bounds issue" }, - "CVE-2017-15868": { - "cmt_msg": "Bluetooth: bnep: bnep_add_connection() should verify that it's dealing with l2cap socket", - "cmt_id": "d5623517462d7bdf03cae13e8b713389b0cdd381" + "CVE-2021-3542": { + "cmt_msg": "" }, - "CVE-2017-8824": { - "cmt_msg": "dccp: CVE-2017-8824: use-after-free in DCCP code", - "cmt_id": "e23d13a89d8ca5fe717d75248672e1b8bc4a3be8" + "CVE-2023-52458": { + "cmt_msg": "block: add check that partition length needs to be aligned with block size" }, - "CVE-2017-1000407": { - "cmt_msg": "KVM: VMX: remove I/O port 0x80 bypass on Intel hosts", - "cmt_id": "13b86808f7fabea496c02131f49fec46a84fb3c9" + "CVE-2018-20854": { + "cmt_msg": "phy: ocelot-serdes: fix out-of-bounds read" }, - "CVE-2017-17558": { - "cmt_msg": "USB: core: prevent malicious bNumInterfaces overflow", - "cmt_id": "11a1db99b93dbb5f7b78cffe9b85e616ab749776" + "CVE-2018-20855": { + "cmt_msg": "IB/mlx5: Fix leaking stack memory to userspace" }, - "CVE-2017-17806": { - "cmt_msg": "crypto: hmac - require that the underlying hash algorithm is unkeyed", - "cmt_id": "a63785d3294e9d7704db04500400fd8bb4b59a69" + "CVE-2023-28746": { + "cmt_msg": "x86/mmio: Disable KVM mitigation when X86_FEATURE_CLEAR_CPU_BUF is set" }, - "CVE-2020-27067": { - "cmt_msg": "l2tp: fix l2tp_eth module loading", - "cmt_id": "1e44d4e0c0ef21599f86e0b7adb2dc6bcd0c35dd" + "CVE-2023-52451": { + "cmt_msg": "powerpc/pseries/memhp: Fix access beyond end of drmem array" }, - "CVE-2017-16939": { - "cmt_msg": "ipsec: Fix aborted xfrm policy dump crash", - "cmt_id": "43ce9bf0770f22048156e7b36fe812a3352da842" + "CVE-2021-46970": { + "cmt_msg": "bus: mhi: pci_generic: Remove WQ_MEM_RECLAIM flag from state workqueue" }, - "CVE-2017-17807": { - "cmt_msg": "KEYS: add missing permission check for request_key() destination", - "cmt_id": "5d8207e99e9baadab32d815772da60bff3a07eb5" + "CVE-2024-1086": { + "cmt_msg": "netfilter: nf_tables: reject QUEUE/DROP verdict parameters" }, - "CVE-2017-17805": { - "cmt_msg": "crypto: salsa20 - fix blkcipher_walk API usage", - "cmt_id": "a1eb10d948c39388c5dea527aa4e76ac90a6a7e1" - } - }, - "3.2.99": { - "CVE-2017-18203": { - "cmt_msg": "dm: fix race between dm_get_from_kobject() and __dm_destroy()", - "cmt_id": "90c6762af0480451a1c32cf33dcf075795f5d3ed" + "CVE-2022-3344": { + "cmt_msg": "KVM: x86: nSVM: harden svm_free_nested against freeing vmcb02 while still in use" }, - "CVE-2021-0447": { - "cmt_msg": "l2tp: protect sock pointer of struct pppol2tp_session with RCU", - "cmt_id": "d36e5ba7bbed5d7bd26e8609ffed503c2def401b" + "CVE-2023-6240": { + "cmt_msg": "" }, - "CVE-2018-1000004": { - "cmt_msg": "ALSA: seq: Make ioctls race-free", - "cmt_id": "d6693160906d55ba376bf0b88b7c129762170162" + "CVE-2024-26700": { + "cmt_msg": "drm/amd/display: Fix MST Null Ptr for RV" }, - "CVE-2017-16913": { - "cmt_msg": "usbip: fix stub_rx: harden CMD_SUBMIT path to handle malicious input", - "cmt_id": "629f509078f02bf65da3ecca8363104b08a3fdd7" + "CVE-2024-26706": { + "cmt_msg": "parisc: Fix random data corruption from exception handler" }, - "CVE-2017-16912": { - "cmt_msg": "usbip: fix stub_rx: get_pipe() to validate endpoint number", - "cmt_id": "95ac81780575f669db047b30511d56400c67099e" + "CVE-2023-23559": { + "cmt_msg": "wifi: rndis_wlan: Prevent buffer overflow in rndis_query_oid" }, - "CVE-2017-16911": { - "cmt_msg": "usbip: prevent vhci_hcd driver from leaking a socket pointer address", - "cmt_id": "11406025161a8745167414687bca1f8c04b5eb6c" + "CVE-2022-39842": { + "cmt_msg": "video: fbdev: pxa3xx-gcu: Fix integer overflow in pxa3xx_gcu_write" }, - "CVE-2018-5333": { - "cmt_msg": "RDS: null pointer dereference in rds_atomic_free_op", - "cmt_id": "57e49cc5d8048f4274b3b2c8ec075f656f8a3ed1" + "CVE-2022-0382": { + "cmt_msg": "net ticp:fix a kernel-infoleak in __tipc_sendmsg()" }, - "CVE-2017-16914": { - "cmt_msg": "usbip: fix stub_send_ret_submit() vulnerability to null transfer_buffer", - "cmt_id": "41ffa4f1c1480fe4392c6e1c48346a49d048ff4a" + "CVE-2023-32233": { + "cmt_msg": "netfilter: nf_tables: deactivate anonymous set from preparation phase" }, - "CVE-2017-18017": { - "cmt_msg": "netfilter: xt_TCPMSS: add more sanity tests on tcph->doff", - "cmt_id": "d84eeff84e9869d29f442ff652ce1352cfa63e84" + "CVE-2019-15222": { + "cmt_msg": "ALSA: usb-audio: Fix gpf in snd_usb_pipe_sanity_check" }, - "CVE-2018-5332": { - "cmt_msg": "RDS: Heap OOB write in rds_message_alloc_sgs()", - "cmt_id": "60daca9efbb3e4109ebc1f7069543e5573fc124e" - } - }, - "3.2.100": { - "CVE-2017-0861": { - "cmt_msg": "ALSA: pcm: prevent UAF in snd_pcm_info", - "cmt_id": "c51f80d4d3a47dbc97b9b1b67d81e763afe9c398" + "CVE-2019-15223": { + "cmt_msg": "ALSA: line6: Assure canceling delayed work at disconnection" }, - "CVE-2019-9454": { - "cmt_msg": "i2c: core-smbus: prevent stack corruption on read I2C_BLOCK_DATA", - "cmt_id": "fa05746dcb3132105d634eb72ec0d455af3be3cf" + "CVE-2024-23196": { + "cmt_msg": "ALSA: hda: fix a possible null-pointer dereference due to data race in snd_hdac_regmap_sync()" }, - "CVE-2018-6927": { - "cmt_msg": "futex: Prevent overflow by strengthen input validation", - "cmt_id": "9d4265fc8f485089645dca8c688eedd890a165af" + "CVE-2019-19815": { + "cmt_msg": "f2fs: support swap file w/ DIO" }, - "CVE-2018-7492": { - "cmt_msg": "rds: Fix NULL pointer dereference in __rds_rdma_map", - "cmt_id": "cbe131eb2d7bab9b3332094ae279fed7cb170a85" + "CVE-2019-19814": { + "cmt_msg": "" }, - "CVE-2017-18551": { - "cmt_msg": "i2c: core-smbus: prevent stack corruption on read I2C_BLOCK_DATA", - "cmt_id": "fa05746dcb3132105d634eb72ec0d455af3be3cf" + "CVE-2020-11669": { + "cmt_msg": "powerpc/powernv/idle: Restore AMR/UAMOR/AMOR after idle" }, - "CVE-2018-18386": { - "cmt_msg": "n_tty: fix EXTPROC vs ICANON interaction with TIOCINQ (aka FIONREAD)", - "cmt_id": "8711719778f9e003be82bba0362e87b97b46c891" + "CVE-2022-1011": { + "cmt_msg": "fuse: fix pipe buffer lifetime for direct_io" }, - "CVE-2018-5750": { - "cmt_msg": "ACPI: sbshc: remove raw pointer from printk() message", - "cmt_id": "d019cd4409c70839ea5c8568ea861dcddf2d831c" + "CVE-2022-1012": { + "cmt_msg": "secure_seq: use the 64 bits of the siphash for port offset calculation" }, - "CVE-2018-1000028": { - "cmt_msg": "nfsd: auth: Fix gid sorting when rootsquash enabled", - "cmt_id": "b520f2dc407ffcb097efd2282b42c26bed8492b7" - } - }, - "3.2.101": { - "CVE-2017-5715": { - "cmt_msg": "x86/cpufeatures: Add X86_BUG_SPECTRE_V[12]", - "cmt_id": "0605c9a548fb39e5b0ee4765ffe828742ecf02ae" - } - }, - "3.2.102": { - "CVE-2019-9456": { - "cmt_msg": "usb: usbmon: Read text within supplied buffer size", - "cmt_id": "b8021dfb921a69ec50ccb866178367f95c7b7878" + "CVE-2023-52620": { + "cmt_msg": "netfilter: nf_tables: disallow timeout for anonymous sets" }, - "CVE-2017-18216": { - "cmt_msg": "ocfs2: subsystem.su_mutex is required while accessing the item->ci_parent", - "cmt_id": "dfd9f20a2db71ca01033040ecf69d5c0e67db629" + "CVE-2023-52621": { + "cmt_msg": "bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers" }, - "CVE-2018-8822": { - "cmt_msg": "staging: ncpfs: memory corruption in ncp_read_kernel()", - "cmt_id": "38643d20b4d4ac378046e51b15556f0f7dc489ea" + "CVE-2023-52622": { + "cmt_msg": "ext4: avoid online resizing failures due to oversized flex bg" }, - "CVE-2017-18208": { - "cmt_msg": "mm/madvise.c: fix madvise() infinite loop under special circumstances", - "cmt_id": "3d886ff142e713000aec6bf6f82944eb03dab28c" + "CVE-2023-52623": { + "cmt_msg": "SUNRPC: Fix a suspicious RCU usage warning" }, - "CVE-2018-7995": { - "cmt_msg": "x86/MCE: Serialize sysfs changes", - "cmt_id": "65e38566ae2600cebb885af0b58dc8732e25ee52" + "CVE-2023-52624": { + "cmt_msg": "drm/amd/display: Wake DMCUB before executing GPINT commands" }, - "CVE-2018-7566": { - "cmt_msg": "ALSA: seq: Fix racy pool initializations", - "cmt_id": "b5c3d49b3d5889f334d519d7a4535a3bd8632d47" + "CVE-2023-52625": { + "cmt_msg": "drm/amd/display: Refactor DMCUB enter/exit idle interface" }, - "CVE-2018-1092": { - "cmt_msg": "ext4: fail ext4_iget for root directory if unallocated", - "cmt_id": "bf7fc655f12864b4c12d902cf60ae37a708cc344" + "CVE-2023-52628": { + "cmt_msg": "netfilter: nftables: exthdr: fix 4-byte stack OOB write" }, - "CVE-2018-1093": { - "cmt_msg": "ext4: add validity checks for bitmap block numbers", - "cmt_id": "f278235ce148485cdb9dc990673943addafbd577" + "CVE-2023-34255": { + "cmt_msg": "xfs: verify buffer contents when we skip log replay" }, - "CVE-2018-10940": { - "cmt_msg": "cdrom: information leak in cdrom_ioctl_media_changed()", - "cmt_id": "15bad6c8291a04692b928e9037844fde6f32a798" + "CVE-2017-1000405": { + "cmt_msg": "mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d()" }, - "CVE-2018-5803": { - "cmt_msg": "sctp: verify size of a new chunk in _sctp_make_chunk()", - "cmt_id": "61079d7091f4a673a337b5d63e7e7e38ac405d37" + "CVE-2022-3111": { + "cmt_msg": "power: supply: wm8350-power: Add missing free in free_charger_irq" }, - "CVE-2018-8897": { - "cmt_msg": "x86/entry/64: Don't use IST entry for #BP stack", - "cmt_id": "5a1f747c7f58e9820ebfb6b4811934a1f48bc4fe" + "CVE-2023-3141": { + "cmt_msg": "memstick: r592: Fix UAF bug in r592_remove due to race condition" }, - "CVE-2018-7757": { - "cmt_msg": "scsi: libsas: fix memory leak in sas_smp_get_phy_events()", - "cmt_id": "2a690a408dee7a9d51b17dfe93b116bd7ab6177a" + "CVE-2022-0492": { + "cmt_msg": "cgroup-v1: Require capabilities to set release_agent" }, - "CVE-2018-1068": { - "cmt_msg": "netfilter: ebtables: CONFIG_COMPAT: don't trust userland offsets", - "cmt_id": "dccc6e2c9b486b99b6ec356e14f7de58832b3833" + "CVE-2020-12655": { + "cmt_msg": "xfs: add agf freeblocks verify in xfs_agf_verify" }, - "CVE-2018-1000199": { - "cmt_msg": "perf/hwbp: Simplify the perf-hwbp code, fix documentation", - "cmt_id": "03e58a520044e3ea80a3ea43586f956e2e86c74d" + "CVE-2022-0494": { + "cmt_msg": "block-map: add __GFP_ZERO flag for alloc_page in function bio_copy_kern" }, - "CVE-2018-6412": { - "cmt_msg": "fbdev: Fixing arbitrary kernel leak in case FBIOGETCMAP_SPARC in sbusfb_ioctl_helper().", - "cmt_id": "e553bcf09a6390e7f52e47132b27b4574d0ad71a" + "CVE-2022-3524": { + "cmt_msg": "tcp/udp: Fix memory leak in ipv6_renew_options()." }, - "CVE-2018-1130": { - "cmt_msg": "dccp: check sk for closed state in dccp_sendmsg()", - "cmt_id": "109503b8cccb3b803d875b88d21d49eab921969e" - } - }, - "outstanding": { - "CVE-2020-36322": { - "cmt_msg": "fuse: fix bad inode" + "CVE-2022-3523": { + "cmt_msg": "mm/memory.c: fix race when faulting a device private page" }, - "CVE-2022-3649": { - "cmt_msg": "nilfs2: fix use-after-free bug of struct nilfs_root" + "CVE-2022-3522": { + "cmt_msg": "mm/hugetlb: use hugetlb_pte_stable in migration race check" }, - "CVE-2020-35501": { + "CVE-2008-2544": { "cmt_msg": "" }, - "CVE-2021-45095": { - "cmt_msg": "phonet: refcount leak in pep_sock_accep" + "CVE-2018-12928": { + "cmt_msg": "" }, - "CVE-2022-3646": { - "cmt_msg": "nilfs2: fix leak of nilfs_root in case of writer thread creation failure" + "CVE-2021-47101": { + "cmt_msg": "asix: fix uninit-value in asix_mdio_read()" }, - "CVE-2022-0001": { - "cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE" + "CVE-2021-47103": { + "cmt_msg": "inet: fully convert sk->sk_rx_dst to RCU rules" }, - "CVE-2020-12464": { - "cmt_msg": "USB: core: Fix free-while-in-use bug in the USB S-Glibrary" + "CVE-2021-46982": { + "cmt_msg": "f2fs: compress: fix race condition of overwrite vs truncate" }, - "CVE-2022-0002": { - "cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE" + "CVE-2018-7754": { + "cmt_msg": "printk: hash addresses printed with %p" }, - "CVE-2019-19965": { - "cmt_msg": "scsi: libsas: stop discovering if oob mode is disconnected" + "CVE-2007-3719": { + "cmt_msg": "" }, - "CVE-2021-3752": { - "cmt_msg": "Bluetooth: fix use-after-free error in lock_sock_nested()" + "CVE-2023-3863": { + "cmt_msg": "net: nfc: Fix use-after-free caused by nfc_llcp_find_local" }, - "CVE-2019-19966": { - "cmt_msg": "media: cpia2: Fix use-after-free in cpia2_exit" + "CVE-2024-26606": { + "cmt_msg": "binder: signal epoll threads of self-work" }, - "CVE-2020-24587": { - "cmt_msg": "mac80211: prevent mixed key and fragment cache attacks" + "CVE-2023-0590": { + "cmt_msg": "net: sched: fix race condition in qdisc_graft()" }, - "CVE-2020-24586": { - "cmt_msg": "mac80211: prevent mixed key and fragment cache attacks" + "CVE-2022-4095": { + "cmt_msg": "staging: rtl8712: fix use after free bugs" }, - "CVE-2021-0129": { - "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical" + "CVE-2022-45919": { + "cmt_msg": "media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221" }, - "CVE-2019-20096": { - "cmt_msg": "dccp: Fix memleak in __feat_register_sp" + "CVE-2023-2248": { + "cmt_msg": "net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg" }, - "CVE-2016-10044": { - "cmt_msg": "aio: mark AIO pseudo-fs noexec" + "CVE-2023-30772": { + "cmt_msg": "power: supply: da9150: Fix use after free bug in da9150_charger_remove due to race condition" }, - "CVE-2018-10087": { - "cmt_msg": "kernel/exit.c: avoid undefined behaviour when calling wait4()" + "CVE-2023-32269": { + "cmt_msg": "netrom: Fix use-after-free caused by accept on already connected socket" }, - "CVE-2019-9503": { - "cmt_msg": "brcmfmac: add subtype check for event handling in data path" + "CVE-2023-52517": { + "cmt_msg": "spi: sun6i: fix race between DMA RX transfer completion and RX FIFO drain" }, - "CVE-2020-36158": { - "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_cmd_802_11_ad_hoc_start" + "CVE-2022-2586": { + "cmt_msg": "netfilter: nf_tables: do not allow SET_ID to refer to another table" }, - "CVE-2023-3159": { - "cmt_msg": "firewire: fix potential uaf in outbound_phy_packet_callback()" + "CVE-2022-3629": { + "cmt_msg": "vsock: Fix memory leak in vsock_connect()" }, - "CVE-2022-0480": { - "cmt_msg": "memcg: enable accounting for file lock caches" + "CVE-2021-34556": { + "cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4" }, - "CVE-2018-10124": { - "cmt_msg": "kernel/signal.c: avoid undefined behaviour in kill_something_info" + "CVE-2021-28714": { + "cmt_msg": "xen/netback: fix rx queue stall detection" }, - "CVE-2023-52429": { - "cmt_msg": "dm: limit the number of targets and parameter size area" + "CVE-2021-39714": { + "cmt_msg": "staging: android: ion: Drop ion_map_kernel interface" }, - "CVE-2021-0920": { - "cmt_msg": "af_unix: fix garbage collect vs MSG_PEEK" + "CVE-2017-18261": { + "cmt_msg": "clocksource/drivers/arm_arch_timer: Avoid infinite recursion when ftrace is enabled" }, - "CVE-2022-23825": { + "CVE-2022-1247": { "cmt_msg": "" }, - "CVE-2015-5157": { - "cmt_msg": "x86/nmi/64: Switch stacks on userspace NMI entry" - }, - "CVE-2013-4254": { - "cmt_msg": "ARM: 7810/1: perf: Fix array out of bounds access in armpmu_map_hw_event()" + "CVE-2022-2991": { + "cmt_msg": "remove the lightnvm subsystem" }, - "CVE-2024-26588": { - "cmt_msg": "LoongArch: BPF: Prevent out-of-bounds memory access" + "CVE-2022-3621": { + "cmt_msg": "nilfs2: fix NULL pointer dereference at nilfs_bmap_lookup_at_level()" }, - "CVE-2017-5551": { - "cmt_msg": "tmpfs: clear S_ISGID when setting posix ACLs" + "CVE-2022-23960": { + "cmt_msg": "ARM: report Spectre v2 status through sysfs" }, - "CVE-2019-19241": { - "cmt_msg": "io_uring: async workers should inherit the user creds" + "CVE-2023-51781": { + "cmt_msg": "appletalk: Fix Use-After-Free in atalk_ioctl" }, - "CVE-2022-21123": { - "cmt_msg": "x86/speculation/mmio: Add mitigation for Processor MMIO Stale Data" + "CVE-2022-3624": { + "cmt_msg": "bonding: fix reference count leak in balance-alb mode" }, - "CVE-2021-28688": { - "cmt_msg": "xen-blkback: don't leak persistent grants from xen_blkbk_map()" + "CVE-2022-2588": { + "cmt_msg": "net_sched: cls_route: remove from list when handle is 0" }, - "CVE-2021-39686": { - "cmt_msg": "binder: use euid from cred instead of using task" + "CVE-2021-3669": { + "cmt_msg": "ipc: replace costly bailout check in sysvipc_find_ipc()" }, - "CVE-2021-39685": { - "cmt_msg": "USB: gadget: detect too-big endpoint 0 requests" + "CVE-2019-18885": { + "cmt_msg": "btrfs: merge btrfs_find_device and find_device" }, - "CVE-2023-6535": { - "cmt_msg": "" + "CVE-2022-4744": { + "cmt_msg": "tun: avoid double free in tun_free_netdev" }, - "CVE-2021-43975": { - "cmt_msg": "atlantic: Fix OOB read and write in hw_atl_utils_fw_rpc_wait" + "CVE-2023-1095": { + "cmt_msg": "netfilter: nf_tables: fix null deref due to zeroed list head" }, - "CVE-2021-43976": { - "cmt_msg": "mwifiex: Fix skb_over_panic in mwifiex_usb_recv()" + "CVE-2019-11091": { + "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" }, - "CVE-2020-0466": { - "cmt_msg": "do_epoll_ctl(): clean the failure exits up a bit" + "CVE-2022-3239": { + "cmt_msg": "media: em28xx: initialize refcount before kref_get" }, - "CVE-2019-10207": { - "cmt_msg": "Bluetooth: hci_uart: check for missing tty operations" + "CVE-2022-4543": { + "cmt_msg": "" }, - "CVE-2019-14835": { - "cmt_msg": "vhost: make sure log_num < in_num" + "CVE-2023-52571": { + "cmt_msg": "power: supply: rk817: Fix node refcount leak" }, - "CVE-2023-0459": { - "cmt_msg": "uaccess: Add speculation barrier to copy_from_user()" + "CVE-2023-52572": { + "cmt_msg": "cifs: Fix UAF in cifs_demultiplex_thread()" }, - "CVE-2023-0458": { - "cmt_msg": "prlimit: do_prlimit needs to have a speculation check" + "CVE-2023-4921": { + "cmt_msg": "net: sched: sch_qfq: Fix UAF in qfq_dequeue()" }, - "CVE-2018-1000204": { - "cmt_msg": "scsi: sg: allocate with __GFP_ZERO in sg_build_indirect()" + "CVE-2023-1829": { + "cmt_msg": "net/sched: Retire tcindex classifier" }, - "CVE-2023-0597": { - "cmt_msg": "x86/mm: Randomize per-cpu entry area" + "CVE-2023-1390": { + "cmt_msg": "tipc: fix NULL deref in tipc_link_xmit()" }, - "CVE-2019-12379": { - "cmt_msg": "consolemap: Fix a memory leaking bug in drivers/tty/vt/consolemap.c" + "CVE-2024-0775": { + "cmt_msg": "ext4: improve error recovery code paths in __ext4_remount()" }, - "CVE-2019-12378": { - "cmt_msg": "ipv6_sockglue: Fix a missing-check bug in ip6_ra_control()" + "CVE-2023-4881": { + "cmt_msg": "netfilter: nftables: exthdr: fix 4-byte stack OOB write" }, - "CVE-2021-30002": { - "cmt_msg": "media: v4l: ioctl: Fix memory leak in video_usercopy" + "CVE-2013-7445": { + "cmt_msg": "" }, - "CVE-2017-17450": { - "cmt_msg": "netfilter: xt_osf: Add missing permission checks" + "CVE-2022-28390": { + "cmt_msg": "can: ems_usb: ems_usb_start_xmit(): fix double dev_kfree_skb() in error path" }, - "CVE-2015-4177": { - "cmt_msg": "mnt: Fail collect_mounts when applied to unmounted mounts" + "CVE-2024-26738": { + "cmt_msg": "powerpc/pseries/iommu: DLPAR add doesn't completely initialize pci_controller" }, - "CVE-2015-4176": { - "cmt_msg": "mnt: Update detach_mounts to leave mounts connected" + "CVE-2024-26739": { + "cmt_msg": "net/sched: act_mirred: don't override retval if we already lost the skb" }, - "CVE-2024-26591": { - "cmt_msg": "bpf: Fix re-attachment branch in bpf_tracing_prog_attach" + "CVE-2023-6931": { + "cmt_msg": "perf: Fix perf_event_validate_size()" }, - "CVE-2020-15802": { + "CVE-2022-38096": { "cmt_msg": "" }, - "CVE-2024-26594": { - "cmt_msg": "ksmbd: validate mech token in session setup" + "CVE-2024-26804": { + "cmt_msg": "net: ip_tunnel: prevent perpetual headroom growth" }, - "CVE-2023-4623": { - "cmt_msg": "net/sched: sch_hfsc: Ensure inner classes have fsc curve" + "CVE-2024-26805": { + "cmt_msg": "netlink: Fix kernel-infoleak-after-free in __skb_datagram_iter" }, - "CVE-2019-3460": { - "cmt_msg": "Bluetooth: Check L2CAP option sizes returned from l2cap_get_conf_opt" + "CVE-2022-3303": { + "cmt_msg": "ALSA: pcm: oss: Fix race at SNDCTL_DSP_SYNC" }, - "CVE-2022-3636": { - "cmt_msg": "net: ethernet: mtk_eth_soc: use after free in __mtk_ppe_check_skb()" + "CVE-2019-19039": { + "cmt_msg": "btrfs: Don't submit any btree write bio if the fs has errors" }, - "CVE-2022-3635": { - "cmt_msg": "atm: idt77252: fix use-after-free bugs caused by tst_timer" + "CVE-2017-5715": { + "cmt_msg": "x86/cpufeatures: Add X86_BUG_SPECTRE_V[12]" }, - "CVE-2023-5178": { - "cmt_msg": "nvmet-tcp: Fix a possible UAF in queue intialization setup" + "CVE-2024-26769": { + "cmt_msg": "nvmet-fc: avoid deadlock on delete association path" }, - "CVE-2015-4178": { - "cmt_msg": "fs_pin: Allow for the possibility that m_list or s_list go unused." + "CVE-2023-23455": { + "cmt_msg": "net: sched: atm: dont intepret cls results when asked to drop" }, - "CVE-2022-3202": { - "cmt_msg": "jfs: prevent NULL deref in diFree" + "CVE-2023-23454": { + "cmt_msg": "net: sched: cbq: dont intepret cls results when asked to drop" }, - "CVE-2018-3646": { + "CVE-2022-20148": { + "cmt_msg": "f2fs: fix UAF in f2fs_available_free_memory" + }, + "CVE-2018-3620": { "cmt_msg": "x86/microcode: Allow late microcode loading with SMT disabled" }, - "CVE-2017-7518": { - "cmt_msg": "KVM: x86: fix singlestepping over syscall" + "CVE-2023-6932": { + "cmt_msg": "ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet" }, - "CVE-2024-26584": { - "cmt_msg": "net: tls: handle backlogging of crypto requests" + "CVE-2019-12615": { + "cmt_msg": "mdesc: fix a missing-check bug in get_vdev_port_node_info()" }, - "CVE-2024-24861": { - "cmt_msg": "" + "CVE-2021-33631": { + "cmt_msg": "ext4: fix kernel BUG in 'ext4_write_inline_data_end()'" }, - "CVE-2019-11477": { - "cmt_msg": "tcp: limit payload size of sacked skbs" + "CVE-2022-28388": { + "cmt_msg": "can: usb_8dev: usb_8dev_start_xmit(): fix double dev_kfree_skb() in error path" }, - "CVE-2023-39189": { - "cmt_msg": "netfilter: nfnetlink_osf: avoid OOB read" + "CVE-2024-26803": { + "cmt_msg": "net: veth: clear GRO when clearing XDP even when down" }, - "CVE-2018-14614": { - "cmt_msg": "f2fs: fix to do sanity check with cp_pack_start_sum" + "CVE-2024-26598": { + "cmt_msg": "KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache" }, - "CVE-2019-11479": { - "cmt_msg": "tcp: add tcp_min_snd_mss sysctl" + "CVE-2020-12362": { + "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" }, - "CVE-2019-11478": { - "cmt_msg": "tcp: tcp_fragment() should apply sane memory limits" + "CVE-2020-12363": { + "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" }, - "CVE-2018-14611": { - "cmt_msg": "btrfs: validate type when reading a chunk" + "CVE-2022-4129": { + "cmt_msg": "l2tp: Serialize access to sk_user_data with sk_callback_lock" }, - "CVE-2018-14610": { - "cmt_msg": "btrfs: Check that each block group has corresponding chunk at mount time" + "CVE-2020-12364": { + "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" }, - "CVE-2018-14613": { - "cmt_msg": "btrfs: tree-checker: Verify block_group_item" + "CVE-2023-52607": { + "cmt_msg": "powerpc/mm: Fix null-pointer dereference in pgtable_cache_add" }, - "CVE-2018-14612": { - "cmt_msg": "btrfs: tree-checker: Detect invalid and empty essential trees" + "CVE-2024-26646": { + "cmt_msg": "thermal: intel: hfi: Add syscore callbacks for system-wide PM" }, - "CVE-2020-26145": { - "cmt_msg": "ath10k: drop fragments with multicast DA for PCIe" + "CVE-2024-26647": { + "cmt_msg": "drm/amd/display: Fix late derefrence 'dsc' check in 'link_set_dsc_pps_packet()'" }, - "CVE-2020-26147": { - "cmt_msg": "mac80211: assure all fragments are encrypted" + "CVE-2024-26644": { + "cmt_msg": "btrfs: don't abort filesystem when attempting to snapshot deleted subvolume" }, - "CVE-2018-5814": { - "cmt_msg": "usbip: usbip_host: fix NULL-ptr deref and use-after-free errors" + "CVE-2024-26642": { + "cmt_msg": "netfilter: nf_tables: disallow anonymous set with timeout flag" }, - "CVE-2020-26140": { - "cmt_msg": "" + "CVE-2023-26545": { + "cmt_msg": "net: mpls: fix stale pointer if allocation fails during device rename" }, - "CVE-2020-26143": { - "cmt_msg": "" + "CVE-2023-3117": { + "cmt_msg": "netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE" }, - "CVE-2020-26142": { - "cmt_msg": "" + "CVE-2024-26791": { + "cmt_msg": "btrfs: dev-replace: properly validate device names" }, - "CVE-2019-17053": { - "cmt_msg": "ieee802154: enforce CAP_NET_RAW for raw sockets" + "CVE-2019-20811": { + "cmt_msg": "net-sysfs: call dev_hold if kobject_init_and_add success" }, - "CVE-2019-17052": { - "cmt_msg": "ax25: enforce CAP_NET_RAW for raw sockets" + "CVE-2023-52600": { + "cmt_msg": "jfs: fix uaf in jfs_evict_inode" }, - "CVE-2016-3070": { - "cmt_msg": "mm: migrate dirty page without clear_page_dirty_for_io etc" + "CVE-2023-3111": { + "cmt_msg": "btrfs: unset reloc control if transaction commit fails in prepare_to_relocate()" }, - "CVE-2023-1077": { - "cmt_msg": "sched/rt: pick_next_rt_entity(): check list_entry" + "CVE-2023-52601": { + "cmt_msg": "jfs: fix array-index-out-of-bounds in dbAdjTree" }, - "CVE-2020-27418": { - "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region" + "CVE-2023-6356": { + "cmt_msg": "nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length" }, - "CVE-2023-51780": { - "cmt_msg": "atm: Fix Use-After-Free in do_vcc_ioctl" + "CVE-2022-26373": { + "cmt_msg": "x86/speculation: Add RSB VM Exit protections" }, - "CVE-2019-17055": { - "cmt_msg": "mISDN: enforce CAP_NET_RAW for raw sockets" + "CVE-2018-5995": { + "cmt_msg": "printk: hash addresses printed with %p" }, - "CVE-2019-17054": { - "cmt_msg": "appletalk: enforce CAP_NET_RAW for raw sockets" + "CVE-2019-15290": { + "cmt_msg": "" }, - "CVE-2018-13093": { - "cmt_msg": "xfs: validate cached inodes are free when allocated" + "CVE-2023-3212": { + "cmt_msg": "gfs2: Don't deref jdesc in evict" }, - "CVE-2023-51781": { - "cmt_msg": "appletalk: Fix Use-After-Free in atalk_ioctl" + "CVE-2024-23848": { + "cmt_msg": "" }, - "CVE-2023-3108": { - "cmt_msg": "crypto: fix af_alg_make_sg() conversion to iov_iter" + "CVE-2023-52531": { + "cmt_msg": "wifi: iwlwifi: mvm: Fix a memory corruption issue" }, - "CVE-2018-13094": { - "cmt_msg": "xfs: don't call xfs_da_shrink_inode with NULL bp" + "CVE-2023-52588": { + "cmt_msg": "f2fs: fix to tag gcing flag on page during block migration" }, - "CVE-2018-13095": { - "cmt_msg": "xfs: More robust inode extent count validation" + "CVE-2018-7273": { + "cmt_msg": "printk: hash addresses printed with %p" }, - "CVE-2020-29661": { - "cmt_msg": "tty: Fix ->pgrp locking in tiocspgrp()" + "CVE-2024-26778": { + "cmt_msg": "fbdev: savage: Error out if pixclock equals zero" }, - "CVE-2020-29660": { - "cmt_msg": "tty: Fix ->session locking" + "CVE-2023-4459": { + "cmt_msg": "net: vmxnet3: fix possible NULL pointer dereference in vmxnet3_rq_cleanup()" }, - "CVE-2019-2025": { - "cmt_msg": "binder: fix race that allows malicious free of live buffer" + "CVE-2024-26636": { + "cmt_msg": "llc: make llc_ui_sendmsg() more robust against bonding changes" }, - "CVE-2014-9717": { - "cmt_msg": "mnt: Update detach_mounts to leave mounts connected" + "CVE-2024-26635": { + "cmt_msg": "llc: Drop support for ETH_P_TR_802_2." }, - "CVE-2023-28772": { - "cmt_msg": "seq_buf: Fix overflow in seq_buf_putmem_hex()" + "CVE-2023-52639": { + "cmt_msg": "KVM: s390: vsie: fix race during shadow creation" }, - "CVE-2022-2588": { - "cmt_msg": "net_sched: cls_route: remove from list when handle is 0" + "CVE-2022-2153": { + "cmt_msg": "KVM: x86: Avoid theoretical NULL pointer dereference in kvm_irq_delivery_to_apic_fast()" }, - "CVE-2019-11884": { - "cmt_msg": "Bluetooth: hidp: fix buffer overflow" + "CVE-2024-2193": { + "cmt_msg": "" }, - "CVE-2014-9710": { - "cmt_msg": "Btrfs: make xattr replace operations atomic" + "CVE-2022-20566": { + "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free caused by l2cap_chan_put" }, - "CVE-2015-8955": { - "cmt_msg": "arm64: perf: reject groups spanning multiple HW PMUs" + "CVE-2018-12930": { + "cmt_msg": "" }, - "CVE-2019-19074": { - "cmt_msg": "ath9k: release allocated buffer if timed out" + "CVE-2018-12931": { + "cmt_msg": "" }, - "CVE-2019-19073": { - "cmt_msg": "ath9k_htc: release allocated buffer if timed out" + "CVE-2023-1990": { + "cmt_msg": "nfc: st-nci: Fix use after free bug in ndlc_remove due to race condition" }, - "CVE-2015-9016": { - "cmt_msg": "blk-mq: fix race between timeout and freeing request" + "CVE-2021-33098": { + "cmt_msg": "ixgbe: fix large MTU request from VF" }, - "CVE-2015-8952": { - "cmt_msg": "ext2: convert to mbcache2" + "CVE-2019-12381": { + "cmt_msg": "ip_sockglue: Fix missing-check bug in ip_ra_control()" }, - "CVE-2022-23038": { - "cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()" + "CVE-2019-12382": { + "cmt_msg": "drm/edid: Fix a missing-check bug in drm_load_edid_firmware()" }, - "CVE-2022-23039": { - "cmt_msg": "xen/gntalloc: don't use gnttab_query_foreign_access()" + "CVE-2023-52634": { + "cmt_msg": "drm/amd/display: Fix disable_otg_wa logic" }, - "CVE-2021-27363": { - "cmt_msg": "scsi: iscsi: Restrict sessions and handles to admin capabilities" + "CVE-2024-26648": { + "cmt_msg": "drm/amd/display: Fix variable deferencing before NULL check in edp_setup_replay()" }, - "CVE-2022-20158": { - "cmt_msg": "net/packet: fix slab-out-of-bounds access in packet_recvmsg()" + "CVE-2020-36780": { + "cmt_msg": "i2c: sprd: fix reference leak when pm_runtime_get_sync fails" }, - "CVE-2022-23037": { - "cmt_msg": "xen/netfront: don't use gnttab_query_foreign_access() for mapped status" + "CVE-2020-36781": { + "cmt_msg": "i2c: imx: fix reference leak when pm_runtime_get_sync fails" }, - "CVE-2020-0404": { - "cmt_msg": "media: uvcvideo: Avoid cyclic entity chains due to malformed USB descriptors" + "CVE-2024-24860": { + "cmt_msg": "Bluetooth: Fix atomicity violation in {min,max}_key_size_set" }, - "CVE-2019-15927": { - "cmt_msg": "ALSA: usb-audio: Avoid access before bLength check in build_audio_procunit()" + "CVE-2017-13166": { + "cmt_msg": "media: v4l2-ioctl.c: use check_fmt for enum/g/s/try_fmt" }, - "CVE-2019-15926": { - "cmt_msg": "ath6kl: add some bounds checking" + "CVE-2019-25162": { + "cmt_msg": "i2c: Fix a potential use after free" }, - "CVE-2019-14821": { - "cmt_msg": "KVM: coalesced_mmio: add bounds checking" + "CVE-2018-12207": { + "cmt_msg": "kvm: x86, powerpc: do not allow clearing largepages debugfs entry" }, - "CVE-2020-12826": { - "cmt_msg": "signal: Extend exec_id to 64bits" + "CVE-2024-26685": { + "cmt_msg": "nilfs2: fix potential bug in end_buffer_async_write" }, - "CVE-2019-3701": { - "cmt_msg": "can: gw: ensure DLC boundaries after CAN frame modification" + "CVE-2024-25740": { + "cmt_msg": "" }, - "CVE-2021-42008": { - "cmt_msg": "net: 6pack: fix slab-out-of-bounds in decode_data" + "CVE-2022-33740": { + "cmt_msg": "xen/netfront: fix leaking data in shared pages" }, - "CVE-2022-44033": { - "cmt_msg": "char: pcmcia: remove all the drivers" + "CVE-2022-3903": { + "cmt_msg": "media: mceusb: Use new usb_control_msg_*() routines" }, - "CVE-2022-39188": { - "cmt_msg": "mmu_gather: Force tlb-flush VM_PFNMAP vmas" + "CVE-2023-20588": { + "cmt_msg": "x86/CPU/AMD: Do not leak quotient data after a division by 0" }, - "CVE-2018-20511": { - "cmt_msg": "net/appletalk: fix minor pointer leak to userspace in SIOCFINDIPDDPRT" + "CVE-2021-47179": { + "cmt_msg": "NFSv4: Fix a NULL pointer dereference in pnfs_mark_matching_lsegs_return()" }, - "CVE-2019-1125": { - "cmt_msg": "x86/speculation: Prepare entry code for Spectre v1 swapgs mitigations" + "CVE-2021-47075": { + "cmt_msg": "nvmet: fix memory leak in nvmet_alloc_ctrl()" }, - "CVE-2020-24588": { - "cmt_msg": "cfg80211: mitigate A-MSDU aggregation attacks" + "CVE-2019-11191": { + "cmt_msg": "x86: Deprecate a.out support" }, - "CVE-2020-25643": { - "cmt_msg": "hdlc_ppp: add range checks in ppp_cp_parse_cr()" + "CVE-2021-47076": { + "cmt_msg": "RDMA/rxe: Return CQE error if invalid lkey was supplied" }, - "CVE-2005-3660": { - "cmt_msg": "" + "CVE-2021-47170": { + "cmt_msg": "USB: usbfs: Don't WARN about excessively large memory allocations" }, - "CVE-2019-15212": { - "cmt_msg": "USB: rio500: refuse more than one device at a time" + "CVE-2021-47172": { + "cmt_msg": "iio: adc: ad7124: Fix potential overflow due to non sequential channel numbers" }, - "CVE-2023-31085": { - "cmt_msg": "ubi: Refuse attaching if mtd's erasesize is 0" + "CVE-2021-47175": { + "cmt_msg": "net/sched: fq_pie: fix OOB access in the traffic path" }, - "CVE-2023-31084": { - "cmt_msg": "media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*()" + "CVE-2018-10322": { + "cmt_msg": "xfs: enhance dinode verifier" }, - "CVE-2019-15217": { - "cmt_msg": "media: usb:zr364xx:Fix KASAN:null-ptr-deref Read in zr364xx_vidioc_querycap" + "CVE-2021-46951": { + "cmt_msg": "tpm: efi: Use local variable for calculating final log size" }, - "CVE-2019-15216": { - "cmt_msg": "USB: yurex: Fix protection fault after device removal" + "CVE-2021-46950": { + "cmt_msg": "md/raid1: properly indicate failure when ending a failed write request" }, - "CVE-2023-31081": { - "cmt_msg": "" + "CVE-2021-46952": { + "cmt_msg": "NFS: fs_context: validate UDP retrans to prevent shift out-of-bounds" }, - "CVE-2019-15214": { - "cmt_msg": "ALSA: core: Fix card races between register and disconnect" + "CVE-2021-46959": { + "cmt_msg": "spi: Fix use-after-free with devm_spi_alloc_*" }, - "CVE-2021-33034": { - "cmt_msg": "Bluetooth: verify AMP hci_chan before amp_destroy" + "CVE-2024-26772": { + "cmt_msg": "ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal()" }, - "CVE-2019-19922": { - "cmt_msg": "sched/fair: Fix low cpu usage with high throttling by removing expiration of cpu-local slices" + "CVE-2019-10220": { + "cmt_msg": "Convert filldir[64]() from __put_user() to unsafe_put_user()" }, - "CVE-2019-19927": { - "cmt_msg": "drm/ttm: fix incrementing the page pointer for huge pages" + "CVE-2021-0929": { + "cmt_msg": "staging/android/ion: delete dma_buf->kmap/unmap implemenation" }, - "CVE-2017-18509": { - "cmt_msg": "ipv6: check sk sk_type and protocol early in ip_mroute_set/getsockopt" + "CVE-2023-52590": { + "cmt_msg": "ocfs2: Avoid touching renamed directory if parent does not change" }, - "CVE-2020-27068": { - "cmt_msg": "cfg80211: add missing policy for NL80211_ATTR_STATUS_CODE" + "CVE-2024-26675": { + "cmt_msg": "ppp_async: limit MRU to 64K" }, - "CVE-2020-8648": { - "cmt_msg": "vt: selection, close sel_buffer race" + "CVE-2023-0615": { + "cmt_msg": "media: vivid: dev->bitmap_cap wasn't freed in all cases" }, - "CVE-2022-32296": { - "cmt_msg": "tcp: increase source port perturb table to 2^16" + "CVE-2024-26672": { + "cmt_msg": "drm/amdgpu: Fix variable 'mca_funcs' dereferenced before NULL check in 'amdgpu_mca_smu_get_mca_entry()'" }, - "CVE-2020-28974": { - "cmt_msg": "vt: Disable KD_FONT_OP_COPY" + "CVE-2023-52527": { + "cmt_msg": "ipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data()" }, - "CVE-2023-3567": { - "cmt_msg": "vc_screen: move load of struct vc_data pointer in vcs_read() to avoid UAF" + "CVE-2020-26145": { + "cmt_msg": "ath10k: drop fragments with multicast DA for PCIe" }, - "CVE-2019-20806": { - "cmt_msg": "media: tw5864: Fix possible NULL pointer dereference in tw5864_handle_frame" + "CVE-2023-52522": { + "cmt_msg": "net: fix possible store tearing in neigh_periodic_work()" }, - "CVE-2022-3028": { - "cmt_msg": "af_key: Do not call xfrm_probe_algs in parallel" + "CVE-2022-3586": { + "cmt_msg": "sch_sfb: Don't assume the skb is still around after enqueueing to child" }, - "CVE-2017-16648": { - "cmt_msg": "dvb_frontend: don't use-after-free the frontend struct" + "CVE-2024-26789": { + "cmt_msg": "crypto: arm64/neonbs - fix out-of-bounds access on short input" }, - "CVE-2020-14304": { - "cmt_msg": "" + "CVE-2024-26779": { + "cmt_msg": "wifi: mac80211: fix race condition on enabling fast-xmit" }, - "CVE-2010-5321": { - "cmt_msg": "" + "CVE-2023-52528": { + "cmt_msg": "net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg" }, - "CVE-2020-15393": { - "cmt_msg": "usb: usbtest: fix missing kfree(dev->buf) in usbtest_disconnect" + "CVE-2019-2181": { + "cmt_msg": "binder: check for overflow when alloc for security context" }, - "CVE-2014-8989": { - "cmt_msg": "userns: Don't allow setgroups until a gid mapping has been setablished" + "CVE-2020-27820": { + "cmt_msg": "drm/nouveau: use drm_dev_unplug() during device removal" }, - "CVE-2021-3564": { - "cmt_msg": "Bluetooth: fix the erroneous flush_work() order" + "CVE-2023-39194": { + "cmt_msg": "net: xfrm: Fix xfrm_address_filter OOB read" }, - "CVE-2019-9506": { - "cmt_msg": "Bluetooth: Fix faulty expression for minimum encryption key size check" + "CVE-2020-0067": { + "cmt_msg": "f2fs: fix to avoid memory leakage in f2fs_listxattr" }, - "CVE-2017-16995": { - "cmt_msg": "bpf: fix incorrect sign extension in check_alu_op()" + "CVE-2023-52599": { + "cmt_msg": "jfs: fix array-index-out-of-bounds in diNewExt" }, - "CVE-2019-18675": { - "cmt_msg": "mmap: introduce sane default mmap limits" + "CVE-2023-4622": { + "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES" }, - "CVE-2020-26560": { - "cmt_msg": "" + "CVE-2024-26774": { + "cmt_msg": "ext4: avoid dividing by 0 in mb_update_avg_fragment_size() when block bitmap corrupt" }, - "CVE-2024-22386": { - "cmt_msg": "" + "CVE-2023-39193": { + "cmt_msg": "netfilter: xt_sctp: validate the flag_info count" }, - "CVE-2018-12127": { - "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" + "CVE-2023-39192": { + "cmt_msg": "netfilter: xt_u32: validate user space input" }, - "CVE-2018-12126": { - "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" + "CVE-2020-26541": { + "cmt_msg": "certs: Add EFI_CERT_X509_GUID support for dbx entries" }, - "CVE-2023-37454": { - "cmt_msg": "" + "CVE-2023-6610": { + "cmt_msg": "smb: client: fix potential OOB in smb2_dump_detail()" }, - "CVE-2023-35824": { - "cmt_msg": "media: dm1105: Fix use after free bug in dm1105_remove due to race condition" + "CVE-2024-26600": { + "cmt_msg": "phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP" }, - "CVE-2018-10021": { - "cmt_msg": "scsi: libsas: defer ata device eh commands to libata" + "CVE-2023-3390": { + "cmt_msg": "netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE" }, - "CVE-2019-10126": { - "cmt_msg": "mwifiex: Fix heap overflow in mwifiex_uap_parse_tail_ies()" + "CVE-2021-20317": { + "cmt_msg": "lib/timerqueue: Rely on rbtree semantics for next timer" }, - "CVE-2019-13631": { - "cmt_msg": "Input: gtco - bounds check collection indent level" + "CVE-2024-26768": { + "cmt_msg": "LoongArch: Change acpi_core_pic[NR_CPUS] to acpi_core_pic[MAX_CORE_PIC]" }, - "CVE-2020-13974": { - "cmt_msg": "vt: keyboard: avoid signed integer overflow in k_ascii" + "CVE-2021-33061": { + "cmt_msg": "ixgbe: add improvement for MDD response functionality" }, - "CVE-2016-6213": { - "cmt_msg": "mnt: Add a per mount namespace limit on the number of mounts" + "CVE-2024-26764": { + "cmt_msg": "fs/aio: Restrict kiocb_set_cancel_fn() to I/O submitted via libaio" }, - "CVE-2021-4083": { - "cmt_msg": "fget: check that the fd still exists after getting a ref to it" + "CVE-2024-26767": { + "cmt_msg": "drm/amd/display: fixed integer types and null check locations" }, - "CVE-2023-33288": { - "cmt_msg": "power: supply: bq24190: Fix use after free bug in bq24190_remove due to race condition" + "CVE-2024-26766": { + "cmt_msg": "IB/hfi1: Fix sdma.h tx->num_descs off-by-one error" }, - "CVE-2022-29900": { - "cmt_msg": "x86/kvm/vmx: Make noinstr clean" + "CVE-2024-26763": { + "cmt_msg": "dm-crypt: don't modify the data when using authenticated encryption" }, - "CVE-2022-29901": { - "cmt_msg": "x86/kvm/vmx: Make noinstr clean" + "CVE-2023-1476": { + "cmt_msg": "" }, - "CVE-2018-12233": { - "cmt_msg": "jfs: Fix inconsistency between memory allocation and ea_buf->max_size" + "CVE-2024-26773": { + "cmt_msg": "ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found()" }, - "CVE-2023-3161": { - "cmt_msg": "fbcon: Check font dimension limits" + "CVE-2017-18552": { + "cmt_msg": "RDS: validate the requested traces user input against max supported" }, - "CVE-2020-10751": { - "cmt_msg": "selinux: properly handle multiple messages in selinux_netlink_send()" + "CVE-2024-26770": { + "cmt_msg": "HID: nvidia-shield: Add missing null pointer checks to LED initialization" }, - "CVE-2012-4398": { - "cmt_msg": "usermodehelper: use UMH_WAIT_PROC consistently" + "CVE-2022-1652": { + "cmt_msg": "floppy: use a statically allocated error counter" }, - "CVE-2018-9465": { - "cmt_msg": "binder: fix proc->files use-after-free" + "CVE-2023-1670": { + "cmt_msg": "xirc2ps_cs: Fix use after free bug in xirc2ps_detach" }, - "CVE-2018-20510": { - "cmt_msg": "binder: replace \"%p\" with \"%pK\"" + "CVE-2023-51043": { + "cmt_msg": "drm/atomic: Fix potential use-after-free in nonblocking commits" }, - "CVE-2014-7970": { - "cmt_msg": "mnt: Prevent pivot_root from creating a loop in the mount tree" + "CVE-2022-2978": { + "cmt_msg": "fs: fix UAF/GPF bug in nilfs_mdt_destroy" }, - "CVE-2020-15437": { - "cmt_msg": "serial: 8250: fix null-ptr-deref in serial8250_start_tx()" + "CVE-2019-9453": { + "cmt_msg": "f2fs: fix to avoid accessing xattr across the boundary" }, - "CVE-2020-15436": { - "cmt_msg": "block: Fix use-after-free in blkdev_get()" + "CVE-2023-20569": { + "cmt_msg": "x86/bugs: Increase the x86 bugs vector size to two u32s" }, - "CVE-2022-1116": { + "CVE-2022-20424": { + "cmt_msg": "io_uring: remove io_identity" + }, + "CVE-2016-8660": { "cmt_msg": "" }, - "CVE-2022-2318": { - "cmt_msg": "net: rose: fix UAF bugs caused by timer handler" + "CVE-2023-6270": { + "cmt_msg": "aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts" }, - "CVE-2016-9178": { - "cmt_msg": "fix minor infoleak in get_user_ex()" + "CVE-2023-3090": { + "cmt_msg": "ipvlan:Fix out-of-bounds caused by unclear skb->cb" }, - "CVE-2020-8647": { - "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region" + "CVE-2021-47163": { + "cmt_msg": "tipc: wait and exit until all work queues are done" }, - "CVE-2022-23816": { - "cmt_msg": "x86/kvm/vmx: Make noinstr clean" + "CVE-2023-45862": { + "cmt_msg": "USB: ene_usb6250: Allocate enough memory for full object" }, - "CVE-2019-0154": { - "cmt_msg": "drm/i915: Lower RM timeout to avoid DSI hard hangs" + "CVE-2023-45863": { + "cmt_msg": "kobject: Fix slab-out-of-bounds in fill_kobj_path()" }, - "CVE-2022-3567": { - "cmt_msg": "ipv6: Fix data races around sk->sk_prot." + "CVE-2022-1786": { + "cmt_msg": "io_uring: remove io_identity" }, - "CVE-2022-3566": { - "cmt_msg": "tcp: Fix data races around icsk->icsk_af_ops." + "CVE-2008-4609": { + "cmt_msg": "" }, - "CVE-2022-3565": { - "cmt_msg": "mISDN: fix use-after-free bugs in l1oip timer handlers" + "CVE-2018-25020": { + "cmt_msg": "bpf: fix truncated jump targets on heavy expansions" }, - "CVE-2020-36386": { - "cmt_msg": "Bluetooth: Fix slab-out-of-bounds read in hci_extended_inquiry_result_evt()" + "CVE-2023-26607": { + "cmt_msg": "ntfs: fix out-of-bounds read in ntfs_attr_find()" }, - "CVE-2020-36385": { - "cmt_msg": "RDMA/ucma: Rework ucma_migrate_id() to avoid races with destroy" + "CVE-2018-1121": { + "cmt_msg": "" }, - "CVE-2022-1048": { - "cmt_msg": "ALSA: pcm: Fix races among concurrent hw_params and hw_free calls" + "CVE-2023-52635": { + "cmt_msg": "PM / devfreq: Synchronize devfreq_monitor_[start/stop]" }, - "CVE-2023-52340": { - "cmt_msg": "ipv6: remove max_size check inline with ipv4" + "CVE-2023-52469": { + "cmt_msg": "drivers/amd/pm: fix a use-after-free in kv_parse_power_table" }, - "CVE-2018-7480": { - "cmt_msg": "blkcg: fix double free of new_blkg in blkcg_init_queue" + "CVE-2023-52633": { + "cmt_msg": "um: time-travel: fix time corruption" }, - "CVE-2019-14615": { - "cmt_msg": "drm/i915/gen9: Clear residual context state on context switch" + "CVE-2023-52632": { + "cmt_msg": "drm/amdkfd: Fix lock dependency warning with srcu" }, - "CVE-2016-3139": { - "cmt_msg": "Input: wacom - compute the HID report size to get the actual packet size" + "CVE-2021-4037": { + "cmt_msg": "xfs: fix up non-directory creation in SGID directories" }, - "CVE-2023-0030": { - "cmt_msg": "drm/nouveau/mmu: add more general vmm free/node handling functions" + "CVE-2021-22543": { + "cmt_msg": "KVM: do not allow mapping valid but non-reference-counted pages" }, - "CVE-2020-16120": { - "cmt_msg": "ovl: switch to mounter creds in readdir" + "CVE-2019-1999": { + "cmt_msg": "binder: fix race between munmap() and direct reclaim" }, - "CVE-2019-11599": { - "cmt_msg": "coredump: fix race condition between mmget_not_zero()/get_task_mm() and core dumping" + "CVE-2023-20941": { + "cmt_msg": "" }, - "CVE-2018-16658": { - "cmt_msg": "cdrom: Fix info leak/OOB read in cdrom_ioctl_drive_status" + "CVE-2023-2194": { + "cmt_msg": "i2c: xgene-slimpro: Fix out-of-bounds bug in xgene_slimpro_i2c_xfer()" }, - "CVE-2018-15572": { - "cmt_msg": "x86/speculation: Protect against userspace-userspace spectreRSB" + "CVE-2019-7308": { + "cmt_msg": "bpf: fix sanitation of alu op with pointer / scalar type from different paths" }, - "CVE-2022-1204": { - "cmt_msg": "ax25: Fix refcount leaks caused by ax25_cb_del()" + "CVE-2024-26784": { + "cmt_msg": "pmdomain: arm: Fix NULL dereference on scmi_perf_domain removal" }, - "CVE-2019-2101": { - "cmt_msg": "media: uvcvideo: Fix 'type' check leading to overflow" + "CVE-2022-1966": { + "cmt_msg": "netfilter: nf_tables: disallow non-stateful expression in sets earlier" }, - "CVE-2016-10723": { - "cmt_msg": "mm, oom: remove sleep from under oom_lock" + "CVE-2017-9986": { + "cmt_msg": "sound: Retire OSS" }, - "CVE-2019-19036": { - "cmt_msg": "btrfs: Detect unbalanced tree with empty leaf before crashing btree operations" + "CVE-2023-3772": { + "cmt_msg": "xfrm: add NULL check in xfrm_update_ae_params" }, - "CVE-2019-3459": { - "cmt_msg": "Bluetooth: Verify that l2cap_get_conf_opt provides large enough buffer" + "CVE-2022-3533": { + "cmt_msg": "" }, - "CVE-2020-11494": { - "cmt_msg": "slcan: Don't transmit uninitialized stack data in padding" + "CVE-2022-3534": { + "cmt_msg": "libbpf: Fix use-after-free in btf_dump_name_dups" }, - "CVE-2019-19039": { - "cmt_msg": "btrfs: Don't submit any btree write bio if the fs has errors" + "CVE-2021-47135": { + "cmt_msg": "mt76: mt7921: fix possible AOOB issue in mt7921_mcu_tx_rate_report" }, - "CVE-2022-1974": { - "cmt_msg": "nfc: replace improper check device_is_registered() in netlink related functions" + "CVE-2021-47136": { + "cmt_msg": "net: zero-initialize tc skb extension on allocation" }, - "CVE-2020-8832": { - "cmt_msg": "drm/i915: Record the default hw state after reset upon load" + "CVE-2021-47137": { + "cmt_msg": "net: lantiq: fix memory corruption in RX ring" }, - "CVE-2022-1836": { - "cmt_msg": "floppy: disable FDRAWCMD by default" + "CVE-2021-47131": { + "cmt_msg": "net/tls: Fix use-after-free after the TLS device goes down and up" }, - "CVE-2021-32078": { - "cmt_msg": "ARM: footbridge: remove personal server platform" + "CVE-2021-47133": { + "cmt_msg": "HID: amd_sfh: Fix memory leak in amd_sfh_work" }, - "CVE-2014-1874": { - "cmt_msg": "SELinux: Fix kernel BUG on empty security contexts." + "CVE-2024-26633": { + "cmt_msg": "ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim()" }, - "CVE-2017-16528": { - "cmt_msg": "ALSA: seq: Cancel pending autoload work at unbinding device" + "CVE-2022-3061": { + "cmt_msg": "video: fbdev: i740fb: Error out if 'pixclock' equals zero" }, - "CVE-2022-4662": { - "cmt_msg": "USB: core: Prevent nested device-reset calls" + "CVE-2023-28328": { + "cmt_msg": "media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer()" }, - "CVE-2019-11833": { - "cmt_msg": "ext4: zero out the unused memory region in the extent tree block" + "CVE-2023-0386": { + "cmt_msg": "ovl: fail on invalid uid/gid mapping at copy up" }, - "CVE-2021-38205": { - "cmt_msg": "net: xilinx_emaclite: Do not print real IOMEM pointer" + "CVE-2023-52638": { + "cmt_msg": "can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock" }, - "CVE-2021-3864": { + "CVE-2017-13693": { "cmt_msg": "" }, - "CVE-2020-0255": { - "cmt_msg": "selinux: properly handle multiple messages in selinux_netlink_send()" + "CVE-2017-13694": { + "cmt_msg": "" }, - "CVE-2019-2215": { - "cmt_msg": "ANDROID: binder: remove waitqueue when thread exits." + "CVE-2021-4149": { + "cmt_msg": "btrfs: unlock newly allocated extent buffer after error" }, - "CVE-2019-2213": { - "cmt_msg": "binder: fix possible UAF when freeing buffer" + "CVE-2022-21385": { + "cmt_msg": "net/rds: fix warn in rds_message_alloc_sgs" }, - "CVE-2020-25211": { - "cmt_msg": "netfilter: ctnetlink: add a range check for l3/l4 protonum" + "CVE-2022-42895": { + "cmt_msg": "Bluetooth: L2CAP: Fix attempting to access uninitialized memory" }, - "CVE-2018-5953": { - "cmt_msg": "printk: hash addresses printed with %p" + "CVE-2022-48626": { + "cmt_msg": "moxart: fix potential use-after-free on remove path" }, - "CVE-2020-26556": { + "CVE-2022-48627": { + "cmt_msg": "vt: fix memory overlapping when deleting chars in the buffer" + }, + "CVE-2022-36123": { + "cmt_msg": "x86: Clear .brk area at early boot" + }, + "CVE-2022-48628": { + "cmt_msg": "ceph: drop messages from MDS when unmounting" + }, + "CVE-2024-24859": { "cmt_msg": "" }, - "CVE-2020-26557": { + "CVE-2024-24858": { "cmt_msg": "" }, - "CVE-2020-26555": { - "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical" + "CVE-2024-24855": { + "cmt_msg": "scsi: lpfc: Fix a possible data race in lpfc_unregister_fcf_rescan()" }, - "CVE-2019-20794": { + "CVE-2024-24857": { "cmt_msg": "" }, - "CVE-2018-9516": { - "cmt_msg": "HID: debug: check length before copy_to_user()" + "CVE-2021-39648": { + "cmt_msg": "usb: gadget: configfs: Fix use-after-free issue with udc_name" }, - "CVE-2023-3397": { - "cmt_msg": "" + "CVE-2022-3545": { + "cmt_msg": "nfp: fix use-after-free in area_cache_get()" }, - "CVE-2018-1128": { - "cmt_msg": "libceph: add authorizer challenge" + "CVE-2023-52569": { + "cmt_msg": "btrfs: remove BUG() after failure to insert delayed dir index item" }, - "CVE-2018-1129": { - "cmt_msg": "libceph: implement CEPHX_V2 calculation mode" + "CVE-2023-52568": { + "cmt_msg": "x86/sgx: Resolves SECS reclaim vs. page fault for EAUG race" }, - "CVE-2018-1087": { - "cmt_msg": "kvm/x86: fix icebp instruction handling" + "CVE-2022-3542": { + "cmt_msg": "bnx2x: fix potential memory leak in bnx2x_tpa_stop()" }, - "CVE-2022-26365": { - "cmt_msg": "xen/blkfront: fix leaking data in shared pages" + "CVE-2023-52563": { + "cmt_msg": "drm/meson: fix memory leak on ->hpd_notify callback" }, - "CVE-2022-21125": { - "cmt_msg": "x86/speculation/mmio: Reuse SRBDS mitigation for SBDS" + "CVE-2019-16921": { + "cmt_msg": "RDMA/hns: Fix init resp when alloc ucontext" }, - "CVE-2018-1120": { - "cmt_msg": "proc: do not access cmdline nor environ from file-backed areas" + "CVE-2023-52561": { + "cmt_msg": "arm64: dts: qcom: sdm845-db845c: Mark cont splash memory region as reserved" }, - "CVE-2018-1121": { - "cmt_msg": "" + "CVE-2023-52566": { + "cmt_msg": "nilfs2: fix potential use after free in nilfs_gccache_submit_read_data()" }, - "CVE-2017-5754": { - "cmt_msg": "x86/cpufeatures: Add Intel feature bits for Speculation Control" + "CVE-2023-52565": { + "cmt_msg": "media: uvcvideo: Fix OOB read" }, - "CVE-2017-5753": { - "cmt_msg": "x86/cpufeatures: Add X86_BUG_SPECTRE_V[12]" + "CVE-2021-46928": { + "cmt_msg": "parisc: Clear stale IIR value on instruction access rights trap" }, - "CVE-2014-0181": { - "cmt_msg": "net: Use netlink_ns_capable to verify the permisions of netlink messages" + "CVE-2023-1382": { + "cmt_msg": "tipc: set con sock in tipc_conn_alloc" }, - "CVE-2019-9466": { - "cmt_msg": "brcmfmac: add subtype check for event handling in data path" + "CVE-2023-1380": { + "cmt_msg": "wifi: brcmfmac: slab-out-of-bounds read in brcmf_get_assoc_ies()" }, - "CVE-2020-11565": { - "cmt_msg": "mm: mempolicy: require at least one nodeid for MPOL_PREFERRED" + "CVE-2021-46924": { + "cmt_msg": "NFC: st21nfca: Fix memory leak in device probe and remove" }, - "CVE-2022-3344": { - "cmt_msg": "KVM: x86: nSVM: harden svm_free_nested against freeing vmcb02 while still in use" + "CVE-2021-46926": { + "cmt_msg": "ALSA: hda: intel-sdw-acpi: harden detection of controller" }, - "CVE-2018-9568": { - "cmt_msg": "net: Set sk_prot_creator when cloning sockets to the right proto" + "CVE-2020-0347": { + "cmt_msg": "" }, - "CVE-2018-13053": { - "cmt_msg": "alarmtimer: Prevent overflow for relative nanosleep" + "CVE-2022-41222": { + "cmt_msg": "mm/mremap: hold the rmap lock in write mode when moving page table entries." }, - "CVE-2020-27786": { - "cmt_msg": "ALSA: rawmidi: Fix racy buffer resize under concurrent accesses" + "CVE-2022-27223": { + "cmt_msg": "USB: gadget: validate endpoint index for xilinx udc" }, - "CVE-2023-6240": { + "CVE-2022-40982": { + "cmt_msg": "x86/speculation: Add Gather Data Sampling mitigation" + }, + "CVE-2019-12456": { "cmt_msg": "" }, - "CVE-2023-23559": { - "cmt_msg": "wifi: rndis_wlan: Prevent buffer overflow in rndis_query_oid" + "CVE-2017-18174": { + "cmt_msg": "pinctrl: amd: Use devm_pinctrl_register() for pinctrl registration" }, - "CVE-2022-39842": { - "cmt_msg": "video: fbdev: pxa3xx-gcu: Fix integer overflow in pxa3xx_gcu_write" + "CVE-2021-33656": { + "cmt_msg": "vt: drop old FONT ioctls" }, - "CVE-2022-0382": { - "cmt_msg": "net ticp:fix a kernel-infoleak in __tipc_sendmsg()" + "CVE-2024-26720": { + "cmt_msg": "mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again" }, - "CVE-2023-32233": { - "cmt_msg": "netfilter: nf_tables: deactivate anonymous set from preparation phase" + "CVE-2021-33655": { + "cmt_msg": "fbcon: Disallow setting font bigger than screen size" }, - "CVE-2018-21008": { - "cmt_msg": "rsi: add fix for crash during assertions" + "CVE-2022-41858": { + "cmt_msg": "drivers: net: slip: fix NPD bug in sl_tx_timeout()" }, - "CVE-2019-15223": { - "cmt_msg": "ALSA: line6: Assure canceling delayed work at disconnection" + "CVE-2024-26726": { + "cmt_msg": "btrfs: don't drop extent_map for free space inode on write error" }, - "CVE-2019-19813": { - "cmt_msg": "btrfs: inode: Verify inode mode to avoid NULL pointer dereference" + "CVE-2023-1206": { + "cmt_msg": "tcp: Reduce chance of collisions in inet6_hashfn()." }, - "CVE-2019-15221": { - "cmt_msg": "ALSA: line6: Fix write on zero-sized buffer" + "CVE-2022-41850": { + "cmt_msg": "HID: roccat: Fix use-after-free in roccat_read()" }, - "CVE-2019-19814": { - "cmt_msg": "" + "CVE-2023-2985": { + "cmt_msg": "fs: hfsplus: fix UAF issue in hfsplus_put_super" }, - "CVE-2020-29371": { - "cmt_msg": "romfs: fix uninitialized memory leak in romfs_dev_read()" + "CVE-2022-3649": { + "cmt_msg": "nilfs2: fix use-after-free bug of struct nilfs_root" }, - "CVE-2019-19816": { - "cmt_msg": "btrfs: inode: Verify inode mode to avoid NULL pointer dereference" + "CVE-2022-3646": { + "cmt_msg": "nilfs2: fix leak of nilfs_root in case of writer thread creation failure" }, - "CVE-2020-0429": { - "cmt_msg": "l2tp: fix race between l2tp_session_delete() and l2tp_tunnel_closeall()" + "CVE-2021-45469": { + "cmt_msg": "f2fs: fix to do sanity check on last xattr entry in __f2fs_setxattr()" }, - "CVE-2018-18710": { - "cmt_msg": "cdrom: fix improper type cast, which can leat to information leak." + "CVE-2022-1184": { + "cmt_msg": "ext4: verify dir block before splitting it" }, - "CVE-2019-5108": { - "cmt_msg": "mac80211: Do not send Layer 2 Update frame before authorization" + "CVE-2022-3642": { + "cmt_msg": "" }, - "CVE-2022-1012": { - "cmt_msg": "secure_seq: use the 64 bits of the siphash for port offset calculation" + "CVE-2022-3643": { + "cmt_msg": "xen/netback: Ensure protocol headers don't fall in the non-linear area" }, - "CVE-2020-8649": { - "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region" + "CVE-2024-0584": { + "cmt_msg": "ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet" }, - "CVE-2020-12656": { - "cmt_msg": "sunrpc: check that domain table is empty at module unload." + "CVE-2023-52519": { + "cmt_msg": "HID: intel-ish-hid: ipc: Disable and reenable ACPI GPE bit" }, - "CVE-2017-1000405": { - "cmt_msg": "mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d()" + "CVE-2023-52516": { + "cmt_msg": "dma-debug: don't call __dma_entry_alloc_check_leak() under free_entries_lock" }, - "CVE-2021-26930": { - "cmt_msg": "xen-blkback: fix error handling in xen_blkbk_map()" + "CVE-2021-4218": { + "cmt_msg": "sysctl: pass kernel pointers to ->proc_handler" }, - "CVE-2021-26932": { - "cmt_msg": "Xen/x86: don't bail early from clear_foreign_p2m_mapping()" + "CVE-2023-52515": { + "cmt_msg": "RDMA/srp: Do not call scsi_done() from srp_abort()" }, - "CVE-2023-3141": { - "cmt_msg": "memstick: r592: Fix UAF bug in r592_remove due to race condition" + "CVE-2024-25739": { + "cmt_msg": "" }, - "CVE-2018-14617": { - "cmt_msg": "hfsplus: fix NULL dereference in hfsplus_lookup()" + "CVE-2023-52511": { + "cmt_msg": "spi: sun6i: reduce DMA RX transfer width to single byte" }, - "CVE-2022-0492": { - "cmt_msg": "cgroup-v1: Require capabilities to set release_agent" + "CVE-2024-0340": { + "cmt_msg": "vhost: use kzalloc() instead of kmalloc() followed by memset()" }, - "CVE-2022-23042": { - "cmt_msg": "xen/netfront: react properly to failing gnttab_end_foreign_access_ref()" + "CVE-2023-6535": { + "cmt_msg": "" }, - "CVE-2022-20132": { - "cmt_msg": "HID: add hid_is_usb() function to make it simpler for USB detection" + "CVE-2023-6536": { + "cmt_msg": "nvmet-tcp: fix a crash in nvmet_req_complete()" }, - "CVE-2022-0494": { - "cmt_msg": "block-map: add __GFP_ZERO flag for alloc_page in function bio_copy_kern" + "CVE-2024-26704": { + "cmt_msg": "ext4: fix double-free of blocks due to wrong extents moved_len" }, - "CVE-2021-26931": { - "cmt_msg": "xen-blkback: don't \"handle\" error by BUG()" + "CVE-2022-23036": { + "cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()" }, - "CVE-2022-3524": { - "cmt_msg": "tcp/udp: Fix memory leak in ipv6_renew_options()." + "CVE-2018-17977": { + "cmt_msg": "" }, - "CVE-2022-3523": { - "cmt_msg": "mm/memory.c: fix race when faulting a device private page" + "CVE-2024-26659": { + "cmt_msg": "xhci: handle isoc Babble and Buffer Overrun events properly" }, - "CVE-2022-3522": { - "cmt_msg": "mm/hugetlb: use hugetlb_pte_stable in migration race check" + "CVE-2024-26658": { + "cmt_msg": "bcachefs: grab s_umount only if snapshotting" }, - "CVE-2008-2544": { + "CVE-2010-5321": { "cmt_msg": "" }, - "CVE-2021-3178": { - "cmt_msg": "nfsd4: readdirplus shouldn't return parent of export" + "CVE-2024-26655": { + "cmt_msg": "Fix memory leak in posix_clock_open()" }, - "CVE-2018-7755": { - "cmt_msg": "floppy: Do not copy a kernel pointer to user memory in FDGETPRM ioctl" + "CVE-2024-26654": { + "cmt_msg": "ALSA: sh: aica: reorder cleanup operations to avoid UAF bugs" }, - "CVE-2022-0330": { - "cmt_msg": "drm/i915: Flush TLBs before releasing backing store" + "CVE-2024-26656": { + "cmt_msg": "drm/amdgpu: fix use-after-free bug" }, - "CVE-2007-3719": { - "cmt_msg": "" + "CVE-2024-26651": { + "cmt_msg": "sr9800: Add check for usbnet_get_endpoints" }, - "CVE-2023-0590": { - "cmt_msg": "net: sched: fix race condition in qdisc_graft()" + "CVE-2024-26650": { + "cmt_msg": "platform/x86: p2sb: Allow p2sb_bar() calls during PCI device probe" }, - "CVE-2022-4095": { - "cmt_msg": "staging: rtl8712: fix use after free bugs" + "CVE-2022-42896": { + "cmt_msg": "Bluetooth: L2CAP: Fix accepting connection request for invalid SPSM" }, - "CVE-2022-45919": { - "cmt_msg": "media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221" + "CVE-2017-5967": { + "cmt_msg": "time: Remove CONFIG_TIMER_STATS" }, - "CVE-2019-19319": { - "cmt_msg": "ext4: protect journal inode's blocks using block_validity" + "CVE-2022-3169": { + "cmt_msg": "nvme: ensure subsystem reset is single threaded" }, - "CVE-2023-1611": { - "cmt_msg": "btrfs: fix race between quota disable and quota assign ioctls" + "CVE-2022-36280": { + "cmt_msg": "drm/vmwgfx: Validate the box size for the snooped cursor" }, - "CVE-2021-3772": { - "cmt_msg": "sctp: use init_tag from inithdr for ABORT chunk" + "CVE-2022-1048": { + "cmt_msg": "ALSA: pcm: Fix races among concurrent hw_params and hw_free calls" }, - "CVE-2013-3231": { - "cmt_msg": "llc: Fix missing msg_namelen update in llc_ui_recvmsg()" + "CVE-2023-52475": { + "cmt_msg": "Input: powermate - fix use-after-free in powermate_config_complete" }, - "CVE-2021-3679": { - "cmt_msg": "tracing: Fix bug in rb_per_cpu_empty() that might cause deadloop." + "CVE-2023-52477": { + "cmt_msg": "usb: hub: Guard against accesses to uninitialized BOS descriptors" }, - "CVE-2021-37159": { - "cmt_msg": "usb: hso: fix error handling code of hso_create_net_device" + "CVE-2023-52476": { + "cmt_msg": "perf/x86/lbr: Filter vsyscall addresses" }, - "CVE-2013-3235": { - "cmt_msg": "tipc: fix info leaks via msg_name in recv_msg/recv_stream" + "CVE-2023-22995": { + "cmt_msg": "usb: dwc3: dwc3-qcom: Add missing platform_device_put() in dwc3_qcom_acpi_register_core" }, - "CVE-2021-34556": { - "cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4" + "CVE-2023-52470": { + "cmt_msg": "drm/radeon: check the alloc_workqueue return value in radeon_crtc_init()" }, - "CVE-2021-28713": { - "cmt_msg": "xen/console: harden hvc_xen against event channel storms" + "CVE-2024-21803": { + "cmt_msg": "" }, - "CVE-2021-28712": { - "cmt_msg": "xen/netfront: harden netfront against event channel storms" + "CVE-2023-52479": { + "cmt_msg": "ksmbd: fix uaf in smb20_oplock_break_ack" }, - "CVE-2021-28711": { - "cmt_msg": "xen/blkfront: harden blkfront against event channel storms" + "CVE-2023-52478": { + "cmt_msg": "HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect" }, - "CVE-2022-1247": { - "cmt_msg": "" + "CVE-2022-26365": { + "cmt_msg": "xen/blkfront: fix leaking data in shared pages" }, - "CVE-2023-51782": { - "cmt_msg": "net/rose: Fix Use-After-Free in rose_ioctl" + "CVE-2023-30456": { + "cmt_msg": "KVM: nVMX: add missing consistency checks for CR0 and CR4" }, - "CVE-2022-3621": { - "cmt_msg": "nilfs2: fix NULL pointer dereference at nilfs_bmap_lookup_at_level()" + "CVE-2020-12656": { + "cmt_msg": "sunrpc: check that domain table is empty at module unload." }, - "CVE-2022-23960": { - "cmt_msg": "ARM: report Spectre v2 status through sysfs" + "CVE-2022-23040": { + "cmt_msg": "xen/xenbus: don't let xenbus_grant_ring() remove grants in error case" }, - "CVE-2017-11472": { - "cmt_msg": "ACPICA: Namespace: fix operand cache leak" + "CVE-2022-23042": { + "cmt_msg": "xen/netfront: react properly to failing gnttab_end_foreign_access_ref()" }, - "CVE-2022-3624": { - "cmt_msg": "bonding: fix reference count leak in balance-alb mode" + "CVE-2018-12929": { + "cmt_msg": "" }, - "CVE-2016-9120": { - "cmt_msg": "staging/android/ion : fix a race condition in the ion driver" + "CVE-2019-12380": { + "cmt_msg": "efi/x86/Add missing error handling to old_memmap 1:1 mapping code" }, - "CVE-2021-3669": { - "cmt_msg": "ipc: replace costly bailout check in sysvipc_find_ipc()" + "CVE-2020-36310": { + "cmt_msg": "KVM: SVM: avoid infinite loop on NPF from bad address" }, - "CVE-2019-18885": { - "cmt_msg": "btrfs: merge btrfs_find_device and find_device" + "CVE-2020-36313": { + "cmt_msg": "KVM: Fix out of range accesses to memslots" }, - "CVE-2020-10708": { - "cmt_msg": "" + "CVE-2024-26592": { + "cmt_msg": "ksmbd: fix UAF issue in ksmbd_tcp_new_connection()" }, - "CVE-2019-11091": { - "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" + "CVE-2022-48619": { + "cmt_msg": "Input: add bounds checking to input_set_capability()" }, - "CVE-2014-9914": { - "cmt_msg": "ipv4: fix a race in ip4_datagram_release_cb()" + "CVE-2020-10708": { + "cmt_msg": "" }, - "CVE-2022-4543": { + "CVE-2022-0400": { "cmt_msg": "" }, - "CVE-2022-3424": { - "cmt_msg": "misc: sgi-gru: fix use-after-free error in gru_set_context_option, gru_fault and gru_handle_user_call_os" + "CVE-2024-25741": { + "cmt_msg": "" }, - "CVE-2023-1829": { - "cmt_msg": "net/sched: Retire tcindex classifier" + "CVE-2024-26808": { + "cmt_msg": "netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain" }, - "CVE-2019-19227": { - "cmt_msg": "appletalk: Fix potential NULL pointer dereference in unregister_snap_client" + "CVE-2024-26809": { + "cmt_msg": "netfilter: nft_set_pipapo: release elements in clone only from destroy path" }, - "CVE-2021-34981": { - "cmt_msg": "Bluetooth: cmtp: fix file refcount when cmtp_attach_device fails" + "CVE-2022-26966": { + "cmt_msg": "sr9700: sanity check for packet length" }, - "CVE-2023-1670": { - "cmt_msg": "xirc2ps_cs: Fix use after free bug in xirc2ps_detach" + "CVE-2021-42739": { + "cmt_msg": "media: firewire: firedtv-avc: fix a buffer overflow in avc_ca_pmt()" }, - "CVE-2023-6915": { - "cmt_msg": "ida: Fix crash in ida_free when the bitmap is empty" + "CVE-2023-1989": { + "cmt_msg": "Bluetooth: btsdio: fix use after free bug in btsdio_remove due to unfinished work" }, - "CVE-2022-20148": { - "cmt_msg": "f2fs: fix UAF in f2fs_available_free_memory" + "CVE-2024-26806": { + "cmt_msg": "spi: cadence-qspi: remove system-wide suspend helper calls from runtime PM hooks" }, - "CVE-2018-9422": { - "cmt_msg": "futex: Remove requirement for lock_page() in get_futex_key()" + "CVE-2024-26801": { + "cmt_msg": "Bluetooth: Avoid potential use-after-free in hci_error_reset" }, - "CVE-2013-7445": { - "cmt_msg": "" + "CVE-2024-26802": { + "cmt_msg": "stmmac: Clear variable when destroying workqueue" }, - "CVE-2021-0941": { - "cmt_msg": "bpf: Remove MTU check in __bpf_skb_max_len" + "CVE-2023-52508": { + "cmt_msg": "nvme-fc: Prevent null pointer dereference in nvme_fc_io_getuuid()" }, - "CVE-2023-34255": { - "cmt_msg": "xfs: verify buffer contents when we skip log replay" + "CVE-2023-52606": { + "cmt_msg": "powerpc/lib: Validate size for vector operations" }, - "CVE-2022-38096": { - "cmt_msg": "" + "CVE-2022-20369": { + "cmt_msg": "media: v4l2-mem2mem: Apply DST_QUEUE_OFF_BASE on MMAP buffers across ioctls" }, - "CVE-2021-34693": { - "cmt_msg": "can: bcm: fix infoleak in struct bcm_msg_head" + "CVE-2023-52604": { + "cmt_msg": "FS:JFS:UBSAN:array-index-out-of-bounds in dbAdjTree" }, - "CVE-2020-14381": { - "cmt_msg": "futex: Fix inode life-time issue" + "CVE-2023-52602": { + "cmt_msg": "jfs: fix slab-out-of-bounds Read in dtSearch" }, - "CVE-2014-3180": { - "cmt_msg": "compat: nanosleep: Clarify error handling" + "CVE-2023-52603": { + "cmt_msg": "UBSAN: array-index-out-of-bounds in dtSplitRoot" }, - "CVE-2019-19768": { - "cmt_msg": "blktrace: Protect q->blk_trace with RCU" + "CVE-2022-25265": { + "cmt_msg": "" }, - "CVE-2022-3303": { - "cmt_msg": "ALSA: pcm: oss: Fix race at SNDCTL_DSP_SYNC" + "CVE-2022-20368": { + "cmt_msg": "net/packet: fix slab-out-of-bounds access in packet_recvmsg()" }, - "CVE-2017-8797": { - "cmt_msg": "nfsd: fix undefined behavior in nfsd4_layout_verify" + "CVE-2023-52609": { + "cmt_msg": "binder: fix race between mmput() and do_exit()" }, - "CVE-2022-20141": { - "cmt_msg": "igmp: Add ip_mc_list lock in ip_check_mc_rcu" + "CVE-2022-21499": { + "cmt_msg": "lockdown: also lock down previous kgdb use" }, - "CVE-2023-23455": { - "cmt_msg": "net: sched: atm: dont intepret cls results when asked to drop" + "CVE-2023-4208": { + "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free" }, - "CVE-2023-23454": { - "cmt_msg": "net: sched: cbq: dont intepret cls results when asked to drop" + "CVE-2023-4206": { + "cmt_msg": "net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free" }, - "CVE-2017-15116": { - "cmt_msg": "crypto: rng - Remove old low-level rng interface" + "CVE-2023-4207": { + "cmt_msg": "net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free" }, - "CVE-2018-3620": { - "cmt_msg": "x86/microcode: Allow late microcode loading with SMT disabled" + "CVE-2023-3640": { + "cmt_msg": "" }, - "CVE-2023-6932": { - "cmt_msg": "ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet" + "CVE-2023-20593": { + "cmt_msg": "x86/cpu/amd: Add a Zenbleed fix" }, - "CVE-2020-16166": { - "cmt_msg": "random32: update the net random state on interrupt and activity" + "CVE-2023-3022": { + "cmt_msg": "ipv6: Use result arg in fib_lookup_arg consistently" }, - "CVE-2021-29155": { - "cmt_msg": "bpf: Use correct permission flag for mixed signed bounds arithmetic" + "CVE-2022-2663": { + "cmt_msg": "netfilter: nf_conntrack_irc: Fix forged IP logic" }, - "CVE-2019-15916": { - "cmt_msg": "net-sysfs: Fix mem leak in netdev_register_kobject" + "CVE-2022-43750": { + "cmt_msg": "usb: mon: make mmapped memory read only" }, - "CVE-2019-15917": { - "cmt_msg": "Bluetooth: hci_ldisc: Postpone HCI_UART_PROTO_READY bit set in hci_uart_set_proto()" + "CVE-2023-0047": { + "cmt_msg": "mm, oom: do not trigger out_of_memory from the #PF" }, - "CVE-2013-4129": { - "cmt_msg": "bridge: fix some kernel warning in multicast timer" + "CVE-2021-47046": { + "cmt_msg": "drm/amd/display: Fix off by one in hdmi_14_process_transaction()" }, - "CVE-2024-26598": { - "cmt_msg": "KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache" + "CVE-2023-4010": { + "cmt_msg": "" }, - "CVE-2020-12362": { - "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" + "CVE-2021-47167": { + "cmt_msg": "NFS: Fix an Oopsable condition in __nfs_pageio_add_request()" }, - "CVE-2020-12363": { - "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" + "CVE-2021-47165": { + "cmt_msg": "drm/meson: fix shutdown crash when component not probed" }, - "CVE-2019-12881": { - "cmt_msg": "drm/i915/userptr: reject zero user_size" + "CVE-2022-20422": { + "cmt_msg": "arm64: fix oops in concurrently setting insn_emulation sysctls" }, - "CVE-2022-4129": { - "cmt_msg": "l2tp: Serialize access to sk_user_data with sk_callback_lock" + "CVE-2021-46969": { + "cmt_msg": "bus: mhi: core: Fix invalid error returning in mhi_queue" }, - "CVE-2020-12364": { - "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" + "CVE-2021-47160": { + "cmt_msg": "net: dsa: mt7530: fix VLAN traffic leaks" }, - "CVE-2018-18690": { - "cmt_msg": "xfs: don't fail when converting shortform attr to long form during ATTR_REPLACE" + "CVE-2023-4385": { + "cmt_msg": "fs: jfs: fix possible NULL pointer dereference in dbFree()" }, - "CVE-2021-3896": { - "cmt_msg": "isdn: cpai: check ctr->cnr to avoid array index out of bound" + "CVE-2021-46965": { + "cmt_msg": "mtd: physmap: physmap-bt1-rom: Fix unintentional stack access" }, - "CVE-2016-7917": { - "cmt_msg": "netfilter: nfnetlink: correctly validate length of batch messages" + "CVE-2023-4387": { + "cmt_msg": "net: vmxnet3: fix possible use-after-free bugs in vmxnet3_rq_alloc_rx_buf()" }, - "CVE-2019-16232": { - "cmt_msg": "libertas: fix a potential NULL pointer dereference" + "CVE-2021-46962": { + "cmt_msg": "mmc: uniphier-sd: Fix a resource leak in the remove function" }, - "CVE-2019-20811": { - "cmt_msg": "net-sysfs: call dev_hold if kobject_init_and_add success" + "CVE-2019-19378": { + "cmt_msg": "" }, - "CVE-2019-20812": { - "cmt_msg": "af_packet: set defaule value for tmo" + "CVE-2022-1016": { + "cmt_msg": "netfilter: nf_tables: initialize registers in nft_do_chain()" }, - "CVE-2020-14314": { - "cmt_msg": "ext4: fix potential negative array index in do_split()" + "CVE-2022-36879": { + "cmt_msg": "xfrm: xfrm_policy: fix a possible double xfrm_pols_put() in xfrm_bundle_lookup()" }, - "CVE-2018-25020": { - "cmt_msg": "bpf: fix truncated jump targets on heavy expansions" + "CVE-2022-45934": { + "cmt_msg": "Bluetooth: L2CAP: Fix u8 overflow" }, - "CVE-2022-26373": { - "cmt_msg": "x86/speculation: Add RSB VM Exit protections" + "CVE-2019-19377": { + "cmt_msg": "btrfs: Don't submit any btree write bio if the fs has errors" }, - "CVE-2018-5995": { - "cmt_msg": "printk: hash addresses printed with %p" + "CVE-2022-2380": { + "cmt_msg": "video: fbdev: sm712fb: Fix crash in smtcfb_read()" }, - "CVE-2019-18660": { - "cmt_msg": "powerpc/book3s64: Fix link stack flush on context switch" + "CVE-2021-4197": { + "cmt_msg": "cgroup: Use open-time credentials for process migraton perm checks" }, - "CVE-2019-15291": { - "cmt_msg": "media: b2c2-flexcop-usb: add sanity checking" + "CVE-2020-24503": { + "cmt_msg": "" }, - "CVE-2019-15290": { + "CVE-2020-24502": { "cmt_msg": "" }, - "CVE-2023-3212": { - "cmt_msg": "gfs2: Don't deref jdesc in evict" + "CVE-2019-19449": { + "cmt_msg": "f2fs: fix to do sanity check on segment/section count" }, - "CVE-2024-23848": { + "CVE-2023-1118": { + "cmt_msg": "media: rc: Fix use-after-free bugs caused by ene_tx_irqsim()" + }, + "CVE-2020-11725": { "cmt_msg": "" }, - "CVE-2018-7273": { - "cmt_msg": "printk: hash addresses printed with %p" + "CVE-2023-7192": { + "cmt_msg": "netfilter: ctnetlink: fix possible refcount leak in ctnetlink_create_conntrack()" }, - "CVE-2023-4459": { - "cmt_msg": "net: vmxnet3: fix possible NULL pointer dereference in vmxnet3_rq_cleanup()" + "CVE-2022-1263": { + "cmt_msg": "KVM: avoid NULL pointer dereference in kvm_dirty_ring_push" }, - "CVE-2022-23036": { - "cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()" + "CVE-2021-35477": { + "cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4" }, - "CVE-2022-20566": { - "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free caused by l2cap_chan_put" + "CVE-2023-31436": { + "cmt_msg": "net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg" }, - "CVE-2018-12930": { - "cmt_msg": "" + "CVE-2022-47929": { + "cmt_msg": "net: sched: disallow noqueue for qdisc classes" }, - "CVE-2018-12931": { + "CVE-2022-3606": { "cmt_msg": "" }, - "CVE-2024-23196": { + "CVE-2022-2209": { "cmt_msg": "" }, - "CVE-2020-12769": { - "cmt_msg": "spi: spi-dw: Add lock protect dw_spi rx/tx to prevent concurrent calls" + "CVE-2024-26775": { + "cmt_msg": "aoe: avoid potential deadlock at set_capacity" }, - "CVE-2019-15292": { - "cmt_msg": "appletalk: Fix use-after-free in atalk_proc_exit" + "CVE-2023-7042": { + "cmt_msg": "wifi: ath10k: fix NULL pointer dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev()" }, - "CVE-2021-32399": { - "cmt_msg": "bluetooth: eliminate the potential race condition when removing the HCI controller" + "CVE-2022-3594": { + "cmt_msg": "r8152: Rate limit overflow messages" }, - "CVE-2019-12381": { - "cmt_msg": "ip_sockglue: Fix missing-check bug in ip_ra_control()" + "CVE-2022-3595": { + "cmt_msg": "cifs: fix double-fault crash during ntlmssp" }, - "CVE-2019-12382": { - "cmt_msg": "drm/edid: Fix a missing-check bug in drm_load_edid_firmware()" + "CVE-2023-52559": { + "cmt_msg": "iommu/vt-d: Avoid memory allocation in iommu_suspend()" }, - "CVE-2017-10810": { - "cmt_msg": "drm/virtio: don't leak bo on drm_gem_object_init failure" + "CVE-2023-47233": { + "cmt_msg": "wifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach" }, - "CVE-2022-24958": { - "cmt_msg": "usb: gadget: don't release an existing dev->buf" + "CVE-2024-23851": { + "cmt_msg": "dm: limit the number of targets and parameter size area" }, - "CVE-2022-20166": { - "cmt_msg": "drivers core: Use sysfs_emit and sysfs_emit_at for show(device *...) functions" + "CVE-2024-26614": { + "cmt_msg": "tcp: make sure init the accept_queue's spinlocks once" }, - "CVE-2020-10766": { - "cmt_msg": "x86/speculation: Prevent rogue cross-process SSBD shutdown" + "CVE-2023-52629": { + "cmt_msg": "sh: push-switch: Reorder cleanup operations to avoid use-after-free bug" }, - "CVE-2017-13166": { - "cmt_msg": "media: v4l2-ioctl.c: use check_fmt for enum/g/s/try_fmt" + "CVE-2022-1462": { + "cmt_msg": "tty: use new tty_insert_flip_string_and_push_buffer() in pty_write()" }, - "CVE-2018-12207": { - "cmt_msg": "kvm: x86, powerpc: do not allow clearing largepages debugfs entry" + "CVE-2024-26758": { + "cmt_msg": "md: Don't ignore suspended array in md_check_recovery()" }, - "CVE-2022-20369": { - "cmt_msg": "media: v4l2-mem2mem: Apply DST_QUEUE_OFF_BASE on MMAP buffers across ioctls" + "CVE-2024-26759": { + "cmt_msg": "mm/swap: fix race when skipping swapcache" }, - "CVE-2020-10768": { - "cmt_msg": "x86/speculation: PR_SPEC_FORCE_DISABLE enforcement for indirect branches." + "CVE-2023-6606": { + "cmt_msg": "smb: client: fix OOB in smbCalcSize()" }, - "CVE-2017-13168": { - "cmt_msg": "scsi: sg: mitigate read/write abuse" + "CVE-2023-3006": { + "cmt_msg": "arm64: Add AMPERE1 to the Spectre-BHB affected list" }, - "CVE-2024-25740": { - "cmt_msg": "" + "CVE-2022-1729": { + "cmt_msg": "perf: Fix sys_perf_event_open() race against self" }, - "CVE-2022-2978": { - "cmt_msg": "fs: fix UAF/GPF bug in nilfs_mdt_destroy" + "CVE-2024-26752": { + "cmt_msg": "l2tp: pass correct message length to ip6_append_data" }, - "CVE-2019-17075": { - "cmt_msg": "RDMA/cxgb4: Do not dma memory off of the stack" + "CVE-2024-26756": { + "cmt_msg": "md: Don't register sync_thread for reshape directly" }, - "CVE-2022-3903": { - "cmt_msg": "media: mceusb: Use new usb_control_msg_*() routines" + "CVE-2019-20908": { + "cmt_msg": "efi: Restrict efivar_ssdt_load when the kernel is locked down" }, - "CVE-2019-19447": { - "cmt_msg": "ext4: work around deleting a file with i_nlink == 0 safely" + "CVE-2023-3776": { + "cmt_msg": "net/sched: cls_fw: Fix improper refcount update leads to use-after-free" }, - "CVE-2023-20588": { - "cmt_msg": "x86/CPU/AMD: Do not leak quotient data after a division by 0" + "CVE-2023-52434": { + "cmt_msg": "smb: client: fix potential OOBs in smb2_parse_contexts()" }, - "CVE-2020-10942": { - "cmt_msg": "vhost: Check docket sk_family instead of call getname" + "CVE-2023-52436": { + "cmt_msg": "f2fs: explicitly null-terminate the xattr list" }, - "CVE-2018-3693": { - "cmt_msg": "ext4: fix spectre gadget in ext4_mb_regular_allocator()" + "CVE-2022-2964": { + "cmt_msg": "net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup" }, - "CVE-2019-1999": { - "cmt_msg": "binder: fix race between munmap() and direct reclaim" + "CVE-2024-26689": { + "cmt_msg": "ceph: prevent use-after-free in encode_cap_msg()" }, - "CVE-2019-11190": { - "cmt_msg": "binfmt_elf: switch to new creds when switching to new mm" + "CVE-2022-2961": { + "cmt_msg": "" }, - "CVE-2019-11191": { - "cmt_msg": "x86: Deprecate a.out support" + "CVE-2021-3506": { + "cmt_msg": "f2fs: fix to avoid out-of-bounds memory access" }, - "CVE-2016-5195": { - "cmt_msg": "mm: remove gup_flags FOLL_WRITE games from __get_user_pages()" + "CVE-2020-0435": { + "cmt_msg": "f2fs: fix to do sanity check with i_extra_isize" }, - "CVE-2018-10323": { - "cmt_msg": "xfs: set format back to extents if xfs_bmap_extents_to_btree" + "CVE-2024-26686": { + "cmt_msg": "fs/proc: do_task_stat: use sig->stats_lock to gather the threads/children stats" }, - "CVE-2018-10322": { - "cmt_msg": "xfs: enhance dinode verifier" + "CVE-2024-26687": { + "cmt_msg": "xen/events: close evtchn after mapping cleanup" }, - "CVE-2013-1956": { - "cmt_msg": "userns: Don't allow creation if the user is chrooted" + "CVE-2023-51779": { + "cmt_msg": "Bluetooth: af_bluetooth: Fix Use-After-Free in bt_sock_recvmsg" }, - "CVE-2016-9644": { - "cmt_msg": "x86/mm: Expand the exception table logic to allow new handling options" + "CVE-2019-3874": { + "cmt_msg": "sctp: implement memory accounting on tx path" }, - "CVE-2020-26139": { - "cmt_msg": "mac80211: do not accept/forward invalid EAPOL frames" + "CVE-2023-6915": { + "cmt_msg": "ida: Fix crash in ida_free when the bitmap is empty" }, - "CVE-2023-3640": { + "CVE-2010-4563": { "cmt_msg": "" }, - "CVE-2019-10220": { - "cmt_msg": "Convert filldir[64]() from __put_user() to unsafe_put_user()" + "CVE-2023-1249": { + "cmt_msg": "coredump: Use the vma snapshot in fill_files_note" }, - "CVE-2021-3609": { - "cmt_msg": "can: bcm: delay release of struct bcm_op after synchronize_rcu()" + "CVE-2023-2162": { + "cmt_msg": "scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress" }, - "CVE-2017-13305": { - "cmt_msg": "KEYS: encrypted: fix buffer overread in valid_master_desc()" + "CVE-2023-45871": { + "cmt_msg": "igb: set max size RX buffer when store bad packet is enabled" }, - "CVE-2019-19537": { - "cmt_msg": "USB: core: Fix races in character device registration and deregistraion" + "CVE-2023-0266": { + "cmt_msg": "ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF" }, - "CVE-2019-19532": { - "cmt_msg": "HID: Fix assumption that devices have inputs" + "CVE-2023-1838": { + "cmt_msg": "Fix double fget() in vhost_net_set_backend()" }, - "CVE-2019-19533": { - "cmt_msg": "media: ttusb-dec: Fix info-leak in ttusb_dec_send_command()" + "CVE-2023-6040": { + "cmt_msg": "netfilter: nf_tables: Reject tables of unsupported family" }, - "CVE-2019-10638": { - "cmt_msg": "inet: switch IP ID generator to siphash" + "CVE-2021-38300": { + "cmt_msg": "bpf, mips: Validate conditional branch offsets" }, - "CVE-2019-10639": { - "cmt_msg": "netns: provide pure entropy for net_hash_mix()" + "CVE-2022-24448": { + "cmt_msg": "NFSv4: Handle case where the lookup of a directory fails" }, - "CVE-2022-33981": { - "cmt_msg": "floppy: disable FDRAWCMD by default" + "CVE-2023-52498": { + "cmt_msg": "PM: sleep: Fix possible deadlocks in core system-wide PM code" }, - "CVE-2021-0929": { - "cmt_msg": "staging/android/ion: delete dma_buf->kmap/unmap implemenation" + "CVE-2021-4023": { + "cmt_msg": "io-wq: fix cancellation on create-worker failure" }, - "CVE-2018-14616": { - "cmt_msg": "f2fs: fix to do sanity check with block address in main area v2" + "CVE-2023-52640": { + "cmt_msg": "fs/ntfs3: Fix oob in ntfs_listxattr" }, - "CVE-2018-19985": { - "cmt_msg": "USB: hso: Fix OOB memory access in hso_probe/hso_get_config_data" + "CVE-2023-52641": { + "cmt_msg": "fs/ntfs3: Add NULL ptr dereference checking at the end of attr_allocate_frame()" }, - "CVE-2018-6554": { - "cmt_msg": "staging: irda: remove the irda network stack and drivers" + "CVE-2021-0399": { + "cmt_msg": "" }, - "CVE-2018-6555": { - "cmt_msg": "staging: irda: remove the irda network stack and drivers" + "CVE-2023-52488": { + "cmt_msg": "serial: sc16is7xx: convert from _raw_ to _noinc_ regmap functions for FIFO" }, - "CVE-2023-6546": { - "cmt_msg": "tty: n_gsm: fix the UAF caused by race condition in gsm_cleanup_mux" + "CVE-2020-36691": { + "cmt_msg": "netlink: limit recursion depth in policy validation" }, - "CVE-2017-18255": { - "cmt_msg": "perf/core: Fix the perf_cpu_time_max_percent check" + "CVE-2021-47070": { + "cmt_msg": "uio_hv_generic: Fix another memory leak in error handling paths" }, - "CVE-2022-0168": { - "cmt_msg": "cifs: fix NULL ptr dereference in smb2_ioctl_query_info()" + "CVE-2023-42755": { + "cmt_msg": "net/sched: Retire rsvp classifier" }, - "CVE-2024-26587": { - "cmt_msg": "net: netdevsim: don't try to destroy PHC on VFs" + "CVE-2023-3161": { + "cmt_msg": "fbcon: Check font dimension limits" }, - "CVE-2019-9213": { - "cmt_msg": "mm: enforce min addr even if capable() in expand_downwards()" + "CVE-2023-52486": { + "cmt_msg": "drm: Don't unref the same fb many times by mistake due to deadlock handling" }, - "CVE-2023-2007": { - "cmt_msg": "scsi: dpt_i2o: Remove obsolete driver" + "CVE-2023-52480": { + "cmt_msg": "ksmbd: fix race condition between session lookup and expire" }, - "CVE-2019-14896": { - "cmt_msg": "libertas: Fix two buffer overflows at parsing bss descriptor" + "CVE-2012-4542": { + "cmt_msg": "" }, - "CVE-2019-14897": { - "cmt_msg": "libertas: Fix two buffer overflows at parsing bss descriptor" + "CVE-2023-52482": { + "cmt_msg": "x86/srso: Add SRSO mitigation for Hygon processors" }, - "CVE-2019-14895": { - "cmt_msg": "mwifiex: fix possible heap overflow in mwifiex_process_country_ie()" + "CVE-2023-42752": { + "cmt_msg": "igmp: limit igmpv3_newpack() packet size to IP_MAX_MTU" }, - "CVE-2018-3665": { - "cmt_msg": "x86, fpu: decouple non-lazy/eager fpu restore from xsave" + "CVE-2023-4128": { + "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free" }, - "CVE-2022-3586": { - "cmt_msg": "sch_sfb: Don't assume the skb is still around after enqueueing to child" + "CVE-2022-44033": { + "cmt_msg": "char: pcmcia: remove all the drivers" }, - "CVE-2024-26592": { - "cmt_msg": "ksmbd: fix UAF issue in ksmbd_tcp_new_connection()" + "CVE-2022-1974": { + "cmt_msg": "nfc: replace improper check device_is_registered() in netlink related functions" }, - "CVE-2019-2181": { - "cmt_msg": "binder: check for overflow when alloc for security context" + "CVE-2022-1975": { + "cmt_msg": "NFC: netlink: fix sleep in atomic bug when firmware download timeout" }, - "CVE-2020-27820": { - "cmt_msg": "drm/nouveau: use drm_dev_unplug() during device removal" + "CVE-2022-44032": { + "cmt_msg": "char: pcmcia: remove all the drivers" }, - "CVE-2020-26141": { - "cmt_msg": "ath10k: Fix TKIP Michael MIC verification for PCIe" + "CVE-2020-36775": { + "cmt_msg": "f2fs: fix to avoid potential deadlock" }, - "CVE-2023-39197": { - "cmt_msg": "netfilter: conntrack: dccp: copy entire header to stack buffer, not just basic one" + "CVE-2021-47128": { + "cmt_msg": "bpf, lockdown, audit: Fix buggy SELinux lockdown permission checks" }, - "CVE-2020-0066": { - "cmt_msg": "netlink: Trim skb to alloc size to avoid MSG_TRUNC" + "CVE-2021-20292": { + "cmt_msg": "drm/ttm/nouveau: don't call tt destroy callback on alloc failure." }, - "CVE-2020-26558": { - "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical" + "CVE-2017-8065": { + "cmt_msg": "crypto: ccm - move cbcmac input off the stack" }, - "CVE-2023-39193": { - "cmt_msg": "netfilter: xt_sctp: validate the flag_info count" + "CVE-2022-32981": { + "cmt_msg": "powerpc/32: Fix overread/overwrite of thread_struct via ptrace" }, - "CVE-2023-39192": { - "cmt_msg": "netfilter: xt_u32: validate user space input" + "CVE-2022-3424": { + "cmt_msg": "misc: sgi-gru: fix use-after-free error in gru_set_context_option, gru_fault and gru_handle_user_call_os" }, - "CVE-2020-26541": { - "cmt_msg": "certs: Add EFI_CERT_X509_GUID support for dbx entries" + "CVE-2021-47124": { + "cmt_msg": "io_uring: fix link timeout refs" }, - "CVE-2023-6610": { - "cmt_msg": "smb: client: fix potential OOB in smb2_dump_detail()" + "CVE-2023-2269": { + "cmt_msg": "dm ioctl: fix nested locking in table_clear() to remove deadlock concern" }, - "CVE-2020-26559": { - "cmt_msg": "" + "CVE-2023-0394": { + "cmt_msg": "ipv6: raw: Deduct extension header length in rawv6_push_pending_frames" }, - "CVE-2021-20317": { - "cmt_msg": "lib/timerqueue: Rely on rbtree semantics for next timer" + "CVE-2022-36402": { + "cmt_msg": "drm/vmwgfx: Fix shader stage validation" }, - "CVE-2021-43389": { - "cmt_msg": "isdn: cpai: check ctr->cnr to avoid array index out of bound" + "CVE-2022-25258": { + "cmt_msg": "USB: gadget: validate interface OS descriptor requests" }, - "CVE-2023-3111": { - "cmt_msg": "btrfs: unset reloc control if transaction commit fails in prepare_to_relocate()" + "CVE-2020-27777": { + "cmt_msg": "powerpc/rtas: Restrict RTAS requests from userspace" }, - "CVE-2021-33061": { - "cmt_msg": "ixgbe: add improvement for MDD response functionality" + "CVE-2021-4150": { + "cmt_msg": "block: fix incorrect references to disk objects" }, - "CVE-2023-1476": { + "CVE-2021-4159": { + "cmt_msg": "bpf: Verifer, adjust_scalar_min_max_vals to always call update_reg_bounds()" + }, + "CVE-2021-29155": { + "cmt_msg": "bpf: Use correct permission flag for mixed signed bounds arithmetic" + }, + "CVE-2021-3714": { "cmt_msg": "" }, - "CVE-2023-4010": { + "CVE-2019-16230": { + "cmt_msg": "drm/amdkfd: fix a potential NULL pointer dereference (v2)" + }, + "CVE-2019-16231": { + "cmt_msg": "fjes: Handle workqueue allocation failure" + }, + "CVE-2017-12168": { + "cmt_msg": "arm64: KVM: pmu: Fix AArch32 cycle counter access" + }, + "CVE-2021-3892": { "cmt_msg": "" }, - "CVE-2023-1074": { - "cmt_msg": "sctp: fail if no bound addresses can be used for a given scope" + "CVE-2021-39633": { + "cmt_msg": "ip_gre: add validation for csum_start" }, - "CVE-2017-18552": { - "cmt_msg": "RDS: validate the requested traces user input against max supported" + "CVE-2021-39636": { + "cmt_msg": "netfilter: x_tables: fix pointer leaks to userspace" }, - "CVE-2015-8839": { - "cmt_msg": "ext4: fix races between page faults and hole punching" + "CVE-2022-24958": { + "cmt_msg": "usb: gadget: don't release an existing dev->buf" }, - "CVE-2022-1652": { - "cmt_msg": "floppy: use a statically allocated error counter" + "CVE-2022-25375": { + "cmt_msg": "usb: gadget: rndis: check size of RNDIS_MSG_SET command" }, - "CVE-2020-29568": { - "cmt_msg": "xen/xenbus: Allow watches discard events before queueing" + "CVE-2022-33742": { + "cmt_msg": "xen/blkfront: force data bouncing when backend is untrusted" }, - "CVE-2019-9457": { - "cmt_msg": "exec: Limit arg stack to at most 75% of _STK_LIM" + "CVE-2022-33741": { + "cmt_msg": "xen/netfront: force data bouncing when backend is untrusted" }, - "CVE-2019-19054": { - "cmt_msg": "media: rc: prevent memory leak in cx23888_ir_probe" + "CVE-2018-20509": { + "cmt_msg": "binder: refactor binder ref inc/dec for thread safety" }, - "CVE-2023-51043": { - "cmt_msg": "drm/atomic: Fix potential use-after-free in nonblocking commits" + "CVE-2024-24864": { + "cmt_msg": "" }, - "CVE-2015-3290": { - "cmt_msg": "x86/nmi/64: Switch stacks on userspace NMI entry" + "CVE-2022-33744": { + "cmt_msg": "xen/arm: Fix race in RB-tree based P2M accounting" }, - "CVE-2016-10741": { - "cmt_msg": "xfs: don't BUG() on mixed direct and mapped I/O" + "CVE-2023-52596": { + "cmt_msg": "sysctl: Fix out of bounds access for empty sysctl registers" }, - "CVE-2023-20569": { - "cmt_msg": "x86/bugs: Increase the x86 bugs vector size to two u32s" + "CVE-2023-52597": { + "cmt_msg": "KVM: s390: fix setting of fpc register" }, - "CVE-2019-3846": { - "cmt_msg": "mwifiex: Fix possible buffer overflows at parsing bss descriptor" + "CVE-2023-52594": { + "cmt_msg": "wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus()" }, - "CVE-2023-46838": { - "cmt_msg": "xen-netback: don't produce zero-size SKB frags" + "CVE-2023-52595": { + "cmt_msg": "wifi: rt2x00: restart beacon queue when hardware reset" }, - "CVE-2020-0427": { - "cmt_msg": "pinctrl: devicetree: Avoid taking direct reference to device name string" + "CVE-2023-52593": { + "cmt_msg": "wifi: wfx: fix possible NULL pointer dereference in wfx_set_mfp_ap()" }, - "CVE-2019-9458": { - "cmt_msg": "media: v4l: event: Prevent freeing event subscriptions while accessed" + "CVE-2021-47158": { + "cmt_msg": "net: dsa: sja1105: add error handling in sja1105_setup()" }, - "CVE-2023-40283": { - "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb" + "CVE-2023-52591": { + "cmt_msg": "reiserfs: Avoid touching renamed directory if parent does not change" }, - "CVE-2023-6270": { - "cmt_msg": "" + "CVE-2023-52444": { + "cmt_msg": "f2fs: fix to avoid dirent corruption" }, - "CVE-2019-13272": { - "cmt_msg": "ptrace: Fix ->ptracer_cred handling for PTRACE_TRACEME" + "CVE-2020-12888": { + "cmt_msg": "vfio-pci: Invalidate mmaps and block MMIO access on disabled memory" }, - "CVE-2023-3772": { - "cmt_msg": "xfrm: add NULL check in xfrm_update_ae_params" + "CVE-2021-47150": { + "cmt_msg": "net: fec: fix the potential memory leak in fec_enet_init()" }, - "CVE-2023-45862": { - "cmt_msg": "USB: ene_usb6250: Allocate enough memory for full object" + "CVE-2021-47151": { + "cmt_msg": "interconnect: qcom: bcm-voter: add a missing of_node_put()" }, - "CVE-2023-45863": { - "cmt_msg": "kobject: Fix slab-out-of-bounds in fill_kobj_path()" + "CVE-2024-26627": { + "cmt_msg": "scsi: core: Move scsi_host_busy() out of host lock for waking up EH handler" }, - "CVE-2017-15537": { - "cmt_msg": "x86/fpu: Don't let userspace set bogus xcomp_bv" + "CVE-2022-41218": { + "cmt_msg": "media: dvb-core: Fix UAF due to refcount races at releasing" }, - "CVE-2019-17351": { - "cmt_msg": "xen: let alloc_xenballooned_pages() fail if not enough memory free" + "CVE-2022-36946": { + "cmt_msg": "netfilter: nf_queue: do not allow packet truncation below transport header offset" }, "CVE-2022-23222": { "cmt_msg": "bpf: Replace PTR_TO_XXX_OR_NULL with PTR_TO_XXX | PTR_MAYBE_NULL" }, - "CVE-2020-25669": { - "cmt_msg": "Input: sunkbd - avoid use-after-free in teardown paths" + "CVE-2022-21166": { + "cmt_msg": "x86/speculation/mmio: Enable CPU Fill buffer clearing on idle" }, - "CVE-2020-25668": { - "cmt_msg": "tty: make FONTX ioctl use the tty pointer they were actually passed" + "CVE-2024-26622": { + "cmt_msg": "tomoyo: fix UAF write bug in tomoyo_write_control()" }, - "CVE-2008-4609": { + "CVE-2024-26623": { + "cmt_msg": "pds_core: Prevent race issues involving the adminq" + }, + "CVE-2022-41849": { + "cmt_msg": "fbdev: smscufx: Fix use-after-free in ufx_ops_open()" + }, + "CVE-2022-41848": { "cmt_msg": "" }, - "CVE-2023-52458": { - "cmt_msg": "block: add check that partition length needs to be aligned with block size" + "CVE-2022-1353": { + "cmt_msg": "af_key: add __GFP_ZERO flag for compose_sadb_supported in function pfkey_register" }, - "CVE-2018-19824": { - "cmt_msg": "ALSA: usb-audio: Fix UAF decrement if card has no live interfaces in card.c" + "CVE-2022-28356": { + "cmt_msg": "llc: fix netdevice reference leaks in llc_ui_bind()" }, - "CVE-2018-20854": { - "cmt_msg": "phy: ocelot-serdes: fix out-of-bounds read" + "CVE-2022-1198": { + "cmt_msg": "drivers: hamradio: 6pack: fix UAF bug caused by mod_timer()" }, - "CVE-2017-15121": { - "cmt_msg": "mm: teach truncate_inode_pages_range() to handle non page aligned ranges" + "CVE-2022-1199": { + "cmt_msg": "ax25: Fix NULL pointer dereference in ax25_kill_by_device" }, - "CVE-2023-26607": { - "cmt_msg": "ntfs: fix out-of-bounds read in ntfs_attr_find()" + "CVE-2023-6546": { + "cmt_msg": "tty: n_gsm: fix the UAF caused by race condition in gsm_cleanup_mux" }, - "CVE-2023-52456": { - "cmt_msg": "serial: imx: fix tx statemachine deadlock" + "CVE-2021-39801": { + "cmt_msg": "" }, - "CVE-2019-15239": { + "CVE-2021-39800": { "cmt_msg": "" }, - "CVE-2021-4037": { - "cmt_msg": "xfs: fix up non-directory creation in SGID directories" + "CVE-2022-20166": { + "cmt_msg": "drivers core: Use sysfs_emit and sysfs_emit_at for show(device *...) functions" }, - "CVE-2021-22543": { - "cmt_msg": "KVM: do not allow mapping valid but non-reference-counted pages" + "CVE-2024-22099": { + "cmt_msg": "Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security" + }, + "CVE-2022-45885": { + "cmt_msg": "" }, "CVE-2022-45884": { "cmt_msg": "" }, - "CVE-2012-5375": { - "cmt_msg": "Btrfs: fix hash overflow handling" + "CVE-2022-45887": { + "cmt_msg": "media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb()" }, - "CVE-2012-5374": { - "cmt_msg": "Btrfs: fix hash overflow handling" + "CVE-2022-45886": { + "cmt_msg": "media: dvb-core: Fix use-after-free due on race condition at dvb_net" }, - "CVE-2023-20941": { - "cmt_msg": "" + "CVE-2023-52509": { + "cmt_msg": "ravb: Fix use-after-free issue in ravb_tx_timeout_work()" }, - "CVE-2018-1066": { - "cmt_msg": "CIFS: Enable encryption during session setup phase" + "CVE-2023-46343": { + "cmt_msg": "nfc: nci: fix possible NULL pointer dereference in send_acknowledge()" }, - "CVE-2018-20836": { - "cmt_msg": "scsi: libsas: fix a race condition when smp task timeout" + "CVE-2024-25744": { + "cmt_msg": "x86/coco: Disable 32-bit emulation by default on TDX and SEV" }, - "CVE-2020-10135": { - "cmt_msg": "Bluetooth: Consolidate encryption handling in hci_encrypt_cfm" + "CVE-2023-5178": { + "cmt_msg": "nvmet-tcp: Fix a possible UAF in queue intialization setup" }, - "CVE-2019-7308": { - "cmt_msg": "bpf: fix sanitation of alu op with pointer / scalar type from different paths" + "CVE-2023-52507": { + "cmt_msg": "nfc: nci: assert requested protocol is valid" }, - "CVE-2021-45868": { - "cmt_msg": "quota: check block number when reading the block in quota file" + "CVE-2023-2124": { + "cmt_msg": "xfs: verify buffer contents when we skip log replay" }, - "CVE-2022-1966": { - "cmt_msg": "netfilter: nf_tables: disallow non-stateful expression in sets earlier" + "CVE-2023-52501": { + "cmt_msg": "ring-buffer: Do not attempt to read past \"commit\"" }, - "CVE-2017-9986": { - "cmt_msg": "sound: Retire OSS" + "CVE-2023-52500": { + "cmt_msg": "scsi: pm80xx: Avoid leaking tags when processing OPC_INB_SET_CONTROLLER_CONFIG command" }, - "CVE-2017-9985": { - "cmt_msg": "ALSA: msnd: Optimize / harden DSP and MIDI loops" + "CVE-2023-52502": { + "cmt_msg": "net: nfc: fix races in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn()" }, - "CVE-2017-9984": { - "cmt_msg": "ALSA: msnd: Optimize / harden DSP and MIDI loops" + "CVE-2021-44879": { + "cmt_msg": "f2fs: fix to do sanity check on inode type during garbage collection" }, - "CVE-2022-3533": { + "CVE-2023-2513": { + "cmt_msg": "ext4: fix use-after-free in ext4_xattr_set_entry" + }, + "CVE-2022-27672": { + "cmt_msg": "x86/speculation: Identify processors vulnerable to SMT RSB predictions" + }, + "CVE-2024-26668": { + "cmt_msg": "netfilter: nft_limit: reject configurations that cause integer overflow" + }, + "CVE-2015-2877": { "cmt_msg": "" }, - "CVE-2022-3534": { - "cmt_msg": "libbpf: Fix use-after-free in btf_dump_name_dups" + "CVE-2024-26664": { + "cmt_msg": "hwmon: (coretemp) Fix out-of-bounds memory access" }, - "CVE-2021-20261": { - "cmt_msg": "floppy: fix lock_fdc() signal handling" + "CVE-2021-38198": { + "cmt_msg": "KVM: X86: MMU: Use the correct inherited permissions to get shadow page" }, - "CVE-2023-28328": { - "cmt_msg": "media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer()" + "CVE-2022-1679": { + "cmt_msg": "ath9k: fix use-after-free in ath9k_hif_usb_rx_cb" }, - "CVE-2023-0386": { - "cmt_msg": "ovl: fail on invalid uid/gid mapping at copy up" + "CVE-2023-34256": { + "cmt_msg": "ext4: avoid a potential slab-out-of-bounds in ext4_group_desc_csum" }, - "CVE-2017-13693": { - "cmt_msg": "" + "CVE-2023-1513": { + "cmt_msg": "kvm: initialize all of the kvm_debugregs structure before sending it to userspace" }, - "CVE-2017-13695": { - "cmt_msg": "ACPICA: acpi: acpica: fix acpi operand cache leak in nseval.c" + "CVE-2021-26401": { + "cmt_msg": "x86/speculation: Use generic retpoline by default on AMD" }, - "CVE-2017-13694": { + "CVE-2024-1312": { + "cmt_msg": "mm: lock_vma_under_rcu() must check vma->anon_vma under vma lock" + }, + "CVE-2021-3847": { "cmt_msg": "" }, - "CVE-2022-36879": { - "cmt_msg": "xfrm: xfrm_policy: fix a possible double xfrm_pols_put() in xfrm_bundle_lookup()" + "CVE-2023-52442": { + "cmt_msg": "ksmbd: validate session id and tree id in compound request" }, - "CVE-2021-4149": { - "cmt_msg": "btrfs: unlock newly allocated extent buffer after error" + "CVE-2022-40768": { + "cmt_msg": "scsi: stex: Properly zero out the passthrough command structure" }, - "CVE-2022-21385": { - "cmt_msg": "net/rds: fix warn in rds_message_alloc_sgs" + "CVE-2022-1280": { + "cmt_msg": "drm: avoid circular locks in drm_mode_getconnector" }, - "CVE-2022-42895": { - "cmt_msg": "Bluetooth: L2CAP: Fix attempting to access uninitialized memory" + "CVE-2023-52445": { + "cmt_msg": "media: pvrusb2: fix use after free on context disconnection" }, - "CVE-2021-3640": { - "cmt_msg": "Bluetooth: sco: Fix lock_sock() blockage by memcpy_from_msg()" + "CVE-2011-4917": { + "cmt_msg": "" }, - "CVE-2013-3225": { - "cmt_msg": "Bluetooth: RFCOMM - Fix missing msg_namelen update in rfcomm_sock_recvmsg()" + "CVE-2011-4916": { + "cmt_msg": "" }, - "CVE-2020-1749": { - "cmt_msg": "net: ipv6_stub: use ip6_dst_lookup_flow instead of ip6_dst_lookup" + "CVE-2023-52449": { + "cmt_msg": "mtd: Fix gluebi NULL pointer dereference caused by ftl notifier" }, - "CVE-2013-3227": { - "cmt_msg": "caif: Fix missing msg_namelen update in caif_seqpkt_recvmsg()" + "CVE-2023-23039": { + "cmt_msg": "" }, - "CVE-2022-1786": { - "cmt_msg": "io_uring: remove io_identity" + "CVE-2024-26719": { + "cmt_msg": "nouveau: offload fence uevents work to workqueue" }, - "CVE-2022-36123": { - "cmt_msg": "x86: Clear .brk area at early boot" + "CVE-2023-31083": { + "cmt_msg": "Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO" }, - "CVE-2013-3228": { - "cmt_msg": "irda: Fix missing msg_namelen update in irda_recvmsg_dgram()" + "CVE-2019-5489": { + "cmt_msg": "Change mincore() to count \"mapped\" pages rather than \"cached\" pages" }, - "CVE-2013-3229": { - "cmt_msg": "iucv: Fix missing msg_namelen update in iucv_sock_recvmsg()" + "CVE-2021-47082": { + "cmt_msg": "tun: avoid double free in tun_free_netdev" }, - "CVE-2020-28097": { - "cmt_msg": "vgacon: remove software scrollback support" + "CVE-2024-26713": { + "cmt_msg": "powerpc/pseries/iommu: Fix iommu initialisation during DLPAR add" }, - "CVE-2024-24859": { - "cmt_msg": "" + "CVE-2023-3338": { + "cmt_msg": "Remove DECnet support from kernel" }, - "CVE-2017-1000112": { - "cmt_msg": "udp: consistently apply ufo or fragmentation" + "CVE-2017-16648": { + "cmt_msg": "dvb_frontend: don't use-after-free the frontend struct" + } + } + }, + "4.7": { + "4.7": { + "CVE-2016-6162": { + "cmt_msg": "udp: prevent bugcheck if filter truncates packet too much", + "cmt_id": "a612769774a30e4fc143c4cb6395c12573415660" }, - "CVE-2024-24855": { - "cmt_msg": "scsi: lpfc: Fix a possible data race in lpfc_unregister_fcf_rescan()" + "CVE-2016-5400": { + "cmt_msg": "media: fix airspy usb probe error path", + "cmt_id": "aa93d1fee85c890a34f2510a310e55ee76a27848" }, - "CVE-2018-5848": { - "cmt_msg": "wil6210: missing length check in wmi_set_ie" + "CVE-2016-5696": { + "cmt_msg": "tcp: make challenge acks less predictable", + "cmt_id": "75ff39ccc1bd5d3c455b6822ab09e533c551f758" + } + }, + "4.7.1": { + "CVE-2016-6516": { + "cmt_msg": "vfs: ioctl: prevent double-fetch in dedupe ioctl", + "cmt_id": "37fe52815ecb74f6aa1efd398ba0704f83c70550" }, - "CVE-2021-29265": { - "cmt_msg": "usbip: fix stub_dev usbip_sockfd_store() races leading to gpf" + "CVE-2016-7910": { + "cmt_msg": "block: fix use-after-free in seq file", + "cmt_id": "aa56f0bd5d67d2eb0e59d6bc20578f83858ff43f" }, - "CVE-2013-2140": { - "cmt_msg": "xen/blkback: Check device permissions before allowing OP_DISCARD" + "CVE-2016-3857": { + "cmt_msg": "arm: oabi compat: add missing access checks", + "cmt_id": "65413c151b68bae1ffa261b215c23441eefcfb10" + } + }, + "4.7.2": { + "CVE-2016-5412": { + "cmt_msg": "KVM: PPC: Book3S HV: Pull out TM state save/restore into separate procedures", + "cmt_id": "6e01651e3546f4d092825a9f23a9296a00caedda" }, - "CVE-2021-39648": { - "cmt_msg": "usb: gadget: configfs: Fix use-after-free issue with udc_name" + "CVE-2016-6136": { + "cmt_msg": "audit: fix a double fetch in audit_log_single_execve_arg()", + "cmt_id": "a9b4eac04f56b1a11a859c1eddb52b71b3125a17" + } + }, + "4.7.3": { + "CVE-2016-6480": { + "cmt_msg": "aacraid: Check size values after double-fetch from user", + "cmt_id": "37e0f46b779f3081fc4719956eb44cacbb5a294f" + } + }, + "4.7.4": { + "CVE-2016-10318": { + "cmt_msg": "fscrypto: add authorization check for setting encryption policy", + "cmt_id": "edff68f618646ccd75b5ff5694cf63bc2b78a009" + } + }, + "4.7.5": { + "CVE-2016-9178": { + "cmt_msg": "fix minor infoleak in get_user_ex()", + "cmt_id": "7642cc2430ba942c773f3faef8f913bcbd363311" }, - "CVE-2022-3545": { - "cmt_msg": "nfp: fix use-after-free in area_cache_get()" + "CVE-2016-6828": { + "cmt_msg": "tcp: fix use after free in tcp_xmit_retransmit_queue()", + "cmt_id": "7f93c3130e755e2875bc68f9e01878599333433f" }, - "CVE-2020-14416": { - "cmt_msg": "can, slip: Protect tty->disc_data in write_wakeup and close with RCU" + "CVE-2016-8658": { + "cmt_msg": "brcmfmac: avoid potential stack overflow in brcmf_cfg80211_start_ap()", + "cmt_id": "ecd4c39ec742f764bf9c7c025cc478868af4df34" + } + }, + "4.7.7": { + "CVE-2017-15102": { + "cmt_msg": "usb: misc: legousbtower: Fix NULL pointer deference", + "cmt_id": "03f8e90de1365975ea21fee41b0c16f558c466a8" }, - "CVE-2019-0136": { - "cmt_msg": "mac80211: drop robust management frames from unknown TA" + "CVE-2016-10044": { + "cmt_msg": "aio: mark AIO pseudo-fs noexec", + "cmt_id": "f4a75a57f324e29d0d7b927ef5c1bcbebfb1b7d1" + } + }, + "4.7.9": { + "CVE-2016-5195": { + "cmt_msg": "mm: remove gup_flags FOLL_WRITE games from __get_user_pages()", + "cmt_id": "30712aff8011b67be3e7e31ea079cfc9d3effef4" + } + }, + "4.7.10": { + "CVE-2016-7425": { + "cmt_msg": "scsi: arcmsr: Buffer overflow in arcmsr_iop_message_xfer()", + "cmt_id": "6e3655655623c52a8a55cec01be8cf6681ee54a3" + } + }, + "outstanding": { + "CVE-2019-15098": { + "cmt_msg": "ath6kl: fix a NULL-ptr-deref bug in ath6kl_usb_alloc_urb_from_pipe()" }, - "CVE-2019-16921": { - "cmt_msg": "RDMA/hns: Fix init resp when alloc ucontext" + "CVE-2017-17712": { + "cmt_msg": "net: ipv4: fix for a race condition in raw_sendmsg" }, - "CVE-2021-21781": { - "cmt_msg": "ARM: ensure the signal page contains defined contents" + "CVE-2022-0001": { + "cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE" }, - "CVE-2021-0512": { - "cmt_msg": "HID: make arrays usage and value to be the same" + "CVE-2022-0002": { + "cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE" }, - "CVE-2018-14634": { - "cmt_msg": "exec: Limit arg stack to at most 75% of _STK_LIM" + "CVE-2019-19965": { + "cmt_msg": "scsi: libsas: stop discovering if oob mode is disconnected" }, - "CVE-2018-14633": { - "cmt_msg": "scsi: target: iscsi: Use hex2bin instead of a re-implementation" + "CVE-2019-19966": { + "cmt_msg": "media: cpia2: Fix use-after-free in cpia2_exit" }, - "CVE-2018-12896": { - "cmt_msg": "posix-timers: Sanitize overrun handling" + "CVE-2023-52615": { + "cmt_msg": "hwrng: core - Fix page fault dead lock on mmap-ed hwrng" }, - "CVE-2018-14734": { - "cmt_msg": "infiniband: fix a possible use-after-free bug" + "CVE-2023-52614": { + "cmt_msg": "PM / devfreq: Fix buffer overflow in trans_stat_show" }, - "CVE-2015-8950": { - "cmt_msg": "arm64: dma-mapping: always clear allocated buffers" + "CVE-2023-52617": { + "cmt_msg": "PCI: switchtec: Fix stdev_release() crash after surprise hot remove" }, - "CVE-2015-1805": { - "cmt_msg": "new helper: copy_page_from_iter()" + "CVE-2020-24587": { + "cmt_msg": "mac80211: prevent mixed key and fragment cache attacks" }, - "CVE-2022-41222": { - "cmt_msg": "mm/mremap: hold the rmap lock in write mode when moving page table entries." + "CVE-2020-24586": { + "cmt_msg": "mac80211: prevent mixed key and fragment cache attacks" }, - "CVE-2022-40982": { - "cmt_msg": "x86/speculation: Add Gather Data Sampling mitigation" + "CVE-2021-0129": { + "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical" }, - "CVE-2016-9754": { - "cmt_msg": "ring-buffer: Prevent overflow of size in ring_buffer_resize()" + "CVE-2020-24588": { + "cmt_msg": "cfg80211: mitigate A-MSDU aggregation attacks" }, - "CVE-2019-18680": { - "cmt_msg": "" + "CVE-2023-52619": { + "cmt_msg": "pstore/ram: Fix crash when setting number of cpus to an odd number" }, - "CVE-2022-20565": { - "cmt_msg": "HID: core: Correctly handle ReportSize being zero" + "CVE-2023-52618": { + "cmt_msg": "block/rnbd-srv: Check for unlikely string overflow" }, - "CVE-2019-18806": { - "cmt_msg": "net: qlogic: Fix memory leak in ql_alloc_large_buffers" + "CVE-2023-5717": { + "cmt_msg": "perf: Disallow mis-matched inherited group reads" }, - "CVE-2021-33656": { - "cmt_msg": "vt: drop old FONT ioctls" + "CVE-2018-10940": { + "cmt_msg": "cdrom: information leak in cdrom_ioctl_media_changed()" }, - "CVE-2021-33655": { - "cmt_msg": "fbcon: Disallow setting font bigger than screen size" + "CVE-2019-9506": { + "cmt_msg": "Bluetooth: Fix faulty expression for minimum encryption key size check" }, - "CVE-2022-41858": { - "cmt_msg": "drivers: net: slip: fix NPD bug in sl_tx_timeout()" + "CVE-2019-9500": { + "cmt_msg": "brcmfmac: assure SSID length from firmware is limited" }, - "CVE-2023-1206": { - "cmt_msg": "tcp: Reduce chance of collisions in inet6_hashfn()." + "CVE-2019-9503": { + "cmt_msg": "brcmfmac: add subtype check for event handling in data path" }, - "CVE-2022-41850": { - "cmt_msg": "HID: roccat: Fix use-after-free in roccat_read()" + "CVE-2022-0480": { + "cmt_msg": "memcg: enable accounting for file lock caches" }, - "CVE-2023-2985": { - "cmt_msg": "fs: hfsplus: fix UAF issue in hfsplus_put_super" + "CVE-2018-10124": { + "cmt_msg": "kernel/signal.c: avoid undefined behaviour in kill_something_info" }, - "CVE-2020-14390": { - "cmt_msg": "fbcon: remove soft scrollback code" + "CVE-2022-0487": { + "cmt_msg": "moxart: fix potential use-after-free on remove path" }, - "CVE-2020-24502": { + "CVE-2022-23825": { "cmt_msg": "" }, - "CVE-2017-10663": { - "cmt_msg": "f2fs: sanity check checkpoint segno and blkoff" + "CVE-2021-47112": { + "cmt_msg": "x86/kvm: Teardown PV features on boot CPU as well" }, - "CVE-2017-10662": { - "cmt_msg": "f2fs: sanity check segment count" + "CVE-2021-47113": { + "cmt_msg": "btrfs: abort in rename_exchange if we fail to insert the second ref" }, - "CVE-2022-1184": { - "cmt_msg": "ext4: verify dir block before splitting it" + "CVE-2021-47110": { + "cmt_msg": "x86/kvm: Disable kvmclock on all CPUs on shutdown" }, - "CVE-2022-3642": { - "cmt_msg": "" + "CVE-2021-47116": { + "cmt_msg": "ext4: fix memory leak in ext4_mb_init_backend on error path." }, - "CVE-2019-19527": { - "cmt_msg": "HID: hiddev: do cleanup in failure of opening a device" + "CVE-2021-47117": { + "cmt_msg": "ext4: fix bug on in ext4_es_cache_extent as ext4_split_extent_at failed" }, - "CVE-2024-0584": { - "cmt_msg": "ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet" + "CVE-2021-47114": { + "cmt_msg": "ocfs2: fix data corruption by fallocate" }, - "CVE-2020-0465": { - "cmt_msg": "HID: core: Sanitize event code and type when mapping input" + "CVE-2021-47118": { + "cmt_msg": "pid: take a reference when initializing `cad_pid`" }, - "CVE-2020-0305": { - "cmt_msg": "chardev: Avoid potential use-after-free in 'chrdev_open()'" + "CVE-2021-46970": { + "cmt_msg": "bus: mhi: pci_generic: Remove WQ_MEM_RECLAIM flag from state workqueue" }, - "CVE-2018-3639": { - "cmt_msg": "x86/nospec: Simplify alternative_msr_write()" + "CVE-2019-10207": { + "cmt_msg": "Bluetooth: hci_uart: check for missing tty operations" }, - "CVE-2022-1195": { - "cmt_msg": "hamradio: improve the incomplete fix to avoid NPD" + "CVE-2023-0459": { + "cmt_msg": "uaccess: Add speculation barrier to copy_from_user()" }, - "CVE-2021-4218": { - "cmt_msg": "sysctl: pass kernel pointers to ->proc_handler" + "CVE-2023-0458": { + "cmt_msg": "prlimit: do_prlimit needs to have a speculation check" }, - "CVE-2023-22995": { - "cmt_msg": "usb: dwc3: dwc3-qcom: Add missing platform_device_put() in dwc3_qcom_acpi_register_core" + "CVE-2017-8924": { + "cmt_msg": "USB: serial: io_ti: fix information leak in completion handler" }, - "CVE-2019-15902": { - "cmt_msg": "" + "CVE-2017-8925": { + "cmt_msg": "USB: serial: omninet: fix reference leaks at open" }, - "CVE-2024-25739": { - "cmt_msg": "" + "CVE-2021-30002": { + "cmt_msg": "media: v4l: ioctl: Fix memory leak in video_usercopy" }, - "CVE-2024-0340": { - "cmt_msg": "vhost: use kzalloc() instead of kmalloc() followed by memset()" + "CVE-2021-0941": { + "cmt_msg": "bpf: Remove MTU check in __bpf_skb_max_len" }, - "CVE-2021-3753": { - "cmt_msg": "vt_kdsetmode: extend console locking" + "CVE-2017-7294": { + "cmt_msg": "drm/vmwgfx: fix integer overflow in vmw_surface_define_ioctl()" }, - "CVE-2023-6536": { + "CVE-2020-15802": { "cmt_msg": "" }, - "CVE-2019-11135": { - "cmt_msg": "x86/msr: Add the IA32_TSX_CTRL MSR" + "CVE-2022-3636": { + "cmt_msg": "net: ethernet: mtk_eth_soc: use after free in __mtk_ppe_check_skb()" }, - "CVE-2019-11810": { - "cmt_msg": "scsi: megaraid_sas: return error when create DMA pool failed" + "CVE-2022-3635": { + "cmt_msg": "atm: idt77252: fix use-after-free bugs caused by tst_timer" }, - "CVE-2021-27365": { - "cmt_msg": "scsi: iscsi: Ensure sysfs attributes are limited to PAGE_SIZE" + "CVE-2021-28715": { + "cmt_msg": "xen/netback: don't queue unlimited number of packages" }, - "CVE-2021-27364": { - "cmt_msg": "scsi: iscsi: Restrict sessions and handles to admin capabilities" + "CVE-2022-34918": { + "cmt_msg": "netfilter: nf_tables: stricter validation of element data" }, - "CVE-2017-14991": { - "cmt_msg": "scsi: sg: fixup infoleak when using SG_GET_REQUEST_TABLE" + "CVE-2016-10905": { + "cmt_msg": "GFS2: don't set rgrp gl_object until it's inserted into rgrp tree" }, - "CVE-2020-0431": { - "cmt_msg": "HID: hid-input: clear unmapped usages" + "CVE-2021-47028": { + "cmt_msg": "mt76: mt7915: fix txrate reporting" }, - "CVE-2018-17977": { - "cmt_msg": "" + "CVE-2017-18261": { + "cmt_msg": "clocksource/drivers/arm_arch_timer: Avoid infinite recursion when ftrace is enabled" }, - "CVE-2016-4997": { - "cmt_msg": "netfilter: x_tables: check for bogus target offset" + "CVE-2018-5814": { + "cmt_msg": "usbip: usbip_host: fix NULL-ptr deref and use-after-free errors" }, - "CVE-2018-17972": { - "cmt_msg": "proc: restrict kernel stack dumps to root" + "CVE-2021-43389": { + "cmt_msg": "isdn: cpai: check ctr->cnr to avoid array index out of bound" }, - "CVE-2021-20321": { - "cmt_msg": "ovl: fix missing negative dentry check in ovl_rename()" + "CVE-2023-1074": { + "cmt_msg": "sctp: fail if no bound addresses can be used for a given scope" }, - "CVE-2016-4998": { - "cmt_msg": "netfilter: x_tables: check for bogus target offset" + "CVE-2023-1077": { + "cmt_msg": "sched/rt: pick_next_rt_entity(): check list_entry" }, - "CVE-2022-42896": { - "cmt_msg": "Bluetooth: L2CAP: Fix accepting connection request for invalid SPSM" + "CVE-2023-40283": { + "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb" }, - "CVE-2017-5967": { - "cmt_msg": "time: Remove CONFIG_TIMER_STATS" + "CVE-2023-1073": { + "cmt_msg": "HID: check empty report_list in hid_validate_values()" }, - "CVE-2021-0937": { - "cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write" + "CVE-2018-13093": { + "cmt_msg": "xfs: validate cached inodes are free when allocated" }, - "CVE-2022-3169": { - "cmt_msg": "nvme: ensure subsystem reset is single threaded" + "CVE-2018-13096": { + "cmt_msg": "f2fs: fix to do sanity check with node footer and iblocks" }, - "CVE-2022-4744": { - "cmt_msg": "tun: avoid double free in tun_free_netdev" + "CVE-2018-13097": { + "cmt_msg": "f2fs: fix to do sanity check with user_block_count" }, - "CVE-2022-36280": { - "cmt_msg": "drm/vmwgfx: Validate the box size for the snooped cursor" + "CVE-2018-13094": { + "cmt_msg": "xfs: don't call xfs_da_shrink_inode with NULL bp" }, - "CVE-2019-2054": { - "cmt_msg": "arm/ptrace: run seccomp after ptrace" + "CVE-2018-13095": { + "cmt_msg": "xfs: More robust inode extent count validation" }, - "CVE-2018-20976": { - "cmt_msg": "xfs: clear sb->s_fs_info on mount failure" + "CVE-2018-13098": { + "cmt_msg": "f2fs: fix to do sanity check with extra_attr feature" }, - "CVE-2016-10147": { - "cmt_msg": "crypto: mcryptd - Check mcryptd algorithm compatibility" + "CVE-2018-13099": { + "cmt_msg": "f2fs: fix to do sanity check with reserved blkaddr of inline inode" }, - "CVE-2024-21803": { - "cmt_msg": "" + "CVE-2019-11884": { + "cmt_msg": "Bluetooth: hidp: fix buffer overflow" }, - "CVE-2018-16276": { - "cmt_msg": "USB: yurex: fix out-of-bounds uaccess in read handler" + "CVE-2019-18683": { + "cmt_msg": "media: vivid: Fix wrong locking that causes race conditions on streaming stop" }, - "CVE-2023-2176": { - "cmt_msg": "RDMA/core: Refactor rdma_bind_addr" + "CVE-2019-18680": { + "cmt_msg": "unknown" }, - "CVE-2021-3542": { - "cmt_msg": "" + "CVE-2021-45868": { + "cmt_msg": "quota: check block number when reading the block in quota file" }, - "CVE-2019-16413": { - "cmt_msg": "9p: use inode->i_lock to protect i_size_write() under 32-bit" + "CVE-2022-20158": { + "cmt_msg": "net/packet: fix slab-out-of-bounds access in packet_recvmsg()" }, - "CVE-2013-1819": { - "cmt_msg": "xfs: fix _xfs_buf_find oops on blocks beyond the filesystem end" + "CVE-2020-0404": { + "cmt_msg": "media: uvcvideo: Avoid cyclic entity chains due to malformed USB descriptors" }, - "CVE-2024-22099": { - "cmt_msg": "" + "CVE-2022-39188": { + "cmt_msg": "mmu_gather: Force tlb-flush VM_PFNMAP vmas" }, - "CVE-2023-30456": { - "cmt_msg": "KVM: nVMX: add missing consistency checks for CR0 and CR4" + "CVE-2020-27067": { + "cmt_msg": "l2tp: fix l2tp_eth module loading" }, - "CVE-2020-12652": { - "cmt_msg": "scsi: mptfusion: Fix double fetch bug in ioctl" + "CVE-2020-27066": { + "cmt_msg": "xfrm: policy: Fix doulbe free in xfrm_policy_timer" }, - "CVE-2020-12653": { - "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_cmd_append_vsie_tlv()" + "CVE-2017-5986": { + "cmt_msg": "sctp: avoid BUG_ON on sctp_wait_for_sndbuf" + }, + "CVE-2024-23307": { + "cmt_msg": "md/raid5: fix atomicity violation in raid5_cache_count" + }, + "CVE-2017-0861": { + "cmt_msg": "ALSA: pcm: prevent UAF in snd_pcm_info" + }, + "CVE-2020-15393": { + "cmt_msg": "usb: usbtest: fix missing kfree(dev->buf) in usbtest_disconnect" + }, + "CVE-2021-3564": { + "cmt_msg": "Bluetooth: fix the erroneous flush_work() order" + }, + "CVE-2017-13080": { + "cmt_msg": "mac80211: accept key reinstall without changing anything" + }, + "CVE-2018-12127": { + "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" + }, + "CVE-2018-12126": { + "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" + }, + "CVE-2021-28964": { + "cmt_msg": "btrfs: fix race when cloning extent buffer during rewind of an old root" + }, + "CVE-2019-13631": { + "cmt_msg": "Input: gtco - bounds check collection indent level" + }, + "CVE-2018-12233": { + "cmt_msg": "jfs: Fix inconsistency between memory allocation and ea_buf->max_size" }, - "CVE-2019-7222": { - "cmt_msg": "KVM: x86: work around leak of uninitialized stack contents (CVE-2019-7222)" + "CVE-2018-9465": { + "cmt_msg": "binder: fix proc->files use-after-free" }, - "CVE-2022-23040": { - "cmt_msg": "xen/xenbus: don't let xenbus_grant_ring() remove grants in error case" + "CVE-2020-8649": { + "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region" }, - "CVE-2020-12654": { - "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_ret_wmm_get_status()" + "CVE-2020-8648": { + "cmt_msg": "vt: selection, close sel_buffer race" }, - "CVE-2020-12655": { - "cmt_msg": "xfs: add agf freeblocks verify in xfs_agf_verify" + "CVE-2020-8647": { + "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region" }, - "CVE-2018-12929": { - "cmt_msg": "" + "CVE-2019-0155": { + "cmt_msg": "drm/i915: Rename gen7 cmdparser tables" }, - "CVE-2018-12928": { - "cmt_msg": "" + "CVE-2019-0154": { + "cmt_msg": "drm/i915: Lower RM timeout to avoid DSI hard hangs" }, - "CVE-2020-36310": { - "cmt_msg": "KVM: SVM: avoid infinite loop on NPF from bad address" + "CVE-2023-35827": { + "cmt_msg": "ravb: Fix use-after-free issue in ravb_tx_timeout_work()" }, - "CVE-2020-36313": { - "cmt_msg": "KVM: Fix out of range accesses to memslots" + "CVE-2023-52585": { + "cmt_msg": "drm/amdgpu: Fix possible NULL dereference in amdgpu_ras_query_error_status_helper()" }, - "CVE-2020-35519": { - "cmt_msg": "net/x25: prevent a couple of overflows" + "CVE-2023-52584": { + "cmt_msg": "spmi: mediatek: Fix UAF on device remove" }, - "CVE-2022-33740": { - "cmt_msg": "xen/netfront: fix leaking data in shared pages" + "CVE-2023-52587": { + "cmt_msg": "IB/ipoib: Fix mcast list locking" }, - "CVE-2022-48619": { - "cmt_msg": "Input: add bounds checking to input_set_capability()" + "CVE-2023-52586": { + "cmt_msg": "drm/msm/dpu: Add mutex lock in control vblank irq" }, - "CVE-2012-6712": { - "cmt_msg": "iwlwifi: Sanity check for sta_id" + "CVE-2023-52583": { + "cmt_msg": "ceph: fix deadlock or deadcode of misusing dget()" }, - "CVE-2022-0400": { - "cmt_msg": "" + "CVE-2023-52589": { + "cmt_msg": "media: rkisp1: Fix IRQ disable race issue" }, - "CVE-2024-25741": { - "cmt_msg": "" + "CVE-2023-52588": { + "cmt_msg": "f2fs: fix to tag gcing flag on page during block migration" }, - "CVE-2021-38160": { - "cmt_msg": "virtio_console: Assure used length from device is limited" + "CVE-2023-52340": { + "cmt_msg": "ipv6: remove max_size check inline with ipv4" }, - "CVE-2021-42739": { - "cmt_msg": "media: firewire: firedtv-avc: fix a buffer overflow in avc_ca_pmt()" + "CVE-2021-46969": { + "cmt_msg": "bus: mhi: core: Fix invalid error returning in mhi_queue" }, - "CVE-2023-1989": { - "cmt_msg": "Bluetooth: btsdio: fix use after free bug in btsdio_remove due to unfinished work" + "CVE-2020-16120": { + "cmt_msg": "ovl: switch to mounter creds in readdir" }, - "CVE-2022-3111": { - "cmt_msg": "power: supply: wm8350-power: Add missing free in free_charger_irq" + "CVE-2019-17666": { + "cmt_msg": "rtlwifi: Fix potential overflow on P2P code" }, - "CVE-2018-5344": { - "cmt_msg": "loop: fix concurrent lo_open/lo_release" + "CVE-2018-15471": { + "cmt_msg": "xen-netback: fix input validation in xenvif_set_hash_mapping()" }, - "CVE-2020-12770": { - "cmt_msg": "scsi: sg: add sg_remove_request in sg_write" + "CVE-2021-34693": { + "cmt_msg": "can: bcm: fix infoleak in struct bcm_msg_head" }, - "CVE-2019-15222": { - "cmt_msg": "ALSA: usb-audio: Fix gpf in snd_usb_pipe_sanity_check" + "CVE-2020-11494": { + "cmt_msg": "slcan: Don't transmit uninitialized stack data in padding" }, - "CVE-2022-25265": { - "cmt_msg": "" + "CVE-2024-26797": { + "cmt_msg": "drm/amd/display: Prevent potential buffer overflow in map_hw_resources" }, - "CVE-2022-20368": { - "cmt_msg": "net/packet: fix slab-out-of-bounds access in packet_recvmsg()" + "CVE-2024-26791": { + "cmt_msg": "btrfs: dev-replace: properly validate device names" }, - "CVE-2020-11608": { - "cmt_msg": "media: ov519: add missing endpoint sanity checks" + "CVE-2024-26793": { + "cmt_msg": "gtp: fix use-after-free and null-ptr-deref in gtp_newlink()" }, - "CVE-2020-25285": { - "cmt_msg": "mm/hugetlb: fix a race between hugetlb sysctl handlers" + "CVE-2022-30594": { + "cmt_msg": "ptrace: Check PTRACE_O_SUSPEND_SECCOMP permission on PTRACE_SEIZE" }, - "CVE-2020-10732": { - "cmt_msg": "fs/binfmt_elf.c: allocate initialized memory in fill_thread_core_info()" + "CVE-2024-26798": { + "cmt_msg": "fbcon: always restore the old font data in fbcon_do_set_font()" }, - "CVE-2020-10773": { - "cmt_msg": "s390/cmm: fix information leak in cmm_timeout_handler()" + "CVE-2021-38204": { + "cmt_msg": "usb: max-3421: Prevent corruption of freed memory" }, - "CVE-2022-21499": { - "cmt_msg": "lockdown: also lock down previous kgdb use" + "CVE-2021-38205": { + "cmt_msg": "net: xilinx_emaclite: Do not print real IOMEM pointer" }, - "CVE-2020-25284": { - "cmt_msg": "rbd: require global CAP_SYS_ADMIN for mapping and unmapping" + "CVE-2020-0255": { + "cmt_msg": "selinux: properly handle multiple messages in selinux_netlink_send()" }, - "CVE-2015-3332": { - "cmt_msg": "tcp: Fix crash in TCP Fast Open" + "CVE-2023-35001": { + "cmt_msg": "netfilter: nf_tables: prevent OOB access in nft_byteorder_eval" }, - "CVE-2015-3339": { - "cmt_msg": "fs: take i_mutex during prepare_binprm for set[ug]id executables" + "CVE-2021-38208": { + "cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect" }, - "CVE-2018-18281": { - "cmt_msg": "mremap: properly flush TLB before releasing the page" + "CVE-2017-18232": { + "cmt_msg": "scsi: libsas: direct call probe and destruct" }, - "CVE-2023-20593": { - "cmt_msg": "x86/cpu/amd: Add a Zenbleed fix" + "CVE-2022-0168": { + "cmt_msg": "cifs: fix NULL ptr dereference in smb2_ioctl_query_info()" }, - "CVE-2022-2663": { - "cmt_msg": "netfilter: nf_conntrack_irc: Fix forged IP logic" + "CVE-2020-26556": { + "cmt_msg": "" }, - "CVE-2022-43750": { - "cmt_msg": "usb: mon: make mmapped memory read only" + "CVE-2018-9518": { + "cmt_msg": "NFC: llcp: Limit size of SDP URI" }, - "CVE-2023-0047": { - "cmt_msg": "mm, oom: do not trigger out_of_memory from the #PF" + "CVE-2024-26778": { + "cmt_msg": "fbdev: savage: Error out if pixclock equals zero" }, - "CVE-2019-15219": { - "cmt_msg": "USB: sisusbvga: fix oops in error path of sisusb_probe" + "CVE-2020-26555": { + "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical" }, - "CVE-2022-20424": { - "cmt_msg": "io_uring: remove io_identity" + "CVE-2024-26776": { + "cmt_msg": "spi: hisi-sfc-v3xx: Return IRQ_NONE if no interrupts were detected" }, - "CVE-2023-4385": { - "cmt_msg": "fs: jfs: fix possible NULL pointer dereference in dbFree()" + "CVE-2024-26777": { + "cmt_msg": "fbdev: sis: Error out if pixclock equals zero" }, - "CVE-2020-4788": { - "cmt_msg": "powerpc/64s: flush L1D on kernel entry" + "CVE-2020-26558": { + "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical" }, - "CVE-2013-7348": { - "cmt_msg": "aio: prevent double free in ioctx_alloc" + "CVE-2023-3390": { + "cmt_msg": "netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE" }, - "CVE-2022-1011": { - "cmt_msg": "fuse: fix pipe buffer lifetime for direct_io" + "CVE-2023-3397": { + "cmt_msg": "" }, - "CVE-2021-39698": { - "cmt_msg": "wait: add wake_up_pollfree()" + "CVE-2024-26773": { + "cmt_msg": "ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found()" }, - "CVE-2022-45934": { - "cmt_msg": "Bluetooth: L2CAP: Fix u8 overflow" + "CVE-2024-26770": { + "cmt_msg": "HID: nvidia-shield: Add missing null pointer checks to LED initialization" }, - "CVE-2019-19377": { - "cmt_msg": "btrfs: Don't submit any btree write bio if the fs has errors" + "CVE-2024-26771": { + "cmt_msg": "dmaengine: ti: edma: Add some null pointer checks to the edma_probe" }, - "CVE-2022-2380": { - "cmt_msg": "video: fbdev: sm712fb: Fix crash in smtcfb_read()" + "CVE-2023-28746": { + "cmt_msg": "x86/mmio: Disable KVM mitigation when X86_FEATURE_CLEAR_CPU_BUF is set" }, - "CVE-2022-0850": { - "cmt_msg": "ext4: fix kernel infoleak via ext4_extent_header" + "CVE-2017-5754": { + "cmt_msg": "x86/cpufeatures: Add Intel feature bits for Speculation Control" }, - "CVE-2020-10767": { - "cmt_msg": "x86/speculation: Avoid force-disabling IBPB based on STIBP and enhanced IBRS." + "CVE-2021-47119": { + "cmt_msg": "ext4: fix memory leak in ext4_fill_super" }, - "CVE-2019-19528": { - "cmt_msg": "USB: iowarrior: fix use-after-free on disconnect" + "CVE-2016-10200": { + "cmt_msg": "l2tp: fix racy SOCK_ZAPPED flag check in l2tp_ip{,6}_bind()" }, - "CVE-2021-3612": { - "cmt_msg": "Input: joydev - prevent potential read overflow in ioctl" + "CVE-2017-5753": { + "cmt_msg": "x86/cpufeatures: Add X86_BUG_SPECTRE_V[12]" }, - "CVE-2020-24503": { - "cmt_msg": "" + "CVE-2024-1086": { + "cmt_msg": "netfilter: nf_tables: reject QUEUE/DROP verdict parameters" }, - "CVE-2019-19524": { - "cmt_msg": "Input: ff-memless - kill timer in destroy()" + "CVE-2016-10208": { + "cmt_msg": "ext4: validate s_first_meta_bg at mount time" }, - "CVE-2019-19448": { - "cmt_msg": "btrfs: only search for left_info if there is no right_info in try_merge_free_space" + "CVE-2022-0382": { + "cmt_msg": "net ticp:fix a kernel-infoleak in __tipc_sendmsg()" }, - "CVE-2019-19449": { - "cmt_msg": "f2fs: fix to do sanity check on segment/section count" + "CVE-2023-32233": { + "cmt_msg": "netfilter: nf_tables: deactivate anonymous set from preparation phase" }, - "CVE-2019-19523": { - "cmt_msg": "USB: adutux: fix use-after-free on disconnect" + "CVE-2019-15222": { + "cmt_msg": "ALSA: usb-audio: Fix gpf in snd_usb_pipe_sanity_check" }, - "CVE-2013-2206": { - "cmt_msg": "sctp: Use correct sideffect command in duplicate cookie handling" + "CVE-2019-15223": { + "cmt_msg": "ALSA: line6: Assure canceling delayed work at disconnection" }, - "CVE-2019-3892": { - "cmt_msg": "coredump: fix race condition between mmget_not_zero()/get_task_mm() and core dumping" + "CVE-2019-15220": { + "cmt_msg": "p54usb: Fix race between disconnect and firmware loading" }, - "CVE-2017-18249": { - "cmt_msg": "f2fs: fix race condition in between free nid allocator/initializer" + "CVE-2019-15221": { + "cmt_msg": "ALSA: line6: Fix write on zero-sized buffer" }, - "CVE-2022-1263": { - "cmt_msg": "KVM: avoid NULL pointer dereference in kvm_dirty_ring_push" + "CVE-2022-1016": { + "cmt_msg": "netfilter: nf_tables: initialize registers in nft_do_chain()" }, - "CVE-2021-35477": { - "cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4" + "CVE-2022-1011": { + "cmt_msg": "fuse: fix pipe buffer lifetime for direct_io" }, - "CVE-2017-18241": { - "cmt_msg": "f2fs: fix a panic caused by NULL flush_cmd_control" + "CVE-2022-1012": { + "cmt_msg": "secure_seq: use the 64 bits of the siphash for port offset calculation" }, - "CVE-2023-31082": { - "cmt_msg": "" + "CVE-2023-52620": { + "cmt_msg": "netfilter: nf_tables: disallow timeout for anonymous sets" }, - "CVE-2019-16746": { - "cmt_msg": "nl80211: validate beacon head" + "CVE-2023-52621": { + "cmt_msg": "bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers" }, - "CVE-2022-3606": { - "cmt_msg": "" + "CVE-2023-52622": { + "cmt_msg": "ext4: avoid online resizing failures due to oversized flex bg" }, - "CVE-2022-2209": { - "cmt_msg": "" + "CVE-2023-52623": { + "cmt_msg": "SUNRPC: Fix a suspicious RCU usage warning" }, - "CVE-2017-9725": { - "cmt_msg": "mm: cma: fix incorrect type conversion for size during dma allocation" + "CVE-2023-52624": { + "cmt_msg": "drm/amd/display: Wake DMCUB before executing GPINT commands" }, - "CVE-2018-14609": { - "cmt_msg": "btrfs: relocation: Only remove reloc rb_trees if reloc control has been initialized" + "CVE-2023-52625": { + "cmt_msg": "drm/amd/display: Refactor DMCUB enter/exit idle interface" }, - "CVE-2014-4027": { - "cmt_msg": "target/rd: Refactor rd_build_device_space + rd_release_device_space" + "CVE-2023-52628": { + "cmt_msg": "netfilter: nftables: exthdr: fix 4-byte stack OOB write" }, - "CVE-2022-3595": { - "cmt_msg": "cifs: fix double-fault crash during ntlmssp" + "CVE-2023-52629": { + "cmt_msg": "sh: push-switch: Reorder cleanup operations to avoid use-after-free bug" }, - "CVE-2020-10769": { - "cmt_msg": "crypto: authenc - fix parsing key with misaligned rta_len" + "CVE-2016-9555": { + "cmt_msg": "sctp: validate chunk len before actually using it" }, - "CVE-2020-27815": { - "cmt_msg": "jfs: Fix array index bounds check in dbAdjTree" + "CVE-2022-0492": { + "cmt_msg": "cgroup-v1: Require capabilities to set release_agent" }, - "CVE-2020-0543": { - "cmt_msg": "x86/cpu: Add 'table' argument to cpu_matches()" + "CVE-2020-12352": { + "cmt_msg": "Bluetooth: A2MP: Fix not initializing all members" }, - "CVE-2022-1462": { - "cmt_msg": "tty: use new tty_insert_flip_string_and_push_buffer() in pty_write()" + "CVE-2021-43976": { + "cmt_msg": "mwifiex: Fix skb_over_panic in mwifiex_usb_recv()" }, - "CVE-2023-6606": { - "cmt_msg": "smb: client: fix OOB in smbCalcSize()" + "CVE-2022-0494": { + "cmt_msg": "block-map: add __GFP_ZERO flag for alloc_page in function bio_copy_kern" }, - "CVE-2023-3006": { - "cmt_msg": "arm64: Add AMPERE1 to the Spectre-BHB affected list" + "CVE-2021-47101": { + "cmt_msg": "asix: fix uninit-value in asix_mdio_read()" }, - "CVE-2020-27777": { - "cmt_msg": "powerpc/rtas: Restrict RTAS requests from userspace" + "CVE-2021-47103": { + "cmt_msg": "inet: fully convert sk->sk_rx_dst to RCU rules" }, - "CVE-2019-20636": { - "cmt_msg": "Input: add safety guards to input_set_keycode()" + "CVE-2021-46982": { + "cmt_msg": "f2fs: compress: fix race condition of overwrite vs truncate" }, - "CVE-2019-11486": { - "cmt_msg": "tty: mark Siemens R3964 line discipline as BROKEN" + "CVE-2007-3719": { + "cmt_msg": "" }, - "CVE-2019-11487": { - "cmt_msg": "fs: prevent page refcount overflow in pipe_buf_get" + "CVE-2023-3863": { + "cmt_msg": "net: nfc: Fix use-after-free caused by nfc_llcp_find_local" }, - "CVE-2022-28390": { - "cmt_msg": "can: ems_usb: ems_usb_start_xmit(): fix double dev_kfree_skb() in error path" + "CVE-2019-19319": { + "cmt_msg": "ext4: protect journal inode's blocks using block_validity" }, - "CVE-2020-27066": { - "cmt_msg": "xfrm: policy: Fix doulbe free in xfrm_policy_timer" + "CVE-2016-8399": { + "cmt_msg": "net: ping: check minimum size on ICMP header length" }, - "CVE-2020-27675": { - "cmt_msg": "xen/events: avoid removing an event channel while handling it" + "CVE-2022-3628": { + "cmt_msg": "wifi: brcmfmac: Fix potential buffer overflow in brcmf_fweh_event_worker()" }, - "CVE-2013-2635": { - "cmt_msg": "rtnl: fix info leak on RTM_GETLINK request for VF devices" + "CVE-2022-3629": { + "cmt_msg": "vsock: Fix memory leak in vsock_connect()" }, - "CVE-2019-20908": { - "cmt_msg": "efi: Restrict efivar_ssdt_load when the kernel is locked down" + "CVE-2022-3621": { + "cmt_msg": "nilfs2: fix NULL pointer dereference at nilfs_bmap_lookup_at_level()" }, - "CVE-2023-3776": { - "cmt_msg": "net/sched: cls_fw: Fix improper refcount update leads to use-after-free" + "CVE-2022-23960": { + "cmt_msg": "ARM: report Spectre v2 status through sysfs" }, - "CVE-2021-28038": { - "cmt_msg": "Xen/gnttab: handle p2m update errors on a per-slot basis" + "CVE-2022-3624": { + "cmt_msg": "bonding: fix reference count leak in balance-alb mode" }, - "CVE-2021-29154": { - "cmt_msg": "bpf, x86: Validate computation of branch displacements for x86-64" + "CVE-2019-11091": { + "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" }, - "CVE-2023-52435": { - "cmt_msg": "net: prevent mss overflow in skb_segment()" + "CVE-2023-4921": { + "cmt_msg": "net: sched: sch_qfq: Fix UAF in qfq_dequeue()" }, - "CVE-2023-52434": { - "cmt_msg": "smb: client: fix potential OOBs in smb2_parse_contexts()" + "CVE-2017-15649": { + "cmt_msg": "packet: in packet_do_bind, test fanout with bind_lock held" }, - "CVE-2023-52436": { - "cmt_msg": "f2fs: explicitly null-terminate the xattr list" + "CVE-2023-1829": { + "cmt_msg": "net/sched: Retire tcindex classifier" }, - "CVE-2019-19062": { - "cmt_msg": "crypto: user - fix memory leak in crypto_report" + "CVE-2019-19227": { + "cmt_msg": "appletalk: Fix potential NULL pointer dereference in unregister_snap_client" }, - "CVE-2022-2961": { - "cmt_msg": "" + "CVE-2024-0775": { + "cmt_msg": "ext4: improve error recovery code paths in __ext4_remount()" }, - "CVE-2019-19066": { - "cmt_msg": "scsi: bfa: release allocated memory in case of error" + "CVE-2016-9604": { + "cmt_msg": "KEYS: Disallow keyrings beginning with '.' to be joined as session keyrings" }, - "CVE-2020-0435": { - "cmt_msg": "f2fs: fix to do sanity check with i_extra_isize" + "CVE-2020-14386": { + "cmt_msg": "net/packet: fix overflow in tpacket_rcv" }, - "CVE-2020-0432": { - "cmt_msg": "staging: most: net: fix buffer overflow" + "CVE-2020-14381": { + "cmt_msg": "futex: Fix inode life-time issue" }, - "CVE-2020-0433": { - "cmt_msg": "blk-mq: sync the update nr_hw_queues with blk_mq_queue_tag_busy_iter" + "CVE-2019-19768": { + "cmt_msg": "blktrace: Protect q->blk_trace with RCU" }, - "CVE-2023-51779": { - "cmt_msg": "Bluetooth: af_bluetooth: Fix Use-After-Free in bt_sock_recvmsg" + "CVE-2022-20141": { + "cmt_msg": "igmp: Add ip_mc_list lock in ip_check_mc_rcu" }, - "CVE-2019-3874": { - "cmt_msg": "sctp: implement memory accounting on tx path" + "CVE-2023-23455": { + "cmt_msg": "net: sched: atm: dont intepret cls results when asked to drop" }, - "CVE-2018-10877": { - "cmt_msg": "ext4: verify the depth of extent tree in ext4_find_extent()" + "CVE-2023-23454": { + "cmt_msg": "net: sched: cbq: dont intepret cls results when asked to drop" }, - "CVE-2018-10876": { - "cmt_msg": "ext4: only look at the bg_flags field if it is valid" + "CVE-2022-20148": { + "cmt_msg": "f2fs: fix UAF in f2fs_available_free_memory" }, - "CVE-2010-4563": { - "cmt_msg": "" + "CVE-2023-6931": { + "cmt_msg": "perf: Fix perf_event_validate_size()" }, - "CVE-2023-2162": { - "cmt_msg": "scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress" + "CVE-2023-6932": { + "cmt_msg": "ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet" }, - "CVE-2018-10879": { - "cmt_msg": "ext4: make sure bitmaps and the inode table don't overlap with bg descriptors" + "CVE-2018-8781": { + "cmt_msg": "drm: udl: Properly check framebuffer mmap offsets" }, - "CVE-2018-10878": { - "cmt_msg": "ext4: always check block group bounds in ext4_init_block_bitmap()" + "CVE-2017-15265": { + "cmt_msg": "ALSA: seq: Fix use-after-free at creating a port" }, - "CVE-2024-23851": { - "cmt_msg": "dm: limit the number of targets and parameter size area" + "CVE-2021-0605": { + "cmt_msg": "af_key: pfkey_dump needs parameter validation" }, - "CVE-2023-0266": { - "cmt_msg": "ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF" + "CVE-2018-20961": { + "cmt_msg": "USB: gadget: f_midi: fixing a possible double-free in f_midi" }, - "CVE-2023-1838": { - "cmt_msg": "Fix double fget() in vhost_net_set_backend()" + "CVE-2018-5995": { + "cmt_msg": "printk: hash addresses printed with %p" }, - "CVE-2021-3483": { - "cmt_msg": "firewire: nosy: Fix a use-after-free bug in nosy_ioctl()" + "CVE-2022-2153": { + "cmt_msg": "KVM: x86: Avoid theoretical NULL pointer dereference in kvm_irq_delivery_to_apic_fast()" }, - "CVE-2023-6040": { - "cmt_msg": "netfilter: nf_tables: Reject tables of unsupported family" + "CVE-2024-2193": { + "cmt_msg": "" }, - "CVE-2020-25656": { - "cmt_msg": "vt: keyboard, extend func_buf_lock to readers" + "CVE-2018-12930": { + "cmt_msg": "" }, - "CVE-2019-10142": { - "cmt_msg": "drivers/virt/fsl_hypervisor.c: prevent integer overflow in ioctl" + "CVE-2018-12931": { + "cmt_msg": "" }, - "CVE-2021-4023": { - "cmt_msg": "io-wq: fix cancellation on create-worker failure" + "CVE-2021-28972": { + "cmt_msg": "PCI: rpadlpar: Fix potential drc_name corruption in store functions" }, - "CVE-2023-3268": { - "cmt_msg": "relayfs: fix out-of-bounds access in relay_file_read" + "CVE-2021-28971": { + "cmt_msg": "perf/x86/intel: Fix a crash caused by zero PEBS status" }, - "CVE-2021-22555": { - "cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write" + "CVE-2017-12146": { + "cmt_msg": "driver core: platform: fix race condition with driver_override" }, - "CVE-2021-0399": { - "cmt_msg": "" + "CVE-2020-36781": { + "cmt_msg": "i2c: imx: fix reference leak when pm_runtime_get_sync fails" }, - "CVE-2020-36691": { - "cmt_msg": "netlink: limit recursion depth in policy validation" + "CVE-2021-3732": { + "cmt_msg": "ovl: prevent private clone if bind mount is not allowed" }, - "CVE-2023-42755": { - "cmt_msg": "net/sched: Retire rsvp classifier" + "CVE-2020-36784": { + "cmt_msg": "i2c: cadence: fix reference leak when pm_runtime_get_sync fails" }, - "CVE-2020-2732": { - "cmt_msg": "KVM: nVMX: Don't emulate instructions in guest mode" + "CVE-2017-13166": { + "cmt_msg": "media: v4l2-ioctl.c: use check_fmt for enum/g/s/try_fmt" }, - "CVE-2012-4542": { - "cmt_msg": "" + "CVE-2018-12207": { + "cmt_msg": "kvm: x86, powerpc: do not allow clearing largepages debugfs entry" }, - "CVE-2023-42752": { - "cmt_msg": "igmp: limit igmpv3_newpack() packet size to IP_MAX_MTU" + "CVE-2017-13168": { + "cmt_msg": "scsi: sg: mitigate read/write abuse" }, - "CVE-2023-1118": { - "cmt_msg": "media: rc: Fix use-after-free bugs caused by ene_tx_irqsim()" + "CVE-2019-0148": { + "cmt_msg": "i40e: Wrong truncation from u16 to u8" }, - "CVE-2021-3573": { - "cmt_msg": "Bluetooth: use correct lock to prevent UAF of hdev object" + "CVE-2019-17075": { + "cmt_msg": "RDMA/cxgb4: Do not dma memory off of the stack" }, - "CVE-2022-1679": { - "cmt_msg": "ath9k: fix use-after-free in ath9k_hif_usb_rx_cb" + "CVE-2023-20588": { + "cmt_msg": "x86/CPU/AMD: Do not leak quotient data after a division by 0" }, - "CVE-2018-1000026": { - "cmt_msg": "bnx2x: disable GSO where gso_size is too big for hardware" + "CVE-2019-0147": { + "cmt_msg": "i40e: add num_vectors checker in iwarp handler" }, - "CVE-2023-1380": { - "cmt_msg": "wifi: brcmfmac: slab-out-of-bounds read in brcmf_get_assoc_ies()" + "CVE-2018-3693": { + "cmt_msg": "ext4: fix spectre gadget in ext4_mb_regular_allocator()" + }, + "CVE-2022-44033": { + "cmt_msg": "char: pcmcia: remove all the drivers" }, "CVE-2022-44032": { "cmt_msg": "char: pcmcia: remove all the drivers" }, - "CVE-2017-0786": { - "cmt_msg": "brcmfmac: add length check in brcmf_cfg80211_escan_handler()" + "CVE-2017-5576": { + "cmt_msg": "drm/vc4: Fix an integer overflow in temporary allocation layout." }, - "CVE-2021-28972": { - "cmt_msg": "PCI: rpadlpar: Fix potential drc_name corruption in store functions" + "CVE-2017-5577": { + "cmt_msg": "drm/vc4: Return -EINVAL on the overflow checks failing." }, - "CVE-2018-12130": { - "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" + "CVE-2021-3609": { + "cmt_msg": "can: bcm: delay release of struct bcm_op after synchronize_rcu()" }, - "CVE-2021-20292": { - "cmt_msg": "drm/ttm/nouveau: don't call tt destroy callback on alloc failure." + "CVE-2017-13305": { + "cmt_msg": "KEYS: encrypted: fix buffer overread in valid_master_desc()" }, - "CVE-2021-31916": { - "cmt_msg": "dm ioctl: fix out of bounds array access when no devices" + "CVE-2019-11479": { + "cmt_msg": "tcp: add tcp_min_snd_mss sysctl" }, - "CVE-2017-8065": { - "cmt_msg": "crypto: ccm - move cbcmac input off the stack" + "CVE-2019-11478": { + "cmt_msg": "tcp: tcp_fragment() should apply sane memory limits" }, - "CVE-2018-13405": { - "cmt_msg": "Fix up non-directory creation in SGID directories" + "CVE-2019-20096": { + "cmt_msg": "dccp: Fix memleak in __feat_register_sp" }, - "CVE-2018-13406": { - "cmt_msg": "video: uvesafb: Fix integer overflow in allocation" + "CVE-2018-6554": { + "cmt_msg": "staging: irda: remove the irda network stack and drivers" }, - "CVE-2020-11668": { - "cmt_msg": "media: xirlink_cit: add missing descriptor sanity checks" + "CVE-2018-6555": { + "cmt_msg": "staging: irda: remove the irda network stack and drivers" }, - "CVE-2020-11669": { - "cmt_msg": "powerpc/powernv/idle: Restore AMR/UAMOR/AMOR after idle" + "CVE-2016-7097": { + "cmt_msg": "posix_acl: Clear SGID bit when setting file permissions" }, - "CVE-2019-15118": { - "cmt_msg": "ALSA: usb-audio: Fix a stack buffer overflow bug in check_input_term" + "CVE-2019-9213": { + "cmt_msg": "mm: enforce min addr even if capable() in expand_downwards()" }, - "CVE-2019-12818": { - "cmt_msg": "net: nfc: Fix NULL dereference on nfc_llcp_build_tlv fails" + "CVE-2019-14896": { + "cmt_msg": "libertas: Fix two buffer overflows at parsing bss descriptor" }, - "CVE-2023-2269": { - "cmt_msg": "dm ioctl: fix nested locking in table_clear() to remove deadlock concern" + "CVE-2019-14897": { + "cmt_msg": "libertas: Fix two buffer overflows at parsing bss descriptor" }, - "CVE-2023-0394": { - "cmt_msg": "ipv6: raw: Deduct extension header length in rawv6_push_pending_frames" + "CVE-2019-14895": { + "cmt_msg": "mwifiex: fix possible heap overflow in mwifiex_process_country_ie()" }, - "CVE-2020-10690": { - "cmt_msg": "ptp: fix the race between the release of ptp_clock and cdev" + "CVE-2024-26784": { + "cmt_msg": "pmdomain: arm: Fix NULL dereference on scmi_perf_domain removal" }, - "CVE-2020-0347": { - "cmt_msg": "" + "CVE-2024-26789": { + "cmt_msg": "crypto: arm64/neonbs - fix out-of-bounds access on short input" }, - "CVE-2019-15117": { - "cmt_msg": "ALSA: usb-audio: Fix an OOB bug in parse_audio_mixer_unit" + "CVE-2017-18222": { + "cmt_msg": "net: hns: fix ethtool_get_strings overflow in hns driver" }, - "CVE-2021-3659": { - "cmt_msg": "net: mac802154: Fix general protection fault" + "CVE-2020-0067": { + "cmt_msg": "f2fs: fix to avoid memory leakage in f2fs_listxattr" }, - "CVE-2021-4155": { - "cmt_msg": "xfs: map unwritten blocks in XFS_IOC_{ALLOC,FREE}SP just like fallocate" + "CVE-2017-18224": { + "cmt_msg": "ocfs2: ip_alloc_sem should be taken in ocfs2_get_block()" }, - "CVE-2019-14901": { - "cmt_msg": "mwifiex: Fix heap overflow in mmwifiex_process_tdls_action_frame()" + "CVE-2020-26541": { + "cmt_msg": "certs: Add EFI_CERT_X509_GUID support for dbx entries" }, - "CVE-2021-4150": { - "cmt_msg": "block: fix incorrect references to disk objects" + "CVE-2019-20794": { + "cmt_msg": "" }, - "CVE-2020-3702": { - "cmt_msg": "ath: Use safer key clearing with key cache entries" + "CVE-2024-26769": { + "cmt_msg": "nvmet-fc: avoid deadlock on delete association path" }, - "CVE-2021-3653": { - "cmt_msg": "KVM: nSVM: avoid picking up unsupported bits from L2 in int_ctl (CVE-2021-3653)" + "CVE-2024-26768": { + "cmt_msg": "LoongArch: Change acpi_core_pic[NR_CPUS] to acpi_core_pic[MAX_CORE_PIC]" }, - "CVE-2021-3655": { - "cmt_msg": "sctp: validate from_addr_param return" + "CVE-2021-33061": { + "cmt_msg": "ixgbe: add improvement for MDD response functionality" }, - "CVE-2021-4159": { - "cmt_msg": "bpf: Verifer, adjust_scalar_min_max_vals to always call update_reg_bounds()" + "CVE-2024-26764": { + "cmt_msg": "fs/aio: Restrict kiocb_set_cancel_fn() to I/O submitted via libaio" }, - "CVE-2019-12614": { - "cmt_msg": "powerpc/pseries/dlpar: Fix a missing check in dlpar_parse_cc_property()" + "CVE-2024-26767": { + "cmt_msg": "drm/amd/display: fixed integer types and null check locations" }, - "CVE-2019-12615": { - "cmt_msg": "mdesc: fix a missing-check bug in get_vdev_port_node_info()" + "CVE-2024-26766": { + "cmt_msg": "IB/hfi1: Fix sdma.h tx->num_descs off-by-one error" }, - "CVE-2021-3714": { - "cmt_msg": "" + "CVE-2024-26763": { + "cmt_msg": "dm-crypt: don't modify the data when using authenticated encryption" }, - "CVE-2020-10742": { - "cmt_msg": "new helper: iov_iter_get_pages_alloc()" + "CVE-2017-18551": { + "cmt_msg": "i2c: core-smbus: prevent stack corruption on read I2C_BLOCK_DATA" }, - "CVE-2017-12168": { - "cmt_msg": "arm64: KVM: pmu: Fix AArch32 cycle counter access" + "CVE-2017-18552": { + "cmt_msg": "RDS: validate the requested traces user input against max supported" }, - "CVE-2019-16233": { - "cmt_msg": "scsi: qla2xxx: fix a potential NULL pointer dereference" + "CVE-2018-18559": { + "cmt_msg": "net/packet: fix a race in packet_bind() and packet_notifier()" }, - "CVE-2021-3892": { - "cmt_msg": "" + "CVE-2019-9457": { + "cmt_msg": "exec: Limit arg stack to at most 75% of _STK_LIM" }, - "CVE-2019-6133": { - "cmt_msg": "fork: record start_time late" + "CVE-2019-9456": { + "cmt_msg": "usb: usbmon: Read text within supplied buffer size" }, - "CVE-2018-10902": { - "cmt_msg": "ALSA: rawmidi: Change resized buffers atomically" + "CVE-2019-9455": { + "cmt_msg": "media: videobuf2-v4l2: drop WARN_ON in vb2_warn_zero_bytesused()" }, - "CVE-2020-27673": { - "cmt_msg": "xen/events: add a proper barrier to 2-level uevent unmasking" + "CVE-2022-2978": { + "cmt_msg": "fs: fix UAF/GPF bug in nilfs_mdt_destroy" }, - "CVE-2021-39636": { - "cmt_msg": "netfilter: x_tables: fix pointer leaks to userspace" + "CVE-2019-9453": { + "cmt_msg": "f2fs: fix to avoid accessing xattr across the boundary" }, - "CVE-2017-18204": { - "cmt_msg": "ocfs2: should wait dio before inode lock in ocfs2_setattr()" + "CVE-2023-20569": { + "cmt_msg": "x86/bugs: Increase the x86 bugs vector size to two u32s" }, - "CVE-2021-39634": { - "cmt_msg": "epoll: do not insert into poll queues until all sanity checks are done" + "CVE-2023-46838": { + "cmt_msg": "xen-netback: don't produce zero-size SKB frags" }, - "CVE-2022-25375": { - "cmt_msg": "usb: gadget: rndis: check size of RNDIS_MSG_SET command" + "CVE-2019-9458": { + "cmt_msg": "media: v4l: event: Prevent freeing event subscriptions while accessed" }, - "CVE-2022-33742": { - "cmt_msg": "xen/blkfront: force data bouncing when backend is untrusted" + "CVE-2023-3090": { + "cmt_msg": "ipvlan:Fix out-of-bounds caused by unclear skb->cb" }, - "CVE-2022-33741": { - "cmt_msg": "xen/netfront: force data bouncing when backend is untrusted" + "CVE-2023-45862": { + "cmt_msg": "USB: ene_usb6250: Allocate enough memory for full object" }, - "CVE-2018-20509": { - "cmt_msg": "binder: refactor binder ref inc/dec for thread safety" + "CVE-2023-45863": { + "cmt_msg": "kobject: Fix slab-out-of-bounds in fill_kobj_path()" }, - "CVE-2024-24864": { - "cmt_msg": "" + "CVE-2020-25704": { + "cmt_msg": "perf/core: Fix a memory leak in perf_event_parse_addr_filter()" }, - "CVE-2022-45885": { - "cmt_msg": "" + "CVE-2020-25705": { + "cmt_msg": "icmp: randomize the global rate limiter" }, - "CVE-2022-33744": { - "cmt_msg": "xen/arm: Fix race in RB-tree based P2M accounting" + "CVE-2023-52639": { + "cmt_msg": "KVM: s390: vsie: fix race during shadow creation" }, - "CVE-2017-18193": { - "cmt_msg": "f2fs: fix a bug caused by NULL extent tree" + "CVE-2023-52638": { + "cmt_msg": "can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock" }, - "CVE-2022-40768": { - "cmt_msg": "scsi: stex: Properly zero out the passthrough command structure" + "CVE-2019-15239": { + "cmt_msg": "unknown" }, - "CVE-2020-12888": { - "cmt_msg": "vfio-pci: Invalidate mmaps and block MMIO access on disabled memory" + "CVE-2017-15129": { + "cmt_msg": "net: Fix double free and memory corruption in get_net_ns_by_id()" }, - "CVE-2023-52445": { - "cmt_msg": "media: pvrusb2: fix use after free on context disconnection" + "CVE-2022-26373": { + "cmt_msg": "x86/speculation: Add RSB VM Exit protections" }, - "CVE-2016-6198": { - "cmt_msg": "vfs: add vfs_select_inode() helper" + "CVE-2023-52633": { + "cmt_msg": "um: time-travel: fix time corruption" }, - "CVE-2022-41218": { - "cmt_msg": "media: dvb-core: Fix UAF due to refcount races at releasing" + "CVE-2023-52632": { + "cmt_msg": "drm/amdkfd: Fix lock dependency warning with srcu" }, - "CVE-2020-14331": { - "cmt_msg": "vgacon: Fix for missing check in scrollback handling" + "CVE-2017-9986": { + "cmt_msg": "sound: Retire OSS" }, - "CVE-2023-52457": { - "cmt_msg": "serial: 8250: omap: Don't skip resource freeing if pm_runtime_resume_and_get() failed" + "CVE-2017-9985": { + "cmt_msg": "ALSA: msnd: Optimize / harden DSP and MIDI loops" }, - "CVE-2020-28915": { - "cmt_msg": "fbcon: Fix global-out-of-bounds read in fbcon_get_font()" + "CVE-2017-9984": { + "cmt_msg": "ALSA: msnd: Optimize / harden DSP and MIDI loops" }, - "CVE-2022-36946": { - "cmt_msg": "netfilter: nf_queue: do not allow packet truncation below transport header offset" + "CVE-2021-47135": { + "cmt_msg": "mt76: mt7921: fix possible AOOB issue in mt7921_mcu_tx_rate_report" }, - "CVE-2021-45485": { - "cmt_msg": "ipv6: use prandom_u32() for ID generation" + "CVE-2021-47136": { + "cmt_msg": "net: zero-initialize tc skb extension on allocation" }, - "CVE-2021-0448": { - "cmt_msg": "netfilter: ctnetlink: add a range check for l3/l4 protonum" + "CVE-2021-47137": { + "cmt_msg": "net: lantiq: fix memory corruption in RX ring" }, - "CVE-2016-6197": { - "cmt_msg": "ovl: verify upper dentry before unlink and rename" + "CVE-2021-47131": { + "cmt_msg": "net/tls: Fix use-after-free after the TLS device goes down and up" }, - "CVE-2022-21166": { - "cmt_msg": "x86/speculation/mmio: Enable CPU Fill buffer clearing on idle" + "CVE-2021-47133": { + "cmt_msg": "HID: amd_sfh: Fix memory leak in amd_sfh_work" }, - "CVE-2020-29374": { - "cmt_msg": "gup: document and work around \"COW can break either way\" issue" + "CVE-2024-26675": { + "cmt_msg": "ppp_async: limit MRU to 64K" }, - "CVE-2020-0030": { - "cmt_msg": "ANDROID: binder: synchronize_rcu() when using POLLFREE." + "CVE-2023-0386": { + "cmt_msg": "ovl: fail on invalid uid/gid mapping at copy up" }, - "CVE-2015-8709": { - "cmt_msg": "mm: Add a user_ns owner to mm_struct and fix ptrace permission checks" + "CVE-2022-42896": { + "cmt_msg": "Bluetooth: L2CAP: Fix accepting connection request for invalid SPSM" }, - "CVE-2023-52449": { - "cmt_msg": "mtd: Fix gluebi NULL pointer dereference caused by ftl notifier" + "CVE-2022-42895": { + "cmt_msg": "Bluetooth: L2CAP: Fix attempting to access uninitialized memory" }, - "CVE-2021-29650": { - "cmt_msg": "netfilter: x_tables: Use correct memory barriers." + "CVE-2017-7618": { + "cmt_msg": "crypto: ahash - Fix EINPROGRESS notification callback" }, - "CVE-2019-17133": { - "cmt_msg": "cfg80211: wext: avoid copying malformed SSIDs" + "CVE-2022-48626": { + "cmt_msg": "moxart: fix potential use-after-free on remove path" }, - "CVE-2018-20169": { - "cmt_msg": "USB: check usb_get_extra_descriptor for proper size" + "CVE-2022-48627": { + "cmt_msg": "vt: fix memory overlapping when deleting chars in the buffer" }, - "CVE-2017-12762": { - "cmt_msg": "isdn/i4l: fix buffer overflow" + "CVE-2022-48628": { + "cmt_msg": "ceph: drop messages from MDS when unmounting" }, - "CVE-2022-41849": { - "cmt_msg": "fbdev: smscufx: Fix use-after-free in ufx_ops_open()" + "CVE-2017-7616": { + "cmt_msg": "mm/mempolicy.c: fix error handling in set_mempolicy and mbind." }, - "CVE-2022-41848": { + "CVE-2024-24859": { "cmt_msg": "" }, - "CVE-2023-6356": { - "cmt_msg": "" + "CVE-2017-1000112": { + "cmt_msg": "udp: consistently apply ufo or fragmentation" }, - "CVE-2022-1353": { - "cmt_msg": "af_key: add __GFP_ZERO flag for compose_sadb_supported in function pfkey_register" + "CVE-2017-1000111": { + "cmt_msg": "packet: fix tp_reserve race in packet_set_ring" }, - "CVE-2022-28356": { - "cmt_msg": "llc: fix netdevice reference leaks in llc_ui_bind()" + "CVE-2024-24855": { + "cmt_msg": "scsi: lpfc: Fix a possible data race in lpfc_unregister_fcf_rescan()" }, - "CVE-2022-1198": { - "cmt_msg": "drivers: hamradio: 6pack: fix UAF bug caused by mod_timer()" + "CVE-2024-24857": { + "cmt_msg": "" }, - "CVE-2022-1199": { - "cmt_msg": "ax25: Fix NULL pointer dereference in ax25_kill_by_device" + "CVE-2019-3892": { + "cmt_msg": "coredump: fix race condition between mmget_not_zero()/get_task_mm() and core dumping" }, - "CVE-2015-8966": { - "cmt_msg": "[PATCH] arm: fix handling of F_OFD_... in oabi_fcntl64()" + "CVE-2021-29265": { + "cmt_msg": "usbip: fix stub_dev usbip_sockfd_store() races leading to gpf" }, - "CVE-2015-8967": { - "cmt_msg": "arm64: make sys_call_table const" + "CVE-2022-3545": { + "cmt_msg": "nfp: fix use-after-free in area_cache_get()" }, - "CVE-2021-39801": { - "cmt_msg": "" + "CVE-2022-3542": { + "cmt_msg": "bnx2x: fix potential memory leak in bnx2x_tpa_stop()" }, - "CVE-2021-39800": { - "cmt_msg": "" + "CVE-2018-16597": { + "cmt_msg": "ovl: modify ovl_permission() to do checks on two inodes" }, - "CVE-2019-3837": { - "cmt_msg": "net_dma: simple removal" + "CVE-2021-21781": { + "cmt_msg": "ARM: ensure the signal page contains defined contents" }, - "CVE-2014-8171": { - "cmt_msg": "mm: memcg: do not trap chargers with full callstack on OOM" + "CVE-2023-1838": { + "cmt_msg": "Fix double fget() in vhost_net_set_backend()" }, - "CVE-2014-8172": { - "cmt_msg": "get rid of s_files and files_lock" + "CVE-2023-1382": { + "cmt_msg": "tipc: set con sock in tipc_conn_alloc" }, - "CVE-2021-4202": { - "cmt_msg": "NFC: reorganize the functions in nci_request" + "CVE-2018-14734": { + "cmt_msg": "infiniband: fix a possible use-after-free bug" }, - "CVE-2021-4203": { - "cmt_msg": "af_unix: fix races in sk_peer_pid and sk_peer_cred accesses" + "CVE-2018-8822": { + "cmt_msg": "staging: ncpfs: memory corruption in ncp_read_kernel()" }, - "CVE-2022-45887": { - "cmt_msg": "media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb()" + "CVE-2021-29647": { + "cmt_msg": "net: qrtr: fix a kernel-infoleak in qrtr_recvmsg()" }, - "CVE-2022-45886": { - "cmt_msg": "media: dvb-core: Fix use-after-free due on race condition at dvb_net" + "CVE-2023-6546": { + "cmt_msg": "tty: n_gsm: fix the UAF caused by race condition in gsm_cleanup_mux" }, - "CVE-2024-25744": { - "cmt_msg": "x86/coco: Disable 32-bit emulation by default on TDX and SEV" + "CVE-2020-14390": { + "cmt_msg": "fbcon: remove soft scrollback code" }, - "CVE-2017-16646": { - "cmt_msg": "media: dib0700: fix invalid dvb_detach argument" + "CVE-2021-45469": { + "cmt_msg": "f2fs: fix to do sanity check on last xattr entry in __f2fs_setxattr()" }, - "CVE-2023-3022": { - "cmt_msg": "ipv6: Use result arg in fib_lookup_arg consistently" + "CVE-2017-7541": { + "cmt_msg": "brcmfmac: fix possible buffer overflow in brcmf_cfg80211_mgmt_tx()" }, - "CVE-2021-44879": { - "cmt_msg": "f2fs: fix to do sanity check on inode type during garbage collection" + "CVE-2017-7542": { + "cmt_msg": "ipv6: avoid overflow of offset in ip6_find_1stfragopt" }, - "CVE-2019-15505": { - "cmt_msg": "media: technisat-usb2: break out of loop at end of buffer" + "CVE-2024-0584": { + "cmt_msg": "ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet" }, - "CVE-2023-2513": { - "cmt_msg": "ext4: fix use-after-free in ext4_xattr_set_entry" + "CVE-2020-0465": { + "cmt_msg": "HID: core: Sanitize event code and type when mapping input" }, - "CVE-2017-1000": { - "cmt_msg": "udp: consistently apply ufo or fragmentation" + "CVE-2020-0466": { + "cmt_msg": "do_epoll_ctl(): clean the failure exits up a bit" }, - "CVE-2020-11609": { - "cmt_msg": "media: stv06xx: add missing descriptor sanity checks" + "CVE-2017-15274": { + "cmt_msg": "KEYS: fix dereferencing NULL payload with nonzero length" }, - "CVE-2022-27672": { - "cmt_msg": "x86/speculation: Identify processors vulnerable to SMT RSB predictions" + "CVE-2024-0340": { + "cmt_msg": "vhost: use kzalloc() instead of kmalloc() followed by memset()" }, - "CVE-2013-1772": { - "cmt_msg": "printk: convert byte-buffer to variable-length record buffer" + "CVE-2019-19523": { + "cmt_msg": "USB: adutux: fix use-after-free on disconnect" }, - "CVE-2021-1048": { - "cmt_msg": "fix regression in \"epoll: Keep a reference on files added to the check list\"" + "CVE-2019-11135": { + "cmt_msg": "x86/msr: Add the IA32_TSX_CTRL MSR" }, - "CVE-2014-9803": { - "cmt_msg": "Revert \"arm64: Introduce execute-only page access permissions\"" + "CVE-2021-27365": { + "cmt_msg": "scsi: iscsi: Ensure sysfs attributes are limited to PAGE_SIZE" }, - "CVE-2015-2877": { - "cmt_msg": "" + "CVE-2021-27364": { + "cmt_msg": "scsi: iscsi: Restrict sessions and handles to admin capabilities" }, - "CVE-2020-9383": { - "cmt_msg": "floppy: check FDC index for errors before assigning it" + "CVE-2021-27363": { + "cmt_msg": "scsi: iscsi: Restrict sessions and handles to admin capabilities" }, - "CVE-2023-32269": { - "cmt_msg": "netrom: Fix use-after-free caused by accept on already connected socket" + "CVE-2021-20320": { + "cmt_msg": "s390/bpf: Fix optimizing out zero-extensions" }, - "CVE-2021-38198": { - "cmt_msg": "KVM: X86: MMU: Use the correct inherited permissions to get shadow page" + "CVE-2021-20321": { + "cmt_msg": "ovl: fix missing negative dentry check in ovl_rename()" }, - "CVE-2017-5972": { - "cmt_msg": "tcp: do not lock listener to process SYN packets" + "CVE-2017-18360": { + "cmt_msg": "USB: serial: io_ti: fix div-by-zero in set_termios" }, - "CVE-2023-34256": { - "cmt_msg": "ext4: avoid a potential slab-out-of-bounds in ext4_group_desc_csum" + "CVE-2017-5967": { + "cmt_msg": "time: Remove CONFIG_TIMER_STATS" }, - "CVE-2023-1513": { - "cmt_msg": "kvm: initialize all of the kvm_debugregs structure before sending it to userspace" + "CVE-2022-3169": { + "cmt_msg": "nvme: ensure subsystem reset is single threaded" }, - "CVE-2021-26401": { - "cmt_msg": "x86/speculation: Use generic retpoline by default on AMD" + "CVE-2019-2054": { + "cmt_msg": "arm/ptrace: run seccomp after ptrace" }, - "CVE-2021-3847": { - "cmt_msg": "" + "CVE-2018-20976": { + "cmt_msg": "xfs: clear sb->s_fs_info on mount failure" }, - "CVE-2023-52442": { - "cmt_msg": "ksmbd: validate session id and tree id in compound request" + "CVE-2023-22995": { + "cmt_msg": "usb: dwc3: dwc3-qcom: Add missing platform_device_put() in dwc3_qcom_acpi_register_core" }, - "CVE-2019-14284": { - "cmt_msg": "floppy: fix div-by-zero in setup_format_params" + "CVE-2021-3542": { + "cmt_msg": "" }, - "CVE-2022-1280": { - "cmt_msg": "drm: avoid circular locks in drm_mode_getconnector" + "CVE-2017-16650": { + "cmt_msg": "net: qmi_wwan: fix divide by 0 on bad descriptors" }, - "CVE-2021-3506": { - "cmt_msg": "f2fs: fix to avoid out-of-bounds memory access" + "CVE-2018-12929": { + "cmt_msg": "" }, - "CVE-2011-4917": { + "CVE-2018-12928": { "cmt_msg": "" }, - "CVE-2011-4916": { + "CVE-2020-36310": { + "cmt_msg": "KVM: SVM: avoid infinite loop on NPF from bad address" + }, + "CVE-2020-36313": { + "cmt_msg": "KVM: Fix out of range accesses to memslots" + }, + "CVE-2020-35519": { + "cmt_msg": "net/x25: prevent a couple of overflows" + }, + "CVE-2020-10708": { "cmt_msg": "" }, - "CVE-2018-10880": { - "cmt_msg": "ext4: never move the system.data xattr out of the inode body" + "CVE-2018-5344": { + "cmt_msg": "loop: fix concurrent lo_open/lo_release" }, - "CVE-2019-3901": { - "cmt_msg": "perf/core: Fix perf_event_open() vs. execve() race" + "CVE-2017-12153": { + "cmt_msg": "nl80211: check for the required netlink attributes presence" }, - "CVE-2020-36558": { - "cmt_msg": "vt: vt_ioctl: fix race in VT_RESIZEX" + "CVE-2017-12154": { + "cmt_msg": "kvm: nVMX: Don't allow L2 to access the hardware CR8" }, - "CVE-2023-3338": { - "cmt_msg": "Remove DECnet support from kernel" + "CVE-2022-21499": { + "cmt_msg": "lockdown: also lock down previous kgdb use" }, - "CVE-2023-23039": { - "cmt_msg": "" + "CVE-2023-20593": { + "cmt_msg": "x86/cpu/amd: Add a Zenbleed fix" }, - "CVE-2019-15807": { - "cmt_msg": "scsi: libsas: delete sas port if expander discover failed" + "CVE-2017-5549": { + "cmt_msg": "USB: serial: kl5kusb105: fix line-state error handling" }, - "CVE-2014-7975": { - "cmt_msg": "fs: Add a missing permission check to do_umount" + "CVE-2017-5547": { + "cmt_msg": "HID: corsair: fix DMA buffers on stack" }, - "CVE-2023-31083": { - "cmt_msg": "Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO" + "CVE-2017-5546": { + "cmt_msg": "mm/slab.c: fix SLAB freelist randomization duplicate entries" }, - "CVE-2019-5489": { - "cmt_msg": "Change mincore() to count \"mapped\" pages rather than \"cached\" pages" + "CVE-2022-2380": { + "cmt_msg": "video: fbdev: sm712fb: Fix crash in smtcfb_read()" }, - "CVE-2024-1312": { - "cmt_msg": "mm: lock_vma_under_rcu() must check vma->anon_vma under vma lock" + "CVE-2022-0850": { + "cmt_msg": "ext4: fix kernel infoleak via ext4_extent_header" }, - "CVE-2019-19531": { - "cmt_msg": "usb: yurex: Fix use-after-free in yurex_delete" + "CVE-2019-19447": { + "cmt_msg": "ext4: work around deleting a file with i_nlink == 0 safely" }, - "CVE-2019-14283": { - "cmt_msg": "floppy: fix out-of-bounds read in copy_buffer" + "CVE-2021-3612": { + "cmt_msg": "Input: joydev - prevent potential read overflow in ioctl" }, - "CVE-2018-10881": { - "cmt_msg": "ext4: clear i_data in ext4_inode_info when removing inline data" + "CVE-2019-19448": { + "cmt_msg": "btrfs: only search for left_info if there is no right_info in try_merge_free_space" }, - "CVE-2018-10882": { - "cmt_msg": "ext4: add more inode number paranoia checks" + "CVE-2019-19449": { + "cmt_msg": "f2fs: fix to do sanity check on segment/section count" }, - "CVE-2018-10883": { - "cmt_msg": "jbd2: don't mark block as modified if the handle is out of credits" - } - } - }, - "6.2": { - "6.2": { - "CVE-2023-1281": { - "cmt_msg": "net/sched: tcindex: update imperfect hash filters respecting rcu", - "cmt_id": "ee059170b1f7e94e55fa6cadee544e176a6e59c2" + "CVE-2020-11725": { + "cmt_msg": "" }, - "CVE-2023-26545": { - "cmt_msg": "net: mpls: fix stale pointer if allocation fails during device rename", - "cmt_id": "fda6c89fe3d9aca073495a664e1d5aea28cd4377" + "CVE-2023-30456": { + "cmt_msg": "KVM: nVMX: add missing consistency checks for CR0 and CR4" }, - "CVE-2023-33952": { - "cmt_msg": "drm/vmwgfx: Do not drop the reference to the handle too soon", - "cmt_id": "a950b989ea29ab3b38ea7f6e3d2540700a3c54e8" + "CVE-2021-35477": { + "cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4" }, - "CVE-2023-33951": { - "cmt_msg": "drm/vmwgfx: Do not drop the reference to the handle too soon", - "cmt_id": "a950b989ea29ab3b38ea7f6e3d2540700a3c54e8" + "CVE-2024-26758": { + "cmt_msg": "md: Don't ignore suspended array in md_check_recovery()" }, - "CVE-2023-1513": { - "cmt_msg": "kvm: initialize all of the kvm_debugregs structure before sending it to userspace", - "cmt_id": "2c10b61421a28e95a46ab489fd56c0f442ff6952" + "CVE-2024-26759": { + "cmt_msg": "mm/swap: fix race when skipping swapcache" }, - "CVE-2022-27672": { - "cmt_msg": "x86/speculation: Identify processors vulnerable to SMT RSB predictions", - "cmt_id": "be8de49bea505e7777a69ef63d60e02ac1712683" - } - }, - "6.2.1": { - "CVE-2023-0459": { - "cmt_msg": "uaccess: Add speculation barrier to copy_from_user()", - "cmt_id": "2c8ee21d78942cf48bc836612ad365fd6f06cfbb" - } - }, - "6.2.3": { - "CVE-2023-3355": { - "cmt_msg": "drm/msm/gem: Add check for kmalloc", - "cmt_id": "abadeef9a82f86e6668759259adbcf8be6f44a9b" + "CVE-2022-1729": { + "cmt_msg": "perf: Fix sys_perf_event_open() race against self" }, - "CVE-2023-1998": { - "cmt_msg": "x86/speculation: Allow enabling STIBP with legacy IBRS", - "cmt_id": "ead3c8e54d28fa1d5454b1f8a21b96b4a969b1cb" + "CVE-2024-26752": { + "cmt_msg": "l2tp: pass correct message length to ip6_append_data" }, - "CVE-2023-1032": { - "cmt_msg": "net: avoid double iput when sock_alloc_file fails", - "cmt_id": "cb6aedc1fd9d808d7319db2f953f4886dd46c627" + "CVE-2024-26754": { + "cmt_msg": "gtp: fix use-after-free and null-ptr-deref in gtp_genl_dump_pdp()" }, - "CVE-2023-3220": { - "cmt_msg": "drm/msm/dpu: Add check for pstates", - "cmt_id": "c745fd463ccf21943cfc35cb8842a33dda2ae259" + "CVE-2024-26756": { + "cmt_msg": "md: Don't register sync_thread for reshape directly" }, - "CVE-2023-2985": { - "cmt_msg": "fs: hfsplus: fix UAF issue in hfsplus_put_super", - "cmt_id": "f348b373cebeaa91bf3552099026951189f14436" + "CVE-2021-28038": { + "cmt_msg": "Xen/gnttab: handle p2m update errors on a per-slot basis" }, - "CVE-2023-1079": { - "cmt_msg": "HID: asus: use spinlock to safely schedule workers", - "cmt_id": "b08bcfb4c97d7bd41b362cff44b2c537ce9e8540" + "CVE-2020-27068": { + "cmt_msg": "cfg80211: add missing policy for NL80211_ATTR_STATUS_CODE" }, - "CVE-2023-25012": { - "cmt_msg": "HID: bigben: use spinlock to safely schedule workers", - "cmt_id": "90289e71514e9533a9c44d694e2b492be9ed2b77" + "CVE-2020-14305": { + "cmt_msg": "netfilter: helpers: remove data_len usage for inkernel helpers" }, - "CVE-2023-1076": { - "cmt_msg": "tun: tun_chr_open(): correctly initialize socket uid", - "cmt_id": "4aa4b4b3b3e9551c4de2bf2987247c28805fb8f6" + "CVE-2022-2964": { + "cmt_msg": "net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup" }, - "CVE-2023-1077": { - "cmt_msg": "sched/rt: pick_next_rt_entity(): check list_entry", - "cmt_id": "1099004ae1664703ec573fc4c61ffb24144bcb63" + "CVE-2024-26689": { + "cmt_msg": "ceph: prevent use-after-free in encode_cap_msg()" }, - "CVE-2023-39191": { - "cmt_msg": "bpf: Fix state pruning for STACK_DYNPTR stack slots", - "cmt_id": "720d2504791a93becde81c335abcea2f42d066a7" + "CVE-2022-2961": { + "cmt_msg": "" }, - "CVE-2023-45863": { - "cmt_msg": "kobject: Fix slab-out-of-bounds in fill_kobj_path()", - "cmt_id": "e6ca1549afb2b495e61a8fb53ae942193ef823e0" + "CVE-2024-26686": { + "cmt_msg": "fs/proc: do_task_stat: use sig->stats_lock to gather the threads/children stats" }, - "CVE-2023-1118": { - "cmt_msg": "media: rc: Fix use-after-free bugs caused by ene_tx_irqsim()", - "cmt_id": "182ea492aae5b64067277e60a4ea5995c4628555" - } - }, - "6.2.5": { - "CVE-2023-7192": { - "cmt_msg": "netfilter: ctnetlink: fix possible refcount leak in ctnetlink_create_conntrack()", - "cmt_id": "033ac6ea4b513f9a4a20882f431f68cea307ba87" + "CVE-2024-26687": { + "cmt_msg": "xen/events: close evtchn after mapping cleanup" }, - "CVE-2023-45862": { - "cmt_msg": "USB: ene_usb6250: Allocate enough memory for full object", - "cmt_id": "5ee39d2216dc98a894ffc38d15e1ef2d41e2266b" + "CVE-2023-3268": { + "cmt_msg": "relayfs: fix out-of-bounds access in relay_file_read" }, - "CVE-2023-1829": { - "cmt_msg": "net/sched: Retire tcindex classifier", - "cmt_id": "372ae77cf11d11fb118cbe2d37def9dd5f826abd" - } - }, - "6.2.7": { - "CVE-2023-28466": { - "cmt_msg": "net: tls: fix possible race condition between do_tls_getsockopt_conf() and do_tls_setsockopt_conf()", - "cmt_id": "5231fa057bb0e52095591b303cf95ebd17bc62ce" - } - }, - "6.2.8": { - "CVE-2023-30456": { - "cmt_msg": "KVM: nVMX: add missing consistency checks for CR0 and CR4", - "cmt_id": "71d05b9fa0bfc131a6e2250dea045a818ff25550" + "CVE-2023-45871": { + "cmt_msg": "igb: set max size RX buffer when store bad packet is enabled" }, - "CVE-2023-2235": { - "cmt_msg": "perf: Fix check before add_event_to_groups() in perf_group_detach()", - "cmt_id": "2c6d1b32838d8cf0114dfdbbb93f4d808e498760" + "CVE-2020-12114": { + "cmt_msg": "make struct mountpoint bear the dentry reference to mountpoint, not struct mount" }, - "CVE-2023-1855": { - "cmt_msg": "hwmon: (xgene) Fix use after free bug in xgene_hwmon_remove due to race condition", - "cmt_id": "eacd1f6bb43ac4b9de3bf886083a71c18d5f329f" + "CVE-2021-4218": { + "cmt_msg": "sysctl: pass kernel pointers to ->proc_handler" }, - "CVE-2023-1990": { - "cmt_msg": "nfc: st-nci: Fix use after free bug in ndlc_remove due to race condition", - "cmt_id": "f589e5b56c562d99ea74e05b1c3f0eab78aa17a3" - } - }, - "6.2.9": { - "CVE-2023-2483": { - "cmt_msg": "net: qcom/emac: Fix use after free bug in emac_remove due to race condition", - "cmt_id": "514dc3d0f176d280dc2d3cd25e898a7ec329e878" + "CVE-2023-0266": { + "cmt_msg": "ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF" }, - "CVE-2023-30772": { - "cmt_msg": "power: supply: da9150: Fix use after free bug in da9150_charger_remove due to race condition", - "cmt_id": "a7d686b36aa8021ee96128290ac3b58c4c1f6297" + "CVE-2019-10142": { + "cmt_msg": "drivers/virt/fsl_hypervisor.c: prevent integer overflow in ioctl" }, - "CVE-2023-33203": { - "cmt_msg": "net: qcom/emac: Fix use after free bug in emac_remove due to race condition", - "cmt_id": "514dc3d0f176d280dc2d3cd25e898a7ec329e878" + "CVE-2023-52640": { + "cmt_msg": "fs/ntfs3: Fix oob in ntfs_listxattr" }, - "CVE-2023-33288": { - "cmt_msg": "power: supply: bq24190: Fix use after free bug in bq24190_remove due to race condition", - "cmt_id": "2da4b860f3055ae40a809c020398778e6c27b856" + "CVE-2023-52641": { + "cmt_msg": "fs/ntfs3: Add NULL ptr dereference checking at the end of attr_allocate_frame()" }, - "CVE-2023-28866": { - "cmt_msg": "Bluetooth: HCI: Fix global-out-of-bounds", - "cmt_id": "8497222b22b591c6b2d106e0e3c1672ffe4e10e0" + "CVE-2021-0399": { + "cmt_msg": "" }, - "CVE-2023-1670": { - "cmt_msg": "xirc2ps_cs: Fix use after free bug in xirc2ps_detach", - "cmt_id": "9c515f3290456bb6850bd7ee29d5bf6652d7f103" + "CVE-2023-52488": { + "cmt_msg": "serial: sc16is7xx: convert from _raw_ to _noinc_ regmap functions for FIFO" }, - "CVE-2022-4269": { - "cmt_msg": "act_mirred: use the backlog for nested calls to mirred ingress", - "cmt_id": "8c9e553c58a491ad328c622441e08178373442dc" + "CVE-2023-52489": { + "cmt_msg": "mm/sparsemem: fix race in accessing memory_section->usage" }, - "CVE-2023-1989": { - "cmt_msg": "Bluetooth: btsdio: fix use after free bug in btsdio_remove due to unfinished work", - "cmt_id": "c59c65a14e8f7d738429648833f3bb3f9df0513f" + "CVE-2023-52484": { + "cmt_msg": "iommu/arm-smmu-v3: Fix soft lockup triggered by arm_smmu_mm_invalidate_range" }, - "CVE-2023-2194": { - "cmt_msg": "i2c: xgene-slimpro: Fix out-of-bounds bug in xgene_slimpro_i2c_xfer()", - "cmt_id": "cc3c3ee6d035d38f116a6dec88acf7f74598aebd" + "CVE-2020-2732": { + "cmt_msg": "KVM: nVMX: Don't emulate instructions in guest mode" }, - "CVE-2023-1583": { - "cmt_msg": "io_uring/rsrc: fix null-ptr-deref in io_file_bitmap_get()", - "cmt_id": "2ff9f7319b915acc42cf8fcf743589f926f4a014" - } - }, - "6.2.10": { - "CVE-2023-1611": { - "cmt_msg": "btrfs: fix race between quota disable and quota assign ioctls", - "cmt_id": "4caab245b0469ce9258ba099a41e909f5d307b33" - } - }, - "6.2.12": { - "CVE-2023-38409": { - "cmt_msg": "fbcon: set_con2fb_map needs to set con2fb_map!", - "cmt_id": "62055fa6fbf8f1f1457f5d6a7d17ce1a45972613" + "CVE-2023-52486": { + "cmt_msg": "drm: Don't unref the same fb many times by mistake due to deadlock handling" }, - "CVE-2023-1859": { - "cmt_msg": "9p/xen : Fix use after free bug in xen_9pfs_front_remove due to race condition", - "cmt_id": "e7dcd834af53c79418ca3cd1c42749a314b9f7dc" - } - }, - "6.2.13": { - "CVE-2023-2156": { - "cmt_msg": "net: rpl: fix rpl header size calculation", - "cmt_id": "191642f5cfb38c0e44fb4783a37530bae15b8f8e" + "CVE-2023-52480": { + "cmt_msg": "ksmbd: fix race condition between session lookup and expire" }, - "CVE-2023-2163": { - "cmt_msg": "bpf: Fix incorrect verifier pruning due to missing register precision taints", - "cmt_id": "71035a0508c04827b91a5bfeb2c9ef374f321e65" + "CVE-2023-52481": { + "cmt_msg": "arm64: errata: Add Cortex-A520 speculative unprivileged load workaround" }, - "CVE-2023-31436": { - "cmt_msg": "net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg", - "cmt_id": "420d014b19ff119e210ecc075ff611fe7844690c" + "CVE-2023-52482": { + "cmt_msg": "x86/srso: Add SRSO mitigation for Hygon processors" }, - "CVE-2023-2248": { - "cmt_msg": "net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg", - "cmt_id": "420d014b19ff119e210ecc075ff611fe7844690c" + "CVE-2023-4128": { + "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free" }, - "CVE-2023-4133": { - "cmt_msg": "cxgb4: fix use after free bugs caused by circular dependency problem", - "cmt_id": "7977bb80817b552d97bcc8a1ddf2b3029ca5b6a8" - } - }, - "6.2.14": { - "CVE-2023-1380": { - "cmt_msg": "wifi: brcmfmac: slab-out-of-bounds read in brcmf_get_assoc_ies()", - "cmt_id": "228186629ea970cc78b7d7d5f593f2d32fddf9f6" + "CVE-2021-47128": { + "cmt_msg": "bpf, lockdown, audit: Fix buggy SELinux lockdown permission checks" }, - "CVE-2023-2002": { - "cmt_msg": "bluetooth: Perform careful capability checks in hci_sock_ioctl()", - "cmt_id": "727b3ea80f3fdda6c686806ce3579face0415c76" - } - }, - "6.2.15": { - "CVE-2023-35829": { - "cmt_msg": "media: rkvdec: fix use after free bug in rkvdec_remove", - "cmt_id": "26f55569eeb045db9fceda0a5523521c2e76d8aa" + "CVE-2017-6214": { + "cmt_msg": "tcp: avoid infinite loop in tcp_splice_read()" }, - "CVE-2023-0160": { - "cmt_msg": "bpf, sockmap: fix deadlocks in the sockhash and sockmap", - "cmt_id": "d0e34aaea13391e28069c50de5519300d408e985" + "CVE-2017-8065": { + "cmt_msg": "crypto: ccm - move cbcmac input off the stack" }, - "CVE-2023-35828": { - "cmt_msg": "usb: gadget: udc: renesas_usb3: Fix use after free bug in renesas_usb3_remove due to race condition", - "cmt_id": "1029639643c326396ce8e07a9f52ce7165c021c3" + "CVE-2017-8064": { + "cmt_msg": "[media] dvb-usb-v2: avoid use-after-free" }, - "CVE-2023-32233": { - "cmt_msg": "netfilter: nf_tables: deactivate anonymous set from preparation phase", - "cmt_id": "6b0801dcc1aa4373d28ac8ee396788d2e715c495" + "CVE-2021-47122": { + "cmt_msg": "net: caif: fix memory leak in caif_device_notify" }, - "CVE-2023-32254": { - "cmt_msg": "ksmbd: fix racy issue under cocurrent smb2 tree disconnect", - "cmt_id": "dc1c17716c099c90948ebb83e2170dd75a3be6b6" + "CVE-2021-47121": { + "cmt_msg": "net: caif: fix memory leak in cfusbl_device_notify" }, - "CVE-2023-35824": { - "cmt_msg": "media: dm1105: Fix use after free bug in dm1105_remove due to race condition", - "cmt_id": "ad998076d42b394ca22e41e91c59a6056be6098d" + "CVE-2021-47125": { + "cmt_msg": "sch_htb: fix refcount leak in htb_parent_to_leaf_offload" }, - "CVE-2023-3268": { - "cmt_msg": "relayfs: fix out-of-bounds access in relay_file_read", - "cmt_id": "c86ec32b864d5247602c71986e0494d12f6c4d70" + "CVE-2021-47124": { + "cmt_msg": "io_uring: fix link timeout refs" }, - "CVE-2023-3312": { - "cmt_msg": "cpufreq: qcom-cpufreq-hw: fix double IO unmap and resource release on exit", - "cmt_id": "0dac12ab5780e293b8dc24e513f5c2bf9f93c524" + "CVE-2019-15118": { + "cmt_msg": "ALSA: usb-audio: Fix a stack buffer overflow bug in check_input_term" }, - "CVE-2023-3317": { - "cmt_msg": "wifi: mt76: mt7921: Fix use-after-free in fw features query.", - "cmt_id": "f1d2977584eb315a88956e457de7c800cb010478" + "CVE-2019-12818": { + "cmt_msg": "net: nfc: Fix NULL dereference on nfc_llcp_build_tlv fails" }, - "CVE-2023-2269": { - "cmt_msg": "dm ioctl: fix nested locking in table_clear() to remove deadlock concern", - "cmt_id": "243093d536fe3cc78b450f1beb8d584505ea3193" + "CVE-2019-12819": { + "cmt_msg": "mdio_bus: Fix use-after-free on device_register fails" }, - "CVE-2023-32248": { - "cmt_msg": "ksmbd: fix NULL pointer dereference in smb2_get_info_filesystem()", - "cmt_id": "b35f6c031b87d9e51f141ff6de0ea59756a8e313" + "CVE-2023-0394": { + "cmt_msg": "ipv6: raw: Deduct extension header length in rawv6_push_pending_frames" }, - "CVE-2023-35826": { - "cmt_msg": "media: cedrus: fix use after free bug in cedrus_remove due to race condition", - "cmt_id": "a858e35c62966761cc2bed2e4123cf68d7df546c" + "CVE-2019-19332": { + "cmt_msg": "KVM: x86: fix out-of-bounds write in KVM_GET_EMULATED_CPUID (CVE-2019-19332)" }, - "CVE-2023-35823": { - "cmt_msg": "media: saa7134: fix use after free bug in saa7134_finidev due to race condition", - "cmt_id": "efccd54c41887e66a03bf7af860ff5eb77c47fcf" - } - }, - "6.2.16": { - "CVE-2023-32258": { - "cmt_msg": "ksmbd: fix racy issue from smb2 close and logoff with multichannel", - "cmt_id": "de428966b40c8b8abe35592ded2e9f4d366ffc38" + "CVE-2019-15117": { + "cmt_msg": "ALSA: usb-audio: Fix an OOB bug in parse_audio_mixer_unit" }, - "CVE-2023-32257": { - "cmt_msg": "ksmbd: fix racy issue from session setup and logoff", - "cmt_id": "d270631c21e68fb8016d6e231d022d7023a2df6f" + "CVE-2022-25258": { + "cmt_msg": "USB: gadget: validate interface OS descriptor requests" }, - "CVE-2024-0775": { - "cmt_msg": "ext4: improve error recovery code paths in __ext4_remount()", - "cmt_id": "d2e11d152824deeeaa0d70eb8906a65261838ce2" + "CVE-2020-3702": { + "cmt_msg": "ath: Use safer key clearing with key cache entries" }, - "CVE-2023-32252": { - "cmt_msg": "ksmbd: fix racy issue from session setup and logoff", - "cmt_id": "d270631c21e68fb8016d6e231d022d7023a2df6f" + "CVE-2023-3117": { + "cmt_msg": "netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE" }, - "CVE-2023-32250": { - "cmt_msg": "ksmbd: fix racy issue from session setup and logoff", - "cmt_id": "d270631c21e68fb8016d6e231d022d7023a2df6f" + "CVE-2023-3111": { + "cmt_msg": "btrfs: unset reloc control if transaction commit fails in prepare_to_relocate()" }, - "CVE-2023-32247": { - "cmt_msg": "ksmbd: destroy expired sessions", - "cmt_id": "750a2d772e9d9ff377fd32e3b6797bf2cd847a7a" + "CVE-2019-3882": { + "cmt_msg": "vfio/type1: Limit DMA mappings per container" }, - "CVE-2023-34256": { - "cmt_msg": "ext4: avoid a potential slab-out-of-bounds in ext4_group_desc_csum", - "cmt_id": "c06f5f1ecab83772b1e06ea5dcfe5ebb5927a43f" - } - }, - "outstanding": { - "CVE-2023-20593": { - "cmt_msg": "x86/cpu/amd: Add a Zenbleed fix" + "CVE-2024-24861": { + "cmt_msg": "media: xc4000: Fix atomicity violation in xc4000_get_frequency" }, - "CVE-2020-26556": { - "cmt_msg": "" + "CVE-2019-18675": { + "cmt_msg": "mmap: introduce sane default mmap limits" }, - "CVE-2020-26557": { + "CVE-2024-24864": { "cmt_msg": "" }, - "CVE-2023-34324": { - "cmt_msg": "xen/events: replace evtchn_rwlock with RCU" + "CVE-2017-9605": { + "cmt_msg": "drm/vmwgfx: Make sure backup_handle is always valid" }, - "CVE-2023-4015": { - "cmt_msg": "netfilter: nf_tables: skip immediate deactivate in _PREPARE_ERROR" + "CVE-2022-36946": { + "cmt_msg": "netfilter: nf_queue: do not allow packet truncation below transport header offset" }, - "CVE-2019-20794": { - "cmt_msg": "" + "CVE-2018-19824": { + "cmt_msg": "ALSA: usb-audio: Fix UAF decrement if card has no live interfaces in card.c" }, - "CVE-2020-26559": { - "cmt_msg": "" + "CVE-2022-21166": { + "cmt_msg": "x86/speculation/mmio: Enable CPU Fill buffer clearing on idle" }, - "CVE-2020-35501": { - "cmt_msg": "" + "CVE-2016-9191": { + "cmt_msg": "sysctl: Drop reference added by grab_header in proc_sys_readdir" }, - "CVE-2023-4010": { - "cmt_msg": "" + "CVE-2021-29650": { + "cmt_msg": "netfilter: x_tables: Use correct memory barriers." }, - "CVE-2023-6176": { - "cmt_msg": "net/tls: do not free tls_rec on async operation in bpf_exec_tx_verdict()" + "CVE-2018-20169": { + "cmt_msg": "USB: check usb_get_extra_descriptor for proper size" }, - "CVE-2023-3269": { - "cmt_msg": "mm: introduce new 'lock_mm_and_find_vma()' page fault helper" + "CVE-2022-28356": { + "cmt_msg": "llc: fix netdevice reference leaks in llc_ui_bind()" }, - "CVE-2023-52458": { - "cmt_msg": "block: add check that partition length needs to be aligned with block size" + "CVE-2018-5750": { + "cmt_msg": "ACPI: sbshc: remove raw pointer from printk() message" }, - "CVE-2023-52457": { - "cmt_msg": "serial: 8250: omap: Don't skip resource freeing if pm_runtime_resume_and_get() failed" + "CVE-2017-7558": { + "cmt_msg": "sctp: Avoid out-of-bounds reads from address storage" }, - "CVE-2018-1121": { - "cmt_msg": "" + "CVE-2022-20166": { + "cmt_msg": "drivers core: Use sysfs_emit and sysfs_emit_at for show(device *...) functions" }, - "CVE-2023-52451": { - "cmt_msg": "powerpc/pseries/memhp: Fix access beyond end of drmem array" + "CVE-2019-10220": { + "cmt_msg": "Convert filldir[64]() from __put_user() to unsafe_put_user()" }, - "CVE-2023-52454": { - "cmt_msg": "nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length" + "CVE-2021-44879": { + "cmt_msg": "f2fs: fix to do sanity check on inode type during garbage collection" }, - "CVE-2023-52453": { - "cmt_msg": "hisi_acc_vfio_pci: Update migration data pointer correctly on saving/resume" + "CVE-2020-9383": { + "cmt_msg": "floppy: check FDC index for errors before assigning it" }, - "CVE-2023-52452": { - "cmt_msg": "bpf: Fix accesses to uninit stack slots" + "CVE-2017-5970": { + "cmt_msg": "ipv4: keep skb->dst around in presence of IP options" }, - "CVE-2023-5090": { - "cmt_msg": "x86: KVM: SVM: always update the x2avic msr interception" + "CVE-2023-1513": { + "cmt_msg": "kvm: initialize all of the kvm_debugregs structure before sending it to userspace" }, - "CVE-2023-38427": { - "cmt_msg": "ksmbd: fix out-of-bound read in deassemble_neg_contexts()" + "CVE-2021-26401": { + "cmt_msg": "x86/speculation: Use generic retpoline by default on AMD" }, - "CVE-2019-19378": { + "CVE-2021-3847": { "cmt_msg": "" }, - "CVE-2023-6238": { + "CVE-2019-9445": { + "cmt_msg": "f2fs: check if file namelen exceeds max value" + }, + "CVE-2019-20934": { + "cmt_msg": "sched/fair: Don't free p->numa_faults with concurrent readers" + }, + "CVE-2011-4916": { "cmt_msg": "" }, - "CVE-2024-0641": { - "cmt_msg": "tipc: fix a potential deadlock on &tx->lock" + "CVE-2023-23039": { + "cmt_msg": "" }, - "CVE-2024-1085": { - "cmt_msg": "netfilter: nf_tables: check if catch-all set element is active in next generation" + "CVE-2017-16646": { + "cmt_msg": "media: dib0700: fix invalid dvb_detach argument" }, - "CVE-2024-1086": { - "cmt_msg": "netfilter: nf_tables: reject QUEUE/DROP verdict parameters" + "CVE-2017-16645": { + "cmt_msg": "Input: ims-psu - check if CDC union descriptor is sane" }, - "CVE-2023-5345": { - "cmt_msg": "fs/smb/client: Reset password pointer to NULL" + "CVE-2017-16643": { + "cmt_msg": "Input: gtco - fix potential out-of-bound access" }, - "CVE-2023-5717": { - "cmt_msg": "perf: Disallow mis-matched inherited group reads" + "CVE-2019-5489": { + "cmt_msg": "Change mincore() to count \"mapped\" pages rather than \"cached\" pages" }, - "CVE-2024-0646": { - "cmt_msg": "net: tls, update curr on splice as well" + "CVE-2017-16649": { + "cmt_msg": "net: cdc_ether: fix divide by 0 on bad descriptors" }, - "CVE-2023-39198": { - "cmt_msg": "drm/qxl: fix UAF on handle creation" + "CVE-2017-16648": { + "cmt_msg": "dvb_frontend: don't use-after-free the frontend struct" }, - "CVE-2024-0340": { - "cmt_msg": "vhost: use kzalloc() instead of kmalloc() followed by memset()" + "CVE-2020-36322": { + "cmt_msg": "fuse: fix bad inode" }, - "CVE-2020-24503": { - "cmt_msg": "" + "CVE-2020-10711": { + "cmt_msg": "netlabel: cope with NULL catmap" }, - "CVE-2020-24502": { - "cmt_msg": "" + "CVE-2020-35508": { + "cmt_msg": "fork: fix copy_process(CLONE_PARENT) race with the exiting ->real_parent" }, - "CVE-2023-39197": { - "cmt_msg": "netfilter: conntrack: dccp: copy entire header to stack buffer, not just basic one" + "CVE-2020-35501": { + "cmt_msg": "" }, - "CVE-2023-38428": { - "cmt_msg": "ksmbd: fix wrong UserName check in session_user" + "CVE-2021-45095": { + "cmt_msg": "phonet: refcount leak in pep_sock_accep" }, - "CVE-2023-39193": { - "cmt_msg": "netfilter: xt_sctp: validate the flag_info count" + "CVE-2024-26685": { + "cmt_msg": "nilfs2: fix potential bug in end_buffer_async_write" }, - "CVE-2023-39192": { - "cmt_msg": "netfilter: xt_u32: validate user space input" + "CVE-2021-32399": { + "cmt_msg": "bluetooth: eliminate the potential race condition when removing the HCI controller" }, - "CVE-2023-38431": { - "cmt_msg": "ksmbd: check the validation of pdu_size in ksmbd_conn_handler_loop" + "CVE-2017-1000410": { + "cmt_msg": "Bluetooth: Prevent stack info leak from the EFS element." }, - "CVE-2023-38430": { - "cmt_msg": "ksmbd: validate smb request protocol id" + "CVE-2022-32250": { + "cmt_msg": "netfilter: nf_tables: disallow non-stateful expression in sets earlier" }, - "CVE-2020-11725": { - "cmt_msg": "" + "CVE-2016-8650": { + "cmt_msg": "mpi: Fix NULL ptr dereference in mpi_powm() " }, - "CVE-2023-3390": { - "cmt_msg": "netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE" + "CVE-2017-5551": { + "cmt_msg": "tmpfs: clear S_ISGID when setting posix ACLs" }, - "CVE-2022-23825": { - "cmt_msg": "" + "CVE-2021-28688": { + "cmt_msg": "xen-blkback: don't leak persistent grants from xen_blkbk_map()" }, - "CVE-2023-3397": { - "cmt_msg": "" + "CVE-2018-10878": { + "cmt_msg": "ext4: always check block group bounds in ext4_init_block_bitmap()" }, - "CVE-2023-4004": { - "cmt_msg": "netfilter: nft_set_pipapo: fix improper element removal" + "CVE-2019-12379": { + "cmt_msg": "consolemap: Fix a memory leaking bug in drivers/tty/vt/consolemap.c" }, - "CVE-2024-26589": { - "cmt_msg": "bpf: Reject variable offset alu on PTR_TO_FLOW_KEYS" + "CVE-2019-12378": { + "cmt_msg": "ipv6_sockglue: Fix a missing-check bug in ip6_ra_control()" }, - "CVE-2024-0584": { - "cmt_msg": "ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet" + "CVE-2016-6213": { + "cmt_msg": "mnt: Add a per mount namespace limit on the number of mounts" }, - "CVE-2023-1476": { - "cmt_msg": "" + "CVE-2017-7895": { + "cmt_msg": "nfsd: stricter decoding of write-like NFSv2/v3 ops" }, - "CVE-2023-4147": { - "cmt_msg": "netfilter: nf_tables: disallow rule addition to bound chain via NFTA_RULE_CHAIN_ID" + "CVE-2020-26145": { + "cmt_msg": "ath10k: drop fragments with multicast DA for PCIe" }, - "CVE-2023-5633": { - "cmt_msg": "drm/vmwgfx: Keep a gem reference to user bos in surfaces" + "CVE-2017-13216": { + "cmt_msg": "staging: android: ashmem: fix a race condition in ASHMEM_SET_SIZE ioctl" }, - "CVE-2021-3864": { - "cmt_msg": "" + "CVE-2020-26147": { + "cmt_msg": "mac80211: assure all fragments are encrypted" }, - "CVE-2022-3606": { - "cmt_msg": "" + "CVE-2020-26141": { + "cmt_msg": "ath10k: Fix TKIP Michael MIC verification for PCIe" }, - "CVE-2019-19814": { + "CVE-2020-26140": { "cmt_msg": "" }, - "CVE-2022-2209": { + "CVE-2020-26143": { "cmt_msg": "" }, - "CVE-2023-51779": { - "cmt_msg": "Bluetooth: af_bluetooth: Fix Use-After-Free in bt_sock_recvmsg" - }, - "CVE-2024-24857": { + "CVE-2020-26142": { "cmt_msg": "" }, - "CVE-2024-23849": { - "cmt_msg": "net/rds: Fix UBSAN: array-index-out-of-bounds in rds_cmsg_recv" + "CVE-2019-17053": { + "cmt_msg": "ieee802154: enforce CAP_NET_RAW for raw sockets" }, - "CVE-2024-1312": { - "cmt_msg": "mm: lock_vma_under_rcu() must check vma->anon_vma under vma lock" + "CVE-2019-17052": { + "cmt_msg": "ax25: enforce CAP_NET_RAW for raw sockets" }, - "CVE-2023-52463": { - "cmt_msg": "efivarfs: force RO when remounting if SetVariable is not supported" + "CVE-2017-14497": { + "cmt_msg": "packet: Don't write vnet header beyond end of buffer" }, - "CVE-2023-38429": { - "cmt_msg": "ksmbd: allocate one more byte for implied bcc[0]" + "CVE-2019-17056": { + "cmt_msg": "nfc: enforce CAP_NET_RAW for raw sockets" }, - "CVE-2023-51043": { - "cmt_msg": "drm/atomic: Fix potential use-after-free in nonblocking commits" + "CVE-2019-17055": { + "cmt_msg": "mISDN: enforce CAP_NET_RAW for raw sockets" }, - "CVE-2023-51042": { - "cmt_msg": "drm/amdgpu: Fix potential fence use-after-free v2" + "CVE-2019-17054": { + "cmt_msg": "appletalk: enforce CAP_NET_RAW for raw sockets" }, - "CVE-2023-7042": { - "cmt_msg": "" + "CVE-2024-26745": { + "cmt_msg": "powerpc/pseries/iommu: IOMMU table is not initialized for kdump over SR-IOV" }, - "CVE-2023-20569": { - "cmt_msg": "x86/bugs: Increase the x86 bugs vector size to two u32s" + "CVE-2024-26744": { + "cmt_msg": "RDMA/srpt: Support specifying the srpt_service_guid parameter" }, - "CVE-2021-26934": { - "cmt_msg": "" + "CVE-2024-26743": { + "cmt_msg": "RDMA/qedr: Fix qedr_create_user_qp error flow" }, - "CVE-2024-26588": { - "cmt_msg": "LoongArch: BPF: Prevent out-of-bounds memory access" + "CVE-2020-29661": { + "cmt_msg": "tty: Fix ->pgrp locking in tiocspgrp()" }, - "CVE-2023-47233": { - "cmt_msg": "" + "CVE-2020-29660": { + "cmt_msg": "tty: Fix ->session locking" }, - "CVE-2023-3141": { - "cmt_msg": "memstick: r592: Fix UAF bug in r592_remove due to race condition" + "CVE-2022-1734": { + "cmt_msg": "nfc: nfcmrvl: main: reorder destructive operations in nfcmrvl_nci_unregister_dev to avoid bugs" }, - "CVE-2023-37454": { - "cmt_msg": "" + "CVE-2024-26748": { + "cmt_msg": "usb: cdns3: fix memory double free when handle zero packet" }, - "CVE-2023-40283": { - "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb" + "CVE-2023-28772": { + "cmt_msg": "seq_buf: Fix overflow in seq_buf_putmem_hex()" }, - "CVE-2016-8660": { - "cmt_msg": "" + "CVE-2024-26699": { + "cmt_msg": "drm/amd/display: Fix array-index-out-of-bounds in dcn35_clkmgr" }, - "CVE-2023-6270": { - "cmt_msg": "" + "CVE-2024-26691": { + "cmt_msg": "KVM: arm64: Fix circular locking dependency" }, - "CVE-2023-3090": { - "cmt_msg": "ipvlan:Fix out-of-bounds caused by unclear skb->cb" + "CVE-2024-26697": { + "cmt_msg": "nilfs2: fix data corruption in dsync block recovery for small block sizes" }, - "CVE-2024-26594": { - "cmt_msg": "ksmbd: validate mech token in session setup" + "CVE-2024-26696": { + "cmt_msg": "nilfs2: fix hang in nilfs_lookup_dirty_data_buffers()" }, - "CVE-2023-5158": { - "cmt_msg": "vringh: don't use vringh_kiov_advance() in vringh_iov_xfer()" + "CVE-2019-15927": { + "cmt_msg": "ALSA: usb-audio: Avoid access before bLength check in build_audio_procunit()" }, - "CVE-2024-26592": { - "cmt_msg": "ksmbd: fix UAF issue in ksmbd_tcp_new_connection()" + "CVE-2019-15926": { + "cmt_msg": "ath6kl: add some bounds checking" }, - "CVE-2024-26593": { - "cmt_msg": "i2c: i801: Fix block process call transactions" + "CVE-2021-38160": { + "cmt_msg": "virtio_console: Assure used length from device is limited" }, - "CVE-2024-26590": { - "cmt_msg": "erofs: fix inconsistent per-file compression format" + "CVE-2019-15219": { + "cmt_msg": "USB: sisusbvga: fix oops in error path of sisusb_probe" }, - "CVE-2024-26591": { - "cmt_msg": "bpf: Fix re-attachment branch in bpf_tracing_prog_attach" + "CVE-2019-15218": { + "cmt_msg": "media: usb: siano: Fix general protection fault in smsusb" }, - "CVE-2020-15802": { + "CVE-2005-3660": { "cmt_msg": "" }, - "CVE-2022-36402": { - "cmt_msg": "drm/vmwgfx: Fix shader stage validation" + "CVE-2017-14106": { + "cmt_msg": "tcp: initialize rcv_mss to TCP_MIN_MSS instead of 0" }, - "CVE-2008-2544": { - "cmt_msg": "" + "CVE-2019-15212": { + "cmt_msg": "USB: rio500: refuse more than one device at a time" }, - "CVE-2023-2898": { - "cmt_msg": "f2fs: fix to avoid NULL pointer dereference f2fs_write_end_io()" + "CVE-2019-15211": { + "cmt_msg": "media: radio-raremono: change devm_k*alloc to k*alloc" }, - "CVE-2024-26598": { - "cmt_msg": "KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache" + "CVE-2019-15217": { + "cmt_msg": "media: usb:zr364xx:Fix KASAN:null-ptr-deref Read in zr364xx_vidioc_querycap" }, - "CVE-2024-26599": { - "cmt_msg": "pwm: Fix out-of-bounds access in of_pwm_single_xlate()" + "CVE-2019-15216": { + "cmt_msg": "USB: yurex: Fix protection fault after device removal" }, - "CVE-2023-21255": { - "cmt_msg": "binder: fix UAF caused by faulty buffer cleanup" + "CVE-2017-1000380": { + "cmt_msg": "ALSA: timer: Fix race between read and ioctl" }, - "CVE-2023-52439": { - "cmt_msg": "uio: Fix use-after-free in uio_open" + "CVE-2019-15214": { + "cmt_msg": "ALSA: core: Fix card races between register and disconnect" }, - "CVE-2023-52438": { - "cmt_msg": "binder: fix use-after-free in shinker's callback" + "CVE-2019-19922": { + "cmt_msg": "sched/fair: Fix low cpu usage with high throttling by removing expiration of cpu-local slices" }, - "CVE-2023-6356": { - "cmt_msg": "" + "CVE-2019-19927": { + "cmt_msg": "drm/ttm: fix incrementing the page pointer for huge pages" }, - "CVE-2024-26582": { - "cmt_msg": "net: tls: fix use-after-free with partial reads and async decrypt" + "CVE-2017-11176": { + "cmt_msg": "mqueue: fix a use-after-free in sys_mq_notify()" }, - "CVE-2023-52456": { - "cmt_msg": "serial: imx: fix tx statemachine deadlock" + "CVE-2023-52498": { + "cmt_msg": "PM: sleep: Fix possible deadlocks in core system-wide PM code" }, - "CVE-2019-15239": { - "cmt_msg": "unknown" + "CVE-2022-2318": { + "cmt_msg": "net: rose: fix UAF bugs caused by timer handler" }, - "CVE-2023-3867": { - "cmt_msg": "ksmbd: add missing compound request handing in some commands" + "CVE-2023-3611": { + "cmt_msg": "net/sched: sch_qfq: account for stab overhead in qfq_enqueue" }, - "CVE-2023-3866": { - "cmt_msg": "ksmbd: validate session id and tree id in the compound request" + "CVE-2023-4132": { + "cmt_msg": "media: usb: siano: Fix warning due to null work_func_t function pointer" }, - "CVE-2007-3719": { + "CVE-2020-26560": { "cmt_msg": "" }, - "CVE-2023-52434": { - "cmt_msg": "smb: client: fix potential OOBs in smb2_parse_contexts()" - }, - "CVE-2023-3863": { - "cmt_msg": "net: nfc: Fix use-after-free caused by nfc_llcp_find_local" + "CVE-2023-4134": { + "cmt_msg": "Input: cyttsp4_core - change del_timer_sync() to timer_shutdown_sync()" }, - "CVE-2023-25775": { - "cmt_msg": "RDMA/irdma: Prevent zero-length STAG registration" + "CVE-2017-9077": { + "cmt_msg": "ipv6/dccp: do not inherit ipv6_mc_list from parent" }, - "CVE-2023-6240": { - "cmt_msg": "" + "CVE-2017-9076": { + "cmt_msg": "ipv6/dccp: do not inherit ipv6_mc_list from parent" }, - "CVE-2022-2961": { - "cmt_msg": "" + "CVE-2017-9075": { + "cmt_msg": "sctp: do not inherit ipv6_{mc|ac|fl}_list from parent" }, - "CVE-2022-45919": { - "cmt_msg": "media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221" + "CVE-2017-9074": { + "cmt_msg": "ipv6: Prevent overrun when parsing v6 header options" }, - "CVE-2024-26586": { - "cmt_msg": "mlxsw: spectrum_acl_tcam: Fix stack corruption" + "CVE-2022-20572": { + "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag" }, - "CVE-2023-21400": { - "cmt_msg": "" + "CVE-2022-42703": { + "cmt_msg": "mm/rmap: Fix anon_vma->degree ambiguity leading to double-reuse" }, - "CVE-2024-23850": { - "cmt_msg": "btrfs: do not ASSERT() if the newly created subvolume already got read" + "CVE-2021-4083": { + "cmt_msg": "fget: check that the fd still exists after getting a ref to it" }, - "CVE-2023-2640": { - "cmt_msg": "" + "CVE-2023-33288": { + "cmt_msg": "power: supply: bq24190: Fix use after free bug in bq24190_remove due to race condition" }, - "CVE-2023-6915": { - "cmt_msg": "ida: Fix crash in ida_free when the bitmap is empty" + "CVE-2017-1000251": { + "cmt_msg": "Bluetooth: Properly check L2CAP config option output buffer length" }, - "CVE-2010-4563": { - "cmt_msg": "" + "CVE-2017-1000252": { + "cmt_msg": "KVM: VMX: Do not BUG() on out-of-bounds guest IRQ" }, - "CVE-2020-26140": { - "cmt_msg": "" + "CVE-2022-29901": { + "cmt_msg": "x86/kvm/vmx: Make noinstr clean" }, - "CVE-2020-26143": { - "cmt_msg": "" + "CVE-2023-52485": { + "cmt_msg": "drm/amd/display: Wake DMCUB before sending a command" }, - "CVE-2020-26142": { - "cmt_msg": "" + "CVE-2023-3106": { + "cmt_msg": "xfrm: fix crash in XFRM_MSG_GETSA netlink handler" }, - "CVE-2023-4155": { - "cmt_msg": "KVM: SEV: only access GHCB fields once" + "CVE-2018-20511": { + "cmt_msg": "net/appletalk: fix minor pointer leak to userspace in SIOCFINDIPDDPRT" }, - "CVE-2023-3777": { - "cmt_msg": "netfilter: nf_tables: skip bound chain on rule flush" + "CVE-2018-20510": { + "cmt_msg": "binder: replace \"%p\" with \"%pK\"" }, - "CVE-2023-3776": { - "cmt_msg": "net/sched: cls_fw: Fix improper refcount update leads to use-after-free" + "CVE-2022-3567": { + "cmt_msg": "ipv6: Fix data races around sk->sk_prot." }, - "CVE-2023-45871": { - "cmt_msg": "igb: set max size RX buffer when store bad packet is enabled" + "CVE-2022-3566": { + "cmt_msg": "tcp: Fix data races around icsk->icsk_af_ops." }, - "CVE-2023-3773": { - "cmt_msg": "xfrm: add forgotten nla_policy for XFRMA_MTIMER_THRESH" + "CVE-2022-3565": { + "cmt_msg": "mISDN: fix use-after-free bugs in l1oip timer handlers" }, - "CVE-2023-3772": { - "cmt_msg": "xfrm: add NULL check in xfrm_update_ae_params" + "CVE-2022-3564": { + "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free caused by l2cap_reassemble_sdu" }, - "CVE-2023-4622": { - "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES" + "CVE-2020-36385": { + "cmt_msg": "RDMA/ucma: Rework ucma_migrate_id() to avoid races with destroy" }, - "CVE-2023-4623": { - "cmt_msg": "net/sched: sch_hfsc: Ensure inner classes have fsc curve" + "CVE-2018-7480": { + "cmt_msg": "blkcg: fix double free of new_blkg in blkcg_init_queue" }, - "CVE-2024-26583": { - "cmt_msg": "tls: fix race between async notify and socket close" + "CVE-2023-0030": { + "cmt_msg": "drm/nouveau/mmu: add more general vmm free/node handling functions" }, - "CVE-2022-3533": { - "cmt_msg": "" + "CVE-2019-11599": { + "cmt_msg": "coredump: fix race condition between mmget_not_zero()/get_task_mm() and core dumping" }, - "CVE-2024-26585": { - "cmt_msg": "tls: fix race between tx work scheduling and socket close" + "CVE-2019-2101": { + "cmt_msg": "media: uvcvideo: Fix 'type' check leading to overflow" }, - "CVE-2024-26584": { - "cmt_msg": "net: tls: handle backlogging of crypto requests" + "CVE-2019-3459": { + "cmt_msg": "Bluetooth: Verify that l2cap_get_conf_opt provides large enough buffer" }, - "CVE-2024-26587": { - "cmt_msg": "net: netdevsim: don't try to destroy PHC on VFs" + "CVE-2020-0444": { + "cmt_msg": "audit: fix error handling in audit_data_to_entry()" }, - "CVE-2022-1247": { - "cmt_msg": "" + "CVE-2017-16526": { + "cmt_msg": "uwb: properly check kthread_run return value" }, - "CVE-2023-51782": { - "cmt_msg": "net/rose: Fix Use-After-Free in rose_ioctl" + "CVE-2017-16527": { + "cmt_msg": "ALSA: usb-audio: Kill stray URB at exiting" }, - "CVE-2023-20588": { - "cmt_msg": "x86/CPU/AMD: Do not leak quotient data after a division by 0" + "CVE-2017-16525": { + "cmt_msg": "USB: serial: console: fix use-after-free after failed setup" }, - "CVE-2023-51780": { - "cmt_msg": "atm: Fix Use-After-Free in do_vcc_ioctl" + "CVE-2022-1836": { + "cmt_msg": "floppy: disable FDRAWCMD by default" }, - "CVE-2023-51781": { - "cmt_msg": "appletalk: Fix Use-After-Free in atalk_ioctl" + "CVE-2017-16528": { + "cmt_msg": "ALSA: seq: Cancel pending autoload work at unbinding device" }, - "CVE-2024-0841": { - "cmt_msg": "" + "CVE-2017-16529": { + "cmt_msg": "ALSA: usb-audio: Check out-of-bounds access by corrupted buffer descriptor" }, - "CVE-2020-10708": { - "cmt_msg": "" + "CVE-2019-2215": { + "cmt_msg": "ANDROID: binder: remove waitqueue when thread exits." }, - "CVE-2023-6121": { - "cmt_msg": "nvmet: nul-terminate the NQNs passed in the connect command" + "CVE-2019-2213": { + "cmt_msg": "binder: fix possible UAF when freeing buffer" }, - "CVE-2022-4543": { - "cmt_msg": "" + "CVE-2018-1087": { + "cmt_msg": "kvm/x86: fix icebp instruction handling" }, - "CVE-2017-13693": { - "cmt_msg": "" + "CVE-2018-17182": { + "cmt_msg": "mm: get rid of vmacache_flush_all() entirely" }, - "CVE-2021-0399": { - "cmt_msg": "" + "CVE-2019-19049": { + "cmt_msg": "of: unittest: fix memory leak in unittest_data_add" }, - "CVE-2017-13694": { - "cmt_msg": "" + "CVE-2018-13053": { + "cmt_msg": "alarmtimer: Prevent overflow for relative nanosleep" }, - "CVE-2023-42755": { - "cmt_msg": "net/sched: Retire rsvp classifier" + "CVE-2023-23559": { + "cmt_msg": "wifi: rndis_wlan: Prevent buffer overflow in rndis_query_oid" }, - "CVE-2023-42754": { - "cmt_msg": "ipv4: fix null-deref in ipv4_link_failure" + "CVE-2020-10720": { + "cmt_msg": "net-gro: fix use-after-free read in napi_gro_frags()" }, - "CVE-2024-0564": { - "cmt_msg": "" + "CVE-2022-20369": { + "cmt_msg": "media: v4l2-mem2mem: Apply DST_QUEUE_OFF_BASE on MMAP buffers across ioctls" }, - "CVE-2012-4542": { - "cmt_msg": "" + "CVE-2022-20368": { + "cmt_msg": "net/packet: fix slab-out-of-bounds access in packet_recvmsg()" }, - "CVE-2023-42753": { - "cmt_msg": "netfilter: ipset: add the missing IP_SET_HASH_WITH_NET0 macro for ip_set_hash_netportnet.c" + "CVE-2022-3424": { + "cmt_msg": "misc: sgi-gru: fix use-after-free error in gru_set_context_option, gru_fault and gru_handle_user_call_os" }, - "CVE-2023-42752": { - "cmt_msg": "igmp: limit igmpv3_newpack() packet size to IP_MAX_MTU" + "CVE-2016-2188": { + "cmt_msg": "USB: iowarrior: fix NULL-deref at probe" }, - "CVE-2023-4128": { - "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free" + "CVE-2017-1000405": { + "cmt_msg": "mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d()" }, - "CVE-2023-2176": { - "cmt_msg": "RDMA/core: Refactor rdma_bind_addr" + "CVE-2017-1000407": { + "cmt_msg": "KVM: VMX: remove I/O port 0x80 bypass on Intel hosts" }, - "CVE-2023-4244": { - "cmt_msg": "netfilter: nf_tables: fix GC transaction races with netns and netlink event exit path" + "CVE-2022-24448": { + "cmt_msg": "NFSv4: Handle case where the lookup of a directory fails" }, - "CVE-2024-0607": { - "cmt_msg": "netfilter: nf_tables: fix pointer math issue in nft_byteorder_eval()" + "CVE-2020-0427": { + "cmt_msg": "pinctrl: devicetree: Avoid taking direct reference to device name string" }, - "CVE-2023-3609": { - "cmt_msg": "net/sched: cls_u32: Fix reference counter leak leading to overflow" + "CVE-2020-26088": { + "cmt_msg": "net/nfc/rawsock.c: add CAP_NET_RAW check." }, - "CVE-2023-46862": { - "cmt_msg": "io_uring/fdinfo: lock SQ thread while retrieving thread cpu/pid" + "CVE-2008-2544": { + "cmt_msg": "" }, - "CVE-2022-48425": { - "cmt_msg": "fs/ntfs3: Validate MFT flags before replaying logs" + "CVE-2023-2248": { + "cmt_msg": "net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg" }, - "CVE-2023-31248": { - "cmt_msg": "netfilter: nf_tables: do not ignore genmask when looking up chain by id" + "CVE-2023-30772": { + "cmt_msg": "power: supply: da9150: Fix use after free bug in da9150_charger_remove due to race condition" }, - "CVE-2024-24859": { - "cmt_msg": "" + "CVE-2017-18017": { + "cmt_msg": "netfilter: xt_TCPMSS: add more sanity tests on tcph->doff" }, - "CVE-2024-24858": { - "cmt_msg": "" + "CVE-2021-3679": { + "cmt_msg": "tracing: Fix bug in rb_per_cpu_empty() that might cause deadloop." }, - "CVE-2005-3660": { - "cmt_msg": "" + "CVE-2022-2586": { + "cmt_msg": "netfilter: nf_tables: do not allow SET_ID to refer to another table" }, - "CVE-2024-24855": { - "cmt_msg": "scsi: lpfc: Fix a possible data race in lpfc_unregister_fcf_rescan()" + "CVE-2016-7042": { + "cmt_msg": "KEYS: Fix short sprintf buffer in /proc/keys show function" }, - "CVE-2023-31085": { - "cmt_msg": "ubi: Refuse attaching if mtd's erasesize is 0" + "CVE-2021-39714": { + "cmt_msg": "staging: android: ion: Drop ion_map_kernel interface" }, - "CVE-2023-31084": { - "cmt_msg": "media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*()" + "CVE-2023-51782": { + "cmt_msg": "net/rose: Fix Use-After-Free in rose_ioctl" }, - "CVE-2023-31083": { - "cmt_msg": "Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO" + "CVE-2023-51780": { + "cmt_msg": "atm: Fix Use-After-Free in do_vcc_ioctl" }, - "CVE-2023-31082": { - "cmt_msg": "" + "CVE-2023-51781": { + "cmt_msg": "appletalk: Fix Use-After-Free in atalk_ioctl" }, - "CVE-2023-31081": { - "cmt_msg": "" + "CVE-2022-2588": { + "cmt_msg": "net_sched: cls_route: remove from list when handle is 0" }, - "CVE-2022-38096": { - "cmt_msg": "" + "CVE-2019-18885": { + "cmt_msg": "btrfs: merge btrfs_find_device and find_device" }, - "CVE-2022-3544": { - "cmt_msg": "" + "CVE-2017-7889": { + "cmt_msg": "mm: Tighten x86 /dev/mem with zeroing reads" }, - "CVE-2024-1151": { - "cmt_msg": "net: openvswitch: limit the number of recursions from action sets" + "CVE-2017-14489": { + "cmt_msg": "scsi: scsi_transport_iscsi: fix the issue that iscsi_if_rx doesn't parse nlmsg properly" }, - "CVE-2023-6039": { - "cmt_msg": "net: usb: lan78xx: reorder cleanup operations to avoid UAF bugs" + "CVE-2024-26733": { + "cmt_msg": "arp: Prevent overflow in arp_req_get()." }, - "CVE-2023-46838": { - "cmt_msg": "xen-netback: don't produce zero-size SKB frags" + "CVE-2024-26738": { + "cmt_msg": "powerpc/pseries/iommu: DLPAR add doesn't completely initialize pci_controller" }, - "CVE-2023-6606": { - "cmt_msg": "smb: client: fix OOB in smbCalcSize()" + "CVE-2024-26739": { + "cmt_msg": "net/sched: act_mirred: don't override retval if we already lost the skb" }, - "CVE-2024-23307": { + "CVE-2022-38096": { "cmt_msg": "" }, - "CVE-2023-5197": { - "cmt_msg": "netfilter: nf_tables: disallow rule removal from chain binding" + "CVE-2017-5715": { + "cmt_msg": "x86/cpufeatures: Add X86_BUG_SPECTRE_V[12]" }, - "CVE-2024-26597": { - "cmt_msg": "net: qualcomm: rmnet: fix global oob in rmnet_policy" + "CVE-2018-3620": { + "cmt_msg": "x86/microcode: Allow late microcode loading with SMT disabled" }, - "CVE-2022-3238": { - "cmt_msg": "" + "CVE-2020-16166": { + "cmt_msg": "random32: update the net random state on interrupt and activity" }, - "CVE-2008-4609": { - "cmt_msg": "" + "CVE-2021-33631": { + "cmt_msg": "ext4: fix kernel BUG in 'ext4_write_inline_data_end()'" }, - "CVE-2023-6610": { - "cmt_msg": "smb: client: fix potential OOB in smb2_dump_detail()" + "CVE-2019-15916": { + "cmt_msg": "net-sysfs: Fix mem leak in netdev_register_kobject" }, - "CVE-2020-14304": { - "cmt_msg": "" + "CVE-2019-15917": { + "cmt_msg": "Bluetooth: hci_ldisc: Postpone HCI_UART_PROTO_READY bit set in hci_uart_set_proto()" }, - "CVE-2024-26595": { - "cmt_msg": "mlxsw: spectrum_acl_tcam: Fix NULL pointer dereference in error path" + "CVE-2017-18344": { + "cmt_msg": "posix-timer: Properly check sigevent->sigev_notify" }, - "CVE-2023-6931": { - "cmt_msg": "perf: Fix perf_event_validate_size()" + "CVE-2024-26648": { + "cmt_msg": "drm/amd/display: Fix variable deferencing before NULL check in edp_setup_replay()" }, - "CVE-2023-6932": { - "cmt_msg": "ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet" + "CVE-2024-26646": { + "cmt_msg": "thermal: intel: hfi: Add syscore callbacks for system-wide PM" }, - "CVE-2020-0347": { - "cmt_msg": "" + "CVE-2018-18690": { + "cmt_msg": "xfs: don't fail when converting shortform attr to long form during ATTR_REPLACE" }, - "CVE-2024-0443": { - "cmt_msg": "blk-cgroup: Flush stats before releasing blkcg_gq" + "CVE-2024-26644": { + "cmt_msg": "btrfs: don't abort filesystem when attempting to snapshot deleted subvolume" }, - "CVE-2023-3610": { - "cmt_msg": "netfilter: nf_tables: fix chain binding transaction logic" + "CVE-2024-26642": { + "cmt_msg": "netfilter: nf_tables: disallow anonymous set with timeout flag" }, - "CVE-2023-3611": { - "cmt_msg": "net/sched: sch_qfq: account for stab overhead in qfq_enqueue" + "CVE-2017-0627": { + "cmt_msg": "media: uvcvideo: Prevent heap overflow when accessing mapped controls" }, - "CVE-2021-3714": { - "cmt_msg": "" + "CVE-2024-26641": { + "cmt_msg": "ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv()" }, - "CVE-2023-4132": { - "cmt_msg": "media: usb: siano: Fix warning due to null work_func_t function pointer" + "CVE-2018-25020": { + "cmt_msg": "bpf: fix truncated jump targets on heavy expansions" }, - "CVE-2023-5972": { - "cmt_msg": "nf_tables: fix NULL pointer dereference in nft_expr_inner_parse()" + "CVE-2023-52469": { + "cmt_msg": "drivers/amd/pm: fix a use-after-free in kv_parse_power_table" }, - "CVE-2019-12456": { - "cmt_msg": "" + "CVE-2021-46904": { + "cmt_msg": "net: hso: fix null-ptr-deref during tty device unregistration" }, - "CVE-2020-26560": { - "cmt_msg": "" + "CVE-2018-7273": { + "cmt_msg": "printk: hash addresses printed with %p" }, - "CVE-2021-3892": { - "cmt_msg": "" + "CVE-2022-0617": { + "cmt_msg": "udf: Fix NULL ptr deref when converting from inline format" }, - "CVE-2023-4134": { - "cmt_msg": "Input: cyttsp4_core - change del_timer_sync() to timer_shutdown_sync()" + "CVE-2023-4459": { + "cmt_msg": "net: vmxnet3: fix possible NULL pointer dereference in vmxnet3_rq_cleanup()" }, - "CVE-2024-22386": { - "cmt_msg": "" + "CVE-2022-20566": { + "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free caused by l2cap_chan_put" }, - "CVE-2023-4921": { - "cmt_msg": "net: sched: sch_qfq: Fix UAF in qfq_dequeue()" + "CVE-2022-20565": { + "cmt_msg": "HID: core: Correctly handle ReportSize being zero" }, - "CVE-2023-6546": { - "cmt_msg": "tty: n_gsm: fix the UAF caused by race condition in gsm_cleanup_mux" + "CVE-2023-1990": { + "cmt_msg": "nfc: st-nci: Fix use after free bug in ndlc_remove due to race condition" }, - "CVE-2023-35788": { - "cmt_msg": "net/sched: flower: fix possible OOB write in fl_set_geneve_opt()" + "CVE-2021-33098": { + "cmt_msg": "ixgbe: fix large MTU request from VF" }, - "CVE-2024-23851": { - "cmt_msg": "dm: limit the number of targets and parameter size area" + "CVE-2022-48619": { + "cmt_msg": "Input: add bounds checking to input_set_capability()" + }, + "CVE-2017-10810": { + "cmt_msg": "drm/virtio: don't leak bo on drm_gem_object_init failure" }, "CVE-2024-24860": { "cmt_msg": "Bluetooth: Fix atomicity violation in {min,max}_key_size_set" }, - "CVE-2023-34319": { - "cmt_msg": "xen/netback: Fix buffer overrun triggered by unusual packet" + "CVE-2018-20509": { + "cmt_msg": "binder: refactor binder ref inc/dec for thread safety" }, - "CVE-2024-24864": { - "cmt_msg": "" + "CVE-2021-47070": { + "cmt_msg": "uio_hv_generic: Fix another memory leak in error handling paths" }, - "CVE-2023-1206": { - "cmt_msg": "tcp: Reduce chance of collisions in inet6_hashfn()." + "CVE-2021-47075": { + "cmt_msg": "nvmet: fix memory leak in nvmet_alloc_ctrl()" }, - "CVE-2023-26242": { - "cmt_msg": "" + "CVE-2021-47076": { + "cmt_msg": "RDMA/rxe: Return CQE error if invalid lkey was supplied" }, - "CVE-2023-4273": { - "cmt_msg": "exfat: check if filename entries exceeds max filename length" + "CVE-2017-8824": { + "cmt_msg": "dccp: CVE-2017-8824: use-after-free in DCCP code" }, - "CVE-2023-35827": { - "cmt_msg": "ravb: Fix use-after-free issue in ravb_tx_timeout_work()" + "CVE-2018-7492": { + "cmt_msg": "rds: Fix NULL pointer dereference in __rds_rdma_map" }, - "CVE-2023-39194": { - "cmt_msg": "net: xfrm: Fix xfrm_address_filter OOB read" + "CVE-2018-20836": { + "cmt_msg": "scsi: libsas: fix a race condition when smp task timeout" }, - "CVE-2023-50431": { - "cmt_msg": "accel/habanalabs: fix information leak in sec_attest_info()" + "CVE-2018-5848": { + "cmt_msg": "wil6210: missing length check in wmi_set_ie" }, - "CVE-2022-3642": { - "cmt_msg": "" + "CVE-2019-10638": { + "cmt_msg": "inet: switch IP ID generator to siphash" }, - "CVE-2023-3117": { - "cmt_msg": "netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE" + "CVE-2019-10639": { + "cmt_msg": "netns: provide pure entropy for net_hash_mix()" }, - "CVE-2024-0639": { - "cmt_msg": "sctp: fix potential deadlock on &net->sctp.addr_wq_lock" + "CVE-2024-26676": { + "cmt_msg": "af_unix: Call kfree_skb() for dead unix_(sk)->oob_skb in GC." }, - "CVE-2024-25741": { + "CVE-2017-14140": { + "cmt_msg": "Sanitize 'move_pages()' permission checks" + }, + "CVE-2020-26557": { "cmt_msg": "" }, - "CVE-2023-52464": { - "cmt_msg": "EDAC/thunderx: Fix possible out-of-bounds string access" + "CVE-2017-16535": { + "cmt_msg": "USB: core: fix out-of-bounds access bug in usb_get_bos_descriptor()" }, - "CVE-2023-52462": { - "cmt_msg": "bpf: fix check for attempt to corrupt spilled pointer" + "CVE-2017-16534": { + "cmt_msg": "USB: core: harden cdc_parse_cdc_header" }, - "CVE-2011-4917": { - "cmt_msg": "" + "CVE-2017-16537": { + "cmt_msg": "media: imon: Fix null-ptr-deref in imon_probe" }, - "CVE-2023-52447": { - "cmt_msg": "bpf: Defer the free of inner map when necessary" + "CVE-2017-16536": { + "cmt_msg": "[media] cx231xx-cards: fix NULL-deref on missing association descriptor" }, - "CVE-2019-15902": { - "cmt_msg": "unknown" + "CVE-2017-16531": { + "cmt_msg": "USB: fix out-of-bounds in usb_set_configuration" }, - "CVE-2024-25739": { - "cmt_msg": "" + "CVE-2017-16530": { + "cmt_msg": "USB: uas: fix bug in handling of alternate settings" }, - "CVE-2023-6531": { - "cmt_msg": "io_uring/af_unix: disable sending io_uring over sockets" + "CVE-2017-16533": { + "cmt_msg": "HID: usbhid: fix out-of-bounds bug" }, - "CVE-2019-15290": { - "cmt_msg": "" + "CVE-2017-16532": { + "cmt_msg": "usb: usbtest: fix NULL pointer dereference" }, - "CVE-2023-3212": { - "cmt_msg": "gfs2: Don't deref jdesc in evict" + "CVE-2024-26779": { + "cmt_msg": "wifi: mac80211: fix race condition on enabling fast-xmit" }, - "CVE-2023-6535": { - "cmt_msg": "" + "CVE-2017-16538": { + "cmt_msg": "media: dvb-usb-v2: lmedm04: Improve logic checking of warm start" }, - "CVE-2023-6536": { - "cmt_msg": "" + "CVE-2016-9084": { + "cmt_msg": "vfio/pci: Fix integer overflows, bitmask check" }, - "CVE-2023-52446": { - "cmt_msg": "bpf: Fix a race condition between btf_put() and map_free()" + "CVE-2016-9083": { + "cmt_msg": "vfio/pci: Fix integer overflows, bitmask check" }, - "CVE-2023-6622": { - "cmt_msg": "netfilter: nf_tables: bail out on mismatching dynset and set expressions" + "CVE-2018-9517": { + "cmt_msg": "l2tp: pass tunnel pointer to ->session_create()" }, - "CVE-2023-38426": { - "cmt_msg": "ksmbd: fix global-out-of-bounds in smb2_find_context_vals" + "CVE-2018-9516": { + "cmt_msg": "HID: debug: check length before copy_to_user()" }, - "CVE-2018-17977": { - "cmt_msg": "" + "CVE-2021-20317": { + "cmt_msg": "lib/timerqueue: Rely on rbtree semantics for next timer" }, - "CVE-2022-26878": { - "cmt_msg": "" + "CVE-2024-26772": { + "cmt_msg": "ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal()" }, - "CVE-2022-41848": { - "cmt_msg": "" + "CVE-2017-2671": { + "cmt_msg": "ping: implement proper locking" }, - "CVE-2022-1116": { - "cmt_msg": "" + "CVE-2018-1092": { + "cmt_msg": "ext4: fail ext4_iget for root directory if unallocated" }, - "CVE-2010-5321": { + "CVE-2018-1093": { + "cmt_msg": "ext4: add validity checks for bitmap block numbers" + }, + "CVE-2021-3864": { "cmt_msg": "" }, - "CVE-2022-40982": { - "cmt_msg": "x86/speculation: Add Gather Data Sampling mitigation" + "CVE-2019-19054": { + "cmt_msg": "media: rc: prevent memory leak in cx23888_ir_probe" }, - "CVE-2018-12930": { - "cmt_msg": "" + "CVE-2019-19057": { + "cmt_msg": "mwifiex: pcie: Fix memory leak in mwifiex_pcie_init_evt_ring" + }, + "CVE-2019-19056": { + "cmt_msg": "mwifiex: pcie: Fix memory leak in mwifiex_pcie_alloc_cmdrsp_buf" + }, + "CVE-2019-19052": { + "cmt_msg": "can: gs_usb: gs_can_open(): prevent memory leak" + }, + "CVE-2019-3846": { + "cmt_msg": "mwifiex: Fix possible buffer overflows at parsing bss descriptor" + }, + "CVE-2017-15537": { + "cmt_msg": "x86/fpu: Don't let userspace set bogus xcomp_bv" + }, + "CVE-2018-5391": { + "cmt_msg": "ip: discard IPv4 datagrams with overlapping segments." }, - "CVE-2018-12931": { + "CVE-2023-20941": { "cmt_msg": "" }, - "CVE-2023-33250": { - "cmt_msg": "iommufd: Call iopt_area_contig_done() under the lock" + "CVE-2017-12188": { + "cmt_msg": "KVM: nVMX: update last_nonleaf_level when initializing nested EPT" }, - "CVE-2024-0565": { - "cmt_msg": "smb: client: fix OOB in receive_encrypted_standard()" + "CVE-2020-10135": { + "cmt_msg": "Bluetooth: Consolidate encryption handling in hci_encrypt_cfm" }, - "CVE-2023-3865": { - "cmt_msg": "ksmbd: fix out-of-bound read in smb2_write" + "CVE-2023-28328": { + "cmt_msg": "media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer()" }, - "CVE-2024-23196": { + "CVE-2017-13693": { "cmt_msg": "" }, - "CVE-2023-38432": { - "cmt_msg": "ksmbd: validate command payload size" + "CVE-2017-13695": { + "cmt_msg": "ACPICA: acpi: acpica: fix acpi operand cache leak in nseval.c" }, - "CVE-2021-39801": { + "CVE-2017-13694": { "cmt_msg": "" }, - "CVE-2021-39800": { - "cmt_msg": "" + "CVE-2024-26647": { + "cmt_msg": "drm/amd/display: Fix late derefrence 'dsc' check in 'link_set_dsc_pps_packet()'" }, - "CVE-2024-23848": { - "cmt_msg": "" + "CVE-2021-3640": { + "cmt_msg": "Bluetooth: sco: Fix lock_sock() blockage by memcpy_from_msg()" }, - "CVE-2023-4881": { - "cmt_msg": "netfilter: nftables: exthdr: fix 4-byte stack OOB write" + "CVE-2020-11608": { + "cmt_msg": "media: ov519: add missing endpoint sanity checks" }, - "CVE-2023-52450": { - "cmt_msg": "perf/x86/intel/uncore: Fix NULL pointer dereference issue in upi_fill_topology()" + "CVE-2020-10732": { + "cmt_msg": "fs/binfmt_elf.c: allocate initialized memory in fill_thread_core_info()" }, - "CVE-2024-22099": { - "cmt_msg": "" + "CVE-2019-9466": { + "cmt_msg": "brcmfmac: add subtype check for event handling in data path" }, - "CVE-2022-45885": { - "cmt_msg": "" + "CVE-2017-17975": { + "cmt_msg": "media: usbtv: prevent double free in error case" }, - "CVE-2022-45884": { - "cmt_msg": "" + "CVE-2019-16921": { + "cmt_msg": "RDMA/hns: Fix init resp when alloc ucontext" }, - "CVE-2022-45887": { - "cmt_msg": "media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb()" + "CVE-2021-0512": { + "cmt_msg": "HID: make arrays usage and value to be the same" }, - "CVE-2022-45886": { - "cmt_msg": "media: dvb-core: Fix use-after-free due on race condition at dvb_net" + "CVE-2022-41222": { + "cmt_msg": "mm/mremap: hold the rmap lock in write mode when moving page table entries." }, - "CVE-2023-46343": { - "cmt_msg": "nfc: nci: fix possible NULL pointer dereference in send_acknowledge()" + "CVE-2017-18595": { + "cmt_msg": "tracing: Fix possible double free on failure of allocating trace buffer" }, - "CVE-2024-21803": { - "cmt_msg": "" + "CVE-2024-26720": { + "cmt_msg": "mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again" }, - "CVE-2023-52340": { - "cmt_msg": "ipv6: remove max_size check inline with ipv4" + "CVE-2024-26726": { + "cmt_msg": "btrfs: don't drop extent_map for free space inode on write error" }, - "CVE-2023-52435": { - "cmt_msg": "net: prevent mss overflow in skb_segment()" + "CVE-2019-6974": { + "cmt_msg": "kvm: fix kvm_ioctl_create_device() reference counting (CVE-2019-6974)" }, - "CVE-2023-4563": { - "cmt_msg": "netfilter: nf_tables: don't skip expired elements during walk" + "CVE-2023-2985": { + "cmt_msg": "fs: hfsplus: fix UAF issue in hfsplus_put_super" }, - "CVE-2023-2124": { - "cmt_msg": "xfs: verify buffer contents when we skip log replay" + "CVE-2017-17806": { + "cmt_msg": "crypto: hmac - require that the underlying hash algorithm is unkeyed" }, - "CVE-2021-3542": { - "cmt_msg": "" + "CVE-2017-17807": { + "cmt_msg": "KEYS: add missing permission check for request_key() destination" }, - "CVE-2023-4569": { - "cmt_msg": "netfilter: nf_tables: deactivate catchall elements in next generation" + "CVE-2017-17805": { + "cmt_msg": "crypto: salsa20 - fix blkcipher_walk API usage" }, - "CVE-2023-6817": { - "cmt_msg": "netfilter: nft_set_pipapo: skip inactive elements during set walk" + "CVE-2023-52519": { + "cmt_msg": "HID: intel-ish-hid: ipc: Disable and reenable ACPI GPE bit" }, - "CVE-2024-26596": { - "cmt_msg": "net: dsa: fix netdev_priv() dereference before check on non-DSA netdevice events" + "CVE-2023-52516": { + "cmt_msg": "dma-debug: don't call __dma_entry_alloc_check_leak() under free_entries_lock" }, - "CVE-2024-24861": { - "cmt_msg": "" + "CVE-2023-52517": { + "cmt_msg": "spi: sun6i: fix race between DMA RX transfer completion and RX FIFO drain" }, - "CVE-2023-52436": { - "cmt_msg": "f2fs: explicitly null-terminate the xattr list" + "CVE-2023-52515": { + "cmt_msg": "RDMA/srp: Do not call scsi_done() from srp_abort()" }, - "CVE-2023-34255": { - "cmt_msg": "xfs: verify buffer contents when we skip log replay" + "CVE-2019-15902": { + "cmt_msg": "unknown" }, - "CVE-2024-25740": { - "cmt_msg": "" + "CVE-2023-52511": { + "cmt_msg": "spi: sun6i: reduce DMA RX transfer width to single byte" }, - "CVE-2018-12929": { - "cmt_msg": "" + "CVE-2019-20054": { + "cmt_msg": "fs/proc/proc_sysctl.c: fix NULL pointer dereference in put_links" }, - "CVE-2018-12928": { + "CVE-2018-17977": { "cmt_msg": "" }, - "CVE-2023-6560": { - "cmt_msg": "io_uring: don't allow discontig pages for IORING_SETUP_NO_MMAP" + "CVE-2024-26659": { + "cmt_msg": "xhci: handle isoc Babble and Buffer Overrun events properly" }, - "CVE-2020-25220": { - "cmt_msg": "" + "CVE-2024-26658": { + "cmt_msg": "bcachefs: grab s_umount only if snapshotting" }, - "CVE-2015-2877": { + "CVE-2010-5321": { "cmt_msg": "" }, - "CVE-2023-1194": { - "cmt_msg": "ksmbd: fix out-of-bound read in parse_lease_state()" + "CVE-2024-26655": { + "cmt_msg": "Fix memory leak in posix_clock_open()" }, - "CVE-2023-1193": { - "cmt_msg": "ksmbd: delete asynchronous work from list" + "CVE-2024-26654": { + "cmt_msg": "ALSA: sh: aica: reorder cleanup operations to avoid UAF bugs" }, - "CVE-2023-1192": { - "cmt_msg": "fs/ntfs3: Validate MFT flags before replaying logs" + "CVE-2024-26656": { + "cmt_msg": "drm/amdgpu: fix use-after-free bug" }, - "CVE-2019-16089": { - "cmt_msg": "" + "CVE-2024-26651": { + "cmt_msg": "sr9800: Add check for usbnet_get_endpoints" }, - "CVE-2023-32629": { - "cmt_msg": "" + "CVE-2024-26650": { + "cmt_msg": "platform/x86: p2sb: Allow p2sb_bar() calls during PCI device probe" }, - "CVE-2022-0400": { - "cmt_msg": "" + "CVE-2022-1048": { + "cmt_msg": "ALSA: pcm: Fix races among concurrent hw_params and hw_free calls" }, - "CVE-2024-22705": { - "cmt_msg": "ksmbd: fix slab-out-of-bounds in smb_strndup_from_utf16()" + "CVE-2023-52475": { + "cmt_msg": "Input: powermate - fix use-after-free in powermate_config_complete" }, - "CVE-2022-44034": { - "cmt_msg": "char: pcmcia: remove all the drivers" + "CVE-2023-52477": { + "cmt_msg": "usb: hub: Guard against accesses to uninitialized BOS descriptors" }, - "CVE-2022-44033": { - "cmt_msg": "char: pcmcia: remove all the drivers" + "CVE-2023-52476": { + "cmt_msg": "perf/x86/lbr: Filter vsyscall addresses" }, - "CVE-2022-44032": { - "cmt_msg": "char: pcmcia: remove all the drivers" + "CVE-2016-10147": { + "cmt_msg": "crypto: mcryptd - Check mcryptd algorithm compatibility" }, - "CVE-2023-21264": { - "cmt_msg": "KVM: arm64: Prevent unconditional donation of unmapped regions from the host" + "CVE-2023-52470": { + "cmt_msg": "drm/radeon: check the alloc_workqueue return value in radeon_crtc_init()" }, - "CVE-2024-25744": { - "cmt_msg": "x86/coco: Disable 32-bit emulation by default on TDX and SEV" + "CVE-2023-52479": { + "cmt_msg": "ksmbd: fix uaf in smb20_oplock_break_ack" }, - "CVE-2023-44466": { - "cmt_msg": "libceph: harden msgr2.1 frame segment length checks" + "CVE-2023-52478": { + "cmt_msg": "HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect" }, - "CVE-2023-4206": { - "cmt_msg": "net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free" + "CVE-2022-26365": { + "cmt_msg": "xen/blkfront: fix leaking data in shared pages" }, - "CVE-2021-3847": { - "cmt_msg": "" + "CVE-2020-12652": { + "cmt_msg": "scsi: mptfusion: Fix double fetch bug in ioctl" }, - "CVE-2023-20941": { - "cmt_msg": "" + "CVE-2020-12653": { + "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_cmd_append_vsie_tlv()" }, - "CVE-2023-52440": { - "cmt_msg": "ksmbd: fix slub overflow in ksmbd_decode_ntlmssp_auth_blob()" + "CVE-2020-12656": { + "cmt_msg": "sunrpc: check that domain table is empty at module unload." }, - "CVE-2023-52441": { - "cmt_msg": "ksmbd: fix out of bounds in init_smb2_rsp_hdr()" + "CVE-2017-14051": { + "cmt_msg": "scsi: qla2xxx: Fix an integer overflow in sysfs code" }, - "CVE-2023-52442": { - "cmt_msg": "ksmbd: validate session id and tree id in compound request" + "CVE-2020-12654": { + "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_ret_wmm_get_status()" }, - "CVE-2023-52443": { - "cmt_msg": "apparmor: avoid crash when parsed profile name is empty" + "CVE-2022-23042": { + "cmt_msg": "xen/netfront: react properly to failing gnttab_end_foreign_access_ref()" }, - "CVE-2023-52444": { - "cmt_msg": "f2fs: fix to avoid dirent corruption" + "CVE-2024-25740": { + "cmt_msg": "" }, - "CVE-2023-52445": { - "cmt_msg": "media: pvrusb2: fix use after free on context disconnection" + "CVE-2022-4744": { + "cmt_msg": "tun: avoid double free in tun_free_netdev" }, - "CVE-2022-25265": { + "CVE-2022-0400": { "cmt_msg": "" }, - "CVE-2011-4916": { + "CVE-2024-25741": { "cmt_msg": "" }, - "CVE-2023-52448": { - "cmt_msg": "gfs2: Fix kernel NULL pointer dereference in gfs2_rgrp_dump" + "CVE-2022-26966": { + "cmt_msg": "sr9700: sanity check for packet length" }, - "CVE-2023-52449": { - "cmt_msg": "mtd: Fix gluebi NULL pointer dereference caused by ftl notifier" + "CVE-2023-1989": { + "cmt_msg": "Bluetooth: btsdio: fix use after free bug in btsdio_remove due to unfinished work" }, - "CVE-2013-7445": { + "CVE-2022-25265": { "cmt_msg": "" }, - "CVE-2023-23039": { - "cmt_msg": "" + "CVE-2020-25285": { + "cmt_msg": "mm/hugetlb: fix a race between hugetlb sysctl handlers" }, - "CVE-2023-52429": { - "cmt_msg": "dm: limit the number of targets and parameter size area" + "CVE-2020-11609": { + "cmt_msg": "media: stv06xx: add missing descriptor sanity checks" + }, + "CVE-2020-25284": { + "cmt_msg": "rbd: require global CAP_SYS_ADMIN for mapping and unmapping" }, "CVE-2023-4208": { "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free" }, - "CVE-2023-46813": { - "cmt_msg": "x86/sev: Check for user-space IOIO pointing to kernel space" - }, - "CVE-2023-39189": { - "cmt_msg": "netfilter: nfnetlink_osf: avoid OOB read" - }, - "CVE-2023-35001": { - "cmt_msg": "netfilter: nf_tables: prevent OOB access in nft_byteorder_eval" + "CVE-2023-4206": { + "cmt_msg": "net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free" }, "CVE-2023-4207": { "cmt_msg": "net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free" }, - "CVE-2023-3640": { - "cmt_msg": "" - } - } - }, - "6.1": { - "6.1": { - "CVE-2022-42329": { - "cmt_msg": "xen/netback: don't call kfree_skb() with interrupts disabled", - "cmt_id": "74e7e1efdad45580cc3839f2a155174cf158f9b5" - }, - "CVE-2022-42328": { - "cmt_msg": "xen/netback: don't call kfree_skb() with interrupts disabled", - "cmt_id": "74e7e1efdad45580cc3839f2a155174cf158f9b5" - }, - "CVE-2022-45934": { - "cmt_msg": "Bluetooth: L2CAP: Fix u8 overflow", - "cmt_id": "bcd70260ef56e0aee8a4fc6cd214a419900b0765" - }, - "CVE-2022-3643": { - "cmt_msg": "xen/netback: Ensure protocol headers don't fall in the non-linear area", - "cmt_id": "ad7f402ae4f466647c3a669b8a6f3e5d4271c84a" - }, - "CVE-2022-4378": { - "cmt_msg": "proc: proc_skip_spaces() shouldn't think it is working on C strings", - "cmt_id": "bce9332220bd677d83b19d21502776ad555a0e73" - }, - "CVE-2023-28327": { - "cmt_msg": "af_unix: Get user_ns from in_skb in unix_diag_get_exact().", - "cmt_id": "b3abe42e94900bdd045c472f9c9be620ba5ce553" - }, - "CVE-2023-2166": { - "cmt_msg": "can: af_can: fix NULL pointer dereference in can_rcv_filter", - "cmt_id": "0acc442309a0a1b01bcdaa135e56e6398a49439c" - } - }, - "6.1.2": { - "CVE-2023-3357": { - "cmt_msg": "HID: amd_sfh: Add missing check for dma_alloc_coherent", - "cmt_id": "8a37cf11dc78b71a5e0ef18aa33af41415b5ca38" + "CVE-2021-47046": { + "cmt_msg": "drm/amd/display: Fix off by one in hdmi_14_process_transaction()" }, - "CVE-2022-3531": { - "cmt_msg": "selftest/bpf: Fix memory leak in kprobe_multi_test", - "cmt_id": "661e952bc9ef798d1d33ba67f2950a3e0bea455f" + "CVE-2020-29370": { + "cmt_msg": "mm: slub: add missing TID bump in kmem_cache_alloc_bulk()" }, - "CVE-2022-3532": { - "cmt_msg": "selftests/bpf: Fix memory leak caused by not destroying skeleton", - "cmt_id": "d7dc8fad67fab906530c50155b12cf6117e99299" + "CVE-2022-20424": { + "cmt_msg": "io_uring: remove io_identity" }, - "CVE-2022-3534": { - "cmt_msg": "libbpf: Fix use-after-free in btf_dump_name_dups", - "cmt_id": "fbe08093fb2334549859829ef81d42570812597d" + "CVE-2022-20422": { + "cmt_msg": "arm64: fix oops in concurrently setting insn_emulation sysctls" }, - "CVE-2023-22997": { - "cmt_msg": "module: Fix NULL vs IS_ERR checking for module_get_next_page", - "cmt_id": "7a779e84b3c451ce4713456a413d3300143747a7" + "CVE-2017-8831": { + "cmt_msg": "[media] saa7164: fix double fetch PCIe access condition" }, - "CVE-2022-3424": { - "cmt_msg": "misc: sgi-gru: fix use-after-free error in gru_set_context_option, gru_fault and gru_handle_user_call_os", - "cmt_id": "4e947fc71bec7c7da791f8562d5da233b235ba5e" + "CVE-2022-45934": { + "cmt_msg": "Bluetooth: L2CAP: Fix u8 overflow" }, - "CVE-2023-28328": { - "cmt_msg": "media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer()", - "cmt_id": "6b60cf73a931af34b7a0a3f467a79d9fe0df2d70" + "CVE-2021-4197": { + "cmt_msg": "cgroup: Use open-time credentials for process migraton perm checks" }, - "CVE-2023-26606": { - "cmt_msg": "fs/ntfs3: Fix slab-out-of-bounds read in ntfs_trim_fs", - "cmt_id": "f2e58e95273ce072ca95a2afa1f274825a1e1772" - } - }, - "6.1.3": { - "CVE-2022-4379": { - "cmt_msg": "NFSD: fix use-after-free in __nfs42_ssc_open()", - "cmt_id": "650b69b17cfd79f51476d93c2c63bfb73280a77a" + "CVE-2020-24503": { + "cmt_msg": "" }, - "CVE-2022-48423": { - "cmt_msg": "fs/ntfs3: Validate resident attribute name", - "cmt_id": "2f041a19f4eb72bcc851f9e3a15f3cfd1ae1addf" + "CVE-2020-24502": { + "cmt_msg": "" }, - "CVE-2022-48424": { - "cmt_msg": "fs/ntfs3: Validate attribute name offset", - "cmt_id": "b343c40bb7ff9095430c3f31468a59f8a760dabd" + "CVE-2024-26774": { + "cmt_msg": "ext4: avoid dividing by 0 in mb_update_avg_fragment_size() when block bitmap corrupt" }, - "CVE-2023-26544": { - "cmt_msg": "fs/ntfs3: Fix slab-out-of-bounds read in run_unpack", - "cmt_id": "d34485d40b6a263d65bc476554299c42b2ec0187" - } - }, - "6.1.4": { - "CVE-2022-36280": { - "cmt_msg": "drm/vmwgfx: Validate the box size for the snooped cursor", - "cmt_id": "622d527decaac0eb65512acada935a0fdc1d0202" + "CVE-2023-31436": { + "cmt_msg": "net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg" }, - "CVE-2022-41218": { - "cmt_msg": "media: dvb-core: Fix UAF due to refcount races at releasing", - "cmt_id": "530ca64b44625f7d39eb1d5efb6f9ff21da991e2" + "CVE-2019-8980": { + "cmt_msg": "exec: Fix mem leak in kernel_read_file" }, - "CVE-2021-33631": { - "cmt_msg": "ext4: fix kernel BUG in 'ext4_write_inline_data_end()'", - "cmt_id": "74ba281971618a76d5067cad7d8b14d549da5e9a" - } - }, - "6.1.5": { - "CVE-2023-23455": { - "cmt_msg": "net: sched: atm: dont intepret cls results when asked to drop", - "cmt_id": "85655c63877aeafdc23226510ea268a9fa0af807" + "CVE-2024-26775": { + "cmt_msg": "aoe: avoid potential deadlock at set_capacity" }, - "CVE-2023-23454": { - "cmt_msg": "net: sched: cbq: dont intepret cls results when asked to drop", - "cmt_id": "dc46e39b727fddc5aacc0272ef83ee872d51be16" + "CVE-2018-14609": { + "cmt_msg": "btrfs: relocation: Only remove reloc rb_trees if reloc control has been initialized" }, - "CVE-2023-0045": { - "cmt_msg": "x86/bugs: Flush IBP in ib_prctl_set()", - "cmt_id": "e8377f0456fb6738a4668d4df16c13d7599925fd" + "CVE-2024-23851": { + "cmt_msg": "dm: limit the number of targets and parameter size area" }, - "CVE-2023-0461": { - "cmt_msg": "net/ulp: prevent ULP without clone op from entering the LISTEN status", - "cmt_id": "7d242f4a0c8319821548c7176c09a6e0e71f223c" + "CVE-2020-27777": { + "cmt_msg": "powerpc/rtas: Restrict RTAS requests from userspace" }, - "CVE-2023-0210": { - "cmt_msg": "ksmbd: check nt_len to be at least CIFS_ENCPWD_SIZE in ksmbd_decode_ntlmssp_auth_blob", - "cmt_id": "5e7d97dbae25ab4cb0ac1b1b98aebc4915689a86" + "CVE-2019-11486": { + "cmt_msg": "tty: mark Siemens R3964 line discipline as BROKEN" }, - "CVE-2022-3707": { - "cmt_msg": "drm/i915/gvt: fix double free bug in split_2MB_gtt_entry", - "cmt_id": "1022519da69d99d455c58ca181a6c499c562c70e" - } - }, - "6.1.6": { - "CVE-2023-0266": { - "cmt_msg": "ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF", - "cmt_id": "d6ad4bd1d896ae1daffd7628cd50f124280fb8b1" + "CVE-2019-11487": { + "cmt_msg": "fs: prevent page refcount overflow in pipe_buf_get" }, - "CVE-2022-47929": { - "cmt_msg": "net: sched: disallow noqueue for qdisc classes", - "cmt_id": "e8988e878af693ac13b0fa80ba2e72d22d68f2dd" - } - }, - "6.1.7": { - "CVE-2022-38457": { - "cmt_msg": "drm/vmwgfx: Remove rcu locks from user resources", - "cmt_id": "7ac9578e45b20e3f3c0c8eb71f5417a499a7226a" + "CVE-2018-8043": { + "cmt_msg": "net: phy: mdio-bcm-unimac: fix potential NULL dereference in unimac_mdio_probe()" }, - "CVE-2023-0179": { - "cmt_msg": "netfilter: nft_payload: incorrect arithmetics when fetching VLAN header bits", - "cmt_id": "76ef74d4a379faa451003621a84e3498044e7aa3" + "CVE-2019-20908": { + "cmt_msg": "efi: Restrict efivar_ssdt_load when the kernel is locked down" }, - "CVE-2023-0394": { - "cmt_msg": "ipv6: raw: Deduct extension header length in rawv6_push_pending_frames", - "cmt_id": "0afa5f0736584411771299074bbeca8c1f9706d4" + "CVE-2019-19060": { + "cmt_msg": "iio: imu: adis16400: release allocated memory on failure" }, - "CVE-2022-40133": { - "cmt_msg": "drm/vmwgfx: Remove rcu locks from user resources", - "cmt_id": "7ac9578e45b20e3f3c0c8eb71f5417a499a7226a" - } - }, - "6.1.8": { - "CVE-2022-4382": { - "cmt_msg": "USB: gadgetfs: Fix race between mounting and unmounting", - "cmt_id": "616fd34d017000ecf9097368b13d8a266f4920b3" + "CVE-2019-19061": { + "cmt_msg": "iio: imu: adis16400: fix memory leak" }, - "CVE-2023-0458": { - "cmt_msg": "prlimit: do_prlimit needs to have a speculation check", - "cmt_id": "91185568c99d60534bacf38439846103962d1e2c" + "CVE-2019-19062": { + "cmt_msg": "crypto: user - fix memory leak in crypto_report" }, - "CVE-2023-21102": { - "cmt_msg": "efi: rt-wrapper: Add missing include", - "cmt_id": "72b0e5faa5149f09c6a7a74e4012f29e33509bab" + "CVE-2019-19063": { + "cmt_msg": "rtlwifi: prevent memory leak in rtl_usb_probe" }, - "CVE-2022-4842": { - "cmt_msg": "fs/ntfs3: Fix attr_punch_hole() null pointer derenference", - "cmt_id": "ff3b1a624380c14b81f4e51c48e404a45f047aab" - } - }, - "6.1.9": { - "CVE-2023-21106": { - "cmt_msg": "drm/msm/gpu: Fix potential double-free", - "cmt_id": "8103d53f25ec7b9aa99c134642c6e840e896be71" + "CVE-2017-17741": { + "cmt_msg": "KVM: Fix stack-out-of-bounds read in write_mmio" }, - "CVE-2023-3358": { - "cmt_msg": "HID: intel_ish-hid: Add check for ishtp_dma_tx_map", - "cmt_id": "9a65e90179ba06eb299badc3e4dc4aa2b1e35af3" + "CVE-2019-19066": { + "cmt_msg": "scsi: bfa: release allocated memory in case of error" }, - "CVE-2023-1652": { - "cmt_msg": "NFSD: fix use-after-free in nfsd4_ssc_setup_dul()", - "cmt_id": "32d5eb95f8f0e362e37c393310b13b9e95404560" + "CVE-2019-19067": { + "cmt_msg": "drm/amdgpu: fix multiple memory leaks in acp_hw_init" }, - "CVE-2023-0386": { - "cmt_msg": "ovl: fail on invalid uid/gid mapping at copy up", - "cmt_id": "42fea1c35254c49cce07c600d026cbc00c6d3c81" + "CVE-2019-19068": { + "cmt_msg": "rtl8xxxu: prevent leaking urb" }, - "CVE-2023-1074": { - "cmt_msg": "sctp: fail if no bound addresses can be used for a given scope", - "cmt_id": "9f08bb650078dca24a13fea1c375358ed6292df3" + "CVE-2017-7184": { + "cmt_msg": "xfrm_user: validate XFRM_MSG_NEWAE XFRMA_REPLAY_ESN_VAL replay_window" }, - "CVE-2023-1073": { - "cmt_msg": "HID: check empty report_list in hid_validate_values()", - "cmt_id": "cdcdc0531a51659527fea4b4d064af343452062d" + "CVE-2017-7187": { + "cmt_msg": "scsi: sg: check length passed to SG_NEXT_CMD_LEN" }, - "CVE-2023-23559": { - "cmt_msg": "wifi: rndis_wlan: Prevent buffer overflow in rndis_query_oid", - "cmt_id": "7794efa358bca8b8a2a80070c6e088a74945f018" - } - }, - "6.1.11": { - "CVE-2023-3161": { - "cmt_msg": "fbcon: Check font dimension limits", - "cmt_id": "5e7f6e2ade57dfd6d133ff7c643abd2079248943" + "CVE-2019-3874": { + "cmt_msg": "sctp: implement memory accounting on tx path" }, - "CVE-2023-3359": { - "cmt_msg": "nvmem: brcm_nvram: Add check for kzalloc", - "cmt_id": "f5249bbae0e736d612d2095ad79dc1389b3e89b5" + "CVE-2017-12193": { + "cmt_msg": "assoc_array: Fix a buggy node-splitting case" }, - "CVE-2023-2162": { - "cmt_msg": "scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress", - "cmt_id": "61e43ebfd243bcbad11be26bd921723027b77441" + "CVE-2017-12192": { + "cmt_msg": "KEYS: prevent KEYCTL_READ on negative key" }, - "CVE-2023-1075": { - "cmt_msg": "net/tls: tls_is_tx_ready() checked list_entry", - "cmt_id": "37c0cdf7e4919e5f76381ac60817b67bcbdacb50" + "CVE-2017-12190": { + "cmt_msg": "fix unbalanced page refcounting in bio_map_user_iov" }, - "CVE-2023-3567": { - "cmt_msg": "vc_screen: move load of struct vc_data pointer in vcs_read() to avoid UAF", - "cmt_id": "8506f16aae9daf354e3732bcfd447e2a97f023df" + "CVE-2020-36516": { + "cmt_msg": "ipv4: avoid using shared IP generator for connected sockets" }, - "CVE-2023-32269": { - "cmt_msg": "netrom: Fix use-after-free caused by accept on already connected socket", - "cmt_id": "5c2227f3f17782d5262ee0979ad30609b3e01f6e" - } - }, - "6.1.12": { - "CVE-2023-1078": { - "cmt_msg": "rds: rds_rm_zerocopy_callback() use list_first_entry()", - "cmt_id": "1d52bbfd469af69fbcae88c67f160ce1b968e7f3" + "CVE-2012-4542": { + "cmt_msg": "" }, - "CVE-2022-27672": { - "cmt_msg": "x86/speculation: Identify processors vulnerable to SMT RSB predictions", - "cmt_id": "cc95b5d240b631e42e2863e1dcb6ad83920cc449" - } - }, - "6.1.13": { - "CVE-2023-1513": { - "cmt_msg": "kvm: initialize all of the kvm_debugregs structure before sending it to userspace", - "cmt_id": "747ca7c8a0c7bce004709143d1cd6596b79b1deb" + "CVE-2018-1000028": { + "cmt_msg": "nfsd: auth: Fix gid sorting when rootsquash enabled" }, - "CVE-2023-1281": { - "cmt_msg": "net/sched: tcindex: update imperfect hash filters respecting rcu", - "cmt_id": "bd662ba56187b5ef8a62a3511371cd38299a507f" + "CVE-2018-1000026": { + "cmt_msg": "bnx2x: disable GSO where gso_size is too big for hardware" }, - "CVE-2023-26545": { - "cmt_msg": "net: mpls: fix stale pointer if allocation fails during device rename", - "cmt_id": "c376227845eef8f2e62e2c29c3cf2140d35dd8e8" + "CVE-2017-2596": { + "cmt_msg": "kvm: fix page struct leak in handle_vmon" }, - "CVE-2023-33952": { - "cmt_msg": "drm/vmwgfx: Do not drop the reference to the handle too soon", - "cmt_id": "0a127ac972404600c99eb141c8d5b5348e53ee4f" + "CVE-2020-36777": { + "cmt_msg": "media: dvbdev: Fix memory leak in dvb_media_device_free()" }, - "CVE-2023-33951": { - "cmt_msg": "drm/vmwgfx: Do not drop the reference to the handle too soon", - "cmt_id": "0a127ac972404600c99eb141c8d5b5348e53ee4f" - } - }, - "6.1.14": { - "CVE-2023-0459": { - "cmt_msg": "uaccess: Add speculation barrier to copy_from_user()", - "cmt_id": "684db631a15779c8f3b2235d507efdfe6bb10278" + "CVE-2020-36775": { + "cmt_msg": "f2fs: fix to avoid potential deadlock" }, - "CVE-2022-2196": { - "cmt_msg": "KVM: VMX: Execute IBPB on emulated VM-exit when guest has IBRS", - "cmt_id": "63fada296062e91ad9f871970d4e7f19e21a6a15" - } - }, - "6.1.16": { - "CVE-2023-3355": { - "cmt_msg": "drm/msm/gem: Add check for kmalloc", - "cmt_id": "31c4251a20fd7addc1bf4fe801f95f9ba1b38990" + "CVE-2021-20292": { + "cmt_msg": "drm/ttm/nouveau: don't call tt destroy callback on alloc failure." }, - "CVE-2023-1998": { - "cmt_msg": "x86/speculation: Allow enabling STIBP with legacy IBRS", - "cmt_id": "08d87c87d6461d16827c9b88d84c48c26b6c994a" + "CVE-2023-2269": { + "cmt_msg": "dm ioctl: fix nested locking in table_clear() to remove deadlock concern" }, - "CVE-2023-1032": { - "cmt_msg": "net: avoid double iput when sock_alloc_file fails", - "cmt_id": "7c7570791b15c3b78e3229ae97825e7eb869c7da" + "CVE-2020-10690": { + "cmt_msg": "ptp: fix the race between the release of ptp_clock and cdev" }, - "CVE-2023-3220": { - "cmt_msg": "drm/msm/dpu: Add check for pstates", - "cmt_id": "dd49cef313e6a62541b55e739261c5943cb06c47" + "CVE-2021-3659": { + "cmt_msg": "net: mac802154: Fix general protection fault" }, - "CVE-2023-2985": { - "cmt_msg": "fs: hfsplus: fix UAF issue in hfsplus_put_super", - "cmt_id": "0c80bef0b7d297ea86e5408fe79c45479e504a26" + "CVE-2021-3653": { + "cmt_msg": "KVM: nSVM: avoid picking up unsupported bits from L2 in int_ctl (CVE-2021-3653)" }, - "CVE-2023-1079": { - "cmt_msg": "HID: asus: use spinlock to safely schedule workers", - "cmt_id": "ee907829b36949c452c6f89485cb2a58e97c048e" + "CVE-2021-3655": { + "cmt_msg": "sctp: validate from_addr_param return" }, - "CVE-2023-25012": { - "cmt_msg": "HID: bigben: use spinlock to safely schedule workers", - "cmt_id": "f2bf592ebd5077661e00aa11e12e054c4c8f6dd0" + "CVE-2019-12614": { + "cmt_msg": "powerpc/pseries/dlpar: Fix a missing check in dlpar_parse_cc_property()" }, - "CVE-2023-1076": { - "cmt_msg": "tun: tun_chr_open(): correctly initialize socket uid", - "cmt_id": "b4ada752eaf1341f47bfa3d8ada377eca75a8d44" + "CVE-2019-12615": { + "cmt_msg": "mdesc: fix a missing-check bug in get_vdev_port_node_info()" }, - "CVE-2023-1077": { - "cmt_msg": "sched/rt: pick_next_rt_entity(): check list_entry", - "cmt_id": "6b4fcc4e8a3016e85766c161daf0732fca16c3a3" + "CVE-2021-3896": { + "cmt_msg": "isdn: cpai: check ctr->cnr to avoid array index out of bound" }, - "CVE-2023-45863": { - "cmt_msg": "kobject: Fix slab-out-of-bounds in fill_kobj_path()", - "cmt_id": "fe4dd80d58ec5633daf5d50671d1341f738508bf" + "CVE-2021-3892": { + "cmt_msg": "" }, - "CVE-2023-1118": { - "cmt_msg": "media: rc: Fix use-after-free bugs caused by ene_tx_irqsim()", - "cmt_id": "029c1410e345ce579db5c007276340d072aac54a" - } - }, - "6.1.18": { - "CVE-2023-7192": { - "cmt_msg": "netfilter: ctnetlink: fix possible refcount leak in ctnetlink_create_conntrack()", - "cmt_id": "4f25d1dff80535f088b8f8568dd731fb098e29b4" + "CVE-2022-27223": { + "cmt_msg": "USB: gadget: validate endpoint index for xilinx udc" }, - "CVE-2023-45862": { - "cmt_msg": "USB: ene_usb6250: Allocate enough memory for full object", - "cmt_id": "ff542083b105c9c72d83899d3f74eeec354f808e" + "CVE-2022-24958": { + "cmt_msg": "usb: gadget: don't release an existing dev->buf" }, - "CVE-2023-1829": { - "cmt_msg": "net/sched: Retire tcindex classifier", - "cmt_id": "3abebc503a5148072052c229c6b04b329a420ecd" - } - }, - "6.1.20": { - "CVE-2023-28466": { - "cmt_msg": "net: tls: fix possible race condition between do_tls_getsockopt_conf() and do_tls_setsockopt_conf()", - "cmt_id": "14c17c673e1bba08032d245d5fb025d1cbfee123" - } - }, - "6.1.21": { - "CVE-2023-30456": { - "cmt_msg": "KVM: nVMX: add missing consistency checks for CR0 and CR4", - "cmt_id": "4bba9c8adec804f03d12dc762e50d083ee88b6b0" + "CVE-2020-36557": { + "cmt_msg": "vt: vt_ioctl: fix VT_DISALLOCATE freeing in-use virtual console" }, - "CVE-2023-2235": { - "cmt_msg": "perf: Fix check before add_event_to_groups() in perf_group_detach()", - "cmt_id": "529546ea2834ce58aa075837d57918740accf713" + "CVE-2020-12888": { + "cmt_msg": "vfio-pci: Invalidate mmaps and block MMIO access on disabled memory" }, - "CVE-2023-1855": { - "cmt_msg": "hwmon: (xgene) Fix use after free bug in xgene_hwmon_remove due to race condition", - "cmt_id": "b2ae1f15cd6fe0cb36e432a179ae7d479ae2e6e0" + "CVE-2023-2194": { + "cmt_msg": "i2c: xgene-slimpro: Fix out-of-bounds bug in xgene_slimpro_i2c_xfer()" }, - "CVE-2023-1990": { - "cmt_msg": "nfc: st-nci: Fix use after free bug in ndlc_remove due to race condition", - "cmt_id": "5e331022b448fbc5e76f24349cd0246844dcad25" - } - }, - "6.1.22": { - "CVE-2023-2483": { - "cmt_msg": "net: qcom/emac: Fix use after free bug in emac_remove due to race condition", - "cmt_id": "5fc2c4e311a9341a2b0e044ab5f33afa37b56226" + "CVE-2017-6353": { + "cmt_msg": "sctp: deny peeloff operation on asocs with threads sleeping on it" }, - "CVE-2023-30772": { - "cmt_msg": "power: supply: da9150: Fix use after free bug in da9150_charger_remove due to race condition", - "cmt_id": "47b2e1a67e6da172bb4cf69ef9dafde4458bde5f" + "CVE-2022-41218": { + "cmt_msg": "media: dvb-core: Fix UAF due to refcount races at releasing" }, - "CVE-2023-33203": { - "cmt_msg": "net: qcom/emac: Fix use after free bug in emac_remove due to race condition", - "cmt_id": "5fc2c4e311a9341a2b0e044ab5f33afa37b56226" + "CVE-2011-4917": { + "cmt_msg": "" }, - "CVE-2023-33288": { - "cmt_msg": "power: supply: bq24190: Fix use after free bug in bq24190_remove due to race condition", - "cmt_id": "84bdb3b76b07f2e62183913a1f5da2d4aa25580a" + "CVE-2021-45485": { + "cmt_msg": "ipv6: use prandom_u32() for ID generation" }, - "CVE-2023-28866": { - "cmt_msg": "Bluetooth: HCI: Fix global-out-of-bounds", - "cmt_id": "b3168abd24245aa0775c5a387dcf94d36ca7e738" + "CVE-2020-0030": { + "cmt_msg": "ANDROID: binder: synchronize_rcu() when using POLLFREE." }, - "CVE-2023-1670": { - "cmt_msg": "xirc2ps_cs: Fix use after free bug in xirc2ps_detach", - "cmt_id": "9d882229d365f68f74028252261ab14a8de7faed" + "CVE-2015-8709": { + "cmt_msg": "mm: Add a user_ns owner to mm_struct and fix ptrace permission checks" }, - "CVE-2022-4269": { - "cmt_msg": "act_mirred: use the backlog for nested calls to mirred ingress", - "cmt_id": "4c8fc3fe28e47e2a495444347375f7354c24b018" + "CVE-2019-18806": { + "cmt_msg": "net: qlogic: Fix memory leak in ql_alloc_large_buffers" }, - "CVE-2023-1989": { - "cmt_msg": "Bluetooth: btsdio: fix use after free bug in btsdio_remove due to unfinished work", - "cmt_id": "cbf8deacb7053ce3e3fed64b277c6c6989e65bba" + "CVE-2018-7754": { + "cmt_msg": "printk: hash addresses printed with %p" }, - "CVE-2023-2194": { - "cmt_msg": "i2c: xgene-slimpro: Fix out-of-bounds bug in xgene_slimpro_i2c_xfer()", - "cmt_id": "7c64e839585eac8048bf67b1c6dcb7a5ca189a2e" + "CVE-2019-3900": { + "cmt_msg": "vhost_net: fix possible infinite loop" }, - "CVE-2023-1583": { - "cmt_msg": "io_uring/rsrc: fix null-ptr-deref in io_file_bitmap_get()", - "cmt_id": "7b100a45dc19ffd708f364ba66601efaca1ccf56" - } - }, - "6.1.23": { - "CVE-2023-1611": { - "cmt_msg": "btrfs: fix race between quota disable and quota assign ioctls", - "cmt_id": "a38ff2024805a30d9b96f52557c6ea0bbc31252a" - } - }, - "6.1.25": { - "CVE-2023-38409": { - "cmt_msg": "fbcon: set_con2fb_map needs to set con2fb_map!", - "cmt_id": "b15df140fe092c3ac28dab32c6b3acdda1a93c63" + "CVE-2022-40982": { + "cmt_msg": "x86/speculation: Add Gather Data Sampling mitigation" }, - "CVE-2023-1859": { - "cmt_msg": "9p/xen : Fix use after free bug in xen_9pfs_front_remove due to race condition", - "cmt_id": "c4002b9d5e837f152a40d1333c56ccb84975147b" - } - }, - "6.1.26": { - "CVE-2023-2156": { - "cmt_msg": "net: rpl: fix rpl header size calculation", - "cmt_id": "9a0b96d03c59ba560b074cdb9b6233493fd5492d" + "CVE-2021-39801": { + "cmt_msg": "" }, - "CVE-2023-2163": { - "cmt_msg": "bpf: Fix incorrect verifier pruning due to missing register precision taints", - "cmt_id": "89603f4c9154e818b9ead1abe08545a053c66ded" + "CVE-2021-39800": { + "cmt_msg": "" }, - "CVE-2023-31436": { - "cmt_msg": "net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg", - "cmt_id": "ce729b06dc33b01f8a6ac84da5ef54154326bf7e" + "CVE-2024-22099": { + "cmt_msg": "Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security" }, - "CVE-2023-2248": { - "cmt_msg": "net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg", - "cmt_id": "ce729b06dc33b01f8a6ac84da5ef54154326bf7e" - } - }, - "6.1.27": { - "CVE-2023-1380": { - "cmt_msg": "wifi: brcmfmac: slab-out-of-bounds read in brcmf_get_assoc_ies()", - "cmt_id": "e29661611e6e71027159a3140e818ef3b99f32dd" + "CVE-2021-4202": { + "cmt_msg": "NFC: reorganize the functions in nci_request" }, - "CVE-2023-2002": { - "cmt_msg": "bluetooth: Perform careful capability checks in hci_sock_ioctl()", - "cmt_id": "47e6893a5b0ad14c0b1c25983a1facb1cf667b6e" - } - }, - "6.1.28": { - "CVE-2023-35829": { - "cmt_msg": "media: rkvdec: fix use after free bug in rkvdec_remove", - "cmt_id": "6a17add9c61030683b9c1fc86878f00a2d318a95" + "CVE-2021-4203": { + "cmt_msg": "af_unix: fix races in sk_peer_pid and sk_peer_cred accesses" }, - "CVE-2023-0160": { - "cmt_msg": "bpf, sockmap: fix deadlocks in the sockhash and sockmap", - "cmt_id": "1d4ac7b0ffc9dc683b8dafc78b8b93177071a02c" + "CVE-2023-52509": { + "cmt_msg": "ravb: Fix use-after-free issue in ravb_tx_timeout_work()" }, - "CVE-2023-35828": { - "cmt_msg": "usb: gadget: udc: renesas_usb3: Fix use after free bug in renesas_usb3_remove due to race condition", - "cmt_id": "df2380520926bdbc264cffab0f45da9a21f304c8" + "CVE-2023-46343": { + "cmt_msg": "nfc: nci: fix possible NULL pointer dereference in send_acknowledge()" }, - "CVE-2023-32233": { - "cmt_msg": "netfilter: nf_tables: deactivate anonymous set from preparation phase", - "cmt_id": "4507918cd1f8b80f21a396fa0531d53e372bed66" + "CVE-2023-52507": { + "cmt_msg": "nfc: nci: assert requested protocol is valid" }, - "CVE-2023-32254": { - "cmt_msg": "ksmbd: fix racy issue under cocurrent smb2 tree disconnect", - "cmt_id": "bd80d35725a0cf4df9307bfe2f1a3b2cb983d8e6" + "CVE-2023-52506": { + "cmt_msg": "LoongArch: Set all reserved memblocks on Node#0 at initialization" }, - "CVE-2023-35824": { - "cmt_msg": "media: dm1105: Fix use after free bug in dm1105_remove due to race condition", - "cmt_id": "305262a23c949010a056bd81b6e84051fd72a567" + "CVE-2023-52501": { + "cmt_msg": "ring-buffer: Do not attempt to read past \"commit\"" }, - "CVE-2023-3268": { - "cmt_msg": "relayfs: fix out-of-bounds access in relay_file_read", - "cmt_id": "f6ee841ff2169d7a7d045340ee72b2b9de9f06c5" + "CVE-2023-52500": { + "cmt_msg": "scsi: pm80xx: Avoid leaking tags when processing OPC_INB_SET_CONTROLLER_CONFIG command" }, - "CVE-2023-2269": { - "cmt_msg": "dm ioctl: fix nested locking in table_clear() to remove deadlock concern", - "cmt_id": "9a94ebc74c3540aba5aa2c7b05032da4610a08c9" + "CVE-2023-52502": { + "cmt_msg": "net: nfc: fix races in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn()" }, - "CVE-2023-32248": { - "cmt_msg": "ksmbd: fix NULL pointer dereference in smb2_get_info_filesystem()", - "cmt_id": "a70751dd7b60eab025e97e19b6b2477c6eaf2bbb" + "CVE-2023-2513": { + "cmt_msg": "ext4: fix use-after-free in ext4_xattr_set_entry" }, - "CVE-2023-35826": { - "cmt_msg": "media: cedrus: fix use after free bug in cedrus_remove due to race condition", - "cmt_id": "2cdc8f729d953143b3bbdc56841bb6800752de7f" + "CVE-2017-1000": { + "cmt_msg": "udp: consistently apply ufo or fragmentation" }, - "CVE-2023-35823": { - "cmt_msg": "media: saa7134: fix use after free bug in saa7134_finidev due to race condition", - "cmt_id": "5a72aea9acfe945353fb3a2f141f4e526a5f3684" - } - }, - "6.1.29": { - "CVE-2023-32258": { - "cmt_msg": "ksmbd: fix racy issue from smb2 close and logoff with multichannel", - "cmt_id": "4aba9ab6a007e41182454f84f95c0bddf7d6d7e1" + "CVE-2024-26668": { + "cmt_msg": "netfilter: nft_limit: reject configurations that cause integer overflow" }, - "CVE-2023-32257": { - "cmt_msg": "ksmbd: fix racy issue from session setup and logoff", - "cmt_id": "f623f627ad2b1dc215ab3b0df53fb05cfd3a1c3b" + "CVE-2017-0605": { + "cmt_msg": "tracing: Use strlcpy() instead of strcpy() in __trace_find_cmdline()" }, - "CVE-2024-0775": { - "cmt_msg": "ext4: improve error recovery code paths in __ext4_remount()", - "cmt_id": "25c9fca7b71c5045d6dc537430af5b2e79598fa1" + "CVE-2024-24858": { + "cmt_msg": "" }, - "CVE-2023-32252": { - "cmt_msg": "ksmbd: fix racy issue from session setup and logoff", - "cmt_id": "f623f627ad2b1dc215ab3b0df53fb05cfd3a1c3b" + "CVE-2024-26664": { + "cmt_msg": "hwmon: (coretemp) Fix out-of-bounds memory access" }, - "CVE-2023-32250": { - "cmt_msg": "ksmbd: fix racy issue from session setup and logoff", - "cmt_id": "f623f627ad2b1dc215ab3b0df53fb05cfd3a1c3b" + "CVE-2021-38198": { + "cmt_msg": "KVM: X86: MMU: Use the correct inherited permissions to get shadow page" }, - "CVE-2023-32247": { - "cmt_msg": "ksmbd: destroy expired sessions", - "cmt_id": "1fc8a2b14ef5223f8e0b95faba2ee0a6e4d0f99d" + "CVE-2022-1679": { + "cmt_msg": "ath9k: fix use-after-free in ath9k_hif_usb_rx_cb" }, "CVE-2023-34256": { - "cmt_msg": "ext4: avoid a potential slab-out-of-bounds in ext4_group_desc_csum", - "cmt_id": "1fffe4750500148f3e744ed77cf233db8342603f" - } - }, - "6.1.30": { - "CVE-2023-3090": { - "cmt_msg": "ipvlan:Fix out-of-bounds caused by unclear skb->cb", - "cmt_id": "610a433810b277b3b77389733c07d22e8af68de2" - }, - "CVE-2023-38429": { - "cmt_msg": "ksmbd: allocate one more byte for implied bcc[0]", - "cmt_id": "af7335a4b946f9f6f9d98398cbcea15cd9850409" + "cmt_msg": "ext4: avoid a potential slab-out-of-bounds in ext4_group_desc_csum" }, - "CVE-2023-38428": { - "cmt_msg": "ksmbd: fix wrong UserName check in session_user", - "cmt_id": "40d90ee0275a1bfcd26fa7690adc4330b4227a69" + "CVE-2023-52442": { + "cmt_msg": "ksmbd: validate session id and tree id in compound request" }, - "CVE-2023-3141": { - "cmt_msg": "memstick: r592: Fix UAF bug in r592_remove due to race condition", - "cmt_id": "9a342d4eb9fb8e52f7d1afe088a79513f3f9a9a5" + "CVE-2022-40768": { + "cmt_msg": "scsi: stex: Properly zero out the passthrough command structure" }, - "CVE-2023-38426": { - "cmt_msg": "ksmbd: fix global-out-of-bounds in smb2_find_context_vals", - "cmt_id": "75378b03a90d75b1349bb03577ac8465194c883e" - } - }, - "6.1.31": { - "CVE-2023-21255": { - "cmt_msg": "binder: fix UAF caused by faulty buffer cleanup", - "cmt_id": "e1e198eff1fbaf56fd8022c4fbbf59c5324ea320" - } - }, - "6.1.33": { - "CVE-2022-45887": { - "cmt_msg": "media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb()", - "cmt_id": "ea2938c27b0212aaab6702c16b7385e073b35643" + "CVE-2023-52444": { + "cmt_msg": "f2fs: fix to avoid dirent corruption" }, - "CVE-2022-45886": { - "cmt_msg": "media: dvb-core: Fix use-after-free due on race condition at dvb_net", - "cmt_id": "93b5dfebcb1821dde466e29404fcf1fb919f4c72" + "CVE-2023-52445": { + "cmt_msg": "media: pvrusb2: fix use after free on context disconnection" }, - "CVE-2023-35788": { - "cmt_msg": "net/sched: flower: fix possible OOB write in fl_set_geneve_opt()", - "cmt_id": "eac615ed3c6d91f1196f16f0a0599fff479cb220" + "CVE-2023-52449": { + "cmt_msg": "mtd: Fix gluebi NULL pointer dereference caused by ftl notifier" }, - "CVE-2022-45919": { - "cmt_msg": "media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221", - "cmt_id": "d5d61f747e3f1ff9042db66896f2f90afa5f3197" + "CVE-2019-15807": { + "cmt_msg": "scsi: libsas: delete sas port if expander discover failed" }, - "CVE-2023-2124": { - "cmt_msg": "xfs: verify buffer contents when we skip log replay", - "cmt_id": "a2961463d74f5c86a8dda3b41c484c28ccc4c289" + "CVE-2024-26719": { + "cmt_msg": "nouveau: offload fence uevents work to workqueue" }, - "CVE-2023-1192": { - "cmt_msg": "fs/ntfs3: Validate MFT flags before replaying logs", - "cmt_id": "a8eaa9a06addbd9cb0238cb1c729921ecbb6504c" + "CVE-2024-26715": { + "cmt_msg": "usb: dwc3: gadget: Fix NULL pointer dereference in dwc3_gadget_suspend" }, - "CVE-2023-3212": { - "cmt_msg": "gfs2: Don't deref jdesc in evict", - "cmt_id": "5ae4a618a1558d2b536fdd5d42e53d3e2d73870c" + "CVE-2024-1312": { + "cmt_msg": "mm: lock_vma_under_rcu() must check vma->anon_vma under vma lock" }, - "CVE-2023-34255": { - "cmt_msg": "xfs: verify buffer contents when we skip log replay", - "cmt_id": "a2961463d74f5c86a8dda3b41c484c28ccc4c289" + "CVE-2019-14284": { + "cmt_msg": "floppy: fix div-by-zero in setup_format_params" }, - "CVE-2022-48425": { - "cmt_msg": "fs/ntfs3: Validate MFT flags before replaying logs", - "cmt_id": "a8eaa9a06addbd9cb0238cb1c729921ecbb6504c" - } - }, - "6.1.34": { - "CVE-2023-38431": { - "cmt_msg": "ksmbd: check the validation of pdu_size in ksmbd_conn_handler_loop", - "cmt_id": "543c12c2644e772caa6880662c2a852cfdc5a10c" + "CVE-2019-14283": { + "cmt_msg": "floppy: fix out-of-bounds read in copy_buffer" }, - "CVE-2023-1194": { - "cmt_msg": "ksmbd: fix out-of-bound read in parse_lease_state()", - "cmt_id": "8f2984233c87a1d08f4c45f077130590c7a2c991" + "CVE-2023-3338": { + "cmt_msg": "Remove DECnet support from kernel" }, - "CVE-2023-38427": { - "cmt_msg": "ksmbd: fix out-of-bound read in deassemble_neg_contexts()", - "cmt_id": "bf12d7fb63b365fb766655cedcb5d5f292b0c35e" - } - }, - "6.1.35": { - "CVE-2023-3609": { - "cmt_msg": "net/sched: cls_u32: Fix reference counter leak leading to overflow", - "cmt_id": "07f9cc229b44cbcee6385802d390091d915f38c3" + "CVE-2018-10882": { + "cmt_msg": "ext4: add more inode number paranoia checks" }, - "CVE-2023-38430": { - "cmt_msg": "ksmbd: validate smb request protocol id", - "cmt_id": "e01fc7caac9ce9ad76df9f42f7f61ef4bf1d27c9" + "CVE-2018-10883": { + "cmt_msg": "jbd2: don't mark block as modified if the handle is out of credits" }, - "CVE-2023-3117": { - "cmt_msg": "netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE", - "cmt_id": "4aaa3b730d16c13cc3feaa127bfca1af201d969d" + "CVE-2020-29368": { + "cmt_msg": "mm: thp: make the THP mapcount atomic against __split_huge_pmd_locked()" }, - "CVE-2023-3390": { - "cmt_msg": "netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE", - "cmt_id": "4aaa3b730d16c13cc3feaa127bfca1af201d969d" - } - }, - "6.1.36": { - "CVE-2023-3865": { - "cmt_msg": "ksmbd: fix out-of-bound read in smb2_write", - "cmt_id": "c86211159bc3178b891e0d60e586a32c7b6a231b" + "CVE-2020-12464": { + "cmt_msg": "USB: core: Fix free-while-in-use bug in the USB S-Glibrary" }, - "CVE-2023-3610": { - "cmt_msg": "netfilter: nf_tables: fix chain binding transaction logic", - "cmt_id": "891cd2edddc76c58e842706ad27e2ff96000bd5d" + "CVE-2016-9793": { + "cmt_msg": "net: avoid signed overflows for SO_{SND|RCV}BUFFORCE" }, - "CVE-2023-38432": { - "cmt_msg": "ksmbd: validate command payload size", - "cmt_id": "9650cf70ec9d94ff34daa088b643229231723c26" + "CVE-2022-47520": { + "cmt_msg": "wifi: wilc1000: validate pairwise and authentication suite offsets" }, - "CVE-2023-3866": { - "cmt_msg": "ksmbd: validate session id and tree id in the compound request", - "cmt_id": "854156d12caa9d36de1cf5f084591c7686cc8a9d" - } - }, - "6.1.37": { - "CVE-2023-3269": { - "cmt_msg": "mm: introduce new 'lock_mm_and_find_vma()' page fault helper", - "cmt_id": "d6a5c7a1a6e52d4c46fe181237ca96cd46a42386" - } - }, - "6.1.39": { - "CVE-2023-31248": { - "cmt_msg": "netfilter: nf_tables: do not ignore genmask when looking up chain by id", - "cmt_id": "fc95c8b02c6160936f1f3d8d9d7f4f66f3c84b49" + "CVE-2018-10087": { + "cmt_msg": "kernel/exit.c: avoid undefined behaviour when calling wait4()" }, - "CVE-2024-0639": { - "cmt_msg": "sctp: fix potential deadlock on &net->sctp.addr_wq_lock", - "cmt_id": "1aa5a6a6d28c77e364feaba35ff7f12d2d74fec1" + "CVE-2023-3159": { + "cmt_msg": "firewire: fix potential uaf in outbound_phy_packet_callback()" }, - "CVE-2023-2898": { - "cmt_msg": "f2fs: fix to avoid NULL pointer dereference f2fs_write_end_io()", - "cmt_id": "ebe83e9bb8a6b3db28603fe938ee80ccaa01ed53" + "CVE-2021-47059": { + "cmt_msg": "crypto: sun8i-ss - fix result memory leak on error path" }, - "CVE-2023-4132": { - "cmt_msg": "media: usb: siano: Fix warning due to null work_func_t function pointer", - "cmt_id": "8abb53c5167cfb5bb275512a3da4ec2468478626" + "CVE-2021-47052": { + "cmt_msg": "crypto: sa2ul - Fix memory leak of rxd" }, - "CVE-2023-35001": { - "cmt_msg": "netfilter: nf_tables: prevent OOB access in nft_byteorder_eval", - "cmt_id": "40f83dd66a823400d8592e3b71e190e3ad978eb5" + "CVE-2021-47056": { + "cmt_msg": "crypto: qat - ADF_STATUS_PF_RUNNING should be set after adf_dev_init" }, - "CVE-2023-39197": { - "cmt_msg": "netfilter: conntrack: dccp: copy entire header to stack buffer, not just basic one", - "cmt_id": "5c618daa5038712c4a4ef8923905a2ea1b8836a1" + "CVE-2017-7374": { + "cmt_msg": "fscrypt: remove broken support for detecting keyring key revocation" }, - "CVE-2023-3863": { - "cmt_msg": "net: nfc: Fix use-after-free caused by nfc_llcp_find_local", - "cmt_id": "425d9d3a92df7d96b3cfb7ee5c240293a21cbde3" - } - }, - "6.1.40": { - "CVE-2023-51043": { - "cmt_msg": "drm/atomic: Fix potential use-after-free in nonblocking commits", - "cmt_id": "e4a0e09b79bd2c0895c508cdc5e0265a083cc05d" + "CVE-2022-21125": { + "cmt_msg": "x86/speculation/mmio: Reuse SRBDS mitigation for SBDS" }, - "CVE-2023-44466": { - "cmt_msg": "libceph: harden msgr2.1 frame segment length checks", - "cmt_id": "183c0ae4fafcdcb95c06f40c0c35a39d89c1aa2d" + "CVE-2019-19241": { + "cmt_msg": "io_uring: async workers should inherit the user creds" }, - "CVE-2023-3611": { - "cmt_msg": "net/sched: sch_qfq: account for stab overhead in qfq_enqueue", - "cmt_id": "70feebdbfad85772ab3ef152812729cab5c6c426" + "CVE-2022-21123": { + "cmt_msg": "x86/speculation/mmio: Add mitigation for Processor MMIO Stale Data" }, - "CVE-2022-48502": { - "cmt_msg": "fs/ntfs3: Check fields while reading", - "cmt_id": "000a9a72efa4a9df289bab9c9e8ba1639c72e0d6" + "CVE-2020-26559": { + "cmt_msg": "" }, - "CVE-2023-3867": { - "cmt_msg": "ksmbd: add missing compound request handing in some commands", - "cmt_id": "869ef4f2965bbb91157dad220133f76c16faba9b" + "CVE-2021-43975": { + "cmt_msg": "atlantic: Fix OOB read and write in hw_atl_utils_fw_rpc_wait" }, - "CVE-2023-3776": { - "cmt_msg": "net/sched: cls_fw: Fix improper refcount update leads to use-after-free", - "cmt_id": "c91fb29bb07ee4dd40aabd1e41f19c0f92ac3199" - } - }, - "6.1.41": { - "CVE-2023-20593": { - "cmt_msg": "x86/cpu/amd: Add a Zenbleed fix", - "cmt_id": "ed9b87010aa84c157096f98c322491e9af8e8f07" - } - }, - "6.1.42": { - "CVE-2023-3777": { - "cmt_msg": "netfilter: nf_tables: skip bound chain on rule flush", - "cmt_id": "e18922ce3e3169eb97838d1dcba2d679bcca446c" + "CVE-2018-6927": { + "cmt_msg": "futex: Prevent overflow by strengthen input validation" }, - "CVE-2023-4004": { - "cmt_msg": "netfilter: nft_set_pipapo: fix improper element removal", - "cmt_id": "90c3955beb858bb52a9e5c4380ed0e520e3730d1" - } - }, - "6.1.43": { - "CVE-2023-4015": { - "cmt_msg": "netfilter: nf_tables: skip immediate deactivate in _PREPARE_ERROR", - "cmt_id": "4237462a073e24f71c700f3e5929f07b6ee1bcaa" + "CVE-2018-3639": { + "cmt_msg": "x86/nospec: Simplify alternative_msr_write()" }, - "CVE-2023-4147": { - "cmt_msg": "netfilter: nf_tables: disallow rule addition to bound chain via NFTA_RULE_CHAIN_ID", - "cmt_id": "268cb07ef3ee17b5454a7c4b23376802c5b00c79" + "CVE-2023-0590": { + "cmt_msg": "net: sched: fix race condition in qdisc_graft()" }, - "CVE-2023-1206": { - "cmt_msg": "tcp: Reduce chance of collisions in inet6_hashfn().", - "cmt_id": "51aea7e9d5212adb8a3d198510cfcde4125988f9" - } - }, - "6.1.44": { - "CVE-2022-40982": { - "cmt_msg": "x86/speculation: Add Gather Data Sampling mitigation", - "cmt_id": "c66ebe070d9641c9339e42e1c2d707a5052e9904" + "CVE-2016-9313": { + "cmt_msg": "KEYS: Sort out big_key initialisation" }, - "CVE-2023-34319": { - "cmt_msg": "xen/netback: Fix buffer overrun triggered by unusual packet", - "cmt_id": "fa5b932b77c815d0e416612859d5899424bb4212" + "CVE-2023-0597": { + "cmt_msg": "x86/mm: Randomize per-cpu entry area" }, - "CVE-2023-20569": { - "cmt_msg": "x86/bugs: Increase the x86 bugs vector size to two u32s", - "cmt_id": "dfede4cb8ef732039b7a479d260bd89d3b474f14" - } - }, - "6.1.45": { - "CVE-2023-20588": { - "cmt_msg": "x86/CPU/AMD: Do not leak quotient data after a division by 0", - "cmt_id": "f2615bb47be4f53be92c81a6a8aa286c92ef04d9" + "CVE-2022-28390": { + "cmt_msg": "can: ems_usb: ems_usb_start_xmit(): fix double dev_kfree_skb() in error path" }, - "CVE-2023-4128": { - "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free", - "cmt_id": "aab2d095ce4dd8d01ca484c0cc641fb497bf74db" + "CVE-2019-3460": { + "cmt_msg": "Bluetooth: Check L2CAP option sizes returned from l2cap_get_conf_opt" }, - "CVE-2023-4208": { - "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free", - "cmt_id": "aab2d095ce4dd8d01ca484c0cc641fb497bf74db" + "CVE-2022-3202": { + "cmt_msg": "jfs: prevent NULL deref in diFree" }, - "CVE-2023-4206": { - "cmt_msg": "net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free", - "cmt_id": "d4d3b53a4c66004e8e864fea744b3a2b86a73b62" + "CVE-2017-7518": { + "cmt_msg": "KVM: x86: fix singlestepping over syscall" }, - "CVE-2023-4207": { - "cmt_msg": "net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free", - "cmt_id": "7f691439b29be0aae68f83ad5eecfddc11007724" + "CVE-2019-11477": { + "cmt_msg": "tcp: limit payload size of sacked skbs" }, - "CVE-2023-4273": { - "cmt_msg": "exfat: check if filename entries exceeds max filename length", - "cmt_id": "c2fdf827f8fc6a571e1b7cc38a61041f0321adf5" + "CVE-2021-46908": { + "cmt_msg": "bpf: Use correct permission flag for mixed signed bounds arithmetic" }, - "CVE-2023-40283": { - "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb", - "cmt_id": "29fac18499332211b2615ade356e2bd8b3269f98" - } - }, - "6.1.46": { - "CVE-2023-4155": { - "cmt_msg": "KVM: SEV: only access GHCB fields once", - "cmt_id": "5bdf1c1f346c81996b6e36b5efd5c92aeda4fbe4" - } - }, - "6.1.47": { - "CVE-2023-4569": { - "cmt_msg": "netfilter: nf_tables: deactivate catchall elements in next generation", - "cmt_id": "00ea7eb1c69eec91cdf9259f0e427c56e7999fcd" + "CVE-2021-46906": { + "cmt_msg": "HID: usbhid: fix info leak in hid_submit_ctrl" }, - "CVE-2023-51042": { - "cmt_msg": "drm/amdgpu: Fix potential fence use-after-free v2", - "cmt_id": "dd0b3b367c3839e439f36af908b39c98929a5e54" + "CVE-2018-14614": { + "cmt_msg": "f2fs: fix to do sanity check with cp_pack_start_sum" }, - "CVE-2023-6546": { - "cmt_msg": "tty: n_gsm: fix the UAF caused by race condition in gsm_cleanup_mux", - "cmt_id": "31311a9a4baae0ad47c85e448af21b2120344ff0" + "CVE-2018-14617": { + "cmt_msg": "hfsplus: fix NULL dereference in hfsplus_lookup()" }, - "CVE-2023-39198": { - "cmt_msg": "drm/qxl: fix UAF on handle creation", - "cmt_id": "a1fa8f0fc58e0ec972f718030710efc442d7304b" + "CVE-2018-14616": { + "cmt_msg": "f2fs: fix to do sanity check with block address in main area v2" }, - "CVE-2023-39194": { - "cmt_msg": "net: xfrm: Fix xfrm_address_filter OOB read", - "cmt_id": "9a0056276f5f38e188732bd7b6949edca6a80ea1" + "CVE-2018-14611": { + "cmt_msg": "btrfs: validate type when reading a chunk" }, - "CVE-2023-3773": { - "cmt_msg": "xfrm: add forgotten nla_policy for XFRMA_MTIMER_THRESH", - "cmt_id": "a442cd17019385c53bbddf3bb92d91474081916b" + "CVE-2018-14610": { + "cmt_msg": "btrfs: Check that each block group has corresponding chunk at mount time" }, - "CVE-2023-3772": { - "cmt_msg": "xfrm: add NULL check in xfrm_update_ae_params", - "cmt_id": "87b655f4936b6fc01f3658aa88a22c923b379ebd" - } - }, - "6.1.50": { - "CVE-2022-36402": { - "cmt_msg": "drm/vmwgfx: Fix shader stage validation", - "cmt_id": "115f2ccd3a998fe7247f59f8fb5feffc878bcbb7" + "CVE-2018-14613": { + "cmt_msg": "btrfs: tree-checker: Verify block_group_item" }, - "CVE-2023-2430": { - "cmt_msg": "io_uring/msg_ring: fix missing lock on overflow for IOPOLL", - "cmt_id": "22a406b3629a10979916ea7cace47858410117b5" - } - }, - "6.1.52": { - "CVE-2023-52440": { - "cmt_msg": "ksmbd: fix slub overflow in ksmbd_decode_ntlmssp_auth_blob()", - "cmt_id": "30fd6521b2fbd9b767e438e31945e5ea3e3a2fba" - } - }, - "6.1.53": { - "CVE-2023-4623": { - "cmt_msg": "net/sched: sch_hfsc: Ensure inner classes have fsc curve", - "cmt_id": "a1e820fc7808e42b990d224f40e9b4895503ac40" + "CVE-2018-14612": { + "cmt_msg": "btrfs: tree-checker: Detect invalid and empty essential trees" }, - "CVE-2023-52442": { - "cmt_msg": "ksmbd: validate session id and tree id in compound request", - "cmt_id": "becb5191d1d5fdfca0198a2e37457bbbf4fe266f" + "CVE-2024-23848": { + "cmt_msg": "" }, - "CVE-2023-25775": { - "cmt_msg": "RDMA/irdma: Prevent zero-length STAG registration", - "cmt_id": "f01cfec8d3456bf389918eb898eda11f46d8b1b7" + "CVE-2020-27418": { + "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region" }, - "CVE-2023-52441": { - "cmt_msg": "ksmbd: fix out of bounds in init_smb2_rsp_hdr()", - "cmt_id": "330d900620dfc9893011d725b3620cd2ee0bc2bc" + "CVE-2017-2618": { + "cmt_msg": "selinux: fix off-by-one in setprocattr" }, - "CVE-2023-42753": { - "cmt_msg": "netfilter: ipset: add the missing IP_SET_HASH_WITH_NET0 macro for ip_set_hash_netportnet.c", - "cmt_id": "7ca0706c68adadf86a36b60dca090f5e9481e808" + "CVE-2019-2025": { + "cmt_msg": "binder: fix race that allows malicious free of live buffer" }, - "CVE-2023-42752": { - "cmt_msg": "igmp: limit igmpv3_newpack() packet size to IP_MAX_MTU", - "cmt_id": "6678912b4df1bfac6f7c80642d56dc22e23419e4" + "CVE-2019-2024": { + "cmt_msg": "media: em28xx: Fix use-after-free when disconnecting" }, - "CVE-2023-45871": { - "cmt_msg": "igb: set max size RX buffer when store bad packet is enabled", - "cmt_id": "d2e906c725979c39ebf120a189e521ceae787d26" + "CVE-2017-15951": { + "cmt_msg": "KEYS: Fix race between updating and finding a negative key" }, - "CVE-2023-39193": { - "cmt_msg": "netfilter: xt_sctp: validate the flag_info count", - "cmt_id": "4921f9349b66da7c5a2b6418fe45e9ae0ae72924" + "CVE-2019-19074": { + "cmt_msg": "ath9k: release allocated buffer if timed out" }, - "CVE-2023-39192": { - "cmt_msg": "netfilter: xt_u32: validate user space input", - "cmt_id": "1c164c1e9e93b0a72a03a7edb754e3857d4e4302" - } - }, - "6.1.54": { - "CVE-2023-4921": { - "cmt_msg": "net: sched: sch_qfq: Fix UAF in qfq_dequeue()", - "cmt_id": "a18349dc8d916a64d7c93f05da98953e3386d8e9" + "CVE-2019-19073": { + "cmt_msg": "ath9k_htc: release allocated buffer if timed out" }, - "CVE-2023-4881": { - "cmt_msg": "netfilter: nftables: exthdr: fix 4-byte stack OOB write", - "cmt_id": "d9ebfc0f21377690837ebbd119e679243e0099cc" + "CVE-2019-1125": { + "cmt_msg": "x86/speculation: Prepare entry code for Spectre v1 swapgs mitigations" }, - "CVE-2023-6176": { - "cmt_msg": "net/tls: do not free tls_rec on async operation in bpf_exec_tx_verdict()", - "cmt_id": "7f4116c6f98412a6e29ace6d6a7b41ebb4e8a392" + "CVE-2023-31085": { + "cmt_msg": "ubi: Refuse attaching if mtd's erasesize is 0" }, - "CVE-2023-39189": { - "cmt_msg": "netfilter: nfnetlink_osf: avoid OOB read", - "cmt_id": "7bb8d52b4271be7527b6e3120ae6ce4c6cdf6e34" - } - }, - "6.1.55": { - "CVE-2023-42755": { - "cmt_msg": "net/sched: Retire rsvp classifier", - "cmt_id": "b93aeb6352b0229e3c5ca5ca4ff015b015aff33c" - } - }, - "6.1.56": { - "CVE-2023-42754": { - "cmt_msg": "ipv4: fix null-deref in ipv4_link_failure", - "cmt_id": "2712545e535d7a2e4c53b9c9658a9c88c6055862" + "CVE-2023-31084": { + "cmt_msg": "media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*()" }, - "CVE-2023-4563": { - "cmt_msg": "netfilter: nf_tables: don't skip expired elements during walk", - "cmt_id": "59dab3bf0b8fc08eb802721c0532f13dd89209b8" + "CVE-2023-31083": { + "cmt_msg": "Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO" }, - "CVE-2023-4244": { - "cmt_msg": "netfilter: nf_tables: fix GC transaction races with netns and netlink event exit path", - "cmt_id": "41113aa5698ad7a82635bcb747d483e4458d518d" + "CVE-2023-31082": { + "cmt_msg": "" }, - "CVE-2023-5197": { - "cmt_msg": "netfilter: nf_tables: disallow rule removal from chain binding", - "cmt_id": "9af8bb2afea3705b58fe930f97a39322f46e5b8b" + "CVE-2023-31081": { + "cmt_msg": "" }, - "CVE-2023-5345": { - "cmt_msg": "fs/smb/client: Reset password pointer to NULL", - "cmt_id": "f555a508087ab8210b4658120ac6413d6fe2b4c7" - } - }, - "6.1.57": { - "CVE-2024-0641": { - "cmt_msg": "tipc: fix a potential deadlock on &tx->lock", - "cmt_id": "143e72757a902abcecd5f487553f44dc19a56cfc" + "CVE-2022-32296": { + "cmt_msg": "tcp: increase source port perturb table to 2^16" }, - "CVE-2023-34324": { - "cmt_msg": "xen/events: replace evtchn_rwlock with RCU", - "cmt_id": "a4cc925e2e12c3bbffb0860acdb9f9c1abde47dd" + "CVE-2020-28974": { + "cmt_msg": "vt: Disable KD_FONT_OP_COPY" }, - "CVE-2023-31085": { - "cmt_msg": "ubi: Refuse attaching if mtd's erasesize is 0", - "cmt_id": "91aeb418b9175d09fc858f0fdf01988cbf990c5d" + "CVE-2019-20806": { + "cmt_msg": "media: tw5864: Fix possible NULL pointer dereference in tw5864_handle_frame" }, - "CVE-2023-5158": { - "cmt_msg": "vringh: don't use vringh_kiov_advance() in vringh_iov_xfer()", - "cmt_id": "3a72decd6b49ff11a894aabd4d9b3025f046fe61" - } - }, - "6.1.59": { - "CVE-2023-35827": { - "cmt_msg": "ravb: Fix use-after-free issue in ravb_tx_timeout_work()", - "cmt_id": "6f6fa8061f756aedb93af12a8a5d3cf659127965" - } - }, - "6.1.60": { - "CVE-2023-46813": { - "cmt_msg": "x86/sev: Check for user-space IOIO pointing to kernel space", - "cmt_id": "57d0639f60f1ff04cbe7fd52823b94b894d7f812" + "CVE-2022-3028": { + "cmt_msg": "af_key: Do not call xfrm_probe_algs in parallel" }, - "CVE-2023-46343": { - "cmt_msg": "nfc: nci: fix possible NULL pointer dereference in send_acknowledge()", - "cmt_id": "d7dbdbe3800a908eecd4975c31be47dd45e2104a" + "CVE-2020-14304": { + "cmt_msg": "" }, - "CVE-2023-5717": { - "cmt_msg": "perf: Disallow mis-matched inherited group reads", - "cmt_id": "f6952655a61264900ed08e9d642adad8222f8e29" - } - }, - "6.1.61": { - "CVE-2023-46862": { - "cmt_msg": "io_uring/fdinfo: lock SQ thread while retrieving thread cpu/pid", - "cmt_id": "9236d2ea6465b37c0a73d994c1ad31753d31e5f5" - } - }, - "6.1.62": { - "CVE-2023-5090": { - "cmt_msg": "x86: KVM: SVM: always update the x2avic msr interception", - "cmt_id": "7ab62e3415fb59289ab6dea31f0cc0237b949200" - } - }, - "6.1.64": { - "CVE-2024-0607": { - "cmt_msg": "netfilter: nf_tables: fix pointer math issue in nft_byteorder_eval()", - "cmt_id": "18a169810cff769a7a697b35058c756805f589e0" - } - }, - "6.1.65": { - "CVE-2023-6121": { - "cmt_msg": "nvmet: nul-terminate the NQNs passed in the connect command", - "cmt_id": "0e485f12ebb7b69b67c7f85195a1b4aad95d354a" - } - }, - "6.1.66": { - "CVE-2024-0584": { - "cmt_msg": "ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet", - "cmt_id": "94445d9583079e0ccc5dde1370076ff24800d86e" + "CVE-2018-17972": { + "cmt_msg": "proc: restrict kernel stack dumps to root" }, - "CVE-2023-6932": { - "cmt_msg": "ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet", - "cmt_id": "94445d9583079e0ccc5dde1370076ff24800d86e" - } - }, - "6.1.68": { - "CVE-2023-6531": { - "cmt_msg": "io_uring/af_unix: disable sending io_uring over sockets", - "cmt_id": "f2f57f51b53be153a522300454ddb3887722fb2c" + "CVE-2022-33981": { + "cmt_msg": "floppy: disable FDRAWCMD by default" }, - "CVE-2023-6622": { - "cmt_msg": "netfilter: nf_tables: bail out on mismatching dynset and set expressions", - "cmt_id": "96f8654b701f772af5f358b91807ce2836ff3444" + "CVE-2017-16995": { + "cmt_msg": "bpf: fix incorrect sign extension in check_alu_op()" }, - "CVE-2023-6817": { - "cmt_msg": "netfilter: nft_set_pipapo: skip inactive elements during set walk", - "cmt_id": "189c2a82933c67ad360c421258d5449f6647544a" + "CVE-2017-16994": { + "cmt_msg": "mm/pagewalk.c: report holes in hugetlb ranges" }, - "CVE-2023-6931": { - "cmt_msg": "perf: Fix perf_event_validate_size()", - "cmt_id": "06dec254c59afd01b7a44838cf8bfc382bef019b" + "CVE-2017-2583": { + "cmt_msg": "KVM: x86: fix emulation of \"MOV SS, null selector\"" }, - "CVE-2024-25744": { - "cmt_msg": "x86/coco: Disable 32-bit emulation by default on TDX and SEV", - "cmt_id": "b8ec27ae221eee458b15b700706db311474ac619" - } - }, - "6.1.69": { - "CVE-2023-51782": { - "cmt_msg": "net/rose: Fix Use-After-Free in rose_ioctl", - "cmt_id": "01540ee2366a0a8671c35cd57a66bf0817106ffa" + "CVE-2017-2584": { + "cmt_msg": "KVM: x86: Introduce segmented_write_std" }, - "CVE-2023-51780": { - "cmt_msg": "atm: Fix Use-After-Free in do_vcc_ioctl", - "cmt_id": "2de2a6cbe14f7e949da59bddd5d69baf5dd893c0" + "CVE-2017-6001": { + "cmt_msg": "perf/core: Fix concurrent sys_perf_event_open() vs. 'move_group' race" }, - "CVE-2023-51781": { - "cmt_msg": "appletalk: Fix Use-After-Free in atalk_ioctl", - "cmt_id": "1646b2929d5efc3861139ba58556b0f149c848f6" + "CVE-2017-17558": { + "cmt_msg": "USB: core: prevent malicious bNumInterfaces overflow" }, - "CVE-2024-0565": { - "cmt_msg": "smb: client: fix OOB in receive_encrypted_standard()", - "cmt_id": "9f528a8e68327117837b5e28b096f52af4c26a05" + "CVE-2023-1390": { + "cmt_msg": "tipc: fix NULL deref in tipc_link_xmit()" }, - "CVE-2024-0646": { - "cmt_msg": "net: tls, update curr on splice as well", - "cmt_id": "9b3d3a7f3c4d710c1dd3f723851c3eeaf42642bc" - } - }, - "6.1.70": { - "CVE-2023-6606": { - "cmt_msg": "smb: client: fix OOB in smbCalcSize()", - "cmt_id": "c60e10d1549f8748a68ec13dcd177c62843985ff" + "CVE-2020-10751": { + "cmt_msg": "selinux: properly handle multiple messages in selinux_netlink_send()" }, - "CVE-2023-51779": { - "cmt_msg": "Bluetooth: af_bluetooth: Fix Use-After-Free in bt_sock_recvmsg", - "cmt_id": "37f71e2c9f515834841826f4eb68ec33cfb2a1ff" - } - }, - "6.1.71": { - "CVE-2024-22705": { - "cmt_msg": "ksmbd: fix slab-out-of-bounds in smb_strndup_from_utf16()", - "cmt_id": "7a3bbbadac4be9d30b45e9f1134e94294f79ce77" + "CVE-2020-10757": { + "cmt_msg": "mm: Fix mremap not considering huge pmd devmap" }, - "CVE-2023-1193": { - "cmt_msg": "ksmbd: delete asynchronous work from list", - "cmt_id": "8d271ef5e5cac8a470076891b248a28a2c57fb1e" - } - }, - "6.1.73": { - "CVE-2023-52340": { - "cmt_msg": "ipv6: remove max_size check inline with ipv4", - "cmt_id": "0f22c8a6efe63c16d1abf1e6c0317abbf121f883" - } - }, - "6.1.74": { - "CVE-2023-52439": { - "cmt_msg": "uio: Fix use-after-free in uio_open", - "cmt_id": "17a8519cb359c3b483fb5c7367efa9a8a508bdea" + "CVE-2022-1116": { + "cmt_msg": "" }, - "CVE-2023-52438": { - "cmt_msg": "binder: fix use-after-free in shinker's callback", - "cmt_id": "9fa04c93f24138747807fe75b5591bb680098f56" + "CVE-2021-28660": { + "cmt_msg": "staging: rtl8188eu: prevent ->ssid overflow in rtw_wx_set_scan()" }, - "CVE-2023-6915": { - "cmt_msg": "ida: Fix crash in ida_free when the bitmap is empty", - "cmt_id": "9efdc0081ccae62c44a929e21d32bacc5f2e113f" + "CVE-2017-6348": { + "cmt_msg": "irda: Fix lockdep annotations in hashbin_delete()." }, - "CVE-2023-6610": { - "cmt_msg": "smb: client: fix potential OOB in smb2_dump_detail()", - "cmt_id": "5411e3292792be7dafd1fe948a87e3ca29c1f550" + "CVE-2020-36386": { + "cmt_msg": "Bluetooth: Fix slab-out-of-bounds read in hci_extended_inquiry_result_evt()" }, - "CVE-2023-52436": { - "cmt_msg": "f2fs: explicitly null-terminate the xattr list", - "cmt_id": "5de9e9dd1828db9b8b962f7ca42548bd596deb8a" - } - }, - "6.1.75": { - "CVE-2024-26592": { - "cmt_msg": "ksmbd: fix UAF issue in ksmbd_tcp_new_connection()", - "cmt_id": "380965e48e9c32ee4263c023e1d830ea7e462ed1" + "CVE-2017-6345": { + "cmt_msg": "net/llc: avoid BUG_ON() in skb_orphan()" }, - "CVE-2024-26591": { - "cmt_msg": "bpf: Fix re-attachment branch in bpf_tracing_prog_attach", - "cmt_id": "6cc9c0af0aa06f781fa515a1734b1a4239dfd2c0" + "CVE-2017-6346": { + "cmt_msg": "packet: fix races in fanout_add()" }, - "CVE-2024-26597": { - "cmt_msg": "net: qualcomm: rmnet: fix global oob in rmnet_policy", - "cmt_id": "ee1dc3bf86f2df777038506b139371a9add02534" + "CVE-2017-6347": { + "cmt_msg": "ip: fix IP_CHECKSUM handling" }, - "CVE-2024-26594": { - "cmt_msg": "ksmbd: validate mech token in session setup", - "cmt_id": "6eb8015492bcc84e40646390e50a862b2c0529c9" + "CVE-2018-9385": { + "cmt_msg": "ARM: amba: Don't read past the end of sysfs \"driver_override\" buffer" }, - "CVE-2024-26598": { - "cmt_msg": "KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache", - "cmt_id": "dba788e25f05209adf2b0175eb1691dc89fb1ba6" + "CVE-2020-0009": { + "cmt_msg": "staging: android: ashmem: Disallow ashmem memory from being remapped" }, - "CVE-2024-26599": { - "cmt_msg": "pwm: Fix out-of-bounds access in of_pwm_single_xlate()", - "cmt_id": "7b85554c7c2aee91171e038e4d5442ffa130b282" + "CVE-2019-14615": { + "cmt_msg": "drm/i915/gen9: Clear residual context state on context switch" }, - "CVE-2023-52458": { - "cmt_msg": "block: add check that partition length needs to be aligned with block size", - "cmt_id": "ef31cc87794731ffcb578a195a2c47d744e25fb8" + "CVE-2018-9415": { + "cmt_msg": "ARM: amba: Fix race condition with driver_override" }, - "CVE-2023-52457": { - "cmt_msg": "serial: 8250: omap: Don't skip resource freeing if pm_runtime_resume_and_get() failed", - "cmt_id": "d74173bda29aba58f822175d983d07c8ed335494" + "CVE-2019-13648": { + "cmt_msg": "powerpc/tm: Fix oops on sigreturn on systems without TM" }, - "CVE-2023-52456": { - "cmt_msg": "serial: imx: fix tx statemachine deadlock", - "cmt_id": "63ee7be01a3f7d28b1ea8b8d7944f12bb7b0ed06" + "CVE-2018-15572": { + "cmt_msg": "x86/speculation: Protect against userspace-userspace spectreRSB" }, - "CVE-2023-52454": { - "cmt_msg": "nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length", - "cmt_id": "2871aa407007f6f531fae181ad252486e022df42" + "CVE-2022-1204": { + "cmt_msg": "ax25: Fix refcount leaks caused by ax25_cb_del()" }, - "CVE-2023-52451": { - "cmt_msg": "powerpc/pseries/memhp: Fix access beyond end of drmem array", - "cmt_id": "026fd977dc50ff4a5e09bfb0603557f104d3f3a0" + "CVE-2018-9363": { + "cmt_msg": "Bluetooth: hidp: buffer overflow in hidp_process_report" }, - "CVE-2024-1085": { - "cmt_msg": "netfilter: nf_tables: check if catch-all set element is active in next generation", - "cmt_id": "a372f1d01bc11aa85773a02353cd01aaf16dc18e" + "CVE-2016-10723": { + "cmt_msg": "mm, oom: remove sleep from under oom_lock" }, - "CVE-2024-24860": { - "cmt_msg": "Bluetooth: Fix atomicity violation in {min,max}_key_size_set", - "cmt_id": "96860d9ad462db61f4eeb09934235c38eab655c4" + "CVE-2022-26490": { + "cmt_msg": "nfc: st21nfca: Fix potential buffer overflows in EVT_TRANSACTION" }, - "CVE-2023-46838": { - "cmt_msg": "xen-netback: don't produce zero-size SKB frags", - "cmt_id": "437360133cbd1e9fb88b122e84fff0df08f18e23" + "CVE-2020-8832": { + "cmt_msg": "drm/i915: Record the default hw state after reset upon load" }, - "CVE-2024-26589": { - "cmt_msg": "bpf: Reject variable offset alu on PTR_TO_FLOW_KEYS", - "cmt_id": "4108b86e324da42f7ed425bd71632fd844300dc8" + "CVE-2023-52531": { + "cmt_msg": "wifi: iwlwifi: mvm: Fix a memory corruption issue" }, - "CVE-2024-26588": { - "cmt_msg": "LoongArch: BPF: Prevent out-of-bounds memory access", - "cmt_id": "4631c2dd69d928bca396f9f58baeddf85e14ced5" + "CVE-2023-52532": { + "cmt_msg": "net: mana: Fix TX CQE error handling" }, - "CVE-2023-52462": { - "cmt_msg": "bpf: fix check for attempt to corrupt spilled pointer", - "cmt_id": "fc3e3c50a0a4cac1463967c110686189e4a59104" + "CVE-2016-7039": { + "cmt_msg": "net: add recursion limit to GRO" }, - "CVE-2023-50431": { - "cmt_msg": "accel/habanalabs: fix information leak in sec_attest_info()", - "cmt_id": "6d98d249175e568f72ca94cbd6f959bc4476414e" + "CVE-2023-39189": { + "cmt_msg": "netfilter: nfnetlink_osf: avoid OOB read" }, - "CVE-2023-52463": { - "cmt_msg": "efivarfs: force RO when remounting if SetVariable is not supported", - "cmt_id": "d4a9aa7db574a0da64307729cc031fb68597aa8b" + "CVE-2024-26677": { + "cmt_msg": "rxrpc: Fix delayed ACKs to not set the reference serial number" }, - "CVE-2023-52464": { - "cmt_msg": "EDAC/thunderx: Fix possible out-of-bounds string access", - "cmt_id": "9dbac9fdae6e3b411fc4c3fca3bf48f70609c398" + "CVE-2020-25211": { + "cmt_msg": "netfilter: ctnetlink: add a range check for l3/l4 protonum" }, - "CVE-2023-52443": { - "cmt_msg": "apparmor: avoid crash when parsed profile name is empty", - "cmt_id": "9d4fa5fe2b1d56662afd14915a73b4d0783ffa45" + "CVE-2020-25212": { + "cmt_msg": "nfs: Fix getxattr kernel panic and memory overflow" }, - "CVE-2023-52444": { - "cmt_msg": "f2fs: fix to avoid dirent corruption", - "cmt_id": "f0145860c20be6bae6785c7a2249577674702ac7" + "CVE-2020-28374": { + "cmt_msg": "scsi: target: Fix XCOPY NAA identifier lookup" }, - "CVE-2023-52445": { - "cmt_msg": "media: pvrusb2: fix use after free on context disconnection", - "cmt_id": "30773ea47d41773f9611ffb4ebc9bda9d19a9e7e" + "CVE-2024-26672": { + "cmt_msg": "drm/amdgpu: Fix variable 'mca_funcs' dereferenced before NULL check in 'amdgpu_mca_smu_get_mca_entry()'" }, - "CVE-2023-52447": { - "cmt_msg": "bpf: Defer the free of inner map when necessary", - "cmt_id": "62fca83303d608ad4fec3f7428c8685680bb01b0" + "CVE-2024-26671": { + "cmt_msg": "blk-mq: fix IO hang from sbitmap wakeup race" }, - "CVE-2023-52448": { - "cmt_msg": "gfs2: Fix kernel NULL pointer dereference in gfs2_rgrp_dump", - "cmt_id": "d69d7804cf9e2ba171a27e5f98bc266f13d0414a" + "CVE-2024-26679": { + "cmt_msg": "inet: read sk->sk_family once in inet_recv_error()" }, - "CVE-2023-52449": { - "cmt_msg": "mtd: Fix gluebi NULL pointer dereference caused by ftl notifier", - "cmt_id": "5389407bba1eab1266c6d83e226fb0840cb98dd5" - } - }, - "6.1.76": { - "CVE-2024-1086": { - "cmt_msg": "netfilter: nf_tables: reject QUEUE/DROP verdict parameters", - "cmt_id": "8e34430e33b8a80bc014f3efe29cac76bc30a4b4" + "CVE-2023-52458": { + "cmt_msg": "block: add check that partition length needs to be aligned with block size" }, - "CVE-2024-23849": { - "cmt_msg": "net/rds: Fix UBSAN: array-index-out-of-bounds in rds_cmsg_recv", - "cmt_id": "71024928b3f71ce4529426f8692943205c58d30b" - } - }, - "6.1.78": { - "CVE-2024-0340": { - "cmt_msg": "vhost: use kzalloc() instead of kmalloc() followed by memset()", - "cmt_id": "4675661672e3730597babf97c4e9593a775c8917" - } - }, - "6.1.79": { - "CVE-2024-26593": { - "cmt_msg": "i2c: i801: Fix block process call transactions", - "cmt_id": "491528935c9c48bf341d8b40eabc6c4fc5df6f2c" + "CVE-2023-52451": { + "cmt_msg": "powerpc/pseries/memhp: Fix access beyond end of drmem array" }, - "CVE-2024-26583": { - "cmt_msg": "tls: fix race between async notify and socket close", - "cmt_id": "7a3ca06d04d589deec81f56229a9a9d62352ce01" + "CVE-2018-9568": { + "cmt_msg": "net: Set sk_prot_creator when cloning sockets to the right proto" }, - "CVE-2024-1151": { - "cmt_msg": "net: openvswitch: limit the number of recursions from action sets", - "cmt_id": "65ded4eb220695909eee657758e824fc30f0b561" + "CVE-2022-0644": { + "cmt_msg": "vfs: check fd has read access in kernel_read_file_from_fd()" }, - "CVE-2024-26586": { - "cmt_msg": "mlxsw: spectrum_acl_tcam: Fix stack corruption", - "cmt_id": "6fd24675188d354b1cad47462969afa2ab09d819" + "CVE-2019-14816": { + "cmt_msg": "mwifiex: Fix three heap overflow at parsing element in cfg80211_ap_settings" }, - "CVE-2023-52429": { - "cmt_msg": "dm: limit the number of targets and parameter size area", - "cmt_id": "c5d83ac2bf6ca668a39ffb1a576899a66153ba19" + "CVE-2019-14814": { + "cmt_msg": "mwifiex: Fix three heap overflow at parsing element in cfg80211_ap_settings" }, - "CVE-2024-23850": { - "cmt_msg": "btrfs: do not ASSERT() if the newly created subvolume already got read", - "cmt_id": "66b317a2fc45b2ef66527ee3f8fa08fb5beab88d" + "CVE-2024-26700": { + "cmt_msg": "drm/amd/display: Fix MST Null Ptr for RV" }, - "CVE-2024-23851": { - "cmt_msg": "dm: limit the number of targets and parameter size area", - "cmt_id": "c5d83ac2bf6ca668a39ffb1a576899a66153ba19" + "CVE-2024-26706": { + "cmt_msg": "parisc: Fix random data corruption from exception handler" }, - "CVE-2024-26582": { - "cmt_msg": "net: tls: fix use-after-free with partial reads and async decrypt", - "cmt_id": "20b4ed034872b4d024b26e2bc1092c3f80e5db96" + "CVE-2024-26704": { + "cmt_msg": "ext4: fix double-free of blocks due to wrong extents moved_len" }, - "CVE-2023-52435": { - "cmt_msg": "net: prevent mss overflow in skb_segment()", - "cmt_id": "989b0ff35fe5fc9652ee5bafbe8483db6f27b137" + "CVE-2020-25672": { + "cmt_msg": "nfc: fix memory leak in llcp_sock_connect()" }, - "CVE-2023-52434": { - "cmt_msg": "smb: client: fix potential OOBs in smb2_parse_contexts()", - "cmt_id": "1ae3c59355dc9882e09c020afe8ffbd895ad0f29" - } - }, - "outstanding": { - "CVE-2020-26556": { - "cmt_msg": "" + "CVE-2020-25673": { + "cmt_msg": "nfc: Avoid endless loops caused by repeated llcp_sock_connect()" }, - "CVE-2020-26557": { - "cmt_msg": "" + "CVE-2020-25670": { + "cmt_msg": "nfc: fix refcount leak in llcp_sock_bind()" }, - "CVE-2019-20794": { - "cmt_msg": "" + "CVE-2020-25671": { + "cmt_msg": "nfc: fix refcount leak in llcp_sock_connect()" }, - "CVE-2020-26559": { - "cmt_msg": "" + "CVE-2019-19813": { + "cmt_msg": "btrfs: inode: Verify inode mode to avoid NULL pointer dereference" }, - "CVE-2020-35501": { - "cmt_msg": "" + "CVE-2020-29374": { + "cmt_msg": "gup: document and work around \"COW can break either way\" issue" }, - "CVE-2023-4010": { - "cmt_msg": "" + "CVE-2019-19815": { + "cmt_msg": "f2fs: support swap file w/ DIO" }, - "CVE-2018-1121": { + "CVE-2019-19814": { "cmt_msg": "" }, - "CVE-2023-52452": { - "cmt_msg": "bpf: Fix accesses to uninit stack slots" + "CVE-2020-29371": { + "cmt_msg": "romfs: fix uninitialized memory leak in romfs_dev_read()" }, - "CVE-2019-19378": { - "cmt_msg": "" + "CVE-2019-19816": { + "cmt_msg": "btrfs: inode: Verify inode mode to avoid NULL pointer dereference" }, - "CVE-2023-23005": { - "cmt_msg": "mm/demotion: fix NULL vs IS_ERR checking in memory_tier_init" + "CVE-2018-18710": { + "cmt_msg": "cdrom: fix improper type cast, which can leat to information leak." }, - "CVE-2024-22386": { - "cmt_msg": "" + "CVE-2023-34255": { + "cmt_msg": "xfs: verify buffer contents when we skip log replay" }, - "CVE-2020-24503": { - "cmt_msg": "" + "CVE-2022-23040": { + "cmt_msg": "xen/xenbus: don't let xenbus_grant_ring() remove grants in error case" }, - "CVE-2020-24502": { - "cmt_msg": "" + "CVE-2023-3141": { + "cmt_msg": "memstick: r592: Fix UAF bug in r592_remove due to race condition" }, - "CVE-2023-6240": { - "cmt_msg": "" + "CVE-2020-12655": { + "cmt_msg": "xfs: add agf freeblocks verify in xfs_agf_verify" }, - "CVE-2023-39191": { - "cmt_msg": "bpf: Fix state pruning for STACK_DYNPTR stack slots" + "CVE-2022-3524": { + "cmt_msg": "tcp/udp: Fix memory leak in ipv6_renew_options()." }, - "CVE-2020-11725": { - "cmt_msg": "" + "CVE-2022-3523": { + "cmt_msg": "mm/memory.c: fix race when faulting a device private page" }, - "CVE-2022-23825": { - "cmt_msg": "" + "CVE-2022-3522": { + "cmt_msg": "mm/hugetlb: use hugetlb_pte_stable in migration race check" }, - "CVE-2023-3397": { - "cmt_msg": "" + "CVE-2022-3521": { + "cmt_msg": "kcm: avoid potential race in kcm_tx_work" }, - "CVE-2023-1476": { - "cmt_msg": "" + "CVE-2018-7755": { + "cmt_msg": "floppy: Do not copy a kernel pointer to user memory in FDGETPRM ioctl" }, - "CVE-2021-3864": { - "cmt_msg": "" + "CVE-2017-7346": { + "cmt_msg": "drm/vmwgfx: limit the number of mip levels in vmw_gb_surface_define_ioctl()" }, - "CVE-2022-3606": { - "cmt_msg": "" + "CVE-2018-7757": { + "cmt_msg": "scsi: libsas: fix memory leak in sas_smp_get_phy_events()" }, - "CVE-2019-19814": { - "cmt_msg": "" + "CVE-2022-0330": { + "cmt_msg": "drm/i915: Flush TLBs before releasing backing store" }, - "CVE-2022-2209": { - "cmt_msg": "" + "CVE-2022-4095": { + "cmt_msg": "staging: rtl8712: fix use after free bugs" }, - "CVE-2023-7042": { - "cmt_msg": "" + "CVE-2017-10911": { + "cmt_msg": "xen-blkback: don't leak stack data via response ring" }, - "CVE-2021-26934": { - "cmt_msg": "" + "CVE-2022-45919": { + "cmt_msg": "media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221" }, - "CVE-2023-47233": { - "cmt_msg": "" + "CVE-2018-5873": { + "cmt_msg": "nsfs: mark dentry with DCACHE_RCUACCESS" }, - "CVE-2016-8660": { - "cmt_msg": "" + "CVE-2021-3669": { + "cmt_msg": "ipc: replace costly bailout check in sysvipc_find_ipc()" }, - "CVE-2023-0597": { - "cmt_msg": "x86/mm: Randomize per-cpu entry area" + "CVE-2019-3701": { + "cmt_msg": "can: gw: ensure DLC boundaries after CAN frame modification" }, - "CVE-2024-26590": { - "cmt_msg": "erofs: fix inconsistent per-file compression format" + "CVE-2023-1095": { + "cmt_msg": "netfilter: nf_tables: fix null deref due to zeroed list head" }, - "CVE-2020-15802": { - "cmt_msg": "" + "CVE-2022-3239": { + "cmt_msg": "media: em28xx: initialize refcount before kref_get" }, - "CVE-2008-2544": { + "CVE-2022-4543": { "cmt_msg": "" }, - "CVE-2024-26595": { - "cmt_msg": "mlxsw: spectrum_acl_tcam: Fix NULL pointer dereference in error path" + "CVE-2017-11089": { + "cmt_msg": "cfg80211: Define nla_policy for NL80211_ATTR_LOCAL_MESH_POWER_MODE" }, - "CVE-2023-6356": { - "cmt_msg": "" + "CVE-2019-18282": { + "cmt_msg": "net/flow_dissector: switch to siphash" }, - "CVE-2019-15239": { - "cmt_msg": "unknown" + "CVE-2021-34981": { + "cmt_msg": "Bluetooth: cmtp: fix file refcount when cmtp_attach_device fails" }, - "CVE-2007-3719": { - "cmt_msg": "" + "CVE-2023-4881": { + "cmt_msg": "netfilter: nftables: exthdr: fix 4-byte stack OOB write" }, - "CVE-2023-20941": { + "CVE-2013-7445": { "cmt_msg": "" }, - "CVE-2023-21400": { - "cmt_msg": "" + "CVE-2024-26804": { + "cmt_msg": "net: ip_tunnel: prevent perpetual headroom growth" }, - "CVE-2023-2640": { - "cmt_msg": "" + "CVE-2022-3303": { + "cmt_msg": "ALSA: pcm: oss: Fix race at SNDCTL_DSP_SYNC" }, - "CVE-2010-4563": { - "cmt_msg": "" + "CVE-2021-37159": { + "cmt_msg": "usb: hso: fix error handling code of hso_create_net_device" }, - "CVE-2020-26140": { - "cmt_msg": "" + "CVE-2024-0607": { + "cmt_msg": "netfilter: nf_tables: fix pointer math issue in nft_byteorder_eval()" }, - "CVE-2020-26143": { - "cmt_msg": "" + "CVE-2024-26801": { + "cmt_msg": "Bluetooth: Avoid potential use-after-free in hci_error_reset" }, - "CVE-2020-26142": { - "cmt_msg": "" + "CVE-2022-28388": { + "cmt_msg": "can: usb_8dev: usb_8dev_start_xmit(): fix double dev_kfree_skb() in error path" }, - "CVE-2024-23848": { - "cmt_msg": "" + "CVE-2017-15115": { + "cmt_msg": "sctp: do not peel off an assoc from one netns to another one" }, - "CVE-2023-4622": { - "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES" + "CVE-2018-1000004": { + "cmt_msg": "ALSA: seq: Make ioctls race-free" }, - "CVE-2022-3533": { - "cmt_msg": "" + "CVE-2023-52607": { + "cmt_msg": "powerpc/mm: Fix null-pointer dereference in pgtable_cache_add" }, - "CVE-2024-26585": { - "cmt_msg": "tls: fix race between tx work scheduling and socket close" + "CVE-2019-20811": { + "cmt_msg": "net-sysfs: call dev_hold if kobject_init_and_add success" }, - "CVE-2024-26584": { - "cmt_msg": "net: tls: handle backlogging of crypto requests" + "CVE-2019-20810": { + "cmt_msg": "media: go7007: fix a miss of snd_card_free" }, - "CVE-2024-26587": { - "cmt_msg": "net: netdevsim: don't try to destroy PHC on VFs" + "CVE-2019-20812": { + "cmt_msg": "af_packet: set defaule value for tmo" }, - "CVE-2022-1247": { - "cmt_msg": "" + "CVE-2020-14314": { + "cmt_msg": "ext4: fix potential negative array index in do_split()" }, - "CVE-2023-6270": { - "cmt_msg": "" + "CVE-2019-18660": { + "cmt_msg": "powerpc/book3s64: Fix link stack flush on context switch" }, - "CVE-2024-0841": { - "cmt_msg": "" + "CVE-2019-12380": { + "cmt_msg": "efi/x86/Add missing error handling to old_memmap 1:1 mapping code" }, - "CVE-2020-10708": { - "cmt_msg": "" + "CVE-2019-12381": { + "cmt_msg": "ip_sockglue: Fix missing-check bug in ip_ra_control()" }, - "CVE-2022-4543": { - "cmt_msg": "" + "CVE-2019-12382": { + "cmt_msg": "drm/edid: Fix a missing-check bug in drm_load_edid_firmware()" }, - "CVE-2017-13693": { - "cmt_msg": "" + "CVE-2020-10766": { + "cmt_msg": "x86/speculation: Prevent rogue cross-process SSBD shutdown" }, - "CVE-2021-0399": { - "cmt_msg": "" + "CVE-2020-10767": { + "cmt_msg": "x86/speculation: Avoid force-disabling IBPB based on STIBP and enhanced IBRS." }, - "CVE-2017-13694": { - "cmt_msg": "" + "CVE-2019-25162": { + "cmt_msg": "i2c: Fix a potential use after free" }, - "CVE-2024-0564": { - "cmt_msg": "" + "CVE-2019-25160": { + "cmt_msg": "netlabel: fix out-of-bounds memory accesses" }, - "CVE-2012-4542": { - "cmt_msg": "" + "CVE-2020-10768": { + "cmt_msg": "x86/speculation: PR_SPEC_FORCE_DISABLE enforcement for indirect branches." }, - "CVE-2023-2176": { - "cmt_msg": "RDMA/core: Refactor rdma_bind_addr" + "CVE-2020-10769": { + "cmt_msg": "crypto: authenc - fix parsing key with misaligned rta_len" }, - "CVE-2013-7445": { - "cmt_msg": "" + "CVE-2020-10942": { + "cmt_msg": "vhost: Check docket sk_family instead of call getname" }, - "CVE-2024-24859": { - "cmt_msg": "" + "CVE-2020-26139": { + "cmt_msg": "mac80211: do not accept/forward invalid EAPOL frames" }, - "CVE-2024-24858": { - "cmt_msg": "" + "CVE-2019-19536": { + "cmt_msg": "can: peak_usb: pcan_usb_pro: Fix info-leaks to USB devices" }, - "CVE-2005-3660": { - "cmt_msg": "" + "CVE-2019-19537": { + "cmt_msg": "USB: core: Fix races in character device registration and deregistraion" }, - "CVE-2024-24855": { - "cmt_msg": "scsi: lpfc: Fix a possible data race in lpfc_unregister_fcf_rescan()" + "CVE-2019-19534": { + "cmt_msg": "can: peak_usb: fix slab info leak" }, - "CVE-2024-24857": { - "cmt_msg": "" + "CVE-2019-19535": { + "cmt_msg": "can: peak_usb: pcan_usb_fd: Fix info-leaks to USB devices" }, - "CVE-2023-31084": { - "cmt_msg": "media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*()" + "CVE-2020-11565": { + "cmt_msg": "mm: mempolicy: require at least one nodeid for MPOL_PREFERRED" }, - "CVE-2023-31083": { - "cmt_msg": "Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO" + "CVE-2019-19533": { + "cmt_msg": "media: ttusb-dec: Fix info-leak in ttusb_dec_send_command()" }, - "CVE-2023-31082": { - "cmt_msg": "" + "CVE-2019-19530": { + "cmt_msg": "usb: cdc-acm: make sure a refcount is taken early enough" }, - "CVE-2023-31081": { - "cmt_msg": "" + "CVE-2019-19531": { + "cmt_msg": "usb: yurex: Fix use-after-free in yurex_delete" }, - "CVE-2022-38096": { - "cmt_msg": "" + "CVE-2017-18257": { + "cmt_msg": "f2fs: fix a dead loop in f2fs_fiemap()" }, - "CVE-2022-3544": { - "cmt_msg": "" + "CVE-2017-18255": { + "cmt_msg": "perf/core: Fix the perf_cpu_time_max_percent check" }, - "CVE-2023-6039": { - "cmt_msg": "net: usb: lan78xx: reorder cleanup operations to avoid UAF bugs" + "CVE-2023-52527": { + "cmt_msg": "ipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data()" }, - "CVE-2024-26596": { - "cmt_msg": "net: dsa: fix netdev_priv() dereference before check on non-DSA netdevice events" + "CVE-2023-3006": { + "cmt_msg": "arm64: Add AMPERE1 to the Spectre-BHB affected list" }, - "CVE-2024-23307": { - "cmt_msg": "" + "CVE-2023-52522": { + "cmt_msg": "net: fix possible store tearing in neigh_periodic_work()" }, - "CVE-2022-3238": { - "cmt_msg": "" + "CVE-2023-52528": { + "cmt_msg": "net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg" }, - "CVE-2008-4609": { - "cmt_msg": "" + "CVE-2020-0305": { + "cmt_msg": "chardev: Avoid potential use-after-free in 'chrdev_open()'" }, - "CVE-2020-14304": { - "cmt_msg": "" + "CVE-2023-39198": { + "cmt_msg": "drm/qxl: fix UAF on handle creation" }, - "CVE-2020-0347": { - "cmt_msg": "" + "CVE-2023-39194": { + "cmt_msg": "net: xfrm: Fix xfrm_address_filter OOB read" }, - "CVE-2021-3714": { - "cmt_msg": "" + "CVE-2023-39197": { + "cmt_msg": "netfilter: conntrack: dccp: copy entire header to stack buffer, not just basic one" }, - "CVE-2023-4133": { - "cmt_msg": "cxgb4: fix use after free bugs caused by circular dependency problem" + "CVE-2023-39193": { + "cmt_msg": "netfilter: xt_sctp: validate the flag_info count" }, - "CVE-2019-12456": { - "cmt_msg": "" + "CVE-2023-39192": { + "cmt_msg": "netfilter: xt_u32: validate user space input" }, - "CVE-2020-26560": { - "cmt_msg": "" + "CVE-2024-26600": { + "cmt_msg": "phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP" }, - "CVE-2021-3892": { - "cmt_msg": "" + "CVE-2024-26606": { + "cmt_msg": "binder: signal epoll threads of self-work" }, - "CVE-2023-4134": { - "cmt_msg": "Input: cyttsp4_core - change del_timer_sync() to timer_shutdown_sync()" + "CVE-2017-14156": { + "cmt_msg": "video: fbdev: aty: do not leak uninitialized padding in clk to userspace" }, - "CVE-2024-24861": { - "cmt_msg": "" + "CVE-2023-52429": { + "cmt_msg": "dm: limit the number of targets and parameter size area" }, - "CVE-2024-24864": { - "cmt_msg": "" + "CVE-2022-1652": { + "cmt_msg": "floppy: use a statically allocated error counter" }, - "CVE-2023-37454": { - "cmt_msg": "" + "CVE-2020-29568": { + "cmt_msg": "xen/xenbus: Allow watches discard events before queueing" }, - "CVE-2022-3642": { + "CVE-2016-8660": { "cmt_msg": "" }, - "CVE-2011-4917": { - "cmt_msg": "" + "CVE-2019-13272": { + "cmt_msg": "ptrace: Fix ->ptracer_cred handling for PTRACE_TRACEME" }, - "CVE-2019-15902": { - "cmt_msg": "unknown" + "CVE-2022-1786": { + "cmt_msg": "io_uring: remove io_identity" }, - "CVE-2024-25739": { - "cmt_msg": "" + "CVE-2020-25669": { + "cmt_msg": "Input: sunkbd - avoid use-after-free in teardown paths" }, - "CVE-2019-15290": { - "cmt_msg": "" + "CVE-2020-25668": { + "cmt_msg": "tty: make FONTX ioctl use the tty pointer they were actually passed" }, - "CVE-2023-6535": { + "CVE-2008-4609": { "cmt_msg": "" }, - "CVE-2023-6536": { - "cmt_msg": "" + "CVE-2023-26607": { + "cmt_msg": "ntfs: fix out-of-bounds read in ntfs_attr_find()" }, - "CVE-2018-17977": { - "cmt_msg": "" + "CVE-2021-4037": { + "cmt_msg": "xfs: fix up non-directory creation in SGID directories" }, - "CVE-2022-26878": { - "cmt_msg": "" + "CVE-2021-22543": { + "cmt_msg": "KVM: do not allow mapping valid but non-reference-counted pages" }, - "CVE-2022-41848": { - "cmt_msg": "" + "CVE-2018-18386": { + "cmt_msg": "n_tty: fix EXTPROC vs ICANON interaction with TIOCINQ (aka FIONREAD)" }, - "CVE-2022-1116": { - "cmt_msg": "" + "CVE-2021-47169": { + "cmt_msg": "serial: rp2: use 'request_firmware' instead of 'request_firmware_nowait'" }, - "CVE-2010-5321": { - "cmt_msg": "" + "CVE-2016-8405": { + "cmt_msg": "fbdev: color map copying bounds checking" }, - "CVE-2018-12930": { - "cmt_msg": "" + "CVE-2023-3776": { + "cmt_msg": "net/sched: cls_fw: Fix improper refcount update leads to use-after-free" }, - "CVE-2018-12931": { - "cmt_msg": "" + "CVE-2017-9242": { + "cmt_msg": "ipv6: fix out of bound writes in __ip6_append_data()" }, - "CVE-2021-39801": { - "cmt_msg": "" + "CVE-2023-3772": { + "cmt_msg": "xfrm: add NULL check in xfrm_update_ae_params" }, - "CVE-2021-39800": { + "CVE-2022-3533": { "cmt_msg": "" }, - "CVE-2024-22099": { - "cmt_msg": "" + "CVE-2022-3534": { + "cmt_msg": "libbpf: Fix use-after-free in btf_dump_name_dups" }, - "CVE-2022-45885": { - "cmt_msg": "" + "CVE-2016-10088": { + "cmt_msg": "sg_write()/bsg_write() is not fit to be called under KERNEL_DS" }, - "CVE-2022-45884": { - "cmt_msg": "" + "CVE-2021-4149": { + "cmt_msg": "btrfs: unlock newly allocated extent buffer after error" }, - "CVE-2024-25740": { - "cmt_msg": "" + "CVE-2022-21385": { + "cmt_msg": "net/rds: fix warn in rds_message_alloc_sgs" }, - "CVE-2024-25741": { - "cmt_msg": "" + "CVE-2021-47180": { + "cmt_msg": "NFC: nci: fix memory leak in nci_allocate_device" }, - "CVE-2024-21803": { - "cmt_msg": "" + "CVE-2020-28097": { + "cmt_msg": "vgacon: remove software scrollback support" }, - "CVE-2022-45888": { - "cmt_msg": "char: xillybus: Prevent use-after-free due to race condition" + "CVE-2017-7533": { + "cmt_msg": "dentry name snapshots" }, - "CVE-2021-3542": { - "cmt_msg": "" + "CVE-2018-8897": { + "cmt_msg": "x86/entry/64: Don't use IST entry for #BP stack" }, - "CVE-2018-12929": { - "cmt_msg": "" + "CVE-2020-14416": { + "cmt_msg": "can, slip: Protect tty->disc_data in write_wakeup and close with RCU" }, - "CVE-2018-12928": { - "cmt_msg": "" + "CVE-2021-46928": { + "cmt_msg": "parisc: Clear stale IIR value on instruction access rights trap" }, - "CVE-2023-6560": { - "cmt_msg": "io_uring: don't allow discontig pages for IORING_SETUP_NO_MMAP" + "CVE-2018-14634": { + "cmt_msg": "exec: Limit arg stack to at most 75% of _STK_LIM" }, - "CVE-2020-25220": { - "cmt_msg": "" + "CVE-2018-14633": { + "cmt_msg": "scsi: target: iscsi: Use hex2bin instead of a re-implementation" }, - "CVE-2015-2877": { - "cmt_msg": "" + "CVE-2021-46924": { + "cmt_msg": "NFC: st21nfca: Fix memory leak in device probe and remove" }, - "CVE-2023-26242": { - "cmt_msg": "" + "CVE-2021-46926": { + "cmt_msg": "ALSA: hda: intel-sdw-acpi: harden detection of controller" }, - "CVE-2019-16089": { - "cmt_msg": "" + "CVE-2016-9755": { + "cmt_msg": "netfilter: ipv6: nf_defrag: drop mangled skb on ream error" }, - "CVE-2023-32629": { - "cmt_msg": "" + "CVE-2016-9756": { + "cmt_msg": "KVM: x86: drop error recovery in em_jmp_far and em_ret_far" }, - "CVE-2022-0400": { - "cmt_msg": "" + "CVE-2017-2636": { + "cmt_msg": "tty: n_hdlc: get rid of racy n_hdlc.tbuf" }, - "CVE-2022-44034": { - "cmt_msg": "char: pcmcia: remove all the drivers" + "CVE-2023-1206": { + "cmt_msg": "tcp: Reduce chance of collisions in inet6_hashfn()." }, - "CVE-2022-44033": { - "cmt_msg": "char: pcmcia: remove all the drivers" + "CVE-2022-3649": { + "cmt_msg": "nilfs2: fix use-after-free bug of struct nilfs_root" }, - "CVE-2022-44032": { - "cmt_msg": "char: pcmcia: remove all the drivers" + "CVE-2022-3646": { + "cmt_msg": "nilfs2: fix leak of nilfs_root in case of writer thread creation failure" }, - "CVE-2023-21264": { - "cmt_msg": "KVM: arm64: Prevent unconditional donation of unmapped regions from the host" + "CVE-2022-3642": { + "cmt_msg": "" + }, + "CVE-2022-3643": { + "cmt_msg": "xen/netback: Ensure protocol headers don't fall in the non-linear area" + }, + "CVE-2021-1048": { + "cmt_msg": "fix regression in \"epoll: Keep a reference on files added to the check list\"" }, - "CVE-2021-3847": { - "cmt_msg": "" + "CVE-2020-0543": { + "cmt_msg": "x86/cpu: Add 'table' argument to cpu_matches()" }, - "CVE-2022-2961": { + "CVE-2024-25739": { "cmt_msg": "" }, - "CVE-2022-25265": { + "CVE-2023-6535": { "cmt_msg": "" }, - "CVE-2011-4916": { - "cmt_msg": "" + "CVE-2023-6536": { + "cmt_msg": "nvmet-tcp: fix a crash in nvmet_req_complete()" }, - "CVE-2023-23039": { - "cmt_msg": "" + "CVE-2019-11810": { + "cmt_msg": "scsi: megaraid_sas: return error when create DMA pool failed" }, - "CVE-2024-23196": { - "cmt_msg": "" + "CVE-2019-11815": { + "cmt_msg": "net: rds: force to destroy connection if t_sock is NULL in rds_tcp_kill_sock()." }, - "CVE-2024-1312": { - "cmt_msg": "mm: lock_vma_under_rcu() must check vma->anon_vma under vma lock" + "CVE-2022-36280": { + "cmt_msg": "drm/vmwgfx: Validate the box size for the snooped cursor" }, - "CVE-2023-3640": { + "CVE-2024-21803": { "cmt_msg": "" - } - } - }, - "6.0": { - "6.0": { - "CVE-2022-2308": { - "cmt_msg": "vduse: prevent uninitialized memory accesses", - "cmt_id": "46f8a29272e51b6df7393d58fc5cb8967397ef2b" - } - }, - "6.0.1": { - "CVE-2022-2978": { - "cmt_msg": "fs: fix UAF/GPF bug in nilfs_mdt_destroy", - "cmt_id": "2a96b532098284ecf8e4849b8b9e5fc7a28bdee9" }, - "CVE-2022-43750": { - "cmt_msg": "usb: mon: make mmapped memory read only", - "cmt_id": "08e2c70e549b77f5f3af9c76da00779d5756f997" - } - }, - "6.0.2": { - "CVE-2022-40768": { - "cmt_msg": "scsi: stex: Properly zero out the passthrough command structure", - "cmt_id": "b9b7369d89924a366b20045dc26dc4dc6b0567a4" + "CVE-2018-7995": { + "cmt_msg": "x86/MCE: Serialize sysfs changes" }, - "CVE-2022-42721": { - "cmt_msg": "wifi: cfg80211: avoid nontransmitted BSS list corruption", - "cmt_id": "377cb1ce85878c197904ca8383e6b41886e3994d" + "CVE-2018-16276": { + "cmt_msg": "USB: yurex: fix out-of-bounds uaccess in read handler" }, - "CVE-2022-3621": { - "cmt_msg": "nilfs2: fix NULL pointer dereference at nilfs_bmap_lookup_at_level()", - "cmt_id": "037e760a4a009e9545a51e87c98c22d9aaf32df7" + "CVE-2023-2176": { + "cmt_msg": "RDMA/core: Refactor rdma_bind_addr" }, - "CVE-2022-3649": { - "cmt_msg": "nilfs2: fix use-after-free bug of struct nilfs_root", - "cmt_id": "6251c9c0430d70cc221d0bb907b278bd99d7b066" + "CVE-2019-16413": { + "cmt_msg": "9p: use inode->i_lock to protect i_size_write() under 32-bit" }, - "CVE-2022-42719": { - "cmt_msg": "wifi: mac80211: fix MBSSID parsing use-after-free", - "cmt_id": "4afcb8886800131f8dd58d82754ee0c508303d46" + "CVE-2019-7222": { + "cmt_msg": "KVM: x86: work around leak of uninitialized stack contents (CVE-2019-7222)" }, - "CVE-2022-41674": { - "cmt_msg": "wifi: cfg80211: fix u8 overflow in cfg80211_update_notlisted_nontrans()", - "cmt_id": "fc1ed6d0c9898a68da7f1f7843560dfda57683e2" + "CVE-2019-7221": { + "cmt_msg": "KVM: nVMX: unconditionally cancel preemption timer in free_nested (CVE-2019-7221)" }, - "CVE-2022-3977": { - "cmt_msg": "mctp: prevent double key removal and unref", - "cmt_id": "3c7c84319833259b0bb8c879928700c9e42d6562" + "CVE-2020-10773": { + "cmt_msg": "s390/cmm: fix information leak in cmm_timeout_handler()" }, - "CVE-2022-3646": { - "cmt_msg": "nilfs2: fix leak of nilfs_root in case of writer thread creation failure", - "cmt_id": "9dc48a360e7b6bb16c48625f8f80ab7665bc9648" + "CVE-2020-36780": { + "cmt_msg": "i2c: sprd: fix reference leak when pm_runtime_get_sync fails" }, - "CVE-2022-42720": { - "cmt_msg": "wifi: cfg80211: fix BSS refcounting bugs", - "cmt_id": "e97a5d7091e6d2df05f8378a518a9bbf81688b77" + "CVE-2018-18281": { + "cmt_msg": "mremap: properly flush TLB before releasing the page" }, - "CVE-2022-42722": { - "cmt_msg": "wifi: mac80211: fix crash in beacon protection for P2P-device", - "cmt_id": "8ed62f2df8ebcf79c185f1bc3e4f346ea0905da6" - } - }, - "6.0.3": { - "CVE-2022-3543": { - "cmt_msg": "af_unix: Fix memory leaks of the whole sk due to OOB skb.", - "cmt_id": "2f415ad33bc1a729fb1050141921b5a9ec4e062c" + "CVE-2022-2663": { + "cmt_msg": "netfilter: nf_conntrack_irc: Fix forged IP logic" }, - "CVE-2022-3623": { - "cmt_msg": "mm/hugetlb: fix races when looking up a CONT-PTE/PMD size hugetlb page", - "cmt_id": "7c7c79dd5a388758f8dfa3de89b131d5d84f25fd" + "CVE-2024-26803": { + "cmt_msg": "net: veth: clear GRO when clearing XDP even when down" }, - "CVE-2022-41849": { - "cmt_msg": "fbdev: smscufx: Fix use-after-free in ufx_ops_open()", - "cmt_id": "e2e5264dcf5796559869750a2d6943ac88fe3918" + "CVE-2020-25643": { + "cmt_msg": "hdlc_ppp: add range checks in ppp_cp_parse_cr()" }, - "CVE-2022-3535": { - "cmt_msg": "net: mvpp2: fix mvpp2 debugfs leak", - "cmt_id": "218dbb2ef8597b837c1a8f248ad176c5f3f5b464" + "CVE-2020-4788": { + "cmt_msg": "powerpc/64s: flush L1D on kernel entry" }, - "CVE-2022-3594": { - "cmt_msg": "r8152: Rate limit overflow messages", - "cmt_id": "21f2532974115026fdab1205aab275d6181fb89f" + "CVE-2021-39698": { + "cmt_msg": "wait: add wake_up_pollfree()" }, - "CVE-2022-2602": { - "cmt_msg": "io_uring/af_unix: defer registered files gc to io_uring release", - "cmt_id": "75e94c7e8859e58aadc15a98cc9704edff47d4f2" + "CVE-2018-5333": { + "cmt_msg": "RDS: null pointer dereference in rds_atomic_free_op" }, - "CVE-2022-41850": { - "cmt_msg": "HID: roccat: Fix use-after-free in roccat_read()", - "cmt_id": "8a251549ab577d64ece210a11c404354479bd635" + "CVE-2018-5332": { + "cmt_msg": "RDS: Heap OOB write in rds_message_alloc_sgs()" }, - "CVE-2022-43945": { - "cmt_msg": "NFSD: Protect against send buffer overflow in NFSv2 READDIR", - "cmt_id": "f59c74df82f6ac9d2ea4e01aa3ae7c6c4481652d" + "CVE-2021-3759": { + "cmt_msg": "memcg: enable accounting of ipc resources" }, - "CVE-2022-3541": { - "cmt_msg": "eth: sp7021: fix use after free bug in spl2sw_nvmem_get_mac_address", - "cmt_id": "99e229c7fe30a1661f9f306b3df06eaf1db064aa" + "CVE-2019-19528": { + "cmt_msg": "USB: iowarrior: fix use-after-free on disconnect" }, - "CVE-2022-3565": { - "cmt_msg": "mISDN: fix use-after-free bugs in l1oip timer handlers", - "cmt_id": "5c9422e2d8563a3efe064493ff7ebbc2948441ea" + "CVE-2017-17448": { + "cmt_msg": "netfilter: nfnetlink_cthelper: Add missing permission checks" }, - "CVE-2022-3542": { - "cmt_msg": "bnx2x: fix potential memory leak in bnx2x_tpa_stop()", - "cmt_id": "a712737af79b4a9a75f9abbf812279062da75777" - } - }, - "6.0.6": { - "CVE-2023-0590": { - "cmt_msg": "net: sched: fix race condition in qdisc_graft()", - "cmt_id": "caee0b9d74119911423111a10c4e9f4e5c8e6d41" - } - }, - "6.0.7": { - "CVE-2023-3006": { - "cmt_msg": "arm64: Add AMPERE1 to the Spectre-BHB affected list", - "cmt_id": "5b962b004afa3c11e651c07232f2402b4678007b" + "CVE-2017-17449": { + "cmt_msg": "netlink: Add netns check on taps" }, - "CVE-2022-3524": { - "cmt_msg": "tcp/udp: Fix memory leak in ipv6_renew_options().", - "cmt_id": "0c5d628f1e1d049c33595693fab1b6e9baf25795" + "CVE-2019-19525": { + "cmt_msg": "ieee802154: atusb: fix use-after-free at disconnect" }, - "CVE-2023-0615": { - "cmt_msg": "media: vivid: dev->bitmap_cap wasn't freed in all cases", - "cmt_id": "74e2e978d1e36c3b67e998e779c02cbc8f481527" - } - }, - "6.0.8": { - "CVE-2022-3628": { - "cmt_msg": "wifi: brcmfmac: Fix potential buffer overflow in brcmf_fweh_event_worker()", - "cmt_id": "631f73deedeb0fbc92ca5037d5a71c9fcae7974d" + "CVE-2019-19524": { + "cmt_msg": "Input: ff-memless - kill timer in destroy()" }, - "CVE-2023-3812": { - "cmt_msg": "net: tun: fix bugs for oversize packet when napi frags enabled", - "cmt_id": "d24ba55946e6bdcfacae989638621d7728ee0ec8" + "CVE-2019-19527": { + "cmt_msg": "HID: hiddev: do cleanup in failure of opening a device" }, - "CVE-2022-42896": { - "cmt_msg": "Bluetooth: L2CAP: Fix accepting connection request for invalid SPSM", - "cmt_id": "d7efeb93213becae13c6a12e4150ce1e07bd2c49" + "CVE-2021-3753": { + "cmt_msg": "vt_kdsetmode: extend console locking" }, - "CVE-2022-42895": { - "cmt_msg": "Bluetooth: L2CAP: Fix attempting to access uninitialized memory", - "cmt_id": "e1aada9b71493b2e11c2a239ece99a97e3f13431" + "CVE-2021-3752": { + "cmt_msg": "Bluetooth: fix use-after-free error in lock_sock_nested()" }, - "CVE-2022-3564": { - "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free caused by l2cap_reassemble_sdu", - "cmt_id": "9a04161244603f502c6e453913e51edd59cb70c1" + "CVE-2023-7192": { + "cmt_msg": "netfilter: ctnetlink: fix possible refcount leak in ctnetlink_create_conntrack()" }, - "CVE-2022-3619": { - "cmt_msg": "Bluetooth: L2CAP: Fix memory leak in vhci_write", - "cmt_id": "5b4f039a2f487c5edae681d763fe1af505f84c13" + "CVE-2017-18249": { + "cmt_msg": "f2fs: fix race condition in between free nid allocator/initializer" }, - "CVE-2022-3640": { - "cmt_msg": "Bluetooth: L2CAP: fix use-after-free in l2cap_conn_del()", - "cmt_id": "8f7e4cf0694149a5d999d676ebd9ecf1b4cb2cc9" - } - }, - "6.0.10": { - "CVE-2023-26607": { - "cmt_msg": "ntfs: fix out-of-bounds read in ntfs_attr_find()", - "cmt_id": "e9b64d1faa58a4ae3454acbf9c80483dd16692d4" + "CVE-2022-1263": { + "cmt_msg": "KVM: avoid NULL pointer dereference in kvm_dirty_ring_push" }, - "CVE-2022-3521": { - "cmt_msg": "kcm: avoid potential race in kcm_tx_work", - "cmt_id": "2526ac6b0f5a9b38e7e9073e37141cf78408078d" + "CVE-2017-18241": { + "cmt_msg": "f2fs: fix a panic caused by NULL flush_cmd_control" }, - "CVE-2022-3169": { - "cmt_msg": "nvme: ensure subsystem reset is single threaded", - "cmt_id": "0c2b1c56252bf19d3412137073c2c07e86f40ba1" - } - }, - "6.0.11": { - "CVE-2022-4139": { - "cmt_msg": "drm/i915: fix TLB invalidation for Gen12 video and compute engines", - "cmt_id": "aef39675ad33317c8badc0165ea882e172a633e6" + "CVE-2021-41864": { + "cmt_msg": "bpf: Fix integer overflow in prealloc_elems_and_freelist()" }, - "CVE-2022-45869": { - "cmt_msg": "KVM: x86/mmu: Fix race condition in direct_page_fault", - "cmt_id": "34ced1da74eb975abdf7ef823512c7719f67601b" + "CVE-2019-15215": { + "cmt_msg": "media: cpia2_usb: first wake up, then free in disconnect" }, - "CVE-2023-2236": { - "cmt_msg": "io_uring/filetable: fix file reference underflow", - "cmt_id": "77a467a3e20978607c56aa4886f46f78ca287054" + "CVE-2022-2209": { + "cmt_msg": "" }, - "CVE-2023-1382": { - "cmt_msg": "tipc: set con sock in tipc_conn_alloc", - "cmt_id": "66d7a37e2ec769fbb4b086cc03c320565be3fbb9" + "CVE-2023-7042": { + "cmt_msg": "wifi: ath10k: fix NULL pointer dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev()" }, - "CVE-2022-47520": { - "cmt_msg": "wifi: wilc1000: validate pairwise and authentication suite offsets", - "cmt_id": "b3ac275fe82fb2e52085dace26ab65c91b3434b8" + "CVE-2023-52559": { + "cmt_msg": "iommu/vt-d: Avoid memory allocation in iommu_suspend()" }, - "CVE-2022-47521": { - "cmt_msg": "wifi: wilc1000: validate length of IEEE80211_P2P_ATTR_CHANNEL_LIST attribute", - "cmt_id": "0269a353bb4bf49902c702e0b55dcab0d470f5aa" + "CVE-2023-47233": { + "cmt_msg": "wifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach" }, - "CVE-2023-2006": { - "cmt_msg": "rxrpc: Fix race between conn bundle lookup and bundle removal [ZDI-CAN-15975]", - "cmt_id": "60272ee9be89f5e8021898e65862f93e9fba90dc" + "CVE-2022-1462": { + "cmt_msg": "tty: use new tty_insert_flip_string_and_push_buffer() in pty_write()" }, - "CVE-2022-3344": { - "cmt_msg": "KVM: x86: nSVM: harden svm_free_nested against freeing vmcb02 while still in use", - "cmt_id": "5ca2721b7d3ed4d3da6323a2ea7339f745866d83" + "CVE-2024-26614": { + "cmt_msg": "tcp: make sure init the accept_queue's spinlocks once" }, - "CVE-2023-0468": { - "cmt_msg": "io_uring: make poll refs more robust", - "cmt_id": "bc4e6ee16778149811333a969a7a893d4cc110c5" + "CVE-2019-20636": { + "cmt_msg": "Input: add safety guards to input_set_keycode()" }, - "CVE-2023-0469": { - "cmt_msg": "io_uring/filetable: fix file reference underflow", - "cmt_id": "77a467a3e20978607c56aa4886f46f78ca287054" + "CVE-2023-52434": { + "cmt_msg": "smb: client: fix potential OOBs in smb2_parse_contexts()" }, - "CVE-2022-47519": { - "cmt_msg": "wifi: wilc1000: validate length of IEEE80211_P2P_ATTR_OPER_CHANNEL attribute", - "cmt_id": "c4b629c29a51344a99f279e0bc0caffd25897725" + "CVE-2023-52436": { + "cmt_msg": "f2fs: explicitly null-terminate the xattr list" }, - "CVE-2022-47518": { - "cmt_msg": "wifi: wilc1000: validate number of channels", - "cmt_id": "6195b4838e10a557859862c4e7840dc0eafdd1cd" - } - }, - "6.0.12": { - "CVE-2022-4378": { - "cmt_msg": "proc: proc_skip_spaces() shouldn't think it is working on C strings", - "cmt_id": "fdf2c95f28bf197bfab421d21e8c697d4f149ea1" + "CVE-2023-51779": { + "cmt_msg": "Bluetooth: af_bluetooth: Fix Use-After-Free in bt_sock_recvmsg" }, - "CVE-2022-3435": { - "cmt_msg": "ipv4: Handle attempt to delete multipath route when fib_info contains an nh reference", - "cmt_id": "bb20a2ae241be846bc3c11ea4b3a3c69e41d51f2" - } - }, - "6.0.13": { - "CVE-2023-2166": { - "cmt_msg": "can: af_can: fix NULL pointer dereference in can_rcv_filter", - "cmt_id": "fcc63f2f7ee3038d53216edd0d8291e57c752557" + "CVE-2018-10877": { + "cmt_msg": "ext4: verify the depth of extent tree in ext4_find_extent()" }, - "CVE-2023-28327": { - "cmt_msg": "af_unix: Get user_ns from in_skb in unix_diag_get_exact().", - "cmt_id": "9c1d6f79a2c7b8221dcec27defc6dc461052ead4" + "CVE-2018-10876": { + "cmt_msg": "ext4: only look at the bg_flags field if it is valid" }, - "CVE-2022-42329": { - "cmt_msg": "xen/netback: don't call kfree_skb() with interrupts disabled", - "cmt_id": "3fb02db125bbcf8163e9e30d2824b4adf13f06cb" + "CVE-2010-4563": { + "cmt_msg": "" }, - "CVE-2022-3643": { - "cmt_msg": "xen/netback: Ensure protocol headers don't fall in the non-linear area", - "cmt_id": "e8851d841fe4f29b613a00de45f39c80dbfdb975" + "CVE-2016-8655": { + "cmt_msg": "packet: fix race condition in packet_set_ring" }, - "CVE-2022-42328": { - "cmt_msg": "xen/netback: don't call kfree_skb() with interrupts disabled", - "cmt_id": "3fb02db125bbcf8163e9e30d2824b4adf13f06cb" - } - }, - "6.0.15": { - "CVE-2022-45934": { - "cmt_msg": "Bluetooth: L2CAP: Fix u8 overflow", - "cmt_id": "5550bbf709c323194881737fd290c4bada9e6ead" - } - }, - "6.0.16": { - "CVE-2023-3357": { - "cmt_msg": "HID: amd_sfh: Add missing check for dma_alloc_coherent", - "cmt_id": "677766555ebd63a81b642a0165eed0dfc63add23" + "CVE-2023-2162": { + "cmt_msg": "scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress" }, - "CVE-2022-3531": { - "cmt_msg": "selftest/bpf: Fix memory leak in kprobe_multi_test", - "cmt_id": "78b772629cc5adec02ab4182b62abe916f2254a0" + "CVE-2018-10879": { + "cmt_msg": "ext4: make sure bitmaps and the inode table don't overlap with bg descriptors" }, - "CVE-2022-3534": { - "cmt_msg": "libbpf: Fix use-after-free in btf_dump_name_dups", - "cmt_id": "8c64a8e76eb85d422af5ec60ccbf26e3ead8c333" + "CVE-2019-14835": { + "cmt_msg": "vhost: make sure log_num < in_num" }, - "CVE-2023-22997": { - "cmt_msg": "module: Fix NULL vs IS_ERR checking for module_get_next_page", - "cmt_id": "052172bb0e4d816cdd3682e4d021d2911b83aa31" + "CVE-2023-4622": { + "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES" }, - "CVE-2022-3595": { - "cmt_msg": "cifs: fix double-fault crash during ntlmssp", - "cmt_id": "983ec6379b9bab7bf790aa7df5dc3a461ebad72a" + "CVE-2023-4623": { + "cmt_msg": "net/sched: sch_hfsc: Ensure inner classes have fsc curve" }, - "CVE-2022-3424": { - "cmt_msg": "misc: sgi-gru: fix use-after-free error in gru_set_context_option, gru_fault and gru_handle_user_call_os", - "cmt_id": "dbc1bb8c8ea930f188b7ce45db162807b3f4b66a" + "CVE-2019-0146": { + "cmt_msg": "i40e: add num_vectors checker in iwarp handler" }, - "CVE-2023-28328": { - "cmt_msg": "media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer()", - "cmt_id": "6fbc44731a4665cbe92a5090e9804a388a72214b" + "CVE-2021-38300": { + "cmt_msg": "bpf, mips: Validate conditional branch offsets" }, - "CVE-2023-26606": { - "cmt_msg": "fs/ntfs3: Fix slab-out-of-bounds read in ntfs_trim_fs", - "cmt_id": "7e686013b7071f4c16644cfad8808e76097724c4" - } - }, - "6.0.17": { - "CVE-2023-26544": { - "cmt_msg": "fs/ntfs3: Fix slab-out-of-bounds read in run_unpack", - "cmt_id": "18f5468aadeef65501f1d0496a426ccdfd242e69" + "CVE-2020-25656": { + "cmt_msg": "vt: keyboard, extend func_buf_lock to readers" }, - "CVE-2022-48423": { - "cmt_msg": "fs/ntfs3: Validate resident attribute name", - "cmt_id": "6f6fc680b28a20b51156645c9f32908ec94eb8c9" + "CVE-2021-4023": { + "cmt_msg": "io-wq: fix cancellation on create-worker failure" }, - "CVE-2022-48424": { - "cmt_msg": "fs/ntfs3: Validate attribute name offset", - "cmt_id": "16e8b2159002e45ed0725eea33860ef154818244" - } - }, - "6.0.18": { - "CVE-2022-36280": { - "cmt_msg": "drm/vmwgfx: Validate the box size for the snooped cursor", - "cmt_id": "4d54d11b49860686331c58a00f733b16a93edfc4" + "CVE-2019-0145": { + "cmt_msg": "i40e: add num_vectors checker in iwarp handler" }, - "CVE-2022-41218": { - "cmt_msg": "media: dvb-core: Fix UAF due to refcount races at releasing", - "cmt_id": "55870fc9e45faa9a65860bcd6b0f8ca8c99afe44" + "CVE-2021-22555": { + "cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write" }, - "CVE-2021-33631": { - "cmt_msg": "ext4: fix kernel BUG in 'ext4_write_inline_data_end()'", - "cmt_id": "be4d62e6c0e11baeeeab1814dbc061d5cf90282c" - } - }, - "6.0.19": { - "CVE-2023-23455": { - "cmt_msg": "net: sched: atm: dont intepret cls results when asked to drop", - "cmt_id": "bbb870c88576239842602b0f7cc58c361dc8e061" + "CVE-2023-3161": { + "cmt_msg": "fbcon: Check font dimension limits" }, - "CVE-2023-23454": { - "cmt_msg": "net: sched: cbq: dont intepret cls results when asked to drop", - "cmt_id": "cde7091efe3fcc0b19f736acd0163499d1fd6d31" + "CVE-2018-7191": { + "cmt_msg": "tun: call dev_get_valid_name() before register_netdevice()" }, - "CVE-2023-0045": { - "cmt_msg": "x86/bugs: Flush IBP in ib_prctl_set()", - "cmt_id": "09f4f4bf0472eaf6781966573ccd2c0eeacee60f" + "CVE-2018-10675": { + "cmt_msg": "mm/mempolicy: fix use after free when calling get_mempolicy" }, - "CVE-2023-0461": { - "cmt_msg": "net/ulp: prevent ULP without clone op from entering the LISTEN status", - "cmt_id": "c1b5dee463cc1e89cfa655d6beff81ec1c0c4258" + "CVE-2017-0786": { + "cmt_msg": "brcmfmac: add length check in brcmf_cfg80211_escan_handler()" }, - "CVE-2023-0210": { - "cmt_msg": "ksmbd: check nt_len to be at least CIFS_ENCPWD_SIZE in ksmbd_decode_ntlmssp_auth_blob", - "cmt_id": "1e7ed525c60d8d51daf2700777071cd0dfb6f807" + "CVE-2021-47082": { + "cmt_msg": "tun: avoid double free in tun_free_netdev" }, - "CVE-2022-3707": { - "cmt_msg": "drm/i915/gvt: fix double free bug in split_2MB_gtt_entry", - "cmt_id": "bb84f2e119accfc65d5fa6ebe31751cdc3bca9fb" - } - }, - "outstanding": { - "CVE-2020-35501": { - "cmt_msg": "" + "CVE-2021-47083": { + "cmt_msg": "pinctrl: mediatek: fix global-out-of-bounds issue" }, - "CVE-2023-6176": { - "cmt_msg": "net/tls: do not free tls_rec on async operation in bpf_exec_tx_verdict()" + "CVE-2021-31916": { + "cmt_msg": "dm ioctl: fix out of bounds array access when no devices" }, - "CVE-2023-21400": { - "cmt_msg": "" + "CVE-2021-47086": { + "cmt_msg": "phonet/pep: refuse to enable an unbound pipe" }, - "CVE-2023-5717": { - "cmt_msg": "perf: Disallow mis-matched inherited group reads" + "CVE-2023-32269": { + "cmt_msg": "netrom: Fix use-after-free caused by accept on already connected socket" }, - "CVE-2023-4273": { - "cmt_msg": "exfat: check if filename entries exceeds max filename length" + "CVE-2021-4157": { + "cmt_msg": "pNFS/flexfiles: fix incorrect size check in decode_nfs_fh()" }, - "CVE-2024-26595": { - "cmt_msg": "mlxsw: spectrum_acl_tcam: Fix NULL pointer dereference in error path" + "CVE-2021-4155": { + "cmt_msg": "xfs: map unwritten blocks in XFS_IOC_{ALLOC,FREE}SP just like fallocate" }, - "CVE-2022-23825": { - "cmt_msg": "" + "CVE-2021-4150": { + "cmt_msg": "block: fix incorrect references to disk objects" }, - "CVE-2023-4004": { - "cmt_msg": "netfilter: nft_set_pipapo: fix improper element removal" + "CVE-2021-4159": { + "cmt_msg": "bpf: Verifer, adjust_scalar_min_max_vals to always call update_reg_bounds()" }, - "CVE-2023-0179": { - "cmt_msg": "netfilter: nft_payload: incorrect arithmetics when fetching VLAN header bits" + "CVE-2021-29154": { + "cmt_msg": "bpf, x86: Validate computation of branch displacements for x86-64" }, - "CVE-2023-3355": { - "cmt_msg": "drm/msm/gem: Add check for kmalloc" + "CVE-2021-29155": { + "cmt_msg": "bpf: Use correct permission flag for mixed signed bounds arithmetic" }, - "CVE-2023-28466": { - "cmt_msg": "net: tls: fix possible race condition between do_tls_getsockopt_conf() and do_tls_setsockopt_conf()" + "CVE-2018-10902": { + "cmt_msg": "ALSA: rawmidi: Change resized buffers atomically" }, - "CVE-2023-0459": { - "cmt_msg": "uaccess: Add speculation barrier to copy_from_user()" + "CVE-2022-25375": { + "cmt_msg": "usb: gadget: rndis: check size of RNDIS_MSG_SET command" }, - "CVE-2023-0458": { - "cmt_msg": "prlimit: do_prlimit needs to have a speculation check" + "CVE-2021-47158": { + "cmt_msg": "net: dsa: sja1105: add error handling in sja1105_setup()" }, - "CVE-2023-0597": { - "cmt_msg": "x86/mm: Randomize per-cpu entry area" + "CVE-2021-47159": { + "cmt_msg": "net: dsa: fix a crash if ->get_sset_count() fails" }, - "CVE-2023-5158": { - "cmt_msg": "vringh: don't use vringh_kiov_advance() in vringh_iov_xfer()" + "CVE-2021-47153": { + "cmt_msg": "i2c: i801: Don't generate an interrupt on bus reset" }, - "CVE-2024-26592": { - "cmt_msg": "ksmbd: fix UAF issue in ksmbd_tcp_new_connection()" + "CVE-2021-47150": { + "cmt_msg": "net: fec: fix the potential memory leak in fec_enet_init()" }, - "CVE-2023-0266": { - "cmt_msg": "ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF" + "CVE-2021-47151": { + "cmt_msg": "interconnect: qcom: bcm-voter: add a missing of_node_put()" }, - "CVE-2024-26590": { - "cmt_msg": "erofs: fix inconsistent per-file compression format" + "CVE-2021-46936": { + "cmt_msg": "net: fix use-after-free in tw_timer_handler" }, - "CVE-2024-26591": { - "cmt_msg": "bpf: Fix re-attachment branch in bpf_tracing_prog_attach" + "CVE-2021-46933": { + "cmt_msg": "usb: gadget: f_fs: Clear ffs_eventfd in ffs_data_clear." }, - "CVE-2020-15802": { - "cmt_msg": "" + "CVE-2021-46932": { + "cmt_msg": "Input: appletouch - initialize work before device registration" }, - "CVE-2024-26597": { - "cmt_msg": "net: qualcomm: rmnet: fix global oob in rmnet_policy" + "CVE-2021-46939": { + "cmt_msg": "tracing: Restructure trace_clock_global() to never block" }, - "CVE-2024-26594": { - "cmt_msg": "ksmbd: validate mech token in session setup" + "CVE-2021-46938": { + "cmt_msg": "dm rq: fix double free of blk_mq_tag_set in dev remove after table load fails" }, - "CVE-2023-2483": { - "cmt_msg": "net: qcom/emac: Fix use after free bug in emac_remove due to race condition" + "CVE-2018-16862": { + "cmt_msg": "mm: cleancache: fix corruption on missed inode invalidation" }, - "CVE-2024-26598": { - "cmt_msg": "KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache" + "CVE-2024-26623": { + "cmt_msg": "pds_core: Prevent race issues involving the adminq" }, - "CVE-2024-26599": { - "cmt_msg": "pwm: Fix out-of-bounds access in of_pwm_single_xlate()" + "CVE-2018-16884": { + "cmt_msg": "sunrpc: use-after-free in svc_process_common()" }, - "CVE-2024-25739": { + "CVE-2022-45885": { "cmt_msg": "" }, - "CVE-2023-25012": { - "cmt_msg": "HID: bigben: use spinlock to safely schedule workers" - }, - "CVE-2023-2002": { - "cmt_msg": "bluetooth: Perform careful capability checks in hci_sock_ioctl()" - }, - "CVE-2024-26586": { - "cmt_msg": "mlxsw: spectrum_acl_tcam: Fix stack corruption" + "CVE-2022-45884": { + "cmt_msg": "" }, - "CVE-2024-26589": { - "cmt_msg": "bpf: Reject variable offset alu on PTR_TO_FLOW_KEYS" + "CVE-2022-45887": { + "cmt_msg": "media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb()" }, - "CVE-2023-1078": { - "cmt_msg": "rds: rds_rm_zerocopy_callback() use list_first_entry()" + "CVE-2022-45886": { + "cmt_msg": "media: dvb-core: Fix use-after-free due on race condition at dvb_net" }, - "CVE-2023-1079": { - "cmt_msg": "HID: asus: use spinlock to safely schedule workers" + "CVE-2024-25744": { + "cmt_msg": "x86/coco: Disable 32-bit emulation by default on TDX and SEV" }, - "CVE-2020-26143": { + "CVE-2015-2877": { "cmt_msg": "" }, - "CVE-2020-26142": { + "CVE-2023-37454": { "cmt_msg": "" }, - "CVE-2023-1074": { - "cmt_msg": "sctp: fail if no bound addresses can be used for a given scope" + "CVE-2018-1130": { + "cmt_msg": "dccp: check sk for closed state in dccp_sendmsg()" }, - "CVE-2023-1075": { - "cmt_msg": "net/tls: tls_is_tx_ready() checked list_entry" + "CVE-2021-45486": { + "cmt_msg": "inet: use bigger hash table for IP ID generation" }, - "CVE-2023-1076": { - "cmt_msg": "tun: tun_chr_open(): correctly initialize socket uid" + "CVE-2021-3506": { + "cmt_msg": "f2fs: fix to avoid out-of-bounds memory access" }, - "CVE-2023-1077": { - "cmt_msg": "sched/rt: pick_next_rt_entity(): check list_entry" + "CVE-2020-14331": { + "cmt_msg": "vgacon: Fix for missing check in scrollback handling" }, - "CVE-2023-46838": { - "cmt_msg": "xen-netback: don't produce zero-size SKB frags" + "CVE-2022-36123": { + "cmt_msg": "x86: Clear .brk area at early boot" }, - "CVE-2023-40283": { - "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb" + "CVE-2019-19532": { + "cmt_msg": "HID: Fix assumption that devices have inputs" }, - "CVE-2023-1073": { - "cmt_msg": "HID: check empty report_list in hid_validate_values()" + "CVE-2020-36558": { + "cmt_msg": "vt: vt_ioctl: fix race in VT_RESIZEX" }, - "CVE-2023-1652": { - "cmt_msg": "NFSD: fix use-after-free in nfsd4_ssc_setup_dul()" + "CVE-2018-13100": { + "cmt_msg": "f2fs: fix to do sanity check with secs_per_zone" }, - "CVE-2024-22386": { - "cmt_msg": "" + "CVE-2017-5897": { + "cmt_msg": "ip6_gre: fix ip6gre_err() invalid reads" }, - "CVE-2024-0564": { - "cmt_msg": "" + "CVE-2017-6074": { + "cmt_msg": "dccp: fix freeing skb too early for IPV6_RECVPKTINFO" }, - "CVE-2024-0565": { - "cmt_msg": "smb: client: fix OOB in receive_encrypted_standard()" + "CVE-2020-36158": { + "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_cmd_802_11_ad_hoc_start" }, - "CVE-2023-2176": { - "cmt_msg": "RDMA/core: Refactor rdma_bind_addr" + "CVE-2022-40307": { + "cmt_msg": "efi: capsule-loader: Fix use-after-free in efi_capsule_write" }, - "CVE-2005-3660": { - "cmt_msg": "" + "CVE-2021-39686": { + "cmt_msg": "binder: use euid from cred instead of using task" }, - "CVE-2023-31085": { - "cmt_msg": "ubi: Refuse attaching if mtd's erasesize is 0" + "CVE-2021-39685": { + "cmt_msg": "USB: gadget: detect too-big endpoint 0 requests" }, - "CVE-2023-31084": { - "cmt_msg": "media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*()" + "CVE-2018-1000204": { + "cmt_msg": "scsi: sg: allocate with __GFP_ZERO in sg_build_indirect()" }, - "CVE-2023-31083": { - "cmt_msg": "Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO" + "CVE-2017-12134": { + "cmt_msg": "xen: fix bio vec merging" }, - "CVE-2023-31082": { - "cmt_msg": "" + "CVE-2017-17450": { + "cmt_msg": "netfilter: xt_osf: Add missing permission checks" }, - "CVE-2023-31081": { - "cmt_msg": "" + "CVE-2024-26592": { + "cmt_msg": "ksmbd: fix UAF issue in ksmbd_tcp_new_connection()" }, - "CVE-2024-23307": { - "cmt_msg": "" + "CVE-2024-26594": { + "cmt_msg": "ksmbd: validate mech token in session setup" }, - "CVE-2022-4543": { - "cmt_msg": "" + "CVE-2017-18270": { + "cmt_msg": "KEYS: prevent creating a different user's keyrings" }, - "CVE-2020-14304": { - "cmt_msg": "" + "CVE-2024-26598": { + "cmt_msg": "KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache" }, - "CVE-2023-3610": { - "cmt_msg": "netfilter: nf_tables: fix chain binding transaction logic" + "CVE-2018-3646": { + "cmt_msg": "x86/microcode: Allow late microcode loading with SMT disabled" }, - "CVE-2023-3611": { - "cmt_msg": "net/sched: sch_qfq: account for stab overhead in qfq_enqueue" + "CVE-2022-29900": { + "cmt_msg": "x86/kvm/vmx: Make noinstr clean" }, - "CVE-2023-4132": { - "cmt_msg": "media: usb: siano: Fix warning due to null work_func_t function pointer" + "CVE-2023-2007": { + "cmt_msg": "scsi: dpt_i2o: Remove obsolete driver" }, - "CVE-2023-4133": { - "cmt_msg": "cxgb4: fix use after free bugs caused by circular dependency problem" + "CVE-2022-1419": { + "cmt_msg": "drm/vgem: Close use-after-free race in vgem_gem_create" }, - "CVE-2020-26560": { - "cmt_msg": "" + "CVE-2017-16913": { + "cmt_msg": "usbip: fix stub_rx: harden CMD_SUBMIT path to handle malicious input" }, - "CVE-2024-0841": { - "cmt_msg": "" + "CVE-2022-2503": { + "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag" }, - "CVE-2023-39198": { - "cmt_msg": "drm/qxl: fix UAF on handle creation" + "CVE-2022-23038": { + "cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()" }, - "CVE-2023-37454": { - "cmt_msg": "" + "CVE-2022-23039": { + "cmt_msg": "xen/gntalloc: don't use gnttab_query_foreign_access()" }, - "CVE-2023-46813": { - "cmt_msg": "x86/sev: Check for user-space IOIO pointing to kernel space" + "CVE-2016-8645": { + "cmt_msg": "tcp: take care of truncations done by sk_filter()" }, - "CVE-2023-33288": { - "cmt_msg": "power: supply: bq24190: Fix use after free bug in bq24190_remove due to race condition" + "CVE-2022-23036": { + "cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()" }, - "CVE-2023-42754": { - "cmt_msg": "ipv4: fix null-deref in ipv4_link_failure" + "CVE-2022-23037": { + "cmt_msg": "xen/netfront: don't use gnttab_query_foreign_access() for mapped status" }, - "CVE-2023-39192": { - "cmt_msg": "netfilter: xt_u32: validate user space input" + "CVE-2017-5669": { + "cmt_msg": "ipc/shm: Fix shmat mmap nil-page protection" }, - "CVE-2023-35829": { - "cmt_msg": "media: rkvdec: fix use after free bug in rkvdec_remove" + "CVE-2019-15538": { + "cmt_msg": "xfs: fix missing ILOCK unlock when xfs_setattr_nonsize fails due to EDQUOT" }, - "CVE-2023-35828": { - "cmt_msg": "usb: gadget: udc: renesas_usb3: Fix use after free bug in renesas_usb3_remove due to race condition" + "CVE-2019-14821": { + "cmt_msg": "KVM: coalesced_mmio: add bounds checking" }, - "CVE-2022-1116": { - "cmt_msg": "" + "CVE-2020-12826": { + "cmt_msg": "signal: Extend exec_id to 64bits" }, - "CVE-2023-6610": { - "cmt_msg": "smb: client: fix potential OOB in smb2_dump_detail()" + "CVE-2021-42008": { + "cmt_msg": "net: 6pack: fix slab-out-of-bounds in decode_data" }, - "CVE-2023-35823": { - "cmt_msg": "media: saa7134: fix use after free bug in saa7134_finidev due to race condition" + "CVE-2020-25645": { + "cmt_msg": "geneve: add transport ports in route lookup for geneve" }, - "CVE-2023-35824": { - "cmt_msg": "media: dm1105: Fix use after free bug in dm1105_remove due to race condition" + "CVE-2019-15666": { + "cmt_msg": "xfrm: policy: Fix out-of-bound array accesses in __xfrm_policy_unlink" }, - "CVE-2023-35827": { - "cmt_msg": "ravb: Fix use-after-free issue in ravb_tx_timeout_work()" + "CVE-2015-1350": { + "cmt_msg": "fs: Avoid premature clearing of capabilities" }, - "CVE-2023-35826": { - "cmt_msg": "media: cedrus: fix use after free bug in cedrus_remove due to race condition" + "CVE-2021-33034": { + "cmt_msg": "Bluetooth: verify AMP hci_chan before amp_destroy" }, - "CVE-2023-38432": { - "cmt_msg": "ksmbd: validate command payload size" + "CVE-2017-18509": { + "cmt_msg": "ipv6: check sk sk_type and protocol early in ip_mroute_set/getsockopt" }, - "CVE-2022-3567": { - "cmt_msg": "ipv6: Fix data races around sk->sk_prot." + "CVE-2017-11600": { + "cmt_msg": "xfrm: policy: check policy direction value" }, - "CVE-2022-3566": { - "cmt_msg": "tcp: Fix data races around icsk->icsk_af_ops." + "CVE-2024-26625": { + "cmt_msg": "llc: call sock_orphan() at release time" }, - "CVE-2022-4269": { - "cmt_msg": "act_mirred: use the backlog for nested calls to mirred ingress" + "CVE-2024-26627": { + "cmt_msg": "scsi: core: Move scsi_host_busy() out of host lock for waking up EH handler" }, - "CVE-2023-52340": { - "cmt_msg": "ipv6: remove max_size check inline with ipv4" + "CVE-2024-26622": { + "cmt_msg": "tomoyo: fix UAF write bug in tomoyo_write_control()" }, - "CVE-2023-1032": { - "cmt_msg": "net: avoid double iput when sock_alloc_file fails" + "CVE-2024-22386": { + "cmt_msg": "" }, - "CVE-2023-6560": { - "cmt_msg": "io_uring: don't allow discontig pages for IORING_SETUP_NO_MMAP" + "CVE-2018-10021": { + "cmt_msg": "scsi: libsas: defer ata device eh commands to libata" }, - "CVE-2023-30772": { - "cmt_msg": "power: supply: da9150: Fix use after free bug in da9150_charger_remove due to race condition" + "CVE-2017-18221": { + "cmt_msg": "mlock: fix mlock count can not decrease in race condition" }, - "CVE-2023-1611": { - "cmt_msg": "btrfs: fix race between quota disable and quota assign ioctls" + "CVE-2019-10126": { + "cmt_msg": "mwifiex: Fix heap overflow in mwifiex_uap_parse_tail_ies()" }, - "CVE-2024-0639": { - "cmt_msg": "sctp: fix potential deadlock on &net->sctp.addr_wq_lock" + "CVE-2019-10124": { + "cmt_msg": "mm: hwpoison: fix thp split handing in soft_offline_in_use_page()" }, - "CVE-2022-48425": { - "cmt_msg": "fs/ntfs3: Validate MFT flags before replaying logs" + "CVE-2020-13974": { + "cmt_msg": "vt: keyboard: avoid signed integer overflow in k_ascii" }, - "CVE-2023-52429": { - "cmt_msg": "dm: limit the number of targets and parameter size area" + "CVE-2018-10938": { + "cmt_msg": "Cipso: cipso_v4_optptr enter infinite loop" }, - "CVE-2023-39189": { - "cmt_msg": "netfilter: nfnetlink_osf: avoid OOB read" + "CVE-2020-15437": { + "cmt_msg": "serial: 8250: fix null-ptr-deref in serial8250_start_tx()" }, - "CVE-2023-35001": { - "cmt_msg": "netfilter: nf_tables: prevent OOB access in nft_byteorder_eval" + "CVE-2020-15436": { + "cmt_msg": "block: Fix use-after-free in blkdev_get()" }, - "CVE-2023-46862": { - "cmt_msg": "io_uring/fdinfo: lock SQ thread while retrieving thread cpu/pid" + "CVE-2021-47065": { + "cmt_msg": "rtw88: Fix array overrun in rtw_get_tx_power_params()" }, - "CVE-2020-26556": { - "cmt_msg": "" + "CVE-2022-23816": { + "cmt_msg": "x86/kvm/vmx: Make noinstr clean" }, - "CVE-2020-26557": { - "cmt_msg": "" + "CVE-2021-47145": { + "cmt_msg": "btrfs: do not BUG_ON in link_to_fixup_dir" }, - "CVE-2023-34324": { - "cmt_msg": "xen/events: replace evtchn_rwlock with RCU" + "CVE-2021-47149": { + "cmt_msg": "net: fujitsu: fix potential null-ptr-deref" }, - "CVE-2019-20794": { - "cmt_msg": "" + "CVE-2018-19407": { + "cmt_msg": "KVM: X86: Fix scan ioapic use-before-initialization" }, - "CVE-2020-26559": { - "cmt_msg": "" + "CVE-2021-47144": { + "cmt_msg": "drm/amd/amdgpu: fix refcount leak" }, - "CVE-2023-3397": { - "cmt_msg": "" + "CVE-2021-47147": { + "cmt_msg": "ptp: ocp: Fix a resource leak in an error handling path" }, - "CVE-2023-52458": { - "cmt_msg": "block: add check that partition length needs to be aligned with block size" + "CVE-2021-47146": { + "cmt_msg": "mld: fix panic in mld_newpack()" }, - "CVE-2023-52457": { - "cmt_msg": "serial: 8250: omap: Don't skip resource freeing if pm_runtime_resume_and_get() failed" + "CVE-2021-47140": { + "cmt_msg": "iommu/amd: Clear DMA ops when switching domain" }, - "CVE-2018-1121": { - "cmt_msg": "" + "CVE-2021-47143": { + "cmt_msg": "net/smc: remove device from smcd_dev_list after failed device_add()" }, - "CVE-2023-52454": { - "cmt_msg": "nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length" + "CVE-2021-47142": { + "cmt_msg": "drm/amdgpu: Fix a use-after-free" }, - "CVE-2023-52452": { - "cmt_msg": "bpf: Fix accesses to uninit stack slots" + "CVE-2024-26765": { + "cmt_msg": "LoongArch: Disable IRQ before init_fn() for nonboot CPUs" }, - "CVE-2023-52451": { - "cmt_msg": "powerpc/pseries/memhp: Fix access beyond end of drmem array" + "CVE-2018-16871": { + "cmt_msg": "nfsd: COPY and CLONE operations require the saved filehandle to be set" }, - "CVE-2024-1085": { - "cmt_msg": "netfilter: nf_tables: check if catch-all set element is active in next generation" + "CVE-2018-16658": { + "cmt_msg": "cdrom: Fix info leak/OOB read in cdrom_ioctl_drive_status" }, - "CVE-2024-1086": { - "cmt_msg": "netfilter: nf_tables: reject QUEUE/DROP verdict parameters" + "CVE-2019-19036": { + "cmt_msg": "btrfs: Detect unbalanced tree with empty leaf before crashing btree operations" }, - "CVE-2023-32250": { - "cmt_msg": "ksmbd: fix racy issue from session setup and logoff" + "CVE-2017-8797": { + "cmt_msg": "nfsd: fix undefined behavior in nfsd4_layout_verify" }, - "CVE-2023-6240": { - "cmt_msg": "" + "CVE-2021-32078": { + "cmt_msg": "ARM: footbridge: remove personal server platform" }, - "CVE-2023-23559": { - "cmt_msg": "wifi: rndis_wlan: Prevent buffer overflow in rndis_query_oid" + "CVE-2022-4662": { + "cmt_msg": "USB: core: Prevent nested device-reset calls" }, - "CVE-2023-32233": { - "cmt_msg": "netfilter: nf_tables: deactivate anonymous set from preparation phase" + "CVE-2019-11833": { + "cmt_msg": "ext4: zero out the unused memory region in the extent tree block" }, - "CVE-2023-44466": { - "cmt_msg": "libceph: harden msgr2.1 frame segment length checks" + "CVE-2018-5953": { + "cmt_msg": "printk: hash addresses printed with %p" }, - "CVE-2024-23196": { - "cmt_msg": "" + "CVE-2018-1128": { + "cmt_msg": "libceph: add authorizer challenge" }, - "CVE-2019-19814": { - "cmt_msg": "" + "CVE-2018-1129": { + "cmt_msg": "libceph: implement CEPHX_V2 calculation mode" }, - "CVE-2021-26934": { + "CVE-2018-20854": { + "cmt_msg": "phy: ocelot-serdes: fix out-of-bounds read" + }, + "CVE-2018-1121": { "cmt_msg": "" }, - "CVE-2023-3141": { - "cmt_msg": "memstick: r592: Fix UAF bug in r592_remove due to race condition" + "CVE-2018-20856": { + "cmt_msg": "block: blk_init_allocated_queue() set q->fq as NULL in the fail case" }, - "CVE-2022-3523": { - "cmt_msg": "mm/memory.c: fix race when faulting a device private page" + "CVE-2022-3061": { + "cmt_msg": "video: fbdev: i740fb: Error out if 'pixclock' equals zero" }, - "CVE-2022-3522": { - "cmt_msg": "mm/hugetlb: use hugetlb_pte_stable in migration race check" + "CVE-2020-27784": { + "cmt_msg": "usb: gadget: function: printer: fix use-after-free in __lock_acquire" }, - "CVE-2008-2544": { + "CVE-2020-27786": { + "cmt_msg": "ALSA: rawmidi: Fix racy buffer resize under concurrent accesses" + }, + "CVE-2023-6240": { "cmt_msg": "" }, - "CVE-2022-2196": { - "cmt_msg": "KVM: VMX: Execute IBPB on emulated VM-exit when guest has IBRS" + "CVE-2022-39842": { + "cmt_msg": "video: fbdev: pxa3xx-gcu: Fix integer overflow in pxa3xx_gcu_write" }, - "CVE-2023-3865": { - "cmt_msg": "ksmbd: fix out-of-bound read in smb2_write" + "CVE-2023-51043": { + "cmt_msg": "drm/atomic: Fix potential use-after-free in nonblocking commits" }, - "CVE-2023-3867": { - "cmt_msg": "ksmbd: add missing compound request handing in some commands" + "CVE-2019-9454": { + "cmt_msg": "i2c: core-smbus: prevent stack corruption on read I2C_BLOCK_DATA" }, - "CVE-2023-3866": { - "cmt_msg": "ksmbd: validate session id and tree id in the compound request" + "CVE-2017-16939": { + "cmt_msg": "ipsec: Fix aborted xfrm policy dump crash" }, - "CVE-2007-3719": { - "cmt_msg": "" + "CVE-2016-10741": { + "cmt_msg": "xfs: don't BUG() on mixed direct and mapped I/O" }, - "CVE-2023-3863": { - "cmt_msg": "net: nfc: Fix use-after-free caused by nfc_llcp_find_local" + "CVE-2021-26931": { + "cmt_msg": "xen-blkback: don't \"handle\" error by BUG()" }, - "CVE-2022-45919": { - "cmt_msg": "media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221" + "CVE-2021-26930": { + "cmt_msg": "xen-blkback: fix error handling in xen_blkbk_map()" }, - "CVE-2023-2248": { - "cmt_msg": "net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg" + "CVE-2021-26932": { + "cmt_msg": "Xen/x86: don't bail early from clear_foreign_p2m_mapping()" }, - "CVE-2023-32269": { - "cmt_msg": "netrom: Fix use-after-free caused by accept on already connected socket" + "CVE-2022-36402": { + "cmt_msg": "drm/vmwgfx: Fix shader stage validation" }, - "CVE-2024-26583": { - "cmt_msg": "tls: fix race between async notify and socket close" + "CVE-2021-3178": { + "cmt_msg": "nfsd4: readdirplus shouldn't return parent of export" }, - "CVE-2024-26582": { - "cmt_msg": "net: tls: fix use-after-free with partial reads and async decrypt" + "CVE-2023-1611": { + "cmt_msg": "btrfs: fix race between quota disable and quota assign ioctls" }, - "CVE-2024-26585": { - "cmt_msg": "tls: fix race between tx work scheduling and socket close" + "CVE-2021-3772": { + "cmt_msg": "sctp: use init_tag from inithdr for ABORT chunk" }, - "CVE-2024-26584": { - "cmt_msg": "net: tls: handle backlogging of crypto requests" + "CVE-2021-34556": { + "cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4" }, - "CVE-2024-26587": { - "cmt_msg": "net: netdevsim: don't try to destroy PHC on VFs" + "CVE-2021-28714": { + "cmt_msg": "xen/netback: fix rx queue stall detection" + }, + "CVE-2021-28713": { + "cmt_msg": "xen/console: harden hvc_xen against event channel storms" + }, + "CVE-2021-28712": { + "cmt_msg": "xen/netfront: harden netfront against event channel storms" + }, + "CVE-2021-28711": { + "cmt_msg": "xen/blkfront: harden blkfront against event channel storms" }, "CVE-2022-1247": { "cmt_msg": "" }, - "CVE-2023-51782": { - "cmt_msg": "net/rose: Fix Use-After-Free in rose_ioctl" + "CVE-2022-2991": { + "cmt_msg": "remove the lightnvm subsystem" }, - "CVE-2024-26588": { - "cmt_msg": "LoongArch: BPF: Prevent out-of-bounds memory access" + "CVE-2017-11473": { + "cmt_msg": "x86/acpi: Prevent out of bound access caused by broken ACPI tables" }, - "CVE-2023-51780": { - "cmt_msg": "atm: Fix Use-After-Free in do_vcc_ioctl" + "CVE-2017-11472": { + "cmt_msg": "ACPICA: Namespace: fix operand cache leak" }, - "CVE-2023-51781": { - "cmt_msg": "appletalk: Fix Use-After-Free in atalk_ioctl" + "CVE-2017-17862": { + "cmt_msg": "bpf: fix branch pruning logic" }, - "CVE-2023-3090": { - "cmt_msg": "ipvlan:Fix out-of-bounds caused by unclear skb->cb" + "CVE-2021-39657": { + "cmt_msg": "scsi: ufs: Correct the LUN used in eh_device_reset_handler() callback" }, - "CVE-2022-3238": { - "cmt_msg": "" + "CVE-2023-52578": { + "cmt_msg": "net: bridge: use DEV_STATS_INC()" }, - "CVE-2023-4921": { - "cmt_msg": "net: sched: sch_qfq: Fix UAF in qfq_dequeue()" + "CVE-2023-52574": { + "cmt_msg": "team: fix null-ptr-deref when team device type is changed" }, - "CVE-2023-1829": { - "cmt_msg": "net/sched: Retire tcindex classifier" + "CVE-2023-3567": { + "cmt_msg": "vc_screen: move load of struct vc_data pointer in vcs_read() to avoid UAF" }, - "CVE-2024-0775": { - "cmt_msg": "ext4: improve error recovery code paths in __ext4_remount()" + "CVE-2023-52571": { + "cmt_msg": "power: supply: rk817: Fix node refcount leak" }, - "CVE-2023-4881": { - "cmt_msg": "netfilter: nftables: exthdr: fix 4-byte stack OOB write" + "CVE-2023-52572": { + "cmt_msg": "cifs: Fix UAF in cifs_demultiplex_thread()" }, - "CVE-2013-7445": { - "cmt_msg": "" + "CVE-2017-14340": { + "cmt_msg": "xfs: XFS_IS_REALTIME_INODE() should be false if no rt device present" }, - "CVE-2023-31248": { - "cmt_msg": "netfilter: nf_tables: do not ignore genmask when looking up chain by id" + "CVE-2019-19039": { + "cmt_msg": "btrfs: Don't submit any btree write bio if the fs has errors" }, - "CVE-2024-26593": { - "cmt_msg": "i2c: i801: Fix block process call transactions" + "CVE-2016-8630": { + "cmt_msg": "kvm: x86: Check memopp before dereference (CVE-2016-8630)" }, - "CVE-2022-38096": { - "cmt_msg": "" + "CVE-2016-8633": { + "cmt_msg": "firewire: net: guard against rx buffer overflows" }, - "CVE-2023-2898": { - "cmt_msg": "f2fs: fix to avoid NULL pointer dereference f2fs_write_end_io()" + "CVE-2016-8632": { + "cmt_msg": "tipc: check minimum bearer MTU" }, - "CVE-2023-6931": { - "cmt_msg": "perf: Fix perf_event_validate_size()" + "CVE-2020-12362": { + "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" }, - "CVE-2023-6932": { - "cmt_msg": "ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet" + "CVE-2020-12363": { + "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" }, - "CVE-2024-0607": { - "cmt_msg": "netfilter: nf_tables: fix pointer math issue in nft_byteorder_eval()" + "CVE-2019-12881": { + "cmt_msg": "drm/i915/userptr: reject zero user_size" }, "CVE-2022-4129": { "cmt_msg": "l2tp: Serialize access to sk_user_data with sk_callback_lock" }, - "CVE-2023-33203": { - "cmt_msg": "net: qcom/emac: Fix use after free bug in emac_remove due to race condition" + "CVE-2020-12364": { + "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" + }, + "CVE-2021-4002": { + "cmt_msg": "hugetlbfs: flush TLBs correctly after huge_pmd_unshare" }, "CVE-2023-26545": { "cmt_msg": "net: mpls: fix stale pointer if allocation fails during device rename" }, - "CVE-2023-50431": { - "cmt_msg": "accel/habanalabs: fix information leak in sec_attest_info()" - }, - "CVE-2023-52464": { - "cmt_msg": "EDAC/thunderx: Fix possible out-of-bounds string access" + "CVE-2017-12168": { + "cmt_msg": "arm64: KVM: pmu: Fix AArch32 cycle counter access" }, - "CVE-2023-52462": { - "cmt_msg": "bpf: fix check for attempt to corrupt spilled pointer" + "CVE-2019-15292": { + "cmt_msg": "appletalk: Fix use-after-free in atalk_proc_exit" }, - "CVE-2023-52463": { - "cmt_msg": "efivarfs: force RO when remounting if SetVariable is not supported" + "CVE-2019-15291": { + "cmt_msg": "media: b2c2-flexcop-usb: add sanity checking" }, "CVE-2019-15290": { "cmt_msg": "" @@ -63243,901 +96908,886 @@ "CVE-2023-3212": { "cmt_msg": "gfs2: Don't deref jdesc in evict" }, - "CVE-2024-23848": { - "cmt_msg": "" + "CVE-2024-26633": { + "cmt_msg": "ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim()" }, - "CVE-2023-6622": { - "cmt_msg": "netfilter: nf_tables: bail out on mismatching dynset and set expressions" + "CVE-2024-26636": { + "cmt_msg": "llc: make llc_ui_sendmsg() more robust against bonding changes" }, - "CVE-2022-26878": { - "cmt_msg": "" + "CVE-2024-26635": { + "cmt_msg": "llc: Drop support for ETH_P_TR_802_2." }, - "CVE-2018-12930": { - "cmt_msg": "" + "CVE-2017-7308": { + "cmt_msg": "net/packet: fix overflow in check for priv area size" }, - "CVE-2018-12931": { - "cmt_msg": "" + "CVE-2020-12769": { + "cmt_msg": "spi: spi-dw: Add lock protect dw_spi rx/tx to prevent concurrent calls" }, - "CVE-2023-38426": { - "cmt_msg": "ksmbd: fix global-out-of-bounds in smb2_find_context_vals" + "CVE-2017-8890": { + "cmt_msg": "dccp/tcp: do not inherit mc_list from parent" }, - "CVE-2023-32247": { - "cmt_msg": "ksmbd: destroy expired sessions" + "CVE-2023-52635": { + "cmt_msg": "PM / devfreq: Synchronize devfreq_monitor_[start/stop]" + }, + "CVE-2023-52634": { + "cmt_msg": "drm/amd/display: Fix disable_otg_wa logic" + }, + "CVE-2016-9588": { + "cmt_msg": "kvm: nVMX: Allow L1 to intercept software exceptions (#BP and #OF)" + }, + "CVE-2017-18208": { + "cmt_msg": "mm/madvise.c: fix madvise() infinite loop under special circumstances" + }, + "CVE-2017-1000364": { + "cmt_msg": "mm: larger stack guard gap, between vmas" + }, + "CVE-2017-1000365": { + "cmt_msg": "fs/exec.c: account for argv/envp pointers" + }, + "CVE-2020-13143": { + "cmt_msg": "USB: gadget: fix illegal array access in binding with UDC" + }, + "CVE-2017-1000363": { + "cmt_msg": "char: lp: fix possible integer overflow in lp_setup()" + }, + "CVE-2022-3903": { + "cmt_msg": "media: mceusb: Use new usb_control_msg_*() routines" + }, + "CVE-2018-20449": { + "cmt_msg": "printk: hash addresses printed with %p" }, - "CVE-2023-32248": { - "cmt_msg": "ksmbd: fix NULL pointer dereference in smb2_get_info_filesystem()" + "CVE-2017-15299": { + "cmt_msg": "KEYS: don't let add_key() update an uninstantiated key" }, - "CVE-2023-1998": { - "cmt_msg": "x86/speculation: Allow enabling STIBP with legacy IBRS" + "CVE-2021-47179": { + "cmt_msg": "NFSv4: Fix a NULL pointer dereference in pnfs_mark_matching_lsegs_return()" }, - "CVE-2024-25740": { - "cmt_msg": "" + "CVE-2019-11190": { + "cmt_msg": "binfmt_elf: switch to new creds when switching to new mm" }, - "CVE-2022-3903": { - "cmt_msg": "media: mceusb: Use new usb_control_msg_*() routines" + "CVE-2019-11191": { + "cmt_msg": "x86: Deprecate a.out support" }, - "CVE-2023-1195": { - "cmt_msg": "cifs: fix use-after-free caused by invalid pointer `hostname`" + "CVE-2021-47170": { + "cmt_msg": "USB: usbfs: Don't WARN about excessively large memory allocations" }, - "CVE-2023-1194": { - "cmt_msg": "ksmbd: fix out-of-bound read in parse_lease_state()" + "CVE-2021-47171": { + "cmt_msg": "net: usb: fix memory leak in smsc75xx_bind" }, - "CVE-2023-20588": { - "cmt_msg": "x86/CPU/AMD: Do not leak quotient data after a division by 0" + "CVE-2021-47172": { + "cmt_msg": "iio: adc: ad7124: Fix potential overflow due to non sequential channel numbers" }, - "CVE-2023-1192": { - "cmt_msg": "fs/ntfs3: Validate MFT flags before replaying logs" + "CVE-2021-47173": { + "cmt_msg": "misc/uss720: fix memory leak in uss720_probe" }, - "CVE-2022-4379": { - "cmt_msg": "NFSD: fix use-after-free in __nfs42_ssc_open()" + "CVE-2021-47175": { + "cmt_msg": "net/sched: fq_pie: fix OOB access in the traffic path" }, - "CVE-2022-44034": { - "cmt_msg": "char: pcmcia: remove all the drivers" + "CVE-2018-10323": { + "cmt_msg": "xfs: set format back to extents if xfs_bmap_extents_to_btree" }, - "CVE-2022-44033": { - "cmt_msg": "char: pcmcia: remove all the drivers" + "CVE-2018-10322": { + "cmt_msg": "xfs: enhance dinode verifier" }, - "CVE-2022-44032": { - "cmt_msg": "char: pcmcia: remove all the drivers" + "CVE-2021-46951": { + "cmt_msg": "tpm: efi: Use local variable for calculating final log size" }, - "CVE-2022-48502": { - "cmt_msg": "fs/ntfs3: Check fields while reading" + "CVE-2021-46950": { + "cmt_msg": "md/raid1: properly indicate failure when ending a failed write request" }, - "CVE-2023-21102": { - "cmt_msg": "efi: rt-wrapper: Add missing include" + "CVE-2021-46952": { + "cmt_msg": "NFS: fs_context: validate UDP retrans to prevent shift out-of-bounds" }, - "CVE-2024-22705": { - "cmt_msg": "ksmbd: fix slab-out-of-bounds in smb_strndup_from_utf16()" + "CVE-2021-46959": { + "cmt_msg": "spi: Fix use-after-free with devm_spi_alloc_*" }, - "CVE-2023-4147": { - "cmt_msg": "netfilter: nf_tables: disallow rule addition to bound chain via NFTA_RULE_CHAIN_ID" + "CVE-2017-18193": { + "cmt_msg": "f2fs: fix a bug caused by NULL extent tree" }, - "CVE-2023-5090": { - "cmt_msg": "x86: KVM: SVM: always update the x2avic msr interception" + "CVE-2023-5178": { + "cmt_msg": "nvmet-tcp: Fix a possible UAF in queue intialization setup" }, - "CVE-2023-38427": { - "cmt_msg": "ksmbd: fix out-of-bound read in deassemble_neg_contexts()" + "CVE-2021-0929": { + "cmt_msg": "staging/android/ion: delete dma_buf->kmap/unmap implemenation" }, - "CVE-2024-0641": { - "cmt_msg": "tipc: fix a potential deadlock on &tx->lock" + "CVE-2018-19985": { + "cmt_msg": "USB: hso: Fix OOB memory access in hso_probe/hso_get_config_data" }, - "CVE-2024-0646": { - "cmt_msg": "net: tls, update curr on splice as well" + "CVE-2021-0920": { + "cmt_msg": "af_unix: fix garbage collect vs MSG_PEEK" }, - "CVE-2023-2430": { - "cmt_msg": "io_uring/msg_ring: fix missing lock on overflow for IOPOLL" + "CVE-2017-7273": { + "cmt_msg": "HID: hid-cypress: validate length of report" }, - "CVE-2023-39194": { - "cmt_msg": "net: xfrm: Fix xfrm_address_filter OOB read" + "CVE-2017-7477": { + "cmt_msg": "macsec: avoid heap overflow in skb_to_sgvec" }, - "CVE-2023-39197": { - "cmt_msg": "netfilter: conntrack: dccp: copy entire header to stack buffer, not just basic one" + "CVE-2023-0615": { + "cmt_msg": "media: vivid: dev->bitmap_cap wasn't freed in all cases" }, - "CVE-2023-39191": { - "cmt_msg": "bpf: Fix state pruning for STACK_DYNPTR stack slots" + "CVE-2017-7472": { + "cmt_msg": "KEYS: fix keyctl_set_reqkey_keyring() to not leak thread keyrings" }, - "CVE-2023-38428": { - "cmt_msg": "ksmbd: fix wrong UserName check in session_user" + "CVE-2022-3586": { + "cmt_msg": "sch_sfb: Don't assume the skb is still around after enqueueing to child" }, - "CVE-2023-39193": { - "cmt_msg": "netfilter: xt_sctp: validate the flag_info count" + "CVE-2020-27825": { + "cmt_msg": "tracing: Fix race in trace_open and buffer resize call" }, - "CVE-2020-26140": { - "cmt_msg": "" + "CVE-2019-2181": { + "cmt_msg": "binder: check for overflow when alloc for security context" }, - "CVE-2023-38431": { - "cmt_msg": "ksmbd: check the validation of pdu_size in ksmbd_conn_handler_loop" + "CVE-2019-2182": { + "cmt_msg": "arm64: Enforce BBM for huge IO/VMAP mappings" }, - "CVE-2023-38430": { - "cmt_msg": "ksmbd: validate smb request protocol id" + "CVE-2020-27820": { + "cmt_msg": "drm/nouveau: use drm_dev_unplug() during device removal" }, - "CVE-2023-3390": { - "cmt_msg": "netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE" + "CVE-2023-6610": { + "cmt_msg": "smb: client: fix potential OOB in smb2_dump_detail()" }, "CVE-2023-1476": { "cmt_msg": "" }, - "CVE-2021-3864": { - "cmt_msg": "" - }, - "CVE-2024-23849": { - "cmt_msg": "net/rds: Fix UBSAN: array-index-out-of-bounds in rds_cmsg_recv" - }, "CVE-2023-1670": { "cmt_msg": "xirc2ps_cs: Fix use after free bug in xirc2ps_detach" }, - "CVE-2023-38429": { - "cmt_msg": "ksmbd: allocate one more byte for implied bcc[0]" + "CVE-2020-14351": { + "cmt_msg": "perf/core: Fix race in the perf_mmap_close() function" }, - "CVE-2023-51043": { - "cmt_msg": "drm/atomic: Fix potential use-after-free in nonblocking commits" + "CVE-2020-14353": { + "cmt_msg": "KEYS: prevent creating a different user's keyrings" }, - "CVE-2023-51042": { - "cmt_msg": "drm/amdgpu: Fix potential fence use-after-free v2" + "CVE-2020-0429": { + "cmt_msg": "l2tp: fix race between l2tp_session_delete() and l2tp_tunnel_closeall()" }, - "CVE-2023-20569": { - "cmt_msg": "x86/bugs: Increase the x86 bugs vector size to two u32s" + "CVE-2020-14356": { + "cmt_msg": "cgroup: fix cgroup_sk_alloc() for sk_clone_lock()" }, - "CVE-2016-8660": { - "cmt_msg": "" + "CVE-2022-20132": { + "cmt_msg": "HID: add hid_is_usb() function to make it simpler for USB detection" }, "CVE-2023-6270": { - "cmt_msg": "" + "cmt_msg": "aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts" }, - "CVE-2023-2156": { - "cmt_msg": "net: rpl: fix rpl header size calculation" + "CVE-2023-1582": { + "cmt_msg": "fs/proc: task_mmu.c: don't read mapcount for migration entry" }, - "CVE-2023-45862": { - "cmt_msg": "USB: ene_usb6250: Allocate enough memory for full object" + "CVE-2019-17351": { + "cmt_msg": "xen: let alloc_xenballooned_pages() fail if not enough memory free" }, - "CVE-2023-45863": { - "cmt_msg": "kobject: Fix slab-out-of-bounds in fill_kobj_path()" + "CVE-2018-1120": { + "cmt_msg": "proc: do not access cmdline nor environ from file-backed areas" }, - "CVE-2023-1583": { - "cmt_msg": "io_uring/rsrc: fix null-ptr-deref in io_file_bitmap_get()" + "CVE-2018-20855": { + "cmt_msg": "IB/mlx5: Fix leaking stack memory to userspace" }, - "CVE-2008-4609": { - "cmt_msg": "" + "CVE-2023-35824": { + "cmt_msg": "media: dm1105: Fix use after free bug in dm1105_remove due to race condition" }, - "CVE-2023-6356": { - "cmt_msg": "" + "CVE-2019-1999": { + "cmt_msg": "binder: fix race between munmap() and direct reclaim" }, - "CVE-2023-52456": { - "cmt_msg": "serial: imx: fix tx statemachine deadlock" + "CVE-2018-1065": { + "cmt_msg": "netfilter: add back stackpointer size checks" }, - "CVE-2019-15239": { - "cmt_msg": "unknown" + "CVE-2018-1066": { + "cmt_msg": "CIFS: Enable encryption during session setup phase" }, - "CVE-2023-20941": { - "cmt_msg": "" + "CVE-2018-1068": { + "cmt_msg": "netfilter: ebtables: CONFIG_COMPAT: don't trust userland offsets" }, - "CVE-2023-4155": { - "cmt_msg": "KVM: SEV: only access GHCB fields once" + "CVE-2017-17053": { + "cmt_msg": "x86/mm: Fix use-after-free of ldt_struct" }, - "CVE-2023-3777": { - "cmt_msg": "netfilter: nf_tables: skip bound chain on rule flush" + "CVE-2017-17052": { + "cmt_msg": "fork: fix incorrect fput of ->exe_file causing use-after-free" }, - "CVE-2023-3776": { - "cmt_msg": "net/sched: cls_fw: Fix improper refcount update leads to use-after-free" + "CVE-2019-7308": { + "cmt_msg": "bpf: fix sanitation of alu op with pointer / scalar type from different paths" }, - "CVE-2023-3773": { - "cmt_msg": "xfrm: add forgotten nla_policy for XFRMA_MTIMER_THRESH" + "CVE-2018-1000199": { + "cmt_msg": "perf/hwbp: Simplify the perf-hwbp code, fix documentation" }, - "CVE-2023-3772": { - "cmt_msg": "xfrm: add NULL check in xfrm_update_ae_params" + "CVE-2022-1966": { + "cmt_msg": "netfilter: nf_tables: disallow non-stateful expression in sets earlier" }, - "CVE-2022-3533": { - "cmt_msg": "" + "CVE-2021-3587": { + "cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect" }, - "CVE-2022-4842": { - "cmt_msg": "fs/ntfs3: Fix attr_punch_hole() null pointer derenference" + "CVE-2019-16995": { + "cmt_msg": "net: hsr: fix memory leak in hsr_dev_finalize()" }, - "CVE-2023-0386": { - "cmt_msg": "ovl: fail on invalid uid/gid mapping at copy up" + "CVE-2017-18075": { + "cmt_msg": "crypto: pcrypt - fix freeing pcrypt instances" }, - "CVE-2023-6121": { - "cmt_msg": "nvmet: nul-terminate the NQNs passed in the connect command" + "CVE-2017-18079": { + "cmt_msg": "Input: i8042 - fix crash at boot time" }, - "CVE-2017-13693": { - "cmt_msg": "" + "CVE-2020-1749": { + "cmt_msg": "net: ipv6_stub: use ip6_dst_lookup_flow instead of ip6_dst_lookup" }, - "CVE-2017-13694": { - "cmt_msg": "" + "CVE-2021-3760": { + "cmt_msg": "nfc: nci: fix the UAF of rf_conn_info object" }, - "CVE-2023-33952": { - "cmt_msg": "drm/vmwgfx: Do not drop the reference to the handle too soon" + "CVE-2017-18216": { + "cmt_msg": "ocfs2: subsystem.su_mutex is required while accessing the item->ci_parent" }, - "CVE-2023-33951": { - "cmt_msg": "drm/vmwgfx: Do not drop the reference to the handle too soon" + "CVE-2017-18218": { + "cmt_msg": "net: hns: Fix a skb used after free bug" }, - "CVE-2022-4382": { - "cmt_msg": "USB: gadgetfs: Fix race between mounting and unmounting" + "CVE-2021-39648": { + "cmt_msg": "usb: gadget: configfs: Fix use-after-free issue with udc_name" }, - "CVE-2024-24859": { - "cmt_msg": "" + "CVE-2023-52569": { + "cmt_msg": "btrfs: remove BUG() after failure to insert delayed dir index item" }, - "CVE-2024-24858": { - "cmt_msg": "" + "CVE-2023-52568": { + "cmt_msg": "x86/sgx: Resolves SECS reclaim vs. page fault for EAUG race" }, - "CVE-2024-24855": { - "cmt_msg": "scsi: lpfc: Fix a possible data race in lpfc_unregister_fcf_rescan()" + "CVE-2019-0136": { + "cmt_msg": "mac80211: drop robust management frames from unknown TA" }, - "CVE-2024-24857": { - "cmt_msg": "" + "CVE-2023-52563": { + "cmt_msg": "drm/meson: fix memory leak on ->hpd_notify callback" }, - "CVE-2022-3544": { - "cmt_msg": "" + "CVE-2023-52561": { + "cmt_msg": "arm64: dts: qcom: sdm845-db845c: Mark cont splash memory region as reserved" }, - "CVE-2023-5197": { - "cmt_msg": "netfilter: nf_tables: disallow rule removal from chain binding" + "CVE-2022-3344": { + "cmt_msg": "KVM: x86: nSVM: harden svm_free_nested against freeing vmcb02 while still in use" }, - "CVE-2023-1380": { - "cmt_msg": "wifi: brcmfmac: slab-out-of-bounds read in brcmf_get_assoc_ies()" + "CVE-2023-52566": { + "cmt_msg": "nilfs2: fix potential use after free in nilfs_gccache_submit_read_data()" + }, + "CVE-2023-52565": { + "cmt_msg": "media: uvcvideo: Fix OOB read" + }, + "CVE-2018-12896": { + "cmt_msg": "posix-timers: Sanitize overrun handling" }, "CVE-2020-0347": { "cmt_msg": "" }, + "CVE-2021-40490": { + "cmt_msg": "ext4: fix race writing to an inline_data file while its xattrs are changing" + }, + "CVE-2021-33909": { + "cmt_msg": "seq_file: disallow extremely large seq buffer allocations" + }, + "CVE-2019-12455": { + "cmt_msg": "clk-sunxi: fix a missing-check bug in sunxi_divs_clk_setup()" + }, "CVE-2019-12456": { "cmt_msg": "" }, - "CVE-2023-6546": { - "cmt_msg": "tty: n_gsm: fix the UAF caused by race condition in gsm_cleanup_mux" + "CVE-2022-0812": { + "cmt_msg": "xprtrdma: fix incorrect header size calculations" }, - "CVE-2023-1206": { - "cmt_msg": "tcp: Reduce chance of collisions in inet6_hashfn()." + "CVE-2019-5108": { + "cmt_msg": "mac80211: Do not send Layer 2 Update frame before authorization" }, - "CVE-2023-2985": { - "cmt_msg": "fs: hfsplus: fix UAF issue in hfsplus_put_super" + "CVE-2019-17133": { + "cmt_msg": "cfg80211: wext: avoid copying malformed SSIDs" }, - "CVE-2022-3642": { - "cmt_msg": "" + "CVE-2021-33656": { + "cmt_msg": "vt: drop old FONT ioctls" }, - "CVE-2024-0584": { - "cmt_msg": "ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet" + "CVE-2021-33655": { + "cmt_msg": "fbcon: Disallow setting font bigger than screen size" }, - "CVE-2019-15902": { - "cmt_msg": "unknown" + "CVE-2022-41858": { + "cmt_msg": "drivers: net: slip: fix NPD bug in sl_tx_timeout()" }, - "CVE-2023-3359": { - "cmt_msg": "nvmem: brcm_nvram: Add check for kzalloc" + "CVE-2022-41850": { + "cmt_msg": "HID: roccat: Fix use-after-free in roccat_read()" }, - "CVE-2023-3358": { - "cmt_msg": "HID: intel_ish-hid: Add check for ishtp_dma_tx_map" + "CVE-2017-10663": { + "cmt_msg": "f2fs: sanity check checkpoint segno and blkoff" }, - "CVE-2024-0340": { - "cmt_msg": "vhost: use kzalloc() instead of kmalloc() followed by memset()" + "CVE-2017-10662": { + "cmt_msg": "f2fs: sanity check segment count" }, - "CVE-2023-6535": { - "cmt_msg": "" + "CVE-2017-10661": { + "cmt_msg": "timerfd: Protect the might cancel mechanism proper" }, - "CVE-2023-6536": { - "cmt_msg": "" + "CVE-2022-1184": { + "cmt_msg": "ext4: verify dir block before splitting it" }, - "CVE-2018-17977": { - "cmt_msg": "" + "CVE-2017-14991": { + "cmt_msg": "scsi: sg: fixup infoleak when using SG_GET_REQUEST_TABLE" }, - "CVE-2024-1151": { - "cmt_msg": "net: openvswitch: limit the number of recursions from action sets" + "CVE-2018-7566": { + "cmt_msg": "ALSA: seq: Fix racy pool initializations" }, - "CVE-2010-5321": { - "cmt_msg": "" + "CVE-2017-7645": { + "cmt_msg": "nfsd: check for oversized NFSv2/v3 arguments" }, - "CVE-2023-1990": { - "cmt_msg": "nfc: st-nci: Fix use after free bug in ndlc_remove due to race condition" + "CVE-2024-26808": { + "cmt_msg": "netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain" }, - "CVE-2023-4569": { - "cmt_msg": "netfilter: nf_tables: deactivate catchall elements in next generation" + "CVE-2024-26809": { + "cmt_msg": "netfilter: nft_set_pipapo: release elements in clone only from destroy path" }, - "CVE-2024-21803": { - "cmt_msg": "" + "CVE-2021-42739": { + "cmt_msg": "media: firewire: firedtv-avc: fix a buffer overflow in avc_ca_pmt()" }, - "CVE-2023-4563": { - "cmt_msg": "netfilter: nf_tables: don't skip expired elements during walk" + "CVE-2024-26805": { + "cmt_msg": "netlink: Fix kernel-infoleak-after-free in __skb_datagram_iter" }, - "CVE-2021-3542": { - "cmt_msg": "" + "CVE-2024-26806": { + "cmt_msg": "spi: cadence-qspi: remove system-wide suspend helper calls from runtime PM hooks" }, - "CVE-2023-3220": { - "cmt_msg": "drm/msm/dpu: Add check for pstates" + "CVE-2020-12771": { + "cmt_msg": "bcache: fix potential deadlock problem in btree_gc_coalesce" }, - "CVE-2023-34255": { - "cmt_msg": "xfs: verify buffer contents when we skip log replay" + "CVE-2020-12770": { + "cmt_msg": "scsi: sg: add sg_remove_request in sg_write" }, - "CVE-2023-34256": { - "cmt_msg": "ext4: avoid a potential slab-out-of-bounds in ext4_group_desc_csum" + "CVE-2024-26802": { + "cmt_msg": "stmmac: Clear variable when destroying workqueue" }, - "CVE-2018-12929": { - "cmt_msg": "" + "CVE-2018-6412": { + "cmt_msg": "fbdev: Fixing arbitrary kernel leak in case FBIOGETCMAP_SPARC in sbusfb_ioctl_helper()." }, - "CVE-2018-12928": { - "cmt_msg": "" + "CVE-2023-52606": { + "cmt_msg": "powerpc/lib: Validate size for vector operations" }, - "CVE-2023-25775": { - "cmt_msg": "RDMA/irdma: Prevent zero-length STAG registration" + "CVE-2018-21008": { + "cmt_msg": "rsi: add fix for crash during assertions" }, - "CVE-2023-32258": { - "cmt_msg": "ksmbd: fix racy issue from smb2 close and logoff with multichannel" + "CVE-2023-52604": { + "cmt_msg": "FS:JFS:UBSAN:array-index-out-of-bounds in dbAdjTree" }, - "CVE-2023-32257": { - "cmt_msg": "ksmbd: fix racy issue from session setup and logoff" + "CVE-2023-52602": { + "cmt_msg": "jfs: fix slab-out-of-bounds Read in dtSearch" }, - "CVE-2023-32254": { - "cmt_msg": "ksmbd: fix racy issue under cocurrent smb2 tree disconnect" + "CVE-2023-52603": { + "cmt_msg": "UBSAN: array-index-out-of-bounds in dtSplitRoot" }, - "CVE-2023-32252": { - "cmt_msg": "ksmbd: fix racy issue from session setup and logoff" + "CVE-2023-52600": { + "cmt_msg": "jfs: fix uaf in jfs_evict_inode" }, - "CVE-2020-10708": { - "cmt_msg": "" + "CVE-2023-52601": { + "cmt_msg": "jfs: fix array-index-out-of-bounds in dbAdjTree" }, - "CVE-2023-32629": { - "cmt_msg": "" + "CVE-2023-52609": { + "cmt_msg": "binder: fix race between mmput() and do_exit()" }, - "CVE-2022-0400": { - "cmt_msg": "" + "CVE-2024-23196": { + "cmt_msg": "ALSA: hda: fix a possible null-pointer dereference due to data race in snd_hdac_regmap_sync()" }, - "CVE-2023-2235": { - "cmt_msg": "perf: Fix check before add_event_to_groups() in perf_group_detach()" + "CVE-2017-1000379": { + "cmt_msg": "mm: larger stack guard gap, between vmas" }, - "CVE-2024-25741": { + "CVE-2023-3640": { "cmt_msg": "" }, - "CVE-2023-1989": { - "cmt_msg": "Bluetooth: btsdio: fix use after free bug in btsdio_remove due to unfinished work" + "CVE-2017-1000371": { + "cmt_msg": "binfmt_elf: use ELF_ET_DYN_BASE only for PIE" }, - "CVE-2022-25265": { - "cmt_msg": "" + "CVE-2017-1000370": { + "cmt_msg": "binfmt_elf: use ELF_ET_DYN_BASE only for PIE" }, - "CVE-2023-4208": { - "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free" + "CVE-2023-3022": { + "cmt_msg": "ipv6: Use result arg in fib_lookup_arg consistently" }, - "CVE-2023-4206": { - "cmt_msg": "net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free" + "CVE-2022-43750": { + "cmt_msg": "usb: mon: make mmapped memory read only" }, - "CVE-2023-4207": { - "cmt_msg": "net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free" + "CVE-2023-0047": { + "cmt_msg": "mm, oom: do not trigger out_of_memory from the #PF" }, - "CVE-2023-3640": { + "CVE-2023-4010": { "cmt_msg": "" }, - "CVE-2023-20593": { - "cmt_msg": "x86/cpu/amd: Add a Zenbleed fix" + "CVE-2021-47167": { + "cmt_msg": "NFS: Fix an Oopsable condition in __nfs_pageio_add_request()" }, - "CVE-2023-0160": { - "cmt_msg": "bpf, sockmap: fix deadlocks in the sockhash and sockmap" + "CVE-2021-47166": { + "cmt_msg": "NFS: Don't corrupt the value of pg_bytes_written in nfs_do_recoalesce()" }, - "CVE-2023-21106": { - "cmt_msg": "drm/msm/gpu: Fix potential double-free" + "CVE-2021-47165": { + "cmt_msg": "drm/meson: fix shutdown crash when component not probed" }, - "CVE-2023-4015": { - "cmt_msg": "netfilter: nf_tables: skip immediate deactivate in _PREPARE_ERROR" + "CVE-2021-47163": { + "cmt_msg": "tipc: wait and exit until all work queues are done" }, - "CVE-2023-4010": { - "cmt_msg": "" + "CVE-2021-47162": { + "cmt_msg": "tipc: skb_linearize the head skb when reassembling msgs" }, - "CVE-2022-38457": { - "cmt_msg": "drm/vmwgfx: Remove rcu locks from user resources" + "CVE-2021-47160": { + "cmt_msg": "net: dsa: mt7530: fix VLAN traffic leaks" + }, + "CVE-2023-4385": { + "cmt_msg": "fs: jfs: fix possible NULL pointer dereference in dbFree()" + }, + "CVE-2021-46965": { + "cmt_msg": "mtd: physmap: physmap-bt1-rom: Fix unintentional stack access" + }, + "CVE-2023-4387": { + "cmt_msg": "net: vmxnet3: fix possible use-after-free bugs in vmxnet3_rq_alloc_rx_buf()" + }, + "CVE-2021-46962": { + "cmt_msg": "mmc: uniphier-sd: Fix a resource leak in the remove function" + }, + "CVE-2021-47168": { + "cmt_msg": "NFS: fix an incorrect limit in filelayout_decode_layout()" }, "CVE-2019-19378": { "cmt_msg": "" }, - "CVE-2020-24503": { - "cmt_msg": "" + "CVE-2022-36879": { + "cmt_msg": "xfrm: xfrm_policy: fix a possible double xfrm_pols_put() in xfrm_bundle_lookup()" }, - "CVE-2020-24502": { - "cmt_msg": "" + "CVE-2019-19377": { + "cmt_msg": "btrfs: Don't submit any btree write bio if the fs has errors" }, - "CVE-2023-1118": { - "cmt_msg": "media: rc: Fix use-after-free bugs caused by ene_tx_irqsim()" + "CVE-2017-7482": { + "cmt_msg": "rxrpc: Fix several cases where a padded len isn't checked in ticket decode" }, - "CVE-2020-11725": { - "cmt_msg": "" + "CVE-2017-7487": { + "cmt_msg": "ipx: call ipxitf_put() in ioctl error path" }, - "CVE-2023-7192": { - "cmt_msg": "netfilter: ctnetlink: fix possible refcount leak in ctnetlink_create_conntrack()" + "CVE-2017-9150": { + "cmt_msg": "bpf: don't let ldimm64 leak map addresses on unprivileged" }, - "CVE-2023-30456": { - "cmt_msg": "KVM: nVMX: add missing consistency checks for CR0 and CR4" + "CVE-2023-1118": { + "cmt_msg": "media: rc: Fix use-after-free bugs caused by ene_tx_irqsim()" }, - "CVE-2023-31436": { - "cmt_msg": "net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg" + "CVE-2021-0937": { + "cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write" + }, + "CVE-2017-7261": { + "cmt_msg": "drm/vmwgfx: NULL pointer dereference in vmw_surface_define_ioctl()" }, "CVE-2022-47929": { "cmt_msg": "net: sched: disallow noqueue for qdisc classes" }, + "CVE-2019-16746": { + "cmt_msg": "nl80211: validate beacon head" + }, "CVE-2022-3606": { "cmt_msg": "" }, - "CVE-2022-2209": { - "cmt_msg": "" + "CVE-2018-18021": { + "cmt_msg": "arm64: KVM: Tighten guest core register access from userspace" }, - "CVE-2023-7042": { - "cmt_msg": "" + "CVE-2021-37576": { + "cmt_msg": "KVM: PPC: Book3S: Fix H_RTAS rets buffer overflow" }, - "CVE-2023-47233": { - "cmt_msg": "" + "CVE-2022-3594": { + "cmt_msg": "r8152: Rate limit overflow messages" }, - "CVE-2024-23850": { - "cmt_msg": "btrfs: do not ASSERT() if the newly created subvolume already got read" + "CVE-2022-3595": { + "cmt_msg": "cifs: fix double-fault crash during ntlmssp" }, - "CVE-2024-23851": { - "cmt_msg": "dm: limit the number of targets and parameter size area" + "CVE-2018-5803": { + "cmt_msg": "sctp: verify size of a new chunk in _sctp_make_chunk()" + }, + "CVE-2020-27815": { + "cmt_msg": "jfs: Fix array index bounds check in dbAdjTree" }, "CVE-2023-6606": { "cmt_msg": "smb: client: fix OOB in smbCalcSize()" }, - "CVE-2023-21255": { - "cmt_msg": "binder: fix UAF caused by faulty buffer cleanup" - }, - "CVE-2023-52439": { - "cmt_msg": "uio: Fix use-after-free in uio_open" - }, - "CVE-2023-52438": { - "cmt_msg": "binder: fix use-after-free in shinker's callback" - }, - "CVE-2023-52435": { - "cmt_msg": "net: prevent mss overflow in skb_segment()" + "CVE-2020-27673": { + "cmt_msg": "xen/events: add a proper barrier to 2-level uevent unmasking" }, - "CVE-2023-52434": { - "cmt_msg": "smb: client: fix potential OOBs in smb2_parse_contexts()" + "CVE-2020-27675": { + "cmt_msg": "xen/events: avoid removing an event channel while handling it" }, - "CVE-2023-52436": { - "cmt_msg": "f2fs: explicitly null-terminate the xattr list" + "CVE-2020-28915": { + "cmt_msg": "fbcon: Fix global-out-of-bounds read in fbcon_get_font()" }, - "CVE-2022-2961": { - "cmt_msg": "" + "CVE-2022-3111": { + "cmt_msg": "power: supply: wm8350-power: Add missing free in free_charger_irq" }, - "CVE-2023-51779": { - "cmt_msg": "Bluetooth: af_bluetooth: Fix Use-After-Free in bt_sock_recvmsg" + "CVE-2020-0435": { + "cmt_msg": "f2fs: fix to do sanity check with i_extra_isize" }, - "CVE-2023-3268": { - "cmt_msg": "relayfs: fix out-of-bounds access in relay_file_read" + "CVE-2020-0432": { + "cmt_msg": "staging: most: net: fix buffer overflow" }, - "CVE-2022-40133": { - "cmt_msg": "drm/vmwgfx: Remove rcu locks from user resources" + "CVE-2020-0433": { + "cmt_msg": "blk-mq: sync the update nr_hw_queues with blk_mq_queue_tag_busy_iter" }, - "CVE-2023-2640": { - "cmt_msg": "" + "CVE-2020-0431": { + "cmt_msg": "HID: hid-input: clear unmapped usages" }, "CVE-2023-6915": { "cmt_msg": "ida: Fix crash in ida_free when the bitmap is empty" }, - "CVE-2010-4563": { - "cmt_msg": "" + "CVE-2021-47006": { + "cmt_msg": "ARM: 9064/1: hw_breakpoint: Do not directly check the event's overflow_handler hook" }, - "CVE-2023-2163": { - "cmt_msg": "bpf: Fix incorrect verifier pruning due to missing register precision taints" + "CVE-2023-1249": { + "cmt_msg": "coredump: Use the vma snapshot in fill_files_note" }, - "CVE-2023-2162": { - "cmt_msg": "scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress" + "CVE-2021-3483": { + "cmt_msg": "firewire: nosy: Fix a use-after-free bug in nosy_ioctl()" }, - "CVE-2023-45871": { - "cmt_msg": "igb: set max size RX buffer when store bad packet is enabled" + "CVE-2023-6040": { + "cmt_msg": "netfilter: nf_tables: Reject tables of unsupported family" }, - "CVE-2023-4622": { - "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES" + "CVE-2017-16912": { + "cmt_msg": "usbip: fix stub_rx: get_pipe() to validate endpoint number" }, - "CVE-2023-4623": { - "cmt_msg": "net/sched: sch_hfsc: Ensure inner classes have fsc curve" + "CVE-2017-16911": { + "cmt_msg": "usbip: prevent vhci_hcd driver from leaking a socket pointer address" }, - "CVE-2023-1193": { - "cmt_msg": "ksmbd: delete asynchronous work from list" + "CVE-2017-16914": { + "cmt_msg": "usbip: fix stub_send_ret_submit() vulnerability to null transfer_buffer" }, - "CVE-2021-0399": { - "cmt_msg": "" + "CVE-2020-36691": { + "cmt_msg": "netlink: limit recursion depth in policy validation" }, "CVE-2023-42755": { "cmt_msg": "net/sched: Retire rsvp classifier" }, - "CVE-2023-3161": { - "cmt_msg": "fbcon: Check font dimension limits" - }, - "CVE-2012-4542": { - "cmt_msg": "" - }, - "CVE-2023-42753": { - "cmt_msg": "netfilter: ipset: add the missing IP_SET_HASH_WITH_NET0 macro for ip_set_hash_netportnet.c" - }, "CVE-2023-42752": { "cmt_msg": "igmp: limit igmpv3_newpack() packet size to IP_MAX_MTU" }, - "CVE-2023-4128": { - "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free" + "CVE-2021-3573": { + "cmt_msg": "Bluetooth: use correct lock to prevent UAF of hdev object" }, - "CVE-2023-4244": { - "cmt_msg": "netfilter: nf_tables: fix GC transaction races with netns and netlink event exit path" + "CVE-2022-1974": { + "cmt_msg": "nfc: replace improper check device_is_registered() in netlink related functions" }, - "CVE-2023-38409": { - "cmt_msg": "fbcon: set_con2fb_map needs to set con2fb_map!" + "CVE-2022-1975": { + "cmt_msg": "NFC: netlink: fix sleep in atomic bug when firmware download timeout" }, - "CVE-2023-3609": { - "cmt_msg": "net/sched: cls_u32: Fix reference counter leak leading to overflow" + "CVE-2023-1380": { + "cmt_msg": "wifi: brcmfmac: slab-out-of-bounds read in brcmf_get_assoc_ies()" }, - "CVE-2023-6039": { - "cmt_msg": "net: usb: lan78xx: reorder cleanup operations to avoid UAF bugs" + "CVE-2018-12130": { + "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" }, - "CVE-2023-2269": { - "cmt_msg": "dm ioctl: fix nested locking in table_clear() to remove deadlock concern" + "CVE-2022-32981": { + "cmt_msg": "powerpc/32: Fix overread/overwrite of thread_struct via ptrace" }, - "CVE-2023-0394": { - "cmt_msg": "ipv6: raw: Deduct extension header length in rawv6_push_pending_frames" + "CVE-2018-13405": { + "cmt_msg": "Fix up non-directory creation in SGID directories" }, - "CVE-2022-36402": { - "cmt_msg": "drm/vmwgfx: Fix shader stage validation" + "CVE-2018-13406": { + "cmt_msg": "video: uvesafb: Fix integer overflow in allocation" }, - "CVE-2023-28866": { - "cmt_msg": "Bluetooth: HCI: Fix global-out-of-bounds" + "CVE-2020-11668": { + "cmt_msg": "media: xirlink_cit: add missing descriptor sanity checks" }, - "CVE-2021-3714": { - "cmt_msg": "" + "CVE-2020-11669": { + "cmt_msg": "powerpc/powernv/idle: Restore AMR/UAMOR/AMOR after idle" }, - "CVE-2023-3117": { - "cmt_msg": "netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE" + "CVE-2019-14901": { + "cmt_msg": "mwifiex: Fix heap overflow in mmwifiex_process_tdls_action_frame()" }, - "CVE-2021-3892": { - "cmt_msg": "" + "CVE-2020-8694": { + "cmt_msg": "powercap: restrict energy meter to root access" }, - "CVE-2023-35788": { - "cmt_msg": "net/sched: flower: fix possible OOB write in fl_set_geneve_opt()" + "CVE-2021-3715": { + "cmt_msg": "net_sched: cls_route: remove the right filter from hashtable" }, - "CVE-2023-3567": { - "cmt_msg": "vc_screen: move load of struct vc_data pointer in vcs_read() to avoid UAF" + "CVE-2021-3714": { + "cmt_msg": "" }, - "CVE-2024-24860": { - "cmt_msg": "Bluetooth: Fix atomicity violation in {min,max}_key_size_set" + "CVE-2019-16230": { + "cmt_msg": "drm/amdkfd: fix a potential NULL pointer dereference (v2)" }, - "CVE-2024-24861": { - "cmt_msg": "" + "CVE-2019-16231": { + "cmt_msg": "fjes: Handle workqueue allocation failure" }, - "CVE-2024-24864": { - "cmt_msg": "" + "CVE-2019-16232": { + "cmt_msg": "libertas: fix a potential NULL pointer dereference" }, - "CVE-2023-2194": { - "cmt_msg": "i2c: xgene-slimpro: Fix out-of-bounds bug in xgene_slimpro_i2c_xfer()" + "CVE-2019-16233": { + "cmt_msg": "scsi: qla2xxx: fix a potential NULL pointer dereference" }, - "CVE-2011-4916": { - "cmt_msg": "" + "CVE-2019-16234": { + "cmt_msg": "iwlwifi: pcie: fix rb_allocator workqueue allocation" }, - "CVE-2023-4134": { - "cmt_msg": "Input: cyttsp4_core - change del_timer_sync() to timer_shutdown_sync()" + "CVE-2019-6133": { + "cmt_msg": "fork: record start_time late" }, - "CVE-2022-41848": { - "cmt_msg": "" + "CVE-2021-39633": { + "cmt_msg": "ip_gre: add validation for csum_start" }, - "CVE-2022-40982": { - "cmt_msg": "x86/speculation: Add Gather Data Sampling mitigation" + "CVE-2017-18203": { + "cmt_msg": "dm: fix race between dm_get_from_kobject() and __dm_destroy()" }, - "CVE-2021-39801": { - "cmt_msg": "" + "CVE-2017-18202": { + "cmt_msg": "mm, oom_reaper: gather each vma to prevent leaking TLB entry" }, - "CVE-2021-39800": { - "cmt_msg": "" + "CVE-2021-39636": { + "cmt_msg": "netfilter: x_tables: fix pointer leaks to userspace" }, - "CVE-2024-22099": { - "cmt_msg": "" + "CVE-2017-18204": { + "cmt_msg": "ocfs2: should wait dio before inode lock in ocfs2_setattr()" }, - "CVE-2022-45885": { - "cmt_msg": "" + "CVE-2021-39634": { + "cmt_msg": "epoll: do not insert into poll queues until all sanity checks are done" }, - "CVE-2022-45884": { - "cmt_msg": "" + "CVE-2022-33742": { + "cmt_msg": "xen/blkfront: force data bouncing when backend is untrusted" }, - "CVE-2022-45887": { - "cmt_msg": "media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb()" + "CVE-2022-33741": { + "cmt_msg": "xen/netfront: force data bouncing when backend is untrusted" }, - "CVE-2022-45886": { - "cmt_msg": "media: dvb-core: Fix use-after-free due on race condition at dvb_net" + "CVE-2022-33740": { + "cmt_msg": "xen/netfront: fix leaking data in shared pages" }, - "CVE-2023-46343": { - "cmt_msg": "nfc: nci: fix possible NULL pointer dereference in send_acknowledge()" + "CVE-2022-33744": { + "cmt_msg": "xen/arm: Fix race in RB-tree based P2M accounting" }, - "CVE-2024-25744": { - "cmt_msg": "x86/coco: Disable 32-bit emulation by default on TDX and SEV" + "CVE-2023-52596": { + "cmt_msg": "sysctl: Fix out of bounds access for empty sysctl registers" }, - "CVE-2023-2124": { - "cmt_msg": "xfs: verify buffer contents when we skip log replay" + "CVE-2023-52597": { + "cmt_msg": "KVM: s390: fix setting of fpc register" }, - "CVE-2022-45888": { - "cmt_msg": "char: xillybus: Prevent use-after-free due to race condition" + "CVE-2023-52594": { + "cmt_msg": "wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus()" }, - "CVE-2023-1281": { - "cmt_msg": "net/sched: tcindex: update imperfect hash filters respecting rcu" + "CVE-2023-52595": { + "cmt_msg": "wifi: rt2x00: restart beacon queue when hardware reset" }, - "CVE-2023-6817": { - "cmt_msg": "netfilter: nft_set_pipapo: skip inactive elements during set walk" + "CVE-2023-52593": { + "cmt_msg": "wifi: wfx: fix possible NULL pointer dereference in wfx_set_mfp_ap()" }, - "CVE-2023-1859": { - "cmt_msg": "9p/xen : Fix use after free bug in xen_9pfs_front_remove due to race condition" + "CVE-2023-52590": { + "cmt_msg": "ocfs2: Avoid touching renamed directory if parent does not change" }, - "CVE-2023-1855": { - "cmt_msg": "hwmon: (xgene) Fix use after free bug in xgene_hwmon_remove due to race condition" + "CVE-2023-52591": { + "cmt_msg": "reiserfs: Avoid touching renamed directory if parent does not change" }, - "CVE-2022-27672": { - "cmt_msg": "x86/speculation: Identify processors vulnerable to SMT RSB predictions" + "CVE-2023-52598": { + "cmt_msg": "s390/ptrace: handle setting of fpc register correctly" }, - "CVE-2020-25220": { - "cmt_msg": "" + "CVE-2023-52599": { + "cmt_msg": "jfs: fix array-index-out-of-bounds in diNewExt" }, - "CVE-2015-2877": { - "cmt_msg": "" + "CVE-2021-0447": { + "cmt_msg": "l2tp: protect sock pointer of struct pppol2tp_session with RCU" }, - "CVE-2023-26242": { - "cmt_msg": "" + "CVE-2022-23222": { + "cmt_msg": "bpf: Replace PTR_TO_XXX_OR_NULL with PTR_TO_XXX | PTR_MAYBE_NULL" }, - "CVE-2019-16089": { - "cmt_msg": "" + "CVE-2021-0448": { + "cmt_msg": "netfilter: ctnetlink: add a range check for l3/l4 protonum" }, - "CVE-2023-21264": { - "cmt_msg": "KVM: arm64: Prevent unconditional donation of unmapped regions from the host" + "CVE-2017-12762": { + "cmt_msg": "isdn/i4l: fix buffer overflow" }, - "CVE-2023-1513": { - "cmt_msg": "kvm: initialize all of the kvm_debugregs structure before sending it to userspace" + "CVE-2022-41849": { + "cmt_msg": "fbdev: smscufx: Fix use-after-free in ufx_ops_open()" }, - "CVE-2021-3847": { + "CVE-2022-41848": { "cmt_msg": "" }, - "CVE-2023-52440": { - "cmt_msg": "ksmbd: fix slub overflow in ksmbd_decode_ntlmssp_auth_blob()" + "CVE-2023-6356": { + "cmt_msg": "nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length" }, - "CVE-2023-52441": { - "cmt_msg": "ksmbd: fix out of bounds in init_smb2_rsp_hdr()" + "CVE-2022-1353": { + "cmt_msg": "af_key: add __GFP_ZERO flag for compose_sadb_supported in function pfkey_register" }, - "CVE-2023-52442": { - "cmt_msg": "ksmbd: validate session id and tree id in compound request" + "CVE-2022-1198": { + "cmt_msg": "drivers: hamradio: 6pack: fix UAF bug caused by mod_timer()" }, - "CVE-2023-52443": { - "cmt_msg": "apparmor: avoid crash when parsed profile name is empty" + "CVE-2022-1199": { + "cmt_msg": "ax25: Fix NULL pointer dereference in ax25_kill_by_device" }, - "CVE-2023-52444": { - "cmt_msg": "f2fs: fix to avoid dirent corruption" + "CVE-2022-1195": { + "cmt_msg": "hamradio: improve the incomplete fix to avoid NPD" }, - "CVE-2023-52445": { - "cmt_msg": "media: pvrusb2: fix use after free on context disconnection" + "CVE-2023-2124": { + "cmt_msg": "xfs: verify buffer contents when we skip log replay" }, - "CVE-2011-4917": { - "cmt_msg": "" + "CVE-2019-15505": { + "cmt_msg": "media: technisat-usb2: break out of loop at end of buffer" }, - "CVE-2023-52447": { - "cmt_msg": "bpf: Defer the free of inner map when necessary" + "CVE-2022-27672": { + "cmt_msg": "x86/speculation: Identify processors vulnerable to SMT RSB predictions" }, - "CVE-2023-52448": { - "cmt_msg": "gfs2: Fix kernel NULL pointer dereference in gfs2_rgrp_dump" + "CVE-2023-52508": { + "cmt_msg": "nvme-fc: Prevent null pointer dereference in nvme_fc_io_getuuid()" }, - "CVE-2023-52449": { - "cmt_msg": "mtd: Fix gluebi NULL pointer dereference caused by ftl notifier" + "CVE-2022-1280": { + "cmt_msg": "drm: avoid circular locks in drm_mode_getconnector" }, - "CVE-2023-23039": { - "cmt_msg": "" + "CVE-2018-10880": { + "cmt_msg": "ext4: never move the system.data xattr out of the inode body" }, - "CVE-2024-1312": { - "cmt_msg": "mm: lock_vma_under_rcu() must check vma->anon_vma under vma lock" + "CVE-2018-10881": { + "cmt_msg": "ext4: clear i_data in ext4_inode_info when removing inline data" }, - "CVE-2023-3338": { - "cmt_msg": "Remove DECnet support from kernel" + "CVE-2024-26713": { + "cmt_msg": "powerpc/pseries/iommu: Fix iommu initialisation during DLPAR add" } } }, - "4.5": { - "4.5": { - "CVE-2016-2143": { - "cmt_msg": "s390/mm: four page table levels vs. fork", - "cmt_id": "3446c13b268af86391d06611327006b059b8bab1" - }, - "CVE-2016-3044": { - "cmt_msg": "KVM: PPC: Book3S HV: Sanitize special-purpose register values on guest exit", - "cmt_id": "ccec44563b18a0ce90e2d4f332784b3cb25c8e9c" - }, - "CVE-2016-3951": { - "cmt_msg": "cdc_ncm: do not call usbnet_link_change from cdc_ncm_bind", - "cmt_id": "4d06dd537f95683aba3651098ae288b7cbff8274" - } - }, - "4.5.1": { - "CVE-2016-3137": { - "cmt_msg": "USB: cypress_m8: add endpoint sanity check", - "cmt_id": "674044a0686c4bcb9c94282795de74b747c3b0f1" - }, - "CVE-2016-3157": { - "cmt_msg": "x86/iopl/64: Properly context-switch IOPL on Xen PV", - "cmt_id": "3e30e998425d5406e7a7470f4e2680217d23acab" - }, - "CVE-2016-3689": { - "cmt_msg": "Input: ims-pcu - sanity check against missing interfaces", - "cmt_id": "cadaf14c349dfd9dae5113a53f0d7f6d49b9d4ef" - }, - "CVE-2016-9685": { - "cmt_msg": "xfs: fix two memory leaks in xfs_attr_list.c error paths", - "cmt_id": "2011d17edfff18785d4c97d18150750fc7a27678" - }, - "CVE-2016-3140": { - "cmt_msg": "USB: digi_acceleport: do sanity checking for the number of ports", - "cmt_id": "f1568bb7d4c28944ee8ab25e34f4bed86f7c4229" - }, - "CVE-2016-3136": { - "cmt_msg": "USB: mct_u232: add sanity checking in probe", - "cmt_id": "fc7f87747c9e174b97d7b81fb0b6e1614f60171b" + "4.6": { + "4.6": { + "CVE-2016-6198": { + "cmt_msg": "vfs: add vfs_select_inode() helper", + "cmt_id": "54d5ca871e72f2bb172ec9323497f01cd5091ec7" }, - "CVE-2016-2185": { - "cmt_msg": "Input: ati_remote2 - fix crashes on detecting device with invalid descriptor", - "cmt_id": "e0a40d844832eb90c6ac790dada3d060332d654c" + "CVE-2016-4580": { + "cmt_msg": "net: fix a kernel infoleak in x25 module", + "cmt_id": "79e48650320e6fba48369fccf13fd045315b19b8" }, - "CVE-2016-2184": { - "cmt_msg": "ALSA: usb-audio: Fix NULL dereference in create_fixed_stream_quirk()", - "cmt_id": "7cb483b5cc96cb27d724497a737a3e3aa2126cd9" + "CVE-2016-4486": { + "cmt_msg": "net: fix infoleak in rtnetlink", + "cmt_id": "5f8e44741f9f216e33736ea4ec65ca9ac03036e6" }, - "CVE-2016-6327": { - "cmt_msg": "IB/srpt: Simplify srpt_handle_tsk_mgmt()", - "cmt_id": "ebd49ea0d0e29e9baafa657fc9e39f6c31f92107" + "CVE-2016-4485": { + "cmt_msg": "net: fix infoleak in llc", + "cmt_id": "b8670c09f37bdf2847cc44f36511a53afc6161fd" }, - "CVE-2016-2186": { - "cmt_msg": "Input: powermate - fix oops with malicious USB descriptors", - "cmt_id": "e97ae5113dd09d459d7f173710ba86ba2ad83a42" + "CVE-2016-4913": { + "cmt_msg": "get_rock_ridge_filename(): handle malformed NM entries", + "cmt_id": "99d825822eade8d827a1817357cbf3f889a552d6" }, - "CVE-2016-3138": { - "cmt_msg": "USB: cdc-acm: more sanity checking", - "cmt_id": "347e1384659eadc8b6ccd520a5eb005df6493676" + "CVE-2016-0758": { + "cmt_msg": "KEYS: Fix ASN.1 indefinite length object parsing", + "cmt_id": "23c8a812dc3c621009e4f0e5342aa4e2ede1ceaa" } }, - "4.5.2": { - "CVE-2016-7117": { - "cmt_msg": "net: Fix use after free in the recvmmsg exit path", - "cmt_id": "86de5ca8bb61875d92ee8d5c5531839fe8f47199" - }, - "CVE-2016-3156": { - "cmt_msg": "ipv4: Don't do expensive useless work during inetdev destroy.", - "cmt_id": "1e52e21995ae66be8ce5c97bf715e2a66f622af1" + "4.6-rc7": { + "CVE-2016-5728": { + "cmt_msg": "misc: mic: Fix for double fetch security bug in VOP driver", + "cmt_id": "82dc4afd7e65455464f0fc2fe6976efde54fe451" + } + }, + "4.6.1": { + "CVE-2016-3713": { + "cmt_msg": "KVM: MTRR: remove MSR 0x2f8", + "cmt_id": "0602824ff6b2e86821be11f30584d49bb39cee0f" }, - "CVE-2016-4805": { - "cmt_msg": "ppp: take reference on channels netns", - "cmt_id": "d1d87a48fa9731247424675f6abc5daba74ec3f8" + "CVE-2016-9754": { + "cmt_msg": "ring-buffer: Prevent overflow of size in ring_buffer_resize()", + "cmt_id": "6d40007bb8870d146dc8b388e97b80a5a16dd204" } }, - "4.5.3": { - "CVE-2016-3961": { - "cmt_msg": "x86/mm/xen: Suppress hugetlbfs in PV guests", - "cmt_id": "d5e81d34ceadad4174a61c9bf910b89a32509581" + "4.6.2": { + "CVE-2017-7495": { + "cmt_msg": "ext4: fix data exposure after a crash", + "cmt_id": "efafc4236827a88320bfe12da8ddc7edaf6e8495" + } + }, + "4.6.3": { + "CVE-2016-4951": { + "cmt_msg": "tipc: check nl sock before parsing nested attributes", + "cmt_id": "ba7963c750122e13b9ba254afa95438126d7f460" }, - "CVE-2016-7914": { - "cmt_msg": "assoc_array: don't call compare_object() on a node", - "cmt_id": "3a8c16abfa42e287b586142297115986b8eeb8fb" + "CVE-2016-4998": { + "cmt_msg": "netfilter: x_tables: check for bogus target offset", + "cmt_id": "98e02ab689f15b088f8d0baade85280ab21867b5" }, - "CVE-2016-3955": { - "cmt_msg": "USB: usbip: fix potential out-of-bounds write", - "cmt_id": "4bca37b600a44859893b45ca87001b808907fff7" + "CVE-2016-1583": { + "cmt_msg": "proc: prevent stacking filesystems on top", + "cmt_id": "c4fd3264feffb503336a43f9bf132d9d385678b5" }, - "CVE-2016-4565": { - "cmt_msg": "IB/security: Restrict use of the write() interface", - "cmt_id": "0919927a5c86e71655ebc3a96a465c6eb640927b" + "CVE-2016-4997": { + "cmt_msg": "netfilter: x_tables: check for bogus target offset", + "cmt_id": "98e02ab689f15b088f8d0baade85280ab21867b5" }, - "CVE-2016-2187": { - "cmt_msg": "Input: gtco - fix crash on detecting device without endpoints", - "cmt_id": "14e42e0a81bd16c8db80c686d97388c03d87e3fc" + "CVE-2016-9806": { + "cmt_msg": "netlink: Fix dump skb leak/double free", + "cmt_id": "c55a7faa585fc5ee9b50a05f34bfe3b3d38d90ab" + } + }, + "4.6.5": { + "CVE-2016-4470": { + "cmt_msg": "KEYS: potential uninitialized variable", + "cmt_id": "d8498ead3d50eb6cd1f5bf31b924ac927e89ee85" }, - "CVE-2016-7912": { - "cmt_msg": "usb: gadget: f_fs: Fix use-after-free", - "cmt_id": "b1fb1321ed52927cfddc532af376d16e4abab866" + "CVE-2016-1237": { + "cmt_msg": "posix_acl: Add set_posix_acl", + "cmt_id": "a621b910bc891fe605e8b4597fcea414807ea040" }, - "CVE-2015-7833": { - "cmt_msg": "usbvision: revert commit 588afcc1", - "cmt_id": "119d57d1ed4c66172dd1a8f396c19c2a81479c10" + "CVE-2016-6187": { + "cmt_msg": "apparmor: fix oops, validate buffer size in apparmor_setprocattr()", + "cmt_id": "dba63efdec9c9d50e2cf37c8ba678f8e823cab9c" }, - "CVE-2016-4568": { - "cmt_msg": "videobuf2-v4l2: Verify planes array in buffer dequeueing", - "cmt_id": "922ff7af18370b752204c03e75e3dc3a2c50127d" - } - }, - "4.5.4": { - "CVE-2016-7916": { - "cmt_msg": "proc: prevent accessing /proc//environ until it's ready", - "cmt_id": "3e047c7357c2022dffdddd0b6484ed53571f13ba" + "CVE-2016-4794": { + "cmt_msg": "percpu: fix synchronization between chunk->map_extend_work and chunk destruction", + "cmt_id": "5825418a1516dd978aff837b4ab8acd81aa10689" }, - "CVE-2016-4581": { - "cmt_msg": "propogate_mnt: Handle the first propogated copy being a slave", - "cmt_id": "b439d566d2219d9e1f05ae4cdb4fd19f132899c8" + "CVE-2016-5829": { + "cmt_msg": "HID: hiddev: validate num_values for HIDIOCGUSAGES, HIDIOCSUSAGES commands", + "cmt_id": "5618231d6dade641382df9bfb9fa03fac8bbfbd2" + }, + "CVE-2016-5828": { + "cmt_msg": "powerpc/tm: Always reclaim in start_thread() for exec() class syscalls", + "cmt_id": "5b7ef8eff33ff8b3d87071a5fa463da15ec8a0c0" } }, - "4.5.5": { - "CVE-2016-6198": { - "cmt_msg": "vfs: add vfs_select_inode() helper", - "cmt_id": "ad56dcb2447522f6a165cb9bccff379e96acca8d" - }, - "CVE-2016-4557": { - "cmt_msg": "bpf: fix double-fdput in replace_map_fd_with_map_ptr()", - "cmt_id": "2ffd01aa8d12c83c43b611a74a09852ea4dd0111" - }, - "CVE-2016-4580": { - "cmt_msg": "net: fix a kernel infoleak in x25 module", - "cmt_id": "f7ee286fab0b55bf5908978c94e50d52e627b3ac" + "4.6.6": { + "CVE-2016-6516": { + "cmt_msg": "vfs: ioctl: prevent double-fetch in dedupe ioctl", + "cmt_id": "04678f5598322beecf6f06ddf73b2eb6a8b0ef9a" }, - "CVE-2016-4486": { - "cmt_msg": "net: fix infoleak in rtnetlink", - "cmt_id": "ff82293b226fd3bbfbd6d3fcbb0ffbbd55c85862" + "CVE-2016-4569": { + "cmt_msg": "ALSA: timer: Fix leak in SNDRV_TIMER_IOCTL_PARAMS", + "cmt_id": "82a638a293d7f0a699d88fe669a43829e65b0911" }, - "CVE-2016-2117": { - "cmt_msg": "atl2: Disable unimplemented scatter/gather feature", - "cmt_id": "11236cf9aef1402ddc1734409d89d3ad76e5eddc" + "CVE-2016-4578": { + "cmt_msg": "ALSA: timer: Fix leak in events via snd_timer_user_ccallback", + "cmt_id": "5b6fc00bb4ae7e917519b4fb49c9d3befa3897e5" }, - "CVE-2016-4485": { - "cmt_msg": "net: fix infoleak in llc", - "cmt_id": "33d437ee77122c4889d1e9c7ff6488f04b9cf05e" + "CVE-2016-6156": { + "cmt_msg": "platform/chrome: cros_ec_dev - double fetch bug in ioctl", + "cmt_id": "68b0cefc0358c3e3364fd520bf11c9c7b43be45b" }, - "CVE-2016-4558": { - "cmt_msg": "bpf: fix refcnt overflow", - "cmt_id": "1b106ad23a72bba34c7f37574defa324fdd76fc7" + "CVE-2016-5400": { + "cmt_msg": "media: fix airspy usb probe error path", + "cmt_id": "1031db3dff78793352bbda8ab5391def6f372aa4" }, - "CVE-2016-4913": { - "cmt_msg": "get_rock_ridge_filename(): handle malformed NM entries", - "cmt_id": "f18783e6ab935c8884e24c43d6e5d5c417e06923" + "CVE-2016-7911": { + "cmt_msg": "block: fix use-after-free in sys_ioprio_get()", + "cmt_id": "5c72cc56550a88bde12f6405c3448a17301aede8" } }, - "4.5.6": { - "CVE-2016-3713": { - "cmt_msg": "KVM: MTRR: remove MSR 0x2f8", - "cmt_id": "2aecd84724e43ea2f962ba54e10b9f304c258d16" + "4.6.7": { + "CVE-2016-7910": { + "cmt_msg": "block: fix use-after-free in seq file", + "cmt_id": "199e5c223f1c0bf4b1c79b37a1a664a5d657ad5c" }, - "CVE-2016-9754": { - "cmt_msg": "ring-buffer: Prevent overflow of size in ring_buffer_resize()", - "cmt_id": "40677f4ae0cb6ebaa1e2f631ee277e0be3379c31" + "CVE-2016-5696": { + "cmt_msg": "tcp: make challenge acks less predictable", + "cmt_id": "3c679108b6e576f4da4e165f90e1227b2e357383" }, - "CVE-2019-3901": { - "cmt_msg": "perf/core: Fix perf_event_open() vs. execve() race", - "cmt_id": "d276f428ef5549f414583963ba1f014e7746009e" + "CVE-2016-3857": { + "cmt_msg": "arm: oabi compat: add missing access checks", + "cmt_id": "e6b25dc115a4642eb7cfc93477f9f3d57ebaf391" } }, "outstanding": { - "CVE-2017-5897": { - "cmt_msg": "ip6_gre: fix ip6gre_err() invalid reads" - }, - "CVE-2020-10711": { - "cmt_msg": "netlabel: cope with NULL catmap" - }, - "CVE-2020-35508": { - "cmt_msg": "fork: fix copy_process(CLONE_PARENT) race with the exiting ->real_parent" - }, - "CVE-2019-14896": { - "cmt_msg": "libertas: Fix two buffer overflows at parsing bss descriptor" - }, - "CVE-2022-3649": { - "cmt_msg": "nilfs2: fix use-after-free bug of struct nilfs_root" - }, - "CVE-2020-35501": { - "cmt_msg": "" - }, "CVE-2019-15098": { "cmt_msg": "ath6kl: fix a NULL-ptr-deref bug in ath6kl_usb_alloc_urb_from_pipe()" }, - "CVE-2021-45095": { - "cmt_msg": "phonet: refcount leak in pep_sock_accep" - }, - "CVE-2017-17806": { - "cmt_msg": "crypto: hmac - require that the underlying hash algorithm is unkeyed" - }, - "CVE-2023-3611": { - "cmt_msg": "net/sched: sch_qfq: account for stab overhead in qfq_enqueue" - }, - "CVE-2022-0001": { - "cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE" + "CVE-2017-17712": { + "cmt_msg": "net: ipv4: fix for a race condition in raw_sendmsg" }, - "CVE-2020-12464": { - "cmt_msg": "USB: core: Fix free-while-in-use bug in the USB S-Glibrary" + "CVE-2022-0001": { + "cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE" }, - "CVE-2017-10662": { - "cmt_msg": "f2fs: sanity check segment count" + "CVE-2022-0002": { + "cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE" }, "CVE-2019-19965": { "cmt_msg": "scsi: libsas: stop discovering if oob mode is disconnected" }, - "CVE-2016-9793": { - "cmt_msg": "net: avoid signed overflows for SO_{SND|RCV}BUFFORCE" - }, "CVE-2017-15102": { "cmt_msg": "usb: misc: legousbtower: Fix NULL pointer deference" }, - "CVE-2016-9794": { - "cmt_msg": "ALSA: pcm : Call kill_fasync() in stream lock" + "CVE-2023-52615": { + "cmt_msg": "hwrng: core - Fix page fault dead lock on mmap-ed hwrng" }, - "CVE-2022-1184": { - "cmt_msg": "ext4: verify dir block before splitting it" + "CVE-2023-52614": { + "cmt_msg": "PM / devfreq: Fix buffer overflow in trans_stat_show" + }, + "CVE-2023-52617": { + "cmt_msg": "PCI: switchtec: Fix stdev_release() crash after surprise hot remove" }, "CVE-2020-24587": { "cmt_msg": "mac80211: prevent mixed key and fragment cache attacks" @@ -64145,44 +97795,26 @@ "CVE-2020-24586": { "cmt_msg": "mac80211: prevent mixed key and fragment cache attacks" }, - "CVE-2017-6074": { - "cmt_msg": "dccp: fix freeing skb too early for IPV6_RECVPKTINFO" - }, - "CVE-2023-6270": { - "cmt_msg": "" - }, - "CVE-2022-3642": { - "cmt_msg": "" - }, "CVE-2021-0129": { "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical" }, - "CVE-2019-20096": { - "cmt_msg": "dccp: Fix memleak in __feat_register_sp" - }, - "CVE-2022-47520": { - "cmt_msg": "wifi: wilc1000: validate pairwise and authentication suite offsets" - }, - "CVE-2023-42755": { - "cmt_msg": "net/sched: Retire rsvp classifier" + "CVE-2020-24588": { + "cmt_msg": "cfg80211: mitigate A-MSDU aggregation attacks" }, - "CVE-2016-10044": { - "cmt_msg": "aio: mark AIO pseudo-fs noexec" + "CVE-2023-52619": { + "cmt_msg": "pstore/ram: Fix crash when setting number of cpus to an odd number" }, - "CVE-2022-3643": { - "cmt_msg": "xen/netback: Ensure protocol headers don't fall in the non-linear area" + "CVE-2023-52618": { + "cmt_msg": "block/rnbd-srv: Check for unlikely string overflow" }, - "CVE-2021-38300": { - "cmt_msg": "bpf, mips: Validate conditional branch offsets" + "CVE-2023-5717": { + "cmt_msg": "perf: Disallow mis-matched inherited group reads" }, "CVE-2018-10940": { "cmt_msg": "cdrom: information leak in cdrom_ioctl_media_changed()" }, - "CVE-2022-32250": { - "cmt_msg": "netfilter: nf_tables: disallow non-stateful expression in sets earlier" - }, - "CVE-2018-10087": { - "cmt_msg": "kernel/exit.c: avoid undefined behaviour when calling wait4()" + "CVE-2019-9506": { + "cmt_msg": "Bluetooth: Fix faulty expression for minimum encryption key size check" }, "CVE-2019-9500": { "cmt_msg": "brcmfmac: assure SSID length from firmware is limited" @@ -64190,12 +97822,6 @@ "CVE-2019-9503": { "cmt_msg": "brcmfmac: add subtype check for event handling in data path" }, - "CVE-2018-6555": { - "cmt_msg": "staging: irda: remove the irda network stack and drivers" - }, - "CVE-2023-3159": { - "cmt_msg": "firewire: fix potential uaf in outbound_phy_packet_callback()" - }, "CVE-2022-0480": { "cmt_msg": "memcg: enable accounting for file lock caches" }, @@ -64205,1790 +97831,1715 @@ "CVE-2022-0487": { "cmt_msg": "moxart: fix potential use-after-free on remove path" }, - "CVE-2023-52429": { - "cmt_msg": "dm: limit the number of targets and parameter size area" - }, - "CVE-2021-28964": { - "cmt_msg": "btrfs: fix race when cloning extent buffer during rewind of an old root" - }, - "CVE-2016-6828": { - "cmt_msg": "tcp: fix use after free in tcp_xmit_retransmit_queue()" - }, - "CVE-2021-0920": { - "cmt_msg": "af_unix: fix garbage collect vs MSG_PEEK" - }, - "CVE-2018-17182": { - "cmt_msg": "mm: get rid of vmacache_flush_all() entirely" - }, - "CVE-2023-1249": { - "cmt_msg": "coredump: Use the vma snapshot in fill_files_note" - }, "CVE-2022-23825": { "cmt_msg": "" }, - "CVE-2022-1974": { - "cmt_msg": "nfc: replace improper check device_is_registered() in netlink related functions" - }, - "CVE-2019-13631": { - "cmt_msg": "Input: gtco - bounds check collection indent level" - }, - "CVE-2022-23816": { - "cmt_msg": "x86/kvm/vmx: Make noinstr clean" - }, - "CVE-2017-7374": { - "cmt_msg": "fscrypt: remove broken support for detecting keyring key revocation" - }, - "CVE-2024-26588": { - "cmt_msg": "LoongArch: BPF: Prevent out-of-bounds memory access" - }, - "CVE-2023-2162": { - "cmt_msg": "scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress" - }, - "CVE-2017-5551": { - "cmt_msg": "tmpfs: clear S_ISGID when setting posix ACLs" - }, - "CVE-2024-24857": { - "cmt_msg": "" - }, - "CVE-2019-19241": { - "cmt_msg": "io_uring: async workers should inherit the user creds" - }, - "CVE-2022-21123": { - "cmt_msg": "x86/speculation/mmio: Add mitigation for Processor MMIO Stale Data" - }, - "CVE-2023-3390": { - "cmt_msg": "netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE" + "CVE-2021-47112": { + "cmt_msg": "x86/kvm: Teardown PV features on boot CPU as well" }, - "CVE-2021-28688": { - "cmt_msg": "xen-blkback: don't leak persistent grants from xen_blkbk_map()" + "CVE-2021-47113": { + "cmt_msg": "btrfs: abort in rename_exchange if we fail to insert the second ref" }, - "CVE-2021-39686": { - "cmt_msg": "binder: use euid from cred instead of using task" + "CVE-2021-47110": { + "cmt_msg": "x86/kvm: Disable kvmclock on all CPUs on shutdown" }, - "CVE-2021-39685": { - "cmt_msg": "USB: gadget: detect too-big endpoint 0 requests" + "CVE-2021-47116": { + "cmt_msg": "ext4: fix memory leak in ext4_mb_init_backend on error path." }, - "CVE-2023-6535": { - "cmt_msg": "" + "CVE-2021-47117": { + "cmt_msg": "ext4: fix bug on in ext4_es_cache_extent as ext4_split_extent_at failed" }, - "CVE-2021-43975": { - "cmt_msg": "atlantic: Fix OOB read and write in hw_atl_utils_fw_rpc_wait" + "CVE-2021-47114": { + "cmt_msg": "ocfs2: fix data corruption by fallocate" }, - "CVE-2018-6927": { - "cmt_msg": "futex: Prevent overflow by strengthen input validation" + "CVE-2021-47118": { + "cmt_msg": "pid: take a reference when initializing `cad_pid`" }, - "CVE-2020-0466": { - "cmt_msg": "do_epoll_ctl(): clean the failure exits up a bit" + "CVE-2021-46970": { + "cmt_msg": "bus: mhi: pci_generic: Remove WQ_MEM_RECLAIM flag from state workqueue" }, "CVE-2019-10207": { "cmt_msg": "Bluetooth: hci_uart: check for missing tty operations" }, - "CVE-2023-1073": { - "cmt_msg": "HID: check empty report_list in hid_validate_values()" - }, - "CVE-2019-14835": { - "cmt_msg": "vhost: make sure log_num < in_num" - }, "CVE-2023-0459": { "cmt_msg": "uaccess: Add speculation barrier to copy_from_user()" }, "CVE-2023-0458": { "cmt_msg": "prlimit: do_prlimit needs to have a speculation check" }, - "CVE-2018-1000204": { - "cmt_msg": "scsi: sg: allocate with __GFP_ZERO in sg_build_indirect()" - }, "CVE-2017-8924": { "cmt_msg": "USB: serial: io_ti: fix information leak in completion handler" }, "CVE-2017-8925": { "cmt_msg": "USB: serial: omninet: fix reference leaks at open" }, - "CVE-2019-12379": { - "cmt_msg": "consolemap: Fix a memory leaking bug in drivers/tty/vt/consolemap.c" - }, - "CVE-2017-12134": { - "cmt_msg": "xen: fix bio vec merging" - }, - "CVE-2023-0597": { - "cmt_msg": "x86/mm: Randomize per-cpu entry area" - }, "CVE-2021-30002": { "cmt_msg": "media: v4l: ioctl: Fix memory leak in video_usercopy" }, - "CVE-2017-17450": { - "cmt_msg": "netfilter: xt_osf: Add missing permission checks" - }, "CVE-2021-0941": { "cmt_msg": "bpf: Remove MTU check in __bpf_skb_max_len" }, "CVE-2017-7294": { "cmt_msg": "drm/vmwgfx: fix integer overflow in vmw_surface_define_ioctl()" }, - "CVE-2016-3672": { - "cmt_msg": "x86/mm/32: Enable full randomization on i386 and X86_32" - }, - "CVE-2024-26591": { - "cmt_msg": "bpf: Fix re-attachment branch in bpf_tracing_prog_attach" - }, "CVE-2020-15802": { "cmt_msg": "" }, - "CVE-2024-26594": { - "cmt_msg": "ksmbd: validate mech token in session setup" - }, - "CVE-2022-3629": { - "cmt_msg": "vsock: Fix memory leak in vsock_connect()" - }, - "CVE-2017-18270": { - "cmt_msg": "KEYS: prevent creating a different user's keyrings" - }, "CVE-2022-3636": { "cmt_msg": "net: ethernet: mtk_eth_soc: use after free in __mtk_ppe_check_skb()" }, "CVE-2022-3635": { "cmt_msg": "atm: idt77252: fix use-after-free bugs caused by tst_timer" }, - "CVE-2022-0002": { - "cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE" - }, - "CVE-2021-34556": { - "cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4" - }, - "CVE-2020-0543": { - "cmt_msg": "x86/cpu: Add 'table' argument to cpu_matches()" + "CVE-2021-28715": { + "cmt_msg": "xen/netback: don't queue unlimited number of packages" }, - "CVE-2022-40982": { - "cmt_msg": "x86/speculation: Add Gather Data Sampling mitigation" + "CVE-2022-34918": { + "cmt_msg": "netfilter: nf_tables: stricter validation of element data" }, "CVE-2016-10905": { "cmt_msg": "GFS2: don't set rgrp gl_object until it's inserted into rgrp tree" }, - "CVE-2016-6480": { - "cmt_msg": "aacraid: Check size values after double-fetch from user" + "CVE-2021-47028": { + "cmt_msg": "mt76: mt7915: fix txrate reporting" }, - "CVE-2022-23039": { - "cmt_msg": "xen/gntalloc: don't use gnttab_query_foreign_access()" + "CVE-2019-19966": { + "cmt_msg": "media: cpia2: Fix use-after-free in cpia2_exit" }, - "CVE-2018-3646": { - "cmt_msg": "x86/microcode: Allow late microcode loading with SMT disabled" + "CVE-2017-18261": { + "cmt_msg": "clocksource/drivers/arm_arch_timer: Avoid infinite recursion when ftrace is enabled" }, - "CVE-2017-7518": { - "cmt_msg": "KVM: x86: fix singlestepping over syscall" + "CVE-2018-5814": { + "cmt_msg": "usbip: usbip_host: fix NULL-ptr deref and use-after-free errors" }, - "CVE-2021-28712": { - "cmt_msg": "xen/netfront: harden netfront against event channel storms" + "CVE-2021-43389": { + "cmt_msg": "isdn: cpai: check ctr->cnr to avoid array index out of bound" }, - "CVE-2024-24861": { - "cmt_msg": "" + "CVE-2023-1074": { + "cmt_msg": "sctp: fail if no bound addresses can be used for a given scope" }, - "CVE-2018-10938": { - "cmt_msg": "Cipso: cipso_v4_optptr enter infinite loop" + "CVE-2023-1077": { + "cmt_msg": "sched/rt: pick_next_rt_entity(): check list_entry" }, - "CVE-2019-19966": { - "cmt_msg": "media: cpia2: Fix use-after-free in cpia2_exit" + "CVE-2023-40283": { + "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb" }, - "CVE-2019-11477": { - "cmt_msg": "tcp: limit payload size of sacked skbs" + "CVE-2023-1073": { + "cmt_msg": "HID: check empty report_list in hid_validate_values()" }, - "CVE-2021-28711": { - "cmt_msg": "xen/blkfront: harden blkfront against event channel storms" + "CVE-2018-13093": { + "cmt_msg": "xfs: validate cached inodes are free when allocated" }, - "CVE-2016-4578": { - "cmt_msg": "ALSA: timer: Fix leak in events via snd_timer_user_ccallback" + "CVE-2018-13096": { + "cmt_msg": "f2fs: fix to do sanity check with node footer and iblocks" }, - "CVE-2018-14614": { - "cmt_msg": "f2fs: fix to do sanity check with cp_pack_start_sum" + "CVE-2018-13097": { + "cmt_msg": "f2fs: fix to do sanity check with user_block_count" }, - "CVE-2018-14617": { - "cmt_msg": "hfsplus: fix NULL dereference in hfsplus_lookup()" + "CVE-2018-13094": { + "cmt_msg": "xfs: don't call xfs_da_shrink_inode with NULL bp" }, - "CVE-2018-14616": { - "cmt_msg": "f2fs: fix to do sanity check with block address in main area v2" + "CVE-2018-13095": { + "cmt_msg": "xfs: More robust inode extent count validation" }, - "CVE-2018-14611": { - "cmt_msg": "btrfs: validate type when reading a chunk" + "CVE-2018-13098": { + "cmt_msg": "f2fs: fix to do sanity check with extra_attr feature" }, - "CVE-2018-14610": { - "cmt_msg": "btrfs: Check that each block group has corresponding chunk at mount time" + "CVE-2018-13099": { + "cmt_msg": "f2fs: fix to do sanity check with reserved blkaddr of inline inode" }, - "CVE-2018-14613": { - "cmt_msg": "btrfs: tree-checker: Verify block_group_item" + "CVE-2019-11884": { + "cmt_msg": "Bluetooth: hidp: fix buffer overflow" }, - "CVE-2018-14612": { - "cmt_msg": "btrfs: tree-checker: Detect invalid and empty essential trees" + "CVE-2019-18683": { + "cmt_msg": "media: vivid: Fix wrong locking that causes race conditions on streaming stop" }, - "CVE-2020-26145": { - "cmt_msg": "ath10k: drop fragments with multicast DA for PCIe" + "CVE-2019-18680": { + "cmt_msg": "unknown" }, - "CVE-2017-13216": { - "cmt_msg": "staging: android: ashmem: fix a race condition in ASHMEM_SET_SIZE ioctl" + "CVE-2021-45868": { + "cmt_msg": "quota: check block number when reading the block in quota file" }, - "CVE-2020-26147": { - "cmt_msg": "mac80211: assure all fragments are encrypted" + "CVE-2022-20158": { + "cmt_msg": "net/packet: fix slab-out-of-bounds access in packet_recvmsg()" }, - "CVE-2018-5814": { - "cmt_msg": "usbip: usbip_host: fix NULL-ptr deref and use-after-free errors" + "CVE-2020-0404": { + "cmt_msg": "media: uvcvideo: Avoid cyclic entity chains due to malformed USB descriptors" }, - "CVE-2020-26140": { - "cmt_msg": "" + "CVE-2022-39188": { + "cmt_msg": "mmu_gather: Force tlb-flush VM_PFNMAP vmas" }, - "CVE-2020-26143": { - "cmt_msg": "" + "CVE-2020-27067": { + "cmt_msg": "l2tp: fix l2tp_eth module loading" }, - "CVE-2020-26142": { - "cmt_msg": "" + "CVE-2020-27066": { + "cmt_msg": "xfrm: policy: Fix doulbe free in xfrm_policy_timer" }, - "CVE-2019-17053": { - "cmt_msg": "ieee802154: enforce CAP_NET_RAW for raw sockets" + "CVE-2017-5986": { + "cmt_msg": "sctp: avoid BUG_ON on sctp_wait_for_sndbuf" }, - "CVE-2019-17052": { - "cmt_msg": "ax25: enforce CAP_NET_RAW for raw sockets" + "CVE-2024-23307": { + "cmt_msg": "md/raid5: fix atomicity violation in raid5_cache_count" }, - "CVE-2023-1077": { - "cmt_msg": "sched/rt: pick_next_rt_entity(): check list_entry" + "CVE-2017-0861": { + "cmt_msg": "ALSA: pcm: prevent UAF in snd_pcm_info" }, - "CVE-2020-27418": { - "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region" + "CVE-2020-15393": { + "cmt_msg": "usb: usbtest: fix missing kfree(dev->buf) in usbtest_disconnect" }, - "CVE-2019-17056": { - "cmt_msg": "nfc: enforce CAP_NET_RAW for raw sockets" + "CVE-2021-3564": { + "cmt_msg": "Bluetooth: fix the erroneous flush_work() order" }, - "CVE-2019-17055": { - "cmt_msg": "mISDN: enforce CAP_NET_RAW for raw sockets" + "CVE-2017-13080": { + "cmt_msg": "mac80211: accept key reinstall without changing anything" }, - "CVE-2019-17054": { - "cmt_msg": "appletalk: enforce CAP_NET_RAW for raw sockets" + "CVE-2018-12127": { + "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" }, - "CVE-2018-13093": { - "cmt_msg": "xfs: validate cached inodes are free when allocated" + "CVE-2018-12126": { + "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" }, - "CVE-2017-2618": { - "cmt_msg": "selinux: fix off-by-one in setprocattr" + "CVE-2021-28964": { + "cmt_msg": "btrfs: fix race when cloning extent buffer during rewind of an old root" }, - "CVE-2023-51781": { - "cmt_msg": "appletalk: Fix Use-After-Free in atalk_ioctl" + "CVE-2019-13631": { + "cmt_msg": "Input: gtco - bounds check collection indent level" }, - "CVE-2018-13096": { - "cmt_msg": "f2fs: fix to do sanity check with node footer and iblocks" + "CVE-2018-12233": { + "cmt_msg": "jfs: Fix inconsistency between memory allocation and ea_buf->max_size" }, - "CVE-2018-13097": { - "cmt_msg": "f2fs: fix to do sanity check with user_block_count" + "CVE-2018-9465": { + "cmt_msg": "binder: fix proc->files use-after-free" }, - "CVE-2018-13094": { - "cmt_msg": "xfs: don't call xfs_da_shrink_inode with NULL bp" + "CVE-2020-8649": { + "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region" }, - "CVE-2018-13095": { - "cmt_msg": "xfs: More robust inode extent count validation" + "CVE-2020-8648": { + "cmt_msg": "vt: selection, close sel_buffer race" }, - "CVE-2020-29661": { - "cmt_msg": "tty: Fix ->pgrp locking in tiocspgrp()" + "CVE-2020-8647": { + "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region" }, - "CVE-2020-29660": { - "cmt_msg": "tty: Fix ->session locking" + "CVE-2019-0155": { + "cmt_msg": "drm/i915: Rename gen7 cmdparser tables" }, - "CVE-2018-13098": { - "cmt_msg": "f2fs: fix to do sanity check with extra_attr feature" + "CVE-2019-0154": { + "cmt_msg": "drm/i915: Lower RM timeout to avoid DSI hard hangs" }, - "CVE-2018-13099": { - "cmt_msg": "f2fs: fix to do sanity check with reserved blkaddr of inline inode" + "CVE-2023-35827": { + "cmt_msg": "ravb: Fix use-after-free issue in ravb_tx_timeout_work()" }, - "CVE-2022-1734": { - "cmt_msg": "nfc: nfcmrvl: main: reorder destructive operations in nfcmrvl_nci_unregister_dev to avoid bugs" + "CVE-2023-52585": { + "cmt_msg": "drm/amdgpu: Fix possible NULL dereference in amdgpu_ras_query_error_status_helper()" }, - "CVE-2017-15951": { - "cmt_msg": "KEYS: Fix race between updating and finding a negative key" + "CVE-2023-52584": { + "cmt_msg": "spmi: mediatek: Fix UAF on device remove" }, - "CVE-2023-28772": { - "cmt_msg": "seq_buf: Fix overflow in seq_buf_putmem_hex()" + "CVE-2023-52587": { + "cmt_msg": "IB/ipoib: Fix mcast list locking" }, - "CVE-2019-14895": { - "cmt_msg": "mwifiex: fix possible heap overflow in mwifiex_process_country_ie()" + "CVE-2023-52586": { + "cmt_msg": "drm/msm/dpu: Add mutex lock in control vblank irq" }, - "CVE-2017-17862": { - "cmt_msg": "bpf: fix branch pruning logic" + "CVE-2023-52583": { + "cmt_msg": "ceph: fix deadlock or deadcode of misusing dget()" }, - "CVE-2019-11884": { - "cmt_msg": "Bluetooth: hidp: fix buffer overflow" + "CVE-2023-52589": { + "cmt_msg": "media: rkisp1: Fix IRQ disable race issue" }, - "CVE-2021-40490": { - "cmt_msg": "ext4: fix race writing to an inline_data file while its xattrs are changing" + "CVE-2023-52588": { + "cmt_msg": "f2fs: fix to tag gcing flag on page during block migration" }, - "CVE-2023-4134": { - "cmt_msg": "Input: cyttsp4_core - change del_timer_sync() to timer_shutdown_sync()" + "CVE-2023-52340": { + "cmt_msg": "ipv6: remove max_size check inline with ipv4" }, - "CVE-2019-19074": { - "cmt_msg": "ath9k: release allocated buffer if timed out" + "CVE-2021-46969": { + "cmt_msg": "bus: mhi: core: Fix invalid error returning in mhi_queue" }, - "CVE-2019-18683": { - "cmt_msg": "media: vivid: Fix wrong locking that causes race conditions on streaming stop" + "CVE-2020-16120": { + "cmt_msg": "ovl: switch to mounter creds in readdir" }, - "CVE-2022-2503": { - "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag" + "CVE-2019-17666": { + "cmt_msg": "rtlwifi: Fix potential overflow on P2P code" }, - "CVE-2022-48619": { - "cmt_msg": "Input: add bounds checking to input_set_capability()" + "CVE-2021-34693": { + "cmt_msg": "can: bcm: fix infoleak in struct bcm_msg_head" }, - "CVE-2015-8952": { - "cmt_msg": "ext2: convert to mbcache2" + "CVE-2020-11494": { + "cmt_msg": "slcan: Don't transmit uninitialized stack data in padding" }, - "CVE-2016-4951": { - "cmt_msg": "tipc: check nl sock before parsing nested attributes" + "CVE-2024-26797": { + "cmt_msg": "drm/amd/display: Prevent potential buffer overflow in map_hw_resources" }, - "CVE-2020-26558": { - "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical" + "CVE-2024-26791": { + "cmt_msg": "btrfs: dev-replace: properly validate device names" }, - "CVE-2022-23038": { - "cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()" + "CVE-2024-26793": { + "cmt_msg": "gtp: fix use-after-free and null-ptr-deref in gtp_newlink()" }, - "CVE-2017-1000410": { - "cmt_msg": "Bluetooth: Prevent stack info leak from the EFS element." + "CVE-2022-30594": { + "cmt_msg": "ptrace: Check PTRACE_O_SUSPEND_SECCOMP permission on PTRACE_SEIZE" }, - "CVE-2016-8645": { - "cmt_msg": "tcp: take care of truncations done by sk_filter()" + "CVE-2024-26798": { + "cmt_msg": "fbcon: always restore the old font data in fbcon_do_set_font()" }, - "CVE-2022-20158": { - "cmt_msg": "net/packet: fix slab-out-of-bounds access in packet_recvmsg()" + "CVE-2021-38204": { + "cmt_msg": "usb: max-3421: Prevent corruption of freed memory" }, - "CVE-2022-23037": { - "cmt_msg": "xen/netfront: don't use gnttab_query_foreign_access() for mapped status" + "CVE-2021-38205": { + "cmt_msg": "net: xilinx_emaclite: Do not print real IOMEM pointer" }, - "CVE-2017-5669": { - "cmt_msg": "ipc/shm: Fix shmat mmap nil-page protection" + "CVE-2020-0255": { + "cmt_msg": "selinux: properly handle multiple messages in selinux_netlink_send()" }, - "CVE-2019-15927": { - "cmt_msg": "ALSA: usb-audio: Avoid access before bLength check in build_audio_procunit()" + "CVE-2023-35001": { + "cmt_msg": "netfilter: nf_tables: prevent OOB access in nft_byteorder_eval" }, - "CVE-2019-15926": { - "cmt_msg": "ath6kl: add some bounds checking" + "CVE-2021-38208": { + "cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect" }, - "CVE-2019-14821": { - "cmt_msg": "KVM: coalesced_mmio: add bounds checking" + "CVE-2017-18232": { + "cmt_msg": "scsi: libsas: direct call probe and destruct" }, - "CVE-2020-12826": { - "cmt_msg": "signal: Extend exec_id to 64bits" + "CVE-2022-0168": { + "cmt_msg": "cifs: fix NULL ptr dereference in smb2_ioctl_query_info()" }, - "CVE-2019-3701": { - "cmt_msg": "can: gw: ensure DLC boundaries after CAN frame modification" + "CVE-2020-26556": { + "cmt_msg": "" }, - "CVE-2021-42008": { - "cmt_msg": "net: 6pack: fix slab-out-of-bounds in decode_data" + "CVE-2018-9518": { + "cmt_msg": "NFC: llcp: Limit size of SDP URI" }, - "CVE-2022-39188": { - "cmt_msg": "mmu_gather: Force tlb-flush VM_PFNMAP vmas" + "CVE-2024-26778": { + "cmt_msg": "fbdev: savage: Error out if pixclock equals zero" }, - "CVE-2018-9465": { - "cmt_msg": "binder: fix proc->files use-after-free" + "CVE-2020-26555": { + "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical" }, - "CVE-2019-1125": { - "cmt_msg": "x86/speculation: Prepare entry code for Spectre v1 swapgs mitigations" + "CVE-2024-26776": { + "cmt_msg": "spi: hisi-sfc-v3xx: Return IRQ_NONE if no interrupts were detected" }, - "CVE-2019-15218": { - "cmt_msg": "media: usb: siano: Fix general protection fault in smsusb" + "CVE-2024-26777": { + "cmt_msg": "fbdev: sis: Error out if pixclock equals zero" }, - "CVE-2019-15666": { - "cmt_msg": "xfrm: policy: Fix out-of-bound array accesses in __xfrm_policy_unlink" + "CVE-2020-26558": { + "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical" }, - "CVE-2005-3660": { + "CVE-2023-3390": { + "cmt_msg": "netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE" + }, + "CVE-2023-3397": { "cmt_msg": "" }, - "CVE-2017-14106": { - "cmt_msg": "tcp: initialize rcv_mss to TCP_MIN_MSS instead of 0" + "CVE-2024-26773": { + "cmt_msg": "ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found()" }, - "CVE-2019-15212": { - "cmt_msg": "USB: rio500: refuse more than one device at a time" + "CVE-2024-26770": { + "cmt_msg": "HID: nvidia-shield: Add missing null pointer checks to LED initialization" }, - "CVE-2019-15211": { - "cmt_msg": "media: radio-raremono: change devm_k*alloc to k*alloc" + "CVE-2024-26771": { + "cmt_msg": "dmaengine: ti: edma: Add some null pointer checks to the edma_probe" }, - "CVE-2023-1095": { - "cmt_msg": "netfilter: nf_tables: fix null deref due to zeroed list head" + "CVE-2023-28746": { + "cmt_msg": "x86/mmio: Disable KVM mitigation when X86_FEATURE_CLEAR_CPU_BUF is set" }, - "CVE-2015-1350": { - "cmt_msg": "fs: Avoid premature clearing of capabilities" + "CVE-2017-5754": { + "cmt_msg": "x86/cpufeatures: Add Intel feature bits for Speculation Control" }, - "CVE-2016-1237": { - "cmt_msg": "posix_acl: Add set_posix_acl" + "CVE-2021-47119": { + "cmt_msg": "ext4: fix memory leak in ext4_fill_super" }, - "CVE-2017-1000380": { - "cmt_msg": "ALSA: timer: Fix race between read and ioctl" + "CVE-2016-10200": { + "cmt_msg": "l2tp: fix racy SOCK_ZAPPED flag check in l2tp_ip{,6}_bind()" }, - "CVE-2019-15214": { - "cmt_msg": "ALSA: core: Fix card races between register and disconnect" + "CVE-2017-5753": { + "cmt_msg": "x86/cpufeatures: Add X86_BUG_SPECTRE_V[12]" }, - "CVE-2020-24588": { - "cmt_msg": "cfg80211: mitigate A-MSDU aggregation attacks" + "CVE-2024-1086": { + "cmt_msg": "netfilter: nf_tables: reject QUEUE/DROP verdict parameters" }, - "CVE-2021-33034": { - "cmt_msg": "Bluetooth: verify AMP hci_chan before amp_destroy" + "CVE-2016-10208": { + "cmt_msg": "ext4: validate s_first_meta_bg at mount time" }, - "CVE-2019-19922": { - "cmt_msg": "sched/fair: Fix low cpu usage with high throttling by removing expiration of cpu-local slices" + "CVE-2022-0382": { + "cmt_msg": "net ticp:fix a kernel-infoleak in __tipc_sendmsg()" }, - "CVE-2022-41850": { - "cmt_msg": "HID: roccat: Fix use-after-free in roccat_read()" + "CVE-2016-4440": { + "cmt_msg": "kvm:vmx: more complete state update on APICv on/off" }, - "CVE-2023-5717": { - "cmt_msg": "perf: Disallow mis-matched inherited group reads" + "CVE-2019-15222": { + "cmt_msg": "ALSA: usb-audio: Fix gpf in snd_usb_pipe_sanity_check" }, - "CVE-2019-19927": { - "cmt_msg": "drm/ttm: fix incrementing the page pointer for huge pages" + "CVE-2019-15223": { + "cmt_msg": "ALSA: line6: Assure canceling delayed work at disconnection" }, - "CVE-2017-18509": { - "cmt_msg": "ipv6: check sk sk_type and protocol early in ip_mroute_set/getsockopt" + "CVE-2019-15220": { + "cmt_msg": "p54usb: Fix race between disconnect and firmware loading" }, - "CVE-2022-3903": { - "cmt_msg": "media: mceusb: Use new usb_control_msg_*() routines" + "CVE-2019-15221": { + "cmt_msg": "ALSA: line6: Fix write on zero-sized buffer" }, - "CVE-2017-5986": { - "cmt_msg": "sctp: avoid BUG_ON on sctp_wait_for_sndbuf" + "CVE-2022-1016": { + "cmt_msg": "netfilter: nf_tables: initialize registers in nft_do_chain()" }, - "CVE-2022-44032": { - "cmt_msg": "char: pcmcia: remove all the drivers" + "CVE-2022-1011": { + "cmt_msg": "fuse: fix pipe buffer lifetime for direct_io" }, - "CVE-2024-23307": { - "cmt_msg": "" + "CVE-2022-1012": { + "cmt_msg": "secure_seq: use the 64 bits of the siphash for port offset calculation" }, - "CVE-2016-3857": { - "cmt_msg": "arm: oabi compat: add missing access checks" + "CVE-2023-52620": { + "cmt_msg": "netfilter: nf_tables: disallow timeout for anonymous sets" }, - "CVE-2022-32296": { - "cmt_msg": "tcp: increase source port perturb table to 2^16" + "CVE-2023-52621": { + "cmt_msg": "bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers" }, - "CVE-2017-11600": { - "cmt_msg": "xfrm: policy: check policy direction value" + "CVE-2023-52622": { + "cmt_msg": "ext4: avoid online resizing failures due to oversized flex bg" }, - "CVE-2023-3567": { - "cmt_msg": "vc_screen: move load of struct vc_data pointer in vcs_read() to avoid UAF" + "CVE-2023-52623": { + "cmt_msg": "SUNRPC: Fix a suspicious RCU usage warning" }, - "CVE-2019-20806": { - "cmt_msg": "media: tw5864: Fix possible NULL pointer dereference in tw5864_handle_frame" + "CVE-2023-52624": { + "cmt_msg": "drm/amd/display: Wake DMCUB before executing GPINT commands" }, - "CVE-2022-3028": { - "cmt_msg": "af_key: Do not call xfrm_probe_algs in parallel" + "CVE-2023-52625": { + "cmt_msg": "drm/amd/display: Refactor DMCUB enter/exit idle interface" }, - "CVE-2019-2181": { - "cmt_msg": "binder: check for overflow when alloc for security context" + "CVE-2023-52628": { + "cmt_msg": "netfilter: nftables: exthdr: fix 4-byte stack OOB write" }, - "CVE-2020-14304": { - "cmt_msg": "" + "CVE-2023-52629": { + "cmt_msg": "sh: push-switch: Reorder cleanup operations to avoid use-after-free bug" }, - "CVE-2018-17972": { - "cmt_msg": "proc: restrict kernel stack dumps to root" + "CVE-2016-9555": { + "cmt_msg": "sctp: validate chunk len before actually using it" }, - "CVE-2020-15393": { - "cmt_msg": "usb: usbtest: fix missing kfree(dev->buf) in usbtest_disconnect" + "CVE-2022-0492": { + "cmt_msg": "cgroup-v1: Require capabilities to set release_agent" }, - "CVE-2022-33981": { - "cmt_msg": "floppy: disable FDRAWCMD by default" + "CVE-2020-12352": { + "cmt_msg": "Bluetooth: A2MP: Fix not initializing all members" }, - "CVE-2021-3564": { - "cmt_msg": "Bluetooth: fix the erroneous flush_work() order" + "CVE-2021-43976": { + "cmt_msg": "mwifiex: Fix skb_over_panic in mwifiex_usb_recv()" }, - "CVE-2019-9506": { - "cmt_msg": "Bluetooth: Fix faulty expression for minimum encryption key size check" + "CVE-2022-0494": { + "cmt_msg": "block-map: add __GFP_ZERO flag for alloc_page in function bio_copy_kern" }, - "CVE-2023-1476": { - "cmt_msg": "" + "CVE-2021-47101": { + "cmt_msg": "asix: fix uninit-value in asix_mdio_read()" }, - "CVE-2017-16995": { - "cmt_msg": "bpf: fix incorrect sign extension in check_alu_op()" + "CVE-2021-47103": { + "cmt_msg": "inet: fully convert sk->sk_rx_dst to RCU rules" }, - "CVE-2017-16994": { - "cmt_msg": "mm/pagewalk.c: report holes in hugetlb ranges" + "CVE-2021-46982": { + "cmt_msg": "f2fs: compress: fix race condition of overwrite vs truncate" }, - "CVE-2019-2025": { - "cmt_msg": "binder: fix race that allows malicious free of live buffer" + "CVE-2007-3719": { + "cmt_msg": "" }, - "CVE-2017-2583": { - "cmt_msg": "KVM: x86: fix emulation of \"MOV SS, null selector\"" + "CVE-2023-3863": { + "cmt_msg": "net: nfc: Fix use-after-free caused by nfc_llcp_find_local" }, - "CVE-2020-26560": { - "cmt_msg": "" + "CVE-2019-19319": { + "cmt_msg": "ext4: protect journal inode's blocks using block_validity" }, - "CVE-2017-2584": { - "cmt_msg": "KVM: x86: Introduce segmented_write_std" + "CVE-2016-8399": { + "cmt_msg": "net: ping: check minimum size on ICMP header length" }, - "CVE-2023-39198": { - "cmt_msg": "drm/qxl: fix UAF on handle creation" + "CVE-2022-3628": { + "cmt_msg": "wifi: brcmfmac: Fix potential buffer overflow in brcmf_fweh_event_worker()" }, - "CVE-2017-13080": { - "cmt_msg": "mac80211: accept key reinstall without changing anything" + "CVE-2022-3629": { + "cmt_msg": "vsock: Fix memory leak in vsock_connect()" }, - "CVE-2021-20321": { - "cmt_msg": "ovl: fix missing negative dentry check in ovl_rename()" + "CVE-2022-3621": { + "cmt_msg": "nilfs2: fix NULL pointer dereference at nilfs_bmap_lookup_at_level()" }, - "CVE-2018-12127": { - "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" + "CVE-2022-23960": { + "cmt_msg": "ARM: report Spectre v2 status through sysfs" }, - "CVE-2018-12126": { - "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" + "CVE-2022-3624": { + "cmt_msg": "bonding: fix reference count leak in balance-alb mode" }, - "CVE-2018-7566": { - "cmt_msg": "ALSA: seq: Fix racy pool initializations" + "CVE-2019-11091": { + "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" }, - "CVE-2020-36158": { - "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_cmd_802_11_ad_hoc_start" + "CVE-2023-4921": { + "cmt_msg": "net: sched: sch_qfq: Fix UAF in qfq_dequeue()" }, - "CVE-2017-9077": { - "cmt_msg": "ipv6/dccp: do not inherit ipv6_mc_list from parent" + "CVE-2017-15649": { + "cmt_msg": "packet: in packet_do_bind, test fanout with bind_lock held" }, - "CVE-2017-9076": { - "cmt_msg": "ipv6/dccp: do not inherit ipv6_mc_list from parent" + "CVE-2023-1829": { + "cmt_msg": "net/sched: Retire tcindex classifier" }, - "CVE-2017-9075": { - "cmt_msg": "sctp: do not inherit ipv6_{mc|ac|fl}_list from parent" + "CVE-2019-19227": { + "cmt_msg": "appletalk: Fix potential NULL pointer dereference in unregister_snap_client" }, - "CVE-2017-9074": { - "cmt_msg": "ipv6: Prevent overrun when parsing v6 header options" + "CVE-2024-0775": { + "cmt_msg": "ext4: improve error recovery code paths in __ext4_remount()" }, - "CVE-2022-20572": { - "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag" + "CVE-2016-9604": { + "cmt_msg": "KEYS: Disallow keyrings beginning with '.' to be joined as session keyrings" }, - "CVE-2018-10021": { - "cmt_msg": "scsi: libsas: defer ata device eh commands to libata" + "CVE-2020-14386": { + "cmt_msg": "net/packet: fix overflow in tpacket_rcv" }, - "CVE-2022-20132": { - "cmt_msg": "HID: add hid_is_usb() function to make it simpler for USB detection" + "CVE-2020-14381": { + "cmt_msg": "futex: Fix inode life-time issue" }, - "CVE-2019-2024": { - "cmt_msg": "media: em28xx: Fix use-after-free when disconnecting" + "CVE-2019-19768": { + "cmt_msg": "blktrace: Protect q->blk_trace with RCU" }, - "CVE-2023-39194": { - "cmt_msg": "net: xfrm: Fix xfrm_address_filter OOB read" + "CVE-2022-20141": { + "cmt_msg": "igmp: Add ip_mc_list lock in ip_check_mc_rcu" }, - "CVE-2020-0067": { - "cmt_msg": "f2fs: fix to avoid memory leakage in f2fs_listxattr" + "CVE-2023-23455": { + "cmt_msg": "net: sched: atm: dont intepret cls results when asked to drop" }, - "CVE-2019-10126": { - "cmt_msg": "mwifiex: Fix heap overflow in mwifiex_uap_parse_tail_ies()" + "CVE-2023-23454": { + "cmt_msg": "net: sched: cbq: dont intepret cls results when asked to drop" }, - "CVE-2023-3106": { - "cmt_msg": "xfrm: fix crash in XFRM_MSG_GETSA netlink handler" + "CVE-2022-20148": { + "cmt_msg": "f2fs: fix UAF in f2fs_available_free_memory" }, - "CVE-2019-10124": { - "cmt_msg": "mm: hwpoison: fix thp split handing in soft_offline_in_use_page()" + "CVE-2023-6931": { + "cmt_msg": "perf: Fix perf_event_validate_size()" }, - "CVE-2020-14353": { - "cmt_msg": "KEYS: prevent creating a different user's keyrings" + "CVE-2023-6932": { + "cmt_msg": "ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet" }, - "CVE-2020-13974": { - "cmt_msg": "vt: keyboard: avoid signed integer overflow in k_ascii" + "CVE-2018-8781": { + "cmt_msg": "drm: udl: Properly check framebuffer mmap offsets" }, - "CVE-2016-6213": { - "cmt_msg": "mnt: Add a per mount namespace limit on the number of mounts" + "CVE-2017-15265": { + "cmt_msg": "ALSA: seq: Fix use-after-free at creating a port" }, - "CVE-2021-4083": { - "cmt_msg": "fget: check that the fd still exists after getting a ref to it" + "CVE-2021-0605": { + "cmt_msg": "af_key: pfkey_dump needs parameter validation" }, - "CVE-2023-33288": { - "cmt_msg": "power: supply: bq24190: Fix use after free bug in bq24190_remove due to race condition" + "CVE-2018-20961": { + "cmt_msg": "USB: gadget: f_midi: fixing a possible double-free in f_midi" }, - "CVE-2017-17558": { - "cmt_msg": "USB: core: prevent malicious bNumInterfaces overflow" + "CVE-2018-5995": { + "cmt_msg": "printk: hash addresses printed with %p" }, - "CVE-2017-1000251": { - "cmt_msg": "Bluetooth: Properly check L2CAP config option output buffer length" + "CVE-2022-2153": { + "cmt_msg": "KVM: x86: Avoid theoretical NULL pointer dereference in kvm_irq_delivery_to_apic_fast()" }, - "CVE-2017-1000252": { - "cmt_msg": "KVM: VMX: Do not BUG() on out-of-bounds guest IRQ" + "CVE-2024-2193": { + "cmt_msg": "" }, - "CVE-2022-29901": { - "cmt_msg": "x86/kvm/vmx: Make noinstr clean" + "CVE-2018-12930": { + "cmt_msg": "" }, - "CVE-2021-4197": { - "cmt_msg": "cgroup: Use open-time credentials for process migraton perm checks" + "CVE-2018-12931": { + "cmt_msg": "" }, - "CVE-2018-12233": { - "cmt_msg": "jfs: Fix inconsistency between memory allocation and ea_buf->max_size" + "CVE-2021-28972": { + "cmt_msg": "PCI: rpadlpar: Fix potential drc_name corruption in store functions" }, - "CVE-2019-19227": { - "cmt_msg": "appletalk: Fix potential NULL pointer dereference in unregister_snap_client" + "CVE-2021-28971": { + "cmt_msg": "perf/x86/intel: Fix a crash caused by zero PEBS status" }, - "CVE-2020-10751": { - "cmt_msg": "selinux: properly handle multiple messages in selinux_netlink_send()" + "CVE-2017-12146": { + "cmt_msg": "driver core: platform: fix race condition with driver_override" }, - "CVE-2019-19377": { - "cmt_msg": "btrfs: Don't submit any btree write bio if the fs has errors" + "CVE-2020-36781": { + "cmt_msg": "i2c: imx: fix reference leak when pm_runtime_get_sync fails" }, - "CVE-2020-10757": { - "cmt_msg": "mm: Fix mremap not considering huge pmd devmap" + "CVE-2021-3732": { + "cmt_msg": "ovl: prevent private clone if bind mount is not allowed" }, - "CVE-2018-20511": { - "cmt_msg": "net/appletalk: fix minor pointer leak to userspace in SIOCFINDIPDDPRT" + "CVE-2020-36784": { + "cmt_msg": "i2c: cadence: fix reference leak when pm_runtime_get_sync fails" }, - "CVE-2018-20510": { - "cmt_msg": "binder: replace \"%p\" with \"%pK\"" + "CVE-2017-13166": { + "cmt_msg": "media: v4l2-ioctl.c: use check_fmt for enum/g/s/try_fmt" }, - "CVE-2022-20166": { - "cmt_msg": "drivers core: Use sysfs_emit and sysfs_emit_at for show(device *...) functions" + "CVE-2018-12207": { + "cmt_msg": "kvm: x86, powerpc: do not allow clearing largepages debugfs entry" }, - "CVE-2016-5728": { - "cmt_msg": "misc: mic: Fix for double fetch security bug in VOP driver" + "CVE-2017-13168": { + "cmt_msg": "scsi: sg: mitigate read/write abuse" }, - "CVE-2020-15436": { - "cmt_msg": "block: Fix use-after-free in blkdev_get()" + "CVE-2019-0148": { + "cmt_msg": "i40e: Wrong truncation from u16 to u8" }, - "CVE-2022-1116": { - "cmt_msg": "" + "CVE-2019-17075": { + "cmt_msg": "RDMA/cxgb4: Do not dma memory off of the stack" }, - "CVE-2021-28660": { - "cmt_msg": "staging: rtl8188eu: prevent ->ssid overflow in rtw_wx_set_scan()" + "CVE-2023-20588": { + "cmt_msg": "x86/CPU/AMD: Do not leak quotient data after a division by 0" }, - "CVE-2016-9178": { - "cmt_msg": "fix minor infoleak in get_user_ex()" + "CVE-2019-0147": { + "cmt_msg": "i40e: add num_vectors checker in iwarp handler" }, - "CVE-2020-8647": { - "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region" + "CVE-2018-3693": { + "cmt_msg": "ext4: fix spectre gadget in ext4_mb_regular_allocator()" }, - "CVE-2019-0155": { - "cmt_msg": "drm/i915: Rename gen7 cmdparser tables" + "CVE-2022-44033": { + "cmt_msg": "char: pcmcia: remove all the drivers" }, - "CVE-2019-0154": { - "cmt_msg": "drm/i915: Lower RM timeout to avoid DSI hard hangs" + "CVE-2022-44032": { + "cmt_msg": "char: pcmcia: remove all the drivers" }, - "CVE-2023-35827": { - "cmt_msg": "ravb: Fix use-after-free issue in ravb_tx_timeout_work()" + "CVE-2017-5576": { + "cmt_msg": "drm/vc4: Fix an integer overflow in temporary allocation layout." }, - "CVE-2020-36386": { - "cmt_msg": "Bluetooth: Fix slab-out-of-bounds read in hci_extended_inquiry_result_evt()" + "CVE-2017-5577": { + "cmt_msg": "drm/vc4: Return -EINVAL on the overflow checks failing." }, - "CVE-2017-6348": { - "cmt_msg": "irda: Fix lockdep annotations in hashbin_delete()." + "CVE-2021-3609": { + "cmt_msg": "can: bcm: delay release of struct bcm_op after synchronize_rcu()" }, - "CVE-2022-3566": { - "cmt_msg": "tcp: Fix data races around icsk->icsk_af_ops." + "CVE-2017-13305": { + "cmt_msg": "KEYS: encrypted: fix buffer overread in valid_master_desc()" }, - "CVE-2022-3565": { - "cmt_msg": "mISDN: fix use-after-free bugs in l1oip timer handlers" + "CVE-2019-11479": { + "cmt_msg": "tcp: add tcp_min_snd_mss sysctl" }, - "CVE-2022-3564": { - "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free caused by l2cap_reassemble_sdu" + "CVE-2019-11478": { + "cmt_msg": "tcp: tcp_fragment() should apply sane memory limits" }, - "CVE-2018-19407": { - "cmt_msg": "KVM: X86: Fix scan ioapic use-before-initialization" + "CVE-2019-20096": { + "cmt_msg": "dccp: Fix memleak in __feat_register_sp" }, - "CVE-2017-6345": { - "cmt_msg": "net/llc: avoid BUG_ON() in skb_orphan()" + "CVE-2018-6554": { + "cmt_msg": "staging: irda: remove the irda network stack and drivers" }, - "CVE-2017-6346": { - "cmt_msg": "packet: fix races in fanout_add()" + "CVE-2018-6555": { + "cmt_msg": "staging: irda: remove the irda network stack and drivers" }, - "CVE-2017-6347": { - "cmt_msg": "ip: fix IP_CHECKSUM handling" + "CVE-2016-7097": { + "cmt_msg": "posix_acl: Clear SGID bit when setting file permissions" }, - "CVE-2022-3628": { - "cmt_msg": "wifi: brcmfmac: Fix potential buffer overflow in brcmf_fweh_event_worker()" + "CVE-2019-9213": { + "cmt_msg": "mm: enforce min addr even if capable() in expand_downwards()" }, - "CVE-2022-1048": { - "cmt_msg": "ALSA: pcm: Fix races among concurrent hw_params and hw_free calls" + "CVE-2019-14896": { + "cmt_msg": "libertas: Fix two buffer overflows at parsing bss descriptor" }, "CVE-2019-14897": { "cmt_msg": "libertas: Fix two buffer overflows at parsing bss descriptor" }, - "CVE-2018-9385": { - "cmt_msg": "ARM: amba: Don't read past the end of sysfs \"driver_override\" buffer" + "CVE-2019-14895": { + "cmt_msg": "mwifiex: fix possible heap overflow in mwifiex_process_country_ie()" }, - "CVE-2020-0009": { - "cmt_msg": "staging: android: ashmem: Disallow ashmem memory from being remapped" + "CVE-2024-26784": { + "cmt_msg": "pmdomain: arm: Fix NULL dereference on scmi_perf_domain removal" }, - "CVE-2023-52340": { - "cmt_msg": "ipv6: remove max_size check inline with ipv4" + "CVE-2024-26789": { + "cmt_msg": "crypto: arm64/neonbs - fix out-of-bounds access on short input" }, - "CVE-2023-31082": { - "cmt_msg": "" + "CVE-2017-18222": { + "cmt_msg": "net: hns: fix ethtool_get_strings overflow in hns driver" }, - "CVE-2022-3567": { - "cmt_msg": "ipv6: Fix data races around sk->sk_prot." + "CVE-2020-0067": { + "cmt_msg": "f2fs: fix to avoid memory leakage in f2fs_listxattr" }, - "CVE-2018-7480": { - "cmt_msg": "blkcg: fix double free of new_blkg in blkcg_init_queue" + "CVE-2017-18224": { + "cmt_msg": "ocfs2: ip_alloc_sem should be taken in ocfs2_get_block()" }, - "CVE-2019-14615": { - "cmt_msg": "drm/i915/gen9: Clear residual context state on context switch" + "CVE-2020-26541": { + "cmt_msg": "certs: Add EFI_CERT_X509_GUID support for dbx entries" }, - "CVE-2016-3135": { - "cmt_msg": "netfilter: x_tables: check for size overflow" + "CVE-2019-20794": { + "cmt_msg": "" }, - "CVE-2016-3134": { - "cmt_msg": "netfilter: x_tables: fix unconditional helper" + "CVE-2024-26769": { + "cmt_msg": "nvmet-fc: avoid deadlock on delete association path" }, - "CVE-2018-9415": { - "cmt_msg": "ARM: amba: Fix race condition with driver_override" + "CVE-2024-26768": { + "cmt_msg": "LoongArch: Change acpi_core_pic[NR_CPUS] to acpi_core_pic[MAX_CORE_PIC]" }, - "CVE-2020-12771": { - "cmt_msg": "bcache: fix potential deadlock problem in btree_gc_coalesce" + "CVE-2021-33061": { + "cmt_msg": "ixgbe: add improvement for MDD response functionality" }, - "CVE-2019-13648": { - "cmt_msg": "powerpc/tm: Fix oops on sigreturn on systems without TM" + "CVE-2024-26764": { + "cmt_msg": "fs/aio: Restrict kiocb_set_cancel_fn() to I/O submitted via libaio" }, - "CVE-2023-0030": { - "cmt_msg": "drm/nouveau/mmu: add more general vmm free/node handling functions" + "CVE-2024-26767": { + "cmt_msg": "drm/amd/display: fixed integer types and null check locations" }, - "CVE-2020-16120": { - "cmt_msg": "ovl: switch to mounter creds in readdir" + "CVE-2024-26766": { + "cmt_msg": "IB/hfi1: Fix sdma.h tx->num_descs off-by-one error" }, - "CVE-2019-11599": { - "cmt_msg": "coredump: fix race condition between mmget_not_zero()/get_task_mm() and core dumping" + "CVE-2024-26763": { + "cmt_msg": "dm-crypt: don't modify the data when using authenticated encryption" }, - "CVE-2018-16658": { - "cmt_msg": "cdrom: Fix info leak/OOB read in cdrom_ioctl_drive_status" + "CVE-2017-18551": { + "cmt_msg": "i2c: core-smbus: prevent stack corruption on read I2C_BLOCK_DATA" }, - "CVE-2018-15572": { - "cmt_msg": "x86/speculation: Protect against userspace-userspace spectreRSB" + "CVE-2017-18552": { + "cmt_msg": "RDS: validate the requested traces user input against max supported" }, - "CVE-2022-1204": { - "cmt_msg": "ax25: Fix refcount leaks caused by ax25_cb_del()" + "CVE-2018-18559": { + "cmt_msg": "net/packet: fix a race in packet_bind() and packet_notifier()" }, - "CVE-2019-2101": { - "cmt_msg": "media: uvcvideo: Fix 'type' check leading to overflow" + "CVE-2019-9457": { + "cmt_msg": "exec: Limit arg stack to at most 75% of _STK_LIM" }, - "CVE-2019-17666": { - "cmt_msg": "rtlwifi: Fix potential overflow on P2P code" + "CVE-2019-9456": { + "cmt_msg": "usb: usbmon: Read text within supplied buffer size" }, - "CVE-2018-9363": { - "cmt_msg": "Bluetooth: hidp: buffer overflow in hidp_process_report" + "CVE-2019-9455": { + "cmt_msg": "media: videobuf2-v4l2: drop WARN_ON in vb2_warn_zero_bytesused()" }, - "CVE-2016-10723": { - "cmt_msg": "mm, oom: remove sleep from under oom_lock" + "CVE-2022-2978": { + "cmt_msg": "fs: fix UAF/GPF bug in nilfs_mdt_destroy" }, - "CVE-2021-3573": { - "cmt_msg": "Bluetooth: use correct lock to prevent UAF of hdev object" + "CVE-2019-9453": { + "cmt_msg": "f2fs: fix to avoid accessing xattr across the boundary" }, - "CVE-2020-25212": { - "cmt_msg": "nfs: Fix getxattr kernel panic and memory overflow" + "CVE-2023-20569": { + "cmt_msg": "x86/bugs: Increase the x86 bugs vector size to two u32s" }, - "CVE-2019-19036": { - "cmt_msg": "btrfs: Detect unbalanced tree with empty leaf before crashing btree operations" + "CVE-2023-46838": { + "cmt_msg": "xen-netback: don't produce zero-size SKB frags" }, - "CVE-2019-3459": { - "cmt_msg": "Bluetooth: Verify that l2cap_get_conf_opt provides large enough buffer" + "CVE-2019-9458": { + "cmt_msg": "media: v4l: event: Prevent freeing event subscriptions while accessed" }, - "CVE-2020-11494": { - "cmt_msg": "slcan: Don't transmit uninitialized stack data in padding" + "CVE-2023-3090": { + "cmt_msg": "ipvlan:Fix out-of-bounds caused by unclear skb->cb" }, - "CVE-2017-8797": { - "cmt_msg": "nfsd: fix undefined behavior in nfsd4_layout_verify" + "CVE-2023-45862": { + "cmt_msg": "USB: ene_usb6250: Allocate enough memory for full object" }, - "CVE-2020-0444": { - "cmt_msg": "audit: fix error handling in audit_data_to_entry()" + "CVE-2023-45863": { + "cmt_msg": "kobject: Fix slab-out-of-bounds in fill_kobj_path()" }, - "CVE-2018-10675": { - "cmt_msg": "mm/mempolicy: fix use after free when calling get_mempolicy" + "CVE-2020-25705": { + "cmt_msg": "icmp: randomize the global rate limiter" }, - "CVE-2017-16526": { - "cmt_msg": "uwb: properly check kthread_run return value" + "CVE-2023-52639": { + "cmt_msg": "KVM: s390: vsie: fix race during shadow creation" }, - "CVE-2017-16527": { - "cmt_msg": "ALSA: usb-audio: Kill stray URB at exiting" + "CVE-2023-52638": { + "cmt_msg": "can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock" }, - "CVE-2017-16525": { - "cmt_msg": "USB: serial: console: fix use-after-free after failed setup" + "CVE-2019-15239": { + "cmt_msg": "unknown" }, - "CVE-2022-1836": { - "cmt_msg": "floppy: disable FDRAWCMD by default" + "CVE-2017-15129": { + "cmt_msg": "net: Fix double free and memory corruption in get_net_ns_by_id()" }, - "CVE-2021-32078": { - "cmt_msg": "ARM: footbridge: remove personal server platform" + "CVE-2022-26373": { + "cmt_msg": "x86/speculation: Add RSB VM Exit protections" }, - "CVE-2022-30594": { - "cmt_msg": "ptrace: Check PTRACE_O_SUSPEND_SECCOMP permission on PTRACE_SEIZE" + "CVE-2023-52633": { + "cmt_msg": "um: time-travel: fix time corruption" }, - "CVE-2022-20148": { - "cmt_msg": "f2fs: fix UAF in f2fs_available_free_memory" + "CVE-2023-52632": { + "cmt_msg": "drm/amdkfd: Fix lock dependency warning with srcu" }, - "CVE-2017-16528": { - "cmt_msg": "ALSA: seq: Cancel pending autoload work at unbinding device" + "CVE-2017-9986": { + "cmt_msg": "sound: Retire OSS" }, - "CVE-2017-16529": { - "cmt_msg": "ALSA: usb-audio: Check out-of-bounds access by corrupted buffer descriptor" + "CVE-2017-9985": { + "cmt_msg": "ALSA: msnd: Optimize / harden DSP and MIDI loops" }, - "CVE-2019-11833": { - "cmt_msg": "ext4: zero out the unused memory region in the extent tree block" + "CVE-2017-9984": { + "cmt_msg": "ALSA: msnd: Optimize / harden DSP and MIDI loops" }, - "CVE-2021-38205": { - "cmt_msg": "net: xilinx_emaclite: Do not print real IOMEM pointer" + "CVE-2021-47135": { + "cmt_msg": "mt76: mt7921: fix possible AOOB issue in mt7921_mcu_tx_rate_report" }, - "CVE-2016-7039": { - "cmt_msg": "net: add recursion limit to GRO" + "CVE-2021-47136": { + "cmt_msg": "net: zero-initialize tc skb extension on allocation" }, - "CVE-2023-34256": { - "cmt_msg": "ext4: avoid a potential slab-out-of-bounds in ext4_group_desc_csum" + "CVE-2021-47137": { + "cmt_msg": "net: lantiq: fix memory corruption in RX ring" }, - "CVE-2020-0255": { - "cmt_msg": "selinux: properly handle multiple messages in selinux_netlink_send()" + "CVE-2021-47131": { + "cmt_msg": "net/tls: Fix use-after-free after the TLS device goes down and up" }, - "CVE-2016-6130": { - "cmt_msg": "s390/sclp_ctl: fix potential information leak with /dev/sclp" + "CVE-2021-47133": { + "cmt_msg": "HID: amd_sfh: Fix memory leak in amd_sfh_work" }, - "CVE-2019-2215": { - "cmt_msg": "ANDROID: binder: remove waitqueue when thread exits." + "CVE-2024-26675": { + "cmt_msg": "ppp_async: limit MRU to 64K" }, - "CVE-2021-3892": { - "cmt_msg": "" + "CVE-2023-0386": { + "cmt_msg": "ovl: fail on invalid uid/gid mapping at copy up" }, - "CVE-2021-38208": { - "cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect" + "CVE-2022-42896": { + "cmt_msg": "Bluetooth: L2CAP: Fix accepting connection request for invalid SPSM" }, - "CVE-2017-18232": { - "cmt_msg": "scsi: libsas: direct call probe and destruct" + "CVE-2022-42895": { + "cmt_msg": "Bluetooth: L2CAP: Fix attempting to access uninitialized memory" }, - "CVE-2019-2213": { - "cmt_msg": "binder: fix possible UAF when freeing buffer" + "CVE-2017-7618": { + "cmt_msg": "crypto: ahash - Fix EINPROGRESS notification callback" }, - "CVE-2020-25211": { - "cmt_msg": "netfilter: ctnetlink: add a range check for l3/l4 protonum" + "CVE-2022-48626": { + "cmt_msg": "moxart: fix potential use-after-free on remove path" }, - "CVE-2017-14140": { - "cmt_msg": "Sanitize 'move_pages()' permission checks" + "CVE-2022-48627": { + "cmt_msg": "vt: fix memory overlapping when deleting chars in the buffer" }, - "CVE-2020-26556": { - "cmt_msg": "" + "CVE-2022-48628": { + "cmt_msg": "ceph: drop messages from MDS when unmounting" }, - "CVE-2018-9518": { - "cmt_msg": "NFC: llcp: Limit size of SDP URI" + "CVE-2017-7616": { + "cmt_msg": "mm/mempolicy.c: fix error handling in set_mempolicy and mbind." }, - "CVE-2020-26555": { - "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical" + "CVE-2024-24859": { + "cmt_msg": "" }, - "CVE-2018-9517": { - "cmt_msg": "l2tp: pass tunnel pointer to ->session_create()" + "CVE-2017-1000112": { + "cmt_msg": "udp: consistently apply ufo or fragmentation" }, - "CVE-2018-9516": { - "cmt_msg": "HID: debug: check length before copy_to_user()" + "CVE-2017-1000111": { + "cmt_msg": "packet: fix tp_reserve race in packet_set_ring" }, - "CVE-2023-3397": { + "CVE-2024-24855": { + "cmt_msg": "scsi: lpfc: Fix a possible data race in lpfc_unregister_fcf_rescan()" + }, + "CVE-2024-24857": { "cmt_msg": "" }, - "CVE-2018-1128": { - "cmt_msg": "libceph: add authorizer challenge" + "CVE-2019-3892": { + "cmt_msg": "coredump: fix race condition between mmget_not_zero()/get_task_mm() and core dumping" }, - "CVE-2018-1129": { - "cmt_msg": "libceph: implement CEPHX_V2 calculation mode" + "CVE-2021-29265": { + "cmt_msg": "usbip: fix stub_dev usbip_sockfd_store() races leading to gpf" }, - "CVE-2018-1087": { - "cmt_msg": "kvm/x86: fix icebp instruction handling" + "CVE-2022-3545": { + "cmt_msg": "nfp: fix use-after-free in area_cache_get()" }, - "CVE-2022-26365": { - "cmt_msg": "xen/blkfront: fix leaking data in shared pages" + "CVE-2022-3542": { + "cmt_msg": "bnx2x: fix potential memory leak in bnx2x_tpa_stop()" }, - "CVE-2022-21125": { - "cmt_msg": "x86/speculation/mmio: Reuse SRBDS mitigation for SBDS" + "CVE-2018-16597": { + "cmt_msg": "ovl: modify ovl_permission() to do checks on two inodes" }, - "CVE-2018-1120": { - "cmt_msg": "proc: do not access cmdline nor environ from file-backed areas" + "CVE-2021-21781": { + "cmt_msg": "ARM: ensure the signal page contains defined contents" }, - "CVE-2018-1121": { - "cmt_msg": "" + "CVE-2023-1838": { + "cmt_msg": "Fix double fget() in vhost_net_set_backend()" }, - "CVE-2018-20856": { - "cmt_msg": "block: blk_init_allocated_queue() set q->fq as NULL in the fail case" + "CVE-2023-1382": { + "cmt_msg": "tipc: set con sock in tipc_conn_alloc" }, - "CVE-2023-52451": { - "cmt_msg": "powerpc/pseries/memhp: Fix access beyond end of drmem array" + "CVE-2018-14734": { + "cmt_msg": "infiniband: fix a possible use-after-free bug" + }, + "CVE-2018-8822": { + "cmt_msg": "staging: ncpfs: memory corruption in ncp_read_kernel()" + }, + "CVE-2023-6546": { + "cmt_msg": "tty: n_gsm: fix the UAF caused by race condition in gsm_cleanup_mux" }, - "CVE-2017-5754": { - "cmt_msg": "x86/cpufeatures: Add Intel feature bits for Speculation Control" + "CVE-2020-14390": { + "cmt_msg": "fbcon: remove soft scrollback code" }, - "CVE-2022-3061": { - "cmt_msg": "video: fbdev: i740fb: Error out if 'pixclock' equals zero" + "CVE-2021-45469": { + "cmt_msg": "f2fs: fix to do sanity check on last xattr entry in __f2fs_setxattr()" }, - "CVE-2016-10200": { - "cmt_msg": "l2tp: fix racy SOCK_ZAPPED flag check in l2tp_ip{,6}_bind()" + "CVE-2017-7541": { + "cmt_msg": "brcmfmac: fix possible buffer overflow in brcmf_cfg80211_mgmt_tx()" }, - "CVE-2017-5753": { - "cmt_msg": "x86/cpufeatures: Add X86_BUG_SPECTRE_V[12]" + "CVE-2017-7542": { + "cmt_msg": "ipv6: avoid overflow of offset in ip6_find_1stfragopt" }, - "CVE-2022-2961": { - "cmt_msg": "" + "CVE-2024-0584": { + "cmt_msg": "ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet" }, - "CVE-2022-20369": { - "cmt_msg": "media: v4l2-mem2mem: Apply DST_QUEUE_OFF_BASE on MMAP buffers across ioctls" + "CVE-2020-0465": { + "cmt_msg": "HID: core: Sanitize event code and type when mapping input" }, - "CVE-2024-1086": { - "cmt_msg": "netfilter: nf_tables: reject QUEUE/DROP verdict parameters" + "CVE-2020-0466": { + "cmt_msg": "do_epoll_ctl(): clean the failure exits up a bit" }, - "CVE-2022-32981": { - "cmt_msg": "powerpc/32: Fix overread/overwrite of thread_struct via ptrace" + "CVE-2017-15274": { + "cmt_msg": "KEYS: fix dereferencing NULL payload with nonzero length" }, - "CVE-2016-10208": { - "cmt_msg": "ext4: validate s_first_meta_bg at mount time" + "CVE-2024-0340": { + "cmt_msg": "vhost: use kzalloc() instead of kmalloc() followed by memset()" }, - "CVE-2018-16871": { - "cmt_msg": "nfsd: COPY and CLONE operations require the saved filehandle to be set" + "CVE-2019-19523": { + "cmt_msg": "USB: adutux: fix use-after-free on disconnect" }, - "CVE-2019-18680": { - "cmt_msg": "unknown" + "CVE-2019-11135": { + "cmt_msg": "x86/msr: Add the IA32_TSX_CTRL MSR" }, - "CVE-2019-19049": { - "cmt_msg": "of: unittest: fix memory leak in unittest_data_add" + "CVE-2021-27365": { + "cmt_msg": "scsi: iscsi: Ensure sysfs attributes are limited to PAGE_SIZE" }, - "CVE-2018-9568": { - "cmt_msg": "net: Set sk_prot_creator when cloning sockets to the right proto" + "CVE-2021-27364": { + "cmt_msg": "scsi: iscsi: Restrict sessions and handles to admin capabilities" }, - "CVE-2020-27784": { - "cmt_msg": "usb: gadget: function: printer: fix use-after-free in __lock_acquire" + "CVE-2021-27363": { + "cmt_msg": "scsi: iscsi: Restrict sessions and handles to admin capabilities" }, - "CVE-2018-13053": { - "cmt_msg": "alarmtimer: Prevent overflow for relative nanosleep" + "CVE-2021-20320": { + "cmt_msg": "s390/bpf: Fix optimizing out zero-extensions" }, - "CVE-2020-27786": { - "cmt_msg": "ALSA: rawmidi: Fix racy buffer resize under concurrent accesses" + "CVE-2021-20321": { + "cmt_msg": "ovl: fix missing negative dentry check in ovl_rename()" }, - "CVE-2019-14816": { - "cmt_msg": "mwifiex: Fix three heap overflow at parsing element in cfg80211_ap_settings" + "CVE-2017-18360": { + "cmt_msg": "USB: serial: io_ti: fix div-by-zero in set_termios" }, - "CVE-2019-14814": { - "cmt_msg": "mwifiex: Fix three heap overflow at parsing element in cfg80211_ap_settings" + "CVE-2017-5967": { + "cmt_msg": "time: Remove CONFIG_TIMER_STATS" }, - "CVE-2023-6240": { - "cmt_msg": "" + "CVE-2022-3169": { + "cmt_msg": "nvme: ensure subsystem reset is single threaded" }, - "CVE-2023-23559": { - "cmt_msg": "wifi: rndis_wlan: Prevent buffer overflow in rndis_query_oid" + "CVE-2019-2054": { + "cmt_msg": "arm/ptrace: run seccomp after ptrace" }, - "CVE-2020-10720": { - "cmt_msg": "net-gro: fix use-after-free read in napi_gro_frags()" + "CVE-2018-20976": { + "cmt_msg": "xfs: clear sb->s_fs_info on mount failure" }, - "CVE-2020-14351": { - "cmt_msg": "perf/core: Fix race in the perf_mmap_close() function" + "CVE-2023-22995": { + "cmt_msg": "usb: dwc3: dwc3-qcom: Add missing platform_device_put() in dwc3_qcom_acpi_register_core" }, - "CVE-2022-0382": { - "cmt_msg": "net ticp:fix a kernel-infoleak in __tipc_sendmsg()" + "CVE-2021-3542": { + "cmt_msg": "" }, - "CVE-2019-9456": { - "cmt_msg": "usb: usbmon: Read text within supplied buffer size" + "CVE-2017-16650": { + "cmt_msg": "net: qmi_wwan: fix divide by 0 on bad descriptors" }, - "CVE-2016-4440": { - "cmt_msg": "kvm:vmx: more complete state update on APICv on/off" + "CVE-2018-12929": { + "cmt_msg": "" }, - "CVE-2020-25672": { - "cmt_msg": "nfc: fix memory leak in llcp_sock_connect()" + "CVE-2018-12928": { + "cmt_msg": "" }, - "CVE-2019-9455": { - "cmt_msg": "media: videobuf2-v4l2: drop WARN_ON in vb2_warn_zero_bytesused()" + "CVE-2020-36310": { + "cmt_msg": "KVM: SVM: avoid infinite loop on NPF from bad address" }, - "CVE-2020-25670": { - "cmt_msg": "nfc: fix refcount leak in llcp_sock_bind()" + "CVE-2020-36313": { + "cmt_msg": "KVM: Fix out of range accesses to memslots" }, - "CVE-2020-25671": { - "cmt_msg": "nfc: fix refcount leak in llcp_sock_connect()" + "CVE-2020-35519": { + "cmt_msg": "net/x25: prevent a couple of overflows" }, - "CVE-2018-21008": { - "cmt_msg": "rsi: add fix for crash during assertions" + "CVE-2020-10708": { + "cmt_msg": "" }, - "CVE-2019-15223": { - "cmt_msg": "ALSA: line6: Assure canceling delayed work at disconnection" + "CVE-2018-5344": { + "cmt_msg": "loop: fix concurrent lo_open/lo_release" }, - "CVE-2019-15220": { - "cmt_msg": "p54usb: Fix race between disconnect and firmware loading" + "CVE-2017-12153": { + "cmt_msg": "nl80211: check for the required netlink attributes presence" }, - "CVE-2019-15221": { - "cmt_msg": "ALSA: line6: Fix write on zero-sized buffer" + "CVE-2017-12154": { + "cmt_msg": "kvm: nVMX: Don't allow L2 to access the hardware CR8" }, - "CVE-2019-19815": { - "cmt_msg": "f2fs: support swap file w/ DIO" + "CVE-2022-21499": { + "cmt_msg": "lockdown: also lock down previous kgdb use" }, - "CVE-2019-19814": { - "cmt_msg": "" + "CVE-2023-20593": { + "cmt_msg": "x86/cpu/amd: Add a Zenbleed fix" }, - "CVE-2020-29371": { - "cmt_msg": "romfs: fix uninitialized memory leak in romfs_dev_read()" + "CVE-2017-5549": { + "cmt_msg": "USB: serial: kl5kusb105: fix line-state error handling" }, - "CVE-2019-19816": { - "cmt_msg": "btrfs: inode: Verify inode mode to avoid NULL pointer dereference" + "CVE-2017-5547": { + "cmt_msg": "HID: corsair: fix DMA buffers on stack" }, - "CVE-2017-16939": { - "cmt_msg": "ipsec: Fix aborted xfrm policy dump crash" + "CVE-2022-2380": { + "cmt_msg": "video: fbdev: sm712fb: Fix crash in smtcfb_read()" }, - "CVE-2019-9453": { - "cmt_msg": "f2fs: fix to avoid accessing xattr across the boundary" + "CVE-2022-0850": { + "cmt_msg": "ext4: fix kernel infoleak via ext4_extent_header" }, - "CVE-2022-1016": { - "cmt_msg": "netfilter: nf_tables: initialize registers in nft_do_chain()" + "CVE-2019-19447": { + "cmt_msg": "ext4: work around deleting a file with i_nlink == 0 safely" }, - "CVE-2018-18710": { - "cmt_msg": "cdrom: fix improper type cast, which can leat to information leak." + "CVE-2021-3612": { + "cmt_msg": "Input: joydev - prevent potential read overflow in ioctl" }, - "CVE-2016-2188": { - "cmt_msg": "USB: iowarrior: fix NULL-deref at probe" + "CVE-2019-19448": { + "cmt_msg": "btrfs: only search for left_info if there is no right_info in try_merge_free_space" }, - "CVE-2022-1012": { - "cmt_msg": "secure_seq: use the 64 bits of the siphash for port offset calculation" + "CVE-2019-19449": { + "cmt_msg": "f2fs: fix to do sanity check on segment/section count" }, - "CVE-2023-31436": { - "cmt_msg": "net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg" + "CVE-2020-11725": { + "cmt_msg": "" }, - "CVE-2020-12114": { - "cmt_msg": "make struct mountpoint bear the dentry reference to mountpoint, not struct mount" + "CVE-2023-30456": { + "cmt_msg": "KVM: nVMX: add missing consistency checks for CR0 and CR4" }, - "CVE-2020-8649": { - "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region" + "CVE-2021-35477": { + "cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4" }, - "CVE-2023-3161": { - "cmt_msg": "fbcon: Check font dimension limits" + "CVE-2024-26758": { + "cmt_msg": "md: Don't ignore suspended array in md_check_recovery()" }, - "CVE-2020-12656": { - "cmt_msg": "sunrpc: check that domain table is empty at module unload." + "CVE-2024-26759": { + "cmt_msg": "mm/swap: fix race when skipping swapcache" }, - "CVE-2020-14356": { - "cmt_msg": "cgroup: fix cgroup_sk_alloc() for sk_clone_lock()" + "CVE-2022-1729": { + "cmt_msg": "perf: Fix sys_perf_event_open() race against self" }, - "CVE-2017-1000405": { - "cmt_msg": "mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d()" + "CVE-2024-26752": { + "cmt_msg": "l2tp: pass correct message length to ip6_append_data" }, - "CVE-2021-26930": { - "cmt_msg": "xen-blkback: fix error handling in xen_blkbk_map()" + "CVE-2024-26756": { + "cmt_msg": "md: Don't register sync_thread for reshape directly" }, - "CVE-2017-1000407": { - "cmt_msg": "KVM: VMX: remove I/O port 0x80 bypass on Intel hosts" + "CVE-2021-28038": { + "cmt_msg": "Xen/gnttab: handle p2m update errors on a per-slot basis" }, - "CVE-2021-26932": { - "cmt_msg": "Xen/x86: don't bail early from clear_foreign_p2m_mapping()" + "CVE-2020-27068": { + "cmt_msg": "cfg80211: add missing policy for NL80211_ATTR_STATUS_CODE" }, - "CVE-2024-25740": { - "cmt_msg": "" + "CVE-2022-23040": { + "cmt_msg": "xen/xenbus: don't let xenbus_grant_ring() remove grants in error case" }, - "CVE-2023-52456": { - "cmt_msg": "serial: imx: fix tx statemachine deadlock" + "CVE-2022-2964": { + "cmt_msg": "net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup" }, - "CVE-2023-3141": { - "cmt_msg": "memstick: r592: Fix UAF bug in r592_remove due to race condition" + "CVE-2024-26689": { + "cmt_msg": "ceph: prevent use-after-free in encode_cap_msg()" }, - "CVE-2023-37454": { + "CVE-2022-2961": { "cmt_msg": "" }, - "CVE-2016-9555": { - "cmt_msg": "sctp: validate chunk len before actually using it" + "CVE-2024-26686": { + "cmt_msg": "fs/proc: do_task_stat: use sig->stats_lock to gather the threads/children stats" }, - "CVE-2019-3892": { - "cmt_msg": "coredump: fix race condition between mmget_not_zero()/get_task_mm() and core dumping" + "CVE-2024-26687": { + "cmt_msg": "xen/events: close evtchn after mapping cleanup" }, - "CVE-2020-12352": { - "cmt_msg": "Bluetooth: A2MP: Fix not initializing all members" + "CVE-2023-3268": { + "cmt_msg": "relayfs: fix out-of-bounds access in relay_file_read" }, - "CVE-2020-12655": { - "cmt_msg": "xfs: add agf freeblocks verify in xfs_agf_verify" + "CVE-2023-45871": { + "cmt_msg": "igb: set max size RX buffer when store bad packet is enabled" }, - "CVE-2021-43976": { - "cmt_msg": "mwifiex: Fix skb_over_panic in mwifiex_usb_recv()" + "CVE-2020-12114": { + "cmt_msg": "make struct mountpoint bear the dentry reference to mountpoint, not struct mount" }, - "CVE-2022-0494": { - "cmt_msg": "block-map: add __GFP_ZERO flag for alloc_page in function bio_copy_kern" + "CVE-2021-4218": { + "cmt_msg": "sysctl: pass kernel pointers to ->proc_handler" }, - "CVE-2023-2269": { - "cmt_msg": "dm ioctl: fix nested locking in table_clear() to remove deadlock concern" + "CVE-2023-0266": { + "cmt_msg": "ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF" }, - "CVE-2020-26088": { - "cmt_msg": "net/nfc/rawsock.c: add CAP_NET_RAW check." + "CVE-2022-23042": { + "cmt_msg": "xen/netfront: react properly to failing gnttab_end_foreign_access_ref()" }, - "CVE-2022-3524": { - "cmt_msg": "tcp/udp: Fix memory leak in ipv6_renew_options()." + "CVE-2019-10142": { + "cmt_msg": "drivers/virt/fsl_hypervisor.c: prevent integer overflow in ioctl" }, - "CVE-2022-3523": { - "cmt_msg": "mm/memory.c: fix race when faulting a device private page" + "CVE-2023-52640": { + "cmt_msg": "fs/ntfs3: Fix oob in ntfs_listxattr" }, - "CVE-2022-3522": { - "cmt_msg": "mm/hugetlb: use hugetlb_pte_stable in migration race check" + "CVE-2023-52641": { + "cmt_msg": "fs/ntfs3: Add NULL ptr dereference checking at the end of attr_allocate_frame()" }, - "CVE-2008-2544": { + "CVE-2021-0399": { "cmt_msg": "" }, - "CVE-2021-3178": { - "cmt_msg": "nfsd4: readdirplus shouldn't return parent of export" + "CVE-2023-52488": { + "cmt_msg": "serial: sc16is7xx: convert from _raw_ to _noinc_ regmap functions for FIFO" }, - "CVE-2022-2318": { - "cmt_msg": "net: rose: fix UAF bugs caused by timer handler" + "CVE-2023-52489": { + "cmt_msg": "mm/sparsemem: fix race in accessing memory_section->usage" }, - "CVE-2022-42703": { - "cmt_msg": "mm/rmap: Fix anon_vma->degree ambiguity leading to double-reuse" + "CVE-2023-52484": { + "cmt_msg": "iommu/arm-smmu-v3: Fix soft lockup triggered by arm_smmu_mm_invalidate_range" }, - "CVE-2018-7755": { - "cmt_msg": "floppy: Do not copy a kernel pointer to user memory in FDGETPRM ioctl" + "CVE-2020-2732": { + "cmt_msg": "KVM: nVMX: Don't emulate instructions in guest mode" }, - "CVE-2017-7346": { - "cmt_msg": "drm/vmwgfx: limit the number of mip levels in vmw_gb_surface_define_ioctl()" + "CVE-2023-52486": { + "cmt_msg": "drm: Don't unref the same fb many times by mistake due to deadlock handling" }, - "CVE-2018-7757": { - "cmt_msg": "scsi: libsas: fix memory leak in sas_smp_get_phy_events()" + "CVE-2023-52480": { + "cmt_msg": "ksmbd: fix race condition between session lookup and expire" }, - "CVE-2019-11815": { - "cmt_msg": "net: rds: force to destroy connection if t_sock is NULL in rds_tcp_kill_sock()." + "CVE-2023-52481": { + "cmt_msg": "arm64: errata: Add Cortex-A520 speculative unprivileged load workaround" }, - "CVE-2007-3719": { - "cmt_msg": "" + "CVE-2023-52482": { + "cmt_msg": "x86/srso: Add SRSO mitigation for Hygon processors" }, - "CVE-2023-3863": { - "cmt_msg": "net: nfc: Fix use-after-free caused by nfc_llcp_find_local" + "CVE-2023-4128": { + "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free" }, - "CVE-2023-0590": { - "cmt_msg": "net: sched: fix race condition in qdisc_graft()" + "CVE-2021-47128": { + "cmt_msg": "bpf, lockdown, audit: Fix buggy SELinux lockdown permission checks" }, - "CVE-2022-29900": { - "cmt_msg": "x86/kvm/vmx: Make noinstr clean" + "CVE-2017-6214": { + "cmt_msg": "tcp: avoid infinite loop in tcp_splice_read()" }, - "CVE-2022-4095": { - "cmt_msg": "staging: rtl8712: fix use after free bugs" + "CVE-2017-8065": { + "cmt_msg": "crypto: ccm - move cbcmac input off the stack" }, - "CVE-2017-10911": { - "cmt_msg": "xen-blkback: don't leak stack data via response ring" + "CVE-2017-8064": { + "cmt_msg": "[media] dvb-usb-v2: avoid use-after-free" }, - "CVE-2023-34255": { - "cmt_msg": "xfs: verify buffer contents when we skip log replay" + "CVE-2021-47122": { + "cmt_msg": "net: caif: fix memory leak in caif_device_notify" }, - "CVE-2022-45919": { - "cmt_msg": "media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221" + "CVE-2021-47121": { + "cmt_msg": "net: caif: fix memory leak in cfusbl_device_notify" }, - "CVE-2019-19319": { - "cmt_msg": "ext4: protect journal inode's blocks using block_validity" + "CVE-2021-47125": { + "cmt_msg": "sch_htb: fix refcount leak in htb_parent_to_leaf_offload" }, - "CVE-2023-2248": { - "cmt_msg": "net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg" + "CVE-2021-47124": { + "cmt_msg": "io_uring: fix link timeout refs" }, - "CVE-2023-30772": { - "cmt_msg": "power: supply: da9150: Fix use after free bug in da9150_charger_remove due to race condition" + "CVE-2019-15118": { + "cmt_msg": "ALSA: usb-audio: Fix a stack buffer overflow bug in check_input_term" }, - "CVE-2017-18017": { - "cmt_msg": "netfilter: xt_TCPMSS: add more sanity tests on tcph->doff" + "CVE-2019-12818": { + "cmt_msg": "net: nfc: Fix NULL dereference on nfc_llcp_build_tlv fails" }, - "CVE-2022-24958": { - "cmt_msg": "usb: gadget: don't release an existing dev->buf" + "CVE-2019-12819": { + "cmt_msg": "mdio_bus: Fix use-after-free on device_register fails" }, - "CVE-2023-1611": { - "cmt_msg": "btrfs: fix race between quota disable and quota assign ioctls" + "CVE-2023-0394": { + "cmt_msg": "ipv6: raw: Deduct extension header length in rawv6_push_pending_frames" }, - "CVE-2021-3772": { - "cmt_msg": "sctp: use init_tag from inithdr for ABORT chunk" + "CVE-2019-19332": { + "cmt_msg": "KVM: x86: fix out-of-bounds write in KVM_GET_EMULATED_CPUID (CVE-2019-19332)" }, - "CVE-2021-3679": { - "cmt_msg": "tracing: Fix bug in rb_per_cpu_empty() that might cause deadloop." + "CVE-2019-15117": { + "cmt_msg": "ALSA: usb-audio: Fix an OOB bug in parse_audio_mixer_unit" }, - "CVE-2021-37159": { - "cmt_msg": "usb: hso: fix error handling code of hso_create_net_device" + "CVE-2022-25258": { + "cmt_msg": "USB: gadget: validate interface OS descriptor requests" }, - "CVE-2016-8399": { - "cmt_msg": "net: ping: check minimum size on ICMP header length" + "CVE-2020-3702": { + "cmt_msg": "ath: Use safer key clearing with key cache entries" }, - "CVE-2022-2586": { - "cmt_msg": "netfilter: nf_tables: do not allow SET_ID to refer to another table" + "CVE-2023-3117": { + "cmt_msg": "netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE" }, - "CVE-2016-7042": { - "cmt_msg": "KEYS: Fix short sprintf buffer in /proc/keys show function" + "CVE-2023-3111": { + "cmt_msg": "btrfs: unset reloc control if transaction commit fails in prepare_to_relocate()" }, - "CVE-2021-28715": { - "cmt_msg": "xen/netback: don't queue unlimited number of packages" + "CVE-2019-3882": { + "cmt_msg": "vfio/type1: Limit DMA mappings per container" }, - "CVE-2021-28714": { - "cmt_msg": "xen/netback: fix rx queue stall detection" + "CVE-2024-24861": { + "cmt_msg": "media: xc4000: Fix atomicity violation in xc4000_get_frequency" }, - "CVE-2021-28713": { - "cmt_msg": "xen/console: harden hvc_xen against event channel storms" + "CVE-2019-18675": { + "cmt_msg": "mmap: introduce sane default mmap limits" }, - "CVE-2018-5873": { - "cmt_msg": "nsfs: mark dentry with DCACHE_RCUACCESS" + "CVE-2024-24864": { + "cmt_msg": "" }, - "CVE-2017-18261": { - "cmt_msg": "clocksource/drivers/arm_arch_timer: Avoid infinite recursion when ftrace is enabled" + "CVE-2017-9605": { + "cmt_msg": "drm/vmwgfx: Make sure backup_handle is always valid" }, - "CVE-2021-4157": { - "cmt_msg": "pNFS/flexfiles: fix incorrect size check in decode_nfs_fh()" + "CVE-2022-36946": { + "cmt_msg": "netfilter: nf_queue: do not allow packet truncation below transport header offset" }, - "CVE-2022-2991": { - "cmt_msg": "remove the lightnvm subsystem" + "CVE-2016-4482": { + "cmt_msg": "USB: usbfs: fix potential infoleak in devio" }, - "CVE-2022-3621": { - "cmt_msg": "nilfs2: fix NULL pointer dereference at nilfs_bmap_lookup_at_level()" + "CVE-2018-19824": { + "cmt_msg": "ALSA: usb-audio: Fix UAF decrement if card has no live interfaces in card.c" }, - "CVE-2017-11473": { - "cmt_msg": "x86/acpi: Prevent out of bound access caused by broken ACPI tables" + "CVE-2022-21166": { + "cmt_msg": "x86/speculation/mmio: Enable CPU Fill buffer clearing on idle" }, - "CVE-2017-11472": { - "cmt_msg": "ACPICA: Namespace: fix operand cache leak" + "CVE-2016-9191": { + "cmt_msg": "sysctl: Drop reference added by grab_header in proc_sys_readdir" }, - "CVE-2022-3624": { - "cmt_msg": "bonding: fix reference count leak in balance-alb mode" + "CVE-2021-29650": { + "cmt_msg": "netfilter: x_tables: Use correct memory barriers." }, - "CVE-2016-9120": { - "cmt_msg": "staging/android/ion : fix a race condition in the ion driver" + "CVE-2018-20169": { + "cmt_msg": "USB: check usb_get_extra_descriptor for proper size" }, - "CVE-2021-39657": { - "cmt_msg": "scsi: ufs: Correct the LUN used in eh_device_reset_handler() callback" + "CVE-2022-28356": { + "cmt_msg": "llc: fix netdevice reference leaks in llc_ui_bind()" }, - "CVE-2021-3669": { - "cmt_msg": "ipc: replace costly bailout check in sysvipc_find_ipc()" + "CVE-2018-5750": { + "cmt_msg": "ACPI: sbshc: remove raw pointer from printk() message" }, - "CVE-2019-18885": { - "cmt_msg": "btrfs: merge btrfs_find_device and find_device" + "CVE-2022-20166": { + "cmt_msg": "drivers core: Use sysfs_emit and sysfs_emit_at for show(device *...) functions" }, - "CVE-2017-7889": { - "cmt_msg": "mm: Tighten x86 /dev/mem with zeroing reads" + "CVE-2019-10220": { + "cmt_msg": "Convert filldir[64]() from __put_user() to unsafe_put_user()" }, - "CVE-2019-12378": { - "cmt_msg": "ipv6_sockglue: Fix a missing-check bug in ip6_ra_control()" + "CVE-2021-44879": { + "cmt_msg": "f2fs: fix to do sanity check on inode type during garbage collection" }, - "CVE-2019-11091": { - "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" + "CVE-2020-9383": { + "cmt_msg": "floppy: check FDC index for errors before assigning it" }, - "CVE-2022-3239": { - "cmt_msg": "media: em28xx: initialize refcount before kref_get" + "CVE-2017-5970": { + "cmt_msg": "ipv4: keep skb->dst around in presence of IP options" }, - "CVE-2022-4543": { - "cmt_msg": "" + "CVE-2023-1513": { + "cmt_msg": "kvm: initialize all of the kvm_debugregs structure before sending it to userspace" }, - "CVE-2019-18660": { - "cmt_msg": "powerpc/book3s64: Fix link stack flush on context switch" + "CVE-2021-26401": { + "cmt_msg": "x86/speculation: Use generic retpoline by default on AMD" }, - "CVE-2023-4921": { - "cmt_msg": "net: sched: sch_qfq: Fix UAF in qfq_dequeue()" + "CVE-2021-3847": { + "cmt_msg": "" }, - "CVE-2022-3202": { - "cmt_msg": "jfs: prevent NULL deref in diFree" + "CVE-2019-9445": { + "cmt_msg": "f2fs: check if file namelen exceeds max value" }, - "CVE-2017-15649": { - "cmt_msg": "packet: in packet_do_bind, test fanout with bind_lock held" + "CVE-2019-20934": { + "cmt_msg": "sched/fair: Don't free p->numa_faults with concurrent readers" }, - "CVE-2017-11089": { - "cmt_msg": "cfg80211: Define nla_policy for NL80211_ATTR_LOCAL_MESH_POWER_MODE" + "CVE-2011-4916": { + "cmt_msg": "" }, - "CVE-2023-1829": { - "cmt_msg": "net/sched: Retire tcindex classifier" + "CVE-2023-23039": { + "cmt_msg": "" }, - "CVE-2019-18282": { - "cmt_msg": "net/flow_dissector: switch to siphash" + "CVE-2017-16646": { + "cmt_msg": "media: dib0700: fix invalid dvb_detach argument" }, - "CVE-2021-34981": { - "cmt_msg": "Bluetooth: cmtp: fix file refcount when cmtp_attach_device fails" + "CVE-2017-16645": { + "cmt_msg": "Input: ims-psu - check if CDC union descriptor is sane" }, - "CVE-2023-1670": { - "cmt_msg": "xirc2ps_cs: Fix use after free bug in xirc2ps_detach" + "CVE-2017-16643": { + "cmt_msg": "Input: gtco - fix potential out-of-bound access" }, - "CVE-2023-4881": { - "cmt_msg": "netfilter: nftables: exthdr: fix 4-byte stack OOB write" + "CVE-2019-5489": { + "cmt_msg": "Change mincore() to count \"mapped\" pages rather than \"cached\" pages" }, - "CVE-2017-14489": { - "cmt_msg": "scsi: scsi_transport_iscsi: fix the issue that iscsi_if_rx doesn't parse nlmsg properly" + "CVE-2017-16649": { + "cmt_msg": "net: cdc_ether: fix divide by 0 on bad descriptors" }, - "CVE-2023-6915": { - "cmt_msg": "ida: Fix crash in ida_free when the bitmap is empty" + "CVE-2017-16648": { + "cmt_msg": "dvb_frontend: don't use-after-free the frontend struct" }, - "CVE-2016-5829": { - "cmt_msg": "HID: hiddev: validate num_values for HIDIOCGUSAGES, HIDIOCSUSAGES commands" + "CVE-2020-36322": { + "cmt_msg": "fuse: fix bad inode" }, - "CVE-2016-5828": { - "cmt_msg": "powerpc/tm: Always reclaim in start_thread() for exec() class syscalls" + "CVE-2020-10711": { + "cmt_msg": "netlabel: cope with NULL catmap" }, - "CVE-2018-9422": { - "cmt_msg": "futex: Remove requirement for lock_page() in get_futex_key()" + "CVE-2020-35508": { + "cmt_msg": "fork: fix copy_process(CLONE_PARENT) race with the exiting ->real_parent" }, - "CVE-2013-7445": { + "CVE-2020-35501": { "cmt_msg": "" }, - "CVE-2016-9604": { - "cmt_msg": "KEYS: Disallow keyrings beginning with '.' to be joined as session keyrings" + "CVE-2021-45095": { + "cmt_msg": "phonet: refcount leak in pep_sock_accep" }, - "CVE-2022-3646": { - "cmt_msg": "nilfs2: fix leak of nilfs_root in case of writer thread creation failure" + "CVE-2024-26685": { + "cmt_msg": "nilfs2: fix potential bug in end_buffer_async_write" }, - "CVE-2022-28390": { - "cmt_msg": "can: ems_usb: ems_usb_start_xmit(): fix double dev_kfree_skb() in error path" + "CVE-2021-32399": { + "cmt_msg": "bluetooth: eliminate the potential race condition when removing the HCI controller" }, - "CVE-2019-15292": { - "cmt_msg": "appletalk: Fix use-after-free in atalk_proc_exit" + "CVE-2017-1000410": { + "cmt_msg": "Bluetooth: Prevent stack info leak from the EFS element." }, - "CVE-2020-12652": { - "cmt_msg": "scsi: mptfusion: Fix double fetch bug in ioctl" + "CVE-2022-32250": { + "cmt_msg": "netfilter: nf_tables: disallow non-stateful expression in sets earlier" }, - "CVE-2024-25741": { - "cmt_msg": "" + "CVE-2016-8650": { + "cmt_msg": "mpi: Fix NULL ptr dereference in mpi_powm() " }, - "CVE-2017-14340": { - "cmt_msg": "xfs: XFS_IS_REALTIME_INODE() should be false if no rt device present" + "CVE-2017-5551": { + "cmt_msg": "tmpfs: clear S_ISGID when setting posix ACLs" }, - "CVE-2019-15217": { - "cmt_msg": "media: usb:zr364xx:Fix KASAN:null-ptr-deref Read in zr364xx_vidioc_querycap" + "CVE-2021-28688": { + "cmt_msg": "xen-blkback: don't leak persistent grants from xen_blkbk_map()" }, - "CVE-2022-26966": { - "cmt_msg": "sr9700: sanity check for packet length" + "CVE-2018-10878": { + "cmt_msg": "ext4: always check block group bounds in ext4_init_block_bitmap()" }, - "CVE-2019-19535": { - "cmt_msg": "can: peak_usb: pcan_usb_fd: Fix info-leaks to USB devices" + "CVE-2019-12379": { + "cmt_msg": "consolemap: Fix a memory leaking bug in drivers/tty/vt/consolemap.c" }, - "CVE-2022-38096": { - "cmt_msg": "" + "CVE-2019-12378": { + "cmt_msg": "ipv6_sockglue: Fix a missing-check bug in ip6_ra_control()" }, - "CVE-2021-34693": { - "cmt_msg": "can: bcm: fix infoleak in struct bcm_msg_head" + "CVE-2016-6213": { + "cmt_msg": "mnt: Add a per mount namespace limit on the number of mounts" }, - "CVE-2018-6554": { - "cmt_msg": "staging: irda: remove the irda network stack and drivers" + "CVE-2017-7895": { + "cmt_msg": "nfsd: stricter decoding of write-like NFSv2/v3 ops" }, - "CVE-2020-14381": { - "cmt_msg": "futex: Fix inode life-time issue" + "CVE-2020-26145": { + "cmt_msg": "ath10k: drop fragments with multicast DA for PCIe" }, - "CVE-2023-30456": { - "cmt_msg": "KVM: nVMX: add missing consistency checks for CR0 and CR4" + "CVE-2017-13216": { + "cmt_msg": "staging: android: ashmem: fix a race condition in ASHMEM_SET_SIZE ioctl" }, - "CVE-2019-19768": { - "cmt_msg": "blktrace: Protect q->blk_trace with RCU" + "CVE-2020-26147": { + "cmt_msg": "mac80211: assure all fragments are encrypted" }, - "CVE-2022-3303": { - "cmt_msg": "ALSA: pcm: oss: Fix race at SNDCTL_DSP_SYNC" + "CVE-2020-26141": { + "cmt_msg": "ath10k: Fix TKIP Michael MIC verification for PCIe" }, - "CVE-2019-19039": { - "cmt_msg": "btrfs: Don't submit any btree write bio if the fs has errors" + "CVE-2020-26140": { + "cmt_msg": "" }, - "CVE-2017-5715": { - "cmt_msg": "x86/cpufeatures: Add X86_BUG_SPECTRE_V[12]" + "CVE-2020-26143": { + "cmt_msg": "" }, - "CVE-2022-20141": { - "cmt_msg": "igmp: Add ip_mc_list lock in ip_check_mc_rcu" + "CVE-2020-26142": { + "cmt_msg": "" }, - "CVE-2023-23455": { - "cmt_msg": "net: sched: atm: dont intepret cls results when asked to drop" + "CVE-2019-17053": { + "cmt_msg": "ieee802154: enforce CAP_NET_RAW for raw sockets" }, - "CVE-2023-23454": { - "cmt_msg": "net: sched: cbq: dont intepret cls results when asked to drop" + "CVE-2019-17052": { + "cmt_msg": "ax25: enforce CAP_NET_RAW for raw sockets" }, - "CVE-2016-8630": { - "cmt_msg": "kvm: x86: Check memopp before dereference (CVE-2016-8630)" + "CVE-2017-14497": { + "cmt_msg": "packet: Don't write vnet header beyond end of buffer" }, - "CVE-2016-8633": { - "cmt_msg": "firewire: net: guard against rx buffer overflows" + "CVE-2019-17056": { + "cmt_msg": "nfc: enforce CAP_NET_RAW for raw sockets" }, - "CVE-2016-8632": { - "cmt_msg": "tipc: check minimum bearer MTU" + "CVE-2019-17055": { + "cmt_msg": "mISDN: enforce CAP_NET_RAW for raw sockets" }, - "CVE-2018-3620": { - "cmt_msg": "x86/microcode: Allow late microcode loading with SMT disabled" + "CVE-2019-17054": { + "cmt_msg": "appletalk: enforce CAP_NET_RAW for raw sockets" }, - "CVE-2023-6932": { - "cmt_msg": "ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet" + "CVE-2024-26745": { + "cmt_msg": "powerpc/pseries/iommu: IOMMU table is not initialized for kdump over SR-IOV" }, - "CVE-2019-3460": { - "cmt_msg": "Bluetooth: Check L2CAP option sizes returned from l2cap_get_conf_opt" + "CVE-2024-26744": { + "cmt_msg": "RDMA/srpt: Support specifying the srpt_service_guid parameter" }, - "CVE-2018-8781": { - "cmt_msg": "drm: udl: Properly check framebuffer mmap offsets" + "CVE-2024-26743": { + "cmt_msg": "RDMA/qedr: Fix qedr_create_user_qp error flow" }, - "CVE-2021-29155": { - "cmt_msg": "bpf: Use correct permission flag for mixed signed bounds arithmetic" + "CVE-2020-29661": { + "cmt_msg": "tty: Fix ->pgrp locking in tiocspgrp()" }, - "CVE-2024-22386": { - "cmt_msg": "" + "CVE-2020-29660": { + "cmt_msg": "tty: Fix ->session locking" }, - "CVE-2021-33631": { - "cmt_msg": "ext4: fix kernel BUG in 'ext4_write_inline_data_end()'" + "CVE-2022-1734": { + "cmt_msg": "nfc: nfcmrvl: main: reorder destructive operations in nfcmrvl_nci_unregister_dev to avoid bugs" }, - "CVE-2019-15916": { - "cmt_msg": "net-sysfs: Fix mem leak in netdev_register_kobject" + "CVE-2024-26748": { + "cmt_msg": "usb: cdns3: fix memory double free when handle zero packet" }, - "CVE-2019-15917": { - "cmt_msg": "Bluetooth: hci_ldisc: Postpone HCI_UART_PROTO_READY bit set in hci_uart_set_proto()" + "CVE-2023-28772": { + "cmt_msg": "seq_buf: Fix overflow in seq_buf_putmem_hex()" }, - "CVE-2017-18344": { - "cmt_msg": "posix-timer: Properly check sigevent->sigev_notify" + "CVE-2024-26699": { + "cmt_msg": "drm/amd/display: Fix array-index-out-of-bounds in dcn35_clkmgr" }, - "CVE-2018-6412": { - "cmt_msg": "fbdev: Fixing arbitrary kernel leak in case FBIOGETCMAP_SPARC in sbusfb_ioctl_helper()." + "CVE-2024-26691": { + "cmt_msg": "KVM: arm64: Fix circular locking dependency" }, - "CVE-2017-15265": { - "cmt_msg": "ALSA: seq: Fix use-after-free at creating a port" + "CVE-2024-26697": { + "cmt_msg": "nilfs2: fix data corruption in dsync block recovery for small block sizes" }, - "CVE-2021-27363": { - "cmt_msg": "scsi: iscsi: Restrict sessions and handles to admin capabilities" + "CVE-2024-26696": { + "cmt_msg": "nilfs2: fix hang in nilfs_lookup_dirty_data_buffers()" }, - "CVE-2020-12362": { - "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" + "CVE-2019-15927": { + "cmt_msg": "ALSA: usb-audio: Avoid access before bLength check in build_audio_procunit()" }, - "CVE-2020-12363": { - "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" + "CVE-2019-15926": { + "cmt_msg": "ath6kl: add some bounds checking" }, - "CVE-2019-12881": { - "cmt_msg": "drm/i915/userptr: reject zero user_size" + "CVE-2021-38160": { + "cmt_msg": "virtio_console: Assure used length from device is limited" }, - "CVE-2022-4129": { - "cmt_msg": "l2tp: Serialize access to sk_user_data with sk_callback_lock" + "CVE-2019-15219": { + "cmt_msg": "USB: sisusbvga: fix oops in error path of sisusb_probe" }, - "CVE-2023-3117": { - "cmt_msg": "netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE" + "CVE-2019-15218": { + "cmt_msg": "media: usb: siano: Fix general protection fault in smsusb" }, - "CVE-2018-1000004": { - "cmt_msg": "ALSA: seq: Make ioctls race-free" + "CVE-2005-3660": { + "cmt_msg": "" }, - "CVE-2018-18690": { - "cmt_msg": "xfs: don't fail when converting shortform attr to long form during ATTR_REPLACE" + "CVE-2017-14106": { + "cmt_msg": "tcp: initialize rcv_mss to TCP_MIN_MSS instead of 0" }, - "CVE-2022-28388": { - "cmt_msg": "can: usb_8dev: usb_8dev_start_xmit(): fix double dev_kfree_skb() in error path" + "CVE-2019-15212": { + "cmt_msg": "USB: rio500: refuse more than one device at a time" }, - "CVE-2017-0627": { - "cmt_msg": "media: uvcvideo: Prevent heap overflow when accessing mapped controls" + "CVE-2019-15211": { + "cmt_msg": "media: radio-raremono: change devm_k*alloc to k*alloc" }, - "CVE-2020-36558": { - "cmt_msg": "vt: vt_ioctl: fix race in VT_RESIZEX" + "CVE-2019-15217": { + "cmt_msg": "media: usb:zr364xx:Fix KASAN:null-ptr-deref Read in zr364xx_vidioc_querycap" }, - "CVE-2016-7915": { - "cmt_msg": "HID: core: prevent out-of-bound readings" + "CVE-2019-15216": { + "cmt_msg": "USB: yurex: Fix protection fault after device removal" }, - "CVE-2021-3896": { - "cmt_msg": "isdn: cpai: check ctr->cnr to avoid array index out of bound" + "CVE-2017-1000380": { + "cmt_msg": "ALSA: timer: Fix race between read and ioctl" }, - "CVE-2021-4002": { - "cmt_msg": "hugetlbfs: flush TLBs correctly after huge_pmd_unshare" + "CVE-2019-15214": { + "cmt_msg": "ALSA: core: Fix card races between register and disconnect" }, - "CVE-2023-26545": { - "cmt_msg": "net: mpls: fix stale pointer if allocation fails during device rename" + "CVE-2019-19922": { + "cmt_msg": "sched/fair: Fix low cpu usage with high throttling by removing expiration of cpu-local slices" }, - "CVE-2016-7911": { - "cmt_msg": "block: fix use-after-free in sys_ioprio_get()" + "CVE-2019-19927": { + "cmt_msg": "drm/ttm: fix incrementing the page pointer for huge pages" }, - "CVE-2016-7910": { - "cmt_msg": "block: fix use-after-free in seq file" + "CVE-2017-11176": { + "cmt_msg": "mqueue: fix a use-after-free in sys_mq_notify()" }, - "CVE-2016-7913": { - "cmt_msg": "[media] xc2028: avoid use after free" + "CVE-2023-52498": { + "cmt_msg": "PM: sleep: Fix possible deadlocks in core system-wide PM code" }, - "CVE-2021-38204": { - "cmt_msg": "usb: max-3421: Prevent corruption of freed memory" + "CVE-2022-2318": { + "cmt_msg": "net: rose: fix UAF bugs caused by timer handler" }, - "CVE-2022-34918": { - "cmt_msg": "netfilter: nf_tables: stricter validation of element data" + "CVE-2023-3611": { + "cmt_msg": "net/sched: sch_qfq: account for stab overhead in qfq_enqueue" }, - "CVE-2018-20961": { - "cmt_msg": "USB: gadget: f_midi: fixing a possible double-free in f_midi" + "CVE-2023-4132": { + "cmt_msg": "media: usb: siano: Fix warning due to null work_func_t function pointer" }, - "CVE-2019-20811": { - "cmt_msg": "net-sysfs: call dev_hold if kobject_init_and_add success" + "CVE-2020-26560": { + "cmt_msg": "" }, - "CVE-2019-20810": { - "cmt_msg": "media: go7007: fix a miss of snd_card_free" + "CVE-2023-4134": { + "cmt_msg": "Input: cyttsp4_core - change del_timer_sync() to timer_shutdown_sync()" }, - "CVE-2019-20812": { - "cmt_msg": "af_packet: set defaule value for tmo" + "CVE-2017-9077": { + "cmt_msg": "ipv6/dccp: do not inherit ipv6_mc_list from parent" }, - "CVE-2023-1990": { - "cmt_msg": "nfc: st-nci: Fix use after free bug in ndlc_remove due to race condition" + "CVE-2017-9076": { + "cmt_msg": "ipv6/dccp: do not inherit ipv6_mc_list from parent" }, - "CVE-2019-19530": { - "cmt_msg": "usb: cdc-acm: make sure a refcount is taken early enough" + "CVE-2017-9075": { + "cmt_msg": "sctp: do not inherit ipv6_{mc|ac|fl}_list from parent" }, - "CVE-2023-6040": { - "cmt_msg": "netfilter: nf_tables: Reject tables of unsupported family" + "CVE-2017-9074": { + "cmt_msg": "ipv6: Prevent overrun when parsing v6 header options" }, - "CVE-2018-5391": { - "cmt_msg": "ip: discard IPv4 datagrams with overlapping segments." + "CVE-2022-20572": { + "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag" }, - "CVE-2022-26373": { - "cmt_msg": "x86/speculation: Add RSB VM Exit protections" + "CVE-2022-42703": { + "cmt_msg": "mm/rmap: Fix anon_vma->degree ambiguity leading to double-reuse" }, - "CVE-2018-5995": { - "cmt_msg": "printk: hash addresses printed with %p" + "CVE-2021-4083": { + "cmt_msg": "fget: check that the fd still exists after getting a ref to it" }, - "CVE-2018-18386": { - "cmt_msg": "n_tty: fix EXTPROC vs ICANON interaction with TIOCINQ (aka FIONREAD)" + "CVE-2023-33288": { + "cmt_msg": "power: supply: bq24190: Fix use after free bug in bq24190_remove due to race condition" }, - "CVE-2019-15291": { - "cmt_msg": "media: b2c2-flexcop-usb: add sanity checking" + "CVE-2017-1000251": { + "cmt_msg": "Bluetooth: Properly check L2CAP config option output buffer length" }, - "CVE-2019-15290": { - "cmt_msg": "" + "CVE-2017-1000252": { + "cmt_msg": "KVM: VMX: Do not BUG() on out-of-bounds guest IRQ" }, - "CVE-2023-3212": { - "cmt_msg": "gfs2: Don't deref jdesc in evict" + "CVE-2022-29901": { + "cmt_msg": "x86/kvm/vmx: Make noinstr clean" }, - "CVE-2024-23848": { - "cmt_msg": "" + "CVE-2023-52485": { + "cmt_msg": "drm/amd/display: Wake DMCUB before sending a command" }, - "CVE-2019-16232": { - "cmt_msg": "libertas: fix a potential NULL pointer dereference" + "CVE-2023-3106": { + "cmt_msg": "xfrm: fix crash in XFRM_MSG_GETSA netlink handler" }, - "CVE-2022-24448": { - "cmt_msg": "NFSv4: Handle case where the lookup of a directory fails" + "CVE-2018-20511": { + "cmt_msg": "net/appletalk: fix minor pointer leak to userspace in SIOCFINDIPDDPRT" }, - "CVE-2018-7273": { - "cmt_msg": "printk: hash addresses printed with %p" + "CVE-2018-20510": { + "cmt_msg": "binder: replace \"%p\" with \"%pK\"" }, - "CVE-2023-52444": { - "cmt_msg": "f2fs: fix to avoid dirent corruption" + "CVE-2022-3567": { + "cmt_msg": "ipv6: Fix data races around sk->sk_prot." }, - "CVE-2022-0617": { - "cmt_msg": "udf: Fix NULL ptr deref when converting from inline format" + "CVE-2022-3566": { + "cmt_msg": "tcp: Fix data races around icsk->icsk_af_ops." }, - "CVE-2023-4459": { - "cmt_msg": "net: vmxnet3: fix possible NULL pointer dereference in vmxnet3_rq_cleanup()" + "CVE-2022-3565": { + "cmt_msg": "mISDN: fix use-after-free bugs in l1oip timer handlers" }, - "CVE-2023-52457": { - "cmt_msg": "serial: 8250: omap: Don't skip resource freeing if pm_runtime_resume_and_get() failed" + "CVE-2022-3564": { + "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free caused by l2cap_reassemble_sdu" }, - "CVE-2022-23036": { - "cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()" + "CVE-2020-36385": { + "cmt_msg": "RDMA/ucma: Rework ucma_migrate_id() to avoid races with destroy" }, - "CVE-2022-2153": { - "cmt_msg": "KVM: x86: Avoid theoretical NULL pointer dereference in kvm_irq_delivery_to_apic_fast()" + "CVE-2018-7480": { + "cmt_msg": "blkcg: fix double free of new_blkg in blkcg_init_queue" }, - "CVE-2019-19531": { - "cmt_msg": "usb: yurex: Fix use-after-free in yurex_delete" + "CVE-2023-0030": { + "cmt_msg": "drm/nouveau/mmu: add more general vmm free/node handling functions" }, - "CVE-2022-20566": { - "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free caused by l2cap_chan_put" + "CVE-2019-11599": { + "cmt_msg": "coredump: fix race condition between mmget_not_zero()/get_task_mm() and core dumping" }, - "CVE-2018-12930": { - "cmt_msg": "" + "CVE-2019-2101": { + "cmt_msg": "media: uvcvideo: Fix 'type' check leading to overflow" }, - "CVE-2018-12931": { - "cmt_msg": "" + "CVE-2019-3459": { + "cmt_msg": "Bluetooth: Verify that l2cap_get_conf_opt provides large enough buffer" }, - "CVE-2017-7308": { - "cmt_msg": "net/packet: fix overflow in check for priv area size" + "CVE-2020-0444": { + "cmt_msg": "audit: fix error handling in audit_data_to_entry()" }, - "CVE-2024-23196": { - "cmt_msg": "" + "CVE-2017-16526": { + "cmt_msg": "uwb: properly check kthread_run return value" }, - "CVE-2016-0758": { - "cmt_msg": "KEYS: Fix ASN.1 indefinite length object parsing" + "CVE-2017-16527": { + "cmt_msg": "ALSA: usb-audio: Kill stray URB at exiting" }, - "CVE-2020-12769": { - "cmt_msg": "spi: spi-dw: Add lock protect dw_spi rx/tx to prevent concurrent calls" + "CVE-2017-16525": { + "cmt_msg": "USB: serial: console: fix use-after-free after failed setup" }, - "CVE-2021-39636": { - "cmt_msg": "netfilter: x_tables: fix pointer leaks to userspace" + "CVE-2022-1836": { + "cmt_msg": "floppy: disable FDRAWCMD by default" }, - "CVE-2017-8890": { - "cmt_msg": "dccp/tcp: do not inherit mc_list from parent" + "CVE-2017-16528": { + "cmt_msg": "ALSA: seq: Cancel pending autoload work at unbinding device" }, - "CVE-2022-4662": { - "cmt_msg": "USB: core: Prevent nested device-reset calls" + "CVE-2017-16529": { + "cmt_msg": "ALSA: usb-audio: Check out-of-bounds access by corrupted buffer descriptor" }, - "CVE-2021-32399": { - "cmt_msg": "bluetooth: eliminate the potential race condition when removing the HCI controller" + "CVE-2019-2215": { + "cmt_msg": "ANDROID: binder: remove waitqueue when thread exits." }, - "CVE-2021-45868": { - "cmt_msg": "quota: check block number when reading the block in quota file" + "CVE-2019-2213": { + "cmt_msg": "binder: fix possible UAF when freeing buffer" }, - "CVE-2019-12380": { - "cmt_msg": "efi/x86/Add missing error handling to old_memmap 1:1 mapping code" + "CVE-2018-1087": { + "cmt_msg": "kvm/x86: fix icebp instruction handling" }, - "CVE-2019-12381": { - "cmt_msg": "ip_sockglue: Fix missing-check bug in ip_ra_control()" + "CVE-2018-17182": { + "cmt_msg": "mm: get rid of vmacache_flush_all() entirely" }, - "CVE-2019-12382": { - "cmt_msg": "drm/edid: Fix a missing-check bug in drm_load_edid_firmware()" + "CVE-2019-19049": { + "cmt_msg": "of: unittest: fix memory leak in unittest_data_add" }, - "CVE-2017-10810": { - "cmt_msg": "drm/virtio: don't leak bo on drm_gem_object_init failure" + "CVE-2018-13053": { + "cmt_msg": "alarmtimer: Prevent overflow for relative nanosleep" }, - "CVE-2020-12364": { - "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" + "CVE-2023-23559": { + "cmt_msg": "wifi: rndis_wlan: Prevent buffer overflow in rndis_query_oid" }, - "CVE-2020-8648": { - "cmt_msg": "vt: selection, close sel_buffer race" + "CVE-2020-10720": { + "cmt_msg": "net-gro: fix use-after-free read in napi_gro_frags()" }, - "CVE-2017-12146": { - "cmt_msg": "driver core: platform: fix race condition with driver_override" + "CVE-2022-20369": { + "cmt_msg": "media: v4l2-mem2mem: Apply DST_QUEUE_OFF_BASE on MMAP buffers across ioctls" }, - "CVE-2021-3732": { - "cmt_msg": "ovl: prevent private clone if bind mount is not allowed" + "CVE-2022-20368": { + "cmt_msg": "net/packet: fix slab-out-of-bounds access in packet_recvmsg()" }, - "CVE-2016-9588": { - "cmt_msg": "kvm: nVMX: Allow L1 to intercept software exceptions (#BP and #OF)" + "CVE-2022-3424": { + "cmt_msg": "misc: sgi-gru: fix use-after-free error in gru_set_context_option, gru_fault and gru_handle_user_call_os" }, - "CVE-2022-25375": { - "cmt_msg": "usb: gadget: rndis: check size of RNDIS_MSG_SET command" + "CVE-2016-2188": { + "cmt_msg": "USB: iowarrior: fix NULL-deref at probe" }, - "CVE-2020-10766": { - "cmt_msg": "x86/speculation: Prevent rogue cross-process SSBD shutdown" + "CVE-2017-1000405": { + "cmt_msg": "mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d()" }, - "CVE-2017-13166": { - "cmt_msg": "media: v4l2-ioctl.c: use check_fmt for enum/g/s/try_fmt" + "CVE-2017-1000407": { + "cmt_msg": "KVM: VMX: remove I/O port 0x80 bypass on Intel hosts" }, - "CVE-2018-12207": { - "cmt_msg": "kvm: x86, powerpc: do not allow clearing largepages debugfs entry" + "CVE-2022-24448": { + "cmt_msg": "NFSv4: Handle case where the lookup of a directory fails" }, - "CVE-2017-1000364": { - "cmt_msg": "mm: larger stack guard gap, between vmas" + "CVE-2020-0427": { + "cmt_msg": "pinctrl: devicetree: Avoid taking direct reference to device name string" }, - "CVE-2017-1000365": { - "cmt_msg": "fs/exec.c: account for argv/envp pointers" + "CVE-2020-26088": { + "cmt_msg": "net/nfc/rawsock.c: add CAP_NET_RAW check." }, - "CVE-2020-13143": { - "cmt_msg": "USB: gadget: fix illegal array access in binding with UDC" + "CVE-2008-2544": { + "cmt_msg": "" }, - "CVE-2023-5178": { - "cmt_msg": "nvmet-tcp: Fix a possible UAF in queue intialization setup" + "CVE-2023-2248": { + "cmt_msg": "net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg" }, - "CVE-2020-10768": { - "cmt_msg": "x86/speculation: PR_SPEC_FORCE_DISABLE enforcement for indirect branches." + "CVE-2023-30772": { + "cmt_msg": "power: supply: da9150: Fix use after free bug in da9150_charger_remove due to race condition" }, - "CVE-2017-13168": { - "cmt_msg": "scsi: sg: mitigate read/write abuse" + "CVE-2017-18017": { + "cmt_msg": "netfilter: xt_TCPMSS: add more sanity tests on tcph->doff" }, - "CVE-2017-1000363": { - "cmt_msg": "char: lp: fix possible integer overflow in lp_setup()" + "CVE-2021-3679": { + "cmt_msg": "tracing: Fix bug in rb_per_cpu_empty() that might cause deadloop." }, - "CVE-2019-0148": { - "cmt_msg": "i40e: Wrong truncation from u16 to u8" + "CVE-2022-2586": { + "cmt_msg": "netfilter: nf_tables: do not allow SET_ID to refer to another table" }, - "CVE-2022-2978": { - "cmt_msg": "fs: fix UAF/GPF bug in nilfs_mdt_destroy" + "CVE-2016-7042": { + "cmt_msg": "KEYS: Fix short sprintf buffer in /proc/keys show function" }, - "CVE-2019-17075": { - "cmt_msg": "RDMA/cxgb4: Do not dma memory off of the stack" + "CVE-2021-39714": { + "cmt_msg": "staging: android: ion: Drop ion_map_kernel interface" }, - "CVE-2016-5696": { - "cmt_msg": "tcp: make challenge acks less predictable" + "CVE-2023-51782": { + "cmt_msg": "net/rose: Fix Use-After-Free in rose_ioctl" }, - "CVE-2022-23960": { - "cmt_msg": "ARM: report Spectre v2 status through sysfs" + "CVE-2023-51780": { + "cmt_msg": "atm: Fix Use-After-Free in do_vcc_ioctl" }, - "CVE-2023-39189": { - "cmt_msg": "netfilter: nfnetlink_osf: avoid OOB read" + "CVE-2023-51781": { + "cmt_msg": "appletalk: Fix Use-After-Free in atalk_ioctl" }, - "CVE-2023-20588": { - "cmt_msg": "x86/CPU/AMD: Do not leak quotient data after a division by 0" + "CVE-2022-2588": { + "cmt_msg": "net_sched: cls_route: remove from list when handle is 0" }, - "CVE-2020-10942": { - "cmt_msg": "vhost: Check docket sk_family instead of call getname" + "CVE-2019-18885": { + "cmt_msg": "btrfs: merge btrfs_find_device and find_device" }, - "CVE-2018-3693": { - "cmt_msg": "ext4: fix spectre gadget in ext4_mb_regular_allocator()" + "CVE-2017-7889": { + "cmt_msg": "mm: Tighten x86 /dev/mem with zeroing reads" }, - "CVE-2017-15299": { - "cmt_msg": "KEYS: don't let add_key() update an uninstantiated key" + "CVE-2017-14489": { + "cmt_msg": "scsi: scsi_transport_iscsi: fix the issue that iscsi_if_rx doesn't parse nlmsg properly" }, - "CVE-2023-3338": { - "cmt_msg": "Remove DECnet support from kernel" + "CVE-2024-26733": { + "cmt_msg": "arp: Prevent overflow in arp_req_get()." }, - "CVE-2019-11190": { - "cmt_msg": "binfmt_elf: switch to new creds when switching to new mm" + "CVE-2024-26738": { + "cmt_msg": "powerpc/pseries/iommu: DLPAR add doesn't completely initialize pci_controller" }, - "CVE-2019-11191": { - "cmt_msg": "x86: Deprecate a.out support" + "CVE-2024-26739": { + "cmt_msg": "net/sched: act_mirred: don't override retval if we already lost the skb" }, - "CVE-2023-4385": { - "cmt_msg": "fs: jfs: fix possible NULL pointer dereference in dbFree()" + "CVE-2022-38096": { + "cmt_msg": "" }, - "CVE-2016-5195": { - "cmt_msg": "mm: remove gup_flags FOLL_WRITE games from __get_user_pages()" + "CVE-2020-14305": { + "cmt_msg": "netfilter: helpers: remove data_len usage for inkernel helpers" }, - "CVE-2021-0605": { - "cmt_msg": "af_key: pfkey_dump needs parameter validation" + "CVE-2017-5715": { + "cmt_msg": "x86/cpufeatures: Add X86_BUG_SPECTRE_V[12]" }, - "CVE-2023-35001": { - "cmt_msg": "netfilter: nf_tables: prevent OOB access in nft_byteorder_eval" + "CVE-2018-3620": { + "cmt_msg": "x86/microcode: Allow late microcode loading with SMT disabled" }, - "CVE-2018-10323": { - "cmt_msg": "xfs: set format back to extents if xfs_bmap_extents_to_btree" + "CVE-2020-16166": { + "cmt_msg": "random32: update the net random state on interrupt and activity" }, - "CVE-2018-10322": { - "cmt_msg": "xfs: enhance dinode verifier" + "CVE-2021-33631": { + "cmt_msg": "ext4: fix kernel BUG in 'ext4_write_inline_data_end()'" }, - "CVE-2023-1989": { - "cmt_msg": "Bluetooth: btsdio: fix use after free bug in btsdio_remove due to unfinished work" + "CVE-2019-15916": { + "cmt_msg": "net-sysfs: Fix mem leak in netdev_register_kobject" }, - "CVE-2017-5576": { - "cmt_msg": "drm/vc4: Fix an integer overflow in temporary allocation layout." + "CVE-2019-15917": { + "cmt_msg": "Bluetooth: hci_ldisc: Postpone HCI_UART_PROTO_READY bit set in hci_uart_set_proto()" }, - "CVE-2017-7895": { - "cmt_msg": "nfsd: stricter decoding of write-like NFSv2/v3 ops" + "CVE-2017-18344": { + "cmt_msg": "posix-timer: Properly check sigevent->sigev_notify" }, - "CVE-2021-0447": { - "cmt_msg": "l2tp: protect sock pointer of struct pppol2tp_session with RCU" + "CVE-2024-26648": { + "cmt_msg": "drm/amd/display: Fix variable deferencing before NULL check in edp_setup_replay()" }, - "CVE-2017-8824": { - "cmt_msg": "dccp: CVE-2017-8824: use-after-free in DCCP code" + "CVE-2024-26646": { + "cmt_msg": "thermal: intel: hfi: Add syscore callbacks for system-wide PM" }, - "CVE-2018-7492": { - "cmt_msg": "rds: Fix NULL pointer dereference in __rds_rdma_map" + "CVE-2018-18690": { + "cmt_msg": "xfs: don't fail when converting shortform attr to long form during ATTR_REPLACE" }, - "CVE-2020-26139": { - "cmt_msg": "mac80211: do not accept/forward invalid EAPOL frames" + "CVE-2024-26644": { + "cmt_msg": "btrfs: don't abort filesystem when attempting to snapshot deleted subvolume" }, - "CVE-2019-10220": { - "cmt_msg": "Convert filldir[64]() from __put_user() to unsafe_put_user()" + "CVE-2024-26642": { + "cmt_msg": "netfilter: nf_tables: disallow anonymous set with timeout flag" }, - "CVE-2017-7495": { - "cmt_msg": "ext4: fix data exposure after a crash" + "CVE-2017-0627": { + "cmt_msg": "media: uvcvideo: Prevent heap overflow when accessing mapped controls" }, - "CVE-2017-13305": { - "cmt_msg": "KEYS: encrypted: fix buffer overread in valid_master_desc()" + "CVE-2018-25020": { + "cmt_msg": "bpf: fix truncated jump targets on heavy expansions" }, - "CVE-2016-6136": { - "cmt_msg": "audit: fix a double fetch in audit_log_single_execve_arg()" + "CVE-2023-52469": { + "cmt_msg": "drivers/amd/pm: fix a use-after-free in kv_parse_power_table" }, - "CVE-2019-19536": { - "cmt_msg": "can: peak_usb: pcan_usb_pro: Fix info-leaks to USB devices" + "CVE-2021-46904": { + "cmt_msg": "net: hso: fix null-ptr-deref during tty device unregistration" + }, + "CVE-2018-7273": { + "cmt_msg": "printk: hash addresses printed with %p" }, - "CVE-2019-19537": { - "cmt_msg": "USB: core: Fix races in character device registration and deregistraion" + "CVE-2022-0617": { + "cmt_msg": "udf: Fix NULL ptr deref when converting from inline format" }, - "CVE-2019-19534": { - "cmt_msg": "can: peak_usb: fix slab info leak" + "CVE-2023-4459": { + "cmt_msg": "net: vmxnet3: fix possible NULL pointer dereference in vmxnet3_rq_cleanup()" }, - "CVE-2018-18281": { - "cmt_msg": "mremap: properly flush TLB before releasing the page" + "CVE-2022-20566": { + "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free caused by l2cap_chan_put" }, - "CVE-2019-19532": { - "cmt_msg": "HID: Fix assumption that devices have inputs" + "CVE-2022-20565": { + "cmt_msg": "HID: core: Correctly handle ReportSize being zero" }, - "CVE-2019-11479": { - "cmt_msg": "tcp: add tcp_min_snd_mss sysctl" + "CVE-2023-1990": { + "cmt_msg": "nfc: st-nci: Fix use after free bug in ndlc_remove due to race condition" }, - "CVE-2019-10638": { - "cmt_msg": "inet: switch IP ID generator to siphash" + "CVE-2021-33098": { + "cmt_msg": "ixgbe: fix large MTU request from VF" }, - "CVE-2019-10639": { - "cmt_msg": "netns: provide pure entropy for net_hash_mix()" + "CVE-2022-48619": { + "cmt_msg": "Input: add bounds checking to input_set_capability()" }, - "CVE-2021-0929": { - "cmt_msg": "staging/android/ion: delete dma_buf->kmap/unmap implemenation" + "CVE-2017-10810": { + "cmt_msg": "drm/virtio: don't leak bo on drm_gem_object_init failure" }, - "CVE-2019-11478": { - "cmt_msg": "tcp: tcp_fragment() should apply sane memory limits" + "CVE-2024-24860": { + "cmt_msg": "Bluetooth: Fix atomicity violation in {min,max}_key_size_set" }, - "CVE-2018-19985": { - "cmt_msg": "USB: hso: Fix OOB memory access in hso_probe/hso_get_config_data" + "CVE-2018-20509": { + "cmt_msg": "binder: refactor binder ref inc/dec for thread safety" }, - "CVE-2016-6156": { - "cmt_msg": "platform/chrome: cros_ec_dev - double fetch bug in ioctl" + "CVE-2021-47070": { + "cmt_msg": "uio_hv_generic: Fix another memory leak in error handling paths" }, - "CVE-2017-18257": { - "cmt_msg": "f2fs: fix a dead loop in f2fs_fiemap()" + "CVE-2021-47075": { + "cmt_msg": "nvmet: fix memory leak in nvmet_alloc_ctrl()" }, - "CVE-2023-6546": { - "cmt_msg": "tty: n_gsm: fix the UAF caused by race condition in gsm_cleanup_mux" + "CVE-2021-47076": { + "cmt_msg": "RDMA/rxe: Return CQE error if invalid lkey was supplied" }, - "CVE-2017-18255": { - "cmt_msg": "perf/core: Fix the perf_cpu_time_max_percent check" + "CVE-2016-5195": { + "cmt_msg": "mm: remove gup_flags FOLL_WRITE games from __get_user_pages()" }, - "CVE-2017-7273": { - "cmt_msg": "HID: hid-cypress: validate length of report" + "CVE-2017-8824": { + "cmt_msg": "dccp: CVE-2017-8824: use-after-free in DCCP code" }, - "CVE-2018-5953": { - "cmt_msg": "printk: hash addresses printed with %p" + "CVE-2018-7492": { + "cmt_msg": "rds: Fix NULL pointer dereference in __rds_rdma_map" }, - "CVE-2016-7097": { - "cmt_msg": "posix_acl: Clear SGID bit when setting file permissions" + "CVE-2017-12188": { + "cmt_msg": "KVM: nVMX: update last_nonleaf_level when initializing nested EPT" }, - "CVE-2024-26587": { - "cmt_msg": "net: netdevsim: don't try to destroy PHC on VFs" + "CVE-2016-6136": { + "cmt_msg": "audit: fix a double fetch in audit_log_single_execve_arg()" }, - "CVE-2023-51043": { - "cmt_msg": "drm/atomic: Fix potential use-after-free in nonblocking commits" + "CVE-2018-5848": { + "cmt_msg": "wil6210: missing length check in wmi_set_ie" }, - "CVE-2020-28374": { - "cmt_msg": "scsi: target: Fix XCOPY NAA identifier lookup" + "CVE-2019-10638": { + "cmt_msg": "inet: switch IP ID generator to siphash" }, - "CVE-2019-9213": { - "cmt_msg": "mm: enforce min addr even if capable() in expand_downwards()" + "CVE-2019-10639": { + "cmt_msg": "netns: provide pure entropy for net_hash_mix()" }, - "CVE-2023-2007": { - "cmt_msg": "scsi: dpt_i2o: Remove obsolete driver" + "CVE-2024-26676": { + "cmt_msg": "af_unix: Call kfree_skb() for dead unix_(sk)->oob_skb in GC." }, - "CVE-2023-0615": { - "cmt_msg": "media: vivid: dev->bitmap_cap wasn't freed in all cases" + "CVE-2017-14140": { + "cmt_msg": "Sanitize 'move_pages()' permission checks" }, - "CVE-2017-7472": { - "cmt_msg": "KEYS: fix keyctl_set_reqkey_keyring() to not leak thread keyrings" + "CVE-2020-26557": { + "cmt_msg": "" }, "CVE-2017-16535": { "cmt_msg": "USB: core: fix out-of-bounds access bug in usb_get_bos_descriptor()" @@ -66014,71 +99565,29 @@ "CVE-2017-16532": { "cmt_msg": "usb: usbtest: fix NULL pointer dereference" }, - "CVE-2023-35824": { - "cmt_msg": "media: dm1105: Fix use after free bug in dm1105_remove due to race condition" - }, - "CVE-2022-43750": { - "cmt_msg": "usb: mon: make mmapped memory read only" + "CVE-2024-26779": { + "cmt_msg": "wifi: mac80211: fix race condition on enabling fast-xmit" }, "CVE-2017-16538": { "cmt_msg": "media: dvb-usb-v2: lmedm04: Improve logic checking of warm start" }, - "CVE-2023-3006": { - "cmt_msg": "arm64: Add AMPERE1 to the Spectre-BHB affected list" - }, - "CVE-2020-27825": { - "cmt_msg": "tracing: Fix race in trace_open and buffer resize call" - }, "CVE-2016-9084": { "cmt_msg": "vfio/pci: Fix integer overflows, bitmask check" }, - "CVE-2020-27820": { - "cmt_msg": "drm/nouveau: use drm_dev_unplug() during device removal" - }, "CVE-2016-9083": { "cmt_msg": "vfio/pci: Fix integer overflows, bitmask check" }, - "CVE-2017-18222": { - "cmt_msg": "net: hns: fix ethtool_get_strings overflow in hns driver" - }, - "CVE-2017-18221": { - "cmt_msg": "mlock: fix mlock count can not decrease in race condition" - }, - "CVE-2023-4622": { - "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES" - }, - "CVE-2019-20794": { - "cmt_msg": "" - }, - "CVE-2023-39193": { - "cmt_msg": "netfilter: xt_sctp: validate the flag_info count" - }, - "CVE-2023-39192": { - "cmt_msg": "netfilter: xt_u32: validate user space input" - }, - "CVE-2020-26541": { - "cmt_msg": "certs: Add EFI_CERT_X509_GUID support for dbx entries" - }, - "CVE-2023-6610": { - "cmt_msg": "smb: client: fix potential OOB in smb2_dump_detail()" + "CVE-2018-9517": { + "cmt_msg": "l2tp: pass tunnel pointer to ->session_create()" }, - "CVE-2020-26559": { - "cmt_msg": "" + "CVE-2018-9516": { + "cmt_msg": "HID: debug: check length before copy_to_user()" }, "CVE-2021-20317": { "cmt_msg": "lib/timerqueue: Rely on rbtree semantics for next timer" }, - "CVE-2021-43389": { - "cmt_msg": "isdn: cpai: check ctr->cnr to avoid array index out of bound" - }, - "CVE-2017-14156": { - "cmt_msg": "video: fbdev: aty: do not leak uninitialized padding in clk to userspace" - }, - "CVE-2021-33061": { - "cmt_msg": "ixgbe: add improvement for MDD response functionality" - }, - "CVE-2024-26592": { - "cmt_msg": "ksmbd: fix UAF issue in ksmbd_tcp_new_connection()" + "CVE-2024-26772": { + "cmt_msg": "ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal()" }, "CVE-2017-2671": { "cmt_msg": "ping: implement proper locking" @@ -66089,35 +99598,8 @@ "CVE-2018-1093": { "cmt_msg": "ext4: add validity checks for bitmap block numbers" }, - "CVE-2017-18551": { - "cmt_msg": "i2c: core-smbus: prevent stack corruption on read I2C_BLOCK_DATA" - }, - "CVE-2023-1074": { - "cmt_msg": "sctp: fail if no bound addresses can be used for a given scope" - }, - "CVE-2017-18552": { - "cmt_msg": "RDS: validate the requested traces user input against max supported" - }, - "CVE-2021-26931": { - "cmt_msg": "xen-blkback: don't \"handle\" error by BUG()" - }, - "CVE-2024-26584": { - "cmt_msg": "net: tls: handle backlogging of crypto requests" - }, - "CVE-2022-1652": { - "cmt_msg": "floppy: use a statically allocated error counter" - }, - "CVE-2023-4623": { - "cmt_msg": "net/sched: sch_hfsc: Ensure inner classes have fsc curve" - }, - "CVE-2020-29568": { - "cmt_msg": "xen/xenbus: Allow watches discard events before queueing" - }, - "CVE-2018-18559": { - "cmt_msg": "net/packet: fix a race in packet_bind() and packet_notifier()" - }, - "CVE-2019-9457": { - "cmt_msg": "exec: Limit arg stack to at most 75% of _STK_LIM" + "CVE-2021-3864": { + "cmt_msg": "" }, "CVE-2019-19054": { "cmt_msg": "media: rc: prevent memory leak in cx23888_ir_probe" @@ -66128,13970 +99610,12689 @@ "CVE-2019-19056": { "cmt_msg": "mwifiex: pcie: Fix memory leak in mwifiex_pcie_alloc_cmdrsp_buf" }, - "CVE-2016-10741": { - "cmt_msg": "xfs: don't BUG() on mixed direct and mapped I/O" - }, - "CVE-2023-23039": { - "cmt_msg": "" - }, "CVE-2019-19052": { "cmt_msg": "can: gs_usb: gs_can_open(): prevent memory leak" }, "CVE-2019-3846": { "cmt_msg": "mwifiex: Fix possible buffer overflows at parsing bss descriptor" }, - "CVE-2023-46838": { - "cmt_msg": "xen-netback: don't produce zero-size SKB frags" + "CVE-2017-15537": { + "cmt_msg": "x86/fpu: Don't let userspace set bogus xcomp_bv" }, - "CVE-2020-0427": { - "cmt_msg": "pinctrl: devicetree: Avoid taking direct reference to device name string" + "CVE-2018-5391": { + "cmt_msg": "ip: discard IPv4 datagrams with overlapping segments." }, - "CVE-2019-9458": { - "cmt_msg": "media: v4l: event: Prevent freeing event subscriptions while accessed" + "CVE-2023-20941": { + "cmt_msg": "" }, - "CVE-2016-8666": { - "cmt_msg": "tunnels: Don't apply GRO to multiple layers of encapsulation." + "CVE-2018-20836": { + "cmt_msg": "scsi: libsas: fix a race condition when smp task timeout" }, - "CVE-2021-39714": { - "cmt_msg": "staging: android: ion: Drop ion_map_kernel interface" + "CVE-2020-10135": { + "cmt_msg": "Bluetooth: Consolidate encryption handling in hci_encrypt_cfm" }, - "CVE-2023-39197": { - "cmt_msg": "netfilter: conntrack: dccp: copy entire header to stack buffer, not just basic one" + "CVE-2023-28328": { + "cmt_msg": "media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer()" }, - "CVE-2017-9242": { - "cmt_msg": "ipv6: fix out of bound writes in __ip6_append_data()" + "CVE-2017-13693": { + "cmt_msg": "" }, - "CVE-2016-8660": { + "CVE-2017-13695": { + "cmt_msg": "ACPICA: acpi: acpica: fix acpi operand cache leak in nseval.c" + }, + "CVE-2017-13694": { "cmt_msg": "" }, - "CVE-2020-14314": { - "cmt_msg": "ext4: fix potential negative array index in do_split()" + "CVE-2024-26647": { + "cmt_msg": "drm/amd/display: Fix late derefrence 'dsc' check in 'link_set_dsc_pps_packet()'" }, - "CVE-2023-3090": { - "cmt_msg": "ipvlan:Fix out-of-bounds caused by unclear skb->cb" + "CVE-2021-3640": { + "cmt_msg": "Bluetooth: sco: Fix lock_sock() blockage by memcpy_from_msg()" }, - "CVE-2019-13272": { - "cmt_msg": "ptrace: Fix ->ptracer_cred handling for PTRACE_TRACEME" + "CVE-2020-11608": { + "cmt_msg": "media: ov519: add missing endpoint sanity checks" }, - "CVE-2021-3587": { - "cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect" + "CVE-2020-10732": { + "cmt_msg": "fs/binfmt_elf.c: allocate initialized memory in fill_thread_core_info()" }, - "CVE-2023-45862": { - "cmt_msg": "USB: ene_usb6250: Allocate enough memory for full object" + "CVE-2019-9466": { + "cmt_msg": "brcmfmac: add subtype check for event handling in data path" }, - "CVE-2023-45863": { - "cmt_msg": "kobject: Fix slab-out-of-bounds in fill_kobj_path()" + "CVE-2017-17975": { + "cmt_msg": "media: usbtv: prevent double free in error case" }, - "CVE-2023-1582": { - "cmt_msg": "fs/proc: task_mmu.c: don't read mapcount for migration entry" + "CVE-2019-16921": { + "cmt_msg": "RDMA/hns: Fix init resp when alloc ucontext" }, - "CVE-2017-15537": { - "cmt_msg": "x86/fpu: Don't let userspace set bogus xcomp_bv" + "CVE-2021-0512": { + "cmt_msg": "HID: make arrays usage and value to be the same" }, - "CVE-2022-2588": { - "cmt_msg": "net_sched: cls_route: remove from list when handle is 0" + "CVE-2022-41222": { + "cmt_msg": "mm/mremap: hold the rmap lock in write mode when moving page table entries." }, - "CVE-2019-17351": { - "cmt_msg": "xen: let alloc_xenballooned_pages() fail if not enough memory free" + "CVE-2017-18174": { + "cmt_msg": "pinctrl: amd: Use devm_pinctrl_register() for pinctrl registration" }, - "CVE-2020-36322": { - "cmt_msg": "fuse: fix bad inode" + "CVE-2017-18595": { + "cmt_msg": "tracing: Fix possible double free on failure of allocating trace buffer" }, - "CVE-2022-23222": { - "cmt_msg": "bpf: Replace PTR_TO_XXX_OR_NULL with PTR_TO_XXX | PTR_MAYBE_NULL" + "CVE-2024-26720": { + "cmt_msg": "mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again" }, - "CVE-2020-25669": { - "cmt_msg": "Input: sunkbd - avoid use-after-free in teardown paths" + "CVE-2024-26726": { + "cmt_msg": "btrfs: don't drop extent_map for free space inode on write error" }, - "CVE-2020-25668": { - "cmt_msg": "tty: make FONTX ioctl use the tty pointer they were actually passed" + "CVE-2019-6974": { + "cmt_msg": "kvm: fix kvm_ioctl_create_device() reference counting (CVE-2019-6974)" }, - "CVE-2008-4609": { - "cmt_msg": "" + "CVE-2023-2985": { + "cmt_msg": "fs: hfsplus: fix UAF issue in hfsplus_put_super" }, - "CVE-2016-4470": { - "cmt_msg": "KEYS: potential uninitialized variable" + "CVE-2017-17806": { + "cmt_msg": "crypto: hmac - require that the underlying hash algorithm is unkeyed" }, - "CVE-2021-0448": { - "cmt_msg": "netfilter: ctnetlink: add a range check for l3/l4 protonum" + "CVE-2017-17807": { + "cmt_msg": "KEYS: add missing permission check for request_key() destination" }, - "CVE-2023-52458": { - "cmt_msg": "block: add check that partition length needs to be aligned with block size" + "CVE-2017-17805": { + "cmt_msg": "crypto: salsa20 - fix blkcipher_walk API usage" }, - "CVE-2023-40283": { - "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb" + "CVE-2023-52519": { + "cmt_msg": "HID: intel-ish-hid: ipc: Disable and reenable ACPI GPE bit" }, - "CVE-2018-19824": { - "cmt_msg": "ALSA: usb-audio: Fix UAF decrement if card has no live interfaces in card.c" + "CVE-2023-52516": { + "cmt_msg": "dma-debug: don't call __dma_entry_alloc_check_leak() under free_entries_lock" }, - "CVE-2018-20854": { - "cmt_msg": "phy: ocelot-serdes: fix out-of-bounds read" + "CVE-2023-52517": { + "cmt_msg": "spi: sun6i: fix race between DMA RX transfer completion and RX FIFO drain" }, - "CVE-2018-25020": { - "cmt_msg": "bpf: fix truncated jump targets on heavy expansions" + "CVE-2023-52515": { + "cmt_msg": "RDMA/srp: Do not call scsi_done() from srp_abort()" }, - "CVE-2022-3533": { + "CVE-2019-15902": { + "cmt_msg": "unknown" + }, + "CVE-2023-52511": { + "cmt_msg": "spi: sun6i: reduce DMA RX transfer width to single byte" + }, + "CVE-2019-20054": { + "cmt_msg": "fs/proc/proc_sysctl.c: fix NULL pointer dereference in put_links" + }, + "CVE-2018-17977": { "cmt_msg": "" }, - "CVE-2023-26607": { - "cmt_msg": "ntfs: fix out-of-bounds read in ntfs_attr_find()" + "CVE-2024-26659": { + "cmt_msg": "xhci: handle isoc Babble and Buffer Overrun events properly" }, - "CVE-2018-20855": { - "cmt_msg": "IB/mlx5: Fix leaking stack memory to userspace" + "CVE-2024-26658": { + "cmt_msg": "bcachefs: grab s_umount only if snapshotting" }, - "CVE-2019-15239": { - "cmt_msg": "unknown" + "CVE-2010-5321": { + "cmt_msg": "" }, - "CVE-2017-15129": { - "cmt_msg": "net: Fix double free and memory corruption in get_net_ns_by_id()" + "CVE-2024-26655": { + "cmt_msg": "Fix memory leak in posix_clock_open()" }, - "CVE-2021-4037": { - "cmt_msg": "xfs: fix up non-directory creation in SGID directories" + "CVE-2024-26654": { + "cmt_msg": "ALSA: sh: aica: reorder cleanup operations to avoid UAF bugs" }, - "CVE-2021-22543": { - "cmt_msg": "KVM: do not allow mapping valid but non-reference-counted pages" + "CVE-2024-26656": { + "cmt_msg": "drm/amdgpu: fix use-after-free bug" }, - "CVE-2022-45884": { - "cmt_msg": "" + "CVE-2024-26651": { + "cmt_msg": "sr9800: Add check for usbnet_get_endpoints" }, - "CVE-2019-1999": { - "cmt_msg": "binder: fix race between munmap() and direct reclaim" + "CVE-2024-26650": { + "cmt_msg": "platform/x86: p2sb: Allow p2sb_bar() calls during PCI device probe" }, - "CVE-2018-1065": { - "cmt_msg": "netfilter: add back stackpointer size checks" + "CVE-2022-1048": { + "cmt_msg": "ALSA: pcm: Fix races among concurrent hw_params and hw_free calls" }, - "CVE-2023-20941": { - "cmt_msg": "" + "CVE-2023-52475": { + "cmt_msg": "Input: powermate - fix use-after-free in powermate_config_complete" }, - "CVE-2018-1066": { - "cmt_msg": "CIFS: Enable encryption during session setup phase" + "CVE-2023-52477": { + "cmt_msg": "usb: hub: Guard against accesses to uninitialized BOS descriptors" }, - "CVE-2018-20836": { - "cmt_msg": "scsi: libsas: fix a race condition when smp task timeout" + "CVE-2023-52476": { + "cmt_msg": "perf/x86/lbr: Filter vsyscall addresses" }, - "CVE-2018-1068": { - "cmt_msg": "netfilter: ebtables: CONFIG_COMPAT: don't trust userland offsets" + "CVE-2016-10147": { + "cmt_msg": "crypto: mcryptd - Check mcryptd algorithm compatibility" }, - "CVE-2016-5400": { - "cmt_msg": "media: fix airspy usb probe error path" + "CVE-2023-52470": { + "cmt_msg": "drm/radeon: check the alloc_workqueue return value in radeon_crtc_init()" }, - "CVE-2020-10135": { - "cmt_msg": "Bluetooth: Consolidate encryption handling in hci_encrypt_cfm" + "CVE-2023-52479": { + "cmt_msg": "ksmbd: fix uaf in smb20_oplock_break_ack" }, - "CVE-2020-25285": { - "cmt_msg": "mm/hugetlb: fix a race between hugetlb sysctl handlers" + "CVE-2023-52478": { + "cmt_msg": "HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect" }, - "CVE-2019-7308": { - "cmt_msg": "bpf: fix sanitation of alu op with pointer / scalar type from different paths" + "CVE-2022-26365": { + "cmt_msg": "xen/blkfront: fix leaking data in shared pages" }, - "CVE-2020-11565": { - "cmt_msg": "mm: mempolicy: require at least one nodeid for MPOL_PREFERRED" + "CVE-2020-12652": { + "cmt_msg": "scsi: mptfusion: Fix double fetch bug in ioctl" }, - "CVE-2016-8405": { - "cmt_msg": "fbdev: color map copying bounds checking" + "CVE-2020-12653": { + "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_cmd_append_vsie_tlv()" }, - "CVE-2018-1000199": { - "cmt_msg": "perf/hwbp: Simplify the perf-hwbp code, fix documentation" + "CVE-2020-12656": { + "cmt_msg": "sunrpc: check that domain table is empty at module unload." }, - "CVE-2022-1966": { - "cmt_msg": "netfilter: nf_tables: disallow non-stateful expression in sets earlier" + "CVE-2023-32233": { + "cmt_msg": "netfilter: nf_tables: deactivate anonymous set from preparation phase" }, - "CVE-2023-31084": { - "cmt_msg": "media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*()" + "CVE-2020-12654": { + "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_ret_wmm_get_status()" }, - "CVE-2017-9986": { - "cmt_msg": "sound: Retire OSS" + "CVE-2020-12655": { + "cmt_msg": "xfs: add agf freeblocks verify in xfs_agf_verify" }, - "CVE-2017-9985": { - "cmt_msg": "ALSA: msnd: Optimize / harden DSP and MIDI loops" + "CVE-2024-25740": { + "cmt_msg": "" }, - "CVE-2017-9984": { - "cmt_msg": "ALSA: msnd: Optimize / harden DSP and MIDI loops" + "CVE-2022-4744": { + "cmt_msg": "tun: avoid double free in tun_free_netdev" }, - "CVE-2019-16995": { - "cmt_msg": "net: hsr: fix memory leak in hsr_dev_finalize()" + "CVE-2022-0400": { + "cmt_msg": "" }, - "CVE-2017-18075": { - "cmt_msg": "crypto: pcrypt - fix freeing pcrypt instances" + "CVE-2024-25741": { + "cmt_msg": "" }, - "CVE-2022-3534": { - "cmt_msg": "libbpf: Fix use-after-free in btf_dump_name_dups" + "CVE-2022-26966": { + "cmt_msg": "sr9700: sanity check for packet length" }, - "CVE-2018-16862": { - "cmt_msg": "mm: cleancache: fix corruption on missed inode invalidation" + "CVE-2023-1989": { + "cmt_msg": "Bluetooth: btsdio: fix use after free bug in btsdio_remove due to unfinished work" }, - "CVE-2016-10088": { - "cmt_msg": "sg_write()/bsg_write() is not fit to be called under KERNEL_DS" + "CVE-2022-25265": { + "cmt_msg": "" }, - "CVE-2020-36516": { - "cmt_msg": "ipv4: avoid using shared IP generator for connected sockets" + "CVE-2020-25285": { + "cmt_msg": "mm/hugetlb: fix a race between hugetlb sysctl handlers" }, - "CVE-2017-18079": { - "cmt_msg": "Input: i8042 - fix crash at boot time" + "CVE-2020-11609": { + "cmt_msg": "media: stv06xx: add missing descriptor sanity checks" }, "CVE-2020-25284": { "cmt_msg": "rbd: require global CAP_SYS_ADMIN for mapping and unmapping" }, - "CVE-2023-28328": { - "cmt_msg": "media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer()" + "CVE-2023-4208": { + "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free" }, - "CVE-2023-0386": { - "cmt_msg": "ovl: fail on invalid uid/gid mapping at copy up" + "CVE-2023-4206": { + "cmt_msg": "net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free" }, - "CVE-2017-13693": { - "cmt_msg": "" + "CVE-2023-4207": { + "cmt_msg": "net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free" }, - "CVE-2020-0030": { - "cmt_msg": "ANDROID: binder: synchronize_rcu() when using POLLFREE." + "CVE-2021-47046": { + "cmt_msg": "drm/amd/display: Fix off by one in hdmi_14_process_transaction()" }, - "CVE-2017-13695": { - "cmt_msg": "ACPICA: acpi: acpica: fix acpi operand cache leak in nseval.c" + "CVE-2020-29370": { + "cmt_msg": "mm: slub: add missing TID bump in kmem_cache_alloc_bulk()" }, - "CVE-2017-13694": { - "cmt_msg": "" + "CVE-2022-20424": { + "cmt_msg": "io_uring: remove io_identity" }, - "CVE-2021-4149": { - "cmt_msg": "btrfs: unlock newly allocated extent buffer after error" + "CVE-2022-20422": { + "cmt_msg": "arm64: fix oops in concurrently setting insn_emulation sysctls" }, - "CVE-2022-21385": { - "cmt_msg": "net/rds: fix warn in rds_message_alloc_sgs" + "CVE-2017-8831": { + "cmt_msg": "[media] saa7164: fix double fetch PCIe access condition" }, - "CVE-2021-3864": { + "CVE-2022-45934": { + "cmt_msg": "Bluetooth: L2CAP: Fix u8 overflow" + }, + "CVE-2021-4197": { + "cmt_msg": "cgroup: Use open-time credentials for process migraton perm checks" + }, + "CVE-2020-24503": { "cmt_msg": "" }, - "CVE-2021-3640": { - "cmt_msg": "Bluetooth: sco: Fix lock_sock() blockage by memcpy_from_msg()" + "CVE-2020-24502": { + "cmt_msg": "" }, - "CVE-2017-7618": { - "cmt_msg": "crypto: ahash - Fix EINPROGRESS notification callback" + "CVE-2024-26774": { + "cmt_msg": "ext4: avoid dividing by 0 in mb_update_avg_fragment_size() when block bitmap corrupt" }, - "CVE-2020-1749": { - "cmt_msg": "net: ipv6_stub: use ip6_dst_lookup_flow instead of ip6_dst_lookup" + "CVE-2023-31436": { + "cmt_msg": "net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg" }, - "CVE-2022-42896": { - "cmt_msg": "Bluetooth: L2CAP: Fix accepting connection request for invalid SPSM" + "CVE-2024-26775": { + "cmt_msg": "aoe: avoid potential deadlock at set_capacity" }, - "CVE-2021-3760": { - "cmt_msg": "nfc: nci: fix the UAF of rf_conn_info object" + "CVE-2018-14609": { + "cmt_msg": "btrfs: relocation: Only remove reloc rb_trees if reloc control has been initialized" }, - "CVE-2022-1786": { - "cmt_msg": "io_uring: remove io_identity" + "CVE-2024-23851": { + "cmt_msg": "dm: limit the number of targets and parameter size area" }, - "CVE-2022-36123": { - "cmt_msg": "x86: Clear .brk area at early boot" + "CVE-2020-27777": { + "cmt_msg": "powerpc/rtas: Restrict RTAS requests from userspace" }, - "CVE-2022-3424": { - "cmt_msg": "misc: sgi-gru: fix use-after-free error in gru_set_context_option, gru_fault and gru_handle_user_call_os" + "CVE-2019-11486": { + "cmt_msg": "tty: mark Siemens R3964 line discipline as BROKEN" }, - "CVE-2020-11608": { - "cmt_msg": "media: ov519: add missing endpoint sanity checks" + "CVE-2019-11487": { + "cmt_msg": "fs: prevent page refcount overflow in pipe_buf_get" }, - "CVE-2020-10732": { - "cmt_msg": "fs/binfmt_elf.c: allocate initialized memory in fill_thread_core_info()" + "CVE-2018-8043": { + "cmt_msg": "net: phy: mdio-bcm-unimac: fix potential NULL dereference in unimac_mdio_probe()" }, - "CVE-2020-28097": { - "cmt_msg": "vgacon: remove software scrollback support" + "CVE-2019-20908": { + "cmt_msg": "efi: Restrict efivar_ssdt_load when the kernel is locked down" }, - "CVE-2017-7616": { - "cmt_msg": "mm/mempolicy.c: fix error handling in set_mempolicy and mbind." + "CVE-2019-19060": { + "cmt_msg": "iio: imu: adis16400: release allocated memory on failure" }, - "CVE-2023-6931": { - "cmt_msg": "perf: Fix perf_event_validate_size()" + "CVE-2019-19061": { + "cmt_msg": "iio: imu: adis16400: fix memory leak" }, - "CVE-2017-18216": { - "cmt_msg": "ocfs2: subsystem.su_mutex is required while accessing the item->ci_parent" + "CVE-2019-19062": { + "cmt_msg": "crypto: user - fix memory leak in crypto_report" }, - "CVE-2017-1000112": { - "cmt_msg": "udp: consistently apply ufo or fragmentation" + "CVE-2019-19063": { + "cmt_msg": "rtlwifi: prevent memory leak in rtl_usb_probe" }, - "CVE-2017-1000111": { - "cmt_msg": "packet: fix tp_reserve race in packet_set_ring" + "CVE-2017-17741": { + "cmt_msg": "KVM: Fix stack-out-of-bounds read in write_mmio" }, - "CVE-2024-24855": { - "cmt_msg": "scsi: lpfc: Fix a possible data race in lpfc_unregister_fcf_rescan()" + "CVE-2019-19066": { + "cmt_msg": "scsi: bfa: release allocated memory in case of error" }, - "CVE-2019-9466": { - "cmt_msg": "brcmfmac: add subtype check for event handling in data path" + "CVE-2019-19067": { + "cmt_msg": "drm/amdgpu: fix multiple memory leaks in acp_hw_init" }, - "CVE-2017-18218": { - "cmt_msg": "net: hns: Fix a skb used after free bug" + "CVE-2019-19068": { + "cmt_msg": "rtl8xxxu: prevent leaking urb" }, - "CVE-2017-7533": { - "cmt_msg": "dentry name snapshots" + "CVE-2017-7184": { + "cmt_msg": "xfrm_user: validate XFRM_MSG_NEWAE XFRMA_REPLAY_ESN_VAL replay_window" }, - "CVE-2018-8897": { - "cmt_msg": "x86/entry/64: Don't use IST entry for #BP stack" + "CVE-2017-7187": { + "cmt_msg": "scsi: sg: check length passed to SG_NEXT_CMD_LEN" }, - "CVE-2021-29265": { - "cmt_msg": "usbip: fix stub_dev usbip_sockfd_store() races leading to gpf" + "CVE-2019-3874": { + "cmt_msg": "sctp: implement memory accounting on tx path" }, - "CVE-2021-39648": { - "cmt_msg": "usb: gadget: configfs: Fix use-after-free issue with udc_name" + "CVE-2017-12193": { + "cmt_msg": "assoc_array: Fix a buggy node-splitting case" }, - "CVE-2022-3545": { - "cmt_msg": "nfp: fix use-after-free in area_cache_get()" + "CVE-2017-12192": { + "cmt_msg": "KEYS: prevent KEYCTL_READ on negative key" }, - "CVE-2016-4794": { - "cmt_msg": "percpu: fix synchronization between chunk->map_extend_work and chunk destruction" + "CVE-2017-12190": { + "cmt_msg": "fix unbalanced page refcounting in bio_map_user_iov" }, - "CVE-2020-14416": { - "cmt_msg": "can, slip: Protect tty->disc_data in write_wakeup and close with RCU" + "CVE-2020-36516": { + "cmt_msg": "ipv4: avoid using shared IP generator for connected sockets" }, - "CVE-2019-0136": { - "cmt_msg": "mac80211: drop robust management frames from unknown TA" + "CVE-2016-5412": { + "cmt_msg": "KVM: PPC: Book3S HV: Pull out TM state save/restore into separate procedures" }, - "CVE-2017-17975": { - "cmt_msg": "media: usbtv: prevent double free in error case" + "CVE-2012-4542": { + "cmt_msg": "" }, - "CVE-2019-16921": { - "cmt_msg": "RDMA/hns: Fix init resp when alloc ucontext" + "CVE-2018-1000028": { + "cmt_msg": "nfsd: auth: Fix gid sorting when rootsquash enabled" }, - "CVE-2018-16597": { - "cmt_msg": "ovl: modify ovl_permission() to do checks on two inodes" + "CVE-2018-1000026": { + "cmt_msg": "bnx2x: disable GSO where gso_size is too big for hardware" }, - "CVE-2021-21781": { - "cmt_msg": "ARM: ensure the signal page contains defined contents" + "CVE-2017-2596": { + "cmt_msg": "kvm: fix page struct leak in handle_vmon" }, - "CVE-2021-0512": { - "cmt_msg": "HID: make arrays usage and value to be the same" + "CVE-2020-36777": { + "cmt_msg": "media: dvbdev: Fix memory leak in dvb_media_device_free()" }, - "CVE-2018-14634": { - "cmt_msg": "exec: Limit arg stack to at most 75% of _STK_LIM" + "CVE-2020-36775": { + "cmt_msg": "f2fs: fix to avoid potential deadlock" }, - "CVE-2018-14633": { - "cmt_msg": "scsi: target: iscsi: Use hex2bin instead of a re-implementation" + "CVE-2021-20292": { + "cmt_msg": "drm/ttm/nouveau: don't call tt destroy callback on alloc failure." }, - "CVE-2018-12896": { - "cmt_msg": "posix-timers: Sanitize overrun handling" + "CVE-2023-2269": { + "cmt_msg": "dm ioctl: fix nested locking in table_clear() to remove deadlock concern" }, - "CVE-2023-1382": { - "cmt_msg": "tipc: set con sock in tipc_conn_alloc" + "CVE-2020-10690": { + "cmt_msg": "ptp: fix the race between the release of ptp_clock and cdev" }, - "CVE-2019-19073": { - "cmt_msg": "ath9k_htc: release allocated buffer if timed out" + "CVE-2021-3659": { + "cmt_msg": "net: mac802154: Fix general protection fault" }, - "CVE-2018-14734": { - "cmt_msg": "infiniband: fix a possible use-after-free bug" + "CVE-2021-3653": { + "cmt_msg": "KVM: nSVM: avoid picking up unsupported bits from L2 in int_ctl (CVE-2021-3653)" }, - "CVE-2022-0850": { - "cmt_msg": "ext4: fix kernel infoleak via ext4_extent_header" + "CVE-2021-3655": { + "cmt_msg": "sctp: validate from_addr_param return" }, - "CVE-2016-6187": { - "cmt_msg": "apparmor: fix oops, validate buffer size in apparmor_setprocattr()" + "CVE-2019-12614": { + "cmt_msg": "powerpc/pseries/dlpar: Fix a missing check in dlpar_parse_cc_property()" }, - "CVE-2020-0347": { + "CVE-2019-12615": { + "cmt_msg": "mdesc: fix a missing-check bug in get_vdev_port_node_info()" + }, + "CVE-2021-3896": { + "cmt_msg": "isdn: cpai: check ctr->cnr to avoid array index out of bound" + }, + "CVE-2021-3892": { "cmt_msg": "" }, - "CVE-2022-41222": { - "cmt_msg": "mm/mremap: hold the rmap lock in write mode when moving page table entries." + "CVE-2022-27223": { + "cmt_msg": "USB: gadget: validate endpoint index for xilinx udc" }, - "CVE-2018-8822": { - "cmt_msg": "staging: ncpfs: memory corruption in ncp_read_kernel()" + "CVE-2022-24958": { + "cmt_msg": "usb: gadget: don't release an existing dev->buf" }, - "CVE-2016-10318": { - "cmt_msg": "fscrypto: add authorization check for setting encryption policy" + "CVE-2020-36557": { + "cmt_msg": "vt: vt_ioctl: fix VT_DISALLOCATE freeing in-use virtual console" }, - "CVE-2021-33909": { - "cmt_msg": "seq_file: disallow extremely large seq buffer allocations" + "CVE-2020-12888": { + "cmt_msg": "vfio-pci: Invalidate mmaps and block MMIO access on disabled memory" }, - "CVE-2016-9755": { - "cmt_msg": "netfilter: ipv6: nf_defrag: drop mangled skb on ream error" + "CVE-2023-2194": { + "cmt_msg": "i2c: xgene-slimpro: Fix out-of-bounds bug in xgene_slimpro_i2c_xfer()" }, - "CVE-2019-12456": { + "CVE-2017-6353": { + "cmt_msg": "sctp: deny peeloff operation on asocs with threads sleeping on it" + }, + "CVE-2022-41218": { + "cmt_msg": "media: dvb-core: Fix UAF due to refcount races at releasing" + }, + "CVE-2011-4917": { "cmt_msg": "" }, - "CVE-2016-9756": { - "cmt_msg": "KVM: x86: drop error recovery in em_jmp_far and em_ret_far" + "CVE-2021-45485": { + "cmt_msg": "ipv6: use prandom_u32() for ID generation" }, - "CVE-2022-20565": { - "cmt_msg": "HID: core: Correctly handle ReportSize being zero" + "CVE-2020-0030": { + "cmt_msg": "ANDROID: binder: synchronize_rcu() when using POLLFREE." }, - "CVE-2019-5108": { - "cmt_msg": "mac80211: Do not send Layer 2 Update frame before authorization" + "CVE-2015-8709": { + "cmt_msg": "mm: Add a user_ns owner to mm_struct and fix ptrace permission checks" }, - "CVE-2019-17133": { - "cmt_msg": "cfg80211: wext: avoid copying malformed SSIDs" + "CVE-2019-18806": { + "cmt_msg": "net: qlogic: Fix memory leak in ql_alloc_large_buffers" }, - "CVE-2017-18595": { - "cmt_msg": "tracing: Fix possible double free on failure of allocating trace buffer" + "CVE-2018-7754": { + "cmt_msg": "printk: hash addresses printed with %p" }, - "CVE-2021-33655": { - "cmt_msg": "fbcon: Disallow setting font bigger than screen size" + "CVE-2019-3900": { + "cmt_msg": "vhost_net: fix possible infinite loop" }, - "CVE-2021-3612": { - "cmt_msg": "Input: joydev - prevent potential read overflow in ioctl" + "CVE-2022-40982": { + "cmt_msg": "x86/speculation: Add Gather Data Sampling mitigation" }, - "CVE-2017-2636": { - "cmt_msg": "tty: n_hdlc: get rid of racy n_hdlc.tbuf" + "CVE-2021-39801": { + "cmt_msg": "" }, - "CVE-2020-15437": { - "cmt_msg": "serial: 8250: fix null-ptr-deref in serial8250_start_tx()" + "CVE-2021-39800": { + "cmt_msg": "" }, - "CVE-2017-7487": { - "cmt_msg": "ipx: call ipxitf_put() in ioctl error path" + "CVE-2024-22099": { + "cmt_msg": "Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security" }, - "CVE-2019-6974": { - "cmt_msg": "kvm: fix kvm_ioctl_create_device() reference counting (CVE-2019-6974)" + "CVE-2021-4202": { + "cmt_msg": "NFC: reorganize the functions in nci_request" }, - "CVE-2020-25705": { - "cmt_msg": "icmp: randomize the global rate limiter" + "CVE-2021-4203": { + "cmt_msg": "af_unix: fix races in sk_peer_pid and sk_peer_cred accesses" }, - "CVE-2019-19525": { - "cmt_msg": "ieee802154: atusb: fix use-after-free at disconnect" + "CVE-2023-52509": { + "cmt_msg": "ravb: Fix use-after-free issue in ravb_tx_timeout_work()" }, - "CVE-2022-0168": { - "cmt_msg": "cifs: fix NULL ptr dereference in smb2_ioctl_query_info()" + "CVE-2023-46343": { + "cmt_msg": "nfc: nci: fix possible NULL pointer dereference in send_acknowledge()" }, - "CVE-2023-2985": { - "cmt_msg": "fs: hfsplus: fix UAF issue in hfsplus_put_super" + "CVE-2023-52507": { + "cmt_msg": "nfc: nci: assert requested protocol is valid" }, - "CVE-2020-14390": { - "cmt_msg": "fbcon: remove soft scrollback code" + "CVE-2023-52506": { + "cmt_msg": "LoongArch: Set all reserved memblocks on Node#0 at initialization" }, - "CVE-2020-24502": { - "cmt_msg": "" + "CVE-2023-52501": { + "cmt_msg": "ring-buffer: Do not attempt to read past \"commit\"" }, - "CVE-2017-17712": { - "cmt_msg": "net: ipv4: fix for a race condition in raw_sendmsg" + "CVE-2023-52500": { + "cmt_msg": "scsi: pm80xx: Avoid leaking tags when processing OPC_INB_SET_CONTROLLER_CONFIG command" }, - "CVE-2017-17807": { - "cmt_msg": "KEYS: add missing permission check for request_key() destination" + "CVE-2023-52502": { + "cmt_msg": "net: nfc: fix races in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn()" }, - "CVE-2017-10661": { - "cmt_msg": "timerfd: Protect the might cancel mechanism proper" + "CVE-2023-2513": { + "cmt_msg": "ext4: fix use-after-free in ext4_xattr_set_entry" }, - "CVE-2017-17805": { - "cmt_msg": "crypto: salsa20 - fix blkcipher_walk API usage" + "CVE-2017-1000": { + "cmt_msg": "udp: consistently apply ufo or fragmentation" }, - "CVE-2017-7541": { - "cmt_msg": "brcmfmac: fix possible buffer overflow in brcmf_cfg80211_mgmt_tx()" + "CVE-2024-26668": { + "cmt_msg": "netfilter: nft_limit: reject configurations that cause integer overflow" }, - "CVE-2019-19527": { - "cmt_msg": "HID: hiddev: do cleanup in failure of opening a device" + "CVE-2017-0605": { + "cmt_msg": "tracing: Use strlcpy() instead of strcpy() in __trace_find_cmdline()" }, - "CVE-2017-7542": { - "cmt_msg": "ipv6: avoid overflow of offset in ip6_find_1stfragopt" + "CVE-2024-24858": { + "cmt_msg": "" }, - "CVE-2024-0584": { - "cmt_msg": "ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet" + "CVE-2024-26664": { + "cmt_msg": "hwmon: (coretemp) Fix out-of-bounds memory access" }, - "CVE-2020-26141": { - "cmt_msg": "ath10k: Fix TKIP Michael MIC verification for PCIe" + "CVE-2021-38198": { + "cmt_msg": "KVM: X86: MMU: Use the correct inherited permissions to get shadow page" }, - "CVE-2020-0465": { - "cmt_msg": "HID: core: Sanitize event code and type when mapping input" + "CVE-2022-1679": { + "cmt_msg": "ath9k: fix use-after-free in ath9k_hif_usb_rx_cb" }, - "CVE-2020-0305": { - "cmt_msg": "chardev: Avoid potential use-after-free in 'chrdev_open()'" + "CVE-2023-52442": { + "cmt_msg": "ksmbd: validate session id and tree id in compound request" }, - "CVE-2018-3639": { - "cmt_msg": "x86/nospec: Simplify alternative_msr_write()" + "CVE-2022-40768": { + "cmt_msg": "scsi: stex: Properly zero out the passthrough command structure" }, - "CVE-2021-4218": { - "cmt_msg": "sysctl: pass kernel pointers to ->proc_handler" + "CVE-2023-52444": { + "cmt_msg": "f2fs: fix to avoid dirent corruption" }, - "CVE-2023-22995": { - "cmt_msg": "usb: dwc3: dwc3-qcom: Add missing platform_device_put() in dwc3_qcom_acpi_register_core" + "CVE-2023-52445": { + "cmt_msg": "media: pvrusb2: fix use after free on context disconnection" }, - "CVE-2019-15902": { - "cmt_msg": "unknown" + "CVE-2023-52449": { + "cmt_msg": "mtd: Fix gluebi NULL pointer dereference caused by ftl notifier" }, - "CVE-2024-25739": { - "cmt_msg": "" + "CVE-2019-15807": { + "cmt_msg": "scsi: libsas: delete sas port if expander discover failed" }, - "CVE-2016-7425": { - "cmt_msg": "scsi: arcmsr: Buffer overflow in arcmsr_iop_message_xfer()" + "CVE-2024-26719": { + "cmt_msg": "nouveau: offload fence uevents work to workqueue" }, - "CVE-2019-20054": { - "cmt_msg": "fs/proc/proc_sysctl.c: fix NULL pointer dereference in put_links" + "CVE-2024-26715": { + "cmt_msg": "usb: dwc3: gadget: Fix NULL pointer dereference in dwc3_gadget_suspend" }, - "CVE-2017-15274": { - "cmt_msg": "KEYS: fix dereferencing NULL payload with nonzero length" + "CVE-2024-1312": { + "cmt_msg": "mm: lock_vma_under_rcu() must check vma->anon_vma under vma lock" }, - "CVE-2024-0340": { - "cmt_msg": "vhost: use kzalloc() instead of kmalloc() followed by memset()" + "CVE-2019-14284": { + "cmt_msg": "floppy: fix div-by-zero in setup_format_params" }, - "CVE-2021-3753": { - "cmt_msg": "vt_kdsetmode: extend console locking" + "CVE-2019-14283": { + "cmt_msg": "floppy: fix out-of-bounds read in copy_buffer" }, - "CVE-2023-6536": { - "cmt_msg": "" + "CVE-2023-3338": { + "cmt_msg": "Remove DECnet support from kernel" }, - "CVE-2019-11135": { - "cmt_msg": "x86/msr: Add the IA32_TSX_CTRL MSR" + "CVE-2018-10882": { + "cmt_msg": "ext4: add more inode number paranoia checks" }, - "CVE-2019-11810": { - "cmt_msg": "scsi: megaraid_sas: return error when create DMA pool failed" + "CVE-2018-10883": { + "cmt_msg": "jbd2: don't mark block as modified if the handle is out of credits" }, - "CVE-2021-27365": { - "cmt_msg": "scsi: iscsi: Ensure sysfs attributes are limited to PAGE_SIZE" + "CVE-2020-29368": { + "cmt_msg": "mm: thp: make the THP mapcount atomic against __split_huge_pmd_locked()" }, - "CVE-2021-27364": { - "cmt_msg": "scsi: iscsi: Restrict sessions and handles to admin capabilities" + "CVE-2020-12464": { + "cmt_msg": "USB: core: Fix free-while-in-use bug in the USB S-Glibrary" }, - "CVE-2017-14991": { - "cmt_msg": "scsi: sg: fixup infoleak when using SG_GET_REQUEST_TABLE" + "CVE-2016-9793": { + "cmt_msg": "net: avoid signed overflows for SO_{SND|RCV}BUFFORCE" }, - "CVE-2020-0431": { - "cmt_msg": "HID: hid-input: clear unmapped usages" + "CVE-2016-9794": { + "cmt_msg": "ALSA: pcm : Call kill_fasync() in stream lock" }, - "CVE-2022-39842": { - "cmt_msg": "video: fbdev: pxa3xx-gcu: Fix integer overflow in pxa3xx_gcu_write" + "CVE-2022-47520": { + "cmt_msg": "wifi: wilc1000: validate pairwise and authentication suite offsets" }, - "CVE-2018-17977": { - "cmt_msg": "" + "CVE-2016-10044": { + "cmt_msg": "aio: mark AIO pseudo-fs noexec" }, - "CVE-2016-4997": { - "cmt_msg": "netfilter: x_tables: check for bogus target offset" + "CVE-2018-10087": { + "cmt_msg": "kernel/exit.c: avoid undefined behaviour when calling wait4()" }, - "CVE-2023-31081": { - "cmt_msg": "" + "CVE-2023-3159": { + "cmt_msg": "firewire: fix potential uaf in outbound_phy_packet_callback()" }, - "CVE-2010-5321": { - "cmt_msg": "" + "CVE-2021-47059": { + "cmt_msg": "crypto: sun8i-ss - fix result memory leak on error path" }, - "CVE-2021-20320": { - "cmt_msg": "s390/bpf: Fix optimizing out zero-extensions" + "CVE-2021-47052": { + "cmt_msg": "crypto: sa2ul - Fix memory leak of rxd" }, - "CVE-2020-28974": { - "cmt_msg": "vt: Disable KD_FONT_OP_COPY" + "CVE-2017-7374": { + "cmt_msg": "fscrypt: remove broken support for detecting keyring key revocation" }, - "CVE-2016-4998": { - "cmt_msg": "netfilter: x_tables: check for bogus target offset" + "CVE-2022-21125": { + "cmt_msg": "x86/speculation/mmio: Reuse SRBDS mitigation for SBDS" }, - "CVE-2020-11725": { + "CVE-2019-19241": { + "cmt_msg": "io_uring: async workers should inherit the user creds" + }, + "CVE-2022-21123": { + "cmt_msg": "x86/speculation/mmio: Add mitigation for Processor MMIO Stale Data" + }, + "CVE-2020-26559": { "cmt_msg": "" }, - "CVE-2022-33742": { - "cmt_msg": "xen/blkfront: force data bouncing when backend is untrusted" + "CVE-2021-43975": { + "cmt_msg": "atlantic: Fix OOB read and write in hw_atl_utils_fw_rpc_wait" }, - "CVE-2022-26490": { - "cmt_msg": "nfc: st21nfca: Fix potential buffer overflows in EVT_TRANSACTION" + "CVE-2018-6927": { + "cmt_msg": "futex: Prevent overflow by strengthen input validation" }, - "CVE-2017-5967": { - "cmt_msg": "time: Remove CONFIG_TIMER_STATS" + "CVE-2018-3639": { + "cmt_msg": "x86/nospec: Simplify alternative_msr_write()" }, - "CVE-2021-0937": { - "cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write" + "CVE-2023-0590": { + "cmt_msg": "net: sched: fix race condition in qdisc_graft()" }, - "CVE-2022-3542": { - "cmt_msg": "bnx2x: fix potential memory leak in bnx2x_tpa_stop()" + "CVE-2023-0597": { + "cmt_msg": "x86/mm: Randomize per-cpu entry area" }, - "CVE-2022-42895": { - "cmt_msg": "Bluetooth: L2CAP: Fix attempting to access uninitialized memory" + "CVE-2022-28390": { + "cmt_msg": "can: ems_usb: ems_usb_start_xmit(): fix double dev_kfree_skb() in error path" }, - "CVE-2022-3169": { - "cmt_msg": "nvme: ensure subsystem reset is single threaded" + "CVE-2019-3460": { + "cmt_msg": "Bluetooth: Check L2CAP option sizes returned from l2cap_get_conf_opt" }, - "CVE-2022-4744": { - "cmt_msg": "tun: avoid double free in tun_free_netdev" + "CVE-2022-3202": { + "cmt_msg": "jfs: prevent NULL deref in diFree" }, - "CVE-2022-36280": { - "cmt_msg": "drm/vmwgfx: Validate the box size for the snooped cursor" + "CVE-2017-7518": { + "cmt_msg": "KVM: x86: fix singlestepping over syscall" }, - "CVE-2019-2054": { - "cmt_msg": "arm/ptrace: run seccomp after ptrace" + "CVE-2019-11477": { + "cmt_msg": "tcp: limit payload size of sacked skbs" }, - "CVE-2020-0404": { - "cmt_msg": "media: uvcvideo: Avoid cyclic entity chains due to malformed USB descriptors" + "CVE-2021-46908": { + "cmt_msg": "bpf: Use correct permission flag for mixed signed bounds arithmetic" }, - "CVE-2018-20976": { - "cmt_msg": "xfs: clear sb->s_fs_info on mount failure" + "CVE-2021-46906": { + "cmt_msg": "HID: usbhid: fix info leak in hid_submit_ctrl" }, - "CVE-2016-10147": { - "cmt_msg": "crypto: mcryptd - Check mcryptd algorithm compatibility" + "CVE-2018-14614": { + "cmt_msg": "f2fs: fix to do sanity check with cp_pack_start_sum" }, - "CVE-2024-21803": { - "cmt_msg": "" + "CVE-2018-14617": { + "cmt_msg": "hfsplus: fix NULL dereference in hfsplus_lookup()" }, - "CVE-2018-7995": { - "cmt_msg": "x86/MCE: Serialize sysfs changes" + "CVE-2018-14616": { + "cmt_msg": "f2fs: fix to do sanity check with block address in main area v2" }, - "CVE-2018-16276": { - "cmt_msg": "USB: yurex: fix out-of-bounds uaccess in read handler" + "CVE-2018-14611": { + "cmt_msg": "btrfs: validate type when reading a chunk" }, - "CVE-2023-2176": { - "cmt_msg": "RDMA/core: Refactor rdma_bind_addr" + "CVE-2018-14610": { + "cmt_msg": "btrfs: Check that each block group has corresponding chunk at mount time" }, - "CVE-2021-3542": { - "cmt_msg": "" + "CVE-2018-14613": { + "cmt_msg": "btrfs: tree-checker: Verify block_group_item" }, - "CVE-2019-16413": { - "cmt_msg": "9p: use inode->i_lock to protect i_size_write() under 32-bit" + "CVE-2018-14612": { + "cmt_msg": "btrfs: tree-checker: Detect invalid and empty essential trees" }, - "CVE-2024-24860": { - "cmt_msg": "Bluetooth: Fix atomicity violation in {min,max}_key_size_set" + "CVE-2024-23848": { + "cmt_msg": "" }, - "CVE-2018-10876": { - "cmt_msg": "ext4: only look at the bg_flags field if it is valid" + "CVE-2020-27418": { + "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region" }, - "CVE-2023-2194": { - "cmt_msg": "i2c: xgene-slimpro: Fix out-of-bounds bug in xgene_slimpro_i2c_xfer()" + "CVE-2017-2618": { + "cmt_msg": "selinux: fix off-by-one in setprocattr" }, - "CVE-2022-1263": { - "cmt_msg": "KVM: avoid NULL pointer dereference in kvm_dirty_ring_push" + "CVE-2019-2025": { + "cmt_msg": "binder: fix race that allows malicious free of live buffer" }, - "CVE-2017-16650": { - "cmt_msg": "net: qmi_wwan: fix divide by 0 on bad descriptors" + "CVE-2019-2024": { + "cmt_msg": "media: em28xx: Fix use-after-free when disconnecting" }, - "CVE-2020-12653": { - "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_cmd_append_vsie_tlv()" + "CVE-2017-15951": { + "cmt_msg": "KEYS: Fix race between updating and finding a negative key" }, - "CVE-2023-32233": { - "cmt_msg": "netfilter: nf_tables: deactivate anonymous set from preparation phase" + "CVE-2019-19074": { + "cmt_msg": "ath9k: release allocated buffer if timed out" }, - "CVE-2019-7222": { - "cmt_msg": "KVM: x86: work around leak of uninitialized stack contents (CVE-2019-7222)" + "CVE-2019-19073": { + "cmt_msg": "ath9k_htc: release allocated buffer if timed out" }, - "CVE-2017-14051": { - "cmt_msg": "scsi: qla2xxx: Fix an integer overflow in sysfs code" + "CVE-2019-1125": { + "cmt_msg": "x86/speculation: Prepare entry code for Spectre v1 swapgs mitigations" }, - "CVE-2020-12654": { - "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_ret_wmm_get_status()" + "CVE-2023-31085": { + "cmt_msg": "ubi: Refuse attaching if mtd's erasesize is 0" }, - "CVE-2019-7221": { - "cmt_msg": "KVM: nVMX: unconditionally cancel preemption timer in free_nested (CVE-2019-7221)" + "CVE-2023-31084": { + "cmt_msg": "media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*()" }, - "CVE-2018-12929": { + "CVE-2023-31083": { + "cmt_msg": "Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO" + }, + "CVE-2023-31082": { "cmt_msg": "" }, - "CVE-2018-12928": { + "CVE-2023-31081": { "cmt_msg": "" }, - "CVE-2017-7645": { - "cmt_msg": "nfsd: check for oversized NFSv2/v3 arguments" + "CVE-2022-32296": { + "cmt_msg": "tcp: increase source port perturb table to 2^16" }, - "CVE-2020-36310": { - "cmt_msg": "KVM: SVM: avoid infinite loop on NPF from bad address" + "CVE-2020-28974": { + "cmt_msg": "vt: Disable KD_FONT_OP_COPY" }, - "CVE-2020-36313": { - "cmt_msg": "KVM: Fix out of range accesses to memslots" + "CVE-2019-20806": { + "cmt_msg": "media: tw5864: Fix possible NULL pointer dereference in tw5864_handle_frame" }, - "CVE-2020-35519": { - "cmt_msg": "net/x25: prevent a couple of overflows" + "CVE-2022-3028": { + "cmt_msg": "af_key: Do not call xfrm_probe_algs in parallel" }, - "CVE-2017-18241": { - "cmt_msg": "f2fs: fix a panic caused by NULL flush_cmd_control" + "CVE-2020-14304": { + "cmt_msg": "" }, - "CVE-2022-33740": { - "cmt_msg": "xen/netfront: fix leaking data in shared pages" + "CVE-2018-17972": { + "cmt_msg": "proc: restrict kernel stack dumps to root" }, - "CVE-2023-51782": { - "cmt_msg": "net/rose: Fix Use-After-Free in rose_ioctl" + "CVE-2022-33981": { + "cmt_msg": "floppy: disable FDRAWCMD by default" }, - "CVE-2021-28971": { - "cmt_msg": "perf/x86/intel: Fix a crash caused by zero PEBS status" + "CVE-2017-16995": { + "cmt_msg": "bpf: fix incorrect sign extension in check_alu_op()" }, - "CVE-2020-10708": { - "cmt_msg": "" + "CVE-2017-16994": { + "cmt_msg": "mm/pagewalk.c: report holes in hugetlb ranges" }, - "CVE-2020-25673": { - "cmt_msg": "nfc: Avoid endless loops caused by repeated llcp_sock_connect()" + "CVE-2017-2583": { + "cmt_msg": "KVM: x86: fix emulation of \"MOV SS, null selector\"" }, - "CVE-2022-0400": { - "cmt_msg": "" + "CVE-2017-2584": { + "cmt_msg": "KVM: x86: Introduce segmented_write_std" }, - "CVE-2022-45886": { - "cmt_msg": "media: dvb-core: Fix use-after-free due on race condition at dvb_net" + "CVE-2017-6001": { + "cmt_msg": "perf/core: Fix concurrent sys_perf_event_open() vs. 'move_group' race" }, - "CVE-2021-38160": { - "cmt_msg": "virtio_console: Assure used length from device is limited" + "CVE-2017-17558": { + "cmt_msg": "USB: core: prevent malicious bNumInterfaces overflow" }, - "CVE-2021-42739": { - "cmt_msg": "media: firewire: firedtv-avc: fix a buffer overflow in avc_ca_pmt()" + "CVE-2023-1390": { + "cmt_msg": "tipc: fix NULL deref in tipc_link_xmit()" }, - "CVE-2022-3344": { - "cmt_msg": "KVM: x86: nSVM: harden svm_free_nested against freeing vmcb02 while still in use" + "CVE-2020-10751": { + "cmt_msg": "selinux: properly handle multiple messages in selinux_netlink_send()" }, - "CVE-2022-3111": { - "cmt_msg": "power: supply: wm8350-power: Add missing free in free_charger_irq" + "CVE-2020-10757": { + "cmt_msg": "mm: Fix mremap not considering huge pmd devmap" }, - "CVE-2018-5344": { - "cmt_msg": "loop: fix concurrent lo_open/lo_release" + "CVE-2022-1116": { + "cmt_msg": "" }, - "CVE-2020-12770": { - "cmt_msg": "scsi: sg: add sg_remove_request in sg_write" + "CVE-2021-28660": { + "cmt_msg": "staging: rtl8188eu: prevent ->ssid overflow in rtw_wx_set_scan()" }, - "CVE-2017-15115": { - "cmt_msg": "sctp: do not peel off an assoc from one netns to another one" + "CVE-2017-6348": { + "cmt_msg": "irda: Fix lockdep annotations in hashbin_delete()." + }, + "CVE-2020-36386": { + "cmt_msg": "Bluetooth: Fix slab-out-of-bounds read in hci_extended_inquiry_result_evt()" + }, + "CVE-2017-6345": { + "cmt_msg": "net/llc: avoid BUG_ON() in skb_orphan()" }, - "CVE-2019-15222": { - "cmt_msg": "ALSA: usb-audio: Fix gpf in snd_usb_pipe_sanity_check" + "CVE-2017-6346": { + "cmt_msg": "packet: fix races in fanout_add()" }, - "CVE-2016-9806": { - "cmt_msg": "netlink: Fix dump skb leak/double free" + "CVE-2017-6347": { + "cmt_msg": "ip: fix IP_CHECKSUM handling" }, - "CVE-2024-25744": { - "cmt_msg": "x86/coco: Disable 32-bit emulation by default on TDX and SEV" + "CVE-2018-9385": { + "cmt_msg": "ARM: amba: Don't read past the end of sysfs \"driver_override\" buffer" }, - "CVE-2022-25265": { - "cmt_msg": "" + "CVE-2020-0009": { + "cmt_msg": "staging: android: ashmem: Disallow ashmem memory from being remapped" }, - "CVE-2022-20368": { - "cmt_msg": "net/packet: fix slab-out-of-bounds access in packet_recvmsg()" + "CVE-2019-14615": { + "cmt_msg": "drm/i915/gen9: Clear residual context state on context switch" }, - "CVE-2017-12153": { - "cmt_msg": "nl80211: check for the required netlink attributes presence" + "CVE-2018-9415": { + "cmt_msg": "ARM: amba: Fix race condition with driver_override" }, - "CVE-2019-19813": { - "cmt_msg": "btrfs: inode: Verify inode mode to avoid NULL pointer dereference" + "CVE-2019-13648": { + "cmt_msg": "powerpc/tm: Fix oops on sigreturn on systems without TM" }, - "CVE-2017-12154": { - "cmt_msg": "kvm: nVMX: Don't allow L2 to access the hardware CR8" + "CVE-2018-15572": { + "cmt_msg": "x86/speculation: Protect against userspace-userspace spectreRSB" }, - "CVE-2020-10773": { - "cmt_msg": "s390/cmm: fix information leak in cmm_timeout_handler()" + "CVE-2022-1204": { + "cmt_msg": "ax25: Fix refcount leaks caused by ax25_cb_del()" }, - "CVE-2022-21499": { - "cmt_msg": "lockdown: also lock down previous kgdb use" + "CVE-2018-9363": { + "cmt_msg": "Bluetooth: hidp: buffer overflow in hidp_process_report" }, - "CVE-2016-1583": { - "cmt_msg": "proc: prevent stacking filesystems on top" + "CVE-2016-10723": { + "cmt_msg": "mm, oom: remove sleep from under oom_lock" }, - "CVE-2023-4208": { - "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free" + "CVE-2022-26490": { + "cmt_msg": "nfc: st21nfca: Fix potential buffer overflows in EVT_TRANSACTION" }, - "CVE-2017-1000379": { - "cmt_msg": "mm: larger stack guard gap, between vmas" + "CVE-2020-8832": { + "cmt_msg": "drm/i915: Record the default hw state after reset upon load" }, - "CVE-2023-4206": { - "cmt_msg": "net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free" + "CVE-2023-52531": { + "cmt_msg": "wifi: iwlwifi: mvm: Fix a memory corruption issue" }, - "CVE-2023-4207": { - "cmt_msg": "net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free" + "CVE-2023-52532": { + "cmt_msg": "net: mana: Fix TX CQE error handling" }, - "CVE-2023-3640": { - "cmt_msg": "" + "CVE-2016-7039": { + "cmt_msg": "net: add recursion limit to GRO" }, - "CVE-2017-1000371": { - "cmt_msg": "binfmt_elf: use ELF_ET_DYN_BASE only for PIE" + "CVE-2023-39189": { + "cmt_msg": "netfilter: nfnetlink_osf: avoid OOB read" }, - "CVE-2017-1000370": { - "cmt_msg": "binfmt_elf: use ELF_ET_DYN_BASE only for PIE" + "CVE-2024-26677": { + "cmt_msg": "rxrpc: Fix delayed ACKs to not set the reference serial number" }, - "CVE-2023-20593": { - "cmt_msg": "x86/cpu/amd: Add a Zenbleed fix" + "CVE-2020-25211": { + "cmt_msg": "netfilter: ctnetlink: add a range check for l3/l4 protonum" }, - "CVE-2019-18675": { - "cmt_msg": "mmap: introduce sane default mmap limits" + "CVE-2020-25212": { + "cmt_msg": "nfs: Fix getxattr kernel panic and memory overflow" }, - "CVE-2023-3022": { - "cmt_msg": "ipv6: Use result arg in fib_lookup_arg consistently" + "CVE-2020-28374": { + "cmt_msg": "scsi: target: Fix XCOPY NAA identifier lookup" }, - "CVE-2022-2663": { - "cmt_msg": "netfilter: nf_conntrack_irc: Fix forged IP logic" + "CVE-2024-26672": { + "cmt_msg": "drm/amdgpu: Fix variable 'mca_funcs' dereferenced before NULL check in 'amdgpu_mca_smu_get_mca_entry()'" }, - "CVE-2020-24503": { - "cmt_msg": "" + "CVE-2024-26671": { + "cmt_msg": "blk-mq: fix IO hang from sbitmap wakeup race" }, - "CVE-2023-51780": { - "cmt_msg": "atm: Fix Use-After-Free in do_vcc_ioctl" + "CVE-2024-26679": { + "cmt_msg": "inet: read sk->sk_family once in inet_recv_error()" }, - "CVE-2023-0047": { - "cmt_msg": "mm, oom: do not trigger out_of_memory from the #PF" + "CVE-2023-52458": { + "cmt_msg": "block: add check that partition length needs to be aligned with block size" }, - "CVE-2020-29370": { - "cmt_msg": "mm: slub: add missing TID bump in kmem_cache_alloc_bulk()" + "CVE-2023-52451": { + "cmt_msg": "powerpc/pseries/memhp: Fix access beyond end of drmem array" }, - "CVE-2019-15219": { - "cmt_msg": "USB: sisusbvga: fix oops in error path of sisusb_probe" + "CVE-2018-9568": { + "cmt_msg": "net: Set sk_prot_creator when cloning sockets to the right proto" }, - "CVE-2022-20424": { - "cmt_msg": "io_uring: remove io_identity" + "CVE-2022-0644": { + "cmt_msg": "vfs: check fd has read access in kernel_read_file_from_fd()" }, - "CVE-2022-20422": { - "cmt_msg": "arm64: fix oops in concurrently setting insn_emulation sysctls" + "CVE-2019-14816": { + "cmt_msg": "mwifiex: Fix three heap overflow at parsing element in cfg80211_ap_settings" }, - "CVE-2017-5549": { - "cmt_msg": "USB: serial: kl5kusb105: fix line-state error handling" + "CVE-2019-14814": { + "cmt_msg": "mwifiex: Fix three heap overflow at parsing element in cfg80211_ap_settings" }, - "CVE-2017-5547": { - "cmt_msg": "HID: corsair: fix DMA buffers on stack" + "CVE-2024-26700": { + "cmt_msg": "drm/amd/display: Fix MST Null Ptr for RV" }, - "CVE-2020-25643": { - "cmt_msg": "hdlc_ppp: add range checks in ppp_cp_parse_cr()" + "CVE-2024-26706": { + "cmt_msg": "parisc: Fix random data corruption from exception handler" }, - "CVE-2023-4387": { - "cmt_msg": "net: vmxnet3: fix possible use-after-free bugs in vmxnet3_rq_alloc_rx_buf()" + "CVE-2024-26704": { + "cmt_msg": "ext4: fix double-free of blocks due to wrong extents moved_len" }, - "CVE-2024-24858": { - "cmt_msg": "" + "CVE-2020-25672": { + "cmt_msg": "nfc: fix memory leak in llcp_sock_connect()" }, - "CVE-2019-19378": { - "cmt_msg": "" + "CVE-2020-25673": { + "cmt_msg": "nfc: Avoid endless loops caused by repeated llcp_sock_connect()" }, - "CVE-2020-4788": { - "cmt_msg": "powerpc/64s: flush L1D on kernel entry" + "CVE-2020-25670": { + "cmt_msg": "nfc: fix refcount leak in llcp_sock_bind()" }, - "CVE-2022-36879": { - "cmt_msg": "xfrm: xfrm_policy: fix a possible double xfrm_pols_put() in xfrm_bundle_lookup()" + "CVE-2020-25671": { + "cmt_msg": "nfc: fix refcount leak in llcp_sock_connect()" }, - "CVE-2017-8831": { - "cmt_msg": "[media] saa7164: fix double fetch PCIe access condition" + "CVE-2019-19813": { + "cmt_msg": "btrfs: inode: Verify inode mode to avoid NULL pointer dereference" }, - "CVE-2021-39698": { - "cmt_msg": "wait: add wake_up_pollfree()" + "CVE-2020-29374": { + "cmt_msg": "gup: document and work around \"COW can break either way\" issue" }, - "CVE-2022-45934": { - "cmt_msg": "Bluetooth: L2CAP: Fix u8 overflow" + "CVE-2019-19815": { + "cmt_msg": "f2fs: support swap file w/ DIO" }, - "CVE-2018-5333": { - "cmt_msg": "RDS: null pointer dereference in rds_atomic_free_op" + "CVE-2019-19814": { + "cmt_msg": "" }, - "CVE-2018-5332": { - "cmt_msg": "RDS: Heap OOB write in rds_message_alloc_sgs()" + "CVE-2020-29371": { + "cmt_msg": "romfs: fix uninitialized memory leak in romfs_dev_read()" }, - "CVE-2022-2380": { - "cmt_msg": "video: fbdev: sm712fb: Fix crash in smtcfb_read()" + "CVE-2019-19816": { + "cmt_msg": "btrfs: inode: Verify inode mode to avoid NULL pointer dereference" }, - "CVE-2023-20569": { - "cmt_msg": "x86/bugs: Increase the x86 bugs vector size to two u32s" + "CVE-2018-18710": { + "cmt_msg": "cdrom: fix improper type cast, which can leat to information leak." }, - "CVE-2017-7482": { - "cmt_msg": "rxrpc: Fix several cases where a padded len isn't checked in ticket decode" + "CVE-2023-34255": { + "cmt_msg": "xfs: verify buffer contents when we skip log replay" }, - "CVE-2020-10767": { - "cmt_msg": "x86/speculation: Avoid force-disabling IBPB based on STIBP and enhanced IBRS." + "CVE-2017-14051": { + "cmt_msg": "scsi: qla2xxx: Fix an integer overflow in sysfs code" }, - "CVE-2021-3759": { - "cmt_msg": "memcg: enable accounting of ipc resources" + "CVE-2023-3141": { + "cmt_msg": "memstick: r592: Fix UAF bug in r592_remove due to race condition" }, - "CVE-2019-19447": { - "cmt_msg": "ext4: work around deleting a file with i_nlink == 0 safely" + "CVE-2023-34256": { + "cmt_msg": "ext4: avoid a potential slab-out-of-bounds in ext4_group_desc_csum" }, - "CVE-2017-17448": { - "cmt_msg": "netfilter: nfnetlink_cthelper: Add missing permission checks" + "CVE-2022-3524": { + "cmt_msg": "tcp/udp: Fix memory leak in ipv6_renew_options()." }, - "CVE-2017-17449": { - "cmt_msg": "netlink: Add netns check on taps" + "CVE-2022-3523": { + "cmt_msg": "mm/memory.c: fix race when faulting a device private page" }, - "CVE-2017-9150": { - "cmt_msg": "bpf: don't let ldimm64 leak map addresses on unprivileged" + "CVE-2022-3522": { + "cmt_msg": "mm/hugetlb: use hugetlb_pte_stable in migration race check" }, - "CVE-2019-19524": { - "cmt_msg": "Input: ff-memless - kill timer in destroy()" + "CVE-2022-3521": { + "cmt_msg": "kcm: avoid potential race in kcm_tx_work" }, - "CVE-2019-19448": { - "cmt_msg": "btrfs: only search for left_info if there is no right_info in try_merge_free_space" + "CVE-2018-7755": { + "cmt_msg": "floppy: Do not copy a kernel pointer to user memory in FDGETPRM ioctl" }, - "CVE-2019-19449": { - "cmt_msg": "f2fs: fix to do sanity check on segment/section count" + "CVE-2017-7346": { + "cmt_msg": "drm/vmwgfx: limit the number of mip levels in vmw_gb_surface_define_ioctl()" }, - "CVE-2023-31085": { - "cmt_msg": "ubi: Refuse attaching if mtd's erasesize is 0" + "CVE-2018-7757": { + "cmt_msg": "scsi: libsas: fix memory leak in sas_smp_get_phy_events()" }, - "CVE-2019-19523": { - "cmt_msg": "USB: adutux: fix use-after-free on disconnect" + "CVE-2022-0330": { + "cmt_msg": "drm/i915: Flush TLBs before releasing backing store" }, - "CVE-2021-3752": { - "cmt_msg": "Bluetooth: fix use-after-free error in lock_sock_nested()" + "CVE-2022-4095": { + "cmt_msg": "staging: rtl8712: fix use after free bugs" }, - "CVE-2017-10663": { - "cmt_msg": "f2fs: sanity check checkpoint segno and blkoff" + "CVE-2017-10911": { + "cmt_msg": "xen-blkback: don't leak stack data via response ring" }, - "CVE-2017-18360": { - "cmt_msg": "USB: serial: io_ti: fix div-by-zero in set_termios" + "CVE-2022-45919": { + "cmt_msg": "media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221" }, - "CVE-2018-5848": { - "cmt_msg": "wil6210: missing length check in wmi_set_ie" + "CVE-2018-5873": { + "cmt_msg": "nsfs: mark dentry with DCACHE_RCUACCESS" }, - "CVE-2017-18249": { - "cmt_msg": "f2fs: fix race condition in between free nid allocator/initializer" + "CVE-2021-3669": { + "cmt_msg": "ipc: replace costly bailout check in sysvipc_find_ipc()" }, - "CVE-2017-7261": { - "cmt_msg": "drm/vmwgfx: NULL pointer dereference in vmw_surface_define_ioctl()" + "CVE-2019-3701": { + "cmt_msg": "can: gw: ensure DLC boundaries after CAN frame modification" }, - "CVE-2016-5244": { - "cmt_msg": "rds: fix an infoleak in rds_inc_info_copy" + "CVE-2023-1095": { + "cmt_msg": "netfilter: nf_tables: fix null deref due to zeroed list head" }, - "CVE-2016-5243": { - "cmt_msg": "tipc: fix an infoleak in tipc_nl_compat_link_dump" + "CVE-2022-3239": { + "cmt_msg": "media: em28xx: initialize refcount before kref_get" }, - "CVE-2019-15216": { - "cmt_msg": "USB: yurex: Fix protection fault after device removal" + "CVE-2022-4543": { + "cmt_msg": "" }, - "CVE-2022-47929": { - "cmt_msg": "net: sched: disallow noqueue for qdisc classes" + "CVE-2017-11089": { + "cmt_msg": "cfg80211: Define nla_policy for NL80211_ATTR_LOCAL_MESH_POWER_MODE" }, - "CVE-2019-16746": { - "cmt_msg": "nl80211: validate beacon head" + "CVE-2019-18282": { + "cmt_msg": "net/flow_dissector: switch to siphash" }, - "CVE-2022-3606": { - "cmt_msg": "" + "CVE-2021-34981": { + "cmt_msg": "Bluetooth: cmtp: fix file refcount when cmtp_attach_device fails" }, - "CVE-2019-15215": { - "cmt_msg": "media: cpia2_usb: first wake up, then free in disconnect" + "CVE-2023-4881": { + "cmt_msg": "netfilter: nftables: exthdr: fix 4-byte stack OOB write" }, - "CVE-2022-2209": { + "CVE-2013-7445": { "cmt_msg": "" }, - "CVE-2018-18021": { - "cmt_msg": "arm64: KVM: Tighten guest core register access from userspace" + "CVE-2024-26804": { + "cmt_msg": "net: ip_tunnel: prevent perpetual headroom growth" }, - "CVE-2021-37576": { - "cmt_msg": "KVM: PPC: Book3S: Fix H_RTAS rets buffer overflow" + "CVE-2022-3303": { + "cmt_msg": "ALSA: pcm: oss: Fix race at SNDCTL_DSP_SYNC" }, - "CVE-2023-7042": { - "cmt_msg": "" + "CVE-2021-37159": { + "cmt_msg": "usb: hso: fix error handling code of hso_create_net_device" }, - "CVE-2023-45871": { - "cmt_msg": "igb: set max size RX buffer when store bad packet is enabled" + "CVE-2024-0607": { + "cmt_msg": "netfilter: nf_tables: fix pointer math issue in nft_byteorder_eval()" }, - "CVE-2016-4569": { - "cmt_msg": "ALSA: timer: Fix leak in SNDRV_TIMER_IOCTL_PARAMS" + "CVE-2024-26801": { + "cmt_msg": "Bluetooth: Avoid potential use-after-free in hci_error_reset" }, - "CVE-2023-46343": { - "cmt_msg": "nfc: nci: fix possible NULL pointer dereference in send_acknowledge()" + "CVE-2022-28388": { + "cmt_msg": "can: usb_8dev: usb_8dev_start_xmit(): fix double dev_kfree_skb() in error path" }, - "CVE-2022-3594": { - "cmt_msg": "r8152: Rate limit overflow messages" + "CVE-2017-15115": { + "cmt_msg": "sctp: do not peel off an assoc from one netns to another one" }, - "CVE-2018-14609": { - "cmt_msg": "btrfs: relocation: Only remove reloc rb_trees if reloc control has been initialized" + "CVE-2018-1000004": { + "cmt_msg": "ALSA: seq: Make ioctls race-free" }, - "CVE-2022-27672": { - "cmt_msg": "x86/speculation: Identify processors vulnerable to SMT RSB predictions" + "CVE-2023-52607": { + "cmt_msg": "powerpc/mm: Fix null-pointer dereference in pgtable_cache_add" }, - "CVE-2021-33098": { - "cmt_msg": "ixgbe: fix large MTU request from VF" + "CVE-2019-20811": { + "cmt_msg": "net-sysfs: call dev_hold if kobject_init_and_add success" }, - "CVE-2022-3595": { - "cmt_msg": "cifs: fix double-fault crash during ntlmssp" + "CVE-2019-20810": { + "cmt_msg": "media: go7007: fix a miss of snd_card_free" }, - "CVE-2023-47233": { - "cmt_msg": "" + "CVE-2019-20812": { + "cmt_msg": "af_packet: set defaule value for tmo" }, - "CVE-2020-10769": { - "cmt_msg": "crypto: authenc - fix parsing key with misaligned rta_len" + "CVE-2020-14314": { + "cmt_msg": "ext4: fix potential negative array index in do_split()" }, - "CVE-2023-6606": { - "cmt_msg": "smb: client: fix OOB in smbCalcSize()" + "CVE-2019-18660": { + "cmt_msg": "powerpc/book3s64: Fix link stack flush on context switch" }, - "CVE-2018-5803": { - "cmt_msg": "sctp: verify size of a new chunk in _sctp_make_chunk()" + "CVE-2019-12380": { + "cmt_msg": "efi/x86/Add missing error handling to old_memmap 1:1 mapping code" }, - "CVE-2020-27815": { - "cmt_msg": "jfs: Fix array index bounds check in dbAdjTree" + "CVE-2019-12381": { + "cmt_msg": "ip_sockglue: Fix missing-check bug in ip_ra_control()" }, - "CVE-2021-45486": { - "cmt_msg": "inet: use bigger hash table for IP ID generation" + "CVE-2019-12382": { + "cmt_msg": "drm/edid: Fix a missing-check bug in drm_load_edid_firmware()" }, - "CVE-2022-1462": { - "cmt_msg": "tty: use new tty_insert_flip_string_and_push_buffer() in pty_write()" + "CVE-2020-10766": { + "cmt_msg": "x86/speculation: Prevent rogue cross-process SSBD shutdown" }, - "CVE-2022-27223": { - "cmt_msg": "USB: gadget: validate endpoint index for xilinx udc" + "CVE-2020-10767": { + "cmt_msg": "x86/speculation: Avoid force-disabling IBPB based on STIBP and enhanced IBRS." }, - "CVE-2020-27067": { - "cmt_msg": "l2tp: fix l2tp_eth module loading" + "CVE-2019-25162": { + "cmt_msg": "i2c: Fix a potential use after free" }, - "CVE-2020-27777": { - "cmt_msg": "powerpc/rtas: Restrict RTAS requests from userspace" + "CVE-2019-25160": { + "cmt_msg": "netlabel: fix out-of-bounds memory accesses" }, - "CVE-2019-20636": { - "cmt_msg": "Input: add safety guards to input_set_keycode()" + "CVE-2020-10768": { + "cmt_msg": "x86/speculation: PR_SPEC_FORCE_DISABLE enforcement for indirect branches." }, - "CVE-2019-11486": { - "cmt_msg": "tty: mark Siemens R3964 line discipline as BROKEN" + "CVE-2020-10769": { + "cmt_msg": "crypto: authenc - fix parsing key with misaligned rta_len" }, - "CVE-2019-11487": { - "cmt_msg": "fs: prevent page refcount overflow in pipe_buf_get" + "CVE-2020-10942": { + "cmt_msg": "vhost: Check docket sk_family instead of call getname" }, - "CVE-2018-8043": { - "cmt_msg": "net: phy: mdio-bcm-unimac: fix potential NULL dereference in unimac_mdio_probe()" + "CVE-2020-26139": { + "cmt_msg": "mac80211: do not accept/forward invalid EAPOL frames" }, - "CVE-2020-27675": { - "cmt_msg": "xen/events: avoid removing an event channel while handling it" + "CVE-2019-19536": { + "cmt_msg": "can: peak_usb: pcan_usb_pro: Fix info-leaks to USB devices" }, - "CVE-2020-28915": { - "cmt_msg": "fbcon: Fix global-out-of-bounds read in fbcon_get_font()" + "CVE-2019-19537": { + "cmt_msg": "USB: core: Fix races in character device registration and deregistraion" }, - "CVE-2023-7192": { - "cmt_msg": "netfilter: ctnetlink: fix possible refcount leak in ctnetlink_create_conntrack()" + "CVE-2019-19534": { + "cmt_msg": "can: peak_usb: fix slab info leak" }, - "CVE-2019-20908": { - "cmt_msg": "efi: Restrict efivar_ssdt_load when the kernel is locked down" + "CVE-2019-19535": { + "cmt_msg": "can: peak_usb: pcan_usb_fd: Fix info-leaks to USB devices" }, - "CVE-2023-3776": { - "cmt_msg": "net/sched: cls_fw: Fix improper refcount update leads to use-after-free" + "CVE-2020-11565": { + "cmt_msg": "mm: mempolicy: require at least one nodeid for MPOL_PREFERRED" }, - "CVE-2021-28038": { - "cmt_msg": "Xen/gnttab: handle p2m update errors on a per-slot basis" + "CVE-2019-19533": { + "cmt_msg": "media: ttusb-dec: Fix info-leak in ttusb_dec_send_command()" }, - "CVE-2020-27068": { - "cmt_msg": "cfg80211: add missing policy for NL80211_ATTR_STATUS_CODE" + "CVE-2019-19530": { + "cmt_msg": "usb: cdc-acm: make sure a refcount is taken early enough" }, - "CVE-2022-23040": { - "cmt_msg": "xen/xenbus: don't let xenbus_grant_ring() remove grants in error case" + "CVE-2019-19531": { + "cmt_msg": "usb: yurex: Fix use-after-free in yurex_delete" }, - "CVE-2021-29154": { - "cmt_msg": "bpf, x86: Validate computation of branch displacements for x86-64" + "CVE-2017-18257": { + "cmt_msg": "f2fs: fix a dead loop in f2fs_fiemap()" }, - "CVE-2023-52435": { - "cmt_msg": "net: prevent mss overflow in skb_segment()" + "CVE-2017-18255": { + "cmt_msg": "perf/core: Fix the perf_cpu_time_max_percent check" }, - "CVE-2023-52434": { - "cmt_msg": "smb: client: fix potential OOBs in smb2_parse_contexts()" + "CVE-2023-52527": { + "cmt_msg": "ipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data()" }, - "CVE-2021-45469": { - "cmt_msg": "f2fs: fix to do sanity check on last xattr entry in __f2fs_setxattr()" + "CVE-2023-3006": { + "cmt_msg": "arm64: Add AMPERE1 to the Spectre-BHB affected list" }, - "CVE-2023-52436": { - "cmt_msg": "f2fs: explicitly null-terminate the xattr list" + "CVE-2023-52522": { + "cmt_msg": "net: fix possible store tearing in neigh_periodic_work()" }, - "CVE-2019-19060": { - "cmt_msg": "iio: imu: adis16400: release allocated memory on failure" + "CVE-2023-52528": { + "cmt_msg": "net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg" }, - "CVE-2019-19061": { - "cmt_msg": "iio: imu: adis16400: fix memory leak" + "CVE-2020-0305": { + "cmt_msg": "chardev: Avoid potential use-after-free in 'chrdev_open()'" }, - "CVE-2019-19062": { - "cmt_msg": "crypto: user - fix memory leak in crypto_report" + "CVE-2023-39198": { + "cmt_msg": "drm/qxl: fix UAF on handle creation" }, - "CVE-2019-19063": { - "cmt_msg": "rtlwifi: prevent memory leak in rtl_usb_probe" + "CVE-2023-39194": { + "cmt_msg": "net: xfrm: Fix xfrm_address_filter OOB read" }, - "CVE-2017-17741": { - "cmt_msg": "KVM: Fix stack-out-of-bounds read in write_mmio" + "CVE-2023-39197": { + "cmt_msg": "netfilter: conntrack: dccp: copy entire header to stack buffer, not just basic one" }, - "CVE-2019-9445": { - "cmt_msg": "f2fs: check if file namelen exceeds max value" + "CVE-2023-39193": { + "cmt_msg": "netfilter: xt_sctp: validate the flag_info count" }, - "CVE-2019-19066": { - "cmt_msg": "scsi: bfa: release allocated memory in case of error" + "CVE-2023-39192": { + "cmt_msg": "netfilter: xt_u32: validate user space input" }, - "CVE-2019-19068": { - "cmt_msg": "rtl8xxxu: prevent leaking urb" + "CVE-2024-26600": { + "cmt_msg": "phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP" }, - "CVE-2017-7184": { - "cmt_msg": "xfrm_user: validate XFRM_MSG_NEWAE XFRMA_REPLAY_ESN_VAL replay_window" + "CVE-2024-26606": { + "cmt_msg": "binder: signal epoll threads of self-work" }, - "CVE-2017-7187": { - "cmt_msg": "scsi: sg: check length passed to SG_NEXT_CMD_LEN" + "CVE-2017-14156": { + "cmt_msg": "video: fbdev: aty: do not leak uninitialized padding in clk to userspace" }, - "CVE-2020-0435": { - "cmt_msg": "f2fs: fix to do sanity check with i_extra_isize" + "CVE-2023-52429": { + "cmt_msg": "dm: limit the number of targets and parameter size area" }, - "CVE-2020-0432": { - "cmt_msg": "staging: most: net: fix buffer overflow" + "CVE-2022-1652": { + "cmt_msg": "floppy: use a statically allocated error counter" }, - "CVE-2020-0433": { - "cmt_msg": "blk-mq: sync the update nr_hw_queues with blk_mq_queue_tag_busy_iter" + "CVE-2020-29568": { + "cmt_msg": "xen/xenbus: Allow watches discard events before queueing" }, - "CVE-2023-51779": { - "cmt_msg": "Bluetooth: af_bluetooth: Fix Use-After-Free in bt_sock_recvmsg" + "CVE-2016-8660": { + "cmt_msg": "" }, - "CVE-2019-3874": { - "cmt_msg": "sctp: implement memory accounting on tx path" + "CVE-2019-13272": { + "cmt_msg": "ptrace: Fix ->ptracer_cred handling for PTRACE_TRACEME" }, - "CVE-2018-10877": { - "cmt_msg": "ext4: verify the depth of extent tree in ext4_find_extent()" + "CVE-2022-1786": { + "cmt_msg": "io_uring: remove io_identity" }, - "CVE-2016-8650": { - "cmt_msg": "mpi: Fix NULL ptr dereference in mpi_powm() " + "CVE-2020-25669": { + "cmt_msg": "Input: sunkbd - avoid use-after-free in teardown paths" }, - "CVE-2010-4563": { + "CVE-2020-25668": { + "cmt_msg": "tty: make FONTX ioctl use the tty pointer they were actually passed" + }, + "CVE-2008-4609": { "cmt_msg": "" }, - "CVE-2016-8655": { - "cmt_msg": "packet: fix race condition in packet_set_ring" + "CVE-2023-26607": { + "cmt_msg": "ntfs: fix out-of-bounds read in ntfs_attr_find()" }, - "CVE-2020-14331": { - "cmt_msg": "vgacon: Fix for missing check in scrollback handling" + "CVE-2021-4037": { + "cmt_msg": "xfs: fix up non-directory creation in SGID directories" }, - "CVE-2016-8658": { - "cmt_msg": "brcmfmac: avoid potential stack overflow in brcmf_cfg80211_start_ap()" + "CVE-2021-22543": { + "cmt_msg": "KVM: do not allow mapping valid but non-reference-counted pages" }, - "CVE-2018-10879": { - "cmt_msg": "ext4: make sure bitmaps and the inode table don't overlap with bg descriptors" + "CVE-2018-18386": { + "cmt_msg": "n_tty: fix EXTPROC vs ICANON interaction with TIOCINQ (aka FIONREAD)" }, - "CVE-2018-10878": { - "cmt_msg": "ext4: always check block group bounds in ext4_init_block_bitmap()" + "CVE-2021-47169": { + "cmt_msg": "serial: rp2: use 'request_firmware' instead of 'request_firmware_nowait'" }, - "CVE-2024-23851": { - "cmt_msg": "dm: limit the number of targets and parameter size area" + "CVE-2016-8405": { + "cmt_msg": "fbdev: color map copying bounds checking" }, - "CVE-2023-0266": { - "cmt_msg": "ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF" + "CVE-2023-3776": { + "cmt_msg": "net/sched: cls_fw: Fix improper refcount update leads to use-after-free" }, - "CVE-2023-1838": { - "cmt_msg": "Fix double fget() in vhost_net_set_backend()" + "CVE-2017-9242": { + "cmt_msg": "ipv6: fix out of bound writes in __ip6_append_data()" }, - "CVE-2021-3483": { - "cmt_msg": "firewire: nosy: Fix a use-after-free bug in nosy_ioctl()" + "CVE-2023-3772": { + "cmt_msg": "xfrm: add NULL check in xfrm_update_ae_params" }, - "CVE-2022-1419": { - "cmt_msg": "drm/vgem: Close use-after-free race in vgem_gem_create" + "CVE-2022-3533": { + "cmt_msg": "" }, - "CVE-2017-16913": { - "cmt_msg": "usbip: fix stub_rx: harden CMD_SUBMIT path to handle malicious input" + "CVE-2022-3534": { + "cmt_msg": "libbpf: Fix use-after-free in btf_dump_name_dups" }, - "CVE-2017-16912": { - "cmt_msg": "usbip: fix stub_rx: get_pipe() to validate endpoint number" + "CVE-2016-10088": { + "cmt_msg": "sg_write()/bsg_write() is not fit to be called under KERNEL_DS" }, - "CVE-2017-16911": { - "cmt_msg": "usbip: prevent vhci_hcd driver from leaking a socket pointer address" + "CVE-2021-4149": { + "cmt_msg": "btrfs: unlock newly allocated extent buffer after error" }, - "CVE-2017-0861": { - "cmt_msg": "ALSA: pcm: prevent UAF in snd_pcm_info" + "CVE-2022-21385": { + "cmt_msg": "net/rds: fix warn in rds_message_alloc_sgs" }, - "CVE-2020-25656": { - "cmt_msg": "vt: keyboard, extend func_buf_lock to readers" + "CVE-2021-47180": { + "cmt_msg": "NFC: nci: fix memory leak in nci_allocate_device" }, - "CVE-2017-16914": { - "cmt_msg": "usbip: fix stub_send_ret_submit() vulnerability to null transfer_buffer" + "CVE-2020-28097": { + "cmt_msg": "vgacon: remove software scrollback support" }, - "CVE-2023-1390": { - "cmt_msg": "tipc: fix NULL deref in tipc_link_xmit()" + "CVE-2017-7533": { + "cmt_msg": "dentry name snapshots" }, - "CVE-2022-0492": { - "cmt_msg": "cgroup-v1: Require capabilities to set release_agent" + "CVE-2018-8897": { + "cmt_msg": "x86/entry/64: Don't use IST entry for #BP stack" }, - "CVE-2024-26598": { - "cmt_msg": "KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache" + "CVE-2020-14416": { + "cmt_msg": "can, slip: Protect tty->disc_data in write_wakeup and close with RCU" }, - "CVE-2022-23042": { - "cmt_msg": "xen/netfront: react properly to failing gnttab_end_foreign_access_ref()" + "CVE-2021-46928": { + "cmt_msg": "parisc: Clear stale IIR value on instruction access rights trap" }, - "CVE-2019-10142": { - "cmt_msg": "drivers/virt/fsl_hypervisor.c: prevent integer overflow in ioctl" + "CVE-2018-14634": { + "cmt_msg": "exec: Limit arg stack to at most 75% of _STK_LIM" }, - "CVE-2021-4023": { - "cmt_msg": "io-wq: fix cancellation on create-worker failure" + "CVE-2018-14633": { + "cmt_msg": "scsi: target: iscsi: Use hex2bin instead of a re-implementation" }, - "CVE-2017-11176": { - "cmt_msg": "mqueue: fix a use-after-free in sys_mq_notify()" + "CVE-2021-46924": { + "cmt_msg": "NFC: st21nfca: Fix memory leak in device probe and remove" }, - "CVE-2023-3268": { - "cmt_msg": "relayfs: fix out-of-bounds access in relay_file_read" + "CVE-2021-46926": { + "cmt_msg": "ALSA: hda: intel-sdw-acpi: harden detection of controller" }, - "CVE-2017-12193": { - "cmt_msg": "assoc_array: Fix a buggy node-splitting case" + "CVE-2016-10318": { + "cmt_msg": "fscrypto: add authorization check for setting encryption policy" }, - "CVE-2017-12192": { - "cmt_msg": "KEYS: prevent KEYCTL_READ on negative key" + "CVE-2016-9755": { + "cmt_msg": "netfilter: ipv6: nf_defrag: drop mangled skb on ream error" }, - "CVE-2021-22555": { - "cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write" + "CVE-2016-9756": { + "cmt_msg": "KVM: x86: drop error recovery in em_jmp_far and em_ret_far" }, - "CVE-2017-12190": { - "cmt_msg": "fix unbalanced page refcounting in bio_map_user_iov" + "CVE-2017-2636": { + "cmt_msg": "tty: n_hdlc: get rid of racy n_hdlc.tbuf" }, - "CVE-2022-1011": { - "cmt_msg": "fuse: fix pipe buffer lifetime for direct_io" + "CVE-2023-1206": { + "cmt_msg": "tcp: Reduce chance of collisions in inet6_hashfn()." }, - "CVE-2021-0399": { + "CVE-2022-3649": { + "cmt_msg": "nilfs2: fix use-after-free bug of struct nilfs_root" + }, + "CVE-2022-3646": { + "cmt_msg": "nilfs2: fix leak of nilfs_root in case of writer thread creation failure" + }, + "CVE-2022-3642": { "cmt_msg": "" }, - "CVE-2020-36691": { - "cmt_msg": "netlink: limit recursion depth in policy validation" + "CVE-2022-3643": { + "cmt_msg": "xen/netback: Ensure protocol headers don't fall in the non-linear area" }, - "CVE-2023-3111": { - "cmt_msg": "btrfs: unset reloc control if transaction commit fails in prepare_to_relocate()" + "CVE-2021-1048": { + "cmt_msg": "fix regression in \"epoll: Keep a reference on files added to the check list\"" }, - "CVE-2020-2732": { - "cmt_msg": "KVM: nVMX: Don't emulate instructions in guest mode" + "CVE-2020-0543": { + "cmt_msg": "x86/cpu: Add 'table' argument to cpu_matches()" }, - "CVE-2016-5412": { - "cmt_msg": "KVM: PPC: Book3S HV: Pull out TM state save/restore into separate procedures" + "CVE-2024-25739": { + "cmt_msg": "" }, - "CVE-2012-4542": { + "CVE-2023-6535": { "cmt_msg": "" }, - "CVE-2022-1729": { - "cmt_msg": "perf: Fix sys_perf_event_open() race against self" + "CVE-2023-6536": { + "cmt_msg": "nvmet-tcp: fix a crash in nvmet_req_complete()" }, - "CVE-2023-42752": { - "cmt_msg": "igmp: limit igmpv3_newpack() packet size to IP_MAX_MTU" + "CVE-2019-11810": { + "cmt_msg": "scsi: megaraid_sas: return error when create DMA pool failed" }, - "CVE-2023-4128": { - "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free" + "CVE-2019-11815": { + "cmt_msg": "net: rds: force to destroy connection if t_sock is NULL in rds_tcp_kill_sock()." }, - "CVE-2018-1000028": { - "cmt_msg": "nfsd: auth: Fix gid sorting when rootsquash enabled" + "CVE-2022-36280": { + "cmt_msg": "drm/vmwgfx: Validate the box size for the snooped cursor" }, - "CVE-2023-1118": { - "cmt_msg": "media: rc: Fix use-after-free bugs caused by ene_tx_irqsim()" + "CVE-2024-21803": { + "cmt_msg": "" }, - "CVE-2018-7191": { - "cmt_msg": "tun: call dev_get_valid_name() before register_netdevice()" + "CVE-2018-7995": { + "cmt_msg": "x86/MCE: Serialize sysfs changes" }, - "CVE-2024-0607": { - "cmt_msg": "netfilter: nf_tables: fix pointer math issue in nft_byteorder_eval()" + "CVE-2018-16276": { + "cmt_msg": "USB: yurex: fix out-of-bounds uaccess in read handler" }, - "CVE-2022-44033": { - "cmt_msg": "char: pcmcia: remove all the drivers" + "CVE-2019-16413": { + "cmt_msg": "9p: use inode->i_lock to protect i_size_write() under 32-bit" }, - "CVE-2018-1000026": { - "cmt_msg": "bnx2x: disable GSO where gso_size is too big for hardware" + "CVE-2019-7222": { + "cmt_msg": "KVM: x86: work around leak of uninitialized stack contents (CVE-2019-7222)" }, - "CVE-2022-1975": { - "cmt_msg": "NFC: netlink: fix sleep in atomic bug when firmware download timeout" + "CVE-2019-7221": { + "cmt_msg": "KVM: nVMX: unconditionally cancel preemption timer in free_nested (CVE-2019-7221)" }, - "CVE-2023-1380": { - "cmt_msg": "wifi: brcmfmac: slab-out-of-bounds read in brcmf_get_assoc_ies()" + "CVE-2020-10773": { + "cmt_msg": "s390/cmm: fix information leak in cmm_timeout_handler()" }, - "CVE-2017-2596": { - "cmt_msg": "kvm: fix page struct leak in handle_vmon" + "CVE-2020-36780": { + "cmt_msg": "i2c: sprd: fix reference leak when pm_runtime_get_sync fails" }, - "CVE-2017-0786": { - "cmt_msg": "brcmfmac: add length check in brcmf_cfg80211_escan_handler()" + "CVE-2018-18281": { + "cmt_msg": "mremap: properly flush TLB before releasing the page" }, - "CVE-2021-28972": { - "cmt_msg": "PCI: rpadlpar: Fix potential drc_name corruption in store functions" + "CVE-2022-2663": { + "cmt_msg": "netfilter: nf_conntrack_irc: Fix forged IP logic" }, - "CVE-2018-12130": { - "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" + "CVE-2024-26803": { + "cmt_msg": "net: veth: clear GRO when clearing XDP even when down" }, - "CVE-2020-14305": { - "cmt_msg": "netfilter: helpers: remove data_len usage for inkernel helpers" + "CVE-2020-25643": { + "cmt_msg": "hdlc_ppp: add range checks in ppp_cp_parse_cr()" }, - "CVE-2021-20292": { - "cmt_msg": "drm/ttm/nouveau: don't call tt destroy callback on alloc failure." + "CVE-2020-4788": { + "cmt_msg": "powerpc/64s: flush L1D on kernel entry" }, - "CVE-2021-31916": { - "cmt_msg": "dm ioctl: fix out of bounds array access when no devices" + "CVE-2021-39698": { + "cmt_msg": "wait: add wake_up_pollfree()" }, - "CVE-2017-8065": { - "cmt_msg": "crypto: ccm - move cbcmac input off the stack" + "CVE-2018-5333": { + "cmt_msg": "RDS: null pointer dereference in rds_atomic_free_op" }, - "CVE-2017-8064": { - "cmt_msg": "[media] dvb-usb-v2: avoid use-after-free" + "CVE-2018-5332": { + "cmt_msg": "RDS: Heap OOB write in rds_message_alloc_sgs()" }, - "CVE-2018-13405": { - "cmt_msg": "Fix up non-directory creation in SGID directories" + "CVE-2021-3759": { + "cmt_msg": "memcg: enable accounting of ipc resources" }, - "CVE-2020-25645": { - "cmt_msg": "geneve: add transport ports in route lookup for geneve" + "CVE-2019-19528": { + "cmt_msg": "USB: iowarrior: fix use-after-free on disconnect" }, - "CVE-2018-13406": { - "cmt_msg": "video: uvesafb: Fix integer overflow in allocation" + "CVE-2017-17448": { + "cmt_msg": "netfilter: nfnetlink_cthelper: Add missing permission checks" }, - "CVE-2022-1280": { - "cmt_msg": "drm: avoid circular locks in drm_mode_getconnector" + "CVE-2017-17449": { + "cmt_msg": "netlink: Add netns check on taps" }, - "CVE-2023-3772": { - "cmt_msg": "xfrm: add NULL check in xfrm_update_ae_params" + "CVE-2019-19525": { + "cmt_msg": "ieee802154: atusb: fix use-after-free at disconnect" }, - "CVE-2020-11668": { - "cmt_msg": "media: xirlink_cit: add missing descriptor sanity checks" + "CVE-2019-19524": { + "cmt_msg": "Input: ff-memless - kill timer in destroy()" }, - "CVE-2020-11669": { - "cmt_msg": "powerpc/powernv/idle: Restore AMR/UAMOR/AMOR after idle" + "CVE-2019-19527": { + "cmt_msg": "HID: hiddev: do cleanup in failure of opening a device" }, - "CVE-2019-15118": { - "cmt_msg": "ALSA: usb-audio: Fix a stack buffer overflow bug in check_input_term" + "CVE-2021-3753": { + "cmt_msg": "vt_kdsetmode: extend console locking" }, - "CVE-2019-12818": { - "cmt_msg": "net: nfc: Fix NULL dereference on nfc_llcp_build_tlv fails" + "CVE-2021-3752": { + "cmt_msg": "Bluetooth: fix use-after-free error in lock_sock_nested()" }, - "CVE-2019-12819": { - "cmt_msg": "mdio_bus: Fix use-after-free on device_register fails" + "CVE-2023-7192": { + "cmt_msg": "netfilter: ctnetlink: fix possible refcount leak in ctnetlink_create_conntrack()" }, - "CVE-2023-0394": { - "cmt_msg": "ipv6: raw: Deduct extension header length in rawv6_push_pending_frames" + "CVE-2017-18249": { + "cmt_msg": "f2fs: fix race condition in between free nid allocator/initializer" }, - "CVE-2020-10690": { - "cmt_msg": "ptp: fix the race between the release of ptp_clock and cdev" + "CVE-2022-1263": { + "cmt_msg": "KVM: avoid NULL pointer dereference in kvm_dirty_ring_push" }, - "CVE-2022-36402": { - "cmt_msg": "drm/vmwgfx: Fix shader stage validation" + "CVE-2017-18241": { + "cmt_msg": "f2fs: fix a panic caused by NULL flush_cmd_control" }, - "CVE-2019-19332": { - "cmt_msg": "KVM: x86: fix out-of-bounds write in KVM_GET_EMULATED_CPUID (CVE-2019-19332)" + "CVE-2021-41864": { + "cmt_msg": "bpf: Fix integer overflow in prealloc_elems_and_freelist()" }, - "CVE-2019-15117": { - "cmt_msg": "ALSA: usb-audio: Fix an OOB bug in parse_audio_mixer_unit" + "CVE-2019-15215": { + "cmt_msg": "media: cpia2_usb: first wake up, then free in disconnect" }, - "CVE-2021-3659": { - "cmt_msg": "net: mac802154: Fix general protection fault" + "CVE-2022-2209": { + "cmt_msg": "" }, - "CVE-2022-25258": { - "cmt_msg": "USB: gadget: validate interface OS descriptor requests" + "CVE-2023-7042": { + "cmt_msg": "wifi: ath10k: fix NULL pointer dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev()" }, - "CVE-2021-4155": { - "cmt_msg": "xfs: map unwritten blocks in XFS_IOC_{ALLOC,FREE}SP just like fallocate" + "CVE-2023-52559": { + "cmt_msg": "iommu/vt-d: Avoid memory allocation in iommu_suspend()" }, - "CVE-2019-14901": { - "cmt_msg": "mwifiex: Fix heap overflow in mmwifiex_process_tdls_action_frame()" + "CVE-2023-47233": { + "cmt_msg": "wifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach" }, - "CVE-2021-4150": { - "cmt_msg": "block: fix incorrect references to disk objects" + "CVE-2022-1462": { + "cmt_msg": "tty: use new tty_insert_flip_string_and_push_buffer() in pty_write()" }, - "CVE-2020-3702": { - "cmt_msg": "ath: Use safer key clearing with key cache entries" + "CVE-2024-26614": { + "cmt_msg": "tcp: make sure init the accept_queue's spinlocks once" }, - "CVE-2020-16166": { - "cmt_msg": "random32: update the net random state on interrupt and activity" + "CVE-2019-20636": { + "cmt_msg": "Input: add safety guards to input_set_keycode()" }, - "CVE-2021-3653": { - "cmt_msg": "KVM: nSVM: avoid picking up unsupported bits from L2 in int_ctl (CVE-2021-3653)" + "CVE-2023-52434": { + "cmt_msg": "smb: client: fix potential OOBs in smb2_parse_contexts()" }, - "CVE-2021-3655": { - "cmt_msg": "sctp: validate from_addr_param return" + "CVE-2023-52436": { + "cmt_msg": "f2fs: explicitly null-terminate the xattr list" }, - "CVE-2020-8694": { - "cmt_msg": "powercap: restrict energy meter to root access" + "CVE-2023-51779": { + "cmt_msg": "Bluetooth: af_bluetooth: Fix Use-After-Free in bt_sock_recvmsg" }, - "CVE-2021-4159": { - "cmt_msg": "bpf: Verifer, adjust_scalar_min_max_vals to always call update_reg_bounds()" + "CVE-2018-10877": { + "cmt_msg": "ext4: verify the depth of extent tree in ext4_find_extent()" }, - "CVE-2019-12614": { - "cmt_msg": "powerpc/pseries/dlpar: Fix a missing check in dlpar_parse_cc_property()" + "CVE-2018-10876": { + "cmt_msg": "ext4: only look at the bg_flags field if it is valid" }, - "CVE-2019-12615": { - "cmt_msg": "mdesc: fix a missing-check bug in get_vdev_port_node_info()" + "CVE-2010-4563": { + "cmt_msg": "" }, - "CVE-2021-3715": { - "cmt_msg": "net_sched: cls_route: remove the right filter from hashtable" + "CVE-2016-8655": { + "cmt_msg": "packet: fix race condition in packet_set_ring" }, - "CVE-2021-3714": { - "cmt_msg": "" + "CVE-2023-2162": { + "cmt_msg": "scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress" }, - "CVE-2019-16230": { - "cmt_msg": "drm/amdkfd: fix a potential NULL pointer dereference (v2)" + "CVE-2016-8658": { + "cmt_msg": "brcmfmac: avoid potential stack overflow in brcmf_cfg80211_start_ap()" }, - "CVE-2019-16231": { - "cmt_msg": "fjes: Handle workqueue allocation failure" + "CVE-2018-10879": { + "cmt_msg": "ext4: make sure bitmaps and the inode table don't overlap with bg descriptors" }, - "CVE-2017-12168": { - "cmt_msg": "arm64: KVM: pmu: Fix AArch32 cycle counter access" + "CVE-2019-14835": { + "cmt_msg": "vhost: make sure log_num < in_num" }, - "CVE-2019-16233": { - "cmt_msg": "scsi: qla2xxx: fix a potential NULL pointer dereference" + "CVE-2023-4622": { + "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES" }, - "CVE-2019-16234": { - "cmt_msg": "iwlwifi: pcie: fix rb_allocator workqueue allocation" + "CVE-2023-4623": { + "cmt_msg": "net/sched: sch_hfsc: Ensure inner classes have fsc curve" }, - "CVE-2023-52445": { - "cmt_msg": "media: pvrusb2: fix use after free on context disconnection" + "CVE-2019-0146": { + "cmt_msg": "i40e: add num_vectors checker in iwarp handler" }, - "CVE-2019-6133": { - "cmt_msg": "fork: record start_time late" + "CVE-2021-38300": { + "cmt_msg": "bpf, mips: Validate conditional branch offsets" }, - "CVE-2018-10902": { - "cmt_msg": "ALSA: rawmidi: Change resized buffers atomically" + "CVE-2020-25656": { + "cmt_msg": "vt: keyboard, extend func_buf_lock to readers" }, - "CVE-2016-6516": { - "cmt_msg": "vfs: ioctl: prevent double-fetch in dedupe ioctl" + "CVE-2021-4023": { + "cmt_msg": "io-wq: fix cancellation on create-worker failure" }, - "CVE-2021-39633": { - "cmt_msg": "ip_gre: add validation for csum_start" + "CVE-2019-0145": { + "cmt_msg": "i40e: add num_vectors checker in iwarp handler" }, - "CVE-2017-18203": { - "cmt_msg": "dm: fix race between dm_get_from_kobject() and __dm_destroy()" + "CVE-2021-22555": { + "cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write" }, - "CVE-2020-27673": { - "cmt_msg": "xen/events: add a proper barrier to 2-level uevent unmasking" + "CVE-2023-3161": { + "cmt_msg": "fbcon: Check font dimension limits" }, - "CVE-2021-35477": { - "cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4" + "CVE-2018-7191": { + "cmt_msg": "tun: call dev_get_valid_name() before register_netdevice()" }, - "CVE-2017-18204": { - "cmt_msg": "ocfs2: should wait dio before inode lock in ocfs2_setattr()" + "CVE-2018-10675": { + "cmt_msg": "mm/mempolicy: fix use after free when calling get_mempolicy" }, - "CVE-2021-39634": { - "cmt_msg": "epoll: do not insert into poll queues until all sanity checks are done" + "CVE-2017-0786": { + "cmt_msg": "brcmfmac: add length check in brcmf_cfg80211_escan_handler()" }, - "CVE-2019-3882": { - "cmt_msg": "vfio/type1: Limit DMA mappings per container" + "CVE-2021-47082": { + "cmt_msg": "tun: avoid double free in tun_free_netdev" }, - "CVE-2017-18208": { - "cmt_msg": "mm/madvise.c: fix madvise() infinite loop under special circumstances" + "CVE-2021-47083": { + "cmt_msg": "pinctrl: mediatek: fix global-out-of-bounds issue" }, - "CVE-2022-33741": { - "cmt_msg": "xen/netfront: force data bouncing when backend is untrusted" + "CVE-2021-31916": { + "cmt_msg": "dm ioctl: fix out of bounds array access when no devices" }, - "CVE-2018-20509": { - "cmt_msg": "binder: refactor binder ref inc/dec for thread safety" + "CVE-2021-47086": { + "cmt_msg": "phonet/pep: refuse to enable an unbound pipe" }, - "CVE-2024-24864": { - "cmt_msg": "" + "CVE-2023-32269": { + "cmt_msg": "netrom: Fix use-after-free caused by accept on already connected socket" }, - "CVE-2022-45885": { - "cmt_msg": "" + "CVE-2021-4157": { + "cmt_msg": "pNFS/flexfiles: fix incorrect size check in decode_nfs_fh()" }, - "CVE-2022-33744": { - "cmt_msg": "xen/arm: Fix race in RB-tree based P2M accounting" + "CVE-2021-4155": { + "cmt_msg": "xfs: map unwritten blocks in XFS_IOC_{ALLOC,FREE}SP just like fallocate" }, - "CVE-2017-9605": { - "cmt_msg": "drm/vmwgfx: Make sure backup_handle is always valid" + "CVE-2021-4150": { + "cmt_msg": "block: fix incorrect references to disk objects" }, - "CVE-2017-18193": { - "cmt_msg": "f2fs: fix a bug caused by NULL extent tree" + "CVE-2021-4159": { + "cmt_msg": "bpf: Verifer, adjust_scalar_min_max_vals to always call update_reg_bounds()" }, - "CVE-2022-40768": { - "cmt_msg": "scsi: stex: Properly zero out the passthrough command structure" + "CVE-2021-29154": { + "cmt_msg": "bpf, x86: Validate computation of branch displacements for x86-64" }, - "CVE-2019-9454": { - "cmt_msg": "i2c: core-smbus: prevent stack corruption on read I2C_BLOCK_DATA" + "CVE-2021-29155": { + "cmt_msg": "bpf: Use correct permission flag for mixed signed bounds arithmetic" }, - "CVE-2020-12888": { - "cmt_msg": "vfio-pci: Invalidate mmaps and block MMIO access on disabled memory" + "CVE-2018-10902": { + "cmt_msg": "ALSA: rawmidi: Change resized buffers atomically" }, - "CVE-2017-6214": { - "cmt_msg": "tcp: avoid infinite loop in tcp_splice_read()" + "CVE-2022-25375": { + "cmt_msg": "usb: gadget: rndis: check size of RNDIS_MSG_SET command" }, - "CVE-2017-5577": { - "cmt_msg": "drm/vc4: Return -EINVAL on the overflow checks failing." + "CVE-2021-47158": { + "cmt_msg": "net: dsa: sja1105: add error handling in sja1105_setup()" }, - "CVE-2017-6353": { - "cmt_msg": "sctp: deny peeloff operation on asocs with threads sleeping on it" + "CVE-2021-47153": { + "cmt_msg": "i2c: i801: Don't generate an interrupt on bus reset" }, - "CVE-2017-18174": { - "cmt_msg": "pinctrl: amd: Use devm_pinctrl_register() for pinctrl registration" + "CVE-2021-47150": { + "cmt_msg": "net: fec: fix the potential memory leak in fec_enet_init()" }, - "CVE-2022-41218": { - "cmt_msg": "media: dvb-core: Fix UAF due to refcount races at releasing" + "CVE-2021-47151": { + "cmt_msg": "interconnect: qcom: bcm-voter: add a missing of_node_put()" }, - "CVE-2019-20934": { - "cmt_msg": "sched/fair: Don't free p->numa_faults with concurrent readers" + "CVE-2021-46936": { + "cmt_msg": "net: fix use-after-free in tw_timer_handler" }, - "CVE-2022-1247": { - "cmt_msg": "" + "CVE-2021-46933": { + "cmt_msg": "usb: gadget: f_fs: Clear ffs_eventfd in ffs_data_clear." }, - "CVE-2022-36946": { - "cmt_msg": "netfilter: nf_queue: do not allow packet truncation below transport header offset" + "CVE-2021-46932": { + "cmt_msg": "Input: appletouch - initialize work before device registration" }, - "CVE-2021-45485": { - "cmt_msg": "ipv6: use prandom_u32() for ID generation" + "CVE-2021-46939": { + "cmt_msg": "tracing: Restructure trace_clock_global() to never block" }, - "CVE-2016-4482": { - "cmt_msg": "USB: usbfs: fix potential infoleak in devio" + "CVE-2021-46938": { + "cmt_msg": "dm rq: fix double free of blk_mq_tag_set in dev remove after table load fails" }, - "CVE-2016-6197": { - "cmt_msg": "ovl: verify upper dentry before unlink and rename" + "CVE-2018-16862": { + "cmt_msg": "mm: cleancache: fix corruption on missed inode invalidation" }, - "CVE-2022-21166": { - "cmt_msg": "x86/speculation/mmio: Enable CPU Fill buffer clearing on idle" + "CVE-2024-26623": { + "cmt_msg": "pds_core: Prevent race issues involving the adminq" }, - "CVE-2020-29374": { - "cmt_msg": "gup: document and work around \"COW can break either way\" issue" + "CVE-2018-16884": { + "cmt_msg": "sunrpc: use-after-free in svc_process_common()" }, - "CVE-2016-9191": { - "cmt_msg": "sysctl: Drop reference added by grab_header in proc_sys_readdir" + "CVE-2022-45885": { + "cmt_msg": "" }, - "CVE-2015-8709": { - "cmt_msg": "mm: Add a user_ns owner to mm_struct and fix ptrace permission checks" + "CVE-2022-45884": { + "cmt_msg": "" }, - "CVE-2017-6001": { - "cmt_msg": "perf/core: Fix concurrent sys_perf_event_open() vs. 'move_group' race" + "CVE-2022-45887": { + "cmt_msg": "media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb()" }, - "CVE-2023-52449": { - "cmt_msg": "mtd: Fix gluebi NULL pointer dereference caused by ftl notifier" + "CVE-2022-45886": { + "cmt_msg": "media: dvb-core: Fix use-after-free due on race condition at dvb_net" }, - "CVE-2021-29650": { - "cmt_msg": "netfilter: x_tables: Use correct memory barriers." + "CVE-2024-25744": { + "cmt_msg": "x86/coco: Disable 32-bit emulation by default on TDX and SEV" }, - "CVE-2019-18806": { - "cmt_msg": "net: qlogic: Fix memory leak in ql_alloc_large_buffers" + "CVE-2015-2877": { + "cmt_msg": "" }, - "CVE-2023-4010": { + "CVE-2023-37454": { "cmt_msg": "" }, - "CVE-2018-20169": { - "cmt_msg": "USB: check usb_get_extra_descriptor for proper size" + "CVE-2018-1130": { + "cmt_msg": "dccp: check sk for closed state in dccp_sendmsg()" }, - "CVE-2017-12762": { - "cmt_msg": "isdn/i4l: fix buffer overflow" + "CVE-2021-45486": { + "cmt_msg": "inet: use bigger hash table for IP ID generation" }, - "CVE-2018-7754": { - "cmt_msg": "printk: hash addresses printed with %p" + "CVE-2021-3506": { + "cmt_msg": "f2fs: fix to avoid out-of-bounds memory access" }, - "CVE-2021-33656": { - "cmt_msg": "vt: drop old FONT ioctls" + "CVE-2020-14331": { + "cmt_msg": "vgacon: Fix for missing check in scrollback handling" }, - "CVE-2016-9644": { - "cmt_msg": "x86/mm: Expand the exception table logic to allow new handling options" + "CVE-2022-36123": { + "cmt_msg": "x86: Clear .brk area at early boot" }, - "CVE-2022-41849": { - "cmt_msg": "fbdev: smscufx: Fix use-after-free in ufx_ops_open()" + "CVE-2019-19532": { + "cmt_msg": "HID: Fix assumption that devices have inputs" }, - "CVE-2022-41848": { - "cmt_msg": "" + "CVE-2020-36558": { + "cmt_msg": "vt: vt_ioctl: fix race in VT_RESIZEX" }, - "CVE-2023-6356": { - "cmt_msg": "" + "CVE-2018-13100": { + "cmt_msg": "f2fs: fix to do sanity check with secs_per_zone" }, - "CVE-2022-1353": { - "cmt_msg": "af_key: add __GFP_ZERO flag for compose_sadb_supported in function pfkey_register" + "CVE-2017-5897": { + "cmt_msg": "ip6_gre: fix ip6gre_err() invalid reads" }, - "CVE-2022-28356": { - "cmt_msg": "llc: fix netdevice reference leaks in llc_ui_bind()" + "CVE-2017-6074": { + "cmt_msg": "dccp: fix freeing skb too early for IPV6_RECVPKTINFO" }, - "CVE-2022-1198": { - "cmt_msg": "drivers: hamradio: 6pack: fix UAF bug caused by mod_timer()" + "CVE-2020-36158": { + "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_cmd_802_11_ad_hoc_start" }, - "CVE-2022-1199": { - "cmt_msg": "ax25: Fix NULL pointer dereference in ax25_kill_by_device" + "CVE-2016-6828": { + "cmt_msg": "tcp: fix use after free in tcp_xmit_retransmit_queue()" }, - "CVE-2018-5750": { - "cmt_msg": "ACPI: sbshc: remove raw pointer from printk() message" + "CVE-2021-39686": { + "cmt_msg": "binder: use euid from cred instead of using task" }, - "CVE-2021-39801": { - "cmt_msg": "" + "CVE-2021-39685": { + "cmt_msg": "USB: gadget: detect too-big endpoint 0 requests" }, - "CVE-2021-39800": { - "cmt_msg": "" + "CVE-2018-1000204": { + "cmt_msg": "scsi: sg: allocate with __GFP_ZERO in sg_build_indirect()" }, - "CVE-2018-16884": { - "cmt_msg": "sunrpc: use-after-free in svc_process_common()" + "CVE-2017-12134": { + "cmt_msg": "xen: fix bio vec merging" }, - "CVE-2022-1195": { - "cmt_msg": "hamradio: improve the incomplete fix to avoid NPD" + "CVE-2017-17450": { + "cmt_msg": "netfilter: xt_osf: Add missing permission checks" + }, + "CVE-2024-26592": { + "cmt_msg": "ksmbd: fix UAF issue in ksmbd_tcp_new_connection()" + }, + "CVE-2024-26594": { + "cmt_msg": "ksmbd: validate mech token in session setup" + }, + "CVE-2017-18270": { + "cmt_msg": "KEYS: prevent creating a different user's keyrings" }, - "CVE-2024-22099": { - "cmt_msg": "" + "CVE-2024-26598": { + "cmt_msg": "KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache" }, - "CVE-2021-4202": { - "cmt_msg": "NFC: reorganize the functions in nci_request" + "CVE-2016-6480": { + "cmt_msg": "aacraid: Check size values after double-fetch from user" }, - "CVE-2021-4203": { - "cmt_msg": "af_unix: fix races in sk_peer_pid and sk_peer_cred accesses" + "CVE-2018-3646": { + "cmt_msg": "x86/microcode: Allow late microcode loading with SMT disabled" }, - "CVE-2022-45887": { - "cmt_msg": "media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb()" + "CVE-2022-29900": { + "cmt_msg": "x86/kvm/vmx: Make noinstr clean" }, - "CVE-2022-0330": { - "cmt_msg": "drm/i915: Flush TLBs before releasing backing store" + "CVE-2023-2007": { + "cmt_msg": "scsi: dpt_i2o: Remove obsolete driver" }, - "CVE-2022-41858": { - "cmt_msg": "drivers: net: slip: fix NPD bug in sl_tx_timeout()" + "CVE-2022-1419": { + "cmt_msg": "drm/vgem: Close use-after-free race in vgem_gem_create" }, - "CVE-2024-24859": { - "cmt_msg": "" + "CVE-2017-16913": { + "cmt_msg": "usbip: fix stub_rx: harden CMD_SUBMIT path to handle malicious input" }, - "CVE-2019-15807": { - "cmt_msg": "scsi: libsas: delete sas port if expander discover failed" + "CVE-2022-2503": { + "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag" }, - "CVE-2023-2124": { - "cmt_msg": "xfs: verify buffer contents when we skip log replay" + "CVE-2022-23038": { + "cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()" }, - "CVE-2020-26557": { - "cmt_msg": "" + "CVE-2022-23039": { + "cmt_msg": "xen/gntalloc: don't use gnttab_query_foreign_access()" }, - "CVE-2021-3609": { - "cmt_msg": "can: bcm: delay release of struct bcm_op after synchronize_rcu()" + "CVE-2016-8645": { + "cmt_msg": "tcp: take care of truncations done by sk_filter()" }, - "CVE-2024-0775": { - "cmt_msg": "ext4: improve error recovery code paths in __ext4_remount()" + "CVE-2022-23036": { + "cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()" }, - "CVE-2021-44879": { - "cmt_msg": "f2fs: fix to do sanity check on inode type during garbage collection" + "CVE-2022-23037": { + "cmt_msg": "xen/netfront: don't use gnttab_query_foreign_access() for mapped status" }, - "CVE-2019-15505": { - "cmt_msg": "media: technisat-usb2: break out of loop at end of buffer" + "CVE-2017-5669": { + "cmt_msg": "ipc/shm: Fix shmat mmap nil-page protection" }, - "CVE-2023-2513": { - "cmt_msg": "ext4: fix use-after-free in ext4_xattr_set_entry" + "CVE-2023-2176": { + "cmt_msg": "RDMA/core: Refactor rdma_bind_addr" }, - "CVE-2017-1000": { - "cmt_msg": "udp: consistently apply ufo or fragmentation" + "CVE-2019-14821": { + "cmt_msg": "KVM: coalesced_mmio: add bounds checking" }, - "CVE-2020-11609": { - "cmt_msg": "media: stv06xx: add missing descriptor sanity checks" + "CVE-2020-12826": { + "cmt_msg": "signal: Extend exec_id to 64bits" }, - "CVE-2020-36385": { - "cmt_msg": "RDMA/ucma: Rework ucma_migrate_id() to avoid races with destroy" + "CVE-2021-42008": { + "cmt_msg": "net: 6pack: fix slab-out-of-bounds in decode_data" }, - "CVE-2020-0429": { - "cmt_msg": "l2tp: fix race between l2tp_session_delete() and l2tp_tunnel_closeall()" + "CVE-2020-25645": { + "cmt_msg": "geneve: add transport ports in route lookup for geneve" }, - "CVE-2020-27066": { - "cmt_msg": "xfrm: policy: Fix doulbe free in xfrm_policy_timer" + "CVE-2019-15666": { + "cmt_msg": "xfrm: policy: Fix out-of-bound array accesses in __xfrm_policy_unlink" }, - "CVE-2022-2964": { - "cmt_msg": "net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup" + "CVE-2015-1350": { + "cmt_msg": "fs: Avoid premature clearing of capabilities" }, - "CVE-2017-0605": { - "cmt_msg": "tracing: Use strlcpy() instead of strcpy() in __trace_find_cmdline()" + "CVE-2021-33034": { + "cmt_msg": "Bluetooth: verify AMP hci_chan before amp_destroy" }, - "CVE-2021-1048": { - "cmt_msg": "fix regression in \"epoll: Keep a reference on files added to the check list\"" + "CVE-2017-18509": { + "cmt_msg": "ipv6: check sk sk_type and protocol early in ip_mroute_set/getsockopt" }, - "CVE-2015-2877": { - "cmt_msg": "" + "CVE-2017-11600": { + "cmt_msg": "xfrm: policy: check policy direction value" }, - "CVE-2020-9383": { - "cmt_msg": "floppy: check FDC index for errors before assigning it" + "CVE-2024-26625": { + "cmt_msg": "llc: call sock_orphan() at release time" }, - "CVE-2022-3586": { - "cmt_msg": "sch_sfb: Don't assume the skb is still around after enqueueing to child" + "CVE-2024-26627": { + "cmt_msg": "scsi: core: Move scsi_host_busy() out of host lock for waking up EH handler" }, - "CVE-2023-32269": { - "cmt_msg": "netrom: Fix use-after-free caused by accept on already connected socket" + "CVE-2024-26622": { + "cmt_msg": "tomoyo: fix UAF write bug in tomoyo_write_control()" }, - "CVE-2023-1206": { - "cmt_msg": "tcp: Reduce chance of collisions in inet6_hashfn()." + "CVE-2024-22386": { + "cmt_msg": "" }, - "CVE-2021-38198": { - "cmt_msg": "KVM: X86: MMU: Use the correct inherited permissions to get shadow page" + "CVE-2018-10021": { + "cmt_msg": "scsi: libsas: defer ata device eh commands to libata" }, - "CVE-2022-1679": { - "cmt_msg": "ath9k: fix use-after-free in ath9k_hif_usb_rx_cb" + "CVE-2017-18221": { + "cmt_msg": "mlock: fix mlock count can not decrease in race condition" }, - "CVE-2020-8832": { - "cmt_msg": "drm/i915: Record the default hw state after reset upon load" + "CVE-2019-10126": { + "cmt_msg": "mwifiex: Fix heap overflow in mwifiex_uap_parse_tail_ies()" }, - "CVE-2017-5970": { - "cmt_msg": "ipv4: keep skb->dst around in presence of IP options" + "CVE-2019-10124": { + "cmt_msg": "mm: hwpoison: fix thp split handing in soft_offline_in_use_page()" }, - "CVE-2023-1513": { - "cmt_msg": "kvm: initialize all of the kvm_debugregs structure before sending it to userspace" + "CVE-2020-13974": { + "cmt_msg": "vt: keyboard: avoid signed integer overflow in k_ascii" }, - "CVE-2021-26401": { - "cmt_msg": "x86/speculation: Use generic retpoline by default on AMD" + "CVE-2018-10938": { + "cmt_msg": "Cipso: cipso_v4_optptr enter infinite loop" }, - "CVE-2021-3847": { - "cmt_msg": "" + "CVE-2020-15437": { + "cmt_msg": "serial: 8250: fix null-ptr-deref in serial8250_start_tx()" }, - "CVE-2018-1130": { - "cmt_msg": "dccp: check sk for closed state in dccp_sendmsg()" + "CVE-2020-15436": { + "cmt_msg": "block: Fix use-after-free in blkdev_get()" }, - "CVE-2023-52442": { - "cmt_msg": "ksmbd: validate session id and tree id in compound request" + "CVE-2016-9178": { + "cmt_msg": "fix minor infoleak in get_user_ex()" }, - "CVE-2019-14284": { - "cmt_msg": "floppy: fix div-by-zero in setup_format_params" + "CVE-2021-47065": { + "cmt_msg": "rtw88: Fix array overrun in rtw_get_tx_power_params()" }, - "CVE-2020-36557": { - "cmt_msg": "vt: vt_ioctl: fix VT_DISALLOCATE freeing in-use virtual console" + "CVE-2022-23816": { + "cmt_msg": "x86/kvm/vmx: Make noinstr clean" }, - "CVE-2021-3506": { - "cmt_msg": "f2fs: fix to avoid out-of-bounds memory access" + "CVE-2021-47145": { + "cmt_msg": "btrfs: do not BUG_ON in link_to_fixup_dir" }, - "CVE-2011-4917": { - "cmt_msg": "" + "CVE-2021-47149": { + "cmt_msg": "net: fujitsu: fix potential null-ptr-deref" }, - "CVE-2011-4916": { - "cmt_msg": "" + "CVE-2018-19407": { + "cmt_msg": "KVM: X86: Fix scan ioapic use-before-initialization" }, - "CVE-2019-14283": { - "cmt_msg": "floppy: fix out-of-bounds read in copy_buffer" + "CVE-2021-47144": { + "cmt_msg": "drm/amd/amdgpu: fix refcount leak" }, - "CVE-2019-3900": { - "cmt_msg": "vhost_net: fix possible infinite loop" + "CVE-2021-47147": { + "cmt_msg": "ptp: ocp: Fix a resource leak in an error handling path" }, - "CVE-2019-19528": { - "cmt_msg": "USB: iowarrior: fix use-after-free on disconnect" + "CVE-2021-47146": { + "cmt_msg": "mld: fix panic in mld_newpack()" }, - "CVE-2019-19533": { - "cmt_msg": "media: ttusb-dec: Fix info-leak in ttusb_dec_send_command()" + "CVE-2021-47140": { + "cmt_msg": "iommu/amd: Clear DMA ops when switching domain" }, - "CVE-2018-13100": { - "cmt_msg": "f2fs: fix to do sanity check with secs_per_zone" + "CVE-2021-47143": { + "cmt_msg": "net/smc: remove device from smcd_dev_list after failed device_add()" }, - "CVE-2017-16646": { - "cmt_msg": "media: dib0700: fix invalid dvb_detach argument" + "CVE-2021-47142": { + "cmt_msg": "drm/amdgpu: Fix a use-after-free" }, - "CVE-2017-16645": { - "cmt_msg": "Input: ims-psu - check if CDC union descriptor is sane" + "CVE-2024-26765": { + "cmt_msg": "LoongArch: Disable IRQ before init_fn() for nonboot CPUs" }, - "CVE-2017-16643": { - "cmt_msg": "Input: gtco - fix potential out-of-bound access" + "CVE-2018-16871": { + "cmt_msg": "nfsd: COPY and CLONE operations require the saved filehandle to be set" }, - "CVE-2018-10882": { - "cmt_msg": "ext4: add more inode number paranoia checks" + "CVE-2018-16658": { + "cmt_msg": "cdrom: Fix info leak/OOB read in cdrom_ioctl_drive_status" }, - "CVE-2023-31083": { - "cmt_msg": "Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO" + "CVE-2019-19036": { + "cmt_msg": "btrfs: Detect unbalanced tree with empty leaf before crashing btree operations" }, - "CVE-2019-5489": { - "cmt_msg": "Change mincore() to count \"mapped\" pages rather than \"cached\" pages" + "CVE-2017-8797": { + "cmt_msg": "nfsd: fix undefined behavior in nfsd4_layout_verify" }, - "CVE-2024-1312": { - "cmt_msg": "mm: lock_vma_under_rcu() must check vma->anon_vma under vma lock" + "CVE-2021-32078": { + "cmt_msg": "ARM: footbridge: remove personal server platform" }, - "CVE-2017-16648": { - "cmt_msg": "dvb_frontend: don't use-after-free the frontend struct" + "CVE-2022-4662": { + "cmt_msg": "USB: core: Prevent nested device-reset calls" }, - "CVE-2018-10880": { - "cmt_msg": "ext4: never move the system.data xattr out of the inode body" + "CVE-2019-11833": { + "cmt_msg": "ext4: zero out the unused memory region in the extent tree block" }, - "CVE-2018-10881": { - "cmt_msg": "ext4: clear i_data in ext4_inode_info when removing inline data" + "CVE-2018-5953": { + "cmt_msg": "printk: hash addresses printed with %p" }, - "CVE-2017-16649": { - "cmt_msg": "net: cdc_ether: fix divide by 0 on bad descriptors" + "CVE-2018-1128": { + "cmt_msg": "libceph: add authorizer challenge" }, - "CVE-2018-10883": { - "cmt_msg": "jbd2: don't mark block as modified if the handle is out of credits" - } - } - }, - "4.4": { - "4.4": { - "CVE-2016-2070": { - "cmt_msg": "tcp: fix zero cwnd in tcp_cwnd_reduction", - "cmt_id": "8b8a321ff72c785ed5e8b4cf6eda20b35d427390" + "CVE-2018-1129": { + "cmt_msg": "libceph: implement CEPHX_V2 calculation mode" }, - "CVE-2015-8963": { - "cmt_msg": "perf: Fix race in swevent hash", - "cmt_id": "12ca6ad2e3a896256f086497a7c7406a547ee373" - } - }, - "4.4.1": { - "CVE-2016-0728": { - "cmt_msg": "KEYS: Fix keyring ref leak in join_session_keyring()", - "cmt_id": "e4a46f02b1d0eaadea4e6b00e29922cd00d6de53" + "CVE-2018-1120": { + "cmt_msg": "proc: do not access cmdline nor environ from file-backed areas" }, - "CVE-2016-2069": { - "cmt_msg": "x86/mm: Add barriers and document switch_mm()-vs-flush synchronization", - "cmt_id": "43a2ba8c1a003c82d9f411af8ebcf0fe1e4cbe3e" + "CVE-2018-1121": { + "cmt_msg": "" }, - "CVE-2016-2545": { - "cmt_msg": "ALSA: timer: Fix double unlink of active_list", - "cmt_id": "3c0e535fee2e67d06220e676cbf7b69099d741ce" + "CVE-2018-20856": { + "cmt_msg": "block: blk_init_allocated_queue() set q->fq as NULL in the fail case" }, - "CVE-2016-2544": { - "cmt_msg": "ALSA: seq: Fix race at timer setup and close", - "cmt_id": "0058ede73e1f441c003666f61671dfddfcbd5811" + "CVE-2022-3061": { + "cmt_msg": "video: fbdev: i740fb: Error out if 'pixclock' equals zero" }, - "CVE-2016-2547": { - "cmt_msg": "ALSA: timer: Harden slave timer list handling", - "cmt_id": "8eff3aa0a9bbb593dce0ec0344ec1961318e44c8" + "CVE-2020-27784": { + "cmt_msg": "usb: gadget: function: printer: fix use-after-free in __lock_acquire" }, - "CVE-2016-2546": { - "cmt_msg": "ALSA: timer: Fix race among timer ioctls", - "cmt_id": "d87622a1662af5782c94b88a613c09de0bde5288" + "CVE-2020-27786": { + "cmt_msg": "ALSA: rawmidi: Fix racy buffer resize under concurrent accesses" }, - "CVE-2016-2543": { - "cmt_msg": "ALSA: seq: Fix missing NULL check at remove_events ioctl", - "cmt_id": "36d3fc15f50c22bbddfceb6c585f851130fb005f" + "CVE-2023-6240": { + "cmt_msg": "" }, - "CVE-2013-4312": { - "cmt_msg": "unix: properly account for FDs passed over unix sockets", - "cmt_id": "5e226f9689d90ad8ab21b4a969ae3058777f0aff" + "CVE-2022-39842": { + "cmt_msg": "video: fbdev: pxa3xx-gcu: Fix integer overflow in pxa3xx_gcu_write" }, - "CVE-2016-2549": { - "cmt_msg": "ALSA: hrtimer: Fix stall by hrtimer_cancel()", - "cmt_id": "dafa57ee81748f6a6950c06f19a160d0a209795e" + "CVE-2023-51043": { + "cmt_msg": "drm/atomic: Fix potential use-after-free in nonblocking commits" }, - "CVE-2016-2548": { - "cmt_msg": "ALSA: timer: Harden slave timer list handling", - "cmt_id": "8eff3aa0a9bbb593dce0ec0344ec1961318e44c8" - } - }, - "4.4.2": { - "CVE-2016-2782": { - "cmt_msg": "USB: visor: fix null-deref at probe", - "cmt_id": "ee4207bda5e15d0eecb834c4fc39c6069487279d" + "CVE-2019-9454": { + "cmt_msg": "i2c: core-smbus: prevent stack corruption on read I2C_BLOCK_DATA" }, - "CVE-2016-2384": { - "cmt_msg": "ALSA: usb-audio: avoid freeing umidi object twice", - "cmt_id": "fbb430c51d7ac989b79bf1adb40cce7af581682a" + "CVE-2017-16939": { + "cmt_msg": "ipsec: Fix aborted xfrm policy dump crash" }, - "CVE-2016-2085": { - "cmt_msg": "EVM: Use crypto_memneq() for digest comparisons", - "cmt_id": "8592536bcfcbc717a3bf7cec57d7c1b38f4eec1d" + "CVE-2016-10741": { + "cmt_msg": "xfs: don't BUG() on mixed direct and mapped I/O" }, - "CVE-2016-0723": { - "cmt_msg": "tty: Fix unsafe ldisc reference via ioctl(TIOCGETD)", - "cmt_id": "d343601a19410f71bf1765df5e2edda66fe5de5f" + "CVE-2021-26931": { + "cmt_msg": "xen-blkback: don't \"handle\" error by BUG()" }, - "CVE-2017-13215": { - "cmt_msg": "crypto: algif_skcipher - Load TX SG list after waiting", - "cmt_id": "fec8beab63283003b546f83eebbbe32efb9acc53" + "CVE-2021-26930": { + "cmt_msg": "xen-blkback: fix error handling in xen_blkbk_map()" }, - "CVE-2017-13167": { - "cmt_msg": "ALSA: timer: Fix race at concurrent reads", - "cmt_id": "925249d5172a31d7d430fdf364fc9229223c7942" + "CVE-2021-26932": { + "cmt_msg": "Xen/x86: don't bail early from clear_foreign_p2m_mapping()" }, - "CVE-2015-7566": { - "cmt_msg": "USB: serial: visor: fix crash on detecting device without write_urbs", - "cmt_id": "2dc803d0740f0c493a7db8a1baf6514d5b95b6a3" + "CVE-2022-36402": { + "cmt_msg": "drm/vmwgfx: Fix shader stage validation" }, - "CVE-2015-8970": { - "cmt_msg": "crypto: algif_skcipher - Require setkey before accept(2)", - "cmt_id": "b238717c0bb4606e2e36fc0de745306b0c900d83" - } - }, - "4.4.3": { - "CVE-2016-0617": { - "cmt_msg": "fs/hugetlbfs/inode.c: fix bugs in hugetlb_vmtruncate_list()", - "cmt_id": "db33368ca32dd307cdcc191361de34f3937f513a" + "CVE-2021-3178": { + "cmt_msg": "nfsd4: readdirplus shouldn't return parent of export" }, - "CVE-2016-1575": { - "cmt_msg": "ovl: setattr: check permissions before copy-up", - "cmt_id": "8373f6590f6b371bff2c5f2c0581548eb0192014" + "CVE-2023-1611": { + "cmt_msg": "btrfs: fix race between quota disable and quota assign ioctls" }, - "CVE-2016-1576": { - "cmt_msg": "ovl: setattr: check permissions before copy-up", - "cmt_id": "8373f6590f6b371bff2c5f2c0581548eb0192014" - } - }, - "4.4.4": { - "CVE-2016-2383": { - "cmt_msg": "bpf: fix branch offset adjustment on backjumps after patching ctx expansion", - "cmt_id": "a34f2f9f2034f7984f9529002c6fffe9cb63189d" + "CVE-2021-3772": { + "cmt_msg": "sctp: use init_tag from inithdr for ABORT chunk" }, - "CVE-2021-20265": { - "cmt_msg": "af_unix: fix struct pid memory leak", - "cmt_id": "39770be4d6ad29c5ab1f21edbbf01db067f13b52" + "CVE-2021-34556": { + "cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4" }, - "CVE-2015-8812": { - "cmt_msg": "iw_cxgb3: Fix incorrectly returning error on success", - "cmt_id": "64fb3e29bf47e5db029b81fc99ac40f6cd2620ac" - } - }, - "4.4.6": { - "CVE-2016-2143": { - "cmt_msg": "s390/mm: four page table levels vs. fork", - "cmt_id": "5833fac3b88d39b39402309399e8b0aaa54e5f75" + "CVE-2021-28714": { + "cmt_msg": "xen/netback: fix rx queue stall detection" }, - "CVE-2016-3044": { - "cmt_msg": "KVM: PPC: Book3S HV: Sanitize special-purpose register values on guest exit", - "cmt_id": "1c463a390a89beb929ed2750c79d6eb6d06c7cdd" - } - }, - "4.4.7": { - "CVE-2016-3137": { - "cmt_msg": "USB: cypress_m8: add endpoint sanity check", - "cmt_id": "ca76906a7753052b00e491ba017393f9071b0406" + "CVE-2021-28713": { + "cmt_msg": "xen/console: harden hvc_xen against event channel storms" }, - "CVE-2016-3157": { - "cmt_msg": "x86/iopl/64: Properly context-switch IOPL on Xen PV", - "cmt_id": "0f63ab5873ed78838afa4b2f8bfd9d18f806cf40" + "CVE-2021-28712": { + "cmt_msg": "xen/netfront: harden netfront against event channel storms" }, - "CVE-2016-3689": { - "cmt_msg": "Input: ims-pcu - sanity check against missing interfaces", - "cmt_id": "af18c4ca4b1728e2149844656bbf1aa8d7382682" + "CVE-2021-28711": { + "cmt_msg": "xen/blkfront: harden blkfront against event channel storms" }, - "CVE-2016-9685": { - "cmt_msg": "xfs: fix two memory leaks in xfs_attr_list.c error paths", - "cmt_id": "b34291f71d0fb3d09728fd43d6da350ff6a179d6" + "CVE-2022-1247": { + "cmt_msg": "" }, - "CVE-2016-3140": { - "cmt_msg": "USB: digi_acceleport: do sanity checking for the number of ports", - "cmt_id": "4f6ad5b0d28c84030693fe21b308c0b711fa66f6" + "CVE-2022-2991": { + "cmt_msg": "remove the lightnvm subsystem" }, - "CVE-2016-3136": { - "cmt_msg": "USB: mct_u232: add sanity checking in probe", - "cmt_id": "9deac9454b7a5643a09829f4731276cea6697b72" + "CVE-2017-11473": { + "cmt_msg": "x86/acpi: Prevent out of bound access caused by broken ACPI tables" }, - "CVE-2016-2185": { - "cmt_msg": "Input: ati_remote2 - fix crashes on detecting device with invalid descriptor", - "cmt_id": "a1d0a23831ccde9dbd5279a5d45790a96f18ad32" + "CVE-2017-11472": { + "cmt_msg": "ACPICA: Namespace: fix operand cache leak" }, - "CVE-2016-2184": { - "cmt_msg": "ALSA: usb-audio: Fix NULL dereference in create_fixed_stream_quirk()", - "cmt_id": "57f6ad5f1580a5a06c573fb15ed6dcf701e037f6" + "CVE-2017-17862": { + "cmt_msg": "bpf: fix branch pruning logic" }, - "CVE-2016-6327": { - "cmt_msg": "IB/srpt: Simplify srpt_handle_tsk_mgmt()", - "cmt_id": "84512e476ce92fbdb60d4687e3ea230dbf0655c8" + "CVE-2021-39657": { + "cmt_msg": "scsi: ufs: Correct the LUN used in eh_device_reset_handler() callback" }, - "CVE-2016-2186": { - "cmt_msg": "Input: powermate - fix oops with malicious USB descriptors", - "cmt_id": "fbd40d7beef0b17624bc1f838f4d44dfa4b0326b" + "CVE-2023-52578": { + "cmt_msg": "net: bridge: use DEV_STATS_INC()" }, - "CVE-2016-3138": { - "cmt_msg": "USB: cdc-acm: more sanity checking", - "cmt_id": "1ea680abf7640c777396909102bc22915107cb5b" - } - }, - "4.4.8": { - "CVE-2016-7117": { - "cmt_msg": "net: Fix use after free in the recvmmsg exit path", - "cmt_id": "405f10a39443ae9ccacf51f18511dfc827e09108" + "CVE-2023-52574": { + "cmt_msg": "team: fix null-ptr-deref when team device type is changed" }, - "CVE-2016-3156": { - "cmt_msg": "ipv4: Don't do expensive useless work during inetdev destroy.", - "cmt_id": "54789759917f127cfadcca730f44ea67d557a9b0" + "CVE-2023-3567": { + "cmt_msg": "vc_screen: move load of struct vc_data pointer in vcs_read() to avoid UAF" }, - "CVE-2016-4805": { - "cmt_msg": "ppp: take reference on channels netns", - "cmt_id": "046ea8180ecaf5d8b5823e17714a09526ad7d321" - } - }, - "4.4.9": { - "CVE-2016-4568": { - "cmt_msg": "videobuf2-v4l2: Verify planes array in buffer dequeueing", - "cmt_id": "19a4e46b4513bab7d6b368175be2e24ad4665e5a" + "CVE-2023-52571": { + "cmt_msg": "power: supply: rk817: Fix node refcount leak" }, - "CVE-2016-7914": { - "cmt_msg": "assoc_array: don't call compare_object() on a node", - "cmt_id": "6905c7a4aa1ef675825bc2ab56fd965a573ffb74" + "CVE-2023-52572": { + "cmt_msg": "cifs: Fix UAF in cifs_demultiplex_thread()" }, - "CVE-2016-3955": { - "cmt_msg": "USB: usbip: fix potential out-of-bounds write", - "cmt_id": "4a1bb501e4b65908b102f0b371b0621ff18ad5c3" + "CVE-2017-14340": { + "cmt_msg": "xfs: XFS_IS_REALTIME_INODE() should be false if no rt device present" }, - "CVE-2016-7912": { - "cmt_msg": "usb: gadget: f_fs: Fix use-after-free", - "cmt_id": "e4c7ab76586146820b394e0176f286f5a2e70cb3" + "CVE-2019-19039": { + "cmt_msg": "btrfs: Don't submit any btree write bio if the fs has errors" }, - "CVE-2016-4565": { - "cmt_msg": "IB/security: Restrict use of the write() interface", - "cmt_id": "c92003c18feb8159cbf64bc0afa7b048869fe3c6" + "CVE-2016-8630": { + "cmt_msg": "kvm: x86: Check memopp before dereference (CVE-2016-8630)" }, - "CVE-2016-2187": { - "cmt_msg": "Input: gtco - fix crash on detecting device without endpoints", - "cmt_id": "197b6c5f0d976420c3eeacc7589ebc5869d2d70f" + "CVE-2016-8633": { + "cmt_msg": "firewire: net: guard against rx buffer overflows" }, - "CVE-2015-8839": { - "cmt_msg": "ext4: fix races between page faults and hole punching", - "cmt_id": "0b680de452570274716c2c9990903acea525f0d0" + "CVE-2016-8632": { + "cmt_msg": "tipc: check minimum bearer MTU" }, - "CVE-2016-3961": { - "cmt_msg": "x86/mm/xen: Suppress hugetlbfs in PV guests", - "cmt_id": "27b3cc048a5275c53e26c15ffcab3fcf9a03cda0" - } - }, - "4.4.10": { - "CVE-2016-7916": { - "cmt_msg": "proc: prevent accessing /proc//environ until it's ready", - "cmt_id": "898149d10b855a0d0a5a9f8f05e4359970919eb9" + "CVE-2020-12362": { + "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" }, - "CVE-2016-4581": { - "cmt_msg": "propogate_mnt: Handle the first propogated copy being a slave", - "cmt_id": "b17580a3cb901c56e9b9a3dea4d12153f5fc879e" - } - }, - "4.4.11": { - "CVE-2016-6198": { - "cmt_msg": "vfs: add vfs_select_inode() helper", - "cmt_id": "b0dac61d2454b392dbdb4ad565f9dc3dc76fce96" + "CVE-2020-12363": { + "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" }, - "CVE-2016-4557": { - "cmt_msg": "bpf: fix double-fdput in replace_map_fd_with_map_ptr()", - "cmt_id": "608d2c3c7a046c222cae2e857cf648a9f89e772b" + "CVE-2019-12881": { + "cmt_msg": "drm/i915/userptr: reject zero user_size" }, - "CVE-2016-4580": { - "cmt_msg": "net: fix a kernel infoleak in x25 module", - "cmt_id": "83857201758ead21e19e36d9ab5b2f87be03dfe2" + "CVE-2022-4129": { + "cmt_msg": "l2tp: Serialize access to sk_user_data with sk_callback_lock" }, - "CVE-2016-4486": { - "cmt_msg": "net: fix infoleak in rtnetlink", - "cmt_id": "e0c0313681aaa0c4514c6794635aba82691d2154" + "CVE-2020-12364": { + "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" }, - "CVE-2016-2117": { - "cmt_msg": "atl2: Disable unimplemented scatter/gather feature", - "cmt_id": "b5c9a73c501e8aed86dd578309813c7818ca248c" + "CVE-2021-4002": { + "cmt_msg": "hugetlbfs: flush TLBs correctly after huge_pmd_unshare" }, - "CVE-2016-4485": { - "cmt_msg": "net: fix infoleak in llc", - "cmt_id": "52f307b18b1f070f0442fc98515575616b21fa20" + "CVE-2023-26545": { + "cmt_msg": "net: mpls: fix stale pointer if allocation fails during device rename" }, - "CVE-2016-4558": { - "cmt_msg": "bpf: fix refcnt overflow", - "cmt_id": "3899251bdb9c2b31fc73d4cc132f52d3710101de" + "CVE-2017-12168": { + "cmt_msg": "arm64: KVM: pmu: Fix AArch32 cycle counter access" }, - "CVE-2016-4913": { - "cmt_msg": "get_rock_ridge_filename(): handle malformed NM entries", - "cmt_id": "007796c01f0b293c68585397211af2b390bf126d" - } - }, - "4.4.12": { - "CVE-2016-3713": { - "cmt_msg": "KVM: MTRR: remove MSR 0x2f8", - "cmt_id": "1716643bc4725bb92a1f527f759a93e37a2bc1f0" + "CVE-2019-15292": { + "cmt_msg": "appletalk: Fix use-after-free in atalk_proc_exit" }, - "CVE-2016-9754": { - "cmt_msg": "ring-buffer: Prevent overflow of size in ring_buffer_resize()", - "cmt_id": "f199023137853eb1d46e8b7ebc274b29ba99028c" + "CVE-2019-15291": { + "cmt_msg": "media: b2c2-flexcop-usb: add sanity checking" }, - "CVE-2019-3901": { - "cmt_msg": "perf/core: Fix perf_event_open() vs. execve() race", - "cmt_id": "c5174678e2e5bd691da58a116fbc123c6fbc7b2c" - } - }, - "4.4.13": { - "CVE-2016-2847": { - "cmt_msg": "pipe: limit the per-user amount of pages allocated in pipes", - "cmt_id": "fa6d0ba12a8eb6a2e9a1646c5816da307c1f93a7" - } - }, - "4.4.14": { - "CVE-2016-4951": { - "cmt_msg": "tipc: check nl sock before parsing nested attributes", - "cmt_id": "23cdd8c3cbe9d790f23d7f9ae14e9b828f56f69c" + "CVE-2019-15290": { + "cmt_msg": "" }, - "CVE-2016-4997": { - "cmt_msg": "netfilter: x_tables: check for bogus target offset", - "cmt_id": "8a865621540c7bc7f03665a2b7029cb444a9593a" + "CVE-2023-3212": { + "cmt_msg": "gfs2: Don't deref jdesc in evict" }, - "CVE-2016-4998": { - "cmt_msg": "netfilter: x_tables: check for bogus target offset", - "cmt_id": "8a865621540c7bc7f03665a2b7029cb444a9593a" + "CVE-2024-26633": { + "cmt_msg": "ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim()" }, - "CVE-2016-3134": { - "cmt_msg": "netfilter: x_tables: fix unconditional helper", - "cmt_id": "5ebdccd7685f1c0b451c516f99082642d8d49003" + "CVE-2024-26636": { + "cmt_msg": "llc: make llc_ui_sendmsg() more robust against bonding changes" }, - "CVE-2016-9806": { - "cmt_msg": "netlink: Fix dump skb leak/double free", - "cmt_id": "49543942beb1b9ca95709d6cfa67708932aa4d11" + "CVE-2024-26635": { + "cmt_msg": "llc: Drop support for ETH_P_TR_802_2." }, - "CVE-2016-1583": { - "cmt_msg": "proc: prevent stacking filesystems on top", - "cmt_id": "9beb96b344c846779f67d1be1cdafc66562b94ec" - } - }, - "4.4.16": { - "CVE-2016-4470": { - "cmt_msg": "KEYS: potential uninitialized variable", - "cmt_id": "398051f2f66ef4658c89388441d0c697d50c325c" + "CVE-2017-7308": { + "cmt_msg": "net/packet: fix overflow in check for priv area size" }, - "CVE-2016-6197": { - "cmt_msg": "ovl: verify upper dentry before unlink and rename", - "cmt_id": "dbf72a4d4531e7e5fb28e76d902d66f05c1bfe12" + "CVE-2020-12769": { + "cmt_msg": "spi: spi-dw: Add lock protect dw_spi rx/tx to prevent concurrent calls" }, - "CVE-2016-1237": { - "cmt_msg": "posix_acl: Add set_posix_acl", - "cmt_id": "c3fa141c1f288ac785c82ead9d06d1b5acd76d60" + "CVE-2017-8890": { + "cmt_msg": "dccp/tcp: do not inherit mc_list from parent" }, - "CVE-2016-4794": { - "cmt_msg": "percpu: fix synchronization between chunk->map_extend_work and chunk destruction", - "cmt_id": "c26ae537f16f653c2541df9e338013653fc3fcc7" + "CVE-2023-52635": { + "cmt_msg": "PM / devfreq: Synchronize devfreq_monitor_[start/stop]" }, - "CVE-2016-5829": { - "cmt_msg": "HID: hiddev: validate num_values for HIDIOCGUSAGES, HIDIOCSUSAGES commands", - "cmt_id": "300851ff55f7777be2780207f1b60ad5e1fd1303" + "CVE-2023-52634": { + "cmt_msg": "drm/amd/display: Fix disable_otg_wa logic" }, - "CVE-2016-5828": { - "cmt_msg": "powerpc/tm: Always reclaim in start_thread() for exec() class syscalls", - "cmt_id": "5a35d2f92f1011145315f86a481f4f3e3f853095" - } - }, - "4.4.17": { - "CVE-2016-6156": { - "cmt_msg": "platform/chrome: cros_ec_dev - double fetch bug in ioctl", - "cmt_id": "69ca969a2626dc4b3bb83b953c053a01e3b9f7e6" + "CVE-2016-9588": { + "cmt_msg": "kvm: nVMX: Allow L1 to intercept software exceptions (#BP and #OF)" }, - "CVE-2016-7911": { - "cmt_msg": "block: fix use-after-free in sys_ioprio_get()", - "cmt_id": "5161144c3a9d6ea775b293edbb8523deaeff4442" + "CVE-2017-18208": { + "cmt_msg": "mm/madvise.c: fix madvise() infinite loop under special circumstances" }, - "CVE-2016-4569": { - "cmt_msg": "ALSA: timer: Fix leak in SNDRV_TIMER_IOCTL_PARAMS", - "cmt_id": "90bed827ea910f82ab17ee154f501b5ae71617e6" + "CVE-2017-1000364": { + "cmt_msg": "mm: larger stack guard gap, between vmas" }, - "CVE-2016-5400": { - "cmt_msg": "media: fix airspy usb probe error path", - "cmt_id": "d863bec646a590584eabcb40550bff0708c26b0d" + "CVE-2017-1000365": { + "cmt_msg": "fs/exec.c: account for argv/envp pointers" }, - "CVE-2016-4578": { - "cmt_msg": "ALSA: timer: Fix leak in events via snd_timer_user_ccallback", - "cmt_id": "3e6af33c73fb7ec7be8dedd01047162ef64a26a5" - } - }, - "4.4.18": { - "CVE-2016-3672": { - "cmt_msg": "x86/mm/32: Enable full randomization on i386 and X86_32", - "cmt_id": "979a61a02992e2029fcedcdf32c05050aa652c9c" + "CVE-2020-13143": { + "cmt_msg": "USB: gadget: fix illegal array access in binding with UDC" }, - "CVE-2016-5696": { - "cmt_msg": "tcp: make challenge acks less predictable", - "cmt_id": "72c2d3bccaba4a0a4de354f9d2d24eccd05bfccf" + "CVE-2017-1000363": { + "cmt_msg": "char: lp: fix possible integer overflow in lp_setup()" }, - "CVE-2016-3951": { - "cmt_msg": "cdc_ncm: do not call usbnet_link_change from cdc_ncm_bind", - "cmt_id": "66e5d7b47c864f1821041f77752930ec3b8dfc22" + "CVE-2022-3903": { + "cmt_msg": "media: mceusb: Use new usb_control_msg_*() routines" }, - "CVE-2017-7495": { - "cmt_msg": "ext4: fix data exposure after a crash", - "cmt_id": "5a7f477c725e866729307ff87011f8dd812a3cdf" + "CVE-2017-15299": { + "cmt_msg": "KEYS: don't let add_key() update an uninstantiated key" }, - "CVE-2016-7910": { - "cmt_msg": "block: fix use-after-free in seq file", - "cmt_id": "9a95c0cfc6f21b9ac66269d4782ea5a0f58cdf91" + "CVE-2021-47179": { + "cmt_msg": "NFSv4: Fix a NULL pointer dereference in pnfs_mark_matching_lsegs_return()" }, - "CVE-2016-3857": { - "cmt_msg": "arm: oabi compat: add missing access checks", - "cmt_id": "0107ea0e0928c8a077f0f912c809f2b86fa7496c" - } - }, - "4.4.19": { - "CVE-2016-5412": { - "cmt_msg": "KVM: PPC: Book3S HV: Pull out TM state save/restore into separate procedures", - "cmt_id": "e1a90eb8afa42b02f46897b881b9e19d3594159c" + "CVE-2019-11190": { + "cmt_msg": "binfmt_elf: switch to new creds when switching to new mm" }, - "CVE-2016-4482": { - "cmt_msg": "USB: usbfs: fix potential infoleak in devio", - "cmt_id": "4077ef4797a8ff007a2de091c9befee4882c4790" + "CVE-2019-11191": { + "cmt_msg": "x86: Deprecate a.out support" }, - "CVE-2016-6136": { - "cmt_msg": "audit: fix a double fetch in audit_log_single_execve_arg()", - "cmt_id": "53eaa3910ae67e497fb33188d515c14ed17a7a0e" - } - }, - "4.4.20": { - "CVE-2016-6480": { - "cmt_msg": "aacraid: Check size values after double-fetch from user", - "cmt_id": "e4878ef66e5b8d01d6734b1952f9abb3eeea454c" - } - }, - "4.4.21": { - "CVE-2016-10229": { - "cmt_msg": "udp: properly support MSG_PEEK with truncated buffers", - "cmt_id": "dfe2042d96065f044a794f684e9f7976a4ca6e24" + "CVE-2021-47170": { + "cmt_msg": "USB: usbfs: Don't WARN about excessively large memory allocations" }, - "CVE-2016-5244": { - "cmt_msg": "rds: fix an infoleak in rds_inc_info_copy", - "cmt_id": "ffd5ce2ad5fd140ddd492ab2064e29e86aaa64ea" + "CVE-2021-47171": { + "cmt_msg": "net: usb: fix memory leak in smsc75xx_bind" }, - "CVE-2016-5243": { - "cmt_msg": "tipc: fix an infoleak in tipc_nl_compat_link_dump", - "cmt_id": "5fb71611925f734f7fe03a45527e14b296fd5167" + "CVE-2021-47172": { + "cmt_msg": "iio: adc: ad7124: Fix potential overflow due to non sequential channel numbers" }, - "CVE-2016-7915": { - "cmt_msg": "HID: core: prevent out-of-bound readings", - "cmt_id": "5349cdd3b49cea2d57dc05bbf3f313979751fed3" + "CVE-2021-47173": { + "cmt_msg": "misc/uss720: fix memory leak in uss720_probe" }, - "CVE-2016-3135": { - "cmt_msg": "netfilter: x_tables: check for size overflow", - "cmt_id": "cfd6e7fe434a378127e4964fc0b7ccf32ae2baed" + "CVE-2021-47175": { + "cmt_msg": "net/sched: fq_pie: fix OOB access in the traffic path" }, - "CVE-2016-0758": { - "cmt_msg": "KEYS: Fix ASN.1 indefinite length object parsing", - "cmt_id": "5afbd223e60a130f66bddf7598165ebe2b51f8db" + "CVE-2018-10323": { + "cmt_msg": "xfs: set format back to extents if xfs_bmap_extents_to_btree" }, - "CVE-2016-6130": { - "cmt_msg": "s390/sclp_ctl: fix potential information leak with /dev/sclp", - "cmt_id": "2d29d6cec3bc5473efdad3b143404d9e32817c86" - } - }, - "4.4.22": { - "CVE-2016-9178": { - "cmt_msg": "fix minor infoleak in get_user_ex()", - "cmt_id": "9d25c78ec01c402dc56272693c44ef9d72ecdd2e" + "CVE-2018-10322": { + "cmt_msg": "xfs: enhance dinode verifier" }, - "CVE-2016-10318": { - "cmt_msg": "fscrypto: add authorization check for setting encryption policy", - "cmt_id": "8d693a2e67b5793ee58d106fded28902b7fd0f72" - } - }, - "4.4.23": { - "CVE-2016-6828": { - "cmt_msg": "tcp: fix use after free in tcp_xmit_retransmit_queue()", - "cmt_id": "0f55fa7541d7ff34a6690438bb00b78521b98b54" - } - }, - "4.4.24": { - "CVE-2017-15102": { - "cmt_msg": "usb: misc: legousbtower: Fix NULL pointer deference", - "cmt_id": "62dd9cf78b280c8cd08162f8c4a490fb76deeb23" + "CVE-2021-46951": { + "cmt_msg": "tpm: efi: Use local variable for calculating final log size" }, - "CVE-2016-10044": { - "cmt_msg": "aio: mark AIO pseudo-fs noexec", - "cmt_id": "0d9529e1b881ae80b40270b55dcbf7468be0099c" - } - }, - "4.4.26": { - "CVE-2016-5195": { - "cmt_msg": "mm: remove gup_flags FOLL_WRITE games from __get_user_pages()", - "cmt_id": "1294d355881cc5c3421d24fee512f16974addb6c" - } - }, - "4.4.27": { - "CVE-2016-7425": { - "cmt_msg": "scsi: arcmsr: Buffer overflow in arcmsr_iop_message_xfer()", - "cmt_id": "24040922827859d1d69597c3bc0c31fad523fd21" - } - }, - "4.4.29": { - "CVE-2016-8666": { - "cmt_msg": "tunnels: Don't apply GRO to multiple layers of encapsulation.", - "cmt_id": "5699b3431e0b14736867484b8669ead2d40f575e" + "CVE-2021-46950": { + "cmt_msg": "md/raid1: properly indicate failure when ending a failed write request" }, - "CVE-2016-8658": { - "cmt_msg": "brcmfmac: avoid potential stack overflow in brcmf_cfg80211_start_ap()", - "cmt_id": "b82a7f93b4e60d8689d8f4e687ef58ed2098739f" + "CVE-2021-46952": { + "cmt_msg": "NFS: fs_context: validate UDP retrans to prevent shift out-of-bounds" }, - "CVE-2016-9644": { - "cmt_msg": "x86/mm: Expand the exception table logic to allow new handling options", - "cmt_id": "fcf5e5198b447969ed2a56ec335dae3c695a6b46" + "CVE-2021-46959": { + "cmt_msg": "spi: Fix use-after-free with devm_spi_alloc_*" }, - "CVE-2016-7097": { - "cmt_msg": "posix_acl: Clear SGID bit when setting file permissions", - "cmt_id": "57c9cfdb61ea270936fab76da99a742c6ef0b86f" - } - }, - "4.4.31": { - "CVE-2016-7042": { - "cmt_msg": "KEYS: Fix short sprintf buffer in /proc/keys show function", - "cmt_id": "940d7ecbc57c94d6cd174d9d3247e07fd1b1467d" + "CVE-2017-18193": { + "cmt_msg": "f2fs: fix a bug caused by NULL extent tree" }, - "CVE-2016-8633": { - "cmt_msg": "firewire: net: guard against rx buffer overflows", - "cmt_id": "46e14262a063714610b916404a20880fbd4cd0ce" + "CVE-2023-5178": { + "cmt_msg": "nvmet-tcp: Fix a possible UAF in queue intialization setup" }, - "CVE-2016-8630": { - "cmt_msg": "kvm: x86: Check memopp before dereference (CVE-2016-8630)", - "cmt_id": "91e1f7b0eb252ce8f88d69227ef5f52f9efb2aae" - } - }, - "4.4.32": { - "CVE-2016-7039": { - "cmt_msg": "net: add recursion limit to GRO", - "cmt_id": "3cb00b90e8b1bd59382f5e1304dd751f9674f027" + "CVE-2021-0929": { + "cmt_msg": "staging/android/ion: delete dma_buf->kmap/unmap implemenation" }, - "CVE-2016-9555": { - "cmt_msg": "sctp: validate chunk len before actually using it", - "cmt_id": "bd891f40f04f8b96d9148ff8a5d538b60171409c" - } - }, - "4.4.34": { - "CVE-2015-8964": { - "cmt_msg": "tty: Prevent ldisc drivers from re-using stale tty fields", - "cmt_id": "4e772c53ab9836b083c21acf9d2d76805e1d133e" + "CVE-2018-19985": { + "cmt_msg": "USB: hso: Fix OOB memory access in hso_probe/hso_get_config_data" }, - "CVE-2016-8645": { - "cmt_msg": "tcp: take care of truncations done by sk_filter()", - "cmt_id": "225a24ae97331f3b9d97c1bb97b1e30b3633bcf4" - } - }, - "4.4.36": { - "CVE-2016-9756": { - "cmt_msg": "KVM: x86: drop error recovery in em_jmp_far and em_ret_far", - "cmt_id": "b7f9404d1b488b6773c7a2e6da92aa6cb5bd125e" + "CVE-2021-0920": { + "cmt_msg": "af_unix: fix garbage collect vs MSG_PEEK" }, - "CVE-2016-8650": { - "cmt_msg": "mpi: Fix NULL ptr dereference in mpi_powm()", - "cmt_id": "249090830942565fb0ce7c1e018d927a14282ead" - } - }, - "4.4.37": { - "CVE-2016-9794": { - "cmt_msg": "ALSA: pcm : Call kill_fasync() in stream lock", - "cmt_id": "58cebd1a08ed114e05cc9d16dee9e5423f564c82" - } - }, - "4.4.38": { - "CVE-2016-9793": { - "cmt_msg": "net: avoid signed overflows for SO_{SND|RCV}BUFFORCE", - "cmt_id": "77125815f058d587cac9217ac2c468038a7285c4" + "CVE-2017-7273": { + "cmt_msg": "HID: hid-cypress: validate length of report" }, - "CVE-2016-10200": { - "cmt_msg": "l2tp: fix racy SOCK_ZAPPED flag check in l2tp_ip{,6}_bind()", - "cmt_id": "56366fa0ad46a59abe2460b8acb775f7f84fbf16" + "CVE-2017-7477": { + "cmt_msg": "macsec: avoid heap overflow in skb_to_sgvec" }, - "CVE-2016-8655": { - "cmt_msg": "packet: fix race condition in packet_set_ring", - "cmt_id": "5a01eaf19858278cc22525be118fe9c6a3c86e83" + "CVE-2023-0615": { + "cmt_msg": "media: vivid: dev->bitmap_cap wasn't freed in all cases" }, - "CVE-2016-8399": { - "cmt_msg": "net: ping: check minimum size on ICMP header length", - "cmt_id": "06cdad2b6d921dee33c8efc84922533dfb1458c6" - } - }, - "4.4.39": { - "CVE-2016-10147": { - "cmt_msg": "crypto: mcryptd - Check mcryptd algorithm compatibility", - "cmt_id": "9a3baed9103bc413a5e98e13e31cd8ae7c0b5563" - } - }, - "4.4.40": { - "CVE-2015-8709": { - "cmt_msg": "mm: Add a user_ns owner to mm_struct and fix ptrace permission checks", - "cmt_id": "03eed7afbc09e061f66b448daf7863174c3dc3f3" - } - }, - "4.4.41": { - "CVE-2016-9588": { - "cmt_msg": "kvm: nVMX: Allow L1 to intercept software exceptions (#BP and #OF)", - "cmt_id": "19aa9c14989e7a3fe04b444f146a05ff857b058e" + "CVE-2017-7472": { + "cmt_msg": "KEYS: fix keyctl_set_reqkey_keyring() to not leak thread keyrings" }, - "CVE-2016-10088": { - "cmt_msg": "sg_write()/bsg_write() is not fit to be called under KERNEL_DS", - "cmt_id": "d85727365859108cbcf832c2b3c38358ddc7638b" - } - }, - "4.4.43": { - "CVE-2017-7273": { - "cmt_msg": "HID: hid-cypress: validate length of report", - "cmt_id": "a2f727149ee4e746da55d209a0179b68d31d3915" - } - }, - "4.4.44": { - "CVE-2017-2583": { - "cmt_msg": "KVM: x86: fix emulation of \"MOV SS, null selector\"", - "cmt_id": "816307c80d4ddad5414a05ff5861f063d29cda6f" + "CVE-2022-3586": { + "cmt_msg": "sch_sfb: Don't assume the skb is still around after enqueueing to child" }, - "CVE-2016-9191": { - "cmt_msg": "sysctl: Drop reference added by grab_header in proc_sys_readdir", - "cmt_id": "b9d6631395a1e25b210ce112b1bc10f3c665ea20" + "CVE-2020-27825": { + "cmt_msg": "tracing: Fix race in trace_open and buffer resize call" }, - "CVE-2017-5549": { - "cmt_msg": "USB: serial: kl5kusb105: fix line-state error handling", - "cmt_id": "3ef5bc0b385f81e88574c29a13edf80f092d515f" + "CVE-2019-2181": { + "cmt_msg": "binder: check for overflow when alloc for security context" }, - "CVE-2017-2584": { - "cmt_msg": "KVM: x86: Introduce segmented_write_std", - "cmt_id": "9d3875c0c462808f4d59dfa18a79d4b5b235acbd" - } - }, - "4.4.45": { - "CVE-2017-5547": { - "cmt_msg": "HID: corsair: fix DMA buffers on stack", - "cmt_id": "0f37d20fdc70ee54f002bd77ce54a2a303ad0437" + "CVE-2019-2182": { + "cmt_msg": "arm64: Enforce BBM for huge IO/VMAP mappings" }, - "CVE-2017-5551": { - "cmt_msg": "tmpfs: clear S_ISGID when setting posix ACLs", - "cmt_id": "36672b8b99e2cf2ab0587f08a19f394f8f65a861" - } - }, - "4.4.46": { - "CVE-2016-8405": { - "cmt_msg": "fbdev: color map copying bounds checking", - "cmt_id": "63db7c91a3c0ebe0e291feea53e4c63391db9465" - } - }, - "4.4.48": { - "CVE-2016-10208": { - "cmt_msg": "ext4: validate s_first_meta_bg at mount time", - "cmt_id": "e21a3cad35bc2f4c7fff317e2c7d38eed363a430" - } - }, - "4.4.49": { - "CVE-2017-2618": { - "cmt_msg": "selinux: fix off-by-one in setprocattr", - "cmt_id": "e72c13d93e9ed2b131ceb9a290ab056ce0dd41ab" - } - }, - "4.4.50": { - "CVE-2017-5986": { - "cmt_msg": "sctp: avoid BUG_ON on sctp_wait_for_sndbuf", - "cmt_id": "a4226c7ebfb5748447f1640c97f0306ed69e44f8" + "CVE-2020-27820": { + "cmt_msg": "drm/nouveau: use drm_dev_unplug() during device removal" }, - "CVE-2017-5897": { - "cmt_msg": "ip6_gre: fix ip6gre_err() invalid reads", - "cmt_id": "eaa3a58f450383aaa8632eea23f2a70d85c55d9d" + "CVE-2023-6610": { + "cmt_msg": "smb: client: fix potential OOB in smb2_dump_detail()" }, - "CVE-2017-6214": { - "cmt_msg": "tcp: avoid infinite loop in tcp_splice_read()", - "cmt_id": "82e9f6b90a0e7fbc017bdce23845c7580db6f657" + "CVE-2023-1476": { + "cmt_msg": "" }, - "CVE-2017-5970": { - "cmt_msg": "ipv4: keep skb->dst around in presence of IP options", - "cmt_id": "2d9c2e011fd3f1be4e5643d6ad186faa5e50d4d1" - } - }, - "4.4.52": { - "CVE-2017-6345": { - "cmt_msg": "net/llc: avoid BUG_ON() in skb_orphan()", - "cmt_id": "2b3eb43342a00d03e953208f45866925ca255e15" + "CVE-2023-1670": { + "cmt_msg": "xirc2ps_cs: Fix use after free bug in xirc2ps_detach" }, - "CVE-2017-6346": { - "cmt_msg": "packet: fix races in fanout_add()", - "cmt_id": "abd672deb170c4443e41173160de0ba2ae1abc08" + "CVE-2020-14351": { + "cmt_msg": "perf/core: Fix race in the perf_mmap_close() function" }, - "CVE-2017-6347": { - "cmt_msg": "ip: fix IP_CHECKSUM handling", - "cmt_id": "ce9ecb8d7f3c698c48b0885936d0b7275dacde9c" + "CVE-2020-14353": { + "cmt_msg": "KEYS: prevent creating a different user's keyrings" }, - "CVE-2017-6348": { - "cmt_msg": "irda: Fix lockdep annotations in hashbin_delete().", - "cmt_id": "353dd7290025bc33555282848ab015c1bbf21186" + "CVE-2020-0429": { + "cmt_msg": "l2tp: fix race between l2tp_session_delete() and l2tp_tunnel_closeall()" }, - "CVE-2017-6074": { - "cmt_msg": "dccp: fix freeing skb too early for IPV6_RECVPKTINFO", - "cmt_id": "a95df078e86624ee330e82aad34cfd3b5fcf21ce" - } - }, - "4.4.53": { - "CVE-2017-5669": { - "cmt_msg": "ipc/shm: Fix shmat mmap nil-page protection", - "cmt_id": "f0ae01568e0cf4b00071d1dfd27c90022c2b6d7e" - } - }, - "4.4.54": { - "CVE-2017-2636": { - "cmt_msg": "tty: n_hdlc: get rid of racy n_hdlc.tbuf", - "cmt_id": "999853d941b99ca2ac4a331552c388e2603a9b1d" - } - }, - "4.4.55": { - "CVE-2016-2188": { - "cmt_msg": "USB: iowarrior: fix NULL-deref at probe", - "cmt_id": "179295c38d23874357ca75af104fd6f1fe769cfd" + "CVE-2020-14356": { + "cmt_msg": "cgroup: fix cgroup_sk_alloc() for sk_clone_lock()" }, - "CVE-2017-8924": { - "cmt_msg": "USB: serial: io_ti: fix information leak in completion handler", - "cmt_id": "72bb2b96b8568a74f28e2a2c39e005583595b2c2" + "CVE-2022-20132": { + "cmt_msg": "HID: add hid_is_usb() function to make it simpler for USB detection" }, - "CVE-2017-8925": { - "cmt_msg": "USB: serial: omninet: fix reference leaks at open", - "cmt_id": "54f11a9662b632defe4d75c7574fddbc5c503c9c" - } - }, - "4.4.59": { - "CVE-2017-7184": { - "cmt_msg": "xfrm_user: validate XFRM_MSG_NEWAE XFRMA_REPLAY_ESN_VAL replay_window", - "cmt_id": "cce7e56dd73f75fef0a7f594fb129285a660fec0" + "CVE-2023-6270": { + "cmt_msg": "aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts" }, - "CVE-2017-7374": { - "cmt_msg": "fscrypt: remove broken support for detecting keyring key revocation", - "cmt_id": "7a5202190810dde1467718235c1f650fcf57592a" - } - }, - "4.4.60": { - "CVE-2017-7187": { - "cmt_msg": "scsi: sg: check length passed to SG_NEXT_CMD_LEN", - "cmt_id": "a92f411914cad6532e82e4607bc4075a5ffaa366" - } - }, - "4.4.61": { - "CVE-2017-7261": { - "cmt_msg": "drm/vmwgfx: NULL pointer dereference in vmw_surface_define_ioctl()", - "cmt_id": "b26629453c7b2a6c82000b36fbd1cfc4d9101808" + "CVE-2023-1582": { + "cmt_msg": "fs/proc: task_mmu.c: don't read mapcount for migration entry" }, - "CVE-2017-7616": { - "cmt_msg": "mm/mempolicy.c: fix error handling in set_mempolicy and mbind.", - "cmt_id": "b73d08ce20c5cb2e0cec8c019a27b9574e2c4ec2" + "CVE-2019-17351": { + "cmt_msg": "xen: let alloc_xenballooned_pages() fail if not enough memory free" }, - "CVE-2017-7294": { - "cmt_msg": "drm/vmwgfx: fix integer overflow in vmw_surface_define_ioctl()", - "cmt_id": "c21636bd64c511160846bdf87ef4c7ff48680c99" - } - }, - "4.4.62": { - "CVE-2017-7308": { - "cmt_msg": "net/packet: fix overflow in check for priv area size", - "cmt_id": "d35f8fa0b93e61dd95b8f86928a783c4d8a32d3e" - } - }, - "4.4.63": { - "CVE-2017-6353": { - "cmt_msg": "sctp: deny peeloff operation on asocs with threads sleeping on it", - "cmt_id": "e2f5fb9207a6bd7101ad94e73264ac8bb9e3b87a" + "CVE-2018-20854": { + "cmt_msg": "phy: ocelot-serdes: fix out-of-bounds read" }, - "CVE-2017-7618": { - "cmt_msg": "crypto: ahash - Fix EINPROGRESS notification callback", - "cmt_id": "2673d1c5122ee2492e24d9a135e230b2d0b2e630" + "CVE-2018-20855": { + "cmt_msg": "IB/mlx5: Fix leaking stack memory to userspace" }, - "CVE-2017-8064": { - "cmt_msg": "dvb-usb-v2: avoid use-after-free", - "cmt_id": "0cb03b6e7086e59647cf6eb79fec646cdec69691" + "CVE-2023-35824": { + "cmt_msg": "media: dm1105: Fix use after free bug in dm1105_remove due to race condition" }, - "CVE-2017-7889": { - "cmt_msg": "mm: Tighten x86 /dev/mem with zeroing reads", - "cmt_id": "6739cc12f3dbd7e4b3795f6e809d44ea6b490bb6" + "CVE-2019-1999": { + "cmt_msg": "binder: fix race between munmap() and direct reclaim" }, - "CVE-2017-2596": { - "cmt_msg": "kvm: fix page struct leak in handle_vmon", - "cmt_id": "c1fc1d2f214e33f91565a65ad1b4c09dae618d84" - } - }, - "4.4.64": { - "CVE-2017-7472": { - "cmt_msg": "KEYS: fix keyctl_set_reqkey_keyring() to not leak thread keyrings", - "cmt_id": "c9460fbceb2f3efa1d20050cdbffa51ec025745a" + "CVE-2018-1065": { + "cmt_msg": "netfilter: add back stackpointer size checks" }, - "CVE-2016-9604": { - "cmt_msg": "KEYS: Disallow keyrings beginning with '.' to be joined as session keyrings", - "cmt_id": "b5737b92560efcb956d2def4dcd3f4b6d4118e58" - } - }, - "4.4.65": { - "CVE-2016-7913": { - "cmt_msg": "xc2028: avoid use after free", - "cmt_id": "0d9dac5d7cc31df50757f26bcbdfbcf47277a1b2" + "CVE-2018-1066": { + "cmt_msg": "CIFS: Enable encryption during session setup phase" }, - "CVE-2016-6213": { - "cmt_msg": "mnt: Add a per mount namespace limit on the number of mounts", - "cmt_id": "c50fd34e10897114a7be2120133bd7e0b4184024" + "CVE-2018-1068": { + "cmt_msg": "netfilter: ebtables: CONFIG_COMPAT: don't trust userland offsets" }, - "CVE-2016-8632": { - "cmt_msg": "tipc: check minimum bearer MTU", - "cmt_id": "65d30f7545ffdddcf10a59f3e54b032c5ade2e9d" + "CVE-2017-17053": { + "cmt_msg": "x86/mm: Fix use-after-free of ldt_struct" }, - "CVE-2017-2671": { - "cmt_msg": "ping: implement proper locking", - "cmt_id": "b7f47c794bc45eae975bf2a52a4463333111bb2a" + "CVE-2019-7308": { + "cmt_msg": "bpf: fix sanitation of alu op with pointer / scalar type from different paths" }, - "CVE-2016-9120": { - "cmt_msg": "staging/android/ion : fix a race condition in the ion driver", - "cmt_id": "a7544fdd1626b65db635022c9d36007bb32dd6d8" + "CVE-2018-1000199": { + "cmt_msg": "perf/hwbp: Simplify the perf-hwbp code, fix documentation" }, - "CVE-2016-9084": { - "cmt_msg": "vfio/pci: Fix integer overflows, bitmask check", - "cmt_id": "d23ef85b123d3dbd3ba8a3c5f0ef5e556feb635e" + "CVE-2022-1966": { + "cmt_msg": "netfilter: nf_tables: disallow non-stateful expression in sets earlier" }, - "CVE-2016-7917": { - "cmt_msg": "netfilter: nfnetlink: correctly validate length of batch messages", - "cmt_id": "9540baadb61ba5ed08832bb2a4cbfd876db37ff4" + "CVE-2021-3587": { + "cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect" }, - "CVE-2016-9083": { - "cmt_msg": "vfio/pci: Fix integer overflows, bitmask check", - "cmt_id": "d23ef85b123d3dbd3ba8a3c5f0ef5e556feb635e" + "CVE-2019-16995": { + "cmt_msg": "net: hsr: fix memory leak in hsr_dev_finalize()" }, - "CVE-2017-6001": { - "cmt_msg": "perf/core: Fix concurrent sys_perf_event_open() vs. 'move_group' race", - "cmt_id": "416bd4a366f3b4cd3f6a3246f91bd9f425891547" - } - }, - "4.4.66": { - "CVE-2017-0750": { - "cmt_msg": "f2fs: do more integrity verification for superblock", - "cmt_id": "716bcfeb12b8d55d278af47b927839b382d2837a" + "CVE-2017-18075": { + "cmt_msg": "crypto: pcrypt - fix freeing pcrypt instances" }, - "CVE-2017-7645": { - "cmt_msg": "nfsd: check for oversized NFSv2/v3 arguments", - "cmt_id": "82a0d8aabe043ac94efa255502754c70363dab0e" - } - }, - "4.4.67": { - "CVE-2017-10661": { - "cmt_msg": "timerfd: Protect the might cancel mechanism proper", - "cmt_id": "911bd54922cdcc259daf73cb1a3a9d0305b9061d" + "CVE-2017-18079": { + "cmt_msg": "Input: i8042 - fix crash at boot time" }, - "CVE-2017-7895": { - "cmt_msg": "nfsd: stricter decoding of write-like NFSv2/v3 ops", - "cmt_id": "da1ce38aaac7f08d319b4b76130aa4fd27c4489f" - } - }, - "4.4.68": { - "CVE-2017-10662": { - "cmt_msg": "f2fs: sanity check segment count", - "cmt_id": "4edbdf57bc26a126aa3cbafd63fae4b00e002e2d" - } - }, - "4.4.70": { - "CVE-2017-18360": { - "cmt_msg": "USB: serial: io_ti: fix div-by-zero in set_termios", - "cmt_id": "1e6e9c4c36f9626d5ad2b63aa7ad5686dde737e7" + "CVE-2020-1749": { + "cmt_msg": "net: ipv6_stub: use ip6_dst_lookup_flow instead of ip6_dst_lookup" }, - "CVE-2017-7487": { - "cmt_msg": "ipx: call ipxitf_put() in ioctl error path", - "cmt_id": "8a5b15e198f1701da75a8223cfe72c04bcb15160" + "CVE-2021-3760": { + "cmt_msg": "nfc: nci: fix the UAF of rf_conn_info object" }, - "CVE-2017-1000363": { - "cmt_msg": "char: lp: fix possible integer overflow in lp_setup()", - "cmt_id": "cda5c7e625cefed46311cb0b37816fb2ff42a8ee" - } - }, - "4.4.71": { - "CVE-2017-9077": { - "cmt_msg": "ipv6/dccp: do not inherit ipv6_mc_list from parent", - "cmt_id": "d1428ee5407396185aab56ca62d49e89726455e0" + "CVE-2017-18216": { + "cmt_msg": "ocfs2: subsystem.su_mutex is required while accessing the item->ci_parent" }, - "CVE-2017-9076": { - "cmt_msg": "ipv6/dccp: do not inherit ipv6_mc_list from parent", - "cmt_id": "d1428ee5407396185aab56ca62d49e89726455e0" + "CVE-2017-18218": { + "cmt_msg": "net: hns: Fix a skb used after free bug" }, - "CVE-2017-9075": { - "cmt_msg": "sctp: do not inherit ipv6_{mc|ac|fl}_list from parent", - "cmt_id": "ffa551def59c9b0e1747955af6a742443ae152fc" + "CVE-2021-39648": { + "cmt_msg": "usb: gadget: configfs: Fix use-after-free issue with udc_name" }, - "CVE-2017-9074": { - "cmt_msg": "ipv6: Prevent overrun when parsing v6 header options", - "cmt_id": "017fabead5c2aacb36df910bbfbfb1e813517ae3" + "CVE-2023-52569": { + "cmt_msg": "btrfs: remove BUG() after failure to insert delayed dir index item" }, - "CVE-2017-18221": { - "cmt_msg": "mlock: fix mlock count can not decrease in race condition", - "cmt_id": "03489bfc78304a0be057ec827a67c0d87dd97b2e" + "CVE-2023-52568": { + "cmt_msg": "x86/sgx: Resolves SECS reclaim vs. page fault for EAUG race" }, - "CVE-2017-8890": { - "cmt_msg": "dccp/tcp: do not inherit mc_list from parent", - "cmt_id": "5f67a1663c03a73962fb240cf821338f78981a23" + "CVE-2019-0136": { + "cmt_msg": "mac80211: drop robust management frames from unknown TA" }, - "CVE-2017-9242": { - "cmt_msg": "ipv6: fix out of bound writes in __ip6_append_data()", - "cmt_id": "38f02f2ce0ca58c45d95567a5d64f7dc90aa9c95" - } - }, - "4.4.72": { - "CVE-2017-9605": { - "cmt_msg": "drm/vmwgfx: Make sure backup_handle is always valid", - "cmt_id": "74276868b45585f77eae2372c95e016aacfd0d3c" + "CVE-2023-52563": { + "cmt_msg": "drm/meson: fix memory leak on ->hpd_notify callback" }, - "CVE-2017-15274": { - "cmt_msg": "KEYS: fix dereferencing NULL payload with nonzero length", - "cmt_id": "bc6be3433e694d1ab1d0012b6053ae4e9a3b189e" + "CVE-2023-52561": { + "cmt_msg": "arm64: dts: qcom: sdm845-db845c: Mark cont splash memory region as reserved" }, - "CVE-2017-7346": { - "cmt_msg": "drm/vmwgfx: limit the number of mip levels in vmw_gb_surface_define_ioctl()", - "cmt_id": "619cc02fd85d69270c95e7db320b305e975aae00" + "CVE-2022-3344": { + "cmt_msg": "KVM: x86: nSVM: harden svm_free_nested against freeing vmcb02 while still in use" }, - "CVE-2017-1000380": { - "cmt_msg": "ALSA: timer: Fix race between read and ioctl", - "cmt_id": "f5bc918760c8100410847a6a6e4c25f24e358e0c" - } - }, - "4.4.74": { - "CVE-2017-1000364": { - "cmt_msg": "mm: larger stack guard gap, between vmas", - "cmt_id": "4b359430674caa2c98d0049a6941f157d2a33741" + "CVE-2023-52566": { + "cmt_msg": "nilfs2: fix potential use after free in nilfs_gccache_submit_read_data()" }, - "CVE-2017-1000379": { - "cmt_msg": "mm: larger stack guard gap, between vmas", - "cmt_id": "4b359430674caa2c98d0049a6941f157d2a33741" - } - }, - "4.4.75": { - "CVE-2017-1000365": { - "cmt_msg": "fs/exec.c: account for argv/envp pointers", - "cmt_id": "1d3d0f8b7cf758136ed36b30620442d989601737" + "CVE-2023-52565": { + "cmt_msg": "media: uvcvideo: Fix OOB read" }, - "CVE-2017-7482": { - "cmt_msg": "rxrpc: Fix several cases where a padded len isn't checked in ticket decode", - "cmt_id": "eab38dfd66d7f13b9eecfae7728ff0d2e49ff16f" - } - }, - "4.4.76": { - "CVE-2017-18017": { - "cmt_msg": "netfilter: xt_TCPMSS: add more sanity tests on tcph->doff", - "cmt_id": "234e649840d191379cd132d89f4b01a2495cfcc3" - } - }, - "4.4.77": { - "CVE-2017-11176": { - "cmt_msg": "mqueue: fix a use-after-free in sys_mq_notify()", - "cmt_id": "034e10b4f8348c2c267e491d1e2872023c35f310" + "CVE-2018-12896": { + "cmt_msg": "posix-timers: Sanitize overrun handling" }, - "CVE-2017-10810": { - "cmt_msg": "drm/virtio: don't leak bo on drm_gem_object_init failure", - "cmt_id": "a080ec466c3412dcf58cff69d6c05d1e670adc0c" + "CVE-2020-0347": { + "cmt_msg": "" }, - "CVE-2017-12146": { - "cmt_msg": "driver core: platform: fix race condition with driver_override", - "cmt_id": "c01ace719ebe6353f0c96e56f6c75c22ad3f67b0" - } - }, - "4.4.78": { - "CVE-2019-9457": { - "cmt_msg": "exec: Limit arg stack to at most 75% of _STK_LIM", - "cmt_id": "86949eb96466ec182303afc3c386bd70cc67b991" + "CVE-2021-40490": { + "cmt_msg": "ext4: fix race writing to an inline_data file while its xattrs are changing" }, - "CVE-2018-14634": { - "cmt_msg": "exec: Limit arg stack to at most 75% of _STK_LIM", - "cmt_id": "86949eb96466ec182303afc3c386bd70cc67b991" + "CVE-2021-33909": { + "cmt_msg": "seq_file: disallow extremely large seq buffer allocations" }, - "CVE-2017-11089": { - "cmt_msg": "cfg80211: Define nla_policy for NL80211_ATTR_LOCAL_MESH_POWER_MODE", - "cmt_id": "05bf0b6ef9ce7e8967c96fd419ad0ee5d7fe5418" + "CVE-2019-12456": { + "cmt_msg": "" }, - "CVE-2017-7541": { - "cmt_msg": "brcmfmac: fix possible buffer overflow in brcmf_cfg80211_mgmt_tx()", - "cmt_id": "4c7021c2fb74047649c03845ce6fd13626a5a418" + "CVE-2019-5108": { + "cmt_msg": "mac80211: Do not send Layer 2 Update frame before authorization" }, - "CVE-2017-1000371": { - "cmt_msg": "binfmt_elf: use ELF_ET_DYN_BASE only for PIE", - "cmt_id": "7eb968cd04d404e6c73cd82c1122f6e06ad2d1e8" + "CVE-2019-17133": { + "cmt_msg": "cfg80211: wext: avoid copying malformed SSIDs" }, - "CVE-2017-1000370": { - "cmt_msg": "binfmt_elf: use ELF_ET_DYN_BASE only for PIE", - "cmt_id": "7eb968cd04d404e6c73cd82c1122f6e06ad2d1e8" - } - }, - "4.4.79": { - "CVE-2017-11473": { - "cmt_msg": "x86/acpi: Prevent out of bound access caused by broken ACPI tables", - "cmt_id": "fa7ddee3485f17c28fe4079954c5716036de6152" + "CVE-2021-33656": { + "cmt_msg": "vt: drop old FONT ioctls" }, - "CVE-2017-18079": { - "cmt_msg": "Input: i8042 - fix crash at boot time", - "cmt_id": "bba6b69e11777695256619a77f90081ac7f99de7" - } - }, - "4.4.80": { - "CVE-2017-7533": { - "cmt_msg": "dentry name snapshots", - "cmt_id": "407669f2c9fe9f32aeb39f715d748fe456718aac" + "CVE-2021-33655": { + "cmt_msg": "fbcon: Disallow setting font bigger than screen size" }, - "CVE-2016-10741": { - "cmt_msg": "xfs: don't BUG() on mixed direct and mapped I/O", - "cmt_id": "56548b6f505a6df1c43dcb151a18d6190c250ed6" + "CVE-2022-41858": { + "cmt_msg": "drivers: net: slip: fix NPD bug in sl_tx_timeout()" + }, + "CVE-2022-41850": { + "cmt_msg": "HID: roccat: Fix use-after-free in roccat_read()" }, - "CVE-2017-12762": { - "cmt_msg": "isdn/i4l: fix buffer overflow", - "cmt_id": "d4b159f14d612132fdb1ade6d5015ee03a263e62" - } - }, - "4.4.81": { "CVE-2017-10663": { - "cmt_msg": "f2fs: sanity check checkpoint segno and blkoff", - "cmt_id": "76517ed2a7fe059840c1984165984e69cb488568" + "cmt_msg": "f2fs: sanity check checkpoint segno and blkoff" }, - "CVE-2017-8831": { - "cmt_msg": "saa7164: fix double fetch PCIe access condition", - "cmt_id": "deae9956cfb42f3d480c71f416f934d3ce84c033" + "CVE-2017-10662": { + "cmt_msg": "f2fs: sanity check segment count" }, - "CVE-2017-7542": { - "cmt_msg": "ipv6: avoid overflow of offset in ip6_find_1stfragopt", - "cmt_id": "f09db7559c1faf6f7c2128a92050b978a480681c" - } - }, - "4.4.82": { - "CVE-2017-1000": { - "cmt_msg": "udp: consistently apply ufo or fragmentation", - "cmt_id": "938990d2433cdecd225e1ab54a442b3ffdce1f87" + "CVE-2017-10661": { + "cmt_msg": "timerfd: Protect the might cancel mechanism proper" }, - "CVE-2017-1000112": { - "cmt_msg": "udp: consistently apply ufo or fragmentation", - "cmt_id": "938990d2433cdecd225e1ab54a442b3ffdce1f87" + "CVE-2022-1184": { + "cmt_msg": "ext4: verify dir block before splitting it" }, - "CVE-2017-1000111": { - "cmt_msg": "packet: fix tp_reserve race in packet_set_ring", - "cmt_id": "63364a508d24944abb0975bd823cb11367c56283" - } - }, - "4.4.84": { - "CVE-2017-12134": { - "cmt_msg": "xen: fix bio vec merging", - "cmt_id": "c0b397fd6b2b8ed7b39a717340b85b4b1add5332" + "CVE-2016-7425": { + "cmt_msg": "scsi: arcmsr: Buffer overflow in arcmsr_iop_message_xfer()" }, - "CVE-2017-14140": { - "cmt_msg": "Sanitize 'move_pages()' permission checks", - "cmt_id": "46d51a26efbc7cbaa2bc1f01628a00a604193856" + "CVE-2017-14991": { + "cmt_msg": "scsi: sg: fixup infoleak when using SG_GET_REQUEST_TABLE" }, - "CVE-2018-10675": { - "cmt_msg": "mm/mempolicy: fix use after free when calling get_mempolicy", - "cmt_id": "cc971fa12bd2dff6c0432c860d784c6cdaf5a04b" - } - }, - "4.4.87": { - "CVE-2017-11600": { - "cmt_msg": "xfrm: policy: check policy direction value", - "cmt_id": "9b3dcc98d8df16913d260c8dae64ad6e5bfcb953" - } - }, - "4.4.88": { - "CVE-2017-14340": { - "cmt_msg": "xfs: XFS_IS_REALTIME_INODE() should be false if no rt device present", - "cmt_id": "ad3903434142953a03b84ec8719ce80373a62266" + "CVE-2018-7566": { + "cmt_msg": "ALSA: seq: Fix racy pool initializations" }, - "CVE-2017-1000251": { - "cmt_msg": "Bluetooth: Properly check L2CAP config option output buffer length", - "cmt_id": "f7ec367c8ea7021517c9c04b0022c225d2d0785a" + "CVE-2017-7645": { + "cmt_msg": "nfsd: check for oversized NFSv2/v3 arguments" }, - "CVE-2017-9985": { - "cmt_msg": "ALSA: msnd: Optimize / harden DSP and MIDI loops", - "cmt_id": "55681470154567b4a8a30ec8b35a8ebd5a4f3608" + "CVE-2024-26808": { + "cmt_msg": "netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain" }, - "CVE-2017-9984": { - "cmt_msg": "ALSA: msnd: Optimize / harden DSP and MIDI loops", - "cmt_id": "55681470154567b4a8a30ec8b35a8ebd5a4f3608" - } - }, - "4.4.89": { - "CVE-2017-14106": { - "cmt_msg": "tcp: initialize rcv_mss to TCP_MIN_MSS instead of 0", - "cmt_id": "611a98c8eca3098173309642df187056c17e0f65" + "CVE-2024-26809": { + "cmt_msg": "netfilter: nft_set_pipapo: release elements in clone only from destroy path" }, - "CVE-2017-14991": { - "cmt_msg": "scsi: sg: fixup infoleak when using SG_GET_REQUEST_TABLE", - "cmt_id": "72896ca30a7f6ceb5238714d5761e4ad4521ccc5" + "CVE-2021-42739": { + "cmt_msg": "media: firewire: firedtv-avc: fix a buffer overflow in avc_ca_pmt()" }, - "CVE-2017-14051": { - "cmt_msg": "scsi: qla2xxx: Fix an integer overflow in sysfs code", - "cmt_id": "d8663aa2778965c75b5e75c7948b44f5de601a88" + "CVE-2024-26805": { + "cmt_msg": "netlink: Fix kernel-infoleak-after-free in __skb_datagram_iter" }, - "CVE-2017-0627": { - "cmt_msg": "media: uvcvideo: Prevent heap overflow when accessing mapped controls", - "cmt_id": "4931578fbeb525e717a7aa96f83f4d85cf48d0b2" - } - }, - "4.4.90": { - "CVE-2020-14353": { - "cmt_msg": "KEYS: prevent creating a different user's keyrings", - "cmt_id": "539255aea88e47932a98ba7656775cbca4f3d27c" + "CVE-2024-26806": { + "cmt_msg": "spi: cadence-qspi: remove system-wide suspend helper calls from runtime PM hooks" }, - "CVE-2017-14156": { - "cmt_msg": "video: fbdev: aty: do not leak uninitialized padding in clk to userspace", - "cmt_id": "27323cb81eae618e68e4dea1345090c37dee5485" + "CVE-2020-12771": { + "cmt_msg": "bcache: fix potential deadlock problem in btree_gc_coalesce" }, - "CVE-2017-12153": { - "cmt_msg": "nl80211: check for the required netlink attributes presence", - "cmt_id": "9d74367d1a35e87f46e5e0c2e8dd9f5d21f701b0" + "CVE-2020-12770": { + "cmt_msg": "scsi: sg: add sg_remove_request in sg_write" }, - "CVE-2017-1000252": { - "cmt_msg": "KVM: VMX: Do not BUG() on out-of-bounds guest IRQ", - "cmt_id": "7520be6a454c28955e711fdb49c81519bc537b39" + "CVE-2024-26802": { + "cmt_msg": "stmmac: Clear variable when destroying workqueue" }, - "CVE-2017-12154": { - "cmt_msg": "kvm: nVMX: Don't allow L2 to access the hardware CR8", - "cmt_id": "21a638c5efd6ec7a10441bfb94e15e5288920f07" + "CVE-2018-6412": { + "cmt_msg": "fbdev: Fixing arbitrary kernel leak in case FBIOGETCMAP_SPARC in sbusfb_ioctl_helper()." }, - "CVE-2017-18270": { - "cmt_msg": "KEYS: prevent creating a different user's keyrings", - "cmt_id": "539255aea88e47932a98ba7656775cbca4f3d27c" + "CVE-2023-52606": { + "cmt_msg": "powerpc/lib: Validate size for vector operations" }, - "CVE-2017-14489": { - "cmt_msg": "scsi: scsi_transport_iscsi: fix the issue that iscsi_if_rx doesn't parse nlmsg properly", - "cmt_id": "9d2534917c25a58b67864ea1db930670d48dee75" + "CVE-2018-21008": { + "cmt_msg": "rsi: add fix for crash during assertions" }, - "CVE-2017-12192": { - "cmt_msg": "KEYS: prevent KEYCTL_READ on negative key", - "cmt_id": "638b38505045e1090313ff7ed284911870cd29f8" + "CVE-2023-52604": { + "cmt_msg": "FS:JFS:UBSAN:array-index-out-of-bounds in dbAdjTree" }, - "CVE-2017-15537": { - "cmt_msg": "x86/fpu: Don't let userspace set bogus xcomp_bv", - "cmt_id": "d25fea066a8ed4457a9f8b23eb78204b9b6896cf" - } - }, - "4.4.92": { - "CVE-2017-16526": { - "cmt_msg": "uwb: properly check kthread_run return value", - "cmt_id": "5a21af11c6810b936b17a2c5c69518be0da8f4c3" + "CVE-2023-52602": { + "cmt_msg": "jfs: fix slab-out-of-bounds Read in dtSearch" }, - "CVE-2017-16534": { - "cmt_msg": "USB: core: harden cdc_parse_cdc_header", - "cmt_id": "feab51a916ed07219dee38b898fe22bd2a98193a" + "CVE-2023-52603": { + "cmt_msg": "UBSAN: array-index-out-of-bounds in dtSplitRoot" }, - "CVE-2017-16531": { - "cmt_msg": "USB: fix out-of-bounds in usb_set_configuration", - "cmt_id": "13713e63bdb306f9a58d359b15edd60f34eac5ee" + "CVE-2023-52600": { + "cmt_msg": "jfs: fix uaf in jfs_evict_inode" }, - "CVE-2017-16530": { - "cmt_msg": "USB: uas: fix bug in handling of alternate settings", - "cmt_id": "5d9a9c3dcc1f63215b5a5b877be589974ec4f31d" + "CVE-2023-52601": { + "cmt_msg": "jfs: fix array-index-out-of-bounds in dbAdjTree" }, - "CVE-2017-16529": { - "cmt_msg": "ALSA: usb-audio: Check out-of-bounds access by corrupted buffer descriptor", - "cmt_id": "46c7b1fa4911a859a82575e3ffb55b34a89a222d" - } - }, - "4.4.93": { - "CVE-2017-0786": { - "cmt_msg": "brcmfmac: add length check in brcmf_cfg80211_escan_handler()", - "cmt_id": "6721969c7b8a35f85a41acaabdad190ed32cf704" + "CVE-2023-52609": { + "cmt_msg": "binder: fix race between mmput() and do_exit()" }, - "CVE-2017-16527": { - "cmt_msg": "ALSA: usb-audio: Kill stray URB at exiting", - "cmt_id": "dc7c3bd09c7d2063c4d1be23d72ee85f1b3bb947" + "CVE-2024-23196": { + "cmt_msg": "ALSA: hda: fix a possible null-pointer dereference due to data race in snd_hdac_regmap_sync()" }, - "CVE-2017-16525": { - "cmt_msg": "USB: serial: console: fix use-after-free after failed setup", - "cmt_id": "208563455aac7540755bb9d8e8edaf7c5ef61d8c" + "CVE-2017-1000379": { + "cmt_msg": "mm: larger stack guard gap, between vmas" }, - "CVE-2017-16533": { - "cmt_msg": "HID: usbhid: fix out-of-bounds bug", - "cmt_id": "2929cb995378205bceda86d6fd3cbc22e522f97f" + "CVE-2023-3640": { + "cmt_msg": "" }, - "CVE-2017-15265": { - "cmt_msg": "ALSA: seq: Fix use-after-free at creating a port", - "cmt_id": "23709ae9b61429502fcd4686e7a97333f3b3544a" + "CVE-2017-1000371": { + "cmt_msg": "binfmt_elf: use ELF_ET_DYN_BASE only for PIE" }, - "CVE-2017-12190": { - "cmt_msg": "fix unbalanced page refcounting in bio_map_user_iov", - "cmt_id": "399c46095eb5d41934c8a99732028a9f1cf0ac50" - } - }, - "4.4.94": { - "CVE-2018-9568": { - "cmt_msg": "net: Set sk_prot_creator when cloning sockets to the right proto", - "cmt_id": "685699703a0a39896ba0af91e6d2a80103fe4966" + "CVE-2017-1000370": { + "cmt_msg": "binfmt_elf: use ELF_ET_DYN_BASE only for PIE" }, - "CVE-2017-15649": { - "cmt_msg": "packet: in packet_do_bind, test fanout with bind_lock held", - "cmt_id": "1b6c80e797eeadf643861f8340ed5791d813d80c" - } - }, - "4.4.95": { - "CVE-2017-15299": { - "cmt_msg": "KEYS: don't let add_key() update an uninstantiated key", - "cmt_id": "33dea302f9bc1e2c41392a308cfb50f6c02bb096" + "CVE-2023-3022": { + "cmt_msg": "ipv6: Use result arg in fib_lookup_arg consistently" }, - "CVE-2017-16535": { - "cmt_msg": "USB: core: fix out-of-bounds access bug in usb_get_bos_descriptor()", - "cmt_id": "9dff499d822660c6dbb2a407a7d85be26f87da07" + "CVE-2022-43750": { + "cmt_msg": "usb: mon: make mmapped memory read only" }, - "CVE-2017-15951": { - "cmt_msg": "KEYS: Fix race between updating and finding a negative key", - "cmt_id": "8a004caec12bf241e567e3640401256cc9bc2e45" - } - }, - "4.4.96": { - "CVE-2017-16643": { - "cmt_msg": "Input: gtco - fix potential out-of-bound access", - "cmt_id": "2c99438cf66d585ba939068c8b8562e9104cd5c4" + "CVE-2023-0047": { + "cmt_msg": "mm, oom: do not trigger out_of_memory from the #PF" }, - "CVE-2017-12193": { - "cmt_msg": "assoc_array: Fix a buggy node-splitting case", - "cmt_id": "1cbbd99f3bfe27115c05332e7db73e23651b9f8b" - } - }, - "4.4.99": { - "CVE-2018-7191": { - "cmt_msg": "tun: call dev_get_valid_name() before register_netdevice()", - "cmt_id": "4b27fe34a226dd9087cb2e93161ffec03952c05a" + "CVE-2023-4010": { + "cmt_msg": "" }, - "CVE-2017-13080": { - "cmt_msg": "mac80211: accept key reinstall without changing anything", - "cmt_id": "6440f0ee8a1779f53526bccb9de00914daeb9094" + "CVE-2021-47167": { + "cmt_msg": "NFS: Fix an Oopsable condition in __nfs_pageio_add_request()" }, - "CVE-2017-16645": { - "cmt_msg": "Input: ims-psu - check if CDC union descriptor is sane", - "cmt_id": "b7c625ce6d279bf3e138c25c0cd3f595923825f3" + "CVE-2021-47166": { + "cmt_msg": "NFS: Don't corrupt the value of pg_bytes_written in nfs_do_recoalesce()" }, - "CVE-2017-16528": { - "cmt_msg": "ALSA: seq: Cancel pending autoload work at unbinding device", - "cmt_id": "1e98fd54c356bb2bcf827a74949c9372c455409f" + "CVE-2021-47165": { + "cmt_msg": "drm/meson: fix shutdown crash when component not probed" }, - "CVE-2017-16532": { - "cmt_msg": "usb: usbtest: fix NULL pointer dereference", - "cmt_id": "de46c1adbea694109036d3e7dee1fa6250b72660" - } - }, - "4.4.100": { - "CVE-2017-16537": { - "cmt_msg": "media: imon: Fix null-ptr-deref in imon_probe", - "cmt_id": "c344019c48a92e559b7f910e53e0c6f9018680fb" + "CVE-2021-47163": { + "cmt_msg": "tipc: wait and exit until all work queues are done" }, - "CVE-2017-9150": { - "cmt_msg": "bpf: don't let ldimm64 leak map addresses on unprivileged", - "cmt_id": "49630dd2e10a3b2fee0cec19feb63f08453b876f" + "CVE-2021-47162": { + "cmt_msg": "tipc: skb_linearize the head skb when reassembling msgs" }, - "CVE-2017-10911": { - "cmt_msg": "xen-blkback: don't leak stack data via response ring", - "cmt_id": "11e8e55be18cd39c3d54674362aa18695b243e22" + "CVE-2021-47160": { + "cmt_msg": "net: dsa: mt7530: fix VLAN traffic leaks" }, - "CVE-2017-16646": { - "cmt_msg": "media: dib0700: fix invalid dvb_detach argument", - "cmt_id": "0a418e57717d2d33275e9340c726ded671be7698" + "CVE-2023-4385": { + "cmt_msg": "fs: jfs: fix possible NULL pointer dereference in dbFree()" }, - "CVE-2017-16650": { - "cmt_msg": "net: qmi_wwan: fix divide by 0 on bad descriptors", - "cmt_id": "e455048c7ae95633c8778a0282d1ee86f78c5349" + "CVE-2021-46965": { + "cmt_msg": "mtd: physmap: physmap-bt1-rom: Fix unintentional stack access" }, - "CVE-2017-7518": { - "cmt_msg": "KVM: x86: fix singlestepping over syscall", - "cmt_id": "07e3aff243cdcb70d1e81e515aea553df3080f43" + "CVE-2023-4387": { + "cmt_msg": "net: vmxnet3: fix possible use-after-free bugs in vmxnet3_rq_alloc_rx_buf()" }, - "CVE-2017-16649": { - "cmt_msg": "net: cdc_ether: fix divide by 0 on bad descriptors", - "cmt_id": "caeeef8438c30e7d0e43293fcb7beb9f953bb2a9" + "CVE-2021-46962": { + "cmt_msg": "mmc: uniphier-sd: Fix a resource leak in the remove function" }, - "CVE-2017-15115": { - "cmt_msg": "sctp: do not peel off an assoc from one netns to another one", - "cmt_id": "46bdabbca02ebabd292d0ea3f610aa54e53f0e25" - } - }, - "4.4.101": { - "CVE-2017-18204": { - "cmt_msg": "ocfs2: should wait dio before inode lock in ocfs2_setattr()", - "cmt_id": "c4baa4a5870cb02f713def1620052bfca7a82bbb" + "CVE-2021-47168": { + "cmt_msg": "NFS: fix an incorrect limit in filelayout_decode_layout()" }, - "CVE-2017-16994": { - "cmt_msg": "mm/pagewalk.c: report holes in hugetlb ranges", - "cmt_id": "a3805b10de80953db316985f567453fc18329423" - } - }, - "4.4.103": { - "CVE-2017-18203": { - "cmt_msg": "dm: fix race between dm_get_from_kobject() and __dm_destroy()", - "cmt_id": "4e82464aa4a398207e2ecbc4877c82319ecdbafa" + "CVE-2019-19378": { + "cmt_msg": "" }, - "CVE-2017-16536": { - "cmt_msg": "cx231xx-cards: fix NULL-deref on missing association descriptor", - "cmt_id": "0870fb4c3566088dc222e582e43edbc9ececbce4" - } - }, - "4.4.104": { - "CVE-2017-16939": { - "cmt_msg": "ipsec: Fix aborted xfrm policy dump crash", - "cmt_id": "b377c453b3631531679cbe594b7d28c5ecd82cea" + "CVE-2022-36879": { + "cmt_msg": "xfrm: xfrm_policy: fix a possible double xfrm_pols_put() in xfrm_bundle_lookup()" }, - "CVE-2017-18208": { - "cmt_msg": "mm/madvise.c: fix madvise() infinite loop under special circumstances", - "cmt_id": "0d05a5593f6309cb0df0df474a807a3220855703" - } - }, - "4.4.106": { - "CVE-2017-0861": { - "cmt_msg": "ALSA: pcm: prevent UAF in snd_pcm_info", - "cmt_id": "659e7d2588f0fd970044fe00d9edeb482d375288" + "CVE-2019-19377": { + "cmt_msg": "btrfs: Don't submit any btree write bio if the fs has errors" }, - "CVE-2018-7492": { - "cmt_msg": "rds: Fix NULL pointer dereference in __rds_rdma_map", - "cmt_id": "6c154d536d9457bee261d057559e43d3f8ae5fd5" + "CVE-2017-7482": { + "cmt_msg": "rxrpc: Fix several cases where a padded len isn't checked in ticket decode" }, - "CVE-2017-1000407": { - "cmt_msg": "KVM: VMX: remove I/O port 0x80 bypass on Intel hosts", - "cmt_id": "477b837533a2f592702d2affab36b8052691287b" + "CVE-2017-7487": { + "cmt_msg": "ipx: call ipxitf_put() in ioctl error path" }, - "CVE-2018-18559": { - "cmt_msg": "net/packet: fix a race in packet_bind() and packet_notifier()", - "cmt_id": "b90f87c641bc9af04f0d8a21008880ae032de72c" - } - }, - "4.4.107": { - "CVE-2017-17558": { - "cmt_msg": "USB: core: prevent malicious bNumInterfaces overflow", - "cmt_id": "dfdf5fa3e6647c0fc02be8d857b6b8b7098946ff" + "CVE-2017-9150": { + "cmt_msg": "bpf: don't let ldimm64 leak map addresses on unprivileged" }, - "CVE-2017-17806": { - "cmt_msg": "crypto: hmac - require that the underlying hash algorithm is unkeyed", - "cmt_id": "43cd7f38612df31fbd929588c065cfbc42102aab" + "CVE-2023-1118": { + "cmt_msg": "media: rc: Fix use-after-free bugs caused by ene_tx_irqsim()" }, - "CVE-2017-17805": { - "cmt_msg": "crypto: salsa20 - fix blkcipher_walk API usage", - "cmt_id": "8a311b0462b59d12cb14e82e626d3612d988135b" + "CVE-2021-0937": { + "cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write" }, - "CVE-2017-17807": { - "cmt_msg": "KEYS: add missing permission check for request_key() destination", - "cmt_id": "13e86efb2eee6bd1f2d0aae5b0273e8e65683c9d" + "CVE-2017-7261": { + "cmt_msg": "drm/vmwgfx: NULL pointer dereference in vmw_surface_define_ioctl()" }, - "CVE-2017-16914": { - "cmt_msg": "usbip: fix stub_send_ret_submit() vulnerability to null transfer_buffer", - "cmt_id": "2862cfca39894ac265fbb5cde9a3ff90c02201f3" - } - }, - "4.4.109": { - "CVE-2017-17712": { - "cmt_msg": "net: ipv4: fix for a race condition in raw_sendmsg", - "cmt_id": "be27b620a861dc2a143b78e81e23f5622d9105da" + "CVE-2016-5244": { + "cmt_msg": "rds: fix an infoleak in rds_inc_info_copy" }, - "CVE-2017-18595": { - "cmt_msg": "tracing: Fix possible double free on failure of allocating trace buffer", - "cmt_id": "c2a62f84d49ff71cd7ffbe898c706ccc39955218" + "CVE-2016-5243": { + "cmt_msg": "tipc: fix an infoleak in tipc_nl_compat_link_dump" }, - "CVE-2017-15129": { - "cmt_msg": "net: Fix double free and memory corruption in get_net_ns_by_id()", - "cmt_id": "5854ca90c6c6c2ed65355eded45615bf8bcd6fd3" + "CVE-2022-47929": { + "cmt_msg": "net: sched: disallow noqueue for qdisc classes" }, - "CVE-2018-18386": { - "cmt_msg": "n_tty: fix EXTPROC vs ICANON interaction with TIOCINQ (aka FIONREAD)", - "cmt_id": "2e3883922530aa25ecc23cc27bab1d3fda779f5a" + "CVE-2019-16746": { + "cmt_msg": "nl80211: validate beacon head" }, - "CVE-2017-17449": { - "cmt_msg": "netlink: Add netns check on taps", - "cmt_id": "f778ce6faa0d4c8d7a90b7bd11c3db7fb687c8cc" - } - }, - "4.4.111": { - "CVE-2017-18075": { - "cmt_msg": "crypto: pcrypt - fix freeing pcrypt instances", - "cmt_id": "3ad85176e78d6671ede52eed588c3588d087b587" - } - }, - "4.4.112": { - "CVE-2017-17741": { - "cmt_msg": "KVM: Fix stack-out-of-bounds read in write_mmio", - "cmt_id": "eb91461daa77eb0ddb4c24aa427051f3669ba1f3" + "CVE-2022-3606": { + "cmt_msg": "" }, - "CVE-2017-5753": { - "cmt_msg": "x86/cpufeatures: Add X86_BUG_SPECTRE_V[12]", - "cmt_id": "caae411b6ee026c7f43d67932e9b5008cf623293" + "CVE-2018-18021": { + "cmt_msg": "arm64: KVM: Tighten guest core register access from userspace" }, - "CVE-2017-1000410": { - "cmt_msg": "Bluetooth: Prevent stack info leak from the EFS element.", - "cmt_id": "0ae86454c435e554d01c51535c3cd4312577cc74" + "CVE-2021-37576": { + "cmt_msg": "KVM: PPC: Book3S: Fix H_RTAS rets buffer overflow" }, - "CVE-2018-5333": { - "cmt_msg": "RDS: null pointer dereference in rds_atomic_free_op", - "cmt_id": "44496521c6bd65a3c525b490c762875a075cf73b" + "CVE-2022-3594": { + "cmt_msg": "r8152: Rate limit overflow messages" }, - "CVE-2018-5332": { - "cmt_msg": "RDS: Heap OOB write in rds_message_alloc_sgs()", - "cmt_id": "10d06ed9a1899fcc1ecb7a1573f0f95b92dc470c" + "CVE-2022-3595": { + "cmt_msg": "cifs: fix double-fault crash during ntlmssp" }, - "CVE-2017-13216": { - "cmt_msg": "staging: android: ashmem: fix a race condition in ASHMEM_SET_SIZE ioctl", - "cmt_id": "b4106c55b574fe37900b02ddf89cbe4b9d971392" - } - }, - "4.4.113": { - "CVE-2018-6927": { - "cmt_msg": "futex: Prevent overflow by strengthen input validation", - "cmt_id": "58c82be944f58561e77eb9db5039a4b0eca96ac5" - } - }, - "4.4.114": { - "CVE-2017-16913": { - "cmt_msg": "usbip: fix stub_rx: harden CMD_SUBMIT path to handle malicious input", - "cmt_id": "b6f826ba10dce86f74efd3c0953cb9982a3c51e2" + "CVE-2018-5803": { + "cmt_msg": "sctp: verify size of a new chunk in _sctp_make_chunk()" }, - "CVE-2017-16912": { - "cmt_msg": "usbip: fix stub_rx: get_pipe() to validate endpoint number", - "cmt_id": "80e733a9b37fb6b40351bf1924d5a90d89c375ae" + "CVE-2020-27815": { + "cmt_msg": "jfs: Fix array index bounds check in dbAdjTree" }, - "CVE-2017-16911": { - "cmt_msg": "usbip: prevent vhci_hcd driver from leaking a socket pointer address", - "cmt_id": "28f467e0bdda754aa36390fd90b01823f0d3b18d" + "CVE-2023-6606": { + "cmt_msg": "smb: client: fix OOB in smbCalcSize()" }, - "CVE-2017-11472": { - "cmt_msg": "ACPICA: Namespace: fix operand cache leak", - "cmt_id": "4c19b00e5588828f0d3198b926efade766dcf2c8" + "CVE-2020-27673": { + "cmt_msg": "xen/events: add a proper barrier to 2-level uevent unmasking" }, - "CVE-2018-1000028": { - "cmt_msg": "nfsd: auth: Fix gid sorting when rootsquash enabled", - "cmt_id": "3f84339bd344b2cf0afe64b78d3964bb6422d0f3" + "CVE-2020-27675": { + "cmt_msg": "xen/events: avoid removing an event channel while handling it" }, - "CVE-2017-17448": { - "cmt_msg": "netfilter: nfnetlink_cthelper: Add missing permission checks", - "cmt_id": "a359a437fbc6bb08aa9cc8e25ef4ac3b77ca727b" + "CVE-2020-28915": { + "cmt_msg": "fbcon: Fix global-out-of-bounds read in fbcon_get_font()" }, - "CVE-2017-17450": { - "cmt_msg": "netfilter: xt_osf: Add missing permission checks", - "cmt_id": "d01ceb4722cd8d64176272434fe332b596750d9c" - } - }, - "4.4.115": { - "CVE-2018-5344": { - "cmt_msg": "loop: fix concurrent lo_open/lo_release", - "cmt_id": "b392225467b8066538dfa200dc925c844b76880b" + "CVE-2022-3111": { + "cmt_msg": "power: supply: wm8350-power: Add missing free in free_charger_irq" }, - "CVE-2018-1000004": { - "cmt_msg": "ALSA: seq: Make ioctls race-free", - "cmt_id": "623e5c8ae32b39cc8baea83478695dc624935318" + "CVE-2020-0435": { + "cmt_msg": "f2fs: fix to do sanity check with i_extra_isize" }, - "CVE-2017-17862": { - "cmt_msg": "bpf: fix branch pruning logic", - "cmt_id": "1367d854b97493bfb1f3d24cf89ba60cb7f059ea" - } - }, - "4.4.116": { - "CVE-2018-5873": { - "cmt_msg": "nsfs: mark dentry with DCACHE_RCUACCESS", - "cmt_id": "49ffe04fcdf29c8925344bce314d9398b2d7743d" + "CVE-2020-0432": { + "cmt_msg": "staging: most: net: fix buffer overflow" }, - "CVE-2017-8824": { - "cmt_msg": "dccp: CVE-2017-8824: use-after-free in DCCP code", - "cmt_id": "3196c1515ea683bb6f95673feb2998f605ab581d" + "CVE-2020-0433": { + "cmt_msg": "blk-mq: sync the update nr_hw_queues with blk_mq_queue_tag_busy_iter" }, - "CVE-2017-16538": { - "cmt_msg": "media: dvb-usb-v2: lmedm04: Improve logic checking of warm start", - "cmt_id": "ca48c81cff0e5b56e525414b75990bcb64b7cbb9" + "CVE-2020-0431": { + "cmt_msg": "HID: hid-input: clear unmapped usages" }, - "CVE-2018-5750": { - "cmt_msg": "ACPI: sbshc: remove raw pointer from printk() message", - "cmt_id": "591060a7a0a09cbaa5b6c04bd309966586aa9d2e" + "CVE-2023-6915": { + "cmt_msg": "ida: Fix crash in ida_free when the bitmap is empty" }, - "CVE-2017-13305": { - "cmt_msg": "KEYS: encrypted: fix buffer overread in valid_master_desc()", - "cmt_id": "33813d43dd593e1c32c567c75483233212b825ae" + "CVE-2023-1249": { + "cmt_msg": "coredump: Use the vma snapshot in fill_files_note" }, - "CVE-2017-18344": { - "cmt_msg": "posix-timer: Properly check sigevent->sigev_notify", - "cmt_id": "77f56f5d39e95a152a755d53b0d870b92fbf466b" - } - }, - "4.4.117": { - "CVE-2018-7566": { - "cmt_msg": "ALSA: seq: Fix racy pool initializations", - "cmt_id": "b374197df2deb08fec55d48763711ea1df8efde7" - } - }, - "4.4.120": { - "CVE-2017-18193": { - "cmt_msg": "f2fs: fix a bug caused by NULL extent tree", - "cmt_id": "023ca5b884d2759b56dc8d480942835881853513" - } - }, - "4.4.121": { - "CVE-2018-5803": { - "cmt_msg": "sctp: verify size of a new chunk in _sctp_make_chunk()", - "cmt_id": "54b183ea4fe96c7b80439971ee04cf634a6e0459" - } - }, - "4.4.122": { - "CVE-2018-1068": { - "cmt_msg": "netfilter: ebtables: CONFIG_COMPAT: don't trust userland offsets", - "cmt_id": "6d31b2ef34fd718386a73c983877461bca58d3db" + "CVE-2021-3483": { + "cmt_msg": "firewire: nosy: Fix a use-after-free bug in nosy_ioctl()" }, - "CVE-2018-7995": { - "cmt_msg": "x86/MCE: Serialize sysfs changes", - "cmt_id": "e882c0baab3325c409d21edc24254c515d90d160" + "CVE-2023-6040": { + "cmt_msg": "netfilter: nf_tables: Reject tables of unsupported family" }, - "CVE-2018-1065": { - "cmt_msg": "netfilter: add back stackpointer size checks", - "cmt_id": "48db3004d40d97d3ac205d2d64ab580a8cfcfe63" + "CVE-2017-16912": { + "cmt_msg": "usbip: fix stub_rx: get_pipe() to validate endpoint number" }, - "CVE-2019-9456": { - "cmt_msg": "usb: usbmon: Read text within supplied buffer size", - "cmt_id": "abe0ecd5597c31c6b70dc347145789000f4cf68f" - } - }, - "4.4.123": { - "CVE-2018-7480": { - "cmt_msg": "blkcg: fix double free of new_blkg in blkcg_init_queue", - "cmt_id": "633a5a5235d697b145171ca1e702d3a4f6778131" + "CVE-2017-16911": { + "cmt_msg": "usbip: prevent vhci_hcd driver from leaking a socket pointer address" }, - "CVE-2017-16995": { - "cmt_msg": "bpf: fix incorrect sign extension in check_alu_op()", - "cmt_id": "a6132276ab5dcc38b3299082efeb25b948263adb" - } - }, - "4.4.124": { - "CVE-2017-18222": { - "cmt_msg": "net: hns: fix ethtool_get_strings overflow in hns driver", - "cmt_id": "7d7100094cd83e84ce53c51155ee9f507e2e9028" + "CVE-2017-16914": { + "cmt_msg": "usbip: fix stub_send_ret_submit() vulnerability to null transfer_buffer" }, - "CVE-2018-1066": { - "cmt_msg": "CIFS: Enable encryption during session setup phase", - "cmt_id": "26dc7476efad2151aadb7f72c0c8a253823ef289" - } - }, - "4.4.125": { - "CVE-2018-8822": { - "cmt_msg": "staging: ncpfs: memory corruption in ncp_read_kernel()", - "cmt_id": "badf74b65fc27112f5fee871c7ade9199c74b2e1" + "CVE-2020-36691": { + "cmt_msg": "netlink: limit recursion depth in policy validation" }, - "CVE-2018-8781": { - "cmt_msg": "drm: udl: Properly check framebuffer mmap offsets", - "cmt_id": "224eaa8a8e644e0d3df35fe232b08fd8fead8864" + "CVE-2023-42755": { + "cmt_msg": "net/sched: Retire rsvp classifier" }, - "CVE-2018-1087": { - "cmt_msg": "kvm/x86: fix icebp instruction handling", - "cmt_id": "5e4e65a940c91b61bfaf8d6e4448522577beb5ef" + "CVE-2023-42752": { + "cmt_msg": "igmp: limit igmpv3_newpack() packet size to IP_MAX_MTU" }, - "CVE-2018-8897": { - "cmt_msg": "x86/entry/64: Don't use IST entry for #BP stack", - "cmt_id": "c6fe55e30bb6d431ee56cd4bbb582e30766c5e0e" - } - }, - "4.4.126": { - "CVE-2018-1130": { - "cmt_msg": "dccp: check sk for closed state in dccp_sendmsg()", - "cmt_id": "de31c391673aeb2c1d09552ac75a6b7ee96d65ac" - } - }, - "4.4.127": { - "CVE-2018-1000199": { - "cmt_msg": "perf/hwbp: Simplify the perf-hwbp code, fix documentation", - "cmt_id": "d60017da67463bd7a11a7f7e08115be324afe216" + "CVE-2021-3573": { + "cmt_msg": "Bluetooth: use correct lock to prevent UAF of hdev object" }, - "CVE-2017-17975": { - "cmt_msg": "media: usbtv: prevent double free in error case", - "cmt_id": "607a6b7b6a7ad995c4c9cf3c2df66dc3f4febb52" - } - }, - "4.4.128": { - "CVE-2018-9422": { - "cmt_msg": "futex: Remove requirement for lock_page() in get_futex_key()", - "cmt_id": "93dcb09e29bb24a86aa7b7eff65e424f7dc98af2" + "CVE-2022-1974": { + "cmt_msg": "nfc: replace improper check device_is_registered() in netlink related functions" }, - "CVE-2018-7757": { - "cmt_msg": "scsi: libsas: fix memory leak in sas_smp_get_phy_events()", - "cmt_id": "92b72d2f84389e27d81c93beaf9093f8cf1ef449" - } - }, - "4.4.129": { - "CVE-2018-1092": { - "cmt_msg": "ext4: fail ext4_iget for root directory if unallocated", - "cmt_id": "990251318b97ed7153d9adbf633035536c7d685b" - } - }, - "4.4.130": { - "CVE-2018-10940": { - "cmt_msg": "cdrom: information leak in cdrom_ioctl_media_changed()", - "cmt_id": "e47611257d7b46bfdc70726a8a236881180cf990" - } - }, - "4.4.131": { - "CVE-2018-9415": { - "cmt_msg": "ARM: amba: Fix race condition with driver_override", - "cmt_id": "7488404d3bab4eccb590c80c8827520394444630" + "CVE-2022-1975": { + "cmt_msg": "NFC: netlink: fix sleep in atomic bug when firmware download timeout" }, - "CVE-2018-9385": { - "cmt_msg": "ARM: amba: Don't read past the end of sysfs \"driver_override\" buffer", - "cmt_id": "30a80ca6dbbda67b0c902448993ed6a35b52612a" + "CVE-2023-1380": { + "cmt_msg": "wifi: brcmfmac: slab-out-of-bounds read in brcmf_get_assoc_ies()" }, - "CVE-2018-1093": { - "cmt_msg": "ext4: add validity checks for bitmap block numbers", - "cmt_id": "ea057aed06d8f13d931652bc4faa604ac0c50aa2" - } - }, - "4.4.132": { - "CVE-2017-18257": { - "cmt_msg": "f2fs: fix a dead loop in f2fs_fiemap()", - "cmt_id": "0678adf8f8a99c66c48c608ea9a79588743bc615" + "CVE-2018-12130": { + "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" }, - "CVE-2017-18255": { - "cmt_msg": "perf/core: Fix the perf_cpu_time_max_percent check", - "cmt_id": "609124d60341bf8870318c201cec50548824f2e2" - } - }, - "4.4.133": { - "CVE-2018-5814": { - "cmt_msg": "usbip: usbip_host: fix NULL-ptr deref and use-after-free errors", - "cmt_id": "02995a5882371a9fca3033fd356598a805d46040" + "CVE-2022-32981": { + "cmt_msg": "powerpc/32: Fix overread/overwrite of thread_struct via ptrace" }, - "CVE-2018-10087": { - "cmt_msg": "kernel/exit.c: avoid undefined behaviour when calling wait4()", - "cmt_id": "ea00b22b02f228cb58ee6c6707c86ec270e37fba" + "CVE-2018-13405": { + "cmt_msg": "Fix up non-directory creation in SGID directories" }, - "CVE-2018-10021": { - "cmt_msg": "scsi: libsas: defer ata device eh commands to libata", - "cmt_id": "6efcc74e1b0c16aebf5d8107543ce63475af35c1" + "CVE-2018-13406": { + "cmt_msg": "video: uvesafb: Fix integer overflow in allocation" }, - "CVE-2018-1000204": { - "cmt_msg": "scsi: sg: allocate with __GFP_ZERO in sg_build_indirect()", - "cmt_id": "93314640426ddb6af618d0802e622f6fa771792c" - } - }, - "4.4.134": { - "CVE-2018-10124": { - "cmt_msg": "kernel/signal.c: avoid undefined behaviour in kill_something_info", - "cmt_id": "cb1c92e55420dad73ce717ef4029dd6e984dcbd0" + "CVE-2020-11668": { + "cmt_msg": "media: xirlink_cit: add missing descriptor sanity checks" }, - "CVE-2018-9518": { - "cmt_msg": "NFC: llcp: Limit size of SDP URI", - "cmt_id": "50e54d56744cda70a1c3bc980c56e461ecde3a6d" + "CVE-2020-11669": { + "cmt_msg": "powerpc/powernv/idle: Restore AMR/UAMOR/AMOR after idle" }, - "CVE-2017-13695": { - "cmt_msg": "ACPICA: acpi: acpica: fix acpi operand cache leak in nseval.c", - "cmt_id": "dfcb739c20d88461fbd0dc007670f63ad82db881" + "CVE-2019-14901": { + "cmt_msg": "mwifiex: Fix heap overflow in mmwifiex_process_tdls_action_frame()" }, - "CVE-2018-6412": { - "cmt_msg": "fbdev: Fixing arbitrary kernel leak in case FBIOGETCMAP_SPARC in sbusfb_ioctl_helper().", - "cmt_id": "bfffc2c3f56b462cdf5eeea639d898a69b323001" - } - }, - "4.4.137": { - "CVE-2019-18675": { - "cmt_msg": "mmap: introduce sane default mmap limits", - "cmt_id": "bd2f9ce5bacb15ad54fc6c345480c4df0c76c3ee" - } - }, - "4.4.139": { - "CVE-2018-13406": { - "cmt_msg": "video: uvesafb: Fix integer overflow in allocation", - "cmt_id": "842803e4a66bd2a0b663dae18b80535a575d427f" - } - }, - "4.4.140": { - "CVE-2018-10878": { - "cmt_msg": "ext4: always check block group bounds in ext4_init_block_bitmap()", - "cmt_id": "afa9c75025bd1e24ccdc56fa331e865b626769e6" + "CVE-2020-8694": { + "cmt_msg": "powercap: restrict energy meter to root access" }, - "CVE-2018-9516": { - "cmt_msg": "HID: debug: check length before copy_to_user()", - "cmt_id": "ef111ea31575bdc50c0c914fe036a1d0ad0cae4e" + "CVE-2021-3715": { + "cmt_msg": "net_sched: cls_route: remove the right filter from hashtable" }, - "CVE-2017-13168": { - "cmt_msg": "scsi: sg: mitigate read/write abuse", - "cmt_id": "9a737329c7c4a341009b7398164db8fa8e5358f0" + "CVE-2021-3714": { + "cmt_msg": "" }, - "CVE-2018-10877": { - "cmt_msg": "ext4: verify the depth of extent tree in ext4_find_extent()", - "cmt_id": "353ebd3e98869b50ed47364d05acdf679c2c05c6" + "CVE-2019-16230": { + "cmt_msg": "drm/amdkfd: fix a potential NULL pointer dereference (v2)" }, - "CVE-2018-10876": { - "cmt_msg": "ext4: only look at the bg_flags field if it is valid", - "cmt_id": "db3b00e3f392e9f879f7fd202437e68f90f35765" + "CVE-2019-16231": { + "cmt_msg": "fjes: Handle workqueue allocation failure" }, - "CVE-2018-10879": { - "cmt_msg": "ext4: make sure bitmaps and the inode table don't overlap with bg descriptors", - "cmt_id": "b7d29dc8fe8d23243d3d87109099bdc34a684712" + "CVE-2019-16232": { + "cmt_msg": "libertas: fix a potential NULL pointer dereference" }, - "CVE-2018-10881": { - "cmt_msg": "ext4: clear i_data in ext4_inode_info when removing inline data", - "cmt_id": "b88fc699a023e0ef86f647c3d48a17d7cfff1f2a" + "CVE-2019-16233": { + "cmt_msg": "scsi: qla2xxx: fix a potential NULL pointer dereference" }, - "CVE-2018-10882": { - "cmt_msg": "ext4: add more inode number paranoia checks", - "cmt_id": "ff6c96461be35381399466ad58f02b8d78ab480a" + "CVE-2019-16234": { + "cmt_msg": "iwlwifi: pcie: fix rb_allocator workqueue allocation" }, - "CVE-2018-10883": { - "cmt_msg": "jbd2: don't mark block as modified if the handle is out of credits", - "cmt_id": "2cd33a53177ce739fe5f68052b2a737f1c40b425" - } - }, - "4.4.141": { - "CVE-2018-13405": { - "cmt_msg": "Fix up non-directory creation in SGID directories", - "cmt_id": "e71dbad7563db674f91af9e12ef592c107d0c2cd" + "CVE-2019-6133": { + "cmt_msg": "fork: record start_time late" + }, + "CVE-2021-39633": { + "cmt_msg": "ip_gre: add validation for csum_start" + }, + "CVE-2017-18203": { + "cmt_msg": "dm: fix race between dm_get_from_kobject() and __dm_destroy()" + }, + "CVE-2017-18202": { + "cmt_msg": "mm, oom_reaper: gather each vma to prevent leaking TLB entry" + }, + "CVE-2021-39636": { + "cmt_msg": "netfilter: x_tables: fix pointer leaks to userspace" }, - "CVE-2018-16276": { - "cmt_msg": "USB: yurex: fix out-of-bounds uaccess in read handler", - "cmt_id": "2638a67a0c50a97e0564491325c24c2c12083dbb" - } - }, - "4.4.143": { - "CVE-2017-18216": { - "cmt_msg": "ocfs2: subsystem.su_mutex is required while accessing the item->ci_parent", - "cmt_id": "b9e22bd82856a794986d75bb3bb585b8bfbf4d99" - } - }, - "4.4.144": { - "CVE-2017-5754": { - "cmt_msg": "x86/cpufeatures: Add Intel feature bits for Speculation Control", - "cmt_id": "7169b43e7c68edd550efa812c295685947ffa8a0" + "CVE-2017-18204": { + "cmt_msg": "ocfs2: should wait dio before inode lock in ocfs2_setattr()" }, - "CVE-2018-3639": { - "cmt_msg": "x86/nospec: Simplify alternative_msr_write()", - "cmt_id": "b2dab2dc776cea8e1f190523456b32b850506ce3" + "CVE-2021-39634": { + "cmt_msg": "epoll: do not insert into poll queues until all sanity checks are done" }, - "CVE-2018-10902": { - "cmt_msg": "ALSA: rawmidi: Change resized buffers atomically", - "cmt_id": "01b6ca65e10f2669965fbc62440cb9b09a25d086" - } - }, - "4.4.146": { - "CVE-2018-14734": { - "cmt_msg": "infiniband: fix a possible use-after-free bug", - "cmt_id": "52175c849bd4c01dd14038b4401d5044d99a6b0a" - } - }, - "4.4.147": { - "CVE-2018-12233": { - "cmt_msg": "jfs: Fix inconsistency between memory allocation and ea_buf->max_size", - "cmt_id": "0749d5b3ec62310b747751ea7d4d5ccca51bc80f" - } - }, - "4.4.148": { - "CVE-2018-15572": { - "cmt_msg": "x86/speculation: Protect against userspace-userspace spectreRSB", - "cmt_id": "7744abbe29a59db367f59b0c9890356732f25a3b" - } - }, - "4.4.149": { - "CVE-2018-9363": { - "cmt_msg": "Bluetooth: hidp: buffer overflow in hidp_process_report", - "cmt_id": "17c1e0b1f6a161cc4f533d4869ff574273dbfe8d" - } - }, - "4.4.152": { - "CVE-2018-3693": { - "cmt_msg": "ext4: fix spectre gadget in ext4_mb_regular_allocator()", - "cmt_id": "a89f83823b97b6da1ecf7a51184b28822e78cc07" - } - }, - "4.4.154": { - "CVE-2018-10938": { - "cmt_msg": "Cipso: cipso_v4_optptr enter infinite loop", - "cmt_id": "8ed0ff83f5fd0ca412a52bd71af332598c01ca46" + "CVE-2022-33742": { + "cmt_msg": "xen/blkfront: force data bouncing when backend is untrusted" }, - "CVE-2018-16658": { - "cmt_msg": "cdrom: Fix info leak/OOB read in cdrom_ioctl_drive_status", - "cmt_id": "eb08a285899df82056f712421988c6ccd0b58ba6" - } - }, - "4.4.155": { - "CVE-2019-12881": { - "cmt_msg": "drm/i915/userptr: reject zero user_size", - "cmt_id": "182e963432d867384f2e55487ec60ca7a9f99cd1" - } - }, - "4.4.156": { - "CVE-2018-6554": { - "cmt_msg": "staging: irda: remove the irda network stack and drivers", - "cmt_id": "4a7811bb3ae10d76d9e76c2b0ce7b27bc02a9370" + "CVE-2022-33741": { + "cmt_msg": "xen/netfront: force data bouncing when backend is untrusted" }, - "CVE-2018-6555": { - "cmt_msg": "staging: irda: remove the irda network stack and drivers", - "cmt_id": "131a3b82c853483b1809cad06f8997421dd49500" + "CVE-2022-33740": { + "cmt_msg": "xen/netfront: fix leaking data in shared pages" }, - "CVE-2018-14617": { - "cmt_msg": "hfsplus: fix NULL dereference in hfsplus_lookup()", - "cmt_id": "fed5bd3352a3fbf9494449ffee3b4bab5e8cc3a6" + "CVE-2022-33744": { + "cmt_msg": "xen/arm: Fix race in RB-tree based P2M accounting" }, - "CVE-2018-14609": { - "cmt_msg": "btrfs: relocation: Only remove reloc rb_trees if reloc control has been initialized", - "cmt_id": "510825b3f8c1f5dc29b81660e1eb68e7fb0b8d50" - } - }, - "4.4.157": { - "CVE-2018-17182": { - "cmt_msg": "mm: get rid of vmacache_flush_all() entirely", - "cmt_id": "88d6918401a4ecdc50fe77df3e1e77c1e49d8579" - } - }, - "4.4.159": { - "CVE-2018-20511": { - "cmt_msg": "net/appletalk: fix minor pointer leak to userspace in SIOCFINDIPDDPRT", - "cmt_id": "fee0d234419708192925c9e25a461f1f43dab24f" + "CVE-2023-52596": { + "cmt_msg": "sysctl: Fix out of bounds access for empty sysctl registers" }, - "CVE-2018-14633": { - "cmt_msg": "scsi: target: iscsi: Use hex2bin instead of a re-implementation", - "cmt_id": "afba6121b3b7e1737b7e7dafbf6b7eafbcdc659c" - } - }, - "4.4.160": { - "CVE-2018-17972": { - "cmt_msg": "proc: restrict kernel stack dumps to root", - "cmt_id": "574757073482f77ec10caea5e57726190a2837fa" + "CVE-2023-52597": { + "cmt_msg": "KVM: s390: fix setting of fpc register" }, - "CVE-2019-9458": { - "cmt_msg": "media: v4l: event: Prevent freeing event subscriptions while accessed", - "cmt_id": "bbbc4dabca5d51c608b0fd608eb3cd8659266653" + "CVE-2023-52594": { + "cmt_msg": "wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus()" }, - "CVE-2018-7755": { - "cmt_msg": "floppy: Do not copy a kernel pointer to user memory in FDGETPRM ioctl", - "cmt_id": "ef0a9f76fda4a7ffce6ceee5abdd554a719e8bd8" + "CVE-2023-52595": { + "cmt_msg": "wifi: rt2x00: restart beacon queue when hardware reset" }, - "CVE-2018-13053": { - "cmt_msg": "alarmtimer: Prevent overflow for relative nanosleep", - "cmt_id": "2e17841715313cab2464b3b6360a289a1cb2744b" + "CVE-2023-52593": { + "cmt_msg": "wifi: wfx: fix possible NULL pointer dereference in wfx_set_mfp_ap()" }, - "CVE-2018-18021": { - "cmt_msg": "arm64: KVM: Tighten guest core register access from userspace", - "cmt_id": "14a65511bc7c1eec560764fe53018b0765fb8d2d" + "CVE-2023-52590": { + "cmt_msg": "ocfs2: Avoid touching renamed directory if parent does not change" }, - "CVE-2018-10880": { - "cmt_msg": "ext4: never move the system.data xattr out of the inode body", - "cmt_id": "cd3d6463759d21f4093d3434effacc358dd0caf8" - } - }, - "4.4.163": { - "CVE-2018-18281": { - "cmt_msg": "mremap: properly flush TLB before releasing the page", - "cmt_id": "2e3ae534fb98c7a6a5cf3e80a190181154328f80" - } - }, - "4.4.164": { - "CVE-2018-18710": { - "cmt_msg": "cdrom: fix improper type cast, which can leat to information leak.", - "cmt_id": "661aa0b46dfb23700b569ac319b95e0b0154832f" - } - }, - "4.4.167": { - "CVE-2019-2024": { - "cmt_msg": "media: em28xx: Fix use-after-free when disconnecting", - "cmt_id": "4de120cba4ed4ef009edb2b17b2fa21b679b00b2" + "CVE-2023-52591": { + "cmt_msg": "reiserfs: Avoid touching renamed directory if parent does not change" }, - "CVE-2018-19824": { - "cmt_msg": "ALSA: usb-audio: Fix UAF decrement if card has no live interfaces in card.c", - "cmt_id": "82fa3e95432f95254fd07556c55b1018145e1439" + "CVE-2023-52598": { + "cmt_msg": "s390/ptrace: handle setting of fpc register correctly" }, - "CVE-2018-16862": { - "cmt_msg": "mm: cleancache: fix corruption on missed inode invalidation", - "cmt_id": "78b572c9e3a1b7edf46da17ad96a86110dd65fe8" + "CVE-2023-52599": { + "cmt_msg": "jfs: fix array-index-out-of-bounds in diNewExt" }, - "CVE-2018-20169": { - "cmt_msg": "USB: check usb_get_extra_descriptor for proper size", - "cmt_id": "c380600bf71c35dc23aa0c3628a1013ec10cb349" - } - }, - "4.4.168": { - "CVE-2018-1120": { - "cmt_msg": "proc: do not access cmdline nor environ from file-backed areas", - "cmt_id": "adc143b97d06a3305707726e69b4247db050cb88" + "CVE-2021-0447": { + "cmt_msg": "l2tp: protect sock pointer of struct pppol2tp_session with RCU" }, - "CVE-2018-5953": { - "cmt_msg": "printk: hash addresses printed with %p", - "cmt_id": "c873dfa0ccbdb08e9fb42f497503e148f79cdebb" + "CVE-2022-23222": { + "cmt_msg": "bpf: Replace PTR_TO_XXX_OR_NULL with PTR_TO_XXX | PTR_MAYBE_NULL" }, - "CVE-2018-5848": { - "cmt_msg": "wil6210: missing length check in wmi_set_ie", - "cmt_id": "e47b9b2b005ab8b1b83bc0ac4aa2803cba57182a" + "CVE-2021-0448": { + "cmt_msg": "netfilter: ctnetlink: add a range check for l3/l4 protonum" }, - "CVE-2018-12896": { - "cmt_msg": "posix-timers: Sanitize overrun handling", - "cmt_id": "954648ebf8e27fcbf23b7954b79a22a5cacc83b1" - } - }, - "4.4.169": { - "CVE-2017-18241": { - "cmt_msg": "f2fs: fix a panic caused by NULL flush_cmd_control", - "cmt_id": "0fd7726d69afb0b61817f8d51e80f385cbfb2b10" - } - }, - "4.4.170": { - "CVE-2019-15927": { - "cmt_msg": "ALSA: usb-audio: Avoid access before bLength check in build_audio_procunit()", - "cmt_id": "a5e09a908ea3c64bf522822b7923d2d8fc1a7af2" + "CVE-2017-12762": { + "cmt_msg": "isdn/i4l: fix buffer overflow" }, - "CVE-2019-6133": { - "cmt_msg": "fork: record start_time late", - "cmt_id": "d447cf0ceefa01ee9203145d011eedca6e1194e6" + "CVE-2022-41849": { + "cmt_msg": "fbdev: smscufx: Fix use-after-free in ufx_ops_open()" }, - "CVE-2018-19985": { - "cmt_msg": "USB: hso: Fix OOB memory access in hso_probe/hso_get_config_data", - "cmt_id": "8846b1dbfd2146b145d73ba31a4caa4a4789aefb" - } - }, - "4.4.171": { - "CVE-2018-16884": { - "cmt_msg": "sunrpc: use-after-free in svc_process_common()", - "cmt_id": "9615b6aeccbfb233fd672107aa6885bf039c3de3" + "CVE-2022-41848": { + "cmt_msg": "" }, - "CVE-2018-14611": { - "cmt_msg": "btrfs: validate type when reading a chunk", - "cmt_id": "50962a7b4877f26d1f3f49cd77ad1814a9e81bac" + "CVE-2023-6356": { + "cmt_msg": "nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length" }, - "CVE-2018-14610": { - "cmt_msg": "btrfs: Check that each block group has corresponding chunk at mount time", - "cmt_id": "ee5e37a26791f9c842b3298e594c6e3c93bb1355" + "CVE-2022-1353": { + "cmt_msg": "af_key: add __GFP_ZERO flag for compose_sadb_supported in function pfkey_register" }, - "CVE-2018-14613": { - "cmt_msg": "btrfs: tree-checker: Verify block_group_item", - "cmt_id": "ae94efaf2b609e811bce6280d5c88cf557cd1238" + "CVE-2022-1198": { + "cmt_msg": "drivers: hamradio: 6pack: fix UAF bug caused by mod_timer()" }, - "CVE-2018-14612": { - "cmt_msg": "btrfs: tree-checker: Detect invalid and empty essential trees", - "cmt_id": "42d263820480ab1f7eba54590f2c7283b3428723" - } - }, - "4.4.172": { - "CVE-2018-14616": { - "cmt_msg": "f2fs: fix to do sanity check with block address in main area v2", - "cmt_id": "4901e126b6e1677c90d3c0a668193e52ecdd4971" + "CVE-2022-1199": { + "cmt_msg": "ax25: Fix NULL pointer dereference in ax25_kill_by_device" }, - "CVE-2018-13096": { - "cmt_msg": "f2fs: fix to do sanity check with node footer and iblocks", - "cmt_id": "cbe5e5cd70c0f6fd187114e7f146f29830fedf9c" + "CVE-2022-1195": { + "cmt_msg": "hamradio: improve the incomplete fix to avoid NPD" }, - "CVE-2018-13097": { - "cmt_msg": "f2fs: fix to do sanity check with user_block_count", - "cmt_id": "b31ccde086671b372957e1fe1c60968e6d7464d7" + "CVE-2023-2124": { + "cmt_msg": "xfs: verify buffer contents when we skip log replay" }, - "CVE-2018-14614": { - "cmt_msg": "f2fs: fix to do sanity check with cp_pack_start_sum", - "cmt_id": "98beb84af7212a2ba50370497e569ae3f61b1c8b" + "CVE-2019-15505": { + "cmt_msg": "media: technisat-usb2: break out of loop at end of buffer" }, - "CVE-2018-13099": { - "cmt_msg": "f2fs: fix to do sanity check with reserved blkaddr of inline inode", - "cmt_id": "3bfe2049c222b23342ff2a216cd5a869e8a14897" + "CVE-2022-27672": { + "cmt_msg": "x86/speculation: Identify processors vulnerable to SMT RSB predictions" }, - "CVE-2018-13100": { - "cmt_msg": "f2fs: fix to do sanity check with secs_per_zone", - "cmt_id": "056120a8c192871c558e742f83ae18bf8721d97c" + "CVE-2023-52508": { + "cmt_msg": "nvme-fc: Prevent null pointer dereference in nvme_fc_io_getuuid()" }, - "CVE-2019-3701": { - "cmt_msg": "can: gw: ensure DLC boundaries after CAN frame modification", - "cmt_id": "693ae291197429f404e7d9c191e1541f61925278" + "CVE-2022-1280": { + "cmt_msg": "drm: avoid circular locks in drm_mode_getconnector" }, - "CVE-2018-18690": { - "cmt_msg": "xfs: don't fail when converting shortform attr to long form during ATTR_REPLACE", - "cmt_id": "f00ebf4f84ed2e9344743d86e274ff77269df02a" + "CVE-2018-10880": { + "cmt_msg": "ext4: never move the system.data xattr out of the inode body" }, - "CVE-2017-18249": { - "cmt_msg": "f2fs: fix race condition in between free nid allocator/initializer", - "cmt_id": "a4f4f97573bfb057bbc30696d803cc37ed629d02" + "CVE-2018-10881": { + "cmt_msg": "ext4: clear i_data in ext4_inode_info when removing inline data" }, - "CVE-2020-10769": { - "cmt_msg": "crypto: authenc - fix parsing key with misaligned rta_len", - "cmt_id": "461652efc1545a1a074bf0df826dcd3bce520db4" + "CVE-2024-26713": { + "cmt_msg": "powerpc/pseries/iommu: Fix iommu initialisation during DLPAR add" } - }, - "4.4.174": { - "CVE-2018-5391": { - "cmt_msg": "ip: discard IPv4 datagrams with overlapping segments.", - "cmt_id": "ef0f963de1d2c5bc99d3d6ace3dd44a7d6002717" + } + }, + "4.1": { + "4.1.2": { + "CVE-2015-3212": { + "cmt_msg": "sctp: fix ASCONF list handling", + "cmt_id": "bd0a0d20ebd08f250af9023530b5de4bc433ebaa" } }, - "4.4.175": { - "CVE-2019-7222": { - "cmt_msg": "KVM: x86: work around leak of uninitialized stack contents (CVE-2019-7222)", - "cmt_id": "1b5fd913a4eb07cb13e969bb8e3b1633a40e683f" + "4.1.4": { + "CVE-2015-1333": { + "cmt_msg": "KEYS: ensure we free the assoc array edit if edit is valid", + "cmt_id": "4fd5dc9eece297f49f16f82422ead3a28b11ea70" }, - "CVE-2019-7221": { - "cmt_msg": "KVM: nVMX: unconditionally cancel preemption timer in free_nested (CVE-2019-7221)", - "cmt_id": "9872ddae1949b46d5310e0e71ca26bb5c4e52a70" + "CVE-2015-3288": { + "cmt_msg": "mm: avoid setting up anonymous pages into file mapping", + "cmt_id": "c86df9fa76f914d84e02caf2aaf11a22ca1820c2" + }, + "CVE-2015-9289": { + "cmt_msg": "cx24116: fix a buffer overflow when checking userspace params", + "cmt_id": "27b76178c496bdb4fc24278ff9e659dc0a5db10f" } }, - "4.4.176": { - "CVE-2019-6974": { - "cmt_msg": "kvm: fix kvm_ioctl_create_device() reference counting (CVE-2019-6974)", - "cmt_id": "bc4db52485cc6edfd6861417d178bb71f743ced7" + "4.1.5": { + "CVE-2015-6252": { + "cmt_msg": "vhost: actually track log eventfd file", + "cmt_id": "fd1a8f57bfd8686709c17cbe878470bd43fb3c4e" } }, - "4.4.177": { - "CVE-2019-16995": { - "cmt_msg": "net: hsr: fix memory leak in hsr_dev_finalize()", - "cmt_id": "453e3b319d28f2023d45073e6eb30c5efa2fd06b" - }, - "CVE-2019-9455": { - "cmt_msg": "media: videobuf2-v4l2: drop WARN_ON in vb2_warn_zero_bytesused()", - "cmt_id": "7b5115689bf9dafc5127b28ace4589f698d4adfa" + "4.1.6": { + "CVE-2015-4692": { + "cmt_msg": "kvm: x86: fix kvm_apic_has_events to check for NULL pointer", + "cmt_id": "f627ab0afcd983b3cb5f6d47c5006fd14cfc9a01" }, - "CVE-2019-2101": { - "cmt_msg": "media: uvcvideo: Fix 'type' check leading to overflow", - "cmt_id": "bba078c9fc3c7e44370f870d97c5eed64f6c5d1f" + "CVE-2015-5157": { + "cmt_msg": "x86/nmi/64: Switch stacks on userspace NMI entry", + "cmt_id": "60e6cbaf875edd9aef40948d0790decb8e1a77cc" }, - "CVE-2019-16413": { - "cmt_msg": "9p: use inode->i_lock to protect i_size_write() under 32-bit", - "cmt_id": "f289ac1f6eb2d024793732ddb629595ab85674b7" + "CVE-2015-3291": { + "cmt_msg": "x86/nmi/64: Use DF to avoid userspace RSP confusing nested NMI detection", + "cmt_id": "37df1cab0c4d4ec0f4bec868b2e26b84e725c478" }, - "CVE-2019-12818": { - "cmt_msg": "net: nfc: Fix NULL dereference on nfc_llcp_build_tlv fails", - "cmt_id": "6e7339d5ee302fcbfe8ef29c058cc85c360849b9" + "CVE-2015-3290": { + "cmt_msg": "x86/nmi/64: Switch stacks on userspace NMI entry", + "cmt_id": "60e6cbaf875edd9aef40948d0790decb8e1a77cc" }, - "CVE-2019-12819": { - "cmt_msg": "mdio_bus: Fix use-after-free on device_register fails", - "cmt_id": "a1b4ace43842791d908a8837304031e439c2ea39" + "CVE-2015-5697": { + "cmt_msg": "md: use kzalloc() when bitmap is disabled", + "cmt_id": "33afeac21b9cb79ad8fc5caf239af89c79e25e1e" + } + }, + "4.1.9": { + "CVE-2015-8746": { + "cmt_msg": "NFS: Fix a NULL pointer dereference of migration recovery ops for v4.2 client", + "cmt_id": "87fbed4145998fbb3960c243c70cf78fbd7e5f42" + } + }, + "4.1.10": { + "CVE-2015-5283": { + "cmt_msg": "sctp: fix race on protocol/netns initialization", + "cmt_id": "5cadd6bac523e5e78ae18284e5f2b286ebff070b" + } + }, + "4.1.11": { + "CVE-2015-7613": { + "cmt_msg": "Initialize msg/shm IPC objects before doing ipc_addid()", + "cmt_id": "7983297d99ea11152a76420d4325f5d1925e2547" }, - "CVE-2019-15916": { - "cmt_msg": "net-sysfs: Fix mem leak in netdev_register_kobject", - "cmt_id": "d28a029290fd80e9fb40850eb6eb2b7281f1f007" + "CVE-2015-5257": { + "cmt_msg": "USB: whiteheat: fix potential null-deref at probe", + "cmt_id": "44f73be485f66dfeca7c6a5e334a7a11b97a4151" }, - "CVE-2019-9213": { - "cmt_msg": "mm: enforce min addr even if capable() in expand_downwards()", - "cmt_id": "40952b6a649b9bfad11ae4fa2862fa0108c9ec24" + "CVE-2015-2925": { + "cmt_msg": "dcache: Handle escaped paths in prepend_path", + "cmt_id": "6f4e45e35c02fd23589a62aab0dc84286cc1302c" } }, - "4.4.178": { - "CVE-2019-3459": { - "cmt_msg": "Bluetooth: Verify that l2cap_get_conf_opt provides large enough buffer", - "cmt_id": "ade4560e4fea198866e033fe1c02f063d6d7db2e" + "4.1.12": { + "CVE-2020-0066": { + "cmt_msg": "netlink: Trim skb to alloc size to avoid MSG_TRUNC", + "cmt_id": "e962218b42896856642f8d37bb69c4f1feaa8ad9" + } + }, + "4.1.13": { + "CVE-2015-8953": { + "cmt_msg": "ovl: fix dentry reference leak", + "cmt_id": "7fd58acc9f6f751aebcee8288d020d959d815445" + } + }, + "4.1.14": { + "CVE-2015-5156": { + "cmt_msg": "virtio-net: drop NETIF_F_FRAGLIST", + "cmt_id": "152964690b41b91049d00eb8aea1d25880cd13f0" }, - "CVE-2019-20054": { - "cmt_msg": "fs/proc/proc_sysctl.c: fix NULL pointer dereference in put_links", - "cmt_id": "6271fa6fc366827c0249864157e8fd18c4eac68a" + "CVE-2015-5307": { + "cmt_msg": "KVM: x86: work around infinite loop in microcode when #AC is delivered", + "cmt_id": "b62c38079ebaa36c0ccd77647fd1fdd46315bc98" }, - "CVE-2019-3460": { - "cmt_msg": "Bluetooth: Check L2CAP option sizes returned from l2cap_get_conf_opt", - "cmt_id": "d22036003893cbe479404e20fdae10addc6c18dd" + "CVE-2015-6937": { + "cmt_msg": "RDS: verify the underlying transport exists before creating a connection", + "cmt_id": "dd5efc80af05cfd7ae77bb3229a35cc9bc09615d" } }, - "4.4.179": { - "CVE-2019-9454": { - "cmt_msg": "i2c: core-smbus: prevent stack corruption on read I2C_BLOCK_DATA", - "cmt_id": "02bfc06ca2fa1158d6cd2e5688bfc4ef278d8425" - }, - "CVE-2019-11486": { - "cmt_msg": "tty: mark Siemens R3964 line discipline as BROKEN", - "cmt_id": "c3e76f072adbcc426fbeef5d7469f847a2f700d6" + "4.1.15": { + "CVE-2015-8374": { + "cmt_msg": "Btrfs: fix truncation of compressed and inlined extents", + "cmt_id": "f1008f6d21ec52d533f7473e2e46218408fb4580" }, - "CVE-2019-15214": { - "cmt_msg": "ALSA: core: Fix card races between register and disconnect", - "cmt_id": "f94135f92d97d85444691bcc4f79784d995a5458" + "CVE-2016-3841": { + "cmt_msg": "ipv6: add complete rcu protection around np->opt", + "cmt_id": "81ed463384847813faa59e692285fe775da7375f" }, - "CVE-2017-18551": { - "cmt_msg": "i2c: core-smbus: prevent stack corruption on read I2C_BLOCK_DATA", - "cmt_id": "02bfc06ca2fa1158d6cd2e5688bfc4ef278d8425" + "CVE-2013-7446": { + "cmt_msg": "unix: avoid use-after-free in ep_remove_wait_queue", + "cmt_id": "5c77e26862ce604edea05b3442ed765e9756fe0f" + } + }, + "4.1.16": { + "CVE-2015-8543": { + "cmt_msg": "net: add validation for the socket syscall protocol argument", + "cmt_id": "bc8f79b522b57ca79a676615003d85b08162ff5a" }, - "CVE-2019-15292": { - "cmt_msg": "appletalk: Fix use-after-free in atalk_proc_exit", - "cmt_id": "d49a75f5add4543eb138fb0a8fe0560fb276352e" + "CVE-2016-0728": { + "cmt_msg": "KEYS: Fix keyring ref leak in join_session_keyring()", + "cmt_id": "b71567e6c9a2b15b7be9cb8ca695e9c990c0513b" }, - "CVE-2019-11190": { - "cmt_msg": "binfmt_elf: switch to new creds when switching to new mm", - "cmt_id": "1eb40df35d99f353e7bdfcbb21f249428ec0f4b6" + "CVE-2015-7872": { + "cmt_msg": "KEYS: Fix crash when attempt to garbage collect an uninstantiated keyring", + "cmt_id": "3366472496482e75a83db93846226b8a360ff911" }, - "CVE-2019-11810": { - "cmt_msg": "scsi: megaraid_sas: return error when create DMA pool failed", - "cmt_id": "09a6db51dcb41990fe020e45af8b2e44010fc1e7" + "CVE-2015-7550": { + "cmt_msg": "KEYS: Fix race between read and revoke", + "cmt_id": "98fec5a2034454f004ca6471de4df4ded2c5f79f" }, - "CVE-2019-11815": { - "cmt_msg": "net: rds: force to destroy connection if t_sock is NULL in rds_tcp_kill_sock().", - "cmt_id": "c4e97b06cfdc5213494c22dd5c2b41ff8b15e0ee" + "CVE-2015-8569": { + "cmt_msg": "pptp: verify sockaddr_len in pptp_bind() and pptp_connect()", + "cmt_id": "f167b6f4244fbc8d05fcc385b1bf8e70729c9e7c" }, - "CVE-2019-10639": { - "cmt_msg": "netns: provide pure entropy for net_hash_mix()", - "cmt_id": "0ede14314f6d9e6a172eb4c4b6b9fe5477aa70bc" + "CVE-2015-8575": { + "cmt_msg": "bluetooth: Validate socket address length in sco_sock_bind().", + "cmt_id": "1814295365a02ff174948159f1eececa55fe4f97" } }, - "4.4.180": { - "CVE-2018-20836": { - "cmt_msg": "scsi: libsas: fix a race condition when smp task timeout", - "cmt_id": "fe3f6511c9af47847e3547c1525de290a3d908eb" + "4.1.17": { + "CVE-2016-2069": { + "cmt_msg": "x86/mm: Add barriers and document switch_mm()-vs-flush synchronization", + "cmt_id": "ae535caf02c7e2e7feec62f4e07ac1f48ad5b336" }, - "CVE-2019-3882": { - "cmt_msg": "vfio/type1: Limit DMA mappings per container", - "cmt_id": "e1a5cdbf7cb32a168d37a4804379b9b70d31b39b" + "CVE-2015-7799": { + "cmt_msg": "isdn_ppp: Add checks for allocation failure in isdn_ppp_open()", + "cmt_id": "5984398539a2c47834caf1b00dc9f58b7bb2e67a" }, - "CVE-2019-11884": { - "cmt_msg": "Bluetooth: hidp: fix buffer overflow", - "cmt_id": "dd150bcc93ffaa80ca67d5a71d7850fffe5eb549" + "CVE-2015-8845": { + "cmt_msg": "powerpc/tm: Check for already reclaimed tasks", + "cmt_id": "a54d3a4234121d8a9749331f7b10e6ff02f886ba" }, - "CVE-2019-10142": { - "cmt_msg": "drivers/virt/fsl_hypervisor.c: prevent integer overflow in ioctl", - "cmt_id": "9db489ed49711d1575f631b68aaa911d3b6198f9" + "CVE-2015-8844": { + "cmt_msg": "powerpc/tm: Block signal return setting invalid MSR state", + "cmt_id": "567a215dd1586dae787f21b8f3e484018763a710" }, - "CVE-2019-15216": { - "cmt_msg": "USB: yurex: Fix protection fault after device removal", - "cmt_id": "438b075fc77d63472892df735fe2a27d3f23dcbf" - } - }, - "4.4.181": { - "CVE-2020-10720": { - "cmt_msg": "net-gro: fix use-after-free read in napi_gro_frags()", - "cmt_id": "4f9c73aa293051359ef1f2f6d816895ab50c9f3e" + "CVE-2016-2547": { + "cmt_msg": "ALSA: timer: Harden slave timer list handling", + "cmt_id": "466c99bd815a1ae189d883b509b067c9a74a30f9" }, - "CVE-2018-20510": { - "cmt_msg": "binder: replace \"%p\" with \"%pK\"", - "cmt_id": "c53c1a821d62eb8476425ebe79c0c0054ab45315" + "CVE-2015-8104": { + "cmt_msg": "KVM: svm: unconditionally intercept #DB", + "cmt_id": "19eaffefc4b03d92e0adfd1870b10b9539916106" }, - "CVE-2019-15219": { - "cmt_msg": "USB: sisusbvga: fix oops in error path of sisusb_probe", - "cmt_id": "30e66d7d2fb978f7b59fbf6106bdc1092acbb7ef" + "CVE-2016-2548": { + "cmt_msg": "ALSA: timer: Harden slave timer list handling", + "cmt_id": "466c99bd815a1ae189d883b509b067c9a74a30f9" }, - "CVE-2019-15218": { - "cmt_msg": "media: usb: siano: Fix general protection fault in smsusb", - "cmt_id": "b1782be70e1e281216f58ba283a0e55ad6364aaf" + "CVE-2016-2545": { + "cmt_msg": "ALSA: timer: Fix double unlink of active_list", + "cmt_id": "dc5697eb3297920e20b53fdf4c40891e1ed0eafd" }, - "CVE-2019-15666": { - "cmt_msg": "xfrm: policy: Fix out-of-bound array accesses in __xfrm_policy_unlink", - "cmt_id": "86040d722b29976dfef0ef2b68eab832c358d04b" + "CVE-2016-2544": { + "cmt_msg": "ALSA: seq: Fix race at timer setup and close", + "cmt_id": "49c9eb3db86407868a664ade6da041fabeb457f8" }, - "CVE-2019-15212": { - "cmt_msg": "USB: rio500: refuse more than one device at a time", - "cmt_id": "b92be99a0c8b2c1c66fe37f1fb21ef069c7732f1" + "CVE-2015-8816": { + "cmt_msg": "USB: fix invalid memory access in hub_activate()", + "cmt_id": "a7e83b16c8d83a75c58989e845c664ecaa6e0aa6" }, - "CVE-2019-9466": { - "cmt_msg": "brcmfmac: add subtype check for event handling in data path", - "cmt_id": "4e06554db5e5c3d693141b84aba3a4f29b7d9ef5" + "CVE-2016-2546": { + "cmt_msg": "ALSA: timer: Fix race among timer ioctls", + "cmt_id": "ac905ca58370789645e813d8abfa5871c93e9e36" }, - "CVE-2019-11833": { - "cmt_msg": "ext4: zero out the unused memory region in the extent tree block", - "cmt_id": "98529ecd313bbeff006930056dad26529510054f" + "CVE-2015-7884": { + "cmt_msg": "media/vivid-osd: fix info leak in ioctl", + "cmt_id": "b824d64b153a9683aed6730e9f093a7102c36799" }, - "CVE-2019-9503": { - "cmt_msg": "brcmfmac: add subtype check for event handling in data path", - "cmt_id": "4e06554db5e5c3d693141b84aba3a4f29b7d9ef5" + "CVE-2016-2543": { + "cmt_msg": "ALSA: seq: Fix missing NULL check at remove_events ioctl", + "cmt_id": "9a6003a362acb814fea7422209be344b822b047a" }, - "CVE-2018-1000026": { - "cmt_msg": "bnx2x: disable GSO where gso_size is too big for hardware", - "cmt_id": "c55a2cffa5caaf72db415558f8058f995578a773" + "CVE-2013-4312": { + "cmt_msg": "unix: properly account for FDs passed over unix sockets", + "cmt_id": "dc6b0ec667f67d4768e72c1b7f1bbc14ea52379c" }, - "CVE-2019-19966": { - "cmt_msg": "media: cpia2: Fix use-after-free in cpia2_exit", - "cmt_id": "a04e71a0dbc62083bd31ae4d252d2c07a0035e4a" + "CVE-2016-2549": { + "cmt_msg": "ALSA: hrtimer: Fix stall by hrtimer_cancel()", + "cmt_id": "965b1203f399676ac4989a0876336e212a71085b" + }, + "CVE-2015-8767": { + "cmt_msg": "sctp: Prevent soft lockup when sctp_accept() is called during a timeout event", + "cmt_id": "534e9016cd88ccd577b226b7172e5cd079f5fb02" } }, - "4.4.182": { - "CVE-2019-11479": { - "cmt_msg": "tcp: add tcp_min_snd_mss sysctl", - "cmt_id": "e757d052f3b8ce739d068a1e890643376c16b7a9" + "4.1.18": { + "CVE-2016-1575": { + "cmt_msg": "ovl: setattr: check permissions before copy-up", + "cmt_id": "c8e1bebf86dff9277e21e9a2769724ca05f40c02" }, - "CVE-2019-11478": { - "cmt_msg": "tcp: tcp_fragment() should apply sane memory limits", - "cmt_id": "ad472d3a9483abc155e1644ad740cd8c039b5170" + "CVE-2016-2782": { + "cmt_msg": "USB: visor: fix null-deref at probe", + "cmt_id": "5c9cad0a726131934408f3a9e66fc381204a9ba2" }, - "CVE-2019-11477": { - "cmt_msg": "tcp: limit payload size of sacked skbs", - "cmt_id": "4657ee0fe05e15ab572b157f13a82e080d4b7d73" - } - }, - "4.4.183": { - "CVE-2019-11599": { - "cmt_msg": "coredump: fix race condition between mmget_not_zero()/get_task_mm() and core dumping", - "cmt_id": "8f6345a11caae324ad36abca8723a5710d099a85" + "CVE-2015-7566": { + "cmt_msg": "USB: serial: visor: fix crash on detecting device without write_urbs", + "cmt_id": "85491ceb50c4bc446127776714b41d2b9ca627f1" }, - "CVE-2019-3892": { - "cmt_msg": "coredump: fix race condition between mmget_not_zero()/get_task_mm() and core dumping", - "cmt_id": "8f6345a11caae324ad36abca8723a5710d099a85" + "CVE-2016-0723": { + "cmt_msg": "tty: Fix unsafe ldisc reference via ioctl(TIOCGETD)", + "cmt_id": "27055738c910ee29a9de4b496e198e17b38b0eed" }, - "CVE-2019-15807": { - "cmt_msg": "scsi: libsas: delete sas port if expander discover failed", - "cmt_id": "39c7c903c63db10c99b1083ea9a688f63fb2c4a7" + "CVE-2016-1576": { + "cmt_msg": "ovl: setattr: check permissions before copy-up", + "cmt_id": "c8e1bebf86dff9277e21e9a2769724ca05f40c02" } }, - "4.4.185": { - "CVE-2019-13272": { - "cmt_msg": "ptrace: Fix ->ptracer_cred handling for PTRACE_TRACEME", - "cmt_id": "54562d2b0be5c120b01c8bb94baef1aca37fd329" + "4.1.19": { + "CVE-2016-2384": { + "cmt_msg": "ALSA: usb-audio: avoid freeing umidi object twice", + "cmt_id": "1ea63b629c9c53af6cdde4daf166b3d31b3e9cfe" }, - "CVE-2018-16597": { - "cmt_msg": "ovl: modify ovl_permission() to do checks on two inodes", - "cmt_id": "b24be4acd17a8963a29b2a92e1d80b9ddf759c95" + "CVE-2016-2383": { + "cmt_msg": "bpf: fix branch offset adjustment on backjumps after patching ctx expansion", + "cmt_id": "0f912f6700a3f14481c13cbda2b9cc1b636948ac" }, - "CVE-2019-0136": { - "cmt_msg": "mac80211: drop robust management frames from unknown TA", - "cmt_id": "c7c680979b503a1bb64ee26ffa34207f886090ab" + "CVE-2016-2085": { + "cmt_msg": "EVM: Use crypto_memneq() for digest comparisons", + "cmt_id": "d185fa457006e98aa975ed6c0e7d2ddfe3d26695" }, - "CVE-2019-9506": { - "cmt_msg": "Bluetooth: Fix faulty expression for minimum encryption key size check", - "cmt_id": "993699d9de09097e2bfd49100b8904774e5304fb" + "CVE-2021-20265": { + "cmt_msg": "af_unix: fix struct pid memory leak", + "cmt_id": "8d988538da0c17711c0de0a53fc38cef49e3ed1b" + }, + "CVE-2017-13167": { + "cmt_msg": "ALSA: timer: Fix race at concurrent reads", + "cmt_id": "0163f1a71f10b25eae8d7019124cd7f1141b109a" + }, + "CVE-2015-8970": { + "cmt_msg": "crypto: algif_skcipher - Require setkey before accept(2)", + "cmt_id": "762330b161c49c6d88ab689a0ee2a1a959dc5b6b" } }, - "4.4.186": { - "CVE-2019-10126": { - "cmt_msg": "mwifiex: Fix heap overflow in mwifiex_uap_parse_tail_ies()", - "cmt_id": "3a611df229a90247c9a5159d136c60f4008c29a2" - }, - "CVE-2019-3846": { - "cmt_msg": "mwifiex: Fix possible buffer overflows at parsing bss descriptor", - "cmt_id": "5d43b417e60ab25984fc7c41175f3ce8cee992bd" + "4.1.20": { + "CVE-2015-8553": { + "cmt_msg": "xen/pciback: Don't allow MSI-X ops if PCI_COMMAND_MEMORY is not set.", + "cmt_id": "fda3e3e7b638f742149fb32aa9b691413bb91f41" } }, - "4.4.187": { - "CVE-2019-13631": { - "cmt_msg": "Input: gtco - bounds check collection indent level", - "cmt_id": "3ca20e950203a6c7759186ec4e89cbd33ee2bf81" + "4.1.21": { + "CVE-2016-2143": { + "cmt_msg": "s390/mm: four page table levels vs. fork", + "cmt_id": "09b4fd2014b1ef7d46df8df553f94254ba2a0497" }, - "CVE-2019-20934": { - "cmt_msg": "sched/fair: Don't free p->numa_faults with concurrent readers", - "cmt_id": "da358f365dab8fea00c6254621e2cfb2fd817d01" + "CVE-2016-3044": { + "cmt_msg": "KVM: PPC: Book3S HV: Sanitize special-purpose register values on guest exit", + "cmt_id": "6d44ac3f884b220573b2d46c691127fb6fee0707" }, - "CVE-2019-15211": { - "cmt_msg": "media: radio-raremono: change devm_k*alloc to k*alloc", - "cmt_id": "56ea214b175643476a7f2979118c2ac560f29b3f" + "CVE-2015-8839": { + "cmt_msg": "ext4: fix races between page faults and hole punching", + "cmt_id": "248766f068fd1d3d95479f470bc926d1136141d6" + } + }, + "4.1.22": { + "CVE-2016-3157": { + "cmt_msg": "x86/iopl/64: Properly context-switch IOPL on Xen PV", + "cmt_id": "2cc58a1e06ea8b6c9aa6d25ec74d8d1671e500eb" }, - "CVE-2019-10207": { - "cmt_msg": "Bluetooth: hci_uart: check for missing tty operations", - "cmt_id": "37fb924139954a28a1f04959070c3cc762b0de4c" + "CVE-2015-7513": { + "cmt_msg": "KVM: x86: Reload pit counters for all channels when restoring state", + "cmt_id": "90352f3f473a29db1289ec31facc1ac18cc66e9e" }, - "CVE-2019-15215": { - "cmt_msg": "media: cpia2_usb: first wake up, then free in disconnect", - "cmt_id": "63a80df0ea2b94813f60e8372f9ee93856bcfd5b" + "CVE-2016-3689": { + "cmt_msg": "Input: ims-pcu - sanity check against missing interfaces", + "cmt_id": "3ec245e8591a183e276df89cd7f9e7a15645b9da" }, - "CVE-2019-15926": { - "cmt_msg": "ath6kl: add some bounds checking", - "cmt_id": "c1e1288d2e61727c1a9b9f28d0cf61da592a76bc" + "CVE-2016-9685": { + "cmt_msg": "xfs: fix two memory leaks in xfs_attr_list.c error paths", + "cmt_id": "594103da3005639712b3123a612791c8f4d3f4e9" }, - "CVE-2017-18509": { - "cmt_msg": "ipv6: check sk sk_type and protocol early in ip_mroute_set/getsockopt", - "cmt_id": "ee2f25641633ffb03fb88e4fa8a6424d24d3f295" + "CVE-2015-8785": { + "cmt_msg": "fuse: break infinite loop in fuse_fill_write_pages()", + "cmt_id": "ea44bf73d956729f3122bbed0661db7b18864277" }, - "CVE-2019-15239": { - "cmt_msg": "unknown", - "cmt_id": "8f0b77b71f3fec09f86f80cd98c36a1a35109499" + "CVE-2016-2185": { + "cmt_msg": "Input: ati_remote2 - fix crashes on detecting device with invalid descriptor", + "cmt_id": "4b586dc3d736a43659acb575c90d33370ba2fb0d" }, - "CVE-2019-14284": { - "cmt_msg": "floppy: fix div-by-zero in setup_format_params", - "cmt_id": "26d6284d5d392bd96c414f745bcbf3620e93c8fd" + "CVE-2016-2184": { + "cmt_msg": "ALSA: usb-audio: Fix NULL dereference in create_fixed_stream_quirk()", + "cmt_id": "6ed72ce6ab8b38803b12df8c62a3a52becf19017" }, - "CVE-2019-14283": { - "cmt_msg": "floppy: fix out-of-bounds read in copy_buffer", - "cmt_id": "d105eaf5fb67a193df8fe72e64690c43e343a560" + "CVE-2016-6327": { + "cmt_msg": "IB/srpt: Simplify srpt_handle_tsk_mgmt()", + "cmt_id": "179e72b561d3d331c850e1a5779688d7a7de5246" }, - "CVE-2019-13648": { - "cmt_msg": "powerpc/tm: Fix oops on sigreturn on systems without TM", - "cmt_id": "e67fd28f9ed887d0c8124bda96b66dab87823eac" - } - }, - "4.4.189": { - "CVE-2018-20856": { - "cmt_msg": "block: blk_init_allocated_queue() set q->fq as NULL in the fail case", - "cmt_id": "e6ea77dd5a6a72583453e8703583ce0ef538aea4" + "CVE-2016-2186": { + "cmt_msg": "Input: powermate - fix oops with malicious USB descriptors", + "cmt_id": "76b69dfeb5f1bf19a6bd65991506bbb00647716b" }, - "CVE-2019-1125": { - "cmt_msg": "x86/speculation: Prepare entry code for Spectre v1 swapgs mitigations", - "cmt_id": "e3d8c979c49d6113566acf4b3002073979cd35c3" - } - }, - "4.4.190": { - "CVE-2019-19536": { - "cmt_msg": "can: peak_usb: pcan_usb_pro: Fix info-leaks to USB devices", - "cmt_id": "abea9fa28b64d0a875cc3659002dc87b64836265" + "CVE-2015-8812": { + "cmt_msg": "iw_cxgb3: Fix incorrectly returning error on success", + "cmt_id": "dd25a5d97400cb10a85a09eac07d541975e39522" }, - "CVE-2019-19537": { - "cmt_msg": "USB: core: Fix races in character device registration and deregistraion", - "cmt_id": "8f67bc7c8da8622fddf4d29a2f422678dfbadf77" + "CVE-2015-8660": { + "cmt_msg": "ovl: fix permission checking for setattr", + "cmt_id": "2cadb57dff500076a87b934cac64bb5a2293b644" }, - "CVE-2019-19527": { - "cmt_msg": "HID: hiddev: do cleanup in failure of opening a device", - "cmt_id": "8e73f43b6772a262d1884511f694e0f90c3dfa68" + "CVE-2016-0821": { + "cmt_msg": "include/linux/poison.h: fix LIST_POISON{1,2} offset", + "cmt_id": "46460a03f44f1915ded434057fa46332438b3a6e" }, - "CVE-2019-19535": { - "cmt_msg": "can: peak_usb: pcan_usb_fd: Fix info-leaks to USB devices", - "cmt_id": "67112944e756484c5d62529597a0181f846340d0" + "CVE-2016-3138": { + "cmt_msg": "USB: cdc-acm: more sanity checking", + "cmt_id": "a635bc779e7b7748c9b0b773eaf08a7f2184ec50" + } + }, + "4.1.23": { + "CVE-2016-3137": { + "cmt_msg": "USB: cypress_m8: add endpoint sanity check", + "cmt_id": "45f4b9ca0cf8e53df5adc20d11ffb4b2076dd2c5" }, - "CVE-2018-20961": { - "cmt_msg": "USB: gadget: f_midi: fixing a possible double-free in f_midi", - "cmt_id": "3dae85a803a265c65e6032cd68a13fb717d766d9" + "CVE-2016-3136": { + "cmt_msg": "USB: mct_u232: add sanity checking in probe", + "cmt_id": "4b8d00f5056e278b053ca183e15f4a8e48d79336" }, - "CVE-2019-19530": { - "cmt_msg": "usb: cdc-acm: make sure a refcount is taken early enough", - "cmt_id": "8fed007578dba671e131781360dd87c4683672e7" + "CVE-2016-3140": { + "cmt_msg": "USB: digi_acceleport: do sanity checking for the number of ports", + "cmt_id": "15f572246983bd2f733b82b35e013d7eaa801e94" }, - "CVE-2019-19531": { - "cmt_msg": "usb: yurex: Fix use-after-free in yurex_delete", - "cmt_id": "2ef494ad6274e963dc0fe64a8b405d22e0700e9b" + "CVE-2016-7914": { + "cmt_msg": "assoc_array: don't call compare_object() on a node", + "cmt_id": "32d1b6727390b22cc58d28eb9d7b2d7055e588b7" } }, - "4.4.191": { - "CVE-2019-3900": { - "cmt_msg": "vhost_net: fix possible infinite loop", - "cmt_id": "bb85b4cbd8f69cdea3a0caa9aa4edb1d4d7bc24f" - }, - "CVE-2019-15902": { - "cmt_msg": "unknown", - "cmt_id": "61263fbe574b0b74c50552983bdcc2bb9a409b1e" - }, - "CVE-2019-15118": { - "cmt_msg": "ALSA: usb-audio: Fix a stack buffer overflow bug in check_input_term", - "cmt_id": "735a16d1afc01320392669f4ea64c84d435faf1c" + "4.1.24": { + "CVE-2016-2187": { + "cmt_msg": "Input: gtco - fix crash on detecting device without endpoints", + "cmt_id": "464508beeb30376f277fbfbfd9137cf19cbfa785" }, - "CVE-2016-10906": { - "cmt_msg": "net: arc_emac: fix koops caused by sk_buff free", - "cmt_id": "b31c9932f84ce06b08735884ae7e19eca2b6c80a" + "CVE-2016-3961": { + "cmt_msg": "x86/mm/xen: Suppress hugetlbfs in PV guests", + "cmt_id": "936d0871135e41fba0dc15095319ca106f55a584" }, - "CVE-2016-10905": { - "cmt_msg": "GFS2: don't set rgrp gl_object until it's inserted into rgrp tree", - "cmt_id": "d61e517e39149bff6be936c922f47af99d54509a" + "CVE-2016-7912": { + "cmt_msg": "usb: gadget: f_fs: Fix use-after-free", + "cmt_id": "0763ce11708553fc7b2124f184ce2e4bb0cb186d" + } + }, + "4.1.25": { + "CVE-2016-4565": { + "cmt_msg": "IB/security: Restrict use of the write() interface", + "cmt_id": "5d43a619be6f1960702daafafe87ceab415be6bc" }, - "CVE-2019-10638": { - "cmt_msg": "inet: switch IP ID generator to siphash", - "cmt_id": "66f8c5ff8ed3d99dd21d8f24aac89410de7a4a05" + "CVE-2016-4581": { + "cmt_msg": "propogate_mnt: Handle the first propogated copy being a slave", + "cmt_id": "60f7e3a2dc30ae39574a7c7239a9a47c08b774bd" }, - "CVE-2019-15117": { - "cmt_msg": "ALSA: usb-audio: Fix an OOB bug in parse_audio_mixer_unit", - "cmt_id": "a485888b5189845f0b6c58ae89661a402a80402a" + "CVE-2016-4913": { + "cmt_msg": "get_rock_ridge_filename(): handle malformed NM entries", + "cmt_id": "f1ee8222aed8d64bbf922ba9bf00dc7ac98ab63f" } }, - "4.4.193": { - "CVE-2019-14835": { - "cmt_msg": "vhost: make sure log_num < in_num", - "cmt_id": "35b29a78cc9b2523f6b0c080e6b44d2eeb367023" + "4.1.26": { + "CVE-2016-9754": { + "cmt_msg": "ring-buffer: Prevent overflow of size in ring_buffer_resize()", + "cmt_id": "ab2cfdb8ef5da3d4cd237a3f15cc2d7ad4623260" } }, - "4.4.194": { - "CVE-2019-14816": { - "cmt_msg": "mwifiex: Fix three heap overflow at parsing element in cfg80211_ap_settings", - "cmt_id": "851224e62b5525f0a87a171905e5c144e1899cd2" - }, - "CVE-2019-14814": { - "cmt_msg": "mwifiex: Fix three heap overflow at parsing element in cfg80211_ap_settings", - "cmt_id": "851224e62b5525f0a87a171905e5c144e1899cd2" - }, - "CVE-2019-15505": { - "cmt_msg": "media: technisat-usb2: break out of loop at end of buffer", - "cmt_id": "db38be77199f16dd23d1504a9dfddf7e4479652a" - }, - "CVE-2019-14821": { - "cmt_msg": "KVM: coalesced_mmio: add bounds checking", - "cmt_id": "ae41539657ce0a4e9f4588e89e5e19a8b8f11928" + "4.1.27": { + "CVE-2016-1583": { + "cmt_msg": "proc: prevent stacking filesystems on top", + "cmt_id": "c96e6bf5705254a4c93ca25d6d3c68a04fc7ab5b" } }, - "4.4.195": { - "CVE-2019-19533": { - "cmt_msg": "media: ttusb-dec: Fix info-leak in ttusb_dec_send_command()", - "cmt_id": "b54d1e51bba72256f977912b6b4197bd1494c72e" - }, - "CVE-2019-17053": { - "cmt_msg": "ieee802154: enforce CAP_NET_RAW for raw sockets", - "cmt_id": "a279cd311c1e3870de25fe48e948487b4785e9cd" - }, - "CVE-2019-17052": { - "cmt_msg": "ax25: enforce CAP_NET_RAW for raw sockets", - "cmt_id": "c15d89b5cb86dfcdee536d093ece512091ed6e5c" + "4.1.28": { + "CVE-2016-4951": { + "cmt_msg": "tipc: check nl sock before parsing nested attributes", + "cmt_id": "49956430d3d55b47e4a2d2f5f777d641cae137d6" }, - "CVE-2019-17054": { - "cmt_msg": "appletalk: enforce CAP_NET_RAW for raw sockets", - "cmt_id": "ec1e04b8979464990e000850d14d3e562999a82d" + "CVE-2016-3156": { + "cmt_msg": "ipv4: Don't do expensive useless work during inetdev destroy.", + "cmt_id": "86de8271be91cce66aace5a3ae8afd3f28094957" }, - "CVE-2019-17056": { - "cmt_msg": "nfc: enforce CAP_NET_RAW for raw sockets", - "cmt_id": "001ff467264f3e51c8bb18de5cbe62e91d05cfc5" + "CVE-2016-4580": { + "cmt_msg": "net: fix a kernel infoleak in x25 module", + "cmt_id": "b2b95b3fbd93c910210922809f6c4d24be172b1c" }, - "CVE-2019-17055": { - "cmt_msg": "mISDN: enforce CAP_NET_RAW for raw sockets", - "cmt_id": "a03818269bfbc2ff6d25e3e44eb2247df53648ca" + "CVE-2016-4470": { + "cmt_msg": "KEYS: potential uninitialized variable", + "cmt_id": "c262505cdb45765ddea20a1f85f0023990276772" }, - "CVE-2019-18680": { - "cmt_msg": "unknown", - "cmt_id": "91573ae4aed0a49660abdad4d42f2a0db995ee5e" - } - }, - "4.4.196": { - "CVE-2019-2215": { - "cmt_msg": "ANDROID: binder: remove waitqueue when thread exits.", - "cmt_id": "80eb98a4ee70428d5b4b7202195a916385a76809" + "CVE-2016-3955": { + "cmt_msg": "USB: usbip: fix potential out-of-bounds write", + "cmt_id": "25c871c07f37b8cbaebc97403233185479af095d" }, - "CVE-2020-0030": { - "cmt_msg": "ANDROID: binder: synchronize_rcu() when using POLLFREE.", - "cmt_id": "fcf46dcedbc419633771e16bfdf97a528f4d7dab" + "CVE-2016-2117": { + "cmt_msg": "atl2: Disable unimplemented scatter/gather feature", + "cmt_id": "a2e388f2537a23348810b20ae82468f13d3fb123" }, - "CVE-2019-18806": { - "cmt_msg": "net: qlogic: Fix memory leak in ql_alloc_large_buffers", - "cmt_id": "a35f1bb8c300a46c194bb5154ee8fc040c5ae392" - } - }, - "4.4.197": { - "CVE-2019-19525": { - "cmt_msg": "ieee802154: atusb: fix use-after-free at disconnect", - "cmt_id": "1fb673245b24832acb411db7ffe207fb470559ab" + "CVE-2016-7117": { + "cmt_msg": "net: Fix use after free in the recvmmsg exit path", + "cmt_id": "8ca7bf099ae0e6ff096b3910895b5285a112aeb5" }, - "CVE-2019-16746": { - "cmt_msg": "nl80211: validate beacon head", - "cmt_id": "fd27e0779cf62f72bd8242d003d30742d11e451e" + "CVE-2016-4485": { + "cmt_msg": "net: fix infoleak in llc", + "cmt_id": "5923f46563d1ce74c1f1178cba5a67735bb83e6d" }, - "CVE-2018-20976": { - "cmt_msg": "xfs: clear sb->s_fs_info on mount failure", - "cmt_id": "748edae843c30f41fdcb320f1a8335bc2238b961" + "CVE-2016-4997": { + "cmt_msg": "netfilter: x_tables: check for bogus target offset", + "cmt_id": "451e4403bc4abc51539376d4314baa739ab9e996" }, - "CVE-2019-19523": { - "cmt_msg": "USB: adutux: fix use-after-free on disconnect", - "cmt_id": "cd3cfbafe8eb9761950873c04c0147b40a85d29f" + "CVE-2016-4805": { + "cmt_msg": "ppp: take reference on channels netns", + "cmt_id": "fc74ace8df9bffbab3b886686db02f0809bdc5e9" }, - "CVE-2019-19528": { - "cmt_msg": "USB: iowarrior: fix use-after-free on disconnect", - "cmt_id": "f723d7ea08e2c69ac9ecd87828c650745270fb98" - } - }, - "4.4.198": { - "CVE-2019-17075": { - "cmt_msg": "RDMA/cxgb4: Do not dma memory off of the stack", - "cmt_id": "3cd0698561d3e9dcb7c969077932e072fbb4689e" + "CVE-2016-4486": { + "cmt_msg": "net: fix infoleak in rtnetlink", + "cmt_id": "9a9390bcf56680c487a8e4c89c813a48bfedc4b6" }, - "CVE-2019-17133": { - "cmt_msg": "cfg80211: wext: avoid copying malformed SSIDs", - "cmt_id": "3ca40f2f6015580caf11a4fd23503ea7529ed861" - } - }, - "4.4.199": { - "CVE-2020-10773": { - "cmt_msg": "s390/cmm: fix information leak in cmm_timeout_handler()", - "cmt_id": "1cdb53607683a4fa8625a3f3eb65e5d9f4572166" + "CVE-2016-4794": { + "cmt_msg": "percpu: fix synchronization between chunk->map_extend_work and chunk destruction", + "cmt_id": "d273823dc63bb51e3adc11e0f7c324d86e2d2009" }, - "CVE-2019-17666": { - "cmt_msg": "rtlwifi: Fix potential overflow on P2P code", - "cmt_id": "3da8d0e777fa8a0934a288b115373cf12d7800f8" + "CVE-2016-3134": { + "cmt_msg": "netfilter: x_tables: fix unconditional helper", + "cmt_id": "850c377e0e2d76723884d610ff40827d26aa21eb" }, - "CVE-2019-19532": { - "cmt_msg": "HID: Fix assumption that devices have inputs", - "cmt_id": "2be873faad369e0b6b70761506995fd2d4cb0257" + "CVE-2016-5829": { + "cmt_msg": "HID: hiddev: validate num_values for HIDIOCGUSAGES, HIDIOCSUSAGES commands", + "cmt_id": "f67b6920a0cf03d363c5f3bfb14f5d258168dc8c" }, - "CVE-2019-15098": { - "cmt_msg": "ath6kl: fix a NULL-ptr-deref bug in ath6kl_usb_alloc_urb_from_pipe()", - "cmt_id": "d7619be74f341630989c7edfd21a9ed8f51ab2d1" - } - }, - "4.4.200": { - "CVE-2019-18282": { - "cmt_msg": "net/flow_dissector: switch to siphash", - "cmt_id": "491cd03f3b44f58f346ec15e2fc958d0def7b5a7" + "CVE-2016-2847": { + "cmt_msg": "pipe: limit the per-user amount of pages allocated in pipes", + "cmt_id": "2612a949cf5c2a868adee1ca6bcbf01cd4e2f01e" }, - "CVE-2019-19049": { - "cmt_msg": "of: unittest: fix memory leak in unittest_data_add", - "cmt_id": "265c6b8ab54cf46ac4e3c768f2be1489dc13a494" - } - }, - "4.4.201": { - "CVE-2019-19534": { - "cmt_msg": "can: peak_usb: fix slab info leak", - "cmt_id": "1afef2b7a5d8d97cee332aee1c4d5a96597c223d" + "CVE-2016-4998": { + "cmt_msg": "netfilter: x_tables: check for bogus target offset", + "cmt_id": "451e4403bc4abc51539376d4314baa739ab9e996" }, - "CVE-2019-0155": { - "cmt_msg": "drm/i915: Rename gen7 cmdparser tables", - "cmt_id": "e5e3c0154c19f2d8213e0af88b7a10d9de7fbafd" + "CVE-2016-9806": { + "cmt_msg": "netlink: Fix dump skb leak/double free", + "cmt_id": "e39cd93be0009ae4548a737756a947d2030956ab" }, - "CVE-2019-0154": { - "cmt_msg": "drm/i915: Lower RM timeout to avoid DSI hard hangs", - "cmt_id": "1433b8d41b1aa346e100b839c19fc033871ac5a6" + "CVE-2016-5828": { + "cmt_msg": "powerpc/tm: Always reclaim in start_thread() for exec() class syscalls", + "cmt_id": "848be4770beb10fcc6f971c58e80aa2c2b6dad66" }, - "CVE-2019-19052": { - "cmt_msg": "can: gs_usb: gs_can_open(): prevent memory leak", - "cmt_id": "7f18860337d74fdf79e7152bee7117d945ff6945" + "CVE-2016-7916": { + "cmt_msg": "proc: prevent accessing /proc//environ until it's ready", + "cmt_id": "93c4863f4435023fcfdae542039860349189b334" } }, - "4.4.202": { - "CVE-2019-11135": { - "cmt_msg": "x86/msr: Add the IA32_TSX_CTRL MSR", - "cmt_id": "124635392ef394772850172bd5370e62cfe781b4" + "4.1.29": { + "CVE-2016-7911": { + "cmt_msg": "block: fix use-after-free in sys_ioprio_get()", + "cmt_id": "23c63b8c08fe3f0b21594ee1ac4de0fa52225f79" } }, - "4.4.203": { - "CVE-2019-19524": { - "cmt_msg": "Input: ff-memless - kill timer in destroy()", - "cmt_id": "af618124c69794bf215bf8cefb67890f95246ef8" - }, - "CVE-2019-15917": { - "cmt_msg": "Bluetooth: hci_ldisc: Postpone HCI_UART_PROTO_READY bit set in hci_uart_set_proto()", - "cmt_id": "29d9c5714096a47ed8d2a1632e382c949b089563" + "4.1.30": { + "CVE-2016-5400": { + "cmt_msg": "media: fix airspy usb probe error path", + "cmt_id": "ce05d315cec02835c77fa3f4b5119960e1654913" } }, - "4.4.204": { - "CVE-2019-18660": { - "cmt_msg": "powerpc/book3s64: Fix link stack flush on context switch", - "cmt_id": "3a79351beb549634c217570a5a8e500b8f466ad0" + "4.1.31": { + "CVE-2016-4569": { + "cmt_msg": "ALSA: timer: Fix leak in SNDRV_TIMER_IOCTL_PARAMS", + "cmt_id": "1b7d7bce7467cf10f21007a5c952688877ead95e" }, - "CVE-2019-15291": { - "cmt_msg": "media: b2c2-flexcop-usb: add sanity checking", - "cmt_id": "89660684ceca03bcaf5d1637709a4875e98387c6" + "CVE-2016-4578": { + "cmt_msg": "ALSA: timer: Fix leak in events via snd_timer_user_ccallback", + "cmt_id": "1fbc4fd13bd04fd7c7fd033fdfde97e96d2865e5" }, - "CVE-2019-18683": { - "cmt_msg": "media: vivid: Fix wrong locking that causes race conditions on streaming stop", - "cmt_id": "7f8286d2b526a86d9bbdf20690b4245d0ea1fac3" + "CVE-2016-5412": { + "cmt_msg": "KVM: PPC: Book3S HV: Pull out TM state save/restore into separate procedures", + "cmt_id": "ae40dadbb81f553a053dcef39e5b0322f586c497" + }, + "CVE-2016-1237": { + "cmt_msg": "posix_acl: Add set_posix_acl", + "cmt_id": "173f43c05f782df4fe42cc1152f9306ef76dc6eb" + }, + "CVE-2016-6197": { + "cmt_msg": "ovl: verify upper dentry before unlink and rename", + "cmt_id": "6412c3ae6b415ca83264a2c11e24bfb63cd74629" + }, + "CVE-2017-7495": { + "cmt_msg": "ext4: fix data exposure after a crash", + "cmt_id": "906d6f4d9cdc8509c505f29f6146ec627fef2f06" + }, + "CVE-2015-8787": { + "cmt_msg": "netfilter: nf_nat_redirect: add missing NULL pointer check", + "cmt_id": "6a468737c8c00bd6cdb208ca0b7f841e8970d466" + }, + "CVE-2016-7910": { + "cmt_msg": "block: fix use-after-free in seq file", + "cmt_id": "d9ee963b61b93366103b88f10495b4680b256273" + }, + "CVE-2016-6136": { + "cmt_msg": "audit: fix a double fetch in audit_log_single_execve_arg()", + "cmt_id": "634a3fc5f16470e9b78ccd7ce643305122d5ebb2" } }, - "4.4.206": { - "CVE-2019-12614": { - "cmt_msg": "powerpc/pseries/dlpar: Fix a missing check in dlpar_parse_cc_property()", - "cmt_id": "27cb5fbc84ed4d97a4bbcab04fb186705bac303e" + "4.1.32": { + "CVE-2016-6480": { + "cmt_msg": "aacraid: Check size values after double-fetch from user", + "cmt_id": "e989e0c9bba5c1f8987629e2880a512d7b15e852" + }, + "CVE-2016-5696": { + "cmt_msg": "tcp: make challenge acks less predictable", + "cmt_id": "2b211174edd454376ab9bc85f7bae8e01016d87c" } }, - "4.4.207": { - "CVE-2019-19227": { - "cmt_msg": "appletalk: Fix potential NULL pointer dereference in unregister_snap_client", - "cmt_id": "7ae3525ee708f867a2d2321c246b285136cdbed8" - }, - "CVE-2019-19062": { - "cmt_msg": "crypto: user - fix memory leak in crypto_report", - "cmt_id": "5020350fb0012816ee35f7b744ded18bb75ecc1e" - }, - "CVE-2019-19332": { - "cmt_msg": "KVM: x86: fix out-of-bounds write in KVM_GET_EMULATED_CPUID (CVE-2019-19332)", - "cmt_id": "385bddaf5ee11acdf8d823ecc429c675b5416ac2" + "4.1.33": { + "CVE-2015-8966": { + "cmt_msg": "[PATCH] arm: fix handling of F_OFD_... in oabi_fcntl64()", + "cmt_id": "469a242127b181656cb0a07de4584215bd4494fb" } }, - "4.4.208": { - "CVE-2019-19057": { - "cmt_msg": "mwifiex: pcie: Fix memory leak in mwifiex_pcie_init_evt_ring", - "cmt_id": "4a6cf20ca09434486bfbfc742c960157c23c931d" - }, - "CVE-2019-19063": { - "cmt_msg": "rtlwifi: prevent memory leak in rtl_usb_probe", - "cmt_id": "ca4fb6974bb645ebf3352f5bba7699db4b44b75f" - }, - "CVE-2019-20812": { - "cmt_msg": "af_packet: set defaule value for tmo", - "cmt_id": "b424ed744453c1b0ce0e67f2e64e7719725f65a3" - }, - "CVE-2019-19447": { - "cmt_msg": "ext4: work around deleting a file with i_nlink == 0 safely", - "cmt_id": "0a5a9d02428d4e8c181413a51f7bcf0d7080dbf3" + "4.1.34": { + "CVE-2016-9178": { + "cmt_msg": "fix minor infoleak in get_user_ex()", + "cmt_id": "319fe11519401e8a5db191a0a93aa2c1d7bb59f4" } }, - "4.4.209": { - "CVE-2019-19965": { - "cmt_msg": "scsi: libsas: stop discovering if oob mode is disconnected", - "cmt_id": "8febe765539fbcc7d47e4e2ad44a0bcb2adbf02b" + "4.1.35": { + "CVE-2016-5195": { + "cmt_msg": "mm: remove gup_flags FOLL_WRITE games from __get_user_pages()", + "cmt_id": "c865f98df72112a3997b219bf711bc46c1e90706" } }, - "4.4.210": { - "CVE-2019-14895": { - "cmt_msg": "mwifiex: fix possible heap overflow in mwifiex_process_country_ie()", - "cmt_id": "d1bd8bd7e5ebda57580372d2b8b69182f9d8d113" - }, - "CVE-2020-0305": { - "cmt_msg": "chardev: Avoid potential use-after-free in 'chrdev_open()'", - "cmt_id": "3cce9309df73def742692ffddde05638b6eda6d9" - }, - "CVE-2019-19066": { - "cmt_msg": "scsi: bfa: release allocated memory in case of error", - "cmt_id": "8c67bbd0754f8b35f28d8b5626c16d5721e9a8f7" - }, - "CVE-2019-20636": { - "cmt_msg": "Input: add safety guards to input_set_keycode()", - "cmt_id": "68442780f2c223531de9d25104fd04e1bfdb583b" - }, - "CVE-2019-19068": { - "cmt_msg": "rtl8xxxu: prevent leaking urb", - "cmt_id": "57d09152eef9e1afca04b2f7bebccd07e0efa881" - }, - "CVE-2020-0431": { - "cmt_msg": "HID: hid-input: clear unmapped usages", - "cmt_id": "3be648c80db794a3bc1b22a1115071402a1f9803" + "4.1.36": { + "CVE-2016-7042": { + "cmt_msg": "KEYS: Fix short sprintf buffer in /proc/keys show function", + "cmt_id": "3dc8f1f0decb5f022b3be2cc98c7163a376556c9" }, - "CVE-2019-14615": { - "cmt_msg": "drm/i915/gen9: Clear residual context state on context switch", - "cmt_id": "e2546a83a7e291f412978cf6a580e43698c308bc" + "CVE-2016-8633": { + "cmt_msg": "firewire: net: guard against rx buffer overflows", + "cmt_id": "c604dec3d5a695efed5492fc463ef70ef8010bbe" }, - "CVE-2019-19056": { - "cmt_msg": "mwifiex: pcie: Fix memory leak in mwifiex_pcie_alloc_cmdrsp_buf", - "cmt_id": "c858dc3c047e2962994d28acaccd52272558c9ff" + "CVE-2016-9644": { + "cmt_msg": "x86/mm: Expand the exception table logic to allow new handling options", + "cmt_id": "7ea3d2e9c6aa73bc07d537ab4574d18bcfe2f680" } }, - "4.4.211": { - "CVE-2019-17351": { - "cmt_msg": "xen: let alloc_xenballooned_pages() fail if not enough memory free", - "cmt_id": "b39b4801d50956256711db83be28b9cff2620fda" + "4.1.37": { + "CVE-2016-6828": { + "cmt_msg": "tcp: fix use after free in tcp_xmit_retransmit_queue()", + "cmt_id": "9a66bc6ee0f9908ba98a7d19b94d49ec231ab0e1" }, - "CVE-2019-20096": { - "cmt_msg": "dccp: Fix memleak in __feat_register_sp", - "cmt_id": "a5c290ebb46d33f8700aab2edb996c9a0478b3b8" + "CVE-2016-6213": { + "cmt_msg": "mnt: Add a per mount namespace limit on the number of mounts", + "cmt_id": "1171afc4a34e2926e6e8e27c896cf328c8825ac3" }, - "CVE-2019-15217": { - "cmt_msg": "media: usb:zr364xx:Fix KASAN:null-ptr-deref Read in zr364xx_vidioc_querycap", - "cmt_id": "e6c986b15703eb2e0d59a3f79e99fd2aa6221b51" + "CVE-2016-8632": { + "cmt_msg": "tipc: check minimum bearer MTU", + "cmt_id": "016d02981cceb7b0f3436278b71fe3ea87542e20" }, - "CVE-2018-21008": { - "cmt_msg": "rsi: add fix for crash during assertions", - "cmt_id": "80427a7b1195e7946992baffeb112b2635245198" + "CVE-2015-1350": { + "cmt_msg": "fs: Avoid premature clearing of capabilities", + "cmt_id": "de42b9559d0c540152260d484dbc70b3e81f8738" }, - "CVE-2019-15220": { - "cmt_msg": "p54usb: Fix race between disconnect and firmware loading", - "cmt_id": "e2c48c1e6ef5e806b68ca685216dda05e5267be2" + "CVE-2016-7097": { + "cmt_msg": "posix_acl: Clear SGID bit when setting file permissions", + "cmt_id": "62fa696b7b435e93ed114dd6a23aa0881d7f81b9" }, - "CVE-2019-15221": { - "cmt_msg": "ALSA: line6: Fix write on zero-sized buffer", - "cmt_id": "81b83ca3e45b83e632b8063cd27bdb072ecfc135" + "CVE-2016-7425": { + "cmt_msg": "scsi: arcmsr: Buffer overflow in arcmsr_iop_message_xfer()", + "cmt_id": "8165fc3eb28cbd2e4cca07308f3a205ab347a9d1" }, - "CVE-2020-12652": { - "cmt_msg": "scsi: mptfusion: Fix double fetch bug in ioctl", - "cmt_id": "952fc03b38b8dca3923f3c61e3273c8f8ed2bd86" + "CVE-2016-7039": { + "cmt_msg": "net: add recursion limit to GRO", + "cmt_id": "fabaaaa96d54077b4a9f2c811e55dc09ff2874db" }, - "CVE-2019-5108": { - "cmt_msg": "mac80211: Do not send Layer 2 Update frame before authorization", - "cmt_id": "622c77a3addefa54d61205177635409de87a8a7c" - } - }, - "4.4.212": { - "CVE-2019-14896": { - "cmt_msg": "libertas: Fix two buffer overflows at parsing bss descriptor", - "cmt_id": "4d7f4d383230f6ef4f8a32e1fbfa4eb7c682522f" + "CVE-2016-8655": { + "cmt_msg": "packet: fix race condition in packet_set_ring", + "cmt_id": "e29fdf045048addaea61c837b60e3c4d2ec43614" }, - "CVE-2019-14897": { - "cmt_msg": "libertas: Fix two buffer overflows at parsing bss descriptor", - "cmt_id": "4d7f4d383230f6ef4f8a32e1fbfa4eb7c682522f" + "CVE-2015-8956": { + "cmt_msg": "Bluetooth: Fix potential NULL dereference in RFCOMM bind callback", + "cmt_id": "7abf32087c1dabacf707506585afc7b69aad21b3" }, - "CVE-2020-14416": { - "cmt_msg": "can, slip: Protect tty->disc_data in write_wakeup and close with RCU", - "cmt_id": "6169e11e1f14dd272ec9c746050820e5cc2cf853" - } - }, - "4.4.213": { - "CVE-2020-0432": { - "cmt_msg": "staging: most: net: fix buffer overflow", - "cmt_id": "917c8fe39f4d42c3850b22d6a0bf3ffab1466d19" + "CVE-2016-8399": { + "cmt_msg": "net: ping: check minimum size on ICMP header length", + "cmt_id": "efcf38bd40200212ef3de3d38e11c42958f8afaa" } }, - "4.4.214": { - "CVE-2020-12653": { - "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_cmd_append_vsie_tlv()", - "cmt_id": "4dd90d14f902074f18238dc104868debbd3cd250" + "4.1.38": { + "CVE-2016-8666": { + "cmt_msg": "tunnels: Don't apply GRO to multiple layers of encapsulation.", + "cmt_id": "066b300e5be43cb61697539e2a3a9aac5afb422f" }, - "CVE-2020-12654": { - "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_ret_wmm_get_status()", - "cmt_id": "91b836b01c788932d86a448d26561740d22e7c9b" + "CVE-2016-9588": { + "cmt_msg": "kvm: nVMX: Allow L1 to intercept software exceptions (#BP and #OF)", + "cmt_id": "dd5035276792edbd3dac21620d9b91d3a8e3785a" }, - "CVE-2020-0404": { - "cmt_msg": "media: uvcvideo: Avoid cyclic entity chains due to malformed USB descriptors", - "cmt_id": "f941047b5e5abd73be6c058a67a06533728c3422" + "CVE-2016-10088": { + "cmt_msg": "sg_write()/bsg_write() is not fit to be called under KERNEL_DS", + "cmt_id": "3e3267311e3b6557206f293eeb9205b41e090625" } }, - "4.4.215": { - "CVE-2020-9383": { - "cmt_msg": "floppy: check FDC index for errors before assigning it", - "cmt_id": "3dd989efdd97a42dc18e9bd653b16f0d84f45fc2" + "4.1.39": { + "CVE-2017-2618": { + "cmt_msg": "selinux: fix off-by-one in setprocattr", + "cmt_id": "96e74ad7ac38ca330d16222e6da38c9a196deb40" }, - "CVE-2020-2732": { - "cmt_msg": "KVM: nVMX: Don't emulate instructions in guest mode", - "cmt_id": "27021607e18ee2946cbbc74c19031ad966b9c883" + "CVE-2017-18255": { + "cmt_msg": "perf/core: Fix the perf_cpu_time_max_percent check", + "cmt_id": "bd21c23d668307419b029bbe27ca67508161e59d" }, - "CVE-2019-16233": { - "cmt_msg": "scsi: qla2xxx: fix a potential NULL pointer dereference", - "cmt_id": "d50a2a486d941417ca7abaebfe433a3af3c773fb" + "CVE-2017-7273": { + "cmt_msg": "HID: hid-cypress: validate length of report", + "cmt_id": "e0fb4ae61143bb6b218aa8bab1730bb156c4d457" }, - "CVE-2020-0009": { - "cmt_msg": "staging: android: ashmem: Disallow ashmem memory from being remapped", - "cmt_id": "a349db843c640ad1fbab6625a7a4e9d4dd45f26a" + "CVE-2016-9191": { + "cmt_msg": "sysctl: Drop reference added by grab_header in proc_sys_readdir", + "cmt_id": "13d7adf646017517382ec541652eb7d3bc77742c" }, - "CVE-2020-36558": { - "cmt_msg": "vt: vt_ioctl: fix race in VT_RESIZEX", - "cmt_id": "803bc73a2d3238a60901f4d9427fc7f8ac1d0435" + "CVE-2017-5549": { + "cmt_msg": "USB: serial: kl5kusb105: fix line-state error handling", + "cmt_id": "301242e3780413bffc7bbbd70cafb4ecee135080" + }, + "CVE-2016-8405": { + "cmt_msg": "fbdev: color map copying bounds checking", + "cmt_id": "a94f76f379dcc375f00d32194954f6c4dd1644c9" } }, - "4.4.216": { - "CVE-2020-8649": { - "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region", - "cmt_id": "c0950b28ad5ac18f35ad8fa3856d10be585547b4" - }, - "CVE-2020-8648": { - "cmt_msg": "vt: selection, close sel_buffer race", - "cmt_id": "63f529ab35671d1c7433cb8283980289c8832bad" - }, - "CVE-2019-16234": { - "cmt_msg": "iwlwifi: pcie: fix rb_allocator workqueue allocation", - "cmt_id": "32b63f22e4c16aee095b2c116f0c7526b7fd3e66" - }, - "CVE-2019-11487": { - "cmt_msg": "fs: prevent page refcount overflow in pipe_buf_get", - "cmt_id": "c326585619b99cce3240403faa56f599e06893cb" + "4.1.40": { + "CVE-2017-7294": { + "cmt_msg": "drm/vmwgfx: fix integer overflow in vmw_surface_define_ioctl()", + "cmt_id": "d91a91d8f6ba1c98e0822e40b7e4a266d9567813" }, - "CVE-2020-8647": { - "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region", - "cmt_id": "c0950b28ad5ac18f35ad8fa3856d10be585547b4" + "CVE-2016-10229": { + "cmt_msg": "udp: properly support MSG_PEEK with truncated buffers", + "cmt_id": "5c564705d3f0436ddc70d833b975b870ba560528" }, - "CVE-2020-27068": { - "cmt_msg": "cfg80211: add missing policy for NL80211_ATTR_STATUS_CODE", - "cmt_id": "bfb70b52540845bd1574de6f0e58fcc7907d8a07" + "CVE-2017-7895": { + "cmt_msg": "nfsd: stricter decoding of write-like NFSv2/v3 ops", + "cmt_id": "5afff19d82af4e4ed66ce0320cd2f17053b78b25" }, - "CVE-2020-0444": { - "cmt_msg": "audit: fix error handling in audit_data_to_entry()", - "cmt_id": "c99bc56eba9e90c28d8bb42712b9b262d99df630" + "CVE-2017-7261": { + "cmt_msg": "drm/vmwgfx: NULL pointer dereference in vmw_surface_define_ioctl()", + "cmt_id": "13b52a46a6778fe23e64a20499230738ed3d445b" }, - "CVE-2020-27418": { - "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region", - "cmt_id": "c0950b28ad5ac18f35ad8fa3856d10be585547b4" - } - }, - "4.4.217": { - "CVE-2019-14901": { - "cmt_msg": "mwifiex: Fix heap overflow in mmwifiex_process_tdls_action_frame()", - "cmt_id": "4ca9ed6965cc0b9ace3758355ff13d71b97bf008" + "CVE-2017-7187": { + "cmt_msg": "scsi: sg: check length passed to SG_NEXT_CMD_LEN", + "cmt_id": "861b5c18bb146f3845dc52f64e7bc997d6cf8db3" }, - "CVE-2020-29370": { - "cmt_msg": "mm: slub: add missing TID bump in kmem_cache_alloc_bulk()", - "cmt_id": "3698fe758684cf3600a0aa91a5af3eba27722cfd" - } - }, - "4.4.218": { - "CVE-2020-36557": { - "cmt_msg": "vt: vt_ioctl: fix VT_DISALLOCATE freeing in-use virtual console", - "cmt_id": "7f4c99f8487c1dd7b7eb980c16bd256be0dc04d1" + "CVE-2017-5669": { + "cmt_msg": "ipc/shm: Fix shmat mmap nil-page protection", + "cmt_id": "c9cf983337a046e93f33c66c2707a704ec6440ac" }, - "CVE-2020-14381": { - "cmt_msg": "futex: Fix inode life-time issue", - "cmt_id": "24bbfe34bb44c036c3a0874bf74fc2387d5557bf" + "CVE-2017-7618": { + "cmt_msg": "crypto: ahash - Fix EINPROGRESS notification callback", + "cmt_id": "ce0e21e44f9766aeef6a8c18a750ef9d94c1ca8c" }, - "CVE-2020-11668": { - "cmt_msg": "media: xirlink_cit: add missing descriptor sanity checks", - "cmt_id": "89fb5aa765cf8e47ac168810dd76afe37312dff2" + "CVE-2017-7645": { + "cmt_msg": "nfsd: check for oversized NFSv2/v3 arguments", + "cmt_id": "c9bb9f02b0484703ca5d0da15a11f891954e1c31" }, - "CVE-2021-3715": { - "cmt_msg": "net_sched: cls_route: remove the right filter from hashtable", - "cmt_id": "7518af6464b47a0d775173570c3d25f699da2a5e" + "CVE-2017-8924": { + "cmt_msg": "USB: serial: io_ti: fix information leak in completion handler", + "cmt_id": "e0f57e1a406c091646d7f474572975aab4c6d1de" }, - "CVE-2020-10942": { - "cmt_msg": "vhost: Check docket sk_family instead of call getname", - "cmt_id": "79152052fbb703ff5f66778b3e585c69b95d83d2" + "CVE-2017-8925": { + "cmt_msg": "USB: serial: omninet: fix reference leaks at open", + "cmt_id": "5dfb04937689e5f797506ee73f028f919cc9278d" }, - "CVE-2020-27066": { - "cmt_msg": "xfrm: policy: Fix doulbe free in xfrm_policy_timer", - "cmt_id": "0ac1dd7bb8f1b40f1bf494f6a27235a7a3b36350" + "CVE-2017-7472": { + "cmt_msg": "KEYS: fix keyctl_set_reqkey_keyring() to not leak thread keyrings", + "cmt_id": "a0f82864854a4511cd19f06436f0cf140fae2427" }, - "CVE-2020-11608": { - "cmt_msg": "media: ov519: add missing endpoint sanity checks", - "cmt_id": "3de5ed1a64b96f0a482e2a325bcea38d51a2a1fd" + "CVE-2016-2188": { + "cmt_msg": "USB: iowarrior: fix NULL-deref at probe", + "cmt_id": "c4b51661231242b5b24431a31299c433934cad2e" }, - "CVE-2020-11609": { - "cmt_msg": "media: stv06xx: add missing descriptor sanity checks", - "cmt_id": "eca73facbd01d15bd6f8c08c9c39d255a752e4b6" + "CVE-2016-9604": { + "cmt_msg": "KEYS: Disallow keyrings beginning with '.' to be joined as session keyrings", + "cmt_id": "4ef48e49b1c550a511acb78d7b9e0b52bb43aba6" } }, - "4.4.219": { - "CVE-2020-11494": { - "cmt_msg": "slcan: Don't transmit uninitialized stack data in padding", - "cmt_id": "f7dd0134a169df7dd9b68b6c135fe10629e66599" + "4.1.41": { + "CVE-2017-18360": { + "cmt_msg": "USB: serial: io_ti: fix div-by-zero in set_termios", + "cmt_id": "2cd394cd10465fc0878958ba99e6080ac8ead559" }, - "CVE-2020-0429": { - "cmt_msg": "l2tp: fix race between l2tp_session_delete() and l2tp_tunnel_closeall()", - "cmt_id": "d845bf594d68d309a39ce8df72942e2b3fbbb176" + "CVE-2016-7913": { + "cmt_msg": "xc2028: avoid use after free", + "cmt_id": "e21b00fe6cc7de57072cb89c87e43f33af866476" }, - "CVE-2020-11565": { - "cmt_msg": "mm: mempolicy: require at least one nodeid for MPOL_PREFERRED", - "cmt_id": "4489253d0625c4841620160b2461925b695c651c" - } - }, - "4.4.220": { - "CVE-2020-12826": { - "cmt_msg": "signal: Extend exec_id to 64bits", - "cmt_id": "6b9e27da8fc595e8abd4374c230d5b9404efac83" - } - }, - "4.4.221": { - "CVE-2019-19319": { - "cmt_msg": "ext4: protect journal inode's blocks using block_validity", - "cmt_id": "7eff961ca9f364be255d279346517ba0158ec8e3" + "CVE-2017-6074": { + "cmt_msg": "dccp: fix freeing skb too early for IPV6_RECVPKTINFO", + "cmt_id": "98442999b9671784e659b205be8b5b6be8e81629" }, - "CVE-2020-12114": { - "cmt_msg": "make struct mountpoint bear the dentry reference to mountpoint, not struct mount", - "cmt_id": "83354adbd7a967230bd23a547c5b695567ddba2c" + "CVE-2017-0750": { + "cmt_msg": "f2fs: do more integrity verification for superblock", + "cmt_id": "c5ef0e9f70d182cda057417b98cb8f88cf1dea42" }, - "CVE-2020-12464": { - "cmt_msg": "USB: core: Fix free-while-in-use bug in the USB S-Glibrary", - "cmt_id": "f613d830fae7cbf8799378338d4df977f8667d5c" - } - }, - "4.4.222": { - "CVE-2020-10751": { - "cmt_msg": "selinux: properly handle multiple messages in selinux_netlink_send()", - "cmt_id": "92b5848736395f4ea56738895acdd09cdc2a93da" + "CVE-2017-7616": { + "cmt_msg": "mm/mempolicy.c: fix error handling in set_mempolicy and mbind.", + "cmt_id": "aa612d59c08f52a1ee508a12d95deb012e2163d2" }, - "CVE-2020-0255": { - "cmt_msg": "selinux: properly handle multiple messages in selinux_netlink_send()", - "cmt_id": "92b5848736395f4ea56738895acdd09cdc2a93da" - } - }, - "4.4.223": { - "CVE-2023-3106": { - "cmt_msg": "xfrm: fix crash in XFRM_MSG_GETSA netlink handler", - "cmt_id": "0cbb0084fa2b444b7316a0967a0d93f5ae520216" - } - }, - "4.4.224": { - "CVE-2020-10711": { - "cmt_msg": "netlabel: cope with NULL catmap", - "cmt_id": "b8ff52e4bdaabfee050ae4e8c721305a924a8633" + "CVE-2017-8064": { + "cmt_msg": "dvb-usb-v2: avoid use-after-free", + "cmt_id": "4473dc376c48ea0be28a087922b97c90333f22ce" }, - "CVE-2020-0433": { - "cmt_msg": "blk-mq: sync the update nr_hw_queues with blk_mq_queue_tag_busy_iter", - "cmt_id": "fa9355afd5b07707e15a5f75b854f04a9c14a798" + "CVE-2017-2671": { + "cmt_msg": "ping: implement proper locking", + "cmt_id": "5f1cef9e823aa35c881745446ea3c865da338e4e" }, - "CVE-2020-1749": { - "cmt_msg": "net: ipv6_stub: use ip6_dst_lookup_flow instead of ip6_dst_lookup", - "cmt_id": "7c9d04e1c3ed58f60592329459d9ca7789442ff7" + "CVE-2016-9120": { + "cmt_msg": "staging/android/ion : fix a race condition in the ion driver", + "cmt_id": "9c90c093b98f210d9611fac2c1f9e4f28254a55c" }, - "CVE-2020-27786": { - "cmt_msg": "ALSA: rawmidi: Fix racy buffer resize under concurrent accesses", - "cmt_id": "718eede1eeb602531e09191d3107eb849bbe64eb" + "CVE-2017-7308": { + "cmt_msg": "net/packet: fix overflow in check for priv area size", + "cmt_id": "dd07486ceba48b5d2157b212bb9bd5ce9a46b593" }, - "CVE-2020-12769": { - "cmt_msg": "spi: spi-dw: Add lock protect dw_spi rx/tx to prevent concurrent calls", - "cmt_id": "3549e7aaa20947df2338305509c534c79c43e765" + "CVE-2016-9084": { + "cmt_msg": "vfio/pci: Fix integer overflows, bitmask check", + "cmt_id": "073e9973d48b1a7fa6d610fde377f3d7f4171ad6" }, - "CVE-2020-10690": { - "cmt_msg": "ptp: fix the race between the release of ptp_clock and cdev", - "cmt_id": "6f5e3bb7879ee1eb71c6c3cbaaffbb0da6cd7d57" + "CVE-2017-7889": { + "cmt_msg": "mm: Tighten x86 /dev/mem with zeroing reads", + "cmt_id": "eb618d2eb22bb0e1843fb17431fdd18253918cb8" }, - "CVE-2020-13143": { - "cmt_msg": "USB: gadget: fix illegal array access in binding with UDC", - "cmt_id": "c18a8b0d7b8fdb299bcfab2feb9c0f410580794a" + "CVE-2016-9083": { + "cmt_msg": "vfio/pci: Fix integer overflows, bitmask check", + "cmt_id": "073e9973d48b1a7fa6d610fde377f3d7f4171ad6" }, - "CVE-2019-19768": { - "cmt_msg": "blktrace: Protect q->blk_trace with RCU", - "cmt_id": "3d5d64aea941a45efda1bd02c0ec8dd57e8ce4ca" + "CVE-2017-7487": { + "cmt_msg": "ipx: call ipxitf_put() in ioctl error path", + "cmt_id": "e8701e0f6768291622b01a3083c3a7e6761f6c51" }, - "CVE-2020-12770": { - "cmt_msg": "scsi: sg: add sg_remove_request in sg_write", - "cmt_id": "af9a86cc9f1acfc380e96a9beb59462f32a4b6c4" - } - }, - "4.4.225": { - "CVE-2018-9517": { - "cmt_msg": "l2tp: pass tunnel pointer to ->session_create()", - "cmt_id": "3ca51032627e9bfea7d609f008461efdfdba1a5c" + "CVE-2017-10662": { + "cmt_msg": "f2fs: sanity check segment count", + "cmt_id": "46527f8d11fa64d3b493d03fc5c3b5ecc7d4d37a" }, - "CVE-2021-0447": { - "cmt_msg": "l2tp: protect sock pointer of struct pppol2tp_session with RCU", - "cmt_id": "c2984681fe15cfb803a9132aaaf1140ab20a72c1" + "CVE-2017-10661": { + "cmt_msg": "timerfd: Protect the might cancel mechanism proper", + "cmt_id": "db14464180fa453a8ba82bce8107884571d7db6d" }, - "CVE-2020-27067": { - "cmt_msg": "l2tp: fix l2tp_eth module loading", - "cmt_id": "c30b34ce7944ec7026d4803cd51da2521df992a3" - } - }, - "4.4.226": { - "CVE-2020-10732": { - "cmt_msg": "fs/binfmt_elf.c: allocate initialized memory in fill_thread_core_info()", - "cmt_id": "2673a0cb646affc7ff66970cfc884d9e2223bc60" - } - }, - "4.4.227": { - "CVE-2020-13974": { - "cmt_msg": "vt: keyboard: avoid signed integer overflow in k_ascii", - "cmt_id": "dad0bf9ce93fa40b667eccd3306783f4db4b932b" + "CVE-2017-2596": { + "cmt_msg": "kvm: fix page struct leak in handle_vmon", + "cmt_id": "68e9c254f662e4c2763e672b026a513d91f3a1c4" }, - "CVE-2020-0543": { - "cmt_msg": "x86/cpu: Add 'table' argument to cpu_matches()", - "cmt_id": "4ebffa4b0a198d8671ee68742ba6d3f56164301f" + "CVE-2017-18221": { + "cmt_msg": "mlock: fix mlock count can not decrease in race condition", + "cmt_id": "00fc586ea7410ee8664bfd4f4ea246c60ea0482c" + }, + "CVE-2017-1000363": { + "cmt_msg": "char: lp: fix possible integer overflow in lp_setup()", + "cmt_id": "d0e929a4e63f5b4a95a7daaf68d3738d1ec06d8c" } }, - "4.4.228": { - "CVE-2019-20810": { - "cmt_msg": "media: go7007: fix a miss of snd_card_free", - "cmt_id": "ce7fcdd544fbc07a2c327d18b0712754cf1557d2" + "4.1.42": { + "CVE-2017-9075": { + "cmt_msg": "sctp: do not inherit ipv6_{mc|ac|fl}_list from parent", + "cmt_id": "e7b4f3d39f46530f340af6eabbc60fbad9f94f05" }, - "CVE-2020-10766": { - "cmt_msg": "x86/speculation: Prevent rogue cross-process SSBD shutdown", - "cmt_id": "37368554eaf7815a3ef3c2cbbd242fc19d3cb32b" + "CVE-2017-9074": { + "cmt_msg": "ipv6: Prevent overrun when parsing v6 header options", + "cmt_id": "e7f05ff30b0cd72b00c8ca7be3cd48fedf96550f" }, - "CVE-2020-10767": { - "cmt_msg": "x86/speculation: Avoid force-disabling IBPB based on STIBP and enhanced IBRS.", - "cmt_id": "317b9c418ea38089a6d5c42fcaa9a545334838c3" + "CVE-2017-1000380": { + "cmt_msg": "ALSA: timer: Fix race between read and ioctl", + "cmt_id": "5d28ba6eecdeb3bbd0f78948ca3470918aad13fa" }, - "CVE-2020-10768": { - "cmt_msg": "x86/speculation: PR_SPEC_FORCE_DISABLE enforcement for indirect branches.", - "cmt_id": "7a5764e8990096fd08e8566b87df3c111bf5a736" - } - }, - "4.4.229": { - "CVE-2020-12771": { - "cmt_msg": "bcache: fix potential deadlock problem in btree_gc_coalesce", - "cmt_id": "9517bec2c1ff8f223f8f2d28c743731e8f216bbe" + "CVE-2017-1000379": { + "cmt_msg": "mm: larger stack guard gap, between vmas", + "cmt_id": "8b18c6b2a0dde5186ed83a60c4915c0909cbeb0a" }, - "CVE-2020-15436": { - "cmt_msg": "block: Fix use-after-free in blkdev_get()", - "cmt_id": "f9aa90e1b8aa2a133d4046223248ab61688445f5" - } - }, - "4.4.230": { - "CVE-2020-15393": { - "cmt_msg": "usb: usbtest: fix missing kfree(dev->buf) in usbtest_disconnect", - "cmt_id": "831eebad70a25f55b5745453ac252d4afe997187" - } - }, - "4.4.232": { - "CVE-2020-15437": { - "cmt_msg": "serial: 8250: fix null-ptr-deref in serial8250_start_tx()", - "cmt_id": "f5e7de4f4232154835f4c3d87e01350457340c16" + "CVE-2017-1000364": { + "cmt_msg": "mm: larger stack guard gap, between vmas", + "cmt_id": "8b18c6b2a0dde5186ed83a60c4915c0909cbeb0a" }, - "CVE-2018-10323": { - "cmt_msg": "xfs: set format back to extents if xfs_bmap_extents_to_btree", - "cmt_id": "f88efa4d6cb1fcacb9591979bacc6c57ec9d7c53" + "CVE-2017-8890": { + "cmt_msg": "dccp/tcp: do not inherit mc_list from parent", + "cmt_id": "4e0ecb773276404a4a0788e1398bee22719336b4" + }, + "CVE-2017-9242": { + "cmt_msg": "ipv6: fix out of bound writes in __ip6_append_data()", + "cmt_id": "d78ddec4e7fb482e27514466ae8a738ef61a9f53" } }, - "4.4.233": { - "CVE-2020-26088": { - "cmt_msg": "net/nfc/rawsock.c: add CAP_NET_RAW check.", - "cmt_id": "de7c8ab8cb412d21ffdac94a99ef2f29f7802fd1" + "4.1.43": { + "CVE-2019-9457": { + "cmt_msg": "exec: Limit arg stack to at most 75% of _STK_LIM", + "cmt_id": "d5e990d96459decaa24e5cb7918451f12c8582a9" }, - "CVE-2019-19054": { - "cmt_msg": "media: rc: prevent memory leak in cx23888_ir_probe", - "cmt_id": "84c9c409286617385e71d4d0d0c9dd940b574469" + "CVE-2018-14634": { + "cmt_msg": "exec: Limit arg stack to at most 75% of _STK_LIM", + "cmt_id": "d5e990d96459decaa24e5cb7918451f12c8582a9" }, - "CVE-2020-25212": { - "cmt_msg": "nfs: Fix getxattr kernel panic and memory overflow", - "cmt_id": "db61fb8278925f54ccb0172471164aeb56ec6537" + "CVE-2017-11089": { + "cmt_msg": "cfg80211: Define nla_policy for NL80211_ATTR_LOCAL_MESH_POWER_MODE", + "cmt_id": "e61d75e0d800c7f4469d391e3598b890be11d95c" }, - "CVE-2019-9445": { - "cmt_msg": "f2fs: check if file namelen exceeds max value", - "cmt_id": "559eff3dca325947bc3d88d17f4c454111884be5" + "CVE-2017-12146": { + "cmt_msg": "driver core: platform: fix race condition with driver_override", + "cmt_id": "5c387e92ec5c6e2d56b19f9ce4ca1cefef38d601" }, - "CVE-2018-13094": { - "cmt_msg": "xfs: don't call xfs_da_shrink_inode with NULL bp", - "cmt_id": "3d5eb8428488648c544e82e6b8b9fd391b107ed9" + "CVE-2016-7915": { + "cmt_msg": "HID: core: prevent out-of-bound readings", + "cmt_id": "f446a5928bc1ea8b6df8abbddd97674f58fe089c" }, - "CVE-2018-8043": { - "cmt_msg": "net: phy: mdio-bcm-unimac: fix potential NULL dereference in unimac_mdio_probe()", - "cmt_id": "52e4b929c3bd6fac2a8cf4c2609d71486bde072c" + "CVE-2017-7482": { + "cmt_msg": "rxrpc: Fix several cases where a padded len isn't checked in ticket decode", + "cmt_id": "84589c8b4819932f41313b7ed4c58881ab466a20" }, - "CVE-2020-16166": { - "cmt_msg": "random32: update the net random state on interrupt and activity", - "cmt_id": "40713057d1d11fc86f0ed02383373281d87841a3" + "CVE-2017-18017": { + "cmt_msg": "netfilter: xt_TCPMSS: add more sanity tests on tcph->doff", + "cmt_id": "a7776b8815a90da464f045f7c24d9565ae9f1963" }, - "CVE-2020-36386": { - "cmt_msg": "Bluetooth: Fix slab-out-of-bounds read in hci_extended_inquiry_result_evt()", - "cmt_id": "491602ede684bb8554254f12f4b1bd242dd15c61" + "CVE-2017-1000365": { + "cmt_msg": "fs/exec.c: account for argv/envp pointers", + "cmt_id": "a9cea2f13c889658769ba50d46cb0e88900e6795" }, - "CVE-2020-14331": { - "cmt_msg": "vgacon: Fix for missing check in scrollback handling", - "cmt_id": "cd44c411a441d994b234605f51f0d1ee5740e353" + "CVE-2017-11176": { + "cmt_msg": "mqueue: fix a use-after-free in sys_mq_notify()", + "cmt_id": "89e4078c6ea15ea65e3d5aa3d72e7913b7b500da" }, - "CVE-2019-19448": { - "cmt_msg": "btrfs: only search for left_info if there is no right_info in try_merge_free_space", - "cmt_id": "b086fe8442d20dbd660812337f152ec868c64c0e" + "CVE-2017-7541": { + "cmt_msg": "brcmfmac: fix possible buffer overflow in brcmf_cfg80211_mgmt_tx()", + "cmt_id": "e080a193465629231466067e4b5d945deaac29d5" }, - "CVE-2019-19074": { - "cmt_msg": "ath9k: release allocated buffer if timed out", - "cmt_id": "94e3650b2568ae7a06e10c282f588ddede5df1d6" + "CVE-2017-1000371": { + "cmt_msg": "binfmt_elf: use ELF_ET_DYN_BASE only for PIE", + "cmt_id": "5bb3ce649f8b42185922d90de13874d23f7ff37f" }, - "CVE-2019-19073": { - "cmt_msg": "ath9k_htc: release allocated buffer if timed out", - "cmt_id": "60fa3632210b1dc99296100227ae2d79ebbb4780" + "CVE-2017-1000370": { + "cmt_msg": "binfmt_elf: use ELF_ET_DYN_BASE only for PIE", + "cmt_id": "5bb3ce649f8b42185922d90de13874d23f7ff37f" } }, - "4.4.234": { - "CVE-2020-14314": { - "cmt_msg": "ext4: fix potential negative array index in do_split()", - "cmt_id": "059b1480105478c5f68cf664301545b8cad6a7cf" + "4.1.44": { + "CVE-2017-1000111": { + "cmt_msg": "packet: fix tp_reserve race in packet_set_ring", + "cmt_id": "b7761b0cd80d832e40a46ec0078ab02596dbc350" }, - "CVE-2020-29371": { - "cmt_msg": "romfs: fix uninitialized memory leak in romfs_dev_read()", - "cmt_id": "2935e0a3cec1ffa558eea90db6279cff83aa3592" + "CVE-2017-8831": { + "cmt_msg": "saa7164: fix double fetch PCIe access condition", + "cmt_id": "0b3294aae7bc3940a659928e352ffb0588dfeb54" }, - "CVE-2020-0466": { - "cmt_msg": "do_epoll_ctl(): clean the failure exits up a bit", - "cmt_id": "d85e2b06662e7f46d0f174ecc603fc1c3554d5cf" - } - }, - "4.4.236": { - "CVE-2020-25285": { - "cmt_msg": "mm/hugetlb: fix a race between hugetlb sysctl handlers", - "cmt_id": "9c9757b4a2cd8039dddc01e8b589d9157f5d756a" + "CVE-2017-11473": { + "cmt_msg": "x86/acpi: Prevent out of bound access caused by broken ACPI tables", + "cmt_id": "424e53f1ee00891001808a1f5dd08a2c7efb9117" }, - "CVE-2020-0465": { - "cmt_msg": "HID: core: Sanitize event code and type when mapping input", - "cmt_id": "de801a7d3228aed8ea2bbfe36ccf3af7f9ef6f39" + "CVE-2017-18079": { + "cmt_msg": "Input: i8042 - fix crash at boot time", + "cmt_id": "6b4a5a2ee0e1cd861bd22b250197589d4b176bd0" }, - "CVE-2022-20565": { - "cmt_msg": "HID: core: Correctly handle ReportSize being zero", - "cmt_id": "12b27c445f2fd4a2e2c49136f26be26635cc1c73" + "CVE-2017-10663": { + "cmt_msg": "f2fs: sanity check checkpoint segno and blkoff", + "cmt_id": "604b43bbfe3bfd023d4cc6a4f9e8760f03346459" }, - "CVE-2021-1048": { - "cmt_msg": "fix regression in \"epoll: Keep a reference on files added to the check list\"", - "cmt_id": "6504c100804870911f074fd67f280756b6805958" + "CVE-2017-7542": { + "cmt_msg": "ipv6: avoid overflow of offset in ip6_find_1stfragopt", + "cmt_id": "0fc2ceadde169a55e531811bf4f0047fedd0a835" } }, - "4.4.237": { - "CVE-2020-25284": { - "cmt_msg": "rbd: require global CAP_SYS_ADMIN for mapping and unmapping", - "cmt_id": "e349a5786f4c23eb11d1e7385703ddbf94f3f061" + "4.1.45": { + "CVE-2017-11600": { + "cmt_msg": "xfrm: policy: check policy direction value", + "cmt_id": "ded415d815a17597d6de4555524f89ed7ea08923" }, - "CVE-2020-14390": { - "cmt_msg": "fbcon: remove soft scrollback code", - "cmt_id": "1f08e80ec5751b8f565139cd7a921fbee46f8a22" + "CVE-2017-14106": { + "cmt_msg": "tcp: initialize rcv_mss to TCP_MIN_MSS instead of 0", + "cmt_id": "ea08a5642d93fd963d376c10c9fd9664373771b6" }, - "CVE-2020-28097": { - "cmt_msg": "vgacon: remove software scrollback support", - "cmt_id": "5f76b4c6ac297ce836abe17f495123f45bfc4fb3" - } - }, - "4.4.238": { - "CVE-2020-25643": { - "cmt_msg": "hdlc_ppp: add range checks in ppp_cp_parse_cr()", - "cmt_id": "a49ef91286776c3f095460112846cd85a063c29a" + "CVE-2017-14340": { + "cmt_msg": "xfs: XFS_IS_REALTIME_INODE() should be false if no rt device present", + "cmt_id": "d8f0ead1e72bcc040a858ddf5d1de0a9d6cce8ca" }, - "CVE-2021-0605": { - "cmt_msg": "af_key: pfkey_dump needs parameter validation", - "cmt_id": "831587619afe78cd72651b34a0f6ccb2acf3c503" - } - }, - "4.4.239": { - "CVE-2020-25211": { - "cmt_msg": "netfilter: ctnetlink: add a range check for l3/l4 protonum", - "cmt_id": "3f5bfa0a2c3401bfbc0cab5894df8262de619641" + "CVE-2017-1000251": { + "cmt_msg": "Bluetooth: Properly check L2CAP config option output buffer length", + "cmt_id": "361e3cc44419cb9387c48ea993d0ba3f381667de" }, - "CVE-2021-0448": { - "cmt_msg": "netfilter: ctnetlink: add a range check for l3/l4 protonum", - "cmt_id": "3f5bfa0a2c3401bfbc0cab5894df8262de619641" + "CVE-2017-0627": { + "cmt_msg": "media: uvcvideo: Prevent heap overflow when accessing mapped controls", + "cmt_id": "1e3bbc18904041cd230725cf711e12a888efa49f" }, - "CVE-2021-39634": { - "cmt_msg": "epoll: do not insert into poll queues until all sanity checks are done", - "cmt_id": "ea984dfe0e7978cd294eb6a640ac27fa1834ac8d" + "CVE-2018-10675": { + "cmt_msg": "mm/mempolicy: fix use after free when calling get_mempolicy", + "cmt_id": "fd30faeaf0f5163356ec053ba9eb1d3b7923062c" }, - "CVE-2020-28915": { - "cmt_msg": "fbcon: Fix global-out-of-bounds read in fbcon_get_font()", - "cmt_id": "0e3e69e0a8bc516e37ee3b496779b60e660b5ea5" - } - }, - "4.4.240": { - "CVE-2020-10135": { - "cmt_msg": "Bluetooth: Consolidate encryption handling in hci_encrypt_cfm", - "cmt_id": "554ab8c6e143606bb205c7d694656fac3d6e3cc2" + "CVE-2017-14991": { + "cmt_msg": "scsi: sg: fixup infoleak when using SG_GET_REQUEST_TABLE", + "cmt_id": "68fa36ad00f522ff6bab272247b3bd28c1959f33" }, - "CVE-2020-12352": { - "cmt_msg": "Bluetooth: A2MP: Fix not initializing all members", - "cmt_id": "e7b465bda9b90bec5427775bcbbfc47fe7a6012b" - } - }, - "4.4.241": { - "CVE-2020-27784": { - "cmt_msg": "usb: gadget: function: printer: fix use-after-free in __lock_acquire", - "cmt_id": "25c95c6bd4dc50a3c20de0fa7f450ea02b2320fc" + "CVE-2017-14051": { + "cmt_msg": "scsi: qla2xxx: Fix an integer overflow in sysfs code", + "cmt_id": "d1c2fe7dc88d9bc3a477d9dfc2aa623f9776372e" }, - "CVE-2020-25705": { - "cmt_msg": "icmp: randomize the global rate limiter", - "cmt_id": "a9d0ba6aa7485aabed7b8f2ed5a3975684847e0b" + "CVE-2017-9985": { + "cmt_msg": "ALSA: msnd: Optimize / harden DSP and MIDI loops", + "cmt_id": "77425f99e279723ed8bccd0905ba415ab803ad8d" + }, + "CVE-2017-9984": { + "cmt_msg": "ALSA: msnd: Optimize / harden DSP and MIDI loops", + "cmt_id": "77425f99e279723ed8bccd0905ba415ab803ad8d" } }, - "4.4.242": { - "CVE-2020-28974": { - "cmt_msg": "vt: Disable KD_FONT_OP_COPY", - "cmt_id": "81f26642406c16bf52015683511c814ecbe2abc3" + "4.1.46": { + "CVE-2017-0786": { + "cmt_msg": "brcmfmac: add length check in brcmf_cfg80211_escan_handler()", + "cmt_id": "90747f38a8873726d7efd81112967147098a2139" }, - "CVE-2020-25668": { - "cmt_msg": "tty: make FONTX ioctl use the tty pointer they were actually passed", - "cmt_id": "e847c4e2ccc80295338cc96136aec2877be82359" + "CVE-2017-18270": { + "cmt_msg": "KEYS: prevent creating a different user's keyrings", + "cmt_id": "a50a0faa10c6d83ba4a16c4d6245e90000e2f02d" }, - "CVE-2020-25656": { - "cmt_msg": "vt: keyboard, extend func_buf_lock to readers", - "cmt_id": "f4cfdf9b1487d3512da27a1a542b4c33a4737bca" + "CVE-2017-16529": { + "cmt_msg": "ALSA: usb-audio: Check out-of-bounds access by corrupted buffer descriptor", + "cmt_id": "b01117b7bc02923baebcff895609561c78559c08" }, - "CVE-2020-35508": { - "cmt_msg": "fork: fix copy_process(CLONE_PARENT) race with the exiting ->real_parent", - "cmt_id": "33175e2d8fdf7b07be9691ee7747a3982dcf52cd" - } - }, - "4.4.243": { - "CVE-2020-8694": { - "cmt_msg": "powercap: restrict energy meter to root access", - "cmt_id": "ed3691aa7e4ad0a987da49b9165a22255b39e9b7" - } - }, - "4.4.244": { - "CVE-2020-14351": { - "cmt_msg": "perf/core: Fix race in the perf_mmap_close() function", - "cmt_id": "17b235e6cc9d701a2eece74a64f89062072b81b1" + "CVE-2017-16535": { + "cmt_msg": "USB: core: fix out-of-bounds access bug in usb_get_bos_descriptor()", + "cmt_id": "e4e541386c2e0221a2325fc83b18ddf683db1f29" }, - "CVE-2020-25645": { - "cmt_msg": "geneve: add transport ports in route lookup for geneve", - "cmt_id": "e98bcb65299870dfa98d2067d423da80555188c4" + "CVE-2017-16531": { + "cmt_msg": "USB: fix out-of-bounds in usb_set_configuration", + "cmt_id": "de5ffcc63dbdaffffd93934003fd527673f4da0a" }, - "CVE-2020-0427": { - "cmt_msg": "pinctrl: devicetree: Avoid taking direct reference to device name string", - "cmt_id": "03f69244302d7954f42f528ea2d45903ebbf59f3" + "CVE-2017-16530": { + "cmt_msg": "USB: uas: fix bug in handling of alternate settings", + "cmt_id": "0078c8c1a6819a8badf212df782e090559055241" }, - "CVE-2020-27673": { - "cmt_msg": "xen/events: add a proper barrier to 2-level uevent unmasking", - "cmt_id": "33f38ccfe479fdb53bf0409e9b74e993e30d4d1f" + "CVE-2017-16533": { + "cmt_msg": "HID: usbhid: fix out-of-bounds bug", + "cmt_id": "439f76690d7d5dd212ea7bebc1f2fa077e3d645d" }, - "CVE-2019-0148": { - "cmt_msg": "i40e: Wrong truncation from u16 to u8", - "cmt_id": "0f60ed1afff42f84dcba5a7950ee8712da8363d5" + "CVE-2018-9568": { + "cmt_msg": "net: Set sk_prot_creator when cloning sockets to the right proto", + "cmt_id": "0a11ea32304f6ad6daf5589b6626775b7f00015c" }, - "CVE-2020-27675": { - "cmt_msg": "xen/events: avoid removing an event channel while handling it", - "cmt_id": "c0e77192829a1a02983d672ac144e6196098cad7" - } - }, - "4.4.245": { - "CVE-2018-13093": { - "cmt_msg": "xfs: validate cached inodes are free when allocated", - "cmt_id": "f17ef9beebc7c55c5a791aacdc5992880ea15d8c" + "CVE-2017-15265": { + "cmt_msg": "ALSA: seq: Fix use-after-free at creating a port", + "cmt_id": "507bb1c783c2edc4ea481a6eab7a6d2d88627624" }, - "CVE-2020-25669": { - "cmt_msg": "Input: sunkbd - avoid use-after-free in teardown paths", - "cmt_id": "640ede0a21a0b9bd68e47ccbca87fd747e38ea0a" + "CVE-2017-14156": { + "cmt_msg": "video: fbdev: aty: do not leak uninitialized padding in clk to userspace", + "cmt_id": "92153256b2429e23a4f736cd1eab8dc18ad9883e" }, - "CVE-2020-4788": { - "cmt_msg": "powerpc/64s: flush L1D on kernel entry", - "cmt_id": "4a1e90af718d1489ffcecc8f52486c4f5dc0f7a6" - } - }, - "4.4.247": { - "CVE-2019-19813": { - "cmt_msg": "btrfs: inode: Verify inode mode to avoid NULL pointer dereference", - "cmt_id": "d4d0b4f942fed5d5b69effe200c1df6108483385" + "CVE-2017-15299": { + "cmt_msg": "KEYS: don't let add_key() update an uninstantiated key", + "cmt_id": "7aeb11ac706537b29b704c344572c3f9ac908389" }, - "CVE-2019-19816": { - "cmt_msg": "btrfs: inode: Verify inode mode to avoid NULL pointer dereference", - "cmt_id": "d4d0b4f942fed5d5b69effe200c1df6108483385" - } - }, - "4.4.248": { - "CVE-2020-29661": { - "cmt_msg": "tty: Fix ->pgrp locking in tiocspgrp()", - "cmt_id": "30f7752609a8030862f4c7faed5c845e2aa300be" + "CVE-2017-16525": { + "cmt_msg": "USB: serial: console: fix use-after-free after failed setup", + "cmt_id": "42651349f0207b8ba3b80b5bd868d9872fbcc6c1" }, - "CVE-2020-29660": { - "cmt_msg": "tty: Fix ->session locking", - "cmt_id": "7b4a4b9403c52343d00901babc3987588bc0b085" + "CVE-2017-12193": { + "cmt_msg": "assoc_array: Fix a buggy node-splitting case", + "cmt_id": "34a5c6ecc7ae4470cc6f415cbc3c5b97c15023fe" }, - "CVE-2020-35519": { - "cmt_msg": "net/x25: prevent a couple of overflows", - "cmt_id": "3cb72fe7ac64d5f647dbefd94ce7b54f6b92ede9" - } - }, - "4.4.249": { - "CVE-2020-27815": { - "cmt_msg": "jfs: Fix array index bounds check in dbAdjTree", - "cmt_id": "b01bec9ec3b196a8a33d0d68991c8a45c8c24551" + "CVE-2017-12192": { + "cmt_msg": "KEYS: prevent KEYCTL_READ on negative key", + "cmt_id": "f6df8c11a4c89da683a46505aac8a31fe98f5339" }, - "CVE-2020-29568": { - "cmt_msg": "xen/xenbus: Allow watches discard events before queueing", - "cmt_id": "de66402f45c0cae9566b1568cc1b2df2b5ccbbf8" - } - }, - "4.4.250": { - "CVE-2020-36158": { - "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_cmd_802_11_ad_hoc_start", - "cmt_id": "878ba6234c5827722d79767d39450340e228ce86" - } - }, - "4.4.252": { - "CVE-2020-28374": { - "cmt_msg": "scsi: target: Fix XCOPY NAA identifier lookup", - "cmt_id": "87be50177ddb789330e6c5ddcc2f301cec0017dc" - } - }, - "4.4.253": { - "CVE-2021-3178": { - "cmt_msg": "nfsd4: readdirplus shouldn't return parent of export", - "cmt_id": "c89b2b56fc536d4fd41745bcbf394aa21162e277" - } - }, - "4.4.254": { - "CVE-2020-27825": { - "cmt_msg": "tracing: Fix race in trace_open and buffer resize call", - "cmt_id": "a7c2dd4438056fb665a376860242463a30f2d2e8" + "CVE-2017-12190": { + "cmt_msg": "fix unbalanced page refcounting in bio_map_user_iov", + "cmt_id": "97c0249ef452b3ac850b812948dd992b37cdbd46" }, - "CVE-2021-39657": { - "cmt_msg": "scsi: ufs: Correct the LUN used in eh_device_reset_handler() callback", - "cmt_id": "a4cdbf4805bfed8f39e6b25f113588064d9a6ac5" - } - }, - "4.4.258": { - "CVE-2021-26931": { - "cmt_msg": "xen-blkback: don't \"handle\" error by BUG()", - "cmt_id": "74e38b7a6972fd6983e6fbd929b65746ce975aed" + "CVE-2017-16526": { + "cmt_msg": "uwb: properly check kthread_run return value", + "cmt_id": "bd2ec3b5dd378b6d156d6b200faba82f9f087b16" }, - "CVE-2021-26930": { - "cmt_msg": "xen-blkback: fix error handling in xen_blkbk_map()", - "cmt_id": "2e6cc64b7b56e5c2d2c01de8ff1b3986342c2b18" + "CVE-2017-16527": { + "cmt_msg": "ALSA: usb-audio: Kill stray URB at exiting", + "cmt_id": "44084551aa36a8f3899cc7e73c52846560d8de6a" }, - "CVE-2021-26932": { - "cmt_msg": "Xen/x86: don't bail early from clear_foreign_p2m_mapping()", - "cmt_id": "15b6ca2cef13f06ef41d9ebc094ef7770fd98ab3" - } - }, - "4.4.259": { - "CVE-2021-0512": { - "cmt_msg": "HID: make arrays usage and value to be the same", - "cmt_id": "795a8c31cabf1a452b0b63bb3f8d9159b353e5ce" + "CVE-2020-14353": { + "cmt_msg": "KEYS: prevent creating a different user's keyrings", + "cmt_id": "a50a0faa10c6d83ba4a16c4d6245e90000e2f02d" }, - "CVE-2021-3612": { - "cmt_msg": "Input: joydev - prevent potential read overflow in ioctl", - "cmt_id": "ade5180681d778d36b569ad35cc175ab22196c5f" - } - }, - "4.4.260": { - "CVE-2021-30002": { - "cmt_msg": "media: v4l: ioctl: Fix memory leak in video_usercopy", - "cmt_id": "432b08869893ebd751e815465b822bb99cf710e7" + "CVE-2017-15649": { + "cmt_msg": "packet: in packet_do_bind, test fanout with bind_lock held", + "cmt_id": "cafd2b53da565ca30c48a146635c95d385d83b81" }, - "CVE-2021-27365": { - "cmt_msg": "scsi: iscsi: Ensure sysfs attributes are limited to PAGE_SIZE", - "cmt_id": "b8a757b57ba3e27d6399106a78350af513fb0bb5" + "CVE-2017-12153": { + "cmt_msg": "nl80211: check for the required netlink attributes presence", + "cmt_id": "621e000d660bfe0311ab38c8d2b1a778dee45ae3" }, - "CVE-2021-27364": { - "cmt_msg": "scsi: iscsi: Restrict sessions and handles to admin capabilities", - "cmt_id": "67c6818821a39fb50e1b84e7259aee5298d2c512" + "CVE-2017-12154": { + "cmt_msg": "kvm: nVMX: Don't allow L2 to access the hardware CR8", + "cmt_id": "e480290da7987e37be86140792640f42b84e915b" }, - "CVE-2021-27363": { - "cmt_msg": "scsi: iscsi: Restrict sessions and handles to admin capabilities", - "cmt_id": "67c6818821a39fb50e1b84e7259aee5298d2c512" + "CVE-2017-14489": { + "cmt_msg": "scsi: scsi_transport_iscsi: fix the issue that iscsi_if_rx doesn't parse nlmsg properly", + "cmt_id": "74fbce9bea7351161fb5864e2fc31c02145fcab7" }, - "CVE-2021-28038": { - "cmt_msg": "Xen/gnttab: handle p2m update errors on a per-slot basis", - "cmt_id": "f2c9673ce689801ef3bee517013b0c9b94dd14fa" + "CVE-2017-16643": { + "cmt_msg": "Input: gtco - fix potential out-of-bound access", + "cmt_id": "500f156985a31f47a2eadb5b709b245af4c3a05b" } }, - "4.4.262": { - "CVE-2019-19060": { - "cmt_msg": "iio: imu: adis16400: release allocated memory on failure", - "cmt_id": "00552ca5cae5e86311df6cfd5911213c89ece4e2" + "4.1.47": { + "CVE-2017-13080": { + "cmt_msg": "mac80211: accept key reinstall without changing anything", + "cmt_id": "003aa22c9619b49efe950aca3aebd1235a04940d" }, - "CVE-2019-19061": { - "cmt_msg": "iio: imu: adis16400: fix memory leak", - "cmt_id": "7671c44edfd0411c7411266f0c90dd21b535c3d4" + "CVE-2017-18204": { + "cmt_msg": "ocfs2: should wait dio before inode lock in ocfs2_setattr()", + "cmt_id": "1a4fecae70240a7f41615a20d8e5982f833b7268" }, - "CVE-2021-28660": { - "cmt_msg": "staging: rtl8188eu: prevent ->ssid overflow in rtw_wx_set_scan()", - "cmt_id": "36f8d0af46daf6eb4c7c5edf6adbfa02e9c70f92" + "CVE-2017-16532": { + "cmt_msg": "usb: usbtest: fix NULL pointer dereference", + "cmt_id": "b3c0b63e11eda6ef786fc35e0126e6e5ff828913" }, - "CVE-2021-20261": { - "cmt_msg": "floppy: fix lock_fdc() signal handling", - "cmt_id": "b93c6b400ed51e526e724b430a115293fd147466" + "CVE-2017-10911": { + "cmt_msg": "xen-blkback: don't leak stack data via response ring", + "cmt_id": "516e503b7e1ea541ea3eac082ad1ee165ca6756a" }, - "CVE-2021-29265": { - "cmt_msg": "usbip: fix stub_dev usbip_sockfd_store() races leading to gpf", - "cmt_id": "9ee196f307ec006cac386a0d8b7935dd2ccd0083" + "CVE-2017-16537": { + "cmt_msg": "media: imon: Fix null-ptr-deref in imon_probe", + "cmt_id": "95dba59e4def2ccef608665ed2439e1f8ff38799" }, - "CVE-2019-16232": { - "cmt_msg": "libertas: fix a potential NULL pointer dereference", - "cmt_id": "3b431b60940fa2cda06d6b4906e11acd222d471a" - } - }, - "4.4.263": { - "CVE-2021-28964": { - "cmt_msg": "btrfs: fix race when cloning extent buffer during rewind of an old root", - "cmt_id": "2922e2e894781c36ce014935f05163287635609c" + "CVE-2017-16528": { + "cmt_msg": "ALSA: seq: Cancel pending autoload work at unbinding device", + "cmt_id": "c617803955ec5ec9a0310e76e34e4e03e02ca803" }, - "CVE-2021-28972": { - "cmt_msg": "PCI: rpadlpar: Fix potential drc_name corruption in store functions", - "cmt_id": "4639466722c2ea832bc145c06cd5aa2012db9102" - } - }, - "4.4.264": { - "CVE-2021-28688": { - "cmt_msg": "xen-blkback: don't leak persistent grants from xen_blkbk_map()", - "cmt_id": "47b6b2742ee60334c40d75bfaab49028688f1510" - } - }, - "4.4.265": { - "CVE-2021-3483": { - "cmt_msg": "firewire: nosy: Fix a use-after-free bug in nosy_ioctl()", - "cmt_id": "63d8737a59ae58e5c2d5fd640c294e7b5bb1d394" - } - }, - "4.4.266": { - "CVE-2021-29154": { - "cmt_msg": "bpf, x86: Validate computation of branch displacements for x86-64", - "cmt_id": "ca97582a3fe79543de8e5905e829c5ad3661a1ef" - } - }, - "4.4.267": { - "CVE-2021-3659": { - "cmt_msg": "net: mac802154: Fix general protection fault", - "cmt_id": "cd19d85e6d4a361beb11431af3d22248190f5b48" + "CVE-2017-16646": { + "cmt_msg": "media: dib0700: fix invalid dvb_detach argument", + "cmt_id": "10e6847a353761dbd0c710feed6c530c3a5f62af" }, - "CVE-2021-0937": { - "cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write", - "cmt_id": "b0d98b2193a38ef93c92e5e1953d134d0f426531" + "CVE-2017-16645": { + "cmt_msg": "Input: ims-psu - check if CDC union descriptor is sane", + "cmt_id": "84513107dc8602c675ec871b616128b49c6e259e" }, - "CVE-2020-25672": { - "cmt_msg": "nfc: fix memory leak in llcp_sock_connect()", - "cmt_id": "7ed6c0c7db2099792768150c070efca71e85bdf3" + "CVE-2018-7191": { + "cmt_msg": "tun: call dev_get_valid_name() before register_netdevice()", + "cmt_id": "9bcd3577312ffa7e52b42e94ef3cf74d06e7b42f" }, - "CVE-2020-25673": { - "cmt_msg": "nfc: Avoid endless loops caused by repeated llcp_sock_connect()", - "cmt_id": "7f6c9e4314aa7d90b6261b8ae571d14c454ba964" + "CVE-2017-16994": { + "cmt_msg": "mm/pagewalk.c: report holes in hugetlb ranges", + "cmt_id": "610622cac573aef67811fbffc865d9fba1611050" }, - "CVE-2020-25670": { - "cmt_msg": "nfc: fix refcount leak in llcp_sock_bind()", - "cmt_id": "a1cdd18c49d23ec38097ac2c5b0d761146fc0109" + "CVE-2017-16650": { + "cmt_msg": "net: qmi_wwan: fix divide by 0 on bad descriptors", + "cmt_id": "8e3bc0d48890704abdac3d5e0eb81ebc599cb921" }, - "CVE-2020-25671": { - "cmt_msg": "nfc: fix refcount leak in llcp_sock_connect()", - "cmt_id": "a524eabb5e309e49ee2d8422a771c5cedef003c4" + "CVE-2017-7518": { + "cmt_msg": "KVM: x86: fix singlestepping over syscall", + "cmt_id": "c39c42d6c9291e3541cffee226b028961d35a9fb" }, - "CVE-2021-22555": { - "cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write", - "cmt_id": "b0d98b2193a38ef93c92e5e1953d134d0f426531" + "CVE-2017-15115": { + "cmt_msg": "sctp: do not peel off an assoc from one netns to another one", + "cmt_id": "e33c3b35af697c34d89086580386c768ca038623" } }, - "4.4.269": { - "CVE-2021-33034": { - "cmt_msg": "Bluetooth: verify AMP hci_chan before amp_destroy", - "cmt_id": "b27a218d166b7f07cd5616fb90e727b6ed662b1a" + "4.1.48": { + "CVE-2017-16939": { + "cmt_msg": "ipsec: Fix aborted xfrm policy dump crash", + "cmt_id": "5e80f6036c71f6ce1dbba0ad2925c331767f76ac" }, - "CVE-2017-0605": { - "cmt_msg": "tracing: Use strlcpy() instead of strcpy() in __trace_find_cmdline()", - "cmt_id": "150381302389fa01425396489a21dc7c53383a5b" + "CVE-2017-18208": { + "cmt_msg": "mm/madvise.c: fix madvise() infinite loop under special circumstances", + "cmt_id": "83c85849819bd60f2806b079a01f283f8ae27f37" }, - "CVE-2021-31916": { - "cmt_msg": "dm ioctl: fix out of bounds array access when no devices", - "cmt_id": "0c0f93fbd20276d65ae0581edfcdc93579aa1dc7" + "CVE-2017-18203": { + "cmt_msg": "dm: fix race between dm_get_from_kobject() and __dm_destroy()", + "cmt_id": "48e57f6ddb74d12b71b6edbf15ba4c94035caa02" }, - "CVE-2021-4157": { - "cmt_msg": "pNFS/flexfiles: fix incorrect size check in decode_nfs_fh()", - "cmt_id": "0c5ccd5e2a2e291774618c24c459fa397fd1b7da" + "CVE-2017-16536": { + "cmt_msg": "cx231xx-cards: fix NULL-deref on missing association descriptor", + "cmt_id": "ee16c9ea4ef98684378e020df9a4efa32955d767" + }, + "CVE-2017-1000405": { + "cmt_msg": "mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d()", + "cmt_id": "88c251ffb80e140339cbe74f320d6cba38360ab5" } }, - "4.4.270": { - "CVE-2020-26558": { - "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical", - "cmt_id": "75523bbfb0eaead670c97fbcf096ca2ab556f0c0" + "4.1.49": { + "CVE-2017-0861": { + "cmt_msg": "ALSA: pcm: prevent UAF in snd_pcm_info", + "cmt_id": "0bde6f9d1faf3d4aaf8346d8a326cf02e7ea1a3a" }, - "CVE-2021-0129": { - "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical", - "cmt_id": "75523bbfb0eaead670c97fbcf096ca2ab556f0c0" + "CVE-2017-2636": { + "cmt_msg": "tty: n_hdlc: get rid of racy n_hdlc.tbuf", + "cmt_id": "209fd3f3ef14e0b0a1d07d6ff27d75c49e656e84" }, - "CVE-2020-26555": { - "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical", - "cmt_id": "75523bbfb0eaead670c97fbcf096ca2ab556f0c0" - } - }, - "4.4.271": { - "CVE-2020-24587": { - "cmt_msg": "mac80211: prevent mixed key and fragment cache attacks", - "cmt_id": "229fa01b0bd72559e5c5b99e402f180e47ad86a8" + "CVE-2017-7184": { + "cmt_msg": "xfrm_user: validate XFRM_MSG_NEWAE XFRMA_REPLAY_ESN_VAL replay_window", + "cmt_id": "438db92d7f2792e3bad17be70e6edf0f44a081f0" }, - "CVE-2020-24586": { - "cmt_msg": "mac80211: prevent mixed key and fragment cache attacks", - "cmt_id": "229fa01b0bd72559e5c5b99e402f180e47ad86a8" + "CVE-2018-7492": { + "cmt_msg": "rds: Fix NULL pointer dereference in __rds_rdma_map", + "cmt_id": "dcd241dca9507cf4b3980505e2482ed6aba347b5" }, - "CVE-2021-34981": { - "cmt_msg": "Bluetooth: cmtp: fix file refcount when cmtp_attach_device fails", - "cmt_id": "61a811e8f5229264b822361f8b23d7638fd8c914" + "CVE-2017-1000407": { + "cmt_msg": "KVM: VMX: remove I/O port 0x80 bypass on Intel hosts", + "cmt_id": "6552b7695ca65e6ca412948d4aa0179df69dbc1d" }, - "CVE-2020-24588": { - "cmt_msg": "cfg80211: mitigate A-MSDU aggregation attacks", - "cmt_id": "daea7ff51861cec93ff7f561095d9048b673b51f" + "CVE-2017-16914": { + "cmt_msg": "usbip: fix stub_send_ret_submit() vulnerability to null transfer_buffer", + "cmt_id": "5319d08ca465eec277d04b5a3cee34f80b601c74" }, - "CVE-2020-26139": { - "cmt_msg": "mac80211: do not accept/forward invalid EAPOL frames", - "cmt_id": "e3d4030498c304d7c36bccc6acdedacf55402387" + "CVE-2017-17558": { + "cmt_msg": "USB: core: prevent malicious bNumInterfaces overflow", + "cmt_id": "5b2323b62af18be000ef627f302b5bf167402de6" }, - "CVE-2020-26147": { - "cmt_msg": "mac80211: assure all fragments are encrypted", - "cmt_id": "16cbc9756dd84e870867f003a200553931dd461b" + "CVE-2017-15274": { + "cmt_msg": "KEYS: fix dereferencing NULL payload with nonzero length", + "cmt_id": "c19aa530105b0d780ad72a78a7ef271037bcb774" }, - "CVE-2021-29650": { - "cmt_msg": "netfilter: x_tables: Use correct memory barriers.", - "cmt_id": "9bc6c1246941cf88cf06a27153d6a1108a240067" + "CVE-2017-6348": { + "cmt_msg": "irda: Fix lockdep annotations in hashbin_delete().", + "cmt_id": "c9556862a64b5ac85bfee1cfd4313615dc21d6f8" }, - "CVE-2021-32399": { - "cmt_msg": "bluetooth: eliminate the potential race condition when removing the HCI controller", - "cmt_id": "a7dc1c981038bbd5f7379148d7fd8821d2a7b9ae" - } - }, - "4.4.272": { - "CVE-2021-3564": { - "cmt_msg": "Bluetooth: fix the erroneous flush_work() order", - "cmt_id": "054b0b4f9bf86baac0774e1ea38f4b65497089e5" + "CVE-2017-17806": { + "cmt_msg": "crypto: hmac - require that the underlying hash algorithm is unkeyed", + "cmt_id": "bd7f57da8fff9b75204d6dd2b3ac6a30a6430a5c" }, - "CVE-2021-38208": { - "cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect", - "cmt_id": "eb6875d48590d8e564092e831ff07fa384d7e477" + "CVE-2017-6345": { + "cmt_msg": "net/llc: avoid BUG_ON() in skb_orphan()", + "cmt_id": "4fc8ff15e26ecfe974b7a3f386550bcfd259b8b1" }, - "CVE-2021-3573": { - "cmt_msg": "Bluetooth: use correct lock to prevent UAF of hdev object", - "cmt_id": "2260759b5300865dc209150e925aaeb9df758630" + "CVE-2017-6346": { + "cmt_msg": "packet: fix races in fanout_add()", + "cmt_id": "7babaac5d49ee7a88a5a324668dd13b575635d09" }, - "CVE-2021-3587": { - "cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect", - "cmt_id": "eb6875d48590d8e564092e831ff07fa384d7e477" + "CVE-2017-17805": { + "cmt_msg": "crypto: salsa20 - fix blkcipher_walk API usage", + "cmt_id": "bbda4c57b91619642a94b193531312fe01bc2398" } }, - "4.4.274": { - "CVE-2021-34693": { - "cmt_msg": "can: bcm: fix infoleak in struct bcm_msg_head", - "cmt_id": "f638caa211e7a121a5596986d29ebbdaf9156398" + "4.1.50": { + "CVE-2018-7566": { + "cmt_msg": "ALSA: seq: Fix racy pool initializations", + "cmt_id": "e78748b40e887c6e544dab71653858c370e283ea" }, - "CVE-2021-45486": { - "cmt_msg": "inet: use bigger hash table for IP ID generation", - "cmt_id": "8fb8c138b5d69128964e54e1b5ee49fc395f011c" - } - }, - "4.4.276": { - "CVE-2021-45485": { - "cmt_msg": "ipv6: use prandom_u32() for ID generation", - "cmt_id": "c43fa9ee9f1de295474a28903607f84209d7e611" + "CVE-2018-5750": { + "cmt_msg": "ACPI: sbshc: remove raw pointer from printk() message", + "cmt_id": "4e5d88a911f6c610afe11b36c9b3b36f8928daf7" }, - "CVE-2022-0850": { - "cmt_msg": "ext4: fix kernel infoleak via ext4_extent_header", - "cmt_id": "ce14bff239a107344b153bd6504a2f8165f672e9" + "CVE-2016-9793": { + "cmt_msg": "net: avoid signed overflows for SO_{SND|RCV}BUFFORCE", + "cmt_id": "f99fb439e6aff4e9f8b91a80d48b2a2d97aa2248" }, - "CVE-2023-28772": { - "cmt_msg": "seq_buf: Fix overflow in seq_buf_putmem_hex()", - "cmt_id": "7ad5c2f4dff68a00d24f0692e027b99c7231b995" + "CVE-2018-5873": { + "cmt_msg": "nsfs: mark dentry with DCACHE_RCUACCESS", + "cmt_id": "2ce8a62d862e3bcd16d12d6d7d71c0a343f4f99a" }, - "CVE-2021-3609": { - "cmt_msg": "can: bcm: delay release of struct bcm_op after synchronize_rcu()", - "cmt_id": "9c47fa9295ce58433cae4376240b738b126637d4" + "CVE-2017-17741": { + "cmt_msg": "KVM: Fix stack-out-of-bounds read in write_mmio", + "cmt_id": "bec1dbb0f0a93d5eb9d6b2741ead4156408d8150" }, - "CVE-2021-33909": { - "cmt_msg": "seq_file: disallow extremely large seq buffer allocations", - "cmt_id": "3533e50cbee8ff086bfa04176ac42a01ee3db37d" + "CVE-2017-1000410": { + "cmt_msg": "Bluetooth: Prevent stack info leak from the EFS element.", + "cmt_id": "395cba875fa35b1a23d2bd1951c555d3d0a5d5be" }, - "CVE-2021-38160": { - "cmt_msg": "virtio_console: Assure used length from device is limited", - "cmt_id": "187f14fb88a9e62d55924748a274816fe6f34de6" - } - }, - "4.4.277": { - "CVE-2021-38204": { - "cmt_msg": "usb: max-3421: Prevent corruption of freed memory", - "cmt_id": "fc2a7c2280fa2be8ff9b5af702368fcd49a0acdb" + "CVE-2017-16538": { + "cmt_msg": "media: dvb-usb-v2: lmedm04: Improve logic checking of warm start", + "cmt_id": "596a157dfeef68f30e38d3a38e21b9d4d4c6b644" }, - "CVE-2021-3679": { - "cmt_msg": "tracing: Fix bug in rb_per_cpu_empty() that might cause deadloop.", - "cmt_id": "afa091792525dfa6c3c854069ec6b8a5ccc62c11" + "CVE-2018-5333": { + "cmt_msg": "RDS: null pointer dereference in rds_atomic_free_op", + "cmt_id": "ad99858fa14a888b77dc2095f412e443639f953c" }, - "CVE-2021-37576": { - "cmt_msg": "KVM: PPC: Book3S: Fix H_RTAS rets buffer overflow", - "cmt_id": "1e90a673f6ee09c668fe01aa1b94924f972c9811" - } - }, - "4.4.278": { - "CVE-2021-0920": { - "cmt_msg": "af_unix: fix garbage collect vs MSG_PEEK", - "cmt_id": "72247f34d90e25c1493436e45e193e8306082b19" + "CVE-2018-5332": { + "cmt_msg": "RDS: Heap OOB write in rds_message_alloc_sgs()", + "cmt_id": "4b1ffce255006f1220fce0f24772b9563ed91088" }, - "CVE-2021-21781": { - "cmt_msg": "ARM: ensure the signal page contains defined contents", - "cmt_id": "8db77dca7e1d1d1d6aa9334207ead57853832bb7" - } - }, - "4.4.281": { - "CVE-2021-38205": { - "cmt_msg": "net: xilinx_emaclite: Do not print real IOMEM pointer", - "cmt_id": "3d4ba14fc5ffbe5712055af09a5c0cbab93c0f44" + "CVE-2017-13216": { + "cmt_msg": "staging: android: ashmem: fix a race condition in ASHMEM_SET_SIZE ioctl", + "cmt_id": "700dbec6cafafbe5e018a90e8e92a4762c19884d" }, - "CVE-2021-3732": { - "cmt_msg": "ovl: prevent private clone if bind mount is not allowed", - "cmt_id": "c6e8810d25295acb40a7b69ed3962ff181919571" - } - }, - "4.4.282": { - "CVE-2021-3653": { - "cmt_msg": "KVM: nSVM: avoid picking up unsupported bits from L2 in int_ctl (CVE-2021-3653)", - "cmt_id": "53723b7be26ef31ad642ce5ffa8b42dec16db40e" + "CVE-2017-17448": { + "cmt_msg": "netfilter: nfnetlink_cthelper: Add missing permission checks", + "cmt_id": "6d752a482cf7ce18ca96abaf0a159e801d4c38e8" }, - "CVE-2021-42008": { - "cmt_msg": "net: 6pack: fix slab-out-of-bounds in decode_data", - "cmt_id": "d66736076bd84742c18397785476e9a84d5b54ef" - } - }, - "4.4.283": { - "CVE-2021-3753": { - "cmt_msg": "vt_kdsetmode: extend console locking", - "cmt_id": "01da584f08cbb1e04f22796cc49b10d570cd5ec1" - } - }, - "4.4.284": { - "CVE-2022-20141": { - "cmt_msg": "igmp: Add ip_mc_list lock in ip_check_mc_rcu", - "cmt_id": "b24065948ae6c48c9e20891f8cfe9850f1d748be" + "CVE-2017-17449": { + "cmt_msg": "netlink: Add netns check on taps", + "cmt_id": "e85c6629ac5fbef352ced9925d264965ebacdf20" }, - "CVE-2021-40490": { - "cmt_msg": "ext4: fix race writing to an inline_data file while its xattrs are changing", - "cmt_id": "69d82df68fbc5e368820123200d7b88f6c058350" + "CVE-2017-18344": { + "cmt_msg": "posix-timer: Properly check sigevent->sigev_notify", + "cmt_id": "16cd05f25489459d10035ffab9cb7391512f1437" }, - "CVE-2020-3702": { - "cmt_msg": "ath: Use safer key clearing with key cache entries", - "cmt_id": "4d6b4335838fd89419212e1e486c415ec36fb610" - } - }, - "4.4.285": { - "CVE-2021-20320": { - "cmt_msg": "s390/bpf: Fix optimizing out zero-extensions", - "cmt_id": "a738597a79e588bcf9817d4ec12740c99842db3b" + "CVE-2018-1000028": { + "cmt_msg": "nfsd: auth: Fix gid sorting when rootsquash enabled", + "cmt_id": "48978a7cb8586c49875ccbc6d243c880e4cbaf44" }, - "CVE-2021-3655": { - "cmt_msg": "sctp: validate from_addr_param return", - "cmt_id": "c299c5925ab774b64ca6aba87fb8c497f5663780" - } - }, - "4.4.288": { - "CVE-2021-4203": { - "cmt_msg": "af_unix: fix races in sk_peer_pid and sk_peer_cred accesses", - "cmt_id": "323f0968a81b082cf02ef15b447cd35e4328385e" - } - }, - "4.4.289": { - "CVE-2020-29374": { - "cmt_msg": "gup: document and work around \"COW can break either way\" issue", - "cmt_id": "58facc9c7ae307be5ecffc1697552550fedb55bd" - } - }, - "4.4.290": { - "CVE-2021-3896": { - "cmt_msg": "isdn: cpai: check ctr->cnr to avoid array index out of bound", - "cmt_id": "e8b8de17e164c9f1b7777f1c6f99d05539000036" + "CVE-2017-18595": { + "cmt_msg": "tracing: Fix possible double free on failure of allocating trace buffer", + "cmt_id": "ca8476b2170d7500609f1fc6945a03e80eb58f6c" }, - "CVE-2021-20321": { - "cmt_msg": "ovl: fix missing negative dentry check in ovl_rename()", - "cmt_id": "a4f281ffc1d128d7ea693cbc3a796e56e919fd7c" + "CVE-2016-10318": { + "cmt_msg": "fscrypto: add authorization check for setting encryption policy", + "cmt_id": "e68557814c7e9e4943caca924ff5537952bb3b4e" }, - "CVE-2021-3760": { - "cmt_msg": "nfc: nci: fix the UAF of rf_conn_info object", - "cmt_id": "1d5e0107bfdbef6cc140fb5d7a1a817a40948528" + "CVE-2018-1000004": { + "cmt_msg": "ALSA: seq: Make ioctls race-free", + "cmt_id": "f8a38ab4cd9624fc5ac8a7f965c7b20f5b62c03c" }, - "CVE-2021-43389": { - "cmt_msg": "isdn: cpai: check ctr->cnr to avoid array index out of bound", - "cmt_id": "e8b8de17e164c9f1b7777f1c6f99d05539000036" - } - }, - "4.4.291": { - "CVE-2021-3772": { - "cmt_msg": "sctp: use init_tag from inithdr for ABORT chunk", - "cmt_id": "629d2823abf957bcbcba32154f1f6fd49bdb850c" - } - }, - "4.4.292": { - "CVE-2021-37159": { - "cmt_msg": "usb: hso: fix error handling code of hso_create_net_device", - "cmt_id": "cbefdf724282e6a948885f379dc92ab841c2fee0" - } - }, - "4.4.293": { - "CVE-2021-4202": { - "cmt_msg": "NFC: reorganize the functions in nci_request", - "cmt_id": "6dc051117ba0e1dac9324593ff2c1c520f67ad21" + "CVE-2017-16913": { + "cmt_msg": "usbip: fix stub_rx: harden CMD_SUBMIT path to handle malicious input", + "cmt_id": "41ab9559b047a8a3f958a89f0202772a1aeaf4e4" }, - "CVE-2021-3752": { - "cmt_msg": "Bluetooth: fix use-after-free error in lock_sock_nested()", - "cmt_id": "88aed7d67197d155260f09078835290adfa1debd" + "CVE-2017-16912": { + "cmt_msg": "usbip: fix stub_rx: get_pipe() to validate endpoint number", + "cmt_id": "fcd31102e7ff3c83c6a6cda08156393e18c5e8f3" }, - "CVE-2021-45868": { - "cmt_msg": "quota: check block number when reading the block in quota file", - "cmt_id": "7a40f3e53f5de1d6876df8a9e8025b50616b8818" + "CVE-2017-16911": { + "cmt_msg": "usbip: prevent vhci_hcd driver from leaking a socket pointer address", + "cmt_id": "8c2b2e645aa47c2e9910e168398f7d28d31a0dc3" }, - "CVE-2021-39686": { - "cmt_msg": "binder: use euid from cred instead of using task", - "cmt_id": "120ffcd83596fe94b6d6735d21349f118b60c936" + "CVE-2018-5344": { + "cmt_msg": "loop: fix concurrent lo_open/lo_release", + "cmt_id": "f3ddd4df852f8c2ed11d09086b64a3be76ea2aed" }, - "CVE-2021-3640": { - "cmt_msg": "Bluetooth: sco: Fix lock_sock() blockage by memcpy_from_msg()", - "cmt_id": "f632f88fe209240f5cad853e33f74fda4d341004" - } - }, - "4.4.294": { - "CVE-2021-4002": { - "cmt_msg": "hugetlbfs: flush TLBs correctly after huge_pmd_unshare", - "cmt_id": "8a8ae093b52ba76b650b493848d67e7b526c8751" + "CVE-2018-6927": { + "cmt_msg": "futex: Prevent overflow by strengthen input validation", + "cmt_id": "c3e715e4a45301380a1ae1f677de2f1a428b6349" }, - "CVE-2021-4083": { - "cmt_msg": "fget: check that the fd still exists after getting a ref to it", - "cmt_id": "8afa4ef999191477506b396fae518338b8996fec" - } - }, - "4.4.295": { - "CVE-2022-20132": { - "cmt_msg": "HID: add hid_is_usb() function to make it simpler for USB detection", - "cmt_id": "6a0bc60a84cb5186a84e7501616dacfd9e991b54" + "CVE-2017-8824": { + "cmt_msg": "dccp: CVE-2017-8824: use-after-free in DCCP code", + "cmt_id": "203e5dcc6edbe7248c9800689da3dd316f4c434a" }, - "CVE-2021-39698": { - "cmt_msg": "wait: add wake_up_pollfree()", - "cmt_id": "d0ceebaae0e406263b83462701b5645e075c1467" + "CVE-2018-18386": { + "cmt_msg": "n_tty: fix EXTPROC vs ICANON interaction with TIOCINQ (aka FIONREAD)", + "cmt_id": "9820d89b1a266ac573dae8fa46e4aa43f277a302" }, - "CVE-2021-39685": { - "cmt_msg": "USB: gadget: detect too-big endpoint 0 requests", - "cmt_id": "93cd7100fe471c5f76fb942358de4ed70dbcaf35" + "CVE-2017-13305": { + "cmt_msg": "KEYS: encrypted: fix buffer overread in valid_master_desc()", + "cmt_id": "1f338384b46b16f9682c8e01f8d158e90e5d6cc2" + }, + "CVE-2017-17450": { + "cmt_msg": "netfilter: xt_osf: Add missing permission checks", + "cmt_id": "6a45beb377097053f1b293db3d0e01f35b3a7cbf" } }, - "4.4.296": { - "CVE-2021-28715": { - "cmt_msg": "xen/netback: don't queue unlimited number of packages", - "cmt_id": "0928efb09178e01d3dc8e8849aa1c807436c3c37" - }, - "CVE-2021-28713": { - "cmt_msg": "xen/console: harden hvc_xen against event channel storms", - "cmt_id": "c7eaa5082bccfc00dfdb500ac6cc86d6f24ca027" + "4.1.51": { + "CVE-2018-1068": { + "cmt_msg": "netfilter: ebtables: CONFIG_COMPAT: don't trust userland offsets", + "cmt_id": "1829a59ba6e8fa6467ea4607cf086b5e2d8d6426" }, - "CVE-2021-28712": { - "cmt_msg": "xen/netfront: harden netfront against event channel storms", - "cmt_id": "81900aa7d7a130dec4c55b68875e30fb8c9effec" + "CVE-2018-7995": { + "cmt_msg": "x86/MCE: Serialize sysfs changes", + "cmt_id": "39a50471ea262c0a21d22d1c9a8d4c1bcac39865" }, - "CVE-2021-28711": { - "cmt_msg": "xen/blkfront: harden blkfront against event channel storms", - "cmt_id": "3e04b9e6aa7d77287e70a400be83060d2b7b2cfe" - } - }, - "4.4.297": { - "CVE-2022-1195": { - "cmt_msg": "hamradio: improve the incomplete fix to avoid NPD", - "cmt_id": "371a874ea06f147d6ca30be43dad33683965eba6" - } - }, - "4.4.299": { - "CVE-2021-45095": { - "cmt_msg": "phonet: refcount leak in pep_sock_accep", - "cmt_id": "172b3f506c24a61805b3910b9acfe7159d980b9b" + "CVE-2018-5803": { + "cmt_msg": "sctp: verify size of a new chunk in _sctp_make_chunk()", + "cmt_id": "b434e837642049c96cf56c730279f410d520b33b" }, - "CVE-2021-4155": { - "cmt_msg": "xfs: map unwritten blocks in XFS_IOC_{ALLOC,FREE}SP just like fallocate", - "cmt_id": "56adcda55aa213e106224ff3d18ef4625e25f52b" - } - }, - "4.4.300": { - "CVE-2021-43976": { - "cmt_msg": "mwifiex: Fix skb_over_panic in mwifiex_usb_recv()", - "cmt_id": "7d5e12e452771509d94db391a3b5e428325ed268" - } - }, - "4.4.301": { - "CVE-2022-0330": { - "cmt_msg": "drm/i915: Flush TLBs before releasing backing store", - "cmt_id": "db6a2082d5a2ebc5ffa41f7213a544d55f73793a" - } - }, - "4.4.302": { - "CVE-2020-36516": { - "cmt_msg": "ipv4: avoid using shared IP generator for connected sockets", - "cmt_id": "e1b3fa7b6471e1b2f4c7573711e7f8ee2e9f3dc3" + "CVE-2018-7480": { + "cmt_msg": "blkcg: fix double free of new_blkg in blkcg_init_queue", + "cmt_id": "2191fc0f29b2d4e8e3e4aa5bf75df771aa7b1f88" }, - "CVE-2022-0617": { - "cmt_msg": "udf: Fix NULL ptr deref when converting from inline format", - "cmt_id": "0f28e1a57baf48a583093e350ea2bd3e4c09b8ea" + "CVE-2019-9456": { + "cmt_msg": "usb: usbmon: Read text within supplied buffer size", + "cmt_id": "eaca72671725b4bbaadfc3a0b07a3e26f285677c" } }, - "outstanding": { - "CVE-2020-36322": { - "cmt_msg": "fuse: fix bad inode" + "4.1.52": { + "CVE-2018-9385": { + "cmt_msg": "ARM: amba: Don't read past the end of sysfs \"driver_override\" buffer", + "cmt_id": "dbb94eebe42ac07eaee43afc23acdd0bf5674036" }, - "CVE-2020-35501": { - "cmt_msg": "" + "CVE-2018-1066": { + "cmt_msg": "CIFS: Enable encryption during session setup phase", + "cmt_id": "b0b6d2f2c5377d169598f0ca00c25a78db651d35" }, - "CVE-2022-0001": { - "cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE" + "CVE-2018-8822": { + "cmt_msg": "staging: ncpfs: memory corruption in ncp_read_kernel()", + "cmt_id": "f67d1bdb52086230095895d6d0034953967cad78" }, - "CVE-2022-0002": { - "cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE" + "CVE-2018-10940": { + "cmt_msg": "cdrom: information leak in cdrom_ioctl_media_changed()", + "cmt_id": "888f807c68bc7a4d96429d28a12cba9a045e3c79" }, - "CVE-2023-3268": { - "cmt_msg": "relayfs: fix out-of-bounds access in relay_file_read" + "CVE-2018-8781": { + "cmt_msg": "drm: udl: Properly check framebuffer mmap offsets", + "cmt_id": "631334908d120129678f68cdcca333565748fde7" }, - "CVE-2022-47520": { - "cmt_msg": "wifi: wilc1000: validate pairwise and authentication suite offsets" + "CVE-2018-1087": { + "cmt_msg": "kvm/x86: fix icebp instruction handling", + "cmt_id": "4dc9ef4cf4830e6c001513b1a876ab32fe001b9a" }, - "CVE-2023-5717": { - "cmt_msg": "perf: Disallow mis-matched inherited group reads" + "CVE-2018-9415": { + "cmt_msg": "ARM: amba: Fix race condition with driver_override", + "cmt_id": "1d4ddc30e2b52aeb1b42c1c1a35b4b3792ce162e" }, - "CVE-2022-32250": { - "cmt_msg": "netfilter: nf_tables: disallow non-stateful expression in sets earlier" + "CVE-2018-7757": { + "cmt_msg": "scsi: libsas: fix memory leak in sas_smp_get_phy_events()", + "cmt_id": "e0ef494d21a96b888cc8f878906a0c04238bf15d" }, - "CVE-2023-3159": { - "cmt_msg": "firewire: fix potential uaf in outbound_phy_packet_callback()" + "CVE-2017-17975": { + "cmt_msg": "media: usbtv: prevent double free in error case", + "cmt_id": "6291e1b9e71003fe84b902efa4c3994605d925df" }, - "CVE-2022-0480": { - "cmt_msg": "memcg: enable accounting for file lock caches" + "CVE-2017-17712": { + "cmt_msg": "net: ipv4: fix for a race condition in raw_sendmsg", + "cmt_id": "d61b40939ebdc84dad77dbc78c3e26ad9d2da68b" }, - "CVE-2022-0487": { - "cmt_msg": "moxart: fix potential use-after-free on remove path" + "CVE-2018-1000199": { + "cmt_msg": "perf/hwbp: Simplify the perf-hwbp code, fix documentation", + "cmt_id": "3e9eff8b3c9f0e886ffef7621673fde3bb629601" }, - "CVE-2023-52429": { - "cmt_msg": "dm: limit the number of targets and parameter size area" + "CVE-2018-9422": { + "cmt_msg": "futex: Remove requirement for lock_page() in get_futex_key()", + "cmt_id": "1b58e046b7647bc44f83afd68e07c52c60d27bcc" }, - "CVE-2022-23825": { - "cmt_msg": "" + "CVE-2018-1130": { + "cmt_msg": "dccp: check sk for closed state in dccp_sendmsg()", + "cmt_id": "b8415da3f6caf0842f86acbfa03b86eb4fbb3d4e" + } + }, + "outstanding": { + "CVE-2017-5897": { + "cmt_msg": "ip6_gre: fix ip6gre_err() invalid reads" }, - "CVE-2022-21125": { - "cmt_msg": "x86/speculation/mmio: Reuse SRBDS mitigation for SBDS" + "CVE-2020-10711": { + "cmt_msg": "netlabel: cope with NULL catmap" }, - "CVE-2019-19241": { - "cmt_msg": "io_uring: async workers should inherit the user creds" + "CVE-2020-35508": { + "cmt_msg": "fork: fix copy_process(CLONE_PARENT) race with the exiting ->real_parent" }, - "CVE-2022-21123": { - "cmt_msg": "x86/speculation/mmio: Add mitigation for Processor MMIO Stale Data" + "CVE-2024-26686": { + "cmt_msg": "fs/proc: do_task_stat: use sig->stats_lock to gather the threads/children stats" }, - "CVE-2021-43975": { - "cmt_msg": "atlantic: Fix OOB read and write in hw_atl_utils_fw_rpc_wait" + "CVE-2022-3649": { + "cmt_msg": "nilfs2: fix use-after-free bug of struct nilfs_root" }, - "CVE-2023-0459": { - "cmt_msg": "uaccess: Add speculation barrier to copy_from_user()" + "CVE-2020-35501": { + "cmt_msg": "" }, - "CVE-2023-0458": { - "cmt_msg": "prlimit: do_prlimit needs to have a speculation check" + "CVE-2019-15098": { + "cmt_msg": "ath6kl: fix a NULL-ptr-deref bug in ath6kl_usb_alloc_urb_from_pipe()" }, - "CVE-2023-0597": { - "cmt_msg": "x86/mm: Randomize per-cpu entry area" + "CVE-2024-26687": { + "cmt_msg": "xen/events: close evtchn after mapping cleanup" }, - "CVE-2019-12379": { - "cmt_msg": "consolemap: Fix a memory leaking bug in drivers/tty/vt/consolemap.c" + "CVE-2021-45095": { + "cmt_msg": "phonet: refcount leak in pep_sock_accep" }, - "CVE-2019-12378": { - "cmt_msg": "ipv6_sockglue: Fix a missing-check bug in ip6_ra_control()" + "CVE-2022-0001": { + "cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE" }, - "CVE-2021-0941": { - "cmt_msg": "bpf: Remove MTU check in __bpf_skb_max_len" + "CVE-2020-12464": { + "cmt_msg": "USB: core: Fix free-while-in-use bug in the USB S-Glibrary" }, - "CVE-2022-3628": { - "cmt_msg": "wifi: brcmfmac: Fix potential buffer overflow in brcmf_fweh_event_worker()" + "CVE-2021-45469": { + "cmt_msg": "f2fs: fix to do sanity check on last xattr entry in __f2fs_setxattr()" }, - "CVE-2024-26591": { - "cmt_msg": "bpf: Fix re-attachment branch in bpf_tracing_prog_attach" + "CVE-2019-19965": { + "cmt_msg": "scsi: libsas: stop discovering if oob mode is disconnected" }, - "CVE-2020-15802": { - "cmt_msg": "" + "CVE-2017-15102": { + "cmt_msg": "usb: misc: legousbtower: Fix NULL pointer deference" }, - "CVE-2024-26594": { - "cmt_msg": "ksmbd: validate mech token in session setup" + "CVE-2016-9794": { + "cmt_msg": "ALSA: pcm : Call kill_fasync() in stream lock" }, - "CVE-2022-3636": { - "cmt_msg": "net: ethernet: mtk_eth_soc: use after free in __mtk_ppe_check_skb()" + "CVE-2023-52615": { + "cmt_msg": "hwrng: core - Fix page fault dead lock on mmap-ed hwrng" }, - "CVE-2022-3635": { - "cmt_msg": "atm: idt77252: fix use-after-free bugs caused by tst_timer" + "CVE-2023-52614": { + "cmt_msg": "PM / devfreq: Fix buffer overflow in trans_stat_show" }, - "CVE-2022-34918": { - "cmt_msg": "netfilter: nf_tables: stricter validation of element data" + "CVE-2023-52617": { + "cmt_msg": "PCI: switchtec: Fix stdev_release() crash after surprise hot remove" }, - "CVE-2022-3202": { - "cmt_msg": "jfs: prevent NULL deref in diFree" + "CVE-2020-24587": { + "cmt_msg": "mac80211: prevent mixed key and fragment cache attacks" }, - "CVE-2018-3646": { - "cmt_msg": "x86/microcode: Allow late microcode loading with SMT disabled" + "CVE-2020-24586": { + "cmt_msg": "mac80211: prevent mixed key and fragment cache attacks" }, - "CVE-2024-26584": { - "cmt_msg": "net: tls: handle backlogging of crypto requests" + "CVE-2021-0129": { + "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical" }, - "CVE-2024-24861": { - "cmt_msg": "" + "CVE-2019-20096": { + "cmt_msg": "dccp: Fix memleak in __feat_register_sp" }, - "CVE-2024-26587": { - "cmt_msg": "net: netdevsim: don't try to destroy PHC on VFs" + "CVE-2016-3951": { + "cmt_msg": "cdc_ncm: do not call usbnet_link_change from cdc_ncm_bind" }, - "CVE-2023-2007": { - "cmt_msg": "scsi: dpt_i2o: Remove obsolete driver" + "CVE-2023-52618": { + "cmt_msg": "block/rnbd-srv: Check for unlikely string overflow" }, - "CVE-2022-1419": { - "cmt_msg": "drm/vgem: Close use-after-free race in vgem_gem_create" + "CVE-2016-10044": { + "cmt_msg": "aio: mark AIO pseudo-fs noexec" }, - "CVE-2023-51782": { - "cmt_msg": "net/rose: Fix Use-After-Free in rose_ioctl" + "CVE-2022-3643": { + "cmt_msg": "xen/netback: Ensure protocol headers don't fall in the non-linear area" }, - "CVE-2020-26141": { - "cmt_msg": "ath10k: Fix TKIP Michael MIC verification for PCIe" + "CVE-2022-32250": { + "cmt_msg": "netfilter: nf_tables: disallow non-stateful expression in sets earlier" }, - "CVE-2020-26140": { - "cmt_msg": "" + "CVE-2018-10087": { + "cmt_msg": "kernel/exit.c: avoid undefined behaviour when calling wait4()" }, - "CVE-2020-26143": { - "cmt_msg": "" + "CVE-2019-9503": { + "cmt_msg": "brcmfmac: add subtype check for event handling in data path" }, - "CVE-2020-26142": { - "cmt_msg": "" + "CVE-2020-36158": { + "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_cmd_802_11_ad_hoc_start" }, - "CVE-2023-1074": { - "cmt_msg": "sctp: fail if no bound addresses can be used for a given scope" + "CVE-2023-3159": { + "cmt_msg": "firewire: fix potential uaf in outbound_phy_packet_callback()" }, - "CVE-2023-1077": { - "cmt_msg": "sched/rt: pick_next_rt_entity(): check list_entry" + "CVE-2022-0480": { + "cmt_msg": "memcg: enable accounting for file lock caches" }, - "CVE-2023-46838": { - "cmt_msg": "xen-netback: don't produce zero-size SKB frags" + "CVE-2018-10124": { + "cmt_msg": "kernel/signal.c: avoid undefined behaviour in kill_something_info" }, - "CVE-2023-51780": { - "cmt_msg": "atm: Fix Use-After-Free in do_vcc_ioctl" + "CVE-2022-0487": { + "cmt_msg": "moxart: fix potential use-after-free on remove path" }, - "CVE-2023-40283": { - "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb" + "CVE-2023-52429": { + "cmt_msg": "dm: limit the number of targets and parameter size area" }, - "CVE-2023-1073": { - "cmt_msg": "HID: check empty report_list in hid_validate_values()" + "CVE-2021-28964": { + "cmt_msg": "btrfs: fix race when cloning extent buffer during rewind of an old root" }, - "CVE-2018-13095": { - "cmt_msg": "xfs: More robust inode extent count validation" + "CVE-2020-26558": { + "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical" }, - "CVE-2024-22386": { + "CVE-2022-23825": { "cmt_msg": "" }, - "CVE-2018-13098": { - "cmt_msg": "f2fs: fix to do sanity check with extra_attr feature" + "CVE-2021-47052": { + "cmt_msg": "crypto: sa2ul - Fix memory leak of rxd" }, - "CVE-2022-1734": { - "cmt_msg": "nfc: nfcmrvl: main: reorder destructive operations in nfcmrvl_nci_unregister_dev to avoid bugs" + "CVE-2021-47112": { + "cmt_msg": "x86/kvm: Teardown PV features on boot CPU as well" }, - "CVE-2022-2503": { - "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag" + "CVE-2021-47113": { + "cmt_msg": "btrfs: abort in rename_exchange if we fail to insert the second ref" }, - "CVE-2015-8952": { - "cmt_msg": "ext2: convert to mbcache2" + "CVE-2021-47110": { + "cmt_msg": "x86/kvm: Disable kvmclock on all CPUs on shutdown" }, - "CVE-2022-23038": { - "cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()" + "CVE-2021-47116": { + "cmt_msg": "ext4: fix memory leak in ext4_mb_init_backend on error path." }, - "CVE-2022-23039": { - "cmt_msg": "xen/gntalloc: don't use gnttab_query_foreign_access()" + "CVE-2021-47117": { + "cmt_msg": "ext4: fix bug on in ext4_es_cache_extent as ext4_split_extent_at failed" }, - "CVE-2022-20158": { - "cmt_msg": "net/packet: fix slab-out-of-bounds access in packet_recvmsg()" + "CVE-2021-47114": { + "cmt_msg": "ocfs2: fix data corruption by fallocate" }, - "CVE-2022-23037": { - "cmt_msg": "xen/netfront: don't use gnttab_query_foreign_access() for mapped status" + "CVE-2023-2162": { + "cmt_msg": "scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress" }, - "CVE-2023-2176": { - "cmt_msg": "RDMA/core: Refactor rdma_bind_addr" + "CVE-2017-5551": { + "cmt_msg": "tmpfs: clear S_ISGID when setting posix ACLs" }, - "CVE-2022-39188": { - "cmt_msg": "mmu_gather: Force tlb-flush VM_PFNMAP vmas" + "CVE-2021-47118": { + "cmt_msg": "pid: take a reference when initializing `cad_pid`" }, - "CVE-2005-3660": { - "cmt_msg": "" + "CVE-2021-46970": { + "cmt_msg": "bus: mhi: pci_generic: Remove WQ_MEM_RECLAIM flag from state workqueue" }, - "CVE-2023-31085": { - "cmt_msg": "ubi: Refuse attaching if mtd's erasesize is 0" + "CVE-2022-1679": { + "cmt_msg": "ath9k: fix use-after-free in ath9k_hif_usb_rx_cb" }, - "CVE-2023-31084": { - "cmt_msg": "media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*()" + "CVE-2019-19241": { + "cmt_msg": "io_uring: async workers should inherit the user creds" }, - "CVE-2015-1350": { - "cmt_msg": "fs: Avoid premature clearing of capabilities" + "CVE-2022-21123": { + "cmt_msg": "x86/speculation/mmio: Add mitigation for Processor MMIO Stale Data" }, - "CVE-2023-31082": { - "cmt_msg": "" + "CVE-2023-3390": { + "cmt_msg": "netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE" }, - "CVE-2023-31081": { - "cmt_msg": "" + "CVE-2021-28688": { + "cmt_msg": "xen-blkback: don't leak persistent grants from xen_blkbk_map()" }, - "CVE-2019-19922": { - "cmt_msg": "sched/fair: Fix low cpu usage with high throttling by removing expiration of cpu-local slices" + "CVE-2021-39686": { + "cmt_msg": "binder: use euid from cred instead of using task" }, - "CVE-2019-19927": { - "cmt_msg": "drm/ttm: fix incrementing the page pointer for huge pages" + "CVE-2021-39685": { + "cmt_msg": "USB: gadget: detect too-big endpoint 0 requests" }, - "CVE-2024-23307": { + "CVE-2023-6535": { "cmt_msg": "" }, - "CVE-2022-32296": { - "cmt_msg": "tcp: increase source port perturb table to 2^16" - }, - "CVE-2023-3567": { - "cmt_msg": "vc_screen: move load of struct vc_data pointer in vcs_read() to avoid UAF" + "CVE-2021-43975": { + "cmt_msg": "atlantic: Fix OOB read and write in hw_atl_utils_fw_rpc_wait" }, - "CVE-2019-20806": { - "cmt_msg": "media: tw5864: Fix possible NULL pointer dereference in tw5864_handle_frame" + "CVE-2021-43976": { + "cmt_msg": "mwifiex: Fix skb_over_panic in mwifiex_usb_recv()" }, - "CVE-2022-3028": { - "cmt_msg": "af_key: Do not call xfrm_probe_algs in parallel" + "CVE-2020-0466": { + "cmt_msg": "do_epoll_ctl(): clean the failure exits up a bit" }, - "CVE-2020-14304": { - "cmt_msg": "" + "CVE-2019-10207": { + "cmt_msg": "Bluetooth: hci_uart: check for missing tty operations" }, - "CVE-2020-14305": { - "cmt_msg": "netfilter: helpers: remove data_len usage for inkernel helpers" + "CVE-2023-39189": { + "cmt_msg": "netfilter: nfnetlink_osf: avoid OOB read" }, - "CVE-2022-33981": { - "cmt_msg": "floppy: disable FDRAWCMD by default" + "CVE-2019-14835": { + "cmt_msg": "vhost: make sure log_num < in_num" }, - "CVE-2023-3611": { - "cmt_msg": "net/sched: sch_qfq: account for stab overhead in qfq_enqueue" + "CVE-2023-0459": { + "cmt_msg": "uaccess: Add speculation barrier to copy_from_user()" }, - "CVE-2019-2025": { - "cmt_msg": "binder: fix race that allows malicious free of live buffer" + "CVE-2023-0458": { + "cmt_msg": "prlimit: do_prlimit needs to have a speculation check" }, - "CVE-2020-26560": { - "cmt_msg": "" + "CVE-2021-47086": { + "cmt_msg": "phonet/pep: refuse to enable an unbound pipe" }, - "CVE-2023-4134": { - "cmt_msg": "Input: cyttsp4_core - change del_timer_sync() to timer_shutdown_sync()" + "CVE-2018-1000204": { + "cmt_msg": "scsi: sg: allocate with __GFP_ZERO in sg_build_indirect()" }, - "CVE-2023-39198": { - "cmt_msg": "drm/qxl: fix UAF on handle creation" + "CVE-2023-0597": { + "cmt_msg": "x86/mm: Randomize per-cpu entry area" }, - "CVE-2018-12127": { - "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" + "CVE-2019-12379": { + "cmt_msg": "consolemap: Fix a memory leaking bug in drivers/tty/vt/consolemap.c" }, - "CVE-2018-12126": { - "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" + "CVE-2017-12134": { + "cmt_msg": "xen: fix bio vec merging" }, - "CVE-2023-37454": { - "cmt_msg": "" + "CVE-2021-30002": { + "cmt_msg": "media: v4l: ioctl: Fix memory leak in video_usercopy" }, - "CVE-2022-20572": { - "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag" + "CVE-2023-31084": { + "cmt_msg": "media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*()" }, - "CVE-2023-39197": { - "cmt_msg": "netfilter: conntrack: dccp: copy entire header to stack buffer, not just basic one" + "CVE-2015-8551": { + "cmt_msg": "xen/pciback: Return error on XEN_PCI_OP_enable_msi when device has MSI or MSI-X enabled" }, - "CVE-2022-42703": { - "cmt_msg": "mm/rmap: Fix anon_vma->degree ambiguity leading to double-reuse" + "CVE-2015-8550": { + "cmt_msg": "xen: Add RING_COPY_REQUEST()" }, - "CVE-2023-33288": { - "cmt_msg": "power: supply: bq24190: Fix use after free bug in bq24190_remove due to race condition" + "CVE-2016-3672": { + "cmt_msg": "x86/mm/32: Enable full randomization on i386 and X86_32" }, - "CVE-2022-29900": { - "cmt_msg": "x86/kvm/vmx: Make noinstr clean" + "CVE-2015-8552": { + "cmt_msg": "xen/pciback: Return error on XEN_PCI_OP_enable_msi when device has MSI or MSI-X enabled" }, - "CVE-2022-29901": { - "cmt_msg": "x86/kvm/vmx: Make noinstr clean" + "CVE-2020-15802": { + "cmt_msg": "" }, - "CVE-2018-9465": { - "cmt_msg": "binder: fix proc->files use-after-free" + "CVE-2022-3522": { + "cmt_msg": "mm/hugetlb: use hugetlb_pte_stable in migration race check" }, - "CVE-2016-5728": { - "cmt_msg": "misc: mic: Fix for double fetch security bug in VOP driver" + "CVE-2024-26594": { + "cmt_msg": "ksmbd: validate mech token in session setup" }, - "CVE-2022-1116": { - "cmt_msg": "" + "CVE-2023-4623": { + "cmt_msg": "net/sched: sch_hfsc: Ensure inner classes have fsc curve" }, - "CVE-2022-2318": { - "cmt_msg": "net: rose: fix UAF bugs caused by timer handler" + "CVE-2019-3460": { + "cmt_msg": "Bluetooth: Check L2CAP option sizes returned from l2cap_get_conf_opt" }, - "CVE-2022-23816": { - "cmt_msg": "x86/kvm/vmx: Make noinstr clean" + "CVE-2022-3636": { + "cmt_msg": "net: ethernet: mtk_eth_soc: use after free in __mtk_ppe_check_skb()" }, - "CVE-2023-35824": { - "cmt_msg": "media: dm1105: Fix use after free bug in dm1105_remove due to race condition" + "CVE-2022-3635": { + "cmt_msg": "atm: idt77252: fix use-after-free bugs caused by tst_timer" }, - "CVE-2023-35827": { - "cmt_msg": "ravb: Fix use-after-free issue in ravb_tx_timeout_work()" + "CVE-2022-0002": { + "cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE" }, - "CVE-2022-3567": { - "cmt_msg": "ipv6: Fix data races around sk->sk_prot." + "CVE-2021-34556": { + "cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4" }, - "CVE-2022-3566": { - "cmt_msg": "tcp: Fix data races around icsk->icsk_af_ops." + "CVE-2020-0543": { + "cmt_msg": "x86/cpu: Add 'table' argument to cpu_matches()" }, - "CVE-2022-3565": { - "cmt_msg": "mISDN: fix use-after-free bugs in l1oip timer handlers" + "CVE-2022-40982": { + "cmt_msg": "x86/speculation: Add Gather Data Sampling mitigation" }, - "CVE-2022-3564": { - "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free caused by l2cap_reassemble_sdu" + "CVE-2016-10906": { + "cmt_msg": "net: arc_emac: fix koops caused by sk_buff free" }, - "CVE-2020-36385": { - "cmt_msg": "RDMA/ucma: Rework ucma_migrate_id() to avoid races with destroy" + "CVE-2016-10905": { + "cmt_msg": "GFS2: don't set rgrp gl_object until it's inserted into rgrp tree" }, - "CVE-2022-1048": { - "cmt_msg": "ALSA: pcm: Fix races among concurrent hw_params and hw_free calls" + "CVE-2022-3202": { + "cmt_msg": "jfs: prevent NULL deref in diFree" }, - "CVE-2023-52340": { - "cmt_msg": "ipv6: remove max_size check inline with ipv4" + "CVE-2021-47028": { + "cmt_msg": "mt76: mt7915: fix txrate reporting" }, - "CVE-2023-0030": { - "cmt_msg": "drm/nouveau/mmu: add more general vmm free/node handling functions" + "CVE-2021-47128": { + "cmt_msg": "bpf, lockdown, audit: Fix buggy SELinux lockdown permission checks" }, - "CVE-2020-16120": { - "cmt_msg": "ovl: switch to mounter creds in readdir" + "CVE-2018-3646": { + "cmt_msg": "x86/microcode: Allow late microcode loading with SMT disabled" }, - "CVE-2022-1204": { - "cmt_msg": "ax25: Fix refcount leaks caused by ax25_cb_del()" + "CVE-2021-39714": { + "cmt_msg": "staging: android: ion: Drop ion_map_kernel interface" }, - "CVE-2023-1611": { - "cmt_msg": "btrfs: fix race between quota disable and quota assign ioctls" + "CVE-2024-24861": { + "cmt_msg": "media: xc4000: Fix atomicity violation in xc4000_get_frequency" }, - "CVE-2016-10723": { - "cmt_msg": "mm, oom: remove sleep from under oom_lock" + "CVE-2019-19966": { + "cmt_msg": "media: cpia2: Fix use-after-free in cpia2_exit" }, - "CVE-2019-19036": { - "cmt_msg": "btrfs: Detect unbalanced tree with empty leaf before crashing btree operations" + "CVE-2019-11477": { + "cmt_msg": "tcp: limit payload size of sacked skbs" }, - "CVE-2022-26490": { - "cmt_msg": "nfc: st21nfca: Fix potential buffer overflows in EVT_TRANSACTION" + "CVE-2021-28711": { + "cmt_msg": "xen/blkfront: harden blkfront against event channel storms" }, - "CVE-2017-8797": { - "cmt_msg": "nfsd: fix undefined behavior in nfsd4_layout_verify" + "CVE-2021-46908": { + "cmt_msg": "bpf: Use correct permission flag for mixed signed bounds arithmetic" }, - "CVE-2020-8832": { - "cmt_msg": "drm/i915: Record the default hw state after reset upon load" + "CVE-2021-46906": { + "cmt_msg": "HID: usbhid: fix info leak in hid_submit_ctrl" }, - "CVE-2022-1836": { - "cmt_msg": "floppy: disable FDRAWCMD by default" + "CVE-2018-14614": { + "cmt_msg": "f2fs: fix to do sanity check with cp_pack_start_sum" }, - "CVE-2021-32078": { - "cmt_msg": "ARM: footbridge: remove personal server platform" + "CVE-2019-11479": { + "cmt_msg": "tcp: add tcp_min_snd_mss sysctl" }, - "CVE-2022-30594": { - "cmt_msg": "ptrace: Check PTRACE_O_SUSPEND_SECCOMP permission on PTRACE_SEIZE" + "CVE-2019-11478": { + "cmt_msg": "tcp: tcp_fragment() should apply sane memory limits" }, - "CVE-2022-4662": { - "cmt_msg": "USB: core: Prevent nested device-reset calls" + "CVE-2018-14611": { + "cmt_msg": "btrfs: validate type when reading a chunk" }, - "CVE-2021-3864": { - "cmt_msg": "" + "CVE-2018-14610": { + "cmt_msg": "btrfs: Check that each block group has corresponding chunk at mount time" }, - "CVE-2023-39189": { - "cmt_msg": "netfilter: nfnetlink_osf: avoid OOB read" + "CVE-2018-14613": { + "cmt_msg": "btrfs: tree-checker: Verify block_group_item" }, - "CVE-2023-35001": { - "cmt_msg": "netfilter: nf_tables: prevent OOB access in nft_byteorder_eval" + "CVE-2018-14612": { + "cmt_msg": "btrfs: tree-checker: Detect invalid and empty essential trees" }, - "CVE-2017-18232": { - "cmt_msg": "scsi: libsas: direct call probe and destruct" + "CVE-2020-26145": { + "cmt_msg": "ath10k: drop fragments with multicast DA for PCIe" }, - "CVE-2019-2213": { - "cmt_msg": "binder: fix possible UAF when freeing buffer" + "CVE-2017-13215": { + "cmt_msg": "crypto: algif_skcipher - Load TX SG list after waiting" }, - "CVE-2022-0168": { - "cmt_msg": "cifs: fix NULL ptr dereference in smb2_ioctl_query_info()" + "CVE-2018-5814": { + "cmt_msg": "usbip: usbip_host: fix NULL-ptr deref and use-after-free errors" }, - "CVE-2020-26556": { + "CVE-2020-26140": { "cmt_msg": "" }, - "CVE-2020-26557": { + "CVE-2020-26143": { "cmt_msg": "" }, - "CVE-2019-20794": { + "CVE-2020-26142": { "cmt_msg": "" }, - "CVE-2020-26559": { - "cmt_msg": "" + "CVE-2019-17053": { + "cmt_msg": "ieee802154: enforce CAP_NET_RAW for raw sockets" }, - "CVE-2023-3397": { - "cmt_msg": "" + "CVE-2019-17052": { + "cmt_msg": "ax25: enforce CAP_NET_RAW for raw sockets" }, - "CVE-2018-1128": { - "cmt_msg": "libceph: add authorizer challenge" + "CVE-2016-3070": { + "cmt_msg": "mm: migrate dirty page without clear_page_dirty_for_io etc" }, - "CVE-2018-1129": { - "cmt_msg": "libceph: implement CEPHX_V2 calculation mode" + "CVE-2023-1077": { + "cmt_msg": "sched/rt: pick_next_rt_entity(): check list_entry" }, - "CVE-2021-3542": { - "cmt_msg": "" + "CVE-2020-27418": { + "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region" }, - "CVE-2023-52458": { - "cmt_msg": "block: add check that partition length needs to be aligned with block size" + "CVE-2019-17056": { + "cmt_msg": "nfc: enforce CAP_NET_RAW for raw sockets" }, - "CVE-2018-20854": { - "cmt_msg": "phy: ocelot-serdes: fix out-of-bounds read" + "CVE-2019-17055": { + "cmt_msg": "mISDN: enforce CAP_NET_RAW for raw sockets" }, - "CVE-2018-20855": { - "cmt_msg": "IB/mlx5: Fix leaking stack memory to userspace" + "CVE-2019-17054": { + "cmt_msg": "appletalk: enforce CAP_NET_RAW for raw sockets" }, - "CVE-2023-52451": { - "cmt_msg": "powerpc/pseries/memhp: Fix access beyond end of drmem array" + "CVE-2018-13093": { + "cmt_msg": "xfs: validate cached inodes are free when allocated" }, - "CVE-2022-3061": { - "cmt_msg": "video: fbdev: i740fb: Error out if 'pixclock' equals zero" + "CVE-2024-26745": { + "cmt_msg": "powerpc/pseries/iommu: IOMMU table is not initialized for kdump over SR-IOV" }, - "CVE-2024-1086": { - "cmt_msg": "netfilter: nf_tables: reject QUEUE/DROP verdict parameters" + "CVE-2023-51781": { + "cmt_msg": "appletalk: Fix Use-After-Free in atalk_ioctl" }, - "CVE-2022-3344": { - "cmt_msg": "KVM: x86: nSVM: harden svm_free_nested against freeing vmcb02 while still in use" + "CVE-2018-13096": { + "cmt_msg": "f2fs: fix to do sanity check with node footer and iblocks" }, - "CVE-2023-6240": { - "cmt_msg": "" + "CVE-2018-13097": { + "cmt_msg": "f2fs: fix to do sanity check with user_block_count" }, - "CVE-2023-23559": { - "cmt_msg": "wifi: rndis_wlan: Prevent buffer overflow in rndis_query_oid" + "CVE-2018-13094": { + "cmt_msg": "xfs: don't call xfs_da_shrink_inode with NULL bp" }, - "CVE-2022-39842": { - "cmt_msg": "video: fbdev: pxa3xx-gcu: Fix integer overflow in pxa3xx_gcu_write" + "CVE-2018-13095": { + "cmt_msg": "xfs: More robust inode extent count validation" }, - "CVE-2022-0382": { - "cmt_msg": "net ticp:fix a kernel-infoleak in __tipc_sendmsg()" + "CVE-2020-29661": { + "cmt_msg": "tty: Fix ->pgrp locking in tiocspgrp()" }, - "CVE-2023-32233": { - "cmt_msg": "netfilter: nf_tables: deactivate anonymous set from preparation phase" + "CVE-2020-29660": { + "cmt_msg": "tty: Fix ->session locking" }, - "CVE-2019-15222": { - "cmt_msg": "ALSA: usb-audio: Fix gpf in snd_usb_pipe_sanity_check" + "CVE-2018-13098": { + "cmt_msg": "f2fs: fix to do sanity check with extra_attr feature" }, - "CVE-2019-15223": { - "cmt_msg": "ALSA: line6: Assure canceling delayed work at disconnection" + "CVE-2018-13099": { + "cmt_msg": "f2fs: fix to do sanity check with reserved blkaddr of inline inode" }, - "CVE-2024-23196": { - "cmt_msg": "" + "CVE-2024-26748": { + "cmt_msg": "usb: cdns3: fix memory double free when handle zero packet" }, - "CVE-2019-19815": { - "cmt_msg": "f2fs: support swap file w/ DIO" + "CVE-2023-28772": { + "cmt_msg": "seq_buf: Fix overflow in seq_buf_putmem_hex()" }, - "CVE-2019-19814": { - "cmt_msg": "" + "CVE-2024-26769": { + "cmt_msg": "nvmet-fc: avoid deadlock on delete association path" }, - "CVE-2022-1016": { - "cmt_msg": "netfilter: nf_tables: initialize registers in nft_do_chain()" + "CVE-2022-24448": { + "cmt_msg": "NFSv4: Handle case where the lookup of a directory fails" }, - "CVE-2022-1011": { - "cmt_msg": "fuse: fix pipe buffer lifetime for direct_io" + "CVE-2019-11884": { + "cmt_msg": "Bluetooth: hidp: fix buffer overflow" }, - "CVE-2022-1012": { - "cmt_msg": "secure_seq: use the 64 bits of the siphash for port offset calculation" + "CVE-2023-4134": { + "cmt_msg": "Input: cyttsp4_core - change del_timer_sync() to timer_shutdown_sync()" }, - "CVE-2023-34255": { - "cmt_msg": "xfs: verify buffer contents when we skip log replay" + "CVE-2019-19074": { + "cmt_msg": "ath9k: release allocated buffer if timed out" }, - "CVE-2017-1000405": { - "cmt_msg": "mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d()" + "CVE-2019-19073": { + "cmt_msg": "ath9k_htc: release allocated buffer if timed out" }, - "CVE-2022-3111": { - "cmt_msg": "power: supply: wm8350-power: Add missing free in free_charger_irq" + "CVE-2015-9016": { + "cmt_msg": "blk-mq: fix race between timeout and freeing request" }, - "CVE-2023-3141": { - "cmt_msg": "memstick: r592: Fix UAF bug in r592_remove due to race condition" + "CVE-2015-8952": { + "cmt_msg": "ext2: convert to mbcache2" }, - "CVE-2022-0492": { - "cmt_msg": "cgroup-v1: Require capabilities to set release_agent" + "CVE-2024-26699": { + "cmt_msg": "drm/amd/display: Fix array-index-out-of-bounds in dcn35_clkmgr" }, - "CVE-2020-12655": { - "cmt_msg": "xfs: add agf freeblocks verify in xfs_agf_verify" + "CVE-2022-23038": { + "cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()" }, - "CVE-2022-0494": { - "cmt_msg": "block-map: add __GFP_ZERO flag for alloc_page in function bio_copy_kern" + "CVE-2022-23039": { + "cmt_msg": "xen/gntalloc: don't use gnttab_query_foreign_access()" }, - "CVE-2022-3524": { - "cmt_msg": "tcp/udp: Fix memory leak in ipv6_renew_options()." + "CVE-2024-26691": { + "cmt_msg": "KVM: arm64: Fix circular locking dependency" }, - "CVE-2022-3523": { - "cmt_msg": "mm/memory.c: fix race when faulting a device private page" + "CVE-2016-8645": { + "cmt_msg": "tcp: take care of truncations done by sk_filter()" }, - "CVE-2022-36402": { - "cmt_msg": "drm/vmwgfx: Fix shader stage validation" + "CVE-2016-8646": { + "cmt_msg": "crypto: algif_hash - Only export and import on sockets with data" }, - "CVE-2008-2544": { - "cmt_msg": "" + "CVE-2022-23037": { + "cmt_msg": "xen/netfront: don't use gnttab_query_foreign_access() for mapped status" }, - "CVE-2018-12928": { - "cmt_msg": "" + "CVE-2024-26774": { + "cmt_msg": "ext4: avoid dividing by 0 in mb_update_avg_fragment_size() when block bitmap corrupt" }, - "CVE-2018-7754": { - "cmt_msg": "printk: hash addresses printed with %p" + "CVE-2024-26697": { + "cmt_msg": "nilfs2: fix data corruption in dsync block recovery for small block sizes" }, - "CVE-2007-3719": { - "cmt_msg": "" + "CVE-2020-0404": { + "cmt_msg": "media: uvcvideo: Avoid cyclic entity chains due to malformed USB descriptors" }, - "CVE-2023-3863": { - "cmt_msg": "net: nfc: Fix use-after-free caused by nfc_llcp_find_local" + "CVE-2019-15927": { + "cmt_msg": "ALSA: usb-audio: Avoid access before bLength check in build_audio_procunit()" }, - "CVE-2023-0590": { - "cmt_msg": "net: sched: fix race condition in qdisc_graft()" + "CVE-2019-15926": { + "cmt_msg": "ath6kl: add some bounds checking" }, - "CVE-2022-4095": { - "cmt_msg": "staging: rtl8712: fix use after free bugs" + "CVE-2019-14821": { + "cmt_msg": "KVM: coalesced_mmio: add bounds checking" }, - "CVE-2022-45919": { - "cmt_msg": "media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221" + "CVE-2020-12826": { + "cmt_msg": "signal: Extend exec_id to 64bits" }, - "CVE-2023-2248": { - "cmt_msg": "net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg" + "CVE-2019-3701": { + "cmt_msg": "can: gw: ensure DLC boundaries after CAN frame modification" }, - "CVE-2023-30772": { - "cmt_msg": "power: supply: da9150: Fix use after free bug in da9150_charger_remove due to race condition" + "CVE-2021-42008": { + "cmt_msg": "net: 6pack: fix slab-out-of-bounds in decode_data" }, - "CVE-2023-32269": { - "cmt_msg": "netrom: Fix use-after-free caused by accept on already connected socket" + "CVE-2022-44033": { + "cmt_msg": "char: pcmcia: remove all the drivers" }, - "CVE-2022-2586": { - "cmt_msg": "netfilter: nf_tables: do not allow SET_ID to refer to another table" + "CVE-2024-26789": { + "cmt_msg": "crypto: arm64/neonbs - fix out-of-bounds access on short input" }, - "CVE-2022-3629": { - "cmt_msg": "vsock: Fix memory leak in vsock_connect()" + "CVE-2022-39188": { + "cmt_msg": "mmu_gather: Force tlb-flush VM_PFNMAP vmas" }, - "CVE-2021-34556": { - "cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4" + "CVE-2018-20511": { + "cmt_msg": "net/appletalk: fix minor pointer leak to userspace in SIOCFINDIPDDPRT" }, - "CVE-2021-28714": { - "cmt_msg": "xen/netback: fix rx queue stall detection" + "CVE-2019-1125": { + "cmt_msg": "x86/speculation: Prepare entry code for Spectre v1 swapgs mitigations" }, - "CVE-2021-39714": { - "cmt_msg": "staging: android: ion: Drop ion_map_kernel interface" + "CVE-2019-15218": { + "cmt_msg": "media: usb: siano: Fix general protection fault in smsusb" }, - "CVE-2017-18261": { - "cmt_msg": "clocksource/drivers/arm_arch_timer: Avoid infinite recursion when ftrace is enabled" + "CVE-2019-15666": { + "cmt_msg": "xfrm: policy: Fix out-of-bound array accesses in __xfrm_policy_unlink" }, - "CVE-2022-1247": { + "CVE-2005-3660": { "cmt_msg": "" }, - "CVE-2022-2991": { - "cmt_msg": "remove the lightnvm subsystem" + "CVE-2019-15212": { + "cmt_msg": "USB: rio500: refuse more than one device at a time" }, - "CVE-2022-3621": { - "cmt_msg": "nilfs2: fix NULL pointer dereference at nilfs_bmap_lookup_at_level()" + "CVE-2019-15211": { + "cmt_msg": "media: radio-raremono: change devm_k*alloc to k*alloc" }, - "CVE-2022-23960": { - "cmt_msg": "ARM: report Spectre v2 status through sysfs" + "CVE-2023-1095": { + "cmt_msg": "netfilter: nf_tables: fix null deref due to zeroed list head" }, - "CVE-2023-51781": { - "cmt_msg": "appletalk: Fix Use-After-Free in atalk_ioctl" + "CVE-2019-15217": { + "cmt_msg": "media: usb:zr364xx:Fix KASAN:null-ptr-deref Read in zr364xx_vidioc_querycap" }, - "CVE-2022-3624": { - "cmt_msg": "bonding: fix reference count leak in balance-alb mode" + "CVE-2019-15216": { + "cmt_msg": "USB: yurex: Fix protection fault after device removal" }, - "CVE-2022-2588": { - "cmt_msg": "net_sched: cls_route: remove from list when handle is 0" + "CVE-2019-15215": { + "cmt_msg": "media: cpia2_usb: first wake up, then free in disconnect" }, - "CVE-2021-3669": { - "cmt_msg": "ipc: replace costly bailout check in sysvipc_find_ipc()" + "CVE-2019-15214": { + "cmt_msg": "ALSA: core: Fix card races between register and disconnect" }, - "CVE-2019-18885": { - "cmt_msg": "btrfs: merge btrfs_find_device and find_device" + "CVE-2020-24588": { + "cmt_msg": "cfg80211: mitigate A-MSDU aggregation attacks" }, - "CVE-2020-10708": { - "cmt_msg": "" + "CVE-2021-33034": { + "cmt_msg": "Bluetooth: verify AMP hci_chan before amp_destroy" }, - "CVE-2023-1095": { - "cmt_msg": "netfilter: nf_tables: fix null deref due to zeroed list head" + "CVE-2019-19922": { + "cmt_msg": "sched/fair: Fix low cpu usage with high throttling by removing expiration of cpu-local slices" }, - "CVE-2019-11091": { - "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" + "CVE-2019-19927": { + "cmt_msg": "drm/ttm: fix incrementing the page pointer for huge pages" }, - "CVE-2022-3239": { - "cmt_msg": "media: em28xx: initialize refcount before kref_get" + "CVE-2017-18509": { + "cmt_msg": "ipv6: check sk sk_type and protocol early in ip_mroute_set/getsockopt" }, - "CVE-2022-4543": { - "cmt_msg": "" + "CVE-2017-5986": { + "cmt_msg": "sctp: avoid BUG_ON on sctp_wait_for_sndbuf" }, - "CVE-2023-4921": { - "cmt_msg": "net: sched: sch_qfq: Fix UAF in qfq_dequeue()" + "CVE-2023-52528": { + "cmt_msg": "net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg" }, - "CVE-2023-1829": { - "cmt_msg": "net/sched: Retire tcindex classifier" + "CVE-2023-52598": { + "cmt_msg": "s390/ptrace: handle setting of fpc register correctly" }, - "CVE-2023-1390": { - "cmt_msg": "tipc: fix NULL deref in tipc_link_xmit()" + "CVE-2016-3857": { + "cmt_msg": "arm: oabi compat: add missing access checks" }, - "CVE-2024-0775": { - "cmt_msg": "ext4: improve error recovery code paths in __ext4_remount()" + "CVE-2022-32296": { + "cmt_msg": "tcp: increase source port perturb table to 2^16" }, - "CVE-2023-4881": { - "cmt_msg": "netfilter: nftables: exthdr: fix 4-byte stack OOB write" + "CVE-2020-28974": { + "cmt_msg": "vt: Disable KD_FONT_OP_COPY" }, - "CVE-2013-7445": { - "cmt_msg": "" + "CVE-2023-3567": { + "cmt_msg": "vc_screen: move load of struct vc_data pointer in vcs_read() to avoid UAF" }, - "CVE-2022-28390": { - "cmt_msg": "can: ems_usb: ems_usb_start_xmit(): fix double dev_kfree_skb() in error path" + "CVE-2019-20806": { + "cmt_msg": "media: tw5864: Fix possible NULL pointer dereference in tw5864_handle_frame" }, - "CVE-2023-6931": { - "cmt_msg": "perf: Fix perf_event_validate_size()" + "CVE-2022-3028": { + "cmt_msg": "af_key: Do not call xfrm_probe_algs in parallel" }, - "CVE-2022-38096": { - "cmt_msg": "" + "CVE-2017-16648": { + "cmt_msg": "dvb_frontend: don't use-after-free the frontend struct" }, - "CVE-2022-3303": { - "cmt_msg": "ALSA: pcm: oss: Fix race at SNDCTL_DSP_SYNC" + "CVE-2020-14304": { + "cmt_msg": "" }, - "CVE-2019-19039": { - "cmt_msg": "btrfs: Don't submit any btree write bio if the fs has errors" + "CVE-2010-5321": { + "cmt_msg": "" }, - "CVE-2017-5715": { - "cmt_msg": "x86/cpufeatures: Add X86_BUG_SPECTRE_V[12]" + "CVE-2020-15393": { + "cmt_msg": "usb: usbtest: fix missing kfree(dev->buf) in usbtest_disconnect" }, - "CVE-2023-23455": { - "cmt_msg": "net: sched: atm: dont intepret cls results when asked to drop" + "CVE-2022-33981": { + "cmt_msg": "floppy: disable FDRAWCMD by default" }, - "CVE-2023-23454": { - "cmt_msg": "net: sched: cbq: dont intepret cls results when asked to drop" + "CVE-2021-3564": { + "cmt_msg": "Bluetooth: fix the erroneous flush_work() order" }, - "CVE-2022-20148": { - "cmt_msg": "f2fs: fix UAF in f2fs_available_free_memory" + "CVE-2019-9506": { + "cmt_msg": "Bluetooth: Fix faulty expression for minimum encryption key size check" }, - "CVE-2018-3620": { - "cmt_msg": "x86/microcode: Allow late microcode loading with SMT disabled" + "CVE-2023-1476": { + "cmt_msg": "" }, - "CVE-2023-6932": { - "cmt_msg": "ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet" + "CVE-2017-16995": { + "cmt_msg": "bpf: fix incorrect sign extension in check_alu_op()" }, - "CVE-2019-12615": { - "cmt_msg": "mdesc: fix a missing-check bug in get_vdev_port_node_info()" + "CVE-2019-18675": { + "cmt_msg": "mmap: introduce sane default mmap limits" }, - "CVE-2021-33631": { - "cmt_msg": "ext4: fix kernel BUG in 'ext4_write_inline_data_end()'" + "CVE-2019-2025": { + "cmt_msg": "binder: fix race that allows malicious free of live buffer" }, - "CVE-2022-28388": { - "cmt_msg": "can: usb_8dev: usb_8dev_start_xmit(): fix double dev_kfree_skb() in error path" + "CVE-2017-2583": { + "cmt_msg": "KVM: x86: fix emulation of \"MOV SS, null selector\"" }, - "CVE-2024-26598": { - "cmt_msg": "KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache" + "CVE-2020-26560": { + "cmt_msg": "" }, - "CVE-2020-12362": { - "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" + "CVE-2017-2584": { + "cmt_msg": "KVM: x86: Introduce segmented_write_std" }, - "CVE-2020-12363": { - "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" + "CVE-2023-39198": { + "cmt_msg": "drm/qxl: fix UAF on handle creation" }, - "CVE-2022-4129": { - "cmt_msg": "l2tp: Serialize access to sk_user_data with sk_callback_lock" + "CVE-2023-42752": { + "cmt_msg": "igmp: limit igmpv3_newpack() packet size to IP_MAX_MTU" }, - "CVE-2020-12364": { - "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" + "CVE-2018-12127": { + "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" }, - "CVE-2023-26545": { - "cmt_msg": "net: mpls: fix stale pointer if allocation fails during device rename" + "CVE-2018-12126": { + "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" }, - "CVE-2011-4916": { - "cmt_msg": "" + "CVE-2022-23816": { + "cmt_msg": "x86/kvm/vmx: Make noinstr clean" }, - "CVE-2023-3117": { - "cmt_msg": "netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE" + "CVE-2022-1048": { + "cmt_msg": "ALSA: pcm: Fix races among concurrent hw_params and hw_free calls" }, - "CVE-2019-20811": { - "cmt_msg": "net-sysfs: call dev_hold if kobject_init_and_add success" + "CVE-2017-9077": { + "cmt_msg": "ipv6/dccp: do not inherit ipv6_mc_list from parent" }, - "CVE-2023-3111": { - "cmt_msg": "btrfs: unset reloc control if transaction commit fails in prepare_to_relocate()" + "CVE-2017-9076": { + "cmt_msg": "ipv6/dccp: do not inherit ipv6_mc_list from parent" }, - "CVE-2023-6356": { + "CVE-2023-37454": { "cmt_msg": "" }, - "CVE-2022-26373": { - "cmt_msg": "x86/speculation: Add RSB VM Exit protections" - }, - "CVE-2018-5995": { - "cmt_msg": "printk: hash addresses printed with %p" + "CVE-2023-35824": { + "cmt_msg": "media: dm1105: Fix use after free bug in dm1105_remove due to race condition" }, - "CVE-2019-15290": { - "cmt_msg": "" + "CVE-2022-20572": { + "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag" }, - "CVE-2023-3212": { - "cmt_msg": "gfs2: Don't deref jdesc in evict" + "CVE-2018-10021": { + "cmt_msg": "scsi: libsas: defer ata device eh commands to libata" }, - "CVE-2024-23848": { + "CVE-2024-24858": { "cmt_msg": "" }, - "CVE-2018-7273": { - "cmt_msg": "printk: hash addresses printed with %p" - }, - "CVE-2023-4459": { - "cmt_msg": "net: vmxnet3: fix possible NULL pointer dereference in vmxnet3_rq_cleanup()" + "CVE-2023-39194": { + "cmt_msg": "net: xfrm: Fix xfrm_address_filter OOB read" }, - "CVE-2022-2153": { - "cmt_msg": "KVM: x86: Avoid theoretical NULL pointer dereference in kvm_irq_delivery_to_apic_fast()" + "CVE-2023-39197": { + "cmt_msg": "netfilter: conntrack: dccp: copy entire header to stack buffer, not just basic one" }, - "CVE-2022-20566": { - "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free caused by l2cap_chan_put" + "CVE-2023-52489": { + "cmt_msg": "mm/sparsemem: fix race in accessing memory_section->usage" }, - "CVE-2018-12930": { - "cmt_msg": "" + "CVE-2019-10126": { + "cmt_msg": "mwifiex: Fix heap overflow in mwifiex_uap_parse_tail_ies()" }, - "CVE-2018-12931": { - "cmt_msg": "" + "CVE-2023-3106": { + "cmt_msg": "xfrm: fix crash in XFRM_MSG_GETSA netlink handler" }, - "CVE-2023-1990": { - "cmt_msg": "nfc: st-nci: Fix use after free bug in ndlc_remove due to race condition" + "CVE-2019-13631": { + "cmt_msg": "Input: gtco - bounds check collection indent level" }, - "CVE-2021-33098": { - "cmt_msg": "ixgbe: fix large MTU request from VF" + "CVE-2023-52584": { + "cmt_msg": "spmi: mediatek: Fix UAF on device remove" }, - "CVE-2019-12381": { - "cmt_msg": "ip_sockglue: Fix missing-check bug in ip_ra_control()" + "CVE-2020-13974": { + "cmt_msg": "vt: keyboard: avoid signed integer overflow in k_ascii" }, - "CVE-2022-48619": { - "cmt_msg": "Input: add bounds checking to input_set_capability()" + "CVE-2017-6001": { + "cmt_msg": "perf/core: Fix concurrent sys_perf_event_open() vs. 'move_group' race" }, - "CVE-2024-24860": { - "cmt_msg": "Bluetooth: Fix atomicity violation in {min,max}_key_size_set" + "CVE-2021-4083": { + "cmt_msg": "fget: check that the fd still exists after getting a ref to it" }, - "CVE-2017-13166": { - "cmt_msg": "media: v4l2-ioctl.c: use check_fmt for enum/g/s/try_fmt" + "CVE-2023-33288": { + "cmt_msg": "power: supply: bq24190: Fix use after free bug in bq24190_remove due to race condition" }, - "CVE-2018-12207": { - "cmt_msg": "kvm: x86, powerpc: do not allow clearing largepages debugfs entry" + "CVE-2018-10938": { + "cmt_msg": "Cipso: cipso_v4_optptr enter infinite loop" }, - "CVE-2024-25740": { - "cmt_msg": "" + "CVE-2023-52484": { + "cmt_msg": "iommu/arm-smmu-v3: Fix soft lockup triggered by arm_smmu_mm_invalidate_range" }, - "CVE-2022-33740": { - "cmt_msg": "xen/netfront: fix leaking data in shared pages" + "CVE-2022-29900": { + "cmt_msg": "x86/kvm/vmx: Make noinstr clean" }, - "CVE-2022-3903": { - "cmt_msg": "media: mceusb: Use new usb_control_msg_*() routines" + "CVE-2022-29901": { + "cmt_msg": "x86/kvm/vmx: Make noinstr clean" }, - "CVE-2023-20588": { - "cmt_msg": "x86/CPU/AMD: Do not leak quotient data after a division by 0" + "CVE-2018-12233": { + "cmt_msg": "jfs: Fix inconsistency between memory allocation and ea_buf->max_size" }, - "CVE-2022-44033": { - "cmt_msg": "char: pcmcia: remove all the drivers" + "CVE-2019-18282": { + "cmt_msg": "net/flow_dissector: switch to siphash" }, - "CVE-2022-44032": { - "cmt_msg": "char: pcmcia: remove all the drivers" + "CVE-2020-10751": { + "cmt_msg": "selinux: properly handle multiple messages in selinux_netlink_send()" }, - "CVE-2018-10322": { - "cmt_msg": "xfs: enhance dinode verifier" + "CVE-2022-3567": { + "cmt_msg": "ipv6: Fix data races around sk->sk_prot." }, - "CVE-2019-10220": { - "cmt_msg": "Convert filldir[64]() from __put_user() to unsafe_put_user()" + "CVE-2021-4002": { + "cmt_msg": "hugetlbfs: flush TLBs correctly after huge_pmd_unshare" }, - "CVE-2021-0929": { - "cmt_msg": "staging/android/ion: delete dma_buf->kmap/unmap implemenation" + "CVE-2018-9465": { + "cmt_msg": "binder: fix proc->files use-after-free" }, - "CVE-2023-52456": { - "cmt_msg": "serial: imx: fix tx statemachine deadlock" + "CVE-2018-20510": { + "cmt_msg": "binder: replace \"%p\" with \"%pK\"" }, - "CVE-2023-0615": { - "cmt_msg": "media: vivid: dev->bitmap_cap wasn't freed in all cases" + "CVE-2022-20166": { + "cmt_msg": "drivers core: Use sysfs_emit and sysfs_emit_at for show(device *...) functions" }, - "CVE-2020-26145": { - "cmt_msg": "ath10k: drop fragments with multicast DA for PCIe" + "CVE-2016-5728": { + "cmt_msg": "misc: mic: Fix for double fetch security bug in VOP driver" }, - "CVE-2022-3586": { - "cmt_msg": "sch_sfb: Don't assume the skb is still around after enqueueing to child" + "CVE-2020-15436": { + "cmt_msg": "block: Fix use-after-free in blkdev_get()" }, - "CVE-2019-2181": { - "cmt_msg": "binder: check for overflow when alloc for security context" + "CVE-2022-1116": { + "cmt_msg": "" }, - "CVE-2020-27820": { - "cmt_msg": "drm/nouveau: use drm_dev_unplug() during device removal" + "CVE-2021-28660": { + "cmt_msg": "staging: rtl8188eu: prevent ->ssid overflow in rtw_wx_set_scan()" }, - "CVE-2023-39194": { - "cmt_msg": "net: xfrm: Fix xfrm_address_filter OOB read" + "CVE-2024-0775": { + "cmt_msg": "ext4: improve error recovery code paths in __ext4_remount()" }, - "CVE-2020-0067": { - "cmt_msg": "f2fs: fix to avoid memory leakage in f2fs_listxattr" + "CVE-2020-8647": { + "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region" }, - "CVE-2023-4622": { - "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES" + "CVE-2022-3564": { + "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free caused by l2cap_reassemble_sdu" }, - "CVE-2023-39193": { - "cmt_msg": "netfilter: xt_sctp: validate the flag_info count" + "CVE-2019-0155": { + "cmt_msg": "drm/i915: Rename gen7 cmdparser tables" }, - "CVE-2023-39192": { - "cmt_msg": "netfilter: xt_u32: validate user space input" + "CVE-2019-0154": { + "cmt_msg": "drm/i915: Lower RM timeout to avoid DSI hard hangs" }, - "CVE-2020-26541": { - "cmt_msg": "certs: Add EFI_CERT_X509_GUID support for dbx entries" + "CVE-2023-52481": { + "cmt_msg": "arm64: errata: Add Cortex-A520 speculative unprivileged load workaround" }, - "CVE-2023-6610": { - "cmt_msg": "smb: client: fix potential OOB in smb2_dump_detail()" + "CVE-2023-52585": { + "cmt_msg": "drm/amdgpu: Fix possible NULL dereference in amdgpu_ras_query_error_status_helper()" }, - "CVE-2023-3390": { - "cmt_msg": "netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE" + "CVE-2021-47145": { + "cmt_msg": "btrfs: do not BUG_ON in link_to_fixup_dir" }, - "CVE-2021-20317": { - "cmt_msg": "lib/timerqueue: Rely on rbtree semantics for next timer" + "CVE-2023-52587": { + "cmt_msg": "IB/ipoib: Fix mcast list locking" }, - "CVE-2021-33061": { - "cmt_msg": "ixgbe: add improvement for MDD response functionality" + "CVE-2023-52586": { + "cmt_msg": "drm/msm/dpu: Add mutex lock in control vblank irq" }, - "CVE-2023-1476": { - "cmt_msg": "" + "CVE-2021-47149": { + "cmt_msg": "net: fujitsu: fix potential null-ptr-deref" }, - "CVE-2017-18552": { - "cmt_msg": "RDS: validate the requested traces user input against max supported" + "CVE-2022-3566": { + "cmt_msg": "tcp: Fix data races around icsk->icsk_af_ops." }, - "CVE-2022-1652": { - "cmt_msg": "floppy: use a statically allocated error counter" + "CVE-2022-3565": { + "cmt_msg": "mISDN: fix use-after-free bugs in l1oip timer handlers" }, - "CVE-2023-1670": { - "cmt_msg": "xirc2ps_cs: Fix use after free bug in xirc2ps_detach" + "CVE-2021-47065": { + "cmt_msg": "rtw88: Fix array overrun in rtw_get_tx_power_params()" }, - "CVE-2023-51043": { - "cmt_msg": "drm/atomic: Fix potential use-after-free in nonblocking commits" + "CVE-2020-36386": { + "cmt_msg": "Bluetooth: Fix slab-out-of-bounds read in hci_extended_inquiry_result_evt()" }, - "CVE-2022-2978": { - "cmt_msg": "fs: fix UAF/GPF bug in nilfs_mdt_destroy" + "CVE-2021-47144": { + "cmt_msg": "drm/amd/amdgpu: fix refcount leak" }, - "CVE-2019-9453": { - "cmt_msg": "f2fs: fix to avoid accessing xattr across the boundary" + "CVE-2021-47147": { + "cmt_msg": "ptp: ocp: Fix a resource leak in an error handling path" }, - "CVE-2023-20569": { - "cmt_msg": "x86/bugs: Increase the x86 bugs vector size to two u32s" + "CVE-2017-6347": { + "cmt_msg": "ip: fix IP_CHECKSUM handling" }, - "CVE-2024-26588": { - "cmt_msg": "LoongArch: BPF: Prevent out-of-bounds memory access" + "CVE-2022-3628": { + "cmt_msg": "wifi: brcmfmac: Fix potential buffer overflow in brcmf_fweh_event_worker()" }, - "CVE-2016-8660": { - "cmt_msg": "" + "CVE-2021-47140": { + "cmt_msg": "iommu/amd: Clear DMA ops when switching domain" }, - "CVE-2023-6270": { - "cmt_msg": "" + "CVE-2021-47143": { + "cmt_msg": "net/smc: remove device from smcd_dev_list after failed device_add()" }, - "CVE-2023-3090": { - "cmt_msg": "ipvlan:Fix out-of-bounds caused by unclear skb->cb" + "CVE-2021-47142": { + "cmt_msg": "drm/amdgpu: Fix a use-after-free" }, - "CVE-2023-45862": { - "cmt_msg": "USB: ene_usb6250: Allocate enough memory for full object" + "CVE-2020-36385": { + "cmt_msg": "RDMA/ucma: Rework ucma_migrate_id() to avoid races with destroy" }, - "CVE-2023-45863": { - "cmt_msg": "kobject: Fix slab-out-of-bounds in fill_kobj_path()" + "CVE-2020-0009": { + "cmt_msg": "staging: android: ashmem: Disallow ashmem memory from being remapped" }, - "CVE-2022-1786": { - "cmt_msg": "io_uring: remove io_identity" + "CVE-2023-52340": { + "cmt_msg": "ipv6: remove max_size check inline with ipv4" }, - "CVE-2008-4609": { - "cmt_msg": "" + "CVE-2023-52589": { + "cmt_msg": "media: rkisp1: Fix IRQ disable race issue" }, - "CVE-2023-52457": { - "cmt_msg": "serial: 8250: omap: Don't skip resource freeing if pm_runtime_resume_and_get() failed" + "CVE-2023-52588": { + "cmt_msg": "f2fs: fix to tag gcing flag on page during block migration" }, - "CVE-2018-25020": { - "cmt_msg": "bpf: fix truncated jump targets on heavy expansions" + "CVE-2019-14615": { + "cmt_msg": "drm/i915/gen9: Clear residual context state on context switch" }, - "CVE-2023-26607": { - "cmt_msg": "ntfs: fix out-of-bounds read in ntfs_attr_find()" + "CVE-2022-2503": { + "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag" }, - "CVE-2018-1121": { - "cmt_msg": "" + "CVE-2023-52578": { + "cmt_msg": "net: bridge: use DEV_STATS_INC()" }, - "CVE-2021-4037": { - "cmt_msg": "xfs: fix up non-directory creation in SGID directories" + "CVE-2020-12771": { + "cmt_msg": "bcache: fix potential deadlock problem in btree_gc_coalesce" }, - "CVE-2021-22543": { - "cmt_msg": "KVM: do not allow mapping valid but non-reference-counted pages" + "CVE-2019-13648": { + "cmt_msg": "powerpc/tm: Fix oops on sigreturn on systems without TM" }, - "CVE-2019-1999": { - "cmt_msg": "binder: fix race between munmap() and direct reclaim" + "CVE-2023-0030": { + "cmt_msg": "drm/nouveau/mmu: add more general vmm free/node handling functions" }, - "CVE-2023-20941": { - "cmt_msg": "" + "CVE-2020-16120": { + "cmt_msg": "ovl: switch to mounter creds in readdir" }, - "CVE-2019-7308": { - "cmt_msg": "bpf: fix sanitation of alu op with pointer / scalar type from different paths" + "CVE-2019-11599": { + "cmt_msg": "coredump: fix race condition between mmget_not_zero()/get_task_mm() and core dumping" }, - "CVE-2022-1966": { - "cmt_msg": "netfilter: nf_tables: disallow non-stateful expression in sets earlier" + "CVE-2018-16658": { + "cmt_msg": "cdrom: Fix info leak/OOB read in cdrom_ioctl_drive_status" }, - "CVE-2017-9986": { - "cmt_msg": "sound: Retire OSS" + "CVE-2018-15572": { + "cmt_msg": "x86/speculation: Protect against userspace-userspace spectreRSB" }, - "CVE-2023-3772": { - "cmt_msg": "xfrm: add NULL check in xfrm_update_ae_params" + "CVE-2022-1204": { + "cmt_msg": "ax25: Fix refcount leaks caused by ax25_cb_del()" }, - "CVE-2022-3533": { - "cmt_msg": "" + "CVE-2019-2101": { + "cmt_msg": "media: uvcvideo: Fix 'type' check leading to overflow" }, - "CVE-2022-3534": { - "cmt_msg": "libbpf: Fix use-after-free in btf_dump_name_dups" + "CVE-2019-17666": { + "cmt_msg": "rtlwifi: Fix potential overflow on P2P code" }, - "CVE-2023-28328": { - "cmt_msg": "media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer()" + "CVE-2018-9363": { + "cmt_msg": "Bluetooth: hidp: buffer overflow in hidp_process_report" }, - "CVE-2023-0386": { - "cmt_msg": "ovl: fail on invalid uid/gid mapping at copy up" + "CVE-2015-7885": { + "cmt_msg": "staging/dgnc: fix info leak in ioctl" }, - "CVE-2017-13693": { - "cmt_msg": "" + "CVE-2016-10723": { + "cmt_msg": "mm, oom: remove sleep from under oom_lock" }, - "CVE-2017-13694": { - "cmt_msg": "" + "CVE-2020-25212": { + "cmt_msg": "nfs: Fix getxattr kernel panic and memory overflow" }, - "CVE-2021-4149": { - "cmt_msg": "btrfs: unlock newly allocated extent buffer after error" + "CVE-2019-19036": { + "cmt_msg": "btrfs: Detect unbalanced tree with empty leaf before crashing btree operations" }, - "CVE-2022-42896": { - "cmt_msg": "Bluetooth: L2CAP: Fix accepting connection request for invalid SPSM" + "CVE-2019-3459": { + "cmt_msg": "Bluetooth: Verify that l2cap_get_conf_opt provides large enough buffer" }, - "CVE-2022-42895": { - "cmt_msg": "Bluetooth: L2CAP: Fix attempting to access uninitialized memory" + "CVE-2020-11494": { + "cmt_msg": "slcan: Don't transmit uninitialized stack data in padding" }, - "CVE-2024-24859": { - "cmt_msg": "" + "CVE-2019-19039": { + "cmt_msg": "btrfs: Don't submit any btree write bio if the fs has errors" }, - "CVE-2024-24858": { - "cmt_msg": "" + "CVE-2020-0444": { + "cmt_msg": "audit: fix error handling in audit_data_to_entry()" }, - "CVE-2024-24855": { - "cmt_msg": "scsi: lpfc: Fix a possible data race in lpfc_unregister_fcf_rescan()" + "CVE-2022-1974": { + "cmt_msg": "nfc: replace improper check device_is_registered() in netlink related functions" }, - "CVE-2024-24857": { - "cmt_msg": "" + "CVE-2020-8832": { + "cmt_msg": "drm/i915: Record the default hw state after reset upon load" }, - "CVE-2021-39648": { - "cmt_msg": "usb: gadget: configfs: Fix use-after-free issue with udc_name" + "CVE-2021-47125": { + "cmt_msg": "sch_htb: fix refcount leak in htb_parent_to_leaf_offload" }, - "CVE-2022-3545": { - "cmt_msg": "nfp: fix use-after-free in area_cache_get()" + "CVE-2024-26743": { + "cmt_msg": "RDMA/qedr: Fix qedr_create_user_qp error flow" }, - "CVE-2022-3542": { - "cmt_msg": "bnx2x: fix potential memory leak in bnx2x_tpa_stop()" + "CVE-2022-1836": { + "cmt_msg": "floppy: disable FDRAWCMD by default" }, - "CVE-2019-16921": { - "cmt_msg": "RDMA/hns: Fix init resp when alloc ucontext" + "CVE-2024-26793": { + "cmt_msg": "gtp: fix use-after-free and null-ptr-deref in gtp_newlink()" }, - "CVE-2023-1838": { - "cmt_msg": "Fix double fget() in vhost_net_set_backend()" + "CVE-2021-32078": { + "cmt_msg": "ARM: footbridge: remove personal server platform" }, - "CVE-2023-1382": { - "cmt_msg": "tipc: set con sock in tipc_conn_alloc" + "CVE-2023-52532": { + "cmt_msg": "net: mana: Fix TX CQE error handling" }, - "CVE-2023-1380": { - "cmt_msg": "wifi: brcmfmac: slab-out-of-bounds read in brcmf_get_assoc_ies()" + "CVE-2024-26798": { + "cmt_msg": "fbcon: always restore the old font data in fbcon_do_set_font()" }, - "CVE-2020-0347": { - "cmt_msg": "" + "CVE-2022-20148": { + "cmt_msg": "f2fs: fix UAF in f2fs_available_free_memory" }, - "CVE-2022-41222": { - "cmt_msg": "mm/mremap: hold the rmap lock in write mode when moving page table entries." + "CVE-2022-4662": { + "cmt_msg": "USB: core: Prevent nested device-reset calls" }, - "CVE-2022-27223": { - "cmt_msg": "USB: gadget: validate endpoint index for xilinx udc" + "CVE-2019-11833": { + "cmt_msg": "ext4: zero out the unused memory region in the extent tree block" }, - "CVE-2022-1353": { - "cmt_msg": "af_key: add __GFP_ZERO flag for compose_sadb_supported in function pfkey_register" + "CVE-2021-38205": { + "cmt_msg": "net: xilinx_emaclite: Do not print real IOMEM pointer" }, - "CVE-2019-12456": { + "CVE-2021-3864": { "cmt_msg": "" }, - "CVE-2017-18174": { - "cmt_msg": "pinctrl: amd: Use devm_pinctrl_register() for pinctrl registration" - }, - "CVE-2021-33656": { - "cmt_msg": "vt: drop old FONT ioctls" + "CVE-2020-0255": { + "cmt_msg": "selinux: properly handle multiple messages in selinux_netlink_send()" }, - "CVE-2021-33655": { - "cmt_msg": "fbcon: Disallow setting font bigger than screen size" + "CVE-2016-6130": { + "cmt_msg": "s390/sclp_ctl: fix potential information leak with /dev/sclp" }, - "CVE-2022-41858": { - "cmt_msg": "drivers: net: slip: fix NPD bug in sl_tx_timeout()" + "CVE-2019-2215": { + "cmt_msg": "ANDROID: binder: remove waitqueue when thread exits." }, - "CVE-2023-1206": { - "cmt_msg": "tcp: Reduce chance of collisions in inet6_hashfn()." + "CVE-2023-35001": { + "cmt_msg": "netfilter: nf_tables: prevent OOB access in nft_byteorder_eval" }, - "CVE-2022-41850": { - "cmt_msg": "HID: roccat: Fix use-after-free in roccat_read()" + "CVE-2021-38208": { + "cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect" }, - "CVE-2023-2985": { - "cmt_msg": "fs: hfsplus: fix UAF issue in hfsplus_put_super" + "CVE-2017-18232": { + "cmt_msg": "scsi: libsas: direct call probe and destruct" }, - "CVE-2022-3649": { - "cmt_msg": "nilfs2: fix use-after-free bug of struct nilfs_root" + "CVE-2019-2213": { + "cmt_msg": "binder: fix possible UAF when freeing buffer" }, - "CVE-2022-3646": { - "cmt_msg": "nilfs2: fix leak of nilfs_root in case of writer thread creation failure" + "CVE-2024-26677": { + "cmt_msg": "rxrpc: Fix delayed ACKs to not set the reference serial number" }, - "CVE-2021-45469": { - "cmt_msg": "f2fs: fix to do sanity check on last xattr entry in __f2fs_setxattr()" + "CVE-2020-25211": { + "cmt_msg": "netfilter: ctnetlink: add a range check for l3/l4 protonum" }, - "CVE-2022-1184": { - "cmt_msg": "ext4: verify dir block before splitting it" + "CVE-2017-14140": { + "cmt_msg": "Sanitize 'move_pages()' permission checks" }, - "CVE-2022-3642": { + "CVE-2020-26556": { "cmt_msg": "" }, - "CVE-2022-3643": { - "cmt_msg": "xen/netback: Ensure protocol headers don't fall in the non-linear area" - }, - "CVE-2024-0584": { - "cmt_msg": "ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet" - }, - "CVE-2021-4218": { - "cmt_msg": "sysctl: pass kernel pointers to ->proc_handler" + "CVE-2018-9518": { + "cmt_msg": "NFC: llcp: Limit size of SDP URI" }, - "CVE-2024-25739": { - "cmt_msg": "" + "CVE-2024-26671": { + "cmt_msg": "blk-mq: fix IO hang from sbitmap wakeup race" }, - "CVE-2024-0340": { - "cmt_msg": "vhost: use kzalloc() instead of kmalloc() followed by memset()" + "CVE-2020-26555": { + "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical" }, - "CVE-2023-6535": { - "cmt_msg": "" + "CVE-2024-26776": { + "cmt_msg": "spi: hisi-sfc-v3xx: Return IRQ_NONE if no interrupts were detected" }, - "CVE-2023-6536": { - "cmt_msg": "" + "CVE-2024-26777": { + "cmt_msg": "fbdev: sis: Error out if pixclock equals zero" }, - "CVE-2022-23036": { - "cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()" + "CVE-2018-9517": { + "cmt_msg": "l2tp: pass tunnel pointer to ->session_create()" }, - "CVE-2018-17977": { - "cmt_msg": "" + "CVE-2018-9516": { + "cmt_msg": "HID: debug: check length before copy_to_user()" }, - "CVE-2010-5321": { + "CVE-2023-3397": { "cmt_msg": "" }, - "CVE-2022-21385": { - "cmt_msg": "net/rds: fix warn in rds_message_alloc_sgs" + "CVE-2020-36775": { + "cmt_msg": "f2fs: fix to avoid potential deadlock" }, - "CVE-2017-5967": { - "cmt_msg": "time: Remove CONFIG_TIMER_STATS" + "CVE-2024-26679": { + "cmt_msg": "inet: read sk->sk_family once in inet_recv_error()" }, - "CVE-2022-3169": { - "cmt_msg": "nvme: ensure subsystem reset is single threaded" + "CVE-2023-52478": { + "cmt_msg": "HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect" }, - "CVE-2022-36280": { - "cmt_msg": "drm/vmwgfx: Validate the box size for the snooped cursor" + "CVE-2018-1128": { + "cmt_msg": "libceph: add authorizer challenge" }, - "CVE-2019-2054": { - "cmt_msg": "arm/ptrace: run seccomp after ptrace" + "CVE-2018-1129": { + "cmt_msg": "libceph: implement CEPHX_V2 calculation mode" }, - "CVE-2023-22995": { - "cmt_msg": "usb: dwc3: dwc3-qcom: Add missing platform_device_put() in dwc3_qcom_acpi_register_core" + "CVE-2021-47083": { + "cmt_msg": "pinctrl: mediatek: fix global-out-of-bounds issue" }, - "CVE-2024-21803": { - "cmt_msg": "" + "CVE-2023-52594": { + "cmt_msg": "wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus()" }, "CVE-2022-26365": { "cmt_msg": "xen/blkfront: fix leaking data in shared pages" }, - "CVE-2023-30456": { - "cmt_msg": "KVM: nVMX: add missing consistency checks for CR0 and CR4" + "CVE-2022-21125": { + "cmt_msg": "x86/speculation/mmio: Reuse SRBDS mitigation for SBDS" }, - "CVE-2020-12656": { - "cmt_msg": "sunrpc: check that domain table is empty at module unload." + "CVE-2018-1120": { + "cmt_msg": "proc: do not access cmdline nor environ from file-backed areas" }, - "CVE-2022-23040": { - "cmt_msg": "xen/xenbus: don't let xenbus_grant_ring() remove grants in error case" + "CVE-2018-1121": { + "cmt_msg": "" }, - "CVE-2022-23042": { - "cmt_msg": "xen/netfront: react properly to failing gnttab_end_foreign_access_ref()" + "CVE-2018-20856": { + "cmt_msg": "block: blk_init_allocated_queue() set q->fq as NULL in the fail case" }, - "CVE-2018-12929": { - "cmt_msg": "" + "CVE-2023-28746": { + "cmt_msg": "x86/mmio: Disable KVM mitigation when X86_FEATURE_CLEAR_CPU_BUF is set" }, - "CVE-2019-12380": { - "cmt_msg": "efi/x86/Add missing error handling to old_memmap 1:1 mapping code" + "CVE-2023-52451": { + "cmt_msg": "powerpc/pseries/memhp: Fix access beyond end of drmem array" }, - "CVE-2020-36310": { - "cmt_msg": "KVM: SVM: avoid infinite loop on NPF from bad address" + "CVE-2017-5754": { + "cmt_msg": "x86/cpufeatures: Add Intel feature bits for Speculation Control" }, - "CVE-2020-36313": { - "cmt_msg": "KVM: Fix out of range accesses to memslots" + "CVE-2021-47119": { + "cmt_msg": "ext4: fix memory leak in ext4_fill_super" }, - "CVE-2024-26592": { - "cmt_msg": "ksmbd: fix UAF issue in ksmbd_tcp_new_connection()" + "CVE-2016-10200": { + "cmt_msg": "l2tp: fix racy SOCK_ZAPPED flag check in l2tp_ip{,6}_bind()" }, - "CVE-2019-12382": { - "cmt_msg": "drm/edid: Fix a missing-check bug in drm_load_edid_firmware()" + "CVE-2017-5753": { + "cmt_msg": "x86/cpufeatures: Add X86_BUG_SPECTRE_V[12]" }, - "CVE-2022-4744": { - "cmt_msg": "tun: avoid double free in tun_free_netdev" + "CVE-2022-20158": { + "cmt_msg": "net/packet: fix slab-out-of-bounds access in packet_recvmsg()" }, - "CVE-2022-0400": { - "cmt_msg": "" + "CVE-2024-1086": { + "cmt_msg": "netfilter: nf_tables: reject QUEUE/DROP verdict parameters" }, - "CVE-2024-25741": { + "CVE-2024-22386": { "cmt_msg": "" }, - "CVE-2022-26966": { - "cmt_msg": "sr9700: sanity check for packet length" + "CVE-2016-10208": { + "cmt_msg": "ext4: validate s_first_meta_bg at mount time" }, - "CVE-2021-42739": { - "cmt_msg": "media: firewire: firedtv-avc: fix a buffer overflow in avc_ca_pmt()" + "CVE-2020-11565": { + "cmt_msg": "mm: mempolicy: require at least one nodeid for MPOL_PREFERRED" }, - "CVE-2023-1989": { - "cmt_msg": "Bluetooth: btsdio: fix use after free bug in btsdio_remove due to unfinished work" + "CVE-2019-19049": { + "cmt_msg": "of: unittest: fix memory leak in unittest_data_add" }, - "CVE-2022-20369": { - "cmt_msg": "media: v4l2-mem2mem: Apply DST_QUEUE_OFF_BASE on MMAP buffers across ioctls" + "CVE-2020-27784": { + "cmt_msg": "usb: gadget: function: printer: fix use-after-free in __lock_acquire" }, - "CVE-2022-25265": { - "cmt_msg": "" + "CVE-2018-13053": { + "cmt_msg": "alarmtimer: Prevent overflow for relative nanosleep" }, - "CVE-2022-20368": { - "cmt_msg": "net/packet: fix slab-out-of-bounds access in packet_recvmsg()" + "CVE-2020-27786": { + "cmt_msg": "ALSA: rawmidi: Fix racy buffer resize under concurrent accesses" }, - "CVE-2022-21499": { - "cmt_msg": "lockdown: also lock down previous kgdb use" + "CVE-2019-14816": { + "cmt_msg": "mwifiex: Fix three heap overflow at parsing element in cfg80211_ap_settings" }, - "CVE-2023-4208": { - "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free" + "CVE-2019-14814": { + "cmt_msg": "mwifiex: Fix three heap overflow at parsing element in cfg80211_ap_settings" }, - "CVE-2023-4206": { - "cmt_msg": "net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free" + "CVE-2024-26700": { + "cmt_msg": "drm/amd/display: Fix MST Null Ptr for RV" }, - "CVE-2023-4207": { - "cmt_msg": "net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free" + "CVE-2024-26706": { + "cmt_msg": "parisc: Fix random data corruption from exception handler" }, - "CVE-2023-3640": { + "CVE-2023-6240": { "cmt_msg": "" }, - "CVE-2023-20593": { - "cmt_msg": "x86/cpu/amd: Add a Zenbleed fix" - }, - "CVE-2023-3022": { - "cmt_msg": "ipv6: Use result arg in fib_lookup_arg consistently" + "CVE-2023-23559": { + "cmt_msg": "wifi: rndis_wlan: Prevent buffer overflow in rndis_query_oid" }, - "CVE-2022-2663": { - "cmt_msg": "netfilter: nf_conntrack_irc: Fix forged IP logic" + "CVE-2020-10720": { + "cmt_msg": "net-gro: fix use-after-free read in napi_gro_frags()" }, - "CVE-2022-43750": { - "cmt_msg": "usb: mon: make mmapped memory read only" + "CVE-2024-26739": { + "cmt_msg": "net/sched: act_mirred: don't override retval if we already lost the skb" }, - "CVE-2023-0047": { - "cmt_msg": "mm, oom: do not trigger out_of_memory from the #PF" + "CVE-2022-0382": { + "cmt_msg": "net ticp:fix a kernel-infoleak in __tipc_sendmsg()" }, - "CVE-2023-4010": { - "cmt_msg": "" + "CVE-2023-32233": { + "cmt_msg": "netfilter: nf_tables: deactivate anonymous set from preparation phase" }, - "CVE-2022-20424": { - "cmt_msg": "io_uring: remove io_identity" + "CVE-2024-26685": { + "cmt_msg": "nilfs2: fix potential bug in end_buffer_async_write" }, - "CVE-2022-20422": { - "cmt_msg": "arm64: fix oops in concurrently setting insn_emulation sysctls" + "CVE-2020-25672": { + "cmt_msg": "nfc: fix memory leak in llcp_sock_connect()" }, - "CVE-2023-4385": { - "cmt_msg": "fs: jfs: fix possible NULL pointer dereference in dbFree()" + "CVE-2020-25673": { + "cmt_msg": "nfc: Avoid endless loops caused by repeated llcp_sock_connect()" }, - "CVE-2023-4387": { - "cmt_msg": "net: vmxnet3: fix possible use-after-free bugs in vmxnet3_rq_alloc_rx_buf()" + "CVE-2020-25670": { + "cmt_msg": "nfc: fix refcount leak in llcp_sock_bind()" }, - "CVE-2019-19378": { - "cmt_msg": "" + "CVE-2020-25671": { + "cmt_msg": "nfc: fix refcount leak in llcp_sock_connect()" }, - "CVE-2022-36879": { - "cmt_msg": "xfrm: xfrm_policy: fix a possible double xfrm_pols_put() in xfrm_bundle_lookup()" + "CVE-2019-15222": { + "cmt_msg": "ALSA: usb-audio: Fix gpf in snd_usb_pipe_sanity_check" }, - "CVE-2022-45934": { - "cmt_msg": "Bluetooth: L2CAP: Fix u8 overflow" + "CVE-2019-15223": { + "cmt_msg": "ALSA: line6: Assure canceling delayed work at disconnection" }, - "CVE-2019-19377": { - "cmt_msg": "btrfs: Don't submit any btree write bio if the fs has errors" + "CVE-2019-15220": { + "cmt_msg": "p54usb: Fix race between disconnect and firmware loading" }, - "CVE-2022-2380": { - "cmt_msg": "video: fbdev: sm712fb: Fix crash in smtcfb_read()" + "CVE-2019-15221": { + "cmt_msg": "ALSA: line6: Fix write on zero-sized buffer" }, - "CVE-2021-4197": { - "cmt_msg": "cgroup: Use open-time credentials for process migraton perm checks" + "CVE-2019-19815": { + "cmt_msg": "f2fs: support swap file w/ DIO" }, - "CVE-2020-24503": { + "CVE-2019-19814": { "cmt_msg": "" }, - "CVE-2020-24502": { - "cmt_msg": "" + "CVE-2020-29371": { + "cmt_msg": "romfs: fix uninitialized memory leak in romfs_dev_read()" }, - "CVE-2019-19449": { - "cmt_msg": "f2fs: fix to do sanity check on segment/section count" + "CVE-2019-19816": { + "cmt_msg": "btrfs: inode: Verify inode mode to avoid NULL pointer dereference" }, - "CVE-2023-1118": { - "cmt_msg": "media: rc: Fix use-after-free bugs caused by ene_tx_irqsim()" + "CVE-2019-9453": { + "cmt_msg": "f2fs: fix to avoid accessing xattr across the boundary" }, - "CVE-2020-11725": { - "cmt_msg": "" + "CVE-2021-47124": { + "cmt_msg": "io_uring: fix link timeout refs" }, - "CVE-2023-7192": { - "cmt_msg": "netfilter: ctnetlink: fix possible refcount leak in ctnetlink_create_conntrack()" + "CVE-2018-18710": { + "cmt_msg": "cdrom: fix improper type cast, which can leat to information leak." }, - "CVE-2022-1263": { - "cmt_msg": "KVM: avoid NULL pointer dereference in kvm_dirty_ring_push" + "CVE-2019-5108": { + "cmt_msg": "mac80211: Do not send Layer 2 Update frame before authorization" }, - "CVE-2021-35477": { - "cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4" + "CVE-2022-1012": { + "cmt_msg": "secure_seq: use the 64 bits of the siphash for port offset calculation" }, "CVE-2023-31436": { "cmt_msg": "net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg" }, - "CVE-2022-47929": { - "cmt_msg": "net: sched: disallow noqueue for qdisc classes" + "CVE-2020-12114": { + "cmt_msg": "make struct mountpoint bear the dentry reference to mountpoint, not struct mount" }, - "CVE-2022-3606": { - "cmt_msg": "" + "CVE-2023-52622": { + "cmt_msg": "ext4: avoid online resizing failures due to oversized flex bg" }, - "CVE-2022-2209": { - "cmt_msg": "" + "CVE-2020-8649": { + "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region" }, - "CVE-2023-7042": { - "cmt_msg": "" + "CVE-2023-52619": { + "cmt_msg": "pstore/ram: Fix crash when setting number of cpus to an odd number" }, - "CVE-2022-3594": { - "cmt_msg": "r8152: Rate limit overflow messages" + "CVE-2023-52625": { + "cmt_msg": "drm/amd/display: Refactor DMCUB enter/exit idle interface" }, - "CVE-2022-3595": { - "cmt_msg": "cifs: fix double-fault crash during ntlmssp" + "CVE-2023-52527": { + "cmt_msg": "ipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data()" }, - "CVE-2023-47233": { - "cmt_msg": "" + "CVE-2023-52628": { + "cmt_msg": "netfilter: nftables: exthdr: fix 4-byte stack OOB write" }, - "CVE-2024-23851": { - "cmt_msg": "dm: limit the number of targets and parameter size area" + "CVE-2020-12656": { + "cmt_msg": "sunrpc: check that domain table is empty at module unload." }, - "CVE-2022-1462": { - "cmt_msg": "tty: use new tty_insert_flip_string_and_push_buffer() in pty_write()" + "CVE-2023-20569": { + "cmt_msg": "x86/bugs: Increase the x86 bugs vector size to two u32s" }, - "CVE-2023-6606": { - "cmt_msg": "smb: client: fix OOB in smbCalcSize()" + "CVE-2021-26931": { + "cmt_msg": "xen-blkback: don't \"handle\" error by BUG()" }, - "CVE-2023-3006": { - "cmt_msg": "arm64: Add AMPERE1 to the Spectre-BHB affected list" + "CVE-2021-26930": { + "cmt_msg": "xen-blkback: fix error handling in xen_blkbk_map()" }, - "CVE-2022-1729": { - "cmt_msg": "perf: Fix sys_perf_event_open() race against self" + "CVE-2021-26932": { + "cmt_msg": "Xen/x86: don't bail early from clear_foreign_p2m_mapping()" }, - "CVE-2019-20908": { - "cmt_msg": "efi: Restrict efivar_ssdt_load when the kernel is locked down" + "CVE-2023-3141": { + "cmt_msg": "memstick: r592: Fix UAF bug in r592_remove due to race condition" }, - "CVE-2023-3776": { - "cmt_msg": "net/sched: cls_fw: Fix improper refcount update leads to use-after-free" + "CVE-2016-9555": { + "cmt_msg": "sctp: validate chunk len before actually using it" }, - "CVE-2023-52435": { - "cmt_msg": "net: prevent mss overflow in skb_segment()" + "CVE-2019-3892": { + "cmt_msg": "coredump: fix race condition between mmget_not_zero()/get_task_mm() and core dumping" }, - "CVE-2023-52434": { - "cmt_msg": "smb: client: fix potential OOBs in smb2_parse_contexts()" + "CVE-2020-12352": { + "cmt_msg": "Bluetooth: A2MP: Fix not initializing all members" }, - "CVE-2023-52436": { - "cmt_msg": "f2fs: explicitly null-terminate the xattr list" + "CVE-2020-12655": { + "cmt_msg": "xfs: add agf freeblocks verify in xfs_agf_verify" }, - "CVE-2022-2964": { - "cmt_msg": "net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup" + "CVE-2022-20132": { + "cmt_msg": "HID: add hid_is_usb() function to make it simpler for USB detection" }, - "CVE-2022-2961": { - "cmt_msg": "" + "CVE-2022-0494": { + "cmt_msg": "block-map: add __GFP_ZERO flag for alloc_page in function bio_copy_kern" }, - "CVE-2021-3506": { - "cmt_msg": "f2fs: fix to avoid out-of-bounds memory access" + "CVE-2023-2269": { + "cmt_msg": "dm ioctl: fix nested locking in table_clear() to remove deadlock concern" }, - "CVE-2020-0435": { - "cmt_msg": "f2fs: fix to do sanity check with i_extra_isize" + "CVE-2020-26088": { + "cmt_msg": "net/nfc/rawsock.c: add CAP_NET_RAW check." }, - "CVE-2023-51779": { - "cmt_msg": "Bluetooth: af_bluetooth: Fix Use-After-Free in bt_sock_recvmsg" + "CVE-2022-3524": { + "cmt_msg": "tcp/udp: Fix memory leak in ipv6_renew_options()." }, - "CVE-2019-3874": { - "cmt_msg": "sctp: implement memory accounting on tx path" + "CVE-2022-3523": { + "cmt_msg": "mm/memory.c: fix race when faulting a device private page" }, - "CVE-2023-6915": { - "cmt_msg": "ida: Fix crash in ida_free when the bitmap is empty" + "CVE-2015-7515": { + "cmt_msg": "Input: aiptek - fix crash on detecting device without endpoints" }, - "CVE-2010-4563": { + "CVE-2008-2544": { "cmt_msg": "" }, - "CVE-2023-1249": { - "cmt_msg": "coredump: Use the vma snapshot in fill_files_note" - }, - "CVE-2023-2162": { - "cmt_msg": "scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress" + "CVE-2021-3178": { + "cmt_msg": "nfsd4: readdirplus shouldn't return parent of export" }, - "CVE-2023-45871": { - "cmt_msg": "igb: set max size RX buffer when store bad packet is enabled" + "CVE-2021-47101": { + "cmt_msg": "asix: fix uninit-value in asix_mdio_read()" }, - "CVE-2023-0266": { - "cmt_msg": "ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF" + "CVE-2022-42703": { + "cmt_msg": "mm/rmap: Fix anon_vma->degree ambiguity leading to double-reuse" }, - "CVE-2023-4623": { - "cmt_msg": "net/sched: sch_hfsc: Ensure inner classes have fsc curve" + "CVE-2021-47103": { + "cmt_msg": "inet: fully convert sk->sk_rx_dst to RCU rules" }, - "CVE-2023-6040": { - "cmt_msg": "netfilter: nf_tables: Reject tables of unsupported family" + "CVE-2018-7755": { + "cmt_msg": "floppy: Do not copy a kernel pointer to user memory in FDGETPRM ioctl" }, - "CVE-2021-38300": { - "cmt_msg": "bpf, mips: Validate conditional branch offsets" + "CVE-2017-7346": { + "cmt_msg": "drm/vmwgfx: limit the number of mip levels in vmw_gb_surface_define_ioctl()" }, - "CVE-2022-24448": { - "cmt_msg": "NFSv4: Handle case where the lookup of a directory fails" + "CVE-2023-7192": { + "cmt_msg": "netfilter: ctnetlink: fix possible refcount leak in ctnetlink_create_conntrack()" }, - "CVE-2021-4023": { - "cmt_msg": "io-wq: fix cancellation on create-worker failure" + "CVE-2022-0330": { + "cmt_msg": "drm/i915: Flush TLBs before releasing backing store" }, - "CVE-2021-0399": { + "CVE-2007-3719": { "cmt_msg": "" }, - "CVE-2020-36691": { - "cmt_msg": "netlink: limit recursion depth in policy validation" - }, - "CVE-2023-42755": { - "cmt_msg": "net/sched: Retire rsvp classifier" + "CVE-2023-3863": { + "cmt_msg": "net: nfc: Fix use-after-free caused by nfc_llcp_find_local" }, - "CVE-2023-3161": { - "cmt_msg": "fbcon: Check font dimension limits" + "CVE-2024-26606": { + "cmt_msg": "binder: signal epoll threads of self-work" }, - "CVE-2012-4542": { - "cmt_msg": "" + "CVE-2023-0590": { + "cmt_msg": "net: sched: fix race condition in qdisc_graft()" }, - "CVE-2023-42752": { - "cmt_msg": "igmp: limit igmpv3_newpack() packet size to IP_MAX_MTU" + "CVE-2023-52583": { + "cmt_msg": "ceph: fix deadlock or deadcode of misusing dget()" }, - "CVE-2023-4128": { - "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free" + "CVE-2022-4095": { + "cmt_msg": "staging: rtl8712: fix use after free bugs" }, - "CVE-2022-1974": { - "cmt_msg": "nfc: replace improper check device_is_registered() in netlink related functions" + "CVE-2022-45919": { + "cmt_msg": "media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221" }, - "CVE-2022-1975": { - "cmt_msg": "NFC: netlink: fix sleep in atomic bug when firmware download timeout" + "CVE-2019-19319": { + "cmt_msg": "ext4: protect journal inode's blocks using block_validity" }, - "CVE-2019-11191": { - "cmt_msg": "x86: Deprecate a.out support" + "CVE-2023-2248": { + "cmt_msg": "net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg" }, - "CVE-2018-12130": { - "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" + "CVE-2023-30772": { + "cmt_msg": "power: supply: da9150: Fix use after free bug in da9150_charger_remove due to race condition" }, - "CVE-2021-20292": { - "cmt_msg": "drm/ttm/nouveau: don't call tt destroy callback on alloc failure." + "CVE-2023-1611": { + "cmt_msg": "btrfs: fix race between quota disable and quota assign ioctls" }, - "CVE-2017-8065": { - "cmt_msg": "crypto: ccm - move cbcmac input off the stack" + "CVE-2021-3772": { + "cmt_msg": "sctp: use init_tag from inithdr for ABORT chunk" }, - "CVE-2022-32981": { - "cmt_msg": "powerpc/32: Fix overread/overwrite of thread_struct via ptrace" + "CVE-2021-3679": { + "cmt_msg": "tracing: Fix bug in rb_per_cpu_empty() that might cause deadloop." }, - "CVE-2022-3424": { - "cmt_msg": "misc: sgi-gru: fix use-after-free error in gru_set_context_option, gru_fault and gru_handle_user_call_os" + "CVE-2021-37159": { + "cmt_msg": "usb: hso: fix error handling code of hso_create_net_device" }, - "CVE-2020-11669": { - "cmt_msg": "powerpc/powernv/idle: Restore AMR/UAMOR/AMOR after idle" + "CVE-2023-52517": { + "cmt_msg": "spi: sun6i: fix race between DMA RX transfer completion and RX FIFO drain" }, - "CVE-2023-2269": { - "cmt_msg": "dm ioctl: fix nested locking in table_clear() to remove deadlock concern" + "CVE-2022-2586": { + "cmt_msg": "netfilter: nf_tables: do not allow SET_ID to refer to another table" }, - "CVE-2023-0394": { - "cmt_msg": "ipv6: raw: Deduct extension header length in rawv6_push_pending_frames" + "CVE-2022-3629": { + "cmt_msg": "vsock: Fix memory leak in vsock_connect()" }, - "CVE-2022-3522": { - "cmt_msg": "mm/hugetlb: use hugetlb_pte_stable in migration race check" + "CVE-2021-28715": { + "cmt_msg": "xen/netback: don't queue unlimited number of packages" }, - "CVE-2022-25258": { - "cmt_msg": "USB: gadget: validate interface OS descriptor requests" + "CVE-2021-28713": { + "cmt_msg": "xen/console: harden hvc_xen against event channel storms" }, - "CVE-2020-27777": { - "cmt_msg": "powerpc/rtas: Restrict RTAS requests from userspace" + "CVE-2021-28712": { + "cmt_msg": "xen/netfront: harden netfront against event channel storms" }, - "CVE-2021-4150": { - "cmt_msg": "block: fix incorrect references to disk objects" + "CVE-2017-18261": { + "cmt_msg": "clocksource/drivers/arm_arch_timer: Avoid infinite recursion when ftrace is enabled" }, - "CVE-2021-4159": { - "cmt_msg": "bpf: Verifer, adjust_scalar_min_max_vals to always call update_reg_bounds()" + "CVE-2021-4157": { + "cmt_msg": "pNFS/flexfiles: fix incorrect size check in decode_nfs_fh()" }, - "CVE-2021-29155": { - "cmt_msg": "bpf: Use correct permission flag for mixed signed bounds arithmetic" + "CVE-2023-51782": { + "cmt_msg": "net/rose: Fix Use-After-Free in rose_ioctl" }, - "CVE-2021-3714": { - "cmt_msg": "" + "CVE-2022-3621": { + "cmt_msg": "nilfs2: fix NULL pointer dereference at nilfs_bmap_lookup_at_level()" }, - "CVE-2019-16230": { - "cmt_msg": "drm/amdkfd: fix a potential NULL pointer dereference (v2)" + "CVE-2022-23960": { + "cmt_msg": "ARM: report Spectre v2 status through sysfs" }, - "CVE-2019-16231": { - "cmt_msg": "fjes: Handle workqueue allocation failure" + "CVE-2017-11472": { + "cmt_msg": "ACPICA: Namespace: fix operand cache leak" }, - "CVE-2017-12168": { - "cmt_msg": "arm64: KVM: pmu: Fix AArch32 cycle counter access" + "CVE-2022-3624": { + "cmt_msg": "bonding: fix reference count leak in balance-alb mode" }, - "CVE-2021-3892": { - "cmt_msg": "" + "CVE-2017-17862": { + "cmt_msg": "bpf: fix branch pruning logic" }, - "CVE-2021-39633": { - "cmt_msg": "ip_gre: add validation for csum_start" + "CVE-2021-39657": { + "cmt_msg": "scsi: ufs: Correct the LUN used in eh_device_reset_handler() callback" }, - "CVE-2021-39636": { - "cmt_msg": "netfilter: x_tables: fix pointer leaks to userspace" + "CVE-2021-3669": { + "cmt_msg": "ipc: replace costly bailout check in sysvipc_find_ipc()" }, - "CVE-2022-24958": { - "cmt_msg": "usb: gadget: don't release an existing dev->buf" + "CVE-2019-18885": { + "cmt_msg": "btrfs: merge btrfs_find_device and find_device" }, - "CVE-2022-25375": { - "cmt_msg": "usb: gadget: rndis: check size of RNDIS_MSG_SET command" + "CVE-2022-4744": { + "cmt_msg": "tun: avoid double free in tun_free_netdev" }, - "CVE-2022-33742": { - "cmt_msg": "xen/blkfront: force data bouncing when backend is untrusted" + "CVE-2019-12378": { + "cmt_msg": "ipv6_sockglue: Fix a missing-check bug in ip6_ra_control()" }, - "CVE-2022-33741": { - "cmt_msg": "xen/netfront: force data bouncing when backend is untrusted" + "CVE-2019-11091": { + "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" }, - "CVE-2018-20509": { - "cmt_msg": "binder: refactor binder ref inc/dec for thread safety" + "CVE-2022-3239": { + "cmt_msg": "media: em28xx: initialize refcount before kref_get" }, - "CVE-2024-24864": { + "CVE-2022-4543": { "cmt_msg": "" }, - "CVE-2022-33744": { - "cmt_msg": "xen/arm: Fix race in RB-tree based P2M accounting" - }, - "CVE-2023-52444": { - "cmt_msg": "f2fs: fix to avoid dirent corruption" + "CVE-2023-52571": { + "cmt_msg": "power: supply: rk817: Fix node refcount leak" }, - "CVE-2020-12888": { - "cmt_msg": "vfio-pci: Invalidate mmaps and block MMIO access on disabled memory" + "CVE-2023-52572": { + "cmt_msg": "cifs: Fix UAF in cifs_demultiplex_thread()" }, - "CVE-2023-2194": { - "cmt_msg": "i2c: xgene-slimpro: Fix out-of-bounds bug in xgene_slimpro_i2c_xfer()" + "CVE-2023-4921": { + "cmt_msg": "net: sched: sch_qfq: Fix UAF in qfq_dequeue()" }, - "CVE-2022-41218": { - "cmt_msg": "media: dvb-core: Fix UAF due to refcount races at releasing" + "CVE-2022-3424": { + "cmt_msg": "misc: sgi-gru: fix use-after-free error in gru_set_context_option, gru_fault and gru_handle_user_call_os" }, - "CVE-2022-36946": { - "cmt_msg": "netfilter: nf_queue: do not allow packet truncation below transport header offset" + "CVE-2021-46965": { + "cmt_msg": "mtd: physmap: physmap-bt1-rom: Fix unintentional stack access" }, - "CVE-2022-23222": { - "cmt_msg": "bpf: Replace PTR_TO_XXX_OR_NULL with PTR_TO_XXX | PTR_MAYBE_NULL" + "CVE-2023-1829": { + "cmt_msg": "net/sched: Retire tcindex classifier" }, - "CVE-2022-21166": { - "cmt_msg": "x86/speculation/mmio: Enable CPU Fill buffer clearing on idle" + "CVE-2019-19227": { + "cmt_msg": "appletalk: Fix potential NULL pointer dereference in unregister_snap_client" }, - "CVE-2022-41849": { - "cmt_msg": "fbdev: smscufx: Fix use-after-free in ufx_ops_open()" + "CVE-2021-34981": { + "cmt_msg": "Bluetooth: cmtp: fix file refcount when cmtp_attach_device fails" }, - "CVE-2022-41848": { - "cmt_msg": "" + "CVE-2023-1670": { + "cmt_msg": "xirc2ps_cs: Fix use after free bug in xirc2ps_detach" }, - "CVE-2022-40982": { - "cmt_msg": "x86/speculation: Add Gather Data Sampling mitigation" + "CVE-2023-4881": { + "cmt_msg": "netfilter: nftables: exthdr: fix 4-byte stack OOB write" }, - "CVE-2022-28356": { - "cmt_msg": "llc: fix netdevice reference leaks in llc_ui_bind()" + "CVE-2023-6915": { + "cmt_msg": "ida: Fix crash in ida_free when the bitmap is empty" }, - "CVE-2022-1198": { - "cmt_msg": "drivers: hamradio: 6pack: fix UAF bug caused by mod_timer()" + "CVE-2017-16649": { + "cmt_msg": "net: cdc_ether: fix divide by 0 on bad descriptors" }, - "CVE-2022-1199": { - "cmt_msg": "ax25: Fix NULL pointer dereference in ax25_kill_by_device" + "CVE-2024-26704": { + "cmt_msg": "ext4: fix double-free of blocks due to wrong extents moved_len" }, - "CVE-2023-6546": { - "cmt_msg": "tty: n_gsm: fix the UAF caused by race condition in gsm_cleanup_mux" + "CVE-2022-1786": { + "cmt_msg": "io_uring: remove io_identity" }, - "CVE-2021-39801": { + "CVE-2013-7445": { "cmt_msg": "" }, - "CVE-2021-39800": { - "cmt_msg": "" + "CVE-2021-0941": { + "cmt_msg": "bpf: Remove MTU check in __bpf_skb_max_len" }, - "CVE-2022-20166": { - "cmt_msg": "drivers core: Use sysfs_emit and sysfs_emit_at for show(device *...) functions" + "CVE-2023-34255": { + "cmt_msg": "xfs: verify buffer contents when we skip log replay" }, - "CVE-2024-22099": { - "cmt_msg": "" + "CVE-2024-26738": { + "cmt_msg": "powerpc/pseries/iommu: DLPAR add doesn't completely initialize pci_controller" }, - "CVE-2022-45885": { - "cmt_msg": "" + "CVE-2022-26966": { + "cmt_msg": "sr9700: sanity check for packet length" }, - "CVE-2022-45884": { + "CVE-2022-38096": { "cmt_msg": "" }, - "CVE-2022-45887": { - "cmt_msg": "media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb()" + "CVE-2021-34693": { + "cmt_msg": "can: bcm: fix infoleak in struct bcm_msg_head" }, - "CVE-2022-45886": { - "cmt_msg": "media: dvb-core: Fix use-after-free due on race condition at dvb_net" + "CVE-2023-52506": { + "cmt_msg": "LoongArch: Set all reserved memblocks on Node#0 at initialization" }, - "CVE-2023-46343": { - "cmt_msg": "nfc: nci: fix possible NULL pointer dereference in send_acknowledge()" + "CVE-2020-14381": { + "cmt_msg": "futex: Fix inode life-time issue" }, - "CVE-2024-25744": { - "cmt_msg": "x86/coco: Disable 32-bit emulation by default on TDX and SEV" + "CVE-2019-19768": { + "cmt_msg": "blktrace: Protect q->blk_trace with RCU" }, - "CVE-2023-5178": { - "cmt_msg": "nvmet-tcp: Fix a possible UAF in queue intialization setup" + "CVE-2022-3303": { + "cmt_msg": "ALSA: pcm: oss: Fix race at SNDCTL_DSP_SYNC" }, - "CVE-2023-2124": { - "cmt_msg": "xfs: verify buffer contents when we skip log replay" + "CVE-2017-8797": { + "cmt_msg": "nfsd: fix undefined behavior in nfsd4_layout_verify" }, - "CVE-2021-44879": { - "cmt_msg": "f2fs: fix to do sanity check on inode type during garbage collection" + "CVE-2017-5715": { + "cmt_msg": "x86/cpufeatures: Add X86_BUG_SPECTRE_V[12]" }, - "CVE-2023-2513": { - "cmt_msg": "ext4: fix use-after-free in ext4_xattr_set_entry" + "CVE-2022-20141": { + "cmt_msg": "igmp: Add ip_mc_list lock in ip_check_mc_rcu" }, - "CVE-2022-27672": { - "cmt_msg": "x86/speculation: Identify processors vulnerable to SMT RSB predictions" + "CVE-2023-23455": { + "cmt_msg": "net: sched: atm: dont intepret cls results when asked to drop" }, - "CVE-2015-2877": { - "cmt_msg": "" + "CVE-2023-23454": { + "cmt_msg": "net: sched: cbq: dont intepret cls results when asked to drop" }, - "CVE-2021-38198": { - "cmt_msg": "KVM: X86: MMU: Use the correct inherited permissions to get shadow page" + "CVE-2016-8630": { + "cmt_msg": "kvm: x86: Check memopp before dereference (CVE-2016-8630)" }, - "CVE-2022-1679": { - "cmt_msg": "ath9k: fix use-after-free in ath9k_hif_usb_rx_cb" + "CVE-2023-52641": { + "cmt_msg": "fs/ntfs3: Add NULL ptr dereference checking at the end of attr_allocate_frame()" }, - "CVE-2023-34256": { - "cmt_msg": "ext4: avoid a potential slab-out-of-bounds in ext4_group_desc_csum" + "CVE-2018-3620": { + "cmt_msg": "x86/microcode: Allow late microcode loading with SMT disabled" }, - "CVE-2023-1513": { - "cmt_msg": "kvm: initialize all of the kvm_debugregs structure before sending it to userspace" + "CVE-2023-6932": { + "cmt_msg": "ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet" }, - "CVE-2021-26401": { - "cmt_msg": "x86/speculation: Use generic retpoline by default on AMD" + "CVE-2024-26801": { + "cmt_msg": "Bluetooth: Avoid potential use-after-free in hci_error_reset" }, - "CVE-2021-3847": { - "cmt_msg": "" + "CVE-2020-16166": { + "cmt_msg": "random32: update the net random state on interrupt and activity" }, - "CVE-2023-52442": { - "cmt_msg": "ksmbd: validate session id and tree id in compound request" + "CVE-2021-29155": { + "cmt_msg": "bpf: Use correct permission flag for mixed signed bounds arithmetic" }, - "CVE-2022-40768": { - "cmt_msg": "scsi: stex: Properly zero out the passthrough command structure" + "CVE-2021-33631": { + "cmt_msg": "ext4: fix kernel BUG in 'ext4_write_inline_data_end()'" }, - "CVE-2022-1280": { - "cmt_msg": "drm: avoid circular locks in drm_mode_getconnector" + "CVE-2019-15916": { + "cmt_msg": "net-sysfs: Fix mem leak in netdev_register_kobject" }, - "CVE-2023-52445": { - "cmt_msg": "media: pvrusb2: fix use after free on context disconnection" + "CVE-2019-15917": { + "cmt_msg": "Bluetooth: hci_ldisc: Postpone HCI_UART_PROTO_READY bit set in hci_uart_set_proto()" }, - "CVE-2011-4917": { - "cmt_msg": "" + "CVE-2022-41218": { + "cmt_msg": "media: dvb-core: Fix UAF due to refcount races at releasing" }, - "CVE-2022-36123": { - "cmt_msg": "x86: Clear .brk area at early boot" + "CVE-2024-26803": { + "cmt_msg": "net: veth: clear GRO when clearing XDP even when down" }, - "CVE-2023-52449": { - "cmt_msg": "mtd: Fix gluebi NULL pointer dereference caused by ftl notifier" + "CVE-2024-26598": { + "cmt_msg": "KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache" }, - "CVE-2023-23039": { - "cmt_msg": "" + "CVE-2024-26768": { + "cmt_msg": "LoongArch: Change acpi_core_pic[NR_CPUS] to acpi_core_pic[MAX_CORE_PIC]" }, - "CVE-2023-31083": { - "cmt_msg": "Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO" + "CVE-2020-12362": { + "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" }, - "CVE-2019-5489": { - "cmt_msg": "Change mincore() to count \"mapped\" pages rather than \"cached\" pages" + "CVE-2020-12363": { + "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" }, - "CVE-2024-1312": { - "cmt_msg": "mm: lock_vma_under_rcu() must check vma->anon_vma under vma lock" + "CVE-2019-12881": { + "cmt_msg": "drm/i915/userptr: reject zero user_size" }, - "CVE-2023-3338": { - "cmt_msg": "Remove DECnet support from kernel" + "CVE-2022-4129": { + "cmt_msg": "l2tp: Serialize access to sk_user_data with sk_callback_lock" }, - "CVE-2017-16648": { - "cmt_msg": "dvb_frontend: don't use-after-free the frontend struct" - } - } - }, - "4.7": { - "4.7": { - "CVE-2016-6162": { - "cmt_msg": "udp: prevent bugcheck if filter truncates packet too much", - "cmt_id": "a612769774a30e4fc143c4cb6395c12573415660" + "CVE-2023-3117": { + "cmt_msg": "netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE" }, - "CVE-2016-5400": { - "cmt_msg": "media: fix airspy usb probe error path", - "cmt_id": "aa93d1fee85c890a34f2510a310e55ee76a27848" + "CVE-2020-12364": { + "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" }, - "CVE-2016-5696": { - "cmt_msg": "tcp: make challenge acks less predictable", - "cmt_id": "75ff39ccc1bd5d3c455b6822ab09e533c551f758" - } - }, - "4.7.1": { - "CVE-2016-6516": { - "cmt_msg": "vfs: ioctl: prevent double-fetch in dedupe ioctl", - "cmt_id": "37fe52815ecb74f6aa1efd398ba0704f83c70550" + "CVE-2023-52607": { + "cmt_msg": "powerpc/mm: Fix null-pointer dereference in pgtable_cache_add" }, - "CVE-2016-7910": { - "cmt_msg": "block: fix use-after-free in seq file", - "cmt_id": "aa56f0bd5d67d2eb0e59d6bc20578f83858ff43f" + "CVE-2024-26646": { + "cmt_msg": "thermal: intel: hfi: Add syscore callbacks for system-wide PM" }, - "CVE-2016-3857": { - "cmt_msg": "arm: oabi compat: add missing access checks", - "cmt_id": "65413c151b68bae1ffa261b215c23441eefcfb10" - } - }, - "4.7.2": { - "CVE-2016-5412": { - "cmt_msg": "KVM: PPC: Book3S HV: Pull out TM state save/restore into separate procedures", - "cmt_id": "6e01651e3546f4d092825a9f23a9296a00caedda" + "CVE-2018-18690": { + "cmt_msg": "xfs: don't fail when converting shortform attr to long form during ATTR_REPLACE" }, - "CVE-2016-6136": { - "cmt_msg": "audit: fix a double fetch in audit_log_single_execve_arg()", - "cmt_id": "a9b4eac04f56b1a11a859c1eddb52b71b3125a17" - } - }, - "4.7.3": { - "CVE-2016-6480": { - "cmt_msg": "aacraid: Check size values after double-fetch from user", - "cmt_id": "37e0f46b779f3081fc4719956eb44cacbb5a294f" - } - }, - "4.7.4": { - "CVE-2016-10318": { - "cmt_msg": "fscrypto: add authorization check for setting encryption policy", - "cmt_id": "edff68f618646ccd75b5ff5694cf63bc2b78a009" - } - }, - "4.7.5": { - "CVE-2016-9178": { - "cmt_msg": "fix minor infoleak in get_user_ex()", - "cmt_id": "7642cc2430ba942c773f3faef8f913bcbd363311" + "CVE-2024-26644": { + "cmt_msg": "btrfs: don't abort filesystem when attempting to snapshot deleted subvolume" }, - "CVE-2016-6828": { - "cmt_msg": "tcp: fix use after free in tcp_xmit_retransmit_queue()", - "cmt_id": "7f93c3130e755e2875bc68f9e01878599333433f" + "CVE-2022-28388": { + "cmt_msg": "can: usb_8dev: usb_8dev_start_xmit(): fix double dev_kfree_skb() in error path" }, - "CVE-2016-8658": { - "cmt_msg": "brcmfmac: avoid potential stack overflow in brcmf_cfg80211_start_ap()", - "cmt_id": "ecd4c39ec742f764bf9c7c025cc478868af4df34" - } - }, - "4.7.7": { - "CVE-2017-15102": { - "cmt_msg": "usb: misc: legousbtower: Fix NULL pointer deference", - "cmt_id": "03f8e90de1365975ea21fee41b0c16f558c466a8" + "CVE-2024-26642": { + "cmt_msg": "netfilter: nf_tables: disallow anonymous set with timeout flag" }, - "CVE-2016-10044": { - "cmt_msg": "aio: mark AIO pseudo-fs noexec", - "cmt_id": "f4a75a57f324e29d0d7b927ef5c1bcbebfb1b7d1" - } - }, - "4.7.9": { - "CVE-2016-5195": { - "cmt_msg": "mm: remove gup_flags FOLL_WRITE games from __get_user_pages()", - "cmt_id": "30712aff8011b67be3e7e31ea079cfc9d3effef4" - } - }, - "4.7.10": { - "CVE-2016-7425": { - "cmt_msg": "scsi: arcmsr: Buffer overflow in arcmsr_iop_message_xfer()", - "cmt_id": "6e3655655623c52a8a55cec01be8cf6681ee54a3" - } - }, - "outstanding": { - "CVE-2017-5897": { - "cmt_msg": "ip6_gre: fix ip6gre_err() invalid reads" + "CVE-2021-0605": { + "cmt_msg": "af_key: pfkey_dump needs parameter validation" }, - "CVE-2020-10711": { - "cmt_msg": "netlabel: cope with NULL catmap" + "CVE-2024-26656": { + "cmt_msg": "drm/amdgpu: fix use-after-free bug" }, - "CVE-2020-35508": { - "cmt_msg": "fork: fix copy_process(CLONE_PARENT) race with the exiting ->real_parent" + "CVE-2021-3896": { + "cmt_msg": "isdn: cpai: check ctr->cnr to avoid array index out of bound" }, - "CVE-2022-3649": { - "cmt_msg": "nilfs2: fix use-after-free bug of struct nilfs_root" + "CVE-2016-7917": { + "cmt_msg": "netfilter: nfnetlink: correctly validate length of batch messages" }, - "CVE-2020-35501": { - "cmt_msg": "" + "CVE-2023-26545": { + "cmt_msg": "net: mpls: fix stale pointer if allocation fails during device rename" }, - "CVE-2019-15098": { - "cmt_msg": "ath6kl: fix a NULL-ptr-deref bug in ath6kl_usb_alloc_urb_from_pipe()" + "CVE-2023-52519": { + "cmt_msg": "HID: intel-ish-hid: ipc: Disable and reenable ACPI GPE bit" }, - "CVE-2020-29368": { - "cmt_msg": "mm: thp: make the THP mapcount atomic against __split_huge_pmd_locked()" + "CVE-2021-38204": { + "cmt_msg": "usb: max-3421: Prevent corruption of freed memory" }, - "CVE-2017-17806": { - "cmt_msg": "crypto: hmac - require that the underlying hash algorithm is unkeyed" + "CVE-2022-34918": { + "cmt_msg": "netfilter: nf_tables: stricter validation of element data" }, - "CVE-2023-3611": { - "cmt_msg": "net/sched: sch_qfq: account for stab overhead in qfq_enqueue" + "CVE-2019-16232": { + "cmt_msg": "libertas: fix a potential NULL pointer dereference" }, - "CVE-2022-0001": { - "cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE" + "CVE-2024-26791": { + "cmt_msg": "btrfs: dev-replace: properly validate device names" }, - "CVE-2020-12464": { - "cmt_msg": "USB: core: Fix free-while-in-use bug in the USB S-Glibrary" + "CVE-2019-20811": { + "cmt_msg": "net-sysfs: call dev_hold if kobject_init_and_add success" }, - "CVE-2017-10662": { - "cmt_msg": "f2fs: sanity check segment count" + "CVE-2019-20810": { + "cmt_msg": "media: go7007: fix a miss of snd_card_free" }, - "CVE-2019-19965": { - "cmt_msg": "scsi: libsas: stop discovering if oob mode is disconnected" + "CVE-2019-20812": { + "cmt_msg": "af_packet: set defaule value for tmo" }, - "CVE-2016-9793": { - "cmt_msg": "net: avoid signed overflows for SO_{SND|RCV}BUFFORCE" + "CVE-2023-52600": { + "cmt_msg": "jfs: fix uaf in jfs_evict_inode" }, - "CVE-2019-19966": { - "cmt_msg": "media: cpia2: Fix use-after-free in cpia2_exit" + "CVE-2023-1990": { + "cmt_msg": "nfc: st-nci: Fix use after free bug in ndlc_remove due to race condition" }, - "CVE-2022-1184": { - "cmt_msg": "ext4: verify dir block before splitting it" + "CVE-2020-14314": { + "cmt_msg": "ext4: fix potential negative array index in do_split()" }, - "CVE-2020-24587": { - "cmt_msg": "mac80211: prevent mixed key and fragment cache attacks" + "CVE-2023-52515": { + "cmt_msg": "RDMA/srp: Do not call scsi_done() from srp_abort()" }, - "CVE-2020-24586": { - "cmt_msg": "mac80211: prevent mixed key and fragment cache attacks" + "CVE-2018-25020": { + "cmt_msg": "bpf: fix truncated jump targets on heavy expansions" }, - "CVE-2017-6074": { - "cmt_msg": "dccp: fix freeing skb too early for IPV6_RECVPKTINFO" + "CVE-2022-26373": { + "cmt_msg": "x86/speculation: Add RSB VM Exit protections" }, - "CVE-2023-6270": { + "CVE-2018-5995": { + "cmt_msg": "printk: hash addresses printed with %p" + }, + "CVE-2019-18660": { + "cmt_msg": "powerpc/book3s64: Fix link stack flush on context switch" + }, + "CVE-2019-15291": { + "cmt_msg": "media: b2c2-flexcop-usb: add sanity checking" + }, + "CVE-2019-15290": { "cmt_msg": "" }, - "CVE-2022-3642": { + "CVE-2023-3212": { + "cmt_msg": "gfs2: Don't deref jdesc in evict" + }, + "CVE-2024-23848": { "cmt_msg": "" }, - "CVE-2021-0129": { - "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical" + "CVE-2021-46904": { + "cmt_msg": "net: hso: fix null-ptr-deref during tty device unregistration" }, - "CVE-2019-20096": { - "cmt_msg": "dccp: Fix memleak in __feat_register_sp" + "CVE-2024-26633": { + "cmt_msg": "ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim()" }, - "CVE-2022-47520": { - "cmt_msg": "wifi: wilc1000: validate pairwise and authentication suite offsets" + "CVE-2018-7273": { + "cmt_msg": "printk: hash addresses printed with %p" }, - "CVE-2023-42755": { - "cmt_msg": "net/sched: Retire rsvp classifier" + "CVE-2023-52445": { + "cmt_msg": "media: pvrusb2: fix use after free on context disconnection" }, - "CVE-2023-5717": { - "cmt_msg": "perf: Disallow mis-matched inherited group reads" + "CVE-2023-4459": { + "cmt_msg": "net: vmxnet3: fix possible NULL pointer dereference in vmxnet3_rq_cleanup()" }, - "CVE-2022-3643": { - "cmt_msg": "xen/netback: Ensure protocol headers don't fall in the non-linear area" + "CVE-2024-26625": { + "cmt_msg": "llc: call sock_orphan() at release time" }, - "CVE-2021-38300": { - "cmt_msg": "bpf, mips: Validate conditional branch offsets" + "CVE-2024-26635": { + "cmt_msg": "llc: Drop support for ETH_P_TR_802_2." }, - "CVE-2018-10940": { - "cmt_msg": "cdrom: information leak in cdrom_ioctl_media_changed()" + "CVE-2022-23036": { + "cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()" }, - "CVE-2022-32250": { - "cmt_msg": "netfilter: nf_tables: disallow non-stateful expression in sets earlier" + "CVE-2023-52639": { + "cmt_msg": "KVM: s390: vsie: fix race during shadow creation" }, - "CVE-2018-10087": { - "cmt_msg": "kernel/exit.c: avoid undefined behaviour when calling wait4()" + "CVE-2022-2153": { + "cmt_msg": "KVM: x86: Avoid theoretical NULL pointer dereference in kvm_irq_delivery_to_apic_fast()" }, - "CVE-2021-39634": { - "cmt_msg": "epoll: do not insert into poll queues until all sanity checks are done" + "CVE-2024-2193": { + "cmt_msg": "" }, - "CVE-2019-9500": { - "cmt_msg": "brcmfmac: assure SSID length from firmware is limited" + "CVE-2022-20566": { + "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free caused by l2cap_chan_put" }, - "CVE-2019-9503": { - "cmt_msg": "brcmfmac: add subtype check for event handling in data path" + "CVE-2018-12930": { + "cmt_msg": "" }, - "CVE-2018-6555": { - "cmt_msg": "staging: irda: remove the irda network stack and drivers" + "CVE-2018-12931": { + "cmt_msg": "" }, - "CVE-2023-3159": { - "cmt_msg": "firewire: fix potential uaf in outbound_phy_packet_callback()" + "CVE-2024-23196": { + "cmt_msg": "ALSA: hda: fix a possible null-pointer dereference due to data race in snd_hdac_regmap_sync()" }, - "CVE-2022-0480": { - "cmt_msg": "memcg: enable accounting for file lock caches" + "CVE-2016-0758": { + "cmt_msg": "KEYS: Fix ASN.1 indefinite length object parsing" }, - "CVE-2018-10124": { - "cmt_msg": "kernel/signal.c: avoid undefined behaviour in kill_something_info" + "CVE-2020-12769": { + "cmt_msg": "spi: spi-dw: Add lock protect dw_spi rx/tx to prevent concurrent calls" }, - "CVE-2022-0487": { - "cmt_msg": "moxart: fix potential use-after-free on remove path" + "CVE-2024-26765": { + "cmt_msg": "LoongArch: Disable IRQ before init_fn() for nonboot CPUs" }, - "CVE-2023-52429": { - "cmt_msg": "dm: limit the number of targets and parameter size area" + "CVE-2016-9756": { + "cmt_msg": "KVM: x86: drop error recovery in em_jmp_far and em_ret_far" }, - "CVE-2021-28964": { - "cmt_msg": "btrfs: fix race when cloning extent buffer during rewind of an old root" + "CVE-2023-52609": { + "cmt_msg": "binder: fix race between mmput() and do_exit()" }, - "CVE-2020-26558": { - "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical" + "CVE-2021-32399": { + "cmt_msg": "bluetooth: eliminate the potential race condition when removing the HCI controller" }, - "CVE-2021-0920": { - "cmt_msg": "af_unix: fix garbage collect vs MSG_PEEK" + "CVE-2019-12380": { + "cmt_msg": "efi/x86/Add missing error handling to old_memmap 1:1 mapping code" }, - "CVE-2023-1249": { - "cmt_msg": "coredump: Use the vma snapshot in fill_files_note" + "CVE-2019-12381": { + "cmt_msg": "ip_sockglue: Fix missing-check bug in ip_ra_control()" }, - "CVE-2022-23825": { - "cmt_msg": "" + "CVE-2019-12382": { + "cmt_msg": "drm/edid: Fix a missing-check bug in drm_load_edid_firmware()" }, - "CVE-2022-1974": { - "cmt_msg": "nfc: replace improper check device_is_registered() in netlink related functions" + "CVE-2017-10810": { + "cmt_msg": "drm/virtio: don't leak bo on drm_gem_object_init failure" }, - "CVE-2019-13631": { - "cmt_msg": "Input: gtco - bounds check collection indent level" + "CVE-2022-24958": { + "cmt_msg": "usb: gadget: don't release an existing dev->buf" }, - "CVE-2017-7374": { - "cmt_msg": "fscrypt: remove broken support for detecting keyring key revocation" + "CVE-2020-8648": { + "cmt_msg": "vt: selection, close sel_buffer race" }, - "CVE-2024-26588": { - "cmt_msg": "LoongArch: BPF: Prevent out-of-bounds memory access" + "CVE-2023-52633": { + "cmt_msg": "um: time-travel: fix time corruption" }, - "CVE-2023-2162": { - "cmt_msg": "scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress" + "CVE-2020-36780": { + "cmt_msg": "i2c: sprd: fix reference leak when pm_runtime_get_sync fails" }, - "CVE-2017-5551": { - "cmt_msg": "tmpfs: clear S_ISGID when setting posix ACLs" + "CVE-2020-36781": { + "cmt_msg": "i2c: imx: fix reference leak when pm_runtime_get_sync fails" }, - "CVE-2024-24857": { - "cmt_msg": "" + "CVE-2024-26647": { + "cmt_msg": "drm/amd/display: Fix late derefrence 'dsc' check in 'link_set_dsc_pps_packet()'" }, - "CVE-2019-19241": { - "cmt_msg": "io_uring: async workers should inherit the user creds" + "CVE-2021-3732": { + "cmt_msg": "ovl: prevent private clone if bind mount is not allowed" }, - "CVE-2022-40307": { - "cmt_msg": "efi: capsule-loader: Fix use-after-free in efi_capsule_write" + "CVE-2022-25375": { + "cmt_msg": "usb: gadget: rndis: check size of RNDIS_MSG_SET command" }, - "CVE-2022-21123": { - "cmt_msg": "x86/speculation/mmio: Add mitigation for Processor MMIO Stale Data" + "CVE-2020-10766": { + "cmt_msg": "x86/speculation: Prevent rogue cross-process SSBD shutdown" }, - "CVE-2023-3390": { - "cmt_msg": "netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE" + "CVE-2017-13166": { + "cmt_msg": "media: v4l2-ioctl.c: use check_fmt for enum/g/s/try_fmt" }, - "CVE-2021-28688": { - "cmt_msg": "xen-blkback: don't leak persistent grants from xen_blkbk_map()" + "CVE-2019-25160": { + "cmt_msg": "netlabel: fix out-of-bounds memory accesses" }, - "CVE-2021-39686": { - "cmt_msg": "binder: use euid from cred instead of using task" + "CVE-2018-12207": { + "cmt_msg": "kvm: x86, powerpc: do not allow clearing largepages debugfs entry" }, - "CVE-2021-39685": { - "cmt_msg": "USB: gadget: detect too-big endpoint 0 requests" + "CVE-2022-20369": { + "cmt_msg": "media: v4l2-mem2mem: Apply DST_QUEUE_OFF_BASE on MMAP buffers across ioctls" }, - "CVE-2023-6535": { - "cmt_msg": "" + "CVE-2024-26627": { + "cmt_msg": "scsi: core: Move scsi_host_busy() out of host lock for waking up EH handler" }, - "CVE-2021-43975": { - "cmt_msg": "atlantic: Fix OOB read and write in hw_atl_utils_fw_rpc_wait" + "CVE-2020-13143": { + "cmt_msg": "USB: gadget: fix illegal array access in binding with UDC" }, - "CVE-2018-6927": { - "cmt_msg": "futex: Prevent overflow by strengthen input validation" + "CVE-2020-10768": { + "cmt_msg": "x86/speculation: PR_SPEC_FORCE_DISABLE enforcement for indirect branches." }, - "CVE-2020-0466": { - "cmt_msg": "do_epoll_ctl(): clean the failure exits up a bit" + "CVE-2017-13168": { + "cmt_msg": "scsi: sg: mitigate read/write abuse" }, - "CVE-2019-10207": { - "cmt_msg": "Bluetooth: hci_uart: check for missing tty operations" + "CVE-2024-25740": { + "cmt_msg": "" }, - "CVE-2023-1073": { - "cmt_msg": "HID: check empty report_list in hid_validate_values()" + "CVE-2019-0148": { + "cmt_msg": "i40e: Wrong truncation from u16 to u8" }, - "CVE-2019-14835": { - "cmt_msg": "vhost: make sure log_num < in_num" + "CVE-2022-2978": { + "cmt_msg": "fs: fix UAF/GPF bug in nilfs_mdt_destroy" }, - "CVE-2023-0459": { - "cmt_msg": "uaccess: Add speculation barrier to copy_from_user()" + "CVE-2019-17075": { + "cmt_msg": "RDMA/cxgb4: Do not dma memory off of the stack" }, - "CVE-2023-0458": { - "cmt_msg": "prlimit: do_prlimit needs to have a speculation check" + "CVE-2022-48626": { + "cmt_msg": "moxart: fix potential use-after-free on remove path" }, - "CVE-2018-1000204": { - "cmt_msg": "scsi: sg: allocate with __GFP_ZERO in sg_build_indirect()" + "CVE-2022-3903": { + "cmt_msg": "media: mceusb: Use new usb_control_msg_*() routines" }, - "CVE-2016-9313": { - "cmt_msg": "KEYS: Sort out big_key initialisation" + "CVE-2019-19447": { + "cmt_msg": "ext4: work around deleting a file with i_nlink == 0 safely" }, - "CVE-2017-8925": { - "cmt_msg": "USB: serial: omninet: fix reference leaks at open" + "CVE-2023-20588": { + "cmt_msg": "x86/CPU/AMD: Do not leak quotient data after a division by 0" }, - "CVE-2019-12379": { - "cmt_msg": "consolemap: Fix a memory leaking bug in drivers/tty/vt/consolemap.c" + "CVE-2020-10942": { + "cmt_msg": "vhost: Check docket sk_family instead of call getname" }, - "CVE-2017-12134": { - "cmt_msg": "xen: fix bio vec merging" + "CVE-2018-3693": { + "cmt_msg": "ext4: fix spectre gadget in ext4_mb_regular_allocator()" }, - "CVE-2023-0597": { - "cmt_msg": "x86/mm: Randomize per-cpu entry area" + "CVE-2021-47070": { + "cmt_msg": "uio_hv_generic: Fix another memory leak in error handling paths" }, - "CVE-2021-30002": { - "cmt_msg": "media: v4l: ioctl: Fix memory leak in video_usercopy" + "CVE-2023-3338": { + "cmt_msg": "Remove DECnet support from kernel" }, - "CVE-2017-17450": { - "cmt_msg": "netfilter: xt_osf: Add missing permission checks" + "CVE-2019-11190": { + "cmt_msg": "binfmt_elf: switch to new creds when switching to new mm" }, - "CVE-2021-0941": { - "cmt_msg": "bpf: Remove MTU check in __bpf_skb_max_len" + "CVE-2019-11191": { + "cmt_msg": "x86: Deprecate a.out support" }, - "CVE-2017-7294": { - "cmt_msg": "drm/vmwgfx: fix integer overflow in vmw_surface_define_ioctl()" + "CVE-2021-47076": { + "cmt_msg": "RDMA/rxe: Return CQE error if invalid lkey was supplied" }, - "CVE-2024-26591": { - "cmt_msg": "bpf: Fix re-attachment branch in bpf_tracing_prog_attach" + "CVE-2021-47136": { + "cmt_msg": "net: zero-initialize tc skb extension on allocation" }, - "CVE-2020-15802": { - "cmt_msg": "" + "CVE-2021-47171": { + "cmt_msg": "net: usb: fix memory leak in smsc75xx_bind" }, - "CVE-2024-26594": { - "cmt_msg": "ksmbd: validate mech token in session setup" + "CVE-2021-47172": { + "cmt_msg": "iio: adc: ad7124: Fix potential overflow due to non sequential channel numbers" }, - "CVE-2022-3629": { - "cmt_msg": "vsock: Fix memory leak in vsock_connect()" + "CVE-2021-47173": { + "cmt_msg": "misc/uss720: fix memory leak in uss720_probe" }, - "CVE-2017-18270": { - "cmt_msg": "KEYS: prevent creating a different user's keyrings" + "CVE-2022-36123": { + "cmt_msg": "x86: Clear .brk area at early boot" }, - "CVE-2022-3636": { - "cmt_msg": "net: ethernet: mtk_eth_soc: use after free in __mtk_ppe_check_skb()" + "CVE-2021-47175": { + "cmt_msg": "net/sched: fq_pie: fix OOB access in the traffic path" }, - "CVE-2022-3635": { - "cmt_msg": "atm: idt77252: fix use-after-free bugs caused by tst_timer" + "CVE-2018-10323": { + "cmt_msg": "xfs: set format back to extents if xfs_bmap_extents_to_btree" }, - "CVE-2022-0002": { - "cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE" + "CVE-2018-10322": { + "cmt_msg": "xfs: enhance dinode verifier" }, - "CVE-2021-34556": { - "cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4" + "CVE-2021-46951": { + "cmt_msg": "tpm: efi: Use local variable for calculating final log size" }, - "CVE-2020-0543": { - "cmt_msg": "x86/cpu: Add 'table' argument to cpu_matches()" + "CVE-2021-46950": { + "cmt_msg": "md/raid1: properly indicate failure when ending a failed write request" }, - "CVE-2022-40982": { - "cmt_msg": "x86/speculation: Add Gather Data Sampling mitigation" + "CVE-2023-1989": { + "cmt_msg": "Bluetooth: btsdio: fix use after free bug in btsdio_remove due to unfinished work" }, - "CVE-2016-10905": { - "cmt_msg": "GFS2: don't set rgrp gl_object until it's inserted into rgrp tree" + "CVE-2021-46952": { + "cmt_msg": "NFS: fs_context: validate UDP retrans to prevent shift out-of-bounds" }, - "CVE-2017-6001": { - "cmt_msg": "perf/core: Fix concurrent sys_perf_event_open() vs. 'move_group' race" + "CVE-2021-0447": { + "cmt_msg": "l2tp: protect sock pointer of struct pppol2tp_session with RCU" }, - "CVE-2022-3202": { - "cmt_msg": "jfs: prevent NULL deref in diFree" + "CVE-2021-46959": { + "cmt_msg": "spi: Fix use-after-free with devm_spi_alloc_*" }, - "CVE-2022-23039": { - "cmt_msg": "xen/gntalloc: don't use gnttab_query_foreign_access()" + "CVE-2020-26139": { + "cmt_msg": "mac80211: do not accept/forward invalid EAPOL frames" }, - "CVE-2018-3646": { - "cmt_msg": "x86/microcode: Allow late microcode loading with SMT disabled" + "CVE-2024-26772": { + "cmt_msg": "ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal()" }, - "CVE-2017-7518": { - "cmt_msg": "KVM: x86: fix singlestepping over syscall" + "CVE-2019-10220": { + "cmt_msg": "Convert filldir[64]() from __put_user() to unsafe_put_user()" }, - "CVE-2019-9213": { - "cmt_msg": "mm: enforce min addr even if capable() in expand_downwards()" + "CVE-2018-17182": { + "cmt_msg": "mm: get rid of vmacache_flush_all() entirely" }, - "CVE-2018-5873": { - "cmt_msg": "nsfs: mark dentry with DCACHE_RCUACCESS" + "CVE-2023-52595": { + "cmt_msg": "wifi: rt2x00: restart beacon queue when hardware reset" }, - "CVE-2024-24861": { - "cmt_msg": "" + "CVE-2021-47137": { + "cmt_msg": "net: lantiq: fix memory corruption in RX ring" }, - "CVE-2017-17558": { - "cmt_msg": "USB: core: prevent malicious bNumInterfaces overflow" + "CVE-2019-19536": { + "cmt_msg": "can: peak_usb: pcan_usb_pro: Fix info-leaks to USB devices" }, - "CVE-2019-11477": { - "cmt_msg": "tcp: limit payload size of sacked skbs" + "CVE-2019-19537": { + "cmt_msg": "USB: core: Fix races in character device registration and deregistraion" }, - "CVE-2021-28711": { - "cmt_msg": "xen/blkfront: harden blkfront against event channel storms" + "CVE-2019-19534": { + "cmt_msg": "can: peak_usb: fix slab info leak" }, - "CVE-2017-7895": { - "cmt_msg": "nfsd: stricter decoding of write-like NFSv2/v3 ops" + "CVE-2019-19535": { + "cmt_msg": "can: peak_usb: pcan_usb_fd: Fix info-leaks to USB devices" }, - "CVE-2018-14614": { - "cmt_msg": "f2fs: fix to do sanity check with cp_pack_start_sum" + "CVE-2019-19532": { + "cmt_msg": "HID: Fix assumption that devices have inputs" }, "CVE-2018-14617": { "cmt_msg": "hfsplus: fix NULL dereference in hfsplus_lookup()" }, + "CVE-2019-10638": { + "cmt_msg": "inet: switch IP ID generator to siphash" + }, + "CVE-2019-10639": { + "cmt_msg": "netns: provide pure entropy for net_hash_mix()" + }, + "CVE-2021-0929": { + "cmt_msg": "staging/android/ion: delete dma_buf->kmap/unmap implemenation" + }, "CVE-2018-14616": { "cmt_msg": "f2fs: fix to do sanity check with block address in main area v2" }, - "CVE-2018-14611": { - "cmt_msg": "btrfs: validate type when reading a chunk" + "CVE-2023-52590": { + "cmt_msg": "ocfs2: Avoid touching renamed directory if parent does not change" }, - "CVE-2018-14610": { - "cmt_msg": "btrfs: Check that each block group has corresponding chunk at mount time" + "CVE-2018-19985": { + "cmt_msg": "USB: hso: Fix OOB memory access in hso_probe/hso_get_config_data" }, - "CVE-2018-14613": { - "cmt_msg": "btrfs: tree-checker: Verify block_group_item" + "CVE-2018-6554": { + "cmt_msg": "staging: irda: remove the irda network stack and drivers" }, - "CVE-2018-14612": { - "cmt_msg": "btrfs: tree-checker: Detect invalid and empty essential trees" + "CVE-2018-6555": { + "cmt_msg": "staging: irda: remove the irda network stack and drivers" }, - "CVE-2020-26145": { - "cmt_msg": "ath10k: drop fragments with multicast DA for PCIe" + "CVE-2021-0920": { + "cmt_msg": "af_unix: fix garbage collect vs MSG_PEEK" }, - "CVE-2017-13216": { - "cmt_msg": "staging: android: ashmem: fix a race condition in ASHMEM_SET_SIZE ioctl" + "CVE-2018-5953": { + "cmt_msg": "printk: hash addresses printed with %p" }, - "CVE-2020-26147": { - "cmt_msg": "mac80211: assure all fragments are encrypted" + "CVE-2024-26622": { + "cmt_msg": "tomoyo: fix UAF write bug in tomoyo_write_control()" }, - "CVE-2018-5814": { - "cmt_msg": "usbip: usbip_host: fix NULL-ptr deref and use-after-free errors" + "CVE-2023-51043": { + "cmt_msg": "drm/atomic: Fix potential use-after-free in nonblocking commits" }, - "CVE-2020-26140": { - "cmt_msg": "" + "CVE-2020-28374": { + "cmt_msg": "scsi: target: Fix XCOPY NAA identifier lookup" }, - "CVE-2020-26143": { - "cmt_msg": "" + "CVE-2019-9213": { + "cmt_msg": "mm: enforce min addr even if capable() in expand_downwards()" }, - "CVE-2020-26142": { + "CVE-2023-2007": { + "cmt_msg": "scsi: dpt_i2o: Remove obsolete driver" + }, + "CVE-2023-0615": { + "cmt_msg": "media: vivid: dev->bitmap_cap wasn't freed in all cases" + }, + "CVE-2020-26557": { "cmt_msg": "" }, - "CVE-2019-17053": { - "cmt_msg": "ieee802154: enforce CAP_NET_RAW for raw sockets" + "CVE-2019-14896": { + "cmt_msg": "libertas: Fix two buffer overflows at parsing bss descriptor" }, - "CVE-2019-17052": { - "cmt_msg": "ax25: enforce CAP_NET_RAW for raw sockets" + "CVE-2019-14897": { + "cmt_msg": "libertas: Fix two buffer overflows at parsing bss descriptor" }, - "CVE-2017-14497": { - "cmt_msg": "packet: Don't write vnet header beyond end of buffer" + "CVE-2019-14895": { + "cmt_msg": "mwifiex: fix possible heap overflow in mwifiex_process_country_ie()" }, - "CVE-2020-27418": { - "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region" + "CVE-2023-52522": { + "cmt_msg": "net: fix possible store tearing in neigh_periodic_work()" }, - "CVE-2019-17056": { - "cmt_msg": "nfc: enforce CAP_NET_RAW for raw sockets" + "CVE-2022-3586": { + "cmt_msg": "sch_sfb: Don't assume the skb is still around after enqueueing to child" }, - "CVE-2019-17055": { - "cmt_msg": "mISDN: enforce CAP_NET_RAW for raw sockets" + "CVE-2024-26592": { + "cmt_msg": "ksmbd: fix UAF issue in ksmbd_tcp_new_connection()" }, - "CVE-2019-17054": { - "cmt_msg": "appletalk: enforce CAP_NET_RAW for raw sockets" + "CVE-2024-26636": { + "cmt_msg": "llc: make llc_ui_sendmsg() more robust against bonding changes" }, - "CVE-2018-13093": { - "cmt_msg": "xfs: validate cached inodes are free when allocated" + "CVE-2024-26779": { + "cmt_msg": "wifi: mac80211: fix race condition on enabling fast-xmit" }, - "CVE-2017-2618": { - "cmt_msg": "selinux: fix off-by-one in setprocattr" + "CVE-2020-26147": { + "cmt_msg": "mac80211: assure all fragments are encrypted" }, - "CVE-2023-51781": { - "cmt_msg": "appletalk: Fix Use-After-Free in atalk_ioctl" + "CVE-2023-3006": { + "cmt_msg": "arm64: Add AMPERE1 to the Spectre-BHB affected list" }, - "CVE-2018-13096": { - "cmt_msg": "f2fs: fix to do sanity check with node footer and iblocks" + "CVE-2020-27825": { + "cmt_msg": "tracing: Fix race in trace_open and buffer resize call" }, - "CVE-2018-13097": { - "cmt_msg": "f2fs: fix to do sanity check with user_block_count" + "CVE-2019-2181": { + "cmt_msg": "binder: check for overflow when alloc for security context" }, - "CVE-2018-13094": { - "cmt_msg": "xfs: don't call xfs_da_shrink_inode with NULL bp" + "CVE-2022-20422": { + "cmt_msg": "arm64: fix oops in concurrently setting insn_emulation sysctls" }, - "CVE-2018-13095": { - "cmt_msg": "xfs: More robust inode extent count validation" + "CVE-2020-27820": { + "cmt_msg": "drm/nouveau: use drm_dev_unplug() during device removal" }, - "CVE-2020-29661": { - "cmt_msg": "tty: Fix ->pgrp locking in tiocspgrp()" + "CVE-2024-25744": { + "cmt_msg": "x86/coco: Disable 32-bit emulation by default on TDX and SEV" }, - "CVE-2020-29660": { - "cmt_msg": "tty: Fix ->session locking" + "CVE-2020-26141": { + "cmt_msg": "ath10k: Fix TKIP Michael MIC verification for PCIe" }, - "CVE-2018-13098": { - "cmt_msg": "f2fs: fix to do sanity check with extra_attr feature" + "CVE-2020-0067": { + "cmt_msg": "f2fs: fix to avoid memory leakage in f2fs_listxattr" }, - "CVE-2018-13099": { - "cmt_msg": "f2fs: fix to do sanity check with reserved blkaddr of inline inode" + "CVE-2023-52599": { + "cmt_msg": "jfs: fix array-index-out-of-bounds in diNewExt" }, - "CVE-2022-1734": { - "cmt_msg": "nfc: nfcmrvl: main: reorder destructive operations in nfcmrvl_nci_unregister_dev to avoid bugs" + "CVE-2019-20794": { + "cmt_msg": "" }, - "CVE-2017-15951": { - "cmt_msg": "KEYS: Fix race between updating and finding a negative key" + "CVE-2023-39193": { + "cmt_msg": "netfilter: xt_sctp: validate the flag_info count" }, - "CVE-2023-28772": { - "cmt_msg": "seq_buf: Fix overflow in seq_buf_putmem_hex()" + "CVE-2023-39192": { + "cmt_msg": "netfilter: xt_u32: validate user space input" }, - "CVE-2019-14895": { - "cmt_msg": "mwifiex: fix possible heap overflow in mwifiex_process_country_ie()" + "CVE-2020-26541": { + "cmt_msg": "certs: Add EFI_CERT_X509_GUID support for dbx entries" }, - "CVE-2022-24448": { - "cmt_msg": "NFSv4: Handle case where the lookup of a directory fails" + "CVE-2023-6610": { + "cmt_msg": "smb: client: fix potential OOB in smb2_dump_detail()" }, - "CVE-2019-11884": { - "cmt_msg": "Bluetooth: hidp: fix buffer overflow" + "CVE-2024-26600": { + "cmt_msg": "phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP" }, - "CVE-2023-4134": { - "cmt_msg": "Input: cyttsp4_core - change del_timer_sync() to timer_shutdown_sync()" + "CVE-2020-26559": { + "cmt_msg": "" }, - "CVE-2019-19074": { - "cmt_msg": "ath9k: release allocated buffer if timed out" + "CVE-2021-20317": { + "cmt_msg": "lib/timerqueue: Rely on rbtree semantics for next timer" }, - "CVE-2019-18683": { - "cmt_msg": "media: vivid: Fix wrong locking that causes race conditions on streaming stop" + "CVE-2021-43389": { + "cmt_msg": "isdn: cpai: check ctr->cnr to avoid array index out of bound" }, - "CVE-2022-2503": { - "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag" + "CVE-2023-3111": { + "cmt_msg": "btrfs: unset reloc control if transaction commit fails in prepare_to_relocate()" }, - "CVE-2022-48619": { - "cmt_msg": "Input: add bounds checking to input_set_capability()" + "CVE-2021-33061": { + "cmt_msg": "ixgbe: add improvement for MDD response functionality" }, - "CVE-2019-18680": { - "cmt_msg": "unknown" + "CVE-2024-26764": { + "cmt_msg": "fs/aio: Restrict kiocb_set_cancel_fn() to I/O submitted via libaio" }, - "CVE-2022-23038": { - "cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()" + "CVE-2024-26767": { + "cmt_msg": "drm/amd/display: fixed integer types and null check locations" }, - "CVE-2017-1000410": { - "cmt_msg": "Bluetooth: Prevent stack info leak from the EFS element." + "CVE-2024-26766": { + "cmt_msg": "IB/hfi1: Fix sdma.h tx->num_descs off-by-one error" }, - "CVE-2016-8645": { - "cmt_msg": "tcp: take care of truncations done by sk_filter()" + "CVE-2024-26763": { + "cmt_msg": "dm-crypt: don't modify the data when using authenticated encryption" }, - "CVE-2022-20158": { - "cmt_msg": "net/packet: fix slab-out-of-bounds access in packet_recvmsg()" + "CVE-2018-1092": { + "cmt_msg": "ext4: fail ext4_iget for root directory if unallocated" }, - "CVE-2022-23037": { - "cmt_msg": "xen/netfront: don't use gnttab_query_foreign_access() for mapped status" + "CVE-2018-1093": { + "cmt_msg": "ext4: add validity checks for bitmap block numbers" }, - "CVE-2023-20588": { - "cmt_msg": "x86/CPU/AMD: Do not leak quotient data after a division by 0" + "CVE-2017-18551": { + "cmt_msg": "i2c: core-smbus: prevent stack corruption on read I2C_BLOCK_DATA" }, - "CVE-2017-5669": { - "cmt_msg": "ipc/shm: Fix shmat mmap nil-page protection" + "CVE-2023-1074": { + "cmt_msg": "sctp: fail if no bound addresses can be used for a given scope" }, - "CVE-2019-15538": { - "cmt_msg": "xfs: fix missing ILOCK unlock when xfs_setattr_nonsize fails due to EDQUOT" + "CVE-2017-18552": { + "cmt_msg": "RDS: validate the requested traces user input against max supported" }, - "CVE-2019-15926": { - "cmt_msg": "ath6kl: add some bounds checking" + "CVE-2024-26770": { + "cmt_msg": "HID: nvidia-shield: Add missing null pointer checks to LED initialization" }, - "CVE-2019-14821": { - "cmt_msg": "KVM: coalesced_mmio: add bounds checking" + "CVE-2024-23307": { + "cmt_msg": "md/raid5: fix atomicity violation in raid5_cache_count" }, - "CVE-2020-12826": { - "cmt_msg": "signal: Extend exec_id to 64bits" + "CVE-2022-1652": { + "cmt_msg": "floppy: use a statically allocated error counter" }, - "CVE-2019-3701": { - "cmt_msg": "can: gw: ensure DLC boundaries after CAN frame modification" + "CVE-2024-26771": { + "cmt_msg": "dmaengine: ti: edma: Add some null pointer checks to the edma_probe" }, - "CVE-2021-42008": { - "cmt_msg": "net: 6pack: fix slab-out-of-bounds in decode_data" + "CVE-2020-29568": { + "cmt_msg": "xen/xenbus: Allow watches discard events before queueing" }, - "CVE-2022-39188": { - "cmt_msg": "mmu_gather: Force tlb-flush VM_PFNMAP vmas" + "CVE-2021-46932": { + "cmt_msg": "Input: appletouch - initialize work before device registration" }, - "CVE-2018-9465": { - "cmt_msg": "binder: fix proc->files use-after-free" + "CVE-2020-14351": { + "cmt_msg": "perf/core: Fix race in the perf_mmap_close() function" }, - "CVE-2019-1125": { - "cmt_msg": "x86/speculation: Prepare entry code for Spectre v1 swapgs mitigations" + "CVE-2019-19054": { + "cmt_msg": "media: rc: prevent memory leak in cx23888_ir_probe" }, - "CVE-2019-15218": { - "cmt_msg": "media: usb: siano: Fix general protection fault in smsusb" + "CVE-2019-19057": { + "cmt_msg": "mwifiex: pcie: Fix memory leak in mwifiex_pcie_init_evt_ring" }, - "CVE-2019-15666": { - "cmt_msg": "xfrm: policy: Fix out-of-bound array accesses in __xfrm_policy_unlink" + "CVE-2019-19056": { + "cmt_msg": "mwifiex: pcie: Fix memory leak in mwifiex_pcie_alloc_cmdrsp_buf" }, - "CVE-2005-3660": { + "CVE-2016-10741": { + "cmt_msg": "xfs: don't BUG() on mixed direct and mapped I/O" + }, + "CVE-2023-23039": { "cmt_msg": "" }, - "CVE-2017-14106": { - "cmt_msg": "tcp: initialize rcv_mss to TCP_MIN_MSS instead of 0" + "CVE-2019-19052": { + "cmt_msg": "can: gs_usb: gs_can_open(): prevent memory leak" }, - "CVE-2019-15212": { - "cmt_msg": "USB: rio500: refuse more than one device at a time" + "CVE-2019-3846": { + "cmt_msg": "mwifiex: Fix possible buffer overflows at parsing bss descriptor" }, - "CVE-2019-15211": { - "cmt_msg": "media: radio-raremono: change devm_k*alloc to k*alloc" + "CVE-2023-46838": { + "cmt_msg": "xen-netback: don't produce zero-size SKB frags" }, - "CVE-2023-1095": { - "cmt_msg": "netfilter: nf_tables: fix null deref due to zeroed list head" + "CVE-2020-0427": { + "cmt_msg": "pinctrl: devicetree: Avoid taking direct reference to device name string" }, - "CVE-2015-1350": { - "cmt_msg": "fs: Avoid premature clearing of capabilities" + "CVE-2021-47059": { + "cmt_msg": "crypto: sun8i-ss - fix result memory leak on error path" }, - "CVE-2019-14896": { - "cmt_msg": "libertas: Fix two buffer overflows at parsing bss descriptor" + "CVE-2022-20424": { + "cmt_msg": "io_uring: remove io_identity" }, - "CVE-2017-1000380": { - "cmt_msg": "ALSA: timer: Fix race between read and ioctl" + "CVE-2019-9458": { + "cmt_msg": "media: v4l: event: Prevent freeing event subscriptions while accessed" }, - "CVE-2019-15214": { - "cmt_msg": "ALSA: core: Fix card races between register and disconnect" + "CVE-2023-40283": { + "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb" }, - "CVE-2020-24588": { - "cmt_msg": "cfg80211: mitigate A-MSDU aggregation attacks" + "CVE-2022-1419": { + "cmt_msg": "drm/vgem: Close use-after-free race in vgem_gem_create" }, - "CVE-2021-33034": { - "cmt_msg": "Bluetooth: verify AMP hci_chan before amp_destroy" + "CVE-2023-6270": { + "cmt_msg": "aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts" }, - "CVE-2019-19922": { - "cmt_msg": "sched/fair: Fix low cpu usage with high throttling by removing expiration of cpu-local slices" + "CVE-2023-3090": { + "cmt_msg": "ipvlan:Fix out-of-bounds caused by unclear skb->cb" }, - "CVE-2019-19927": { - "cmt_msg": "drm/ttm: fix incrementing the page pointer for huge pages" + "CVE-2019-13272": { + "cmt_msg": "ptrace: Fix ->ptracer_cred handling for PTRACE_TRACEME" }, - "CVE-2017-18509": { - "cmt_msg": "ipv6: check sk sk_type and protocol early in ip_mroute_set/getsockopt" + "CVE-2023-1073": { + "cmt_msg": "HID: check empty report_list in hid_validate_values()" }, - "CVE-2017-5986": { - "cmt_msg": "sctp: avoid BUG_ON on sctp_wait_for_sndbuf" + "CVE-2023-45862": { + "cmt_msg": "USB: ene_usb6250: Allocate enough memory for full object" }, - "CVE-2022-44032": { - "cmt_msg": "char: pcmcia: remove all the drivers" + "CVE-2023-45863": { + "cmt_msg": "kobject: Fix slab-out-of-bounds in fill_kobj_path()" }, - "CVE-2024-23307": { - "cmt_msg": "" + "CVE-2023-52597": { + "cmt_msg": "KVM: s390: fix setting of fpc register" }, - "CVE-2020-8648": { - "cmt_msg": "vt: selection, close sel_buffer race" + "CVE-2017-15537": { + "cmt_msg": "x86/fpu: Don't let userspace set bogus xcomp_bv" }, - "CVE-2022-32296": { - "cmt_msg": "tcp: increase source port perturb table to 2^16" + "CVE-2022-2588": { + "cmt_msg": "net_sched: cls_route: remove from list when handle is 0" }, - "CVE-2017-11600": { - "cmt_msg": "xfrm: policy: check policy direction value" + "CVE-2019-17351": { + "cmt_msg": "xen: let alloc_xenballooned_pages() fail if not enough memory free" }, - "CVE-2023-3567": { - "cmt_msg": "vc_screen: move load of struct vc_data pointer in vcs_read() to avoid UAF" + "CVE-2020-36322": { + "cmt_msg": "fuse: fix bad inode" }, - "CVE-2019-20806": { - "cmt_msg": "media: tw5864: Fix possible NULL pointer dereference in tw5864_handle_frame" + "CVE-2022-23222": { + "cmt_msg": "bpf: Replace PTR_TO_XXX_OR_NULL with PTR_TO_XXX | PTR_MAYBE_NULL" }, - "CVE-2022-3028": { - "cmt_msg": "af_key: Do not call xfrm_probe_algs in parallel" + "CVE-2020-25669": { + "cmt_msg": "Input: sunkbd - avoid use-after-free in teardown paths" }, - "CVE-2019-2181": { - "cmt_msg": "binder: check for overflow when alloc for security context" + "CVE-2020-25668": { + "cmt_msg": "tty: make FONTX ioctl use the tty pointer they were actually passed" }, - "CVE-2020-14304": { + "CVE-2008-4609": { "cmt_msg": "" }, - "CVE-2010-5321": { - "cmt_msg": "" + "CVE-2020-25705": { + "cmt_msg": "icmp: randomize the global rate limiter" }, - "CVE-2020-15393": { - "cmt_msg": "usb: usbtest: fix missing kfree(dev->buf) in usbtest_disconnect" + "CVE-2021-0448": { + "cmt_msg": "netfilter: ctnetlink: add a range check for l3/l4 protonum" }, - "CVE-2022-33981": { - "cmt_msg": "floppy: disable FDRAWCMD by default" + "CVE-2023-52458": { + "cmt_msg": "block: add check that partition length needs to be aligned with block size" }, - "CVE-2021-3564": { - "cmt_msg": "Bluetooth: fix the erroneous flush_work() order" + "CVE-2018-20854": { + "cmt_msg": "phy: ocelot-serdes: fix out-of-bounds read" }, - "CVE-2019-9506": { - "cmt_msg": "Bluetooth: Fix faulty expression for minimum encryption key size check" + "CVE-2018-5391": { + "cmt_msg": "ip: discard IPv4 datagrams with overlapping segments." }, - "CVE-2023-1476": { + "CVE-2022-3533": { "cmt_msg": "" }, - "CVE-2017-16995": { - "cmt_msg": "bpf: fix incorrect sign extension in check_alu_op()" + "CVE-2024-26648": { + "cmt_msg": "drm/amd/display: Fix variable deferencing before NULL check in edp_setup_replay()" }, - "CVE-2017-16994": { - "cmt_msg": "mm/pagewalk.c: report holes in hugetlb ranges" + "CVE-2022-21166": { + "cmt_msg": "x86/speculation/mmio: Enable CPU Fill buffer clearing on idle" }, - "CVE-2019-2025": { - "cmt_msg": "binder: fix race that allows malicious free of live buffer" + "CVE-2023-26607": { + "cmt_msg": "ntfs: fix out-of-bounds read in ntfs_attr_find()" }, - "CVE-2017-2583": { - "cmt_msg": "KVM: x86: fix emulation of \"MOV SS, null selector\"" + "CVE-2018-20855": { + "cmt_msg": "IB/mlx5: Fix leaking stack memory to userspace" }, - "CVE-2020-26560": { + "CVE-2019-15239": { "cmt_msg": "" }, - "CVE-2017-2584": { - "cmt_msg": "KVM: x86: Introduce segmented_write_std" - }, - "CVE-2023-39198": { - "cmt_msg": "drm/qxl: fix UAF on handle creation" - }, - "CVE-2017-13080": { - "cmt_msg": "mac80211: accept key reinstall without changing anything" + "CVE-2022-3534": { + "cmt_msg": "libbpf: Fix use-after-free in btf_dump_name_dups" }, - "CVE-2021-20321": { - "cmt_msg": "ovl: fix missing negative dentry check in ovl_rename()" + "CVE-2017-15129": { + "cmt_msg": "net: Fix double free and memory corruption in get_net_ns_by_id()" }, - "CVE-2018-12127": { - "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" + "CVE-2023-52634": { + "cmt_msg": "drm/amd/display: Fix disable_otg_wa logic" }, - "CVE-2018-12126": { - "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" + "CVE-2016-2053": { + "cmt_msg": "ASN.1: Fix non-match detection failure on data overrun" }, - "CVE-2022-23816": { - "cmt_msg": "x86/kvm/vmx: Make noinstr clean" + "CVE-2023-52632": { + "cmt_msg": "drm/amdkfd: Fix lock dependency warning with srcu" }, - "CVE-2020-36158": { - "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_cmd_802_11_ad_hoc_start" + "CVE-2021-4037": { + "cmt_msg": "xfs: fix up non-directory creation in SGID directories" }, - "CVE-2017-9077": { - "cmt_msg": "ipv6/dccp: do not inherit ipv6_mc_list from parent" + "CVE-2021-22543": { + "cmt_msg": "KVM: do not allow mapping valid but non-reference-counted pages" }, - "CVE-2017-9076": { - "cmt_msg": "ipv6/dccp: do not inherit ipv6_mc_list from parent" + "CVE-2022-45884": { + "cmt_msg": "" }, - "CVE-2017-9075": { - "cmt_msg": "sctp: do not inherit ipv6_{mc|ac|fl}_list from parent" + "CVE-2019-1999": { + "cmt_msg": "binder: fix race between munmap() and direct reclaim" }, - "CVE-2017-9074": { - "cmt_msg": "ipv6: Prevent overrun when parsing v6 header options" + "CVE-2023-20941": { + "cmt_msg": "" }, - "CVE-2022-20572": { - "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag" + "CVE-2019-15292": { + "cmt_msg": "appletalk: Fix use-after-free in atalk_proc_exit" }, - "CVE-2018-10021": { - "cmt_msg": "scsi: libsas: defer ata device eh commands to libata" + "CVE-2018-20836": { + "cmt_msg": "scsi: libsas: fix a race condition when smp task timeout" }, - "CVE-2022-20132": { - "cmt_msg": "HID: add hid_is_usb() function to make it simpler for USB detection" + "CVE-2020-10135": { + "cmt_msg": "Bluetooth: Consolidate encryption handling in hci_encrypt_cfm" }, - "CVE-2019-2024": { - "cmt_msg": "media: em28xx: Fix use-after-free when disconnecting" + "CVE-2020-25285": { + "cmt_msg": "mm/hugetlb: fix a race between hugetlb sysctl handlers" }, - "CVE-2023-39194": { - "cmt_msg": "net: xfrm: Fix xfrm_address_filter OOB read" + "CVE-2019-7308": { + "cmt_msg": "bpf: fix sanitation of alu op with pointer / scalar type from different paths" }, - "CVE-2020-0067": { - "cmt_msg": "f2fs: fix to avoid memory leakage in f2fs_listxattr" + "CVE-2021-45868": { + "cmt_msg": "quota: check block number when reading the block in quota file" }, - "CVE-2019-10126": { - "cmt_msg": "mwifiex: Fix heap overflow in mwifiex_uap_parse_tail_ies()" + "CVE-2022-1966": { + "cmt_msg": "netfilter: nf_tables: disallow non-stateful expression in sets earlier" }, - "CVE-2023-3106": { - "cmt_msg": "xfrm: fix crash in XFRM_MSG_GETSA netlink handler" + "CVE-2017-9986": { + "cmt_msg": "sound: Retire OSS" }, - "CVE-2019-10124": { - "cmt_msg": "mm: hwpoison: fix thp split handing in soft_offline_in_use_page()" + "CVE-2021-3587": { + "cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect" }, - "CVE-2020-14353": { - "cmt_msg": "KEYS: prevent creating a different user's keyrings" + "CVE-2019-16995": { + "cmt_msg": "net: hsr: fix memory leak in hsr_dev_finalize()" }, - "CVE-2020-13974": { - "cmt_msg": "vt: keyboard: avoid signed integer overflow in k_ascii" + "CVE-2019-2024": { + "cmt_msg": "media: em28xx: Fix use-after-free when disconnecting" }, - "CVE-2016-6213": { - "cmt_msg": "mnt: Add a per mount namespace limit on the number of mounts" + "CVE-2021-47150": { + "cmt_msg": "net: fec: fix the potential memory leak in fec_enet_init()" }, - "CVE-2021-4083": { - "cmt_msg": "fget: check that the fd still exists after getting a ref to it" + "CVE-2021-47135": { + "cmt_msg": "mt76: mt7921: fix possible AOOB issue in mt7921_mcu_tx_rate_report" }, - "CVE-2023-33288": { - "cmt_msg": "power: supply: bq24190: Fix use after free bug in bq24190_remove due to race condition" + "CVE-2021-20261": { + "cmt_msg": "floppy: fix lock_fdc() signal handling" }, - "CVE-2018-10938": { - "cmt_msg": "Cipso: cipso_v4_optptr enter infinite loop" + "CVE-2020-36516": { + "cmt_msg": "ipv4: avoid using shared IP generator for connected sockets" }, - "CVE-2017-1000251": { - "cmt_msg": "Bluetooth: Properly check L2CAP config option output buffer length" + "CVE-2024-26808": { + "cmt_msg": "netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain" }, - "CVE-2017-1000252": { - "cmt_msg": "KVM: VMX: Do not BUG() on out-of-bounds guest IRQ" + "CVE-2021-47131": { + "cmt_msg": "net/tls: Fix use-after-free after the TLS device goes down and up" }, - "CVE-2022-29901": { - "cmt_msg": "x86/kvm/vmx: Make noinstr clean" + "CVE-2021-47133": { + "cmt_msg": "HID: amd_sfh: Fix memory leak in amd_sfh_work" }, - "CVE-2021-4197": { - "cmt_msg": "cgroup: Use open-time credentials for process migraton perm checks" + "CVE-2024-26675": { + "cmt_msg": "ppp_async: limit MRU to 64K" }, - "CVE-2018-12233": { - "cmt_msg": "jfs: Fix inconsistency between memory allocation and ea_buf->max_size" + "CVE-2022-3061": { + "cmt_msg": "video: fbdev: i740fb: Error out if 'pixclock' equals zero" }, - "CVE-2019-19227": { - "cmt_msg": "appletalk: Fix potential NULL pointer dereference in unregister_snap_client" + "CVE-2023-28328": { + "cmt_msg": "media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer()" }, - "CVE-2020-10751": { - "cmt_msg": "selinux: properly handle multiple messages in selinux_netlink_send()" + "CVE-2023-0386": { + "cmt_msg": "ovl: fail on invalid uid/gid mapping at copy up" }, - "CVE-2019-19377": { - "cmt_msg": "btrfs: Don't submit any btree write bio if the fs has errors" + "CVE-2023-52638": { + "cmt_msg": "can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock" }, - "CVE-2023-39192": { - "cmt_msg": "netfilter: xt_u32: validate user space input" + "CVE-2017-13693": { + "cmt_msg": "" }, - "CVE-2022-23042": { - "cmt_msg": "xen/netfront: react properly to failing gnttab_end_foreign_access_ref()" + "CVE-2017-13695": { + "cmt_msg": "ACPICA: acpi: acpica: fix acpi operand cache leak in nseval.c" }, - "CVE-2020-10757": { - "cmt_msg": "mm: Fix mremap not considering huge pmd devmap" + "CVE-2017-13694": { + "cmt_msg": "" }, - "CVE-2018-20511": { - "cmt_msg": "net/appletalk: fix minor pointer leak to userspace in SIOCFINDIPDDPRT" + "CVE-2021-4149": { + "cmt_msg": "btrfs: unlock newly allocated extent buffer after error" }, - "CVE-2018-20510": { - "cmt_msg": "binder: replace \"%p\" with \"%pK\"" + "CVE-2022-21385": { + "cmt_msg": "net/rds: fix warn in rds_message_alloc_sgs" }, - "CVE-2020-15437": { - "cmt_msg": "serial: 8250: fix null-ptr-deref in serial8250_start_tx()" + "CVE-2022-42895": { + "cmt_msg": "Bluetooth: L2CAP: Fix attempting to access uninitialized memory" }, - "CVE-2020-15436": { - "cmt_msg": "block: Fix use-after-free in blkdev_get()" + "CVE-2021-3640": { + "cmt_msg": "Bluetooth: sco: Fix lock_sock() blockage by memcpy_from_msg()" }, - "CVE-2022-1116": { - "cmt_msg": "" + "CVE-2020-1749": { + "cmt_msg": "net: ipv6_stub: use ip6_dst_lookup_flow instead of ip6_dst_lookup" }, - "CVE-2021-28660": { - "cmt_msg": "staging: rtl8188eu: prevent ->ssid overflow in rtw_wx_set_scan()" + "CVE-2022-42896": { + "cmt_msg": "Bluetooth: L2CAP: Fix accepting connection request for invalid SPSM" }, - "CVE-2024-0775": { - "cmt_msg": "ext4: improve error recovery code paths in __ext4_remount()" + "CVE-2021-3760": { + "cmt_msg": "nfc: nci: fix the UAF of rf_conn_info object" }, - "CVE-2020-8647": { - "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region" + "CVE-2022-48627": { + "cmt_msg": "vt: fix memory overlapping when deleting chars in the buffer" }, - "CVE-2019-0155": { - "cmt_msg": "drm/i915: Rename gen7 cmdparser tables" + "CVE-2021-47180": { + "cmt_msg": "NFC: nci: fix memory leak in nci_allocate_device" }, - "CVE-2019-0154": { - "cmt_msg": "drm/i915: Lower RM timeout to avoid DSI hard hangs" + "CVE-2022-48628": { + "cmt_msg": "ceph: drop messages from MDS when unmounting" }, - "CVE-2023-35827": { - "cmt_msg": "ravb: Fix use-after-free issue in ravb_tx_timeout_work()" + "CVE-2020-11608": { + "cmt_msg": "media: ov519: add missing endpoint sanity checks" }, - "CVE-2020-36386": { - "cmt_msg": "Bluetooth: Fix slab-out-of-bounds read in hci_extended_inquiry_result_evt()" + "CVE-2020-10732": { + "cmt_msg": "fs/binfmt_elf.c: allocate initialized memory in fill_thread_core_info()" }, - "CVE-2017-6348": { - "cmt_msg": "irda: Fix lockdep annotations in hashbin_delete()." + "CVE-2020-28097": { + "cmt_msg": "vgacon: remove software scrollback support" }, - "CVE-2022-3566": { - "cmt_msg": "tcp: Fix data races around icsk->icsk_af_ops." + "CVE-2017-18216": { + "cmt_msg": "ocfs2: subsystem.su_mutex is required while accessing the item->ci_parent" }, - "CVE-2022-3565": { - "cmt_msg": "mISDN: fix use-after-free bugs in l1oip timer handlers" + "CVE-2017-1000112": { + "cmt_msg": "udp: consistently apply ufo or fragmentation" }, - "CVE-2022-3564": { - "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free caused by l2cap_reassemble_sdu" + "CVE-2024-24855": { + "cmt_msg": "scsi: lpfc: Fix a possible data race in lpfc_unregister_fcf_rescan()" }, - "CVE-2018-19407": { - "cmt_msg": "KVM: X86: Fix scan ioapic use-before-initialization" + "CVE-2019-9466": { + "cmt_msg": "brcmfmac: add subtype check for event handling in data path" }, - "CVE-2017-6345": { - "cmt_msg": "net/llc: avoid BUG_ON() in skb_orphan()" + "CVE-2024-24857": { + "cmt_msg": "" }, - "CVE-2017-6346": { - "cmt_msg": "packet: fix races in fanout_add()" + "CVE-2018-5848": { + "cmt_msg": "wil6210: missing length check in wmi_set_ie" }, - "CVE-2017-6347": { - "cmt_msg": "ip: fix IP_CHECKSUM handling" + "CVE-2018-8897": { + "cmt_msg": "x86/entry/64: Don't use IST entry for #BP stack" }, - "CVE-2022-3628": { - "cmt_msg": "wifi: brcmfmac: Fix potential buffer overflow in brcmf_fweh_event_worker()" + "CVE-2021-29265": { + "cmt_msg": "usbip: fix stub_dev usbip_sockfd_store() races leading to gpf" }, - "CVE-2022-1048": { - "cmt_msg": "ALSA: pcm: Fix races among concurrent hw_params and hw_free calls" + "CVE-2021-39648": { + "cmt_msg": "usb: gadget: configfs: Fix use-after-free issue with udc_name" }, - "CVE-2019-14897": { - "cmt_msg": "libertas: Fix two buffer overflows at parsing bss descriptor" + "CVE-2022-3545": { + "cmt_msg": "nfp: fix use-after-free in area_cache_get()" }, - "CVE-2018-9385": { - "cmt_msg": "ARM: amba: Don't read past the end of sysfs \"driver_override\" buffer" + "CVE-2023-52569": { + "cmt_msg": "btrfs: remove BUG() after failure to insert delayed dir index item" }, - "CVE-2020-0009": { - "cmt_msg": "staging: android: ashmem: Disallow ashmem memory from being remapped" + "CVE-2023-52568": { + "cmt_msg": "x86/sgx: Resolves SECS reclaim vs. page fault for EAUG race" }, - "CVE-2023-52340": { - "cmt_msg": "ipv6: remove max_size check inline with ipv4" + "CVE-2020-14416": { + "cmt_msg": "can, slip: Protect tty->disc_data in write_wakeup and close with RCU" }, - "CVE-2023-31082": { - "cmt_msg": "" + "CVE-2019-0136": { + "cmt_msg": "mac80211: drop robust management frames from unknown TA" }, - "CVE-2022-3567": { - "cmt_msg": "ipv6: Fix data races around sk->sk_prot." + "CVE-2022-3542": { + "cmt_msg": "bnx2x: fix potential memory leak in bnx2x_tpa_stop()" }, - "CVE-2018-7480": { - "cmt_msg": "blkcg: fix double free of new_blkg in blkcg_init_queue" + "CVE-2023-52563": { + "cmt_msg": "drm/meson: fix memory leak on ->hpd_notify callback" }, - "CVE-2019-14615": { - "cmt_msg": "drm/i915/gen9: Clear residual context state on context switch" + "CVE-2019-16921": { + "cmt_msg": "RDMA/hns: Fix init resp when alloc ucontext" }, - "CVE-2018-16871": { - "cmt_msg": "nfsd: COPY and CLONE operations require the saved filehandle to be set" + "CVE-2023-52561": { + "cmt_msg": "arm64: dts: qcom: sdm845-db845c: Mark cont splash memory region as reserved" }, - "CVE-2018-9415": { - "cmt_msg": "ARM: amba: Fix race condition with driver_override" + "CVE-2018-16597": { + "cmt_msg": "ovl: modify ovl_permission() to do checks on two inodes" }, - "CVE-2023-52442": { - "cmt_msg": "ksmbd: validate session id and tree id in compound request" + "CVE-2023-52566": { + "cmt_msg": "nilfs2: fix potential use after free in nilfs_gccache_submit_read_data()" }, - "CVE-2020-12771": { - "cmt_msg": "bcache: fix potential deadlock problem in btree_gc_coalesce" + "CVE-2021-21781": { + "cmt_msg": "ARM: ensure the signal page contains defined contents" }, - "CVE-2019-13648": { - "cmt_msg": "powerpc/tm: Fix oops on sigreturn on systems without TM" + "CVE-2021-0512": { + "cmt_msg": "HID: make arrays usage and value to be the same" }, - "CVE-2023-0030": { - "cmt_msg": "drm/nouveau/mmu: add more general vmm free/node handling functions" + "CVE-2018-14633": { + "cmt_msg": "scsi: target: iscsi: Use hex2bin instead of a re-implementation" }, - "CVE-2020-16120": { - "cmt_msg": "ovl: switch to mounter creds in readdir" + "CVE-2018-12896": { + "cmt_msg": "posix-timers: Sanitize overrun handling" }, - "CVE-2019-11599": { - "cmt_msg": "coredump: fix race condition between mmget_not_zero()/get_task_mm() and core dumping" + "CVE-2023-1382": { + "cmt_msg": "tipc: set con sock in tipc_conn_alloc" }, - "CVE-2018-16658": { - "cmt_msg": "cdrom: Fix info leak/OOB read in cdrom_ioctl_drive_status" + "CVE-2019-18683": { + "cmt_msg": "media: vivid: Fix wrong locking that causes race conditions on streaming stop" }, - "CVE-2018-15572": { - "cmt_msg": "x86/speculation: Protect against userspace-userspace spectreRSB" + "CVE-2018-14734": { + "cmt_msg": "infiniband: fix a possible use-after-free bug" }, - "CVE-2022-1204": { - "cmt_msg": "ax25: Fix refcount leaks caused by ax25_cb_del()" + "CVE-2021-46924": { + "cmt_msg": "NFC: st21nfca: Fix memory leak in device probe and remove" }, - "CVE-2019-2101": { - "cmt_msg": "media: uvcvideo: Fix 'type' check leading to overflow" + "CVE-2021-46926": { + "cmt_msg": "ALSA: hda: intel-sdw-acpi: harden detection of controller" }, - "CVE-2019-17666": { - "cmt_msg": "rtlwifi: Fix potential overflow on P2P code" + "CVE-2020-0347": { + "cmt_msg": "" }, - "CVE-2018-9363": { - "cmt_msg": "Bluetooth: hidp: buffer overflow in hidp_process_report" + "CVE-2022-41222": { + "cmt_msg": "mm/mremap: hold the rmap lock in write mode when moving page table entries." }, - "CVE-2018-15471": { - "cmt_msg": "xen-netback: fix input validation in xenvif_set_hash_mapping()" + "CVE-2021-40490": { + "cmt_msg": "ext4: fix race writing to an inline_data file while its xattrs are changing" }, - "CVE-2016-10723": { - "cmt_msg": "mm, oom: remove sleep from under oom_lock" + "CVE-2021-33909": { + "cmt_msg": "seq_file: disallow extremely large seq buffer allocations" }, - "CVE-2021-3573": { - "cmt_msg": "Bluetooth: use correct lock to prevent UAF of hdev object" + "CVE-2019-12456": { + "cmt_msg": "" }, - "CVE-2020-25212": { - "cmt_msg": "nfs: Fix getxattr kernel panic and memory overflow" + "CVE-2019-18680": { + "cmt_msg": "" }, - "CVE-2019-19036": { - "cmt_msg": "btrfs: Detect unbalanced tree with empty leaf before crashing btree operations" + "CVE-2022-20565": { + "cmt_msg": "HID: core: Correctly handle ReportSize being zero" }, - "CVE-2019-3459": { - "cmt_msg": "Bluetooth: Verify that l2cap_get_conf_opt provides large enough buffer" + "CVE-2019-18806": { + "cmt_msg": "net: qlogic: Fix memory leak in ql_alloc_large_buffers" }, - "CVE-2020-11494": { - "cmt_msg": "slcan: Don't transmit uninitialized stack data in padding" + "CVE-2021-33656": { + "cmt_msg": "vt: drop old FONT ioctls" }, - "CVE-2017-8797": { - "cmt_msg": "nfsd: fix undefined behavior in nfsd4_layout_verify" + "CVE-2024-26713": { + "cmt_msg": "powerpc/pseries/iommu: Fix iommu initialisation during DLPAR add" }, - "CVE-2020-0444": { - "cmt_msg": "audit: fix error handling in audit_data_to_entry()" + "CVE-2021-33655": { + "cmt_msg": "fbcon: Disallow setting font bigger than screen size" }, - "CVE-2018-10675": { - "cmt_msg": "mm/mempolicy: fix use after free when calling get_mempolicy" + "CVE-2024-26804": { + "cmt_msg": "net: ip_tunnel: prevent perpetual headroom growth" }, - "CVE-2017-16526": { - "cmt_msg": "uwb: properly check kthread_run return value" + "CVE-2023-3611": { + "cmt_msg": "net/sched: sch_qfq: account for stab overhead in qfq_enqueue" }, - "CVE-2017-16527": { - "cmt_msg": "ALSA: usb-audio: Kill stray URB at exiting" + "CVE-2022-41858": { + "cmt_msg": "drivers: net: slip: fix NPD bug in sl_tx_timeout()" }, - "CVE-2017-16525": { - "cmt_msg": "USB: serial: console: fix use-after-free after failed setup" + "CVE-2024-26726": { + "cmt_msg": "btrfs: don't drop extent_map for free space inode on write error" }, - "CVE-2022-1836": { - "cmt_msg": "floppy: disable FDRAWCMD by default" + "CVE-2020-15437": { + "cmt_msg": "serial: 8250: fix null-ptr-deref in serial8250_start_tx()" }, - "CVE-2021-32078": { - "cmt_msg": "ARM: footbridge: remove personal server platform" + "CVE-2019-6974": { + "cmt_msg": "kvm: fix kvm_ioctl_create_device() reference counting (CVE-2019-6974)" }, - "CVE-2022-30594": { - "cmt_msg": "ptrace: Check PTRACE_O_SUSPEND_SECCOMP permission on PTRACE_SEIZE" + "CVE-2022-41850": { + "cmt_msg": "HID: roccat: Fix use-after-free in roccat_read()" }, - "CVE-2017-16528": { - "cmt_msg": "ALSA: seq: Cancel pending autoload work at unbinding device" + "CVE-2022-0168": { + "cmt_msg": "cifs: fix NULL ptr dereference in smb2_ioctl_query_info()" }, - "CVE-2017-16529": { - "cmt_msg": "ALSA: usb-audio: Check out-of-bounds access by corrupted buffer descriptor" + "CVE-2023-2985": { + "cmt_msg": "fs: hfsplus: fix UAF issue in hfsplus_put_super" }, - "CVE-2019-11833": { - "cmt_msg": "ext4: zero out the unused memory region in the extent tree block" + "CVE-2020-14390": { + "cmt_msg": "fbcon: remove soft scrollback code" }, - "CVE-2021-38205": { - "cmt_msg": "net: xilinx_emaclite: Do not print real IOMEM pointer" + "CVE-2020-24502": { + "cmt_msg": "" }, - "CVE-2016-7039": { - "cmt_msg": "net: add recursion limit to GRO" + "CVE-2022-3646": { + "cmt_msg": "nilfs2: fix leak of nilfs_root in case of writer thread creation failure" }, - "CVE-2020-0255": { - "cmt_msg": "selinux: properly handle multiple messages in selinux_netlink_send()" + "CVE-2017-17807": { + "cmt_msg": "KEYS: add missing permission check for request_key() destination" }, - "CVE-2019-2215": { - "cmt_msg": "ANDROID: binder: remove waitqueue when thread exits." + "CVE-2022-1184": { + "cmt_msg": "ext4: verify dir block before splitting it" }, - "CVE-2021-3892": { + "CVE-2022-3642": { "cmt_msg": "" }, - "CVE-2021-38208": { - "cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect" + "CVE-2019-19448": { + "cmt_msg": "btrfs: only search for left_info if there is no right_info in try_merge_free_space" }, - "CVE-2017-18232": { - "cmt_msg": "scsi: libsas: direct call probe and destruct" + "CVE-2022-1198": { + "cmt_msg": "drivers: hamradio: 6pack: fix UAF bug caused by mod_timer()" }, - "CVE-2019-2213": { - "cmt_msg": "binder: fix possible UAF when freeing buffer" + "CVE-2024-0584": { + "cmt_msg": "ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet" }, - "CVE-2020-25211": { - "cmt_msg": "netfilter: ctnetlink: add a range check for l3/l4 protonum" + "CVE-2020-0465": { + "cmt_msg": "HID: core: Sanitize event code and type when mapping input" }, - "CVE-2017-14140": { - "cmt_msg": "Sanitize 'move_pages()' permission checks" + "CVE-2020-0305": { + "cmt_msg": "chardev: Avoid potential use-after-free in 'chrdev_open()'" }, - "CVE-2020-26556": { - "cmt_msg": "" + "CVE-2018-3639": { + "cmt_msg": "x86/nospec: Simplify alternative_msr_write()" }, - "CVE-2018-9518": { - "cmt_msg": "NFC: llcp: Limit size of SDP URI" + "CVE-2023-52516": { + "cmt_msg": "dma-debug: don't call __dma_entry_alloc_check_leak() under free_entries_lock" }, - "CVE-2020-26555": { - "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical" + "CVE-2021-4218": { + "cmt_msg": "sysctl: pass kernel pointers to ->proc_handler" }, - "CVE-2018-9517": { - "cmt_msg": "l2tp: pass tunnel pointer to ->session_create()" + "CVE-2023-22995": { + "cmt_msg": "usb: dwc3: dwc3-qcom: Add missing platform_device_put() in dwc3_qcom_acpi_register_core" }, - "CVE-2018-9516": { - "cmt_msg": "HID: debug: check length before copy_to_user()" + "CVE-2024-26797": { + "cmt_msg": "drm/amd/display: Prevent potential buffer overflow in map_hw_resources" }, - "CVE-2023-3397": { + "CVE-2019-15902": { "cmt_msg": "" }, - "CVE-2018-1128": { - "cmt_msg": "libceph: add authorizer challenge" - }, - "CVE-2018-1129": { - "cmt_msg": "libceph: implement CEPHX_V2 calculation mode" - }, - "CVE-2018-1087": { - "cmt_msg": "kvm/x86: fix icebp instruction handling" - }, - "CVE-2022-26365": { - "cmt_msg": "xen/blkfront: fix leaking data in shared pages" + "CVE-2024-25739": { + "cmt_msg": "" }, - "CVE-2022-21125": { - "cmt_msg": "x86/speculation/mmio: Reuse SRBDS mitigation for SBDS" + "CVE-2023-52511": { + "cmt_msg": "spi: sun6i: reduce DMA RX transfer width to single byte" }, - "CVE-2018-20854": { - "cmt_msg": "phy: ocelot-serdes: fix out-of-bounds read" + "CVE-2019-20054": { + "cmt_msg": "fs/proc/proc_sysctl.c: fix NULL pointer dereference in put_links" }, - "CVE-2018-1121": { - "cmt_msg": "" + "CVE-2021-46982": { + "cmt_msg": "f2fs: compress: fix race condition of overwrite vs truncate" }, - "CVE-2018-20856": { - "cmt_msg": "block: blk_init_allocated_queue() set q->fq as NULL in the fail case" + "CVE-2024-0340": { + "cmt_msg": "vhost: use kzalloc() instead of kmalloc() followed by memset()" }, - "CVE-2023-52451": { - "cmt_msg": "powerpc/pseries/memhp: Fix access beyond end of drmem array" + "CVE-2021-3753": { + "cmt_msg": "vt_kdsetmode: extend console locking" }, - "CVE-2017-5754": { - "cmt_msg": "x86/cpufeatures: Add Intel feature bits for Speculation Control" + "CVE-2023-6536": { + "cmt_msg": "nvmet-tcp: fix a crash in nvmet_req_complete()" }, - "CVE-2022-3061": { - "cmt_msg": "video: fbdev: i740fb: Error out if 'pixclock' equals zero" + "CVE-2019-11135": { + "cmt_msg": "x86/msr: Add the IA32_TSX_CTRL MSR" }, - "CVE-2016-10200": { - "cmt_msg": "l2tp: fix racy SOCK_ZAPPED flag check in l2tp_ip{,6}_bind()" + "CVE-2019-11810": { + "cmt_msg": "scsi: megaraid_sas: return error when create DMA pool failed" }, - "CVE-2017-5753": { - "cmt_msg": "x86/cpufeatures: Add X86_BUG_SPECTRE_V[12]" + "CVE-2021-27365": { + "cmt_msg": "scsi: iscsi: Ensure sysfs attributes are limited to PAGE_SIZE" }, - "CVE-2022-2961": { - "cmt_msg": "" + "CVE-2021-27364": { + "cmt_msg": "scsi: iscsi: Restrict sessions and handles to admin capabilities" }, - "CVE-2022-20369": { - "cmt_msg": "media: v4l2-mem2mem: Apply DST_QUEUE_OFF_BASE on MMAP buffers across ioctls" + "CVE-2021-27363": { + "cmt_msg": "scsi: iscsi: Restrict sessions and handles to admin capabilities" }, - "CVE-2023-2176": { - "cmt_msg": "RDMA/core: Refactor rdma_bind_addr" + "CVE-2020-0431": { + "cmt_msg": "HID: hid-input: clear unmapped usages" }, - "CVE-2024-1086": { - "cmt_msg": "netfilter: nf_tables: reject QUEUE/DROP verdict parameters" + "CVE-2022-39842": { + "cmt_msg": "video: fbdev: pxa3xx-gcu: Fix integer overflow in pxa3xx_gcu_write" }, - "CVE-2022-32981": { - "cmt_msg": "powerpc/32: Fix overread/overwrite of thread_struct via ptrace" + "CVE-2018-17977": { + "cmt_msg": "" }, - "CVE-2016-10208": { - "cmt_msg": "ext4: validate s_first_meta_bg at mount time" + "CVE-2024-26659": { + "cmt_msg": "xhci: handle isoc Babble and Buffer Overrun events properly" }, - "CVE-2020-11565": { - "cmt_msg": "mm: mempolicy: require at least one nodeid for MPOL_PREFERRED" + "CVE-2024-26658": { + "cmt_msg": "bcachefs: grab s_umount only if snapshotting" }, - "CVE-2019-19049": { - "cmt_msg": "of: unittest: fix memory leak in unittest_data_add" + "CVE-2018-17972": { + "cmt_msg": "proc: restrict kernel stack dumps to root" }, - "CVE-2018-9568": { - "cmt_msg": "net: Set sk_prot_creator when cloning sockets to the right proto" + "CVE-2024-26655": { + "cmt_msg": "Fix memory leak in posix_clock_open()" }, - "CVE-2022-0644": { - "cmt_msg": "vfs: check fd has read access in kernel_read_file_from_fd()" + "CVE-2024-26654": { + "cmt_msg": "ALSA: sh: aica: reorder cleanup operations to avoid UAF bugs" }, - "CVE-2020-27784": { - "cmt_msg": "usb: gadget: function: printer: fix use-after-free in __lock_acquire" + "CVE-2021-20320": { + "cmt_msg": "s390/bpf: Fix optimizing out zero-extensions" }, - "CVE-2018-13053": { - "cmt_msg": "alarmtimer: Prevent overflow for relative nanosleep" + "CVE-2021-20321": { + "cmt_msg": "ovl: fix missing negative dentry check in ovl_rename()" }, - "CVE-2020-27786": { - "cmt_msg": "ALSA: rawmidi: Fix racy buffer resize under concurrent accesses" + "CVE-2024-26651": { + "cmt_msg": "sr9800: Add check for usbnet_get_endpoints" }, - "CVE-2019-14816": { - "cmt_msg": "mwifiex: Fix three heap overflow at parsing element in cfg80211_ap_settings" + "CVE-2024-26650": { + "cmt_msg": "platform/x86: p2sb: Allow p2sb_bar() calls during PCI device probe" }, - "CVE-2019-14814": { - "cmt_msg": "mwifiex: Fix three heap overflow at parsing element in cfg80211_ap_settings" + "CVE-2022-26490": { + "cmt_msg": "nfc: st21nfca: Fix potential buffer overflows in EVT_TRANSACTION" }, - "CVE-2023-6240": { - "cmt_msg": "" + "CVE-2017-5967": { + "cmt_msg": "time: Remove CONFIG_TIMER_STATS" }, - "CVE-2023-23559": { - "cmt_msg": "wifi: rndis_wlan: Prevent buffer overflow in rndis_query_oid" + "CVE-2021-0937": { + "cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write" }, - "CVE-2020-10720": { - "cmt_msg": "net-gro: fix use-after-free read in napi_gro_frags()" + "CVE-2022-3169": { + "cmt_msg": "nvme: ensure subsystem reset is single threaded" }, - "CVE-2020-14351": { - "cmt_msg": "perf/core: Fix race in the perf_mmap_close() function" + "CVE-2022-36280": { + "cmt_msg": "drm/vmwgfx: Validate the box size for the snooped cursor" }, - "CVE-2022-0382": { - "cmt_msg": "net ticp:fix a kernel-infoleak in __tipc_sendmsg()" + "CVE-2019-2054": { + "cmt_msg": "arm/ptrace: run seccomp after ptrace" }, - "CVE-2019-9456": { - "cmt_msg": "usb: usbmon: Read text within supplied buffer size" + "CVE-2024-26696": { + "cmt_msg": "nilfs2: fix hang in nilfs_lookup_dirty_data_buffers()" }, - "CVE-2023-32233": { - "cmt_msg": "netfilter: nf_tables: deactivate anonymous set from preparation phase" + "CVE-2018-20976": { + "cmt_msg": "xfs: clear sb->s_fs_info on mount failure" }, - "CVE-2020-25672": { - "cmt_msg": "nfc: fix memory leak in llcp_sock_connect()" + "CVE-2023-52475": { + "cmt_msg": "Input: powermate - fix use-after-free in powermate_config_complete" }, - "CVE-2019-9455": { - "cmt_msg": "media: videobuf2-v4l2: drop WARN_ON in vb2_warn_zero_bytesused()" + "CVE-2023-52477": { + "cmt_msg": "usb: hub: Guard against accesses to uninitialized BOS descriptors" }, - "CVE-2020-25670": { - "cmt_msg": "nfc: fix refcount leak in llcp_sock_bind()" + "CVE-2023-52476": { + "cmt_msg": "perf/x86/lbr: Filter vsyscall addresses" }, - "CVE-2020-25671": { - "cmt_msg": "nfc: fix refcount leak in llcp_sock_connect()" + "CVE-2016-10147": { + "cmt_msg": "crypto: mcryptd - Check mcryptd algorithm compatibility" }, - "CVE-2018-21008": { - "cmt_msg": "rsi: add fix for crash during assertions" + "CVE-2023-52470": { + "cmt_msg": "drm/radeon: check the alloc_workqueue return value in radeon_crtc_init()" }, - "CVE-2019-15223": { - "cmt_msg": "ALSA: line6: Assure canceling delayed work at disconnection" + "CVE-2024-21803": { + "cmt_msg": "" }, - "CVE-2019-15220": { - "cmt_msg": "p54usb: Fix race between disconnect and firmware loading" + "CVE-2018-16276": { + "cmt_msg": "USB: yurex: fix out-of-bounds uaccess in read handler" }, - "CVE-2019-15221": { - "cmt_msg": "ALSA: line6: Fix write on zero-sized buffer" + "CVE-2023-52479": { + "cmt_msg": "ksmbd: fix uaf in smb20_oplock_break_ack" }, - "CVE-2019-19815": { - "cmt_msg": "f2fs: support swap file w/ DIO" + "CVE-2023-2176": { + "cmt_msg": "RDMA/core: Refactor rdma_bind_addr" }, - "CVE-2019-19814": { + "CVE-2021-3542": { "cmt_msg": "" }, - "CVE-2020-29371": { - "cmt_msg": "romfs: fix uninitialized memory leak in romfs_dev_read()" - }, - "CVE-2019-19816": { - "cmt_msg": "btrfs: inode: Verify inode mode to avoid NULL pointer dereference" - }, - "CVE-2017-16939": { - "cmt_msg": "ipsec: Fix aborted xfrm policy dump crash" + "CVE-2019-16413": { + "cmt_msg": "9p: use inode->i_lock to protect i_size_write() under 32-bit" }, - "CVE-2019-9453": { - "cmt_msg": "f2fs: fix to avoid accessing xattr across the boundary" + "CVE-2018-10876": { + "cmt_msg": "ext4: only look at the bg_flags field if it is valid" }, - "CVE-2022-1016": { - "cmt_msg": "netfilter: nf_tables: initialize registers in nft_do_chain()" + "CVE-2023-30456": { + "cmt_msg": "KVM: nVMX: add missing consistency checks for CR0 and CR4" }, - "CVE-2018-18710": { - "cmt_msg": "cdrom: fix improper type cast, which can leat to information leak." + "CVE-2020-12652": { + "cmt_msg": "scsi: mptfusion: Fix double fetch bug in ioctl" }, - "CVE-2016-2188": { - "cmt_msg": "USB: iowarrior: fix NULL-deref at probe" + "CVE-2020-12653": { + "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_cmd_append_vsie_tlv()" }, - "CVE-2022-1012": { - "cmt_msg": "secure_seq: use the 64 bits of the siphash for port offset calculation" + "CVE-2019-7222": { + "cmt_msg": "KVM: x86: work around leak of uninitialized stack contents (CVE-2019-7222)" }, - "CVE-2020-12114": { - "cmt_msg": "make struct mountpoint bear the dentry reference to mountpoint, not struct mount" + "CVE-2022-23040": { + "cmt_msg": "xen/xenbus: don't let xenbus_grant_ring() remove grants in error case" }, - "CVE-2020-8649": { - "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region" + "CVE-2020-12654": { + "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_ret_wmm_get_status()" }, - "CVE-2023-3161": { - "cmt_msg": "fbcon: Check font dimension limits" + "CVE-2019-7221": { + "cmt_msg": "KVM: nVMX: unconditionally cancel preemption timer in free_nested (CVE-2019-7221)" }, - "CVE-2020-12656": { - "cmt_msg": "sunrpc: check that domain table is empty at module unload." + "CVE-2018-12929": { + "cmt_msg": "" }, - "CVE-2020-14356": { - "cmt_msg": "cgroup: fix cgroup_sk_alloc() for sk_clone_lock()" + "CVE-2018-12928": { + "cmt_msg": "" }, - "CVE-2017-1000405": { - "cmt_msg": "mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d()" + "CVE-2021-35477": { + "cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4" }, - "CVE-2021-26930": { - "cmt_msg": "xen-blkback: fix error handling in xen_blkbk_map()" + "CVE-2020-36310": { + "cmt_msg": "KVM: SVM: avoid infinite loop on NPF from bad address" }, - "CVE-2017-1000407": { - "cmt_msg": "KVM: VMX: remove I/O port 0x80 bypass on Intel hosts" + "CVE-2020-36313": { + "cmt_msg": "KVM: Fix out of range accesses to memslots" }, - "CVE-2021-26932": { - "cmt_msg": "Xen/x86: don't bail early from clear_foreign_p2m_mapping()" + "CVE-2020-35519": { + "cmt_msg": "net/x25: prevent a couple of overflows" }, - "CVE-2024-25740": { - "cmt_msg": "" + "CVE-2016-5243": { + "cmt_msg": "tipc: fix an infoleak in tipc_nl_compat_link_dump" }, - "CVE-2023-52456": { - "cmt_msg": "serial: imx: fix tx statemachine deadlock" + "CVE-2022-33740": { + "cmt_msg": "xen/netfront: fix leaking data in shared pages" }, - "CVE-2023-3141": { - "cmt_msg": "memstick: r592: Fix UAF bug in r592_remove due to race condition" + "CVE-2022-48619": { + "cmt_msg": "Input: add bounds checking to input_set_capability()" }, - "CVE-2023-37454": { + "CVE-2020-10708": { "cmt_msg": "" }, - "CVE-2016-9555": { - "cmt_msg": "sctp: validate chunk len before actually using it" - }, - "CVE-2019-3892": { - "cmt_msg": "coredump: fix race condition between mmget_not_zero()/get_task_mm() and core dumping" + "CVE-2022-0400": { + "cmt_msg": "" }, - "CVE-2020-12352": { - "cmt_msg": "Bluetooth: A2MP: Fix not initializing all members" + "CVE-2024-25741": { + "cmt_msg": "" }, - "CVE-2020-12655": { - "cmt_msg": "xfs: add agf freeblocks verify in xfs_agf_verify" + "CVE-2024-26778": { + "cmt_msg": "fbdev: savage: Error out if pixclock equals zero" }, - "CVE-2021-43976": { - "cmt_msg": "mwifiex: Fix skb_over_panic in mwifiex_usb_recv()" + "CVE-2024-26809": { + "cmt_msg": "netfilter: nft_set_pipapo: release elements in clone only from destroy path" }, - "CVE-2022-0494": { - "cmt_msg": "block-map: add __GFP_ZERO flag for alloc_page in function bio_copy_kern" + "CVE-2021-38160": { + "cmt_msg": "virtio_console: Assure used length from device is limited" }, - "CVE-2023-2269": { - "cmt_msg": "dm ioctl: fix nested locking in table_clear() to remove deadlock concern" + "CVE-2021-42739": { + "cmt_msg": "media: firewire: firedtv-avc: fix a buffer overflow in avc_ca_pmt()" }, - "CVE-2020-26088": { - "cmt_msg": "net/nfc/rawsock.c: add CAP_NET_RAW check." + "CVE-2022-3344": { + "cmt_msg": "KVM: x86: nSVM: harden svm_free_nested against freeing vmcb02 while still in use" }, - "CVE-2022-3524": { - "cmt_msg": "tcp/udp: Fix memory leak in ipv6_renew_options()." + "CVE-2024-26806": { + "cmt_msg": "spi: cadence-qspi: remove system-wide suspend helper calls from runtime PM hooks" }, - "CVE-2022-3523": { - "cmt_msg": "mm/memory.c: fix race when faulting a device private page" + "CVE-2022-3111": { + "cmt_msg": "power: supply: wm8350-power: Add missing free in free_charger_irq" }, - "CVE-2022-3522": { - "cmt_msg": "mm/hugetlb: use hugetlb_pte_stable in migration race check" + "CVE-2017-15116": { + "cmt_msg": "crypto: rng - Remove old low-level rng interface" }, - "CVE-2008-2544": { - "cmt_msg": "" + "CVE-2020-12770": { + "cmt_msg": "scsi: sg: add sg_remove_request in sg_write" }, - "CVE-2021-3178": { - "cmt_msg": "nfsd4: readdirplus shouldn't return parent of export" + "CVE-2024-26802": { + "cmt_msg": "stmmac: Clear variable when destroying workqueue" }, - "CVE-2022-2318": { - "cmt_msg": "net: rose: fix UAF bugs caused by timer handler" + "CVE-2018-6412": { + "cmt_msg": "fbdev: Fixing arbitrary kernel leak in case FBIOGETCMAP_SPARC in sbusfb_ioctl_helper()." }, - "CVE-2022-42703": { - "cmt_msg": "mm/rmap: Fix anon_vma->degree ambiguity leading to double-reuse" + "CVE-2023-52606": { + "cmt_msg": "powerpc/lib: Validate size for vector operations" }, - "CVE-2023-23455": { - "cmt_msg": "net: sched: atm: dont intepret cls results when asked to drop" + "CVE-2018-21008": { + "cmt_msg": "rsi: add fix for crash during assertions" }, - "CVE-2018-7755": { - "cmt_msg": "floppy: Do not copy a kernel pointer to user memory in FDGETPRM ioctl" + "CVE-2023-52604": { + "cmt_msg": "FS:JFS:UBSAN:array-index-out-of-bounds in dbAdjTree" }, - "CVE-2017-7346": { - "cmt_msg": "drm/vmwgfx: limit the number of mip levels in vmw_gb_surface_define_ioctl()" + "CVE-2023-52531": { + "cmt_msg": "wifi: iwlwifi: mvm: Fix a memory corruption issue" }, - "CVE-2018-7757": { - "cmt_msg": "scsi: libsas: fix memory leak in sas_smp_get_phy_events()" + "CVE-2023-52602": { + "cmt_msg": "jfs: fix slab-out-of-bounds Read in dtSearch" }, - "CVE-2019-11815": { - "cmt_msg": "net: rds: force to destroy connection if t_sock is NULL in rds_tcp_kill_sock()." + "CVE-2023-52603": { + "cmt_msg": "UBSAN: array-index-out-of-bounds in dtSplitRoot" }, - "CVE-2007-3719": { + "CVE-2022-25265": { "cmt_msg": "" }, - "CVE-2023-3863": { - "cmt_msg": "net: nfc: Fix use-after-free caused by nfc_llcp_find_local" + "CVE-2022-20368": { + "cmt_msg": "net/packet: fix slab-out-of-bounds access in packet_recvmsg()" }, - "CVE-2023-0590": { - "cmt_msg": "net: sched: fix race condition in qdisc_graft()" + "CVE-2019-19813": { + "cmt_msg": "btrfs: inode: Verify inode mode to avoid NULL pointer dereference" }, - "CVE-2022-29900": { - "cmt_msg": "x86/kvm/vmx: Make noinstr clean" + "CVE-2020-11609": { + "cmt_msg": "media: stv06xx: add missing descriptor sanity checks" }, - "CVE-2022-4095": { - "cmt_msg": "staging: rtl8712: fix use after free bugs" + "CVE-2020-10773": { + "cmt_msg": "s390/cmm: fix information leak in cmm_timeout_handler()" }, - "CVE-2017-10911": { - "cmt_msg": "xen-blkback: don't leak stack data via response ring" + "CVE-2022-21499": { + "cmt_msg": "lockdown: also lock down previous kgdb use" }, - "CVE-2023-34255": { - "cmt_msg": "xfs: verify buffer contents when we skip log replay" + "CVE-2020-25284": { + "cmt_msg": "rbd: require global CAP_SYS_ADMIN for mapping and unmapping" }, - "CVE-2022-45919": { - "cmt_msg": "media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221" + "CVE-2023-4208": { + "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free" }, - "CVE-2019-19319": { - "cmt_msg": "ext4: protect journal inode's blocks using block_validity" + "CVE-2023-4206": { + "cmt_msg": "net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free" }, - "CVE-2023-2248": { - "cmt_msg": "net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg" + "CVE-2023-4207": { + "cmt_msg": "net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free" }, - "CVE-2023-30772": { - "cmt_msg": "power: supply: da9150: Fix use after free bug in da9150_charger_remove due to race condition" + "CVE-2023-3640": { + "cmt_msg": "" }, - "CVE-2017-18017": { - "cmt_msg": "netfilter: xt_TCPMSS: add more sanity tests on tcph->doff" + "CVE-2018-18281": { + "cmt_msg": "mremap: properly flush TLB before releasing the page" }, - "CVE-2022-24958": { - "cmt_msg": "usb: gadget: don't release an existing dev->buf" + "CVE-2023-20593": { + "cmt_msg": "x86/cpu/amd: Add a Zenbleed fix" }, - "CVE-2023-1611": { - "cmt_msg": "btrfs: fix race between quota disable and quota assign ioctls" + "CVE-2023-3022": { + "cmt_msg": "ipv6: Use result arg in fib_lookup_arg consistently" }, - "CVE-2021-3772": { - "cmt_msg": "sctp: use init_tag from inithdr for ABORT chunk" + "CVE-2022-2663": { + "cmt_msg": "netfilter: nf_conntrack_irc: Fix forged IP logic" }, - "CVE-2023-3268": { - "cmt_msg": "relayfs: fix out-of-bounds access in relay_file_read" + "CVE-2022-43750": { + "cmt_msg": "usb: mon: make mmapped memory read only" }, - "CVE-2021-3679": { - "cmt_msg": "tracing: Fix bug in rb_per_cpu_empty() that might cause deadloop." + "CVE-2023-51780": { + "cmt_msg": "atm: Fix Use-After-Free in do_vcc_ioctl" }, - "CVE-2021-37159": { - "cmt_msg": "usb: hso: fix error handling code of hso_create_net_device" + "CVE-2023-0047": { + "cmt_msg": "mm, oom: do not trigger out_of_memory from the #PF" }, - "CVE-2016-8399": { - "cmt_msg": "net: ping: check minimum size on ICMP header length" + "CVE-2021-47046": { + "cmt_msg": "drm/amd/display: Fix off by one in hdmi_14_process_transaction()" }, - "CVE-2022-2586": { - "cmt_msg": "netfilter: nf_tables: do not allow SET_ID to refer to another table" + "CVE-2019-15219": { + "cmt_msg": "USB: sisusbvga: fix oops in error path of sisusb_probe" }, - "CVE-2016-7042": { - "cmt_msg": "KEYS: Fix short sprintf buffer in /proc/keys show function" + "CVE-2023-52500": { + "cmt_msg": "scsi: pm80xx: Avoid leaking tags when processing OPC_INB_SET_CONTROLLER_CONFIG command" }, - "CVE-2021-28715": { - "cmt_msg": "xen/netback: don't queue unlimited number of packages" + "CVE-2021-47167": { + "cmt_msg": "NFS: Fix an Oopsable condition in __nfs_pageio_add_request()" }, - "CVE-2021-28714": { - "cmt_msg": "xen/netback: fix rx queue stall detection" + "CVE-2021-47166": { + "cmt_msg": "NFS: Don't corrupt the value of pg_bytes_written in nfs_do_recoalesce()" }, - "CVE-2021-28713": { - "cmt_msg": "xen/console: harden hvc_xen against event channel storms" + "CVE-2021-47165": { + "cmt_msg": "drm/meson: fix shutdown crash when component not probed" }, - "CVE-2017-8924": { - "cmt_msg": "USB: serial: io_ti: fix information leak in completion handler" + "CVE-2021-47163": { + "cmt_msg": "tipc: wait and exit until all work queues are done" }, - "CVE-2017-18261": { - "cmt_msg": "clocksource/drivers/arm_arch_timer: Avoid infinite recursion when ftrace is enabled" + "CVE-2021-46969": { + "cmt_msg": "bus: mhi: core: Fix invalid error returning in mhi_queue" }, - "CVE-2021-4157": { - "cmt_msg": "pNFS/flexfiles: fix incorrect size check in decode_nfs_fh()" + "CVE-2021-47160": { + "cmt_msg": "net: dsa: mt7530: fix VLAN traffic leaks" }, - "CVE-2022-2991": { - "cmt_msg": "remove the lightnvm subsystem" + "CVE-2023-4385": { + "cmt_msg": "fs: jfs: fix possible NULL pointer dereference in dbFree()" }, - "CVE-2022-3621": { - "cmt_msg": "nilfs2: fix NULL pointer dereference at nilfs_bmap_lookup_at_level()" + "CVE-2020-25643": { + "cmt_msg": "hdlc_ppp: add range checks in ppp_cp_parse_cr()" }, - "CVE-2017-11473": { - "cmt_msg": "x86/acpi: Prevent out of bound access caused by broken ACPI tables" + "CVE-2021-46962": { + "cmt_msg": "mmc: uniphier-sd: Fix a resource leak in the remove function" }, - "CVE-2017-11472": { - "cmt_msg": "ACPICA: Namespace: fix operand cache leak" + "CVE-2021-47168": { + "cmt_msg": "NFS: fix an incorrect limit in filelayout_decode_layout()" }, - "CVE-2022-3624": { - "cmt_msg": "bonding: fix reference count leak in balance-alb mode" + "CVE-2019-19378": { + "cmt_msg": "" }, - "CVE-2017-17862": { - "cmt_msg": "bpf: fix branch pruning logic" + "CVE-2023-52482": { + "cmt_msg": "x86/srso: Add SRSO mitigation for Hygon processors" }, - "CVE-2021-39657": { - "cmt_msg": "scsi: ufs: Correct the LUN used in eh_device_reset_handler() callback" + "CVE-2022-1016": { + "cmt_msg": "netfilter: nf_tables: initialize registers in nft_do_chain()" }, - "CVE-2021-3669": { - "cmt_msg": "ipc: replace costly bailout check in sysvipc_find_ipc()" + "CVE-2020-4788": { + "cmt_msg": "powerpc/64s: flush L1D on kernel entry" }, - "CVE-2019-18885": { - "cmt_msg": "btrfs: merge btrfs_find_device and find_device" + "CVE-2024-26744": { + "cmt_msg": "RDMA/srpt: Support specifying the srpt_service_guid parameter" }, - "CVE-2017-7889": { - "cmt_msg": "mm: Tighten x86 /dev/mem with zeroing reads" + "CVE-2022-36879": { + "cmt_msg": "xfrm: xfrm_policy: fix a possible double xfrm_pols_put() in xfrm_bundle_lookup()" }, - "CVE-2019-12378": { - "cmt_msg": "ipv6_sockglue: Fix a missing-check bug in ip6_ra_control()" + "CVE-2022-1011": { + "cmt_msg": "fuse: fix pipe buffer lifetime for direct_io" }, - "CVE-2019-11091": { - "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" + "CVE-2021-39698": { + "cmt_msg": "wait: add wake_up_pollfree()" }, - "CVE-2022-3239": { - "cmt_msg": "media: em28xx: initialize refcount before kref_get" + "CVE-2022-45934": { + "cmt_msg": "Bluetooth: L2CAP: Fix u8 overflow" }, - "CVE-2022-4543": { + "CVE-2022-1247": { "cmt_msg": "" }, - "CVE-2019-18660": { - "cmt_msg": "powerpc/book3s64: Fix link stack flush on context switch" + "CVE-2019-19377": { + "cmt_msg": "btrfs: Don't submit any btree write bio if the fs has errors" }, - "CVE-2023-4921": { - "cmt_msg": "net: sched: sch_qfq: Fix UAF in qfq_dequeue()" + "CVE-2022-2380": { + "cmt_msg": "video: fbdev: sm712fb: Fix crash in smtcfb_read()" }, - "CVE-2022-3424": { - "cmt_msg": "misc: sgi-gru: fix use-after-free error in gru_set_context_option, gru_fault and gru_handle_user_call_os" + "CVE-2022-0850": { + "cmt_msg": "ext4: fix kernel infoleak via ext4_extent_header" }, - "CVE-2017-15649": { - "cmt_msg": "packet: in packet_do_bind, test fanout with bind_lock held" + "CVE-2020-10767": { + "cmt_msg": "x86/speculation: Avoid force-disabling IBPB based on STIBP and enhanced IBRS." }, - "CVE-2017-11089": { - "cmt_msg": "cfg80211: Define nla_policy for NL80211_ATTR_LOCAL_MESH_POWER_MODE" + "CVE-2019-19528": { + "cmt_msg": "USB: iowarrior: fix use-after-free on disconnect" }, - "CVE-2023-1829": { - "cmt_msg": "net/sched: Retire tcindex classifier" + "CVE-2021-3612": { + "cmt_msg": "Input: joydev - prevent potential read overflow in ioctl" }, - "CVE-2019-18282": { - "cmt_msg": "net/flow_dissector: switch to siphash" + "CVE-2020-24503": { + "cmt_msg": "" }, - "CVE-2021-34981": { - "cmt_msg": "Bluetooth: cmtp: fix file refcount when cmtp_attach_device fails" + "CVE-2019-19524": { + "cmt_msg": "Input: ff-memless - kill timer in destroy()" }, - "CVE-2023-1670": { - "cmt_msg": "xirc2ps_cs: Fix use after free bug in xirc2ps_detach" + "CVE-2019-19527": { + "cmt_msg": "HID: hiddev: do cleanup in failure of opening a device" }, - "CVE-2023-4881": { - "cmt_msg": "netfilter: nftables: exthdr: fix 4-byte stack OOB write" + "CVE-2019-19449": { + "cmt_msg": "f2fs: fix to do sanity check on segment/section count" }, - "CVE-2017-14489": { - "cmt_msg": "scsi: scsi_transport_iscsi: fix the issue that iscsi_if_rx doesn't parse nlmsg properly" + "CVE-2023-31085": { + "cmt_msg": "ubi: Refuse attaching if mtd's erasesize is 0" }, - "CVE-2023-6915": { - "cmt_msg": "ida: Fix crash in ida_free when the bitmap is empty" + "CVE-2019-19523": { + "cmt_msg": "USB: adutux: fix use-after-free on disconnect" }, - "CVE-2022-20148": { - "cmt_msg": "f2fs: fix UAF in f2fs_available_free_memory" + "CVE-2021-3752": { + "cmt_msg": "Bluetooth: fix use-after-free error in lock_sock_nested()" }, - "CVE-2022-1786": { - "cmt_msg": "io_uring: remove io_identity" + "CVE-2023-52620": { + "cmt_msg": "netfilter: nf_tables: disallow timeout for anonymous sets" }, - "CVE-2013-7445": { + "CVE-2020-11725": { "cmt_msg": "" }, - "CVE-2016-9604": { - "cmt_msg": "KEYS: Disallow keyrings beginning with '.' to be joined as session keyrings" + "CVE-2017-7533": { + "cmt_msg": "dentry name snapshots" }, - "CVE-2022-3646": { - "cmt_msg": "nilfs2: fix leak of nilfs_root in case of writer thread creation failure" + "CVE-2017-18249": { + "cmt_msg": "f2fs: fix race condition in between free nid allocator/initializer" }, - "CVE-2022-28390": { - "cmt_msg": "can: ems_usb: ems_usb_start_xmit(): fix double dev_kfree_skb() in error path" + "CVE-2023-52621": { + "cmt_msg": "bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers" }, - "CVE-2019-15292": { - "cmt_msg": "appletalk: Fix use-after-free in atalk_proc_exit" + "CVE-2022-1263": { + "cmt_msg": "KVM: avoid NULL pointer dereference in kvm_dirty_ring_push" }, - "CVE-2020-12652": { - "cmt_msg": "scsi: mptfusion: Fix double fetch bug in ioctl" + "CVE-2016-5244": { + "cmt_msg": "rds: fix an infoleak in rds_inc_info_copy" }, - "CVE-2024-25741": { - "cmt_msg": "" + "CVE-2017-18241": { + "cmt_msg": "f2fs: fix a panic caused by NULL flush_cmd_control" }, - "CVE-2017-14340": { - "cmt_msg": "xfs: XFS_IS_REALTIME_INODE() should be false if no rt device present" + "CVE-2023-31082": { + "cmt_msg": "" }, - "CVE-2019-15217": { - "cmt_msg": "media: usb:zr364xx:Fix KASAN:null-ptr-deref Read in zr364xx_vidioc_querycap" + "CVE-2019-16746": { + "cmt_msg": "nl80211: validate beacon head" }, - "CVE-2022-26966": { - "cmt_msg": "sr9700: sanity check for packet length" + "CVE-2023-52623": { + "cmt_msg": "SUNRPC: Fix a suspicious RCU usage warning" }, - "CVE-2019-19535": { - "cmt_msg": "can: peak_usb: pcan_usb_fd: Fix info-leaks to USB devices" + "CVE-2022-3606": { + "cmt_msg": "" }, - "CVE-2020-14386": { - "cmt_msg": "net/packet: fix overflow in tpacket_rcv" + "CVE-2023-31081": { + "cmt_msg": "" }, - "CVE-2021-34693": { - "cmt_msg": "can: bcm: fix infoleak in struct bcm_msg_head" + "CVE-2022-2209": { + "cmt_msg": "" }, - "CVE-2020-14381": { - "cmt_msg": "futex: Fix inode life-time issue" + "CVE-2023-52624": { + "cmt_msg": "drm/amd/display: Wake DMCUB before executing GPINT commands" }, - "CVE-2023-30456": { - "cmt_msg": "KVM: nVMX: add missing consistency checks for CR0 and CR4" + "CVE-2018-18021": { + "cmt_msg": "arm64: KVM: Tighten guest core register access from userspace" }, - "CVE-2019-19768": { - "cmt_msg": "blktrace: Protect q->blk_trace with RCU" + "CVE-2021-37576": { + "cmt_msg": "KVM: PPC: Book3S: Fix H_RTAS rets buffer overflow" }, - "CVE-2022-3303": { - "cmt_msg": "ALSA: pcm: oss: Fix race at SNDCTL_DSP_SYNC" + "CVE-2017-9725": { + "cmt_msg": "mm: cma: fix incorrect type conversion for size during dma allocation" }, - "CVE-2019-19039": { - "cmt_msg": "btrfs: Don't submit any btree write bio if the fs has errors" + "CVE-2024-26775": { + "cmt_msg": "aoe: avoid potential deadlock at set_capacity" }, - "CVE-2017-5715": { - "cmt_msg": "x86/cpufeatures: Add X86_BUG_SPECTRE_V[12]" + "CVE-2023-45871": { + "cmt_msg": "igb: set max size RX buffer when store bad packet is enabled" }, - "CVE-2022-20141": { - "cmt_msg": "igmp: Add ip_mc_list lock in ip_check_mc_rcu" + "CVE-2023-7042": { + "cmt_msg": "wifi: ath10k: fix NULL pointer dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev()" }, - "CVE-2020-25704": { - "cmt_msg": "perf/core: Fix a memory leak in perf_event_parse_addr_filter()" + "CVE-2022-3594": { + "cmt_msg": "r8152: Rate limit overflow messages" }, - "CVE-2021-45095": { - "cmt_msg": "phonet: refcount leak in pep_sock_accep" + "CVE-2018-14609": { + "cmt_msg": "btrfs: relocation: Only remove reloc rb_trees if reloc control has been initialized" }, - "CVE-2023-23454": { - "cmt_msg": "net: sched: cbq: dont intepret cls results when asked to drop" + "CVE-2021-33098": { + "cmt_msg": "ixgbe: fix large MTU request from VF" }, - "CVE-2016-8630": { - "cmt_msg": "kvm: x86: Check memopp before dereference (CVE-2016-8630)" + "CVE-2022-3595": { + "cmt_msg": "cifs: fix double-fault crash during ntlmssp" }, - "CVE-2016-8633": { - "cmt_msg": "firewire: net: guard against rx buffer overflows" + "CVE-2023-47233": { + "cmt_msg": "wifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach" }, - "CVE-2016-8632": { - "cmt_msg": "tipc: check minimum bearer MTU" + "CVE-2020-10769": { + "cmt_msg": "crypto: authenc - fix parsing key with misaligned rta_len" }, - "CVE-2018-3620": { - "cmt_msg": "x86/microcode: Allow late microcode loading with SMT disabled" + "CVE-2020-27815": { + "cmt_msg": "jfs: Fix array index bounds check in dbAdjTree" }, - "CVE-2023-6932": { - "cmt_msg": "ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet" + "CVE-2023-52629": { + "cmt_msg": "sh: push-switch: Reorder cleanup operations to avoid use-after-free bug" }, - "CVE-2019-3460": { - "cmt_msg": "Bluetooth: Check L2CAP option sizes returned from l2cap_get_conf_opt" + "CVE-2021-45486": { + "cmt_msg": "inet: use bigger hash table for IP ID generation" }, - "CVE-2018-8781": { - "cmt_msg": "drm: udl: Properly check framebuffer mmap offsets" + "CVE-2022-1462": { + "cmt_msg": "tty: use new tty_insert_flip_string_and_push_buffer() in pty_write()" }, - "CVE-2021-29155": { - "cmt_msg": "bpf: Use correct permission flag for mixed signed bounds arithmetic" + "CVE-2024-26758": { + "cmt_msg": "md: Don't ignore suspended array in md_check_recovery()" }, - "CVE-2024-22386": { - "cmt_msg": "" + "CVE-2024-26759": { + "cmt_msg": "mm/swap: fix race when skipping swapcache" }, - "CVE-2021-33631": { - "cmt_msg": "ext4: fix kernel BUG in 'ext4_write_inline_data_end()'" + "CVE-2023-52559": { + "cmt_msg": "iommu/vt-d: Avoid memory allocation in iommu_suspend()" }, - "CVE-2019-15916": { - "cmt_msg": "net-sysfs: Fix mem leak in netdev_register_kobject" + "CVE-2023-6606": { + "cmt_msg": "smb: client: fix OOB in smbCalcSize()" }, - "CVE-2019-15917": { - "cmt_msg": "Bluetooth: hci_ldisc: Postpone HCI_UART_PROTO_READY bit set in hci_uart_set_proto()" + "CVE-2020-27067": { + "cmt_msg": "l2tp: fix l2tp_eth module loading" }, - "CVE-2017-18344": { - "cmt_msg": "posix-timer: Properly check sigevent->sigev_notify" + "CVE-2020-27777": { + "cmt_msg": "powerpc/rtas: Restrict RTAS requests from userspace" }, - "CVE-2018-6412": { - "cmt_msg": "fbdev: Fixing arbitrary kernel leak in case FBIOGETCMAP_SPARC in sbusfb_ioctl_helper()." + "CVE-2019-20636": { + "cmt_msg": "Input: add safety guards to input_set_keycode()" }, - "CVE-2017-15265": { - "cmt_msg": "ALSA: seq: Fix use-after-free at creating a port" + "CVE-2019-11486": { + "cmt_msg": "tty: mark Siemens R3964 line discipline as BROKEN" }, - "CVE-2021-27363": { - "cmt_msg": "scsi: iscsi: Restrict sessions and handles to admin capabilities" + "CVE-2019-11487": { + "cmt_msg": "fs: prevent page refcount overflow in pipe_buf_get" }, - "CVE-2020-12362": { - "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" + "CVE-2022-28390": { + "cmt_msg": "can: ems_usb: ems_usb_start_xmit(): fix double dev_kfree_skb() in error path" }, - "CVE-2020-12363": { - "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" + "CVE-2018-8043": { + "cmt_msg": "net: phy: mdio-bcm-unimac: fix potential NULL dereference in unimac_mdio_probe()" }, - "CVE-2019-12881": { - "cmt_msg": "drm/i915/userptr: reject zero user_size" + "CVE-2020-27675": { + "cmt_msg": "xen/events: avoid removing an event channel while handling it" }, - "CVE-2022-4129": { - "cmt_msg": "l2tp: Serialize access to sk_user_data with sk_callback_lock" + "CVE-2024-26756": { + "cmt_msg": "md: Don't register sync_thread for reshape directly" }, - "CVE-2023-3117": { - "cmt_msg": "netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE" + "CVE-2020-28915": { + "cmt_msg": "fbcon: Fix global-out-of-bounds read in fbcon_get_font()" }, - "CVE-2018-1000004": { - "cmt_msg": "ALSA: seq: Make ioctls race-free" + "CVE-2021-47169": { + "cmt_msg": "serial: rp2: use 'request_firmware' instead of 'request_firmware_nowait'" }, - "CVE-2018-18690": { - "cmt_msg": "xfs: don't fail when converting shortform attr to long form during ATTR_REPLACE" + "CVE-2019-20908": { + "cmt_msg": "efi: Restrict efivar_ssdt_load when the kernel is locked down" }, - "CVE-2022-28388": { - "cmt_msg": "can: usb_8dev: usb_8dev_start_xmit(): fix double dev_kfree_skb() in error path" + "CVE-2023-3776": { + "cmt_msg": "net/sched: cls_fw: Fix improper refcount update leads to use-after-free" }, - "CVE-2017-0627": { - "cmt_msg": "media: uvcvideo: Prevent heap overflow when accessing mapped controls" + "CVE-2021-28038": { + "cmt_msg": "Xen/gnttab: handle p2m update errors on a per-slot basis" }, - "CVE-2021-0605": { - "cmt_msg": "af_key: pfkey_dump needs parameter validation" + "CVE-2020-27068": { + "cmt_msg": "cfg80211: add missing policy for NL80211_ATTR_STATUS_CODE" }, - "CVE-2021-3896": { - "cmt_msg": "isdn: cpai: check ctr->cnr to avoid array index out of bound" + "CVE-2021-29154": { + "cmt_msg": "bpf, x86: Validate computation of branch displacements for x86-64" }, - "CVE-2021-4002": { - "cmt_msg": "hugetlbfs: flush TLBs correctly after huge_pmd_unshare" + "CVE-2024-26773": { + "cmt_msg": "ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found()" }, - "CVE-2023-26545": { - "cmt_msg": "net: mpls: fix stale pointer if allocation fails during device rename" + "CVE-2023-52434": { + "cmt_msg": "smb: client: fix potential OOBs in smb2_parse_contexts()" }, - "CVE-2021-38204": { - "cmt_msg": "usb: max-3421: Prevent corruption of freed memory" + "CVE-2023-3161": { + "cmt_msg": "fbcon: Check font dimension limits" }, - "CVE-2022-34918": { - "cmt_msg": "netfilter: nf_tables: stricter validation of element data" + "CVE-2023-52436": { + "cmt_msg": "f2fs: explicitly null-terminate the xattr list" }, - "CVE-2018-20961": { - "cmt_msg": "USB: gadget: f_midi: fixing a possible double-free in f_midi" + "CVE-2019-19060": { + "cmt_msg": "iio: imu: adis16400: release allocated memory on failure" }, - "CVE-2019-20811": { - "cmt_msg": "net-sysfs: call dev_hold if kobject_init_and_add success" + "CVE-2019-19061": { + "cmt_msg": "iio: imu: adis16400: fix memory leak" }, - "CVE-2019-20810": { - "cmt_msg": "media: go7007: fix a miss of snd_card_free" + "CVE-2019-19062": { + "cmt_msg": "crypto: user - fix memory leak in crypto_report" }, - "CVE-2019-20812": { - "cmt_msg": "af_packet: set defaule value for tmo" + "CVE-2019-19063": { + "cmt_msg": "rtlwifi: prevent memory leak in rtl_usb_probe" }, - "CVE-2023-1990": { - "cmt_msg": "nfc: st-nci: Fix use after free bug in ndlc_remove due to race condition" + "CVE-2024-26784": { + "cmt_msg": "pmdomain: arm: Fix NULL dereference on scmi_perf_domain removal" }, - "CVE-2019-19530": { - "cmt_msg": "usb: cdc-acm: make sure a refcount is taken early enough" + "CVE-2019-9445": { + "cmt_msg": "f2fs: check if file namelen exceeds max value" }, - "CVE-2023-6040": { - "cmt_msg": "netfilter: nf_tables: Reject tables of unsupported family" + "CVE-2019-19066": { + "cmt_msg": "scsi: bfa: release allocated memory in case of error" }, - "CVE-2018-5391": { - "cmt_msg": "ip: discard IPv4 datagrams with overlapping segments." + "CVE-2020-0435": { + "cmt_msg": "f2fs: fix to do sanity check with i_extra_isize" }, - "CVE-2022-26373": { - "cmt_msg": "x86/speculation: Add RSB VM Exit protections" + "CVE-2020-0432": { + "cmt_msg": "staging: most: net: fix buffer overflow" }, - "CVE-2018-5995": { - "cmt_msg": "printk: hash addresses printed with %p" + "CVE-2020-0433": { + "cmt_msg": "blk-mq: sync the update nr_hw_queues with blk_mq_queue_tag_busy_iter" }, - "CVE-2018-18386": { - "cmt_msg": "n_tty: fix EXTPROC vs ICANON interaction with TIOCINQ (aka FIONREAD)" + "CVE-2023-51779": { + "cmt_msg": "Bluetooth: af_bluetooth: Fix Use-After-Free in bt_sock_recvmsg" }, - "CVE-2019-15291": { - "cmt_msg": "media: b2c2-flexcop-usb: add sanity checking" + "CVE-2019-3874": { + "cmt_msg": "sctp: implement memory accounting on tx path" }, - "CVE-2019-15290": { - "cmt_msg": "" + "CVE-2018-10877": { + "cmt_msg": "ext4: verify the depth of extent tree in ext4_find_extent()" }, - "CVE-2023-3212": { - "cmt_msg": "gfs2: Don't deref jdesc in evict" + "CVE-2016-8650": { + "cmt_msg": "mpi: Fix NULL ptr dereference in mpi_powm() " }, - "CVE-2024-23848": { + "CVE-2010-4563": { "cmt_msg": "" }, - "CVE-2019-16232": { - "cmt_msg": "libertas: fix a potential NULL pointer dereference" - }, - "CVE-2018-7273": { - "cmt_msg": "printk: hash addresses printed with %p" - }, - "CVE-2023-52444": { - "cmt_msg": "f2fs: fix to avoid dirent corruption" + "CVE-2023-52565": { + "cmt_msg": "media: uvcvideo: Fix OOB read" }, - "CVE-2022-0617": { - "cmt_msg": "udf: Fix NULL ptr deref when converting from inline format" + "CVE-2023-1249": { + "cmt_msg": "coredump: Use the vma snapshot in fill_files_note" }, - "CVE-2023-4459": { - "cmt_msg": "net: vmxnet3: fix possible NULL pointer dereference in vmxnet3_rq_cleanup()" + "CVE-2020-14331": { + "cmt_msg": "vgacon: Fix for missing check in scrollback handling" }, - "CVE-2023-52457": { - "cmt_msg": "serial: 8250: omap: Don't skip resource freeing if pm_runtime_resume_and_get() failed" + "CVE-2016-8658": { + "cmt_msg": "brcmfmac: avoid potential stack overflow in brcmf_cfg80211_start_ap()" }, - "CVE-2022-23036": { - "cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()" + "CVE-2018-10879": { + "cmt_msg": "ext4: make sure bitmaps and the inode table don't overlap with bg descriptors" }, - "CVE-2022-2153": { - "cmt_msg": "KVM: x86: Avoid theoretical NULL pointer dereference in kvm_irq_delivery_to_apic_fast()" + "CVE-2018-10878": { + "cmt_msg": "ext4: always check block group bounds in ext4_init_block_bitmap()" }, - "CVE-2019-19531": { - "cmt_msg": "usb: yurex: Fix use-after-free in yurex_delete" + "CVE-2024-23851": { + "cmt_msg": "dm: limit the number of targets and parameter size area" }, - "CVE-2022-20566": { - "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free caused by l2cap_chan_put" + "CVE-2023-0266": { + "cmt_msg": "ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF" }, - "CVE-2018-12930": { - "cmt_msg": "" + "CVE-2021-46928": { + "cmt_msg": "parisc: Clear stale IIR value on instruction access rights trap" }, - "CVE-2018-12931": { - "cmt_msg": "" + "CVE-2021-3483": { + "cmt_msg": "firewire: nosy: Fix a use-after-free bug in nosy_ioctl()" }, - "CVE-2017-7308": { - "cmt_msg": "net/packet: fix overflow in check for priv area size" + "CVE-2023-6040": { + "cmt_msg": "netfilter: nf_tables: Reject tables of unsupported family" }, - "CVE-2024-23196": { - "cmt_msg": "" + "CVE-2021-38300": { + "cmt_msg": "bpf, mips: Validate conditional branch offsets" }, - "CVE-2020-12769": { - "cmt_msg": "spi: spi-dw: Add lock protect dw_spi rx/tx to prevent concurrent calls" + "CVE-2020-25656": { + "cmt_msg": "vt: keyboard, extend func_buf_lock to readers" }, - "CVE-2017-8890": { - "cmt_msg": "dccp/tcp: do not inherit mc_list from parent" + "CVE-2022-0492": { + "cmt_msg": "cgroup-v1: Require capabilities to set release_agent" }, - "CVE-2022-4662": { - "cmt_msg": "USB: core: Prevent nested device-reset calls" + "CVE-2023-52498": { + "cmt_msg": "PM: sleep: Fix possible deadlocks in core system-wide PM code" }, - "CVE-2021-32399": { - "cmt_msg": "bluetooth: eliminate the potential race condition when removing the HCI controller" + "CVE-2022-23042": { + "cmt_msg": "xen/netfront: react properly to failing gnttab_end_foreign_access_ref()" }, - "CVE-2021-45868": { - "cmt_msg": "quota: check block number when reading the block in quota file" + "CVE-2019-10142": { + "cmt_msg": "drivers/virt/fsl_hypervisor.c: prevent integer overflow in ioctl" }, - "CVE-2019-12380": { - "cmt_msg": "efi/x86/Add missing error handling to old_memmap 1:1 mapping code" + "CVE-2021-4023": { + "cmt_msg": "io-wq: fix cancellation on create-worker failure" }, - "CVE-2019-12381": { - "cmt_msg": "ip_sockglue: Fix missing-check bug in ip_ra_control()" + "CVE-2023-52640": { + "cmt_msg": "fs/ntfs3: Fix oob in ntfs_listxattr" }, - "CVE-2019-12382": { - "cmt_msg": "drm/edid: Fix a missing-check bug in drm_load_edid_firmware()" + "CVE-2023-3268": { + "cmt_msg": "relayfs: fix out-of-bounds access in relay_file_read" }, - "CVE-2017-10810": { - "cmt_msg": "drm/virtio: don't leak bo on drm_gem_object_init failure" + "CVE-2022-2318": { + "cmt_msg": "net: rose: fix UAF bugs caused by timer handler" }, - "CVE-2020-12364": { - "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" + "CVE-2021-22555": { + "cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write" }, - "CVE-2022-20166": { - "cmt_msg": "drivers core: Use sysfs_emit and sysfs_emit_at for show(device *...) functions" + "CVE-2021-0399": { + "cmt_msg": "" }, - "CVE-2017-12146": { - "cmt_msg": "driver core: platform: fix race condition with driver_override" + "CVE-2023-52488": { + "cmt_msg": "serial: sc16is7xx: convert from _raw_ to _noinc_ regmap functions for FIFO" }, - "CVE-2021-3732": { - "cmt_msg": "ovl: prevent private clone if bind mount is not allowed" + "CVE-2020-36691": { + "cmt_msg": "netlink: limit recursion depth in policy validation" }, - "CVE-2016-9588": { - "cmt_msg": "kvm: nVMX: Allow L1 to intercept software exceptions (#BP and #OF)" + "CVE-2021-47179": { + "cmt_msg": "NFSv4: Fix a NULL pointer dereference in pnfs_mark_matching_lsegs_return()" }, - "CVE-2022-25375": { - "cmt_msg": "usb: gadget: rndis: check size of RNDIS_MSG_SET command" + "CVE-2023-42755": { + "cmt_msg": "net/sched: Retire rsvp classifier" }, - "CVE-2020-10766": { - "cmt_msg": "x86/speculation: Prevent rogue cross-process SSBD shutdown" + "CVE-2020-2732": { + "cmt_msg": "KVM: nVMX: Don't emulate instructions in guest mode" }, - "CVE-2017-13166": { - "cmt_msg": "media: v4l2-ioctl.c: use check_fmt for enum/g/s/try_fmt" + "CVE-2023-52486": { + "cmt_msg": "drm: Don't unref the same fb many times by mistake due to deadlock handling" }, - "CVE-2018-12207": { - "cmt_msg": "kvm: x86, powerpc: do not allow clearing largepages debugfs entry" + "CVE-2023-52480": { + "cmt_msg": "ksmbd: fix race condition between session lookup and expire" }, - "CVE-2017-1000364": { - "cmt_msg": "mm: larger stack guard gap, between vmas" + "CVE-2012-4542": { + "cmt_msg": "" }, - "CVE-2017-1000365": { - "cmt_msg": "fs/exec.c: account for argv/envp pointers" + "CVE-2022-1729": { + "cmt_msg": "perf: Fix sys_perf_event_open() race against self" }, - "CVE-2020-13143": { - "cmt_msg": "USB: gadget: fix illegal array access in binding with UDC" + "CVE-2023-1838": { + "cmt_msg": "Fix double fget() in vhost_net_set_backend()" }, - "CVE-2023-5178": { - "cmt_msg": "nvmet-tcp: Fix a possible UAF in queue intialization setup" + "CVE-2023-4128": { + "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free" }, - "CVE-2020-10768": { - "cmt_msg": "x86/speculation: PR_SPEC_FORCE_DISABLE enforcement for indirect branches." + "CVE-2023-1118": { + "cmt_msg": "media: rc: Fix use-after-free bugs caused by ene_tx_irqsim()" }, - "CVE-2017-13168": { - "cmt_msg": "scsi: sg: mitigate read/write abuse" + "CVE-2021-3573": { + "cmt_msg": "Bluetooth: use correct lock to prevent UAF of hdev object" }, - "CVE-2017-1000363": { - "cmt_msg": "char: lp: fix possible integer overflow in lp_setup()" + "CVE-2021-47075": { + "cmt_msg": "nvmet: fix memory leak in nvmet_alloc_ctrl()" }, - "CVE-2019-0148": { - "cmt_msg": "i40e: Wrong truncation from u16 to u8" + "CVE-2018-1000026": { + "cmt_msg": "bnx2x: disable GSO where gso_size is too big for hardware" }, - "CVE-2022-2978": { - "cmt_msg": "fs: fix UAF/GPF bug in nilfs_mdt_destroy" + "CVE-2022-1975": { + "cmt_msg": "NFC: netlink: fix sleep in atomic bug when firmware download timeout" }, - "CVE-2019-17075": { - "cmt_msg": "RDMA/cxgb4: Do not dma memory off of the stack" + "CVE-2023-1380": { + "cmt_msg": "wifi: brcmfmac: slab-out-of-bounds read in brcmf_get_assoc_ies()" }, - "CVE-2022-3903": { - "cmt_msg": "media: mceusb: Use new usb_control_msg_*() routines" + "CVE-2022-44032": { + "cmt_msg": "char: pcmcia: remove all the drivers" }, - "CVE-2022-23960": { - "cmt_msg": "ARM: report Spectre v2 status through sysfs" + "CVE-2021-28972": { + "cmt_msg": "PCI: rpadlpar: Fix potential drc_name corruption in store functions" }, - "CVE-2023-39189": { - "cmt_msg": "netfilter: nfnetlink_osf: avoid OOB read" + "CVE-2018-12130": { + "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" }, - "CVE-2019-0146": { - "cmt_msg": "i40e: add num_vectors checker in iwarp handler" + "CVE-2020-14305": { + "cmt_msg": "netfilter: helpers: remove data_len usage for inkernel helpers" }, - "CVE-2019-0147": { - "cmt_msg": "i40e: add num_vectors checker in iwarp handler" + "CVE-2021-20292": { + "cmt_msg": "drm/ttm/nouveau: don't call tt destroy callback on alloc failure." }, - "CVE-2018-20449": { - "cmt_msg": "printk: hash addresses printed with %p" + "CVE-2021-31916": { + "cmt_msg": "dm ioctl: fix out of bounds array access when no devices" }, - "CVE-2018-3693": { - "cmt_msg": "ext4: fix spectre gadget in ext4_mb_regular_allocator()" + "CVE-2017-8065": { + "cmt_msg": "crypto: ccm - move cbcmac input off the stack" }, - "CVE-2017-15299": { - "cmt_msg": "KEYS: don't let add_key() update an uninstantiated key" + "CVE-2022-32981": { + "cmt_msg": "powerpc/32: Fix overread/overwrite of thread_struct via ptrace" }, - "CVE-2023-3338": { - "cmt_msg": "Remove DECnet support from kernel" + "CVE-2018-13405": { + "cmt_msg": "Fix up non-directory creation in SGID directories" }, - "CVE-2019-11190": { - "cmt_msg": "binfmt_elf: switch to new creds when switching to new mm" + "CVE-2021-47122": { + "cmt_msg": "net: caif: fix memory leak in caif_device_notify" }, - "CVE-2019-11191": { - "cmt_msg": "x86: Deprecate a.out support" + "CVE-2021-47121": { + "cmt_msg": "net: caif: fix memory leak in cfusbl_device_notify" }, - "CVE-2023-4385": { - "cmt_msg": "fs: jfs: fix possible NULL pointer dereference in dbFree()" + "CVE-2018-13406": { + "cmt_msg": "video: uvesafb: Fix integer overflow in allocation" }, - "CVE-2023-35001": { - "cmt_msg": "netfilter: nf_tables: prevent OOB access in nft_byteorder_eval" + "CVE-2022-1280": { + "cmt_msg": "drm: avoid circular locks in drm_mode_getconnector" }, - "CVE-2018-10323": { - "cmt_msg": "xfs: set format back to extents if xfs_bmap_extents_to_btree" + "CVE-2023-3772": { + "cmt_msg": "xfrm: add NULL check in xfrm_update_ae_params" }, - "CVE-2018-10322": { - "cmt_msg": "xfs: enhance dinode verifier" + "CVE-2020-11668": { + "cmt_msg": "media: xirlink_cit: add missing descriptor sanity checks" }, - "CVE-2023-1989": { - "cmt_msg": "Bluetooth: btsdio: fix use after free bug in btsdio_remove due to unfinished work" + "CVE-2020-11669": { + "cmt_msg": "powerpc/powernv/idle: Restore AMR/UAMOR/AMOR after idle" }, - "CVE-2017-5576": { - "cmt_msg": "drm/vc4: Fix an integer overflow in temporary allocation layout." + "CVE-2019-15118": { + "cmt_msg": "ALSA: usb-audio: Fix a stack buffer overflow bug in check_input_term" }, - "CVE-2017-5577": { - "cmt_msg": "drm/vc4: Return -EINVAL on the overflow checks failing." + "CVE-2021-47170": { + "cmt_msg": "USB: usbfs: Don't WARN about excessively large memory allocations" }, - "CVE-2017-8824": { - "cmt_msg": "dccp: CVE-2017-8824: use-after-free in DCCP code" + "CVE-2019-12818": { + "cmt_msg": "net: nfc: Fix NULL dereference on nfc_llcp_build_tlv fails" }, - "CVE-2018-7492": { - "cmt_msg": "rds: Fix NULL pointer dereference in __rds_rdma_map" + "CVE-2019-12819": { + "cmt_msg": "mdio_bus: Fix use-after-free on device_register fails" }, - "CVE-2020-26139": { - "cmt_msg": "mac80211: do not accept/forward invalid EAPOL frames" + "CVE-2023-0394": { + "cmt_msg": "ipv6: raw: Deduct extension header length in rawv6_push_pending_frames" }, - "CVE-2017-12188": { - "cmt_msg": "KVM: nVMX: update last_nonleaf_level when initializing nested EPT" + "CVE-2020-10690": { + "cmt_msg": "ptp: fix the race between the release of ptp_clock and cdev" }, - "CVE-2017-8065": { - "cmt_msg": "crypto: ccm - move cbcmac input off the stack" + "CVE-2019-19332": { + "cmt_msg": "KVM: x86: fix out-of-bounds write in KVM_GET_EMULATED_CPUID (CVE-2019-19332)" }, - "CVE-2017-13305": { - "cmt_msg": "KEYS: encrypted: fix buffer overread in valid_master_desc()" + "CVE-2019-15117": { + "cmt_msg": "ALSA: usb-audio: Fix an OOB bug in parse_audio_mixer_unit" }, - "CVE-2019-19536": { - "cmt_msg": "can: peak_usb: pcan_usb_pro: Fix info-leaks to USB devices" + "CVE-2021-3659": { + "cmt_msg": "net: mac802154: Fix general protection fault" }, - "CVE-2019-19537": { - "cmt_msg": "USB: core: Fix races in character device registration and deregistraion" + "CVE-2022-25258": { + "cmt_msg": "USB: gadget: validate interface OS descriptor requests" }, - "CVE-2019-19534": { - "cmt_msg": "can: peak_usb: fix slab info leak" + "CVE-2021-4155": { + "cmt_msg": "xfs: map unwritten blocks in XFS_IOC_{ALLOC,FREE}SP just like fallocate" }, - "CVE-2017-1000370": { - "cmt_msg": "binfmt_elf: use ELF_ET_DYN_BASE only for PIE" + "CVE-2019-14901": { + "cmt_msg": "mwifiex: Fix heap overflow in mmwifiex_process_tdls_action_frame()" }, - "CVE-2019-19532": { - "cmt_msg": "HID: Fix assumption that devices have inputs" + "CVE-2021-4150": { + "cmt_msg": "block: fix incorrect references to disk objects" }, - "CVE-2019-11479": { - "cmt_msg": "tcp: add tcp_min_snd_mss sysctl" + "CVE-2020-3702": { + "cmt_msg": "ath: Use safer key clearing with key cache entries" }, - "CVE-2019-10638": { - "cmt_msg": "inet: switch IP ID generator to siphash" + "CVE-2023-52635": { + "cmt_msg": "PM / devfreq: Synchronize devfreq_monitor_[start/stop]" }, - "CVE-2019-10639": { - "cmt_msg": "netns: provide pure entropy for net_hash_mix()" + "CVE-2023-52485": { + "cmt_msg": "drm/amd/display: Wake DMCUB before sending a command" }, - "CVE-2021-0929": { - "cmt_msg": "staging/android/ion: delete dma_buf->kmap/unmap implemenation" + "CVE-2021-3653": { + "cmt_msg": "KVM: nSVM: avoid picking up unsupported bits from L2 in int_ctl (CVE-2021-3653)" }, - "CVE-2019-11478": { - "cmt_msg": "tcp: tcp_fragment() should apply sane memory limits" + "CVE-2021-3655": { + "cmt_msg": "sctp: validate from_addr_param return" }, - "CVE-2018-19985": { - "cmt_msg": "USB: hso: Fix OOB memory access in hso_probe/hso_get_config_data" + "CVE-2020-8694": { + "cmt_msg": "powercap: restrict energy meter to root access" }, - "CVE-2018-6554": { - "cmt_msg": "staging: irda: remove the irda network stack and drivers" + "CVE-2021-4159": { + "cmt_msg": "bpf: Verifer, adjust_scalar_min_max_vals to always call update_reg_bounds()" }, - "CVE-2017-18257": { - "cmt_msg": "f2fs: fix a dead loop in f2fs_fiemap()" + "CVE-2024-26672": { + "cmt_msg": "drm/amdgpu: Fix variable 'mca_funcs' dereferenced before NULL check in 'amdgpu_mca_smu_get_mca_entry()'" }, - "CVE-2023-6546": { - "cmt_msg": "tty: n_gsm: fix the UAF caused by race condition in gsm_cleanup_mux" + "CVE-2019-12614": { + "cmt_msg": "powerpc/pseries/dlpar: Fix a missing check in dlpar_parse_cc_property()" }, - "CVE-2017-18255": { - "cmt_msg": "perf/core: Fix the perf_cpu_time_max_percent check" + "CVE-2019-12615": { + "cmt_msg": "mdesc: fix a missing-check bug in get_vdev_port_node_info()" }, - "CVE-2017-7273": { - "cmt_msg": "HID: hid-cypress: validate length of report" + "CVE-2021-3715": { + "cmt_msg": "net_sched: cls_route: remove the right filter from hashtable" }, - "CVE-2018-5953": { - "cmt_msg": "printk: hash addresses printed with %p" + "CVE-2021-3714": { + "cmt_msg": "" }, - "CVE-2016-7097": { - "cmt_msg": "posix_acl: Clear SGID bit when setting file permissions" + "CVE-2024-26733": { + "cmt_msg": "arp: Prevent overflow in arp_req_get()." }, - "CVE-2024-26587": { - "cmt_msg": "net: netdevsim: don't try to destroy PHC on VFs" + "CVE-2019-16230": { + "cmt_msg": "drm/amdkfd: fix a potential NULL pointer dereference (v2)" }, - "CVE-2023-51043": { - "cmt_msg": "drm/atomic: Fix potential use-after-free in nonblocking commits" + "CVE-2017-12168": { + "cmt_msg": "arm64: KVM: pmu: Fix AArch32 cycle counter access" }, - "CVE-2020-28374": { - "cmt_msg": "scsi: target: Fix XCOPY NAA identifier lookup" + "CVE-2019-16233": { + "cmt_msg": "scsi: qla2xxx: fix a potential NULL pointer dereference" }, - "CVE-2017-7477": { - "cmt_msg": "macsec: avoid heap overflow in skb_to_sgvec" + "CVE-2021-3892": { + "cmt_msg": "" }, - "CVE-2023-2007": { - "cmt_msg": "scsi: dpt_i2o: Remove obsolete driver" + "CVE-2024-26752": { + "cmt_msg": "l2tp: pass correct message length to ip6_append_data" }, - "CVE-2023-0615": { - "cmt_msg": "media: vivid: dev->bitmap_cap wasn't freed in all cases" + "CVE-2019-6133": { + "cmt_msg": "fork: record start_time late" }, - "CVE-2017-7472": { - "cmt_msg": "KEYS: fix keyctl_set_reqkey_keyring() to not leak thread keyrings" + "CVE-2018-10902": { + "cmt_msg": "ALSA: rawmidi: Change resized buffers atomically" }, - "CVE-2017-16535": { - "cmt_msg": "USB: core: fix out-of-bounds access bug in usb_get_bos_descriptor()" + "CVE-2021-39633": { + "cmt_msg": "ip_gre: add validation for csum_start" }, - "CVE-2017-16534": { - "cmt_msg": "USB: core: harden cdc_parse_cdc_header" + "CVE-2020-27673": { + "cmt_msg": "xen/events: add a proper barrier to 2-level uevent unmasking" }, - "CVE-2017-16537": { - "cmt_msg": "media: imon: Fix null-ptr-deref in imon_probe" + "CVE-2021-39636": { + "cmt_msg": "netfilter: x_tables: fix pointer leaks to userspace" }, - "CVE-2017-16536": { - "cmt_msg": "[media] cx231xx-cards: fix NULL-deref on missing association descriptor" + "CVE-2022-27223": { + "cmt_msg": "USB: gadget: validate endpoint index for xilinx udc" }, - "CVE-2017-16531": { - "cmt_msg": "USB: fix out-of-bounds in usb_set_configuration" + "CVE-2021-39634": { + "cmt_msg": "epoll: do not insert into poll queues until all sanity checks are done" }, - "CVE-2017-16530": { - "cmt_msg": "USB: uas: fix bug in handling of alternate settings" + "CVE-2019-3882": { + "cmt_msg": "vfio/type1: Limit DMA mappings per container" }, - "CVE-2017-16533": { - "cmt_msg": "HID: usbhid: fix out-of-bounds bug" + "CVE-2022-33742": { + "cmt_msg": "xen/blkfront: force data bouncing when backend is untrusted" }, - "CVE-2017-16532": { - "cmt_msg": "usb: usbtest: fix NULL pointer dereference" + "CVE-2022-33741": { + "cmt_msg": "xen/netfront: force data bouncing when backend is untrusted" }, - "CVE-2023-35824": { - "cmt_msg": "media: dm1105: Fix use after free bug in dm1105_remove due to race condition" + "CVE-2018-20509": { + "cmt_msg": "binder: refactor binder ref inc/dec for thread safety" }, - "CVE-2022-43750": { - "cmt_msg": "usb: mon: make mmapped memory read only" + "CVE-2024-24864": { + "cmt_msg": "" }, - "CVE-2017-16538": { - "cmt_msg": "media: dvb-usb-v2: lmedm04: Improve logic checking of warm start" + "CVE-2022-45885": { + "cmt_msg": "" }, - "CVE-2023-3006": { - "cmt_msg": "arm64: Add AMPERE1 to the Spectre-BHB affected list" + "CVE-2022-33744": { + "cmt_msg": "xen/arm: Fix race in RB-tree based P2M accounting" }, - "CVE-2020-27825": { - "cmt_msg": "tracing: Fix race in trace_open and buffer resize call" + "CVE-2023-52596": { + "cmt_msg": "sysctl: Fix out of bounds access for empty sysctl registers" }, - "CVE-2016-9084": { - "cmt_msg": "vfio/pci: Fix integer overflows, bitmask check" + "CVE-2017-9605": { + "cmt_msg": "drm/vmwgfx: Make sure backup_handle is always valid" }, - "CVE-2019-2182": { - "cmt_msg": "arm64: Enforce BBM for huge IO/VMAP mappings" + "CVE-2017-18193": { + "cmt_msg": "f2fs: fix a bug caused by NULL extent tree" }, - "CVE-2020-27820": { - "cmt_msg": "drm/nouveau: use drm_dev_unplug() during device removal" + "CVE-2022-40768": { + "cmt_msg": "scsi: stex: Properly zero out the passthrough command structure" }, - "CVE-2016-9083": { - "cmt_msg": "vfio/pci: Fix integer overflows, bitmask check" + "CVE-2023-52593": { + "cmt_msg": "wifi: wfx: fix possible NULL pointer dereference in wfx_set_mfp_ap()" }, - "CVE-2017-18222": { - "cmt_msg": "net: hns: fix ethtool_get_strings overflow in hns driver" + "CVE-2021-47158": { + "cmt_msg": "net: dsa: sja1105: add error handling in sja1105_setup()" }, - "CVE-2017-18221": { - "cmt_msg": "mlock: fix mlock count can not decrease in race condition" + "CVE-2023-52591": { + "cmt_msg": "reiserfs: Avoid touching renamed directory if parent does not change" }, - "CVE-2023-4622": { - "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES" + "CVE-2019-9454": { + "cmt_msg": "i2c: core-smbus: prevent stack corruption on read I2C_BLOCK_DATA" }, - "CVE-2019-20794": { - "cmt_msg": "" + "CVE-2020-12888": { + "cmt_msg": "vfio-pci: Invalidate mmaps and block MMIO access on disabled memory" }, - "CVE-2023-39193": { - "cmt_msg": "netfilter: xt_sctp: validate the flag_info count" + "CVE-2021-47153": { + "cmt_msg": "i2c: i801: Don't generate an interrupt on bus reset" }, - "CVE-2017-18224": { - "cmt_msg": "ocfs2: ip_alloc_sem should be taken in ocfs2_get_block()" + "CVE-2017-6214": { + "cmt_msg": "tcp: avoid infinite loop in tcp_splice_read()" }, - "CVE-2020-26541": { - "cmt_msg": "certs: Add EFI_CERT_X509_GUID support for dbx entries" + "CVE-2021-47151": { + "cmt_msg": "interconnect: qcom: bcm-voter: add a missing of_node_put()" }, - "CVE-2023-6610": { - "cmt_msg": "smb: client: fix potential OOB in smb2_dump_detail()" + "CVE-2017-6353": { + "cmt_msg": "sctp: deny peeloff operation on asocs with threads sleeping on it" }, - "CVE-2020-26559": { - "cmt_msg": "" + "CVE-2021-46936": { + "cmt_msg": "net: fix use-after-free in tw_timer_handler" }, - "CVE-2020-27673": { - "cmt_msg": "xen/events: add a proper barrier to 2-level uevent unmasking" + "CVE-2016-6198": { + "cmt_msg": "vfs: add vfs_select_inode() helper" }, - "CVE-2021-43389": { - "cmt_msg": "isdn: cpai: check ctr->cnr to avoid array index out of bound" + "CVE-2017-18174": { + "cmt_msg": "pinctrl: amd: Use devm_pinctrl_register() for pinctrl registration" }, - "CVE-2017-14156": { - "cmt_msg": "video: fbdev: aty: do not leak uninitialized padding in clk to userspace" + "CVE-2021-46933": { + "cmt_msg": "usb: gadget: f_fs: Clear ffs_eventfd in ffs_data_clear." }, - "CVE-2021-33061": { - "cmt_msg": "ixgbe: add improvement for MDD response functionality" + "CVE-2019-20934": { + "cmt_msg": "sched/fair: Don't free p->numa_faults with concurrent readers" }, - "CVE-2024-26592": { - "cmt_msg": "ksmbd: fix UAF issue in ksmbd_tcp_new_connection()" + "CVE-2022-36946": { + "cmt_msg": "netfilter: nf_queue: do not allow packet truncation below transport header offset" }, - "CVE-2017-2671": { - "cmt_msg": "ping: implement proper locking" + "CVE-2021-45485": { + "cmt_msg": "ipv6: use prandom_u32() for ID generation" }, - "CVE-2018-1092": { - "cmt_msg": "ext4: fail ext4_iget for root directory if unallocated" + "CVE-2016-4482": { + "cmt_msg": "USB: usbfs: fix potential infoleak in devio" }, - "CVE-2018-1093": { - "cmt_msg": "ext4: add validity checks for bitmap block numbers" + "CVE-2018-19824": { + "cmt_msg": "ALSA: usb-audio: Fix UAF decrement if card has no live interfaces in card.c" }, - "CVE-2017-18551": { - "cmt_msg": "i2c: core-smbus: prevent stack corruption on read I2C_BLOCK_DATA" + "CVE-2021-46939": { + "cmt_msg": "tracing: Restructure trace_clock_global() to never block" }, - "CVE-2023-1074": { - "cmt_msg": "sctp: fail if no bound addresses can be used for a given scope" + "CVE-2020-29374": { + "cmt_msg": "gup: document and work around \"COW can break either way\" issue" }, - "CVE-2017-18552": { - "cmt_msg": "RDS: validate the requested traces user input against max supported" + "CVE-2020-0030": { + "cmt_msg": "ANDROID: binder: synchronize_rcu() when using POLLFREE." }, - "CVE-2021-26931": { - "cmt_msg": "xen-blkback: don't \"handle\" error by BUG()" + "CVE-2015-8709": { + "cmt_msg": "mm: Add a user_ns owner to mm_struct and fix ptrace permission checks" }, - "CVE-2024-26584": { - "cmt_msg": "net: tls: handle backlogging of crypto requests" + "CVE-2018-16862": { + "cmt_msg": "mm: cleancache: fix corruption on missed inode invalidation" }, - "CVE-2022-1652": { - "cmt_msg": "floppy: use a statically allocated error counter" + "CVE-2023-52449": { + "cmt_msg": "mtd: Fix gluebi NULL pointer dereference caused by ftl notifier" }, - "CVE-2023-4623": { - "cmt_msg": "net/sched: sch_hfsc: Ensure inner classes have fsc curve" + "CVE-2021-29650": { + "cmt_msg": "netfilter: x_tables: Use correct memory barriers." }, - "CVE-2020-29568": { - "cmt_msg": "xen/xenbus: Allow watches discard events before queueing" + "CVE-2019-17133": { + "cmt_msg": "cfg80211: wext: avoid copying malformed SSIDs" }, - "CVE-2018-18559": { - "cmt_msg": "net/packet: fix a race in packet_bind() and packet_notifier()" + "CVE-2023-4010": { + "cmt_msg": "" }, - "CVE-2019-9457": { - "cmt_msg": "exec: Limit arg stack to at most 75% of _STK_LIM" + "CVE-2018-20169": { + "cmt_msg": "USB: check usb_get_extra_descriptor for proper size" }, - "CVE-2019-19054": { - "cmt_msg": "media: rc: prevent memory leak in cx23888_ir_probe" + "CVE-2017-12762": { + "cmt_msg": "isdn/i4l: fix buffer overflow" }, - "CVE-2019-19057": { - "cmt_msg": "mwifiex: pcie: Fix memory leak in mwifiex_pcie_init_evt_ring" + "CVE-2018-7754": { + "cmt_msg": "printk: hash addresses printed with %p" }, - "CVE-2019-19056": { - "cmt_msg": "mwifiex: pcie: Fix memory leak in mwifiex_pcie_alloc_cmdrsp_buf" + "CVE-2020-36558": { + "cmt_msg": "vt: vt_ioctl: fix race in VT_RESIZEX" }, - "CVE-2016-10741": { - "cmt_msg": "xfs: don't BUG() on mixed direct and mapped I/O" + "CVE-2022-41849": { + "cmt_msg": "fbdev: smscufx: Fix use-after-free in ufx_ops_open()" }, - "CVE-2023-23039": { + "CVE-2022-41848": { "cmt_msg": "" }, - "CVE-2019-19052": { - "cmt_msg": "can: gs_usb: gs_can_open(): prevent memory leak" + "CVE-2023-6356": { + "cmt_msg": "nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length" }, - "CVE-2019-3846": { - "cmt_msg": "mwifiex: Fix possible buffer overflows at parsing bss descriptor" + "CVE-2024-26720": { + "cmt_msg": "mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again" }, - "CVE-2023-46838": { - "cmt_msg": "xen-netback: don't produce zero-size SKB frags" + "CVE-2022-1353": { + "cmt_msg": "af_key: add __GFP_ZERO flag for compose_sadb_supported in function pfkey_register" }, - "CVE-2020-0427": { - "cmt_msg": "pinctrl: devicetree: Avoid taking direct reference to device name string" + "CVE-2022-28356": { + "cmt_msg": "llc: fix netdevice reference leaks in llc_ui_bind()" }, - "CVE-2019-9458": { - "cmt_msg": "media: v4l: event: Prevent freeing event subscriptions while accessed" + "CVE-2023-52574": { + "cmt_msg": "team: fix null-ptr-deref when team device type is changed" }, - "CVE-2021-39714": { - "cmt_msg": "staging: android: ion: Drop ion_map_kernel interface" + "CVE-2015-8964": { + "cmt_msg": "tty: Prevent ldisc drivers from re-using stale tty fields" }, - "CVE-2023-39197": { - "cmt_msg": "netfilter: conntrack: dccp: copy entire header to stack buffer, not just basic one" + "CVE-2022-1199": { + "cmt_msg": "ax25: Fix NULL pointer dereference in ax25_kill_by_device" }, - "CVE-2017-9242": { - "cmt_msg": "ipv6: fix out of bound writes in __ip6_append_data()" + "CVE-2023-6546": { + "cmt_msg": "tty: n_gsm: fix the UAF caused by race condition in gsm_cleanup_mux" }, - "CVE-2016-8660": { + "CVE-2021-39801": { "cmt_msg": "" }, - "CVE-2020-14314": { - "cmt_msg": "ext4: fix potential negative array index in do_split()" - }, - "CVE-2023-3090": { - "cmt_msg": "ipvlan:Fix out-of-bounds caused by unclear skb->cb" + "CVE-2021-39800": { + "cmt_msg": "" }, - "CVE-2019-13272": { - "cmt_msg": "ptrace: Fix ->ptracer_cred handling for PTRACE_TRACEME" + "CVE-2015-8962": { + "cmt_msg": "sg: Fix double-free when drives detach during SG_IO" }, - "CVE-2021-3587": { - "cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect" + "CVE-2015-8963": { + "cmt_msg": "perf: Fix race in swevent hash" }, - "CVE-2023-45862": { - "cmt_msg": "USB: ene_usb6250: Allocate enough memory for full object" + "CVE-2024-26676": { + "cmt_msg": "af_unix: Call kfree_skb() for dead unix_(sk)->oob_skb in GC." }, - "CVE-2023-45863": { - "cmt_msg": "kobject: Fix slab-out-of-bounds in fill_kobj_path()" + "CVE-2018-16884": { + "cmt_msg": "sunrpc: use-after-free in svc_process_common()" }, - "CVE-2023-1582": { - "cmt_msg": "fs/proc: task_mmu.c: don't read mapcount for migration entry" + "CVE-2022-1195": { + "cmt_msg": "hamradio: improve the incomplete fix to avoid NPD" }, - "CVE-2017-15537": { - "cmt_msg": "x86/fpu: Don't let userspace set bogus xcomp_bv" + "CVE-2024-22099": { + "cmt_msg": "Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security" }, - "CVE-2022-2588": { - "cmt_msg": "net_sched: cls_route: remove from list when handle is 0" + "CVE-2021-4202": { + "cmt_msg": "NFC: reorganize the functions in nci_request" }, - "CVE-2019-17351": { - "cmt_msg": "xen: let alloc_xenballooned_pages() fail if not enough memory free" + "CVE-2021-4203": { + "cmt_msg": "af_unix: fix races in sk_peer_pid and sk_peer_cred accesses" }, - "CVE-2020-36322": { - "cmt_msg": "fuse: fix bad inode" + "CVE-2022-45887": { + "cmt_msg": "media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb()" }, - "CVE-2022-23222": { - "cmt_msg": "bpf: Replace PTR_TO_XXX_OR_NULL with PTR_TO_XXX | PTR_MAYBE_NULL" + "CVE-2022-45886": { + "cmt_msg": "media: dvb-core: Fix use-after-free due on race condition at dvb_net" }, - "CVE-2020-25669": { - "cmt_msg": "Input: sunkbd - avoid use-after-free in teardown paths" + "CVE-2023-52509": { + "cmt_msg": "ravb: Fix use-after-free issue in ravb_tx_timeout_work()" }, - "CVE-2020-25668": { - "cmt_msg": "tty: make FONTX ioctl use the tty pointer they were actually passed" + "CVE-2023-46343": { + "cmt_msg": "nfc: nci: fix possible NULL pointer dereference in send_acknowledge()" }, - "CVE-2008-4609": { + "CVE-2024-24859": { "cmt_msg": "" }, - "CVE-2020-25705": { - "cmt_msg": "icmp: randomize the global rate limiter" + "CVE-2023-5178": { + "cmt_msg": "nvmet-tcp: Fix a possible UAF in queue intialization setup" }, - "CVE-2023-52458": { - "cmt_msg": "block: add check that partition length needs to be aligned with block size" + "CVE-2023-52507": { + "cmt_msg": "nfc: nci: assert requested protocol is valid" }, - "CVE-2023-40283": { - "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb" + "CVE-2023-2124": { + "cmt_msg": "xfs: verify buffer contents when we skip log replay" }, - "CVE-2022-20565": { - "cmt_msg": "HID: core: Correctly handle ReportSize being zero" + "CVE-2023-52501": { + "cmt_msg": "ring-buffer: Do not attempt to read past \"commit\"" }, - "CVE-2022-1419": { - "cmt_msg": "drm/vgem: Close use-after-free race in vgem_gem_create" + "CVE-2021-3609": { + "cmt_msg": "can: bcm: delay release of struct bcm_op after synchronize_rcu()" }, - "CVE-2018-1120": { - "cmt_msg": "proc: do not access cmdline nor environ from file-backed areas" + "CVE-2023-52502": { + "cmt_msg": "net: nfc: fix races in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn()" }, - "CVE-2018-25020": { - "cmt_msg": "bpf: fix truncated jump targets on heavy expansions" + "CVE-2021-44879": { + "cmt_msg": "f2fs: fix to do sanity check on inode type during garbage collection" }, - "CVE-2022-3533": { - "cmt_msg": "" + "CVE-2019-15505": { + "cmt_msg": "media: technisat-usb2: break out of loop at end of buffer" }, - "CVE-2023-26607": { - "cmt_msg": "ntfs: fix out-of-bounds read in ntfs_attr_find()" + "CVE-2023-2513": { + "cmt_msg": "ext4: fix use-after-free in ext4_xattr_set_entry" }, - "CVE-2018-20855": { - "cmt_msg": "IB/mlx5: Fix leaking stack memory to userspace" + "CVE-2017-1000": { + "cmt_msg": "udp: consistently apply ufo or fragmentation" }, - "CVE-2019-15239": { - "cmt_msg": "unknown" + "CVE-2022-27672": { + "cmt_msg": "x86/speculation: Identify processors vulnerable to SMT RSB predictions" }, - "CVE-2017-15129": { - "cmt_msg": "net: Fix double free and memory corruption in get_net_ns_by_id()" + "CVE-2020-0429": { + "cmt_msg": "l2tp: fix race between l2tp_session_delete() and l2tp_tunnel_closeall()" }, - "CVE-2021-4037": { - "cmt_msg": "xfs: fix up non-directory creation in SGID directories" + "CVE-2024-26623": { + "cmt_msg": "pds_core: Prevent race issues involving the adminq" }, - "CVE-2021-22543": { - "cmt_msg": "KVM: do not allow mapping valid but non-reference-counted pages" + "CVE-2024-26719": { + "cmt_msg": "nouveau: offload fence uevents work to workqueue" }, - "CVE-2022-45884": { - "cmt_msg": "" + "CVE-2020-27066": { + "cmt_msg": "xfrm: policy: Fix doulbe free in xfrm_policy_timer" }, - "CVE-2019-1999": { - "cmt_msg": "binder: fix race between munmap() and direct reclaim" + "CVE-2022-2964": { + "cmt_msg": "net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup" }, - "CVE-2018-1065": { - "cmt_msg": "netfilter: add back stackpointer size checks" + "CVE-2017-0605": { + "cmt_msg": "tracing: Use strlcpy() instead of strcpy() in __trace_find_cmdline()" }, - "CVE-2023-20941": { + "CVE-2021-1048": { + "cmt_msg": "fix regression in \"epoll: Keep a reference on files added to the check list\"" + }, + "CVE-2021-47146": { + "cmt_msg": "mld: fix panic in mld_newpack()" + }, + "CVE-2015-2877": { "cmt_msg": "" }, - "CVE-2018-1066": { - "cmt_msg": "CIFS: Enable encryption during session setup phase" + "CVE-2020-9383": { + "cmt_msg": "floppy: check FDC index for errors before assigning it" }, - "CVE-2018-20836": { - "cmt_msg": "scsi: libsas: fix a race condition when smp task timeout" + "CVE-2023-52601": { + "cmt_msg": "jfs: fix array-index-out-of-bounds in dbAdjTree" }, - "CVE-2018-1068": { - "cmt_msg": "netfilter: ebtables: CONFIG_COMPAT: don't trust userland offsets" + "CVE-2024-26664": { + "cmt_msg": "hwmon: (coretemp) Fix out-of-bounds memory access" }, - "CVE-2017-17053": { - "cmt_msg": "x86/mm: Fix use-after-free of ldt_struct" + "CVE-2023-32269": { + "cmt_msg": "netrom: Fix use-after-free caused by accept on already connected socket" }, - "CVE-2017-17052": { - "cmt_msg": "fork: fix incorrect fput of ->exe_file causing use-after-free" + "CVE-2023-1206": { + "cmt_msg": "tcp: Reduce chance of collisions in inet6_hashfn()." }, - "CVE-2020-0030": { - "cmt_msg": "ANDROID: binder: synchronize_rcu() when using POLLFREE." + "CVE-2021-38198": { + "cmt_msg": "KVM: X86: MMU: Use the correct inherited permissions to get shadow page" }, - "CVE-2020-10135": { - "cmt_msg": "Bluetooth: Consolidate encryption handling in hci_encrypt_cfm" + "CVE-2024-26689": { + "cmt_msg": "ceph: prevent use-after-free in encode_cap_msg()" }, - "CVE-2020-25285": { - "cmt_msg": "mm/hugetlb: fix a race between hugetlb sysctl handlers" + "CVE-2017-5972": { + "cmt_msg": "tcp: do not lock listener to process SYN packets" }, - "CVE-2019-7308": { - "cmt_msg": "bpf: fix sanitation of alu op with pointer / scalar type from different paths" + "CVE-2023-34256": { + "cmt_msg": "ext4: avoid a potential slab-out-of-bounds in ext4_group_desc_csum" }, - "CVE-2016-8405": { - "cmt_msg": "fbdev: color map copying bounds checking" + "CVE-2017-5970": { + "cmt_msg": "ipv4: keep skb->dst around in presence of IP options" }, - "CVE-2018-1000199": { - "cmt_msg": "perf/hwbp: Simplify the perf-hwbp code, fix documentation" + "CVE-2023-1513": { + "cmt_msg": "kvm: initialize all of the kvm_debugregs structure before sending it to userspace" }, - "CVE-2022-1966": { - "cmt_msg": "netfilter: nf_tables: disallow non-stateful expression in sets earlier" + "CVE-2023-52508": { + "cmt_msg": "nvme-fc: Prevent null pointer dereference in nvme_fc_io_getuuid()" }, - "CVE-2023-31084": { - "cmt_msg": "media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*()" + "CVE-2015-4004": { + "cmt_msg": "staging: ozwpan: Remove from tree" }, - "CVE-2017-9986": { - "cmt_msg": "sound: Retire OSS" + "CVE-2021-26401": { + "cmt_msg": "x86/speculation: Use generic retpoline by default on AMD" }, - "CVE-2017-9985": { - "cmt_msg": "ALSA: msnd: Optimize / harden DSP and MIDI loops" + "CVE-2024-1312": { + "cmt_msg": "mm: lock_vma_under_rcu() must check vma->anon_vma under vma lock" }, - "CVE-2017-9984": { - "cmt_msg": "ALSA: msnd: Optimize / harden DSP and MIDI loops" + "CVE-2021-3847": { + "cmt_msg": "" }, - "CVE-2019-16995": { - "cmt_msg": "net: hsr: fix memory leak in hsr_dev_finalize()" + "CVE-2022-2961": { + "cmt_msg": "" }, - "CVE-2017-18075": { - "cmt_msg": "crypto: pcrypt - fix freeing pcrypt instances" + "CVE-2023-52442": { + "cmt_msg": "ksmbd: validate session id and tree id in compound request" }, - "CVE-2022-3534": { - "cmt_msg": "libbpf: Fix use-after-free in btf_dump_name_dups" + "CVE-2019-14284": { + "cmt_msg": "floppy: fix div-by-zero in setup_format_params" }, - "CVE-2023-34256": { - "cmt_msg": "ext4: avoid a potential slab-out-of-bounds in ext4_group_desc_csum" + "CVE-2020-36557": { + "cmt_msg": "vt: vt_ioctl: fix VT_DISALLOCATE freeing in-use virtual console" }, - "CVE-2016-10088": { - "cmt_msg": "sg_write()/bsg_write() is not fit to be called under KERNEL_DS" + "CVE-2021-3506": { + "cmt_msg": "f2fs: fix to avoid out-of-bounds memory access" }, - "CVE-2020-36516": { - "cmt_msg": "ipv4: avoid using shared IP generator for connected sockets" + "CVE-2011-4917": { + "cmt_msg": "" }, - "CVE-2017-18079": { - "cmt_msg": "Input: i8042 - fix crash at boot time" + "CVE-2011-4916": { + "cmt_msg": "" }, - "CVE-2023-28328": { - "cmt_msg": "media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer()" + "CVE-2018-10880": { + "cmt_msg": "ext4: never move the system.data xattr out of the inode body" }, - "CVE-2023-0386": { - "cmt_msg": "ovl: fail on invalid uid/gid mapping at copy up" + "CVE-2019-3901": { + "cmt_msg": "perf/core: Fix perf_event_open() vs. execve() race" }, - "CVE-2017-13693": { - "cmt_msg": "" + "CVE-2019-3900": { + "cmt_msg": "vhost_net: fix possible infinite loop" }, - "CVE-2017-13695": { - "cmt_msg": "ACPICA: acpi: acpica: fix acpi operand cache leak in nseval.c" + "CVE-2019-19533": { + "cmt_msg": "media: ttusb-dec: Fix info-leak in ttusb_dec_send_command()" }, - "CVE-2017-13694": { - "cmt_msg": "" + "CVE-2018-13100": { + "cmt_msg": "f2fs: fix to do sanity check with secs_per_zone" }, - "CVE-2021-4149": { - "cmt_msg": "btrfs: unlock newly allocated extent buffer after error" + "CVE-2019-15807": { + "cmt_msg": "scsi: libsas: delete sas port if expander discover failed" }, - "CVE-2022-21385": { - "cmt_msg": "net/rds: fix warn in rds_message_alloc_sgs" + "CVE-2019-19530": { + "cmt_msg": "usb: cdc-acm: make sure a refcount is taken early enough" }, - "CVE-2021-3864": { - "cmt_msg": "" + "CVE-2023-31083": { + "cmt_msg": "Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO" + }, + "CVE-2019-5489": { + "cmt_msg": "Change mincore() to count \"mapped\" pages rather than \"cached\" pages" + }, + "CVE-2021-47082": { + "cmt_msg": "tun: avoid double free in tun_free_netdev" }, - "CVE-2021-3640": { - "cmt_msg": "Bluetooth: sco: Fix lock_sock() blockage by memcpy_from_msg()" + "CVE-2019-19531": { + "cmt_msg": "usb: yurex: Fix use-after-free in yurex_delete" }, - "CVE-2017-7618": { - "cmt_msg": "crypto: ahash - Fix EINPROGRESS notification callback" + "CVE-2019-14283": { + "cmt_msg": "floppy: fix out-of-bounds read in copy_buffer" }, - "CVE-2020-1749": { - "cmt_msg": "net: ipv6_stub: use ip6_dst_lookup_flow instead of ip6_dst_lookup" + "CVE-2018-10881": { + "cmt_msg": "ext4: clear i_data in ext4_inode_info when removing inline data" }, - "CVE-2022-42896": { - "cmt_msg": "Bluetooth: L2CAP: Fix accepting connection request for invalid SPSM" + "CVE-2018-10882": { + "cmt_msg": "ext4: add more inode number paranoia checks" }, - "CVE-2021-3760": { - "cmt_msg": "nfc: nci: fix the UAF of rf_conn_info object" + "CVE-2018-10883": { + "cmt_msg": "jbd2: don't mark block as modified if the handle is out of credits" + } + } + }, + "5.5": { + "5.5": { + "CVE-2019-14896": { + "cmt_msg": "libertas: Fix two buffer overflows at parsing bss descriptor", + "cmt_id": "e5e884b42639c74b5b57dc277909915c0aefc8bb" }, - "CVE-2022-36123": { - "cmt_msg": "x86: Clear .brk area at early boot" + "CVE-2019-14897": { + "cmt_msg": "libertas: Fix two buffer overflows at parsing bss descriptor", + "cmt_id": "e5e884b42639c74b5b57dc277909915c0aefc8bb" }, - "CVE-2020-11608": { - "cmt_msg": "media: ov519: add missing endpoint sanity checks" + "CVE-2020-14416": { + "cmt_msg": "can, slip: Protect tty->disc_data in write_wakeup and close with RCU", + "cmt_id": "0ace17d56824165c7f4c68785d6b58971db954dd" }, - "CVE-2020-10732": { - "cmt_msg": "fs/binfmt_elf.c: allocate initialized memory in fill_thread_core_info()" + "CVE-2020-8428": { + "cmt_msg": "do_last(): fetch directory ->i_mode and ->i_uid before it's too late", + "cmt_id": "d0cb50185ae942b03c4327be322055d622dc79f6" + } + }, + "5.5.1": { + "CVE-2020-0432": { + "cmt_msg": "staging: most: net: fix buffer overflow", + "cmt_id": "791f6de9e3937f24fd72b8c182d51bcf4421d490" + } + }, + "5.5.3": { + "CVE-2020-0404": { + "cmt_msg": "media: uvcvideo: Avoid cyclic entity chains due to malformed USB descriptors", + "cmt_id": "50142f89e13623ffd976b85cb1ccd3db2c430e9f" }, - "CVE-2020-28097": { - "cmt_msg": "vgacon: remove software scrollback support" + "CVE-2019-3016": { + "cmt_msg": "x86/kvm: Be careful not to clear KVM_VCPU_FLUSH_TLB bit", + "cmt_id": "06b34107899d1b004462c9d2e52ff5a146ee9898" + } + }, + "5.5.4": { + "CVE-2020-12653": { + "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_cmd_append_vsie_tlv()", + "cmt_id": "fe078681043f0958d7956d221ffd3f480a691b62" }, - "CVE-2017-7616": { - "cmt_msg": "mm/mempolicy.c: fix error handling in set_mempolicy and mbind." + "CVE-2020-12654": { + "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_ret_wmm_get_status()", + "cmt_id": "f3a6883c5acbb81be8f1eb87fdd045c2dc59a901" + } + }, + "5.5.5": { + "CVE-2022-1419": { + "cmt_msg": "drm/vgem: Close use-after-free race in vgem_gem_create", + "cmt_id": "c578f31bba29d2c6a97d2ad279ae3cd261dcc786" }, - "CVE-2023-6931": { - "cmt_msg": "perf: Fix perf_event_validate_size()" + "CVE-2020-8992": { + "cmt_msg": "ext4: add cond_resched() to ext4_protect_reserved_inode", + "cmt_id": "9bc7647fe62823bfb6921e98ba40196706eca89a" + } + }, + "5.5.7": { + "CVE-2020-0110": { + "cmt_msg": "sched/psi: Fix OOB write when writing 0 bytes to PSI files", + "cmt_id": "9ce51fc82bbc8632cb55643ce309bd6732b3d5db" }, - "CVE-2017-18216": { - "cmt_msg": "ocfs2: subsystem.su_mutex is required while accessing the item->ci_parent" + "CVE-2020-0009": { + "cmt_msg": "staging: android: ashmem: Disallow ashmem memory from being remapped", + "cmt_id": "aa5122eaa89d875bec5f27d3be1fecd5504ca507" }, - "CVE-2017-1000112": { - "cmt_msg": "udp: consistently apply ufo or fragmentation" + "CVE-2020-9383": { + "cmt_msg": "floppy: check FDC index for errors before assigning it", + "cmt_id": "3604f164a31e6acb38ef2fa7588db18bbcd644fe" }, - "CVE-2017-1000111": { - "cmt_msg": "packet: fix tp_reserve race in packet_set_ring" + "CVE-2020-2732": { + "cmt_msg": "KVM: nVMX: Don't emulate instructions in guest mode", + "cmt_id": "bfdac9d7632d29fab54cb4488d208a89c9ac48c7" }, - "CVE-2024-24855": { - "cmt_msg": "scsi: lpfc: Fix a possible data race in lpfc_unregister_fcf_rescan()" + "CVE-2020-36558": { + "cmt_msg": "vt: vt_ioctl: fix race in VT_RESIZEX", + "cmt_id": "be61d458e9204e54030820a685649219a9b5c6a5" }, - "CVE-2019-9466": { - "cmt_msg": "brcmfmac: add subtype check for event handling in data path" + "CVE-2020-9391": { + "cmt_msg": "mm: Avoid creating virtual address aliases in brk()/mmap()/mremap()", + "cmt_id": "c1947a09073350073f73e7024bda4cfdc240dc8f" + } + }, + "5.5.8": { + "CVE-2020-27068": { + "cmt_msg": "cfg80211: add missing policy for NL80211_ATTR_STATUS_CODE", + "cmt_id": "d9fe1596f1345d155f936fffaa97bcdca41a6bb8" }, - "CVE-2017-18218": { - "cmt_msg": "net: hns: Fix a skb used after free bug" + "CVE-2019-19768": { + "cmt_msg": "blktrace: Protect q->blk_trace with RCU", + "cmt_id": "ed1832ea0518339d702a2212a0a7fd37f5d169c0" }, - "CVE-2017-7533": { - "cmt_msg": "dentry name snapshots" + "CVE-2020-10942": { + "cmt_msg": "vhost: Check docket sk_family instead of call getname", + "cmt_id": "54cd3ad4d9ccad89b986248a670eab359ef9b8dd" }, - "CVE-2018-8897": { - "cmt_msg": "x86/entry/64: Don't use IST entry for #BP stack" + "CVE-2020-0444": { + "cmt_msg": "audit: fix error handling in audit_data_to_entry()", + "cmt_id": "4f3daed0c7ffee4756da2d8c6fb0d5027d97ec87" + } + }, + "5.5.9": { + "CVE-2020-8649": { + "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region", + "cmt_id": "270059ce5063ff98e2229d6cabe56927513f4ca6" }, - "CVE-2021-29265": { - "cmt_msg": "usbip: fix stub_dev usbip_sockfd_store() races leading to gpf" + "CVE-2020-8647": { + "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region", + "cmt_id": "270059ce5063ff98e2229d6cabe56927513f4ca6" }, - "CVE-2021-39648": { - "cmt_msg": "usb: gadget: configfs: Fix use-after-free issue with udc_name" + "CVE-2020-27418": { + "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region", + "cmt_id": "270059ce5063ff98e2229d6cabe56927513f4ca6" }, - "CVE-2022-3545": { - "cmt_msg": "nfp: fix use-after-free in area_cache_get()" + "CVE-2020-8648": { + "cmt_msg": "vt: selection, close sel_buffer race", + "cmt_id": "7b2eea176b28f9ff3ab1c6cae2332defe94fd1e9" + } + }, + "5.5.10": { + "CVE-2020-12465": { + "cmt_msg": "mt76: fix array overflow on receiving too many fragments for a packet", + "cmt_id": "fc09229baaaf75e068302b060f7f21548ba2ded6" + } + }, + "5.5.11": { + "CVE-2020-29370": { + "cmt_msg": "mm: slub: add missing TID bump in kmem_cache_alloc_bulk()", + "cmt_id": "b31a837d420c0defb088f1b6e39217c83b8d99af" + } + }, + "5.5.12": { + "CVE-2019-19769": { + "cmt_msg": "locks: fix a potential use-after-free problem when wakeup a waiter", + "cmt_id": "5e62fb2c5d44e82ee7fae8c7fe946c7116489281" }, - "CVE-2022-3542": { - "cmt_msg": "bnx2x: fix potential memory leak in bnx2x_tpa_stop()" + "CVE-2020-14381": { + "cmt_msg": "futex: Fix inode life-time issue", + "cmt_id": "55515c7d837d173393d25912b5593387eb0a4e25" + } + }, + "5.5.14": { + "CVE-2020-8835": { + "cmt_msg": "bpf: Undo incorrect __reg_bound_offset32 handling", + "cmt_id": "0ebc01466d98d016eb6a3780ec8edb0c86fa48bc" }, - "CVE-2020-14416": { - "cmt_msg": "can, slip: Protect tty->disc_data in write_wakeup and close with RCU" + "CVE-2020-11668": { + "cmt_msg": "media: xirlink_cit: add missing descriptor sanity checks", + "cmt_id": "10b65719f712f0f823e2b961837aa7300347645a" }, - "CVE-2019-0136": { - "cmt_msg": "mac80211: drop robust management frames from unknown TA" + "CVE-2021-3715": { + "cmt_msg": "net_sched: cls_route: remove the right filter from hashtable", + "cmt_id": "858b3a85bb1b26043f0d40e9af1d295a5c2fa7a1" }, - "CVE-2017-17975": { - "cmt_msg": "media: usbtv: prevent double free in error case" + "CVE-2020-27066": { + "cmt_msg": "xfrm: policy: Fix doulbe free in xfrm_policy_timer", + "cmt_id": "a6ca6e66a8b2f8741610d99c95c9bf5748e08372" }, - "CVE-2019-16921": { - "cmt_msg": "RDMA/hns: Fix init resp when alloc ucontext" + "CVE-2020-11608": { + "cmt_msg": "media: ov519: add missing endpoint sanity checks", + "cmt_id": "773972d6e95a714a08b0653bcd5f5f57caa6b8b6" }, - "CVE-2018-16597": { - "cmt_msg": "ovl: modify ovl_permission() to do checks on two inodes" + "CVE-2020-11609": { + "cmt_msg": "media: stv06xx: add missing descriptor sanity checks", + "cmt_id": "7d565c3bbc5c1255a79d63641ac5fbbfb819216d" + } + }, + "5.5.15": { + "CVE-2020-36557": { + "cmt_msg": "vt: vt_ioctl: fix VT_DISALLOCATE freeing in-use virtual console", + "cmt_id": "dafe1c8034fd5c7c3ae930aa76c8bc5333ee1096" + } + }, + "5.5.16": { + "CVE-2020-11565": { + "cmt_msg": "mm: mempolicy: require at least one nodeid for MPOL_PREFERRED", + "cmt_id": "d541416601eed8f771488386dc49d91ce677e3a9" + } + }, + "5.5.17": { + "CVE-2020-11494": { + "cmt_msg": "slcan: Don't transmit uninitialized stack data in padding", + "cmt_id": "51fafff685ba3b1228e1def7d79094a951585574" + } + }, + "5.5.18": { + "CVE-2019-19039": { + "cmt_msg": "btrfs: Don't submit any btree write bio if the fs has errors", + "cmt_id": "49a9f499e847b3d4efbede21f541d61d079f9773" }, - "CVE-2021-21781": { - "cmt_msg": "ARM: ensure the signal page contains defined contents" + "CVE-2020-12826": { + "cmt_msg": "signal: Extend exec_id to 64bits", + "cmt_id": "d65376ec3f4713fbd47e1837228394d06c7ada2a" }, - "CVE-2021-0512": { - "cmt_msg": "HID: make arrays usage and value to be the same" + "CVE-2020-12657": { + "cmt_msg": "block, bfq: fix use-after-free in bfq_idle_slice_timer_body", + "cmt_id": "a8cb63998d1d41830d3e400ab9d0795771e57e87" }, - "CVE-2018-14634": { - "cmt_msg": "exec: Limit arg stack to at most 75% of _STK_LIM" + "CVE-2019-19377": { + "cmt_msg": "btrfs: Don't submit any btree write bio if the fs has errors", + "cmt_id": "49a9f499e847b3d4efbede21f541d61d079f9773" + } + }, + "outstanding": { + "CVE-2020-36322": { + "cmt_msg": "fuse: fix bad inode" }, - "CVE-2018-14633": { - "cmt_msg": "scsi: target: iscsi: Use hex2bin instead of a re-implementation" + "CVE-2020-10711": { + "cmt_msg": "netlabel: cope with NULL catmap" }, - "CVE-2018-12896": { - "cmt_msg": "posix-timers: Sanitize overrun handling" + "CVE-2020-35508": { + "cmt_msg": "fork: fix copy_process(CLONE_PARENT) race with the exiting ->real_parent" }, - "CVE-2023-1382": { - "cmt_msg": "tipc: set con sock in tipc_conn_alloc" + "CVE-2022-3649": { + "cmt_msg": "nilfs2: fix use-after-free bug of struct nilfs_root" }, - "CVE-2019-19073": { - "cmt_msg": "ath9k_htc: release allocated buffer if timed out" + "CVE-2020-35501": { + "cmt_msg": "" }, - "CVE-2018-14734": { - "cmt_msg": "infiniband: fix a possible use-after-free bug" + "CVE-2021-45095": { + "cmt_msg": "phonet: refcount leak in pep_sock_accep" }, - "CVE-2022-0850": { - "cmt_msg": "ext4: fix kernel infoleak via ext4_extent_header" + "CVE-2020-29369": { + "cmt_msg": "mm/mmap.c: close race between munmap() and expand_upwards()/downwards()" }, - "CVE-2020-0347": { - "cmt_msg": "" + "CVE-2022-0001": { + "cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE" }, - "CVE-2022-41222": { - "cmt_msg": "mm/mremap: hold the rmap lock in write mode when moving page table entries." + "CVE-2020-12464": { + "cmt_msg": "USB: core: Fix free-while-in-use bug in the USB S-Glibrary" }, - "CVE-2018-8822": { - "cmt_msg": "staging: ncpfs: memory corruption in ncp_read_kernel()" + "CVE-2022-0002": { + "cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE" }, - "CVE-2021-40490": { - "cmt_msg": "ext4: fix race writing to an inline_data file while its xattrs are changing" + "CVE-2024-26685": { + "cmt_msg": "nilfs2: fix potential bug in end_buffer_async_write" }, - "CVE-2021-33909": { - "cmt_msg": "seq_file: disallow extremely large seq buffer allocations" + "CVE-2023-52615": { + "cmt_msg": "hwrng: core - Fix page fault dead lock on mmap-ed hwrng" }, - "CVE-2016-9755": { - "cmt_msg": "netfilter: ipv6: nf_defrag: drop mangled skb on ream error" + "CVE-2023-52614": { + "cmt_msg": "PM / devfreq: Fix buffer overflow in trans_stat_show" }, - "CVE-2019-12455": { - "cmt_msg": "clk-sunxi: fix a missing-check bug in sunxi_divs_clk_setup()" + "CVE-2023-52617": { + "cmt_msg": "PCI: switchtec: Fix stdev_release() crash after surprise hot remove" }, - "CVE-2019-12456": { - "cmt_msg": "" + "CVE-2020-24587": { + "cmt_msg": "mac80211: prevent mixed key and fragment cache attacks" }, - "CVE-2016-9756": { - "cmt_msg": "KVM: x86: drop error recovery in em_jmp_far and em_ret_far" + "CVE-2020-24586": { + "cmt_msg": "mac80211: prevent mixed key and fragment cache attacks" }, - "CVE-2022-0812": { - "cmt_msg": "xprtrdma: fix incorrect header size calculations" + "CVE-2023-52612": { + "cmt_msg": "crypto: scomp - fix req->dst buffer overflow" }, - "CVE-2021-29647": { - "cmt_msg": "net: qrtr: fix a kernel-infoleak in qrtr_recvmsg()" + "CVE-2022-3105": { + "cmt_msg": "RDMA/uverbs: Check for null return of kmalloc_array" }, - "CVE-2019-5108": { - "cmt_msg": "mac80211: Do not send Layer 2 Update frame before authorization" + "CVE-2021-0129": { + "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical" }, - "CVE-2019-17133": { - "cmt_msg": "cfg80211: wext: avoid copying malformed SSIDs" + "CVE-2020-24588": { + "cmt_msg": "cfg80211: mitigate A-MSDU aggregation attacks" }, - "CVE-2017-18595": { - "cmt_msg": "tracing: Fix possible double free on failure of allocating trace buffer" + "CVE-2022-47520": { + "cmt_msg": "wifi: wilc1000: validate pairwise and authentication suite offsets" }, - "CVE-2021-33655": { - "cmt_msg": "fbcon: Disallow setting font bigger than screen size" + "CVE-2023-52618": { + "cmt_msg": "block/rnbd-srv: Check for unlikely string overflow" }, - "CVE-2021-3612": { - "cmt_msg": "Input: joydev - prevent potential read overflow in ioctl" + "CVE-2023-5717": { + "cmt_msg": "perf: Disallow mis-matched inherited group reads" }, - "CVE-2017-2636": { - "cmt_msg": "tty: n_hdlc: get rid of racy n_hdlc.tbuf" + "CVE-2021-3444": { + "cmt_msg": "bpf: Fix truncation handling for mod32 dst reg wrt zero" }, - "CVE-2017-7487": { - "cmt_msg": "ipx: call ipxitf_put() in ioctl error path" + "CVE-2022-32250": { + "cmt_msg": "netfilter: nf_tables: disallow non-stateful expression in sets earlier" }, - "CVE-2019-6974": { - "cmt_msg": "kvm: fix kvm_ioctl_create_device() reference counting (CVE-2019-6974)" + "CVE-2020-36158": { + "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_cmd_802_11_ad_hoc_start" }, - "CVE-2022-41850": { - "cmt_msg": "HID: roccat: Fix use-after-free in roccat_read()" + "CVE-2023-3159": { + "cmt_msg": "firewire: fix potential uaf in outbound_phy_packet_callback()" }, - "CVE-2019-19525": { - "cmt_msg": "ieee802154: atusb: fix use-after-free at disconnect" + "CVE-2022-0480": { + "cmt_msg": "memcg: enable accounting for file lock caches" }, - "CVE-2022-0168": { - "cmt_msg": "cifs: fix NULL ptr dereference in smb2_ioctl_query_info()" + "CVE-2022-0487": { + "cmt_msg": "moxart: fix potential use-after-free on remove path" }, - "CVE-2023-2985": { - "cmt_msg": "fs: hfsplus: fix UAF issue in hfsplus_put_super" + "CVE-2023-52429": { + "cmt_msg": "dm: limit the number of targets and parameter size area" }, - "CVE-2020-14390": { - "cmt_msg": "fbcon: remove soft scrollback code" + "CVE-2022-42703": { + "cmt_msg": "mm/rmap: Fix anon_vma->degree ambiguity leading to double-reuse" }, - "CVE-2023-4132": { - "cmt_msg": "media: usb: siano: Fix warning due to null work_func_t function pointer" + "CVE-2021-47059": { + "cmt_msg": "crypto: sun8i-ss - fix result memory leak on error path" }, - "CVE-2020-24502": { + "CVE-2022-23825": { "cmt_msg": "" }, - "CVE-2017-17712": { - "cmt_msg": "net: ipv4: fix for a race condition in raw_sendmsg" + "CVE-2021-3847": { + "cmt_msg": "" }, - "CVE-2017-17807": { - "cmt_msg": "KEYS: add missing permission check for request_key() destination" + "CVE-2021-42252": { + "cmt_msg": "soc: aspeed: lpc-ctrl: Fix boundary check for mmap" }, - "CVE-2017-10661": { - "cmt_msg": "timerfd: Protect the might cancel mechanism proper" + "CVE-2021-47051": { + "cmt_msg": "spi: fsl-lpspi: Fix PM reference leak in lpspi_prepare_xfer_hardware()" }, - "CVE-2017-17805": { - "cmt_msg": "crypto: salsa20 - fix blkcipher_walk API usage" + "CVE-2023-0179": { + "cmt_msg": "netfilter: nft_payload: incorrect arithmetics when fetching VLAN header bits" }, - "CVE-2017-7541": { - "cmt_msg": "brcmfmac: fix possible buffer overflow in brcmf_cfg80211_mgmt_tx()" + "CVE-2021-47056": { + "cmt_msg": "crypto: qat - ADF_STATUS_PF_RUNNING should be set after adf_dev_init" }, - "CVE-2019-19527": { - "cmt_msg": "HID: hiddev: do cleanup in failure of opening a device" + "CVE-2021-47054": { + "cmt_msg": "bus: qcom: Put child node before return" }, - "CVE-2017-7542": { - "cmt_msg": "ipv6: avoid overflow of offset in ip6_find_1stfragopt" + "CVE-2021-47112": { + "cmt_msg": "x86/kvm: Teardown PV features on boot CPU as well" }, - "CVE-2024-0584": { - "cmt_msg": "ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet" + "CVE-2021-47113": { + "cmt_msg": "btrfs: abort in rename_exchange if we fail to insert the second ref" }, - "CVE-2020-26141": { - "cmt_msg": "ath10k: Fix TKIP Michael MIC verification for PCIe" + "CVE-2021-47110": { + "cmt_msg": "x86/kvm: Disable kvmclock on all CPUs on shutdown" }, - "CVE-2020-0465": { - "cmt_msg": "HID: core: Sanitize event code and type when mapping input" + "CVE-2021-47111": { + "cmt_msg": "xen-netback: take a reference to the RX task thread" }, - "CVE-2020-0305": { - "cmt_msg": "chardev: Avoid potential use-after-free in 'chrdev_open()'" + "CVE-2021-47116": { + "cmt_msg": "ext4: fix memory leak in ext4_mb_init_backend on error path." }, - "CVE-2018-3639": { - "cmt_msg": "x86/nospec: Simplify alternative_msr_write()" + "CVE-2021-47117": { + "cmt_msg": "ext4: fix bug on in ext4_es_cache_extent as ext4_split_extent_at failed" }, - "CVE-2021-4218": { - "cmt_msg": "sysctl: pass kernel pointers to ->proc_handler" + "CVE-2021-47114": { + "cmt_msg": "ocfs2: fix data corruption by fallocate" }, - "CVE-2023-22995": { - "cmt_msg": "usb: dwc3: dwc3-qcom: Add missing platform_device_put() in dwc3_qcom_acpi_register_core" + "CVE-2024-26759": { + "cmt_msg": "mm/swap: fix race when skipping swapcache" }, - "CVE-2019-15902": { - "cmt_msg": "unknown" + "CVE-2022-21125": { + "cmt_msg": "x86/speculation/mmio: Reuse SRBDS mitigation for SBDS" }, - "CVE-2024-25739": { - "cmt_msg": "" + "CVE-2021-46971": { + "cmt_msg": "perf/core: Fix unconditional security_locked_down() call" }, - "CVE-2019-20054": { - "cmt_msg": "fs/proc/proc_sysctl.c: fix NULL pointer dereference in put_links" + "CVE-2021-46970": { + "cmt_msg": "bus: mhi: pci_generic: Remove WQ_MEM_RECLAIM flag from state workqueue" }, - "CVE-2017-15274": { - "cmt_msg": "KEYS: fix dereferencing NULL payload with nonzero length" + "CVE-2021-46977": { + "cmt_msg": "KVM: VMX: Disable preemption when probing user return MSRs" }, - "CVE-2024-0340": { - "cmt_msg": "vhost: use kzalloc() instead of kmalloc() followed by memset()" + "CVE-2023-28466": { + "cmt_msg": "net: tls: fix possible race condition between do_tls_getsockopt_conf() and do_tls_setsockopt_conf()" }, - "CVE-2021-3753": { - "cmt_msg": "vt_kdsetmode: extend console locking" + "CVE-2022-40307": { + "cmt_msg": "efi: capsule-loader: Fix use-after-free in efi_capsule_write" }, - "CVE-2023-6536": { - "cmt_msg": "" + "CVE-2021-46974": { + "cmt_msg": "bpf: Fix masking negation logic upon negative dst register" }, - "CVE-2019-11135": { - "cmt_msg": "x86/msr: Add the IA32_TSX_CTRL MSR" + "CVE-2020-29368": { + "cmt_msg": "mm: thp: make the THP mapcount atomic against __split_huge_pmd_locked()" }, - "CVE-2019-11810": { - "cmt_msg": "scsi: megaraid_sas: return error when create DMA pool failed" + "CVE-2021-39686": { + "cmt_msg": "binder: use euid from cred instead of using task" }, - "CVE-2021-27365": { - "cmt_msg": "scsi: iscsi: Ensure sysfs attributes are limited to PAGE_SIZE" + "CVE-2021-39685": { + "cmt_msg": "USB: gadget: detect too-big endpoint 0 requests" }, - "CVE-2021-27364": { - "cmt_msg": "scsi: iscsi: Restrict sessions and handles to admin capabilities" + "CVE-2021-43975": { + "cmt_msg": "atlantic: Fix OOB read and write in hw_atl_utils_fw_rpc_wait" }, - "CVE-2017-14991": { - "cmt_msg": "scsi: sg: fixup infoleak when using SG_GET_REQUEST_TABLE" + "CVE-2021-43976": { + "cmt_msg": "mwifiex: Fix skb_over_panic in mwifiex_usb_recv()" }, - "CVE-2020-0431": { - "cmt_msg": "HID: hid-input: clear unmapped usages" + "CVE-2020-0466": { + "cmt_msg": "do_epoll_ctl(): clean the failure exits up a bit" }, - "CVE-2022-39842": { - "cmt_msg": "video: fbdev: pxa3xx-gcu: Fix integer overflow in pxa3xx_gcu_write" + "CVE-2024-26774": { + "cmt_msg": "ext4: avoid dividing by 0 in mb_update_avg_fragment_size() when block bitmap corrupt" }, - "CVE-2018-17977": { - "cmt_msg": "" + "CVE-2023-0459": { + "cmt_msg": "uaccess: Add speculation barrier to copy_from_user()" }, - "CVE-2023-31081": { - "cmt_msg": "" + "CVE-2023-0458": { + "cmt_msg": "prlimit: do_prlimit needs to have a speculation check" }, - "CVE-2018-17972": { - "cmt_msg": "proc: restrict kernel stack dumps to root" + "CVE-2023-52565": { + "cmt_msg": "media: uvcvideo: Fix OOB read" }, - "CVE-2021-20320": { - "cmt_msg": "s390/bpf: Fix optimizing out zero-extensions" + "CVE-2023-0597": { + "cmt_msg": "x86/mm: Randomize per-cpu entry area" }, - "CVE-2020-28974": { - "cmt_msg": "vt: Disable KD_FONT_OP_COPY" + "CVE-2021-3669": { + "cmt_msg": "ipc: replace costly bailout check in sysvipc_find_ipc()" }, - "CVE-2018-7566": { - "cmt_msg": "ALSA: seq: Fix racy pool initializations" + "CVE-2021-3744": { + "cmt_msg": "crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd()" }, - "CVE-2020-11725": { - "cmt_msg": "" + "CVE-2022-42720": { + "cmt_msg": "wifi: cfg80211: fix BSS refcounting bugs" }, - "CVE-2022-33742": { - "cmt_msg": "xen/blkfront: force data bouncing when backend is untrusted" + "CVE-2021-30002": { + "cmt_msg": "media: v4l: ioctl: Fix memory leak in video_usercopy" }, - "CVE-2022-26490": { - "cmt_msg": "nfc: st21nfca: Fix potential buffer overflows in EVT_TRANSACTION" + "CVE-2021-3743": { + "cmt_msg": "net: qrtr: fix OOB Read in qrtr_endpoint_post" }, - "CVE-2017-5967": { - "cmt_msg": "time: Remove CONFIG_TIMER_STATS" + "CVE-2021-0941": { + "cmt_msg": "bpf: Remove MTU check in __bpf_skb_max_len" }, - "CVE-2021-0937": { - "cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write" + "CVE-2022-3628": { + "cmt_msg": "wifi: brcmfmac: Fix potential buffer overflow in brcmf_fweh_event_worker()" }, - "CVE-2022-42895": { - "cmt_msg": "Bluetooth: L2CAP: Fix attempting to access uninitialized memory" + "CVE-2020-15802": { + "cmt_msg": "" }, - "CVE-2022-3169": { - "cmt_msg": "nvme: ensure subsystem reset is single threaded" + "CVE-2024-26597": { + "cmt_msg": "net: qualcomm: rmnet: fix global oob in rmnet_policy" }, - "CVE-2022-4744": { - "cmt_msg": "tun: avoid double free in tun_free_netdev" + "CVE-2024-26594": { + "cmt_msg": "ksmbd: validate mech token in session setup" }, - "CVE-2022-36280": { - "cmt_msg": "drm/vmwgfx: Validate the box size for the snooped cursor" + "CVE-2023-2483": { + "cmt_msg": "net: qcom/emac: Fix use after free bug in emac_remove due to race condition" }, - "CVE-2019-2054": { - "cmt_msg": "arm/ptrace: run seccomp after ptrace" + "CVE-2022-3636": { + "cmt_msg": "net: ethernet: mtk_eth_soc: use after free in __mtk_ppe_check_skb()" }, - "CVE-2020-0404": { - "cmt_msg": "media: uvcvideo: Avoid cyclic entity chains due to malformed USB descriptors" + "CVE-2022-3635": { + "cmt_msg": "atm: idt77252: fix use-after-free bugs caused by tst_timer" }, - "CVE-2018-20976": { - "cmt_msg": "xfs: clear sb->s_fs_info on mount failure" + "CVE-2022-3633": { + "cmt_msg": "can: j1939: j1939_session_destroy(): fix memory leak of skbs" }, - "CVE-2016-10147": { - "cmt_msg": "crypto: mcryptd - Check mcryptd algorithm compatibility" + "CVE-2021-34556": { + "cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4" }, - "CVE-2024-21803": { - "cmt_msg": "" + "CVE-2019-15902": { + "cmt_msg": "unknown" }, - "CVE-2018-7995": { - "cmt_msg": "x86/MCE: Serialize sysfs changes" + "CVE-2022-40982": { + "cmt_msg": "x86/speculation: Add Gather Data Sampling mitigation" }, - "CVE-2018-16276": { - "cmt_msg": "USB: yurex: fix out-of-bounds uaccess in read handler" + "CVE-2024-26735": { + "cmt_msg": "ipv6: sr: fix possible use-after-free and null-ptr-deref" }, - "CVE-2019-15927": { - "cmt_msg": "ALSA: usb-audio: Avoid access before bLength check in build_audio_procunit()" + "CVE-2022-3202": { + "cmt_msg": "jfs: prevent NULL deref in diFree" }, - "CVE-2021-3542": { + "CVE-2024-25739": { "cmt_msg": "" }, - "CVE-2019-16413": { - "cmt_msg": "9p: use inode->i_lock to protect i_size_write() under 32-bit" + "CVE-2021-47028": { + "cmt_msg": "mt76: mt7915: fix txrate reporting" }, - "CVE-2024-24860": { - "cmt_msg": "Bluetooth: Fix atomicity violation in {min,max}_key_size_set" + "CVE-2022-2602": { + "cmt_msg": "io_uring/af_unix: defer registered files gc to io_uring release" }, - "CVE-2018-10876": { - "cmt_msg": "ext4: only look at the bg_flags field if it is valid" + "CVE-2024-26585": { + "cmt_msg": "tls: fix race between tx work scheduling and socket close" }, - "CVE-2023-2194": { - "cmt_msg": "i2c: xgene-slimpro: Fix out-of-bounds bug in xgene_slimpro_i2c_xfer()" + "CVE-2021-47024": { + "cmt_msg": "vsock/virtio: free queued packets when closing socket" }, - "CVE-2022-1263": { - "cmt_msg": "KVM: avoid NULL pointer dereference in kvm_dirty_ring_push" + "CVE-2023-52511": { + "cmt_msg": "spi: sun6i: reduce DMA RX transfer width to single byte" }, - "CVE-2017-16650": { - "cmt_msg": "net: qmi_wwan: fix divide by 0 on bad descriptors" + "CVE-2021-47020": { + "cmt_msg": "soundwire: stream: fix memory leak in stream config error path" }, - "CVE-2020-12653": { - "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_cmd_append_vsie_tlv()" + "CVE-2024-26584": { + "cmt_msg": "net: tls: handle backlogging of crypto requests" }, - "CVE-2019-7222": { - "cmt_msg": "KVM: x86: work around leak of uninitialized stack contents (CVE-2019-7222)" + "CVE-2023-2008": { + "cmt_msg": "udmabuf: add back sanity check" }, - "CVE-2017-14051": { - "cmt_msg": "scsi: qla2xxx: Fix an integer overflow in sysfs code" + "CVE-2021-46908": { + "cmt_msg": "bpf: Use correct permission flag for mixed signed bounds arithmetic" }, - "CVE-2020-12654": { - "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_ret_wmm_get_status()" + "CVE-2021-46909": { + "cmt_msg": "ARM: footbridge: fix PCI interrupt mapping" }, - "CVE-2019-7221": { - "cmt_msg": "KVM: nVMX: unconditionally cancel preemption timer in free_nested (CVE-2019-7221)" + "CVE-2021-46906": { + "cmt_msg": "HID: usbhid: fix info leak in hid_submit_ctrl" }, - "CVE-2018-12929": { - "cmt_msg": "" + "CVE-2021-46904": { + "cmt_msg": "net: hso: fix null-ptr-deref during tty device unregistration" }, - "CVE-2018-12928": { + "CVE-2022-1247": { "cmt_msg": "" }, - "CVE-2017-7645": { - "cmt_msg": "nfsd: check for oversized NFSv2/v3 arguments" - }, - "CVE-2020-36310": { - "cmt_msg": "KVM: SVM: avoid infinite loop on NPF from bad address" - }, - "CVE-2020-36313": { - "cmt_msg": "KVM: Fix out of range accesses to memslots" - }, - "CVE-2020-35519": { - "cmt_msg": "net/x25: prevent a couple of overflows" - }, - "CVE-2023-31436": { - "cmt_msg": "net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg" + "CVE-2023-2007": { + "cmt_msg": "scsi: dpt_i2o: Remove obsolete driver" }, - "CVE-2022-33740": { - "cmt_msg": "xen/netfront: fix leaking data in shared pages" + "CVE-2020-26145": { + "cmt_msg": "ath10k: drop fragments with multicast DA for PCIe" }, "CVE-2023-51782": { "cmt_msg": "net/rose: Fix Use-After-Free in rose_ioctl" }, - "CVE-2021-28971": { - "cmt_msg": "perf/x86/intel: Fix a crash caused by zero PEBS status" + "CVE-2020-26147": { + "cmt_msg": "mac80211: assure all fragments are encrypted" }, - "CVE-2020-10708": { + "CVE-2020-26141": { + "cmt_msg": "ath10k: Fix TKIP Michael MIC verification for PCIe" + }, + "CVE-2020-26140": { "cmt_msg": "" }, - "CVE-2020-25673": { - "cmt_msg": "nfc: Avoid endless loops caused by repeated llcp_sock_connect()" + "CVE-2021-43389": { + "cmt_msg": "isdn: cpai: check ctr->cnr to avoid array index out of bound" }, - "CVE-2022-0400": { + "CVE-2020-26142": { "cmt_msg": "" }, - "CVE-2022-45886": { - "cmt_msg": "media: dvb-core: Fix use-after-free due on race condition at dvb_net" + "CVE-2023-1074": { + "cmt_msg": "sctp: fail if no bound addresses can be used for a given scope" }, - "CVE-2021-38160": { - "cmt_msg": "virtio_console: Assure used length from device is limited" + "CVE-2023-1075": { + "cmt_msg": "net/tls: tls_is_tx_ready() checked list_entry" }, - "CVE-2021-42739": { - "cmt_msg": "media: firewire: firedtv-avc: fix a buffer overflow in avc_ca_pmt()" + "CVE-2023-1076": { + "cmt_msg": "tun: tun_chr_open(): correctly initialize socket uid" }, - "CVE-2022-3344": { - "cmt_msg": "KVM: x86: nSVM: harden svm_free_nested against freeing vmcb02 while still in use" + "CVE-2023-1077": { + "cmt_msg": "sched/rt: pick_next_rt_entity(): check list_entry" }, - "CVE-2022-3111": { - "cmt_msg": "power: supply: wm8350-power: Add missing free in free_charger_irq" + "CVE-2023-46838": { + "cmt_msg": "xen-netback: don't produce zero-size SKB frags" }, - "CVE-2018-5344": { - "cmt_msg": "loop: fix concurrent lo_open/lo_release" + "CVE-2023-51780": { + "cmt_msg": "atm: Fix Use-After-Free in do_vcc_ioctl" }, - "CVE-2020-12770": { - "cmt_msg": "scsi: sg: add sg_remove_request in sg_write" + "CVE-2023-40283": { + "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb" }, - "CVE-2017-15115": { - "cmt_msg": "sctp: do not peel off an assoc from one netns to another one" + "CVE-2023-1073": { + "cmt_msg": "HID: check empty report_list in hid_validate_values()" }, - "CVE-2019-15222": { - "cmt_msg": "ALSA: usb-audio: Fix gpf in snd_usb_pipe_sanity_check" + "CVE-2024-26747": { + "cmt_msg": "usb: roles: fix NULL pointer issue when put module's reference" }, - "CVE-2024-25744": { - "cmt_msg": "x86/coco: Disable 32-bit emulation by default on TDX and SEV" + "CVE-2024-26745": { + "cmt_msg": "powerpc/pseries/iommu: IOMMU table is not initialized for kdump over SR-IOV" }, - "CVE-2022-25265": { - "cmt_msg": "" + "CVE-2023-51042": { + "cmt_msg": "drm/amdgpu: Fix potential fence use-after-free v2" }, - "CVE-2022-20368": { - "cmt_msg": "net/packet: fix slab-out-of-bounds access in packet_recvmsg()" + "CVE-2024-26743": { + "cmt_msg": "RDMA/qedr: Fix qedr_create_user_qp error flow" }, - "CVE-2017-12153": { - "cmt_msg": "nl80211: check for the required netlink attributes presence" + "CVE-2023-52566": { + "cmt_msg": "nilfs2: fix potential use after free in nilfs_gccache_submit_read_data()" }, - "CVE-2019-19813": { - "cmt_msg": "btrfs: inode: Verify inode mode to avoid NULL pointer dereference" + "CVE-2024-26740": { + "cmt_msg": "net/sched: act_mirred: use the backlog for mirred ingress" }, - "CVE-2017-12154": { - "cmt_msg": "kvm: nVMX: Don't allow L2 to access the hardware CR8" + "CVE-2020-29661": { + "cmt_msg": "tty: Fix ->pgrp locking in tiocspgrp()" }, - "CVE-2020-10773": { - "cmt_msg": "s390/cmm: fix information leak in cmm_timeout_handler()" + "CVE-2020-29660": { + "cmt_msg": "tty: Fix ->session locking" }, - "CVE-2022-21499": { - "cmt_msg": "lockdown: also lock down previous kgdb use" + "CVE-2023-1990": { + "cmt_msg": "nfc: st-nci: Fix use after free bug in ndlc_remove due to race condition" }, - "CVE-2020-25284": { - "cmt_msg": "rbd: require global CAP_SYS_ADMIN for mapping and unmapping" + "CVE-2022-42432": { + "cmt_msg": "netfilter: nfnetlink_osf: fix possible bogus match in nf_osf_find()" }, - "CVE-2023-4208": { - "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free" + "CVE-2022-1734": { + "cmt_msg": "nfc: nfcmrvl: main: reorder destructive operations in nfcmrvl_nci_unregister_dev to avoid bugs" }, - "CVE-2017-1000379": { - "cmt_msg": "mm: larger stack guard gap, between vmas" + "CVE-2024-26749": { + "cmt_msg": "usb: cdns3: fixed memory use after free at cdns3_gadget_ep_disable()" }, - "CVE-2022-3606": { - "cmt_msg": "" + "CVE-2022-3625": { + "cmt_msg": "devlink: Fix use-after-free after a failed reload" }, - "CVE-2023-4206": { - "cmt_msg": "net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free" + "CVE-2023-28772": { + "cmt_msg": "seq_buf: Fix overflow in seq_buf_putmem_hex()" }, - "CVE-2023-4207": { - "cmt_msg": "net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free" + "CVE-2019-19770": { + "cmt_msg": "blktrace: fix debugfs use after free" }, - "CVE-2023-3640": { - "cmt_msg": "" + "CVE-2022-2588": { + "cmt_msg": "net_sched: cls_route: remove from list when handle is 0" }, - "CVE-2017-1000371": { - "cmt_msg": "binfmt_elf: use ELF_ET_DYN_BASE only for PIE" + "CVE-2022-3707": { + "cmt_msg": "drm/i915/gvt: fix double free bug in split_2MB_gtt_entry" }, - "CVE-2018-18281": { - "cmt_msg": "mremap: properly flush TLB before releasing the page" + "CVE-2022-2503": { + "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag" }, - "CVE-2023-20593": { - "cmt_msg": "x86/cpu/amd: Add a Zenbleed fix" + "CVE-2022-48619": { + "cmt_msg": "Input: add bounds checking to input_set_capability()" }, - "CVE-2019-18675": { - "cmt_msg": "mmap: introduce sane default mmap limits" + "CVE-2021-32399": { + "cmt_msg": "bluetooth: eliminate the potential race condition when removing the HCI controller" }, - "CVE-2023-3022": { - "cmt_msg": "ipv6: Use result arg in fib_lookup_arg consistently" + "CVE-2024-26699": { + "cmt_msg": "drm/amd/display: Fix array-index-out-of-bounds in dcn35_clkmgr" }, - "CVE-2022-2663": { - "cmt_msg": "netfilter: nf_conntrack_irc: Fix forged IP logic" + "CVE-2021-27364": { + "cmt_msg": "scsi: iscsi: Restrict sessions and handles to admin capabilities" }, - "CVE-2020-24503": { - "cmt_msg": "" + "CVE-2022-23038": { + "cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()" }, - "CVE-2023-51780": { - "cmt_msg": "atm: Fix Use-After-Free in do_vcc_ioctl" + "CVE-2022-23039": { + "cmt_msg": "xen/gntalloc: don't use gnttab_query_foreign_access()" }, - "CVE-2023-0047": { - "cmt_msg": "mm, oom: do not trigger out_of_memory from the #PF" + "CVE-2022-20154": { + "cmt_msg": "sctp: use call_rcu to free endpoint" }, - "CVE-2020-29370": { - "cmt_msg": "mm: slub: add missing TID bump in kmem_cache_alloc_bulk()" + "CVE-2024-26691": { + "cmt_msg": "KVM: arm64: Fix circular locking dependency" }, - "CVE-2019-15219": { - "cmt_msg": "USB: sisusbvga: fix oops in error path of sisusb_probe" + "CVE-2021-45868": { + "cmt_msg": "quota: check block number when reading the block in quota file" }, - "CVE-2022-20424": { - "cmt_msg": "io_uring: remove io_identity" + "CVE-2022-20158": { + "cmt_msg": "net/packet: fix slab-out-of-bounds access in packet_recvmsg()" }, - "CVE-2022-20422": { - "cmt_msg": "arm64: fix oops in concurrently setting insn_emulation sysctls" + "CVE-2022-23037": { + "cmt_msg": "xen/netfront: don't use gnttab_query_foreign_access() for mapped status" }, - "CVE-2017-5549": { - "cmt_msg": "USB: serial: kl5kusb105: fix line-state error handling" + "CVE-2024-0564": { + "cmt_msg": "" }, - "CVE-2017-5547": { - "cmt_msg": "HID: corsair: fix DMA buffers on stack" + "CVE-2024-0565": { + "cmt_msg": "smb: client: fix OOB in receive_encrypted_standard()" }, - "CVE-2017-5546": { - "cmt_msg": "mm/slab.c: fix SLAB freelist randomization duplicate entries" + "CVE-2024-26697": { + "cmt_msg": "nilfs2: fix data corruption in dsync block recovery for small block sizes" }, - "CVE-2023-4387": { - "cmt_msg": "net: vmxnet3: fix possible use-after-free bugs in vmxnet3_rq_alloc_rx_buf()" + "CVE-2024-26696": { + "cmt_msg": "nilfs2: fix hang in nilfs_lookup_dirty_data_buffers()" }, - "CVE-2024-24858": { - "cmt_msg": "" + "CVE-2024-26633": { + "cmt_msg": "ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim()" }, - "CVE-2019-19378": { - "cmt_msg": "" + "CVE-2023-2176": { + "cmt_msg": "RDMA/core: Refactor rdma_bind_addr" }, - "CVE-2020-4788": { - "cmt_msg": "powerpc/64s: flush L1D on kernel entry" + "CVE-2023-2177": { + "cmt_msg": "sctp: leave the err path free in sctp_stream_init to sctp_stream_free" }, - "CVE-2022-36879": { - "cmt_msg": "xfrm: xfrm_policy: fix a possible double xfrm_pols_put() in xfrm_bundle_lookup()" + "CVE-2022-0812": { + "cmt_msg": "xprtrdma: fix incorrect header size calculations" }, - "CVE-2017-8831": { - "cmt_msg": "[media] saa7164: fix double fetch PCIe access condition" + "CVE-2021-38160": { + "cmt_msg": "virtio_console: Assure used length from device is limited" }, - "CVE-2021-39698": { - "cmt_msg": "wait: add wake_up_pollfree()" + "CVE-2021-42008": { + "cmt_msg": "net: 6pack: fix slab-out-of-bounds in decode_data" }, - "CVE-2022-45934": { - "cmt_msg": "Bluetooth: L2CAP: Fix u8 overflow" + "CVE-2022-3107": { + "cmt_msg": "hv_netvsc: Add check for kvmalloc_array" }, - "CVE-2018-5333": { - "cmt_msg": "RDS: null pointer dereference in rds_atomic_free_op" + "CVE-2022-39189": { + "cmt_msg": "KVM: x86: do not report a vCPU as preempted outside instruction boundaries" }, - "CVE-2018-5332": { - "cmt_msg": "RDS: Heap OOB write in rds_message_alloc_sgs()" + "CVE-2022-39188": { + "cmt_msg": "mmu_gather: Force tlb-flush VM_PFNMAP vmas" }, - "CVE-2022-2380": { - "cmt_msg": "video: fbdev: sm712fb: Fix crash in smtcfb_read()" + "CVE-2020-25645": { + "cmt_msg": "geneve: add transport ports in route lookup for geneve" }, - "CVE-2023-20569": { - "cmt_msg": "x86/bugs: Increase the x86 bugs vector size to two u32s" + "CVE-2024-26788": { + "cmt_msg": "dmaengine: fsl-qdma: init irq after reg initialization" }, - "CVE-2017-7482": { - "cmt_msg": "rxrpc: Fix several cases where a padded len isn't checked in ticket decode" + "CVE-2020-25643": { + "cmt_msg": "hdlc_ppp: add range checks in ppp_cp_parse_cr()" }, - "CVE-2020-10767": { - "cmt_msg": "x86/speculation: Avoid force-disabling IBPB based on STIBP and enhanced IBRS." + "CVE-2020-25641": { + "cmt_msg": "block: allow for_each_bvec to support zero len bvec" }, - "CVE-2021-3759": { - "cmt_msg": "memcg: enable accounting of ipc resources" + "CVE-2005-3660": { + "cmt_msg": "" }, - "CVE-2019-19447": { - "cmt_msg": "ext4: work around deleting a file with i_nlink == 0 safely" + "CVE-2023-52619": { + "cmt_msg": "pstore/ram: Fix crash when setting number of cpus to an odd number" }, - "CVE-2017-17448": { - "cmt_msg": "netfilter: nfnetlink_cthelper: Add missing permission checks" + "CVE-2023-31085": { + "cmt_msg": "ubi: Refuse attaching if mtd's erasesize is 0" }, - "CVE-2017-17449": { - "cmt_msg": "netlink: Add netns check on taps" + "CVE-2023-31084": { + "cmt_msg": "media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*()" }, - "CVE-2017-9150": { - "cmt_msg": "bpf: don't let ldimm64 leak map addresses on unprivileged" + "CVE-2023-31083": { + "cmt_msg": "Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO" }, - "CVE-2019-19524": { - "cmt_msg": "Input: ff-memless - kill timer in destroy()" + "CVE-2023-31082": { + "cmt_msg": "" }, - "CVE-2019-19448": { - "cmt_msg": "btrfs: only search for left_info if there is no right_info in try_merge_free_space" + "CVE-2023-31081": { + "cmt_msg": "" }, - "CVE-2019-19449": { - "cmt_msg": "f2fs: fix to do sanity check on segment/section count" + "CVE-2021-33034": { + "cmt_msg": "Bluetooth: verify AMP hci_chan before amp_destroy" }, - "CVE-2023-31085": { - "cmt_msg": "ubi: Refuse attaching if mtd's erasesize is 0" + "CVE-2023-52519": { + "cmt_msg": "HID: intel-ish-hid: ipc: Disable and reenable ACPI GPE bit" }, - "CVE-2019-19523": { - "cmt_msg": "USB: adutux: fix use-after-free on disconnect" + "CVE-2021-33033": { + "cmt_msg": "cipso,calipso: resolve a number of problems with the DOI refcounts" }, - "CVE-2021-3752": { - "cmt_msg": "Bluetooth: fix use-after-free error in lock_sock_nested()" + "CVE-2022-29582": { + "cmt_msg": "io_uring: fix race between timeout flush and removal" }, - "CVE-2017-10663": { - "cmt_msg": "f2fs: sanity check checkpoint segno and blkoff" + "CVE-2024-0646": { + "cmt_msg": "net: tls, update curr on splice as well" }, - "CVE-2017-18360": { - "cmt_msg": "USB: serial: io_ti: fix div-by-zero in set_termios" + "CVE-2023-52598": { + "cmt_msg": "s390/ptrace: handle setting of fpc register correctly" }, - "CVE-2018-5848": { - "cmt_msg": "wil6210: missing length check in wmi_set_ie" + "CVE-2022-32296": { + "cmt_msg": "tcp: increase source port perturb table to 2^16" }, - "CVE-2017-18249": { - "cmt_msg": "f2fs: fix race condition in between free nid allocator/initializer" + "CVE-2024-26789": { + "cmt_msg": "crypto: arm64/neonbs - fix out-of-bounds access on short input" }, - "CVE-2017-7261": { - "cmt_msg": "drm/vmwgfx: NULL pointer dereference in vmw_surface_define_ioctl()" + "CVE-2020-28974": { + "cmt_msg": "vt: Disable KD_FONT_OP_COPY" }, - "CVE-2021-35477": { - "cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4" + "CVE-2023-3567": { + "cmt_msg": "vc_screen: move load of struct vc_data pointer in vcs_read() to avoid UAF" }, - "CVE-2017-18241": { - "cmt_msg": "f2fs: fix a panic caused by NULL flush_cmd_control" + "CVE-2022-3028": { + "cmt_msg": "af_key: Do not call xfrm_probe_algs in parallel" }, - "CVE-2022-3521": { - "cmt_msg": "kcm: avoid potential race in kcm_tx_work" + "CVE-2020-14304": { + "cmt_msg": "" }, - "CVE-2019-15216": { - "cmt_msg": "USB: yurex: Fix protection fault after device removal" + "CVE-2022-2318": { + "cmt_msg": "net: rose: fix UAF bugs caused by timer handler" }, - "CVE-2022-47929": { - "cmt_msg": "net: sched: disallow noqueue for qdisc classes" + "CVE-2023-52497": { + "cmt_msg": "erofs: fix lz4 inplace decompression" }, - "CVE-2019-16746": { - "cmt_msg": "nl80211: validate beacon head" + "CVE-2020-15393": { + "cmt_msg": "usb: usbtest: fix missing kfree(dev->buf) in usbtest_disconnect" }, - "CVE-2021-41864": { - "cmt_msg": "bpf: Fix integer overflow in prealloc_elems_and_freelist()" + "CVE-2022-33981": { + "cmt_msg": "floppy: disable FDRAWCMD by default" }, - "CVE-2019-15215": { - "cmt_msg": "media: cpia2_usb: first wake up, then free in disconnect" + "CVE-2024-26655": { + "cmt_msg": "Fix memory leak in posix_clock_open()" }, - "CVE-2022-2209": { - "cmt_msg": "" + "CVE-2021-3564": { + "cmt_msg": "Bluetooth: fix the erroneous flush_work() order" }, - "CVE-2018-18021": { - "cmt_msg": "arm64: KVM: Tighten guest core register access from userspace" + "CVE-2023-3611": { + "cmt_msg": "net/sched: sch_qfq: account for stab overhead in qfq_enqueue" }, - "CVE-2021-37576": { - "cmt_msg": "KVM: PPC: Book3S: Fix H_RTAS rets buffer overflow" + "CVE-2023-4132": { + "cmt_msg": "media: usb: siano: Fix warning due to null work_func_t function pointer" }, - "CVE-2019-8980": { - "cmt_msg": "exec: Fix mem leak in kernel_read_file" + "CVE-2023-4133": { + "cmt_msg": "cxgb4: fix use after free bugs caused by circular dependency problem" }, - "CVE-2023-7042": { + "CVE-2020-26560": { "cmt_msg": "" }, - "CVE-2021-20317": { - "cmt_msg": "lib/timerqueue: Rely on rbtree semantics for next timer" + "CVE-2023-4134": { + "cmt_msg": "Input: cyttsp4_core - change del_timer_sync() to timer_shutdown_sync()" }, - "CVE-2023-45871": { - "cmt_msg": "igb: set max size RX buffer when store bad packet is enabled" + "CVE-2023-39198": { + "cmt_msg": "drm/qxl: fix UAF on handle creation" }, - "CVE-2023-46343": { - "cmt_msg": "nfc: nci: fix possible NULL pointer dereference in send_acknowledge()" + "CVE-2022-0185": { + "cmt_msg": "vfs: fs_context: fix up param length parsing in legacy_parse_param" }, - "CVE-2022-3594": { - "cmt_msg": "r8152: Rate limit overflow messages" + "CVE-2023-42752": { + "cmt_msg": "igmp: limit igmpv3_newpack() packet size to IP_MAX_MTU" }, - "CVE-2018-14609": { - "cmt_msg": "btrfs: relocation: Only remove reloc rb_trees if reloc control has been initialized" + "CVE-2023-37454": { + "cmt_msg": "" }, - "CVE-2022-27672": { - "cmt_msg": "x86/speculation: Identify processors vulnerable to SMT RSB predictions" + "CVE-2022-20572": { + "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag" }, - "CVE-2021-33098": { - "cmt_msg": "ixgbe: fix large MTU request from VF" + "CVE-2024-24858": { + "cmt_msg": "" }, - "CVE-2022-3595": { - "cmt_msg": "cifs: fix double-fault crash during ntlmssp" + "CVE-2023-39194": { + "cmt_msg": "net: xfrm: Fix xfrm_address_filter OOB read" }, - "CVE-2022-38096": { - "cmt_msg": "" + "CVE-2023-2002": { + "cmt_msg": "bluetooth: Perform careful capability checks in hci_sock_ioctl()" }, - "CVE-2023-47233": { - "cmt_msg": "" + "CVE-2023-52489": { + "cmt_msg": "mm/sparsemem: fix race in accessing memory_section->usage" }, - "CVE-2020-10769": { - "cmt_msg": "crypto: authenc - fix parsing key with misaligned rta_len" + "CVE-2021-28964": { + "cmt_msg": "btrfs: fix race when cloning extent buffer during rewind of an old root" }, - "CVE-2023-6606": { - "cmt_msg": "smb: client: fix OOB in smbCalcSize()" + "CVE-2021-47063": { + "cmt_msg": "drm: bridge/panel: Cleanup connector on bridge detach" }, - "CVE-2018-5803": { - "cmt_msg": "sctp: verify size of a new chunk in _sctp_make_chunk()" + "CVE-2020-13974": { + "cmt_msg": "vt: keyboard: avoid signed integer overflow in k_ascii" }, - "CVE-2020-27815": { - "cmt_msg": "jfs: Fix array index bounds check in dbAdjTree" + "CVE-2021-4083": { + "cmt_msg": "fget: check that the fd still exists after getting a ref to it" }, - "CVE-2021-45486": { - "cmt_msg": "inet: use bigger hash table for IP ID generation" + "CVE-2023-33288": { + "cmt_msg": "power: supply: bq24190: Fix use after free bug in bq24190_remove due to race condition" }, - "CVE-2022-1462": { - "cmt_msg": "tty: use new tty_insert_flip_string_and_push_buffer() in pty_write()" + "CVE-2023-52484": { + "cmt_msg": "iommu/arm-smmu-v3: Fix soft lockup triggered by arm_smmu_mm_invalidate_range" }, - "CVE-2022-27223": { - "cmt_msg": "USB: gadget: validate endpoint index for xilinx udc" + "CVE-2022-29900": { + "cmt_msg": "x86/kvm/vmx: Make noinstr clean" }, - "CVE-2020-27067": { - "cmt_msg": "l2tp: fix l2tp_eth module loading" + "CVE-2022-29901": { + "cmt_msg": "x86/kvm/vmx: Make noinstr clean" }, - "CVE-2020-27777": { - "cmt_msg": "powerpc/rtas: Restrict RTAS requests from userspace" + "CVE-2023-3161": { + "cmt_msg": "fbcon: Check font dimension limits" }, - "CVE-2019-20636": { - "cmt_msg": "Input: add safety guards to input_set_keycode()" + "CVE-2020-10751": { + "cmt_msg": "selinux: properly handle multiple messages in selinux_netlink_send()" }, - "CVE-2019-11486": { - "cmt_msg": "tty: mark Siemens R3964 line discipline as BROKEN" + "CVE-2022-3567": { + "cmt_msg": "ipv6: Fix data races around sk->sk_prot." }, - "CVE-2019-11487": { - "cmt_msg": "fs: prevent page refcount overflow in pipe_buf_get" + "CVE-2023-39192": { + "cmt_msg": "netfilter: xt_u32: validate user space input" }, - "CVE-2018-8043": { - "cmt_msg": "net: phy: mdio-bcm-unimac: fix potential NULL dereference in unimac_mdio_probe()" + "CVE-2020-10757": { + "cmt_msg": "mm: Fix mremap not considering huge pmd devmap" }, - "CVE-2020-27675": { - "cmt_msg": "xen/events: avoid removing an event channel while handling it" + "CVE-2022-3566": { + "cmt_msg": "tcp: Fix data races around icsk->icsk_af_ops." }, - "CVE-2020-28915": { - "cmt_msg": "fbcon: Fix global-out-of-bounds read in fbcon_get_font()" + "CVE-2023-35828": { + "cmt_msg": "usb: gadget: udc: renesas_usb3: Fix use after free bug in renesas_usb3_remove due to race condition" }, - "CVE-2023-7192": { - "cmt_msg": "netfilter: ctnetlink: fix possible refcount leak in ctnetlink_create_conntrack()" + "CVE-2022-20166": { + "cmt_msg": "drivers core: Use sysfs_emit and sysfs_emit_at for show(device *...) functions" }, - "CVE-2019-20908": { - "cmt_msg": "efi: Restrict efivar_ssdt_load when the kernel is locked down" + "CVE-2020-15437": { + "cmt_msg": "serial: 8250: fix null-ptr-deref in serial8250_start_tx()" }, - "CVE-2023-3776": { - "cmt_msg": "net/sched: cls_fw: Fix improper refcount update leads to use-after-free" + "CVE-2020-15436": { + "cmt_msg": "block: Fix use-after-free in blkdev_get()" }, - "CVE-2021-28038": { - "cmt_msg": "Xen/gnttab: handle p2m update errors on a per-slot basis" + "CVE-2022-1116": { + "cmt_msg": "" }, - "CVE-2020-27068": { - "cmt_msg": "cfg80211: add missing policy for NL80211_ATTR_STATUS_CODE" + "CVE-2021-28660": { + "cmt_msg": "staging: rtl8188eu: prevent ->ssid overflow in rtw_wx_set_scan()" + }, + "CVE-2024-26645": { + "cmt_msg": "tracing: Ensure visibility when inserting an element into tracing_map" + }, + "CVE-2023-35823": { + "cmt_msg": "media: saa7134: fix use after free bug in saa7134_finidev due to race condition" + }, + "CVE-2022-3564": { + "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free caused by l2cap_reassemble_sdu" + }, + "CVE-2022-23816": { + "cmt_msg": "x86/kvm/vmx: Make noinstr clean" }, - "CVE-2022-23040": { - "cmt_msg": "xen/xenbus: don't let xenbus_grant_ring() remove grants in error case" + "CVE-2023-35824": { + "cmt_msg": "media: dm1105: Fix use after free bug in dm1105_remove due to race condition" }, - "CVE-2021-29154": { - "cmt_msg": "bpf, x86: Validate computation of branch displacements for x86-64" + "CVE-2023-35827": { + "cmt_msg": "ravb: Fix use-after-free issue in ravb_tx_timeout_work()" }, - "CVE-2023-52435": { - "cmt_msg": "net: prevent mss overflow in skb_segment()" + "CVE-2023-52481": { + "cmt_msg": "arm64: errata: Add Cortex-A520 speculative unprivileged load workaround" }, - "CVE-2023-52434": { - "cmt_msg": "smb: client: fix potential OOBs in smb2_parse_contexts()" + "CVE-2023-52585": { + "cmt_msg": "drm/amdgpu: Fix possible NULL dereference in amdgpu_ras_query_error_status_helper()" }, - "CVE-2021-45469": { - "cmt_msg": "f2fs: fix to do sanity check on last xattr entry in __f2fs_setxattr()" + "CVE-2021-20239": { + "cmt_msg": "net: pass a sockptr_t into ->setsockopt" }, - "CVE-2023-52436": { - "cmt_msg": "f2fs: explicitly null-terminate the xattr list" + "CVE-2023-52587": { + "cmt_msg": "IB/ipoib: Fix mcast list locking" }, - "CVE-2019-19060": { - "cmt_msg": "iio: imu: adis16400: release allocated memory on failure" + "CVE-2023-52586": { + "cmt_msg": "drm/msm/dpu: Add mutex lock in control vblank irq" }, - "CVE-2019-19061": { - "cmt_msg": "iio: imu: adis16400: fix memory leak" + "CVE-2021-47149": { + "cmt_msg": "net: fujitsu: fix potential null-ptr-deref" }, - "CVE-2019-19062": { - "cmt_msg": "crypto: user - fix memory leak in crypto_report" + "CVE-2021-47067": { + "cmt_msg": "soc/tegra: regulators: Fix locking up when voltage-spread is out of range" }, - "CVE-2019-19063": { - "cmt_msg": "rtlwifi: prevent memory leak in rtl_usb_probe" + "CVE-2022-3565": { + "cmt_msg": "mISDN: fix use-after-free bugs in l1oip timer handlers" }, - "CVE-2017-17741": { - "cmt_msg": "KVM: Fix stack-out-of-bounds read in write_mmio" + "CVE-2021-47065": { + "cmt_msg": "rtw88: Fix array overrun in rtw_get_tx_power_params()" }, - "CVE-2019-9445": { - "cmt_msg": "f2fs: check if file namelen exceeds max value" + "CVE-2020-36386": { + "cmt_msg": "Bluetooth: Fix slab-out-of-bounds read in hci_extended_inquiry_result_evt()" }, - "CVE-2019-19066": { - "cmt_msg": "scsi: bfa: release allocated memory in case of error" + "CVE-2021-47144": { + "cmt_msg": "drm/amd/amdgpu: fix refcount leak" }, - "CVE-2019-19067": { - "cmt_msg": "drm/amdgpu: fix multiple memory leaks in acp_hw_init" + "CVE-2021-47147": { + "cmt_msg": "ptp: ocp: Fix a resource leak in an error handling path" }, - "CVE-2019-19068": { - "cmt_msg": "rtl8xxxu: prevent leaking urb" + "CVE-2020-36385": { + "cmt_msg": "RDMA/ucma: Rework ucma_migrate_id() to avoid races with destroy" }, - "CVE-2017-7184": { - "cmt_msg": "xfrm_user: validate XFRM_MSG_NEWAE XFRMA_REPLAY_ESN_VAL replay_window" + "CVE-2021-47141": { + "cmt_msg": "gve: Add NULL pointer checks when freeing irqs." }, - "CVE-2017-7187": { - "cmt_msg": "scsi: sg: check length passed to SG_NEXT_CMD_LEN" + "CVE-2021-47140": { + "cmt_msg": "iommu/amd: Clear DMA ops when switching domain" }, - "CVE-2020-0435": { - "cmt_msg": "f2fs: fix to do sanity check with i_extra_isize" + "CVE-2021-47143": { + "cmt_msg": "net/smc: remove device from smcd_dev_list after failed device_add()" }, - "CVE-2020-0432": { - "cmt_msg": "staging: most: net: fix buffer overflow" + "CVE-2021-47142": { + "cmt_msg": "drm/amdgpu: Fix a use-after-free" }, - "CVE-2020-0433": { - "cmt_msg": "blk-mq: sync the update nr_hw_queues with blk_mq_queue_tag_busy_iter" + "CVE-2021-46943": { + "cmt_msg": "media: staging/intel-ipu3: Fix set_fmt error handling" }, - "CVE-2023-51779": { - "cmt_msg": "Bluetooth: af_bluetooth: Fix Use-After-Free in bt_sock_recvmsg" + "CVE-2021-47145": { + "cmt_msg": "btrfs: do not BUG_ON in link_to_fixup_dir" }, - "CVE-2019-3874": { - "cmt_msg": "sctp: implement memory accounting on tx path" + "CVE-2021-46941": { + "cmt_msg": "usb: dwc3: core: Do core softreset when switch mode" }, - "CVE-2018-10877": { - "cmt_msg": "ext4: verify the depth of extent tree in ext4_find_extent()" + "CVE-2021-46944": { + "cmt_msg": "media: staging/intel-ipu3: Fix memory leak in imu_fmt" }, - "CVE-2016-8650": { - "cmt_msg": "mpi: Fix NULL ptr dereference in mpi_powm() " + "CVE-2023-52340": { + "cmt_msg": "ipv6: remove max_size check inline with ipv4" }, - "CVE-2010-4563": { - "cmt_msg": "" + "CVE-2023-52589": { + "cmt_msg": "media: rkisp1: Fix IRQ disable race issue" }, - "CVE-2016-8655": { - "cmt_msg": "packet: fix race condition in packet_set_ring" + "CVE-2023-52588": { + "cmt_msg": "f2fs: fix to tag gcing flag on page during block migration" }, - "CVE-2020-14331": { - "cmt_msg": "vgacon: Fix for missing check in scrollback handling" + "CVE-2024-26765": { + "cmt_msg": "LoongArch: Disable IRQ before init_fn() for nonboot CPUs" }, - "CVE-2018-10879": { - "cmt_msg": "ext4: make sure bitmaps and the inode table don't overlap with bg descriptors" + "CVE-2023-52578": { + "cmt_msg": "net: bridge: use DEV_STATS_INC()" }, - "CVE-2018-10878": { - "cmt_msg": "ext4: always check block group bounds in ext4_init_block_bitmap()" + "CVE-2024-26684": { + "cmt_msg": "net: stmmac: xgmac: fix handling of DPP safety error for DMA channels" }, - "CVE-2024-23851": { - "cmt_msg": "dm: limit the number of targets and parameter size area" + "CVE-2021-47052": { + "cmt_msg": "crypto: sa2ul - Fix memory leak of rxd" }, - "CVE-2023-0266": { - "cmt_msg": "ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF" + "CVE-2023-52438": { + "cmt_msg": "binder: fix use-after-free in shinker's callback" }, - "CVE-2023-1838": { - "cmt_msg": "Fix double fget() in vhost_net_set_backend()" + "CVE-2021-47095": { + "cmt_msg": "ipmi: ssif: initialize ssif_info->client early" }, - "CVE-2021-3483": { - "cmt_msg": "firewire: nosy: Fix a use-after-free bug in nosy_ioctl()" + "CVE-2020-26088": { + "cmt_msg": "net/nfc/rawsock.c: add CAP_NET_RAW check." }, - "CVE-2019-15807": { - "cmt_msg": "scsi: libsas: delete sas port if expander discover failed" + "CVE-2023-6560": { + "cmt_msg": "io_uring: don't allow discontig pages for IORING_SETUP_NO_MMAP" }, - "CVE-2017-16913": { - "cmt_msg": "usbip: fix stub_rx: harden CMD_SUBMIT path to handle malicious input" + "CVE-2022-29581": { + "cmt_msg": "net/sched: cls_u32: fix netns refcount changes in u32_change()" }, - "CVE-2017-16912": { - "cmt_msg": "usbip: fix stub_rx: get_pipe() to validate endpoint number" + "CVE-2022-1204": { + "cmt_msg": "ax25: Fix refcount leaks caused by ax25_cb_del()" }, - "CVE-2017-16911": { - "cmt_msg": "usbip: prevent vhci_hcd driver from leaking a socket pointer address" + "CVE-2023-1611": { + "cmt_msg": "btrfs: fix race between quota disable and quota assign ioctls" }, - "CVE-2017-0861": { - "cmt_msg": "ALSA: pcm: prevent UAF in snd_pcm_info" + "CVE-2024-26763": { + "cmt_msg": "dm-crypt: don't modify the data when using authenticated encryption" }, - "CVE-2020-25656": { - "cmt_msg": "vt: keyboard, extend func_buf_lock to readers" + "CVE-2021-34693": { + "cmt_msg": "can: bcm: fix infoleak in struct bcm_msg_head" }, - "CVE-2017-16914": { - "cmt_msg": "usbip: fix stub_send_ret_submit() vulnerability to null transfer_buffer" + "CVE-2022-26490": { + "cmt_msg": "nfc: st21nfca: Fix potential buffer overflows in EVT_TRANSACTION" }, - "CVE-2023-1390": { - "cmt_msg": "tipc: fix NULL deref in tipc_link_xmit()" + "CVE-2024-26795": { + "cmt_msg": "riscv: Sparse-Memory/vmemmap out-of-bounds fix" }, - "CVE-2022-0492": { - "cmt_msg": "cgroup-v1: Require capabilities to set release_agent" + "CVE-2024-26797": { + "cmt_msg": "drm/amd/display: Prevent potential buffer overflow in map_hw_resources" }, - "CVE-2024-26598": { - "cmt_msg": "KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache" + "CVE-2024-26790": { + "cmt_msg": "dmaengine: fsl-qdma: fix SoC may hang on 16 byte unaligned read" }, - "CVE-2020-10942": { - "cmt_msg": "vhost: Check docket sk_family instead of call getname" + "CVE-2022-1836": { + "cmt_msg": "floppy: disable FDRAWCMD by default" }, - "CVE-2019-10142": { - "cmt_msg": "drivers/virt/fsl_hypervisor.c: prevent integer overflow in ioctl" + "CVE-2020-11884": { + "cmt_msg": "s390/mm: fix page table upgrade vs 2ndary address mode accesses" }, - "CVE-2021-4023": { - "cmt_msg": "io-wq: fix cancellation on create-worker failure" + "CVE-2024-26793": { + "cmt_msg": "gtp: fix use-after-free and null-ptr-deref in gtp_newlink()" }, - "CVE-2017-11176": { - "cmt_msg": "mqueue: fix a use-after-free in sys_mq_notify()" + "CVE-2023-52530": { + "cmt_msg": "wifi: mac80211: fix potential key use-after-free" }, - "CVE-2019-0145": { - "cmt_msg": "i40e: add num_vectors checker in iwarp handler" + "CVE-2021-32078": { + "cmt_msg": "ARM: footbridge: remove personal server platform" }, - "CVE-2017-12193": { - "cmt_msg": "assoc_array: Fix a buggy node-splitting case" + "CVE-2023-52532": { + "cmt_msg": "net: mana: Fix TX CQE error handling" }, - "CVE-2017-12192": { - "cmt_msg": "KEYS: prevent KEYCTL_READ on negative key" + "CVE-2022-30594": { + "cmt_msg": "ptrace: Check PTRACE_O_SUSPEND_SECCOMP permission on PTRACE_SEIZE" }, - "CVE-2021-22555": { - "cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write" + "CVE-2024-26798": { + "cmt_msg": "fbcon: always restore the old font data in fbcon_do_set_font()" }, - "CVE-2017-12190": { - "cmt_msg": "fix unbalanced page refcounting in bio_map_user_iov" + "CVE-2022-4662": { + "cmt_msg": "USB: core: Prevent nested device-reset calls" }, - "CVE-2022-1011": { - "cmt_msg": "fuse: fix pipe buffer lifetime for direct_io" + "CVE-2021-38204": { + "cmt_msg": "usb: max-3421: Prevent corruption of freed memory" }, - "CVE-2021-0399": { - "cmt_msg": "" + "CVE-2021-38205": { + "cmt_msg": "net: xilinx_emaclite: Do not print real IOMEM pointer" }, - "CVE-2020-36691": { - "cmt_msg": "netlink: limit recursion depth in policy validation" + "CVE-2020-27835": { + "cmt_msg": "IB/hfi1: Ensure correct mm is used at all times" }, - "CVE-2023-3111": { - "cmt_msg": "btrfs: unset reloc control if transaction commit fails in prepare_to_relocate()" + "CVE-2020-27830": { + "cmt_msg": "speakup: Reject setting the speakup line discipline outside of speakup" }, - "CVE-2020-2732": { - "cmt_msg": "KVM: nVMX: Don't emulate instructions in guest mode" + "CVE-2020-0255": { + "cmt_msg": "selinux: properly handle multiple messages in selinux_netlink_send()" }, - "CVE-2012-4542": { - "cmt_msg": "" + "CVE-2023-35001": { + "cmt_msg": "netfilter: nf_tables: prevent OOB access in nft_byteorder_eval" }, - "CVE-2022-1729": { - "cmt_msg": "perf: Fix sys_perf_event_open() race against self" + "CVE-2022-27666": { + "cmt_msg": "esp: Fix possible buffer overflow in ESP transformation" }, - "CVE-2023-42752": { - "cmt_msg": "igmp: limit igmpv3_newpack() packet size to IP_MAX_MTU" + "CVE-2021-38208": { + "cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect" }, - "CVE-2023-4128": { - "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free" + "CVE-2024-26677": { + "cmt_msg": "rxrpc: Fix delayed ACKs to not set the reference serial number" }, - "CVE-2021-28712": { - "cmt_msg": "xen/netfront: harden netfront against event channel storms" + "CVE-2020-25211": { + "cmt_msg": "netfilter: ctnetlink: add a range check for l3/l4 protonum" }, - "CVE-2018-1000028": { - "cmt_msg": "nfsd: auth: Fix gid sorting when rootsquash enabled" + "CVE-2020-25212": { + "cmt_msg": "nfs: Fix getxattr kernel panic and memory overflow" }, - "CVE-2023-1118": { - "cmt_msg": "media: rc: Fix use-after-free bugs caused by ene_tx_irqsim()" + "CVE-2020-28374": { + "cmt_msg": "scsi: target: Fix XCOPY NAA identifier lookup" }, - "CVE-2018-7191": { - "cmt_msg": "tun: call dev_get_valid_name() before register_netdevice()" + "CVE-2020-26557": { + "cmt_msg": "" }, - "CVE-2024-0607": { - "cmt_msg": "netfilter: nf_tables: fix pointer math issue in nft_byteorder_eval()" + "CVE-2024-26671": { + "cmt_msg": "blk-mq: fix IO hang from sbitmap wakeup race" }, - "CVE-2022-44033": { - "cmt_msg": "char: pcmcia: remove all the drivers" + "CVE-2020-26555": { + "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical" }, - "CVE-2018-1000026": { - "cmt_msg": "bnx2x: disable GSO where gso_size is too big for hardware" + "CVE-2024-26776": { + "cmt_msg": "spi: hisi-sfc-v3xx: Return IRQ_NONE if no interrupts were detected" }, - "CVE-2022-1975": { - "cmt_msg": "NFC: netlink: fix sleep in atomic bug when firmware download timeout" + "CVE-2024-26777": { + "cmt_msg": "fbdev: sis: Error out if pixclock equals zero" }, - "CVE-2023-1380": { - "cmt_msg": "wifi: brcmfmac: slab-out-of-bounds read in brcmf_get_assoc_ies()" + "CVE-2019-20794": { + "cmt_msg": "" }, - "CVE-2017-2596": { - "cmt_msg": "kvm: fix page struct leak in handle_vmon" + "CVE-2020-26559": { + "cmt_msg": "" }, - "CVE-2017-0786": { - "cmt_msg": "brcmfmac: add length check in brcmf_cfg80211_escan_handler()" + "CVE-2023-3397": { + "cmt_msg": "" }, - "CVE-2021-28972": { - "cmt_msg": "PCI: rpadlpar: Fix potential drc_name corruption in store functions" + "CVE-2021-47082": { + "cmt_msg": "tun: avoid double free in tun_free_netdev" }, - "CVE-2018-12130": { - "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" + "CVE-2024-26679": { + "cmt_msg": "inet: read sk->sk_family once in inet_recv_error()" }, - "CVE-2020-14305": { - "cmt_msg": "netfilter: helpers: remove data_len usage for inkernel helpers" + "CVE-2024-26771": { + "cmt_msg": "dmaengine: ti: edma: Add some null pointer checks to the edma_probe" }, - "CVE-2021-20292": { - "cmt_msg": "drm/ttm/nouveau: don't call tt destroy callback on alloc failure." + "CVE-2023-52584": { + "cmt_msg": "spmi: mediatek: Fix UAF on device remove" }, - "CVE-2021-31916": { - "cmt_msg": "dm ioctl: fix out of bounds array access when no devices" + "CVE-2021-47128": { + "cmt_msg": "bpf, lockdown, audit: Fix buggy SELinux lockdown permission checks" }, - "CVE-2018-17182": { - "cmt_msg": "mm: get rid of vmacache_flush_all() entirely" + "CVE-2022-26365": { + "cmt_msg": "xen/blkfront: fix leaking data in shared pages" }, - "CVE-2017-8064": { - "cmt_msg": "[media] dvb-usb-v2: avoid use-after-free" + "CVE-2023-52458": { + "cmt_msg": "block: add check that partition length needs to be aligned with block size" }, - "CVE-2018-13405": { - "cmt_msg": "Fix up non-directory creation in SGID directories" + "CVE-2018-1121": { + "cmt_msg": "" }, - "CVE-2020-25645": { - "cmt_msg": "geneve: add transport ports in route lookup for geneve" + "CVE-2023-52454": { + "cmt_msg": "nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length" }, - "CVE-2018-13406": { - "cmt_msg": "video: uvesafb: Fix integer overflow in allocation" + "CVE-2023-28746": { + "cmt_msg": "x86/mmio: Disable KVM mitigation when X86_FEATURE_CLEAR_CPU_BUF is set" }, - "CVE-2022-1280": { - "cmt_msg": "drm: avoid circular locks in drm_mode_getconnector" + "CVE-2021-47118": { + "cmt_msg": "pid: take a reference when initializing `cad_pid`" }, - "CVE-2023-3772": { - "cmt_msg": "xfrm: add NULL check in xfrm_update_ae_params" + "CVE-2023-52451": { + "cmt_msg": "powerpc/pseries/memhp: Fix access beyond end of drmem array" }, - "CVE-2020-11668": { - "cmt_msg": "media: xirlink_cit: add missing descriptor sanity checks" + "CVE-2021-47119": { + "cmt_msg": "ext4: fix memory leak in ext4_fill_super" }, - "CVE-2020-11669": { - "cmt_msg": "powerpc/powernv/idle: Restore AMR/UAMOR/AMOR after idle" + "CVE-2024-26602": { + "cmt_msg": "sched/membarrier: reduce the ability to hammer on sys_membarrier" }, - "CVE-2019-15118": { - "cmt_msg": "ALSA: usb-audio: Fix a stack buffer overflow bug in check_input_term" + "CVE-2024-1086": { + "cmt_msg": "netfilter: nf_tables: reject QUEUE/DROP verdict parameters" }, - "CVE-2019-12818": { - "cmt_msg": "net: nfc: Fix NULL dereference on nfc_llcp_build_tlv fails" + "CVE-2024-22386": { + "cmt_msg": "" }, - "CVE-2019-12819": { - "cmt_msg": "mdio_bus: Fix use-after-free on device_register fails" + "CVE-2019-15794": { + "cmt_msg": "ovl: fix reference counting in ovl_mmap error path" }, - "CVE-2023-0394": { - "cmt_msg": "ipv6: raw: Deduct extension header length in rawv6_push_pending_frames" + "CVE-2022-3344": { + "cmt_msg": "KVM: x86: nSVM: harden svm_free_nested against freeing vmcb02 while still in use" }, - "CVE-2020-10690": { - "cmt_msg": "ptp: fix the race between the release of ptp_clock and cdev" + "CVE-2023-23004": { + "cmt_msg": "malidp: Fix NULL vs IS_ERR() checking" }, - "CVE-2022-36402": { - "cmt_msg": "drm/vmwgfx: Fix shader stage validation" + "CVE-2023-23006": { + "cmt_msg": "net/mlx5: DR, Fix NULL vs IS_ERR checking in dr_domain_init_resources" }, - "CVE-2019-19332": { - "cmt_msg": "KVM: x86: fix out-of-bounds write in KVM_GET_EMULATED_CPUID (CVE-2019-19332)" + "CVE-2022-0644": { + "cmt_msg": "vfs: check fd has read access in kernel_read_file_from_fd()" }, - "CVE-2019-15117": { - "cmt_msg": "ALSA: usb-audio: Fix an OOB bug in parse_audio_mixer_unit" + "CVE-2020-27784": { + "cmt_msg": "usb: gadget: function: printer: fix use-after-free in __lock_acquire" }, - "CVE-2021-3659": { - "cmt_msg": "net: mac802154: Fix general protection fault" + "CVE-2023-1670": { + "cmt_msg": "xirc2ps_cs: Fix use after free bug in xirc2ps_detach" }, - "CVE-2022-25258": { - "cmt_msg": "USB: gadget: validate interface OS descriptor requests" + "CVE-2020-27786": { + "cmt_msg": "ALSA: rawmidi: Fix racy buffer resize under concurrent accesses" }, - "CVE-2021-4155": { - "cmt_msg": "xfs: map unwritten blocks in XFS_IOC_{ALLOC,FREE}SP just like fallocate" + "CVE-2024-26702": { + "cmt_msg": "iio: magnetometer: rm3100: add boundary check for the value read from RM3100_REG_TMRC" }, - "CVE-2019-14901": { - "cmt_msg": "mwifiex: Fix heap overflow in mmwifiex_process_tdls_action_frame()" + "CVE-2023-6240": { + "cmt_msg": "" }, - "CVE-2021-4150": { - "cmt_msg": "block: fix incorrect references to disk objects" + "CVE-2022-21123": { + "cmt_msg": "x86/speculation/mmio: Add mitigation for Processor MMIO Stale Data" }, - "CVE-2020-3702": { - "cmt_msg": "ath: Use safer key clearing with key cache entries" + "CVE-2024-26706": { + "cmt_msg": "parisc: Fix random data corruption from exception handler" }, - "CVE-2020-16166": { - "cmt_msg": "random32: update the net random state on interrupt and activity" + "CVE-2023-23559": { + "cmt_msg": "wifi: rndis_wlan: Prevent buffer overflow in rndis_query_oid" }, - "CVE-2021-3653": { - "cmt_msg": "KVM: nSVM: avoid picking up unsupported bits from L2 in int_ctl (CVE-2021-3653)" + "CVE-2022-39842": { + "cmt_msg": "video: fbdev: pxa3xx-gcu: Fix integer overflow in pxa3xx_gcu_write" }, - "CVE-2021-3655": { - "cmt_msg": "sctp: validate from_addr_param return" + "CVE-2022-0382": { + "cmt_msg": "net ticp:fix a kernel-infoleak in __tipc_sendmsg()" }, - "CVE-2020-8694": { - "cmt_msg": "powercap: restrict energy meter to root access" + "CVE-2021-28688": { + "cmt_msg": "xen-blkback: don't leak persistent grants from xen_blkbk_map()" }, - "CVE-2021-4159": { - "cmt_msg": "bpf: Verifer, adjust_scalar_min_max_vals to always call update_reg_bounds()" + "CVE-2023-32233": { + "cmt_msg": "netfilter: nf_tables: deactivate anonymous set from preparation phase" }, - "CVE-2019-12614": { - "cmt_msg": "powerpc/pseries/dlpar: Fix a missing check in dlpar_parse_cc_property()" + "CVE-2020-25672": { + "cmt_msg": "nfc: fix memory leak in llcp_sock_connect()" }, - "CVE-2019-12615": { - "cmt_msg": "mdesc: fix a missing-check bug in get_vdev_port_node_info()" + "CVE-2020-25673": { + "cmt_msg": "nfc: Avoid endless loops caused by repeated llcp_sock_connect()" }, - "CVE-2021-3715": { - "cmt_msg": "net_sched: cls_route: remove the right filter from hashtable" + "CVE-2020-25670": { + "cmt_msg": "nfc: fix refcount leak in llcp_sock_bind()" }, - "CVE-2021-3714": { - "cmt_msg": "" + "CVE-2020-25671": { + "cmt_msg": "nfc: fix refcount leak in llcp_sock_connect()" }, - "CVE-2019-16230": { - "cmt_msg": "drm/amdkfd: fix a potential NULL pointer dereference (v2)" + "CVE-2022-20369": { + "cmt_msg": "media: v4l2-mem2mem: Apply DST_QUEUE_OFF_BASE on MMAP buffers across ioctls" }, - "CVE-2019-16231": { - "cmt_msg": "fjes: Handle workqueue allocation failure" + "CVE-2022-20368": { + "cmt_msg": "net/packet: fix slab-out-of-bounds access in packet_recvmsg()" }, - "CVE-2017-12168": { - "cmt_msg": "arm64: KVM: pmu: Fix AArch32 cycle counter access" + "CVE-2020-25285": { + "cmt_msg": "mm/hugetlb: fix a race between hugetlb sysctl handlers" }, - "CVE-2019-16233": { - "cmt_msg": "scsi: qla2xxx: fix a potential NULL pointer dereference" + "CVE-2020-25284": { + "cmt_msg": "rbd: require global CAP_SYS_ADMIN for mapping and unmapping" }, - "CVE-2019-16234": { - "cmt_msg": "iwlwifi: pcie: fix rb_allocator workqueue allocation" + "CVE-2020-29373": { + "cmt_msg": "io_uring: grab ->fs as part of async preparation" }, - "CVE-2019-6133": { - "cmt_msg": "fork: record start_time late" + "CVE-2019-19814": { + "cmt_msg": "" }, - "CVE-2018-10902": { - "cmt_msg": "ALSA: rawmidi: Change resized buffers atomically" + "CVE-2020-29371": { + "cmt_msg": "romfs: fix uninitialized memory leak in romfs_dev_read()" }, - "CVE-2021-39633": { - "cmt_msg": "ip_gre: add validation for csum_start" + "CVE-2023-1118": { + "cmt_msg": "media: rc: Fix use-after-free bugs caused by ene_tx_irqsim()" }, - "CVE-2017-18203": { - "cmt_msg": "dm: fix race between dm_get_from_kobject() and __dm_destroy()" + "CVE-2022-1016": { + "cmt_msg": "netfilter: nf_tables: initialize registers in nft_do_chain()" }, - "CVE-2017-18202": { - "cmt_msg": "mm, oom_reaper: gather each vma to prevent leaking TLB entry" + "CVE-2022-1011": { + "cmt_msg": "fuse: fix pipe buffer lifetime for direct_io" }, - "CVE-2021-39636": { - "cmt_msg": "netfilter: x_tables: fix pointer leaks to userspace" + "CVE-2022-1012": { + "cmt_msg": "secure_seq: use the 64 bits of the siphash for port offset calculation" }, - "CVE-2017-18204": { - "cmt_msg": "ocfs2: should wait dio before inode lock in ocfs2_setattr()" + "CVE-2023-52620": { + "cmt_msg": "netfilter: nf_tables: disallow timeout for anonymous sets" }, - "CVE-2020-25643": { - "cmt_msg": "hdlc_ppp: add range checks in ppp_cp_parse_cr()" + "CVE-2022-38096": { + "cmt_msg": "" }, - "CVE-2019-3882": { - "cmt_msg": "vfio/type1: Limit DMA mappings per container" + "CVE-2023-52622": { + "cmt_msg": "ext4: avoid online resizing failures due to oversized flex bg" }, - "CVE-2017-18208": { - "cmt_msg": "mm/madvise.c: fix madvise() infinite loop under special circumstances" + "CVE-2023-52623": { + "cmt_msg": "SUNRPC: Fix a suspicious RCU usage warning" }, - "CVE-2022-33741": { - "cmt_msg": "xen/netfront: force data bouncing when backend is untrusted" + "CVE-2023-52624": { + "cmt_msg": "drm/amd/display: Wake DMCUB before executing GPINT commands" }, - "CVE-2018-20509": { - "cmt_msg": "binder: refactor binder ref inc/dec for thread safety" + "CVE-2023-52625": { + "cmt_msg": "drm/amd/display: Refactor DMCUB enter/exit idle interface" }, - "CVE-2024-24864": { - "cmt_msg": "" + "CVE-2023-52628": { + "cmt_msg": "netfilter: nftables: exthdr: fix 4-byte stack OOB write" }, - "CVE-2022-45885": { + "CVE-2021-26934": { "cmt_msg": "" }, - "CVE-2022-33744": { - "cmt_msg": "xen/arm: Fix race in RB-tree based P2M accounting" - }, - "CVE-2017-9605": { - "cmt_msg": "drm/vmwgfx: Make sure backup_handle is always valid" + "CVE-2022-3115": { + "cmt_msg": "drm: mali-dp: potential dereference of null pointer" }, - "CVE-2017-18193": { - "cmt_msg": "f2fs: fix a bug caused by NULL extent tree" + "CVE-2021-26931": { + "cmt_msg": "xen-blkback: don't \"handle\" error by BUG()" }, - "CVE-2022-40768": { - "cmt_msg": "scsi: stex: Properly zero out the passthrough command structure" + "CVE-2021-26930": { + "cmt_msg": "xen-blkback: fix error handling in xen_blkbk_map()" }, - "CVE-2019-9454": { - "cmt_msg": "i2c: core-smbus: prevent stack corruption on read I2C_BLOCK_DATA" + "CVE-2021-26932": { + "cmt_msg": "Xen/x86: don't bail early from clear_foreign_p2m_mapping()" }, - "CVE-2020-12888": { - "cmt_msg": "vfio-pci: Invalidate mmaps and block MMIO access on disabled memory" + "CVE-2023-3141": { + "cmt_msg": "memstick: r592: Fix UAF bug in r592_remove due to race condition" }, - "CVE-2017-6214": { - "cmt_msg": "tcp: avoid infinite loop in tcp_splice_read()" + "CVE-2022-0492": { + "cmt_msg": "cgroup-v1: Require capabilities to set release_agent" }, - "CVE-2023-52445": { - "cmt_msg": "media: pvrusb2: fix use after free on context disconnection" + "CVE-2020-12352": { + "cmt_msg": "Bluetooth: A2MP: Fix not initializing all members" }, - "CVE-2017-6353": { - "cmt_msg": "sctp: deny peeloff operation on asocs with threads sleeping on it" + "CVE-2020-12351": { + "cmt_msg": "Bluetooth: L2CAP: Fix calling sk_filter on non-socket based channel" }, - "CVE-2021-0447": { - "cmt_msg": "l2tp: protect sock pointer of struct pppol2tp_session with RCU" + "CVE-2022-23042": { + "cmt_msg": "xen/netfront: react properly to failing gnttab_end_foreign_access_ref()" }, - "CVE-2022-41218": { - "cmt_msg": "media: dvb-core: Fix UAF due to refcount races at releasing" + "CVE-2022-25636": { + "cmt_msg": "netfilter: nf_tables_offload: incorrect flow offload action array size" }, - "CVE-2019-20934": { - "cmt_msg": "sched/fair: Don't free p->numa_faults with concurrent readers" + "CVE-2022-0494": { + "cmt_msg": "block-map: add __GFP_ZERO flag for alloc_page in function bio_copy_kern" }, - "CVE-2022-1247": { - "cmt_msg": "" + "CVE-2020-16120": { + "cmt_msg": "ovl: switch to mounter creds in readdir" }, - "CVE-2022-36946": { - "cmt_msg": "netfilter: nf_queue: do not allow packet truncation below transport header offset" + "CVE-2022-3524": { + "cmt_msg": "tcp/udp: Fix memory leak in ipv6_renew_options()." }, - "CVE-2021-45485": { - "cmt_msg": "ipv6: use prandom_u32() for ID generation" + "CVE-2022-3523": { + "cmt_msg": "mm/memory.c: fix race when faulting a device private page" }, - "CVE-2021-0448": { - "cmt_msg": "netfilter: ctnetlink: add a range check for l3/l4 protonum" + "CVE-2022-3522": { + "cmt_msg": "mm/hugetlb: use hugetlb_pte_stable in migration race check" }, - "CVE-2018-19824": { - "cmt_msg": "ALSA: usb-audio: Fix UAF decrement if card has no live interfaces in card.c" + "CVE-2008-2544": { + "cmt_msg": "" }, - "CVE-2022-21166": { - "cmt_msg": "x86/speculation/mmio: Enable CPU Fill buffer clearing on idle" + "CVE-2021-3178": { + "cmt_msg": "nfsd4: readdirplus shouldn't return parent of export" }, - "CVE-2020-29374": { - "cmt_msg": "gup: document and work around \"COW can break either way\" issue" + "CVE-2021-47101": { + "cmt_msg": "asix: fix uninit-value in asix_mdio_read()" }, - "CVE-2016-9191": { - "cmt_msg": "sysctl: Drop reference added by grab_header in proc_sys_readdir" + "CVE-2021-47100": { + "cmt_msg": "ipmi: Fix UAF when uninstall ipmi_si and ipmi_msghandler module" }, - "CVE-2015-8709": { - "cmt_msg": "mm: Add a user_ns owner to mm_struct and fix ptrace permission checks" + "CVE-2021-46984": { + "cmt_msg": "kyber: fix out of bounds access when preempted" }, - "CVE-2018-16862": { - "cmt_msg": "mm: cleancache: fix corruption on missed inode invalidation" + "CVE-2021-46982": { + "cmt_msg": "f2fs: compress: fix race condition of overwrite vs truncate" }, - "CVE-2023-52449": { - "cmt_msg": "mtd: Fix gluebi NULL pointer dereference caused by ftl notifier" + "CVE-2021-46981": { + "cmt_msg": "nbd: Fix NULL pointer in flush_workqueue" }, - "CVE-2021-29650": { - "cmt_msg": "netfilter: x_tables: Use correct memory barriers." + "CVE-2021-47109": { + "cmt_msg": "neighbour: allow NUD_NOARP entries to be forced GCed" }, - "CVE-2019-18806": { - "cmt_msg": "net: qlogic: Fix memory leak in ql_alloc_large_buffers" + "CVE-2022-0330": { + "cmt_msg": "drm/i915: Flush TLBs before releasing backing store" }, - "CVE-2023-4010": { + "CVE-2007-3719": { "cmt_msg": "" }, - "CVE-2018-20169": { - "cmt_msg": "USB: check usb_get_extra_descriptor for proper size" - }, - "CVE-2017-12762": { - "cmt_msg": "isdn/i4l: fix buffer overflow" + "CVE-2021-46988": { + "cmt_msg": "userfaultfd: release page in error path to avoid BUG_ON" }, - "CVE-2018-7754": { - "cmt_msg": "printk: hash addresses printed with %p" + "CVE-2021-46989": { + "cmt_msg": "hfsplus: prevent corruption in shrinking truncate" }, - "CVE-2021-33656": { - "cmt_msg": "vt: drop old FONT ioctls" + "CVE-2024-26606": { + "cmt_msg": "binder: signal epoll threads of self-work" }, - "CVE-2020-36558": { - "cmt_msg": "vt: vt_ioctl: fix race in VT_RESIZEX" + "CVE-2023-0590": { + "cmt_msg": "net: sched: fix race condition in qdisc_graft()" }, - "CVE-2022-41849": { - "cmt_msg": "fbdev: smscufx: Fix use-after-free in ufx_ops_open()" + "CVE-2023-52583": { + "cmt_msg": "ceph: fix deadlock or deadcode of misusing dget()" }, - "CVE-2022-41848": { - "cmt_msg": "" + "CVE-2022-4095": { + "cmt_msg": "staging: rtl8712: fix use after free bugs" }, - "CVE-2023-6356": { - "cmt_msg": "" + "CVE-2022-45919": { + "cmt_msg": "media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221" }, - "CVE-2022-1353": { - "cmt_msg": "af_key: add __GFP_ZERO flag for compose_sadb_supported in function pfkey_register" + "CVE-2020-36312": { + "cmt_msg": "KVM: fix memory leak in kvm_io_bus_unregister_dev()" }, - "CVE-2022-28356": { - "cmt_msg": "llc: fix netdevice reference leaks in llc_ui_bind()" + "CVE-2019-19462": { + "cmt_msg": "kernel/relay.c: handle alloc_percpu returning NULL in relay_open" }, - "CVE-2022-1198": { - "cmt_msg": "drivers: hamradio: 6pack: fix UAF bug caused by mod_timer()" + "CVE-2023-30772": { + "cmt_msg": "power: supply: da9150: Fix use after free bug in da9150_charger_remove due to race condition" }, - "CVE-2022-1199": { - "cmt_msg": "ax25: Fix NULL pointer dereference in ax25_kill_by_device" + "CVE-2022-24958": { + "cmt_msg": "usb: gadget: don't release an existing dev->buf" }, - "CVE-2018-5750": { - "cmt_msg": "ACPI: sbshc: remove raw pointer from printk() message" + "CVE-2022-28893": { + "cmt_msg": "SUNRPC: Ensure we flush any closed sockets before xs_xprt_free()" }, - "CVE-2021-39801": { - "cmt_msg": "" + "CVE-2021-3772": { + "cmt_msg": "sctp: use init_tag from inithdr for ABORT chunk" }, - "CVE-2021-39800": { - "cmt_msg": "" + "CVE-2021-3679": { + "cmt_msg": "tracing: Fix bug in rb_per_cpu_empty() that might cause deadloop." }, - "CVE-2017-7558": { - "cmt_msg": "sctp: Avoid out-of-bounds reads from address storage" + "CVE-2024-26656": { + "cmt_msg": "drm/amdgpu: fix use-after-free bug" }, - "CVE-2018-16884": { - "cmt_msg": "sunrpc: use-after-free in svc_process_common()" + "CVE-2024-26607": { + "cmt_msg": "drm/bridge: sii902x: Fix probing race issue" }, - "CVE-2022-1195": { - "cmt_msg": "hamradio: improve the incomplete fix to avoid NPD" + "CVE-2023-52517": { + "cmt_msg": "spi: sun6i: fix race between DMA RX transfer completion and RX FIFO drain" }, - "CVE-2024-22099": { - "cmt_msg": "" + "CVE-2022-2586": { + "cmt_msg": "netfilter: nf_tables: do not allow SET_ID to refer to another table" }, - "CVE-2021-4202": { - "cmt_msg": "NFC: reorganize the functions in nci_request" + "CVE-2022-3629": { + "cmt_msg": "vsock: Fix memory leak in vsock_connect()" }, - "CVE-2021-4203": { - "cmt_msg": "af_unix: fix races in sk_peer_pid and sk_peer_cred accesses" + "CVE-2021-28715": { + "cmt_msg": "xen/netback: don't queue unlimited number of packages" }, - "CVE-2022-45887": { - "cmt_msg": "media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb()" + "CVE-2021-28714": { + "cmt_msg": "xen/netback: fix rx queue stall detection" }, - "CVE-2022-0330": { - "cmt_msg": "drm/i915: Flush TLBs before releasing backing store" + "CVE-2021-28713": { + "cmt_msg": "xen/console: harden hvc_xen against event channel storms" }, - "CVE-2022-41858": { - "cmt_msg": "drivers: net: slip: fix NPD bug in sl_tx_timeout()" + "CVE-2021-28712": { + "cmt_msg": "xen/netfront: harden netfront against event channel storms" }, - "CVE-2024-24859": { - "cmt_msg": "" + "CVE-2021-28711": { + "cmt_msg": "xen/blkfront: harden blkfront against event channel storms" }, - "CVE-2019-10220": { - "cmt_msg": "Convert filldir[64]() from __put_user() to unsafe_put_user()" + "CVE-2021-3659": { + "cmt_msg": "net: mac802154: Fix general protection fault" }, - "CVE-2023-2124": { - "cmt_msg": "xfs: verify buffer contents when we skip log replay" + "CVE-2022-2991": { + "cmt_msg": "remove the lightnvm subsystem" }, - "CVE-2020-26557": { - "cmt_msg": "" + "CVE-2022-3621": { + "cmt_msg": "nilfs2: fix NULL pointer dereference at nilfs_bmap_lookup_at_level()" }, - "CVE-2021-3609": { - "cmt_msg": "can: bcm: delay release of struct bcm_op after synchronize_rcu()" + "CVE-2022-23960": { + "cmt_msg": "ARM: report Spectre v2 status through sysfs" }, - "CVE-2021-44879": { - "cmt_msg": "f2fs: fix to do sanity check on inode type during garbage collection" + "CVE-2022-3623": { + "cmt_msg": "mm/hugetlb: fix races when looking up a CONT-PTE/PMD size hugetlb page" }, - "CVE-2019-15505": { - "cmt_msg": "media: technisat-usb2: break out of loop at end of buffer" + "CVE-2022-3624": { + "cmt_msg": "bonding: fix reference count leak in balance-alb mode" }, - "CVE-2023-2513": { - "cmt_msg": "ext4: fix use-after-free in ext4_xattr_set_entry" + "CVE-2022-25258": { + "cmt_msg": "USB: gadget: validate interface OS descriptor requests" }, - "CVE-2017-1000": { - "cmt_msg": "udp: consistently apply ufo or fragmentation" + "CVE-2021-39656": { + "cmt_msg": "configfs: fix a use-after-free in __configfs_open_file" }, - "CVE-2020-11609": { - "cmt_msg": "media: stv06xx: add missing descriptor sanity checks" + "CVE-2021-39657": { + "cmt_msg": "scsi: ufs: Correct the LUN used in eh_device_reset_handler() callback" }, - "CVE-2020-36385": { - "cmt_msg": "RDMA/ucma: Rework ucma_migrate_id() to avoid races with destroy" + "CVE-2022-47946": { + "cmt_msg": "io_uring: kill sqo_dead and sqo submission halting" }, - "CVE-2020-0429": { - "cmt_msg": "l2tp: fix race between l2tp_session_delete() and l2tp_tunnel_closeall()" + "CVE-2022-4744": { + "cmt_msg": "tun: avoid double free in tun_free_netdev" }, - "CVE-2020-27066": { - "cmt_msg": "xfrm: policy: Fix doulbe free in xfrm_policy_timer" + "CVE-2023-1095": { + "cmt_msg": "netfilter: nf_tables: fix null deref due to zeroed list head" }, - "CVE-2022-2964": { - "cmt_msg": "net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup" + "CVE-2023-52574": { + "cmt_msg": "team: fix null-ptr-deref when team device type is changed" }, - "CVE-2017-0605": { - "cmt_msg": "tracing: Use strlcpy() instead of strcpy() in __trace_find_cmdline()" + "CVE-2021-47034": { + "cmt_msg": "powerpc/64s: Fix pte update for kernel memory on radix" }, - "CVE-2021-1048": { - "cmt_msg": "fix regression in \"epoll: Keep a reference on files added to the check list\"" + "CVE-2022-3239": { + "cmt_msg": "media: em28xx: initialize refcount before kref_get" }, - "CVE-2015-2877": { + "CVE-2022-4543": { "cmt_msg": "" }, - "CVE-2020-9383": { - "cmt_msg": "floppy: check FDC index for errors before assigning it" + "CVE-2023-52571": { + "cmt_msg": "power: supply: rk817: Fix node refcount leak" }, - "CVE-2022-3586": { - "cmt_msg": "sch_sfb: Don't assume the skb is still around after enqueueing to child" + "CVE-2023-52572": { + "cmt_msg": "cifs: Fix UAF in cifs_demultiplex_thread()" }, - "CVE-2023-32269": { - "cmt_msg": "netrom: Fix use-after-free caused by accept on already connected socket" + "CVE-2023-52573": { + "cmt_msg": "net: rds: Fix possible NULL-pointer dereference" }, - "CVE-2023-1206": { - "cmt_msg": "tcp: Reduce chance of collisions in inet6_hashfn()." + "CVE-2023-4921": { + "cmt_msg": "net: sched: sch_qfq: Fix UAF in qfq_dequeue()" }, - "CVE-2021-38198": { - "cmt_msg": "KVM: X86: MMU: Use the correct inherited permissions to get shadow page" + "CVE-2022-3424": { + "cmt_msg": "misc: sgi-gru: fix use-after-free error in gru_set_context_option, gru_fault and gru_handle_user_call_os" }, - "CVE-2022-1679": { - "cmt_msg": "ath9k: fix use-after-free in ath9k_hif_usb_rx_cb" + "CVE-2023-1829": { + "cmt_msg": "net/sched: Retire tcindex classifier" }, - "CVE-2020-8832": { - "cmt_msg": "drm/i915: Record the default hw state after reset upon load" + "CVE-2021-46915": { + "cmt_msg": "netfilter: nft_limit: avoid possible divide error in nft_limit_init" }, - "CVE-2017-5970": { - "cmt_msg": "ipv4: keep skb->dst around in presence of IP options" + "CVE-2023-1390": { + "cmt_msg": "tipc: fix NULL deref in tipc_link_xmit()" }, - "CVE-2023-1513": { - "cmt_msg": "kvm: initialize all of the kvm_debugregs structure before sending it to userspace" + "CVE-2021-34981": { + "cmt_msg": "Bluetooth: cmtp: fix file refcount when cmtp_attach_device fails" }, - "CVE-2021-26401": { - "cmt_msg": "x86/speculation: Use generic retpoline by default on AMD" + "CVE-2023-23454": { + "cmt_msg": "net: sched: cbq: dont intepret cls results when asked to drop" }, - "CVE-2021-3847": { - "cmt_msg": "" + "CVE-2024-0775": { + "cmt_msg": "ext4: improve error recovery code paths in __ext4_remount()" }, - "CVE-2018-1130": { - "cmt_msg": "dccp: check sk for closed state in dccp_sendmsg()" + "CVE-2023-4881": { + "cmt_msg": "netfilter: nftables: exthdr: fix 4-byte stack OOB write" }, - "CVE-2023-1077": { - "cmt_msg": "sched/rt: pick_next_rt_entity(): check list_entry" + "CVE-2020-24394": { + "cmt_msg": "nfsd: apply umask on fs without ACL support" }, - "CVE-2019-14284": { - "cmt_msg": "floppy: fix div-by-zero in setup_format_params" + "CVE-2024-26769": { + "cmt_msg": "nvmet-fc: avoid deadlock on delete association path" }, - "CVE-2020-36557": { - "cmt_msg": "vt: vt_ioctl: fix VT_DISALLOCATE freeing in-use virtual console" + "CVE-2022-20148": { + "cmt_msg": "f2fs: fix UAF in f2fs_available_free_memory" }, - "CVE-2021-3506": { - "cmt_msg": "f2fs: fix to avoid out-of-bounds memory access" + "CVE-2024-26704": { + "cmt_msg": "ext4: fix double-free of blocks due to wrong extents moved_len" }, - "CVE-2011-4917": { - "cmt_msg": "" + "CVE-2022-1786": { + "cmt_msg": "io_uring: remove io_identity" }, - "CVE-2011-4916": { + "CVE-2013-7445": { "cmt_msg": "" }, - "CVE-2019-14283": { - "cmt_msg": "floppy: fix out-of-bounds read in copy_buffer" + "CVE-2019-18814": { + "cmt_msg": "apparmor: Fix use-after-free in aa_audit_rule_init" }, - "CVE-2019-3900": { - "cmt_msg": "vhost_net: fix possible infinite loop" + "CVE-2022-28390": { + "cmt_msg": "can: ems_usb: ems_usb_start_xmit(): fix double dev_kfree_skb() in error path" }, - "CVE-2019-19528": { - "cmt_msg": "USB: iowarrior: fix use-after-free on disconnect" + "CVE-2024-26736": { + "cmt_msg": "afs: Increase buffer size in afs_update_volume_status()" }, - "CVE-2019-19533": { - "cmt_msg": "media: ttusb-dec: Fix info-leak in ttusb_dec_send_command()" + "CVE-2024-26593": { + "cmt_msg": "i2c: i801: Fix block process call transactions" }, - "CVE-2018-13100": { - "cmt_msg": "f2fs: fix to do sanity check with secs_per_zone" + "CVE-2024-26738": { + "cmt_msg": "powerpc/pseries/iommu: DLPAR add doesn't completely initialize pci_controller" }, - "CVE-2017-16646": { - "cmt_msg": "media: dib0700: fix invalid dvb_detach argument" + "CVE-2024-26739": { + "cmt_msg": "net/sched: act_mirred: don't override retval if we already lost the skb" }, - "CVE-2017-16645": { - "cmt_msg": "Input: ims-psu - check if CDC union descriptor is sane" + "CVE-2022-42719": { + "cmt_msg": "wifi: mac80211: fix MBSSID parsing use-after-free" }, - "CVE-2017-16643": { - "cmt_msg": "Input: gtco - fix potential out-of-bound access" + "CVE-2020-14386": { + "cmt_msg": "net/packet: fix overflow in tpacket_rcv" }, - "CVE-2017-16649": { - "cmt_msg": "net: cdc_ether: fix divide by 0 on bad descriptors" + "CVE-2024-26804": { + "cmt_msg": "net: ip_tunnel: prevent perpetual headroom growth" }, - "CVE-2023-31083": { - "cmt_msg": "Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO" + "CVE-2020-14385": { + "cmt_msg": "xfs: fix boundary test in xfs_attr_shortform_verify" }, - "CVE-2019-5489": { - "cmt_msg": "Change mincore() to count \"mapped\" pages rather than \"cached\" pages" + "CVE-2021-3656": { + "cmt_msg": "KVM: nSVM: always intercept VMLOAD/VMSAVE when nested (CVE-2021-3656)" }, - "CVE-2024-1312": { - "cmt_msg": "mm: lock_vma_under_rcu() must check vma->anon_vma under vma lock" + "CVE-2024-26805": { + "cmt_msg": "netlink: Fix kernel-infoleak-after-free in __skb_datagram_iter" }, - "CVE-2017-16648": { - "cmt_msg": "dvb_frontend: don't use-after-free the frontend struct" + "CVE-2022-1158": { + "cmt_msg": "KVM: x86/mmu: do compare-and-exchange of gPTE via the user address" }, - "CVE-2018-10880": { - "cmt_msg": "ext4: never move the system.data xattr out of the inode body" + "CVE-2022-3303": { + "cmt_msg": "ALSA: pcm: oss: Fix race at SNDCTL_DSP_SYNC" }, - "CVE-2018-10881": { - "cmt_msg": "ext4: clear i_data in ext4_inode_info when removing inline data" + "CVE-2022-20141": { + "cmt_msg": "igmp: Add ip_mc_list lock in ip_check_mc_rcu" }, - "CVE-2018-10882": { - "cmt_msg": "ext4: add more inode number paranoia checks" + "CVE-2020-25704": { + "cmt_msg": "perf/core: Fix a memory leak in perf_event_parse_addr_filter()" }, - "CVE-2018-10883": { - "cmt_msg": "jbd2: don't mark block as modified if the handle is out of credits" - } - } - }, - "4.6": { - "4.6": { - "CVE-2016-6198": { - "cmt_msg": "vfs: add vfs_select_inode() helper", - "cmt_id": "54d5ca871e72f2bb172ec9323497f01cd5091ec7" + "CVE-2023-23455": { + "cmt_msg": "net: sched: atm: dont intepret cls results when asked to drop" }, - "CVE-2016-4580": { - "cmt_msg": "net: fix a kernel infoleak in x25 module", - "cmt_id": "79e48650320e6fba48369fccf13fd045315b19b8" + "CVE-2022-2905": { + "cmt_msg": "bpf: Don't use tnum_range on array range checking for poke descriptors" }, - "CVE-2016-4486": { - "cmt_msg": "net: fix infoleak in rtnetlink", - "cmt_id": "5f8e44741f9f216e33736ea4ec65ca9ac03036e6" + "CVE-2020-12771": { + "cmt_msg": "bcache: fix potential deadlock problem in btree_gc_coalesce" }, - "CVE-2016-4485": { - "cmt_msg": "net: fix infoleak in llc", - "cmt_id": "b8670c09f37bdf2847cc44f36511a53afc6161fd" + "CVE-2024-26595": { + "cmt_msg": "mlxsw: spectrum_acl_tcam: Fix NULL pointer dereference in error path" }, - "CVE-2016-4913": { - "cmt_msg": "get_rock_ridge_filename(): handle malformed NM entries", - "cmt_id": "99d825822eade8d827a1817357cbf3f889a552d6" + "CVE-2023-6931": { + "cmt_msg": "perf: Fix perf_event_validate_size()" }, - "CVE-2016-0758": { - "cmt_msg": "KEYS: Fix ASN.1 indefinite length object parsing", - "cmt_id": "23c8a812dc3c621009e4f0e5342aa4e2ede1ceaa" - } - }, - "4.6-rc7": { - "CVE-2016-5728": { - "cmt_msg": "misc: mic: Fix for double fetch security bug in VOP driver", - "cmt_id": "82dc4afd7e65455464f0fc2fe6976efde54fe451" - } - }, - "4.6.1": { - "CVE-2016-3713": { - "cmt_msg": "KVM: MTRR: remove MSR 0x2f8", - "cmt_id": "0602824ff6b2e86821be11f30584d49bb39cee0f" + "CVE-2023-6932": { + "cmt_msg": "ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet" }, - "CVE-2016-9754": { - "cmt_msg": "ring-buffer: Prevent overflow of size in ring_buffer_resize()", - "cmt_id": "6d40007bb8870d146dc8b388e97b80a5a16dd204" - } - }, - "4.6.2": { - "CVE-2017-7495": { - "cmt_msg": "ext4: fix data exposure after a crash", - "cmt_id": "efafc4236827a88320bfe12da8ddc7edaf6e8495" - } - }, - "4.6.3": { - "CVE-2016-4951": { - "cmt_msg": "tipc: check nl sock before parsing nested attributes", - "cmt_id": "ba7963c750122e13b9ba254afa95438126d7f460" + "CVE-2024-26801": { + "cmt_msg": "Bluetooth: Avoid potential use-after-free in hci_error_reset" }, - "CVE-2016-4998": { - "cmt_msg": "netfilter: x_tables: check for bogus target offset", - "cmt_id": "98e02ab689f15b088f8d0baade85280ab21867b5" + "CVE-2020-16166": { + "cmt_msg": "random32: update the net random state on interrupt and activity" }, - "CVE-2016-1583": { - "cmt_msg": "proc: prevent stacking filesystems on top", - "cmt_id": "c4fd3264feffb503336a43f9bf132d9d385678b5" + "CVE-2021-33631": { + "cmt_msg": "ext4: fix kernel BUG in 'ext4_write_inline_data_end()'" }, - "CVE-2016-4997": { - "cmt_msg": "netfilter: x_tables: check for bogus target offset", - "cmt_id": "98e02ab689f15b088f8d0baade85280ab21867b5" + "CVE-2022-28389": { + "cmt_msg": "can: mcba_usb: mcba_usb_start_xmit(): fix double dev_kfree_skb in error path" }, - "CVE-2016-9806": { - "cmt_msg": "netlink: Fix dump skb leak/double free", - "cmt_id": "c55a7faa585fc5ee9b50a05f34bfe3b3d38d90ab" - } - }, - "4.6.5": { - "CVE-2016-4470": { - "cmt_msg": "KEYS: potential uninitialized variable", - "cmt_id": "d8498ead3d50eb6cd1f5bf31b924ac927e89ee85" + "CVE-2022-28388": { + "cmt_msg": "can: usb_8dev: usb_8dev_start_xmit(): fix double dev_kfree_skb() in error path" }, - "CVE-2016-1237": { - "cmt_msg": "posix_acl: Add set_posix_acl", - "cmt_id": "a621b910bc891fe605e8b4597fcea414807ea040" + "CVE-2022-41218": { + "cmt_msg": "media: dvb-core: Fix UAF due to refcount races at releasing" }, - "CVE-2016-6187": { - "cmt_msg": "apparmor: fix oops, validate buffer size in apparmor_setprocattr()", - "cmt_id": "dba63efdec9c9d50e2cf37c8ba678f8e823cab9c" + "CVE-2024-26803": { + "cmt_msg": "net: veth: clear GRO when clearing XDP even when down" }, - "CVE-2016-4794": { - "cmt_msg": "percpu: fix synchronization between chunk->map_extend_work and chunk destruction", - "cmt_id": "5825418a1516dd978aff837b4ab8acd81aa10689" + "CVE-2023-52444": { + "cmt_msg": "f2fs: fix to avoid dirent corruption" }, - "CVE-2016-5829": { - "cmt_msg": "HID: hiddev: validate num_values for HIDIOCGUSAGES, HIDIOCSUSAGES commands", - "cmt_id": "5618231d6dade641382df9bfb9fa03fac8bbfbd2" + "CVE-2024-26768": { + "cmt_msg": "LoongArch: Change acpi_core_pic[NR_CPUS] to acpi_core_pic[MAX_CORE_PIC]" }, - "CVE-2016-5828": { - "cmt_msg": "powerpc/tm: Always reclaim in start_thread() for exec() class syscalls", - "cmt_id": "5b7ef8eff33ff8b3d87071a5fa463da15ec8a0c0" - } - }, - "4.6.6": { - "CVE-2016-6516": { - "cmt_msg": "vfs: ioctl: prevent double-fetch in dedupe ioctl", - "cmt_id": "04678f5598322beecf6f06ddf73b2eb6a8b0ef9a" + "CVE-2020-12362": { + "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" }, - "CVE-2016-4569": { - "cmt_msg": "ALSA: timer: Fix leak in SNDRV_TIMER_IOCTL_PARAMS", - "cmt_id": "82a638a293d7f0a699d88fe669a43829e65b0911" + "CVE-2020-12363": { + "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" }, - "CVE-2016-4578": { - "cmt_msg": "ALSA: timer: Fix leak in events via snd_timer_user_ccallback", - "cmt_id": "5b6fc00bb4ae7e917519b4fb49c9d3befa3897e5" + "CVE-2022-4129": { + "cmt_msg": "l2tp: Serialize access to sk_user_data with sk_callback_lock" }, - "CVE-2016-6156": { - "cmt_msg": "platform/chrome: cros_ec_dev - double fetch bug in ioctl", - "cmt_id": "68b0cefc0358c3e3364fd520bf11c9c7b43be45b" + "CVE-2020-12364": { + "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" }, - "CVE-2016-5400": { - "cmt_msg": "media: fix airspy usb probe error path", - "cmt_id": "1031db3dff78793352bbda8ab5391def6f372aa4" + "CVE-2024-26646": { + "cmt_msg": "thermal: intel: hfi: Add syscore callbacks for system-wide PM" }, - "CVE-2016-7911": { - "cmt_msg": "block: fix use-after-free in sys_ioprio_get()", - "cmt_id": "5c72cc56550a88bde12f6405c3448a17301aede8" - } - }, - "4.6.7": { - "CVE-2016-7910": { - "cmt_msg": "block: fix use-after-free in seq file", - "cmt_id": "199e5c223f1c0bf4b1c79b37a1a664a5d657ad5c" + "CVE-2024-26647": { + "cmt_msg": "drm/amd/display: Fix late derefrence 'dsc' check in 'link_set_dsc_pps_packet()'" }, - "CVE-2016-5696": { - "cmt_msg": "tcp: make challenge acks less predictable", - "cmt_id": "3c679108b6e576f4da4e165f90e1227b2e357383" + "CVE-2024-26644": { + "cmt_msg": "btrfs: don't abort filesystem when attempting to snapshot deleted subvolume" }, - "CVE-2016-3857": { - "cmt_msg": "arm: oabi compat: add missing access checks", - "cmt_id": "e6b25dc115a4642eb7cfc93477f9f3d57ebaf391" - } - }, - "outstanding": { - "CVE-2017-5897": { - "cmt_msg": "ip6_gre: fix ip6gre_err() invalid reads" + "CVE-2020-25639": { + "cmt_msg": "drm/nouveau: bail out of nouveau_channel_new if channel init fails" }, - "CVE-2020-10711": { - "cmt_msg": "netlabel: cope with NULL catmap" + "CVE-2023-33203": { + "cmt_msg": "net: qcom/emac: Fix use after free bug in emac_remove due to race condition" }, - "CVE-2020-35508": { - "cmt_msg": "fork: fix copy_process(CLONE_PARENT) race with the exiting ->real_parent" + "CVE-2024-26640": { + "cmt_msg": "tcp: add sanity checks to rx zerocopy" }, - "CVE-2022-3649": { - "cmt_msg": "nilfs2: fix use-after-free bug of struct nilfs_root" + "CVE-2021-0605": { + "cmt_msg": "af_key: pfkey_dump needs parameter validation" }, - "CVE-2020-35501": { - "cmt_msg": "" + "CVE-2021-4001": { + "cmt_msg": "bpf: Fix toctou on read-only map's constant scalar tracking" }, - "CVE-2019-15098": { - "cmt_msg": "ath6kl: fix a NULL-ptr-deref bug in ath6kl_usb_alloc_urb_from_pipe()" + "CVE-2021-4002": { + "cmt_msg": "hugetlbfs: flush TLBs correctly after huge_pmd_unshare" }, - "CVE-2020-29368": { - "cmt_msg": "mm: thp: make the THP mapcount atomic against __split_huge_pmd_locked()" + "CVE-2023-26545": { + "cmt_msg": "net: mpls: fix stale pointer if allocation fails during device rename" }, - "CVE-2017-17806": { - "cmt_msg": "crypto: hmac - require that the underlying hash algorithm is unkeyed" + "CVE-2022-1055": { + "cmt_msg": "net: sched: fix use-after-free in tc_new_tfilter()" }, - "CVE-2023-3611": { - "cmt_msg": "net/sched: sch_qfq: account for stab overhead in qfq_enqueue" + "CVE-2023-50431": { + "cmt_msg": "accel/habanalabs: fix information leak in sec_attest_info()" }, - "CVE-2022-0001": { - "cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE" + "CVE-2022-34918": { + "cmt_msg": "netfilter: nf_tables: stricter validation of element data" }, - "CVE-2020-12464": { - "cmt_msg": "USB: core: Fix free-while-in-use bug in the USB S-Glibrary" + "CVE-2022-20008": { + "cmt_msg": "mmc: block: fix read single on recovery logic" }, - "CVE-2017-10662": { - "cmt_msg": "f2fs: sanity check segment count" + "CVE-2023-3117": { + "cmt_msg": "netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE" }, - "CVE-2019-19965": { - "cmt_msg": "scsi: libsas: stop discovering if oob mode is disconnected" + "CVE-2024-26641": { + "cmt_msg": "ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv()" }, - "CVE-2016-9793": { - "cmt_msg": "net: avoid signed overflows for SO_{SND|RCV}BUFFORCE" + "CVE-2024-26791": { + "cmt_msg": "btrfs: dev-replace: properly validate device names" }, - "CVE-2017-15102": { - "cmt_msg": "usb: misc: legousbtower: Fix NULL pointer deference" + "CVE-2023-32269": { + "cmt_msg": "netrom: Fix use-after-free caused by accept on already connected socket" }, - "CVE-2016-9794": { - "cmt_msg": "ALSA: pcm : Call kill_fasync() in stream lock" + "CVE-2019-20810": { + "cmt_msg": "media: go7007: fix a miss of snd_card_free" }, - "CVE-2022-1184": { - "cmt_msg": "ext4: verify dir block before splitting it" + "CVE-2023-52464": { + "cmt_msg": "EDAC/thunderx: Fix possible out-of-bounds string access" }, - "CVE-2020-24587": { - "cmt_msg": "mac80211: prevent mixed key and fragment cache attacks" + "CVE-2023-52600": { + "cmt_msg": "jfs: fix uaf in jfs_evict_inode" }, - "CVE-2020-24586": { - "cmt_msg": "mac80211: prevent mixed key and fragment cache attacks" + "CVE-2020-14314": { + "cmt_msg": "ext4: fix potential negative array index in do_split()" }, - "CVE-2017-6074": { - "cmt_msg": "dccp: fix freeing skb too early for IPV6_RECVPKTINFO" + "CVE-2021-3411": { + "cmt_msg": "x86/kprobes: Fix optprobe to detect INT3 padding correctly" }, - "CVE-2023-6270": { + "CVE-2022-26373": { + "cmt_msg": "x86/speculation: Add RSB VM Exit protections" + }, + "CVE-2019-15290": { "cmt_msg": "" }, - "CVE-2022-3642": { + "CVE-2023-3212": { + "cmt_msg": "gfs2: Don't deref jdesc in evict" + }, + "CVE-2024-23848": { "cmt_msg": "" }, - "CVE-2021-0129": { - "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical" + "CVE-2023-52531": { + "cmt_msg": "wifi: iwlwifi: mvm: Fix a memory corruption issue" }, - "CVE-2019-20096": { - "cmt_msg": "dccp: Fix memleak in __feat_register_sp" + "CVE-2021-47159": { + "cmt_msg": "net: dsa: fix a crash if ->get_sset_count() fails" }, - "CVE-2022-47520": { - "cmt_msg": "wifi: wilc1000: validate pairwise and authentication suite offsets" + "CVE-2022-0617": { + "cmt_msg": "udf: Fix NULL ptr deref when converting from inline format" }, - "CVE-2023-42755": { - "cmt_msg": "net/sched: Retire rsvp classifier" + "CVE-2023-4459": { + "cmt_msg": "net: vmxnet3: fix possible NULL pointer dereference in vmxnet3_rq_cleanup()" }, - "CVE-2016-10044": { - "cmt_msg": "aio: mark AIO pseudo-fs noexec" + "CVE-2024-26625": { + "cmt_msg": "llc: call sock_orphan() at release time" }, - "CVE-2022-3643": { - "cmt_msg": "xen/netback: Ensure protocol headers don't fall in the non-linear area" + "CVE-2024-26635": { + "cmt_msg": "llc: Drop support for ETH_P_TR_802_2." }, - "CVE-2021-38300": { - "cmt_msg": "bpf, mips: Validate conditional branch offsets" + "CVE-2023-52639": { + "cmt_msg": "KVM: s390: vsie: fix race during shadow creation" }, - "CVE-2018-10940": { - "cmt_msg": "cdrom: information leak in cdrom_ioctl_media_changed()" + "CVE-2022-2153": { + "cmt_msg": "KVM: x86: Avoid theoretical NULL pointer dereference in kvm_irq_delivery_to_apic_fast()" }, - "CVE-2022-32250": { - "cmt_msg": "netfilter: nf_tables: disallow non-stateful expression in sets earlier" + "CVE-2024-2193": { + "cmt_msg": "" }, - "CVE-2018-10087": { - "cmt_msg": "kernel/exit.c: avoid undefined behaviour when calling wait4()" + "CVE-2022-20566": { + "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free caused by l2cap_chan_put" }, - "CVE-2019-9500": { - "cmt_msg": "brcmfmac: assure SSID length from firmware is limited" + "CVE-2018-12930": { + "cmt_msg": "" }, - "CVE-2019-9503": { - "cmt_msg": "brcmfmac: add subtype check for event handling in data path" + "CVE-2018-12931": { + "cmt_msg": "" + }, + "CVE-2024-23851": { + "cmt_msg": "dm: limit the number of targets and parameter size area" }, - "CVE-2018-6555": { - "cmt_msg": "staging: irda: remove the irda network stack and drivers" + "CVE-2023-52637": { + "cmt_msg": "can: j1939: Fix UAF in j1939_sk_match_filter during setsockopt(SO_J1939_FILTER)" }, - "CVE-2023-3159": { - "cmt_msg": "firewire: fix potential uaf in outbound_phy_packet_callback()" + "CVE-2024-23196": { + "cmt_msg": "ALSA: hda: fix a possible null-pointer dereference due to data race in snd_hdac_regmap_sync()" }, - "CVE-2022-0480": { - "cmt_msg": "memcg: enable accounting for file lock caches" + "CVE-2020-12768": { + "cmt_msg": "KVM: SVM: Fix potential memory leak in svm_cpu_init()" }, - "CVE-2018-10124": { - "cmt_msg": "kernel/signal.c: avoid undefined behaviour in kill_something_info" + "CVE-2021-46932": { + "cmt_msg": "Input: appletouch - initialize work before device registration" }, - "CVE-2022-0487": { - "cmt_msg": "moxart: fix potential use-after-free on remove path" + "CVE-2023-3863": { + "cmt_msg": "net: nfc: Fix use-after-free caused by nfc_llcp_find_local" }, - "CVE-2023-52429": { - "cmt_msg": "dm: limit the number of targets and parameter size area" + "CVE-2021-33098": { + "cmt_msg": "ixgbe: fix large MTU request from VF" }, - "CVE-2021-28964": { - "cmt_msg": "btrfs: fix race when cloning extent buffer during rewind of an old root" + "CVE-2021-28972": { + "cmt_msg": "PCI: rpadlpar: Fix potential drc_name corruption in store functions" }, - "CVE-2016-6828": { - "cmt_msg": "tcp: fix use after free in tcp_xmit_retransmit_queue()" + "CVE-2021-28971": { + "cmt_msg": "perf/x86/intel: Fix a crash caused by zero PEBS status" }, - "CVE-2021-0920": { - "cmt_msg": "af_unix: fix garbage collect vs MSG_PEEK" + "CVE-2023-52634": { + "cmt_msg": "drm/amd/display: Fix disable_otg_wa logic" }, - "CVE-2023-1249": { - "cmt_msg": "coredump: Use the vma snapshot in fill_files_note" + "CVE-2022-22942": { + "cmt_msg": "drm/vmwgfx: Fix stale file descriptors on failed usercopy" }, - "CVE-2022-23825": { - "cmt_msg": "" + "CVE-2021-3739": { + "cmt_msg": "btrfs: fix NULL pointer dereference when deleting device by invalid id" }, - "CVE-2022-1974": { - "cmt_msg": "nfc: replace improper check device_is_registered() in netlink related functions" + "CVE-2020-36782": { + "cmt_msg": "i2c: imx-lpi2c: fix reference leak when pm_runtime_get_sync fails" }, - "CVE-2019-13631": { - "cmt_msg": "Input: gtco - bounds check collection indent level" + "CVE-2020-36783": { + "cmt_msg": "i2c: img-scb: fix reference leak when pm_runtime_get_sync fails" }, - "CVE-2017-7374": { - "cmt_msg": "fscrypt: remove broken support for detecting keyring key revocation" + "CVE-2020-36780": { + "cmt_msg": "i2c: sprd: fix reference leak when pm_runtime_get_sync fails" }, - "CVE-2024-26588": { - "cmt_msg": "LoongArch: BPF: Prevent out-of-bounds memory access" + "CVE-2020-36781": { + "cmt_msg": "i2c: imx: fix reference leak when pm_runtime_get_sync fails" }, - "CVE-2023-2162": { - "cmt_msg": "scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress" + "CVE-2021-3732": { + "cmt_msg": "ovl: prevent private clone if bind mount is not allowed" }, - "CVE-2017-5551": { - "cmt_msg": "tmpfs: clear S_ISGID when setting posix ACLs" + "CVE-2020-36784": { + "cmt_msg": "i2c: cadence: fix reference leak when pm_runtime_get_sync fails" }, - "CVE-2024-24857": { - "cmt_msg": "" + "CVE-2023-52632": { + "cmt_msg": "drm/amdkfd: Fix lock dependency warning with srcu" }, - "CVE-2019-19241": { - "cmt_msg": "io_uring: async workers should inherit the user creds" + "CVE-2024-24860": { + "cmt_msg": "Bluetooth: Fix atomicity violation in {min,max}_key_size_set" }, - "CVE-2022-21123": { - "cmt_msg": "x86/speculation/mmio: Add mitigation for Processor MMIO Stale Data" + "CVE-2020-10766": { + "cmt_msg": "x86/speculation: Prevent rogue cross-process SSBD shutdown" }, - "CVE-2023-3390": { - "cmt_msg": "netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE" + "CVE-2020-10767": { + "cmt_msg": "x86/speculation: Avoid force-disabling IBPB based on STIBP and enhanced IBRS." }, - "CVE-2021-28688": { - "cmt_msg": "xen-blkback: don't leak persistent grants from xen_blkbk_map()" + "CVE-2019-25162": { + "cmt_msg": "i2c: Fix a potential use after free" }, - "CVE-2021-39686": { - "cmt_msg": "binder: use euid from cred instead of using task" + "CVE-2024-24861": { + "cmt_msg": "media: xc4000: Fix atomicity violation in xc4000_get_frequency" }, - "CVE-2021-39685": { - "cmt_msg": "USB: gadget: detect too-big endpoint 0 requests" + "CVE-2024-26627": { + "cmt_msg": "scsi: core: Move scsi_host_busy() out of host lock for waking up EH handler" }, - "CVE-2023-6535": { - "cmt_msg": "" + "CVE-2020-13143": { + "cmt_msg": "USB: gadget: fix illegal array access in binding with UDC" }, - "CVE-2021-43975": { - "cmt_msg": "atlantic: Fix OOB read and write in hw_atl_utils_fw_rpc_wait" + "CVE-2020-10768": { + "cmt_msg": "x86/speculation: PR_SPEC_FORCE_DISABLE enforcement for indirect branches." }, - "CVE-2018-6927": { - "cmt_msg": "futex: Prevent overflow by strengthen input validation" + "CVE-2021-35039": { + "cmt_msg": "module: limit enabling module.sig_enforce" }, - "CVE-2020-0466": { - "cmt_msg": "do_epoll_ctl(): clean the failure exits up a bit" + "CVE-2024-25740": { + "cmt_msg": "" }, - "CVE-2019-10207": { - "cmt_msg": "Bluetooth: hci_uart: check for missing tty operations" + "CVE-2022-2978": { + "cmt_msg": "fs: fix UAF/GPF bug in nilfs_mdt_destroy" }, - "CVE-2023-1073": { - "cmt_msg": "HID: check empty report_list in hid_validate_values()" + "CVE-2022-3903": { + "cmt_msg": "media: mceusb: Use new usb_control_msg_*() routines" }, - "CVE-2019-14835": { - "cmt_msg": "vhost: make sure log_num < in_num" + "CVE-2024-26642": { + "cmt_msg": "netfilter: nf_tables: disallow anonymous set with timeout flag" }, - "CVE-2023-0459": { - "cmt_msg": "uaccess: Add speculation barrier to copy_from_user()" + "CVE-2022-3577": { + "cmt_msg": "HID: bigben: fix slab-out-of-bounds Write in bigben_probe" }, - "CVE-2023-0458": { - "cmt_msg": "prlimit: do_prlimit needs to have a speculation check" + "CVE-2023-20588": { + "cmt_msg": "x86/CPU/AMD: Do not leak quotient data after a division by 0" }, - "CVE-2018-1000204": { - "cmt_msg": "scsi: sg: allocate with __GFP_ZERO in sg_build_indirect()" + "CVE-2021-47071": { + "cmt_msg": "uio_hv_generic: Fix a memory leak in error handling paths" }, - "CVE-2017-8924": { - "cmt_msg": "USB: serial: io_ti: fix information leak in completion handler" + "CVE-2021-20226": { + "cmt_msg": "io_uring: don't rely on weak ->files references" }, - "CVE-2017-8925": { - "cmt_msg": "USB: serial: omninet: fix reference leaks at open" + "CVE-2021-47073": { + "cmt_msg": "platform/x86: dell-smbios-wmi: Fix oops on rmmod dell_smbios" }, - "CVE-2019-12379": { - "cmt_msg": "consolemap: Fix a memory leaking bug in drivers/tty/vt/consolemap.c" + "CVE-2022-44034": { + "cmt_msg": "char: pcmcia: remove all the drivers" }, - "CVE-2017-12134": { - "cmt_msg": "xen: fix bio vec merging" + "CVE-2021-47075": { + "cmt_msg": "nvmet: fix memory leak in nvmet_alloc_ctrl()" }, - "CVE-2023-0597": { - "cmt_msg": "x86/mm: Randomize per-cpu entry area" + "CVE-2021-47074": { + "cmt_msg": "nvme-loop: fix memory leak in nvme_loop_create_ctrl()" }, - "CVE-2021-30002": { - "cmt_msg": "media: v4l: ioctl: Fix memory leak in video_usercopy" + "CVE-2021-47077": { + "cmt_msg": "scsi: qedf: Add pointer checks in qedf_update_link_speed()" }, - "CVE-2017-17450": { - "cmt_msg": "netfilter: xt_osf: Add missing permission checks" + "CVE-2021-47076": { + "cmt_msg": "RDMA/rxe: Return CQE error if invalid lkey was supplied" }, - "CVE-2021-0941": { - "cmt_msg": "bpf: Remove MTU check in __bpf_skb_max_len" + "CVE-2021-47170": { + "cmt_msg": "USB: usbfs: Don't WARN about excessively large memory allocations" }, - "CVE-2017-7294": { - "cmt_msg": "drm/vmwgfx: fix integer overflow in vmw_surface_define_ioctl()" + "CVE-2021-47078": { + "cmt_msg": "RDMA/rxe: Clear all QP fields if creation failed" }, - "CVE-2024-26591": { - "cmt_msg": "bpf: Fix re-attachment branch in bpf_tracing_prog_attach" + "CVE-2021-47172": { + "cmt_msg": "iio: adc: ad7124: Fix potential overflow due to non sequential channel numbers" }, - "CVE-2020-15802": { - "cmt_msg": "" + "CVE-2021-47173": { + "cmt_msg": "misc/uss720: fix memory leak in uss720_probe" }, - "CVE-2024-26594": { - "cmt_msg": "ksmbd: validate mech token in session setup" + "CVE-2022-36123": { + "cmt_msg": "x86: Clear .brk area at early boot" }, - "CVE-2022-3629": { - "cmt_msg": "vsock: Fix memory leak in vsock_connect()" + "CVE-2021-47175": { + "cmt_msg": "net/sched: fq_pie: fix OOB access in the traffic path" }, - "CVE-2017-18270": { - "cmt_msg": "KEYS: prevent creating a different user's keyrings" + "CVE-2020-10781": { + "cmt_msg": "Revert \"zram: convert remaining CLASS_ATTR() to CLASS_ATTR_RO()\"" }, - "CVE-2022-3636": { - "cmt_msg": "net: ethernet: mtk_eth_soc: use after free in __mtk_ppe_check_skb()" + "CVE-2021-46951": { + "cmt_msg": "tpm: efi: Use local variable for calculating final log size" }, - "CVE-2022-3635": { - "cmt_msg": "atm: idt77252: fix use-after-free bugs caused by tst_timer" + "CVE-2021-46950": { + "cmt_msg": "md/raid1: properly indicate failure when ending a failed write request" }, - "CVE-2022-0002": { - "cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE" + "CVE-2021-46953": { + "cmt_msg": "ACPI: GTDT: Don't corrupt interrupt mappings on watchdow probe failure" }, - "CVE-2021-34556": { - "cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4" + "CVE-2021-46952": { + "cmt_msg": "NFS: fs_context: validate UDP retrans to prevent shift out-of-bounds" }, - "CVE-2020-0543": { - "cmt_msg": "x86/cpu: Add 'table' argument to cpu_matches()" + "CVE-2021-46955": { + "cmt_msg": "openvswitch: fix stack OOB read while fragmenting IPv4 packets" }, - "CVE-2022-40982": { - "cmt_msg": "x86/speculation: Add Gather Data Sampling mitigation" + "CVE-2021-46956": { + "cmt_msg": "virtiofs: fix memory leak in virtio_fs_probe()" }, - "CVE-2016-10905": { - "cmt_msg": "GFS2: don't set rgrp gl_object until it's inserted into rgrp tree" + "CVE-2021-46959": { + "cmt_msg": "spi: Fix use-after-free with devm_spi_alloc_*" }, - "CVE-2017-6001": { - "cmt_msg": "perf/core: Fix concurrent sys_perf_event_open() vs. 'move_group' race" + "CVE-2020-26139": { + "cmt_msg": "mac80211: do not accept/forward invalid EAPOL frames" }, - "CVE-2016-6480": { - "cmt_msg": "aacraid: Check size values after double-fetch from user" + "CVE-2023-42754": { + "cmt_msg": "ipv4: fix null-deref in ipv4_link_failure" }, - "CVE-2022-23039": { - "cmt_msg": "xen/gntalloc: don't use gnttab_query_foreign_access()" + "CVE-2024-26772": { + "cmt_msg": "ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal()" }, - "CVE-2018-3646": { - "cmt_msg": "x86/microcode: Allow late microcode loading with SMT disabled" + "CVE-2021-3609": { + "cmt_msg": "can: bcm: delay release of struct bcm_op after synchronize_rcu()" }, - "CVE-2017-7518": { - "cmt_msg": "KVM: x86: fix singlestepping over syscall" + "CVE-2023-52595": { + "cmt_msg": "wifi: rt2x00: restart beacon queue when hardware reset" }, - "CVE-2019-9213": { - "cmt_msg": "mm: enforce min addr even if capable() in expand_downwards()" + "CVE-2021-3600": { + "cmt_msg": "bpf: Fix 32 bit src register truncation on div/mod" }, - "CVE-2021-28712": { - "cmt_msg": "xen/netfront: harden netfront against event channel storms" + "CVE-2021-23133": { + "cmt_msg": "net/sctp: fix race condition in sctp_destroy_sock" }, - "CVE-2024-24861": { - "cmt_msg": "" + "CVE-2022-2327": { + "cmt_msg": "io_uring: remove any grabbing of context" }, - "CVE-2018-10938": { - "cmt_msg": "Cipso: cipso_v4_optptr enter infinite loop" + "CVE-2021-0929": { + "cmt_msg": "staging/android/ion: delete dma_buf->kmap/unmap implemenation" }, - "CVE-2019-19966": { - "cmt_msg": "media: cpia2: Fix use-after-free in cpia2_exit" + "CVE-2023-52590": { + "cmt_msg": "ocfs2: Avoid touching renamed directory if parent does not change" }, - "CVE-2019-11477": { - "cmt_msg": "tcp: limit payload size of sacked skbs" + "CVE-2024-26676": { + "cmt_msg": "af_unix: Call kfree_skb() for dead unix_(sk)->oob_skb in GC." }, - "CVE-2021-28711": { - "cmt_msg": "xen/blkfront: harden blkfront against event channel storms" + "CVE-2021-0920": { + "cmt_msg": "af_unix: fix garbage collect vs MSG_PEEK" }, - "CVE-2017-7895": { - "cmt_msg": "nfsd: stricter decoding of write-like NFSv2/v3 ops" + "CVE-2022-0168": { + "cmt_msg": "cifs: fix NULL ptr dereference in smb2_ioctl_query_info()" }, - "CVE-2018-14614": { - "cmt_msg": "f2fs: fix to do sanity check with cp_pack_start_sum" + "CVE-2023-52597": { + "cmt_msg": "KVM: s390: fix setting of fpc register" }, - "CVE-2018-14617": { - "cmt_msg": "hfsplus: fix NULL dereference in hfsplus_lookup()" + "CVE-2024-26622": { + "cmt_msg": "tomoyo: fix UAF write bug in tomoyo_write_control()" }, - "CVE-2018-14616": { - "cmt_msg": "f2fs: fix to do sanity check with block address in main area v2" + "CVE-2020-26556": { + "cmt_msg": "" }, - "CVE-2018-14611": { - "cmt_msg": "btrfs: validate type when reading a chunk" + "CVE-2023-0615": { + "cmt_msg": "media: vivid: dev->bitmap_cap wasn't freed in all cases" }, - "CVE-2018-14610": { - "cmt_msg": "btrfs: Check that each block group has corresponding chunk at mount time" + "CVE-2024-26672": { + "cmt_msg": "drm/amdgpu: Fix variable 'mca_funcs' dereferenced before NULL check in 'amdgpu_mca_smu_get_mca_entry()'" }, - "CVE-2018-14613": { - "cmt_msg": "btrfs: tree-checker: Verify block_group_item" + "CVE-2023-52527": { + "cmt_msg": "ipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data()" }, - "CVE-2018-14612": { - "cmt_msg": "btrfs: tree-checker: Detect invalid and empty essential trees" + "CVE-2023-3006": { + "cmt_msg": "arm64: Add AMPERE1 to the Spectre-BHB affected list" }, - "CVE-2020-26145": { - "cmt_msg": "ath10k: drop fragments with multicast DA for PCIe" + "CVE-2024-26787": { + "cmt_msg": "mmc: mmci: stm32: fix DMA API overlapping mappings warning" }, - "CVE-2017-13216": { - "cmt_msg": "staging: android: ashmem: fix a race condition in ASHMEM_SET_SIZE ioctl" + "CVE-2023-52522": { + "cmt_msg": "net: fix possible store tearing in neigh_periodic_work()" }, - "CVE-2020-26147": { - "cmt_msg": "mac80211: assure all fragments are encrypted" + "CVE-2022-3586": { + "cmt_msg": "sch_sfb: Don't assume the skb is still around after enqueueing to child" }, - "CVE-2018-5814": { - "cmt_msg": "usbip: usbip_host: fix NULL-ptr deref and use-after-free errors" + "CVE-2024-0641": { + "cmt_msg": "tipc: fix a potential deadlock on &tx->lock" }, - "CVE-2020-26140": { - "cmt_msg": "" + "CVE-2024-26636": { + "cmt_msg": "llc: make llc_ui_sendmsg() more robust against bonding changes" }, - "CVE-2020-26143": { - "cmt_msg": "" + "CVE-2024-26779": { + "cmt_msg": "wifi: mac80211: fix race condition on enabling fast-xmit" }, - "CVE-2020-26142": { - "cmt_msg": "" + "CVE-2024-26586": { + "cmt_msg": "mlxsw: spectrum_acl_tcam: Fix stack corruption" }, - "CVE-2019-17053": { - "cmt_msg": "ieee802154: enforce CAP_NET_RAW for raw sockets" + "CVE-2023-52528": { + "cmt_msg": "net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg" }, - "CVE-2019-17052": { - "cmt_msg": "ax25: enforce CAP_NET_RAW for raw sockets" + "CVE-2020-27825": { + "cmt_msg": "tracing: Fix race in trace_open and buffer resize call" }, - "CVE-2017-14497": { - "cmt_msg": "packet: Don't write vnet header beyond end of buffer" + "CVE-2024-26623": { + "cmt_msg": "pds_core: Prevent race issues involving the adminq" }, - "CVE-2020-27418": { - "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region" + "CVE-2020-27820": { + "cmt_msg": "drm/nouveau: use drm_dev_unplug() during device removal" }, - "CVE-2019-17056": { - "cmt_msg": "nfc: enforce CAP_NET_RAW for raw sockets" + "CVE-2023-1078": { + "cmt_msg": "rds: rds_rm_zerocopy_callback() use list_first_entry()" }, - "CVE-2019-17055": { - "cmt_msg": "mISDN: enforce CAP_NET_RAW for raw sockets" + "CVE-2023-39197": { + "cmt_msg": "netfilter: conntrack: dccp: copy entire header to stack buffer, not just basic one" }, - "CVE-2019-17054": { - "cmt_msg": "appletalk: enforce CAP_NET_RAW for raw sockets" + "CVE-2020-15852": { + "cmt_msg": "x86/ioperm: Fix io bitmap invalidation on Xen PV" }, - "CVE-2018-13093": { - "cmt_msg": "xfs: validate cached inodes are free when allocated" + "CVE-2023-4622": { + "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES" }, - "CVE-2017-2618": { - "cmt_msg": "selinux: fix off-by-one in setprocattr" + "CVE-2020-26558": { + "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical" }, - "CVE-2023-51781": { - "cmt_msg": "appletalk: Fix Use-After-Free in atalk_ioctl" + "CVE-2023-39193": { + "cmt_msg": "netfilter: xt_sctp: validate the flag_info count" }, - "CVE-2018-13096": { - "cmt_msg": "f2fs: fix to do sanity check with node footer and iblocks" + "CVE-2023-1079": { + "cmt_msg": "HID: asus: use spinlock to safely schedule workers" }, - "CVE-2018-13097": { - "cmt_msg": "f2fs: fix to do sanity check with user_block_count" + "CVE-2020-26541": { + "cmt_msg": "certs: Add EFI_CERT_X509_GUID support for dbx entries" }, - "CVE-2018-13094": { - "cmt_msg": "xfs: don't call xfs_da_shrink_inode with NULL bp" + "CVE-2023-6610": { + "cmt_msg": "smb: client: fix potential OOB in smb2_dump_detail()" }, - "CVE-2018-13095": { - "cmt_msg": "xfs: More robust inode extent count validation" + "CVE-2024-26600": { + "cmt_msg": "phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP" }, - "CVE-2020-29661": { - "cmt_msg": "tty: Fix ->pgrp locking in tiocspgrp()" + "CVE-2023-3390": { + "cmt_msg": "netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE" }, - "CVE-2020-29660": { - "cmt_msg": "tty: Fix ->session locking" + "CVE-2023-28328": { + "cmt_msg": "media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer()" }, - "CVE-2018-13098": { - "cmt_msg": "f2fs: fix to do sanity check with extra_attr feature" + "CVE-2020-26143": { + "cmt_msg": "" }, - "CVE-2018-13099": { - "cmt_msg": "f2fs: fix to do sanity check with reserved blkaddr of inline inode" + "CVE-2023-3111": { + "cmt_msg": "btrfs: unset reloc control if transaction commit fails in prepare_to_relocate()" }, - "CVE-2022-1734": { - "cmt_msg": "nfc: nfcmrvl: main: reorder destructive operations in nfcmrvl_nci_unregister_dev to avoid bugs" + "CVE-2021-33061": { + "cmt_msg": "ixgbe: add improvement for MDD response functionality" }, - "CVE-2017-15951": { - "cmt_msg": "KEYS: Fix race between updating and finding a negative key" + "CVE-2024-26764": { + "cmt_msg": "fs/aio: Restrict kiocb_set_cancel_fn() to I/O submitted via libaio" }, - "CVE-2023-28772": { - "cmt_msg": "seq_buf: Fix overflow in seq_buf_putmem_hex()" + "CVE-2024-26767": { + "cmt_msg": "drm/amd/display: fixed integer types and null check locations" }, - "CVE-2019-14895": { - "cmt_msg": "mwifiex: fix possible heap overflow in mwifiex_process_country_ie()" + "CVE-2024-26766": { + "cmt_msg": "IB/hfi1: Fix sdma.h tx->num_descs off-by-one error" }, - "CVE-2022-24448": { - "cmt_msg": "NFSv4: Handle case where the lookup of a directory fails" + "CVE-2024-26589": { + "cmt_msg": "bpf: Reject variable offset alu on PTR_TO_FLOW_KEYS" }, - "CVE-2019-11884": { - "cmt_msg": "Bluetooth: hidp: fix buffer overflow" + "CVE-2023-3389": { + "cmt_msg": "io_uring: mutex locked poll hashing" }, - "CVE-2021-40490": { - "cmt_msg": "ext4: fix race writing to an inline_data file while its xattrs are changing" + "CVE-2023-1476": { + "cmt_msg": "" }, - "CVE-2023-4134": { - "cmt_msg": "Input: cyttsp4_core - change del_timer_sync() to timer_shutdown_sync()" + "CVE-2023-4010": { + "cmt_msg": "" }, - "CVE-2019-19074": { - "cmt_msg": "ath9k: release allocated buffer if timed out" + "CVE-2021-3864": { + "cmt_msg": "" }, - "CVE-2019-18683": { - "cmt_msg": "media: vivid: Fix wrong locking that causes race conditions on streaming stop" + "CVE-2024-26770": { + "cmt_msg": "HID: nvidia-shield: Add missing null pointer checks to LED initialization" }, - "CVE-2022-2503": { - "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag" + "CVE-2022-1652": { + "cmt_msg": "floppy: use a statically allocated error counter" }, - "CVE-2022-48619": { - "cmt_msg": "Input: add bounds checking to input_set_capability()" + "CVE-2023-4623": { + "cmt_msg": "net/sched: sch_hfsc: Ensure inner classes have fsc curve" }, - "CVE-2019-18680": { - "cmt_msg": "unknown" + "CVE-2021-47043": { + "cmt_msg": "media: venus: core: Fix some resource leaks in the error path of 'venus_probe()'" }, - "CVE-2020-26558": { - "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical" + "CVE-2024-23849": { + "cmt_msg": "net/rds: Fix UBSAN: array-index-out-of-bounds in rds_cmsg_recv" }, - "CVE-2022-23038": { - "cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()" + "CVE-2020-29568": { + "cmt_msg": "xen/xenbus: Allow watches discard events before queueing" }, - "CVE-2017-1000410": { - "cmt_msg": "Bluetooth: Prevent stack info leak from the EFS element." + "CVE-2020-29569": { + "cmt_msg": "xen-blkback: set ring->xenblkd to NULL after kthread_stop()" }, - "CVE-2016-8645": { - "cmt_msg": "tcp: take care of truncations done by sk_filter()" + "CVE-2020-14351": { + "cmt_msg": "perf/core: Fix race in the perf_mmap_close() function" }, - "CVE-2022-20158": { - "cmt_msg": "net/packet: fix slab-out-of-bounds access in packet_recvmsg()" + "CVE-2023-51043": { + "cmt_msg": "drm/atomic: Fix potential use-after-free in nonblocking commits" }, - "CVE-2022-23037": { - "cmt_msg": "xen/netfront: don't use gnttab_query_foreign_access() for mapped status" + "CVE-2022-1966": { + "cmt_msg": "netfilter: nf_tables: disallow non-stateful expression in sets earlier" }, - "CVE-2023-20588": { - "cmt_msg": "x86/CPU/AMD: Do not leak quotient data after a division by 0" + "CVE-2020-14356": { + "cmt_msg": "cgroup: fix cgroup_sk_alloc() for sk_clone_lock()" }, - "CVE-2017-5669": { - "cmt_msg": "ipc/shm: Fix shmat mmap nil-page protection" + "CVE-2022-20132": { + "cmt_msg": "HID: add hid_is_usb() function to make it simpler for USB detection" }, - "CVE-2019-15927": { - "cmt_msg": "ALSA: usb-audio: Avoid access before bLength check in build_audio_procunit()" + "CVE-2022-2977": { + "cmt_msg": "tpm: fix reference counting for struct tpm_chip" }, - "CVE-2019-15926": { - "cmt_msg": "ath6kl: add some bounds checking" + "CVE-2022-20424": { + "cmt_msg": "io_uring: remove io_identity" }, - "CVE-2019-14821": { - "cmt_msg": "KVM: coalesced_mmio: add bounds checking" + "CVE-2020-0423": { + "cmt_msg": "binder: fix UAF when releasing todo list" }, - "CVE-2020-12826": { - "cmt_msg": "signal: Extend exec_id to 64bits" + "CVE-2022-23222": { + "cmt_msg": "bpf: Replace PTR_TO_XXX_OR_NULL with PTR_TO_XXX | PTR_MAYBE_NULL" }, - "CVE-2019-3701": { - "cmt_msg": "can: gw: ensure DLC boundaries after CAN frame modification" + "CVE-2022-1789": { + "cmt_msg": "KVM: x86/mmu: fix NULL pointer dereference on guest INVPCID" }, - "CVE-2021-42008": { - "cmt_msg": "net: 6pack: fix slab-out-of-bounds in decode_data" + "CVE-2016-8660": { + "cmt_msg": "" }, - "CVE-2022-39188": { - "cmt_msg": "mmu_gather: Force tlb-flush VM_PFNMAP vmas" + "CVE-2023-6270": { + "cmt_msg": "aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts" }, - "CVE-2018-9465": { - "cmt_msg": "binder: fix proc->files use-after-free" + "CVE-2023-3090": { + "cmt_msg": "ipvlan:Fix out-of-bounds caused by unclear skb->cb" }, - "CVE-2019-1125": { - "cmt_msg": "x86/speculation: Prepare entry code for Spectre v1 swapgs mitigations" + "CVE-2022-20422": { + "cmt_msg": "arm64: fix oops in concurrently setting insn_emulation sysctls" }, - "CVE-2019-15218": { - "cmt_msg": "media: usb: siano: Fix general protection fault in smsusb" + "CVE-2023-3772": { + "cmt_msg": "xfrm: add NULL check in xfrm_update_ae_params" }, - "CVE-2019-15666": { - "cmt_msg": "xfrm: policy: Fix out-of-bound array accesses in __xfrm_policy_unlink" + "CVE-2023-45862": { + "cmt_msg": "USB: ene_usb6250: Allocate enough memory for full object" }, - "CVE-2005-3660": { - "cmt_msg": "" + "CVE-2023-45863": { + "cmt_msg": "kobject: Fix slab-out-of-bounds in fill_kobj_path()" }, - "CVE-2017-14106": { - "cmt_msg": "tcp: initialize rcv_mss to TCP_MIN_MSS instead of 0" + "CVE-2023-1582": { + "cmt_msg": "fs/proc: task_mmu.c: don't read mapcount for migration entry" }, - "CVE-2019-15212": { - "cmt_msg": "USB: rio500: refuse more than one device at a time" + "CVE-2021-47162": { + "cmt_msg": "tipc: skb_linearize the head skb when reassembling msgs" }, - "CVE-2019-15211": { - "cmt_msg": "media: radio-raremono: change devm_k*alloc to k*alloc" + "CVE-2022-21166": { + "cmt_msg": "x86/speculation/mmio: Enable CPU Fill buffer clearing on idle" }, - "CVE-2023-1095": { - "cmt_msg": "netfilter: nf_tables: fix null deref due to zeroed list head" + "CVE-2020-25669": { + "cmt_msg": "Input: sunkbd - avoid use-after-free in teardown paths" }, - "CVE-2015-1350": { - "cmt_msg": "fs: Avoid premature clearing of capabilities" + "CVE-2020-25668": { + "cmt_msg": "tty: make FONTX ioctl use the tty pointer they were actually passed" }, - "CVE-2019-14896": { - "cmt_msg": "libertas: Fix two buffer overflows at parsing bss descriptor" + "CVE-2008-4609": { + "cmt_msg": "" }, - "CVE-2017-1000380": { - "cmt_msg": "ALSA: timer: Fix race between read and ioctl" + "CVE-2020-25705": { + "cmt_msg": "icmp: randomize the global rate limiter" }, - "CVE-2019-15214": { - "cmt_msg": "ALSA: core: Fix card races between register and disconnect" + "CVE-2022-20421": { + "cmt_msg": "binder: fix UAF of ref->proc caused by race condition" }, - "CVE-2020-24588": { - "cmt_msg": "cfg80211: mitigate A-MSDU aggregation attacks" + "CVE-2022-0435": { + "cmt_msg": "tipc: improve size validations for received domain records" }, - "CVE-2021-33034": { - "cmt_msg": "Bluetooth: verify AMP hci_chan before amp_destroy" + "CVE-2022-20565": { + "cmt_msg": "HID: core: Correctly handle ReportSize being zero" }, - "CVE-2019-19922": { - "cmt_msg": "sched/fair: Fix low cpu usage with high throttling by removing expiration of cpu-local slices" + "CVE-2023-6356": { + "cmt_msg": "nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length" }, - "CVE-2023-5717": { - "cmt_msg": "perf: Disallow mis-matched inherited group reads" + "CVE-2024-26744": { + "cmt_msg": "RDMA/srpt: Support specifying the srpt_service_guid parameter" }, - "CVE-2019-19927": { - "cmt_msg": "drm/ttm: fix incrementing the page pointer for huge pages" + "CVE-2024-26648": { + "cmt_msg": "drm/amd/display: Fix variable deferencing before NULL check in edp_setup_replay()" }, - "CVE-2017-18509": { - "cmt_msg": "ipv6: check sk sk_type and protocol early in ip_mroute_set/getsockopt" + "CVE-2021-4135": { + "cmt_msg": "netdevsim: Zero-initialize memory for new map's value in function nsim_bpf_map_alloc" }, - "CVE-2017-5986": { - "cmt_msg": "sctp: avoid BUG_ON on sctp_wait_for_sndbuf" + "CVE-2023-26607": { + "cmt_msg": "ntfs: fix out-of-bounds read in ntfs_attr_find()" }, - "CVE-2022-44032": { - "cmt_msg": "char: pcmcia: remove all the drivers" + "CVE-2023-52513": { + "cmt_msg": "RDMA/siw: Fix connection failure handling" }, - "CVE-2024-23307": { - "cmt_msg": "" + "CVE-2019-15239": { + "cmt_msg": "unknown" }, - "CVE-2020-8648": { - "cmt_msg": "vt: selection, close sel_buffer race" + "CVE-2022-3534": { + "cmt_msg": "libbpf: Fix use-after-free in btf_dump_name_dups" }, - "CVE-2022-32296": { - "cmt_msg": "tcp: increase source port perturb table to 2^16" + "CVE-2023-52635": { + "cmt_msg": "PM / devfreq: Synchronize devfreq_monitor_[start/stop]" }, - "CVE-2017-11600": { - "cmt_msg": "xfrm: policy: check policy direction value" + "CVE-2023-52469": { + "cmt_msg": "drivers/amd/pm: fix a use-after-free in kv_parse_power_table" }, - "CVE-2023-3567": { - "cmt_msg": "vc_screen: move load of struct vc_data pointer in vcs_read() to avoid UAF" + "CVE-2023-52594": { + "cmt_msg": "wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus()" }, - "CVE-2019-20806": { - "cmt_msg": "media: tw5864: Fix possible NULL pointer dereference in tw5864_handle_frame" + "CVE-2023-4387": { + "cmt_msg": "net: vmxnet3: fix possible use-after-free bugs in vmxnet3_rq_alloc_rx_buf()" }, - "CVE-2022-3028": { - "cmt_msg": "af_key: Do not call xfrm_probe_algs in parallel" + "CVE-2021-4037": { + "cmt_msg": "xfs: fix up non-directory creation in SGID directories" }, - "CVE-2019-2181": { - "cmt_msg": "binder: check for overflow when alloc for security context" + "CVE-2021-22543": { + "cmt_msg": "KVM: do not allow mapping valid but non-reference-counted pages" }, - "CVE-2020-14304": { + "CVE-2022-45884": { "cmt_msg": "" }, - "CVE-2010-5321": { + "CVE-2021-3348": { + "cmt_msg": "nbd: freeze the queue while we're adding connections" + }, + "CVE-2022-21505": { + "cmt_msg": "lockdown: Fix kexec lockdown bypass with ima policy" + }, + "CVE-2023-20941": { "cmt_msg": "" }, - "CVE-2020-15393": { - "cmt_msg": "usb: usbtest: fix missing kfree(dev->buf) in usbtest_disconnect" + "CVE-2024-26773": { + "cmt_msg": "ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found()" }, - "CVE-2022-33981": { - "cmt_msg": "floppy: disable FDRAWCMD by default" + "CVE-2023-2194": { + "cmt_msg": "i2c: xgene-slimpro: Fix out-of-bounds bug in xgene_slimpro_i2c_xfer()" }, - "CVE-2021-3564": { - "cmt_msg": "Bluetooth: fix the erroneous flush_work() order" + "CVE-2021-3347": { + "cmt_msg": "futex: Ensure the correct return value from futex_lock_pi()" }, - "CVE-2019-9506": { - "cmt_msg": "Bluetooth: Fix faulty expression for minimum encryption key size check" + "CVE-2020-10135": { + "cmt_msg": "Bluetooth: Consolidate encryption handling in hci_encrypt_cfm" }, - "CVE-2023-1476": { - "cmt_msg": "" + "CVE-2021-47169": { + "cmt_msg": "serial: rp2: use 'request_firmware' instead of 'request_firmware_nowait'" }, - "CVE-2017-16995": { - "cmt_msg": "bpf: fix incorrect sign extension in check_alu_op()" + "CVE-2024-26784": { + "cmt_msg": "pmdomain: arm: Fix NULL dereference on scmi_perf_domain removal" }, - "CVE-2017-16994": { - "cmt_msg": "mm/pagewalk.c: report holes in hugetlb ranges" + "CVE-2021-47168": { + "cmt_msg": "NFS: fix an incorrect limit in filelayout_decode_layout()" }, - "CVE-2019-2025": { - "cmt_msg": "binder: fix race that allows malicious free of live buffer" + "CVE-2021-3587": { + "cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect" }, - "CVE-2017-2583": { - "cmt_msg": "KVM: x86: fix emulation of \"MOV SS, null selector\"" + "CVE-2021-44733": { + "cmt_msg": "tee: handle lookup of shm with reference count 0" }, - "CVE-2020-26560": { + "CVE-2022-3533": { "cmt_msg": "" }, - "CVE-2017-2584": { - "cmt_msg": "KVM: x86: Introduce segmented_write_std" + "CVE-2021-47138": { + "cmt_msg": "cxgb4: avoid accessing registers when clearing filters" }, - "CVE-2023-39198": { - "cmt_msg": "drm/qxl: fix UAF on handle creation" + "CVE-2022-3535": { + "cmt_msg": "net: mvpp2: fix mvpp2 debugfs leak" }, - "CVE-2017-13080": { - "cmt_msg": "mac80211: accept key reinstall without changing anything" + "CVE-2021-47135": { + "cmt_msg": "mt76: mt7921: fix possible AOOB issue in mt7921_mcu_tx_rate_report" }, - "CVE-2021-20321": { - "cmt_msg": "ovl: fix missing negative dentry check in ovl_rename()" + "CVE-2021-47136": { + "cmt_msg": "net: zero-initialize tc skb extension on allocation" }, - "CVE-2018-12127": { - "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" + "CVE-2021-47137": { + "cmt_msg": "net: lantiq: fix memory corruption in RX ring" }, - "CVE-2018-12126": { - "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" + "CVE-2024-26808": { + "cmt_msg": "netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain" }, - "CVE-2022-23816": { - "cmt_msg": "x86/kvm/vmx: Make noinstr clean" + "CVE-2021-47131": { + "cmt_msg": "net/tls: Fix use-after-free after the TLS device goes down and up" }, - "CVE-2020-36158": { - "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_cmd_802_11_ad_hoc_start" + "CVE-2020-36766": { + "cmt_msg": "cec-api: prevent leaking memory through hole in structure" }, - "CVE-2017-9077": { - "cmt_msg": "ipv6/dccp: do not inherit ipv6_mc_list from parent" + "CVE-2021-47133": { + "cmt_msg": "HID: amd_sfh: Fix memory leak in amd_sfh_work" }, - "CVE-2017-9076": { - "cmt_msg": "ipv6/dccp: do not inherit ipv6_mc_list from parent" + "CVE-2021-46994": { + "cmt_msg": "can: mcp251x: fix resume from sleep before interface was brought up" }, - "CVE-2017-9075": { - "cmt_msg": "sctp: do not inherit ipv6_{mc|ac|fl}_list from parent" + "CVE-2024-26675": { + "cmt_msg": "ppp_async: limit MRU to 64K" }, - "CVE-2017-9074": { - "cmt_msg": "ipv6: Prevent overrun when parsing v6 header options" + "CVE-2022-3061": { + "cmt_msg": "video: fbdev: i740fb: Error out if 'pixclock' equals zero" }, - "CVE-2022-20572": { - "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag" + "CVE-2021-46991": { + "cmt_msg": "i40e: Fix use-after-free in i40e_client_subtask()" }, - "CVE-2018-10021": { - "cmt_msg": "scsi: libsas: defer ata device eh commands to libata" + "CVE-2021-46993": { + "cmt_msg": "sched: Fix out-of-bound access in uclamp" }, - "CVE-2022-20132": { - "cmt_msg": "HID: add hid_is_usb() function to make it simpler for USB detection" + "CVE-2021-46992": { + "cmt_msg": "netfilter: nftables: avoid overflows in nft_hash_buckets()" }, - "CVE-2019-2024": { - "cmt_msg": "media: em28xx: Fix use-after-free when disconnecting" + "CVE-2023-6121": { + "cmt_msg": "nvmet: nul-terminate the NQNs passed in the connect command" }, - "CVE-2023-39194": { - "cmt_msg": "net: xfrm: Fix xfrm_address_filter OOB read" + "CVE-2023-28327": { + "cmt_msg": "af_unix: Get user_ns from in_skb in unix_diag_get_exact()." }, - "CVE-2020-0067": { - "cmt_msg": "f2fs: fix to avoid memory leakage in f2fs_listxattr" + "CVE-2023-52638": { + "cmt_msg": "can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock" }, - "CVE-2019-10126": { - "cmt_msg": "mwifiex: Fix heap overflow in mwifiex_uap_parse_tail_ies()" + "CVE-2021-46998": { + "cmt_msg": "ethernet:enic: Fix a use after free bug in enic_hard_start_xmit" }, - "CVE-2023-3106": { - "cmt_msg": "xfrm: fix crash in XFRM_MSG_GETSA netlink handler" + "CVE-2017-13693": { + "cmt_msg": "" }, - "CVE-2019-10124": { - "cmt_msg": "mm: hwpoison: fix thp split handing in soft_offline_in_use_page()" + "CVE-2021-47151": { + "cmt_msg": "interconnect: qcom: bcm-voter: add a missing of_node_put()" }, - "CVE-2020-14353": { - "cmt_msg": "KEYS: prevent creating a different user's keyrings" + "CVE-2017-13694": { + "cmt_msg": "" }, - "CVE-2020-13974": { - "cmt_msg": "vt: keyboard: avoid signed integer overflow in k_ascii" + "CVE-2022-42721": { + "cmt_msg": "wifi: cfg80211: avoid nontransmitted BSS list corruption" }, - "CVE-2016-6213": { - "cmt_msg": "mnt: Add a per mount namespace limit on the number of mounts" + "CVE-2020-24490": { + "cmt_msg": "Bluetooth: fix kernel oops in store_pending_adv_report" }, - "CVE-2021-4083": { - "cmt_msg": "fget: check that the fd still exists after getting a ref to it" + "CVE-2021-4149": { + "cmt_msg": "btrfs: unlock newly allocated extent buffer after error" }, - "CVE-2023-33288": { - "cmt_msg": "power: supply: bq24190: Fix use after free bug in bq24190_remove due to race condition" + "CVE-2021-4148": { + "cmt_msg": "mm: khugepaged: skip huge page collapse for special files" }, - "CVE-2017-17558": { - "cmt_msg": "USB: core: prevent malicious bNumInterfaces overflow" + "CVE-2022-42895": { + "cmt_msg": "Bluetooth: L2CAP: Fix attempting to access uninitialized memory" }, - "CVE-2017-1000251": { - "cmt_msg": "Bluetooth: Properly check L2CAP config option output buffer length" + "CVE-2021-3640": { + "cmt_msg": "Bluetooth: sco: Fix lock_sock() blockage by memcpy_from_msg()" }, - "CVE-2017-1000252": { - "cmt_msg": "KVM: VMX: Do not BUG() on out-of-bounds guest IRQ" + "CVE-2021-3764": { + "cmt_msg": "crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd()" }, - "CVE-2022-29901": { - "cmt_msg": "x86/kvm/vmx: Make noinstr clean" + "CVE-2021-3760": { + "cmt_msg": "nfc: nci: fix the UAF of rf_conn_info object" }, - "CVE-2021-4197": { - "cmt_msg": "cgroup: Use open-time credentials for process migraton perm checks" + "CVE-2022-48627": { + "cmt_msg": "vt: fix memory overlapping when deleting chars in the buffer" }, - "CVE-2018-12233": { - "cmt_msg": "jfs: Fix inconsistency between memory allocation and ea_buf->max_size" + "CVE-2023-52593": { + "cmt_msg": "wifi: wfx: fix possible NULL pointer dereference in wfx_set_mfp_ap()" }, - "CVE-2019-19227": { - "cmt_msg": "appletalk: Fix potential NULL pointer dereference in unregister_snap_client" + "CVE-2022-4382": { + "cmt_msg": "USB: gadgetfs: Fix race between mounting and unmounting" }, - "CVE-2020-10751": { - "cmt_msg": "selinux: properly handle multiple messages in selinux_netlink_send()" + "CVE-2021-47180": { + "cmt_msg": "NFC: nci: fix memory leak in nci_allocate_device" }, - "CVE-2019-19377": { - "cmt_msg": "btrfs: Don't submit any btree write bio if the fs has errors" + "CVE-2022-48628": { + "cmt_msg": "ceph: drop messages from MDS when unmounting" }, - "CVE-2023-39192": { - "cmt_msg": "netfilter: xt_u32: validate user space input" + "CVE-2022-48629": { + "cmt_msg": "crypto: qcom-rng - ensure buffer for generate is completely filled" }, - "CVE-2020-10757": { - "cmt_msg": "mm: Fix mremap not considering huge pmd devmap" + "CVE-2020-10732": { + "cmt_msg": "fs/binfmt_elf.c: allocate initialized memory in fill_thread_core_info()" }, - "CVE-2018-20511": { - "cmt_msg": "net/appletalk: fix minor pointer leak to userspace in SIOCFINDIPDDPRT" + "CVE-2020-28097": { + "cmt_msg": "vgacon: remove software scrollback support" }, - "CVE-2018-20510": { - "cmt_msg": "binder: replace \"%p\" with \"%pK\"" + "CVE-2024-24859": { + "cmt_msg": "" }, - "CVE-2020-15437": { - "cmt_msg": "serial: 8250: fix null-ptr-deref in serial8250_start_tx()" + "CVE-2022-0322": { + "cmt_msg": "sctp: account stream padding length for reconf chunk" }, - "CVE-2020-15436": { - "cmt_msg": "block: Fix use-after-free in blkdev_get()" + "CVE-2024-24855": { + "cmt_msg": "scsi: lpfc: Fix a possible data race in lpfc_unregister_fcf_rescan()" }, - "CVE-2022-1116": { + "CVE-2024-24857": { "cmt_msg": "" }, - "CVE-2021-28660": { - "cmt_msg": "staging: rtl8188eu: prevent ->ssid overflow in rtw_wx_set_scan()" + "CVE-2023-0386": { + "cmt_msg": "ovl: fail on invalid uid/gid mapping at copy up" }, - "CVE-2016-9178": { - "cmt_msg": "fix minor infoleak in get_user_ex()" + "CVE-2021-29264": { + "cmt_msg": "gianfar: fix jumbo packets+napi+rx overrun crash" }, - "CVE-2020-8647": { - "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region" + "CVE-2021-29265": { + "cmt_msg": "usbip: fix stub_dev usbip_sockfd_store() races leading to gpf" }, - "CVE-2019-0155": { - "cmt_msg": "drm/i915: Rename gen7 cmdparser tables" + "CVE-2024-26673": { + "cmt_msg": "netfilter: nft_ct: sanitize layer 3 and 4 protocol number in custom expectations" }, - "CVE-2019-0154": { - "cmt_msg": "drm/i915: Lower RM timeout to avoid DSI hard hangs" + "CVE-2021-39648": { + "cmt_msg": "usb: gadget: configfs: Fix use-after-free issue with udc_name" }, - "CVE-2023-35827": { - "cmt_msg": "ravb: Fix use-after-free issue in ravb_tx_timeout_work()" + "CVE-2022-3545": { + "cmt_msg": "nfp: fix use-after-free in area_cache_get()" }, - "CVE-2020-36386": { - "cmt_msg": "Bluetooth: Fix slab-out-of-bounds read in hci_extended_inquiry_result_evt()" + "CVE-2021-43056": { + "cmt_msg": "KVM: PPC: Book3S HV: Make idle_kvm_start_guest() return 0 if it went to guest" }, - "CVE-2017-6348": { - "cmt_msg": "irda: Fix lockdep annotations in hashbin_delete()." + "CVE-2023-52569": { + "cmt_msg": "btrfs: remove BUG() after failure to insert delayed dir index item" }, - "CVE-2022-3566": { - "cmt_msg": "tcp: Fix data races around icsk->icsk_af_ops." + "CVE-2023-52568": { + "cmt_msg": "x86/sgx: Resolves SECS reclaim vs. page fault for EAUG race" }, - "CVE-2022-3565": { - "cmt_msg": "mISDN: fix use-after-free bugs in l1oip timer handlers" + "CVE-2022-3542": { + "cmt_msg": "bnx2x: fix potential memory leak in bnx2x_tpa_stop()" }, - "CVE-2022-3564": { - "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free caused by l2cap_reassemble_sdu" + "CVE-2023-52563": { + "cmt_msg": "drm/meson: fix memory leak on ->hpd_notify callback" }, - "CVE-2018-19407": { - "cmt_msg": "KVM: X86: Fix scan ioapic use-before-initialization" + "CVE-2021-47001": { + "cmt_msg": "xprtrdma: Fix cwnd update ordering" }, - "CVE-2017-6345": { - "cmt_msg": "net/llc: avoid BUG_ON() in skb_orphan()" + "CVE-2023-52561": { + "cmt_msg": "arm64: dts: qcom: sdm845-db845c: Mark cont splash memory region as reserved" }, - "CVE-2017-6346": { - "cmt_msg": "packet: fix races in fanout_add()" + "CVE-2021-47004": { + "cmt_msg": "f2fs: fix to avoid touching checkpointed data in get_victim()" }, - "CVE-2017-6347": { - "cmt_msg": "ip: fix IP_CHECKSUM handling" + "CVE-2021-47005": { + "cmt_msg": "PCI: endpoint: Fix NULL pointer dereference for ->get_features()" }, - "CVE-2022-3628": { - "cmt_msg": "wifi: brcmfmac: Fix potential buffer overflow in brcmf_fweh_event_worker()" + "CVE-2021-21781": { + "cmt_msg": "ARM: ensure the signal page contains defined contents" }, - "CVE-2022-1048": { - "cmt_msg": "ALSA: pcm: Fix races among concurrent hw_params and hw_free calls" + "CVE-2021-0512": { + "cmt_msg": "HID: make arrays usage and value to be the same" }, - "CVE-2019-14897": { - "cmt_msg": "libertas: Fix two buffer overflows at parsing bss descriptor" + "CVE-2021-46929": { + "cmt_msg": "sctp: use call_rcu to free endpoint" }, - "CVE-2018-9385": { - "cmt_msg": "ARM: amba: Don't read past the end of sysfs \"driver_override\" buffer" + "CVE-2023-1382": { + "cmt_msg": "tipc: set con sock in tipc_conn_alloc" }, - "CVE-2020-0009": { - "cmt_msg": "staging: android: ashmem: Disallow ashmem memory from being remapped" + "CVE-2021-46921": { + "cmt_msg": "locking/qrwlock: Fix ordering in queued_write_lock_slowpath()" }, - "CVE-2023-52340": { - "cmt_msg": "ipv6: remove max_size check inline with ipv4" + "CVE-2023-1380": { + "cmt_msg": "wifi: brcmfmac: slab-out-of-bounds read in brcmf_get_assoc_ies()" }, - "CVE-2023-31082": { + "CVE-2021-46924": { + "cmt_msg": "NFC: st21nfca: Fix memory leak in device probe and remove" + }, + "CVE-2021-46925": { + "cmt_msg": "net/smc: fix kernel panic caused by race of smc_sock" + }, + "CVE-2021-46926": { + "cmt_msg": "ALSA: hda: intel-sdw-acpi: harden detection of controller" + }, + "CVE-2020-0347": { "cmt_msg": "" }, - "CVE-2022-3567": { - "cmt_msg": "ipv6: Fix data races around sk->sk_prot." + "CVE-2023-52591": { + "cmt_msg": "reiserfs: Avoid touching renamed directory if parent does not change" }, - "CVE-2018-7480": { - "cmt_msg": "blkcg: fix double free of new_blkg in blkcg_init_queue" + "CVE-2022-41222": { + "cmt_msg": "mm/mremap: hold the rmap lock in write mode when moving page table entries." }, - "CVE-2019-14615": { - "cmt_msg": "drm/i915/gen9: Clear residual context state on context switch" + "CVE-2021-40490": { + "cmt_msg": "ext4: fix race writing to an inline_data file while its xattrs are changing" }, - "CVE-2018-16871": { - "cmt_msg": "nfsd: COPY and CLONE operations require the saved filehandle to be set" + "CVE-2021-33909": { + "cmt_msg": "seq_file: disallow extremely large seq buffer allocations" }, - "CVE-2018-9415": { - "cmt_msg": "ARM: amba: Fix race condition with driver_override" + "CVE-2021-47129": { + "cmt_msg": "netfilter: nft_ct: skip expectations for confirmed conntrack" }, - "CVE-2023-52442": { - "cmt_msg": "ksmbd: validate session id and tree id in compound request" + "CVE-2023-23000": { + "cmt_msg": "phy: tegra: xusb: Fix return value of tegra_xusb_find_port_node function" }, - "CVE-2020-12771": { - "cmt_msg": "bcache: fix potential deadlock problem in btree_gc_coalesce" + "CVE-2019-12456": { + "cmt_msg": "" }, - "CVE-2019-13648": { - "cmt_msg": "powerpc/tm: Fix oops on sigreturn on systems without TM" + "CVE-2023-20569": { + "cmt_msg": "x86/bugs: Increase the x86 bugs vector size to two u32s" }, - "CVE-2023-0030": { - "cmt_msg": "drm/nouveau/mmu: add more general vmm free/node handling functions" + "CVE-2021-29646": { + "cmt_msg": "tipc: better validate user input in tipc_nl_retrieve_key()" }, - "CVE-2020-16120": { - "cmt_msg": "ovl: switch to mounter creds in readdir" + "CVE-2021-29647": { + "cmt_msg": "net: qrtr: fix a kernel-infoleak in qrtr_recvmsg()" }, - "CVE-2019-11599": { - "cmt_msg": "coredump: fix race condition between mmget_not_zero()/get_task_mm() and core dumping" + "CVE-2021-33656": { + "cmt_msg": "vt: drop old FONT ioctls" }, - "CVE-2018-16658": { - "cmt_msg": "cdrom: Fix info leak/OOB read in cdrom_ioctl_drive_status" + "CVE-2024-26720": { + "cmt_msg": "mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again" }, - "CVE-2018-15572": { - "cmt_msg": "x86/speculation: Protect against userspace-userspace spectreRSB" + "CVE-2021-33655": { + "cmt_msg": "fbcon: Disallow setting font bigger than screen size" }, - "CVE-2022-1204": { - "cmt_msg": "ax25: Fix refcount leaks caused by ax25_cb_del()" + "CVE-2022-41858": { + "cmt_msg": "drivers: net: slip: fix NPD bug in sl_tx_timeout()" }, - "CVE-2019-2101": { - "cmt_msg": "media: uvcvideo: Fix 'type' check leading to overflow" + "CVE-2024-26726": { + "cmt_msg": "btrfs: don't drop extent_map for free space inode on write error" }, - "CVE-2019-17666": { - "cmt_msg": "rtlwifi: Fix potential overflow on P2P code" + "CVE-2022-3176": { + "cmt_msg": "io_uring: fix UAF due to missing POLLFREE handling" }, - "CVE-2018-9363": { - "cmt_msg": "Bluetooth: hidp: buffer overflow in hidp_process_report" + "CVE-2023-1206": { + "cmt_msg": "tcp: Reduce chance of collisions in inet6_hashfn()." }, - "CVE-2016-10723": { - "cmt_msg": "mm, oom: remove sleep from under oom_lock" + "CVE-2022-41850": { + "cmt_msg": "HID: roccat: Fix use-after-free in roccat_read()" }, - "CVE-2021-3573": { - "cmt_msg": "Bluetooth: use correct lock to prevent UAF of hdev object" + "CVE-2023-52474": { + "cmt_msg": "IB/hfi1: Fix bugs with non-PAGE_SIZE-end multi-iovec user SDMA requests" }, - "CVE-2020-25212": { - "cmt_msg": "nfs: Fix getxattr kernel panic and memory overflow" + "CVE-2023-2985": { + "cmt_msg": "fs: hfsplus: fix UAF issue in hfsplus_put_super" }, - "CVE-2019-19036": { - "cmt_msg": "btrfs: Detect unbalanced tree with empty leaf before crashing btree operations" + "CVE-2020-14390": { + "cmt_msg": "fbcon: remove soft scrollback code" }, - "CVE-2019-3459": { - "cmt_msg": "Bluetooth: Verify that l2cap_get_conf_opt provides large enough buffer" + "CVE-2022-2938": { + "cmt_msg": "psi: Fix uaf issue when psi trigger is destroyed while being polled" }, - "CVE-2020-11494": { - "cmt_msg": "slcan: Don't transmit uninitialized stack data in padding" + "CVE-2022-3646": { + "cmt_msg": "nilfs2: fix leak of nilfs_root in case of writer thread creation failure" }, - "CVE-2017-8797": { - "cmt_msg": "nfsd: fix undefined behavior in nfsd4_layout_verify" + "CVE-2021-45469": { + "cmt_msg": "f2fs: fix to do sanity check on last xattr entry in __f2fs_setxattr()" }, - "CVE-2020-0444": { - "cmt_msg": "audit: fix error handling in audit_data_to_entry()" + "CVE-2022-1184": { + "cmt_msg": "ext4: verify dir block before splitting it" }, - "CVE-2018-10675": { - "cmt_msg": "mm/mempolicy: fix use after free when calling get_mempolicy" + "CVE-2022-3642": { + "cmt_msg": "" }, - "CVE-2017-16526": { - "cmt_msg": "uwb: properly check kthread_run return value" + "CVE-2022-3643": { + "cmt_msg": "xen/netback: Ensure protocol headers don't fall in the non-linear area" }, - "CVE-2017-16527": { - "cmt_msg": "ALSA: usb-audio: Kill stray URB at exiting" + "CVE-2024-0584": { + "cmt_msg": "ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet" }, - "CVE-2017-16525": { - "cmt_msg": "USB: serial: console: fix use-after-free after failed setup" + "CVE-2024-26700": { + "cmt_msg": "drm/amd/display: Fix MST Null Ptr for RV" }, - "CVE-2022-1836": { - "cmt_msg": "floppy: disable FDRAWCMD by default" + "CVE-2020-0465": { + "cmt_msg": "HID: core: Sanitize event code and type when mapping input" }, - "CVE-2021-32078": { - "cmt_msg": "ARM: footbridge: remove personal server platform" + "CVE-2021-1048": { + "cmt_msg": "fix regression in \"epoll: Keep a reference on files added to the check list\"" }, - "CVE-2022-30594": { - "cmt_msg": "ptrace: Check PTRACE_O_SUSPEND_SECCOMP permission on PTRACE_SEIZE" + "CVE-2023-52516": { + "cmt_msg": "dma-debug: don't call __dma_entry_alloc_check_leak() under free_entries_lock" }, - "CVE-2017-16528": { - "cmt_msg": "ALSA: seq: Cancel pending autoload work at unbinding device" + "CVE-2021-4218": { + "cmt_msg": "sysctl: pass kernel pointers to ->proc_handler" }, - "CVE-2017-16529": { - "cmt_msg": "ALSA: usb-audio: Check out-of-bounds access by corrupted buffer descriptor" + "CVE-2023-52515": { + "cmt_msg": "RDMA/srp: Do not call scsi_done() from srp_abort()" }, - "CVE-2019-11833": { - "cmt_msg": "ext4: zero out the unused memory region in the extent tree block" + "CVE-2020-0543": { + "cmt_msg": "x86/cpu: Add 'table' argument to cpu_matches()" }, - "CVE-2021-38205": { - "cmt_msg": "net: xilinx_emaclite: Do not print real IOMEM pointer" + "CVE-2023-52510": { + "cmt_msg": "ieee802154: ca8210: Fix a potential UAF in ca8210_probe" }, - "CVE-2016-7039": { - "cmt_msg": "net: add recursion limit to GRO" + "CVE-2023-3358": { + "cmt_msg": "HID: intel_ish-hid: Add check for ishtp_dma_tx_map" }, - "CVE-2020-0255": { - "cmt_msg": "selinux: properly handle multiple messages in selinux_netlink_send()" + "CVE-2023-52633": { + "cmt_msg": "um: time-travel: fix time corruption" }, - "CVE-2019-2215": { - "cmt_msg": "ANDROID: binder: remove waitqueue when thread exits." + "CVE-2024-0340": { + "cmt_msg": "vhost: use kzalloc() instead of kmalloc() followed by memset()" }, - "CVE-2021-3892": { + "CVE-2023-6535": { "cmt_msg": "" }, - "CVE-2021-38208": { - "cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect" + "CVE-2023-6536": { + "cmt_msg": "nvmet-tcp: fix a crash in nvmet_req_complete()" }, - "CVE-2017-18232": { - "cmt_msg": "scsi: libsas: direct call probe and destruct" + "CVE-2021-33624": { + "cmt_msg": "bpf: Inherit expanded/patched seen count from old aux data" }, - "CVE-2019-2213": { - "cmt_msg": "binder: fix possible UAF when freeing buffer" + "CVE-2020-15780": { + "cmt_msg": "ACPI: configfs: Disallow loading ACPI tables when locked down" }, - "CVE-2020-25211": { - "cmt_msg": "netfilter: ctnetlink: add a range check for l3/l4 protonum" + "CVE-2021-27365": { + "cmt_msg": "scsi: iscsi: Ensure sysfs attributes are limited to PAGE_SIZE" }, - "CVE-2017-14140": { - "cmt_msg": "Sanitize 'move_pages()' permission checks" + "CVE-2021-3752": { + "cmt_msg": "Bluetooth: fix use-after-free error in lock_sock_nested()" }, - "CVE-2020-26556": { - "cmt_msg": "" + "CVE-2021-27363": { + "cmt_msg": "scsi: iscsi: Restrict sessions and handles to admin capabilities" }, - "CVE-2018-9518": { - "cmt_msg": "NFC: llcp: Limit size of SDP URI" + "CVE-2022-23036": { + "cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()" }, - "CVE-2020-26555": { - "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical" + "CVE-2018-17977": { + "cmt_msg": "" }, - "CVE-2018-9517": { - "cmt_msg": "l2tp: pass tunnel pointer to ->session_create()" + "CVE-2024-1151": { + "cmt_msg": "net: openvswitch: limit the number of recursions from action sets" }, - "CVE-2018-9516": { - "cmt_msg": "HID: debug: check length before copy_to_user()" + "CVE-2024-26659": { + "cmt_msg": "xhci: handle isoc Babble and Buffer Overrun events properly" }, - "CVE-2023-3397": { + "CVE-2024-26658": { + "cmt_msg": "bcachefs: grab s_umount only if snapshotting" + }, + "CVE-2010-5321": { "cmt_msg": "" }, - "CVE-2018-1128": { - "cmt_msg": "libceph: add authorizer challenge" + "CVE-2021-20322": { + "cmt_msg": "ipv6: make exception cache less predictible" }, - "CVE-2018-1129": { - "cmt_msg": "libceph: implement CEPHX_V2 calculation mode" + "CVE-2024-26654": { + "cmt_msg": "ALSA: sh: aica: reorder cleanup operations to avoid UAF bugs" }, - "CVE-2018-1087": { - "cmt_msg": "kvm/x86: fix icebp instruction handling" + "CVE-2021-20320": { + "cmt_msg": "s390/bpf: Fix optimizing out zero-extensions" }, - "CVE-2022-26365": { - "cmt_msg": "xen/blkfront: fix leaking data in shared pages" + "CVE-2021-20321": { + "cmt_msg": "ovl: fix missing negative dentry check in ovl_rename()" }, - "CVE-2022-21125": { - "cmt_msg": "x86/speculation/mmio: Reuse SRBDS mitigation for SBDS" + "CVE-2024-26651": { + "cmt_msg": "sr9800: Add check for usbnet_get_endpoints" }, - "CVE-2018-1120": { - "cmt_msg": "proc: do not access cmdline nor environ from file-backed areas" + "CVE-2024-26650": { + "cmt_msg": "platform/x86: p2sb: Allow p2sb_bar() calls during PCI device probe" }, - "CVE-2018-1121": { - "cmt_msg": "" + "CVE-2022-42896": { + "cmt_msg": "Bluetooth: L2CAP: Fix accepting connection request for invalid SPSM" }, - "CVE-2018-20856": { - "cmt_msg": "block: blk_init_allocated_queue() set q->fq as NULL in the fail case" + "CVE-2023-3812": { + "cmt_msg": "net: tun: fix bugs for oversize packet when napi frags enabled" }, - "CVE-2023-52451": { - "cmt_msg": "powerpc/pseries/memhp: Fix access beyond end of drmem array" + "CVE-2023-7192": { + "cmt_msg": "netfilter: ctnetlink: fix possible refcount leak in ctnetlink_create_conntrack()" }, - "CVE-2017-5754": { - "cmt_msg": "x86/cpufeatures: Add Intel feature bits for Speculation Control" + "CVE-2022-3169": { + "cmt_msg": "nvme: ensure subsystem reset is single threaded" }, - "CVE-2022-3061": { - "cmt_msg": "video: fbdev: i740fb: Error out if 'pixclock' equals zero" + "CVE-2022-36280": { + "cmt_msg": "drm/vmwgfx: Validate the box size for the snooped cursor" }, - "CVE-2016-10200": { - "cmt_msg": "l2tp: fix racy SOCK_ZAPPED flag check in l2tp_ip{,6}_bind()" + "CVE-2022-1048": { + "cmt_msg": "ALSA: pcm: Fix races among concurrent hw_params and hw_free calls" }, - "CVE-2017-5753": { - "cmt_msg": "x86/cpufeatures: Add X86_BUG_SPECTRE_V[12]" + "CVE-2023-52475": { + "cmt_msg": "Input: powermate - fix use-after-free in powermate_config_complete" }, - "CVE-2022-2961": { - "cmt_msg": "" + "CVE-2021-0342": { + "cmt_msg": "tun: correct header offsets in napi frags mode" }, - "CVE-2022-20369": { - "cmt_msg": "media: v4l2-mem2mem: Apply DST_QUEUE_OFF_BASE on MMAP buffers across ioctls" + "CVE-2023-52477": { + "cmt_msg": "usb: hub: Guard against accesses to uninitialized BOS descriptors" }, - "CVE-2024-1086": { - "cmt_msg": "netfilter: nf_tables: reject QUEUE/DROP verdict parameters" + "CVE-2023-52476": { + "cmt_msg": "perf/x86/lbr: Filter vsyscall addresses" }, - "CVE-2022-32981": { - "cmt_msg": "powerpc/32: Fix overread/overwrite of thread_struct via ptrace" + "CVE-2023-22995": { + "cmt_msg": "usb: dwc3: dwc3-qcom: Add missing platform_device_put() in dwc3_qcom_acpi_register_core" }, - "CVE-2016-10208": { - "cmt_msg": "ext4: validate s_first_meta_bg at mount time" + "CVE-2023-52470": { + "cmt_msg": "drm/radeon: check the alloc_workqueue return value in radeon_crtc_init()" }, - "CVE-2020-11565": { - "cmt_msg": "mm: mempolicy: require at least one nodeid for MPOL_PREFERRED" + "CVE-2024-21803": { + "cmt_msg": "" }, - "CVE-2019-19049": { - "cmt_msg": "of: unittest: fix memory leak in unittest_data_add" + "CVE-2023-52479": { + "cmt_msg": "ksmbd: fix uaf in smb20_oplock_break_ack" }, - "CVE-2018-9568": { - "cmt_msg": "net: Set sk_prot_creator when cloning sockets to the right proto" + "CVE-2023-52478": { + "cmt_msg": "HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect" }, - "CVE-2022-0644": { - "cmt_msg": "vfs: check fd has read access in kernel_read_file_from_fd()" + "CVE-2021-3542": { + "cmt_msg": "" }, - "CVE-2020-27784": { - "cmt_msg": "usb: gadget: function: printer: fix use-after-free in __lock_acquire" + "CVE-2021-3428": { + "cmt_msg": "ext4: handle error of ext4_setup_system_zone() on remount" }, - "CVE-2018-13053": { - "cmt_msg": "alarmtimer: Prevent overflow for relative nanosleep" + "CVE-2020-12659": { + "cmt_msg": "xsk: Add missing check on user supplied headroom size" }, - "CVE-2020-27786": { - "cmt_msg": "ALSA: rawmidi: Fix racy buffer resize under concurrent accesses" + "CVE-2024-22099": { + "cmt_msg": "Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security" }, - "CVE-2019-14816": { - "cmt_msg": "mwifiex: Fix three heap overflow at parsing element in cfg80211_ap_settings" + "CVE-2023-30456": { + "cmt_msg": "KVM: nVMX: add missing consistency checks for CR0 and CR4" }, - "CVE-2019-14814": { - "cmt_msg": "mwifiex: Fix three heap overflow at parsing element in cfg80211_ap_settings" + "CVE-2022-48626": { + "cmt_msg": "moxart: fix potential use-after-free on remove path" + }, + "CVE-2020-12656": { + "cmt_msg": "sunrpc: check that domain table is empty at module unload." + }, + "CVE-2022-23040": { + "cmt_msg": "xen/xenbus: don't let xenbus_grant_ring() remove grants in error case" + }, + "CVE-2020-12655": { + "cmt_msg": "xfs: add agf freeblocks verify in xfs_agf_verify" }, - "CVE-2023-6240": { + "CVE-2018-12929": { "cmt_msg": "" }, - "CVE-2023-23559": { - "cmt_msg": "wifi: rndis_wlan: Prevent buffer overflow in rndis_query_oid" + "CVE-2018-12928": { + "cmt_msg": "" }, - "CVE-2020-10720": { - "cmt_msg": "net-gro: fix use-after-free read in napi_gro_frags()" + "CVE-2020-36311": { + "cmt_msg": "KVM: SVM: Periodically schedule when unregistering regions on destroy" }, - "CVE-2020-14351": { - "cmt_msg": "perf/core: Fix race in the perf_mmap_close() function" + "CVE-2020-36310": { + "cmt_msg": "KVM: SVM: avoid infinite loop on NPF from bad address" }, - "CVE-2022-0382": { - "cmt_msg": "net ticp:fix a kernel-infoleak in __tipc_sendmsg()" + "CVE-2020-36313": { + "cmt_msg": "KVM: Fix out of range accesses to memslots" }, - "CVE-2019-9456": { - "cmt_msg": "usb: usbmon: Read text within supplied buffer size" + "CVE-2020-35519": { + "cmt_msg": "net/x25: prevent a couple of overflows" }, - "CVE-2016-4440": { - "cmt_msg": "kvm:vmx: more complete state update on APICv on/off" + "CVE-2023-31436": { + "cmt_msg": "net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg" }, - "CVE-2020-25672": { - "cmt_msg": "nfc: fix memory leak in llcp_sock_connect()" + "CVE-2024-26592": { + "cmt_msg": "ksmbd: fix UAF issue in ksmbd_tcp_new_connection()" }, - "CVE-2019-9455": { - "cmt_msg": "media: videobuf2-v4l2: drop WARN_ON in vb2_warn_zero_bytesused()" + "CVE-2022-45887": { + "cmt_msg": "media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb()" }, - "CVE-2020-25670": { - "cmt_msg": "nfc: fix refcount leak in llcp_sock_bind()" + "CVE-2020-10708": { + "cmt_msg": "" }, - "CVE-2020-25671": { - "cmt_msg": "nfc: fix refcount leak in llcp_sock_connect()" + "CVE-2022-0400": { + "cmt_msg": "" }, - "CVE-2018-21008": { - "cmt_msg": "rsi: add fix for crash during assertions" + "CVE-2024-25741": { + "cmt_msg": "" }, - "CVE-2019-15223": { - "cmt_msg": "ALSA: line6: Assure canceling delayed work at disconnection" + "CVE-2024-26778": { + "cmt_msg": "fbdev: savage: Error out if pixclock equals zero" }, - "CVE-2019-15220": { - "cmt_msg": "p54usb: Fix race between disconnect and firmware loading" + "CVE-2024-26809": { + "cmt_msg": "netfilter: nft_set_pipapo: release elements in clone only from destroy path" }, - "CVE-2019-15221": { - "cmt_msg": "ALSA: line6: Fix write on zero-sized buffer" + "CVE-2022-26966": { + "cmt_msg": "sr9700: sanity check for packet length" }, - "CVE-2019-19815": { - "cmt_msg": "f2fs: support swap file w/ DIO" + "CVE-2021-42739": { + "cmt_msg": "media: firewire: firedtv-avc: fix a buffer overflow in avc_ca_pmt()" }, - "CVE-2019-19814": { - "cmt_msg": "" + "CVE-2023-1989": { + "cmt_msg": "Bluetooth: btsdio: fix use after free bug in btsdio_remove due to unfinished work" }, - "CVE-2020-29371": { - "cmt_msg": "romfs: fix uninitialized memory leak in romfs_dev_read()" + "CVE-2024-26806": { + "cmt_msg": "spi: cadence-qspi: remove system-wide suspend helper calls from runtime PM hooks" }, - "CVE-2019-19816": { - "cmt_msg": "btrfs: inode: Verify inode mode to avoid NULL pointer dereference" + "CVE-2021-37159": { + "cmt_msg": "usb: hso: fix error handling code of hso_create_net_device" }, - "CVE-2017-16939": { - "cmt_msg": "ipsec: Fix aborted xfrm policy dump crash" + "CVE-2020-12770": { + "cmt_msg": "scsi: sg: add sg_remove_request in sg_write" }, - "CVE-2019-9453": { - "cmt_msg": "f2fs: fix to avoid accessing xattr across the boundary" + "CVE-2024-26802": { + "cmt_msg": "stmmac: Clear variable when destroying workqueue" }, - "CVE-2022-1016": { - "cmt_msg": "netfilter: nf_tables: initialize registers in nft_do_chain()" + "CVE-2023-52508": { + "cmt_msg": "nvme-fc: Prevent null pointer dereference in nvme_fc_io_getuuid()" }, - "CVE-2018-18710": { - "cmt_msg": "cdrom: fix improper type cast, which can leat to information leak." + "CVE-2023-52606": { + "cmt_msg": "powerpc/lib: Validate size for vector operations" }, - "CVE-2016-2188": { - "cmt_msg": "USB: iowarrior: fix NULL-deref at probe" + "CVE-2023-52607": { + "cmt_msg": "powerpc/mm: Fix null-pointer dereference in pgtable_cache_add" }, - "CVE-2022-1012": { - "cmt_msg": "secure_seq: use the 64 bits of the siphash for port offset calculation" + "CVE-2023-52604": { + "cmt_msg": "FS:JFS:UBSAN:array-index-out-of-bounds in dbAdjTree" }, - "CVE-2023-31436": { - "cmt_msg": "net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg" + "CVE-2023-52602": { + "cmt_msg": "jfs: fix slab-out-of-bounds Read in dtSearch" }, - "CVE-2020-12114": { - "cmt_msg": "make struct mountpoint bear the dentry reference to mountpoint, not struct mount" + "CVE-2023-52603": { + "cmt_msg": "UBSAN: array-index-out-of-bounds in dtSplitRoot" }, - "CVE-2020-8649": { - "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region" + "CVE-2022-25265": { + "cmt_msg": "" }, - "CVE-2023-3161": { - "cmt_msg": "fbcon: Check font dimension limits" + "CVE-2023-52601": { + "cmt_msg": "jfs: fix array-index-out-of-bounds in dbAdjTree" }, - "CVE-2020-12656": { - "cmt_msg": "sunrpc: check that domain table is empty at module unload." + "CVE-2023-52609": { + "cmt_msg": "binder: fix race between mmput() and do_exit()" }, - "CVE-2020-14356": { - "cmt_msg": "cgroup: fix cgroup_sk_alloc() for sk_clone_lock()" + "CVE-2022-21499": { + "cmt_msg": "lockdown: also lock down previous kgdb use" }, - "CVE-2017-1000405": { - "cmt_msg": "mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d()" + "CVE-2020-29374": { + "cmt_msg": "gup: document and work around \"COW can break either way\" issue" }, - "CVE-2021-26930": { - "cmt_msg": "xen-blkback: fix error handling in xen_blkbk_map()" + "CVE-2023-4208": { + "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free" }, - "CVE-2017-1000407": { - "cmt_msg": "KVM: VMX: remove I/O port 0x80 bypass on Intel hosts" + "CVE-2022-3606": { + "cmt_msg": "" }, - "CVE-2021-26932": { - "cmt_msg": "Xen/x86: don't bail early from clear_foreign_p2m_mapping()" + "CVE-2023-4206": { + "cmt_msg": "net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free" }, - "CVE-2024-25740": { + "CVE-2023-4207": { + "cmt_msg": "net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free" + }, + "CVE-2023-3640": { "cmt_msg": "" }, - "CVE-2023-52456": { - "cmt_msg": "serial: imx: fix tx statemachine deadlock" + "CVE-2023-20593": { + "cmt_msg": "x86/cpu/amd: Add a Zenbleed fix" }, - "CVE-2023-3141": { - "cmt_msg": "memstick: r592: Fix UAF bug in r592_remove due to race condition" + "CVE-2023-0160": { + "cmt_msg": "bpf, sockmap: fix deadlocks in the sockhash and sockmap" }, - "CVE-2023-37454": { - "cmt_msg": "" + "CVE-2023-52506": { + "cmt_msg": "LoongArch: Set all reserved memblocks on Node#0 at initialization" }, - "CVE-2016-9555": { - "cmt_msg": "sctp: validate chunk len before actually using it" + "CVE-2022-2663": { + "cmt_msg": "netfilter: nf_conntrack_irc: Fix forged IP logic" }, - "CVE-2019-3892": { - "cmt_msg": "coredump: fix race condition between mmget_not_zero()/get_task_mm() and core dumping" + "CVE-2021-47049": { + "cmt_msg": "Drivers: hv: vmbus: Use after free in __vmbus_open()" }, - "CVE-2020-12352": { - "cmt_msg": "Bluetooth: A2MP: Fix not initializing all members" + "CVE-2022-43750": { + "cmt_msg": "usb: mon: make mmapped memory read only" }, - "CVE-2020-12655": { - "cmt_msg": "xfs: add agf freeblocks verify in xfs_agf_verify" + "CVE-2023-0047": { + "cmt_msg": "mm, oom: do not trigger out_of_memory from the #PF" }, - "CVE-2021-43976": { - "cmt_msg": "mwifiex: Fix skb_over_panic in mwifiex_usb_recv()" + "CVE-2021-47046": { + "cmt_msg": "drm/amd/display: Fix off by one in hdmi_14_process_transaction()" }, - "CVE-2022-0494": { - "cmt_msg": "block-map: add __GFP_ZERO flag for alloc_page in function bio_copy_kern" + "CVE-2023-0045": { + "cmt_msg": "x86/bugs: Flush IBP in ib_prctl_set()" }, - "CVE-2023-2269": { - "cmt_msg": "dm ioctl: fix nested locking in table_clear() to remove deadlock concern" + "CVE-2021-47041": { + "cmt_msg": "nvmet-tcp: fix incorrect locking in state_change sk callback" }, - "CVE-2020-26088": { - "cmt_msg": "net/nfc/rawsock.c: add CAP_NET_RAW check." + "CVE-2020-36787": { + "cmt_msg": "media: aspeed: fix clock handling logic" }, - "CVE-2022-3524": { - "cmt_msg": "tcp/udp: Fix memory leak in ipv6_renew_options()." + "CVE-2021-47167": { + "cmt_msg": "NFS: Fix an Oopsable condition in __nfs_pageio_add_request()" }, - "CVE-2022-3523": { - "cmt_msg": "mm/memory.c: fix race when faulting a device private page" + "CVE-2021-47166": { + "cmt_msg": "NFS: Don't corrupt the value of pg_bytes_written in nfs_do_recoalesce()" }, - "CVE-2022-3522": { - "cmt_msg": "mm/hugetlb: use hugetlb_pte_stable in migration race check" + "CVE-2021-47165": { + "cmt_msg": "drm/meson: fix shutdown crash when component not probed" }, - "CVE-2008-2544": { - "cmt_msg": "" + "CVE-2021-47163": { + "cmt_msg": "tipc: wait and exit until all work queues are done" }, - "CVE-2021-3178": { - "cmt_msg": "nfsd4: readdirplus shouldn't return parent of export" + "CVE-2021-46969": { + "cmt_msg": "bus: mhi: core: Fix invalid error returning in mhi_queue" }, - "CVE-2022-2318": { - "cmt_msg": "net: rose: fix UAF bugs caused by timer handler" + "CVE-2021-47161": { + "cmt_msg": "spi: spi-fsl-dspi: Fix a resource leak in an error handling path" }, - "CVE-2022-42703": { - "cmt_msg": "mm/rmap: Fix anon_vma->degree ambiguity leading to double-reuse" + "CVE-2021-47160": { + "cmt_msg": "net: dsa: mt7530: fix VLAN traffic leaks" }, - "CVE-2023-23455": { - "cmt_msg": "net: sched: atm: dont intepret cls results when asked to drop" + "CVE-2023-4385": { + "cmt_msg": "fs: jfs: fix possible NULL pointer dereference in dbFree()" }, - "CVE-2018-7755": { - "cmt_msg": "floppy: Do not copy a kernel pointer to user memory in FDGETPRM ioctl" + "CVE-2021-46965": { + "cmt_msg": "mtd: physmap: physmap-bt1-rom: Fix unintentional stack access" }, - "CVE-2017-7346": { - "cmt_msg": "drm/vmwgfx: limit the number of mip levels in vmw_gb_surface_define_ioctl()" + "CVE-2021-46966": { + "cmt_msg": "ACPI: custom_method: fix potential use-after-free issue" }, - "CVE-2018-7757": { - "cmt_msg": "scsi: libsas: fix memory leak in sas_smp_get_phy_events()" + "CVE-2021-46960": { + "cmt_msg": "cifs: Return correct error code from smb2_get_enc_key" }, - "CVE-2019-11815": { - "cmt_msg": "net: rds: force to destroy connection if t_sock is NULL in rds_tcp_kill_sock()." + "CVE-2021-46961": { + "cmt_msg": "irqchip/gic-v3: Do not enable irqs when handling spurious interrups" }, - "CVE-2007-3719": { + "CVE-2021-46962": { + "cmt_msg": "mmc: uniphier-sd: Fix a resource leak in the remove function" + }, + "CVE-2021-46963": { + "cmt_msg": "scsi: qla2xxx: Fix crash in qla2xxx_mqueuecommand()" + }, + "CVE-2019-19378": { "cmt_msg": "" }, - "CVE-2023-3863": { - "cmt_msg": "net: nfc: Fix use-after-free caused by nfc_llcp_find_local" + "CVE-2023-52482": { + "cmt_msg": "x86/srso: Add SRSO mitigation for Hygon processors" }, - "CVE-2023-0590": { - "cmt_msg": "net: sched: fix race condition in qdisc_graft()" + "CVE-2023-52599": { + "cmt_msg": "jfs: fix array-index-out-of-bounds in diNewExt" }, - "CVE-2022-29900": { - "cmt_msg": "x86/kvm/vmx: Make noinstr clean" + "CVE-2020-4788": { + "cmt_msg": "powerpc/64s: flush L1D on kernel entry" }, - "CVE-2022-4095": { - "cmt_msg": "staging: rtl8712: fix use after free bugs" + "CVE-2023-51781": { + "cmt_msg": "appletalk: Fix Use-After-Free in atalk_ioctl" }, - "CVE-2017-10911": { - "cmt_msg": "xen-blkback: don't leak stack data via response ring" + "CVE-2022-36879": { + "cmt_msg": "xfrm: xfrm_policy: fix a possible double xfrm_pols_put() in xfrm_bundle_lookup()" }, - "CVE-2023-34255": { - "cmt_msg": "xfs: verify buffer contents when we skip log replay" + "CVE-2021-28691": { + "cmt_msg": "xen-netback: take a reference to the RX task thread" }, - "CVE-2022-45919": { - "cmt_msg": "media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221" + "CVE-2021-39698": { + "cmt_msg": "wait: add wake_up_pollfree()" }, - "CVE-2019-19319": { - "cmt_msg": "ext4: protect journal inode's blocks using block_validity" + "CVE-2022-45934": { + "cmt_msg": "Bluetooth: L2CAP: Fix u8 overflow" }, - "CVE-2023-2248": { - "cmt_msg": "net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg" + "CVE-2022-41674": { + "cmt_msg": "wifi: cfg80211: fix u8 overflow in cfg80211_update_notlisted_nontrans()" }, - "CVE-2023-30772": { - "cmt_msg": "power: supply: da9150: Fix use after free bug in da9150_charger_remove due to race condition" + "CVE-2020-28588": { + "cmt_msg": "lib/syscall: fix syscall registers retrieval on 32-bit platforms" }, - "CVE-2017-18017": { - "cmt_msg": "netfilter: xt_TCPMSS: add more sanity tests on tcph->doff" + "CVE-2022-2380": { + "cmt_msg": "video: fbdev: sm712fb: Fix crash in smtcfb_read()" }, - "CVE-2022-24958": { - "cmt_msg": "usb: gadget: don't release an existing dev->buf" + "CVE-2022-0850": { + "cmt_msg": "ext4: fix kernel infoleak via ext4_extent_header" }, - "CVE-2023-1611": { - "cmt_msg": "btrfs: fix race between quota disable and quota assign ioctls" + "CVE-2021-3759": { + "cmt_msg": "memcg: enable accounting of ipc resources" }, - "CVE-2021-3772": { - "cmt_msg": "sctp: use init_tag from inithdr for ABORT chunk" + "CVE-2021-4197": { + "cmt_msg": "cgroup: Use open-time credentials for process migraton perm checks" }, - "CVE-2023-3268": { - "cmt_msg": "relayfs: fix out-of-bounds access in relay_file_read" + "CVE-2021-3612": { + "cmt_msg": "Input: joydev - prevent potential read overflow in ioctl" }, - "CVE-2021-3679": { - "cmt_msg": "tracing: Fix bug in rb_per_cpu_empty() that might cause deadloop." + "CVE-2020-24503": { + "cmt_msg": "" }, - "CVE-2021-37159": { - "cmt_msg": "usb: hso: fix error handling code of hso_create_net_device" + "CVE-2020-24502": { + "cmt_msg": "" }, - "CVE-2016-8399": { - "cmt_msg": "net: ping: check minimum size on ICMP header length" + "CVE-2019-19448": { + "cmt_msg": "btrfs: only search for left_info if there is no right_info in try_merge_free_space" }, - "CVE-2022-2586": { - "cmt_msg": "netfilter: nf_tables: do not allow SET_ID to refer to another table" + "CVE-2019-19449": { + "cmt_msg": "f2fs: fix to do sanity check on segment/section count" }, - "CVE-2016-7042": { - "cmt_msg": "KEYS: Fix short sprintf buffer in /proc/keys show function" + "CVE-2021-3753": { + "cmt_msg": "vt_kdsetmode: extend console locking" }, - "CVE-2021-28715": { - "cmt_msg": "xen/netback: don't queue unlimited number of packages" + "CVE-2020-24504": { + "cmt_msg": "ice: create scheduler aggregator node config and move VSIs" }, - "CVE-2021-28714": { - "cmt_msg": "xen/netback: fix rx queue stall detection" + "CVE-2020-11725": { + "cmt_msg": "" }, - "CVE-2021-28713": { - "cmt_msg": "xen/console: harden hvc_xen against event channel storms" + "CVE-2021-0937": { + "cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write" }, - "CVE-2018-5873": { - "cmt_msg": "nsfs: mark dentry with DCACHE_RCUACCESS" + "CVE-2023-52621": { + "cmt_msg": "bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers" }, - "CVE-2017-18261": { - "cmt_msg": "clocksource/drivers/arm_arch_timer: Avoid infinite recursion when ftrace is enabled" + "CVE-2022-1263": { + "cmt_msg": "KVM: avoid NULL pointer dereference in kvm_dirty_ring_push" }, - "CVE-2021-4157": { - "cmt_msg": "pNFS/flexfiles: fix incorrect size check in decode_nfs_fh()" + "CVE-2023-52610": { + "cmt_msg": "net/sched: act_ct: fix skb leak and crash on ooo frags" }, - "CVE-2022-2991": { - "cmt_msg": "remove the lightnvm subsystem" + "CVE-2021-35477": { + "cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4" }, - "CVE-2022-3621": { - "cmt_msg": "nilfs2: fix NULL pointer dereference at nilfs_bmap_lookup_at_level()" + "CVE-2021-0938": { + "cmt_msg": "compiler.h: fix barrier_data() on clang" }, - "CVE-2017-11473": { - "cmt_msg": "x86/acpi: Prevent out of bound access caused by broken ACPI tables" + "CVE-2022-3521": { + "cmt_msg": "kcm: avoid potential race in kcm_tx_work" }, - "CVE-2017-11472": { - "cmt_msg": "ACPICA: Namespace: fix operand cache leak" + "CVE-2022-47929": { + "cmt_msg": "net: sched: disallow noqueue for qdisc classes" }, - "CVE-2022-3624": { - "cmt_msg": "bonding: fix reference count leak in balance-alb mode" + "CVE-2021-41864": { + "cmt_msg": "bpf: Fix integer overflow in prealloc_elems_and_freelist()" }, - "CVE-2017-17862": { - "cmt_msg": "bpf: fix branch pruning logic" + "CVE-2022-2209": { + "cmt_msg": "" }, - "CVE-2021-39657": { - "cmt_msg": "scsi: ufs: Correct the LUN used in eh_device_reset_handler() callback" + "CVE-2021-37576": { + "cmt_msg": "KVM: PPC: Book3S: Fix H_RTAS rets buffer overflow" }, - "CVE-2021-3669": { - "cmt_msg": "ipc: replace costly bailout check in sysvipc_find_ipc()" + "CVE-2024-26775": { + "cmt_msg": "aoe: avoid potential deadlock at set_capacity" }, - "CVE-2019-18885": { - "cmt_msg": "btrfs: merge btrfs_find_device and find_device" + "CVE-2021-47179": { + "cmt_msg": "NFSv4: Fix a NULL pointer dereference in pnfs_mark_matching_lsegs_return()" }, - "CVE-2017-7889": { - "cmt_msg": "mm: Tighten x86 /dev/mem with zeroing reads" + "CVE-2023-7042": { + "cmt_msg": "wifi: ath10k: fix NULL pointer dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev()" }, - "CVE-2019-12378": { - "cmt_msg": "ipv6_sockglue: Fix a missing-check bug in ip6_ra_control()" + "CVE-2022-3594": { + "cmt_msg": "r8152: Rate limit overflow messages" }, - "CVE-2019-11091": { - "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" + "CVE-2022-3595": { + "cmt_msg": "cifs: fix double-fault crash during ntlmssp" }, - "CVE-2022-3239": { - "cmt_msg": "media: em28xx: initialize refcount before kref_get" + "CVE-2023-0240": { + "cmt_msg": "io_uring: COW io_identity on mismatch" }, - "CVE-2022-4543": { - "cmt_msg": "" + "CVE-2023-52559": { + "cmt_msg": "iommu/vt-d: Avoid memory allocation in iommu_suspend()" }, - "CVE-2019-18660": { - "cmt_msg": "powerpc/book3s64: Fix link stack flush on context switch" + "CVE-2023-47233": { + "cmt_msg": "wifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach" }, - "CVE-2023-4921": { - "cmt_msg": "net: sched: sch_qfq: Fix UAF in qfq_dequeue()" + "CVE-2020-27815": { + "cmt_msg": "jfs: Fix array index bounds check in dbAdjTree" }, - "CVE-2022-3202": { - "cmt_msg": "jfs: prevent NULL deref in diFree" + "CVE-2023-52629": { + "cmt_msg": "sh: push-switch: Reorder cleanup operations to avoid use-after-free bug" }, - "CVE-2017-15649": { - "cmt_msg": "packet: in packet_do_bind, test fanout with bind_lock held" + "CVE-2022-23041": { + "cmt_msg": "xen/9p: use alloc/free_pages_exact()" }, - "CVE-2017-11089": { - "cmt_msg": "cfg80211: Define nla_policy for NL80211_ATTR_LOCAL_MESH_POWER_MODE" + "CVE-2022-1462": { + "cmt_msg": "tty: use new tty_insert_flip_string_and_push_buffer() in pty_write()" }, - "CVE-2023-1829": { - "cmt_msg": "net/sched: Retire tcindex classifier" + "CVE-2023-21400": { + "cmt_msg": "" }, - "CVE-2019-18282": { - "cmt_msg": "net/flow_dissector: switch to siphash" + "CVE-2024-26758": { + "cmt_msg": "md: Don't ignore suspended array in md_check_recovery()" }, - "CVE-2021-34981": { - "cmt_msg": "Bluetooth: cmtp: fix file refcount when cmtp_attach_device fails" + "CVE-2024-26610": { + "cmt_msg": "wifi: iwlwifi: fix a memory corruption" }, - "CVE-2023-1670": { - "cmt_msg": "xirc2ps_cs: Fix use after free bug in xirc2ps_detach" + "CVE-2023-6606": { + "cmt_msg": "smb: client: fix OOB in smbCalcSize()" }, - "CVE-2023-4881": { - "cmt_msg": "netfilter: nftables: exthdr: fix 4-byte stack OOB write" + "CVE-2024-26614": { + "cmt_msg": "tcp: make sure init the accept_queue's spinlocks once" }, - "CVE-2017-14489": { - "cmt_msg": "scsi: scsi_transport_iscsi: fix the issue that iscsi_if_rx doesn't parse nlmsg properly" + "CVE-2020-27777": { + "cmt_msg": "powerpc/rtas: Restrict RTAS requests from userspace" }, - "CVE-2023-6915": { - "cmt_msg": "ida: Fix crash in ida_free when the bitmap is empty" + "CVE-2023-39189": { + "cmt_msg": "netfilter: nfnetlink_osf: avoid OOB read" }, - "CVE-2022-20148": { - "cmt_msg": "f2fs: fix UAF in f2fs_available_free_memory" + "CVE-2024-26751": { + "cmt_msg": "ARM: ep93xx: Add terminator to gpiod_lookup_table" }, - "CVE-2022-1786": { - "cmt_msg": "io_uring: remove io_identity" + "CVE-2024-26752": { + "cmt_msg": "l2tp: pass correct message length to ip6_append_data" }, - "CVE-2013-7445": { - "cmt_msg": "" + "CVE-2020-27673": { + "cmt_msg": "xen/events: add a proper barrier to 2-level uevent unmasking" }, - "CVE-2016-9604": { - "cmt_msg": "KEYS: Disallow keyrings beginning with '.' to be joined as session keyrings" + "CVE-2024-26754": { + "cmt_msg": "gtp: fix use-after-free and null-ptr-deref in gtp_genl_dump_pdp()" }, - "CVE-2022-3646": { - "cmt_msg": "nilfs2: fix leak of nilfs_root in case of writer thread creation failure" + "CVE-2020-27675": { + "cmt_msg": "xen/events: avoid removing an event channel while handling it" }, - "CVE-2022-28390": { - "cmt_msg": "can: ems_usb: ems_usb_start_xmit(): fix double dev_kfree_skb() in error path" + "CVE-2024-26756": { + "cmt_msg": "md: Don't register sync_thread for reshape directly" }, - "CVE-2019-15292": { - "cmt_msg": "appletalk: Fix use-after-free in atalk_proc_exit" + "CVE-2024-26757": { + "cmt_msg": "md: Don't ignore read-only array in md_check_recovery()" }, - "CVE-2020-12652": { - "cmt_msg": "scsi: mptfusion: Fix double fetch bug in ioctl" + "CVE-2023-52439": { + "cmt_msg": "uio: Fix use-after-free in uio_open" }, - "CVE-2024-25741": { - "cmt_msg": "" + "CVE-2020-28915": { + "cmt_msg": "fbcon: Fix global-out-of-bounds read in fbcon_get_font()" }, - "CVE-2017-14340": { - "cmt_msg": "xfs: XFS_IS_REALTIME_INODE() should be false if no rt device present" + "CVE-2023-3776": { + "cmt_msg": "net/sched: cls_fw: Fix improper refcount update leads to use-after-free" }, - "CVE-2019-15217": { - "cmt_msg": "media: usb:zr364xx:Fix KASAN:null-ptr-deref Read in zr364xx_vidioc_querycap" + "CVE-2021-28038": { + "cmt_msg": "Xen/gnttab: handle p2m update errors on a per-slot basis" }, - "CVE-2022-26966": { - "cmt_msg": "sr9700: sanity check for packet length" + "CVE-2022-3111": { + "cmt_msg": "power: supply: wm8350-power: Add missing free in free_charger_irq" }, - "CVE-2019-19535": { - "cmt_msg": "can: peak_usb: pcan_usb_fd: Fix info-leaks to USB devices" + "CVE-2023-52435": { + "cmt_msg": "net: prevent mss overflow in skb_segment()" }, - "CVE-2020-14386": { - "cmt_msg": "net/packet: fix overflow in tpacket_rcv" + "CVE-2023-52434": { + "cmt_msg": "smb: client: fix potential OOBs in smb2_parse_contexts()" }, - "CVE-2021-34693": { - "cmt_msg": "can: bcm: fix infoleak in struct bcm_msg_head" + "CVE-2021-31829": { + "cmt_msg": "bpf: Fix masking negation logic upon negative dst register" }, - "CVE-2020-14381": { - "cmt_msg": "futex: Fix inode life-time issue" + "CVE-2023-52436": { + "cmt_msg": "f2fs: explicitly null-terminate the xattr list" }, - "CVE-2023-30456": { - "cmt_msg": "KVM: nVMX: add missing consistency checks for CR0 and CR4" + "CVE-2022-2964": { + "cmt_msg": "net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup" }, - "CVE-2019-19768": { - "cmt_msg": "blktrace: Protect q->blk_trace with RCU" + "CVE-2024-26688": { + "cmt_msg": "fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super" }, - "CVE-2022-3303": { - "cmt_msg": "ALSA: pcm: oss: Fix race at SNDCTL_DSP_SYNC" + "CVE-2024-23307": { + "cmt_msg": "md/raid5: fix atomicity violation in raid5_cache_count" }, - "CVE-2019-19039": { - "cmt_msg": "btrfs: Don't submit any btree write bio if the fs has errors" + "CVE-2022-2961": { + "cmt_msg": "" }, - "CVE-2017-5715": { - "cmt_msg": "x86/cpufeatures: Add X86_BUG_SPECTRE_V[12]" + "CVE-2021-3506": { + "cmt_msg": "f2fs: fix to avoid out-of-bounds memory access" }, - "CVE-2022-20141": { - "cmt_msg": "igmp: Add ip_mc_list lock in ip_check_mc_rcu" + "CVE-2024-26680": { + "cmt_msg": "net: atlantic: Fix DMA mapping for PTP hwts ring" }, - "CVE-2021-45095": { - "cmt_msg": "phonet: refcount leak in pep_sock_accep" + "CVE-2024-26686": { + "cmt_msg": "fs/proc: do_task_stat: use sig->stats_lock to gather the threads/children stats" }, - "CVE-2023-23454": { - "cmt_msg": "net: sched: cbq: dont intepret cls results when asked to drop" + "CVE-2024-26687": { + "cmt_msg": "xen/events: close evtchn after mapping cleanup" }, - "CVE-2016-8630": { - "cmt_msg": "kvm: x86: Check memopp before dereference (CVE-2016-8630)" + "CVE-2023-51779": { + "cmt_msg": "Bluetooth: af_bluetooth: Fix Use-After-Free in bt_sock_recvmsg" }, - "CVE-2016-8633": { - "cmt_msg": "firewire: net: guard against rx buffer overflows" + "CVE-2023-3268": { + "cmt_msg": "relayfs: fix out-of-bounds access in relay_file_read" }, - "CVE-2016-8632": { - "cmt_msg": "tipc: check minimum bearer MTU" + "CVE-2022-40133": { + "cmt_msg": "drm/vmwgfx: Remove rcu locks from user resources" }, - "CVE-2018-3620": { - "cmt_msg": "x86/microcode: Allow late microcode loading with SMT disabled" + "CVE-2023-6915": { + "cmt_msg": "ida: Fix crash in ida_free when the bitmap is empty" }, - "CVE-2023-6932": { - "cmt_msg": "ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet" + "CVE-2010-4563": { + "cmt_msg": "" }, - "CVE-2019-3460": { - "cmt_msg": "Bluetooth: Check L2CAP option sizes returned from l2cap_get_conf_opt" + "CVE-2021-47006": { + "cmt_msg": "ARM: 9064/1: hw_breakpoint: Do not directly check the event's overflow_handler hook" }, - "CVE-2018-8781": { - "cmt_msg": "drm: udl: Properly check framebuffer mmap offsets" + "CVE-2023-1249": { + "cmt_msg": "coredump: Use the vma snapshot in fill_files_note" }, - "CVE-2021-29155": { - "cmt_msg": "bpf: Use correct permission flag for mixed signed bounds arithmetic" + "CVE-2023-2163": { + "cmt_msg": "bpf: Fix incorrect verifier pruning due to missing register precision taints" }, - "CVE-2024-22386": { - "cmt_msg": "" + "CVE-2023-2162": { + "cmt_msg": "scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress" }, - "CVE-2021-33631": { - "cmt_msg": "ext4: fix kernel BUG in 'ext4_write_inline_data_end()'" + "CVE-2023-45871": { + "cmt_msg": "igb: set max size RX buffer when store bad packet is enabled" }, - "CVE-2019-15916": { - "cmt_msg": "net-sysfs: Fix mem leak in netdev_register_kobject" + "CVE-2023-2248": { + "cmt_msg": "net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg" }, - "CVE-2019-15917": { - "cmt_msg": "Bluetooth: hci_ldisc: Postpone HCI_UART_PROTO_READY bit set in hci_uart_set_proto()" + "CVE-2023-0266": { + "cmt_msg": "ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF" }, - "CVE-2017-18344": { - "cmt_msg": "posix-timer: Properly check sigevent->sigev_notify" + "CVE-2021-46928": { + "cmt_msg": "parisc: Clear stale IIR value on instruction access rights trap" }, - "CVE-2018-6412": { - "cmt_msg": "fbdev: Fixing arbitrary kernel leak in case FBIOGETCMAP_SPARC in sbusfb_ioctl_helper()." + "CVE-2021-3483": { + "cmt_msg": "firewire: nosy: Fix a use-after-free bug in nosy_ioctl()" }, - "CVE-2017-15265": { - "cmt_msg": "ALSA: seq: Fix use-after-free at creating a port" + "CVE-2024-26663": { + "cmt_msg": "tipc: Check the bearer type before calling tipc_udp_nl_bearer_add()" }, - "CVE-2021-27363": { - "cmt_msg": "scsi: iscsi: Restrict sessions and handles to admin capabilities" + "CVE-2024-26598": { + "cmt_msg": "KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache" }, - "CVE-2020-12362": { - "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" + "CVE-2023-6040": { + "cmt_msg": "netfilter: nf_tables: Reject tables of unsupported family" }, - "CVE-2020-12363": { - "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" + "CVE-2021-38300": { + "cmt_msg": "bpf, mips: Validate conditional branch offsets" }, - "CVE-2019-12881": { - "cmt_msg": "drm/i915/userptr: reject zero user_size" + "CVE-2020-25656": { + "cmt_msg": "vt: keyboard, extend func_buf_lock to readers" }, - "CVE-2022-4129": { - "cmt_msg": "l2tp: Serialize access to sk_user_data with sk_callback_lock" + "CVE-2022-24448": { + "cmt_msg": "NFSv4: Handle case where the lookup of a directory fails" }, - "CVE-2023-3117": { - "cmt_msg": "netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE" + "CVE-2023-52498": { + "cmt_msg": "PM: sleep: Fix possible deadlocks in core system-wide PM code" }, - "CVE-2018-1000004": { - "cmt_msg": "ALSA: seq: Make ioctls race-free" + "CVE-2021-4023": { + "cmt_msg": "io-wq: fix cancellation on create-worker failure" }, - "CVE-2018-18690": { - "cmt_msg": "xfs: don't fail when converting shortform attr to long form during ATTR_REPLACE" + "CVE-2023-52640": { + "cmt_msg": "fs/ntfs3: Fix oob in ntfs_listxattr" }, - "CVE-2022-28388": { - "cmt_msg": "can: usb_8dev: usb_8dev_start_xmit(): fix double dev_kfree_skb() in error path" + "CVE-2023-52641": { + "cmt_msg": "fs/ntfs3: Add NULL ptr dereference checking at the end of attr_allocate_frame()" }, - "CVE-2017-0627": { - "cmt_msg": "media: uvcvideo: Prevent heap overflow when accessing mapped controls" + "CVE-2021-22555": { + "cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write" }, - "CVE-2021-0605": { - "cmt_msg": "af_key: pfkey_dump needs parameter validation" + "CVE-2020-36694": { + "cmt_msg": "netfilter: x_tables: Switch synchronization to RCU" }, - "CVE-2021-3896": { - "cmt_msg": "isdn: cpai: check ctr->cnr to avoid array index out of bound" + "CVE-2021-0399": { + "cmt_msg": "" }, - "CVE-2021-4002": { - "cmt_msg": "hugetlbfs: flush TLBs correctly after huge_pmd_unshare" + "CVE-2023-52488": { + "cmt_msg": "serial: sc16is7xx: convert from _raw_ to _noinc_ regmap functions for FIFO" }, - "CVE-2023-26545": { - "cmt_msg": "net: mpls: fix stale pointer if allocation fails during device rename" + "CVE-2020-36691": { + "cmt_msg": "netlink: limit recursion depth in policy validation" }, - "CVE-2021-38204": { - "cmt_msg": "usb: max-3421: Prevent corruption of freed memory" + "CVE-2021-47070": { + "cmt_msg": "uio_hv_generic: Fix another memory leak in error handling paths" }, - "CVE-2022-34918": { - "cmt_msg": "netfilter: nf_tables: stricter validation of element data" + "CVE-2023-42755": { + "cmt_msg": "net/sched: Retire rsvp classifier" }, - "CVE-2018-20961": { - "cmt_msg": "USB: gadget: f_midi: fixing a possible double-free in f_midi" + "CVE-2020-36516": { + "cmt_msg": "ipv4: avoid using shared IP generator for connected sockets" }, - "CVE-2019-20811": { - "cmt_msg": "net-sysfs: call dev_hold if kobject_init_and_add success" + "CVE-2023-52486": { + "cmt_msg": "drm: Don't unref the same fb many times by mistake due to deadlock handling" }, - "CVE-2019-20810": { - "cmt_msg": "media: go7007: fix a miss of snd_card_free" + "CVE-2023-52480": { + "cmt_msg": "ksmbd: fix race condition between session lookup and expire" }, - "CVE-2019-20812": { - "cmt_msg": "af_packet: set defaule value for tmo" + "CVE-2012-4542": { + "cmt_msg": "" }, - "CVE-2023-1990": { - "cmt_msg": "nfc: st-nci: Fix use after free bug in ndlc_remove due to race condition" + "CVE-2023-42753": { + "cmt_msg": "netfilter: ipset: add the missing IP_SET_HASH_WITH_NET0 macro for ip_set_hash_netportnet.c" }, - "CVE-2019-19530": { - "cmt_msg": "usb: cdc-acm: make sure a refcount is taken early enough" + "CVE-2023-1838": { + "cmt_msg": "Fix double fget() in vhost_net_set_backend()" }, - "CVE-2023-6040": { - "cmt_msg": "netfilter: nf_tables: Reject tables of unsupported family" + "CVE-2023-4128": { + "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free" }, - "CVE-2018-5391": { - "cmt_msg": "ip: discard IPv4 datagrams with overlapping segments." + "CVE-2021-3573": { + "cmt_msg": "Bluetooth: use correct lock to prevent UAF of hdev object" }, - "CVE-2022-26373": { - "cmt_msg": "x86/speculation: Add RSB VM Exit protections" + "CVE-2024-0607": { + "cmt_msg": "netfilter: nf_tables: fix pointer math issue in nft_byteorder_eval()" }, - "CVE-2018-5995": { - "cmt_msg": "printk: hash addresses printed with %p" + "CVE-2023-3609": { + "cmt_msg": "net/sched: cls_u32: Fix reference counter leak leading to overflow" }, - "CVE-2018-18386": { - "cmt_msg": "n_tty: fix EXTPROC vs ICANON interaction with TIOCINQ (aka FIONREAD)" + "CVE-2022-44033": { + "cmt_msg": "char: pcmcia: remove all the drivers" }, - "CVE-2019-15291": { - "cmt_msg": "media: b2c2-flexcop-usb: add sanity checking" + "CVE-2022-1974": { + "cmt_msg": "nfc: replace improper check device_is_registered() in netlink related functions" }, - "CVE-2019-15290": { - "cmt_msg": "" + "CVE-2022-1975": { + "cmt_msg": "NFC: netlink: fix sleep in atomic bug when firmware download timeout" }, - "CVE-2023-3212": { - "cmt_msg": "gfs2: Don't deref jdesc in evict" + "CVE-2023-52491": { + "cmt_msg": "media: mtk-jpeg: Fix use after free bug due to error path handling in mtk_jpeg_dec_device_run" }, - "CVE-2024-23848": { - "cmt_msg": "" + "CVE-2022-44032": { + "cmt_msg": "char: pcmcia: remove all the drivers" }, - "CVE-2019-16232": { - "cmt_msg": "libertas: fix a potential NULL pointer dereference" + "CVE-2020-36777": { + "cmt_msg": "media: dvbdev: Fix memory leak in dvb_media_device_free()" }, - "CVE-2018-7273": { - "cmt_msg": "printk: hash addresses printed with %p" + "CVE-2020-36775": { + "cmt_msg": "f2fs: fix to avoid potential deadlock" }, - "CVE-2023-52444": { - "cmt_msg": "f2fs: fix to avoid dirent corruption" + "CVE-2021-47083": { + "cmt_msg": "pinctrl: mediatek: fix global-out-of-bounds issue" }, - "CVE-2022-0617": { - "cmt_msg": "udf: Fix NULL ptr deref when converting from inline format" + "CVE-2021-20292": { + "cmt_msg": "drm/ttm/nouveau: don't call tt destroy callback on alloc failure." }, - "CVE-2023-4459": { - "cmt_msg": "net: vmxnet3: fix possible NULL pointer dereference in vmxnet3_rq_cleanup()" + "CVE-2021-31916": { + "cmt_msg": "dm ioctl: fix out of bounds array access when no devices" }, - "CVE-2023-52457": { - "cmt_msg": "serial: 8250: omap: Don't skip resource freeing if pm_runtime_resume_and_get() failed" + "CVE-2021-47086": { + "cmt_msg": "phonet/pep: refuse to enable an unbound pipe" }, - "CVE-2022-23036": { - "cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()" + "CVE-2022-32981": { + "cmt_msg": "powerpc/32: Fix overread/overwrite of thread_struct via ptrace" }, - "CVE-2022-2153": { - "cmt_msg": "KVM: x86: Avoid theoretical NULL pointer dereference in kvm_irq_delivery_to_apic_fast()" + "CVE-2021-47122": { + "cmt_msg": "net: caif: fix memory leak in caif_device_notify" }, - "CVE-2019-19531": { - "cmt_msg": "usb: yurex: Fix use-after-free in yurex_delete" + "CVE-2021-47121": { + "cmt_msg": "net: caif: fix memory leak in cfusbl_device_notify" }, - "CVE-2022-20566": { - "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free caused by l2cap_chan_put" + "CVE-2021-47120": { + "cmt_msg": "HID: magicmouse: fix NULL-deref on disconnect" }, - "CVE-2018-12930": { - "cmt_msg": "" + "CVE-2021-47126": { + "cmt_msg": "ipv6: Fix KASAN: slab-out-of-bounds Read in fib6_nh_flush_exceptions" }, - "CVE-2018-12931": { - "cmt_msg": "" + "CVE-2021-47125": { + "cmt_msg": "sch_htb: fix refcount leak in htb_parent_to_leaf_offload" }, - "CVE-2017-7308": { - "cmt_msg": "net/packet: fix overflow in check for priv area size" + "CVE-2021-47124": { + "cmt_msg": "io_uring: fix link timeout refs" }, - "CVE-2024-23196": { - "cmt_msg": "" + "CVE-2023-2269": { + "cmt_msg": "dm ioctl: fix nested locking in table_clear() to remove deadlock concern" }, - "CVE-2020-12769": { - "cmt_msg": "spi: spi-dw: Add lock protect dw_spi rx/tx to prevent concurrent calls" + "CVE-2023-0394": { + "cmt_msg": "ipv6: raw: Deduct extension header length in rawv6_push_pending_frames" }, - "CVE-2021-39636": { - "cmt_msg": "netfilter: x_tables: fix pointer leaks to userspace" + "CVE-2021-47171": { + "cmt_msg": "net: usb: fix memory leak in smsc75xx_bind" }, - "CVE-2017-8890": { - "cmt_msg": "dccp/tcp: do not inherit mc_list from parent" + "CVE-2024-26615": { + "cmt_msg": "net/smc: fix illegal rmb_desc access in SMC-D connection dump" }, - "CVE-2022-4662": { - "cmt_msg": "USB: core: Prevent nested device-reset calls" + "CVE-2022-3108": { + "cmt_msg": "drm/amdkfd: Check for null pointer after calling kmemdup" }, - "CVE-2021-32399": { - "cmt_msg": "bluetooth: eliminate the potential race condition when removing the HCI controller" + "CVE-2022-36402": { + "cmt_msg": "drm/vmwgfx: Fix shader stage validation" }, - "CVE-2021-45868": { - "cmt_msg": "quota: check block number when reading the block in quota file" + "CVE-2021-4157": { + "cmt_msg": "pNFS/flexfiles: fix incorrect size check in decode_nfs_fh()" }, - "CVE-2019-12380": { - "cmt_msg": "efi/x86/Add missing error handling to old_memmap 1:1 mapping code" + "CVE-2021-4154": { + "cmt_msg": "cgroup: verify that source is a string" }, - "CVE-2019-12381": { - "cmt_msg": "ip_sockglue: Fix missing-check bug in ip_ra_control()" + "CVE-2021-4155": { + "cmt_msg": "xfs: map unwritten blocks in XFS_IOC_{ALLOC,FREE}SP just like fallocate" }, - "CVE-2019-12382": { - "cmt_msg": "drm/edid: Fix a missing-check bug in drm_load_edid_firmware()" + "CVE-2022-1729": { + "cmt_msg": "perf: Fix sys_perf_event_open() race against self" }, - "CVE-2017-10810": { - "cmt_msg": "drm/virtio: don't leak bo on drm_gem_object_init failure" + "CVE-2021-4150": { + "cmt_msg": "block: fix incorrect references to disk objects" }, - "CVE-2020-12364": { - "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" + "CVE-2020-3702": { + "cmt_msg": "ath: Use safer key clearing with key cache entries" }, - "CVE-2022-20166": { - "cmt_msg": "drivers core: Use sysfs_emit and sysfs_emit_at for show(device *...) functions" + "CVE-2023-52485": { + "cmt_msg": "drm/amd/display: Wake DMCUB before sending a command" }, - "CVE-2017-12146": { - "cmt_msg": "driver core: platform: fix race condition with driver_override" + "CVE-2021-3653": { + "cmt_msg": "KVM: nSVM: avoid picking up unsupported bits from L2 in int_ctl (CVE-2021-3653)" }, - "CVE-2021-3732": { - "cmt_msg": "ovl: prevent private clone if bind mount is not allowed" + "CVE-2021-3655": { + "cmt_msg": "sctp: validate from_addr_param return" }, - "CVE-2016-9588": { - "cmt_msg": "kvm: nVMX: Allow L1 to intercept software exceptions (#BP and #OF)" + "CVE-2020-8694": { + "cmt_msg": "powercap: restrict energy meter to root access" }, - "CVE-2022-25375": { - "cmt_msg": "usb: gadget: rndis: check size of RNDIS_MSG_SET command" + "CVE-2021-4159": { + "cmt_msg": "bpf: Verifer, adjust_scalar_min_max_vals to always call update_reg_bounds()" }, - "CVE-2020-10766": { - "cmt_msg": "x86/speculation: Prevent rogue cross-process SSBD shutdown" + "CVE-2023-0461": { + "cmt_msg": "net/ulp: prevent ULP without clone op from entering the LISTEN status" }, - "CVE-2017-13166": { - "cmt_msg": "media: v4l2-ioctl.c: use check_fmt for enum/g/s/try_fmt" + "CVE-2021-29154": { + "cmt_msg": "bpf, x86: Validate computation of branch displacements for x86-64" }, - "CVE-2018-12207": { - "cmt_msg": "kvm: x86, powerpc: do not allow clearing largepages debugfs entry" + "CVE-2021-29155": { + "cmt_msg": "bpf: Use correct permission flag for mixed signed bounds arithmetic" }, - "CVE-2017-1000364": { - "cmt_msg": "mm: larger stack guard gap, between vmas" + "CVE-2021-3714": { + "cmt_msg": "" }, - "CVE-2017-1000365": { - "cmt_msg": "fs/exec.c: account for argv/envp pointers" + "CVE-2024-26733": { + "cmt_msg": "arp: Prevent overflow in arp_req_get()." }, - "CVE-2020-13143": { - "cmt_msg": "USB: gadget: fix illegal array access in binding with UDC" + "CVE-2021-3896": { + "cmt_msg": "isdn: cpai: check ctr->cnr to avoid array index out of bound" }, - "CVE-2023-5178": { - "cmt_msg": "nvmet-tcp: Fix a possible UAF in queue intialization setup" + "CVE-2021-3894": { + "cmt_msg": "sctp: account stream padding length for reconf chunk" }, - "CVE-2020-10768": { - "cmt_msg": "x86/speculation: PR_SPEC_FORCE_DISABLE enforcement for indirect branches." + "CVE-2021-47177": { + "cmt_msg": "iommu/vt-d: Fix sysfs leak in alloc_iommu()" }, - "CVE-2017-13168": { - "cmt_msg": "scsi: sg: mitigate read/write abuse" + "CVE-2021-3892": { + "cmt_msg": "" }, - "CVE-2017-1000363": { - "cmt_msg": "char: lp: fix possible integer overflow in lp_setup()" + "CVE-2023-52445": { + "cmt_msg": "media: pvrusb2: fix use after free on context disconnection" }, - "CVE-2019-0148": { - "cmt_msg": "i40e: Wrong truncation from u16 to u8" + "CVE-2023-20928": { + "cmt_msg": "android: binder: stop saving a pointer to the VMA" }, - "CVE-2022-2978": { - "cmt_msg": "fs: fix UAF/GPF bug in nilfs_mdt_destroy" + "CVE-2021-39633": { + "cmt_msg": "ip_gre: add validation for csum_start" }, - "CVE-2019-17075": { - "cmt_msg": "RDMA/cxgb4: Do not dma memory off of the stack" + "CVE-2022-27223": { + "cmt_msg": "USB: gadget: validate endpoint index for xilinx udc" }, - "CVE-2022-3903": { - "cmt_msg": "media: mceusb: Use new usb_control_msg_*() routines" + "CVE-2023-35788": { + "cmt_msg": "net/sched: flower: fix possible OOB write in fl_set_geneve_opt()" }, - "CVE-2022-23960": { - "cmt_msg": "ARM: report Spectre v2 status through sysfs" + "CVE-2022-2639": { + "cmt_msg": "openvswitch: fix OOB access in reserve_sfa_size()" }, - "CVE-2023-39189": { - "cmt_msg": "netfilter: nfnetlink_osf: avoid OOB read" + "CVE-2021-39634": { + "cmt_msg": "epoll: do not insert into poll queues until all sanity checks are done" }, - "CVE-2019-0146": { - "cmt_msg": "i40e: add num_vectors checker in iwarp handler" + "CVE-2022-24959": { + "cmt_msg": "yam: fix a memory leak in yam_siocdevprivate()" }, - "CVE-2019-0147": { - "cmt_msg": "i40e: add num_vectors checker in iwarp handler" + "CVE-2022-25375": { + "cmt_msg": "usb: gadget: rndis: check size of RNDIS_MSG_SET command" }, - "CVE-2020-10942": { - "cmt_msg": "vhost: Check docket sk_family instead of call getname" + "CVE-2022-33742": { + "cmt_msg": "xen/blkfront: force data bouncing when backend is untrusted" }, - "CVE-2018-3693": { - "cmt_msg": "ext4: fix spectre gadget in ext4_mb_regular_allocator()" + "CVE-2022-33741": { + "cmt_msg": "xen/netfront: force data bouncing when backend is untrusted" }, - "CVE-2017-15299": { - "cmt_msg": "KEYS: don't let add_key() update an uninstantiated key" + "CVE-2022-33740": { + "cmt_msg": "xen/netfront: fix leaking data in shared pages" }, - "CVE-2023-3338": { - "cmt_msg": "Remove DECnet support from kernel" + "CVE-2024-24864": { + "cmt_msg": "" }, - "CVE-2019-11190": { - "cmt_msg": "binfmt_elf: switch to new creds when switching to new mm" + "CVE-2022-45885": { + "cmt_msg": "" }, - "CVE-2019-11191": { - "cmt_msg": "x86: Deprecate a.out support" + "CVE-2022-33744": { + "cmt_msg": "xen/arm: Fix race in RB-tree based P2M accounting" }, - "CVE-2023-4385": { - "cmt_msg": "fs: jfs: fix possible NULL pointer dereference in dbFree()" + "CVE-2023-52596": { + "cmt_msg": "sysctl: Fix out of bounds access for empty sysctl registers" }, - "CVE-2016-5195": { - "cmt_msg": "mm: remove gup_flags FOLL_WRITE games from __get_user_pages()" + "CVE-2021-47016": { + "cmt_msg": "m68k: mvme147,mvme16x: Don't wipe PCC timer config bits" }, - "CVE-2023-35001": { - "cmt_msg": "netfilter: nf_tables: prevent OOB access in nft_byteorder_eval" + "CVE-2021-47015": { + "cmt_msg": "bnxt_en: Fix RX consumer index logic in the error path." }, - "CVE-2018-10323": { - "cmt_msg": "xfs: set format back to extents if xfs_bmap_extents_to_btree" + "CVE-2023-52443": { + "cmt_msg": "apparmor: avoid crash when parsed profile name is empty" }, - "CVE-2018-10322": { - "cmt_msg": "xfs: enhance dinode verifier" + "CVE-2021-47013": { + "cmt_msg": "net:emac/emac-mac: Fix a use after free in emac_mac_tx_buf_send" }, - "CVE-2023-1989": { - "cmt_msg": "Bluetooth: btsdio: fix use after free bug in btsdio_remove due to unfinished work" + "CVE-2021-47012": { + "cmt_msg": "RDMA/siw: Fix a use after free in siw_alloc_mr" }, - "CVE-2017-5576": { - "cmt_msg": "drm/vc4: Fix an integer overflow in temporary allocation layout." + "CVE-2021-47158": { + "cmt_msg": "net: dsa: sja1105: add error handling in sja1105_setup()" }, - "CVE-2017-5577": { - "cmt_msg": "drm/vc4: Return -EINVAL on the overflow checks failing." + "CVE-2021-47010": { + "cmt_msg": "net: Only allow init netns to set default tcp cong to a restricted algo" }, - "CVE-2021-0447": { - "cmt_msg": "l2tp: protect sock pointer of struct pppol2tp_session with RCU" + "CVE-2022-1280": { + "cmt_msg": "drm: avoid circular locks in drm_mode_getconnector" }, - "CVE-2017-8824": { - "cmt_msg": "dccp: CVE-2017-8824: use-after-free in DCCP code" + "CVE-2020-12888": { + "cmt_msg": "vfio-pci: Invalidate mmaps and block MMIO access on disabled memory" }, - "CVE-2018-7492": { - "cmt_msg": "rds: Fix NULL pointer dereference in __rds_rdma_map" + "CVE-2021-47153": { + "cmt_msg": "i2c: i801: Don't generate an interrupt on bus reset" }, - "CVE-2020-26139": { - "cmt_msg": "mac80211: do not accept/forward invalid EAPOL frames" + "CVE-2021-47150": { + "cmt_msg": "net: fec: fix the potential memory leak in fec_enet_init()" }, - "CVE-2018-20836": { - "cmt_msg": "scsi: libsas: fix a race condition when smp task timeout" + "CVE-2021-47018": { + "cmt_msg": "powerpc/64: Fix the definition of the fixmap area" }, - "CVE-2017-8065": { - "cmt_msg": "crypto: ccm - move cbcmac input off the stack" + "CVE-2021-46936": { + "cmt_msg": "net: fix use-after-free in tw_timer_handler" }, - "CVE-2017-13305": { - "cmt_msg": "KEYS: encrypted: fix buffer overread in valid_master_desc()" + "CVE-2021-46935": { + "cmt_msg": "binder: fix async_free_space accounting for empty parcels" }, - "CVE-2016-6136": { - "cmt_msg": "audit: fix a double fetch in audit_log_single_execve_arg()" + "CVE-2021-46934": { + "cmt_msg": "i2c: validate user data in compat ioctl" }, - "CVE-2019-19536": { - "cmt_msg": "can: peak_usb: pcan_usb_pro: Fix info-leaks to USB devices" + "CVE-2021-46933": { + "cmt_msg": "usb: gadget: f_fs: Clear ffs_eventfd in ffs_data_clear." }, - "CVE-2019-19537": { - "cmt_msg": "USB: core: Fix races in character device registration and deregistraion" + "CVE-2020-14331": { + "cmt_msg": "vgacon: Fix for missing check in scrollback handling" }, - "CVE-2019-19534": { - "cmt_msg": "can: peak_usb: fix slab info leak" + "CVE-2021-46930": { + "cmt_msg": "usb: mtu3: fix list_head check warning" }, - "CVE-2017-1000370": { - "cmt_msg": "binfmt_elf: use ELF_ET_DYN_BASE only for PIE" + "CVE-2022-36946": { + "cmt_msg": "netfilter: nf_queue: do not allow packet truncation below transport header offset" }, - "CVE-2019-19532": { - "cmt_msg": "HID: Fix assumption that devices have inputs" + "CVE-2021-20194": { + "cmt_msg": "io_uring: don't rely on weak ->files references" }, - "CVE-2019-11479": { - "cmt_msg": "tcp: add tcp_min_snd_mss sysctl" + "CVE-2011-4916": { + "cmt_msg": "" }, - "CVE-2019-10638": { - "cmt_msg": "inet: switch IP ID generator to siphash" + "CVE-2021-0448": { + "cmt_msg": "netfilter: ctnetlink: add a range check for l3/l4 protonum" }, - "CVE-2019-10639": { - "cmt_msg": "netns: provide pure entropy for net_hash_mix()" + "CVE-2021-47103": { + "cmt_msg": "inet: fully convert sk->sk_rx_dst to RCU rules" }, - "CVE-2021-0929": { - "cmt_msg": "staging/android/ion: delete dma_buf->kmap/unmap implemenation" + "CVE-2021-46939": { + "cmt_msg": "tracing: Restructure trace_clock_global() to never block" }, - "CVE-2019-11478": { - "cmt_msg": "tcp: tcp_fragment() should apply sane memory limits" + "CVE-2021-46938": { + "cmt_msg": "dm rq: fix double free of blk_mq_tag_set in dev remove after table load fails" }, - "CVE-2018-19985": { - "cmt_msg": "USB: hso: Fix OOB memory access in hso_probe/hso_get_config_data" + "CVE-2021-47105": { + "cmt_msg": "ice: xsk: return xsk buffers back to pool when cleaning the ring" }, - "CVE-2018-6554": { - "cmt_msg": "staging: irda: remove the irda network stack and drivers" + "CVE-2024-0841": { + "cmt_msg": "fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super" }, - "CVE-2017-18257": { - "cmt_msg": "f2fs: fix a dead loop in f2fs_fiemap()" + "CVE-2021-29650": { + "cmt_msg": "netfilter: x_tables: Use correct memory barriers." }, - "CVE-2023-6546": { - "cmt_msg": "tty: n_gsm: fix the UAF caused by race condition in gsm_cleanup_mux" + "CVE-2023-34255": { + "cmt_msg": "xfs: verify buffer contents when we skip log replay" }, - "CVE-2017-18255": { - "cmt_msg": "perf/core: Fix the perf_cpu_time_max_percent check" + "CVE-2022-41849": { + "cmt_msg": "fbdev: smscufx: Fix use-after-free in ufx_ops_open()" }, - "CVE-2017-7273": { - "cmt_msg": "HID: hid-cypress: validate length of report" + "CVE-2022-41848": { + "cmt_msg": "" }, - "CVE-2018-5953": { - "cmt_msg": "printk: hash addresses printed with %p" + "CVE-2022-1353": { + "cmt_msg": "af_key: add __GFP_ZERO flag for compose_sadb_supported in function pfkey_register" }, - "CVE-2016-7097": { - "cmt_msg": "posix_acl: Clear SGID bit when setting file permissions" + "CVE-2022-28356": { + "cmt_msg": "llc: fix netdevice reference leaks in llc_ui_bind()" }, - "CVE-2024-26587": { - "cmt_msg": "net: netdevsim: don't try to destroy PHC on VFs" + "CVE-2020-16119": { + "cmt_msg": "dccp: don't duplicate ccid when cloning dccp sock" }, - "CVE-2023-51043": { - "cmt_msg": "drm/atomic: Fix potential use-after-free in nonblocking commits" + "CVE-2020-29534": { + "cmt_msg": "io_uring: don't rely on weak ->files references" }, - "CVE-2020-28374": { - "cmt_msg": "scsi: target: Fix XCOPY NAA identifier lookup" + "CVE-2024-26748": { + "cmt_msg": "usb: cdns3: fix memory double free when handle zero packet" }, - "CVE-2017-7477": { - "cmt_msg": "macsec: avoid heap overflow in skb_to_sgvec" + "CVE-2022-1198": { + "cmt_msg": "drivers: hamradio: 6pack: fix UAF bug caused by mod_timer()" }, - "CVE-2023-2007": { - "cmt_msg": "scsi: dpt_i2o: Remove obsolete driver" + "CVE-2022-1199": { + "cmt_msg": "ax25: Fix NULL pointer dereference in ax25_kill_by_device" }, - "CVE-2023-0615": { - "cmt_msg": "media: vivid: dev->bitmap_cap wasn't freed in all cases" + "CVE-2023-6546": { + "cmt_msg": "tty: n_gsm: fix the UAF caused by race condition in gsm_cleanup_mux" }, - "CVE-2017-7472": { - "cmt_msg": "KEYS: fix keyctl_set_reqkey_keyring() to not leak thread keyrings" + "CVE-2021-39801": { + "cmt_msg": "" }, - "CVE-2017-16535": { - "cmt_msg": "USB: core: fix out-of-bounds access bug in usb_get_bos_descriptor()" + "CVE-2021-39800": { + "cmt_msg": "" }, - "CVE-2017-16534": { - "cmt_msg": "USB: core: harden cdc_parse_cdc_header" + "CVE-2021-28375": { + "cmt_msg": "misc: fastrpc: restrict user apps from sending kernel RPC messages" }, - "CVE-2017-16537": { - "cmt_msg": "media: imon: Fix null-ptr-deref in imon_probe" + "CVE-2022-1195": { + "cmt_msg": "hamradio: improve the incomplete fix to avoid NPD" }, - "CVE-2017-16536": { - "cmt_msg": "[media] cx231xx-cards: fix NULL-deref on missing association descriptor" + "CVE-2021-26708": { + "cmt_msg": "vsock: fix the race conditions in multi-transport support" }, - "CVE-2017-16531": { - "cmt_msg": "USB: fix out-of-bounds in usb_set_configuration" + "CVE-2021-4202": { + "cmt_msg": "NFC: reorganize the functions in nci_request" }, - "CVE-2017-16530": { - "cmt_msg": "USB: uas: fix bug in handling of alternate settings" + "CVE-2021-4203": { + "cmt_msg": "af_unix: fix races in sk_peer_pid and sk_peer_cred accesses" }, - "CVE-2017-16533": { - "cmt_msg": "HID: usbhid: fix out-of-bounds bug" + "CVE-2022-4269": { + "cmt_msg": "act_mirred: use the backlog for nested calls to mirred ingress" }, - "CVE-2017-16532": { - "cmt_msg": "usb: usbtest: fix NULL pointer dereference" + "CVE-2022-45886": { + "cmt_msg": "media: dvb-core: Fix use-after-free due on race condition at dvb_net" }, - "CVE-2023-35824": { - "cmt_msg": "media: dm1105: Fix use after free bug in dm1105_remove due to race condition" + "CVE-2023-52509": { + "cmt_msg": "ravb: Fix use-after-free issue in ravb_tx_timeout_work()" }, - "CVE-2022-43750": { - "cmt_msg": "usb: mon: make mmapped memory read only" + "CVE-2023-46343": { + "cmt_msg": "nfc: nci: fix possible NULL pointer dereference in send_acknowledge()" }, - "CVE-2017-16538": { - "cmt_msg": "media: dvb-usb-v2: lmedm04: Improve logic checking of warm start" + "CVE-2024-25744": { + "cmt_msg": "x86/coco: Disable 32-bit emulation by default on TDX and SEV" }, - "CVE-2023-3006": { - "cmt_msg": "arm64: Add AMPERE1 to the Spectre-BHB affected list" + "CVE-2023-52504": { + "cmt_msg": "x86/alternatives: Disable KASAN in apply_alternatives()" }, - "CVE-2020-27825": { - "cmt_msg": "tracing: Fix race in trace_open and buffer resize call" + "CVE-2023-52507": { + "cmt_msg": "nfc: nci: assert requested protocol is valid" }, - "CVE-2016-9084": { - "cmt_msg": "vfio/pci: Fix integer overflows, bitmask check" + "CVE-2023-2124": { + "cmt_msg": "xfs: verify buffer contents when we skip log replay" }, - "CVE-2019-2182": { - "cmt_msg": "arm64: Enforce BBM for huge IO/VMAP mappings" + "CVE-2023-52501": { + "cmt_msg": "ring-buffer: Do not attempt to read past \"commit\"" }, - "CVE-2020-27820": { - "cmt_msg": "drm/nouveau: use drm_dev_unplug() during device removal" + "CVE-2023-52500": { + "cmt_msg": "scsi: pm80xx: Avoid leaking tags when processing OPC_INB_SET_CONTROLLER_CONFIG command" }, - "CVE-2016-9083": { - "cmt_msg": "vfio/pci: Fix integer overflows, bitmask check" + "CVE-2023-52502": { + "cmt_msg": "net: nfc: fix races in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn()" }, - "CVE-2017-18222": { - "cmt_msg": "net: hns: fix ethtool_get_strings overflow in hns driver" + "CVE-2023-1281": { + "cmt_msg": "net/sched: tcindex: update imperfect hash filters respecting rcu" }, - "CVE-2017-18221": { - "cmt_msg": "mlock: fix mlock count can not decrease in race condition" + "CVE-2023-2860": { + "cmt_msg": "ipv6: sr: fix out-of-bounds read when setting HMAC data." }, - "CVE-2023-4622": { - "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES" + "CVE-2021-44879": { + "cmt_msg": "f2fs: fix to do sanity check on inode type during garbage collection" }, - "CVE-2019-20794": { - "cmt_msg": "" + "CVE-2023-1859": { + "cmt_msg": "9p/xen : Fix use after free bug in xen_9pfs_front_remove due to race condition" }, - "CVE-2023-39193": { - "cmt_msg": "netfilter: xt_sctp: validate the flag_info count" + "CVE-2023-2513": { + "cmt_msg": "ext4: fix use-after-free in ext4_xattr_set_entry" }, - "CVE-2017-18224": { - "cmt_msg": "ocfs2: ip_alloc_sem should be taken in ocfs2_get_block()" + "CVE-2023-1855": { + "cmt_msg": "hwmon: (xgene) Fix use after free bug in xgene_hwmon_remove due to race condition" }, - "CVE-2020-26541": { - "cmt_msg": "certs: Add EFI_CERT_X509_GUID support for dbx entries" + "CVE-2022-27672": { + "cmt_msg": "x86/speculation: Identify processors vulnerable to SMT RSB predictions" }, - "CVE-2023-6610": { - "cmt_msg": "smb: client: fix potential OOB in smb2_dump_detail()" + "CVE-2024-26668": { + "cmt_msg": "netfilter: nft_limit: reject configurations that cause integer overflow" }, - "CVE-2020-26559": { - "cmt_msg": "" + "CVE-2024-26669": { + "cmt_msg": "net/sched: flower: Fix chain template offload" }, - "CVE-2020-27673": { - "cmt_msg": "xen/events: add a proper barrier to 2-level uevent unmasking" + "CVE-2021-47146": { + "cmt_msg": "mld: fix panic in mld_newpack()" }, - "CVE-2021-43389": { - "cmt_msg": "isdn: cpai: check ctr->cnr to avoid array index out of bound" + "CVE-2022-38457": { + "cmt_msg": "drm/vmwgfx: Remove rcu locks from user resources" }, - "CVE-2017-14156": { - "cmt_msg": "video: fbdev: aty: do not leak uninitialized padding in clk to userspace" + "CVE-2015-2877": { + "cmt_msg": "" }, - "CVE-2021-33061": { - "cmt_msg": "ixgbe: add improvement for MDD response functionality" + "CVE-2023-26242": { + "cmt_msg": "" }, - "CVE-2024-26592": { - "cmt_msg": "ksmbd: fix UAF issue in ksmbd_tcp_new_connection()" + "CVE-2024-26664": { + "cmt_msg": "hwmon: (coretemp) Fix out-of-bounds memory access" }, - "CVE-2017-2671": { - "cmt_msg": "ping: implement proper locking" + "CVE-2019-16089": { + "cmt_msg": "" + }, + "CVE-2021-38198": { + "cmt_msg": "KVM: X86: MMU: Use the correct inherited permissions to get shadow page" }, - "CVE-2018-1092": { - "cmt_msg": "ext4: fail ext4_iget for root directory if unallocated" + "CVE-2021-38199": { + "cmt_msg": "NFSv4: Initialise connection to the server in nfs4_alloc_client()" }, - "CVE-2018-1093": { - "cmt_msg": "ext4: add validity checks for bitmap block numbers" + "CVE-2024-26689": { + "cmt_msg": "ceph: prevent use-after-free in encode_cap_msg()" }, - "CVE-2017-18551": { - "cmt_msg": "i2c: core-smbus: prevent stack corruption on read I2C_BLOCK_DATA" + "CVE-2022-1679": { + "cmt_msg": "ath9k: fix use-after-free in ath9k_hif_usb_rx_cb" }, - "CVE-2023-1074": { - "cmt_msg": "sctp: fail if no bound addresses can be used for a given scope" + "CVE-2023-34256": { + "cmt_msg": "ext4: avoid a potential slab-out-of-bounds in ext4_group_desc_csum" }, - "CVE-2017-18552": { - "cmt_msg": "RDS: validate the requested traces user input against max supported" + "CVE-2023-1513": { + "cmt_msg": "kvm: initialize all of the kvm_debugregs structure before sending it to userspace" }, - "CVE-2021-26931": { - "cmt_msg": "xen-blkback: don't \"handle\" error by BUG()" + "CVE-2021-26401": { + "cmt_msg": "x86/speculation: Use generic retpoline by default on AMD" }, - "CVE-2024-26584": { - "cmt_msg": "net: tls: handle backlogging of crypto requests" + "CVE-2020-28941": { + "cmt_msg": "speakup: Do not let the line discipline be used several times" }, - "CVE-2022-1652": { - "cmt_msg": "floppy: use a statically allocated error counter" + "CVE-2023-52442": { + "cmt_msg": "ksmbd: validate session id and tree id in compound request" }, - "CVE-2023-4623": { - "cmt_msg": "net/sched: sch_hfsc: Ensure inner classes have fsc curve" + "CVE-2022-40768": { + "cmt_msg": "scsi: stex: Properly zero out the passthrough command structure" }, - "CVE-2020-29568": { - "cmt_msg": "xen/xenbus: Allow watches discard events before queueing" + "CVE-2021-45486": { + "cmt_msg": "inet: use bigger hash table for IP ID generation" }, - "CVE-2018-18559": { - "cmt_msg": "net/packet: fix a race in packet_bind() and packet_notifier()" + "CVE-2021-3923": { + "cmt_msg": "RDMA/core: Don't infoleak GRH fields" }, - "CVE-2019-9457": { - "cmt_msg": "exec: Limit arg stack to at most 75% of _STK_LIM" + "CVE-2011-4917": { + "cmt_msg": "" }, - "CVE-2019-19054": { - "cmt_msg": "media: rc: prevent memory leak in cx23888_ir_probe" + "CVE-2021-45485": { + "cmt_msg": "ipv6: use prandom_u32() for ID generation" }, - "CVE-2019-19057": { - "cmt_msg": "mwifiex: pcie: Fix memory leak in mwifiex_pcie_init_evt_ring" + "CVE-2023-52448": { + "cmt_msg": "gfs2: Fix kernel NULL pointer dereference in gfs2_rgrp_dump" }, - "CVE-2019-19056": { - "cmt_msg": "mwifiex: pcie: Fix memory leak in mwifiex_pcie_alloc_cmdrsp_buf" + "CVE-2023-52449": { + "cmt_msg": "mtd: Fix gluebi NULL pointer dereference caused by ftl notifier" }, - "CVE-2016-10741": { - "cmt_msg": "xfs: don't BUG() on mixed direct and mapped I/O" + "CVE-2023-3220": { + "cmt_msg": "drm/msm/dpu: Add check for pstates" }, "CVE-2023-23039": { "cmt_msg": "" }, - "CVE-2019-19052": { - "cmt_msg": "can: gs_usb: gs_can_open(): prevent memory leak" + "CVE-2024-26719": { + "cmt_msg": "nouveau: offload fence uevents work to workqueue" }, - "CVE-2019-3846": { - "cmt_msg": "mwifiex: Fix possible buffer overflows at parsing bss descriptor" + "CVE-2024-26715": { + "cmt_msg": "usb: dwc3: gadget: Fix NULL pointer dereference in dwc3_gadget_suspend" }, - "CVE-2023-46838": { - "cmt_msg": "xen-netback: don't produce zero-size SKB frags" + "CVE-2024-1312": { + "cmt_msg": "mm: lock_vma_under_rcu() must check vma->anon_vma under vma lock" }, - "CVE-2020-0427": { - "cmt_msg": "pinctrl: devicetree: Avoid taking direct reference to device name string" + "CVE-2024-26713": { + "cmt_msg": "powerpc/pseries/iommu: Fix iommu initialisation during DLPAR add" }, - "CVE-2019-9458": { - "cmt_msg": "media: v4l: event: Prevent freeing event subscriptions while accessed" + "CVE-2023-3338": { + "cmt_msg": "Remove DECnet support from kernel" }, - "CVE-2021-39714": { - "cmt_msg": "staging: android: ion: Drop ion_map_kernel interface" + "CVE-2024-26712": { + "cmt_msg": "powerpc/kasan: Fix addr error caused by page alignment" }, - "CVE-2023-39197": { - "cmt_msg": "netfilter: conntrack: dccp: copy entire header to stack buffer, not just basic one" + "CVE-2023-1637": { + "cmt_msg": "x86/speculation: Restore speculation related MSRs during S3 resume" + } + } + }, + "4.3": { + "4.3": { + "CVE-2015-8953": { + "cmt_msg": "ovl: fix dentry reference leak", + "cmt_id": "ab79efab0a0ba01a74df782eb7fa44b044dae8b5" + } + }, + "4.3.1": { + "CVE-2015-5307": { + "cmt_msg": "KVM: x86: work around infinite loop in microcode when #AC is delivered", + "cmt_id": "971cdbf756b5e29427ca8d94e0df3a25a66a7ed8" + } + }, + "4.3.2": { + "CVE-2015-5327": { + "cmt_msg": "X.509: Fix the time validation [ver #2]", + "cmt_id": "14a837d297366fed10bc5f6f2bbecf9400e84e15" + } + }, + "4.3.3": { + "CVE-2016-3841": { + "cmt_msg": "ipv6: add complete rcu protection around np->opt", + "cmt_id": "645e3f33c73ad1153db0680b6833cf70d0d4dce3" }, - "CVE-2017-9242": { - "cmt_msg": "ipv6: fix out of bound writes in __ip6_append_data()" + "CVE-2015-8374": { + "cmt_msg": "Btrfs: fix truncation of compressed and inlined extents", + "cmt_id": "90291b48b1d907425d8741861fff1dfe4cf7156f" }, - "CVE-2016-8660": { - "cmt_msg": "" + "CVE-2015-7990": { + "cmt_msg": "RDS: fix race condition when sending a message on unbound socket", + "cmt_id": "0eaa7b64f7c307249fc28f2a57ff20aa905910bb" }, - "CVE-2020-14314": { - "cmt_msg": "ext4: fix potential negative array index in do_split()" + "CVE-2015-8961": { + "cmt_msg": "ext4: fix potential use after free in __ext4_journal_stop", + "cmt_id": "5a4ead78e6a00d20924ea1485d51529d9d6c335f" }, - "CVE-2023-3090": { - "cmt_msg": "ipvlan:Fix out-of-bounds caused by unclear skb->cb" + "CVE-2013-7446": { + "cmt_msg": "unix: avoid use-after-free in ep_remove_wait_queue", + "cmt_id": "58a6a46a036ce81a2a8ecaa6fc1537c894349e3f" + } + }, + "4.3.4": { + "CVE-2015-8543": { + "cmt_msg": "net: add validation for the socket syscall protocol argument", + "cmt_id": "14d44ee8fe6872c27d97ced4bd65420001c4b0ca" }, - "CVE-2019-13272": { - "cmt_msg": "ptrace: Fix ->ptracer_cred handling for PTRACE_TRACEME" + "CVE-2015-8575": { + "cmt_msg": "bluetooth: Validate socket address length in sco_sock_bind().", + "cmt_id": "9b11c6bd46ec36ddee89e29702584d0eaca2e4f7" }, - "CVE-2021-3587": { - "cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect" + "CVE-2016-0728": { + "cmt_msg": "KEYS: Fix keyring ref leak in join_session_keyring()", + "cmt_id": "c23d6de841098d408ceb573cbc9f4dcf7c92a786" }, - "CVE-2023-45862": { - "cmt_msg": "USB: ene_usb6250: Allocate enough memory for full object" + "CVE-2015-7550": { + "cmt_msg": "KEYS: Fix race between read and revoke", + "cmt_id": "5d7e7e93f6d4a8674a6f2dbd630834757b468c34" }, - "CVE-2023-45863": { - "cmt_msg": "kobject: Fix slab-out-of-bounds in fill_kobj_path()" + "CVE-2015-8569": { + "cmt_msg": "pptp: verify sockaddr_len in pptp_bind() and pptp_connect()", + "cmt_id": "eb414863e52e4dc8763f34f5ac9c41b3ba654850" + } + }, + "4.3.5": { + "CVE-2016-2070": { + "cmt_msg": "tcp: fix zero cwnd in tcp_cwnd_reduction", + "cmt_id": "018f0282a78aac26430b7212cb2ee01348ba06d2" }, - "CVE-2023-1582": { - "cmt_msg": "fs/proc: task_mmu.c: don't read mapcount for migration entry" + "CVE-2016-2069": { + "cmt_msg": "x86/mm: Add barriers and document switch_mm()-vs-flush synchronization", + "cmt_id": "f16cabcd975ccbcc818aa64a6e61e21423b27b72" }, - "CVE-2017-15537": { - "cmt_msg": "x86/fpu: Don't let userspace set bogus xcomp_bv" + "CVE-2015-7799": { + "cmt_msg": "isdn_ppp: Add checks for allocation failure in isdn_ppp_open()", + "cmt_id": "e9af90c4bfe1cd825bd50e967914f344dd4cd9f8" }, - "CVE-2022-2588": { - "cmt_msg": "net_sched: cls_route: remove from list when handle is 0" + "CVE-2015-8845": { + "cmt_msg": "powerpc/tm: Check for already reclaimed tasks", + "cmt_id": "572c83615496e7d08554f7aeb4981f8260c53d17" }, - "CVE-2019-17351": { - "cmt_msg": "xen: let alloc_xenballooned_pages() fail if not enough memory free" + "CVE-2015-8844": { + "cmt_msg": "powerpc/tm: Block signal return setting invalid MSR state", + "cmt_id": "d5b580ef3204ee8412d420e761b47027ce5f728e" }, - "CVE-2020-36322": { - "cmt_msg": "fuse: fix bad inode" + "CVE-2016-2547": { + "cmt_msg": "ALSA: timer: Harden slave timer list handling", + "cmt_id": "ea7f3d59628930dc29482a292e2a55c81cac52a4" }, - "CVE-2022-23222": { - "cmt_msg": "bpf: Replace PTR_TO_XXX_OR_NULL with PTR_TO_XXX | PTR_MAYBE_NULL" + "CVE-2015-8104": { + "cmt_msg": "KVM: svm: unconditionally intercept #DB", + "cmt_id": "f43767aa051fbb303d22fb9c17872de084b189d4" }, - "CVE-2020-25669": { - "cmt_msg": "Input: sunkbd - avoid use-after-free in teardown paths" + "CVE-2016-2545": { + "cmt_msg": "ALSA: timer: Fix double unlink of active_list", + "cmt_id": "baa3a675b24fe17d5e514d71561d97f46bc6086f" }, - "CVE-2020-25668": { - "cmt_msg": "tty: make FONTX ioctl use the tty pointer they were actually passed" + "CVE-2016-2544": { + "cmt_msg": "ALSA: seq: Fix race at timer setup and close", + "cmt_id": "5a5c8e77d66f24446b7e741ac2e3ae3127d9dd54" }, - "CVE-2008-4609": { - "cmt_msg": "" + "CVE-2015-8816": { + "cmt_msg": "USB: fix invalid memory access in hub_activate()", + "cmt_id": "28fb0f5b4fa9b9e201b2c6d781382601b60feee3" }, - "CVE-2020-25705": { - "cmt_msg": "icmp: randomize the global rate limiter" + "CVE-2016-2546": { + "cmt_msg": "ALSA: timer: Fix race among timer ioctls", + "cmt_id": "7066da22b1eb40e955f9dfe57022816fae53d3cf" }, - "CVE-2021-0448": { - "cmt_msg": "netfilter: ctnetlink: add a range check for l3/l4 protonum" + "CVE-2015-7884": { + "cmt_msg": "media/vivid-osd: fix info leak in ioctl", + "cmt_id": "42debcb0815cfdf8c1a5e5c40eb71f6c2547c432" }, - "CVE-2023-52458": { - "cmt_msg": "block: add check that partition length needs to be aligned with block size" + "CVE-2016-2543": { + "cmt_msg": "ALSA: seq: Fix missing NULL check at remove_events ioctl", + "cmt_id": "6f54677f06bf3fd3c3f327d14ded94a0330d8d0c" }, - "CVE-2023-40283": { - "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb" + "CVE-2013-4312": { + "cmt_msg": "unix: properly account for FDs passed over unix sockets", + "cmt_id": "9b8b611fe0f86f07a4ff4a5f3bcb0ea7ceb7da3b" }, - "CVE-2022-1419": { - "cmt_msg": "drm/vgem: Close use-after-free race in vgem_gem_create" + "CVE-2016-2549": { + "cmt_msg": "ALSA: hrtimer: Fix stall by hrtimer_cancel()", + "cmt_id": "5d10aae7acaf91cdc6fdd5a3d4506af5f6ec957c" }, - "CVE-2018-20854": { - "cmt_msg": "phy: ocelot-serdes: fix out-of-bounds read" + "CVE-2016-2548": { + "cmt_msg": "ALSA: timer: Harden slave timer list handling", + "cmt_id": "ea7f3d59628930dc29482a292e2a55c81cac52a4" + } + }, + "4.3.6": { + "CVE-2016-2782": { + "cmt_msg": "USB: visor: fix null-deref at probe", + "cmt_id": "52827582844e0a6b951875e64d799e68ed4cceb7" }, - "CVE-2018-25020": { - "cmt_msg": "bpf: fix truncated jump targets on heavy expansions" + "CVE-2016-2384": { + "cmt_msg": "ALSA: usb-audio: avoid freeing umidi object twice", + "cmt_id": "2009976a54a59d22521380100747a02a85c12a81" }, - "CVE-2022-3533": { - "cmt_msg": "" + "CVE-2016-2085": { + "cmt_msg": "EVM: Use crypto_memneq() for digest comparisons", + "cmt_id": "310e1b339cbc72c5cf1055c14ce942393bde189a" }, - "CVE-2023-26607": { - "cmt_msg": "ntfs: fix out-of-bounds read in ntfs_attr_find()" + "CVE-2016-8646": { + "cmt_msg": "crypto: algif_hash - Only export and import on sockets with data", + "cmt_id": "d4f9756c6ad78cbb728549e1e0dd7afafd8069a6" }, - "CVE-2018-20855": { - "cmt_msg": "IB/mlx5: Fix leaking stack memory to userspace" + "CVE-2016-0723": { + "cmt_msg": "tty: Fix unsafe ldisc reference via ioctl(TIOCGETD)", + "cmt_id": "459cd75bada64e377cdeb92f1f76f8c474e73e46" }, - "CVE-2019-15239": { - "cmt_msg": "unknown" + "CVE-2017-13215": { + "cmt_msg": "crypto: algif_skcipher - Load TX SG list after waiting", + "cmt_id": "7420844c60979fe94b2a6fb1b1b5ee2147fbe71b" }, - "CVE-2017-15129": { - "cmt_msg": "net: Fix double free and memory corruption in get_net_ns_by_id()" + "CVE-2017-13167": { + "cmt_msg": "ALSA: timer: Fix race at concurrent reads", + "cmt_id": "975d3f3449f53f9caf9f52ea9669bf7cb93e07e5" }, - "CVE-2021-4037": { - "cmt_msg": "xfs: fix up non-directory creation in SGID directories" + "CVE-2015-7566": { + "cmt_msg": "USB: serial: visor: fix crash on detecting device without write_urbs", + "cmt_id": "ac4589db9b4285b662456715a4c07110bc37370e" }, - "CVE-2021-22543": { - "cmt_msg": "KVM: do not allow mapping valid but non-reference-counted pages" + "CVE-2015-8970": { + "cmt_msg": "crypto: algif_skcipher - Require setkey before accept(2)", + "cmt_id": "ca3b842758312a5a3d7e1dc21ab451f03912cc27" + } + }, + "outstanding": { + "CVE-2019-15098": { + "cmt_msg": "ath6kl: fix a NULL-ptr-deref bug in ath6kl_usb_alloc_urb_from_pipe()" }, - "CVE-2022-45884": { - "cmt_msg": "" + "CVE-2023-1390": { + "cmt_msg": "tipc: fix NULL deref in tipc_link_xmit()" }, - "CVE-2019-1999": { - "cmt_msg": "binder: fix race between munmap() and direct reclaim" + "CVE-2017-17712": { + "cmt_msg": "net: ipv4: fix for a race condition in raw_sendmsg" }, - "CVE-2018-1065": { - "cmt_msg": "netfilter: add back stackpointer size checks" + "CVE-2022-0001": { + "cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE" }, - "CVE-2023-20941": { - "cmt_msg": "" + "CVE-2022-0002": { + "cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE" }, - "CVE-2018-1066": { - "cmt_msg": "CIFS: Enable encryption during session setup phase" + "CVE-2019-19965": { + "cmt_msg": "scsi: libsas: stop discovering if oob mode is disconnected" }, - "CVE-2017-12188": { - "cmt_msg": "KVM: nVMX: update last_nonleaf_level when initializing nested EPT" + "CVE-2017-15102": { + "cmt_msg": "usb: misc: legousbtower: Fix NULL pointer deference" }, - "CVE-2018-1068": { - "cmt_msg": "netfilter: ebtables: CONFIG_COMPAT: don't trust userland offsets" + "CVE-2023-52615": { + "cmt_msg": "hwrng: core - Fix page fault dead lock on mmap-ed hwrng" }, - "CVE-2017-17053": { - "cmt_msg": "x86/mm: Fix use-after-free of ldt_struct" + "CVE-2023-52614": { + "cmt_msg": "PM / devfreq: Fix buffer overflow in trans_stat_show" }, - "CVE-2020-0030": { - "cmt_msg": "ANDROID: binder: synchronize_rcu() when using POLLFREE." + "CVE-2023-52617": { + "cmt_msg": "PCI: switchtec: Fix stdev_release() crash after surprise hot remove" }, - "CVE-2020-10135": { - "cmt_msg": "Bluetooth: Consolidate encryption handling in hci_encrypt_cfm" + "CVE-2020-24587": { + "cmt_msg": "mac80211: prevent mixed key and fragment cache attacks" }, - "CVE-2020-25285": { - "cmt_msg": "mm/hugetlb: fix a race between hugetlb sysctl handlers" + "CVE-2020-24586": { + "cmt_msg": "mac80211: prevent mixed key and fragment cache attacks" }, - "CVE-2019-7308": { - "cmt_msg": "bpf: fix sanitation of alu op with pointer / scalar type from different paths" + "CVE-2016-3955": { + "cmt_msg": "USB: usbip: fix potential out-of-bounds write" }, - "CVE-2016-8405": { - "cmt_msg": "fbdev: color map copying bounds checking" + "CVE-2021-0129": { + "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical" }, - "CVE-2018-1000199": { - "cmt_msg": "perf/hwbp: Simplify the perf-hwbp code, fix documentation" + "CVE-2020-24588": { + "cmt_msg": "cfg80211: mitigate A-MSDU aggregation attacks" }, - "CVE-2022-1966": { - "cmt_msg": "netfilter: nf_tables: disallow non-stateful expression in sets earlier" + "CVE-2016-3951": { + "cmt_msg": "cdc_ncm: do not call usbnet_link_change from cdc_ncm_bind" }, - "CVE-2023-31084": { - "cmt_msg": "media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*()" + "CVE-2023-52618": { + "cmt_msg": "block/rnbd-srv: Check for unlikely string overflow" }, - "CVE-2017-9986": { - "cmt_msg": "sound: Retire OSS" + "CVE-2018-10940": { + "cmt_msg": "cdrom: information leak in cdrom_ioctl_media_changed()" }, - "CVE-2017-9985": { - "cmt_msg": "ALSA: msnd: Optimize / harden DSP and MIDI loops" + "CVE-2019-9506": { + "cmt_msg": "Bluetooth: Fix faulty expression for minimum encryption key size check" }, - "CVE-2017-9984": { - "cmt_msg": "ALSA: msnd: Optimize / harden DSP and MIDI loops" + "CVE-2019-9503": { + "cmt_msg": "brcmfmac: add subtype check for event handling in data path" }, - "CVE-2019-16995": { - "cmt_msg": "net: hsr: fix memory leak in hsr_dev_finalize()" + "CVE-2022-0480": { + "cmt_msg": "memcg: enable accounting for file lock caches" }, - "CVE-2017-18075": { - "cmt_msg": "crypto: pcrypt - fix freeing pcrypt instances" + "CVE-2018-10124": { + "cmt_msg": "kernel/signal.c: avoid undefined behaviour in kill_something_info" }, - "CVE-2022-3534": { - "cmt_msg": "libbpf: Fix use-after-free in btf_dump_name_dups" + "CVE-2022-0487": { + "cmt_msg": "moxart: fix potential use-after-free on remove path" }, - "CVE-2023-34256": { - "cmt_msg": "ext4: avoid a potential slab-out-of-bounds in ext4_group_desc_csum" + "CVE-2022-23825": { + "cmt_msg": "" }, - "CVE-2016-10088": { - "cmt_msg": "sg_write()/bsg_write() is not fit to be called under KERNEL_DS" + "CVE-2021-47112": { + "cmt_msg": "x86/kvm: Teardown PV features on boot CPU as well" }, - "CVE-2020-36516": { - "cmt_msg": "ipv4: avoid using shared IP generator for connected sockets" + "CVE-2021-47113": { + "cmt_msg": "btrfs: abort in rename_exchange if we fail to insert the second ref" }, - "CVE-2017-18079": { - "cmt_msg": "Input: i8042 - fix crash at boot time" + "CVE-2021-47110": { + "cmt_msg": "x86/kvm: Disable kvmclock on all CPUs on shutdown" }, - "CVE-2023-28328": { - "cmt_msg": "media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer()" + "CVE-2021-47116": { + "cmt_msg": "ext4: fix memory leak in ext4_mb_init_backend on error path." }, - "CVE-2023-0386": { - "cmt_msg": "ovl: fail on invalid uid/gid mapping at copy up" + "CVE-2021-47117": { + "cmt_msg": "ext4: fix bug on in ext4_es_cache_extent as ext4_split_extent_at failed" }, - "CVE-2017-13693": { - "cmt_msg": "" + "CVE-2021-47114": { + "cmt_msg": "ocfs2: fix data corruption by fallocate" }, - "CVE-2017-13695": { - "cmt_msg": "ACPICA: acpi: acpica: fix acpi operand cache leak in nseval.c" + "CVE-2021-47118": { + "cmt_msg": "pid: take a reference when initializing `cad_pid`" }, - "CVE-2017-13694": { - "cmt_msg": "" + "CVE-2021-46970": { + "cmt_msg": "bus: mhi: pci_generic: Remove WQ_MEM_RECLAIM flag from state workqueue" }, - "CVE-2021-4149": { - "cmt_msg": "btrfs: unlock newly allocated extent buffer after error" + "CVE-2019-10207": { + "cmt_msg": "Bluetooth: hci_uart: check for missing tty operations" }, - "CVE-2022-21385": { - "cmt_msg": "net/rds: fix warn in rds_message_alloc_sgs" + "CVE-2023-0459": { + "cmt_msg": "uaccess: Add speculation barrier to copy_from_user()" }, - "CVE-2021-3864": { - "cmt_msg": "" + "CVE-2023-0458": { + "cmt_msg": "prlimit: do_prlimit needs to have a speculation check" }, - "CVE-2021-3640": { - "cmt_msg": "Bluetooth: sco: Fix lock_sock() blockage by memcpy_from_msg()" + "CVE-2017-8924": { + "cmt_msg": "USB: serial: io_ti: fix information leak in completion handler" }, - "CVE-2017-7618": { - "cmt_msg": "crypto: ahash - Fix EINPROGRESS notification callback" + "CVE-2017-8925": { + "cmt_msg": "USB: serial: omninet: fix reference leaks at open" }, - "CVE-2020-1749": { - "cmt_msg": "net: ipv6_stub: use ip6_dst_lookup_flow instead of ip6_dst_lookup" + "CVE-2021-30002": { + "cmt_msg": "media: v4l: ioctl: Fix memory leak in video_usercopy" }, - "CVE-2022-42896": { - "cmt_msg": "Bluetooth: L2CAP: Fix accepting connection request for invalid SPSM" + "CVE-2021-0941": { + "cmt_msg": "bpf: Remove MTU check in __bpf_skb_max_len" }, - "CVE-2021-3760": { - "cmt_msg": "nfc: nci: fix the UAF of rf_conn_info object" + "CVE-2017-7294": { + "cmt_msg": "drm/vmwgfx: fix integer overflow in vmw_surface_define_ioctl()" }, - "CVE-2022-36123": { - "cmt_msg": "x86: Clear .brk area at early boot" + "CVE-2020-15802": { + "cmt_msg": "" }, - "CVE-2022-3424": { - "cmt_msg": "misc: sgi-gru: fix use-after-free error in gru_set_context_option, gru_fault and gru_handle_user_call_os" + "CVE-2022-3636": { + "cmt_msg": "net: ethernet: mtk_eth_soc: use after free in __mtk_ppe_check_skb()" }, - "CVE-2020-11608": { - "cmt_msg": "media: ov519: add missing endpoint sanity checks" + "CVE-2022-3635": { + "cmt_msg": "atm: idt77252: fix use-after-free bugs caused by tst_timer" }, - "CVE-2020-10732": { - "cmt_msg": "fs/binfmt_elf.c: allocate initialized memory in fill_thread_core_info()" + "CVE-2021-28715": { + "cmt_msg": "xen/netback: don't queue unlimited number of packages" }, - "CVE-2020-28097": { - "cmt_msg": "vgacon: remove software scrollback support" + "CVE-2022-34918": { + "cmt_msg": "netfilter: nf_tables: stricter validation of element data" }, - "CVE-2017-7616": { - "cmt_msg": "mm/mempolicy.c: fix error handling in set_mempolicy and mbind." + "CVE-2016-10906": { + "cmt_msg": "net: arc_emac: fix koops caused by sk_buff free" }, - "CVE-2023-6931": { - "cmt_msg": "perf: Fix perf_event_validate_size()" + "CVE-2016-10905": { + "cmt_msg": "GFS2: don't set rgrp gl_object until it's inserted into rgrp tree" }, - "CVE-2017-18216": { - "cmt_msg": "ocfs2: subsystem.su_mutex is required while accessing the item->ci_parent" + "CVE-2021-47028": { + "cmt_msg": "mt76: mt7915: fix txrate reporting" }, - "CVE-2017-1000112": { - "cmt_msg": "udp: consistently apply ufo or fragmentation" + "CVE-2019-19966": { + "cmt_msg": "media: cpia2: Fix use-after-free in cpia2_exit" }, - "CVE-2017-1000111": { - "cmt_msg": "packet: fix tp_reserve race in packet_set_ring" + "CVE-2017-18261": { + "cmt_msg": "clocksource/drivers/arm_arch_timer: Avoid infinite recursion when ftrace is enabled" }, - "CVE-2024-24855": { - "cmt_msg": "scsi: lpfc: Fix a possible data race in lpfc_unregister_fcf_rescan()" + "CVE-2018-5814": { + "cmt_msg": "usbip: usbip_host: fix NULL-ptr deref and use-after-free errors" }, - "CVE-2019-9466": { - "cmt_msg": "brcmfmac: add subtype check for event handling in data path" + "CVE-2021-43389": { + "cmt_msg": "isdn: cpai: check ctr->cnr to avoid array index out of bound" }, - "CVE-2017-18218": { - "cmt_msg": "net: hns: Fix a skb used after free bug" + "CVE-2023-1074": { + "cmt_msg": "sctp: fail if no bound addresses can be used for a given scope" }, - "CVE-2017-7533": { - "cmt_msg": "dentry name snapshots" + "CVE-2023-1077": { + "cmt_msg": "sched/rt: pick_next_rt_entity(): check list_entry" }, - "CVE-2018-8897": { - "cmt_msg": "x86/entry/64: Don't use IST entry for #BP stack" + "CVE-2023-40283": { + "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb" }, - "CVE-2021-29265": { - "cmt_msg": "usbip: fix stub_dev usbip_sockfd_store() races leading to gpf" + "CVE-2023-1073": { + "cmt_msg": "HID: check empty report_list in hid_validate_values()" }, - "CVE-2021-39648": { - "cmt_msg": "usb: gadget: configfs: Fix use-after-free issue with udc_name" + "CVE-2018-13093": { + "cmt_msg": "xfs: validate cached inodes are free when allocated" }, - "CVE-2022-3545": { - "cmt_msg": "nfp: fix use-after-free in area_cache_get()" + "CVE-2018-13096": { + "cmt_msg": "f2fs: fix to do sanity check with node footer and iblocks" }, - "CVE-2022-3542": { - "cmt_msg": "bnx2x: fix potential memory leak in bnx2x_tpa_stop()" + "CVE-2018-13097": { + "cmt_msg": "f2fs: fix to do sanity check with user_block_count" }, - "CVE-2020-14416": { - "cmt_msg": "can, slip: Protect tty->disc_data in write_wakeup and close with RCU" + "CVE-2018-13094": { + "cmt_msg": "xfs: don't call xfs_da_shrink_inode with NULL bp" }, - "CVE-2019-0136": { - "cmt_msg": "mac80211: drop robust management frames from unknown TA" + "CVE-2018-13095": { + "cmt_msg": "xfs: More robust inode extent count validation" }, - "CVE-2017-17975": { - "cmt_msg": "media: usbtv: prevent double free in error case" + "CVE-2018-13098": { + "cmt_msg": "f2fs: fix to do sanity check with extra_attr feature" }, - "CVE-2019-16921": { - "cmt_msg": "RDMA/hns: Fix init resp when alloc ucontext" + "CVE-2018-13099": { + "cmt_msg": "f2fs: fix to do sanity check with reserved blkaddr of inline inode" }, - "CVE-2018-16597": { - "cmt_msg": "ovl: modify ovl_permission() to do checks on two inodes" + "CVE-2019-11884": { + "cmt_msg": "Bluetooth: hidp: fix buffer overflow" }, - "CVE-2021-21781": { - "cmt_msg": "ARM: ensure the signal page contains defined contents" + "CVE-2019-18683": { + "cmt_msg": "media: vivid: Fix wrong locking that causes race conditions on streaming stop" }, - "CVE-2021-0512": { - "cmt_msg": "HID: make arrays usage and value to be the same" + "CVE-2019-18680": { + "cmt_msg": "" }, - "CVE-2018-14634": { - "cmt_msg": "exec: Limit arg stack to at most 75% of _STK_LIM" + "CVE-2021-45868": { + "cmt_msg": "quota: check block number when reading the block in quota file" }, - "CVE-2018-14633": { - "cmt_msg": "scsi: target: iscsi: Use hex2bin instead of a re-implementation" + "CVE-2022-20158": { + "cmt_msg": "net/packet: fix slab-out-of-bounds access in packet_recvmsg()" }, - "CVE-2018-12896": { - "cmt_msg": "posix-timers: Sanitize overrun handling" + "CVE-2020-0404": { + "cmt_msg": "media: uvcvideo: Avoid cyclic entity chains due to malformed USB descriptors" }, - "CVE-2023-1382": { - "cmt_msg": "tipc: set con sock in tipc_conn_alloc" + "CVE-2022-39188": { + "cmt_msg": "mmu_gather: Force tlb-flush VM_PFNMAP vmas" }, - "CVE-2019-19073": { - "cmt_msg": "ath9k_htc: release allocated buffer if timed out" + "CVE-2023-52619": { + "cmt_msg": "pstore/ram: Fix crash when setting number of cpus to an odd number" }, - "CVE-2018-14734": { - "cmt_msg": "infiniband: fix a possible use-after-free bug" + "CVE-2020-27067": { + "cmt_msg": "l2tp: fix l2tp_eth module loading" }, - "CVE-2022-0850": { - "cmt_msg": "ext4: fix kernel infoleak via ext4_extent_header" + "CVE-2020-27066": { + "cmt_msg": "xfrm: policy: Fix doulbe free in xfrm_policy_timer" }, - "CVE-2020-0347": { - "cmt_msg": "" + "CVE-2016-5696": { + "cmt_msg": "tcp: make challenge acks less predictable" }, - "CVE-2022-41222": { - "cmt_msg": "mm/mremap: hold the rmap lock in write mode when moving page table entries." + "CVE-2017-5986": { + "cmt_msg": "sctp: avoid BUG_ON on sctp_wait_for_sndbuf" }, - "CVE-2018-8822": { - "cmt_msg": "staging: ncpfs: memory corruption in ncp_read_kernel()" + "CVE-2024-23307": { + "cmt_msg": "md/raid5: fix atomicity violation in raid5_cache_count" }, - "CVE-2016-10318": { - "cmt_msg": "fscrypto: add authorization check for setting encryption policy" + "CVE-2017-0861": { + "cmt_msg": "ALSA: pcm: prevent UAF in snd_pcm_info" }, - "CVE-2021-33909": { - "cmt_msg": "seq_file: disallow extremely large seq buffer allocations" + "CVE-2020-15393": { + "cmt_msg": "usb: usbtest: fix missing kfree(dev->buf) in usbtest_disconnect" }, - "CVE-2016-9755": { - "cmt_msg": "netfilter: ipv6: nf_defrag: drop mangled skb on ream error" + "CVE-2021-3564": { + "cmt_msg": "Bluetooth: fix the erroneous flush_work() order" }, - "CVE-2019-12456": { - "cmt_msg": "" + "CVE-2017-13080": { + "cmt_msg": "mac80211: accept key reinstall without changing anything" }, - "CVE-2016-9756": { - "cmt_msg": "KVM: x86: drop error recovery in em_jmp_far and em_ret_far" + "CVE-2018-12127": { + "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" }, - "CVE-2022-20565": { - "cmt_msg": "HID: core: Correctly handle ReportSize being zero" + "CVE-2018-12126": { + "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" }, - "CVE-2019-5108": { - "cmt_msg": "mac80211: Do not send Layer 2 Update frame before authorization" + "CVE-2021-28964": { + "cmt_msg": "btrfs: fix race when cloning extent buffer during rewind of an old root" }, - "CVE-2019-17133": { - "cmt_msg": "cfg80211: wext: avoid copying malformed SSIDs" + "CVE-2019-13631": { + "cmt_msg": "Input: gtco - bounds check collection indent level" }, - "CVE-2017-18595": { - "cmt_msg": "tracing: Fix possible double free on failure of allocating trace buffer" + "CVE-2018-12233": { + "cmt_msg": "jfs: Fix inconsistency between memory allocation and ea_buf->max_size" }, - "CVE-2021-33655": { - "cmt_msg": "fbcon: Disallow setting font bigger than screen size" + "CVE-2018-9465": { + "cmt_msg": "binder: fix proc->files use-after-free" }, - "CVE-2021-3612": { - "cmt_msg": "Input: joydev - prevent potential read overflow in ioctl" + "CVE-2020-8649": { + "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region" }, - "CVE-2017-2636": { - "cmt_msg": "tty: n_hdlc: get rid of racy n_hdlc.tbuf" + "CVE-2020-8648": { + "cmt_msg": "vt: selection, close sel_buffer race" }, - "CVE-2017-7487": { - "cmt_msg": "ipx: call ipxitf_put() in ioctl error path" + "CVE-2020-8647": { + "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region" }, - "CVE-2019-6974": { - "cmt_msg": "kvm: fix kvm_ioctl_create_device() reference counting (CVE-2019-6974)" + "CVE-2019-0155": { + "cmt_msg": "drm/i915: Rename gen7 cmdparser tables" }, - "CVE-2022-41850": { - "cmt_msg": "HID: roccat: Fix use-after-free in roccat_read()" + "CVE-2019-0154": { + "cmt_msg": "drm/i915: Lower RM timeout to avoid DSI hard hangs" }, - "CVE-2019-19525": { - "cmt_msg": "ieee802154: atusb: fix use-after-free at disconnect" + "CVE-2023-35827": { + "cmt_msg": "ravb: Fix use-after-free issue in ravb_tx_timeout_work()" }, - "CVE-2022-0168": { - "cmt_msg": "cifs: fix NULL ptr dereference in smb2_ioctl_query_info()" + "CVE-2023-52585": { + "cmt_msg": "drm/amdgpu: Fix possible NULL dereference in amdgpu_ras_query_error_status_helper()" }, - "CVE-2023-2985": { - "cmt_msg": "fs: hfsplus: fix UAF issue in hfsplus_put_super" + "CVE-2023-52584": { + "cmt_msg": "spmi: mediatek: Fix UAF on device remove" }, - "CVE-2020-14390": { - "cmt_msg": "fbcon: remove soft scrollback code" + "CVE-2023-52587": { + "cmt_msg": "IB/ipoib: Fix mcast list locking" }, - "CVE-2023-4132": { - "cmt_msg": "media: usb: siano: Fix warning due to null work_func_t function pointer" + "CVE-2023-52586": { + "cmt_msg": "drm/msm/dpu: Add mutex lock in control vblank irq" }, - "CVE-2020-24502": { - "cmt_msg": "" + "CVE-2023-52583": { + "cmt_msg": "ceph: fix deadlock or deadcode of misusing dget()" }, - "CVE-2017-17712": { - "cmt_msg": "net: ipv4: fix for a race condition in raw_sendmsg" + "CVE-2023-52589": { + "cmt_msg": "media: rkisp1: Fix IRQ disable race issue" }, - "CVE-2017-17807": { - "cmt_msg": "KEYS: add missing permission check for request_key() destination" + "CVE-2023-52588": { + "cmt_msg": "f2fs: fix to tag gcing flag on page during block migration" }, - "CVE-2017-10661": { - "cmt_msg": "timerfd: Protect the might cancel mechanism proper" + "CVE-2023-52340": { + "cmt_msg": "ipv6: remove max_size check inline with ipv4" }, - "CVE-2017-17805": { - "cmt_msg": "crypto: salsa20 - fix blkcipher_walk API usage" + "CVE-2021-46969": { + "cmt_msg": "bus: mhi: core: Fix invalid error returning in mhi_queue" }, - "CVE-2017-7541": { - "cmt_msg": "brcmfmac: fix possible buffer overflow in brcmf_cfg80211_mgmt_tx()" + "CVE-2020-16120": { + "cmt_msg": "ovl: switch to mounter creds in readdir" }, - "CVE-2019-19527": { - "cmt_msg": "HID: hiddev: do cleanup in failure of opening a device" + "CVE-2019-17666": { + "cmt_msg": "rtlwifi: Fix potential overflow on P2P code" }, - "CVE-2017-7542": { - "cmt_msg": "ipv6: avoid overflow of offset in ip6_find_1stfragopt" + "CVE-2015-7885": { + "cmt_msg": "staging/dgnc: fix info leak in ioctl" }, - "CVE-2024-0584": { - "cmt_msg": "ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet" + "CVE-2021-34693": { + "cmt_msg": "can: bcm: fix infoleak in struct bcm_msg_head" }, - "CVE-2020-26141": { - "cmt_msg": "ath10k: Fix TKIP Michael MIC verification for PCIe" + "CVE-2020-11494": { + "cmt_msg": "slcan: Don't transmit uninitialized stack data in padding" }, - "CVE-2020-0465": { - "cmt_msg": "HID: core: Sanitize event code and type when mapping input" + "CVE-2024-26797": { + "cmt_msg": "drm/amd/display: Prevent potential buffer overflow in map_hw_resources" }, - "CVE-2020-0305": { - "cmt_msg": "chardev: Avoid potential use-after-free in 'chrdev_open()'" + "CVE-2024-26791": { + "cmt_msg": "btrfs: dev-replace: properly validate device names" }, - "CVE-2018-3639": { - "cmt_msg": "x86/nospec: Simplify alternative_msr_write()" + "CVE-2024-26793": { + "cmt_msg": "gtp: fix use-after-free and null-ptr-deref in gtp_newlink()" }, - "CVE-2021-4218": { - "cmt_msg": "sysctl: pass kernel pointers to ->proc_handler" + "CVE-2022-30594": { + "cmt_msg": "ptrace: Check PTRACE_O_SUSPEND_SECCOMP permission on PTRACE_SEIZE" }, - "CVE-2023-22995": { - "cmt_msg": "usb: dwc3: dwc3-qcom: Add missing platform_device_put() in dwc3_qcom_acpi_register_core" + "CVE-2024-26798": { + "cmt_msg": "fbcon: always restore the old font data in fbcon_do_set_font()" }, - "CVE-2019-15902": { - "cmt_msg": "unknown" + "CVE-2021-38204": { + "cmt_msg": "usb: max-3421: Prevent corruption of freed memory" }, - "CVE-2024-25739": { - "cmt_msg": "" + "CVE-2021-38205": { + "cmt_msg": "net: xilinx_emaclite: Do not print real IOMEM pointer" }, - "CVE-2016-7425": { - "cmt_msg": "scsi: arcmsr: Buffer overflow in arcmsr_iop_message_xfer()" + "CVE-2020-0255": { + "cmt_msg": "selinux: properly handle multiple messages in selinux_netlink_send()" }, - "CVE-2019-20054": { - "cmt_msg": "fs/proc/proc_sysctl.c: fix NULL pointer dereference in put_links" + "CVE-2016-6130": { + "cmt_msg": "s390/sclp_ctl: fix potential information leak with /dev/sclp" }, - "CVE-2017-15274": { - "cmt_msg": "KEYS: fix dereferencing NULL payload with nonzero length" + "CVE-2023-35001": { + "cmt_msg": "netfilter: nf_tables: prevent OOB access in nft_byteorder_eval" }, - "CVE-2024-0340": { - "cmt_msg": "vhost: use kzalloc() instead of kmalloc() followed by memset()" + "CVE-2021-38208": { + "cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect" }, - "CVE-2021-3753": { - "cmt_msg": "vt_kdsetmode: extend console locking" + "CVE-2017-18232": { + "cmt_msg": "scsi: libsas: direct call probe and destruct" }, - "CVE-2023-6536": { + "CVE-2022-0168": { + "cmt_msg": "cifs: fix NULL ptr dereference in smb2_ioctl_query_info()" + }, + "CVE-2020-26556": { "cmt_msg": "" }, - "CVE-2019-11135": { - "cmt_msg": "x86/msr: Add the IA32_TSX_CTRL MSR" + "CVE-2018-9518": { + "cmt_msg": "NFC: llcp: Limit size of SDP URI" }, - "CVE-2019-11810": { - "cmt_msg": "scsi: megaraid_sas: return error when create DMA pool failed" + "CVE-2024-26778": { + "cmt_msg": "fbdev: savage: Error out if pixclock equals zero" }, - "CVE-2021-27365": { - "cmt_msg": "scsi: iscsi: Ensure sysfs attributes are limited to PAGE_SIZE" + "CVE-2020-26555": { + "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical" }, - "CVE-2021-27364": { - "cmt_msg": "scsi: iscsi: Restrict sessions and handles to admin capabilities" + "CVE-2024-26776": { + "cmt_msg": "spi: hisi-sfc-v3xx: Return IRQ_NONE if no interrupts were detected" }, - "CVE-2017-14991": { - "cmt_msg": "scsi: sg: fixup infoleak when using SG_GET_REQUEST_TABLE" + "CVE-2024-26777": { + "cmt_msg": "fbdev: sis: Error out if pixclock equals zero" }, - "CVE-2020-0431": { - "cmt_msg": "HID: hid-input: clear unmapped usages" + "CVE-2020-26558": { + "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical" }, - "CVE-2022-39842": { - "cmt_msg": "video: fbdev: pxa3xx-gcu: Fix integer overflow in pxa3xx_gcu_write" + "CVE-2023-3390": { + "cmt_msg": "netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE" }, - "CVE-2018-17977": { + "CVE-2023-3397": { "cmt_msg": "" }, - "CVE-2023-31081": { - "cmt_msg": "" + "CVE-2024-26773": { + "cmt_msg": "ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found()" }, - "CVE-2018-17972": { - "cmt_msg": "proc: restrict kernel stack dumps to root" + "CVE-2024-26770": { + "cmt_msg": "HID: nvidia-shield: Add missing null pointer checks to LED initialization" }, - "CVE-2021-20320": { - "cmt_msg": "s390/bpf: Fix optimizing out zero-extensions" + "CVE-2024-26771": { + "cmt_msg": "dmaengine: ti: edma: Add some null pointer checks to the edma_probe" }, - "CVE-2020-28974": { - "cmt_msg": "vt: Disable KD_FONT_OP_COPY" + "CVE-2023-28746": { + "cmt_msg": "x86/mmio: Disable KVM mitigation when X86_FEATURE_CLEAR_CPU_BUF is set" }, - "CVE-2018-7566": { - "cmt_msg": "ALSA: seq: Fix racy pool initializations" + "CVE-2017-5754": { + "cmt_msg": "x86/cpufeatures: Add Intel feature bits for Speculation Control" }, - "CVE-2020-11725": { - "cmt_msg": "" + "CVE-2021-47119": { + "cmt_msg": "ext4: fix memory leak in ext4_fill_super" }, - "CVE-2022-33742": { - "cmt_msg": "xen/blkfront: force data bouncing when backend is untrusted" + "CVE-2016-10200": { + "cmt_msg": "l2tp: fix racy SOCK_ZAPPED flag check in l2tp_ip{,6}_bind()" }, - "CVE-2022-26490": { - "cmt_msg": "nfc: st21nfca: Fix potential buffer overflows in EVT_TRANSACTION" + "CVE-2017-5753": { + "cmt_msg": "x86/cpufeatures: Add X86_BUG_SPECTRE_V[12]" }, - "CVE-2017-5967": { - "cmt_msg": "time: Remove CONFIG_TIMER_STATS" + "CVE-2024-1086": { + "cmt_msg": "netfilter: nf_tables: reject QUEUE/DROP verdict parameters" }, - "CVE-2021-0937": { - "cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write" + "CVE-2016-10208": { + "cmt_msg": "ext4: validate s_first_meta_bg at mount time" }, - "CVE-2022-42895": { - "cmt_msg": "Bluetooth: L2CAP: Fix attempting to access uninitialized memory" + "CVE-2022-0382": { + "cmt_msg": "net ticp:fix a kernel-infoleak in __tipc_sendmsg()" }, - "CVE-2022-3169": { - "cmt_msg": "nvme: ensure subsystem reset is single threaded" + "CVE-2023-32233": { + "cmt_msg": "netfilter: nf_tables: deactivate anonymous set from preparation phase" }, - "CVE-2022-4744": { - "cmt_msg": "tun: avoid double free in tun_free_netdev" + "CVE-2019-15222": { + "cmt_msg": "ALSA: usb-audio: Fix gpf in snd_usb_pipe_sanity_check" }, - "CVE-2022-36280": { - "cmt_msg": "drm/vmwgfx: Validate the box size for the snooped cursor" + "CVE-2019-15223": { + "cmt_msg": "ALSA: line6: Assure canceling delayed work at disconnection" }, - "CVE-2019-2054": { - "cmt_msg": "arm/ptrace: run seccomp after ptrace" + "CVE-2020-25285": { + "cmt_msg": "mm/hugetlb: fix a race between hugetlb sysctl handlers" }, - "CVE-2020-0404": { - "cmt_msg": "media: uvcvideo: Avoid cyclic entity chains due to malformed USB descriptors" + "CVE-2020-25284": { + "cmt_msg": "rbd: require global CAP_SYS_ADMIN for mapping and unmapping" }, - "CVE-2018-20976": { - "cmt_msg": "xfs: clear sb->s_fs_info on mount failure" + "CVE-2022-1016": { + "cmt_msg": "netfilter: nf_tables: initialize registers in nft_do_chain()" }, - "CVE-2016-10147": { - "cmt_msg": "crypto: mcryptd - Check mcryptd algorithm compatibility" + "CVE-2022-1011": { + "cmt_msg": "fuse: fix pipe buffer lifetime for direct_io" }, - "CVE-2024-21803": { - "cmt_msg": "" + "CVE-2022-1012": { + "cmt_msg": "secure_seq: use the 64 bits of the siphash for port offset calculation" }, - "CVE-2018-7995": { - "cmt_msg": "x86/MCE: Serialize sysfs changes" + "CVE-2023-52620": { + "cmt_msg": "netfilter: nf_tables: disallow timeout for anonymous sets" }, - "CVE-2018-16276": { - "cmt_msg": "USB: yurex: fix out-of-bounds uaccess in read handler" + "CVE-2023-52621": { + "cmt_msg": "bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers" }, - "CVE-2023-2176": { - "cmt_msg": "RDMA/core: Refactor rdma_bind_addr" + "CVE-2023-52622": { + "cmt_msg": "ext4: avoid online resizing failures due to oversized flex bg" }, - "CVE-2021-3542": { - "cmt_msg": "" + "CVE-2023-52623": { + "cmt_msg": "SUNRPC: Fix a suspicious RCU usage warning" }, - "CVE-2019-16413": { - "cmt_msg": "9p: use inode->i_lock to protect i_size_write() under 32-bit" + "CVE-2023-52624": { + "cmt_msg": "drm/amd/display: Wake DMCUB before executing GPINT commands" }, - "CVE-2024-24860": { - "cmt_msg": "Bluetooth: Fix atomicity violation in {min,max}_key_size_set" + "CVE-2023-52625": { + "cmt_msg": "drm/amd/display: Refactor DMCUB enter/exit idle interface" }, - "CVE-2018-10876": { - "cmt_msg": "ext4: only look at the bg_flags field if it is valid" + "CVE-2023-52628": { + "cmt_msg": "netfilter: nftables: exthdr: fix 4-byte stack OOB write" }, - "CVE-2023-2194": { - "cmt_msg": "i2c: xgene-slimpro: Fix out-of-bounds bug in xgene_slimpro_i2c_xfer()" + "CVE-2023-52629": { + "cmt_msg": "sh: push-switch: Reorder cleanup operations to avoid use-after-free bug" }, - "CVE-2022-1263": { - "cmt_msg": "KVM: avoid NULL pointer dereference in kvm_dirty_ring_push" + "CVE-2016-9555": { + "cmt_msg": "sctp: validate chunk len before actually using it" }, - "CVE-2017-16650": { - "cmt_msg": "net: qmi_wwan: fix divide by 0 on bad descriptors" + "CVE-2022-0492": { + "cmt_msg": "cgroup-v1: Require capabilities to set release_agent" }, - "CVE-2020-12653": { - "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_cmd_append_vsie_tlv()" + "CVE-2020-12352": { + "cmt_msg": "Bluetooth: A2MP: Fix not initializing all members" }, - "CVE-2023-32233": { - "cmt_msg": "netfilter: nf_tables: deactivate anonymous set from preparation phase" + "CVE-2021-43976": { + "cmt_msg": "mwifiex: Fix skb_over_panic in mwifiex_usb_recv()" }, - "CVE-2019-7222": { - "cmt_msg": "KVM: x86: work around leak of uninitialized stack contents (CVE-2019-7222)" + "CVE-2022-0494": { + "cmt_msg": "block-map: add __GFP_ZERO flag for alloc_page in function bio_copy_kern" }, - "CVE-2017-14051": { - "cmt_msg": "scsi: qla2xxx: Fix an integer overflow in sysfs code" + "CVE-2021-47101": { + "cmt_msg": "asix: fix uninit-value in asix_mdio_read()" }, - "CVE-2020-12654": { - "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_ret_wmm_get_status()" + "CVE-2021-47103": { + "cmt_msg": "inet: fully convert sk->sk_rx_dst to RCU rules" }, - "CVE-2019-7221": { - "cmt_msg": "KVM: nVMX: unconditionally cancel preemption timer in free_nested (CVE-2019-7221)" + "CVE-2021-46982": { + "cmt_msg": "f2fs: compress: fix race condition of overwrite vs truncate" }, - "CVE-2018-12929": { + "CVE-2007-3719": { "cmt_msg": "" }, - "CVE-2018-12928": { - "cmt_msg": "" + "CVE-2023-3863": { + "cmt_msg": "net: nfc: Fix use-after-free caused by nfc_llcp_find_local" }, - "CVE-2017-7645": { - "cmt_msg": "nfsd: check for oversized NFSv2/v3 arguments" + "CVE-2019-19319": { + "cmt_msg": "ext4: protect journal inode's blocks using block_validity" }, - "CVE-2020-36310": { - "cmt_msg": "KVM: SVM: avoid infinite loop on NPF from bad address" + "CVE-2016-8399": { + "cmt_msg": "net: ping: check minimum size on ICMP header length" }, - "CVE-2020-36313": { - "cmt_msg": "KVM: Fix out of range accesses to memslots" + "CVE-2022-3628": { + "cmt_msg": "wifi: brcmfmac: Fix potential buffer overflow in brcmf_fweh_event_worker()" }, - "CVE-2020-35519": { - "cmt_msg": "net/x25: prevent a couple of overflows" + "CVE-2022-3629": { + "cmt_msg": "vsock: Fix memory leak in vsock_connect()" }, - "CVE-2017-18241": { - "cmt_msg": "f2fs: fix a panic caused by NULL flush_cmd_control" + "CVE-2022-3621": { + "cmt_msg": "nilfs2: fix NULL pointer dereference at nilfs_bmap_lookup_at_level()" }, - "CVE-2022-33740": { - "cmt_msg": "xen/netfront: fix leaking data in shared pages" + "CVE-2022-23960": { + "cmt_msg": "ARM: report Spectre v2 status through sysfs" }, - "CVE-2023-51782": { - "cmt_msg": "net/rose: Fix Use-After-Free in rose_ioctl" + "CVE-2022-3624": { + "cmt_msg": "bonding: fix reference count leak in balance-alb mode" }, - "CVE-2021-28971": { - "cmt_msg": "perf/x86/intel: Fix a crash caused by zero PEBS status" + "CVE-2019-11091": { + "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" }, - "CVE-2020-10708": { - "cmt_msg": "" + "CVE-2023-4921": { + "cmt_msg": "net: sched: sch_qfq: Fix UAF in qfq_dequeue()" }, - "CVE-2020-25673": { - "cmt_msg": "nfc: Avoid endless loops caused by repeated llcp_sock_connect()" + "CVE-2017-15649": { + "cmt_msg": "packet: in packet_do_bind, test fanout with bind_lock held" }, - "CVE-2022-0400": { - "cmt_msg": "" + "CVE-2023-1829": { + "cmt_msg": "net/sched: Retire tcindex classifier" }, - "CVE-2022-45886": { - "cmt_msg": "media: dvb-core: Fix use-after-free due on race condition at dvb_net" + "CVE-2019-19227": { + "cmt_msg": "appletalk: Fix potential NULL pointer dereference in unregister_snap_client" }, - "CVE-2021-38160": { - "cmt_msg": "virtio_console: Assure used length from device is limited" + "CVE-2024-0775": { + "cmt_msg": "ext4: improve error recovery code paths in __ext4_remount()" }, - "CVE-2021-42739": { - "cmt_msg": "media: firewire: firedtv-avc: fix a buffer overflow in avc_ca_pmt()" + "CVE-2016-5829": { + "cmt_msg": "HID: hiddev: validate num_values for HIDIOCGUSAGES, HIDIOCSUSAGES commands" }, - "CVE-2022-3344": { - "cmt_msg": "KVM: x86: nSVM: harden svm_free_nested against freeing vmcb02 while still in use" + "CVE-2016-5828": { + "cmt_msg": "powerpc/tm: Always reclaim in start_thread() for exec() class syscalls" }, - "CVE-2022-3111": { - "cmt_msg": "power: supply: wm8350-power: Add missing free in free_charger_irq" + "CVE-2016-9604": { + "cmt_msg": "KEYS: Disallow keyrings beginning with '.' to be joined as session keyrings" }, - "CVE-2018-5344": { - "cmt_msg": "loop: fix concurrent lo_open/lo_release" + "CVE-2020-14381": { + "cmt_msg": "futex: Fix inode life-time issue" }, - "CVE-2020-12770": { - "cmt_msg": "scsi: sg: add sg_remove_request in sg_write" + "CVE-2019-19768": { + "cmt_msg": "blktrace: Protect q->blk_trace with RCU" }, - "CVE-2017-15115": { - "cmt_msg": "sctp: do not peel off an assoc from one netns to another one" + "CVE-2022-20141": { + "cmt_msg": "igmp: Add ip_mc_list lock in ip_check_mc_rcu" }, - "CVE-2019-15222": { - "cmt_msg": "ALSA: usb-audio: Fix gpf in snd_usb_pipe_sanity_check" + "CVE-2023-23455": { + "cmt_msg": "net: sched: atm: dont intepret cls results when asked to drop" }, - "CVE-2024-25744": { - "cmt_msg": "x86/coco: Disable 32-bit emulation by default on TDX and SEV" + "CVE-2023-23454": { + "cmt_msg": "net: sched: cbq: dont intepret cls results when asked to drop" }, - "CVE-2022-25265": { - "cmt_msg": "" + "CVE-2022-20148": { + "cmt_msg": "f2fs: fix UAF in f2fs_available_free_memory" }, - "CVE-2022-20368": { - "cmt_msg": "net/packet: fix slab-out-of-bounds access in packet_recvmsg()" + "CVE-2023-6931": { + "cmt_msg": "perf: Fix perf_event_validate_size()" }, - "CVE-2017-12153": { - "cmt_msg": "nl80211: check for the required netlink attributes presence" + "CVE-2023-6932": { + "cmt_msg": "ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet" }, - "CVE-2019-19813": { - "cmt_msg": "btrfs: inode: Verify inode mode to avoid NULL pointer dereference" + "CVE-2018-8781": { + "cmt_msg": "drm: udl: Properly check framebuffer mmap offsets" }, - "CVE-2017-12154": { - "cmt_msg": "kvm: nVMX: Don't allow L2 to access the hardware CR8" + "CVE-2017-15265": { + "cmt_msg": "ALSA: seq: Fix use-after-free at creating a port" }, - "CVE-2020-10773": { - "cmt_msg": "s390/cmm: fix information leak in cmm_timeout_handler()" + "CVE-2021-0605": { + "cmt_msg": "af_key: pfkey_dump needs parameter validation" }, - "CVE-2022-21499": { - "cmt_msg": "lockdown: also lock down previous kgdb use" + "CVE-2018-5995": { + "cmt_msg": "printk: hash addresses printed with %p" }, - "CVE-2020-25284": { - "cmt_msg": "rbd: require global CAP_SYS_ADMIN for mapping and unmapping" + "CVE-2022-2153": { + "cmt_msg": "KVM: x86: Avoid theoretical NULL pointer dereference in kvm_irq_delivery_to_apic_fast()" }, - "CVE-2023-4208": { - "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free" + "CVE-2024-2193": { + "cmt_msg": "" }, - "CVE-2017-1000379": { - "cmt_msg": "mm: larger stack guard gap, between vmas" + "CVE-2018-12930": { + "cmt_msg": "" }, - "CVE-2022-3606": { + "CVE-2018-12931": { "cmt_msg": "" }, - "CVE-2023-4206": { - "cmt_msg": "net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free" + "CVE-2021-28972": { + "cmt_msg": "PCI: rpadlpar: Fix potential drc_name corruption in store functions" }, - "CVE-2023-4207": { - "cmt_msg": "net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free" + "CVE-2017-12146": { + "cmt_msg": "driver core: platform: fix race condition with driver_override" }, - "CVE-2023-3640": { - "cmt_msg": "" + "CVE-2020-36781": { + "cmt_msg": "i2c: imx: fix reference leak when pm_runtime_get_sync fails" }, - "CVE-2017-1000371": { - "cmt_msg": "binfmt_elf: use ELF_ET_DYN_BASE only for PIE" + "CVE-2021-3732": { + "cmt_msg": "ovl: prevent private clone if bind mount is not allowed" }, - "CVE-2018-18281": { - "cmt_msg": "mremap: properly flush TLB before releasing the page" + "CVE-2017-13166": { + "cmt_msg": "media: v4l2-ioctl.c: use check_fmt for enum/g/s/try_fmt" }, - "CVE-2023-20593": { - "cmt_msg": "x86/cpu/amd: Add a Zenbleed fix" + "CVE-2018-12207": { + "cmt_msg": "kvm: x86, powerpc: do not allow clearing largepages debugfs entry" }, - "CVE-2019-18675": { - "cmt_msg": "mmap: introduce sane default mmap limits" + "CVE-2017-13168": { + "cmt_msg": "scsi: sg: mitigate read/write abuse" }, - "CVE-2023-3022": { - "cmt_msg": "ipv6: Use result arg in fib_lookup_arg consistently" + "CVE-2016-3157": { + "cmt_msg": "x86/iopl/64: Properly context-switch IOPL on Xen PV" }, - "CVE-2022-2663": { - "cmt_msg": "netfilter: nf_conntrack_irc: Fix forged IP logic" + "CVE-2016-3156": { + "cmt_msg": "ipv4: Don't do expensive useless work during inetdev destroy." }, - "CVE-2020-24503": { - "cmt_msg": "" + "CVE-2019-17075": { + "cmt_msg": "RDMA/cxgb4: Do not dma memory off of the stack" }, - "CVE-2023-51780": { - "cmt_msg": "atm: Fix Use-After-Free in do_vcc_ioctl" + "CVE-2023-20588": { + "cmt_msg": "x86/CPU/AMD: Do not leak quotient data after a division by 0" }, - "CVE-2023-0047": { - "cmt_msg": "mm, oom: do not trigger out_of_memory from the #PF" + "CVE-2018-3693": { + "cmt_msg": "ext4: fix spectre gadget in ext4_mb_regular_allocator()" + }, + "CVE-2022-44033": { + "cmt_msg": "char: pcmcia: remove all the drivers" + }, + "CVE-2022-44032": { + "cmt_msg": "char: pcmcia: remove all the drivers" }, - "CVE-2020-29370": { - "cmt_msg": "mm: slub: add missing TID bump in kmem_cache_alloc_bulk()" + "CVE-2021-46908": { + "cmt_msg": "bpf: Use correct permission flag for mixed signed bounds arithmetic" }, - "CVE-2019-15219": { - "cmt_msg": "USB: sisusbvga: fix oops in error path of sisusb_probe" + "CVE-2021-3609": { + "cmt_msg": "can: bcm: delay release of struct bcm_op after synchronize_rcu()" }, - "CVE-2022-20424": { - "cmt_msg": "io_uring: remove io_identity" + "CVE-2017-13305": { + "cmt_msg": "KEYS: encrypted: fix buffer overread in valid_master_desc()" }, - "CVE-2022-20422": { - "cmt_msg": "arm64: fix oops in concurrently setting insn_emulation sysctls" + "CVE-2021-46904": { + "cmt_msg": "net: hso: fix null-ptr-deref during tty device unregistration" }, - "CVE-2017-5549": { - "cmt_msg": "USB: serial: kl5kusb105: fix line-state error handling" + "CVE-2019-11478": { + "cmt_msg": "tcp: tcp_fragment() should apply sane memory limits" }, - "CVE-2017-5547": { - "cmt_msg": "HID: corsair: fix DMA buffers on stack" + "CVE-2019-20096": { + "cmt_msg": "dccp: Fix memleak in __feat_register_sp" }, - "CVE-2020-25643": { - "cmt_msg": "hdlc_ppp: add range checks in ppp_cp_parse_cr()" + "CVE-2018-6554": { + "cmt_msg": "staging: irda: remove the irda network stack and drivers" }, - "CVE-2023-4387": { - "cmt_msg": "net: vmxnet3: fix possible use-after-free bugs in vmxnet3_rq_alloc_rx_buf()" + "CVE-2018-6555": { + "cmt_msg": "staging: irda: remove the irda network stack and drivers" }, - "CVE-2024-24858": { - "cmt_msg": "" + "CVE-2016-7097": { + "cmt_msg": "posix_acl: Clear SGID bit when setting file permissions" }, - "CVE-2019-19378": { - "cmt_msg": "" + "CVE-2016-3713": { + "cmt_msg": "KVM: MTRR: remove MSR 0x2f8" }, - "CVE-2020-4788": { - "cmt_msg": "powerpc/64s: flush L1D on kernel entry" + "CVE-2019-9213": { + "cmt_msg": "mm: enforce min addr even if capable() in expand_downwards()" }, - "CVE-2022-36879": { - "cmt_msg": "xfrm: xfrm_policy: fix a possible double xfrm_pols_put() in xfrm_bundle_lookup()" + "CVE-2019-14896": { + "cmt_msg": "libertas: Fix two buffer overflows at parsing bss descriptor" }, - "CVE-2017-8831": { - "cmt_msg": "[media] saa7164: fix double fetch PCIe access condition" + "CVE-2019-14897": { + "cmt_msg": "libertas: Fix two buffer overflows at parsing bss descriptor" }, - "CVE-2021-39698": { - "cmt_msg": "wait: add wake_up_pollfree()" + "CVE-2019-14895": { + "cmt_msg": "mwifiex: fix possible heap overflow in mwifiex_process_country_ie()" }, - "CVE-2022-45934": { - "cmt_msg": "Bluetooth: L2CAP: Fix u8 overflow" + "CVE-2024-26784": { + "cmt_msg": "pmdomain: arm: Fix NULL dereference on scmi_perf_domain removal" }, - "CVE-2018-5333": { - "cmt_msg": "RDS: null pointer dereference in rds_atomic_free_op" + "CVE-2024-26789": { + "cmt_msg": "crypto: arm64/neonbs - fix out-of-bounds access on short input" }, - "CVE-2018-5332": { - "cmt_msg": "RDS: Heap OOB write in rds_message_alloc_sgs()" + "CVE-2020-0067": { + "cmt_msg": "f2fs: fix to avoid memory leakage in f2fs_listxattr" }, - "CVE-2022-2380": { - "cmt_msg": "video: fbdev: sm712fb: Fix crash in smtcfb_read()" + "CVE-2020-26541": { + "cmt_msg": "certs: Add EFI_CERT_X509_GUID support for dbx entries" }, - "CVE-2023-20569": { - "cmt_msg": "x86/bugs: Increase the x86 bugs vector size to two u32s" + "CVE-2019-20794": { + "cmt_msg": "" }, - "CVE-2017-7482": { - "cmt_msg": "rxrpc: Fix several cases where a padded len isn't checked in ticket decode" + "CVE-2024-26769": { + "cmt_msg": "nvmet-fc: avoid deadlock on delete association path" }, - "CVE-2020-10767": { - "cmt_msg": "x86/speculation: Avoid force-disabling IBPB based on STIBP and enhanced IBRS." + "CVE-2024-26768": { + "cmt_msg": "LoongArch: Change acpi_core_pic[NR_CPUS] to acpi_core_pic[MAX_CORE_PIC]" }, - "CVE-2021-3759": { - "cmt_msg": "memcg: enable accounting of ipc resources" + "CVE-2021-33061": { + "cmt_msg": "ixgbe: add improvement for MDD response functionality" }, - "CVE-2019-19447": { - "cmt_msg": "ext4: work around deleting a file with i_nlink == 0 safely" + "CVE-2024-26764": { + "cmt_msg": "fs/aio: Restrict kiocb_set_cancel_fn() to I/O submitted via libaio" }, - "CVE-2017-17448": { - "cmt_msg": "netfilter: nfnetlink_cthelper: Add missing permission checks" + "CVE-2024-26767": { + "cmt_msg": "drm/amd/display: fixed integer types and null check locations" }, - "CVE-2017-17449": { - "cmt_msg": "netlink: Add netns check on taps" + "CVE-2024-26766": { + "cmt_msg": "IB/hfi1: Fix sdma.h tx->num_descs off-by-one error" }, - "CVE-2017-9150": { - "cmt_msg": "bpf: don't let ldimm64 leak map addresses on unprivileged" + "CVE-2024-26763": { + "cmt_msg": "dm-crypt: don't modify the data when using authenticated encryption" }, - "CVE-2019-19524": { - "cmt_msg": "Input: ff-memless - kill timer in destroy()" + "CVE-2017-18551": { + "cmt_msg": "i2c: core-smbus: prevent stack corruption on read I2C_BLOCK_DATA" }, - "CVE-2019-19448": { - "cmt_msg": "btrfs: only search for left_info if there is no right_info in try_merge_free_space" + "CVE-2017-18552": { + "cmt_msg": "RDS: validate the requested traces user input against max supported" }, - "CVE-2019-19449": { - "cmt_msg": "f2fs: fix to do sanity check on segment/section count" + "CVE-2019-9457": { + "cmt_msg": "exec: Limit arg stack to at most 75% of _STK_LIM" }, - "CVE-2023-31085": { - "cmt_msg": "ubi: Refuse attaching if mtd's erasesize is 0" + "CVE-2019-9456": { + "cmt_msg": "usb: usbmon: Read text within supplied buffer size" }, - "CVE-2019-19523": { - "cmt_msg": "USB: adutux: fix use-after-free on disconnect" + "CVE-2019-9455": { + "cmt_msg": "media: videobuf2-v4l2: drop WARN_ON in vb2_warn_zero_bytesused()" }, - "CVE-2021-3752": { - "cmt_msg": "Bluetooth: fix use-after-free error in lock_sock_nested()" + "CVE-2022-2978": { + "cmt_msg": "fs: fix UAF/GPF bug in nilfs_mdt_destroy" }, - "CVE-2017-10663": { - "cmt_msg": "f2fs: sanity check checkpoint segno and blkoff" + "CVE-2019-9453": { + "cmt_msg": "f2fs: fix to avoid accessing xattr across the boundary" }, - "CVE-2017-18360": { - "cmt_msg": "USB: serial: io_ti: fix div-by-zero in set_termios" + "CVE-2023-20569": { + "cmt_msg": "x86/bugs: Increase the x86 bugs vector size to two u32s" }, - "CVE-2018-5848": { - "cmt_msg": "wil6210: missing length check in wmi_set_ie" + "CVE-2023-46838": { + "cmt_msg": "xen-netback: don't produce zero-size SKB frags" }, - "CVE-2017-18249": { - "cmt_msg": "f2fs: fix race condition in between free nid allocator/initializer" + "CVE-2019-9458": { + "cmt_msg": "media: v4l: event: Prevent freeing event subscriptions while accessed" }, - "CVE-2017-7261": { - "cmt_msg": "drm/vmwgfx: NULL pointer dereference in vmw_surface_define_ioctl()" + "CVE-2023-3090": { + "cmt_msg": "ipvlan:Fix out-of-bounds caused by unclear skb->cb" }, - "CVE-2016-5244": { - "cmt_msg": "rds: fix an infoleak in rds_inc_info_copy" + "CVE-2023-45862": { + "cmt_msg": "USB: ene_usb6250: Allocate enough memory for full object" }, - "CVE-2016-5243": { - "cmt_msg": "tipc: fix an infoleak in tipc_nl_compat_link_dump" + "CVE-2023-45863": { + "cmt_msg": "kobject: Fix slab-out-of-bounds in fill_kobj_path()" }, - "CVE-2022-3521": { - "cmt_msg": "kcm: avoid potential race in kcm_tx_work" + "CVE-2016-4470": { + "cmt_msg": "KEYS: potential uninitialized variable" }, - "CVE-2019-15216": { - "cmt_msg": "USB: yurex: Fix protection fault after device removal" + "CVE-2023-52639": { + "cmt_msg": "KVM: s390: vsie: fix race during shadow creation" }, - "CVE-2022-47929": { - "cmt_msg": "net: sched: disallow noqueue for qdisc classes" + "CVE-2023-52638": { + "cmt_msg": "can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock" }, - "CVE-2019-16746": { - "cmt_msg": "nl80211: validate beacon head" + "CVE-2019-15239": { + "cmt_msg": "unknown" }, - "CVE-2021-41864": { - "cmt_msg": "bpf: Fix integer overflow in prealloc_elems_and_freelist()" + "CVE-2017-15129": { + "cmt_msg": "net: Fix double free and memory corruption in get_net_ns_by_id()" }, - "CVE-2019-15215": { - "cmt_msg": "media: cpia2_usb: first wake up, then free in disconnect" + "CVE-2023-52469": { + "cmt_msg": "drivers/amd/pm: fix a use-after-free in kv_parse_power_table" }, - "CVE-2022-2209": { - "cmt_msg": "" + "CVE-2023-52633": { + "cmt_msg": "um: time-travel: fix time corruption" }, - "CVE-2018-18021": { - "cmt_msg": "arm64: KVM: Tighten guest core register access from userspace" + "CVE-2023-52632": { + "cmt_msg": "drm/amdkfd: Fix lock dependency warning with srcu" }, - "CVE-2021-37576": { - "cmt_msg": "KVM: PPC: Book3S: Fix H_RTAS rets buffer overflow" + "CVE-2017-9986": { + "cmt_msg": "sound: Retire OSS" }, - "CVE-2023-7042": { - "cmt_msg": "" + "CVE-2017-9985": { + "cmt_msg": "ALSA: msnd: Optimize / harden DSP and MIDI loops" }, - "CVE-2021-20317": { - "cmt_msg": "lib/timerqueue: Rely on rbtree semantics for next timer" + "CVE-2017-9984": { + "cmt_msg": "ALSA: msnd: Optimize / harden DSP and MIDI loops" }, - "CVE-2023-45871": { - "cmt_msg": "igb: set max size RX buffer when store bad packet is enabled" + "CVE-2021-47135": { + "cmt_msg": "mt76: mt7921: fix possible AOOB issue in mt7921_mcu_tx_rate_report" }, - "CVE-2023-46343": { - "cmt_msg": "nfc: nci: fix possible NULL pointer dereference in send_acknowledge()" + "CVE-2021-47136": { + "cmt_msg": "net: zero-initialize tc skb extension on allocation" }, - "CVE-2022-3594": { - "cmt_msg": "r8152: Rate limit overflow messages" + "CVE-2021-47137": { + "cmt_msg": "net: lantiq: fix memory corruption in RX ring" }, - "CVE-2018-14609": { - "cmt_msg": "btrfs: relocation: Only remove reloc rb_trees if reloc control has been initialized" + "CVE-2021-47131": { + "cmt_msg": "net/tls: Fix use-after-free after the TLS device goes down and up" }, - "CVE-2022-27672": { - "cmt_msg": "x86/speculation: Identify processors vulnerable to SMT RSB predictions" + "CVE-2021-47133": { + "cmt_msg": "HID: amd_sfh: Fix memory leak in amd_sfh_work" }, - "CVE-2021-33098": { - "cmt_msg": "ixgbe: fix large MTU request from VF" + "CVE-2024-26675": { + "cmt_msg": "ppp_async: limit MRU to 64K" }, - "CVE-2022-3595": { - "cmt_msg": "cifs: fix double-fault crash during ntlmssp" + "CVE-2023-0386": { + "cmt_msg": "ovl: fail on invalid uid/gid mapping at copy up" }, - "CVE-2022-38096": { - "cmt_msg": "" + "CVE-2022-42896": { + "cmt_msg": "Bluetooth: L2CAP: Fix accepting connection request for invalid SPSM" }, - "CVE-2023-47233": { - "cmt_msg": "" + "CVE-2022-42895": { + "cmt_msg": "Bluetooth: L2CAP: Fix attempting to access uninitialized memory" }, - "CVE-2020-10769": { - "cmt_msg": "crypto: authenc - fix parsing key with misaligned rta_len" + "CVE-2017-7618": { + "cmt_msg": "crypto: ahash - Fix EINPROGRESS notification callback" }, - "CVE-2023-6606": { - "cmt_msg": "smb: client: fix OOB in smbCalcSize()" + "CVE-2022-48626": { + "cmt_msg": "moxart: fix potential use-after-free on remove path" }, - "CVE-2018-5803": { - "cmt_msg": "sctp: verify size of a new chunk in _sctp_make_chunk()" + "CVE-2022-48627": { + "cmt_msg": "vt: fix memory overlapping when deleting chars in the buffer" }, - "CVE-2020-27815": { - "cmt_msg": "jfs: Fix array index bounds check in dbAdjTree" + "CVE-2022-48628": { + "cmt_msg": "ceph: drop messages from MDS when unmounting" }, - "CVE-2021-45486": { - "cmt_msg": "inet: use bigger hash table for IP ID generation" + "CVE-2017-7616": { + "cmt_msg": "mm/mempolicy.c: fix error handling in set_mempolicy and mbind." }, - "CVE-2022-1462": { - "cmt_msg": "tty: use new tty_insert_flip_string_and_push_buffer() in pty_write()" + "CVE-2024-24859": { + "cmt_msg": "" }, - "CVE-2022-27223": { - "cmt_msg": "USB: gadget: validate endpoint index for xilinx udc" + "CVE-2017-1000112": { + "cmt_msg": "udp: consistently apply ufo or fragmentation" }, - "CVE-2020-27067": { - "cmt_msg": "l2tp: fix l2tp_eth module loading" + "CVE-2017-1000111": { + "cmt_msg": "packet: fix tp_reserve race in packet_set_ring" }, - "CVE-2020-27777": { - "cmt_msg": "powerpc/rtas: Restrict RTAS requests from userspace" + "CVE-2024-24855": { + "cmt_msg": "scsi: lpfc: Fix a possible data race in lpfc_unregister_fcf_rescan()" }, - "CVE-2019-20636": { - "cmt_msg": "Input: add safety guards to input_set_keycode()" + "CVE-2024-24857": { + "cmt_msg": "" }, - "CVE-2019-11486": { - "cmt_msg": "tty: mark Siemens R3964 line discipline as BROKEN" + "CVE-2019-3892": { + "cmt_msg": "coredump: fix race condition between mmget_not_zero()/get_task_mm() and core dumping" }, - "CVE-2019-11487": { - "cmt_msg": "fs: prevent page refcount overflow in pipe_buf_get" + "CVE-2021-29265": { + "cmt_msg": "usbip: fix stub_dev usbip_sockfd_store() races leading to gpf" }, - "CVE-2018-8043": { - "cmt_msg": "net: phy: mdio-bcm-unimac: fix potential NULL dereference in unimac_mdio_probe()" + "CVE-2022-3545": { + "cmt_msg": "nfp: fix use-after-free in area_cache_get()" }, - "CVE-2020-27675": { - "cmt_msg": "xen/events: avoid removing an event channel while handling it" + "CVE-2022-3542": { + "cmt_msg": "bnx2x: fix potential memory leak in bnx2x_tpa_stop()" }, - "CVE-2020-28915": { - "cmt_msg": "fbcon: Fix global-out-of-bounds read in fbcon_get_font()" + "CVE-2018-16597": { + "cmt_msg": "ovl: modify ovl_permission() to do checks on two inodes" }, - "CVE-2023-7192": { - "cmt_msg": "netfilter: ctnetlink: fix possible refcount leak in ctnetlink_create_conntrack()" + "CVE-2021-21781": { + "cmt_msg": "ARM: ensure the signal page contains defined contents" }, - "CVE-2019-20908": { - "cmt_msg": "efi: Restrict efivar_ssdt_load when the kernel is locked down" + "CVE-2023-1838": { + "cmt_msg": "Fix double fget() in vhost_net_set_backend()" }, - "CVE-2023-3776": { - "cmt_msg": "net/sched: cls_fw: Fix improper refcount update leads to use-after-free" + "CVE-2023-1382": { + "cmt_msg": "tipc: set con sock in tipc_conn_alloc" }, - "CVE-2021-28038": { - "cmt_msg": "Xen/gnttab: handle p2m update errors on a per-slot basis" + "CVE-2018-14734": { + "cmt_msg": "infiniband: fix a possible use-after-free bug" }, - "CVE-2020-27068": { - "cmt_msg": "cfg80211: add missing policy for NL80211_ATTR_STATUS_CODE" + "CVE-2018-8822": { + "cmt_msg": "staging: ncpfs: memory corruption in ncp_read_kernel()" }, - "CVE-2022-23040": { - "cmt_msg": "xen/xenbus: don't let xenbus_grant_ring() remove grants in error case" + "CVE-2023-6546": { + "cmt_msg": "tty: n_gsm: fix the UAF caused by race condition in gsm_cleanup_mux" }, - "CVE-2021-29154": { - "cmt_msg": "bpf, x86: Validate computation of branch displacements for x86-64" + "CVE-2016-2383": { + "cmt_msg": "bpf: fix branch offset adjustment on backjumps after patching ctx expansion" }, - "CVE-2023-52435": { - "cmt_msg": "net: prevent mss overflow in skb_segment()" + "CVE-2020-25705": { + "cmt_msg": "icmp: randomize the global rate limiter" }, - "CVE-2023-52434": { - "cmt_msg": "smb: client: fix potential OOBs in smb2_parse_contexts()" + "CVE-2020-14390": { + "cmt_msg": "fbcon: remove soft scrollback code" }, "CVE-2021-45469": { "cmt_msg": "f2fs: fix to do sanity check on last xattr entry in __f2fs_setxattr()" }, - "CVE-2023-52436": { - "cmt_msg": "f2fs: explicitly null-terminate the xattr list" + "CVE-2017-7541": { + "cmt_msg": "brcmfmac: fix possible buffer overflow in brcmf_cfg80211_mgmt_tx()" }, - "CVE-2019-19060": { - "cmt_msg": "iio: imu: adis16400: release allocated memory on failure" + "CVE-2017-7542": { + "cmt_msg": "ipv6: avoid overflow of offset in ip6_find_1stfragopt" }, - "CVE-2019-19061": { - "cmt_msg": "iio: imu: adis16400: fix memory leak" + "CVE-2024-0584": { + "cmt_msg": "ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet" }, - "CVE-2019-19062": { - "cmt_msg": "crypto: user - fix memory leak in crypto_report" + "CVE-2020-0465": { + "cmt_msg": "HID: core: Sanitize event code and type when mapping input" }, - "CVE-2019-19063": { - "cmt_msg": "rtlwifi: prevent memory leak in rtl_usb_probe" + "CVE-2020-0466": { + "cmt_msg": "do_epoll_ctl(): clean the failure exits up a bit" }, - "CVE-2017-17741": { - "cmt_msg": "KVM: Fix stack-out-of-bounds read in write_mmio" + "CVE-2017-15274": { + "cmt_msg": "KEYS: fix dereferencing NULL payload with nonzero length" }, - "CVE-2019-9445": { - "cmt_msg": "f2fs: check if file namelen exceeds max value" + "CVE-2024-0340": { + "cmt_msg": "vhost: use kzalloc() instead of kmalloc() followed by memset()" }, - "CVE-2019-19066": { - "cmt_msg": "scsi: bfa: release allocated memory in case of error" + "CVE-2019-19523": { + "cmt_msg": "USB: adutux: fix use-after-free on disconnect" }, - "CVE-2019-19067": { - "cmt_msg": "drm/amdgpu: fix multiple memory leaks in acp_hw_init" + "CVE-2019-11135": { + "cmt_msg": "x86/msr: Add the IA32_TSX_CTRL MSR" }, - "CVE-2019-19068": { - "cmt_msg": "rtl8xxxu: prevent leaking urb" + "CVE-2021-27365": { + "cmt_msg": "scsi: iscsi: Ensure sysfs attributes are limited to PAGE_SIZE" }, - "CVE-2017-7184": { - "cmt_msg": "xfrm_user: validate XFRM_MSG_NEWAE XFRMA_REPLAY_ESN_VAL replay_window" + "CVE-2021-27364": { + "cmt_msg": "scsi: iscsi: Restrict sessions and handles to admin capabilities" }, - "CVE-2017-7187": { - "cmt_msg": "scsi: sg: check length passed to SG_NEXT_CMD_LEN" + "CVE-2021-27363": { + "cmt_msg": "scsi: iscsi: Restrict sessions and handles to admin capabilities" }, - "CVE-2020-0435": { - "cmt_msg": "f2fs: fix to do sanity check with i_extra_isize" + "CVE-2021-20320": { + "cmt_msg": "s390/bpf: Fix optimizing out zero-extensions" }, - "CVE-2020-0432": { - "cmt_msg": "staging: most: net: fix buffer overflow" + "CVE-2021-20321": { + "cmt_msg": "ovl: fix missing negative dentry check in ovl_rename()" }, - "CVE-2020-0433": { - "cmt_msg": "blk-mq: sync the update nr_hw_queues with blk_mq_queue_tag_busy_iter" + "CVE-2017-18360": { + "cmt_msg": "USB: serial: io_ti: fix div-by-zero in set_termios" }, - "CVE-2023-51779": { - "cmt_msg": "Bluetooth: af_bluetooth: Fix Use-After-Free in bt_sock_recvmsg" + "CVE-2017-5967": { + "cmt_msg": "time: Remove CONFIG_TIMER_STATS" }, - "CVE-2019-3874": { - "cmt_msg": "sctp: implement memory accounting on tx path" + "CVE-2022-3169": { + "cmt_msg": "nvme: ensure subsystem reset is single threaded" }, - "CVE-2018-10877": { - "cmt_msg": "ext4: verify the depth of extent tree in ext4_find_extent()" + "CVE-2019-2054": { + "cmt_msg": "arm/ptrace: run seccomp after ptrace" }, - "CVE-2016-8650": { - "cmt_msg": "mpi: Fix NULL ptr dereference in mpi_powm() " + "CVE-2018-20976": { + "cmt_msg": "xfs: clear sb->s_fs_info on mount failure" }, - "CVE-2010-4563": { + "CVE-2023-22995": { + "cmt_msg": "usb: dwc3: dwc3-qcom: Add missing platform_device_put() in dwc3_qcom_acpi_register_core" + }, + "CVE-2021-3542": { "cmt_msg": "" }, - "CVE-2016-8655": { - "cmt_msg": "packet: fix race condition in packet_set_ring" + "CVE-2017-16650": { + "cmt_msg": "net: qmi_wwan: fix divide by 0 on bad descriptors" }, - "CVE-2020-14331": { - "cmt_msg": "vgacon: Fix for missing check in scrollback handling" + "CVE-2018-12929": { + "cmt_msg": "" }, - "CVE-2016-8658": { - "cmt_msg": "brcmfmac: avoid potential stack overflow in brcmf_cfg80211_start_ap()" + "CVE-2018-12928": { + "cmt_msg": "" }, - "CVE-2018-10879": { - "cmt_msg": "ext4: make sure bitmaps and the inode table don't overlap with bg descriptors" + "CVE-2020-36310": { + "cmt_msg": "KVM: SVM: avoid infinite loop on NPF from bad address" }, - "CVE-2018-10878": { - "cmt_msg": "ext4: always check block group bounds in ext4_init_block_bitmap()" + "CVE-2020-36313": { + "cmt_msg": "KVM: Fix out of range accesses to memslots" }, - "CVE-2024-23851": { - "cmt_msg": "dm: limit the number of targets and parameter size area" + "CVE-2020-35519": { + "cmt_msg": "net/x25: prevent a couple of overflows" }, - "CVE-2023-0266": { - "cmt_msg": "ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF" + "CVE-2020-10708": { + "cmt_msg": "" }, - "CVE-2023-1838": { - "cmt_msg": "Fix double fget() in vhost_net_set_backend()" + "CVE-2018-5344": { + "cmt_msg": "loop: fix concurrent lo_open/lo_release" }, - "CVE-2021-3483": { - "cmt_msg": "firewire: nosy: Fix a use-after-free bug in nosy_ioctl()" + "CVE-2017-12153": { + "cmt_msg": "nl80211: check for the required netlink attributes presence" }, - "CVE-2019-15807": { - "cmt_msg": "scsi: libsas: delete sas port if expander discover failed" + "CVE-2017-12154": { + "cmt_msg": "kvm: nVMX: Don't allow L2 to access the hardware CR8" }, - "CVE-2017-16913": { - "cmt_msg": "usbip: fix stub_rx: harden CMD_SUBMIT path to handle malicious input" + "CVE-2022-21499": { + "cmt_msg": "lockdown: also lock down previous kgdb use" }, - "CVE-2017-16912": { - "cmt_msg": "usbip: fix stub_rx: get_pipe() to validate endpoint number" + "CVE-2023-20593": { + "cmt_msg": "x86/cpu/amd: Add a Zenbleed fix" }, - "CVE-2017-16911": { - "cmt_msg": "usbip: prevent vhci_hcd driver from leaking a socket pointer address" + "CVE-2016-3140": { + "cmt_msg": "USB: digi_acceleport: do sanity checking for the number of ports" }, - "CVE-2017-0861": { - "cmt_msg": "ALSA: pcm: prevent UAF in snd_pcm_info" + "CVE-2017-5549": { + "cmt_msg": "USB: serial: kl5kusb105: fix line-state error handling" }, - "CVE-2020-25656": { - "cmt_msg": "vt: keyboard, extend func_buf_lock to readers" + "CVE-2022-2380": { + "cmt_msg": "video: fbdev: sm712fb: Fix crash in smtcfb_read()" }, - "CVE-2017-16914": { - "cmt_msg": "usbip: fix stub_send_ret_submit() vulnerability to null transfer_buffer" + "CVE-2022-0850": { + "cmt_msg": "ext4: fix kernel infoleak via ext4_extent_header" }, - "CVE-2023-1390": { - "cmt_msg": "tipc: fix NULL deref in tipc_link_xmit()" + "CVE-2019-19447": { + "cmt_msg": "ext4: work around deleting a file with i_nlink == 0 safely" }, - "CVE-2022-0492": { - "cmt_msg": "cgroup-v1: Require capabilities to set release_agent" + "CVE-2021-3612": { + "cmt_msg": "Input: joydev - prevent potential read overflow in ioctl" }, - "CVE-2024-26598": { - "cmt_msg": "KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache" + "CVE-2019-19448": { + "cmt_msg": "btrfs: only search for left_info if there is no right_info in try_merge_free_space" }, - "CVE-2022-23042": { - "cmt_msg": "xen/netfront: react properly to failing gnttab_end_foreign_access_ref()" + "CVE-2019-19449": { + "cmt_msg": "f2fs: fix to do sanity check on segment/section count" }, - "CVE-2019-10142": { - "cmt_msg": "drivers/virt/fsl_hypervisor.c: prevent integer overflow in ioctl" + "CVE-2020-11725": { + "cmt_msg": "" }, - "CVE-2021-4023": { - "cmt_msg": "io-wq: fix cancellation on create-worker failure" + "CVE-2023-30456": { + "cmt_msg": "KVM: nVMX: add missing consistency checks for CR0 and CR4" }, - "CVE-2017-11176": { - "cmt_msg": "mqueue: fix a use-after-free in sys_mq_notify()" + "CVE-2021-35477": { + "cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4" }, - "CVE-2019-0145": { - "cmt_msg": "i40e: add num_vectors checker in iwarp handler" + "CVE-2024-26758": { + "cmt_msg": "md: Don't ignore suspended array in md_check_recovery()" }, - "CVE-2017-12193": { - "cmt_msg": "assoc_array: Fix a buggy node-splitting case" + "CVE-2024-26759": { + "cmt_msg": "mm/swap: fix race when skipping swapcache" }, - "CVE-2017-12192": { - "cmt_msg": "KEYS: prevent KEYCTL_READ on negative key" + "CVE-2022-1729": { + "cmt_msg": "perf: Fix sys_perf_event_open() race against self" }, - "CVE-2021-22555": { - "cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write" + "CVE-2024-26752": { + "cmt_msg": "l2tp: pass correct message length to ip6_append_data" }, - "CVE-2017-12190": { - "cmt_msg": "fix unbalanced page refcounting in bio_map_user_iov" + "CVE-2024-26756": { + "cmt_msg": "md: Don't register sync_thread for reshape directly" }, - "CVE-2022-1011": { - "cmt_msg": "fuse: fix pipe buffer lifetime for direct_io" + "CVE-2021-28038": { + "cmt_msg": "Xen/gnttab: handle p2m update errors on a per-slot basis" }, - "CVE-2021-0399": { + "CVE-2020-27068": { + "cmt_msg": "cfg80211: add missing policy for NL80211_ATTR_STATUS_CODE" + }, + "CVE-2020-14305": { + "cmt_msg": "netfilter: helpers: remove data_len usage for inkernel helpers" + }, + "CVE-2022-2964": { + "cmt_msg": "net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup" + }, + "CVE-2024-26689": { + "cmt_msg": "ceph: prevent use-after-free in encode_cap_msg()" + }, + "CVE-2022-2961": { "cmt_msg": "" }, - "CVE-2020-36691": { - "cmt_msg": "netlink: limit recursion depth in policy validation" + "CVE-2024-26686": { + "cmt_msg": "fs/proc: do_task_stat: use sig->stats_lock to gather the threads/children stats" }, - "CVE-2023-3111": { - "cmt_msg": "btrfs: unset reloc control if transaction commit fails in prepare_to_relocate()" + "CVE-2024-26687": { + "cmt_msg": "xen/events: close evtchn after mapping cleanup" }, - "CVE-2020-2732": { - "cmt_msg": "KVM: nVMX: Don't emulate instructions in guest mode" + "CVE-2023-3268": { + "cmt_msg": "relayfs: fix out-of-bounds access in relay_file_read" }, - "CVE-2016-5412": { - "cmt_msg": "KVM: PPC: Book3S HV: Pull out TM state save/restore into separate procedures" + "CVE-2023-45871": { + "cmt_msg": "igb: set max size RX buffer when store bad packet is enabled" }, - "CVE-2012-4542": { - "cmt_msg": "" + "CVE-2020-12114": { + "cmt_msg": "make struct mountpoint bear the dentry reference to mountpoint, not struct mount" }, - "CVE-2022-1729": { - "cmt_msg": "perf: Fix sys_perf_event_open() race against self" + "CVE-2021-4218": { + "cmt_msg": "sysctl: pass kernel pointers to ->proc_handler" }, - "CVE-2023-42752": { - "cmt_msg": "igmp: limit igmpv3_newpack() packet size to IP_MAX_MTU" + "CVE-2023-0266": { + "cmt_msg": "ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF" }, - "CVE-2023-4128": { - "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free" + "CVE-2016-7117": { + "cmt_msg": "net: Fix use after free in the recvmmsg exit path" }, - "CVE-2018-1000028": { - "cmt_msg": "nfsd: auth: Fix gid sorting when rootsquash enabled" + "CVE-2022-23042": { + "cmt_msg": "xen/netfront: react properly to failing gnttab_end_foreign_access_ref()" }, - "CVE-2023-1118": { - "cmt_msg": "media: rc: Fix use-after-free bugs caused by ene_tx_irqsim()" + "CVE-2019-10142": { + "cmt_msg": "drivers/virt/fsl_hypervisor.c: prevent integer overflow in ioctl" }, - "CVE-2018-7191": { - "cmt_msg": "tun: call dev_get_valid_name() before register_netdevice()" + "CVE-2017-11176": { + "cmt_msg": "mqueue: fix a use-after-free in sys_mq_notify()" }, - "CVE-2024-0607": { - "cmt_msg": "netfilter: nf_tables: fix pointer math issue in nft_byteorder_eval()" + "CVE-2023-52641": { + "cmt_msg": "fs/ntfs3: Add NULL ptr dereference checking at the end of attr_allocate_frame()" }, - "CVE-2022-44033": { - "cmt_msg": "char: pcmcia: remove all the drivers" + "CVE-2021-0399": { + "cmt_msg": "" }, - "CVE-2018-1000026": { - "cmt_msg": "bnx2x: disable GSO where gso_size is too big for hardware" + "CVE-2023-52488": { + "cmt_msg": "serial: sc16is7xx: convert from _raw_ to _noinc_ regmap functions for FIFO" }, - "CVE-2022-1975": { - "cmt_msg": "NFC: netlink: fix sleep in atomic bug when firmware download timeout" + "CVE-2023-52489": { + "cmt_msg": "mm/sparsemem: fix race in accessing memory_section->usage" }, - "CVE-2023-1380": { - "cmt_msg": "wifi: brcmfmac: slab-out-of-bounds read in brcmf_get_assoc_ies()" + "CVE-2021-47070": { + "cmt_msg": "uio_hv_generic: Fix another memory leak in error handling paths" }, - "CVE-2017-2596": { - "cmt_msg": "kvm: fix page struct leak in handle_vmon" + "CVE-2023-52484": { + "cmt_msg": "iommu/arm-smmu-v3: Fix soft lockup triggered by arm_smmu_mm_invalidate_range" }, - "CVE-2017-0786": { - "cmt_msg": "brcmfmac: add length check in brcmf_cfg80211_escan_handler()" + "CVE-2020-2732": { + "cmt_msg": "KVM: nVMX: Don't emulate instructions in guest mode" }, - "CVE-2021-28972": { - "cmt_msg": "PCI: rpadlpar: Fix potential drc_name corruption in store functions" + "CVE-2023-52486": { + "cmt_msg": "drm: Don't unref the same fb many times by mistake due to deadlock handling" }, - "CVE-2018-12130": { - "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" + "CVE-2023-52480": { + "cmt_msg": "ksmbd: fix race condition between session lookup and expire" }, - "CVE-2020-14305": { - "cmt_msg": "netfilter: helpers: remove data_len usage for inkernel helpers" + "CVE-2023-52481": { + "cmt_msg": "arm64: errata: Add Cortex-A520 speculative unprivileged load workaround" }, - "CVE-2021-20292": { - "cmt_msg": "drm/ttm/nouveau: don't call tt destroy callback on alloc failure." + "CVE-2023-52482": { + "cmt_msg": "x86/srso: Add SRSO mitigation for Hygon processors" }, - "CVE-2021-31916": { - "cmt_msg": "dm ioctl: fix out of bounds array access when no devices" + "CVE-2023-4128": { + "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free" + }, + "CVE-2021-47128": { + "cmt_msg": "bpf, lockdown, audit: Fix buggy SELinux lockdown permission checks" }, "CVE-2018-17182": { "cmt_msg": "mm: get rid of vmacache_flush_all() entirely" @@ -80099,30 +112300,24 @@ "CVE-2017-8064": { "cmt_msg": "[media] dvb-usb-v2: avoid use-after-free" }, - "CVE-2018-13405": { - "cmt_msg": "Fix up non-directory creation in SGID directories" - }, - "CVE-2020-25645": { - "cmt_msg": "geneve: add transport ports in route lookup for geneve" - }, - "CVE-2018-13406": { - "cmt_msg": "video: uvesafb: Fix integer overflow in allocation" - }, - "CVE-2022-1280": { - "cmt_msg": "drm: avoid circular locks in drm_mode_getconnector" + "CVE-2021-47122": { + "cmt_msg": "net: caif: fix memory leak in caif_device_notify" }, - "CVE-2023-3772": { - "cmt_msg": "xfrm: add NULL check in xfrm_update_ae_params" + "CVE-2021-47121": { + "cmt_msg": "net: caif: fix memory leak in cfusbl_device_notify" }, - "CVE-2020-11668": { - "cmt_msg": "media: xirlink_cit: add missing descriptor sanity checks" + "CVE-2021-47125": { + "cmt_msg": "sch_htb: fix refcount leak in htb_parent_to_leaf_offload" }, - "CVE-2020-11669": { - "cmt_msg": "powerpc/powernv/idle: Restore AMR/UAMOR/AMOR after idle" + "CVE-2021-47124": { + "cmt_msg": "io_uring: fix link timeout refs" }, "CVE-2019-15118": { "cmt_msg": "ALSA: usb-audio: Fix a stack buffer overflow bug in check_input_term" }, + "CVE-2021-47170": { + "cmt_msg": "USB: usbfs: Don't WARN about excessively large memory allocations" + }, "CVE-2019-12818": { "cmt_msg": "net: nfc: Fix NULL dereference on nfc_llcp_build_tlv fails" }, @@ -80132,164 +112327,47 @@ "CVE-2023-0394": { "cmt_msg": "ipv6: raw: Deduct extension header length in rawv6_push_pending_frames" }, - "CVE-2020-10690": { - "cmt_msg": "ptp: fix the race between the release of ptp_clock and cdev" - }, - "CVE-2022-36402": { - "cmt_msg": "drm/vmwgfx: Fix shader stage validation" - }, "CVE-2019-19332": { "cmt_msg": "KVM: x86: fix out-of-bounds write in KVM_GET_EMULATED_CPUID (CVE-2019-19332)" }, "CVE-2019-15117": { "cmt_msg": "ALSA: usb-audio: Fix an OOB bug in parse_audio_mixer_unit" }, - "CVE-2021-3659": { - "cmt_msg": "net: mac802154: Fix general protection fault" - }, "CVE-2022-25258": { "cmt_msg": "USB: gadget: validate interface OS descriptor requests" }, - "CVE-2021-4155": { - "cmt_msg": "xfs: map unwritten blocks in XFS_IOC_{ALLOC,FREE}SP just like fallocate" - }, - "CVE-2019-14901": { - "cmt_msg": "mwifiex: Fix heap overflow in mmwifiex_process_tdls_action_frame()" - }, - "CVE-2021-4150": { - "cmt_msg": "block: fix incorrect references to disk objects" + "CVE-2021-47173": { + "cmt_msg": "misc/uss720: fix memory leak in uss720_probe" }, "CVE-2020-3702": { "cmt_msg": "ath: Use safer key clearing with key cache entries" }, - "CVE-2020-16166": { - "cmt_msg": "random32: update the net random state on interrupt and activity" - }, - "CVE-2021-3653": { - "cmt_msg": "KVM: nSVM: avoid picking up unsupported bits from L2 in int_ctl (CVE-2021-3653)" - }, - "CVE-2021-3655": { - "cmt_msg": "sctp: validate from_addr_param return" - }, - "CVE-2020-8694": { - "cmt_msg": "powercap: restrict energy meter to root access" - }, - "CVE-2021-4159": { - "cmt_msg": "bpf: Verifer, adjust_scalar_min_max_vals to always call update_reg_bounds()" - }, - "CVE-2019-12614": { - "cmt_msg": "powerpc/pseries/dlpar: Fix a missing check in dlpar_parse_cc_property()" - }, - "CVE-2019-12615": { - "cmt_msg": "mdesc: fix a missing-check bug in get_vdev_port_node_info()" - }, - "CVE-2021-3715": { - "cmt_msg": "net_sched: cls_route: remove the right filter from hashtable" - }, - "CVE-2021-3714": { - "cmt_msg": "" - }, - "CVE-2019-16230": { - "cmt_msg": "drm/amdkfd: fix a potential NULL pointer dereference (v2)" - }, - "CVE-2019-16231": { - "cmt_msg": "fjes: Handle workqueue allocation failure" - }, - "CVE-2017-12168": { - "cmt_msg": "arm64: KVM: pmu: Fix AArch32 cycle counter access" - }, - "CVE-2019-16233": { - "cmt_msg": "scsi: qla2xxx: fix a potential NULL pointer dereference" - }, - "CVE-2019-16234": { - "cmt_msg": "iwlwifi: pcie: fix rb_allocator workqueue allocation" - }, - "CVE-2019-6133": { - "cmt_msg": "fork: record start_time late" - }, - "CVE-2018-10902": { - "cmt_msg": "ALSA: rawmidi: Change resized buffers atomically" - }, - "CVE-2021-39633": { - "cmt_msg": "ip_gre: add validation for csum_start" - }, - "CVE-2017-18203": { - "cmt_msg": "dm: fix race between dm_get_from_kobject() and __dm_destroy()" - }, - "CVE-2017-18202": { - "cmt_msg": "mm, oom_reaper: gather each vma to prevent leaking TLB entry" - }, - "CVE-2021-35477": { - "cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4" - }, - "CVE-2017-18204": { - "cmt_msg": "ocfs2: should wait dio before inode lock in ocfs2_setattr()" + "CVE-2023-3117": { + "cmt_msg": "netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE" }, - "CVE-2021-39634": { - "cmt_msg": "epoll: do not insert into poll queues until all sanity checks are done" + "CVE-2023-3111": { + "cmt_msg": "btrfs: unset reloc control if transaction commit fails in prepare_to_relocate()" }, "CVE-2019-3882": { "cmt_msg": "vfio/type1: Limit DMA mappings per container" }, - "CVE-2017-18208": { - "cmt_msg": "mm/madvise.c: fix madvise() infinite loop under special circumstances" - }, - "CVE-2022-33741": { - "cmt_msg": "xen/netfront: force data bouncing when backend is untrusted" + "CVE-2024-24861": { + "cmt_msg": "media: xc4000: Fix atomicity violation in xc4000_get_frequency" }, - "CVE-2018-20509": { - "cmt_msg": "binder: refactor binder ref inc/dec for thread safety" + "CVE-2019-18675": { + "cmt_msg": "mmap: introduce sane default mmap limits" }, "CVE-2024-24864": { "cmt_msg": "" }, - "CVE-2022-45885": { - "cmt_msg": "" - }, - "CVE-2022-33744": { - "cmt_msg": "xen/arm: Fix race in RB-tree based P2M accounting" - }, "CVE-2017-9605": { "cmt_msg": "drm/vmwgfx: Make sure backup_handle is always valid" }, - "CVE-2017-18193": { - "cmt_msg": "f2fs: fix a bug caused by NULL extent tree" - }, - "CVE-2022-40768": { - "cmt_msg": "scsi: stex: Properly zero out the passthrough command structure" - }, - "CVE-2019-9454": { - "cmt_msg": "i2c: core-smbus: prevent stack corruption on read I2C_BLOCK_DATA" - }, - "CVE-2020-12888": { - "cmt_msg": "vfio-pci: Invalidate mmaps and block MMIO access on disabled memory" - }, - "CVE-2017-6214": { - "cmt_msg": "tcp: avoid infinite loop in tcp_splice_read()" - }, - "CVE-2023-52445": { - "cmt_msg": "media: pvrusb2: fix use after free on context disconnection" - }, - "CVE-2017-6353": { - "cmt_msg": "sctp: deny peeloff operation on asocs with threads sleeping on it" - }, - "CVE-2017-18174": { - "cmt_msg": "pinctrl: amd: Use devm_pinctrl_register() for pinctrl registration" - }, - "CVE-2022-41218": { - "cmt_msg": "media: dvb-core: Fix UAF due to refcount races at releasing" - }, - "CVE-2019-20934": { - "cmt_msg": "sched/fair: Don't free p->numa_faults with concurrent readers" - }, - "CVE-2022-1247": { - "cmt_msg": "" - }, "CVE-2022-36946": { "cmt_msg": "netfilter: nf_queue: do not allow packet truncation below transport header offset" }, - "CVE-2021-45485": { - "cmt_msg": "ipv6: use prandom_u32() for ID generation" + "CVE-2016-4485": { + "cmt_msg": "net: fix infoleak in llc" }, "CVE-2016-4482": { "cmt_msg": "USB: usbfs: fix potential infoleak in devio" @@ -80300,173 +112378,38 @@ "CVE-2022-21166": { "cmt_msg": "x86/speculation/mmio: Enable CPU Fill buffer clearing on idle" }, - "CVE-2020-29374": { - "cmt_msg": "gup: document and work around \"COW can break either way\" issue" - }, "CVE-2016-9191": { "cmt_msg": "sysctl: Drop reference added by grab_header in proc_sys_readdir" }, - "CVE-2015-8709": { - "cmt_msg": "mm: Add a user_ns owner to mm_struct and fix ptrace permission checks" - }, - "CVE-2018-16862": { - "cmt_msg": "mm: cleancache: fix corruption on missed inode invalidation" - }, - "CVE-2023-52449": { - "cmt_msg": "mtd: Fix gluebi NULL pointer dereference caused by ftl notifier" - }, "CVE-2021-29650": { "cmt_msg": "netfilter: x_tables: Use correct memory barriers." }, - "CVE-2019-18806": { - "cmt_msg": "net: qlogic: Fix memory leak in ql_alloc_large_buffers" - }, - "CVE-2023-4010": { - "cmt_msg": "" - }, "CVE-2018-20169": { "cmt_msg": "USB: check usb_get_extra_descriptor for proper size" }, - "CVE-2017-12762": { - "cmt_msg": "isdn/i4l: fix buffer overflow" - }, - "CVE-2018-7754": { - "cmt_msg": "printk: hash addresses printed with %p" - }, - "CVE-2021-33656": { - "cmt_msg": "vt: drop old FONT ioctls" - }, - "CVE-2020-36558": { - "cmt_msg": "vt: vt_ioctl: fix race in VT_RESIZEX" - }, - "CVE-2022-41849": { - "cmt_msg": "fbdev: smscufx: Fix use-after-free in ufx_ops_open()" - }, - "CVE-2022-41848": { - "cmt_msg": "" - }, - "CVE-2023-6356": { - "cmt_msg": "" - }, - "CVE-2022-1353": { - "cmt_msg": "af_key: add __GFP_ZERO flag for compose_sadb_supported in function pfkey_register" + "CVE-2016-9644": { + "cmt_msg": "x86/mm: Expand the exception table logic to allow new handling options" }, "CVE-2022-28356": { "cmt_msg": "llc: fix netdevice reference leaks in llc_ui_bind()" }, - "CVE-2022-1198": { - "cmt_msg": "drivers: hamradio: 6pack: fix UAF bug caused by mod_timer()" - }, - "CVE-2022-1199": { - "cmt_msg": "ax25: Fix NULL pointer dereference in ax25_kill_by_device" - }, "CVE-2018-5750": { "cmt_msg": "ACPI: sbshc: remove raw pointer from printk() message" }, - "CVE-2021-39801": { - "cmt_msg": "" - }, - "CVE-2021-39800": { - "cmt_msg": "" - }, - "CVE-2018-16884": { - "cmt_msg": "sunrpc: use-after-free in svc_process_common()" - }, - "CVE-2022-1195": { - "cmt_msg": "hamradio: improve the incomplete fix to avoid NPD" - }, - "CVE-2024-22099": { - "cmt_msg": "" - }, - "CVE-2021-4202": { - "cmt_msg": "NFC: reorganize the functions in nci_request" - }, - "CVE-2021-4203": { - "cmt_msg": "af_unix: fix races in sk_peer_pid and sk_peer_cred accesses" - }, - "CVE-2022-45887": { - "cmt_msg": "media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb()" - }, - "CVE-2022-0330": { - "cmt_msg": "drm/i915: Flush TLBs before releasing backing store" - }, - "CVE-2022-41858": { - "cmt_msg": "drivers: net: slip: fix NPD bug in sl_tx_timeout()" - }, - "CVE-2024-24859": { - "cmt_msg": "" + "CVE-2022-20166": { + "cmt_msg": "drivers core: Use sysfs_emit and sysfs_emit_at for show(device *...) functions" }, "CVE-2019-10220": { "cmt_msg": "Convert filldir[64]() from __put_user() to unsafe_put_user()" }, - "CVE-2023-2124": { - "cmt_msg": "xfs: verify buffer contents when we skip log replay" - }, - "CVE-2020-26557": { - "cmt_msg": "" - }, - "CVE-2021-3609": { - "cmt_msg": "can: bcm: delay release of struct bcm_op after synchronize_rcu()" - }, - "CVE-2024-0775": { - "cmt_msg": "ext4: improve error recovery code paths in __ext4_remount()" - }, "CVE-2021-44879": { "cmt_msg": "f2fs: fix to do sanity check on inode type during garbage collection" }, - "CVE-2019-15505": { - "cmt_msg": "media: technisat-usb2: break out of loop at end of buffer" - }, - "CVE-2023-2513": { - "cmt_msg": "ext4: fix use-after-free in ext4_xattr_set_entry" - }, - "CVE-2017-1000": { - "cmt_msg": "udp: consistently apply ufo or fragmentation" - }, - "CVE-2020-11609": { - "cmt_msg": "media: stv06xx: add missing descriptor sanity checks" - }, - "CVE-2020-36385": { - "cmt_msg": "RDMA/ucma: Rework ucma_migrate_id() to avoid races with destroy" - }, - "CVE-2020-0429": { - "cmt_msg": "l2tp: fix race between l2tp_session_delete() and l2tp_tunnel_closeall()" - }, - "CVE-2020-27066": { - "cmt_msg": "xfrm: policy: Fix doulbe free in xfrm_policy_timer" - }, - "CVE-2022-2964": { - "cmt_msg": "net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup" - }, - "CVE-2017-0605": { - "cmt_msg": "tracing: Use strlcpy() instead of strcpy() in __trace_find_cmdline()" - }, - "CVE-2021-1048": { - "cmt_msg": "fix regression in \"epoll: Keep a reference on files added to the check list\"" - }, - "CVE-2015-2877": { - "cmt_msg": "" - }, "CVE-2020-9383": { "cmt_msg": "floppy: check FDC index for errors before assigning it" }, - "CVE-2022-3586": { - "cmt_msg": "sch_sfb: Don't assume the skb is still around after enqueueing to child" - }, - "CVE-2023-32269": { - "cmt_msg": "netrom: Fix use-after-free caused by accept on already connected socket" - }, - "CVE-2023-1206": { - "cmt_msg": "tcp: Reduce chance of collisions in inet6_hashfn()." - }, - "CVE-2021-38198": { - "cmt_msg": "KVM: X86: MMU: Use the correct inherited permissions to get shadow page" - }, - "CVE-2022-1679": { - "cmt_msg": "ath9k: fix use-after-free in ath9k_hif_usb_rx_cb" - }, - "CVE-2020-8832": { - "cmt_msg": "drm/i915: Record the default hw state after reset upon load" + "CVE-2017-5972": { + "cmt_msg": "tcp: do not lock listener to process SYN packets" }, "CVE-2017-5970": { "cmt_msg": "ipv4: keep skb->dst around in presence of IP options" @@ -80480,41 +112423,17 @@ "CVE-2021-3847": { "cmt_msg": "" }, - "CVE-2018-1130": { - "cmt_msg": "dccp: check sk for closed state in dccp_sendmsg()" - }, - "CVE-2023-1077": { - "cmt_msg": "sched/rt: pick_next_rt_entity(): check list_entry" - }, - "CVE-2019-14284": { - "cmt_msg": "floppy: fix div-by-zero in setup_format_params" - }, - "CVE-2020-36557": { - "cmt_msg": "vt: vt_ioctl: fix VT_DISALLOCATE freeing in-use virtual console" - }, - "CVE-2021-3506": { - "cmt_msg": "f2fs: fix to avoid out-of-bounds memory access" + "CVE-2019-9445": { + "cmt_msg": "f2fs: check if file namelen exceeds max value" }, - "CVE-2011-4917": { - "cmt_msg": "" + "CVE-2019-20934": { + "cmt_msg": "sched/fair: Don't free p->numa_faults with concurrent readers" }, "CVE-2011-4916": { "cmt_msg": "" }, - "CVE-2019-14283": { - "cmt_msg": "floppy: fix out-of-bounds read in copy_buffer" - }, - "CVE-2019-3900": { - "cmt_msg": "vhost_net: fix possible infinite loop" - }, - "CVE-2019-19528": { - "cmt_msg": "USB: iowarrior: fix use-after-free on disconnect" - }, - "CVE-2019-19533": { - "cmt_msg": "media: ttusb-dec: Fix info-leak in ttusb_dec_send_command()" - }, - "CVE-2018-13100": { - "cmt_msg": "f2fs: fix to do sanity check with secs_per_zone" + "CVE-2023-23039": { + "cmt_msg": "" }, "CVE-2017-16646": { "cmt_msg": "media: dib0700: fix invalid dvb_detach argument" @@ -80525,1827 +112444,1361 @@ "CVE-2017-16643": { "cmt_msg": "Input: gtco - fix potential out-of-bound access" }, - "CVE-2018-10882": { - "cmt_msg": "ext4: add more inode number paranoia checks" - }, - "CVE-2023-31083": { - "cmt_msg": "Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO" - }, "CVE-2019-5489": { "cmt_msg": "Change mincore() to count \"mapped\" pages rather than \"cached\" pages" }, - "CVE-2024-1312": { - "cmt_msg": "mm: lock_vma_under_rcu() must check vma->anon_vma under vma lock" + "CVE-2017-16649": { + "cmt_msg": "net: cdc_ether: fix divide by 0 on bad descriptors" }, "CVE-2017-16648": { "cmt_msg": "dvb_frontend: don't use-after-free the frontend struct" }, - "CVE-2018-10880": { - "cmt_msg": "ext4: never move the system.data xattr out of the inode body" + "CVE-2020-36322": { + "cmt_msg": "fuse: fix bad inode" }, - "CVE-2018-10881": { - "cmt_msg": "ext4: clear i_data in ext4_inode_info when removing inline data" + "CVE-2020-10711": { + "cmt_msg": "netlabel: cope with NULL catmap" }, - "CVE-2017-16649": { - "cmt_msg": "net: cdc_ether: fix divide by 0 on bad descriptors" + "CVE-2020-35508": { + "cmt_msg": "fork: fix copy_process(CLONE_PARENT) race with the exiting ->real_parent" }, - "CVE-2018-10883": { - "cmt_msg": "jbd2: don't mark block as modified if the handle is out of credits" - } - } - }, - "4.1": { - "4.1.2": { - "CVE-2015-3212": { - "cmt_msg": "sctp: fix ASCONF list handling", - "cmt_id": "bd0a0d20ebd08f250af9023530b5de4bc433ebaa" - } - }, - "4.1.4": { - "CVE-2015-1333": { - "cmt_msg": "KEYS: ensure we free the assoc array edit if edit is valid", - "cmt_id": "4fd5dc9eece297f49f16f82422ead3a28b11ea70" + "CVE-2020-35501": { + "cmt_msg": "" }, - "CVE-2015-3288": { - "cmt_msg": "mm: avoid setting up anonymous pages into file mapping", - "cmt_id": "c86df9fa76f914d84e02caf2aaf11a22ca1820c2" + "CVE-2021-45095": { + "cmt_msg": "phonet: refcount leak in pep_sock_accep" }, - "CVE-2015-9289": { - "cmt_msg": "cx24116: fix a buffer overflow when checking userspace params", - "cmt_id": "27b76178c496bdb4fc24278ff9e659dc0a5db10f" - } - }, - "4.1.5": { - "CVE-2015-6252": { - "cmt_msg": "vhost: actually track log eventfd file", - "cmt_id": "fd1a8f57bfd8686709c17cbe878470bd43fb3c4e" - } - }, - "4.1.6": { - "CVE-2015-4692": { - "cmt_msg": "kvm: x86: fix kvm_apic_has_events to check for NULL pointer", - "cmt_id": "f627ab0afcd983b3cb5f6d47c5006fd14cfc9a01" + "CVE-2024-26685": { + "cmt_msg": "nilfs2: fix potential bug in end_buffer_async_write" }, - "CVE-2015-5157": { - "cmt_msg": "x86/nmi/64: Switch stacks on userspace NMI entry", - "cmt_id": "60e6cbaf875edd9aef40948d0790decb8e1a77cc" + "CVE-2021-32399": { + "cmt_msg": "bluetooth: eliminate the potential race condition when removing the HCI controller" }, - "CVE-2015-3291": { - "cmt_msg": "x86/nmi/64: Use DF to avoid userspace RSP confusing nested NMI detection", - "cmt_id": "37df1cab0c4d4ec0f4bec868b2e26b84e725c478" + "CVE-2017-1000410": { + "cmt_msg": "Bluetooth: Prevent stack info leak from the EFS element." }, - "CVE-2015-3290": { - "cmt_msg": "x86/nmi/64: Switch stacks on userspace NMI entry", - "cmt_id": "60e6cbaf875edd9aef40948d0790decb8e1a77cc" + "CVE-2022-32250": { + "cmt_msg": "netfilter: nf_tables: disallow non-stateful expression in sets earlier" }, - "CVE-2015-5697": { - "cmt_msg": "md: use kzalloc() when bitmap is disabled", - "cmt_id": "33afeac21b9cb79ad8fc5caf239af89c79e25e1e" - } - }, - "4.1.9": { - "CVE-2015-8746": { - "cmt_msg": "NFS: Fix a NULL pointer dereference of migration recovery ops for v4.2 client", - "cmt_id": "87fbed4145998fbb3960c243c70cf78fbd7e5f42" - } - }, - "4.1.10": { - "CVE-2015-5283": { - "cmt_msg": "sctp: fix race on protocol/netns initialization", - "cmt_id": "5cadd6bac523e5e78ae18284e5f2b286ebff070b" - } - }, - "4.1.11": { - "CVE-2015-7613": { - "cmt_msg": "Initialize msg/shm IPC objects before doing ipc_addid()", - "cmt_id": "7983297d99ea11152a76420d4325f5d1925e2547" + "CVE-2016-8650": { + "cmt_msg": "mpi: Fix NULL ptr dereference in mpi_powm() " + }, + "CVE-2016-2143": { + "cmt_msg": "s390/mm: four page table levels vs. fork" + }, + "CVE-2017-5551": { + "cmt_msg": "tmpfs: clear S_ISGID when setting posix ACLs" + }, + "CVE-2021-28688": { + "cmt_msg": "xen-blkback: don't leak persistent grants from xen_blkbk_map()" + }, + "CVE-2018-10878": { + "cmt_msg": "ext4: always check block group bounds in ext4_init_block_bitmap()" + }, + "CVE-2019-12379": { + "cmt_msg": "consolemap: Fix a memory leaking bug in drivers/tty/vt/consolemap.c" + }, + "CVE-2019-12378": { + "cmt_msg": "ipv6_sockglue: Fix a missing-check bug in ip6_ra_control()" + }, + "CVE-2017-6001": { + "cmt_msg": "perf/core: Fix concurrent sys_perf_event_open() vs. 'move_group' race" + }, + "CVE-2015-8551": { + "cmt_msg": "xen/pciback: Return error on XEN_PCI_OP_enable_msi when device has MSI or MSI-X enabled" + }, + "CVE-2015-8550": { + "cmt_msg": "xen: Add RING_COPY_REQUEST()" + }, + "CVE-2015-8553": { + "cmt_msg": "xen/pciback: Don't allow MSI-X ops if PCI_COMMAND_MEMORY is not set." }, - "CVE-2015-5257": { - "cmt_msg": "USB: whiteheat: fix potential null-deref at probe", - "cmt_id": "44f73be485f66dfeca7c6a5e334a7a11b97a4151" + "CVE-2015-8552": { + "cmt_msg": "xen/pciback: Return error on XEN_PCI_OP_enable_msi when device has MSI or MSI-X enabled" }, - "CVE-2015-2925": { - "cmt_msg": "dcache: Handle escaped paths in prepend_path", - "cmt_id": "6f4e45e35c02fd23589a62aab0dc84286cc1302c" - } - }, - "4.1.12": { - "CVE-2020-0066": { - "cmt_msg": "netlink: Trim skb to alloc size to avoid MSG_TRUNC", - "cmt_id": "e962218b42896856642f8d37bb69c4f1feaa8ad9" - } - }, - "4.1.13": { - "CVE-2015-8953": { - "cmt_msg": "ovl: fix dentry reference leak", - "cmt_id": "7fd58acc9f6f751aebcee8288d020d959d815445" - } - }, - "4.1.14": { - "CVE-2015-5156": { - "cmt_msg": "virtio-net: drop NETIF_F_FRAGLIST", - "cmt_id": "152964690b41b91049d00eb8aea1d25880cd13f0" + "CVE-2017-7895": { + "cmt_msg": "nfsd: stricter decoding of write-like NFSv2/v3 ops" }, - "CVE-2015-5307": { - "cmt_msg": "KVM: x86: work around infinite loop in microcode when #AC is delivered", - "cmt_id": "b62c38079ebaa36c0ccd77647fd1fdd46315bc98" + "CVE-2020-26145": { + "cmt_msg": "ath10k: drop fragments with multicast DA for PCIe" }, - "CVE-2015-6937": { - "cmt_msg": "RDS: verify the underlying transport exists before creating a connection", - "cmt_id": "dd5efc80af05cfd7ae77bb3229a35cc9bc09615d" - } - }, - "4.1.15": { - "CVE-2015-8374": { - "cmt_msg": "Btrfs: fix truncation of compressed and inlined extents", - "cmt_id": "f1008f6d21ec52d533f7473e2e46218408fb4580" + "CVE-2017-13216": { + "cmt_msg": "staging: android: ashmem: fix a race condition in ASHMEM_SET_SIZE ioctl" }, - "CVE-2016-3841": { - "cmt_msg": "ipv6: add complete rcu protection around np->opt", - "cmt_id": "81ed463384847813faa59e692285fe775da7375f" + "CVE-2020-26147": { + "cmt_msg": "mac80211: assure all fragments are encrypted" }, - "CVE-2013-7446": { - "cmt_msg": "unix: avoid use-after-free in ep_remove_wait_queue", - "cmt_id": "5c77e26862ce604edea05b3442ed765e9756fe0f" - } - }, - "4.1.16": { - "CVE-2015-8543": { - "cmt_msg": "net: add validation for the socket syscall protocol argument", - "cmt_id": "bc8f79b522b57ca79a676615003d85b08162ff5a" + "CVE-2020-26141": { + "cmt_msg": "ath10k: Fix TKIP Michael MIC verification for PCIe" }, - "CVE-2016-0728": { - "cmt_msg": "KEYS: Fix keyring ref leak in join_session_keyring()", - "cmt_id": "b71567e6c9a2b15b7be9cb8ca695e9c990c0513b" + "CVE-2020-26140": { + "cmt_msg": "" }, - "CVE-2015-7872": { - "cmt_msg": "KEYS: Fix crash when attempt to garbage collect an uninstantiated keyring", - "cmt_id": "3366472496482e75a83db93846226b8a360ff911" + "CVE-2020-26143": { + "cmt_msg": "" }, - "CVE-2015-7550": { - "cmt_msg": "KEYS: Fix race between read and revoke", - "cmt_id": "98fec5a2034454f004ca6471de4df4ded2c5f79f" + "CVE-2020-26142": { + "cmt_msg": "" }, - "CVE-2015-8569": { - "cmt_msg": "pptp: verify sockaddr_len in pptp_bind() and pptp_connect()", - "cmt_id": "f167b6f4244fbc8d05fcc385b1bf8e70729c9e7c" + "CVE-2019-17053": { + "cmt_msg": "ieee802154: enforce CAP_NET_RAW for raw sockets" }, - "CVE-2015-8575": { - "cmt_msg": "bluetooth: Validate socket address length in sco_sock_bind().", - "cmt_id": "1814295365a02ff174948159f1eececa55fe4f97" - } - }, - "4.1.17": { - "CVE-2016-2069": { - "cmt_msg": "x86/mm: Add barriers and document switch_mm()-vs-flush synchronization", - "cmt_id": "ae535caf02c7e2e7feec62f4e07ac1f48ad5b336" + "CVE-2019-17052": { + "cmt_msg": "ax25: enforce CAP_NET_RAW for raw sockets" }, - "CVE-2015-7799": { - "cmt_msg": "isdn_ppp: Add checks for allocation failure in isdn_ppp_open()", - "cmt_id": "5984398539a2c47834caf1b00dc9f58b7bb2e67a" + "CVE-2019-17056": { + "cmt_msg": "nfc: enforce CAP_NET_RAW for raw sockets" }, - "CVE-2015-8845": { - "cmt_msg": "powerpc/tm: Check for already reclaimed tasks", - "cmt_id": "a54d3a4234121d8a9749331f7b10e6ff02f886ba" + "CVE-2019-17055": { + "cmt_msg": "mISDN: enforce CAP_NET_RAW for raw sockets" }, - "CVE-2015-8844": { - "cmt_msg": "powerpc/tm: Block signal return setting invalid MSR state", - "cmt_id": "567a215dd1586dae787f21b8f3e484018763a710" + "CVE-2019-17054": { + "cmt_msg": "appletalk: enforce CAP_NET_RAW for raw sockets" }, - "CVE-2016-2547": { - "cmt_msg": "ALSA: timer: Harden slave timer list handling", - "cmt_id": "466c99bd815a1ae189d883b509b067c9a74a30f9" + "CVE-2024-26745": { + "cmt_msg": "powerpc/pseries/iommu: IOMMU table is not initialized for kdump over SR-IOV" }, - "CVE-2015-8104": { - "cmt_msg": "KVM: svm: unconditionally intercept #DB", - "cmt_id": "19eaffefc4b03d92e0adfd1870b10b9539916106" + "CVE-2024-26744": { + "cmt_msg": "RDMA/srpt: Support specifying the srpt_service_guid parameter" }, - "CVE-2016-2548": { - "cmt_msg": "ALSA: timer: Harden slave timer list handling", - "cmt_id": "466c99bd815a1ae189d883b509b067c9a74a30f9" + "CVE-2024-26743": { + "cmt_msg": "RDMA/qedr: Fix qedr_create_user_qp error flow" }, - "CVE-2016-2545": { - "cmt_msg": "ALSA: timer: Fix double unlink of active_list", - "cmt_id": "dc5697eb3297920e20b53fdf4c40891e1ed0eafd" + "CVE-2020-29661": { + "cmt_msg": "tty: Fix ->pgrp locking in tiocspgrp()" }, - "CVE-2016-2544": { - "cmt_msg": "ALSA: seq: Fix race at timer setup and close", - "cmt_id": "49c9eb3db86407868a664ade6da041fabeb457f8" + "CVE-2020-29660": { + "cmt_msg": "tty: Fix ->session locking" }, - "CVE-2015-8816": { - "cmt_msg": "USB: fix invalid memory access in hub_activate()", - "cmt_id": "a7e83b16c8d83a75c58989e845c664ecaa6e0aa6" + "CVE-2024-26748": { + "cmt_msg": "usb: cdns3: fix memory double free when handle zero packet" }, - "CVE-2016-2546": { - "cmt_msg": "ALSA: timer: Fix race among timer ioctls", - "cmt_id": "ac905ca58370789645e813d8abfa5871c93e9e36" + "CVE-2023-28772": { + "cmt_msg": "seq_buf: Fix overflow in seq_buf_putmem_hex()" }, - "CVE-2015-7884": { - "cmt_msg": "media/vivid-osd: fix info leak in ioctl", - "cmt_id": "b824d64b153a9683aed6730e9f093a7102c36799" + "CVE-2015-8952": { + "cmt_msg": "ext2: convert to mbcache2" }, - "CVE-2016-2543": { - "cmt_msg": "ALSA: seq: Fix missing NULL check at remove_events ioctl", - "cmt_id": "9a6003a362acb814fea7422209be344b822b047a" + "CVE-2024-26699": { + "cmt_msg": "drm/amd/display: Fix array-index-out-of-bounds in dcn35_clkmgr" }, - "CVE-2013-4312": { - "cmt_msg": "unix: properly account for FDs passed over unix sockets", - "cmt_id": "dc6b0ec667f67d4768e72c1b7f1bbc14ea52379c" + "CVE-2024-26691": { + "cmt_msg": "KVM: arm64: Fix circular locking dependency" }, - "CVE-2016-2549": { - "cmt_msg": "ALSA: hrtimer: Fix stall by hrtimer_cancel()", - "cmt_id": "965b1203f399676ac4989a0876336e212a71085b" + "CVE-2024-26697": { + "cmt_msg": "nilfs2: fix data corruption in dsync block recovery for small block sizes" }, - "CVE-2015-8767": { - "cmt_msg": "sctp: Prevent soft lockup when sctp_accept() is called during a timeout event", - "cmt_id": "534e9016cd88ccd577b226b7172e5cd079f5fb02" - } - }, - "4.1.18": { - "CVE-2016-1575": { - "cmt_msg": "ovl: setattr: check permissions before copy-up", - "cmt_id": "c8e1bebf86dff9277e21e9a2769724ca05f40c02" + "CVE-2024-26696": { + "cmt_msg": "nilfs2: fix hang in nilfs_lookup_dirty_data_buffers()" }, - "CVE-2016-2782": { - "cmt_msg": "USB: visor: fix null-deref at probe", - "cmt_id": "5c9cad0a726131934408f3a9e66fc381204a9ba2" + "CVE-2019-15927": { + "cmt_msg": "ALSA: usb-audio: Avoid access before bLength check in build_audio_procunit()" }, - "CVE-2015-7566": { - "cmt_msg": "USB: serial: visor: fix crash on detecting device without write_urbs", - "cmt_id": "85491ceb50c4bc446127776714b41d2b9ca627f1" + "CVE-2019-15926": { + "cmt_msg": "ath6kl: add some bounds checking" }, - "CVE-2016-0723": { - "cmt_msg": "tty: Fix unsafe ldisc reference via ioctl(TIOCGETD)", - "cmt_id": "27055738c910ee29a9de4b496e198e17b38b0eed" + "CVE-2021-38160": { + "cmt_msg": "virtio_console: Assure used length from device is limited" }, - "CVE-2016-1576": { - "cmt_msg": "ovl: setattr: check permissions before copy-up", - "cmt_id": "c8e1bebf86dff9277e21e9a2769724ca05f40c02" - } - }, - "4.1.19": { - "CVE-2016-2384": { - "cmt_msg": "ALSA: usb-audio: avoid freeing umidi object twice", - "cmt_id": "1ea63b629c9c53af6cdde4daf166b3d31b3e9cfe" + "CVE-2019-15219": { + "cmt_msg": "USB: sisusbvga: fix oops in error path of sisusb_probe" }, - "CVE-2016-2383": { - "cmt_msg": "bpf: fix branch offset adjustment on backjumps after patching ctx expansion", - "cmt_id": "0f912f6700a3f14481c13cbda2b9cc1b636948ac" + "CVE-2019-15218": { + "cmt_msg": "media: usb: siano: Fix general protection fault in smsusb" }, - "CVE-2016-2085": { - "cmt_msg": "EVM: Use crypto_memneq() for digest comparisons", - "cmt_id": "d185fa457006e98aa975ed6c0e7d2ddfe3d26695" + "CVE-2005-3660": { + "cmt_msg": "" }, - "CVE-2021-20265": { - "cmt_msg": "af_unix: fix struct pid memory leak", - "cmt_id": "8d988538da0c17711c0de0a53fc38cef49e3ed1b" + "CVE-2017-14106": { + "cmt_msg": "tcp: initialize rcv_mss to TCP_MIN_MSS instead of 0" }, - "CVE-2017-13167": { - "cmt_msg": "ALSA: timer: Fix race at concurrent reads", - "cmt_id": "0163f1a71f10b25eae8d7019124cd7f1141b109a" + "CVE-2019-15212": { + "cmt_msg": "USB: rio500: refuse more than one device at a time" }, - "CVE-2015-8970": { - "cmt_msg": "crypto: algif_skcipher - Require setkey before accept(2)", - "cmt_id": "762330b161c49c6d88ab689a0ee2a1a959dc5b6b" - } - }, - "4.1.20": { - "CVE-2015-8553": { - "cmt_msg": "xen/pciback: Don't allow MSI-X ops if PCI_COMMAND_MEMORY is not set.", - "cmt_id": "fda3e3e7b638f742149fb32aa9b691413bb91f41" - } - }, - "4.1.21": { - "CVE-2016-2143": { - "cmt_msg": "s390/mm: four page table levels vs. fork", - "cmt_id": "09b4fd2014b1ef7d46df8df553f94254ba2a0497" + "CVE-2019-15211": { + "cmt_msg": "media: radio-raremono: change devm_k*alloc to k*alloc" }, - "CVE-2016-3044": { - "cmt_msg": "KVM: PPC: Book3S HV: Sanitize special-purpose register values on guest exit", - "cmt_id": "6d44ac3f884b220573b2d46c691127fb6fee0707" + "CVE-2019-15217": { + "cmt_msg": "media: usb:zr364xx:Fix KASAN:null-ptr-deref Read in zr364xx_vidioc_querycap" }, - "CVE-2015-8839": { - "cmt_msg": "ext4: fix races between page faults and hole punching", - "cmt_id": "248766f068fd1d3d95479f470bc926d1136141d6" - } - }, - "4.1.22": { - "CVE-2016-3157": { - "cmt_msg": "x86/iopl/64: Properly context-switch IOPL on Xen PV", - "cmt_id": "2cc58a1e06ea8b6c9aa6d25ec74d8d1671e500eb" + "CVE-2019-15216": { + "cmt_msg": "USB: yurex: Fix protection fault after device removal" }, - "CVE-2015-7513": { - "cmt_msg": "KVM: x86: Reload pit counters for all channels when restoring state", - "cmt_id": "90352f3f473a29db1289ec31facc1ac18cc66e9e" + "CVE-2017-1000380": { + "cmt_msg": "ALSA: timer: Fix race between read and ioctl" }, - "CVE-2016-3689": { - "cmt_msg": "Input: ims-pcu - sanity check against missing interfaces", - "cmt_id": "3ec245e8591a183e276df89cd7f9e7a15645b9da" + "CVE-2019-15214": { + "cmt_msg": "ALSA: core: Fix card races between register and disconnect" }, - "CVE-2016-9685": { - "cmt_msg": "xfs: fix two memory leaks in xfs_attr_list.c error paths", - "cmt_id": "594103da3005639712b3123a612791c8f4d3f4e9" + "CVE-2019-19922": { + "cmt_msg": "sched/fair: Fix low cpu usage with high throttling by removing expiration of cpu-local slices" }, - "CVE-2015-8785": { - "cmt_msg": "fuse: break infinite loop in fuse_fill_write_pages()", - "cmt_id": "ea44bf73d956729f3122bbed0661db7b18864277" + "CVE-2019-19927": { + "cmt_msg": "drm/ttm: fix incrementing the page pointer for huge pages" }, - "CVE-2016-2185": { - "cmt_msg": "Input: ati_remote2 - fix crashes on detecting device with invalid descriptor", - "cmt_id": "4b586dc3d736a43659acb575c90d33370ba2fb0d" + "CVE-2023-52640": { + "cmt_msg": "fs/ntfs3: Fix oob in ntfs_listxattr" }, - "CVE-2016-2184": { - "cmt_msg": "ALSA: usb-audio: Fix NULL dereference in create_fixed_stream_quirk()", - "cmt_id": "6ed72ce6ab8b38803b12df8c62a3a52becf19017" + "CVE-2023-52498": { + "cmt_msg": "PM: sleep: Fix possible deadlocks in core system-wide PM code" }, - "CVE-2016-6327": { - "cmt_msg": "IB/srpt: Simplify srpt_handle_tsk_mgmt()", - "cmt_id": "179e72b561d3d331c850e1a5779688d7a7de5246" + "CVE-2022-2318": { + "cmt_msg": "net: rose: fix UAF bugs caused by timer handler" }, - "CVE-2016-2186": { - "cmt_msg": "Input: powermate - fix oops with malicious USB descriptors", - "cmt_id": "76b69dfeb5f1bf19a6bd65991506bbb00647716b" + "CVE-2023-3611": { + "cmt_msg": "net/sched: sch_qfq: account for stab overhead in qfq_enqueue" }, - "CVE-2015-8812": { - "cmt_msg": "iw_cxgb3: Fix incorrectly returning error on success", - "cmt_id": "dd25a5d97400cb10a85a09eac07d541975e39522" + "CVE-2020-26560": { + "cmt_msg": "" }, - "CVE-2015-8660": { - "cmt_msg": "ovl: fix permission checking for setattr", - "cmt_id": "2cadb57dff500076a87b934cac64bb5a2293b644" + "CVE-2023-4134": { + "cmt_msg": "Input: cyttsp4_core - change del_timer_sync() to timer_shutdown_sync()" }, - "CVE-2016-0821": { - "cmt_msg": "include/linux/poison.h: fix LIST_POISON{1,2} offset", - "cmt_id": "46460a03f44f1915ded434057fa46332438b3a6e" + "CVE-2017-9077": { + "cmt_msg": "ipv6/dccp: do not inherit ipv6_mc_list from parent" }, - "CVE-2016-3138": { - "cmt_msg": "USB: cdc-acm: more sanity checking", - "cmt_id": "a635bc779e7b7748c9b0b773eaf08a7f2184ec50" - } - }, - "4.1.23": { - "CVE-2016-3137": { - "cmt_msg": "USB: cypress_m8: add endpoint sanity check", - "cmt_id": "45f4b9ca0cf8e53df5adc20d11ffb4b2076dd2c5" + "CVE-2017-9076": { + "cmt_msg": "ipv6/dccp: do not inherit ipv6_mc_list from parent" }, - "CVE-2016-3136": { - "cmt_msg": "USB: mct_u232: add sanity checking in probe", - "cmt_id": "4b8d00f5056e278b053ca183e15f4a8e48d79336" + "CVE-2017-9075": { + "cmt_msg": "sctp: do not inherit ipv6_{mc|ac|fl}_list from parent" }, - "CVE-2016-3140": { - "cmt_msg": "USB: digi_acceleport: do sanity checking for the number of ports", - "cmt_id": "15f572246983bd2f733b82b35e013d7eaa801e94" + "CVE-2017-9074": { + "cmt_msg": "ipv6: Prevent overrun when parsing v6 header options" }, - "CVE-2016-7914": { - "cmt_msg": "assoc_array: don't call compare_object() on a node", - "cmt_id": "32d1b6727390b22cc58d28eb9d7b2d7055e588b7" - } - }, - "4.1.24": { - "CVE-2016-2187": { - "cmt_msg": "Input: gtco - fix crash on detecting device without endpoints", - "cmt_id": "464508beeb30376f277fbfbfd9137cf19cbfa785" + "CVE-2022-20572": { + "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag" }, "CVE-2016-3961": { - "cmt_msg": "x86/mm/xen: Suppress hugetlbfs in PV guests", - "cmt_id": "936d0871135e41fba0dc15095319ca106f55a584" - }, - "CVE-2016-7912": { - "cmt_msg": "usb: gadget: f_fs: Fix use-after-free", - "cmt_id": "0763ce11708553fc7b2124f184ce2e4bb0cb186d" - } - }, - "4.1.25": { - "CVE-2016-4565": { - "cmt_msg": "IB/security: Restrict use of the write() interface", - "cmt_id": "5d43a619be6f1960702daafafe87ceab415be6bc" + "cmt_msg": "x86/mm/xen: Suppress hugetlbfs in PV guests" }, - "CVE-2016-4581": { - "cmt_msg": "propogate_mnt: Handle the first propogated copy being a slave", - "cmt_id": "60f7e3a2dc30ae39574a7c7239a9a47c08b774bd" + "CVE-2022-42703": { + "cmt_msg": "mm/rmap: Fix anon_vma->degree ambiguity leading to double-reuse" }, - "CVE-2016-4913": { - "cmt_msg": "get_rock_ridge_filename(): handle malformed NM entries", - "cmt_id": "f1ee8222aed8d64bbf922ba9bf00dc7ac98ab63f" - } - }, - "4.1.26": { - "CVE-2016-9754": { - "cmt_msg": "ring-buffer: Prevent overflow of size in ring_buffer_resize()", - "cmt_id": "ab2cfdb8ef5da3d4cd237a3f15cc2d7ad4623260" - } - }, - "4.1.27": { - "CVE-2016-1583": { - "cmt_msg": "proc: prevent stacking filesystems on top", - "cmt_id": "c96e6bf5705254a4c93ca25d6d3c68a04fc7ab5b" - } - }, - "4.1.28": { - "CVE-2016-4951": { - "cmt_msg": "tipc: check nl sock before parsing nested attributes", - "cmt_id": "49956430d3d55b47e4a2d2f5f777d641cae137d6" + "CVE-2021-4083": { + "cmt_msg": "fget: check that the fd still exists after getting a ref to it" }, - "CVE-2016-3156": { - "cmt_msg": "ipv4: Don't do expensive useless work during inetdev destroy.", - "cmt_id": "86de8271be91cce66aace5a3ae8afd3f28094957" + "CVE-2023-33288": { + "cmt_msg": "power: supply: bq24190: Fix use after free bug in bq24190_remove due to race condition" }, - "CVE-2016-4580": { - "cmt_msg": "net: fix a kernel infoleak in x25 module", - "cmt_id": "b2b95b3fbd93c910210922809f6c4d24be172b1c" + "CVE-2017-1000251": { + "cmt_msg": "Bluetooth: Properly check L2CAP config option output buffer length" }, - "CVE-2016-4470": { - "cmt_msg": "KEYS: potential uninitialized variable", - "cmt_id": "c262505cdb45765ddea20a1f85f0023990276772" + "CVE-2022-29900": { + "cmt_msg": "x86/kvm/vmx: Make noinstr clean" }, - "CVE-2016-3955": { - "cmt_msg": "USB: usbip: fix potential out-of-bounds write", - "cmt_id": "25c871c07f37b8cbaebc97403233185479af095d" + "CVE-2022-29901": { + "cmt_msg": "x86/kvm/vmx: Make noinstr clean" }, - "CVE-2016-2117": { - "cmt_msg": "atl2: Disable unimplemented scatter/gather feature", - "cmt_id": "a2e388f2537a23348810b20ae82468f13d3fb123" + "CVE-2023-52485": { + "cmt_msg": "drm/amd/display: Wake DMCUB before sending a command" }, - "CVE-2016-7117": { - "cmt_msg": "net: Fix use after free in the recvmmsg exit path", - "cmt_id": "8ca7bf099ae0e6ff096b3910895b5285a112aeb5" + "CVE-2023-3106": { + "cmt_msg": "xfrm: fix crash in XFRM_MSG_GETSA netlink handler" }, - "CVE-2016-4485": { - "cmt_msg": "net: fix infoleak in llc", - "cmt_id": "5923f46563d1ce74c1f1178cba5a67735bb83e6d" + "CVE-2018-20511": { + "cmt_msg": "net/appletalk: fix minor pointer leak to userspace in SIOCFINDIPDDPRT" }, - "CVE-2016-4997": { - "cmt_msg": "netfilter: x_tables: check for bogus target offset", - "cmt_id": "451e4403bc4abc51539376d4314baa739ab9e996" + "CVE-2018-20510": { + "cmt_msg": "binder: replace \"%p\" with \"%pK\"" }, - "CVE-2016-4805": { - "cmt_msg": "ppp: take reference on channels netns", - "cmt_id": "fc74ace8df9bffbab3b886686db02f0809bdc5e9" + "CVE-2016-5728": { + "cmt_msg": "misc: mic: Fix for double fetch security bug in VOP driver" }, - "CVE-2016-4486": { - "cmt_msg": "net: fix infoleak in rtnetlink", - "cmt_id": "9a9390bcf56680c487a8e4c89c813a48bfedc4b6" + "CVE-2022-3567": { + "cmt_msg": "ipv6: Fix data races around sk->sk_prot." }, - "CVE-2016-4794": { - "cmt_msg": "percpu: fix synchronization between chunk->map_extend_work and chunk destruction", - "cmt_id": "d273823dc63bb51e3adc11e0f7c324d86e2d2009" + "CVE-2022-3566": { + "cmt_msg": "tcp: Fix data races around icsk->icsk_af_ops." }, - "CVE-2016-3134": { - "cmt_msg": "netfilter: x_tables: fix unconditional helper", - "cmt_id": "850c377e0e2d76723884d610ff40827d26aa21eb" + "CVE-2022-3565": { + "cmt_msg": "mISDN: fix use-after-free bugs in l1oip timer handlers" }, - "CVE-2016-5829": { - "cmt_msg": "HID: hiddev: validate num_values for HIDIOCGUSAGES, HIDIOCSUSAGES commands", - "cmt_id": "f67b6920a0cf03d363c5f3bfb14f5d258168dc8c" + "CVE-2022-3564": { + "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free caused by l2cap_reassemble_sdu" }, - "CVE-2016-2847": { - "cmt_msg": "pipe: limit the per-user amount of pages allocated in pipes", - "cmt_id": "2612a949cf5c2a868adee1ca6bcbf01cd4e2f01e" + "CVE-2020-36385": { + "cmt_msg": "RDMA/ucma: Rework ucma_migrate_id() to avoid races with destroy" }, - "CVE-2016-4998": { - "cmt_msg": "netfilter: x_tables: check for bogus target offset", - "cmt_id": "451e4403bc4abc51539376d4314baa739ab9e996" + "CVE-2018-7480": { + "cmt_msg": "blkcg: fix double free of new_blkg in blkcg_init_queue" }, - "CVE-2016-9806": { - "cmt_msg": "netlink: Fix dump skb leak/double free", - "cmt_id": "e39cd93be0009ae4548a737756a947d2030956ab" + "CVE-2023-0030": { + "cmt_msg": "drm/nouveau/mmu: add more general vmm free/node handling functions" }, - "CVE-2016-5828": { - "cmt_msg": "powerpc/tm: Always reclaim in start_thread() for exec() class syscalls", - "cmt_id": "848be4770beb10fcc6f971c58e80aa2c2b6dad66" + "CVE-2019-11599": { + "cmt_msg": "coredump: fix race condition between mmget_not_zero()/get_task_mm() and core dumping" }, - "CVE-2016-7916": { - "cmt_msg": "proc: prevent accessing /proc//environ until it's ready", - "cmt_id": "93c4863f4435023fcfdae542039860349189b334" - } - }, - "4.1.29": { - "CVE-2016-7911": { - "cmt_msg": "block: fix use-after-free in sys_ioprio_get()", - "cmt_id": "23c63b8c08fe3f0b21594ee1ac4de0fa52225f79" - } - }, - "4.1.30": { - "CVE-2016-5400": { - "cmt_msg": "media: fix airspy usb probe error path", - "cmt_id": "ce05d315cec02835c77fa3f4b5119960e1654913" - } - }, - "4.1.31": { - "CVE-2016-4569": { - "cmt_msg": "ALSA: timer: Fix leak in SNDRV_TIMER_IOCTL_PARAMS", - "cmt_id": "1b7d7bce7467cf10f21007a5c952688877ead95e" + "CVE-2019-2101": { + "cmt_msg": "media: uvcvideo: Fix 'type' check leading to overflow" }, - "CVE-2016-4578": { - "cmt_msg": "ALSA: timer: Fix leak in events via snd_timer_user_ccallback", - "cmt_id": "1fbc4fd13bd04fd7c7fd033fdfde97e96d2865e5" + "CVE-2019-3459": { + "cmt_msg": "Bluetooth: Verify that l2cap_get_conf_opt provides large enough buffer" }, - "CVE-2016-5412": { - "cmt_msg": "KVM: PPC: Book3S HV: Pull out TM state save/restore into separate procedures", - "cmt_id": "ae40dadbb81f553a053dcef39e5b0322f586c497" + "CVE-2020-0444": { + "cmt_msg": "audit: fix error handling in audit_data_to_entry()" }, - "CVE-2016-1237": { - "cmt_msg": "posix_acl: Add set_posix_acl", - "cmt_id": "173f43c05f782df4fe42cc1152f9306ef76dc6eb" + "CVE-2017-16526": { + "cmt_msg": "uwb: properly check kthread_run return value" }, - "CVE-2016-6197": { - "cmt_msg": "ovl: verify upper dentry before unlink and rename", - "cmt_id": "6412c3ae6b415ca83264a2c11e24bfb63cd74629" + "CVE-2017-16527": { + "cmt_msg": "ALSA: usb-audio: Kill stray URB at exiting" }, - "CVE-2017-7495": { - "cmt_msg": "ext4: fix data exposure after a crash", - "cmt_id": "906d6f4d9cdc8509c505f29f6146ec627fef2f06" + "CVE-2017-16525": { + "cmt_msg": "USB: serial: console: fix use-after-free after failed setup" }, - "CVE-2015-8787": { - "cmt_msg": "netfilter: nf_nat_redirect: add missing NULL pointer check", - "cmt_id": "6a468737c8c00bd6cdb208ca0b7f841e8970d466" + "CVE-2022-1836": { + "cmt_msg": "floppy: disable FDRAWCMD by default" }, - "CVE-2016-7910": { - "cmt_msg": "block: fix use-after-free in seq file", - "cmt_id": "d9ee963b61b93366103b88f10495b4680b256273" + "CVE-2017-16528": { + "cmt_msg": "ALSA: seq: Cancel pending autoload work at unbinding device" }, - "CVE-2016-6136": { - "cmt_msg": "audit: fix a double fetch in audit_log_single_execve_arg()", - "cmt_id": "634a3fc5f16470e9b78ccd7ce643305122d5ebb2" - } - }, - "4.1.32": { - "CVE-2016-6480": { - "cmt_msg": "aacraid: Check size values after double-fetch from user", - "cmt_id": "e989e0c9bba5c1f8987629e2880a512d7b15e852" + "CVE-2017-16529": { + "cmt_msg": "ALSA: usb-audio: Check out-of-bounds access by corrupted buffer descriptor" }, - "CVE-2016-5696": { - "cmt_msg": "tcp: make challenge acks less predictable", - "cmt_id": "2b211174edd454376ab9bc85f7bae8e01016d87c" - } - }, - "4.1.33": { - "CVE-2015-8966": { - "cmt_msg": "[PATCH] arm: fix handling of F_OFD_... in oabi_fcntl64()", - "cmt_id": "469a242127b181656cb0a07de4584215bd4494fb" - } - }, - "4.1.34": { - "CVE-2016-9178": { - "cmt_msg": "fix minor infoleak in get_user_ex()", - "cmt_id": "319fe11519401e8a5db191a0a93aa2c1d7bb59f4" - } - }, - "4.1.35": { - "CVE-2016-5195": { - "cmt_msg": "mm: remove gup_flags FOLL_WRITE games from __get_user_pages()", - "cmt_id": "c865f98df72112a3997b219bf711bc46c1e90706" - } - }, - "4.1.36": { - "CVE-2016-7042": { - "cmt_msg": "KEYS: Fix short sprintf buffer in /proc/keys show function", - "cmt_id": "3dc8f1f0decb5f022b3be2cc98c7163a376556c9" + "CVE-2019-2215": { + "cmt_msg": "ANDROID: binder: remove waitqueue when thread exits." }, - "CVE-2016-8633": { - "cmt_msg": "firewire: net: guard against rx buffer overflows", - "cmt_id": "c604dec3d5a695efed5492fc463ef70ef8010bbe" + "CVE-2019-2213": { + "cmt_msg": "binder: fix possible UAF when freeing buffer" }, - "CVE-2016-9644": { - "cmt_msg": "x86/mm: Expand the exception table logic to allow new handling options", - "cmt_id": "7ea3d2e9c6aa73bc07d537ab4574d18bcfe2f680" - } - }, - "4.1.37": { - "CVE-2016-6828": { - "cmt_msg": "tcp: fix use after free in tcp_xmit_retransmit_queue()", - "cmt_id": "9a66bc6ee0f9908ba98a7d19b94d49ec231ab0e1" + "CVE-2018-1087": { + "cmt_msg": "kvm/x86: fix icebp instruction handling" }, - "CVE-2016-6213": { - "cmt_msg": "mnt: Add a per mount namespace limit on the number of mounts", - "cmt_id": "1171afc4a34e2926e6e8e27c896cf328c8825ac3" + "CVE-2017-8065": { + "cmt_msg": "crypto: ccm - move cbcmac input off the stack" }, - "CVE-2016-8632": { - "cmt_msg": "tipc: check minimum bearer MTU", - "cmt_id": "016d02981cceb7b0f3436278b71fe3ea87542e20" + "CVE-2019-14615": { + "cmt_msg": "drm/i915/gen9: Clear residual context state on context switch" }, - "CVE-2015-1350": { - "cmt_msg": "fs: Avoid premature clearing of capabilities", - "cmt_id": "de42b9559d0c540152260d484dbc70b3e81f8738" + "CVE-2016-3135": { + "cmt_msg": "netfilter: x_tables: check for size overflow" }, - "CVE-2016-7097": { - "cmt_msg": "posix_acl: Clear SGID bit when setting file permissions", - "cmt_id": "62fa696b7b435e93ed114dd6a23aa0881d7f81b9" + "CVE-2019-19049": { + "cmt_msg": "of: unittest: fix memory leak in unittest_data_add" }, - "CVE-2016-7425": { - "cmt_msg": "scsi: arcmsr: Buffer overflow in arcmsr_iop_message_xfer()", - "cmt_id": "8165fc3eb28cbd2e4cca07308f3a205ab347a9d1" + "CVE-2018-13053": { + "cmt_msg": "alarmtimer: Prevent overflow for relative nanosleep" }, - "CVE-2016-7039": { - "cmt_msg": "net: add recursion limit to GRO", - "cmt_id": "fabaaaa96d54077b4a9f2c811e55dc09ff2874db" + "CVE-2023-23559": { + "cmt_msg": "wifi: rndis_wlan: Prevent buffer overflow in rndis_query_oid" }, - "CVE-2016-8655": { - "cmt_msg": "packet: fix race condition in packet_set_ring", - "cmt_id": "e29fdf045048addaea61c837b60e3c4d2ec43614" + "CVE-2020-10720": { + "cmt_msg": "net-gro: fix use-after-free read in napi_gro_frags()" }, - "CVE-2015-8956": { - "cmt_msg": "Bluetooth: Fix potential NULL dereference in RFCOMM bind callback", - "cmt_id": "7abf32087c1dabacf707506585afc7b69aad21b3" + "CVE-2022-20369": { + "cmt_msg": "media: v4l2-mem2mem: Apply DST_QUEUE_OFF_BASE on MMAP buffers across ioctls" }, - "CVE-2016-8399": { - "cmt_msg": "net: ping: check minimum size on ICMP header length", - "cmt_id": "efcf38bd40200212ef3de3d38e11c42958f8afaa" - } - }, - "4.1.38": { - "CVE-2016-8666": { - "cmt_msg": "tunnels: Don't apply GRO to multiple layers of encapsulation.", - "cmt_id": "066b300e5be43cb61697539e2a3a9aac5afb422f" + "CVE-2016-2184": { + "cmt_msg": "ALSA: usb-audio: Fix NULL dereference in create_fixed_stream_quirk()" }, - "CVE-2016-9588": { - "cmt_msg": "kvm: nVMX: Allow L1 to intercept software exceptions (#BP and #OF)", - "cmt_id": "dd5035276792edbd3dac21620d9b91d3a8e3785a" + "CVE-2016-2187": { + "cmt_msg": "Input: gtco - fix crash on detecting device without endpoints" }, - "CVE-2016-10088": { - "cmt_msg": "sg_write()/bsg_write() is not fit to be called under KERNEL_DS", - "cmt_id": "3e3267311e3b6557206f293eeb9205b41e090625" - } - }, - "4.1.39": { - "CVE-2017-2618": { - "cmt_msg": "selinux: fix off-by-one in setprocattr", - "cmt_id": "96e74ad7ac38ca330d16222e6da38c9a196deb40" + "CVE-2016-2186": { + "cmt_msg": "Input: powermate - fix oops with malicious USB descriptors" }, - "CVE-2017-18255": { - "cmt_msg": "perf/core: Fix the perf_cpu_time_max_percent check", - "cmt_id": "bd21c23d668307419b029bbe27ca67508161e59d" + "CVE-2022-3424": { + "cmt_msg": "misc: sgi-gru: fix use-after-free error in gru_set_context_option, gru_fault and gru_handle_user_call_os" }, - "CVE-2017-7273": { - "cmt_msg": "HID: hid-cypress: validate length of report", - "cmt_id": "e0fb4ae61143bb6b218aa8bab1730bb156c4d457" + "CVE-2016-2188": { + "cmt_msg": "USB: iowarrior: fix NULL-deref at probe" }, - "CVE-2016-9191": { - "cmt_msg": "sysctl: Drop reference added by grab_header in proc_sys_readdir", - "cmt_id": "13d7adf646017517382ec541652eb7d3bc77742c" + "CVE-2017-1000405": { + "cmt_msg": "mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d()" }, - "CVE-2017-5549": { - "cmt_msg": "USB: serial: kl5kusb105: fix line-state error handling", - "cmt_id": "301242e3780413bffc7bbbd70cafb4ecee135080" + "CVE-2017-1000407": { + "cmt_msg": "KVM: VMX: remove I/O port 0x80 bypass on Intel hosts" }, - "CVE-2016-8405": { - "cmt_msg": "fbdev: color map copying bounds checking", - "cmt_id": "a94f76f379dcc375f00d32194954f6c4dd1644c9" - } - }, - "4.1.40": { - "CVE-2017-7294": { - "cmt_msg": "drm/vmwgfx: fix integer overflow in vmw_surface_define_ioctl()", - "cmt_id": "d91a91d8f6ba1c98e0822e40b7e4a266d9567813" + "CVE-2022-24448": { + "cmt_msg": "NFSv4: Handle case where the lookup of a directory fails" }, - "CVE-2016-10229": { - "cmt_msg": "udp: properly support MSG_PEEK with truncated buffers", - "cmt_id": "5c564705d3f0436ddc70d833b975b870ba560528" + "CVE-2020-0427": { + "cmt_msg": "pinctrl: devicetree: Avoid taking direct reference to device name string" }, - "CVE-2017-7895": { - "cmt_msg": "nfsd: stricter decoding of write-like NFSv2/v3 ops", - "cmt_id": "5afff19d82af4e4ed66ce0320cd2f17053b78b25" + "CVE-2020-26088": { + "cmt_msg": "net/nfc/rawsock.c: add CAP_NET_RAW check." }, - "CVE-2017-7261": { - "cmt_msg": "drm/vmwgfx: NULL pointer dereference in vmw_surface_define_ioctl()", - "cmt_id": "13b52a46a6778fe23e64a20499230738ed3d445b" + "CVE-2015-7513": { + "cmt_msg": "KVM: x86: Reload pit counters for all channels when restoring state" }, - "CVE-2017-7187": { - "cmt_msg": "scsi: sg: check length passed to SG_NEXT_CMD_LEN", - "cmt_id": "861b5c18bb146f3845dc52f64e7bc997d6cf8db3" + "CVE-2015-7515": { + "cmt_msg": "Input: aiptek - fix crash on detecting device without endpoints" }, - "CVE-2017-5669": { - "cmt_msg": "ipc/shm: Fix shmat mmap nil-page protection", - "cmt_id": "c9cf983337a046e93f33c66c2707a704ec6440ac" + "CVE-2008-2544": { + "cmt_msg": "" }, - "CVE-2017-7618": { - "cmt_msg": "crypto: ahash - Fix EINPROGRESS notification callback", - "cmt_id": "ce0e21e44f9766aeef6a8c18a750ef9d94c1ca8c" + "CVE-2023-2248": { + "cmt_msg": "net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg" }, - "CVE-2017-7645": { - "cmt_msg": "nfsd: check for oversized NFSv2/v3 arguments", - "cmt_id": "c9bb9f02b0484703ca5d0da15a11f891954e1c31" + "CVE-2023-30772": { + "cmt_msg": "power: supply: da9150: Fix use after free bug in da9150_charger_remove due to race condition" }, - "CVE-2017-8924": { - "cmt_msg": "USB: serial: io_ti: fix information leak in completion handler", - "cmt_id": "e0f57e1a406c091646d7f474572975aab4c6d1de" + "CVE-2017-18017": { + "cmt_msg": "netfilter: xt_TCPMSS: add more sanity tests on tcph->doff" }, - "CVE-2017-8925": { - "cmt_msg": "USB: serial: omninet: fix reference leaks at open", - "cmt_id": "5dfb04937689e5f797506ee73f028f919cc9278d" + "CVE-2021-3679": { + "cmt_msg": "tracing: Fix bug in rb_per_cpu_empty() that might cause deadloop." }, - "CVE-2017-7472": { - "cmt_msg": "KEYS: fix keyctl_set_reqkey_keyring() to not leak thread keyrings", - "cmt_id": "a0f82864854a4511cd19f06436f0cf140fae2427" + "CVE-2022-2586": { + "cmt_msg": "netfilter: nf_tables: do not allow SET_ID to refer to another table" }, - "CVE-2016-2188": { - "cmt_msg": "USB: iowarrior: fix NULL-deref at probe", - "cmt_id": "c4b51661231242b5b24431a31299c433934cad2e" + "CVE-2016-7042": { + "cmt_msg": "KEYS: Fix short sprintf buffer in /proc/keys show function" }, - "CVE-2016-9604": { - "cmt_msg": "KEYS: Disallow keyrings beginning with '.' to be joined as session keyrings", - "cmt_id": "4ef48e49b1c550a511acb78d7b9e0b52bb43aba6" - } - }, - "4.1.41": { - "CVE-2017-18360": { - "cmt_msg": "USB: serial: io_ti: fix div-by-zero in set_termios", - "cmt_id": "2cd394cd10465fc0878958ba99e6080ac8ead559" + "CVE-2021-39714": { + "cmt_msg": "staging: android: ion: Drop ion_map_kernel interface" }, - "CVE-2016-7913": { - "cmt_msg": "xc2028: avoid use after free", - "cmt_id": "e21b00fe6cc7de57072cb89c87e43f33af866476" + "CVE-2023-51782": { + "cmt_msg": "net/rose: Fix Use-After-Free in rose_ioctl" }, - "CVE-2017-6074": { - "cmt_msg": "dccp: fix freeing skb too early for IPV6_RECVPKTINFO", - "cmt_id": "98442999b9671784e659b205be8b5b6be8e81629" + "CVE-2023-51780": { + "cmt_msg": "atm: Fix Use-After-Free in do_vcc_ioctl" }, - "CVE-2017-0750": { - "cmt_msg": "f2fs: do more integrity verification for superblock", - "cmt_id": "c5ef0e9f70d182cda057417b98cb8f88cf1dea42" + "CVE-2023-51781": { + "cmt_msg": "appletalk: Fix Use-After-Free in atalk_ioctl" }, - "CVE-2017-7616": { - "cmt_msg": "mm/mempolicy.c: fix error handling in set_mempolicy and mbind.", - "cmt_id": "aa612d59c08f52a1ee508a12d95deb012e2163d2" + "CVE-2022-2588": { + "cmt_msg": "net_sched: cls_route: remove from list when handle is 0" }, - "CVE-2017-8064": { - "cmt_msg": "dvb-usb-v2: avoid use-after-free", - "cmt_id": "4473dc376c48ea0be28a087922b97c90333f22ce" + "CVE-2019-18885": { + "cmt_msg": "btrfs: merge btrfs_find_device and find_device" }, - "CVE-2017-2671": { - "cmt_msg": "ping: implement proper locking", - "cmt_id": "5f1cef9e823aa35c881745446ea3c865da338e4e" + "CVE-2017-7889": { + "cmt_msg": "mm: Tighten x86 /dev/mem with zeroing reads" }, - "CVE-2016-9120": { - "cmt_msg": "staging/android/ion : fix a race condition in the ion driver", - "cmt_id": "9c90c093b98f210d9611fac2c1f9e4f28254a55c" + "CVE-2017-14489": { + "cmt_msg": "scsi: scsi_transport_iscsi: fix the issue that iscsi_if_rx doesn't parse nlmsg properly" }, - "CVE-2017-7308": { - "cmt_msg": "net/packet: fix overflow in check for priv area size", - "cmt_id": "dd07486ceba48b5d2157b212bb9bd5ce9a46b593" + "CVE-2018-9422": { + "cmt_msg": "futex: Remove requirement for lock_page() in get_futex_key()" }, - "CVE-2016-9084": { - "cmt_msg": "vfio/pci: Fix integer overflows, bitmask check", - "cmt_id": "073e9973d48b1a7fa6d610fde377f3d7f4171ad6" + "CVE-2024-26733": { + "cmt_msg": "arp: Prevent overflow in arp_req_get()." }, - "CVE-2017-7889": { - "cmt_msg": "mm: Tighten x86 /dev/mem with zeroing reads", - "cmt_id": "eb618d2eb22bb0e1843fb17431fdd18253918cb8" + "CVE-2024-26738": { + "cmt_msg": "powerpc/pseries/iommu: DLPAR add doesn't completely initialize pci_controller" }, - "CVE-2016-9083": { - "cmt_msg": "vfio/pci: Fix integer overflows, bitmask check", - "cmt_id": "073e9973d48b1a7fa6d610fde377f3d7f4171ad6" + "CVE-2024-26739": { + "cmt_msg": "net/sched: act_mirred: don't override retval if we already lost the skb" }, - "CVE-2017-7487": { - "cmt_msg": "ipx: call ipxitf_put() in ioctl error path", - "cmt_id": "e8701e0f6768291622b01a3083c3a7e6761f6c51" + "CVE-2022-38096": { + "cmt_msg": "" }, - "CVE-2017-10662": { - "cmt_msg": "f2fs: sanity check segment count", - "cmt_id": "46527f8d11fa64d3b493d03fc5c3b5ecc7d4d37a" + "CVE-2017-5715": { + "cmt_msg": "x86/cpufeatures: Add X86_BUG_SPECTRE_V[12]" }, - "CVE-2017-10661": { - "cmt_msg": "timerfd: Protect the might cancel mechanism proper", - "cmt_id": "db14464180fa453a8ba82bce8107884571d7db6d" + "CVE-2018-3620": { + "cmt_msg": "x86/microcode: Allow late microcode loading with SMT disabled" }, - "CVE-2017-2596": { - "cmt_msg": "kvm: fix page struct leak in handle_vmon", - "cmt_id": "68e9c254f662e4c2763e672b026a513d91f3a1c4" + "CVE-2016-4805": { + "cmt_msg": "ppp: take reference on channels netns" }, - "CVE-2017-18221": { - "cmt_msg": "mlock: fix mlock count can not decrease in race condition", - "cmt_id": "00fc586ea7410ee8664bfd4f4ea246c60ea0482c" + "CVE-2020-16166": { + "cmt_msg": "random32: update the net random state on interrupt and activity" }, - "CVE-2017-1000363": { - "cmt_msg": "char: lp: fix possible integer overflow in lp_setup()", - "cmt_id": "d0e929a4e63f5b4a95a7daaf68d3738d1ec06d8c" - } - }, - "4.1.42": { - "CVE-2017-9075": { - "cmt_msg": "sctp: do not inherit ipv6_{mc|ac|fl}_list from parent", - "cmt_id": "e7b4f3d39f46530f340af6eabbc60fbad9f94f05" + "CVE-2021-33631": { + "cmt_msg": "ext4: fix kernel BUG in 'ext4_write_inline_data_end()'" }, - "CVE-2017-9074": { - "cmt_msg": "ipv6: Prevent overrun when parsing v6 header options", - "cmt_id": "e7f05ff30b0cd72b00c8ca7be3cd48fedf96550f" + "CVE-2019-15916": { + "cmt_msg": "net-sysfs: Fix mem leak in netdev_register_kobject" }, - "CVE-2017-1000380": { - "cmt_msg": "ALSA: timer: Fix race between read and ioctl", - "cmt_id": "5d28ba6eecdeb3bbd0f78948ca3470918aad13fa" + "CVE-2019-15917": { + "cmt_msg": "Bluetooth: hci_ldisc: Postpone HCI_UART_PROTO_READY bit set in hci_uart_set_proto()" }, - "CVE-2017-1000379": { - "cmt_msg": "mm: larger stack guard gap, between vmas", - "cmt_id": "8b18c6b2a0dde5186ed83a60c4915c0909cbeb0a" + "CVE-2017-18344": { + "cmt_msg": "posix-timer: Properly check sigevent->sigev_notify" }, - "CVE-2017-1000364": { - "cmt_msg": "mm: larger stack guard gap, between vmas", - "cmt_id": "8b18c6b2a0dde5186ed83a60c4915c0909cbeb0a" + "CVE-2024-26648": { + "cmt_msg": "drm/amd/display: Fix variable deferencing before NULL check in edp_setup_replay()" }, - "CVE-2017-8890": { - "cmt_msg": "dccp/tcp: do not inherit mc_list from parent", - "cmt_id": "4e0ecb773276404a4a0788e1398bee22719336b4" + "CVE-2024-26646": { + "cmt_msg": "thermal: intel: hfi: Add syscore callbacks for system-wide PM" }, - "CVE-2017-9242": { - "cmt_msg": "ipv6: fix out of bound writes in __ip6_append_data()", - "cmt_id": "d78ddec4e7fb482e27514466ae8a738ef61a9f53" - } - }, - "4.1.43": { - "CVE-2019-9457": { - "cmt_msg": "exec: Limit arg stack to at most 75% of _STK_LIM", - "cmt_id": "d5e990d96459decaa24e5cb7918451f12c8582a9" + "CVE-2018-18690": { + "cmt_msg": "xfs: don't fail when converting shortform attr to long form during ATTR_REPLACE" }, - "CVE-2018-14634": { - "cmt_msg": "exec: Limit arg stack to at most 75% of _STK_LIM", - "cmt_id": "d5e990d96459decaa24e5cb7918451f12c8582a9" + "CVE-2024-26644": { + "cmt_msg": "btrfs: don't abort filesystem when attempting to snapshot deleted subvolume" }, - "CVE-2017-11089": { - "cmt_msg": "cfg80211: Define nla_policy for NL80211_ATTR_LOCAL_MESH_POWER_MODE", - "cmt_id": "e61d75e0d800c7f4469d391e3598b890be11d95c" + "CVE-2024-26642": { + "cmt_msg": "netfilter: nf_tables: disallow anonymous set with timeout flag" }, - "CVE-2017-12146": { - "cmt_msg": "driver core: platform: fix race condition with driver_override", - "cmt_id": "5c387e92ec5c6e2d56b19f9ce4ca1cefef38d601" + "CVE-2017-0627": { + "cmt_msg": "media: uvcvideo: Prevent heap overflow when accessing mapped controls" }, "CVE-2016-7915": { - "cmt_msg": "HID: core: prevent out-of-bound readings", - "cmt_id": "f446a5928bc1ea8b6df8abbddd97674f58fe089c" + "cmt_msg": "HID: core: prevent out-of-bound readings" }, - "CVE-2017-7482": { - "cmt_msg": "rxrpc: Fix several cases where a padded len isn't checked in ticket decode", - "cmt_id": "84589c8b4819932f41313b7ed4c58881ab466a20" + "CVE-2016-7914": { + "cmt_msg": "assoc_array: don't call compare_object() on a node" }, - "CVE-2017-18017": { - "cmt_msg": "netfilter: xt_TCPMSS: add more sanity tests on tcph->doff", - "cmt_id": "a7776b8815a90da464f045f7c24d9565ae9f1963" + "CVE-2016-7917": { + "cmt_msg": "netfilter: nfnetlink: correctly validate length of batch messages" }, - "CVE-2017-1000365": { - "cmt_msg": "fs/exec.c: account for argv/envp pointers", - "cmt_id": "a9cea2f13c889658769ba50d46cb0e88900e6795" + "CVE-2016-7916": { + "cmt_msg": "proc: prevent accessing /proc//environ until it's ready" }, - "CVE-2017-11176": { - "cmt_msg": "mqueue: fix a use-after-free in sys_mq_notify()", - "cmt_id": "89e4078c6ea15ea65e3d5aa3d72e7913b7b500da" + "CVE-2016-7911": { + "cmt_msg": "block: fix use-after-free in sys_ioprio_get()" }, - "CVE-2017-7541": { - "cmt_msg": "brcmfmac: fix possible buffer overflow in brcmf_cfg80211_mgmt_tx()", - "cmt_id": "e080a193465629231466067e4b5d945deaac29d5" + "CVE-2016-7910": { + "cmt_msg": "block: fix use-after-free in seq file" }, - "CVE-2017-1000371": { - "cmt_msg": "binfmt_elf: use ELF_ET_DYN_BASE only for PIE", - "cmt_id": "5bb3ce649f8b42185922d90de13874d23f7ff37f" + "CVE-2016-7913": { + "cmt_msg": "[media] xc2028: avoid use after free" }, - "CVE-2017-1000370": { - "cmt_msg": "binfmt_elf: use ELF_ET_DYN_BASE only for PIE", - "cmt_id": "5bb3ce649f8b42185922d90de13874d23f7ff37f" - } - }, - "4.1.44": { - "CVE-2017-1000111": { - "cmt_msg": "packet: fix tp_reserve race in packet_set_ring", - "cmt_id": "b7761b0cd80d832e40a46ec0078ab02596dbc350" + "CVE-2016-7912": { + "cmt_msg": "usb: gadget: f_fs: Fix use-after-free" }, - "CVE-2017-8831": { - "cmt_msg": "saa7164: fix double fetch PCIe access condition", - "cmt_id": "0b3294aae7bc3940a659928e352ffb0588dfeb54" + "CVE-2018-25020": { + "cmt_msg": "bpf: fix truncated jump targets on heavy expansions" }, - "CVE-2017-11473": { - "cmt_msg": "x86/acpi: Prevent out of bound access caused by broken ACPI tables", - "cmt_id": "424e53f1ee00891001808a1f5dd08a2c7efb9117" + "CVE-2022-26373": { + "cmt_msg": "x86/speculation: Add RSB VM Exit protections" }, - "CVE-2017-18079": { - "cmt_msg": "Input: i8042 - fix crash at boot time", - "cmt_id": "6b4a5a2ee0e1cd861bd22b250197589d4b176bd0" + "CVE-2018-7273": { + "cmt_msg": "printk: hash addresses printed with %p" }, - "CVE-2017-10663": { - "cmt_msg": "f2fs: sanity check checkpoint segno and blkoff", - "cmt_id": "604b43bbfe3bfd023d4cc6a4f9e8760f03346459" + "CVE-2022-0617": { + "cmt_msg": "udf: Fix NULL ptr deref when converting from inline format" }, - "CVE-2017-7542": { - "cmt_msg": "ipv6: avoid overflow of offset in ip6_find_1stfragopt", - "cmt_id": "0fc2ceadde169a55e531811bf4f0047fedd0a835" - } - }, - "4.1.45": { - "CVE-2017-11600": { - "cmt_msg": "xfrm: policy: check policy direction value", - "cmt_id": "ded415d815a17597d6de4555524f89ed7ea08923" + "CVE-2023-4459": { + "cmt_msg": "net: vmxnet3: fix possible NULL pointer dereference in vmxnet3_rq_cleanup()" }, - "CVE-2017-14106": { - "cmt_msg": "tcp: initialize rcv_mss to TCP_MIN_MSS instead of 0", - "cmt_id": "ea08a5642d93fd963d376c10c9fd9664373771b6" + "CVE-2022-20566": { + "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free caused by l2cap_chan_put" }, - "CVE-2017-14340": { - "cmt_msg": "xfs: XFS_IS_REALTIME_INODE() should be false if no rt device present", - "cmt_id": "d8f0ead1e72bcc040a858ddf5d1de0a9d6cce8ca" + "CVE-2022-20565": { + "cmt_msg": "HID: core: Correctly handle ReportSize being zero" }, - "CVE-2017-1000251": { - "cmt_msg": "Bluetooth: Properly check L2CAP config option output buffer length", - "cmt_id": "361e3cc44419cb9387c48ea993d0ba3f381667de" + "CVE-2023-1990": { + "cmt_msg": "nfc: st-nci: Fix use after free bug in ndlc_remove due to race condition" }, - "CVE-2017-0627": { - "cmt_msg": "media: uvcvideo: Prevent heap overflow when accessing mapped controls", - "cmt_id": "1e3bbc18904041cd230725cf711e12a888efa49f" + "CVE-2021-33098": { + "cmt_msg": "ixgbe: fix large MTU request from VF" }, - "CVE-2018-10675": { - "cmt_msg": "mm/mempolicy: fix use after free when calling get_mempolicy", - "cmt_id": "fd30faeaf0f5163356ec053ba9eb1d3b7923062c" + "CVE-2022-48619": { + "cmt_msg": "Input: add bounds checking to input_set_capability()" }, - "CVE-2017-14991": { - "cmt_msg": "scsi: sg: fixup infoleak when using SG_GET_REQUEST_TABLE", - "cmt_id": "68fa36ad00f522ff6bab272247b3bd28c1959f33" + "CVE-2017-10810": { + "cmt_msg": "drm/virtio: don't leak bo on drm_gem_object_init failure" }, - "CVE-2017-14051": { - "cmt_msg": "scsi: qla2xxx: Fix an integer overflow in sysfs code", - "cmt_id": "d1c2fe7dc88d9bc3a477d9dfc2aa623f9776372e" + "CVE-2024-24860": { + "cmt_msg": "Bluetooth: Fix atomicity violation in {min,max}_key_size_set" }, - "CVE-2017-9985": { - "cmt_msg": "ALSA: msnd: Optimize / harden DSP and MIDI loops", - "cmt_id": "77425f99e279723ed8bccd0905ba415ab803ad8d" + "CVE-2018-20509": { + "cmt_msg": "binder: refactor binder ref inc/dec for thread safety" }, - "CVE-2017-9984": { - "cmt_msg": "ALSA: msnd: Optimize / harden DSP and MIDI loops", - "cmt_id": "77425f99e279723ed8bccd0905ba415ab803ad8d" - } - }, - "4.1.46": { - "CVE-2017-0786": { - "cmt_msg": "brcmfmac: add length check in brcmf_cfg80211_escan_handler()", - "cmt_id": "90747f38a8873726d7efd81112967147098a2139" + "CVE-2017-0750": { + "cmt_msg": "f2fs: do more integrity verification for superblock" }, - "CVE-2017-18270": { - "cmt_msg": "KEYS: prevent creating a different user's keyrings", - "cmt_id": "a50a0faa10c6d83ba4a16c4d6245e90000e2f02d" + "CVE-2021-47075": { + "cmt_msg": "nvmet: fix memory leak in nvmet_alloc_ctrl()" }, - "CVE-2017-16529": { - "cmt_msg": "ALSA: usb-audio: Check out-of-bounds access by corrupted buffer descriptor", - "cmt_id": "b01117b7bc02923baebcff895609561c78559c08" + "CVE-2021-47076": { + "cmt_msg": "RDMA/rxe: Return CQE error if invalid lkey was supplied" + }, + "CVE-2016-5195": { + "cmt_msg": "mm: remove gup_flags FOLL_WRITE games from __get_user_pages()" + }, + "CVE-2017-8824": { + "cmt_msg": "dccp: CVE-2017-8824: use-after-free in DCCP code" + }, + "CVE-2018-7492": { + "cmt_msg": "rds: Fix NULL pointer dereference in __rds_rdma_map" + }, + "CVE-2016-6136": { + "cmt_msg": "audit: fix a double fetch in audit_log_single_execve_arg()" + }, + "CVE-2018-5848": { + "cmt_msg": "wil6210: missing length check in wmi_set_ie" + }, + "CVE-2019-10638": { + "cmt_msg": "inet: switch IP ID generator to siphash" + }, + "CVE-2019-10639": { + "cmt_msg": "netns: provide pure entropy for net_hash_mix()" + }, + "CVE-2024-26676": { + "cmt_msg": "af_unix: Call kfree_skb() for dead unix_(sk)->oob_skb in GC." + }, + "CVE-2017-14140": { + "cmt_msg": "Sanitize 'move_pages()' permission checks" + }, + "CVE-2020-26557": { + "cmt_msg": "" }, "CVE-2017-16535": { - "cmt_msg": "USB: core: fix out-of-bounds access bug in usb_get_bos_descriptor()", - "cmt_id": "e4e541386c2e0221a2325fc83b18ddf683db1f29" + "cmt_msg": "USB: core: fix out-of-bounds access bug in usb_get_bos_descriptor()" + }, + "CVE-2017-16537": { + "cmt_msg": "media: imon: Fix null-ptr-deref in imon_probe" + }, + "CVE-2017-16536": { + "cmt_msg": "[media] cx231xx-cards: fix NULL-deref on missing association descriptor" }, "CVE-2017-16531": { - "cmt_msg": "USB: fix out-of-bounds in usb_set_configuration", - "cmt_id": "de5ffcc63dbdaffffd93934003fd527673f4da0a" + "cmt_msg": "USB: fix out-of-bounds in usb_set_configuration" }, - "CVE-2017-16530": { - "cmt_msg": "USB: uas: fix bug in handling of alternate settings", - "cmt_id": "0078c8c1a6819a8badf212df782e090559055241" + "CVE-2017-16530": { + "cmt_msg": "USB: uas: fix bug in handling of alternate settings" }, "CVE-2017-16533": { - "cmt_msg": "HID: usbhid: fix out-of-bounds bug", - "cmt_id": "439f76690d7d5dd212ea7bebc1f2fa077e3d645d" + "cmt_msg": "HID: usbhid: fix out-of-bounds bug" }, - "CVE-2018-9568": { - "cmt_msg": "net: Set sk_prot_creator when cloning sockets to the right proto", - "cmt_id": "0a11ea32304f6ad6daf5589b6626775b7f00015c" + "CVE-2017-16532": { + "cmt_msg": "usb: usbtest: fix NULL pointer dereference" }, - "CVE-2017-15265": { - "cmt_msg": "ALSA: seq: Fix use-after-free at creating a port", - "cmt_id": "507bb1c783c2edc4ea481a6eab7a6d2d88627624" + "CVE-2024-26779": { + "cmt_msg": "wifi: mac80211: fix race condition on enabling fast-xmit" }, - "CVE-2017-14156": { - "cmt_msg": "video: fbdev: aty: do not leak uninitialized padding in clk to userspace", - "cmt_id": "92153256b2429e23a4f736cd1eab8dc18ad9883e" + "CVE-2017-16538": { + "cmt_msg": "media: dvb-usb-v2: lmedm04: Improve logic checking of warm start" }, - "CVE-2017-15299": { - "cmt_msg": "KEYS: don't let add_key() update an uninstantiated key", - "cmt_id": "7aeb11ac706537b29b704c344572c3f9ac908389" + "CVE-2016-9084": { + "cmt_msg": "vfio/pci: Fix integer overflows, bitmask check" }, - "CVE-2017-16525": { - "cmt_msg": "USB: serial: console: fix use-after-free after failed setup", - "cmt_id": "42651349f0207b8ba3b80b5bd868d9872fbcc6c1" + "CVE-2016-9083": { + "cmt_msg": "vfio/pci: Fix integer overflows, bitmask check" }, - "CVE-2017-12193": { - "cmt_msg": "assoc_array: Fix a buggy node-splitting case", - "cmt_id": "34a5c6ecc7ae4470cc6f415cbc3c5b97c15023fe" + "CVE-2018-9517": { + "cmt_msg": "l2tp: pass tunnel pointer to ->session_create()" }, - "CVE-2017-12192": { - "cmt_msg": "KEYS: prevent KEYCTL_READ on negative key", - "cmt_id": "f6df8c11a4c89da683a46505aac8a31fe98f5339" + "CVE-2018-9516": { + "cmt_msg": "HID: debug: check length before copy_to_user()" }, - "CVE-2017-12190": { - "cmt_msg": "fix unbalanced page refcounting in bio_map_user_iov", - "cmt_id": "97c0249ef452b3ac850b812948dd992b37cdbd46" + "CVE-2021-20317": { + "cmt_msg": "lib/timerqueue: Rely on rbtree semantics for next timer" }, - "CVE-2017-16526": { - "cmt_msg": "uwb: properly check kthread_run return value", - "cmt_id": "bd2ec3b5dd378b6d156d6b200faba82f9f087b16" + "CVE-2024-26772": { + "cmt_msg": "ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal()" }, - "CVE-2017-16527": { - "cmt_msg": "ALSA: usb-audio: Kill stray URB at exiting", - "cmt_id": "44084551aa36a8f3899cc7e73c52846560d8de6a" + "CVE-2017-2671": { + "cmt_msg": "ping: implement proper locking" }, - "CVE-2020-14353": { - "cmt_msg": "KEYS: prevent creating a different user's keyrings", - "cmt_id": "a50a0faa10c6d83ba4a16c4d6245e90000e2f02d" + "CVE-2018-1092": { + "cmt_msg": "ext4: fail ext4_iget for root directory if unallocated" }, - "CVE-2017-15649": { - "cmt_msg": "packet: in packet_do_bind, test fanout with bind_lock held", - "cmt_id": "cafd2b53da565ca30c48a146635c95d385d83b81" + "CVE-2018-1093": { + "cmt_msg": "ext4: add validity checks for bitmap block numbers" }, - "CVE-2017-12153": { - "cmt_msg": "nl80211: check for the required netlink attributes presence", - "cmt_id": "621e000d660bfe0311ab38c8d2b1a778dee45ae3" + "CVE-2021-3864": { + "cmt_msg": "" }, - "CVE-2017-12154": { - "cmt_msg": "kvm: nVMX: Don't allow L2 to access the hardware CR8", - "cmt_id": "e480290da7987e37be86140792640f42b84e915b" + "CVE-2019-19054": { + "cmt_msg": "media: rc: prevent memory leak in cx23888_ir_probe" }, - "CVE-2017-14489": { - "cmt_msg": "scsi: scsi_transport_iscsi: fix the issue that iscsi_if_rx doesn't parse nlmsg properly", - "cmt_id": "74fbce9bea7351161fb5864e2fc31c02145fcab7" + "CVE-2019-19057": { + "cmt_msg": "mwifiex: pcie: Fix memory leak in mwifiex_pcie_init_evt_ring" }, - "CVE-2017-16643": { - "cmt_msg": "Input: gtco - fix potential out-of-bound access", - "cmt_id": "500f156985a31f47a2eadb5b709b245af4c3a05b" - } - }, - "4.1.47": { - "CVE-2017-13080": { - "cmt_msg": "mac80211: accept key reinstall without changing anything", - "cmt_id": "003aa22c9619b49efe950aca3aebd1235a04940d" + "CVE-2019-19056": { + "cmt_msg": "mwifiex: pcie: Fix memory leak in mwifiex_pcie_alloc_cmdrsp_buf" }, - "CVE-2017-18204": { - "cmt_msg": "ocfs2: should wait dio before inode lock in ocfs2_setattr()", - "cmt_id": "1a4fecae70240a7f41615a20d8e5982f833b7268" + "CVE-2019-19052": { + "cmt_msg": "can: gs_usb: gs_can_open(): prevent memory leak" }, - "CVE-2017-16532": { - "cmt_msg": "usb: usbtest: fix NULL pointer dereference", - "cmt_id": "b3c0b63e11eda6ef786fc35e0126e6e5ff828913" + "CVE-2019-3846": { + "cmt_msg": "mwifiex: Fix possible buffer overflows at parsing bss descriptor" }, - "CVE-2017-10911": { - "cmt_msg": "xen-blkback: don't leak stack data via response ring", - "cmt_id": "516e503b7e1ea541ea3eac082ad1ee165ca6756a" + "CVE-2016-4486": { + "cmt_msg": "net: fix infoleak in rtnetlink" }, - "CVE-2017-16537": { - "cmt_msg": "media: imon: Fix null-ptr-deref in imon_probe", - "cmt_id": "95dba59e4def2ccef608665ed2439e1f8ff38799" + "CVE-2017-15537": { + "cmt_msg": "x86/fpu: Don't let userspace set bogus xcomp_bv" }, - "CVE-2017-16528": { - "cmt_msg": "ALSA: seq: Cancel pending autoload work at unbinding device", - "cmt_id": "c617803955ec5ec9a0310e76e34e4e03e02ca803" + "CVE-2018-5391": { + "cmt_msg": "ip: discard IPv4 datagrams with overlapping segments." }, - "CVE-2017-16646": { - "cmt_msg": "media: dib0700: fix invalid dvb_detach argument", - "cmt_id": "10e6847a353761dbd0c710feed6c530c3a5f62af" + "CVE-2023-20941": { + "cmt_msg": "" }, - "CVE-2017-16645": { - "cmt_msg": "Input: ims-psu - check if CDC union descriptor is sane", - "cmt_id": "84513107dc8602c675ec871b616128b49c6e259e" + "CVE-2018-20836": { + "cmt_msg": "scsi: libsas: fix a race condition when smp task timeout" }, - "CVE-2018-7191": { - "cmt_msg": "tun: call dev_get_valid_name() before register_netdevice()", - "cmt_id": "9bcd3577312ffa7e52b42e94ef3cf74d06e7b42f" + "CVE-2016-5400": { + "cmt_msg": "media: fix airspy usb probe error path" }, - "CVE-2017-16994": { - "cmt_msg": "mm/pagewalk.c: report holes in hugetlb ranges", - "cmt_id": "610622cac573aef67811fbffc865d9fba1611050" + "CVE-2020-10135": { + "cmt_msg": "Bluetooth: Consolidate encryption handling in hci_encrypt_cfm" }, - "CVE-2017-16650": { - "cmt_msg": "net: qmi_wwan: fix divide by 0 on bad descriptors", - "cmt_id": "8e3bc0d48890704abdac3d5e0eb81ebc599cb921" + "CVE-2021-20261": { + "cmt_msg": "floppy: fix lock_fdc() signal handling" }, - "CVE-2017-7518": { - "cmt_msg": "KVM: x86: fix singlestepping over syscall", - "cmt_id": "c39c42d6c9291e3541cffee226b028961d35a9fb" + "CVE-2021-20265": { + "cmt_msg": "af_unix: fix struct pid memory leak" }, - "CVE-2017-15115": { - "cmt_msg": "sctp: do not peel off an assoc from one netns to another one", - "cmt_id": "e33c3b35af697c34d89086580386c768ca038623" - } - }, - "4.1.48": { - "CVE-2017-16939": { - "cmt_msg": "ipsec: Fix aborted xfrm policy dump crash", - "cmt_id": "5e80f6036c71f6ce1dbba0ad2925c331767f76ac" + "CVE-2023-28328": { + "cmt_msg": "media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer()" }, - "CVE-2017-18208": { - "cmt_msg": "mm/madvise.c: fix madvise() infinite loop under special circumstances", - "cmt_id": "83c85849819bd60f2806b079a01f283f8ae27f37" + "CVE-2017-13693": { + "cmt_msg": "" }, - "CVE-2017-18203": { - "cmt_msg": "dm: fix race between dm_get_from_kobject() and __dm_destroy()", - "cmt_id": "48e57f6ddb74d12b71b6edbf15ba4c94035caa02" + "CVE-2017-13695": { + "cmt_msg": "ACPICA: acpi: acpica: fix acpi operand cache leak in nseval.c" }, - "CVE-2017-16536": { - "cmt_msg": "cx231xx-cards: fix NULL-deref on missing association descriptor", - "cmt_id": "ee16c9ea4ef98684378e020df9a4efa32955d767" + "CVE-2017-13694": { + "cmt_msg": "" }, - "CVE-2017-1000405": { - "cmt_msg": "mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d()", - "cmt_id": "88c251ffb80e140339cbe74f320d6cba38360ab5" - } - }, - "4.1.49": { - "CVE-2017-0861": { - "cmt_msg": "ALSA: pcm: prevent UAF in snd_pcm_info", - "cmt_id": "0bde6f9d1faf3d4aaf8346d8a326cf02e7ea1a3a" + "CVE-2024-26647": { + "cmt_msg": "drm/amd/display: Fix late derefrence 'dsc' check in 'link_set_dsc_pps_packet()'" }, - "CVE-2017-2636": { - "cmt_msg": "tty: n_hdlc: get rid of racy n_hdlc.tbuf", - "cmt_id": "209fd3f3ef14e0b0a1d07d6ff27d75c49e656e84" + "CVE-2021-3640": { + "cmt_msg": "Bluetooth: sco: Fix lock_sock() blockage by memcpy_from_msg()" }, - "CVE-2017-7184": { - "cmt_msg": "xfrm_user: validate XFRM_MSG_NEWAE XFRMA_REPLAY_ESN_VAL replay_window", - "cmt_id": "438db92d7f2792e3bad17be70e6edf0f44a081f0" + "CVE-2020-11608": { + "cmt_msg": "media: ov519: add missing endpoint sanity checks" }, - "CVE-2018-7492": { - "cmt_msg": "rds: Fix NULL pointer dereference in __rds_rdma_map", - "cmt_id": "dcd241dca9507cf4b3980505e2482ed6aba347b5" + "CVE-2020-10732": { + "cmt_msg": "fs/binfmt_elf.c: allocate initialized memory in fill_thread_core_info()" }, - "CVE-2017-1000407": { - "cmt_msg": "KVM: VMX: remove I/O port 0x80 bypass on Intel hosts", - "cmt_id": "6552b7695ca65e6ca412948d4aa0179df69dbc1d" + "CVE-2019-9466": { + "cmt_msg": "brcmfmac: add subtype check for event handling in data path" }, - "CVE-2017-16914": { - "cmt_msg": "usbip: fix stub_send_ret_submit() vulnerability to null transfer_buffer", - "cmt_id": "5319d08ca465eec277d04b5a3cee34f80b601c74" + "CVE-2017-17975": { + "cmt_msg": "media: usbtv: prevent double free in error case" }, - "CVE-2017-17558": { - "cmt_msg": "USB: core: prevent malicious bNumInterfaces overflow", - "cmt_id": "5b2323b62af18be000ef627f302b5bf167402de6" + "CVE-2019-16921": { + "cmt_msg": "RDMA/hns: Fix init resp when alloc ucontext" }, - "CVE-2017-15274": { - "cmt_msg": "KEYS: fix dereferencing NULL payload with nonzero length", - "cmt_id": "c19aa530105b0d780ad72a78a7ef271037bcb774" + "CVE-2021-0512": { + "cmt_msg": "HID: make arrays usage and value to be the same" }, - "CVE-2017-6348": { - "cmt_msg": "irda: Fix lockdep annotations in hashbin_delete().", - "cmt_id": "c9556862a64b5ac85bfee1cfd4313615dc21d6f8" + "CVE-2022-41222": { + "cmt_msg": "mm/mremap: hold the rmap lock in write mode when moving page table entries." }, - "CVE-2017-17806": { - "cmt_msg": "crypto: hmac - require that the underlying hash algorithm is unkeyed", - "cmt_id": "bd7f57da8fff9b75204d6dd2b3ac6a30a6430a5c" + "CVE-2017-18174": { + "cmt_msg": "pinctrl: amd: Use devm_pinctrl_register() for pinctrl registration" }, - "CVE-2017-6345": { - "cmt_msg": "net/llc: avoid BUG_ON() in skb_orphan()", - "cmt_id": "4fc8ff15e26ecfe974b7a3f386550bcfd259b8b1" + "CVE-2017-18595": { + "cmt_msg": "tracing: Fix possible double free on failure of allocating trace buffer" }, - "CVE-2017-6346": { - "cmt_msg": "packet: fix races in fanout_add()", - "cmt_id": "7babaac5d49ee7a88a5a324668dd13b575635d09" + "CVE-2024-26720": { + "cmt_msg": "mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again" }, - "CVE-2017-17805": { - "cmt_msg": "crypto: salsa20 - fix blkcipher_walk API usage", - "cmt_id": "bbda4c57b91619642a94b193531312fe01bc2398" - } - }, - "4.1.50": { - "CVE-2018-7566": { - "cmt_msg": "ALSA: seq: Fix racy pool initializations", - "cmt_id": "e78748b40e887c6e544dab71653858c370e283ea" + "CVE-2024-26726": { + "cmt_msg": "btrfs: don't drop extent_map for free space inode on write error" }, - "CVE-2018-5750": { - "cmt_msg": "ACPI: sbshc: remove raw pointer from printk() message", - "cmt_id": "4e5d88a911f6c610afe11b36c9b3b36f8928daf7" + "CVE-2019-6974": { + "cmt_msg": "kvm: fix kvm_ioctl_create_device() reference counting (CVE-2019-6974)" }, - "CVE-2016-9793": { - "cmt_msg": "net: avoid signed overflows for SO_{SND|RCV}BUFFORCE", - "cmt_id": "f99fb439e6aff4e9f8b91a80d48b2a2d97aa2248" + "CVE-2023-2985": { + "cmt_msg": "fs: hfsplus: fix UAF issue in hfsplus_put_super" }, - "CVE-2018-5873": { - "cmt_msg": "nsfs: mark dentry with DCACHE_RCUACCESS", - "cmt_id": "2ce8a62d862e3bcd16d12d6d7d71c0a343f4f99a" + "CVE-2017-17806": { + "cmt_msg": "crypto: hmac - require that the underlying hash algorithm is unkeyed" }, - "CVE-2017-17741": { - "cmt_msg": "KVM: Fix stack-out-of-bounds read in write_mmio", - "cmt_id": "bec1dbb0f0a93d5eb9d6b2741ead4156408d8150" + "CVE-2017-17807": { + "cmt_msg": "KEYS: add missing permission check for request_key() destination" }, - "CVE-2017-1000410": { - "cmt_msg": "Bluetooth: Prevent stack info leak from the EFS element.", - "cmt_id": "395cba875fa35b1a23d2bd1951c555d3d0a5d5be" + "CVE-2017-17805": { + "cmt_msg": "crypto: salsa20 - fix blkcipher_walk API usage" }, - "CVE-2017-16538": { - "cmt_msg": "media: dvb-usb-v2: lmedm04: Improve logic checking of warm start", - "cmt_id": "596a157dfeef68f30e38d3a38e21b9d4d4c6b644" + "CVE-2018-3639": { + "cmt_msg": "x86/nospec: Simplify alternative_msr_write()" }, - "CVE-2018-5333": { - "cmt_msg": "RDS: null pointer dereference in rds_atomic_free_op", - "cmt_id": "ad99858fa14a888b77dc2095f412e443639f953c" + "CVE-2023-52516": { + "cmt_msg": "dma-debug: don't call __dma_entry_alloc_check_leak() under free_entries_lock" }, - "CVE-2018-5332": { - "cmt_msg": "RDS: Heap OOB write in rds_message_alloc_sgs()", - "cmt_id": "4b1ffce255006f1220fce0f24772b9563ed91088" + "CVE-2023-52517": { + "cmt_msg": "spi: sun6i: fix race between DMA RX transfer completion and RX FIFO drain" }, - "CVE-2017-13216": { - "cmt_msg": "staging: android: ashmem: fix a race condition in ASHMEM_SET_SIZE ioctl", - "cmt_id": "700dbec6cafafbe5e018a90e8e92a4762c19884d" + "CVE-2023-52515": { + "cmt_msg": "RDMA/srp: Do not call scsi_done() from srp_abort()" }, - "CVE-2017-17448": { - "cmt_msg": "netfilter: nfnetlink_cthelper: Add missing permission checks", - "cmt_id": "6d752a482cf7ce18ca96abaf0a159e801d4c38e8" + "CVE-2019-15902": { + "cmt_msg": "unknown" }, - "CVE-2017-17449": { - "cmt_msg": "netlink: Add netns check on taps", - "cmt_id": "e85c6629ac5fbef352ced9925d264965ebacdf20" + "CVE-2023-52511": { + "cmt_msg": "spi: sun6i: reduce DMA RX transfer width to single byte" }, - "CVE-2017-18344": { - "cmt_msg": "posix-timer: Properly check sigevent->sigev_notify", - "cmt_id": "16cd05f25489459d10035ffab9cb7391512f1437" + "CVE-2019-20054": { + "cmt_msg": "fs/proc/proc_sysctl.c: fix NULL pointer dereference in put_links" }, - "CVE-2018-1000028": { - "cmt_msg": "nfsd: auth: Fix gid sorting when rootsquash enabled", - "cmt_id": "48978a7cb8586c49875ccbc6d243c880e4cbaf44" + "CVE-2018-17977": { + "cmt_msg": "" }, - "CVE-2017-18595": { - "cmt_msg": "tracing: Fix possible double free on failure of allocating trace buffer", - "cmt_id": "ca8476b2170d7500609f1fc6945a03e80eb58f6c" + "CVE-2024-26659": { + "cmt_msg": "xhci: handle isoc Babble and Buffer Overrun events properly" }, - "CVE-2016-10318": { - "cmt_msg": "fscrypto: add authorization check for setting encryption policy", - "cmt_id": "e68557814c7e9e4943caca924ff5537952bb3b4e" + "CVE-2024-26658": { + "cmt_msg": "bcachefs: grab s_umount only if snapshotting" }, - "CVE-2018-1000004": { - "cmt_msg": "ALSA: seq: Make ioctls race-free", - "cmt_id": "f8a38ab4cd9624fc5ac8a7f965c7b20f5b62c03c" + "CVE-2018-17972": { + "cmt_msg": "proc: restrict kernel stack dumps to root" }, - "CVE-2017-16913": { - "cmt_msg": "usbip: fix stub_rx: harden CMD_SUBMIT path to handle malicious input", - "cmt_id": "41ab9559b047a8a3f958a89f0202772a1aeaf4e4" + "CVE-2024-26655": { + "cmt_msg": "Fix memory leak in posix_clock_open()" }, - "CVE-2017-16912": { - "cmt_msg": "usbip: fix stub_rx: get_pipe() to validate endpoint number", - "cmt_id": "fcd31102e7ff3c83c6a6cda08156393e18c5e8f3" + "CVE-2024-26654": { + "cmt_msg": "ALSA: sh: aica: reorder cleanup operations to avoid UAF bugs" }, - "CVE-2017-16911": { - "cmt_msg": "usbip: prevent vhci_hcd driver from leaking a socket pointer address", - "cmt_id": "8c2b2e645aa47c2e9910e168398f7d28d31a0dc3" + "CVE-2024-26656": { + "cmt_msg": "drm/amdgpu: fix use-after-free bug" }, - "CVE-2018-5344": { - "cmt_msg": "loop: fix concurrent lo_open/lo_release", - "cmt_id": "f3ddd4df852f8c2ed11d09086b64a3be76ea2aed" + "CVE-2024-26651": { + "cmt_msg": "sr9800: Add check for usbnet_get_endpoints" }, - "CVE-2018-6927": { - "cmt_msg": "futex: Prevent overflow by strengthen input validation", - "cmt_id": "c3e715e4a45301380a1ae1f677de2f1a428b6349" + "CVE-2024-26650": { + "cmt_msg": "platform/x86: p2sb: Allow p2sb_bar() calls during PCI device probe" }, - "CVE-2017-8824": { - "cmt_msg": "dccp: CVE-2017-8824: use-after-free in DCCP code", - "cmt_id": "203e5dcc6edbe7248c9800689da3dd316f4c434a" + "CVE-2022-1048": { + "cmt_msg": "ALSA: pcm: Fix races among concurrent hw_params and hw_free calls" }, - "CVE-2018-18386": { - "cmt_msg": "n_tty: fix EXTPROC vs ICANON interaction with TIOCINQ (aka FIONREAD)", - "cmt_id": "9820d89b1a266ac573dae8fa46e4aa43f277a302" + "CVE-2023-52475": { + "cmt_msg": "Input: powermate - fix use-after-free in powermate_config_complete" }, - "CVE-2017-13305": { - "cmt_msg": "KEYS: encrypted: fix buffer overread in valid_master_desc()", - "cmt_id": "1f338384b46b16f9682c8e01f8d158e90e5d6cc2" + "CVE-2023-52477": { + "cmt_msg": "usb: hub: Guard against accesses to uninitialized BOS descriptors" }, - "CVE-2017-17450": { - "cmt_msg": "netfilter: xt_osf: Add missing permission checks", - "cmt_id": "6a45beb377097053f1b293db3d0e01f35b3a7cbf" - } - }, - "4.1.51": { - "CVE-2018-1068": { - "cmt_msg": "netfilter: ebtables: CONFIG_COMPAT: don't trust userland offsets", - "cmt_id": "1829a59ba6e8fa6467ea4607cf086b5e2d8d6426" + "CVE-2023-52476": { + "cmt_msg": "perf/x86/lbr: Filter vsyscall addresses" }, - "CVE-2018-7995": { - "cmt_msg": "x86/MCE: Serialize sysfs changes", - "cmt_id": "39a50471ea262c0a21d22d1c9a8d4c1bcac39865" + "CVE-2016-10147": { + "cmt_msg": "crypto: mcryptd - Check mcryptd algorithm compatibility" }, - "CVE-2018-5803": { - "cmt_msg": "sctp: verify size of a new chunk in _sctp_make_chunk()", - "cmt_id": "b434e837642049c96cf56c730279f410d520b33b" + "CVE-2023-52470": { + "cmt_msg": "drm/radeon: check the alloc_workqueue return value in radeon_crtc_init()" }, - "CVE-2018-7480": { - "cmt_msg": "blkcg: fix double free of new_blkg in blkcg_init_queue", - "cmt_id": "2191fc0f29b2d4e8e3e4aa5bf75df771aa7b1f88" + "CVE-2023-52479": { + "cmt_msg": "ksmbd: fix uaf in smb20_oplock_break_ack" }, - "CVE-2019-9456": { - "cmt_msg": "usb: usbmon: Read text within supplied buffer size", - "cmt_id": "eaca72671725b4bbaadfc3a0b07a3e26f285677c" - } - }, - "4.1.52": { - "CVE-2018-9385": { - "cmt_msg": "ARM: amba: Don't read past the end of sysfs \"driver_override\" buffer", - "cmt_id": "dbb94eebe42ac07eaee43afc23acdd0bf5674036" + "CVE-2023-52478": { + "cmt_msg": "HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect" }, - "CVE-2018-1066": { - "cmt_msg": "CIFS: Enable encryption during session setup phase", - "cmt_id": "b0b6d2f2c5377d169598f0ca00c25a78db651d35" + "CVE-2022-26365": { + "cmt_msg": "xen/blkfront: fix leaking data in shared pages" }, - "CVE-2018-8822": { - "cmt_msg": "staging: ncpfs: memory corruption in ncp_read_kernel()", - "cmt_id": "f67d1bdb52086230095895d6d0034953967cad78" + "CVE-2020-12652": { + "cmt_msg": "scsi: mptfusion: Fix double fetch bug in ioctl" }, - "CVE-2018-10940": { - "cmt_msg": "cdrom: information leak in cdrom_ioctl_media_changed()", - "cmt_id": "888f807c68bc7a4d96429d28a12cba9a045e3c79" + "CVE-2020-12653": { + "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_cmd_append_vsie_tlv()" }, - "CVE-2018-8781": { - "cmt_msg": "drm: udl: Properly check framebuffer mmap offsets", - "cmt_id": "631334908d120129678f68cdcca333565748fde7" + "CVE-2020-12656": { + "cmt_msg": "sunrpc: check that domain table is empty at module unload." }, - "CVE-2018-1087": { - "cmt_msg": "kvm/x86: fix icebp instruction handling", - "cmt_id": "4dc9ef4cf4830e6c001513b1a876ab32fe001b9a" + "CVE-2017-14051": { + "cmt_msg": "scsi: qla2xxx: Fix an integer overflow in sysfs code" }, - "CVE-2018-9415": { - "cmt_msg": "ARM: amba: Fix race condition with driver_override", - "cmt_id": "1d4ddc30e2b52aeb1b42c1c1a35b4b3792ce162e" + "CVE-2020-12654": { + "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_ret_wmm_get_status()" }, - "CVE-2018-7757": { - "cmt_msg": "scsi: libsas: fix memory leak in sas_smp_get_phy_events()", - "cmt_id": "e0ef494d21a96b888cc8f878906a0c04238bf15d" + "CVE-2023-34256": { + "cmt_msg": "ext4: avoid a potential slab-out-of-bounds in ext4_group_desc_csum" }, - "CVE-2017-17975": { - "cmt_msg": "media: usbtv: prevent double free in error case", - "cmt_id": "6291e1b9e71003fe84b902efa4c3994605d925df" + "CVE-2016-4581": { + "cmt_msg": "propogate_mnt: Handle the first propogated copy being a slave" }, - "CVE-2017-17712": { - "cmt_msg": "net: ipv4: fix for a race condition in raw_sendmsg", - "cmt_id": "d61b40939ebdc84dad77dbc78c3e26ad9d2da68b" + "CVE-2016-4580": { + "cmt_msg": "net: fix a kernel infoleak in x25 module" }, - "CVE-2018-1000199": { - "cmt_msg": "perf/hwbp: Simplify the perf-hwbp code, fix documentation", - "cmt_id": "3e9eff8b3c9f0e886ffef7621673fde3bb629601" + "CVE-2024-25740": { + "cmt_msg": "" }, - "CVE-2018-9422": { - "cmt_msg": "futex: Remove requirement for lock_page() in get_futex_key()", - "cmt_id": "1b58e046b7647bc44f83afd68e07c52c60d27bcc" + "CVE-2022-4744": { + "cmt_msg": "tun: avoid double free in tun_free_netdev" }, - "CVE-2018-1130": { - "cmt_msg": "dccp: check sk for closed state in dccp_sendmsg()", - "cmt_id": "b8415da3f6caf0842f86acbfa03b86eb4fbb3d4e" - } - }, - "outstanding": { - "CVE-2017-5897": { - "cmt_msg": "ip6_gre: fix ip6gre_err() invalid reads" + "CVE-2022-0400": { + "cmt_msg": "" }, - "CVE-2020-10711": { - "cmt_msg": "netlabel: cope with NULL catmap" + "CVE-2024-25741": { + "cmt_msg": "" }, - "CVE-2020-35508": { - "cmt_msg": "fork: fix copy_process(CLONE_PARENT) race with the exiting ->real_parent" + "CVE-2022-26966": { + "cmt_msg": "sr9700: sanity check for packet length" }, - "CVE-2022-3649": { - "cmt_msg": "nilfs2: fix use-after-free bug of struct nilfs_root" + "CVE-2023-1989": { + "cmt_msg": "Bluetooth: btsdio: fix use after free bug in btsdio_remove due to unfinished work" }, - "CVE-2020-35501": { + "CVE-2022-25265": { "cmt_msg": "" }, - "CVE-2019-15098": { - "cmt_msg": "ath6kl: fix a NULL-ptr-deref bug in ath6kl_usb_alloc_urb_from_pipe()" + "CVE-2019-15220": { + "cmt_msg": "p54usb: Fix race between disconnect and firmware loading" }, - "CVE-2021-45095": { - "cmt_msg": "phonet: refcount leak in pep_sock_accep" + "CVE-2020-11609": { + "cmt_msg": "media: stv06xx: add missing descriptor sanity checks" }, - "CVE-2022-0001": { - "cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE" + "CVE-2019-15221": { + "cmt_msg": "ALSA: line6: Fix write on zero-sized buffer" }, - "CVE-2020-12464": { - "cmt_msg": "USB: core: Fix free-while-in-use bug in the USB S-Glibrary" + "CVE-2023-4208": { + "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free" }, - "CVE-2021-45469": { - "cmt_msg": "f2fs: fix to do sanity check on last xattr entry in __f2fs_setxattr()" + "CVE-2023-4206": { + "cmt_msg": "net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free" }, - "CVE-2019-19965": { - "cmt_msg": "scsi: libsas: stop discovering if oob mode is disconnected" + "CVE-2023-4207": { + "cmt_msg": "net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free" }, - "CVE-2017-15102": { - "cmt_msg": "usb: misc: legousbtower: Fix NULL pointer deference" + "CVE-2023-52598": { + "cmt_msg": "s390/ptrace: handle setting of fpc register correctly" }, - "CVE-2016-9794": { - "cmt_msg": "ALSA: pcm : Call kill_fasync() in stream lock" + "CVE-2021-47046": { + "cmt_msg": "drm/amd/display: Fix off by one in hdmi_14_process_transaction()" }, - "CVE-2020-24587": { - "cmt_msg": "mac80211: prevent mixed key and fragment cache attacks" + "CVE-2020-29370": { + "cmt_msg": "mm: slub: add missing TID bump in kmem_cache_alloc_bulk()" }, - "CVE-2020-24586": { - "cmt_msg": "mac80211: prevent mixed key and fragment cache attacks" + "CVE-2022-20424": { + "cmt_msg": "io_uring: remove io_identity" }, - "CVE-2021-0129": { - "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical" + "CVE-2022-20422": { + "cmt_msg": "arm64: fix oops in concurrently setting insn_emulation sysctls" }, - "CVE-2019-20096": { - "cmt_msg": "dccp: Fix memleak in __feat_register_sp" + "CVE-2017-8831": { + "cmt_msg": "[media] saa7164: fix double fetch PCIe access condition" }, - "CVE-2016-3951": { - "cmt_msg": "cdc_ncm: do not call usbnet_link_change from cdc_ncm_bind" + "CVE-2022-45934": { + "cmt_msg": "Bluetooth: L2CAP: Fix u8 overflow" }, - "CVE-2016-10044": { - "cmt_msg": "aio: mark AIO pseudo-fs noexec" + "CVE-2021-4197": { + "cmt_msg": "cgroup: Use open-time credentials for process migraton perm checks" }, - "CVE-2022-3643": { - "cmt_msg": "xen/netback: Ensure protocol headers don't fall in the non-linear area" + "CVE-2020-24503": { + "cmt_msg": "" }, - "CVE-2022-32250": { - "cmt_msg": "netfilter: nf_tables: disallow non-stateful expression in sets earlier" + "CVE-2020-24502": { + "cmt_msg": "" }, - "CVE-2018-10087": { - "cmt_msg": "kernel/exit.c: avoid undefined behaviour when calling wait4()" + "CVE-2024-26774": { + "cmt_msg": "ext4: avoid dividing by 0 in mb_update_avg_fragment_size() when block bitmap corrupt" }, - "CVE-2019-9503": { - "cmt_msg": "brcmfmac: add subtype check for event handling in data path" + "CVE-2023-31436": { + "cmt_msg": "net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg" }, - "CVE-2020-36158": { - "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_cmd_802_11_ad_hoc_start" + "CVE-2024-26775": { + "cmt_msg": "aoe: avoid potential deadlock at set_capacity" }, - "CVE-2023-3159": { - "cmt_msg": "firewire: fix potential uaf in outbound_phy_packet_callback()" + "CVE-2016-4569": { + "cmt_msg": "ALSA: timer: Fix leak in SNDRV_TIMER_IOCTL_PARAMS" }, - "CVE-2022-0480": { - "cmt_msg": "memcg: enable accounting for file lock caches" + "CVE-2018-14609": { + "cmt_msg": "btrfs: relocation: Only remove reloc rb_trees if reloc control has been initialized" }, - "CVE-2018-10124": { - "cmt_msg": "kernel/signal.c: avoid undefined behaviour in kill_something_info" + "CVE-2016-4565": { + "cmt_msg": "IB/security: Restrict use of the write() interface" }, - "CVE-2022-0487": { - "cmt_msg": "moxart: fix potential use-after-free on remove path" + "CVE-2023-52568": { + "cmt_msg": "x86/sgx: Resolves SECS reclaim vs. page fault for EAUG race" }, - "CVE-2023-52429": { + "CVE-2024-23851": { "cmt_msg": "dm: limit the number of targets and parameter size area" }, - "CVE-2021-28964": { - "cmt_msg": "btrfs: fix race when cloning extent buffer during rewind of an old root" + "CVE-2020-27777": { + "cmt_msg": "powerpc/rtas: Restrict RTAS requests from userspace" }, - "CVE-2020-26558": { - "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical" + "CVE-2019-11486": { + "cmt_msg": "tty: mark Siemens R3964 line discipline as BROKEN" }, - "CVE-2022-23825": { - "cmt_msg": "" + "CVE-2019-11487": { + "cmt_msg": "fs: prevent page refcount overflow in pipe_buf_get" }, - "CVE-2023-3611": { - "cmt_msg": "net/sched: sch_qfq: account for stab overhead in qfq_enqueue" + "CVE-2018-8043": { + "cmt_msg": "net: phy: mdio-bcm-unimac: fix potential NULL dereference in unimac_mdio_probe()" }, - "CVE-2024-26588": { - "cmt_msg": "LoongArch: BPF: Prevent out-of-bounds memory access" + "CVE-2019-20908": { + "cmt_msg": "efi: Restrict efivar_ssdt_load when the kernel is locked down" }, - "CVE-2023-2162": { - "cmt_msg": "scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress" + "CVE-2019-19060": { + "cmt_msg": "iio: imu: adis16400: release allocated memory on failure" }, - "CVE-2017-5551": { - "cmt_msg": "tmpfs: clear S_ISGID when setting posix ACLs" + "CVE-2019-19061": { + "cmt_msg": "iio: imu: adis16400: fix memory leak" }, - "CVE-2019-19241": { - "cmt_msg": "io_uring: async workers should inherit the user creds" + "CVE-2019-19062": { + "cmt_msg": "crypto: user - fix memory leak in crypto_report" }, - "CVE-2022-21123": { - "cmt_msg": "x86/speculation/mmio: Add mitigation for Processor MMIO Stale Data" + "CVE-2019-19063": { + "cmt_msg": "rtlwifi: prevent memory leak in rtl_usb_probe" }, - "CVE-2023-3390": { - "cmt_msg": "netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE" + "CVE-2017-17741": { + "cmt_msg": "KVM: Fix stack-out-of-bounds read in write_mmio" }, - "CVE-2021-28688": { - "cmt_msg": "xen-blkback: don't leak persistent grants from xen_blkbk_map()" + "CVE-2019-19066": { + "cmt_msg": "scsi: bfa: release allocated memory in case of error" }, - "CVE-2021-39686": { - "cmt_msg": "binder: use euid from cred instead of using task" + "CVE-2017-7184": { + "cmt_msg": "xfrm_user: validate XFRM_MSG_NEWAE XFRMA_REPLAY_ESN_VAL replay_window" }, - "CVE-2021-39685": { - "cmt_msg": "USB: gadget: detect too-big endpoint 0 requests" + "CVE-2017-7187": { + "cmt_msg": "scsi: sg: check length passed to SG_NEXT_CMD_LEN" }, - "CVE-2023-6535": { - "cmt_msg": "" + "CVE-2019-3874": { + "cmt_msg": "sctp: implement memory accounting on tx path" }, - "CVE-2021-43975": { - "cmt_msg": "atlantic: Fix OOB read and write in hw_atl_utils_fw_rpc_wait" + "CVE-2017-12193": { + "cmt_msg": "assoc_array: Fix a buggy node-splitting case" }, - "CVE-2021-43976": { - "cmt_msg": "mwifiex: Fix skb_over_panic in mwifiex_usb_recv()" + "CVE-2017-12192": { + "cmt_msg": "KEYS: prevent KEYCTL_READ on negative key" }, - "CVE-2020-0466": { - "cmt_msg": "do_epoll_ctl(): clean the failure exits up a bit" + "CVE-2017-12190": { + "cmt_msg": "fix unbalanced page refcounting in bio_map_user_iov" }, - "CVE-2019-10207": { - "cmt_msg": "Bluetooth: hci_uart: check for missing tty operations" + "CVE-2020-36516": { + "cmt_msg": "ipv4: avoid using shared IP generator for connected sockets" }, - "CVE-2023-39189": { - "cmt_msg": "netfilter: nfnetlink_osf: avoid OOB read" + "CVE-2016-5412": { + "cmt_msg": "KVM: PPC: Book3S HV: Pull out TM state save/restore into separate procedures" }, - "CVE-2019-14835": { - "cmt_msg": "vhost: make sure log_num < in_num" + "CVE-2012-4542": { + "cmt_msg": "" }, - "CVE-2023-0459": { - "cmt_msg": "uaccess: Add speculation barrier to copy_from_user()" + "CVE-2018-1000028": { + "cmt_msg": "nfsd: auth: Fix gid sorting when rootsquash enabled" }, - "CVE-2023-0458": { - "cmt_msg": "prlimit: do_prlimit needs to have a speculation check" + "CVE-2018-1000026": { + "cmt_msg": "bnx2x: disable GSO where gso_size is too big for hardware" }, - "CVE-2018-1000204": { - "cmt_msg": "scsi: sg: allocate with __GFP_ZERO in sg_build_indirect()" + "CVE-2017-2596": { + "cmt_msg": "kvm: fix page struct leak in handle_vmon" }, - "CVE-2023-0597": { - "cmt_msg": "x86/mm: Randomize per-cpu entry area" + "CVE-2020-36775": { + "cmt_msg": "f2fs: fix to avoid potential deadlock" }, - "CVE-2019-12379": { - "cmt_msg": "consolemap: Fix a memory leaking bug in drivers/tty/vt/consolemap.c" + "CVE-2021-20292": { + "cmt_msg": "drm/ttm/nouveau: don't call tt destroy callback on alloc failure." }, - "CVE-2017-12134": { - "cmt_msg": "xen: fix bio vec merging" + "CVE-2023-2269": { + "cmt_msg": "dm ioctl: fix nested locking in table_clear() to remove deadlock concern" }, - "CVE-2021-30002": { - "cmt_msg": "media: v4l: ioctl: Fix memory leak in video_usercopy" + "CVE-2020-10690": { + "cmt_msg": "ptp: fix the race between the release of ptp_clock and cdev" }, - "CVE-2023-31084": { - "cmt_msg": "media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*()" + "CVE-2021-3659": { + "cmt_msg": "net: mac802154: Fix general protection fault" }, - "CVE-2015-8551": { - "cmt_msg": "xen/pciback: Return error on XEN_PCI_OP_enable_msi when device has MSI or MSI-X enabled" + "CVE-2021-3653": { + "cmt_msg": "KVM: nSVM: avoid picking up unsupported bits from L2 in int_ctl (CVE-2021-3653)" }, - "CVE-2015-8550": { - "cmt_msg": "xen: Add RING_COPY_REQUEST()" + "CVE-2021-3655": { + "cmt_msg": "sctp: validate from_addr_param return" }, - "CVE-2016-3672": { - "cmt_msg": "x86/mm/32: Enable full randomization on i386 and X86_32" + "CVE-2019-12614": { + "cmt_msg": "powerpc/pseries/dlpar: Fix a missing check in dlpar_parse_cc_property()" }, - "CVE-2015-8552": { - "cmt_msg": "xen/pciback: Return error on XEN_PCI_OP_enable_msi when device has MSI or MSI-X enabled" + "CVE-2019-12615": { + "cmt_msg": "mdesc: fix a missing-check bug in get_vdev_port_node_info()" }, - "CVE-2020-15802": { + "CVE-2021-3896": { + "cmt_msg": "isdn: cpai: check ctr->cnr to avoid array index out of bound" + }, + "CVE-2021-3892": { "cmt_msg": "" }, - "CVE-2022-3522": { - "cmt_msg": "mm/hugetlb: use hugetlb_pte_stable in migration race check" + "CVE-2022-27223": { + "cmt_msg": "USB: gadget: validate endpoint index for xilinx udc" }, - "CVE-2024-26594": { - "cmt_msg": "ksmbd: validate mech token in session setup" + "CVE-2022-24958": { + "cmt_msg": "usb: gadget: don't release an existing dev->buf" }, - "CVE-2023-4623": { - "cmt_msg": "net/sched: sch_hfsc: Ensure inner classes have fsc curve" + "CVE-2020-36557": { + "cmt_msg": "vt: vt_ioctl: fix VT_DISALLOCATE freeing in-use virtual console" }, - "CVE-2019-3460": { - "cmt_msg": "Bluetooth: Check L2CAP option sizes returned from l2cap_get_conf_opt" + "CVE-2020-12888": { + "cmt_msg": "vfio-pci: Invalidate mmaps and block MMIO access on disabled memory" }, - "CVE-2022-3636": { - "cmt_msg": "net: ethernet: mtk_eth_soc: use after free in __mtk_ppe_check_skb()" + "CVE-2023-2194": { + "cmt_msg": "i2c: xgene-slimpro: Fix out-of-bounds bug in xgene_slimpro_i2c_xfer()" }, - "CVE-2022-3635": { - "cmt_msg": "atm: idt77252: fix use-after-free bugs caused by tst_timer" + "CVE-2017-6353": { + "cmt_msg": "sctp: deny peeloff operation on asocs with threads sleeping on it" }, - "CVE-2022-0002": { - "cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE" + "CVE-2016-6198": { + "cmt_msg": "vfs: add vfs_select_inode() helper" }, - "CVE-2021-34556": { - "cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4" + "CVE-2022-41218": { + "cmt_msg": "media: dvb-core: Fix UAF due to refcount races at releasing" }, - "CVE-2020-0543": { - "cmt_msg": "x86/cpu: Add 'table' argument to cpu_matches()" + "CVE-2011-4917": { + "cmt_msg": "" + }, + "CVE-2021-45485": { + "cmt_msg": "ipv6: use prandom_u32() for ID generation" + }, + "CVE-2016-6197": { + "cmt_msg": "ovl: verify upper dentry before unlink and rename" + }, + "CVE-2020-0030": { + "cmt_msg": "ANDROID: binder: synchronize_rcu() when using POLLFREE." + }, + "CVE-2015-8709": { + "cmt_msg": "mm: Add a user_ns owner to mm_struct and fix ptrace permission checks" + }, + "CVE-2019-18806": { + "cmt_msg": "net: qlogic: Fix memory leak in ql_alloc_large_buffers" + }, + "CVE-2018-7754": { + "cmt_msg": "printk: hash addresses printed with %p" + }, + "CVE-2019-3900": { + "cmt_msg": "vhost_net: fix possible infinite loop" }, "CVE-2022-40982": { "cmt_msg": "x86/speculation: Add Gather Data Sampling mitigation" }, - "CVE-2016-10906": { - "cmt_msg": "net: arc_emac: fix koops caused by sk_buff free" + "CVE-2015-8964": { + "cmt_msg": "tty: Prevent ldisc drivers from re-using stale tty fields" }, - "CVE-2016-10905": { - "cmt_msg": "GFS2: don't set rgrp gl_object until it's inserted into rgrp tree" + "CVE-2015-8966": { + "cmt_msg": "[PATCH] arm: fix handling of F_OFD_... in oabi_fcntl64()" }, - "CVE-2022-3202": { - "cmt_msg": "jfs: prevent NULL deref in diFree" + "CVE-2021-39801": { + "cmt_msg": "" }, - "CVE-2018-3646": { - "cmt_msg": "x86/microcode: Allow late microcode loading with SMT disabled" + "CVE-2021-39800": { + "cmt_msg": "" }, - "CVE-2021-39714": { - "cmt_msg": "staging: android: ion: Drop ion_map_kernel interface" + "CVE-2015-8962": { + "cmt_msg": "sg: Fix double-free when drives detach during SG_IO" }, - "CVE-2024-24861": { - "cmt_msg": "" + "CVE-2015-8963": { + "cmt_msg": "perf: Fix race in swevent hash" }, - "CVE-2019-19966": { - "cmt_msg": "media: cpia2: Fix use-after-free in cpia2_exit" + "CVE-2024-22099": { + "cmt_msg": "Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security" }, - "CVE-2019-11477": { - "cmt_msg": "tcp: limit payload size of sacked skbs" + "CVE-2021-4202": { + "cmt_msg": "NFC: reorganize the functions in nci_request" }, - "CVE-2021-28711": { - "cmt_msg": "xen/blkfront: harden blkfront against event channel storms" + "CVE-2021-4203": { + "cmt_msg": "af_unix: fix races in sk_peer_pid and sk_peer_cred accesses" }, - "CVE-2018-14614": { - "cmt_msg": "f2fs: fix to do sanity check with cp_pack_start_sum" + "CVE-2023-52509": { + "cmt_msg": "ravb: Fix use-after-free issue in ravb_tx_timeout_work()" }, - "CVE-2019-11479": { - "cmt_msg": "tcp: add tcp_min_snd_mss sysctl" + "CVE-2023-46343": { + "cmt_msg": "nfc: nci: fix possible NULL pointer dereference in send_acknowledge()" }, - "CVE-2019-11478": { - "cmt_msg": "tcp: tcp_fragment() should apply sane memory limits" + "CVE-2023-52507": { + "cmt_msg": "nfc: nci: assert requested protocol is valid" }, - "CVE-2018-14611": { - "cmt_msg": "btrfs: validate type when reading a chunk" + "CVE-2023-52506": { + "cmt_msg": "LoongArch: Set all reserved memblocks on Node#0 at initialization" }, - "CVE-2018-14610": { - "cmt_msg": "btrfs: Check that each block group has corresponding chunk at mount time" + "CVE-2023-52501": { + "cmt_msg": "ring-buffer: Do not attempt to read past \"commit\"" }, - "CVE-2018-14613": { - "cmt_msg": "btrfs: tree-checker: Verify block_group_item" + "CVE-2023-52500": { + "cmt_msg": "scsi: pm80xx: Avoid leaking tags when processing OPC_INB_SET_CONTROLLER_CONFIG command" }, - "CVE-2018-14612": { - "cmt_msg": "btrfs: tree-checker: Detect invalid and empty essential trees" + "CVE-2023-52502": { + "cmt_msg": "net: nfc: fix races in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn()" }, - "CVE-2020-26145": { - "cmt_msg": "ath10k: drop fragments with multicast DA for PCIe" + "CVE-2023-2513": { + "cmt_msg": "ext4: fix use-after-free in ext4_xattr_set_entry" }, - "CVE-2017-13215": { - "cmt_msg": "crypto: algif_skcipher - Load TX SG list after waiting" + "CVE-2017-1000": { + "cmt_msg": "udp: consistently apply ufo or fragmentation" }, - "CVE-2018-5814": { - "cmt_msg": "usbip: usbip_host: fix NULL-ptr deref and use-after-free errors" + "CVE-2024-26668": { + "cmt_msg": "netfilter: nft_limit: reject configurations that cause integer overflow" }, - "CVE-2020-26140": { - "cmt_msg": "" + "CVE-2017-0605": { + "cmt_msg": "tracing: Use strlcpy() instead of strcpy() in __trace_find_cmdline()" }, - "CVE-2020-26143": { + "CVE-2024-24858": { "cmt_msg": "" }, - "CVE-2020-26142": { - "cmt_msg": "" + "CVE-2024-26664": { + "cmt_msg": "hwmon: (coretemp) Fix out-of-bounds memory access" }, - "CVE-2019-17053": { - "cmt_msg": "ieee802154: enforce CAP_NET_RAW for raw sockets" + "CVE-2021-38198": { + "cmt_msg": "KVM: X86: MMU: Use the correct inherited permissions to get shadow page" }, - "CVE-2019-17052": { - "cmt_msg": "ax25: enforce CAP_NET_RAW for raw sockets" + "CVE-2022-1679": { + "cmt_msg": "ath9k: fix use-after-free in ath9k_hif_usb_rx_cb" }, - "CVE-2016-3070": { - "cmt_msg": "mm: migrate dirty page without clear_page_dirty_for_io etc" + "CVE-2023-52442": { + "cmt_msg": "ksmbd: validate session id and tree id in compound request" }, - "CVE-2023-1077": { - "cmt_msg": "sched/rt: pick_next_rt_entity(): check list_entry" + "CVE-2022-40768": { + "cmt_msg": "scsi: stex: Properly zero out the passthrough command structure" }, - "CVE-2020-27418": { - "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region" + "CVE-2023-52444": { + "cmt_msg": "f2fs: fix to avoid dirent corruption" }, - "CVE-2019-17056": { - "cmt_msg": "nfc: enforce CAP_NET_RAW for raw sockets" + "CVE-2023-52445": { + "cmt_msg": "media: pvrusb2: fix use after free on context disconnection" }, - "CVE-2019-17055": { - "cmt_msg": "mISDN: enforce CAP_NET_RAW for raw sockets" + "CVE-2023-52449": { + "cmt_msg": "mtd: Fix gluebi NULL pointer dereference caused by ftl notifier" }, - "CVE-2019-17054": { - "cmt_msg": "appletalk: enforce CAP_NET_RAW for raw sockets" + "CVE-2016-4913": { + "cmt_msg": "get_rock_ridge_filename(): handle malformed NM entries" }, - "CVE-2018-13093": { - "cmt_msg": "xfs: validate cached inodes are free when allocated" + "CVE-2019-15807": { + "cmt_msg": "scsi: libsas: delete sas port if expander discover failed" }, - "CVE-2023-51781": { - "cmt_msg": "appletalk: Fix Use-After-Free in atalk_ioctl" + "CVE-2024-26719": { + "cmt_msg": "nouveau: offload fence uevents work to workqueue" }, - "CVE-2018-13096": { - "cmt_msg": "f2fs: fix to do sanity check with node footer and iblocks" + "CVE-2024-1312": { + "cmt_msg": "mm: lock_vma_under_rcu() must check vma->anon_vma under vma lock" }, - "CVE-2018-13097": { - "cmt_msg": "f2fs: fix to do sanity check with user_block_count" + "CVE-2019-14284": { + "cmt_msg": "floppy: fix div-by-zero in setup_format_params" }, - "CVE-2018-13094": { - "cmt_msg": "xfs: don't call xfs_da_shrink_inode with NULL bp" + "CVE-2019-14283": { + "cmt_msg": "floppy: fix out-of-bounds read in copy_buffer" }, - "CVE-2018-13095": { - "cmt_msg": "xfs: More robust inode extent count validation" + "CVE-2023-3338": { + "cmt_msg": "Remove DECnet support from kernel" }, - "CVE-2020-29661": { - "cmt_msg": "tty: Fix ->pgrp locking in tiocspgrp()" + "CVE-2018-10882": { + "cmt_msg": "ext4: add more inode number paranoia checks" }, - "CVE-2020-29660": { - "cmt_msg": "tty: Fix ->session locking" + "CVE-2018-10883": { + "cmt_msg": "jbd2: don't mark block as modified if the handle is out of credits" }, - "CVE-2018-13098": { - "cmt_msg": "f2fs: fix to do sanity check with extra_attr feature" + "CVE-2020-12464": { + "cmt_msg": "USB: core: Fix free-while-in-use bug in the USB S-Glibrary" }, - "CVE-2018-13099": { - "cmt_msg": "f2fs: fix to do sanity check with reserved blkaddr of inline inode" + "CVE-2016-9793": { + "cmt_msg": "net: avoid signed overflows for SO_{SND|RCV}BUFFORCE" }, - "CVE-2023-28772": { - "cmt_msg": "seq_buf: Fix overflow in seq_buf_putmem_hex()" + "CVE-2016-9794": { + "cmt_msg": "ALSA: pcm : Call kill_fasync() in stream lock" }, - "CVE-2022-24448": { - "cmt_msg": "NFSv4: Handle case where the lookup of a directory fails" + "CVE-2022-47520": { + "cmt_msg": "wifi: wilc1000: validate pairwise and authentication suite offsets" }, - "CVE-2019-11884": { - "cmt_msg": "Bluetooth: hidp: fix buffer overflow" + "CVE-2016-10044": { + "cmt_msg": "aio: mark AIO pseudo-fs noexec" }, - "CVE-2023-4134": { - "cmt_msg": "Input: cyttsp4_core - change del_timer_sync() to timer_shutdown_sync()" + "CVE-2018-10087": { + "cmt_msg": "kernel/exit.c: avoid undefined behaviour when calling wait4()" }, - "CVE-2019-19074": { - "cmt_msg": "ath9k: release allocated buffer if timed out" + "CVE-2023-3159": { + "cmt_msg": "firewire: fix potential uaf in outbound_phy_packet_callback()" }, - "CVE-2019-19073": { - "cmt_msg": "ath9k_htc: release allocated buffer if timed out" + "CVE-2021-47059": { + "cmt_msg": "crypto: sun8i-ss - fix result memory leak on error path" }, - "CVE-2015-9016": { - "cmt_msg": "blk-mq: fix race between timeout and freeing request" + "CVE-2021-47052": { + "cmt_msg": "crypto: sa2ul - Fix memory leak of rxd" }, - "CVE-2015-8952": { - "cmt_msg": "ext2: convert to mbcache2" + "CVE-2017-7374": { + "cmt_msg": "fscrypt: remove broken support for detecting keyring key revocation" }, - "CVE-2022-23038": { - "cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()" + "CVE-2022-21125": { + "cmt_msg": "x86/speculation/mmio: Reuse SRBDS mitigation for SBDS" }, - "CVE-2022-23039": { - "cmt_msg": "xen/gntalloc: don't use gnttab_query_foreign_access()" + "CVE-2019-19241": { + "cmt_msg": "io_uring: async workers should inherit the user creds" }, - "CVE-2016-8645": { - "cmt_msg": "tcp: take care of truncations done by sk_filter()" + "CVE-2022-21123": { + "cmt_msg": "x86/speculation/mmio: Add mitigation for Processor MMIO Stale Data" }, - "CVE-2016-8646": { - "cmt_msg": "crypto: algif_hash - Only export and import on sockets with data" + "CVE-2020-26559": { + "cmt_msg": "" }, - "CVE-2022-23037": { - "cmt_msg": "xen/netfront: don't use gnttab_query_foreign_access() for mapped status" + "CVE-2021-43975": { + "cmt_msg": "atlantic: Fix OOB read and write in hw_atl_utils_fw_rpc_wait" }, - "CVE-2020-0404": { - "cmt_msg": "media: uvcvideo: Avoid cyclic entity chains due to malformed USB descriptors" + "CVE-2018-6927": { + "cmt_msg": "futex: Prevent overflow by strengthen input validation" }, - "CVE-2019-15927": { - "cmt_msg": "ALSA: usb-audio: Avoid access before bLength check in build_audio_procunit()" + "CVE-2023-52519": { + "cmt_msg": "HID: intel-ish-hid: ipc: Disable and reenable ACPI GPE bit" }, - "CVE-2019-15926": { - "cmt_msg": "ath6kl: add some bounds checking" + "CVE-2023-0590": { + "cmt_msg": "net: sched: fix race condition in qdisc_graft()" }, - "CVE-2019-14821": { - "cmt_msg": "KVM: coalesced_mmio: add bounds checking" + "CVE-2023-0597": { + "cmt_msg": "x86/mm: Randomize per-cpu entry area" }, - "CVE-2020-12826": { - "cmt_msg": "signal: Extend exec_id to 64bits" + "CVE-2022-28390": { + "cmt_msg": "can: ems_usb: ems_usb_start_xmit(): fix double dev_kfree_skb() in error path" }, - "CVE-2019-3701": { - "cmt_msg": "can: gw: ensure DLC boundaries after CAN frame modification" + "CVE-2019-3460": { + "cmt_msg": "Bluetooth: Check L2CAP option sizes returned from l2cap_get_conf_opt" }, - "CVE-2021-42008": { - "cmt_msg": "net: 6pack: fix slab-out-of-bounds in decode_data" + "CVE-2022-3202": { + "cmt_msg": "jfs: prevent NULL deref in diFree" }, - "CVE-2022-44033": { - "cmt_msg": "char: pcmcia: remove all the drivers" + "CVE-2017-7518": { + "cmt_msg": "KVM: x86: fix singlestepping over syscall" }, - "CVE-2022-39188": { - "cmt_msg": "mmu_gather: Force tlb-flush VM_PFNMAP vmas" + "CVE-2019-11477": { + "cmt_msg": "tcp: limit payload size of sacked skbs" }, - "CVE-2018-20511": { - "cmt_msg": "net/appletalk: fix minor pointer leak to userspace in SIOCFINDIPDDPRT" + "CVE-2016-4578": { + "cmt_msg": "ALSA: timer: Fix leak in events via snd_timer_user_ccallback" }, - "CVE-2019-1125": { - "cmt_msg": "x86/speculation: Prepare entry code for Spectre v1 swapgs mitigations" + "CVE-2021-46906": { + "cmt_msg": "HID: usbhid: fix info leak in hid_submit_ctrl" }, - "CVE-2019-15218": { - "cmt_msg": "media: usb: siano: Fix general protection fault in smsusb" + "CVE-2018-14614": { + "cmt_msg": "f2fs: fix to do sanity check with cp_pack_start_sum" }, - "CVE-2019-15666": { - "cmt_msg": "xfrm: policy: Fix out-of-bound array accesses in __xfrm_policy_unlink" + "CVE-2018-14617": { + "cmt_msg": "hfsplus: fix NULL dereference in hfsplus_lookup()" }, - "CVE-2005-3660": { - "cmt_msg": "" + "CVE-2018-14616": { + "cmt_msg": "f2fs: fix to do sanity check with block address in main area v2" }, - "CVE-2019-15212": { - "cmt_msg": "USB: rio500: refuse more than one device at a time" + "CVE-2018-14611": { + "cmt_msg": "btrfs: validate type when reading a chunk" }, - "CVE-2019-15211": { - "cmt_msg": "media: radio-raremono: change devm_k*alloc to k*alloc" + "CVE-2018-14610": { + "cmt_msg": "btrfs: Check that each block group has corresponding chunk at mount time" }, - "CVE-2023-1095": { - "cmt_msg": "netfilter: nf_tables: fix null deref due to zeroed list head" + "CVE-2018-14613": { + "cmt_msg": "btrfs: tree-checker: Verify block_group_item" }, - "CVE-2019-15217": { - "cmt_msg": "media: usb:zr364xx:Fix KASAN:null-ptr-deref Read in zr364xx_vidioc_querycap" + "CVE-2018-14612": { + "cmt_msg": "btrfs: tree-checker: Detect invalid and empty essential trees" }, - "CVE-2019-15216": { - "cmt_msg": "USB: yurex: Fix protection fault after device removal" + "CVE-2024-23848": { + "cmt_msg": "" }, - "CVE-2019-15215": { - "cmt_msg": "media: cpia2_usb: first wake up, then free in disconnect" + "CVE-2020-27418": { + "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region" }, - "CVE-2019-15214": { - "cmt_msg": "ALSA: core: Fix card races between register and disconnect" + "CVE-2017-2618": { + "cmt_msg": "selinux: fix off-by-one in setprocattr" }, - "CVE-2020-24588": { - "cmt_msg": "cfg80211: mitigate A-MSDU aggregation attacks" + "CVE-2019-2025": { + "cmt_msg": "binder: fix race that allows malicious free of live buffer" }, - "CVE-2021-33034": { - "cmt_msg": "Bluetooth: verify AMP hci_chan before amp_destroy" + "CVE-2019-2024": { + "cmt_msg": "media: em28xx: Fix use-after-free when disconnecting" }, - "CVE-2019-19922": { - "cmt_msg": "sched/fair: Fix low cpu usage with high throttling by removing expiration of cpu-local slices" + "CVE-2019-19074": { + "cmt_msg": "ath9k: release allocated buffer if timed out" }, - "CVE-2019-19927": { - "cmt_msg": "drm/ttm: fix incrementing the page pointer for huge pages" + "CVE-2019-19073": { + "cmt_msg": "ath9k_htc: release allocated buffer if timed out" }, - "CVE-2017-18509": { - "cmt_msg": "ipv6: check sk sk_type and protocol early in ip_mroute_set/getsockopt" + "CVE-2019-1125": { + "cmt_msg": "x86/speculation: Prepare entry code for Spectre v1 swapgs mitigations" }, - "CVE-2017-5986": { - "cmt_msg": "sctp: avoid BUG_ON on sctp_wait_for_sndbuf" + "CVE-2023-31085": { + "cmt_msg": "ubi: Refuse attaching if mtd's erasesize is 0" }, - "CVE-2024-23307": { + "CVE-2023-31084": { + "cmt_msg": "media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*()" + }, + "CVE-2023-31083": { + "cmt_msg": "Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO" + }, + "CVE-2023-31082": { "cmt_msg": "" }, - "CVE-2016-3857": { - "cmt_msg": "arm: oabi compat: add missing access checks" + "CVE-2023-31081": { + "cmt_msg": "" + }, + "CVE-2016-4997": { + "cmt_msg": "netfilter: x_tables: check for bogus target offset" }, "CVE-2022-32296": { "cmt_msg": "tcp: increase source port perturb table to 2^16" }, "CVE-2020-28974": { - "cmt_msg": "vt: Disable KD_FONT_OP_COPY" - }, - "CVE-2023-3567": { - "cmt_msg": "vc_screen: move load of struct vc_data pointer in vcs_read() to avoid UAF" + "cmt_msg": "vt: Disable KD_FONT_OP_COPY" }, "CVE-2019-20806": { "cmt_msg": "media: tw5864: Fix possible NULL pointer dereference in tw5864_handle_frame" @@ -82353,215 +113806,89 @@ "CVE-2022-3028": { "cmt_msg": "af_key: Do not call xfrm_probe_algs in parallel" }, - "CVE-2017-16648": { - "cmt_msg": "dvb_frontend: don't use-after-free the frontend struct" - }, "CVE-2020-14304": { "cmt_msg": "" }, "CVE-2010-5321": { "cmt_msg": "" }, - "CVE-2020-15393": { - "cmt_msg": "usb: usbtest: fix missing kfree(dev->buf) in usbtest_disconnect" - }, "CVE-2022-33981": { "cmt_msg": "floppy: disable FDRAWCMD by default" }, - "CVE-2021-3564": { - "cmt_msg": "Bluetooth: fix the erroneous flush_work() order" - }, - "CVE-2019-9506": { - "cmt_msg": "Bluetooth: Fix faulty expression for minimum encryption key size check" - }, - "CVE-2023-1476": { - "cmt_msg": "" - }, "CVE-2017-16995": { "cmt_msg": "bpf: fix incorrect sign extension in check_alu_op()" }, - "CVE-2019-18675": { - "cmt_msg": "mmap: introduce sane default mmap limits" - }, - "CVE-2019-2025": { - "cmt_msg": "binder: fix race that allows malicious free of live buffer" + "CVE-2017-16994": { + "cmt_msg": "mm/pagewalk.c: report holes in hugetlb ranges" }, "CVE-2017-2583": { "cmt_msg": "KVM: x86: fix emulation of \"MOV SS, null selector\"" }, - "CVE-2020-26560": { - "cmt_msg": "" - }, "CVE-2017-2584": { "cmt_msg": "KVM: x86: Introduce segmented_write_std" }, - "CVE-2023-39198": { - "cmt_msg": "drm/qxl: fix UAF on handle creation" - }, - "CVE-2018-12127": { - "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" - }, - "CVE-2018-12126": { - "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" - }, - "CVE-2022-23816": { - "cmt_msg": "x86/kvm/vmx: Make noinstr clean" - }, - "CVE-2017-9077": { - "cmt_msg": "ipv6/dccp: do not inherit ipv6_mc_list from parent" - }, - "CVE-2017-9076": { - "cmt_msg": "ipv6/dccp: do not inherit ipv6_mc_list from parent" - }, - "CVE-2023-37454": { - "cmt_msg": "" - }, - "CVE-2023-35824": { - "cmt_msg": "media: dm1105: Fix use after free bug in dm1105_remove due to race condition" - }, - "CVE-2022-20572": { - "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag" - }, - "CVE-2018-10021": { - "cmt_msg": "scsi: libsas: defer ata device eh commands to libata" - }, - "CVE-2023-39194": { - "cmt_msg": "net: xfrm: Fix xfrm_address_filter OOB read" - }, - "CVE-2023-39197": { - "cmt_msg": "netfilter: conntrack: dccp: copy entire header to stack buffer, not just basic one" - }, - "CVE-2019-10126": { - "cmt_msg": "mwifiex: Fix heap overflow in mwifiex_uap_parse_tail_ies()" - }, - "CVE-2023-3106": { - "cmt_msg": "xfrm: fix crash in XFRM_MSG_GETSA netlink handler" - }, - "CVE-2019-13631": { - "cmt_msg": "Input: gtco - bounds check collection indent level" - }, - "CVE-2020-13974": { - "cmt_msg": "vt: keyboard: avoid signed integer overflow in k_ascii" - }, - "CVE-2017-6001": { - "cmt_msg": "perf/core: Fix concurrent sys_perf_event_open() vs. 'move_group' race" - }, - "CVE-2021-4083": { - "cmt_msg": "fget: check that the fd still exists after getting a ref to it" - }, - "CVE-2023-33288": { - "cmt_msg": "power: supply: bq24190: Fix use after free bug in bq24190_remove due to race condition" - }, - "CVE-2018-10938": { - "cmt_msg": "Cipso: cipso_v4_optptr enter infinite loop" - }, - "CVE-2022-29900": { - "cmt_msg": "x86/kvm/vmx: Make noinstr clean" + "CVE-2016-4998": { + "cmt_msg": "netfilter: x_tables: check for bogus target offset" }, - "CVE-2022-29901": { - "cmt_msg": "x86/kvm/vmx: Make noinstr clean" + "CVE-2016-6213": { + "cmt_msg": "mnt: Add a per mount namespace limit on the number of mounts" }, - "CVE-2018-12233": { - "cmt_msg": "jfs: Fix inconsistency between memory allocation and ea_buf->max_size" + "CVE-2017-17558": { + "cmt_msg": "USB: core: prevent malicious bNumInterfaces overflow" }, - "CVE-2019-18282": { - "cmt_msg": "net/flow_dissector: switch to siphash" + "CVE-2019-11479": { + "cmt_msg": "tcp: add tcp_min_snd_mss sysctl" }, "CVE-2020-10751": { "cmt_msg": "selinux: properly handle multiple messages in selinux_netlink_send()" }, - "CVE-2021-4002": { - "cmt_msg": "hugetlbfs: flush TLBs correctly after huge_pmd_unshare" - }, - "CVE-2018-9465": { - "cmt_msg": "binder: fix proc->files use-after-free" - }, - "CVE-2018-20510": { - "cmt_msg": "binder: replace \"%p\" with \"%pK\"" - }, - "CVE-2022-20166": { - "cmt_msg": "drivers core: Use sysfs_emit and sysfs_emit_at for show(device *...) functions" - }, - "CVE-2016-5728": { - "cmt_msg": "misc: mic: Fix for double fetch security bug in VOP driver" - }, - "CVE-2020-15436": { - "cmt_msg": "block: Fix use-after-free in blkdev_get()" - }, "CVE-2022-1116": { "cmt_msg": "" }, "CVE-2021-28660": { "cmt_msg": "staging: rtl8188eu: prevent ->ssid overflow in rtw_wx_set_scan()" }, - "CVE-2024-0775": { - "cmt_msg": "ext4: improve error recovery code paths in __ext4_remount()" - }, - "CVE-2020-8647": { - "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region" - }, - "CVE-2019-0155": { - "cmt_msg": "drm/i915: Rename gen7 cmdparser tables" - }, - "CVE-2019-0154": { - "cmt_msg": "drm/i915: Lower RM timeout to avoid DSI hard hangs" - }, - "CVE-2022-3567": { - "cmt_msg": "ipv6: Fix data races around sk->sk_prot." - }, - "CVE-2022-3566": { - "cmt_msg": "tcp: Fix data races around icsk->icsk_af_ops." - }, - "CVE-2022-3565": { - "cmt_msg": "mISDN: fix use-after-free bugs in l1oip timer handlers" - }, - "CVE-2022-3564": { - "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free caused by l2cap_reassemble_sdu" + "CVE-2017-6348": { + "cmt_msg": "irda: Fix lockdep annotations in hashbin_delete()." }, "CVE-2020-36386": { "cmt_msg": "Bluetooth: Fix slab-out-of-bounds read in hci_extended_inquiry_result_evt()" }, - "CVE-2017-6347": { - "cmt_msg": "ip: fix IP_CHECKSUM handling" + "CVE-2017-6345": { + "cmt_msg": "net/llc: avoid BUG_ON() in skb_orphan()" }, - "CVE-2022-3628": { - "cmt_msg": "wifi: brcmfmac: Fix potential buffer overflow in brcmf_fweh_event_worker()" + "CVE-2017-6346": { + "cmt_msg": "packet: fix races in fanout_add()" }, - "CVE-2022-1048": { - "cmt_msg": "ALSA: pcm: Fix races among concurrent hw_params and hw_free calls" + "CVE-2017-6347": { + "cmt_msg": "ip: fix IP_CHECKSUM handling" }, - "CVE-2020-36385": { - "cmt_msg": "RDMA/ucma: Rework ucma_migrate_id() to avoid races with destroy" + "CVE-2018-9385": { + "cmt_msg": "ARM: amba: Don't read past the end of sysfs \"driver_override\" buffer" }, "CVE-2020-0009": { "cmt_msg": "staging: android: ashmem: Disallow ashmem memory from being remapped" }, - "CVE-2023-52340": { - "cmt_msg": "ipv6: remove max_size check inline with ipv4" + "CVE-2016-3137": { + "cmt_msg": "USB: cypress_m8: add endpoint sanity check" }, - "CVE-2019-14615": { - "cmt_msg": "drm/i915/gen9: Clear residual context state on context switch" + "CVE-2016-3136": { + "cmt_msg": "USB: mct_u232: add sanity checking in probe" }, - "CVE-2022-2503": { - "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag" + "CVE-2016-6327": { + "cmt_msg": "IB/srpt: Simplify srpt_handle_tsk_mgmt()" }, - "CVE-2020-12771": { - "cmt_msg": "bcache: fix potential deadlock problem in btree_gc_coalesce" + "CVE-2016-3134": { + "cmt_msg": "netfilter: x_tables: fix unconditional helper" + }, + "CVE-2018-9415": { + "cmt_msg": "ARM: amba: Fix race condition with driver_override" }, "CVE-2019-13648": { "cmt_msg": "powerpc/tm: Fix oops on sigreturn on systems without TM" }, - "CVE-2023-0030": { - "cmt_msg": "drm/nouveau/mmu: add more general vmm free/node handling functions" - }, - "CVE-2020-16120": { - "cmt_msg": "ovl: switch to mounter creds in readdir" - }, - "CVE-2019-11599": { - "cmt_msg": "coredump: fix race condition between mmget_not_zero()/get_task_mm() and core dumping" - }, - "CVE-2018-16658": { - "cmt_msg": "cdrom: Fix info leak/OOB read in cdrom_ioctl_drive_status" + "CVE-2016-3138": { + "cmt_msg": "USB: cdc-acm: more sanity checking" }, "CVE-2018-15572": { "cmt_msg": "x86/speculation: Protect against userspace-userspace spectreRSB" @@ -82569,1610 +113896,1619 @@ "CVE-2022-1204": { "cmt_msg": "ax25: Fix refcount leaks caused by ax25_cb_del()" }, - "CVE-2019-2101": { - "cmt_msg": "media: uvcvideo: Fix 'type' check leading to overflow" - }, - "CVE-2019-17666": { - "cmt_msg": "rtlwifi: Fix potential overflow on P2P code" + "CVE-2016-2847": { + "cmt_msg": "pipe: limit the per-user amount of pages allocated in pipes" }, "CVE-2018-9363": { "cmt_msg": "Bluetooth: hidp: buffer overflow in hidp_process_report" }, - "CVE-2015-7885": { - "cmt_msg": "staging/dgnc: fix info leak in ioctl" - }, "CVE-2016-10723": { "cmt_msg": "mm, oom: remove sleep from under oom_lock" }, - "CVE-2020-25212": { - "cmt_msg": "nfs: Fix getxattr kernel panic and memory overflow" - }, - "CVE-2019-19036": { - "cmt_msg": "btrfs: Detect unbalanced tree with empty leaf before crashing btree operations" + "CVE-2022-26490": { + "cmt_msg": "nfc: st21nfca: Fix potential buffer overflows in EVT_TRANSACTION" }, - "CVE-2019-3459": { - "cmt_msg": "Bluetooth: Verify that l2cap_get_conf_opt provides large enough buffer" + "CVE-2020-8832": { + "cmt_msg": "drm/i915: Record the default hw state after reset upon load" }, - "CVE-2020-11494": { - "cmt_msg": "slcan: Don't transmit uninitialized stack data in padding" + "CVE-2023-52531": { + "cmt_msg": "wifi: iwlwifi: mvm: Fix a memory corruption issue" }, - "CVE-2019-19039": { - "cmt_msg": "btrfs: Don't submit any btree write bio if the fs has errors" + "CVE-2023-52532": { + "cmt_msg": "net: mana: Fix TX CQE error handling" }, - "CVE-2020-0444": { - "cmt_msg": "audit: fix error handling in audit_data_to_entry()" + "CVE-2016-7039": { + "cmt_msg": "net: add recursion limit to GRO" }, - "CVE-2022-1974": { - "cmt_msg": "nfc: replace improper check device_is_registered() in netlink related functions" + "CVE-2023-39189": { + "cmt_msg": "netfilter: nfnetlink_osf: avoid OOB read" }, - "CVE-2020-8832": { - "cmt_msg": "drm/i915: Record the default hw state after reset upon load" + "CVE-2024-26677": { + "cmt_msg": "rxrpc: Fix delayed ACKs to not set the reference serial number" }, - "CVE-2022-1836": { - "cmt_msg": "floppy: disable FDRAWCMD by default" + "CVE-2020-25211": { + "cmt_msg": "netfilter: ctnetlink: add a range check for l3/l4 protonum" }, - "CVE-2021-32078": { - "cmt_msg": "ARM: footbridge: remove personal server platform" + "CVE-2020-25212": { + "cmt_msg": "nfs: Fix getxattr kernel panic and memory overflow" }, - "CVE-2022-20148": { - "cmt_msg": "f2fs: fix UAF in f2fs_available_free_memory" + "CVE-2020-28374": { + "cmt_msg": "scsi: target: Fix XCOPY NAA identifier lookup" }, - "CVE-2022-4662": { - "cmt_msg": "USB: core: Prevent nested device-reset calls" + "CVE-2024-26672": { + "cmt_msg": "drm/amdgpu: Fix variable 'mca_funcs' dereferenced before NULL check in 'amdgpu_mca_smu_get_mca_entry()'" }, - "CVE-2019-11833": { - "cmt_msg": "ext4: zero out the unused memory region in the extent tree block" + "CVE-2024-26671": { + "cmt_msg": "blk-mq: fix IO hang from sbitmap wakeup race" }, - "CVE-2021-38205": { - "cmt_msg": "net: xilinx_emaclite: Do not print real IOMEM pointer" + "CVE-2024-26679": { + "cmt_msg": "inet: read sk->sk_family once in inet_recv_error()" }, - "CVE-2021-3864": { - "cmt_msg": "" + "CVE-2023-52458": { + "cmt_msg": "block: add check that partition length needs to be aligned with block size" }, - "CVE-2020-0255": { - "cmt_msg": "selinux: properly handle multiple messages in selinux_netlink_send()" + "CVE-2023-52451": { + "cmt_msg": "powerpc/pseries/memhp: Fix access beyond end of drmem array" }, - "CVE-2016-6130": { - "cmt_msg": "s390/sclp_ctl: fix potential information leak with /dev/sclp" + "CVE-2018-9568": { + "cmt_msg": "net: Set sk_prot_creator when cloning sockets to the right proto" }, - "CVE-2019-2215": { - "cmt_msg": "ANDROID: binder: remove waitqueue when thread exits." + "CVE-2019-14816": { + "cmt_msg": "mwifiex: Fix three heap overflow at parsing element in cfg80211_ap_settings" }, - "CVE-2023-35001": { - "cmt_msg": "netfilter: nf_tables: prevent OOB access in nft_byteorder_eval" + "CVE-2019-14814": { + "cmt_msg": "mwifiex: Fix three heap overflow at parsing element in cfg80211_ap_settings" }, - "CVE-2021-38208": { - "cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect" + "CVE-2024-26700": { + "cmt_msg": "drm/amd/display: Fix MST Null Ptr for RV" }, - "CVE-2017-18232": { - "cmt_msg": "scsi: libsas: direct call probe and destruct" + "CVE-2024-26706": { + "cmt_msg": "parisc: Fix random data corruption from exception handler" }, - "CVE-2019-2213": { - "cmt_msg": "binder: fix possible UAF when freeing buffer" + "CVE-2024-26704": { + "cmt_msg": "ext4: fix double-free of blocks due to wrong extents moved_len" }, - "CVE-2020-25211": { - "cmt_msg": "netfilter: ctnetlink: add a range check for l3/l4 protonum" + "CVE-2020-25672": { + "cmt_msg": "nfc: fix memory leak in llcp_sock_connect()" }, - "CVE-2017-14140": { - "cmt_msg": "Sanitize 'move_pages()' permission checks" + "CVE-2020-25673": { + "cmt_msg": "nfc: Avoid endless loops caused by repeated llcp_sock_connect()" }, - "CVE-2020-26556": { - "cmt_msg": "" + "CVE-2020-25670": { + "cmt_msg": "nfc: fix refcount leak in llcp_sock_bind()" }, - "CVE-2018-9518": { - "cmt_msg": "NFC: llcp: Limit size of SDP URI" + "CVE-2020-25671": { + "cmt_msg": "nfc: fix refcount leak in llcp_sock_connect()" }, - "CVE-2020-26555": { - "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical" + "CVE-2019-19813": { + "cmt_msg": "btrfs: inode: Verify inode mode to avoid NULL pointer dereference" }, - "CVE-2018-9517": { - "cmt_msg": "l2tp: pass tunnel pointer to ->session_create()" + "CVE-2020-29374": { + "cmt_msg": "gup: document and work around \"COW can break either way\" issue" }, - "CVE-2018-9516": { - "cmt_msg": "HID: debug: check length before copy_to_user()" + "CVE-2019-19815": { + "cmt_msg": "f2fs: support swap file w/ DIO" }, - "CVE-2023-3397": { + "CVE-2019-19814": { "cmt_msg": "" }, - "CVE-2018-1128": { - "cmt_msg": "libceph: add authorizer challenge" + "CVE-2020-29371": { + "cmt_msg": "romfs: fix uninitialized memory leak in romfs_dev_read()" }, - "CVE-2018-1129": { - "cmt_msg": "libceph: implement CEPHX_V2 calculation mode" + "CVE-2019-19816": { + "cmt_msg": "btrfs: inode: Verify inode mode to avoid NULL pointer dereference" }, - "CVE-2022-26365": { - "cmt_msg": "xen/blkfront: fix leaking data in shared pages" + "CVE-2018-18710": { + "cmt_msg": "cdrom: fix improper type cast, which can leat to information leak." }, - "CVE-2022-21125": { - "cmt_msg": "x86/speculation/mmio: Reuse SRBDS mitigation for SBDS" + "CVE-2023-34255": { + "cmt_msg": "xfs: verify buffer contents when we skip log replay" }, - "CVE-2018-1120": { - "cmt_msg": "proc: do not access cmdline nor environ from file-backed areas" + "CVE-2022-23040": { + "cmt_msg": "xen/xenbus: don't let xenbus_grant_ring() remove grants in error case" }, - "CVE-2018-1121": { - "cmt_msg": "" + "CVE-2023-3141": { + "cmt_msg": "memstick: r592: Fix UAF bug in r592_remove due to race condition" }, - "CVE-2018-20856": { - "cmt_msg": "block: blk_init_allocated_queue() set q->fq as NULL in the fail case" + "CVE-2020-12655": { + "cmt_msg": "xfs: add agf freeblocks verify in xfs_agf_verify" }, - "CVE-2023-52451": { - "cmt_msg": "powerpc/pseries/memhp: Fix access beyond end of drmem array" + "CVE-2022-3524": { + "cmt_msg": "tcp/udp: Fix memory leak in ipv6_renew_options()." }, - "CVE-2017-5754": { - "cmt_msg": "x86/cpufeatures: Add Intel feature bits for Speculation Control" + "CVE-2022-3523": { + "cmt_msg": "mm/memory.c: fix race when faulting a device private page" }, - "CVE-2022-3061": { - "cmt_msg": "video: fbdev: i740fb: Error out if 'pixclock' equals zero" + "CVE-2022-3522": { + "cmt_msg": "mm/hugetlb: use hugetlb_pte_stable in migration race check" }, - "CVE-2016-10200": { - "cmt_msg": "l2tp: fix racy SOCK_ZAPPED flag check in l2tp_ip{,6}_bind()" + "CVE-2018-7755": { + "cmt_msg": "floppy: Do not copy a kernel pointer to user memory in FDGETPRM ioctl" }, - "CVE-2017-5753": { - "cmt_msg": "x86/cpufeatures: Add X86_BUG_SPECTRE_V[12]" + "CVE-2017-7346": { + "cmt_msg": "drm/vmwgfx: limit the number of mip levels in vmw_gb_surface_define_ioctl()" }, - "CVE-2022-20158": { - "cmt_msg": "net/packet: fix slab-out-of-bounds access in packet_recvmsg()" + "CVE-2018-7757": { + "cmt_msg": "scsi: libsas: fix memory leak in sas_smp_get_phy_events()" }, - "CVE-2024-1086": { - "cmt_msg": "netfilter: nf_tables: reject QUEUE/DROP verdict parameters" + "CVE-2022-0330": { + "cmt_msg": "drm/i915: Flush TLBs before releasing backing store" }, - "CVE-2024-22386": { - "cmt_msg": "" + "CVE-2022-4095": { + "cmt_msg": "staging: rtl8712: fix use after free bugs" }, - "CVE-2016-10208": { - "cmt_msg": "ext4: validate s_first_meta_bg at mount time" + "CVE-2017-10911": { + "cmt_msg": "xen-blkback: don't leak stack data via response ring" }, - "CVE-2020-11565": { - "cmt_msg": "mm: mempolicy: require at least one nodeid for MPOL_PREFERRED" + "CVE-2022-45919": { + "cmt_msg": "media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221" }, - "CVE-2019-19049": { - "cmt_msg": "of: unittest: fix memory leak in unittest_data_add" + "CVE-2018-5873": { + "cmt_msg": "nsfs: mark dentry with DCACHE_RCUACCESS" }, - "CVE-2020-27784": { - "cmt_msg": "usb: gadget: function: printer: fix use-after-free in __lock_acquire" + "CVE-2016-9120": { + "cmt_msg": "staging/android/ion : fix a race condition in the ion driver" }, - "CVE-2018-13053": { - "cmt_msg": "alarmtimer: Prevent overflow for relative nanosleep" + "CVE-2021-3669": { + "cmt_msg": "ipc: replace costly bailout check in sysvipc_find_ipc()" }, - "CVE-2020-27786": { - "cmt_msg": "ALSA: rawmidi: Fix racy buffer resize under concurrent accesses" + "CVE-2019-3701": { + "cmt_msg": "can: gw: ensure DLC boundaries after CAN frame modification" }, - "CVE-2019-14816": { - "cmt_msg": "mwifiex: Fix three heap overflow at parsing element in cfg80211_ap_settings" + "CVE-2023-1095": { + "cmt_msg": "netfilter: nf_tables: fix null deref due to zeroed list head" }, - "CVE-2019-14814": { - "cmt_msg": "mwifiex: Fix three heap overflow at parsing element in cfg80211_ap_settings" + "CVE-2022-3239": { + "cmt_msg": "media: em28xx: initialize refcount before kref_get" }, - "CVE-2023-6240": { + "CVE-2022-4543": { "cmt_msg": "" }, - "CVE-2023-23559": { - "cmt_msg": "wifi: rndis_wlan: Prevent buffer overflow in rndis_query_oid" + "CVE-2017-11089": { + "cmt_msg": "cfg80211: Define nla_policy for NL80211_ATTR_LOCAL_MESH_POWER_MODE" }, - "CVE-2020-10720": { - "cmt_msg": "net-gro: fix use-after-free read in napi_gro_frags()" + "CVE-2019-18282": { + "cmt_msg": "net/flow_dissector: switch to siphash" }, - "CVE-2022-0382": { - "cmt_msg": "net ticp:fix a kernel-infoleak in __tipc_sendmsg()" + "CVE-2021-34981": { + "cmt_msg": "Bluetooth: cmtp: fix file refcount when cmtp_attach_device fails" }, - "CVE-2023-32233": { - "cmt_msg": "netfilter: nf_tables: deactivate anonymous set from preparation phase" + "CVE-2023-4881": { + "cmt_msg": "netfilter: nftables: exthdr: fix 4-byte stack OOB write" }, - "CVE-2020-25672": { - "cmt_msg": "nfc: fix memory leak in llcp_sock_connect()" + "CVE-2013-7445": { + "cmt_msg": "" }, - "CVE-2020-25673": { - "cmt_msg": "nfc: Avoid endless loops caused by repeated llcp_sock_connect()" + "CVE-2024-26804": { + "cmt_msg": "net: ip_tunnel: prevent perpetual headroom growth" }, - "CVE-2020-25670": { - "cmt_msg": "nfc: fix refcount leak in llcp_sock_bind()" + "CVE-2022-3303": { + "cmt_msg": "ALSA: pcm: oss: Fix race at SNDCTL_DSP_SYNC" }, - "CVE-2020-25671": { - "cmt_msg": "nfc: fix refcount leak in llcp_sock_connect()" + "CVE-2021-37159": { + "cmt_msg": "usb: hso: fix error handling code of hso_create_net_device" }, - "CVE-2019-15222": { - "cmt_msg": "ALSA: usb-audio: Fix gpf in snd_usb_pipe_sanity_check" + "CVE-2024-26801": { + "cmt_msg": "Bluetooth: Avoid potential use-after-free in hci_error_reset" }, - "CVE-2019-15223": { - "cmt_msg": "ALSA: line6: Assure canceling delayed work at disconnection" + "CVE-2022-28388": { + "cmt_msg": "can: usb_8dev: usb_8dev_start_xmit(): fix double dev_kfree_skb() in error path" }, - "CVE-2019-15220": { - "cmt_msg": "p54usb: Fix race between disconnect and firmware loading" + "CVE-2017-15115": { + "cmt_msg": "sctp: do not peel off an assoc from one netns to another one" }, - "CVE-2019-15221": { - "cmt_msg": "ALSA: line6: Fix write on zero-sized buffer" + "CVE-2018-1000004": { + "cmt_msg": "ALSA: seq: Make ioctls race-free" }, - "CVE-2019-19815": { - "cmt_msg": "f2fs: support swap file w/ DIO" + "CVE-2023-52607": { + "cmt_msg": "powerpc/mm: Fix null-pointer dereference in pgtable_cache_add" }, - "CVE-2019-19814": { - "cmt_msg": "" + "CVE-2019-20811": { + "cmt_msg": "net-sysfs: call dev_hold if kobject_init_and_add success" }, - "CVE-2020-29371": { - "cmt_msg": "romfs: fix uninitialized memory leak in romfs_dev_read()" + "CVE-2019-20810": { + "cmt_msg": "media: go7007: fix a miss of snd_card_free" }, - "CVE-2019-19816": { - "cmt_msg": "btrfs: inode: Verify inode mode to avoid NULL pointer dereference" + "CVE-2019-20812": { + "cmt_msg": "af_packet: set defaule value for tmo" }, - "CVE-2019-9453": { - "cmt_msg": "f2fs: fix to avoid accessing xattr across the boundary" + "CVE-2020-14314": { + "cmt_msg": "ext4: fix potential negative array index in do_split()" }, - "CVE-2022-1016": { - "cmt_msg": "netfilter: nf_tables: initialize registers in nft_do_chain()" + "CVE-2023-52601": { + "cmt_msg": "jfs: fix array-index-out-of-bounds in dbAdjTree" }, - "CVE-2018-18710": { - "cmt_msg": "cdrom: fix improper type cast, which can leat to information leak." + "CVE-2019-18660": { + "cmt_msg": "powerpc/book3s64: Fix link stack flush on context switch" }, - "CVE-2019-5108": { - "cmt_msg": "mac80211: Do not send Layer 2 Update frame before authorization" + "CVE-2024-23196": { + "cmt_msg": "ALSA: hda: fix a possible null-pointer dereference due to data race in snd_hdac_regmap_sync()" }, - "CVE-2022-1012": { - "cmt_msg": "secure_seq: use the 64 bits of the siphash for port offset calculation" + "CVE-2019-12380": { + "cmt_msg": "efi/x86/Add missing error handling to old_memmap 1:1 mapping code" }, - "CVE-2023-31436": { - "cmt_msg": "net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg" + "CVE-2019-12381": { + "cmt_msg": "ip_sockglue: Fix missing-check bug in ip_ra_control()" }, - "CVE-2020-12114": { - "cmt_msg": "make struct mountpoint bear the dentry reference to mountpoint, not struct mount" + "CVE-2019-12382": { + "cmt_msg": "drm/edid: Fix a missing-check bug in drm_load_edid_firmware()" }, - "CVE-2020-8649": { - "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region" + "CVE-2020-10766": { + "cmt_msg": "x86/speculation: Prevent rogue cross-process SSBD shutdown" }, - "CVE-2020-12656": { - "cmt_msg": "sunrpc: check that domain table is empty at module unload." + "CVE-2020-10767": { + "cmt_msg": "x86/speculation: Avoid force-disabling IBPB based on STIBP and enhanced IBRS." }, - "CVE-2023-20569": { - "cmt_msg": "x86/bugs: Increase the x86 bugs vector size to two u32s" + "CVE-2019-25162": { + "cmt_msg": "i2c: Fix a potential use after free" }, - "CVE-2021-26931": { - "cmt_msg": "xen-blkback: don't \"handle\" error by BUG()" + "CVE-2019-25160": { + "cmt_msg": "netlabel: fix out-of-bounds memory accesses" }, - "CVE-2021-26930": { - "cmt_msg": "xen-blkback: fix error handling in xen_blkbk_map()" + "CVE-2020-10768": { + "cmt_msg": "x86/speculation: PR_SPEC_FORCE_DISABLE enforcement for indirect branches." }, - "CVE-2021-26932": { - "cmt_msg": "Xen/x86: don't bail early from clear_foreign_p2m_mapping()" + "CVE-2020-10769": { + "cmt_msg": "crypto: authenc - fix parsing key with misaligned rta_len" }, - "CVE-2023-52456": { - "cmt_msg": "serial: imx: fix tx statemachine deadlock" + "CVE-2020-10942": { + "cmt_msg": "vhost: Check docket sk_family instead of call getname" }, - "CVE-2023-3141": { - "cmt_msg": "memstick: r592: Fix UAF bug in r592_remove due to race condition" + "CVE-2020-26139": { + "cmt_msg": "mac80211: do not accept/forward invalid EAPOL frames" }, - "CVE-2016-9555": { - "cmt_msg": "sctp: validate chunk len before actually using it" + "CVE-2019-19536": { + "cmt_msg": "can: peak_usb: pcan_usb_pro: Fix info-leaks to USB devices" }, - "CVE-2019-3892": { - "cmt_msg": "coredump: fix race condition between mmget_not_zero()/get_task_mm() and core dumping" + "CVE-2019-19537": { + "cmt_msg": "USB: core: Fix races in character device registration and deregistraion" }, - "CVE-2020-12352": { - "cmt_msg": "Bluetooth: A2MP: Fix not initializing all members" + "CVE-2019-19534": { + "cmt_msg": "can: peak_usb: fix slab info leak" }, - "CVE-2020-12655": { - "cmt_msg": "xfs: add agf freeblocks verify in xfs_agf_verify" + "CVE-2019-19535": { + "cmt_msg": "can: peak_usb: pcan_usb_fd: Fix info-leaks to USB devices" }, - "CVE-2022-20132": { - "cmt_msg": "HID: add hid_is_usb() function to make it simpler for USB detection" + "CVE-2019-19532": { + "cmt_msg": "HID: Fix assumption that devices have inputs" }, - "CVE-2022-0494": { - "cmt_msg": "block-map: add __GFP_ZERO flag for alloc_page in function bio_copy_kern" + "CVE-2019-19533": { + "cmt_msg": "media: ttusb-dec: Fix info-leak in ttusb_dec_send_command()" }, - "CVE-2023-2269": { - "cmt_msg": "dm ioctl: fix nested locking in table_clear() to remove deadlock concern" + "CVE-2019-19530": { + "cmt_msg": "usb: cdc-acm: make sure a refcount is taken early enough" }, - "CVE-2020-26088": { - "cmt_msg": "net/nfc/rawsock.c: add CAP_NET_RAW check." + "CVE-2019-19531": { + "cmt_msg": "usb: yurex: Fix use-after-free in yurex_delete" }, - "CVE-2022-3524": { - "cmt_msg": "tcp/udp: Fix memory leak in ipv6_renew_options()." + "CVE-2016-6156": { + "cmt_msg": "platform/chrome: cros_ec_dev - double fetch bug in ioctl" }, - "CVE-2022-3523": { - "cmt_msg": "mm/memory.c: fix race when faulting a device private page" + "CVE-2017-18257": { + "cmt_msg": "f2fs: fix a dead loop in f2fs_fiemap()" }, - "CVE-2015-7515": { - "cmt_msg": "Input: aiptek - fix crash on detecting device without endpoints" + "CVE-2017-18255": { + "cmt_msg": "perf/core: Fix the perf_cpu_time_max_percent check" }, - "CVE-2008-2544": { - "cmt_msg": "" + "CVE-2023-52527": { + "cmt_msg": "ipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data()" }, - "CVE-2021-3178": { - "cmt_msg": "nfsd4: readdirplus shouldn't return parent of export" + "CVE-2023-3006": { + "cmt_msg": "arm64: Add AMPERE1 to the Spectre-BHB affected list" }, - "CVE-2022-42703": { - "cmt_msg": "mm/rmap: Fix anon_vma->degree ambiguity leading to double-reuse" + "CVE-2023-52522": { + "cmt_msg": "net: fix possible store tearing in neigh_periodic_work()" }, - "CVE-2018-7755": { - "cmt_msg": "floppy: Do not copy a kernel pointer to user memory in FDGETPRM ioctl" + "CVE-2023-52528": { + "cmt_msg": "net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg" }, - "CVE-2017-7346": { - "cmt_msg": "drm/vmwgfx: limit the number of mip levels in vmw_gb_surface_define_ioctl()" + "CVE-2020-0305": { + "cmt_msg": "chardev: Avoid potential use-after-free in 'chrdev_open()'" }, - "CVE-2022-0330": { - "cmt_msg": "drm/i915: Flush TLBs before releasing backing store" + "CVE-2023-39198": { + "cmt_msg": "drm/qxl: fix UAF on handle creation" }, - "CVE-2007-3719": { - "cmt_msg": "" + "CVE-2023-39194": { + "cmt_msg": "net: xfrm: Fix xfrm_address_filter OOB read" }, - "CVE-2023-3863": { - "cmt_msg": "net: nfc: Fix use-after-free caused by nfc_llcp_find_local" + "CVE-2023-39197": { + "cmt_msg": "netfilter: conntrack: dccp: copy entire header to stack buffer, not just basic one" }, - "CVE-2023-0590": { - "cmt_msg": "net: sched: fix race condition in qdisc_graft()" + "CVE-2023-39193": { + "cmt_msg": "netfilter: xt_sctp: validate the flag_info count" }, - "CVE-2022-4095": { - "cmt_msg": "staging: rtl8712: fix use after free bugs" + "CVE-2023-39192": { + "cmt_msg": "netfilter: xt_u32: validate user space input" }, - "CVE-2022-45919": { - "cmt_msg": "media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221" + "CVE-2024-26600": { + "cmt_msg": "phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP" }, - "CVE-2019-19319": { - "cmt_msg": "ext4: protect journal inode's blocks using block_validity" + "CVE-2024-26606": { + "cmt_msg": "binder: signal epoll threads of self-work" }, - "CVE-2023-2248": { - "cmt_msg": "net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg" + "CVE-2017-14156": { + "cmt_msg": "video: fbdev: aty: do not leak uninitialized padding in clk to userspace" }, - "CVE-2023-30772": { - "cmt_msg": "power: supply: da9150: Fix use after free bug in da9150_charger_remove due to race condition" + "CVE-2023-52429": { + "cmt_msg": "dm: limit the number of targets and parameter size area" }, - "CVE-2023-1611": { - "cmt_msg": "btrfs: fix race between quota disable and quota assign ioctls" + "CVE-2015-8839": { + "cmt_msg": "ext4: fix races between page faults and hole punching" }, - "CVE-2021-3772": { - "cmt_msg": "sctp: use init_tag from inithdr for ABORT chunk" + "CVE-2022-1652": { + "cmt_msg": "floppy: use a statically allocated error counter" }, - "CVE-2021-3679": { - "cmt_msg": "tracing: Fix bug in rb_per_cpu_empty() that might cause deadloop." + "CVE-2020-29568": { + "cmt_msg": "xen/xenbus: Allow watches discard events before queueing" }, - "CVE-2021-37159": { - "cmt_msg": "usb: hso: fix error handling code of hso_create_net_device" + "CVE-2016-8666": { + "cmt_msg": "tunnels: Don't apply GRO to multiple layers of encapsulation." }, - "CVE-2022-2586": { - "cmt_msg": "netfilter: nf_tables: do not allow SET_ID to refer to another table" + "CVE-2019-13272": { + "cmt_msg": "ptrace: Fix ->ptracer_cred handling for PTRACE_TRACEME" }, - "CVE-2022-3629": { - "cmt_msg": "vsock: Fix memory leak in vsock_connect()" + "CVE-2022-1786": { + "cmt_msg": "io_uring: remove io_identity" }, - "CVE-2021-28715": { - "cmt_msg": "xen/netback: don't queue unlimited number of packages" + "CVE-2020-25669": { + "cmt_msg": "Input: sunkbd - avoid use-after-free in teardown paths" }, - "CVE-2021-28713": { - "cmt_msg": "xen/console: harden hvc_xen against event channel storms" + "CVE-2020-25668": { + "cmt_msg": "tty: make FONTX ioctl use the tty pointer they were actually passed" }, - "CVE-2021-28712": { - "cmt_msg": "xen/netfront: harden netfront against event channel storms" + "CVE-2008-4609": { + "cmt_msg": "" }, - "CVE-2017-18261": { - "cmt_msg": "clocksource/drivers/arm_arch_timer: Avoid infinite recursion when ftrace is enabled" + "CVE-2023-26607": { + "cmt_msg": "ntfs: fix out-of-bounds read in ntfs_attr_find()" }, - "CVE-2021-4157": { - "cmt_msg": "pNFS/flexfiles: fix incorrect size check in decode_nfs_fh()" + "CVE-2021-4037": { + "cmt_msg": "xfs: fix up non-directory creation in SGID directories" }, - "CVE-2023-51782": { - "cmt_msg": "net/rose: Fix Use-After-Free in rose_ioctl" + "CVE-2021-22543": { + "cmt_msg": "KVM: do not allow mapping valid but non-reference-counted pages" }, - "CVE-2022-3621": { - "cmt_msg": "nilfs2: fix NULL pointer dereference at nilfs_bmap_lookup_at_level()" + "CVE-2018-18386": { + "cmt_msg": "n_tty: fix EXTPROC vs ICANON interaction with TIOCINQ (aka FIONREAD)" }, - "CVE-2022-23960": { - "cmt_msg": "ARM: report Spectre v2 status through sysfs" + "CVE-2021-47169": { + "cmt_msg": "serial: rp2: use 'request_firmware' instead of 'request_firmware_nowait'" }, - "CVE-2017-11472": { - "cmt_msg": "ACPICA: Namespace: fix operand cache leak" + "CVE-2016-8405": { + "cmt_msg": "fbdev: color map copying bounds checking" }, - "CVE-2022-3624": { - "cmt_msg": "bonding: fix reference count leak in balance-alb mode" + "CVE-2023-3776": { + "cmt_msg": "net/sched: cls_fw: Fix improper refcount update leads to use-after-free" }, - "CVE-2017-17862": { - "cmt_msg": "bpf: fix branch pruning logic" + "CVE-2017-9242": { + "cmt_msg": "ipv6: fix out of bound writes in __ip6_append_data()" }, - "CVE-2021-39657": { - "cmt_msg": "scsi: ufs: Correct the LUN used in eh_device_reset_handler() callback" + "CVE-2023-3772": { + "cmt_msg": "xfrm: add NULL check in xfrm_update_ae_params" }, - "CVE-2021-3669": { - "cmt_msg": "ipc: replace costly bailout check in sysvipc_find_ipc()" + "CVE-2022-3533": { + "cmt_msg": "" }, - "CVE-2019-18885": { - "cmt_msg": "btrfs: merge btrfs_find_device and find_device" + "CVE-2022-3534": { + "cmt_msg": "libbpf: Fix use-after-free in btf_dump_name_dups" }, - "CVE-2022-4744": { - "cmt_msg": "tun: avoid double free in tun_free_netdev" + "CVE-2016-10088": { + "cmt_msg": "sg_write()/bsg_write() is not fit to be called under KERNEL_DS" }, - "CVE-2019-12378": { - "cmt_msg": "ipv6_sockglue: Fix a missing-check bug in ip6_ra_control()" + "CVE-2016-9685": { + "cmt_msg": "xfs: fix two memory leaks in xfs_attr_list.c error paths" }, - "CVE-2019-11091": { - "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" + "CVE-2021-4149": { + "cmt_msg": "btrfs: unlock newly allocated extent buffer after error" }, - "CVE-2022-3239": { - "cmt_msg": "media: em28xx: initialize refcount before kref_get" + "CVE-2022-21385": { + "cmt_msg": "net/rds: fix warn in rds_message_alloc_sgs" }, - "CVE-2022-4543": { - "cmt_msg": "" + "CVE-2021-47180": { + "cmt_msg": "NFC: nci: fix memory leak in nci_allocate_device" }, - "CVE-2023-4921": { - "cmt_msg": "net: sched: sch_qfq: Fix UAF in qfq_dequeue()" + "CVE-2020-28097": { + "cmt_msg": "vgacon: remove software scrollback support" }, - "CVE-2022-3424": { - "cmt_msg": "misc: sgi-gru: fix use-after-free error in gru_set_context_option, gru_fault and gru_handle_user_call_os" + "CVE-2017-7533": { + "cmt_msg": "dentry name snapshots" }, - "CVE-2023-1829": { - "cmt_msg": "net/sched: Retire tcindex classifier" + "CVE-2018-8897": { + "cmt_msg": "x86/entry/64: Don't use IST entry for #BP stack" }, - "CVE-2019-19227": { - "cmt_msg": "appletalk: Fix potential NULL pointer dereference in unregister_snap_client" + "CVE-2016-4794": { + "cmt_msg": "percpu: fix synchronization between chunk->map_extend_work and chunk destruction" }, - "CVE-2021-34981": { - "cmt_msg": "Bluetooth: cmtp: fix file refcount when cmtp_attach_device fails" + "CVE-2020-14416": { + "cmt_msg": "can, slip: Protect tty->disc_data in write_wakeup and close with RCU" }, - "CVE-2023-1670": { - "cmt_msg": "xirc2ps_cs: Fix use after free bug in xirc2ps_detach" + "CVE-2021-46928": { + "cmt_msg": "parisc: Clear stale IIR value on instruction access rights trap" }, - "CVE-2023-4881": { - "cmt_msg": "netfilter: nftables: exthdr: fix 4-byte stack OOB write" + "CVE-2018-14634": { + "cmt_msg": "exec: Limit arg stack to at most 75% of _STK_LIM" }, - "CVE-2023-6915": { - "cmt_msg": "ida: Fix crash in ida_free when the bitmap is empty" + "CVE-2018-14633": { + "cmt_msg": "scsi: target: iscsi: Use hex2bin instead of a re-implementation" }, - "CVE-2017-16649": { - "cmt_msg": "net: cdc_ether: fix divide by 0 on bad descriptors" + "CVE-2021-46924": { + "cmt_msg": "NFC: st21nfca: Fix memory leak in device probe and remove" }, - "CVE-2022-1786": { - "cmt_msg": "io_uring: remove io_identity" + "CVE-2021-46926": { + "cmt_msg": "ALSA: hda: intel-sdw-acpi: harden detection of controller" }, - "CVE-2013-7445": { - "cmt_msg": "" + "CVE-2016-10318": { + "cmt_msg": "fscrypto: add authorization check for setting encryption policy" }, - "CVE-2021-0941": { - "cmt_msg": "bpf: Remove MTU check in __bpf_skb_max_len" + "CVE-2016-9754": { + "cmt_msg": "ring-buffer: Prevent overflow of size in ring_buffer_resize()" }, - "CVE-2023-34255": { - "cmt_msg": "xfs: verify buffer contents when we skip log replay" + "CVE-2016-9756": { + "cmt_msg": "KVM: x86: drop error recovery in em_jmp_far and em_ret_far" }, - "CVE-2022-26966": { - "cmt_msg": "sr9700: sanity check for packet length" + "CVE-2017-2636": { + "cmt_msg": "tty: n_hdlc: get rid of racy n_hdlc.tbuf" }, - "CVE-2022-38096": { - "cmt_msg": "" + "CVE-2023-1206": { + "cmt_msg": "tcp: Reduce chance of collisions in inet6_hashfn()." }, - "CVE-2021-34693": { - "cmt_msg": "can: bcm: fix infoleak in struct bcm_msg_head" + "CVE-2022-3649": { + "cmt_msg": "nilfs2: fix use-after-free bug of struct nilfs_root" }, - "CVE-2024-26591": { - "cmt_msg": "bpf: Fix re-attachment branch in bpf_tracing_prog_attach" + "CVE-2022-3646": { + "cmt_msg": "nilfs2: fix leak of nilfs_root in case of writer thread creation failure" }, - "CVE-2020-14381": { - "cmt_msg": "futex: Fix inode life-time issue" + "CVE-2022-3642": { + "cmt_msg": "" }, - "CVE-2019-19768": { - "cmt_msg": "blktrace: Protect q->blk_trace with RCU" + "CVE-2022-3643": { + "cmt_msg": "xen/netback: Ensure protocol headers don't fall in the non-linear area" }, - "CVE-2022-3303": { - "cmt_msg": "ALSA: pcm: oss: Fix race at SNDCTL_DSP_SYNC" + "CVE-2021-1048": { + "cmt_msg": "fix regression in \"epoll: Keep a reference on files added to the check list\"" }, - "CVE-2017-8797": { - "cmt_msg": "nfsd: fix undefined behavior in nfsd4_layout_verify" + "CVE-2020-0543": { + "cmt_msg": "x86/cpu: Add 'table' argument to cpu_matches()" }, - "CVE-2017-5715": { - "cmt_msg": "x86/cpufeatures: Add X86_BUG_SPECTRE_V[12]" + "CVE-2024-25739": { + "cmt_msg": "" }, - "CVE-2022-20141": { - "cmt_msg": "igmp: Add ip_mc_list lock in ip_check_mc_rcu" + "CVE-2023-6535": { + "cmt_msg": "" }, - "CVE-2023-23455": { - "cmt_msg": "net: sched: atm: dont intepret cls results when asked to drop" + "CVE-2023-6536": { + "cmt_msg": "nvmet-tcp: fix a crash in nvmet_req_complete()" }, - "CVE-2023-23454": { - "cmt_msg": "net: sched: cbq: dont intepret cls results when asked to drop" + "CVE-2019-11810": { + "cmt_msg": "scsi: megaraid_sas: return error when create DMA pool failed" }, - "CVE-2016-8630": { - "cmt_msg": "kvm: x86: Check memopp before dereference (CVE-2016-8630)" + "CVE-2019-11815": { + "cmt_msg": "net: rds: force to destroy connection if t_sock is NULL in rds_tcp_kill_sock()." }, - "CVE-2018-3620": { - "cmt_msg": "x86/microcode: Allow late microcode loading with SMT disabled" + "CVE-2022-36280": { + "cmt_msg": "drm/vmwgfx: Validate the box size for the snooped cursor" }, - "CVE-2023-6932": { - "cmt_msg": "ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet" + "CVE-2024-21803": { + "cmt_msg": "" }, - "CVE-2020-16166": { - "cmt_msg": "random32: update the net random state on interrupt and activity" + "CVE-2018-7995": { + "cmt_msg": "x86/MCE: Serialize sysfs changes" }, - "CVE-2021-29155": { - "cmt_msg": "bpf: Use correct permission flag for mixed signed bounds arithmetic" + "CVE-2018-16276": { + "cmt_msg": "USB: yurex: fix out-of-bounds uaccess in read handler" }, - "CVE-2021-33631": { - "cmt_msg": "ext4: fix kernel BUG in 'ext4_write_inline_data_end()'" + "CVE-2019-16413": { + "cmt_msg": "9p: use inode->i_lock to protect i_size_write() under 32-bit" }, - "CVE-2019-15916": { - "cmt_msg": "net-sysfs: Fix mem leak in netdev_register_kobject" + "CVE-2019-7222": { + "cmt_msg": "KVM: x86: work around leak of uninitialized stack contents (CVE-2019-7222)" }, - "CVE-2019-15917": { - "cmt_msg": "Bluetooth: hci_ldisc: Postpone HCI_UART_PROTO_READY bit set in hci_uart_set_proto()" + "CVE-2019-7221": { + "cmt_msg": "KVM: nVMX: unconditionally cancel preemption timer in free_nested (CVE-2019-7221)" }, - "CVE-2024-26598": { - "cmt_msg": "KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache" + "CVE-2020-10773": { + "cmt_msg": "s390/cmm: fix information leak in cmm_timeout_handler()" }, - "CVE-2020-12362": { - "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" + "CVE-2020-36780": { + "cmt_msg": "i2c: sprd: fix reference leak when pm_runtime_get_sync fails" }, - "CVE-2020-12363": { - "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" + "CVE-2018-18281": { + "cmt_msg": "mremap: properly flush TLB before releasing the page" }, - "CVE-2019-12881": { - "cmt_msg": "drm/i915/userptr: reject zero user_size" + "CVE-2022-2663": { + "cmt_msg": "netfilter: nf_conntrack_irc: Fix forged IP logic" }, - "CVE-2022-4129": { - "cmt_msg": "l2tp: Serialize access to sk_user_data with sk_callback_lock" + "CVE-2024-26803": { + "cmt_msg": "net: veth: clear GRO when clearing XDP even when down" }, - "CVE-2023-3117": { - "cmt_msg": "netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE" + "CVE-2020-25643": { + "cmt_msg": "hdlc_ppp: add range checks in ppp_cp_parse_cr()" }, - "CVE-2020-12364": { - "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" + "CVE-2020-4788": { + "cmt_msg": "powerpc/64s: flush L1D on kernel entry" }, - "CVE-2018-18690": { - "cmt_msg": "xfs: don't fail when converting shortform attr to long form during ATTR_REPLACE" + "CVE-2021-39698": { + "cmt_msg": "wait: add wake_up_pollfree()" }, - "CVE-2022-28388": { - "cmt_msg": "can: usb_8dev: usb_8dev_start_xmit(): fix double dev_kfree_skb() in error path" + "CVE-2018-5333": { + "cmt_msg": "RDS: null pointer dereference in rds_atomic_free_op" }, - "CVE-2021-0605": { - "cmt_msg": "af_key: pfkey_dump needs parameter validation" + "CVE-2018-5332": { + "cmt_msg": "RDS: Heap OOB write in rds_message_alloc_sgs()" }, - "CVE-2021-3896": { - "cmt_msg": "isdn: cpai: check ctr->cnr to avoid array index out of bound" + "CVE-2019-19528": { + "cmt_msg": "USB: iowarrior: fix use-after-free on disconnect" }, - "CVE-2016-7917": { - "cmt_msg": "netfilter: nfnetlink: correctly validate length of batch messages" + "CVE-2017-17448": { + "cmt_msg": "netfilter: nfnetlink_cthelper: Add missing permission checks" }, - "CVE-2023-26545": { - "cmt_msg": "net: mpls: fix stale pointer if allocation fails during device rename" + "CVE-2017-17449": { + "cmt_msg": "netlink: Add netns check on taps" }, - "CVE-2021-38204": { - "cmt_msg": "usb: max-3421: Prevent corruption of freed memory" + "CVE-2019-19525": { + "cmt_msg": "ieee802154: atusb: fix use-after-free at disconnect" }, - "CVE-2022-34918": { - "cmt_msg": "netfilter: nf_tables: stricter validation of element data" + "CVE-2019-19524": { + "cmt_msg": "Input: ff-memless - kill timer in destroy()" }, - "CVE-2019-16232": { - "cmt_msg": "libertas: fix a potential NULL pointer dereference" + "CVE-2019-19527": { + "cmt_msg": "HID: hiddev: do cleanup in failure of opening a device" }, - "CVE-2019-20811": { - "cmt_msg": "net-sysfs: call dev_hold if kobject_init_and_add success" + "CVE-2021-3753": { + "cmt_msg": "vt_kdsetmode: extend console locking" }, - "CVE-2019-20810": { - "cmt_msg": "media: go7007: fix a miss of snd_card_free" + "CVE-2021-3752": { + "cmt_msg": "Bluetooth: fix use-after-free error in lock_sock_nested()" }, - "CVE-2019-20812": { - "cmt_msg": "af_packet: set defaule value for tmo" + "CVE-2023-7192": { + "cmt_msg": "netfilter: ctnetlink: fix possible refcount leak in ctnetlink_create_conntrack()" }, - "CVE-2023-1990": { - "cmt_msg": "nfc: st-nci: Fix use after free bug in ndlc_remove due to race condition" + "CVE-2017-18249": { + "cmt_msg": "f2fs: fix race condition in between free nid allocator/initializer" }, - "CVE-2020-14314": { - "cmt_msg": "ext4: fix potential negative array index in do_split()" + "CVE-2022-1263": { + "cmt_msg": "KVM: avoid NULL pointer dereference in kvm_dirty_ring_push" }, - "CVE-2018-25020": { - "cmt_msg": "bpf: fix truncated jump targets on heavy expansions" + "CVE-2017-18241": { + "cmt_msg": "f2fs: fix a panic caused by NULL flush_cmd_control" }, - "CVE-2022-26373": { - "cmt_msg": "x86/speculation: Add RSB VM Exit protections" + "CVE-2019-15215": { + "cmt_msg": "media: cpia2_usb: first wake up, then free in disconnect" }, - "CVE-2018-5995": { - "cmt_msg": "printk: hash addresses printed with %p" + "CVE-2022-2209": { + "cmt_msg": "" }, - "CVE-2019-18660": { - "cmt_msg": "powerpc/book3s64: Fix link stack flush on context switch" + "CVE-2023-7042": { + "cmt_msg": "wifi: ath10k: fix NULL pointer dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev()" }, - "CVE-2019-15291": { - "cmt_msg": "media: b2c2-flexcop-usb: add sanity checking" + "CVE-2023-52559": { + "cmt_msg": "iommu/vt-d: Avoid memory allocation in iommu_suspend()" }, - "CVE-2019-15290": { - "cmt_msg": "" + "CVE-2023-47233": { + "cmt_msg": "wifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach" }, - "CVE-2023-3212": { - "cmt_msg": "gfs2: Don't deref jdesc in evict" + "CVE-2022-1462": { + "cmt_msg": "tty: use new tty_insert_flip_string_and_push_buffer() in pty_write()" }, - "CVE-2024-23848": { - "cmt_msg": "" + "CVE-2019-20636": { + "cmt_msg": "Input: add safety guards to input_set_keycode()" }, - "CVE-2018-7273": { - "cmt_msg": "printk: hash addresses printed with %p" + "CVE-2019-0148": { + "cmt_msg": "i40e: Wrong truncation from u16 to u8" }, - "CVE-2023-4459": { - "cmt_msg": "net: vmxnet3: fix possible NULL pointer dereference in vmxnet3_rq_cleanup()" + "CVE-2023-52434": { + "cmt_msg": "smb: client: fix potential OOBs in smb2_parse_contexts()" }, - "CVE-2022-23036": { - "cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()" + "CVE-2023-52436": { + "cmt_msg": "f2fs: explicitly null-terminate the xattr list" }, - "CVE-2022-2153": { - "cmt_msg": "KVM: x86: Avoid theoretical NULL pointer dereference in kvm_irq_delivery_to_apic_fast()" + "CVE-2023-51779": { + "cmt_msg": "Bluetooth: af_bluetooth: Fix Use-After-Free in bt_sock_recvmsg" }, - "CVE-2022-20566": { - "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free caused by l2cap_chan_put" + "CVE-2018-10877": { + "cmt_msg": "ext4: verify the depth of extent tree in ext4_find_extent()" }, - "CVE-2018-12930": { - "cmt_msg": "" + "CVE-2018-10876": { + "cmt_msg": "ext4: only look at the bg_flags field if it is valid" }, - "CVE-2018-12931": { + "CVE-2010-4563": { "cmt_msg": "" }, - "CVE-2024-23196": { - "cmt_msg": "" + "CVE-2016-8655": { + "cmt_msg": "packet: fix race condition in packet_set_ring" }, - "CVE-2016-0758": { - "cmt_msg": "KEYS: Fix ASN.1 indefinite length object parsing" + "CVE-2023-2162": { + "cmt_msg": "scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress" }, - "CVE-2020-12769": { - "cmt_msg": "spi: spi-dw: Add lock protect dw_spi rx/tx to prevent concurrent calls" + "CVE-2016-8658": { + "cmt_msg": "brcmfmac: avoid potential stack overflow in brcmf_cfg80211_start_ap()" }, - "CVE-2016-9756": { - "cmt_msg": "KVM: x86: drop error recovery in em_jmp_far and em_ret_far" + "CVE-2018-10879": { + "cmt_msg": "ext4: make sure bitmaps and the inode table don't overlap with bg descriptors" }, - "CVE-2021-32399": { - "cmt_msg": "bluetooth: eliminate the potential race condition when removing the HCI controller" + "CVE-2019-14835": { + "cmt_msg": "vhost: make sure log_num < in_num" }, - "CVE-2019-12380": { - "cmt_msg": "efi/x86/Add missing error handling to old_memmap 1:1 mapping code" + "CVE-2023-4622": { + "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES" }, - "CVE-2019-12381": { - "cmt_msg": "ip_sockglue: Fix missing-check bug in ip_ra_control()" + "CVE-2023-4623": { + "cmt_msg": "net/sched: sch_hfsc: Ensure inner classes have fsc curve" }, - "CVE-2019-12382": { - "cmt_msg": "drm/edid: Fix a missing-check bug in drm_load_edid_firmware()" + "CVE-2021-38300": { + "cmt_msg": "bpf, mips: Validate conditional branch offsets" }, - "CVE-2017-10810": { - "cmt_msg": "drm/virtio: don't leak bo on drm_gem_object_init failure" + "CVE-2020-25656": { + "cmt_msg": "vt: keyboard, extend func_buf_lock to readers" }, - "CVE-2022-24958": { - "cmt_msg": "usb: gadget: don't release an existing dev->buf" + "CVE-2021-4023": { + "cmt_msg": "io-wq: fix cancellation on create-worker failure" }, - "CVE-2020-8648": { - "cmt_msg": "vt: selection, close sel_buffer race" + "CVE-2021-22555": { + "cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write" }, - "CVE-2021-3732": { - "cmt_msg": "ovl: prevent private clone if bind mount is not allowed" + "CVE-2016-3689": { + "cmt_msg": "Input: ims-pcu - sanity check against missing interfaces" }, - "CVE-2022-25375": { - "cmt_msg": "usb: gadget: rndis: check size of RNDIS_MSG_SET command" + "CVE-2023-3161": { + "cmt_msg": "fbcon: Check font dimension limits" }, - "CVE-2020-10766": { - "cmt_msg": "x86/speculation: Prevent rogue cross-process SSBD shutdown" + "CVE-2018-7191": { + "cmt_msg": "tun: call dev_get_valid_name() before register_netdevice()" }, - "CVE-2017-13166": { - "cmt_msg": "media: v4l2-ioctl.c: use check_fmt for enum/g/s/try_fmt" + "CVE-2018-10675": { + "cmt_msg": "mm/mempolicy: fix use after free when calling get_mempolicy" }, - "CVE-2018-12207": { - "cmt_msg": "kvm: x86, powerpc: do not allow clearing largepages debugfs entry" + "CVE-2017-0786": { + "cmt_msg": "brcmfmac: add length check in brcmf_cfg80211_escan_handler()" }, - "CVE-2022-20369": { - "cmt_msg": "media: v4l2-mem2mem: Apply DST_QUEUE_OFF_BASE on MMAP buffers across ioctls" + "CVE-2021-47082": { + "cmt_msg": "tun: avoid double free in tun_free_netdev" }, - "CVE-2020-13143": { - "cmt_msg": "USB: gadget: fix illegal array access in binding with UDC" + "CVE-2021-47083": { + "cmt_msg": "pinctrl: mediatek: fix global-out-of-bounds issue" }, - "CVE-2020-10768": { - "cmt_msg": "x86/speculation: PR_SPEC_FORCE_DISABLE enforcement for indirect branches." + "CVE-2021-31916": { + "cmt_msg": "dm ioctl: fix out of bounds array access when no devices" }, - "CVE-2017-13168": { - "cmt_msg": "scsi: sg: mitigate read/write abuse" + "CVE-2021-47086": { + "cmt_msg": "phonet/pep: refuse to enable an unbound pipe" }, - "CVE-2024-25740": { - "cmt_msg": "" + "CVE-2023-32269": { + "cmt_msg": "netrom: Fix use-after-free caused by accept on already connected socket" }, - "CVE-2019-0148": { - "cmt_msg": "i40e: Wrong truncation from u16 to u8" + "CVE-2021-4157": { + "cmt_msg": "pNFS/flexfiles: fix incorrect size check in decode_nfs_fh()" }, - "CVE-2022-2978": { - "cmt_msg": "fs: fix UAF/GPF bug in nilfs_mdt_destroy" + "CVE-2021-4155": { + "cmt_msg": "xfs: map unwritten blocks in XFS_IOC_{ALLOC,FREE}SP just like fallocate" }, - "CVE-2019-17075": { - "cmt_msg": "RDMA/cxgb4: Do not dma memory off of the stack" + "CVE-2021-4150": { + "cmt_msg": "block: fix incorrect references to disk objects" }, - "CVE-2022-3903": { - "cmt_msg": "media: mceusb: Use new usb_control_msg_*() routines" + "CVE-2021-4159": { + "cmt_msg": "bpf: Verifer, adjust_scalar_min_max_vals to always call update_reg_bounds()" }, - "CVE-2019-19447": { - "cmt_msg": "ext4: work around deleting a file with i_nlink == 0 safely" + "CVE-2021-29154": { + "cmt_msg": "bpf, x86: Validate computation of branch displacements for x86-64" }, - "CVE-2023-20588": { - "cmt_msg": "x86/CPU/AMD: Do not leak quotient data after a division by 0" + "CVE-2021-29155": { + "cmt_msg": "bpf: Use correct permission flag for mixed signed bounds arithmetic" }, - "CVE-2020-10942": { - "cmt_msg": "vhost: Check docket sk_family instead of call getname" + "CVE-2018-10902": { + "cmt_msg": "ALSA: rawmidi: Change resized buffers atomically" }, - "CVE-2018-3693": { - "cmt_msg": "ext4: fix spectre gadget in ext4_mb_regular_allocator()" + "CVE-2022-25375": { + "cmt_msg": "usb: gadget: rndis: check size of RNDIS_MSG_SET command" }, - "CVE-2023-3338": { - "cmt_msg": "Remove DECnet support from kernel" + "CVE-2021-47158": { + "cmt_msg": "net: dsa: sja1105: add error handling in sja1105_setup()" }, - "CVE-2019-11190": { - "cmt_msg": "binfmt_elf: switch to new creds when switching to new mm" + "CVE-2021-47153": { + "cmt_msg": "i2c: i801: Don't generate an interrupt on bus reset" }, - "CVE-2019-11191": { - "cmt_msg": "x86: Deprecate a.out support" + "CVE-2021-47150": { + "cmt_msg": "net: fec: fix the potential memory leak in fec_enet_init()" }, - "CVE-2018-10323": { - "cmt_msg": "xfs: set format back to extents if xfs_bmap_extents_to_btree" + "CVE-2021-47151": { + "cmt_msg": "interconnect: qcom: bcm-voter: add a missing of_node_put()" }, - "CVE-2018-10322": { - "cmt_msg": "xfs: enhance dinode verifier" + "CVE-2021-46936": { + "cmt_msg": "net: fix use-after-free in tw_timer_handler" }, - "CVE-2023-1989": { - "cmt_msg": "Bluetooth: btsdio: fix use after free bug in btsdio_remove due to unfinished work" + "CVE-2021-46933": { + "cmt_msg": "usb: gadget: f_fs: Clear ffs_eventfd in ffs_data_clear." }, - "CVE-2021-0447": { - "cmt_msg": "l2tp: protect sock pointer of struct pppol2tp_session with RCU" + "CVE-2021-46932": { + "cmt_msg": "Input: appletouch - initialize work before device registration" }, - "CVE-2020-26139": { - "cmt_msg": "mac80211: do not accept/forward invalid EAPOL frames" + "CVE-2021-46939": { + "cmt_msg": "tracing: Restructure trace_clock_global() to never block" }, - "CVE-2019-10220": { - "cmt_msg": "Convert filldir[64]() from __put_user() to unsafe_put_user()" + "CVE-2018-16862": { + "cmt_msg": "mm: cleancache: fix corruption on missed inode invalidation" }, - "CVE-2018-17182": { - "cmt_msg": "mm: get rid of vmacache_flush_all() entirely" + "CVE-2024-26623": { + "cmt_msg": "pds_core: Prevent race issues involving the adminq" }, - "CVE-2019-19536": { - "cmt_msg": "can: peak_usb: pcan_usb_pro: Fix info-leaks to USB devices" + "CVE-2018-16884": { + "cmt_msg": "sunrpc: use-after-free in svc_process_common()" }, - "CVE-2019-19537": { - "cmt_msg": "USB: core: Fix races in character device registration and deregistraion" + "CVE-2022-45885": { + "cmt_msg": "" }, - "CVE-2019-19534": { - "cmt_msg": "can: peak_usb: fix slab info leak" + "CVE-2022-45884": { + "cmt_msg": "" }, - "CVE-2019-19535": { - "cmt_msg": "can: peak_usb: pcan_usb_fd: Fix info-leaks to USB devices" + "CVE-2022-45887": { + "cmt_msg": "media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb()" }, - "CVE-2019-19532": { - "cmt_msg": "HID: Fix assumption that devices have inputs" + "CVE-2022-45886": { + "cmt_msg": "media: dvb-core: Fix use-after-free due on race condition at dvb_net" }, - "CVE-2018-14617": { - "cmt_msg": "hfsplus: fix NULL dereference in hfsplus_lookup()" + "CVE-2024-25744": { + "cmt_msg": "x86/coco: Disable 32-bit emulation by default on TDX and SEV" }, - "CVE-2019-10638": { - "cmt_msg": "inet: switch IP ID generator to siphash" + "CVE-2015-2877": { + "cmt_msg": "" }, - "CVE-2019-10639": { - "cmt_msg": "netns: provide pure entropy for net_hash_mix()" + "CVE-2023-37454": { + "cmt_msg": "" }, - "CVE-2021-0929": { - "cmt_msg": "staging/android/ion: delete dma_buf->kmap/unmap implemenation" + "CVE-2018-1130": { + "cmt_msg": "dccp: check sk for closed state in dccp_sendmsg()" }, - "CVE-2018-14616": { - "cmt_msg": "f2fs: fix to do sanity check with block address in main area v2" + "CVE-2021-45486": { + "cmt_msg": "inet: use bigger hash table for IP ID generation" }, - "CVE-2018-19985": { - "cmt_msg": "USB: hso: Fix OOB memory access in hso_probe/hso_get_config_data" + "CVE-2021-3506": { + "cmt_msg": "f2fs: fix to avoid out-of-bounds memory access" }, - "CVE-2018-6554": { - "cmt_msg": "staging: irda: remove the irda network stack and drivers" + "CVE-2020-14331": { + "cmt_msg": "vgacon: Fix for missing check in scrollback handling" }, - "CVE-2018-6555": { - "cmt_msg": "staging: irda: remove the irda network stack and drivers" + "CVE-2022-36123": { + "cmt_msg": "x86: Clear .brk area at early boot" }, - "CVE-2021-0920": { - "cmt_msg": "af_unix: fix garbage collect vs MSG_PEEK" + "CVE-2020-11565": { + "cmt_msg": "mm: mempolicy: require at least one nodeid for MPOL_PREFERRED" }, - "CVE-2018-5953": { - "cmt_msg": "printk: hash addresses printed with %p" + "CVE-2019-3901": { + "cmt_msg": "perf/core: Fix perf_event_open() vs. execve() race" }, - "CVE-2024-26587": { - "cmt_msg": "net: netdevsim: don't try to destroy PHC on VFs" + "CVE-2020-36558": { + "cmt_msg": "vt: vt_ioctl: fix race in VT_RESIZEX" }, - "CVE-2023-51043": { - "cmt_msg": "drm/atomic: Fix potential use-after-free in nonblocking commits" + "CVE-2018-13100": { + "cmt_msg": "f2fs: fix to do sanity check with secs_per_zone" }, - "CVE-2020-28374": { - "cmt_msg": "scsi: target: Fix XCOPY NAA identifier lookup" + "CVE-2017-5897": { + "cmt_msg": "ip6_gre: fix ip6gre_err() invalid reads" }, - "CVE-2019-9213": { - "cmt_msg": "mm: enforce min addr even if capable() in expand_downwards()" + "CVE-2017-6074": { + "cmt_msg": "dccp: fix freeing skb too early for IPV6_RECVPKTINFO" }, - "CVE-2023-2007": { - "cmt_msg": "scsi: dpt_i2o: Remove obsolete driver" + "CVE-2020-36158": { + "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_cmd_802_11_ad_hoc_start" }, - "CVE-2023-0615": { - "cmt_msg": "media: vivid: dev->bitmap_cap wasn't freed in all cases" + "CVE-2016-6828": { + "cmt_msg": "tcp: fix use after free in tcp_xmit_retransmit_queue()" }, - "CVE-2020-26557": { - "cmt_msg": "" + "CVE-2021-39686": { + "cmt_msg": "binder: use euid from cred instead of using task" }, - "CVE-2019-14896": { - "cmt_msg": "libertas: Fix two buffer overflows at parsing bss descriptor" + "CVE-2021-39685": { + "cmt_msg": "USB: gadget: detect too-big endpoint 0 requests" }, - "CVE-2019-14897": { - "cmt_msg": "libertas: Fix two buffer overflows at parsing bss descriptor" + "CVE-2018-1000204": { + "cmt_msg": "scsi: sg: allocate with __GFP_ZERO in sg_build_indirect()" }, - "CVE-2019-14895": { - "cmt_msg": "mwifiex: fix possible heap overflow in mwifiex_process_country_ie()" + "CVE-2017-12134": { + "cmt_msg": "xen: fix bio vec merging" }, - "CVE-2022-3586": { - "cmt_msg": "sch_sfb: Don't assume the skb is still around after enqueueing to child" + "CVE-2017-17450": { + "cmt_msg": "netfilter: xt_osf: Add missing permission checks" }, "CVE-2024-26592": { "cmt_msg": "ksmbd: fix UAF issue in ksmbd_tcp_new_connection()" }, - "CVE-2020-26147": { - "cmt_msg": "mac80211: assure all fragments are encrypted" + "CVE-2016-3672": { + "cmt_msg": "x86/mm/32: Enable full randomization on i386 and X86_32" }, - "CVE-2023-3006": { - "cmt_msg": "arm64: Add AMPERE1 to the Spectre-BHB affected list" + "CVE-2024-26594": { + "cmt_msg": "ksmbd: validate mech token in session setup" }, - "CVE-2020-27825": { - "cmt_msg": "tracing: Fix race in trace_open and buffer resize call" + "CVE-2017-18270": { + "cmt_msg": "KEYS: prevent creating a different user's keyrings" }, - "CVE-2019-2181": { - "cmt_msg": "binder: check for overflow when alloc for security context" + "CVE-2024-26598": { + "cmt_msg": "KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache" }, - "CVE-2020-27820": { - "cmt_msg": "drm/nouveau: use drm_dev_unplug() during device removal" + "CVE-2016-6480": { + "cmt_msg": "aacraid: Check size values after double-fetch from user" }, - "CVE-2020-26141": { - "cmt_msg": "ath10k: Fix TKIP Michael MIC verification for PCIe" + "CVE-2018-3646": { + "cmt_msg": "x86/microcode: Allow late microcode loading with SMT disabled" }, - "CVE-2020-0067": { - "cmt_msg": "f2fs: fix to avoid memory leakage in f2fs_listxattr" + "CVE-2023-2007": { + "cmt_msg": "scsi: dpt_i2o: Remove obsolete driver" }, - "CVE-2019-20794": { - "cmt_msg": "" + "CVE-2022-1419": { + "cmt_msg": "drm/vgem: Close use-after-free race in vgem_gem_create" }, - "CVE-2023-39193": { - "cmt_msg": "netfilter: xt_sctp: validate the flag_info count" + "CVE-2023-6040": { + "cmt_msg": "netfilter: nf_tables: Reject tables of unsupported family" }, - "CVE-2023-39192": { - "cmt_msg": "netfilter: xt_u32: validate user space input" + "CVE-2016-3070": { + "cmt_msg": "mm: migrate dirty page without clear_page_dirty_for_io etc" }, - "CVE-2020-26541": { - "cmt_msg": "certs: Add EFI_CERT_X509_GUID support for dbx entries" + "CVE-2015-8812": { + "cmt_msg": "iw_cxgb3: Fix incorrectly returning error on success" }, - "CVE-2023-6610": { - "cmt_msg": "smb: client: fix potential OOB in smb2_dump_detail()" + "CVE-2022-2503": { + "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag" }, - "CVE-2020-26559": { - "cmt_msg": "" + "CVE-2016-4951": { + "cmt_msg": "tipc: check nl sock before parsing nested attributes" }, - "CVE-2021-20317": { - "cmt_msg": "lib/timerqueue: Rely on rbtree semantics for next timer" + "CVE-2022-23038": { + "cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()" }, - "CVE-2021-43389": { - "cmt_msg": "isdn: cpai: check ctr->cnr to avoid array index out of bound" + "CVE-2022-23039": { + "cmt_msg": "xen/gntalloc: don't use gnttab_query_foreign_access()" }, - "CVE-2023-3111": { - "cmt_msg": "btrfs: unset reloc control if transaction commit fails in prepare_to_relocate()" + "CVE-2016-8645": { + "cmt_msg": "tcp: take care of truncations done by sk_filter()" }, - "CVE-2021-33061": { - "cmt_msg": "ixgbe: add improvement for MDD response functionality" + "CVE-2022-23036": { + "cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()" }, - "CVE-2018-1092": { - "cmt_msg": "ext4: fail ext4_iget for root directory if unallocated" + "CVE-2022-23037": { + "cmt_msg": "xen/netfront: don't use gnttab_query_foreign_access() for mapped status" }, - "CVE-2018-1093": { - "cmt_msg": "ext4: add validity checks for bitmap block numbers" + "CVE-2017-5669": { + "cmt_msg": "ipc/shm: Fix shmat mmap nil-page protection" }, - "CVE-2017-18551": { - "cmt_msg": "i2c: core-smbus: prevent stack corruption on read I2C_BLOCK_DATA" + "CVE-2023-2176": { + "cmt_msg": "RDMA/core: Refactor rdma_bind_addr" }, - "CVE-2023-1074": { - "cmt_msg": "sctp: fail if no bound addresses can be used for a given scope" + "CVE-2019-14821": { + "cmt_msg": "KVM: coalesced_mmio: add bounds checking" }, - "CVE-2017-18552": { - "cmt_msg": "RDS: validate the requested traces user input against max supported" + "CVE-2020-12826": { + "cmt_msg": "signal: Extend exec_id to 64bits" }, - "CVE-2024-26584": { - "cmt_msg": "net: tls: handle backlogging of crypto requests" + "CVE-2021-42008": { + "cmt_msg": "net: 6pack: fix slab-out-of-bounds in decode_data" }, - "CVE-2022-1652": { - "cmt_msg": "floppy: use a statically allocated error counter" + "CVE-2020-25645": { + "cmt_msg": "geneve: add transport ports in route lookup for geneve" }, - "CVE-2020-29568": { - "cmt_msg": "xen/xenbus: Allow watches discard events before queueing" + "CVE-2019-15666": { + "cmt_msg": "xfrm: policy: Fix out-of-bound array accesses in __xfrm_policy_unlink" }, - "CVE-2020-14351": { - "cmt_msg": "perf/core: Fix race in the perf_mmap_close() function" + "CVE-2015-1350": { + "cmt_msg": "fs: Avoid premature clearing of capabilities" }, - "CVE-2019-19054": { - "cmt_msg": "media: rc: prevent memory leak in cx23888_ir_probe" + "CVE-2016-1237": { + "cmt_msg": "posix_acl: Add set_posix_acl" }, - "CVE-2019-19057": { - "cmt_msg": "mwifiex: pcie: Fix memory leak in mwifiex_pcie_init_evt_ring" + "CVE-2021-33034": { + "cmt_msg": "Bluetooth: verify AMP hci_chan before amp_destroy" }, - "CVE-2019-19056": { - "cmt_msg": "mwifiex: pcie: Fix memory leak in mwifiex_pcie_alloc_cmdrsp_buf" + "CVE-2017-18509": { + "cmt_msg": "ipv6: check sk sk_type and protocol early in ip_mroute_set/getsockopt" }, - "CVE-2016-10741": { - "cmt_msg": "xfs: don't BUG() on mixed direct and mapped I/O" + "CVE-2016-3857": { + "cmt_msg": "arm: oabi compat: add missing access checks" }, - "CVE-2023-23039": { + "CVE-2017-11600": { + "cmt_msg": "xfrm: policy: check policy direction value" + }, + "CVE-2024-26625": { + "cmt_msg": "llc: call sock_orphan() at release time" + }, + "CVE-2024-26627": { + "cmt_msg": "scsi: core: Move scsi_host_busy() out of host lock for waking up EH handler" + }, + "CVE-2024-26622": { + "cmt_msg": "tomoyo: fix UAF write bug in tomoyo_write_control()" + }, + "CVE-2024-22386": { "cmt_msg": "" }, - "CVE-2019-19052": { - "cmt_msg": "can: gs_usb: gs_can_open(): prevent memory leak" + "CVE-2018-10021": { + "cmt_msg": "scsi: libsas: defer ata device eh commands to libata" }, - "CVE-2019-3846": { - "cmt_msg": "mwifiex: Fix possible buffer overflows at parsing bss descriptor" + "CVE-2017-18221": { + "cmt_msg": "mlock: fix mlock count can not decrease in race condition" }, - "CVE-2023-46838": { - "cmt_msg": "xen-netback: don't produce zero-size SKB frags" + "CVE-2019-10126": { + "cmt_msg": "mwifiex: Fix heap overflow in mwifiex_uap_parse_tail_ies()" }, - "CVE-2020-0427": { - "cmt_msg": "pinctrl: devicetree: Avoid taking direct reference to device name string" + "CVE-2020-13974": { + "cmt_msg": "vt: keyboard: avoid signed integer overflow in k_ascii" }, - "CVE-2019-9458": { - "cmt_msg": "media: v4l: event: Prevent freeing event subscriptions while accessed" + "CVE-2018-10938": { + "cmt_msg": "Cipso: cipso_v4_optptr enter infinite loop" }, - "CVE-2023-40283": { - "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb" + "CVE-2020-15437": { + "cmt_msg": "serial: 8250: fix null-ptr-deref in serial8250_start_tx()" }, - "CVE-2022-1419": { - "cmt_msg": "drm/vgem: Close use-after-free race in vgem_gem_create" + "CVE-2020-15436": { + "cmt_msg": "block: Fix use-after-free in blkdev_get()" }, - "CVE-2023-6270": { - "cmt_msg": "" + "CVE-2016-9178": { + "cmt_msg": "fix minor infoleak in get_user_ex()" }, - "CVE-2023-3090": { - "cmt_msg": "ipvlan:Fix out-of-bounds caused by unclear skb->cb" + "CVE-2021-47065": { + "cmt_msg": "rtw88: Fix array overrun in rtw_get_tx_power_params()" }, - "CVE-2019-13272": { - "cmt_msg": "ptrace: Fix ->ptracer_cred handling for PTRACE_TRACEME" + "CVE-2022-23816": { + "cmt_msg": "x86/kvm/vmx: Make noinstr clean" }, - "CVE-2023-1073": { - "cmt_msg": "HID: check empty report_list in hid_validate_values()" + "CVE-2021-47149": { + "cmt_msg": "net: fujitsu: fix potential null-ptr-deref" }, - "CVE-2023-45862": { - "cmt_msg": "USB: ene_usb6250: Allocate enough memory for full object" + "CVE-2021-47145": { + "cmt_msg": "btrfs: do not BUG_ON in link_to_fixup_dir" }, - "CVE-2023-45863": { - "cmt_msg": "kobject: Fix slab-out-of-bounds in fill_kobj_path()" + "CVE-2021-47144": { + "cmt_msg": "drm/amd/amdgpu: fix refcount leak" }, - "CVE-2017-15537": { - "cmt_msg": "x86/fpu: Don't let userspace set bogus xcomp_bv" + "CVE-2021-47147": { + "cmt_msg": "ptp: ocp: Fix a resource leak in an error handling path" }, - "CVE-2022-2588": { - "cmt_msg": "net_sched: cls_route: remove from list when handle is 0" + "CVE-2021-47146": { + "cmt_msg": "mld: fix panic in mld_newpack()" }, - "CVE-2019-17351": { - "cmt_msg": "xen: let alloc_xenballooned_pages() fail if not enough memory free" + "CVE-2021-47140": { + "cmt_msg": "iommu/amd: Clear DMA ops when switching domain" }, - "CVE-2020-36322": { - "cmt_msg": "fuse: fix bad inode" + "CVE-2021-47143": { + "cmt_msg": "net/smc: remove device from smcd_dev_list after failed device_add()" }, - "CVE-2022-23222": { - "cmt_msg": "bpf: Replace PTR_TO_XXX_OR_NULL with PTR_TO_XXX | PTR_MAYBE_NULL" + "CVE-2021-47142": { + "cmt_msg": "drm/amdgpu: Fix a use-after-free" }, - "CVE-2020-25669": { - "cmt_msg": "Input: sunkbd - avoid use-after-free in teardown paths" + "CVE-2024-26765": { + "cmt_msg": "LoongArch: Disable IRQ before init_fn() for nonboot CPUs" }, - "CVE-2020-25668": { - "cmt_msg": "tty: make FONTX ioctl use the tty pointer they were actually passed" + "CVE-2018-16658": { + "cmt_msg": "cdrom: Fix info leak/OOB read in cdrom_ioctl_drive_status" }, - "CVE-2008-4609": { - "cmt_msg": "" + "CVE-2019-19036": { + "cmt_msg": "btrfs: Detect unbalanced tree with empty leaf before crashing btree operations" }, - "CVE-2020-25705": { - "cmt_msg": "icmp: randomize the global rate limiter" + "CVE-2017-8797": { + "cmt_msg": "nfsd: fix undefined behavior in nfsd4_layout_verify" }, - "CVE-2021-0448": { - "cmt_msg": "netfilter: ctnetlink: add a range check for l3/l4 protonum" + "CVE-2021-32078": { + "cmt_msg": "ARM: footbridge: remove personal server platform" }, - "CVE-2023-52458": { - "cmt_msg": "block: add check that partition length needs to be aligned with block size" + "CVE-2022-4662": { + "cmt_msg": "USB: core: Prevent nested device-reset calls" }, - "CVE-2018-20854": { - "cmt_msg": "phy: ocelot-serdes: fix out-of-bounds read" + "CVE-2019-11833": { + "cmt_msg": "ext4: zero out the unused memory region in the extent tree block" }, - "CVE-2018-5391": { - "cmt_msg": "ip: discard IPv4 datagrams with overlapping segments." + "CVE-2018-5953": { + "cmt_msg": "printk: hash addresses printed with %p" }, - "CVE-2022-3533": { - "cmt_msg": "" + "CVE-2018-1128": { + "cmt_msg": "libceph: add authorizer challenge" }, - "CVE-2023-26607": { - "cmt_msg": "ntfs: fix out-of-bounds read in ntfs_attr_find()" + "CVE-2018-1129": { + "cmt_msg": "libceph: implement CEPHX_V2 calculation mode" }, - "CVE-2018-20855": { - "cmt_msg": "IB/mlx5: Fix leaking stack memory to userspace" + "CVE-2018-1120": { + "cmt_msg": "proc: do not access cmdline nor environ from file-backed areas" }, - "CVE-2019-15239": { + "CVE-2018-1121": { "cmt_msg": "" }, - "CVE-2017-15129": { - "cmt_msg": "net: Fix double free and memory corruption in get_net_ns_by_id()" + "CVE-2018-20856": { + "cmt_msg": "block: blk_init_allocated_queue() set q->fq as NULL in the fail case" }, - "CVE-2016-2053": { - "cmt_msg": "ASN.1: Fix non-match detection failure on data overrun" + "CVE-2022-3061": { + "cmt_msg": "video: fbdev: i740fb: Error out if 'pixclock' equals zero" }, - "CVE-2021-4037": { - "cmt_msg": "xfs: fix up non-directory creation in SGID directories" + "CVE-2020-27784": { + "cmt_msg": "usb: gadget: function: printer: fix use-after-free in __lock_acquire" }, - "CVE-2021-22543": { - "cmt_msg": "KVM: do not allow mapping valid but non-reference-counted pages" + "CVE-2020-27786": { + "cmt_msg": "ALSA: rawmidi: Fix racy buffer resize under concurrent accesses" }, - "CVE-2022-45884": { + "CVE-2023-6240": { "cmt_msg": "" }, - "CVE-2019-1999": { - "cmt_msg": "binder: fix race between munmap() and direct reclaim" + "CVE-2022-39842": { + "cmt_msg": "video: fbdev: pxa3xx-gcu: Fix integer overflow in pxa3xx_gcu_write" }, - "CVE-2023-20941": { - "cmt_msg": "" + "CVE-2023-51043": { + "cmt_msg": "drm/atomic: Fix potential use-after-free in nonblocking commits" }, - "CVE-2019-15292": { - "cmt_msg": "appletalk: Fix use-after-free in atalk_proc_exit" + "CVE-2019-9454": { + "cmt_msg": "i2c: core-smbus: prevent stack corruption on read I2C_BLOCK_DATA" }, - "CVE-2018-20836": { - "cmt_msg": "scsi: libsas: fix a race condition when smp task timeout" + "CVE-2017-16939": { + "cmt_msg": "ipsec: Fix aborted xfrm policy dump crash" }, - "CVE-2020-10135": { - "cmt_msg": "Bluetooth: Consolidate encryption handling in hci_encrypt_cfm" + "CVE-2016-10741": { + "cmt_msg": "xfs: don't BUG() on mixed direct and mapped I/O" }, - "CVE-2020-25285": { - "cmt_msg": "mm/hugetlb: fix a race between hugetlb sysctl handlers" + "CVE-2021-26931": { + "cmt_msg": "xen-blkback: don't \"handle\" error by BUG()" }, - "CVE-2019-7308": { - "cmt_msg": "bpf: fix sanitation of alu op with pointer / scalar type from different paths" + "CVE-2021-26930": { + "cmt_msg": "xen-blkback: fix error handling in xen_blkbk_map()" }, - "CVE-2021-45868": { - "cmt_msg": "quota: check block number when reading the block in quota file" + "CVE-2021-26932": { + "cmt_msg": "Xen/x86: don't bail early from clear_foreign_p2m_mapping()" }, - "CVE-2022-1966": { - "cmt_msg": "netfilter: nf_tables: disallow non-stateful expression in sets earlier" + "CVE-2022-36402": { + "cmt_msg": "drm/vmwgfx: Fix shader stage validation" }, - "CVE-2017-9986": { - "cmt_msg": "sound: Retire OSS" + "CVE-2021-3178": { + "cmt_msg": "nfsd4: readdirplus shouldn't return parent of export" }, - "CVE-2021-3587": { - "cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect" + "CVE-2016-2117": { + "cmt_msg": "atl2: Disable unimplemented scatter/gather feature" }, - "CVE-2019-16995": { - "cmt_msg": "net: hsr: fix memory leak in hsr_dev_finalize()" + "CVE-2023-1611": { + "cmt_msg": "btrfs: fix race between quota disable and quota assign ioctls" }, - "CVE-2019-2024": { - "cmt_msg": "media: em28xx: Fix use-after-free when disconnecting" + "CVE-2021-3772": { + "cmt_msg": "sctp: use init_tag from inithdr for ABORT chunk" }, - "CVE-2022-3534": { - "cmt_msg": "libbpf: Fix use-after-free in btf_dump_name_dups" + "CVE-2021-34556": { + "cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4" }, - "CVE-2021-20261": { - "cmt_msg": "floppy: fix lock_fdc() signal handling" + "CVE-2021-28714": { + "cmt_msg": "xen/netback: fix rx queue stall detection" }, - "CVE-2020-36516": { - "cmt_msg": "ipv4: avoid using shared IP generator for connected sockets" + "CVE-2021-28713": { + "cmt_msg": "xen/console: harden hvc_xen against event channel storms" }, - "CVE-2023-28328": { - "cmt_msg": "media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer()" + "CVE-2021-28712": { + "cmt_msg": "xen/netfront: harden netfront against event channel storms" }, - "CVE-2023-0386": { - "cmt_msg": "ovl: fail on invalid uid/gid mapping at copy up" + "CVE-2021-28711": { + "cmt_msg": "xen/blkfront: harden blkfront against event channel storms" }, - "CVE-2017-13693": { + "CVE-2022-1247": { "cmt_msg": "" }, - "CVE-2017-13695": { - "cmt_msg": "ACPICA: acpi: acpica: fix acpi operand cache leak in nseval.c" - }, - "CVE-2017-13694": { - "cmt_msg": "" + "CVE-2017-11473": { + "cmt_msg": "x86/acpi: Prevent out of bound access caused by broken ACPI tables" }, - "CVE-2021-4149": { - "cmt_msg": "btrfs: unlock newly allocated extent buffer after error" + "CVE-2017-11472": { + "cmt_msg": "ACPICA: Namespace: fix operand cache leak" }, - "CVE-2022-21385": { - "cmt_msg": "net/rds: fix warn in rds_message_alloc_sgs" + "CVE-2017-17862": { + "cmt_msg": "bpf: fix branch pruning logic" }, - "CVE-2022-42895": { - "cmt_msg": "Bluetooth: L2CAP: Fix attempting to access uninitialized memory" + "CVE-2021-39657": { + "cmt_msg": "scsi: ufs: Correct the LUN used in eh_device_reset_handler() callback" }, - "CVE-2021-3640": { - "cmt_msg": "Bluetooth: sco: Fix lock_sock() blockage by memcpy_from_msg()" + "CVE-2023-52578": { + "cmt_msg": "net: bridge: use DEV_STATS_INC()" }, - "CVE-2020-1749": { - "cmt_msg": "net: ipv6_stub: use ip6_dst_lookup_flow instead of ip6_dst_lookup" + "CVE-2023-52574": { + "cmt_msg": "team: fix null-ptr-deref when team device type is changed" }, - "CVE-2022-42896": { - "cmt_msg": "Bluetooth: L2CAP: Fix accepting connection request for invalid SPSM" + "CVE-2023-3567": { + "cmt_msg": "vc_screen: move load of struct vc_data pointer in vcs_read() to avoid UAF" }, - "CVE-2021-3760": { - "cmt_msg": "nfc: nci: fix the UAF of rf_conn_info object" + "CVE-2023-52571": { + "cmt_msg": "power: supply: rk817: Fix node refcount leak" }, - "CVE-2022-36123": { - "cmt_msg": "x86: Clear .brk area at early boot" + "CVE-2023-52572": { + "cmt_msg": "cifs: Fix UAF in cifs_demultiplex_thread()" }, - "CVE-2020-11608": { - "cmt_msg": "media: ov519: add missing endpoint sanity checks" + "CVE-2016-3044": { + "cmt_msg": "KVM: PPC: Book3S HV: Sanitize special-purpose register values on guest exit" }, - "CVE-2020-10732": { - "cmt_msg": "fs/binfmt_elf.c: allocate initialized memory in fill_thread_core_info()" + "CVE-2017-14340": { + "cmt_msg": "xfs: XFS_IS_REALTIME_INODE() should be false if no rt device present" }, - "CVE-2020-28097": { - "cmt_msg": "vgacon: remove software scrollback support" + "CVE-2019-19039": { + "cmt_msg": "btrfs: Don't submit any btree write bio if the fs has errors" }, - "CVE-2017-18216": { - "cmt_msg": "ocfs2: subsystem.su_mutex is required while accessing the item->ci_parent" + "CVE-2016-8630": { + "cmt_msg": "kvm: x86: Check memopp before dereference (CVE-2016-8630)" }, - "CVE-2017-1000112": { - "cmt_msg": "udp: consistently apply ufo or fragmentation" + "CVE-2016-8633": { + "cmt_msg": "firewire: net: guard against rx buffer overflows" }, - "CVE-2024-24855": { - "cmt_msg": "scsi: lpfc: Fix a possible data race in lpfc_unregister_fcf_rescan()" + "CVE-2016-8632": { + "cmt_msg": "tipc: check minimum bearer MTU" }, - "CVE-2019-9466": { - "cmt_msg": "brcmfmac: add subtype check for event handling in data path" + "CVE-2020-12362": { + "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" }, - "CVE-2024-24857": { - "cmt_msg": "" + "CVE-2020-12363": { + "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" }, - "CVE-2018-5848": { - "cmt_msg": "wil6210: missing length check in wmi_set_ie" + "CVE-2019-12881": { + "cmt_msg": "drm/i915/userptr: reject zero user_size" }, - "CVE-2018-8897": { - "cmt_msg": "x86/entry/64: Don't use IST entry for #BP stack" + "CVE-2022-4129": { + "cmt_msg": "l2tp: Serialize access to sk_user_data with sk_callback_lock" }, - "CVE-2021-29265": { - "cmt_msg": "usbip: fix stub_dev usbip_sockfd_store() races leading to gpf" + "CVE-2020-12364": { + "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" }, - "CVE-2021-39648": { - "cmt_msg": "usb: gadget: configfs: Fix use-after-free issue with udc_name" + "CVE-2021-4002": { + "cmt_msg": "hugetlbfs: flush TLBs correctly after huge_pmd_unshare" }, - "CVE-2022-3545": { - "cmt_msg": "nfp: fix use-after-free in area_cache_get()" + "CVE-2023-26545": { + "cmt_msg": "net: mpls: fix stale pointer if allocation fails during device rename" }, - "CVE-2020-14416": { - "cmt_msg": "can, slip: Protect tty->disc_data in write_wakeup and close with RCU" + "CVE-2017-12168": { + "cmt_msg": "arm64: KVM: pmu: Fix AArch32 cycle counter access" }, - "CVE-2019-0136": { - "cmt_msg": "mac80211: drop robust management frames from unknown TA" + "CVE-2019-15292": { + "cmt_msg": "appletalk: Fix use-after-free in atalk_proc_exit" }, - "CVE-2022-3542": { - "cmt_msg": "bnx2x: fix potential memory leak in bnx2x_tpa_stop()" + "CVE-2019-15291": { + "cmt_msg": "media: b2c2-flexcop-usb: add sanity checking" }, - "CVE-2019-16921": { - "cmt_msg": "RDMA/hns: Fix init resp when alloc ucontext" + "CVE-2019-15290": { + "cmt_msg": "" }, - "CVE-2018-16597": { - "cmt_msg": "ovl: modify ovl_permission() to do checks on two inodes" + "CVE-2023-3212": { + "cmt_msg": "gfs2: Don't deref jdesc in evict" }, - "CVE-2021-21781": { - "cmt_msg": "ARM: ensure the signal page contains defined contents" + "CVE-2024-26633": { + "cmt_msg": "ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim()" }, - "CVE-2021-0512": { - "cmt_msg": "HID: make arrays usage and value to be the same" + "CVE-2024-26636": { + "cmt_msg": "llc: make llc_ui_sendmsg() more robust against bonding changes" }, - "CVE-2018-14633": { - "cmt_msg": "scsi: target: iscsi: Use hex2bin instead of a re-implementation" + "CVE-2024-26635": { + "cmt_msg": "llc: Drop support for ETH_P_TR_802_2." }, - "CVE-2018-12896": { - "cmt_msg": "posix-timers: Sanitize overrun handling" + "CVE-2017-7308": { + "cmt_msg": "net/packet: fix overflow in check for priv area size" }, - "CVE-2023-1382": { - "cmt_msg": "tipc: set con sock in tipc_conn_alloc" + "CVE-2016-0758": { + "cmt_msg": "KEYS: Fix ASN.1 indefinite length object parsing" }, - "CVE-2019-18683": { - "cmt_msg": "media: vivid: Fix wrong locking that causes race conditions on streaming stop" + "CVE-2020-12769": { + "cmt_msg": "spi: spi-dw: Add lock protect dw_spi rx/tx to prevent concurrent calls" }, - "CVE-2018-14734": { - "cmt_msg": "infiniband: fix a possible use-after-free bug" + "CVE-2017-8890": { + "cmt_msg": "dccp/tcp: do not inherit mc_list from parent" }, - "CVE-2020-0347": { - "cmt_msg": "" + "CVE-2023-52635": { + "cmt_msg": "PM / devfreq: Synchronize devfreq_monitor_[start/stop]" }, - "CVE-2022-41222": { - "cmt_msg": "mm/mremap: hold the rmap lock in write mode when moving page table entries." + "CVE-2023-52634": { + "cmt_msg": "drm/amd/display: Fix disable_otg_wa logic" }, - "CVE-2021-40490": { - "cmt_msg": "ext4: fix race writing to an inline_data file while its xattrs are changing" + "CVE-2016-9588": { + "cmt_msg": "kvm: nVMX: Allow L1 to intercept software exceptions (#BP and #OF)" }, - "CVE-2021-33909": { - "cmt_msg": "seq_file: disallow extremely large seq buffer allocations" + "CVE-2017-18208": { + "cmt_msg": "mm/madvise.c: fix madvise() infinite loop under special circumstances" }, - "CVE-2019-12456": { - "cmt_msg": "" + "CVE-2017-1000364": { + "cmt_msg": "mm: larger stack guard gap, between vmas" }, - "CVE-2019-18680": { - "cmt_msg": "" + "CVE-2017-1000365": { + "cmt_msg": "fs/exec.c: account for argv/envp pointers" }, - "CVE-2022-20565": { - "cmt_msg": "HID: core: Correctly handle ReportSize being zero" + "CVE-2020-13143": { + "cmt_msg": "USB: gadget: fix illegal array access in binding with UDC" }, - "CVE-2019-18806": { - "cmt_msg": "net: qlogic: Fix memory leak in ql_alloc_large_buffers" + "CVE-2017-1000363": { + "cmt_msg": "char: lp: fix possible integer overflow in lp_setup()" }, - "CVE-2021-33656": { - "cmt_msg": "vt: drop old FONT ioctls" + "CVE-2022-3903": { + "cmt_msg": "media: mceusb: Use new usb_control_msg_*() routines" }, - "CVE-2021-33655": { - "cmt_msg": "fbcon: Disallow setting font bigger than screen size" + "CVE-2017-15299": { + "cmt_msg": "KEYS: don't let add_key() update an uninstantiated key" }, - "CVE-2022-41858": { - "cmt_msg": "drivers: net: slip: fix NPD bug in sl_tx_timeout()" + "CVE-2021-47179": { + "cmt_msg": "NFSv4: Fix a NULL pointer dereference in pnfs_mark_matching_lsegs_return()" }, - "CVE-2020-15437": { - "cmt_msg": "serial: 8250: fix null-ptr-deref in serial8250_start_tx()" + "CVE-2019-11190": { + "cmt_msg": "binfmt_elf: switch to new creds when switching to new mm" }, - "CVE-2019-6974": { - "cmt_msg": "kvm: fix kvm_ioctl_create_device() reference counting (CVE-2019-6974)" + "CVE-2019-11191": { + "cmt_msg": "x86: Deprecate a.out support" }, - "CVE-2022-41850": { - "cmt_msg": "HID: roccat: Fix use-after-free in roccat_read()" + "CVE-2016-1575": { + "cmt_msg": "ovl: setattr: check permissions before copy-up" }, - "CVE-2022-0168": { - "cmt_msg": "cifs: fix NULL ptr dereference in smb2_ioctl_query_info()" + "CVE-2021-47171": { + "cmt_msg": "net: usb: fix memory leak in smsc75xx_bind" }, - "CVE-2023-2985": { - "cmt_msg": "fs: hfsplus: fix UAF issue in hfsplus_put_super" + "CVE-2021-47172": { + "cmt_msg": "iio: adc: ad7124: Fix potential overflow due to non sequential channel numbers" }, - "CVE-2020-14390": { - "cmt_msg": "fbcon: remove soft scrollback code" + "CVE-2016-1576": { + "cmt_msg": "ovl: setattr: check permissions before copy-up" }, - "CVE-2020-24502": { - "cmt_msg": "" + "CVE-2021-47175": { + "cmt_msg": "net/sched: fq_pie: fix OOB access in the traffic path" }, - "CVE-2022-3646": { - "cmt_msg": "nilfs2: fix leak of nilfs_root in case of writer thread creation failure" + "CVE-2018-10323": { + "cmt_msg": "xfs: set format back to extents if xfs_bmap_extents_to_btree" }, - "CVE-2017-17807": { - "cmt_msg": "KEYS: add missing permission check for request_key() destination" + "CVE-2018-10322": { + "cmt_msg": "xfs: enhance dinode verifier" }, - "CVE-2022-1184": { - "cmt_msg": "ext4: verify dir block before splitting it" + "CVE-2021-46951": { + "cmt_msg": "tpm: efi: Use local variable for calculating final log size" }, - "CVE-2022-3642": { - "cmt_msg": "" + "CVE-2021-46950": { + "cmt_msg": "md/raid1: properly indicate failure when ending a failed write request" }, - "CVE-2019-19448": { - "cmt_msg": "btrfs: only search for left_info if there is no right_info in try_merge_free_space" + "CVE-2021-46952": { + "cmt_msg": "NFS: fs_context: validate UDP retrans to prevent shift out-of-bounds" }, - "CVE-2022-1198": { - "cmt_msg": "drivers: hamradio: 6pack: fix UAF bug caused by mod_timer()" + "CVE-2021-46959": { + "cmt_msg": "spi: Fix use-after-free with devm_spi_alloc_*" }, - "CVE-2024-0584": { - "cmt_msg": "ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet" + "CVE-2023-52594": { + "cmt_msg": "wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus()" }, - "CVE-2020-0465": { - "cmt_msg": "HID: core: Sanitize event code and type when mapping input" + "CVE-2023-5178": { + "cmt_msg": "nvmet-tcp: Fix a possible UAF in queue intialization setup" }, - "CVE-2020-0305": { - "cmt_msg": "chardev: Avoid potential use-after-free in 'chrdev_open()'" + "CVE-2017-7495": { + "cmt_msg": "ext4: fix data exposure after a crash" }, - "CVE-2018-3639": { - "cmt_msg": "x86/nospec: Simplify alternative_msr_write()" + "CVE-2021-0929": { + "cmt_msg": "staging/android/ion: delete dma_buf->kmap/unmap implemenation" }, - "CVE-2021-4218": { - "cmt_msg": "sysctl: pass kernel pointers to ->proc_handler" + "CVE-2018-19985": { + "cmt_msg": "USB: hso: Fix OOB memory access in hso_probe/hso_get_config_data" }, - "CVE-2023-22995": { - "cmt_msg": "usb: dwc3: dwc3-qcom: Add missing platform_device_put() in dwc3_qcom_acpi_register_core" + "CVE-2021-0920": { + "cmt_msg": "af_unix: fix garbage collect vs MSG_PEEK" }, - "CVE-2019-15902": { - "cmt_msg": "" + "CVE-2017-7273": { + "cmt_msg": "HID: hid-cypress: validate length of report" }, - "CVE-2024-25739": { - "cmt_msg": "" + "CVE-2023-0615": { + "cmt_msg": "media: vivid: dev->bitmap_cap wasn't freed in all cases" }, - "CVE-2019-20054": { - "cmt_msg": "fs/proc/proc_sysctl.c: fix NULL pointer dereference in put_links" + "CVE-2017-7472": { + "cmt_msg": "KEYS: fix keyctl_set_reqkey_keyring() to not leak thread keyrings" }, - "CVE-2024-0340": { - "cmt_msg": "vhost: use kzalloc() instead of kmalloc() followed by memset()" + "CVE-2022-3586": { + "cmt_msg": "sch_sfb: Don't assume the skb is still around after enqueueing to child" }, - "CVE-2021-3753": { - "cmt_msg": "vt_kdsetmode: extend console locking" + "CVE-2020-27825": { + "cmt_msg": "tracing: Fix race in trace_open and buffer resize call" }, - "CVE-2023-6536": { - "cmt_msg": "" + "CVE-2019-2181": { + "cmt_msg": "binder: check for overflow when alloc for security context" }, - "CVE-2019-11135": { - "cmt_msg": "x86/msr: Add the IA32_TSX_CTRL MSR" + "CVE-2020-27820": { + "cmt_msg": "drm/nouveau: use drm_dev_unplug() during device removal" }, - "CVE-2019-11810": { - "cmt_msg": "scsi: megaraid_sas: return error when create DMA pool failed" + "CVE-2023-6610": { + "cmt_msg": "smb: client: fix potential OOB in smb2_dump_detail()" }, - "CVE-2021-27365": { - "cmt_msg": "scsi: iscsi: Ensure sysfs attributes are limited to PAGE_SIZE" + "CVE-2023-1476": { + "cmt_msg": "" }, - "CVE-2021-27364": { - "cmt_msg": "scsi: iscsi: Restrict sessions and handles to admin capabilities" + "CVE-2023-1670": { + "cmt_msg": "xirc2ps_cs: Fix use after free bug in xirc2ps_detach" }, - "CVE-2021-27363": { - "cmt_msg": "scsi: iscsi: Restrict sessions and handles to admin capabilities" + "CVE-2020-14351": { + "cmt_msg": "perf/core: Fix race in the perf_mmap_close() function" }, - "CVE-2020-0431": { - "cmt_msg": "HID: hid-input: clear unmapped usages" + "CVE-2020-14353": { + "cmt_msg": "KEYS: prevent creating a different user's keyrings" }, - "CVE-2022-39842": { - "cmt_msg": "video: fbdev: pxa3xx-gcu: Fix integer overflow in pxa3xx_gcu_write" + "CVE-2020-0429": { + "cmt_msg": "l2tp: fix race between l2tp_session_delete() and l2tp_tunnel_closeall()" }, - "CVE-2018-17977": { - "cmt_msg": "" + "CVE-2022-20132": { + "cmt_msg": "HID: add hid_is_usb() function to make it simpler for USB detection" }, - "CVE-2018-17972": { - "cmt_msg": "proc: restrict kernel stack dumps to root" + "CVE-2023-6270": { + "cmt_msg": "aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts" }, - "CVE-2021-20320": { - "cmt_msg": "s390/bpf: Fix optimizing out zero-extensions" + "CVE-2019-17351": { + "cmt_msg": "xen: let alloc_xenballooned_pages() fail if not enough memory free" }, - "CVE-2021-20321": { - "cmt_msg": "ovl: fix missing negative dentry check in ovl_rename()" + "CVE-2018-20854": { + "cmt_msg": "phy: ocelot-serdes: fix out-of-bounds read" }, - "CVE-2022-26490": { - "cmt_msg": "nfc: st21nfca: Fix potential buffer overflows in EVT_TRANSACTION" + "CVE-2018-20855": { + "cmt_msg": "IB/mlx5: Fix leaking stack memory to userspace" }, - "CVE-2017-5967": { - "cmt_msg": "time: Remove CONFIG_TIMER_STATS" + "CVE-2023-35824": { + "cmt_msg": "media: dm1105: Fix use after free bug in dm1105_remove due to race condition" }, - "CVE-2021-0937": { - "cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write" + "CVE-2019-1999": { + "cmt_msg": "binder: fix race between munmap() and direct reclaim" }, - "CVE-2022-3169": { - "cmt_msg": "nvme: ensure subsystem reset is single threaded" + "CVE-2018-1065": { + "cmt_msg": "netfilter: add back stackpointer size checks" }, - "CVE-2022-36280": { - "cmt_msg": "drm/vmwgfx: Validate the box size for the snooped cursor" + "CVE-2018-1066": { + "cmt_msg": "CIFS: Enable encryption during session setup phase" }, - "CVE-2019-2054": { - "cmt_msg": "arm/ptrace: run seccomp after ptrace" + "CVE-2018-1068": { + "cmt_msg": "netfilter: ebtables: CONFIG_COMPAT: don't trust userland offsets" }, - "CVE-2018-20976": { - "cmt_msg": "xfs: clear sb->s_fs_info on mount failure" + "CVE-2019-7308": { + "cmt_msg": "bpf: fix sanitation of alu op with pointer / scalar type from different paths" }, - "CVE-2016-10147": { - "cmt_msg": "crypto: mcryptd - Check mcryptd algorithm compatibility" + "CVE-2018-1000199": { + "cmt_msg": "perf/hwbp: Simplify the perf-hwbp code, fix documentation" }, - "CVE-2024-21803": { - "cmt_msg": "" + "CVE-2022-1966": { + "cmt_msg": "netfilter: nf_tables: disallow non-stateful expression in sets earlier" }, - "CVE-2018-16276": { - "cmt_msg": "USB: yurex: fix out-of-bounds uaccess in read handler" + "CVE-2021-3587": { + "cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect" }, - "CVE-2023-2176": { - "cmt_msg": "RDMA/core: Refactor rdma_bind_addr" + "CVE-2019-16995": { + "cmt_msg": "net: hsr: fix memory leak in hsr_dev_finalize()" }, - "CVE-2021-3542": { - "cmt_msg": "" + "CVE-2017-18075": { + "cmt_msg": "crypto: pcrypt - fix freeing pcrypt instances" }, - "CVE-2019-16413": { - "cmt_msg": "9p: use inode->i_lock to protect i_size_write() under 32-bit" + "CVE-2017-18079": { + "cmt_msg": "Input: i8042 - fix crash at boot time" }, - "CVE-2018-10876": { - "cmt_msg": "ext4: only look at the bg_flags field if it is valid" + "CVE-2020-1749": { + "cmt_msg": "net: ipv6_stub: use ip6_dst_lookup_flow instead of ip6_dst_lookup" }, - "CVE-2023-30456": { - "cmt_msg": "KVM: nVMX: add missing consistency checks for CR0 and CR4" + "CVE-2021-3760": { + "cmt_msg": "nfc: nci: fix the UAF of rf_conn_info object" }, - "CVE-2020-12652": { - "cmt_msg": "scsi: mptfusion: Fix double fetch bug in ioctl" + "CVE-2017-18216": { + "cmt_msg": "ocfs2: subsystem.su_mutex is required while accessing the item->ci_parent" }, - "CVE-2020-12653": { - "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_cmd_append_vsie_tlv()" + "CVE-2021-39648": { + "cmt_msg": "usb: gadget: configfs: Fix use-after-free issue with udc_name" }, - "CVE-2019-7222": { - "cmt_msg": "KVM: x86: work around leak of uninitialized stack contents (CVE-2019-7222)" + "CVE-2015-8785": { + "cmt_msg": "fuse: break infinite loop in fuse_fill_write_pages()" }, - "CVE-2022-23040": { - "cmt_msg": "xen/xenbus: don't let xenbus_grant_ring() remove grants in error case" + "CVE-2023-52569": { + "cmt_msg": "btrfs: remove BUG() after failure to insert delayed dir index item" }, - "CVE-2020-12654": { - "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_ret_wmm_get_status()" + "CVE-2015-8787": { + "cmt_msg": "netfilter: nf_nat_redirect: add missing NULL pointer check" }, - "CVE-2019-7221": { - "cmt_msg": "KVM: nVMX: unconditionally cancel preemption timer in free_nested (CVE-2019-7221)" + "CVE-2019-0136": { + "cmt_msg": "mac80211: drop robust management frames from unknown TA" }, - "CVE-2018-12929": { - "cmt_msg": "" + "CVE-2023-52563": { + "cmt_msg": "drm/meson: fix memory leak on ->hpd_notify callback" }, - "CVE-2018-12928": { - "cmt_msg": "" + "CVE-2023-52561": { + "cmt_msg": "arm64: dts: qcom: sdm845-db845c: Mark cont splash memory region as reserved" }, - "CVE-2021-35477": { - "cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4" + "CVE-2022-3344": { + "cmt_msg": "KVM: x86: nSVM: harden svm_free_nested against freeing vmcb02 while still in use" }, - "CVE-2020-36310": { - "cmt_msg": "KVM: SVM: avoid infinite loop on NPF from bad address" + "CVE-2023-52566": { + "cmt_msg": "nilfs2: fix potential use after free in nilfs_gccache_submit_read_data()" }, - "CVE-2020-36313": { - "cmt_msg": "KVM: Fix out of range accesses to memslots" + "CVE-2023-52565": { + "cmt_msg": "media: uvcvideo: Fix OOB read" }, - "CVE-2020-35519": { - "cmt_msg": "net/x25: prevent a couple of overflows" + "CVE-2018-12896": { + "cmt_msg": "posix-timers: Sanitize overrun handling" }, - "CVE-2016-5243": { - "cmt_msg": "tipc: fix an infoleak in tipc_nl_compat_link_dump" + "CVE-2020-0347": { + "cmt_msg": "" }, - "CVE-2022-33740": { - "cmt_msg": "xen/netfront: fix leaking data in shared pages" + "CVE-2021-40490": { + "cmt_msg": "ext4: fix race writing to an inline_data file while its xattrs are changing" }, - "CVE-2022-48619": { - "cmt_msg": "Input: add bounds checking to input_set_capability()" + "CVE-2021-33909": { + "cmt_msg": "seq_file: disallow extremely large seq buffer allocations" }, - "CVE-2020-10708": { + "CVE-2019-12456": { "cmt_msg": "" }, - "CVE-2022-0400": { - "cmt_msg": "" + "CVE-2019-5108": { + "cmt_msg": "mac80211: Do not send Layer 2 Update frame before authorization" }, - "CVE-2024-25741": { - "cmt_msg": "" + "CVE-2019-17133": { + "cmt_msg": "cfg80211: wext: avoid copying malformed SSIDs" }, - "CVE-2021-38160": { - "cmt_msg": "virtio_console: Assure used length from device is limited" + "CVE-2021-33656": { + "cmt_msg": "vt: drop old FONT ioctls" }, - "CVE-2021-42739": { - "cmt_msg": "media: firewire: firedtv-avc: fix a buffer overflow in avc_ca_pmt()" + "CVE-2021-33655": { + "cmt_msg": "fbcon: Disallow setting font bigger than screen size" }, - "CVE-2022-3344": { - "cmt_msg": "KVM: x86: nSVM: harden svm_free_nested against freeing vmcb02 while still in use" + "CVE-2022-41858": { + "cmt_msg": "drivers: net: slip: fix NPD bug in sl_tx_timeout()" }, - "CVE-2022-3111": { - "cmt_msg": "power: supply: wm8350-power: Add missing free in free_charger_irq" + "CVE-2022-41850": { + "cmt_msg": "HID: roccat: Fix use-after-free in roccat_read()" }, - "CVE-2017-15116": { - "cmt_msg": "crypto: rng - Remove old low-level rng interface" + "CVE-2017-10663": { + "cmt_msg": "f2fs: sanity check checkpoint segno and blkoff" }, - "CVE-2020-12770": { - "cmt_msg": "scsi: sg: add sg_remove_request in sg_write" + "CVE-2017-10662": { + "cmt_msg": "f2fs: sanity check segment count" }, - "CVE-2018-6412": { - "cmt_msg": "fbdev: Fixing arbitrary kernel leak in case FBIOGETCMAP_SPARC in sbusfb_ioctl_helper()." + "CVE-2017-10661": { + "cmt_msg": "timerfd: Protect the might cancel mechanism proper" }, - "CVE-2018-21008": { - "cmt_msg": "rsi: add fix for crash during assertions" + "CVE-2022-1184": { + "cmt_msg": "ext4: verify dir block before splitting it" }, - "CVE-2024-25744": { - "cmt_msg": "x86/coco: Disable 32-bit emulation by default on TDX and SEV" + "CVE-2016-7425": { + "cmt_msg": "scsi: arcmsr: Buffer overflow in arcmsr_iop_message_xfer()" }, - "CVE-2022-25265": { - "cmt_msg": "" + "CVE-2017-14991": { + "cmt_msg": "scsi: sg: fixup infoleak when using SG_GET_REQUEST_TABLE" }, - "CVE-2022-20368": { - "cmt_msg": "net/packet: fix slab-out-of-bounds access in packet_recvmsg()" + "CVE-2015-1339": { + "cmt_msg": "cuse: fix memory leak" }, - "CVE-2019-19813": { - "cmt_msg": "btrfs: inode: Verify inode mode to avoid NULL pointer dereference" + "CVE-2016-0617": { + "cmt_msg": "fs/hugetlbfs/inode.c: fix bugs in hugetlb_vmtruncate_list()" }, - "CVE-2020-11609": { - "cmt_msg": "media: stv06xx: add missing descriptor sanity checks" + "CVE-2018-7566": { + "cmt_msg": "ALSA: seq: Fix racy pool initializations" }, - "CVE-2020-10773": { - "cmt_msg": "s390/cmm: fix information leak in cmm_timeout_handler()" + "CVE-2016-10229": { + "cmt_msg": "udp: properly support MSG_PEEK with truncated buffers" }, - "CVE-2022-21499": { - "cmt_msg": "lockdown: also lock down previous kgdb use" + "CVE-2017-7645": { + "cmt_msg": "nfsd: check for oversized NFSv2/v3 arguments" }, - "CVE-2020-25284": { - "cmt_msg": "rbd: require global CAP_SYS_ADMIN for mapping and unmapping" + "CVE-2024-26808": { + "cmt_msg": "netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain" }, - "CVE-2023-4208": { - "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free" + "CVE-2024-26809": { + "cmt_msg": "netfilter: nft_set_pipapo: release elements in clone only from destroy path" }, - "CVE-2023-4206": { - "cmt_msg": "net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free" + "CVE-2021-42739": { + "cmt_msg": "media: firewire: firedtv-avc: fix a buffer overflow in avc_ca_pmt()" }, - "CVE-2023-4207": { - "cmt_msg": "net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free" + "CVE-2024-26805": { + "cmt_msg": "netlink: Fix kernel-infoleak-after-free in __skb_datagram_iter" }, - "CVE-2023-3640": { - "cmt_msg": "" + "CVE-2024-26806": { + "cmt_msg": "spi: cadence-qspi: remove system-wide suspend helper calls from runtime PM hooks" }, - "CVE-2018-18281": { - "cmt_msg": "mremap: properly flush TLB before releasing the page" + "CVE-2020-12771": { + "cmt_msg": "bcache: fix potential deadlock problem in btree_gc_coalesce" }, - "CVE-2023-20593": { - "cmt_msg": "x86/cpu/amd: Add a Zenbleed fix" + "CVE-2020-12770": { + "cmt_msg": "scsi: sg: add sg_remove_request in sg_write" }, - "CVE-2023-3022": { - "cmt_msg": "ipv6: Use result arg in fib_lookup_arg consistently" + "CVE-2024-26802": { + "cmt_msg": "stmmac: Clear variable when destroying workqueue" }, - "CVE-2022-2663": { - "cmt_msg": "netfilter: nf_conntrack_irc: Fix forged IP logic" + "CVE-2018-6412": { + "cmt_msg": "fbdev: Fixing arbitrary kernel leak in case FBIOGETCMAP_SPARC in sbusfb_ioctl_helper()." }, - "CVE-2022-43750": { - "cmt_msg": "usb: mon: make mmapped memory read only" + "CVE-2023-52606": { + "cmt_msg": "powerpc/lib: Validate size for vector operations" }, - "CVE-2023-51780": { - "cmt_msg": "atm: Fix Use-After-Free in do_vcc_ioctl" + "CVE-2016-2185": { + "cmt_msg": "Input: ati_remote2 - fix crashes on detecting device with invalid descriptor" }, - "CVE-2023-0047": { - "cmt_msg": "mm, oom: do not trigger out_of_memory from the #PF" + "CVE-2023-52604": { + "cmt_msg": "FS:JFS:UBSAN:array-index-out-of-bounds in dbAdjTree" }, - "CVE-2019-15219": { - "cmt_msg": "USB: sisusbvga: fix oops in error path of sisusb_probe" + "CVE-2016-9806": { + "cmt_msg": "netlink: Fix dump skb leak/double free" }, - "CVE-2022-20424": { - "cmt_msg": "io_uring: remove io_identity" + "CVE-2023-52602": { + "cmt_msg": "jfs: fix slab-out-of-bounds Read in dtSearch" }, - "CVE-2022-20422": { - "cmt_msg": "arm64: fix oops in concurrently setting insn_emulation sysctls" + "CVE-2023-52603": { + "cmt_msg": "UBSAN: array-index-out-of-bounds in dtSplitRoot" }, - "CVE-2023-4385": { - "cmt_msg": "fs: jfs: fix possible NULL pointer dereference in dbFree()" + "CVE-2023-52600": { + "cmt_msg": "jfs: fix uaf in jfs_evict_inode" }, - "CVE-2020-25643": { - "cmt_msg": "hdlc_ppp: add range checks in ppp_cp_parse_cr()" + "CVE-2022-20368": { + "cmt_msg": "net/packet: fix slab-out-of-bounds access in packet_recvmsg()" }, - "CVE-2024-24858": { - "cmt_msg": "" + "CVE-2023-52609": { + "cmt_msg": "binder: fix race between mmput() and do_exit()" }, - "CVE-2019-19378": { + "CVE-2016-1583": { + "cmt_msg": "proc: prevent stacking filesystems on top" + }, + "CVE-2017-1000379": { + "cmt_msg": "mm: larger stack guard gap, between vmas" + }, + "CVE-2023-3640": { "cmt_msg": "" }, - "CVE-2020-4788": { - "cmt_msg": "powerpc/64s: flush L1D on kernel entry" + "CVE-2017-1000371": { + "cmt_msg": "binfmt_elf: use ELF_ET_DYN_BASE only for PIE" }, - "CVE-2022-36879": { - "cmt_msg": "xfrm: xfrm_policy: fix a possible double xfrm_pols_put() in xfrm_bundle_lookup()" + "CVE-2017-1000370": { + "cmt_msg": "binfmt_elf: use ELF_ET_DYN_BASE only for PIE" }, - "CVE-2022-1011": { - "cmt_msg": "fuse: fix pipe buffer lifetime for direct_io" + "CVE-2023-3022": { + "cmt_msg": "ipv6: Use result arg in fib_lookup_arg consistently" }, - "CVE-2021-39698": { - "cmt_msg": "wait: add wake_up_pollfree()" + "CVE-2022-43750": { + "cmt_msg": "usb: mon: make mmapped memory read only" }, - "CVE-2022-45934": { - "cmt_msg": "Bluetooth: L2CAP: Fix u8 overflow" + "CVE-2023-0047": { + "cmt_msg": "mm, oom: do not trigger out_of_memory from the #PF" }, - "CVE-2022-1247": { + "CVE-2023-4010": { "cmt_msg": "" }, - "CVE-2019-19377": { - "cmt_msg": "btrfs: Don't submit any btree write bio if the fs has errors" + "CVE-2021-47167": { + "cmt_msg": "NFS: Fix an Oopsable condition in __nfs_pageio_add_request()" }, - "CVE-2022-2380": { - "cmt_msg": "video: fbdev: sm712fb: Fix crash in smtcfb_read()" + "CVE-2021-47166": { + "cmt_msg": "NFS: Don't corrupt the value of pg_bytes_written in nfs_do_recoalesce()" }, - "CVE-2022-0850": { - "cmt_msg": "ext4: fix kernel infoleak via ext4_extent_header" + "CVE-2021-47165": { + "cmt_msg": "drm/meson: fix shutdown crash when component not probed" }, - "CVE-2020-10767": { - "cmt_msg": "x86/speculation: Avoid force-disabling IBPB based on STIBP and enhanced IBRS." + "CVE-2021-47163": { + "cmt_msg": "tipc: wait and exit until all work queues are done" }, - "CVE-2019-19528": { - "cmt_msg": "USB: iowarrior: fix use-after-free on disconnect" + "CVE-2021-47162": { + "cmt_msg": "tipc: skb_linearize the head skb when reassembling msgs" }, - "CVE-2021-3612": { - "cmt_msg": "Input: joydev - prevent potential read overflow in ioctl" + "CVE-2021-47160": { + "cmt_msg": "net: dsa: mt7530: fix VLAN traffic leaks" }, - "CVE-2020-24503": { - "cmt_msg": "" + "CVE-2023-4385": { + "cmt_msg": "fs: jfs: fix possible NULL pointer dereference in dbFree()" }, - "CVE-2019-19524": { - "cmt_msg": "Input: ff-memless - kill timer in destroy()" + "CVE-2021-46965": { + "cmt_msg": "mtd: physmap: physmap-bt1-rom: Fix unintentional stack access" }, - "CVE-2019-19527": { - "cmt_msg": "HID: hiddev: do cleanup in failure of opening a device" + "CVE-2021-46962": { + "cmt_msg": "mmc: uniphier-sd: Fix a resource leak in the remove function" }, - "CVE-2019-19449": { - "cmt_msg": "f2fs: fix to do sanity check on segment/section count" + "CVE-2021-47168": { + "cmt_msg": "NFS: fix an incorrect limit in filelayout_decode_layout()" }, - "CVE-2023-31085": { - "cmt_msg": "ubi: Refuse attaching if mtd's erasesize is 0" + "CVE-2019-19378": { + "cmt_msg": "" }, - "CVE-2019-19523": { - "cmt_msg": "USB: adutux: fix use-after-free on disconnect" + "CVE-2022-36879": { + "cmt_msg": "xfrm: xfrm_policy: fix a possible double xfrm_pols_put() in xfrm_bundle_lookup()" }, - "CVE-2021-3752": { - "cmt_msg": "Bluetooth: fix use-after-free error in lock_sock_nested()" + "CVE-2019-19377": { + "cmt_msg": "btrfs: Don't submit any btree write bio if the fs has errors" }, - "CVE-2020-11725": { - "cmt_msg": "" + "CVE-2017-7482": { + "cmt_msg": "rxrpc: Fix several cases where a padded len isn't checked in ticket decode" }, - "CVE-2017-7533": { - "cmt_msg": "dentry name snapshots" + "CVE-2017-7487": { + "cmt_msg": "ipx: call ipxitf_put() in ioctl error path" }, - "CVE-2017-18249": { - "cmt_msg": "f2fs: fix race condition in between free nid allocator/initializer" + "CVE-2023-1118": { + "cmt_msg": "media: rc: Fix use-after-free bugs caused by ene_tx_irqsim()" }, - "CVE-2022-1263": { - "cmt_msg": "KVM: avoid NULL pointer dereference in kvm_dirty_ring_push" + "CVE-2021-0937": { + "cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write" + }, + "CVE-2017-7261": { + "cmt_msg": "drm/vmwgfx: NULL pointer dereference in vmw_surface_define_ioctl()" }, "CVE-2016-5244": { "cmt_msg": "rds: fix an infoleak in rds_inc_info_copy" }, - "CVE-2017-18241": { - "cmt_msg": "f2fs: fix a panic caused by NULL flush_cmd_control" + "CVE-2016-5243": { + "cmt_msg": "tipc: fix an infoleak in tipc_nl_compat_link_dump" }, - "CVE-2023-31082": { - "cmt_msg": "" + "CVE-2022-47929": { + "cmt_msg": "net: sched: disallow noqueue for qdisc classes" }, "CVE-2019-16746": { "cmt_msg": "nl80211: validate beacon head" @@ -84180,77 +115516,29 @@ "CVE-2022-3606": { "cmt_msg": "" }, - "CVE-2023-31081": { - "cmt_msg": "" - }, - "CVE-2022-2209": { - "cmt_msg": "" - }, "CVE-2018-18021": { "cmt_msg": "arm64: KVM: Tighten guest core register access from userspace" }, "CVE-2021-37576": { "cmt_msg": "KVM: PPC: Book3S: Fix H_RTAS rets buffer overflow" }, - "CVE-2017-9725": { - "cmt_msg": "mm: cma: fix incorrect type conversion for size during dma allocation" - }, - "CVE-2023-45871": { - "cmt_msg": "igb: set max size RX buffer when store bad packet is enabled" - }, - "CVE-2023-7042": { - "cmt_msg": "" - }, "CVE-2022-3594": { "cmt_msg": "r8152: Rate limit overflow messages" }, - "CVE-2018-14609": { - "cmt_msg": "btrfs: relocation: Only remove reloc rb_trees if reloc control has been initialized" - }, - "CVE-2021-33098": { - "cmt_msg": "ixgbe: fix large MTU request from VF" - }, "CVE-2022-3595": { "cmt_msg": "cifs: fix double-fault crash during ntlmssp" }, - "CVE-2023-47233": { - "cmt_msg": "" - }, - "CVE-2020-10769": { - "cmt_msg": "crypto: authenc - fix parsing key with misaligned rta_len" + "CVE-2018-5803": { + "cmt_msg": "sctp: verify size of a new chunk in _sctp_make_chunk()" }, "CVE-2020-27815": { "cmt_msg": "jfs: Fix array index bounds check in dbAdjTree" }, - "CVE-2021-45486": { - "cmt_msg": "inet: use bigger hash table for IP ID generation" - }, - "CVE-2022-1462": { - "cmt_msg": "tty: use new tty_insert_flip_string_and_push_buffer() in pty_write()" - }, "CVE-2023-6606": { "cmt_msg": "smb: client: fix OOB in smbCalcSize()" }, - "CVE-2020-27067": { - "cmt_msg": "l2tp: fix l2tp_eth module loading" - }, - "CVE-2020-27777": { - "cmt_msg": "powerpc/rtas: Restrict RTAS requests from userspace" - }, - "CVE-2019-20636": { - "cmt_msg": "Input: add safety guards to input_set_keycode()" - }, - "CVE-2019-11486": { - "cmt_msg": "tty: mark Siemens R3964 line discipline as BROKEN" - }, - "CVE-2019-11487": { - "cmt_msg": "fs: prevent page refcount overflow in pipe_buf_get" - }, - "CVE-2022-28390": { - "cmt_msg": "can: ems_usb: ems_usb_start_xmit(): fix double dev_kfree_skb() in error path" - }, - "CVE-2018-8043": { - "cmt_msg": "net: phy: mdio-bcm-unimac: fix potential NULL dereference in unimac_mdio_probe()" + "CVE-2020-27673": { + "cmt_msg": "xen/events: add a proper barrier to 2-level uevent unmasking" }, "CVE-2020-27675": { "cmt_msg": "xen/events: avoid removing an event channel while handling it" @@ -84258,53 +115546,8 @@ "CVE-2020-28915": { "cmt_msg": "fbcon: Fix global-out-of-bounds read in fbcon_get_font()" }, - "CVE-2023-7192": { - "cmt_msg": "netfilter: ctnetlink: fix possible refcount leak in ctnetlink_create_conntrack()" - }, - "CVE-2019-20908": { - "cmt_msg": "efi: Restrict efivar_ssdt_load when the kernel is locked down" - }, - "CVE-2023-3776": { - "cmt_msg": "net/sched: cls_fw: Fix improper refcount update leads to use-after-free" - }, - "CVE-2021-28038": { - "cmt_msg": "Xen/gnttab: handle p2m update errors on a per-slot basis" - }, - "CVE-2020-27068": { - "cmt_msg": "cfg80211: add missing policy for NL80211_ATTR_STATUS_CODE" - }, - "CVE-2021-29154": { - "cmt_msg": "bpf, x86: Validate computation of branch displacements for x86-64" - }, - "CVE-2023-52435": { - "cmt_msg": "net: prevent mss overflow in skb_segment()" - }, - "CVE-2023-52434": { - "cmt_msg": "smb: client: fix potential OOBs in smb2_parse_contexts()" - }, - "CVE-2023-3161": { - "cmt_msg": "fbcon: Check font dimension limits" - }, - "CVE-2023-52436": { - "cmt_msg": "f2fs: explicitly null-terminate the xattr list" - }, - "CVE-2019-19060": { - "cmt_msg": "iio: imu: adis16400: release allocated memory on failure" - }, - "CVE-2019-19061": { - "cmt_msg": "iio: imu: adis16400: fix memory leak" - }, - "CVE-2019-19062": { - "cmt_msg": "crypto: user - fix memory leak in crypto_report" - }, - "CVE-2019-19063": { - "cmt_msg": "rtlwifi: prevent memory leak in rtl_usb_probe" - }, - "CVE-2019-9445": { - "cmt_msg": "f2fs: check if file namelen exceeds max value" - }, - "CVE-2019-19066": { - "cmt_msg": "scsi: bfa: release allocated memory in case of error" + "CVE-2022-3111": { + "cmt_msg": "power: supply: wm8350-power: Add missing free in free_charger_irq" }, "CVE-2020-0435": { "cmt_msg": "f2fs: fix to do sanity check with i_extra_isize" @@ -84315,80 +115558,29 @@ "CVE-2020-0433": { "cmt_msg": "blk-mq: sync the update nr_hw_queues with blk_mq_queue_tag_busy_iter" }, - "CVE-2023-51779": { - "cmt_msg": "Bluetooth: af_bluetooth: Fix Use-After-Free in bt_sock_recvmsg" - }, - "CVE-2019-3874": { - "cmt_msg": "sctp: implement memory accounting on tx path" - }, - "CVE-2018-10877": { - "cmt_msg": "ext4: verify the depth of extent tree in ext4_find_extent()" - }, - "CVE-2016-8650": { - "cmt_msg": "mpi: Fix NULL ptr dereference in mpi_powm() " + "CVE-2020-0431": { + "cmt_msg": "HID: hid-input: clear unmapped usages" }, - "CVE-2010-4563": { - "cmt_msg": "" + "CVE-2023-6915": { + "cmt_msg": "ida: Fix crash in ida_free when the bitmap is empty" }, "CVE-2023-1249": { "cmt_msg": "coredump: Use the vma snapshot in fill_files_note" }, - "CVE-2020-14331": { - "cmt_msg": "vgacon: Fix for missing check in scrollback handling" - }, - "CVE-2016-8658": { - "cmt_msg": "brcmfmac: avoid potential stack overflow in brcmf_cfg80211_start_ap()" - }, - "CVE-2018-10879": { - "cmt_msg": "ext4: make sure bitmaps and the inode table don't overlap with bg descriptors" - }, - "CVE-2018-10878": { - "cmt_msg": "ext4: always check block group bounds in ext4_init_block_bitmap()" - }, - "CVE-2024-23851": { - "cmt_msg": "dm: limit the number of targets and parameter size area" - }, - "CVE-2023-0266": { - "cmt_msg": "ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF" - }, - "CVE-2023-1838": { - "cmt_msg": "Fix double fget() in vhost_net_set_backend()" - }, "CVE-2021-3483": { "cmt_msg": "firewire: nosy: Fix a use-after-free bug in nosy_ioctl()" }, - "CVE-2023-6040": { - "cmt_msg": "netfilter: nf_tables: Reject tables of unsupported family" - }, - "CVE-2021-38300": { - "cmt_msg": "bpf, mips: Validate conditional branch offsets" - }, - "CVE-2020-25656": { - "cmt_msg": "vt: keyboard, extend func_buf_lock to readers" - }, - "CVE-2022-0492": { - "cmt_msg": "cgroup-v1: Require capabilities to set release_agent" - }, - "CVE-2022-23042": { - "cmt_msg": "xen/netfront: react properly to failing gnttab_end_foreign_access_ref()" - }, - "CVE-2019-10142": { - "cmt_msg": "drivers/virt/fsl_hypervisor.c: prevent integer overflow in ioctl" - }, - "CVE-2021-4023": { - "cmt_msg": "io-wq: fix cancellation on create-worker failure" - }, - "CVE-2023-3268": { - "cmt_msg": "relayfs: fix out-of-bounds access in relay_file_read" + "CVE-2017-16913": { + "cmt_msg": "usbip: fix stub_rx: harden CMD_SUBMIT path to handle malicious input" }, - "CVE-2022-2318": { - "cmt_msg": "net: rose: fix UAF bugs caused by timer handler" + "CVE-2017-16912": { + "cmt_msg": "usbip: fix stub_rx: get_pipe() to validate endpoint number" }, - "CVE-2021-22555": { - "cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write" + "CVE-2017-16911": { + "cmt_msg": "usbip: prevent vhci_hcd driver from leaking a socket pointer address" }, - "CVE-2021-0399": { - "cmt_msg": "" + "CVE-2017-16914": { + "cmt_msg": "usbip: fix stub_send_ret_submit() vulnerability to null transfer_buffer" }, "CVE-2020-36691": { "cmt_msg": "netlink: limit recursion depth in policy validation" @@ -84396,32 +115588,14 @@ "CVE-2023-42755": { "cmt_msg": "net/sched: Retire rsvp classifier" }, - "CVE-2020-2732": { - "cmt_msg": "KVM: nVMX: Don't emulate instructions in guest mode" - }, - "CVE-2012-4542": { - "cmt_msg": "" - }, - "CVE-2022-1729": { - "cmt_msg": "perf: Fix sys_perf_event_open() race against self" - }, "CVE-2023-42752": { "cmt_msg": "igmp: limit igmpv3_newpack() packet size to IP_MAX_MTU" }, - "CVE-2023-4128": { - "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free" - }, - "CVE-2023-1118": { - "cmt_msg": "media: rc: Fix use-after-free bugs caused by ene_tx_irqsim()" - }, "CVE-2021-3573": { "cmt_msg": "Bluetooth: use correct lock to prevent UAF of hdev object" }, - "CVE-2022-1679": { - "cmt_msg": "ath9k: fix use-after-free in ath9k_hif_usb_rx_cb" - }, - "CVE-2018-1000026": { - "cmt_msg": "bnx2x: disable GSO where gso_size is too big for hardware" + "CVE-2022-1974": { + "cmt_msg": "nfc: replace improper check device_is_registered() in netlink related functions" }, "CVE-2022-1975": { "cmt_msg": "NFC: netlink: fix sleep in atomic bug when firmware download timeout" @@ -84429,27 +115603,9 @@ "CVE-2023-1380": { "cmt_msg": "wifi: brcmfmac: slab-out-of-bounds read in brcmf_get_assoc_ies()" }, - "CVE-2022-44032": { - "cmt_msg": "char: pcmcia: remove all the drivers" - }, - "CVE-2021-28972": { - "cmt_msg": "PCI: rpadlpar: Fix potential drc_name corruption in store functions" - }, "CVE-2018-12130": { "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" }, - "CVE-2020-14305": { - "cmt_msg": "netfilter: helpers: remove data_len usage for inkernel helpers" - }, - "CVE-2021-20292": { - "cmt_msg": "drm/ttm/nouveau: don't call tt destroy callback on alloc failure." - }, - "CVE-2021-31916": { - "cmt_msg": "dm ioctl: fix out of bounds array access when no devices" - }, - "CVE-2017-8065": { - "cmt_msg": "crypto: ccm - move cbcmac input off the stack" - }, "CVE-2022-32981": { "cmt_msg": "powerpc/32: Fix overread/overwrite of thread_struct via ptrace" }, @@ -84459,75 +115615,18 @@ "CVE-2018-13406": { "cmt_msg": "video: uvesafb: Fix integer overflow in allocation" }, - "CVE-2022-1280": { - "cmt_msg": "drm: avoid circular locks in drm_mode_getconnector" - }, - "CVE-2023-3772": { - "cmt_msg": "xfrm: add NULL check in xfrm_update_ae_params" - }, "CVE-2020-11668": { "cmt_msg": "media: xirlink_cit: add missing descriptor sanity checks" }, "CVE-2020-11669": { "cmt_msg": "powerpc/powernv/idle: Restore AMR/UAMOR/AMOR after idle" }, - "CVE-2019-15118": { - "cmt_msg": "ALSA: usb-audio: Fix a stack buffer overflow bug in check_input_term" - }, - "CVE-2019-12818": { - "cmt_msg": "net: nfc: Fix NULL dereference on nfc_llcp_build_tlv fails" - }, - "CVE-2019-12819": { - "cmt_msg": "mdio_bus: Fix use-after-free on device_register fails" - }, - "CVE-2023-0394": { - "cmt_msg": "ipv6: raw: Deduct extension header length in rawv6_push_pending_frames" - }, - "CVE-2020-10690": { - "cmt_msg": "ptp: fix the race between the release of ptp_clock and cdev" - }, - "CVE-2019-19332": { - "cmt_msg": "KVM: x86: fix out-of-bounds write in KVM_GET_EMULATED_CPUID (CVE-2019-19332)" - }, - "CVE-2019-15117": { - "cmt_msg": "ALSA: usb-audio: Fix an OOB bug in parse_audio_mixer_unit" - }, - "CVE-2021-3659": { - "cmt_msg": "net: mac802154: Fix general protection fault" - }, - "CVE-2022-25258": { - "cmt_msg": "USB: gadget: validate interface OS descriptor requests" - }, - "CVE-2021-4155": { - "cmt_msg": "xfs: map unwritten blocks in XFS_IOC_{ALLOC,FREE}SP just like fallocate" - }, "CVE-2019-14901": { "cmt_msg": "mwifiex: Fix heap overflow in mmwifiex_process_tdls_action_frame()" }, - "CVE-2021-4150": { - "cmt_msg": "block: fix incorrect references to disk objects" - }, - "CVE-2020-3702": { - "cmt_msg": "ath: Use safer key clearing with key cache entries" - }, - "CVE-2021-3653": { - "cmt_msg": "KVM: nSVM: avoid picking up unsupported bits from L2 in int_ctl (CVE-2021-3653)" - }, - "CVE-2021-3655": { - "cmt_msg": "sctp: validate from_addr_param return" - }, "CVE-2020-8694": { "cmt_msg": "powercap: restrict energy meter to root access" }, - "CVE-2021-4159": { - "cmt_msg": "bpf: Verifer, adjust_scalar_min_max_vals to always call update_reg_bounds()" - }, - "CVE-2019-12614": { - "cmt_msg": "powerpc/pseries/dlpar: Fix a missing check in dlpar_parse_cc_property()" - }, - "CVE-2019-12615": { - "cmt_msg": "mdesc: fix a missing-check bug in get_vdev_port_node_info()" - }, "CVE-2021-3715": { "cmt_msg": "net_sched: cls_route: remove the right filter from hashtable" }, @@ -84537,147 +115636,90 @@ "CVE-2019-16230": { "cmt_msg": "drm/amdkfd: fix a potential NULL pointer dereference (v2)" }, - "CVE-2017-12168": { - "cmt_msg": "arm64: KVM: pmu: Fix AArch32 cycle counter access" + "CVE-2019-16231": { + "cmt_msg": "fjes: Handle workqueue allocation failure" + }, + "CVE-2019-16232": { + "cmt_msg": "libertas: fix a potential NULL pointer dereference" }, "CVE-2019-16233": { "cmt_msg": "scsi: qla2xxx: fix a potential NULL pointer dereference" }, - "CVE-2021-3892": { - "cmt_msg": "" + "CVE-2019-16234": { + "cmt_msg": "iwlwifi: pcie: fix rb_allocator workqueue allocation" }, "CVE-2019-6133": { "cmt_msg": "fork: record start_time late" }, - "CVE-2018-10902": { - "cmt_msg": "ALSA: rawmidi: Change resized buffers atomically" - }, "CVE-2021-39633": { "cmt_msg": "ip_gre: add validation for csum_start" }, - "CVE-2020-27673": { - "cmt_msg": "xen/events: add a proper barrier to 2-level uevent unmasking" + "CVE-2017-18203": { + "cmt_msg": "dm: fix race between dm_get_from_kobject() and __dm_destroy()" }, "CVE-2021-39636": { "cmt_msg": "netfilter: x_tables: fix pointer leaks to userspace" }, - "CVE-2022-27223": { - "cmt_msg": "USB: gadget: validate endpoint index for xilinx udc" + "CVE-2017-18204": { + "cmt_msg": "ocfs2: should wait dio before inode lock in ocfs2_setattr()" }, "CVE-2021-39634": { "cmt_msg": "epoll: do not insert into poll queues until all sanity checks are done" }, - "CVE-2019-3882": { - "cmt_msg": "vfio/type1: Limit DMA mappings per container" - }, "CVE-2022-33742": { "cmt_msg": "xen/blkfront: force data bouncing when backend is untrusted" }, "CVE-2022-33741": { "cmt_msg": "xen/netfront: force data bouncing when backend is untrusted" }, - "CVE-2018-20509": { - "cmt_msg": "binder: refactor binder ref inc/dec for thread safety" - }, - "CVE-2024-24864": { - "cmt_msg": "" - }, - "CVE-2022-45885": { - "cmt_msg": "" + "CVE-2022-33740": { + "cmt_msg": "xen/netfront: fix leaking data in shared pages" }, "CVE-2022-33744": { "cmt_msg": "xen/arm: Fix race in RB-tree based P2M accounting" }, - "CVE-2017-9605": { - "cmt_msg": "drm/vmwgfx: Make sure backup_handle is always valid" + "CVE-2023-52596": { + "cmt_msg": "sysctl: Fix out of bounds access for empty sysctl registers" + }, + "CVE-2023-52597": { + "cmt_msg": "KVM: s390: fix setting of fpc register" }, "CVE-2017-18193": { "cmt_msg": "f2fs: fix a bug caused by NULL extent tree" }, - "CVE-2022-40768": { - "cmt_msg": "scsi: stex: Properly zero out the passthrough command structure" + "CVE-2023-52595": { + "cmt_msg": "wifi: rt2x00: restart beacon queue when hardware reset" }, - "CVE-2019-9454": { - "cmt_msg": "i2c: core-smbus: prevent stack corruption on read I2C_BLOCK_DATA" + "CVE-2023-52593": { + "cmt_msg": "wifi: wfx: fix possible NULL pointer dereference in wfx_set_mfp_ap()" }, - "CVE-2020-12888": { - "cmt_msg": "vfio-pci: Invalidate mmaps and block MMIO access on disabled memory" + "CVE-2023-52590": { + "cmt_msg": "ocfs2: Avoid touching renamed directory if parent does not change" + }, + "CVE-2023-52591": { + "cmt_msg": "reiserfs: Avoid touching renamed directory if parent does not change" }, "CVE-2017-6214": { "cmt_msg": "tcp: avoid infinite loop in tcp_splice_read()" }, - "CVE-2023-52445": { - "cmt_msg": "media: pvrusb2: fix use after free on context disconnection" - }, - "CVE-2017-6353": { - "cmt_msg": "sctp: deny peeloff operation on asocs with threads sleeping on it" - }, - "CVE-2016-6198": { - "cmt_msg": "vfs: add vfs_select_inode() helper" - }, - "CVE-2017-18174": { - "cmt_msg": "pinctrl: amd: Use devm_pinctrl_register() for pinctrl registration" - }, - "CVE-2022-41218": { - "cmt_msg": "media: dvb-core: Fix UAF due to refcount races at releasing" - }, - "CVE-2019-20934": { - "cmt_msg": "sched/fair: Don't free p->numa_faults with concurrent readers" - }, - "CVE-2023-52457": { - "cmt_msg": "serial: 8250: omap: Don't skip resource freeing if pm_runtime_resume_and_get() failed" - }, - "CVE-2022-36946": { - "cmt_msg": "netfilter: nf_queue: do not allow packet truncation below transport header offset" - }, - "CVE-2021-45485": { - "cmt_msg": "ipv6: use prandom_u32() for ID generation" - }, - "CVE-2016-4482": { - "cmt_msg": "USB: usbfs: fix potential infoleak in devio" - }, - "CVE-2018-19824": { - "cmt_msg": "ALSA: usb-audio: Fix UAF decrement if card has no live interfaces in card.c" - }, - "CVE-2022-21166": { - "cmt_msg": "x86/speculation/mmio: Enable CPU Fill buffer clearing on idle" - }, - "CVE-2020-29374": { - "cmt_msg": "gup: document and work around \"COW can break either way\" issue" - }, - "CVE-2020-0030": { - "cmt_msg": "ANDROID: binder: synchronize_rcu() when using POLLFREE." - }, - "CVE-2015-8709": { - "cmt_msg": "mm: Add a user_ns owner to mm_struct and fix ptrace permission checks" - }, - "CVE-2018-16862": { - "cmt_msg": "mm: cleancache: fix corruption on missed inode invalidation" - }, - "CVE-2023-52449": { - "cmt_msg": "mtd: Fix gluebi NULL pointer dereference caused by ftl notifier" + "CVE-2023-52599": { + "cmt_msg": "jfs: fix array-index-out-of-bounds in diNewExt" }, - "CVE-2021-29650": { - "cmt_msg": "netfilter: x_tables: Use correct memory barriers." + "CVE-2021-0447": { + "cmt_msg": "l2tp: protect sock pointer of struct pppol2tp_session with RCU" }, - "CVE-2019-17133": { - "cmt_msg": "cfg80211: wext: avoid copying malformed SSIDs" + "CVE-2022-23222": { + "cmt_msg": "bpf: Replace PTR_TO_XXX_OR_NULL with PTR_TO_XXX | PTR_MAYBE_NULL" }, - "CVE-2023-4010": { - "cmt_msg": "" + "CVE-2021-0448": { + "cmt_msg": "netfilter: ctnetlink: add a range check for l3/l4 protonum" }, - "CVE-2018-20169": { - "cmt_msg": "USB: check usb_get_extra_descriptor for proper size" + "CVE-2015-8660": { + "cmt_msg": "ovl: fix permission checking for setattr" }, "CVE-2017-12762": { "cmt_msg": "isdn/i4l: fix buffer overflow" }, - "CVE-2018-7754": { - "cmt_msg": "printk: hash addresses printed with %p" - }, - "CVE-2020-36558": { - "cmt_msg": "vt: vt_ioctl: fix race in VT_RESIZEX" - }, "CVE-2022-41849": { "cmt_msg": "fbdev: smscufx: Fix use-after-free in ufx_ops_open()" }, @@ -84685,446 +115727,290 @@ "cmt_msg": "" }, "CVE-2023-6356": { - "cmt_msg": "" + "cmt_msg": "nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length" }, "CVE-2022-1353": { "cmt_msg": "af_key: add __GFP_ZERO flag for compose_sadb_supported in function pfkey_register" }, - "CVE-2022-28356": { - "cmt_msg": "llc: fix netdevice reference leaks in llc_ui_bind()" - }, - "CVE-2015-8964": { - "cmt_msg": "tty: Prevent ldisc drivers from re-using stale tty fields" + "CVE-2022-1198": { + "cmt_msg": "drivers: hamradio: 6pack: fix UAF bug caused by mod_timer()" }, "CVE-2022-1199": { "cmt_msg": "ax25: Fix NULL pointer dereference in ax25_kill_by_device" }, - "CVE-2023-6546": { - "cmt_msg": "tty: n_gsm: fix the UAF caused by race condition in gsm_cleanup_mux" - }, - "CVE-2021-39801": { - "cmt_msg": "" - }, - "CVE-2021-39800": { - "cmt_msg": "" - }, - "CVE-2015-8962": { - "cmt_msg": "sg: Fix double-free when drives detach during SG_IO" - }, - "CVE-2015-8963": { - "cmt_msg": "perf: Fix race in swevent hash" - }, - "CVE-2018-16884": { - "cmt_msg": "sunrpc: use-after-free in svc_process_common()" - }, "CVE-2022-1195": { "cmt_msg": "hamradio: improve the incomplete fix to avoid NPD" }, - "CVE-2024-22099": { - "cmt_msg": "" - }, - "CVE-2021-4202": { - "cmt_msg": "NFC: reorganize the functions in nci_request" - }, - "CVE-2021-4203": { - "cmt_msg": "af_unix: fix races in sk_peer_pid and sk_peer_cred accesses" - }, - "CVE-2022-45887": { - "cmt_msg": "media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb()" - }, - "CVE-2022-45886": { - "cmt_msg": "media: dvb-core: Fix use-after-free due on race condition at dvb_net" - }, - "CVE-2023-46343": { - "cmt_msg": "nfc: nci: fix possible NULL pointer dereference in send_acknowledge()" - }, - "CVE-2024-24859": { - "cmt_msg": "" - }, - "CVE-2023-5178": { - "cmt_msg": "nvmet-tcp: Fix a possible UAF in queue intialization setup" - }, "CVE-2023-2124": { "cmt_msg": "xfs: verify buffer contents when we skip log replay" }, - "CVE-2021-3609": { - "cmt_msg": "can: bcm: delay release of struct bcm_op after synchronize_rcu()" - }, - "CVE-2021-44879": { - "cmt_msg": "f2fs: fix to do sanity check on inode type during garbage collection" - }, "CVE-2019-15505": { "cmt_msg": "media: technisat-usb2: break out of loop at end of buffer" }, - "CVE-2023-2513": { - "cmt_msg": "ext4: fix use-after-free in ext4_xattr_set_entry" - }, - "CVE-2017-1000": { - "cmt_msg": "udp: consistently apply ufo or fragmentation" + "CVE-2018-21008": { + "cmt_msg": "rsi: add fix for crash during assertions" }, "CVE-2022-27672": { "cmt_msg": "x86/speculation: Identify processors vulnerable to SMT RSB predictions" }, - "CVE-2020-0429": { - "cmt_msg": "l2tp: fix race between l2tp_session_delete() and l2tp_tunnel_closeall()" - }, - "CVE-2020-27066": { - "cmt_msg": "xfrm: policy: Fix doulbe free in xfrm_policy_timer" - }, - "CVE-2022-2964": { - "cmt_msg": "net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup" - }, - "CVE-2017-0605": { - "cmt_msg": "tracing: Use strlcpy() instead of strcpy() in __trace_find_cmdline()" - }, - "CVE-2021-1048": { - "cmt_msg": "fix regression in \"epoll: Keep a reference on files added to the check list\"" - }, - "CVE-2015-2877": { - "cmt_msg": "" - }, - "CVE-2020-9383": { - "cmt_msg": "floppy: check FDC index for errors before assigning it" - }, - "CVE-2023-32269": { - "cmt_msg": "netrom: Fix use-after-free caused by accept on already connected socket" - }, - "CVE-2023-1206": { - "cmt_msg": "tcp: Reduce chance of collisions in inet6_hashfn()." - }, - "CVE-2021-38198": { - "cmt_msg": "KVM: X86: MMU: Use the correct inherited permissions to get shadow page" - }, - "CVE-2017-5972": { - "cmt_msg": "tcp: do not lock listener to process SYN packets" - }, - "CVE-2023-34256": { - "cmt_msg": "ext4: avoid a potential slab-out-of-bounds in ext4_group_desc_csum" - }, - "CVE-2017-5970": { - "cmt_msg": "ipv4: keep skb->dst around in presence of IP options" - }, - "CVE-2023-1513": { - "cmt_msg": "kvm: initialize all of the kvm_debugregs structure before sending it to userspace" - }, - "CVE-2015-4004": { - "cmt_msg": "staging: ozwpan: Remove from tree" - }, - "CVE-2021-26401": { - "cmt_msg": "x86/speculation: Use generic retpoline by default on AMD" - }, - "CVE-2021-3847": { - "cmt_msg": "" - }, - "CVE-2022-2961": { - "cmt_msg": "" - }, - "CVE-2023-52442": { - "cmt_msg": "ksmbd: validate session id and tree id in compound request" - }, - "CVE-2019-14284": { - "cmt_msg": "floppy: fix div-by-zero in setup_format_params" - }, - "CVE-2020-36557": { - "cmt_msg": "vt: vt_ioctl: fix VT_DISALLOCATE freeing in-use virtual console" - }, - "CVE-2021-3506": { - "cmt_msg": "f2fs: fix to avoid out-of-bounds memory access" - }, - "CVE-2011-4917": { - "cmt_msg": "" + "CVE-2023-52508": { + "cmt_msg": "nvme-fc: Prevent null pointer dereference in nvme_fc_io_getuuid()" }, - "CVE-2011-4916": { - "cmt_msg": "" + "CVE-2022-1280": { + "cmt_msg": "drm: avoid circular locks in drm_mode_getconnector" }, "CVE-2018-10880": { "cmt_msg": "ext4: never move the system.data xattr out of the inode body" }, - "CVE-2019-3901": { - "cmt_msg": "perf/core: Fix perf_event_open() vs. execve() race" - }, - "CVE-2019-3900": { - "cmt_msg": "vhost_net: fix possible infinite loop" - }, - "CVE-2019-19533": { - "cmt_msg": "media: ttusb-dec: Fix info-leak in ttusb_dec_send_command()" - }, - "CVE-2018-13100": { - "cmt_msg": "f2fs: fix to do sanity check with secs_per_zone" - }, - "CVE-2019-15807": { - "cmt_msg": "scsi: libsas: delete sas port if expander discover failed" - }, - "CVE-2019-19530": { - "cmt_msg": "usb: cdc-acm: make sure a refcount is taken early enough" - }, - "CVE-2023-31083": { - "cmt_msg": "Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO" - }, - "CVE-2019-5489": { - "cmt_msg": "Change mincore() to count \"mapped\" pages rather than \"cached\" pages" - }, - "CVE-2024-1312": { - "cmt_msg": "mm: lock_vma_under_rcu() must check vma->anon_vma under vma lock" - }, - "CVE-2019-19531": { - "cmt_msg": "usb: yurex: Fix use-after-free in yurex_delete" - }, - "CVE-2019-14283": { - "cmt_msg": "floppy: fix out-of-bounds read in copy_buffer" - }, "CVE-2018-10881": { "cmt_msg": "ext4: clear i_data in ext4_inode_info when removing inline data" }, - "CVE-2018-10882": { - "cmt_msg": "ext4: add more inode number paranoia checks" - }, - "CVE-2018-10883": { - "cmt_msg": "jbd2: don't mark block as modified if the handle is out of credits" + "CVE-2024-26713": { + "cmt_msg": "powerpc/pseries/iommu: Fix iommu initialisation during DLPAR add" } } }, - "5.5": { - "5.5": { - "CVE-2019-14896": { - "cmt_msg": "libertas: Fix two buffer overflows at parsing bss descriptor", - "cmt_id": "e5e884b42639c74b5b57dc277909915c0aefc8bb" - }, - "CVE-2019-14897": { - "cmt_msg": "libertas: Fix two buffer overflows at parsing bss descriptor", - "cmt_id": "e5e884b42639c74b5b57dc277909915c0aefc8bb" - }, - "CVE-2020-14416": { - "cmt_msg": "can, slip: Protect tty->disc_data in write_wakeup and close with RCU", - "cmt_id": "0ace17d56824165c7f4c68785d6b58971db954dd" - }, - "CVE-2020-8428": { - "cmt_msg": "do_last(): fetch directory ->i_mode and ->i_uid before it's too late", - "cmt_id": "d0cb50185ae942b03c4327be322055d622dc79f6" - } - }, - "5.5.1": { - "CVE-2020-0432": { - "cmt_msg": "staging: most: net: fix buffer overflow", - "cmt_id": "791f6de9e3937f24fd72b8c182d51bcf4421d490" - } - }, - "5.5.3": { - "CVE-2020-0404": { - "cmt_msg": "media: uvcvideo: Avoid cyclic entity chains due to malformed USB descriptors", - "cmt_id": "50142f89e13623ffd976b85cb1ccd3db2c430e9f" - }, - "CVE-2019-3016": { - "cmt_msg": "x86/kvm: Be careful not to clear KVM_VCPU_FLUSH_TLB bit", - "cmt_id": "06b34107899d1b004462c9d2e52ff5a146ee9898" + "5.7": { + "5.7": { + "CVE-2020-10732": { + "cmt_msg": "fs/binfmt_elf.c: allocate initialized memory in fill_thread_core_info()", + "cmt_id": "1d605416fb7175e1adf094251466caa52093b413" } }, - "5.5.4": { - "CVE-2020-12653": { - "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_cmd_append_vsie_tlv()", - "cmt_id": "fe078681043f0958d7956d221ffd3f480a691b62" + "5.7.1": { + "CVE-2020-10757": { + "cmt_msg": "mm: Fix mremap not considering huge pmd devmap", + "cmt_id": "e98a6a24baae41cc3632a0bf343fe844eff53cea" }, - "CVE-2020-12654": { - "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_ret_wmm_get_status()", - "cmt_id": "f3a6883c5acbb81be8f1eb87fdd045c2dc59a901" + "CVE-2019-19462": { + "cmt_msg": "kernel/relay.c: handle alloc_percpu returning NULL in relay_open", + "cmt_id": "8c20f4355ab55fc07facacb1cd99bdb6fc5ebc1d" } }, - "5.5.5": { - "CVE-2022-1419": { - "cmt_msg": "drm/vgem: Close use-after-free race in vgem_gem_create", - "cmt_id": "c578f31bba29d2c6a97d2ad279ae3cd261dcc786" + "5.7.2": { + "CVE-2020-13974": { + "cmt_msg": "vt: keyboard: avoid signed integer overflow in k_ascii", + "cmt_id": "7ca8cd811dcc6550be059813caf4f2cf888a7616" }, - "CVE-2020-8992": { - "cmt_msg": "ext4: add cond_resched() to ext4_protect_reserved_inode", - "cmt_id": "9bc7647fe62823bfb6921e98ba40196706eca89a" + "CVE-2020-0543": { + "cmt_msg": "x86/cpu: Add 'table' argument to cpu_matches()", + "cmt_id": "468e86c304bd2e32307b438b67d61c0075a9beb9" } }, - "5.5.7": { - "CVE-2020-0110": { - "cmt_msg": "sched/psi: Fix OOB write when writing 0 bytes to PSI files", - "cmt_id": "9ce51fc82bbc8632cb55643ce309bd6732b3d5db" - }, - "CVE-2020-0009": { - "cmt_msg": "staging: android: ashmem: Disallow ashmem memory from being remapped", - "cmt_id": "aa5122eaa89d875bec5f27d3be1fecd5504ca507" + "5.7.3": { + "CVE-2021-0342": { + "cmt_msg": "tun: correct header offsets in napi frags mode", + "cmt_id": "ab5e1d8d91872d6d80119a560255ff549985cff9" }, - "CVE-2020-9383": { - "cmt_msg": "floppy: check FDC index for errors before assigning it", - "cmt_id": "3604f164a31e6acb38ef2fa7588db18bbcd644fe" + "CVE-2020-10766": { + "cmt_msg": "x86/speculation: Prevent rogue cross-process SSBD shutdown", + "cmt_id": "18f82da06ec6653646fd2670765aac24275f4833" }, - "CVE-2020-2732": { - "cmt_msg": "KVM: nVMX: Don't emulate instructions in guest mode", - "cmt_id": "bfdac9d7632d29fab54cb4488d208a89c9ac48c7" + "CVE-2020-10767": { + "cmt_msg": "x86/speculation: Avoid force-disabling IBPB based on STIBP and enhanced IBRS.", + "cmt_id": "862442343c016befe654c1f3f8d9d5791071df4c" }, - "CVE-2020-36558": { - "cmt_msg": "vt: vt_ioctl: fix race in VT_RESIZEX", - "cmt_id": "be61d458e9204e54030820a685649219a9b5c6a5" + "CVE-2020-10768": { + "cmt_msg": "x86/speculation: PR_SPEC_FORCE_DISABLE enforcement for indirect branches.", + "cmt_id": "69e93896809da49f0946044bd31daf9a7482b440" }, - "CVE-2020-9391": { - "cmt_msg": "mm: Avoid creating virtual address aliases in brk()/mmap()/mremap()", - "cmt_id": "c1947a09073350073f73e7024bda4cfdc240dc8f" + "CVE-2020-29374": { + "cmt_msg": "gup: document and work around \"COW can break either way\" issue", + "cmt_id": "8e45fdafdecc8436c5b6e1620c30726056e6b29c" } }, - "5.5.8": { - "CVE-2020-27068": { - "cmt_msg": "cfg80211: add missing policy for NL80211_ATTR_STATUS_CODE", - "cmt_id": "d9fe1596f1345d155f936fffaa97bcdca41a6bb8" - }, - "CVE-2019-19768": { - "cmt_msg": "blktrace: Protect q->blk_trace with RCU", - "cmt_id": "ed1832ea0518339d702a2212a0a7fd37f5d169c0" - }, - "CVE-2020-10942": { - "cmt_msg": "vhost: Check docket sk_family instead of call getname", - "cmt_id": "54cd3ad4d9ccad89b986248a670eab359ef9b8dd" - }, - "CVE-2020-0444": { - "cmt_msg": "audit: fix error handling in audit_data_to_entry()", - "cmt_id": "4f3daed0c7ffee4756da2d8c6fb0d5027d97ec87" + "5.7.5": { + "CVE-2020-29368": { + "cmt_msg": "mm: thp: make the THP mapcount atomic against __split_huge_pmd_locked()", + "cmt_id": "114b91ff0861de531e412aebe8c4dfda21291c7b" } }, - "5.5.9": { - "CVE-2020-8649": { - "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region", - "cmt_id": "270059ce5063ff98e2229d6cabe56927513f4ca6" - }, - "CVE-2020-8647": { - "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region", - "cmt_id": "270059ce5063ff98e2229d6cabe56927513f4ca6" - }, - "CVE-2020-27418": { - "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region", - "cmt_id": "270059ce5063ff98e2229d6cabe56927513f4ca6" + "5.7.6": { + "CVE-2020-12771": { + "cmt_msg": "bcache: fix potential deadlock problem in btree_gc_coalesce", + "cmt_id": "4813dd656732207ad9df7738652bbbbde4c7c928" }, - "CVE-2020-8648": { - "cmt_msg": "vt: selection, close sel_buffer race", - "cmt_id": "7b2eea176b28f9ff3ab1c6cae2332defe94fd1e9" - } - }, - "5.5.10": { - "CVE-2020-12465": { - "cmt_msg": "mt76: fix array overflow on receiving too many fragments for a packet", - "cmt_id": "fc09229baaaf75e068302b060f7f21548ba2ded6" + "CVE-2020-15436": { + "cmt_msg": "block: Fix use-after-free in blkdev_get()", + "cmt_id": "4f8d723f871edb95a05d43ad88faf406c66393db" } }, - "5.5.11": { - "CVE-2020-29370": { - "cmt_msg": "mm: slub: add missing TID bump in kmem_cache_alloc_bulk()", - "cmt_id": "b31a837d420c0defb088f1b6e39217c83b8d99af" + "5.7.7": { + "CVE-2020-15780": { + "cmt_msg": "ACPI: configfs: Disallow loading ACPI tables when locked down", + "cmt_id": "63897052acc5a97e6cd0ffecda0a8d05aab6f85b" } }, - "5.5.12": { - "CVE-2019-19769": { - "cmt_msg": "locks: fix a potential use-after-free problem when wakeup a waiter", - "cmt_id": "5e62fb2c5d44e82ee7fae8c7fe946c7116489281" + "5.7.8": { + "CVE-2020-24394": { + "cmt_msg": "nfsd: apply umask on fs without ACL support", + "cmt_id": "fb17be570b470fd56ccb2db7c1b0beb4d0d590d7" }, - "CVE-2020-14381": { - "cmt_msg": "futex: Fix inode life-time issue", - "cmt_id": "55515c7d837d173393d25912b5593387eb0a4e25" + "CVE-2020-15393": { + "cmt_msg": "usb: usbtest: fix missing kfree(dev->buf) in usbtest_disconnect", + "cmt_id": "4c424f6d0af716110dd7d78e89afce4d99f16815" } }, - "5.5.14": { - "CVE-2020-8835": { - "cmt_msg": "bpf: Undo incorrect __reg_bound_offset32 handling", - "cmt_id": "0ebc01466d98d016eb6a3780ec8edb0c86fa48bc" + "5.7.10": { + "CVE-2020-15852": { + "cmt_msg": "x86/ioperm: Fix io bitmap invalidation on Xen PV", + "cmt_id": "3bbf8195e79707268f4fd072d7575ced0207e4ef" }, - "CVE-2020-11668": { - "cmt_msg": "media: xirlink_cit: add missing descriptor sanity checks", - "cmt_id": "10b65719f712f0f823e2b961837aa7300347645a" + "CVE-2020-14356": { + "cmt_msg": "cgroup: fix cgroup_sk_alloc() for sk_clone_lock()", + "cmt_id": "26d0bcfcf7150bc7c115f2d3f2f1459e64029b98" }, - "CVE-2021-3715": { - "cmt_msg": "net_sched: cls_route: remove the right filter from hashtable", - "cmt_id": "858b3a85bb1b26043f0d40e9af1d295a5c2fa7a1" + "CVE-2022-0812": { + "cmt_msg": "xprtrdma: fix incorrect header size calculations", + "cmt_id": "fe3b01c6588829a4a5d89e4b6d4254087aa40f20" }, - "CVE-2020-27066": { - "cmt_msg": "xfrm: policy: Fix doulbe free in xfrm_policy_timer", - "cmt_id": "a6ca6e66a8b2f8741610d99c95c9bf5748e08372" + "CVE-2020-10781": { + "cmt_msg": "Revert \"zram: convert remaining CLASS_ATTR() to CLASS_ATTR_RO()\"", + "cmt_id": "8fd782b2376168717dddfbcae0786b47e61777bb" + } + }, + "5.7.11": { + "CVE-2020-29369": { + "cmt_msg": "mm/mmap.c: close race between munmap() and expand_upwards()/downwards()", + "cmt_id": "b6afd2a9f2839a60a6cd6a0cac740019f90c35eb" }, - "CVE-2020-11608": { - "cmt_msg": "media: ov519: add missing endpoint sanity checks", - "cmt_id": "773972d6e95a714a08b0653bcd5f5f57caa6b8b6" + "CVE-2020-15437": { + "cmt_msg": "serial: 8250: fix null-ptr-deref in serial8250_start_tx()", + "cmt_id": "eb710a1ac0b2c5d46917563b78ebef429b0e8738" + } + }, + "5.7.13": { + "CVE-2020-24490": { + "cmt_msg": "Bluetooth: fix kernel oops in store_pending_adv_report", + "cmt_id": "15a9441c207a546ae7cadfe092aea5ae9751c967" }, - "CVE-2020-11609": { - "cmt_msg": "media: stv06xx: add missing descriptor sanity checks", - "cmt_id": "7d565c3bbc5c1255a79d63641ac5fbbfb819216d" + "CVE-2020-12656": { + "cmt_msg": "sunrpc: check that domain table is empty at module unload.", + "cmt_id": "ec25aabaffe687774165ae491cc797d7d8a79454" } }, - "5.5.15": { - "CVE-2020-36557": { - "cmt_msg": "vt: vt_ioctl: fix VT_DISALLOCATE freeing in-use virtual console", - "cmt_id": "dafe1c8034fd5c7c3ae930aa76c8bc5333ee1096" + "5.7.14": { + "CVE-2020-16166": { + "cmt_msg": "random32: update the net random state on interrupt and activity", + "cmt_id": "378a4d2215334fa4d3c5888a008f8896066bc231" } }, - "5.5.16": { - "CVE-2020-11565": { - "cmt_msg": "mm: mempolicy: require at least one nodeid for MPOL_PREFERRED", - "cmt_id": "d541416601eed8f771488386dc49d91ce677e3a9" + "5.7.15": { + "CVE-2020-36386": { + "cmt_msg": "Bluetooth: Fix slab-out-of-bounds read in hci_extended_inquiry_result_evt()", + "cmt_id": "886a27c346901b6b5a3d5b12ca50ca821817185d" + }, + "CVE-2020-14331": { + "cmt_msg": "vgacon: Fix for missing check in scrollback handling", + "cmt_id": "b2f1d746c96a16ae97099b9f454d01a9b730c26a" } }, - "5.5.17": { - "CVE-2020-11494": { - "cmt_msg": "slcan: Don't transmit uninitialized stack data in padding", - "cmt_id": "51fafff685ba3b1228e1def7d79094a951585574" + "5.7.16": { + "CVE-2020-26088": { + "cmt_msg": "net/nfc/rawsock.c: add CAP_NET_RAW check.", + "cmt_id": "f8093f0d1ababcb1a1ea859e1638a14fa5627e42" + }, + "CVE-2020-36387": { + "cmt_msg": "io_uring: hold 'ctx' reference around task_work queue + execute", + "cmt_id": "f93bc10c64afceb019ccdc7b5424ecedbd613f64" + }, + "CVE-2019-19770": { + "cmt_msg": "blktrace: fix debugfs use after free", + "cmt_id": "4470c2949a07883cda4de6899ce8507b0fc6aa5d" + }, + "CVE-2021-20292": { + "cmt_msg": "drm/ttm/nouveau: don't call tt destroy callback on alloc failure.", + "cmt_id": "7387ad86fe8ef830e88a586b021b322eef316211" } }, - "5.5.18": { - "CVE-2019-19039": { - "cmt_msg": "btrfs: Don't submit any btree write bio if the fs has errors", - "cmt_id": "49a9f499e847b3d4efbede21f541d61d079f9773" + "5.7.17": { + "CVE-2019-19448": { + "cmt_msg": "btrfs: only search for left_info if there is no right_info in try_merge_free_space", + "cmt_id": "7726619a51873ac0ac73d31f7852e0eb01a0833b" }, - "CVE-2020-12826": { - "cmt_msg": "signal: Extend exec_id to 64bits", - "cmt_id": "d65376ec3f4713fbd47e1837228394d06c7ada2a" + "CVE-2020-25212": { + "cmt_msg": "nfs: Fix getxattr kernel panic and memory overflow", + "cmt_id": "4476b8282f0bdbf21c8a1e5d783ee11a0edfcaf2" + } + }, + "5.7.18": { + "CVE-2020-14314": { + "cmt_msg": "ext4: fix potential negative array index in do_split()", + "cmt_id": "e50fe43e3062e18846e99d9646b9c07b097eb1ed" }, - "CVE-2020-12657": { - "cmt_msg": "block, bfq: fix use-after-free in bfq_idle_slice_timer_body", - "cmt_id": "a8cb63998d1d41830d3e400ab9d0795771e57e87" + "CVE-2020-29371": { + "cmt_msg": "romfs: fix uninitialized memory leak in romfs_dev_read()", + "cmt_id": "ec5713663214ae0cc9821c0a40b6c6022fcaa4d8" }, - "CVE-2019-19377": { - "cmt_msg": "btrfs: Don't submit any btree write bio if the fs has errors", - "cmt_id": "49a9f499e847b3d4efbede21f541d61d079f9773" + "CVE-2020-0466": { + "cmt_msg": "do_epoll_ctl(): clean the failure exits up a bit", + "cmt_id": "7d6b91e878c590f471db7ed0ddb1952f40146cec" } }, "outstanding": { "CVE-2020-36322": { "cmt_msg": "fuse: fix bad inode" }, - "CVE-2020-10711": { - "cmt_msg": "netlabel: cope with NULL catmap" + "CVE-2023-30772": { + "cmt_msg": "power: supply: da9150: Fix use after free bug in da9150_charger_remove due to race condition" }, "CVE-2020-35508": { "cmt_msg": "fork: fix copy_process(CLONE_PARENT) race with the exiting ->real_parent" }, + "CVE-2024-26625": { + "cmt_msg": "llc: call sock_orphan() at release time" + }, "CVE-2022-3649": { "cmt_msg": "nilfs2: fix use-after-free bug of struct nilfs_root" }, "CVE-2020-35501": { "cmt_msg": "" }, + "CVE-2023-6176": { + "cmt_msg": "net/tls: do not free tls_rec on async operation in bpf_exec_tx_verdict()" + }, "CVE-2021-45095": { "cmt_msg": "phonet: refcount leak in pep_sock_accep" }, - "CVE-2020-29369": { - "cmt_msg": "mm/mmap.c: close race between munmap() and expand_upwards()/downwards()" - }, "CVE-2022-0001": { "cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE" }, - "CVE-2020-12464": { - "cmt_msg": "USB: core: Fix free-while-in-use bug in the USB S-Glibrary" + "CVE-2023-2248": { + "cmt_msg": "net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg" }, "CVE-2022-0002": { "cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE" }, + "CVE-2021-3752": { + "cmt_msg": "Bluetooth: fix use-after-free error in lock_sock_nested()" + }, + "CVE-2024-26685": { + "cmt_msg": "nilfs2: fix potential bug in end_buffer_async_write" + }, + "CVE-2023-52615": { + "cmt_msg": "hwrng: core - Fix page fault dead lock on mmap-ed hwrng" + }, + "CVE-2023-52614": { + "cmt_msg": "PM / devfreq: Fix buffer overflow in trans_stat_show" + }, + "CVE-2023-52617": { + "cmt_msg": "PCI: switchtec: Fix stdev_release() crash after surprise hot remove" + }, "CVE-2020-24587": { "cmt_msg": "mac80211: prevent mixed key and fragment cache attacks" }, "CVE-2020-24586": { "cmt_msg": "mac80211: prevent mixed key and fragment cache attacks" }, + "CVE-2023-52612": { + "cmt_msg": "crypto: scomp - fix req->dst buffer overflow" + }, "CVE-2022-3105": { "cmt_msg": "RDMA/uverbs: Check for null return of kmalloc_array" }, + "CVE-2022-3104": { + "cmt_msg": "lkdtm/bugs: Check for the NULL pointer after calling kmalloc" + }, "CVE-2021-0129": { "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical" }, @@ -85134,6 +116020,9 @@ "CVE-2022-47520": { "cmt_msg": "wifi: wilc1000: validate pairwise and authentication suite offsets" }, + "CVE-2022-47521": { + "cmt_msg": "wifi: wilc1000: validate length of IEEE80211_P2P_ATTR_CHANNEL_LIST attribute" + }, "CVE-2023-5717": { "cmt_msg": "perf: Disallow mis-matched inherited group reads" }, @@ -85152,6 +116041,9 @@ "CVE-2022-0480": { "cmt_msg": "memcg: enable accounting for file lock caches" }, + "CVE-2023-4273": { + "cmt_msg": "exfat: check if filename entries exceeds max filename length" + }, "CVE-2022-0487": { "cmt_msg": "moxart: fix potential use-after-free on remove path" }, @@ -85161,6 +116053,9 @@ "CVE-2022-42703": { "cmt_msg": "mm/rmap: Fix anon_vma->degree ambiguity leading to double-reuse" }, + "CVE-2021-47059": { + "cmt_msg": "crypto: sun8i-ss - fix result memory leak on error path" + }, "CVE-2022-23825": { "cmt_msg": "" }, @@ -85170,26 +116065,65 @@ "CVE-2021-42252": { "cmt_msg": "soc: aspeed: lpc-ctrl: Fix boundary check for mmap" }, + "CVE-2021-47051": { + "cmt_msg": "spi: fsl-lpspi: Fix PM reference leak in lpspi_prepare_xfer_hardware()" + }, "CVE-2023-0179": { "cmt_msg": "netfilter: nft_payload: incorrect arithmetics when fetching VLAN header bits" }, - "CVE-2024-26588": { - "cmt_msg": "LoongArch: BPF: Prevent out-of-bounds memory access" + "CVE-2021-47056": { + "cmt_msg": "crypto: qat - ADF_STATUS_PF_RUNNING should be set after adf_dev_init" + }, + "CVE-2021-47054": { + "cmt_msg": "bus: qcom: Put child node before return" + }, + "CVE-2021-47112": { + "cmt_msg": "x86/kvm: Teardown PV features on boot CPU as well" + }, + "CVE-2021-47113": { + "cmt_msg": "btrfs: abort in rename_exchange if we fail to insert the second ref" + }, + "CVE-2021-47110": { + "cmt_msg": "x86/kvm: Disable kvmclock on all CPUs on shutdown" + }, + "CVE-2021-47111": { + "cmt_msg": "xen-netback: take a reference to the RX task thread" + }, + "CVE-2021-47116": { + "cmt_msg": "ext4: fix memory leak in ext4_mb_init_backend on error path." + }, + "CVE-2021-47117": { + "cmt_msg": "ext4: fix bug on in ext4_es_cache_extent as ext4_split_extent_at failed" + }, + "CVE-2021-47114": { + "cmt_msg": "ocfs2: fix data corruption by fallocate" + }, + "CVE-2024-26759": { + "cmt_msg": "mm/swap: fix race when skipping swapcache" }, "CVE-2022-21125": { "cmt_msg": "x86/speculation/mmio: Reuse SRBDS mitigation for SBDS" }, + "CVE-2021-46971": { + "cmt_msg": "perf/core: Fix unconditional security_locked_down() call" + }, + "CVE-2021-46970": { + "cmt_msg": "bus: mhi: pci_generic: Remove WQ_MEM_RECLAIM flag from state workqueue" + }, + "CVE-2021-46977": { + "cmt_msg": "KVM: VMX: Disable preemption when probing user return MSRs" + }, "CVE-2023-28466": { "cmt_msg": "net: tls: fix possible race condition between do_tls_getsockopt_conf() and do_tls_setsockopt_conf()" }, "CVE-2022-40307": { "cmt_msg": "efi: capsule-loader: Fix use-after-free in efi_capsule_write" }, - "CVE-2022-21123": { - "cmt_msg": "x86/speculation/mmio: Add mitigation for Processor MMIO Stale Data" + "CVE-2021-46974": { + "cmt_msg": "bpf: Fix masking negation logic upon negative dst register" }, - "CVE-2020-29368": { - "cmt_msg": "mm: thp: make the THP mapcount atomic against __split_huge_pmd_locked()" + "CVE-2021-28688": { + "cmt_msg": "xen-blkback: don't leak persistent grants from xen_blkbk_map()" }, "CVE-2021-39686": { "cmt_msg": "binder: use euid from cred instead of using task" @@ -85203,8 +116137,11 @@ "CVE-2021-43976": { "cmt_msg": "mwifiex: Fix skb_over_panic in mwifiex_usb_recv()" }, - "CVE-2020-0466": { - "cmt_msg": "do_epoll_ctl(): clean the failure exits up a bit" + "CVE-2023-52519": { + "cmt_msg": "HID: intel-ish-hid: ipc: Disable and reenable ACPI GPE bit" + }, + "CVE-2024-26774": { + "cmt_msg": "ext4: avoid dividing by 0 in mb_update_avg_fragment_size() when block bitmap corrupt" }, "CVE-2023-0459": { "cmt_msg": "uaccess: Add speculation barrier to copy_from_user()" @@ -85212,6 +116149,9 @@ "CVE-2023-0458": { "cmt_msg": "prlimit: do_prlimit needs to have a speculation check" }, + "CVE-2022-2078": { + "cmt_msg": "netfilter: nf_tables: sanitize nft_set_desc_concat_parse()" + }, "CVE-2023-0597": { "cmt_msg": "x86/mm: Randomize per-cpu entry area" }, @@ -85221,9 +116161,6 @@ "CVE-2021-3744": { "cmt_msg": "crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd()" }, - "CVE-2022-42720": { - "cmt_msg": "wifi: cfg80211: fix BSS refcounting bugs" - }, "CVE-2021-30002": { "cmt_msg": "media: v4l: ioctl: Fix memory leak in video_usercopy" }, @@ -85236,9 +116173,6 @@ "CVE-2022-3628": { "cmt_msg": "wifi: brcmfmac: Fix potential buffer overflow in brcmf_fweh_event_worker()" }, - "CVE-2024-26591": { - "cmt_msg": "bpf: Fix re-attachment branch in bpf_tracing_prog_attach" - }, "CVE-2020-15802": { "cmt_msg": "" }, @@ -85263,32 +116197,59 @@ "CVE-2021-34556": { "cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4" }, - "CVE-2019-15902": { - "cmt_msg": "unknown" + "CVE-2022-34918": { + "cmt_msg": "netfilter: nf_tables: stricter validation of element data" }, "CVE-2022-40982": { "cmt_msg": "x86/speculation: Add Gather Data Sampling mitigation" }, + "CVE-2024-26735": { + "cmt_msg": "ipv6: sr: fix possible use-after-free and null-ptr-deref" + }, + "CVE-2022-2585": { + "cmt_msg": "posix-cpu-timers: Cleanup CPU timers before freeing them during exec" + }, "CVE-2022-3202": { "cmt_msg": "jfs: prevent NULL deref in diFree" }, + "CVE-2024-25739": { + "cmt_msg": "" + }, + "CVE-2021-47028": { + "cmt_msg": "mt76: mt7915: fix txrate reporting" + }, "CVE-2022-2602": { "cmt_msg": "io_uring/af_unix: defer registered files gc to io_uring release" }, "CVE-2024-26585": { "cmt_msg": "tls: fix race between tx work scheduling and socket close" }, - "CVE-2024-26584": { - "cmt_msg": "net: tls: handle backlogging of crypto requests" + "CVE-2021-47024": { + "cmt_msg": "vsock/virtio: free queued packets when closing socket" + }, + "CVE-2023-52511": { + "cmt_msg": "spi: sun6i: reduce DMA RX transfer width to single byte" + }, + "CVE-2021-47020": { + "cmt_msg": "soundwire: stream: fix memory leak in stream config error path" + }, + "CVE-2023-4881": { + "cmt_msg": "netfilter: nftables: exthdr: fix 4-byte stack OOB write" }, "CVE-2023-2008": { "cmt_msg": "udmabuf: add back sanity check" }, - "CVE-2024-26587": { - "cmt_msg": "net: netdevsim: don't try to destroy PHC on VFs" + "CVE-2021-46908": { + "cmt_msg": "bpf: Use correct permission flag for mixed signed bounds arithmetic" }, - "CVE-2023-2002": { - "cmt_msg": "bluetooth: Perform careful capability checks in hci_sock_ioctl()" + "CVE-2021-46909": { + "cmt_msg": "ARM: footbridge: fix PCI interrupt mapping" + }, + "CVE-2021-46906": { + "cmt_msg": "HID: usbhid: fix info leak in hid_submit_ctrl" + }, + "CVE-2021-46904": { + "cmt_msg": "net: hso: fix null-ptr-deref during tty device unregistration" }, "CVE-2022-1247": { "cmt_msg": "" @@ -85341,27 +116302,45 @@ "CVE-2023-1073": { "cmt_msg": "HID: check empty report_list in hid_validate_values()" }, + "CVE-2024-26747": { + "cmt_msg": "usb: roles: fix NULL pointer issue when put module's reference" + }, + "CVE-2024-26745": { + "cmt_msg": "powerpc/pseries/iommu: IOMMU table is not initialized for kdump over SR-IOV" + }, "CVE-2023-51042": { "cmt_msg": "drm/amdgpu: Fix potential fence use-after-free v2" }, + "CVE-2024-26743": { + "cmt_msg": "RDMA/qedr: Fix qedr_create_user_qp error flow" + }, + "CVE-2023-52566": { + "cmt_msg": "nilfs2: fix potential use after free in nilfs_gccache_submit_read_data()" + }, + "CVE-2024-26740": { + "cmt_msg": "net/sched: act_mirred: use the backlog for mirred ingress" + }, "CVE-2020-29661": { "cmt_msg": "tty: Fix ->pgrp locking in tiocspgrp()" }, "CVE-2020-29660": { "cmt_msg": "tty: Fix ->session locking" }, + "CVE-2022-42432": { + "cmt_msg": "netfilter: nfnetlink_osf: fix possible bogus match in nf_osf_find()" + }, "CVE-2022-1734": { "cmt_msg": "nfc: nfcmrvl: main: reorder destructive operations in nfcmrvl_nci_unregister_dev to avoid bugs" }, + "CVE-2024-26749": { + "cmt_msg": "usb: cdns3: fixed memory use after free at cdns3_gadget_ep_disable()" + }, "CVE-2022-3625": { "cmt_msg": "devlink: Fix use-after-free after a failed reload" }, "CVE-2023-28772": { "cmt_msg": "seq_buf: Fix overflow in seq_buf_putmem_hex()" }, - "CVE-2019-19770": { - "cmt_msg": "blktrace: fix debugfs use after free" - }, "CVE-2022-2588": { "cmt_msg": "net_sched: cls_route: remove from list when handle is 0" }, @@ -85377,8 +116356,8 @@ "CVE-2021-32399": { "cmt_msg": "bluetooth: eliminate the potential race condition when removing the HCI controller" }, - "CVE-2021-27364": { - "cmt_msg": "scsi: iscsi: Restrict sessions and handles to admin capabilities" + "CVE-2024-26699": { + "cmt_msg": "drm/amd/display: Fix array-index-out-of-bounds in dcn35_clkmgr" }, "CVE-2022-23038": { "cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()" @@ -85389,6 +116368,9 @@ "CVE-2022-20154": { "cmt_msg": "sctp: use call_rcu to free endpoint" }, + "CVE-2024-26691": { + "cmt_msg": "KVM: arm64: Fix circular locking dependency" + }, "CVE-2021-45868": { "cmt_msg": "quota: check block number when reading the block in quota file" }, @@ -85404,18 +116386,27 @@ "CVE-2024-0565": { "cmt_msg": "smb: client: fix OOB in receive_encrypted_standard()" }, + "CVE-2024-26697": { + "cmt_msg": "nilfs2: fix data corruption in dsync block recovery for small block sizes" + }, + "CVE-2024-26696": { + "cmt_msg": "nilfs2: fix hang in nilfs_lookup_dirty_data_buffers()" + }, + "CVE-2024-26633": { + "cmt_msg": "ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim()" + }, "CVE-2023-2176": { "cmt_msg": "RDMA/core: Refactor rdma_bind_addr" }, "CVE-2023-2177": { "cmt_msg": "sctp: leave the err path free in sctp_stream_init to sctp_stream_free" }, - "CVE-2022-0812": { - "cmt_msg": "xprtrdma: fix incorrect header size calculations" - }, "CVE-2021-38160": { "cmt_msg": "virtio_console: Assure used length from device is limited" }, + "CVE-2023-1252": { + "cmt_msg": "ovl: fix use after free in struct ovl_aio_req" + }, "CVE-2021-42008": { "cmt_msg": "net: 6pack: fix slab-out-of-bounds in decode_data" }, @@ -85425,11 +116416,14 @@ "CVE-2022-39189": { "cmt_msg": "KVM: x86: do not report a vCPU as preempted outside instruction boundaries" }, - "CVE-2022-39188": { - "cmt_msg": "mmu_gather: Force tlb-flush VM_PFNMAP vmas" + "CVE-2021-38166": { + "cmt_msg": "bpf: Fix integer overflow involving bucket_size" }, - "CVE-2020-25645": { - "cmt_msg": "geneve: add transport ports in route lookup for geneve" + "CVE-2021-3490": { + "cmt_msg": "bpf: Fix alu32 const subreg bound tracking on bitwise operations" + }, + "CVE-2021-3491": { + "cmt_msg": "io_uring: truncate lengths larger than MAX_RW_COUNT on provide buffers" }, "CVE-2020-25643": { "cmt_msg": "hdlc_ppp: add range checks in ppp_cp_parse_cr()" @@ -85440,6 +116434,9 @@ "CVE-2005-3660": { "cmt_msg": "" }, + "CVE-2022-0516": { + "cmt_msg": "KVM: s390: Return error on SIDA memop on normal guest" + }, "CVE-2023-31085": { "cmt_msg": "ubi: Refuse attaching if mtd's erasesize is 0" }, @@ -85455,42 +116452,60 @@ "CVE-2023-31081": { "cmt_msg": "" }, + "CVE-2023-52618": { + "cmt_msg": "block/rnbd-srv: Check for unlikely string overflow" + }, + "CVE-2023-52574": { + "cmt_msg": "team: fix null-ptr-deref when team device type is changed" + }, "CVE-2021-33034": { "cmt_msg": "Bluetooth: verify AMP hci_chan before amp_destroy" }, "CVE-2021-33033": { "cmt_msg": "cipso,calipso: resolve a number of problems with the DOI refcounts" }, - "CVE-2022-29582": { - "cmt_msg": "io_uring: fix race between timeout flush and removal" + "CVE-2024-0646": { + "cmt_msg": "net: tls, update curr on splice as well" }, - "CVE-2024-23307": { - "cmt_msg": "" + "CVE-2023-52598": { + "cmt_msg": "s390/ptrace: handle setting of fpc register correctly" }, "CVE-2022-32296": { "cmt_msg": "tcp: increase source port perturb table to 2^16" }, + "CVE-2024-26789": { + "cmt_msg": "crypto: arm64/neonbs - fix out-of-bounds access on short input" + }, "CVE-2020-28974": { "cmt_msg": "vt: Disable KD_FONT_OP_COPY" }, - "CVE-2023-3567": { - "cmt_msg": "vc_screen: move load of struct vc_data pointer in vcs_read() to avoid UAF" + "CVE-2022-4543": { + "cmt_msg": "" }, "CVE-2022-3028": { "cmt_msg": "af_key: Do not call xfrm_probe_algs in parallel" }, + "CVE-2023-52493": { + "cmt_msg": "bus: mhi: host: Drop chan lock before queuing buffers" + }, + "CVE-2023-52492": { + "cmt_msg": "dmaengine: fix NULL pointer in channel unregistration function" + }, "CVE-2020-14304": { "cmt_msg": "" }, "CVE-2022-2318": { "cmt_msg": "net: rose: fix UAF bugs caused by timer handler" }, - "CVE-2020-15393": { - "cmt_msg": "usb: usbtest: fix missing kfree(dev->buf) in usbtest_disconnect" + "CVE-2023-52497": { + "cmt_msg": "erofs: fix lz4 inplace decompression" }, "CVE-2022-33981": { "cmt_msg": "floppy: disable FDRAWCMD by default" }, + "CVE-2024-26655": { + "cmt_msg": "Fix memory leak in posix_clock_open()" + }, "CVE-2021-3564": { "cmt_msg": "Bluetooth: fix the erroneous flush_work() order" }, @@ -85512,20 +116527,41 @@ "CVE-2023-39198": { "cmt_msg": "drm/qxl: fix UAF on handle creation" }, + "CVE-2022-0185": { + "cmt_msg": "vfs: fs_context: fix up param length parsing in legacy_parse_param" + }, + "CVE-2023-42752": { + "cmt_msg": "igmp: limit igmpv3_newpack() packet size to IP_MAX_MTU" + }, + "CVE-2023-52601": { + "cmt_msg": "jfs: fix array-index-out-of-bounds in dbAdjTree" + }, + "CVE-2024-26751": { + "cmt_msg": "ARM: ep93xx: Add terminator to gpiod_lookup_table" + }, "CVE-2023-37454": { "cmt_msg": "" }, "CVE-2022-20572": { "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag" }, + "CVE-2024-24858": { + "cmt_msg": "" + }, "CVE-2023-39194": { "cmt_msg": "net: xfrm: Fix xfrm_address_filter OOB read" }, + "CVE-2023-2002": { + "cmt_msg": "bluetooth: Perform careful capability checks in hci_sock_ioctl()" + }, + "CVE-2023-52489": { + "cmt_msg": "mm/sparsemem: fix race in accessing memory_section->usage" + }, "CVE-2021-28964": { "cmt_msg": "btrfs: fix race when cloning extent buffer during rewind of an old root" }, - "CVE-2020-13974": { - "cmt_msg": "vt: keyboard: avoid signed integer overflow in k_ascii" + "CVE-2021-47063": { + "cmt_msg": "drm: bridge/panel: Cleanup connector on bridge detach" }, "CVE-2021-4083": { "cmt_msg": "fget: check that the fd still exists after getting a ref to it" @@ -85533,6 +116569,9 @@ "CVE-2023-33288": { "cmt_msg": "power: supply: bq24190: Fix use after free bug in bq24190_remove due to race condition" }, + "CVE-2023-52484": { + "cmt_msg": "iommu/arm-smmu-v3: Fix soft lockup triggered by arm_smmu_mm_invalidate_range" + }, "CVE-2022-29900": { "cmt_msg": "x86/kvm/vmx: Make noinstr clean" }, @@ -85542,23 +116581,32 @@ "CVE-2023-3161": { "cmt_msg": "fbcon: Check font dimension limits" }, - "CVE-2020-10751": { - "cmt_msg": "selinux: properly handle multiple messages in selinux_netlink_send()" + "CVE-2022-3567": { + "cmt_msg": "ipv6: Fix data races around sk->sk_prot." }, "CVE-2023-39192": { "cmt_msg": "netfilter: xt_u32: validate user space input" }, - "CVE-2020-10757": { - "cmt_msg": "mm: Fix mremap not considering huge pmd devmap" + "CVE-2021-47069": { + "cmt_msg": "ipc/mqueue, msg, sem: avoid relying on a stack reference past its expiry" + }, + "CVE-2023-4389": { + "cmt_msg": "btrfs: fix root ref counts in error handling in btrfs_get_root_ref" + }, + "CVE-2022-3566": { + "cmt_msg": "tcp: Fix data races around icsk->icsk_af_ops." }, "CVE-2023-35828": { "cmt_msg": "usb: gadget: udc: renesas_usb3: Fix use after free bug in renesas_usb3_remove due to race condition" }, - "CVE-2020-15437": { - "cmt_msg": "serial: 8250: fix null-ptr-deref in serial8250_start_tx()" + "CVE-2022-20166": { + "cmt_msg": "drivers core: Use sysfs_emit and sysfs_emit_at for show(device *...) functions" }, - "CVE-2020-15436": { - "cmt_msg": "block: Fix use-after-free in blkdev_get()" + "CVE-2022-29582": { + "cmt_msg": "io_uring: fix race between timeout flush and removal" + }, + "CVE-2023-52583": { + "cmt_msg": "ceph: fix deadlock or deadcode of misusing dget()" }, "CVE-2022-1116": { "cmt_msg": "" @@ -85566,9 +116614,18 @@ "CVE-2021-28660": { "cmt_msg": "staging: rtl8188eu: prevent ->ssid overflow in rtw_wx_set_scan()" }, + "CVE-2024-26645": { + "cmt_msg": "tracing: Ensure visibility when inserting an element into tracing_map" + }, + "CVE-2024-0775": { + "cmt_msg": "ext4: improve error recovery code paths in __ext4_remount()" + }, "CVE-2023-35823": { "cmt_msg": "media: saa7134: fix use after free bug in saa7134_finidev due to race condition" }, + "CVE-2022-3564": { + "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free caused by l2cap_reassemble_sdu" + }, "CVE-2022-23816": { "cmt_msg": "x86/kvm/vmx: Make noinstr clean" }, @@ -85578,63 +116635,165 @@ "CVE-2023-35827": { "cmt_msg": "ravb: Fix use-after-free issue in ravb_tx_timeout_work()" }, + "CVE-2023-52481": { + "cmt_msg": "arm64: errata: Add Cortex-A520 speculative unprivileged load workaround" + }, + "CVE-2023-52585": { + "cmt_msg": "drm/amdgpu: Fix possible NULL dereference in amdgpu_ras_query_error_status_helper()" + }, "CVE-2021-20239": { "cmt_msg": "net: pass a sockptr_t into ->setsockopt" }, - "CVE-2022-3567": { - "cmt_msg": "ipv6: Fix data races around sk->sk_prot." + "CVE-2023-52587": { + "cmt_msg": "IB/ipoib: Fix mcast list locking" }, - "CVE-2022-3566": { - "cmt_msg": "tcp: Fix data races around icsk->icsk_af_ops." + "CVE-2023-52586": { + "cmt_msg": "drm/msm/dpu: Add mutex lock in control vblank irq" + }, + "CVE-2021-47149": { + "cmt_msg": "net: fujitsu: fix potential null-ptr-deref" + }, + "CVE-2021-47067": { + "cmt_msg": "soc/tegra: regulators: Fix locking up when voltage-spread is out of range" }, "CVE-2022-3565": { "cmt_msg": "mISDN: fix use-after-free bugs in l1oip timer handlers" }, - "CVE-2022-3564": { - "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free caused by l2cap_reassemble_sdu" + "CVE-2021-47065": { + "cmt_msg": "rtw88: Fix array overrun in rtw_get_tx_power_params()" }, - "CVE-2020-36386": { - "cmt_msg": "Bluetooth: Fix slab-out-of-bounds read in hci_extended_inquiry_result_evt()" + "CVE-2021-47145": { + "cmt_msg": "btrfs: do not BUG_ON in link_to_fixup_dir" + }, + "CVE-2021-47144": { + "cmt_msg": "drm/amd/amdgpu: fix refcount leak" + }, + "CVE-2021-47147": { + "cmt_msg": "ptp: ocp: Fix a resource leak in an error handling path" }, "CVE-2020-36385": { "cmt_msg": "RDMA/ucma: Rework ucma_migrate_id() to avoid races with destroy" }, - "CVE-2023-52340": { - "cmt_msg": "ipv6: remove max_size check inline with ipv4" + "CVE-2021-47141": { + "cmt_msg": "gve: Add NULL pointer checks when freeing irqs." }, - "CVE-2020-26088": { - "cmt_msg": "net/nfc/rawsock.c: add CAP_NET_RAW check." + "CVE-2021-47140": { + "cmt_msg": "iommu/amd: Clear DMA ops when switching domain" + }, + "CVE-2021-47143": { + "cmt_msg": "net/smc: remove device from smcd_dev_list after failed device_add()" + }, + "CVE-2021-47142": { + "cmt_msg": "drm/amdgpu: Fix a use-after-free" + }, + "CVE-2021-46943": { + "cmt_msg": "media: staging/intel-ipu3: Fix set_fmt error handling" + }, + "CVE-2021-46941": { + "cmt_msg": "usb: dwc3: core: Do core softreset when switch mode" + }, + "CVE-2023-3567": { + "cmt_msg": "vc_screen: move load of struct vc_data pointer in vcs_read() to avoid UAF" + }, + "CVE-2021-46944": { + "cmt_msg": "media: staging/intel-ipu3: Fix memory leak in imu_fmt" + }, + "CVE-2023-4128": { + "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free" + }, + "CVE-2023-52589": { + "cmt_msg": "media: rkisp1: Fix IRQ disable race issue" + }, + "CVE-2023-52588": { + "cmt_msg": "f2fs: fix to tag gcing flag on page during block migration" + }, + "CVE-2024-26765": { + "cmt_msg": "LoongArch: Disable IRQ before init_fn() for nonboot CPUs" + }, + "CVE-2023-52578": { + "cmt_msg": "net: bridge: use DEV_STATS_INC()" + }, + "CVE-2024-26684": { + "cmt_msg": "net: stmmac: xgmac: fix handling of DPP safety error for DMA channels" + }, + "CVE-2021-47052": { + "cmt_msg": "crypto: sa2ul - Fix memory leak of rxd" + }, + "CVE-2023-52438": { + "cmt_msg": "binder: fix use-after-free in shinker's callback" + }, + "CVE-2021-47095": { + "cmt_msg": "ipmi: ssif: initialize ssif_info->client early" + }, + "CVE-2023-4004": { + "cmt_msg": "netfilter: nft_set_pipapo: fix improper element removal" + }, + "CVE-2020-16120": { + "cmt_msg": "ovl: switch to mounter creds in readdir" }, "CVE-2023-6560": { "cmt_msg": "io_uring: don't allow discontig pages for IORING_SETUP_NO_MMAP" }, + "CVE-2021-46283": { + "cmt_msg": "netfilter: nf_tables: initialize set before expression setup" + }, "CVE-2022-29581": { "cmt_msg": "net/sched: cls_u32: fix netns refcount changes in u32_change()" }, - "CVE-2022-1204": { - "cmt_msg": "ax25: Fix refcount leaks caused by ax25_cb_del()" + "CVE-2021-45402": { + "cmt_msg": "bpf: Fix signed bounds propagation after mov32" }, "CVE-2023-1611": { "cmt_msg": "btrfs: fix race between quota disable and quota assign ioctls" }, + "CVE-2024-26763": { + "cmt_msg": "dm-crypt: don't modify the data when using authenticated encryption" + }, "CVE-2021-34693": { "cmt_msg": "can: bcm: fix infoleak in struct bcm_msg_head" }, "CVE-2022-26490": { "cmt_msg": "nfc: st21nfca: Fix potential buffer overflows in EVT_TRANSACTION" }, + "CVE-2023-6817": { + "cmt_msg": "netfilter: nft_set_pipapo: skip inactive elements during set walk" + }, + "CVE-2023-52470": { + "cmt_msg": "drm/radeon: check the alloc_workqueue return value in radeon_crtc_init()" + }, + "CVE-2024-26795": { + "cmt_msg": "riscv: Sparse-Memory/vmemmap out-of-bounds fix" + }, + "CVE-2021-47125": { + "cmt_msg": "sch_htb: fix refcount leak in htb_parent_to_leaf_offload" + }, + "CVE-2024-26797": { + "cmt_msg": "drm/amd/display: Prevent potential buffer overflow in map_hw_resources" + }, + "CVE-2024-26790": { + "cmt_msg": "dmaengine: fsl-qdma: fix SoC may hang on 16 byte unaligned read" + }, "CVE-2022-1836": { "cmt_msg": "floppy: disable FDRAWCMD by default" }, - "CVE-2020-11884": { - "cmt_msg": "s390/mm: fix page table upgrade vs 2ndary address mode accesses" + "CVE-2024-26793": { + "cmt_msg": "gtp: fix use-after-free and null-ptr-deref in gtp_newlink()" + }, + "CVE-2023-52530": { + "cmt_msg": "wifi: mac80211: fix potential key use-after-free" }, "CVE-2021-32078": { "cmt_msg": "ARM: footbridge: remove personal server platform" }, + "CVE-2023-52532": { + "cmt_msg": "net: mana: Fix TX CQE error handling" + }, "CVE-2022-30594": { "cmt_msg": "ptrace: Check PTRACE_O_SUSPEND_SECCOMP permission on PTRACE_SEIZE" }, + "CVE-2024-26798": { + "cmt_msg": "fbcon: always restore the old font data in fbcon_do_set_font()" + }, "CVE-2022-4662": { "cmt_msg": "USB: core: Prevent nested device-reset calls" }, @@ -85644,14 +116803,14 @@ "CVE-2021-38205": { "cmt_msg": "net: xilinx_emaclite: Do not print real IOMEM pointer" }, - "CVE-2020-27835": { - "cmt_msg": "IB/hfi1: Ensure correct mm is used at all times" + "CVE-2021-38207": { + "cmt_msg": "net: ll_temac: Fix TX BD buffer overwrite" }, "CVE-2020-27830": { "cmt_msg": "speakup: Reject setting the speakup line discipline outside of speakup" }, - "CVE-2020-0255": { - "cmt_msg": "selinux: properly handle multiple messages in selinux_netlink_send()" + "CVE-2023-39189": { + "cmt_msg": "netfilter: nfnetlink_osf: avoid OOB read" }, "CVE-2023-35001": { "cmt_msg": "netfilter: nf_tables: prevent OOB access in nft_byteorder_eval" @@ -85662,21 +116821,36 @@ "CVE-2021-38208": { "cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect" }, + "CVE-2021-38209": { + "cmt_msg": "netfilter: conntrack: Make global sysctls readonly in non-init netns" + }, + "CVE-2024-26677": { + "cmt_msg": "rxrpc: Fix delayed ACKs to not set the reference serial number" + }, "CVE-2020-25211": { "cmt_msg": "netfilter: ctnetlink: add a range check for l3/l4 protonum" }, - "CVE-2020-25212": { - "cmt_msg": "nfs: Fix getxattr kernel panic and memory overflow" + "CVE-2022-0168": { + "cmt_msg": "cifs: fix NULL ptr dereference in smb2_ioctl_query_info()" }, - "CVE-2020-28374": { - "cmt_msg": "scsi: target: Fix XCOPY NAA identifier lookup" + "CVE-2020-26556": { + "cmt_msg": "" }, "CVE-2020-26557": { "cmt_msg": "" }, + "CVE-2024-26671": { + "cmt_msg": "blk-mq: fix IO hang from sbitmap wakeup race" + }, "CVE-2020-26555": { "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical" }, + "CVE-2024-26776": { + "cmt_msg": "spi: hisi-sfc-v3xx: Return IRQ_NONE if no interrupts were detected" + }, + "CVE-2024-26777": { + "cmt_msg": "fbdev: sis: Error out if pixclock equals zero" + }, "CVE-2019-20794": { "cmt_msg": "" }, @@ -85686,26 +116860,47 @@ "CVE-2023-3397": { "cmt_msg": "" }, + "CVE-2021-47129": { + "cmt_msg": "netfilter: nft_ct: skip expectations for confirmed conntrack" + }, + "CVE-2024-26679": { + "cmt_msg": "inet: read sk->sk_family once in inet_recv_error()" + }, + "CVE-2024-26771": { + "cmt_msg": "dmaengine: ti: edma: Add some null pointer checks to the edma_probe" + }, + "CVE-2023-52584": { + "cmt_msg": "spmi: mediatek: Fix UAF on device remove" + }, + "CVE-2021-47128": { + "cmt_msg": "bpf, lockdown, audit: Fix buggy SELinux lockdown permission checks" + }, "CVE-2022-26365": { "cmt_msg": "xen/blkfront: fix leaking data in shared pages" }, "CVE-2023-52458": { "cmt_msg": "block: add check that partition length needs to be aligned with block size" }, - "CVE-2023-52457": { - "cmt_msg": "serial: 8250: omap: Don't skip resource freeing if pm_runtime_resume_and_get() failed" - }, "CVE-2018-1121": { "cmt_msg": "" }, "CVE-2023-52454": { "cmt_msg": "nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length" }, + "CVE-2023-28746": { + "cmt_msg": "x86/mmio: Disable KVM mitigation when X86_FEATURE_CLEAR_CPU_BUF is set" + }, + "CVE-2021-47118": { + "cmt_msg": "pid: take a reference when initializing `cad_pid`" + }, "CVE-2023-52451": { "cmt_msg": "powerpc/pseries/memhp: Fix access beyond end of drmem array" }, - "CVE-2022-3061": { - "cmt_msg": "video: fbdev: i740fb: Error out if 'pixclock' equals zero" + "CVE-2021-47119": { + "cmt_msg": "ext4: fix memory leak in ext4_fill_super" + }, + "CVE-2024-26602": { + "cmt_msg": "sched/membarrier: reduce the ability to hammer on sys_membarrier" }, "CVE-2024-1086": { "cmt_msg": "netfilter: nf_tables: reject QUEUE/DROP verdict parameters" @@ -85734,12 +116929,21 @@ "CVE-2023-1670": { "cmt_msg": "xirc2ps_cs: Fix use after free bug in xirc2ps_detach" }, - "CVE-2020-27786": { - "cmt_msg": "ALSA: rawmidi: Fix racy buffer resize under concurrent accesses" + "CVE-2023-23002": { + "cmt_msg": "Bluetooth: hci_qca: Fix NULL vs IS_ERR_OR_NULL check in qca_serdev_probe" + }, + "CVE-2024-26702": { + "cmt_msg": "iio: magnetometer: rm3100: add boundary check for the value read from RM3100_REG_TMRC" }, "CVE-2023-6240": { "cmt_msg": "" }, + "CVE-2022-21123": { + "cmt_msg": "x86/speculation/mmio: Add mitigation for Processor MMIO Stale Data" + }, + "CVE-2024-26706": { + "cmt_msg": "parisc: Fix random data corruption from exception handler" + }, "CVE-2023-23559": { "cmt_msg": "wifi: rndis_wlan: Prevent buffer overflow in rndis_query_oid" }, @@ -85749,9 +116953,6 @@ "CVE-2022-0382": { "cmt_msg": "net ticp:fix a kernel-infoleak in __tipc_sendmsg()" }, - "CVE-2021-28688": { - "cmt_msg": "xen-blkback: don't leak persistent grants from xen_blkbk_map()" - }, "CVE-2023-32233": { "cmt_msg": "netfilter: nf_tables: deactivate anonymous set from preparation phase" }, @@ -85770,8 +116971,8 @@ "CVE-2022-20369": { "cmt_msg": "media: v4l2-mem2mem: Apply DST_QUEUE_OFF_BASE on MMAP buffers across ioctls" }, - "CVE-2022-20368": { - "cmt_msg": "net/packet: fix slab-out-of-bounds access in packet_recvmsg()" + "CVE-2022-0998": { + "cmt_msg": "vdpa: clean up get_config_size ret value handling" }, "CVE-2020-25285": { "cmt_msg": "mm/hugetlb: fix a race between hugetlb sysctl handlers" @@ -85779,20 +116980,14 @@ "CVE-2020-25284": { "cmt_msg": "rbd: require global CAP_SYS_ADMIN for mapping and unmapping" }, - "CVE-2020-29373": { - "cmt_msg": "io_uring: grab ->fs as part of async preparation" - }, "CVE-2019-19814": { "cmt_msg": "" }, - "CVE-2020-29371": { - "cmt_msg": "romfs: fix uninitialized memory leak in romfs_dev_read()" - }, "CVE-2023-1118": { "cmt_msg": "media: rc: Fix use-after-free bugs caused by ene_tx_irqsim()" }, - "CVE-2022-1016": { - "cmt_msg": "netfilter: nf_tables: initialize registers in nft_do_chain()" + "CVE-2021-47124": { + "cmt_msg": "io_uring: fix link timeout refs" }, "CVE-2022-1011": { "cmt_msg": "fuse: fix pipe buffer lifetime for direct_io" @@ -85800,9 +116995,30 @@ "CVE-2022-1012": { "cmt_msg": "secure_seq: use the 64 bits of the siphash for port offset calculation" }, + "CVE-2023-52620": { + "cmt_msg": "netfilter: nf_tables: disallow timeout for anonymous sets" + }, "CVE-2022-38096": { "cmt_msg": "" }, + "CVE-2023-52622": { + "cmt_msg": "ext4: avoid online resizing failures due to oversized flex bg" + }, + "CVE-2023-52623": { + "cmt_msg": "SUNRPC: Fix a suspicious RCU usage warning" + }, + "CVE-2023-52619": { + "cmt_msg": "pstore/ram: Fix crash when setting number of cpus to an odd number" + }, + "CVE-2023-52625": { + "cmt_msg": "drm/amd/display: Refactor DMCUB enter/exit idle interface" + }, + "CVE-2023-52627": { + "cmt_msg": "iio: adc: ad7091r: Allow users to configure device events" + }, + "CVE-2023-52628": { + "cmt_msg": "netfilter: nftables: exthdr: fix 4-byte stack OOB write" + }, "CVE-2021-26934": { "cmt_msg": "" }, @@ -85830,8 +117046,8 @@ "CVE-2020-12351": { "cmt_msg": "Bluetooth: L2CAP: Fix calling sk_filter on non-socket based channel" }, - "CVE-2022-23042": { - "cmt_msg": "xen/netfront: react properly to failing gnttab_end_foreign_access_ref()" + "CVE-2023-34256": { + "cmt_msg": "ext4: avoid a potential slab-out-of-bounds in ext4_group_desc_csum" }, "CVE-2022-25636": { "cmt_msg": "netfilter: nf_tables_offload: incorrect flow offload action array size" @@ -85839,9 +117055,6 @@ "CVE-2022-0494": { "cmt_msg": "block-map: add __GFP_ZERO flag for alloc_page in function bio_copy_kern" }, - "CVE-2020-16120": { - "cmt_msg": "ovl: switch to mounter creds in readdir" - }, "CVE-2022-3524": { "cmt_msg": "tcp/udp: Fix memory leak in ipv6_renew_options()." }, @@ -85857,14 +117070,38 @@ "CVE-2021-3178": { "cmt_msg": "nfsd4: readdirplus shouldn't return parent of export" }, + "CVE-2021-47101": { + "cmt_msg": "asix: fix uninit-value in asix_mdio_read()" + }, + "CVE-2021-47100": { + "cmt_msg": "ipmi: Fix UAF when uninstall ipmi_si and ipmi_msghandler module" + }, + "CVE-2021-46984": { + "cmt_msg": "kyber: fix out of bounds access when preempted" + }, + "CVE-2021-46982": { + "cmt_msg": "f2fs: compress: fix race condition of overwrite vs truncate" + }, + "CVE-2021-46981": { + "cmt_msg": "nbd: Fix NULL pointer in flush_workqueue" + }, + "CVE-2021-47109": { + "cmt_msg": "neighbour: allow NUD_NOARP entries to be forced GCed" + }, "CVE-2022-0330": { "cmt_msg": "drm/i915: Flush TLBs before releasing backing store" }, "CVE-2007-3719": { "cmt_msg": "" }, - "CVE-2023-3863": { - "cmt_msg": "net: nfc: Fix use-after-free caused by nfc_llcp_find_local" + "CVE-2021-46988": { + "cmt_msg": "userfaultfd: release page in error path to avoid BUG_ON" + }, + "CVE-2021-46989": { + "cmt_msg": "hfsplus: prevent corruption in shrinking truncate" + }, + "CVE-2024-26606": { + "cmt_msg": "binder: signal epoll threads of self-work" }, "CVE-2023-0590": { "cmt_msg": "net: sched: fix race condition in qdisc_graft()" @@ -85878,11 +117115,14 @@ "CVE-2020-36312": { "cmt_msg": "KVM: fix memory leak in kvm_io_bus_unregister_dev()" }, - "CVE-2019-19462": { - "cmt_msg": "kernel/relay.c: handle alloc_percpu returning NULL in relay_open" + "CVE-2024-26744": { + "cmt_msg": "RDMA/srpt: Support specifying the srpt_service_guid parameter" }, - "CVE-2023-30772": { - "cmt_msg": "power: supply: da9150: Fix use after free bug in da9150_charger_remove due to race condition" + "CVE-2023-21400": { + "cmt_msg": "" + }, + "CVE-2022-1204": { + "cmt_msg": "ax25: Fix refcount leaks caused by ax25_cb_del()" }, "CVE-2022-24958": { "cmt_msg": "usb: gadget: don't release an existing dev->buf" @@ -85896,6 +117136,15 @@ "CVE-2021-3679": { "cmt_msg": "tracing: Fix bug in rb_per_cpu_empty() that might cause deadloop." }, + "CVE-2024-26656": { + "cmt_msg": "drm/amdgpu: fix use-after-free bug" + }, + "CVE-2024-26607": { + "cmt_msg": "drm/bridge: sii902x: Fix probing race issue" + }, + "CVE-2023-52517": { + "cmt_msg": "spi: sun6i: fix race between DMA RX transfer completion and RX FIFO drain" + }, "CVE-2022-2586": { "cmt_msg": "netfilter: nf_tables: do not allow SET_ID to refer to another table" }, @@ -85944,27 +117193,54 @@ "CVE-2021-39657": { "cmt_msg": "scsi: ufs: Correct the LUN used in eh_device_reset_handler() callback" }, + "CVE-2023-3090": { + "cmt_msg": "ipvlan:Fix out-of-bounds caused by unclear skb->cb" + }, "CVE-2022-47946": { "cmt_msg": "io_uring: kill sqo_dead and sqo submission halting" }, - "CVE-2022-4744": { - "cmt_msg": "tun: avoid double free in tun_free_netdev" + "CVE-2021-47038": { + "cmt_msg": "Bluetooth: avoid deadlock between hci_dev->lock and socket lock" }, "CVE-2023-1095": { "cmt_msg": "netfilter: nf_tables: fix null deref due to zeroed list head" }, + "CVE-2021-47035": { + "cmt_msg": "iommu/vt-d: Remove WO permissions on second-level paging entries" + }, + "CVE-2021-47034": { + "cmt_msg": "powerpc/64s: Fix pte update for kernel memory on radix" + }, "CVE-2022-3239": { "cmt_msg": "media: em28xx: initialize refcount before kref_get" }, - "CVE-2022-4543": { - "cmt_msg": "" + "CVE-2021-47036": { + "cmt_msg": "udp: skip L4 aggregation for UDP tunnel packets" + }, + "CVE-2023-52571": { + "cmt_msg": "power: supply: rk817: Fix node refcount leak" + }, + "CVE-2023-52572": { + "cmt_msg": "cifs: Fix UAF in cifs_demultiplex_thread()" + }, + "CVE-2023-52573": { + "cmt_msg": "net: rds: Fix possible NULL-pointer dereference" }, "CVE-2023-4921": { "cmt_msg": "net: sched: sch_qfq: Fix UAF in qfq_dequeue()" }, + "CVE-2022-3424": { + "cmt_msg": "misc: sgi-gru: fix use-after-free error in gru_set_context_option, gru_fault and gru_handle_user_call_os" + }, + "CVE-2021-46919": { + "cmt_msg": "dmaengine: idxd: fix wq size store permission state" + }, "CVE-2023-1829": { "cmt_msg": "net/sched: Retire tcindex classifier" }, + "CVE-2021-46915": { + "cmt_msg": "netfilter: nft_limit: avoid possible divide error in nft_limit_init" + }, "CVE-2023-1390": { "cmt_msg": "tipc: fix NULL deref in tipc_link_xmit()" }, @@ -85974,45 +117250,63 @@ "CVE-2023-23454": { "cmt_msg": "net: sched: cbq: dont intepret cls results when asked to drop" }, - "CVE-2024-0775": { - "cmt_msg": "ext4: improve error recovery code paths in __ext4_remount()" + "CVE-2021-46911": { + "cmt_msg": "ch_ktls: Fix kernel panic" }, - "CVE-2023-4881": { - "cmt_msg": "netfilter: nftables: exthdr: fix 4-byte stack OOB write" + "CVE-2021-46913": { + "cmt_msg": "netfilter: nftables: clone set element expression template" }, - "CVE-2020-24394": { - "cmt_msg": "nfsd: apply umask on fs without ACL support" + "CVE-2021-46912": { + "cmt_msg": "net: Make tcp_allowed_congestion_control readonly in non-init netns" }, - "CVE-2022-20148": { - "cmt_msg": "f2fs: fix UAF in f2fs_available_free_memory" + "CVE-2024-26769": { + "cmt_msg": "nvmet-fc: avoid deadlock on delete association path" }, - "CVE-2022-42432": { - "cmt_msg": "netfilter: nfnetlink_osf: fix possible bogus match in nf_osf_find()" + "CVE-2024-26704": { + "cmt_msg": "ext4: fix double-free of blocks due to wrong extents moved_len" + }, + "CVE-2022-1786": { + "cmt_msg": "io_uring: remove io_identity" }, "CVE-2013-7445": { "cmt_msg": "" }, - "CVE-2019-18814": { - "cmt_msg": "apparmor: Fix use-after-free in aa_audit_rule_init" - }, "CVE-2022-28390": { "cmt_msg": "can: ems_usb: ems_usb_start_xmit(): fix double dev_kfree_skb() in error path" }, + "CVE-2021-3653": { + "cmt_msg": "KVM: nSVM: avoid picking up unsupported bits from L2 in int_ctl (CVE-2021-3653)" + }, + "CVE-2024-26736": { + "cmt_msg": "afs: Increase buffer size in afs_update_volume_status()" + }, "CVE-2024-26593": { "cmt_msg": "i2c: i801: Fix block process call transactions" }, + "CVE-2024-26738": { + "cmt_msg": "powerpc/pseries/iommu: DLPAR add doesn't completely initialize pci_controller" + }, + "CVE-2024-26739": { + "cmt_msg": "net/sched: act_mirred: don't override retval if we already lost the skb" + }, "CVE-2022-42719": { "cmt_msg": "wifi: mac80211: fix MBSSID parsing use-after-free" }, "CVE-2020-14386": { "cmt_msg": "net/packet: fix overflow in tpacket_rcv" }, + "CVE-2024-26804": { + "cmt_msg": "net: ip_tunnel: prevent perpetual headroom growth" + }, "CVE-2020-14385": { "cmt_msg": "xfs: fix boundary test in xfs_attr_shortform_verify" }, "CVE-2021-3656": { "cmt_msg": "KVM: nSVM: always intercept VMLOAD/VMSAVE when nested (CVE-2021-3656)" }, + "CVE-2024-26805": { + "cmt_msg": "netlink: Fix kernel-infoleak-after-free in __skb_datagram_iter" + }, "CVE-2022-1158": { "cmt_msg": "KVM: x86/mmu: do compare-and-exchange of gPTE via the user address" }, @@ -86031,8 +117325,8 @@ "CVE-2022-2905": { "cmt_msg": "bpf: Don't use tnum_range on array range checking for poke descriptors" }, - "CVE-2020-12771": { - "cmt_msg": "bcache: fix potential deadlock problem in btree_gc_coalesce" + "CVE-2022-20148": { + "cmt_msg": "f2fs: fix UAF in f2fs_available_free_memory" }, "CVE-2024-26595": { "cmt_msg": "mlxsw: spectrum_acl_tcam: Fix NULL pointer dereference in error path" @@ -86043,8 +117337,11 @@ "CVE-2023-6932": { "cmt_msg": "ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet" }, - "CVE-2020-16166": { - "cmt_msg": "random32: update the net random state on interrupt and activity" + "CVE-2024-26801": { + "cmt_msg": "Bluetooth: Avoid potential use-after-free in hci_error_reset" + }, + "CVE-2024-0607": { + "cmt_msg": "netfilter: nf_tables: fix pointer math issue in nft_byteorder_eval()" }, "CVE-2021-33631": { "cmt_msg": "ext4: fix kernel BUG in 'ext4_write_inline_data_end()'" @@ -86055,14 +117352,23 @@ "CVE-2022-28388": { "cmt_msg": "can: usb_8dev: usb_8dev_start_xmit(): fix double dev_kfree_skb() in error path" }, + "CVE-2022-41218": { + "cmt_msg": "media: dvb-core: Fix UAF due to refcount races at releasing" + }, + "CVE-2022-47518": { + "cmt_msg": "wifi: wilc1000: validate number of channels" + }, "CVE-2023-52444": { "cmt_msg": "f2fs: fix to avoid dirent corruption" }, + "CVE-2024-26768": { + "cmt_msg": "LoongArch: Change acpi_core_pic[NR_CPUS] to acpi_core_pic[MAX_CORE_PIC]" + }, "CVE-2020-12362": { "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" }, - "CVE-2020-12363": { - "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" + "CVE-2020-27194": { + "cmt_msg": "bpf: Fix scalar32_min_max_or bounds tracking" }, "CVE-2022-4129": { "cmt_msg": "l2tp: Serialize access to sk_user_data with sk_callback_lock" @@ -86070,12 +117376,24 @@ "CVE-2020-12364": { "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" }, + "CVE-2024-26646": { + "cmt_msg": "thermal: intel: hfi: Add syscore callbacks for system-wide PM" + }, + "CVE-2024-26647": { + "cmt_msg": "drm/amd/display: Fix late derefrence 'dsc' check in 'link_set_dsc_pps_packet()'" + }, + "CVE-2024-26644": { + "cmt_msg": "btrfs: don't abort filesystem when attempting to snapshot deleted subvolume" + }, "CVE-2020-25639": { "cmt_msg": "drm/nouveau: bail out of nouveau_channel_new if channel init fails" }, "CVE-2023-33203": { "cmt_msg": "net: qcom/emac: Fix use after free bug in emac_remove due to race condition" }, + "CVE-2024-26640": { + "cmt_msg": "tcp: add sanity checks to rx zerocopy" + }, "CVE-2021-0605": { "cmt_msg": "af_key: pfkey_dump needs parameter validation" }, @@ -86094,8 +117412,8 @@ "CVE-2023-50431": { "cmt_msg": "accel/habanalabs: fix information leak in sec_attest_info()" }, - "CVE-2022-34918": { - "cmt_msg": "netfilter: nf_tables: stricter validation of element data" + "CVE-2023-52445": { + "cmt_msg": "media: pvrusb2: fix use after free on context disconnection" }, "CVE-2022-20008": { "cmt_msg": "mmc: block: fix read single on recovery logic" @@ -86103,21 +117421,30 @@ "CVE-2023-3117": { "cmt_msg": "netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE" }, + "CVE-2024-26641": { + "cmt_msg": "ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv()" + }, + "CVE-2024-26791": { + "cmt_msg": "btrfs: dev-replace: properly validate device names" + }, "CVE-2023-32269": { "cmt_msg": "netrom: Fix use-after-free caused by accept on already connected socket" }, - "CVE-2019-20810": { - "cmt_msg": "media: go7007: fix a miss of snd_card_free" - }, "CVE-2023-52464": { "cmt_msg": "EDAC/thunderx: Fix possible out-of-bounds string access" }, - "CVE-2020-14314": { - "cmt_msg": "ext4: fix potential negative array index in do_split()" + "CVE-2023-52600": { + "cmt_msg": "jfs: fix uaf in jfs_evict_inode" + }, + "CVE-2023-3111": { + "cmt_msg": "btrfs: unset reloc control if transaction commit fails in prepare_to_relocate()" }, "CVE-2021-3411": { "cmt_msg": "x86/kprobes: Fix optprobe to detect INT3 padding correctly" }, + "CVE-2021-31440": { + "cmt_msg": "bpf: Fix propagation of 32 bit unsigned bounds from 64 bit bounds" + }, "CVE-2022-26373": { "cmt_msg": "x86/speculation: Add RSB VM Exit protections" }, @@ -86130,15 +117457,36 @@ "CVE-2024-23848": { "cmt_msg": "" }, + "CVE-2023-1295": { + "cmt_msg": "io_uring: get rid of intermediate IORING_OP_CLOSE stage" + }, + "CVE-2021-47159": { + "cmt_msg": "net: dsa: fix a crash if ->get_sset_count() fails" + }, "CVE-2022-0617": { "cmt_msg": "udf: Fix NULL ptr deref when converting from inline format" }, "CVE-2023-4459": { "cmt_msg": "net: vmxnet3: fix possible NULL pointer dereference in vmxnet3_rq_cleanup()" }, + "CVE-2024-24861": { + "cmt_msg": "media: xc4000: Fix atomicity violation in xc4000_get_frequency" + }, + "CVE-2024-26635": { + "cmt_msg": "llc: Drop support for ETH_P_TR_802_2." + }, + "CVE-2023-52639": { + "cmt_msg": "KVM: s390: vsie: fix race during shadow creation" + }, "CVE-2022-2153": { "cmt_msg": "KVM: x86: Avoid theoretical NULL pointer dereference in kvm_irq_delivery_to_apic_fast()" }, + "CVE-2020-12363": { + "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" + }, + "CVE-2024-2193": { + "cmt_msg": "" + }, "CVE-2022-20566": { "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free caused by l2cap_chan_put" }, @@ -86148,56 +117496,77 @@ "CVE-2018-12931": { "cmt_msg": "" }, - "CVE-2024-23851": { - "cmt_msg": "dm: limit the number of targets and parameter size area" + "CVE-2023-52637": { + "cmt_msg": "can: j1939: Fix UAF in j1939_sk_match_filter during setsockopt(SO_J1939_FILTER)" }, "CVE-2024-23196": { - "cmt_msg": "" - }, - "CVE-2020-12768": { - "cmt_msg": "KVM: SVM: Fix potential memory leak in svm_cpu_init()" + "cmt_msg": "ALSA: hda: fix a possible null-pointer dereference due to data race in snd_hdac_regmap_sync()" }, "CVE-2023-1990": { "cmt_msg": "nfc: st-nci: Fix use after free bug in ndlc_remove due to race condition" }, + "CVE-2024-26583": { + "cmt_msg": "tls: fix race between async notify and socket close" + }, + "CVE-2023-3863": { + "cmt_msg": "net: nfc: Fix use-after-free caused by nfc_llcp_find_local" + }, "CVE-2021-33098": { "cmt_msg": "ixgbe: fix large MTU request from VF" }, - "CVE-2022-0185": { - "cmt_msg": "vfs: fs_context: fix up param length parsing in legacy_parse_param" + "CVE-2021-28972": { + "cmt_msg": "PCI: rpadlpar: Fix potential drc_name corruption in store functions" }, "CVE-2021-28971": { "cmt_msg": "perf/x86/intel: Fix a crash caused by zero PEBS status" }, + "CVE-2023-52634": { + "cmt_msg": "drm/amd/display: Fix disable_otg_wa logic" + }, "CVE-2022-22942": { "cmt_msg": "drm/vmwgfx: Fix stale file descriptors on failed usercopy" }, "CVE-2021-3739": { "cmt_msg": "btrfs: fix NULL pointer dereference when deleting device by invalid id" }, - "CVE-2022-20166": { - "cmt_msg": "drivers core: Use sysfs_emit and sysfs_emit_at for show(device *...) functions" + "CVE-2020-36782": { + "cmt_msg": "i2c: imx-lpi2c: fix reference leak when pm_runtime_get_sync fails" + }, + "CVE-2020-36783": { + "cmt_msg": "i2c: img-scb: fix reference leak when pm_runtime_get_sync fails" + }, + "CVE-2020-36780": { + "cmt_msg": "i2c: sprd: fix reference leak when pm_runtime_get_sync fails" + }, + "CVE-2020-36781": { + "cmt_msg": "i2c: imx: fix reference leak when pm_runtime_get_sync fails" }, "CVE-2021-3732": { "cmt_msg": "ovl: prevent private clone if bind mount is not allowed" }, + "CVE-2020-36784": { + "cmt_msg": "i2c: cadence: fix reference leak when pm_runtime_get_sync fails" + }, + "CVE-2023-52632": { + "cmt_msg": "drm/amdkfd: Fix lock dependency warning with srcu" + }, "CVE-2024-24860": { "cmt_msg": "Bluetooth: Fix atomicity violation in {min,max}_key_size_set" }, - "CVE-2020-10766": { - "cmt_msg": "x86/speculation: Prevent rogue cross-process SSBD shutdown" + "CVE-2020-27835": { + "cmt_msg": "IB/hfi1: Ensure correct mm is used at all times" }, - "CVE-2020-10767": { - "cmt_msg": "x86/speculation: Avoid force-disabling IBPB based on STIBP and enhanced IBRS." + "CVE-2019-25162": { + "cmt_msg": "i2c: Fix a potential use after free" }, - "CVE-2024-24861": { - "cmt_msg": "" + "CVE-2021-47146": { + "cmt_msg": "mld: fix panic in mld_newpack()" }, - "CVE-2020-13143": { - "cmt_msg": "USB: gadget: fix illegal array access in binding with UDC" + "CVE-2024-26627": { + "cmt_msg": "scsi: core: Move scsi_host_busy() out of host lock for waking up EH handler" }, - "CVE-2020-10768": { - "cmt_msg": "x86/speculation: PR_SPEC_FORCE_DISABLE enforcement for indirect branches." + "CVE-2023-0240": { + "cmt_msg": "io_uring: COW io_identity on mismatch" }, "CVE-2021-35039": { "cmt_msg": "module: limit enabling module.sig_enforce" @@ -86205,29 +117574,92 @@ "CVE-2024-25740": { "cmt_msg": "" }, + "CVE-2022-3535": { + "cmt_msg": "net: mvpp2: fix mvpp2 debugfs leak" + }, + "CVE-2022-2978": { + "cmt_msg": "fs: fix UAF/GPF bug in nilfs_mdt_destroy" + }, "CVE-2022-3903": { "cmt_msg": "media: mceusb: Use new usb_control_msg_*() routines" }, + "CVE-2024-26642": { + "cmt_msg": "netfilter: nf_tables: disallow anonymous set with timeout flag" + }, "CVE-2022-3577": { "cmt_msg": "HID: bigben: fix slab-out-of-bounds Write in bigben_probe" }, "CVE-2023-20588": { "cmt_msg": "x86/CPU/AMD: Do not leak quotient data after a division by 0" }, + "CVE-2021-47071": { + "cmt_msg": "uio_hv_generic: Fix a memory leak in error handling paths" + }, "CVE-2021-20226": { "cmt_msg": "io_uring: don't rely on weak ->files references" }, + "CVE-2021-47073": { + "cmt_msg": "platform/x86: dell-smbios-wmi: Fix oops on rmmod dell_smbios" + }, "CVE-2022-44034": { "cmt_msg": "char: pcmcia: remove all the drivers" }, - "CVE-2022-44033": { - "cmt_msg": "char: pcmcia: remove all the drivers" + "CVE-2021-47075": { + "cmt_msg": "nvmet: fix memory leak in nvmet_alloc_ctrl()" }, - "CVE-2022-44032": { - "cmt_msg": "char: pcmcia: remove all the drivers" + "CVE-2021-47074": { + "cmt_msg": "nvme-loop: fix memory leak in nvme_loop_create_ctrl()" }, - "CVE-2020-10781": { - "cmt_msg": "Revert \"zram: convert remaining CLASS_ATTR() to CLASS_ATTR_RO()\"" + "CVE-2021-47077": { + "cmt_msg": "scsi: qedf: Add pointer checks in qedf_update_link_speed()" + }, + "CVE-2021-47076": { + "cmt_msg": "RDMA/rxe: Return CQE error if invalid lkey was supplied" + }, + "CVE-2021-47170": { + "cmt_msg": "USB: usbfs: Don't WARN about excessively large memory allocations" + }, + "CVE-2021-47078": { + "cmt_msg": "RDMA/rxe: Clear all QP fields if creation failed" + }, + "CVE-2021-47172": { + "cmt_msg": "iio: adc: ad7124: Fix potential overflow due to non sequential channel numbers" + }, + "CVE-2021-47173": { + "cmt_msg": "misc/uss720: fix memory leak in uss720_probe" + }, + "CVE-2021-47174": { + "cmt_msg": "netfilter: nft_set_pipapo_avx2: Add irq_fpu_usable() check, fallback to non-AVX2 version" + }, + "CVE-2021-47175": { + "cmt_msg": "net/sched: fq_pie: fix OOB access in the traffic path" + }, + "CVE-2021-47177": { + "cmt_msg": "iommu/vt-d: Fix sysfs leak in alloc_iommu()" + }, + "CVE-2021-46951": { + "cmt_msg": "tpm: efi: Use local variable for calculating final log size" + }, + "CVE-2021-46950": { + "cmt_msg": "md/raid1: properly indicate failure when ending a failed write request" + }, + "CVE-2021-46953": { + "cmt_msg": "ACPI: GTDT: Don't corrupt interrupt mappings on watchdow probe failure" + }, + "CVE-2021-46952": { + "cmt_msg": "NFS: fs_context: validate UDP retrans to prevent shift out-of-bounds" + }, + "CVE-2021-46955": { + "cmt_msg": "openvswitch: fix stack OOB read while fragmenting IPv4 packets" + }, + "CVE-2021-46956": { + "cmt_msg": "virtiofs: fix memory leak in virtio_fs_probe()" + }, + "CVE-2021-46959": { + "cmt_msg": "spi: Fix use-after-free with devm_spi_alloc_*" + }, + "CVE-2021-46958": { + "cmt_msg": "btrfs: fix race between transaction aborts and fsyncs leading to use-after-free" }, "CVE-2020-26139": { "cmt_msg": "mac80211: do not accept/forward invalid EAPOL frames" @@ -86235,59 +117667,104 @@ "CVE-2023-42754": { "cmt_msg": "ipv4: fix null-deref in ipv4_link_failure" }, + "CVE-2024-26772": { + "cmt_msg": "ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal()" + }, + "CVE-2022-3061": { + "cmt_msg": "video: fbdev: i740fb: Error out if 'pixclock' equals zero" + }, "CVE-2021-3609": { "cmt_msg": "can: bcm: delay release of struct bcm_op after synchronize_rcu()" }, + "CVE-2023-52595": { + "cmt_msg": "wifi: rt2x00: restart beacon queue when hardware reset" + }, "CVE-2021-3600": { "cmt_msg": "bpf: Fix 32 bit src register truncation on div/mod" }, "CVE-2021-23133": { "cmt_msg": "net/sctp: fix race condition in sctp_destroy_sock" }, - "CVE-2021-0929": { - "cmt_msg": "staging/android/ion: delete dma_buf->kmap/unmap implemenation" + "CVE-2022-2327": { + "cmt_msg": "io_uring: remove any grabbing of context" + }, + "CVE-2023-52590": { + "cmt_msg": "ocfs2: Avoid touching renamed directory if parent does not change" + }, + "CVE-2024-26676": { + "cmt_msg": "af_unix: Call kfree_skb() for dead unix_(sk)->oob_skb in GC." }, "CVE-2021-0920": { "cmt_msg": "af_unix: fix garbage collect vs MSG_PEEK" }, - "CVE-2022-0168": { - "cmt_msg": "cifs: fix NULL ptr dereference in smb2_ioctl_query_info()" + "CVE-2024-26675": { + "cmt_msg": "ppp_async: limit MRU to 64K" }, - "CVE-2020-26556": { - "cmt_msg": "" + "CVE-2023-52597": { + "cmt_msg": "KVM: s390: fix setting of fpc register" + }, + "CVE-2024-26622": { + "cmt_msg": "tomoyo: fix UAF write bug in tomoyo_write_control()" + }, + "CVE-2020-28374": { + "cmt_msg": "scsi: target: Fix XCOPY NAA identifier lookup" }, "CVE-2023-0615": { "cmt_msg": "media: vivid: dev->bitmap_cap wasn't freed in all cases" }, + "CVE-2024-26672": { + "cmt_msg": "drm/amdgpu: Fix variable 'mca_funcs' dereferenced before NULL check in 'amdgpu_mca_smu_get_mca_entry()'" + }, + "CVE-2023-52527": { + "cmt_msg": "ipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data()" + }, "CVE-2023-3006": { "cmt_msg": "arm64: Add AMPERE1 to the Spectre-BHB affected list" }, + "CVE-2024-26787": { + "cmt_msg": "mmc: mmci: stm32: fix DMA API overlapping mappings warning" + }, + "CVE-2023-52522": { + "cmt_msg": "net: fix possible store tearing in neigh_periodic_work()" + }, "CVE-2022-3586": { "cmt_msg": "sch_sfb: Don't assume the skb is still around after enqueueing to child" }, "CVE-2024-0641": { "cmt_msg": "tipc: fix a potential deadlock on &tx->lock" }, + "CVE-2024-26636": { + "cmt_msg": "llc: make llc_ui_sendmsg() more robust against bonding changes" + }, + "CVE-2024-26779": { + "cmt_msg": "wifi: mac80211: fix race condition on enabling fast-xmit" + }, "CVE-2024-26586": { "cmt_msg": "mlxsw: spectrum_acl_tcam: Fix stack corruption" }, - "CVE-2024-0646": { - "cmt_msg": "net: tls, update curr on splice as well" + "CVE-2023-52528": { + "cmt_msg": "net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg" }, "CVE-2020-27825": { "cmt_msg": "tracing: Fix race in trace_open and buffer resize call" }, + "CVE-2024-26623": { + "cmt_msg": "pds_core: Prevent race issues involving the adminq" + }, "CVE-2020-27820": { "cmt_msg": "drm/nouveau: use drm_dev_unplug() during device removal" }, + "CVE-2023-1872": { + "cmt_msg": "io_uring: propagate issue_flags state down to file assignment" + }, "CVE-2023-1078": { "cmt_msg": "rds: rds_rm_zerocopy_callback() use list_first_entry()" }, "CVE-2023-39197": { "cmt_msg": "netfilter: conntrack: dccp: copy entire header to stack buffer, not just basic one" }, - "CVE-2020-15852": { - "cmt_msg": "x86/ioperm: Fix io bitmap invalidation on Xen PV" + "CVE-2021-47151": { + "cmt_msg": "interconnect: qcom: bcm-voter: add a missing of_node_put()" }, "CVE-2023-4622": { "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES" @@ -86307,21 +117784,30 @@ "CVE-2023-6610": { "cmt_msg": "smb: client: fix potential OOB in smb2_dump_detail()" }, + "CVE-2024-26600": { + "cmt_msg": "phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP" + }, "CVE-2023-3390": { "cmt_msg": "netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE" }, - "CVE-2023-3812": { - "cmt_msg": "net: tun: fix bugs for oversize packet when napi frags enabled" + "CVE-2023-28328": { + "cmt_msg": "media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer()" }, "CVE-2020-26143": { "cmt_msg": "" }, - "CVE-2023-3111": { - "cmt_msg": "btrfs: unset reloc control if transaction commit fails in prepare_to_relocate()" - }, "CVE-2021-33061": { "cmt_msg": "ixgbe: add improvement for MDD response functionality" }, + "CVE-2024-26764": { + "cmt_msg": "fs/aio: Restrict kiocb_set_cancel_fn() to I/O submitted via libaio" + }, + "CVE-2024-26767": { + "cmt_msg": "drm/amd/display: fixed integer types and null check locations" + }, + "CVE-2024-26766": { + "cmt_msg": "IB/hfi1: Fix sdma.h tx->num_descs off-by-one error" + }, "CVE-2024-26589": { "cmt_msg": "bpf: Reject variable offset alu on PTR_TO_FLOW_KEYS" }, @@ -86331,15 +117817,27 @@ "CVE-2023-1476": { "cmt_msg": "" }, + "CVE-2021-47041": { + "cmt_msg": "nvmet-tcp: fix incorrect locking in state_change sk callback" + }, "CVE-2021-3864": { "cmt_msg": "" }, + "CVE-2024-26770": { + "cmt_msg": "HID: nvidia-shield: Add missing null pointer checks to LED initialization" + }, + "CVE-2024-26584": { + "cmt_msg": "net: tls: handle backlogging of crypto requests" + }, "CVE-2022-1652": { "cmt_msg": "floppy: use a statically allocated error counter" }, "CVE-2023-4623": { "cmt_msg": "net/sched: sch_hfsc: Ensure inner classes have fsc curve" }, + "CVE-2021-47043": { + "cmt_msg": "media: venus: core: Fix some resource leaks in the error path of 'venus_probe()'" + }, "CVE-2024-23849": { "cmt_msg": "net/rds: Fix UBSAN: array-index-out-of-bounds in rds_cmsg_recv" }, @@ -86355,11 +117853,11 @@ "CVE-2023-51043": { "cmt_msg": "drm/atomic: Fix potential use-after-free in nonblocking commits" }, - "CVE-2022-2978": { - "cmt_msg": "fs: fix UAF/GPF bug in nilfs_mdt_destroy" + "CVE-2022-1966": { + "cmt_msg": "netfilter: nf_tables: disallow non-stateful expression in sets earlier" }, - "CVE-2020-14356": { - "cmt_msg": "cgroup: fix cgroup_sk_alloc() for sk_clone_lock()" + "CVE-2022-38457": { + "cmt_msg": "drm/vmwgfx: Remove rcu locks from user resources" }, "CVE-2022-20132": { "cmt_msg": "HID: add hid_is_usb() function to make it simpler for USB detection" @@ -86367,20 +117865,32 @@ "CVE-2022-2977": { "cmt_msg": "tpm: fix reference counting for struct tpm_chip" }, + "CVE-2022-20424": { + "cmt_msg": "io_uring: remove io_identity" + }, "CVE-2020-0423": { "cmt_msg": "binder: fix UAF when releasing todo list" }, + "CVE-2022-23222": { + "cmt_msg": "bpf: Replace PTR_TO_XXX_OR_NULL with PTR_TO_XXX | PTR_MAYBE_NULL" + }, "CVE-2022-1789": { "cmt_msg": "KVM: x86/mmu: fix NULL pointer dereference on guest INVPCID" }, + "CVE-2023-25012": { + "cmt_msg": "HID: bigben: use spinlock to safely schedule workers" + }, "CVE-2016-8660": { "cmt_msg": "" }, "CVE-2023-6270": { - "cmt_msg": "" + "cmt_msg": "aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts" }, - "CVE-2023-3090": { - "cmt_msg": "ipvlan:Fix out-of-bounds caused by unclear skb->cb" + "CVE-2023-2156": { + "cmt_msg": "net: rpl: fix rpl header size calculation" + }, + "CVE-2022-20422": { + "cmt_msg": "arm64: fix oops in concurrently setting insn_emulation sysctls" }, "CVE-2023-3772": { "cmt_msg": "xfrm: add NULL check in xfrm_update_ae_params" @@ -86394,11 +117904,11 @@ "CVE-2023-1582": { "cmt_msg": "fs/proc: task_mmu.c: don't read mapcount for migration entry" }, - "CVE-2022-1786": { - "cmt_msg": "io_uring: remove io_identity" + "CVE-2021-47162": { + "cmt_msg": "tipc: skb_linearize the head skb when reassembling msgs" }, - "CVE-2022-23222": { - "cmt_msg": "bpf: Replace PTR_TO_XXX_OR_NULL with PTR_TO_XXX | PTR_MAYBE_NULL" + "CVE-2022-21166": { + "cmt_msg": "x86/speculation/mmio: Enable CPU Fill buffer clearing on idle" }, "CVE-2020-25669": { "cmt_msg": "Input: sunkbd - avoid use-after-free in teardown paths" @@ -86412,6 +117922,9 @@ "CVE-2020-25705": { "cmt_msg": "icmp: randomize the global rate limiter" }, + "CVE-2022-20421": { + "cmt_msg": "binder: fix UAF of ref->proc caused by race condition" + }, "CVE-2022-0435": { "cmt_msg": "tipc: improve size validations for received domain records" }, @@ -86419,20 +117932,41 @@ "cmt_msg": "HID: core: Correctly handle ReportSize being zero" }, "CVE-2023-6356": { + "cmt_msg": "nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length" + }, + "CVE-2022-3533": { "cmt_msg": "" }, + "CVE-2024-26648": { + "cmt_msg": "drm/amd/display: Fix variable deferencing before NULL check in edp_setup_replay()" + }, "CVE-2021-4135": { "cmt_msg": "netdevsim: Zero-initialize memory for new map's value in function nsim_bpf_map_alloc" }, "CVE-2023-26607": { "cmt_msg": "ntfs: fix out-of-bounds read in ntfs_attr_find()" }, - "CVE-2023-52456": { - "cmt_msg": "serial: imx: fix tx statemachine deadlock" + "CVE-2023-52513": { + "cmt_msg": "RDMA/siw: Fix connection failure handling" }, "CVE-2019-15239": { "cmt_msg": "unknown" }, + "CVE-2022-3534": { + "cmt_msg": "libbpf: Fix use-after-free in btf_dump_name_dups" + }, + "CVE-2023-52635": { + "cmt_msg": "PM / devfreq: Synchronize devfreq_monitor_[start/stop]" + }, + "CVE-2023-52469": { + "cmt_msg": "drivers/amd/pm: fix a use-after-free in kv_parse_power_table" + }, + "CVE-2023-52594": { + "cmt_msg": "wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus()" + }, + "CVE-2023-4387": { + "cmt_msg": "net: vmxnet3: fix possible use-after-free bugs in vmxnet3_rq_alloc_rx_buf()" + }, "CVE-2021-4037": { "cmt_msg": "xfs: fix up non-directory creation in SGID directories" }, @@ -86451,14 +117985,26 @@ "CVE-2023-20941": { "cmt_msg": "" }, + "CVE-2024-26773": { + "cmt_msg": "ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found()" + }, + "CVE-2023-2194": { + "cmt_msg": "i2c: xgene-slimpro: Fix out-of-bounds bug in xgene_slimpro_i2c_xfer()" + }, "CVE-2021-3347": { "cmt_msg": "futex: Ensure the correct return value from futex_lock_pi()" }, "CVE-2020-10135": { "cmt_msg": "Bluetooth: Consolidate encryption handling in hci_encrypt_cfm" }, - "CVE-2022-1966": { - "cmt_msg": "netfilter: nf_tables: disallow non-stateful expression in sets earlier" + "CVE-2021-47169": { + "cmt_msg": "serial: rp2: use 'request_firmware' instead of 'request_firmware_nowait'" + }, + "CVE-2024-26784": { + "cmt_msg": "pmdomain: arm: Fix NULL dereference on scmi_perf_domain removal" + }, + "CVE-2021-47168": { + "cmt_msg": "NFS: fix an incorrect limit in filelayout_decode_layout()" }, "CVE-2021-3587": { "cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect" @@ -86466,26 +118012,50 @@ "CVE-2021-44733": { "cmt_msg": "tee: handle lookup of shm with reference count 0" }, - "CVE-2022-3533": { - "cmt_msg": "" + "CVE-2021-20268": { + "cmt_msg": "bpf: Fix signed_{sub,add32}_overflows type handling" }, - "CVE-2022-3534": { - "cmt_msg": "libbpf: Fix use-after-free in btf_dump_name_dups" + "CVE-2021-47138": { + "cmt_msg": "cxgb4: avoid accessing registers when clearing filters" }, - "CVE-2022-3535": { - "cmt_msg": "net: mvpp2: fix mvpp2 debugfs leak" + "CVE-2021-47139": { + "cmt_msg": "net: hns3: put off calling register_netdev() until client initialize complete" + }, + "CVE-2021-47135": { + "cmt_msg": "mt76: mt7921: fix possible AOOB issue in mt7921_mcu_tx_rate_report" + }, + "CVE-2021-47136": { + "cmt_msg": "net: zero-initialize tc skb extension on allocation" + }, + "CVE-2021-47137": { + "cmt_msg": "net: lantiq: fix memory corruption in RX ring" + }, + "CVE-2024-26808": { + "cmt_msg": "netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain" + }, + "CVE-2021-47131": { + "cmt_msg": "net/tls: Fix use-after-free after the TLS device goes down and up" }, "CVE-2020-36766": { "cmt_msg": "cec-api: prevent leaking memory through hole in structure" }, - "CVE-2023-28328": { - "cmt_msg": "media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer()" + "CVE-2021-47133": { + "cmt_msg": "HID: amd_sfh: Fix memory leak in amd_sfh_work" }, - "CVE-2022-0322": { - "cmt_msg": "sctp: account stream padding length for reconf chunk" + "CVE-2021-46994": { + "cmt_msg": "can: mcp251x: fix resume from sleep before interface was brought up" }, - "CVE-2023-0386": { - "cmt_msg": "ovl: fail on invalid uid/gid mapping at copy up" + "CVE-2021-22600": { + "cmt_msg": "net/packet: rx_owner_map depends on pg_vec" + }, + "CVE-2021-46991": { + "cmt_msg": "i40e: Fix use-after-free in i40e_client_subtask()" + }, + "CVE-2021-46993": { + "cmt_msg": "sched: Fix out-of-bound access in uclamp" + }, + "CVE-2021-46992": { + "cmt_msg": "netfilter: nftables: avoid overflows in nft_hash_buckets()" }, "CVE-2023-6121": { "cmt_msg": "nvmet: nul-terminate the NQNs passed in the connect command" @@ -86493,6 +118063,12 @@ "CVE-2023-28327": { "cmt_msg": "af_unix: Get user_ns from in_skb in unix_diag_get_exact()." }, + "CVE-2021-46999": { + "cmt_msg": "sctp: do asoc update earlier in sctp_sf_do_dupcook_a" + }, + "CVE-2021-46998": { + "cmt_msg": "ethernet:enic: Fix a use after free bug in enic_hard_start_xmit" + }, "CVE-2017-13693": { "cmt_msg": "" }, @@ -86502,8 +118078,8 @@ "CVE-2022-42721": { "cmt_msg": "wifi: cfg80211: avoid nontransmitted BSS list corruption" }, - "CVE-2020-24490": { - "cmt_msg": "Bluetooth: fix kernel oops in store_pending_adv_report" + "CVE-2022-42720": { + "cmt_msg": "wifi: cfg80211: fix BSS refcounting bugs" }, "CVE-2021-4149": { "cmt_msg": "btrfs: unlock newly allocated extent buffer after error" @@ -86523,23 +118099,35 @@ "CVE-2021-3760": { "cmt_msg": "nfc: nci: fix the UAF of rf_conn_info object" }, + "CVE-2022-48627": { + "cmt_msg": "vt: fix memory overlapping when deleting chars in the buffer" + }, + "CVE-2023-52593": { + "cmt_msg": "wifi: wfx: fix possible NULL pointer dereference in wfx_set_mfp_ap()" + }, "CVE-2022-4382": { "cmt_msg": "USB: gadgetfs: Fix race between mounting and unmounting" }, - "CVE-2022-36123": { - "cmt_msg": "x86: Clear .brk area at early boot" + "CVE-2021-47180": { + "cmt_msg": "NFC: nci: fix memory leak in nci_allocate_device" }, - "CVE-2020-10732": { - "cmt_msg": "fs/binfmt_elf.c: allocate initialized memory in fill_thread_core_info()" + "CVE-2022-48628": { + "cmt_msg": "ceph: drop messages from MDS when unmounting" + }, + "CVE-2022-48629": { + "cmt_msg": "crypto: qcom-rng - ensure buffer for generate is completely filled" }, "CVE-2020-28097": { "cmt_msg": "vgacon: remove software scrollback support" }, + "CVE-2022-4379": { + "cmt_msg": "NFSD: fix use-after-free in __nfs42_ssc_open()" + }, "CVE-2024-24859": { "cmt_msg": "" }, - "CVE-2024-24858": { - "cmt_msg": "" + "CVE-2022-0322": { + "cmt_msg": "sctp: account stream padding length for reconf chunk" }, "CVE-2024-24855": { "cmt_msg": "scsi: lpfc: Fix a possible data race in lpfc_unregister_fcf_rescan()" @@ -86547,12 +118135,18 @@ "CVE-2024-24857": { "cmt_msg": "" }, + "CVE-2023-0386": { + "cmt_msg": "ovl: fail on invalid uid/gid mapping at copy up" + }, "CVE-2021-29264": { "cmt_msg": "gianfar: fix jumbo packets+napi+rx overrun crash" }, "CVE-2021-29265": { "cmt_msg": "usbip: fix stub_dev usbip_sockfd_store() races leading to gpf" }, + "CVE-2024-26673": { + "cmt_msg": "netfilter: nft_ct: sanitize layer 3 and 4 protocol number in custom expectations" + }, "CVE-2021-39648": { "cmt_msg": "usb: gadget: configfs: Fix use-after-free issue with udc_name" }, @@ -86562,24 +118156,69 @@ "CVE-2021-43056": { "cmt_msg": "KVM: PPC: Book3S HV: Make idle_kvm_start_guest() return 0 if it went to guest" }, + "CVE-2023-52569": { + "cmt_msg": "btrfs: remove BUG() after failure to insert delayed dir index item" + }, + "CVE-2023-52568": { + "cmt_msg": "x86/sgx: Resolves SECS reclaim vs. page fault for EAUG race" + }, "CVE-2022-3542": { "cmt_msg": "bnx2x: fix potential memory leak in bnx2x_tpa_stop()" }, + "CVE-2023-52563": { + "cmt_msg": "drm/meson: fix memory leak on ->hpd_notify callback" + }, + "CVE-2021-47001": { + "cmt_msg": "xprtrdma: Fix cwnd update ordering" + }, + "CVE-2023-52561": { + "cmt_msg": "arm64: dts: qcom: sdm845-db845c: Mark cont splash memory region as reserved" + }, + "CVE-2021-47004": { + "cmt_msg": "f2fs: fix to avoid touching checkpointed data in get_victim()" + }, + "CVE-2021-47005": { + "cmt_msg": "PCI: endpoint: Fix NULL pointer dereference for ->get_features()" + }, "CVE-2021-21781": { "cmt_msg": "ARM: ensure the signal page contains defined contents" }, - "CVE-2021-0512": { - "cmt_msg": "HID: make arrays usage and value to be the same" + "CVE-2021-46928": { + "cmt_msg": "parisc: Clear stale IIR value on instruction access rights trap" }, - "CVE-2023-1382": { - "cmt_msg": "tipc: set con sock in tipc_conn_alloc" + "CVE-2021-46929": { + "cmt_msg": "sctp: use call_rcu to free endpoint" + }, + "CVE-2021-46920": { + "cmt_msg": "dmaengine: idxd: Fix clobbering of SWERR overflow bit on writeback" + }, + "CVE-2021-46921": { + "cmt_msg": "locking/qrwlock: Fix ordering in queued_write_lock_slowpath()" }, "CVE-2023-1380": { "cmt_msg": "wifi: brcmfmac: slab-out-of-bounds read in brcmf_get_assoc_ies()" }, + "CVE-2022-20568": { + "cmt_msg": "Merge tag 'io_uring-worker.v3-2021-02-25' of git://git.kernel.dk/linux-block" + }, + "CVE-2021-46924": { + "cmt_msg": "NFC: st21nfca: Fix memory leak in device probe and remove" + }, + "CVE-2021-46925": { + "cmt_msg": "net/smc: fix kernel panic caused by race of smc_sock" + }, + "CVE-2021-46926": { + "cmt_msg": "ALSA: hda: intel-sdw-acpi: harden detection of controller" + }, "CVE-2020-0347": { "cmt_msg": "" }, + "CVE-2024-26788": { + "cmt_msg": "dmaengine: fsl-qdma: init irq after reg initialization" + }, + "CVE-2023-52591": { + "cmt_msg": "reiserfs: Avoid touching renamed directory if parent does not change" + }, "CVE-2022-41222": { "cmt_msg": "mm/mremap: hold the rmap lock in write mode when moving page table entries." }, @@ -86607,12 +118246,18 @@ "CVE-2021-33656": { "cmt_msg": "vt: drop old FONT ioctls" }, + "CVE-2024-26720": { + "cmt_msg": "mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again" + }, "CVE-2021-33655": { "cmt_msg": "fbcon: Disallow setting font bigger than screen size" }, "CVE-2022-41858": { "cmt_msg": "drivers: net: slip: fix NPD bug in sl_tx_timeout()" }, + "CVE-2024-26726": { + "cmt_msg": "btrfs: don't drop extent_map for free space inode on write error" + }, "CVE-2022-3176": { "cmt_msg": "io_uring: fix UAF due to missing POLLFREE handling" }, @@ -86649,24 +118294,39 @@ "CVE-2024-0584": { "cmt_msg": "ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet" }, + "CVE-2024-26700": { + "cmt_msg": "drm/amd/display: Fix MST Null Ptr for RV" + }, "CVE-2020-0465": { "cmt_msg": "HID: core: Sanitize event code and type when mapping input" }, + "CVE-2023-52638": { + "cmt_msg": "can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock" + }, "CVE-2021-1048": { "cmt_msg": "fix regression in \"epoll: Keep a reference on files added to the check list\"" }, + "CVE-2023-52516": { + "cmt_msg": "dma-debug: don't call __dma_entry_alloc_check_leak() under free_entries_lock" + }, "CVE-2021-4218": { "cmt_msg": "sysctl: pass kernel pointers to ->proc_handler" }, - "CVE-2020-0543": { - "cmt_msg": "x86/cpu: Add 'table' argument to cpu_matches()" + "CVE-2023-52515": { + "cmt_msg": "RDMA/srp: Do not call scsi_done() from srp_abort()" }, - "CVE-2024-25739": { - "cmt_msg": "" + "CVE-2019-15902": { + "cmt_msg": "unknown" + }, + "CVE-2023-52510": { + "cmt_msg": "ieee802154: ca8210: Fix a potential UAF in ca8210_probe" }, "CVE-2023-3358": { "cmt_msg": "HID: intel_ish-hid: Add check for ishtp_dma_tx_map" }, + "CVE-2023-52633": { + "cmt_msg": "um: time-travel: fix time corruption" + }, "CVE-2024-0340": { "cmt_msg": "vhost: use kzalloc() instead of kmalloc() followed by memset()" }, @@ -86674,19 +118334,16 @@ "cmt_msg": "" }, "CVE-2023-6536": { - "cmt_msg": "" + "cmt_msg": "nvmet-tcp: fix a crash in nvmet_req_complete()" }, "CVE-2021-33624": { "cmt_msg": "bpf: Inherit expanded/patched seen count from old aux data" }, - "CVE-2020-15780": { - "cmt_msg": "ACPI: configfs: Disallow loading ACPI tables when locked down" - }, "CVE-2021-27365": { "cmt_msg": "scsi: iscsi: Ensure sysfs attributes are limited to PAGE_SIZE" }, - "CVE-2021-3752": { - "cmt_msg": "Bluetooth: fix use-after-free error in lock_sock_nested()" + "CVE-2021-27364": { + "cmt_msg": "scsi: iscsi: Restrict sessions and handles to admin capabilities" }, "CVE-2021-27363": { "cmt_msg": "scsi: iscsi: Restrict sessions and handles to admin capabilities" @@ -86700,65 +118357,116 @@ "CVE-2024-1151": { "cmt_msg": "net: openvswitch: limit the number of recursions from action sets" }, + "CVE-2024-26659": { + "cmt_msg": "xhci: handle isoc Babble and Buffer Overrun events properly" + }, + "CVE-2024-26658": { + "cmt_msg": "bcachefs: grab s_umount only if snapshotting" + }, "CVE-2010-5321": { "cmt_msg": "" }, "CVE-2021-20322": { "cmt_msg": "ipv6: make exception cache less predictible" }, + "CVE-2024-26654": { + "cmt_msg": "ALSA: sh: aica: reorder cleanup operations to avoid UAF bugs" + }, "CVE-2021-20320": { "cmt_msg": "s390/bpf: Fix optimizing out zero-extensions" }, "CVE-2021-20321": { "cmt_msg": "ovl: fix missing negative dentry check in ovl_rename()" }, + "CVE-2024-26651": { + "cmt_msg": "sr9800: Add check for usbnet_get_endpoints" + }, + "CVE-2024-26650": { + "cmt_msg": "platform/x86: p2sb: Allow p2sb_bar() calls during PCI device probe" + }, "CVE-2022-42896": { "cmt_msg": "Bluetooth: L2CAP: Fix accepting connection request for invalid SPSM" }, + "CVE-2023-3812": { + "cmt_msg": "net: tun: fix bugs for oversize packet when napi frags enabled" + }, "CVE-2023-7192": { "cmt_msg": "netfilter: ctnetlink: fix possible refcount leak in ctnetlink_create_conntrack()" }, "CVE-2022-3169": { "cmt_msg": "nvme: ensure subsystem reset is single threaded" }, + "CVE-2022-4744": { + "cmt_msg": "tun: avoid double free in tun_free_netdev" + }, "CVE-2022-36280": { "cmt_msg": "drm/vmwgfx: Validate the box size for the snooped cursor" }, "CVE-2022-1048": { "cmt_msg": "ALSA: pcm: Fix races among concurrent hw_params and hw_free calls" }, - "CVE-2021-0342": { - "cmt_msg": "tun: correct header offsets in napi frags mode" + "CVE-2024-26803": { + "cmt_msg": "net: veth: clear GRO when clearing XDP even when down" + }, + "CVE-2023-52475": { + "cmt_msg": "Input: powermate - fix use-after-free in powermate_config_complete" + }, + "CVE-2023-52474": { + "cmt_msg": "IB/hfi1: Fix bugs with non-PAGE_SIZE-end multi-iovec user SDMA requests" + }, + "CVE-2023-52477": { + "cmt_msg": "usb: hub: Guard against accesses to uninitialized BOS descriptors" + }, + "CVE-2023-52476": { + "cmt_msg": "perf/x86/lbr: Filter vsyscall addresses" }, "CVE-2023-22995": { "cmt_msg": "usb: dwc3: dwc3-qcom: Add missing platform_device_put() in dwc3_qcom_acpi_register_core" }, + "CVE-2023-52340": { + "cmt_msg": "ipv6: remove max_size check inline with ipv4" + }, "CVE-2024-21803": { "cmt_msg": "" }, + "CVE-2023-22998": { + "cmt_msg": "drm/virtio: Fix NULL vs IS_ERR checking in virtio_gpu_object_shmem_init" + }, + "CVE-2023-4563": { + "cmt_msg": "netfilter: nf_tables: don't skip expired elements during walk" + }, + "CVE-2023-52479": { + "cmt_msg": "ksmbd: fix uaf in smb20_oplock_break_ack" + }, + "CVE-2023-52478": { + "cmt_msg": "HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect" + }, "CVE-2021-3542": { "cmt_msg": "" }, "CVE-2021-3428": { "cmt_msg": "ext4: handle error of ext4_setup_system_zone() on remount" }, - "CVE-2020-12659": { - "cmt_msg": "xsk: Add missing check on user supplied headroom size" + "CVE-2023-3220": { + "cmt_msg": "drm/msm/dpu: Add check for pstates" }, "CVE-2024-22099": { - "cmt_msg": "" + "cmt_msg": "Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security" }, "CVE-2023-30456": { "cmt_msg": "KVM: nVMX: add missing consistency checks for CR0 and CR4" }, - "CVE-2020-12656": { - "cmt_msg": "sunrpc: check that domain table is empty at module unload." + "CVE-2022-48626": { + "cmt_msg": "moxart: fix potential use-after-free on remove path" + }, + "CVE-2022-23041": { + "cmt_msg": "xen/9p: use alloc/free_pages_exact()" }, "CVE-2022-23040": { "cmt_msg": "xen/xenbus: don't let xenbus_grant_ring() remove grants in error case" }, - "CVE-2020-12655": { - "cmt_msg": "xfs: add agf freeblocks verify in xfs_agf_verify" + "CVE-2022-23042": { + "cmt_msg": "xen/netfront: react properly to failing gnttab_end_foreign_access_ref()" }, "CVE-2018-12929": { "cmt_msg": "" @@ -86772,9 +118480,6 @@ "CVE-2020-36310": { "cmt_msg": "KVM: SVM: avoid infinite loop on NPF from bad address" }, - "CVE-2020-36313": { - "cmt_msg": "KVM: Fix out of range accesses to memslots" - }, "CVE-2020-35519": { "cmt_msg": "net/x25: prevent a couple of overflows" }, @@ -86796,6 +118501,12 @@ "CVE-2024-25741": { "cmt_msg": "" }, + "CVE-2024-26778": { + "cmt_msg": "fbdev: savage: Error out if pixclock equals zero" + }, + "CVE-2024-26809": { + "cmt_msg": "netfilter: nft_set_pipapo: release elements in clone only from destroy path" + }, "CVE-2022-26966": { "cmt_msg": "sr9700: sanity check for packet length" }, @@ -86805,32 +118516,71 @@ "CVE-2023-1989": { "cmt_msg": "Bluetooth: btsdio: fix use after free bug in btsdio_remove due to unfinished work" }, + "CVE-2024-26806": { + "cmt_msg": "spi: cadence-qspi: remove system-wide suspend helper calls from runtime PM hooks" + }, "CVE-2021-37159": { "cmt_msg": "usb: hso: fix error handling code of hso_create_net_device" }, - "CVE-2020-12770": { - "cmt_msg": "scsi: sg: add sg_remove_request in sg_write" + "CVE-2023-4732": { + "cmt_msg": "mm/userfaultfd: fix uffd-wp special cases for fork()" + }, + "CVE-2024-26802": { + "cmt_msg": "stmmac: Clear variable when destroying workqueue" + }, + "CVE-2023-52508": { + "cmt_msg": "nvme-fc: Prevent null pointer dereference in nvme_fc_io_getuuid()" + }, + "CVE-2023-52606": { + "cmt_msg": "powerpc/lib: Validate size for vector operations" + }, + "CVE-2023-52607": { + "cmt_msg": "powerpc/mm: Fix null-pointer dereference in pgtable_cache_add" + }, + "CVE-2023-52604": { + "cmt_msg": "FS:JFS:UBSAN:array-index-out-of-bounds in dbAdjTree" + }, + "CVE-2023-52531": { + "cmt_msg": "wifi: iwlwifi: mvm: Fix a memory corruption issue" + }, + "CVE-2023-52602": { + "cmt_msg": "jfs: fix slab-out-of-bounds Read in dtSearch" + }, + "CVE-2023-52603": { + "cmt_msg": "UBSAN: array-index-out-of-bounds in dtSplitRoot" }, "CVE-2022-25265": { "cmt_msg": "" }, + "CVE-2022-20368": { + "cmt_msg": "net/packet: fix slab-out-of-bounds access in packet_recvmsg()" + }, + "CVE-2023-52608": { + "cmt_msg": "firmware: arm_scmi: Check mailbox/SMT channel for consistency" + }, + "CVE-2023-52609": { + "cmt_msg": "binder: fix race between mmput() and do_exit()" + }, "CVE-2022-21499": { "cmt_msg": "lockdown: also lock down previous kgdb use" }, - "CVE-2020-29374": { - "cmt_msg": "gup: document and work around \"COW can break either way\" issue" + "CVE-2020-27152": { + "cmt_msg": "KVM: ioapic: break infinite recursion on lazy EOI" }, "CVE-2023-4208": { "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free" }, + "CVE-2022-47519": { + "cmt_msg": "wifi: wilc1000: validate length of IEEE80211_P2P_ATTR_OPER_CHANNEL attribute" + }, "CVE-2022-3606": { "cmt_msg": "" }, "CVE-2023-4206": { "cmt_msg": "net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free" }, - "CVE-2023-4207": { - "cmt_msg": "net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free" + "CVE-2022-39188": { + "cmt_msg": "mmu_gather: Force tlb-flush VM_PFNMAP vmas" }, "CVE-2023-3640": { "cmt_msg": "" @@ -86841,42 +118591,90 @@ "CVE-2023-0160": { "cmt_msg": "bpf, sockmap: fix deadlocks in the sockhash and sockmap" }, + "CVE-2023-52506": { + "cmt_msg": "LoongArch: Set all reserved memblocks on Node#0 at initialization" + }, "CVE-2022-2663": { "cmt_msg": "netfilter: nf_conntrack_irc: Fix forged IP logic" }, + "CVE-2021-47049": { + "cmt_msg": "Drivers: hv: vmbus: Use after free in __vmbus_open()" + }, + "CVE-2024-26782": { + "cmt_msg": "mptcp: fix double-free on socket dismantle" + }, "CVE-2022-43750": { "cmt_msg": "usb: mon: make mmapped memory read only" }, "CVE-2023-0047": { "cmt_msg": "mm, oom: do not trigger out_of_memory from the #PF" }, + "CVE-2021-47046": { + "cmt_msg": "drm/amd/display: Fix off by one in hdmi_14_process_transaction()" + }, "CVE-2023-0045": { "cmt_msg": "x86/bugs: Flush IBP in ib_prctl_set()" }, - "CVE-2023-4010": { - "cmt_msg": "" + "CVE-2020-25645": { + "cmt_msg": "geneve: add transport ports in route lookup for geneve" }, - "CVE-2022-38457": { - "cmt_msg": "drm/vmwgfx: Remove rcu locks from user resources" + "CVE-2020-36787": { + "cmt_msg": "media: aspeed: fix clock handling logic" }, - "CVE-2022-20424": { - "cmt_msg": "io_uring: remove io_identity" + "CVE-2021-47167": { + "cmt_msg": "NFS: Fix an Oopsable condition in __nfs_pageio_add_request()" }, - "CVE-2022-20422": { - "cmt_msg": "arm64: fix oops in concurrently setting insn_emulation sysctls" + "CVE-2021-47166": { + "cmt_msg": "NFS: Don't corrupt the value of pg_bytes_written in nfs_do_recoalesce()" }, - "CVE-2022-20421": { - "cmt_msg": "binder: fix UAF of ref->proc caused by race condition" + "CVE-2021-47165": { + "cmt_msg": "drm/meson: fix shutdown crash when component not probed" + }, + "CVE-2021-47163": { + "cmt_msg": "tipc: wait and exit until all work queues are done" + }, + "CVE-2021-46969": { + "cmt_msg": "bus: mhi: core: Fix invalid error returning in mhi_queue" + }, + "CVE-2021-47161": { + "cmt_msg": "spi: spi-fsl-dspi: Fix a resource leak in an error handling path" + }, + "CVE-2021-47160": { + "cmt_msg": "net: dsa: mt7530: fix VLAN traffic leaks" }, "CVE-2023-4385": { "cmt_msg": "fs: jfs: fix possible NULL pointer dereference in dbFree()" }, - "CVE-2023-4387": { - "cmt_msg": "net: vmxnet3: fix possible use-after-free bugs in vmxnet3_rq_alloc_rx_buf()" + "CVE-2021-46965": { + "cmt_msg": "mtd: physmap: physmap-bt1-rom: Fix unintentional stack access" + }, + "CVE-2021-46966": { + "cmt_msg": "ACPI: custom_method: fix potential use-after-free issue" + }, + "CVE-2021-46960": { + "cmt_msg": "cifs: Return correct error code from smb2_get_enc_key" + }, + "CVE-2021-46961": { + "cmt_msg": "irqchip/gic-v3: Do not enable irqs when handling spurious interrups" + }, + "CVE-2021-46962": { + "cmt_msg": "mmc: uniphier-sd: Fix a resource leak in the remove function" + }, + "CVE-2021-46963": { + "cmt_msg": "scsi: qla2xxx: Fix crash in qla2xxx_mqueuecommand()" }, "CVE-2019-19378": { "cmt_msg": "" }, + "CVE-2023-52482": { + "cmt_msg": "x86/srso: Add SRSO mitigation for Hygon processors" + }, + "CVE-2023-52599": { + "cmt_msg": "jfs: fix array-index-out-of-bounds in diNewExt" + }, + "CVE-2022-1016": { + "cmt_msg": "netfilter: nf_tables: initialize registers in nft_do_chain()" + }, "CVE-2020-4788": { "cmt_msg": "powerpc/64s: flush L1D on kernel entry" }, @@ -86886,6 +118684,9 @@ "CVE-2022-36879": { "cmt_msg": "xfrm: xfrm_policy: fix a possible double xfrm_pols_put() in xfrm_bundle_lookup()" }, + "CVE-2023-52565": { + "cmt_msg": "media: uvcvideo: Fix OOB read" + }, "CVE-2021-28691": { "cmt_msg": "xen-netback: take a reference to the RX task thread" }, @@ -86922,9 +118723,6 @@ "CVE-2020-24502": { "cmt_msg": "" }, - "CVE-2019-19448": { - "cmt_msg": "btrfs: only search for left_info if there is no right_info in try_merge_free_space" - }, "CVE-2019-19449": { "cmt_msg": "f2fs: fix to do sanity check on segment/section count" }, @@ -86940,9 +118738,15 @@ "CVE-2021-0937": { "cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write" }, + "CVE-2023-52621": { + "cmt_msg": "bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers" + }, "CVE-2022-1263": { "cmt_msg": "KVM: avoid NULL pointer dereference in kvm_dirty_ring_push" }, + "CVE-2023-52610": { + "cmt_msg": "net/sched: act_ct: fix skb leak and crash on ooo frags" + }, "CVE-2021-35477": { "cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4" }, @@ -86961,11 +118765,23 @@ "CVE-2022-2209": { "cmt_msg": "" }, + "CVE-2023-52624": { + "cmt_msg": "drm/amd/display: Wake DMCUB before executing GPINT commands" + }, "CVE-2021-37576": { "cmt_msg": "KVM: PPC: Book3S: Fix H_RTAS rets buffer overflow" }, + "CVE-2024-26775": { + "cmt_msg": "aoe: avoid potential deadlock at set_capacity" + }, + "CVE-2021-47179": { + "cmt_msg": "NFSv4: Fix a NULL pointer dereference in pnfs_mark_matching_lsegs_return()" + }, + "CVE-2022-36123": { + "cmt_msg": "x86: Clear .brk area at early boot" + }, "CVE-2023-7042": { - "cmt_msg": "" + "cmt_msg": "wifi: ath10k: fix NULL pointer dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev()" }, "CVE-2022-3594": { "cmt_msg": "r8152: Rate limit overflow messages" @@ -86973,39 +118789,57 @@ "CVE-2022-3595": { "cmt_msg": "cifs: fix double-fault crash during ntlmssp" }, - "CVE-2023-0240": { - "cmt_msg": "io_uring: COW io_identity on mismatch" + "CVE-2023-52559": { + "cmt_msg": "iommu/vt-d: Avoid memory allocation in iommu_suspend()" }, "CVE-2023-47233": { - "cmt_msg": "" + "cmt_msg": "wifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach" }, "CVE-2020-27815": { "cmt_msg": "jfs: Fix array index bounds check in dbAdjTree" }, - "CVE-2022-23041": { - "cmt_msg": "xen/9p: use alloc/free_pages_exact()" + "CVE-2023-52629": { + "cmt_msg": "sh: push-switch: Reorder cleanup operations to avoid use-after-free bug" }, "CVE-2022-1462": { "cmt_msg": "tty: use new tty_insert_flip_string_and_push_buffer() in pty_write()" }, - "CVE-2023-21400": { - "cmt_msg": "" + "CVE-2024-26758": { + "cmt_msg": "md: Don't ignore suspended array in md_check_recovery()" + }, + "CVE-2024-26610": { + "cmt_msg": "wifi: iwlwifi: fix a memory corruption" }, "CVE-2023-6606": { "cmt_msg": "smb: client: fix OOB in smbCalcSize()" }, + "CVE-2024-26614": { + "cmt_msg": "tcp: make sure init the accept_queue's spinlocks once" + }, "CVE-2020-27777": { "cmt_msg": "powerpc/rtas: Restrict RTAS requests from userspace" }, - "CVE-2023-39189": { - "cmt_msg": "netfilter: nfnetlink_osf: avoid OOB read" + "CVE-2022-3112": { + "cmt_msg": "media: meson: vdec: potential dereference of null pointer" + }, + "CVE-2024-26752": { + "cmt_msg": "l2tp: pass correct message length to ip6_append_data" }, "CVE-2020-27673": { "cmt_msg": "xen/events: add a proper barrier to 2-level uevent unmasking" }, + "CVE-2024-26754": { + "cmt_msg": "gtp: fix use-after-free and null-ptr-deref in gtp_genl_dump_pdp()" + }, "CVE-2020-27675": { "cmt_msg": "xen/events: avoid removing an event channel while handling it" }, + "CVE-2024-26756": { + "cmt_msg": "md: Don't register sync_thread for reshape directly" + }, + "CVE-2024-26757": { + "cmt_msg": "md: Don't ignore read-only array in md_check_recovery()" + }, "CVE-2023-52439": { "cmt_msg": "uio: Fix use-after-free in uio_open" }, @@ -87036,12 +118870,27 @@ "CVE-2022-2964": { "cmt_msg": "net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup" }, + "CVE-2024-26688": { + "cmt_msg": "fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super" + }, + "CVE-2024-23307": { + "cmt_msg": "md/raid5: fix atomicity violation in raid5_cache_count" + }, "CVE-2022-2961": { "cmt_msg": "" }, "CVE-2021-3506": { "cmt_msg": "f2fs: fix to avoid out-of-bounds memory access" }, + "CVE-2024-26680": { + "cmt_msg": "net: atlantic: Fix DMA mapping for PTP hwts ring" + }, + "CVE-2024-26686": { + "cmt_msg": "fs/proc: do_task_stat: use sig->stats_lock to gather the threads/children stats" + }, + "CVE-2024-26687": { + "cmt_msg": "xen/events: close evtchn after mapping cleanup" + }, "CVE-2023-51779": { "cmt_msg": "Bluetooth: af_bluetooth: Fix Use-After-Free in bt_sock_recvmsg" }, @@ -87057,6 +118906,9 @@ "CVE-2010-4563": { "cmt_msg": "" }, + "CVE-2021-47006": { + "cmt_msg": "ARM: 9064/1: hw_breakpoint: Do not directly check the event's overflow_handler hook" + }, "CVE-2023-1249": { "cmt_msg": "coredump: Use the vma snapshot in fill_files_note" }, @@ -87069,18 +118921,24 @@ "CVE-2023-45871": { "cmt_msg": "igb: set max size RX buffer when store bad packet is enabled" }, - "CVE-2023-2248": { - "cmt_msg": "net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg" + "CVE-2024-23851": { + "cmt_msg": "dm: limit the number of targets and parameter size area" }, "CVE-2023-0266": { "cmt_msg": "ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF" }, - "CVE-2023-1838": { - "cmt_msg": "Fix double fget() in vhost_net_set_backend()" + "CVE-2021-0512": { + "cmt_msg": "HID: make arrays usage and value to be the same" }, "CVE-2021-3483": { "cmt_msg": "firewire: nosy: Fix a use-after-free bug in nosy_ioctl()" }, + "CVE-2024-26663": { + "cmt_msg": "tipc: Check the bearer type before calling tipc_udp_nl_bearer_add()" + }, + "CVE-2024-26598": { + "cmt_msg": "KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache" + }, "CVE-2023-6040": { "cmt_msg": "netfilter: nf_tables: Reject tables of unsupported family" }, @@ -87093,12 +118951,18 @@ "CVE-2022-24448": { "cmt_msg": "NFSv4: Handle case where the lookup of a directory fails" }, - "CVE-2024-26598": { - "cmt_msg": "KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache" + "CVE-2023-52498": { + "cmt_msg": "PM: sleep: Fix possible deadlocks in core system-wide PM code" }, "CVE-2021-4023": { "cmt_msg": "io-wq: fix cancellation on create-worker failure" }, + "CVE-2023-52640": { + "cmt_msg": "fs/ntfs3: Fix oob in ntfs_listxattr" + }, + "CVE-2023-52641": { + "cmt_msg": "fs/ntfs3: Add NULL ptr dereference checking at the end of attr_allocate_frame()" + }, "CVE-2021-22555": { "cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write" }, @@ -87108,56 +118972,101 @@ "CVE-2021-0399": { "cmt_msg": "" }, + "CVE-2023-52488": { + "cmt_msg": "serial: sc16is7xx: convert from _raw_ to _noinc_ regmap functions for FIFO" + }, "CVE-2020-36691": { "cmt_msg": "netlink: limit recursion depth in policy validation" }, + "CVE-2021-47070": { + "cmt_msg": "uio_hv_generic: Fix another memory leak in error handling paths" + }, "CVE-2023-42755": { "cmt_msg": "net/sched: Retire rsvp classifier" }, "CVE-2020-36516": { "cmt_msg": "ipv4: avoid using shared IP generator for connected sockets" }, + "CVE-2023-52486": { + "cmt_msg": "drm: Don't unref the same fb many times by mistake due to deadlock handling" + }, + "CVE-2023-52480": { + "cmt_msg": "ksmbd: fix race condition between session lookup and expire" + }, "CVE-2012-4542": { "cmt_msg": "" }, "CVE-2023-42753": { "cmt_msg": "netfilter: ipset: add the missing IP_SET_HASH_WITH_NET0 macro for ip_set_hash_netportnet.c" }, - "CVE-2023-42752": { - "cmt_msg": "igmp: limit igmpv3_newpack() packet size to IP_MAX_MTU" + "CVE-2023-1838": { + "cmt_msg": "Fix double fget() in vhost_net_set_backend()" }, - "CVE-2023-4128": { - "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free" + "CVE-2023-1382": { + "cmt_msg": "tipc: set con sock in tipc_conn_alloc" + }, + "CVE-2023-4244": { + "cmt_msg": "netfilter: nf_tables: fix GC transaction races with netns and netlink event exit path" }, "CVE-2021-3573": { "cmt_msg": "Bluetooth: use correct lock to prevent UAF of hdev object" }, - "CVE-2024-0607": { - "cmt_msg": "netfilter: nf_tables: fix pointer math issue in nft_byteorder_eval()" - }, "CVE-2023-3609": { "cmt_msg": "net/sched: cls_u32: Fix reference counter leak leading to overflow" }, + "CVE-2022-44033": { + "cmt_msg": "char: pcmcia: remove all the drivers" + }, "CVE-2022-1974": { "cmt_msg": "nfc: replace improper check device_is_registered() in netlink related functions" }, "CVE-2022-1975": { "cmt_msg": "NFC: netlink: fix sleep in atomic bug when firmware download timeout" }, - "CVE-2021-28972": { - "cmt_msg": "PCI: rpadlpar: Fix potential drc_name corruption in store functions" + "CVE-2022-1972": { + "cmt_msg": "netfilter: nf_tables: sanitize nft_set_desc_concat_parse()" }, - "CVE-2021-20292": { - "cmt_msg": "drm/ttm/nouveau: don't call tt destroy callback on alloc failure." + "CVE-2023-52491": { + "cmt_msg": "media: mtk-jpeg: Fix use after free bug due to error path handling in mtk_jpeg_dec_device_run" + }, + "CVE-2022-44032": { + "cmt_msg": "char: pcmcia: remove all the drivers" + }, + "CVE-2020-36777": { + "cmt_msg": "media: dvbdev: Fix memory leak in dvb_media_device_free()" + }, + "CVE-2021-47082": { + "cmt_msg": "tun: avoid double free in tun_free_netdev" + }, + "CVE-2021-47083": { + "cmt_msg": "pinctrl: mediatek: fix global-out-of-bounds issue" }, "CVE-2021-31916": { "cmt_msg": "dm ioctl: fix out of bounds array access when no devices" }, + "CVE-2021-47086": { + "cmt_msg": "phonet/pep: refuse to enable an unbound pipe" + }, "CVE-2022-32981": { "cmt_msg": "powerpc/32: Fix overread/overwrite of thread_struct via ptrace" }, - "CVE-2022-3424": { - "cmt_msg": "misc: sgi-gru: fix use-after-free error in gru_set_context_option, gru_fault and gru_handle_user_call_os" + "CVE-2021-47122": { + "cmt_msg": "net: caif: fix memory leak in caif_device_notify" + }, + "CVE-2021-47121": { + "cmt_msg": "net: caif: fix memory leak in cfusbl_device_notify" + }, + "CVE-2021-47120": { + "cmt_msg": "HID: magicmouse: fix NULL-deref on disconnect" + }, + "CVE-2021-47126": { + "cmt_msg": "ipv6: Fix KASAN: slab-out-of-bounds Read in fib6_nh_flush_exceptions" + }, + "CVE-2020-36779": { + "cmt_msg": "i2c: stm32f7: fix reference leak when pm_runtime_get_sync fails" + }, + "CVE-2020-36778": { + "cmt_msg": "i2c: xiic: fix reference leak when pm_runtime_get_sync fails" }, "CVE-2023-2269": { "cmt_msg": "dm ioctl: fix nested locking in table_clear() to remove deadlock concern" @@ -87165,6 +119074,12 @@ "CVE-2023-0394": { "cmt_msg": "ipv6: raw: Deduct extension header length in rawv6_push_pending_frames" }, + "CVE-2021-47171": { + "cmt_msg": "net: usb: fix memory leak in smsc75xx_bind" + }, + "CVE-2024-26615": { + "cmt_msg": "net/smc: fix illegal rmb_desc access in SMC-D connection dump" + }, "CVE-2022-3108": { "cmt_msg": "drm/amdkfd: Check for null pointer after calling kmemdup" }, @@ -87189,8 +119104,11 @@ "CVE-2020-3702": { "cmt_msg": "ath: Use safer key clearing with key cache entries" }, - "CVE-2021-3653": { - "cmt_msg": "KVM: nSVM: avoid picking up unsupported bits from L2 in int_ctl (CVE-2021-3653)" + "CVE-2023-52485": { + "cmt_msg": "drm/amd/display: Wake DMCUB before sending a command" + }, + "CVE-2021-28952": { + "cmt_msg": "ASoC: qcom: sdm845: Fix array out of bounds access" }, "CVE-2021-3655": { "cmt_msg": "sctp: validate from_addr_param return" @@ -87198,9 +119116,6 @@ "CVE-2020-8694": { "cmt_msg": "powercap: restrict energy meter to root access" }, - "CVE-2021-4159": { - "cmt_msg": "bpf: Verifer, adjust_scalar_min_max_vals to always call update_reg_bounds()" - }, "CVE-2023-0461": { "cmt_msg": "net/ulp: prevent ULP without clone op from entering the LISTEN status" }, @@ -87213,6 +119128,9 @@ "CVE-2021-3714": { "cmt_msg": "" }, + "CVE-2024-26733": { + "cmt_msg": "arp: Prevent overflow in arp_req_get()." + }, "CVE-2021-3896": { "cmt_msg": "isdn: cpai: check ctr->cnr to avoid array index out of bound" }, @@ -87264,11 +119182,29 @@ "CVE-2022-33744": { "cmt_msg": "xen/arm: Fix race in RB-tree based P2M accounting" }, + "CVE-2023-52596": { + "cmt_msg": "sysctl: Fix out of bounds access for empty sysctl registers" + }, + "CVE-2021-47016": { + "cmt_msg": "m68k: mvme147,mvme16x: Don't wipe PCC timer config bits" + }, + "CVE-2021-47015": { + "cmt_msg": "bnxt_en: Fix RX consumer index logic in the error path." + }, "CVE-2023-52443": { "cmt_msg": "apparmor: avoid crash when parsed profile name is empty" }, - "CVE-2022-2327": { - "cmt_msg": "io_uring: remove any grabbing of context" + "CVE-2021-47013": { + "cmt_msg": "net:emac/emac-mac: Fix a use after free in emac_mac_tx_buf_send" + }, + "CVE-2021-47012": { + "cmt_msg": "RDMA/siw: Fix a use after free in siw_alloc_mr" + }, + "CVE-2021-47158": { + "cmt_msg": "net: dsa: sja1105: add error handling in sja1105_setup()" + }, + "CVE-2021-47010": { + "cmt_msg": "net: Only allow init netns to set default tcp cong to a restricted algo" }, "CVE-2022-1280": { "cmt_msg": "drm: avoid circular locks in drm_mode_getconnector" @@ -87276,20 +119212,38 @@ "CVE-2020-12888": { "cmt_msg": "vfio-pci: Invalidate mmaps and block MMIO access on disabled memory" }, - "CVE-2023-2194": { - "cmt_msg": "i2c: xgene-slimpro: Fix out-of-bounds bug in xgene_slimpro_i2c_xfer()" + "CVE-2021-47152": { + "cmt_msg": "mptcp: fix data stream corruption" }, - "CVE-2023-52445": { - "cmt_msg": "media: pvrusb2: fix use after free on context disconnection" + "CVE-2021-47153": { + "cmt_msg": "i2c: i801: Don't generate an interrupt on bus reset" }, - "CVE-2022-41218": { - "cmt_msg": "media: dvb-core: Fix UAF due to refcount races at releasing" + "CVE-2021-47150": { + "cmt_msg": "net: fec: fix the potential memory leak in fec_enet_init()" }, - "CVE-2020-14331": { - "cmt_msg": "vgacon: Fix for missing check in scrollback handling" + "CVE-2021-47018": { + "cmt_msg": "powerpc/64: Fix the definition of the fixmap area" }, - "CVE-2023-52438": { - "cmt_msg": "binder: fix use-after-free in shinker's callback" + "CVE-2021-46936": { + "cmt_msg": "net: fix use-after-free in tw_timer_handler" + }, + "CVE-2021-46935": { + "cmt_msg": "binder: fix async_free_space accounting for empty parcels" + }, + "CVE-2021-46934": { + "cmt_msg": "i2c: validate user data in compat ioctl" + }, + "CVE-2021-46933": { + "cmt_msg": "usb: gadget: f_fs: Clear ffs_eventfd in ffs_data_clear." + }, + "CVE-2021-46932": { + "cmt_msg": "Input: appletouch - initialize work before device registration" + }, + "CVE-2021-46931": { + "cmt_msg": "net/mlx5e: Wrap the tx reporter dump callback to extract the sq" + }, + "CVE-2021-46930": { + "cmt_msg": "usb: mtu3: fix list_head check warning" }, "CVE-2022-36946": { "cmt_msg": "netfilter: nf_queue: do not allow packet truncation below transport header offset" @@ -87303,11 +119257,20 @@ "CVE-2021-0448": { "cmt_msg": "netfilter: ctnetlink: add a range check for l3/l4 protonum" }, - "CVE-2022-21166": { - "cmt_msg": "x86/speculation/mmio: Enable CPU Fill buffer clearing on idle" + "CVE-2021-47103": { + "cmt_msg": "inet: fully convert sk->sk_rx_dst to RCU rules" + }, + "CVE-2021-46939": { + "cmt_msg": "tracing: Restructure trace_clock_global() to never block" + }, + "CVE-2021-46938": { + "cmt_msg": "dm rq: fix double free of blk_mq_tag_set in dev remove after table load fails" + }, + "CVE-2021-47105": { + "cmt_msg": "ice: xsk: return xsk buffers back to pool when cleaning the ring" }, "CVE-2024-0841": { - "cmt_msg": "" + "cmt_msg": "fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super" }, "CVE-2021-29650": { "cmt_msg": "netfilter: x_tables: Use correct memory barriers." @@ -87315,6 +119278,9 @@ "CVE-2023-34255": { "cmt_msg": "xfs: verify buffer contents when we skip log replay" }, + "CVE-2023-4010": { + "cmt_msg": "" + }, "CVE-2022-41849": { "cmt_msg": "fbdev: smscufx: Fix use-after-free in ufx_ops_open()" }, @@ -87333,6 +119299,9 @@ "CVE-2020-29534": { "cmt_msg": "io_uring: don't rely on weak ->files references" }, + "CVE-2024-26748": { + "cmt_msg": "usb: cdns3: fix memory double free when handle zero packet" + }, "CVE-2022-1198": { "cmt_msg": "drivers: hamradio: 6pack: fix UAF bug caused by mod_timer()" }, @@ -87369,15 +119338,36 @@ "CVE-2022-45886": { "cmt_msg": "media: dvb-core: Fix use-after-free due on race condition at dvb_net" }, + "CVE-2023-52509": { + "cmt_msg": "ravb: Fix use-after-free issue in ravb_tx_timeout_work()" + }, "CVE-2023-46343": { "cmt_msg": "nfc: nci: fix possible NULL pointer dereference in send_acknowledge()" }, "CVE-2024-25744": { "cmt_msg": "x86/coco: Disable 32-bit emulation by default on TDX and SEV" }, + "CVE-2023-52504": { + "cmt_msg": "x86/alternatives: Disable KASAN in apply_alternatives()" + }, + "CVE-2023-52507": { + "cmt_msg": "nfc: nci: assert requested protocol is valid" + }, "CVE-2023-2124": { "cmt_msg": "xfs: verify buffer contents when we skip log replay" }, + "CVE-2023-52501": { + "cmt_msg": "ring-buffer: Do not attempt to read past \"commit\"" + }, + "CVE-2023-52500": { + "cmt_msg": "scsi: pm80xx: Avoid leaking tags when processing OPC_INB_SET_CONTROLLER_CONFIG command" + }, + "CVE-2023-52503": { + "cmt_msg": "tee: amdtee: fix use-after-free vulnerability in amdtee_close_session" + }, + "CVE-2023-52502": { + "cmt_msg": "net: nfc: fix races in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn()" + }, "CVE-2023-1281": { "cmt_msg": "net/sched: tcindex: update imperfect hash filters respecting rcu" }, @@ -87393,18 +119383,33 @@ "CVE-2023-2513": { "cmt_msg": "ext4: fix use-after-free in ext4_xattr_set_entry" }, + "CVE-2022-1516": { + "cmt_msg": "net/x25: Fix null-ptr-deref caused by x25_disconnect" + }, "CVE-2023-1855": { "cmt_msg": "hwmon: (xgene) Fix use after free bug in xgene_hwmon_remove due to race condition" }, "CVE-2022-27672": { "cmt_msg": "x86/speculation: Identify processors vulnerable to SMT RSB predictions" }, + "CVE-2024-26668": { + "cmt_msg": "netfilter: nft_limit: reject configurations that cause integer overflow" + }, + "CVE-2024-26669": { + "cmt_msg": "net/sched: flower: Fix chain template offload" + }, + "CVE-2020-25221": { + "cmt_msg": "mm: fix pin vs. gup mismatch with gate pages" + }, "CVE-2015-2877": { "cmt_msg": "" }, "CVE-2023-26242": { "cmt_msg": "" }, + "CVE-2024-26664": { + "cmt_msg": "hwmon: (coretemp) Fix out-of-bounds memory access" + }, "CVE-2019-16089": { "cmt_msg": "" }, @@ -87414,12 +119419,12 @@ "CVE-2021-38199": { "cmt_msg": "NFSv4: Initialise connection to the server in nfs4_alloc_client()" }, + "CVE-2024-26689": { + "cmt_msg": "ceph: prevent use-after-free in encode_cap_msg()" + }, "CVE-2022-1679": { "cmt_msg": "ath9k: fix use-after-free in ath9k_hif_usb_rx_cb" }, - "CVE-2023-34256": { - "cmt_msg": "ext4: avoid a potential slab-out-of-bounds in ext4_group_desc_csum" - }, "CVE-2023-1513": { "cmt_msg": "kvm: initialize all of the kvm_debugregs structure before sending it to userspace" }, @@ -87429,6 +119434,9 @@ "CVE-2020-28941": { "cmt_msg": "speakup: Do not let the line discipline be used several times" }, + "CVE-2023-4207": { + "cmt_msg": "net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free" + }, "CVE-2023-52442": { "cmt_msg": "ksmbd: validate session id and tree id in compound request" }, @@ -87453,244 +119461,290 @@ "CVE-2023-52449": { "cmt_msg": "mtd: Fix gluebi NULL pointer dereference caused by ftl notifier" }, - "CVE-2023-3220": { - "cmt_msg": "drm/msm/dpu: Add check for pstates" - }, "CVE-2023-23039": { "cmt_msg": "" }, + "CVE-2024-26719": { + "cmt_msg": "nouveau: offload fence uevents work to workqueue" + }, + "CVE-2024-26715": { + "cmt_msg": "usb: dwc3: gadget: Fix NULL pointer dereference in dwc3_gadget_suspend" + }, "CVE-2024-1312": { "cmt_msg": "mm: lock_vma_under_rcu() must check vma->anon_vma under vma lock" }, + "CVE-2024-26713": { + "cmt_msg": "powerpc/pseries/iommu: Fix iommu initialisation during DLPAR add" + }, "CVE-2023-3338": { "cmt_msg": "Remove DECnet support from kernel" }, + "CVE-2024-26712": { + "cmt_msg": "powerpc/kasan: Fix addr error caused by page alignment" + }, "CVE-2023-1637": { "cmt_msg": "x86/speculation: Restore speculation related MSRs during S3 resume" } } }, - "4.3": { - "4.3": { - "CVE-2015-8953": { - "cmt_msg": "ovl: fix dentry reference leak", - "cmt_id": "ab79efab0a0ba01a74df782eb7fa44b044dae8b5" - } - }, - "4.3.1": { - "CVE-2015-5307": { - "cmt_msg": "KVM: x86: work around infinite loop in microcode when #AC is delivered", - "cmt_id": "971cdbf756b5e29427ca8d94e0df3a25a66a7ed8" + "5.8": { + "5.8": { + "CVE-2020-24490": { + "cmt_msg": "Bluetooth: fix kernel oops in store_pending_adv_report", + "cmt_id": "a2ec905d1e160a33b2e210e45ad30445ef26ce0e" + }, + "CVE-2020-16166": { + "cmt_msg": "random32: update the net random state on interrupt and activity", + "cmt_id": "f227e3ec3b5cad859ad15666874405e8c1bbc1d4" + }, + "CVE-2021-0605": { + "cmt_msg": "af_key: pfkey_dump needs parameter validation", + "cmt_id": "37bd22420f856fcd976989f1d4f1f7ad28e1fcac" } }, - "4.3.2": { - "CVE-2015-5327": { - "cmt_msg": "X.509: Fix the time validation [ver #2]", - "cmt_id": "14a837d297366fed10bc5f6f2bbecf9400e84e15" + "5.8.1": { + "CVE-2020-36386": { + "cmt_msg": "Bluetooth: Fix slab-out-of-bounds read in hci_extended_inquiry_result_evt()", + "cmt_id": "cc09a53b7252eeffd2c1d403d215dd0f3aad1f5d" + }, + "CVE-2020-14331": { + "cmt_msg": "vgacon: Fix for missing check in scrollback handling", + "cmt_id": "0ca4ebe9d6350e758e40683f08fd93cb4539e0b7" } }, - "4.3.3": { - "CVE-2016-3841": { - "cmt_msg": "ipv6: add complete rcu protection around np->opt", - "cmt_id": "645e3f33c73ad1153db0680b6833cf70d0d4dce3" - }, - "CVE-2015-8374": { - "cmt_msg": "Btrfs: fix truncation of compressed and inlined extents", - "cmt_id": "90291b48b1d907425d8741861fff1dfe4cf7156f" + "5.8.2": { + "CVE-2020-26088": { + "cmt_msg": "net/nfc/rawsock.c: add CAP_NET_RAW check.", + "cmt_id": "d556aa7ab7b71592fc60ecdc4b917644ecea2c92" }, - "CVE-2015-7990": { - "cmt_msg": "RDS: fix race condition when sending a message on unbound socket", - "cmt_id": "0eaa7b64f7c307249fc28f2a57ff20aa905910bb" + "CVE-2020-36387": { + "cmt_msg": "io_uring: hold 'ctx' reference around task_work queue + execute", + "cmt_id": "960ea38bfe7a0edd403d6a9e2d358018b4ce3bfa" }, - "CVE-2015-8961": { - "cmt_msg": "ext4: fix potential use after free in __ext4_journal_stop", - "cmt_id": "5a4ead78e6a00d20924ea1485d51529d9d6c335f" + "CVE-2019-19770": { + "cmt_msg": "blktrace: fix debugfs use after free", + "cmt_id": "00734ff000fc72cb48a1aec214f024824f8b7419" }, - "CVE-2013-7446": { - "cmt_msg": "unix: avoid use-after-free in ep_remove_wait_queue", - "cmt_id": "58a6a46a036ce81a2a8ecaa6fc1537c894349e3f" + "CVE-2021-20292": { + "cmt_msg": "drm/ttm/nouveau: don't call tt destroy callback on alloc failure.", + "cmt_id": "3c374f0e63d7261dce2e556ac3df4e0541dd775a" } }, - "4.3.4": { - "CVE-2015-8543": { - "cmt_msg": "net: add validation for the socket syscall protocol argument", - "cmt_id": "14d44ee8fe6872c27d97ced4bd65420001c4b0ca" - }, - "CVE-2015-8575": { - "cmt_msg": "bluetooth: Validate socket address length in sco_sock_bind().", - "cmt_id": "9b11c6bd46ec36ddee89e29702584d0eaca2e4f7" - }, - "CVE-2016-0728": { - "cmt_msg": "KEYS: Fix keyring ref leak in join_session_keyring()", - "cmt_id": "c23d6de841098d408ceb573cbc9f4dcf7c92a786" - }, - "CVE-2015-7550": { - "cmt_msg": "KEYS: Fix race between read and revoke", - "cmt_id": "5d7e7e93f6d4a8674a6f2dbd630834757b468c34" + "5.8.3": { + "CVE-2019-19448": { + "cmt_msg": "btrfs: only search for left_info if there is no right_info in try_merge_free_space", + "cmt_id": "aa39db7b49ee73f10693c0ab7901c76e18031ebd" }, - "CVE-2015-8569": { - "cmt_msg": "pptp: verify sockaddr_len in pptp_bind() and pptp_connect()", - "cmt_id": "eb414863e52e4dc8763f34f5ac9c41b3ba654850" + "CVE-2020-25212": { + "cmt_msg": "nfs: Fix getxattr kernel panic and memory overflow", + "cmt_id": "266bc13be47ace4bc434dc1617bb5550aeceea4f" } }, - "4.3.5": { - "CVE-2016-2070": { - "cmt_msg": "tcp: fix zero cwnd in tcp_cwnd_reduction", - "cmt_id": "018f0282a78aac26430b7212cb2ee01348ba06d2" - }, - "CVE-2016-2069": { - "cmt_msg": "x86/mm: Add barriers and document switch_mm()-vs-flush synchronization", - "cmt_id": "f16cabcd975ccbcc818aa64a6e61e21423b27b72" + "5.8.4": { + "CVE-2020-14314": { + "cmt_msg": "ext4: fix potential negative array index in do_split()", + "cmt_id": "88e79f7a9841278fa8ff7ff6178bad12da002ffc" }, - "CVE-2015-7799": { - "cmt_msg": "isdn_ppp: Add checks for allocation failure in isdn_ppp_open()", - "cmt_id": "e9af90c4bfe1cd825bd50e967914f344dd4cd9f8" + "CVE-2020-29371": { + "cmt_msg": "romfs: fix uninitialized memory leak in romfs_dev_read()", + "cmt_id": "734a5c3f266c26ff785bc1fcf083b55fcda47ff5" }, - "CVE-2015-8845": { - "cmt_msg": "powerpc/tm: Check for already reclaimed tasks", - "cmt_id": "572c83615496e7d08554f7aeb4981f8260c53d17" + "CVE-2020-0466": { + "cmt_msg": "do_epoll_ctl(): clean the failure exits up a bit", + "cmt_id": "d9903e8c2576d9c933ae55fc4bab1f55e85f66e0" + } + }, + "5.8.6": { + "CVE-2020-36766": { + "cmt_msg": "cec-api: prevent leaking memory through hole in structure", + "cmt_id": "72db989557d993793c01ba84eb98f3cbf2a7f4cf" }, - "CVE-2015-8844": { - "cmt_msg": "powerpc/tm: Block signal return setting invalid MSR state", - "cmt_id": "d5b580ef3204ee8412d420e761b47027ce5f728e" + "CVE-2021-3428": { + "cmt_msg": "ext4: handle error of ext4_setup_system_zone() on remount", + "cmt_id": "6c30edde8a3a710c20b5689a921425a479501cb5" + } + }, + "5.8.7": { + "CVE-2020-25221": { + "cmt_msg": "mm: fix pin vs. gup mismatch with gate pages", + "cmt_id": "e80a7602b405dfac44aa4e81eec6d51d9e9fad8e" }, - "CVE-2016-2547": { - "cmt_msg": "ALSA: timer: Harden slave timer list handling", - "cmt_id": "ea7f3d59628930dc29482a292e2a55c81cac52a4" + "CVE-2022-20565": { + "cmt_msg": "HID: core: Correctly handle ReportSize being zero", + "cmt_id": "b070b1e2076809ea192d4f3344833afcfdaf146d" }, - "CVE-2015-8104": { - "cmt_msg": "KVM: svm: unconditionally intercept #DB", - "cmt_id": "f43767aa051fbb303d22fb9c17872de084b189d4" + "CVE-2020-0465": { + "cmt_msg": "HID: core: Sanitize event code and type when mapping input", + "cmt_id": "e771e63c0cdca5f127dbe1bed80f928da7f51673" + } + }, + "5.8.8": { + "CVE-2020-14386": { + "cmt_msg": "net/packet: fix overflow in tpacket_rcv", + "cmt_id": "03ca1f09ab1ff47a24777c13f9bd161394122f41" }, - "CVE-2016-2545": { - "cmt_msg": "ALSA: timer: Fix double unlink of active_list", - "cmt_id": "baa3a675b24fe17d5e514d71561d97f46bc6086f" + "CVE-2020-25285": { + "cmt_msg": "mm/hugetlb: fix a race between hugetlb sysctl handlers", + "cmt_id": "951e290ad85b8dfa54f8908fb680068655748d61" }, - "CVE-2016-2544": { - "cmt_msg": "ALSA: seq: Fix race at timer setup and close", - "cmt_id": "5a5c8e77d66f24446b7e741ac2e3ae3127d9dd54" + "CVE-2020-14385": { + "cmt_msg": "xfs: fix boundary test in xfs_attr_shortform_verify", + "cmt_id": "531c6cb9ad1e7de98e09e9b7d23aaca0e3f5babd" }, - "CVE-2015-8816": { - "cmt_msg": "USB: fix invalid memory access in hub_activate()", - "cmt_id": "28fb0f5b4fa9b9e201b2c6d781382601b60feee3" + "CVE-2020-25641": { + "cmt_msg": "block: allow for_each_bvec to support zero len bvec", + "cmt_id": "b7df98a8b7b8abce596e9696d5c3183fc4c0019d" }, - "CVE-2016-2546": { - "cmt_msg": "ALSA: timer: Fix race among timer ioctls", - "cmt_id": "7066da22b1eb40e955f9dfe57022816fae53d3cf" + "CVE-2021-1048": { + "cmt_msg": "fix regression in \"epoll: Keep a reference on files added to the check list\"", + "cmt_id": "41e233bd64127d95ba4c3fbca69dd790e02c0517" + } + }, + "5.8.10": { + "CVE-2020-25284": { + "cmt_msg": "rbd: require global CAP_SYS_ADMIN for mapping and unmapping", + "cmt_id": "81f5de838b82144fb336a71b697d28ceefc5aead" }, - "CVE-2015-7884": { - "cmt_msg": "media/vivid-osd: fix info leak in ioctl", - "cmt_id": "42debcb0815cfdf8c1a5e5c40eb71f6c2547c432" + "CVE-2020-14390": { + "cmt_msg": "fbcon: remove soft scrollback code", + "cmt_id": "245a228891e3627e47921db1ec1b6612f118158b" }, - "CVE-2016-2543": { - "cmt_msg": "ALSA: seq: Fix missing NULL check at remove_events ioctl", - "cmt_id": "6f54677f06bf3fd3c3f327d14ded94a0330d8d0c" + "CVE-2020-28097": { + "cmt_msg": "vgacon: remove software scrollback support", + "cmt_id": "20782abbbdfe922496a28f9cc0c3c0030f7dfb8f" }, - "CVE-2013-4312": { - "cmt_msg": "unix: properly account for FDs passed over unix sockets", - "cmt_id": "9b8b611fe0f86f07a4ff4a5f3bcb0ea7ceb7da3b" + "CVE-2020-36312": { + "cmt_msg": "KVM: fix memory leak in kvm_io_bus_unregister_dev()", + "cmt_id": "68c125324b5e1d1d22805653735442923d896a1d" + } + }, + "5.8.12": { + "CVE-2020-25645": { + "cmt_msg": "geneve: add transport ports in route lookup for geneve", + "cmt_id": "e76c0f41d7b1951ef4161e079c832c2e904fd29f" }, - "CVE-2016-2549": { - "cmt_msg": "ALSA: hrtimer: Fix stall by hrtimer_cancel()", - "cmt_id": "5d10aae7acaf91cdc6fdd5a3d4506af5f6ec957c" + "CVE-2020-25643": { + "cmt_msg": "hdlc_ppp: add range checks in ppp_cp_parse_cr()", + "cmt_id": "6070a0f58d95a13234fecae40424c6978ec09ef6" + } + }, + "5.8.13": { + "CVE-2020-25211": { + "cmt_msg": "netfilter: ctnetlink: add a range check for l3/l4 protonum", + "cmt_id": "24c4f2ae019bfcd2a82783e07c2894a519eb1050" }, - "CVE-2016-2548": { - "cmt_msg": "ALSA: timer: Harden slave timer list handling", - "cmt_id": "ea7f3d59628930dc29482a292e2a55c81cac52a4" + "CVE-2021-0448": { + "cmt_msg": "netfilter: ctnetlink: add a range check for l3/l4 protonum", + "cmt_id": "24c4f2ae019bfcd2a82783e07c2894a519eb1050" } }, - "4.3.6": { - "CVE-2016-2782": { - "cmt_msg": "USB: visor: fix null-deref at probe", - "cmt_id": "52827582844e0a6b951875e64d799e68ed4cceb7" + "5.8.14": { + "CVE-2021-39634": { + "cmt_msg": "epoll: do not insert into poll queues until all sanity checks are done", + "cmt_id": "bdb43b31e65d418008a7f6718bbd2ca5ee04669a" + } + }, + "5.8.15": { + "CVE-2020-27194": { + "cmt_msg": "bpf: Fix scalar32_min_max_or bounds tracking", + "cmt_id": "fc5b5ae8ac3cf955bebd0c219a93219bf9c3f4a2" }, - "CVE-2016-2384": { - "cmt_msg": "ALSA: usb-audio: avoid freeing umidi object twice", - "cmt_id": "2009976a54a59d22521380100747a02a85c12a81" + "CVE-2020-28915": { + "cmt_msg": "fbcon: Fix global-out-of-bounds read in fbcon_get_font()", + "cmt_id": "e57db2fee8b123b180b7829e1edf17311877b86b" + } + }, + "5.8.16": { + "CVE-2020-12352": { + "cmt_msg": "Bluetooth: A2MP: Fix not initializing all members", + "cmt_id": "a350bfd9a93fd1b3d1707bf1d1db3cfb823a8d10" }, - "CVE-2016-2085": { - "cmt_msg": "EVM: Use crypto_memneq() for digest comparisons", - "cmt_id": "310e1b339cbc72c5cf1055c14ce942393bde189a" + "CVE-2020-12351": { + "cmt_msg": "Bluetooth: L2CAP: Fix calling sk_filter on non-socket based channel", + "cmt_id": "ffddc73458e83e015f47e5e92c880fd54be27f95" + } + }, + "5.8.17": { + "CVE-2020-14351": { + "cmt_msg": "perf/core: Fix race in the perf_mmap_close() function", + "cmt_id": "ff57d46f868e5e7d302c741212f394732c835432" }, - "CVE-2016-8646": { - "cmt_msg": "crypto: algif_hash - Only export and import on sockets with data", - "cmt_id": "d4f9756c6ad78cbb728549e1e0dd7afafd8069a6" + "CVE-2020-27152": { + "cmt_msg": "KVM: ioapic: break infinite recursion on lazy EOI", + "cmt_id": "990c91c323f3df86e523bfd4664d97e2680e8294" }, - "CVE-2016-0723": { - "cmt_msg": "tty: Fix unsafe ldisc reference via ioctl(TIOCGETD)", - "cmt_id": "459cd75bada64e377cdeb92f1f76f8c474e73e46" + "CVE-2020-27784": { + "cmt_msg": "usb: gadget: function: printer: fix use-after-free in __lock_acquire", + "cmt_id": "34f026263889e2827e04acdc3a0eb9ecbd191ef0" }, - "CVE-2017-13215": { - "cmt_msg": "crypto: algif_skcipher - Load TX SG list after waiting", - "cmt_id": "7420844c60979fe94b2a6fb1b1b5ee2147fbe71b" + "CVE-2020-0423": { + "cmt_msg": "binder: fix UAF when releasing todo list", + "cmt_id": "40d4418ea4db2ee8dcdfad9a826376e0cc9ce53f" }, - "CVE-2017-13167": { - "cmt_msg": "ALSA: timer: Fix race at concurrent reads", - "cmt_id": "975d3f3449f53f9caf9f52ea9669bf7cb93e07e5" + "CVE-2020-25705": { + "cmt_msg": "icmp: randomize the global rate limiter", + "cmt_id": "ec5c9273f73160a7569896f8bf6af8cdae6fdb93" + } + }, + "5.8.18": { + "CVE-2021-20194": { + "cmt_msg": "io_uring: don't rely on weak ->files references", + "cmt_id": "511abceaf0a00cb75f13bdc78f210a7b015e0478" }, - "CVE-2015-7566": { - "cmt_msg": "USB: serial: visor: fix crash on detecting device without write_urbs", - "cmt_id": "ac4589db9b4285b662456715a4c07110bc37370e" + "CVE-2020-29534": { + "cmt_msg": "io_uring: don't rely on weak ->files references", + "cmt_id": "511abceaf0a00cb75f13bdc78f210a7b015e0478" }, - "CVE-2015-8970": { - "cmt_msg": "crypto: algif_skcipher - Require setkey before accept(2)", - "cmt_id": "ca3b842758312a5a3d7e1dc21ab451f03912cc27" + "CVE-2021-20226": { + "cmt_msg": "io_uring: don't rely on weak ->files references", + "cmt_id": "511abceaf0a00cb75f13bdc78f210a7b015e0478" } }, "outstanding": { - "CVE-2017-5897": { - "cmt_msg": "ip6_gre: fix ip6gre_err() invalid reads" + "CVE-2020-36322": { + "cmt_msg": "fuse: fix bad inode" }, - "CVE-2020-10711": { - "cmt_msg": "netlabel: cope with NULL catmap" + "CVE-2023-30772": { + "cmt_msg": "power: supply: da9150: Fix use after free bug in da9150_charger_remove due to race condition" }, "CVE-2020-35508": { "cmt_msg": "fork: fix copy_process(CLONE_PARENT) race with the exiting ->real_parent" }, - "CVE-2019-14896": { - "cmt_msg": "libertas: Fix two buffer overflows at parsing bss descriptor" - }, "CVE-2022-3649": { "cmt_msg": "nilfs2: fix use-after-free bug of struct nilfs_root" }, "CVE-2020-35501": { "cmt_msg": "" }, - "CVE-2019-15098": { - "cmt_msg": "ath6kl: fix a NULL-ptr-deref bug in ath6kl_usb_alloc_urb_from_pipe()" + "CVE-2023-6176": { + "cmt_msg": "net/tls: do not free tls_rec on async operation in bpf_exec_tx_verdict()" }, "CVE-2021-45095": { "cmt_msg": "phonet: refcount leak in pep_sock_accep" }, - "CVE-2017-17806": { - "cmt_msg": "crypto: hmac - require that the underlying hash algorithm is unkeyed" - }, - "CVE-2023-3611": { - "cmt_msg": "net/sched: sch_qfq: account for stab overhead in qfq_enqueue" - }, "CVE-2022-0001": { "cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE" }, - "CVE-2020-12464": { - "cmt_msg": "USB: core: Fix free-while-in-use bug in the USB S-Glibrary" + "CVE-2023-2248": { + "cmt_msg": "net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg" }, - "CVE-2017-10662": { - "cmt_msg": "f2fs: sanity check segment count" + "CVE-2022-0002": { + "cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE" }, - "CVE-2019-19965": { - "cmt_msg": "scsi: libsas: stop discovering if oob mode is disconnected" + "CVE-2021-3752": { + "cmt_msg": "Bluetooth: fix use-after-free error in lock_sock_nested()" }, - "CVE-2016-9793": { - "cmt_msg": "net: avoid signed overflows for SO_{SND|RCV}BUFFORCE" + "CVE-2024-26685": { + "cmt_msg": "nilfs2: fix potential bug in end_buffer_async_write" }, - "CVE-2017-15102": { - "cmt_msg": "usb: misc: legousbtower: Fix NULL pointer deference" + "CVE-2023-52615": { + "cmt_msg": "hwrng: core - Fix page fault dead lock on mmap-ed hwrng" }, - "CVE-2016-9794": { - "cmt_msg": "ALSA: pcm : Call kill_fasync() in stream lock" + "CVE-2023-52614": { + "cmt_msg": "PM / devfreq: Fix buffer overflow in trans_stat_show" }, - "CVE-2022-1184": { - "cmt_msg": "ext4: verify dir block before splitting it" + "CVE-2023-52617": { + "cmt_msg": "PCI: switchtec: Fix stdev_release() crash after surprise hot remove" }, "CVE-2020-24587": { "cmt_msg": "mac80211: prevent mixed key and fragment cache attacks" @@ -87698,50 +119752,41 @@ "CVE-2020-24586": { "cmt_msg": "mac80211: prevent mixed key and fragment cache attacks" }, - "CVE-2017-6074": { - "cmt_msg": "dccp: fix freeing skb too early for IPV6_RECVPKTINFO" + "CVE-2022-0995": { + "cmt_msg": "watch_queue: Fix filter limit check" }, - "CVE-2023-6270": { - "cmt_msg": "" + "CVE-2023-52612": { + "cmt_msg": "crypto: scomp - fix req->dst buffer overflow" }, - "CVE-2016-3955": { - "cmt_msg": "USB: usbip: fix potential out-of-bounds write" + "CVE-2022-3105": { + "cmt_msg": "RDMA/uverbs: Check for null return of kmalloc_array" }, - "CVE-2022-3642": { - "cmt_msg": "" + "CVE-2022-3104": { + "cmt_msg": "lkdtm/bugs: Check for the NULL pointer after calling kmalloc" }, "CVE-2021-0129": { "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical" }, - "CVE-2019-20096": { - "cmt_msg": "dccp: Fix memleak in __feat_register_sp" - }, - "CVE-2016-3951": { - "cmt_msg": "cdc_ncm: do not call usbnet_link_change from cdc_ncm_bind" + "CVE-2020-24588": { + "cmt_msg": "cfg80211: mitigate A-MSDU aggregation attacks" }, - "CVE-2023-42755": { - "cmt_msg": "net/sched: Retire rsvp classifier" + "CVE-2022-47520": { + "cmt_msg": "wifi: wilc1000: validate pairwise and authentication suite offsets" }, - "CVE-2016-10044": { - "cmt_msg": "aio: mark AIO pseudo-fs noexec" + "CVE-2022-47521": { + "cmt_msg": "wifi: wilc1000: validate length of IEEE80211_P2P_ATTR_CHANNEL_LIST attribute" }, - "CVE-2022-3643": { - "cmt_msg": "xen/netback: Ensure protocol headers don't fall in the non-linear area" + "CVE-2023-5717": { + "cmt_msg": "perf: Disallow mis-matched inherited group reads" }, - "CVE-2018-10940": { - "cmt_msg": "cdrom: information leak in cdrom_ioctl_media_changed()" + "CVE-2021-3444": { + "cmt_msg": "bpf: Fix truncation handling for mod32 dst reg wrt zero" }, "CVE-2022-32250": { "cmt_msg": "netfilter: nf_tables: disallow non-stateful expression in sets earlier" }, - "CVE-2018-10087": { - "cmt_msg": "kernel/exit.c: avoid undefined behaviour when calling wait4()" - }, - "CVE-2019-9503": { - "cmt_msg": "brcmfmac: add subtype check for event handling in data path" - }, - "CVE-2018-6555": { - "cmt_msg": "staging: irda: remove the irda network stack and drivers" + "CVE-2020-36158": { + "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_cmd_802_11_ad_hoc_start" }, "CVE-2023-3159": { "cmt_msg": "firewire: fix potential uaf in outbound_phy_packet_callback()" @@ -87749,8 +119794,8 @@ "CVE-2022-0480": { "cmt_msg": "memcg: enable accounting for file lock caches" }, - "CVE-2018-10124": { - "cmt_msg": "kernel/signal.c: avoid undefined behaviour in kill_something_info" + "CVE-2023-4273": { + "cmt_msg": "exfat: check if filename entries exceeds max filename length" }, "CVE-2022-0487": { "cmt_msg": "moxart: fix potential use-after-free on remove path" @@ -87758,83 +119803,98 @@ "CVE-2023-52429": { "cmt_msg": "dm: limit the number of targets and parameter size area" }, - "CVE-2021-28964": { - "cmt_msg": "btrfs: fix race when cloning extent buffer during rewind of an old root" - }, - "CVE-2016-6828": { - "cmt_msg": "tcp: fix use after free in tcp_xmit_retransmit_queue()" - }, - "CVE-2021-0920": { - "cmt_msg": "af_unix: fix garbage collect vs MSG_PEEK" + "CVE-2022-42703": { + "cmt_msg": "mm/rmap: Fix anon_vma->degree ambiguity leading to double-reuse" }, - "CVE-2018-17182": { - "cmt_msg": "mm: get rid of vmacache_flush_all() entirely" + "CVE-2021-47059": { + "cmt_msg": "crypto: sun8i-ss - fix result memory leak on error path" }, - "CVE-2023-1249": { - "cmt_msg": "coredump: Use the vma snapshot in fill_files_note" + "CVE-2024-26595": { + "cmt_msg": "mlxsw: spectrum_acl_tcam: Fix NULL pointer dereference in error path" }, "CVE-2022-23825": { "cmt_msg": "" }, - "CVE-2022-1974": { - "cmt_msg": "nfc: replace improper check device_is_registered() in netlink related functions" + "CVE-2021-42252": { + "cmt_msg": "soc: aspeed: lpc-ctrl: Fix boundary check for mmap" + }, + "CVE-2021-47051": { + "cmt_msg": "spi: fsl-lpspi: Fix PM reference leak in lpspi_prepare_xfer_hardware()" + }, + "CVE-2023-0179": { + "cmt_msg": "netfilter: nft_payload: incorrect arithmetics when fetching VLAN header bits" + }, + "CVE-2021-47056": { + "cmt_msg": "crypto: qat - ADF_STATUS_PF_RUNNING should be set after adf_dev_init" + }, + "CVE-2021-47054": { + "cmt_msg": "bus: qcom: Put child node before return" + }, + "CVE-2021-47112": { + "cmt_msg": "x86/kvm: Teardown PV features on boot CPU as well" + }, + "CVE-2021-47113": { + "cmt_msg": "btrfs: abort in rename_exchange if we fail to insert the second ref" + }, + "CVE-2021-47110": { + "cmt_msg": "x86/kvm: Disable kvmclock on all CPUs on shutdown" + }, + "CVE-2021-47111": { + "cmt_msg": "xen-netback: take a reference to the RX task thread" + }, + "CVE-2021-47116": { + "cmt_msg": "ext4: fix memory leak in ext4_mb_init_backend on error path." }, - "CVE-2019-13631": { - "cmt_msg": "Input: gtco - bounds check collection indent level" + "CVE-2021-47117": { + "cmt_msg": "ext4: fix bug on in ext4_es_cache_extent as ext4_split_extent_at failed" }, - "CVE-2022-23816": { - "cmt_msg": "x86/kvm/vmx: Make noinstr clean" + "CVE-2021-47114": { + "cmt_msg": "ocfs2: fix data corruption by fallocate" }, - "CVE-2017-7374": { - "cmt_msg": "fscrypt: remove broken support for detecting keyring key revocation" + "CVE-2021-46973": { + "cmt_msg": "net: qrtr: Avoid potential use after free in MHI send" }, - "CVE-2024-26588": { - "cmt_msg": "LoongArch: BPF: Prevent out-of-bounds memory access" + "CVE-2021-46972": { + "cmt_msg": "ovl: fix leaked dentry" }, - "CVE-2023-2162": { - "cmt_msg": "scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress" + "CVE-2021-46971": { + "cmt_msg": "perf/core: Fix unconditional security_locked_down() call" }, - "CVE-2017-5551": { - "cmt_msg": "tmpfs: clear S_ISGID when setting posix ACLs" + "CVE-2021-46970": { + "cmt_msg": "bus: mhi: pci_generic: Remove WQ_MEM_RECLAIM flag from state workqueue" }, - "CVE-2019-19241": { - "cmt_msg": "io_uring: async workers should inherit the user creds" + "CVE-2021-46977": { + "cmt_msg": "KVM: VMX: Disable preemption when probing user return MSRs" }, - "CVE-2022-21123": { - "cmt_msg": "x86/speculation/mmio: Add mitigation for Processor MMIO Stale Data" + "CVE-2021-46976": { + "cmt_msg": "drm/i915: Fix crash in auto_retire" }, - "CVE-2023-3390": { - "cmt_msg": "netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE" + "CVE-2022-40307": { + "cmt_msg": "efi: capsule-loader: Fix use-after-free in efi_capsule_write" + }, + "CVE-2021-46974": { + "cmt_msg": "bpf: Fix masking negation logic upon negative dst register" }, "CVE-2021-28688": { "cmt_msg": "xen-blkback: don't leak persistent grants from xen_blkbk_map()" }, + "CVE-2024-26673": { + "cmt_msg": "netfilter: nft_ct: sanitize layer 3 and 4 protocol number in custom expectations" + }, "CVE-2021-39686": { "cmt_msg": "binder: use euid from cred instead of using task" }, "CVE-2021-39685": { "cmt_msg": "USB: gadget: detect too-big endpoint 0 requests" }, - "CVE-2023-6535": { - "cmt_msg": "" - }, "CVE-2021-43975": { "cmt_msg": "atlantic: Fix OOB read and write in hw_atl_utils_fw_rpc_wait" }, - "CVE-2018-6927": { - "cmt_msg": "futex: Prevent overflow by strengthen input validation" - }, - "CVE-2020-0466": { - "cmt_msg": "do_epoll_ctl(): clean the failure exits up a bit" - }, - "CVE-2019-10207": { - "cmt_msg": "Bluetooth: hci_uart: check for missing tty operations" - }, - "CVE-2023-1073": { - "cmt_msg": "HID: check empty report_list in hid_validate_values()" + "CVE-2021-43976": { + "cmt_msg": "mwifiex: Fix skb_over_panic in mwifiex_usb_recv()" }, - "CVE-2019-14835": { - "cmt_msg": "vhost: make sure log_num < in_num" + "CVE-2024-26774": { + "cmt_msg": "ext4: avoid dividing by 0 in mb_update_avg_fragment_size() when block bitmap corrupt" }, "CVE-2023-0459": { "cmt_msg": "uaccess: Add speculation barrier to copy_from_user()" @@ -87842,56 +119902,41 @@ "CVE-2023-0458": { "cmt_msg": "prlimit: do_prlimit needs to have a speculation check" }, - "CVE-2018-1000204": { - "cmt_msg": "scsi: sg: allocate with __GFP_ZERO in sg_build_indirect()" - }, - "CVE-2017-8924": { - "cmt_msg": "USB: serial: io_ti: fix information leak in completion handler" - }, - "CVE-2017-8925": { - "cmt_msg": "USB: serial: omninet: fix reference leaks at open" - }, - "CVE-2019-12379": { - "cmt_msg": "consolemap: Fix a memory leaking bug in drivers/tty/vt/consolemap.c" - }, - "CVE-2017-12134": { - "cmt_msg": "xen: fix bio vec merging" + "CVE-2022-2078": { + "cmt_msg": "netfilter: nf_tables: sanitize nft_set_desc_concat_parse()" }, "CVE-2023-0597": { "cmt_msg": "x86/mm: Randomize per-cpu entry area" }, - "CVE-2021-30002": { - "cmt_msg": "media: v4l: ioctl: Fix memory leak in video_usercopy" + "CVE-2021-3669": { + "cmt_msg": "ipc: replace costly bailout check in sysvipc_find_ipc()" }, - "CVE-2017-17450": { - "cmt_msg": "netfilter: xt_osf: Add missing permission checks" + "CVE-2021-3744": { + "cmt_msg": "crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd()" }, - "CVE-2015-8551": { - "cmt_msg": "xen/pciback: Return error on XEN_PCI_OP_enable_msi when device has MSI or MSI-X enabled" + "CVE-2021-30002": { + "cmt_msg": "media: v4l: ioctl: Fix memory leak in video_usercopy" }, - "CVE-2015-8550": { - "cmt_msg": "xen: Add RING_COPY_REQUEST()" + "CVE-2021-3743": { + "cmt_msg": "net: qrtr: fix OOB Read in qrtr_endpoint_post" }, - "CVE-2016-3672": { - "cmt_msg": "x86/mm/32: Enable full randomization on i386 and X86_32" + "CVE-2021-0941": { + "cmt_msg": "bpf: Remove MTU check in __bpf_skb_max_len" }, - "CVE-2015-8552": { - "cmt_msg": "xen/pciback: Return error on XEN_PCI_OP_enable_msi when device has MSI or MSI-X enabled" + "CVE-2022-3628": { + "cmt_msg": "wifi: brcmfmac: Fix potential buffer overflow in brcmf_fweh_event_worker()" }, "CVE-2020-15802": { "cmt_msg": "" }, - "CVE-2022-3522": { - "cmt_msg": "mm/hugetlb: use hugetlb_pte_stable in migration race check" + "CVE-2024-26597": { + "cmt_msg": "net: qualcomm: rmnet: fix global oob in rmnet_policy" }, "CVE-2024-26594": { "cmt_msg": "ksmbd: validate mech token in session setup" }, - "CVE-2022-3629": { - "cmt_msg": "vsock: Fix memory leak in vsock_connect()" - }, - "CVE-2017-18270": { - "cmt_msg": "KEYS: prevent creating a different user's keyrings" + "CVE-2023-2483": { + "cmt_msg": "net: qcom/emac: Fix use after free bug in emac_remove due to race condition" }, "CVE-2022-3636": { "cmt_msg": "net: ethernet: mtk_eth_soc: use after free in __mtk_ppe_check_skb()" @@ -87899,146 +119944,143 @@ "CVE-2022-3635": { "cmt_msg": "atm: idt77252: fix use-after-free bugs caused by tst_timer" }, - "CVE-2022-0002": { - "cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE" + "CVE-2022-3633": { + "cmt_msg": "can: j1939: j1939_session_destroy(): fix memory leak of skbs" }, "CVE-2021-34556": { "cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4" }, - "CVE-2020-0543": { - "cmt_msg": "x86/cpu: Add 'table' argument to cpu_matches()" + "CVE-2022-34918": { + "cmt_msg": "netfilter: nf_tables: stricter validation of element data" }, "CVE-2022-40982": { "cmt_msg": "x86/speculation: Add Gather Data Sampling mitigation" }, - "CVE-2016-10906": { - "cmt_msg": "net: arc_emac: fix koops caused by sk_buff free" + "CVE-2024-26735": { + "cmt_msg": "ipv6: sr: fix possible use-after-free and null-ptr-deref" }, - "CVE-2016-10905": { - "cmt_msg": "GFS2: don't set rgrp gl_object until it's inserted into rgrp tree" + "CVE-2022-2585": { + "cmt_msg": "posix-cpu-timers: Cleanup CPU timers before freeing them during exec" }, - "CVE-2016-6480": { - "cmt_msg": "aacraid: Check size values after double-fetch from user" + "CVE-2022-3202": { + "cmt_msg": "jfs: prevent NULL deref in diFree" }, - "CVE-2022-23039": { - "cmt_msg": "xen/gntalloc: don't use gnttab_query_foreign_access()" + "CVE-2024-25739": { + "cmt_msg": "" }, - "CVE-2018-3646": { - "cmt_msg": "x86/microcode: Allow late microcode loading with SMT disabled" + "CVE-2021-47028": { + "cmt_msg": "mt76: mt7915: fix txrate reporting" }, - "CVE-2017-7518": { - "cmt_msg": "KVM: x86: fix singlestepping over syscall" + "CVE-2022-2602": { + "cmt_msg": "io_uring/af_unix: defer registered files gc to io_uring release" }, - "CVE-2021-28712": { - "cmt_msg": "xen/netfront: harden netfront against event channel storms" + "CVE-2021-47026": { + "cmt_msg": "RDMA/rtrs-clt: destroy sysfs after removing session from active list" }, - "CVE-2024-24861": { - "cmt_msg": "" + "CVE-2024-26585": { + "cmt_msg": "tls: fix race between tx work scheduling and socket close" }, - "CVE-2018-10938": { - "cmt_msg": "Cipso: cipso_v4_optptr enter infinite loop" + "CVE-2021-47024": { + "cmt_msg": "vsock/virtio: free queued packets when closing socket" }, - "CVE-2022-28388": { - "cmt_msg": "can: usb_8dev: usb_8dev_start_xmit(): fix double dev_kfree_skb() in error path" + "CVE-2023-52511": { + "cmt_msg": "spi: sun6i: reduce DMA RX transfer width to single byte" }, - "CVE-2019-19966": { - "cmt_msg": "media: cpia2: Fix use-after-free in cpia2_exit" + "CVE-2024-26759": { + "cmt_msg": "mm/swap: fix race when skipping swapcache" }, - "CVE-2019-11477": { - "cmt_msg": "tcp: limit payload size of sacked skbs" + "CVE-2021-47020": { + "cmt_msg": "soundwire: stream: fix memory leak in stream config error path" }, - "CVE-2021-28711": { - "cmt_msg": "xen/blkfront: harden blkfront against event channel storms" + "CVE-2023-4881": { + "cmt_msg": "netfilter: nftables: exthdr: fix 4-byte stack OOB write" }, - "CVE-2016-4578": { - "cmt_msg": "ALSA: timer: Fix leak in events via snd_timer_user_ccallback" + "CVE-2023-2008": { + "cmt_msg": "udmabuf: add back sanity check" }, - "CVE-2018-14614": { - "cmt_msg": "f2fs: fix to do sanity check with cp_pack_start_sum" + "CVE-2021-46908": { + "cmt_msg": "bpf: Use correct permission flag for mixed signed bounds arithmetic" }, - "CVE-2018-14617": { - "cmt_msg": "hfsplus: fix NULL dereference in hfsplus_lookup()" + "CVE-2021-46909": { + "cmt_msg": "ARM: footbridge: fix PCI interrupt mapping" }, - "CVE-2018-14616": { - "cmt_msg": "f2fs: fix to do sanity check with block address in main area v2" + "CVE-2021-46906": { + "cmt_msg": "HID: usbhid: fix info leak in hid_submit_ctrl" }, - "CVE-2018-14611": { - "cmt_msg": "btrfs: validate type when reading a chunk" + "CVE-2021-46904": { + "cmt_msg": "net: hso: fix null-ptr-deref during tty device unregistration" }, - "CVE-2018-14610": { - "cmt_msg": "btrfs: Check that each block group has corresponding chunk at mount time" + "CVE-2022-1247": { + "cmt_msg": "" }, - "CVE-2018-14613": { - "cmt_msg": "btrfs: tree-checker: Verify block_group_item" + "CVE-2023-28410": { + "cmt_msg": "drm/i915/gem: add missing boundary check in vm_access" }, - "CVE-2018-14612": { - "cmt_msg": "btrfs: tree-checker: Detect invalid and empty essential trees" + "CVE-2023-2007": { + "cmt_msg": "scsi: dpt_i2o: Remove obsolete driver" }, "CVE-2020-26145": { "cmt_msg": "ath10k: drop fragments with multicast DA for PCIe" }, - "CVE-2017-13216": { - "cmt_msg": "staging: android: ashmem: fix a race condition in ASHMEM_SET_SIZE ioctl" + "CVE-2023-51782": { + "cmt_msg": "net/rose: Fix Use-After-Free in rose_ioctl" }, "CVE-2020-26147": { "cmt_msg": "mac80211: assure all fragments are encrypted" }, - "CVE-2018-5814": { - "cmt_msg": "usbip: usbip_host: fix NULL-ptr deref and use-after-free errors" + "CVE-2020-26141": { + "cmt_msg": "ath10k: Fix TKIP Michael MIC verification for PCIe" }, "CVE-2020-26140": { "cmt_msg": "" }, - "CVE-2020-26143": { - "cmt_msg": "" + "CVE-2021-43389": { + "cmt_msg": "isdn: cpai: check ctr->cnr to avoid array index out of bound" }, "CVE-2020-26142": { "cmt_msg": "" }, - "CVE-2019-17053": { - "cmt_msg": "ieee802154: enforce CAP_NET_RAW for raw sockets" + "CVE-2023-1074": { + "cmt_msg": "sctp: fail if no bound addresses can be used for a given scope" }, - "CVE-2019-17052": { - "cmt_msg": "ax25: enforce CAP_NET_RAW for raw sockets" + "CVE-2023-1075": { + "cmt_msg": "net/tls: tls_is_tx_ready() checked list_entry" }, - "CVE-2016-3070": { - "cmt_msg": "mm: migrate dirty page without clear_page_dirty_for_io etc" + "CVE-2023-1076": { + "cmt_msg": "tun: tun_chr_open(): correctly initialize socket uid" }, "CVE-2023-1077": { "cmt_msg": "sched/rt: pick_next_rt_entity(): check list_entry" }, - "CVE-2020-27418": { - "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region" - }, - "CVE-2017-16911": { - "cmt_msg": "usbip: prevent vhci_hcd driver from leaking a socket pointer address" + "CVE-2023-46838": { + "cmt_msg": "xen-netback: don't produce zero-size SKB frags" }, - "CVE-2019-17055": { - "cmt_msg": "mISDN: enforce CAP_NET_RAW for raw sockets" + "CVE-2022-2959": { + "cmt_msg": "pipe: Fix missing lock in pipe_resize_ring()" }, - "CVE-2019-17054": { - "cmt_msg": "appletalk: enforce CAP_NET_RAW for raw sockets" + "CVE-2023-40283": { + "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb" }, - "CVE-2018-13093": { - "cmt_msg": "xfs: validate cached inodes are free when allocated" + "CVE-2023-1073": { + "cmt_msg": "HID: check empty report_list in hid_validate_values()" }, - "CVE-2017-2618": { - "cmt_msg": "selinux: fix off-by-one in setprocattr" + "CVE-2024-26747": { + "cmt_msg": "usb: roles: fix NULL pointer issue when put module's reference" }, - "CVE-2023-51781": { - "cmt_msg": "appletalk: Fix Use-After-Free in atalk_ioctl" + "CVE-2024-26745": { + "cmt_msg": "powerpc/pseries/iommu: IOMMU table is not initialized for kdump over SR-IOV" }, - "CVE-2018-13096": { - "cmt_msg": "f2fs: fix to do sanity check with node footer and iblocks" + "CVE-2023-51042": { + "cmt_msg": "drm/amdgpu: Fix potential fence use-after-free v2" }, - "CVE-2018-13097": { - "cmt_msg": "f2fs: fix to do sanity check with user_block_count" + "CVE-2024-26743": { + "cmt_msg": "RDMA/qedr: Fix qedr_create_user_qp error flow" }, - "CVE-2018-13094": { - "cmt_msg": "xfs: don't call xfs_da_shrink_inode with NULL bp" + "CVE-2023-52566": { + "cmt_msg": "nilfs2: fix potential use after free in nilfs_gccache_submit_read_data()" }, - "CVE-2018-13095": { - "cmt_msg": "xfs: More robust inode extent count validation" + "CVE-2024-26740": { + "cmt_msg": "net/sched: act_mirred: use the backlog for mirred ingress" }, "CVE-2020-29661": { "cmt_msg": "tty: Fix ->pgrp locking in tiocspgrp()" @@ -88046,59 +120088,56 @@ "CVE-2020-29660": { "cmt_msg": "tty: Fix ->session locking" }, - "CVE-2018-13098": { - "cmt_msg": "f2fs: fix to do sanity check with extra_attr feature" + "CVE-2022-42432": { + "cmt_msg": "netfilter: nfnetlink_osf: fix possible bogus match in nf_osf_find()" }, - "CVE-2018-13099": { - "cmt_msg": "f2fs: fix to do sanity check with reserved blkaddr of inline inode" + "CVE-2022-1734": { + "cmt_msg": "nfc: nfcmrvl: main: reorder destructive operations in nfcmrvl_nci_unregister_dev to avoid bugs" }, - "CVE-2021-38300": { - "cmt_msg": "bpf, mips: Validate conditional branch offsets" + "CVE-2024-26749": { + "cmt_msg": "usb: cdns3: fixed memory use after free at cdns3_gadget_ep_disable()" + }, + "CVE-2022-3625": { + "cmt_msg": "devlink: Fix use-after-free after a failed reload" }, "CVE-2023-28772": { "cmt_msg": "seq_buf: Fix overflow in seq_buf_putmem_hex()" }, - "CVE-2019-14895": { - "cmt_msg": "mwifiex: fix possible heap overflow in mwifiex_process_country_ie()" - }, - "CVE-2017-17862": { - "cmt_msg": "bpf: fix branch pruning logic" - }, - "CVE-2015-8812": { - "cmt_msg": "iw_cxgb3: Fix incorrectly returning error on success" - }, - "CVE-2021-40490": { - "cmt_msg": "ext4: fix race writing to an inline_data file while its xattrs are changing" - }, - "CVE-2023-4134": { - "cmt_msg": "Input: cyttsp4_core - change del_timer_sync() to timer_shutdown_sync()" - }, - "CVE-2019-19074": { - "cmt_msg": "ath9k: release allocated buffer if timed out" + "CVE-2022-2588": { + "cmt_msg": "net_sched: cls_route: remove from list when handle is 0" }, - "CVE-2019-18683": { - "cmt_msg": "media: vivid: Fix wrong locking that causes race conditions on streaming stop" + "CVE-2022-3707": { + "cmt_msg": "drm/i915/gvt: fix double free bug in split_2MB_gtt_entry" }, "CVE-2022-2503": { "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag" }, - "CVE-2015-8952": { - "cmt_msg": "ext2: convert to mbcache2" + "CVE-2022-48619": { + "cmt_msg": "Input: add bounds checking to input_set_capability()" }, - "CVE-2016-4951": { - "cmt_msg": "tipc: check nl sock before parsing nested attributes" + "CVE-2021-32399": { + "cmt_msg": "bluetooth: eliminate the potential race condition when removing the HCI controller" }, - "CVE-2020-26558": { - "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical" + "CVE-2024-26699": { + "cmt_msg": "drm/amd/display: Fix array-index-out-of-bounds in dcn35_clkmgr" + }, + "CVE-2024-26698": { + "cmt_msg": "hv_netvsc: Fix race condition between netvsc_probe and netvsc_remove" }, "CVE-2022-23038": { "cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()" }, - "CVE-2017-1000410": { - "cmt_msg": "Bluetooth: Prevent stack info leak from the EFS element." + "CVE-2022-23039": { + "cmt_msg": "xen/gntalloc: don't use gnttab_query_foreign_access()" }, - "CVE-2016-8645": { - "cmt_msg": "tcp: take care of truncations done by sk_filter()" + "CVE-2022-20154": { + "cmt_msg": "sctp: use call_rcu to free endpoint" + }, + "CVE-2024-26691": { + "cmt_msg": "KVM: arm64: Fix circular locking dependency" + }, + "CVE-2021-45868": { + "cmt_msg": "quota: check block number when reading the block in quota file" }, "CVE-2022-20158": { "cmt_msg": "net/packet: fix slab-out-of-bounds access in packet_recvmsg()" @@ -88106,236 +120145,182 @@ "CVE-2022-23037": { "cmt_msg": "xen/netfront: don't use gnttab_query_foreign_access() for mapped status" }, - "CVE-2017-5669": { - "cmt_msg": "ipc/shm: Fix shmat mmap nil-page protection" + "CVE-2024-0564": { + "cmt_msg": "" }, - "CVE-2019-15927": { - "cmt_msg": "ALSA: usb-audio: Avoid access before bLength check in build_audio_procunit()" + "CVE-2024-0565": { + "cmt_msg": "smb: client: fix OOB in receive_encrypted_standard()" }, - "CVE-2019-15926": { - "cmt_msg": "ath6kl: add some bounds checking" + "CVE-2024-26697": { + "cmt_msg": "nilfs2: fix data corruption in dsync block recovery for small block sizes" }, - "CVE-2019-14821": { - "cmt_msg": "KVM: coalesced_mmio: add bounds checking" + "CVE-2024-26696": { + "cmt_msg": "nilfs2: fix hang in nilfs_lookup_dirty_data_buffers()" }, - "CVE-2020-12826": { - "cmt_msg": "signal: Extend exec_id to 64bits" + "CVE-2024-26633": { + "cmt_msg": "ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim()" }, - "CVE-2019-3701": { - "cmt_msg": "can: gw: ensure DLC boundaries after CAN frame modification" + "CVE-2023-2176": { + "cmt_msg": "RDMA/core: Refactor rdma_bind_addr" + }, + "CVE-2023-2177": { + "cmt_msg": "sctp: leave the err path free in sctp_stream_init to sctp_stream_free" + }, + "CVE-2021-38160": { + "cmt_msg": "virtio_console: Assure used length from device is limited" + }, + "CVE-2023-1252": { + "cmt_msg": "ovl: fix use after free in struct ovl_aio_req" }, "CVE-2021-42008": { "cmt_msg": "net: 6pack: fix slab-out-of-bounds in decode_data" }, - "CVE-2022-44033": { - "cmt_msg": "char: pcmcia: remove all the drivers" - }, - "CVE-2022-39188": { - "cmt_msg": "mmu_gather: Force tlb-flush VM_PFNMAP vmas" + "CVE-2022-3107": { + "cmt_msg": "hv_netvsc: Add check for kvmalloc_array" }, - "CVE-2018-9465": { - "cmt_msg": "binder: fix proc->files use-after-free" + "CVE-2022-39189": { + "cmt_msg": "KVM: x86: do not report a vCPU as preempted outside instruction boundaries" }, - "CVE-2019-1125": { - "cmt_msg": "x86/speculation: Prepare entry code for Spectre v1 swapgs mitigations" + "CVE-2021-38166": { + "cmt_msg": "bpf: Fix integer overflow involving bucket_size" }, - "CVE-2019-15218": { - "cmt_msg": "media: usb: siano: Fix general protection fault in smsusb" + "CVE-2021-3490": { + "cmt_msg": "bpf: Fix alu32 const subreg bound tracking on bitwise operations" }, - "CVE-2019-15666": { - "cmt_msg": "xfrm: policy: Fix out-of-bound array accesses in __xfrm_policy_unlink" + "CVE-2021-3491": { + "cmt_msg": "io_uring: truncate lengths larger than MAX_RW_COUNT on provide buffers" }, "CVE-2005-3660": { "cmt_msg": "" }, - "CVE-2017-14106": { - "cmt_msg": "tcp: initialize rcv_mss to TCP_MIN_MSS instead of 0" - }, - "CVE-2019-15212": { - "cmt_msg": "USB: rio500: refuse more than one device at a time" + "CVE-2022-0516": { + "cmt_msg": "KVM: s390: Return error on SIDA memop on normal guest" }, - "CVE-2019-15211": { - "cmt_msg": "media: radio-raremono: change devm_k*alloc to k*alloc" + "CVE-2023-31085": { + "cmt_msg": "ubi: Refuse attaching if mtd's erasesize is 0" }, - "CVE-2023-1095": { - "cmt_msg": "netfilter: nf_tables: fix null deref due to zeroed list head" + "CVE-2023-31084": { + "cmt_msg": "media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*()" }, - "CVE-2015-1350": { - "cmt_msg": "fs: Avoid premature clearing of capabilities" + "CVE-2023-31083": { + "cmt_msg": "Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO" }, - "CVE-2016-1237": { - "cmt_msg": "posix_acl: Add set_posix_acl" + "CVE-2023-31082": { + "cmt_msg": "" }, - "CVE-2017-1000380": { - "cmt_msg": "ALSA: timer: Fix race between read and ioctl" + "CVE-2023-31081": { + "cmt_msg": "" }, - "CVE-2019-15214": { - "cmt_msg": "ALSA: core: Fix card races between register and disconnect" + "CVE-2023-52618": { + "cmt_msg": "block/rnbd-srv: Check for unlikely string overflow" }, - "CVE-2020-24588": { - "cmt_msg": "cfg80211: mitigate A-MSDU aggregation attacks" + "CVE-2023-52574": { + "cmt_msg": "team: fix null-ptr-deref when team device type is changed" }, "CVE-2021-33034": { "cmt_msg": "Bluetooth: verify AMP hci_chan before amp_destroy" }, - "CVE-2015-1339": { - "cmt_msg": "cuse: fix memory leak" - }, - "CVE-2022-41850": { - "cmt_msg": "HID: roccat: Fix use-after-free in roccat_read()" - }, - "CVE-2019-19927": { - "cmt_msg": "drm/ttm: fix incrementing the page pointer for huge pages" - }, - "CVE-2017-18509": { - "cmt_msg": "ipv6: check sk sk_type and protocol early in ip_mroute_set/getsockopt" - }, - "CVE-2022-3903": { - "cmt_msg": "media: mceusb: Use new usb_control_msg_*() routines" - }, - "CVE-2017-5986": { - "cmt_msg": "sctp: avoid BUG_ON on sctp_wait_for_sndbuf" - }, - "CVE-2022-44032": { - "cmt_msg": "char: pcmcia: remove all the drivers" + "CVE-2021-33033": { + "cmt_msg": "cipso,calipso: resolve a number of problems with the DOI refcounts" }, - "CVE-2024-23307": { - "cmt_msg": "" + "CVE-2024-0646": { + "cmt_msg": "net: tls, update curr on splice as well" }, - "CVE-2016-3857": { - "cmt_msg": "arm: oabi compat: add missing access checks" + "CVE-2023-52598": { + "cmt_msg": "s390/ptrace: handle setting of fpc register correctly" }, "CVE-2022-32296": { "cmt_msg": "tcp: increase source port perturb table to 2^16" }, - "CVE-2017-11600": { - "cmt_msg": "xfrm: policy: check policy direction value" + "CVE-2024-26789": { + "cmt_msg": "crypto: arm64/neonbs - fix out-of-bounds access on short input" }, - "CVE-2023-3567": { - "cmt_msg": "vc_screen: move load of struct vc_data pointer in vcs_read() to avoid UAF" + "CVE-2020-28974": { + "cmt_msg": "vt: Disable KD_FONT_OP_COPY" }, - "CVE-2019-20806": { - "cmt_msg": "media: tw5864: Fix possible NULL pointer dereference in tw5864_handle_frame" + "CVE-2022-4543": { + "cmt_msg": "" }, "CVE-2022-3028": { "cmt_msg": "af_key: Do not call xfrm_probe_algs in parallel" }, - "CVE-2019-2181": { - "cmt_msg": "binder: check for overflow when alloc for security context" + "CVE-2023-52493": { + "cmt_msg": "bus: mhi: host: Drop chan lock before queuing buffers" + }, + "CVE-2023-52492": { + "cmt_msg": "dmaengine: fix NULL pointer in channel unregistration function" }, "CVE-2020-14304": { "cmt_msg": "" }, - "CVE-2018-17972": { - "cmt_msg": "proc: restrict kernel stack dumps to root" + "CVE-2022-2318": { + "cmt_msg": "net: rose: fix UAF bugs caused by timer handler" }, - "CVE-2020-15393": { - "cmt_msg": "usb: usbtest: fix missing kfree(dev->buf) in usbtest_disconnect" + "CVE-2023-52497": { + "cmt_msg": "erofs: fix lz4 inplace decompression" }, "CVE-2022-33981": { "cmt_msg": "floppy: disable FDRAWCMD by default" }, + "CVE-2024-26655": { + "cmt_msg": "Fix memory leak in posix_clock_open()" + }, "CVE-2021-3564": { "cmt_msg": "Bluetooth: fix the erroneous flush_work() order" }, - "CVE-2019-9506": { - "cmt_msg": "Bluetooth: Fix faulty expression for minimum encryption key size check" - }, - "CVE-2023-1476": { - "cmt_msg": "" - }, - "CVE-2017-16995": { - "cmt_msg": "bpf: fix incorrect sign extension in check_alu_op()" - }, - "CVE-2017-16994": { - "cmt_msg": "mm/pagewalk.c: report holes in hugetlb ranges" + "CVE-2023-3611": { + "cmt_msg": "net/sched: sch_qfq: account for stab overhead in qfq_enqueue" }, - "CVE-2019-2025": { - "cmt_msg": "binder: fix race that allows malicious free of live buffer" + "CVE-2023-4132": { + "cmt_msg": "media: usb: siano: Fix warning due to null work_func_t function pointer" }, - "CVE-2017-2583": { - "cmt_msg": "KVM: x86: fix emulation of \"MOV SS, null selector\"" + "CVE-2023-4133": { + "cmt_msg": "cxgb4: fix use after free bugs caused by circular dependency problem" }, "CVE-2020-26560": { "cmt_msg": "" }, - "CVE-2017-2584": { - "cmt_msg": "KVM: x86: Introduce segmented_write_std" + "CVE-2023-4134": { + "cmt_msg": "Input: cyttsp4_core - change del_timer_sync() to timer_shutdown_sync()" }, "CVE-2023-39198": { "cmt_msg": "drm/qxl: fix UAF on handle creation" }, - "CVE-2017-13080": { - "cmt_msg": "mac80211: accept key reinstall without changing anything" - }, - "CVE-2021-20321": { - "cmt_msg": "ovl: fix missing negative dentry check in ovl_rename()" - }, - "CVE-2018-12127": { - "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" - }, - "CVE-2018-12126": { - "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" - }, - "CVE-2018-7566": { - "cmt_msg": "ALSA: seq: Fix racy pool initializations" - }, - "CVE-2020-36158": { - "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_cmd_802_11_ad_hoc_start" - }, - "CVE-2017-9077": { - "cmt_msg": "ipv6/dccp: do not inherit ipv6_mc_list from parent" + "CVE-2022-0185": { + "cmt_msg": "vfs: fs_context: fix up param length parsing in legacy_parse_param" }, - "CVE-2017-9076": { - "cmt_msg": "ipv6/dccp: do not inherit ipv6_mc_list from parent" + "CVE-2023-42752": { + "cmt_msg": "igmp: limit igmpv3_newpack() packet size to IP_MAX_MTU" }, - "CVE-2017-9075": { - "cmt_msg": "sctp: do not inherit ipv6_{mc|ac|fl}_list from parent" + "CVE-2023-52601": { + "cmt_msg": "jfs: fix array-index-out-of-bounds in dbAdjTree" }, - "CVE-2017-9074": { - "cmt_msg": "ipv6: Prevent overrun when parsing v6 header options" + "CVE-2024-26751": { + "cmt_msg": "ARM: ep93xx: Add terminator to gpiod_lookup_table" }, - "CVE-2022-2978": { - "cmt_msg": "fs: fix UAF/GPF bug in nilfs_mdt_destroy" + "CVE-2023-37454": { + "cmt_msg": "" }, "CVE-2022-20572": { "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag" }, - "CVE-2018-10021": { - "cmt_msg": "scsi: libsas: defer ata device eh commands to libata" - }, - "CVE-2022-20132": { - "cmt_msg": "HID: add hid_is_usb() function to make it simpler for USB detection" - }, - "CVE-2019-2024": { - "cmt_msg": "media: em28xx: Fix use-after-free when disconnecting" + "CVE-2024-24858": { + "cmt_msg": "" }, "CVE-2023-39194": { "cmt_msg": "net: xfrm: Fix xfrm_address_filter OOB read" }, - "CVE-2020-0067": { - "cmt_msg": "f2fs: fix to avoid memory leakage in f2fs_listxattr" - }, - "CVE-2020-36691": { - "cmt_msg": "netlink: limit recursion depth in policy validation" - }, - "CVE-2019-10126": { - "cmt_msg": "mwifiex: Fix heap overflow in mwifiex_uap_parse_tail_ies()" - }, - "CVE-2023-3106": { - "cmt_msg": "xfrm: fix crash in XFRM_MSG_GETSA netlink handler" - }, - "CVE-2016-2143": { - "cmt_msg": "s390/mm: four page table levels vs. fork" + "CVE-2023-2002": { + "cmt_msg": "bluetooth: Perform careful capability checks in hci_sock_ioctl()" }, - "CVE-2020-14353": { - "cmt_msg": "KEYS: prevent creating a different user's keyrings" + "CVE-2021-28964": { + "cmt_msg": "btrfs: fix race when cloning extent buffer during rewind of an old root" }, - "CVE-2020-13974": { - "cmt_msg": "vt: keyboard: avoid signed integer overflow in k_ascii" + "CVE-2023-1829": { + "cmt_msg": "net/sched: Retire tcindex classifier" }, - "CVE-2016-6213": { - "cmt_msg": "mnt: Add a per mount namespace limit on the number of mounts" + "CVE-2021-47063": { + "cmt_msg": "drm: bridge/panel: Cleanup connector on bridge detach" }, "CVE-2021-4083": { "cmt_msg": "fget: check that the fd still exists after getting a ref to it" @@ -88343,11 +120328,8 @@ "CVE-2023-33288": { "cmt_msg": "power: supply: bq24190: Fix use after free bug in bq24190_remove due to race condition" }, - "CVE-2017-17558": { - "cmt_msg": "USB: core: prevent malicious bNumInterfaces overflow" - }, - "CVE-2017-1000251": { - "cmt_msg": "Bluetooth: Properly check L2CAP config option output buffer length" + "CVE-2023-52484": { + "cmt_msg": "iommu/arm-smmu-v3: Fix soft lockup triggered by arm_smmu_mm_invalidate_range" }, "CVE-2022-29900": { "cmt_msg": "x86/kvm/vmx: Make noinstr clean" @@ -88355,38 +120337,38 @@ "CVE-2022-29901": { "cmt_msg": "x86/kvm/vmx: Make noinstr clean" }, - "CVE-2021-4197": { - "cmt_msg": "cgroup: Use open-time credentials for process migraton perm checks" + "CVE-2023-3161": { + "cmt_msg": "fbcon: Check font dimension limits" }, - "CVE-2018-12233": { - "cmt_msg": "jfs: Fix inconsistency between memory allocation and ea_buf->max_size" + "CVE-2022-3567": { + "cmt_msg": "ipv6: Fix data races around sk->sk_prot." }, - "CVE-2019-19227": { - "cmt_msg": "appletalk: Fix potential NULL pointer dereference in unregister_snap_client" + "CVE-2023-39192": { + "cmt_msg": "netfilter: xt_u32: validate user space input" }, - "CVE-2020-10751": { - "cmt_msg": "selinux: properly handle multiple messages in selinux_netlink_send()" + "CVE-2021-47069": { + "cmt_msg": "ipc/mqueue, msg, sem: avoid relying on a stack reference past its expiry" }, - "CVE-2019-19377": { - "cmt_msg": "btrfs: Don't submit any btree write bio if the fs has errors" + "CVE-2021-46917": { + "cmt_msg": "dmaengine: idxd: fix wq cleanup of WQCFG registers" }, - "CVE-2021-4002": { - "cmt_msg": "hugetlbfs: flush TLBs correctly after huge_pmd_unshare" + "CVE-2023-4389": { + "cmt_msg": "btrfs: fix root ref counts in error handling in btrfs_get_root_ref" }, - "CVE-2018-20511": { - "cmt_msg": "net/appletalk: fix minor pointer leak to userspace in SIOCFINDIPDDPRT" + "CVE-2022-3566": { + "cmt_msg": "tcp: Fix data races around icsk->icsk_af_ops." }, - "CVE-2018-20510": { - "cmt_msg": "binder: replace \"%p\" with \"%pK\"" + "CVE-2023-35829": { + "cmt_msg": "media: rkvdec: fix use after free bug in rkvdec_remove" }, - "CVE-2022-20166": { - "cmt_msg": "drivers core: Use sysfs_emit and sysfs_emit_at for show(device *...) functions" + "CVE-2023-35828": { + "cmt_msg": "usb: gadget: udc: renesas_usb3: Fix use after free bug in renesas_usb3_remove due to race condition" }, - "CVE-2016-5728": { - "cmt_msg": "misc: mic: Fix for double fetch security bug in VOP driver" + "CVE-2022-29582": { + "cmt_msg": "io_uring: fix race between timeout flush and removal" }, - "CVE-2020-15436": { - "cmt_msg": "block: Fix use-after-free in blkdev_get()" + "CVE-2023-52583": { + "cmt_msg": "ceph: fix deadlock or deadcode of misusing dget()" }, "CVE-2022-1116": { "cmt_msg": "" @@ -88394,248 +120376,260 @@ "CVE-2021-28660": { "cmt_msg": "staging: rtl8188eu: prevent ->ssid overflow in rtw_wx_set_scan()" }, - "CVE-2016-9178": { - "cmt_msg": "fix minor infoleak in get_user_ex()" + "CVE-2024-0775": { + "cmt_msg": "ext4: improve error recovery code paths in __ext4_remount()" }, - "CVE-2020-8647": { - "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region" + "CVE-2023-35823": { + "cmt_msg": "media: saa7134: fix use after free bug in saa7134_finidev due to race condition" }, - "CVE-2019-0155": { - "cmt_msg": "drm/i915: Rename gen7 cmdparser tables" + "CVE-2022-3564": { + "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free caused by l2cap_reassemble_sdu" }, - "CVE-2019-0154": { - "cmt_msg": "drm/i915: Lower RM timeout to avoid DSI hard hangs" + "CVE-2022-23816": { + "cmt_msg": "x86/kvm/vmx: Make noinstr clean" + }, + "CVE-2023-35824": { + "cmt_msg": "media: dm1105: Fix use after free bug in dm1105_remove due to race condition" }, "CVE-2023-35827": { "cmt_msg": "ravb: Fix use-after-free issue in ravb_tx_timeout_work()" }, - "CVE-2022-2961": { - "cmt_msg": "" + "CVE-2023-52481": { + "cmt_msg": "arm64: errata: Add Cortex-A520 speculative unprivileged load workaround" }, - "CVE-2017-6348": { - "cmt_msg": "irda: Fix lockdep annotations in hashbin_delete()." + "CVE-2023-52585": { + "cmt_msg": "drm/amdgpu: Fix possible NULL dereference in amdgpu_ras_query_error_status_helper()" }, - "CVE-2022-3566": { - "cmt_msg": "tcp: Fix data races around icsk->icsk_af_ops." + "CVE-2021-20239": { + "cmt_msg": "net: pass a sockptr_t into ->setsockopt" }, - "CVE-2022-3565": { - "cmt_msg": "mISDN: fix use-after-free bugs in l1oip timer handlers" + "CVE-2023-52587": { + "cmt_msg": "IB/ipoib: Fix mcast list locking" }, - "CVE-2022-3564": { - "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free caused by l2cap_reassemble_sdu" + "CVE-2023-52586": { + "cmt_msg": "drm/msm/dpu: Add mutex lock in control vblank irq" }, - "CVE-2020-36386": { - "cmt_msg": "Bluetooth: Fix slab-out-of-bounds read in hci_extended_inquiry_result_evt()" + "CVE-2021-47149": { + "cmt_msg": "net: fujitsu: fix potential null-ptr-deref" }, - "CVE-2017-6345": { - "cmt_msg": "net/llc: avoid BUG_ON() in skb_orphan()" + "CVE-2021-47067": { + "cmt_msg": "soc/tegra: regulators: Fix locking up when voltage-spread is out of range" }, - "CVE-2017-6346": { - "cmt_msg": "packet: fix races in fanout_add()" + "CVE-2022-3565": { + "cmt_msg": "mISDN: fix use-after-free bugs in l1oip timer handlers" }, - "CVE-2017-6347": { - "cmt_msg": "ip: fix IP_CHECKSUM handling" + "CVE-2021-47065": { + "cmt_msg": "rtw88: Fix array overrun in rtw_get_tx_power_params()" }, - "CVE-2022-3628": { - "cmt_msg": "wifi: brcmfmac: Fix potential buffer overflow in brcmf_fweh_event_worker()" + "CVE-2021-47145": { + "cmt_msg": "btrfs: do not BUG_ON in link_to_fixup_dir" }, - "CVE-2022-1048": { - "cmt_msg": "ALSA: pcm: Fix races among concurrent hw_params and hw_free calls" + "CVE-2021-47144": { + "cmt_msg": "drm/amd/amdgpu: fix refcount leak" + }, + "CVE-2021-47147": { + "cmt_msg": "ptp: ocp: Fix a resource leak in an error handling path" }, "CVE-2020-36385": { "cmt_msg": "RDMA/ucma: Rework ucma_migrate_id() to avoid races with destroy" }, - "CVE-2018-9385": { - "cmt_msg": "ARM: amba: Don't read past the end of sysfs \"driver_override\" buffer" - }, - "CVE-2020-0009": { - "cmt_msg": "staging: android: ashmem: Disallow ashmem memory from being remapped" - }, - "CVE-2023-52340": { - "cmt_msg": "ipv6: remove max_size check inline with ipv4" - }, - "CVE-2023-31082": { - "cmt_msg": "" - }, - "CVE-2022-3567": { - "cmt_msg": "ipv6: Fix data races around sk->sk_prot." - }, - "CVE-2018-7480": { - "cmt_msg": "blkcg: fix double free of new_blkg in blkcg_init_queue" - }, - "CVE-2016-3137": { - "cmt_msg": "USB: cypress_m8: add endpoint sanity check" + "CVE-2021-47141": { + "cmt_msg": "gve: Add NULL pointer checks when freeing irqs." }, - "CVE-2016-3136": { - "cmt_msg": "USB: mct_u232: add sanity checking in probe" + "CVE-2021-47140": { + "cmt_msg": "iommu/amd: Clear DMA ops when switching domain" }, - "CVE-2016-6327": { - "cmt_msg": "IB/srpt: Simplify srpt_handle_tsk_mgmt()" + "CVE-2021-47143": { + "cmt_msg": "net/smc: remove device from smcd_dev_list after failed device_add()" }, - "CVE-2016-3134": { - "cmt_msg": "netfilter: x_tables: fix unconditional helper" + "CVE-2021-47142": { + "cmt_msg": "drm/amdgpu: Fix a use-after-free" }, - "CVE-2018-9415": { - "cmt_msg": "ARM: amba: Fix race condition with driver_override" + "CVE-2021-46943": { + "cmt_msg": "media: staging/intel-ipu3: Fix set_fmt error handling" }, - "CVE-2020-12771": { - "cmt_msg": "bcache: fix potential deadlock problem in btree_gc_coalesce" + "CVE-2021-46941": { + "cmt_msg": "usb: dwc3: core: Do core softreset when switch mode" }, - "CVE-2019-13648": { - "cmt_msg": "powerpc/tm: Fix oops on sigreturn on systems without TM" + "CVE-2023-3567": { + "cmt_msg": "vc_screen: move load of struct vc_data pointer in vcs_read() to avoid UAF" }, - "CVE-2016-3138": { - "cmt_msg": "USB: cdc-acm: more sanity checking" + "CVE-2021-46944": { + "cmt_msg": "media: staging/intel-ipu3: Fix memory leak in imu_fmt" }, - "CVE-2020-16120": { - "cmt_msg": "ovl: switch to mounter creds in readdir" + "CVE-2023-4128": { + "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free" }, - "CVE-2019-11599": { - "cmt_msg": "coredump: fix race condition between mmget_not_zero()/get_task_mm() and core dumping" + "CVE-2023-52589": { + "cmt_msg": "media: rkisp1: Fix IRQ disable race issue" }, - "CVE-2018-16658": { - "cmt_msg": "cdrom: Fix info leak/OOB read in cdrom_ioctl_drive_status" + "CVE-2023-28466": { + "cmt_msg": "net: tls: fix possible race condition between do_tls_getsockopt_conf() and do_tls_setsockopt_conf()" }, - "CVE-2018-15572": { - "cmt_msg": "x86/speculation: Protect against userspace-userspace spectreRSB" + "CVE-2023-52588": { + "cmt_msg": "f2fs: fix to tag gcing flag on page during block migration" }, - "CVE-2022-1204": { - "cmt_msg": "ax25: Fix refcount leaks caused by ax25_cb_del()" + "CVE-2024-26765": { + "cmt_msg": "LoongArch: Disable IRQ before init_fn() for nonboot CPUs" }, - "CVE-2019-2101": { - "cmt_msg": "media: uvcvideo: Fix 'type' check leading to overflow" + "CVE-2023-52578": { + "cmt_msg": "net: bridge: use DEV_STATS_INC()" }, - "CVE-2019-17666": { - "cmt_msg": "rtlwifi: Fix potential overflow on P2P code" + "CVE-2024-26684": { + "cmt_msg": "net: stmmac: xgmac: fix handling of DPP safety error for DMA channels" }, - "CVE-2016-5828": { - "cmt_msg": "powerpc/tm: Always reclaim in start_thread() for exec() class syscalls" + "CVE-2021-47052": { + "cmt_msg": "crypto: sa2ul - Fix memory leak of rxd" }, - "CVE-2018-9363": { - "cmt_msg": "Bluetooth: hidp: buffer overflow in hidp_process_report" + "CVE-2021-47095": { + "cmt_msg": "ipmi: ssif: initialize ssif_info->client early" }, - "CVE-2015-7885": { - "cmt_msg": "staging/dgnc: fix info leak in ioctl" + "CVE-2023-4004": { + "cmt_msg": "netfilter: nft_set_pipapo: fix improper element removal" }, - "CVE-2016-10723": { - "cmt_msg": "mm, oom: remove sleep from under oom_lock" + "CVE-2023-6560": { + "cmt_msg": "io_uring: don't allow discontig pages for IORING_SETUP_NO_MMAP" }, "CVE-2021-3573": { "cmt_msg": "Bluetooth: use correct lock to prevent UAF of hdev object" }, - "CVE-2020-25212": { - "cmt_msg": "nfs: Fix getxattr kernel panic and memory overflow" + "CVE-2022-29581": { + "cmt_msg": "net/sched: cls_u32: fix netns refcount changes in u32_change()" }, - "CVE-2019-19036": { - "cmt_msg": "btrfs: Detect unbalanced tree with empty leaf before crashing btree operations" + "CVE-2021-45402": { + "cmt_msg": "bpf: Fix signed bounds propagation after mov32" }, - "CVE-2019-3459": { - "cmt_msg": "Bluetooth: Verify that l2cap_get_conf_opt provides large enough buffer" + "CVE-2023-1611": { + "cmt_msg": "btrfs: fix race between quota disable and quota assign ioctls" }, - "CVE-2020-11494": { - "cmt_msg": "slcan: Don't transmit uninitialized stack data in padding" + "CVE-2024-26763": { + "cmt_msg": "dm-crypt: don't modify the data when using authenticated encryption" }, - "CVE-2017-8797": { - "cmt_msg": "nfsd: fix undefined behavior in nfsd4_layout_verify" + "CVE-2021-34693": { + "cmt_msg": "can: bcm: fix infoleak in struct bcm_msg_head" }, - "CVE-2020-0444": { - "cmt_msg": "audit: fix error handling in audit_data_to_entry()" + "CVE-2022-26490": { + "cmt_msg": "nfc: st21nfca: Fix potential buffer overflows in EVT_TRANSACTION" }, - "CVE-2018-1000026": { - "cmt_msg": "bnx2x: disable GSO where gso_size is too big for hardware" + "CVE-2023-6817": { + "cmt_msg": "netfilter: nft_set_pipapo: skip inactive elements during set walk" }, - "CVE-2017-16526": { - "cmt_msg": "uwb: properly check kthread_run return value" + "CVE-2023-52470": { + "cmt_msg": "drm/radeon: check the alloc_workqueue return value in radeon_crtc_init()" }, - "CVE-2017-16527": { - "cmt_msg": "ALSA: usb-audio: Kill stray URB at exiting" + "CVE-2024-26795": { + "cmt_msg": "riscv: Sparse-Memory/vmemmap out-of-bounds fix" }, - "CVE-2017-16525": { - "cmt_msg": "USB: serial: console: fix use-after-free after failed setup" + "CVE-2021-47125": { + "cmt_msg": "sch_htb: fix refcount leak in htb_parent_to_leaf_offload" + }, + "CVE-2024-26797": { + "cmt_msg": "drm/amd/display: Prevent potential buffer overflow in map_hw_resources" + }, + "CVE-2024-26790": { + "cmt_msg": "dmaengine: fsl-qdma: fix SoC may hang on 16 byte unaligned read" }, "CVE-2022-1836": { "cmt_msg": "floppy: disable FDRAWCMD by default" }, + "CVE-2024-26793": { + "cmt_msg": "gtp: fix use-after-free and null-ptr-deref in gtp_newlink()" + }, + "CVE-2023-52530": { + "cmt_msg": "wifi: mac80211: fix potential key use-after-free" + }, "CVE-2021-32078": { "cmt_msg": "ARM: footbridge: remove personal server platform" }, + "CVE-2023-52532": { + "cmt_msg": "net: mana: Fix TX CQE error handling" + }, "CVE-2022-30594": { "cmt_msg": "ptrace: Check PTRACE_O_SUSPEND_SECCOMP permission on PTRACE_SEIZE" }, - "CVE-2022-20148": { - "cmt_msg": "f2fs: fix UAF in f2fs_available_free_memory" - }, - "CVE-2017-16528": { - "cmt_msg": "ALSA: seq: Cancel pending autoload work at unbinding device" + "CVE-2024-26798": { + "cmt_msg": "fbcon: always restore the old font data in fbcon_do_set_font()" }, - "CVE-2017-16529": { - "cmt_msg": "ALSA: usb-audio: Check out-of-bounds access by corrupted buffer descriptor" + "CVE-2022-4662": { + "cmt_msg": "USB: core: Prevent nested device-reset calls" }, - "CVE-2019-11833": { - "cmt_msg": "ext4: zero out the unused memory region in the extent tree block" + "CVE-2021-38204": { + "cmt_msg": "usb: max-3421: Prevent corruption of freed memory" }, "CVE-2021-38205": { "cmt_msg": "net: xilinx_emaclite: Do not print real IOMEM pointer" }, - "CVE-2016-7039": { - "cmt_msg": "net: add recursion limit to GRO" - }, - "CVE-2023-34256": { - "cmt_msg": "ext4: avoid a potential slab-out-of-bounds in ext4_group_desc_csum" + "CVE-2021-38207": { + "cmt_msg": "net: ll_temac: Fix TX BD buffer overwrite" }, - "CVE-2020-0255": { - "cmt_msg": "selinux: properly handle multiple messages in selinux_netlink_send()" + "CVE-2020-27830": { + "cmt_msg": "speakup: Reject setting the speakup line discipline outside of speakup" }, - "CVE-2016-6130": { - "cmt_msg": "s390/sclp_ctl: fix potential information leak with /dev/sclp" + "CVE-2023-39189": { + "cmt_msg": "netfilter: nfnetlink_osf: avoid OOB read" }, - "CVE-2019-2215": { - "cmt_msg": "ANDROID: binder: remove waitqueue when thread exits." + "CVE-2023-35001": { + "cmt_msg": "netfilter: nf_tables: prevent OOB access in nft_byteorder_eval" }, - "CVE-2021-3892": { - "cmt_msg": "" + "CVE-2022-27666": { + "cmt_msg": "esp: Fix possible buffer overflow in ESP transformation" }, "CVE-2021-38208": { "cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect" }, - "CVE-2017-18232": { - "cmt_msg": "scsi: libsas: direct call probe and destruct" + "CVE-2021-38209": { + "cmt_msg": "netfilter: conntrack: Make global sysctls readonly in non-init netns" }, - "CVE-2019-2213": { - "cmt_msg": "binder: fix possible UAF when freeing buffer" + "CVE-2024-26677": { + "cmt_msg": "rxrpc: Fix delayed ACKs to not set the reference serial number" }, - "CVE-2020-25211": { - "cmt_msg": "netfilter: ctnetlink: add a range check for l3/l4 protonum" + "CVE-2024-26676": { + "cmt_msg": "af_unix: Call kfree_skb() for dead unix_(sk)->oob_skb in GC." }, - "CVE-2017-14140": { - "cmt_msg": "Sanitize 'move_pages()' permission checks" + "CVE-2022-0168": { + "cmt_msg": "cifs: fix NULL ptr dereference in smb2_ioctl_query_info()" }, "CVE-2020-26556": { "cmt_msg": "" }, - "CVE-2018-9518": { - "cmt_msg": "NFC: llcp: Limit size of SDP URI" + "CVE-2020-26557": { + "cmt_msg": "" + }, + "CVE-2024-26671": { + "cmt_msg": "blk-mq: fix IO hang from sbitmap wakeup race" }, "CVE-2020-26555": { "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical" }, - "CVE-2018-9517": { - "cmt_msg": "l2tp: pass tunnel pointer to ->session_create()" + "CVE-2024-26776": { + "cmt_msg": "spi: hisi-sfc-v3xx: Return IRQ_NONE if no interrupts were detected" }, - "CVE-2018-9516": { - "cmt_msg": "HID: debug: check length before copy_to_user()" + "CVE-2024-26777": { + "cmt_msg": "fbdev: sis: Error out if pixclock equals zero" + }, + "CVE-2019-20794": { + "cmt_msg": "" + }, + "CVE-2020-26559": { + "cmt_msg": "" }, "CVE-2023-3397": { "cmt_msg": "" }, - "CVE-2018-1128": { - "cmt_msg": "libceph: add authorizer challenge" + "CVE-2021-47129": { + "cmt_msg": "netfilter: nft_ct: skip expectations for confirmed conntrack" }, - "CVE-2018-1129": { - "cmt_msg": "libceph: implement CEPHX_V2 calculation mode" + "CVE-2024-26679": { + "cmt_msg": "inet: read sk->sk_family once in inet_recv_error()" }, - "CVE-2018-1087": { - "cmt_msg": "kvm/x86: fix icebp instruction handling" + "CVE-2024-26771": { + "cmt_msg": "dmaengine: ti: edma: Add some null pointer checks to the edma_probe" + }, + "CVE-2023-52584": { + "cmt_msg": "spmi: mediatek: Fix UAF on device remove" + }, + "CVE-2021-47128": { + "cmt_msg": "bpf, lockdown, audit: Fix buggy SELinux lockdown permission checks" }, "CVE-2022-26365": { "cmt_msg": "xen/blkfront: fix leaking data in shared pages" @@ -88643,101 +120637,86 @@ "CVE-2022-21125": { "cmt_msg": "x86/speculation/mmio: Reuse SRBDS mitigation for SBDS" }, - "CVE-2018-1120": { - "cmt_msg": "proc: do not access cmdline nor environ from file-backed areas" - }, "CVE-2018-1121": { "cmt_msg": "" }, - "CVE-2018-20856": { - "cmt_msg": "block: blk_init_allocated_queue() set q->fq as NULL in the fail case" - }, - "CVE-2023-52451": { - "cmt_msg": "powerpc/pseries/memhp: Fix access beyond end of drmem array" - }, - "CVE-2017-5754": { - "cmt_msg": "x86/cpufeatures: Add Intel feature bits for Speculation Control" + "CVE-2023-52454": { + "cmt_msg": "nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length" }, - "CVE-2022-3061": { - "cmt_msg": "video: fbdev: i740fb: Error out if 'pixclock' equals zero" + "CVE-2023-28746": { + "cmt_msg": "x86/mmio: Disable KVM mitigation when X86_FEATURE_CLEAR_CPU_BUF is set" }, - "CVE-2016-10200": { - "cmt_msg": "l2tp: fix racy SOCK_ZAPPED flag check in l2tp_ip{,6}_bind()" + "CVE-2021-47118": { + "cmt_msg": "pid: take a reference when initializing `cad_pid`" }, - "CVE-2017-5753": { - "cmt_msg": "x86/cpufeatures: Add X86_BUG_SPECTRE_V[12]" + "CVE-2023-52451": { + "cmt_msg": "powerpc/pseries/memhp: Fix access beyond end of drmem array" }, - "CVE-2019-14615": { - "cmt_msg": "drm/i915/gen9: Clear residual context state on context switch" + "CVE-2021-47119": { + "cmt_msg": "ext4: fix memory leak in ext4_fill_super" }, - "CVE-2022-20369": { - "cmt_msg": "media: v4l2-mem2mem: Apply DST_QUEUE_OFF_BASE on MMAP buffers across ioctls" + "CVE-2024-26602": { + "cmt_msg": "sched/membarrier: reduce the ability to hammer on sys_membarrier" }, "CVE-2024-1086": { "cmt_msg": "netfilter: nf_tables: reject QUEUE/DROP verdict parameters" }, - "CVE-2022-32981": { - "cmt_msg": "powerpc/32: Fix overread/overwrite of thread_struct via ptrace" - }, - "CVE-2016-10208": { - "cmt_msg": "ext4: validate s_first_meta_bg at mount time" - }, - "CVE-2016-3135": { - "cmt_msg": "netfilter: x_tables: check for size overflow" - }, - "CVE-2019-18680": { + "CVE-2024-22386": { "cmt_msg": "" }, - "CVE-2019-19049": { - "cmt_msg": "of: unittest: fix memory leak in unittest_data_add" + "CVE-2019-15794": { + "cmt_msg": "ovl: fix reference counting in ovl_mmap error path" }, - "CVE-2018-9568": { - "cmt_msg": "net: Set sk_prot_creator when cloning sockets to the right proto" + "CVE-2022-3344": { + "cmt_msg": "KVM: x86: nSVM: harden svm_free_nested against freeing vmcb02 while still in use" }, - "CVE-2020-27784": { - "cmt_msg": "usb: gadget: function: printer: fix use-after-free in __lock_acquire" + "CVE-2023-23004": { + "cmt_msg": "malidp: Fix NULL vs IS_ERR() checking" }, - "CVE-2018-13053": { - "cmt_msg": "alarmtimer: Prevent overflow for relative nanosleep" + "CVE-2023-23006": { + "cmt_msg": "net/mlx5: DR, Fix NULL vs IS_ERR checking in dr_domain_init_resources" }, - "CVE-2020-27786": { - "cmt_msg": "ALSA: rawmidi: Fix racy buffer resize under concurrent accesses" + "CVE-2020-12912": { + "cmt_msg": "hwmon: (amd_energy) modify the visibility of the counters" }, - "CVE-2020-0305": { - "cmt_msg": "chardev: Avoid potential use-after-free in 'chrdev_open()'" + "CVE-2023-23000": { + "cmt_msg": "phy: tegra: xusb: Fix return value of tegra_xusb_find_port_node function" }, - "CVE-2019-14816": { - "cmt_msg": "mwifiex: Fix three heap overflow at parsing element in cfg80211_ap_settings" + "CVE-2023-1670": { + "cmt_msg": "xirc2ps_cs: Fix use after free bug in xirc2ps_detach" }, - "CVE-2019-14814": { - "cmt_msg": "mwifiex: Fix three heap overflow at parsing element in cfg80211_ap_settings" + "CVE-2023-23002": { + "cmt_msg": "Bluetooth: hci_qca: Fix NULL vs IS_ERR_OR_NULL check in qca_serdev_probe" + }, + "CVE-2024-26702": { + "cmt_msg": "iio: magnetometer: rm3100: add boundary check for the value read from RM3100_REG_TMRC" }, "CVE-2023-6240": { "cmt_msg": "" }, + "CVE-2022-21123": { + "cmt_msg": "x86/speculation/mmio: Add mitigation for Processor MMIO Stale Data" + }, + "CVE-2024-26706": { + "cmt_msg": "parisc: Fix random data corruption from exception handler" + }, "CVE-2023-23559": { "cmt_msg": "wifi: rndis_wlan: Prevent buffer overflow in rndis_query_oid" }, - "CVE-2020-10720": { - "cmt_msg": "net-gro: fix use-after-free read in napi_gro_frags()" - }, - "CVE-2020-14351": { - "cmt_msg": "perf/core: Fix race in the perf_mmap_close() function" + "CVE-2022-39842": { + "cmt_msg": "video: fbdev: pxa3xx-gcu: Fix integer overflow in pxa3xx_gcu_write" }, "CVE-2022-0382": { "cmt_msg": "net ticp:fix a kernel-infoleak in __tipc_sendmsg()" }, - "CVE-2019-9456": { - "cmt_msg": "usb: usbmon: Read text within supplied buffer size" - }, "CVE-2023-32233": { "cmt_msg": "netfilter: nf_tables: deactivate anonymous set from preparation phase" }, "CVE-2020-25672": { "cmt_msg": "nfc: fix memory leak in llcp_sock_connect()" }, - "CVE-2019-9455": { - "cmt_msg": "media: videobuf2-v4l2: drop WARN_ON in vb2_warn_zero_bytesused()" + "CVE-2020-25673": { + "cmt_msg": "nfc: Avoid endless loops caused by repeated llcp_sock_connect()" }, "CVE-2020-25670": { "cmt_msg": "nfc: fix refcount leak in llcp_sock_bind()" @@ -88745,122 +120724,92 @@ "CVE-2020-25671": { "cmt_msg": "nfc: fix refcount leak in llcp_sock_connect()" }, - "CVE-2016-2185": { - "cmt_msg": "Input: ati_remote2 - fix crashes on detecting device with invalid descriptor" - }, - "CVE-2016-2184": { - "cmt_msg": "ALSA: usb-audio: Fix NULL dereference in create_fixed_stream_quirk()" - }, - "CVE-2016-2187": { - "cmt_msg": "Input: gtco - fix crash on detecting device without endpoints" + "CVE-2022-20369": { + "cmt_msg": "media: v4l2-mem2mem: Apply DST_QUEUE_OFF_BASE on MMAP buffers across ioctls" }, - "CVE-2016-2186": { - "cmt_msg": "Input: powermate - fix oops with malicious USB descriptors" + "CVE-2022-0998": { + "cmt_msg": "vdpa: clean up get_config_size ret value handling" }, - "CVE-2019-19815": { - "cmt_msg": "f2fs: support swap file w/ DIO" + "CVE-2022-2978": { + "cmt_msg": "fs: fix UAF/GPF bug in nilfs_mdt_destroy" }, "CVE-2019-19814": { "cmt_msg": "" }, - "CVE-2020-29371": { - "cmt_msg": "romfs: fix uninitialized memory leak in romfs_dev_read()" + "CVE-2023-1118": { + "cmt_msg": "media: rc: Fix use-after-free bugs caused by ene_tx_irqsim()" }, - "CVE-2019-19816": { - "cmt_msg": "btrfs: inode: Verify inode mode to avoid NULL pointer dereference" + "CVE-2021-47124": { + "cmt_msg": "io_uring: fix link timeout refs" }, - "CVE-2017-16939": { - "cmt_msg": "ipsec: Fix aborted xfrm policy dump crash" + "CVE-2022-1011": { + "cmt_msg": "fuse: fix pipe buffer lifetime for direct_io" }, - "CVE-2019-9453": { - "cmt_msg": "f2fs: fix to avoid accessing xattr across the boundary" + "CVE-2022-1012": { + "cmt_msg": "secure_seq: use the 64 bits of the siphash for port offset calculation" }, - "CVE-2021-0605": { - "cmt_msg": "af_key: pfkey_dump needs parameter validation" + "CVE-2023-52620": { + "cmt_msg": "netfilter: nf_tables: disallow timeout for anonymous sets" }, - "CVE-2018-18710": { - "cmt_msg": "cdrom: fix improper type cast, which can leat to information leak." + "CVE-2023-52621": { + "cmt_msg": "bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers" }, - "CVE-2016-2188": { - "cmt_msg": "USB: iowarrior: fix NULL-deref at probe" + "CVE-2023-52622": { + "cmt_msg": "ext4: avoid online resizing failures due to oversized flex bg" }, - "CVE-2022-1012": { - "cmt_msg": "secure_seq: use the 64 bits of the siphash for port offset calculation" + "CVE-2023-52623": { + "cmt_msg": "SUNRPC: Fix a suspicious RCU usage warning" }, - "CVE-2023-31436": { - "cmt_msg": "net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg" + "CVE-2023-52619": { + "cmt_msg": "pstore/ram: Fix crash when setting number of cpus to an odd number" }, - "CVE-2020-12114": { - "cmt_msg": "make struct mountpoint bear the dentry reference to mountpoint, not struct mount" + "CVE-2023-52625": { + "cmt_msg": "drm/amd/display: Refactor DMCUB enter/exit idle interface" }, - "CVE-2020-8649": { - "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region" + "CVE-2023-52627": { + "cmt_msg": "iio: adc: ad7091r: Allow users to configure device events" }, - "CVE-2023-3161": { - "cmt_msg": "fbcon: Check font dimension limits" + "CVE-2023-52628": { + "cmt_msg": "netfilter: nftables: exthdr: fix 4-byte stack OOB write" }, - "CVE-2020-12656": { - "cmt_msg": "sunrpc: check that domain table is empty at module unload." + "CVE-2021-26934": { + "cmt_msg": "" }, - "CVE-2023-20569": { - "cmt_msg": "x86/bugs: Increase the x86 bugs vector size to two u32s" + "CVE-2022-3115": { + "cmt_msg": "drm: mali-dp: potential dereference of null pointer" }, - "CVE-2017-1000405": { - "cmt_msg": "mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d()" + "CVE-2021-26931": { + "cmt_msg": "xen-blkback: don't \"handle\" error by BUG()" }, "CVE-2021-26930": { "cmt_msg": "xen-blkback: fix error handling in xen_blkbk_map()" }, - "CVE-2017-1000407": { - "cmt_msg": "KVM: VMX: remove I/O port 0x80 bypass on Intel hosts" - }, "CVE-2021-26932": { "cmt_msg": "Xen/x86: don't bail early from clear_foreign_p2m_mapping()" }, - "CVE-2024-25740": { - "cmt_msg": "" - }, - "CVE-2023-52456": { - "cmt_msg": "serial: imx: fix tx statemachine deadlock" - }, "CVE-2023-3141": { "cmt_msg": "memstick: r592: Fix UAF bug in r592_remove due to race condition" }, - "CVE-2023-37454": { - "cmt_msg": "" - }, - "CVE-2016-9555": { - "cmt_msg": "sctp: validate chunk len before actually using it" - }, - "CVE-2019-3892": { - "cmt_msg": "coredump: fix race condition between mmget_not_zero()/get_task_mm() and core dumping" - }, - "CVE-2020-12352": { - "cmt_msg": "Bluetooth: A2MP: Fix not initializing all members" + "CVE-2022-0492": { + "cmt_msg": "cgroup-v1: Require capabilities to set release_agent" }, - "CVE-2020-12655": { - "cmt_msg": "xfs: add agf freeblocks verify in xfs_agf_verify" + "CVE-2023-34256": { + "cmt_msg": "ext4: avoid a potential slab-out-of-bounds in ext4_group_desc_csum" }, - "CVE-2021-43976": { - "cmt_msg": "mwifiex: Fix skb_over_panic in mwifiex_usb_recv()" + "CVE-2022-25636": { + "cmt_msg": "netfilter: nf_tables_offload: incorrect flow offload action array size" }, "CVE-2022-0494": { "cmt_msg": "block-map: add __GFP_ZERO flag for alloc_page in function bio_copy_kern" }, - "CVE-2023-2269": { - "cmt_msg": "dm ioctl: fix nested locking in table_clear() to remove deadlock concern" - }, - "CVE-2020-26088": { - "cmt_msg": "net/nfc/rawsock.c: add CAP_NET_RAW check." - }, - "CVE-2015-7513": { - "cmt_msg": "KVM: x86: Reload pit counters for all channels when restoring state" + "CVE-2022-3524": { + "cmt_msg": "tcp/udp: Fix memory leak in ipv6_renew_options()." }, "CVE-2022-3523": { "cmt_msg": "mm/memory.c: fix race when faulting a device private page" }, - "CVE-2015-7515": { - "cmt_msg": "Input: aiptek - fix crash on detecting device without endpoints" + "CVE-2022-3522": { + "cmt_msg": "mm/hugetlb: use hugetlb_pte_stable in migration race check" }, "CVE-2008-2544": { "cmt_msg": "" @@ -88868,71 +120817,62 @@ "CVE-2021-3178": { "cmt_msg": "nfsd4: readdirplus shouldn't return parent of export" }, - "CVE-2022-2318": { - "cmt_msg": "net: rose: fix UAF bugs caused by timer handler" + "CVE-2021-47101": { + "cmt_msg": "asix: fix uninit-value in asix_mdio_read()" }, - "CVE-2022-42703": { - "cmt_msg": "mm/rmap: Fix anon_vma->degree ambiguity leading to double-reuse" + "CVE-2021-47100": { + "cmt_msg": "ipmi: Fix UAF when uninstall ipmi_si and ipmi_msghandler module" }, - "CVE-2018-7755": { - "cmt_msg": "floppy: Do not copy a kernel pointer to user memory in FDGETPRM ioctl" + "CVE-2021-46984": { + "cmt_msg": "kyber: fix out of bounds access when preempted" }, - "CVE-2017-7346": { - "cmt_msg": "drm/vmwgfx: limit the number of mip levels in vmw_gb_surface_define_ioctl()" + "CVE-2021-46982": { + "cmt_msg": "f2fs: compress: fix race condition of overwrite vs truncate" }, - "CVE-2018-7757": { - "cmt_msg": "scsi: libsas: fix memory leak in sas_smp_get_phy_events()" + "CVE-2021-46980": { + "cmt_msg": "usb: typec: ucsi: Retrieve all the PDOs instead of just the first 4" }, - "CVE-2019-9458": { - "cmt_msg": "media: v4l: event: Prevent freeing event subscriptions while accessed" + "CVE-2021-46981": { + "cmt_msg": "nbd: Fix NULL pointer in flush_workqueue" + }, + "CVE-2021-47109": { + "cmt_msg": "neighbour: allow NUD_NOARP entries to be forced GCed" + }, + "CVE-2022-0330": { + "cmt_msg": "drm/i915: Flush TLBs before releasing backing store" }, "CVE-2007-3719": { "cmt_msg": "" }, - "CVE-2023-34255": { - "cmt_msg": "xfs: verify buffer contents when we skip log replay" + "CVE-2021-46988": { + "cmt_msg": "userfaultfd: release page in error path to avoid BUG_ON" }, - "CVE-2023-3863": { - "cmt_msg": "net: nfc: Fix use-after-free caused by nfc_llcp_find_local" + "CVE-2021-46989": { + "cmt_msg": "hfsplus: prevent corruption in shrinking truncate" + }, + "CVE-2024-26606": { + "cmt_msg": "binder: signal epoll threads of self-work" }, "CVE-2023-0590": { "cmt_msg": "net: sched: fix race condition in qdisc_graft()" }, - "CVE-2020-36313": { - "cmt_msg": "KVM: Fix out of range accesses to memslots" - }, "CVE-2022-4095": { "cmt_msg": "staging: rtl8712: fix use after free bugs" }, - "CVE-2017-10911": { - "cmt_msg": "xen-blkback: don't leak stack data via response ring" - }, - "CVE-2016-2117": { - "cmt_msg": "atl2: Disable unimplemented scatter/gather feature" - }, "CVE-2022-45919": { "cmt_msg": "media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221" }, - "CVE-2019-19319": { - "cmt_msg": "ext4: protect journal inode's blocks using block_validity" + "CVE-2024-26744": { + "cmt_msg": "RDMA/srpt: Support specifying the srpt_service_guid parameter" }, - "CVE-2023-31081": { + "CVE-2023-21400": { "cmt_msg": "" }, - "CVE-2023-2248": { - "cmt_msg": "net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg" - }, - "CVE-2023-30772": { - "cmt_msg": "power: supply: da9150: Fix use after free bug in da9150_charger_remove due to race condition" - }, - "CVE-2017-18017": { - "cmt_msg": "netfilter: xt_TCPMSS: add more sanity tests on tcph->doff" - }, - "CVE-2022-24958": { - "cmt_msg": "usb: gadget: don't release an existing dev->buf" + "CVE-2022-1204": { + "cmt_msg": "ax25: Fix refcount leaks caused by ax25_cb_del()" }, - "CVE-2023-1611": { - "cmt_msg": "btrfs: fix race between quota disable and quota assign ioctls" + "CVE-2022-28893": { + "cmt_msg": "SUNRPC: Ensure we flush any closed sockets before xs_xprt_free()" }, "CVE-2021-3772": { "cmt_msg": "sctp: use init_tag from inithdr for ABORT chunk" @@ -88940,17 +120880,17 @@ "CVE-2021-3679": { "cmt_msg": "tracing: Fix bug in rb_per_cpu_empty() that might cause deadloop." }, - "CVE-2021-37159": { - "cmt_msg": "usb: hso: fix error handling code of hso_create_net_device" + "CVE-2024-26656": { + "cmt_msg": "drm/amdgpu: fix use-after-free bug" }, - "CVE-2016-8399": { - "cmt_msg": "net: ping: check minimum size on ICMP header length" + "CVE-2024-26607": { + "cmt_msg": "drm/bridge: sii902x: Fix probing race issue" }, "CVE-2022-2586": { "cmt_msg": "netfilter: nf_tables: do not allow SET_ID to refer to another table" }, - "CVE-2016-7042": { - "cmt_msg": "KEYS: Fix short sprintf buffer in /proc/keys show function" + "CVE-2022-3629": { + "cmt_msg": "vsock: Fix memory leak in vsock_connect()" }, "CVE-2021-28715": { "cmt_msg": "xen/netback: don't queue unlimited number of packages" @@ -88961,230 +120901,212 @@ "CVE-2021-28713": { "cmt_msg": "xen/console: harden hvc_xen against event channel storms" }, - "CVE-2018-5873": { - "cmt_msg": "nsfs: mark dentry with DCACHE_RCUACCESS" + "CVE-2021-28712": { + "cmt_msg": "xen/netfront: harden netfront against event channel storms" }, - "CVE-2017-18261": { - "cmt_msg": "clocksource/drivers/arm_arch_timer: Avoid infinite recursion when ftrace is enabled" + "CVE-2021-28711": { + "cmt_msg": "xen/blkfront: harden blkfront against event channel storms" }, - "CVE-2021-4157": { - "cmt_msg": "pNFS/flexfiles: fix incorrect size check in decode_nfs_fh()" + "CVE-2021-3659": { + "cmt_msg": "net: mac802154: Fix general protection fault" }, - "CVE-2023-51782": { - "cmt_msg": "net/rose: Fix Use-After-Free in rose_ioctl" + "CVE-2022-2991": { + "cmt_msg": "remove the lightnvm subsystem" }, "CVE-2022-3621": { "cmt_msg": "nilfs2: fix NULL pointer dereference at nilfs_bmap_lookup_at_level()" }, - "CVE-2017-11473": { - "cmt_msg": "x86/acpi: Prevent out of bound access caused by broken ACPI tables" + "CVE-2022-23960": { + "cmt_msg": "ARM: report Spectre v2 status through sysfs" }, - "CVE-2017-11472": { - "cmt_msg": "ACPICA: Namespace: fix operand cache leak" + "CVE-2022-3623": { + "cmt_msg": "mm/hugetlb: fix races when looking up a CONT-PTE/PMD size hugetlb page" }, "CVE-2022-3624": { "cmt_msg": "bonding: fix reference count leak in balance-alb mode" }, - "CVE-2016-9120": { - "cmt_msg": "staging/android/ion : fix a race condition in the ion driver" + "CVE-2022-25258": { + "cmt_msg": "USB: gadget: validate interface OS descriptor requests" + }, + "CVE-2021-39656": { + "cmt_msg": "configfs: fix a use-after-free in __configfs_open_file" }, "CVE-2021-39657": { "cmt_msg": "scsi: ufs: Correct the LUN used in eh_device_reset_handler() callback" }, - "CVE-2021-3669": { - "cmt_msg": "ipc: replace costly bailout check in sysvipc_find_ipc()" + "CVE-2023-3090": { + "cmt_msg": "ipvlan:Fix out-of-bounds caused by unclear skb->cb" }, - "CVE-2019-18885": { - "cmt_msg": "btrfs: merge btrfs_find_device and find_device" + "CVE-2022-47946": { + "cmt_msg": "io_uring: kill sqo_dead and sqo submission halting" }, - "CVE-2017-7889": { - "cmt_msg": "mm: Tighten x86 /dev/mem with zeroing reads" + "CVE-2021-47038": { + "cmt_msg": "Bluetooth: avoid deadlock between hci_dev->lock and socket lock" }, - "CVE-2019-12378": { - "cmt_msg": "ipv6_sockglue: Fix a missing-check bug in ip6_ra_control()" + "CVE-2023-1095": { + "cmt_msg": "netfilter: nf_tables: fix null deref due to zeroed list head" }, - "CVE-2019-11091": { - "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" + "CVE-2021-47035": { + "cmt_msg": "iommu/vt-d: Remove WO permissions on second-level paging entries" + }, + "CVE-2021-47034": { + "cmt_msg": "powerpc/64s: Fix pte update for kernel memory on radix" }, "CVE-2022-3239": { "cmt_msg": "media: em28xx: initialize refcount before kref_get" }, - "CVE-2022-4543": { - "cmt_msg": "" + "CVE-2021-47036": { + "cmt_msg": "udp: skip L4 aggregation for UDP tunnel packets" }, - "CVE-2019-18660": { - "cmt_msg": "powerpc/book3s64: Fix link stack flush on context switch" + "CVE-2023-52571": { + "cmt_msg": "power: supply: rk817: Fix node refcount leak" + }, + "CVE-2023-52572": { + "cmt_msg": "cifs: Fix UAF in cifs_demultiplex_thread()" + }, + "CVE-2023-52573": { + "cmt_msg": "net: rds: Fix possible NULL-pointer dereference" }, "CVE-2023-4921": { "cmt_msg": "net: sched: sch_qfq: Fix UAF in qfq_dequeue()" }, - "CVE-2022-3202": { - "cmt_msg": "jfs: prevent NULL deref in diFree" + "CVE-2022-3424": { + "cmt_msg": "misc: sgi-gru: fix use-after-free error in gru_set_context_option, gru_fault and gru_handle_user_call_os" }, - "CVE-2017-15649": { - "cmt_msg": "packet: in packet_do_bind, test fanout with bind_lock held" + "CVE-2021-46919": { + "cmt_msg": "dmaengine: idxd: fix wq size store permission state" }, - "CVE-2017-11089": { - "cmt_msg": "cfg80211: Define nla_policy for NL80211_ATTR_LOCAL_MESH_POWER_MODE" + "CVE-2021-34866": { + "cmt_msg": "bpf: Fix ringbuf helper function compatibility" }, - "CVE-2023-1829": { - "cmt_msg": "net/sched: Retire tcindex classifier" + "CVE-2021-46915": { + "cmt_msg": "netfilter: nft_limit: avoid possible divide error in nft_limit_init" }, - "CVE-2019-18282": { - "cmt_msg": "net/flow_dissector: switch to siphash" + "CVE-2023-1390": { + "cmt_msg": "tipc: fix NULL deref in tipc_link_xmit()" }, "CVE-2021-34981": { "cmt_msg": "Bluetooth: cmtp: fix file refcount when cmtp_attach_device fails" }, - "CVE-2023-1670": { - "cmt_msg": "xirc2ps_cs: Fix use after free bug in xirc2ps_detach" + "CVE-2023-23454": { + "cmt_msg": "net: sched: cbq: dont intepret cls results when asked to drop" }, - "CVE-2023-4881": { - "cmt_msg": "netfilter: nftables: exthdr: fix 4-byte stack OOB write" + "CVE-2021-46911": { + "cmt_msg": "ch_ktls: Fix kernel panic" }, - "CVE-2017-14489": { - "cmt_msg": "scsi: scsi_transport_iscsi: fix the issue that iscsi_if_rx doesn't parse nlmsg properly" + "CVE-2023-52458": { + "cmt_msg": "block: add check that partition length needs to be aligned with block size" }, - "CVE-2016-3044": { - "cmt_msg": "KVM: PPC: Book3S HV: Sanitize special-purpose register values on guest exit" + "CVE-2021-46913": { + "cmt_msg": "netfilter: nftables: clone set element expression template" }, - "CVE-2023-52449": { - "cmt_msg": "mtd: Fix gluebi NULL pointer dereference caused by ftl notifier" + "CVE-2021-46912": { + "cmt_msg": "net: Make tcp_allowed_congestion_control readonly in non-init netns" }, - "CVE-2016-5829": { - "cmt_msg": "HID: hiddev: validate num_values for HIDIOCGUSAGES, HIDIOCSUSAGES commands" + "CVE-2024-26769": { + "cmt_msg": "nvmet-fc: avoid deadlock on delete association path" }, - "CVE-2016-2847": { - "cmt_msg": "pipe: limit the per-user amount of pages allocated in pipes" + "CVE-2024-26704": { + "cmt_msg": "ext4: fix double-free of blocks due to wrong extents moved_len" }, - "CVE-2018-9422": { - "cmt_msg": "futex: Remove requirement for lock_page() in get_futex_key()" + "CVE-2022-1786": { + "cmt_msg": "io_uring: remove io_identity" }, "CVE-2013-7445": { "cmt_msg": "" }, - "CVE-2016-9604": { - "cmt_msg": "KEYS: Disallow keyrings beginning with '.' to be joined as session keyrings" - }, - "CVE-2022-3646": { - "cmt_msg": "nilfs2: fix leak of nilfs_root in case of writer thread creation failure" - }, - "CVE-2021-0941": { - "cmt_msg": "bpf: Remove MTU check in __bpf_skb_max_len" - }, - "CVE-2019-15292": { - "cmt_msg": "appletalk: Fix use-after-free in atalk_proc_exit" - }, - "CVE-2020-12652": { - "cmt_msg": "scsi: mptfusion: Fix double fetch bug in ioctl" + "CVE-2022-28390": { + "cmt_msg": "can: ems_usb: ems_usb_start_xmit(): fix double dev_kfree_skb() in error path" }, - "CVE-2017-7294": { - "cmt_msg": "drm/vmwgfx: fix integer overflow in vmw_surface_define_ioctl()" + "CVE-2021-3653": { + "cmt_msg": "KVM: nSVM: avoid picking up unsupported bits from L2 in int_ctl (CVE-2021-3653)" }, - "CVE-2017-14340": { - "cmt_msg": "xfs: XFS_IS_REALTIME_INODE() should be false if no rt device present" + "CVE-2024-26736": { + "cmt_msg": "afs: Increase buffer size in afs_update_volume_status()" }, - "CVE-2019-15217": { - "cmt_msg": "media: usb:zr364xx:Fix KASAN:null-ptr-deref Read in zr364xx_vidioc_querycap" + "CVE-2024-26593": { + "cmt_msg": "i2c: i801: Fix block process call transactions" }, - "CVE-2022-26966": { - "cmt_msg": "sr9700: sanity check for packet length" + "CVE-2024-26738": { + "cmt_msg": "powerpc/pseries/iommu: DLPAR add doesn't completely initialize pci_controller" }, - "CVE-2015-8553": { - "cmt_msg": "xen/pciback: Don't allow MSI-X ops if PCI_COMMAND_MEMORY is not set." + "CVE-2024-26739": { + "cmt_msg": "net/sched: act_mirred: don't override retval if we already lost the skb" }, - "CVE-2019-19535": { - "cmt_msg": "can: peak_usb: pcan_usb_fd: Fix info-leaks to USB devices" + "CVE-2022-42719": { + "cmt_msg": "wifi: mac80211: fix MBSSID parsing use-after-free" }, "CVE-2022-38096": { "cmt_msg": "" }, - "CVE-2021-34693": { - "cmt_msg": "can: bcm: fix infoleak in struct bcm_msg_head" - }, - "CVE-2024-26591": { - "cmt_msg": "bpf: Fix re-attachment branch in bpf_tracing_prog_attach" - }, - "CVE-2018-6554": { - "cmt_msg": "staging: irda: remove the irda network stack and drivers" + "CVE-2024-26804": { + "cmt_msg": "net: ip_tunnel: prevent perpetual headroom growth" }, - "CVE-2020-14381": { - "cmt_msg": "futex: Fix inode life-time issue" + "CVE-2021-3656": { + "cmt_msg": "KVM: nSVM: always intercept VMLOAD/VMSAVE when nested (CVE-2021-3656)" }, - "CVE-2023-30456": { - "cmt_msg": "KVM: nVMX: add missing consistency checks for CR0 and CR4" + "CVE-2024-26805": { + "cmt_msg": "netlink: Fix kernel-infoleak-after-free in __skb_datagram_iter" }, - "CVE-2019-19768": { - "cmt_msg": "blktrace: Protect q->blk_trace with RCU" + "CVE-2022-1158": { + "cmt_msg": "KVM: x86/mmu: do compare-and-exchange of gPTE via the user address" }, "CVE-2022-3303": { "cmt_msg": "ALSA: pcm: oss: Fix race at SNDCTL_DSP_SYNC" }, - "CVE-2019-19039": { - "cmt_msg": "btrfs: Don't submit any btree write bio if the fs has errors" - }, - "CVE-2017-5715": { - "cmt_msg": "x86/cpufeatures: Add X86_BUG_SPECTRE_V[12]" + "CVE-2023-52443": { + "cmt_msg": "apparmor: avoid crash when parsed profile name is empty" }, "CVE-2022-20141": { "cmt_msg": "igmp: Add ip_mc_list lock in ip_check_mc_rcu" }, + "CVE-2008-4609": { + "cmt_msg": "" + }, "CVE-2023-23455": { "cmt_msg": "net: sched: atm: dont intepret cls results when asked to drop" }, - "CVE-2023-23454": { - "cmt_msg": "net: sched: cbq: dont intepret cls results when asked to drop" - }, - "CVE-2016-8630": { - "cmt_msg": "kvm: x86: Check memopp before dereference (CVE-2016-8630)" + "CVE-2022-2905": { + "cmt_msg": "bpf: Don't use tnum_range on array range checking for poke descriptors" }, - "CVE-2016-8633": { - "cmt_msg": "firewire: net: guard against rx buffer overflows" + "CVE-2022-20148": { + "cmt_msg": "f2fs: fix UAF in f2fs_available_free_memory" }, - "CVE-2016-8632": { - "cmt_msg": "tipc: check minimum bearer MTU" + "CVE-2023-2898": { + "cmt_msg": "f2fs: fix to avoid NULL pointer dereference f2fs_write_end_io()" }, - "CVE-2018-3620": { - "cmt_msg": "x86/microcode: Allow late microcode loading with SMT disabled" + "CVE-2023-6931": { + "cmt_msg": "perf: Fix perf_event_validate_size()" }, "CVE-2023-6932": { "cmt_msg": "ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet" }, - "CVE-2016-4805": { - "cmt_msg": "ppp: take reference on channels netns" - }, - "CVE-2019-3460": { - "cmt_msg": "Bluetooth: Check L2CAP option sizes returned from l2cap_get_conf_opt" - }, - "CVE-2018-8781": { - "cmt_msg": "drm: udl: Properly check framebuffer mmap offsets" - }, - "CVE-2021-29155": { - "cmt_msg": "bpf: Use correct permission flag for mixed signed bounds arithmetic" + "CVE-2024-26801": { + "cmt_msg": "Bluetooth: Avoid potential use-after-free in hci_error_reset" }, - "CVE-2024-22386": { - "cmt_msg": "" + "CVE-2024-0607": { + "cmt_msg": "netfilter: nf_tables: fix pointer math issue in nft_byteorder_eval()" }, "CVE-2021-33631": { "cmt_msg": "ext4: fix kernel BUG in 'ext4_write_inline_data_end()'" }, - "CVE-2019-15916": { - "cmt_msg": "net-sysfs: Fix mem leak in netdev_register_kobject" + "CVE-2022-28389": { + "cmt_msg": "can: mcba_usb: mcba_usb_start_xmit(): fix double dev_kfree_skb in error path" }, - "CVE-2019-15917": { - "cmt_msg": "Bluetooth: hci_ldisc: Postpone HCI_UART_PROTO_READY bit set in hci_uart_set_proto()" + "CVE-2022-28388": { + "cmt_msg": "can: usb_8dev: usb_8dev_start_xmit(): fix double dev_kfree_skb() in error path" }, - "CVE-2017-18344": { - "cmt_msg": "posix-timer: Properly check sigevent->sigev_notify" + "CVE-2022-41218": { + "cmt_msg": "media: dvb-core: Fix UAF due to refcount races at releasing" }, - "CVE-2018-6412": { - "cmt_msg": "fbdev: Fixing arbitrary kernel leak in case FBIOGETCMAP_SPARC in sbusfb_ioctl_helper()." + "CVE-2022-47518": { + "cmt_msg": "wifi: wilc1000: validate number of channels" }, - "CVE-2017-15265": { - "cmt_msg": "ALSA: seq: Fix use-after-free at creating a port" + "CVE-2023-52444": { + "cmt_msg": "f2fs: fix to avoid dirent corruption" }, - "CVE-2021-27363": { - "cmt_msg": "scsi: iscsi: Restrict sessions and handles to admin capabilities" + "CVE-2024-26768": { + "cmt_msg": "LoongArch: Change acpi_core_pic[NR_CPUS] to acpi_core_pic[MAX_CORE_PIC]" }, "CVE-2020-12362": { "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" @@ -89192,99 +121114,84 @@ "CVE-2020-12363": { "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" }, - "CVE-2019-12881": { - "cmt_msg": "drm/i915/userptr: reject zero user_size" - }, "CVE-2022-4129": { "cmt_msg": "l2tp: Serialize access to sk_user_data with sk_callback_lock" }, - "CVE-2023-3117": { - "cmt_msg": "netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE" - }, - "CVE-2018-1000004": { - "cmt_msg": "ALSA: seq: Make ioctls race-free" + "CVE-2020-12364": { + "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" }, - "CVE-2022-47520": { - "cmt_msg": "wifi: wilc1000: validate pairwise and authentication suite offsets" + "CVE-2024-26646": { + "cmt_msg": "thermal: intel: hfi: Add syscore callbacks for system-wide PM" }, - "CVE-2018-18690": { - "cmt_msg": "xfs: don't fail when converting shortform attr to long form during ATTR_REPLACE" + "CVE-2024-26647": { + "cmt_msg": "drm/amd/display: Fix late derefrence 'dsc' check in 'link_set_dsc_pps_packet()'" }, - "CVE-2019-19533": { - "cmt_msg": "media: ttusb-dec: Fix info-leak in ttusb_dec_send_command()" + "CVE-2024-26644": { + "cmt_msg": "btrfs: don't abort filesystem when attempting to snapshot deleted subvolume" }, - "CVE-2017-0627": { - "cmt_msg": "media: uvcvideo: Prevent heap overflow when accessing mapped controls" + "CVE-2020-25639": { + "cmt_msg": "drm/nouveau: bail out of nouveau_channel_new if channel init fails" }, - "CVE-2020-36558": { - "cmt_msg": "vt: vt_ioctl: fix race in VT_RESIZEX" + "CVE-2023-33203": { + "cmt_msg": "net: qcom/emac: Fix use after free bug in emac_remove due to race condition" }, - "CVE-2016-7915": { - "cmt_msg": "HID: core: prevent out-of-bound readings" + "CVE-2024-26640": { + "cmt_msg": "tcp: add sanity checks to rx zerocopy" }, - "CVE-2016-7914": { - "cmt_msg": "assoc_array: don't call compare_object() on a node" + "CVE-2024-26641": { + "cmt_msg": "ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv()" }, - "CVE-2016-7917": { - "cmt_msg": "netfilter: nfnetlink: correctly validate length of batch messages" + "CVE-2021-4001": { + "cmt_msg": "bpf: Fix toctou on read-only map's constant scalar tracking" }, - "CVE-2016-7916": { - "cmt_msg": "proc: prevent accessing /proc//environ until it's ready" + "CVE-2021-4002": { + "cmt_msg": "hugetlbfs: flush TLBs correctly after huge_pmd_unshare" }, - "CVE-2016-7911": { - "cmt_msg": "block: fix use-after-free in sys_ioprio_get()" + "CVE-2023-26545": { + "cmt_msg": "net: mpls: fix stale pointer if allocation fails during device rename" }, - "CVE-2016-7910": { - "cmt_msg": "block: fix use-after-free in seq file" + "CVE-2022-1055": { + "cmt_msg": "net: sched: fix use-after-free in tc_new_tfilter()" }, - "CVE-2016-7913": { - "cmt_msg": "[media] xc2028: avoid use after free" + "CVE-2023-50431": { + "cmt_msg": "accel/habanalabs: fix information leak in sec_attest_info()" }, - "CVE-2016-7912": { - "cmt_msg": "usb: gadget: f_fs: Fix use-after-free" + "CVE-2023-52445": { + "cmt_msg": "media: pvrusb2: fix use after free on context disconnection" }, - "CVE-2021-38204": { - "cmt_msg": "usb: max-3421: Prevent corruption of freed memory" + "CVE-2022-20008": { + "cmt_msg": "mmc: block: fix read single on recovery logic" }, - "CVE-2022-34918": { - "cmt_msg": "netfilter: nf_tables: stricter validation of element data" + "CVE-2023-3117": { + "cmt_msg": "netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE" }, - "CVE-2019-16232": { - "cmt_msg": "libertas: fix a potential NULL pointer dereference" + "CVE-2024-26791": { + "cmt_msg": "btrfs: dev-replace: properly validate device names" }, - "CVE-2019-20811": { - "cmt_msg": "net-sysfs: call dev_hold if kobject_init_and_add success" + "CVE-2023-32269": { + "cmt_msg": "netrom: Fix use-after-free caused by accept on already connected socket" }, - "CVE-2019-20810": { - "cmt_msg": "media: go7007: fix a miss of snd_card_free" + "CVE-2023-52464": { + "cmt_msg": "EDAC/thunderx: Fix possible out-of-bounds string access" }, - "CVE-2019-20812": { - "cmt_msg": "af_packet: set defaule value for tmo" + "CVE-2023-52463": { + "cmt_msg": "efivarfs: force RO when remounting if SetVariable is not supported" }, - "CVE-2023-1990": { - "cmt_msg": "nfc: st-nci: Fix use after free bug in ndlc_remove due to race condition" + "CVE-2023-3111": { + "cmt_msg": "btrfs: unset reloc control if transaction commit fails in prepare_to_relocate()" }, - "CVE-2019-19530": { - "cmt_msg": "usb: cdc-acm: make sure a refcount is taken early enough" + "CVE-2021-3411": { + "cmt_msg": "x86/kprobes: Fix optprobe to detect INT3 padding correctly" }, "CVE-2023-6040": { "cmt_msg": "netfilter: nf_tables: Reject tables of unsupported family" }, - "CVE-2018-5391": { - "cmt_msg": "ip: discard IPv4 datagrams with overlapping segments." + "CVE-2021-31440": { + "cmt_msg": "bpf: Fix propagation of 32 bit unsigned bounds from 64 bit bounds" }, "CVE-2022-26373": { "cmt_msg": "x86/speculation: Add RSB VM Exit protections" }, - "CVE-2018-5995": { - "cmt_msg": "printk: hash addresses printed with %p" - }, - "CVE-2018-18386": { - "cmt_msg": "n_tty: fix EXTPROC vs ICANON interaction with TIOCINQ (aka FIONREAD)" - }, - "CVE-2019-15291": { - "cmt_msg": "media: b2c2-flexcop-usb: add sanity checking" - }, "CVE-2019-15290": { "cmt_msg": "" }, @@ -89294,14 +121201,11 @@ "CVE-2024-23848": { "cmt_msg": "" }, - "CVE-2022-24448": { - "cmt_msg": "NFSv4: Handle case where the lookup of a directory fails" - }, - "CVE-2018-7273": { - "cmt_msg": "printk: hash addresses printed with %p" + "CVE-2023-1295": { + "cmt_msg": "io_uring: get rid of intermediate IORING_OP_CLOSE stage" }, - "CVE-2023-52444": { - "cmt_msg": "f2fs: fix to avoid dirent corruption" + "CVE-2021-47159": { + "cmt_msg": "net: dsa: fix a crash if ->get_sset_count() fails" }, "CVE-2022-0617": { "cmt_msg": "udf: Fix NULL ptr deref when converting from inline format" @@ -89309,17 +121213,23 @@ "CVE-2023-4459": { "cmt_msg": "net: vmxnet3: fix possible NULL pointer dereference in vmxnet3_rq_cleanup()" }, - "CVE-2023-52457": { - "cmt_msg": "serial: 8250: omap: Don't skip resource freeing if pm_runtime_resume_and_get() failed" + "CVE-2024-26625": { + "cmt_msg": "llc: call sock_orphan() at release time" }, - "CVE-2022-23036": { - "cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()" + "CVE-2024-26635": { + "cmt_msg": "llc: Drop support for ETH_P_TR_802_2." + }, + "CVE-2023-52639": { + "cmt_msg": "KVM: s390: vsie: fix race during shadow creation" }, "CVE-2022-2153": { "cmt_msg": "KVM: x86: Avoid theoretical NULL pointer dereference in kvm_irq_delivery_to_apic_fast()" }, - "CVE-2019-19531": { - "cmt_msg": "usb: yurex: Fix use-after-free in yurex_delete" + "CVE-2022-20568": { + "cmt_msg": "Merge tag 'io_uring-worker.v3-2021-02-25' of git://git.kernel.dk/linux-block" + }, + "CVE-2024-2193": { + "cmt_msg": "" }, "CVE-2022-20566": { "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free caused by l2cap_chan_put" @@ -89330,332 +121240,293 @@ "CVE-2018-12931": { "cmt_msg": "" }, - "CVE-2023-0030": { - "cmt_msg": "drm/nouveau/mmu: add more general vmm free/node handling functions" - }, - "CVE-2017-7308": { - "cmt_msg": "net/packet: fix overflow in check for priv area size" - }, - "CVE-2024-23196": { - "cmt_msg": "" + "CVE-2023-52637": { + "cmt_msg": "can: j1939: Fix UAF in j1939_sk_match_filter during setsockopt(SO_J1939_FILTER)" }, - "CVE-2016-0758": { - "cmt_msg": "KEYS: Fix ASN.1 indefinite length object parsing" + "CVE-2023-1990": { + "cmt_msg": "nfc: st-nci: Fix use after free bug in ndlc_remove due to race condition" }, - "CVE-2020-12769": { - "cmt_msg": "spi: spi-dw: Add lock protect dw_spi rx/tx to prevent concurrent calls" + "CVE-2024-26583": { + "cmt_msg": "tls: fix race between async notify and socket close" }, - "CVE-2021-39636": { - "cmt_msg": "netfilter: x_tables: fix pointer leaks to userspace" + "CVE-2023-3863": { + "cmt_msg": "net: nfc: Fix use-after-free caused by nfc_llcp_find_local" }, - "CVE-2017-8890": { - "cmt_msg": "dccp/tcp: do not inherit mc_list from parent" + "CVE-2021-33098": { + "cmt_msg": "ixgbe: fix large MTU request from VF" }, - "CVE-2022-4662": { - "cmt_msg": "USB: core: Prevent nested device-reset calls" + "CVE-2021-28972": { + "cmt_msg": "PCI: rpadlpar: Fix potential drc_name corruption in store functions" }, - "CVE-2021-32399": { - "cmt_msg": "bluetooth: eliminate the potential race condition when removing the HCI controller" + "CVE-2021-28971": { + "cmt_msg": "perf/x86/intel: Fix a crash caused by zero PEBS status" }, - "CVE-2021-45868": { - "cmt_msg": "quota: check block number when reading the block in quota file" + "CVE-2023-52634": { + "cmt_msg": "drm/amd/display: Fix disable_otg_wa logic" }, - "CVE-2019-12380": { - "cmt_msg": "efi/x86/Add missing error handling to old_memmap 1:1 mapping code" + "CVE-2022-22942": { + "cmt_msg": "drm/vmwgfx: Fix stale file descriptors on failed usercopy" }, - "CVE-2019-12381": { - "cmt_msg": "ip_sockglue: Fix missing-check bug in ip_ra_control()" + "CVE-2021-3739": { + "cmt_msg": "btrfs: fix NULL pointer dereference when deleting device by invalid id" }, - "CVE-2019-12382": { - "cmt_msg": "drm/edid: Fix a missing-check bug in drm_load_edid_firmware()" + "CVE-2020-36782": { + "cmt_msg": "i2c: imx-lpi2c: fix reference leak when pm_runtime_get_sync fails" }, - "CVE-2017-10810": { - "cmt_msg": "drm/virtio: don't leak bo on drm_gem_object_init failure" + "CVE-2020-36783": { + "cmt_msg": "i2c: img-scb: fix reference leak when pm_runtime_get_sync fails" }, - "CVE-2020-12364": { - "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" + "CVE-2020-36780": { + "cmt_msg": "i2c: sprd: fix reference leak when pm_runtime_get_sync fails" }, - "CVE-2020-8648": { - "cmt_msg": "vt: selection, close sel_buffer race" + "CVE-2020-36781": { + "cmt_msg": "i2c: imx: fix reference leak when pm_runtime_get_sync fails" }, - "CVE-2017-12146": { - "cmt_msg": "driver core: platform: fix race condition with driver_override" + "CVE-2024-26808": { + "cmt_msg": "netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain" }, "CVE-2021-3732": { "cmt_msg": "ovl: prevent private clone if bind mount is not allowed" }, - "CVE-2016-9588": { - "cmt_msg": "kvm: nVMX: Allow L1 to intercept software exceptions (#BP and #OF)" - }, - "CVE-2022-25375": { - "cmt_msg": "usb: gadget: rndis: check size of RNDIS_MSG_SET command" - }, - "CVE-2020-10766": { - "cmt_msg": "x86/speculation: Prevent rogue cross-process SSBD shutdown" - }, - "CVE-2017-13166": { - "cmt_msg": "media: v4l2-ioctl.c: use check_fmt for enum/g/s/try_fmt" + "CVE-2020-36784": { + "cmt_msg": "i2c: cadence: fix reference leak when pm_runtime_get_sync fails" }, - "CVE-2018-12207": { - "cmt_msg": "kvm: x86, powerpc: do not allow clearing largepages debugfs entry" + "CVE-2020-36785": { + "cmt_msg": "media: atomisp: Fix use after free in atomisp_alloc_css_stat_bufs()" }, - "CVE-2017-1000364": { - "cmt_msg": "mm: larger stack guard gap, between vmas" + "CVE-2024-24860": { + "cmt_msg": "Bluetooth: Fix atomicity violation in {min,max}_key_size_set" }, - "CVE-2017-1000365": { - "cmt_msg": "fs/exec.c: account for argv/envp pointers" + "CVE-2020-27835": { + "cmt_msg": "IB/hfi1: Ensure correct mm is used at all times" }, - "CVE-2020-13143": { - "cmt_msg": "USB: gadget: fix illegal array access in binding with UDC" + "CVE-2019-25162": { + "cmt_msg": "i2c: Fix a potential use after free" }, - "CVE-2023-5178": { - "cmt_msg": "nvmet-tcp: Fix a possible UAF in queue intialization setup" + "CVE-2024-24861": { + "cmt_msg": "media: xc4000: Fix atomicity violation in xc4000_get_frequency" }, - "CVE-2020-10768": { - "cmt_msg": "x86/speculation: PR_SPEC_FORCE_DISABLE enforcement for indirect branches." + "CVE-2024-26627": { + "cmt_msg": "scsi: core: Move scsi_host_busy() out of host lock for waking up EH handler" }, - "CVE-2017-13168": { - "cmt_msg": "scsi: sg: mitigate read/write abuse" + "CVE-2023-0240": { + "cmt_msg": "io_uring: COW io_identity on mismatch" }, - "CVE-2017-1000363": { - "cmt_msg": "char: lp: fix possible integer overflow in lp_setup()" + "CVE-2021-35039": { + "cmt_msg": "module: limit enabling module.sig_enforce" }, - "CVE-2016-3157": { - "cmt_msg": "x86/iopl/64: Properly context-switch IOPL on Xen PV" + "CVE-2024-25740": { + "cmt_msg": "" }, - "CVE-2016-3156": { - "cmt_msg": "ipv4: Don't do expensive useless work during inetdev destroy." + "CVE-2022-3535": { + "cmt_msg": "net: mvpp2: fix mvpp2 debugfs leak" }, - "CVE-2019-17075": { - "cmt_msg": "RDMA/cxgb4: Do not dma memory off of the stack" + "CVE-2024-26645": { + "cmt_msg": "tracing: Ensure visibility when inserting an element into tracing_map" }, - "CVE-2016-5696": { - "cmt_msg": "tcp: make challenge acks less predictable" + "CVE-2022-3903": { + "cmt_msg": "media: mceusb: Use new usb_control_msg_*() routines" }, - "CVE-2022-23960": { - "cmt_msg": "ARM: report Spectre v2 status through sysfs" + "CVE-2024-26642": { + "cmt_msg": "netfilter: nf_tables: disallow anonymous set with timeout flag" }, - "CVE-2023-39189": { - "cmt_msg": "netfilter: nfnetlink_osf: avoid OOB read" + "CVE-2022-3577": { + "cmt_msg": "HID: bigben: fix slab-out-of-bounds Write in bigben_probe" }, "CVE-2023-20588": { "cmt_msg": "x86/CPU/AMD: Do not leak quotient data after a division by 0" }, - "CVE-2020-10942": { - "cmt_msg": "vhost: Check docket sk_family instead of call getname" - }, - "CVE-2018-3693": { - "cmt_msg": "ext4: fix spectre gadget in ext4_mb_regular_allocator()" - }, - "CVE-2017-15299": { - "cmt_msg": "KEYS: don't let add_key() update an uninstantiated key" - }, - "CVE-2017-0750": { - "cmt_msg": "f2fs: do more integrity verification for superblock" - }, - "CVE-2023-3338": { - "cmt_msg": "Remove DECnet support from kernel" + "CVE-2021-47071": { + "cmt_msg": "uio_hv_generic: Fix a memory leak in error handling paths" }, - "CVE-2019-11190": { - "cmt_msg": "binfmt_elf: switch to new creds when switching to new mm" - }, - "CVE-2019-11191": { - "cmt_msg": "x86: Deprecate a.out support" - }, - "CVE-2022-20368": { - "cmt_msg": "net/packet: fix slab-out-of-bounds access in packet_recvmsg()" + "CVE-2021-47070": { + "cmt_msg": "uio_hv_generic: Fix another memory leak in error handling paths" }, - "CVE-2016-1575": { - "cmt_msg": "ovl: setattr: check permissions before copy-up" + "CVE-2021-47073": { + "cmt_msg": "platform/x86: dell-smbios-wmi: Fix oops on rmmod dell_smbios" }, - "CVE-2016-5195": { - "cmt_msg": "mm: remove gup_flags FOLL_WRITE games from __get_user_pages()" + "CVE-2022-4378": { + "cmt_msg": "proc: proc_skip_spaces() shouldn't think it is working on C strings" }, - "CVE-2016-1576": { - "cmt_msg": "ovl: setattr: check permissions before copy-up" + "CVE-2021-47075": { + "cmt_msg": "nvmet: fix memory leak in nvmet_alloc_ctrl()" }, - "CVE-2023-35001": { - "cmt_msg": "netfilter: nf_tables: prevent OOB access in nft_byteorder_eval" + "CVE-2021-47074": { + "cmt_msg": "nvme-loop: fix memory leak in nvme_loop_create_ctrl()" }, - "CVE-2018-10323": { - "cmt_msg": "xfs: set format back to extents if xfs_bmap_extents_to_btree" + "CVE-2021-47077": { + "cmt_msg": "scsi: qedf: Add pointer checks in qedf_update_link_speed()" }, - "CVE-2018-10322": { - "cmt_msg": "xfs: enhance dinode verifier" + "CVE-2021-47076": { + "cmt_msg": "RDMA/rxe: Return CQE error if invalid lkey was supplied" }, - "CVE-2023-1989": { - "cmt_msg": "Bluetooth: btsdio: fix use after free bug in btsdio_remove due to unfinished work" + "CVE-2021-47170": { + "cmt_msg": "USB: usbfs: Don't WARN about excessively large memory allocations" }, - "CVE-2017-7895": { - "cmt_msg": "nfsd: stricter decoding of write-like NFSv2/v3 ops" + "CVE-2021-47078": { + "cmt_msg": "RDMA/rxe: Clear all QP fields if creation failed" }, - "CVE-2021-0447": { - "cmt_msg": "l2tp: protect sock pointer of struct pppol2tp_session with RCU" + "CVE-2021-47172": { + "cmt_msg": "iio: adc: ad7124: Fix potential overflow due to non sequential channel numbers" }, - "CVE-2017-8824": { - "cmt_msg": "dccp: CVE-2017-8824: use-after-free in DCCP code" + "CVE-2021-47173": { + "cmt_msg": "misc/uss720: fix memory leak in uss720_probe" }, - "CVE-2018-7492": { - "cmt_msg": "rds: Fix NULL pointer dereference in __rds_rdma_map" + "CVE-2021-47174": { + "cmt_msg": "netfilter: nft_set_pipapo_avx2: Add irq_fpu_usable() check, fallback to non-AVX2 version" }, - "CVE-2020-26139": { - "cmt_msg": "mac80211: do not accept/forward invalid EAPOL frames" + "CVE-2021-47175": { + "cmt_msg": "net/sched: fq_pie: fix OOB access in the traffic path" }, - "CVE-2019-10220": { - "cmt_msg": "Convert filldir[64]() from __put_user() to unsafe_put_user()" + "CVE-2021-47177": { + "cmt_msg": "iommu/vt-d: Fix sysfs leak in alloc_iommu()" }, - "CVE-2017-7495": { - "cmt_msg": "ext4: fix data exposure after a crash" + "CVE-2021-46951": { + "cmt_msg": "tpm: efi: Use local variable for calculating final log size" }, - "CVE-2023-26545": { - "cmt_msg": "net: mpls: fix stale pointer if allocation fails during device rename" + "CVE-2021-46950": { + "cmt_msg": "md/raid1: properly indicate failure when ending a failed write request" }, - "CVE-2017-13305": { - "cmt_msg": "KEYS: encrypted: fix buffer overread in valid_master_desc()" + "CVE-2021-46953": { + "cmt_msg": "ACPI: GTDT: Don't corrupt interrupt mappings on watchdow probe failure" }, - "CVE-2016-6136": { - "cmt_msg": "audit: fix a double fetch in audit_log_single_execve_arg()" + "CVE-2021-46952": { + "cmt_msg": "NFS: fs_context: validate UDP retrans to prevent shift out-of-bounds" }, - "CVE-2019-19536": { - "cmt_msg": "can: peak_usb: pcan_usb_pro: Fix info-leaks to USB devices" + "CVE-2021-46955": { + "cmt_msg": "openvswitch: fix stack OOB read while fragmenting IPv4 packets" }, - "CVE-2019-19537": { - "cmt_msg": "USB: core: Fix races in character device registration and deregistraion" + "CVE-2021-46956": { + "cmt_msg": "virtiofs: fix memory leak in virtio_fs_probe()" }, - "CVE-2019-19534": { - "cmt_msg": "can: peak_usb: fix slab info leak" + "CVE-2021-46959": { + "cmt_msg": "spi: Fix use-after-free with devm_spi_alloc_*" }, - "CVE-2018-18281": { - "cmt_msg": "mremap: properly flush TLB before releasing the page" + "CVE-2021-46958": { + "cmt_msg": "btrfs: fix race between transaction aborts and fsyncs leading to use-after-free" }, - "CVE-2019-19532": { - "cmt_msg": "HID: Fix assumption that devices have inputs" + "CVE-2020-26139": { + "cmt_msg": "mac80211: do not accept/forward invalid EAPOL frames" }, - "CVE-2019-11479": { - "cmt_msg": "tcp: add tcp_min_snd_mss sysctl" + "CVE-2023-42754": { + "cmt_msg": "ipv4: fix null-deref in ipv4_link_failure" }, - "CVE-2019-10638": { - "cmt_msg": "inet: switch IP ID generator to siphash" + "CVE-2024-26772": { + "cmt_msg": "ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal()" }, - "CVE-2019-10639": { - "cmt_msg": "netns: provide pure entropy for net_hash_mix()" + "CVE-2022-3061": { + "cmt_msg": "video: fbdev: i740fb: Error out if 'pixclock' equals zero" }, - "CVE-2021-0929": { - "cmt_msg": "staging/android/ion: delete dma_buf->kmap/unmap implemenation" + "CVE-2021-3609": { + "cmt_msg": "can: bcm: delay release of struct bcm_op after synchronize_rcu()" }, - "CVE-2019-11478": { - "cmt_msg": "tcp: tcp_fragment() should apply sane memory limits" + "CVE-2023-52595": { + "cmt_msg": "wifi: rt2x00: restart beacon queue when hardware reset" }, - "CVE-2018-19985": { - "cmt_msg": "USB: hso: Fix OOB memory access in hso_probe/hso_get_config_data" + "CVE-2024-26778": { + "cmt_msg": "fbdev: savage: Error out if pixclock equals zero" }, - "CVE-2016-6156": { - "cmt_msg": "platform/chrome: cros_ec_dev - double fetch bug in ioctl" + "CVE-2022-0847": { + "cmt_msg": "lib/iov_iter: initialize \"flags\" in new pipe_buffer" }, - "CVE-2017-18257": { - "cmt_msg": "f2fs: fix a dead loop in f2fs_fiemap()" + "CVE-2021-3600": { + "cmt_msg": "bpf: Fix 32 bit src register truncation on div/mod" }, - "CVE-2023-6546": { - "cmt_msg": "tty: n_gsm: fix the UAF caused by race condition in gsm_cleanup_mux" + "CVE-2021-23133": { + "cmt_msg": "net/sctp: fix race condition in sctp_destroy_sock" }, - "CVE-2017-18255": { - "cmt_msg": "perf/core: Fix the perf_cpu_time_max_percent check" + "CVE-2022-2327": { + "cmt_msg": "io_uring: remove any grabbing of context" }, - "CVE-2017-7273": { - "cmt_msg": "HID: hid-cypress: validate length of report" + "CVE-2023-52590": { + "cmt_msg": "ocfs2: Avoid touching renamed directory if parent does not change" }, - "CVE-2018-5953": { - "cmt_msg": "printk: hash addresses printed with %p" + "CVE-2021-0920": { + "cmt_msg": "af_unix: fix garbage collect vs MSG_PEEK" }, - "CVE-2016-7097": { - "cmt_msg": "posix_acl: Clear SGID bit when setting file permissions" + "CVE-2024-26675": { + "cmt_msg": "ppp_async: limit MRU to 64K" }, - "CVE-2016-3713": { - "cmt_msg": "KVM: MTRR: remove MSR 0x2f8" + "CVE-2023-52597": { + "cmt_msg": "KVM: s390: fix setting of fpc register" }, - "CVE-2023-51043": { - "cmt_msg": "drm/atomic: Fix potential use-after-free in nonblocking commits" + "CVE-2024-26622": { + "cmt_msg": "tomoyo: fix UAF write bug in tomoyo_write_control()" }, "CVE-2020-28374": { "cmt_msg": "scsi: target: Fix XCOPY NAA identifier lookup" }, - "CVE-2019-9213": { - "cmt_msg": "mm: enforce min addr even if capable() in expand_downwards()" - }, - "CVE-2023-2007": { - "cmt_msg": "scsi: dpt_i2o: Remove obsolete driver" - }, "CVE-2023-0615": { "cmt_msg": "media: vivid: dev->bitmap_cap wasn't freed in all cases" }, - "CVE-2017-7472": { - "cmt_msg": "KEYS: fix keyctl_set_reqkey_keyring() to not leak thread keyrings" - }, - "CVE-2017-16535": { - "cmt_msg": "USB: core: fix out-of-bounds access bug in usb_get_bos_descriptor()" + "CVE-2024-26672": { + "cmt_msg": "drm/amdgpu: Fix variable 'mca_funcs' dereferenced before NULL check in 'amdgpu_mca_smu_get_mca_entry()'" }, - "CVE-2019-14897": { - "cmt_msg": "libertas: Fix two buffer overflows at parsing bss descriptor" + "CVE-2023-52527": { + "cmt_msg": "ipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data()" }, - "CVE-2017-16537": { - "cmt_msg": "media: imon: Fix null-ptr-deref in imon_probe" + "CVE-2023-3006": { + "cmt_msg": "arm64: Add AMPERE1 to the Spectre-BHB affected list" }, - "CVE-2017-16536": { - "cmt_msg": "[media] cx231xx-cards: fix NULL-deref on missing association descriptor" + "CVE-2024-26787": { + "cmt_msg": "mmc: mmci: stm32: fix DMA API overlapping mappings warning" }, - "CVE-2017-16531": { - "cmt_msg": "USB: fix out-of-bounds in usb_set_configuration" + "CVE-2023-52522": { + "cmt_msg": "net: fix possible store tearing in neigh_periodic_work()" }, - "CVE-2017-16530": { - "cmt_msg": "USB: uas: fix bug in handling of alternate settings" + "CVE-2022-3586": { + "cmt_msg": "sch_sfb: Don't assume the skb is still around after enqueueing to child" }, - "CVE-2017-16533": { - "cmt_msg": "HID: usbhid: fix out-of-bounds bug" + "CVE-2024-0641": { + "cmt_msg": "tipc: fix a potential deadlock on &tx->lock" }, - "CVE-2017-16532": { - "cmt_msg": "usb: usbtest: fix NULL pointer dereference" + "CVE-2024-26636": { + "cmt_msg": "llc: make llc_ui_sendmsg() more robust against bonding changes" }, - "CVE-2024-26592": { - "cmt_msg": "ksmbd: fix UAF issue in ksmbd_tcp_new_connection()" + "CVE-2024-26779": { + "cmt_msg": "wifi: mac80211: fix race condition on enabling fast-xmit" }, - "CVE-2017-16538": { - "cmt_msg": "media: dvb-usb-v2: lmedm04: Improve logic checking of warm start" + "CVE-2024-26586": { + "cmt_msg": "mlxsw: spectrum_acl_tcam: Fix stack corruption" }, - "CVE-2023-3006": { - "cmt_msg": "arm64: Add AMPERE1 to the Spectre-BHB affected list" + "CVE-2023-52528": { + "cmt_msg": "net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg" }, "CVE-2020-27825": { "cmt_msg": "tracing: Fix race in trace_open and buffer resize call" }, - "CVE-2016-9084": { - "cmt_msg": "vfio/pci: Fix integer overflows, bitmask check" - }, - "CVE-2019-19813": { - "cmt_msg": "btrfs: inode: Verify inode mode to avoid NULL pointer dereference" + "CVE-2024-26623": { + "cmt_msg": "pds_core: Prevent race issues involving the adminq" }, "CVE-2020-27820": { "cmt_msg": "drm/nouveau: use drm_dev_unplug() during device removal" }, - "CVE-2016-9083": { - "cmt_msg": "vfio/pci: Fix integer overflows, bitmask check" + "CVE-2023-1872": { + "cmt_msg": "io_uring: propagate issue_flags state down to file assignment" }, - "CVE-2019-11815": { - "cmt_msg": "net: rds: force to destroy connection if t_sock is NULL in rds_tcp_kill_sock()." + "CVE-2024-25744": { + "cmt_msg": "x86/coco: Disable 32-bit emulation by default on TDX and SEV" }, - "CVE-2017-18221": { - "cmt_msg": "mlock: fix mlock count can not decrease in race condition" + "CVE-2023-1078": { + "cmt_msg": "rds: rds_rm_zerocopy_callback() use list_first_entry()" + }, + "CVE-2023-39197": { + "cmt_msg": "netfilter: conntrack: dccp: copy entire header to stack buffer, not just basic one" + }, + "CVE-2021-47151": { + "cmt_msg": "interconnect: qcom: bcm-voter: add a missing of_node_put()" }, "CVE-2023-4622": { "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES" }, - "CVE-2019-20794": { - "cmt_msg": "" + "CVE-2020-26558": { + "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical" }, "CVE-2023-39193": { "cmt_msg": "netfilter: xt_sctp: validate the flag_info count" }, - "CVE-2023-39192": { - "cmt_msg": "netfilter: xt_u32: validate user space input" + "CVE-2023-1079": { + "cmt_msg": "HID: asus: use spinlock to safely schedule workers" }, "CVE-2020-26541": { "cmt_msg": "certs: Add EFI_CERT_X509_GUID support for dbx entries" @@ -89663,44 +121534,50 @@ "CVE-2023-6610": { "cmt_msg": "smb: client: fix potential OOB in smb2_dump_detail()" }, - "CVE-2020-26559": { - "cmt_msg": "" + "CVE-2024-26600": { + "cmt_msg": "phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP" }, - "CVE-2021-20317": { - "cmt_msg": "lib/timerqueue: Rely on rbtree semantics for next timer" + "CVE-2023-3390": { + "cmt_msg": "netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE" }, - "CVE-2021-43389": { - "cmt_msg": "isdn: cpai: check ctr->cnr to avoid array index out of bound" + "CVE-2023-28328": { + "cmt_msg": "media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer()" }, - "CVE-2017-14156": { - "cmt_msg": "video: fbdev: aty: do not leak uninitialized padding in clk to userspace" + "CVE-2020-26143": { + "cmt_msg": "" }, "CVE-2021-33061": { "cmt_msg": "ixgbe: add improvement for MDD response functionality" }, - "CVE-2017-2671": { - "cmt_msg": "ping: implement proper locking" + "CVE-2024-26764": { + "cmt_msg": "fs/aio: Restrict kiocb_set_cancel_fn() to I/O submitted via libaio" }, - "CVE-2018-1092": { - "cmt_msg": "ext4: fail ext4_iget for root directory if unallocated" + "CVE-2024-26767": { + "cmt_msg": "drm/amd/display: fixed integer types and null check locations" }, - "CVE-2018-1093": { - "cmt_msg": "ext4: add validity checks for bitmap block numbers" + "CVE-2024-26766": { + "cmt_msg": "IB/hfi1: Fix sdma.h tx->num_descs off-by-one error" }, - "CVE-2017-18551": { - "cmt_msg": "i2c: core-smbus: prevent stack corruption on read I2C_BLOCK_DATA" + "CVE-2024-26589": { + "cmt_msg": "bpf: Reject variable offset alu on PTR_TO_FLOW_KEYS" }, - "CVE-2023-1074": { - "cmt_msg": "sctp: fail if no bound addresses can be used for a given scope" + "CVE-2023-3389": { + "cmt_msg": "io_uring: mutex locked poll hashing" }, - "CVE-2017-18552": { - "cmt_msg": "RDS: validate the requested traces user input against max supported" + "CVE-2023-1476": { + "cmt_msg": "" }, - "CVE-2021-26931": { - "cmt_msg": "xen-blkback: don't \"handle\" error by BUG()" + "CVE-2023-4010": { + "cmt_msg": "" }, - "CVE-2015-8839": { - "cmt_msg": "ext4: fix races between page faults and hole punching" + "CVE-2021-3864": { + "cmt_msg": "" + }, + "CVE-2024-26770": { + "cmt_msg": "HID: nvidia-shield: Add missing null pointer checks to LED initialization" + }, + "CVE-2024-26584": { + "cmt_msg": "net: tls: handle backlogging of crypto requests" }, "CVE-2022-1652": { "cmt_msg": "floppy: use a statically allocated error counter" @@ -89708,71 +121585,62 @@ "CVE-2023-4623": { "cmt_msg": "net/sched: sch_hfsc: Ensure inner classes have fsc curve" }, - "CVE-2020-29568": { - "cmt_msg": "xen/xenbus: Allow watches discard events before queueing" - }, - "CVE-2019-9457": { - "cmt_msg": "exec: Limit arg stack to at most 75% of _STK_LIM" - }, - "CVE-2019-19054": { - "cmt_msg": "media: rc: prevent memory leak in cx23888_ir_probe" - }, - "CVE-2019-19057": { - "cmt_msg": "mwifiex: pcie: Fix memory leak in mwifiex_pcie_init_evt_ring" + "CVE-2021-47043": { + "cmt_msg": "media: venus: core: Fix some resource leaks in the error path of 'venus_probe()'" }, - "CVE-2019-19056": { - "cmt_msg": "mwifiex: pcie: Fix memory leak in mwifiex_pcie_alloc_cmdrsp_buf" + "CVE-2024-23849": { + "cmt_msg": "net/rds: Fix UBSAN: array-index-out-of-bounds in rds_cmsg_recv" }, - "CVE-2016-10741": { - "cmt_msg": "xfs: don't BUG() on mixed direct and mapped I/O" + "CVE-2020-29568": { + "cmt_msg": "xen/xenbus: Allow watches discard events before queueing" }, - "CVE-2023-23039": { - "cmt_msg": "" + "CVE-2020-29569": { + "cmt_msg": "xen-blkback: set ring->xenblkd to NULL after kthread_stop()" }, - "CVE-2019-19052": { - "cmt_msg": "can: gs_usb: gs_can_open(): prevent memory leak" + "CVE-2023-52596": { + "cmt_msg": "sysctl: Fix out of bounds access for empty sysctl registers" }, - "CVE-2019-3846": { - "cmt_msg": "mwifiex: Fix possible buffer overflows at parsing bss descriptor" + "CVE-2023-51043": { + "cmt_msg": "drm/atomic: Fix potential use-after-free in nonblocking commits" }, - "CVE-2023-46838": { - "cmt_msg": "xen-netback: don't produce zero-size SKB frags" + "CVE-2022-1966": { + "cmt_msg": "netfilter: nf_tables: disallow non-stateful expression in sets earlier" }, - "CVE-2020-0427": { - "cmt_msg": "pinctrl: devicetree: Avoid taking direct reference to device name string" + "CVE-2022-38457": { + "cmt_msg": "drm/vmwgfx: Remove rcu locks from user resources" }, - "CVE-2019-17056": { - "cmt_msg": "nfc: enforce CAP_NET_RAW for raw sockets" + "CVE-2022-20132": { + "cmt_msg": "HID: add hid_is_usb() function to make it simpler for USB detection" }, - "CVE-2016-8666": { - "cmt_msg": "tunnels: Don't apply GRO to multiple layers of encapsulation." + "CVE-2022-2977": { + "cmt_msg": "tpm: fix reference counting for struct tpm_chip" }, - "CVE-2022-36946": { - "cmt_msg": "netfilter: nf_queue: do not allow packet truncation below transport header offset" + "CVE-2022-20424": { + "cmt_msg": "io_uring: remove io_identity" }, - "CVE-2021-39714": { - "cmt_msg": "staging: android: ion: Drop ion_map_kernel interface" + "CVE-2022-23222": { + "cmt_msg": "bpf: Replace PTR_TO_XXX_OR_NULL with PTR_TO_XXX | PTR_MAYBE_NULL" }, - "CVE-2023-39197": { - "cmt_msg": "netfilter: conntrack: dccp: copy entire header to stack buffer, not just basic one" + "CVE-2022-1789": { + "cmt_msg": "KVM: x86/mmu: fix NULL pointer dereference on guest INVPCID" }, - "CVE-2017-9242": { - "cmt_msg": "ipv6: fix out of bound writes in __ip6_append_data()" + "CVE-2023-25012": { + "cmt_msg": "HID: bigben: use spinlock to safely schedule workers" }, - "CVE-2022-1419": { - "cmt_msg": "drm/vgem: Close use-after-free race in vgem_gem_create" + "CVE-2016-8660": { + "cmt_msg": "" }, - "CVE-2020-14314": { - "cmt_msg": "ext4: fix potential negative array index in do_split()" + "CVE-2023-6270": { + "cmt_msg": "aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts" }, - "CVE-2023-3090": { - "cmt_msg": "ipvlan:Fix out-of-bounds caused by unclear skb->cb" + "CVE-2023-2156": { + "cmt_msg": "net: rpl: fix rpl header size calculation" }, - "CVE-2019-13272": { - "cmt_msg": "ptrace: Fix ->ptracer_cred handling for PTRACE_TRACEME" + "CVE-2022-20422": { + "cmt_msg": "arm64: fix oops in concurrently setting insn_emulation sysctls" }, - "CVE-2021-3587": { - "cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect" + "CVE-2023-3772": { + "cmt_msg": "xfrm: add NULL check in xfrm_update_ae_params" }, "CVE-2023-45862": { "cmt_msg": "USB: ene_usb6250: Allocate enough memory for full object" @@ -89780,20 +121648,14 @@ "CVE-2023-45863": { "cmt_msg": "kobject: Fix slab-out-of-bounds in fill_kobj_path()" }, - "CVE-2017-15537": { - "cmt_msg": "x86/fpu: Don't let userspace set bogus xcomp_bv" - }, - "CVE-2022-2588": { - "cmt_msg": "net_sched: cls_route: remove from list when handle is 0" - }, - "CVE-2019-17351": { - "cmt_msg": "xen: let alloc_xenballooned_pages() fail if not enough memory free" + "CVE-2023-1582": { + "cmt_msg": "fs/proc: task_mmu.c: don't read mapcount for migration entry" }, - "CVE-2020-36322": { - "cmt_msg": "fuse: fix bad inode" + "CVE-2021-47162": { + "cmt_msg": "tipc: skb_linearize the head skb when reassembling msgs" }, - "CVE-2022-23222": { - "cmt_msg": "bpf: Replace PTR_TO_XXX_OR_NULL with PTR_TO_XXX | PTR_MAYBE_NULL" + "CVE-2022-21166": { + "cmt_msg": "x86/speculation/mmio: Enable CPU Fill buffer clearing on idle" }, "CVE-2020-25669": { "cmt_msg": "Input: sunkbd - avoid use-after-free in teardown paths" @@ -89801,44 +121663,50 @@ "CVE-2020-25668": { "cmt_msg": "tty: make FONTX ioctl use the tty pointer they were actually passed" }, - "CVE-2008-4609": { - "cmt_msg": "" - }, - "CVE-2016-4470": { - "cmt_msg": "KEYS: potential uninitialized variable" - }, - "CVE-2021-0448": { - "cmt_msg": "netfilter: ctnetlink: add a range check for l3/l4 protonum" - }, - "CVE-2023-52458": { - "cmt_msg": "block: add check that partition length needs to be aligned with block size" - }, - "CVE-2023-40283": { - "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb" + "CVE-2020-25704": { + "cmt_msg": "perf/core: Fix a memory leak in perf_event_parse_addr_filter()" }, - "CVE-2018-19824": { - "cmt_msg": "ALSA: usb-audio: Fix UAF decrement if card has no live interfaces in card.c" + "CVE-2022-20421": { + "cmt_msg": "binder: fix UAF of ref->proc caused by race condition" }, - "CVE-2018-20854": { - "cmt_msg": "phy: ocelot-serdes: fix out-of-bounds read" + "CVE-2022-0435": { + "cmt_msg": "tipc: improve size validations for received domain records" }, - "CVE-2018-25020": { - "cmt_msg": "bpf: fix truncated jump targets on heavy expansions" + "CVE-2023-6356": { + "cmt_msg": "nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length" }, "CVE-2022-3533": { "cmt_msg": "" }, + "CVE-2024-26648": { + "cmt_msg": "drm/amd/display: Fix variable deferencing before NULL check in edp_setup_replay()" + }, + "CVE-2021-4135": { + "cmt_msg": "netdevsim: Zero-initialize memory for new map's value in function nsim_bpf_map_alloc" + }, "CVE-2023-26607": { "cmt_msg": "ntfs: fix out-of-bounds read in ntfs_attr_find()" }, - "CVE-2018-20855": { - "cmt_msg": "IB/mlx5: Fix leaking stack memory to userspace" + "CVE-2023-52513": { + "cmt_msg": "RDMA/siw: Fix connection failure handling" }, "CVE-2019-15239": { "cmt_msg": "unknown" }, - "CVE-2017-15129": { - "cmt_msg": "net: Fix double free and memory corruption in get_net_ns_by_id()" + "CVE-2022-3534": { + "cmt_msg": "libbpf: Fix use-after-free in btf_dump_name_dups" + }, + "CVE-2023-52635": { + "cmt_msg": "PM / devfreq: Synchronize devfreq_monitor_[start/stop]" + }, + "CVE-2023-52469": { + "cmt_msg": "drivers/amd/pm: fix a use-after-free in kv_parse_power_table" + }, + "CVE-2023-52594": { + "cmt_msg": "wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus()" + }, + "CVE-2023-4387": { + "cmt_msg": "net: vmxnet3: fix possible use-after-free bugs in vmxnet3_rq_alloc_rx_buf()" }, "CVE-2021-4037": { "cmt_msg": "xfs: fix up non-directory creation in SGID directories" @@ -89849,392 +121717,356 @@ "CVE-2022-45884": { "cmt_msg": "" }, - "CVE-2019-1999": { - "cmt_msg": "binder: fix race between munmap() and direct reclaim" + "CVE-2021-3348": { + "cmt_msg": "nbd: freeze the queue while we're adding connections" }, - "CVE-2018-1065": { - "cmt_msg": "netfilter: add back stackpointer size checks" + "CVE-2022-21505": { + "cmt_msg": "lockdown: Fix kexec lockdown bypass with ima policy" }, "CVE-2023-20941": { "cmt_msg": "" }, - "CVE-2018-1066": { - "cmt_msg": "CIFS: Enable encryption during session setup phase" - }, - "CVE-2018-20836": { - "cmt_msg": "scsi: libsas: fix a race condition when smp task timeout" - }, - "CVE-2018-1068": { - "cmt_msg": "netfilter: ebtables: CONFIG_COMPAT: don't trust userland offsets" + "CVE-2024-26773": { + "cmt_msg": "ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found()" }, - "CVE-2016-5400": { - "cmt_msg": "media: fix airspy usb probe error path" + "CVE-2023-2194": { + "cmt_msg": "i2c: xgene-slimpro: Fix out-of-bounds bug in xgene_slimpro_i2c_xfer()" }, - "CVE-2020-10135": { - "cmt_msg": "Bluetooth: Consolidate encryption handling in hci_encrypt_cfm" + "CVE-2021-3347": { + "cmt_msg": "futex: Ensure the correct return value from futex_lock_pi()" }, - "CVE-2020-25285": { - "cmt_msg": "mm/hugetlb: fix a race between hugetlb sysctl handlers" + "CVE-2021-47169": { + "cmt_msg": "serial: rp2: use 'request_firmware' instead of 'request_firmware_nowait'" }, - "CVE-2019-7308": { - "cmt_msg": "bpf: fix sanitation of alu op with pointer / scalar type from different paths" + "CVE-2024-26784": { + "cmt_msg": "pmdomain: arm: Fix NULL dereference on scmi_perf_domain removal" }, - "CVE-2020-11565": { - "cmt_msg": "mm: mempolicy: require at least one nodeid for MPOL_PREFERRED" + "CVE-2021-47168": { + "cmt_msg": "NFS: fix an incorrect limit in filelayout_decode_layout()" }, - "CVE-2016-8405": { - "cmt_msg": "fbdev: color map copying bounds checking" + "CVE-2021-3587": { + "cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect" }, - "CVE-2018-1000199": { - "cmt_msg": "perf/hwbp: Simplify the perf-hwbp code, fix documentation" + "CVE-2021-44733": { + "cmt_msg": "tee: handle lookup of shm with reference count 0" }, - "CVE-2022-1966": { - "cmt_msg": "netfilter: nf_tables: disallow non-stateful expression in sets earlier" + "CVE-2021-20268": { + "cmt_msg": "bpf: Fix signed_{sub,add32}_overflows type handling" }, - "CVE-2023-31084": { - "cmt_msg": "media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*()" + "CVE-2021-47138": { + "cmt_msg": "cxgb4: avoid accessing registers when clearing filters" }, - "CVE-2017-9986": { - "cmt_msg": "sound: Retire OSS" + "CVE-2021-47139": { + "cmt_msg": "net: hns3: put off calling register_netdev() until client initialize complete" }, - "CVE-2017-9985": { - "cmt_msg": "ALSA: msnd: Optimize / harden DSP and MIDI loops" + "CVE-2021-47135": { + "cmt_msg": "mt76: mt7921: fix possible AOOB issue in mt7921_mcu_tx_rate_report" }, - "CVE-2017-9984": { - "cmt_msg": "ALSA: msnd: Optimize / harden DSP and MIDI loops" + "CVE-2021-47136": { + "cmt_msg": "net: zero-initialize tc skb extension on allocation" }, - "CVE-2019-16995": { - "cmt_msg": "net: hsr: fix memory leak in hsr_dev_finalize()" + "CVE-2021-47137": { + "cmt_msg": "net: lantiq: fix memory corruption in RX ring" }, - "CVE-2019-19378": { - "cmt_msg": "" + "CVE-2021-47130": { + "cmt_msg": "nvmet: fix freeing unallocated p2pmem" }, - "CVE-2017-18075": { - "cmt_msg": "crypto: pcrypt - fix freeing pcrypt instances" + "CVE-2021-47131": { + "cmt_msg": "net/tls: Fix use-after-free after the TLS device goes down and up" }, - "CVE-2022-3534": { - "cmt_msg": "libbpf: Fix use-after-free in btf_dump_name_dups" + "CVE-2021-47133": { + "cmt_msg": "HID: amd_sfh: Fix memory leak in amd_sfh_work" }, - "CVE-2018-16862": { - "cmt_msg": "mm: cleancache: fix corruption on missed inode invalidation" + "CVE-2021-46994": { + "cmt_msg": "can: mcp251x: fix resume from sleep before interface was brought up" }, - "CVE-2016-10088": { - "cmt_msg": "sg_write()/bsg_write() is not fit to be called under KERNEL_DS" + "CVE-2021-22600": { + "cmt_msg": "net/packet: rx_owner_map depends on pg_vec" }, - "CVE-2021-20261": { - "cmt_msg": "floppy: fix lock_fdc() signal handling" + "CVE-2021-46991": { + "cmt_msg": "i40e: Fix use-after-free in i40e_client_subtask()" }, - "CVE-2020-36516": { - "cmt_msg": "ipv4: avoid using shared IP generator for connected sockets" + "CVE-2021-46993": { + "cmt_msg": "sched: Fix out-of-bound access in uclamp" }, - "CVE-2021-20265": { - "cmt_msg": "af_unix: fix struct pid memory leak" + "CVE-2021-46992": { + "cmt_msg": "netfilter: nftables: avoid overflows in nft_hash_buckets()" }, - "CVE-2017-18079": { - "cmt_msg": "Input: i8042 - fix crash at boot time" + "CVE-2023-6121": { + "cmt_msg": "nvmet: nul-terminate the NQNs passed in the connect command" }, - "CVE-2020-25284": { - "cmt_msg": "rbd: require global CAP_SYS_ADMIN for mapping and unmapping" + "CVE-2023-28327": { + "cmt_msg": "af_unix: Get user_ns from in_skb in unix_diag_get_exact()." }, - "CVE-2023-28328": { - "cmt_msg": "media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer()" + "CVE-2021-46999": { + "cmt_msg": "sctp: do asoc update earlier in sctp_sf_do_dupcook_a" }, - "CVE-2023-0386": { - "cmt_msg": "ovl: fail on invalid uid/gid mapping at copy up" + "CVE-2021-46998": { + "cmt_msg": "ethernet:enic: Fix a use after free bug in enic_hard_start_xmit" }, "CVE-2017-13693": { "cmt_msg": "" }, - "CVE-2020-0030": { - "cmt_msg": "ANDROID: binder: synchronize_rcu() when using POLLFREE." - }, - "CVE-2016-9685": { - "cmt_msg": "xfs: fix two memory leaks in xfs_attr_list.c error paths" - }, "CVE-2017-13694": { "cmt_msg": "" }, + "CVE-2022-42721": { + "cmt_msg": "wifi: cfg80211: avoid nontransmitted BSS list corruption" + }, + "CVE-2022-42720": { + "cmt_msg": "wifi: cfg80211: fix BSS refcounting bugs" + }, + "CVE-2022-42722": { + "cmt_msg": "wifi: mac80211: fix crash in beacon protection for P2P-device" + }, "CVE-2021-4149": { "cmt_msg": "btrfs: unlock newly allocated extent buffer after error" }, - "CVE-2022-21385": { - "cmt_msg": "net/rds: fix warn in rds_message_alloc_sgs" + "CVE-2021-4148": { + "cmt_msg": "mm: khugepaged: skip huge page collapse for special files" }, - "CVE-2021-3864": { - "cmt_msg": "" + "CVE-2022-42895": { + "cmt_msg": "Bluetooth: L2CAP: Fix attempting to access uninitialized memory" }, "CVE-2021-3640": { "cmt_msg": "Bluetooth: sco: Fix lock_sock() blockage by memcpy_from_msg()" }, - "CVE-2017-7618": { - "cmt_msg": "crypto: ahash - Fix EINPROGRESS notification callback" - }, - "CVE-2020-1749": { - "cmt_msg": "net: ipv6_stub: use ip6_dst_lookup_flow instead of ip6_dst_lookup" - }, - "CVE-2022-42896": { - "cmt_msg": "Bluetooth: L2CAP: Fix accepting connection request for invalid SPSM" + "CVE-2021-3764": { + "cmt_msg": "crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd()" }, "CVE-2021-3760": { "cmt_msg": "nfc: nci: fix the UAF of rf_conn_info object" }, - "CVE-2022-1786": { - "cmt_msg": "io_uring: remove io_identity" - }, - "CVE-2022-36123": { - "cmt_msg": "x86: Clear .brk area at early boot" - }, - "CVE-2022-3424": { - "cmt_msg": "misc: sgi-gru: fix use-after-free error in gru_set_context_option, gru_fault and gru_handle_user_call_os" + "CVE-2022-48627": { + "cmt_msg": "vt: fix memory overlapping when deleting chars in the buffer" }, - "CVE-2020-11608": { - "cmt_msg": "media: ov519: add missing endpoint sanity checks" + "CVE-2023-52593": { + "cmt_msg": "wifi: wfx: fix possible NULL pointer dereference in wfx_set_mfp_ap()" }, - "CVE-2020-10732": { - "cmt_msg": "fs/binfmt_elf.c: allocate initialized memory in fill_thread_core_info()" + "CVE-2022-4382": { + "cmt_msg": "USB: gadgetfs: Fix race between mounting and unmounting" }, - "CVE-2020-28097": { - "cmt_msg": "vgacon: remove software scrollback support" + "CVE-2021-47180": { + "cmt_msg": "NFC: nci: fix memory leak in nci_allocate_device" }, - "CVE-2017-7616": { - "cmt_msg": "mm/mempolicy.c: fix error handling in set_mempolicy and mbind." + "CVE-2022-48628": { + "cmt_msg": "ceph: drop messages from MDS when unmounting" }, - "CVE-2023-6931": { - "cmt_msg": "perf: Fix perf_event_validate_size()" + "CVE-2022-48629": { + "cmt_msg": "crypto: qcom-rng - ensure buffer for generate is completely filled" }, - "CVE-2017-18216": { - "cmt_msg": "ocfs2: subsystem.su_mutex is required while accessing the item->ci_parent" + "CVE-2022-4379": { + "cmt_msg": "NFSD: fix use-after-free in __nfs42_ssc_open()" }, - "CVE-2017-1000112": { - "cmt_msg": "udp: consistently apply ufo or fragmentation" + "CVE-2024-24859": { + "cmt_msg": "" }, - "CVE-2017-1000111": { - "cmt_msg": "packet: fix tp_reserve race in packet_set_ring" + "CVE-2022-0322": { + "cmt_msg": "sctp: account stream padding length for reconf chunk" }, "CVE-2024-24855": { "cmt_msg": "scsi: lpfc: Fix a possible data race in lpfc_unregister_fcf_rescan()" }, - "CVE-2019-9466": { - "cmt_msg": "brcmfmac: add subtype check for event handling in data path" - }, "CVE-2024-24857": { "cmt_msg": "" }, - "CVE-2017-7533": { - "cmt_msg": "dentry name snapshots" + "CVE-2023-0386": { + "cmt_msg": "ovl: fail on invalid uid/gid mapping at copy up" }, - "CVE-2018-8897": { - "cmt_msg": "x86/entry/64: Don't use IST entry for #BP stack" + "CVE-2021-29264": { + "cmt_msg": "gianfar: fix jumbo packets+napi+rx overrun crash" }, "CVE-2021-29265": { "cmt_msg": "usbip: fix stub_dev usbip_sockfd_store() races leading to gpf" }, + "CVE-2021-29266": { + "cmt_msg": "vhost-vdpa: fix use-after-free of v->config_ctx" + }, "CVE-2021-39648": { "cmt_msg": "usb: gadget: configfs: Fix use-after-free issue with udc_name" }, "CVE-2022-3545": { "cmt_msg": "nfp: fix use-after-free in area_cache_get()" }, - "CVE-2015-8785": { - "cmt_msg": "fuse: break infinite loop in fuse_fill_write_pages()" + "CVE-2021-43056": { + "cmt_msg": "KVM: PPC: Book3S HV: Make idle_kvm_start_guest() return 0 if it went to guest" }, - "CVE-2016-4794": { - "cmt_msg": "percpu: fix synchronization between chunk->map_extend_work and chunk destruction" + "CVE-2023-52569": { + "cmt_msg": "btrfs: remove BUG() after failure to insert delayed dir index item" }, - "CVE-2015-8787": { - "cmt_msg": "netfilter: nf_nat_redirect: add missing NULL pointer check" + "CVE-2023-52568": { + "cmt_msg": "x86/sgx: Resolves SECS reclaim vs. page fault for EAUG race" }, - "CVE-2020-14416": { - "cmt_msg": "can, slip: Protect tty->disc_data in write_wakeup and close with RCU" + "CVE-2022-3542": { + "cmt_msg": "bnx2x: fix potential memory leak in bnx2x_tpa_stop()" }, - "CVE-2019-0136": { - "cmt_msg": "mac80211: drop robust management frames from unknown TA" + "CVE-2021-47000": { + "cmt_msg": "ceph: fix inode leak on getattr error in __fh_to_dentry" }, - "CVE-2017-17975": { - "cmt_msg": "media: usbtv: prevent double free in error case" + "CVE-2021-47001": { + "cmt_msg": "xprtrdma: Fix cwnd update ordering" }, - "CVE-2019-16921": { - "cmt_msg": "RDMA/hns: Fix init resp when alloc ucontext" + "CVE-2023-52561": { + "cmt_msg": "arm64: dts: qcom: sdm845-db845c: Mark cont splash memory region as reserved" }, - "CVE-2018-16597": { - "cmt_msg": "ovl: modify ovl_permission() to do checks on two inodes" + "CVE-2021-47004": { + "cmt_msg": "f2fs: fix to avoid touching checkpointed data in get_victim()" + }, + "CVE-2021-47005": { + "cmt_msg": "PCI: endpoint: Fix NULL pointer dereference for ->get_features()" }, "CVE-2021-21781": { "cmt_msg": "ARM: ensure the signal page contains defined contents" }, - "CVE-2021-0512": { - "cmt_msg": "HID: make arrays usage and value to be the same" + "CVE-2021-47007": { + "cmt_msg": "f2fs: fix panic during f2fs_resize_fs()" }, - "CVE-2018-14634": { - "cmt_msg": "exec: Limit arg stack to at most 75% of _STK_LIM" + "CVE-2021-46928": { + "cmt_msg": "parisc: Clear stale IIR value on instruction access rights trap" }, - "CVE-2018-14633": { - "cmt_msg": "scsi: target: iscsi: Use hex2bin instead of a re-implementation" + "CVE-2021-46929": { + "cmt_msg": "sctp: use call_rcu to free endpoint" }, - "CVE-2018-12896": { - "cmt_msg": "posix-timers: Sanitize overrun handling" + "CVE-2021-46920": { + "cmt_msg": "dmaengine: idxd: Fix clobbering of SWERR overflow bit on writeback" }, - "CVE-2023-1382": { - "cmt_msg": "tipc: set con sock in tipc_conn_alloc" + "CVE-2021-46921": { + "cmt_msg": "locking/qrwlock: Fix ordering in queued_write_lock_slowpath()" }, - "CVE-2019-19073": { - "cmt_msg": "ath9k_htc: release allocated buffer if timed out" + "CVE-2023-1380": { + "cmt_msg": "wifi: brcmfmac: slab-out-of-bounds read in brcmf_get_assoc_ies()" }, - "CVE-2018-14734": { - "cmt_msg": "infiniband: fix a possible use-after-free bug" + "CVE-2021-46924": { + "cmt_msg": "NFC: st21nfca: Fix memory leak in device probe and remove" }, - "CVE-2022-0850": { - "cmt_msg": "ext4: fix kernel infoleak via ext4_extent_header" + "CVE-2021-46925": { + "cmt_msg": "net/smc: fix kernel panic caused by race of smc_sock" + }, + "CVE-2021-46926": { + "cmt_msg": "ALSA: hda: intel-sdw-acpi: harden detection of controller" }, "CVE-2020-0347": { "cmt_msg": "" }, - "CVE-2022-41222": { - "cmt_msg": "mm/mremap: hold the rmap lock in write mode when moving page table entries." + "CVE-2024-26788": { + "cmt_msg": "dmaengine: fsl-qdma: init irq after reg initialization" }, - "CVE-2018-8822": { - "cmt_msg": "staging: ncpfs: memory corruption in ncp_read_kernel()" + "CVE-2023-52591": { + "cmt_msg": "reiserfs: Avoid touching renamed directory if parent does not change" }, - "CVE-2016-10318": { - "cmt_msg": "fscrypto: add authorization check for setting encryption policy" + "CVE-2022-0644": { + "cmt_msg": "vfs: check fd has read access in kernel_read_file_from_fd()" + }, + "CVE-2021-40490": { + "cmt_msg": "ext4: fix race writing to an inline_data file while its xattrs are changing" }, "CVE-2021-33909": { "cmt_msg": "seq_file: disallow extremely large seq buffer allocations" }, - "CVE-2016-9754": { - "cmt_msg": "ring-buffer: Prevent overflow of size in ring_buffer_resize()" - }, "CVE-2019-12456": { "cmt_msg": "" }, - "CVE-2016-9756": { - "cmt_msg": "KVM: x86: drop error recovery in em_jmp_far and em_ret_far" - }, - "CVE-2022-20565": { - "cmt_msg": "HID: core: Correctly handle ReportSize being zero" - }, - "CVE-2019-5108": { - "cmt_msg": "mac80211: Do not send Layer 2 Update frame before authorization" - }, - "CVE-2019-17133": { - "cmt_msg": "cfg80211: wext: avoid copying malformed SSIDs" - }, - "CVE-2017-18595": { - "cmt_msg": "tracing: Fix possible double free on failure of allocating trace buffer" + "CVE-2023-20569": { + "cmt_msg": "x86/bugs: Increase the x86 bugs vector size to two u32s" }, - "CVE-2021-33655": { - "cmt_msg": "fbcon: Disallow setting font bigger than screen size" + "CVE-2021-29646": { + "cmt_msg": "tipc: better validate user input in tipc_nl_retrieve_key()" }, - "CVE-2016-2383": { - "cmt_msg": "bpf: fix branch offset adjustment on backjumps after patching ctx expansion" + "CVE-2021-29647": { + "cmt_msg": "net: qrtr: fix a kernel-infoleak in qrtr_recvmsg()" }, - "CVE-2021-3612": { - "cmt_msg": "Input: joydev - prevent potential read overflow in ioctl" + "CVE-2021-33656": { + "cmt_msg": "vt: drop old FONT ioctls" }, - "CVE-2017-2636": { - "cmt_msg": "tty: n_hdlc: get rid of racy n_hdlc.tbuf" + "CVE-2024-26720": { + "cmt_msg": "mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again" }, - "CVE-2020-15437": { - "cmt_msg": "serial: 8250: fix null-ptr-deref in serial8250_start_tx()" + "CVE-2021-33655": { + "cmt_msg": "fbcon: Disallow setting font bigger than screen size" }, - "CVE-2017-7487": { - "cmt_msg": "ipx: call ipxitf_put() in ioctl error path" + "CVE-2022-41858": { + "cmt_msg": "drivers: net: slip: fix NPD bug in sl_tx_timeout()" }, - "CVE-2019-6974": { - "cmt_msg": "kvm: fix kvm_ioctl_create_device() reference counting (CVE-2019-6974)" + "CVE-2024-26726": { + "cmt_msg": "btrfs: don't drop extent_map for free space inode on write error" }, - "CVE-2020-25705": { - "cmt_msg": "icmp: randomize the global rate limiter" + "CVE-2022-3176": { + "cmt_msg": "io_uring: fix UAF due to missing POLLFREE handling" }, - "CVE-2020-24503": { - "cmt_msg": "" + "CVE-2023-1206": { + "cmt_msg": "tcp: Reduce chance of collisions in inet6_hashfn()." }, - "CVE-2022-0168": { - "cmt_msg": "cifs: fix NULL ptr dereference in smb2_ioctl_query_info()" + "CVE-2022-41850": { + "cmt_msg": "HID: roccat: Fix use-after-free in roccat_read()" }, "CVE-2023-2985": { "cmt_msg": "fs: hfsplus: fix UAF issue in hfsplus_put_super" }, - "CVE-2020-14390": { - "cmt_msg": "fbcon: remove soft scrollback code" - }, - "CVE-2020-24502": { - "cmt_msg": "" - }, - "CVE-2017-17712": { - "cmt_msg": "net: ipv4: fix for a race condition in raw_sendmsg" - }, - "CVE-2017-17807": { - "cmt_msg": "KEYS: add missing permission check for request_key() destination" + "CVE-2023-1637": { + "cmt_msg": "x86/speculation: Restore speculation related MSRs during S3 resume" }, - "CVE-2017-10661": { - "cmt_msg": "timerfd: Protect the might cancel mechanism proper" + "CVE-2022-2938": { + "cmt_msg": "psi: Fix uaf issue when psi trigger is destroyed while being polled" }, - "CVE-2017-17805": { - "cmt_msg": "crypto: salsa20 - fix blkcipher_walk API usage" + "CVE-2022-3646": { + "cmt_msg": "nilfs2: fix leak of nilfs_root in case of writer thread creation failure" }, - "CVE-2017-7541": { - "cmt_msg": "brcmfmac: fix possible buffer overflow in brcmf_cfg80211_mgmt_tx()" + "CVE-2021-45469": { + "cmt_msg": "f2fs: fix to do sanity check on last xattr entry in __f2fs_setxattr()" }, - "CVE-2019-19527": { - "cmt_msg": "HID: hiddev: do cleanup in failure of opening a device" + "CVE-2022-1184": { + "cmt_msg": "ext4: verify dir block before splitting it" }, - "CVE-2017-7542": { - "cmt_msg": "ipv6: avoid overflow of offset in ip6_find_1stfragopt" + "CVE-2022-3642": { + "cmt_msg": "" }, - "CVE-2022-1198": { - "cmt_msg": "drivers: hamradio: 6pack: fix UAF bug caused by mod_timer()" + "CVE-2022-3643": { + "cmt_msg": "xen/netback: Ensure protocol headers don't fall in the non-linear area" }, "CVE-2024-0584": { "cmt_msg": "ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet" }, - "CVE-2020-26141": { - "cmt_msg": "ath10k: Fix TKIP Michael MIC verification for PCIe" + "CVE-2024-26700": { + "cmt_msg": "drm/amd/display: Fix MST Null Ptr for RV" }, - "CVE-2020-0465": { - "cmt_msg": "HID: core: Sanitize event code and type when mapping input" + "CVE-2023-52638": { + "cmt_msg": "can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock" }, - "CVE-2017-13695": { - "cmt_msg": "ACPICA: acpi: acpica: fix acpi operand cache leak in nseval.c" + "CVE-2023-52519": { + "cmt_msg": "HID: intel-ish-hid: ipc: Disable and reenable ACPI GPE bit" }, - "CVE-2018-3639": { - "cmt_msg": "x86/nospec: Simplify alternative_msr_write()" + "CVE-2023-52516": { + "cmt_msg": "dma-debug: don't call __dma_entry_alloc_check_leak() under free_entries_lock" }, - "CVE-2021-4218": { - "cmt_msg": "sysctl: pass kernel pointers to ->proc_handler" + "CVE-2023-52517": { + "cmt_msg": "spi: sun6i: fix race between DMA RX transfer completion and RX FIFO drain" }, - "CVE-2023-22995": { - "cmt_msg": "usb: dwc3: dwc3-qcom: Add missing platform_device_put() in dwc3_qcom_acpi_register_core" + "CVE-2023-52515": { + "cmt_msg": "RDMA/srp: Do not call scsi_done() from srp_abort()" }, "CVE-2019-15902": { "cmt_msg": "unknown" }, - "CVE-2024-25739": { - "cmt_msg": "" - }, - "CVE-2016-7425": { - "cmt_msg": "scsi: arcmsr: Buffer overflow in arcmsr_iop_message_xfer()" + "CVE-2023-52510": { + "cmt_msg": "ieee802154: ca8210: Fix a potential UAF in ca8210_probe" }, - "CVE-2019-20054": { - "cmt_msg": "fs/proc/proc_sysctl.c: fix NULL pointer dereference in put_links" + "CVE-2023-3358": { + "cmt_msg": "HID: intel_ish-hid: Add check for ishtp_dma_tx_map" }, - "CVE-2017-15274": { - "cmt_msg": "KEYS: fix dereferencing NULL payload with nonzero length" + "CVE-2023-52633": { + "cmt_msg": "um: time-travel: fix time corruption" }, "CVE-2024-0340": { "cmt_msg": "vhost: use kzalloc() instead of kmalloc() followed by memset()" }, - "CVE-2021-3753": { - "cmt_msg": "vt_kdsetmode: extend console locking" - }, - "CVE-2023-6536": { + "CVE-2023-6535": { "cmt_msg": "" }, - "CVE-2019-11135": { - "cmt_msg": "x86/msr: Add the IA32_TSX_CTRL MSR" + "CVE-2023-6536": { + "cmt_msg": "nvmet-tcp: fix a crash in nvmet_req_complete()" }, - "CVE-2019-11810": { - "cmt_msg": "scsi: megaraid_sas: return error when create DMA pool failed" + "CVE-2021-33624": { + "cmt_msg": "bpf: Inherit expanded/patched seen count from old aux data" }, "CVE-2021-27365": { "cmt_msg": "scsi: iscsi: Ensure sysfs attributes are limited to PAGE_SIZE" @@ -90242,59 +122074,56 @@ "CVE-2021-27364": { "cmt_msg": "scsi: iscsi: Restrict sessions and handles to admin capabilities" }, - "CVE-2017-14991": { - "cmt_msg": "scsi: sg: fixup infoleak when using SG_GET_REQUEST_TABLE" - }, - "CVE-2020-0431": { - "cmt_msg": "HID: hid-input: clear unmapped usages" + "CVE-2021-27363": { + "cmt_msg": "scsi: iscsi: Restrict sessions and handles to admin capabilities" }, - "CVE-2022-39842": { - "cmt_msg": "video: fbdev: pxa3xx-gcu: Fix integer overflow in pxa3xx_gcu_write" + "CVE-2022-23036": { + "cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()" }, "CVE-2018-17977": { "cmt_msg": "" }, - "CVE-2016-4997": { - "cmt_msg": "netfilter: x_tables: check for bogus target offset" + "CVE-2024-1151": { + "cmt_msg": "net: openvswitch: limit the number of recursions from action sets" }, - "CVE-2020-35519": { - "cmt_msg": "net/x25: prevent a couple of overflows" + "CVE-2024-26659": { + "cmt_msg": "xhci: handle isoc Babble and Buffer Overrun events properly" + }, + "CVE-2024-26658": { + "cmt_msg": "bcachefs: grab s_umount only if snapshotting" }, "CVE-2010-5321": { "cmt_msg": "" }, - "CVE-2016-0617": { - "cmt_msg": "fs/hugetlbfs/inode.c: fix bugs in hugetlb_vmtruncate_list()" + "CVE-2021-20322": { + "cmt_msg": "ipv6: make exception cache less predictible" + }, + "CVE-2024-26654": { + "cmt_msg": "ALSA: sh: aica: reorder cleanup operations to avoid UAF bugs" }, "CVE-2021-20320": { "cmt_msg": "s390/bpf: Fix optimizing out zero-extensions" }, - "CVE-2020-28974": { - "cmt_msg": "vt: Disable KD_FONT_OP_COPY" - }, - "CVE-2016-4998": { - "cmt_msg": "netfilter: x_tables: check for bogus target offset" - }, - "CVE-2020-11725": { - "cmt_msg": "" + "CVE-2021-20321": { + "cmt_msg": "ovl: fix missing negative dentry check in ovl_rename()" }, - "CVE-2022-33742": { - "cmt_msg": "xen/blkfront: force data bouncing when backend is untrusted" + "CVE-2024-26651": { + "cmt_msg": "sr9800: Add check for usbnet_get_endpoints" }, - "CVE-2022-26490": { - "cmt_msg": "nfc: st21nfca: Fix potential buffer overflows in EVT_TRANSACTION" + "CVE-2024-26650": { + "cmt_msg": "platform/x86: p2sb: Allow p2sb_bar() calls during PCI device probe" }, - "CVE-2017-5967": { - "cmt_msg": "time: Remove CONFIG_TIMER_STATS" + "CVE-2022-42896": { + "cmt_msg": "Bluetooth: L2CAP: Fix accepting connection request for invalid SPSM" }, - "CVE-2021-0937": { - "cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write" + "CVE-2023-52632": { + "cmt_msg": "drm/amdkfd: Fix lock dependency warning with srcu" }, - "CVE-2022-3542": { - "cmt_msg": "bnx2x: fix potential memory leak in bnx2x_tpa_stop()" + "CVE-2023-3812": { + "cmt_msg": "net: tun: fix bugs for oversize packet when napi frags enabled" }, - "CVE-2022-42895": { - "cmt_msg": "Bluetooth: L2CAP: Fix attempting to access uninitialized memory" + "CVE-2023-7192": { + "cmt_msg": "netfilter: ctnetlink: fix possible refcount leak in ctnetlink_create_conntrack()" }, "CVE-2022-3169": { "cmt_msg": "nvme: ensure subsystem reset is single threaded" @@ -90305,68 +122134,71 @@ "CVE-2022-36280": { "cmt_msg": "drm/vmwgfx: Validate the box size for the snooped cursor" }, - "CVE-2019-2054": { - "cmt_msg": "arm/ptrace: run seccomp after ptrace" + "CVE-2022-1048": { + "cmt_msg": "ALSA: pcm: Fix races among concurrent hw_params and hw_free calls" }, - "CVE-2020-0404": { - "cmt_msg": "media: uvcvideo: Avoid cyclic entity chains due to malformed USB descriptors" + "CVE-2024-26803": { + "cmt_msg": "net: veth: clear GRO when clearing XDP even when down" }, - "CVE-2018-20976": { - "cmt_msg": "xfs: clear sb->s_fs_info on mount failure" + "CVE-2023-52475": { + "cmt_msg": "Input: powermate - fix use-after-free in powermate_config_complete" }, - "CVE-2016-10229": { - "cmt_msg": "udp: properly support MSG_PEEK with truncated buffers" + "CVE-2023-52474": { + "cmt_msg": "IB/hfi1: Fix bugs with non-PAGE_SIZE-end multi-iovec user SDMA requests" }, - "CVE-2016-10147": { - "cmt_msg": "crypto: mcryptd - Check mcryptd algorithm compatibility" + "CVE-2023-52477": { + "cmt_msg": "usb: hub: Guard against accesses to uninitialized BOS descriptors" + }, + "CVE-2023-52476": { + "cmt_msg": "perf/x86/lbr: Filter vsyscall addresses" + }, + "CVE-2023-22995": { + "cmt_msg": "usb: dwc3: dwc3-qcom: Add missing platform_device_put() in dwc3_qcom_acpi_register_core" + }, + "CVE-2023-52340": { + "cmt_msg": "ipv6: remove max_size check inline with ipv4" }, "CVE-2024-21803": { "cmt_msg": "" }, - "CVE-2018-7995": { - "cmt_msg": "x86/MCE: Serialize sysfs changes" + "CVE-2023-22998": { + "cmt_msg": "drm/virtio: Fix NULL vs IS_ERR checking in virtio_gpu_object_shmem_init" }, - "CVE-2018-16276": { - "cmt_msg": "USB: yurex: fix out-of-bounds uaccess in read handler" + "CVE-2023-4563": { + "cmt_msg": "netfilter: nf_tables: don't skip expired elements during walk" }, - "CVE-2023-2176": { - "cmt_msg": "RDMA/core: Refactor rdma_bind_addr" + "CVE-2023-52479": { + "cmt_msg": "ksmbd: fix uaf in smb20_oplock_break_ack" + }, + "CVE-2023-52478": { + "cmt_msg": "HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect" }, "CVE-2021-3542": { "cmt_msg": "" }, - "CVE-2019-16413": { - "cmt_msg": "9p: use inode->i_lock to protect i_size_write() under 32-bit" - }, - "CVE-2024-24860": { - "cmt_msg": "Bluetooth: Fix atomicity violation in {min,max}_key_size_set" - }, - "CVE-2018-10876": { - "cmt_msg": "ext4: only look at the bg_flags field if it is valid" - }, - "CVE-2023-2194": { - "cmt_msg": "i2c: xgene-slimpro: Fix out-of-bounds bug in xgene_slimpro_i2c_xfer()" + "CVE-2022-20166": { + "cmt_msg": "drivers core: Use sysfs_emit and sysfs_emit_at for show(device *...) functions" }, - "CVE-2022-1263": { - "cmt_msg": "KVM: avoid NULL pointer dereference in kvm_dirty_ring_push" + "CVE-2023-3220": { + "cmt_msg": "drm/msm/dpu: Add check for pstates" }, - "CVE-2017-16650": { - "cmt_msg": "net: qmi_wwan: fix divide by 0 on bad descriptors" + "CVE-2024-22099": { + "cmt_msg": "Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security" }, - "CVE-2020-12653": { - "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_cmd_append_vsie_tlv()" + "CVE-2023-30456": { + "cmt_msg": "KVM: nVMX: add missing consistency checks for CR0 and CR4" }, - "CVE-2019-7222": { - "cmt_msg": "KVM: x86: work around leak of uninitialized stack contents (CVE-2019-7222)" + "CVE-2022-48626": { + "cmt_msg": "moxart: fix potential use-after-free on remove path" }, - "CVE-2017-14051": { - "cmt_msg": "scsi: qla2xxx: Fix an integer overflow in sysfs code" + "CVE-2022-23041": { + "cmt_msg": "xen/9p: use alloc/free_pages_exact()" }, - "CVE-2020-12654": { - "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_ret_wmm_get_status()" + "CVE-2022-23040": { + "cmt_msg": "xen/xenbus: don't let xenbus_grant_ring() remove grants in error case" }, - "CVE-2019-7221": { - "cmt_msg": "KVM: nVMX: unconditionally cancel preemption timer in free_nested (CVE-2019-7221)" + "CVE-2022-23042": { + "cmt_msg": "xen/netfront: react properly to failing gnttab_end_foreign_access_ref()" }, "CVE-2018-12929": { "cmt_msg": "" @@ -90374,128 +122206,137 @@ "CVE-2018-12928": { "cmt_msg": "" }, - "CVE-2017-7645": { - "cmt_msg": "nfsd: check for oversized NFSv2/v3 arguments" - }, - "CVE-2020-36310": { - "cmt_msg": "KVM: SVM: avoid infinite loop on NPF from bad address" + "CVE-2020-36311": { + "cmt_msg": "KVM: SVM: Periodically schedule when unregistering regions on destroy" }, - "CVE-2016-4581": { - "cmt_msg": "propogate_mnt: Handle the first propogated copy being a slave" + "CVE-2020-35519": { + "cmt_msg": "net/x25: prevent a couple of overflows" }, - "CVE-2016-4580": { - "cmt_msg": "net: fix a kernel infoleak in x25 module" + "CVE-2020-28941": { + "cmt_msg": "speakup: Do not let the line discipline be used several times" }, - "CVE-2016-5243": { - "cmt_msg": "tipc: fix an infoleak in tipc_nl_compat_link_dump" + "CVE-2023-31436": { + "cmt_msg": "net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg" }, - "CVE-2022-33740": { - "cmt_msg": "xen/netfront: fix leaking data in shared pages" + "CVE-2024-26592": { + "cmt_msg": "ksmbd: fix UAF issue in ksmbd_tcp_new_connection()" }, - "CVE-2022-48619": { - "cmt_msg": "Input: add bounds checking to input_set_capability()" + "CVE-2022-45887": { + "cmt_msg": "media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb()" }, "CVE-2020-10708": { "cmt_msg": "" }, - "CVE-2020-25673": { - "cmt_msg": "nfc: Avoid endless loops caused by repeated llcp_sock_connect()" - }, "CVE-2022-0400": { "cmt_msg": "" }, - "CVE-2022-45886": { - "cmt_msg": "media: dvb-core: Fix use-after-free due on race condition at dvb_net" + "CVE-2024-25741": { + "cmt_msg": "" }, - "CVE-2021-38160": { - "cmt_msg": "virtio_console: Assure used length from device is limited" + "CVE-2021-0707": { + "cmt_msg": "dmabuf: fix use-after-free of dmabuf's file->f_inode" + }, + "CVE-2024-26809": { + "cmt_msg": "netfilter: nft_set_pipapo: release elements in clone only from destroy path" + }, + "CVE-2022-26966": { + "cmt_msg": "sr9700: sanity check for packet length" }, "CVE-2021-42739": { "cmt_msg": "media: firewire: firedtv-avc: fix a buffer overflow in avc_ca_pmt()" }, - "CVE-2022-3344": { - "cmt_msg": "KVM: x86: nSVM: harden svm_free_nested against freeing vmcb02 while still in use" + "CVE-2023-1989": { + "cmt_msg": "Bluetooth: btsdio: fix use after free bug in btsdio_remove due to unfinished work" }, - "CVE-2022-3111": { - "cmt_msg": "power: supply: wm8350-power: Add missing free in free_charger_irq" + "CVE-2024-26806": { + "cmt_msg": "spi: cadence-qspi: remove system-wide suspend helper calls from runtime PM hooks" }, - "CVE-2018-5344": { - "cmt_msg": "loop: fix concurrent lo_open/lo_release" + "CVE-2021-37159": { + "cmt_msg": "usb: hso: fix error handling code of hso_create_net_device" }, - "CVE-2020-12770": { - "cmt_msg": "scsi: sg: add sg_remove_request in sg_write" + "CVE-2023-4732": { + "cmt_msg": "mm/userfaultfd: fix uffd-wp special cases for fork()" }, - "CVE-2017-15115": { - "cmt_msg": "sctp: do not peel off an assoc from one netns to another one" + "CVE-2024-26802": { + "cmt_msg": "stmmac: Clear variable when destroying workqueue" }, - "CVE-2018-21008": { - "cmt_msg": "rsi: add fix for crash during assertions" + "CVE-2023-52508": { + "cmt_msg": "nvme-fc: Prevent null pointer dereference in nvme_fc_io_getuuid()" }, - "CVE-2016-9806": { - "cmt_msg": "netlink: Fix dump skb leak/double free" + "CVE-2023-52606": { + "cmt_msg": "powerpc/lib: Validate size for vector operations" }, - "CVE-2024-25744": { - "cmt_msg": "x86/coco: Disable 32-bit emulation by default on TDX and SEV" + "CVE-2023-52607": { + "cmt_msg": "powerpc/mm: Fix null-pointer dereference in pgtable_cache_add" + }, + "CVE-2023-52604": { + "cmt_msg": "FS:JFS:UBSAN:array-index-out-of-bounds in dbAdjTree" + }, + "CVE-2023-52531": { + "cmt_msg": "wifi: iwlwifi: mvm: Fix a memory corruption issue" + }, + "CVE-2023-52602": { + "cmt_msg": "jfs: fix slab-out-of-bounds Read in dtSearch" + }, + "CVE-2023-52603": { + "cmt_msg": "UBSAN: array-index-out-of-bounds in dtSplitRoot" }, "CVE-2022-25265": { "cmt_msg": "" }, - "CVE-2019-15223": { - "cmt_msg": "ALSA: line6: Assure canceling delayed work at disconnection" - }, - "CVE-2017-12153": { - "cmt_msg": "nl80211: check for the required netlink attributes presence" + "CVE-2022-20368": { + "cmt_msg": "net/packet: fix slab-out-of-bounds access in packet_recvmsg()" }, - "CVE-2019-15220": { - "cmt_msg": "p54usb: Fix race between disconnect and firmware loading" + "CVE-2023-52600": { + "cmt_msg": "jfs: fix uaf in jfs_evict_inode" }, - "CVE-2017-12154": { - "cmt_msg": "kvm: nVMX: Don't allow L2 to access the hardware CR8" + "CVE-2023-52608": { + "cmt_msg": "firmware: arm_scmi: Check mailbox/SMT channel for consistency" }, - "CVE-2020-10773": { - "cmt_msg": "s390/cmm: fix information leak in cmm_timeout_handler()" + "CVE-2023-52609": { + "cmt_msg": "binder: fix race between mmput() and do_exit()" }, "CVE-2022-21499": { "cmt_msg": "lockdown: also lock down previous kgdb use" }, - "CVE-2016-1583": { - "cmt_msg": "proc: prevent stacking filesystems on top" + "CVE-2024-23196": { + "cmt_msg": "ALSA: hda: fix a possible null-pointer dereference due to data race in snd_hdac_regmap_sync()" }, "CVE-2023-4208": { "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free" }, - "CVE-2017-1000379": { - "cmt_msg": "mm: larger stack guard gap, between vmas" + "CVE-2022-47519": { + "cmt_msg": "wifi: wilc1000: validate length of IEEE80211_P2P_ATTR_OPER_CHANNEL attribute" + }, + "CVE-2022-3606": { + "cmt_msg": "" }, "CVE-2023-4206": { "cmt_msg": "net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free" }, - "CVE-2023-4207": { - "cmt_msg": "net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free" + "CVE-2022-39188": { + "cmt_msg": "mmu_gather: Force tlb-flush VM_PFNMAP vmas" }, "CVE-2023-3640": { "cmt_msg": "" }, - "CVE-2017-1000371": { - "cmt_msg": "binfmt_elf: use ELF_ET_DYN_BASE only for PIE" - }, - "CVE-2017-1000370": { - "cmt_msg": "binfmt_elf: use ELF_ET_DYN_BASE only for PIE" - }, "CVE-2023-20593": { "cmt_msg": "x86/cpu/amd: Add a Zenbleed fix" }, - "CVE-2019-18675": { - "cmt_msg": "mmap: introduce sane default mmap limits" + "CVE-2023-0160": { + "cmt_msg": "bpf, sockmap: fix deadlocks in the sockhash and sockmap" }, - "CVE-2023-3022": { - "cmt_msg": "ipv6: Use result arg in fib_lookup_arg consistently" + "CVE-2023-52506": { + "cmt_msg": "LoongArch: Set all reserved memblocks on Node#0 at initialization" }, "CVE-2022-2663": { "cmt_msg": "netfilter: nf_conntrack_irc: Fix forged IP logic" }, - "CVE-2016-3140": { - "cmt_msg": "USB: digi_acceleport: do sanity checking for the number of ports" + "CVE-2021-47049": { + "cmt_msg": "Drivers: hv: vmbus: Use after free in __vmbus_open()" + }, + "CVE-2024-26782": { + "cmt_msg": "mptcp: fix double-free on socket dismantle" }, "CVE-2022-43750": { "cmt_msg": "usb: mon: make mmapped memory read only" @@ -90506,35 +122347,77 @@ "CVE-2023-0047": { "cmt_msg": "mm, oom: do not trigger out_of_memory from the #PF" }, - "CVE-2020-29370": { - "cmt_msg": "mm: slub: add missing TID bump in kmem_cache_alloc_bulk()" + "CVE-2021-47046": { + "cmt_msg": "drm/amd/display: Fix off by one in hdmi_14_process_transaction()" }, - "CVE-2019-15219": { - "cmt_msg": "USB: sisusbvga: fix oops in error path of sisusb_probe" + "CVE-2023-0045": { + "cmt_msg": "x86/bugs: Flush IBP in ib_prctl_set()" }, - "CVE-2021-3896": { - "cmt_msg": "isdn: cpai: check ctr->cnr to avoid array index out of bound" + "CVE-2021-47040": { + "cmt_msg": "io_uring: fix overflows checks in provide buffers" }, - "CVE-2022-20424": { - "cmt_msg": "io_uring: remove io_identity" + "CVE-2021-47041": { + "cmt_msg": "nvmet-tcp: fix incorrect locking in state_change sk callback" }, - "CVE-2022-20422": { - "cmt_msg": "arm64: fix oops in concurrently setting insn_emulation sysctls" + "CVE-2020-36787": { + "cmt_msg": "media: aspeed: fix clock handling logic" }, - "CVE-2017-5549": { - "cmt_msg": "USB: serial: kl5kusb105: fix line-state error handling" + "CVE-2021-47167": { + "cmt_msg": "NFS: Fix an Oopsable condition in __nfs_pageio_add_request()" + }, + "CVE-2021-47166": { + "cmt_msg": "NFS: Don't corrupt the value of pg_bytes_written in nfs_do_recoalesce()" + }, + "CVE-2021-47165": { + "cmt_msg": "drm/meson: fix shutdown crash when component not probed" + }, + "CVE-2021-47164": { + "cmt_msg": "net/mlx5e: Fix null deref accessing lag dev" + }, + "CVE-2021-47163": { + "cmt_msg": "tipc: wait and exit until all work queues are done" + }, + "CVE-2021-46969": { + "cmt_msg": "bus: mhi: core: Fix invalid error returning in mhi_queue" + }, + "CVE-2021-47161": { + "cmt_msg": "spi: spi-fsl-dspi: Fix a resource leak in an error handling path" + }, + "CVE-2021-47160": { + "cmt_msg": "net: dsa: mt7530: fix VLAN traffic leaks" }, "CVE-2023-4385": { "cmt_msg": "fs: jfs: fix possible NULL pointer dereference in dbFree()" }, - "CVE-2020-25643": { - "cmt_msg": "hdlc_ppp: add range checks in ppp_cp_parse_cr()" + "CVE-2021-46965": { + "cmt_msg": "mtd: physmap: physmap-bt1-rom: Fix unintentional stack access" }, - "CVE-2024-24858": { + "CVE-2021-46966": { + "cmt_msg": "ACPI: custom_method: fix potential use-after-free issue" + }, + "CVE-2021-46967": { + "cmt_msg": "vhost-vdpa: fix vm_flags for virtqueue doorbell mapping" + }, + "CVE-2021-46960": { + "cmt_msg": "cifs: Return correct error code from smb2_get_enc_key" + }, + "CVE-2021-46961": { + "cmt_msg": "irqchip/gic-v3: Do not enable irqs when handling spurious interrups" + }, + "CVE-2021-46962": { + "cmt_msg": "mmc: uniphier-sd: Fix a resource leak in the remove function" + }, + "CVE-2021-46963": { + "cmt_msg": "scsi: qla2xxx: Fix crash in qla2xxx_mqueuecommand()" + }, + "CVE-2019-19378": { "cmt_msg": "" }, - "CVE-2019-11884": { - "cmt_msg": "Bluetooth: hidp: fix buffer overflow" + "CVE-2023-52482": { + "cmt_msg": "x86/srso: Add SRSO mitigation for Hygon processors" + }, + "CVE-2023-52599": { + "cmt_msg": "jfs: fix array-index-out-of-bounds in diNewExt" }, "CVE-2022-1016": { "cmt_msg": "netfilter: nf_tables: initialize registers in nft_do_chain()" @@ -90542,11 +122425,17 @@ "CVE-2020-4788": { "cmt_msg": "powerpc/64s: flush L1D on kernel entry" }, + "CVE-2023-51781": { + "cmt_msg": "appletalk: Fix Use-After-Free in atalk_ioctl" + }, "CVE-2022-36879": { "cmt_msg": "xfrm: xfrm_policy: fix a possible double xfrm_pols_put() in xfrm_bundle_lookup()" }, - "CVE-2017-8831": { - "cmt_msg": "[media] saa7164: fix double fetch PCIe access condition" + "CVE-2023-52565": { + "cmt_msg": "media: uvcvideo: Fix OOB read" + }, + "CVE-2021-28691": { + "cmt_msg": "xen-netback: take a reference to the RX task thread" }, "CVE-2021-39698": { "cmt_msg": "wait: add wake_up_pollfree()" @@ -90554,188 +122443,149 @@ "CVE-2022-45934": { "cmt_msg": "Bluetooth: L2CAP: Fix u8 overflow" }, - "CVE-2018-5333": { - "cmt_msg": "RDS: null pointer dereference in rds_atomic_free_op" + "CVE-2022-41674": { + "cmt_msg": "wifi: cfg80211: fix u8 overflow in cfg80211_update_notlisted_nontrans()" }, - "CVE-2018-5332": { - "cmt_msg": "RDS: Heap OOB write in rds_message_alloc_sgs()" + "CVE-2020-28588": { + "cmt_msg": "lib/syscall: fix syscall registers retrieval on 32-bit platforms" }, "CVE-2022-2380": { "cmt_msg": "video: fbdev: sm712fb: Fix crash in smtcfb_read()" }, - "CVE-2017-7482": { - "cmt_msg": "rxrpc: Fix several cases where a padded len isn't checked in ticket decode" - }, - "CVE-2020-10767": { - "cmt_msg": "x86/speculation: Avoid force-disabling IBPB based on STIBP and enhanced IBRS." - }, - "CVE-2019-19447": { - "cmt_msg": "ext4: work around deleting a file with i_nlink == 0 safely" + "CVE-2022-0850": { + "cmt_msg": "ext4: fix kernel infoleak via ext4_extent_header" }, - "CVE-2017-17448": { - "cmt_msg": "netfilter: nfnetlink_cthelper: Add missing permission checks" + "CVE-2021-3759": { + "cmt_msg": "memcg: enable accounting of ipc resources" }, - "CVE-2017-17449": { - "cmt_msg": "netlink: Add netns check on taps" + "CVE-2021-4197": { + "cmt_msg": "cgroup: Use open-time credentials for process migraton perm checks" }, - "CVE-2019-19525": { - "cmt_msg": "ieee802154: atusb: fix use-after-free at disconnect" + "CVE-2021-3612": { + "cmt_msg": "Input: joydev - prevent potential read overflow in ioctl" }, - "CVE-2019-19524": { - "cmt_msg": "Input: ff-memless - kill timer in destroy()" + "CVE-2020-24503": { + "cmt_msg": "" }, - "CVE-2019-19448": { - "cmt_msg": "btrfs: only search for left_info if there is no right_info in try_merge_free_space" + "CVE-2020-24502": { + "cmt_msg": "" }, "CVE-2019-19449": { "cmt_msg": "f2fs: fix to do sanity check on segment/section count" }, - "CVE-2023-31085": { - "cmt_msg": "ubi: Refuse attaching if mtd's erasesize is 0" - }, - "CVE-2019-19523": { - "cmt_msg": "USB: adutux: fix use-after-free on disconnect" - }, - "CVE-2021-3752": { - "cmt_msg": "Bluetooth: fix use-after-free error in lock_sock_nested()" + "CVE-2021-3753": { + "cmt_msg": "vt_kdsetmode: extend console locking" }, - "CVE-2017-10663": { - "cmt_msg": "f2fs: sanity check checkpoint segno and blkoff" + "CVE-2020-24504": { + "cmt_msg": "ice: create scheduler aggregator node config and move VSIs" }, - "CVE-2017-18360": { - "cmt_msg": "USB: serial: io_ti: fix div-by-zero in set_termios" + "CVE-2020-11725": { + "cmt_msg": "" }, - "CVE-2018-5848": { - "cmt_msg": "wil6210: missing length check in wmi_set_ie" + "CVE-2021-0937": { + "cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write" }, - "CVE-2017-18249": { - "cmt_msg": "f2fs: fix race condition in between free nid allocator/initializer" + "CVE-2022-1263": { + "cmt_msg": "KVM: avoid NULL pointer dereference in kvm_dirty_ring_push" }, - "CVE-2017-7261": { - "cmt_msg": "drm/vmwgfx: NULL pointer dereference in vmw_surface_define_ioctl()" + "CVE-2023-52610": { + "cmt_msg": "net/sched: act_ct: fix skb leak and crash on ooo frags" }, - "CVE-2016-5244": { - "cmt_msg": "rds: fix an infoleak in rds_inc_info_copy" + "CVE-2021-35477": { + "cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4" }, - "CVE-2017-18241": { - "cmt_msg": "f2fs: fix a panic caused by NULL flush_cmd_control" + "CVE-2021-0938": { + "cmt_msg": "compiler.h: fix barrier_data() on clang" }, - "CVE-2019-15216": { - "cmt_msg": "USB: yurex: Fix protection fault after device removal" + "CVE-2022-3521": { + "cmt_msg": "kcm: avoid potential race in kcm_tx_work" }, "CVE-2022-47929": { "cmt_msg": "net: sched: disallow noqueue for qdisc classes" }, - "CVE-2019-16746": { - "cmt_msg": "nl80211: validate beacon head" - }, - "CVE-2022-3606": { - "cmt_msg": "" - }, - "CVE-2019-15215": { - "cmt_msg": "media: cpia2_usb: first wake up, then free in disconnect" + "CVE-2021-41864": { + "cmt_msg": "bpf: Fix integer overflow in prealloc_elems_and_freelist()" }, "CVE-2022-2209": { "cmt_msg": "" }, - "CVE-2018-18021": { - "cmt_msg": "arm64: KVM: Tighten guest core register access from userspace" + "CVE-2023-52624": { + "cmt_msg": "drm/amd/display: Wake DMCUB before executing GPINT commands" }, "CVE-2021-37576": { "cmt_msg": "KVM: PPC: Book3S: Fix H_RTAS rets buffer overflow" }, - "CVE-2023-7042": { - "cmt_msg": "" - }, - "CVE-2023-45871": { - "cmt_msg": "igb: set max size RX buffer when store bad packet is enabled" + "CVE-2024-26775": { + "cmt_msg": "aoe: avoid potential deadlock at set_capacity" }, - "CVE-2016-4569": { - "cmt_msg": "ALSA: timer: Fix leak in SNDRV_TIMER_IOCTL_PARAMS" + "CVE-2022-36123": { + "cmt_msg": "x86: Clear .brk area at early boot" }, - "CVE-2023-46343": { - "cmt_msg": "nfc: nci: fix possible NULL pointer dereference in send_acknowledge()" + "CVE-2023-7042": { + "cmt_msg": "wifi: ath10k: fix NULL pointer dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev()" }, "CVE-2022-3594": { "cmt_msg": "r8152: Rate limit overflow messages" }, - "CVE-2018-14609": { - "cmt_msg": "btrfs: relocation: Only remove reloc rb_trees if reloc control has been initialized" - }, - "CVE-2016-4565": { - "cmt_msg": "IB/security: Restrict use of the write() interface" - }, - "CVE-2023-35824": { - "cmt_msg": "media: dm1105: Fix use after free bug in dm1105_remove due to race condition" - }, - "CVE-2021-33098": { - "cmt_msg": "ixgbe: fix large MTU request from VF" - }, "CVE-2022-3595": { "cmt_msg": "cifs: fix double-fault crash during ntlmssp" }, - "CVE-2023-47233": { - "cmt_msg": "" - }, - "CVE-2020-10769": { - "cmt_msg": "crypto: authenc - fix parsing key with misaligned rta_len" - }, - "CVE-2023-6606": { - "cmt_msg": "smb: client: fix OOB in smbCalcSize()" + "CVE-2023-52559": { + "cmt_msg": "iommu/vt-d: Avoid memory allocation in iommu_suspend()" }, - "CVE-2019-19922": { - "cmt_msg": "sched/fair: Fix low cpu usage with high throttling by removing expiration of cpu-local slices" - }, - "CVE-2018-5803": { - "cmt_msg": "sctp: verify size of a new chunk in _sctp_make_chunk()" + "CVE-2023-47233": { + "cmt_msg": "wifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach" }, "CVE-2020-27815": { "cmt_msg": "jfs: Fix array index bounds check in dbAdjTree" }, - "CVE-2019-15222": { - "cmt_msg": "ALSA: usb-audio: Fix gpf in snd_usb_pipe_sanity_check" - }, - "CVE-2021-45486": { - "cmt_msg": "inet: use bigger hash table for IP ID generation" + "CVE-2023-52629": { + "cmt_msg": "sh: push-switch: Reorder cleanup operations to avoid use-after-free bug" }, "CVE-2022-1462": { "cmt_msg": "tty: use new tty_insert_flip_string_and_push_buffer() in pty_write()" }, - "CVE-2022-27223": { - "cmt_msg": "USB: gadget: validate endpoint index for xilinx udc" + "CVE-2024-26758": { + "cmt_msg": "md: Don't ignore suspended array in md_check_recovery()" }, - "CVE-2020-27067": { - "cmt_msg": "l2tp: fix l2tp_eth module loading" + "CVE-2024-26610": { + "cmt_msg": "wifi: iwlwifi: fix a memory corruption" + }, + "CVE-2023-6606": { + "cmt_msg": "smb: client: fix OOB in smbCalcSize()" + }, + "CVE-2024-26614": { + "cmt_msg": "tcp: make sure init the accept_queue's spinlocks once" }, "CVE-2020-27777": { "cmt_msg": "powerpc/rtas: Restrict RTAS requests from userspace" }, - "CVE-2019-20636": { - "cmt_msg": "Input: add safety guards to input_set_keycode()" + "CVE-2022-3112": { + "cmt_msg": "media: meson: vdec: potential dereference of null pointer" }, - "CVE-2019-11486": { - "cmt_msg": "tty: mark Siemens R3964 line discipline as BROKEN" + "CVE-2024-26752": { + "cmt_msg": "l2tp: pass correct message length to ip6_append_data" }, - "CVE-2019-11487": { - "cmt_msg": "fs: prevent page refcount overflow in pipe_buf_get" + "CVE-2020-27673": { + "cmt_msg": "xen/events: add a proper barrier to 2-level uevent unmasking" }, - "CVE-2022-28390": { - "cmt_msg": "can: ems_usb: ems_usb_start_xmit(): fix double dev_kfree_skb() in error path" + "CVE-2024-26754": { + "cmt_msg": "gtp: fix use-after-free and null-ptr-deref in gtp_genl_dump_pdp()" }, - "CVE-2018-8043": { - "cmt_msg": "net: phy: mdio-bcm-unimac: fix potential NULL dereference in unimac_mdio_probe()" + "CVE-2020-27675": { + "cmt_msg": "xen/events: avoid removing an event channel while handling it" }, - "CVE-2019-0148": { - "cmt_msg": "i40e: Wrong truncation from u16 to u8" + "CVE-2024-26756": { + "cmt_msg": "md: Don't register sync_thread for reshape directly" }, - "CVE-2020-28915": { - "cmt_msg": "fbcon: Fix global-out-of-bounds read in fbcon_get_font()" + "CVE-2024-26757": { + "cmt_msg": "md: Don't ignore read-only array in md_check_recovery()" }, - "CVE-2023-7192": { - "cmt_msg": "netfilter: ctnetlink: fix possible refcount leak in ctnetlink_create_conntrack()" + "CVE-2023-52439": { + "cmt_msg": "uio: Fix use-after-free in uio_open" }, - "CVE-2019-20908": { - "cmt_msg": "efi: Restrict efivar_ssdt_load when the kernel is locked down" + "CVE-2023-52438": { + "cmt_msg": "binder: fix use-after-free in shinker's callback" }, "CVE-2023-3776": { "cmt_msg": "net/sched: cls_fw: Fix improper refcount update leads to use-after-free" @@ -90743,14 +122593,8 @@ "CVE-2021-28038": { "cmt_msg": "Xen/gnttab: handle p2m update errors on a per-slot basis" }, - "CVE-2020-27068": { - "cmt_msg": "cfg80211: add missing policy for NL80211_ATTR_STATUS_CODE" - }, - "CVE-2022-23040": { - "cmt_msg": "xen/xenbus: don't let xenbus_grant_ring() remove grants in error case" - }, - "CVE-2021-29154": { - "cmt_msg": "bpf, x86: Validate computation of branch displacements for x86-64" + "CVE-2022-3111": { + "cmt_msg": "power: supply: wm8350-power: Add missing free in free_charger_irq" }, "CVE-2023-52435": { "cmt_msg": "net: prevent mss overflow in skb_segment()" @@ -90758,77 +122602,65 @@ "CVE-2023-52434": { "cmt_msg": "smb: client: fix potential OOBs in smb2_parse_contexts()" }, - "CVE-2021-45469": { - "cmt_msg": "f2fs: fix to do sanity check on last xattr entry in __f2fs_setxattr()" + "CVE-2021-31829": { + "cmt_msg": "bpf: Fix masking negation logic upon negative dst register" }, "CVE-2023-52436": { "cmt_msg": "f2fs: explicitly null-terminate the xattr list" }, - "CVE-2019-19060": { - "cmt_msg": "iio: imu: adis16400: release allocated memory on failure" - }, - "CVE-2019-19061": { - "cmt_msg": "iio: imu: adis16400: fix memory leak" - }, - "CVE-2019-19062": { - "cmt_msg": "crypto: user - fix memory leak in crypto_report" - }, - "CVE-2019-19063": { - "cmt_msg": "rtlwifi: prevent memory leak in rtl_usb_probe" - }, - "CVE-2017-17741": { - "cmt_msg": "KVM: Fix stack-out-of-bounds read in write_mmio" + "CVE-2022-2964": { + "cmt_msg": "net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup" }, - "CVE-2019-9445": { - "cmt_msg": "f2fs: check if file namelen exceeds max value" + "CVE-2024-26688": { + "cmt_msg": "fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super" }, - "CVE-2019-19066": { - "cmt_msg": "scsi: bfa: release allocated memory in case of error" + "CVE-2024-23307": { + "cmt_msg": "md/raid5: fix atomicity violation in raid5_cache_count" }, - "CVE-2017-7184": { - "cmt_msg": "xfrm_user: validate XFRM_MSG_NEWAE XFRMA_REPLAY_ESN_VAL replay_window" + "CVE-2022-2961": { + "cmt_msg": "" }, - "CVE-2017-7187": { - "cmt_msg": "scsi: sg: check length passed to SG_NEXT_CMD_LEN" + "CVE-2021-3506": { + "cmt_msg": "f2fs: fix to avoid out-of-bounds memory access" }, - "CVE-2020-0435": { - "cmt_msg": "f2fs: fix to do sanity check with i_extra_isize" + "CVE-2024-26680": { + "cmt_msg": "net: atlantic: Fix DMA mapping for PTP hwts ring" }, - "CVE-2020-0432": { - "cmt_msg": "staging: most: net: fix buffer overflow" + "CVE-2024-26686": { + "cmt_msg": "fs/proc: do_task_stat: use sig->stats_lock to gather the threads/children stats" }, - "CVE-2020-0433": { - "cmt_msg": "blk-mq: sync the update nr_hw_queues with blk_mq_queue_tag_busy_iter" + "CVE-2024-26687": { + "cmt_msg": "xen/events: close evtchn after mapping cleanup" }, "CVE-2023-51779": { "cmt_msg": "Bluetooth: af_bluetooth: Fix Use-After-Free in bt_sock_recvmsg" }, - "CVE-2019-3874": { - "cmt_msg": "sctp: implement memory accounting on tx path" + "CVE-2023-3268": { + "cmt_msg": "relayfs: fix out-of-bounds access in relay_file_read" }, - "CVE-2018-10877": { - "cmt_msg": "ext4: verify the depth of extent tree in ext4_find_extent()" + "CVE-2022-40133": { + "cmt_msg": "drm/vmwgfx: Remove rcu locks from user resources" }, - "CVE-2016-8650": { - "cmt_msg": "mpi: Fix NULL ptr dereference in mpi_powm() " + "CVE-2023-6915": { + "cmt_msg": "ida: Fix crash in ida_free when the bitmap is empty" }, "CVE-2010-4563": { "cmt_msg": "" }, - "CVE-2016-8655": { - "cmt_msg": "packet: fix race condition in packet_set_ring" + "CVE-2021-47006": { + "cmt_msg": "ARM: 9064/1: hw_breakpoint: Do not directly check the event's overflow_handler hook" }, - "CVE-2020-14331": { - "cmt_msg": "vgacon: Fix for missing check in scrollback handling" + "CVE-2023-1249": { + "cmt_msg": "coredump: Use the vma snapshot in fill_files_note" }, - "CVE-2016-8658": { - "cmt_msg": "brcmfmac: avoid potential stack overflow in brcmf_cfg80211_start_ap()" + "CVE-2023-2163": { + "cmt_msg": "bpf: Fix incorrect verifier pruning due to missing register precision taints" }, - "CVE-2018-10879": { - "cmt_msg": "ext4: make sure bitmaps and the inode table don't overlap with bg descriptors" + "CVE-2023-2162": { + "cmt_msg": "scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress" }, - "CVE-2018-10878": { - "cmt_msg": "ext4: always check block group bounds in ext4_init_block_bitmap()" + "CVE-2023-45871": { + "cmt_msg": "igb: set max size RX buffer when store bad packet is enabled" }, "CVE-2024-23851": { "cmt_msg": "dm: limit the number of targets and parameter size area" @@ -90836,212 +122668,182 @@ "CVE-2023-0266": { "cmt_msg": "ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF" }, - "CVE-2023-1838": { - "cmt_msg": "Fix double fget() in vhost_net_set_backend()" + "CVE-2021-0512": { + "cmt_msg": "HID: make arrays usage and value to be the same" }, "CVE-2021-3483": { "cmt_msg": "firewire: nosy: Fix a use-after-free bug in nosy_ioctl()" }, - "CVE-2017-16913": { - "cmt_msg": "usbip: fix stub_rx: harden CMD_SUBMIT path to handle malicious input" + "CVE-2024-26663": { + "cmt_msg": "tipc: Check the bearer type before calling tipc_udp_nl_bearer_add()" }, - "CVE-2017-16912": { - "cmt_msg": "usbip: fix stub_rx: get_pipe() to validate endpoint number" + "CVE-2024-26598": { + "cmt_msg": "KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache" }, - "CVE-2016-7117": { - "cmt_msg": "net: Fix use after free in the recvmmsg exit path" + "CVE-2021-3489": { + "cmt_msg": "bpf, ringbuf: Deny reserve of buffers larger than ringbuf" }, - "CVE-2017-0861": { - "cmt_msg": "ALSA: pcm: prevent UAF in snd_pcm_info" + "CVE-2021-38300": { + "cmt_msg": "bpf, mips: Validate conditional branch offsets" }, "CVE-2020-25656": { "cmt_msg": "vt: keyboard, extend func_buf_lock to readers" }, - "CVE-2017-16914": { - "cmt_msg": "usbip: fix stub_send_ret_submit() vulnerability to null transfer_buffer" - }, - "CVE-2023-1390": { - "cmt_msg": "tipc: fix NULL deref in tipc_link_xmit()" - }, - "CVE-2022-0492": { - "cmt_msg": "cgroup-v1: Require capabilities to set release_agent" - }, - "CVE-2019-15221": { - "cmt_msg": "ALSA: line6: Fix write on zero-sized buffer" - }, - "CVE-2024-26598": { - "cmt_msg": "KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache" - }, - "CVE-2022-23042": { - "cmt_msg": "xen/netfront: react properly to failing gnttab_end_foreign_access_ref()" - }, - "CVE-2019-10142": { - "cmt_msg": "drivers/virt/fsl_hypervisor.c: prevent integer overflow in ioctl" + "CVE-2022-24448": { + "cmt_msg": "NFSv4: Handle case where the lookup of a directory fails" }, - "CVE-2021-45485": { - "cmt_msg": "ipv6: use prandom_u32() for ID generation" + "CVE-2023-52498": { + "cmt_msg": "PM: sleep: Fix possible deadlocks in core system-wide PM code" }, "CVE-2021-4023": { "cmt_msg": "io-wq: fix cancellation on create-worker failure" }, - "CVE-2017-11176": { - "cmt_msg": "mqueue: fix a use-after-free in sys_mq_notify()" - }, - "CVE-2023-3268": { - "cmt_msg": "relayfs: fix out-of-bounds access in relay_file_read" - }, - "CVE-2017-12193": { - "cmt_msg": "assoc_array: Fix a buggy node-splitting case" + "CVE-2023-52640": { + "cmt_msg": "fs/ntfs3: Fix oob in ntfs_listxattr" }, - "CVE-2017-12192": { - "cmt_msg": "KEYS: prevent KEYCTL_READ on negative key" + "CVE-2023-52641": { + "cmt_msg": "fs/ntfs3: Add NULL ptr dereference checking at the end of attr_allocate_frame()" }, "CVE-2021-22555": { "cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write" }, - "CVE-2017-12190": { - "cmt_msg": "fix unbalanced page refcounting in bio_map_user_iov" - }, - "CVE-2022-1011": { - "cmt_msg": "fuse: fix pipe buffer lifetime for direct_io" + "CVE-2020-36694": { + "cmt_msg": "netfilter: x_tables: Switch synchronization to RCU" }, "CVE-2021-0399": { "cmt_msg": "" }, - "CVE-2016-3689": { - "cmt_msg": "Input: ims-pcu - sanity check against missing interfaces" + "CVE-2023-52488": { + "cmt_msg": "serial: sc16is7xx: convert from _raw_ to _noinc_ regmap functions for FIFO" }, - "CVE-2016-3961": { - "cmt_msg": "x86/mm/xen: Suppress hugetlbfs in PV guests" + "CVE-2023-52489": { + "cmt_msg": "mm/sparsemem: fix race in accessing memory_section->usage" }, - "CVE-2023-3111": { - "cmt_msg": "btrfs: unset reloc control if transaction commit fails in prepare_to_relocate()" + "CVE-2021-47179": { + "cmt_msg": "NFSv4: Fix a NULL pointer dereference in pnfs_mark_matching_lsegs_return()" }, - "CVE-2020-2732": { - "cmt_msg": "KVM: nVMX: Don't emulate instructions in guest mode" + "CVE-2023-42755": { + "cmt_msg": "net/sched: Retire rsvp classifier" }, - "CVE-2016-5412": { - "cmt_msg": "KVM: PPC: Book3S HV: Pull out TM state save/restore into separate procedures" + "CVE-2020-36516": { + "cmt_msg": "ipv4: avoid using shared IP generator for connected sockets" + }, + "CVE-2023-52486": { + "cmt_msg": "drm: Don't unref the same fb many times by mistake due to deadlock handling" + }, + "CVE-2023-52480": { + "cmt_msg": "ksmbd: fix race condition between session lookup and expire" }, "CVE-2012-4542": { "cmt_msg": "" }, - "CVE-2022-1729": { - "cmt_msg": "perf: Fix sys_perf_event_open() race against self" + "CVE-2023-42753": { + "cmt_msg": "netfilter: ipset: add the missing IP_SET_HASH_WITH_NET0 macro for ip_set_hash_netportnet.c" }, - "CVE-2023-42752": { - "cmt_msg": "igmp: limit igmpv3_newpack() packet size to IP_MAX_MTU" + "CVE-2023-1838": { + "cmt_msg": "Fix double fget() in vhost_net_set_backend()" }, - "CVE-2023-4128": { - "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free" + "CVE-2023-1382": { + "cmt_msg": "tipc: set con sock in tipc_conn_alloc" }, - "CVE-2018-1000028": { - "cmt_msg": "nfsd: auth: Fix gid sorting when rootsquash enabled" + "CVE-2022-44034": { + "cmt_msg": "char: pcmcia: remove all the drivers" }, - "CVE-2023-1118": { - "cmt_msg": "media: rc: Fix use-after-free bugs caused by ene_tx_irqsim()" + "CVE-2023-4244": { + "cmt_msg": "netfilter: nf_tables: fix GC transaction races with netns and netlink event exit path" }, - "CVE-2018-7191": { - "cmt_msg": "tun: call dev_get_valid_name() before register_netdevice()" + "CVE-2021-46283": { + "cmt_msg": "netfilter: nf_tables: initialize set before expression setup" }, - "CVE-2022-1679": { - "cmt_msg": "ath9k: fix use-after-free in ath9k_hif_usb_rx_cb" + "CVE-2023-3609": { + "cmt_msg": "net/sched: cls_u32: Fix reference counter leak leading to overflow" }, - "CVE-2018-10675": { - "cmt_msg": "mm/mempolicy: fix use after free when calling get_mempolicy" + "CVE-2022-44033": { + "cmt_msg": "char: pcmcia: remove all the drivers" + }, + "CVE-2022-1974": { + "cmt_msg": "nfc: replace improper check device_is_registered() in netlink related functions" }, "CVE-2022-1975": { "cmt_msg": "NFC: netlink: fix sleep in atomic bug when firmware download timeout" }, - "CVE-2023-1380": { - "cmt_msg": "wifi: brcmfmac: slab-out-of-bounds read in brcmf_get_assoc_ies()" + "CVE-2022-1972": { + "cmt_msg": "netfilter: nf_tables: sanitize nft_set_desc_concat_parse()" }, - "CVE-2017-2596": { - "cmt_msg": "kvm: fix page struct leak in handle_vmon" + "CVE-2023-52491": { + "cmt_msg": "media: mtk-jpeg: Fix use after free bug due to error path handling in mtk_jpeg_dec_device_run" }, - "CVE-2017-0786": { - "cmt_msg": "brcmfmac: add length check in brcmf_cfg80211_escan_handler()" + "CVE-2022-44032": { + "cmt_msg": "char: pcmcia: remove all the drivers" }, - "CVE-2021-28972": { - "cmt_msg": "PCI: rpadlpar: Fix potential drc_name corruption in store functions" + "CVE-2020-36777": { + "cmt_msg": "media: dvbdev: Fix memory leak in dvb_media_device_free()" }, - "CVE-2018-12130": { - "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" + "CVE-2020-36776": { + "cmt_msg": "thermal/drivers/cpufreq_cooling: Fix slab OOB issue" }, - "CVE-2020-14305": { - "cmt_msg": "netfilter: helpers: remove data_len usage for inkernel helpers" + "CVE-2021-47082": { + "cmt_msg": "tun: avoid double free in tun_free_netdev" }, - "CVE-2021-20292": { - "cmt_msg": "drm/ttm/nouveau: don't call tt destroy callback on alloc failure." + "CVE-2021-47083": { + "cmt_msg": "pinctrl: mediatek: fix global-out-of-bounds issue" }, "CVE-2021-31916": { "cmt_msg": "dm ioctl: fix out of bounds array access when no devices" }, - "CVE-2017-8065": { - "cmt_msg": "crypto: ccm - move cbcmac input off the stack" - }, - "CVE-2017-8064": { - "cmt_msg": "[media] dvb-usb-v2: avoid use-after-free" - }, - "CVE-2018-13405": { - "cmt_msg": "Fix up non-directory creation in SGID directories" - }, - "CVE-2020-25645": { - "cmt_msg": "geneve: add transport ports in route lookup for geneve" - }, - "CVE-2018-13406": { - "cmt_msg": "video: uvesafb: Fix integer overflow in allocation" + "CVE-2021-47086": { + "cmt_msg": "phonet/pep: refuse to enable an unbound pipe" }, - "CVE-2022-1280": { - "cmt_msg": "drm: avoid circular locks in drm_mode_getconnector" + "CVE-2022-32981": { + "cmt_msg": "powerpc/32: Fix overread/overwrite of thread_struct via ptrace" }, - "CVE-2023-3772": { - "cmt_msg": "xfrm: add NULL check in xfrm_update_ae_params" + "CVE-2021-47122": { + "cmt_msg": "net: caif: fix memory leak in caif_device_notify" }, - "CVE-2020-11668": { - "cmt_msg": "media: xirlink_cit: add missing descriptor sanity checks" + "CVE-2021-47121": { + "cmt_msg": "net: caif: fix memory leak in cfusbl_device_notify" }, - "CVE-2020-11669": { - "cmt_msg": "powerpc/powernv/idle: Restore AMR/UAMOR/AMOR after idle" + "CVE-2021-47120": { + "cmt_msg": "HID: magicmouse: fix NULL-deref on disconnect" }, - "CVE-2019-15118": { - "cmt_msg": "ALSA: usb-audio: Fix a stack buffer overflow bug in check_input_term" + "CVE-2021-47126": { + "cmt_msg": "ipv6: Fix KASAN: slab-out-of-bounds Read in fib6_nh_flush_exceptions" }, - "CVE-2022-3524": { - "cmt_msg": "tcp/udp: Fix memory leak in ipv6_renew_options()." + "CVE-2020-36779": { + "cmt_msg": "i2c: stm32f7: fix reference leak when pm_runtime_get_sync fails" }, - "CVE-2019-12818": { - "cmt_msg": "net: nfc: Fix NULL dereference on nfc_llcp_build_tlv fails" + "CVE-2020-36778": { + "cmt_msg": "i2c: xiic: fix reference leak when pm_runtime_get_sync fails" }, - "CVE-2019-12819": { - "cmt_msg": "mdio_bus: Fix use-after-free on device_register fails" + "CVE-2023-2269": { + "cmt_msg": "dm ioctl: fix nested locking in table_clear() to remove deadlock concern" }, "CVE-2023-0394": { "cmt_msg": "ipv6: raw: Deduct extension header length in rawv6_push_pending_frames" }, - "CVE-2020-10690": { - "cmt_msg": "ptp: fix the race between the release of ptp_clock and cdev" + "CVE-2021-47171": { + "cmt_msg": "net: usb: fix memory leak in smsc75xx_bind" }, - "CVE-2022-36402": { - "cmt_msg": "drm/vmwgfx: Fix shader stage validation" + "CVE-2024-26615": { + "cmt_msg": "net/smc: fix illegal rmb_desc access in SMC-D connection dump" }, - "CVE-2019-19332": { - "cmt_msg": "KVM: x86: fix out-of-bounds write in KVM_GET_EMULATED_CPUID (CVE-2019-19332)" + "CVE-2022-3108": { + "cmt_msg": "drm/amdkfd: Check for null pointer after calling kmemdup" }, - "CVE-2019-15117": { - "cmt_msg": "ALSA: usb-audio: Fix an OOB bug in parse_audio_mixer_unit" + "CVE-2022-36402": { + "cmt_msg": "drm/vmwgfx: Fix shader stage validation" }, - "CVE-2021-3659": { - "cmt_msg": "net: mac802154: Fix general protection fault" + "CVE-2021-4157": { + "cmt_msg": "pNFS/flexfiles: fix incorrect size check in decode_nfs_fh()" }, - "CVE-2022-25258": { - "cmt_msg": "USB: gadget: validate interface OS descriptor requests" + "CVE-2021-4154": { + "cmt_msg": "cgroup: verify that source is a string" }, "CVE-2021-4155": { "cmt_msg": "xfs: map unwritten blocks in XFS_IOC_{ALLOC,FREE}SP just like fallocate" }, - "CVE-2019-14901": { - "cmt_msg": "mwifiex: Fix heap overflow in mmwifiex_process_tdls_action_frame()" + "CVE-2022-1729": { + "cmt_msg": "perf: Fix sys_perf_event_open() race against self" }, "CVE-2021-4150": { "cmt_msg": "block: fix incorrect references to disk objects" @@ -91049,11 +122851,11 @@ "CVE-2020-3702": { "cmt_msg": "ath: Use safer key clearing with key cache entries" }, - "CVE-2020-16166": { - "cmt_msg": "random32: update the net random state on interrupt and activity" + "CVE-2023-52485": { + "cmt_msg": "drm/amd/display: Wake DMCUB before sending a command" }, - "CVE-2021-3653": { - "cmt_msg": "KVM: nSVM: avoid picking up unsupported bits from L2 in int_ctl (CVE-2021-3653)" + "CVE-2021-28952": { + "cmt_msg": "ASoC: qcom: sdm845: Fix array out of bounds access" }, "CVE-2021-3655": { "cmt_msg": "sctp: validate from_addr_param return" @@ -91061,74 +122863,62 @@ "CVE-2020-8694": { "cmt_msg": "powercap: restrict energy meter to root access" }, - "CVE-2021-4159": { - "cmt_msg": "bpf: Verifer, adjust_scalar_min_max_vals to always call update_reg_bounds()" - }, - "CVE-2024-26584": { - "cmt_msg": "net: tls: handle backlogging of crypto requests" - }, - "CVE-2019-12614": { - "cmt_msg": "powerpc/pseries/dlpar: Fix a missing check in dlpar_parse_cc_property()" + "CVE-2023-0461": { + "cmt_msg": "net/ulp: prevent ULP without clone op from entering the LISTEN status" }, - "CVE-2019-12615": { - "cmt_msg": "mdesc: fix a missing-check bug in get_vdev_port_node_info()" + "CVE-2021-29154": { + "cmt_msg": "bpf, x86: Validate computation of branch displacements for x86-64" }, - "CVE-2021-3715": { - "cmt_msg": "net_sched: cls_route: remove the right filter from hashtable" + "CVE-2021-29155": { + "cmt_msg": "bpf: Use correct permission flag for mixed signed bounds arithmetic" }, "CVE-2021-3714": { "cmt_msg": "" }, - "CVE-2019-16230": { - "cmt_msg": "drm/amdkfd: fix a potential NULL pointer dereference (v2)" - }, - "CVE-2019-16231": { - "cmt_msg": "fjes: Handle workqueue allocation failure" - }, - "CVE-2017-12168": { - "cmt_msg": "arm64: KVM: pmu: Fix AArch32 cycle counter access" + "CVE-2024-26733": { + "cmt_msg": "arp: Prevent overflow in arp_req_get()." }, - "CVE-2019-16233": { - "cmt_msg": "scsi: qla2xxx: fix a potential NULL pointer dereference" + "CVE-2021-3896": { + "cmt_msg": "isdn: cpai: check ctr->cnr to avoid array index out of bound" }, - "CVE-2019-16234": { - "cmt_msg": "iwlwifi: pcie: fix rb_allocator workqueue allocation" + "CVE-2021-3894": { + "cmt_msg": "sctp: account stream padding length for reconf chunk" }, - "CVE-2019-6133": { - "cmt_msg": "fork: record start_time late" + "CVE-2021-3892": { + "cmt_msg": "" }, - "CVE-2018-10902": { - "cmt_msg": "ALSA: rawmidi: Change resized buffers atomically" + "CVE-2023-20928": { + "cmt_msg": "android: binder: stop saving a pointer to the VMA" }, "CVE-2021-39633": { "cmt_msg": "ip_gre: add validation for csum_start" }, - "CVE-2017-18203": { - "cmt_msg": "dm: fix race between dm_get_from_kobject() and __dm_destroy()" + "CVE-2022-27223": { + "cmt_msg": "USB: gadget: validate endpoint index for xilinx udc" }, - "CVE-2020-27673": { - "cmt_msg": "xen/events: add a proper barrier to 2-level uevent unmasking" + "CVE-2023-35788": { + "cmt_msg": "net/sched: flower: fix possible OOB write in fl_set_geneve_opt()" }, - "CVE-2021-35477": { - "cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4" + "CVE-2022-2639": { + "cmt_msg": "openvswitch: fix OOB access in reserve_sfa_size()" }, - "CVE-2017-18204": { - "cmt_msg": "ocfs2: should wait dio before inode lock in ocfs2_setattr()" + "CVE-2022-24958": { + "cmt_msg": "usb: gadget: don't release an existing dev->buf" }, - "CVE-2021-39634": { - "cmt_msg": "epoll: do not insert into poll queues until all sanity checks are done" + "CVE-2022-24959": { + "cmt_msg": "yam: fix a memory leak in yam_siocdevprivate()" }, - "CVE-2019-3882": { - "cmt_msg": "vfio/type1: Limit DMA mappings per container" + "CVE-2022-25375": { + "cmt_msg": "usb: gadget: rndis: check size of RNDIS_MSG_SET command" }, - "CVE-2017-18208": { - "cmt_msg": "mm/madvise.c: fix madvise() infinite loop under special circumstances" + "CVE-2022-33742": { + "cmt_msg": "xen/blkfront: force data bouncing when backend is untrusted" }, "CVE-2022-33741": { "cmt_msg": "xen/netfront: force data bouncing when backend is untrusted" }, - "CVE-2018-20509": { - "cmt_msg": "binder: refactor binder ref inc/dec for thread safety" + "CVE-2022-33740": { + "cmt_msg": "xen/netfront: fix leaking data in shared pages" }, "CVE-2024-24864": { "cmt_msg": "" @@ -91136,107 +122926,98 @@ "CVE-2022-45885": { "cmt_msg": "" }, - "CVE-2020-27675": { - "cmt_msg": "xen/events: avoid removing an event channel while handling it" - }, - "CVE-2017-9605": { - "cmt_msg": "drm/vmwgfx: Make sure backup_handle is always valid" - }, - "CVE-2017-18193": { - "cmt_msg": "f2fs: fix a bug caused by NULL extent tree" - }, - "CVE-2022-40768": { - "cmt_msg": "scsi: stex: Properly zero out the passthrough command structure" + "CVE-2022-33744": { + "cmt_msg": "xen/arm: Fix race in RB-tree based P2M accounting" }, - "CVE-2024-26587": { - "cmt_msg": "net: netdevsim: don't try to destroy PHC on VFs" + "CVE-2021-47017": { + "cmt_msg": "ath10k: Fix a use after free in ath10k_htc_send_bundle" }, - "CVE-2019-9454": { - "cmt_msg": "i2c: core-smbus: prevent stack corruption on read I2C_BLOCK_DATA" + "CVE-2021-47016": { + "cmt_msg": "m68k: mvme147,mvme16x: Don't wipe PCC timer config bits" }, - "CVE-2020-12888": { - "cmt_msg": "vfio-pci: Invalidate mmaps and block MMIO access on disabled memory" + "CVE-2021-47015": { + "cmt_msg": "bnxt_en: Fix RX consumer index logic in the error path." }, - "CVE-2017-6214": { - "cmt_msg": "tcp: avoid infinite loop in tcp_splice_read()" + "CVE-2021-47014": { + "cmt_msg": "net/sched: act_ct: fix wild memory access when clearing fragments" }, - "CVE-2023-52445": { - "cmt_msg": "media: pvrusb2: fix use after free on context disconnection" + "CVE-2021-47013": { + "cmt_msg": "net:emac/emac-mac: Fix a use after free in emac_mac_tx_buf_send" }, - "CVE-2017-6353": { - "cmt_msg": "sctp: deny peeloff operation on asocs with threads sleeping on it" + "CVE-2021-47012": { + "cmt_msg": "RDMA/siw: Fix a use after free in siw_alloc_mr" }, - "CVE-2024-25741": { - "cmt_msg": "" + "CVE-2021-47158": { + "cmt_msg": "net: dsa: sja1105: add error handling in sja1105_setup()" }, - "CVE-2016-6198": { - "cmt_msg": "vfs: add vfs_select_inode() helper" + "CVE-2021-47010": { + "cmt_msg": "net: Only allow init netns to set default tcp cong to a restricted algo" }, - "CVE-2017-18174": { - "cmt_msg": "pinctrl: amd: Use devm_pinctrl_register() for pinctrl registration" + "CVE-2022-1280": { + "cmt_msg": "drm: avoid circular locks in drm_mode_getconnector" }, - "CVE-2022-41218": { - "cmt_msg": "media: dvb-core: Fix UAF due to refcount races at releasing" + "CVE-2021-47152": { + "cmt_msg": "mptcp: fix data stream corruption" }, - "CVE-2019-20934": { - "cmt_msg": "sched/fair: Don't free p->numa_faults with concurrent readers" + "CVE-2021-47153": { + "cmt_msg": "i2c: i801: Don't generate an interrupt on bus reset" }, - "CVE-2022-1247": { - "cmt_msg": "" + "CVE-2021-47150": { + "cmt_msg": "net: fec: fix the potential memory leak in fec_enet_init()" }, - "CVE-2016-4486": { - "cmt_msg": "net: fix infoleak in rtnetlink" + "CVE-2021-47018": { + "cmt_msg": "powerpc/64: Fix the definition of the fixmap area" }, - "CVE-2016-4485": { - "cmt_msg": "net: fix infoleak in llc" + "CVE-2021-46936": { + "cmt_msg": "net: fix use-after-free in tw_timer_handler" }, - "CVE-2016-4482": { - "cmt_msg": "USB: usbfs: fix potential infoleak in devio" + "CVE-2021-46935": { + "cmt_msg": "binder: fix async_free_space accounting for empty parcels" }, - "CVE-2016-6197": { - "cmt_msg": "ovl: verify upper dentry before unlink and rename" + "CVE-2021-46934": { + "cmt_msg": "i2c: validate user data in compat ioctl" }, - "CVE-2022-21166": { - "cmt_msg": "x86/speculation/mmio: Enable CPU Fill buffer clearing on idle" + "CVE-2021-46933": { + "cmt_msg": "usb: gadget: f_fs: Clear ffs_eventfd in ffs_data_clear." }, - "CVE-2020-29374": { - "cmt_msg": "gup: document and work around \"COW can break either way\" issue" + "CVE-2021-46932": { + "cmt_msg": "Input: appletouch - initialize work before device registration" }, - "CVE-2016-9191": { - "cmt_msg": "sysctl: Drop reference added by grab_header in proc_sys_readdir" + "CVE-2021-46931": { + "cmt_msg": "net/mlx5e: Wrap the tx reporter dump callback to extract the sq" }, - "CVE-2015-8709": { - "cmt_msg": "mm: Add a user_ns owner to mm_struct and fix ptrace permission checks" + "CVE-2021-46930": { + "cmt_msg": "usb: mtu3: fix list_head check warning" }, - "CVE-2017-6001": { - "cmt_msg": "perf/core: Fix concurrent sys_perf_event_open() vs. 'move_group' race" + "CVE-2022-36946": { + "cmt_msg": "netfilter: nf_queue: do not allow packet truncation below transport header offset" }, - "CVE-2015-8660": { - "cmt_msg": "ovl: fix permission checking for setattr" + "CVE-2022-41222": { + "cmt_msg": "mm/mremap: hold the rmap lock in write mode when moving page table entries." }, - "CVE-2021-29650": { - "cmt_msg": "netfilter: x_tables: Use correct memory barriers." + "CVE-2011-4916": { + "cmt_msg": "" }, - "CVE-2019-18806": { - "cmt_msg": "net: qlogic: Fix memory leak in ql_alloc_large_buffers" + "CVE-2021-47103": { + "cmt_msg": "inet: fully convert sk->sk_rx_dst to RCU rules" }, - "CVE-2023-4010": { - "cmt_msg": "" + "CVE-2021-46939": { + "cmt_msg": "tracing: Restructure trace_clock_global() to never block" }, - "CVE-2018-20169": { - "cmt_msg": "USB: check usb_get_extra_descriptor for proper size" + "CVE-2021-46938": { + "cmt_msg": "dm rq: fix double free of blk_mq_tag_set in dev remove after table load fails" }, - "CVE-2017-12762": { - "cmt_msg": "isdn/i4l: fix buffer overflow" + "CVE-2021-47105": { + "cmt_msg": "ice: xsk: return xsk buffers back to pool when cleaning the ring" }, - "CVE-2018-7754": { - "cmt_msg": "printk: hash addresses printed with %p" + "CVE-2024-0841": { + "cmt_msg": "fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super" }, - "CVE-2021-33656": { - "cmt_msg": "vt: drop old FONT ioctls" + "CVE-2021-29650": { + "cmt_msg": "netfilter: x_tables: Use correct memory barriers." }, - "CVE-2016-9644": { - "cmt_msg": "x86/mm: Expand the exception table logic to allow new handling options" + "CVE-2023-34255": { + "cmt_msg": "xfs: verify buffer contents when we skip log replay" }, "CVE-2022-41849": { "cmt_msg": "fbdev: smscufx: Fix use-after-free in ufx_ops_open()" @@ -91244,26 +123025,29 @@ "CVE-2022-41848": { "cmt_msg": "" }, - "CVE-2023-6356": { - "cmt_msg": "" - }, "CVE-2022-1353": { "cmt_msg": "af_key: add __GFP_ZERO flag for compose_sadb_supported in function pfkey_register" }, "CVE-2022-28356": { "cmt_msg": "llc: fix netdevice reference leaks in llc_ui_bind()" }, - "CVE-2015-8964": { - "cmt_msg": "tty: Prevent ldisc drivers from re-using stale tty fields" + "CVE-2022-2196": { + "cmt_msg": "KVM: VMX: Execute IBPB on emulated VM-exit when guest has IBRS" + }, + "CVE-2020-16119": { + "cmt_msg": "dccp: don't duplicate ccid when cloning dccp sock" + }, + "CVE-2024-26748": { + "cmt_msg": "usb: cdns3: fix memory double free when handle zero packet" + }, + "CVE-2022-1198": { + "cmt_msg": "drivers: hamradio: 6pack: fix UAF bug caused by mod_timer()" }, "CVE-2022-1199": { "cmt_msg": "ax25: Fix NULL pointer dereference in ax25_kill_by_device" }, - "CVE-2015-8966": { - "cmt_msg": "[PATCH] arm: fix handling of F_OFD_... in oabi_fcntl64()" - }, - "CVE-2018-5750": { - "cmt_msg": "ACPI: sbshc: remove raw pointer from printk() message" + "CVE-2023-6546": { + "cmt_msg": "tty: n_gsm: fix the UAF caused by race condition in gsm_cleanup_mux" }, "CVE-2021-39801": { "cmt_msg": "" @@ -91271,20 +123055,14 @@ "CVE-2021-39800": { "cmt_msg": "" }, - "CVE-2015-8962": { - "cmt_msg": "sg: Fix double-free when drives detach during SG_IO" - }, - "CVE-2015-8963": { - "cmt_msg": "perf: Fix race in swevent hash" - }, - "CVE-2018-16884": { - "cmt_msg": "sunrpc: use-after-free in svc_process_common()" + "CVE-2021-28375": { + "cmt_msg": "misc: fastrpc: restrict user apps from sending kernel RPC messages" }, "CVE-2022-1195": { "cmt_msg": "hamradio: improve the incomplete fix to avoid NPD" }, - "CVE-2024-22099": { - "cmt_msg": "" + "CVE-2021-26708": { + "cmt_msg": "vsock: fix the race conditions in multi-transport support" }, "CVE-2021-4202": { "cmt_msg": "NFC: reorganize the functions in nci_request" @@ -91292,98 +123070,104 @@ "CVE-2021-4203": { "cmt_msg": "af_unix: fix races in sk_peer_pid and sk_peer_cred accesses" }, - "CVE-2022-45887": { - "cmt_msg": "media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb()" + "CVE-2022-4269": { + "cmt_msg": "act_mirred: use the backlog for nested calls to mirred ingress" + }, + "CVE-2022-45886": { + "cmt_msg": "media: dvb-core: Fix use-after-free due on race condition at dvb_net" }, - "CVE-2022-0330": { - "cmt_msg": "drm/i915: Flush TLBs before releasing backing store" + "CVE-2023-52509": { + "cmt_msg": "ravb: Fix use-after-free issue in ravb_tx_timeout_work()" }, - "CVE-2024-0775": { - "cmt_msg": "ext4: improve error recovery code paths in __ext4_remount()" + "CVE-2023-46343": { + "cmt_msg": "nfc: nci: fix possible NULL pointer dereference in send_acknowledge()" }, - "CVE-2022-41858": { - "cmt_msg": "drivers: net: slip: fix NPD bug in sl_tx_timeout()" + "CVE-2021-4204": { + "cmt_msg": "bpf: Generalize check_ctx_reg for reuse with other types" }, - "CVE-2024-24859": { - "cmt_msg": "" + "CVE-2023-52504": { + "cmt_msg": "x86/alternatives: Disable KASAN in apply_alternatives()" }, - "CVE-2019-15807": { - "cmt_msg": "scsi: libsas: delete sas port if expander discover failed" + "CVE-2023-52507": { + "cmt_msg": "nfc: nci: assert requested protocol is valid" }, "CVE-2023-2124": { "cmt_msg": "xfs: verify buffer contents when we skip log replay" }, - "CVE-2020-26557": { - "cmt_msg": "" + "CVE-2023-52501": { + "cmt_msg": "ring-buffer: Do not attempt to read past \"commit\"" }, - "CVE-2021-3609": { - "cmt_msg": "can: bcm: delay release of struct bcm_op after synchronize_rcu()" + "CVE-2023-52500": { + "cmt_msg": "scsi: pm80xx: Avoid leaking tags when processing OPC_INB_SET_CONTROLLER_CONFIG command" }, - "CVE-2023-6915": { - "cmt_msg": "ida: Fix crash in ida_free when the bitmap is empty" + "CVE-2023-52503": { + "cmt_msg": "tee: amdtee: fix use-after-free vulnerability in amdtee_close_session" + }, + "CVE-2023-52502": { + "cmt_msg": "net: nfc: fix races in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn()" + }, + "CVE-2023-1281": { + "cmt_msg": "net/sched: tcindex: update imperfect hash filters respecting rcu" + }, + "CVE-2023-2860": { + "cmt_msg": "ipv6: sr: fix out-of-bounds read when setting HMAC data." }, "CVE-2021-44879": { "cmt_msg": "f2fs: fix to do sanity check on inode type during garbage collection" }, - "CVE-2019-15505": { - "cmt_msg": "media: technisat-usb2: break out of loop at end of buffer" + "CVE-2023-1859": { + "cmt_msg": "9p/xen : Fix use after free bug in xen_9pfs_front_remove due to race condition" }, "CVE-2023-2513": { "cmt_msg": "ext4: fix use-after-free in ext4_xattr_set_entry" }, - "CVE-2017-1000": { - "cmt_msg": "udp: consistently apply ufo or fragmentation" + "CVE-2022-1516": { + "cmt_msg": "net/x25: Fix null-ptr-deref caused by x25_disconnect" }, - "CVE-2020-11609": { - "cmt_msg": "media: stv06xx: add missing descriptor sanity checks" + "CVE-2023-1855": { + "cmt_msg": "hwmon: (xgene) Fix use after free bug in xgene_hwmon_remove due to race condition" }, "CVE-2022-27672": { "cmt_msg": "x86/speculation: Identify processors vulnerable to SMT RSB predictions" }, - "CVE-2020-0429": { - "cmt_msg": "l2tp: fix race between l2tp_session_delete() and l2tp_tunnel_closeall()" + "CVE-2023-52563": { + "cmt_msg": "drm/meson: fix memory leak on ->hpd_notify callback" }, - "CVE-2020-27066": { - "cmt_msg": "xfrm: policy: Fix doulbe free in xfrm_policy_timer" + "CVE-2024-26668": { + "cmt_msg": "netfilter: nft_limit: reject configurations that cause integer overflow" }, - "CVE-2022-2964": { - "cmt_msg": "net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup" + "CVE-2024-26669": { + "cmt_msg": "net/sched: flower: Fix chain template offload" }, - "CVE-2017-0605": { - "cmt_msg": "tracing: Use strlcpy() instead of strcpy() in __trace_find_cmdline()" + "CVE-2021-47146": { + "cmt_msg": "mld: fix panic in mld_newpack()" }, - "CVE-2021-1048": { - "cmt_msg": "fix regression in \"epoll: Keep a reference on files added to the check list\"" + "CVE-2020-25220": { + "cmt_msg": "" }, "CVE-2015-2877": { "cmt_msg": "" }, - "CVE-2020-9383": { - "cmt_msg": "floppy: check FDC index for errors before assigning it" - }, - "CVE-2022-3586": { - "cmt_msg": "sch_sfb: Don't assume the skb is still around after enqueueing to child" + "CVE-2023-26242": { + "cmt_msg": "" }, - "CVE-2023-32269": { - "cmt_msg": "netrom: Fix use-after-free caused by accept on already connected socket" + "CVE-2024-26664": { + "cmt_msg": "hwmon: (coretemp) Fix out-of-bounds memory access" }, - "CVE-2023-1206": { - "cmt_msg": "tcp: Reduce chance of collisions in inet6_hashfn()." + "CVE-2019-16089": { + "cmt_msg": "" }, "CVE-2021-38198": { "cmt_msg": "KVM: X86: MMU: Use the correct inherited permissions to get shadow page" }, - "CVE-2022-33744": { - "cmt_msg": "xen/arm: Fix race in RB-tree based P2M accounting" - }, - "CVE-2017-5972": { - "cmt_msg": "tcp: do not lock listener to process SYN packets" + "CVE-2021-38199": { + "cmt_msg": "NFSv4: Initialise connection to the server in nfs4_alloc_client()" }, - "CVE-2020-8832": { - "cmt_msg": "drm/i915: Record the default hw state after reset upon load" + "CVE-2024-26689": { + "cmt_msg": "ceph: prevent use-after-free in encode_cap_msg()" }, - "CVE-2017-5970": { - "cmt_msg": "ipv4: keep skb->dst around in presence of IP options" + "CVE-2022-1679": { + "cmt_msg": "ath9k: fix use-after-free in ath9k_hif_usb_rx_cb" }, "CVE-2023-1513": { "cmt_msg": "kvm: initialize all of the kvm_debugregs structure before sending it to userspace" @@ -91394,258 +123178,219 @@ "CVE-2021-3847": { "cmt_msg": "" }, - "CVE-2018-1130": { - "cmt_msg": "dccp: check sk for closed state in dccp_sendmsg()" + "CVE-2023-4207": { + "cmt_msg": "net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free" }, "CVE-2023-52442": { "cmt_msg": "ksmbd: validate session id and tree id in compound request" }, - "CVE-2019-14284": { - "cmt_msg": "floppy: fix div-by-zero in setup_format_params" + "CVE-2022-40768": { + "cmt_msg": "scsi: stex: Properly zero out the passthrough command structure" }, - "CVE-2020-36557": { - "cmt_msg": "vt: vt_ioctl: fix VT_DISALLOCATE freeing in-use virtual console" + "CVE-2021-45486": { + "cmt_msg": "inet: use bigger hash table for IP ID generation" }, - "CVE-2021-3506": { - "cmt_msg": "f2fs: fix to avoid out-of-bounds memory access" + "CVE-2021-3923": { + "cmt_msg": "RDMA/core: Don't infoleak GRH fields" }, "CVE-2011-4917": { "cmt_msg": "" }, - "CVE-2011-4916": { - "cmt_msg": "" - }, - "CVE-2019-14283": { - "cmt_msg": "floppy: fix out-of-bounds read in copy_buffer" - }, - "CVE-2019-3901": { - "cmt_msg": "perf/core: Fix perf_event_open() vs. execve() race" - }, - "CVE-2019-3900": { - "cmt_msg": "vhost_net: fix possible infinite loop" - }, - "CVE-2019-19528": { - "cmt_msg": "USB: iowarrior: fix use-after-free on disconnect" - }, - "CVE-2016-4913": { - "cmt_msg": "get_rock_ridge_filename(): handle malformed NM entries" - }, - "CVE-2018-13100": { - "cmt_msg": "f2fs: fix to do sanity check with secs_per_zone" - }, - "CVE-2017-16646": { - "cmt_msg": "media: dib0700: fix invalid dvb_detach argument" + "CVE-2021-45485": { + "cmt_msg": "ipv6: use prandom_u32() for ID generation" }, - "CVE-2017-16645": { - "cmt_msg": "Input: ims-psu - check if CDC union descriptor is sane" + "CVE-2023-52448": { + "cmt_msg": "gfs2: Fix kernel NULL pointer dereference in gfs2_rgrp_dump" }, - "CVE-2017-16643": { - "cmt_msg": "Input: gtco - fix potential out-of-bound access" + "CVE-2023-52449": { + "cmt_msg": "mtd: Fix gluebi NULL pointer dereference caused by ftl notifier" }, - "CVE-2018-10882": { - "cmt_msg": "ext4: add more inode number paranoia checks" + "CVE-2023-23039": { + "cmt_msg": "" }, - "CVE-2023-31083": { - "cmt_msg": "Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO" + "CVE-2024-26719": { + "cmt_msg": "nouveau: offload fence uevents work to workqueue" }, - "CVE-2019-5489": { - "cmt_msg": "Change mincore() to count \"mapped\" pages rather than \"cached\" pages" + "CVE-2024-26715": { + "cmt_msg": "usb: dwc3: gadget: Fix NULL pointer dereference in dwc3_gadget_suspend" }, "CVE-2024-1312": { "cmt_msg": "mm: lock_vma_under_rcu() must check vma->anon_vma under vma lock" }, - "CVE-2018-10883": { - "cmt_msg": "jbd2: don't mark block as modified if the handle is out of credits" - }, - "CVE-2018-10880": { - "cmt_msg": "ext4: never move the system.data xattr out of the inode body" - }, - "CVE-2018-10881": { - "cmt_msg": "ext4: clear i_data in ext4_inode_info when removing inline data" + "CVE-2023-3338": { + "cmt_msg": "Remove DECnet support from kernel" }, - "CVE-2017-16649": { - "cmt_msg": "net: cdc_ether: fix divide by 0 on bad descriptors" + "CVE-2024-26712": { + "cmt_msg": "powerpc/kasan: Fix addr error caused by page alignment" }, - "CVE-2017-16648": { - "cmt_msg": "dvb_frontend: don't use-after-free the frontend struct" + "CVE-2024-26713": { + "cmt_msg": "powerpc/pseries/iommu: Fix iommu initialisation during DLPAR add" } } }, - "5.7": { - "5.7": { - "CVE-2020-10732": { - "cmt_msg": "fs/binfmt_elf.c: allocate initialized memory in fill_thread_core_info()", - "cmt_id": "1d605416fb7175e1adf094251466caa52093b413" - } - }, - "5.7.1": { - "CVE-2020-10757": { - "cmt_msg": "mm: Fix mremap not considering huge pmd devmap", - "cmt_id": "e98a6a24baae41cc3632a0bf343fe844eff53cea" + "5.9": { + "5.9": { + "CVE-2020-27194": { + "cmt_msg": "bpf: Fix scalar32_min_max_or bounds tracking", + "cmt_id": "5b9fbeb75b6a98955f628e205ac26689bcb1383e" }, - "CVE-2019-19462": { - "cmt_msg": "kernel/relay.c: handle alloc_percpu returning NULL in relay_open", - "cmt_id": "8c20f4355ab55fc07facacb1cd99bdb6fc5ebc1d" + "CVE-2020-28915": { + "cmt_msg": "fbcon: Fix global-out-of-bounds read in fbcon_get_font()", + "cmt_id": "5af08640795b2b9a940c9266c0260455377ae262" } }, - "5.7.2": { - "CVE-2020-13974": { - "cmt_msg": "vt: keyboard: avoid signed integer overflow in k_ascii", - "cmt_id": "7ca8cd811dcc6550be059813caf4f2cf888a7616" + "5.9.1": { + "CVE-2020-12352": { + "cmt_msg": "Bluetooth: A2MP: Fix not initializing all members", + "cmt_id": "122414e2d2cba74dc154263cabca9560ff8011ac" }, - "CVE-2020-0543": { - "cmt_msg": "x86/cpu: Add 'table' argument to cpu_matches()", - "cmt_id": "468e86c304bd2e32307b438b67d61c0075a9beb9" + "CVE-2020-12351": { + "cmt_msg": "Bluetooth: L2CAP: Fix calling sk_filter on non-socket based channel", + "cmt_id": "3dede8ebf46338473143a1e792cc2cacc244f1f2" } }, - "5.7.3": { - "CVE-2021-0342": { - "cmt_msg": "tun: correct header offsets in napi frags mode", - "cmt_id": "ab5e1d8d91872d6d80119a560255ff549985cff9" + "5.9.2": { + "CVE-2020-14351": { + "cmt_msg": "perf/core: Fix race in the perf_mmap_close() function", + "cmt_id": "f1f019eff8c9515d99bdc032aa77b36e7cd01b66" }, - "CVE-2020-10766": { - "cmt_msg": "x86/speculation: Prevent rogue cross-process SSBD shutdown", - "cmt_id": "18f82da06ec6653646fd2670765aac24275f4833" + "CVE-2020-27152": { + "cmt_msg": "KVM: ioapic: break infinite recursion on lazy EOI", + "cmt_id": "293c420c1af6355ccb53d816146f5455909e26b9" }, - "CVE-2020-10767": { - "cmt_msg": "x86/speculation: Avoid force-disabling IBPB based on STIBP and enhanced IBRS.", - "cmt_id": "862442343c016befe654c1f3f8d9d5791071df4c" + "CVE-2020-27784": { + "cmt_msg": "usb: gadget: function: printer: fix use-after-free in __lock_acquire", + "cmt_id": "5f845e5d18d151230476cf90aa46449f69ba2ef1" }, - "CVE-2020-10768": { - "cmt_msg": "x86/speculation: PR_SPEC_FORCE_DISABLE enforcement for indirect branches.", - "cmt_id": "69e93896809da49f0946044bd31daf9a7482b440" + "CVE-2020-0423": { + "cmt_msg": "binder: fix UAF when releasing todo list", + "cmt_id": "2144f0b90aeb2ead33d590f2e45f9be185b93009" }, - "CVE-2020-29374": { - "cmt_msg": "gup: document and work around \"COW can break either way\" issue", - "cmt_id": "8e45fdafdecc8436c5b6e1620c30726056e6b29c" + "CVE-2020-25705": { + "cmt_msg": "icmp: randomize the global rate limiter", + "cmt_id": "7237c55005ed638b7c89703079944dbd80dee7fe" } }, - "5.7.5": { - "CVE-2020-29368": { - "cmt_msg": "mm: thp: make the THP mapcount atomic against __split_huge_pmd_locked()", - "cmt_id": "114b91ff0861de531e412aebe8c4dfda21291c7b" + "5.9.3": { + "CVE-2021-20194": { + "cmt_msg": "io_uring: don't rely on weak ->files references", + "cmt_id": "adb6bf5ea1ac14bc78bdd5fc0cbe232d97870169" + }, + "CVE-2020-29534": { + "cmt_msg": "io_uring: don't rely on weak ->files references", + "cmt_id": "adb6bf5ea1ac14bc78bdd5fc0cbe232d97870169" + }, + "CVE-2021-20226": { + "cmt_msg": "io_uring: don't rely on weak ->files references", + "cmt_id": "adb6bf5ea1ac14bc78bdd5fc0cbe232d97870169" } }, - "5.7.6": { - "CVE-2020-12771": { - "cmt_msg": "bcache: fix potential deadlock problem in btree_gc_coalesce", - "cmt_id": "4813dd656732207ad9df7738652bbbbde4c7c928" + "5.9.5": { + "CVE-2020-25668": { + "cmt_msg": "tty: make FONTX ioctl use the tty pointer they were actually passed", + "cmt_id": "8a071286dbe17c9aa690f6c7c2b8e5495cf82a30" }, - "CVE-2020-15436": { - "cmt_msg": "block: Fix use-after-free in blkdev_get()", - "cmt_id": "4f8d723f871edb95a05d43ad88faf406c66393db" + "CVE-2020-27777": { + "cmt_msg": "powerpc/rtas: Restrict RTAS requests from userspace", + "cmt_id": "e61aaa2c70169a10dcd3df5391b1bc1468f11cac" + }, + "CVE-2020-27673": { + "cmt_msg": "xen/events: add a proper barrier to 2-level uevent unmasking", + "cmt_id": "efdaf1d3683c106b609d1170f640bdeccdbdcf63" + }, + "CVE-2020-27675": { + "cmt_msg": "xen/events: avoid removing an event channel while handling it", + "cmt_id": "6b7343607ffe88bd8a336d4a546dcf8ec383c456" + }, + "CVE-2020-25656": { + "cmt_msg": "vt: keyboard, extend func_buf_lock to readers", + "cmt_id": "c76b008823e5278046d805a652136e01d16ec138" + }, + "CVE-2020-27825": { + "cmt_msg": "tracing: Fix race in trace_open and buffer resize call", + "cmt_id": "de3d7ff3ec852e455c5924f4c8b1f826496d6705" } }, - "5.7.7": { - "CVE-2020-15780": { - "cmt_msg": "ACPI: configfs: Disallow loading ACPI tables when locked down", - "cmt_id": "63897052acc5a97e6cd0ffecda0a8d05aab6f85b" + "5.9.7": { + "CVE-2020-28974": { + "cmt_msg": "vt: Disable KD_FONT_OP_COPY", + "cmt_id": "ecba10d25f7530aeb6b5366f5aed4ab818b4ea6b" + }, + "CVE-2020-35508": { + "cmt_msg": "fork: fix copy_process(CLONE_PARENT) race with the exiting ->real_parent", + "cmt_id": "362dfa5e0205a5ea70bf3ac2ae00487e1a5bb8f5" + }, + "CVE-2020-25704": { + "cmt_msg": "perf/core: Fix a memory leak in perf_event_parse_addr_filter()", + "cmt_id": "85669bd0f0641edf3e8afd90256a3f34bde7bb70" } }, - "5.7.8": { - "CVE-2020-24394": { - "cmt_msg": "nfsd: apply umask on fs without ACL support", - "cmt_id": "fb17be570b470fd56ccb2db7c1b0beb4d0d590d7" - }, - "CVE-2020-15393": { - "cmt_msg": "usb: usbtest: fix missing kfree(dev->buf) in usbtest_disconnect", - "cmt_id": "4c424f6d0af716110dd7d78e89afce4d99f16815" + "5.9.8": { + "CVE-2020-8694": { + "cmt_msg": "powercap: restrict energy meter to root access", + "cmt_id": "b72aaa9506b38e68f3476a642d0e42b3071f82bb" } }, - "5.7.10": { - "CVE-2020-15852": { - "cmt_msg": "x86/ioperm: Fix io bitmap invalidation on Xen PV", - "cmt_id": "3bbf8195e79707268f4fd072d7575ced0207e4ef" - }, - "CVE-2020-14356": { - "cmt_msg": "cgroup: fix cgroup_sk_alloc() for sk_clone_lock()", - "cmt_id": "26d0bcfcf7150bc7c115f2d3f2f1459e64029b98" - }, - "CVE-2022-0812": { - "cmt_msg": "xprtrdma: fix incorrect header size calculations", - "cmt_id": "fe3b01c6588829a4a5d89e4b6d4254087aa40f20" - }, - "CVE-2020-10781": { - "cmt_msg": "Revert \"zram: convert remaining CLASS_ATTR() to CLASS_ATTR_RO()\"", - "cmt_id": "8fd782b2376168717dddfbcae0786b47e61777bb" + "5.9.9": { + "CVE-2020-12912": { + "cmt_msg": "hwmon: (amd_energy) modify the visibility of the counters", + "cmt_id": "800c1e71804ba115dd77454692b963a3b1d8bf6f" } }, - "5.7.11": { - "CVE-2020-29369": { - "cmt_msg": "mm/mmap.c: close race between munmap() and expand_upwards()/downwards()", - "cmt_id": "b6afd2a9f2839a60a6cd6a0cac740019f90c35eb" + "5.9.10": { + "CVE-2020-4788": { + "cmt_msg": "powerpc/64s: flush L1D on kernel entry", + "cmt_id": "e590b36718d6e740b7b19514f710402a6499164c" }, - "CVE-2020-15437": { - "cmt_msg": "serial: 8250: fix null-ptr-deref in serial8250_start_tx()", - "cmt_id": "eb710a1ac0b2c5d46917563b78ebef429b0e8738" + "CVE-2020-25669": { + "cmt_msg": "Input: sunkbd - avoid use-after-free in teardown paths", + "cmt_id": "88d9fe1e1487a5a084c12d4e92ec40b908553ce2" } }, - "5.7.13": { - "CVE-2020-24490": { - "cmt_msg": "Bluetooth: fix kernel oops in store_pending_adv_report", - "cmt_id": "15a9441c207a546ae7cadfe092aea5ae9751c967" - }, - "CVE-2020-12656": { - "cmt_msg": "sunrpc: check that domain table is empty at module unload.", - "cmt_id": "ec25aabaffe687774165ae491cc797d7d8a79454" + "5.9.11": { + "CVE-2020-28941": { + "cmt_msg": "speakup: Do not let the line discipline be used several times", + "cmt_id": "1f1cc0b0ba3ac8b5c719bdf1a4952889dfd9b593" } }, - "5.7.14": { - "CVE-2020-16166": { - "cmt_msg": "random32: update the net random state on interrupt and activity", - "cmt_id": "378a4d2215334fa4d3c5888a008f8896066bc231" + "5.9.12": { + "CVE-2020-27835": { + "cmt_msg": "IB/hfi1: Ensure correct mm is used at all times", + "cmt_id": "5732f83596f8a573f2cde814cc76a54e1a8995c7" } }, - "5.7.15": { - "CVE-2020-36386": { - "cmt_msg": "Bluetooth: Fix slab-out-of-bounds read in hci_extended_inquiry_result_evt()", - "cmt_id": "886a27c346901b6b5a3d5b12ca50ca821817185d" - }, - "CVE-2020-14331": { - "cmt_msg": "vgacon: Fix for missing check in scrollback handling", - "cmt_id": "b2f1d746c96a16ae97099b9f454d01a9b730c26a" + "5.9.13": { + "CVE-2020-35519": { + "cmt_msg": "net/x25: prevent a couple of overflows", + "cmt_id": "7704d8bbcfb640e6cda0e48f6b4edfeac00426a9" } }, - "5.7.16": { - "CVE-2020-26088": { - "cmt_msg": "net/nfc/rawsock.c: add CAP_NET_RAW check.", - "cmt_id": "f8093f0d1ababcb1a1ea859e1638a14fa5627e42" - }, - "CVE-2020-36387": { - "cmt_msg": "io_uring: hold 'ctx' reference around task_work queue + execute", - "cmt_id": "f93bc10c64afceb019ccdc7b5424ecedbd613f64" + "5.9.14": { + "CVE-2020-29661": { + "cmt_msg": "tty: Fix ->pgrp locking in tiocspgrp()", + "cmt_id": "4203f474d4c3e93b3c2462e4f7954cf6e4832074" }, - "CVE-2019-19770": { - "cmt_msg": "blktrace: fix debugfs use after free", - "cmt_id": "4470c2949a07883cda4de6899ce8507b0fc6aa5d" + "CVE-2020-29660": { + "cmt_msg": "tty: Fix ->session locking", + "cmt_id": "730649666353d495cfa8eade6e7f57936d0466af" }, - "CVE-2021-20292": { - "cmt_msg": "drm/ttm/nouveau: don't call tt destroy callback on alloc failure.", - "cmt_id": "7387ad86fe8ef830e88a586b021b322eef316211" - } - }, - "5.7.17": { - "CVE-2019-19448": { - "cmt_msg": "btrfs: only search for left_info if there is no right_info in try_merge_free_space", - "cmt_id": "7726619a51873ac0ac73d31f7852e0eb01a0833b" + "CVE-2020-27830": { + "cmt_msg": "speakup: Reject setting the speakup line discipline outside of speakup", + "cmt_id": "9920472eaa7c652c7abcad4911fa83b6ae5a4955" }, - "CVE-2020-25212": { - "cmt_msg": "nfs: Fix getxattr kernel panic and memory overflow", - "cmt_id": "4476b8282f0bdbf21c8a1e5d783ee11a0edfcaf2" + "CVE-2020-28588": { + "cmt_msg": "lib/syscall: fix syscall registers retrieval on 32-bit platforms", + "cmt_id": "bc6ca732f4a4dce79abd0fdeb81fc5c20e01fd0a" } }, - "5.7.18": { - "CVE-2020-14314": { - "cmt_msg": "ext4: fix potential negative array index in do_split()", - "cmt_id": "e50fe43e3062e18846e99d9646b9c07b097eb1ed" - }, - "CVE-2020-29371": { - "cmt_msg": "romfs: fix uninitialized memory leak in romfs_dev_read()", - "cmt_id": "ec5713663214ae0cc9821c0a40b6c6022fcaa4d8" + "5.9.15": { + "CVE-2021-3411": { + "cmt_msg": "x86/kprobes: Fix optprobe to detect INT3 padding correctly", + "cmt_id": "d4f949439d2748209b004b4003e21285e580909d" }, - "CVE-2020-0466": { - "cmt_msg": "do_epoll_ctl(): clean the failure exits up a bit", - "cmt_id": "7d6b91e878c590f471db7ed0ddb1952f40146cec" + "CVE-2021-0938": { + "cmt_msg": "compiler.h: fix barrier_data() on clang", + "cmt_id": "54ddef488732546219d457830641e6452d8056f9" } }, "outstanding": { @@ -91655,9 +123400,6 @@ "CVE-2023-30772": { "cmt_msg": "power: supply: da9150: Fix use after free bug in da9150_charger_remove due to race condition" }, - "CVE-2020-35508": { - "cmt_msg": "fork: fix copy_process(CLONE_PARENT) race with the exiting ->real_parent" - }, "CVE-2022-3649": { "cmt_msg": "nilfs2: fix use-after-free bug of struct nilfs_root" }, @@ -91679,12 +123421,33 @@ "CVE-2022-0002": { "cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE" }, + "CVE-2021-3752": { + "cmt_msg": "Bluetooth: fix use-after-free error in lock_sock_nested()" + }, + "CVE-2024-26685": { + "cmt_msg": "nilfs2: fix potential bug in end_buffer_async_write" + }, + "CVE-2023-52615": { + "cmt_msg": "hwrng: core - Fix page fault dead lock on mmap-ed hwrng" + }, + "CVE-2023-52614": { + "cmt_msg": "PM / devfreq: Fix buffer overflow in trans_stat_show" + }, + "CVE-2023-52617": { + "cmt_msg": "PCI: switchtec: Fix stdev_release() crash after surprise hot remove" + }, "CVE-2020-24587": { "cmt_msg": "mac80211: prevent mixed key and fragment cache attacks" }, "CVE-2020-24586": { "cmt_msg": "mac80211: prevent mixed key and fragment cache attacks" }, + "CVE-2022-0995": { + "cmt_msg": "watch_queue: Fix filter limit check" + }, + "CVE-2023-52612": { + "cmt_msg": "crypto: scomp - fix req->dst buffer overflow" + }, "CVE-2022-3105": { "cmt_msg": "RDMA/uverbs: Check for null return of kmalloc_array" }, @@ -91733,32 +123496,80 @@ "CVE-2022-42703": { "cmt_msg": "mm/rmap: Fix anon_vma->degree ambiguity leading to double-reuse" }, - "CVE-2022-23825": { - "cmt_msg": "" + "CVE-2021-47059": { + "cmt_msg": "crypto: sun8i-ss - fix result memory leak on error path" }, - "CVE-2021-3847": { + "CVE-2024-26595": { + "cmt_msg": "mlxsw: spectrum_acl_tcam: Fix NULL pointer dereference in error path" + }, + "CVE-2022-23825": { "cmt_msg": "" }, "CVE-2021-42252": { "cmt_msg": "soc: aspeed: lpc-ctrl: Fix boundary check for mmap" }, - "CVE-2023-4004": { - "cmt_msg": "netfilter: nft_set_pipapo: fix improper element removal" + "CVE-2021-47051": { + "cmt_msg": "spi: fsl-lpspi: Fix PM reference leak in lpspi_prepare_xfer_hardware()" }, - "CVE-2023-0179": { - "cmt_msg": "netfilter: nft_payload: incorrect arithmetics when fetching VLAN header bits" + "CVE-2021-47050": { + "cmt_msg": "memory: renesas-rpc-if: fix possible NULL pointer dereference of resource" }, - "CVE-2022-21125": { - "cmt_msg": "x86/speculation/mmio: Reuse SRBDS mitigation for SBDS" + "CVE-2021-47056": { + "cmt_msg": "crypto: qat - ADF_STATUS_PF_RUNNING should be set after adf_dev_init" }, - "CVE-2023-28466": { - "cmt_msg": "net: tls: fix possible race condition between do_tls_getsockopt_conf() and do_tls_setsockopt_conf()" + "CVE-2021-47055": { + "cmt_msg": "mtd: require write permissions for locking and badblock ioctls" + }, + "CVE-2021-47054": { + "cmt_msg": "bus: qcom: Put child node before return" + }, + "CVE-2021-47112": { + "cmt_msg": "x86/kvm: Teardown PV features on boot CPU as well" + }, + "CVE-2021-47113": { + "cmt_msg": "btrfs: abort in rename_exchange if we fail to insert the second ref" + }, + "CVE-2021-47110": { + "cmt_msg": "x86/kvm: Disable kvmclock on all CPUs on shutdown" + }, + "CVE-2021-47111": { + "cmt_msg": "xen-netback: take a reference to the RX task thread" + }, + "CVE-2021-47116": { + "cmt_msg": "ext4: fix memory leak in ext4_mb_init_backend on error path." + }, + "CVE-2021-47117": { + "cmt_msg": "ext4: fix bug on in ext4_es_cache_extent as ext4_split_extent_at failed" + }, + "CVE-2021-47114": { + "cmt_msg": "ocfs2: fix data corruption by fallocate" + }, + "CVE-2021-46973": { + "cmt_msg": "net: qrtr: Avoid potential use after free in MHI send" + }, + "CVE-2021-46972": { + "cmt_msg": "ovl: fix leaked dentry" + }, + "CVE-2021-46971": { + "cmt_msg": "perf/core: Fix unconditional security_locked_down() call" + }, + "CVE-2021-46970": { + "cmt_msg": "bus: mhi: pci_generic: Remove WQ_MEM_RECLAIM flag from state workqueue" + }, + "CVE-2021-46977": { + "cmt_msg": "KVM: VMX: Disable preemption when probing user return MSRs" + }, + "CVE-2021-46976": { + "cmt_msg": "drm/i915: Fix crash in auto_retire" }, "CVE-2022-40307": { "cmt_msg": "efi: capsule-loader: Fix use-after-free in efi_capsule_write" }, - "CVE-2022-21123": { - "cmt_msg": "x86/speculation/mmio: Add mitigation for Processor MMIO Stale Data" + "CVE-2021-46974": { + "cmt_msg": "bpf: Fix masking negation logic upon negative dst register" + }, + "CVE-2023-52586": { + "cmt_msg": "drm/msm/dpu: Add mutex lock in control vblank irq" }, "CVE-2021-28688": { "cmt_msg": "xen-blkback: don't leak persistent grants from xen_blkbk_map()" @@ -91775,6 +123586,9 @@ "CVE-2021-43976": { "cmt_msg": "mwifiex: Fix skb_over_panic in mwifiex_usb_recv()" }, + "CVE-2022-3106": { + "cmt_msg": "sfc_ef100: potential dereference of null pointer" + }, "CVE-2023-0459": { "cmt_msg": "uaccess: Add speculation barrier to copy_from_user()" }, @@ -91805,9 +123619,6 @@ "CVE-2022-3628": { "cmt_msg": "wifi: brcmfmac: Fix potential buffer overflow in brcmf_fweh_event_worker()" }, - "CVE-2024-26591": { - "cmt_msg": "bpf: Fix re-attachment branch in bpf_tracing_prog_attach" - }, "CVE-2020-15802": { "cmt_msg": "" }, @@ -91829,8 +123640,8 @@ "CVE-2022-3633": { "cmt_msg": "can: j1939: j1939_session_destroy(): fix memory leak of skbs" }, - "CVE-2021-34556": { - "cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4" + "CVE-2021-28715": { + "cmt_msg": "xen/netback: don't queue unlimited number of packages" }, "CVE-2022-34918": { "cmt_msg": "netfilter: nf_tables: stricter validation of element data" @@ -91844,11083 +123655,10733 @@ "CVE-2022-3202": { "cmt_msg": "jfs: prevent NULL deref in diFree" }, - "CVE-2022-2602": { - "cmt_msg": "io_uring/af_unix: defer registered files gc to io_uring release" - }, - "CVE-2024-26585": { - "cmt_msg": "tls: fix race between tx work scheduling and socket close" - }, - "CVE-2024-26584": { - "cmt_msg": "net: tls: handle backlogging of crypto requests" - }, - "CVE-2023-2008": { - "cmt_msg": "udmabuf: add back sanity check" - }, - "CVE-2024-26587": { - "cmt_msg": "net: netdevsim: don't try to destroy PHC on VFs" - }, - "CVE-2023-2002": { - "cmt_msg": "bluetooth: Perform careful capability checks in hci_sock_ioctl()" - }, - "CVE-2022-1247": { - "cmt_msg": "" - }, - "CVE-2023-2007": { - "cmt_msg": "scsi: dpt_i2o: Remove obsolete driver" - }, - "CVE-2020-26145": { - "cmt_msg": "ath10k: drop fragments with multicast DA for PCIe" - }, - "CVE-2023-51782": { - "cmt_msg": "net/rose: Fix Use-After-Free in rose_ioctl" - }, - "CVE-2020-26147": { - "cmt_msg": "mac80211: assure all fragments are encrypted" - }, - "CVE-2020-26141": { - "cmt_msg": "ath10k: Fix TKIP Michael MIC verification for PCIe" - }, - "CVE-2020-26140": { - "cmt_msg": "" - }, - "CVE-2021-43389": { - "cmt_msg": "isdn: cpai: check ctr->cnr to avoid array index out of bound" - }, - "CVE-2020-26142": { - "cmt_msg": "" - }, - "CVE-2023-1074": { - "cmt_msg": "sctp: fail if no bound addresses can be used for a given scope" - }, - "CVE-2023-1075": { - "cmt_msg": "net/tls: tls_is_tx_ready() checked list_entry" - }, - "CVE-2023-1076": { - "cmt_msg": "tun: tun_chr_open(): correctly initialize socket uid" - }, - "CVE-2023-1077": { - "cmt_msg": "sched/rt: pick_next_rt_entity(): check list_entry" - }, - "CVE-2023-46838": { - "cmt_msg": "xen-netback: don't produce zero-size SKB frags" - }, - "CVE-2023-51780": { - "cmt_msg": "atm: Fix Use-After-Free in do_vcc_ioctl" - }, - "CVE-2023-40283": { - "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb" - }, - "CVE-2023-1073": { - "cmt_msg": "HID: check empty report_list in hid_validate_values()" - }, - "CVE-2023-51042": { - "cmt_msg": "drm/amdgpu: Fix potential fence use-after-free v2" - }, - "CVE-2020-29661": { - "cmt_msg": "tty: Fix ->pgrp locking in tiocspgrp()" - }, - "CVE-2020-29660": { - "cmt_msg": "tty: Fix ->session locking" - }, - "CVE-2022-1734": { - "cmt_msg": "nfc: nfcmrvl: main: reorder destructive operations in nfcmrvl_nci_unregister_dev to avoid bugs" - }, - "CVE-2022-3625": { - "cmt_msg": "devlink: Fix use-after-free after a failed reload" - }, - "CVE-2023-28772": { - "cmt_msg": "seq_buf: Fix overflow in seq_buf_putmem_hex()" - }, - "CVE-2022-2588": { - "cmt_msg": "net_sched: cls_route: remove from list when handle is 0" - }, - "CVE-2022-3707": { - "cmt_msg": "drm/i915/gvt: fix double free bug in split_2MB_gtt_entry" - }, - "CVE-2022-2503": { - "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag" - }, - "CVE-2021-32399": { - "cmt_msg": "bluetooth: eliminate the potential race condition when removing the HCI controller" - }, - "CVE-2021-27364": { - "cmt_msg": "scsi: iscsi: Restrict sessions and handles to admin capabilities" - }, - "CVE-2022-23038": { - "cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()" - }, - "CVE-2022-23039": { - "cmt_msg": "xen/gntalloc: don't use gnttab_query_foreign_access()" - }, - "CVE-2022-20154": { - "cmt_msg": "sctp: use call_rcu to free endpoint" - }, - "CVE-2021-45868": { - "cmt_msg": "quota: check block number when reading the block in quota file" - }, - "CVE-2022-20158": { - "cmt_msg": "net/packet: fix slab-out-of-bounds access in packet_recvmsg()" - }, - "CVE-2022-23037": { - "cmt_msg": "xen/netfront: don't use gnttab_query_foreign_access() for mapped status" - }, - "CVE-2024-0564": { - "cmt_msg": "" - }, - "CVE-2024-0565": { - "cmt_msg": "smb: client: fix OOB in receive_encrypted_standard()" - }, - "CVE-2023-2176": { - "cmt_msg": "RDMA/core: Refactor rdma_bind_addr" - }, - "CVE-2023-2177": { - "cmt_msg": "sctp: leave the err path free in sctp_stream_init to sctp_stream_free" - }, - "CVE-2021-38160": { - "cmt_msg": "virtio_console: Assure used length from device is limited" - }, - "CVE-2023-1252": { - "cmt_msg": "ovl: fix use after free in struct ovl_aio_req" - }, - "CVE-2021-42008": { - "cmt_msg": "net: 6pack: fix slab-out-of-bounds in decode_data" - }, - "CVE-2022-3107": { - "cmt_msg": "hv_netvsc: Add check for kvmalloc_array" - }, - "CVE-2022-39189": { - "cmt_msg": "KVM: x86: do not report a vCPU as preempted outside instruction boundaries" - }, - "CVE-2021-38166": { - "cmt_msg": "bpf: Fix integer overflow involving bucket_size" - }, - "CVE-2021-3490": { - "cmt_msg": "bpf: Fix alu32 const subreg bound tracking on bitwise operations" - }, - "CVE-2021-3491": { - "cmt_msg": "io_uring: truncate lengths larger than MAX_RW_COUNT on provide buffers" - }, - "CVE-2020-25643": { - "cmt_msg": "hdlc_ppp: add range checks in ppp_cp_parse_cr()" - }, - "CVE-2020-25641": { - "cmt_msg": "block: allow for_each_bvec to support zero len bvec" - }, - "CVE-2005-3660": { - "cmt_msg": "" - }, - "CVE-2022-0516": { - "cmt_msg": "KVM: s390: Return error on SIDA memop on normal guest" - }, - "CVE-2023-31085": { - "cmt_msg": "ubi: Refuse attaching if mtd's erasesize is 0" - }, - "CVE-2023-31084": { - "cmt_msg": "media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*()" - }, - "CVE-2023-31083": { - "cmt_msg": "Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO" - }, - "CVE-2023-31082": { - "cmt_msg": "" - }, - "CVE-2023-31081": { - "cmt_msg": "" - }, - "CVE-2021-33034": { - "cmt_msg": "Bluetooth: verify AMP hci_chan before amp_destroy" - }, - "CVE-2021-33033": { - "cmt_msg": "cipso,calipso: resolve a number of problems with the DOI refcounts" - }, - "CVE-2024-26588": { - "cmt_msg": "LoongArch: BPF: Prevent out-of-bounds memory access" - }, - "CVE-2024-23307": { - "cmt_msg": "" - }, - "CVE-2022-32296": { - "cmt_msg": "tcp: increase source port perturb table to 2^16" - }, - "CVE-2020-28974": { - "cmt_msg": "vt: Disable KD_FONT_OP_COPY" - }, - "CVE-2023-3567": { - "cmt_msg": "vc_screen: move load of struct vc_data pointer in vcs_read() to avoid UAF" - }, - "CVE-2022-3028": { - "cmt_msg": "af_key: Do not call xfrm_probe_algs in parallel" - }, - "CVE-2020-14304": { - "cmt_msg": "" - }, - "CVE-2022-2318": { - "cmt_msg": "net: rose: fix UAF bugs caused by timer handler" - }, - "CVE-2022-33981": { - "cmt_msg": "floppy: disable FDRAWCMD by default" - }, - "CVE-2021-3564": { - "cmt_msg": "Bluetooth: fix the erroneous flush_work() order" - }, - "CVE-2023-3611": { - "cmt_msg": "net/sched: sch_qfq: account for stab overhead in qfq_enqueue" - }, - "CVE-2023-4132": { - "cmt_msg": "media: usb: siano: Fix warning due to null work_func_t function pointer" - }, - "CVE-2023-4133": { - "cmt_msg": "cxgb4: fix use after free bugs caused by circular dependency problem" - }, - "CVE-2020-26560": { - "cmt_msg": "" - }, - "CVE-2023-4134": { - "cmt_msg": "Input: cyttsp4_core - change del_timer_sync() to timer_shutdown_sync()" - }, - "CVE-2023-39198": { - "cmt_msg": "drm/qxl: fix UAF on handle creation" - }, - "CVE-2023-37454": { - "cmt_msg": "" - }, - "CVE-2022-20572": { - "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag" - }, - "CVE-2023-39194": { - "cmt_msg": "net: xfrm: Fix xfrm_address_filter OOB read" - }, - "CVE-2021-28964": { - "cmt_msg": "btrfs: fix race when cloning extent buffer during rewind of an old root" - }, - "CVE-2021-4083": { - "cmt_msg": "fget: check that the fd still exists after getting a ref to it" - }, - "CVE-2023-33288": { - "cmt_msg": "power: supply: bq24190: Fix use after free bug in bq24190_remove due to race condition" - }, - "CVE-2022-29900": { - "cmt_msg": "x86/kvm/vmx: Make noinstr clean" - }, - "CVE-2022-29901": { - "cmt_msg": "x86/kvm/vmx: Make noinstr clean" - }, - "CVE-2023-3161": { - "cmt_msg": "fbcon: Check font dimension limits" - }, - "CVE-2023-39192": { - "cmt_msg": "netfilter: xt_u32: validate user space input" - }, - "CVE-2023-25012": { - "cmt_msg": "HID: bigben: use spinlock to safely schedule workers" - }, - "CVE-2023-35828": { - "cmt_msg": "usb: gadget: udc: renesas_usb3: Fix use after free bug in renesas_usb3_remove due to race condition" - }, - "CVE-2022-29582": { - "cmt_msg": "io_uring: fix race between timeout flush and removal" - }, - "CVE-2022-1116": { - "cmt_msg": "" - }, - "CVE-2021-28660": { - "cmt_msg": "staging: rtl8188eu: prevent ->ssid overflow in rtw_wx_set_scan()" - }, - "CVE-2023-35823": { - "cmt_msg": "media: saa7134: fix use after free bug in saa7134_finidev due to race condition" - }, - "CVE-2022-23816": { - "cmt_msg": "x86/kvm/vmx: Make noinstr clean" - }, - "CVE-2023-35824": { - "cmt_msg": "media: dm1105: Fix use after free bug in dm1105_remove due to race condition" - }, - "CVE-2023-35827": { - "cmt_msg": "ravb: Fix use-after-free issue in ravb_tx_timeout_work()" - }, - "CVE-2021-20239": { - "cmt_msg": "net: pass a sockptr_t into ->setsockopt" - }, - "CVE-2022-3567": { - "cmt_msg": "ipv6: Fix data races around sk->sk_prot." - }, - "CVE-2022-3566": { - "cmt_msg": "tcp: Fix data races around icsk->icsk_af_ops." - }, - "CVE-2022-3565": { - "cmt_msg": "mISDN: fix use-after-free bugs in l1oip timer handlers" - }, - "CVE-2022-3564": { - "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free caused by l2cap_reassemble_sdu" - }, - "CVE-2022-4269": { - "cmt_msg": "act_mirred: use the backlog for nested calls to mirred ingress" - }, - "CVE-2020-36385": { - "cmt_msg": "RDMA/ucma: Rework ucma_migrate_id() to avoid races with destroy" - }, - "CVE-2023-52340": { - "cmt_msg": "ipv6: remove max_size check inline with ipv4" - }, - "CVE-2020-16120": { - "cmt_msg": "ovl: switch to mounter creds in readdir" - }, - "CVE-2023-6560": { - "cmt_msg": "io_uring: don't allow discontig pages for IORING_SETUP_NO_MMAP" - }, - "CVE-2021-46283": { - "cmt_msg": "netfilter: nf_tables: initialize set before expression setup" - }, - "CVE-2022-29581": { - "cmt_msg": "net/sched: cls_u32: fix netns refcount changes in u32_change()" - }, - "CVE-2022-1204": { - "cmt_msg": "ax25: Fix refcount leaks caused by ax25_cb_del()" - }, - "CVE-2023-1611": { - "cmt_msg": "btrfs: fix race between quota disable and quota assign ioctls" - }, - "CVE-2021-34693": { - "cmt_msg": "can: bcm: fix infoleak in struct bcm_msg_head" - }, - "CVE-2022-26490": { - "cmt_msg": "nfc: st21nfca: Fix potential buffer overflows in EVT_TRANSACTION" - }, - "CVE-2023-6817": { - "cmt_msg": "netfilter: nft_set_pipapo: skip inactive elements during set walk" - }, - "CVE-2022-1836": { - "cmt_msg": "floppy: disable FDRAWCMD by default" - }, - "CVE-2021-32078": { - "cmt_msg": "ARM: footbridge: remove personal server platform" - }, - "CVE-2022-30594": { - "cmt_msg": "ptrace: Check PTRACE_O_SUSPEND_SECCOMP permission on PTRACE_SEIZE" - }, - "CVE-2022-4662": { - "cmt_msg": "USB: core: Prevent nested device-reset calls" - }, - "CVE-2021-38204": { - "cmt_msg": "usb: max-3421: Prevent corruption of freed memory" - }, - "CVE-2021-38205": { - "cmt_msg": "net: xilinx_emaclite: Do not print real IOMEM pointer" - }, - "CVE-2021-38207": { - "cmt_msg": "net: ll_temac: Fix TX BD buffer overwrite" - }, - "CVE-2020-27830": { - "cmt_msg": "speakup: Reject setting the speakup line discipline outside of speakup" - }, - "CVE-2023-39189": { - "cmt_msg": "netfilter: nfnetlink_osf: avoid OOB read" - }, - "CVE-2023-35001": { - "cmt_msg": "netfilter: nf_tables: prevent OOB access in nft_byteorder_eval" - }, - "CVE-2022-27666": { - "cmt_msg": "esp: Fix possible buffer overflow in ESP transformation" - }, - "CVE-2021-38208": { - "cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect" - }, - "CVE-2021-38209": { - "cmt_msg": "netfilter: conntrack: Make global sysctls readonly in non-init netns" - }, - "CVE-2020-25211": { - "cmt_msg": "netfilter: ctnetlink: add a range check for l3/l4 protonum" - }, - "CVE-2022-0168": { - "cmt_msg": "cifs: fix NULL ptr dereference in smb2_ioctl_query_info()" - }, - "CVE-2020-26556": { - "cmt_msg": "" - }, - "CVE-2020-26557": { - "cmt_msg": "" - }, - "CVE-2020-26555": { - "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical" - }, - "CVE-2019-20794": { - "cmt_msg": "" - }, - "CVE-2020-26559": { - "cmt_msg": "" - }, - "CVE-2023-3397": { - "cmt_msg": "" - }, - "CVE-2022-26365": { - "cmt_msg": "xen/blkfront: fix leaking data in shared pages" - }, - "CVE-2023-52458": { - "cmt_msg": "block: add check that partition length needs to be aligned with block size" - }, - "CVE-2023-52457": { - "cmt_msg": "serial: 8250: omap: Don't skip resource freeing if pm_runtime_resume_and_get() failed" - }, - "CVE-2018-1121": { - "cmt_msg": "" - }, - "CVE-2023-52454": { - "cmt_msg": "nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length" - }, - "CVE-2023-52451": { - "cmt_msg": "powerpc/pseries/memhp: Fix access beyond end of drmem array" - }, - "CVE-2022-3061": { - "cmt_msg": "video: fbdev: i740fb: Error out if 'pixclock' equals zero" - }, - "CVE-2024-1086": { - "cmt_msg": "netfilter: nf_tables: reject QUEUE/DROP verdict parameters" - }, - "CVE-2024-22386": { - "cmt_msg": "" - }, - "CVE-2019-15794": { - "cmt_msg": "ovl: fix reference counting in ovl_mmap error path" - }, - "CVE-2022-3344": { - "cmt_msg": "KVM: x86: nSVM: harden svm_free_nested against freeing vmcb02 while still in use" - }, - "CVE-2023-23004": { - "cmt_msg": "malidp: Fix NULL vs IS_ERR() checking" - }, - "CVE-2023-23006": { - "cmt_msg": "net/mlx5: DR, Fix NULL vs IS_ERR checking in dr_domain_init_resources" - }, - "CVE-2022-0644": { - "cmt_msg": "vfs: check fd has read access in kernel_read_file_from_fd()" - }, - "CVE-2020-27784": { - "cmt_msg": "usb: gadget: function: printer: fix use-after-free in __lock_acquire" - }, - "CVE-2023-1670": { - "cmt_msg": "xirc2ps_cs: Fix use after free bug in xirc2ps_detach" - }, - "CVE-2023-23002": { - "cmt_msg": "Bluetooth: hci_qca: Fix NULL vs IS_ERR_OR_NULL check in qca_serdev_probe" - }, - "CVE-2023-6240": { - "cmt_msg": "" - }, - "CVE-2023-23559": { - "cmt_msg": "wifi: rndis_wlan: Prevent buffer overflow in rndis_query_oid" - }, - "CVE-2022-39842": { - "cmt_msg": "video: fbdev: pxa3xx-gcu: Fix integer overflow in pxa3xx_gcu_write" - }, - "CVE-2022-0382": { - "cmt_msg": "net ticp:fix a kernel-infoleak in __tipc_sendmsg()" - }, - "CVE-2023-32233": { - "cmt_msg": "netfilter: nf_tables: deactivate anonymous set from preparation phase" - }, - "CVE-2020-25672": { - "cmt_msg": "nfc: fix memory leak in llcp_sock_connect()" - }, - "CVE-2020-25673": { - "cmt_msg": "nfc: Avoid endless loops caused by repeated llcp_sock_connect()" - }, - "CVE-2020-25670": { - "cmt_msg": "nfc: fix refcount leak in llcp_sock_bind()" - }, - "CVE-2020-25671": { - "cmt_msg": "nfc: fix refcount leak in llcp_sock_connect()" - }, - "CVE-2022-20369": { - "cmt_msg": "media: v4l2-mem2mem: Apply DST_QUEUE_OFF_BASE on MMAP buffers across ioctls" - }, - "CVE-2022-0998": { - "cmt_msg": "vdpa: clean up get_config_size ret value handling" - }, - "CVE-2020-25285": { - "cmt_msg": "mm/hugetlb: fix a race between hugetlb sysctl handlers" - }, - "CVE-2020-25284": { - "cmt_msg": "rbd: require global CAP_SYS_ADMIN for mapping and unmapping" - }, - "CVE-2019-19814": { - "cmt_msg": "" - }, - "CVE-2023-1118": { - "cmt_msg": "media: rc: Fix use-after-free bugs caused by ene_tx_irqsim()" - }, - "CVE-2022-1016": { - "cmt_msg": "netfilter: nf_tables: initialize registers in nft_do_chain()" - }, - "CVE-2022-1011": { - "cmt_msg": "fuse: fix pipe buffer lifetime for direct_io" - }, - "CVE-2022-1012": { - "cmt_msg": "secure_seq: use the 64 bits of the siphash for port offset calculation" - }, - "CVE-2022-38096": { - "cmt_msg": "" - }, - "CVE-2021-26934": { + "CVE-2024-25739": { "cmt_msg": "" }, - "CVE-2022-3115": { - "cmt_msg": "drm: mali-dp: potential dereference of null pointer" - }, - "CVE-2021-26931": { - "cmt_msg": "xen-blkback: don't \"handle\" error by BUG()" - }, - "CVE-2021-26930": { - "cmt_msg": "xen-blkback: fix error handling in xen_blkbk_map()" - }, - "CVE-2021-26932": { - "cmt_msg": "Xen/x86: don't bail early from clear_foreign_p2m_mapping()" - }, - "CVE-2023-3141": { - "cmt_msg": "memstick: r592: Fix UAF bug in r592_remove due to race condition" - }, - "CVE-2022-0492": { - "cmt_msg": "cgroup-v1: Require capabilities to set release_agent" - }, - "CVE-2020-12352": { - "cmt_msg": "Bluetooth: A2MP: Fix not initializing all members" - }, - "CVE-2020-12351": { - "cmt_msg": "Bluetooth: L2CAP: Fix calling sk_filter on non-socket based channel" - }, - "CVE-2023-34256": { - "cmt_msg": "ext4: avoid a potential slab-out-of-bounds in ext4_group_desc_csum" + "CVE-2021-47028": { + "cmt_msg": "mt76: mt7915: fix txrate reporting" }, - "CVE-2022-25636": { - "cmt_msg": "netfilter: nf_tables_offload: incorrect flow offload action array size" - }, - "CVE-2022-0494": { - "cmt_msg": "block-map: add __GFP_ZERO flag for alloc_page in function bio_copy_kern" + "CVE-2022-2602": { + "cmt_msg": "io_uring/af_unix: defer registered files gc to io_uring release" }, - "CVE-2022-3524": { - "cmt_msg": "tcp/udp: Fix memory leak in ipv6_renew_options()." + "CVE-2021-47026": { + "cmt_msg": "RDMA/rtrs-clt: destroy sysfs after removing session from active list" }, - "CVE-2022-3523": { - "cmt_msg": "mm/memory.c: fix race when faulting a device private page" + "CVE-2024-26585": { + "cmt_msg": "tls: fix race between tx work scheduling and socket close" }, - "CVE-2022-3522": { - "cmt_msg": "mm/hugetlb: use hugetlb_pte_stable in migration race check" + "CVE-2021-47024": { + "cmt_msg": "vsock/virtio: free queued packets when closing socket" }, - "CVE-2008-2544": { - "cmt_msg": "" + "CVE-2023-52511": { + "cmt_msg": "spi: sun6i: reduce DMA RX transfer width to single byte" }, - "CVE-2021-3178": { - "cmt_msg": "nfsd4: readdirplus shouldn't return parent of export" + "CVE-2024-26759": { + "cmt_msg": "mm/swap: fix race when skipping swapcache" }, - "CVE-2022-0330": { - "cmt_msg": "drm/i915: Flush TLBs before releasing backing store" + "CVE-2021-47020": { + "cmt_msg": "soundwire: stream: fix memory leak in stream config error path" }, - "CVE-2007-3719": { - "cmt_msg": "" + "CVE-2023-4881": { + "cmt_msg": "netfilter: nftables: exthdr: fix 4-byte stack OOB write" }, - "CVE-2023-3863": { - "cmt_msg": "net: nfc: Fix use-after-free caused by nfc_llcp_find_local" + "CVE-2023-2008": { + "cmt_msg": "udmabuf: add back sanity check" }, - "CVE-2023-0590": { - "cmt_msg": "net: sched: fix race condition in qdisc_graft()" + "CVE-2021-46908": { + "cmt_msg": "bpf: Use correct permission flag for mixed signed bounds arithmetic" }, - "CVE-2022-4095": { - "cmt_msg": "staging: rtl8712: fix use after free bugs" + "CVE-2021-46909": { + "cmt_msg": "ARM: footbridge: fix PCI interrupt mapping" }, - "CVE-2022-45919": { - "cmt_msg": "media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221" + "CVE-2021-46906": { + "cmt_msg": "HID: usbhid: fix info leak in hid_submit_ctrl" }, - "CVE-2020-36312": { - "cmt_msg": "KVM: fix memory leak in kvm_io_bus_unregister_dev()" + "CVE-2021-46904": { + "cmt_msg": "net: hso: fix null-ptr-deref during tty device unregistration" }, - "CVE-2023-21400": { + "CVE-2022-1247": { "cmt_msg": "" }, - "CVE-2021-45402": { - "cmt_msg": "bpf: Fix signed bounds propagation after mov32" + "CVE-2023-28410": { + "cmt_msg": "drm/i915/gem: add missing boundary check in vm_access" }, - "CVE-2022-24958": { - "cmt_msg": "usb: gadget: don't release an existing dev->buf" + "CVE-2023-2007": { + "cmt_msg": "scsi: dpt_i2o: Remove obsolete driver" }, - "CVE-2022-28893": { - "cmt_msg": "SUNRPC: Ensure we flush any closed sockets before xs_xprt_free()" + "CVE-2020-26145": { + "cmt_msg": "ath10k: drop fragments with multicast DA for PCIe" }, - "CVE-2021-3772": { - "cmt_msg": "sctp: use init_tag from inithdr for ABORT chunk" + "CVE-2023-51782": { + "cmt_msg": "net/rose: Fix Use-After-Free in rose_ioctl" }, - "CVE-2021-3679": { - "cmt_msg": "tracing: Fix bug in rb_per_cpu_empty() that might cause deadloop." + "CVE-2020-26147": { + "cmt_msg": "mac80211: assure all fragments are encrypted" }, - "CVE-2022-2586": { - "cmt_msg": "netfilter: nf_tables: do not allow SET_ID to refer to another table" + "CVE-2020-26141": { + "cmt_msg": "ath10k: Fix TKIP Michael MIC verification for PCIe" }, - "CVE-2022-3629": { - "cmt_msg": "vsock: Fix memory leak in vsock_connect()" + "CVE-2020-26140": { + "cmt_msg": "" }, - "CVE-2021-28715": { - "cmt_msg": "xen/netback: don't queue unlimited number of packages" + "CVE-2021-43389": { + "cmt_msg": "isdn: cpai: check ctr->cnr to avoid array index out of bound" }, - "CVE-2021-28714": { - "cmt_msg": "xen/netback: fix rx queue stall detection" + "CVE-2020-26142": { + "cmt_msg": "" }, - "CVE-2021-28713": { - "cmt_msg": "xen/console: harden hvc_xen against event channel storms" + "CVE-2023-1074": { + "cmt_msg": "sctp: fail if no bound addresses can be used for a given scope" }, - "CVE-2021-28712": { - "cmt_msg": "xen/netfront: harden netfront against event channel storms" + "CVE-2023-1075": { + "cmt_msg": "net/tls: tls_is_tx_ready() checked list_entry" }, - "CVE-2021-28711": { - "cmt_msg": "xen/blkfront: harden blkfront against event channel storms" + "CVE-2023-1076": { + "cmt_msg": "tun: tun_chr_open(): correctly initialize socket uid" }, - "CVE-2021-3659": { - "cmt_msg": "net: mac802154: Fix general protection fault" + "CVE-2023-1077": { + "cmt_msg": "sched/rt: pick_next_rt_entity(): check list_entry" }, - "CVE-2022-2991": { - "cmt_msg": "remove the lightnvm subsystem" + "CVE-2023-46838": { + "cmt_msg": "xen-netback: don't produce zero-size SKB frags" }, - "CVE-2022-3621": { - "cmt_msg": "nilfs2: fix NULL pointer dereference at nilfs_bmap_lookup_at_level()" + "CVE-2022-2959": { + "cmt_msg": "pipe: Fix missing lock in pipe_resize_ring()" }, - "CVE-2022-23960": { - "cmt_msg": "ARM: report Spectre v2 status through sysfs" + "CVE-2023-40283": { + "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb" }, - "CVE-2022-3623": { - "cmt_msg": "mm/hugetlb: fix races when looking up a CONT-PTE/PMD size hugetlb page" + "CVE-2023-1073": { + "cmt_msg": "HID: check empty report_list in hid_validate_values()" }, - "CVE-2022-3624": { - "cmt_msg": "bonding: fix reference count leak in balance-alb mode" + "CVE-2024-26747": { + "cmt_msg": "usb: roles: fix NULL pointer issue when put module's reference" }, - "CVE-2022-25258": { - "cmt_msg": "USB: gadget: validate interface OS descriptor requests" + "CVE-2024-26745": { + "cmt_msg": "powerpc/pseries/iommu: IOMMU table is not initialized for kdump over SR-IOV" }, - "CVE-2021-39656": { - "cmt_msg": "configfs: fix a use-after-free in __configfs_open_file" + "CVE-2023-51042": { + "cmt_msg": "drm/amdgpu: Fix potential fence use-after-free v2" }, - "CVE-2021-39657": { - "cmt_msg": "scsi: ufs: Correct the LUN used in eh_device_reset_handler() callback" + "CVE-2024-26743": { + "cmt_msg": "RDMA/qedr: Fix qedr_create_user_qp error flow" }, - "CVE-2023-3090": { - "cmt_msg": "ipvlan:Fix out-of-bounds caused by unclear skb->cb" + "CVE-2023-52566": { + "cmt_msg": "nilfs2: fix potential use after free in nilfs_gccache_submit_read_data()" }, - "CVE-2022-47946": { - "cmt_msg": "io_uring: kill sqo_dead and sqo submission halting" + "CVE-2024-26740": { + "cmt_msg": "net/sched: act_mirred: use the backlog for mirred ingress" }, - "CVE-2022-4744": { - "cmt_msg": "tun: avoid double free in tun_free_netdev" + "CVE-2024-22386": { + "cmt_msg": "" }, - "CVE-2023-1095": { - "cmt_msg": "netfilter: nf_tables: fix null deref due to zeroed list head" + "CVE-2022-42432": { + "cmt_msg": "netfilter: nfnetlink_osf: fix possible bogus match in nf_osf_find()" }, - "CVE-2022-3239": { - "cmt_msg": "media: em28xx: initialize refcount before kref_get" + "CVE-2022-1734": { + "cmt_msg": "nfc: nfcmrvl: main: reorder destructive operations in nfcmrvl_nci_unregister_dev to avoid bugs" }, - "CVE-2022-4543": { - "cmt_msg": "" + "CVE-2024-26749": { + "cmt_msg": "usb: cdns3: fixed memory use after free at cdns3_gadget_ep_disable()" }, - "CVE-2023-4921": { - "cmt_msg": "net: sched: sch_qfq: Fix UAF in qfq_dequeue()" + "CVE-2022-3625": { + "cmt_msg": "devlink: Fix use-after-free after a failed reload" }, - "CVE-2023-1829": { - "cmt_msg": "net/sched: Retire tcindex classifier" + "CVE-2023-28772": { + "cmt_msg": "seq_buf: Fix overflow in seq_buf_putmem_hex()" }, - "CVE-2023-1390": { - "cmt_msg": "tipc: fix NULL deref in tipc_link_xmit()" + "CVE-2022-2588": { + "cmt_msg": "net_sched: cls_route: remove from list when handle is 0" }, - "CVE-2021-34981": { - "cmt_msg": "Bluetooth: cmtp: fix file refcount when cmtp_attach_device fails" + "CVE-2022-3707": { + "cmt_msg": "drm/i915/gvt: fix double free bug in split_2MB_gtt_entry" }, - "CVE-2023-23454": { - "cmt_msg": "net: sched: cbq: dont intepret cls results when asked to drop" + "CVE-2022-2503": { + "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag" }, - "CVE-2024-0775": { - "cmt_msg": "ext4: improve error recovery code paths in __ext4_remount()" + "CVE-2022-48619": { + "cmt_msg": "Input: add bounds checking to input_set_capability()" }, - "CVE-2023-4881": { - "cmt_msg": "netfilter: nftables: exthdr: fix 4-byte stack OOB write" + "CVE-2021-32399": { + "cmt_msg": "bluetooth: eliminate the potential race condition when removing the HCI controller" }, - "CVE-2022-42432": { - "cmt_msg": "netfilter: nfnetlink_osf: fix possible bogus match in nf_osf_find()" + "CVE-2024-26699": { + "cmt_msg": "drm/amd/display: Fix array-index-out-of-bounds in dcn35_clkmgr" }, - "CVE-2013-7445": { - "cmt_msg": "" + "CVE-2024-26698": { + "cmt_msg": "hv_netvsc: Fix race condition between netvsc_probe and netvsc_remove" }, - "CVE-2022-28390": { - "cmt_msg": "can: ems_usb: ems_usb_start_xmit(): fix double dev_kfree_skb() in error path" + "CVE-2022-23038": { + "cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()" }, - "CVE-2021-3653": { - "cmt_msg": "KVM: nSVM: avoid picking up unsupported bits from L2 in int_ctl (CVE-2021-3653)" + "CVE-2022-23039": { + "cmt_msg": "xen/gntalloc: don't use gnttab_query_foreign_access()" }, - "CVE-2024-26593": { - "cmt_msg": "i2c: i801: Fix block process call transactions" + "CVE-2022-20154": { + "cmt_msg": "sctp: use call_rcu to free endpoint" }, - "CVE-2022-42719": { - "cmt_msg": "wifi: mac80211: fix MBSSID parsing use-after-free" + "CVE-2024-26691": { + "cmt_msg": "KVM: arm64: Fix circular locking dependency" }, - "CVE-2020-14386": { - "cmt_msg": "net/packet: fix overflow in tpacket_rcv" + "CVE-2021-45868": { + "cmt_msg": "quota: check block number when reading the block in quota file" }, - "CVE-2020-14385": { - "cmt_msg": "xfs: fix boundary test in xfs_attr_shortform_verify" + "CVE-2022-20158": { + "cmt_msg": "net/packet: fix slab-out-of-bounds access in packet_recvmsg()" }, - "CVE-2021-3656": { - "cmt_msg": "KVM: nSVM: always intercept VMLOAD/VMSAVE when nested (CVE-2021-3656)" + "CVE-2022-23037": { + "cmt_msg": "xen/netfront: don't use gnttab_query_foreign_access() for mapped status" }, - "CVE-2022-1158": { - "cmt_msg": "KVM: x86/mmu: do compare-and-exchange of gPTE via the user address" + "CVE-2024-0564": { + "cmt_msg": "" }, - "CVE-2022-3303": { - "cmt_msg": "ALSA: pcm: oss: Fix race at SNDCTL_DSP_SYNC" + "CVE-2024-0565": { + "cmt_msg": "smb: client: fix OOB in receive_encrypted_standard()" }, - "CVE-2022-20141": { - "cmt_msg": "igmp: Add ip_mc_list lock in ip_check_mc_rcu" + "CVE-2024-26697": { + "cmt_msg": "nilfs2: fix data corruption in dsync block recovery for small block sizes" }, - "CVE-2020-25704": { - "cmt_msg": "perf/core: Fix a memory leak in perf_event_parse_addr_filter()" + "CVE-2024-26696": { + "cmt_msg": "nilfs2: fix hang in nilfs_lookup_dirty_data_buffers()" }, - "CVE-2023-23455": { - "cmt_msg": "net: sched: atm: dont intepret cls results when asked to drop" + "CVE-2024-26633": { + "cmt_msg": "ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim()" }, - "CVE-2022-2905": { - "cmt_msg": "bpf: Don't use tnum_range on array range checking for poke descriptors" + "CVE-2023-2176": { + "cmt_msg": "RDMA/core: Refactor rdma_bind_addr" }, - "CVE-2022-20148": { - "cmt_msg": "f2fs: fix UAF in f2fs_available_free_memory" + "CVE-2023-2177": { + "cmt_msg": "sctp: leave the err path free in sctp_stream_init to sctp_stream_free" }, - "CVE-2024-26595": { - "cmt_msg": "mlxsw: spectrum_acl_tcam: Fix NULL pointer dereference in error path" + "CVE-2021-38160": { + "cmt_msg": "virtio_console: Assure used length from device is limited" }, - "CVE-2023-6931": { - "cmt_msg": "perf: Fix perf_event_validate_size()" + "CVE-2023-1252": { + "cmt_msg": "ovl: fix use after free in struct ovl_aio_req" }, - "CVE-2023-6932": { - "cmt_msg": "ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet" + "CVE-2021-42008": { + "cmt_msg": "net: 6pack: fix slab-out-of-bounds in decode_data" }, - "CVE-2024-0607": { - "cmt_msg": "netfilter: nf_tables: fix pointer math issue in nft_byteorder_eval()" + "CVE-2022-3107": { + "cmt_msg": "hv_netvsc: Add check for kvmalloc_array" }, - "CVE-2021-33631": { - "cmt_msg": "ext4: fix kernel BUG in 'ext4_write_inline_data_end()'" + "CVE-2022-39189": { + "cmt_msg": "KVM: x86: do not report a vCPU as preempted outside instruction boundaries" }, - "CVE-2022-28389": { - "cmt_msg": "can: mcba_usb: mcba_usb_start_xmit(): fix double dev_kfree_skb in error path" + "CVE-2021-38166": { + "cmt_msg": "bpf: Fix integer overflow involving bucket_size" }, - "CVE-2022-28388": { - "cmt_msg": "can: usb_8dev: usb_8dev_start_xmit(): fix double dev_kfree_skb() in error path" + "CVE-2021-3490": { + "cmt_msg": "bpf: Fix alu32 const subreg bound tracking on bitwise operations" }, - "CVE-2023-52444": { - "cmt_msg": "f2fs: fix to avoid dirent corruption" + "CVE-2021-3491": { + "cmt_msg": "io_uring: truncate lengths larger than MAX_RW_COUNT on provide buffers" }, - "CVE-2020-12362": { - "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" + "CVE-2005-3660": { + "cmt_msg": "" }, - "CVE-2020-27194": { - "cmt_msg": "bpf: Fix scalar32_min_max_or bounds tracking" + "CVE-2022-0516": { + "cmt_msg": "KVM: s390: Return error on SIDA memop on normal guest" }, - "CVE-2022-4129": { - "cmt_msg": "l2tp: Serialize access to sk_user_data with sk_callback_lock" + "CVE-2023-31085": { + "cmt_msg": "ubi: Refuse attaching if mtd's erasesize is 0" }, - "CVE-2020-12364": { - "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" + "CVE-2023-31084": { + "cmt_msg": "media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*()" }, - "CVE-2020-25639": { - "cmt_msg": "drm/nouveau: bail out of nouveau_channel_new if channel init fails" + "CVE-2023-31083": { + "cmt_msg": "Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO" }, - "CVE-2023-33203": { - "cmt_msg": "net: qcom/emac: Fix use after free bug in emac_remove due to race condition" + "CVE-2023-31082": { + "cmt_msg": "" }, - "CVE-2021-0605": { - "cmt_msg": "af_key: pfkey_dump needs parameter validation" + "CVE-2023-31081": { + "cmt_msg": "" }, - "CVE-2021-4001": { - "cmt_msg": "bpf: Fix toctou on read-only map's constant scalar tracking" + "CVE-2023-52618": { + "cmt_msg": "block/rnbd-srv: Check for unlikely string overflow" }, - "CVE-2021-4002": { - "cmt_msg": "hugetlbfs: flush TLBs correctly after huge_pmd_unshare" + "CVE-2023-52574": { + "cmt_msg": "team: fix null-ptr-deref when team device type is changed" }, - "CVE-2023-26545": { - "cmt_msg": "net: mpls: fix stale pointer if allocation fails during device rename" + "CVE-2021-33034": { + "cmt_msg": "Bluetooth: verify AMP hci_chan before amp_destroy" }, - "CVE-2022-1055": { - "cmt_msg": "net: sched: fix use-after-free in tc_new_tfilter()" + "CVE-2021-33033": { + "cmt_msg": "cipso,calipso: resolve a number of problems with the DOI refcounts" }, - "CVE-2023-50431": { - "cmt_msg": "accel/habanalabs: fix information leak in sec_attest_info()" + "CVE-2022-0286": { + "cmt_msg": "bonding: fix null dereference in bond_ipsec_add_sa()" }, - "CVE-2022-20008": { - "cmt_msg": "mmc: block: fix read single on recovery logic" + "CVE-2024-0646": { + "cmt_msg": "net: tls, update curr on splice as well" }, - "CVE-2023-3117": { - "cmt_msg": "netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE" + "CVE-2023-52598": { + "cmt_msg": "s390/ptrace: handle setting of fpc register correctly" }, - "CVE-2023-32269": { - "cmt_msg": "netrom: Fix use-after-free caused by accept on already connected socket" + "CVE-2022-32296": { + "cmt_msg": "tcp: increase source port perturb table to 2^16" }, - "CVE-2023-52464": { - "cmt_msg": "EDAC/thunderx: Fix possible out-of-bounds string access" + "CVE-2024-26789": { + "cmt_msg": "crypto: arm64/neonbs - fix out-of-bounds access on short input" }, - "CVE-2023-3111": { - "cmt_msg": "btrfs: unset reloc control if transaction commit fails in prepare_to_relocate()" + "CVE-2022-4543": { + "cmt_msg": "" }, - "CVE-2021-3411": { - "cmt_msg": "x86/kprobes: Fix optprobe to detect INT3 padding correctly" + "CVE-2022-3028": { + "cmt_msg": "af_key: Do not call xfrm_probe_algs in parallel" }, - "CVE-2021-31440": { - "cmt_msg": "bpf: Fix propagation of 32 bit unsigned bounds from 64 bit bounds" + "CVE-2023-52493": { + "cmt_msg": "bus: mhi: host: Drop chan lock before queuing buffers" }, - "CVE-2022-26373": { - "cmt_msg": "x86/speculation: Add RSB VM Exit protections" + "CVE-2023-52492": { + "cmt_msg": "dmaengine: fix NULL pointer in channel unregistration function" }, - "CVE-2019-15290": { + "CVE-2020-14304": { "cmt_msg": "" }, - "CVE-2023-3212": { - "cmt_msg": "gfs2: Don't deref jdesc in evict" + "CVE-2022-2318": { + "cmt_msg": "net: rose: fix UAF bugs caused by timer handler" }, - "CVE-2024-23848": { - "cmt_msg": "" + "CVE-2023-52497": { + "cmt_msg": "erofs: fix lz4 inplace decompression" }, - "CVE-2023-1295": { - "cmt_msg": "io_uring: get rid of intermediate IORING_OP_CLOSE stage" + "CVE-2022-33981": { + "cmt_msg": "floppy: disable FDRAWCMD by default" }, - "CVE-2022-0617": { - "cmt_msg": "udf: Fix NULL ptr deref when converting from inline format" + "CVE-2024-26655": { + "cmt_msg": "Fix memory leak in posix_clock_open()" }, - "CVE-2023-4459": { - "cmt_msg": "net: vmxnet3: fix possible NULL pointer dereference in vmxnet3_rq_cleanup()" + "CVE-2021-3564": { + "cmt_msg": "Bluetooth: fix the erroneous flush_work() order" }, - "CVE-2022-2153": { - "cmt_msg": "KVM: x86: Avoid theoretical NULL pointer dereference in kvm_irq_delivery_to_apic_fast()" + "CVE-2023-3611": { + "cmt_msg": "net/sched: sch_qfq: account for stab overhead in qfq_enqueue" }, - "CVE-2020-12363": { - "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" + "CVE-2023-4132": { + "cmt_msg": "media: usb: siano: Fix warning due to null work_func_t function pointer" }, - "CVE-2022-20566": { - "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free caused by l2cap_chan_put" + "CVE-2023-4133": { + "cmt_msg": "cxgb4: fix use after free bugs caused by circular dependency problem" }, - "CVE-2018-12930": { + "CVE-2020-26560": { "cmt_msg": "" }, - "CVE-2018-12931": { + "CVE-2023-4134": { + "cmt_msg": "Input: cyttsp4_core - change del_timer_sync() to timer_shutdown_sync()" + }, + "CVE-2023-39198": { + "cmt_msg": "drm/qxl: fix UAF on handle creation" + }, + "CVE-2023-42752": { + "cmt_msg": "igmp: limit igmpv3_newpack() packet size to IP_MAX_MTU" + }, + "CVE-2024-26751": { + "cmt_msg": "ARM: ep93xx: Add terminator to gpiod_lookup_table" + }, + "CVE-2023-37454": { "cmt_msg": "" }, - "CVE-2024-23196": { + "CVE-2022-20572": { + "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag" + }, + "CVE-2024-24858": { "cmt_msg": "" }, - "CVE-2023-1990": { - "cmt_msg": "nfc: st-nci: Fix use after free bug in ndlc_remove due to race condition" + "CVE-2023-39194": { + "cmt_msg": "net: xfrm: Fix xfrm_address_filter OOB read" }, - "CVE-2024-26583": { - "cmt_msg": "tls: fix race between async notify and socket close" + "CVE-2023-2002": { + "cmt_msg": "bluetooth: Perform careful capability checks in hci_sock_ioctl()" }, - "CVE-2021-33098": { - "cmt_msg": "ixgbe: fix large MTU request from VF" + "CVE-2021-28964": { + "cmt_msg": "btrfs: fix race when cloning extent buffer during rewind of an old root" }, - "CVE-2022-0185": { - "cmt_msg": "vfs: fs_context: fix up param length parsing in legacy_parse_param" + "CVE-2023-1829": { + "cmt_msg": "net/sched: Retire tcindex classifier" }, - "CVE-2021-28971": { - "cmt_msg": "perf/x86/intel: Fix a crash caused by zero PEBS status" + "CVE-2023-52584": { + "cmt_msg": "spmi: mediatek: Fix UAF on device remove" }, - "CVE-2022-22942": { - "cmt_msg": "drm/vmwgfx: Fix stale file descriptors on failed usercopy" + "CVE-2021-4083": { + "cmt_msg": "fget: check that the fd still exists after getting a ref to it" }, - "CVE-2021-3739": { - "cmt_msg": "btrfs: fix NULL pointer dereference when deleting device by invalid id" + "CVE-2023-52587": { + "cmt_msg": "IB/ipoib: Fix mcast list locking" }, - "CVE-2022-20166": { - "cmt_msg": "drivers core: Use sysfs_emit and sysfs_emit_at for show(device *...) functions" + "CVE-2023-33288": { + "cmt_msg": "power: supply: bq24190: Fix use after free bug in bq24190_remove due to race condition" }, - "CVE-2021-3732": { - "cmt_msg": "ovl: prevent private clone if bind mount is not allowed" + "CVE-2023-52484": { + "cmt_msg": "iommu/arm-smmu-v3: Fix soft lockup triggered by arm_smmu_mm_invalidate_range" }, - "CVE-2024-24860": { - "cmt_msg": "Bluetooth: Fix atomicity violation in {min,max}_key_size_set" + "CVE-2022-29900": { + "cmt_msg": "x86/kvm/vmx: Make noinstr clean" }, - "CVE-2020-27835": { - "cmt_msg": "IB/hfi1: Ensure correct mm is used at all times" + "CVE-2022-29901": { + "cmt_msg": "x86/kvm/vmx: Make noinstr clean" }, - "CVE-2024-24861": { - "cmt_msg": "" + "CVE-2023-1390": { + "cmt_msg": "tipc: fix NULL deref in tipc_link_xmit()" }, - "CVE-2023-0240": { - "cmt_msg": "io_uring: COW io_identity on mismatch" + "CVE-2022-3567": { + "cmt_msg": "ipv6: Fix data races around sk->sk_prot." }, - "CVE-2021-35039": { - "cmt_msg": "module: limit enabling module.sig_enforce" + "CVE-2024-26773": { + "cmt_msg": "ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found()" }, - "CVE-2024-25740": { - "cmt_msg": "" + "CVE-2023-39192": { + "cmt_msg": "netfilter: xt_u32: validate user space input" }, - "CVE-2022-3903": { - "cmt_msg": "media: mceusb: Use new usb_control_msg_*() routines" + "CVE-2021-47069": { + "cmt_msg": "ipc/mqueue, msg, sem: avoid relying on a stack reference past its expiry" }, - "CVE-2022-3577": { - "cmt_msg": "HID: bigben: fix slab-out-of-bounds Write in bigben_probe" + "CVE-2021-46917": { + "cmt_msg": "dmaengine: idxd: fix wq cleanup of WQCFG registers" }, - "CVE-2023-20588": { - "cmt_msg": "x86/CPU/AMD: Do not leak quotient data after a division by 0" + "CVE-2023-4389": { + "cmt_msg": "btrfs: fix root ref counts in error handling in btrfs_get_root_ref" }, - "CVE-2021-20226": { - "cmt_msg": "io_uring: don't rely on weak ->files references" + "CVE-2022-3566": { + "cmt_msg": "tcp: Fix data races around icsk->icsk_af_ops." }, - "CVE-2022-4379": { - "cmt_msg": "NFSD: fix use-after-free in __nfs42_ssc_open()" + "CVE-2023-35829": { + "cmt_msg": "media: rkvdec: fix use after free bug in rkvdec_remove" }, - "CVE-2022-44034": { - "cmt_msg": "char: pcmcia: remove all the drivers" + "CVE-2023-35828": { + "cmt_msg": "usb: gadget: udc: renesas_usb3: Fix use after free bug in renesas_usb3_remove due to race condition" }, - "CVE-2022-44033": { - "cmt_msg": "char: pcmcia: remove all the drivers" + "CVE-2022-29582": { + "cmt_msg": "io_uring: fix race between timeout flush and removal" }, - "CVE-2022-44032": { - "cmt_msg": "char: pcmcia: remove all the drivers" + "CVE-2023-52583": { + "cmt_msg": "ceph: fix deadlock or deadcode of misusing dget()" }, - "CVE-2022-47518": { - "cmt_msg": "wifi: wilc1000: validate number of channels" + "CVE-2022-1116": { + "cmt_msg": "" }, - "CVE-2023-4207": { - "cmt_msg": "net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free" + "CVE-2021-28660": { + "cmt_msg": "staging: rtl8188eu: prevent ->ssid overflow in rtw_wx_set_scan()" }, - "CVE-2020-26139": { - "cmt_msg": "mac80211: do not accept/forward invalid EAPOL frames" + "CVE-2024-0775": { + "cmt_msg": "ext4: improve error recovery code paths in __ext4_remount()" }, - "CVE-2023-42754": { - "cmt_msg": "ipv4: fix null-deref in ipv4_link_failure" + "CVE-2023-35823": { + "cmt_msg": "media: saa7134: fix use after free bug in saa7134_finidev due to race condition" }, - "CVE-2021-3609": { - "cmt_msg": "can: bcm: delay release of struct bcm_op after synchronize_rcu()" + "CVE-2022-3564": { + "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free caused by l2cap_reassemble_sdu" }, - "CVE-2021-3600": { - "cmt_msg": "bpf: Fix 32 bit src register truncation on div/mod" + "CVE-2022-23816": { + "cmt_msg": "x86/kvm/vmx: Make noinstr clean" }, - "CVE-2021-23133": { - "cmt_msg": "net/sctp: fix race condition in sctp_destroy_sock" + "CVE-2023-35824": { + "cmt_msg": "media: dm1105: Fix use after free bug in dm1105_remove due to race condition" }, - "CVE-2021-0920": { - "cmt_msg": "af_unix: fix garbage collect vs MSG_PEEK" + "CVE-2023-35827": { + "cmt_msg": "ravb: Fix use-after-free issue in ravb_tx_timeout_work()" }, - "CVE-2020-28374": { - "cmt_msg": "scsi: target: Fix XCOPY NAA identifier lookup" + "CVE-2023-52481": { + "cmt_msg": "arm64: errata: Add Cortex-A520 speculative unprivileged load workaround" }, - "CVE-2023-0615": { - "cmt_msg": "media: vivid: dev->bitmap_cap wasn't freed in all cases" + "CVE-2023-52585": { + "cmt_msg": "drm/amdgpu: Fix possible NULL dereference in amdgpu_ras_query_error_status_helper()" }, - "CVE-2023-3006": { - "cmt_msg": "arm64: Add AMPERE1 to the Spectre-BHB affected list" + "CVE-2021-47063": { + "cmt_msg": "drm: bridge/panel: Cleanup connector on bridge detach" }, - "CVE-2022-3586": { - "cmt_msg": "sch_sfb: Don't assume the skb is still around after enqueueing to child" + "CVE-2021-47060": { + "cmt_msg": "KVM: Stop looking for coalesced MMIO zones if the bus is destroyed" }, - "CVE-2024-0641": { - "cmt_msg": "tipc: fix a potential deadlock on &tx->lock" + "CVE-2021-47061": { + "cmt_msg": "KVM: Destroy I/O bus devices on unregister failure _after_ sync'ing SRCU" }, - "CVE-2024-26586": { - "cmt_msg": "mlxsw: spectrum_acl_tcam: Fix stack corruption" + "CVE-2021-47149": { + "cmt_msg": "net: fujitsu: fix potential null-ptr-deref" }, - "CVE-2024-0646": { - "cmt_msg": "net: tls, update curr on splice as well" + "CVE-2021-47067": { + "cmt_msg": "soc/tegra: regulators: Fix locking up when voltage-spread is out of range" }, - "CVE-2020-27825": { - "cmt_msg": "tracing: Fix race in trace_open and buffer resize call" + "CVE-2022-3565": { + "cmt_msg": "mISDN: fix use-after-free bugs in l1oip timer handlers" }, - "CVE-2020-27820": { - "cmt_msg": "drm/nouveau: use drm_dev_unplug() during device removal" + "CVE-2021-47065": { + "cmt_msg": "rtw88: Fix array overrun in rtw_get_tx_power_params()" }, - "CVE-2023-1872": { - "cmt_msg": "io_uring: propagate issue_flags state down to file assignment" + "CVE-2021-47145": { + "cmt_msg": "btrfs: do not BUG_ON in link_to_fixup_dir" }, - "CVE-2023-1078": { - "cmt_msg": "rds: rds_rm_zerocopy_callback() use list_first_entry()" + "CVE-2021-47144": { + "cmt_msg": "drm/amd/amdgpu: fix refcount leak" }, - "CVE-2023-39197": { - "cmt_msg": "netfilter: conntrack: dccp: copy entire header to stack buffer, not just basic one" + "CVE-2021-47147": { + "cmt_msg": "ptp: ocp: Fix a resource leak in an error handling path" }, - "CVE-2023-4622": { - "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES" + "CVE-2020-36385": { + "cmt_msg": "RDMA/ucma: Rework ucma_migrate_id() to avoid races with destroy" }, - "CVE-2020-26558": { - "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical" + "CVE-2021-47141": { + "cmt_msg": "gve: Add NULL pointer checks when freeing irqs." }, - "CVE-2023-39193": { - "cmt_msg": "netfilter: xt_sctp: validate the flag_info count" + "CVE-2021-47140": { + "cmt_msg": "iommu/amd: Clear DMA ops when switching domain" }, - "CVE-2023-1079": { - "cmt_msg": "HID: asus: use spinlock to safely schedule workers" + "CVE-2021-47143": { + "cmt_msg": "net/smc: remove device from smcd_dev_list after failed device_add()" }, - "CVE-2020-26541": { - "cmt_msg": "certs: Add EFI_CERT_X509_GUID support for dbx entries" + "CVE-2021-47142": { + "cmt_msg": "drm/amdgpu: Fix a use-after-free" }, - "CVE-2023-6610": { - "cmt_msg": "smb: client: fix potential OOB in smb2_dump_detail()" + "CVE-2021-46943": { + "cmt_msg": "media: staging/intel-ipu3: Fix set_fmt error handling" }, - "CVE-2023-3390": { - "cmt_msg": "netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE" + "CVE-2021-46941": { + "cmt_msg": "usb: dwc3: core: Do core softreset when switch mode" }, - "CVE-2023-3812": { - "cmt_msg": "net: tun: fix bugs for oversize packet when napi frags enabled" + "CVE-2024-26727": { + "cmt_msg": "btrfs: do not ASSERT() if the newly created subvolume already got read" }, - "CVE-2020-26143": { - "cmt_msg": "" + "CVE-2023-3567": { + "cmt_msg": "vc_screen: move load of struct vc_data pointer in vcs_read() to avoid UAF" }, - "CVE-2021-33061": { - "cmt_msg": "ixgbe: add improvement for MDD response functionality" + "CVE-2021-46944": { + "cmt_msg": "media: staging/intel-ipu3: Fix memory leak in imu_fmt" }, - "CVE-2024-26589": { - "cmt_msg": "bpf: Reject variable offset alu on PTR_TO_FLOW_KEYS" + "CVE-2023-4128": { + "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free" }, - "CVE-2023-3389": { - "cmt_msg": "io_uring: mutex locked poll hashing" + "CVE-2023-52589": { + "cmt_msg": "media: rkisp1: Fix IRQ disable race issue" }, - "CVE-2023-1476": { - "cmt_msg": "" + "CVE-2023-28466": { + "cmt_msg": "net: tls: fix possible race condition between do_tls_getsockopt_conf() and do_tls_setsockopt_conf()" }, - "CVE-2023-4010": { - "cmt_msg": "" + "CVE-2023-52588": { + "cmt_msg": "f2fs: fix to tag gcing flag on page during block migration" }, - "CVE-2021-3864": { - "cmt_msg": "" + "CVE-2024-26765": { + "cmt_msg": "LoongArch: Disable IRQ before init_fn() for nonboot CPUs" }, - "CVE-2022-1652": { - "cmt_msg": "floppy: use a statically allocated error counter" + "CVE-2023-52578": { + "cmt_msg": "net: bridge: use DEV_STATS_INC()" }, - "CVE-2023-4623": { - "cmt_msg": "net/sched: sch_hfsc: Ensure inner classes have fsc curve" + "CVE-2024-26684": { + "cmt_msg": "net: stmmac: xgmac: fix handling of DPP safety error for DMA channels" }, - "CVE-2024-23849": { - "cmt_msg": "net/rds: Fix UBSAN: array-index-out-of-bounds in rds_cmsg_recv" + "CVE-2021-47052": { + "cmt_msg": "crypto: sa2ul - Fix memory leak of rxd" }, - "CVE-2020-29568": { - "cmt_msg": "xen/xenbus: Allow watches discard events before queueing" + "CVE-2021-47095": { + "cmt_msg": "ipmi: ssif: initialize ssif_info->client early" }, - "CVE-2020-29569": { - "cmt_msg": "xen-blkback: set ring->xenblkd to NULL after kthread_stop()" + "CVE-2021-47093": { + "cmt_msg": "platform/x86: intel_pmc_core: fix memleak on registration failure" }, - "CVE-2020-14351": { - "cmt_msg": "perf/core: Fix race in the perf_mmap_close() function" + "CVE-2023-4004": { + "cmt_msg": "netfilter: nft_set_pipapo: fix improper element removal" }, - "CVE-2023-51043": { - "cmt_msg": "drm/atomic: Fix potential use-after-free in nonblocking commits" + "CVE-2023-0179": { + "cmt_msg": "netfilter: nft_payload: incorrect arithmetics when fetching VLAN header bits" }, - "CVE-2022-2978": { - "cmt_msg": "fs: fix UAF/GPF bug in nilfs_mdt_destroy" + "CVE-2021-3573": { + "cmt_msg": "Bluetooth: use correct lock to prevent UAF of hdev object" }, - "CVE-2023-20569": { - "cmt_msg": "x86/bugs: Increase the x86 bugs vector size to two u32s" + "CVE-2022-29581": { + "cmt_msg": "net/sched: cls_u32: fix netns refcount changes in u32_change()" }, - "CVE-2022-20132": { - "cmt_msg": "HID: add hid_is_usb() function to make it simpler for USB detection" + "CVE-2021-45402": { + "cmt_msg": "bpf: Fix signed bounds propagation after mov32" }, - "CVE-2022-2977": { - "cmt_msg": "tpm: fix reference counting for struct tpm_chip" + "CVE-2023-1611": { + "cmt_msg": "btrfs: fix race between quota disable and quota assign ioctls" }, - "CVE-2020-0423": { - "cmt_msg": "binder: fix UAF when releasing todo list" + "CVE-2024-26763": { + "cmt_msg": "dm-crypt: don't modify the data when using authenticated encryption" }, - "CVE-2022-1789": { - "cmt_msg": "KVM: x86/mmu: fix NULL pointer dereference on guest INVPCID" + "CVE-2021-34693": { + "cmt_msg": "can: bcm: fix infoleak in struct bcm_msg_head" }, - "CVE-2016-8660": { - "cmt_msg": "" + "CVE-2022-26490": { + "cmt_msg": "nfc: st21nfca: Fix potential buffer overflows in EVT_TRANSACTION" }, - "CVE-2023-6270": { - "cmt_msg": "" + "CVE-2023-6817": { + "cmt_msg": "netfilter: nft_set_pipapo: skip inactive elements during set walk" }, - "CVE-2023-2156": { - "cmt_msg": "net: rpl: fix rpl header size calculation" + "CVE-2023-52470": { + "cmt_msg": "drm/radeon: check the alloc_workqueue return value in radeon_crtc_init()" }, - "CVE-2023-4389": { - "cmt_msg": "btrfs: fix root ref counts in error handling in btrfs_get_root_ref" + "CVE-2024-26795": { + "cmt_msg": "riscv: Sparse-Memory/vmemmap out-of-bounds fix" }, - "CVE-2023-3772": { - "cmt_msg": "xfrm: add NULL check in xfrm_update_ae_params" + "CVE-2021-47125": { + "cmt_msg": "sch_htb: fix refcount leak in htb_parent_to_leaf_offload" }, - "CVE-2023-45862": { - "cmt_msg": "USB: ene_usb6250: Allocate enough memory for full object" + "CVE-2024-26797": { + "cmt_msg": "drm/amd/display: Prevent potential buffer overflow in map_hw_resources" }, - "CVE-2023-45863": { - "cmt_msg": "kobject: Fix slab-out-of-bounds in fill_kobj_path()" + "CVE-2024-26790": { + "cmt_msg": "dmaengine: fsl-qdma: fix SoC may hang on 16 byte unaligned read" }, - "CVE-2023-1582": { - "cmt_msg": "fs/proc: task_mmu.c: don't read mapcount for migration entry" + "CVE-2022-1836": { + "cmt_msg": "floppy: disable FDRAWCMD by default" }, - "CVE-2022-1786": { - "cmt_msg": "io_uring: remove io_identity" + "CVE-2024-26793": { + "cmt_msg": "gtp: fix use-after-free and null-ptr-deref in gtp_newlink()" }, - "CVE-2022-23222": { - "cmt_msg": "bpf: Replace PTR_TO_XXX_OR_NULL with PTR_TO_XXX | PTR_MAYBE_NULL" + "CVE-2023-52530": { + "cmt_msg": "wifi: mac80211: fix potential key use-after-free" }, - "CVE-2020-25669": { - "cmt_msg": "Input: sunkbd - avoid use-after-free in teardown paths" + "CVE-2021-32078": { + "cmt_msg": "ARM: footbridge: remove personal server platform" }, - "CVE-2020-25668": { - "cmt_msg": "tty: make FONTX ioctl use the tty pointer they were actually passed" + "CVE-2023-52532": { + "cmt_msg": "net: mana: Fix TX CQE error handling" }, - "CVE-2008-4609": { - "cmt_msg": "" + "CVE-2022-30594": { + "cmt_msg": "ptrace: Check PTRACE_O_SUSPEND_SECCOMP permission on PTRACE_SEIZE" }, - "CVE-2020-25705": { - "cmt_msg": "icmp: randomize the global rate limiter" + "CVE-2024-26798": { + "cmt_msg": "fbcon: always restore the old font data in fbcon_do_set_font()" }, - "CVE-2022-0435": { - "cmt_msg": "tipc: improve size validations for received domain records" + "CVE-2022-4662": { + "cmt_msg": "USB: core: Prevent nested device-reset calls" }, - "CVE-2022-20565": { - "cmt_msg": "HID: core: Correctly handle ReportSize being zero" + "CVE-2021-38204": { + "cmt_msg": "usb: max-3421: Prevent corruption of freed memory" }, - "CVE-2023-6356": { - "cmt_msg": "" + "CVE-2021-38205": { + "cmt_msg": "net: xilinx_emaclite: Do not print real IOMEM pointer" }, - "CVE-2022-3533": { - "cmt_msg": "" + "CVE-2021-38206": { + "cmt_msg": "mac80211: Fix NULL ptr deref for injected rate info" }, - "CVE-2021-4135": { - "cmt_msg": "netdevsim: Zero-initialize memory for new map's value in function nsim_bpf_map_alloc" + "CVE-2021-38207": { + "cmt_msg": "net: ll_temac: Fix TX BD buffer overwrite" }, - "CVE-2023-26607": { - "cmt_msg": "ntfs: fix out-of-bounds read in ntfs_attr_find()" + "CVE-2023-39189": { + "cmt_msg": "netfilter: nfnetlink_osf: avoid OOB read" }, - "CVE-2023-52456": { - "cmt_msg": "serial: imx: fix tx statemachine deadlock" + "CVE-2023-35001": { + "cmt_msg": "netfilter: nf_tables: prevent OOB access in nft_byteorder_eval" }, - "CVE-2019-15239": { - "cmt_msg": "unknown" + "CVE-2022-27666": { + "cmt_msg": "esp: Fix possible buffer overflow in ESP transformation" }, - "CVE-2021-4037": { - "cmt_msg": "xfs: fix up non-directory creation in SGID directories" + "CVE-2021-38208": { + "cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect" }, - "CVE-2021-22543": { - "cmt_msg": "KVM: do not allow mapping valid but non-reference-counted pages" + "CVE-2021-38209": { + "cmt_msg": "netfilter: conntrack: Make global sysctls readonly in non-init netns" }, - "CVE-2022-45884": { - "cmt_msg": "" + "CVE-2024-26677": { + "cmt_msg": "rxrpc: Fix delayed ACKs to not set the reference serial number" }, - "CVE-2021-3348": { - "cmt_msg": "nbd: freeze the queue while we're adding connections" + "CVE-2024-26676": { + "cmt_msg": "af_unix: Call kfree_skb() for dead unix_(sk)->oob_skb in GC." }, - "CVE-2022-21505": { - "cmt_msg": "lockdown: Fix kexec lockdown bypass with ima policy" + "CVE-2022-0168": { + "cmt_msg": "cifs: fix NULL ptr dereference in smb2_ioctl_query_info()" }, - "CVE-2023-20941": { + "CVE-2020-26556": { "cmt_msg": "" }, - "CVE-2021-3347": { - "cmt_msg": "futex: Ensure the correct return value from futex_lock_pi()" - }, - "CVE-2020-10135": { - "cmt_msg": "Bluetooth: Consolidate encryption handling in hci_encrypt_cfm" + "CVE-2020-26557": { + "cmt_msg": "" }, - "CVE-2022-1966": { - "cmt_msg": "netfilter: nf_tables: disallow non-stateful expression in sets earlier" + "CVE-2024-26671": { + "cmt_msg": "blk-mq: fix IO hang from sbitmap wakeup race" }, - "CVE-2021-3587": { - "cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect" + "CVE-2020-26555": { + "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical" }, - "CVE-2021-44733": { - "cmt_msg": "tee: handle lookup of shm with reference count 0" + "CVE-2024-26776": { + "cmt_msg": "spi: hisi-sfc-v3xx: Return IRQ_NONE if no interrupts were detected" }, - "CVE-2021-20268": { - "cmt_msg": "bpf: Fix signed_{sub,add32}_overflows type handling" + "CVE-2024-26777": { + "cmt_msg": "fbdev: sis: Error out if pixclock equals zero" }, - "CVE-2022-3534": { - "cmt_msg": "libbpf: Fix use-after-free in btf_dump_name_dups" + "CVE-2019-20794": { + "cmt_msg": "" }, - "CVE-2022-3535": { - "cmt_msg": "net: mvpp2: fix mvpp2 debugfs leak" + "CVE-2020-26559": { + "cmt_msg": "" }, - "CVE-2020-36766": { - "cmt_msg": "cec-api: prevent leaking memory through hole in structure" + "CVE-2023-3397": { + "cmt_msg": "" }, - "CVE-2021-22600": { - "cmt_msg": "net/packet: rx_owner_map depends on pg_vec" + "CVE-2021-47129": { + "cmt_msg": "netfilter: nft_ct: skip expectations for confirmed conntrack" }, - "CVE-2023-28328": { - "cmt_msg": "media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer()" + "CVE-2024-26679": { + "cmt_msg": "inet: read sk->sk_family once in inet_recv_error()" }, - "CVE-2022-0322": { - "cmt_msg": "sctp: account stream padding length for reconf chunk" + "CVE-2024-26771": { + "cmt_msg": "dmaengine: ti: edma: Add some null pointer checks to the edma_probe" }, - "CVE-2023-0386": { - "cmt_msg": "ovl: fail on invalid uid/gid mapping at copy up" + "CVE-2021-47128": { + "cmt_msg": "bpf, lockdown, audit: Fix buggy SELinux lockdown permission checks" }, - "CVE-2023-6121": { - "cmt_msg": "nvmet: nul-terminate the NQNs passed in the connect command" + "CVE-2022-26365": { + "cmt_msg": "xen/blkfront: fix leaking data in shared pages" }, - "CVE-2023-28327": { - "cmt_msg": "af_unix: Get user_ns from in_skb in unix_diag_get_exact()." + "CVE-2022-21125": { + "cmt_msg": "x86/speculation/mmio: Reuse SRBDS mitigation for SBDS" }, - "CVE-2017-13693": { + "CVE-2018-1121": { "cmt_msg": "" }, - "CVE-2017-13694": { - "cmt_msg": "" + "CVE-2023-52454": { + "cmt_msg": "nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length" }, - "CVE-2022-42721": { - "cmt_msg": "wifi: cfg80211: avoid nontransmitted BSS list corruption" + "CVE-2023-28746": { + "cmt_msg": "x86/mmio: Disable KVM mitigation when X86_FEATURE_CLEAR_CPU_BUF is set" }, - "CVE-2022-42720": { - "cmt_msg": "wifi: cfg80211: fix BSS refcounting bugs" + "CVE-2021-47118": { + "cmt_msg": "pid: take a reference when initializing `cad_pid`" }, - "CVE-2021-4149": { - "cmt_msg": "btrfs: unlock newly allocated extent buffer after error" + "CVE-2023-52451": { + "cmt_msg": "powerpc/pseries/memhp: Fix access beyond end of drmem array" }, - "CVE-2021-4148": { - "cmt_msg": "mm: khugepaged: skip huge page collapse for special files" + "CVE-2021-47119": { + "cmt_msg": "ext4: fix memory leak in ext4_fill_super" }, - "CVE-2022-42895": { - "cmt_msg": "Bluetooth: L2CAP: Fix attempting to access uninitialized memory" + "CVE-2024-26602": { + "cmt_msg": "sched/membarrier: reduce the ability to hammer on sys_membarrier" }, - "CVE-2021-3640": { - "cmt_msg": "Bluetooth: sco: Fix lock_sock() blockage by memcpy_from_msg()" + "CVE-2024-1086": { + "cmt_msg": "netfilter: nf_tables: reject QUEUE/DROP verdict parameters" }, - "CVE-2021-3764": { - "cmt_msg": "crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd()" + "CVE-2024-26735": { + "cmt_msg": "ipv6: sr: fix possible use-after-free and null-ptr-deref" }, - "CVE-2021-3760": { - "cmt_msg": "nfc: nci: fix the UAF of rf_conn_info object" + "CVE-2019-15794": { + "cmt_msg": "ovl: fix reference counting in ovl_mmap error path" }, - "CVE-2022-4382": { - "cmt_msg": "USB: gadgetfs: Fix race between mounting and unmounting" + "CVE-2022-3344": { + "cmt_msg": "KVM: x86: nSVM: harden svm_free_nested against freeing vmcb02 while still in use" }, - "CVE-2022-36123": { - "cmt_msg": "x86: Clear .brk area at early boot" + "CVE-2023-23004": { + "cmt_msg": "malidp: Fix NULL vs IS_ERR() checking" }, - "CVE-2023-4732": { - "cmt_msg": "mm/userfaultfd: fix uffd-wp special cases for fork()" + "CVE-2023-23006": { + "cmt_msg": "net/mlx5: DR, Fix NULL vs IS_ERR checking in dr_domain_init_resources" }, - "CVE-2020-28097": { - "cmt_msg": "vgacon: remove software scrollback support" + "CVE-2022-0644": { + "cmt_msg": "vfs: check fd has read access in kernel_read_file_from_fd()" }, - "CVE-2024-24859": { - "cmt_msg": "" + "CVE-2023-23000": { + "cmt_msg": "phy: tegra: xusb: Fix return value of tegra_xusb_find_port_node function" }, - "CVE-2024-24858": { - "cmt_msg": "" + "CVE-2023-1670": { + "cmt_msg": "xirc2ps_cs: Fix use after free bug in xirc2ps_detach" }, - "CVE-2024-24855": { - "cmt_msg": "scsi: lpfc: Fix a possible data race in lpfc_unregister_fcf_rescan()" + "CVE-2023-23002": { + "cmt_msg": "Bluetooth: hci_qca: Fix NULL vs IS_ERR_OR_NULL check in qca_serdev_probe" }, - "CVE-2024-24857": { - "cmt_msg": "" + "CVE-2024-26702": { + "cmt_msg": "iio: magnetometer: rm3100: add boundary check for the value read from RM3100_REG_TMRC" }, - "CVE-2021-29264": { - "cmt_msg": "gianfar: fix jumbo packets+napi+rx overrun crash" + "CVE-2023-6240": { + "cmt_msg": "" }, - "CVE-2021-29265": { - "cmt_msg": "usbip: fix stub_dev usbip_sockfd_store() races leading to gpf" + "CVE-2022-21123": { + "cmt_msg": "x86/speculation/mmio: Add mitigation for Processor MMIO Stale Data" }, - "CVE-2021-39648": { - "cmt_msg": "usb: gadget: configfs: Fix use-after-free issue with udc_name" + "CVE-2024-26707": { + "cmt_msg": "net: hsr: remove WARN_ONCE() in send_hsr_supervision_frame()" }, - "CVE-2022-3545": { - "cmt_msg": "nfp: fix use-after-free in area_cache_get()" + "CVE-2024-26706": { + "cmt_msg": "parisc: Fix random data corruption from exception handler" }, - "CVE-2021-43056": { - "cmt_msg": "KVM: PPC: Book3S HV: Make idle_kvm_start_guest() return 0 if it went to guest" + "CVE-2023-23559": { + "cmt_msg": "wifi: rndis_wlan: Prevent buffer overflow in rndis_query_oid" }, - "CVE-2022-3542": { - "cmt_msg": "bnx2x: fix potential memory leak in bnx2x_tpa_stop()" + "CVE-2022-39842": { + "cmt_msg": "video: fbdev: pxa3xx-gcu: Fix integer overflow in pxa3xx_gcu_write" }, - "CVE-2021-21781": { - "cmt_msg": "ARM: ensure the signal page contains defined contents" + "CVE-2022-0382": { + "cmt_msg": "net ticp:fix a kernel-infoleak in __tipc_sendmsg()" }, - "CVE-2021-0512": { - "cmt_msg": "HID: make arrays usage and value to be the same" + "CVE-2023-51780": { + "cmt_msg": "atm: Fix Use-After-Free in do_vcc_ioctl" }, - "CVE-2023-1382": { - "cmt_msg": "tipc: set con sock in tipc_conn_alloc" + "CVE-2023-32233": { + "cmt_msg": "netfilter: nf_tables: deactivate anonymous set from preparation phase" }, - "CVE-2023-1380": { - "cmt_msg": "wifi: brcmfmac: slab-out-of-bounds read in brcmf_get_assoc_ies()" + "CVE-2020-25672": { + "cmt_msg": "nfc: fix memory leak in llcp_sock_connect()" }, - "CVE-2022-20568": { - "cmt_msg": "Merge tag 'io_uring-worker.v3-2021-02-25' of git://git.kernel.dk/linux-block" + "CVE-2020-25673": { + "cmt_msg": "nfc: Avoid endless loops caused by repeated llcp_sock_connect()" }, - "CVE-2020-0347": { - "cmt_msg": "" + "CVE-2020-25670": { + "cmt_msg": "nfc: fix refcount leak in llcp_sock_bind()" }, - "CVE-2022-41222": { - "cmt_msg": "mm/mremap: hold the rmap lock in write mode when moving page table entries." + "CVE-2020-25671": { + "cmt_msg": "nfc: fix refcount leak in llcp_sock_connect()" }, - "CVE-2021-40490": { - "cmt_msg": "ext4: fix race writing to an inline_data file while its xattrs are changing" + "CVE-2022-20369": { + "cmt_msg": "media: v4l2-mem2mem: Apply DST_QUEUE_OFF_BASE on MMAP buffers across ioctls" }, - "CVE-2021-33909": { - "cmt_msg": "seq_file: disallow extremely large seq buffer allocations" + "CVE-2022-0998": { + "cmt_msg": "vdpa: clean up get_config_size ret value handling" }, - "CVE-2023-23000": { - "cmt_msg": "phy: tegra: xusb: Fix return value of tegra_xusb_find_port_node function" + "CVE-2022-2978": { + "cmt_msg": "fs: fix UAF/GPF bug in nilfs_mdt_destroy" }, - "CVE-2019-12456": { + "CVE-2019-19814": { "cmt_msg": "" }, - "CVE-2021-29646": { - "cmt_msg": "tipc: better validate user input in tipc_nl_retrieve_key()" + "CVE-2023-1118": { + "cmt_msg": "media: rc: Fix use-after-free bugs caused by ene_tx_irqsim()" }, - "CVE-2021-29647": { - "cmt_msg": "net: qrtr: fix a kernel-infoleak in qrtr_recvmsg()" + "CVE-2021-47124": { + "cmt_msg": "io_uring: fix link timeout refs" }, - "CVE-2021-33656": { - "cmt_msg": "vt: drop old FONT ioctls" + "CVE-2022-1011": { + "cmt_msg": "fuse: fix pipe buffer lifetime for direct_io" }, - "CVE-2021-33655": { - "cmt_msg": "fbcon: Disallow setting font bigger than screen size" + "CVE-2022-1012": { + "cmt_msg": "secure_seq: use the 64 bits of the siphash for port offset calculation" }, - "CVE-2022-41858": { - "cmt_msg": "drivers: net: slip: fix NPD bug in sl_tx_timeout()" + "CVE-2023-52620": { + "cmt_msg": "netfilter: nf_tables: disallow timeout for anonymous sets" }, - "CVE-2022-3176": { - "cmt_msg": "io_uring: fix UAF due to missing POLLFREE handling" + "CVE-2023-52621": { + "cmt_msg": "bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers" }, - "CVE-2023-1206": { - "cmt_msg": "tcp: Reduce chance of collisions in inet6_hashfn()." + "CVE-2023-52622": { + "cmt_msg": "ext4: avoid online resizing failures due to oversized flex bg" }, - "CVE-2022-41850": { - "cmt_msg": "HID: roccat: Fix use-after-free in roccat_read()" + "CVE-2023-52623": { + "cmt_msg": "SUNRPC: Fix a suspicious RCU usage warning" }, - "CVE-2023-2985": { - "cmt_msg": "fs: hfsplus: fix UAF issue in hfsplus_put_super" + "CVE-2023-52619": { + "cmt_msg": "pstore/ram: Fix crash when setting number of cpus to an odd number" }, - "CVE-2020-14390": { - "cmt_msg": "fbcon: remove soft scrollback code" + "CVE-2023-52625": { + "cmt_msg": "drm/amd/display: Refactor DMCUB enter/exit idle interface" }, - "CVE-2022-2938": { - "cmt_msg": "psi: Fix uaf issue when psi trigger is destroyed while being polled" + "CVE-2023-52627": { + "cmt_msg": "iio: adc: ad7091r: Allow users to configure device events" }, - "CVE-2022-3646": { - "cmt_msg": "nilfs2: fix leak of nilfs_root in case of writer thread creation failure" + "CVE-2023-52628": { + "cmt_msg": "netfilter: nftables: exthdr: fix 4-byte stack OOB write" }, - "CVE-2021-45469": { - "cmt_msg": "f2fs: fix to do sanity check on last xattr entry in __f2fs_setxattr()" + "CVE-2021-26934": { + "cmt_msg": "" }, - "CVE-2022-1184": { - "cmt_msg": "ext4: verify dir block before splitting it" + "CVE-2022-3115": { + "cmt_msg": "drm: mali-dp: potential dereference of null pointer" }, - "CVE-2022-3642": { - "cmt_msg": "" + "CVE-2021-26931": { + "cmt_msg": "xen-blkback: don't \"handle\" error by BUG()" }, - "CVE-2022-3643": { - "cmt_msg": "xen/netback: Ensure protocol headers don't fall in the non-linear area" + "CVE-2021-26930": { + "cmt_msg": "xen-blkback: fix error handling in xen_blkbk_map()" }, - "CVE-2024-0584": { - "cmt_msg": "ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet" + "CVE-2021-26932": { + "cmt_msg": "Xen/x86: don't bail early from clear_foreign_p2m_mapping()" }, - "CVE-2020-0465": { - "cmt_msg": "HID: core: Sanitize event code and type when mapping input" + "CVE-2023-3141": { + "cmt_msg": "memstick: r592: Fix UAF bug in r592_remove due to race condition" }, - "CVE-2021-1048": { - "cmt_msg": "fix regression in \"epoll: Keep a reference on files added to the check list\"" + "CVE-2022-0492": { + "cmt_msg": "cgroup-v1: Require capabilities to set release_agent" }, - "CVE-2021-4218": { - "cmt_msg": "sysctl: pass kernel pointers to ->proc_handler" + "CVE-2023-34256": { + "cmt_msg": "ext4: avoid a potential slab-out-of-bounds in ext4_group_desc_csum" }, - "CVE-2019-15902": { - "cmt_msg": "unknown" + "CVE-2022-25636": { + "cmt_msg": "netfilter: nf_tables_offload: incorrect flow offload action array size" }, - "CVE-2024-25739": { - "cmt_msg": "" + "CVE-2022-0494": { + "cmt_msg": "block-map: add __GFP_ZERO flag for alloc_page in function bio_copy_kern" }, - "CVE-2023-3358": { - "cmt_msg": "HID: intel_ish-hid: Add check for ishtp_dma_tx_map" + "CVE-2022-3524": { + "cmt_msg": "tcp/udp: Fix memory leak in ipv6_renew_options()." }, - "CVE-2024-0340": { - "cmt_msg": "vhost: use kzalloc() instead of kmalloc() followed by memset()" + "CVE-2022-3523": { + "cmt_msg": "mm/memory.c: fix race when faulting a device private page" }, - "CVE-2023-6535": { - "cmt_msg": "" + "CVE-2022-3522": { + "cmt_msg": "mm/hugetlb: use hugetlb_pte_stable in migration race check" }, - "CVE-2023-6536": { + "CVE-2008-2544": { "cmt_msg": "" }, - "CVE-2021-33624": { - "cmt_msg": "bpf: Inherit expanded/patched seen count from old aux data" + "CVE-2021-3178": { + "cmt_msg": "nfsd4: readdirplus shouldn't return parent of export" }, - "CVE-2021-27365": { - "cmt_msg": "scsi: iscsi: Ensure sysfs attributes are limited to PAGE_SIZE" + "CVE-2021-47101": { + "cmt_msg": "asix: fix uninit-value in asix_mdio_read()" }, - "CVE-2021-3752": { - "cmt_msg": "Bluetooth: fix use-after-free error in lock_sock_nested()" + "CVE-2021-46987": { + "cmt_msg": "btrfs: fix deadlock when cloning inline extents and using qgroups" }, - "CVE-2021-27363": { - "cmt_msg": "scsi: iscsi: Restrict sessions and handles to admin capabilities" + "CVE-2021-46984": { + "cmt_msg": "kyber: fix out of bounds access when preempted" }, - "CVE-2022-23036": { - "cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()" + "CVE-2023-6560": { + "cmt_msg": "io_uring: don't allow discontig pages for IORING_SETUP_NO_MMAP" }, - "CVE-2018-17977": { - "cmt_msg": "" + "CVE-2021-46982": { + "cmt_msg": "f2fs: compress: fix race condition of overwrite vs truncate" }, - "CVE-2024-1151": { - "cmt_msg": "net: openvswitch: limit the number of recursions from action sets" + "CVE-2021-46983": { + "cmt_msg": "nvmet-rdma: Fix NULL deref when SEND is completed with error" }, - "CVE-2010-5321": { - "cmt_msg": "" + "CVE-2021-46980": { + "cmt_msg": "usb: typec: ucsi: Retrieve all the PDOs instead of just the first 4" }, - "CVE-2021-20322": { - "cmt_msg": "ipv6: make exception cache less predictible" + "CVE-2021-46981": { + "cmt_msg": "nbd: Fix NULL pointer in flush_workqueue" }, - "CVE-2021-20320": { - "cmt_msg": "s390/bpf: Fix optimizing out zero-extensions" + "CVE-2021-47109": { + "cmt_msg": "neighbour: allow NUD_NOARP entries to be forced GCed" }, - "CVE-2021-20321": { - "cmt_msg": "ovl: fix missing negative dentry check in ovl_rename()" + "CVE-2022-0330": { + "cmt_msg": "drm/i915: Flush TLBs before releasing backing store" }, - "CVE-2022-42896": { - "cmt_msg": "Bluetooth: L2CAP: Fix accepting connection request for invalid SPSM" + "CVE-2007-3719": { + "cmt_msg": "" }, - "CVE-2023-7192": { - "cmt_msg": "netfilter: ctnetlink: fix possible refcount leak in ctnetlink_create_conntrack()" + "CVE-2021-46988": { + "cmt_msg": "userfaultfd: release page in error path to avoid BUG_ON" }, - "CVE-2022-3169": { - "cmt_msg": "nvme: ensure subsystem reset is single threaded" + "CVE-2021-46989": { + "cmt_msg": "hfsplus: prevent corruption in shrinking truncate" }, - "CVE-2022-36280": { - "cmt_msg": "drm/vmwgfx: Validate the box size for the snooped cursor" + "CVE-2024-26606": { + "cmt_msg": "binder: signal epoll threads of self-work" }, - "CVE-2022-1048": { - "cmt_msg": "ALSA: pcm: Fix races among concurrent hw_params and hw_free calls" + "CVE-2023-0590": { + "cmt_msg": "net: sched: fix race condition in qdisc_graft()" }, - "CVE-2023-22995": { - "cmt_msg": "usb: dwc3: dwc3-qcom: Add missing platform_device_put() in dwc3_qcom_acpi_register_core" + "CVE-2022-4095": { + "cmt_msg": "staging: rtl8712: fix use after free bugs" }, - "CVE-2024-21803": { + "CVE-2022-45919": { + "cmt_msg": "media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221" + }, + "CVE-2024-26744": { + "cmt_msg": "RDMA/srpt: Support specifying the srpt_service_guid parameter" + }, + "CVE-2023-21400": { "cmt_msg": "" }, - "CVE-2023-22998": { - "cmt_msg": "drm/virtio: Fix NULL vs IS_ERR checking in virtio_gpu_object_shmem_init" + "CVE-2022-1204": { + "cmt_msg": "ax25: Fix refcount leaks caused by ax25_cb_del()" }, - "CVE-2023-4563": { - "cmt_msg": "netfilter: nf_tables: don't skip expired elements during walk" + "CVE-2022-28893": { + "cmt_msg": "SUNRPC: Ensure we flush any closed sockets before xs_xprt_free()" }, - "CVE-2021-3542": { - "cmt_msg": "" + "CVE-2021-3772": { + "cmt_msg": "sctp: use init_tag from inithdr for ABORT chunk" }, - "CVE-2021-3428": { - "cmt_msg": "ext4: handle error of ext4_setup_system_zone() on remount" + "CVE-2021-3679": { + "cmt_msg": "tracing: Fix bug in rb_per_cpu_empty() that might cause deadloop." }, - "CVE-2023-3220": { - "cmt_msg": "drm/msm/dpu: Add check for pstates" + "CVE-2024-26656": { + "cmt_msg": "drm/amdgpu: fix use-after-free bug" }, - "CVE-2024-22099": { - "cmt_msg": "" + "CVE-2024-26607": { + "cmt_msg": "drm/bridge: sii902x: Fix probing race issue" }, - "CVE-2023-30456": { - "cmt_msg": "KVM: nVMX: add missing consistency checks for CR0 and CR4" + "CVE-2022-2586": { + "cmt_msg": "netfilter: nf_tables: do not allow SET_ID to refer to another table" }, - "CVE-2022-23041": { - "cmt_msg": "xen/9p: use alloc/free_pages_exact()" + "CVE-2022-3629": { + "cmt_msg": "vsock: Fix memory leak in vsock_connect()" }, - "CVE-2022-23040": { - "cmt_msg": "xen/xenbus: don't let xenbus_grant_ring() remove grants in error case" + "CVE-2021-34556": { + "cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4" }, - "CVE-2022-23042": { - "cmt_msg": "xen/netfront: react properly to failing gnttab_end_foreign_access_ref()" + "CVE-2021-28714": { + "cmt_msg": "xen/netback: fix rx queue stall detection" }, - "CVE-2018-12929": { - "cmt_msg": "" + "CVE-2021-28713": { + "cmt_msg": "xen/console: harden hvc_xen against event channel storms" }, - "CVE-2018-12928": { - "cmt_msg": "" + "CVE-2021-28712": { + "cmt_msg": "xen/netfront: harden netfront against event channel storms" }, - "CVE-2020-36311": { - "cmt_msg": "KVM: SVM: Periodically schedule when unregistering regions on destroy" + "CVE-2021-28711": { + "cmt_msg": "xen/blkfront: harden blkfront against event channel storms" }, - "CVE-2020-36310": { - "cmt_msg": "KVM: SVM: avoid infinite loop on NPF from bad address" + "CVE-2021-3659": { + "cmt_msg": "net: mac802154: Fix general protection fault" }, - "CVE-2020-35519": { - "cmt_msg": "net/x25: prevent a couple of overflows" + "CVE-2022-2991": { + "cmt_msg": "remove the lightnvm subsystem" }, - "CVE-2023-31436": { - "cmt_msg": "net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg" + "CVE-2022-3621": { + "cmt_msg": "nilfs2: fix NULL pointer dereference at nilfs_bmap_lookup_at_level()" }, - "CVE-2024-26592": { - "cmt_msg": "ksmbd: fix UAF issue in ksmbd_tcp_new_connection()" + "CVE-2022-23960": { + "cmt_msg": "ARM: report Spectre v2 status through sysfs" }, - "CVE-2022-48619": { - "cmt_msg": "Input: add bounds checking to input_set_capability()" + "CVE-2022-3623": { + "cmt_msg": "mm/hugetlb: fix races when looking up a CONT-PTE/PMD size hugetlb page" }, - "CVE-2020-10708": { - "cmt_msg": "" + "CVE-2022-3624": { + "cmt_msg": "bonding: fix reference count leak in balance-alb mode" }, - "CVE-2022-0400": { - "cmt_msg": "" + "CVE-2022-25258": { + "cmt_msg": "USB: gadget: validate interface OS descriptor requests" }, - "CVE-2024-25741": { - "cmt_msg": "" + "CVE-2021-39656": { + "cmt_msg": "configfs: fix a use-after-free in __configfs_open_file" }, - "CVE-2022-26966": { - "cmt_msg": "sr9700: sanity check for packet length" + "CVE-2021-39657": { + "cmt_msg": "scsi: ufs: Correct the LUN used in eh_device_reset_handler() callback" }, - "CVE-2021-42739": { - "cmt_msg": "media: firewire: firedtv-avc: fix a buffer overflow in avc_ca_pmt()" + "CVE-2023-3090": { + "cmt_msg": "ipvlan:Fix out-of-bounds caused by unclear skb->cb" }, - "CVE-2023-1989": { - "cmt_msg": "Bluetooth: btsdio: fix use after free bug in btsdio_remove due to unfinished work" + "CVE-2022-47946": { + "cmt_msg": "io_uring: kill sqo_dead and sqo submission halting" }, - "CVE-2021-37159": { - "cmt_msg": "usb: hso: fix error handling code of hso_create_net_device" + "CVE-2021-47038": { + "cmt_msg": "Bluetooth: avoid deadlock between hci_dev->lock and socket lock" }, - "CVE-2022-25265": { - "cmt_msg": "" + "CVE-2023-1095": { + "cmt_msg": "netfilter: nf_tables: fix null deref due to zeroed list head" }, - "CVE-2022-20368": { - "cmt_msg": "net/packet: fix slab-out-of-bounds access in packet_recvmsg()" + "CVE-2021-47035": { + "cmt_msg": "iommu/vt-d: Remove WO permissions on second-level paging entries" }, - "CVE-2022-21499": { - "cmt_msg": "lockdown: also lock down previous kgdb use" + "CVE-2021-47034": { + "cmt_msg": "powerpc/64s: Fix pte update for kernel memory on radix" }, - "CVE-2020-27152": { - "cmt_msg": "KVM: ioapic: break infinite recursion on lazy EOI" + "CVE-2022-3239": { + "cmt_msg": "media: em28xx: initialize refcount before kref_get" }, - "CVE-2023-4208": { - "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free" + "CVE-2021-47036": { + "cmt_msg": "udp: skip L4 aggregation for UDP tunnel packets" }, - "CVE-2022-47519": { - "cmt_msg": "wifi: wilc1000: validate length of IEEE80211_P2P_ATTR_OPER_CHANNEL attribute" + "CVE-2023-52571": { + "cmt_msg": "power: supply: rk817: Fix node refcount leak" }, - "CVE-2022-3606": { - "cmt_msg": "" + "CVE-2023-52572": { + "cmt_msg": "cifs: Fix UAF in cifs_demultiplex_thread()" }, - "CVE-2023-4206": { - "cmt_msg": "net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free" + "CVE-2023-52573": { + "cmt_msg": "net: rds: Fix possible NULL-pointer dereference" }, - "CVE-2022-39188": { - "cmt_msg": "mmu_gather: Force tlb-flush VM_PFNMAP vmas" + "CVE-2023-4921": { + "cmt_msg": "net: sched: sch_qfq: Fix UAF in qfq_dequeue()" }, - "CVE-2023-3640": { - "cmt_msg": "" + "CVE-2022-3424": { + "cmt_msg": "misc: sgi-gru: fix use-after-free error in gru_set_context_option, gru_fault and gru_handle_user_call_os" }, - "CVE-2023-20593": { - "cmt_msg": "x86/cpu/amd: Add a Zenbleed fix" + "CVE-2021-46919": { + "cmt_msg": "dmaengine: idxd: fix wq size store permission state" }, - "CVE-2023-0160": { - "cmt_msg": "bpf, sockmap: fix deadlocks in the sockhash and sockmap" + "CVE-2021-34866": { + "cmt_msg": "bpf: Fix ringbuf helper function compatibility" }, - "CVE-2022-2663": { - "cmt_msg": "netfilter: nf_conntrack_irc: Fix forged IP logic" + "CVE-2021-46915": { + "cmt_msg": "netfilter: nft_limit: avoid possible divide error in nft_limit_init" }, - "CVE-2022-43750": { - "cmt_msg": "usb: mon: make mmapped memory read only" + "CVE-2021-46914": { + "cmt_msg": "ixgbe: fix unbalanced device enable/disable in suspend/resume" }, - "CVE-2023-0047": { - "cmt_msg": "mm, oom: do not trigger out_of_memory from the #PF" + "CVE-2021-34981": { + "cmt_msg": "Bluetooth: cmtp: fix file refcount when cmtp_attach_device fails" }, - "CVE-2023-0045": { - "cmt_msg": "x86/bugs: Flush IBP in ib_prctl_set()" + "CVE-2023-23454": { + "cmt_msg": "net: sched: cbq: dont intepret cls results when asked to drop" }, - "CVE-2020-25645": { - "cmt_msg": "geneve: add transport ports in route lookup for geneve" + "CVE-2021-46911": { + "cmt_msg": "ch_ktls: Fix kernel panic" }, - "CVE-2022-38457": { - "cmt_msg": "drm/vmwgfx: Remove rcu locks from user resources" + "CVE-2023-52458": { + "cmt_msg": "block: add check that partition length needs to be aligned with block size" }, - "CVE-2022-20424": { - "cmt_msg": "io_uring: remove io_identity" + "CVE-2021-46913": { + "cmt_msg": "netfilter: nftables: clone set element expression template" }, - "CVE-2022-20422": { - "cmt_msg": "arm64: fix oops in concurrently setting insn_emulation sysctls" + "CVE-2021-46912": { + "cmt_msg": "net: Make tcp_allowed_congestion_control readonly in non-init netns" }, - "CVE-2022-20421": { - "cmt_msg": "binder: fix UAF of ref->proc caused by race condition" + "CVE-2024-26769": { + "cmt_msg": "nvmet-fc: avoid deadlock on delete association path" }, - "CVE-2023-4385": { - "cmt_msg": "fs: jfs: fix possible NULL pointer dereference in dbFree()" + "CVE-2024-26704": { + "cmt_msg": "ext4: fix double-free of blocks due to wrong extents moved_len" }, - "CVE-2023-4387": { - "cmt_msg": "net: vmxnet3: fix possible use-after-free bugs in vmxnet3_rq_alloc_rx_buf()" + "CVE-2022-1786": { + "cmt_msg": "io_uring: remove io_identity" }, - "CVE-2019-19378": { + "CVE-2013-7445": { "cmt_msg": "" }, - "CVE-2020-4788": { - "cmt_msg": "powerpc/64s: flush L1D on kernel entry" + "CVE-2022-28390": { + "cmt_msg": "can: ems_usb: ems_usb_start_xmit(): fix double dev_kfree_skb() in error path" }, - "CVE-2023-51781": { - "cmt_msg": "appletalk: Fix Use-After-Free in atalk_ioctl" + "CVE-2021-3653": { + "cmt_msg": "KVM: nSVM: avoid picking up unsupported bits from L2 in int_ctl (CVE-2021-3653)" }, - "CVE-2022-36879": { - "cmt_msg": "xfrm: xfrm_policy: fix a possible double xfrm_pols_put() in xfrm_bundle_lookup()" + "CVE-2024-26736": { + "cmt_msg": "afs: Increase buffer size in afs_update_volume_status()" }, - "CVE-2021-28691": { - "cmt_msg": "xen-netback: take a reference to the RX task thread" + "CVE-2024-26593": { + "cmt_msg": "i2c: i801: Fix block process call transactions" }, - "CVE-2021-39698": { - "cmt_msg": "wait: add wake_up_pollfree()" + "CVE-2024-26738": { + "cmt_msg": "powerpc/pseries/iommu: DLPAR add doesn't completely initialize pci_controller" }, - "CVE-2022-45934": { - "cmt_msg": "Bluetooth: L2CAP: Fix u8 overflow" + "CVE-2024-26739": { + "cmt_msg": "net/sched: act_mirred: don't override retval if we already lost the skb" }, - "CVE-2022-41674": { - "cmt_msg": "wifi: cfg80211: fix u8 overflow in cfg80211_update_notlisted_nontrans()" + "CVE-2022-42719": { + "cmt_msg": "wifi: mac80211: fix MBSSID parsing use-after-free" }, - "CVE-2020-28588": { - "cmt_msg": "lib/syscall: fix syscall registers retrieval on 32-bit platforms" + "CVE-2022-38096": { + "cmt_msg": "" }, - "CVE-2022-2380": { - "cmt_msg": "video: fbdev: sm712fb: Fix crash in smtcfb_read()" + "CVE-2024-26804": { + "cmt_msg": "net: ip_tunnel: prevent perpetual headroom growth" }, - "CVE-2022-0850": { - "cmt_msg": "ext4: fix kernel infoleak via ext4_extent_header" + "CVE-2024-26805": { + "cmt_msg": "netlink: Fix kernel-infoleak-after-free in __skb_datagram_iter" }, - "CVE-2021-3759": { - "cmt_msg": "memcg: enable accounting of ipc resources" + "CVE-2022-1158": { + "cmt_msg": "KVM: x86/mmu: do compare-and-exchange of gPTE via the user address" }, - "CVE-2021-4197": { - "cmt_msg": "cgroup: Use open-time credentials for process migraton perm checks" + "CVE-2022-3303": { + "cmt_msg": "ALSA: pcm: oss: Fix race at SNDCTL_DSP_SYNC" }, - "CVE-2021-3612": { - "cmt_msg": "Input: joydev - prevent potential read overflow in ioctl" + "CVE-2023-52443": { + "cmt_msg": "apparmor: avoid crash when parsed profile name is empty" }, - "CVE-2020-24503": { - "cmt_msg": "" + "CVE-2022-20141": { + "cmt_msg": "igmp: Add ip_mc_list lock in ip_check_mc_rcu" }, - "CVE-2020-24502": { - "cmt_msg": "" + "CVE-2023-23455": { + "cmt_msg": "net: sched: atm: dont intepret cls results when asked to drop" }, - "CVE-2019-19449": { - "cmt_msg": "f2fs: fix to do sanity check on segment/section count" + "CVE-2022-2905": { + "cmt_msg": "bpf: Don't use tnum_range on array range checking for poke descriptors" }, - "CVE-2021-3753": { - "cmt_msg": "vt_kdsetmode: extend console locking" + "CVE-2022-20148": { + "cmt_msg": "f2fs: fix UAF in f2fs_available_free_memory" }, - "CVE-2020-24504": { - "cmt_msg": "ice: create scheduler aggregator node config and move VSIs" + "CVE-2023-2898": { + "cmt_msg": "f2fs: fix to avoid NULL pointer dereference f2fs_write_end_io()" }, - "CVE-2020-11725": { - "cmt_msg": "" + "CVE-2023-6931": { + "cmt_msg": "perf: Fix perf_event_validate_size()" }, - "CVE-2021-0937": { - "cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write" + "CVE-2023-6932": { + "cmt_msg": "ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet" }, - "CVE-2022-1263": { - "cmt_msg": "KVM: avoid NULL pointer dereference in kvm_dirty_ring_push" + "CVE-2024-26801": { + "cmt_msg": "Bluetooth: Avoid potential use-after-free in hci_error_reset" }, - "CVE-2021-35477": { - "cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4" + "CVE-2024-0607": { + "cmt_msg": "netfilter: nf_tables: fix pointer math issue in nft_byteorder_eval()" }, - "CVE-2021-0938": { - "cmt_msg": "compiler.h: fix barrier_data() on clang" + "CVE-2021-33631": { + "cmt_msg": "ext4: fix kernel BUG in 'ext4_write_inline_data_end()'" }, - "CVE-2022-3521": { - "cmt_msg": "kcm: avoid potential race in kcm_tx_work" + "CVE-2022-28389": { + "cmt_msg": "can: mcba_usb: mcba_usb_start_xmit(): fix double dev_kfree_skb in error path" }, - "CVE-2022-47929": { - "cmt_msg": "net: sched: disallow noqueue for qdisc classes" + "CVE-2022-28388": { + "cmt_msg": "can: usb_8dev: usb_8dev_start_xmit(): fix double dev_kfree_skb() in error path" }, - "CVE-2021-41864": { - "cmt_msg": "bpf: Fix integer overflow in prealloc_elems_and_freelist()" + "CVE-2022-41218": { + "cmt_msg": "media: dvb-core: Fix UAF due to refcount races at releasing" }, - "CVE-2022-2209": { - "cmt_msg": "" + "CVE-2022-47518": { + "cmt_msg": "wifi: wilc1000: validate number of channels" }, - "CVE-2021-37576": { - "cmt_msg": "KVM: PPC: Book3S: Fix H_RTAS rets buffer overflow" + "CVE-2023-52444": { + "cmt_msg": "f2fs: fix to avoid dirent corruption" }, - "CVE-2023-7042": { - "cmt_msg": "" + "CVE-2024-26768": { + "cmt_msg": "LoongArch: Change acpi_core_pic[NR_CPUS] to acpi_core_pic[MAX_CORE_PIC]" }, - "CVE-2022-3594": { - "cmt_msg": "r8152: Rate limit overflow messages" + "CVE-2020-12362": { + "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" }, - "CVE-2022-3595": { - "cmt_msg": "cifs: fix double-fault crash during ntlmssp" + "CVE-2020-12363": { + "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" }, - "CVE-2023-47233": { - "cmt_msg": "" + "CVE-2022-4129": { + "cmt_msg": "l2tp: Serialize access to sk_user_data with sk_callback_lock" }, - "CVE-2020-27815": { - "cmt_msg": "jfs: Fix array index bounds check in dbAdjTree" + "CVE-2020-12364": { + "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" }, - "CVE-2022-1462": { - "cmt_msg": "tty: use new tty_insert_flip_string_and_push_buffer() in pty_write()" + "CVE-2024-26646": { + "cmt_msg": "thermal: intel: hfi: Add syscore callbacks for system-wide PM" }, - "CVE-2023-6606": { - "cmt_msg": "smb: client: fix OOB in smbCalcSize()" + "CVE-2024-26647": { + "cmt_msg": "drm/amd/display: Fix late derefrence 'dsc' check in 'link_set_dsc_pps_packet()'" }, - "CVE-2022-1729": { - "cmt_msg": "perf: Fix sys_perf_event_open() race against self" + "CVE-2024-26644": { + "cmt_msg": "btrfs: don't abort filesystem when attempting to snapshot deleted subvolume" }, - "CVE-2022-3112": { - "cmt_msg": "media: meson: vdec: potential dereference of null pointer" + "CVE-2020-25639": { + "cmt_msg": "drm/nouveau: bail out of nouveau_channel_new if channel init fails" }, - "CVE-2020-27673": { - "cmt_msg": "xen/events: add a proper barrier to 2-level uevent unmasking" + "CVE-2023-33203": { + "cmt_msg": "net: qcom/emac: Fix use after free bug in emac_remove due to race condition" }, - "CVE-2020-27675": { - "cmt_msg": "xen/events: avoid removing an event channel while handling it" + "CVE-2024-26640": { + "cmt_msg": "tcp: add sanity checks to rx zerocopy" }, - "CVE-2023-52439": { - "cmt_msg": "uio: Fix use-after-free in uio_open" + "CVE-2024-26641": { + "cmt_msg": "ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv()" }, - "CVE-2020-28915": { - "cmt_msg": "fbcon: Fix global-out-of-bounds read in fbcon_get_font()" + "CVE-2021-4001": { + "cmt_msg": "bpf: Fix toctou on read-only map's constant scalar tracking" }, - "CVE-2023-3776": { - "cmt_msg": "net/sched: cls_fw: Fix improper refcount update leads to use-after-free" + "CVE-2021-4002": { + "cmt_msg": "hugetlbfs: flush TLBs correctly after huge_pmd_unshare" }, - "CVE-2021-28038": { - "cmt_msg": "Xen/gnttab: handle p2m update errors on a per-slot basis" + "CVE-2023-26545": { + "cmt_msg": "net: mpls: fix stale pointer if allocation fails during device rename" }, - "CVE-2022-3111": { - "cmt_msg": "power: supply: wm8350-power: Add missing free in free_charger_irq" + "CVE-2022-1055": { + "cmt_msg": "net: sched: fix use-after-free in tc_new_tfilter()" }, - "CVE-2023-52435": { - "cmt_msg": "net: prevent mss overflow in skb_segment()" + "CVE-2023-50431": { + "cmt_msg": "accel/habanalabs: fix information leak in sec_attest_info()" }, - "CVE-2023-52434": { - "cmt_msg": "smb: client: fix potential OOBs in smb2_parse_contexts()" + "CVE-2023-52445": { + "cmt_msg": "media: pvrusb2: fix use after free on context disconnection" }, - "CVE-2021-31829": { - "cmt_msg": "bpf: Fix masking negation logic upon negative dst register" + "CVE-2022-20008": { + "cmt_msg": "mmc: block: fix read single on recovery logic" }, - "CVE-2023-52436": { - "cmt_msg": "f2fs: explicitly null-terminate the xattr list" + "CVE-2023-3117": { + "cmt_msg": "netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE" }, - "CVE-2022-2964": { - "cmt_msg": "net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup" + "CVE-2024-26791": { + "cmt_msg": "btrfs: dev-replace: properly validate device names" }, - "CVE-2022-2961": { - "cmt_msg": "" + "CVE-2023-32269": { + "cmt_msg": "netrom: Fix use-after-free caused by accept on already connected socket" }, - "CVE-2021-3506": { - "cmt_msg": "f2fs: fix to avoid out-of-bounds memory access" + "CVE-2023-52467": { + "cmt_msg": "mfd: syscon: Fix null pointer dereference in of_syscon_register()" }, - "CVE-2023-51779": { - "cmt_msg": "Bluetooth: af_bluetooth: Fix Use-After-Free in bt_sock_recvmsg" + "CVE-2023-52464": { + "cmt_msg": "EDAC/thunderx: Fix possible out-of-bounds string access" }, - "CVE-2023-3268": { - "cmt_msg": "relayfs: fix out-of-bounds access in relay_file_read" + "CVE-2023-52463": { + "cmt_msg": "efivarfs: force RO when remounting if SetVariable is not supported" }, - "CVE-2022-40133": { - "cmt_msg": "drm/vmwgfx: Remove rcu locks from user resources" + "CVE-2023-3111": { + "cmt_msg": "btrfs: unset reloc control if transaction commit fails in prepare_to_relocate()" }, - "CVE-2023-6915": { - "cmt_msg": "ida: Fix crash in ida_free when the bitmap is empty" + "CVE-2023-52601": { + "cmt_msg": "jfs: fix array-index-out-of-bounds in dbAdjTree" }, - "CVE-2010-4563": { - "cmt_msg": "" + "CVE-2023-6040": { + "cmt_msg": "netfilter: nf_tables: Reject tables of unsupported family" }, - "CVE-2023-1249": { - "cmt_msg": "coredump: Use the vma snapshot in fill_files_note" + "CVE-2021-31440": { + "cmt_msg": "bpf: Fix propagation of 32 bit unsigned bounds from 64 bit bounds" }, - "CVE-2023-2163": { - "cmt_msg": "bpf: Fix incorrect verifier pruning due to missing register precision taints" + "CVE-2022-26373": { + "cmt_msg": "x86/speculation: Add RSB VM Exit protections" }, - "CVE-2023-2162": { - "cmt_msg": "scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress" + "CVE-2019-15290": { + "cmt_msg": "" }, - "CVE-2023-45871": { - "cmt_msg": "igb: set max size RX buffer when store bad packet is enabled" + "CVE-2023-3212": { + "cmt_msg": "gfs2: Don't deref jdesc in evict" }, - "CVE-2024-23851": { - "cmt_msg": "dm: limit the number of targets and parameter size area" + "CVE-2024-23848": { + "cmt_msg": "" }, - "CVE-2023-0266": { - "cmt_msg": "ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF" + "CVE-2023-1295": { + "cmt_msg": "io_uring: get rid of intermediate IORING_OP_CLOSE stage" }, - "CVE-2023-1838": { - "cmt_msg": "Fix double fget() in vhost_net_set_backend()" + "CVE-2021-47159": { + "cmt_msg": "net: dsa: fix a crash if ->get_sset_count() fails" }, - "CVE-2021-3483": { - "cmt_msg": "firewire: nosy: Fix a use-after-free bug in nosy_ioctl()" + "CVE-2022-0617": { + "cmt_msg": "udf: Fix NULL ptr deref when converting from inline format" }, - "CVE-2023-6040": { - "cmt_msg": "netfilter: nf_tables: Reject tables of unsupported family" + "CVE-2023-4459": { + "cmt_msg": "net: vmxnet3: fix possible NULL pointer dereference in vmxnet3_rq_cleanup()" }, - "CVE-2021-38300": { - "cmt_msg": "bpf, mips: Validate conditional branch offsets" + "CVE-2024-26625": { + "cmt_msg": "llc: call sock_orphan() at release time" }, - "CVE-2020-25656": { - "cmt_msg": "vt: keyboard, extend func_buf_lock to readers" + "CVE-2024-26635": { + "cmt_msg": "llc: Drop support for ETH_P_TR_802_2." }, - "CVE-2022-24448": { - "cmt_msg": "NFSv4: Handle case where the lookup of a directory fails" + "CVE-2023-52639": { + "cmt_msg": "KVM: s390: vsie: fix race during shadow creation" }, - "CVE-2024-26598": { - "cmt_msg": "KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache" + "CVE-2022-2153": { + "cmt_msg": "KVM: x86: Avoid theoretical NULL pointer dereference in kvm_irq_delivery_to_apic_fast()" }, - "CVE-2021-4023": { - "cmt_msg": "io-wq: fix cancellation on create-worker failure" + "CVE-2022-20568": { + "cmt_msg": "Merge tag 'io_uring-worker.v3-2021-02-25' of git://git.kernel.dk/linux-block" }, - "CVE-2021-22555": { - "cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write" + "CVE-2024-2193": { + "cmt_msg": "" }, - "CVE-2020-36694": { - "cmt_msg": "netfilter: x_tables: Switch synchronization to RCU" + "CVE-2022-20566": { + "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free caused by l2cap_chan_put" }, - "CVE-2021-0399": { + "CVE-2018-12930": { "cmt_msg": "" }, - "CVE-2020-36691": { - "cmt_msg": "netlink: limit recursion depth in policy validation" + "CVE-2018-12931": { + "cmt_msg": "" }, - "CVE-2023-42755": { - "cmt_msg": "net/sched: Retire rsvp classifier" + "CVE-2023-52637": { + "cmt_msg": "can: j1939: Fix UAF in j1939_sk_match_filter during setsockopt(SO_J1939_FILTER)" }, - "CVE-2020-36516": { - "cmt_msg": "ipv4: avoid using shared IP generator for connected sockets" + "CVE-2023-1990": { + "cmt_msg": "nfc: st-nci: Fix use after free bug in ndlc_remove due to race condition" }, - "CVE-2012-4542": { - "cmt_msg": "" + "CVE-2024-26583": { + "cmt_msg": "tls: fix race between async notify and socket close" }, - "CVE-2023-42753": { - "cmt_msg": "netfilter: ipset: add the missing IP_SET_HASH_WITH_NET0 macro for ip_set_hash_netportnet.c" + "CVE-2023-3863": { + "cmt_msg": "net: nfc: Fix use-after-free caused by nfc_llcp_find_local" }, - "CVE-2023-42752": { - "cmt_msg": "igmp: limit igmpv3_newpack() packet size to IP_MAX_MTU" + "CVE-2021-33098": { + "cmt_msg": "ixgbe: fix large MTU request from VF" }, - "CVE-2023-4128": { - "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free" + "CVE-2021-28972": { + "cmt_msg": "PCI: rpadlpar: Fix potential drc_name corruption in store functions" }, - "CVE-2023-4244": { - "cmt_msg": "netfilter: nf_tables: fix GC transaction races with netns and netlink event exit path" + "CVE-2021-28971": { + "cmt_msg": "perf/x86/intel: Fix a crash caused by zero PEBS status" }, - "CVE-2021-3573": { - "cmt_msg": "Bluetooth: use correct lock to prevent UAF of hdev object" + "CVE-2023-52634": { + "cmt_msg": "drm/amd/display: Fix disable_otg_wa logic" }, - "CVE-2023-3609": { - "cmt_msg": "net/sched: cls_u32: Fix reference counter leak leading to overflow" + "CVE-2022-22942": { + "cmt_msg": "drm/vmwgfx: Fix stale file descriptors on failed usercopy" }, - "CVE-2022-1974": { - "cmt_msg": "nfc: replace improper check device_is_registered() in netlink related functions" + "CVE-2021-3739": { + "cmt_msg": "btrfs: fix NULL pointer dereference when deleting device by invalid id" }, - "CVE-2022-1975": { - "cmt_msg": "NFC: netlink: fix sleep in atomic bug when firmware download timeout" + "CVE-2020-36782": { + "cmt_msg": "i2c: imx-lpi2c: fix reference leak when pm_runtime_get_sync fails" }, - "CVE-2022-1972": { - "cmt_msg": "netfilter: nf_tables: sanitize nft_set_desc_concat_parse()" + "CVE-2020-36783": { + "cmt_msg": "i2c: img-scb: fix reference leak when pm_runtime_get_sync fails" }, - "CVE-2021-28972": { - "cmt_msg": "PCI: rpadlpar: Fix potential drc_name corruption in store functions" + "CVE-2020-36780": { + "cmt_msg": "i2c: sprd: fix reference leak when pm_runtime_get_sync fails" }, - "CVE-2021-31916": { - "cmt_msg": "dm ioctl: fix out of bounds array access when no devices" + "CVE-2020-36781": { + "cmt_msg": "i2c: imx: fix reference leak when pm_runtime_get_sync fails" }, - "CVE-2022-32981": { - "cmt_msg": "powerpc/32: Fix overread/overwrite of thread_struct via ptrace" + "CVE-2024-26808": { + "cmt_msg": "netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain" }, - "CVE-2022-3424": { - "cmt_msg": "misc: sgi-gru: fix use-after-free error in gru_set_context_option, gru_fault and gru_handle_user_call_os" + "CVE-2021-3732": { + "cmt_msg": "ovl: prevent private clone if bind mount is not allowed" }, - "CVE-2023-2269": { - "cmt_msg": "dm ioctl: fix nested locking in table_clear() to remove deadlock concern" + "CVE-2020-36784": { + "cmt_msg": "i2c: cadence: fix reference leak when pm_runtime_get_sync fails" }, - "CVE-2023-0394": { - "cmt_msg": "ipv6: raw: Deduct extension header length in rawv6_push_pending_frames" + "CVE-2020-36785": { + "cmt_msg": "media: atomisp: Fix use after free in atomisp_alloc_css_stat_bufs()" }, - "CVE-2022-3108": { - "cmt_msg": "drm/amdkfd: Check for null pointer after calling kmemdup" + "CVE-2022-33743": { + "cmt_msg": "xen-netfront: restore __skb_queue_tail() positioning in xennet_get_responses()" }, - "CVE-2022-36402": { - "cmt_msg": "drm/vmwgfx: Fix shader stage validation" + "CVE-2019-25162": { + "cmt_msg": "i2c: Fix a potential use after free" }, - "CVE-2021-4157": { - "cmt_msg": "pNFS/flexfiles: fix incorrect size check in decode_nfs_fh()" + "CVE-2023-4622": { + "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES" }, - "CVE-2021-4154": { - "cmt_msg": "cgroup: verify that source is a string" + "CVE-2024-24861": { + "cmt_msg": "media: xc4000: Fix atomicity violation in xc4000_get_frequency" }, - "CVE-2021-4155": { - "cmt_msg": "xfs: map unwritten blocks in XFS_IOC_{ALLOC,FREE}SP just like fallocate" + "CVE-2024-26627": { + "cmt_msg": "scsi: core: Move scsi_host_busy() out of host lock for waking up EH handler" }, - "CVE-2020-27777": { - "cmt_msg": "powerpc/rtas: Restrict RTAS requests from userspace" + "CVE-2023-0240": { + "cmt_msg": "io_uring: COW io_identity on mismatch" }, - "CVE-2021-4150": { - "cmt_msg": "block: fix incorrect references to disk objects" + "CVE-2021-35039": { + "cmt_msg": "module: limit enabling module.sig_enforce" }, - "CVE-2020-3702": { - "cmt_msg": "ath: Use safer key clearing with key cache entries" + "CVE-2024-25740": { + "cmt_msg": "" }, - "CVE-2021-28952": { - "cmt_msg": "ASoC: qcom: sdm845: Fix array out of bounds access" + "CVE-2022-3535": { + "cmt_msg": "net: mvpp2: fix mvpp2 debugfs leak" }, - "CVE-2021-3655": { - "cmt_msg": "sctp: validate from_addr_param return" + "CVE-2024-26645": { + "cmt_msg": "tracing: Ensure visibility when inserting an element into tracing_map" }, - "CVE-2020-8694": { - "cmt_msg": "powercap: restrict energy meter to root access" + "CVE-2022-3903": { + "cmt_msg": "media: mceusb: Use new usb_control_msg_*() routines" }, - "CVE-2023-0461": { - "cmt_msg": "net/ulp: prevent ULP without clone op from entering the LISTEN status" + "CVE-2024-26642": { + "cmt_msg": "netfilter: nf_tables: disallow anonymous set with timeout flag" }, - "CVE-2021-29154": { - "cmt_msg": "bpf, x86: Validate computation of branch displacements for x86-64" + "CVE-2022-3577": { + "cmt_msg": "HID: bigben: fix slab-out-of-bounds Write in bigben_probe" }, - "CVE-2021-29155": { - "cmt_msg": "bpf: Use correct permission flag for mixed signed bounds arithmetic" + "CVE-2023-20588": { + "cmt_msg": "x86/CPU/AMD: Do not leak quotient data after a division by 0" }, - "CVE-2021-3714": { - "cmt_msg": "" + "CVE-2021-47071": { + "cmt_msg": "uio_hv_generic: Fix a memory leak in error handling paths" }, - "CVE-2021-3896": { - "cmt_msg": "isdn: cpai: check ctr->cnr to avoid array index out of bound" + "CVE-2021-47070": { + "cmt_msg": "uio_hv_generic: Fix another memory leak in error handling paths" }, - "CVE-2021-3894": { - "cmt_msg": "sctp: account stream padding length for reconf chunk" + "CVE-2021-47073": { + "cmt_msg": "platform/x86: dell-smbios-wmi: Fix oops on rmmod dell_smbios" }, - "CVE-2021-3892": { - "cmt_msg": "" + "CVE-2022-4378": { + "cmt_msg": "proc: proc_skip_spaces() shouldn't think it is working on C strings" }, - "CVE-2023-20928": { - "cmt_msg": "android: binder: stop saving a pointer to the VMA" + "CVE-2021-47075": { + "cmt_msg": "nvmet: fix memory leak in nvmet_alloc_ctrl()" }, - "CVE-2021-39633": { - "cmt_msg": "ip_gre: add validation for csum_start" + "CVE-2021-47074": { + "cmt_msg": "nvme-loop: fix memory leak in nvme_loop_create_ctrl()" }, - "CVE-2022-27223": { - "cmt_msg": "USB: gadget: validate endpoint index for xilinx udc" + "CVE-2021-47077": { + "cmt_msg": "scsi: qedf: Add pointer checks in qedf_update_link_speed()" }, - "CVE-2023-35788": { - "cmt_msg": "net/sched: flower: fix possible OOB write in fl_set_geneve_opt()" + "CVE-2021-47076": { + "cmt_msg": "RDMA/rxe: Return CQE error if invalid lkey was supplied" }, - "CVE-2022-2639": { - "cmt_msg": "openvswitch: fix OOB access in reserve_sfa_size()" + "CVE-2021-47170": { + "cmt_msg": "USB: usbfs: Don't WARN about excessively large memory allocations" }, - "CVE-2021-39634": { - "cmt_msg": "epoll: do not insert into poll queues until all sanity checks are done" + "CVE-2021-47078": { + "cmt_msg": "RDMA/rxe: Clear all QP fields if creation failed" }, - "CVE-2022-24959": { - "cmt_msg": "yam: fix a memory leak in yam_siocdevprivate()" + "CVE-2021-47172": { + "cmt_msg": "iio: adc: ad7124: Fix potential overflow due to non sequential channel numbers" }, - "CVE-2022-25375": { - "cmt_msg": "usb: gadget: rndis: check size of RNDIS_MSG_SET command" + "CVE-2021-47173": { + "cmt_msg": "misc/uss720: fix memory leak in uss720_probe" }, - "CVE-2022-33742": { - "cmt_msg": "xen/blkfront: force data bouncing when backend is untrusted" + "CVE-2021-47174": { + "cmt_msg": "netfilter: nft_set_pipapo_avx2: Add irq_fpu_usable() check, fallback to non-AVX2 version" }, - "CVE-2022-33741": { - "cmt_msg": "xen/netfront: force data bouncing when backend is untrusted" + "CVE-2021-47175": { + "cmt_msg": "net/sched: fq_pie: fix OOB access in the traffic path" }, - "CVE-2022-33740": { - "cmt_msg": "xen/netfront: fix leaking data in shared pages" + "CVE-2021-47177": { + "cmt_msg": "iommu/vt-d: Fix sysfs leak in alloc_iommu()" }, - "CVE-2024-24864": { - "cmt_msg": "" + "CVE-2021-46951": { + "cmt_msg": "tpm: efi: Use local variable for calculating final log size" }, - "CVE-2022-45885": { - "cmt_msg": "" + "CVE-2021-46950": { + "cmt_msg": "md/raid1: properly indicate failure when ending a failed write request" }, - "CVE-2022-33744": { - "cmt_msg": "xen/arm: Fix race in RB-tree based P2M accounting" + "CVE-2021-46953": { + "cmt_msg": "ACPI: GTDT: Don't corrupt interrupt mappings on watchdow probe failure" }, - "CVE-2023-52443": { - "cmt_msg": "apparmor: avoid crash when parsed profile name is empty" + "CVE-2021-46952": { + "cmt_msg": "NFS: fs_context: validate UDP retrans to prevent shift out-of-bounds" }, - "CVE-2022-2327": { - "cmt_msg": "io_uring: remove any grabbing of context" + "CVE-2021-46955": { + "cmt_msg": "openvswitch: fix stack OOB read while fragmenting IPv4 packets" }, - "CVE-2021-45486": { - "cmt_msg": "inet: use bigger hash table for IP ID generation" + "CVE-2021-46956": { + "cmt_msg": "virtiofs: fix memory leak in virtio_fs_probe()" }, - "CVE-2020-12888": { - "cmt_msg": "vfio-pci: Invalidate mmaps and block MMIO access on disabled memory" + "CVE-2021-46959": { + "cmt_msg": "spi: Fix use-after-free with devm_spi_alloc_*" }, - "CVE-2023-2194": { - "cmt_msg": "i2c: xgene-slimpro: Fix out-of-bounds bug in xgene_slimpro_i2c_xfer()" + "CVE-2021-46958": { + "cmt_msg": "btrfs: fix race between transaction aborts and fsyncs leading to use-after-free" }, - "CVE-2023-52445": { - "cmt_msg": "media: pvrusb2: fix use after free on context disconnection" + "CVE-2020-26139": { + "cmt_msg": "mac80211: do not accept/forward invalid EAPOL frames" }, - "CVE-2022-41218": { - "cmt_msg": "media: dvb-core: Fix UAF due to refcount races at releasing" + "CVE-2023-42754": { + "cmt_msg": "ipv4: fix null-deref in ipv4_link_failure" }, - "CVE-2023-52438": { - "cmt_msg": "binder: fix use-after-free in shinker's callback" + "CVE-2024-26772": { + "cmt_msg": "ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal()" }, - "CVE-2022-36946": { - "cmt_msg": "netfilter: nf_queue: do not allow packet truncation below transport header offset" + "CVE-2022-3061": { + "cmt_msg": "video: fbdev: i740fb: Error out if 'pixclock' equals zero" }, - "CVE-2021-20194": { - "cmt_msg": "io_uring: don't rely on weak ->files references" + "CVE-2021-3609": { + "cmt_msg": "can: bcm: delay release of struct bcm_op after synchronize_rcu()" }, - "CVE-2011-4916": { - "cmt_msg": "" + "CVE-2023-52595": { + "cmt_msg": "wifi: rt2x00: restart beacon queue when hardware reset" }, - "CVE-2021-0448": { - "cmt_msg": "netfilter: ctnetlink: add a range check for l3/l4 protonum" + "CVE-2024-26778": { + "cmt_msg": "fbdev: savage: Error out if pixclock equals zero" }, - "CVE-2022-21166": { - "cmt_msg": "x86/speculation/mmio: Enable CPU Fill buffer clearing on idle" + "CVE-2022-0847": { + "cmt_msg": "lib/iov_iter: initialize \"flags\" in new pipe_buffer" }, - "CVE-2024-0841": { - "cmt_msg": "" + "CVE-2021-3600": { + "cmt_msg": "bpf: Fix 32 bit src register truncation on div/mod" }, - "CVE-2021-29650": { - "cmt_msg": "netfilter: x_tables: Use correct memory barriers." + "CVE-2021-23133": { + "cmt_msg": "net/sctp: fix race condition in sctp_destroy_sock" }, - "CVE-2023-34255": { - "cmt_msg": "xfs: verify buffer contents when we skip log replay" + "CVE-2022-2327": { + "cmt_msg": "io_uring: remove any grabbing of context" }, - "CVE-2022-41849": { - "cmt_msg": "fbdev: smscufx: Fix use-after-free in ufx_ops_open()" + "CVE-2023-52590": { + "cmt_msg": "ocfs2: Avoid touching renamed directory if parent does not change" }, - "CVE-2022-41848": { - "cmt_msg": "" + "CVE-2021-0920": { + "cmt_msg": "af_unix: fix garbage collect vs MSG_PEEK" }, - "CVE-2022-1353": { - "cmt_msg": "af_key: add __GFP_ZERO flag for compose_sadb_supported in function pfkey_register" + "CVE-2024-26675": { + "cmt_msg": "ppp_async: limit MRU to 64K" }, - "CVE-2022-28356": { - "cmt_msg": "llc: fix netdevice reference leaks in llc_ui_bind()" + "CVE-2023-52597": { + "cmt_msg": "KVM: s390: fix setting of fpc register" }, - "CVE-2020-16119": { - "cmt_msg": "dccp: don't duplicate ccid when cloning dccp sock" + "CVE-2024-26622": { + "cmt_msg": "tomoyo: fix UAF write bug in tomoyo_write_control()" }, - "CVE-2020-29534": { - "cmt_msg": "io_uring: don't rely on weak ->files references" + "CVE-2020-28374": { + "cmt_msg": "scsi: target: Fix XCOPY NAA identifier lookup" }, - "CVE-2022-1198": { - "cmt_msg": "drivers: hamradio: 6pack: fix UAF bug caused by mod_timer()" + "CVE-2023-0615": { + "cmt_msg": "media: vivid: dev->bitmap_cap wasn't freed in all cases" }, - "CVE-2022-1199": { - "cmt_msg": "ax25: Fix NULL pointer dereference in ax25_kill_by_device" + "CVE-2024-26672": { + "cmt_msg": "drm/amdgpu: Fix variable 'mca_funcs' dereferenced before NULL check in 'amdgpu_mca_smu_get_mca_entry()'" }, - "CVE-2023-6546": { - "cmt_msg": "tty: n_gsm: fix the UAF caused by race condition in gsm_cleanup_mux" + "CVE-2023-52527": { + "cmt_msg": "ipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data()" }, - "CVE-2021-39801": { - "cmt_msg": "" + "CVE-2023-3006": { + "cmt_msg": "arm64: Add AMPERE1 to the Spectre-BHB affected list" }, - "CVE-2021-39800": { - "cmt_msg": "" + "CVE-2024-26787": { + "cmt_msg": "mmc: mmci: stm32: fix DMA API overlapping mappings warning" }, - "CVE-2021-28375": { - "cmt_msg": "misc: fastrpc: restrict user apps from sending kernel RPC messages" + "CVE-2023-52522": { + "cmt_msg": "net: fix possible store tearing in neigh_periodic_work()" }, - "CVE-2022-1195": { - "cmt_msg": "hamradio: improve the incomplete fix to avoid NPD" + "CVE-2022-3586": { + "cmt_msg": "sch_sfb: Don't assume the skb is still around after enqueueing to child" }, - "CVE-2021-26708": { - "cmt_msg": "vsock: fix the race conditions in multi-transport support" + "CVE-2024-0641": { + "cmt_msg": "tipc: fix a potential deadlock on &tx->lock" }, - "CVE-2021-4202": { - "cmt_msg": "NFC: reorganize the functions in nci_request" + "CVE-2024-26636": { + "cmt_msg": "llc: make llc_ui_sendmsg() more robust against bonding changes" }, - "CVE-2021-4203": { - "cmt_msg": "af_unix: fix races in sk_peer_pid and sk_peer_cred accesses" + "CVE-2024-26779": { + "cmt_msg": "wifi: mac80211: fix race condition on enabling fast-xmit" }, - "CVE-2022-45887": { - "cmt_msg": "media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb()" + "CVE-2024-26586": { + "cmt_msg": "mlxsw: spectrum_acl_tcam: Fix stack corruption" }, - "CVE-2022-45886": { - "cmt_msg": "media: dvb-core: Fix use-after-free due on race condition at dvb_net" + "CVE-2023-52528": { + "cmt_msg": "net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg" }, - "CVE-2023-46343": { - "cmt_msg": "nfc: nci: fix possible NULL pointer dereference in send_acknowledge()" + "CVE-2024-26623": { + "cmt_msg": "pds_core: Prevent race issues involving the adminq" + }, + "CVE-2020-27820": { + "cmt_msg": "drm/nouveau: use drm_dev_unplug() during device removal" + }, + "CVE-2023-1872": { + "cmt_msg": "io_uring: propagate issue_flags state down to file assignment" }, "CVE-2024-25744": { "cmt_msg": "x86/coco: Disable 32-bit emulation by default on TDX and SEV" }, - "CVE-2023-2124": { - "cmt_msg": "xfs: verify buffer contents when we skip log replay" + "CVE-2023-1078": { + "cmt_msg": "rds: rds_rm_zerocopy_callback() use list_first_entry()" }, - "CVE-2023-1281": { - "cmt_msg": "net/sched: tcindex: update imperfect hash filters respecting rcu" + "CVE-2023-39197": { + "cmt_msg": "netfilter: conntrack: dccp: copy entire header to stack buffer, not just basic one" }, - "CVE-2023-2860": { - "cmt_msg": "ipv6: sr: fix out-of-bounds read when setting HMAC data." + "CVE-2021-47151": { + "cmt_msg": "interconnect: qcom: bcm-voter: add a missing of_node_put()" }, - "CVE-2021-44879": { - "cmt_msg": "f2fs: fix to do sanity check on inode type during garbage collection" + "CVE-2023-31248": { + "cmt_msg": "netfilter: nf_tables: do not ignore genmask when looking up chain by id" }, - "CVE-2023-1859": { - "cmt_msg": "9p/xen : Fix use after free bug in xen_9pfs_front_remove due to race condition" + "CVE-2020-26558": { + "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical" }, - "CVE-2023-2513": { - "cmt_msg": "ext4: fix use-after-free in ext4_xattr_set_entry" + "CVE-2023-39193": { + "cmt_msg": "netfilter: xt_sctp: validate the flag_info count" }, - "CVE-2022-1516": { - "cmt_msg": "net/x25: Fix null-ptr-deref caused by x25_disconnect" + "CVE-2023-1079": { + "cmt_msg": "HID: asus: use spinlock to safely schedule workers" }, - "CVE-2023-1855": { - "cmt_msg": "hwmon: (xgene) Fix use after free bug in xgene_hwmon_remove due to race condition" + "CVE-2020-26541": { + "cmt_msg": "certs: Add EFI_CERT_X509_GUID support for dbx entries" }, - "CVE-2022-27672": { - "cmt_msg": "x86/speculation: Identify processors vulnerable to SMT RSB predictions" + "CVE-2023-6610": { + "cmt_msg": "smb: client: fix potential OOB in smb2_dump_detail()" }, - "CVE-2020-25221": { - "cmt_msg": "mm: fix pin vs. gup mismatch with gate pages" + "CVE-2024-26600": { + "cmt_msg": "phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP" }, - "CVE-2015-2877": { - "cmt_msg": "" + "CVE-2023-3390": { + "cmt_msg": "netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE" }, - "CVE-2023-26242": { - "cmt_msg": "" + "CVE-2023-28328": { + "cmt_msg": "media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer()" }, - "CVE-2019-16089": { + "CVE-2020-26143": { "cmt_msg": "" }, - "CVE-2021-38198": { - "cmt_msg": "KVM: X86: MMU: Use the correct inherited permissions to get shadow page" - }, - "CVE-2021-38199": { - "cmt_msg": "NFSv4: Initialise connection to the server in nfs4_alloc_client()" - }, - "CVE-2022-1679": { - "cmt_msg": "ath9k: fix use-after-free in ath9k_hif_usb_rx_cb" + "CVE-2021-33061": { + "cmt_msg": "ixgbe: add improvement for MDD response functionality" }, - "CVE-2023-1513": { - "cmt_msg": "kvm: initialize all of the kvm_debugregs structure before sending it to userspace" + "CVE-2024-26764": { + "cmt_msg": "fs/aio: Restrict kiocb_set_cancel_fn() to I/O submitted via libaio" }, - "CVE-2021-26401": { - "cmt_msg": "x86/speculation: Use generic retpoline by default on AMD" + "CVE-2024-26767": { + "cmt_msg": "drm/amd/display: fixed integer types and null check locations" }, - "CVE-2020-28941": { - "cmt_msg": "speakup: Do not let the line discipline be used several times" + "CVE-2024-26766": { + "cmt_msg": "IB/hfi1: Fix sdma.h tx->num_descs off-by-one error" }, - "CVE-2023-52442": { - "cmt_msg": "ksmbd: validate session id and tree id in compound request" + "CVE-2024-26589": { + "cmt_msg": "bpf: Reject variable offset alu on PTR_TO_FLOW_KEYS" }, - "CVE-2022-40768": { - "cmt_msg": "scsi: stex: Properly zero out the passthrough command structure" + "CVE-2023-3389": { + "cmt_msg": "io_uring: mutex locked poll hashing" }, - "CVE-2022-1280": { - "cmt_msg": "drm: avoid circular locks in drm_mode_getconnector" + "CVE-2023-1476": { + "cmt_msg": "" }, - "CVE-2021-3923": { - "cmt_msg": "RDMA/core: Don't infoleak GRH fields" + "CVE-2023-4010": { + "cmt_msg": "" }, - "CVE-2011-4917": { + "CVE-2021-3864": { "cmt_msg": "" }, - "CVE-2021-45485": { - "cmt_msg": "ipv6: use prandom_u32() for ID generation" + "CVE-2024-26770": { + "cmt_msg": "HID: nvidia-shield: Add missing null pointer checks to LED initialization" }, - "CVE-2023-52448": { - "cmt_msg": "gfs2: Fix kernel NULL pointer dereference in gfs2_rgrp_dump" + "CVE-2024-26584": { + "cmt_msg": "net: tls: handle backlogging of crypto requests" }, - "CVE-2023-52449": { - "cmt_msg": "mtd: Fix gluebi NULL pointer dereference caused by ftl notifier" + "CVE-2022-1652": { + "cmt_msg": "floppy: use a statically allocated error counter" }, - "CVE-2023-23039": { - "cmt_msg": "" + "CVE-2023-4623": { + "cmt_msg": "net/sched: sch_hfsc: Ensure inner classes have fsc curve" }, - "CVE-2024-1312": { - "cmt_msg": "mm: lock_vma_under_rcu() must check vma->anon_vma under vma lock" + "CVE-2021-47043": { + "cmt_msg": "media: venus: core: Fix some resource leaks in the error path of 'venus_probe()'" }, - "CVE-2023-3338": { - "cmt_msg": "Remove DECnet support from kernel" + "CVE-2024-23849": { + "cmt_msg": "net/rds: Fix UBSAN: array-index-out-of-bounds in rds_cmsg_recv" }, - "CVE-2023-1637": { - "cmt_msg": "x86/speculation: Restore speculation related MSRs during S3 resume" - } - } - }, - "5.8": { - "5.8": { - "CVE-2020-24490": { - "cmt_msg": "Bluetooth: fix kernel oops in store_pending_adv_report", - "cmt_id": "a2ec905d1e160a33b2e210e45ad30445ef26ce0e" + "CVE-2020-29568": { + "cmt_msg": "xen/xenbus: Allow watches discard events before queueing" }, - "CVE-2020-16166": { - "cmt_msg": "random32: update the net random state on interrupt and activity", - "cmt_id": "f227e3ec3b5cad859ad15666874405e8c1bbc1d4" + "CVE-2020-29569": { + "cmt_msg": "xen-blkback: set ring->xenblkd to NULL after kthread_stop()" }, - "CVE-2021-0605": { - "cmt_msg": "af_key: pfkey_dump needs parameter validation", - "cmt_id": "37bd22420f856fcd976989f1d4f1f7ad28e1fcac" - } - }, - "5.8.1": { - "CVE-2020-36386": { - "cmt_msg": "Bluetooth: Fix slab-out-of-bounds read in hci_extended_inquiry_result_evt()", - "cmt_id": "cc09a53b7252eeffd2c1d403d215dd0f3aad1f5d" + "CVE-2023-52596": { + "cmt_msg": "sysctl: Fix out of bounds access for empty sysctl registers" }, - "CVE-2020-14331": { - "cmt_msg": "vgacon: Fix for missing check in scrollback handling", - "cmt_id": "0ca4ebe9d6350e758e40683f08fd93cb4539e0b7" - } - }, - "5.8.2": { - "CVE-2020-26088": { - "cmt_msg": "net/nfc/rawsock.c: add CAP_NET_RAW check.", - "cmt_id": "d556aa7ab7b71592fc60ecdc4b917644ecea2c92" + "CVE-2023-51043": { + "cmt_msg": "drm/atomic: Fix potential use-after-free in nonblocking commits" }, - "CVE-2020-36387": { - "cmt_msg": "io_uring: hold 'ctx' reference around task_work queue + execute", - "cmt_id": "960ea38bfe7a0edd403d6a9e2d358018b4ce3bfa" + "CVE-2022-1966": { + "cmt_msg": "netfilter: nf_tables: disallow non-stateful expression in sets earlier" }, - "CVE-2019-19770": { - "cmt_msg": "blktrace: fix debugfs use after free", - "cmt_id": "00734ff000fc72cb48a1aec214f024824f8b7419" + "CVE-2022-38457": { + "cmt_msg": "drm/vmwgfx: Remove rcu locks from user resources" }, - "CVE-2021-20292": { - "cmt_msg": "drm/ttm/nouveau: don't call tt destroy callback on alloc failure.", - "cmt_id": "3c374f0e63d7261dce2e556ac3df4e0541dd775a" - } - }, - "5.8.3": { - "CVE-2019-19448": { - "cmt_msg": "btrfs: only search for left_info if there is no right_info in try_merge_free_space", - "cmt_id": "aa39db7b49ee73f10693c0ab7901c76e18031ebd" + "CVE-2022-20132": { + "cmt_msg": "HID: add hid_is_usb() function to make it simpler for USB detection" }, - "CVE-2020-25212": { - "cmt_msg": "nfs: Fix getxattr kernel panic and memory overflow", - "cmt_id": "266bc13be47ace4bc434dc1617bb5550aeceea4f" - } - }, - "5.8.4": { - "CVE-2020-14314": { - "cmt_msg": "ext4: fix potential negative array index in do_split()", - "cmt_id": "88e79f7a9841278fa8ff7ff6178bad12da002ffc" + "CVE-2022-2977": { + "cmt_msg": "tpm: fix reference counting for struct tpm_chip" }, - "CVE-2020-29371": { - "cmt_msg": "romfs: fix uninitialized memory leak in romfs_dev_read()", - "cmt_id": "734a5c3f266c26ff785bc1fcf083b55fcda47ff5" + "CVE-2022-20424": { + "cmt_msg": "io_uring: remove io_identity" }, - "CVE-2020-0466": { - "cmt_msg": "do_epoll_ctl(): clean the failure exits up a bit", - "cmt_id": "d9903e8c2576d9c933ae55fc4bab1f55e85f66e0" - } - }, - "5.8.6": { - "CVE-2020-36766": { - "cmt_msg": "cec-api: prevent leaking memory through hole in structure", - "cmt_id": "72db989557d993793c01ba84eb98f3cbf2a7f4cf" + "CVE-2022-23222": { + "cmt_msg": "bpf: Replace PTR_TO_XXX_OR_NULL with PTR_TO_XXX | PTR_MAYBE_NULL" }, - "CVE-2021-3428": { - "cmt_msg": "ext4: handle error of ext4_setup_system_zone() on remount", - "cmt_id": "6c30edde8a3a710c20b5689a921425a479501cb5" - } - }, - "5.8.7": { - "CVE-2020-25221": { - "cmt_msg": "mm: fix pin vs. gup mismatch with gate pages", - "cmt_id": "e80a7602b405dfac44aa4e81eec6d51d9e9fad8e" + "CVE-2022-1789": { + "cmt_msg": "KVM: x86/mmu: fix NULL pointer dereference on guest INVPCID" }, - "CVE-2022-20565": { - "cmt_msg": "HID: core: Correctly handle ReportSize being zero", - "cmt_id": "b070b1e2076809ea192d4f3344833afcfdaf146d" + "CVE-2023-25012": { + "cmt_msg": "HID: bigben: use spinlock to safely schedule workers" }, - "CVE-2020-0465": { - "cmt_msg": "HID: core: Sanitize event code and type when mapping input", - "cmt_id": "e771e63c0cdca5f127dbe1bed80f928da7f51673" - } - }, - "5.8.8": { - "CVE-2020-14386": { - "cmt_msg": "net/packet: fix overflow in tpacket_rcv", - "cmt_id": "03ca1f09ab1ff47a24777c13f9bd161394122f41" + "CVE-2016-8660": { + "cmt_msg": "" }, - "CVE-2020-25285": { - "cmt_msg": "mm/hugetlb: fix a race between hugetlb sysctl handlers", - "cmt_id": "951e290ad85b8dfa54f8908fb680068655748d61" + "CVE-2023-6270": { + "cmt_msg": "aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts" }, - "CVE-2020-14385": { - "cmt_msg": "xfs: fix boundary test in xfs_attr_shortform_verify", - "cmt_id": "531c6cb9ad1e7de98e09e9b7d23aaca0e3f5babd" + "CVE-2023-2156": { + "cmt_msg": "net: rpl: fix rpl header size calculation" }, - "CVE-2020-25641": { - "cmt_msg": "block: allow for_each_bvec to support zero len bvec", - "cmt_id": "b7df98a8b7b8abce596e9696d5c3183fc4c0019d" + "CVE-2022-20422": { + "cmt_msg": "arm64: fix oops in concurrently setting insn_emulation sysctls" }, - "CVE-2021-1048": { - "cmt_msg": "fix regression in \"epoll: Keep a reference on files added to the check list\"", - "cmt_id": "41e233bd64127d95ba4c3fbca69dd790e02c0517" - } - }, - "5.8.10": { - "CVE-2020-25284": { - "cmt_msg": "rbd: require global CAP_SYS_ADMIN for mapping and unmapping", - "cmt_id": "81f5de838b82144fb336a71b697d28ceefc5aead" + "CVE-2023-3772": { + "cmt_msg": "xfrm: add NULL check in xfrm_update_ae_params" }, - "CVE-2020-14390": { - "cmt_msg": "fbcon: remove soft scrollback code", - "cmt_id": "245a228891e3627e47921db1ec1b6612f118158b" + "CVE-2023-45862": { + "cmt_msg": "USB: ene_usb6250: Allocate enough memory for full object" }, - "CVE-2020-28097": { - "cmt_msg": "vgacon: remove software scrollback support", - "cmt_id": "20782abbbdfe922496a28f9cc0c3c0030f7dfb8f" + "CVE-2023-45863": { + "cmt_msg": "kobject: Fix slab-out-of-bounds in fill_kobj_path()" }, - "CVE-2020-36312": { - "cmt_msg": "KVM: fix memory leak in kvm_io_bus_unregister_dev()", - "cmt_id": "68c125324b5e1d1d22805653735442923d896a1d" - } - }, - "5.8.12": { - "CVE-2020-25645": { - "cmt_msg": "geneve: add transport ports in route lookup for geneve", - "cmt_id": "e76c0f41d7b1951ef4161e079c832c2e904fd29f" + "CVE-2023-1582": { + "cmt_msg": "fs/proc: task_mmu.c: don't read mapcount for migration entry" }, - "CVE-2020-25643": { - "cmt_msg": "hdlc_ppp: add range checks in ppp_cp_parse_cr()", - "cmt_id": "6070a0f58d95a13234fecae40424c6978ec09ef6" - } - }, - "5.8.13": { - "CVE-2020-25211": { - "cmt_msg": "netfilter: ctnetlink: add a range check for l3/l4 protonum", - "cmt_id": "24c4f2ae019bfcd2a82783e07c2894a519eb1050" + "CVE-2021-47162": { + "cmt_msg": "tipc: skb_linearize the head skb when reassembling msgs" }, - "CVE-2021-0448": { - "cmt_msg": "netfilter: ctnetlink: add a range check for l3/l4 protonum", - "cmt_id": "24c4f2ae019bfcd2a82783e07c2894a519eb1050" - } - }, - "5.8.14": { - "CVE-2021-39634": { - "cmt_msg": "epoll: do not insert into poll queues until all sanity checks are done", - "cmt_id": "bdb43b31e65d418008a7f6718bbd2ca5ee04669a" - } - }, - "5.8.15": { - "CVE-2020-27194": { - "cmt_msg": "bpf: Fix scalar32_min_max_or bounds tracking", - "cmt_id": "fc5b5ae8ac3cf955bebd0c219a93219bf9c3f4a2" + "CVE-2022-21166": { + "cmt_msg": "x86/speculation/mmio: Enable CPU Fill buffer clearing on idle" }, - "CVE-2020-28915": { - "cmt_msg": "fbcon: Fix global-out-of-bounds read in fbcon_get_font()", - "cmt_id": "e57db2fee8b123b180b7829e1edf17311877b86b" - } - }, - "5.8.16": { - "CVE-2020-12352": { - "cmt_msg": "Bluetooth: A2MP: Fix not initializing all members", - "cmt_id": "a350bfd9a93fd1b3d1707bf1d1db3cfb823a8d10" + "CVE-2008-4609": { + "cmt_msg": "" }, - "CVE-2020-12351": { - "cmt_msg": "Bluetooth: L2CAP: Fix calling sk_filter on non-socket based channel", - "cmt_id": "ffddc73458e83e015f47e5e92c880fd54be27f95" - } - }, - "5.8.17": { - "CVE-2020-14351": { - "cmt_msg": "perf/core: Fix race in the perf_mmap_close() function", - "cmt_id": "ff57d46f868e5e7d302c741212f394732c835432" + "CVE-2022-20421": { + "cmt_msg": "binder: fix UAF of ref->proc caused by race condition" }, - "CVE-2020-27152": { - "cmt_msg": "KVM: ioapic: break infinite recursion on lazy EOI", - "cmt_id": "990c91c323f3df86e523bfd4664d97e2680e8294" + "CVE-2022-0435": { + "cmt_msg": "tipc: improve size validations for received domain records" }, - "CVE-2020-27784": { - "cmt_msg": "usb: gadget: function: printer: fix use-after-free in __lock_acquire", - "cmt_id": "34f026263889e2827e04acdc3a0eb9ecbd191ef0" + "CVE-2023-6356": { + "cmt_msg": "nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length" }, - "CVE-2020-0423": { - "cmt_msg": "binder: fix UAF when releasing todo list", - "cmt_id": "40d4418ea4db2ee8dcdfad9a826376e0cc9ce53f" + "CVE-2022-3533": { + "cmt_msg": "" }, - "CVE-2020-25705": { - "cmt_msg": "icmp: randomize the global rate limiter", - "cmt_id": "ec5c9273f73160a7569896f8bf6af8cdae6fdb93" - } - }, - "5.8.18": { - "CVE-2021-20194": { - "cmt_msg": "io_uring: don't rely on weak ->files references", - "cmt_id": "511abceaf0a00cb75f13bdc78f210a7b015e0478" + "CVE-2024-26648": { + "cmt_msg": "drm/amd/display: Fix variable deferencing before NULL check in edp_setup_replay()" }, - "CVE-2020-29534": { - "cmt_msg": "io_uring: don't rely on weak ->files references", - "cmt_id": "511abceaf0a00cb75f13bdc78f210a7b015e0478" + "CVE-2021-4135": { + "cmt_msg": "netdevsim: Zero-initialize memory for new map's value in function nsim_bpf_map_alloc" }, - "CVE-2021-20226": { - "cmt_msg": "io_uring: don't rely on weak ->files references", - "cmt_id": "511abceaf0a00cb75f13bdc78f210a7b015e0478" - } - }, - "outstanding": { - "CVE-2020-36322": { - "cmt_msg": "fuse: fix bad inode" + "CVE-2023-26607": { + "cmt_msg": "ntfs: fix out-of-bounds read in ntfs_attr_find()" }, - "CVE-2023-30772": { - "cmt_msg": "power: supply: da9150: Fix use after free bug in da9150_charger_remove due to race condition" + "CVE-2023-52456": { + "cmt_msg": "serial: imx: fix tx statemachine deadlock" }, - "CVE-2020-35508": { - "cmt_msg": "fork: fix copy_process(CLONE_PARENT) race with the exiting ->real_parent" + "CVE-2019-15239": { + "cmt_msg": "unknown" }, - "CVE-2022-3649": { - "cmt_msg": "nilfs2: fix use-after-free bug of struct nilfs_root" + "CVE-2022-3534": { + "cmt_msg": "libbpf: Fix use-after-free in btf_dump_name_dups" }, - "CVE-2020-35501": { - "cmt_msg": "" + "CVE-2023-52635": { + "cmt_msg": "PM / devfreq: Synchronize devfreq_monitor_[start/stop]" }, - "CVE-2023-6176": { - "cmt_msg": "net/tls: do not free tls_rec on async operation in bpf_exec_tx_verdict()" + "CVE-2023-52469": { + "cmt_msg": "drivers/amd/pm: fix a use-after-free in kv_parse_power_table" }, - "CVE-2021-45095": { - "cmt_msg": "phonet: refcount leak in pep_sock_accep" + "CVE-2023-52594": { + "cmt_msg": "wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus()" }, - "CVE-2022-0001": { - "cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE" + "CVE-2023-4387": { + "cmt_msg": "net: vmxnet3: fix possible use-after-free bugs in vmxnet3_rq_alloc_rx_buf()" }, - "CVE-2023-2248": { - "cmt_msg": "net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg" + "CVE-2021-4037": { + "cmt_msg": "xfs: fix up non-directory creation in SGID directories" }, - "CVE-2022-0002": { - "cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE" + "CVE-2021-22543": { + "cmt_msg": "KVM: do not allow mapping valid but non-reference-counted pages" }, - "CVE-2020-24587": { - "cmt_msg": "mac80211: prevent mixed key and fragment cache attacks" + "CVE-2022-45884": { + "cmt_msg": "" }, - "CVE-2020-24586": { - "cmt_msg": "mac80211: prevent mixed key and fragment cache attacks" + "CVE-2021-3348": { + "cmt_msg": "nbd: freeze the queue while we're adding connections" }, - "CVE-2022-0995": { - "cmt_msg": "watch_queue: Fix filter limit check" + "CVE-2022-21505": { + "cmt_msg": "lockdown: Fix kexec lockdown bypass with ima policy" }, - "CVE-2022-3105": { - "cmt_msg": "RDMA/uverbs: Check for null return of kmalloc_array" + "CVE-2023-20941": { + "cmt_msg": "" }, - "CVE-2022-3104": { - "cmt_msg": "lkdtm/bugs: Check for the NULL pointer after calling kmalloc" + "CVE-2023-52447": { + "cmt_msg": "bpf: Defer the free of inner map when necessary" }, - "CVE-2021-0129": { - "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical" + "CVE-2023-2194": { + "cmt_msg": "i2c: xgene-slimpro: Fix out-of-bounds bug in xgene_slimpro_i2c_xfer()" }, - "CVE-2020-24588": { - "cmt_msg": "cfg80211: mitigate A-MSDU aggregation attacks" + "CVE-2021-3347": { + "cmt_msg": "futex: Ensure the correct return value from futex_lock_pi()" }, - "CVE-2022-47520": { - "cmt_msg": "wifi: wilc1000: validate pairwise and authentication suite offsets" + "CVE-2021-47169": { + "cmt_msg": "serial: rp2: use 'request_firmware' instead of 'request_firmware_nowait'" }, - "CVE-2022-47521": { - "cmt_msg": "wifi: wilc1000: validate length of IEEE80211_P2P_ATTR_CHANNEL_LIST attribute" + "CVE-2024-26784": { + "cmt_msg": "pmdomain: arm: Fix NULL dereference on scmi_perf_domain removal" }, - "CVE-2023-5717": { - "cmt_msg": "perf: Disallow mis-matched inherited group reads" + "CVE-2023-3777": { + "cmt_msg": "netfilter: nf_tables: skip bound chain on rule flush" }, - "CVE-2021-3444": { - "cmt_msg": "bpf: Fix truncation handling for mod32 dst reg wrt zero" + "CVE-2021-47168": { + "cmt_msg": "NFS: fix an incorrect limit in filelayout_decode_layout()" }, - "CVE-2022-32250": { - "cmt_msg": "netfilter: nf_tables: disallow non-stateful expression in sets earlier" + "CVE-2021-3587": { + "cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect" }, - "CVE-2020-36158": { - "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_cmd_802_11_ad_hoc_start" + "CVE-2021-44733": { + "cmt_msg": "tee: handle lookup of shm with reference count 0" }, - "CVE-2023-3159": { - "cmt_msg": "firewire: fix potential uaf in outbound_phy_packet_callback()" + "CVE-2021-20268": { + "cmt_msg": "bpf: Fix signed_{sub,add32}_overflows type handling" }, - "CVE-2022-0480": { - "cmt_msg": "memcg: enable accounting for file lock caches" + "CVE-2021-47138": { + "cmt_msg": "cxgb4: avoid accessing registers when clearing filters" }, - "CVE-2023-4273": { - "cmt_msg": "exfat: check if filename entries exceeds max filename length" + "CVE-2021-47139": { + "cmt_msg": "net: hns3: put off calling register_netdev() until client initialize complete" + }, + "CVE-2021-47135": { + "cmt_msg": "mt76: mt7921: fix possible AOOB issue in mt7921_mcu_tx_rate_report" }, - "CVE-2022-0487": { - "cmt_msg": "moxart: fix potential use-after-free on remove path" + "CVE-2021-47136": { + "cmt_msg": "net: zero-initialize tc skb extension on allocation" }, - "CVE-2023-52429": { - "cmt_msg": "dm: limit the number of targets and parameter size area" + "CVE-2021-47137": { + "cmt_msg": "net: lantiq: fix memory corruption in RX ring" }, - "CVE-2022-42703": { - "cmt_msg": "mm/rmap: Fix anon_vma->degree ambiguity leading to double-reuse" + "CVE-2021-47130": { + "cmt_msg": "nvmet: fix freeing unallocated p2pmem" }, - "CVE-2024-26595": { - "cmt_msg": "mlxsw: spectrum_acl_tcam: Fix NULL pointer dereference in error path" + "CVE-2021-47131": { + "cmt_msg": "net/tls: Fix use-after-free after the TLS device goes down and up" }, - "CVE-2022-23825": { - "cmt_msg": "" + "CVE-2021-47133": { + "cmt_msg": "HID: amd_sfh: Fix memory leak in amd_sfh_work" }, - "CVE-2021-42252": { - "cmt_msg": "soc: aspeed: lpc-ctrl: Fix boundary check for mmap" + "CVE-2021-46994": { + "cmt_msg": "can: mcp251x: fix resume from sleep before interface was brought up" }, - "CVE-2023-4004": { - "cmt_msg": "netfilter: nft_set_pipapo: fix improper element removal" + "CVE-2021-22600": { + "cmt_msg": "net/packet: rx_owner_map depends on pg_vec" }, - "CVE-2023-0179": { - "cmt_msg": "netfilter: nft_payload: incorrect arithmetics when fetching VLAN header bits" + "CVE-2021-46991": { + "cmt_msg": "i40e: Fix use-after-free in i40e_client_subtask()" }, - "CVE-2022-21125": { - "cmt_msg": "x86/speculation/mmio: Reuse SRBDS mitigation for SBDS" + "CVE-2021-46993": { + "cmt_msg": "sched: Fix out-of-bound access in uclamp" }, - "CVE-2023-28466": { - "cmt_msg": "net: tls: fix possible race condition between do_tls_getsockopt_conf() and do_tls_setsockopt_conf()" + "CVE-2021-46992": { + "cmt_msg": "netfilter: nftables: avoid overflows in nft_hash_buckets()" }, - "CVE-2022-40307": { - "cmt_msg": "efi: capsule-loader: Fix use-after-free in efi_capsule_write" + "CVE-2023-6121": { + "cmt_msg": "nvmet: nul-terminate the NQNs passed in the connect command" }, - "CVE-2022-21123": { - "cmt_msg": "x86/speculation/mmio: Add mitigation for Processor MMIO Stale Data" + "CVE-2023-28327": { + "cmt_msg": "af_unix: Get user_ns from in_skb in unix_diag_get_exact()." }, - "CVE-2021-28688": { - "cmt_msg": "xen-blkback: don't leak persistent grants from xen_blkbk_map()" + "CVE-2021-46999": { + "cmt_msg": "sctp: do asoc update earlier in sctp_sf_do_dupcook_a" }, - "CVE-2021-39686": { - "cmt_msg": "binder: use euid from cred instead of using task" + "CVE-2021-46998": { + "cmt_msg": "ethernet:enic: Fix a use after free bug in enic_hard_start_xmit" }, - "CVE-2021-39685": { - "cmt_msg": "USB: gadget: detect too-big endpoint 0 requests" + "CVE-2017-13693": { + "cmt_msg": "" }, - "CVE-2021-43975": { - "cmt_msg": "atlantic: Fix OOB read and write in hw_atl_utils_fw_rpc_wait" + "CVE-2017-13694": { + "cmt_msg": "" }, - "CVE-2021-43976": { - "cmt_msg": "mwifiex: Fix skb_over_panic in mwifiex_usb_recv()" + "CVE-2022-42721": { + "cmt_msg": "wifi: cfg80211: avoid nontransmitted BSS list corruption" }, - "CVE-2023-0459": { - "cmt_msg": "uaccess: Add speculation barrier to copy_from_user()" + "CVE-2022-42720": { + "cmt_msg": "wifi: cfg80211: fix BSS refcounting bugs" }, - "CVE-2023-0458": { - "cmt_msg": "prlimit: do_prlimit needs to have a speculation check" + "CVE-2022-42722": { + "cmt_msg": "wifi: mac80211: fix crash in beacon protection for P2P-device" }, - "CVE-2022-2078": { - "cmt_msg": "netfilter: nf_tables: sanitize nft_set_desc_concat_parse()" + "CVE-2021-4149": { + "cmt_msg": "btrfs: unlock newly allocated extent buffer after error" }, - "CVE-2023-0597": { - "cmt_msg": "x86/mm: Randomize per-cpu entry area" + "CVE-2021-4148": { + "cmt_msg": "mm: khugepaged: skip huge page collapse for special files" }, - "CVE-2021-3669": { - "cmt_msg": "ipc: replace costly bailout check in sysvipc_find_ipc()" + "CVE-2022-42895": { + "cmt_msg": "Bluetooth: L2CAP: Fix attempting to access uninitialized memory" }, - "CVE-2021-3744": { + "CVE-2021-3640": { + "cmt_msg": "Bluetooth: sco: Fix lock_sock() blockage by memcpy_from_msg()" + }, + "CVE-2021-3764": { "cmt_msg": "crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd()" }, - "CVE-2021-30002": { - "cmt_msg": "media: v4l: ioctl: Fix memory leak in video_usercopy" + "CVE-2021-3760": { + "cmt_msg": "nfc: nci: fix the UAF of rf_conn_info object" }, - "CVE-2021-3743": { - "cmt_msg": "net: qrtr: fix OOB Read in qrtr_endpoint_post" + "CVE-2022-48627": { + "cmt_msg": "vt: fix memory overlapping when deleting chars in the buffer" }, - "CVE-2021-0941": { - "cmt_msg": "bpf: Remove MTU check in __bpf_skb_max_len" + "CVE-2023-52593": { + "cmt_msg": "wifi: wfx: fix possible NULL pointer dereference in wfx_set_mfp_ap()" }, - "CVE-2022-3628": { - "cmt_msg": "wifi: brcmfmac: Fix potential buffer overflow in brcmf_fweh_event_worker()" + "CVE-2022-4382": { + "cmt_msg": "USB: gadgetfs: Fix race between mounting and unmounting" }, - "CVE-2024-26591": { - "cmt_msg": "bpf: Fix re-attachment branch in bpf_tracing_prog_attach" + "CVE-2021-47180": { + "cmt_msg": "NFC: nci: fix memory leak in nci_allocate_device" }, - "CVE-2020-15802": { + "CVE-2022-48628": { + "cmt_msg": "ceph: drop messages from MDS when unmounting" + }, + "CVE-2022-48629": { + "cmt_msg": "crypto: qcom-rng - ensure buffer for generate is completely filled" + }, + "CVE-2022-4379": { + "cmt_msg": "NFSD: fix use-after-free in __nfs42_ssc_open()" + }, + "CVE-2024-24859": { "cmt_msg": "" }, - "CVE-2024-26597": { - "cmt_msg": "net: qualcomm: rmnet: fix global oob in rmnet_policy" + "CVE-2022-0322": { + "cmt_msg": "sctp: account stream padding length for reconf chunk" }, - "CVE-2024-26594": { - "cmt_msg": "ksmbd: validate mech token in session setup" + "CVE-2024-24855": { + "cmt_msg": "scsi: lpfc: Fix a possible data race in lpfc_unregister_fcf_rescan()" }, - "CVE-2023-2483": { - "cmt_msg": "net: qcom/emac: Fix use after free bug in emac_remove due to race condition" + "CVE-2024-24857": { + "cmt_msg": "" }, - "CVE-2022-3636": { - "cmt_msg": "net: ethernet: mtk_eth_soc: use after free in __mtk_ppe_check_skb()" + "CVE-2023-0386": { + "cmt_msg": "ovl: fail on invalid uid/gid mapping at copy up" }, - "CVE-2022-3635": { - "cmt_msg": "atm: idt77252: fix use-after-free bugs caused by tst_timer" + "CVE-2021-29264": { + "cmt_msg": "gianfar: fix jumbo packets+napi+rx overrun crash" }, - "CVE-2022-3633": { - "cmt_msg": "can: j1939: j1939_session_destroy(): fix memory leak of skbs" + "CVE-2021-29265": { + "cmt_msg": "usbip: fix stub_dev usbip_sockfd_store() races leading to gpf" }, - "CVE-2021-34556": { - "cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4" + "CVE-2021-29266": { + "cmt_msg": "vhost-vdpa: fix use-after-free of v->config_ctx" }, - "CVE-2022-34918": { - "cmt_msg": "netfilter: nf_tables: stricter validation of element data" + "CVE-2021-39648": { + "cmt_msg": "usb: gadget: configfs: Fix use-after-free issue with udc_name" }, - "CVE-2022-40982": { - "cmt_msg": "x86/speculation: Add Gather Data Sampling mitigation" + "CVE-2022-3545": { + "cmt_msg": "nfp: fix use-after-free in area_cache_get()" }, - "CVE-2022-2585": { - "cmt_msg": "posix-cpu-timers: Cleanup CPU timers before freeing them during exec" + "CVE-2021-43056": { + "cmt_msg": "KVM: PPC: Book3S HV: Make idle_kvm_start_guest() return 0 if it went to guest" }, - "CVE-2022-3202": { - "cmt_msg": "jfs: prevent NULL deref in diFree" + "CVE-2023-52569": { + "cmt_msg": "btrfs: remove BUG() after failure to insert delayed dir index item" }, - "CVE-2022-2602": { - "cmt_msg": "io_uring/af_unix: defer registered files gc to io_uring release" + "CVE-2023-52568": { + "cmt_msg": "x86/sgx: Resolves SECS reclaim vs. page fault for EAUG race" }, - "CVE-2024-26585": { - "cmt_msg": "tls: fix race between tx work scheduling and socket close" + "CVE-2022-3542": { + "cmt_msg": "bnx2x: fix potential memory leak in bnx2x_tpa_stop()" }, - "CVE-2024-26584": { - "cmt_msg": "net: tls: handle backlogging of crypto requests" + "CVE-2021-47000": { + "cmt_msg": "ceph: fix inode leak on getattr error in __fh_to_dentry" }, - "CVE-2023-2008": { - "cmt_msg": "udmabuf: add back sanity check" + "CVE-2021-47001": { + "cmt_msg": "xprtrdma: Fix cwnd update ordering" }, - "CVE-2024-26587": { - "cmt_msg": "net: netdevsim: don't try to destroy PHC on VFs" + "CVE-2023-52561": { + "cmt_msg": "arm64: dts: qcom: sdm845-db845c: Mark cont splash memory region as reserved" }, - "CVE-2023-2002": { - "cmt_msg": "bluetooth: Perform careful capability checks in hci_sock_ioctl()" + "CVE-2021-47004": { + "cmt_msg": "f2fs: fix to avoid touching checkpointed data in get_victim()" }, - "CVE-2022-1247": { - "cmt_msg": "" + "CVE-2021-47005": { + "cmt_msg": "PCI: endpoint: Fix NULL pointer dereference for ->get_features()" }, - "CVE-2023-28410": { - "cmt_msg": "drm/i915/gem: add missing boundary check in vm_access" + "CVE-2021-21781": { + "cmt_msg": "ARM: ensure the signal page contains defined contents" }, - "CVE-2023-2007": { - "cmt_msg": "scsi: dpt_i2o: Remove obsolete driver" + "CVE-2021-47007": { + "cmt_msg": "f2fs: fix panic during f2fs_resize_fs()" }, - "CVE-2020-26145": { - "cmt_msg": "ath10k: drop fragments with multicast DA for PCIe" + "CVE-2021-46928": { + "cmt_msg": "parisc: Clear stale IIR value on instruction access rights trap" }, - "CVE-2023-51782": { - "cmt_msg": "net/rose: Fix Use-After-Free in rose_ioctl" + "CVE-2021-46929": { + "cmt_msg": "sctp: use call_rcu to free endpoint" }, - "CVE-2020-26147": { - "cmt_msg": "mac80211: assure all fragments are encrypted" + "CVE-2021-46920": { + "cmt_msg": "dmaengine: idxd: Fix clobbering of SWERR overflow bit on writeback" }, - "CVE-2020-26141": { - "cmt_msg": "ath10k: Fix TKIP Michael MIC verification for PCIe" + "CVE-2021-46921": { + "cmt_msg": "locking/qrwlock: Fix ordering in queued_write_lock_slowpath()" }, - "CVE-2020-26140": { - "cmt_msg": "" + "CVE-2023-1380": { + "cmt_msg": "wifi: brcmfmac: slab-out-of-bounds read in brcmf_get_assoc_ies()" }, - "CVE-2021-43389": { - "cmt_msg": "isdn: cpai: check ctr->cnr to avoid array index out of bound" + "CVE-2021-46924": { + "cmt_msg": "NFC: st21nfca: Fix memory leak in device probe and remove" }, - "CVE-2020-26142": { - "cmt_msg": "" + "CVE-2021-46925": { + "cmt_msg": "net/smc: fix kernel panic caused by race of smc_sock" }, - "CVE-2023-1074": { - "cmt_msg": "sctp: fail if no bound addresses can be used for a given scope" + "CVE-2021-46926": { + "cmt_msg": "ALSA: hda: intel-sdw-acpi: harden detection of controller" }, - "CVE-2023-1075": { - "cmt_msg": "net/tls: tls_is_tx_ready() checked list_entry" + "CVE-2020-0347": { + "cmt_msg": "" }, - "CVE-2023-1076": { - "cmt_msg": "tun: tun_chr_open(): correctly initialize socket uid" + "CVE-2024-26788": { + "cmt_msg": "dmaengine: fsl-qdma: init irq after reg initialization" }, - "CVE-2023-1077": { - "cmt_msg": "sched/rt: pick_next_rt_entity(): check list_entry" + "CVE-2023-52591": { + "cmt_msg": "reiserfs: Avoid touching renamed directory if parent does not change" }, - "CVE-2023-46838": { - "cmt_msg": "xen-netback: don't produce zero-size SKB frags" + "CVE-2022-41222": { + "cmt_msg": "mm/mremap: hold the rmap lock in write mode when moving page table entries." }, - "CVE-2022-2959": { - "cmt_msg": "pipe: Fix missing lock in pipe_resize_ring()" + "CVE-2021-40490": { + "cmt_msg": "ext4: fix race writing to an inline_data file while its xattrs are changing" }, - "CVE-2023-40283": { - "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb" + "CVE-2021-33909": { + "cmt_msg": "seq_file: disallow extremely large seq buffer allocations" }, - "CVE-2023-1073": { - "cmt_msg": "HID: check empty report_list in hid_validate_values()" + "CVE-2019-12456": { + "cmt_msg": "" }, - "CVE-2023-51781": { - "cmt_msg": "appletalk: Fix Use-After-Free in atalk_ioctl" + "CVE-2023-20569": { + "cmt_msg": "x86/bugs: Increase the x86 bugs vector size to two u32s" }, - "CVE-2020-29661": { - "cmt_msg": "tty: Fix ->pgrp locking in tiocspgrp()" + "CVE-2021-29646": { + "cmt_msg": "tipc: better validate user input in tipc_nl_retrieve_key()" }, - "CVE-2020-29660": { - "cmt_msg": "tty: Fix ->session locking" + "CVE-2021-29647": { + "cmt_msg": "net: qrtr: fix a kernel-infoleak in qrtr_recvmsg()" }, - "CVE-2022-1734": { - "cmt_msg": "nfc: nfcmrvl: main: reorder destructive operations in nfcmrvl_nci_unregister_dev to avoid bugs" + "CVE-2021-33656": { + "cmt_msg": "vt: drop old FONT ioctls" }, - "CVE-2022-3625": { - "cmt_msg": "devlink: Fix use-after-free after a failed reload" + "CVE-2024-26720": { + "cmt_msg": "mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again" }, - "CVE-2023-28772": { - "cmt_msg": "seq_buf: Fix overflow in seq_buf_putmem_hex()" + "CVE-2021-33655": { + "cmt_msg": "fbcon: Disallow setting font bigger than screen size" }, - "CVE-2022-2588": { - "cmt_msg": "net_sched: cls_route: remove from list when handle is 0" + "CVE-2022-41858": { + "cmt_msg": "drivers: net: slip: fix NPD bug in sl_tx_timeout()" }, - "CVE-2022-3707": { - "cmt_msg": "drm/i915/gvt: fix double free bug in split_2MB_gtt_entry" + "CVE-2024-26726": { + "cmt_msg": "btrfs: don't drop extent_map for free space inode on write error" }, - "CVE-2022-2503": { - "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag" + "CVE-2022-3176": { + "cmt_msg": "io_uring: fix UAF due to missing POLLFREE handling" }, - "CVE-2021-32399": { - "cmt_msg": "bluetooth: eliminate the potential race condition when removing the HCI controller" + "CVE-2023-2163": { + "cmt_msg": "bpf: Fix incorrect verifier pruning due to missing register precision taints" }, - "CVE-2021-27364": { - "cmt_msg": "scsi: iscsi: Restrict sessions and handles to admin capabilities" + "CVE-2023-1206": { + "cmt_msg": "tcp: Reduce chance of collisions in inet6_hashfn()." }, - "CVE-2022-23038": { - "cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()" + "CVE-2022-41850": { + "cmt_msg": "HID: roccat: Fix use-after-free in roccat_read()" }, - "CVE-2022-23039": { - "cmt_msg": "xen/gntalloc: don't use gnttab_query_foreign_access()" + "CVE-2023-2985": { + "cmt_msg": "fs: hfsplus: fix UAF issue in hfsplus_put_super" }, - "CVE-2022-20154": { - "cmt_msg": "sctp: use call_rcu to free endpoint" + "CVE-2023-1637": { + "cmt_msg": "x86/speculation: Restore speculation related MSRs during S3 resume" }, - "CVE-2021-45868": { - "cmt_msg": "quota: check block number when reading the block in quota file" + "CVE-2022-2938": { + "cmt_msg": "psi: Fix uaf issue when psi trigger is destroyed while being polled" }, - "CVE-2022-20158": { - "cmt_msg": "net/packet: fix slab-out-of-bounds access in packet_recvmsg()" + "CVE-2022-3646": { + "cmt_msg": "nilfs2: fix leak of nilfs_root in case of writer thread creation failure" }, - "CVE-2022-23037": { - "cmt_msg": "xen/netfront: don't use gnttab_query_foreign_access() for mapped status" + "CVE-2021-45469": { + "cmt_msg": "f2fs: fix to do sanity check on last xattr entry in __f2fs_setxattr()" }, - "CVE-2024-0564": { + "CVE-2022-1184": { + "cmt_msg": "ext4: verify dir block before splitting it" + }, + "CVE-2022-3642": { "cmt_msg": "" }, - "CVE-2024-0565": { - "cmt_msg": "smb: client: fix OOB in receive_encrypted_standard()" + "CVE-2022-3643": { + "cmt_msg": "xen/netback: Ensure protocol headers don't fall in the non-linear area" }, - "CVE-2023-2176": { - "cmt_msg": "RDMA/core: Refactor rdma_bind_addr" + "CVE-2024-0584": { + "cmt_msg": "ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet" }, - "CVE-2023-2177": { - "cmt_msg": "sctp: leave the err path free in sctp_stream_init to sctp_stream_free" + "CVE-2024-26700": { + "cmt_msg": "drm/amd/display: Fix MST Null Ptr for RV" }, - "CVE-2021-38160": { - "cmt_msg": "virtio_console: Assure used length from device is limited" + "CVE-2023-52638": { + "cmt_msg": "can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock" }, - "CVE-2023-1252": { - "cmt_msg": "ovl: fix use after free in struct ovl_aio_req" + "CVE-2023-52519": { + "cmt_msg": "HID: intel-ish-hid: ipc: Disable and reenable ACPI GPE bit" }, - "CVE-2021-42008": { - "cmt_msg": "net: 6pack: fix slab-out-of-bounds in decode_data" + "CVE-2023-52516": { + "cmt_msg": "dma-debug: don't call __dma_entry_alloc_check_leak() under free_entries_lock" }, - "CVE-2022-3107": { - "cmt_msg": "hv_netvsc: Add check for kvmalloc_array" + "CVE-2023-52517": { + "cmt_msg": "spi: sun6i: fix race between DMA RX transfer completion and RX FIFO drain" }, - "CVE-2022-39189": { - "cmt_msg": "KVM: x86: do not report a vCPU as preempted outside instruction boundaries" + "CVE-2023-52515": { + "cmt_msg": "RDMA/srp: Do not call scsi_done() from srp_abort()" }, - "CVE-2021-38166": { - "cmt_msg": "bpf: Fix integer overflow involving bucket_size" + "CVE-2019-15902": { + "cmt_msg": "unknown" }, - "CVE-2021-3490": { - "cmt_msg": "bpf: Fix alu32 const subreg bound tracking on bitwise operations" + "CVE-2023-52510": { + "cmt_msg": "ieee802154: ca8210: Fix a potential UAF in ca8210_probe" }, - "CVE-2021-3491": { - "cmt_msg": "io_uring: truncate lengths larger than MAX_RW_COUNT on provide buffers" + "CVE-2023-3358": { + "cmt_msg": "HID: intel_ish-hid: Add check for ishtp_dma_tx_map" }, - "CVE-2005-3660": { + "CVE-2023-52633": { + "cmt_msg": "um: time-travel: fix time corruption" + }, + "CVE-2024-0340": { + "cmt_msg": "vhost: use kzalloc() instead of kmalloc() followed by memset()" + }, + "CVE-2023-6535": { "cmt_msg": "" }, - "CVE-2022-0516": { - "cmt_msg": "KVM: s390: Return error on SIDA memop on normal guest" + "CVE-2023-6536": { + "cmt_msg": "nvmet-tcp: fix a crash in nvmet_req_complete()" }, - "CVE-2023-31085": { - "cmt_msg": "ubi: Refuse attaching if mtd's erasesize is 0" + "CVE-2021-33624": { + "cmt_msg": "bpf: Inherit expanded/patched seen count from old aux data" }, - "CVE-2023-31084": { - "cmt_msg": "media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*()" + "CVE-2021-27365": { + "cmt_msg": "scsi: iscsi: Ensure sysfs attributes are limited to PAGE_SIZE" }, - "CVE-2023-31083": { - "cmt_msg": "Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO" + "CVE-2021-27364": { + "cmt_msg": "scsi: iscsi: Restrict sessions and handles to admin capabilities" }, - "CVE-2023-31082": { - "cmt_msg": "" + "CVE-2021-27363": { + "cmt_msg": "scsi: iscsi: Restrict sessions and handles to admin capabilities" }, - "CVE-2023-31081": { + "CVE-2022-23036": { + "cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()" + }, + "CVE-2018-17977": { "cmt_msg": "" }, - "CVE-2021-33034": { - "cmt_msg": "Bluetooth: verify AMP hci_chan before amp_destroy" + "CVE-2024-1151": { + "cmt_msg": "net: openvswitch: limit the number of recursions from action sets" }, - "CVE-2021-33033": { - "cmt_msg": "cipso,calipso: resolve a number of problems with the DOI refcounts" + "CVE-2024-26659": { + "cmt_msg": "xhci: handle isoc Babble and Buffer Overrun events properly" }, - "CVE-2024-26588": { - "cmt_msg": "LoongArch: BPF: Prevent out-of-bounds memory access" + "CVE-2024-26658": { + "cmt_msg": "bcachefs: grab s_umount only if snapshotting" }, - "CVE-2024-23307": { + "CVE-2010-5321": { "cmt_msg": "" }, - "CVE-2022-32296": { - "cmt_msg": "tcp: increase source port perturb table to 2^16" + "CVE-2021-20322": { + "cmt_msg": "ipv6: make exception cache less predictible" }, - "CVE-2020-28974": { - "cmt_msg": "vt: Disable KD_FONT_OP_COPY" + "CVE-2024-26654": { + "cmt_msg": "ALSA: sh: aica: reorder cleanup operations to avoid UAF bugs" }, - "CVE-2023-3567": { - "cmt_msg": "vc_screen: move load of struct vc_data pointer in vcs_read() to avoid UAF" + "CVE-2021-20320": { + "cmt_msg": "s390/bpf: Fix optimizing out zero-extensions" }, - "CVE-2022-3028": { - "cmt_msg": "af_key: Do not call xfrm_probe_algs in parallel" + "CVE-2021-20321": { + "cmt_msg": "ovl: fix missing negative dentry check in ovl_rename()" }, - "CVE-2020-14304": { - "cmt_msg": "" + "CVE-2024-26651": { + "cmt_msg": "sr9800: Add check for usbnet_get_endpoints" }, - "CVE-2022-2318": { - "cmt_msg": "net: rose: fix UAF bugs caused by timer handler" + "CVE-2024-26650": { + "cmt_msg": "platform/x86: p2sb: Allow p2sb_bar() calls during PCI device probe" }, - "CVE-2022-33981": { - "cmt_msg": "floppy: disable FDRAWCMD by default" + "CVE-2023-4147": { + "cmt_msg": "netfilter: nf_tables: disallow rule addition to bound chain via NFTA_RULE_CHAIN_ID" }, - "CVE-2021-3564": { - "cmt_msg": "Bluetooth: fix the erroneous flush_work() order" + "CVE-2022-42896": { + "cmt_msg": "Bluetooth: L2CAP: Fix accepting connection request for invalid SPSM" }, - "CVE-2023-3611": { - "cmt_msg": "net/sched: sch_qfq: account for stab overhead in qfq_enqueue" + "CVE-2023-52632": { + "cmt_msg": "drm/amdkfd: Fix lock dependency warning with srcu" }, - "CVE-2023-4132": { - "cmt_msg": "media: usb: siano: Fix warning due to null work_func_t function pointer" + "CVE-2023-3812": { + "cmt_msg": "net: tun: fix bugs for oversize packet when napi frags enabled" }, - "CVE-2023-4133": { - "cmt_msg": "cxgb4: fix use after free bugs caused by circular dependency problem" + "CVE-2023-7192": { + "cmt_msg": "netfilter: ctnetlink: fix possible refcount leak in ctnetlink_create_conntrack()" }, - "CVE-2020-26560": { - "cmt_msg": "" + "CVE-2022-3169": { + "cmt_msg": "nvme: ensure subsystem reset is single threaded" }, - "CVE-2023-4134": { - "cmt_msg": "Input: cyttsp4_core - change del_timer_sync() to timer_shutdown_sync()" + "CVE-2022-4744": { + "cmt_msg": "tun: avoid double free in tun_free_netdev" }, - "CVE-2023-39198": { - "cmt_msg": "drm/qxl: fix UAF on handle creation" + "CVE-2022-36280": { + "cmt_msg": "drm/vmwgfx: Validate the box size for the snooped cursor" }, - "CVE-2023-37454": { - "cmt_msg": "" + "CVE-2022-1048": { + "cmt_msg": "ALSA: pcm: Fix races among concurrent hw_params and hw_free calls" }, - "CVE-2022-20572": { - "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag" + "CVE-2024-26803": { + "cmt_msg": "net: veth: clear GRO when clearing XDP even when down" }, - "CVE-2023-39194": { - "cmt_msg": "net: xfrm: Fix xfrm_address_filter OOB read" + "CVE-2023-52475": { + "cmt_msg": "Input: powermate - fix use-after-free in powermate_config_complete" }, - "CVE-2021-28964": { - "cmt_msg": "btrfs: fix race when cloning extent buffer during rewind of an old root" + "CVE-2023-52474": { + "cmt_msg": "IB/hfi1: Fix bugs with non-PAGE_SIZE-end multi-iovec user SDMA requests" }, - "CVE-2023-1829": { - "cmt_msg": "net/sched: Retire tcindex classifier" + "CVE-2023-52477": { + "cmt_msg": "usb: hub: Guard against accesses to uninitialized BOS descriptors" }, - "CVE-2021-4083": { - "cmt_msg": "fget: check that the fd still exists after getting a ref to it" + "CVE-2023-52476": { + "cmt_msg": "perf/x86/lbr: Filter vsyscall addresses" }, - "CVE-2023-33288": { - "cmt_msg": "power: supply: bq24190: Fix use after free bug in bq24190_remove due to race condition" + "CVE-2023-22995": { + "cmt_msg": "usb: dwc3: dwc3-qcom: Add missing platform_device_put() in dwc3_qcom_acpi_register_core" }, - "CVE-2022-29900": { - "cmt_msg": "x86/kvm/vmx: Make noinstr clean" + "CVE-2023-52340": { + "cmt_msg": "ipv6: remove max_size check inline with ipv4" }, - "CVE-2022-29901": { - "cmt_msg": "x86/kvm/vmx: Make noinstr clean" + "CVE-2024-21803": { + "cmt_msg": "" }, - "CVE-2023-3161": { - "cmt_msg": "fbcon: Check font dimension limits" + "CVE-2023-22998": { + "cmt_msg": "drm/virtio: Fix NULL vs IS_ERR checking in virtio_gpu_object_shmem_init" }, - "CVE-2023-39192": { - "cmt_msg": "netfilter: xt_u32: validate user space input" + "CVE-2023-4563": { + "cmt_msg": "netfilter: nf_tables: don't skip expired elements during walk" }, - "CVE-2023-25012": { - "cmt_msg": "HID: bigben: use spinlock to safely schedule workers" + "CVE-2023-52479": { + "cmt_msg": "ksmbd: fix uaf in smb20_oplock_break_ack" }, - "CVE-2023-35829": { - "cmt_msg": "media: rkvdec: fix use after free bug in rkvdec_remove" + "CVE-2023-52478": { + "cmt_msg": "HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect" }, - "CVE-2023-35828": { - "cmt_msg": "usb: gadget: udc: renesas_usb3: Fix use after free bug in renesas_usb3_remove due to race condition" + "CVE-2021-3542": { + "cmt_msg": "" }, - "CVE-2022-29582": { - "cmt_msg": "io_uring: fix race between timeout flush and removal" + "CVE-2022-20166": { + "cmt_msg": "drivers core: Use sysfs_emit and sysfs_emit_at for show(device *...) functions" }, - "CVE-2022-1116": { - "cmt_msg": "" + "CVE-2024-24860": { + "cmt_msg": "Bluetooth: Fix atomicity violation in {min,max}_key_size_set" }, - "CVE-2021-28660": { - "cmt_msg": "staging: rtl8188eu: prevent ->ssid overflow in rtw_wx_set_scan()" + "CVE-2023-3220": { + "cmt_msg": "drm/msm/dpu: Add check for pstates" }, - "CVE-2023-35823": { - "cmt_msg": "media: saa7134: fix use after free bug in saa7134_finidev due to race condition" + "CVE-2024-22099": { + "cmt_msg": "Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security" }, - "CVE-2022-23816": { - "cmt_msg": "x86/kvm/vmx: Make noinstr clean" + "CVE-2023-30456": { + "cmt_msg": "KVM: nVMX: add missing consistency checks for CR0 and CR4" }, - "CVE-2023-35824": { - "cmt_msg": "media: dm1105: Fix use after free bug in dm1105_remove due to race condition" + "CVE-2022-48626": { + "cmt_msg": "moxart: fix potential use-after-free on remove path" }, - "CVE-2023-35827": { - "cmt_msg": "ravb: Fix use-after-free issue in ravb_tx_timeout_work()" + "CVE-2022-23041": { + "cmt_msg": "xen/9p: use alloc/free_pages_exact()" }, - "CVE-2021-20239": { - "cmt_msg": "net: pass a sockptr_t into ->setsockopt" + "CVE-2022-23040": { + "cmt_msg": "xen/xenbus: don't let xenbus_grant_ring() remove grants in error case" }, - "CVE-2022-3567": { - "cmt_msg": "ipv6: Fix data races around sk->sk_prot." + "CVE-2022-23042": { + "cmt_msg": "xen/netfront: react properly to failing gnttab_end_foreign_access_ref()" }, - "CVE-2022-3566": { - "cmt_msg": "tcp: Fix data races around icsk->icsk_af_ops." + "CVE-2018-12929": { + "cmt_msg": "" }, - "CVE-2022-3565": { - "cmt_msg": "mISDN: fix use-after-free bugs in l1oip timer handlers" + "CVE-2018-12928": { + "cmt_msg": "" }, - "CVE-2022-3564": { - "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free caused by l2cap_reassemble_sdu" + "CVE-2023-3161": { + "cmt_msg": "fbcon: Check font dimension limits" }, - "CVE-2022-4269": { - "cmt_msg": "act_mirred: use the backlog for nested calls to mirred ingress" + "CVE-2022-0185": { + "cmt_msg": "vfs: fs_context: fix up param length parsing in legacy_parse_param" }, - "CVE-2020-36385": { - "cmt_msg": "RDMA/ucma: Rework ucma_migrate_id() to avoid races with destroy" + "CVE-2024-26592": { + "cmt_msg": "ksmbd: fix UAF issue in ksmbd_tcp_new_connection()" }, - "CVE-2023-52340": { - "cmt_msg": "ipv6: remove max_size check inline with ipv4" + "CVE-2022-45887": { + "cmt_msg": "media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb()" }, - "CVE-2023-6560": { - "cmt_msg": "io_uring: don't allow discontig pages for IORING_SETUP_NO_MMAP" + "CVE-2020-10708": { + "cmt_msg": "" }, - "CVE-2021-3573": { - "cmt_msg": "Bluetooth: use correct lock to prevent UAF of hdev object" + "CVE-2022-0400": { + "cmt_msg": "" }, - "CVE-2022-29581": { - "cmt_msg": "net/sched: cls_u32: fix netns refcount changes in u32_change()" + "CVE-2024-25741": { + "cmt_msg": "" }, - "CVE-2022-1204": { - "cmt_msg": "ax25: Fix refcount leaks caused by ax25_cb_del()" + "CVE-2021-0707": { + "cmt_msg": "dmabuf: fix use-after-free of dmabuf's file->f_inode" }, - "CVE-2023-1611": { - "cmt_msg": "btrfs: fix race between quota disable and quota assign ioctls" + "CVE-2024-26809": { + "cmt_msg": "netfilter: nft_set_pipapo: release elements in clone only from destroy path" }, - "CVE-2021-34693": { - "cmt_msg": "can: bcm: fix infoleak in struct bcm_msg_head" + "CVE-2022-26966": { + "cmt_msg": "sr9700: sanity check for packet length" }, - "CVE-2022-26490": { - "cmt_msg": "nfc: st21nfca: Fix potential buffer overflows in EVT_TRANSACTION" + "CVE-2021-42739": { + "cmt_msg": "media: firewire: firedtv-avc: fix a buffer overflow in avc_ca_pmt()" }, - "CVE-2023-6817": { - "cmt_msg": "netfilter: nft_set_pipapo: skip inactive elements during set walk" + "CVE-2023-1989": { + "cmt_msg": "Bluetooth: btsdio: fix use after free bug in btsdio_remove due to unfinished work" }, - "CVE-2022-1836": { - "cmt_msg": "floppy: disable FDRAWCMD by default" + "CVE-2024-26806": { + "cmt_msg": "spi: cadence-qspi: remove system-wide suspend helper calls from runtime PM hooks" }, - "CVE-2021-32078": { - "cmt_msg": "ARM: footbridge: remove personal server platform" + "CVE-2021-37159": { + "cmt_msg": "usb: hso: fix error handling code of hso_create_net_device" }, - "CVE-2022-30594": { - "cmt_msg": "ptrace: Check PTRACE_O_SUSPEND_SECCOMP permission on PTRACE_SEIZE" + "CVE-2023-4732": { + "cmt_msg": "mm/userfaultfd: fix uffd-wp special cases for fork()" }, - "CVE-2022-4662": { - "cmt_msg": "USB: core: Prevent nested device-reset calls" + "CVE-2024-26802": { + "cmt_msg": "stmmac: Clear variable when destroying workqueue" }, - "CVE-2021-38204": { - "cmt_msg": "usb: max-3421: Prevent corruption of freed memory" + "CVE-2023-52508": { + "cmt_msg": "nvme-fc: Prevent null pointer dereference in nvme_fc_io_getuuid()" }, - "CVE-2021-38205": { - "cmt_msg": "net: xilinx_emaclite: Do not print real IOMEM pointer" + "CVE-2023-52606": { + "cmt_msg": "powerpc/lib: Validate size for vector operations" }, - "CVE-2021-38207": { - "cmt_msg": "net: ll_temac: Fix TX BD buffer overwrite" + "CVE-2023-52607": { + "cmt_msg": "powerpc/mm: Fix null-pointer dereference in pgtable_cache_add" }, - "CVE-2020-27830": { - "cmt_msg": "speakup: Reject setting the speakup line discipline outside of speakup" + "CVE-2023-52604": { + "cmt_msg": "FS:JFS:UBSAN:array-index-out-of-bounds in dbAdjTree" }, - "CVE-2023-39189": { - "cmt_msg": "netfilter: nfnetlink_osf: avoid OOB read" + "CVE-2023-52531": { + "cmt_msg": "wifi: iwlwifi: mvm: Fix a memory corruption issue" }, - "CVE-2023-35001": { - "cmt_msg": "netfilter: nf_tables: prevent OOB access in nft_byteorder_eval" + "CVE-2023-52602": { + "cmt_msg": "jfs: fix slab-out-of-bounds Read in dtSearch" }, - "CVE-2022-27666": { - "cmt_msg": "esp: Fix possible buffer overflow in ESP transformation" + "CVE-2023-52603": { + "cmt_msg": "UBSAN: array-index-out-of-bounds in dtSplitRoot" }, - "CVE-2021-38208": { - "cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect" + "CVE-2022-25265": { + "cmt_msg": "" }, - "CVE-2021-38209": { - "cmt_msg": "netfilter: conntrack: Make global sysctls readonly in non-init netns" + "CVE-2022-20368": { + "cmt_msg": "net/packet: fix slab-out-of-bounds access in packet_recvmsg()" }, - "CVE-2022-0168": { - "cmt_msg": "cifs: fix NULL ptr dereference in smb2_ioctl_query_info()" + "CVE-2023-52600": { + "cmt_msg": "jfs: fix uaf in jfs_evict_inode" }, - "CVE-2020-26556": { - "cmt_msg": "" + "CVE-2023-52513": { + "cmt_msg": "RDMA/siw: Fix connection failure handling" }, - "CVE-2020-26557": { - "cmt_msg": "" + "CVE-2023-52608": { + "cmt_msg": "firmware: arm_scmi: Check mailbox/SMT channel for consistency" }, - "CVE-2020-26555": { - "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical" + "CVE-2023-52609": { + "cmt_msg": "binder: fix race between mmput() and do_exit()" }, - "CVE-2019-20794": { - "cmt_msg": "" + "CVE-2022-21499": { + "cmt_msg": "lockdown: also lock down previous kgdb use" }, - "CVE-2020-26559": { + "CVE-2024-23196": { + "cmt_msg": "ALSA: hda: fix a possible null-pointer dereference due to data race in snd_hdac_regmap_sync()" + }, + "CVE-2023-4208": { + "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free" + }, + "CVE-2022-47519": { + "cmt_msg": "wifi: wilc1000: validate length of IEEE80211_P2P_ATTR_OPER_CHANNEL attribute" + }, + "CVE-2022-3606": { "cmt_msg": "" }, - "CVE-2023-3397": { + "CVE-2023-4206": { + "cmt_msg": "net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free" + }, + "CVE-2022-39188": { + "cmt_msg": "mmu_gather: Force tlb-flush VM_PFNMAP vmas" + }, + "CVE-2023-3640": { "cmt_msg": "" }, - "CVE-2022-26365": { - "cmt_msg": "xen/blkfront: fix leaking data in shared pages" + "CVE-2023-20593": { + "cmt_msg": "x86/cpu/amd: Add a Zenbleed fix" }, - "CVE-2023-52458": { - "cmt_msg": "block: add check that partition length needs to be aligned with block size" + "CVE-2023-0160": { + "cmt_msg": "bpf, sockmap: fix deadlocks in the sockhash and sockmap" }, - "CVE-2023-52457": { - "cmt_msg": "serial: 8250: omap: Don't skip resource freeing if pm_runtime_resume_and_get() failed" + "CVE-2023-52506": { + "cmt_msg": "LoongArch: Set all reserved memblocks on Node#0 at initialization" }, - "CVE-2018-1121": { - "cmt_msg": "" + "CVE-2022-2663": { + "cmt_msg": "netfilter: nf_conntrack_irc: Fix forged IP logic" }, - "CVE-2023-52454": { - "cmt_msg": "nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length" + "CVE-2021-47049": { + "cmt_msg": "Drivers: hv: vmbus: Use after free in __vmbus_open()" }, - "CVE-2023-52451": { - "cmt_msg": "powerpc/pseries/memhp: Fix access beyond end of drmem array" + "CVE-2024-26782": { + "cmt_msg": "mptcp: fix double-free on socket dismantle" }, - "CVE-2022-3061": { - "cmt_msg": "video: fbdev: i740fb: Error out if 'pixclock' equals zero" + "CVE-2022-43750": { + "cmt_msg": "usb: mon: make mmapped memory read only" }, - "CVE-2024-1086": { - "cmt_msg": "netfilter: nf_tables: reject QUEUE/DROP verdict parameters" + "CVE-2023-4015": { + "cmt_msg": "netfilter: nf_tables: skip immediate deactivate in _PREPARE_ERROR" }, - "CVE-2024-22386": { - "cmt_msg": "" + "CVE-2023-0047": { + "cmt_msg": "mm, oom: do not trigger out_of_memory from the #PF" }, - "CVE-2019-15794": { - "cmt_msg": "ovl: fix reference counting in ovl_mmap error path" + "CVE-2021-47046": { + "cmt_msg": "drm/amd/display: Fix off by one in hdmi_14_process_transaction()" }, - "CVE-2022-3344": { - "cmt_msg": "KVM: x86: nSVM: harden svm_free_nested against freeing vmcb02 while still in use" + "CVE-2023-0045": { + "cmt_msg": "x86/bugs: Flush IBP in ib_prctl_set()" }, - "CVE-2023-23004": { - "cmt_msg": "malidp: Fix NULL vs IS_ERR() checking" + "CVE-2021-47040": { + "cmt_msg": "io_uring: fix overflows checks in provide buffers" }, - "CVE-2023-23006": { - "cmt_msg": "net/mlx5: DR, Fix NULL vs IS_ERR checking in dr_domain_init_resources" + "CVE-2021-47041": { + "cmt_msg": "nvmet-tcp: fix incorrect locking in state_change sk callback" }, - "CVE-2022-0644": { - "cmt_msg": "vfs: check fd has read access in kernel_read_file_from_fd()" + "CVE-2020-36787": { + "cmt_msg": "media: aspeed: fix clock handling logic" }, - "CVE-2023-23000": { - "cmt_msg": "phy: tegra: xusb: Fix return value of tegra_xusb_find_port_node function" + "CVE-2021-47167": { + "cmt_msg": "NFS: Fix an Oopsable condition in __nfs_pageio_add_request()" }, - "CVE-2023-1670": { - "cmt_msg": "xirc2ps_cs: Fix use after free bug in xirc2ps_detach" + "CVE-2021-47166": { + "cmt_msg": "NFS: Don't corrupt the value of pg_bytes_written in nfs_do_recoalesce()" }, - "CVE-2023-23002": { - "cmt_msg": "Bluetooth: hci_qca: Fix NULL vs IS_ERR_OR_NULL check in qca_serdev_probe" + "CVE-2021-47165": { + "cmt_msg": "drm/meson: fix shutdown crash when component not probed" }, - "CVE-2023-6240": { - "cmt_msg": "" + "CVE-2021-47164": { + "cmt_msg": "net/mlx5e: Fix null deref accessing lag dev" }, - "CVE-2023-23559": { - "cmt_msg": "wifi: rndis_wlan: Prevent buffer overflow in rndis_query_oid" + "CVE-2021-47163": { + "cmt_msg": "tipc: wait and exit until all work queues are done" }, - "CVE-2022-39842": { - "cmt_msg": "video: fbdev: pxa3xx-gcu: Fix integer overflow in pxa3xx_gcu_write" + "CVE-2021-46969": { + "cmt_msg": "bus: mhi: core: Fix invalid error returning in mhi_queue" }, - "CVE-2022-0382": { - "cmt_msg": "net ticp:fix a kernel-infoleak in __tipc_sendmsg()" + "CVE-2021-47161": { + "cmt_msg": "spi: spi-fsl-dspi: Fix a resource leak in an error handling path" }, - "CVE-2023-32233": { - "cmt_msg": "netfilter: nf_tables: deactivate anonymous set from preparation phase" + "CVE-2021-47160": { + "cmt_msg": "net: dsa: mt7530: fix VLAN traffic leaks" }, - "CVE-2020-25672": { - "cmt_msg": "nfc: fix memory leak in llcp_sock_connect()" + "CVE-2023-4385": { + "cmt_msg": "fs: jfs: fix possible NULL pointer dereference in dbFree()" }, - "CVE-2020-25673": { - "cmt_msg": "nfc: Avoid endless loops caused by repeated llcp_sock_connect()" + "CVE-2021-46965": { + "cmt_msg": "mtd: physmap: physmap-bt1-rom: Fix unintentional stack access" }, - "CVE-2020-25670": { - "cmt_msg": "nfc: fix refcount leak in llcp_sock_bind()" + "CVE-2021-46966": { + "cmt_msg": "ACPI: custom_method: fix potential use-after-free issue" }, - "CVE-2020-25671": { - "cmt_msg": "nfc: fix refcount leak in llcp_sock_connect()" + "CVE-2021-46967": { + "cmt_msg": "vhost-vdpa: fix vm_flags for virtqueue doorbell mapping" }, - "CVE-2022-20369": { - "cmt_msg": "media: v4l2-mem2mem: Apply DST_QUEUE_OFF_BASE on MMAP buffers across ioctls" + "CVE-2021-46960": { + "cmt_msg": "cifs: Return correct error code from smb2_get_enc_key" }, - "CVE-2022-0998": { - "cmt_msg": "vdpa: clean up get_config_size ret value handling" + "CVE-2021-46961": { + "cmt_msg": "irqchip/gic-v3: Do not enable irqs when handling spurious interrups" }, - "CVE-2023-51042": { - "cmt_msg": "drm/amdgpu: Fix potential fence use-after-free v2" + "CVE-2021-46962": { + "cmt_msg": "mmc: uniphier-sd: Fix a resource leak in the remove function" }, - "CVE-2019-19814": { + "CVE-2021-46963": { + "cmt_msg": "scsi: qla2xxx: Fix crash in qla2xxx_mqueuecommand()" + }, + "CVE-2019-19378": { "cmt_msg": "" }, - "CVE-2023-1118": { - "cmt_msg": "media: rc: Fix use-after-free bugs caused by ene_tx_irqsim()" + "CVE-2023-52482": { + "cmt_msg": "x86/srso: Add SRSO mitigation for Hygon processors" + }, + "CVE-2023-52599": { + "cmt_msg": "jfs: fix array-index-out-of-bounds in diNewExt" }, "CVE-2022-1016": { "cmt_msg": "netfilter: nf_tables: initialize registers in nft_do_chain()" }, - "CVE-2022-1011": { - "cmt_msg": "fuse: fix pipe buffer lifetime for direct_io" + "CVE-2023-51781": { + "cmt_msg": "appletalk: Fix Use-After-Free in atalk_ioctl" }, - "CVE-2022-1012": { - "cmt_msg": "secure_seq: use the 64 bits of the siphash for port offset calculation" + "CVE-2022-36879": { + "cmt_msg": "xfrm: xfrm_policy: fix a possible double xfrm_pols_put() in xfrm_bundle_lookup()" }, - "CVE-2021-26934": { - "cmt_msg": "" + "CVE-2023-52565": { + "cmt_msg": "media: uvcvideo: Fix OOB read" }, - "CVE-2022-3115": { - "cmt_msg": "drm: mali-dp: potential dereference of null pointer" + "CVE-2021-28691": { + "cmt_msg": "xen-netback: take a reference to the RX task thread" }, - "CVE-2021-26931": { - "cmt_msg": "xen-blkback: don't \"handle\" error by BUG()" + "CVE-2021-39698": { + "cmt_msg": "wait: add wake_up_pollfree()" }, - "CVE-2021-26930": { - "cmt_msg": "xen-blkback: fix error handling in xen_blkbk_map()" + "CVE-2022-45934": { + "cmt_msg": "Bluetooth: L2CAP: Fix u8 overflow" }, - "CVE-2021-26932": { - "cmt_msg": "Xen/x86: don't bail early from clear_foreign_p2m_mapping()" + "CVE-2022-41674": { + "cmt_msg": "wifi: cfg80211: fix u8 overflow in cfg80211_update_notlisted_nontrans()" }, - "CVE-2023-3141": { - "cmt_msg": "memstick: r592: Fix UAF bug in r592_remove due to race condition" + "CVE-2022-2380": { + "cmt_msg": "video: fbdev: sm712fb: Fix crash in smtcfb_read()" }, - "CVE-2022-0492": { - "cmt_msg": "cgroup-v1: Require capabilities to set release_agent" + "CVE-2022-0850": { + "cmt_msg": "ext4: fix kernel infoleak via ext4_extent_header" }, - "CVE-2023-34256": { - "cmt_msg": "ext4: avoid a potential slab-out-of-bounds in ext4_group_desc_csum" + "CVE-2021-3759": { + "cmt_msg": "memcg: enable accounting of ipc resources" }, - "CVE-2022-25636": { - "cmt_msg": "netfilter: nf_tables_offload: incorrect flow offload action array size" + "CVE-2021-4197": { + "cmt_msg": "cgroup: Use open-time credentials for process migraton perm checks" }, - "CVE-2022-0494": { - "cmt_msg": "block-map: add __GFP_ZERO flag for alloc_page in function bio_copy_kern" + "CVE-2021-3612": { + "cmt_msg": "Input: joydev - prevent potential read overflow in ioctl" }, - "CVE-2022-3524": { - "cmt_msg": "tcp/udp: Fix memory leak in ipv6_renew_options()." + "CVE-2020-24503": { + "cmt_msg": "" }, - "CVE-2022-3523": { - "cmt_msg": "mm/memory.c: fix race when faulting a device private page" + "CVE-2020-24502": { + "cmt_msg": "" }, - "CVE-2022-3522": { - "cmt_msg": "mm/hugetlb: use hugetlb_pte_stable in migration race check" + "CVE-2019-19449": { + "cmt_msg": "f2fs: fix to do sanity check on segment/section count" }, - "CVE-2008-2544": { + "CVE-2021-3753": { + "cmt_msg": "vt_kdsetmode: extend console locking" + }, + "CVE-2020-24504": { + "cmt_msg": "ice: create scheduler aggregator node config and move VSIs" + }, + "CVE-2020-11725": { "cmt_msg": "" }, - "CVE-2021-3178": { - "cmt_msg": "nfsd4: readdirplus shouldn't return parent of export" + "CVE-2021-0937": { + "cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write" }, - "CVE-2022-2196": { - "cmt_msg": "KVM: VMX: Execute IBPB on emulated VM-exit when guest has IBRS" + "CVE-2022-1263": { + "cmt_msg": "KVM: avoid NULL pointer dereference in kvm_dirty_ring_push" }, - "CVE-2022-0330": { - "cmt_msg": "drm/i915: Flush TLBs before releasing backing store" + "CVE-2023-52610": { + "cmt_msg": "net/sched: act_ct: fix skb leak and crash on ooo frags" }, - "CVE-2007-3719": { + "CVE-2021-35477": { + "cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4" + }, + "CVE-2023-31436": { + "cmt_msg": "net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg" + }, + "CVE-2022-47929": { + "cmt_msg": "net: sched: disallow noqueue for qdisc classes" + }, + "CVE-2021-41864": { + "cmt_msg": "bpf: Fix integer overflow in prealloc_elems_and_freelist()" + }, + "CVE-2022-2209": { "cmt_msg": "" }, - "CVE-2023-3863": { - "cmt_msg": "net: nfc: Fix use-after-free caused by nfc_llcp_find_local" + "CVE-2023-52624": { + "cmt_msg": "drm/amd/display: Wake DMCUB before executing GPINT commands" }, - "CVE-2023-0590": { - "cmt_msg": "net: sched: fix race condition in qdisc_graft()" + "CVE-2021-37576": { + "cmt_msg": "KVM: PPC: Book3S: Fix H_RTAS rets buffer overflow" }, - "CVE-2022-4095": { - "cmt_msg": "staging: rtl8712: fix use after free bugs" + "CVE-2024-26775": { + "cmt_msg": "aoe: avoid potential deadlock at set_capacity" }, - "CVE-2022-45919": { - "cmt_msg": "media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221" + "CVE-2022-36123": { + "cmt_msg": "x86: Clear .brk area at early boot" }, - "CVE-2023-21400": { - "cmt_msg": "" + "CVE-2023-7042": { + "cmt_msg": "wifi: ath10k: fix NULL pointer dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev()" }, - "CVE-2021-45402": { - "cmt_msg": "bpf: Fix signed bounds propagation after mov32" + "CVE-2022-3594": { + "cmt_msg": "r8152: Rate limit overflow messages" }, - "CVE-2022-28893": { - "cmt_msg": "SUNRPC: Ensure we flush any closed sockets before xs_xprt_free()" + "CVE-2022-3595": { + "cmt_msg": "cifs: fix double-fault crash during ntlmssp" }, - "CVE-2021-3772": { - "cmt_msg": "sctp: use init_tag from inithdr for ABORT chunk" + "CVE-2023-52559": { + "cmt_msg": "iommu/vt-d: Avoid memory allocation in iommu_suspend()" }, - "CVE-2021-3679": { - "cmt_msg": "tracing: Fix bug in rb_per_cpu_empty() that might cause deadloop." + "CVE-2023-47233": { + "cmt_msg": "wifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach" }, - "CVE-2022-2586": { - "cmt_msg": "netfilter: nf_tables: do not allow SET_ID to refer to another table" + "CVE-2024-23850": { + "cmt_msg": "btrfs: do not ASSERT() if the newly created subvolume already got read" }, - "CVE-2022-3629": { - "cmt_msg": "vsock: Fix memory leak in vsock_connect()" + "CVE-2020-27815": { + "cmt_msg": "jfs: Fix array index bounds check in dbAdjTree" }, - "CVE-2021-28715": { - "cmt_msg": "xen/netback: don't queue unlimited number of packages" + "CVE-2023-52629": { + "cmt_msg": "sh: push-switch: Reorder cleanup operations to avoid use-after-free bug" }, - "CVE-2021-28714": { - "cmt_msg": "xen/netback: fix rx queue stall detection" + "CVE-2023-3610": { + "cmt_msg": "netfilter: nf_tables: fix chain binding transaction logic" }, - "CVE-2021-28713": { - "cmt_msg": "xen/console: harden hvc_xen against event channel storms" + "CVE-2022-1462": { + "cmt_msg": "tty: use new tty_insert_flip_string_and_push_buffer() in pty_write()" }, - "CVE-2021-28712": { - "cmt_msg": "xen/netfront: harden netfront against event channel storms" + "CVE-2024-26758": { + "cmt_msg": "md: Don't ignore suspended array in md_check_recovery()" }, - "CVE-2021-28711": { - "cmt_msg": "xen/blkfront: harden blkfront against event channel storms" + "CVE-2024-26610": { + "cmt_msg": "wifi: iwlwifi: fix a memory corruption" }, - "CVE-2021-3659": { - "cmt_msg": "net: mac802154: Fix general protection fault" + "CVE-2023-6606": { + "cmt_msg": "smb: client: fix OOB in smbCalcSize()" }, - "CVE-2022-2991": { - "cmt_msg": "remove the lightnvm subsystem" + "CVE-2024-26614": { + "cmt_msg": "tcp: make sure init the accept_queue's spinlocks once" }, - "CVE-2022-3621": { - "cmt_msg": "nilfs2: fix NULL pointer dereference at nilfs_bmap_lookup_at_level()" + "CVE-2022-1729": { + "cmt_msg": "perf: Fix sys_perf_event_open() race against self" }, - "CVE-2022-23960": { - "cmt_msg": "ARM: report Spectre v2 status through sysfs" + "CVE-2022-3112": { + "cmt_msg": "media: meson: vdec: potential dereference of null pointer" }, - "CVE-2022-3623": { - "cmt_msg": "mm/hugetlb: fix races when looking up a CONT-PTE/PMD size hugetlb page" + "CVE-2024-26752": { + "cmt_msg": "l2tp: pass correct message length to ip6_append_data" }, - "CVE-2022-3624": { - "cmt_msg": "bonding: fix reference count leak in balance-alb mode" + "CVE-2024-26673": { + "cmt_msg": "netfilter: nft_ct: sanitize layer 3 and 4 protocol number in custom expectations" }, - "CVE-2022-25258": { - "cmt_msg": "USB: gadget: validate interface OS descriptor requests" + "CVE-2024-26754": { + "cmt_msg": "gtp: fix use-after-free and null-ptr-deref in gtp_genl_dump_pdp()" }, - "CVE-2021-39656": { - "cmt_msg": "configfs: fix a use-after-free in __configfs_open_file" + "CVE-2024-26756": { + "cmt_msg": "md: Don't register sync_thread for reshape directly" }, - "CVE-2021-39657": { - "cmt_msg": "scsi: ufs: Correct the LUN used in eh_device_reset_handler() callback" + "CVE-2024-26757": { + "cmt_msg": "md: Don't ignore read-only array in md_check_recovery()" }, - "CVE-2023-3090": { - "cmt_msg": "ipvlan:Fix out-of-bounds caused by unclear skb->cb" + "CVE-2023-52439": { + "cmt_msg": "uio: Fix use-after-free in uio_open" }, - "CVE-2022-47946": { - "cmt_msg": "io_uring: kill sqo_dead and sqo submission halting" + "CVE-2023-52438": { + "cmt_msg": "binder: fix use-after-free in shinker's callback" }, - "CVE-2022-4744": { - "cmt_msg": "tun: avoid double free in tun_free_netdev" + "CVE-2023-3776": { + "cmt_msg": "net/sched: cls_fw: Fix improper refcount update leads to use-after-free" }, - "CVE-2023-1095": { - "cmt_msg": "netfilter: nf_tables: fix null deref due to zeroed list head" + "CVE-2021-28038": { + "cmt_msg": "Xen/gnttab: handle p2m update errors on a per-slot basis" }, - "CVE-2022-3239": { - "cmt_msg": "media: em28xx: initialize refcount before kref_get" + "CVE-2021-28039": { + "cmt_msg": "xen: fix p2m size in dom0 for disabled memory hotplug case" }, - "CVE-2022-4543": { - "cmt_msg": "" + "CVE-2022-3111": { + "cmt_msg": "power: supply: wm8350-power: Add missing free in free_charger_irq" }, - "CVE-2023-4921": { - "cmt_msg": "net: sched: sch_qfq: Fix UAF in qfq_dequeue()" + "CVE-2023-52435": { + "cmt_msg": "net: prevent mss overflow in skb_segment()" }, - "CVE-2021-34866": { - "cmt_msg": "bpf: Fix ringbuf helper function compatibility" + "CVE-2023-52434": { + "cmt_msg": "smb: client: fix potential OOBs in smb2_parse_contexts()" }, - "CVE-2023-1390": { - "cmt_msg": "tipc: fix NULL deref in tipc_link_xmit()" + "CVE-2021-31829": { + "cmt_msg": "bpf: Fix masking negation logic upon negative dst register" }, - "CVE-2021-34981": { - "cmt_msg": "Bluetooth: cmtp: fix file refcount when cmtp_attach_device fails" + "CVE-2023-52436": { + "cmt_msg": "f2fs: explicitly null-terminate the xattr list" }, - "CVE-2023-23454": { - "cmt_msg": "net: sched: cbq: dont intepret cls results when asked to drop" + "CVE-2022-2964": { + "cmt_msg": "net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup" }, - "CVE-2024-0775": { - "cmt_msg": "ext4: improve error recovery code paths in __ext4_remount()" + "CVE-2021-3501": { + "cmt_msg": "KVM: VMX: Don't use vcpu->run->internal.ndata as an array index" }, - "CVE-2023-4881": { - "cmt_msg": "netfilter: nftables: exthdr: fix 4-byte stack OOB write" + "CVE-2024-26688": { + "cmt_msg": "fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super" }, - "CVE-2022-42432": { - "cmt_msg": "netfilter: nfnetlink_osf: fix possible bogus match in nf_osf_find()" + "CVE-2024-23307": { + "cmt_msg": "md/raid5: fix atomicity violation in raid5_cache_count" }, - "CVE-2013-7445": { + "CVE-2022-2961": { "cmt_msg": "" }, - "CVE-2022-28390": { - "cmt_msg": "can: ems_usb: ems_usb_start_xmit(): fix double dev_kfree_skb() in error path" + "CVE-2021-3506": { + "cmt_msg": "f2fs: fix to avoid out-of-bounds memory access" }, - "CVE-2021-3653": { - "cmt_msg": "KVM: nSVM: avoid picking up unsupported bits from L2 in int_ctl (CVE-2021-3653)" + "CVE-2023-5197": { + "cmt_msg": "netfilter: nf_tables: disallow rule removal from chain binding" }, - "CVE-2024-26593": { - "cmt_msg": "i2c: i801: Fix block process call transactions" + "CVE-2024-26680": { + "cmt_msg": "net: atlantic: Fix DMA mapping for PTP hwts ring" }, - "CVE-2022-42719": { - "cmt_msg": "wifi: mac80211: fix MBSSID parsing use-after-free" + "CVE-2024-26686": { + "cmt_msg": "fs/proc: do_task_stat: use sig->stats_lock to gather the threads/children stats" }, - "CVE-2022-38096": { - "cmt_msg": "" + "CVE-2024-26687": { + "cmt_msg": "xen/events: close evtchn after mapping cleanup" }, - "CVE-2021-3656": { - "cmt_msg": "KVM: nSVM: always intercept VMLOAD/VMSAVE when nested (CVE-2021-3656)" + "CVE-2023-51779": { + "cmt_msg": "Bluetooth: af_bluetooth: Fix Use-After-Free in bt_sock_recvmsg" }, - "CVE-2022-1158": { - "cmt_msg": "KVM: x86/mmu: do compare-and-exchange of gPTE via the user address" + "CVE-2023-3268": { + "cmt_msg": "relayfs: fix out-of-bounds access in relay_file_read" }, - "CVE-2022-3303": { - "cmt_msg": "ALSA: pcm: oss: Fix race at SNDCTL_DSP_SYNC" + "CVE-2022-40133": { + "cmt_msg": "drm/vmwgfx: Remove rcu locks from user resources" }, - "CVE-2022-20141": { - "cmt_msg": "igmp: Add ip_mc_list lock in ip_check_mc_rcu" + "CVE-2023-6915": { + "cmt_msg": "ida: Fix crash in ida_free when the bitmap is empty" }, - "CVE-2008-4609": { + "CVE-2010-4563": { "cmt_msg": "" }, - "CVE-2023-23455": { - "cmt_msg": "net: sched: atm: dont intepret cls results when asked to drop" + "CVE-2021-47006": { + "cmt_msg": "ARM: 9064/1: hw_breakpoint: Do not directly check the event's overflow_handler hook" }, - "CVE-2022-2905": { - "cmt_msg": "bpf: Don't use tnum_range on array range checking for poke descriptors" + "CVE-2023-1249": { + "cmt_msg": "coredump: Use the vma snapshot in fill_files_note" }, - "CVE-2022-20148": { - "cmt_msg": "f2fs: fix UAF in f2fs_available_free_memory" + "CVE-2022-39190": { + "cmt_msg": "netfilter: nf_tables: disallow binding to already bound chain" }, - "CVE-2023-2898": { - "cmt_msg": "f2fs: fix to avoid NULL pointer dereference f2fs_write_end_io()" + "CVE-2023-2162": { + "cmt_msg": "scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress" }, - "CVE-2023-6931": { - "cmt_msg": "perf: Fix perf_event_validate_size()" + "CVE-2023-45871": { + "cmt_msg": "igb: set max size RX buffer when store bad packet is enabled" }, - "CVE-2023-6932": { - "cmt_msg": "ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet" + "CVE-2024-23851": { + "cmt_msg": "dm: limit the number of targets and parameter size area" }, - "CVE-2024-0607": { - "cmt_msg": "netfilter: nf_tables: fix pointer math issue in nft_byteorder_eval()" + "CVE-2023-0266": { + "cmt_msg": "ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF" }, - "CVE-2021-33631": { - "cmt_msg": "ext4: fix kernel BUG in 'ext4_write_inline_data_end()'" + "CVE-2021-0512": { + "cmt_msg": "HID: make arrays usage and value to be the same" }, - "CVE-2022-28389": { - "cmt_msg": "can: mcba_usb: mcba_usb_start_xmit(): fix double dev_kfree_skb in error path" + "CVE-2021-3483": { + "cmt_msg": "firewire: nosy: Fix a use-after-free bug in nosy_ioctl()" }, - "CVE-2022-28388": { - "cmt_msg": "can: usb_8dev: usb_8dev_start_xmit(): fix double dev_kfree_skb() in error path" + "CVE-2024-26663": { + "cmt_msg": "tipc: Check the bearer type before calling tipc_udp_nl_bearer_add()" }, - "CVE-2023-52444": { - "cmt_msg": "f2fs: fix to avoid dirent corruption" + "CVE-2024-26598": { + "cmt_msg": "KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache" }, - "CVE-2020-12362": { - "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" + "CVE-2021-3489": { + "cmt_msg": "bpf, ringbuf: Deny reserve of buffers larger than ringbuf" }, - "CVE-2020-12363": { - "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" + "CVE-2021-38300": { + "cmt_msg": "bpf, mips: Validate conditional branch offsets" }, - "CVE-2022-4129": { - "cmt_msg": "l2tp: Serialize access to sk_user_data with sk_callback_lock" + "CVE-2022-24448": { + "cmt_msg": "NFSv4: Handle case where the lookup of a directory fails" }, - "CVE-2020-12364": { - "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" + "CVE-2023-52498": { + "cmt_msg": "PM: sleep: Fix possible deadlocks in core system-wide PM code" }, - "CVE-2020-25639": { - "cmt_msg": "drm/nouveau: bail out of nouveau_channel_new if channel init fails" + "CVE-2024-26774": { + "cmt_msg": "ext4: avoid dividing by 0 in mb_update_avg_fragment_size() when block bitmap corrupt" }, - "CVE-2023-33203": { - "cmt_msg": "net: qcom/emac: Fix use after free bug in emac_remove due to race condition" + "CVE-2021-4023": { + "cmt_msg": "io-wq: fix cancellation on create-worker failure" }, - "CVE-2021-4001": { - "cmt_msg": "bpf: Fix toctou on read-only map's constant scalar tracking" + "CVE-2023-52640": { + "cmt_msg": "fs/ntfs3: Fix oob in ntfs_listxattr" }, - "CVE-2021-4002": { - "cmt_msg": "hugetlbfs: flush TLBs correctly after huge_pmd_unshare" + "CVE-2023-52641": { + "cmt_msg": "fs/ntfs3: Add NULL ptr dereference checking at the end of attr_allocate_frame()" }, - "CVE-2023-26545": { - "cmt_msg": "net: mpls: fix stale pointer if allocation fails during device rename" + "CVE-2021-22555": { + "cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write" }, - "CVE-2022-1055": { - "cmt_msg": "net: sched: fix use-after-free in tc_new_tfilter()" + "CVE-2020-36694": { + "cmt_msg": "netfilter: x_tables: Switch synchronization to RCU" }, - "CVE-2023-50431": { - "cmt_msg": "accel/habanalabs: fix information leak in sec_attest_info()" + "CVE-2021-0399": { + "cmt_msg": "" }, - "CVE-2022-20008": { - "cmt_msg": "mmc: block: fix read single on recovery logic" + "CVE-2023-52488": { + "cmt_msg": "serial: sc16is7xx: convert from _raw_ to _noinc_ regmap functions for FIFO" }, - "CVE-2023-3117": { - "cmt_msg": "netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE" + "CVE-2023-52489": { + "cmt_msg": "mm/sparsemem: fix race in accessing memory_section->usage" }, - "CVE-2023-32269": { - "cmt_msg": "netrom: Fix use-after-free caused by accept on already connected socket" + "CVE-2021-47179": { + "cmt_msg": "NFSv4: Fix a NULL pointer dereference in pnfs_mark_matching_lsegs_return()" }, - "CVE-2023-52464": { - "cmt_msg": "EDAC/thunderx: Fix possible out-of-bounds string access" + "CVE-2023-42755": { + "cmt_msg": "net/sched: Retire rsvp classifier" }, - "CVE-2023-52463": { - "cmt_msg": "efivarfs: force RO when remounting if SetVariable is not supported" + "CVE-2020-36516": { + "cmt_msg": "ipv4: avoid using shared IP generator for connected sockets" }, - "CVE-2023-3111": { - "cmt_msg": "btrfs: unset reloc control if transaction commit fails in prepare_to_relocate()" + "CVE-2023-52486": { + "cmt_msg": "drm: Don't unref the same fb many times by mistake due to deadlock handling" }, - "CVE-2021-3411": { - "cmt_msg": "x86/kprobes: Fix optprobe to detect INT3 padding correctly" + "CVE-2023-52480": { + "cmt_msg": "ksmbd: fix race condition between session lookup and expire" }, - "CVE-2023-6040": { - "cmt_msg": "netfilter: nf_tables: Reject tables of unsupported family" + "CVE-2012-4542": { + "cmt_msg": "" }, - "CVE-2021-31440": { - "cmt_msg": "bpf: Fix propagation of 32 bit unsigned bounds from 64 bit bounds" + "CVE-2023-42753": { + "cmt_msg": "netfilter: ipset: add the missing IP_SET_HASH_WITH_NET0 macro for ip_set_hash_netportnet.c" }, - "CVE-2022-26373": { - "cmt_msg": "x86/speculation: Add RSB VM Exit protections" + "CVE-2023-1838": { + "cmt_msg": "Fix double fget() in vhost_net_set_backend()" }, - "CVE-2019-15290": { - "cmt_msg": "" + "CVE-2023-1382": { + "cmt_msg": "tipc: set con sock in tipc_conn_alloc" }, - "CVE-2023-3212": { - "cmt_msg": "gfs2: Don't deref jdesc in evict" + "CVE-2022-44034": { + "cmt_msg": "char: pcmcia: remove all the drivers" }, - "CVE-2024-23848": { - "cmt_msg": "" + "CVE-2023-4244": { + "cmt_msg": "netfilter: nf_tables: fix GC transaction races with netns and netlink event exit path" }, - "CVE-2023-1295": { - "cmt_msg": "io_uring: get rid of intermediate IORING_OP_CLOSE stage" + "CVE-2021-46283": { + "cmt_msg": "netfilter: nf_tables: initialize set before expression setup" }, - "CVE-2022-0617": { - "cmt_msg": "udf: Fix NULL ptr deref when converting from inline format" + "CVE-2023-3609": { + "cmt_msg": "net/sched: cls_u32: Fix reference counter leak leading to overflow" }, - "CVE-2023-4459": { - "cmt_msg": "net: vmxnet3: fix possible NULL pointer dereference in vmxnet3_rq_cleanup()" + "CVE-2022-44033": { + "cmt_msg": "char: pcmcia: remove all the drivers" }, - "CVE-2022-2153": { - "cmt_msg": "KVM: x86: Avoid theoretical NULL pointer dereference in kvm_irq_delivery_to_apic_fast()" + "CVE-2022-1974": { + "cmt_msg": "nfc: replace improper check device_is_registered() in netlink related functions" }, - "CVE-2022-20568": { - "cmt_msg": "Merge tag 'io_uring-worker.v3-2021-02-25' of git://git.kernel.dk/linux-block" + "CVE-2022-1975": { + "cmt_msg": "NFC: netlink: fix sleep in atomic bug when firmware download timeout" }, - "CVE-2022-20566": { - "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free caused by l2cap_chan_put" + "CVE-2022-1972": { + "cmt_msg": "netfilter: nf_tables: sanitize nft_set_desc_concat_parse()" }, - "CVE-2018-12930": { - "cmt_msg": "" + "CVE-2023-52491": { + "cmt_msg": "media: mtk-jpeg: Fix use after free bug due to error path handling in mtk_jpeg_dec_device_run" }, - "CVE-2018-12931": { - "cmt_msg": "" + "CVE-2022-44032": { + "cmt_msg": "char: pcmcia: remove all the drivers" }, - "CVE-2023-1990": { - "cmt_msg": "nfc: st-nci: Fix use after free bug in ndlc_remove due to race condition" + "CVE-2020-36777": { + "cmt_msg": "media: dvbdev: Fix memory leak in dvb_media_device_free()" }, - "CVE-2024-26583": { - "cmt_msg": "tls: fix race between async notify and socket close" + "CVE-2020-36776": { + "cmt_msg": "thermal/drivers/cpufreq_cooling: Fix slab OOB issue" }, - "CVE-2021-33098": { - "cmt_msg": "ixgbe: fix large MTU request from VF" + "CVE-2021-47082": { + "cmt_msg": "tun: avoid double free in tun_free_netdev" }, - "CVE-2022-0185": { - "cmt_msg": "vfs: fs_context: fix up param length parsing in legacy_parse_param" + "CVE-2021-47083": { + "cmt_msg": "pinctrl: mediatek: fix global-out-of-bounds issue" }, - "CVE-2021-28971": { - "cmt_msg": "perf/x86/intel: Fix a crash caused by zero PEBS status" + "CVE-2021-31916": { + "cmt_msg": "dm ioctl: fix out of bounds array access when no devices" }, - "CVE-2022-22942": { - "cmt_msg": "drm/vmwgfx: Fix stale file descriptors on failed usercopy" + "CVE-2021-47086": { + "cmt_msg": "phonet/pep: refuse to enable an unbound pipe" }, - "CVE-2021-3739": { - "cmt_msg": "btrfs: fix NULL pointer dereference when deleting device by invalid id" + "CVE-2022-32981": { + "cmt_msg": "powerpc/32: Fix overread/overwrite of thread_struct via ptrace" }, - "CVE-2021-3732": { - "cmt_msg": "ovl: prevent private clone if bind mount is not allowed" + "CVE-2021-47122": { + "cmt_msg": "net: caif: fix memory leak in caif_device_notify" }, - "CVE-2024-24860": { - "cmt_msg": "Bluetooth: Fix atomicity violation in {min,max}_key_size_set" + "CVE-2021-47121": { + "cmt_msg": "net: caif: fix memory leak in cfusbl_device_notify" }, - "CVE-2020-27835": { - "cmt_msg": "IB/hfi1: Ensure correct mm is used at all times" + "CVE-2021-47120": { + "cmt_msg": "HID: magicmouse: fix NULL-deref on disconnect" }, - "CVE-2024-24861": { - "cmt_msg": "" + "CVE-2021-47126": { + "cmt_msg": "ipv6: Fix KASAN: slab-out-of-bounds Read in fib6_nh_flush_exceptions" }, - "CVE-2023-0240": { - "cmt_msg": "io_uring: COW io_identity on mismatch" + "CVE-2020-36779": { + "cmt_msg": "i2c: stm32f7: fix reference leak when pm_runtime_get_sync fails" }, - "CVE-2021-35039": { - "cmt_msg": "module: limit enabling module.sig_enforce" + "CVE-2020-36778": { + "cmt_msg": "i2c: xiic: fix reference leak when pm_runtime_get_sync fails" }, - "CVE-2024-25740": { - "cmt_msg": "" + "CVE-2023-2269": { + "cmt_msg": "dm ioctl: fix nested locking in table_clear() to remove deadlock concern" }, - "CVE-2022-3903": { - "cmt_msg": "media: mceusb: Use new usb_control_msg_*() routines" + "CVE-2023-0394": { + "cmt_msg": "ipv6: raw: Deduct extension header length in rawv6_push_pending_frames" }, - "CVE-2022-3577": { - "cmt_msg": "HID: bigben: fix slab-out-of-bounds Write in bigben_probe" + "CVE-2021-47171": { + "cmt_msg": "net: usb: fix memory leak in smsc75xx_bind" }, - "CVE-2023-20588": { - "cmt_msg": "x86/CPU/AMD: Do not leak quotient data after a division by 0" + "CVE-2021-47100": { + "cmt_msg": "ipmi: Fix UAF when uninstall ipmi_si and ipmi_msghandler module" }, - "CVE-2022-4379": { - "cmt_msg": "NFSD: fix use-after-free in __nfs42_ssc_open()" + "CVE-2024-26615": { + "cmt_msg": "net/smc: fix illegal rmb_desc access in SMC-D connection dump" }, - "CVE-2022-4378": { - "cmt_msg": "proc: proc_skip_spaces() shouldn't think it is working on C strings" + "CVE-2022-3108": { + "cmt_msg": "drm/amdkfd: Check for null pointer after calling kmemdup" }, - "CVE-2022-44033": { - "cmt_msg": "char: pcmcia: remove all the drivers" + "CVE-2022-36402": { + "cmt_msg": "drm/vmwgfx: Fix shader stage validation" }, - "CVE-2022-44032": { - "cmt_msg": "char: pcmcia: remove all the drivers" + "CVE-2021-4157": { + "cmt_msg": "pNFS/flexfiles: fix incorrect size check in decode_nfs_fh()" }, - "CVE-2022-47518": { - "cmt_msg": "wifi: wilc1000: validate number of channels" + "CVE-2021-4154": { + "cmt_msg": "cgroup: verify that source is a string" }, - "CVE-2023-4207": { - "cmt_msg": "net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free" + "CVE-2021-4155": { + "cmt_msg": "xfs: map unwritten blocks in XFS_IOC_{ALLOC,FREE}SP just like fallocate" }, - "CVE-2020-26139": { - "cmt_msg": "mac80211: do not accept/forward invalid EAPOL frames" + "CVE-2022-3521": { + "cmt_msg": "kcm: avoid potential race in kcm_tx_work" }, - "CVE-2023-42754": { - "cmt_msg": "ipv4: fix null-deref in ipv4_link_failure" + "CVE-2021-4150": { + "cmt_msg": "block: fix incorrect references to disk objects" }, - "CVE-2021-3609": { - "cmt_msg": "can: bcm: delay release of struct bcm_op after synchronize_rcu()" + "CVE-2020-3702": { + "cmt_msg": "ath: Use safer key clearing with key cache entries" }, - "CVE-2022-0847": { - "cmt_msg": "lib/iov_iter: initialize \"flags\" in new pipe_buffer" + "CVE-2023-52485": { + "cmt_msg": "drm/amd/display: Wake DMCUB before sending a command" }, - "CVE-2021-3600": { - "cmt_msg": "bpf: Fix 32 bit src register truncation on div/mod" + "CVE-2021-28952": { + "cmt_msg": "ASoC: qcom: sdm845: Fix array out of bounds access" }, - "CVE-2021-23133": { - "cmt_msg": "net/sctp: fix race condition in sctp_destroy_sock" + "CVE-2021-3655": { + "cmt_msg": "sctp: validate from_addr_param return" }, - "CVE-2021-0920": { - "cmt_msg": "af_unix: fix garbage collect vs MSG_PEEK" + "CVE-2021-3656": { + "cmt_msg": "KVM: nSVM: always intercept VMLOAD/VMSAVE when nested (CVE-2021-3656)" }, - "CVE-2020-28374": { - "cmt_msg": "scsi: target: Fix XCOPY NAA identifier lookup" + "CVE-2023-0461": { + "cmt_msg": "net/ulp: prevent ULP without clone op from entering the LISTEN status" }, - "CVE-2023-0615": { - "cmt_msg": "media: vivid: dev->bitmap_cap wasn't freed in all cases" + "CVE-2021-29154": { + "cmt_msg": "bpf, x86: Validate computation of branch displacements for x86-64" }, - "CVE-2023-3006": { - "cmt_msg": "arm64: Add AMPERE1 to the Spectre-BHB affected list" + "CVE-2021-29155": { + "cmt_msg": "bpf: Use correct permission flag for mixed signed bounds arithmetic" }, - "CVE-2022-3586": { - "cmt_msg": "sch_sfb: Don't assume the skb is still around after enqueueing to child" + "CVE-2021-3714": { + "cmt_msg": "" }, - "CVE-2024-0641": { - "cmt_msg": "tipc: fix a potential deadlock on &tx->lock" + "CVE-2024-26733": { + "cmt_msg": "arp: Prevent overflow in arp_req_get()." }, - "CVE-2024-26586": { - "cmt_msg": "mlxsw: spectrum_acl_tcam: Fix stack corruption" + "CVE-2021-3896": { + "cmt_msg": "isdn: cpai: check ctr->cnr to avoid array index out of bound" }, - "CVE-2024-0646": { - "cmt_msg": "net: tls, update curr on splice as well" + "CVE-2021-3894": { + "cmt_msg": "sctp: account stream padding length for reconf chunk" }, - "CVE-2020-27825": { - "cmt_msg": "tracing: Fix race in trace_open and buffer resize call" + "CVE-2021-3892": { + "cmt_msg": "" }, - "CVE-2020-27820": { - "cmt_msg": "drm/nouveau: use drm_dev_unplug() during device removal" + "CVE-2023-20928": { + "cmt_msg": "android: binder: stop saving a pointer to the VMA" }, - "CVE-2023-1872": { - "cmt_msg": "io_uring: propagate issue_flags state down to file assignment" + "CVE-2021-39633": { + "cmt_msg": "ip_gre: add validation for csum_start" }, - "CVE-2023-1078": { - "cmt_msg": "rds: rds_rm_zerocopy_callback() use list_first_entry()" + "CVE-2022-27223": { + "cmt_msg": "USB: gadget: validate endpoint index for xilinx udc" }, - "CVE-2023-39197": { - "cmt_msg": "netfilter: conntrack: dccp: copy entire header to stack buffer, not just basic one" + "CVE-2023-35788": { + "cmt_msg": "net/sched: flower: fix possible OOB write in fl_set_geneve_opt()" }, - "CVE-2023-4622": { - "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES" + "CVE-2022-2639": { + "cmt_msg": "openvswitch: fix OOB access in reserve_sfa_size()" }, - "CVE-2020-26558": { - "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical" + "CVE-2022-24958": { + "cmt_msg": "usb: gadget: don't release an existing dev->buf" }, - "CVE-2023-39193": { - "cmt_msg": "netfilter: xt_sctp: validate the flag_info count" + "CVE-2022-24959": { + "cmt_msg": "yam: fix a memory leak in yam_siocdevprivate()" }, - "CVE-2023-1079": { - "cmt_msg": "HID: asus: use spinlock to safely schedule workers" + "CVE-2022-25375": { + "cmt_msg": "usb: gadget: rndis: check size of RNDIS_MSG_SET command" }, - "CVE-2020-26541": { - "cmt_msg": "certs: Add EFI_CERT_X509_GUID support for dbx entries" + "CVE-2022-33742": { + "cmt_msg": "xen/blkfront: force data bouncing when backend is untrusted" }, - "CVE-2023-6610": { - "cmt_msg": "smb: client: fix potential OOB in smb2_dump_detail()" + "CVE-2022-33741": { + "cmt_msg": "xen/netfront: force data bouncing when backend is untrusted" }, - "CVE-2023-3390": { - "cmt_msg": "netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE" + "CVE-2022-33740": { + "cmt_msg": "xen/netfront: fix leaking data in shared pages" }, - "CVE-2023-3812": { - "cmt_msg": "net: tun: fix bugs for oversize packet when napi frags enabled" + "CVE-2024-24864": { + "cmt_msg": "" }, - "CVE-2020-26143": { + "CVE-2022-45885": { "cmt_msg": "" }, - "CVE-2021-33061": { - "cmt_msg": "ixgbe: add improvement for MDD response functionality" + "CVE-2022-33744": { + "cmt_msg": "xen/arm: Fix race in RB-tree based P2M accounting" }, - "CVE-2024-26589": { - "cmt_msg": "bpf: Reject variable offset alu on PTR_TO_FLOW_KEYS" + "CVE-2021-47017": { + "cmt_msg": "ath10k: Fix a use after free in ath10k_htc_send_bundle" }, - "CVE-2023-3389": { - "cmt_msg": "io_uring: mutex locked poll hashing" + "CVE-2021-47016": { + "cmt_msg": "m68k: mvme147,mvme16x: Don't wipe PCC timer config bits" }, - "CVE-2023-1476": { - "cmt_msg": "" + "CVE-2021-47015": { + "cmt_msg": "bnxt_en: Fix RX consumer index logic in the error path." }, - "CVE-2021-3864": { - "cmt_msg": "" + "CVE-2021-47014": { + "cmt_msg": "net/sched: act_ct: fix wild memory access when clearing fragments" }, - "CVE-2022-1652": { - "cmt_msg": "floppy: use a statically allocated error counter" + "CVE-2021-47013": { + "cmt_msg": "net:emac/emac-mac: Fix a use after free in emac_mac_tx_buf_send" }, - "CVE-2023-4623": { - "cmt_msg": "net/sched: sch_hfsc: Ensure inner classes have fsc curve" + "CVE-2021-47012": { + "cmt_msg": "RDMA/siw: Fix a use after free in siw_alloc_mr" }, - "CVE-2024-23849": { - "cmt_msg": "net/rds: Fix UBSAN: array-index-out-of-bounds in rds_cmsg_recv" + "CVE-2021-47158": { + "cmt_msg": "net: dsa: sja1105: add error handling in sja1105_setup()" }, - "CVE-2020-29568": { - "cmt_msg": "xen/xenbus: Allow watches discard events before queueing" + "CVE-2021-47010": { + "cmt_msg": "net: Only allow init netns to set default tcp cong to a restricted algo" }, - "CVE-2020-29569": { - "cmt_msg": "xen-blkback: set ring->xenblkd to NULL after kthread_stop()" + "CVE-2022-1280": { + "cmt_msg": "drm: avoid circular locks in drm_mode_getconnector" }, - "CVE-2023-51043": { - "cmt_msg": "drm/atomic: Fix potential use-after-free in nonblocking commits" + "CVE-2021-47152": { + "cmt_msg": "mptcp: fix data stream corruption" }, - "CVE-2022-2978": { - "cmt_msg": "fs: fix UAF/GPF bug in nilfs_mdt_destroy" + "CVE-2021-47153": { + "cmt_msg": "i2c: i801: Don't generate an interrupt on bus reset" }, - "CVE-2023-20569": { - "cmt_msg": "x86/bugs: Increase the x86 bugs vector size to two u32s" + "CVE-2021-47150": { + "cmt_msg": "net: fec: fix the potential memory leak in fec_enet_init()" }, - "CVE-2022-20132": { - "cmt_msg": "HID: add hid_is_usb() function to make it simpler for USB detection" + "CVE-2021-47018": { + "cmt_msg": "powerpc/64: Fix the definition of the fixmap area" }, - "CVE-2022-2977": { - "cmt_msg": "tpm: fix reference counting for struct tpm_chip" + "CVE-2021-46936": { + "cmt_msg": "net: fix use-after-free in tw_timer_handler" }, - "CVE-2022-1789": { - "cmt_msg": "KVM: x86/mmu: fix NULL pointer dereference on guest INVPCID" + "CVE-2021-46935": { + "cmt_msg": "binder: fix async_free_space accounting for empty parcels" }, - "CVE-2016-8660": { - "cmt_msg": "" + "CVE-2021-46934": { + "cmt_msg": "i2c: validate user data in compat ioctl" }, - "CVE-2023-6270": { - "cmt_msg": "" + "CVE-2021-46933": { + "cmt_msg": "usb: gadget: f_fs: Clear ffs_eventfd in ffs_data_clear." }, - "CVE-2023-2156": { - "cmt_msg": "net: rpl: fix rpl header size calculation" + "CVE-2021-46932": { + "cmt_msg": "Input: appletouch - initialize work before device registration" }, - "CVE-2023-4389": { - "cmt_msg": "btrfs: fix root ref counts in error handling in btrfs_get_root_ref" + "CVE-2021-46931": { + "cmt_msg": "net/mlx5e: Wrap the tx reporter dump callback to extract the sq" }, - "CVE-2023-3772": { - "cmt_msg": "xfrm: add NULL check in xfrm_update_ae_params" + "CVE-2021-46930": { + "cmt_msg": "usb: mtu3: fix list_head check warning" }, - "CVE-2023-45862": { - "cmt_msg": "USB: ene_usb6250: Allocate enough memory for full object" + "CVE-2022-36946": { + "cmt_msg": "netfilter: nf_queue: do not allow packet truncation below transport header offset" }, - "CVE-2023-45863": { - "cmt_msg": "kobject: Fix slab-out-of-bounds in fill_kobj_path()" + "CVE-2011-4916": { + "cmt_msg": "" }, - "CVE-2023-1582": { - "cmt_msg": "fs/proc: task_mmu.c: don't read mapcount for migration entry" + "CVE-2021-47103": { + "cmt_msg": "inet: fully convert sk->sk_rx_dst to RCU rules" }, - "CVE-2022-1786": { - "cmt_msg": "io_uring: remove io_identity" + "CVE-2021-46939": { + "cmt_msg": "tracing: Restructure trace_clock_global() to never block" }, - "CVE-2022-23222": { - "cmt_msg": "bpf: Replace PTR_TO_XXX_OR_NULL with PTR_TO_XXX | PTR_MAYBE_NULL" + "CVE-2021-46938": { + "cmt_msg": "dm rq: fix double free of blk_mq_tag_set in dev remove after table load fails" }, - "CVE-2020-25669": { - "cmt_msg": "Input: sunkbd - avoid use-after-free in teardown paths" + "CVE-2021-47105": { + "cmt_msg": "ice: xsk: return xsk buffers back to pool when cleaning the ring" }, - "CVE-2020-25668": { - "cmt_msg": "tty: make FONTX ioctl use the tty pointer they were actually passed" + "CVE-2024-0841": { + "cmt_msg": "fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super" }, - "CVE-2020-25704": { - "cmt_msg": "perf/core: Fix a memory leak in perf_event_parse_addr_filter()" + "CVE-2021-29650": { + "cmt_msg": "netfilter: x_tables: Use correct memory barriers." }, - "CVE-2022-0435": { - "cmt_msg": "tipc: improve size validations for received domain records" + "CVE-2023-34255": { + "cmt_msg": "xfs: verify buffer contents when we skip log replay" }, - "CVE-2023-6356": { - "cmt_msg": "" + "CVE-2022-41849": { + "cmt_msg": "fbdev: smscufx: Fix use-after-free in ufx_ops_open()" }, - "CVE-2022-3533": { + "CVE-2022-41848": { "cmt_msg": "" }, - "CVE-2021-4135": { - "cmt_msg": "netdevsim: Zero-initialize memory for new map's value in function nsim_bpf_map_alloc" + "CVE-2022-1353": { + "cmt_msg": "af_key: add __GFP_ZERO flag for compose_sadb_supported in function pfkey_register" }, - "CVE-2023-26607": { - "cmt_msg": "ntfs: fix out-of-bounds read in ntfs_attr_find()" + "CVE-2022-28356": { + "cmt_msg": "llc: fix netdevice reference leaks in llc_ui_bind()" }, - "CVE-2023-52456": { - "cmt_msg": "serial: imx: fix tx statemachine deadlock" + "CVE-2022-2196": { + "cmt_msg": "KVM: VMX: Execute IBPB on emulated VM-exit when guest has IBRS" }, - "CVE-2019-15239": { - "cmt_msg": "unknown" + "CVE-2020-16119": { + "cmt_msg": "dccp: don't duplicate ccid when cloning dccp sock" }, - "CVE-2021-4037": { - "cmt_msg": "xfs: fix up non-directory creation in SGID directories" + "CVE-2024-26748": { + "cmt_msg": "usb: cdns3: fix memory double free when handle zero packet" }, - "CVE-2021-22543": { - "cmt_msg": "KVM: do not allow mapping valid but non-reference-counted pages" + "CVE-2022-1198": { + "cmt_msg": "drivers: hamradio: 6pack: fix UAF bug caused by mod_timer()" }, - "CVE-2022-45884": { - "cmt_msg": "" + "CVE-2022-1199": { + "cmt_msg": "ax25: Fix NULL pointer dereference in ax25_kill_by_device" }, - "CVE-2021-3348": { - "cmt_msg": "nbd: freeze the queue while we're adding connections" + "CVE-2023-6546": { + "cmt_msg": "tty: n_gsm: fix the UAF caused by race condition in gsm_cleanup_mux" }, - "CVE-2022-21505": { - "cmt_msg": "lockdown: Fix kexec lockdown bypass with ima policy" + "CVE-2021-39801": { + "cmt_msg": "" }, - "CVE-2023-20941": { + "CVE-2021-39800": { "cmt_msg": "" }, - "CVE-2021-3347": { - "cmt_msg": "futex: Ensure the correct return value from futex_lock_pi()" + "CVE-2021-28375": { + "cmt_msg": "misc: fastrpc: restrict user apps from sending kernel RPC messages" }, - "CVE-2022-1966": { - "cmt_msg": "netfilter: nf_tables: disallow non-stateful expression in sets earlier" + "CVE-2022-1195": { + "cmt_msg": "hamradio: improve the incomplete fix to avoid NPD" }, - "CVE-2021-3587": { - "cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect" + "CVE-2021-26708": { + "cmt_msg": "vsock: fix the race conditions in multi-transport support" }, - "CVE-2021-44733": { - "cmt_msg": "tee: handle lookup of shm with reference count 0" + "CVE-2021-4202": { + "cmt_msg": "NFC: reorganize the functions in nci_request" }, - "CVE-2021-20268": { - "cmt_msg": "bpf: Fix signed_{sub,add32}_overflows type handling" + "CVE-2021-4203": { + "cmt_msg": "af_unix: fix races in sk_peer_pid and sk_peer_cred accesses" }, - "CVE-2022-3534": { - "cmt_msg": "libbpf: Fix use-after-free in btf_dump_name_dups" + "CVE-2022-4269": { + "cmt_msg": "act_mirred: use the backlog for nested calls to mirred ingress" }, - "CVE-2022-3535": { - "cmt_msg": "net: mvpp2: fix mvpp2 debugfs leak" + "CVE-2022-45886": { + "cmt_msg": "media: dvb-core: Fix use-after-free due on race condition at dvb_net" }, - "CVE-2021-22600": { - "cmt_msg": "net/packet: rx_owner_map depends on pg_vec" + "CVE-2023-52509": { + "cmt_msg": "ravb: Fix use-after-free issue in ravb_tx_timeout_work()" }, - "CVE-2023-28328": { - "cmt_msg": "media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer()" + "CVE-2023-46343": { + "cmt_msg": "nfc: nci: fix possible NULL pointer dereference in send_acknowledge()" }, - "CVE-2022-0322": { - "cmt_msg": "sctp: account stream padding length for reconf chunk" + "CVE-2021-4204": { + "cmt_msg": "bpf: Generalize check_ctx_reg for reuse with other types" }, - "CVE-2023-0386": { - "cmt_msg": "ovl: fail on invalid uid/gid mapping at copy up" + "CVE-2023-52504": { + "cmt_msg": "x86/alternatives: Disable KASAN in apply_alternatives()" }, - "CVE-2023-6121": { - "cmt_msg": "nvmet: nul-terminate the NQNs passed in the connect command" + "CVE-2023-52507": { + "cmt_msg": "nfc: nci: assert requested protocol is valid" }, - "CVE-2023-28327": { - "cmt_msg": "af_unix: Get user_ns from in_skb in unix_diag_get_exact()." + "CVE-2023-2124": { + "cmt_msg": "xfs: verify buffer contents when we skip log replay" }, - "CVE-2017-13693": { - "cmt_msg": "" + "CVE-2023-52501": { + "cmt_msg": "ring-buffer: Do not attempt to read past \"commit\"" }, - "CVE-2017-13694": { - "cmt_msg": "" + "CVE-2023-52500": { + "cmt_msg": "scsi: pm80xx: Avoid leaking tags when processing OPC_INB_SET_CONTROLLER_CONFIG command" }, - "CVE-2022-42721": { - "cmt_msg": "wifi: cfg80211: avoid nontransmitted BSS list corruption" + "CVE-2023-52503": { + "cmt_msg": "tee: amdtee: fix use-after-free vulnerability in amdtee_close_session" }, - "CVE-2022-42720": { - "cmt_msg": "wifi: cfg80211: fix BSS refcounting bugs" + "CVE-2023-52502": { + "cmt_msg": "net: nfc: fix races in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn()" }, - "CVE-2022-42722": { - "cmt_msg": "wifi: mac80211: fix crash in beacon protection for P2P-device" + "CVE-2023-1281": { + "cmt_msg": "net/sched: tcindex: update imperfect hash filters respecting rcu" }, - "CVE-2021-4149": { - "cmt_msg": "btrfs: unlock newly allocated extent buffer after error" + "CVE-2023-2860": { + "cmt_msg": "ipv6: sr: fix out-of-bounds read when setting HMAC data." }, - "CVE-2021-4148": { - "cmt_msg": "mm: khugepaged: skip huge page collapse for special files" + "CVE-2021-44879": { + "cmt_msg": "f2fs: fix to do sanity check on inode type during garbage collection" }, - "CVE-2022-42895": { - "cmt_msg": "Bluetooth: L2CAP: Fix attempting to access uninitialized memory" + "CVE-2023-1859": { + "cmt_msg": "9p/xen : Fix use after free bug in xen_9pfs_front_remove due to race condition" }, - "CVE-2021-3640": { - "cmt_msg": "Bluetooth: sco: Fix lock_sock() blockage by memcpy_from_msg()" + "CVE-2023-2513": { + "cmt_msg": "ext4: fix use-after-free in ext4_xattr_set_entry" }, - "CVE-2021-3764": { - "cmt_msg": "crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd()" + "CVE-2022-1516": { + "cmt_msg": "net/x25: Fix null-ptr-deref caused by x25_disconnect" }, - "CVE-2021-3760": { - "cmt_msg": "nfc: nci: fix the UAF of rf_conn_info object" + "CVE-2023-1855": { + "cmt_msg": "hwmon: (xgene) Fix use after free bug in xgene_hwmon_remove due to race condition" }, - "CVE-2022-4382": { - "cmt_msg": "USB: gadgetfs: Fix race between mounting and unmounting" + "CVE-2022-27672": { + "cmt_msg": "x86/speculation: Identify processors vulnerable to SMT RSB predictions" }, - "CVE-2022-36123": { - "cmt_msg": "x86: Clear .brk area at early boot" + "CVE-2023-52563": { + "cmt_msg": "drm/meson: fix memory leak on ->hpd_notify callback" }, - "CVE-2023-4732": { - "cmt_msg": "mm/userfaultfd: fix uffd-wp special cases for fork()" + "CVE-2024-26668": { + "cmt_msg": "netfilter: nft_limit: reject configurations that cause integer overflow" }, - "CVE-2024-24859": { + "CVE-2024-26669": { + "cmt_msg": "net/sched: flower: Fix chain template offload" + }, + "CVE-2021-47146": { + "cmt_msg": "mld: fix panic in mld_newpack()" + }, + "CVE-2020-25220": { "cmt_msg": "" }, - "CVE-2024-24858": { + "CVE-2015-2877": { "cmt_msg": "" }, - "CVE-2024-24855": { - "cmt_msg": "scsi: lpfc: Fix a possible data race in lpfc_unregister_fcf_rescan()" + "CVE-2024-26661": { + "cmt_msg": "drm/amd/display: Add NULL test for 'timing generator' in 'dcn21_set_pipe()'" }, - "CVE-2024-24857": { + "CVE-2024-26662": { + "cmt_msg": "drm/amd/display: Fix 'panel_cntl' could be null in 'dcn21_set_backlight_level()'" + }, + "CVE-2023-26242": { "cmt_msg": "" }, - "CVE-2021-29264": { - "cmt_msg": "gianfar: fix jumbo packets+napi+rx overrun crash" + "CVE-2024-26664": { + "cmt_msg": "hwmon: (coretemp) Fix out-of-bounds memory access" }, - "CVE-2021-29265": { - "cmt_msg": "usbip: fix stub_dev usbip_sockfd_store() races leading to gpf" + "CVE-2024-26665": { + "cmt_msg": "tunnels: fix out of bounds access when building IPv6 PMTU error" }, - "CVE-2021-29266": { - "cmt_msg": "vhost-vdpa: fix use-after-free of v->config_ctx" + "CVE-2019-16089": { + "cmt_msg": "" }, - "CVE-2021-39648": { - "cmt_msg": "usb: gadget: configfs: Fix use-after-free issue with udc_name" + "CVE-2021-38198": { + "cmt_msg": "KVM: X86: MMU: Use the correct inherited permissions to get shadow page" }, - "CVE-2022-3545": { - "cmt_msg": "nfp: fix use-after-free in area_cache_get()" + "CVE-2021-38199": { + "cmt_msg": "NFSv4: Initialise connection to the server in nfs4_alloc_client()" }, - "CVE-2021-43056": { - "cmt_msg": "KVM: PPC: Book3S HV: Make idle_kvm_start_guest() return 0 if it went to guest" + "CVE-2024-26689": { + "cmt_msg": "ceph: prevent use-after-free in encode_cap_msg()" }, - "CVE-2022-3542": { - "cmt_msg": "bnx2x: fix potential memory leak in bnx2x_tpa_stop()" + "CVE-2022-1679": { + "cmt_msg": "ath9k: fix use-after-free in ath9k_hif_usb_rx_cb" }, - "CVE-2021-21781": { - "cmt_msg": "ARM: ensure the signal page contains defined contents" + "CVE-2023-1513": { + "cmt_msg": "kvm: initialize all of the kvm_debugregs structure before sending it to userspace" }, - "CVE-2021-0512": { - "cmt_msg": "HID: make arrays usage and value to be the same" + "CVE-2021-26401": { + "cmt_msg": "x86/speculation: Use generic retpoline by default on AMD" }, - "CVE-2023-1382": { - "cmt_msg": "tipc: set con sock in tipc_conn_alloc" + "CVE-2021-3847": { + "cmt_msg": "" }, - "CVE-2023-1380": { - "cmt_msg": "wifi: brcmfmac: slab-out-of-bounds read in brcmf_get_assoc_ies()" + "CVE-2023-4207": { + "cmt_msg": "net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free" }, - "CVE-2020-0347": { + "CVE-2023-52442": { + "cmt_msg": "ksmbd: validate session id and tree id in compound request" + }, + "CVE-2022-40768": { + "cmt_msg": "scsi: stex: Properly zero out the passthrough command structure" + }, + "CVE-2021-45486": { + "cmt_msg": "inet: use bigger hash table for IP ID generation" + }, + "CVE-2021-3923": { + "cmt_msg": "RDMA/core: Don't infoleak GRH fields" + }, + "CVE-2011-4917": { "cmt_msg": "" }, - "CVE-2020-12912": { - "cmt_msg": "hwmon: (amd_energy) modify the visibility of the counters" + "CVE-2021-45485": { + "cmt_msg": "ipv6: use prandom_u32() for ID generation" }, - "CVE-2021-40490": { - "cmt_msg": "ext4: fix race writing to an inline_data file while its xattrs are changing" + "CVE-2023-52448": { + "cmt_msg": "gfs2: Fix kernel NULL pointer dereference in gfs2_rgrp_dump" }, - "CVE-2021-33909": { - "cmt_msg": "seq_file: disallow extremely large seq buffer allocations" + "CVE-2023-52449": { + "cmt_msg": "mtd: Fix gluebi NULL pointer dereference caused by ftl notifier" }, - "CVE-2019-12456": { + "CVE-2023-23039": { "cmt_msg": "" }, - "CVE-2021-29646": { - "cmt_msg": "tipc: better validate user input in tipc_nl_retrieve_key()" + "CVE-2024-26718": { + "cmt_msg": "dm-crypt, dm-verity: disable tasklets" }, - "CVE-2021-29647": { - "cmt_msg": "net: qrtr: fix a kernel-infoleak in qrtr_recvmsg()" + "CVE-2024-26719": { + "cmt_msg": "nouveau: offload fence uevents work to workqueue" }, - "CVE-2021-33656": { - "cmt_msg": "vt: drop old FONT ioctls" + "CVE-2024-26715": { + "cmt_msg": "usb: dwc3: gadget: Fix NULL pointer dereference in dwc3_gadget_suspend" }, - "CVE-2021-33655": { - "cmt_msg": "fbcon: Disallow setting font bigger than screen size" + "CVE-2024-1312": { + "cmt_msg": "mm: lock_vma_under_rcu() must check vma->anon_vma under vma lock" }, - "CVE-2022-41858": { - "cmt_msg": "drivers: net: slip: fix NPD bug in sl_tx_timeout()" + "CVE-2023-3338": { + "cmt_msg": "Remove DECnet support from kernel" }, - "CVE-2022-3176": { - "cmt_msg": "io_uring: fix UAF due to missing POLLFREE handling" + "CVE-2024-26712": { + "cmt_msg": "powerpc/kasan: Fix addr error caused by page alignment" }, - "CVE-2023-1206": { - "cmt_msg": "tcp: Reduce chance of collisions in inet6_hashfn()." + "CVE-2024-26713": { + "cmt_msg": "powerpc/pseries/iommu: Fix iommu initialisation during DLPAR add" + } + } + }, + "4.9": { + "4.9": { + "CVE-2016-9576": { + "cmt_msg": "Don't feed anything but regular iovec's to blk_rq_map_user_iov", + "cmt_id": "a0ac402cfcdc904f9772e1762b3fda112dcc56a0" }, - "CVE-2022-41850": { - "cmt_msg": "HID: roccat: Fix use-after-free in roccat_read()" + "CVE-2016-10147": { + "cmt_msg": "crypto: mcryptd - Check mcryptd algorithm compatibility", + "cmt_id": "48a992727d82cb7db076fa15d372178743b1f4cd" }, - "CVE-2023-2985": { - "cmt_msg": "fs: hfsplus: fix UAF issue in hfsplus_put_super" + "CVE-2016-8399": { + "cmt_msg": "net: ping: check minimum size on ICMP header length", + "cmt_id": "0eab121ef8750a5c8637d51534d5e9143fb0633f" + } + }, + "4.9.1": { + "CVE-2016-10154": { + "cmt_msg": "cifs: Fix smbencrypt() to stop pointing a scatterlist at the stack", + "cmt_id": "7aa58e7ad53bd9536aa49a18ccd0778c728bf57d" }, - "CVE-2023-1637": { - "cmt_msg": "x86/speculation: Restore speculation related MSRs during S3 resume" + "CVE-2015-8709": { + "cmt_msg": "mm: Add a user_ns owner to mm_struct and fix ptrace permission checks", + "cmt_id": "694a95fa6dae4991f16cda333d897ea063021fed" + } + }, + "4.9.2": { + "CVE-2016-9588": { + "cmt_msg": "kvm: nVMX: Allow L1 to intercept software exceptions (#BP and #OF)", + "cmt_id": "3f618a0b872fea38c7d1d1f79eda40f88c6466c2" }, - "CVE-2022-2938": { - "cmt_msg": "psi: Fix uaf issue when psi trigger is destroyed while being polled" + "CVE-2016-10088": { + "cmt_msg": "sg_write()/bsg_write() is not fit to be called under KERNEL_DS", + "cmt_id": "3f3a6bbe6f9f5e895d8945494173594ee51632da" + } + }, + "4.9.3": { + "CVE-2016-10741": { + "cmt_msg": "xfs: don't BUG() on mixed direct and mapped I/O", + "cmt_id": "3978c5bb004312fd267aed7279fe64b119e126b0" + } + }, + "4.9.4": { + "CVE-2017-7273": { + "cmt_msg": "HID: hid-cypress: validate length of report", + "cmt_id": "2c867216c555f5897b327daed6240bfb9e489c97" + } + }, + "4.9.5": { + "CVE-2016-9191": { + "cmt_msg": "sysctl: Drop reference added by grab_header in proc_sys_readdir", + "cmt_id": "00cf64fbaa1e99d0420f2934f301c671ba298342" }, - "CVE-2022-3646": { - "cmt_msg": "nilfs2: fix leak of nilfs_root in case of writer thread creation failure" + "CVE-2017-5549": { + "cmt_msg": "USB: serial: kl5kusb105: fix line-state error handling", + "cmt_id": "58ede4beda662c4e1681fee4fae2174028a1a841" }, - "CVE-2021-45469": { - "cmt_msg": "f2fs: fix to do sanity check on last xattr entry in __f2fs_setxattr()" + "CVE-2017-5546": { + "cmt_msg": "mm/slab.c: fix SLAB freelist randomization duplicate entries", + "cmt_id": "8315c22ea879082bba365d46dd2cc7881fbfb49a" }, - "CVE-2022-1184": { - "cmt_msg": "ext4: verify dir block before splitting it" + "CVE-2017-5550": { + "cmt_msg": "fix a fencepost error in pipe_advance()", + "cmt_id": "d06367ac1730ded79aa78307126236bf83af95a3" }, - "CVE-2022-3642": { - "cmt_msg": "" + "CVE-2017-2583": { + "cmt_msg": "KVM: x86: fix emulation of \"MOV SS, null selector\"", + "cmt_id": "7718ffcf9a64830bbae148432f625346cde2f2d6" }, - "CVE-2022-3643": { - "cmt_msg": "xen/netback: Ensure protocol headers don't fall in the non-linear area" + "CVE-2017-2584": { + "cmt_msg": "KVM: x86: Introduce segmented_write_std", + "cmt_id": "736e77c07fba8b49cead504b885a82ce52c0ff10" + } + }, + "4.9.6": { + "CVE-2017-5547": { + "cmt_msg": "HID: corsair: fix DMA buffers on stack", + "cmt_id": "63df1ccb937f67fbefa0a77415b3a4d10434a09b" }, - "CVE-2024-0584": { - "cmt_msg": "ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet" + "CVE-2017-5551": { + "cmt_msg": "tmpfs: clear S_ISGID when setting posix ACLs", + "cmt_id": "782b361c93062f083bbc9a78928498218f950399" }, - "CVE-2019-15902": { - "cmt_msg": "unknown" + "CVE-2017-5548": { + "cmt_msg": "ieee802154: atusb: do not use the stack for buffers to make them DMA able", + "cmt_id": "86249aef233e6e05ba84f6c9aab9e6b890fc6ba7" }, - "CVE-2024-25739": { - "cmt_msg": "" + "CVE-2016-10764": { + "cmt_msg": "mtd: spi-nor: Off by one in cqspi_setup_flash()", + "cmt_id": "e55e6c026b7c49c4dcc33f4ebc330e660ecf3963" }, - "CVE-2023-3358": { - "cmt_msg": "HID: intel_ish-hid: Add check for ishtp_dma_tx_map" + "CVE-2016-10153": { + "cmt_msg": "libceph: introduce ceph_crypt() for in-place en/decryption", + "cmt_id": "ecf7ced8562811576cd02158d6ae8e44c1fb4671" + } + }, + "4.9.7": { + "CVE-2017-6001": { + "cmt_msg": "perf/core: Fix concurrent sys_perf_event_open() vs. 'move_group' race", + "cmt_id": "922813f4d66fb317e8602d058d03a1619af1ffd0" }, - "CVE-2024-0340": { - "cmt_msg": "vhost: use kzalloc() instead of kmalloc() followed by memset()" + "CVE-2017-5576": { + "cmt_msg": "drm/vc4: Fix an integer overflow in temporary allocation layout.", + "cmt_id": "b9edac54cb85da589ca809bf8dcf86e5cd3f41c0" }, - "CVE-2023-6535": { - "cmt_msg": "" + "CVE-2017-5577": { + "cmt_msg": "drm/vc4: Return -EINVAL on the overflow checks failing.", + "cmt_id": "cfba2a001d0e36905016bb4f87fc47245c944c36" }, - "CVE-2023-6536": { - "cmt_msg": "" + "CVE-2016-8405": { + "cmt_msg": "fbdev: color map copying bounds checking", + "cmt_id": "544160b6ea18670196d1173c099f2cced5075132" + } + }, + "4.9.9": { + "CVE-2016-10208": { + "cmt_msg": "ext4: validate s_first_meta_bg at mount time", + "cmt_id": "13e6ef99d23b05807e7f8a72f45e3d8260b61570" }, - "CVE-2021-33624": { - "cmt_msg": "bpf: Inherit expanded/patched seen count from old aux data" + "CVE-2017-8071": { + "cmt_msg": "HID: cp2112: fix sleep-while-atomic", + "cmt_id": "a18c4584a48931e8048508469bcdb53c6082221a" }, - "CVE-2021-27365": { - "cmt_msg": "scsi: iscsi: Ensure sysfs attributes are limited to PAGE_SIZE" + "CVE-2017-8072": { + "cmt_msg": "HID: cp2112: fix gpio-callback error handling", + "cmt_id": "7396685a1bca323b96fd79b836ae22b7569d7068" + } + }, + "4.9.10": { + "CVE-2017-2618": { + "cmt_msg": "selinux: fix off-by-one in setprocattr", + "cmt_id": "6cbaf7b94373743deb42fd410173aab81f8945fe" }, - "CVE-2021-3752": { - "cmt_msg": "Bluetooth: fix use-after-free error in lock_sock_nested()" + "CVE-2016-8636": { + "cmt_msg": "IB/rxe: Fix mem_check_range integer overflow", + "cmt_id": "b7dd5edc3dd9191f2cb1bd508279b0ff7274c5aa" + } + }, + "4.9.11": { + "CVE-2017-5897": { + "cmt_msg": "ip6_gre: fix ip6gre_err() invalid reads", + "cmt_id": "ae1768bbbc469b75662c6714957fe5886cc960c4" }, - "CVE-2021-27363": { - "cmt_msg": "scsi: iscsi: Restrict sessions and handles to admin capabilities" + "CVE-2017-8069": { + "cmt_msg": "rtl8150: Use heap buffers for all register access", + "cmt_id": "e898f6f008aa91c154c9c8fb7be3fb9ec4d333ec" }, - "CVE-2022-23036": { - "cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()" + "CVE-2017-8068": { + "cmt_msg": "pegasus: Use heap buffers for all register access", + "cmt_id": "878b015bcc726560b13be2d906caf6923428f05d" }, - "CVE-2018-17977": { - "cmt_msg": "" + "CVE-2017-5970": { + "cmt_msg": "ipv4: keep skb->dst around in presence of IP options", + "cmt_id": "f5b54446630a973e1f27b68599366bbd0ac53066" }, - "CVE-2024-1151": { - "cmt_msg": "net: openvswitch: limit the number of recursions from action sets" + "CVE-2017-5986": { + "cmt_msg": "sctp: avoid BUG_ON on sctp_wait_for_sndbuf", + "cmt_id": "00eff2ebbd229758e90659907724c14dd5a18339" }, - "CVE-2010-5321": { - "cmt_msg": "" + "CVE-2017-8070": { + "cmt_msg": "catc: Use heap buffer for memory size test", + "cmt_id": "970390fd5d53de0817b538350131edd2514a8321" }, - "CVE-2021-20322": { - "cmt_msg": "ipv6: make exception cache less predictible" + "CVE-2017-6214": { + "cmt_msg": "tcp: avoid infinite loop in tcp_splice_read()", + "cmt_id": "0f895f51a831d73ce24158534784aba5b2a72a9e" + } + }, + "4.9.13": { + "CVE-2017-6345": { + "cmt_msg": "net/llc: avoid BUG_ON() in skb_orphan()", + "cmt_id": "42b52783a59cc706c71cdc7096edce4a6f086fd3" }, - "CVE-2021-20320": { - "cmt_msg": "s390/bpf: Fix optimizing out zero-extensions" + "CVE-2017-6346": { + "cmt_msg": "packet: fix races in fanout_add()", + "cmt_id": "722737f27774b14be5a1d2d3b9281dcded7c48b2" }, - "CVE-2021-20321": { - "cmt_msg": "ovl: fix missing negative dentry check in ovl_rename()" + "CVE-2017-6347": { + "cmt_msg": "ip: fix IP_CHECKSUM handling", + "cmt_id": "481aedf869fbf2d4503ca0005dbd68b78422955a" }, - "CVE-2022-42896": { - "cmt_msg": "Bluetooth: L2CAP: Fix accepting connection request for invalid SPSM" + "CVE-2017-6348": { + "cmt_msg": "irda: Fix lockdep annotations in hashbin_delete().", + "cmt_id": "c2219da51664451149350e47321aa0fcf72a8b8f" }, - "CVE-2023-7192": { - "cmt_msg": "netfilter: ctnetlink: fix possible refcount leak in ctnetlink_create_conntrack()" + "CVE-2017-6074": { + "cmt_msg": "dccp: fix freeing skb too early for IPV6_RECVPKTINFO", + "cmt_id": "171d92a9d915d238e05285ca67faf30f554d7df7" + } + }, + "4.9.14": { + "CVE-2017-8066": { + "cmt_msg": "can: gs_usb: Don't use stack memory for USB transfers", + "cmt_id": "cec7abd27e878e3c83dc9af41ee87a2e9d483ac0" }, - "CVE-2022-3169": { - "cmt_msg": "nvme: ensure subsystem reset is single threaded" + "CVE-2017-5669": { + "cmt_msg": "ipc/shm: Fix shmat mmap nil-page protection", + "cmt_id": "270e84a1e6effd6c0c6e9b13b196b5fdaa392954" + } + }, + "4.9.15": { + "CVE-2017-2636": { + "cmt_msg": "tty: n_hdlc: get rid of racy n_hdlc.tbuf", + "cmt_id": "e5b9778761558ff3d239ed76925a1a7a734918ea" + } + }, + "4.9.16": { + "CVE-2017-8062": { + "cmt_msg": "dw2102: don't do DMA on stack", + "cmt_id": "06996254a605913cd7c1927d0e8a89b5138e110d" }, - "CVE-2022-36280": { - "cmt_msg": "drm/vmwgfx: Validate the box size for the snooped cursor" + "CVE-2017-8924": { + "cmt_msg": "USB: serial: io_ti: fix information leak in completion handler", + "cmt_id": "d0ef6ecee85e17742d8bce1559872cb542d6ccac" }, - "CVE-2022-1048": { - "cmt_msg": "ALSA: pcm: Fix races among concurrent hw_params and hw_free calls" + "CVE-2016-2188": { + "cmt_msg": "USB: iowarrior: fix NULL-deref at probe", + "cmt_id": "653418adaf1026a10e0c2e4e29b7319610117b33" }, - "CVE-2023-22995": { - "cmt_msg": "usb: dwc3: dwc3-qcom: Add missing platform_device_put() in dwc3_qcom_acpi_register_core" + "CVE-2017-6874": { + "cmt_msg": "ucount: Remove the atomicity from ucount->count", + "cmt_id": "ee6f7ee1e4cdb0098fee4593ddf11ca6028abef2" }, - "CVE-2024-21803": { - "cmt_msg": "" + "CVE-2017-8925": { + "cmt_msg": "USB: serial: omninet: fix reference leaks at open", + "cmt_id": "6d6c5895f45431579c20f4183b25183f0e3afc92" + } + }, + "4.9.20": { + "CVE-2017-7184": { + "cmt_msg": "xfrm_user: validate XFRM_MSG_NEWAE XFRMA_REPLAY_ESN_VAL replay_window", + "cmt_id": "64a5465799ee40e3d54d9da3037934cd4b7b502f" }, - "CVE-2023-22998": { - "cmt_msg": "drm/virtio: Fix NULL vs IS_ERR checking in virtio_gpu_object_shmem_init" + "CVE-2017-7374": { + "cmt_msg": "fscrypt: remove broken support for detecting keyring key revocation", + "cmt_id": "2984e52c75c657db7901f6189f02e0251ca963c2" + } + }, + "4.9.21": { + "CVE-2017-7187": { + "cmt_msg": "scsi: sg: check length passed to SG_NEXT_CMD_LEN", + "cmt_id": "c2a869527865c35b605877f966cb5d514fdc5fbb" + } + }, + "4.9.22": { + "CVE-2017-7261": { + "cmt_msg": "drm/vmwgfx: NULL pointer dereference in vmw_surface_define_ioctl()", + "cmt_id": "73ab72517b61ce4b27ceddec47dd5d6edafb556a" }, - "CVE-2023-4563": { - "cmt_msg": "netfilter: nf_tables: don't skip expired elements during walk" + "CVE-2017-7616": { + "cmt_msg": "mm/mempolicy.c: fix error handling in set_mempolicy and mbind.", + "cmt_id": "cddab768d13469d1e254fb8c0e1629f93c8dfaca" }, - "CVE-2021-3542": { - "cmt_msg": "" + "CVE-2017-7294": { + "cmt_msg": "drm/vmwgfx: fix integer overflow in vmw_surface_define_ioctl()", + "cmt_id": "4ddd24d54fedff301e8f020d7b9f70116383af31" + } + }, + "4.9.23": { + "CVE-2017-7308": { + "cmt_msg": "net/packet: fix overflow in check for priv area size", + "cmt_id": "16fc98c2479f5477f2df220acd9cb53686e33f4c" + } + }, + "4.9.24": { + "CVE-2017-6353": { + "cmt_msg": "sctp: deny peeloff operation on asocs with threads sleeping on it", + "cmt_id": "35b9d61ea910c1ebd4652b32cc7d713f6689b4f4" }, - "CVE-2022-20166": { - "cmt_msg": "drivers core: Use sysfs_emit and sysfs_emit_at for show(device *...) functions" + "CVE-2017-8063": { + "cmt_msg": "cxusb: Use a dma capable buffer also for reading", + "cmt_id": "fb00319317c152bf3528df13a54c28bf8c5daa55" }, - "CVE-2023-3220": { - "cmt_msg": "drm/msm/dpu: Add check for pstates" + "CVE-2017-8061": { + "cmt_msg": "dvb-usb-firmware: don't do DMA on stack", + "cmt_id": "28d1e8b7ef81d254583f68627095f8a85e39597d" }, - "CVE-2024-22099": { - "cmt_msg": "" + "CVE-2017-8067": { + "cmt_msg": "virtio-console: avoid DMA from stack", + "cmt_id": "86c6667f6a5f6bdb392d8ffbe58fbcbcf6db2704" }, - "CVE-2023-30456": { - "cmt_msg": "KVM: nVMX: add missing consistency checks for CR0 and CR4" + "CVE-2017-8064": { + "cmt_msg": "dvb-usb-v2: avoid use-after-free", + "cmt_id": "1992564156b5dc4ac73418e5b95e1a43f12f3cb1" }, - "CVE-2022-23041": { - "cmt_msg": "xen/9p: use alloc/free_pages_exact()" + "CVE-2017-7618": { + "cmt_msg": "crypto: ahash - Fix EINPROGRESS notification callback", + "cmt_id": "c10479591869177ae7ac0570b54ace6fbdeb57c2" }, - "CVE-2022-23040": { - "cmt_msg": "xen/xenbus: don't let xenbus_grant_ring() remove grants in error case" + "CVE-2017-7889": { + "cmt_msg": "mm: Tighten x86 /dev/mem with zeroing reads", + "cmt_id": "2c0ad235ac77f2fc2eee593bf06822cad772e0e2" }, - "CVE-2022-23042": { - "cmt_msg": "xen/netfront: react properly to failing gnttab_end_foreign_access_ref()" + "CVE-2017-2596": { + "cmt_msg": "kvm: fix page struct leak in handle_vmon", + "cmt_id": "75465e71ec3139b958d06d48dfc85720aed69b6a" + } + }, + "4.9.25": { + "CVE-2017-7472": { + "cmt_msg": "KEYS: fix keyctl_set_reqkey_keyring() to not leak thread keyrings", + "cmt_id": "174a74dbca2ddc7269c265598399c000e5b9b870" }, - "CVE-2018-12929": { - "cmt_msg": "" + "CVE-2016-9604": { + "cmt_msg": "KEYS: Disallow keyrings beginning with '.' to be joined as session keyrings", + "cmt_id": "a5c6e0a76817a3751f58d761aaff7c0b0c4001ff" + } + }, + "4.9.26": { + "CVE-2017-7477": { + "cmt_msg": "macsec: avoid heap overflow in skb_to_sgvec", + "cmt_id": "07389a140f48a3d5d223881bb01cef9f389e2844" }, - "CVE-2018-12928": { - "cmt_msg": "" + "CVE-2017-7645": { + "cmt_msg": "nfsd: check for oversized NFSv2/v3 arguments", + "cmt_id": "fc6445df466f37291a70937642068bda78802a5b" }, - "CVE-2020-36311": { - "cmt_msg": "KVM: SVM: Periodically schedule when unregistering regions on destroy" + "CVE-2017-2671": { + "cmt_msg": "ping: implement proper locking", + "cmt_id": "e88a8e0a23c23e09858a4f5caeb106da972e7934" }, - "CVE-2020-35519": { - "cmt_msg": "net/x25: prevent a couple of overflows" + "CVE-2017-7895": { + "cmt_msg": "nfsd: stricter decoding of write-like NFSv2/v3 ops", + "cmt_id": "d7809b9e99bb75e83bdd13dc70ce27df61faf5de" + } + }, + "4.9.27": { + "CVE-2017-10661": { + "cmt_msg": "timerfd: Protect the might cancel mechanism proper", + "cmt_id": "00cca9768ebe1ac4ac16366662dd9087b6e5f4e7" + } + }, + "4.9.28": { + "CVE-2017-9150": { + "cmt_msg": "bpf: don't let ldimm64 leak map addresses on unprivileged", + "cmt_id": "ced0a31e667fbf618591f0a76a8213018407cde0" }, - "CVE-2020-28941": { - "cmt_msg": "speakup: Do not let the line discipline be used several times" + "CVE-2017-10662": { + "cmt_msg": "f2fs: sanity check segment count", + "cmt_id": "93862955cbf485215f0677229292d0f358af55fc" + } + }, + "4.9.30": { + "CVE-2017-18360": { + "cmt_msg": "USB: serial: io_ti: fix div-by-zero in set_termios", + "cmt_id": "f9cd79e0ad1fa620ff34715d24ae1b671c97bc91" }, - "CVE-2023-31436": { - "cmt_msg": "net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg" + "CVE-2017-7487": { + "cmt_msg": "ipx: call ipxitf_put() in ioctl error path", + "cmt_id": "820adccd0e3be9bdd2384ca8fc4712108cfdf28b" }, - "CVE-2024-26592": { - "cmt_msg": "ksmbd: fix UAF issue in ksmbd_tcp_new_connection()" + "CVE-2017-8797": { + "cmt_msg": "nfsd: fix undefined behavior in nfsd4_layout_verify", + "cmt_id": "ea465551af30146efea215da58786ff732da70fb" }, - "CVE-2022-48619": { - "cmt_msg": "Input: add bounds checking to input_set_capability()" + "CVE-2017-1000363": { + "cmt_msg": "char: lp: fix possible integer overflow in lp_setup()", + "cmt_id": "5d263d94a870a774a24acb2a2cc1e79ef39c2416" + } + }, + "4.9.31": { + "CVE-2017-9077": { + "cmt_msg": "ipv6/dccp: do not inherit ipv6_mc_list from parent", + "cmt_id": "4bd8f5e38e5a1612ce4373068b518b14d3e38ec8" }, - "CVE-2020-10708": { - "cmt_msg": "" + "CVE-2017-9076": { + "cmt_msg": "ipv6/dccp: do not inherit ipv6_mc_list from parent", + "cmt_id": "4bd8f5e38e5a1612ce4373068b518b14d3e38ec8" }, - "CVE-2022-0400": { - "cmt_msg": "" + "CVE-2017-9075": { + "cmt_msg": "sctp: do not inherit ipv6_{mc|ac|fl}_list from parent", + "cmt_id": "5e7d9f0b3f729a64b99e58047f7bb0ff36acb759" }, - "CVE-2024-25741": { - "cmt_msg": "" + "CVE-2017-9074": { + "cmt_msg": "ipv6: Prevent overrun when parsing v6 header options", + "cmt_id": "a2c845e51a820549a6df5a1e8907ee754422119e" }, - "CVE-2021-0707": { - "cmt_msg": "dmabuf: fix use-after-free of dmabuf's file->f_inode" + "CVE-2017-9211": { + "cmt_msg": "crypto: skcipher - Add missing API setkey checks", + "cmt_id": "4472887cbd1373d7781bea9d8935f2d4968dd580" }, - "CVE-2022-26966": { - "cmt_msg": "sr9700: sanity check for packet length" + "CVE-2017-18221": { + "cmt_msg": "mlock: fix mlock count can not decrease in race condition", + "cmt_id": "1163e785b1506a4f46dbdee89bbab161dd742186" }, - "CVE-2021-42739": { - "cmt_msg": "media: firewire: firedtv-avc: fix a buffer overflow in avc_ca_pmt()" + "CVE-2017-8890": { + "cmt_msg": "dccp/tcp: do not inherit mc_list from parent", + "cmt_id": "4eed44029507acc666ac7afe9c6a8ea0abf857b7" }, - "CVE-2023-1989": { - "cmt_msg": "Bluetooth: btsdio: fix use after free bug in btsdio_remove due to unfinished work" + "CVE-2017-9242": { + "cmt_msg": "ipv6: fix out of bound writes in __ip6_append_data()", + "cmt_id": "304b41014acbdc5fa5126c86bac31dc41a245f9f" + } + }, + "4.9.32": { + "CVE-2017-9605": { + "cmt_msg": "drm/vmwgfx: Make sure backup_handle is always valid", + "cmt_id": "7860d0e5e2bf986d4bd06e7b029786747b5dc766" }, - "CVE-2021-37159": { - "cmt_msg": "usb: hso: fix error handling code of hso_create_net_device" + "CVE-2017-15274": { + "cmt_msg": "KEYS: fix dereferencing NULL payload with nonzero length", + "cmt_id": "1b253e023f8f75b109564a61d2050d818f75b4f3" + }, + "CVE-2017-7346": { + "cmt_msg": "drm/vmwgfx: limit the number of mip levels in vmw_gb_surface_define_ioctl()", + "cmt_id": "a76ff847013a7f6b1cd328381ca263ddcca12061" + }, + "CVE-2017-1000380": { + "cmt_msg": "ALSA: timer: Fix race between read and ioctl", + "cmt_id": "66e982d8f1a1f5e151377fe37612e9151e552dc9" + } + }, + "4.9.34": { + "CVE-2017-1000364": { + "cmt_msg": "mm: larger stack guard gap, between vmas", + "cmt_id": "cfc0eb403816c5c4f9667d959de5e22789b5421e" + }, + "CVE-2017-1000379": { + "cmt_msg": "mm: larger stack guard gap, between vmas", + "cmt_id": "cfc0eb403816c5c4f9667d959de5e22789b5421e" + } + }, + "4.9.35": { + "CVE-2017-10911": { + "cmt_msg": "xen-blkback: don't leak stack data via response ring", + "cmt_id": "4ae2cb91a6365a6472fad7f04785cc0420ea5ada" + }, + "CVE-2017-1000365": { + "cmt_msg": "fs/exec.c: account for argv/envp pointers", + "cmt_id": "3d6848e491df6abbf5fb5b1fabb7a5df2e2b8f4f" + }, + "CVE-2017-7482": { + "cmt_msg": "rxrpc: Fix several cases where a padded len isn't checked in ticket decode", + "cmt_id": "f2060387421109ac389dd209355918b566fc6f84" + } + }, + "4.9.36": { + "CVE-2017-18017": { + "cmt_msg": "netfilter: xt_TCPMSS: add more sanity tests on tcph->doff", + "cmt_id": "ced7689be60ddcac4b1746212c547e8817c5ae5e" + } + }, + "4.9.37": { + "CVE-2017-12146": { + "cmt_msg": "driver core: platform: fix race condition with driver_override", + "cmt_id": "c4c592b2c137e4451b7fdf76700ae9c98db133f5" + }, + "CVE-2017-10810": { + "cmt_msg": "drm/virtio: don't leak bo on drm_gem_object_init failure", + "cmt_id": "366d9207d9e002bf1a6d9da13a7f8f85b8a40c0b" + } + }, + "4.9.38": { + "CVE-2017-11176": { + "cmt_msg": "mqueue: fix a use-after-free in sys_mq_notify()", + "cmt_id": "e6952841ade0f937750c7748a812cb403bd744b0" + } + }, + "4.9.39": { + "CVE-2019-9457": { + "cmt_msg": "exec: Limit arg stack to at most 75% of _STK_LIM", + "cmt_id": "f31c4f65dd09319ba21cf825fa36daf0c1ddf958" }, - "CVE-2024-25744": { - "cmt_msg": "x86/coco: Disable 32-bit emulation by default on TDX and SEV" + "CVE-2018-14634": { + "cmt_msg": "exec: Limit arg stack to at most 75% of _STK_LIM", + "cmt_id": "f31c4f65dd09319ba21cf825fa36daf0c1ddf958" }, - "CVE-2022-25265": { - "cmt_msg": "" + "CVE-2017-11089": { + "cmt_msg": "cfg80211: Define nla_policy for NL80211_ATTR_LOCAL_MESH_POWER_MODE", + "cmt_id": "b68aa7dff96efc59fee40e25b8044017de21161a" }, - "CVE-2022-20368": { - "cmt_msg": "net/packet: fix slab-out-of-bounds access in packet_recvmsg()" + "CVE-2017-7541": { + "cmt_msg": "brcmfmac: fix possible buffer overflow in brcmf_cfg80211_mgmt_tx()", + "cmt_id": "414848bba6ab91fe12ca8105b4652c4aa6f4b574" }, - "CVE-2022-21499": { - "cmt_msg": "lockdown: also lock down previous kgdb use" + "CVE-2017-1000371": { + "cmt_msg": "binfmt_elf: use ELF_ET_DYN_BASE only for PIE", + "cmt_id": "63c2f8f8c41bf80af068f0b2aef4c0e2bdc32c4a" }, - "CVE-2024-23196": { - "cmt_msg": "" + "CVE-2017-1000370": { + "cmt_msg": "binfmt_elf: use ELF_ET_DYN_BASE only for PIE", + "cmt_id": "63c2f8f8c41bf80af068f0b2aef4c0e2bdc32c4a" + } + }, + "4.9.40": { + "CVE-2017-11473": { + "cmt_msg": "x86/acpi: Prevent out of bound access caused by broken ACPI tables", + "cmt_id": "036d59f40ac94964a1bbc8959f78f34efac71fd5" }, - "CVE-2023-4208": { - "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free" + "CVE-2017-18079": { + "cmt_msg": "Input: i8042 - fix crash at boot time", + "cmt_id": "5b50e0e74e2e5f084d18a03f6dedc67cfdb8db49" + } + }, + "4.9.41": { + "CVE-2017-7533": { + "cmt_msg": "dentry name snapshots", + "cmt_id": "ad25f11ed216d5ce3b5566b2f187b59fa3061b40" }, - "CVE-2022-47519": { - "cmt_msg": "wifi: wilc1000: validate length of IEEE80211_P2P_ATTR_OPER_CHANNEL attribute" + "CVE-2017-12762": { + "cmt_msg": "isdn/i4l: fix buffer overflow", + "cmt_id": "7b3a66739ff01fcd9b8007a18ddd29edd2cb74f7" + } + }, + "4.9.42": { + "CVE-2017-10663": { + "cmt_msg": "f2fs: sanity check checkpoint segno and blkoff", + "cmt_id": "0f442c5b2e4ac0b65027ed3374462f1c38675f7e" }, - "CVE-2022-3606": { - "cmt_msg": "" + "CVE-2017-8831": { + "cmt_msg": "saa7164: fix double fetch PCIe access condition", + "cmt_id": "12d17d78e3f74b5022f61eee7d6de082e472a401" }, - "CVE-2023-4206": { - "cmt_msg": "net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free" + "CVE-2017-7542": { + "cmt_msg": "ipv6: avoid overflow of offset in ip6_find_1stfragopt", + "cmt_id": "4a2ffe1707e3787f93a7d0ff2dec682a57ba25ad" + } + }, + "4.9.43": { + "CVE-2017-1000": { + "cmt_msg": "udp: consistently apply ufo or fragmentation", + "cmt_id": "33dc6a6a85f1d6ce71e7056d009b8a5fcbf10f70" }, - "CVE-2022-39188": { - "cmt_msg": "mmu_gather: Force tlb-flush VM_PFNMAP vmas" + "CVE-2017-1000112": { + "cmt_msg": "udp: consistently apply ufo or fragmentation", + "cmt_id": "33dc6a6a85f1d6ce71e7056d009b8a5fcbf10f70" }, - "CVE-2023-3640": { - "cmt_msg": "" + "CVE-2017-1000111": { + "cmt_msg": "packet: fix tp_reserve race in packet_set_ring", + "cmt_id": "e5841355061332f8b326e098949490345dba776b" + } + }, + "4.9.45": { + "CVE-2017-12134": { + "cmt_msg": "xen: fix bio vec merging", + "cmt_id": "6c7f3756d072050d612e5c5c04108f90f1985435" }, - "CVE-2023-20593": { - "cmt_msg": "x86/cpu/amd: Add a Zenbleed fix" + "CVE-2017-14140": { + "cmt_msg": "Sanitize 'move_pages()' permission checks", + "cmt_id": "61332dc598c3f223678b2d7192ccf3472c544799" }, - "CVE-2023-0160": { - "cmt_msg": "bpf, sockmap: fix deadlocks in the sockhash and sockmap" + "CVE-2018-10675": { + "cmt_msg": "mm/mempolicy: fix use after free when calling get_mempolicy", + "cmt_id": "91105f2c621ef0b3c40d6725475b6896eb06f954" + } + }, + "4.9.46": { + "CVE-2017-17053": { + "cmt_msg": "x86/mm: Fix use-after-free of ldt_struct", + "cmt_id": "3559de45c99a68c0b8c4956fc35367837df9161c" }, - "CVE-2022-2663": { - "cmt_msg": "netfilter: nf_conntrack_irc: Fix forged IP logic" + "CVE-2017-17052": { + "cmt_msg": "fork: fix incorrect fput of ->exe_file causing use-after-free", + "cmt_id": "b65b6ac52e0f8694aa3a4402d5f766b2bb9e94ef" + } + }, + "4.9.48": { + "CVE-2017-11600": { + "cmt_msg": "xfrm: policy: check policy direction value", + "cmt_id": "12a70ccaa6868163487f9a5ad97e1a91a397b453" + } + }, + "4.9.50": { + "CVE-2017-14340": { + "cmt_msg": "xfs: XFS_IS_REALTIME_INODE() should be false if no rt device present", + "cmt_id": "5b82e0e938af5d9dfb038e2483cb2a84e24584fd" }, - "CVE-2022-43750": { - "cmt_msg": "usb: mon: make mmapped memory read only" + "CVE-2017-1000251": { + "cmt_msg": "Bluetooth: Properly check L2CAP config option output buffer length", + "cmt_id": "6300c8bfafe032187f3cbaa43dbf7d306650c5ed" }, - "CVE-2023-51780": { - "cmt_msg": "atm: Fix Use-After-Free in do_vcc_ioctl" + "CVE-2017-9985": { + "cmt_msg": "ALSA: msnd: Optimize / harden DSP and MIDI loops", + "cmt_id": "03bea515b9a2f2a48d46a5a4bcc69be264afb6af" }, - "CVE-2023-0047": { - "cmt_msg": "mm, oom: do not trigger out_of_memory from the #PF" + "CVE-2017-9984": { + "cmt_msg": "ALSA: msnd: Optimize / harden DSP and MIDI loops", + "cmt_id": "03bea515b9a2f2a48d46a5a4bcc69be264afb6af" + } + }, + "4.9.51": { + "CVE-2017-14106": { + "cmt_msg": "tcp: initialize rcv_mss to TCP_MIN_MSS instead of 0", + "cmt_id": "a10c510179b369f7d1e8cf77f43ee2db900c1ac9" }, - "CVE-2023-0045": { - "cmt_msg": "x86/bugs: Flush IBP in ib_prctl_set()" + "CVE-2017-14497": { + "cmt_msg": "packet: Don't write vnet header beyond end of buffer", + "cmt_id": "8c623e5d03692dc478277185a0b907d53aea1b43" }, - "CVE-2023-4010": { - "cmt_msg": "" + "CVE-2017-7558": { + "cmt_msg": "sctp: Avoid out-of-bounds reads from address storage", + "cmt_id": "08d56d8a99bb82e134ba7704e4cfdabbcc16fc4f" + } + }, + "4.9.52": { + "CVE-2017-9059": { + "cmt_msg": "NFSv4: Fix callback server shutdown", + "cmt_id": "f609266b12d214437cf9d68245dc27f8d4f69836" }, - "CVE-2022-38457": { - "cmt_msg": "drm/vmwgfx: Remove rcu locks from user resources" + "CVE-2017-14991": { + "cmt_msg": "scsi: sg: fixup infoleak when using SG_GET_REQUEST_TABLE", + "cmt_id": "90cb12f6dc5ac45c51082721ec5bbe18850cf80f" }, - "CVE-2022-20424": { - "cmt_msg": "io_uring: remove io_identity" + "CVE-2017-14051": { + "cmt_msg": "scsi: qla2xxx: Fix an integer overflow in sysfs code", + "cmt_id": "2a913aecc4f746ce15eb1bec98b134aff4190ae2" }, - "CVE-2022-20422": { - "cmt_msg": "arm64: fix oops in concurrently setting insn_emulation sysctls" + "CVE-2017-0627": { + "cmt_msg": "media: uvcvideo: Prevent heap overflow when accessing mapped controls", + "cmt_id": "38993f320506d7ead26695218ba1481f250469d5" + } + }, + "4.9.53": { + "CVE-2020-14353": { + "cmt_msg": "KEYS: prevent creating a different user's keyrings", + "cmt_id": "bfe9d7b8e0f2d4a4bc8298e25597983ac662dac0" }, - "CVE-2022-20421": { - "cmt_msg": "binder: fix UAF of ref->proc caused by race condition" + "CVE-2017-14156": { + "cmt_msg": "video: fbdev: aty: do not leak uninitialized padding in clk to userspace", + "cmt_id": "64afde6f956dfcb719e329a9d2098b53e68d2755" }, - "CVE-2023-4385": { - "cmt_msg": "fs: jfs: fix possible NULL pointer dereference in dbFree()" + "CVE-2017-12153": { + "cmt_msg": "nl80211: check for the required netlink attributes presence", + "cmt_id": "c820441a7a52e3626aede8df94069a50a9e4efdb" }, - "CVE-2023-4387": { - "cmt_msg": "net: vmxnet3: fix possible use-after-free bugs in vmxnet3_rq_alloc_rx_buf()" + "CVE-2017-1000252": { + "cmt_msg": "KVM: VMX: Do not BUG() on out-of-bounds guest IRQ", + "cmt_id": "3d4213fac7d10e72859112c9100d8015ce442a3a" }, - "CVE-2019-19378": { - "cmt_msg": "" + "CVE-2017-12154": { + "cmt_msg": "kvm: nVMX: Don't allow L2 to access the hardware CR8", + "cmt_id": "86ef97b2dfd504fbc65f6b244a422db0c1b15797" }, - "CVE-2020-4788": { - "cmt_msg": "powerpc/64s: flush L1D on kernel entry" + "CVE-2017-18270": { + "cmt_msg": "KEYS: prevent creating a different user's keyrings", + "cmt_id": "bfe9d7b8e0f2d4a4bc8298e25597983ac662dac0" }, - "CVE-2022-36879": { - "cmt_msg": "xfrm: xfrm_policy: fix a possible double xfrm_pols_put() in xfrm_bundle_lookup()" + "CVE-2017-14489": { + "cmt_msg": "scsi: scsi_transport_iscsi: fix the issue that iscsi_if_rx doesn't parse nlmsg properly", + "cmt_id": "b42bf0f15cf70926f3a460e7517703fda6191ba7" }, - "CVE-2021-28691": { - "cmt_msg": "xen-netback: take a reference to the RX task thread" + "CVE-2017-12192": { + "cmt_msg": "KEYS: prevent KEYCTL_READ on negative key", + "cmt_id": "dda70d28c0ac191f128bfd3acfd800667ed86bdf" }, - "CVE-2021-39698": { - "cmt_msg": "wait: add wake_up_pollfree()" + "CVE-2017-15537": { + "cmt_msg": "x86/fpu: Don't let userspace set bogus xcomp_bv", + "cmt_id": "5e9b07f30d21295b83f2024ffb5a349d3af6f749" + } + }, + "4.9.55": { + "CVE-2017-0786": { + "cmt_msg": "brcmfmac: add length check in brcmf_cfg80211_escan_handler()", + "cmt_id": "4d3132d97aa753104ee35722352a895750a0fca5" }, - "CVE-2022-45934": { - "cmt_msg": "Bluetooth: L2CAP: Fix u8 overflow" + "CVE-2017-16526": { + "cmt_msg": "uwb: properly check kthread_run return value", + "cmt_id": "8ff7adb930d4a62f43dfc76220a988a043c510ff" }, - "CVE-2022-41674": { - "cmt_msg": "wifi: cfg80211: fix u8 overflow in cfg80211_update_notlisted_nontrans()" + "CVE-2017-15649": { + "cmt_msg": "packet: in packet_do_bind, test fanout with bind_lock held", + "cmt_id": "0f22167d3321a028c0b6edc2d5b2ab0e37a2ac53" }, - "CVE-2020-28588": { - "cmt_msg": "lib/syscall: fix syscall registers retrieval on 32-bit platforms" + "CVE-2017-16531": { + "cmt_msg": "USB: fix out-of-bounds in usb_set_configuration", + "cmt_id": "a6d4ce2e8b653ff7facde0d0051663fa4cf57b78" }, - "CVE-2022-2380": { - "cmt_msg": "video: fbdev: sm712fb: Fix crash in smtcfb_read()" + "CVE-2017-16530": { + "cmt_msg": "USB: uas: fix bug in handling of alternate settings", + "cmt_id": "d77606e93d819ad4b8f57511ff61a629ced49750" }, - "CVE-2022-0850": { - "cmt_msg": "ext4: fix kernel infoleak via ext4_extent_header" + "CVE-2017-16534": { + "cmt_msg": "USB: core: harden cdc_parse_cdc_header", + "cmt_id": "767f7a2cf33a135fe3f57010b51c3f6e92d7677d" }, - "CVE-2021-3759": { - "cmt_msg": "memcg: enable accounting of ipc resources" + "CVE-2017-16529": { + "cmt_msg": "ALSA: usb-audio: Check out-of-bounds access by corrupted buffer descriptor", + "cmt_id": "37b6d898388e78d92a13a8ab50c960d507c968d1" }, - "CVE-2021-4197": { - "cmt_msg": "cgroup: Use open-time credentials for process migraton perm checks" + "CVE-2018-9568": { + "cmt_msg": "net: Set sk_prot_creator when cloning sockets to the right proto", + "cmt_id": "cf2eaf16ab284e3c5b057dff4c68516cfeae62ba" }, - "CVE-2021-3612": { - "cmt_msg": "Input: joydev - prevent potential read overflow in ioctl" + "CVE-2017-1000255": { + "cmt_msg": "powerpc/64s: Use emergency stack for kernel TM Bad Thing program checks", + "cmt_id": "afebf5ef60da6d15e75398e41ea2817c7a2bb283" }, - "CVE-2020-24503": { - "cmt_msg": "" + "CVE-2017-7518": { + "cmt_msg": "KVM: x86: fix singlestepping over syscall", + "cmt_id": "922e562b2613ae713d661c4fc0f92662f4fe6c41" + } + }, + "4.9.57": { + "CVE-2017-16527": { + "cmt_msg": "ALSA: usb-audio: Kill stray URB at exiting", + "cmt_id": "e0c70289a1e334a60b54b54688f18e2ee38396a9" }, - "CVE-2020-24502": { - "cmt_msg": "" + "CVE-2017-16525": { + "cmt_msg": "USB: serial: console: fix use-after-free after failed setup", + "cmt_id": "063b57d556181c796294b1cdf4d649cebc12678a" }, - "CVE-2019-19449": { - "cmt_msg": "f2fs: fix to do sanity check on segment/section count" + "CVE-2017-16533": { + "cmt_msg": "HID: usbhid: fix out-of-bounds bug", + "cmt_id": "57265cddde308292af881ce634a5378dd4e25900" }, - "CVE-2021-3753": { - "cmt_msg": "vt_kdsetmode: extend console locking" + "CVE-2017-12188": { + "cmt_msg": "KVM: nVMX: update last_nonleaf_level when initializing nested EPT", + "cmt_id": "28955b03fac36829831e185e3ec2793f8eb18689" }, - "CVE-2020-24504": { - "cmt_msg": "ice: create scheduler aggregator node config and move VSIs" + "CVE-2017-15265": { + "cmt_msg": "ALSA: seq: Fix use-after-free at creating a port", + "cmt_id": "35b84860667ff081eee56b62f3db2a28ca8a3823" }, - "CVE-2020-11725": { - "cmt_msg": "" + "CVE-2017-12190": { + "cmt_msg": "fix unbalanced page refcounting in bio_map_user_iov", + "cmt_id": "5444d8ab9a1406af9f1bc2f00c26838637542480" + } + }, + "4.9.59": { + "CVE-2017-15299": { + "cmt_msg": "KEYS: don't let add_key() update an uninstantiated key", + "cmt_id": "da0c7503c0b886784bf8bcb279c7d71c1e50c438" }, - "CVE-2021-0937": { - "cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write" + "CVE-2017-16535": { + "cmt_msg": "USB: core: fix out-of-bounds access bug in usb_get_bos_descriptor()", + "cmt_id": "9d13d3e05be29056eeab610d9ad26b04c9231a04" }, - "CVE-2022-1263": { - "cmt_msg": "KVM: avoid NULL pointer dereference in kvm_dirty_ring_push" + "CVE-2017-15951": { + "cmt_msg": "KEYS: Fix race between updating and finding a negative key", + "cmt_id": "63c8e452554962f88c0952212c8a4202469d4914" + } + }, + "4.9.60": { + "CVE-2017-16939": { + "cmt_msg": "ipsec: Fix aborted xfrm policy dump crash", + "cmt_id": "543aabb7d14b2414f40b632e37b0921bd0af3a96" }, - "CVE-2021-35477": { - "cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4" + "CVE-2017-16643": { + "cmt_msg": "Input: gtco - fix potential out-of-bound access", + "cmt_id": "52f65e35c2b85908fa66cfc265be4e3fd88744a3" }, - "CVE-2021-0938": { - "cmt_msg": "compiler.h: fix barrier_data() on clang" + "CVE-2017-12193": { + "cmt_msg": "assoc_array: Fix a buggy node-splitting case", + "cmt_id": "67bcc5e530d55e646b7324038c926c2bde735a7e" }, - "CVE-2022-3521": { - "cmt_msg": "kcm: avoid potential race in kcm_tx_work" + "CVE-2017-15306": { + "cmt_msg": "KVM: PPC: Fix oops when checking KVM_CAP_PPC_HTM", + "cmt_id": "474cb9e0f02fdabadfc5ecc17b9afbb0ca6aa15a" + } + }, + "4.9.63": { + "CVE-2018-7191": { + "cmt_msg": "tun: call dev_get_valid_name() before register_netdevice()", + "cmt_id": "3e2ab0ceef68ab995bc9f7c699e62b95c0edcdc4" }, - "CVE-2022-47929": { - "cmt_msg": "net: sched: disallow noqueue for qdisc classes" + "CVE-2017-13080": { + "cmt_msg": "mac80211: accept key reinstall without changing anything", + "cmt_id": "2586fa0007dc6b7745da14250be7e3aae706b128" }, - "CVE-2021-41864": { - "cmt_msg": "bpf: Fix integer overflow in prealloc_elems_and_freelist()" + "CVE-2017-16645": { + "cmt_msg": "Input: ims-psu - check if CDC union descriptor is sane", + "cmt_id": "9d65d0ea55dcb813cea7df05602f233ad4843baf" }, - "CVE-2022-2209": { - "cmt_msg": "" + "CVE-2017-16528": { + "cmt_msg": "ALSA: seq: Cancel pending autoload work at unbinding device", + "cmt_id": "1862eca99e2732da2594e05406c9f78b4265bf5b" }, - "CVE-2021-37576": { - "cmt_msg": "KVM: PPC: Book3S: Fix H_RTAS rets buffer overflow" + "CVE-2017-16532": { + "cmt_msg": "usb: usbtest: fix NULL pointer dereference", + "cmt_id": "8cf061d919e2102d0de0379bafea6cce1405d786" + } + }, + "4.9.64": { + "CVE-2017-16646": { + "cmt_msg": "media: dib0700: fix invalid dvb_detach argument", + "cmt_id": "49c1e5f032382713933a86fa1077c438b430f6fc" }, - "CVE-2023-7042": { - "cmt_msg": "" + "CVE-2017-16537": { + "cmt_msg": "media: imon: Fix null-ptr-deref in imon_probe", + "cmt_id": "ca98a5c721703de77f7fb8bbafd0673e4a60a841" + } + }, + "4.9.65": { + "CVE-2017-18204": { + "cmt_msg": "ocfs2: should wait dio before inode lock in ocfs2_setattr()", + "cmt_id": "8af777385f7a3e693f5e79fb4655aebf881156e6" }, - "CVE-2022-3594": { - "cmt_msg": "r8152: Rate limit overflow messages" + "CVE-2017-16647": { + "cmt_msg": "net: usb: asix: fill null-ptr-deref in asix_suspend", + "cmt_id": "58baa36d3728eea14884f74817d5749b32b0cdeb" }, - "CVE-2022-3595": { - "cmt_msg": "cifs: fix double-fault crash during ntlmssp" + "CVE-2017-16994": { + "cmt_msg": "mm/pagewalk.c: report holes in hugetlb ranges", + "cmt_id": "ceaec6e8cd98c8fd87701ddfb7468a13d989d79d" }, - "CVE-2023-47233": { - "cmt_msg": "" + "CVE-2017-16650": { + "cmt_msg": "net: qmi_wwan: fix divide by 0 on bad descriptors", + "cmt_id": "02a0c0639ae07beab982bbad4527b40da96d33ff" }, - "CVE-2020-27815": { - "cmt_msg": "jfs: Fix array index bounds check in dbAdjTree" + "CVE-2017-16649": { + "cmt_msg": "net: cdc_ether: fix divide by 0 on bad descriptors", + "cmt_id": "f376621861e3d8a713d6931f4363c4137912330b" }, - "CVE-2022-1462": { - "cmt_msg": "tty: use new tty_insert_flip_string_and_push_buffer() in pty_write()" + "CVE-2017-15115": { + "cmt_msg": "sctp: do not peel off an assoc from one netns to another one", + "cmt_id": "362d2ce0f851653d2eed87fdb8891ab4cfb0c2bf" + } + }, + "4.9.66": { + "CVE-2017-18203": { + "cmt_msg": "dm: fix race between dm_get_from_kobject() and __dm_destroy()", + "cmt_id": "1cd9686e0a3b5b5a09a2025c21cd4d92e8db0e1f" }, - "CVE-2023-6606": { - "cmt_msg": "smb: client: fix OOB in smbCalcSize()" + "CVE-2017-16536": { + "cmt_msg": "cx231xx-cards: fix NULL-deref on missing association descriptor", + "cmt_id": "38c043d26c97a04332df960200a389bc4141ff21" + } + }, + "4.9.67": { + "CVE-2017-18208": { + "cmt_msg": "mm/madvise.c: fix madvise() infinite loop under special circumstances", + "cmt_id": "ba32d7dce43f14ef1a1cb0540959431526cf7fe0" }, - "CVE-2020-27777": { - "cmt_msg": "powerpc/rtas: Restrict RTAS requests from userspace" + "CVE-2017-1000405": { + "cmt_msg": "mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d()", + "cmt_id": "7031ae2ab37d3df53c4a4e9903329a5d38c745ec" + } + }, + "4.9.68": { + "CVE-2017-18202": { + "cmt_msg": "mm, oom_reaper: gather each vma to prevent leaking TLB entry", + "cmt_id": "ee23ae915fa74956503507c1e55cbb2102f349ec" + } + }, + "4.9.69": { + "CVE-2017-17807": { + "cmt_msg": "KEYS: add missing permission check for request_key() destination", + "cmt_id": "982707eb4ff84d4ae21618c02dd8926801b10a07" }, - "CVE-2022-3112": { - "cmt_msg": "media: meson: vdec: potential dereference of null pointer" + "CVE-2017-0861": { + "cmt_msg": "ALSA: pcm: prevent UAF in snd_pcm_info", + "cmt_id": "45ddff3ce4e9a3d7e935d5b596686d9e176ed4a9" }, - "CVE-2020-27673": { - "cmt_msg": "xen/events: add a proper barrier to 2-level uevent unmasking" + "CVE-2017-1000407": { + "cmt_msg": "KVM: VMX: remove I/O port 0x80 bypass on Intel hosts", + "cmt_id": "6ead44d4b5b8b1ecfcbd2302f15028dab7774da3" + } + }, + "4.9.70": { + "CVE-2018-7492": { + "cmt_msg": "rds: Fix NULL pointer dereference in __rds_rdma_map", + "cmt_id": "3259862dd73bfb9d9b7a647ea77cb20ba8b179a4" }, - "CVE-2020-27675": { - "cmt_msg": "xen/events: avoid removing an event channel while handling it" + "CVE-2018-18559": { + "cmt_msg": "net/packet: fix a race in packet_bind() and packet_notifier()", + "cmt_id": "5471afeef41388ec08e6cf610640aaf89805d6db" + } + }, + "4.9.71": { + "CVE-2017-16913": { + "cmt_msg": "usbip: fix stub_rx: harden CMD_SUBMIT path to handle malicious input", + "cmt_id": "f3e957266ae56c200fb13a42309c50f84576c64a" }, - "CVE-2023-52439": { - "cmt_msg": "uio: Fix use-after-free in uio_open" + "CVE-2017-16912": { + "cmt_msg": "usbip: fix stub_rx: get_pipe() to validate endpoint number", + "cmt_id": "20e825cdf7a1627f92371d45a5322ccecdebcb3b" }, - "CVE-2023-52438": { - "cmt_msg": "binder: fix use-after-free in shinker's callback" + "CVE-2017-16914": { + "cmt_msg": "usbip: fix stub_send_ret_submit() vulnerability to null transfer_buffer", + "cmt_id": "14513e49c43cd3149a03ff9e1c223c3d5803ad09" }, - "CVE-2023-3776": { - "cmt_msg": "net/sched: cls_fw: Fix improper refcount update leads to use-after-free" + "CVE-2017-17558": { + "cmt_msg": "USB: core: prevent malicious bNumInterfaces overflow", + "cmt_id": "99542e468b76ae180675566692e0528c4c712661" }, - "CVE-2021-28038": { - "cmt_msg": "Xen/gnttab: handle p2m update errors on a per-slot basis" + "CVE-2017-17806": { + "cmt_msg": "crypto: hmac - require that the underlying hash algorithm is unkeyed", + "cmt_id": "43259d07fceb8cc1f5ba7e8003ae19023e0620f5" }, - "CVE-2022-3111": { - "cmt_msg": "power: supply: wm8350-power: Add missing free in free_charger_irq" + "CVE-2017-17805": { + "cmt_msg": "crypto: salsa20 - fix blkcipher_walk API usage", + "cmt_id": "c32e053a11f231376f0899ef906fd43f8fc8dbd0" + } + }, + "4.9.72": { + "CVE-2017-17862": { + "cmt_msg": "bpf: fix branch pruning logic", + "cmt_id": "7b5b73ea87a06236fa124bdebed1390d362d3439" }, - "CVE-2023-52435": { - "cmt_msg": "net: prevent mss overflow in skb_segment()" + "CVE-2017-16995": { + "cmt_msg": "bpf: fix incorrect sign extension in check_alu_op()", + "cmt_id": "3695b3b18519099224efbc5875569d2cb6da256d" + } + }, + "4.9.73": { + "CVE-2017-17863": { + "cmt_msg": "bpf: fix integer overflows", + "cmt_id": "37435f7e80ef9adc32a69013c18f135e3f434244" + } + }, + "4.9.74": { + "CVE-2017-17712": { + "cmt_msg": "net: ipv4: fix for a race condition in raw_sendmsg", + "cmt_id": "f75f910ffa90af17eeca18714847eaa0f16cb4ad" }, - "CVE-2023-52434": { - "cmt_msg": "smb: client: fix potential OOBs in smb2_parse_contexts()" + "CVE-2017-18595": { + "cmt_msg": "tracing: Fix possible double free on failure of allocating trace buffer", + "cmt_id": "5dc4cd2688e39b0286e9a4b815c9bf5e71b5a685" }, - "CVE-2021-31829": { - "cmt_msg": "bpf: Fix masking negation logic upon negative dst register" + "CVE-2017-15129": { + "cmt_msg": "net: Fix double free and memory corruption in get_net_ns_by_id()", + "cmt_id": "03c93293a83a603fc5b87fc15321f392d3cf0043" }, - "CVE-2023-52436": { - "cmt_msg": "f2fs: explicitly null-terminate the xattr list" + "CVE-2018-18386": { + "cmt_msg": "n_tty: fix EXTPROC vs ICANON interaction with TIOCINQ (aka FIONREAD)", + "cmt_id": "00fc57ae06c3519a5e32e39882549e4e1f6328fb" }, - "CVE-2022-2964": { - "cmt_msg": "net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup" + "CVE-2017-17449": { + "cmt_msg": "netlink: Add netns check on taps", + "cmt_id": "0b18782288a2f1c2a25e85d2553c15ea83bb5802" + } + }, + "4.9.76": { + "CVE-2017-18075": { + "cmt_msg": "crypto: pcrypt - fix freeing pcrypt instances", + "cmt_id": "c195a4c0230d7a1dafb53cdbd5eed4dea4493504" + } + }, + "4.9.77": { + "CVE-2017-17741": { + "cmt_msg": "KVM: Fix stack-out-of-bounds read in write_mmio", + "cmt_id": "c781e3be97a1cbeef8c853101e8f266db556b0a3" }, - "CVE-2022-2961": { - "cmt_msg": "" + "CVE-2017-5753": { + "cmt_msg": "x86/cpufeatures: Add X86_BUG_SPECTRE_V[12]", + "cmt_id": "26323fb4d717e11a69484c6df02eeef90dba7ef2" }, - "CVE-2021-3506": { - "cmt_msg": "f2fs: fix to avoid out-of-bounds memory access" + "CVE-2017-1000410": { + "cmt_msg": "Bluetooth: Prevent stack info leak from the EFS element.", + "cmt_id": "6aebc2670ebfdda0762a6b471fbf8ca18dcf44f2" }, - "CVE-2023-51779": { - "cmt_msg": "Bluetooth: af_bluetooth: Fix Use-After-Free in bt_sock_recvmsg" + "CVE-2018-5333": { + "cmt_msg": "RDS: null pointer dereference in rds_atomic_free_op", + "cmt_id": "ce31b6ac1111096ae9bb0b45f4ba564a909bb366" }, - "CVE-2023-3268": { - "cmt_msg": "relayfs: fix out-of-bounds access in relay_file_read" + "CVE-2018-5332": { + "cmt_msg": "RDS: Heap OOB write in rds_message_alloc_sgs()", + "cmt_id": "cebb382931c4fb341162eae80b696650260e4a2b" }, - "CVE-2022-40133": { - "cmt_msg": "drm/vmwgfx: Remove rcu locks from user resources" + "CVE-2017-13216": { + "cmt_msg": "staging: android: ashmem: fix a race condition in ASHMEM_SET_SIZE ioctl", + "cmt_id": "c51d23dffc2e9ca05d611c86c440f9055541c62d" }, - "CVE-2023-6915": { - "cmt_msg": "ida: Fix crash in ida_free when the bitmap is empty" + "CVE-2017-5715": { + "cmt_msg": "x86/cpufeatures: Add X86_BUG_SPECTRE_V[12]", + "cmt_id": "26323fb4d717e11a69484c6df02eeef90dba7ef2" + } + }, + "4.9.78": { + "CVE-2018-6927": { + "cmt_msg": "futex: Prevent overflow by strengthen input validation", + "cmt_id": "d8a3170db0deca6bfee32ad77f492caba9f6791d" }, - "CVE-2010-4563": { - "cmt_msg": "" + "CVE-2018-1000004": { + "cmt_msg": "ALSA: seq: Make ioctls race-free", + "cmt_id": "e4ff9f294629b65df3f7982cd4faf86b2856b9d7" + } + }, + "4.9.79": { + "CVE-2017-16911": { + "cmt_msg": "usbip: prevent vhci_hcd driver from leaking a socket pointer address", + "cmt_id": "ce601a07bc504b4748f8e7a34896684f79514e51" }, - "CVE-2023-1249": { - "cmt_msg": "coredump: Use the vma snapshot in fill_files_note" + "CVE-2017-11472": { + "cmt_msg": "ACPICA: Namespace: fix operand cache leak", + "cmt_id": "2915f16bdce204621695e7a0dfcd5f73b120cccb" }, - "CVE-2023-2163": { - "cmt_msg": "bpf: Fix incorrect verifier pruning due to missing register precision taints" + "CVE-2018-1000028": { + "cmt_msg": "nfsd: auth: Fix gid sorting when rootsquash enabled", + "cmt_id": "f12d0602633decf073796f3aaa59eec7ff2da9e2" }, - "CVE-2023-2162": { - "cmt_msg": "scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress" + "CVE-2017-17450": { + "cmt_msg": "netfilter: xt_osf: Add missing permission checks", + "cmt_id": "898eeca02a55e354c42a7aa5cdfebf16c3742f44" }, - "CVE-2023-45871": { - "cmt_msg": "igb: set max size RX buffer when store bad packet is enabled" + "CVE-2017-17448": { + "cmt_msg": "netfilter: nfnetlink_cthelper: Add missing permission checks", + "cmt_id": "2c3184ea80322347287bc7e57f782d77f478e73c" + } + }, + "4.9.80": { + "CVE-2018-5344": { + "cmt_msg": "loop: fix concurrent lo_open/lo_release", + "cmt_id": "56bc086358cac1a2949783646eabd57447b9d672" + } + }, + "4.9.81": { + "CVE-2017-5754": { + "cmt_msg": "x86/cpufeatures: Add Intel feature bits for Speculation Control", + "cmt_id": "40532f65cccc5056b50cf1ab07a9a41445b24aa8" }, - "CVE-2024-23851": { - "cmt_msg": "dm: limit the number of targets and parameter size area" + "CVE-2017-13305": { + "cmt_msg": "KEYS: encrypted: fix buffer overread in valid_master_desc()", + "cmt_id": "9692602ab850eec484d8cc5a740803d34f00016c" + } + }, + "4.9.82": { + "CVE-2018-5873": { + "cmt_msg": "nsfs: mark dentry with DCACHE_RCUACCESS", + "cmt_id": "daaa81c48402da28cc9e32ad55c48fb05e61b005" }, - "CVE-2023-0266": { - "cmt_msg": "ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF" + "CVE-2017-8824": { + "cmt_msg": "dccp: CVE-2017-8824: use-after-free in DCCP code", + "cmt_id": "7e2fb808d3c7c52f88ebc670949dbf1bae48f2a2" }, - "CVE-2023-1838": { - "cmt_msg": "Fix double fget() in vhost_net_set_backend()" + "CVE-2017-16538": { + "cmt_msg": "media: dvb-usb-v2: lmedm04: Improve logic checking of warm start", + "cmt_id": "1ff1353a03c6cde5334a94cb67f8632141b0589b" }, - "CVE-2021-3483": { - "cmt_msg": "firewire: nosy: Fix a use-after-free bug in nosy_ioctl()" + "CVE-2017-16644": { + "cmt_msg": "media: hdpvr: Fix an error handling path in hdpvr_probe()", + "cmt_id": "198a7ddaf5d2c76130b28f19ed6d768860ea2b8e" }, - "CVE-2021-3489": { - "cmt_msg": "bpf, ringbuf: Deny reserve of buffers larger than ringbuf" + "CVE-2017-18344": { + "cmt_msg": "posix-timer: Properly check sigevent->sigev_notify", + "cmt_id": "0b376535ad5493d2fcf70ab5f6539551aadb493e" }, - "CVE-2021-38300": { - "cmt_msg": "bpf, mips: Validate conditional branch offsets" + "CVE-2018-5750": { + "cmt_msg": "ACPI: sbshc: remove raw pointer from printk() message", + "cmt_id": "623c28ee02b36a9f45780be0ded6d13ad74e2d0e" + } + }, + "4.9.83": { + "CVE-2018-7566": { + "cmt_msg": "ALSA: seq: Fix racy pool initializations", + "cmt_id": "869182f45e38e4c62722b20a5c6f4bc48b2e60c3" + } + }, + "4.9.86": { + "CVE-2017-18193": { + "cmt_msg": "f2fs: fix a bug caused by NULL extent tree", + "cmt_id": "4a97b2d09d332c43612f489c99b97d691002b6d4" + } + }, + "4.9.87": { + "CVE-2018-5803": { + "cmt_msg": "sctp: verify size of a new chunk in _sctp_make_chunk()", + "cmt_id": "9b7d723439a444ea578462f50054641a09c45023" + } + }, + "4.9.88": { + "CVE-2018-1068": { + "cmt_msg": "netfilter: ebtables: CONFIG_COMPAT: don't trust userland offsets", + "cmt_id": "21ff147189ff0692d203282c1dced02f83dcf785" }, - "CVE-2020-25656": { - "cmt_msg": "vt: keyboard, extend func_buf_lock to readers" + "CVE-2018-7995": { + "cmt_msg": "x86/MCE: Serialize sysfs changes", + "cmt_id": "2cc98fddf0f4a746071e098075a832fbec4bbfff" }, - "CVE-2022-24448": { - "cmt_msg": "NFSv4: Handle case where the lookup of a directory fails" + "CVE-2018-1065": { + "cmt_msg": "netfilter: add back stackpointer size checks", + "cmt_id": "f506da51bdf6602ec942f25d682a4de9b59760da" }, - "CVE-2024-26598": { - "cmt_msg": "KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache" + "CVE-2019-9456": { + "cmt_msg": "usb: usbmon: Read text within supplied buffer size", + "cmt_id": "63f3bac3bedcf415d789ff3ae8fb1361e4ab104e" + } + }, + "4.9.89": { + "CVE-2018-7480": { + "cmt_msg": "blkcg: fix double free of new_blkg in blkcg_init_queue", + "cmt_id": "7bd2d0c746f1fac2fb7f2ee972767cbc8be60962" + } + }, + "4.9.90": { + "CVE-2017-18222": { + "cmt_msg": "net: hns: fix ethtool_get_strings overflow in hns driver", + "cmt_id": "b2a863dba3defce5f37af95007999ce9f48f8af6" }, - "CVE-2021-4023": { - "cmt_msg": "io-wq: fix cancellation on create-worker failure" + "CVE-2018-1066": { + "cmt_msg": "CIFS: Enable encryption during session setup phase", + "cmt_id": "df09b6f7b54adba78693997096d0bcb1bd80537c" + } + }, + "4.9.91": { + "CVE-2018-8822": { + "cmt_msg": "staging: ncpfs: memory corruption in ncp_read_kernel()", + "cmt_id": "5e7124c4d6786488198b192f90491e5a5ba51230" }, - "CVE-2021-22555": { - "cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write" + "CVE-2018-8781": { + "cmt_msg": "drm: udl: Properly check framebuffer mmap offsets", + "cmt_id": "4ac9ab4f5f45d1ad0585c7bfa9ccff43b9984045" }, - "CVE-2020-36694": { - "cmt_msg": "netfilter: x_tables: Switch synchronization to RCU" + "CVE-2018-1087": { + "cmt_msg": "kvm/x86: fix icebp instruction handling", + "cmt_id": "587da2b6282302325bd4bcc28a7615e822184ff1" }, - "CVE-2021-0399": { - "cmt_msg": "" + "CVE-2018-8897": { + "cmt_msg": "x86/entry/64: Don't use IST entry for #BP stack", + "cmt_id": "3681c24a7d096b092cf05c8338adbb9019bb1536" + } + }, + "4.9.92": { + "CVE-2017-18218": { + "cmt_msg": "net: hns: Fix a skb used after free bug", + "cmt_id": "a8f4be0168d5bf0c8838ca08301ae5341208dfba" }, - "CVE-2023-42755": { - "cmt_msg": "net/sched: Retire rsvp classifier" + "CVE-2018-1130": { + "cmt_msg": "dccp: check sk for closed state in dccp_sendmsg()", + "cmt_id": "1fdc00c1503f2164893454958cf62c3bf4eff8d6" + } + }, + "4.9.93": { + "CVE-2018-1000199": { + "cmt_msg": "perf/hwbp: Simplify the perf-hwbp code, fix documentation", + "cmt_id": "7614f7db9bee160c5e8d298919af3f28941fc703" }, - "CVE-2020-36516": { - "cmt_msg": "ipv4: avoid using shared IP generator for connected sockets" + "CVE-2017-17975": { + "cmt_msg": "media: usbtv: prevent double free in error case", + "cmt_id": "50cd7759a34104c3acb510e644355d4ae8010851" + } + }, + "4.9.94": { + "CVE-2018-7757": { + "cmt_msg": "scsi: libsas: fix memory leak in sas_smp_get_phy_events()", + "cmt_id": "0ef71347d2e8db15ab0f8c7b79cf2c38d34d1870" + } + }, + "4.9.96": { + "CVE-2018-1108": { + "cmt_msg": "random: fix crng_ready() test", + "cmt_id": "4dfb3442bb7e1fb80515df4a199ca5a7a8edf900" }, - "CVE-2012-4542": { - "cmt_msg": "" + "CVE-2018-20961": { + "cmt_msg": "USB: gadget: f_midi: fixing a possible double-free in f_midi", + "cmt_id": "b3b0809ac25c3ffedc58e7f83bc01a03193e7834" }, - "CVE-2023-42753": { - "cmt_msg": "netfilter: ipset: add the missing IP_SET_HASH_WITH_NET0 macro for ip_set_hash_netportnet.c" + "CVE-2018-1092": { + "cmt_msg": "ext4: fail ext4_iget for root directory if unallocated", + "cmt_id": "6b289a7c34d72212bcd5a8ab9b6a657f2f44f0ee" + } + }, + "4.9.97": { + "CVE-2018-10940": { + "cmt_msg": "cdrom: information leak in cdrom_ioctl_media_changed()", + "cmt_id": "4bd744b86114a406efb563c8717e5bea7672d427" + } + }, + "4.9.98": { + "CVE-2018-9415": { + "cmt_msg": "ARM: amba: Fix race condition with driver_override", + "cmt_id": "272c99cf85a371401b78f3c56a18745bf07817a3" }, - "CVE-2023-42752": { - "cmt_msg": "igmp: limit igmpv3_newpack() packet size to IP_MAX_MTU" + "CVE-2018-9385": { + "cmt_msg": "ARM: amba: Don't read past the end of sysfs \"driver_override\" buffer", + "cmt_id": "8970c12ac9b917b27e42c0537ab7fce0357f0cf3" }, - "CVE-2023-4128": { - "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free" + "CVE-2018-1093": { + "cmt_msg": "ext4: add validity checks for bitmap block numbers", + "cmt_id": "76964816c83d3e4e8a6a393777b30f22a6f9cd51" + } + }, + "4.9.99": { + "CVE-2017-18255": { + "cmt_msg": "perf/core: Fix the perf_cpu_time_max_percent check", + "cmt_id": "0f8a75e90963019cef486565f2b088bb570a7ddb" + } + }, + "4.9.100": { + "CVE-2017-18257": { + "cmt_msg": "f2fs: fix a dead loop in f2fs_fiemap()", + "cmt_id": "b8bf4b886b82585202ab4ee169718656661cb89e" + } + }, + "4.9.101": { + "CVE-2018-1120": { + "cmt_msg": "proc: do not access cmdline nor environ from file-backed areas", + "cmt_id": "6f1abf8628b750905606996fd5ff5ea22d149238" }, - "CVE-2022-44034": { - "cmt_msg": "char: pcmcia: remove all the drivers" + "CVE-2018-10087": { + "cmt_msg": "kernel/exit.c: avoid undefined behaviour when calling wait4()", + "cmt_id": "04103c29b6cc1ffcf9efe167a07e882be68f8367" + } + }, + "4.9.102": { + "CVE-2018-5814": { + "cmt_msg": "usbip: usbip_host: fix NULL-ptr deref and use-after-free errors", + "cmt_id": "f2a6d5f19450086e5cbdac7168d3fc75af32becf" }, - "CVE-2023-4244": { - "cmt_msg": "netfilter: nf_tables: fix GC transaction races with netns and netlink event exit path" + "CVE-2018-3639": { + "cmt_msg": "x86/nospec: Simplify alternative_msr_write()", + "cmt_id": "741c026d1a0c594f7ad509f44488ef29582fed74" + } + }, + "4.9.103": { + "CVE-2018-10021": { + "cmt_msg": "scsi: libsas: defer ata device eh commands to libata", + "cmt_id": "e420d98384760f55ffac9951b9b5cccbf2edd752" }, - "CVE-2021-46283": { - "cmt_msg": "netfilter: nf_tables: initialize set before expression setup" + "CVE-2018-1000204": { + "cmt_msg": "scsi: sg: allocate with __GFP_ZERO in sg_build_indirect()", + "cmt_id": "ad2518320bc440ed3db072e2444a1bb226a9cf7a" + } + }, + "4.9.104": { + "CVE-2018-10124": { + "cmt_msg": "kernel/signal.c: avoid undefined behaviour in kill_something_info", + "cmt_id": "ec1975ac988686eba0f105f87ed0b587da43d384" }, - "CVE-2023-3609": { - "cmt_msg": "net/sched: cls_u32: Fix reference counter leak leading to overflow" + "CVE-2018-9518": { + "cmt_msg": "NFC: llcp: Limit size of SDP URI", + "cmt_id": "69b28c18f7c8b3bbdc037f1cc029acc21723b997" }, - "CVE-2022-1974": { - "cmt_msg": "nfc: replace improper check device_is_registered() in netlink related functions" + "CVE-2017-13695": { + "cmt_msg": "ACPICA: acpi: acpica: fix acpi operand cache leak in nseval.c", + "cmt_id": "9c6d844357a30e5dfcbb015c0d07a8175464b9c6" }, - "CVE-2022-1975": { - "cmt_msg": "NFC: netlink: fix sleep in atomic bug when firmware download timeout" + "CVE-2018-6412": { + "cmt_msg": "fbdev: Fixing arbitrary kernel leak in case FBIOGETCMAP_SPARC in sbusfb_ioctl_helper().", + "cmt_id": "05b4268070b14dbd77ac6f5986b77a80a458fffa" + } + }, + "4.9.108": { + "CVE-2019-18675": { + "cmt_msg": "mmap: introduce sane default mmap limits", + "cmt_id": "7a40374c34e8c25062b0d7e2d2152ff8b7af1274" + } + }, + "4.9.110": { + "CVE-2018-1118": { + "cmt_msg": "vhost: fix info leak due to uninitialized memory", + "cmt_id": "9681c3bdb098f6c87a0422b6b63912c1b90ad197" + } + }, + "4.9.111": { + "CVE-2018-13406": { + "cmt_msg": "video: uvesafb: Fix integer overflow in allocation", + "cmt_id": "7673ca3c93414faf90fa2a3c339f1f625415fecb" + } + }, + "4.9.112": { + "CVE-2018-10878": { + "cmt_msg": "ext4: always check block group bounds in ext4_init_block_bitmap()", + "cmt_id": "cdde876fce2501828af33d5e4faa36c8919fc96a" }, - "CVE-2022-1972": { - "cmt_msg": "netfilter: nf_tables: sanitize nft_set_desc_concat_parse()" + "CVE-2018-9516": { + "cmt_msg": "HID: debug: check length before copy_to_user()", + "cmt_id": "4a30c12542290f1def08b9ef0d677c024c500589" }, - "CVE-2021-28972": { - "cmt_msg": "PCI: rpadlpar: Fix potential drc_name corruption in store functions" + "CVE-2017-13168": { + "cmt_msg": "scsi: sg: mitigate read/write abuse", + "cmt_id": "b6db8af7e34edfa1bf1d7b0797da15c3811a2a98" }, - "CVE-2021-31916": { - "cmt_msg": "dm ioctl: fix out of bounds array access when no devices" + "CVE-2018-10877": { + "cmt_msg": "ext4: verify the depth of extent tree in ext4_find_extent()", + "cmt_id": "87dad44faabd45683fba94443471298f8809e8a8" }, - "CVE-2022-32981": { - "cmt_msg": "powerpc/32: Fix overread/overwrite of thread_struct via ptrace" + "CVE-2018-10876": { + "cmt_msg": "ext4: only look at the bg_flags field if it is valid", + "cmt_id": "5ae57329580d6ceca97559ff030a5f0e91fa66fe" }, - "CVE-2022-3424": { - "cmt_msg": "misc: sgi-gru: fix use-after-free error in gru_set_context_option, gru_fault and gru_handle_user_call_os" + "CVE-2018-10879": { + "cmt_msg": "ext4: make sure bitmaps and the inode table don't overlap with bg descriptors", + "cmt_id": "9e4842f2aa6c4b4340669730c90cb6fbf630ee42" }, - "CVE-2023-2269": { - "cmt_msg": "dm ioctl: fix nested locking in table_clear() to remove deadlock concern" + "CVE-2018-10881": { + "cmt_msg": "ext4: clear i_data in ext4_inode_info when removing inline data", + "cmt_id": "a5e063d348bd2ef14fff96b129749409a8991ea5" }, - "CVE-2023-0394": { - "cmt_msg": "ipv6: raw: Deduct extension header length in rawv6_push_pending_frames" + "CVE-2018-10882": { + "cmt_msg": "ext4: add more inode number paranoia checks", + "cmt_id": "425dc465de3725210162da9b1e9062e86cc2de27" }, - "CVE-2022-3108": { - "cmt_msg": "drm/amdkfd: Check for null pointer after calling kmemdup" + "CVE-2018-10883": { + "cmt_msg": "jbd2: don't mark block as modified if the handle is out of credits", + "cmt_id": "8ef97ef67ce0f8fc3d32c7218e6b412e479ee2ab" + } + }, + "4.9.113": { + "CVE-2018-13405": { + "cmt_msg": "Fix up non-directory creation in SGID directories", + "cmt_id": "d2c7c52431819aa05d76fae77bb3f95dd0955da1" }, - "CVE-2022-36402": { - "cmt_msg": "drm/vmwgfx: Fix shader stage validation" + "CVE-2018-16276": { + "cmt_msg": "USB: yurex: fix out-of-bounds uaccess in read handler", + "cmt_id": "0fdef3142f99430b94f5d394ca2b181d20d87e77" + } + }, + "4.9.114": { + "CVE-2017-18216": { + "cmt_msg": "ocfs2: subsystem.su_mutex is required while accessing the item->ci_parent", + "cmt_id": "32a1733cf823011266dac0ea34c13555ff35dde5" }, - "CVE-2021-4157": { - "cmt_msg": "pNFS/flexfiles: fix incorrect size check in decode_nfs_fh()" + "CVE-2017-18224": { + "cmt_msg": "ocfs2: ip_alloc_sem should be taken in ocfs2_get_block()", + "cmt_id": "78a65505cdf7b7392c963d3715269516bc812ef2" + } + }, + "4.9.115": { + "CVE-2018-10902": { + "cmt_msg": "ALSA: rawmidi: Change resized buffers atomically", + "cmt_id": "c4f094deb3d69dcc8b4e3dc6c056c1e62a72c33e" + } + }, + "4.9.116": { + "CVE-2018-5390": { + "cmt_msg": "tcp: free batches of packets in tcp_prune_ofo_queue()", + "cmt_id": "2d08921c8da26bdce3d8848ef6f32068f594d7d4" + } + }, + "4.9.117": { + "CVE-2018-14734": { + "cmt_msg": "infiniband: fix a possible use-after-free bug", + "cmt_id": "73298a828c90398d582ec0e204b637e9bbee2dd5" + } + }, + "4.9.119": { + "CVE-2018-12233": { + "cmt_msg": "jfs: Fix inconsistency between memory allocation and ea_buf->max_size", + "cmt_id": "240d46556d5961c7100febbee0e058185b3c8d4f" + } + }, + "4.9.120": { + "CVE-2018-3646": { + "cmt_msg": "x86/microcode: Allow late microcode loading with SMT disabled", + "cmt_id": "da540c063b06b18f77168c8a52ee5a9c783a7481" }, - "CVE-2021-4154": { - "cmt_msg": "cgroup: verify that source is a string" + "CVE-2018-15572": { + "cmt_msg": "x86/speculation: Protect against userspace-userspace spectreRSB", + "cmt_id": "6455f41db5206cf46b623be071a0aa308c183642" }, - "CVE-2021-4155": { - "cmt_msg": "xfs: map unwritten blocks in XFS_IOC_{ALLOC,FREE}SP just like fallocate" + "CVE-2018-3620": { + "cmt_msg": "x86/microcode: Allow late microcode loading with SMT disabled", + "cmt_id": "da540c063b06b18f77168c8a52ee5a9c783a7481" + } + }, + "4.9.121": { + "CVE-2018-9363": { + "cmt_msg": "Bluetooth: hidp: buffer overflow in hidp_process_report", + "cmt_id": "7c7940ffbaefdbb189f78a48b4e64b6f268b1dbf" + } + }, + "4.9.124": { + "CVE-2018-3693": { + "cmt_msg": "ext4: fix spectre gadget in ext4_mb_regular_allocator()", + "cmt_id": "51ada11083605de581b3c29212b5641d18cc8fcb" + } + }, + "4.9.125": { + "CVE-2018-10938": { + "cmt_msg": "Cipso: cipso_v4_optptr enter infinite loop", + "cmt_id": "e8e519f8ec33ce670abef2cfc0613ec26319841e" }, - "CVE-2022-1729": { - "cmt_msg": "perf: Fix sys_perf_event_open() race against self" + "CVE-2018-16658": { + "cmt_msg": "cdrom: Fix info leak/OOB read in cdrom_ioctl_drive_status", + "cmt_id": "b8c0e15469bab732065e64f7dffadab0b7103990" + } + }, + "4.9.126": { + "CVE-2019-12881": { + "cmt_msg": "drm/i915/userptr: reject zero user_size", + "cmt_id": "f916daa615e1c0d67fb3b7a65572fbc56c6aaea6" + } + }, + "4.9.127": { + "CVE-2018-6554": { + "cmt_msg": "staging: irda: remove the irda network stack and drivers", + "cmt_id": "ce54bf4aec595c479b462180d682783b3776fb80" }, - "CVE-2021-4150": { - "cmt_msg": "block: fix incorrect references to disk objects" + "CVE-2018-6555": { + "cmt_msg": "staging: irda: remove the irda network stack and drivers", + "cmt_id": "18d94895f505d6eef2da8868e87a403cde1d9ef0" }, - "CVE-2020-3702": { - "cmt_msg": "ath: Use safer key clearing with key cache entries" + "CVE-2018-14617": { + "cmt_msg": "hfsplus: fix NULL dereference in hfsplus_lookup()", + "cmt_id": "1cedd72d0f688b9c169836649ac9ec07a3c601d6" }, - "CVE-2021-28952": { - "cmt_msg": "ASoC: qcom: sdm845: Fix array out of bounds access" + "CVE-2018-14609": { + "cmt_msg": "btrfs: relocation: Only remove reloc rb_trees if reloc control has been initialized", + "cmt_id": "93d960de56cef4582088dfc0ba9494143351772f" + } + }, + "4.9.128": { + "CVE-2018-13099": { + "cmt_msg": "f2fs: fix to do sanity check with reserved blkaddr of inline inode", + "cmt_id": "7e0782ceebaaed70b0c4b775c27b81e8f8cf6ddb" }, - "CVE-2021-3655": { - "cmt_msg": "sctp: validate from_addr_param return" + "CVE-2018-17182": { + "cmt_msg": "mm: get rid of vmacache_flush_all() entirely", + "cmt_id": "84580567f1f856d2c7a610273315852e345bc3ac" + } + }, + "4.9.130": { + "CVE-2018-20511": { + "cmt_msg": "net/appletalk: fix minor pointer leak to userspace in SIOCFINDIPDDPRT", + "cmt_id": "11f734283a987ac26365aefafdd012a3f37e05a3" }, - "CVE-2020-8694": { - "cmt_msg": "powercap: restrict energy meter to root access" + "CVE-2018-14633": { + "cmt_msg": "scsi: target: iscsi: Use hex2bin instead of a re-implementation", + "cmt_id": "5eeb39743ba17bd36db8d86d0047181ee0b9ff71" + } + }, + "4.9.131": { + "CVE-2018-7755": { + "cmt_msg": "floppy: Do not copy a kernel pointer to user memory in FDGETPRM ioctl", + "cmt_id": "3da4db1dfc217c6f330be87baf5759ef4a4b8d93" }, - "CVE-2023-0461": { - "cmt_msg": "net/ulp: prevent ULP without clone op from entering the LISTEN status" + "CVE-2018-18021": { + "cmt_msg": "arm64: KVM: Tighten guest core register access from userspace", + "cmt_id": "bc769c0148cd9820c8db785a2a1298a6489125ae" }, - "CVE-2021-29154": { - "cmt_msg": "bpf, x86: Validate computation of branch displacements for x86-64" + "CVE-2018-10880": { + "cmt_msg": "ext4: never move the system.data xattr out of the inode body", + "cmt_id": "3a282476161c54df1a2ef1ba664c8a3514ef49f4" }, - "CVE-2021-29155": { - "cmt_msg": "bpf: Use correct permission flag for mixed signed bounds arithmetic" + "CVE-2018-13053": { + "cmt_msg": "alarmtimer: Prevent overflow for relative nanosleep", + "cmt_id": "747128e772dc2c413763050c52c55edcacf7f60c" }, - "CVE-2021-3714": { - "cmt_msg": "" + "CVE-2019-9458": { + "cmt_msg": "media: v4l: event: Prevent freeing event subscriptions while accessed", + "cmt_id": "ec964c3c00457e7ce6b633a33d1c6b61e0091557" + } + }, + "4.9.132": { + "CVE-2018-17972": { + "cmt_msg": "proc: restrict kernel stack dumps to root", + "cmt_id": "3c5dc3f313cf1cb1645a0e832f51c1ba79aee934" + } + }, + "4.9.133": { + "CVE-2018-15471": { + "cmt_msg": "xen-netback: fix input validation in xenvif_set_hash_mapping()", + "cmt_id": "2962761863cb161d419c94f3dde7443af0e63c31" + } + }, + "4.9.134": { + "CVE-2018-5391": { + "cmt_msg": "ip: discard IPv4 datagrams with overlapping segments.", + "cmt_id": "82f36cbc74595f06900f478d4eaf7217a4f06e13" + } + }, + "4.9.135": { + "CVE-2018-18281": { + "cmt_msg": "mremap: properly flush TLB before releasing the page", + "cmt_id": "e34bd9a96704f7089ccad61b6e01ea985fa54dd6" + } + }, + "4.9.136": { + "CVE-2018-12896": { + "cmt_msg": "posix-timers: Sanitize overrun handling", + "cmt_id": "65cb24de03f1c8e00a4fedf416b80a4e8f8a6ef2" + } + }, + "4.9.138": { + "CVE-2018-16871": { + "cmt_msg": "nfsd: COPY and CLONE operations require the saved filehandle to be set", + "cmt_id": "7291d95a97fc89044301b197c760555e894e82c7" }, - "CVE-2021-3896": { - "cmt_msg": "isdn: cpai: check ctr->cnr to avoid array index out of bound" + "CVE-2018-18710": { + "cmt_msg": "cdrom: fix improper type cast, which can leat to information leak.", + "cmt_id": "8dd745a8799ee01fc67b64fd33cdb44d04eb7e4c" + } + }, + "4.9.143": { + "CVE-2018-19407": { + "cmt_msg": "KVM: X86: Fix scan ioapic use-before-initialization", + "cmt_id": "3a468e8e5a6124523e2e94c33866c609cc914876" }, - "CVE-2021-3894": { - "cmt_msg": "sctp: account stream padding length for reconf chunk" + "CVE-2019-2024": { + "cmt_msg": "media: em28xx: Fix use-after-free when disconnecting", + "cmt_id": "6fc74d9f9b412b295f9ad01af7a7e62a662aa5bd" + } + }, + "4.9.144": { + "CVE-2018-9465": { + "cmt_msg": "binder: fix proc->files use-after-free", + "cmt_id": "c0d75dacffb9cf3c0e3812ba0c7607c063cd7e9d" }, - "CVE-2021-3892": { - "cmt_msg": "" + "CVE-2018-13100": { + "cmt_msg": "f2fs: fix to do sanity check with secs_per_zone", + "cmt_id": "a3dccfacd3a574365ab6c5118f8a944a4ba691fa" }, - "CVE-2023-20928": { - "cmt_msg": "android: binder: stop saving a pointer to the VMA" + "CVE-2018-5848": { + "cmt_msg": "wil6210: missing length check in wmi_set_ie", + "cmt_id": "35db4d1ed8a344899a87887fa7bf11be5b057bec" }, - "CVE-2021-39633": { - "cmt_msg": "ip_gre: add validation for csum_start" + "CVE-2017-18249": { + "cmt_msg": "f2fs: fix race condition in between free nid allocator/initializer", + "cmt_id": "cb9b1d4ec206702a4df1cb42ba8142f39acfdd91" }, - "CVE-2022-27223": { - "cmt_msg": "USB: gadget: validate endpoint index for xilinx udc" + "CVE-2018-13097": { + "cmt_msg": "f2fs: fix to do sanity check with user_block_count", + "cmt_id": "06e606acedaf8bb00c83c4cee43acdd264287a92" }, - "CVE-2023-35788": { - "cmt_msg": "net/sched: flower: fix possible OOB write in fl_set_geneve_opt()" + "CVE-2018-14611": { + "cmt_msg": "btrfs: validate type when reading a chunk", + "cmt_id": "3c77b07dc365a7ed2644ca0dd38e6e40a9652d57" }, - "CVE-2022-2639": { - "cmt_msg": "openvswitch: fix OOB access in reserve_sfa_size()" + "CVE-2018-14616": { + "cmt_msg": "f2fs: fix to do sanity check with block address in main area v2", + "cmt_id": "b10a6ac262f8c1c0c70a90e992137a5590325f0b" }, - "CVE-2022-24958": { - "cmt_msg": "usb: gadget: don't release an existing dev->buf" + "CVE-2017-18241": { + "cmt_msg": "f2fs: fix a panic caused by NULL flush_cmd_control", + "cmt_id": "3b19f961d260d1ae12b497e5eb77e5ecc1039fac" }, - "CVE-2022-24959": { - "cmt_msg": "yam: fix a memory leak in yam_siocdevprivate()" + "CVE-2018-14610": { + "cmt_msg": "btrfs: Check that each block group has corresponding chunk at mount time", + "cmt_id": "7a72f918825ddece7a4ed79583836f6f1e06e478" }, - "CVE-2022-25375": { - "cmt_msg": "usb: gadget: rndis: check size of RNDIS_MSG_SET command" + "CVE-2018-14613": { + "cmt_msg": "btrfs: tree-checker: Verify block_group_item", + "cmt_id": "058e388e42c8dc5b6ce6248990c75a0459e20197" }, - "CVE-2022-33742": { - "cmt_msg": "xen/blkfront: force data bouncing when backend is untrusted" + "CVE-2018-14612": { + "cmt_msg": "btrfs: tree-checker: Detect invalid and empty essential trees", + "cmt_id": "6f33d3d8dca8683a4df94e9944296a1a1a2a6f10" }, - "CVE-2022-33741": { - "cmt_msg": "xen/netfront: force data bouncing when backend is untrusted" + "CVE-2018-1128": { + "cmt_msg": "libceph: add authorizer challenge", + "cmt_id": "06e925920d4de3da2114876bc607447e929604af" }, - "CVE-2022-33740": { - "cmt_msg": "xen/netfront: fix leaking data in shared pages" + "CVE-2018-1129": { + "cmt_msg": "libceph: implement CEPHX_V2 calculation mode", + "cmt_id": "18a23fb2632030888fc56a7df73a80f57445718f" }, - "CVE-2024-24864": { - "cmt_msg": "" + "CVE-2018-18690": { + "cmt_msg": "xfs: don't fail when converting shortform attr to long form during ATTR_REPLACE", + "cmt_id": "4ec44e98ab08c704d0ff1a35a21a0682a5562a27" }, - "CVE-2022-45885": { - "cmt_msg": "" + "CVE-2018-16862": { + "cmt_msg": "mm: cleancache: fix corruption on missed inode invalidation", + "cmt_id": "60b3d44f05c148f6f7f5e5b2a8165d328c3f22a0" }, - "CVE-2022-33744": { - "cmt_msg": "xen/arm: Fix race in RB-tree based P2M accounting" + "CVE-2018-14614": { + "cmt_msg": "f2fs: fix to do sanity check with cp_pack_start_sum", + "cmt_id": "91fe514bedf4c72ae8046fe4cfa98c5e201f6b84" }, - "CVE-2023-52443": { - "cmt_msg": "apparmor: avoid crash when parsed profile name is empty" + "CVE-2018-13096": { + "cmt_msg": "f2fs: fix to do sanity check with node footer and iblocks", + "cmt_id": "1c87980591a1dc8c5eafdcc5f9953fca4e518465" + } + }, + "4.9.145": { + "CVE-2018-20169": { + "cmt_msg": "USB: check usb_get_extra_descriptor for proper size", + "cmt_id": "fe26b8d06e965239795bee0a71c9073bed931716" }, - "CVE-2022-2327": { - "cmt_msg": "io_uring: remove any grabbing of context" + "CVE-2018-5953": { + "cmt_msg": "printk: hash addresses printed with %p", + "cmt_id": "adcc5726f1402e7ea39bebd08688efcc09ba4d26" }, - "CVE-2021-45486": { - "cmt_msg": "inet: use bigger hash table for IP ID generation" + "CVE-2018-14625": { + "cmt_msg": "vhost/vsock: fix use-after-free in network stack callers", + "cmt_id": "569fc4ffb5de8f12fe01759f0b85098b7b9bba8e" }, - "CVE-2023-2194": { - "cmt_msg": "i2c: xgene-slimpro: Fix out-of-bounds bug in xgene_slimpro_i2c_xfer()" + "CVE-2018-19824": { + "cmt_msg": "ALSA: usb-audio: Fix UAF decrement if card has no live interfaces in card.c", + "cmt_id": "73000a4cec933fd331224df79df731ea929bb85c" + } + }, + "4.9.148": { + "CVE-2018-19985": { + "cmt_msg": "USB: hso: Fix OOB memory access in hso_probe/hso_get_config_data", + "cmt_id": "5501175cb1975239add62a521cfbedcf76b93d8d" + } + }, + "4.9.150": { + "CVE-2019-15927": { + "cmt_msg": "ALSA: usb-audio: Avoid access before bLength check in build_audio_procunit()", + "cmt_id": "beab6f305f4f271caa500170d7fed1d2bda6ea88" }, - "CVE-2023-52445": { - "cmt_msg": "media: pvrusb2: fix use after free on context disconnection" + "CVE-2019-6133": { + "cmt_msg": "fork: record start_time late", + "cmt_id": "0ea6030b555803b9c565e0471c94648fe2a4bda7" + } + }, + "4.9.151": { + "CVE-2018-16884": { + "cmt_msg": "sunrpc: use-after-free in svc_process_common()", + "cmt_id": "37c791a031ece3afeb9c8b023397473a5349f171" + } + }, + "4.9.152": { + "CVE-2019-3701": { + "cmt_msg": "can: gw: ensure DLC boundaries after CAN frame modification", + "cmt_id": "d379b338387e3d5a9b5ebe5ab16656a9c65c988d" }, - "CVE-2022-41218": { - "cmt_msg": "media: dvb-core: Fix UAF due to refcount races at releasing" + "CVE-2020-10769": { + "cmt_msg": "crypto: authenc - fix parsing key with misaligned rta_len", + "cmt_id": "6ddfcf0b4c6ce7cfeb5d9e36d991345f3fe6e600" + } + }, + "4.9.156": { + "CVE-2019-7222": { + "cmt_msg": "KVM: x86: work around leak of uninitialized stack contents (CVE-2019-7222)", + "cmt_id": "f5c61e4f6b5a1cc66c61eb68334f725031948a7e" }, - "CVE-2022-36946": { - "cmt_msg": "netfilter: nf_queue: do not allow packet truncation below transport header offset" + "CVE-2019-6974": { + "cmt_msg": "kvm: fix kvm_ioctl_create_device() reference counting (CVE-2019-6974)", + "cmt_id": "0c42df1f9f82f73ebc6c0f54b1df295ffc5a7b4b" }, - "CVE-2022-41222": { - "cmt_msg": "mm/mremap: hold the rmap lock in write mode when moving page table entries." + "CVE-2019-7221": { + "cmt_msg": "KVM: nVMX: unconditionally cancel preemption timer in free_nested (CVE-2019-7221)", + "cmt_id": "a2c34d20660f24a40b46d0d341547b84f3fff3b0" + } + }, + "4.9.159": { + "CVE-2018-1000026": { + "cmt_msg": "bnx2x: disable GSO where gso_size is too big for hardware", + "cmt_id": "f3fe2c72a7b7361a306ca1b51387bb2f995216a2" + } + }, + "4.9.162": { + "CVE-2019-9213": { + "cmt_msg": "mm: enforce min addr even if capable() in expand_downwards()", + "cmt_id": "331fc4df776be3e5a88a1a9f08ef2f7e063ef1a9" + } + }, + "4.9.163": { + "CVE-2019-8980": { + "cmt_msg": "exec: Fix mem leak in kernel_read_file", + "cmt_id": "dd6734e17903f16a47c78d0418f02e06df080c54" }, - "CVE-2011-4916": { - "cmt_msg": "" + "CVE-2019-2101": { + "cmt_msg": "media: uvcvideo: Fix 'type' check leading to overflow", + "cmt_id": "47d77d464e574d56eecb39677df7bc6663635a3f" }, - "CVE-2022-21166": { - "cmt_msg": "x86/speculation/mmio: Enable CPU Fill buffer clearing on idle" + "CVE-2019-12818": { + "cmt_msg": "net: nfc: Fix NULL dereference on nfc_llcp_build_tlv fails", + "cmt_id": "05d3d2d0b8574d0f61d12a64e2c6475a5c3d5ba6" }, - "CVE-2024-0841": { - "cmt_msg": "" + "CVE-2019-25160": { + "cmt_msg": "netlabel: fix out-of-bounds memory accesses", + "cmt_id": "1c973f9c7cc2b3caae93192fdc8ecb3f0b4ac000" }, - "CVE-2021-29650": { - "cmt_msg": "netfilter: x_tables: Use correct memory barriers." + "CVE-2019-15916": { + "cmt_msg": "net-sysfs: Fix mem leak in netdev_register_kobject", + "cmt_id": "d81778b842536c9437acb43138f3fc8520b1b12c" + } + }, + "4.9.164": { + "CVE-2019-16995": { + "cmt_msg": "net: hsr: fix memory leak in hsr_dev_finalize()", + "cmt_id": "a582b20fd743237ce145b45aacf9f6c24962029a" }, - "CVE-2023-34255": { - "cmt_msg": "xfs: verify buffer contents when we skip log replay" + "CVE-2019-12819": { + "cmt_msg": "mdio_bus: Fix use-after-free on device_register fails", + "cmt_id": "c4bec922def2285707cd3be3a80be46467ad8cde" + } + }, + "4.9.165": { + "CVE-2019-10124": { + "cmt_msg": "mm: hwpoison: fix thp split handing in soft_offline_in_use_page()", + "cmt_id": "78f42f1156fd661f708cadd9ad9c3f0ac039b411" }, - "CVE-2022-41849": { - "cmt_msg": "fbdev: smscufx: Fix use-after-free in ufx_ops_open()" + "CVE-2019-9455": { + "cmt_msg": "media: videobuf2-v4l2: drop WARN_ON in vb2_warn_zero_bytesused()", + "cmt_id": "7f422aa63d5a0905232455a8953cd9bc02eab4da" }, - "CVE-2022-41848": { - "cmt_msg": "" + "CVE-2019-16413": { + "cmt_msg": "9p: use inode->i_lock to protect i_size_write() under 32-bit", + "cmt_id": "0a97dbd82f40bcb888110a7d6860bac4a5819502" + } + }, + "4.9.167": { + "CVE-2019-3459": { + "cmt_msg": "Bluetooth: Verify that l2cap_get_conf_opt provides large enough buffer", + "cmt_id": "99665dcf6ff803351b5e658f3a929cb498561e36" }, - "CVE-2022-1353": { - "cmt_msg": "af_key: add __GFP_ZERO flag for compose_sadb_supported in function pfkey_register" + "CVE-2019-20054": { + "cmt_msg": "fs/proc/proc_sysctl.c: fix NULL pointer dereference in put_links", + "cmt_id": "28f0641fbaa06dccf49903bb074ac7b3aa3dde85" }, - "CVE-2022-28356": { - "cmt_msg": "llc: fix netdevice reference leaks in llc_ui_bind()" + "CVE-2019-3460": { + "cmt_msg": "Bluetooth: Check L2CAP option sizes returned from l2cap_get_conf_opt", + "cmt_id": "def5c1fbee851e9c044ce9fa647238efc15458b4" + } + }, + "4.9.168": { + "CVE-2017-18551": { + "cmt_msg": "i2c: core-smbus: prevent stack corruption on read I2C_BLOCK_DATA", + "cmt_id": "2555029ac9d474d3dc1b66ff48b1c773e8446af5" }, - "CVE-2020-16119": { - "cmt_msg": "dccp: don't duplicate ccid when cloning dccp sock" + "CVE-2019-11810": { + "cmt_msg": "scsi: megaraid_sas: return error when create DMA pool failed", + "cmt_id": "650c8ec81f458472eda16883acd5dbf37c5049dc" }, - "CVE-2022-1198": { - "cmt_msg": "drivers: hamradio: 6pack: fix UAF bug caused by mod_timer()" + "CVE-2019-9454": { + "cmt_msg": "i2c: core-smbus: prevent stack corruption on read I2C_BLOCK_DATA", + "cmt_id": "2555029ac9d474d3dc1b66ff48b1c773e8446af5" + } + }, + "4.9.169": { + "CVE-2019-11486": { + "cmt_msg": "tty: mark Siemens R3964 line discipline as BROKEN", + "cmt_id": "942ddc0de8efb52c43250033c7c6091f15e191f5" }, - "CVE-2022-1199": { - "cmt_msg": "ax25: Fix NULL pointer dereference in ax25_kill_by_device" + "CVE-2019-11815": { + "cmt_msg": "net: rds: force to destroy connection if t_sock is NULL in rds_tcp_kill_sock().", + "cmt_id": "a1aa69beac4d88dfb892a95ee04fe6f932803952" }, - "CVE-2023-6546": { - "cmt_msg": "tty: n_gsm: fix the UAF caused by race condition in gsm_cleanup_mux" + "CVE-2019-10639": { + "cmt_msg": "netns: provide pure entropy for net_hash_mix()", + "cmt_id": "6996763856e1fb27ccae260e41fd73a3fff56678" + } + }, + "4.9.170": { + "CVE-2019-15292": { + "cmt_msg": "appletalk: Fix use-after-free in atalk_proc_exit", + "cmt_id": "057a0da1899f00a4ac9a4c4c452cf2cf652bdbf0" + } + }, + "4.9.171": { + "CVE-2018-5995": { + "cmt_msg": "printk: hash addresses printed with %p", + "cmt_id": "2c4ae3a694fabfc19b0fc6e65d530a7cdb542bda" }, - "CVE-2021-39801": { - "cmt_msg": "" + "CVE-2019-15214": { + "cmt_msg": "ALSA: core: Fix card races between register and disconnect", + "cmt_id": "d944299e7a6fce01db3603bc55d51ef336c19cc4" + } + }, + "4.9.172": { + "CVE-2019-15924": { + "cmt_msg": "fm10k: Fix a potential NULL pointer dereference", + "cmt_id": "0648cd7304cfba4fe4959f133e4bdf00f2909059" + } + }, + "4.9.173": { + "CVE-2019-3882": { + "cmt_msg": "vfio/type1: Limit DMA mappings per container", + "cmt_id": "4f97abd571ec3d56c50a2edfe0932059f4549afa" + } + }, + "4.9.174": { + "CVE-2019-15216": { + "cmt_msg": "USB: yurex: Fix protection fault after device removal", + "cmt_id": "965cc8406cf38d6e535b264f5906211c3e5e33b7" + } + }, + "4.9.175": { + "CVE-2018-20836": { + "cmt_msg": "scsi: libsas: fix a race condition when smp task timeout", + "cmt_id": "41b5d3eee4af6a4ea488a1735ed82e4e593eec0d" }, - "CVE-2021-39800": { - "cmt_msg": "" + "CVE-2019-11884": { + "cmt_msg": "Bluetooth: hidp: fix buffer overflow", + "cmt_id": "0d134aebfd7222dc946437ea2941b94fa64be605" + } + }, + "4.9.177": { + "CVE-2019-10142": { + "cmt_msg": "drivers/virt/fsl_hypervisor.c: prevent integer overflow in ioctl", + "cmt_id": "71e29a15b4babddba1a6faab6d98d2dcce1cd0ff" + } + }, + "4.9.178": { + "CVE-2019-11833": { + "cmt_msg": "ext4: zero out the unused memory region in the extent tree block", + "cmt_id": "ab6d14e83db6e08c39a867a4cba378f7a774d273" + } + }, + "4.9.179": { + "CVE-2019-15666": { + "cmt_msg": "xfrm: policy: Fix out-of-bound array accesses in __xfrm_policy_unlink", + "cmt_id": "7c96721f56b02fdf7b191aee0d39690ab4f40dc5" + } + }, + "4.9.180": { + "CVE-2019-19966": { + "cmt_msg": "media: cpia2: Fix use-after-free in cpia2_exit", + "cmt_id": "14734c3c582387e84c4c7c8c9469c274b41ff2b3" }, - "CVE-2021-28375": { - "cmt_msg": "misc: fastrpc: restrict user apps from sending kernel RPC messages" + "CVE-2019-20095": { + "cmt_msg": "mwifiex: Fix mem leak in mwifiex_tm_cmd", + "cmt_id": "5ff8545c6abda22e70728a69fcb4c8cc3ce87880" + } + }, + "4.9.181": { + "CVE-2020-10720": { + "cmt_msg": "net-gro: fix use-after-free read in napi_gro_frags()", + "cmt_id": "12855df4065b6e13878d7b8abc948aa719295bc1" }, - "CVE-2022-1195": { - "cmt_msg": "hamradio: improve the incomplete fix to avoid NPD" + "CVE-2018-20510": { + "cmt_msg": "binder: replace \"%p\" with \"%pK\"", + "cmt_id": "6f3433c47e8223c97746ad227d1e6f5531e0758a" }, - "CVE-2021-26708": { - "cmt_msg": "vsock: fix the race conditions in multi-transport support" + "CVE-2019-15219": { + "cmt_msg": "USB: sisusbvga: fix oops in error path of sisusb_probe", + "cmt_id": "a45f178bcbf22d4c5c6e76dcc26e2b849cda6408" }, - "CVE-2021-4202": { - "cmt_msg": "NFC: reorganize the functions in nci_request" + "CVE-2019-15218": { + "cmt_msg": "media: usb: siano: Fix general protection fault in smsusb", + "cmt_id": "6ecd1809002699377d2b3b95b170d636f8a60eb4" }, - "CVE-2021-4203": { - "cmt_msg": "af_unix: fix races in sk_peer_pid and sk_peer_cred accesses" + "CVE-2019-15212": { + "cmt_msg": "USB: rio500: refuse more than one device at a time", + "cmt_id": "6496f8ef3242b57f285e5c89134ad95dec17ab62" }, - "CVE-2022-45887": { - "cmt_msg": "media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb()" + "CVE-2019-9466": { + "cmt_msg": "brcmfmac: add subtype check for event handling in data path", + "cmt_id": "433b957a9e2df0305c1273011aa6e6cc0f8f815d" }, - "CVE-2022-45886": { - "cmt_msg": "media: dvb-core: Fix use-after-free due on race condition at dvb_net" + "CVE-2019-9500": { + "cmt_msg": "brcmfmac: assure SSID length from firmware is limited", + "cmt_id": "76e7e98e229ae8fa7f4b30a6fd2bb3cd2ad26a67" }, - "CVE-2023-46343": { - "cmt_msg": "nfc: nci: fix possible NULL pointer dereference in send_acknowledge()" + "CVE-2019-9503": { + "cmt_msg": "brcmfmac: add subtype check for event handling in data path", + "cmt_id": "433b957a9e2df0305c1273011aa6e6cc0f8f815d" }, - "CVE-2021-4204": { - "cmt_msg": "bpf: Generalize check_ctx_reg for reuse with other types" + "CVE-2019-11487": { + "cmt_msg": "fs: prevent page refcount overflow in pipe_buf_get", + "cmt_id": "9557090582a33801349f0a0920a55d134a27e740" + } + }, + "4.9.182": { + "CVE-2019-11479": { + "cmt_msg": "tcp: add tcp_min_snd_mss sysctl", + "cmt_id": "8e39cbc03dafa3731d22533f869bf326c0e6e6f8" }, - "CVE-2023-2124": { - "cmt_msg": "xfs: verify buffer contents when we skip log replay" + "CVE-2019-11478": { + "cmt_msg": "tcp: tcp_fragment() should apply sane memory limits", + "cmt_id": "e358f4af19db46ca25cc9a8a78412b09ba98859d" }, - "CVE-2023-1281": { - "cmt_msg": "net/sched: tcindex: update imperfect hash filters respecting rcu" + "CVE-2019-11477": { + "cmt_msg": "tcp: limit payload size of sacked skbs", + "cmt_id": "cc1b58ccb78e0de51bcec1f2914d9296260668bd" + } + }, + "4.9.183": { + "CVE-2019-15807": { + "cmt_msg": "scsi: libsas: delete sas port if expander discover failed", + "cmt_id": "1d28cf14a89c400fa55f6f9a9a4ca3bc34094b34" + } + }, + "4.9.185": { + "CVE-2019-13272": { + "cmt_msg": "ptrace: Fix ->ptracer_cred handling for PTRACE_TRACEME", + "cmt_id": "d8b99303da935228a33fa7656a964adfb33e271b" }, - "CVE-2023-2860": { - "cmt_msg": "ipv6: sr: fix out-of-bounds read when setting HMAC data." + "CVE-2019-15221": { + "cmt_msg": "ALSA: line6: Fix write on zero-sized buffer", + "cmt_id": "8b449e9dc215e47641c4737a199b7767ffd032a9" }, - "CVE-2021-44879": { - "cmt_msg": "f2fs: fix to do sanity check on inode type during garbage collection" + "CVE-2019-0136": { + "cmt_msg": "mac80211: drop robust management frames from unknown TA", + "cmt_id": "9f0f5ff93ed0205a90f11103e9937f3c0417cd4b" }, - "CVE-2023-1859": { - "cmt_msg": "9p/xen : Fix use after free bug in xen_9pfs_front_remove due to race condition" + "CVE-2019-9506": { + "cmt_msg": "Bluetooth: Fix faulty expression for minimum encryption key size check", + "cmt_id": "f470557724f2c94c25e4f6480a41612cf42aff26" + } + }, + "4.9.186": { + "CVE-2019-10126": { + "cmt_msg": "mwifiex: Fix heap overflow in mwifiex_uap_parse_tail_ies()", + "cmt_id": "f70d411e2ecd1f8297e1fd7e91108ca220986784" }, - "CVE-2023-2513": { - "cmt_msg": "ext4: fix use-after-free in ext4_xattr_set_entry" + "CVE-2019-3846": { + "cmt_msg": "mwifiex: Fix possible buffer overflows at parsing bss descriptor", + "cmt_id": "58ec3690a908494f7a7c3e8a302eb491bef9d979" }, - "CVE-2022-1516": { - "cmt_msg": "net/x25: Fix null-ptr-deref caused by x25_disconnect" + "CVE-2019-15220": { + "cmt_msg": "p54usb: Fix race between disconnect and firmware loading", + "cmt_id": "feca0ce34518f69447d0d13cd431d0eef647a794" + } + }, + "4.9.187": { + "CVE-2019-17351": { + "cmt_msg": "xen: let alloc_xenballooned_pages() fail if not enough memory free", + "cmt_id": "259b0fc2caddc21a6b561b595747a8091102f7ff" }, - "CVE-2023-1855": { - "cmt_msg": "hwmon: (xgene) Fix use after free bug in xgene_hwmon_remove due to race condition" + "CVE-2019-13631": { + "cmt_msg": "Input: gtco - bounds check collection indent level", + "cmt_id": "2628fa1a6d824ee1f3fe67a272a3d00ba33d23fa" }, - "CVE-2022-27672": { - "cmt_msg": "x86/speculation: Identify processors vulnerable to SMT RSB predictions" + "CVE-2019-20934": { + "cmt_msg": "sched/fair: Don't free p->numa_faults with concurrent readers", + "cmt_id": "837ffc9723f04aeb5bf252ef926c16aea1f5a0ee" }, - "CVE-2020-25220": { - "cmt_msg": "" + "CVE-2019-15211": { + "cmt_msg": "media: radio-raremono: change devm_k*alloc to k*alloc", + "cmt_id": "4c0a7ec4b98f2e75ac974140291d3c8c6642145c" }, - "CVE-2015-2877": { - "cmt_msg": "" + "CVE-2019-10207": { + "cmt_msg": "Bluetooth: hci_uart: check for missing tty operations", + "cmt_id": "58a01b0bd8ea5fddb51d4d854bb149a1a7312c12" }, - "CVE-2023-26242": { - "cmt_msg": "" + "CVE-2019-15215": { + "cmt_msg": "media: cpia2_usb: first wake up, then free in disconnect", + "cmt_id": "0b8a71a8bd2129ca9cc115195fd9630564765772" }, - "CVE-2019-16089": { - "cmt_msg": "" + "CVE-2019-15926": { + "cmt_msg": "ath6kl: add some bounds checking", + "cmt_id": "8e8b0ba1dc67d1cba76ac9cada76ae3a9732d1e3" }, - "CVE-2021-38198": { - "cmt_msg": "KVM: X86: MMU: Use the correct inherited permissions to get shadow page" + "CVE-2017-18509": { + "cmt_msg": "ipv6: check sk sk_type and protocol early in ip_mroute_set/getsockopt", + "cmt_id": "1e531ad4316cb47c6c2b42f3257d1841a6e837e7" }, - "CVE-2021-38199": { - "cmt_msg": "NFSv4: Initialise connection to the server in nfs4_alloc_client()" + "CVE-2019-15239": { + "cmt_msg": "unknown", + "cmt_id": "704533394e488a109fe46ab3693315376c3824d5" }, - "CVE-2022-1679": { - "cmt_msg": "ath9k: fix use-after-free in ath9k_hif_usb_rx_cb" + "CVE-2019-14284": { + "cmt_msg": "floppy: fix div-by-zero in setup_format_params", + "cmt_id": "604206cde7a6c1907f6f03d90c37505a45ef1b62" }, - "CVE-2023-1513": { - "cmt_msg": "kvm: initialize all of the kvm_debugregs structure before sending it to userspace" + "CVE-2019-14283": { + "cmt_msg": "floppy: fix out-of-bounds read in copy_buffer", + "cmt_id": "1fdefbb5bc70ff20ea49083c6984aae86e3ecf93" }, - "CVE-2021-26401": { - "cmt_msg": "x86/speculation: Use generic retpoline by default on AMD" + "CVE-2019-13648": { + "cmt_msg": "powerpc/tm: Fix oops on sigreturn on systems without TM", + "cmt_id": "08ee34d86c9c6a9b93c0986d7fc6e272690e8d24" + } + }, + "4.9.188": { + "CVE-2019-11599": { + "cmt_msg": "coredump: fix race condition between mmget_not_zero()/get_task_mm() and core dumping", + "cmt_id": "16903f1a5ba7707c051edfdfa457620bba45e2c9" }, - "CVE-2021-3847": { - "cmt_msg": "" + "CVE-2019-3892": { + "cmt_msg": "coredump: fix race condition between mmget_not_zero()/get_task_mm() and core dumping", + "cmt_id": "16903f1a5ba7707c051edfdfa457620bba45e2c9" + } + }, + "4.9.189": { + "CVE-2018-20856": { + "cmt_msg": "block: blk_init_allocated_queue() set q->fq as NULL in the fail case", + "cmt_id": "c19199167c87841006350cc7c0a59881416e8748" }, - "CVE-2023-52442": { - "cmt_msg": "ksmbd: validate session id and tree id in compound request" + "CVE-2019-1125": { + "cmt_msg": "x86/speculation: Prepare entry code for Spectre v1 swapgs mitigations", + "cmt_id": "e90ec5e2b679fd882a0f59eb1bf155d96b34b29c" + } + }, + "4.9.190": { + "CVE-2019-3900": { + "cmt_msg": "vhost_net: fix possible infinite loop", + "cmt_id": "4b586288578a3a2aa4efb969feed86f2d760f082" }, - "CVE-2022-40768": { - "cmt_msg": "scsi: stex: Properly zero out the passthrough command structure" + "CVE-2019-10638": { + "cmt_msg": "inet: switch IP ID generator to siphash", + "cmt_id": "b97a2f3d58f439d11ececb2faa21dac775d63c5c" }, - "CVE-2022-1280": { - "cmt_msg": "drm: avoid circular locks in drm_mode_getconnector" + "CVE-2019-19536": { + "cmt_msg": "can: peak_usb: pcan_usb_pro: Fix info-leaks to USB devices", + "cmt_id": "0cad79bfb5aa596b9449fe66b0edf69a8344326c" }, - "CVE-2021-3923": { - "cmt_msg": "RDMA/core: Don't infoleak GRH fields" + "CVE-2019-19537": { + "cmt_msg": "USB: core: Fix races in character device registration and deregistraion", + "cmt_id": "741b832658b98463d619fe4c320f8ab11b2ad4ee" }, - "CVE-2011-4917": { - "cmt_msg": "" + "CVE-2019-19527": { + "cmt_msg": "HID: hiddev: do cleanup in failure of opening a device", + "cmt_id": "963a14fb9c43f0a6b38fbe3da0b894a147c71388" }, - "CVE-2021-45485": { - "cmt_msg": "ipv6: use prandom_u32() for ID generation" + "CVE-2019-19535": { + "cmt_msg": "can: peak_usb: pcan_usb_fd: Fix info-leaks to USB devices", + "cmt_id": "127ab64c38e21c55adf8781ca92f7dc9d1a9903e" }, - "CVE-2023-52448": { - "cmt_msg": "gfs2: Fix kernel NULL pointer dereference in gfs2_rgrp_dump" + "CVE-2019-19530": { + "cmt_msg": "usb: cdc-acm: make sure a refcount is taken early enough", + "cmt_id": "fccd6134d5addf2be1407e3250efdc854b5c5d8a" }, - "CVE-2023-52449": { - "cmt_msg": "mtd: Fix gluebi NULL pointer dereference caused by ftl notifier" + "CVE-2019-19531": { + "cmt_msg": "usb: yurex: Fix use-after-free in yurex_delete", + "cmt_id": "e253114f73134cf6f29b453176fb537441e12371" + } + }, + "4.9.191": { + "CVE-2019-15118": { + "cmt_msg": "ALSA: usb-audio: Fix a stack buffer overflow bug in check_input_term", + "cmt_id": "2bac3a35488148f066d355ebfe44a872aa9a7546" }, - "CVE-2023-23039": { - "cmt_msg": "" + "CVE-2019-15538": { + "cmt_msg": "xfs: fix missing ILOCK unlock when xfs_setattr_nonsize fails due to EDQUOT", + "cmt_id": "4862942c590646fe46e33ce4a6d35da4d8ee188e" }, - "CVE-2024-1312": { - "cmt_msg": "mm: lock_vma_under_rcu() must check vma->anon_vma under vma lock" + "CVE-2019-15902": { + "cmt_msg": "unknown", + "cmt_id": "69f692bb7e684592aaba779299bc576626d414b4" }, - "CVE-2023-3338": { - "cmt_msg": "Remove DECnet support from kernel" + "CVE-2019-15117": { + "cmt_msg": "ALSA: usb-audio: Fix an OOB bug in parse_audio_mixer_unit", + "cmt_id": "53856af73d8577a4017b9762d7406f47df192bed" } - } - }, - "5.9": { - "5.9": { - "CVE-2020-27194": { - "cmt_msg": "bpf: Fix scalar32_min_max_or bounds tracking", - "cmt_id": "5b9fbeb75b6a98955f628e205ac26689bcb1383e" - }, - "CVE-2020-28915": { - "cmt_msg": "fbcon: Fix global-out-of-bounds read in fbcon_get_font()", - "cmt_id": "5af08640795b2b9a940c9266c0260455377ae262" + }, + "4.9.193": { + "CVE-2019-14835": { + "cmt_msg": "vhost: make sure log_num < in_num", + "cmt_id": "8d8276867b5ac539f1d6e166a028b51c8b1ceda8" } }, - "5.9.1": { - "CVE-2020-12352": { - "cmt_msg": "Bluetooth: A2MP: Fix not initializing all members", - "cmt_id": "122414e2d2cba74dc154263cabca9560ff8011ac" + "4.9.194": { + "CVE-2019-14816": { + "cmt_msg": "mwifiex: Fix three heap overflow at parsing element in cfg80211_ap_settings", + "cmt_id": "21dfacaf201ed13af70a8bd3e66bcf18cdb63b35" }, - "CVE-2020-12351": { - "cmt_msg": "Bluetooth: L2CAP: Fix calling sk_filter on non-socket based channel", - "cmt_id": "3dede8ebf46338473143a1e792cc2cacc244f1f2" + "CVE-2019-14814": { + "cmt_msg": "mwifiex: Fix three heap overflow at parsing element in cfg80211_ap_settings", + "cmt_id": "21dfacaf201ed13af70a8bd3e66bcf18cdb63b35" + }, + "CVE-2019-15505": { + "cmt_msg": "media: technisat-usb2: break out of loop at end of buffer", + "cmt_id": "994c6dcb4307759d440b8031e140d343b8611481" + }, + "CVE-2019-14821": { + "cmt_msg": "KVM: coalesced_mmio: add bounds checking", + "cmt_id": "52cb3fd60ec0a1c9b61cd28bae4e8c1d377e7b60" } }, - "5.9.2": { - "CVE-2020-14351": { - "cmt_msg": "perf/core: Fix race in the perf_mmap_close() function", - "cmt_id": "f1f019eff8c9515d99bdc032aa77b36e7cd01b66" + "4.9.195": { + "CVE-2019-17056": { + "cmt_msg": "nfc: enforce CAP_NET_RAW for raw sockets", + "cmt_id": "45a9e9bc5d6742988df799dafbf26dca8e0dada3" }, - "CVE-2020-27152": { - "cmt_msg": "KVM: ioapic: break infinite recursion on lazy EOI", - "cmt_id": "293c420c1af6355ccb53d816146f5455909e26b9" + "CVE-2019-17053": { + "cmt_msg": "ieee802154: enforce CAP_NET_RAW for raw sockets", + "cmt_id": "ddca1f39c8980cb19db5ea6d51b8549288a7421b" }, - "CVE-2020-27784": { - "cmt_msg": "usb: gadget: function: printer: fix use-after-free in __lock_acquire", - "cmt_id": "5f845e5d18d151230476cf90aa46449f69ba2ef1" + "CVE-2019-17052": { + "cmt_msg": "ax25: enforce CAP_NET_RAW for raw sockets", + "cmt_id": "73b8d26c842a5a3be34a321beab1f97939d9794b" }, - "CVE-2020-0423": { - "cmt_msg": "binder: fix UAF when releasing todo list", - "cmt_id": "2144f0b90aeb2ead33d590f2e45f9be185b93009" + "CVE-2019-19533": { + "cmt_msg": "media: ttusb-dec: Fix info-leak in ttusb_dec_send_command()", + "cmt_id": "70d5b96a1ed385a0ef520a44a18fbf6d795f1b84" }, - "CVE-2020-25705": { - "cmt_msg": "icmp: randomize the global rate limiter", - "cmt_id": "7237c55005ed638b7c89703079944dbd80dee7fe" + "CVE-2019-17055": { + "cmt_msg": "mISDN: enforce CAP_NET_RAW for raw sockets", + "cmt_id": "bb439ee217acbf7835af634f08875540c514632f" + }, + "CVE-2019-17054": { + "cmt_msg": "appletalk: enforce CAP_NET_RAW for raw sockets", + "cmt_id": "08d2af9358c1937acf97417dba9a03a40149c4d2" } }, - "5.9.3": { - "CVE-2021-20194": { - "cmt_msg": "io_uring: don't rely on weak ->files references", - "cmt_id": "adb6bf5ea1ac14bc78bdd5fc0cbe232d97870169" + "4.9.196": { + "CVE-2019-2215": { + "cmt_msg": "ANDROID: binder: remove waitqueue when thread exits.", + "cmt_id": "a494a71146a1cf3f48bb94cf33981db1f027e6a0" }, - "CVE-2020-29534": { - "cmt_msg": "io_uring: don't rely on weak ->files references", - "cmt_id": "adb6bf5ea1ac14bc78bdd5fc0cbe232d97870169" + "CVE-2020-0030": { + "cmt_msg": "ANDROID: binder: synchronize_rcu() when using POLLFREE.", + "cmt_id": "b6c6212514fe9f2387fc6677181028d4a9ae20c7" }, - "CVE-2021-20226": { - "cmt_msg": "io_uring: don't rely on weak ->files references", - "cmt_id": "adb6bf5ea1ac14bc78bdd5fc0cbe232d97870169" + "CVE-2019-18806": { + "cmt_msg": "net: qlogic: Fix memory leak in ql_alloc_large_buffers", + "cmt_id": "3ae6d4c9473378d57bcad5a6e102c8ba42efd014" } }, - "5.9.5": { - "CVE-2020-25668": { - "cmt_msg": "tty: make FONTX ioctl use the tty pointer they were actually passed", - "cmt_id": "8a071286dbe17c9aa690f6c7c2b8e5495cf82a30" - }, - "CVE-2020-27777": { - "cmt_msg": "powerpc/rtas: Restrict RTAS requests from userspace", - "cmt_id": "e61aaa2c70169a10dcd3df5391b1bc1468f11cac" + "4.9.197": { + "CVE-2019-19525": { + "cmt_msg": "ieee802154: atusb: fix use-after-free at disconnect", + "cmt_id": "2f2f3ffa761793f2db2f3b0bc6476a069061cb9c" }, - "CVE-2020-27673": { - "cmt_msg": "xen/events: add a proper barrier to 2-level uevent unmasking", - "cmt_id": "efdaf1d3683c106b609d1170f640bdeccdbdcf63" + "CVE-2019-16746": { + "cmt_msg": "nl80211: validate beacon head", + "cmt_id": "a873afd7d888f7349bfabc9191afeb20eb1d3a45" }, - "CVE-2020-27675": { - "cmt_msg": "xen/events: avoid removing an event channel while handling it", - "cmt_id": "6b7343607ffe88bd8a336d4a546dcf8ec383c456" + "CVE-2018-20976": { + "cmt_msg": "xfs: clear sb->s_fs_info on mount failure", + "cmt_id": "e6e3f36b1ac9c439d3bc0b2c2aaf1663ad705ac0" }, - "CVE-2020-25656": { - "cmt_msg": "vt: keyboard, extend func_buf_lock to readers", - "cmt_id": "c76b008823e5278046d805a652136e01d16ec138" + "CVE-2019-19523": { + "cmt_msg": "USB: adutux: fix use-after-free on disconnect", + "cmt_id": "aa1b499d5f706c67a0acbe184e0ec32e8c47489b" }, - "CVE-2020-27825": { - "cmt_msg": "tracing: Fix race in trace_open and buffer resize call", - "cmt_id": "de3d7ff3ec852e455c5924f4c8b1f826496d6705" + "CVE-2019-19528": { + "cmt_msg": "USB: iowarrior: fix use-after-free on disconnect", + "cmt_id": "323f425a7618fdb0b961dec2c58685fa32eafa1b" } }, - "5.9.7": { - "CVE-2020-28974": { - "cmt_msg": "vt: Disable KD_FONT_OP_COPY", - "cmt_id": "ecba10d25f7530aeb6b5366f5aed4ab818b4ea6b" - }, - "CVE-2020-35508": { - "cmt_msg": "fork: fix copy_process(CLONE_PARENT) race with the exiting ->real_parent", - "cmt_id": "362dfa5e0205a5ea70bf3ac2ae00487e1a5bb8f5" + "4.9.198": { + "CVE-2019-17075": { + "cmt_msg": "RDMA/cxgb4: Do not dma memory off of the stack", + "cmt_id": "84f5b67df81a9f333afa81855f6fa3fdcd954463" }, - "CVE-2020-25704": { - "cmt_msg": "perf/core: Fix a memory leak in perf_event_parse_addr_filter()", - "cmt_id": "85669bd0f0641edf3e8afd90256a3f34bde7bb70" - } - }, - "5.9.8": { - "CVE-2020-8694": { - "cmt_msg": "powercap: restrict energy meter to root access", - "cmt_id": "b72aaa9506b38e68f3476a642d0e42b3071f82bb" + "CVE-2019-17133": { + "cmt_msg": "cfg80211: wext: avoid copying malformed SSIDs", + "cmt_id": "49d84740f8a7040354ef93bf5915a4b3e651e71b" } }, - "5.9.9": { - "CVE-2020-12912": { - "cmt_msg": "hwmon: (amd_energy) modify the visibility of the counters", - "cmt_id": "800c1e71804ba115dd77454692b963a3b1d8bf6f" + "4.9.199": { + "CVE-2020-10773": { + "cmt_msg": "s390/cmm: fix information leak in cmm_timeout_handler()", + "cmt_id": "8dc59b45792c801efa55e5463818bd08e5e16ded" + }, + "CVE-2019-17666": { + "cmt_msg": "rtlwifi: Fix potential overflow on P2P code", + "cmt_id": "4a2fbab9e82fb662ad3419525742a1ddfc29a7b9" + }, + "CVE-2019-19532": { + "cmt_msg": "HID: Fix assumption that devices have inputs", + "cmt_id": "7b5e3ad5d582e252d971ee599a3f63f30b70ccb1" + }, + "CVE-2019-15098": { + "cmt_msg": "ath6kl: fix a NULL-ptr-deref bug in ath6kl_usb_alloc_urb_from_pipe()", + "cmt_id": "3c7f02d13b8d72dbb1dd9b0fe858459d263b1fbd" } }, - "5.9.10": { - "CVE-2020-4788": { - "cmt_msg": "powerpc/64s: flush L1D on kernel entry", - "cmt_id": "e590b36718d6e740b7b19514f710402a6499164c" + "4.9.200": { + "CVE-2019-18282": { + "cmt_msg": "net/flow_dissector: switch to siphash", + "cmt_id": "1f94465d13ace2d4610c4eb2b362454ce2a9d87c" }, - "CVE-2020-25669": { - "cmt_msg": "Input: sunkbd - avoid use-after-free in teardown paths", - "cmt_id": "88d9fe1e1487a5a084c12d4e92ec40b908553ce2" + "CVE-2019-19049": { + "cmt_msg": "of: unittest: fix memory leak in unittest_data_add", + "cmt_id": "0228cd262dda0916948b52a74b88fa1f8b3cc810" } }, - "5.9.11": { - "CVE-2020-28941": { - "cmt_msg": "speakup: Do not let the line discipline be used several times", - "cmt_id": "1f1cc0b0ba3ac8b5c719bdf1a4952889dfd9b593" + "4.9.201": { + "CVE-2019-16231": { + "cmt_msg": "fjes: Handle workqueue allocation failure", + "cmt_id": "76e62b04f78f6ae3f13dfbebf1f49b78e8cc938b" + }, + "CVE-2019-19534": { + "cmt_msg": "can: peak_usb: fix slab info leak", + "cmt_id": "da281558d20bfbf82823cab457ba7d343ba6b0a0" + }, + "CVE-2019-0155": { + "cmt_msg": "drm/i915: Rename gen7 cmdparser tables", + "cmt_id": "64003d092ec9b9ecf03984513aee106c15b411e7" + }, + "CVE-2019-0154": { + "cmt_msg": "drm/i915: Lower RM timeout to avoid DSI hard hangs", + "cmt_id": "ebd6ded190ed0920c16eb63f274b50ca050e46fb" + }, + "CVE-2019-19052": { + "cmt_msg": "can: gs_usb: gs_can_open(): prevent memory leak", + "cmt_id": "b46a2067f36d7c5f2f259c4ed476359e6e9d668f" } }, - "5.9.12": { - "CVE-2020-27835": { - "cmt_msg": "IB/hfi1: Ensure correct mm is used at all times", - "cmt_id": "5732f83596f8a573f2cde814cc76a54e1a8995c7" + "4.9.202": { + "CVE-2019-15917": { + "cmt_msg": "Bluetooth: hci_ldisc: Postpone HCI_UART_PROTO_READY bit set in hci_uart_set_proto()", + "cmt_id": "3858f013de0ae5a19b8276944e12fd01b0cac979" + }, + "CVE-2019-11135": { + "cmt_msg": "x86/msr: Add the IA32_TSX_CTRL MSR", + "cmt_id": "2fc508384968d5796e005bf85d2daf2f16510119" } }, - "5.9.13": { - "CVE-2020-35519": { - "cmt_msg": "net/x25: prevent a couple of overflows", - "cmt_id": "7704d8bbcfb640e6cda0e48f6b4edfeac00426a9" + "4.9.203": { + "CVE-2019-19524": { + "cmt_msg": "Input: ff-memless - kill timer in destroy()", + "cmt_id": "1ce4561d12a08be9de2f2ef8ace700e55fc4835c" } }, - "5.9.14": { - "CVE-2020-29661": { - "cmt_msg": "tty: Fix ->pgrp locking in tiocspgrp()", - "cmt_id": "4203f474d4c3e93b3c2462e4f7954cf6e4832074" - }, - "CVE-2020-29660": { - "cmt_msg": "tty: Fix ->session locking", - "cmt_id": "730649666353d495cfa8eade6e7f57936d0466af" + "4.9.204": { + "CVE-2019-18660": { + "cmt_msg": "powerpc/book3s64: Fix link stack flush on context switch", + "cmt_id": "113408cdaec11a6e34d4edabb134a335dd4896b3" }, - "CVE-2020-27830": { - "cmt_msg": "speakup: Reject setting the speakup line discipline outside of speakup", - "cmt_id": "9920472eaa7c652c7abcad4911fa83b6ae5a4955" + "CVE-2019-15291": { + "cmt_msg": "media: b2c2-flexcop-usb: add sanity checking", + "cmt_id": "2ab1da610f23d72ab53c3951876fa44ed85e1f99" }, - "CVE-2020-28588": { - "cmt_msg": "lib/syscall: fix syscall registers retrieval on 32-bit platforms", - "cmt_id": "bc6ca732f4a4dce79abd0fdeb81fc5c20e01fd0a" + "CVE-2019-18683": { + "cmt_msg": "media: vivid: Fix wrong locking that causes race conditions on streaming stop", + "cmt_id": "012a42dbc770d3e815cae536917245d74621c552" } }, - "5.9.15": { - "CVE-2021-3411": { - "cmt_msg": "x86/kprobes: Fix optprobe to detect INT3 padding correctly", - "cmt_id": "d4f949439d2748209b004b4003e21285e580909d" - }, - "CVE-2021-0938": { - "cmt_msg": "compiler.h: fix barrier_data() on clang", - "cmt_id": "54ddef488732546219d457830641e6452d8056f9" + "4.9.206": { + "CVE-2019-12614": { + "cmt_msg": "powerpc/pseries/dlpar: Fix a missing check in dlpar_parse_cc_property()", + "cmt_id": "0fce5ef1591055ff8db33ba2c34346ef2a33155e" } }, - "outstanding": { - "CVE-2020-36322": { - "cmt_msg": "fuse: fix bad inode" + "4.9.207": { + "CVE-2019-19227": { + "cmt_msg": "appletalk: Fix potential NULL pointer dereference in unregister_snap_client", + "cmt_id": "540b341012ba9b8e2963be3241cea229d4e4804d" }, - "CVE-2023-30772": { - "cmt_msg": "power: supply: da9150: Fix use after free bug in da9150_charger_remove due to race condition" + "CVE-2019-19062": { + "cmt_msg": "crypto: user - fix memory leak in crypto_report", + "cmt_id": "f427e1fcf77416ed14a716416c0faf2f02a1e68b" }, - "CVE-2022-3649": { - "cmt_msg": "nilfs2: fix use-after-free bug of struct nilfs_root" + "CVE-2019-19332": { + "cmt_msg": "KVM: x86: fix out-of-bounds write in KVM_GET_EMULATED_CPUID (CVE-2019-19332)", + "cmt_id": "8b587e3f1424fae01f9c7e78d8d294bcb71f6f41" + } + }, + "4.9.208": { + "CVE-2019-16232": { + "cmt_msg": "libertas: fix a potential NULL pointer dereference", + "cmt_id": "6bd3745b7854f6d125d591795092d23cb5b6e803" }, - "CVE-2020-35501": { - "cmt_msg": "" + "CVE-2019-19063": { + "cmt_msg": "rtlwifi: prevent memory leak in rtl_usb_probe", + "cmt_id": "4a06822bba46026212c06076284b940c0864bae4" }, - "CVE-2023-6176": { - "cmt_msg": "net/tls: do not free tls_rec on async operation in bpf_exec_tx_verdict()" + "CVE-2019-20812": { + "cmt_msg": "af_packet: set defaule value for tmo", + "cmt_id": "43c0e119316896fb895f0d059734e4ada480eb71" }, - "CVE-2021-45095": { - "cmt_msg": "phonet: refcount leak in pep_sock_accep" + "CVE-2019-19057": { + "cmt_msg": "mwifiex: pcie: Fix memory leak in mwifiex_pcie_init_evt_ring", + "cmt_id": "716156b896197824e55fc2f8244c8c43e0ed73e1" }, - "CVE-2022-0001": { - "cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE" + "CVE-2019-19447": { + "cmt_msg": "ext4: work around deleting a file with i_nlink == 0 safely", + "cmt_id": "e1513b36319dff169e409979867f39eb55a9af03" + } + }, + "4.9.209": { + "CVE-2019-18809": { + "cmt_msg": "media: usb: fix memory leak in af9005_identify_state", + "cmt_id": "129139a26325d2274a226407d1e7b6f1eb40b456" }, - "CVE-2023-2248": { - "cmt_msg": "net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg" + "CVE-2019-19965": { + "cmt_msg": "scsi: libsas: stop discovering if oob mode is disconnected", + "cmt_id": "25d16ce23055c7aa6cdbf514565815fe8b6c3df7" + } + }, + "4.9.210": { + "CVE-2019-14895": { + "cmt_msg": "mwifiex: fix possible heap overflow in mwifiex_process_country_ie()", + "cmt_id": "efa99b6f3844bd20d46c8afd78f92a0161a4718e" }, - "CVE-2022-0002": { - "cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE" + "CVE-2020-0305": { + "cmt_msg": "chardev: Avoid potential use-after-free in 'chrdev_open()'", + "cmt_id": "d2c9ee451ea8e8256fb1903a04ebaa26cb74d6f5" }, - "CVE-2020-24587": { - "cmt_msg": "mac80211: prevent mixed key and fragment cache attacks" + "CVE-2019-19066": { + "cmt_msg": "scsi: bfa: release allocated memory in case of error", + "cmt_id": "78cb846f4aea6e20fc942d7bb8930107d1c6e34f" }, - "CVE-2020-24586": { - "cmt_msg": "mac80211: prevent mixed key and fragment cache attacks" + "CVE-2019-20636": { + "cmt_msg": "Input: add safety guards to input_set_keycode()", + "cmt_id": "5f27f97dfed4aa29fb95b98bf5911763bd3ef038" }, - "CVE-2022-0995": { - "cmt_msg": "watch_queue: Fix filter limit check" + "CVE-2019-19068": { + "cmt_msg": "rtl8xxxu: prevent leaking urb", + "cmt_id": "2c00bebd0b959fe8bec6d4a1a07010394b8008e4" }, - "CVE-2022-3105": { - "cmt_msg": "RDMA/uverbs: Check for null return of kmalloc_array" + "CVE-2020-0431": { + "cmt_msg": "HID: hid-input: clear unmapped usages", + "cmt_id": "661967b7623b88985bdd3aeb171feb83d753aea9" }, - "CVE-2022-3104": { - "cmt_msg": "lkdtm/bugs: Check for the NULL pointer after calling kmalloc" + "CVE-2019-14615": { + "cmt_msg": "drm/i915/gen9: Clear residual context state on context switch", + "cmt_id": "571233331e1910206ec365ac61e5b51e77cce3b9" }, - "CVE-2021-0129": { - "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical" + "CVE-2019-19056": { + "cmt_msg": "mwifiex: pcie: Fix memory leak in mwifiex_pcie_alloc_cmdrsp_buf", + "cmt_id": "9bba4330671eaf1d21ac6025f950e7cca92f7aca" + } + }, + "4.9.211": { + "CVE-2019-20096": { + "cmt_msg": "dccp: Fix memleak in __feat_register_sp", + "cmt_id": "33cab7a0a84d35908c75c4b46c88769be7902556" }, - "CVE-2020-24588": { - "cmt_msg": "cfg80211: mitigate A-MSDU aggregation attacks" + "CVE-2019-15217": { + "cmt_msg": "media: usb:zr364xx:Fix KASAN:null-ptr-deref Read in zr364xx_vidioc_querycap", + "cmt_id": "6ba34f5de2a45050729836e3d48ed10ee53d0276" }, - "CVE-2022-47520": { - "cmt_msg": "wifi: wilc1000: validate pairwise and authentication suite offsets" + "CVE-2018-21008": { + "cmt_msg": "rsi: add fix for crash during assertions", + "cmt_id": "65b32fd4eabc5209019894627b1bda65611fd1cb" }, - "CVE-2022-47521": { - "cmt_msg": "wifi: wilc1000: validate length of IEEE80211_P2P_ATTR_CHANNEL_LIST attribute" + "CVE-2019-2182": { + "cmt_msg": "arm64: Enforce BBM for huge IO/VMAP mappings", + "cmt_id": "4f45a0a170355546cc47ba7bbf3973fe187d05cf" }, - "CVE-2023-5717": { - "cmt_msg": "perf: Disallow mis-matched inherited group reads" + "CVE-2020-12652": { + "cmt_msg": "scsi: mptfusion: Fix double fetch bug in ioctl", + "cmt_id": "ddfa91a194d054fb765b919e593183794d6637d6" }, - "CVE-2021-3444": { - "cmt_msg": "bpf: Fix truncation handling for mod32 dst reg wrt zero" + "CVE-2019-5108": { + "cmt_msg": "mac80211: Do not send Layer 2 Update frame before authorization", + "cmt_id": "ca60f42d7965af9f22392caa4074ab0f58c7e1fe" + } + }, + "4.9.212": { + "CVE-2019-14896": { + "cmt_msg": "libertas: Fix two buffer overflows at parsing bss descriptor", + "cmt_id": "b5e6f199de3b7f16b641c4ec5ac92906af1a9232" }, - "CVE-2022-32250": { - "cmt_msg": "netfilter: nf_tables: disallow non-stateful expression in sets earlier" + "CVE-2019-14897": { + "cmt_msg": "libertas: Fix two buffer overflows at parsing bss descriptor", + "cmt_id": "b5e6f199de3b7f16b641c4ec5ac92906af1a9232" }, - "CVE-2020-36158": { - "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_cmd_802_11_ad_hoc_start" + "CVE-2019-20806": { + "cmt_msg": "media: tw5864: Fix possible NULL pointer dereference in tw5864_handle_frame", + "cmt_id": "e4188ad85032f130b84702d39755840afec4b9b4" }, - "CVE-2023-3159": { - "cmt_msg": "firewire: fix potential uaf in outbound_phy_packet_callback()" + "CVE-2020-14416": { + "cmt_msg": "can, slip: Protect tty->disc_data in write_wakeup and close with RCU", + "cmt_id": "0beba1d7e8e164694ae1743238f1bdf4de4f1f34" + } + }, + "4.9.213": { + "CVE-2020-0432": { + "cmt_msg": "staging: most: net: fix buffer overflow", + "cmt_id": "8b6487d85ca9f9bfa9d75917451969a1d097a815" + } + }, + "4.9.214": { + "CVE-2020-12653": { + "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_cmd_append_vsie_tlv()", + "cmt_id": "7a4d6a45f2fad3ddc07f98cf85790344ea72cd69" }, - "CVE-2022-0480": { - "cmt_msg": "memcg: enable accounting for file lock caches" + "CVE-2020-12654": { + "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_ret_wmm_get_status()", + "cmt_id": "0a996849d8042833860fd7c9ff3dcd24e61fd416" }, - "CVE-2023-4273": { - "cmt_msg": "exfat: check if filename entries exceeds max filename length" + "CVE-2020-0404": { + "cmt_msg": "media: uvcvideo: Avoid cyclic entity chains due to malformed USB descriptors", + "cmt_id": "f873437547ac3d092c433cc0a996b946eb2803b6" + } + }, + "4.9.215": { + "CVE-2020-9383": { + "cmt_msg": "floppy: check FDC index for errors before assigning it", + "cmt_id": "5fbaa66c2a51c2260add842bd12cbc79715c5249" }, - "CVE-2022-0487": { - "cmt_msg": "moxart: fix potential use-after-free on remove path" + "CVE-2020-2732": { + "cmt_msg": "KVM: nVMX: Don't emulate instructions in guest mode", + "cmt_id": "86dc39e580d8e3ffa42c8157d3e28249fd9a12c5" }, - "CVE-2023-52429": { - "cmt_msg": "dm: limit the number of targets and parameter size area" + "CVE-2019-16233": { + "cmt_msg": "scsi: qla2xxx: fix a potential NULL pointer dereference", + "cmt_id": "3a21c5b627a2f8e1ca274a155267f0c952c8de0c" }, - "CVE-2022-42703": { - "cmt_msg": "mm/rmap: Fix anon_vma->degree ambiguity leading to double-reuse" + "CVE-2020-0009": { + "cmt_msg": "staging: android: ashmem: Disallow ashmem memory from being remapped", + "cmt_id": "a7fc5dbd17127c7301b0aefc2bcf1f54169c7383" }, - "CVE-2024-26595": { - "cmt_msg": "mlxsw: spectrum_acl_tcam: Fix NULL pointer dereference in error path" + "CVE-2020-36558": { + "cmt_msg": "vt: vt_ioctl: fix race in VT_RESIZEX", + "cmt_id": "160fbca8d5d74c1a4cec4b666f36b3e614c19f4f" + } + }, + "4.9.216": { + "CVE-2020-8649": { + "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region", + "cmt_id": "1f04adb4d691ed703b1fbc55d99f622b96cedecc" }, - "CVE-2022-23825": { - "cmt_msg": "" + "CVE-2020-8648": { + "cmt_msg": "vt: selection, close sel_buffer race", + "cmt_id": "290a9381ccc16131c6ccc19940589141985db6b1" }, - "CVE-2021-42252": { - "cmt_msg": "soc: aspeed: lpc-ctrl: Fix boundary check for mmap" + "CVE-2019-16234": { + "cmt_msg": "iwlwifi: pcie: fix rb_allocator workqueue allocation", + "cmt_id": "35c4725efddd669307d7c047cb385becc9c08bf3" }, - "CVE-2023-4004": { - "cmt_msg": "netfilter: nft_set_pipapo: fix improper element removal" + "CVE-2020-8647": { + "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region", + "cmt_id": "1f04adb4d691ed703b1fbc55d99f622b96cedecc" }, - "CVE-2023-0179": { - "cmt_msg": "netfilter: nft_payload: incorrect arithmetics when fetching VLAN header bits" + "CVE-2020-10942": { + "cmt_msg": "vhost: Check docket sk_family instead of call getname", + "cmt_id": "7f574e92e4474f1b33425c4ee9ba48cd4fbe7d75" }, - "CVE-2023-2163": { - "cmt_msg": "bpf: Fix incorrect verifier pruning due to missing register precision taints" + "CVE-2020-27068": { + "cmt_msg": "cfg80211: add missing policy for NL80211_ATTR_STATUS_CODE", + "cmt_id": "4d284a7a2ce3cbe918a9c1fac0679574a40fa7c8" }, - "CVE-2022-21125": { - "cmt_msg": "x86/speculation/mmio: Reuse SRBDS mitigation for SBDS" + "CVE-2020-0444": { + "cmt_msg": "audit: fix error handling in audit_data_to_entry()", + "cmt_id": "145bd64d35822a62c4570bc75c5285acb1820fb3" }, - "CVE-2023-28466": { - "cmt_msg": "net: tls: fix possible race condition between do_tls_getsockopt_conf() and do_tls_setsockopt_conf()" + "CVE-2020-27418": { + "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region", + "cmt_id": "1f04adb4d691ed703b1fbc55d99f622b96cedecc" + } + }, + "4.9.217": { + "CVE-2019-14901": { + "cmt_msg": "mwifiex: Fix heap overflow in mmwifiex_process_tdls_action_frame()", + "cmt_id": "cb87b895f1468df7a163a6c665bf106a4d26f8c1" }, - "CVE-2022-40307": { - "cmt_msg": "efi: capsule-loader: Fix use-after-free in efi_capsule_write" + "CVE-2020-29370": { + "cmt_msg": "mm: slub: add missing TID bump in kmem_cache_alloc_bulk()", + "cmt_id": "ff58bb340c430da021875283f8bf251630c61183" + } + }, + "4.9.218": { + "CVE-2020-36557": { + "cmt_msg": "vt: vt_ioctl: fix VT_DISALLOCATE freeing in-use virtual console", + "cmt_id": "6bc9bf78618edf42b31cb7551fb0c83af340c54f" }, - "CVE-2022-21123": { - "cmt_msg": "x86/speculation/mmio: Add mitigation for Processor MMIO Stale Data" + "CVE-2020-14381": { + "cmt_msg": "futex: Fix inode life-time issue", + "cmt_id": "fb099f3bb477a0ee2d0669a753f7ffcdf8884c2d" }, - "CVE-2021-28688": { - "cmt_msg": "xen-blkback: don't leak persistent grants from xen_blkbk_map()" + "CVE-2020-11668": { + "cmt_msg": "media: xirlink_cit: add missing descriptor sanity checks", + "cmt_id": "8f08a2bb2199a4511bea29e9a130b449f8c1a581" }, - "CVE-2021-39686": { - "cmt_msg": "binder: use euid from cred instead of using task" + "CVE-2021-3715": { + "cmt_msg": "net_sched: cls_route: remove the right filter from hashtable", + "cmt_id": "97a8e7afaee8fc4f08662cf8e4f495b87874aa91" }, - "CVE-2021-39685": { - "cmt_msg": "USB: gadget: detect too-big endpoint 0 requests" + "CVE-2020-27066": { + "cmt_msg": "xfrm: policy: Fix doulbe free in xfrm_policy_timer", + "cmt_id": "86e98ce7de083649e330d518e98a80b9e39b5d43" }, - "CVE-2021-43975": { - "cmt_msg": "atlantic: Fix OOB read and write in hw_atl_utils_fw_rpc_wait" + "CVE-2020-11608": { + "cmt_msg": "media: ov519: add missing endpoint sanity checks", + "cmt_id": "03e73c3ef017580482d8e4de2db2bac9505facca" }, - "CVE-2021-43976": { - "cmt_msg": "mwifiex: Fix skb_over_panic in mwifiex_usb_recv()" + "CVE-2020-11609": { + "cmt_msg": "media: stv06xx: add missing descriptor sanity checks", + "cmt_id": "be6fdd999bcc66cbfde80efbdc16cfd8a3290e38" + } + }, + "4.9.219": { + "CVE-2020-11494": { + "cmt_msg": "slcan: Don't transmit uninitialized stack data in padding", + "cmt_id": "925c631e84d77a72188101258878ac58a646d540" }, - "CVE-2022-3106": { - "cmt_msg": "sfc_ef100: potential dereference of null pointer" + "CVE-2020-0429": { + "cmt_msg": "l2tp: fix race between l2tp_session_delete() and l2tp_tunnel_closeall()", + "cmt_id": "e8b9cf5574e8154a6db2505d028682e830c9f620" }, - "CVE-2023-0459": { - "cmt_msg": "uaccess: Add speculation barrier to copy_from_user()" + "CVE-2020-0433": { + "cmt_msg": "blk-mq: sync the update nr_hw_queues with blk_mq_queue_tag_busy_iter", + "cmt_id": "f530afb974c2e82047bd6220303a2dbe30eff304" }, - "CVE-2023-0458": { - "cmt_msg": "prlimit: do_prlimit needs to have a speculation check" + "CVE-2020-11565": { + "cmt_msg": "mm: mempolicy: require at least one nodeid for MPOL_PREFERRED", + "cmt_id": "c5544e72014cdb0a739f6971fb3dd4fb641b392c" + } + }, + "4.9.220": { + "CVE-2020-12826": { + "cmt_msg": "signal: Extend exec_id to 64bits", + "cmt_id": "110012a2c94ad4fa28234a1b39e54fd4114fbaf2" + } + }, + "4.9.221": { + "CVE-2019-19319": { + "cmt_msg": "ext4: protect journal inode's blocks using block_validity", + "cmt_id": "a9855260fe8d8680bf8c4f0d8303b696c861e99b" }, - "CVE-2022-2078": { - "cmt_msg": "netfilter: nf_tables: sanitize nft_set_desc_concat_parse()" + "CVE-2020-12114": { + "cmt_msg": "make struct mountpoint bear the dentry reference to mountpoint, not struct mount", + "cmt_id": "91e997939dda1a866f23ddfb043dcd4a3ff57524" }, - "CVE-2023-0597": { - "cmt_msg": "x86/mm: Randomize per-cpu entry area" + "CVE-2020-12464": { + "cmt_msg": "USB: core: Fix free-while-in-use bug in the USB S-Glibrary", + "cmt_id": "ab20e851e49e75a9e653463853995076899a4e48" + } + }, + "4.9.222": { + "CVE-2020-10751": { + "cmt_msg": "selinux: properly handle multiple messages in selinux_netlink_send()", + "cmt_id": "6affa87d168d91af6c8f303dc1fc7a7f59869818" }, - "CVE-2021-3669": { - "cmt_msg": "ipc: replace costly bailout check in sysvipc_find_ipc()" + "CVE-2020-0255": { + "cmt_msg": "selinux: properly handle multiple messages in selinux_netlink_send()", + "cmt_id": "6affa87d168d91af6c8f303dc1fc7a7f59869818" + } + }, + "4.9.224": { + "CVE-2020-10711": { + "cmt_msg": "netlabel: cope with NULL catmap", + "cmt_id": "9232577ef3e10775eefe7f2689cbf851c8b13d80" }, - "CVE-2021-3744": { - "cmt_msg": "crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd()" + "CVE-2020-1749": { + "cmt_msg": "net: ipv6_stub: use ip6_dst_lookup_flow instead of ip6_dst_lookup", + "cmt_id": "badbe56cb62faabe946fed8d7e8a25c009a95e3b" }, - "CVE-2021-30002": { - "cmt_msg": "media: v4l: ioctl: Fix memory leak in video_usercopy" + "CVE-2020-27786": { + "cmt_msg": "ALSA: rawmidi: Fix racy buffer resize under concurrent accesses", + "cmt_id": "c13f1463d84b86bedb664e509838bef37e6ea317" }, - "CVE-2021-3743": { - "cmt_msg": "net: qrtr: fix OOB Read in qrtr_endpoint_post" + "CVE-2020-12769": { + "cmt_msg": "spi: spi-dw: Add lock protect dw_spi rx/tx to prevent concurrent calls", + "cmt_id": "15029156d7ac0ae4ec80f577bb25f68fe07c8af1" }, - "CVE-2021-0941": { - "cmt_msg": "bpf: Remove MTU check in __bpf_skb_max_len" + "CVE-2020-10690": { + "cmt_msg": "ptp: fix the race between the release of ptp_clock and cdev", + "cmt_id": "89e8fc989feaac00bf1a7f9a766289422e2f5768" }, - "CVE-2022-3628": { - "cmt_msg": "wifi: brcmfmac: Fix potential buffer overflow in brcmf_fweh_event_worker()" + "CVE-2020-13143": { + "cmt_msg": "USB: gadget: fix illegal array access in binding with UDC", + "cmt_id": "2056c78ee8abacaf71c89c999483183203e8441d" }, - "CVE-2024-26591": { - "cmt_msg": "bpf: Fix re-attachment branch in bpf_tracing_prog_attach" + "CVE-2019-19768": { + "cmt_msg": "blktrace: Protect q->blk_trace with RCU", + "cmt_id": "284dba674c063ac5cab9ffc1ea07f7b199aeb62f" }, - "CVE-2020-15802": { - "cmt_msg": "" + "CVE-2020-12770": { + "cmt_msg": "scsi: sg: add sg_remove_request in sg_write", + "cmt_id": "6950c2775e02e4be51b06901306ee641e8e5b3df" + } + }, + "4.9.225": { + "CVE-2018-9517": { + "cmt_msg": "l2tp: pass tunnel pointer to ->session_create()", + "cmt_id": "feaed88dccc4742805c41260040103fa8a7f0df2" }, - "CVE-2024-26597": { - "cmt_msg": "net: qualcomm: rmnet: fix global oob in rmnet_policy" + "CVE-2021-0447": { + "cmt_msg": "l2tp: protect sock pointer of struct pppol2tp_session with RCU", + "cmt_id": "5803ecd7f6ac6f747582e775caa62ac9d0489261" }, - "CVE-2024-26594": { - "cmt_msg": "ksmbd: validate mech token in session setup" + "CVE-2020-27067": { + "cmt_msg": "l2tp: fix l2tp_eth module loading", + "cmt_id": "1ede832fb82fbda56c1bd7c57fb581dfab9c6e49" + } + }, + "4.9.226": { + "CVE-2020-10732": { + "cmt_msg": "fs/binfmt_elf.c: allocate initialized memory in fill_thread_core_info()", + "cmt_id": "d228bc4b19e0b1c35f3eb404acbf1d607c01e64c" + } + }, + "4.9.227": { + "CVE-2020-13974": { + "cmt_msg": "vt: keyboard: avoid signed integer overflow in k_ascii", + "cmt_id": "adf823fa2a53db5d119d90817778f263a3a47608" }, - "CVE-2023-2483": { - "cmt_msg": "net: qcom/emac: Fix use after free bug in emac_remove due to race condition" + "CVE-2020-0543": { + "cmt_msg": "x86/cpu: Add 'table' argument to cpu_matches()", + "cmt_id": "15cf7ca9f59ff911cd5582969377bbf8c2ecab8a" }, - "CVE-2022-3636": { - "cmt_msg": "net: ethernet: mtk_eth_soc: use after free in __mtk_ppe_check_skb()" + "CVE-2019-19462": { + "cmt_msg": "kernel/relay.c: handle alloc_percpu returning NULL in relay_open", + "cmt_id": "d1774b0459875e2bf3e93b86294296e5494fd0b7" }, - "CVE-2022-3635": { - "cmt_msg": "atm: idt77252: fix use-after-free bugs caused by tst_timer" + "CVE-2020-10757": { + "cmt_msg": "mm: Fix mremap not considering huge pmd devmap", + "cmt_id": "c915cffda0a4329ee454646138fe2b11c5ba3cd6" + } + }, + "4.9.228": { + "CVE-2020-29368": { + "cmt_msg": "mm: thp: make the THP mapcount atomic against __split_huge_pmd_locked()", + "cmt_id": "d93d7bd61072a03dde173d36ae5815488a585fc0" }, - "CVE-2022-3633": { - "cmt_msg": "can: j1939: j1939_session_destroy(): fix memory leak of skbs" + "CVE-2019-20810": { + "cmt_msg": "media: go7007: fix a miss of snd_card_free", + "cmt_id": "3e70f204f62f2198f3b88932c71e5ac29a5fbb10" }, - "CVE-2021-28715": { - "cmt_msg": "xen/netback: don't queue unlimited number of packages" + "CVE-2020-10766": { + "cmt_msg": "x86/speculation: Prevent rogue cross-process SSBD shutdown", + "cmt_id": "fc0abf5a64ea5d028af0cf5d37d5898afe6748c5" }, - "CVE-2022-34918": { - "cmt_msg": "netfilter: nf_tables: stricter validation of element data" + "CVE-2020-10767": { + "cmt_msg": "x86/speculation: Avoid force-disabling IBPB based on STIBP and enhanced IBRS.", + "cmt_id": "38be87f5e7a7a7378d4ef4528c13bd1d666ab867" }, - "CVE-2022-40982": { - "cmt_msg": "x86/speculation: Add Gather Data Sampling mitigation" + "CVE-2020-10768": { + "cmt_msg": "x86/speculation: PR_SPEC_FORCE_DISABLE enforcement for indirect branches.", + "cmt_id": "db39004352a40107213a70dc8e549936a6468fa9" + } + }, + "4.9.229": { + "CVE-2020-12771": { + "cmt_msg": "bcache: fix potential deadlock problem in btree_gc_coalesce", + "cmt_id": "be676835b2250861d525b8e2a8e2bed8c1a9027d" }, - "CVE-2022-2585": { - "cmt_msg": "posix-cpu-timers: Cleanup CPU timers before freeing them during exec" + "CVE-2020-15436": { + "cmt_msg": "block: Fix use-after-free in blkdev_get()", + "cmt_id": "a54b15af2b495ed97660a6276710ef36e06ac6c9" }, - "CVE-2022-3202": { - "cmt_msg": "jfs: prevent NULL deref in diFree" + "CVE-2020-12655": { + "cmt_msg": "xfs: add agf freeblocks verify in xfs_agf_verify", + "cmt_id": "2bda23ca5b8186f7906dd29efd1c773bb8b84098" + } + }, + "4.9.230": { + "CVE-2020-15393": { + "cmt_msg": "usb: usbtest: fix missing kfree(dev->buf) in usbtest_disconnect", + "cmt_id": "4ea5c9091d62e9516819c7bcb7c09658bde85acc" + } + }, + "4.9.231": { + "CVE-2020-14356": { + "cmt_msg": "cgroup: fix cgroup_sk_alloc() for sk_clone_lock()", + "cmt_id": "51fbad61b1dc2a082c7f7dbc3b1299a1e40c061a" + } + }, + "4.9.232": { + "CVE-2020-15437": { + "cmt_msg": "serial: 8250: fix null-ptr-deref in serial8250_start_tx()", + "cmt_id": "81e57039ebbc2c0867f2c04bb3cb205b4edd0141" }, - "CVE-2022-2602": { - "cmt_msg": "io_uring/af_unix: defer registered files gc to io_uring release" + "CVE-2018-10323": { + "cmt_msg": "xfs: set format back to extents if xfs_bmap_extents_to_btree", + "cmt_id": "8e5f820e14e93ebfc7fcf2a099817eb9c7c3be04" + } + }, + "4.9.233": { + "CVE-2020-26088": { + "cmt_msg": "net/nfc/rawsock.c: add CAP_NET_RAW check.", + "cmt_id": "1b0eab4e8622183ff26230a589b33f533dfbf7b4" }, - "CVE-2024-26585": { - "cmt_msg": "tls: fix race between tx work scheduling and socket close" + "CVE-2019-19054": { + "cmt_msg": "media: rc: prevent memory leak in cx23888_ir_probe", + "cmt_id": "fa5ac0514ec1f66c2c04c6486a9f090d4ddfdac9" }, - "CVE-2024-26584": { - "cmt_msg": "net: tls: handle backlogging of crypto requests" + "CVE-2020-25212": { + "cmt_msg": "nfs: Fix getxattr kernel panic and memory overflow", + "cmt_id": "8973046648c4f0392f50d915ea1bdb639e930519" }, - "CVE-2023-2008": { - "cmt_msg": "udmabuf: add back sanity check" + "CVE-2019-9445": { + "cmt_msg": "f2fs: check if file namelen exceeds max value", + "cmt_id": "7745e3c67b80865bd0bc0812fda9f6292c8dc2fb" }, - "CVE-2024-26587": { - "cmt_msg": "net: netdevsim: don't try to destroy PHC on VFs" + "CVE-2018-13094": { + "cmt_msg": "xfs: don't call xfs_da_shrink_inode with NULL bp", + "cmt_id": "beff051fa566f6ed93da74171b30fb049038b23d" }, - "CVE-2023-2002": { - "cmt_msg": "bluetooth: Perform careful capability checks in hci_sock_ioctl()" + "CVE-2018-13093": { + "cmt_msg": "xfs: validate cached inodes are free when allocated", + "cmt_id": "42c59d544af976f4736640ef25ff791e2188aed3" }, - "CVE-2024-26586": { - "cmt_msg": "mlxsw: spectrum_acl_tcam: Fix stack corruption" + "CVE-2018-8043": { + "cmt_msg": "net: phy: mdio-bcm-unimac: fix potential NULL dereference in unimac_mdio_probe()", + "cmt_id": "a7efa804e0f4053b21356a0d40bd0942c77fe8d1" }, - "CVE-2023-28410": { - "cmt_msg": "drm/i915/gem: add missing boundary check in vm_access" + "CVE-2019-18808": { + "cmt_msg": "crypto: ccp - Release all allocated memory if sha type is invalid", + "cmt_id": "65d77c8771d2246fafb8e57dd260c8fa7224a576" }, - "CVE-2023-2007": { - "cmt_msg": "scsi: dpt_i2o: Remove obsolete driver" + "CVE-2020-16166": { + "cmt_msg": "random32: update the net random state on interrupt and activity", + "cmt_id": "5aa78397e208b6871a8bdec7fa2bd6992b1f3e4b" }, - "CVE-2020-26145": { - "cmt_msg": "ath10k: drop fragments with multicast DA for PCIe" + "CVE-2020-36386": { + "cmt_msg": "Bluetooth: Fix slab-out-of-bounds read in hci_extended_inquiry_result_evt()", + "cmt_id": "aea77913022bbd0194feb33720d9bca8b6b26f9a" }, - "CVE-2023-51782": { - "cmt_msg": "net/rose: Fix Use-After-Free in rose_ioctl" + "CVE-2020-14331": { + "cmt_msg": "vgacon: Fix for missing check in scrollback handling", + "cmt_id": "8c19b606e78a2b08e1ea69eebd5c290913c89612" }, - "CVE-2020-26147": { - "cmt_msg": "mac80211: assure all fragments are encrypted" + "CVE-2019-19448": { + "cmt_msg": "btrfs: only search for left_info if there is no right_info in try_merge_free_space", + "cmt_id": "802dff14b904b37a985ab2,87db546d872f950f05" }, - "CVE-2020-26141": { - "cmt_msg": "ath10k: Fix TKIP Michael MIC verification for PCIe" + "CVE-2019-19074": { + "cmt_msg": "ath9k: release allocated buffer if timed out", + "cmt_id": "f0b65fee921fe7efda2889d1a3eea69137682402" }, - "CVE-2020-26140": { - "cmt_msg": "" + "CVE-2019-19073": { + "cmt_msg": "ath9k_htc: release allocated buffer if timed out", + "cmt_id": "86c3e3e5937f7496d08eb7bc498ee3c10095d23c" + } + }, + "4.9.234": { + "CVE-2020-14314": { + "cmt_msg": "ext4: fix potential negative array index in do_split()", + "cmt_id": "539ae3e03875dacaa9c388aff141ccbb4ef4ecb5" }, - "CVE-2021-43389": { - "cmt_msg": "isdn: cpai: check ctr->cnr to avoid array index out of bound" + "CVE-2020-29371": { + "cmt_msg": "romfs: fix uninitialized memory leak in romfs_dev_read()", + "cmt_id": "6d26d08216475e5a40e4f6ade397c181a19dc524" }, - "CVE-2020-26142": { - "cmt_msg": "" + "CVE-2020-0466": { + "cmt_msg": "do_epoll_ctl(): clean the failure exits up a bit", + "cmt_id": "b3ce6ca929dc677f7e443eb3012dfc7a433b1161" + } + }, + "4.9.235": { + "CVE-2020-36766": { + "cmt_msg": "cec-api: prevent leaking memory through hole in structure", + "cmt_id": "43f90dc5c73e0e9d2a459d904b71f9682fd54f1b" + } + }, + "4.9.236": { + "CVE-2020-0465": { + "cmt_msg": "HID: core: Sanitize event code and type when mapping input", + "cmt_id": "ac48d8300edd1aa4ce0fbef0ff5136d363f44cdf" }, - "CVE-2023-1074": { - "cmt_msg": "sctp: fail if no bound addresses can be used for a given scope" + "CVE-2020-25641": { + "cmt_msg": "block: allow for_each_bvec to support zero len bvec", + "cmt_id": "0c7cee63ec92b316f8b891b667177a080b670566" }, - "CVE-2023-1075": { - "cmt_msg": "net/tls: tls_is_tx_ready() checked list_entry" + "CVE-2021-1048": { + "cmt_msg": "fix regression in \"epoll: Keep a reference on files added to the check list\"", + "cmt_id": "8238ee93a30a5ff6fc75751e122a28e0d92f3e12" }, - "CVE-2023-1076": { - "cmt_msg": "tun: tun_chr_open(): correctly initialize socket uid" + "CVE-2022-20565": { + "cmt_msg": "HID: core: Correctly handle ReportSize being zero", + "cmt_id": "cf7797ea60e3e721e3ae5090edbc2ec72d715436" }, - "CVE-2023-1077": { - "cmt_msg": "sched/rt: pick_next_rt_entity(): check list_entry" + "CVE-2020-25285": { + "cmt_msg": "mm/hugetlb: fix a race between hugetlb sysctl handlers", + "cmt_id": "47b1be395352d54f888f4331fa291dc9199fff4c" }, - "CVE-2023-46838": { - "cmt_msg": "xen-netback: don't produce zero-size SKB frags" + "CVE-2020-12888": { + "cmt_msg": "vfio-pci: Invalidate mmaps and block MMIO access on disabled memory", + "cmt_id": "5f2c69e2ef24a79b6909a6dc6b249a17909965f8" + } + }, + "4.9.237": { + "CVE-2020-25284": { + "cmt_msg": "rbd: require global CAP_SYS_ADMIN for mapping and unmapping", + "cmt_id": "774519ed39da09471abe2c02a7f293c380759cc3" }, - "CVE-2022-2959": { - "cmt_msg": "pipe: Fix missing lock in pipe_resize_ring()" + "CVE-2020-14390": { + "cmt_msg": "fbcon: remove soft scrollback code", + "cmt_id": "c7e41b00de99932f189d8af3a40caee31a385788" }, - "CVE-2023-40283": { - "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb" + "CVE-2020-28097": { + "cmt_msg": "vgacon: remove software scrollback support", + "cmt_id": "7cabb35d2106d567af15ea1040c7737f34b29cd8" + } + }, + "4.9.238": { + "CVE-2020-25643": { + "cmt_msg": "hdlc_ppp: add range checks in ppp_cp_parse_cr()", + "cmt_id": "585e29541c29349420d5926026a74456e233a2b3" }, - "CVE-2023-1073": { - "cmt_msg": "HID: check empty report_list in hid_validate_values()" + "CVE-2021-0605": { + "cmt_msg": "af_key: pfkey_dump needs parameter validation", + "cmt_id": "31c59173dc9553d6857129d2a8e102c4700b54c4" + } + }, + "4.9.239": { + "CVE-2020-14386": { + "cmt_msg": "net/packet: fix overflow in tpacket_rcv", + "cmt_id": "9a675ac9fe9794f0981db6e4b101503818f61622" }, - "CVE-2023-51781": { - "cmt_msg": "appletalk: Fix Use-After-Free in atalk_ioctl" + "CVE-2020-25211": { + "cmt_msg": "netfilter: ctnetlink: add a range check for l3/l4 protonum", + "cmt_id": "9c61977a713511c01abdf9b2a72693d21cb60556" }, - "CVE-2024-22386": { - "cmt_msg": "" + "CVE-2021-0448": { + "cmt_msg": "netfilter: ctnetlink: add a range check for l3/l4 protonum", + "cmt_id": "9c61977a713511c01abdf9b2a72693d21cb60556" }, - "CVE-2022-1734": { - "cmt_msg": "nfc: nfcmrvl: main: reorder destructive operations in nfcmrvl_nci_unregister_dev to avoid bugs" + "CVE-2021-39634": { + "cmt_msg": "epoll: do not insert into poll queues until all sanity checks are done", + "cmt_id": "a16d314ccda2efa6173f2ae7d386f99c61d273a4" }, - "CVE-2022-3625": { - "cmt_msg": "devlink: Fix use-after-free after a failed reload" + "CVE-2020-28915": { + "cmt_msg": "fbcon: Fix global-out-of-bounds read in fbcon_get_font()", + "cmt_id": "6f1adb22fc0c567d65e8c56cc04d633d2fa1bfb4" + } + }, + "4.9.240": { + "CVE-2020-10135": { + "cmt_msg": "Bluetooth: Consolidate encryption handling in hci_encrypt_cfm", + "cmt_id": "b77912c3bfc6e384c0ec0c08840a37d1f79ee5de" }, - "CVE-2023-28772": { - "cmt_msg": "seq_buf: Fix overflow in seq_buf_putmem_hex()" + "CVE-2020-12352": { + "cmt_msg": "Bluetooth: A2MP: Fix not initializing all members", + "cmt_id": "1a8da94d1c6ecc2a8db2a2477bef6945c0ba9c3e" }, - "CVE-2022-2588": { - "cmt_msg": "net_sched: cls_route: remove from list when handle is 0" + "CVE-2020-12351": { + "cmt_msg": "Bluetooth: L2CAP: Fix calling sk_filter on non-socket based channel", + "cmt_id": "720369661674527c8aa999fae0e295eeea12174c" + } + }, + "4.9.241": { + "CVE-2020-27784": { + "cmt_msg": "usb: gadget: function: printer: fix use-after-free in __lock_acquire", + "cmt_id": "4a47581cf010dc351d8069978080fdb000c0776d" }, - "CVE-2022-3707": { - "cmt_msg": "drm/i915/gvt: fix double free bug in split_2MB_gtt_entry" + "CVE-2020-25705": { + "cmt_msg": "icmp: randomize the global rate limiter", + "cmt_id": "df838165a187b7c699ec372a2a136f9873112776" + } + }, + "4.9.242": { + "CVE-2020-28974": { + "cmt_msg": "vt: Disable KD_FONT_OP_COPY", + "cmt_id": "5ca7f073e680ff2e56756a9b6bffcd55085d292c" }, - "CVE-2022-2503": { - "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag" + "CVE-2020-25668": { + "cmt_msg": "tty: make FONTX ioctl use the tty pointer they were actually passed", + "cmt_id": "ea5dd52c3568e0f7232c20fd4adf551fcad07c60" }, - "CVE-2021-32399": { - "cmt_msg": "bluetooth: eliminate the potential race condition when removing the HCI controller" + "CVE-2020-25656": { + "cmt_msg": "vt: keyboard, extend func_buf_lock to readers", + "cmt_id": "04a6e5aa75e7a9432df0443a17ab7c8dd005cc9b" }, - "CVE-2021-27364": { - "cmt_msg": "scsi: iscsi: Restrict sessions and handles to admin capabilities" + "CVE-2020-35508": { + "cmt_msg": "fork: fix copy_process(CLONE_PARENT) race with the exiting ->real_parent", + "cmt_id": "66be43d81870c55637c2f32d8088d7184e93262a" + } + }, + "4.9.243": { + "CVE-2020-8694": { + "cmt_msg": "powercap: restrict energy meter to root access", + "cmt_id": "04533793ac10b38103d3aefe1c4b5b1eaf009f35" + } + }, + "4.9.244": { + "CVE-2020-14351": { + "cmt_msg": "perf/core: Fix race in the perf_mmap_close() function", + "cmt_id": "5a097d643717160d859f5bd4a29e2088f48a5fd3" }, - "CVE-2022-23038": { - "cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()" + "CVE-2019-0148": { + "cmt_msg": "i40e: Wrong truncation from u16 to u8", + "cmt_id": "b7715c9bb71fa4b95fdb9b98a8814d8e18cb7402" }, - "CVE-2022-23039": { - "cmt_msg": "xen/gntalloc: don't use gnttab_query_foreign_access()" + "CVE-2020-25704": { + "cmt_msg": "perf/core: Fix a memory leak in perf_event_parse_addr_filter()", + "cmt_id": "d59f7d676bfe2149662361fc3a1c0de9d011066d" }, - "CVE-2022-20154": { - "cmt_msg": "sctp: use call_rcu to free endpoint" + "CVE-2020-0427": { + "cmt_msg": "pinctrl: devicetree: Avoid taking direct reference to device name string", + "cmt_id": "77440c3a37203e3f4667d06e37f76ef3968d2d8c" }, - "CVE-2021-45868": { - "cmt_msg": "quota: check block number when reading the block in quota file" + "CVE-2020-27673": { + "cmt_msg": "xen/events: add a proper barrier to 2-level uevent unmasking", + "cmt_id": "d7b048485f6f71e55f32ce904ead727b187b3671" }, - "CVE-2022-20158": { - "cmt_msg": "net/packet: fix slab-out-of-bounds access in packet_recvmsg()" + "CVE-2019-0146": { + "cmt_msg": "i40e: add num_vectors checker in iwarp handler", + "cmt_id": "f4a3ff4df40053000d56554f0d34aa98d4d917d6" }, - "CVE-2022-23037": { - "cmt_msg": "xen/netfront: don't use gnttab_query_foreign_access() for mapped status" + "CVE-2019-0147": { + "cmt_msg": "i40e: add num_vectors checker in iwarp handler", + "cmt_id": "f4a3ff4df40053000d56554f0d34aa98d4d917d6" }, - "CVE-2024-0564": { - "cmt_msg": "" + "CVE-2019-0145": { + "cmt_msg": "i40e: add num_vectors checker in iwarp handler", + "cmt_id": "f4a3ff4df40053000d56554f0d34aa98d4d917d6" }, - "CVE-2024-0565": { - "cmt_msg": "smb: client: fix OOB in receive_encrypted_standard()" + "CVE-2020-27675": { + "cmt_msg": "xen/events: avoid removing an event channel while handling it", + "cmt_id": "e4ccd4b1a6e586659005a231e793af325e575e53" }, - "CVE-2023-2176": { - "cmt_msg": "RDMA/core: Refactor rdma_bind_addr" + "CVE-2020-25645": { + "cmt_msg": "geneve: add transport ports in route lookup for geneve", + "cmt_id": "1200ebbd06c2f569421dcab4e10649f3e299867c" + } + }, + "4.9.245": { + "CVE-2020-4788": { + "cmt_msg": "powerpc/64s: flush L1D on kernel entry", + "cmt_id": "fa4bf9f38184ed7ca4916eb64f8c767d1e279c1f" }, - "CVE-2023-2177": { - "cmt_msg": "sctp: leave the err path free in sctp_stream_init to sctp_stream_free" + "CVE-2020-25669": { + "cmt_msg": "Input: sunkbd - avoid use-after-free in teardown paths", + "cmt_id": "452e66f60880ac1fa1ca0a594fc1ebaee87fa35d" + } + }, + "4.9.247": { + "CVE-2019-19813": { + "cmt_msg": "btrfs: inode: Verify inode mode to avoid NULL pointer dereference", + "cmt_id": "a93a374efd8e0c01abaec21fc808b1cb7fad0b49" }, - "CVE-2021-38160": { - "cmt_msg": "virtio_console: Assure used length from device is limited" + "CVE-2019-19816": { + "cmt_msg": "btrfs: inode: Verify inode mode to avoid NULL pointer dereference", + "cmt_id": "a93a374efd8e0c01abaec21fc808b1cb7fad0b49" + } + }, + "4.9.248": { + "CVE-2020-29661": { + "cmt_msg": "tty: Fix ->pgrp locking in tiocspgrp()", + "cmt_id": "742f3062298ac1ae1d28de31b1f946f93db1eba1" }, - "CVE-2023-1252": { - "cmt_msg": "ovl: fix use after free in struct ovl_aio_req" + "CVE-2020-29660": { + "cmt_msg": "tty: Fix ->session locking", + "cmt_id": "ac28e357fe00902bbc21655eaee6b56c850f80af" }, - "CVE-2021-42008": { - "cmt_msg": "net: 6pack: fix slab-out-of-bounds in decode_data" + "CVE-2020-35519": { + "cmt_msg": "net/x25: prevent a couple of overflows", + "cmt_id": "4596762761d5e0f843fc920babb4506e2d3c6c90" + } + }, + "4.9.249": { + "CVE-2020-27815": { + "cmt_msg": "jfs: Fix array index bounds check in dbAdjTree", + "cmt_id": "2c7c903caef18d45bac879557861656aa30b8933" + } + }, + "4.9.250": { + "CVE-2020-29568": { + "cmt_msg": "xen/xenbus: Allow watches discard events before queueing", + "cmt_id": "7936eefdbec92aaa42281b82c07c6e0b843b7932" }, - "CVE-2022-3107": { - "cmt_msg": "hv_netvsc: Add check for kvmalloc_array" + "CVE-2020-36158": { + "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_cmd_802_11_ad_hoc_start", + "cmt_id": "6ceb5b8e16dac9a041271bc3985ff155bdbb30b4" + } + }, + "4.9.251": { + "CVE-2021-39648": { + "cmt_msg": "usb: gadget: configfs: Fix use-after-free issue with udc_name", + "cmt_id": "225330e682fa9aaa152287b49dea1ce50fbe0a92" + } + }, + "4.9.252": { + "CVE-2020-28374": { + "cmt_msg": "scsi: target: Fix XCOPY NAA identifier lookup", + "cmt_id": "966e6d0786e64f4065b76116d7e9411c01761d30" + } + }, + "4.9.253": { + "CVE-2021-3178": { + "cmt_msg": "nfsd4: readdirplus shouldn't return parent of export", + "cmt_id": "2174b2cf3960b9091c2516feeb9e345fe24f8906" }, - "CVE-2022-39189": { - "cmt_msg": "KVM: x86: do not report a vCPU as preempted outside instruction boundaries" + "CVE-2023-1390": { + "cmt_msg": "tipc: fix NULL deref in tipc_link_xmit()", + "cmt_id": "310014f572a59b311c175321265a08c9adfced0c" + } + }, + "4.9.254": { + "CVE-2020-27825": { + "cmt_msg": "tracing: Fix race in trace_open and buffer resize call", + "cmt_id": "04f51df12ddaa0e2a38223da00e0d3ed02d62a01" }, - "CVE-2021-38166": { - "cmt_msg": "bpf: Fix integer overflow involving bucket_size" + "CVE-2021-39657": { + "cmt_msg": "scsi: ufs: Correct the LUN used in eh_device_reset_handler() callback", + "cmt_id": "7bbac19e604b2443c93f01c3259734d53f776dbf" + } + }, + "4.9.258": { + "CVE-2021-26931": { + "cmt_msg": "xen-blkback: don't \"handle\" error by BUG()", + "cmt_id": "746d5c20c9cbeac0ee9f24a51862eb551c7b8706" }, - "CVE-2021-3490": { - "cmt_msg": "bpf: Fix alu32 const subreg bound tracking on bitwise operations" + "CVE-2021-26930": { + "cmt_msg": "xen-blkback: fix error handling in xen_blkbk_map()", + "cmt_id": "4cec38115dfd5d5c123ece4f4a55165a5a2e8cc0" }, - "CVE-2021-3491": { - "cmt_msg": "io_uring: truncate lengths larger than MAX_RW_COUNT on provide buffers" + "CVE-2021-26932": { + "cmt_msg": "Xen/x86: don't bail early from clear_foreign_p2m_mapping()", + "cmt_id": "34156171ae855364456933c1aea81ea0f2536853" + } + }, + "4.9.259": { + "CVE-2021-0512": { + "cmt_msg": "HID: make arrays usage and value to be the same", + "cmt_id": "b12d39309ecf08cdcab716a5063f9ec23cb9f001" }, - "CVE-2005-3660": { - "cmt_msg": "" + "CVE-2021-3612": { + "cmt_msg": "Input: joydev - prevent potential read overflow in ioctl", + "cmt_id": "e0154ded9330c188863b09824c3b07ebafa6e5a4" + } + }, + "4.9.260": { + "CVE-2021-30002": { + "cmt_msg": "media: v4l: ioctl: Fix memory leak in video_usercopy", + "cmt_id": "80c22132c0f4bb91cef8c9001bde3057c07f005f" }, - "CVE-2022-0516": { - "cmt_msg": "KVM: s390: Return error on SIDA memop on normal guest" + "CVE-2021-27365": { + "cmt_msg": "scsi: iscsi: Ensure sysfs attributes are limited to PAGE_SIZE", + "cmt_id": "9ce352a1fbfb9d16353ea30cf4b922a1a049fe69" }, - "CVE-2023-31085": { - "cmt_msg": "ubi: Refuse attaching if mtd's erasesize is 0" + "CVE-2021-27364": { + "cmt_msg": "scsi: iscsi: Restrict sessions and handles to admin capabilities", + "cmt_id": "a483236b41db0228bd4643d7cc0a4c51d33edd93" }, - "CVE-2023-31084": { - "cmt_msg": "media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*()" + "CVE-2021-27363": { + "cmt_msg": "scsi: iscsi: Restrict sessions and handles to admin capabilities", + "cmt_id": "a483236b41db0228bd4643d7cc0a4c51d33edd93" }, - "CVE-2023-31083": { - "cmt_msg": "Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO" + "CVE-2021-28038": { + "cmt_msg": "Xen/gnttab: handle p2m update errors on a per-slot basis", + "cmt_id": "d1ae0cfd1fab27d170caf905e519198cb144d523" + } + }, + "4.9.262": { + "CVE-2019-19060": { + "cmt_msg": "iio: imu: adis16400: release allocated memory on failure", + "cmt_id": "9c8c498ae28e116f26509d72d0db667eb5414dac" }, - "CVE-2023-31082": { - "cmt_msg": "" + "CVE-2019-19061": { + "cmt_msg": "iio: imu: adis16400: fix memory leak", + "cmt_id": "10f675ec4eda0801791546980b35cc41589815aa" }, - "CVE-2023-31081": { - "cmt_msg": "" + "CVE-2021-29265": { + "cmt_msg": "usbip: fix stub_dev usbip_sockfd_store() races leading to gpf", + "cmt_id": "bce53f0b8e90d2821ec5fa14689949a025e8b63d" }, - "CVE-2021-33034": { - "cmt_msg": "Bluetooth: verify AMP hci_chan before amp_destroy" + "CVE-2021-28660": { + "cmt_msg": "staging: rtl8188eu: prevent ->ssid overflow in rtw_wx_set_scan()", + "cmt_id": "b318d268318be4c229fb4c0d4f6ff1d7251c88d7" + } + }, + "4.9.263": { + "CVE-2021-28964": { + "cmt_msg": "btrfs: fix race when cloning extent buffer during rewind of an old root", + "cmt_id": "ca403b79f4330bb5a8df3551e39610db6c06c46f" }, - "CVE-2021-33033": { - "cmt_msg": "cipso,calipso: resolve a number of problems with the DOI refcounts" + "CVE-2021-28972": { + "cmt_msg": "PCI: rpadlpar: Fix potential drc_name corruption in store functions", + "cmt_id": "ef8dc3d327cc799e3f6f1af41852f8f954f7115f" }, - "CVE-2022-0286": { - "cmt_msg": "bonding: fix null dereference in bond_ipsec_add_sa()" + "CVE-2021-28971": { + "cmt_msg": "perf/x86/intel: Fix a crash caused by zero PEBS status", + "cmt_id": "6c2ab223a7286ecfa016f532b7231fb049fb2a02" + } + }, + "4.9.264": { + "CVE-2021-28688": { + "cmt_msg": "xen-blkback: don't leak persistent grants from xen_blkbk_map()", + "cmt_id": "3cb86952ce3c8b28a0c1f3ce82848618d8628015" }, - "CVE-2024-23307": { - "cmt_msg": "" + "CVE-2021-29647": { + "cmt_msg": "net: qrtr: fix a kernel-infoleak in qrtr_recvmsg()", + "cmt_id": "ab29b020bc29aecaa05e29063cddea83df393023" + } + }, + "4.9.265": { + "CVE-2021-0941": { + "cmt_msg": "bpf: Remove MTU check in __bpf_skb_max_len", + "cmt_id": "1636af9e8a8840f5696ad2c01130832411986af4" }, - "CVE-2022-32296": { - "cmt_msg": "tcp: increase source port perturb table to 2^16" + "CVE-2021-3483": { + "cmt_msg": "firewire: nosy: Fix a use-after-free bug in nosy_ioctl()", + "cmt_id": "cf4ab748a0ef6e70cad3878bf31f57ee33bf2d14" + } + }, + "4.9.266": { + "CVE-2021-29154": { + "cmt_msg": "bpf, x86: Validate computation of branch displacements for x86-64", + "cmt_id": "d4b234e44aa7108aeadc7b84b162c6f882597005" + } + }, + "4.9.267": { + "CVE-2021-3659": { + "cmt_msg": "net: mac802154: Fix general protection fault", + "cmt_id": "c3883480ce4ebe5b13dbfdc9f2c6503bc9e8ab69" }, - "CVE-2023-3567": { - "cmt_msg": "vc_screen: move load of struct vc_data pointer in vcs_read() to avoid UAF" + "CVE-2021-0937": { + "cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write", + "cmt_id": "0c58c9f9c5c5326320bbe0429a0f45fc1b92024b" }, - "CVE-2022-3028": { - "cmt_msg": "af_key: Do not call xfrm_probe_algs in parallel" + "CVE-2020-25672": { + "cmt_msg": "nfc: fix memory leak in llcp_sock_connect()", + "cmt_id": "83a09c10719661d8b51f1aa475ec52c13f3546d1" }, - "CVE-2020-14304": { - "cmt_msg": "" + "CVE-2020-25673": { + "cmt_msg": "nfc: Avoid endless loops caused by repeated llcp_sock_connect()", + "cmt_id": "79fc2e475789067b3bf3100a00f37fd9d75cbc8d" }, - "CVE-2022-2318": { - "cmt_msg": "net: rose: fix UAF bugs caused by timer handler" + "CVE-2020-25670": { + "cmt_msg": "nfc: fix refcount leak in llcp_sock_bind()", + "cmt_id": "18013007b596771bf5f5e7feee9586fb0386ad14" }, - "CVE-2022-33981": { - "cmt_msg": "floppy: disable FDRAWCMD by default" + "CVE-2020-25671": { + "cmt_msg": "nfc: fix refcount leak in llcp_sock_connect()", + "cmt_id": "013b8099064f2dc51e789e54a93edb65e2539792" }, - "CVE-2021-3564": { - "cmt_msg": "Bluetooth: fix the erroneous flush_work() order" + "CVE-2021-22555": { + "cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write", + "cmt_id": "0c58c9f9c5c5326320bbe0429a0f45fc1b92024b" + } + }, + "4.9.268": { + "CVE-2021-46904": { + "cmt_msg": "net: hso: fix null-ptr-deref during tty device unregistration", + "cmt_id": "145c89c441d27696961752bf51b323f347601bee" + } + }, + "4.9.269": { + "CVE-2020-36777": { + "cmt_msg": "media: dvbdev: Fix memory leak in dvb_media_device_free()", + "cmt_id": "06854b943e0571ccbd7ad0a529babed1a98ff275" }, - "CVE-2023-3611": { - "cmt_msg": "net/sched: sch_qfq: account for stab overhead in qfq_enqueue" + "CVE-2021-4157": { + "cmt_msg": "pNFS/flexfiles: fix incorrect size check in decode_nfs_fh()", + "cmt_id": "c621f3654bba1096ec913d0942e27bd032bb6090" }, - "CVE-2023-4132": { - "cmt_msg": "media: usb: siano: Fix warning due to null work_func_t function pointer" + "CVE-2017-0605": { + "cmt_msg": "tracing: Use strlcpy() instead of strcpy() in __trace_find_cmdline()", + "cmt_id": "27b1e95a936e23a9328e1f318c199d3946352531" }, - "CVE-2023-4133": { - "cmt_msg": "cxgb4: fix use after free bugs caused by circular dependency problem" + "CVE-2021-31916": { + "cmt_msg": "dm ioctl: fix out of bounds array access when no devices", + "cmt_id": "c13f07341685149cfbc2014e8b4a85ff56d4ae0e" }, - "CVE-2020-26560": { - "cmt_msg": "" + "CVE-2021-47056": { + "cmt_msg": "crypto: qat - ADF_STATUS_PF_RUNNING should be set after adf_dev_init", + "cmt_id": "f4c4e07140687f42bfa40e091bb4a55d7960ce4d" }, - "CVE-2023-4134": { - "cmt_msg": "Input: cyttsp4_core - change del_timer_sync() to timer_shutdown_sync()" + "CVE-2021-46939": { + "cmt_msg": "tracing: Restructure trace_clock_global() to never block", + "cmt_id": "859b47a43f5a0e5b9a92b621dc6ceaad39fb5c8b" }, - "CVE-2023-39198": { - "cmt_msg": "drm/qxl: fix UAF on handle creation" + "CVE-2021-46938": { + "cmt_msg": "dm rq: fix double free of blk_mq_tag_set in dev remove after table load fails", + "cmt_id": "8ae0185255eaf05bd66f4215c81e99bf01140fd9" }, - "CVE-2023-37454": { - "cmt_msg": "" + "CVE-2021-33034": { + "cmt_msg": "Bluetooth: verify AMP hci_chan before amp_destroy", + "cmt_id": "31f20a6e73663c8ac3c625aa6b24cbdc8541c674" }, - "CVE-2022-20572": { - "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag" + "CVE-2021-47013": { + "cmt_msg": "net:emac/emac-mac: Fix a use after free in emac_mac_tx_buf_send", + "cmt_id": "c7f75d11fe72913d2619f97b2334b083cd7bb955" }, - "CVE-2023-39194": { - "cmt_msg": "net: xfrm: Fix xfrm_address_filter OOB read" + "CVE-2021-47054": { + "cmt_msg": "bus: qcom: Put child node before return", + "cmt_id": "a6191e91c10e50bd51db65a00e03d02b6b0cf8c4" }, - "CVE-2021-28964": { - "cmt_msg": "btrfs: fix race when cloning extent buffer during rewind of an old root" + "CVE-2021-47006": { + "cmt_msg": "ARM: 9064/1: hw_breakpoint: Do not directly check the event's overflow_handler hook", + "cmt_id": "555a70f7fff03bd669123487905c47ae27dbdaac" }, - "CVE-2023-1829": { - "cmt_msg": "net/sched: Retire tcindex classifier" + "CVE-2021-32399": { + "cmt_msg": "bluetooth: eliminate the potential race condition when removing the HCI controller", + "cmt_id": "34f1f8aecf16798c91154e0f6d56b4f804a39bd1" + } + }, + "4.9.270": { + "CVE-2021-47078": { + "cmt_msg": "RDMA/rxe: Clear all QP fields if creation failed", + "cmt_id": "c65391dd9f0a47617e96e38bd27e277cbe1c40b0" }, - "CVE-2021-4083": { - "cmt_msg": "fget: check that the fd still exists after getting a ref to it" + "CVE-2020-26558": { + "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical", + "cmt_id": "6555a006b21ab49090b9a7b36e92d0421db19328" }, - "CVE-2023-33288": { - "cmt_msg": "power: supply: bq24190: Fix use after free bug in bq24190_remove due to race condition" + "CVE-2021-0129": { + "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical", + "cmt_id": "6555a006b21ab49090b9a7b36e92d0421db19328" }, - "CVE-2022-29900": { - "cmt_msg": "x86/kvm/vmx: Make noinstr clean" + "CVE-2020-26555": { + "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical", + "cmt_id": "6555a006b21ab49090b9a7b36e92d0421db19328" + } + }, + "4.9.271": { + "CVE-2021-47173": { + "cmt_msg": "misc/uss720: fix memory leak in uss720_probe", + "cmt_id": "7889c70e6173ef358f3cd7578db127a489035a42" }, - "CVE-2022-29901": { - "cmt_msg": "x86/kvm/vmx: Make noinstr clean" + "CVE-2020-24587": { + "cmt_msg": "mac80211: prevent mixed key and fragment cache attacks", + "cmt_id": "bb47466456af2f1ac7ab48e5e69d4d8e0dd361e8" }, - "CVE-2023-3161": { - "cmt_msg": "fbcon: Check font dimension limits" + "CVE-2020-24586": { + "cmt_msg": "mac80211: prevent mixed key and fragment cache attacks", + "cmt_id": "bb47466456af2f1ac7ab48e5e69d4d8e0dd361e8" }, - "CVE-2023-39192": { - "cmt_msg": "netfilter: xt_u32: validate user space input" + "CVE-2021-47179": { + "cmt_msg": "NFSv4: Fix a NULL pointer dereference in pnfs_mark_matching_lsegs_return()", + "cmt_id": "4e1ba532dbc1a0e19fc2458d74ab8d98680c4e42" }, - "CVE-2023-25012": { - "cmt_msg": "HID: bigben: use spinlock to safely schedule workers" + "CVE-2021-47168": { + "cmt_msg": "NFS: fix an incorrect limit in filelayout_decode_layout()", + "cmt_id": "b287521e9e94bb342ebe5fd8c3fd7db9aef4e6f1" }, - "CVE-2023-35829": { - "cmt_msg": "media: rkvdec: fix use after free bug in rkvdec_remove" + "CVE-2021-34981": { + "cmt_msg": "Bluetooth: cmtp: fix file refcount when cmtp_attach_device fails", + "cmt_id": "77c559407276ed4a8854dafc4a5efc8608e51906" }, - "CVE-2023-35828": { - "cmt_msg": "usb: gadget: udc: renesas_usb3: Fix use after free bug in renesas_usb3_remove due to race condition" + "CVE-2020-24588": { + "cmt_msg": "cfg80211: mitigate A-MSDU aggregation attacks", + "cmt_id": "81bcb7d7d5071511eb86cc3b7793607bac9d4060" }, - "CVE-2022-29582": { - "cmt_msg": "io_uring: fix race between timeout flush and removal" + "CVE-2020-26139": { + "cmt_msg": "mac80211: do not accept/forward invalid EAPOL frames", + "cmt_id": "5551cb1c68d4ecdabf8b9ea33410f68532b895cc" }, - "CVE-2022-1116": { - "cmt_msg": "" + "CVE-2021-47166": { + "cmt_msg": "NFS: Don't corrupt the value of pg_bytes_written in nfs_do_recoalesce()", + "cmt_id": "b291baae24f876acd5a5dd57d0bb2bbac8a68b0c" }, - "CVE-2021-28660": { - "cmt_msg": "staging: rtl8188eu: prevent ->ssid overflow in rtw_wx_set_scan()" + "CVE-2020-26147": { + "cmt_msg": "mac80211: assure all fragments are encrypted", + "cmt_id": "29bc5b2bccf5f5601cabf9562454f213fb8dcd67" }, - "CVE-2023-35823": { - "cmt_msg": "media: saa7134: fix use after free bug in saa7134_finidev due to race condition" + "CVE-2021-47149": { + "cmt_msg": "net: fujitsu: fix potential null-ptr-deref", + "cmt_id": "6dbf1101594f7c76990b63c35b5a40205a914b6b" }, - "CVE-2022-23816": { - "cmt_msg": "x86/kvm/vmx: Make noinstr clean" + "CVE-2021-47162": { + "cmt_msg": "tipc: skb_linearize the head skb when reassembling msgs", + "cmt_id": "5489f30bb78ff0dafb4229a69632afc2ba20765c" }, - "CVE-2023-35824": { - "cmt_msg": "media: dm1105: Fix use after free bug in dm1105_remove due to race condition" + "CVE-2021-47171": { + "cmt_msg": "net: usb: fix memory leak in smsc75xx_bind", + "cmt_id": "22c840596af0c09068b6cf948616e6496e59e07f" }, - "CVE-2023-35827": { - "cmt_msg": "ravb: Fix use-after-free issue in ravb_tx_timeout_work()" + "CVE-2021-47145": { + "cmt_msg": "btrfs: do not BUG_ON in link_to_fixup_dir", + "cmt_id": "e934c4ee17b33bafb0444f2f9766cda7166d3c40" }, - "CVE-2022-3567": { - "cmt_msg": "ipv6: Fix data races around sk->sk_prot." + "CVE-2021-29650": { + "cmt_msg": "netfilter: x_tables: Use correct memory barriers.", + "cmt_id": "e2a2d6c9accf3c3cdf44990c03498e86f27d5ea3" }, - "CVE-2022-3566": { - "cmt_msg": "tcp: Fix data races around icsk->icsk_af_ops." + "CVE-2021-47146": { + "cmt_msg": "mld: fix panic in mld_newpack()", + "cmt_id": "17728616a4c85baf0edc975c60ba4e4157684d9a" }, - "CVE-2022-3565": { - "cmt_msg": "mISDN: fix use-after-free bugs in l1oip timer handlers" + "CVE-2021-47180": { + "cmt_msg": "NFC: nci: fix memory leak in nci_allocate_device", + "cmt_id": "4a621621c7af3cec21c47c349b30cd9c3cea11c8" }, - "CVE-2022-3564": { - "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free caused by l2cap_reassemble_sdu" + "CVE-2021-47153": { + "cmt_msg": "i2c: i801: Don't generate an interrupt on bus reset", + "cmt_id": "09c9e79f4c10cfb6b9e0e1b4dd355232e4b5a3b3" }, - "CVE-2022-4269": { - "cmt_msg": "act_mirred: use the backlog for nested calls to mirred ingress" + "CVE-2021-47169": { + "cmt_msg": "serial: rp2: use 'request_firmware' instead of 'request_firmware_nowait'", + "cmt_id": "c697244ce940ec07e2d745ccb63ca97fc0266fbc" }, - "CVE-2020-36385": { - "cmt_msg": "RDMA/ucma: Rework ucma_migrate_id() to avoid races with destroy" + "CVE-2021-47142": { + "cmt_msg": "drm/amdgpu: Fix a use-after-free", + "cmt_id": "3293cf3513d69f00c14d43e2020826d45ea0e46a" + } + }, + "4.9.272": { + "CVE-2021-3573": { + "cmt_msg": "Bluetooth: use correct lock to prevent UAF of hdev object", + "cmt_id": "3c62132da179fd30531958d51c68ba4915996556" }, - "CVE-2023-52340": { - "cmt_msg": "ipv6: remove max_size check inline with ipv4" + "CVE-2021-47122": { + "cmt_msg": "net: caif: fix memory leak in caif_device_notify", + "cmt_id": "9348c1f10932f13b299cbc8b1bd5f780751fae49" }, - "CVE-2023-4622": { - "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES" + "CVE-2021-47121": { + "cmt_msg": "net: caif: fix memory leak in cfusbl_device_notify", + "cmt_id": "81afc61cb6e2b553f2c5f992fa79e0ae73857141" }, - "CVE-2023-6560": { - "cmt_msg": "io_uring: don't allow discontig pages for IORING_SETUP_NO_MMAP" + "CVE-2021-3564": { + "cmt_msg": "Bluetooth: fix the erroneous flush_work() order", + "cmt_id": "75aa7baab3e18a98f232f14dd9cc6965bcf9b31a" }, - "CVE-2021-3573": { - "cmt_msg": "Bluetooth: use correct lock to prevent UAF of hdev object" + "CVE-2021-47117": { + "cmt_msg": "ext4: fix bug on in ext4_es_cache_extent as ext4_split_extent_at failed", + "cmt_id": "5b3a9a2be59478b013a430ac57b0f3d65471b071" }, - "CVE-2022-29581": { - "cmt_msg": "net/sched: cls_u32: fix netns refcount changes in u32_change()" + "CVE-2021-47114": { + "cmt_msg": "ocfs2: fix data corruption by fallocate", + "cmt_id": "33e03adafb29eedae1bae9cdb50c1385279fcf65" }, - "CVE-2022-1204": { - "cmt_msg": "ax25: Fix refcount leaks caused by ax25_cb_del()" + "CVE-2021-47118": { + "cmt_msg": "pid: take a reference when initializing `cad_pid`", + "cmt_id": "f86c80515a8a3703e0ca2e56deb50fc2879c5ea4" }, - "CVE-2023-1611": { - "cmt_msg": "btrfs: fix race between quota disable and quota assign ioctls" + "CVE-2021-38208": { + "cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect", + "cmt_id": "39c15bd2e5d11bcf7f4c3dba2aad9e1e110a5d94" }, + "CVE-2021-3587": { + "cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect", + "cmt_id": "39c15bd2e5d11bcf7f4c3dba2aad9e1e110a5d94" + } + }, + "4.9.274": { "CVE-2021-34693": { - "cmt_msg": "can: bcm: fix infoleak in struct bcm_msg_head" + "cmt_msg": "can: bcm: fix infoleak in struct bcm_msg_head", + "cmt_id": "d240a28396e08023987384ce80bc940bb38ac779" }, - "CVE-2022-26490": { - "cmt_msg": "nfc: st21nfca: Fix potential buffer overflows in EVT_TRANSACTION" + "CVE-2021-46906": { + "cmt_msg": "HID: usbhid: fix info leak in hid_submit_ctrl", + "cmt_id": "41b1e71a2c57366b08dcca1a28b0d45ca69429ce" }, - "CVE-2023-6817": { - "cmt_msg": "netfilter: nft_set_pipapo: skip inactive elements during set walk" + "CVE-2021-45486": { + "cmt_msg": "inet: use bigger hash table for IP ID generation", + "cmt_id": "0889f0a3bb2de535f48424491d8f9d5954a3cde8" + } + }, + "4.9.276": { + "CVE-2021-45485": { + "cmt_msg": "ipv6: use prandom_u32() for ID generation", + "cmt_id": "3fc852e59c0a48094cc0f1b2e866604986bbcd31" }, - "CVE-2022-1836": { - "cmt_msg": "floppy: disable FDRAWCMD by default" + "CVE-2022-0850": { + "cmt_msg": "ext4: fix kernel infoleak via ext4_extent_header", + "cmt_id": "25dcc64fa0c9399653e1fd1a4bad6c1e8cb31f3f" }, - "CVE-2021-32078": { - "cmt_msg": "ARM: footbridge: remove personal server platform" + "CVE-2023-28772": { + "cmt_msg": "seq_buf: Fix overflow in seq_buf_putmem_hex()", + "cmt_id": "f2b9f758e1dfb593872fd0fcd7644875bcb8757a" }, - "CVE-2022-30594": { - "cmt_msg": "ptrace: Check PTRACE_O_SUSPEND_SECCOMP permission on PTRACE_SEIZE" + "CVE-2021-3609": { + "cmt_msg": "can: bcm: delay release of struct bcm_op after synchronize_rcu()", + "cmt_id": "545914a9f926b8b6c9193cdee352c1fa70e6df18" }, - "CVE-2022-4662": { - "cmt_msg": "USB: core: Prevent nested device-reset calls" + "CVE-2021-33909": { + "cmt_msg": "seq_file: disallow extremely large seq buffer allocations", + "cmt_id": "c5157b3e775dac31d51b11f993a06a84dc11fc8c" }, + "CVE-2021-38160": { + "cmt_msg": "virtio_console: Assure used length from device is limited", + "cmt_id": "9e2b8368b2079437c6840f3303cb0b7bc9b896ee" + } + }, + "4.9.277": { "CVE-2021-38204": { - "cmt_msg": "usb: max-3421: Prevent corruption of freed memory" + "cmt_msg": "usb: max-3421: Prevent corruption of freed memory", + "cmt_id": "ae3209b9fb086661ec1de4d8f4f0b951b272bbcd" }, - "CVE-2021-38205": { - "cmt_msg": "net: xilinx_emaclite: Do not print real IOMEM pointer" + "CVE-2021-3679": { + "cmt_msg": "tracing: Fix bug in rb_per_cpu_empty() that might cause deadloop.", + "cmt_id": "7db12bae1a239d872d17e128fd5271da789bf99c" }, - "CVE-2021-38206": { - "cmt_msg": "mac80211: Fix NULL ptr deref for injected rate info" + "CVE-2021-37576": { + "cmt_msg": "KVM: PPC: Book3S: Fix H_RTAS rets buffer overflow", + "cmt_id": "8c46b4b2749c4b3b7e602403addc32ec2b48baed" + } + }, + "4.9.278": { + "CVE-2021-0920": { + "cmt_msg": "af_unix: fix garbage collect vs MSG_PEEK", + "cmt_id": "a805a7bd94644207d762d9c287078fecfcf52b3e" }, - "CVE-2021-38207": { - "cmt_msg": "net: ll_temac: Fix TX BD buffer overwrite" + "CVE-2021-21781": { + "cmt_msg": "ARM: ensure the signal page contains defined contents", + "cmt_id": "aa1b5f2fe4532e99986f1eee2c04bb7d314e3007" + } + }, + "4.9.280": { + "CVE-2021-38205": { + "cmt_msg": "net: xilinx_emaclite: Do not print real IOMEM pointer", + "cmt_id": "ffdc1e312e2074875147c1df90764a9bae56f11f" }, - "CVE-2023-39189": { - "cmt_msg": "netfilter: nfnetlink_osf: avoid OOB read" + "CVE-2021-3732": { + "cmt_msg": "ovl: prevent private clone if bind mount is not allowed", + "cmt_id": "e3eee87c846dc47f6d8eb6d85e7271f24122a279" + } + }, + "4.9.281": { + "CVE-2021-3653": { + "cmt_msg": "KVM: nSVM: avoid picking up unsupported bits from L2 in int_ctl (CVE-2021-3653)", + "cmt_id": "29c4f674715ba8fe7a391473313e8c71f98799c4" }, - "CVE-2023-35001": { - "cmt_msg": "netfilter: nf_tables: prevent OOB access in nft_byteorder_eval" + "CVE-2021-42008": { + "cmt_msg": "net: 6pack: fix slab-out-of-bounds in decode_data", + "cmt_id": "de9171c1d9a5c2c4c5ec5e64f420681f178152fa" + } + }, + "4.9.282": { + "CVE-2021-39633": { + "cmt_msg": "ip_gre: add validation for csum_start", + "cmt_id": "41d5dfa408130433cc5f037ad89bed854bf936f7" }, - "CVE-2022-27666": { - "cmt_msg": "esp: Fix possible buffer overflow in ESP transformation" + "CVE-2021-3753": { + "cmt_msg": "vt_kdsetmode: extend console locking", + "cmt_id": "755a2f40dda2d6b2e3b8624cb052e68947ee4d1f" + } + }, + "4.9.283": { + "CVE-2022-20141": { + "cmt_msg": "igmp: Add ip_mc_list lock in ip_check_mc_rcu", + "cmt_id": "e9924c4204ede999b0515fd31a370a1e27f676bc" }, - "CVE-2021-38208": { - "cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect" + "CVE-2021-40490": { + "cmt_msg": "ext4: fix race writing to an inline_data file while its xattrs are changing", + "cmt_id": "7067b09fe587cbd47544a3047a40c64e4d636fff" }, - "CVE-2021-38209": { - "cmt_msg": "netfilter: conntrack: Make global sysctls readonly in non-init netns" + "CVE-2020-3702": { + "cmt_msg": "ath: Use safer key clearing with key cache entries", + "cmt_id": "ea3f7df20fc8e0b82ec0e065b0b0d38e55fd7775" + } + }, + "4.9.284": { + "CVE-2021-20320": { + "cmt_msg": "s390/bpf: Fix optimizing out zero-extensions", + "cmt_id": "c22cf38428cb910f1996839c917e9238d2e44d4b" }, - "CVE-2022-0168": { - "cmt_msg": "cifs: fix NULL ptr dereference in smb2_ioctl_query_info()" + "CVE-2021-3655": { + "cmt_msg": "sctp: validate from_addr_param return", + "cmt_id": "92e7bca98452aa760713016a434aa7edfc09fb13" + } + }, + "4.9.286": { + "CVE-2021-4203": { + "cmt_msg": "af_unix: fix races in sk_peer_pid and sk_peer_cred accesses", + "cmt_id": "09818f629bafbe20e24bac919019853ea3ac5ca4" + } + }, + "4.9.287": { + "CVE-2021-41864": { + "cmt_msg": "bpf: Fix integer overflow in prealloc_elems_and_freelist()", + "cmt_id": "4fd6663eb01bc3c73143cd27fefd7b8351bc6aa6" }, - "CVE-2020-26556": { - "cmt_msg": "" + "CVE-2020-29374": { + "cmt_msg": "gup: document and work around \"COW can break either way\" issue", + "cmt_id": "9bbd42e79720122334226afad9ddcac1c3e6d373" }, - "CVE-2020-26557": { - "cmt_msg": "" + "CVE-2021-20321": { + "cmt_msg": "ovl: fix missing negative dentry check in ovl_rename()", + "cmt_id": "286f94453fb34f7bd6b696861c89f9a13f498721" + } + }, + "4.9.288": { + "CVE-2021-3896": { + "cmt_msg": "isdn: cpai: check ctr->cnr to avoid array index out of bound", + "cmt_id": "24219a977bfe3d658687e45615c70998acdbac5a" }, - "CVE-2020-26555": { - "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical" + "CVE-2022-0644": { + "cmt_msg": "vfs: check fd has read access in kernel_read_file_from_fd()", + "cmt_id": "52ed5a196b1146e0368e95edc23c38fa1b50825a" }, - "CVE-2019-20794": { - "cmt_msg": "" + "CVE-2021-3760": { + "cmt_msg": "nfc: nci: fix the UAF of rf_conn_info object", + "cmt_id": "8a44904ce83ebcb1281b04c8d37ad7f8ab537a3d" }, - "CVE-2020-26559": { - "cmt_msg": "" + "CVE-2021-43389": { + "cmt_msg": "isdn: cpai: check ctr->cnr to avoid array index out of bound", + "cmt_id": "24219a977bfe3d658687e45615c70998acdbac5a" + } + }, + "4.9.289": { + "CVE-2021-3772": { + "cmt_msg": "sctp: use init_tag from inithdr for ABORT chunk", + "cmt_id": "42ce7a69f8140783bab908dc29a93c0bcda315d5" + } + }, + "4.9.290": { + "CVE-2021-37159": { + "cmt_msg": "usb: hso: fix error handling code of hso_create_net_device", + "cmt_id": "88b912e02d75bacbb957d817db70e6a54ea3a21c" + } + }, + "4.9.291": { + "CVE-2021-4202": { + "cmt_msg": "NFC: reorganize the functions in nci_request", + "cmt_id": "4a59a3681158a182557c75bacd00d184f9b2a8f5" }, - "CVE-2023-3397": { - "cmt_msg": "" + "CVE-2021-39686": { + "cmt_msg": "binder: use euid from cred instead of using task", + "cmt_id": "443fc43d2fdbf55be7aa86faae1f7655e761e683" }, - "CVE-2022-26365": { - "cmt_msg": "xen/blkfront: fix leaking data in shared pages" + "CVE-2023-0047": { + "cmt_msg": "mm, oom: do not trigger out_of_memory from the #PF", + "cmt_id": "973b61a5f3ba6690624d109a68cca35d0348b91f" }, - "CVE-2023-52458": { - "cmt_msg": "block: add check that partition length needs to be aligned with block size" + "CVE-2021-3640": { + "cmt_msg": "Bluetooth: sco: Fix lock_sock() blockage by memcpy_from_msg()", + "cmt_id": "9bbe312ebea40c9b586c2b07a0d0948ff418beca" }, - "CVE-2023-52457": { - "cmt_msg": "serial: 8250: omap: Don't skip resource freeing if pm_runtime_resume_and_get() failed" + "CVE-2021-45868": { + "cmt_msg": "quota: check block number when reading the block in quota file", + "cmt_id": "f7dd331a896700728492e02c20a69e53221cd7a4" }, - "CVE-2018-1121": { - "cmt_msg": "" + "CVE-2021-3752": { + "cmt_msg": "Bluetooth: fix use-after-free error in lock_sock_nested()", + "cmt_id": "d19ea7da0eeb61be28ec05d8b8bddec3dde71610" + } + }, + "4.9.292": { + "CVE-2021-4002": { + "cmt_msg": "hugetlbfs: flush TLBs correctly after huge_pmd_unshare", + "cmt_id": "8e80bf5d001594b037de04fb4fe89f34cfbcb3ba" }, - "CVE-2023-52454": { - "cmt_msg": "nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length" + "CVE-2021-4083": { + "cmt_msg": "fget: check that the fd still exists after getting a ref to it", + "cmt_id": "a043f5a600052dc93bc3d7a6a2c1592b6ee77482" + } + }, + "4.9.293": { + "CVE-2022-20132": { + "cmt_msg": "HID: add hid_is_usb() function to make it simpler for USB detection", + "cmt_id": "28d8244f3ec961a11bfb4ad83cdc48ff9b8c47a7" }, - "CVE-2023-52451": { - "cmt_msg": "powerpc/pseries/memhp: Fix access beyond end of drmem array" + "CVE-2021-39698": { + "cmt_msg": "wait: add wake_up_pollfree()", + "cmt_id": "0e92a7e47a0411d5208990c83a3d200515e314e8" }, - "CVE-2022-3061": { - "cmt_msg": "video: fbdev: i740fb: Error out if 'pixclock' equals zero" + "CVE-2021-39685": { + "cmt_msg": "USB: gadget: detect too-big endpoint 0 requests", + "cmt_id": "d2ca6859ea96c6d4c6ad3d6873a308a004882419" + } + }, + "4.9.294": { + "CVE-2021-28715": { + "cmt_msg": "xen/netback: don't queue unlimited number of packages", + "cmt_id": "b4226b387436315e7f57465c15335f4f4b5b075d" }, - "CVE-2024-1086": { - "cmt_msg": "netfilter: nf_tables: reject QUEUE/DROP verdict parameters" + "CVE-2021-28714": { + "cmt_msg": "xen/netback: fix rx queue stall detection", + "cmt_id": "1f66dc775092e5a353e0155fc3aca5dabce77c63" }, - "CVE-2019-15794": { - "cmt_msg": "ovl: fix reference counting in ovl_mmap error path" + "CVE-2021-28713": { + "cmt_msg": "xen/console: harden hvc_xen against event channel storms", + "cmt_id": "728389c21176b2095fa58e858d5ef1d2f2aac429" }, - "CVE-2022-3344": { - "cmt_msg": "KVM: x86: nSVM: harden svm_free_nested against freeing vmcb02 while still in use" + "CVE-2021-28712": { + "cmt_msg": "xen/netfront: harden netfront against event channel storms", + "cmt_id": "99120c8230fdd5e8b72a6e4162db9e1c0a61954a" }, - "CVE-2023-23004": { - "cmt_msg": "malidp: Fix NULL vs IS_ERR() checking" + "CVE-2021-28711": { + "cmt_msg": "xen/blkfront: harden blkfront against event channel storms", + "cmt_id": "25898389795bd85d8e1520c0c75c3ad906c17da7" + } + }, + "4.9.295": { + "CVE-2022-1195": { + "cmt_msg": "hamradio: improve the incomplete fix to avoid NPD", + "cmt_id": "83ba6ec97c74fb1a60f7779a26b6a94b28741d8a" }, - "CVE-2023-23006": { - "cmt_msg": "net/mlx5: DR, Fix NULL vs IS_ERR checking in dr_domain_init_resources" + "CVE-2021-47086": { + "cmt_msg": "phonet/pep: refuse to enable an unbound pipe", + "cmt_id": "b10c7d745615a092a50c2e03ce70446d2bec2aca" + } + }, + "4.9.296": { + "CVE-2021-46936": { + "cmt_msg": "net: fix use-after-free in tw_timer_handler", + "cmt_id": "e73164e89d1be561228a4534e1091369ee4ba41a" }, - "CVE-2022-0644": { - "cmt_msg": "vfs: check fd has read access in kernel_read_file_from_fd()" + "CVE-2021-46933": { + "cmt_msg": "usb: gadget: f_fs: Clear ffs_eventfd in ffs_data_clear.", + "cmt_id": "cc8c8028c21b2a3842a1e98e99e55028df275919" }, - "CVE-2023-23000": { - "cmt_msg": "phy: tegra: xusb: Fix return value of tegra_xusb_find_port_node function" + "CVE-2021-46932": { + "cmt_msg": "Input: appletouch - initialize work before device registration", + "cmt_id": "d1962f263a176f493400b8f91bfbf2bfedce951e" + } + }, + "4.9.297": { + "CVE-2021-45095": { + "cmt_msg": "phonet: refcount leak in pep_sock_accep", + "cmt_id": "3bae29ecb2909c46309671090311230239f1bdd7" }, - "CVE-2023-1670": { - "cmt_msg": "xirc2ps_cs: Fix use after free bug in xirc2ps_detach" + "CVE-2021-4155": { + "cmt_msg": "xfs: map unwritten blocks in XFS_IOC_{ALLOC,FREE}SP just like fallocate", + "cmt_id": "19e3d9a26f28f432ae89acec22ec47b2a72a502c" + } + }, + "4.9.298": { + "CVE-2020-36322": { + "cmt_msg": "fuse: fix bad inode", + "cmt_id": "3a2f8823aa565cc67bdd00c4cd5e1d8ad81e8436" }, - "CVE-2023-23002": { - "cmt_msg": "Bluetooth: hci_qca: Fix NULL vs IS_ERR_OR_NULL check in qca_serdev_probe" + "CVE-2021-20317": { + "cmt_msg": "lib/timerqueue: Rely on rbtree semantics for next timer", + "cmt_id": "ef2e64035f074bfeef14c28347aaec0b486a9e9f" }, - "CVE-2023-6240": { - "cmt_msg": "" + "CVE-2021-43976": { + "cmt_msg": "mwifiex: Fix skb_over_panic in mwifiex_usb_recv()", + "cmt_id": "b233d7395cd104398dd83f130df5f0d57036c95e" }, - "CVE-2023-51780": { - "cmt_msg": "atm: Fix Use-After-Free in do_vcc_ioctl" + "CVE-2021-29264": { + "cmt_msg": "gianfar: fix jumbo packets+napi+rx overrun crash", + "cmt_id": "2cf34285e6eac396a180762c5504e2911df88c9a" }, - "CVE-2023-23559": { - "cmt_msg": "wifi: rndis_wlan: Prevent buffer overflow in rndis_query_oid" + "CVE-2021-33033": { + "cmt_msg": "cipso,calipso: resolve a number of problems with the DOI refcounts", + "cmt_id": "f49f0e65a95664b648e058aa923f651ec08dfeb7" }, - "CVE-2022-39842": { - "cmt_msg": "video: fbdev: pxa3xx-gcu: Fix integer overflow in pxa3xx_gcu_write" + "CVE-2021-20292": { + "cmt_msg": "drm/ttm/nouveau: don't call tt destroy callback on alloc failure.", + "cmt_id": "70f44dfbde027f444412cfb4ea9b485a4c1dec0e" }, - "CVE-2022-0382": { - "cmt_msg": "net ticp:fix a kernel-infoleak in __tipc_sendmsg()" + "CVE-2021-22543": { + "cmt_msg": "KVM: do not allow mapping valid but non-reference-counted pages", + "cmt_id": "f4b2bfed80e8d0e91b431dd1c21bc3c2c4d5f07e" + } + }, + "4.9.299": { + "CVE-2021-38198": { + "cmt_msg": "KVM: X86: MMU: Use the correct inherited permissions to get shadow page", + "cmt_id": "e262acbda232b6a2a9adb53f5d2b2065f7626625" }, - "CVE-2023-32233": { - "cmt_msg": "netfilter: nf_tables: deactivate anonymous set from preparation phase" + "CVE-2021-38199": { + "cmt_msg": "NFSv4: Initialise connection to the server in nfs4_alloc_client()", + "cmt_id": "993892ed82350d0b4eb7d321d2bb225219bd1cfc" }, - "CVE-2020-25672": { - "cmt_msg": "nfc: fix memory leak in llcp_sock_connect()" + "CVE-2022-0330": { + "cmt_msg": "drm/i915: Flush TLBs before releasing backing store", + "cmt_id": "84f4ab5b47d955ad2bb30115d7841d3e8f0994f4" }, - "CVE-2020-25673": { - "cmt_msg": "nfc: Avoid endless loops caused by repeated llcp_sock_connect()" + "CVE-2021-42739": { + "cmt_msg": "media: firewire: firedtv-avc: fix a buffer overflow in avc_ca_pmt()", + "cmt_id": "1795af6435fa5f17ced2d34854fd4871e0780092" + } + }, + "4.9.300": { + "CVE-2022-24448": { + "cmt_msg": "NFSv4: Handle case where the lookup of a directory fails", + "cmt_id": "8788981e120694a82a3672e062fe4ea99446634a" }, - "CVE-2020-25670": { - "cmt_msg": "nfc: fix refcount leak in llcp_sock_bind()" + "CVE-2020-36516": { + "cmt_msg": "ipv4: avoid using shared IP generator for connected sockets", + "cmt_id": "2b77927a8cb7f540ca2bccff4017745104fe371b" }, - "CVE-2020-25671": { - "cmt_msg": "nfc: fix refcount leak in llcp_sock_connect()" + "CVE-2022-0617": { + "cmt_msg": "udf: Fix NULL ptr deref when converting from inline format", + "cmt_id": "f24454e42b5a58267928b0de53b0dd9b43e4dd46" + } + }, + "4.9.301": { + "CVE-2022-0492": { + "cmt_msg": "cgroup-v1: Require capabilities to set release_agent", + "cmt_id": "7e33a0ad792f04bad920c7197bda8cc2ea08d304" }, - "CVE-2022-20369": { - "cmt_msg": "media: v4l2-mem2mem: Apply DST_QUEUE_OFF_BASE on MMAP buffers across ioctls" + "CVE-2022-48626": { + "cmt_msg": "moxart: fix potential use-after-free on remove path", + "cmt_id": "f5dc193167591e88797262ec78515a0cbe79ff5f" }, - "CVE-2022-0998": { - "cmt_msg": "vdpa: clean up get_config_size ret value handling" + "CVE-2022-0435": { + "cmt_msg": "tipc: improve size validations for received domain records", + "cmt_id": "175db196e45d6f0e6047eccd09c8ba55465eb131" }, - "CVE-2023-51042": { - "cmt_msg": "drm/amdgpu: Fix potential fence use-after-free v2" + "CVE-2022-0487": { + "cmt_msg": "moxart: fix potential use-after-free on remove path", + "cmt_id": "f5dc193167591e88797262ec78515a0cbe79ff5f" + } + }, + "4.9.302": { + "CVE-2022-25375": { + "cmt_msg": "usb: gadget: rndis: check size of RNDIS_MSG_SET command", + "cmt_id": "ff0a90739925734c91c7e39befe3f4378e0c1369" }, - "CVE-2019-19814": { - "cmt_msg": "" + "CVE-2022-25258": { + "cmt_msg": "USB: gadget: validate interface OS descriptor requests", + "cmt_id": "f3bcd744b0bc8dcc6cdb3ac5be20f54aecfb78a4" + } + }, + "4.9.303": { + "CVE-2022-2964": { + "cmt_msg": "net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup", + "cmt_id": "711b6bf3fb052f0a6b5b3205d50e30c0c2980382" + } + }, + "4.9.304": { + "CVE-2022-27223": { + "cmt_msg": "USB: gadget: validate endpoint index for xilinx udc", + "cmt_id": "958b6ab4d70bf991e8c90233504d4cb863aaef8a" }, - "CVE-2024-26588": { - "cmt_msg": "LoongArch: BPF: Prevent out-of-bounds memory access" + "CVE-2022-26966": { + "cmt_msg": "sr9700: sanity check for packet length", + "cmt_id": "89260e0e191e8a3a9872f72836bdf0641853c87f" + } + }, + "4.9.305": { + "CVE-2022-24958": { + "cmt_msg": "usb: gadget: don't release an existing dev->buf", + "cmt_id": "be1bb345f180482b0e57768d967ef020d7cba592" + } + }, + "4.9.306": { + "CVE-2022-23038": { + "cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()", + "cmt_id": "73e1d9b33f2bd93ce30719dfc8990b6328243b7e" }, - "CVE-2023-1118": { - "cmt_msg": "media: rc: Fix use-after-free bugs caused by ene_tx_irqsim()" + "CVE-2022-23039": { + "cmt_msg": "xen/gntalloc: don't use gnttab_query_foreign_access()", + "cmt_id": "97b835c6de03a24db79d374b02d532f0b562fd38" }, - "CVE-2022-1016": { - "cmt_msg": "netfilter: nf_tables: initialize registers in nft_do_chain()" + "CVE-2022-23960": { + "cmt_msg": "ARM: report Spectre v2 status through sysfs", + "cmt_id": "b24d4041cfb6dab83f9edf40573375bd1365e619" }, - "CVE-2022-1011": { - "cmt_msg": "fuse: fix pipe buffer lifetime for direct_io" + "CVE-2022-23036": { + "cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()", + "cmt_id": "73e1d9b33f2bd93ce30719dfc8990b6328243b7e" }, - "CVE-2021-3659": { - "cmt_msg": "net: mac802154: Fix general protection fault" + "CVE-2022-23037": { + "cmt_msg": "xen/netfront: don't use gnttab_query_foreign_access() for mapped status", + "cmt_id": "1112bb311ec13e7e6e7045ae4a0b7091bedc6b7a" }, - "CVE-2022-1012": { - "cmt_msg": "secure_seq: use the 64 bits of the siphash for port offset calculation" + "CVE-2022-0001": { + "cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE", + "cmt_id": "a771511caa8e31cb5cac4fa39165ebbca3e62795" }, - "CVE-2021-26934": { - "cmt_msg": "" + "CVE-2022-0002": { + "cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE", + "cmt_id": "a771511caa8e31cb5cac4fa39165ebbca3e62795" }, - "CVE-2022-3115": { - "cmt_msg": "drm: mali-dp: potential dereference of null pointer" + "CVE-2021-26401": { + "cmt_msg": "x86/speculation: Use generic retpoline by default on AMD", + "cmt_id": "b6a1aec08a84ccb331ce526c051df074150cf3c5" }, - "CVE-2021-26931": { - "cmt_msg": "xen-blkback: don't \"handle\" error by BUG()" + "CVE-2022-23040": { + "cmt_msg": "xen/xenbus: don't let xenbus_grant_ring() remove grants in error case", + "cmt_id": "8f80d12f6946a6fe7c64bfc204c062a57f83c7f8" }, - "CVE-2021-26930": { - "cmt_msg": "xen-blkback: fix error handling in xen_blkbk_map()" + "CVE-2022-23042": { + "cmt_msg": "xen/netfront: react properly to failing gnttab_end_foreign_access_ref()", + "cmt_id": "c4497b057b14274e159434f0ed70439a21f3d2a9" + } + }, + "4.9.307": { + "CVE-2022-1199": { + "cmt_msg": "ax25: Fix NULL pointer dereference in ax25_kill_by_device", + "cmt_id": "cad71f1094834eb69f7ceec8100d300c26b43053" }, - "CVE-2021-26932": { - "cmt_msg": "Xen/x86: don't bail early from clear_foreign_p2m_mapping()" + "CVE-2021-4149": { + "cmt_msg": "btrfs: unlock newly allocated extent buffer after error", + "cmt_id": "43bfa08ba62a1ca7a22365c7092e491e04327efb" + } + }, + "4.9.308": { + "CVE-2022-20368": { + "cmt_msg": "net/packet: fix slab-out-of-bounds access in packet_recvmsg()", + "cmt_id": "b9d5772d60f8e7ef34e290f72fc20e3a4883e7d0" }, - "CVE-2023-3141": { - "cmt_msg": "memstick: r592: Fix UAF bug in r592_remove due to race condition" + "CVE-2022-20158": { + "cmt_msg": "net/packet: fix slab-out-of-bounds access in packet_recvmsg()", + "cmt_id": "b9d5772d60f8e7ef34e290f72fc20e3a4883e7d0" + } + }, + "4.9.309": { + "CVE-2022-26490": { + "cmt_msg": "nfc: st21nfca: Fix potential buffer overflows in EVT_TRANSACTION", + "cmt_id": "c1184fa07428fb81371d5863e09795f0d06d35cf" }, - "CVE-2022-0492": { - "cmt_msg": "cgroup-v1: Require capabilities to set release_agent" + "CVE-2022-28356": { + "cmt_msg": "llc: fix netdevice reference leaks in llc_ui_bind()", + "cmt_id": "0a7aad979bfb43c4a78d33a5f356caf4ceb28bca" }, - "CVE-2023-34256": { - "cmt_msg": "ext4: avoid a potential slab-out-of-bounds in ext4_group_desc_csum" + "CVE-2022-1016": { + "cmt_msg": "netfilter: nf_tables: initialize registers in nft_do_chain()", + "cmt_id": "4d28522acd1c4415c85f6b33463713a268f68965" + } + }, + "4.9.311": { + "CVE-2022-28390": { + "cmt_msg": "can: ems_usb: ems_usb_start_xmit(): fix double dev_kfree_skb() in error path", + "cmt_id": "e9c4ee674586ff0b098d17638af719aa56c9c272" }, - "CVE-2022-25636": { - "cmt_msg": "netfilter: nf_tables_offload: incorrect flow offload action array size" + "CVE-2022-2380": { + "cmt_msg": "video: fbdev: sm712fb: Fix crash in smtcfb_read()", + "cmt_id": "e6766bb02614ad69218dcd849668524e46916e11" }, - "CVE-2022-0494": { - "cmt_msg": "block-map: add __GFP_ZERO flag for alloc_page in function bio_copy_kern" + "CVE-2022-41858": { + "cmt_msg": "drivers: net: slip: fix NPD bug in sl_tx_timeout()", + "cmt_id": "113284fe48770841e157e338bf3a2e9f197a8b50" }, - "CVE-2022-3524": { - "cmt_msg": "tcp/udp: Fix memory leak in ipv6_renew_options()." + "CVE-2022-1353": { + "cmt_msg": "af_key: add __GFP_ZERO flag for compose_sadb_supported in function pfkey_register", + "cmt_id": "7b0e01a9b7f2aaeb6fa73b35864b1d7dc6e795c4" }, - "CVE-2022-3523": { - "cmt_msg": "mm/memory.c: fix race when faulting a device private page" + "CVE-2022-30594": { + "cmt_msg": "ptrace: Check PTRACE_O_SUSPEND_SECCOMP permission on PTRACE_SEIZE", + "cmt_id": "4f96b94a8342fac058117962f1a76fc7ebd1c245" }, - "CVE-2022-3522": { - "cmt_msg": "mm/hugetlb: use hugetlb_pte_stable in migration race check" + "CVE-2022-3111": { + "cmt_msg": "power: supply: wm8350-power: Add missing free in free_charger_irq", + "cmt_id": "a6a3ec1626846fba62609330673a2dd5007d6a53" }, - "CVE-2008-2544": { - "cmt_msg": "" + "CVE-2022-1198": { + "cmt_msg": "drivers: hamradio: 6pack: fix UAF bug caused by mod_timer()", + "cmt_id": "45d1a63bacf2b6ab27f9b11b5a2431e19d34d01f" }, - "CVE-2021-3178": { - "cmt_msg": "nfsd4: readdirplus shouldn't return parent of export" + "CVE-2022-3202": { + "cmt_msg": "jfs: prevent NULL deref in diFree", + "cmt_id": "d2e45f0bc25da09efcac658d6e405115fcfa83c2" + } + }, + "4.9.313": { + "CVE-2022-1836": { + "cmt_msg": "floppy: disable FDRAWCMD by default", + "cmt_id": "0dd02ff72c6daf4e7800fb5dd1109fbacdde97dc" }, - "CVE-2022-2196": { - "cmt_msg": "KVM: VMX: Execute IBPB on emulated VM-exit when guest has IBRS" + "CVE-2022-1734": { + "cmt_msg": "nfc: nfcmrvl: main: reorder destructive operations in nfcmrvl_nci_unregister_dev to avoid bugs", + "cmt_id": "4721695be941626e4b18b89e0641e36fc385cfd8" }, - "CVE-2022-0330": { - "cmt_msg": "drm/i915: Flush TLBs before releasing backing store" + "CVE-2022-33981": { + "cmt_msg": "floppy: disable FDRAWCMD by default", + "cmt_id": "0dd02ff72c6daf4e7800fb5dd1109fbacdde97dc" }, - "CVE-2007-3719": { - "cmt_msg": "" + "CVE-2023-3159": { + "cmt_msg": "firewire: fix potential uaf in outbound_phy_packet_callback()", + "cmt_id": "2a08a260d2294b2ecd4190cceaaf12ae81f3cb9f" }, - "CVE-2023-3863": { - "cmt_msg": "net: nfc: Fix use-after-free caused by nfc_llcp_find_local" + "CVE-2022-1974": { + "cmt_msg": "nfc: replace improper check device_is_registered() in netlink related functions", + "cmt_id": "fa2217b66467917a623993c14d671661ad625fb6" }, - "CVE-2023-0590": { - "cmt_msg": "net: sched: fix race condition in qdisc_graft()" + "CVE-2022-1975": { + "cmt_msg": "NFC: netlink: fix sleep in atomic bug when firmware download timeout", + "cmt_id": "a93ea9595fde438996d7b9322749d4d1921162f7" + } + }, + "4.9.316": { + "CVE-2022-1652": { + "cmt_msg": "floppy: use a statically allocated error counter", + "cmt_id": "2adafe1c646b462c755e99216f966927eec96059" }, - "CVE-2022-4095": { - "cmt_msg": "staging: rtl8712: fix use after free bugs" + "CVE-2022-48619": { + "cmt_msg": "Input: add bounds checking to input_set_capability()", + "cmt_id": "3e6fa9e4a7a89d67e01424317f7a2e9551025022" }, - "CVE-2022-45919": { - "cmt_msg": "media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221" + "CVE-2023-4459": { + "cmt_msg": "net: vmxnet3: fix possible NULL pointer dereference in vmxnet3_rq_cleanup()", + "cmt_id": "e40ed72f8c8b04ae629d895ed7eb221d8938cdd7" }, - "CVE-2023-21400": { - "cmt_msg": "" + "CVE-2023-4387": { + "cmt_msg": "net: vmxnet3: fix possible use-after-free bugs in vmxnet3_rq_alloc_rx_buf()", + "cmt_id": "aae66daa4a8925109c87702979e767346291d1e2" }, - "CVE-2021-45402": { - "cmt_msg": "bpf: Fix signed bounds propagation after mov32" + "CVE-2022-1729": { + "cmt_msg": "perf: Fix sys_perf_event_open() race against self", + "cmt_id": "a1466528d8ae5d9a3bb29781f0098fa3476e9e1c" + } + }, + "4.9.317": { + "CVE-2022-20572": { + "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag", + "cmt_id": "27798cca4e54fe9c390396c4cc655480f827bbd5" }, - "CVE-2022-28893": { - "cmt_msg": "SUNRPC: Ensure we flush any closed sockets before xs_xprt_free()" + "CVE-2022-2503": { + "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag", + "cmt_id": "27798cca4e54fe9c390396c4cc655480f827bbd5" }, - "CVE-2021-3772": { - "cmt_msg": "sctp: use init_tag from inithdr for ABORT chunk" + "CVE-2022-0494": { + "cmt_msg": "block-map: add __GFP_ZERO flag for alloc_page in function bio_copy_kern", + "cmt_id": "d59073bedb7cf752b8cd4027dd0f67cf7ac4330f" + } + }, + "4.9.318": { + "CVE-2023-4385": { + "cmt_msg": "fs: jfs: fix possible NULL pointer dereference in dbFree()", + "cmt_id": "6c4ad94011e20f4134b0606d9b68d5db564828e1" }, - "CVE-2021-3679": { - "cmt_msg": "tracing: Fix bug in rb_per_cpu_empty() that might cause deadloop." + "CVE-2022-32250": { + "cmt_msg": "netfilter: nf_tables: disallow non-stateful expression in sets earlier", + "cmt_id": "94e9b75919619ba8c4072abc4917011a7a888a79" }, - "CVE-2022-2586": { - "cmt_msg": "netfilter: nf_tables: do not allow SET_ID to refer to another table" + "CVE-2022-1184": { + "cmt_msg": "ext4: verify dir block before splitting it", + "cmt_id": "93bbf0498ba20eadcd7132bd3cfdaff54eb72751" }, - "CVE-2022-3629": { - "cmt_msg": "vsock: Fix memory leak in vsock_connect()" + "CVE-2022-1966": { + "cmt_msg": "netfilter: nf_tables: disallow non-stateful expression in sets earlier", + "cmt_id": "94e9b75919619ba8c4072abc4917011a7a888a79" }, - "CVE-2021-34556": { - "cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4" + "CVE-2022-32981": { + "cmt_msg": "powerpc/32: Fix overread/overwrite of thread_struct via ptrace", + "cmt_id": "89dda10b73b7ce184caf18754907126ce7ce3fad" + } + }, + "4.9.319": { + "CVE-2022-21125": { + "cmt_msg": "x86/speculation/mmio: Reuse SRBDS mitigation for SBDS", + "cmt_id": "b7efb3a62fffa509e21d076aa2e75331c79fe36d" }, - "CVE-2021-28714": { - "cmt_msg": "xen/netback: fix rx queue stall detection" + "CVE-2022-21166": { + "cmt_msg": "x86/speculation/mmio: Enable CPU Fill buffer clearing on idle", + "cmt_id": "6ecdbc9dc777a5b66a9ec293af88ab330dd644a2" }, - "CVE-2021-28713": { - "cmt_msg": "xen/console: harden hvc_xen against event channel storms" + "CVE-2022-21123": { + "cmt_msg": "x86/speculation/mmio: Add mitigation for Processor MMIO Stale Data", + "cmt_id": "a11f2f05f5c605d1f6573b0cdcd2a6f38667fda1" + } + }, + "4.9.320": { + "CVE-2022-32296": { + "cmt_msg": "tcp: increase source port perturb table to 2^16", + "cmt_id": "3c78eea640f69e2198b69128173e6d65a0bcdc02" }, - "CVE-2021-28712": { - "cmt_msg": "xen/netfront: harden netfront against event channel storms" + "CVE-2022-1011": { + "cmt_msg": "fuse: fix pipe buffer lifetime for direct_io", + "cmt_id": "b79d4d0da659a3c7bd1d5913e62188ceb9be9c49" }, - "CVE-2021-28711": { - "cmt_msg": "xen/blkfront: harden blkfront against event channel storms" + "CVE-2022-0812": { + "cmt_msg": "xprtrdma: fix incorrect header size calculations", + "cmt_id": "ca6226b5c5b4cf8c41ab7c759686c9aab43a2a33" }, - "CVE-2022-1247": { - "cmt_msg": "" + "CVE-2022-1012": { + "cmt_msg": "secure_seq: use the 64 bits of the siphash for port offset calculation", + "cmt_id": "576696ed0dee677ec868960c39d96ae3b8c95a3f" + } + }, + "4.9.321": { + "CVE-2021-33656": { + "cmt_msg": "vt: drop old FONT ioctls", + "cmt_id": "dc1421db273b725ebe90978a4b2d9bfba5cef702" + } + }, + "4.9.322": { + "CVE-2022-2318": { + "cmt_msg": "net: rose: fix UAF bugs caused by timer handler", + "cmt_id": "3ab68a9528780870b84200bbd91efaa47a586a3c" }, - "CVE-2022-2991": { - "cmt_msg": "remove the lightnvm subsystem" + "CVE-2022-33742": { + "cmt_msg": "xen/blkfront: force data bouncing when backend is untrusted", + "cmt_id": "8dad9a67100245295373523375610be850999b37" }, - "CVE-2022-3621": { - "cmt_msg": "nilfs2: fix NULL pointer dereference at nilfs_bmap_lookup_at_level()" + "CVE-2022-33741": { + "cmt_msg": "xen/netfront: force data bouncing when backend is untrusted", + "cmt_id": "c6e941364608d911ac7b055d27d86e360fd94aed" }, - "CVE-2022-23960": { - "cmt_msg": "ARM: report Spectre v2 status through sysfs" + "CVE-2022-33740": { + "cmt_msg": "xen/netfront: fix leaking data in shared pages", + "cmt_id": "d1d69e0c838c2df7089357ec27000942086325c4" }, - "CVE-2022-3623": { - "cmt_msg": "mm/hugetlb: fix races when looking up a CONT-PTE/PMD size hugetlb page" + "CVE-2022-26365": { + "cmt_msg": "xen/blkfront: fix leaking data in shared pages", + "cmt_id": "4fbda9d1fc771b44e96ee4cea58f37d926010ffc" }, - "CVE-2022-3624": { - "cmt_msg": "bonding: fix reference count leak in balance-alb mode" + "CVE-2022-33744": { + "cmt_msg": "xen/arm: Fix race in RB-tree based P2M accounting", + "cmt_id": "856d1b8e6e826b5087f1ea3fdbabda3557d73599" + } + }, + "4.9.324": { + "CVE-2022-36123": { + "cmt_msg": "x86: Clear .brk area at early boot", + "cmt_id": "b3d7c509bcbd4384d4964dcdf028b3c3e0adb7f7" + } + }, + "4.9.325": { + "CVE-2022-1462": { + "cmt_msg": "tty: use new tty_insert_flip_string_and_push_buffer() in pty_write()", + "cmt_id": "41ce14090db93fc2f0c8a27ce8a324b0192da7b5" }, - "CVE-2021-4154": { - "cmt_msg": "cgroup: verify that source is a string" + "CVE-2022-36879": { + "cmt_msg": "xfrm: xfrm_policy: fix a possible double xfrm_pols_put() in xfrm_bundle_lookup()", + "cmt_id": "5aff12fa09504c6ea88fc17749a39cda2c4d6ef7" + } + }, + "4.9.326": { + "CVE-2022-3629": { + "cmt_msg": "vsock: Fix memory leak in vsock_connect()", + "cmt_id": "09fc7ffdf11d20049f3748ccdef57c9a49403214" }, - "CVE-2021-39656": { - "cmt_msg": "configfs: fix a use-after-free in __configfs_open_file" + "CVE-2022-36946": { + "cmt_msg": "netfilter: nf_queue: do not allow packet truncation below transport header offset", + "cmt_id": "3b3e2de462323d5fdeb85a3682334a4a3dd07400" }, - "CVE-2021-39657": { - "cmt_msg": "scsi: ufs: Correct the LUN used in eh_device_reset_handler() callback" + "CVE-2022-20566": { + "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free caused by l2cap_chan_put", + "cmt_id": "d255c861e268ba342e855244639a15f12d7a0bf2" }, - "CVE-2023-3090": { - "cmt_msg": "ipvlan:Fix out-of-bounds caused by unclear skb->cb" + "CVE-2022-3635": { + "cmt_msg": "atm: idt77252: fix use-after-free bugs caused by tst_timer", + "cmt_id": "acf173d9e27877ac1f4b0fc6614bf7f19ac90894" }, - "CVE-2022-47946": { - "cmt_msg": "io_uring: kill sqo_dead and sqo submission halting" + "CVE-2022-2588": { + "cmt_msg": "net_sched: cls_route: remove from list when handle is 0", + "cmt_id": "34a475425612bef345634202dda8dac91820b6c8" }, - "CVE-2022-4744": { - "cmt_msg": "tun: avoid double free in tun_free_netdev" + "CVE-2023-2513": { + "cmt_msg": "ext4: fix use-after-free in ext4_xattr_set_entry", + "cmt_id": "9337f3877a5fb8db8c563ce93cf6095b24c45151" }, "CVE-2023-1095": { - "cmt_msg": "netfilter: nf_tables: fix null deref due to zeroed list head" + "cmt_msg": "netfilter: nf_tables: fix null deref due to zeroed list head", + "cmt_id": "ef6b262e551da27579e7ac255928394176353115" + } + }, + "4.9.327": { + "CVE-2022-42703": { + "cmt_msg": "mm/rmap: Fix anon_vma->degree ambiguity leading to double-reuse", + "cmt_id": "c24ca0f172905d593ad8ab276b0992bb74353a8d" }, - "CVE-2022-3239": { - "cmt_msg": "media: em28xx: initialize refcount before kref_get" + "CVE-2022-3028": { + "cmt_msg": "af_key: Do not call xfrm_probe_algs in parallel", + "cmt_id": "e580d3201ed222c4752ced7e629ad96bc0340713" + } + }, + "4.9.328": { + "CVE-2022-4662": { + "cmt_msg": "USB: core: Prevent nested device-reset calls", + "cmt_id": "d90419b8b8322b6924f6da9da952647f2dadc21b" }, - "CVE-2022-4543": { - "cmt_msg": "" + "CVE-2022-4095": { + "cmt_msg": "staging: rtl8712: fix use after free bugs", + "cmt_id": "7dce6b0ee7d78667d6c831ced957a08769973063" }, - "CVE-2023-4921": { - "cmt_msg": "net: sched: sch_qfq: Fix UAF in qfq_dequeue()" + "CVE-2022-2663": { + "cmt_msg": "netfilter: nf_conntrack_irc: Fix forged IP logic", + "cmt_id": "eb4d8d6b44a23ff2b6e2af06c8240de73dff8a7d" }, - "CVE-2021-34866": { - "cmt_msg": "bpf: Fix ringbuf helper function compatibility" + "CVE-2022-3586": { + "cmt_msg": "sch_sfb: Don't assume the skb is still around after enqueueing to child", + "cmt_id": "b5aa83141aa97f81c8e06051e4bd925bfb5474fb" + } + }, + "4.9.330": { + "CVE-2022-39842": { + "cmt_msg": "video: fbdev: pxa3xx-gcu: Fix integer overflow in pxa3xx_gcu_write", + "cmt_id": "a0dcaa48042a56a9eee2efed19563866a0ddbce2" + } + }, + "4.9.331": { + "CVE-2022-2978": { + "cmt_msg": "fs: fix UAF/GPF bug in nilfs_mdt_destroy", + "cmt_id": "d1ff475d7c83289d0a7faef346ea3bbf90818bad" }, - "CVE-2023-1390": { - "cmt_msg": "tipc: fix NULL deref in tipc_link_xmit()" + "CVE-2022-41849": { + "cmt_msg": "fbdev: smscufx: Fix use-after-free in ufx_ops_open()", + "cmt_id": "347a969b130c2a496f471f14b354119b82664f0a" }, - "CVE-2021-34981": { - "cmt_msg": "Bluetooth: cmtp: fix file refcount when cmtp_attach_device fails" + "CVE-2022-3594": { + "cmt_msg": "r8152: Rate limit overflow messages", + "cmt_id": "3723658c287a98875f43cffc3245d0bf1d3ee076" }, - "CVE-2023-23454": { - "cmt_msg": "net: sched: cbq: dont intepret cls results when asked to drop" + "CVE-2022-43750": { + "cmt_msg": "usb: mon: make mmapped memory read only", + "cmt_id": "1b5ad3786a2f2cdbfed34071aa467f80e4903a0b" }, - "CVE-2024-0775": { - "cmt_msg": "ext4: improve error recovery code paths in __ext4_remount()" + "CVE-2022-3621": { + "cmt_msg": "nilfs2: fix NULL pointer dereference at nilfs_bmap_lookup_at_level()", + "cmt_id": "bb63454b66f4a73d4b267fd5061aaf3a5657172c" }, - "CVE-2023-4881": { - "cmt_msg": "netfilter: nftables: exthdr: fix 4-byte stack OOB write" + "CVE-2022-3649": { + "cmt_msg": "nilfs2: fix use-after-free bug of struct nilfs_root", + "cmt_id": "a9043a24c6e340d45b204d294a25044726fd2770" }, - "CVE-2022-42432": { - "cmt_msg": "netfilter: nfnetlink_osf: fix possible bogus match in nf_osf_find()" + "CVE-2022-41850": { + "cmt_msg": "HID: roccat: Fix use-after-free in roccat_read()", + "cmt_id": "84607bd3a8542b84b450d19a3579172f96c2bb47" }, - "CVE-2013-7445": { - "cmt_msg": "" + "CVE-2021-47103": { + "cmt_msg": "inet: fully convert sk->sk_rx_dst to RCU rules", + "cmt_id": "68c34ce11ef23328692aa35fa6aaafdd75913100" }, - "CVE-2022-28390": { - "cmt_msg": "can: ems_usb: ems_usb_start_xmit(): fix double dev_kfree_skb() in error path" + "CVE-2022-40768": { + "cmt_msg": "scsi: stex: Properly zero out the passthrough command structure", + "cmt_id": "35db0282da84ad200054ad5af0fd6c2f693b17f8" }, - "CVE-2021-3653": { - "cmt_msg": "KVM: nSVM: avoid picking up unsupported bits from L2 in int_ctl (CVE-2021-3653)" + "CVE-2022-3565": { + "cmt_msg": "mISDN: fix use-after-free bugs in l1oip timer handlers", + "cmt_id": "1ba21168faf881c23c270605834d01af260cbb72" }, - "CVE-2024-26593": { - "cmt_msg": "i2c: i801: Fix block process call transactions" + "CVE-2022-3542": { + "cmt_msg": "bnx2x: fix potential memory leak in bnx2x_tpa_stop()", + "cmt_id": "9ec3f783f08b57a861700fdf4d3d8f3cfb68f471" }, - "CVE-2022-42719": { - "cmt_msg": "wifi: mac80211: fix MBSSID parsing use-after-free" + "CVE-2022-3646": { + "cmt_msg": "nilfs2: fix leak of nilfs_root in case of writer thread creation failure", + "cmt_id": "81fe58e4e7f61a1f5200898e7cd4c9748f83051f" + } + }, + "4.9.332": { + "CVE-2023-0615": { + "cmt_msg": "media: vivid: dev->bitmap_cap wasn't freed in all cases", + "cmt_id": "e1b5b061987d56d7b64da962fec3be4ae7e78300" + } + }, + "4.9.333": { + "CVE-2022-3628": { + "cmt_msg": "wifi: brcmfmac: Fix potential buffer overflow in brcmf_fweh_event_worker()", + "cmt_id": "b1477d95e967bf626b8c5e3838bb885c47381b24" }, - "CVE-2022-38096": { - "cmt_msg": "" + "CVE-2022-42895": { + "cmt_msg": "Bluetooth: L2CAP: Fix attempting to access uninitialized memory", + "cmt_id": "63e3d75298fac7fa50906454603dd5bb4ef22a23" + }, + "CVE-2022-3564": { + "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free caused by l2cap_reassemble_sdu", + "cmt_id": "dc30e05bb18852303084430c03ca76e69257d9ea" + } + }, + "4.9.334": { + "CVE-2023-26607": { + "cmt_msg": "ntfs: fix out-of-bounds read in ntfs_attr_find()", + "cmt_id": "9fa645905c0457d69906eead302f70b1c7115538" + }, + "CVE-2022-3521": { + "cmt_msg": "kcm: avoid potential race in kcm_tx_work", + "cmt_id": "fe3f79701fdaf8a087bc7043839e7f8b2e61b6fe" + } + }, + "4.9.335": { + "CVE-2022-3524": { + "cmt_msg": "tcp/udp: Fix memory leak in ipv6_renew_options().", + "cmt_id": "d2c9e2ebafa14a564b28e237db8d90ab7bdbd061" + }, + "CVE-2022-42896": { + "cmt_msg": "Bluetooth: L2CAP: Fix accepting connection request for invalid SPSM", + "cmt_id": "c834df40af8ec156e8c3c388a08ff7381cd90d80" + } + }, + "4.9.336": { + "CVE-2022-3643": { + "cmt_msg": "xen/netback: Ensure protocol headers don't fall in the non-linear area", + "cmt_id": "1a1d9be7b36ee6cbdeb9d160038834d707256e88" + } + }, + "4.9.337": { + "CVE-2022-36280": { + "cmt_msg": "drm/vmwgfx: Validate the box size for the snooped cursor", + "cmt_id": "ee8d31836cbe7c26e207bfa0a4a726f0a25cfcf6" + }, + "CVE-2023-28328": { + "cmt_msg": "media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer()", + "cmt_id": "2b6a8a1a32746981044e7ab06649c804acb4068a" }, - "CVE-2022-1158": { - "cmt_msg": "KVM: x86/mmu: do compare-and-exchange of gPTE via the user address" + "CVE-2022-45934": { + "cmt_msg": "Bluetooth: L2CAP: Fix u8 overflow", + "cmt_id": "49d5867819ab7c744852b45509e8469839c07e0e" }, - "CVE-2022-3303": { - "cmt_msg": "ALSA: pcm: oss: Fix race at SNDCTL_DSP_SYNC" + "CVE-2022-3424": { + "cmt_msg": "misc: sgi-gru: fix use-after-free error in gru_set_context_option, gru_fault and gru_handle_user_call_os", + "cmt_id": "f99d5f1bd8cd1e99931b6e5544a5601a1fe33f82" + } + }, + "outstanding": { + "CVE-2020-35501": { + "cmt_msg": "" }, - "CVE-2022-20141": { - "cmt_msg": "igmp: Add ip_mc_list lock in ip_check_mc_rcu" + "CVE-2023-3268": { + "cmt_msg": "relayfs: fix out-of-bounds access in relay_file_read" }, - "CVE-2023-23455": { - "cmt_msg": "net: sched: atm: dont intepret cls results when asked to drop" + "CVE-2023-52615": { + "cmt_msg": "hwrng: core - Fix page fault dead lock on mmap-ed hwrng" }, - "CVE-2022-2905": { - "cmt_msg": "bpf: Don't use tnum_range on array range checking for poke descriptors" + "CVE-2023-52614": { + "cmt_msg": "PM / devfreq: Fix buffer overflow in trans_stat_show" }, - "CVE-2022-20148": { - "cmt_msg": "f2fs: fix UAF in f2fs_available_free_memory" + "CVE-2023-52617": { + "cmt_msg": "PCI: switchtec: Fix stdev_release() crash after surprise hot remove" }, - "CVE-2023-2898": { - "cmt_msg": "f2fs: fix to avoid NULL pointer dereference f2fs_write_end_io()" + "CVE-2022-47520": { + "cmt_msg": "wifi: wilc1000: validate pairwise and authentication suite offsets" }, - "CVE-2023-6931": { - "cmt_msg": "perf: Fix perf_event_validate_size()" + "CVE-2023-52618": { + "cmt_msg": "block/rnbd-srv: Check for unlikely string overflow" }, - "CVE-2023-6932": { - "cmt_msg": "ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet" + "CVE-2023-5717": { + "cmt_msg": "perf: Disallow mis-matched inherited group reads" }, - "CVE-2024-0607": { - "cmt_msg": "netfilter: nf_tables: fix pointer math issue in nft_byteorder_eval()" + "CVE-2022-0480": { + "cmt_msg": "memcg: enable accounting for file lock caches" }, - "CVE-2021-33631": { - "cmt_msg": "ext4: fix kernel BUG in 'ext4_write_inline_data_end()'" + "CVE-2023-52429": { + "cmt_msg": "dm: limit the number of targets and parameter size area" }, - "CVE-2022-28389": { - "cmt_msg": "can: mcba_usb: mcba_usb_start_xmit(): fix double dev_kfree_skb in error path" + "CVE-2021-47059": { + "cmt_msg": "crypto: sun8i-ss - fix result memory leak on error path" }, - "CVE-2022-28388": { - "cmt_msg": "can: usb_8dev: usb_8dev_start_xmit(): fix double dev_kfree_skb() in error path" + "CVE-2022-23825": { + "cmt_msg": "" }, - "CVE-2023-52444": { - "cmt_msg": "f2fs: fix to avoid dirent corruption" + "CVE-2021-47052": { + "cmt_msg": "crypto: sa2ul - Fix memory leak of rxd" }, - "CVE-2020-12362": { - "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" + "CVE-2021-47112": { + "cmt_msg": "x86/kvm: Teardown PV features on boot CPU as well" }, - "CVE-2020-12363": { - "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" + "CVE-2021-47113": { + "cmt_msg": "btrfs: abort in rename_exchange if we fail to insert the second ref" }, - "CVE-2022-4129": { - "cmt_msg": "l2tp: Serialize access to sk_user_data with sk_callback_lock" + "CVE-2021-47110": { + "cmt_msg": "x86/kvm: Disable kvmclock on all CPUs on shutdown" }, - "CVE-2020-12364": { - "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" + "CVE-2021-47116": { + "cmt_msg": "ext4: fix memory leak in ext4_mb_init_backend on error path." }, - "CVE-2020-25639": { - "cmt_msg": "drm/nouveau: bail out of nouveau_channel_new if channel init fails" + "CVE-2021-46970": { + "cmt_msg": "bus: mhi: pci_generic: Remove WQ_MEM_RECLAIM flag from state workqueue" }, - "CVE-2023-33203": { - "cmt_msg": "net: qcom/emac: Fix use after free bug in emac_remove due to race condition" + "CVE-2019-19241": { + "cmt_msg": "io_uring: async workers should inherit the user creds" }, - "CVE-2021-4001": { - "cmt_msg": "bpf: Fix toctou on read-only map's constant scalar tracking" + "CVE-2022-40307": { + "cmt_msg": "efi: capsule-loader: Fix use-after-free in efi_capsule_write" }, - "CVE-2021-4002": { - "cmt_msg": "hugetlbfs: flush TLBs correctly after huge_pmd_unshare" + "CVE-2021-43975": { + "cmt_msg": "atlantic: Fix OOB read and write in hw_atl_utils_fw_rpc_wait" }, - "CVE-2023-26545": { - "cmt_msg": "net: mpls: fix stale pointer if allocation fails during device rename" + "CVE-2023-0459": { + "cmt_msg": "uaccess: Add speculation barrier to copy_from_user()" }, - "CVE-2022-1055": { - "cmt_msg": "net: sched: fix use-after-free in tc_new_tfilter()" + "CVE-2023-0458": { + "cmt_msg": "prlimit: do_prlimit needs to have a speculation check" }, - "CVE-2011-4916": { - "cmt_msg": "" + "CVE-2023-0597": { + "cmt_msg": "x86/mm: Randomize per-cpu entry area" }, - "CVE-2023-50431": { - "cmt_msg": "accel/habanalabs: fix information leak in sec_attest_info()" + "CVE-2019-12379": { + "cmt_msg": "consolemap: Fix a memory leaking bug in drivers/tty/vt/consolemap.c" }, - "CVE-2022-20008": { - "cmt_msg": "mmc: block: fix read single on recovery logic" + "CVE-2019-12378": { + "cmt_msg": "ipv6_sockglue: Fix a missing-check bug in ip6_ra_control()" }, - "CVE-2023-3117": { - "cmt_msg": "netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE" + "CVE-2024-26592": { + "cmt_msg": "ksmbd: fix UAF issue in ksmbd_tcp_new_connection()" }, - "CVE-2023-32269": { - "cmt_msg": "netrom: Fix use-after-free caused by accept on already connected socket" + "CVE-2023-4622": { + "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES" }, - "CVE-2023-52464": { - "cmt_msg": "EDAC/thunderx: Fix possible out-of-bounds string access" + "CVE-2020-15802": { + "cmt_msg": "" }, - "CVE-2023-52463": { - "cmt_msg": "efivarfs: force RO when remounting if SetVariable is not supported" + "CVE-2024-26594": { + "cmt_msg": "ksmbd: validate mech token in session setup" }, - "CVE-2023-3111": { - "cmt_msg": "btrfs: unset reloc control if transaction commit fails in prepare_to_relocate()" + "CVE-2023-2483": { + "cmt_msg": "net: qcom/emac: Fix use after free bug in emac_remove due to race condition" }, - "CVE-2023-6040": { - "cmt_msg": "netfilter: nf_tables: Reject tables of unsupported family" + "CVE-2022-3636": { + "cmt_msg": "net: ethernet: mtk_eth_soc: use after free in __mtk_ppe_check_skb()" }, - "CVE-2021-31440": { - "cmt_msg": "bpf: Fix propagation of 32 bit unsigned bounds from 64 bit bounds" + "CVE-2024-26598": { + "cmt_msg": "KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache" }, - "CVE-2022-26373": { - "cmt_msg": "x86/speculation: Add RSB VM Exit protections" + "CVE-2023-52506": { + "cmt_msg": "LoongArch: Set all reserved memblocks on Node#0 at initialization" }, - "CVE-2019-15290": { - "cmt_msg": "" + "CVE-2022-34918": { + "cmt_msg": "netfilter: nf_tables: stricter validation of element data" }, - "CVE-2023-3212": { - "cmt_msg": "gfs2: Don't deref jdesc in evict" + "CVE-2021-47028": { + "cmt_msg": "mt76: mt7915: fix txrate reporting" }, - "CVE-2024-23848": { - "cmt_msg": "" + "CVE-2023-52511": { + "cmt_msg": "spi: sun6i: reduce DMA RX transfer width to single byte" }, - "CVE-2023-1295": { - "cmt_msg": "io_uring: get rid of intermediate IORING_OP_CLOSE stage" + "CVE-2021-46908": { + "cmt_msg": "bpf: Use correct permission flag for mixed signed bounds arithmetic" }, - "CVE-2022-0617": { - "cmt_msg": "udf: Fix NULL ptr deref when converting from inline format" + "CVE-2023-2002": { + "cmt_msg": "bluetooth: Perform careful capability checks in hci_sock_ioctl()" }, - "CVE-2023-4459": { - "cmt_msg": "net: vmxnet3: fix possible NULL pointer dereference in vmxnet3_rq_cleanup()" + "CVE-2023-2007": { + "cmt_msg": "scsi: dpt_i2o: Remove obsolete driver" }, - "CVE-2022-2153": { - "cmt_msg": "KVM: x86: Avoid theoretical NULL pointer dereference in kvm_irq_delivery_to_apic_fast()" + "CVE-2022-1419": { + "cmt_msg": "drm/vgem: Close use-after-free race in vgem_gem_create" }, - "CVE-2022-20568": { - "cmt_msg": "Merge tag 'io_uring-worker.v3-2021-02-25' of git://git.kernel.dk/linux-block" + "CVE-2023-51782": { + "cmt_msg": "net/rose: Fix Use-After-Free in rose_ioctl" }, - "CVE-2022-20566": { - "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free caused by l2cap_chan_put" + "CVE-2020-26141": { + "cmt_msg": "ath10k: Fix TKIP Michael MIC verification for PCIe" }, - "CVE-2018-12930": { + "CVE-2020-26140": { "cmt_msg": "" }, - "CVE-2018-12931": { + "CVE-2020-26143": { "cmt_msg": "" }, - "CVE-2023-1990": { - "cmt_msg": "nfc: st-nci: Fix use after free bug in ndlc_remove due to race condition" + "CVE-2020-26142": { + "cmt_msg": "" }, - "CVE-2024-26583": { - "cmt_msg": "tls: fix race between async notify and socket close" + "CVE-2023-1074": { + "cmt_msg": "sctp: fail if no bound addresses can be used for a given scope" }, - "CVE-2021-33098": { - "cmt_msg": "ixgbe: fix large MTU request from VF" + "CVE-2023-1077": { + "cmt_msg": "sched/rt: pick_next_rt_entity(): check list_entry" }, - "CVE-2022-0185": { - "cmt_msg": "vfs: fs_context: fix up param length parsing in legacy_parse_param" + "CVE-2023-46838": { + "cmt_msg": "xen-netback: don't produce zero-size SKB frags" }, - "CVE-2021-28971": { - "cmt_msg": "perf/x86/intel: Fix a crash caused by zero PEBS status" + "CVE-2023-40283": { + "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb" }, - "CVE-2022-22942": { - "cmt_msg": "drm/vmwgfx: Fix stale file descriptors on failed usercopy" + "CVE-2023-1073": { + "cmt_msg": "HID: check empty report_list in hid_validate_values()" }, - "CVE-2021-3739": { - "cmt_msg": "btrfs: fix NULL pointer dereference when deleting device by invalid id" + "CVE-2024-26745": { + "cmt_msg": "powerpc/pseries/iommu: IOMMU table is not initialized for kdump over SR-IOV" }, - "CVE-2021-3732": { - "cmt_msg": "ovl: prevent private clone if bind mount is not allowed" + "CVE-2024-26744": { + "cmt_msg": "RDMA/srpt: Support specifying the srpt_service_guid parameter" }, - "CVE-2022-33743": { - "cmt_msg": "xen-netfront: restore __skb_queue_tail() positioning in xennet_get_responses()" + "CVE-2024-26743": { + "cmt_msg": "RDMA/qedr: Fix qedr_create_user_qp error flow" }, - "CVE-2024-24861": { - "cmt_msg": "" + "CVE-2018-13095": { + "cmt_msg": "xfs: More robust inode extent count validation" }, - "CVE-2023-0240": { - "cmt_msg": "io_uring: COW io_identity on mismatch" + "CVE-2018-13098": { + "cmt_msg": "f2fs: fix to do sanity check with extra_attr feature" }, - "CVE-2021-35039": { - "cmt_msg": "module: limit enabling module.sig_enforce" + "CVE-2024-26748": { + "cmt_msg": "usb: cdns3: fix memory double free when handle zero packet" }, - "CVE-2024-25740": { + "CVE-2024-22386": { "cmt_msg": "" }, - "CVE-2022-3903": { - "cmt_msg": "media: mceusb: Use new usb_control_msg_*() routines" + "CVE-2019-18680": { + "cmt_msg": "unknown" }, - "CVE-2022-3577": { - "cmt_msg": "HID: bigben: fix slab-out-of-bounds Write in bigben_probe" + "CVE-2024-26699": { + "cmt_msg": "drm/amd/display: Fix array-index-out-of-bounds in dcn35_clkmgr" }, - "CVE-2023-20588": { - "cmt_msg": "x86/CPU/AMD: Do not leak quotient data after a division by 0" + "CVE-2024-26691": { + "cmt_msg": "KVM: arm64: Fix circular locking dependency" }, - "CVE-2022-4379": { - "cmt_msg": "NFSD: fix use-after-free in __nfs42_ssc_open()" + "CVE-2024-26697": { + "cmt_msg": "nilfs2: fix data corruption in dsync block recovery for small block sizes" }, - "CVE-2022-4378": { - "cmt_msg": "proc: proc_skip_spaces() shouldn't think it is working on C strings" + "CVE-2024-26696": { + "cmt_msg": "nilfs2: fix hang in nilfs_lookup_dirty_data_buffers()" }, - "CVE-2022-44033": { - "cmt_msg": "char: pcmcia: remove all the drivers" + "CVE-2023-2176": { + "cmt_msg": "RDMA/core: Refactor rdma_bind_addr" }, - "CVE-2022-44032": { - "cmt_msg": "char: pcmcia: remove all the drivers" + "CVE-2023-52578": { + "cmt_msg": "net: bridge: use DEV_STATS_INC()" }, - "CVE-2022-47518": { - "cmt_msg": "wifi: wilc1000: validate number of channels" + "CVE-2022-39188": { + "cmt_msg": "mmu_gather: Force tlb-flush VM_PFNMAP vmas" }, - "CVE-2023-4207": { - "cmt_msg": "net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free" + "CVE-2005-3660": { + "cmt_msg": "" }, - "CVE-2020-26139": { - "cmt_msg": "mac80211: do not accept/forward invalid EAPOL frames" + "CVE-2023-52619": { + "cmt_msg": "pstore/ram: Fix crash when setting number of cpus to an odd number" }, - "CVE-2023-42754": { - "cmt_msg": "ipv4: fix null-deref in ipv4_link_failure" + "CVE-2023-31085": { + "cmt_msg": "ubi: Refuse attaching if mtd's erasesize is 0" }, - "CVE-2021-3609": { - "cmt_msg": "can: bcm: delay release of struct bcm_op after synchronize_rcu()" + "CVE-2023-31084": { + "cmt_msg": "media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*()" }, - "CVE-2022-0847": { - "cmt_msg": "lib/iov_iter: initialize \"flags\" in new pipe_buffer" + "CVE-2023-31083": { + "cmt_msg": "Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO" }, - "CVE-2021-3600": { - "cmt_msg": "bpf: Fix 32 bit src register truncation on div/mod" + "CVE-2023-31082": { + "cmt_msg": "" }, - "CVE-2021-23133": { - "cmt_msg": "net/sctp: fix race condition in sctp_destroy_sock" + "CVE-2023-31081": { + "cmt_msg": "" }, - "CVE-2021-0920": { - "cmt_msg": "af_unix: fix garbage collect vs MSG_PEEK" + "CVE-2023-52574": { + "cmt_msg": "team: fix null-ptr-deref when team device type is changed" }, - "CVE-2020-28374": { - "cmt_msg": "scsi: target: Fix XCOPY NAA identifier lookup" + "CVE-2019-19922": { + "cmt_msg": "sched/fair: Fix low cpu usage with high throttling by removing expiration of cpu-local slices" }, - "CVE-2023-0615": { - "cmt_msg": "media: vivid: dev->bitmap_cap wasn't freed in all cases" + "CVE-2019-19927": { + "cmt_msg": "drm/ttm: fix incrementing the page pointer for huge pages" }, - "CVE-2023-3006": { - "cmt_msg": "arm64: Add AMPERE1 to the Spectre-BHB affected list" + "CVE-2024-23307": { + "cmt_msg": "md/raid5: fix atomicity violation in raid5_cache_count" }, - "CVE-2022-3586": { - "cmt_msg": "sch_sfb: Don't assume the skb is still around after enqueueing to child" + "CVE-2023-52640": { + "cmt_msg": "fs/ntfs3: Fix oob in ntfs_listxattr" }, - "CVE-2024-0641": { - "cmt_msg": "tipc: fix a potential deadlock on &tx->lock" + "CVE-2023-3567": { + "cmt_msg": "vc_screen: move load of struct vc_data pointer in vcs_read() to avoid UAF" }, - "CVE-2024-0646": { - "cmt_msg": "net: tls, update curr on splice as well" + "CVE-2020-14304": { + "cmt_msg": "" }, - "CVE-2020-27820": { - "cmt_msg": "drm/nouveau: use drm_dev_unplug() during device removal" + "CVE-2020-14305": { + "cmt_msg": "netfilter: helpers: remove data_len usage for inkernel helpers" }, - "CVE-2023-1872": { - "cmt_msg": "io_uring: propagate issue_flags state down to file assignment" + "CVE-2023-3611": { + "cmt_msg": "net/sched: sch_qfq: account for stab overhead in qfq_enqueue" }, - "CVE-2023-1078": { - "cmt_msg": "rds: rds_rm_zerocopy_callback() use list_first_entry()" + "CVE-2019-2025": { + "cmt_msg": "binder: fix race that allows malicious free of live buffer" }, - "CVE-2023-39197": { - "cmt_msg": "netfilter: conntrack: dccp: copy entire header to stack buffer, not just basic one" + "CVE-2024-26625": { + "cmt_msg": "llc: call sock_orphan() at release time" }, - "CVE-2023-31248": { - "cmt_msg": "netfilter: nf_tables: do not ignore genmask when looking up chain by id" + "CVE-2020-26560": { + "cmt_msg": "" }, - "CVE-2020-26558": { - "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical" + "CVE-2023-4134": { + "cmt_msg": "Input: cyttsp4_core - change del_timer_sync() to timer_shutdown_sync()" }, - "CVE-2023-39193": { - "cmt_msg": "netfilter: xt_sctp: validate the flag_info count" + "CVE-2023-39198": { + "cmt_msg": "drm/qxl: fix UAF on handle creation" }, - "CVE-2023-1079": { - "cmt_msg": "HID: asus: use spinlock to safely schedule workers" + "CVE-2018-12127": { + "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" }, - "CVE-2020-26541": { - "cmt_msg": "certs: Add EFI_CERT_X509_GUID support for dbx entries" + "CVE-2018-12126": { + "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" }, - "CVE-2023-6610": { - "cmt_msg": "smb: client: fix potential OOB in smb2_dump_detail()" + "CVE-2023-37454": { + "cmt_msg": "" }, - "CVE-2023-3390": { - "cmt_msg": "netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE" + "CVE-2023-39197": { + "cmt_msg": "netfilter: conntrack: dccp: copy entire header to stack buffer, not just basic one" }, - "CVE-2023-3812": { - "cmt_msg": "net: tun: fix bugs for oversize packet when napi frags enabled" + "CVE-2023-52489": { + "cmt_msg": "mm/sparsemem: fix race in accessing memory_section->usage" }, - "CVE-2020-26143": { - "cmt_msg": "" + "CVE-2023-33288": { + "cmt_msg": "power: supply: bq24190: Fix use after free bug in bq24190_remove due to race condition" }, - "CVE-2021-33061": { - "cmt_msg": "ixgbe: add improvement for MDD response functionality" + "CVE-2023-52484": { + "cmt_msg": "iommu/arm-smmu-v3: Fix soft lockup triggered by arm_smmu_mm_invalidate_range" }, - "CVE-2024-26589": { - "cmt_msg": "bpf: Reject variable offset alu on PTR_TO_FLOW_KEYS" + "CVE-2022-29900": { + "cmt_msg": "x86/kvm/vmx: Make noinstr clean" }, - "CVE-2023-3389": { - "cmt_msg": "io_uring: mutex locked poll hashing" + "CVE-2022-29901": { + "cmt_msg": "x86/kvm/vmx: Make noinstr clean" }, - "CVE-2023-1476": { - "cmt_msg": "" + "CVE-2023-52485": { + "cmt_msg": "drm/amd/display: Wake DMCUB before sending a command" }, - "CVE-2021-3864": { + "CVE-2022-1116": { "cmt_msg": "" }, - "CVE-2022-1652": { - "cmt_msg": "floppy: use a statically allocated error counter" + "CVE-2022-23816": { + "cmt_msg": "x86/kvm/vmx: Make noinstr clean" }, - "CVE-2023-4623": { - "cmt_msg": "net/sched: sch_hfsc: Ensure inner classes have fsc curve" + "CVE-2023-35824": { + "cmt_msg": "media: dm1105: Fix use after free bug in dm1105_remove due to race condition" }, - "CVE-2024-23849": { - "cmt_msg": "net/rds: Fix UBSAN: array-index-out-of-bounds in rds_cmsg_recv" + "CVE-2023-35827": { + "cmt_msg": "ravb: Fix use-after-free issue in ravb_tx_timeout_work()" }, - "CVE-2020-29568": { - "cmt_msg": "xen/xenbus: Allow watches discard events before queueing" + "CVE-2023-52481": { + "cmt_msg": "arm64: errata: Add Cortex-A520 speculative unprivileged load workaround" }, - "CVE-2020-29569": { - "cmt_msg": "xen-blkback: set ring->xenblkd to NULL after kthread_stop()" + "CVE-2023-52585": { + "cmt_msg": "drm/amdgpu: Fix possible NULL dereference in amdgpu_ras_query_error_status_helper()" }, - "CVE-2023-51043": { - "cmt_msg": "drm/atomic: Fix potential use-after-free in nonblocking commits" + "CVE-2023-52584": { + "cmt_msg": "spmi: mediatek: Fix UAF on device remove" }, - "CVE-2022-2978": { - "cmt_msg": "fs: fix UAF/GPF bug in nilfs_mdt_destroy" + "CVE-2023-52587": { + "cmt_msg": "IB/ipoib: Fix mcast list locking" }, - "CVE-2023-20569": { - "cmt_msg": "x86/bugs: Increase the x86 bugs vector size to two u32s" + "CVE-2023-52586": { + "cmt_msg": "drm/msm/dpu: Add mutex lock in control vblank irq" }, - "CVE-2022-20132": { - "cmt_msg": "HID: add hid_is_usb() function to make it simpler for USB detection" + "CVE-2022-3567": { + "cmt_msg": "ipv6: Fix data races around sk->sk_prot." }, - "CVE-2022-2977": { - "cmt_msg": "tpm: fix reference counting for struct tpm_chip" + "CVE-2022-3566": { + "cmt_msg": "tcp: Fix data races around icsk->icsk_af_ops." }, - "CVE-2022-1789": { - "cmt_msg": "KVM: x86/mmu: fix NULL pointer dereference on guest INVPCID" + "CVE-2023-52583": { + "cmt_msg": "ceph: fix deadlock or deadcode of misusing dget()" }, - "CVE-2016-8660": { - "cmt_msg": "" + "CVE-2021-47065": { + "cmt_msg": "rtw88: Fix array overrun in rtw_get_tx_power_params()" }, - "CVE-2023-6270": { - "cmt_msg": "" + "CVE-2021-47144": { + "cmt_msg": "drm/amd/amdgpu: fix refcount leak" }, - "CVE-2023-2156": { - "cmt_msg": "net: rpl: fix rpl header size calculation" + "CVE-2021-47147": { + "cmt_msg": "ptp: ocp: Fix a resource leak in an error handling path" }, - "CVE-2023-4389": { - "cmt_msg": "btrfs: fix root ref counts in error handling in btrfs_get_root_ref" + "CVE-2020-36385": { + "cmt_msg": "RDMA/ucma: Rework ucma_migrate_id() to avoid races with destroy" }, - "CVE-2023-3772": { - "cmt_msg": "xfrm: add NULL check in xfrm_update_ae_params" + "CVE-2023-52589": { + "cmt_msg": "media: rkisp1: Fix IRQ disable race issue" }, - "CVE-2023-45862": { - "cmt_msg": "USB: ene_usb6250: Allocate enough memory for full object" + "CVE-2021-47140": { + "cmt_msg": "iommu/amd: Clear DMA ops when switching domain" }, - "CVE-2023-45863": { - "cmt_msg": "kobject: Fix slab-out-of-bounds in fill_kobj_path()" + "CVE-2021-47143": { + "cmt_msg": "net/smc: remove device from smcd_dev_list after failed device_add()" }, - "CVE-2023-1582": { - "cmt_msg": "fs/proc: task_mmu.c: don't read mapcount for migration entry" + "CVE-2023-52340": { + "cmt_msg": "ipv6: remove max_size check inline with ipv4" }, - "CVE-2022-1786": { - "cmt_msg": "io_uring: remove io_identity" + "CVE-2023-52588": { + "cmt_msg": "f2fs: fix to tag gcing flag on page during block migration" }, - "CVE-2022-45885": { - "cmt_msg": "" + "CVE-2024-26765": { + "cmt_msg": "LoongArch: Disable IRQ before init_fn() for nonboot CPUs" }, - "CVE-2008-4609": { - "cmt_msg": "" + "CVE-2023-0030": { + "cmt_msg": "drm/nouveau/mmu: add more general vmm free/node handling functions" }, - "CVE-2022-0435": { - "cmt_msg": "tipc: improve size validations for received domain records" + "CVE-2020-16120": { + "cmt_msg": "ovl: switch to mounter creds in readdir" }, - "CVE-2023-6356": { - "cmt_msg": "" + "CVE-2023-30772": { + "cmt_msg": "power: supply: da9150: Fix use after free bug in da9150_charger_remove due to race condition" }, - "CVE-2022-3533": { - "cmt_msg": "" + "CVE-2023-1611": { + "cmt_msg": "btrfs: fix race between quota disable and quota assign ioctls" }, - "CVE-2021-4135": { - "cmt_msg": "netdevsim: Zero-initialize memory for new map's value in function nsim_bpf_map_alloc" + "CVE-2016-10723": { + "cmt_msg": "mm, oom: remove sleep from under oom_lock" }, - "CVE-2023-26607": { - "cmt_msg": "ntfs: fix out-of-bounds read in ntfs_attr_find()" + "CVE-2019-19036": { + "cmt_msg": "btrfs: Detect unbalanced tree with empty leaf before crashing btree operations" }, - "CVE-2023-52456": { - "cmt_msg": "serial: imx: fix tx statemachine deadlock" + "CVE-2019-19039": { + "cmt_msg": "btrfs: Don't submit any btree write bio if the fs has errors" }, - "CVE-2019-15239": { - "cmt_msg": "unknown" + "CVE-2020-8832": { + "cmt_msg": "drm/i915: Record the default hw state after reset upon load" }, - "CVE-2021-4037": { - "cmt_msg": "xfs: fix up non-directory creation in SGID directories" + "CVE-2024-26797": { + "cmt_msg": "drm/amd/display: Prevent potential buffer overflow in map_hw_resources" }, - "CVE-2021-22543": { - "cmt_msg": "KVM: do not allow mapping valid but non-reference-counted pages" + "CVE-2024-26791": { + "cmt_msg": "btrfs: dev-replace: properly validate device names" }, - "CVE-2022-45884": { - "cmt_msg": "" + "CVE-2020-8834": { + "cmt_msg": "KVM: PPC: Book3S HV: Factor fake-suspend handling out of kvmppc_save/restore_tm" }, - "CVE-2021-3348": { - "cmt_msg": "nbd: freeze the queue while we're adding connections" + "CVE-2024-26793": { + "cmt_msg": "gtp: fix use-after-free and null-ptr-deref in gtp_newlink()" }, - "CVE-2022-21505": { - "cmt_msg": "lockdown: Fix kexec lockdown bypass with ima policy" + "CVE-2021-32078": { + "cmt_msg": "ARM: footbridge: remove personal server platform" }, - "CVE-2023-20941": { - "cmt_msg": "" + "CVE-2023-52532": { + "cmt_msg": "net: mana: Fix TX CQE error handling" }, - "CVE-2023-52447": { - "cmt_msg": "bpf: Defer the free of inner map when necessary" + "CVE-2024-26798": { + "cmt_msg": "fbcon: always restore the old font data in fbcon_do_set_font()" }, - "CVE-2021-3347": { - "cmt_msg": "futex: Ensure the correct return value from futex_lock_pi()" + "CVE-2017-18552": { + "cmt_msg": "RDS: validate the requested traces user input against max supported" }, - "CVE-2023-3777": { - "cmt_msg": "netfilter: nf_tables: skip bound chain on rule flush" + "CVE-2023-39189": { + "cmt_msg": "netfilter: nfnetlink_osf: avoid OOB read" }, - "CVE-2022-1966": { - "cmt_msg": "netfilter: nf_tables: disallow non-stateful expression in sets earlier" + "CVE-2023-35001": { + "cmt_msg": "netfilter: nf_tables: prevent OOB access in nft_byteorder_eval" }, - "CVE-2021-3587": { - "cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect" + "CVE-2017-18232": { + "cmt_msg": "scsi: libsas: direct call probe and destruct" }, - "CVE-2021-44733": { - "cmt_msg": "tee: handle lookup of shm with reference count 0" + "CVE-2019-2213": { + "cmt_msg": "binder: fix possible UAF when freeing buffer" }, - "CVE-2021-20268": { - "cmt_msg": "bpf: Fix signed_{sub,add32}_overflows type handling" + "CVE-2024-26677": { + "cmt_msg": "rxrpc: Fix delayed ACKs to not set the reference serial number" }, - "CVE-2022-3534": { - "cmt_msg": "libbpf: Fix use-after-free in btf_dump_name_dups" + "CVE-2024-26676": { + "cmt_msg": "af_unix: Call kfree_skb() for dead unix_(sk)->oob_skb in GC." }, - "CVE-2022-3535": { - "cmt_msg": "net: mvpp2: fix mvpp2 debugfs leak" + "CVE-2022-0168": { + "cmt_msg": "cifs: fix NULL ptr dereference in smb2_ioctl_query_info()" }, - "CVE-2021-22600": { - "cmt_msg": "net/packet: rx_owner_map depends on pg_vec" + "CVE-2020-26556": { + "cmt_msg": "" }, - "CVE-2023-28328": { - "cmt_msg": "media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer()" + "CVE-2020-26557": { + "cmt_msg": "" }, - "CVE-2022-0322": { - "cmt_msg": "sctp: account stream padding length for reconf chunk" + "CVE-2024-26671": { + "cmt_msg": "blk-mq: fix IO hang from sbitmap wakeup race" }, - "CVE-2023-0386": { - "cmt_msg": "ovl: fail on invalid uid/gid mapping at copy up" + "CVE-2024-26779": { + "cmt_msg": "wifi: mac80211: fix race condition on enabling fast-xmit" }, - "CVE-2023-6121": { - "cmt_msg": "nvmet: nul-terminate the NQNs passed in the connect command" + "CVE-2024-26776": { + "cmt_msg": "spi: hisi-sfc-v3xx: Return IRQ_NONE if no interrupts were detected" }, - "CVE-2023-28327": { - "cmt_msg": "af_unix: Get user_ns from in_skb in unix_diag_get_exact()." + "CVE-2024-26777": { + "cmt_msg": "fbdev: sis: Error out if pixclock equals zero" }, - "CVE-2017-13693": { + "CVE-2019-20794": { "cmt_msg": "" }, - "CVE-2017-13694": { + "CVE-2020-26559": { "cmt_msg": "" }, - "CVE-2022-42721": { - "cmt_msg": "wifi: cfg80211: avoid nontransmitted BSS list corruption" + "CVE-2023-3397": { + "cmt_msg": "" }, - "CVE-2022-42720": { - "cmt_msg": "wifi: cfg80211: fix BSS refcounting bugs" + "CVE-2018-12130": { + "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" }, - "CVE-2022-42722": { - "cmt_msg": "wifi: mac80211: fix crash in beacon protection for P2P-device" + "CVE-2024-26679": { + "cmt_msg": "inet: read sk->sk_family once in inet_recv_error()" }, - "CVE-2021-4149": { - "cmt_msg": "btrfs: unlock newly allocated extent buffer after error" + "CVE-2024-26771": { + "cmt_msg": "dmaengine: ti: edma: Add some null pointer checks to the edma_probe" }, - "CVE-2021-4148": { - "cmt_msg": "mm: khugepaged: skip huge page collapse for special files" + "CVE-2021-47083": { + "cmt_msg": "pinctrl: mediatek: fix global-out-of-bounds issue" }, - "CVE-2022-42895": { - "cmt_msg": "Bluetooth: L2CAP: Fix attempting to access uninitialized memory" + "CVE-2023-52458": { + "cmt_msg": "block: add check that partition length needs to be aligned with block size" }, - "CVE-2021-3640": { - "cmt_msg": "Bluetooth: sco: Fix lock_sock() blockage by memcpy_from_msg()" + "CVE-2018-20854": { + "cmt_msg": "phy: ocelot-serdes: fix out-of-bounds read" }, - "CVE-2021-3764": { - "cmt_msg": "crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd()" + "CVE-2018-1121": { + "cmt_msg": "" }, - "CVE-2021-3760": { - "cmt_msg": "nfc: nci: fix the UAF of rf_conn_info object" + "CVE-2023-28746": { + "cmt_msg": "x86/mmio: Disable KVM mitigation when X86_FEATURE_CLEAR_CPU_BUF is set" }, - "CVE-2022-4382": { - "cmt_msg": "USB: gadgetfs: Fix race between mounting and unmounting" + "CVE-2023-52451": { + "cmt_msg": "powerpc/pseries/memhp: Fix access beyond end of drmem array" }, - "CVE-2022-36123": { - "cmt_msg": "x86: Clear .brk area at early boot" + "CVE-2021-47119": { + "cmt_msg": "ext4: fix memory leak in ext4_fill_super" }, - "CVE-2023-4732": { - "cmt_msg": "mm/userfaultfd: fix uffd-wp special cases for fork()" + "CVE-2024-1086": { + "cmt_msg": "netfilter: nf_tables: reject QUEUE/DROP verdict parameters" }, - "CVE-2024-24859": { - "cmt_msg": "" + "CVE-2022-3344": { + "cmt_msg": "KVM: x86: nSVM: harden svm_free_nested against freeing vmcb02 while still in use" }, - "CVE-2024-24858": { + "CVE-2023-6240": { "cmt_msg": "" }, - "CVE-2024-24855": { - "cmt_msg": "scsi: lpfc: Fix a possible data race in lpfc_unregister_fcf_rescan()" - }, - "CVE-2024-24857": { - "cmt_msg": "" + "CVE-2024-26700": { + "cmt_msg": "drm/amd/display: Fix MST Null Ptr for RV" }, - "CVE-2021-29264": { - "cmt_msg": "gianfar: fix jumbo packets+napi+rx overrun crash" + "CVE-2024-26706": { + "cmt_msg": "parisc: Fix random data corruption from exception handler" }, - "CVE-2021-29265": { - "cmt_msg": "usbip: fix stub_dev usbip_sockfd_store() races leading to gpf" + "CVE-2023-23559": { + "cmt_msg": "wifi: rndis_wlan: Prevent buffer overflow in rndis_query_oid" }, - "CVE-2021-29266": { - "cmt_msg": "vhost-vdpa: fix use-after-free of v->config_ctx" + "CVE-2022-0382": { + "cmt_msg": "net ticp:fix a kernel-infoleak in __tipc_sendmsg()" }, - "CVE-2021-39648": { - "cmt_msg": "usb: gadget: configfs: Fix use-after-free issue with udc_name" + "CVE-2023-32233": { + "cmt_msg": "netfilter: nf_tables: deactivate anonymous set from preparation phase" }, - "CVE-2022-3545": { - "cmt_msg": "nfp: fix use-after-free in area_cache_get()" + "CVE-2019-15222": { + "cmt_msg": "ALSA: usb-audio: Fix gpf in snd_usb_pipe_sanity_check" }, - "CVE-2021-43056": { - "cmt_msg": "KVM: PPC: Book3S HV: Make idle_kvm_start_guest() return 0 if it went to guest" + "CVE-2019-15223": { + "cmt_msg": "ALSA: line6: Assure canceling delayed work at disconnection" }, - "CVE-2022-3542": { - "cmt_msg": "bnx2x: fix potential memory leak in bnx2x_tpa_stop()" + "CVE-2024-23196": { + "cmt_msg": "ALSA: hda: fix a possible null-pointer dereference due to data race in snd_hdac_regmap_sync()" }, - "CVE-2023-5197": { - "cmt_msg": "netfilter: nf_tables: disallow rule removal from chain binding" + "CVE-2019-19815": { + "cmt_msg": "f2fs: support swap file w/ DIO" }, - "CVE-2021-21781": { - "cmt_msg": "ARM: ensure the signal page contains defined contents" + "CVE-2019-19814": { + "cmt_msg": "" }, - "CVE-2021-0512": { - "cmt_msg": "HID: make arrays usage and value to be the same" + "CVE-2020-11669": { + "cmt_msg": "powerpc/powernv/idle: Restore AMR/UAMOR/AMOR after idle" }, - "CVE-2023-1382": { - "cmt_msg": "tipc: set con sock in tipc_conn_alloc" + "CVE-2023-52620": { + "cmt_msg": "netfilter: nf_tables: disallow timeout for anonymous sets" }, - "CVE-2023-1380": { - "cmt_msg": "wifi: brcmfmac: slab-out-of-bounds read in brcmf_get_assoc_ies()" + "CVE-2023-52621": { + "cmt_msg": "bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers" }, - "CVE-2020-0347": { - "cmt_msg": "" + "CVE-2023-52622": { + "cmt_msg": "ext4: avoid online resizing failures due to oversized flex bg" }, - "CVE-2022-41222": { - "cmt_msg": "mm/mremap: hold the rmap lock in write mode when moving page table entries." + "CVE-2023-52623": { + "cmt_msg": "SUNRPC: Fix a suspicious RCU usage warning" }, - "CVE-2021-40490": { - "cmt_msg": "ext4: fix race writing to an inline_data file while its xattrs are changing" + "CVE-2023-52624": { + "cmt_msg": "drm/amd/display: Wake DMCUB before executing GPINT commands" }, - "CVE-2021-33909": { - "cmt_msg": "seq_file: disallow extremely large seq buffer allocations" + "CVE-2023-52625": { + "cmt_msg": "drm/amd/display: Refactor DMCUB enter/exit idle interface" }, - "CVE-2019-12456": { - "cmt_msg": "" + "CVE-2023-52628": { + "cmt_msg": "netfilter: nftables: exthdr: fix 4-byte stack OOB write" }, - "CVE-2021-29646": { - "cmt_msg": "tipc: better validate user input in tipc_nl_retrieve_key()" + "CVE-2023-34255": { + "cmt_msg": "xfs: verify buffer contents when we skip log replay" }, - "CVE-2021-29647": { - "cmt_msg": "net: qrtr: fix a kernel-infoleak in qrtr_recvmsg()" + "CVE-2023-3141": { + "cmt_msg": "memstick: r592: Fix UAF bug in r592_remove due to race condition" }, - "CVE-2021-33656": { - "cmt_msg": "vt: drop old FONT ioctls" + "CVE-2022-3523": { + "cmt_msg": "mm/memory.c: fix race when faulting a device private page" }, - "CVE-2021-33655": { - "cmt_msg": "fbcon: Disallow setting font bigger than screen size" + "CVE-2022-3522": { + "cmt_msg": "mm/hugetlb: use hugetlb_pte_stable in migration race check" }, - "CVE-2022-41858": { - "cmt_msg": "drivers: net: slip: fix NPD bug in sl_tx_timeout()" + "CVE-2008-2544": { + "cmt_msg": "" }, - "CVE-2022-3176": { - "cmt_msg": "io_uring: fix UAF due to missing POLLFREE handling" + "CVE-2018-12928": { + "cmt_msg": "" }, - "CVE-2023-1206": { - "cmt_msg": "tcp: Reduce chance of collisions in inet6_hashfn()." + "CVE-2021-47101": { + "cmt_msg": "asix: fix uninit-value in asix_mdio_read()" }, - "CVE-2022-41850": { - "cmt_msg": "HID: roccat: Fix use-after-free in roccat_read()" + "CVE-2021-46982": { + "cmt_msg": "f2fs: compress: fix race condition of overwrite vs truncate" }, - "CVE-2023-2985": { - "cmt_msg": "fs: hfsplus: fix UAF issue in hfsplus_put_super" + "CVE-2018-7754": { + "cmt_msg": "printk: hash addresses printed with %p" }, - "CVE-2023-1637": { - "cmt_msg": "x86/speculation: Restore speculation related MSRs during S3 resume" + "CVE-2007-3719": { + "cmt_msg": "" }, - "CVE-2022-2938": { - "cmt_msg": "psi: Fix uaf issue when psi trigger is destroyed while being polled" + "CVE-2023-3863": { + "cmt_msg": "net: nfc: Fix use-after-free caused by nfc_llcp_find_local" }, - "CVE-2022-3646": { - "cmt_msg": "nilfs2: fix leak of nilfs_root in case of writer thread creation failure" + "CVE-2023-0590": { + "cmt_msg": "net: sched: fix race condition in qdisc_graft()" }, - "CVE-2021-45469": { - "cmt_msg": "f2fs: fix to do sanity check on last xattr entry in __f2fs_setxattr()" + "CVE-2022-45919": { + "cmt_msg": "media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221" }, - "CVE-2022-1184": { - "cmt_msg": "ext4: verify dir block before splitting it" + "CVE-2023-2248": { + "cmt_msg": "net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg" }, - "CVE-2022-3642": { - "cmt_msg": "" + "CVE-2022-1204": { + "cmt_msg": "ax25: Fix refcount leaks caused by ax25_cb_del()" }, - "CVE-2022-3643": { - "cmt_msg": "xen/netback: Ensure protocol headers don't fall in the non-linear area" + "CVE-2023-32269": { + "cmt_msg": "netrom: Fix use-after-free caused by accept on already connected socket" }, - "CVE-2024-0584": { - "cmt_msg": "ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet" + "CVE-2023-52517": { + "cmt_msg": "spi: sun6i: fix race between DMA RX transfer completion and RX FIFO drain" }, - "CVE-2019-15902": { - "cmt_msg": "unknown" + "CVE-2022-2586": { + "cmt_msg": "netfilter: nf_tables: do not allow SET_ID to refer to another table" }, - "CVE-2024-25739": { - "cmt_msg": "" + "CVE-2021-34556": { + "cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4" }, - "CVE-2023-3358": { - "cmt_msg": "HID: intel_ish-hid: Add check for ishtp_dma_tx_map" + "CVE-2021-39714": { + "cmt_msg": "staging: android: ion: Drop ion_map_kernel interface" }, - "CVE-2024-0340": { - "cmt_msg": "vhost: use kzalloc() instead of kmalloc() followed by memset()" + "CVE-2017-18261": { + "cmt_msg": "clocksource/drivers/arm_arch_timer: Avoid infinite recursion when ftrace is enabled" }, - "CVE-2023-6535": { + "CVE-2022-1247": { "cmt_msg": "" }, - "CVE-2023-6536": { - "cmt_msg": "" + "CVE-2022-2991": { + "cmt_msg": "remove the lightnvm subsystem" }, - "CVE-2021-33624": { - "cmt_msg": "bpf: Inherit expanded/patched seen count from old aux data" + "CVE-2023-51780": { + "cmt_msg": "atm: Fix Use-After-Free in do_vcc_ioctl" }, - "CVE-2021-27365": { - "cmt_msg": "scsi: iscsi: Ensure sysfs attributes are limited to PAGE_SIZE" + "CVE-2023-51781": { + "cmt_msg": "appletalk: Fix Use-After-Free in atalk_ioctl" }, - "CVE-2021-3752": { - "cmt_msg": "Bluetooth: fix use-after-free error in lock_sock_nested()" + "CVE-2022-3624": { + "cmt_msg": "bonding: fix reference count leak in balance-alb mode" }, - "CVE-2021-27363": { - "cmt_msg": "scsi: iscsi: Restrict sessions and handles to admin capabilities" + "CVE-2021-3669": { + "cmt_msg": "ipc: replace costly bailout check in sysvipc_find_ipc()" }, - "CVE-2022-23036": { - "cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()" + "CVE-2019-18885": { + "cmt_msg": "btrfs: merge btrfs_find_device and find_device" }, - "CVE-2018-17977": { - "cmt_msg": "" + "CVE-2022-4744": { + "cmt_msg": "tun: avoid double free in tun_free_netdev" }, - "CVE-2024-1151": { - "cmt_msg": "net: openvswitch: limit the number of recursions from action sets" + "CVE-2019-11091": { + "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" }, - "CVE-2010-5321": { + "CVE-2022-3239": { + "cmt_msg": "media: em28xx: initialize refcount before kref_get" + }, + "CVE-2022-4543": { "cmt_msg": "" }, - "CVE-2021-20322": { - "cmt_msg": "ipv6: make exception cache less predictible" + "CVE-2023-52571": { + "cmt_msg": "power: supply: rk817: Fix node refcount leak" }, - "CVE-2021-20320": { - "cmt_msg": "s390/bpf: Fix optimizing out zero-extensions" + "CVE-2023-52572": { + "cmt_msg": "cifs: Fix UAF in cifs_demultiplex_thread()" }, - "CVE-2021-20321": { - "cmt_msg": "ovl: fix missing negative dentry check in ovl_rename()" + "CVE-2023-4921": { + "cmt_msg": "net: sched: sch_qfq: Fix UAF in qfq_dequeue()" }, - "CVE-2023-4147": { - "cmt_msg": "netfilter: nf_tables: disallow rule addition to bound chain via NFTA_RULE_CHAIN_ID" + "CVE-2023-1829": { + "cmt_msg": "net/sched: Retire tcindex classifier" }, - "CVE-2022-42896": { - "cmt_msg": "Bluetooth: L2CAP: Fix accepting connection request for invalid SPSM" + "CVE-2024-0775": { + "cmt_msg": "ext4: improve error recovery code paths in __ext4_remount()" }, - "CVE-2023-7192": { - "cmt_msg": "netfilter: ctnetlink: fix possible refcount leak in ctnetlink_create_conntrack()" + "CVE-2023-4881": { + "cmt_msg": "netfilter: nftables: exthdr: fix 4-byte stack OOB write" }, - "CVE-2022-3169": { - "cmt_msg": "nvme: ensure subsystem reset is single threaded" + "CVE-2013-7445": { + "cmt_msg": "" }, - "CVE-2022-36280": { - "cmt_msg": "drm/vmwgfx: Validate the box size for the snooped cursor" + "CVE-2024-26733": { + "cmt_msg": "arp: Prevent overflow in arp_req_get()." }, - "CVE-2022-1048": { - "cmt_msg": "ALSA: pcm: Fix races among concurrent hw_params and hw_free calls" + "CVE-2024-26738": { + "cmt_msg": "powerpc/pseries/iommu: DLPAR add doesn't completely initialize pci_controller" }, - "CVE-2023-22995": { - "cmt_msg": "usb: dwc3: dwc3-qcom: Add missing platform_device_put() in dwc3_qcom_acpi_register_core" + "CVE-2024-26739": { + "cmt_msg": "net/sched: act_mirred: don't override retval if we already lost the skb" }, - "CVE-2024-21803": { + "CVE-2022-38096": { "cmt_msg": "" }, - "CVE-2023-22998": { - "cmt_msg": "drm/virtio: Fix NULL vs IS_ERR checking in virtio_gpu_object_shmem_init" - }, - "CVE-2023-4563": { - "cmt_msg": "netfilter: nf_tables: don't skip expired elements during walk" - }, - "CVE-2021-3542": { - "cmt_msg": "" + "CVE-2024-26805": { + "cmt_msg": "netlink: Fix kernel-infoleak-after-free in __skb_datagram_iter" }, - "CVE-2022-20166": { - "cmt_msg": "drivers core: Use sysfs_emit and sysfs_emit_at for show(device *...) functions" + "CVE-2022-3303": { + "cmt_msg": "ALSA: pcm: oss: Fix race at SNDCTL_DSP_SYNC" }, - "CVE-2024-24860": { - "cmt_msg": "Bluetooth: Fix atomicity violation in {min,max}_key_size_set" + "CVE-2024-26769": { + "cmt_msg": "nvmet-fc: avoid deadlock on delete association path" }, - "CVE-2023-3220": { - "cmt_msg": "drm/msm/dpu: Add check for pstates" + "CVE-2023-23455": { + "cmt_msg": "net: sched: atm: dont intepret cls results when asked to drop" }, - "CVE-2024-22099": { - "cmt_msg": "" + "CVE-2023-23454": { + "cmt_msg": "net: sched: cbq: dont intepret cls results when asked to drop" }, - "CVE-2023-30456": { - "cmt_msg": "KVM: nVMX: add missing consistency checks for CR0 and CR4" + "CVE-2022-20148": { + "cmt_msg": "f2fs: fix UAF in f2fs_available_free_memory" }, - "CVE-2022-23041": { - "cmt_msg": "xen/9p: use alloc/free_pages_exact()" + "CVE-2023-6931": { + "cmt_msg": "perf: Fix perf_event_validate_size()" }, - "CVE-2022-23040": { - "cmt_msg": "xen/xenbus: don't let xenbus_grant_ring() remove grants in error case" + "CVE-2023-6932": { + "cmt_msg": "ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet" }, - "CVE-2022-23042": { - "cmt_msg": "xen/netfront: react properly to failing gnttab_end_foreign_access_ref()" + "CVE-2024-0607": { + "cmt_msg": "netfilter: nf_tables: fix pointer math issue in nft_byteorder_eval()" }, - "CVE-2018-12929": { - "cmt_msg": "" + "CVE-2019-12615": { + "cmt_msg": "mdesc: fix a missing-check bug in get_vdev_port_node_info()" }, - "CVE-2018-12928": { - "cmt_msg": "" + "CVE-2021-33631": { + "cmt_msg": "ext4: fix kernel BUG in 'ext4_write_inline_data_end()'" }, - "CVE-2021-28972": { - "cmt_msg": "PCI: rpadlpar: Fix potential drc_name corruption in store functions" + "CVE-2022-28388": { + "cmt_msg": "can: usb_8dev: usb_8dev_start_xmit(): fix double dev_kfree_skb() in error path" }, - "CVE-2024-26592": { - "cmt_msg": "ksmbd: fix UAF issue in ksmbd_tcp_new_connection()" + "CVE-2024-26803": { + "cmt_msg": "net: veth: clear GRO when clearing XDP even when down" }, - "CVE-2022-48619": { - "cmt_msg": "Input: add bounds checking to input_set_capability()" + "CVE-2020-12362": { + "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" }, - "CVE-2020-10708": { - "cmt_msg": "" + "CVE-2020-12363": { + "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" }, - "CVE-2022-0400": { - "cmt_msg": "" + "CVE-2022-4129": { + "cmt_msg": "l2tp: Serialize access to sk_user_data with sk_callback_lock" }, - "CVE-2024-25741": { - "cmt_msg": "" + "CVE-2020-12364": { + "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" }, - "CVE-2021-0707": { - "cmt_msg": "dmabuf: fix use-after-free of dmabuf's file->f_inode" + "CVE-2023-52607": { + "cmt_msg": "powerpc/mm: Fix null-pointer dereference in pgtable_cache_add" }, - "CVE-2022-26966": { - "cmt_msg": "sr9700: sanity check for packet length" + "CVE-2024-26646": { + "cmt_msg": "thermal: intel: hfi: Add syscore callbacks for system-wide PM" }, - "CVE-2021-42739": { - "cmt_msg": "media: firewire: firedtv-avc: fix a buffer overflow in avc_ca_pmt()" + "CVE-2024-26647": { + "cmt_msg": "drm/amd/display: Fix late derefrence 'dsc' check in 'link_set_dsc_pps_packet()'" }, - "CVE-2023-1989": { - "cmt_msg": "Bluetooth: btsdio: fix use after free bug in btsdio_remove due to unfinished work" + "CVE-2024-26644": { + "cmt_msg": "btrfs: don't abort filesystem when attempting to snapshot deleted subvolume" }, - "CVE-2021-37159": { - "cmt_msg": "usb: hso: fix error handling code of hso_create_net_device" + "CVE-2023-33203": { + "cmt_msg": "net: qcom/emac: Fix use after free bug in emac_remove due to race condition" }, - "CVE-2024-25744": { - "cmt_msg": "x86/coco: Disable 32-bit emulation by default on TDX and SEV" + "CVE-2024-26641": { + "cmt_msg": "ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv()" }, - "CVE-2022-25265": { - "cmt_msg": "" + "CVE-2023-26545": { + "cmt_msg": "net: mpls: fix stale pointer if allocation fails during device rename" }, - "CVE-2022-20368": { - "cmt_msg": "net/packet: fix slab-out-of-bounds access in packet_recvmsg()" + "CVE-2019-20811": { + "cmt_msg": "net-sysfs: call dev_hold if kobject_init_and_add success" }, - "CVE-2022-21499": { - "cmt_msg": "lockdown: also lock down previous kgdb use" + "CVE-2023-52600": { + "cmt_msg": "jfs: fix uaf in jfs_evict_inode" }, - "CVE-2024-23196": { - "cmt_msg": "" + "CVE-2023-3111": { + "cmt_msg": "btrfs: unset reloc control if transaction commit fails in prepare_to_relocate()" }, - "CVE-2023-4208": { - "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free" + "CVE-2023-6356": { + "cmt_msg": "nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length" }, - "CVE-2022-47519": { - "cmt_msg": "wifi: wilc1000: validate length of IEEE80211_P2P_ATTR_OPER_CHANNEL attribute" + "CVE-2022-26373": { + "cmt_msg": "x86/speculation: Add RSB VM Exit protections" }, - "CVE-2022-3606": { + "CVE-2019-15290": { "cmt_msg": "" }, - "CVE-2023-4206": { - "cmt_msg": "net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free" - }, - "CVE-2022-39188": { - "cmt_msg": "mmu_gather: Force tlb-flush VM_PFNMAP vmas" + "CVE-2023-3212": { + "cmt_msg": "gfs2: Don't deref jdesc in evict" }, - "CVE-2023-3640": { - "cmt_msg": "" + "CVE-2023-52531": { + "cmt_msg": "wifi: iwlwifi: mvm: Fix a memory corruption issue" }, - "CVE-2023-20593": { - "cmt_msg": "x86/cpu/amd: Add a Zenbleed fix" + "CVE-2024-26633": { + "cmt_msg": "ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim()" }, - "CVE-2023-0160": { - "cmt_msg": "bpf, sockmap: fix deadlocks in the sockhash and sockmap" + "CVE-2018-7273": { + "cmt_msg": "printk: hash addresses printed with %p" }, - "CVE-2022-2663": { - "cmt_msg": "netfilter: nf_conntrack_irc: Fix forged IP logic" + "CVE-2024-26636": { + "cmt_msg": "llc: make llc_ui_sendmsg() more robust against bonding changes" }, - "CVE-2022-43750": { - "cmt_msg": "usb: mon: make mmapped memory read only" + "CVE-2024-26635": { + "cmt_msg": "llc: Drop support for ETH_P_TR_802_2." }, - "CVE-2023-4015": { - "cmt_msg": "netfilter: nf_tables: skip immediate deactivate in _PREPARE_ERROR" + "CVE-2022-2153": { + "cmt_msg": "KVM: x86: Avoid theoretical NULL pointer dereference in kvm_irq_delivery_to_apic_fast()" }, - "CVE-2023-0047": { - "cmt_msg": "mm, oom: do not trigger out_of_memory from the #PF" + "CVE-2024-2193": { + "cmt_msg": "" }, - "CVE-2023-0045": { - "cmt_msg": "x86/bugs: Flush IBP in ib_prctl_set()" + "CVE-2018-12930": { + "cmt_msg": "" }, - "CVE-2023-4010": { + "CVE-2018-12931": { "cmt_msg": "" }, - "CVE-2022-38457": { - "cmt_msg": "drm/vmwgfx: Remove rcu locks from user resources" + "CVE-2023-1990": { + "cmt_msg": "nfc: st-nci: Fix use after free bug in ndlc_remove due to race condition" }, - "CVE-2022-20424": { - "cmt_msg": "io_uring: remove io_identity" + "CVE-2021-33098": { + "cmt_msg": "ixgbe: fix large MTU request from VF" }, - "CVE-2022-20422": { - "cmt_msg": "arm64: fix oops in concurrently setting insn_emulation sysctls" + "CVE-2019-12381": { + "cmt_msg": "ip_sockglue: Fix missing-check bug in ip_ra_control()" }, - "CVE-2022-20421": { - "cmt_msg": "binder: fix UAF of ref->proc caused by race condition" + "CVE-2019-12382": { + "cmt_msg": "drm/edid: Fix a missing-check bug in drm_load_edid_firmware()" }, - "CVE-2023-4385": { - "cmt_msg": "fs: jfs: fix possible NULL pointer dereference in dbFree()" + "CVE-2023-52634": { + "cmt_msg": "drm/amd/display: Fix disable_otg_wa logic" }, - "CVE-2023-4387": { - "cmt_msg": "net: vmxnet3: fix possible use-after-free bugs in vmxnet3_rq_alloc_rx_buf()" + "CVE-2024-26648": { + "cmt_msg": "drm/amd/display: Fix variable deferencing before NULL check in edp_setup_replay()" }, - "CVE-2019-19378": { - "cmt_msg": "" + "CVE-2020-36780": { + "cmt_msg": "i2c: sprd: fix reference leak when pm_runtime_get_sync fails" }, - "CVE-2022-36879": { - "cmt_msg": "xfrm: xfrm_policy: fix a possible double xfrm_pols_put() in xfrm_bundle_lookup()" + "CVE-2020-36781": { + "cmt_msg": "i2c: imx: fix reference leak when pm_runtime_get_sync fails" }, - "CVE-2021-28691": { - "cmt_msg": "xen-netback: take a reference to the RX task thread" + "CVE-2020-36784": { + "cmt_msg": "i2c: cadence: fix reference leak when pm_runtime_get_sync fails" }, - "CVE-2021-39698": { - "cmt_msg": "wait: add wake_up_pollfree()" + "CVE-2017-13166": { + "cmt_msg": "media: v4l2-ioctl.c: use check_fmt for enum/g/s/try_fmt" }, - "CVE-2022-45934": { - "cmt_msg": "Bluetooth: L2CAP: Fix u8 overflow" + "CVE-2019-25162": { + "cmt_msg": "i2c: Fix a potential use after free" }, - "CVE-2022-41674": { - "cmt_msg": "wifi: cfg80211: fix u8 overflow in cfg80211_update_notlisted_nontrans()" + "CVE-2018-12207": { + "cmt_msg": "kvm: x86, powerpc: do not allow clearing largepages debugfs entry" }, - "CVE-2022-2380": { - "cmt_msg": "video: fbdev: sm712fb: Fix crash in smtcfb_read()" + "CVE-2024-26685": { + "cmt_msg": "nilfs2: fix potential bug in end_buffer_async_write" }, - "CVE-2022-0850": { - "cmt_msg": "ext4: fix kernel infoleak via ext4_extent_header" + "CVE-2022-3903": { + "cmt_msg": "media: mceusb: Use new usb_control_msg_*() routines" }, - "CVE-2021-3759": { - "cmt_msg": "memcg: enable accounting of ipc resources" + "CVE-2024-26642": { + "cmt_msg": "netfilter: nf_tables: disallow anonymous set with timeout flag" }, - "CVE-2021-4197": { - "cmt_msg": "cgroup: Use open-time credentials for process migraton perm checks" + "CVE-2023-20588": { + "cmt_msg": "x86/CPU/AMD: Do not leak quotient data after a division by 0" }, - "CVE-2021-3612": { - "cmt_msg": "Input: joydev - prevent potential read overflow in ioctl" + "CVE-2018-20449": { + "cmt_msg": "printk: hash addresses printed with %p" }, - "CVE-2020-24503": { - "cmt_msg": "" + "CVE-2021-47070": { + "cmt_msg": "uio_hv_generic: Fix another memory leak in error handling paths" }, - "CVE-2020-24502": { - "cmt_msg": "" + "CVE-2022-44033": { + "cmt_msg": "char: pcmcia: remove all the drivers" }, - "CVE-2019-19449": { - "cmt_msg": "f2fs: fix to do sanity check on segment/section count" + "CVE-2021-47074": { + "cmt_msg": "nvme-loop: fix memory leak in nvme_loop_create_ctrl()" }, - "CVE-2021-3753": { - "cmt_msg": "vt_kdsetmode: extend console locking" + "CVE-2021-47076": { + "cmt_msg": "RDMA/rxe: Return CQE error if invalid lkey was supplied" }, - "CVE-2020-24504": { - "cmt_msg": "ice: create scheduler aggregator node config and move VSIs" + "CVE-2021-47170": { + "cmt_msg": "USB: usbfs: Don't WARN about excessively large memory allocations" }, - "CVE-2020-11725": { - "cmt_msg": "" + "CVE-2021-47172": { + "cmt_msg": "iio: adc: ad7124: Fix potential overflow due to non sequential channel numbers" }, - "CVE-2021-0937": { - "cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write" + "CVE-2021-47175": { + "cmt_msg": "net/sched: fq_pie: fix OOB access in the traffic path" }, - "CVE-2022-1263": { - "cmt_msg": "KVM: avoid NULL pointer dereference in kvm_dirty_ring_push" + "CVE-2018-10322": { + "cmt_msg": "xfs: enhance dinode verifier" }, - "CVE-2021-35477": { - "cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4" + "CVE-2021-46951": { + "cmt_msg": "tpm: efi: Use local variable for calculating final log size" }, - "CVE-2023-31436": { - "cmt_msg": "net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg" + "CVE-2021-46950": { + "cmt_msg": "md/raid1: properly indicate failure when ending a failed write request" }, - "CVE-2022-47929": { - "cmt_msg": "net: sched: disallow noqueue for qdisc classes" + "CVE-2021-46952": { + "cmt_msg": "NFS: fs_context: validate UDP retrans to prevent shift out-of-bounds" }, - "CVE-2021-41864": { - "cmt_msg": "bpf: Fix integer overflow in prealloc_elems_and_freelist()" + "CVE-2023-52597": { + "cmt_msg": "KVM: s390: fix setting of fpc register" }, - "CVE-2022-2209": { - "cmt_msg": "" + "CVE-2021-46959": { + "cmt_msg": "spi: Fix use-after-free with devm_spi_alloc_*" }, - "CVE-2021-37576": { - "cmt_msg": "KVM: PPC: Book3S: Fix H_RTAS rets buffer overflow" + "CVE-2019-10220": { + "cmt_msg": "Convert filldir[64]() from __put_user() to unsafe_put_user()" }, - "CVE-2023-7042": { - "cmt_msg": "" + "CVE-2021-0929": { + "cmt_msg": "staging/android/ion: delete dma_buf->kmap/unmap implemenation" }, - "CVE-2022-3594": { - "cmt_msg": "r8152: Rate limit overflow messages" + "CVE-2023-52590": { + "cmt_msg": "ocfs2: Avoid touching renamed directory if parent does not change" }, - "CVE-2022-3595": { - "cmt_msg": "cifs: fix double-fault crash during ntlmssp" + "CVE-2023-52591": { + "cmt_msg": "reiserfs: Avoid touching renamed directory if parent does not change" }, - "CVE-2023-47233": { - "cmt_msg": "" + "CVE-2024-26675": { + "cmt_msg": "ppp_async: limit MRU to 64K" }, - "CVE-2024-23850": { - "cmt_msg": "btrfs: do not ASSERT() if the newly created subvolume already got read" + "CVE-2024-26672": { + "cmt_msg": "drm/amdgpu: Fix variable 'mca_funcs' dereferenced before NULL check in 'amdgpu_mca_smu_get_mca_entry()'" }, - "CVE-2020-27815": { - "cmt_msg": "jfs: Fix array index bounds check in dbAdjTree" + "CVE-2023-52527": { + "cmt_msg": "ipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data()" }, - "CVE-2023-3610": { - "cmt_msg": "netfilter: nf_tables: fix chain binding transaction logic" + "CVE-2020-26145": { + "cmt_msg": "ath10k: drop fragments with multicast DA for PCIe" }, - "CVE-2022-1462": { - "cmt_msg": "tty: use new tty_insert_flip_string_and_push_buffer() in pty_write()" + "CVE-2023-52522": { + "cmt_msg": "net: fix possible store tearing in neigh_periodic_work()" }, - "CVE-2023-6606": { - "cmt_msg": "smb: client: fix OOB in smbCalcSize()" + "CVE-2024-26784": { + "cmt_msg": "pmdomain: arm: Fix NULL dereference on scmi_perf_domain removal" }, - "CVE-2022-1729": { - "cmt_msg": "perf: Fix sys_perf_event_open() race against self" + "CVE-2024-26789": { + "cmt_msg": "crypto: arm64/neonbs - fix out-of-bounds access on short input" }, - "CVE-2022-3112": { - "cmt_msg": "media: meson: vdec: potential dereference of null pointer" + "CVE-2023-52528": { + "cmt_msg": "net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg" }, - "CVE-2023-52439": { - "cmt_msg": "uio: Fix use-after-free in uio_open" + "CVE-2019-2181": { + "cmt_msg": "binder: check for overflow when alloc for security context" }, - "CVE-2023-52438": { - "cmt_msg": "binder: fix use-after-free in shinker's callback" + "CVE-2020-27820": { + "cmt_msg": "drm/nouveau: use drm_dev_unplug() during device removal" }, - "CVE-2023-3776": { - "cmt_msg": "net/sched: cls_fw: Fix improper refcount update leads to use-after-free" + "CVE-2023-39194": { + "cmt_msg": "net: xfrm: Fix xfrm_address_filter OOB read" }, - "CVE-2021-28038": { - "cmt_msg": "Xen/gnttab: handle p2m update errors on a per-slot basis" + "CVE-2020-0067": { + "cmt_msg": "f2fs: fix to avoid memory leakage in f2fs_listxattr" }, - "CVE-2021-28039": { - "cmt_msg": "xen: fix p2m size in dom0 for disabled memory hotplug case" + "CVE-2023-52599": { + "cmt_msg": "jfs: fix array-index-out-of-bounds in diNewExt" }, - "CVE-2022-3111": { - "cmt_msg": "power: supply: wm8350-power: Add missing free in free_charger_irq" + "CVE-2024-26774": { + "cmt_msg": "ext4: avoid dividing by 0 in mb_update_avg_fragment_size() when block bitmap corrupt" }, - "CVE-2023-52435": { - "cmt_msg": "net: prevent mss overflow in skb_segment()" + "CVE-2023-39193": { + "cmt_msg": "netfilter: xt_sctp: validate the flag_info count" }, - "CVE-2023-52434": { - "cmt_msg": "smb: client: fix potential OOBs in smb2_parse_contexts()" + "CVE-2023-39192": { + "cmt_msg": "netfilter: xt_u32: validate user space input" }, - "CVE-2021-31829": { - "cmt_msg": "bpf: Fix masking negation logic upon negative dst register" + "CVE-2020-26541": { + "cmt_msg": "certs: Add EFI_CERT_X509_GUID support for dbx entries" + }, + "CVE-2023-6610": { + "cmt_msg": "smb: client: fix potential OOB in smb2_dump_detail()" }, - "CVE-2023-52436": { - "cmt_msg": "f2fs: explicitly null-terminate the xattr list" + "CVE-2024-26600": { + "cmt_msg": "phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP" }, - "CVE-2022-2964": { - "cmt_msg": "net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup" + "CVE-2023-3390": { + "cmt_msg": "netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE" }, - "CVE-2021-3501": { - "cmt_msg": "KVM: VMX: Don't use vcpu->run->internal.ndata as an array index" + "CVE-2024-26606": { + "cmt_msg": "binder: signal epoll threads of self-work" }, - "CVE-2022-2961": { - "cmt_msg": "" + "CVE-2024-26768": { + "cmt_msg": "LoongArch: Change acpi_core_pic[NR_CPUS] to acpi_core_pic[MAX_CORE_PIC]" }, - "CVE-2021-3506": { - "cmt_msg": "f2fs: fix to avoid out-of-bounds memory access" + "CVE-2021-33061": { + "cmt_msg": "ixgbe: add improvement for MDD response functionality" }, - "CVE-2023-51779": { - "cmt_msg": "Bluetooth: af_bluetooth: Fix Use-After-Free in bt_sock_recvmsg" + "CVE-2024-26764": { + "cmt_msg": "fs/aio: Restrict kiocb_set_cancel_fn() to I/O submitted via libaio" }, - "CVE-2023-3268": { - "cmt_msg": "relayfs: fix out-of-bounds access in relay_file_read" + "CVE-2024-26767": { + "cmt_msg": "drm/amd/display: fixed integer types and null check locations" }, - "CVE-2022-40133": { - "cmt_msg": "drm/vmwgfx: Remove rcu locks from user resources" + "CVE-2024-26766": { + "cmt_msg": "IB/hfi1: Fix sdma.h tx->num_descs off-by-one error" }, - "CVE-2023-6915": { - "cmt_msg": "ida: Fix crash in ida_free when the bitmap is empty" + "CVE-2024-26763": { + "cmt_msg": "dm-crypt: don't modify the data when using authenticated encryption" }, - "CVE-2010-4563": { + "CVE-2023-1476": { "cmt_msg": "" }, - "CVE-2023-1249": { - "cmt_msg": "coredump: Use the vma snapshot in fill_files_note" + "CVE-2020-27835": { + "cmt_msg": "IB/hfi1: Ensure correct mm is used at all times" }, - "CVE-2022-39190": { - "cmt_msg": "netfilter: nf_tables: disallow binding to already bound chain" + "CVE-2021-3864": { + "cmt_msg": "" }, - "CVE-2023-2162": { - "cmt_msg": "scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress" + "CVE-2024-26770": { + "cmt_msg": "HID: nvidia-shield: Add missing null pointer checks to LED initialization" }, - "CVE-2023-45871": { - "cmt_msg": "igb: set max size RX buffer when store bad packet is enabled" + "CVE-2023-4623": { + "cmt_msg": "net/sched: sch_hfsc: Ensure inner classes have fsc curve" }, - "CVE-2024-23851": { - "cmt_msg": "dm: limit the number of targets and parameter size area" + "CVE-2023-1670": { + "cmt_msg": "xirc2ps_cs: Fix use after free bug in xirc2ps_detach" }, - "CVE-2023-0266": { - "cmt_msg": "ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF" + "CVE-2023-51043": { + "cmt_msg": "drm/atomic: Fix potential use-after-free in nonblocking commits" }, - "CVE-2023-1838": { - "cmt_msg": "Fix double fget() in vhost_net_set_backend()" + "CVE-2024-23848": { + "cmt_msg": "" }, - "CVE-2021-3483": { - "cmt_msg": "firewire: nosy: Fix a use-after-free bug in nosy_ioctl()" + "CVE-2019-9453": { + "cmt_msg": "f2fs: fix to avoid accessing xattr across the boundary" }, - "CVE-2021-3489": { - "cmt_msg": "bpf, ringbuf: Deny reserve of buffers larger than ringbuf" + "CVE-2023-20569": { + "cmt_msg": "x86/bugs: Increase the x86 bugs vector size to two u32s" }, - "CVE-2021-38300": { - "cmt_msg": "bpf, mips: Validate conditional branch offsets" + "CVE-2022-20424": { + "cmt_msg": "io_uring: remove io_identity" }, - "CVE-2022-24448": { - "cmt_msg": "NFSv4: Handle case where the lookup of a directory fails" + "CVE-2016-8660": { + "cmt_msg": "" }, - "CVE-2024-26598": { - "cmt_msg": "KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache" + "CVE-2023-6270": { + "cmt_msg": "aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts" }, - "CVE-2021-4023": { - "cmt_msg": "io-wq: fix cancellation on create-worker failure" + "CVE-2023-3090": { + "cmt_msg": "ipvlan:Fix out-of-bounds caused by unclear skb->cb" }, - "CVE-2021-22555": { - "cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write" + "CVE-2022-20422": { + "cmt_msg": "arm64: fix oops in concurrently setting insn_emulation sysctls" }, - "CVE-2020-36694": { - "cmt_msg": "netfilter: x_tables: Switch synchronization to RCU" + "CVE-2023-45862": { + "cmt_msg": "USB: ene_usb6250: Allocate enough memory for full object" }, - "CVE-2021-0399": { - "cmt_msg": "" + "CVE-2023-45863": { + "cmt_msg": "kobject: Fix slab-out-of-bounds in fill_kobj_path()" }, - "CVE-2023-42755": { - "cmt_msg": "net/sched: Retire rsvp classifier" + "CVE-2023-1582": { + "cmt_msg": "fs/proc: task_mmu.c: don't read mapcount for migration entry" }, - "CVE-2020-36516": { - "cmt_msg": "ipv4: avoid using shared IP generator for connected sockets" + "CVE-2022-1786": { + "cmt_msg": "io_uring: remove io_identity" }, - "CVE-2012-4542": { + "CVE-2008-4609": { "cmt_msg": "" }, - "CVE-2023-42753": { - "cmt_msg": "netfilter: ipset: add the missing IP_SET_HASH_WITH_NET0 macro for ip_set_hash_netportnet.c" + "CVE-2018-25020": { + "cmt_msg": "bpf: fix truncated jump targets on heavy expansions" }, - "CVE-2023-42752": { - "cmt_msg": "igmp: limit igmpv3_newpack() packet size to IP_MAX_MTU" + "CVE-2023-52639": { + "cmt_msg": "KVM: s390: vsie: fix race during shadow creation" }, - "CVE-2023-4128": { - "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free" + "CVE-2018-20855": { + "cmt_msg": "IB/mlx5: Fix leaking stack memory to userspace" }, - "CVE-2022-44034": { - "cmt_msg": "char: pcmcia: remove all the drivers" + "CVE-2023-52635": { + "cmt_msg": "PM / devfreq: Synchronize devfreq_monitor_[start/stop]" }, - "CVE-2023-4244": { - "cmt_msg": "netfilter: nf_tables: fix GC transaction races with netns and netlink event exit path" + "CVE-2023-52469": { + "cmt_msg": "drivers/amd/pm: fix a use-after-free in kv_parse_power_table" }, - "CVE-2021-46283": { - "cmt_msg": "netfilter: nf_tables: initialize set before expression setup" + "CVE-2023-52633": { + "cmt_msg": "um: time-travel: fix time corruption" }, - "CVE-2023-3609": { - "cmt_msg": "net/sched: cls_u32: Fix reference counter leak leading to overflow" + "CVE-2023-52632": { + "cmt_msg": "drm/amdkfd: Fix lock dependency warning with srcu" }, - "CVE-2022-1974": { - "cmt_msg": "nfc: replace improper check device_is_registered() in netlink related functions" + "CVE-2021-4037": { + "cmt_msg": "xfs: fix up non-directory creation in SGID directories" }, - "CVE-2022-1975": { - "cmt_msg": "NFC: netlink: fix sleep in atomic bug when firmware download timeout" + "CVE-2019-1999": { + "cmt_msg": "binder: fix race between munmap() and direct reclaim" }, - "CVE-2022-1972": { - "cmt_msg": "netfilter: nf_tables: sanitize nft_set_desc_concat_parse()" + "CVE-2023-20941": { + "cmt_msg": "" }, - "CVE-2021-31916": { - "cmt_msg": "dm ioctl: fix out of bounds array access when no devices" + "CVE-2019-7308": { + "cmt_msg": "bpf: fix sanitation of alu op with pointer / scalar type from different paths" }, - "CVE-2022-32981": { - "cmt_msg": "powerpc/32: Fix overread/overwrite of thread_struct via ptrace" + "CVE-2023-3776": { + "cmt_msg": "net/sched: cls_fw: Fix improper refcount update leads to use-after-free" }, - "CVE-2022-3424": { - "cmt_msg": "misc: sgi-gru: fix use-after-free error in gru_set_context_option, gru_fault and gru_handle_user_call_os" + "CVE-2017-9986": { + "cmt_msg": "sound: Retire OSS" }, - "CVE-2023-2269": { - "cmt_msg": "dm ioctl: fix nested locking in table_clear() to remove deadlock concern" + "CVE-2023-3772": { + "cmt_msg": "xfrm: add NULL check in xfrm_update_ae_params" }, - "CVE-2023-0394": { - "cmt_msg": "ipv6: raw: Deduct extension header length in rawv6_push_pending_frames" + "CVE-2022-3533": { + "cmt_msg": "" }, - "CVE-2022-3108": { - "cmt_msg": "drm/amdkfd: Check for null pointer after calling kmemdup" + "CVE-2022-3534": { + "cmt_msg": "libbpf: Fix use-after-free in btf_dump_name_dups" }, - "CVE-2022-36402": { - "cmt_msg": "drm/vmwgfx: Fix shader stage validation" + "CVE-2021-47135": { + "cmt_msg": "mt76: mt7921: fix possible AOOB issue in mt7921_mcu_tx_rate_report" }, - "CVE-2021-4157": { - "cmt_msg": "pNFS/flexfiles: fix incorrect size check in decode_nfs_fh()" + "CVE-2021-47136": { + "cmt_msg": "net: zero-initialize tc skb extension on allocation" }, - "CVE-2022-25258": { - "cmt_msg": "USB: gadget: validate interface OS descriptor requests" + "CVE-2021-47137": { + "cmt_msg": "net: lantiq: fix memory corruption in RX ring" }, - "CVE-2021-4155": { - "cmt_msg": "xfs: map unwritten blocks in XFS_IOC_{ALLOC,FREE}SP just like fallocate" + "CVE-2021-47131": { + "cmt_msg": "net/tls: Fix use-after-free after the TLS device goes down and up" }, - "CVE-2022-3521": { - "cmt_msg": "kcm: avoid potential race in kcm_tx_work" + "CVE-2021-47133": { + "cmt_msg": "HID: amd_sfh: Fix memory leak in amd_sfh_work" }, - "CVE-2021-4150": { - "cmt_msg": "block: fix incorrect references to disk objects" + "CVE-2022-3061": { + "cmt_msg": "video: fbdev: i740fb: Error out if 'pixclock' equals zero" }, - "CVE-2020-3702": { - "cmt_msg": "ath: Use safer key clearing with key cache entries" + "CVE-2021-46992": { + "cmt_msg": "netfilter: nftables: avoid overflows in nft_hash_buckets()" }, - "CVE-2021-28952": { - "cmt_msg": "ASoC: qcom: sdm845: Fix array out of bounds access" + "CVE-2023-6121": { + "cmt_msg": "nvmet: nul-terminate the NQNs passed in the connect command" }, - "CVE-2021-3655": { - "cmt_msg": "sctp: validate from_addr_param return" + "CVE-2023-52638": { + "cmt_msg": "can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock" }, - "CVE-2021-3656": { - "cmt_msg": "KVM: nSVM: always intercept VMLOAD/VMSAVE when nested (CVE-2021-3656)" + "CVE-2017-13693": { + "cmt_msg": "" }, - "CVE-2023-0461": { - "cmt_msg": "net/ulp: prevent ULP without clone op from entering the LISTEN status" + "CVE-2017-13694": { + "cmt_msg": "" }, - "CVE-2021-29154": { - "cmt_msg": "bpf, x86: Validate computation of branch displacements for x86-64" + "CVE-2022-21385": { + "cmt_msg": "net/rds: fix warn in rds_message_alloc_sgs" }, - "CVE-2021-29155": { - "cmt_msg": "bpf: Use correct permission flag for mixed signed bounds arithmetic" + "CVE-2022-48627": { + "cmt_msg": "vt: fix memory overlapping when deleting chars in the buffer" }, - "CVE-2021-3714": { + "CVE-2022-48628": { + "cmt_msg": "ceph: drop messages from MDS when unmounting" + }, + "CVE-2024-24859": { "cmt_msg": "" }, - "CVE-2021-3896": { - "cmt_msg": "isdn: cpai: check ctr->cnr to avoid array index out of bound" + "CVE-2024-24858": { + "cmt_msg": "" }, - "CVE-2021-3894": { - "cmt_msg": "sctp: account stream padding length for reconf chunk" + "CVE-2024-24855": { + "cmt_msg": "scsi: lpfc: Fix a possible data race in lpfc_unregister_fcf_rescan()" }, - "CVE-2021-3892": { + "CVE-2024-24857": { "cmt_msg": "" }, - "CVE-2023-20928": { - "cmt_msg": "android: binder: stop saving a pointer to the VMA" + "CVE-2023-0386": { + "cmt_msg": "ovl: fail on invalid uid/gid mapping at copy up" }, - "CVE-2021-39633": { - "cmt_msg": "ip_gre: add validation for csum_start" + "CVE-2022-3545": { + "cmt_msg": "nfp: fix use-after-free in area_cache_get()" }, - "CVE-2022-27223": { - "cmt_msg": "USB: gadget: validate endpoint index for xilinx udc" + "CVE-2023-52569": { + "cmt_msg": "btrfs: remove BUG() after failure to insert delayed dir index item" }, - "CVE-2023-35788": { - "cmt_msg": "net/sched: flower: fix possible OOB write in fl_set_geneve_opt()" + "CVE-2023-52568": { + "cmt_msg": "x86/sgx: Resolves SECS reclaim vs. page fault for EAUG race" }, - "CVE-2022-2639": { - "cmt_msg": "openvswitch: fix OOB access in reserve_sfa_size()" + "CVE-2023-52563": { + "cmt_msg": "drm/meson: fix memory leak on ->hpd_notify callback" }, - "CVE-2022-24958": { - "cmt_msg": "usb: gadget: don't release an existing dev->buf" + "CVE-2019-16921": { + "cmt_msg": "RDMA/hns: Fix init resp when alloc ucontext" }, - "CVE-2022-24959": { - "cmt_msg": "yam: fix a memory leak in yam_siocdevprivate()" + "CVE-2023-52561": { + "cmt_msg": "arm64: dts: qcom: sdm845-db845c: Mark cont splash memory region as reserved" }, - "CVE-2022-25375": { - "cmt_msg": "usb: gadget: rndis: check size of RNDIS_MSG_SET command" + "CVE-2023-52566": { + "cmt_msg": "nilfs2: fix potential use after free in nilfs_gccache_submit_read_data()" }, - "CVE-2022-33742": { - "cmt_msg": "xen/blkfront: force data bouncing when backend is untrusted" + "CVE-2023-52565": { + "cmt_msg": "media: uvcvideo: Fix OOB read" }, - "CVE-2022-33741": { - "cmt_msg": "xen/netfront: force data bouncing when backend is untrusted" + "CVE-2023-1838": { + "cmt_msg": "Fix double fget() in vhost_net_set_backend()" }, - "CVE-2022-33740": { - "cmt_msg": "xen/netfront: fix leaking data in shared pages" + "CVE-2023-1382": { + "cmt_msg": "tipc: set con sock in tipc_conn_alloc" }, - "CVE-2024-24864": { - "cmt_msg": "" + "CVE-2023-1380": { + "cmt_msg": "wifi: brcmfmac: slab-out-of-bounds read in brcmf_get_assoc_ies()" }, - "CVE-2022-33744": { - "cmt_msg": "xen/arm: Fix race in RB-tree based P2M accounting" + "CVE-2021-46924": { + "cmt_msg": "NFC: st21nfca: Fix memory leak in device probe and remove" }, - "CVE-2023-52443": { - "cmt_msg": "apparmor: avoid crash when parsed profile name is empty" + "CVE-2021-46926": { + "cmt_msg": "ALSA: hda: intel-sdw-acpi: harden detection of controller" }, - "CVE-2022-2327": { - "cmt_msg": "io_uring: remove any grabbing of context" + "CVE-2020-0347": { + "cmt_msg": "" }, - "CVE-2021-45486": { - "cmt_msg": "inet: use bigger hash table for IP ID generation" + "CVE-2022-41222": { + "cmt_msg": "mm/mremap: hold the rmap lock in write mode when moving page table entries." }, - "CVE-2023-2194": { - "cmt_msg": "i2c: xgene-slimpro: Fix out-of-bounds bug in xgene_slimpro_i2c_xfer()" + "CVE-2019-12455": { + "cmt_msg": "clk-sunxi: fix a missing-check bug in sunxi_divs_clk_setup()" }, - "CVE-2023-52445": { - "cmt_msg": "media: pvrusb2: fix use after free on context disconnection" + "CVE-2019-12456": { + "cmt_msg": "" }, - "CVE-2022-41218": { - "cmt_msg": "media: dvb-core: Fix UAF due to refcount races at releasing" + "CVE-2024-26720": { + "cmt_msg": "mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again" }, - "CVE-2022-36946": { - "cmt_msg": "netfilter: nf_queue: do not allow packet truncation below transport header offset" + "CVE-2021-33655": { + "cmt_msg": "fbcon: Disallow setting font bigger than screen size" }, - "CVE-2022-23222": { - "cmt_msg": "bpf: Replace PTR_TO_XXX_OR_NULL with PTR_TO_XXX | PTR_MAYBE_NULL" + "CVE-2024-26726": { + "cmt_msg": "btrfs: don't drop extent_map for free space inode on write error" }, - "CVE-2022-21166": { - "cmt_msg": "x86/speculation/mmio: Enable CPU Fill buffer clearing on idle" + "CVE-2023-1206": { + "cmt_msg": "tcp: Reduce chance of collisions in inet6_hashfn()." }, - "CVE-2024-0841": { + "CVE-2023-2985": { + "cmt_msg": "fs: hfsplus: fix UAF issue in hfsplus_put_super" + }, + "CVE-2021-45469": { + "cmt_msg": "f2fs: fix to do sanity check on last xattr entry in __f2fs_setxattr()" + }, + "CVE-2022-3642": { "cmt_msg": "" }, - "CVE-2021-29650": { - "cmt_msg": "netfilter: x_tables: Use correct memory barriers." + "CVE-2024-0584": { + "cmt_msg": "ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet" }, - "CVE-2023-34255": { - "cmt_msg": "xfs: verify buffer contents when we skip log replay" + "CVE-2023-52519": { + "cmt_msg": "HID: intel-ish-hid: ipc: Disable and reenable ACPI GPE bit" }, - "CVE-2022-41849": { - "cmt_msg": "fbdev: smscufx: Fix use-after-free in ufx_ops_open()" + "CVE-2023-52516": { + "cmt_msg": "dma-debug: don't call __dma_entry_alloc_check_leak() under free_entries_lock" }, - "CVE-2022-41848": { + "CVE-2021-4218": { + "cmt_msg": "sysctl: pass kernel pointers to ->proc_handler" + }, + "CVE-2023-52515": { + "cmt_msg": "RDMA/srp: Do not call scsi_done() from srp_abort()" + }, + "CVE-2024-25739": { "cmt_msg": "" }, - "CVE-2022-1353": { - "cmt_msg": "af_key: add __GFP_ZERO flag for compose_sadb_supported in function pfkey_register" + "CVE-2023-3358": { + "cmt_msg": "HID: intel_ish-hid: Add check for ishtp_dma_tx_map" }, - "CVE-2022-28356": { - "cmt_msg": "llc: fix netdevice reference leaks in llc_ui_bind()" + "CVE-2024-0340": { + "cmt_msg": "vhost: use kzalloc() instead of kmalloc() followed by memset()" }, - "CVE-2020-16119": { - "cmt_msg": "dccp: don't duplicate ccid when cloning dccp sock" + "CVE-2023-6535": { + "cmt_msg": "" }, - "CVE-2022-1198": { - "cmt_msg": "drivers: hamradio: 6pack: fix UAF bug caused by mod_timer()" + "CVE-2023-6536": { + "cmt_msg": "nvmet-tcp: fix a crash in nvmet_req_complete()" }, - "CVE-2022-1199": { - "cmt_msg": "ax25: Fix NULL pointer dereference in ax25_kill_by_device" + "CVE-2020-15780": { + "cmt_msg": "ACPI: configfs: Disallow loading ACPI tables when locked down" }, - "CVE-2023-6546": { - "cmt_msg": "tty: n_gsm: fix the UAF caused by race condition in gsm_cleanup_mux" + "CVE-2024-26704": { + "cmt_msg": "ext4: fix double-free of blocks due to wrong extents moved_len" }, - "CVE-2021-39801": { + "CVE-2018-17977": { "cmt_msg": "" }, - "CVE-2021-39800": { + "CVE-2024-26659": { + "cmt_msg": "xhci: handle isoc Babble and Buffer Overrun events properly" + }, + "CVE-2024-26658": { + "cmt_msg": "bcachefs: grab s_umount only if snapshotting" + }, + "CVE-2010-5321": { "cmt_msg": "" }, - "CVE-2021-28375": { - "cmt_msg": "misc: fastrpc: restrict user apps from sending kernel RPC messages" + "CVE-2024-26655": { + "cmt_msg": "Fix memory leak in posix_clock_open()" }, - "CVE-2022-1195": { - "cmt_msg": "hamradio: improve the incomplete fix to avoid NPD" + "CVE-2024-26654": { + "cmt_msg": "ALSA: sh: aica: reorder cleanup operations to avoid UAF bugs" }, - "CVE-2021-26708": { - "cmt_msg": "vsock: fix the race conditions in multi-transport support" + "CVE-2024-26656": { + "cmt_msg": "drm/amdgpu: fix use-after-free bug" }, - "CVE-2021-4202": { - "cmt_msg": "NFC: reorganize the functions in nci_request" + "CVE-2024-26651": { + "cmt_msg": "sr9800: Add check for usbnet_get_endpoints" }, - "CVE-2021-4203": { - "cmt_msg": "af_unix: fix races in sk_peer_pid and sk_peer_cred accesses" + "CVE-2024-26650": { + "cmt_msg": "platform/x86: p2sb: Allow p2sb_bar() calls during PCI device probe" }, - "CVE-2022-45887": { - "cmt_msg": "media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb()" + "CVE-2017-5967": { + "cmt_msg": "time: Remove CONFIG_TIMER_STATS" }, - "CVE-2022-45886": { - "cmt_msg": "media: dvb-core: Fix use-after-free due on race condition at dvb_net" + "CVE-2022-3169": { + "cmt_msg": "nvme: ensure subsystem reset is single threaded" }, - "CVE-2023-46343": { - "cmt_msg": "nfc: nci: fix possible NULL pointer dereference in send_acknowledge()" + "CVE-2022-1048": { + "cmt_msg": "ALSA: pcm: Fix races among concurrent hw_params and hw_free calls" }, - "CVE-2021-4204": { - "cmt_msg": "bpf: Generalize check_ctx_reg for reuse with other types" + "CVE-2023-52475": { + "cmt_msg": "Input: powermate - fix use-after-free in powermate_config_complete" }, - "CVE-2023-2124": { - "cmt_msg": "xfs: verify buffer contents when we skip log replay" + "CVE-2023-52477": { + "cmt_msg": "usb: hub: Guard against accesses to uninitialized BOS descriptors" }, - "CVE-2023-1281": { - "cmt_msg": "net/sched: tcindex: update imperfect hash filters respecting rcu" + "CVE-2023-52476": { + "cmt_msg": "perf/x86/lbr: Filter vsyscall addresses" }, - "CVE-2023-2860": { - "cmt_msg": "ipv6: sr: fix out-of-bounds read when setting HMAC data." + "CVE-2023-22995": { + "cmt_msg": "usb: dwc3: dwc3-qcom: Add missing platform_device_put() in dwc3_qcom_acpi_register_core" }, - "CVE-2021-44879": { - "cmt_msg": "f2fs: fix to do sanity check on inode type during garbage collection" + "CVE-2023-52470": { + "cmt_msg": "drm/radeon: check the alloc_workqueue return value in radeon_crtc_init()" }, - "CVE-2023-1859": { - "cmt_msg": "9p/xen : Fix use after free bug in xen_9pfs_front_remove due to race condition" + "CVE-2024-21803": { + "cmt_msg": "" }, - "CVE-2023-2513": { - "cmt_msg": "ext4: fix use-after-free in ext4_xattr_set_entry" + "CVE-2023-52479": { + "cmt_msg": "ksmbd: fix uaf in smb20_oplock_break_ack" }, - "CVE-2022-1516": { - "cmt_msg": "net/x25: Fix null-ptr-deref caused by x25_disconnect" + "CVE-2023-52478": { + "cmt_msg": "HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect" }, - "CVE-2023-1855": { - "cmt_msg": "hwmon: (xgene) Fix use after free bug in xgene_hwmon_remove due to race condition" + "CVE-2021-3542": { + "cmt_msg": "" }, - "CVE-2022-27672": { - "cmt_msg": "x86/speculation: Identify processors vulnerable to SMT RSB predictions" + "CVE-2022-1263": { + "cmt_msg": "KVM: avoid NULL pointer dereference in kvm_dirty_ring_push" }, - "CVE-2020-25220": { + "CVE-2020-12656": { + "cmt_msg": "sunrpc: check that domain table is empty at module unload." + }, + "CVE-2023-34256": { + "cmt_msg": "ext4: avoid a potential slab-out-of-bounds in ext4_group_desc_csum" + }, + "CVE-2018-12929": { "cmt_msg": "" }, - "CVE-2015-2877": { + "CVE-2019-12380": { + "cmt_msg": "efi/x86/Add missing error handling to old_memmap 1:1 mapping code" + }, + "CVE-2020-36310": { + "cmt_msg": "KVM: SVM: avoid infinite loop on NPF from bad address" + }, + "CVE-2020-36313": { + "cmt_msg": "KVM: Fix out of range accesses to memslots" + }, + "CVE-2024-26778": { + "cmt_msg": "fbdev: savage: Error out if pixclock equals zero" + }, + "CVE-2024-25740": { "cmt_msg": "" }, - "CVE-2023-26242": { + "CVE-2020-10708": { "cmt_msg": "" }, - "CVE-2019-16089": { + "CVE-2022-0400": { "cmt_msg": "" }, - "CVE-2021-38198": { - "cmt_msg": "KVM: X86: MMU: Use the correct inherited permissions to get shadow page" + "CVE-2024-25741": { + "cmt_msg": "" }, - "CVE-2021-38199": { - "cmt_msg": "NFSv4: Initialise connection to the server in nfs4_alloc_client()" + "CVE-2024-26808": { + "cmt_msg": "netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain" }, - "CVE-2022-1679": { - "cmt_msg": "ath9k: fix use-after-free in ath9k_hif_usb_rx_cb" + "CVE-2024-26809": { + "cmt_msg": "netfilter: nft_set_pipapo: release elements in clone only from destroy path" }, - "CVE-2023-1513": { - "cmt_msg": "kvm: initialize all of the kvm_debugregs structure before sending it to userspace" + "CVE-2024-26804": { + "cmt_msg": "net: ip_tunnel: prevent perpetual headroom growth" }, - "CVE-2021-26401": { - "cmt_msg": "x86/speculation: Use generic retpoline by default on AMD" + "CVE-2023-1989": { + "cmt_msg": "Bluetooth: btsdio: fix use after free bug in btsdio_remove due to unfinished work" }, - "CVE-2021-3847": { - "cmt_msg": "" + "CVE-2024-26806": { + "cmt_msg": "spi: cadence-qspi: remove system-wide suspend helper calls from runtime PM hooks" }, - "CVE-2023-52442": { - "cmt_msg": "ksmbd: validate session id and tree id in compound request" + "CVE-2024-26801": { + "cmt_msg": "Bluetooth: Avoid potential use-after-free in hci_error_reset" }, - "CVE-2022-40768": { - "cmt_msg": "scsi: stex: Properly zero out the passthrough command structure" + "CVE-2024-26802": { + "cmt_msg": "stmmac: Clear variable when destroying workqueue" }, - "CVE-2022-1280": { - "cmt_msg": "drm: avoid circular locks in drm_mode_getconnector" + "CVE-2023-52508": { + "cmt_msg": "nvme-fc: Prevent null pointer dereference in nvme_fc_io_getuuid()" }, - "CVE-2021-3923": { - "cmt_msg": "RDMA/core: Don't infoleak GRH fields" + "CVE-2023-52606": { + "cmt_msg": "powerpc/lib: Validate size for vector operations" }, - "CVE-2011-4917": { - "cmt_msg": "" + "CVE-2022-20369": { + "cmt_msg": "media: v4l2-mem2mem: Apply DST_QUEUE_OFF_BASE on MMAP buffers across ioctls" }, - "CVE-2021-45485": { - "cmt_msg": "ipv6: use prandom_u32() for ID generation" + "CVE-2023-52604": { + "cmt_msg": "FS:JFS:UBSAN:array-index-out-of-bounds in dbAdjTree" }, - "CVE-2023-52448": { - "cmt_msg": "gfs2: Fix kernel NULL pointer dereference in gfs2_rgrp_dump" + "CVE-2023-52602": { + "cmt_msg": "jfs: fix slab-out-of-bounds Read in dtSearch" }, - "CVE-2023-52449": { - "cmt_msg": "mtd: Fix gluebi NULL pointer dereference caused by ftl notifier" + "CVE-2023-52603": { + "cmt_msg": "UBSAN: array-index-out-of-bounds in dtSplitRoot" }, - "CVE-2023-23039": { + "CVE-2022-25265": { "cmt_msg": "" }, - "CVE-2024-1312": { - "cmt_msg": "mm: lock_vma_under_rcu() must check vma->anon_vma under vma lock" + "CVE-2023-52601": { + "cmt_msg": "jfs: fix array-index-out-of-bounds in dbAdjTree" }, - "CVE-2023-3338": { - "cmt_msg": "Remove DECnet support from kernel" - } - } - }, - "4.9": { - "4.9": { - "CVE-2016-9576": { - "cmt_msg": "Don't feed anything but regular iovec's to blk_rq_map_user_iov", - "cmt_id": "a0ac402cfcdc904f9772e1762b3fda112dcc56a0" + "CVE-2023-52609": { + "cmt_msg": "binder: fix race between mmput() and do_exit()" }, - "CVE-2016-10147": { - "cmt_msg": "crypto: mcryptd - Check mcryptd algorithm compatibility", - "cmt_id": "48a992727d82cb7db076fa15d372178743b1f4cd" + "CVE-2022-21499": { + "cmt_msg": "lockdown: also lock down previous kgdb use" }, - "CVE-2016-8399": { - "cmt_msg": "net: ping: check minimum size on ICMP header length", - "cmt_id": "0eab121ef8750a5c8637d51534d5e9143fb0633f" - } - }, - "4.9.1": { - "CVE-2016-10154": { - "cmt_msg": "cifs: Fix smbencrypt() to stop pointing a scatterlist at the stack", - "cmt_id": "7aa58e7ad53bd9536aa49a18ccd0778c728bf57d" + "CVE-2023-4208": { + "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free" }, - "CVE-2015-8709": { - "cmt_msg": "mm: Add a user_ns owner to mm_struct and fix ptrace permission checks", - "cmt_id": "694a95fa6dae4991f16cda333d897ea063021fed" - } - }, - "4.9.2": { - "CVE-2016-9588": { - "cmt_msg": "kvm: nVMX: Allow L1 to intercept software exceptions (#BP and #OF)", - "cmt_id": "3f618a0b872fea38c7d1d1f79eda40f88c6466c2" + "CVE-2023-4206": { + "cmt_msg": "net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free" }, - "CVE-2016-10088": { - "cmt_msg": "sg_write()/bsg_write() is not fit to be called under KERNEL_DS", - "cmt_id": "3f3a6bbe6f9f5e895d8945494173594ee51632da" - } - }, - "4.9.3": { - "CVE-2016-10741": { - "cmt_msg": "xfs: don't BUG() on mixed direct and mapped I/O", - "cmt_id": "3978c5bb004312fd267aed7279fe64b119e126b0" - } - }, - "4.9.4": { - "CVE-2017-7273": { - "cmt_msg": "HID: hid-cypress: validate length of report", - "cmt_id": "2c867216c555f5897b327daed6240bfb9e489c97" - } - }, - "4.9.5": { - "CVE-2016-9191": { - "cmt_msg": "sysctl: Drop reference added by grab_header in proc_sys_readdir", - "cmt_id": "00cf64fbaa1e99d0420f2934f301c671ba298342" + "CVE-2023-4207": { + "cmt_msg": "net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free" }, - "CVE-2017-5549": { - "cmt_msg": "USB: serial: kl5kusb105: fix line-state error handling", - "cmt_id": "58ede4beda662c4e1681fee4fae2174028a1a841" + "CVE-2023-3640": { + "cmt_msg": "" }, - "CVE-2017-5546": { - "cmt_msg": "mm/slab.c: fix SLAB freelist randomization duplicate entries", - "cmt_id": "8315c22ea879082bba365d46dd2cc7881fbfb49a" + "CVE-2023-20593": { + "cmt_msg": "x86/cpu/amd: Add a Zenbleed fix" }, - "CVE-2017-5550": { - "cmt_msg": "fix a fencepost error in pipe_advance()", - "cmt_id": "d06367ac1730ded79aa78307126236bf83af95a3" + "CVE-2023-3022": { + "cmt_msg": "ipv6: Use result arg in fib_lookup_arg consistently" }, - "CVE-2017-2583": { - "cmt_msg": "KVM: x86: fix emulation of \"MOV SS, null selector\"", - "cmt_id": "7718ffcf9a64830bbae148432f625346cde2f2d6" + "CVE-2023-52598": { + "cmt_msg": "s390/ptrace: handle setting of fpc register correctly" }, - "CVE-2017-2584": { - "cmt_msg": "KVM: x86: Introduce segmented_write_std", - "cmt_id": "736e77c07fba8b49cead504b885a82ce52c0ff10" - } - }, - "4.9.6": { - "CVE-2017-5547": { - "cmt_msg": "HID: corsair: fix DMA buffers on stack", - "cmt_id": "63df1ccb937f67fbefa0a77415b3a4d10434a09b" + "CVE-2021-47046": { + "cmt_msg": "drm/amd/display: Fix off by one in hdmi_14_process_transaction()" }, - "CVE-2017-5551": { - "cmt_msg": "tmpfs: clear S_ISGID when setting posix ACLs", - "cmt_id": "782b361c93062f083bbc9a78928498218f950399" + "CVE-2023-4010": { + "cmt_msg": "" }, - "CVE-2017-5548": { - "cmt_msg": "ieee802154: atusb: do not use the stack for buffers to make them DMA able", - "cmt_id": "86249aef233e6e05ba84f6c9aab9e6b890fc6ba7" + "CVE-2021-47167": { + "cmt_msg": "NFS: Fix an Oopsable condition in __nfs_pageio_add_request()" }, - "CVE-2016-10764": { - "cmt_msg": "mtd: spi-nor: Off by one in cqspi_setup_flash()", - "cmt_id": "e55e6c026b7c49c4dcc33f4ebc330e660ecf3963" + "CVE-2021-47165": { + "cmt_msg": "drm/meson: fix shutdown crash when component not probed" }, - "CVE-2016-10153": { - "cmt_msg": "libceph: introduce ceph_crypt() for in-place en/decryption", - "cmt_id": "ecf7ced8562811576cd02158d6ae8e44c1fb4671" - } - }, - "4.9.7": { - "CVE-2017-6001": { - "cmt_msg": "perf/core: Fix concurrent sys_perf_event_open() vs. 'move_group' race", - "cmt_id": "922813f4d66fb317e8602d058d03a1619af1ffd0" + "CVE-2021-47163": { + "cmt_msg": "tipc: wait and exit until all work queues are done" }, - "CVE-2017-5576": { - "cmt_msg": "drm/vc4: Fix an integer overflow in temporary allocation layout.", - "cmt_id": "b9edac54cb85da589ca809bf8dcf86e5cd3f41c0" + "CVE-2021-46969": { + "cmt_msg": "bus: mhi: core: Fix invalid error returning in mhi_queue" }, - "CVE-2017-5577": { - "cmt_msg": "drm/vc4: Return -EINVAL on the overflow checks failing.", - "cmt_id": "cfba2a001d0e36905016bb4f87fc47245c944c36" + "CVE-2021-47160": { + "cmt_msg": "net: dsa: mt7530: fix VLAN traffic leaks" }, - "CVE-2016-8405": { - "cmt_msg": "fbdev: color map copying bounds checking", - "cmt_id": "544160b6ea18670196d1173c099f2cced5075132" - } - }, - "4.9.9": { - "CVE-2016-10208": { - "cmt_msg": "ext4: validate s_first_meta_bg at mount time", - "cmt_id": "13e6ef99d23b05807e7f8a72f45e3d8260b61570" + "CVE-2021-46965": { + "cmt_msg": "mtd: physmap: physmap-bt1-rom: Fix unintentional stack access" }, - "CVE-2017-8071": { - "cmt_msg": "HID: cp2112: fix sleep-while-atomic", - "cmt_id": "a18c4584a48931e8048508469bcdb53c6082221a" + "CVE-2021-46962": { + "cmt_msg": "mmc: uniphier-sd: Fix a resource leak in the remove function" }, - "CVE-2017-8072": { - "cmt_msg": "HID: cp2112: fix gpio-callback error handling", - "cmt_id": "7396685a1bca323b96fd79b836ae22b7569d7068" - } - }, - "4.9.10": { - "CVE-2017-2618": { - "cmt_msg": "selinux: fix off-by-one in setprocattr", - "cmt_id": "6cbaf7b94373743deb42fd410173aab81f8945fe" + "CVE-2019-19378": { + "cmt_msg": "" }, - "CVE-2016-8636": { - "cmt_msg": "IB/rxe: Fix mem_check_range integer overflow", - "cmt_id": "b7dd5edc3dd9191f2cb1bd508279b0ff7274c5aa" - } - }, - "4.9.11": { - "CVE-2017-5897": { - "cmt_msg": "ip6_gre: fix ip6gre_err() invalid reads", - "cmt_id": "ae1768bbbc469b75662c6714957fe5886cc960c4" + "CVE-2019-19377": { + "cmt_msg": "btrfs: Don't submit any btree write bio if the fs has errors" }, - "CVE-2017-8069": { - "cmt_msg": "rtl8150: Use heap buffers for all register access", - "cmt_id": "e898f6f008aa91c154c9c8fb7be3fb9ec4d333ec" + "CVE-2021-3759": { + "cmt_msg": "memcg: enable accounting of ipc resources" }, - "CVE-2017-8068": { - "cmt_msg": "pegasus: Use heap buffers for all register access", - "cmt_id": "878b015bcc726560b13be2d906caf6923428f05d" + "CVE-2021-4197": { + "cmt_msg": "cgroup: Use open-time credentials for process migraton perm checks" }, - "CVE-2017-5970": { - "cmt_msg": "ipv4: keep skb->dst around in presence of IP options", - "cmt_id": "f5b54446630a973e1f27b68599366bbd0ac53066" + "CVE-2020-24503": { + "cmt_msg": "" }, - "CVE-2017-5986": { - "cmt_msg": "sctp: avoid BUG_ON on sctp_wait_for_sndbuf", - "cmt_id": "00eff2ebbd229758e90659907724c14dd5a18339" + "CVE-2020-24502": { + "cmt_msg": "" }, - "CVE-2017-8070": { - "cmt_msg": "catc: Use heap buffer for memory size test", - "cmt_id": "970390fd5d53de0817b538350131edd2514a8321" + "CVE-2019-19449": { + "cmt_msg": "f2fs: fix to do sanity check on segment/section count" }, - "CVE-2017-6214": { - "cmt_msg": "tcp: avoid infinite loop in tcp_splice_read()", - "cmt_id": "0f895f51a831d73ce24158534784aba5b2a72a9e" - } - }, - "4.9.13": { - "CVE-2017-6345": { - "cmt_msg": "net/llc: avoid BUG_ON() in skb_orphan()", - "cmt_id": "42b52783a59cc706c71cdc7096edce4a6f086fd3" + "CVE-2023-1118": { + "cmt_msg": "media: rc: Fix use-after-free bugs caused by ene_tx_irqsim()" }, - "CVE-2017-6346": { - "cmt_msg": "packet: fix races in fanout_add()", - "cmt_id": "722737f27774b14be5a1d2d3b9281dcded7c48b2" + "CVE-2020-11725": { + "cmt_msg": "" }, - "CVE-2017-6347": { - "cmt_msg": "ip: fix IP_CHECKSUM handling", - "cmt_id": "481aedf869fbf2d4503ca0005dbd68b78422955a" + "CVE-2023-7192": { + "cmt_msg": "netfilter: ctnetlink: fix possible refcount leak in ctnetlink_create_conntrack()" }, - "CVE-2017-6348": { - "cmt_msg": "irda: Fix lockdep annotations in hashbin_delete().", - "cmt_id": "c2219da51664451149350e47321aa0fcf72a8b8f" + "CVE-2023-30456": { + "cmt_msg": "KVM: nVMX: add missing consistency checks for CR0 and CR4" }, - "CVE-2017-6074": { - "cmt_msg": "dccp: fix freeing skb too early for IPV6_RECVPKTINFO", - "cmt_id": "171d92a9d915d238e05285ca67faf30f554d7df7" - } - }, - "4.9.14": { - "CVE-2017-8066": { - "cmt_msg": "can: gs_usb: Don't use stack memory for USB transfers", - "cmt_id": "cec7abd27e878e3c83dc9af41ee87a2e9d483ac0" + "CVE-2021-35477": { + "cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4" }, - "CVE-2017-5669": { - "cmt_msg": "ipc/shm: Fix shmat mmap nil-page protection", - "cmt_id": "270e84a1e6effd6c0c6e9b13b196b5fdaa392954" - } - }, - "4.9.15": { - "CVE-2017-2636": { - "cmt_msg": "tty: n_hdlc: get rid of racy n_hdlc.tbuf", - "cmt_id": "e5b9778761558ff3d239ed76925a1a7a734918ea" - } - }, - "4.9.16": { - "CVE-2017-8062": { - "cmt_msg": "dw2102: don't do DMA on stack", - "cmt_id": "06996254a605913cd7c1927d0e8a89b5138e110d" + "CVE-2023-31436": { + "cmt_msg": "net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg" }, - "CVE-2017-8924": { - "cmt_msg": "USB: serial: io_ti: fix information leak in completion handler", - "cmt_id": "d0ef6ecee85e17742d8bce1559872cb542d6ccac" + "CVE-2022-47929": { + "cmt_msg": "net: sched: disallow noqueue for qdisc classes" }, - "CVE-2016-2188": { - "cmt_msg": "USB: iowarrior: fix NULL-deref at probe", - "cmt_id": "653418adaf1026a10e0c2e4e29b7319610117b33" + "CVE-2022-3606": { + "cmt_msg": "" }, - "CVE-2017-6874": { - "cmt_msg": "ucount: Remove the atomicity from ucount->count", - "cmt_id": "ee6f7ee1e4cdb0098fee4593ddf11ca6028abef2" + "CVE-2022-2209": { + "cmt_msg": "" }, - "CVE-2017-8925": { - "cmt_msg": "USB: serial: omninet: fix reference leaks at open", - "cmt_id": "6d6c5895f45431579c20f4183b25183f0e3afc92" - } - }, - "4.9.20": { - "CVE-2017-7184": { - "cmt_msg": "xfrm_user: validate XFRM_MSG_NEWAE XFRMA_REPLAY_ESN_VAL replay_window", - "cmt_id": "64a5465799ee40e3d54d9da3037934cd4b7b502f" + "CVE-2024-26775": { + "cmt_msg": "aoe: avoid potential deadlock at set_capacity" }, - "CVE-2017-7374": { - "cmt_msg": "fscrypt: remove broken support for detecting keyring key revocation", - "cmt_id": "2984e52c75c657db7901f6189f02e0251ca963c2" - } - }, - "4.9.21": { - "CVE-2017-7187": { - "cmt_msg": "scsi: sg: check length passed to SG_NEXT_CMD_LEN", - "cmt_id": "c2a869527865c35b605877f966cb5d514fdc5fbb" - } - }, - "4.9.22": { - "CVE-2017-7261": { - "cmt_msg": "drm/vmwgfx: NULL pointer dereference in vmw_surface_define_ioctl()", - "cmt_id": "73ab72517b61ce4b27ceddec47dd5d6edafb556a" + "CVE-2023-7042": { + "cmt_msg": "wifi: ath10k: fix NULL pointer dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev()" }, - "CVE-2017-7616": { - "cmt_msg": "mm/mempolicy.c: fix error handling in set_mempolicy and mbind.", - "cmt_id": "cddab768d13469d1e254fb8c0e1629f93c8dfaca" + "CVE-2022-3595": { + "cmt_msg": "cifs: fix double-fault crash during ntlmssp" }, - "CVE-2017-7294": { - "cmt_msg": "drm/vmwgfx: fix integer overflow in vmw_surface_define_ioctl()", - "cmt_id": "4ddd24d54fedff301e8f020d7b9f70116383af31" - } - }, - "4.9.23": { - "CVE-2017-7308": { - "cmt_msg": "net/packet: fix overflow in check for priv area size", - "cmt_id": "16fc98c2479f5477f2df220acd9cb53686e33f4c" - } - }, - "4.9.24": { - "CVE-2017-6353": { - "cmt_msg": "sctp: deny peeloff operation on asocs with threads sleeping on it", - "cmt_id": "35b9d61ea910c1ebd4652b32cc7d713f6689b4f4" + "CVE-2023-52559": { + "cmt_msg": "iommu/vt-d: Avoid memory allocation in iommu_suspend()" }, - "CVE-2017-8063": { - "cmt_msg": "cxusb: Use a dma capable buffer also for reading", - "cmt_id": "fb00319317c152bf3528df13a54c28bf8c5daa55" + "CVE-2023-47233": { + "cmt_msg": "wifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach" }, - "CVE-2017-8061": { - "cmt_msg": "dvb-usb-firmware: don't do DMA on stack", - "cmt_id": "28d1e8b7ef81d254583f68627095f8a85e39597d" + "CVE-2024-23851": { + "cmt_msg": "dm: limit the number of targets and parameter size area" }, - "CVE-2017-8067": { - "cmt_msg": "virtio-console: avoid DMA from stack", - "cmt_id": "86c6667f6a5f6bdb392d8ffbe58fbcbcf6db2704" + "CVE-2024-26614": { + "cmt_msg": "tcp: make sure init the accept_queue's spinlocks once" }, - "CVE-2017-8064": { - "cmt_msg": "dvb-usb-v2: avoid use-after-free", - "cmt_id": "1992564156b5dc4ac73418e5b95e1a43f12f3cb1" + "CVE-2023-52629": { + "cmt_msg": "sh: push-switch: Reorder cleanup operations to avoid use-after-free bug" }, - "CVE-2017-7618": { - "cmt_msg": "crypto: ahash - Fix EINPROGRESS notification callback", - "cmt_id": "c10479591869177ae7ac0570b54ace6fbdeb57c2" + "CVE-2024-26772": { + "cmt_msg": "ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal()" }, - "CVE-2017-7889": { - "cmt_msg": "mm: Tighten x86 /dev/mem with zeroing reads", - "cmt_id": "2c0ad235ac77f2fc2eee593bf06822cad772e0e2" + "CVE-2024-26758": { + "cmt_msg": "md: Don't ignore suspended array in md_check_recovery()" }, - "CVE-2017-2596": { - "cmt_msg": "kvm: fix page struct leak in handle_vmon", - "cmt_id": "75465e71ec3139b958d06d48dfc85720aed69b6a" - } - }, - "4.9.25": { - "CVE-2017-7472": { - "cmt_msg": "KEYS: fix keyctl_set_reqkey_keyring() to not leak thread keyrings", - "cmt_id": "174a74dbca2ddc7269c265598399c000e5b9b870" + "CVE-2024-26759": { + "cmt_msg": "mm/swap: fix race when skipping swapcache" }, - "CVE-2016-9604": { - "cmt_msg": "KEYS: Disallow keyrings beginning with '.' to be joined as session keyrings", - "cmt_id": "a5c6e0a76817a3751f58d761aaff7c0b0c4001ff" - } - }, - "4.9.26": { - "CVE-2017-7477": { - "cmt_msg": "macsec: avoid heap overflow in skb_to_sgvec", - "cmt_id": "07389a140f48a3d5d223881bb01cef9f389e2844" + "CVE-2023-6606": { + "cmt_msg": "smb: client: fix OOB in smbCalcSize()" }, - "CVE-2017-7645": { - "cmt_msg": "nfsd: check for oversized NFSv2/v3 arguments", - "cmt_id": "fc6445df466f37291a70937642068bda78802a5b" + "CVE-2023-3006": { + "cmt_msg": "arm64: Add AMPERE1 to the Spectre-BHB affected list" }, - "CVE-2017-2671": { - "cmt_msg": "ping: implement proper locking", - "cmt_id": "e88a8e0a23c23e09858a4f5caeb106da972e7934" + "CVE-2020-27777": { + "cmt_msg": "powerpc/rtas: Restrict RTAS requests from userspace" }, - "CVE-2017-7895": { - "cmt_msg": "nfsd: stricter decoding of write-like NFSv2/v3 ops", - "cmt_id": "d7809b9e99bb75e83bdd13dc70ce27df61faf5de" - } - }, - "4.9.27": { - "CVE-2017-10661": { - "cmt_msg": "timerfd: Protect the might cancel mechanism proper", - "cmt_id": "00cca9768ebe1ac4ac16366662dd9087b6e5f4e7" - } - }, - "4.9.28": { - "CVE-2017-9150": { - "cmt_msg": "bpf: don't let ldimm64 leak map addresses on unprivileged", - "cmt_id": "ced0a31e667fbf618591f0a76a8213018407cde0" + "CVE-2024-26752": { + "cmt_msg": "l2tp: pass correct message length to ip6_append_data" }, - "CVE-2017-10662": { - "cmt_msg": "f2fs: sanity check segment count", - "cmt_id": "93862955cbf485215f0677229292d0f358af55fc" - } - }, - "4.9.30": { - "CVE-2017-18360": { - "cmt_msg": "USB: serial: io_ti: fix div-by-zero in set_termios", - "cmt_id": "f9cd79e0ad1fa620ff34715d24ae1b671c97bc91" + "CVE-2024-26754": { + "cmt_msg": "gtp: fix use-after-free and null-ptr-deref in gtp_genl_dump_pdp()" }, - "CVE-2017-7487": { - "cmt_msg": "ipx: call ipxitf_put() in ioctl error path", - "cmt_id": "820adccd0e3be9bdd2384ca8fc4712108cfdf28b" + "CVE-2024-26756": { + "cmt_msg": "md: Don't register sync_thread for reshape directly" }, - "CVE-2017-8797": { - "cmt_msg": "nfsd: fix undefined behavior in nfsd4_layout_verify", - "cmt_id": "ea465551af30146efea215da58786ff732da70fb" + "CVE-2024-26757": { + "cmt_msg": "md: Don't ignore read-only array in md_check_recovery()" }, - "CVE-2017-1000363": { - "cmt_msg": "char: lp: fix possible integer overflow in lp_setup()", - "cmt_id": "5d263d94a870a774a24acb2a2cc1e79ef39c2416" - } - }, - "4.9.31": { - "CVE-2017-9077": { - "cmt_msg": "ipv6/dccp: do not inherit ipv6_mc_list from parent", - "cmt_id": "4bd8f5e38e5a1612ce4373068b518b14d3e38ec8" + "CVE-2019-20908": { + "cmt_msg": "efi: Restrict efivar_ssdt_load when the kernel is locked down" }, - "CVE-2017-9076": { - "cmt_msg": "ipv6/dccp: do not inherit ipv6_mc_list from parent", - "cmt_id": "4bd8f5e38e5a1612ce4373068b518b14d3e38ec8" + "CVE-2023-52435": { + "cmt_msg": "net: prevent mss overflow in skb_segment()" }, - "CVE-2017-9075": { - "cmt_msg": "sctp: do not inherit ipv6_{mc|ac|fl}_list from parent", - "cmt_id": "5e7d9f0b3f729a64b99e58047f7bb0ff36acb759" + "CVE-2023-52434": { + "cmt_msg": "smb: client: fix potential OOBs in smb2_parse_contexts()" }, - "CVE-2017-9074": { - "cmt_msg": "ipv6: Prevent overrun when parsing v6 header options", - "cmt_id": "a2c845e51a820549a6df5a1e8907ee754422119e" + "CVE-2023-52436": { + "cmt_msg": "f2fs: explicitly null-terminate the xattr list" }, - "CVE-2017-9211": { - "cmt_msg": "crypto: skcipher - Add missing API setkey checks", - "cmt_id": "4472887cbd1373d7781bea9d8935f2d4968dd580" + "CVE-2024-26689": { + "cmt_msg": "ceph: prevent use-after-free in encode_cap_msg()" }, - "CVE-2017-18221": { - "cmt_msg": "mlock: fix mlock count can not decrease in race condition", - "cmt_id": "1163e785b1506a4f46dbdee89bbab161dd742186" + "CVE-2019-9444": { + "cmt_msg": "printk: hash addresses printed with %p" }, - "CVE-2017-8890": { - "cmt_msg": "dccp/tcp: do not inherit mc_list from parent", - "cmt_id": "4eed44029507acc666ac7afe9c6a8ea0abf857b7" + "CVE-2022-2961": { + "cmt_msg": "" }, - "CVE-2017-9242": { - "cmt_msg": "ipv6: fix out of bound writes in __ip6_append_data()", - "cmt_id": "304b41014acbdc5fa5126c86bac31dc41a245f9f" - } - }, - "4.9.32": { - "CVE-2017-9605": { - "cmt_msg": "drm/vmwgfx: Make sure backup_handle is always valid", - "cmt_id": "7860d0e5e2bf986d4bd06e7b029786747b5dc766" + "CVE-2021-3506": { + "cmt_msg": "f2fs: fix to avoid out-of-bounds memory access" }, - "CVE-2017-15274": { - "cmt_msg": "KEYS: fix dereferencing NULL payload with nonzero length", - "cmt_id": "1b253e023f8f75b109564a61d2050d818f75b4f3" + "CVE-2019-19067": { + "cmt_msg": "drm/amdgpu: fix multiple memory leaks in acp_hw_init" }, - "CVE-2017-7346": { - "cmt_msg": "drm/vmwgfx: limit the number of mip levels in vmw_gb_surface_define_ioctl()", - "cmt_id": "a76ff847013a7f6b1cd328381ca263ddcca12061" + "CVE-2020-0435": { + "cmt_msg": "f2fs: fix to do sanity check with i_extra_isize" }, - "CVE-2017-1000380": { - "cmt_msg": "ALSA: timer: Fix race between read and ioctl", - "cmt_id": "66e982d8f1a1f5e151377fe37612e9151e552dc9" - } - }, - "4.9.34": { - "CVE-2017-1000364": { - "cmt_msg": "mm: larger stack guard gap, between vmas", - "cmt_id": "cfc0eb403816c5c4f9667d959de5e22789b5421e" + "CVE-2024-26686": { + "cmt_msg": "fs/proc: do_task_stat: use sig->stats_lock to gather the threads/children stats" }, - "CVE-2017-1000379": { - "cmt_msg": "mm: larger stack guard gap, between vmas", - "cmt_id": "cfc0eb403816c5c4f9667d959de5e22789b5421e" - } - }, - "4.9.35": { - "CVE-2017-10911": { - "cmt_msg": "xen-blkback: don't leak stack data via response ring", - "cmt_id": "4ae2cb91a6365a6472fad7f04785cc0420ea5ada" + "CVE-2024-26687": { + "cmt_msg": "xen/events: close evtchn after mapping cleanup" }, - "CVE-2017-1000365": { - "cmt_msg": "fs/exec.c: account for argv/envp pointers", - "cmt_id": "3d6848e491df6abbf5fb5b1fabb7a5df2e2b8f4f" + "CVE-2023-51779": { + "cmt_msg": "Bluetooth: af_bluetooth: Fix Use-After-Free in bt_sock_recvmsg" }, - "CVE-2017-7482": { - "cmt_msg": "rxrpc: Fix several cases where a padded len isn't checked in ticket decode", - "cmt_id": "f2060387421109ac389dd209355918b566fc6f84" - } - }, - "4.9.36": { - "CVE-2017-18017": { - "cmt_msg": "netfilter: xt_TCPMSS: add more sanity tests on tcph->doff", - "cmt_id": "ced7689be60ddcac4b1746212c547e8817c5ae5e" - } - }, - "4.9.37": { - "CVE-2017-12146": { - "cmt_msg": "driver core: platform: fix race condition with driver_override", - "cmt_id": "c4c592b2c137e4451b7fdf76700ae9c98db133f5" + "CVE-2019-3874": { + "cmt_msg": "sctp: implement memory accounting on tx path" }, - "CVE-2017-10810": { - "cmt_msg": "drm/virtio: don't leak bo on drm_gem_object_init failure", - "cmt_id": "366d9207d9e002bf1a6d9da13a7f8f85b8a40c0b" - } - }, - "4.9.38": { - "CVE-2017-11176": { - "cmt_msg": "mqueue: fix a use-after-free in sys_mq_notify()", - "cmt_id": "e6952841ade0f937750c7748a812cb403bd744b0" - } - }, - "4.9.39": { - "CVE-2019-9457": { - "cmt_msg": "exec: Limit arg stack to at most 75% of _STK_LIM", - "cmt_id": "f31c4f65dd09319ba21cf825fa36daf0c1ddf958" + "CVE-2023-6915": { + "cmt_msg": "ida: Fix crash in ida_free when the bitmap is empty" }, - "CVE-2018-14634": { - "cmt_msg": "exec: Limit arg stack to at most 75% of _STK_LIM", - "cmt_id": "f31c4f65dd09319ba21cf825fa36daf0c1ddf958" + "CVE-2010-4563": { + "cmt_msg": "" }, - "CVE-2017-11089": { - "cmt_msg": "cfg80211: Define nla_policy for NL80211_ATTR_LOCAL_MESH_POWER_MODE", - "cmt_id": "b68aa7dff96efc59fee40e25b8044017de21161a" + "CVE-2023-1249": { + "cmt_msg": "coredump: Use the vma snapshot in fill_files_note" }, - "CVE-2017-7541": { - "cmt_msg": "brcmfmac: fix possible buffer overflow in brcmf_cfg80211_mgmt_tx()", - "cmt_id": "414848bba6ab91fe12ca8105b4652c4aa6f4b574" + "CVE-2023-2162": { + "cmt_msg": "scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress" }, - "CVE-2017-1000371": { - "cmt_msg": "binfmt_elf: use ELF_ET_DYN_BASE only for PIE", - "cmt_id": "63c2f8f8c41bf80af068f0b2aef4c0e2bdc32c4a" + "CVE-2023-45871": { + "cmt_msg": "igb: set max size RX buffer when store bad packet is enabled" }, - "CVE-2017-1000370": { - "cmt_msg": "binfmt_elf: use ELF_ET_DYN_BASE only for PIE", - "cmt_id": "63c2f8f8c41bf80af068f0b2aef4c0e2bdc32c4a" - } - }, - "4.9.40": { - "CVE-2017-11473": { - "cmt_msg": "x86/acpi: Prevent out of bound access caused by broken ACPI tables", - "cmt_id": "036d59f40ac94964a1bbc8959f78f34efac71fd5" + "CVE-2023-0266": { + "cmt_msg": "ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF" }, - "CVE-2017-18079": { - "cmt_msg": "Input: i8042 - fix crash at boot time", - "cmt_id": "5b50e0e74e2e5f084d18a03f6dedc67cfdb8db49" - } - }, - "4.9.41": { - "CVE-2017-7533": { - "cmt_msg": "dentry name snapshots", - "cmt_id": "ad25f11ed216d5ce3b5566b2f187b59fa3061b40" + "CVE-2021-46928": { + "cmt_msg": "parisc: Clear stale IIR value on instruction access rights trap" }, - "CVE-2017-12762": { - "cmt_msg": "isdn/i4l: fix buffer overflow", - "cmt_id": "7b3a66739ff01fcd9b8007a18ddd29edd2cb74f7" - } - }, - "4.9.42": { - "CVE-2017-10663": { - "cmt_msg": "f2fs: sanity check checkpoint segno and blkoff", - "cmt_id": "0f442c5b2e4ac0b65027ed3374462f1c38675f7e" + "CVE-2023-6040": { + "cmt_msg": "netfilter: nf_tables: Reject tables of unsupported family" }, - "CVE-2017-8831": { - "cmt_msg": "saa7164: fix double fetch PCIe access condition", - "cmt_id": "12d17d78e3f74b5022f61eee7d6de082e472a401" + "CVE-2021-38300": { + "cmt_msg": "bpf, mips: Validate conditional branch offsets" }, - "CVE-2017-7542": { - "cmt_msg": "ipv6: avoid overflow of offset in ip6_find_1stfragopt", - "cmt_id": "4a2ffe1707e3787f93a7d0ff2dec682a57ba25ad" - } - }, - "4.9.43": { - "CVE-2017-1000": { - "cmt_msg": "udp: consistently apply ufo or fragmentation", - "cmt_id": "33dc6a6a85f1d6ce71e7056d009b8a5fcbf10f70" + "CVE-2023-52498": { + "cmt_msg": "PM: sleep: Fix possible deadlocks in core system-wide PM code" }, - "CVE-2017-1000112": { - "cmt_msg": "udp: consistently apply ufo or fragmentation", - "cmt_id": "33dc6a6a85f1d6ce71e7056d009b8a5fcbf10f70" + "CVE-2021-4023": { + "cmt_msg": "io-wq: fix cancellation on create-worker failure" }, - "CVE-2017-1000111": { - "cmt_msg": "packet: fix tp_reserve race in packet_set_ring", - "cmt_id": "e5841355061332f8b326e098949490345dba776b" - } - }, - "4.9.45": { - "CVE-2017-12134": { - "cmt_msg": "xen: fix bio vec merging", - "cmt_id": "6c7f3756d072050d612e5c5c04108f90f1985435" + "CVE-2019-11191": { + "cmt_msg": "x86: Deprecate a.out support" }, - "CVE-2017-14140": { - "cmt_msg": "Sanitize 'move_pages()' permission checks", - "cmt_id": "61332dc598c3f223678b2d7192ccf3472c544799" + "CVE-2023-52641": { + "cmt_msg": "fs/ntfs3: Add NULL ptr dereference checking at the end of attr_allocate_frame()" }, - "CVE-2018-10675": { - "cmt_msg": "mm/mempolicy: fix use after free when calling get_mempolicy", - "cmt_id": "91105f2c621ef0b3c40d6725475b6896eb06f954" - } - }, - "4.9.46": { - "CVE-2017-17053": { - "cmt_msg": "x86/mm: Fix use-after-free of ldt_struct", - "cmt_id": "3559de45c99a68c0b8c4956fc35367837df9161c" + "CVE-2024-26773": { + "cmt_msg": "ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found()" }, - "CVE-2017-17052": { - "cmt_msg": "fork: fix incorrect fput of ->exe_file causing use-after-free", - "cmt_id": "b65b6ac52e0f8694aa3a4402d5f766b2bb9e94ef" - } - }, - "4.9.48": { - "CVE-2017-11600": { - "cmt_msg": "xfrm: policy: check policy direction value", - "cmt_id": "12a70ccaa6868163487f9a5ad97e1a91a397b453" - } - }, - "4.9.50": { - "CVE-2017-14340": { - "cmt_msg": "xfs: XFS_IS_REALTIME_INODE() should be false if no rt device present", - "cmt_id": "5b82e0e938af5d9dfb038e2483cb2a84e24584fd" + "CVE-2021-0399": { + "cmt_msg": "" + }, + "CVE-2023-52488": { + "cmt_msg": "serial: sc16is7xx: convert from _raw_ to _noinc_ regmap functions for FIFO" + }, + "CVE-2020-36691": { + "cmt_msg": "netlink: limit recursion depth in policy validation" }, - "CVE-2017-1000251": { - "cmt_msg": "Bluetooth: Properly check L2CAP config option output buffer length", - "cmt_id": "6300c8bfafe032187f3cbaa43dbf7d306650c5ed" + "CVE-2023-42755": { + "cmt_msg": "net/sched: Retire rsvp classifier" }, - "CVE-2017-9985": { - "cmt_msg": "ALSA: msnd: Optimize / harden DSP and MIDI loops", - "cmt_id": "03bea515b9a2f2a48d46a5a4bcc69be264afb6af" + "CVE-2023-3161": { + "cmt_msg": "fbcon: Check font dimension limits" }, - "CVE-2017-9984": { - "cmt_msg": "ALSA: msnd: Optimize / harden DSP and MIDI loops", - "cmt_id": "03bea515b9a2f2a48d46a5a4bcc69be264afb6af" - } - }, - "4.9.51": { - "CVE-2017-14106": { - "cmt_msg": "tcp: initialize rcv_mss to TCP_MIN_MSS instead of 0", - "cmt_id": "a10c510179b369f7d1e8cf77f43ee2db900c1ac9" + "CVE-2023-52486": { + "cmt_msg": "drm: Don't unref the same fb many times by mistake due to deadlock handling" }, - "CVE-2017-14497": { - "cmt_msg": "packet: Don't write vnet header beyond end of buffer", - "cmt_id": "8c623e5d03692dc478277185a0b907d53aea1b43" + "CVE-2023-52480": { + "cmt_msg": "ksmbd: fix race condition between session lookup and expire" }, - "CVE-2017-7558": { - "cmt_msg": "sctp: Avoid out-of-bounds reads from address storage", - "cmt_id": "08d56d8a99bb82e134ba7704e4cfdabbcc16fc4f" - } - }, - "4.9.52": { - "CVE-2017-9059": { - "cmt_msg": "NFSv4: Fix callback server shutdown", - "cmt_id": "f609266b12d214437cf9d68245dc27f8d4f69836" + "CVE-2012-4542": { + "cmt_msg": "" }, - "CVE-2017-14991": { - "cmt_msg": "scsi: sg: fixup infoleak when using SG_GET_REQUEST_TABLE", - "cmt_id": "90cb12f6dc5ac45c51082721ec5bbe18850cf80f" + "CVE-2023-52482": { + "cmt_msg": "x86/srso: Add SRSO mitigation for Hygon processors" }, - "CVE-2017-14051": { - "cmt_msg": "scsi: qla2xxx: Fix an integer overflow in sysfs code", - "cmt_id": "2a913aecc4f746ce15eb1bec98b134aff4190ae2" + "CVE-2023-42752": { + "cmt_msg": "igmp: limit igmpv3_newpack() packet size to IP_MAX_MTU" }, - "CVE-2017-0627": { - "cmt_msg": "media: uvcvideo: Prevent heap overflow when accessing mapped controls", - "cmt_id": "38993f320506d7ead26695218ba1481f250469d5" - } - }, - "4.9.53": { - "CVE-2020-14353": { - "cmt_msg": "KEYS: prevent creating a different user's keyrings", - "cmt_id": "bfe9d7b8e0f2d4a4bc8298e25597983ac662dac0" + "CVE-2023-4128": { + "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free" }, - "CVE-2017-14156": { - "cmt_msg": "video: fbdev: aty: do not leak uninitialized padding in clk to userspace", - "cmt_id": "64afde6f956dfcb719e329a9d2098b53e68d2755" + "CVE-2021-47075": { + "cmt_msg": "nvmet: fix memory leak in nvmet_alloc_ctrl()" }, - "CVE-2017-12153": { - "cmt_msg": "nl80211: check for the required netlink attributes presence", - "cmt_id": "c820441a7a52e3626aede8df94069a50a9e4efdb" + "CVE-2022-44032": { + "cmt_msg": "char: pcmcia: remove all the drivers" }, - "CVE-2017-1000252": { - "cmt_msg": "KVM: VMX: Do not BUG() on out-of-bounds guest IRQ", - "cmt_id": "3d4213fac7d10e72859112c9100d8015ce442a3a" + "CVE-2020-36775": { + "cmt_msg": "f2fs: fix to avoid potential deadlock" }, - "CVE-2017-12154": { - "cmt_msg": "kvm: nVMX: Don't allow L2 to access the hardware CR8", - "cmt_id": "86ef97b2dfd504fbc65f6b244a422db0c1b15797" + "CVE-2021-47128": { + "cmt_msg": "bpf, lockdown, audit: Fix buggy SELinux lockdown permission checks" }, - "CVE-2017-18270": { - "cmt_msg": "KEYS: prevent creating a different user's keyrings", - "cmt_id": "bfe9d7b8e0f2d4a4bc8298e25597983ac662dac0" + "CVE-2017-8065": { + "cmt_msg": "crypto: ccm - move cbcmac input off the stack" }, - "CVE-2017-14489": { - "cmt_msg": "scsi: scsi_transport_iscsi: fix the issue that iscsi_if_rx doesn't parse nlmsg properly", - "cmt_id": "b42bf0f15cf70926f3a460e7517703fda6191ba7" + "CVE-2021-47125": { + "cmt_msg": "sch_htb: fix refcount leak in htb_parent_to_leaf_offload" }, - "CVE-2017-12192": { - "cmt_msg": "KEYS: prevent KEYCTL_READ on negative key", - "cmt_id": "dda70d28c0ac191f128bfd3acfd800667ed86bdf" + "CVE-2021-47124": { + "cmt_msg": "io_uring: fix link timeout refs" }, - "CVE-2017-15537": { - "cmt_msg": "x86/fpu: Don't let userspace set bogus xcomp_bv", - "cmt_id": "5e9b07f30d21295b83f2024ffb5a349d3af6f749" - } - }, - "4.9.55": { - "CVE-2017-0786": { - "cmt_msg": "brcmfmac: add length check in brcmf_cfg80211_escan_handler()", - "cmt_id": "4d3132d97aa753104ee35722352a895750a0fca5" + "CVE-2023-2269": { + "cmt_msg": "dm ioctl: fix nested locking in table_clear() to remove deadlock concern" }, - "CVE-2017-16526": { - "cmt_msg": "uwb: properly check kthread_run return value", - "cmt_id": "8ff7adb930d4a62f43dfc76220a988a043c510ff" + "CVE-2023-0394": { + "cmt_msg": "ipv6: raw: Deduct extension header length in rawv6_push_pending_frames" }, - "CVE-2017-15649": { - "cmt_msg": "packet: in packet_do_bind, test fanout with bind_lock held", - "cmt_id": "0f22167d3321a028c0b6edc2d5b2ab0e37a2ac53" + "CVE-2022-36402": { + "cmt_msg": "drm/vmwgfx: Fix shader stage validation" }, - "CVE-2017-16531": { - "cmt_msg": "USB: fix out-of-bounds in usb_set_configuration", - "cmt_id": "a6d4ce2e8b653ff7facde0d0051663fa4cf57b78" + "CVE-2021-4150": { + "cmt_msg": "block: fix incorrect references to disk objects" }, - "CVE-2017-16530": { - "cmt_msg": "USB: uas: fix bug in handling of alternate settings", - "cmt_id": "d77606e93d819ad4b8f57511ff61a629ced49750" + "CVE-2021-4159": { + "cmt_msg": "bpf: Verifer, adjust_scalar_min_max_vals to always call update_reg_bounds()" }, - "CVE-2017-16534": { - "cmt_msg": "USB: core: harden cdc_parse_cdc_header", - "cmt_id": "767f7a2cf33a135fe3f57010b51c3f6e92d7677d" + "CVE-2021-29155": { + "cmt_msg": "bpf: Use correct permission flag for mixed signed bounds arithmetic" }, - "CVE-2017-16529": { - "cmt_msg": "ALSA: usb-audio: Check out-of-bounds access by corrupted buffer descriptor", - "cmt_id": "37b6d898388e78d92a13a8ab50c960d507c968d1" + "CVE-2021-3714": { + "cmt_msg": "" }, - "CVE-2018-9568": { - "cmt_msg": "net: Set sk_prot_creator when cloning sockets to the right proto", - "cmt_id": "cf2eaf16ab284e3c5b057dff4c68516cfeae62ba" + "CVE-2019-16230": { + "cmt_msg": "drm/amdkfd: fix a potential NULL pointer dereference (v2)" }, - "CVE-2017-1000255": { - "cmt_msg": "powerpc/64s: Use emergency stack for kernel TM Bad Thing program checks", - "cmt_id": "afebf5ef60da6d15e75398e41ea2817c7a2bb283" + "CVE-2023-3117": { + "cmt_msg": "netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE" }, - "CVE-2017-7518": { - "cmt_msg": "KVM: x86: fix singlestepping over syscall", - "cmt_id": "922e562b2613ae713d661c4fc0f92662f4fe6c41" - } - }, - "4.9.57": { - "CVE-2017-16527": { - "cmt_msg": "ALSA: usb-audio: Kill stray URB at exiting", - "cmt_id": "e0c70289a1e334a60b54b54688f18e2ee38396a9" + "CVE-2021-3892": { + "cmt_msg": "" }, - "CVE-2017-16525": { - "cmt_msg": "USB: serial: console: fix use-after-free after failed setup", - "cmt_id": "063b57d556181c796294b1cdf4d649cebc12678a" + "CVE-2021-39636": { + "cmt_msg": "netfilter: x_tables: fix pointer leaks to userspace" }, - "CVE-2017-16533": { - "cmt_msg": "HID: usbhid: fix out-of-bounds bug", - "cmt_id": "57265cddde308292af881ce634a5378dd4e25900" + "CVE-2024-24860": { + "cmt_msg": "Bluetooth: Fix atomicity violation in {min,max}_key_size_set" }, - "CVE-2017-12188": { - "cmt_msg": "KVM: nVMX: update last_nonleaf_level when initializing nested EPT", - "cmt_id": "28955b03fac36829831e185e3ec2793f8eb18689" + "CVE-2024-24861": { + "cmt_msg": "media: xc4000: Fix atomicity violation in xc4000_get_frequency" }, - "CVE-2017-15265": { - "cmt_msg": "ALSA: seq: Fix use-after-free at creating a port", - "cmt_id": "35b84860667ff081eee56b62f3db2a28ca8a3823" + "CVE-2018-20509": { + "cmt_msg": "binder: refactor binder ref inc/dec for thread safety" }, - "CVE-2017-12190": { - "cmt_msg": "fix unbalanced page refcounting in bio_map_user_iov", - "cmt_id": "5444d8ab9a1406af9f1bc2f00c26838637542480" - } - }, - "4.9.59": { - "CVE-2017-15299": { - "cmt_msg": "KEYS: don't let add_key() update an uninstantiated key", - "cmt_id": "da0c7503c0b886784bf8bcb279c7d71c1e50c438" + "CVE-2024-24864": { + "cmt_msg": "" }, - "CVE-2017-16535": { - "cmt_msg": "USB: core: fix out-of-bounds access bug in usb_get_bos_descriptor()", - "cmt_id": "9d13d3e05be29056eeab610d9ad26b04c9231a04" + "CVE-2023-52596": { + "cmt_msg": "sysctl: Fix out of bounds access for empty sysctl registers" }, - "CVE-2017-15951": { - "cmt_msg": "KEYS: Fix race between updating and finding a negative key", - "cmt_id": "63c8e452554962f88c0952212c8a4202469d4914" - } - }, - "4.9.60": { - "CVE-2017-16939": { - "cmt_msg": "ipsec: Fix aborted xfrm policy dump crash", - "cmt_id": "543aabb7d14b2414f40b632e37b0921bd0af3a96" + "CVE-2023-4132": { + "cmt_msg": "media: usb: siano: Fix warning due to null work_func_t function pointer" }, - "CVE-2017-16643": { - "cmt_msg": "Input: gtco - fix potential out-of-bound access", - "cmt_id": "52f65e35c2b85908fa66cfc265be4e3fd88744a3" + "CVE-2023-52594": { + "cmt_msg": "wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus()" }, - "CVE-2017-12193": { - "cmt_msg": "assoc_array: Fix a buggy node-splitting case", - "cmt_id": "67bcc5e530d55e646b7324038c926c2bde735a7e" + "CVE-2023-52595": { + "cmt_msg": "wifi: rt2x00: restart beacon queue when hardware reset" }, - "CVE-2017-15306": { - "cmt_msg": "KVM: PPC: Fix oops when checking KVM_CAP_PPC_HTM", - "cmt_id": "474cb9e0f02fdabadfc5ecc17b9afbb0ca6aa15a" - } - }, - "4.9.63": { - "CVE-2018-7191": { - "cmt_msg": "tun: call dev_get_valid_name() before register_netdevice()", - "cmt_id": "3e2ab0ceef68ab995bc9f7c699e62b95c0edcdc4" + "CVE-2023-52593": { + "cmt_msg": "wifi: wfx: fix possible NULL pointer dereference in wfx_set_mfp_ap()" }, - "CVE-2017-13080": { - "cmt_msg": "mac80211: accept key reinstall without changing anything", - "cmt_id": "2586fa0007dc6b7745da14250be7e3aae706b128" + "CVE-2021-47158": { + "cmt_msg": "net: dsa: sja1105: add error handling in sja1105_setup()" }, - "CVE-2017-16645": { - "cmt_msg": "Input: ims-psu - check if CDC union descriptor is sane", - "cmt_id": "9d65d0ea55dcb813cea7df05602f233ad4843baf" + "CVE-2021-47159": { + "cmt_msg": "net: dsa: fix a crash if ->get_sset_count() fails" }, - "CVE-2017-16528": { - "cmt_msg": "ALSA: seq: Cancel pending autoload work at unbinding device", - "cmt_id": "1862eca99e2732da2594e05406c9f78b4265bf5b" + "CVE-2023-52444": { + "cmt_msg": "f2fs: fix to avoid dirent corruption" }, - "CVE-2017-16532": { - "cmt_msg": "usb: usbtest: fix NULL pointer dereference", - "cmt_id": "8cf061d919e2102d0de0379bafea6cce1405d786" - } - }, - "4.9.64": { - "CVE-2017-16646": { - "cmt_msg": "media: dib0700: fix invalid dvb_detach argument", - "cmt_id": "49c1e5f032382713933a86fa1077c438b430f6fc" + "CVE-2021-47150": { + "cmt_msg": "net: fec: fix the potential memory leak in fec_enet_init()" }, - "CVE-2017-16537": { - "cmt_msg": "media: imon: Fix null-ptr-deref in imon_probe", - "cmt_id": "ca98a5c721703de77f7fb8bbafd0673e4a60a841" - } - }, - "4.9.65": { - "CVE-2017-18204": { - "cmt_msg": "ocfs2: should wait dio before inode lock in ocfs2_setattr()", - "cmt_id": "8af777385f7a3e693f5e79fb4655aebf881156e6" + "CVE-2021-47151": { + "cmt_msg": "interconnect: qcom: bcm-voter: add a missing of_node_put()" }, - "CVE-2017-16647": { - "cmt_msg": "net: usb: asix: fill null-ptr-deref in asix_suspend", - "cmt_id": "58baa36d3728eea14884f74817d5749b32b0cdeb" + "CVE-2024-26627": { + "cmt_msg": "scsi: core: Move scsi_host_busy() out of host lock for waking up EH handler" }, - "CVE-2017-16994": { - "cmt_msg": "mm/pagewalk.c: report holes in hugetlb ranges", - "cmt_id": "ceaec6e8cd98c8fd87701ddfb7468a13d989d79d" + "CVE-2022-41218": { + "cmt_msg": "media: dvb-core: Fix UAF due to refcount races at releasing" }, - "CVE-2017-16650": { - "cmt_msg": "net: qmi_wwan: fix divide by 0 on bad descriptors", - "cmt_id": "02a0c0639ae07beab982bbad4527b40da96d33ff" + "CVE-2022-23222": { + "cmt_msg": "bpf: Replace PTR_TO_XXX_OR_NULL with PTR_TO_XXX | PTR_MAYBE_NULL" }, - "CVE-2017-16649": { - "cmt_msg": "net: cdc_ether: fix divide by 0 on bad descriptors", - "cmt_id": "f376621861e3d8a713d6931f4363c4137912330b" + "CVE-2024-26622": { + "cmt_msg": "tomoyo: fix UAF write bug in tomoyo_write_control()" }, - "CVE-2017-15115": { - "cmt_msg": "sctp: do not peel off an assoc from one netns to another one", - "cmt_id": "362d2ce0f851653d2eed87fdb8891ab4cfb0c2bf" - } - }, - "4.9.66": { - "CVE-2017-18203": { - "cmt_msg": "dm: fix race between dm_get_from_kobject() and __dm_destroy()", - "cmt_id": "1cd9686e0a3b5b5a09a2025c21cd4d92e8db0e1f" + "CVE-2024-26623": { + "cmt_msg": "pds_core: Prevent race issues involving the adminq" }, - "CVE-2017-16536": { - "cmt_msg": "cx231xx-cards: fix NULL-deref on missing association descriptor", - "cmt_id": "38c043d26c97a04332df960200a389bc4141ff21" - } - }, - "4.9.67": { - "CVE-2017-18208": { - "cmt_msg": "mm/madvise.c: fix madvise() infinite loop under special circumstances", - "cmt_id": "ba32d7dce43f14ef1a1cb0540959431526cf7fe0" + "CVE-2023-2194": { + "cmt_msg": "i2c: xgene-slimpro: Fix out-of-bounds bug in xgene_slimpro_i2c_xfer()" }, - "CVE-2017-1000405": { - "cmt_msg": "mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d()", - "cmt_id": "7031ae2ab37d3df53c4a4e9903329a5d38c745ec" - } - }, - "4.9.68": { - "CVE-2017-18202": { - "cmt_msg": "mm, oom_reaper: gather each vma to prevent leaking TLB entry", - "cmt_id": "ee23ae915fa74956503507c1e55cbb2102f349ec" - } - }, - "4.9.69": { - "CVE-2017-17807": { - "cmt_msg": "KEYS: add missing permission check for request_key() destination", - "cmt_id": "982707eb4ff84d4ae21618c02dd8926801b10a07" + "CVE-2022-41848": { + "cmt_msg": "" }, - "CVE-2017-0861": { - "cmt_msg": "ALSA: pcm: prevent UAF in snd_pcm_info", - "cmt_id": "45ddff3ce4e9a3d7e935d5b596686d9e176ed4a9" + "CVE-2022-40982": { + "cmt_msg": "x86/speculation: Add Gather Data Sampling mitigation" }, - "CVE-2017-1000407": { - "cmt_msg": "KVM: VMX: remove I/O port 0x80 bypass on Intel hosts", - "cmt_id": "6ead44d4b5b8b1ecfcbd2302f15028dab7774da3" - } - }, - "4.9.70": { - "CVE-2018-7492": { - "cmt_msg": "rds: Fix NULL pointer dereference in __rds_rdma_map", - "cmt_id": "3259862dd73bfb9d9b7a647ea77cb20ba8b179a4" + "CVE-2023-6546": { + "cmt_msg": "tty: n_gsm: fix the UAF caused by race condition in gsm_cleanup_mux" }, - "CVE-2018-18559": { - "cmt_msg": "net/packet: fix a race in packet_bind() and packet_notifier()", - "cmt_id": "5471afeef41388ec08e6cf610640aaf89805d6db" - } - }, - "4.9.71": { - "CVE-2017-16913": { - "cmt_msg": "usbip: fix stub_rx: harden CMD_SUBMIT path to handle malicious input", - "cmt_id": "f3e957266ae56c200fb13a42309c50f84576c64a" + "CVE-2021-39801": { + "cmt_msg": "" }, - "CVE-2017-16912": { - "cmt_msg": "usbip: fix stub_rx: get_pipe() to validate endpoint number", - "cmt_id": "20e825cdf7a1627f92371d45a5322ccecdebcb3b" + "CVE-2021-39800": { + "cmt_msg": "" }, - "CVE-2017-16914": { - "cmt_msg": "usbip: fix stub_send_ret_submit() vulnerability to null transfer_buffer", - "cmt_id": "14513e49c43cd3149a03ff9e1c223c3d5803ad09" + "CVE-2022-20166": { + "cmt_msg": "drivers core: Use sysfs_emit and sysfs_emit_at for show(device *...) functions" }, - "CVE-2017-17558": { - "cmt_msg": "USB: core: prevent malicious bNumInterfaces overflow", - "cmt_id": "99542e468b76ae180675566692e0528c4c712661" + "CVE-2024-22099": { + "cmt_msg": "Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security" }, - "CVE-2017-17806": { - "cmt_msg": "crypto: hmac - require that the underlying hash algorithm is unkeyed", - "cmt_id": "43259d07fceb8cc1f5ba7e8003ae19023e0620f5" + "CVE-2022-45885": { + "cmt_msg": "" }, - "CVE-2017-17805": { - "cmt_msg": "crypto: salsa20 - fix blkcipher_walk API usage", - "cmt_id": "c32e053a11f231376f0899ef906fd43f8fc8dbd0" - } - }, - "4.9.72": { - "CVE-2017-17862": { - "cmt_msg": "bpf: fix branch pruning logic", - "cmt_id": "7b5b73ea87a06236fa124bdebed1390d362d3439" + "CVE-2022-45884": { + "cmt_msg": "" }, - "CVE-2017-16995": { - "cmt_msg": "bpf: fix incorrect sign extension in check_alu_op()", - "cmt_id": "3695b3b18519099224efbc5875569d2cb6da256d" - } - }, - "4.9.73": { - "CVE-2017-17863": { - "cmt_msg": "bpf: fix integer overflows", - "cmt_id": "37435f7e80ef9adc32a69013c18f135e3f434244" - } - }, - "4.9.74": { - "CVE-2017-17712": { - "cmt_msg": "net: ipv4: fix for a race condition in raw_sendmsg", - "cmt_id": "f75f910ffa90af17eeca18714847eaa0f16cb4ad" + "CVE-2022-45887": { + "cmt_msg": "media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb()" }, - "CVE-2017-18595": { - "cmt_msg": "tracing: Fix possible double free on failure of allocating trace buffer", - "cmt_id": "5dc4cd2688e39b0286e9a4b815c9bf5e71b5a685" + "CVE-2022-45886": { + "cmt_msg": "media: dvb-core: Fix use-after-free due on race condition at dvb_net" }, - "CVE-2017-15129": { - "cmt_msg": "net: Fix double free and memory corruption in get_net_ns_by_id()", - "cmt_id": "03c93293a83a603fc5b87fc15321f392d3cf0043" + "CVE-2023-52509": { + "cmt_msg": "ravb: Fix use-after-free issue in ravb_tx_timeout_work()" }, - "CVE-2018-18386": { - "cmt_msg": "n_tty: fix EXTPROC vs ICANON interaction with TIOCINQ (aka FIONREAD)", - "cmt_id": "00fc57ae06c3519a5e32e39882549e4e1f6328fb" + "CVE-2023-46343": { + "cmt_msg": "nfc: nci: fix possible NULL pointer dereference in send_acknowledge()" }, - "CVE-2017-17449": { - "cmt_msg": "netlink: Add netns check on taps", - "cmt_id": "0b18782288a2f1c2a25e85d2553c15ea83bb5802" - } - }, - "4.9.76": { - "CVE-2017-18075": { - "cmt_msg": "crypto: pcrypt - fix freeing pcrypt instances", - "cmt_id": "c195a4c0230d7a1dafb53cdbd5eed4dea4493504" - } - }, - "4.9.77": { - "CVE-2017-17741": { - "cmt_msg": "KVM: Fix stack-out-of-bounds read in write_mmio", - "cmt_id": "c781e3be97a1cbeef8c853101e8f266db556b0a3" + "CVE-2024-25744": { + "cmt_msg": "x86/coco: Disable 32-bit emulation by default on TDX and SEV" }, - "CVE-2017-5753": { - "cmt_msg": "x86/cpufeatures: Add X86_BUG_SPECTRE_V[12]", - "cmt_id": "26323fb4d717e11a69484c6df02eeef90dba7ef2" + "CVE-2023-5178": { + "cmt_msg": "nvmet-tcp: Fix a possible UAF in queue intialization setup" }, - "CVE-2017-1000410": { - "cmt_msg": "Bluetooth: Prevent stack info leak from the EFS element.", - "cmt_id": "6aebc2670ebfdda0762a6b471fbf8ca18dcf44f2" + "CVE-2023-52507": { + "cmt_msg": "nfc: nci: assert requested protocol is valid" }, - "CVE-2018-5333": { - "cmt_msg": "RDS: null pointer dereference in rds_atomic_free_op", - "cmt_id": "ce31b6ac1111096ae9bb0b45f4ba564a909bb366" + "CVE-2023-2124": { + "cmt_msg": "xfs: verify buffer contents when we skip log replay" }, - "CVE-2018-5332": { - "cmt_msg": "RDS: Heap OOB write in rds_message_alloc_sgs()", - "cmt_id": "cebb382931c4fb341162eae80b696650260e4a2b" + "CVE-2023-52501": { + "cmt_msg": "ring-buffer: Do not attempt to read past \"commit\"" }, - "CVE-2017-13216": { - "cmt_msg": "staging: android: ashmem: fix a race condition in ASHMEM_SET_SIZE ioctl", - "cmt_id": "c51d23dffc2e9ca05d611c86c440f9055541c62d" + "CVE-2023-52500": { + "cmt_msg": "scsi: pm80xx: Avoid leaking tags when processing OPC_INB_SET_CONTROLLER_CONFIG command" }, - "CVE-2017-5715": { - "cmt_msg": "x86/cpufeatures: Add X86_BUG_SPECTRE_V[12]", - "cmt_id": "26323fb4d717e11a69484c6df02eeef90dba7ef2" - } - }, - "4.9.78": { - "CVE-2018-6927": { - "cmt_msg": "futex: Prevent overflow by strengthen input validation", - "cmt_id": "d8a3170db0deca6bfee32ad77f492caba9f6791d" + "CVE-2023-52502": { + "cmt_msg": "net: nfc: fix races in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn()" }, - "CVE-2018-1000004": { - "cmt_msg": "ALSA: seq: Make ioctls race-free", - "cmt_id": "e4ff9f294629b65df3f7982cd4faf86b2856b9d7" - } - }, - "4.9.79": { - "CVE-2017-16911": { - "cmt_msg": "usbip: prevent vhci_hcd driver from leaking a socket pointer address", - "cmt_id": "ce601a07bc504b4748f8e7a34896684f79514e51" + "CVE-2021-44879": { + "cmt_msg": "f2fs: fix to do sanity check on inode type during garbage collection" }, - "CVE-2017-11472": { - "cmt_msg": "ACPICA: Namespace: fix operand cache leak", - "cmt_id": "2915f16bdce204621695e7a0dfcd5f73b120cccb" + "CVE-2023-1855": { + "cmt_msg": "hwmon: (xgene) Fix use after free bug in xgene_hwmon_remove due to race condition" }, - "CVE-2018-1000028": { - "cmt_msg": "nfsd: auth: Fix gid sorting when rootsquash enabled", - "cmt_id": "f12d0602633decf073796f3aaa59eec7ff2da9e2" + "CVE-2022-27672": { + "cmt_msg": "x86/speculation: Identify processors vulnerable to SMT RSB predictions" }, - "CVE-2017-17450": { - "cmt_msg": "netfilter: xt_osf: Add missing permission checks", - "cmt_id": "898eeca02a55e354c42a7aa5cdfebf16c3742f44" + "CVE-2024-26668": { + "cmt_msg": "netfilter: nft_limit: reject configurations that cause integer overflow" }, - "CVE-2017-17448": { - "cmt_msg": "netfilter: nfnetlink_cthelper: Add missing permission checks", - "cmt_id": "2c3184ea80322347287bc7e57f782d77f478e73c" - } - }, - "4.9.80": { - "CVE-2018-5344": { - "cmt_msg": "loop: fix concurrent lo_open/lo_release", - "cmt_id": "56bc086358cac1a2949783646eabd57447b9d672" - } - }, - "4.9.81": { - "CVE-2017-5754": { - "cmt_msg": "x86/cpufeatures: Add Intel feature bits for Speculation Control", - "cmt_id": "40532f65cccc5056b50cf1ab07a9a41445b24aa8" + "CVE-2015-2877": { + "cmt_msg": "" }, - "CVE-2017-13305": { - "cmt_msg": "KEYS: encrypted: fix buffer overread in valid_master_desc()", - "cmt_id": "9692602ab850eec484d8cc5a740803d34f00016c" - } - }, - "4.9.82": { - "CVE-2018-5873": { - "cmt_msg": "nsfs: mark dentry with DCACHE_RCUACCESS", - "cmt_id": "daaa81c48402da28cc9e32ad55c48fb05e61b005" + "CVE-2024-26663": { + "cmt_msg": "tipc: Check the bearer type before calling tipc_udp_nl_bearer_add()" }, - "CVE-2017-8824": { - "cmt_msg": "dccp: CVE-2017-8824: use-after-free in DCCP code", - "cmt_id": "7e2fb808d3c7c52f88ebc670949dbf1bae48f2a2" + "CVE-2024-26664": { + "cmt_msg": "hwmon: (coretemp) Fix out-of-bounds memory access" }, - "CVE-2017-16538": { - "cmt_msg": "media: dvb-usb-v2: lmedm04: Improve logic checking of warm start", - "cmt_id": "1ff1353a03c6cde5334a94cb67f8632141b0589b" + "CVE-2022-1679": { + "cmt_msg": "ath9k: fix use-after-free in ath9k_hif_usb_rx_cb" }, - "CVE-2017-16644": { - "cmt_msg": "media: hdpvr: Fix an error handling path in hdpvr_probe()", - "cmt_id": "198a7ddaf5d2c76130b28f19ed6d768860ea2b8e" + "CVE-2024-26715": { + "cmt_msg": "usb: dwc3: gadget: Fix NULL pointer dereference in dwc3_gadget_suspend" }, - "CVE-2017-18344": { - "cmt_msg": "posix-timer: Properly check sigevent->sigev_notify", - "cmt_id": "0b376535ad5493d2fcf70ab5f6539551aadb493e" + "CVE-2023-1513": { + "cmt_msg": "kvm: initialize all of the kvm_debugregs structure before sending it to userspace" }, - "CVE-2018-5750": { - "cmt_msg": "ACPI: sbshc: remove raw pointer from printk() message", - "cmt_id": "623c28ee02b36a9f45780be0ded6d13ad74e2d0e" - } - }, - "4.9.83": { - "CVE-2018-7566": { - "cmt_msg": "ALSA: seq: Fix racy pool initializations", - "cmt_id": "869182f45e38e4c62722b20a5c6f4bc48b2e60c3" - } - }, - "4.9.86": { - "CVE-2017-18193": { - "cmt_msg": "f2fs: fix a bug caused by NULL extent tree", - "cmt_id": "4a97b2d09d332c43612f489c99b97d691002b6d4" - } - }, - "4.9.87": { - "CVE-2018-5803": { - "cmt_msg": "sctp: verify size of a new chunk in _sctp_make_chunk()", - "cmt_id": "9b7d723439a444ea578462f50054641a09c45023" - } - }, - "4.9.88": { - "CVE-2018-1068": { - "cmt_msg": "netfilter: ebtables: CONFIG_COMPAT: don't trust userland offsets", - "cmt_id": "21ff147189ff0692d203282c1dced02f83dcf785" + "CVE-2024-1312": { + "cmt_msg": "mm: lock_vma_under_rcu() must check vma->anon_vma under vma lock" }, - "CVE-2018-7995": { - "cmt_msg": "x86/MCE: Serialize sysfs changes", - "cmt_id": "2cc98fddf0f4a746071e098075a832fbec4bbfff" + "CVE-2021-3847": { + "cmt_msg": "" }, - "CVE-2018-1065": { - "cmt_msg": "netfilter: add back stackpointer size checks", - "cmt_id": "f506da51bdf6602ec942f25d682a4de9b59760da" + "CVE-2023-52442": { + "cmt_msg": "ksmbd: validate session id and tree id in compound request" }, - "CVE-2019-9456": { - "cmt_msg": "usb: usbmon: Read text within supplied buffer size", - "cmt_id": "63f3bac3bedcf415d789ff3ae8fb1361e4ab104e" - } - }, - "4.9.89": { - "CVE-2018-7480": { - "cmt_msg": "blkcg: fix double free of new_blkg in blkcg_init_queue", - "cmt_id": "7bd2d0c746f1fac2fb7f2ee972767cbc8be60962" - } - }, - "4.9.90": { - "CVE-2017-18222": { - "cmt_msg": "net: hns: fix ethtool_get_strings overflow in hns driver", - "cmt_id": "b2a863dba3defce5f37af95007999ce9f48f8af6" + "CVE-2022-1280": { + "cmt_msg": "drm: avoid circular locks in drm_mode_getconnector" }, - "CVE-2018-1066": { - "cmt_msg": "CIFS: Enable encryption during session setup phase", - "cmt_id": "df09b6f7b54adba78693997096d0bcb1bd80537c" - } - }, - "4.9.91": { - "CVE-2018-8822": { - "cmt_msg": "staging: ncpfs: memory corruption in ncp_read_kernel()", - "cmt_id": "5e7124c4d6786488198b192f90491e5a5ba51230" + "CVE-2023-52445": { + "cmt_msg": "media: pvrusb2: fix use after free on context disconnection" }, - "CVE-2018-8781": { - "cmt_msg": "drm: udl: Properly check framebuffer mmap offsets", - "cmt_id": "4ac9ab4f5f45d1ad0585c7bfa9ccff43b9984045" + "CVE-2011-4917": { + "cmt_msg": "" }, - "CVE-2018-1087": { - "cmt_msg": "kvm/x86: fix icebp instruction handling", - "cmt_id": "587da2b6282302325bd4bcc28a7615e822184ff1" + "CVE-2011-4916": { + "cmt_msg": "" }, - "CVE-2018-8897": { - "cmt_msg": "x86/entry/64: Don't use IST entry for #BP stack", - "cmt_id": "3681c24a7d096b092cf05c8338adbb9019bb1536" - } - }, - "4.9.92": { - "CVE-2017-18218": { - "cmt_msg": "net: hns: Fix a skb used after free bug", - "cmt_id": "a8f4be0168d5bf0c8838ca08301ae5341208dfba" + "CVE-2023-52449": { + "cmt_msg": "mtd: Fix gluebi NULL pointer dereference caused by ftl notifier" }, - "CVE-2018-1130": { - "cmt_msg": "dccp: check sk for closed state in dccp_sendmsg()", - "cmt_id": "1fdc00c1503f2164893454958cf62c3bf4eff8d6" - } - }, - "4.9.93": { - "CVE-2018-1000199": { - "cmt_msg": "perf/hwbp: Simplify the perf-hwbp code, fix documentation", - "cmt_id": "7614f7db9bee160c5e8d298919af3f28941fc703" + "CVE-2023-23039": { + "cmt_msg": "" }, - "CVE-2017-17975": { - "cmt_msg": "media: usbtv: prevent double free in error case", - "cmt_id": "50cd7759a34104c3acb510e644355d4ae8010851" + "CVE-2024-26719": { + "cmt_msg": "nouveau: offload fence uevents work to workqueue" + }, + "CVE-2019-5489": { + "cmt_msg": "Change mincore() to count \"mapped\" pages rather than \"cached\" pages" + }, + "CVE-2021-47082": { + "cmt_msg": "tun: avoid double free in tun_free_netdev" + }, + "CVE-2024-26713": { + "cmt_msg": "powerpc/pseries/iommu: Fix iommu initialisation during DLPAR add" + }, + "CVE-2023-3338": { + "cmt_msg": "Remove DECnet support from kernel" + }, + "CVE-2017-16648": { + "cmt_msg": "dvb_frontend: don't use-after-free the frontend struct" + } + } + }, + "4.8": { + "4.8.1": { + "CVE-2017-15102": { + "cmt_msg": "usb: misc: legousbtower: Fix NULL pointer deference", + "cmt_id": "540ce809d333a4579a61146777b0bea4c3263e31" } }, - "4.9.94": { - "CVE-2018-7757": { - "cmt_msg": "scsi: libsas: fix memory leak in sas_smp_get_phy_events()", - "cmt_id": "0ef71347d2e8db15ab0f8c7b79cf2c38d34d1870" + "4.8.3": { + "CVE-2016-5195": { + "cmt_msg": "mm: remove gup_flags FOLL_WRITE games from __get_user_pages()", + "cmt_id": "89eeba1594ac641a30b91942961e80fae978f839" } }, - "4.9.96": { - "CVE-2018-1108": { - "cmt_msg": "random: fix crng_ready() test", - "cmt_id": "4dfb3442bb7e1fb80515df4a199ca5a7a8edf900" - }, - "CVE-2018-20961": { - "cmt_msg": "USB: gadget: f_midi: fixing a possible double-free in f_midi", - "cmt_id": "b3b0809ac25c3ffedc58e7f83bc01a03193e7834" - }, - "CVE-2018-1092": { - "cmt_msg": "ext4: fail ext4_iget for root directory if unallocated", - "cmt_id": "6b289a7c34d72212bcd5a8ab9b6a657f2f44f0ee" + "4.8.4": { + "CVE-2016-7425": { + "cmt_msg": "scsi: arcmsr: Buffer overflow in arcmsr_iop_message_xfer()", + "cmt_id": "cf4dc8d4d44078c0c9063df957caad12c79d79b3" } }, - "4.9.97": { - "CVE-2018-10940": { - "cmt_msg": "cdrom: information leak in cdrom_ioctl_media_changed()", - "cmt_id": "4bd744b86114a406efb563c8717e5bea7672d427" + "4.8.6": { + "CVE-2016-10907": { + "cmt_msg": "iio: ad5755: fix off-by-one on devnr limit check", + "cmt_id": "4100d32ab5a3df4292db4cda2396b0896bc3facc" + }, + "CVE-2016-7097": { + "cmt_msg": "posix_acl: Clear SGID bit when setting file permissions", + "cmt_id": "ea288a690cc4e53a528ae6a1d37cd6e14320ed27" } }, - "4.9.98": { - "CVE-2018-9415": { - "cmt_msg": "ARM: amba: Fix race condition with driver_override", - "cmt_id": "272c99cf85a371401b78f3c56a18745bf07817a3" + "4.8.7": { + "CVE-2016-7042": { + "cmt_msg": "KEYS: Fix short sprintf buffer in /proc/keys show function", + "cmt_id": "5daa841d04370f5234aab2a6b63702584c1be608" }, - "CVE-2018-9385": { - "cmt_msg": "ARM: amba: Don't read past the end of sysfs \"driver_override\" buffer", - "cmt_id": "8970c12ac9b917b27e42c0537ab7fce0357f0cf3" + "CVE-2016-8633": { + "cmt_msg": "firewire: net: guard against rx buffer overflows", + "cmt_id": "032430fb6a2cb0392801ca260396f31bc7798632" }, - "CVE-2018-1093": { - "cmt_msg": "ext4: add validity checks for bitmap block numbers", - "cmt_id": "76964816c83d3e4e8a6a393777b30f22a6f9cd51" + "CVE-2016-9313": { + "cmt_msg": "KEYS: Sort out big_key initialisation", + "cmt_id": "5152986c9257e797436688d09ebd582b9eadcd2d" + }, + "CVE-2016-8630": { + "cmt_msg": "kvm: x86: Check memopp before dereference (CVE-2016-8630)", + "cmt_id": "0c879624701dc719022950552227516ac87a10d5" } }, - "4.9.99": { - "CVE-2017-18255": { - "cmt_msg": "perf/core: Fix the perf_cpu_time_max_percent check", - "cmt_id": "0f8a75e90963019cef486565f2b088bb570a7ddb" + "4.8.8": { + "CVE-2016-7039": { + "cmt_msg": "net: add recursion limit to GRO", + "cmt_id": "23c110c4cdbce17b6c5df90298168fc4b990ecc1" + }, + "CVE-2016-9555": { + "cmt_msg": "sctp: validate chunk len before actually using it", + "cmt_id": "c9e086b9009a1cf189dd96abad95285bc9627624" } }, - "4.9.100": { - "CVE-2017-18257": { - "cmt_msg": "f2fs: fix a dead loop in f2fs_fiemap()", - "cmt_id": "b8bf4b886b82585202ab4ee169718656661cb89e" + "4.8.10": { + "CVE-2016-8645": { + "cmt_msg": "tcp: take care of truncations done by sk_filter()", + "cmt_id": "2b5f22e4f7fd208c8d392e5c3755cea1f562cb98" } }, - "4.9.101": { - "CVE-2018-1120": { - "cmt_msg": "proc: do not access cmdline nor environ from file-backed areas", - "cmt_id": "6f1abf8628b750905606996fd5ff5ea22d149238" - }, - "CVE-2018-10087": { - "cmt_msg": "kernel/exit.c: avoid undefined behaviour when calling wait4()", - "cmt_id": "04103c29b6cc1ffcf9efe167a07e882be68f8367" + "4.8.11": { + "CVE-2017-12168": { + "cmt_msg": "arm64: KVM: pmu: Fix AArch32 cycle counter access", + "cmt_id": "8d8b37e242decffb789cd86f501100dd881ded10" } }, - "4.9.102": { - "CVE-2018-5814": { - "cmt_msg": "usbip: usbip_host: fix NULL-ptr deref and use-after-free errors", - "cmt_id": "f2a6d5f19450086e5cbdac7168d3fc75af32becf" + "4.8.12": { + "CVE-2016-9756": { + "cmt_msg": "KVM: x86: drop error recovery in em_jmp_far and em_ret_far", + "cmt_id": "39b653013527ce0cdff1fc27db5a1b874538387d" }, - "CVE-2018-3639": { - "cmt_msg": "x86/nospec: Simplify alternative_msr_write()", - "cmt_id": "741c026d1a0c594f7ad509f44488ef29582fed74" + "CVE-2016-8650": { + "cmt_msg": "mpi: Fix NULL ptr dereference in mpi_powm()", + "cmt_id": "0257b7e20c07e7d1fac3c7e20ef3c01792cef5a3" + }, + "CVE-2016-9777": { + "cmt_msg": "KVM: x86: fix out-of-bounds accesses of rtc_eoi map", + "cmt_id": "c02d13809180bba04cc4ebdf29e3146e808a0eaa" } }, - "4.9.103": { - "CVE-2018-10021": { - "cmt_msg": "scsi: libsas: defer ata device eh commands to libata", - "cmt_id": "e420d98384760f55ffac9951b9b5cccbf2edd752" - }, - "CVE-2018-1000204": { - "cmt_msg": "scsi: sg: allocate with __GFP_ZERO in sg_build_indirect()", - "cmt_id": "ad2518320bc440ed3db072e2444a1bb226a9cf7a" + "4.8.13": { + "CVE-2016-10150": { + "cmt_msg": "KVM: use after free in kvm_ioctl_create_device()", + "cmt_id": "6c69476139799ccf8d3e76edfc892c64ced80bc4" } }, - "4.9.104": { - "CVE-2018-10124": { - "cmt_msg": "kernel/signal.c: avoid undefined behaviour in kill_something_info", - "cmt_id": "ec1975ac988686eba0f105f87ed0b587da43d384" + "4.8.14": { + "CVE-2016-9793": { + "cmt_msg": "net: avoid signed overflows for SO_{SND|RCV}BUFFORCE", + "cmt_id": "f818e5d86aef49c067296d29f1e277c7ee1713e8" }, - "CVE-2018-9518": { - "cmt_msg": "NFC: llcp: Limit size of SDP URI", - "cmt_id": "69b28c18f7c8b3bbdc037f1cc029acc21723b997" + "CVE-2016-8632": { + "cmt_msg": "tipc: check minimum bearer MTU", + "cmt_id": "4daa2c73eb05aaa93a4409823e2861beb3eb1ed9" }, - "CVE-2017-13695": { - "cmt_msg": "ACPICA: acpi: acpica: fix acpi operand cache leak in nseval.c", - "cmt_id": "9c6d844357a30e5dfcbb015c0d07a8175464b9c6" + "CVE-2016-10200": { + "cmt_msg": "l2tp: fix racy SOCK_ZAPPED flag check in l2tp_ip{,6}_bind()", + "cmt_id": "84df56749f48aed274bbfd2db6b6fb9dd540ff6b" }, - "CVE-2018-6412": { - "cmt_msg": "fbdev: Fixing arbitrary kernel leak in case FBIOGETCMAP_SPARC in sbusfb_ioctl_helper().", - "cmt_id": "05b4268070b14dbd77ac6f5986b77a80a458fffa" + "CVE-2016-8655": { + "cmt_msg": "packet: fix race condition in packet_set_ring", + "cmt_id": "cef222d40f2e22e5938bac009bb5d8b526cc44ef" + }, + "CVE-2016-8399": { + "cmt_msg": "net: ping: check minimum size on ICMP header length", + "cmt_id": "5ff5e5c06c25b91335cc32e25315dbb450b71838" } }, - "4.9.108": { - "CVE-2019-18675": { - "cmt_msg": "mmap: introduce sane default mmap limits", - "cmt_id": "7a40374c34e8c25062b0d7e2d2152ff8b7af1274" + "4.8.15": { + "CVE-2016-10147": { + "cmt_msg": "crypto: mcryptd - Check mcryptd algorithm compatibility", + "cmt_id": "bfef274e4dae76cdee275b5985c85758e346e825" } }, - "4.9.110": { - "CVE-2018-1118": { - "cmt_msg": "vhost: fix info leak due to uninitialized memory", - "cmt_id": "9681c3bdb098f6c87a0422b6b63912c1b90ad197" + "4.8.16": { + "CVE-2015-8709": { + "cmt_msg": "mm: Add a user_ns owner to mm_struct and fix ptrace permission checks", + "cmt_id": "e45692fa1aea06676449b63ef3c2b6e1e72b7578" } }, - "4.9.111": { - "CVE-2018-13406": { - "cmt_msg": "video: uvesafb: Fix integer overflow in allocation", - "cmt_id": "7673ca3c93414faf90fa2a3c339f1f625415fecb" + "4.8.17": { + "CVE-2016-9588": { + "cmt_msg": "kvm: nVMX: Allow L1 to intercept software exceptions (#BP and #OF)", + "cmt_id": "43983ce75e6119b0ba3249a38f1160805e3d761c" + }, + "CVE-2016-10088": { + "cmt_msg": "sg_write()/bsg_write() is not fit to be called under KERNEL_DS", + "cmt_id": "48f26edb689c83af15b6afe657e96424ca9d13d9" } }, - "4.9.112": { - "CVE-2018-10878": { - "cmt_msg": "ext4: always check block group bounds in ext4_init_block_bitmap()", - "cmt_id": "cdde876fce2501828af33d5e4faa36c8919fc96a" + "outstanding": { + "CVE-2019-15098": { + "cmt_msg": "ath6kl: fix a NULL-ptr-deref bug in ath6kl_usb_alloc_urb_from_pipe()" }, - "CVE-2018-9516": { - "cmt_msg": "HID: debug: check length before copy_to_user()", - "cmt_id": "4a30c12542290f1def08b9ef0d677c024c500589" + "CVE-2023-1390": { + "cmt_msg": "tipc: fix NULL deref in tipc_link_xmit()" }, - "CVE-2017-13168": { - "cmt_msg": "scsi: sg: mitigate read/write abuse", - "cmt_id": "b6db8af7e34edfa1bf1d7b0797da15c3811a2a98" + "CVE-2017-17712": { + "cmt_msg": "net: ipv4: fix for a race condition in raw_sendmsg" }, - "CVE-2018-10877": { - "cmt_msg": "ext4: verify the depth of extent tree in ext4_find_extent()", - "cmt_id": "87dad44faabd45683fba94443471298f8809e8a8" + "CVE-2022-0001": { + "cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE" }, - "CVE-2018-10876": { - "cmt_msg": "ext4: only look at the bg_flags field if it is valid", - "cmt_id": "5ae57329580d6ceca97559ff030a5f0e91fa66fe" + "CVE-2022-0002": { + "cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE" }, - "CVE-2018-10879": { - "cmt_msg": "ext4: make sure bitmaps and the inode table don't overlap with bg descriptors", - "cmt_id": "9e4842f2aa6c4b4340669730c90cb6fbf630ee42" + "CVE-2019-19965": { + "cmt_msg": "scsi: libsas: stop discovering if oob mode is disconnected" }, - "CVE-2018-10881": { - "cmt_msg": "ext4: clear i_data in ext4_inode_info when removing inline data", - "cmt_id": "a5e063d348bd2ef14fff96b129749409a8991ea5" + "CVE-2019-19966": { + "cmt_msg": "media: cpia2: Fix use-after-free in cpia2_exit" }, - "CVE-2018-10882": { - "cmt_msg": "ext4: add more inode number paranoia checks", - "cmt_id": "425dc465de3725210162da9b1e9062e86cc2de27" + "CVE-2023-52615": { + "cmt_msg": "hwrng: core - Fix page fault dead lock on mmap-ed hwrng" }, - "CVE-2018-10883": { - "cmt_msg": "jbd2: don't mark block as modified if the handle is out of credits", - "cmt_id": "8ef97ef67ce0f8fc3d32c7218e6b412e479ee2ab" - } - }, - "4.9.113": { - "CVE-2018-13405": { - "cmt_msg": "Fix up non-directory creation in SGID directories", - "cmt_id": "d2c7c52431819aa05d76fae77bb3f95dd0955da1" + "CVE-2023-52614": { + "cmt_msg": "PM / devfreq: Fix buffer overflow in trans_stat_show" }, - "CVE-2018-16276": { - "cmt_msg": "USB: yurex: fix out-of-bounds uaccess in read handler", - "cmt_id": "0fdef3142f99430b94f5d394ca2b181d20d87e77" - } - }, - "4.9.114": { - "CVE-2017-18216": { - "cmt_msg": "ocfs2: subsystem.su_mutex is required while accessing the item->ci_parent", - "cmt_id": "32a1733cf823011266dac0ea34c13555ff35dde5" + "CVE-2023-52617": { + "cmt_msg": "PCI: switchtec: Fix stdev_release() crash after surprise hot remove" }, - "CVE-2017-18224": { - "cmt_msg": "ocfs2: ip_alloc_sem should be taken in ocfs2_get_block()", - "cmt_id": "78a65505cdf7b7392c963d3715269516bc812ef2" - } - }, - "4.9.115": { - "CVE-2018-10902": { - "cmt_msg": "ALSA: rawmidi: Change resized buffers atomically", - "cmt_id": "c4f094deb3d69dcc8b4e3dc6c056c1e62a72c33e" - } - }, - "4.9.116": { - "CVE-2018-5390": { - "cmt_msg": "tcp: free batches of packets in tcp_prune_ofo_queue()", - "cmt_id": "2d08921c8da26bdce3d8848ef6f32068f594d7d4" - } - }, - "4.9.117": { - "CVE-2018-14734": { - "cmt_msg": "infiniband: fix a possible use-after-free bug", - "cmt_id": "73298a828c90398d582ec0e204b637e9bbee2dd5" - } - }, - "4.9.119": { - "CVE-2018-12233": { - "cmt_msg": "jfs: Fix inconsistency between memory allocation and ea_buf->max_size", - "cmt_id": "240d46556d5961c7100febbee0e058185b3c8d4f" - } - }, - "4.9.120": { - "CVE-2018-3646": { - "cmt_msg": "x86/microcode: Allow late microcode loading with SMT disabled", - "cmt_id": "da540c063b06b18f77168c8a52ee5a9c783a7481" + "CVE-2020-24587": { + "cmt_msg": "mac80211: prevent mixed key and fragment cache attacks" }, - "CVE-2018-15572": { - "cmt_msg": "x86/speculation: Protect against userspace-userspace spectreRSB", - "cmt_id": "6455f41db5206cf46b623be071a0aa308c183642" + "CVE-2020-24586": { + "cmt_msg": "mac80211: prevent mixed key and fragment cache attacks" }, - "CVE-2018-3620": { - "cmt_msg": "x86/microcode: Allow late microcode loading with SMT disabled", - "cmt_id": "da540c063b06b18f77168c8a52ee5a9c783a7481" - } - }, - "4.9.121": { - "CVE-2018-9363": { - "cmt_msg": "Bluetooth: hidp: buffer overflow in hidp_process_report", - "cmt_id": "7c7940ffbaefdbb189f78a48b4e64b6f268b1dbf" - } - }, - "4.9.124": { - "CVE-2018-3693": { - "cmt_msg": "ext4: fix spectre gadget in ext4_mb_regular_allocator()", - "cmt_id": "51ada11083605de581b3c29212b5641d18cc8fcb" - } - }, - "4.9.125": { - "CVE-2018-10938": { - "cmt_msg": "Cipso: cipso_v4_optptr enter infinite loop", - "cmt_id": "e8e519f8ec33ce670abef2cfc0613ec26319841e" + "CVE-2021-0129": { + "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical" }, - "CVE-2018-16658": { - "cmt_msg": "cdrom: Fix info leak/OOB read in cdrom_ioctl_drive_status", - "cmt_id": "b8c0e15469bab732065e64f7dffadab0b7103990" - } - }, - "4.9.126": { - "CVE-2019-12881": { - "cmt_msg": "drm/i915/userptr: reject zero user_size", - "cmt_id": "f916daa615e1c0d67fb3b7a65572fbc56c6aaea6" - } - }, - "4.9.127": { - "CVE-2018-6554": { - "cmt_msg": "staging: irda: remove the irda network stack and drivers", - "cmt_id": "ce54bf4aec595c479b462180d682783b3776fb80" + "CVE-2020-24588": { + "cmt_msg": "cfg80211: mitigate A-MSDU aggregation attacks" }, - "CVE-2018-6555": { - "cmt_msg": "staging: irda: remove the irda network stack and drivers", - "cmt_id": "18d94895f505d6eef2da8868e87a403cde1d9ef0" + "CVE-2023-52619": { + "cmt_msg": "pstore/ram: Fix crash when setting number of cpus to an odd number" }, - "CVE-2018-14617": { - "cmt_msg": "hfsplus: fix NULL dereference in hfsplus_lookup()", - "cmt_id": "1cedd72d0f688b9c169836649ac9ec07a3c601d6" + "CVE-2023-52618": { + "cmt_msg": "block/rnbd-srv: Check for unlikely string overflow" }, - "CVE-2018-14609": { - "cmt_msg": "btrfs: relocation: Only remove reloc rb_trees if reloc control has been initialized", - "cmt_id": "93d960de56cef4582088dfc0ba9494143351772f" - } - }, - "4.9.128": { - "CVE-2018-13099": { - "cmt_msg": "f2fs: fix to do sanity check with reserved blkaddr of inline inode", - "cmt_id": "7e0782ceebaaed70b0c4b775c27b81e8f8cf6ddb" + "CVE-2023-5717": { + "cmt_msg": "perf: Disallow mis-matched inherited group reads" }, - "CVE-2018-17182": { - "cmt_msg": "mm: get rid of vmacache_flush_all() entirely", - "cmt_id": "84580567f1f856d2c7a610273315852e345bc3ac" - } - }, - "4.9.130": { - "CVE-2018-20511": { - "cmt_msg": "net/appletalk: fix minor pointer leak to userspace in SIOCFINDIPDDPRT", - "cmt_id": "11f734283a987ac26365aefafdd012a3f37e05a3" + "CVE-2018-10940": { + "cmt_msg": "cdrom: information leak in cdrom_ioctl_media_changed()" }, - "CVE-2018-14633": { - "cmt_msg": "scsi: target: iscsi: Use hex2bin instead of a re-implementation", - "cmt_id": "5eeb39743ba17bd36db8d86d0047181ee0b9ff71" - } - }, - "4.9.131": { - "CVE-2018-7755": { - "cmt_msg": "floppy: Do not copy a kernel pointer to user memory in FDGETPRM ioctl", - "cmt_id": "3da4db1dfc217c6f330be87baf5759ef4a4b8d93" + "CVE-2019-9506": { + "cmt_msg": "Bluetooth: Fix faulty expression for minimum encryption key size check" }, - "CVE-2018-18021": { - "cmt_msg": "arm64: KVM: Tighten guest core register access from userspace", - "cmt_id": "bc769c0148cd9820c8db785a2a1298a6489125ae" + "CVE-2019-9500": { + "cmt_msg": "brcmfmac: assure SSID length from firmware is limited" }, - "CVE-2018-10880": { - "cmt_msg": "ext4: never move the system.data xattr out of the inode body", - "cmt_id": "3a282476161c54df1a2ef1ba664c8a3514ef49f4" + "CVE-2019-9503": { + "cmt_msg": "brcmfmac: add subtype check for event handling in data path" }, - "CVE-2018-13053": { - "cmt_msg": "alarmtimer: Prevent overflow for relative nanosleep", - "cmt_id": "747128e772dc2c413763050c52c55edcacf7f60c" + "CVE-2022-0480": { + "cmt_msg": "memcg: enable accounting for file lock caches" }, - "CVE-2019-9458": { - "cmt_msg": "media: v4l: event: Prevent freeing event subscriptions while accessed", - "cmt_id": "ec964c3c00457e7ce6b633a33d1c6b61e0091557" - } - }, - "4.9.132": { - "CVE-2018-17972": { - "cmt_msg": "proc: restrict kernel stack dumps to root", - "cmt_id": "3c5dc3f313cf1cb1645a0e832f51c1ba79aee934" - } - }, - "4.9.133": { - "CVE-2018-15471": { - "cmt_msg": "xen-netback: fix input validation in xenvif_set_hash_mapping()", - "cmt_id": "2962761863cb161d419c94f3dde7443af0e63c31" - } - }, - "4.9.134": { - "CVE-2018-5391": { - "cmt_msg": "ip: discard IPv4 datagrams with overlapping segments.", - "cmt_id": "82f36cbc74595f06900f478d4eaf7217a4f06e13" - } - }, - "4.9.135": { - "CVE-2018-18281": { - "cmt_msg": "mremap: properly flush TLB before releasing the page", - "cmt_id": "e34bd9a96704f7089ccad61b6e01ea985fa54dd6" - } - }, - "4.9.136": { - "CVE-2018-12896": { - "cmt_msg": "posix-timers: Sanitize overrun handling", - "cmt_id": "65cb24de03f1c8e00a4fedf416b80a4e8f8a6ef2" - } - }, - "4.9.138": { - "CVE-2018-16871": { - "cmt_msg": "nfsd: COPY and CLONE operations require the saved filehandle to be set", - "cmt_id": "7291d95a97fc89044301b197c760555e894e82c7" + "CVE-2018-10124": { + "cmt_msg": "kernel/signal.c: avoid undefined behaviour in kill_something_info" }, - "CVE-2018-18710": { - "cmt_msg": "cdrom: fix improper type cast, which can leat to information leak.", - "cmt_id": "8dd745a8799ee01fc67b64fd33cdb44d04eb7e4c" - } - }, - "4.9.143": { - "CVE-2018-19407": { - "cmt_msg": "KVM: X86: Fix scan ioapic use-before-initialization", - "cmt_id": "3a468e8e5a6124523e2e94c33866c609cc914876" + "CVE-2022-0487": { + "cmt_msg": "moxart: fix potential use-after-free on remove path" }, - "CVE-2019-2024": { - "cmt_msg": "media: em28xx: Fix use-after-free when disconnecting", - "cmt_id": "6fc74d9f9b412b295f9ad01af7a7e62a662aa5bd" - } - }, - "4.9.144": { - "CVE-2018-9465": { - "cmt_msg": "binder: fix proc->files use-after-free", - "cmt_id": "c0d75dacffb9cf3c0e3812ba0c7607c063cd7e9d" + "CVE-2022-23825": { + "cmt_msg": "" }, - "CVE-2018-13100": { - "cmt_msg": "f2fs: fix to do sanity check with secs_per_zone", - "cmt_id": "a3dccfacd3a574365ab6c5118f8a944a4ba691fa" + "CVE-2021-47112": { + "cmt_msg": "x86/kvm: Teardown PV features on boot CPU as well" }, - "CVE-2018-5848": { - "cmt_msg": "wil6210: missing length check in wmi_set_ie", - "cmt_id": "35db4d1ed8a344899a87887fa7bf11be5b057bec" + "CVE-2021-47113": { + "cmt_msg": "btrfs: abort in rename_exchange if we fail to insert the second ref" }, - "CVE-2017-18249": { - "cmt_msg": "f2fs: fix race condition in between free nid allocator/initializer", - "cmt_id": "cb9b1d4ec206702a4df1cb42ba8142f39acfdd91" + "CVE-2021-47110": { + "cmt_msg": "x86/kvm: Disable kvmclock on all CPUs on shutdown" }, - "CVE-2018-13097": { - "cmt_msg": "f2fs: fix to do sanity check with user_block_count", - "cmt_id": "06e606acedaf8bb00c83c4cee43acdd264287a92" + "CVE-2021-47116": { + "cmt_msg": "ext4: fix memory leak in ext4_mb_init_backend on error path." }, - "CVE-2018-14611": { - "cmt_msg": "btrfs: validate type when reading a chunk", - "cmt_id": "3c77b07dc365a7ed2644ca0dd38e6e40a9652d57" + "CVE-2021-47117": { + "cmt_msg": "ext4: fix bug on in ext4_es_cache_extent as ext4_split_extent_at failed" }, - "CVE-2018-14616": { - "cmt_msg": "f2fs: fix to do sanity check with block address in main area v2", - "cmt_id": "b10a6ac262f8c1c0c70a90e992137a5590325f0b" + "CVE-2021-47114": { + "cmt_msg": "ocfs2: fix data corruption by fallocate" }, - "CVE-2017-18241": { - "cmt_msg": "f2fs: fix a panic caused by NULL flush_cmd_control", - "cmt_id": "3b19f961d260d1ae12b497e5eb77e5ecc1039fac" + "CVE-2021-47118": { + "cmt_msg": "pid: take a reference when initializing `cad_pid`" }, - "CVE-2018-14610": { - "cmt_msg": "btrfs: Check that each block group has corresponding chunk at mount time", - "cmt_id": "7a72f918825ddece7a4ed79583836f6f1e06e478" + "CVE-2021-46970": { + "cmt_msg": "bus: mhi: pci_generic: Remove WQ_MEM_RECLAIM flag from state workqueue" }, - "CVE-2018-14613": { - "cmt_msg": "btrfs: tree-checker: Verify block_group_item", - "cmt_id": "058e388e42c8dc5b6ce6248990c75a0459e20197" + "CVE-2019-10207": { + "cmt_msg": "Bluetooth: hci_uart: check for missing tty operations" }, - "CVE-2018-14612": { - "cmt_msg": "btrfs: tree-checker: Detect invalid and empty essential trees", - "cmt_id": "6f33d3d8dca8683a4df94e9944296a1a1a2a6f10" + "CVE-2023-0459": { + "cmt_msg": "uaccess: Add speculation barrier to copy_from_user()" }, - "CVE-2018-1128": { - "cmt_msg": "libceph: add authorizer challenge", - "cmt_id": "06e925920d4de3da2114876bc607447e929604af" + "CVE-2023-0458": { + "cmt_msg": "prlimit: do_prlimit needs to have a speculation check" }, - "CVE-2018-1129": { - "cmt_msg": "libceph: implement CEPHX_V2 calculation mode", - "cmt_id": "18a23fb2632030888fc56a7df73a80f57445718f" + "CVE-2017-8924": { + "cmt_msg": "USB: serial: io_ti: fix information leak in completion handler" }, - "CVE-2018-18690": { - "cmt_msg": "xfs: don't fail when converting shortform attr to long form during ATTR_REPLACE", - "cmt_id": "4ec44e98ab08c704d0ff1a35a21a0682a5562a27" + "CVE-2017-8925": { + "cmt_msg": "USB: serial: omninet: fix reference leaks at open" }, - "CVE-2018-16862": { - "cmt_msg": "mm: cleancache: fix corruption on missed inode invalidation", - "cmt_id": "60b3d44f05c148f6f7f5e5b2a8165d328c3f22a0" + "CVE-2021-30002": { + "cmt_msg": "media: v4l: ioctl: Fix memory leak in video_usercopy" }, - "CVE-2018-14614": { - "cmt_msg": "f2fs: fix to do sanity check with cp_pack_start_sum", - "cmt_id": "91fe514bedf4c72ae8046fe4cfa98c5e201f6b84" + "CVE-2021-0941": { + "cmt_msg": "bpf: Remove MTU check in __bpf_skb_max_len" }, - "CVE-2018-13096": { - "cmt_msg": "f2fs: fix to do sanity check with node footer and iblocks", - "cmt_id": "1c87980591a1dc8c5eafdcc5f9953fca4e518465" - } - }, - "4.9.145": { - "CVE-2018-20169": { - "cmt_msg": "USB: check usb_get_extra_descriptor for proper size", - "cmt_id": "fe26b8d06e965239795bee0a71c9073bed931716" + "CVE-2017-7294": { + "cmt_msg": "drm/vmwgfx: fix integer overflow in vmw_surface_define_ioctl()" }, - "CVE-2018-5953": { - "cmt_msg": "printk: hash addresses printed with %p", - "cmt_id": "adcc5726f1402e7ea39bebd08688efcc09ba4d26" + "CVE-2020-15802": { + "cmt_msg": "" }, - "CVE-2018-14625": { - "cmt_msg": "vhost/vsock: fix use-after-free in network stack callers", - "cmt_id": "569fc4ffb5de8f12fe01759f0b85098b7b9bba8e" + "CVE-2022-3636": { + "cmt_msg": "net: ethernet: mtk_eth_soc: use after free in __mtk_ppe_check_skb()" }, - "CVE-2018-19824": { - "cmt_msg": "ALSA: usb-audio: Fix UAF decrement if card has no live interfaces in card.c", - "cmt_id": "73000a4cec933fd331224df79df731ea929bb85c" - } - }, - "4.9.148": { - "CVE-2018-19985": { - "cmt_msg": "USB: hso: Fix OOB memory access in hso_probe/hso_get_config_data", - "cmt_id": "5501175cb1975239add62a521cfbedcf76b93d8d" - } - }, - "4.9.150": { - "CVE-2019-15927": { - "cmt_msg": "ALSA: usb-audio: Avoid access before bLength check in build_audio_procunit()", - "cmt_id": "beab6f305f4f271caa500170d7fed1d2bda6ea88" + "CVE-2022-3635": { + "cmt_msg": "atm: idt77252: fix use-after-free bugs caused by tst_timer" }, - "CVE-2019-6133": { - "cmt_msg": "fork: record start_time late", - "cmt_id": "0ea6030b555803b9c565e0471c94648fe2a4bda7" - } - }, - "4.9.151": { - "CVE-2018-16884": { - "cmt_msg": "sunrpc: use-after-free in svc_process_common()", - "cmt_id": "37c791a031ece3afeb9c8b023397473a5349f171" - } - }, - "4.9.152": { - "CVE-2019-3701": { - "cmt_msg": "can: gw: ensure DLC boundaries after CAN frame modification", - "cmt_id": "d379b338387e3d5a9b5ebe5ab16656a9c65c988d" + "CVE-2021-28715": { + "cmt_msg": "xen/netback: don't queue unlimited number of packages" }, - "CVE-2020-10769": { - "cmt_msg": "crypto: authenc - fix parsing key with misaligned rta_len", - "cmt_id": "6ddfcf0b4c6ce7cfeb5d9e36d991345f3fe6e600" - } - }, - "4.9.156": { - "CVE-2019-7222": { - "cmt_msg": "KVM: x86: work around leak of uninitialized stack contents (CVE-2019-7222)", - "cmt_id": "f5c61e4f6b5a1cc66c61eb68334f725031948a7e" + "CVE-2022-34918": { + "cmt_msg": "netfilter: nf_tables: stricter validation of element data" }, - "CVE-2019-6974": { - "cmt_msg": "kvm: fix kvm_ioctl_create_device() reference counting (CVE-2019-6974)", - "cmt_id": "0c42df1f9f82f73ebc6c0f54b1df295ffc5a7b4b" + "CVE-2021-47028": { + "cmt_msg": "mt76: mt7915: fix txrate reporting" }, - "CVE-2019-7221": { - "cmt_msg": "KVM: nVMX: unconditionally cancel preemption timer in free_nested (CVE-2019-7221)", - "cmt_id": "a2c34d20660f24a40b46d0d341547b84f3fff3b0" - } - }, - "4.9.159": { - "CVE-2018-1000026": { - "cmt_msg": "bnx2x: disable GSO where gso_size is too big for hardware", - "cmt_id": "f3fe2c72a7b7361a306ca1b51387bb2f995216a2" - } - }, - "4.9.162": { - "CVE-2019-9213": { - "cmt_msg": "mm: enforce min addr even if capable() in expand_downwards()", - "cmt_id": "331fc4df776be3e5a88a1a9f08ef2f7e063ef1a9" - } - }, - "4.9.163": { - "CVE-2019-2101": { - "cmt_msg": "media: uvcvideo: Fix 'type' check leading to overflow", - "cmt_id": "47d77d464e574d56eecb39677df7bc6663635a3f" + "CVE-2017-18261": { + "cmt_msg": "clocksource/drivers/arm_arch_timer: Avoid infinite recursion when ftrace is enabled" }, - "CVE-2019-12818": { - "cmt_msg": "net: nfc: Fix NULL dereference on nfc_llcp_build_tlv fails", - "cmt_id": "05d3d2d0b8574d0f61d12a64e2c6475a5c3d5ba6" + "CVE-2018-5814": { + "cmt_msg": "usbip: usbip_host: fix NULL-ptr deref and use-after-free errors" }, - "CVE-2019-8980": { - "cmt_msg": "exec: Fix mem leak in kernel_read_file", - "cmt_id": "dd6734e17903f16a47c78d0418f02e06df080c54" + "CVE-2021-43389": { + "cmt_msg": "isdn: cpai: check ctr->cnr to avoid array index out of bound" }, - "CVE-2019-15916": { - "cmt_msg": "net-sysfs: Fix mem leak in netdev_register_kobject", - "cmt_id": "d81778b842536c9437acb43138f3fc8520b1b12c" - } - }, - "4.9.164": { - "CVE-2019-16995": { - "cmt_msg": "net: hsr: fix memory leak in hsr_dev_finalize()", - "cmt_id": "a582b20fd743237ce145b45aacf9f6c24962029a" + "CVE-2023-1074": { + "cmt_msg": "sctp: fail if no bound addresses can be used for a given scope" }, - "CVE-2019-12819": { - "cmt_msg": "mdio_bus: Fix use-after-free on device_register fails", - "cmt_id": "c4bec922def2285707cd3be3a80be46467ad8cde" - } - }, - "4.9.165": { - "CVE-2019-10124": { - "cmt_msg": "mm: hwpoison: fix thp split handing in soft_offline_in_use_page()", - "cmt_id": "78f42f1156fd661f708cadd9ad9c3f0ac039b411" + "CVE-2023-1077": { + "cmt_msg": "sched/rt: pick_next_rt_entity(): check list_entry" }, - "CVE-2019-9455": { - "cmt_msg": "media: videobuf2-v4l2: drop WARN_ON in vb2_warn_zero_bytesused()", - "cmt_id": "7f422aa63d5a0905232455a8953cd9bc02eab4da" + "CVE-2023-40283": { + "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb" }, - "CVE-2019-16413": { - "cmt_msg": "9p: use inode->i_lock to protect i_size_write() under 32-bit", - "cmt_id": "0a97dbd82f40bcb888110a7d6860bac4a5819502" - } - }, - "4.9.167": { - "CVE-2019-3459": { - "cmt_msg": "Bluetooth: Verify that l2cap_get_conf_opt provides large enough buffer", - "cmt_id": "99665dcf6ff803351b5e658f3a929cb498561e36" + "CVE-2023-1073": { + "cmt_msg": "HID: check empty report_list in hid_validate_values()" }, - "CVE-2019-20054": { - "cmt_msg": "fs/proc/proc_sysctl.c: fix NULL pointer dereference in put_links", - "cmt_id": "28f0641fbaa06dccf49903bb074ac7b3aa3dde85" + "CVE-2018-13093": { + "cmt_msg": "xfs: validate cached inodes are free when allocated" }, - "CVE-2019-3460": { - "cmt_msg": "Bluetooth: Check L2CAP option sizes returned from l2cap_get_conf_opt", - "cmt_id": "def5c1fbee851e9c044ce9fa647238efc15458b4" - } - }, - "4.9.168": { - "CVE-2017-18551": { - "cmt_msg": "i2c: core-smbus: prevent stack corruption on read I2C_BLOCK_DATA", - "cmt_id": "2555029ac9d474d3dc1b66ff48b1c773e8446af5" + "CVE-2018-13096": { + "cmt_msg": "f2fs: fix to do sanity check with node footer and iblocks" }, - "CVE-2019-11810": { - "cmt_msg": "scsi: megaraid_sas: return error when create DMA pool failed", - "cmt_id": "650c8ec81f458472eda16883acd5dbf37c5049dc" + "CVE-2018-13097": { + "cmt_msg": "f2fs: fix to do sanity check with user_block_count" }, - "CVE-2019-9454": { - "cmt_msg": "i2c: core-smbus: prevent stack corruption on read I2C_BLOCK_DATA", - "cmt_id": "2555029ac9d474d3dc1b66ff48b1c773e8446af5" - } - }, - "4.9.169": { - "CVE-2019-11486": { - "cmt_msg": "tty: mark Siemens R3964 line discipline as BROKEN", - "cmt_id": "942ddc0de8efb52c43250033c7c6091f15e191f5" + "CVE-2018-13094": { + "cmt_msg": "xfs: don't call xfs_da_shrink_inode with NULL bp" }, - "CVE-2019-11815": { - "cmt_msg": "net: rds: force to destroy connection if t_sock is NULL in rds_tcp_kill_sock().", - "cmt_id": "a1aa69beac4d88dfb892a95ee04fe6f932803952" + "CVE-2018-13095": { + "cmt_msg": "xfs: More robust inode extent count validation" }, - "CVE-2019-10639": { - "cmt_msg": "netns: provide pure entropy for net_hash_mix()", - "cmt_id": "6996763856e1fb27ccae260e41fd73a3fff56678" - } - }, - "4.9.170": { - "CVE-2019-15292": { - "cmt_msg": "appletalk: Fix use-after-free in atalk_proc_exit", - "cmt_id": "057a0da1899f00a4ac9a4c4c452cf2cf652bdbf0" - } - }, - "4.9.171": { - "CVE-2018-5995": { - "cmt_msg": "printk: hash addresses printed with %p", - "cmt_id": "2c4ae3a694fabfc19b0fc6e65d530a7cdb542bda" + "CVE-2018-13098": { + "cmt_msg": "f2fs: fix to do sanity check with extra_attr feature" }, - "CVE-2019-15214": { - "cmt_msg": "ALSA: core: Fix card races between register and disconnect", - "cmt_id": "d944299e7a6fce01db3603bc55d51ef336c19cc4" - } - }, - "4.9.172": { - "CVE-2019-15924": { - "cmt_msg": "fm10k: Fix a potential NULL pointer dereference", - "cmt_id": "0648cd7304cfba4fe4959f133e4bdf00f2909059" - } - }, - "4.9.173": { - "CVE-2019-3882": { - "cmt_msg": "vfio/type1: Limit DMA mappings per container", - "cmt_id": "4f97abd571ec3d56c50a2edfe0932059f4549afa" - } - }, - "4.9.174": { - "CVE-2019-15216": { - "cmt_msg": "USB: yurex: Fix protection fault after device removal", - "cmt_id": "965cc8406cf38d6e535b264f5906211c3e5e33b7" - } - }, - "4.9.175": { - "CVE-2018-20836": { - "cmt_msg": "scsi: libsas: fix a race condition when smp task timeout", - "cmt_id": "41b5d3eee4af6a4ea488a1735ed82e4e593eec0d" + "CVE-2018-13099": { + "cmt_msg": "f2fs: fix to do sanity check with reserved blkaddr of inline inode" }, "CVE-2019-11884": { - "cmt_msg": "Bluetooth: hidp: fix buffer overflow", - "cmt_id": "0d134aebfd7222dc946437ea2941b94fa64be605" - } - }, - "4.9.177": { - "CVE-2019-10142": { - "cmt_msg": "drivers/virt/fsl_hypervisor.c: prevent integer overflow in ioctl", - "cmt_id": "71e29a15b4babddba1a6faab6d98d2dcce1cd0ff" - } - }, - "4.9.178": { - "CVE-2019-11833": { - "cmt_msg": "ext4: zero out the unused memory region in the extent tree block", - "cmt_id": "ab6d14e83db6e08c39a867a4cba378f7a774d273" - } - }, - "4.9.179": { - "CVE-2019-15666": { - "cmt_msg": "xfrm: policy: Fix out-of-bound array accesses in __xfrm_policy_unlink", - "cmt_id": "7c96721f56b02fdf7b191aee0d39690ab4f40dc5" - } - }, - "4.9.180": { - "CVE-2019-19966": { - "cmt_msg": "media: cpia2: Fix use-after-free in cpia2_exit", - "cmt_id": "14734c3c582387e84c4c7c8c9469c274b41ff2b3" + "cmt_msg": "Bluetooth: hidp: fix buffer overflow" }, - "CVE-2019-20095": { - "cmt_msg": "mwifiex: Fix mem leak in mwifiex_tm_cmd", - "cmt_id": "5ff8545c6abda22e70728a69fcb4c8cc3ce87880" - } - }, - "4.9.181": { - "CVE-2020-10720": { - "cmt_msg": "net-gro: fix use-after-free read in napi_gro_frags()", - "cmt_id": "12855df4065b6e13878d7b8abc948aa719295bc1" + "CVE-2019-11810": { + "cmt_msg": "scsi: megaraid_sas: return error when create DMA pool failed" }, - "CVE-2018-20510": { - "cmt_msg": "binder: replace \"%p\" with \"%pK\"", - "cmt_id": "6f3433c47e8223c97746ad227d1e6f5531e0758a" + "CVE-2019-18683": { + "cmt_msg": "media: vivid: Fix wrong locking that causes race conditions on streaming stop" }, - "CVE-2019-15219": { - "cmt_msg": "USB: sisusbvga: fix oops in error path of sisusb_probe", - "cmt_id": "a45f178bcbf22d4c5c6e76dcc26e2b849cda6408" + "CVE-2019-18680": { + "cmt_msg": "unknown" }, - "CVE-2019-15218": { - "cmt_msg": "media: usb: siano: Fix general protection fault in smsusb", - "cmt_id": "6ecd1809002699377d2b3b95b170d636f8a60eb4" + "CVE-2021-45868": { + "cmt_msg": "quota: check block number when reading the block in quota file" }, - "CVE-2019-15212": { - "cmt_msg": "USB: rio500: refuse more than one device at a time", - "cmt_id": "6496f8ef3242b57f285e5c89134ad95dec17ab62" + "CVE-2022-20158": { + "cmt_msg": "net/packet: fix slab-out-of-bounds access in packet_recvmsg()" }, - "CVE-2019-9466": { - "cmt_msg": "brcmfmac: add subtype check for event handling in data path", - "cmt_id": "433b957a9e2df0305c1273011aa6e6cc0f8f815d" + "CVE-2020-0404": { + "cmt_msg": "media: uvcvideo: Avoid cyclic entity chains due to malformed USB descriptors" }, - "CVE-2019-9500": { - "cmt_msg": "brcmfmac: assure SSID length from firmware is limited", - "cmt_id": "76e7e98e229ae8fa7f4b30a6fd2bb3cd2ad26a67" + "CVE-2022-39188": { + "cmt_msg": "mmu_gather: Force tlb-flush VM_PFNMAP vmas" }, - "CVE-2019-9503": { - "cmt_msg": "brcmfmac: add subtype check for event handling in data path", - "cmt_id": "433b957a9e2df0305c1273011aa6e6cc0f8f815d" + "CVE-2020-27067": { + "cmt_msg": "l2tp: fix l2tp_eth module loading" }, - "CVE-2019-11487": { - "cmt_msg": "fs: prevent page refcount overflow in pipe_buf_get", - "cmt_id": "9557090582a33801349f0a0920a55d134a27e740" - } - }, - "4.9.182": { - "CVE-2019-11479": { - "cmt_msg": "tcp: add tcp_min_snd_mss sysctl", - "cmt_id": "8e39cbc03dafa3731d22533f869bf326c0e6e6f8" + "CVE-2020-27066": { + "cmt_msg": "xfrm: policy: Fix doulbe free in xfrm_policy_timer" }, - "CVE-2019-11478": { - "cmt_msg": "tcp: tcp_fragment() should apply sane memory limits", - "cmt_id": "e358f4af19db46ca25cc9a8a78412b09ba98859d" + "CVE-2017-5986": { + "cmt_msg": "sctp: avoid BUG_ON on sctp_wait_for_sndbuf" }, - "CVE-2019-11477": { - "cmt_msg": "tcp: limit payload size of sacked skbs", - "cmt_id": "cc1b58ccb78e0de51bcec1f2914d9296260668bd" - } - }, - "4.9.183": { - "CVE-2019-15807": { - "cmt_msg": "scsi: libsas: delete sas port if expander discover failed", - "cmt_id": "1d28cf14a89c400fa55f6f9a9a4ca3bc34094b34" - } - }, - "4.9.185": { - "CVE-2019-13272": { - "cmt_msg": "ptrace: Fix ->ptracer_cred handling for PTRACE_TRACEME", - "cmt_id": "d8b99303da935228a33fa7656a964adfb33e271b" + "CVE-2024-23307": { + "cmt_msg": "md/raid5: fix atomicity violation in raid5_cache_count" }, - "CVE-2019-15221": { - "cmt_msg": "ALSA: line6: Fix write on zero-sized buffer", - "cmt_id": "8b449e9dc215e47641c4737a199b7767ffd032a9" + "CVE-2017-0861": { + "cmt_msg": "ALSA: pcm: prevent UAF in snd_pcm_info" }, - "CVE-2019-0136": { - "cmt_msg": "mac80211: drop robust management frames from unknown TA", - "cmt_id": "9f0f5ff93ed0205a90f11103e9937f3c0417cd4b" + "CVE-2020-15393": { + "cmt_msg": "usb: usbtest: fix missing kfree(dev->buf) in usbtest_disconnect" }, - "CVE-2019-9506": { - "cmt_msg": "Bluetooth: Fix faulty expression for minimum encryption key size check", - "cmt_id": "f470557724f2c94c25e4f6480a41612cf42aff26" - } - }, - "4.9.186": { - "CVE-2019-10126": { - "cmt_msg": "mwifiex: Fix heap overflow in mwifiex_uap_parse_tail_ies()", - "cmt_id": "f70d411e2ecd1f8297e1fd7e91108ca220986784" + "CVE-2021-3564": { + "cmt_msg": "Bluetooth: fix the erroneous flush_work() order" }, - "CVE-2019-3846": { - "cmt_msg": "mwifiex: Fix possible buffer overflows at parsing bss descriptor", - "cmt_id": "58ec3690a908494f7a7c3e8a302eb491bef9d979" + "CVE-2017-13080": { + "cmt_msg": "mac80211: accept key reinstall without changing anything" }, - "CVE-2019-15220": { - "cmt_msg": "p54usb: Fix race between disconnect and firmware loading", - "cmt_id": "feca0ce34518f69447d0d13cd431d0eef647a794" - } - }, - "4.9.187": { - "CVE-2019-17351": { - "cmt_msg": "xen: let alloc_xenballooned_pages() fail if not enough memory free", - "cmt_id": "259b0fc2caddc21a6b561b595747a8091102f7ff" + "CVE-2018-12127": { + "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" + }, + "CVE-2018-12126": { + "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" + }, + "CVE-2021-28964": { + "cmt_msg": "btrfs: fix race when cloning extent buffer during rewind of an old root" }, "CVE-2019-13631": { - "cmt_msg": "Input: gtco - bounds check collection indent level", - "cmt_id": "2628fa1a6d824ee1f3fe67a272a3d00ba33d23fa" + "cmt_msg": "Input: gtco - bounds check collection indent level" }, - "CVE-2019-20934": { - "cmt_msg": "sched/fair: Don't free p->numa_faults with concurrent readers", - "cmt_id": "837ffc9723f04aeb5bf252ef926c16aea1f5a0ee" + "CVE-2018-12233": { + "cmt_msg": "jfs: Fix inconsistency between memory allocation and ea_buf->max_size" }, - "CVE-2019-15211": { - "cmt_msg": "media: radio-raremono: change devm_k*alloc to k*alloc", - "cmt_id": "4c0a7ec4b98f2e75ac974140291d3c8c6642145c" + "CVE-2018-9465": { + "cmt_msg": "binder: fix proc->files use-after-free" }, - "CVE-2019-10207": { - "cmt_msg": "Bluetooth: hci_uart: check for missing tty operations", - "cmt_id": "58a01b0bd8ea5fddb51d4d854bb149a1a7312c12" + "CVE-2020-8649": { + "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region" }, - "CVE-2019-15215": { - "cmt_msg": "media: cpia2_usb: first wake up, then free in disconnect", - "cmt_id": "0b8a71a8bd2129ca9cc115195fd9630564765772" + "CVE-2020-8648": { + "cmt_msg": "vt: selection, close sel_buffer race" }, - "CVE-2019-15926": { - "cmt_msg": "ath6kl: add some bounds checking", - "cmt_id": "8e8b0ba1dc67d1cba76ac9cada76ae3a9732d1e3" + "CVE-2020-8647": { + "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region" }, - "CVE-2017-18509": { - "cmt_msg": "ipv6: check sk sk_type and protocol early in ip_mroute_set/getsockopt", - "cmt_id": "1e531ad4316cb47c6c2b42f3257d1841a6e837e7" + "CVE-2019-0155": { + "cmt_msg": "drm/i915: Rename gen7 cmdparser tables" }, - "CVE-2019-15239": { - "cmt_msg": "unknown", - "cmt_id": "704533394e488a109fe46ab3693315376c3824d5" + "CVE-2019-0154": { + "cmt_msg": "drm/i915: Lower RM timeout to avoid DSI hard hangs" }, - "CVE-2019-14284": { - "cmt_msg": "floppy: fix div-by-zero in setup_format_params", - "cmt_id": "604206cde7a6c1907f6f03d90c37505a45ef1b62" + "CVE-2023-35827": { + "cmt_msg": "ravb: Fix use-after-free issue in ravb_tx_timeout_work()" }, - "CVE-2019-14283": { - "cmt_msg": "floppy: fix out-of-bounds read in copy_buffer", - "cmt_id": "1fdefbb5bc70ff20ea49083c6984aae86e3ecf93" + "CVE-2023-52585": { + "cmt_msg": "drm/amdgpu: Fix possible NULL dereference in amdgpu_ras_query_error_status_helper()" }, - "CVE-2019-13648": { - "cmt_msg": "powerpc/tm: Fix oops on sigreturn on systems without TM", - "cmt_id": "08ee34d86c9c6a9b93c0986d7fc6e272690e8d24" - } - }, - "4.9.188": { - "CVE-2019-11599": { - "cmt_msg": "coredump: fix race condition between mmget_not_zero()/get_task_mm() and core dumping", - "cmt_id": "16903f1a5ba7707c051edfdfa457620bba45e2c9" + "CVE-2023-52584": { + "cmt_msg": "spmi: mediatek: Fix UAF on device remove" }, - "CVE-2019-3892": { - "cmt_msg": "coredump: fix race condition between mmget_not_zero()/get_task_mm() and core dumping", - "cmt_id": "16903f1a5ba7707c051edfdfa457620bba45e2c9" - } - }, - "4.9.189": { - "CVE-2018-20856": { - "cmt_msg": "block: blk_init_allocated_queue() set q->fq as NULL in the fail case", - "cmt_id": "c19199167c87841006350cc7c0a59881416e8748" + "CVE-2023-52587": { + "cmt_msg": "IB/ipoib: Fix mcast list locking" }, - "CVE-2019-1125": { - "cmt_msg": "x86/speculation: Prepare entry code for Spectre v1 swapgs mitigations", - "cmt_id": "e90ec5e2b679fd882a0f59eb1bf155d96b34b29c" - } - }, - "4.9.190": { - "CVE-2019-3900": { - "cmt_msg": "vhost_net: fix possible infinite loop", - "cmt_id": "4b586288578a3a2aa4efb969feed86f2d760f082" + "CVE-2023-52586": { + "cmt_msg": "drm/msm/dpu: Add mutex lock in control vblank irq" }, - "CVE-2019-10638": { - "cmt_msg": "inet: switch IP ID generator to siphash", - "cmt_id": "b97a2f3d58f439d11ececb2faa21dac775d63c5c" + "CVE-2023-52583": { + "cmt_msg": "ceph: fix deadlock or deadcode of misusing dget()" }, - "CVE-2019-19536": { - "cmt_msg": "can: peak_usb: pcan_usb_pro: Fix info-leaks to USB devices", - "cmt_id": "0cad79bfb5aa596b9449fe66b0edf69a8344326c" + "CVE-2023-52589": { + "cmt_msg": "media: rkisp1: Fix IRQ disable race issue" }, - "CVE-2019-19537": { - "cmt_msg": "USB: core: Fix races in character device registration and deregistraion", - "cmt_id": "741b832658b98463d619fe4c320f8ab11b2ad4ee" + "CVE-2023-52588": { + "cmt_msg": "f2fs: fix to tag gcing flag on page during block migration" }, - "CVE-2019-19527": { - "cmt_msg": "HID: hiddev: do cleanup in failure of opening a device", - "cmt_id": "963a14fb9c43f0a6b38fbe3da0b894a147c71388" + "CVE-2023-52340": { + "cmt_msg": "ipv6: remove max_size check inline with ipv4" }, - "CVE-2019-19535": { - "cmt_msg": "can: peak_usb: pcan_usb_fd: Fix info-leaks to USB devices", - "cmt_id": "127ab64c38e21c55adf8781ca92f7dc9d1a9903e" + "CVE-2021-46969": { + "cmt_msg": "bus: mhi: core: Fix invalid error returning in mhi_queue" }, - "CVE-2019-19530": { - "cmt_msg": "usb: cdc-acm: make sure a refcount is taken early enough", - "cmt_id": "fccd6134d5addf2be1407e3250efdc854b5c5d8a" + "CVE-2020-16120": { + "cmt_msg": "ovl: switch to mounter creds in readdir" }, - "CVE-2019-19531": { - "cmt_msg": "usb: yurex: Fix use-after-free in yurex_delete", - "cmt_id": "e253114f73134cf6f29b453176fb537441e12371" - } - }, - "4.9.191": { - "CVE-2019-15118": { - "cmt_msg": "ALSA: usb-audio: Fix a stack buffer overflow bug in check_input_term", - "cmt_id": "2bac3a35488148f066d355ebfe44a872aa9a7546" + "CVE-2019-17666": { + "cmt_msg": "rtlwifi: Fix potential overflow on P2P code" }, - "CVE-2019-15538": { - "cmt_msg": "xfs: fix missing ILOCK unlock when xfs_setattr_nonsize fails due to EDQUOT", - "cmt_id": "4862942c590646fe46e33ce4a6d35da4d8ee188e" + "CVE-2018-15471": { + "cmt_msg": "xen-netback: fix input validation in xenvif_set_hash_mapping()" }, - "CVE-2019-15902": { - "cmt_msg": "unknown", - "cmt_id": "69f692bb7e684592aaba779299bc576626d414b4" + "CVE-2021-34693": { + "cmt_msg": "can: bcm: fix infoleak in struct bcm_msg_head" }, - "CVE-2019-15117": { - "cmt_msg": "ALSA: usb-audio: Fix an OOB bug in parse_audio_mixer_unit", - "cmt_id": "53856af73d8577a4017b9762d7406f47df192bed" - } - }, - "4.9.193": { - "CVE-2019-14835": { - "cmt_msg": "vhost: make sure log_num < in_num", - "cmt_id": "8d8276867b5ac539f1d6e166a028b51c8b1ceda8" - } - }, - "4.9.194": { - "CVE-2019-14816": { - "cmt_msg": "mwifiex: Fix three heap overflow at parsing element in cfg80211_ap_settings", - "cmt_id": "21dfacaf201ed13af70a8bd3e66bcf18cdb63b35" + "CVE-2020-11494": { + "cmt_msg": "slcan: Don't transmit uninitialized stack data in padding" }, - "CVE-2019-14814": { - "cmt_msg": "mwifiex: Fix three heap overflow at parsing element in cfg80211_ap_settings", - "cmt_id": "21dfacaf201ed13af70a8bd3e66bcf18cdb63b35" + "CVE-2024-26797": { + "cmt_msg": "drm/amd/display: Prevent potential buffer overflow in map_hw_resources" }, - "CVE-2019-15505": { - "cmt_msg": "media: technisat-usb2: break out of loop at end of buffer", - "cmt_id": "994c6dcb4307759d440b8031e140d343b8611481" + "CVE-2024-26791": { + "cmt_msg": "btrfs: dev-replace: properly validate device names" }, - "CVE-2019-14821": { - "cmt_msg": "KVM: coalesced_mmio: add bounds checking", - "cmt_id": "52cb3fd60ec0a1c9b61cd28bae4e8c1d377e7b60" - } - }, - "4.9.195": { - "CVE-2019-17056": { - "cmt_msg": "nfc: enforce CAP_NET_RAW for raw sockets", - "cmt_id": "45a9e9bc5d6742988df799dafbf26dca8e0dada3" + "CVE-2024-26793": { + "cmt_msg": "gtp: fix use-after-free and null-ptr-deref in gtp_newlink()" }, - "CVE-2019-17053": { - "cmt_msg": "ieee802154: enforce CAP_NET_RAW for raw sockets", - "cmt_id": "ddca1f39c8980cb19db5ea6d51b8549288a7421b" + "CVE-2022-30594": { + "cmt_msg": "ptrace: Check PTRACE_O_SUSPEND_SECCOMP permission on PTRACE_SEIZE" }, - "CVE-2019-17052": { - "cmt_msg": "ax25: enforce CAP_NET_RAW for raw sockets", - "cmt_id": "73b8d26c842a5a3be34a321beab1f97939d9794b" + "CVE-2024-26798": { + "cmt_msg": "fbcon: always restore the old font data in fbcon_do_set_font()" }, - "CVE-2019-19533": { - "cmt_msg": "media: ttusb-dec: Fix info-leak in ttusb_dec_send_command()", - "cmt_id": "70d5b96a1ed385a0ef520a44a18fbf6d795f1b84" + "CVE-2021-38204": { + "cmt_msg": "usb: max-3421: Prevent corruption of freed memory" }, - "CVE-2019-17055": { - "cmt_msg": "mISDN: enforce CAP_NET_RAW for raw sockets", - "cmt_id": "bb439ee217acbf7835af634f08875540c514632f" + "CVE-2021-38205": { + "cmt_msg": "net: xilinx_emaclite: Do not print real IOMEM pointer" }, - "CVE-2019-17054": { - "cmt_msg": "appletalk: enforce CAP_NET_RAW for raw sockets", - "cmt_id": "08d2af9358c1937acf97417dba9a03a40149c4d2" - } - }, - "4.9.196": { - "CVE-2019-2215": { - "cmt_msg": "ANDROID: binder: remove waitqueue when thread exits.", - "cmt_id": "a494a71146a1cf3f48bb94cf33981db1f027e6a0" + "CVE-2020-0255": { + "cmt_msg": "selinux: properly handle multiple messages in selinux_netlink_send()" }, - "CVE-2020-0030": { - "cmt_msg": "ANDROID: binder: synchronize_rcu() when using POLLFREE.", - "cmt_id": "b6c6212514fe9f2387fc6677181028d4a9ae20c7" + "CVE-2023-35001": { + "cmt_msg": "netfilter: nf_tables: prevent OOB access in nft_byteorder_eval" }, - "CVE-2019-18806": { - "cmt_msg": "net: qlogic: Fix memory leak in ql_alloc_large_buffers", - "cmt_id": "3ae6d4c9473378d57bcad5a6e102c8ba42efd014" - } - }, - "4.9.197": { - "CVE-2019-19525": { - "cmt_msg": "ieee802154: atusb: fix use-after-free at disconnect", - "cmt_id": "2f2f3ffa761793f2db2f3b0bc6476a069061cb9c" + "CVE-2021-38208": { + "cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect" }, - "CVE-2019-16746": { - "cmt_msg": "nl80211: validate beacon head", - "cmt_id": "a873afd7d888f7349bfabc9191afeb20eb1d3a45" + "CVE-2018-1108": { + "cmt_msg": "random: fix crng_ready() test" }, - "CVE-2018-20976": { - "cmt_msg": "xfs: clear sb->s_fs_info on mount failure", - "cmt_id": "e6e3f36b1ac9c439d3bc0b2c2aaf1663ad705ac0" + "CVE-2017-18232": { + "cmt_msg": "scsi: libsas: direct call probe and destruct" }, - "CVE-2019-19523": { - "cmt_msg": "USB: adutux: fix use-after-free on disconnect", - "cmt_id": "aa1b499d5f706c67a0acbe184e0ec32e8c47489b" + "CVE-2022-0168": { + "cmt_msg": "cifs: fix NULL ptr dereference in smb2_ioctl_query_info()" }, - "CVE-2019-19528": { - "cmt_msg": "USB: iowarrior: fix use-after-free on disconnect", - "cmt_id": "323f425a7618fdb0b961dec2c58685fa32eafa1b" - } - }, - "4.9.198": { - "CVE-2019-17075": { - "cmt_msg": "RDMA/cxgb4: Do not dma memory off of the stack", - "cmt_id": "84f5b67df81a9f333afa81855f6fa3fdcd954463" + "CVE-2020-26556": { + "cmt_msg": "" }, - "CVE-2019-17133": { - "cmt_msg": "cfg80211: wext: avoid copying malformed SSIDs", - "cmt_id": "49d84740f8a7040354ef93bf5915a4b3e651e71b" - } - }, - "4.9.199": { - "CVE-2020-10773": { - "cmt_msg": "s390/cmm: fix information leak in cmm_timeout_handler()", - "cmt_id": "8dc59b45792c801efa55e5463818bd08e5e16ded" + "CVE-2018-9518": { + "cmt_msg": "NFC: llcp: Limit size of SDP URI" }, - "CVE-2019-17666": { - "cmt_msg": "rtlwifi: Fix potential overflow on P2P code", - "cmt_id": "4a2fbab9e82fb662ad3419525742a1ddfc29a7b9" + "CVE-2024-26778": { + "cmt_msg": "fbdev: savage: Error out if pixclock equals zero" }, - "CVE-2019-19532": { - "cmt_msg": "HID: Fix assumption that devices have inputs", - "cmt_id": "7b5e3ad5d582e252d971ee599a3f63f30b70ccb1" + "CVE-2020-26555": { + "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical" }, - "CVE-2019-15098": { - "cmt_msg": "ath6kl: fix a NULL-ptr-deref bug in ath6kl_usb_alloc_urb_from_pipe()", - "cmt_id": "3c7f02d13b8d72dbb1dd9b0fe858459d263b1fbd" - } - }, - "4.9.200": { - "CVE-2019-18282": { - "cmt_msg": "net/flow_dissector: switch to siphash", - "cmt_id": "1f94465d13ace2d4610c4eb2b362454ce2a9d87c" + "CVE-2024-26776": { + "cmt_msg": "spi: hisi-sfc-v3xx: Return IRQ_NONE if no interrupts were detected" }, - "CVE-2019-19049": { - "cmt_msg": "of: unittest: fix memory leak in unittest_data_add", - "cmt_id": "0228cd262dda0916948b52a74b88fa1f8b3cc810" - } - }, - "4.9.201": { - "CVE-2019-16231": { - "cmt_msg": "fjes: Handle workqueue allocation failure", - "cmt_id": "76e62b04f78f6ae3f13dfbebf1f49b78e8cc938b" + "CVE-2024-26777": { + "cmt_msg": "fbdev: sis: Error out if pixclock equals zero" }, - "CVE-2019-19534": { - "cmt_msg": "can: peak_usb: fix slab info leak", - "cmt_id": "da281558d20bfbf82823cab457ba7d343ba6b0a0" + "CVE-2020-26558": { + "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical" }, - "CVE-2019-0155": { - "cmt_msg": "drm/i915: Rename gen7 cmdparser tables", - "cmt_id": "64003d092ec9b9ecf03984513aee106c15b411e7" + "CVE-2023-3390": { + "cmt_msg": "netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE" }, - "CVE-2019-0154": { - "cmt_msg": "drm/i915: Lower RM timeout to avoid DSI hard hangs", - "cmt_id": "ebd6ded190ed0920c16eb63f274b50ca050e46fb" + "CVE-2023-3397": { + "cmt_msg": "" }, - "CVE-2019-19052": { - "cmt_msg": "can: gs_usb: gs_can_open(): prevent memory leak", - "cmt_id": "b46a2067f36d7c5f2f259c4ed476359e6e9d668f" - } - }, - "4.9.202": { - "CVE-2019-15917": { - "cmt_msg": "Bluetooth: hci_ldisc: Postpone HCI_UART_PROTO_READY bit set in hci_uart_set_proto()", - "cmt_id": "3858f013de0ae5a19b8276944e12fd01b0cac979" + "CVE-2024-26773": { + "cmt_msg": "ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found()" }, - "CVE-2019-11135": { - "cmt_msg": "x86/msr: Add the IA32_TSX_CTRL MSR", - "cmt_id": "2fc508384968d5796e005bf85d2daf2f16510119" - } - }, - "4.9.203": { - "CVE-2019-19524": { - "cmt_msg": "Input: ff-memless - kill timer in destroy()", - "cmt_id": "1ce4561d12a08be9de2f2ef8ace700e55fc4835c" - } - }, - "4.9.204": { - "CVE-2019-18660": { - "cmt_msg": "powerpc/book3s64: Fix link stack flush on context switch", - "cmt_id": "113408cdaec11a6e34d4edabb134a335dd4896b3" + "CVE-2024-26770": { + "cmt_msg": "HID: nvidia-shield: Add missing null pointer checks to LED initialization" }, - "CVE-2019-15291": { - "cmt_msg": "media: b2c2-flexcop-usb: add sanity checking", - "cmt_id": "2ab1da610f23d72ab53c3951876fa44ed85e1f99" + "CVE-2024-26771": { + "cmt_msg": "dmaengine: ti: edma: Add some null pointer checks to the edma_probe" }, - "CVE-2019-18683": { - "cmt_msg": "media: vivid: Fix wrong locking that causes race conditions on streaming stop", - "cmt_id": "012a42dbc770d3e815cae536917245d74621c552" - } - }, - "4.9.206": { - "CVE-2019-12614": { - "cmt_msg": "powerpc/pseries/dlpar: Fix a missing check in dlpar_parse_cc_property()", - "cmt_id": "0fce5ef1591055ff8db33ba2c34346ef2a33155e" - } - }, - "4.9.207": { - "CVE-2019-19227": { - "cmt_msg": "appletalk: Fix potential NULL pointer dereference in unregister_snap_client", - "cmt_id": "540b341012ba9b8e2963be3241cea229d4e4804d" + "CVE-2023-28746": { + "cmt_msg": "x86/mmio: Disable KVM mitigation when X86_FEATURE_CLEAR_CPU_BUF is set" }, - "CVE-2019-19062": { - "cmt_msg": "crypto: user - fix memory leak in crypto_report", - "cmt_id": "f427e1fcf77416ed14a716416c0faf2f02a1e68b" + "CVE-2017-5754": { + "cmt_msg": "x86/cpufeatures: Add Intel feature bits for Speculation Control" }, - "CVE-2019-19332": { - "cmt_msg": "KVM: x86: fix out-of-bounds write in KVM_GET_EMULATED_CPUID (CVE-2019-19332)", - "cmt_id": "8b587e3f1424fae01f9c7e78d8d294bcb71f6f41" - } - }, - "4.9.208": { - "CVE-2019-16232": { - "cmt_msg": "libertas: fix a potential NULL pointer dereference", - "cmt_id": "6bd3745b7854f6d125d591795092d23cb5b6e803" + "CVE-2021-47119": { + "cmt_msg": "ext4: fix memory leak in ext4_fill_super" }, - "CVE-2019-19063": { - "cmt_msg": "rtlwifi: prevent memory leak in rtl_usb_probe", - "cmt_id": "4a06822bba46026212c06076284b940c0864bae4" + "CVE-2017-5753": { + "cmt_msg": "x86/cpufeatures: Add X86_BUG_SPECTRE_V[12]" }, - "CVE-2019-20812": { - "cmt_msg": "af_packet: set defaule value for tmo", - "cmt_id": "43c0e119316896fb895f0d059734e4ada480eb71" + "CVE-2024-1086": { + "cmt_msg": "netfilter: nf_tables: reject QUEUE/DROP verdict parameters" }, - "CVE-2019-19057": { - "cmt_msg": "mwifiex: pcie: Fix memory leak in mwifiex_pcie_init_evt_ring", - "cmt_id": "716156b896197824e55fc2f8244c8c43e0ed73e1" + "CVE-2016-10208": { + "cmt_msg": "ext4: validate s_first_meta_bg at mount time" }, - "CVE-2019-19447": { - "cmt_msg": "ext4: work around deleting a file with i_nlink == 0 safely", - "cmt_id": "e1513b36319dff169e409979867f39eb55a9af03" - } - }, - "4.9.209": { - "CVE-2019-18809": { - "cmt_msg": "media: usb: fix memory leak in af9005_identify_state", - "cmt_id": "129139a26325d2274a226407d1e7b6f1eb40b456" + "CVE-2022-0382": { + "cmt_msg": "net ticp:fix a kernel-infoleak in __tipc_sendmsg()" }, - "CVE-2019-19965": { - "cmt_msg": "scsi: libsas: stop discovering if oob mode is disconnected", - "cmt_id": "25d16ce23055c7aa6cdbf514565815fe8b6c3df7" - } - }, - "4.9.210": { - "CVE-2019-14895": { - "cmt_msg": "mwifiex: fix possible heap overflow in mwifiex_process_country_ie()", - "cmt_id": "efa99b6f3844bd20d46c8afd78f92a0161a4718e" + "CVE-2023-32233": { + "cmt_msg": "netfilter: nf_tables: deactivate anonymous set from preparation phase" }, - "CVE-2020-0305": { - "cmt_msg": "chardev: Avoid potential use-after-free in 'chrdev_open()'", - "cmt_id": "d2c9ee451ea8e8256fb1903a04ebaa26cb74d6f5" + "CVE-2019-15222": { + "cmt_msg": "ALSA: usb-audio: Fix gpf in snd_usb_pipe_sanity_check" }, - "CVE-2019-19066": { - "cmt_msg": "scsi: bfa: release allocated memory in case of error", - "cmt_id": "78cb846f4aea6e20fc942d7bb8930107d1c6e34f" + "CVE-2019-15223": { + "cmt_msg": "ALSA: line6: Assure canceling delayed work at disconnection" }, - "CVE-2019-20636": { - "cmt_msg": "Input: add safety guards to input_set_keycode()", - "cmt_id": "5f27f97dfed4aa29fb95b98bf5911763bd3ef038" + "CVE-2019-15220": { + "cmt_msg": "p54usb: Fix race between disconnect and firmware loading" }, - "CVE-2019-19068": { - "cmt_msg": "rtl8xxxu: prevent leaking urb", - "cmt_id": "2c00bebd0b959fe8bec6d4a1a07010394b8008e4" + "CVE-2019-15221": { + "cmt_msg": "ALSA: line6: Fix write on zero-sized buffer" }, - "CVE-2020-0431": { - "cmt_msg": "HID: hid-input: clear unmapped usages", - "cmt_id": "661967b7623b88985bdd3aeb171feb83d753aea9" + "CVE-2022-1016": { + "cmt_msg": "netfilter: nf_tables: initialize registers in nft_do_chain()" }, - "CVE-2019-14615": { - "cmt_msg": "drm/i915/gen9: Clear residual context state on context switch", - "cmt_id": "571233331e1910206ec365ac61e5b51e77cce3b9" + "CVE-2022-1011": { + "cmt_msg": "fuse: fix pipe buffer lifetime for direct_io" }, - "CVE-2019-19056": { - "cmt_msg": "mwifiex: pcie: Fix memory leak in mwifiex_pcie_alloc_cmdrsp_buf", - "cmt_id": "9bba4330671eaf1d21ac6025f950e7cca92f7aca" - } - }, - "4.9.211": { - "CVE-2019-20096": { - "cmt_msg": "dccp: Fix memleak in __feat_register_sp", - "cmt_id": "33cab7a0a84d35908c75c4b46c88769be7902556" + "CVE-2022-1012": { + "cmt_msg": "secure_seq: use the 64 bits of the siphash for port offset calculation" }, - "CVE-2019-15217": { - "cmt_msg": "media: usb:zr364xx:Fix KASAN:null-ptr-deref Read in zr364xx_vidioc_querycap", - "cmt_id": "6ba34f5de2a45050729836e3d48ed10ee53d0276" + "CVE-2023-52620": { + "cmt_msg": "netfilter: nf_tables: disallow timeout for anonymous sets" }, - "CVE-2018-21008": { - "cmt_msg": "rsi: add fix for crash during assertions", - "cmt_id": "65b32fd4eabc5209019894627b1bda65611fd1cb" + "CVE-2023-52621": { + "cmt_msg": "bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers" }, - "CVE-2019-2182": { - "cmt_msg": "arm64: Enforce BBM for huge IO/VMAP mappings", - "cmt_id": "4f45a0a170355546cc47ba7bbf3973fe187d05cf" + "CVE-2023-52622": { + "cmt_msg": "ext4: avoid online resizing failures due to oversized flex bg" }, - "CVE-2020-12652": { - "cmt_msg": "scsi: mptfusion: Fix double fetch bug in ioctl", - "cmt_id": "ddfa91a194d054fb765b919e593183794d6637d6" + "CVE-2023-52623": { + "cmt_msg": "SUNRPC: Fix a suspicious RCU usage warning" }, - "CVE-2019-5108": { - "cmt_msg": "mac80211: Do not send Layer 2 Update frame before authorization", - "cmt_id": "ca60f42d7965af9f22392caa4074ab0f58c7e1fe" - } - }, - "4.9.212": { - "CVE-2019-14896": { - "cmt_msg": "libertas: Fix two buffer overflows at parsing bss descriptor", - "cmt_id": "b5e6f199de3b7f16b641c4ec5ac92906af1a9232" + "CVE-2023-52624": { + "cmt_msg": "drm/amd/display: Wake DMCUB before executing GPINT commands" }, - "CVE-2019-14897": { - "cmt_msg": "libertas: Fix two buffer overflows at parsing bss descriptor", - "cmt_id": "b5e6f199de3b7f16b641c4ec5ac92906af1a9232" + "CVE-2023-52625": { + "cmt_msg": "drm/amd/display: Refactor DMCUB enter/exit idle interface" }, - "CVE-2019-20806": { - "cmt_msg": "media: tw5864: Fix possible NULL pointer dereference in tw5864_handle_frame", - "cmt_id": "e4188ad85032f130b84702d39755840afec4b9b4" + "CVE-2023-52628": { + "cmt_msg": "netfilter: nftables: exthdr: fix 4-byte stack OOB write" }, - "CVE-2020-14416": { - "cmt_msg": "can, slip: Protect tty->disc_data in write_wakeup and close with RCU", - "cmt_id": "0beba1d7e8e164694ae1743238f1bdf4de4f1f34" - } - }, - "4.9.213": { - "CVE-2020-0432": { - "cmt_msg": "staging: most: net: fix buffer overflow", - "cmt_id": "8b6487d85ca9f9bfa9d75917451969a1d097a815" - } - }, - "4.9.214": { - "CVE-2020-12653": { - "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_cmd_append_vsie_tlv()", - "cmt_id": "7a4d6a45f2fad3ddc07f98cf85790344ea72cd69" + "CVE-2023-52629": { + "cmt_msg": "sh: push-switch: Reorder cleanup operations to avoid use-after-free bug" }, - "CVE-2020-12654": { - "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_ret_wmm_get_status()", - "cmt_id": "0a996849d8042833860fd7c9ff3dcd24e61fd416" + "CVE-2022-0492": { + "cmt_msg": "cgroup-v1: Require capabilities to set release_agent" }, - "CVE-2020-0404": { - "cmt_msg": "media: uvcvideo: Avoid cyclic entity chains due to malformed USB descriptors", - "cmt_id": "f873437547ac3d092c433cc0a996b946eb2803b6" - } - }, - "4.9.215": { - "CVE-2020-9383": { - "cmt_msg": "floppy: check FDC index for errors before assigning it", - "cmt_id": "5fbaa66c2a51c2260add842bd12cbc79715c5249" + "CVE-2020-12352": { + "cmt_msg": "Bluetooth: A2MP: Fix not initializing all members" }, - "CVE-2020-2732": { - "cmt_msg": "KVM: nVMX: Don't emulate instructions in guest mode", - "cmt_id": "86dc39e580d8e3ffa42c8157d3e28249fd9a12c5" + "CVE-2020-12351": { + "cmt_msg": "Bluetooth: L2CAP: Fix calling sk_filter on non-socket based channel" }, - "CVE-2019-16233": { - "cmt_msg": "scsi: qla2xxx: fix a potential NULL pointer dereference", - "cmt_id": "3a21c5b627a2f8e1ca274a155267f0c952c8de0c" + "CVE-2021-43976": { + "cmt_msg": "mwifiex: Fix skb_over_panic in mwifiex_usb_recv()" }, - "CVE-2020-0009": { - "cmt_msg": "staging: android: ashmem: Disallow ashmem memory from being remapped", - "cmt_id": "a7fc5dbd17127c7301b0aefc2bcf1f54169c7383" + "CVE-2022-0494": { + "cmt_msg": "block-map: add __GFP_ZERO flag for alloc_page in function bio_copy_kern" }, - "CVE-2020-36558": { - "cmt_msg": "vt: vt_ioctl: fix race in VT_RESIZEX", - "cmt_id": "160fbca8d5d74c1a4cec4b666f36b3e614c19f4f" - } - }, - "4.9.216": { - "CVE-2020-8649": { - "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region", - "cmt_id": "1f04adb4d691ed703b1fbc55d99f622b96cedecc" + "CVE-2021-47101": { + "cmt_msg": "asix: fix uninit-value in asix_mdio_read()" }, - "CVE-2020-8648": { - "cmt_msg": "vt: selection, close sel_buffer race", - "cmt_id": "290a9381ccc16131c6ccc19940589141985db6b1" + "CVE-2021-47103": { + "cmt_msg": "inet: fully convert sk->sk_rx_dst to RCU rules" }, - "CVE-2019-16234": { - "cmt_msg": "iwlwifi: pcie: fix rb_allocator workqueue allocation", - "cmt_id": "35c4725efddd669307d7c047cb385becc9c08bf3" + "CVE-2021-46982": { + "cmt_msg": "f2fs: compress: fix race condition of overwrite vs truncate" }, - "CVE-2020-8647": { - "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region", - "cmt_id": "1f04adb4d691ed703b1fbc55d99f622b96cedecc" + "CVE-2007-3719": { + "cmt_msg": "" }, - "CVE-2020-10942": { - "cmt_msg": "vhost: Check docket sk_family instead of call getname", - "cmt_id": "7f574e92e4474f1b33425c4ee9ba48cd4fbe7d75" + "CVE-2023-3863": { + "cmt_msg": "net: nfc: Fix use-after-free caused by nfc_llcp_find_local" }, - "CVE-2020-27068": { - "cmt_msg": "cfg80211: add missing policy for NL80211_ATTR_STATUS_CODE", - "cmt_id": "4d284a7a2ce3cbe918a9c1fac0679574a40fa7c8" + "CVE-2019-19319": { + "cmt_msg": "ext4: protect journal inode's blocks using block_validity" }, - "CVE-2020-0444": { - "cmt_msg": "audit: fix error handling in audit_data_to_entry()", - "cmt_id": "145bd64d35822a62c4570bc75c5285acb1820fb3" + "CVE-2022-3628": { + "cmt_msg": "wifi: brcmfmac: Fix potential buffer overflow in brcmf_fweh_event_worker()" }, - "CVE-2020-27418": { - "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region", - "cmt_id": "1f04adb4d691ed703b1fbc55d99f622b96cedecc" - } - }, - "4.9.217": { - "CVE-2019-14901": { - "cmt_msg": "mwifiex: Fix heap overflow in mmwifiex_process_tdls_action_frame()", - "cmt_id": "cb87b895f1468df7a163a6c665bf106a4d26f8c1" + "CVE-2022-3629": { + "cmt_msg": "vsock: Fix memory leak in vsock_connect()" + }, + "CVE-2022-3621": { + "cmt_msg": "nilfs2: fix NULL pointer dereference at nilfs_bmap_lookup_at_level()" + }, + "CVE-2022-23960": { + "cmt_msg": "ARM: report Spectre v2 status through sysfs" + }, + "CVE-2022-3624": { + "cmt_msg": "bonding: fix reference count leak in balance-alb mode" + }, + "CVE-2019-11091": { + "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" + }, + "CVE-2023-4921": { + "cmt_msg": "net: sched: sch_qfq: Fix UAF in qfq_dequeue()" + }, + "CVE-2017-15649": { + "cmt_msg": "packet: in packet_do_bind, test fanout with bind_lock held" + }, + "CVE-2023-1829": { + "cmt_msg": "net/sched: Retire tcindex classifier" + }, + "CVE-2019-19227": { + "cmt_msg": "appletalk: Fix potential NULL pointer dereference in unregister_snap_client" + }, + "CVE-2024-0775": { + "cmt_msg": "ext4: improve error recovery code paths in __ext4_remount()" + }, + "CVE-2016-9604": { + "cmt_msg": "KEYS: Disallow keyrings beginning with '.' to be joined as session keyrings" + }, + "CVE-2020-14386": { + "cmt_msg": "net/packet: fix overflow in tpacket_rcv" + }, + "CVE-2020-14381": { + "cmt_msg": "futex: Fix inode life-time issue" + }, + "CVE-2019-19768": { + "cmt_msg": "blktrace: Protect q->blk_trace with RCU" + }, + "CVE-2022-20141": { + "cmt_msg": "igmp: Add ip_mc_list lock in ip_check_mc_rcu" + }, + "CVE-2023-23455": { + "cmt_msg": "net: sched: atm: dont intepret cls results when asked to drop" + }, + "CVE-2023-23454": { + "cmt_msg": "net: sched: cbq: dont intepret cls results when asked to drop" + }, + "CVE-2022-20148": { + "cmt_msg": "f2fs: fix UAF in f2fs_available_free_memory" + }, + "CVE-2023-6931": { + "cmt_msg": "perf: Fix perf_event_validate_size()" + }, + "CVE-2023-6932": { + "cmt_msg": "ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet" }, - "CVE-2020-29370": { - "cmt_msg": "mm: slub: add missing TID bump in kmem_cache_alloc_bulk()", - "cmt_id": "ff58bb340c430da021875283f8bf251630c61183" - } - }, - "4.9.218": { - "CVE-2020-36557": { - "cmt_msg": "vt: vt_ioctl: fix VT_DISALLOCATE freeing in-use virtual console", - "cmt_id": "6bc9bf78618edf42b31cb7551fb0c83af340c54f" + "CVE-2018-8781": { + "cmt_msg": "drm: udl: Properly check framebuffer mmap offsets" }, - "CVE-2020-14381": { - "cmt_msg": "futex: Fix inode life-time issue", - "cmt_id": "fb099f3bb477a0ee2d0669a753f7ffcdf8884c2d" + "CVE-2017-15265": { + "cmt_msg": "ALSA: seq: Fix use-after-free at creating a port" }, - "CVE-2020-11668": { - "cmt_msg": "media: xirlink_cit: add missing descriptor sanity checks", - "cmt_id": "8f08a2bb2199a4511bea29e9a130b449f8c1a581" + "CVE-2021-0605": { + "cmt_msg": "af_key: pfkey_dump needs parameter validation" }, - "CVE-2021-3715": { - "cmt_msg": "net_sched: cls_route: remove the right filter from hashtable", - "cmt_id": "97a8e7afaee8fc4f08662cf8e4f495b87874aa91" + "CVE-2018-20961": { + "cmt_msg": "USB: gadget: f_midi: fixing a possible double-free in f_midi" }, - "CVE-2020-27066": { - "cmt_msg": "xfrm: policy: Fix doulbe free in xfrm_policy_timer", - "cmt_id": "86e98ce7de083649e330d518e98a80b9e39b5d43" + "CVE-2018-5995": { + "cmt_msg": "printk: hash addresses printed with %p" }, - "CVE-2020-11608": { - "cmt_msg": "media: ov519: add missing endpoint sanity checks", - "cmt_id": "03e73c3ef017580482d8e4de2db2bac9505facca" + "CVE-2022-2153": { + "cmt_msg": "KVM: x86: Avoid theoretical NULL pointer dereference in kvm_irq_delivery_to_apic_fast()" }, - "CVE-2020-11609": { - "cmt_msg": "media: stv06xx: add missing descriptor sanity checks", - "cmt_id": "be6fdd999bcc66cbfde80efbdc16cfd8a3290e38" - } - }, - "4.9.219": { - "CVE-2020-11494": { - "cmt_msg": "slcan: Don't transmit uninitialized stack data in padding", - "cmt_id": "925c631e84d77a72188101258878ac58a646d540" + "CVE-2024-2193": { + "cmt_msg": "" }, - "CVE-2020-0429": { - "cmt_msg": "l2tp: fix race between l2tp_session_delete() and l2tp_tunnel_closeall()", - "cmt_id": "e8b9cf5574e8154a6db2505d028682e830c9f620" + "CVE-2018-12930": { + "cmt_msg": "" }, - "CVE-2020-0433": { - "cmt_msg": "blk-mq: sync the update nr_hw_queues with blk_mq_queue_tag_busy_iter", - "cmt_id": "f530afb974c2e82047bd6220303a2dbe30eff304" + "CVE-2018-12931": { + "cmt_msg": "" }, - "CVE-2020-11565": { - "cmt_msg": "mm: mempolicy: require at least one nodeid for MPOL_PREFERRED", - "cmt_id": "c5544e72014cdb0a739f6971fb3dd4fb641b392c" - } - }, - "4.9.220": { - "CVE-2020-12826": { - "cmt_msg": "signal: Extend exec_id to 64bits", - "cmt_id": "110012a2c94ad4fa28234a1b39e54fd4114fbaf2" - } - }, - "4.9.221": { - "CVE-2019-19319": { - "cmt_msg": "ext4: protect journal inode's blocks using block_validity", - "cmt_id": "a9855260fe8d8680bf8c4f0d8303b696c861e99b" + "CVE-2021-28972": { + "cmt_msg": "PCI: rpadlpar: Fix potential drc_name corruption in store functions" }, - "CVE-2020-12114": { - "cmt_msg": "make struct mountpoint bear the dentry reference to mountpoint, not struct mount", - "cmt_id": "91e997939dda1a866f23ddfb043dcd4a3ff57524" + "CVE-2021-28971": { + "cmt_msg": "perf/x86/intel: Fix a crash caused by zero PEBS status" }, - "CVE-2020-12464": { - "cmt_msg": "USB: core: Fix free-while-in-use bug in the USB S-Glibrary", - "cmt_id": "ab20e851e49e75a9e653463853995076899a4e48" - } - }, - "4.9.222": { - "CVE-2020-10751": { - "cmt_msg": "selinux: properly handle multiple messages in selinux_netlink_send()", - "cmt_id": "6affa87d168d91af6c8f303dc1fc7a7f59869818" + "CVE-2017-12146": { + "cmt_msg": "driver core: platform: fix race condition with driver_override" }, - "CVE-2020-0255": { - "cmt_msg": "selinux: properly handle multiple messages in selinux_netlink_send()", - "cmt_id": "6affa87d168d91af6c8f303dc1fc7a7f59869818" - } - }, - "4.9.224": { - "CVE-2020-10711": { - "cmt_msg": "netlabel: cope with NULL catmap", - "cmt_id": "9232577ef3e10775eefe7f2689cbf851c8b13d80" + "CVE-2020-36781": { + "cmt_msg": "i2c: imx: fix reference leak when pm_runtime_get_sync fails" }, - "CVE-2020-1749": { - "cmt_msg": "net: ipv6_stub: use ip6_dst_lookup_flow instead of ip6_dst_lookup", - "cmt_id": "badbe56cb62faabe946fed8d7e8a25c009a95e3b" + "CVE-2021-3732": { + "cmt_msg": "ovl: prevent private clone if bind mount is not allowed" }, - "CVE-2020-27786": { - "cmt_msg": "ALSA: rawmidi: Fix racy buffer resize under concurrent accesses", - "cmt_id": "c13f1463d84b86bedb664e509838bef37e6ea317" + "CVE-2020-36784": { + "cmt_msg": "i2c: cadence: fix reference leak when pm_runtime_get_sync fails" }, - "CVE-2020-12769": { - "cmt_msg": "spi: spi-dw: Add lock protect dw_spi rx/tx to prevent concurrent calls", - "cmt_id": "15029156d7ac0ae4ec80f577bb25f68fe07c8af1" + "CVE-2017-13166": { + "cmt_msg": "media: v4l2-ioctl.c: use check_fmt for enum/g/s/try_fmt" }, - "CVE-2020-10690": { - "cmt_msg": "ptp: fix the race between the release of ptp_clock and cdev", - "cmt_id": "89e8fc989feaac00bf1a7f9a766289422e2f5768" + "CVE-2018-12207": { + "cmt_msg": "kvm: x86, powerpc: do not allow clearing largepages debugfs entry" }, - "CVE-2020-13143": { - "cmt_msg": "USB: gadget: fix illegal array access in binding with UDC", - "cmt_id": "2056c78ee8abacaf71c89c999483183203e8441d" + "CVE-2017-13168": { + "cmt_msg": "scsi: sg: mitigate read/write abuse" }, - "CVE-2019-19768": { - "cmt_msg": "blktrace: Protect q->blk_trace with RCU", - "cmt_id": "284dba674c063ac5cab9ffc1ea07f7b199aeb62f" + "CVE-2019-0148": { + "cmt_msg": "i40e: Wrong truncation from u16 to u8" }, - "CVE-2020-12770": { - "cmt_msg": "scsi: sg: add sg_remove_request in sg_write", - "cmt_id": "6950c2775e02e4be51b06901306ee641e8e5b3df" - } - }, - "4.9.225": { - "CVE-2018-9517": { - "cmt_msg": "l2tp: pass tunnel pointer to ->session_create()", - "cmt_id": "feaed88dccc4742805c41260040103fa8a7f0df2" + "CVE-2019-17075": { + "cmt_msg": "RDMA/cxgb4: Do not dma memory off of the stack" }, - "CVE-2021-0447": { - "cmt_msg": "l2tp: protect sock pointer of struct pppol2tp_session with RCU", - "cmt_id": "5803ecd7f6ac6f747582e775caa62ac9d0489261" + "CVE-2023-20588": { + "cmt_msg": "x86/CPU/AMD: Do not leak quotient data after a division by 0" }, - "CVE-2020-27067": { - "cmt_msg": "l2tp: fix l2tp_eth module loading", - "cmt_id": "1ede832fb82fbda56c1bd7c57fb581dfab9c6e49" - } - }, - "4.9.226": { - "CVE-2020-10732": { - "cmt_msg": "fs/binfmt_elf.c: allocate initialized memory in fill_thread_core_info()", - "cmt_id": "d228bc4b19e0b1c35f3eb404acbf1d607c01e64c" - } - }, - "4.9.227": { - "CVE-2020-13974": { - "cmt_msg": "vt: keyboard: avoid signed integer overflow in k_ascii", - "cmt_id": "adf823fa2a53db5d119d90817778f263a3a47608" + "CVE-2019-0147": { + "cmt_msg": "i40e: add num_vectors checker in iwarp handler" }, - "CVE-2020-0543": { - "cmt_msg": "x86/cpu: Add 'table' argument to cpu_matches()", - "cmt_id": "15cf7ca9f59ff911cd5582969377bbf8c2ecab8a" + "CVE-2018-3693": { + "cmt_msg": "ext4: fix spectre gadget in ext4_mb_regular_allocator()" }, - "CVE-2019-19462": { - "cmt_msg": "kernel/relay.c: handle alloc_percpu returning NULL in relay_open", - "cmt_id": "d1774b0459875e2bf3e93b86294296e5494fd0b7" + "CVE-2022-44033": { + "cmt_msg": "char: pcmcia: remove all the drivers" }, - "CVE-2020-10757": { - "cmt_msg": "mm: Fix mremap not considering huge pmd devmap", - "cmt_id": "c915cffda0a4329ee454646138fe2b11c5ba3cd6" - } - }, - "4.9.228": { - "CVE-2020-29368": { - "cmt_msg": "mm: thp: make the THP mapcount atomic against __split_huge_pmd_locked()", - "cmt_id": "d93d7bd61072a03dde173d36ae5815488a585fc0" + "CVE-2022-44032": { + "cmt_msg": "char: pcmcia: remove all the drivers" }, - "CVE-2019-20810": { - "cmt_msg": "media: go7007: fix a miss of snd_card_free", - "cmt_id": "3e70f204f62f2198f3b88932c71e5ac29a5fbb10" + "CVE-2017-5576": { + "cmt_msg": "drm/vc4: Fix an integer overflow in temporary allocation layout." }, - "CVE-2020-10766": { - "cmt_msg": "x86/speculation: Prevent rogue cross-process SSBD shutdown", - "cmt_id": "fc0abf5a64ea5d028af0cf5d37d5898afe6748c5" + "CVE-2017-5577": { + "cmt_msg": "drm/vc4: Return -EINVAL on the overflow checks failing." }, - "CVE-2020-10767": { - "cmt_msg": "x86/speculation: Avoid force-disabling IBPB based on STIBP and enhanced IBRS.", - "cmt_id": "38be87f5e7a7a7378d4ef4528c13bd1d666ab867" + "CVE-2021-3609": { + "cmt_msg": "can: bcm: delay release of struct bcm_op after synchronize_rcu()" }, - "CVE-2020-10768": { - "cmt_msg": "x86/speculation: PR_SPEC_FORCE_DISABLE enforcement for indirect branches.", - "cmt_id": "db39004352a40107213a70dc8e549936a6468fa9" - } - }, - "4.9.229": { - "CVE-2020-12771": { - "cmt_msg": "bcache: fix potential deadlock problem in btree_gc_coalesce", - "cmt_id": "be676835b2250861d525b8e2a8e2bed8c1a9027d" + "CVE-2017-13305": { + "cmt_msg": "KEYS: encrypted: fix buffer overread in valid_master_desc()" }, - "CVE-2020-15436": { - "cmt_msg": "block: Fix use-after-free in blkdev_get()", - "cmt_id": "a54b15af2b495ed97660a6276710ef36e06ac6c9" + "CVE-2021-46904": { + "cmt_msg": "net: hso: fix null-ptr-deref during tty device unregistration" }, - "CVE-2020-12655": { - "cmt_msg": "xfs: add agf freeblocks verify in xfs_agf_verify", - "cmt_id": "2bda23ca5b8186f7906dd29efd1c773bb8b84098" - } - }, - "4.9.230": { - "CVE-2020-15393": { - "cmt_msg": "usb: usbtest: fix missing kfree(dev->buf) in usbtest_disconnect", - "cmt_id": "4ea5c9091d62e9516819c7bcb7c09658bde85acc" - } - }, - "4.9.231": { - "CVE-2020-14356": { - "cmt_msg": "cgroup: fix cgroup_sk_alloc() for sk_clone_lock()", - "cmt_id": "51fbad61b1dc2a082c7f7dbc3b1299a1e40c061a" - } - }, - "4.9.232": { - "CVE-2020-15437": { - "cmt_msg": "serial: 8250: fix null-ptr-deref in serial8250_start_tx()", - "cmt_id": "81e57039ebbc2c0867f2c04bb3cb205b4edd0141" + "CVE-2019-11478": { + "cmt_msg": "tcp: tcp_fragment() should apply sane memory limits" }, - "CVE-2018-10323": { - "cmt_msg": "xfs: set format back to extents if xfs_bmap_extents_to_btree", - "cmt_id": "8e5f820e14e93ebfc7fcf2a099817eb9c7c3be04" - } - }, - "4.9.233": { - "CVE-2020-26088": { - "cmt_msg": "net/nfc/rawsock.c: add CAP_NET_RAW check.", - "cmt_id": "1b0eab4e8622183ff26230a589b33f533dfbf7b4" + "CVE-2019-20096": { + "cmt_msg": "dccp: Fix memleak in __feat_register_sp" }, - "CVE-2019-19054": { - "cmt_msg": "media: rc: prevent memory leak in cx23888_ir_probe", - "cmt_id": "fa5ac0514ec1f66c2c04c6486a9f090d4ddfdac9" + "CVE-2018-6554": { + "cmt_msg": "staging: irda: remove the irda network stack and drivers" }, - "CVE-2020-25212": { - "cmt_msg": "nfs: Fix getxattr kernel panic and memory overflow", - "cmt_id": "8973046648c4f0392f50d915ea1bdb639e930519" + "CVE-2018-6555": { + "cmt_msg": "staging: irda: remove the irda network stack and drivers" }, - "CVE-2019-9445": { - "cmt_msg": "f2fs: check if file namelen exceeds max value", - "cmt_id": "7745e3c67b80865bd0bc0812fda9f6292c8dc2fb" + "CVE-2019-9213": { + "cmt_msg": "mm: enforce min addr even if capable() in expand_downwards()" }, - "CVE-2018-13094": { - "cmt_msg": "xfs: don't call xfs_da_shrink_inode with NULL bp", - "cmt_id": "beff051fa566f6ed93da74171b30fb049038b23d" + "CVE-2019-14896": { + "cmt_msg": "libertas: Fix two buffer overflows at parsing bss descriptor" }, - "CVE-2018-13093": { - "cmt_msg": "xfs: validate cached inodes are free when allocated", - "cmt_id": "42c59d544af976f4736640ef25ff791e2188aed3" + "CVE-2019-14897": { + "cmt_msg": "libertas: Fix two buffer overflows at parsing bss descriptor" }, - "CVE-2018-8043": { - "cmt_msg": "net: phy: mdio-bcm-unimac: fix potential NULL dereference in unimac_mdio_probe()", - "cmt_id": "a7efa804e0f4053b21356a0d40bd0942c77fe8d1" + "CVE-2019-14895": { + "cmt_msg": "mwifiex: fix possible heap overflow in mwifiex_process_country_ie()" }, - "CVE-2019-18808": { - "cmt_msg": "crypto: ccp - Release all allocated memory if sha type is invalid", - "cmt_id": "65d77c8771d2246fafb8e57dd260c8fa7224a576" + "CVE-2024-26784": { + "cmt_msg": "pmdomain: arm: Fix NULL dereference on scmi_perf_domain removal" }, - "CVE-2020-16166": { - "cmt_msg": "random32: update the net random state on interrupt and activity", - "cmt_id": "5aa78397e208b6871a8bdec7fa2bd6992b1f3e4b" + "CVE-2024-26789": { + "cmt_msg": "crypto: arm64/neonbs - fix out-of-bounds access on short input" }, - "CVE-2020-36386": { - "cmt_msg": "Bluetooth: Fix slab-out-of-bounds read in hci_extended_inquiry_result_evt()", - "cmt_id": "aea77913022bbd0194feb33720d9bca8b6b26f9a" + "CVE-2017-18222": { + "cmt_msg": "net: hns: fix ethtool_get_strings overflow in hns driver" }, - "CVE-2020-14331": { - "cmt_msg": "vgacon: Fix for missing check in scrollback handling", - "cmt_id": "8c19b606e78a2b08e1ea69eebd5c290913c89612" + "CVE-2020-0067": { + "cmt_msg": "f2fs: fix to avoid memory leakage in f2fs_listxattr" }, - "CVE-2019-19448": { - "cmt_msg": "btrfs: only search for left_info if there is no right_info in try_merge_free_space", - "cmt_id": "802dff14b904b37a985ab2,87db546d872f950f05" + "CVE-2017-18224": { + "cmt_msg": "ocfs2: ip_alloc_sem should be taken in ocfs2_get_block()" }, - "CVE-2019-19074": { - "cmt_msg": "ath9k: release allocated buffer if timed out", - "cmt_id": "f0b65fee921fe7efda2889d1a3eea69137682402" + "CVE-2020-26541": { + "cmt_msg": "certs: Add EFI_CERT_X509_GUID support for dbx entries" }, - "CVE-2019-19073": { - "cmt_msg": "ath9k_htc: release allocated buffer if timed out", - "cmt_id": "86c3e3e5937f7496d08eb7bc498ee3c10095d23c" - } - }, - "4.9.234": { - "CVE-2020-14314": { - "cmt_msg": "ext4: fix potential negative array index in do_split()", - "cmt_id": "539ae3e03875dacaa9c388aff141ccbb4ef4ecb5" + "CVE-2019-20794": { + "cmt_msg": "" }, - "CVE-2020-29371": { - "cmt_msg": "romfs: fix uninitialized memory leak in romfs_dev_read()", - "cmt_id": "6d26d08216475e5a40e4f6ade397c181a19dc524" + "CVE-2024-26769": { + "cmt_msg": "nvmet-fc: avoid deadlock on delete association path" }, - "CVE-2020-0466": { - "cmt_msg": "do_epoll_ctl(): clean the failure exits up a bit", - "cmt_id": "b3ce6ca929dc677f7e443eb3012dfc7a433b1161" - } - }, - "4.9.235": { - "CVE-2020-36766": { - "cmt_msg": "cec-api: prevent leaking memory through hole in structure", - "cmt_id": "43f90dc5c73e0e9d2a459d904b71f9682fd54f1b" - } - }, - "4.9.236": { - "CVE-2020-0465": { - "cmt_msg": "HID: core: Sanitize event code and type when mapping input", - "cmt_id": "ac48d8300edd1aa4ce0fbef0ff5136d363f44cdf" + "CVE-2024-26768": { + "cmt_msg": "LoongArch: Change acpi_core_pic[NR_CPUS] to acpi_core_pic[MAX_CORE_PIC]" }, - "CVE-2020-25641": { - "cmt_msg": "block: allow for_each_bvec to support zero len bvec", - "cmt_id": "0c7cee63ec92b316f8b891b667177a080b670566" + "CVE-2021-33061": { + "cmt_msg": "ixgbe: add improvement for MDD response functionality" }, - "CVE-2021-1048": { - "cmt_msg": "fix regression in \"epoll: Keep a reference on files added to the check list\"", - "cmt_id": "8238ee93a30a5ff6fc75751e122a28e0d92f3e12" + "CVE-2024-26764": { + "cmt_msg": "fs/aio: Restrict kiocb_set_cancel_fn() to I/O submitted via libaio" }, - "CVE-2022-20565": { - "cmt_msg": "HID: core: Correctly handle ReportSize being zero", - "cmt_id": "cf7797ea60e3e721e3ae5090edbc2ec72d715436" + "CVE-2024-26767": { + "cmt_msg": "drm/amd/display: fixed integer types and null check locations" }, - "CVE-2020-25285": { - "cmt_msg": "mm/hugetlb: fix a race between hugetlb sysctl handlers", - "cmt_id": "47b1be395352d54f888f4331fa291dc9199fff4c" + "CVE-2024-26766": { + "cmt_msg": "IB/hfi1: Fix sdma.h tx->num_descs off-by-one error" }, - "CVE-2020-12888": { - "cmt_msg": "vfio-pci: Invalidate mmaps and block MMIO access on disabled memory", - "cmt_id": "5f2c69e2ef24a79b6909a6dc6b249a17909965f8" - } - }, - "4.9.237": { - "CVE-2020-25284": { - "cmt_msg": "rbd: require global CAP_SYS_ADMIN for mapping and unmapping", - "cmt_id": "774519ed39da09471abe2c02a7f293c380759cc3" + "CVE-2024-26763": { + "cmt_msg": "dm-crypt: don't modify the data when using authenticated encryption" }, - "CVE-2020-14390": { - "cmt_msg": "fbcon: remove soft scrollback code", - "cmt_id": "c7e41b00de99932f189d8af3a40caee31a385788" + "CVE-2017-18551": { + "cmt_msg": "i2c: core-smbus: prevent stack corruption on read I2C_BLOCK_DATA" }, - "CVE-2020-28097": { - "cmt_msg": "vgacon: remove software scrollback support", - "cmt_id": "7cabb35d2106d567af15ea1040c7737f34b29cd8" - } - }, - "4.9.238": { - "CVE-2020-25643": { - "cmt_msg": "hdlc_ppp: add range checks in ppp_cp_parse_cr()", - "cmt_id": "585e29541c29349420d5926026a74456e233a2b3" + "CVE-2017-18552": { + "cmt_msg": "RDS: validate the requested traces user input against max supported" }, - "CVE-2021-0605": { - "cmt_msg": "af_key: pfkey_dump needs parameter validation", - "cmt_id": "31c59173dc9553d6857129d2a8e102c4700b54c4" - } - }, - "4.9.239": { - "CVE-2020-14386": { - "cmt_msg": "net/packet: fix overflow in tpacket_rcv", - "cmt_id": "9a675ac9fe9794f0981db6e4b101503818f61622" + "CVE-2018-18559": { + "cmt_msg": "net/packet: fix a race in packet_bind() and packet_notifier()" }, - "CVE-2020-25211": { - "cmt_msg": "netfilter: ctnetlink: add a range check for l3/l4 protonum", - "cmt_id": "9c61977a713511c01abdf9b2a72693d21cb60556" + "CVE-2019-9457": { + "cmt_msg": "exec: Limit arg stack to at most 75% of _STK_LIM" }, - "CVE-2021-0448": { - "cmt_msg": "netfilter: ctnetlink: add a range check for l3/l4 protonum", - "cmt_id": "9c61977a713511c01abdf9b2a72693d21cb60556" + "CVE-2019-9456": { + "cmt_msg": "usb: usbmon: Read text within supplied buffer size" }, - "CVE-2021-39634": { - "cmt_msg": "epoll: do not insert into poll queues until all sanity checks are done", - "cmt_id": "a16d314ccda2efa6173f2ae7d386f99c61d273a4" + "CVE-2019-9455": { + "cmt_msg": "media: videobuf2-v4l2: drop WARN_ON in vb2_warn_zero_bytesused()" }, - "CVE-2020-28915": { - "cmt_msg": "fbcon: Fix global-out-of-bounds read in fbcon_get_font()", - "cmt_id": "6f1adb22fc0c567d65e8c56cc04d633d2fa1bfb4" - } - }, - "4.9.240": { - "CVE-2020-10135": { - "cmt_msg": "Bluetooth: Consolidate encryption handling in hci_encrypt_cfm", - "cmt_id": "b77912c3bfc6e384c0ec0c08840a37d1f79ee5de" + "CVE-2022-2978": { + "cmt_msg": "fs: fix UAF/GPF bug in nilfs_mdt_destroy" }, - "CVE-2020-12352": { - "cmt_msg": "Bluetooth: A2MP: Fix not initializing all members", - "cmt_id": "1a8da94d1c6ecc2a8db2a2477bef6945c0ba9c3e" + "CVE-2019-9453": { + "cmt_msg": "f2fs: fix to avoid accessing xattr across the boundary" }, - "CVE-2020-12351": { - "cmt_msg": "Bluetooth: L2CAP: Fix calling sk_filter on non-socket based channel", - "cmt_id": "720369661674527c8aa999fae0e295eeea12174c" - } - }, - "4.9.241": { - "CVE-2020-27784": { - "cmt_msg": "usb: gadget: function: printer: fix use-after-free in __lock_acquire", - "cmt_id": "4a47581cf010dc351d8069978080fdb000c0776d" + "CVE-2023-20569": { + "cmt_msg": "x86/bugs: Increase the x86 bugs vector size to two u32s" }, - "CVE-2020-25705": { - "cmt_msg": "icmp: randomize the global rate limiter", - "cmt_id": "df838165a187b7c699ec372a2a136f9873112776" - } - }, - "4.9.242": { - "CVE-2020-28974": { - "cmt_msg": "vt: Disable KD_FONT_OP_COPY", - "cmt_id": "5ca7f073e680ff2e56756a9b6bffcd55085d292c" + "CVE-2023-46838": { + "cmt_msg": "xen-netback: don't produce zero-size SKB frags" }, - "CVE-2020-25668": { - "cmt_msg": "tty: make FONTX ioctl use the tty pointer they were actually passed", - "cmt_id": "ea5dd52c3568e0f7232c20fd4adf551fcad07c60" + "CVE-2019-9458": { + "cmt_msg": "media: v4l: event: Prevent freeing event subscriptions while accessed" }, - "CVE-2020-25656": { - "cmt_msg": "vt: keyboard, extend func_buf_lock to readers", - "cmt_id": "04a6e5aa75e7a9432df0443a17ab7c8dd005cc9b" + "CVE-2023-3090": { + "cmt_msg": "ipvlan:Fix out-of-bounds caused by unclear skb->cb" }, - "CVE-2020-35508": { - "cmt_msg": "fork: fix copy_process(CLONE_PARENT) race with the exiting ->real_parent", - "cmt_id": "66be43d81870c55637c2f32d8088d7184e93262a" - } - }, - "4.9.243": { - "CVE-2020-8694": { - "cmt_msg": "powercap: restrict energy meter to root access", - "cmt_id": "04533793ac10b38103d3aefe1c4b5b1eaf009f35" - } - }, - "4.9.244": { - "CVE-2020-14351": { - "cmt_msg": "perf/core: Fix race in the perf_mmap_close() function", - "cmt_id": "5a097d643717160d859f5bd4a29e2088f48a5fd3" + "CVE-2023-45862": { + "cmt_msg": "USB: ene_usb6250: Allocate enough memory for full object" }, - "CVE-2019-0148": { - "cmt_msg": "i40e: Wrong truncation from u16 to u8", - "cmt_id": "b7715c9bb71fa4b95fdb9b98a8814d8e18cb7402" + "CVE-2023-45863": { + "cmt_msg": "kobject: Fix slab-out-of-bounds in fill_kobj_path()" }, "CVE-2020-25704": { - "cmt_msg": "perf/core: Fix a memory leak in perf_event_parse_addr_filter()", - "cmt_id": "d59f7d676bfe2149662361fc3a1c0de9d011066d" + "cmt_msg": "perf/core: Fix a memory leak in perf_event_parse_addr_filter()" }, - "CVE-2020-0427": { - "cmt_msg": "pinctrl: devicetree: Avoid taking direct reference to device name string", - "cmt_id": "77440c3a37203e3f4667d06e37f76ef3968d2d8c" + "CVE-2020-25705": { + "cmt_msg": "icmp: randomize the global rate limiter" }, - "CVE-2020-27673": { - "cmt_msg": "xen/events: add a proper barrier to 2-level uevent unmasking", - "cmt_id": "d7b048485f6f71e55f32ce904ead727b187b3671" + "CVE-2023-52639": { + "cmt_msg": "KVM: s390: vsie: fix race during shadow creation" }, - "CVE-2019-0146": { - "cmt_msg": "i40e: add num_vectors checker in iwarp handler", - "cmt_id": "f4a3ff4df40053000d56554f0d34aa98d4d917d6" + "CVE-2023-52638": { + "cmt_msg": "can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock" }, - "CVE-2019-0147": { - "cmt_msg": "i40e: add num_vectors checker in iwarp handler", - "cmt_id": "f4a3ff4df40053000d56554f0d34aa98d4d917d6" + "CVE-2019-15239": { + "cmt_msg": "unknown" }, - "CVE-2019-0145": { - "cmt_msg": "i40e: add num_vectors checker in iwarp handler", - "cmt_id": "f4a3ff4df40053000d56554f0d34aa98d4d917d6" + "CVE-2017-15129": { + "cmt_msg": "net: Fix double free and memory corruption in get_net_ns_by_id()" }, - "CVE-2020-27675": { - "cmt_msg": "xen/events: avoid removing an event channel while handling it", - "cmt_id": "e4ccd4b1a6e586659005a231e793af325e575e53" + "CVE-2022-26373": { + "cmt_msg": "x86/speculation: Add RSB VM Exit protections" }, - "CVE-2020-25645": { - "cmt_msg": "geneve: add transport ports in route lookup for geneve", - "cmt_id": "1200ebbd06c2f569421dcab4e10649f3e299867c" - } - }, - "4.9.245": { - "CVE-2020-4788": { - "cmt_msg": "powerpc/64s: flush L1D on kernel entry", - "cmt_id": "fa4bf9f38184ed7ca4916eb64f8c767d1e279c1f" + "CVE-2023-52633": { + "cmt_msg": "um: time-travel: fix time corruption" }, - "CVE-2020-25669": { - "cmt_msg": "Input: sunkbd - avoid use-after-free in teardown paths", - "cmt_id": "452e66f60880ac1fa1ca0a594fc1ebaee87fa35d" - } - }, - "4.9.247": { - "CVE-2019-19813": { - "cmt_msg": "btrfs: inode: Verify inode mode to avoid NULL pointer dereference", - "cmt_id": "a93a374efd8e0c01abaec21fc808b1cb7fad0b49" + "CVE-2023-52632": { + "cmt_msg": "drm/amdkfd: Fix lock dependency warning with srcu" }, - "CVE-2019-19816": { - "cmt_msg": "btrfs: inode: Verify inode mode to avoid NULL pointer dereference", - "cmt_id": "a93a374efd8e0c01abaec21fc808b1cb7fad0b49" - } - }, - "4.9.248": { - "CVE-2020-29661": { - "cmt_msg": "tty: Fix ->pgrp locking in tiocspgrp()", - "cmt_id": "742f3062298ac1ae1d28de31b1f946f93db1eba1" + "CVE-2017-9986": { + "cmt_msg": "sound: Retire OSS" }, - "CVE-2020-29660": { - "cmt_msg": "tty: Fix ->session locking", - "cmt_id": "ac28e357fe00902bbc21655eaee6b56c850f80af" + "CVE-2017-9985": { + "cmt_msg": "ALSA: msnd: Optimize / harden DSP and MIDI loops" }, - "CVE-2020-35519": { - "cmt_msg": "net/x25: prevent a couple of overflows", - "cmt_id": "4596762761d5e0f843fc920babb4506e2d3c6c90" - } - }, - "4.9.249": { - "CVE-2020-27815": { - "cmt_msg": "jfs: Fix array index bounds check in dbAdjTree", - "cmt_id": "2c7c903caef18d45bac879557861656aa30b8933" - } - }, - "4.9.250": { - "CVE-2020-29568": { - "cmt_msg": "xen/xenbus: Allow watches discard events before queueing", - "cmt_id": "7936eefdbec92aaa42281b82c07c6e0b843b7932" + "CVE-2017-9984": { + "cmt_msg": "ALSA: msnd: Optimize / harden DSP and MIDI loops" }, - "CVE-2020-36158": { - "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_cmd_802_11_ad_hoc_start", - "cmt_id": "6ceb5b8e16dac9a041271bc3985ff155bdbb30b4" - } - }, - "4.9.251": { - "CVE-2021-39648": { - "cmt_msg": "usb: gadget: configfs: Fix use-after-free issue with udc_name", - "cmt_id": "225330e682fa9aaa152287b49dea1ce50fbe0a92" - } - }, - "4.9.252": { - "CVE-2020-28374": { - "cmt_msg": "scsi: target: Fix XCOPY NAA identifier lookup", - "cmt_id": "966e6d0786e64f4065b76116d7e9411c01761d30" - } - }, - "4.9.253": { - "CVE-2021-3178": { - "cmt_msg": "nfsd4: readdirplus shouldn't return parent of export", - "cmt_id": "2174b2cf3960b9091c2516feeb9e345fe24f8906" + "CVE-2021-47135": { + "cmt_msg": "mt76: mt7921: fix possible AOOB issue in mt7921_mcu_tx_rate_report" }, - "CVE-2023-1390": { - "cmt_msg": "tipc: fix NULL deref in tipc_link_xmit()", - "cmt_id": "310014f572a59b311c175321265a08c9adfced0c" - } - }, - "4.9.254": { - "CVE-2020-27825": { - "cmt_msg": "tracing: Fix race in trace_open and buffer resize call", - "cmt_id": "04f51df12ddaa0e2a38223da00e0d3ed02d62a01" + "CVE-2021-47136": { + "cmt_msg": "net: zero-initialize tc skb extension on allocation" }, - "CVE-2021-39657": { - "cmt_msg": "scsi: ufs: Correct the LUN used in eh_device_reset_handler() callback", - "cmt_id": "7bbac19e604b2443c93f01c3259734d53f776dbf" - } - }, - "4.9.258": { - "CVE-2021-26931": { - "cmt_msg": "xen-blkback: don't \"handle\" error by BUG()", - "cmt_id": "746d5c20c9cbeac0ee9f24a51862eb551c7b8706" + "CVE-2021-47137": { + "cmt_msg": "net: lantiq: fix memory corruption in RX ring" }, - "CVE-2021-26930": { - "cmt_msg": "xen-blkback: fix error handling in xen_blkbk_map()", - "cmt_id": "4cec38115dfd5d5c123ece4f4a55165a5a2e8cc0" + "CVE-2021-47131": { + "cmt_msg": "net/tls: Fix use-after-free after the TLS device goes down and up" }, - "CVE-2021-26932": { - "cmt_msg": "Xen/x86: don't bail early from clear_foreign_p2m_mapping()", - "cmt_id": "34156171ae855364456933c1aea81ea0f2536853" - } - }, - "4.9.259": { - "CVE-2021-0512": { - "cmt_msg": "HID: make arrays usage and value to be the same", - "cmt_id": "b12d39309ecf08cdcab716a5063f9ec23cb9f001" + "CVE-2021-47133": { + "cmt_msg": "HID: amd_sfh: Fix memory leak in amd_sfh_work" }, - "CVE-2021-3612": { - "cmt_msg": "Input: joydev - prevent potential read overflow in ioctl", - "cmt_id": "e0154ded9330c188863b09824c3b07ebafa6e5a4" - } - }, - "4.9.260": { - "CVE-2021-30002": { - "cmt_msg": "media: v4l: ioctl: Fix memory leak in video_usercopy", - "cmt_id": "80c22132c0f4bb91cef8c9001bde3057c07f005f" + "CVE-2024-26675": { + "cmt_msg": "ppp_async: limit MRU to 64K" }, - "CVE-2021-27365": { - "cmt_msg": "scsi: iscsi: Ensure sysfs attributes are limited to PAGE_SIZE", - "cmt_id": "9ce352a1fbfb9d16353ea30cf4b922a1a049fe69" + "CVE-2023-0386": { + "cmt_msg": "ovl: fail on invalid uid/gid mapping at copy up" }, - "CVE-2021-27364": { - "cmt_msg": "scsi: iscsi: Restrict sessions and handles to admin capabilities", - "cmt_id": "a483236b41db0228bd4643d7cc0a4c51d33edd93" + "CVE-2022-42896": { + "cmt_msg": "Bluetooth: L2CAP: Fix accepting connection request for invalid SPSM" }, - "CVE-2021-27363": { - "cmt_msg": "scsi: iscsi: Restrict sessions and handles to admin capabilities", - "cmt_id": "a483236b41db0228bd4643d7cc0a4c51d33edd93" + "CVE-2022-42895": { + "cmt_msg": "Bluetooth: L2CAP: Fix attempting to access uninitialized memory" }, - "CVE-2021-28038": { - "cmt_msg": "Xen/gnttab: handle p2m update errors on a per-slot basis", - "cmt_id": "d1ae0cfd1fab27d170caf905e519198cb144d523" - } - }, - "4.9.262": { - "CVE-2019-19060": { - "cmt_msg": "iio: imu: adis16400: release allocated memory on failure", - "cmt_id": "9c8c498ae28e116f26509d72d0db667eb5414dac" + "CVE-2017-7618": { + "cmt_msg": "crypto: ahash - Fix EINPROGRESS notification callback" }, - "CVE-2019-19061": { - "cmt_msg": "iio: imu: adis16400: fix memory leak", - "cmt_id": "10f675ec4eda0801791546980b35cc41589815aa" + "CVE-2022-48626": { + "cmt_msg": "moxart: fix potential use-after-free on remove path" }, - "CVE-2021-29265": { - "cmt_msg": "usbip: fix stub_dev usbip_sockfd_store() races leading to gpf", - "cmt_id": "bce53f0b8e90d2821ec5fa14689949a025e8b63d" + "CVE-2022-48627": { + "cmt_msg": "vt: fix memory overlapping when deleting chars in the buffer" }, - "CVE-2021-28660": { - "cmt_msg": "staging: rtl8188eu: prevent ->ssid overflow in rtw_wx_set_scan()", - "cmt_id": "b318d268318be4c229fb4c0d4f6ff1d7251c88d7" - } - }, - "4.9.263": { - "CVE-2021-28964": { - "cmt_msg": "btrfs: fix race when cloning extent buffer during rewind of an old root", - "cmt_id": "ca403b79f4330bb5a8df3551e39610db6c06c46f" + "CVE-2022-48628": { + "cmt_msg": "ceph: drop messages from MDS when unmounting" }, - "CVE-2021-28972": { - "cmt_msg": "PCI: rpadlpar: Fix potential drc_name corruption in store functions", - "cmt_id": "ef8dc3d327cc799e3f6f1af41852f8f954f7115f" + "CVE-2017-7616": { + "cmt_msg": "mm/mempolicy.c: fix error handling in set_mempolicy and mbind." }, - "CVE-2021-28971": { - "cmt_msg": "perf/x86/intel: Fix a crash caused by zero PEBS status", - "cmt_id": "6c2ab223a7286ecfa016f532b7231fb049fb2a02" - } - }, - "4.9.264": { - "CVE-2021-28688": { - "cmt_msg": "xen-blkback: don't leak persistent grants from xen_blkbk_map()", - "cmt_id": "3cb86952ce3c8b28a0c1f3ce82848618d8628015" + "CVE-2024-24859": { + "cmt_msg": "" }, - "CVE-2021-29647": { - "cmt_msg": "net: qrtr: fix a kernel-infoleak in qrtr_recvmsg()", - "cmt_id": "ab29b020bc29aecaa05e29063cddea83df393023" - } - }, - "4.9.265": { - "CVE-2021-0941": { - "cmt_msg": "bpf: Remove MTU check in __bpf_skb_max_len", - "cmt_id": "1636af9e8a8840f5696ad2c01130832411986af4" + "CVE-2017-1000112": { + "cmt_msg": "udp: consistently apply ufo or fragmentation" }, - "CVE-2021-3483": { - "cmt_msg": "firewire: nosy: Fix a use-after-free bug in nosy_ioctl()", - "cmt_id": "cf4ab748a0ef6e70cad3878bf31f57ee33bf2d14" - } - }, - "4.9.266": { - "CVE-2021-29154": { - "cmt_msg": "bpf, x86: Validate computation of branch displacements for x86-64", - "cmt_id": "d4b234e44aa7108aeadc7b84b162c6f882597005" - } - }, - "4.9.267": { - "CVE-2021-3659": { - "cmt_msg": "net: mac802154: Fix general protection fault", - "cmt_id": "c3883480ce4ebe5b13dbfdc9f2c6503bc9e8ab69" + "CVE-2017-1000111": { + "cmt_msg": "packet: fix tp_reserve race in packet_set_ring" }, - "CVE-2021-0937": { - "cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write", - "cmt_id": "0c58c9f9c5c5326320bbe0429a0f45fc1b92024b" + "CVE-2024-24855": { + "cmt_msg": "scsi: lpfc: Fix a possible data race in lpfc_unregister_fcf_rescan()" }, - "CVE-2020-25672": { - "cmt_msg": "nfc: fix memory leak in llcp_sock_connect()", - "cmt_id": "83a09c10719661d8b51f1aa475ec52c13f3546d1" + "CVE-2024-24857": { + "cmt_msg": "" }, - "CVE-2020-25673": { - "cmt_msg": "nfc: Avoid endless loops caused by repeated llcp_sock_connect()", - "cmt_id": "79fc2e475789067b3bf3100a00f37fd9d75cbc8d" + "CVE-2019-3892": { + "cmt_msg": "coredump: fix race condition between mmget_not_zero()/get_task_mm() and core dumping" }, - "CVE-2020-25670": { - "cmt_msg": "nfc: fix refcount leak in llcp_sock_bind()", - "cmt_id": "18013007b596771bf5f5e7feee9586fb0386ad14" + "CVE-2021-29264": { + "cmt_msg": "gianfar: fix jumbo packets+napi+rx overrun crash" }, - "CVE-2020-25671": { - "cmt_msg": "nfc: fix refcount leak in llcp_sock_connect()", - "cmt_id": "013b8099064f2dc51e789e54a93edb65e2539792" + "CVE-2021-29265": { + "cmt_msg": "usbip: fix stub_dev usbip_sockfd_store() races leading to gpf" }, - "CVE-2021-22555": { - "cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write", - "cmt_id": "0c58c9f9c5c5326320bbe0429a0f45fc1b92024b" - } - }, - "4.9.269": { - "CVE-2021-33034": { - "cmt_msg": "Bluetooth: verify AMP hci_chan before amp_destroy", - "cmt_id": "31f20a6e73663c8ac3c625aa6b24cbdc8541c674" + "CVE-2022-3545": { + "cmt_msg": "nfp: fix use-after-free in area_cache_get()" }, - "CVE-2017-0605": { - "cmt_msg": "tracing: Use strlcpy() instead of strcpy() in __trace_find_cmdline()", - "cmt_id": "27b1e95a936e23a9328e1f318c199d3946352531" + "CVE-2022-3542": { + "cmt_msg": "bnx2x: fix potential memory leak in bnx2x_tpa_stop()" }, - "CVE-2021-31916": { - "cmt_msg": "dm ioctl: fix out of bounds array access when no devices", - "cmt_id": "c13f07341685149cfbc2014e8b4a85ff56d4ae0e" + "CVE-2021-21781": { + "cmt_msg": "ARM: ensure the signal page contains defined contents" }, - "CVE-2021-4157": { - "cmt_msg": "pNFS/flexfiles: fix incorrect size check in decode_nfs_fh()", - "cmt_id": "c621f3654bba1096ec913d0942e27bd032bb6090" + "CVE-2023-1838": { + "cmt_msg": "Fix double fget() in vhost_net_set_backend()" }, - "CVE-2021-32399": { - "cmt_msg": "bluetooth: eliminate the potential race condition when removing the HCI controller", - "cmt_id": "34f1f8aecf16798c91154e0f6d56b4f804a39bd1" - } - }, - "4.9.270": { - "CVE-2020-26558": { - "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical", - "cmt_id": "6555a006b21ab49090b9a7b36e92d0421db19328" + "CVE-2023-1382": { + "cmt_msg": "tipc: set con sock in tipc_conn_alloc" }, - "CVE-2021-0129": { - "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical", - "cmt_id": "6555a006b21ab49090b9a7b36e92d0421db19328" + "CVE-2018-14734": { + "cmt_msg": "infiniband: fix a possible use-after-free bug" }, - "CVE-2020-26555": { - "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical", - "cmt_id": "6555a006b21ab49090b9a7b36e92d0421db19328" - } - }, - "4.9.271": { - "CVE-2020-24587": { - "cmt_msg": "mac80211: prevent mixed key and fragment cache attacks", - "cmt_id": "bb47466456af2f1ac7ab48e5e69d4d8e0dd361e8" + "CVE-2017-15306": { + "cmt_msg": "KVM: PPC: Fix oops when checking KVM_CAP_PPC_HTM" }, - "CVE-2020-24586": { - "cmt_msg": "mac80211: prevent mixed key and fragment cache attacks", - "cmt_id": "bb47466456af2f1ac7ab48e5e69d4d8e0dd361e8" + "CVE-2018-8822": { + "cmt_msg": "staging: ncpfs: memory corruption in ncp_read_kernel()" }, - "CVE-2021-34981": { - "cmt_msg": "Bluetooth: cmtp: fix file refcount when cmtp_attach_device fails", - "cmt_id": "77c559407276ed4a8854dafc4a5efc8608e51906" + "CVE-2021-29647": { + "cmt_msg": "net: qrtr: fix a kernel-infoleak in qrtr_recvmsg()" }, - "CVE-2020-24588": { - "cmt_msg": "cfg80211: mitigate A-MSDU aggregation attacks", - "cmt_id": "81bcb7d7d5071511eb86cc3b7793607bac9d4060" + "CVE-2023-6546": { + "cmt_msg": "tty: n_gsm: fix the UAF caused by race condition in gsm_cleanup_mux" }, - "CVE-2020-26139": { - "cmt_msg": "mac80211: do not accept/forward invalid EAPOL frames", - "cmt_id": "5551cb1c68d4ecdabf8b9ea33410f68532b895cc" + "CVE-2020-14390": { + "cmt_msg": "fbcon: remove soft scrollback code" }, - "CVE-2020-26147": { - "cmt_msg": "mac80211: assure all fragments are encrypted", - "cmt_id": "29bc5b2bccf5f5601cabf9562454f213fb8dcd67" + "CVE-2021-45469": { + "cmt_msg": "f2fs: fix to do sanity check on last xattr entry in __f2fs_setxattr()" }, - "CVE-2021-29650": { - "cmt_msg": "netfilter: x_tables: Use correct memory barriers.", - "cmt_id": "e2a2d6c9accf3c3cdf44990c03498e86f27d5ea3" - } - }, - "4.9.272": { - "CVE-2021-3564": { - "cmt_msg": "Bluetooth: fix the erroneous flush_work() order", - "cmt_id": "75aa7baab3e18a98f232f14dd9cc6965bcf9b31a" + "CVE-2017-7541": { + "cmt_msg": "brcmfmac: fix possible buffer overflow in brcmf_cfg80211_mgmt_tx()" }, - "CVE-2021-38208": { - "cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect", - "cmt_id": "39c15bd2e5d11bcf7f4c3dba2aad9e1e110a5d94" + "CVE-2017-7542": { + "cmt_msg": "ipv6: avoid overflow of offset in ip6_find_1stfragopt" }, - "CVE-2021-3573": { - "cmt_msg": "Bluetooth: use correct lock to prevent UAF of hdev object", - "cmt_id": "3c62132da179fd30531958d51c68ba4915996556" + "CVE-2024-0584": { + "cmt_msg": "ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet" }, - "CVE-2021-3587": { - "cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect", - "cmt_id": "39c15bd2e5d11bcf7f4c3dba2aad9e1e110a5d94" - } - }, - "4.9.274": { - "CVE-2021-34693": { - "cmt_msg": "can: bcm: fix infoleak in struct bcm_msg_head", - "cmt_id": "d240a28396e08023987384ce80bc940bb38ac779" + "CVE-2020-0465": { + "cmt_msg": "HID: core: Sanitize event code and type when mapping input" }, - "CVE-2021-45486": { - "cmt_msg": "inet: use bigger hash table for IP ID generation", - "cmt_id": "0889f0a3bb2de535f48424491d8f9d5954a3cde8" - } - }, - "4.9.276": { - "CVE-2021-45485": { - "cmt_msg": "ipv6: use prandom_u32() for ID generation", - "cmt_id": "3fc852e59c0a48094cc0f1b2e866604986bbcd31" + "CVE-2020-0466": { + "cmt_msg": "do_epoll_ctl(): clean the failure exits up a bit" }, - "CVE-2022-0850": { - "cmt_msg": "ext4: fix kernel infoleak via ext4_extent_header", - "cmt_id": "25dcc64fa0c9399653e1fd1a4bad6c1e8cb31f3f" + "CVE-2017-15274": { + "cmt_msg": "KEYS: fix dereferencing NULL payload with nonzero length" }, - "CVE-2023-28772": { - "cmt_msg": "seq_buf: Fix overflow in seq_buf_putmem_hex()", - "cmt_id": "f2b9f758e1dfb593872fd0fcd7644875bcb8757a" + "CVE-2024-0340": { + "cmt_msg": "vhost: use kzalloc() instead of kmalloc() followed by memset()" }, - "CVE-2021-3609": { - "cmt_msg": "can: bcm: delay release of struct bcm_op after synchronize_rcu()", - "cmt_id": "545914a9f926b8b6c9193cdee352c1fa70e6df18" + "CVE-2019-19523": { + "cmt_msg": "USB: adutux: fix use-after-free on disconnect" }, - "CVE-2021-33909": { - "cmt_msg": "seq_file: disallow extremely large seq buffer allocations", - "cmt_id": "c5157b3e775dac31d51b11f993a06a84dc11fc8c" + "CVE-2019-11135": { + "cmt_msg": "x86/msr: Add the IA32_TSX_CTRL MSR" }, - "CVE-2021-38160": { - "cmt_msg": "virtio_console: Assure used length from device is limited", - "cmt_id": "9e2b8368b2079437c6840f3303cb0b7bc9b896ee" - } - }, - "4.9.277": { - "CVE-2021-38204": { - "cmt_msg": "usb: max-3421: Prevent corruption of freed memory", - "cmt_id": "ae3209b9fb086661ec1de4d8f4f0b951b272bbcd" + "CVE-2021-27365": { + "cmt_msg": "scsi: iscsi: Ensure sysfs attributes are limited to PAGE_SIZE" }, - "CVE-2021-3679": { - "cmt_msg": "tracing: Fix bug in rb_per_cpu_empty() that might cause deadloop.", - "cmt_id": "7db12bae1a239d872d17e128fd5271da789bf99c" + "CVE-2021-27364": { + "cmt_msg": "scsi: iscsi: Restrict sessions and handles to admin capabilities" }, - "CVE-2021-37576": { - "cmt_msg": "KVM: PPC: Book3S: Fix H_RTAS rets buffer overflow", - "cmt_id": "8c46b4b2749c4b3b7e602403addc32ec2b48baed" - } - }, - "4.9.278": { - "CVE-2021-0920": { - "cmt_msg": "af_unix: fix garbage collect vs MSG_PEEK", - "cmt_id": "a805a7bd94644207d762d9c287078fecfcf52b3e" + "CVE-2021-27363": { + "cmt_msg": "scsi: iscsi: Restrict sessions and handles to admin capabilities" }, - "CVE-2021-21781": { - "cmt_msg": "ARM: ensure the signal page contains defined contents", - "cmt_id": "aa1b5f2fe4532e99986f1eee2c04bb7d314e3007" - } - }, - "4.9.280": { - "CVE-2021-38205": { - "cmt_msg": "net: xilinx_emaclite: Do not print real IOMEM pointer", - "cmt_id": "ffdc1e312e2074875147c1df90764a9bae56f11f" + "CVE-2021-20320": { + "cmt_msg": "s390/bpf: Fix optimizing out zero-extensions" }, - "CVE-2021-3732": { - "cmt_msg": "ovl: prevent private clone if bind mount is not allowed", - "cmt_id": "e3eee87c846dc47f6d8eb6d85e7271f24122a279" - } - }, - "4.9.281": { - "CVE-2021-3653": { - "cmt_msg": "KVM: nSVM: avoid picking up unsupported bits from L2 in int_ctl (CVE-2021-3653)", - "cmt_id": "29c4f674715ba8fe7a391473313e8c71f98799c4" + "CVE-2021-20321": { + "cmt_msg": "ovl: fix missing negative dentry check in ovl_rename()" }, - "CVE-2021-42008": { - "cmt_msg": "net: 6pack: fix slab-out-of-bounds in decode_data", - "cmt_id": "de9171c1d9a5c2c4c5ec5e64f420681f178152fa" - } - }, - "4.9.282": { - "CVE-2021-39633": { - "cmt_msg": "ip_gre: add validation for csum_start", - "cmt_id": "41d5dfa408130433cc5f037ad89bed854bf936f7" + "CVE-2017-18360": { + "cmt_msg": "USB: serial: io_ti: fix div-by-zero in set_termios" }, - "CVE-2021-3753": { - "cmt_msg": "vt_kdsetmode: extend console locking", - "cmt_id": "755a2f40dda2d6b2e3b8624cb052e68947ee4d1f" - } - }, - "4.9.283": { - "CVE-2022-20141": { - "cmt_msg": "igmp: Add ip_mc_list lock in ip_check_mc_rcu", - "cmt_id": "e9924c4204ede999b0515fd31a370a1e27f676bc" + "CVE-2017-5967": { + "cmt_msg": "time: Remove CONFIG_TIMER_STATS" }, - "CVE-2021-40490": { - "cmt_msg": "ext4: fix race writing to an inline_data file while its xattrs are changing", - "cmt_id": "7067b09fe587cbd47544a3047a40c64e4d636fff" + "CVE-2022-3169": { + "cmt_msg": "nvme: ensure subsystem reset is single threaded" }, - "CVE-2020-3702": { - "cmt_msg": "ath: Use safer key clearing with key cache entries", - "cmt_id": "ea3f7df20fc8e0b82ec0e065b0b0d38e55fd7775" - } - }, - "4.9.284": { - "CVE-2021-20320": { - "cmt_msg": "s390/bpf: Fix optimizing out zero-extensions", - "cmt_id": "c22cf38428cb910f1996839c917e9238d2e44d4b" + "CVE-2018-20976": { + "cmt_msg": "xfs: clear sb->s_fs_info on mount failure" }, - "CVE-2021-3655": { - "cmt_msg": "sctp: validate from_addr_param return", - "cmt_id": "92e7bca98452aa760713016a434aa7edfc09fb13" - } - }, - "4.9.286": { - "CVE-2021-4203": { - "cmt_msg": "af_unix: fix races in sk_peer_pid and sk_peer_cred accesses", - "cmt_id": "09818f629bafbe20e24bac919019853ea3ac5ca4" - } - }, - "4.9.287": { - "CVE-2021-41864": { - "cmt_msg": "bpf: Fix integer overflow in prealloc_elems_and_freelist()", - "cmt_id": "4fd6663eb01bc3c73143cd27fefd7b8351bc6aa6" + "CVE-2023-22995": { + "cmt_msg": "usb: dwc3: dwc3-qcom: Add missing platform_device_put() in dwc3_qcom_acpi_register_core" }, - "CVE-2020-29374": { - "cmt_msg": "gup: document and work around \"COW can break either way\" issue", - "cmt_id": "9bbd42e79720122334226afad9ddcac1c3e6d373" + "CVE-2021-3542": { + "cmt_msg": "" }, - "CVE-2021-20321": { - "cmt_msg": "ovl: fix missing negative dentry check in ovl_rename()", - "cmt_id": "286f94453fb34f7bd6b696861c89f9a13f498721" - } - }, - "4.9.288": { - "CVE-2021-3896": { - "cmt_msg": "isdn: cpai: check ctr->cnr to avoid array index out of bound", - "cmt_id": "24219a977bfe3d658687e45615c70998acdbac5a" + "CVE-2017-16650": { + "cmt_msg": "net: qmi_wwan: fix divide by 0 on bad descriptors" }, - "CVE-2022-0644": { - "cmt_msg": "vfs: check fd has read access in kernel_read_file_from_fd()", - "cmt_id": "52ed5a196b1146e0368e95edc23c38fa1b50825a" + "CVE-2018-12929": { + "cmt_msg": "" }, - "CVE-2021-3760": { - "cmt_msg": "nfc: nci: fix the UAF of rf_conn_info object", - "cmt_id": "8a44904ce83ebcb1281b04c8d37ad7f8ab537a3d" + "CVE-2018-12928": { + "cmt_msg": "" }, - "CVE-2021-43389": { - "cmt_msg": "isdn: cpai: check ctr->cnr to avoid array index out of bound", - "cmt_id": "24219a977bfe3d658687e45615c70998acdbac5a" - } - }, - "4.9.289": { - "CVE-2021-3772": { - "cmt_msg": "sctp: use init_tag from inithdr for ABORT chunk", - "cmt_id": "42ce7a69f8140783bab908dc29a93c0bcda315d5" - } - }, - "4.9.290": { - "CVE-2021-37159": { - "cmt_msg": "usb: hso: fix error handling code of hso_create_net_device", - "cmt_id": "88b912e02d75bacbb957d817db70e6a54ea3a21c" - } - }, - "4.9.291": { - "CVE-2021-4202": { - "cmt_msg": "NFC: reorganize the functions in nci_request", - "cmt_id": "4a59a3681158a182557c75bacd00d184f9b2a8f5" + "CVE-2020-36310": { + "cmt_msg": "KVM: SVM: avoid infinite loop on NPF from bad address" }, - "CVE-2021-39686": { - "cmt_msg": "binder: use euid from cred instead of using task", - "cmt_id": "443fc43d2fdbf55be7aa86faae1f7655e761e683" + "CVE-2020-36313": { + "cmt_msg": "KVM: Fix out of range accesses to memslots" + }, + "CVE-2020-35519": { + "cmt_msg": "net/x25: prevent a couple of overflows" + }, + "CVE-2020-10708": { + "cmt_msg": "" + }, + "CVE-2018-5344": { + "cmt_msg": "loop: fix concurrent lo_open/lo_release" + }, + "CVE-2017-12153": { + "cmt_msg": "nl80211: check for the required netlink attributes presence" }, - "CVE-2023-0047": { - "cmt_msg": "mm, oom: do not trigger out_of_memory from the #PF", - "cmt_id": "973b61a5f3ba6690624d109a68cca35d0348b91f" + "CVE-2017-12154": { + "cmt_msg": "kvm: nVMX: Don't allow L2 to access the hardware CR8" }, - "CVE-2021-3640": { - "cmt_msg": "Bluetooth: sco: Fix lock_sock() blockage by memcpy_from_msg()", - "cmt_id": "9bbe312ebea40c9b586c2b07a0d0948ff418beca" + "CVE-2022-21499": { + "cmt_msg": "lockdown: also lock down previous kgdb use" }, - "CVE-2021-45868": { - "cmt_msg": "quota: check block number when reading the block in quota file", - "cmt_id": "f7dd331a896700728492e02c20a69e53221cd7a4" + "CVE-2023-20593": { + "cmt_msg": "x86/cpu/amd: Add a Zenbleed fix" }, - "CVE-2021-3752": { - "cmt_msg": "Bluetooth: fix use-after-free error in lock_sock_nested()", - "cmt_id": "d19ea7da0eeb61be28ec05d8b8bddec3dde71610" - } - }, - "4.9.292": { - "CVE-2021-4002": { - "cmt_msg": "hugetlbfs: flush TLBs correctly after huge_pmd_unshare", - "cmt_id": "8e80bf5d001594b037de04fb4fe89f34cfbcb3ba" + "CVE-2017-5549": { + "cmt_msg": "USB: serial: kl5kusb105: fix line-state error handling" }, - "CVE-2021-4083": { - "cmt_msg": "fget: check that the fd still exists after getting a ref to it", - "cmt_id": "a043f5a600052dc93bc3d7a6a2c1592b6ee77482" - } - }, - "4.9.293": { - "CVE-2022-20132": { - "cmt_msg": "HID: add hid_is_usb() function to make it simpler for USB detection", - "cmt_id": "28d8244f3ec961a11bfb4ad83cdc48ff9b8c47a7" + "CVE-2017-5547": { + "cmt_msg": "HID: corsair: fix DMA buffers on stack" }, - "CVE-2021-39698": { - "cmt_msg": "wait: add wake_up_pollfree()", - "cmt_id": "0e92a7e47a0411d5208990c83a3d200515e314e8" + "CVE-2017-5546": { + "cmt_msg": "mm/slab.c: fix SLAB freelist randomization duplicate entries" }, - "CVE-2021-39685": { - "cmt_msg": "USB: gadget: detect too-big endpoint 0 requests", - "cmt_id": "d2ca6859ea96c6d4c6ad3d6873a308a004882419" - } - }, - "4.9.294": { - "CVE-2021-28715": { - "cmt_msg": "xen/netback: don't queue unlimited number of packages", - "cmt_id": "b4226b387436315e7f57465c15335f4f4b5b075d" + "CVE-2022-2380": { + "cmt_msg": "video: fbdev: sm712fb: Fix crash in smtcfb_read()" }, - "CVE-2021-28714": { - "cmt_msg": "xen/netback: fix rx queue stall detection", - "cmt_id": "1f66dc775092e5a353e0155fc3aca5dabce77c63" + "CVE-2022-0850": { + "cmt_msg": "ext4: fix kernel infoleak via ext4_extent_header" }, - "CVE-2021-28713": { - "cmt_msg": "xen/console: harden hvc_xen against event channel storms", - "cmt_id": "728389c21176b2095fa58e858d5ef1d2f2aac429" + "CVE-2019-19447": { + "cmt_msg": "ext4: work around deleting a file with i_nlink == 0 safely" }, - "CVE-2021-28712": { - "cmt_msg": "xen/netfront: harden netfront against event channel storms", - "cmt_id": "99120c8230fdd5e8b72a6e4162db9e1c0a61954a" + "CVE-2021-3612": { + "cmt_msg": "Input: joydev - prevent potential read overflow in ioctl" }, - "CVE-2021-28711": { - "cmt_msg": "xen/blkfront: harden blkfront against event channel storms", - "cmt_id": "25898389795bd85d8e1520c0c75c3ad906c17da7" - } - }, - "4.9.295": { - "CVE-2022-1195": { - "cmt_msg": "hamradio: improve the incomplete fix to avoid NPD", - "cmt_id": "83ba6ec97c74fb1a60f7779a26b6a94b28741d8a" - } - }, - "4.9.297": { - "CVE-2021-45095": { - "cmt_msg": "phonet: refcount leak in pep_sock_accep", - "cmt_id": "3bae29ecb2909c46309671090311230239f1bdd7" + "CVE-2019-19448": { + "cmt_msg": "btrfs: only search for left_info if there is no right_info in try_merge_free_space" }, - "CVE-2021-4155": { - "cmt_msg": "xfs: map unwritten blocks in XFS_IOC_{ALLOC,FREE}SP just like fallocate", - "cmt_id": "19e3d9a26f28f432ae89acec22ec47b2a72a502c" - } - }, - "4.9.298": { - "CVE-2020-36322": { - "cmt_msg": "fuse: fix bad inode", - "cmt_id": "3a2f8823aa565cc67bdd00c4cd5e1d8ad81e8436" + "CVE-2019-19449": { + "cmt_msg": "f2fs: fix to do sanity check on segment/section count" }, - "CVE-2021-20317": { - "cmt_msg": "lib/timerqueue: Rely on rbtree semantics for next timer", - "cmt_id": "ef2e64035f074bfeef14c28347aaec0b486a9e9f" + "CVE-2020-11725": { + "cmt_msg": "" }, - "CVE-2021-43976": { - "cmt_msg": "mwifiex: Fix skb_over_panic in mwifiex_usb_recv()", - "cmt_id": "b233d7395cd104398dd83f130df5f0d57036c95e" + "CVE-2023-30456": { + "cmt_msg": "KVM: nVMX: add missing consistency checks for CR0 and CR4" }, - "CVE-2021-29264": { - "cmt_msg": "gianfar: fix jumbo packets+napi+rx overrun crash", - "cmt_id": "2cf34285e6eac396a180762c5504e2911df88c9a" + "CVE-2021-35477": { + "cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4" }, - "CVE-2021-33033": { - "cmt_msg": "cipso,calipso: resolve a number of problems with the DOI refcounts", - "cmt_id": "f49f0e65a95664b648e058aa923f651ec08dfeb7" + "CVE-2024-26758": { + "cmt_msg": "md: Don't ignore suspended array in md_check_recovery()" }, - "CVE-2021-20292": { - "cmt_msg": "drm/ttm/nouveau: don't call tt destroy callback on alloc failure.", - "cmt_id": "70f44dfbde027f444412cfb4ea9b485a4c1dec0e" + "CVE-2024-26759": { + "cmt_msg": "mm/swap: fix race when skipping swapcache" }, - "CVE-2021-22543": { - "cmt_msg": "KVM: do not allow mapping valid but non-reference-counted pages", - "cmt_id": "f4b2bfed80e8d0e91b431dd1c21bc3c2c4d5f07e" - } - }, - "4.9.299": { - "CVE-2021-38198": { - "cmt_msg": "KVM: X86: MMU: Use the correct inherited permissions to get shadow page", - "cmt_id": "e262acbda232b6a2a9adb53f5d2b2065f7626625" + "CVE-2022-1729": { + "cmt_msg": "perf: Fix sys_perf_event_open() race against self" }, - "CVE-2021-38199": { - "cmt_msg": "NFSv4: Initialise connection to the server in nfs4_alloc_client()", - "cmt_id": "993892ed82350d0b4eb7d321d2bb225219bd1cfc" + "CVE-2024-26752": { + "cmt_msg": "l2tp: pass correct message length to ip6_append_data" }, - "CVE-2022-0330": { - "cmt_msg": "drm/i915: Flush TLBs before releasing backing store", - "cmt_id": "84f4ab5b47d955ad2bb30115d7841d3e8f0994f4" + "CVE-2024-26754": { + "cmt_msg": "gtp: fix use-after-free and null-ptr-deref in gtp_genl_dump_pdp()" }, - "CVE-2021-42739": { - "cmt_msg": "media: firewire: firedtv-avc: fix a buffer overflow in avc_ca_pmt()", - "cmt_id": "1795af6435fa5f17ced2d34854fd4871e0780092" - } - }, - "4.9.300": { - "CVE-2022-24448": { - "cmt_msg": "NFSv4: Handle case where the lookup of a directory fails", - "cmt_id": "8788981e120694a82a3672e062fe4ea99446634a" + "CVE-2024-26756": { + "cmt_msg": "md: Don't register sync_thread for reshape directly" }, - "CVE-2020-36516": { - "cmt_msg": "ipv4: avoid using shared IP generator for connected sockets", - "cmt_id": "2b77927a8cb7f540ca2bccff4017745104fe371b" + "CVE-2024-26757": { + "cmt_msg": "md: Don't ignore read-only array in md_check_recovery()" }, - "CVE-2022-0617": { - "cmt_msg": "udf: Fix NULL ptr deref when converting from inline format", - "cmt_id": "f24454e42b5a58267928b0de53b0dd9b43e4dd46" - } - }, - "4.9.301": { - "CVE-2022-0492": { - "cmt_msg": "cgroup-v1: Require capabilities to set release_agent", - "cmt_id": "7e33a0ad792f04bad920c7197bda8cc2ea08d304" + "CVE-2021-28038": { + "cmt_msg": "Xen/gnttab: handle p2m update errors on a per-slot basis" }, - "CVE-2022-0435": { - "cmt_msg": "tipc: improve size validations for received domain records", - "cmt_id": "175db196e45d6f0e6047eccd09c8ba55465eb131" + "CVE-2020-27068": { + "cmt_msg": "cfg80211: add missing policy for NL80211_ATTR_STATUS_CODE" }, - "CVE-2022-0487": { - "cmt_msg": "moxart: fix potential use-after-free on remove path", - "cmt_id": "f5dc193167591e88797262ec78515a0cbe79ff5f" - } - }, - "4.9.302": { - "CVE-2022-25375": { - "cmt_msg": "usb: gadget: rndis: check size of RNDIS_MSG_SET command", - "cmt_id": "ff0a90739925734c91c7e39befe3f4378e0c1369" + "CVE-2020-14305": { + "cmt_msg": "netfilter: helpers: remove data_len usage for inkernel helpers" }, - "CVE-2022-25258": { - "cmt_msg": "USB: gadget: validate interface OS descriptor requests", - "cmt_id": "f3bcd744b0bc8dcc6cdb3ac5be20f54aecfb78a4" - } - }, - "4.9.303": { "CVE-2022-2964": { - "cmt_msg": "net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup", - "cmt_id": "711b6bf3fb052f0a6b5b3205d50e30c0c2980382" - } - }, - "4.9.304": { - "CVE-2022-27223": { - "cmt_msg": "USB: gadget: validate endpoint index for xilinx udc", - "cmt_id": "958b6ab4d70bf991e8c90233504d4cb863aaef8a" - }, - "CVE-2022-26966": { - "cmt_msg": "sr9700: sanity check for packet length", - "cmt_id": "89260e0e191e8a3a9872f72836bdf0641853c87f" - } - }, - "4.9.305": { - "CVE-2022-24958": { - "cmt_msg": "usb: gadget: don't release an existing dev->buf", - "cmt_id": "be1bb345f180482b0e57768d967ef020d7cba592" - } - }, - "4.9.306": { - "CVE-2022-23038": { - "cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()", - "cmt_id": "73e1d9b33f2bd93ce30719dfc8990b6328243b7e" + "cmt_msg": "net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup" }, - "CVE-2022-23039": { - "cmt_msg": "xen/gntalloc: don't use gnttab_query_foreign_access()", - "cmt_id": "97b835c6de03a24db79d374b02d532f0b562fd38" + "CVE-2024-26689": { + "cmt_msg": "ceph: prevent use-after-free in encode_cap_msg()" }, - "CVE-2022-23960": { - "cmt_msg": "ARM: report Spectre v2 status through sysfs", - "cmt_id": "b24d4041cfb6dab83f9edf40573375bd1365e619" + "CVE-2022-2961": { + "cmt_msg": "" }, - "CVE-2022-23036": { - "cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()", - "cmt_id": "73e1d9b33f2bd93ce30719dfc8990b6328243b7e" + "CVE-2024-26686": { + "cmt_msg": "fs/proc: do_task_stat: use sig->stats_lock to gather the threads/children stats" }, - "CVE-2022-23037": { - "cmt_msg": "xen/netfront: don't use gnttab_query_foreign_access() for mapped status", - "cmt_id": "1112bb311ec13e7e6e7045ae4a0b7091bedc6b7a" + "CVE-2024-26687": { + "cmt_msg": "xen/events: close evtchn after mapping cleanup" }, - "CVE-2022-0001": { - "cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE", - "cmt_id": "a771511caa8e31cb5cac4fa39165ebbca3e62795" + "CVE-2023-3268": { + "cmt_msg": "relayfs: fix out-of-bounds access in relay_file_read" }, - "CVE-2022-0002": { - "cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE", - "cmt_id": "a771511caa8e31cb5cac4fa39165ebbca3e62795" + "CVE-2023-45871": { + "cmt_msg": "igb: set max size RX buffer when store bad packet is enabled" }, - "CVE-2021-26401": { - "cmt_msg": "x86/speculation: Use generic retpoline by default on AMD", - "cmt_id": "b6a1aec08a84ccb331ce526c051df074150cf3c5" + "CVE-2020-12114": { + "cmt_msg": "make struct mountpoint bear the dentry reference to mountpoint, not struct mount" }, - "CVE-2022-23040": { - "cmt_msg": "xen/xenbus: don't let xenbus_grant_ring() remove grants in error case", - "cmt_id": "8f80d12f6946a6fe7c64bfc204c062a57f83c7f8" + "CVE-2021-4218": { + "cmt_msg": "sysctl: pass kernel pointers to ->proc_handler" }, - "CVE-2022-23042": { - "cmt_msg": "xen/netfront: react properly to failing gnttab_end_foreign_access_ref()", - "cmt_id": "c4497b057b14274e159434f0ed70439a21f3d2a9" - } - }, - "4.9.307": { - "CVE-2022-1199": { - "cmt_msg": "ax25: Fix NULL pointer dereference in ax25_kill_by_device", - "cmt_id": "cad71f1094834eb69f7ceec8100d300c26b43053" + "CVE-2023-0266": { + "cmt_msg": "ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF" }, - "CVE-2021-4149": { - "cmt_msg": "btrfs: unlock newly allocated extent buffer after error", - "cmt_id": "43bfa08ba62a1ca7a22365c7092e491e04327efb" - } - }, - "4.9.308": { - "CVE-2022-20368": { - "cmt_msg": "net/packet: fix slab-out-of-bounds access in packet_recvmsg()", - "cmt_id": "b9d5772d60f8e7ef34e290f72fc20e3a4883e7d0" + "CVE-2019-10142": { + "cmt_msg": "drivers/virt/fsl_hypervisor.c: prevent integer overflow in ioctl" }, - "CVE-2022-20158": { - "cmt_msg": "net/packet: fix slab-out-of-bounds access in packet_recvmsg()", - "cmt_id": "b9d5772d60f8e7ef34e290f72fc20e3a4883e7d0" - } - }, - "4.9.309": { - "CVE-2022-26490": { - "cmt_msg": "nfc: st21nfca: Fix potential buffer overflows in EVT_TRANSACTION", - "cmt_id": "c1184fa07428fb81371d5863e09795f0d06d35cf" + "CVE-2023-52640": { + "cmt_msg": "fs/ntfs3: Fix oob in ntfs_listxattr" }, - "CVE-2022-28356": { - "cmt_msg": "llc: fix netdevice reference leaks in llc_ui_bind()", - "cmt_id": "0a7aad979bfb43c4a78d33a5f356caf4ceb28bca" + "CVE-2023-52641": { + "cmt_msg": "fs/ntfs3: Add NULL ptr dereference checking at the end of attr_allocate_frame()" }, - "CVE-2022-1016": { - "cmt_msg": "netfilter: nf_tables: initialize registers in nft_do_chain()", - "cmt_id": "4d28522acd1c4415c85f6b33463713a268f68965" - } - }, - "4.9.311": { - "CVE-2022-28390": { - "cmt_msg": "can: ems_usb: ems_usb_start_xmit(): fix double dev_kfree_skb() in error path", - "cmt_id": "e9c4ee674586ff0b098d17638af719aa56c9c272" + "CVE-2021-0399": { + "cmt_msg": "" }, - "CVE-2022-2380": { - "cmt_msg": "video: fbdev: sm712fb: Fix crash in smtcfb_read()", - "cmt_id": "e6766bb02614ad69218dcd849668524e46916e11" + "CVE-2023-52488": { + "cmt_msg": "serial: sc16is7xx: convert from _raw_ to _noinc_ regmap functions for FIFO" }, - "CVE-2022-41858": { - "cmt_msg": "drivers: net: slip: fix NPD bug in sl_tx_timeout()", - "cmt_id": "113284fe48770841e157e338bf3a2e9f197a8b50" + "CVE-2023-52489": { + "cmt_msg": "mm/sparsemem: fix race in accessing memory_section->usage" }, - "CVE-2022-1353": { - "cmt_msg": "af_key: add __GFP_ZERO flag for compose_sadb_supported in function pfkey_register", - "cmt_id": "7b0e01a9b7f2aaeb6fa73b35864b1d7dc6e795c4" + "CVE-2023-52484": { + "cmt_msg": "iommu/arm-smmu-v3: Fix soft lockup triggered by arm_smmu_mm_invalidate_range" }, - "CVE-2022-30594": { - "cmt_msg": "ptrace: Check PTRACE_O_SUSPEND_SECCOMP permission on PTRACE_SEIZE", - "cmt_id": "4f96b94a8342fac058117962f1a76fc7ebd1c245" + "CVE-2020-2732": { + "cmt_msg": "KVM: nVMX: Don't emulate instructions in guest mode" }, - "CVE-2022-3111": { - "cmt_msg": "power: supply: wm8350-power: Add missing free in free_charger_irq", - "cmt_id": "a6a3ec1626846fba62609330673a2dd5007d6a53" + "CVE-2023-52486": { + "cmt_msg": "drm: Don't unref the same fb many times by mistake due to deadlock handling" }, - "CVE-2022-1198": { - "cmt_msg": "drivers: hamradio: 6pack: fix UAF bug caused by mod_timer()", - "cmt_id": "45d1a63bacf2b6ab27f9b11b5a2431e19d34d01f" + "CVE-2023-52480": { + "cmt_msg": "ksmbd: fix race condition between session lookup and expire" }, - "CVE-2022-3202": { - "cmt_msg": "jfs: prevent NULL deref in diFree", - "cmt_id": "d2e45f0bc25da09efcac658d6e405115fcfa83c2" - } - }, - "4.9.313": { - "CVE-2022-1836": { - "cmt_msg": "floppy: disable FDRAWCMD by default", - "cmt_id": "0dd02ff72c6daf4e7800fb5dd1109fbacdde97dc" + "CVE-2023-52481": { + "cmt_msg": "arm64: errata: Add Cortex-A520 speculative unprivileged load workaround" }, - "CVE-2022-1734": { - "cmt_msg": "nfc: nfcmrvl: main: reorder destructive operations in nfcmrvl_nci_unregister_dev to avoid bugs", - "cmt_id": "4721695be941626e4b18b89e0641e36fc385cfd8" + "CVE-2023-52482": { + "cmt_msg": "x86/srso: Add SRSO mitigation for Hygon processors" }, - "CVE-2022-33981": { - "cmt_msg": "floppy: disable FDRAWCMD by default", - "cmt_id": "0dd02ff72c6daf4e7800fb5dd1109fbacdde97dc" + "CVE-2023-4128": { + "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free" }, - "CVE-2023-3159": { - "cmt_msg": "firewire: fix potential uaf in outbound_phy_packet_callback()", - "cmt_id": "2a08a260d2294b2ecd4190cceaaf12ae81f3cb9f" + "CVE-2021-47128": { + "cmt_msg": "bpf, lockdown, audit: Fix buggy SELinux lockdown permission checks" }, - "CVE-2022-1974": { - "cmt_msg": "nfc: replace improper check device_is_registered() in netlink related functions", - "cmt_id": "fa2217b66467917a623993c14d671661ad625fb6" + "CVE-2017-6214": { + "cmt_msg": "tcp: avoid infinite loop in tcp_splice_read()" }, - "CVE-2022-1975": { - "cmt_msg": "NFC: netlink: fix sleep in atomic bug when firmware download timeout", - "cmt_id": "a93ea9595fde438996d7b9322749d4d1921162f7" - } - }, - "4.9.316": { - "CVE-2022-1652": { - "cmt_msg": "floppy: use a statically allocated error counter", - "cmt_id": "2adafe1c646b462c755e99216f966927eec96059" + "CVE-2017-8066": { + "cmt_msg": "can: gs_usb: Don't use stack memory for USB transfers" }, - "CVE-2022-48619": { - "cmt_msg": "Input: add bounds checking to input_set_capability()", - "cmt_id": "3e6fa9e4a7a89d67e01424317f7a2e9551025022" + "CVE-2018-17182": { + "cmt_msg": "mm: get rid of vmacache_flush_all() entirely" }, - "CVE-2023-4459": { - "cmt_msg": "net: vmxnet3: fix possible NULL pointer dereference in vmxnet3_rq_cleanup()", - "cmt_id": "e40ed72f8c8b04ae629d895ed7eb221d8938cdd7" + "CVE-2017-8064": { + "cmt_msg": "[media] dvb-usb-v2: avoid use-after-free" }, - "CVE-2023-4387": { - "cmt_msg": "net: vmxnet3: fix possible use-after-free bugs in vmxnet3_rq_alloc_rx_buf()", - "cmt_id": "aae66daa4a8925109c87702979e767346291d1e2" + "CVE-2021-47122": { + "cmt_msg": "net: caif: fix memory leak in caif_device_notify" }, - "CVE-2022-1729": { - "cmt_msg": "perf: Fix sys_perf_event_open() race against self", - "cmt_id": "a1466528d8ae5d9a3bb29781f0098fa3476e9e1c" - } - }, - "4.9.317": { - "CVE-2022-20572": { - "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag", - "cmt_id": "27798cca4e54fe9c390396c4cc655480f827bbd5" + "CVE-2021-47121": { + "cmt_msg": "net: caif: fix memory leak in cfusbl_device_notify" }, - "CVE-2022-2503": { - "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag", - "cmt_id": "27798cca4e54fe9c390396c4cc655480f827bbd5" + "CVE-2021-47125": { + "cmt_msg": "sch_htb: fix refcount leak in htb_parent_to_leaf_offload" }, - "CVE-2022-0494": { - "cmt_msg": "block-map: add __GFP_ZERO flag for alloc_page in function bio_copy_kern", - "cmt_id": "d59073bedb7cf752b8cd4027dd0f67cf7ac4330f" - } - }, - "4.9.318": { - "CVE-2023-4385": { - "cmt_msg": "fs: jfs: fix possible NULL pointer dereference in dbFree()", - "cmt_id": "6c4ad94011e20f4134b0606d9b68d5db564828e1" + "CVE-2021-47124": { + "cmt_msg": "io_uring: fix link timeout refs" }, - "CVE-2022-32250": { - "cmt_msg": "netfilter: nf_tables: disallow non-stateful expression in sets earlier", - "cmt_id": "94e9b75919619ba8c4072abc4917011a7a888a79" + "CVE-2019-15118": { + "cmt_msg": "ALSA: usb-audio: Fix a stack buffer overflow bug in check_input_term" }, - "CVE-2022-1184": { - "cmt_msg": "ext4: verify dir block before splitting it", - "cmt_id": "93bbf0498ba20eadcd7132bd3cfdaff54eb72751" + "CVE-2019-12818": { + "cmt_msg": "net: nfc: Fix NULL dereference on nfc_llcp_build_tlv fails" }, - "CVE-2022-1966": { - "cmt_msg": "netfilter: nf_tables: disallow non-stateful expression in sets earlier", - "cmt_id": "94e9b75919619ba8c4072abc4917011a7a888a79" + "CVE-2019-12819": { + "cmt_msg": "mdio_bus: Fix use-after-free on device_register fails" }, - "CVE-2022-32981": { - "cmt_msg": "powerpc/32: Fix overread/overwrite of thread_struct via ptrace", - "cmt_id": "89dda10b73b7ce184caf18754907126ce7ce3fad" - } - }, - "4.9.319": { - "CVE-2022-21125": { - "cmt_msg": "x86/speculation/mmio: Reuse SRBDS mitigation for SBDS", - "cmt_id": "b7efb3a62fffa509e21d076aa2e75331c79fe36d" + "CVE-2023-0394": { + "cmt_msg": "ipv6: raw: Deduct extension header length in rawv6_push_pending_frames" }, - "CVE-2022-21166": { - "cmt_msg": "x86/speculation/mmio: Enable CPU Fill buffer clearing on idle", - "cmt_id": "6ecdbc9dc777a5b66a9ec293af88ab330dd644a2" + "CVE-2019-19332": { + "cmt_msg": "KVM: x86: fix out-of-bounds write in KVM_GET_EMULATED_CPUID (CVE-2019-19332)" }, - "CVE-2022-21123": { - "cmt_msg": "x86/speculation/mmio: Add mitigation for Processor MMIO Stale Data", - "cmt_id": "a11f2f05f5c605d1f6573b0cdcd2a6f38667fda1" - } - }, - "4.9.320": { - "CVE-2022-32296": { - "cmt_msg": "tcp: increase source port perturb table to 2^16", - "cmt_id": "3c78eea640f69e2198b69128173e6d65a0bcdc02" + "CVE-2019-15117": { + "cmt_msg": "ALSA: usb-audio: Fix an OOB bug in parse_audio_mixer_unit" }, - "CVE-2022-1011": { - "cmt_msg": "fuse: fix pipe buffer lifetime for direct_io", - "cmt_id": "b79d4d0da659a3c7bd1d5913e62188ceb9be9c49" + "CVE-2022-25258": { + "cmt_msg": "USB: gadget: validate interface OS descriptor requests" }, - "CVE-2022-0812": { - "cmt_msg": "xprtrdma: fix incorrect header size calculations", - "cmt_id": "ca6226b5c5b4cf8c41ab7c759686c9aab43a2a33" + "CVE-2020-3702": { + "cmt_msg": "ath: Use safer key clearing with key cache entries" }, - "CVE-2022-1012": { - "cmt_msg": "secure_seq: use the 64 bits of the siphash for port offset calculation", - "cmt_id": "576696ed0dee677ec868960c39d96ae3b8c95a3f" - } - }, - "4.9.321": { - "CVE-2021-33656": { - "cmt_msg": "vt: drop old FONT ioctls", - "cmt_id": "dc1421db273b725ebe90978a4b2d9bfba5cef702" - } - }, - "4.9.322": { - "CVE-2022-2318": { - "cmt_msg": "net: rose: fix UAF bugs caused by timer handler", - "cmt_id": "3ab68a9528780870b84200bbd91efaa47a586a3c" + "CVE-2023-3117": { + "cmt_msg": "netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE" }, - "CVE-2022-33742": { - "cmt_msg": "xen/blkfront: force data bouncing when backend is untrusted", - "cmt_id": "8dad9a67100245295373523375610be850999b37" + "CVE-2023-3111": { + "cmt_msg": "btrfs: unset reloc control if transaction commit fails in prepare_to_relocate()" }, - "CVE-2022-33741": { - "cmt_msg": "xen/netfront: force data bouncing when backend is untrusted", - "cmt_id": "c6e941364608d911ac7b055d27d86e360fd94aed" + "CVE-2019-3882": { + "cmt_msg": "vfio/type1: Limit DMA mappings per container" }, - "CVE-2022-33740": { - "cmt_msg": "xen/netfront: fix leaking data in shared pages", - "cmt_id": "d1d69e0c838c2df7089357ec27000942086325c4" + "CVE-2024-24861": { + "cmt_msg": "media: xc4000: Fix atomicity violation in xc4000_get_frequency" }, - "CVE-2022-26365": { - "cmt_msg": "xen/blkfront: fix leaking data in shared pages", - "cmt_id": "4fbda9d1fc771b44e96ee4cea58f37d926010ffc" + "CVE-2019-18675": { + "cmt_msg": "mmap: introduce sane default mmap limits" }, - "CVE-2022-33744": { - "cmt_msg": "xen/arm: Fix race in RB-tree based P2M accounting", - "cmt_id": "856d1b8e6e826b5087f1ea3fdbabda3557d73599" - } - }, - "4.9.324": { - "CVE-2022-36123": { - "cmt_msg": "x86: Clear .brk area at early boot", - "cmt_id": "b3d7c509bcbd4384d4964dcdf028b3c3e0adb7f7" - } - }, - "4.9.325": { - "CVE-2022-1462": { - "cmt_msg": "tty: use new tty_insert_flip_string_and_push_buffer() in pty_write()", - "cmt_id": "41ce14090db93fc2f0c8a27ce8a324b0192da7b5" + "CVE-2024-24864": { + "cmt_msg": "" }, - "CVE-2022-36879": { - "cmt_msg": "xfrm: xfrm_policy: fix a possible double xfrm_pols_put() in xfrm_bundle_lookup()", - "cmt_id": "5aff12fa09504c6ea88fc17749a39cda2c4d6ef7" - } - }, - "4.9.326": { - "CVE-2022-3629": { - "cmt_msg": "vsock: Fix memory leak in vsock_connect()", - "cmt_id": "09fc7ffdf11d20049f3748ccdef57c9a49403214" + "CVE-2017-9605": { + "cmt_msg": "drm/vmwgfx: Make sure backup_handle is always valid" }, "CVE-2022-36946": { - "cmt_msg": "netfilter: nf_queue: do not allow packet truncation below transport header offset", - "cmt_id": "3b3e2de462323d5fdeb85a3682334a4a3dd07400" - }, - "CVE-2022-20566": { - "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free caused by l2cap_chan_put", - "cmt_id": "d255c861e268ba342e855244639a15f12d7a0bf2" + "cmt_msg": "netfilter: nf_queue: do not allow packet truncation below transport header offset" }, - "CVE-2022-3635": { - "cmt_msg": "atm: idt77252: fix use-after-free bugs caused by tst_timer", - "cmt_id": "acf173d9e27877ac1f4b0fc6614bf7f19ac90894" + "CVE-2018-19824": { + "cmt_msg": "ALSA: usb-audio: Fix UAF decrement if card has no live interfaces in card.c" }, - "CVE-2022-2588": { - "cmt_msg": "net_sched: cls_route: remove from list when handle is 0", - "cmt_id": "34a475425612bef345634202dda8dac91820b6c8" + "CVE-2022-21166": { + "cmt_msg": "x86/speculation/mmio: Enable CPU Fill buffer clearing on idle" }, - "CVE-2023-2513": { - "cmt_msg": "ext4: fix use-after-free in ext4_xattr_set_entry", - "cmt_id": "9337f3877a5fb8db8c563ce93cf6095b24c45151" + "CVE-2016-9191": { + "cmt_msg": "sysctl: Drop reference added by grab_header in proc_sys_readdir" }, - "CVE-2023-1095": { - "cmt_msg": "netfilter: nf_tables: fix null deref due to zeroed list head", - "cmt_id": "ef6b262e551da27579e7ac255928394176353115" - } - }, - "4.9.327": { - "CVE-2022-42703": { - "cmt_msg": "mm/rmap: Fix anon_vma->degree ambiguity leading to double-reuse", - "cmt_id": "c24ca0f172905d593ad8ab276b0992bb74353a8d" + "CVE-2021-29650": { + "cmt_msg": "netfilter: x_tables: Use correct memory barriers." }, - "CVE-2022-3028": { - "cmt_msg": "af_key: Do not call xfrm_probe_algs in parallel", - "cmt_id": "e580d3201ed222c4752ced7e629ad96bc0340713" - } - }, - "4.9.328": { - "CVE-2022-4662": { - "cmt_msg": "USB: core: Prevent nested device-reset calls", - "cmt_id": "d90419b8b8322b6924f6da9da952647f2dadc21b" + "CVE-2018-20169": { + "cmt_msg": "USB: check usb_get_extra_descriptor for proper size" }, - "CVE-2022-4095": { - "cmt_msg": "staging: rtl8712: fix use after free bugs", - "cmt_id": "7dce6b0ee7d78667d6c831ced957a08769973063" + "CVE-2022-28356": { + "cmt_msg": "llc: fix netdevice reference leaks in llc_ui_bind()" }, - "CVE-2022-2663": { - "cmt_msg": "netfilter: nf_conntrack_irc: Fix forged IP logic", - "cmt_id": "eb4d8d6b44a23ff2b6e2af06c8240de73dff8a7d" + "CVE-2018-5750": { + "cmt_msg": "ACPI: sbshc: remove raw pointer from printk() message" }, - "CVE-2022-3586": { - "cmt_msg": "sch_sfb: Don't assume the skb is still around after enqueueing to child", - "cmt_id": "b5aa83141aa97f81c8e06051e4bd925bfb5474fb" - } - }, - "4.9.330": { - "CVE-2022-39842": { - "cmt_msg": "video: fbdev: pxa3xx-gcu: Fix integer overflow in pxa3xx_gcu_write", - "cmt_id": "a0dcaa48042a56a9eee2efed19563866a0ddbce2" - } - }, - "4.9.331": { - "CVE-2022-2978": { - "cmt_msg": "fs: fix UAF/GPF bug in nilfs_mdt_destroy", - "cmt_id": "d1ff475d7c83289d0a7faef346ea3bbf90818bad" + "CVE-2017-7558": { + "cmt_msg": "sctp: Avoid out-of-bounds reads from address storage" }, - "CVE-2022-41849": { - "cmt_msg": "fbdev: smscufx: Fix use-after-free in ufx_ops_open()", - "cmt_id": "347a969b130c2a496f471f14b354119b82664f0a" + "CVE-2022-20166": { + "cmt_msg": "drivers core: Use sysfs_emit and sysfs_emit_at for show(device *...) functions" }, - "CVE-2022-3594": { - "cmt_msg": "r8152: Rate limit overflow messages", - "cmt_id": "3723658c287a98875f43cffc3245d0bf1d3ee076" + "CVE-2019-10220": { + "cmt_msg": "Convert filldir[64]() from __put_user() to unsafe_put_user()" }, - "CVE-2022-43750": { - "cmt_msg": "usb: mon: make mmapped memory read only", - "cmt_id": "1b5ad3786a2f2cdbfed34071aa467f80e4903a0b" + "CVE-2021-44879": { + "cmt_msg": "f2fs: fix to do sanity check on inode type during garbage collection" }, - "CVE-2022-3621": { - "cmt_msg": "nilfs2: fix NULL pointer dereference at nilfs_bmap_lookup_at_level()", - "cmt_id": "bb63454b66f4a73d4b267fd5061aaf3a5657172c" + "CVE-2020-9383": { + "cmt_msg": "floppy: check FDC index for errors before assigning it" }, - "CVE-2022-3649": { - "cmt_msg": "nilfs2: fix use-after-free bug of struct nilfs_root", - "cmt_id": "a9043a24c6e340d45b204d294a25044726fd2770" + "CVE-2017-5970": { + "cmt_msg": "ipv4: keep skb->dst around in presence of IP options" }, - "CVE-2022-41850": { - "cmt_msg": "HID: roccat: Fix use-after-free in roccat_read()", - "cmt_id": "84607bd3a8542b84b450d19a3579172f96c2bb47" + "CVE-2023-1513": { + "cmt_msg": "kvm: initialize all of the kvm_debugregs structure before sending it to userspace" }, - "CVE-2022-40768": { - "cmt_msg": "scsi: stex: Properly zero out the passthrough command structure", - "cmt_id": "35db0282da84ad200054ad5af0fd6c2f693b17f8" + "CVE-2021-26401": { + "cmt_msg": "x86/speculation: Use generic retpoline by default on AMD" }, - "CVE-2022-3565": { - "cmt_msg": "mISDN: fix use-after-free bugs in l1oip timer handlers", - "cmt_id": "1ba21168faf881c23c270605834d01af260cbb72" + "CVE-2021-3847": { + "cmt_msg": "" }, - "CVE-2022-3542": { - "cmt_msg": "bnx2x: fix potential memory leak in bnx2x_tpa_stop()", - "cmt_id": "9ec3f783f08b57a861700fdf4d3d8f3cfb68f471" + "CVE-2019-9445": { + "cmt_msg": "f2fs: check if file namelen exceeds max value" }, - "CVE-2022-3646": { - "cmt_msg": "nilfs2: fix leak of nilfs_root in case of writer thread creation failure", - "cmt_id": "81fe58e4e7f61a1f5200898e7cd4c9748f83051f" - } - }, - "4.9.332": { - "CVE-2023-0615": { - "cmt_msg": "media: vivid: dev->bitmap_cap wasn't freed in all cases", - "cmt_id": "e1b5b061987d56d7b64da962fec3be4ae7e78300" - } - }, - "4.9.333": { - "CVE-2022-3628": { - "cmt_msg": "wifi: brcmfmac: Fix potential buffer overflow in brcmf_fweh_event_worker()", - "cmt_id": "b1477d95e967bf626b8c5e3838bb885c47381b24" + "CVE-2019-20934": { + "cmt_msg": "sched/fair: Don't free p->numa_faults with concurrent readers" }, - "CVE-2022-42895": { - "cmt_msg": "Bluetooth: L2CAP: Fix attempting to access uninitialized memory", - "cmt_id": "63e3d75298fac7fa50906454603dd5bb4ef22a23" + "CVE-2011-4916": { + "cmt_msg": "" }, - "CVE-2022-3564": { - "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free caused by l2cap_reassemble_sdu", - "cmt_id": "dc30e05bb18852303084430c03ca76e69257d9ea" - } - }, - "4.9.334": { - "CVE-2023-26607": { - "cmt_msg": "ntfs: fix out-of-bounds read in ntfs_attr_find()", - "cmt_id": "9fa645905c0457d69906eead302f70b1c7115538" + "CVE-2023-23039": { + "cmt_msg": "" }, - "CVE-2022-3521": { - "cmt_msg": "kcm: avoid potential race in kcm_tx_work", - "cmt_id": "fe3f79701fdaf8a087bc7043839e7f8b2e61b6fe" - } - }, - "4.9.335": { - "CVE-2022-3524": { - "cmt_msg": "tcp/udp: Fix memory leak in ipv6_renew_options().", - "cmt_id": "d2c9e2ebafa14a564b28e237db8d90ab7bdbd061" + "CVE-2017-16646": { + "cmt_msg": "media: dib0700: fix invalid dvb_detach argument" }, - "CVE-2022-42896": { - "cmt_msg": "Bluetooth: L2CAP: Fix accepting connection request for invalid SPSM", - "cmt_id": "c834df40af8ec156e8c3c388a08ff7381cd90d80" - } - }, - "4.9.336": { - "CVE-2022-3643": { - "cmt_msg": "xen/netback: Ensure protocol headers don't fall in the non-linear area", - "cmt_id": "1a1d9be7b36ee6cbdeb9d160038834d707256e88" - } - }, - "4.9.337": { - "CVE-2022-36280": { - "cmt_msg": "drm/vmwgfx: Validate the box size for the snooped cursor", - "cmt_id": "ee8d31836cbe7c26e207bfa0a4a726f0a25cfcf6" + "CVE-2017-16645": { + "cmt_msg": "Input: ims-psu - check if CDC union descriptor is sane" }, - "CVE-2023-28328": { - "cmt_msg": "media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer()", - "cmt_id": "2b6a8a1a32746981044e7ab06649c804acb4068a" + "CVE-2017-16644": { + "cmt_msg": "media: hdpvr: Fix an error handling path in hdpvr_probe()" }, - "CVE-2022-45934": { - "cmt_msg": "Bluetooth: L2CAP: Fix u8 overflow", - "cmt_id": "49d5867819ab7c744852b45509e8469839c07e0e" + "CVE-2017-16643": { + "cmt_msg": "Input: gtco - fix potential out-of-bound access" }, - "CVE-2022-3424": { - "cmt_msg": "misc: sgi-gru: fix use-after-free error in gru_set_context_option, gru_fault and gru_handle_user_call_os", - "cmt_id": "f99d5f1bd8cd1e99931b6e5544a5601a1fe33f82" - } - }, - "outstanding": { - "CVE-2020-35501": { - "cmt_msg": "" + "CVE-2019-5489": { + "cmt_msg": "Change mincore() to count \"mapped\" pages rather than \"cached\" pages" }, - "CVE-2023-3268": { - "cmt_msg": "relayfs: fix out-of-bounds access in relay_file_read" + "CVE-2017-16649": { + "cmt_msg": "net: cdc_ether: fix divide by 0 on bad descriptors" }, - "CVE-2022-47520": { - "cmt_msg": "wifi: wilc1000: validate pairwise and authentication suite offsets" + "CVE-2017-16648": { + "cmt_msg": "dvb_frontend: don't use-after-free the frontend struct" }, - "CVE-2023-5717": { - "cmt_msg": "perf: Disallow mis-matched inherited group reads" + "CVE-2020-36322": { + "cmt_msg": "fuse: fix bad inode" }, - "CVE-2022-0480": { - "cmt_msg": "memcg: enable accounting for file lock caches" + "CVE-2020-10711": { + "cmt_msg": "netlabel: cope with NULL catmap" }, - "CVE-2023-52429": { - "cmt_msg": "dm: limit the number of targets and parameter size area" + "CVE-2020-35508": { + "cmt_msg": "fork: fix copy_process(CLONE_PARENT) race with the exiting ->real_parent" }, - "CVE-2022-23825": { + "CVE-2020-35501": { "cmt_msg": "" }, - "CVE-2019-19241": { - "cmt_msg": "io_uring: async workers should inherit the user creds" + "CVE-2021-45095": { + "cmt_msg": "phonet: refcount leak in pep_sock_accep" }, - "CVE-2022-40307": { - "cmt_msg": "efi: capsule-loader: Fix use-after-free in efi_capsule_write" + "CVE-2024-26685": { + "cmt_msg": "nilfs2: fix potential bug in end_buffer_async_write" }, - "CVE-2021-43975": { - "cmt_msg": "atlantic: Fix OOB read and write in hw_atl_utils_fw_rpc_wait" + "CVE-2021-32399": { + "cmt_msg": "bluetooth: eliminate the potential race condition when removing the HCI controller" }, - "CVE-2023-0459": { - "cmt_msg": "uaccess: Add speculation barrier to copy_from_user()" + "CVE-2017-1000410": { + "cmt_msg": "Bluetooth: Prevent stack info leak from the EFS element." }, - "CVE-2023-0458": { - "cmt_msg": "prlimit: do_prlimit needs to have a speculation check" + "CVE-2022-32250": { + "cmt_msg": "netfilter: nf_tables: disallow non-stateful expression in sets earlier" }, - "CVE-2023-0597": { - "cmt_msg": "x86/mm: Randomize per-cpu entry area" + "CVE-2017-5551": { + "cmt_msg": "tmpfs: clear S_ISGID when setting posix ACLs" + }, + "CVE-2021-28688": { + "cmt_msg": "xen-blkback: don't leak persistent grants from xen_blkbk_map()" + }, + "CVE-2018-10878": { + "cmt_msg": "ext4: always check block group bounds in ext4_init_block_bitmap()" }, "CVE-2019-12379": { "cmt_msg": "consolemap: Fix a memory leaking bug in drivers/tty/vt/consolemap.c" @@ -102928,113 +134389,131 @@ "CVE-2019-12378": { "cmt_msg": "ipv6_sockglue: Fix a missing-check bug in ip6_ra_control()" }, - "CVE-2024-26592": { - "cmt_msg": "ksmbd: fix UAF issue in ksmbd_tcp_new_connection()" + "CVE-2016-6213": { + "cmt_msg": "mnt: Add a per mount namespace limit on the number of mounts" }, - "CVE-2023-0266": { - "cmt_msg": "ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF" + "CVE-2017-7895": { + "cmt_msg": "nfsd: stricter decoding of write-like NFSv2/v3 ops" }, - "CVE-2024-26591": { - "cmt_msg": "bpf: Fix re-attachment branch in bpf_tracing_prog_attach" + "CVE-2020-26145": { + "cmt_msg": "ath10k: drop fragments with multicast DA for PCIe" }, - "CVE-2020-15802": { + "CVE-2017-13216": { + "cmt_msg": "staging: android: ashmem: fix a race condition in ASHMEM_SET_SIZE ioctl" + }, + "CVE-2020-26147": { + "cmt_msg": "mac80211: assure all fragments are encrypted" + }, + "CVE-2020-26141": { + "cmt_msg": "ath10k: Fix TKIP Michael MIC verification for PCIe" + }, + "CVE-2020-26140": { "cmt_msg": "" }, - "CVE-2024-26594": { - "cmt_msg": "ksmbd: validate mech token in session setup" + "CVE-2020-26143": { + "cmt_msg": "" }, - "CVE-2023-2483": { - "cmt_msg": "net: qcom/emac: Fix use after free bug in emac_remove due to race condition" + "CVE-2020-26142": { + "cmt_msg": "" }, - "CVE-2022-3636": { - "cmt_msg": "net: ethernet: mtk_eth_soc: use after free in __mtk_ppe_check_skb()" + "CVE-2019-17053": { + "cmt_msg": "ieee802154: enforce CAP_NET_RAW for raw sockets" }, - "CVE-2024-26598": { - "cmt_msg": "KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache" + "CVE-2019-17052": { + "cmt_msg": "ax25: enforce CAP_NET_RAW for raw sockets" }, - "CVE-2022-34918": { - "cmt_msg": "netfilter: nf_tables: stricter validation of element data" + "CVE-2017-14497": { + "cmt_msg": "packet: Don't write vnet header beyond end of buffer" }, - "CVE-2024-26584": { - "cmt_msg": "net: tls: handle backlogging of crypto requests" + "CVE-2019-17056": { + "cmt_msg": "nfc: enforce CAP_NET_RAW for raw sockets" }, - "CVE-2024-26587": { - "cmt_msg": "net: netdevsim: don't try to destroy PHC on VFs" + "CVE-2019-17055": { + "cmt_msg": "mISDN: enforce CAP_NET_RAW for raw sockets" }, - "CVE-2023-2002": { - "cmt_msg": "bluetooth: Perform careful capability checks in hci_sock_ioctl()" + "CVE-2019-17054": { + "cmt_msg": "appletalk: enforce CAP_NET_RAW for raw sockets" }, - "CVE-2023-2007": { - "cmt_msg": "scsi: dpt_i2o: Remove obsolete driver" + "CVE-2024-26745": { + "cmt_msg": "powerpc/pseries/iommu: IOMMU table is not initialized for kdump over SR-IOV" }, - "CVE-2022-1419": { - "cmt_msg": "drm/vgem: Close use-after-free race in vgem_gem_create" + "CVE-2024-26744": { + "cmt_msg": "RDMA/srpt: Support specifying the srpt_service_guid parameter" }, - "CVE-2022-2991": { - "cmt_msg": "remove the lightnvm subsystem" + "CVE-2024-26743": { + "cmt_msg": "RDMA/qedr: Fix qedr_create_user_qp error flow" }, - "CVE-2020-26141": { - "cmt_msg": "ath10k: Fix TKIP Michael MIC verification for PCIe" + "CVE-2020-29661": { + "cmt_msg": "tty: Fix ->pgrp locking in tiocspgrp()" }, - "CVE-2020-26140": { - "cmt_msg": "" + "CVE-2020-29660": { + "cmt_msg": "tty: Fix ->session locking" }, - "CVE-2020-26143": { - "cmt_msg": "" + "CVE-2022-1734": { + "cmt_msg": "nfc: nfcmrvl: main: reorder destructive operations in nfcmrvl_nci_unregister_dev to avoid bugs" }, - "CVE-2020-26142": { - "cmt_msg": "" + "CVE-2024-26748": { + "cmt_msg": "usb: cdns3: fix memory double free when handle zero packet" }, - "CVE-2023-1074": { - "cmt_msg": "sctp: fail if no bound addresses can be used for a given scope" + "CVE-2023-28772": { + "cmt_msg": "seq_buf: Fix overflow in seq_buf_putmem_hex()" }, - "CVE-2023-1077": { - "cmt_msg": "sched/rt: pick_next_rt_entity(): check list_entry" + "CVE-2016-10764": { + "cmt_msg": "mtd: spi-nor: Off by one in cqspi_setup_flash()" }, - "CVE-2023-46838": { - "cmt_msg": "xen-netback: don't produce zero-size SKB frags" + "CVE-2024-26699": { + "cmt_msg": "drm/amd/display: Fix array-index-out-of-bounds in dcn35_clkmgr" }, - "CVE-2023-40283": { - "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb" + "CVE-2024-26691": { + "cmt_msg": "KVM: arm64: Fix circular locking dependency" }, - "CVE-2023-1073": { - "cmt_msg": "HID: check empty report_list in hid_validate_values()" + "CVE-2024-26697": { + "cmt_msg": "nilfs2: fix data corruption in dsync block recovery for small block sizes" }, - "CVE-2018-13095": { - "cmt_msg": "xfs: More robust inode extent count validation" + "CVE-2024-26696": { + "cmt_msg": "nilfs2: fix hang in nilfs_lookup_dirty_data_buffers()" }, - "CVE-2018-13098": { - "cmt_msg": "f2fs: fix to do sanity check with extra_attr feature" + "CVE-2019-15924": { + "cmt_msg": "fm10k: Fix a potential NULL pointer dereference" }, - "CVE-2024-22386": { - "cmt_msg": "" + "CVE-2019-15927": { + "cmt_msg": "ALSA: usb-audio: Avoid access before bLength check in build_audio_procunit()" }, - "CVE-2019-18680": { - "cmt_msg": "unknown" + "CVE-2019-15926": { + "cmt_msg": "ath6kl: add some bounds checking" }, - "CVE-2023-2176": { - "cmt_msg": "RDMA/core: Refactor rdma_bind_addr" + "CVE-2021-38160": { + "cmt_msg": "virtio_console: Assure used length from device is limited" }, - "CVE-2022-39188": { - "cmt_msg": "mmu_gather: Force tlb-flush VM_PFNMAP vmas" + "CVE-2019-15219": { + "cmt_msg": "USB: sisusbvga: fix oops in error path of sisusb_probe" + }, + "CVE-2019-15218": { + "cmt_msg": "media: usb: siano: Fix general protection fault in smsusb" }, "CVE-2005-3660": { "cmt_msg": "" }, - "CVE-2023-31085": { - "cmt_msg": "ubi: Refuse attaching if mtd's erasesize is 0" + "CVE-2017-14106": { + "cmt_msg": "tcp: initialize rcv_mss to TCP_MIN_MSS instead of 0" }, - "CVE-2023-31084": { - "cmt_msg": "media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*()" + "CVE-2019-15212": { + "cmt_msg": "USB: rio500: refuse more than one device at a time" }, - "CVE-2023-31083": { - "cmt_msg": "Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO" + "CVE-2019-15211": { + "cmt_msg": "media: radio-raremono: change devm_k*alloc to k*alloc" }, - "CVE-2023-31082": { - "cmt_msg": "" + "CVE-2019-15217": { + "cmt_msg": "media: usb:zr364xx:Fix KASAN:null-ptr-deref Read in zr364xx_vidioc_querycap" }, - "CVE-2023-31081": { - "cmt_msg": "" + "CVE-2019-15216": { + "cmt_msg": "USB: yurex: Fix protection fault after device removal" + }, + "CVE-2017-1000380": { + "cmt_msg": "ALSA: timer: Fix race between read and ioctl" + }, + "CVE-2019-15214": { + "cmt_msg": "ALSA: core: Fix card races between register and disconnect" }, "CVE-2019-19922": { "cmt_msg": "sched/fair: Fix low cpu usage with high throttling by removing expiration of cpu-local slices" @@ -103042,17 +134521,14 @@ "CVE-2019-19927": { "cmt_msg": "drm/ttm: fix incrementing the page pointer for huge pages" }, - "CVE-2024-23307": { - "cmt_msg": "" - }, - "CVE-2023-3567": { - "cmt_msg": "vc_screen: move load of struct vc_data pointer in vcs_read() to avoid UAF" + "CVE-2017-11176": { + "cmt_msg": "mqueue: fix a use-after-free in sys_mq_notify()" }, - "CVE-2020-14304": { - "cmt_msg": "" + "CVE-2023-52498": { + "cmt_msg": "PM: sleep: Fix possible deadlocks in core system-wide PM code" }, - "CVE-2020-14305": { - "cmt_msg": "netfilter: helpers: remove data_len usage for inkernel helpers" + "CVE-2022-2318": { + "cmt_msg": "net: rose: fix UAF bugs caused by timer handler" }, "CVE-2023-3611": { "cmt_msg": "net/sched: sch_qfq: account for stab overhead in qfq_enqueue" @@ -103066,44 +134542,47 @@ "CVE-2023-4134": { "cmt_msg": "Input: cyttsp4_core - change del_timer_sync() to timer_shutdown_sync()" }, - "CVE-2023-39198": { - "cmt_msg": "drm/qxl: fix UAF on handle creation" + "CVE-2017-9077": { + "cmt_msg": "ipv6/dccp: do not inherit ipv6_mc_list from parent" }, - "CVE-2018-12127": { - "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" + "CVE-2017-9076": { + "cmt_msg": "ipv6/dccp: do not inherit ipv6_mc_list from parent" }, - "CVE-2018-12126": { - "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" + "CVE-2017-9075": { + "cmt_msg": "sctp: do not inherit ipv6_{mc|ac|fl}_list from parent" }, - "CVE-2023-37454": { - "cmt_msg": "" + "CVE-2017-9074": { + "cmt_msg": "ipv6: Prevent overrun when parsing v6 header options" }, - "CVE-2023-39197": { - "cmt_msg": "netfilter: conntrack: dccp: copy entire header to stack buffer, not just basic one" + "CVE-2022-20572": { + "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag" + }, + "CVE-2022-42703": { + "cmt_msg": "mm/rmap: Fix anon_vma->degree ambiguity leading to double-reuse" + }, + "CVE-2021-4083": { + "cmt_msg": "fget: check that the fd still exists after getting a ref to it" }, "CVE-2023-33288": { "cmt_msg": "power: supply: bq24190: Fix use after free bug in bq24190_remove due to race condition" }, - "CVE-2022-36402": { - "cmt_msg": "drm/vmwgfx: Fix shader stage validation" + "CVE-2017-1000251": { + "cmt_msg": "Bluetooth: Properly check L2CAP config option output buffer length" }, - "CVE-2022-29900": { - "cmt_msg": "x86/kvm/vmx: Make noinstr clean" + "CVE-2017-1000252": { + "cmt_msg": "KVM: VMX: Do not BUG() on out-of-bounds guest IRQ" }, "CVE-2022-29901": { "cmt_msg": "x86/kvm/vmx: Make noinstr clean" }, - "CVE-2022-1116": { - "cmt_msg": "" - }, - "CVE-2022-23816": { - "cmt_msg": "x86/kvm/vmx: Make noinstr clean" + "CVE-2023-52485": { + "cmt_msg": "drm/amd/display: Wake DMCUB before sending a command" }, - "CVE-2023-35824": { - "cmt_msg": "media: dm1105: Fix use after free bug in dm1105_remove due to race condition" + "CVE-2018-20511": { + "cmt_msg": "net/appletalk: fix minor pointer leak to userspace in SIOCFINDIPDDPRT" }, - "CVE-2023-35827": { - "cmt_msg": "ravb: Fix use-after-free issue in ravb_tx_timeout_work()" + "CVE-2018-20510": { + "cmt_msg": "binder: replace \"%p\" with \"%pK\"" }, "CVE-2022-3567": { "cmt_msg": "ipv6: Fix data races around sk->sk_prot." @@ -103111,305 +134590,218 @@ "CVE-2022-3566": { "cmt_msg": "tcp: Fix data races around icsk->icsk_af_ops." }, + "CVE-2022-3565": { + "cmt_msg": "mISDN: fix use-after-free bugs in l1oip timer handlers" + }, + "CVE-2022-3564": { + "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free caused by l2cap_reassemble_sdu" + }, "CVE-2020-36385": { "cmt_msg": "RDMA/ucma: Rework ucma_migrate_id() to avoid races with destroy" }, - "CVE-2023-52340": { - "cmt_msg": "ipv6: remove max_size check inline with ipv4" + "CVE-2018-7480": { + "cmt_msg": "blkcg: fix double free of new_blkg in blkcg_init_queue" }, "CVE-2023-0030": { "cmt_msg": "drm/nouveau/mmu: add more general vmm free/node handling functions" }, - "CVE-2020-16120": { - "cmt_msg": "ovl: switch to mounter creds in readdir" - }, - "CVE-2023-30772": { - "cmt_msg": "power: supply: da9150: Fix use after free bug in da9150_charger_remove due to race condition" - }, - "CVE-2023-1611": { - "cmt_msg": "btrfs: fix race between quota disable and quota assign ioctls" - }, - "CVE-2016-10723": { - "cmt_msg": "mm, oom: remove sleep from under oom_lock" - }, - "CVE-2019-19036": { - "cmt_msg": "btrfs: Detect unbalanced tree with empty leaf before crashing btree operations" - }, - "CVE-2019-19039": { - "cmt_msg": "btrfs: Don't submit any btree write bio if the fs has errors" - }, - "CVE-2020-8832": { - "cmt_msg": "drm/i915: Record the default hw state after reset upon load" - }, - "CVE-2020-8834": { - "cmt_msg": "KVM: PPC: Book3S HV: Factor fake-suspend handling out of kvmppc_save/restore_tm" - }, - "CVE-2021-32078": { - "cmt_msg": "ARM: footbridge: remove personal server platform" - }, - "CVE-2017-18552": { - "cmt_msg": "RDS: validate the requested traces user input against max supported" - }, - "CVE-2023-39189": { - "cmt_msg": "netfilter: nfnetlink_osf: avoid OOB read" - }, - "CVE-2023-35001": { - "cmt_msg": "netfilter: nf_tables: prevent OOB access in nft_byteorder_eval" - }, - "CVE-2017-18232": { - "cmt_msg": "scsi: libsas: direct call probe and destruct" - }, - "CVE-2019-2213": { - "cmt_msg": "binder: fix possible UAF when freeing buffer" - }, - "CVE-2022-0168": { - "cmt_msg": "cifs: fix NULL ptr dereference in smb2_ioctl_query_info()" - }, - "CVE-2020-26556": { - "cmt_msg": "" - }, - "CVE-2020-26557": { - "cmt_msg": "" - }, - "CVE-2019-20794": { - "cmt_msg": "" - }, - "CVE-2020-26559": { - "cmt_msg": "" - }, - "CVE-2023-3397": { - "cmt_msg": "" + "CVE-2019-11599": { + "cmt_msg": "coredump: fix race condition between mmget_not_zero()/get_task_mm() and core dumping" }, - "CVE-2023-52458": { - "cmt_msg": "block: add check that partition length needs to be aligned with block size" + "CVE-2019-2101": { + "cmt_msg": "media: uvcvideo: Fix 'type' check leading to overflow" }, - "CVE-2018-20854": { - "cmt_msg": "phy: ocelot-serdes: fix out-of-bounds read" + "CVE-2019-3459": { + "cmt_msg": "Bluetooth: Verify that l2cap_get_conf_opt provides large enough buffer" }, - "CVE-2018-1121": { - "cmt_msg": "" + "CVE-2020-0444": { + "cmt_msg": "audit: fix error handling in audit_data_to_entry()" }, - "CVE-2023-52451": { - "cmt_msg": "powerpc/pseries/memhp: Fix access beyond end of drmem array" + "CVE-2017-16526": { + "cmt_msg": "uwb: properly check kthread_run return value" }, - "CVE-2022-3061": { - "cmt_msg": "video: fbdev: i740fb: Error out if 'pixclock' equals zero" + "CVE-2017-16527": { + "cmt_msg": "ALSA: usb-audio: Kill stray URB at exiting" }, - "CVE-2024-1086": { - "cmt_msg": "netfilter: nf_tables: reject QUEUE/DROP verdict parameters" + "CVE-2017-16525": { + "cmt_msg": "USB: serial: console: fix use-after-free after failed setup" }, - "CVE-2022-3344": { - "cmt_msg": "KVM: x86: nSVM: harden svm_free_nested against freeing vmcb02 while still in use" + "CVE-2022-1836": { + "cmt_msg": "floppy: disable FDRAWCMD by default" }, - "CVE-2023-6240": { - "cmt_msg": "" + "CVE-2017-16528": { + "cmt_msg": "ALSA: seq: Cancel pending autoload work at unbinding device" }, - "CVE-2023-23559": { - "cmt_msg": "wifi: rndis_wlan: Prevent buffer overflow in rndis_query_oid" + "CVE-2017-16529": { + "cmt_msg": "ALSA: usb-audio: Check out-of-bounds access by corrupted buffer descriptor" }, - "CVE-2022-0382": { - "cmt_msg": "net ticp:fix a kernel-infoleak in __tipc_sendmsg()" + "CVE-2019-2215": { + "cmt_msg": "ANDROID: binder: remove waitqueue when thread exits." }, - "CVE-2023-32233": { - "cmt_msg": "netfilter: nf_tables: deactivate anonymous set from preparation phase" + "CVE-2019-2213": { + "cmt_msg": "binder: fix possible UAF when freeing buffer" }, - "CVE-2019-15222": { - "cmt_msg": "ALSA: usb-audio: Fix gpf in snd_usb_pipe_sanity_check" + "CVE-2018-1087": { + "cmt_msg": "kvm/x86: fix icebp instruction handling" }, - "CVE-2019-15223": { - "cmt_msg": "ALSA: line6: Assure canceling delayed work at disconnection" + "CVE-2017-8065": { + "cmt_msg": "crypto: ccm - move cbcmac input off the stack" }, - "CVE-2024-23196": { - "cmt_msg": "" + "CVE-2019-19049": { + "cmt_msg": "of: unittest: fix memory leak in unittest_data_add" }, - "CVE-2019-19815": { - "cmt_msg": "f2fs: support swap file w/ DIO" + "CVE-2018-13053": { + "cmt_msg": "alarmtimer: Prevent overflow for relative nanosleep" }, - "CVE-2019-19814": { - "cmt_msg": "" + "CVE-2023-23559": { + "cmt_msg": "wifi: rndis_wlan: Prevent buffer overflow in rndis_query_oid" }, - "CVE-2020-12656": { - "cmt_msg": "sunrpc: check that domain table is empty at module unload." + "CVE-2020-10720": { + "cmt_msg": "net-gro: fix use-after-free read in napi_gro_frags()" }, - "CVE-2023-3141": { - "cmt_msg": "memstick: r592: Fix UAF bug in r592_remove due to race condition" + "CVE-2022-20369": { + "cmt_msg": "media: v4l2-mem2mem: Apply DST_QUEUE_OFF_BASE on MMAP buffers across ioctls" }, - "CVE-2022-3523": { - "cmt_msg": "mm/memory.c: fix race when faulting a device private page" + "CVE-2022-20368": { + "cmt_msg": "net/packet: fix slab-out-of-bounds access in packet_recvmsg()" }, - "CVE-2022-3522": { - "cmt_msg": "mm/hugetlb: use hugetlb_pte_stable in migration race check" + "CVE-2022-3424": { + "cmt_msg": "misc: sgi-gru: fix use-after-free error in gru_set_context_option, gru_fault and gru_handle_user_call_os" }, - "CVE-2008-2544": { - "cmt_msg": "" + "CVE-2016-2188": { + "cmt_msg": "USB: iowarrior: fix NULL-deref at probe" }, - "CVE-2018-12928": { - "cmt_msg": "" + "CVE-2017-1000405": { + "cmt_msg": "mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d()" }, - "CVE-2018-7754": { - "cmt_msg": "printk: hash addresses printed with %p" + "CVE-2017-1000407": { + "cmt_msg": "KVM: VMX: remove I/O port 0x80 bypass on Intel hosts" }, - "CVE-2007-3719": { - "cmt_msg": "" + "CVE-2022-24448": { + "cmt_msg": "NFSv4: Handle case where the lookup of a directory fails" }, - "CVE-2023-3863": { - "cmt_msg": "net: nfc: Fix use-after-free caused by nfc_llcp_find_local" + "CVE-2020-0427": { + "cmt_msg": "pinctrl: devicetree: Avoid taking direct reference to device name string" }, - "CVE-2023-0590": { - "cmt_msg": "net: sched: fix race condition in qdisc_graft()" + "CVE-2020-26088": { + "cmt_msg": "net/nfc/rawsock.c: add CAP_NET_RAW check." }, - "CVE-2022-45919": { - "cmt_msg": "media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221" + "CVE-2008-2544": { + "cmt_msg": "" }, "CVE-2023-2248": { "cmt_msg": "net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg" }, - "CVE-2022-1204": { - "cmt_msg": "ax25: Fix refcount leaks caused by ax25_cb_del()" + "CVE-2023-30772": { + "cmt_msg": "power: supply: da9150: Fix use after free bug in da9150_charger_remove due to race condition" + }, + "CVE-2017-18017": { + "cmt_msg": "netfilter: xt_TCPMSS: add more sanity tests on tcph->doff" + }, + "CVE-2021-3679": { + "cmt_msg": "tracing: Fix bug in rb_per_cpu_empty() that might cause deadloop." }, "CVE-2022-2586": { "cmt_msg": "netfilter: nf_tables: do not allow SET_ID to refer to another table" }, - "CVE-2021-34556": { - "cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4" - }, "CVE-2021-39714": { "cmt_msg": "staging: android: ion: Drop ion_map_kernel interface" }, - "CVE-2017-18261": { - "cmt_msg": "clocksource/drivers/arm_arch_timer: Avoid infinite recursion when ftrace is enabled" - }, - "CVE-2022-1247": { - "cmt_msg": "" - }, "CVE-2023-51782": { "cmt_msg": "net/rose: Fix Use-After-Free in rose_ioctl" }, - "CVE-2024-26588": { - "cmt_msg": "LoongArch: BPF: Prevent out-of-bounds memory access" - }, "CVE-2023-51780": { "cmt_msg": "atm: Fix Use-After-Free in do_vcc_ioctl" }, "CVE-2023-51781": { "cmt_msg": "appletalk: Fix Use-After-Free in atalk_ioctl" }, - "CVE-2022-3624": { - "cmt_msg": "bonding: fix reference count leak in balance-alb mode" - }, - "CVE-2021-3669": { - "cmt_msg": "ipc: replace costly bailout check in sysvipc_find_ipc()" + "CVE-2022-2588": { + "cmt_msg": "net_sched: cls_route: remove from list when handle is 0" }, "CVE-2019-18885": { "cmt_msg": "btrfs: merge btrfs_find_device and find_device" }, - "CVE-2022-4744": { - "cmt_msg": "tun: avoid double free in tun_free_netdev" - }, - "CVE-2019-11091": { - "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" - }, - "CVE-2022-3239": { - "cmt_msg": "media: em28xx: initialize refcount before kref_get" - }, - "CVE-2022-4543": { - "cmt_msg": "" - }, - "CVE-2023-4921": { - "cmt_msg": "net: sched: sch_qfq: Fix UAF in qfq_dequeue()" + "CVE-2017-7889": { + "cmt_msg": "mm: Tighten x86 /dev/mem with zeroing reads" }, - "CVE-2023-1829": { - "cmt_msg": "net/sched: Retire tcindex classifier" + "CVE-2017-14489": { + "cmt_msg": "scsi: scsi_transport_iscsi: fix the issue that iscsi_if_rx doesn't parse nlmsg properly" }, - "CVE-2024-0775": { - "cmt_msg": "ext4: improve error recovery code paths in __ext4_remount()" + "CVE-2024-26733": { + "cmt_msg": "arp: Prevent overflow in arp_req_get()." }, - "CVE-2023-4881": { - "cmt_msg": "netfilter: nftables: exthdr: fix 4-byte stack OOB write" + "CVE-2024-26738": { + "cmt_msg": "powerpc/pseries/iommu: DLPAR add doesn't completely initialize pci_controller" }, - "CVE-2013-7445": { - "cmt_msg": "" + "CVE-2024-26739": { + "cmt_msg": "net/sched: act_mirred: don't override retval if we already lost the skb" }, "CVE-2022-38096": { "cmt_msg": "" }, - "CVE-2022-3303": { - "cmt_msg": "ALSA: pcm: oss: Fix race at SNDCTL_DSP_SYNC" - }, - "CVE-2023-23455": { - "cmt_msg": "net: sched: atm: dont intepret cls results when asked to drop" - }, - "CVE-2023-23454": { - "cmt_msg": "net: sched: cbq: dont intepret cls results when asked to drop" - }, - "CVE-2022-20148": { - "cmt_msg": "f2fs: fix UAF in f2fs_available_free_memory" - }, - "CVE-2023-6931": { - "cmt_msg": "perf: Fix perf_event_validate_size()" - }, - "CVE-2023-6932": { - "cmt_msg": "ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet" + "CVE-2017-5715": { + "cmt_msg": "x86/cpufeatures: Add X86_BUG_SPECTRE_V[12]" }, - "CVE-2024-0607": { - "cmt_msg": "netfilter: nf_tables: fix pointer math issue in nft_byteorder_eval()" + "CVE-2018-3620": { + "cmt_msg": "x86/microcode: Allow late microcode loading with SMT disabled" }, - "CVE-2019-12615": { - "cmt_msg": "mdesc: fix a missing-check bug in get_vdev_port_node_info()" + "CVE-2020-16166": { + "cmt_msg": "random32: update the net random state on interrupt and activity" }, "CVE-2021-33631": { "cmt_msg": "ext4: fix kernel BUG in 'ext4_write_inline_data_end()'" }, - "CVE-2022-28388": { - "cmt_msg": "can: usb_8dev: usb_8dev_start_xmit(): fix double dev_kfree_skb() in error path" - }, - "CVE-2020-12362": { - "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" + "CVE-2019-15916": { + "cmt_msg": "net-sysfs: Fix mem leak in netdev_register_kobject" }, - "CVE-2020-12363": { - "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" + "CVE-2019-15917": { + "cmt_msg": "Bluetooth: hci_ldisc: Postpone HCI_UART_PROTO_READY bit set in hci_uart_set_proto()" }, - "CVE-2022-4129": { - "cmt_msg": "l2tp: Serialize access to sk_user_data with sk_callback_lock" + "CVE-2017-18344": { + "cmt_msg": "posix-timer: Properly check sigevent->sigev_notify" }, - "CVE-2020-12364": { - "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" + "CVE-2024-26648": { + "cmt_msg": "drm/amd/display: Fix variable deferencing before NULL check in edp_setup_replay()" }, - "CVE-2023-33203": { - "cmt_msg": "net: qcom/emac: Fix use after free bug in emac_remove due to race condition" + "CVE-2024-26646": { + "cmt_msg": "thermal: intel: hfi: Add syscore callbacks for system-wide PM" }, - "CVE-2023-26545": { - "cmt_msg": "net: mpls: fix stale pointer if allocation fails during device rename" + "CVE-2018-18690": { + "cmt_msg": "xfs: don't fail when converting shortform attr to long form during ATTR_REPLACE" }, - "CVE-2019-20811": { - "cmt_msg": "net-sysfs: call dev_hold if kobject_init_and_add success" + "CVE-2024-26644": { + "cmt_msg": "btrfs: don't abort filesystem when attempting to snapshot deleted subvolume" }, - "CVE-2021-3892": { - "cmt_msg": "" + "CVE-2024-26642": { + "cmt_msg": "netfilter: nf_tables: disallow anonymous set with timeout flag" }, - "CVE-2023-6356": { - "cmt_msg": "" + "CVE-2017-0627": { + "cmt_msg": "media: uvcvideo: Prevent heap overflow when accessing mapped controls" }, - "CVE-2022-26373": { - "cmt_msg": "x86/speculation: Add RSB VM Exit protections" + "CVE-2024-26641": { + "cmt_msg": "ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv()" }, - "CVE-2019-15290": { - "cmt_msg": "" + "CVE-2018-25020": { + "cmt_msg": "bpf: fix truncated jump targets on heavy expansions" }, - "CVE-2023-3212": { - "cmt_msg": "gfs2: Don't deref jdesc in evict" + "CVE-2023-52469": { + "cmt_msg": "drivers/amd/pm: fix a use-after-free in kv_parse_power_table" }, "CVE-2018-7273": { "cmt_msg": "printk: hash addresses printed with %p" }, - "CVE-2022-2153": { - "cmt_msg": "KVM: x86: Avoid theoretical NULL pointer dereference in kvm_irq_delivery_to_apic_fast()" + "CVE-2022-0617": { + "cmt_msg": "udf: Fix NULL ptr deref when converting from inline format" }, - "CVE-2018-12930": { - "cmt_msg": "" + "CVE-2023-4459": { + "cmt_msg": "net: vmxnet3: fix possible NULL pointer dereference in vmxnet3_rq_cleanup()" }, - "CVE-2018-12931": { - "cmt_msg": "" + "CVE-2022-20566": { + "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free caused by l2cap_chan_put" + }, + "CVE-2022-20565": { + "cmt_msg": "HID: core: Correctly handle ReportSize being zero" }, "CVE-2023-1990": { "cmt_msg": "nfc: st-nci: Fix use after free bug in ndlc_remove due to race condition" @@ -103417,305 +134809,311 @@ "CVE-2021-33098": { "cmt_msg": "ixgbe: fix large MTU request from VF" }, - "CVE-2019-12381": { - "cmt_msg": "ip_sockglue: Fix missing-check bug in ip_ra_control()" - }, - "CVE-2019-12382": { - "cmt_msg": "drm/edid: Fix a missing-check bug in drm_load_edid_firmware()" + "CVE-2022-48619": { + "cmt_msg": "Input: add bounds checking to input_set_capability()" }, - "CVE-2017-13166": { - "cmt_msg": "media: v4l2-ioctl.c: use check_fmt for enum/g/s/try_fmt" + "CVE-2017-10810": { + "cmt_msg": "drm/virtio: don't leak bo on drm_gem_object_init failure" }, - "CVE-2018-12207": { - "cmt_msg": "kvm: x86, powerpc: do not allow clearing largepages debugfs entry" + "CVE-2024-24860": { + "cmt_msg": "Bluetooth: Fix atomicity violation in {min,max}_key_size_set" }, - "CVE-2022-3903": { - "cmt_msg": "media: mceusb: Use new usb_control_msg_*() routines" + "CVE-2018-20509": { + "cmt_msg": "binder: refactor binder ref inc/dec for thread safety" }, - "CVE-2023-20588": { - "cmt_msg": "x86/CPU/AMD: Do not leak quotient data after a division by 0" + "CVE-2021-47070": { + "cmt_msg": "uio_hv_generic: Fix another memory leak in error handling paths" }, - "CVE-2018-20449": { - "cmt_msg": "printk: hash addresses printed with %p" + "CVE-2021-47075": { + "cmt_msg": "nvmet: fix memory leak in nvmet_alloc_ctrl()" }, - "CVE-2022-44033": { - "cmt_msg": "char: pcmcia: remove all the drivers" + "CVE-2021-47074": { + "cmt_msg": "nvme-loop: fix memory leak in nvme_loop_create_ctrl()" }, - "CVE-2022-44032": { - "cmt_msg": "char: pcmcia: remove all the drivers" + "CVE-2021-47076": { + "cmt_msg": "RDMA/rxe: Return CQE error if invalid lkey was supplied" }, - "CVE-2018-10322": { - "cmt_msg": "xfs: enhance dinode verifier" + "CVE-2021-47078": { + "cmt_msg": "RDMA/rxe: Clear all QP fields if creation failed" }, - "CVE-2023-5178": { - "cmt_msg": "nvmet-tcp: Fix a possible UAF in queue intialization setup" + "CVE-2017-8824": { + "cmt_msg": "dccp: CVE-2017-8824: use-after-free in DCCP code" }, - "CVE-2021-0929": { - "cmt_msg": "staging/android/ion: delete dma_buf->kmap/unmap implemenation" + "CVE-2018-7492": { + "cmt_msg": "rds: Fix NULL pointer dereference in __rds_rdma_map" }, - "CVE-2020-26145": { - "cmt_msg": "ath10k: drop fragments with multicast DA for PCIe" + "CVE-2018-20836": { + "cmt_msg": "scsi: libsas: fix a race condition when smp task timeout" }, - "CVE-2019-2181": { - "cmt_msg": "binder: check for overflow when alloc for security context" + "CVE-2018-5848": { + "cmt_msg": "wil6210: missing length check in wmi_set_ie" }, - "CVE-2020-27820": { - "cmt_msg": "drm/nouveau: use drm_dev_unplug() during device removal" + "CVE-2019-10638": { + "cmt_msg": "inet: switch IP ID generator to siphash" }, - "CVE-2023-39194": { - "cmt_msg": "net: xfrm: Fix xfrm_address_filter OOB read" + "CVE-2019-10639": { + "cmt_msg": "netns: provide pure entropy for net_hash_mix()" }, - "CVE-2020-0067": { - "cmt_msg": "f2fs: fix to avoid memory leakage in f2fs_listxattr" + "CVE-2024-26676": { + "cmt_msg": "af_unix: Call kfree_skb() for dead unix_(sk)->oob_skb in GC." }, - "CVE-2023-39193": { - "cmt_msg": "netfilter: xt_sctp: validate the flag_info count" + "CVE-2017-14140": { + "cmt_msg": "Sanitize 'move_pages()' permission checks" }, - "CVE-2023-39192": { - "cmt_msg": "netfilter: xt_u32: validate user space input" + "CVE-2020-26557": { + "cmt_msg": "" }, - "CVE-2020-26541": { - "cmt_msg": "certs: Add EFI_CERT_X509_GUID support for dbx entries" + "CVE-2017-16535": { + "cmt_msg": "USB: core: fix out-of-bounds access bug in usb_get_bos_descriptor()" }, - "CVE-2023-6610": { - "cmt_msg": "smb: client: fix potential OOB in smb2_dump_detail()" + "CVE-2017-16534": { + "cmt_msg": "USB: core: harden cdc_parse_cdc_header" }, - "CVE-2023-3390": { - "cmt_msg": "netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE" + "CVE-2017-16537": { + "cmt_msg": "media: imon: Fix null-ptr-deref in imon_probe" }, - "CVE-2021-33061": { - "cmt_msg": "ixgbe: add improvement for MDD response functionality" + "CVE-2017-16536": { + "cmt_msg": "[media] cx231xx-cards: fix NULL-deref on missing association descriptor" }, - "CVE-2023-1476": { - "cmt_msg": "" + "CVE-2017-16531": { + "cmt_msg": "USB: fix out-of-bounds in usb_set_configuration" }, - "CVE-2020-27835": { - "cmt_msg": "IB/hfi1: Ensure correct mm is used at all times" + "CVE-2017-16530": { + "cmt_msg": "USB: uas: fix bug in handling of alternate settings" }, - "CVE-2021-3864": { - "cmt_msg": "" + "CVE-2017-16533": { + "cmt_msg": "HID: usbhid: fix out-of-bounds bug" }, - "CVE-2023-1670": { - "cmt_msg": "xirc2ps_cs: Fix use after free bug in xirc2ps_detach" + "CVE-2017-16532": { + "cmt_msg": "usb: usbtest: fix NULL pointer dereference" }, - "CVE-2023-51043": { - "cmt_msg": "drm/atomic: Fix potential use-after-free in nonblocking commits" + "CVE-2024-26779": { + "cmt_msg": "wifi: mac80211: fix race condition on enabling fast-xmit" }, - "CVE-2024-23848": { - "cmt_msg": "" + "CVE-2017-16538": { + "cmt_msg": "media: dvb-usb-v2: lmedm04: Improve logic checking of warm start" }, - "CVE-2019-9453": { - "cmt_msg": "f2fs: fix to avoid accessing xattr across the boundary" + "CVE-2016-9084": { + "cmt_msg": "vfio/pci: Fix integer overflows, bitmask check" }, - "CVE-2023-20569": { - "cmt_msg": "x86/bugs: Increase the x86 bugs vector size to two u32s" + "CVE-2016-9083": { + "cmt_msg": "vfio/pci: Fix integer overflows, bitmask check" }, - "CVE-2016-8660": { - "cmt_msg": "" + "CVE-2018-9517": { + "cmt_msg": "l2tp: pass tunnel pointer to ->session_create()" }, - "CVE-2023-6270": { - "cmt_msg": "" + "CVE-2018-9516": { + "cmt_msg": "HID: debug: check length before copy_to_user()" }, - "CVE-2023-3090": { - "cmt_msg": "ipvlan:Fix out-of-bounds caused by unclear skb->cb" + "CVE-2021-20317": { + "cmt_msg": "lib/timerqueue: Rely on rbtree semantics for next timer" }, - "CVE-2023-45862": { - "cmt_msg": "USB: ene_usb6250: Allocate enough memory for full object" + "CVE-2024-26772": { + "cmt_msg": "ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal()" }, - "CVE-2023-45863": { - "cmt_msg": "kobject: Fix slab-out-of-bounds in fill_kobj_path()" + "CVE-2017-2671": { + "cmt_msg": "ping: implement proper locking" }, - "CVE-2023-1582": { - "cmt_msg": "fs/proc: task_mmu.c: don't read mapcount for migration entry" + "CVE-2018-1092": { + "cmt_msg": "ext4: fail ext4_iget for root directory if unallocated" }, - "CVE-2022-1786": { - "cmt_msg": "io_uring: remove io_identity" + "CVE-2018-1093": { + "cmt_msg": "ext4: add validity checks for bitmap block numbers" }, - "CVE-2008-4609": { + "CVE-2021-3864": { "cmt_msg": "" }, - "CVE-2023-52457": { - "cmt_msg": "serial: 8250: omap: Don't skip resource freeing if pm_runtime_resume_and_get() failed" - }, - "CVE-2018-25020": { - "cmt_msg": "bpf: fix truncated jump targets on heavy expansions" - }, - "CVE-2018-20855": { - "cmt_msg": "IB/mlx5: Fix leaking stack memory to userspace" - }, - "CVE-2021-4037": { - "cmt_msg": "xfs: fix up non-directory creation in SGID directories" + "CVE-2019-19054": { + "cmt_msg": "media: rc: prevent memory leak in cx23888_ir_probe" }, - "CVE-2019-1999": { - "cmt_msg": "binder: fix race between munmap() and direct reclaim" + "CVE-2019-19057": { + "cmt_msg": "mwifiex: pcie: Fix memory leak in mwifiex_pcie_init_evt_ring" }, - "CVE-2023-20941": { - "cmt_msg": "" + "CVE-2019-19056": { + "cmt_msg": "mwifiex: pcie: Fix memory leak in mwifiex_pcie_alloc_cmdrsp_buf" }, - "CVE-2019-7308": { - "cmt_msg": "bpf: fix sanitation of alu op with pointer / scalar type from different paths" + "CVE-2019-19052": { + "cmt_msg": "can: gs_usb: gs_can_open(): prevent memory leak" }, - "CVE-2023-3776": { - "cmt_msg": "net/sched: cls_fw: Fix improper refcount update leads to use-after-free" + "CVE-2019-3846": { + "cmt_msg": "mwifiex: Fix possible buffer overflows at parsing bss descriptor" }, - "CVE-2017-9986": { - "cmt_msg": "sound: Retire OSS" + "CVE-2017-15537": { + "cmt_msg": "x86/fpu: Don't let userspace set bogus xcomp_bv" }, - "CVE-2023-3772": { - "cmt_msg": "xfrm: add NULL check in xfrm_update_ae_params" + "CVE-2018-5391": { + "cmt_msg": "ip: discard IPv4 datagrams with overlapping segments." }, - "CVE-2022-3533": { + "CVE-2023-20941": { "cmt_msg": "" }, - "CVE-2022-3534": { - "cmt_msg": "libbpf: Fix use-after-free in btf_dump_name_dups" + "CVE-2017-12188": { + "cmt_msg": "KVM: nVMX: update last_nonleaf_level when initializing nested EPT" }, - "CVE-2023-0386": { - "cmt_msg": "ovl: fail on invalid uid/gid mapping at copy up" + "CVE-2020-10135": { + "cmt_msg": "Bluetooth: Consolidate encryption handling in hci_encrypt_cfm" }, - "CVE-2023-6121": { - "cmt_msg": "nvmet: nul-terminate the NQNs passed in the connect command" + "CVE-2020-36766": { + "cmt_msg": "cec-api: prevent leaking memory through hole in structure" + }, + "CVE-2023-28328": { + "cmt_msg": "media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer()" }, "CVE-2017-13693": { "cmt_msg": "" }, + "CVE-2017-13695": { + "cmt_msg": "ACPICA: acpi: acpica: fix acpi operand cache leak in nseval.c" + }, "CVE-2017-13694": { "cmt_msg": "" }, - "CVE-2022-21385": { - "cmt_msg": "net/rds: fix warn in rds_message_alloc_sgs" + "CVE-2024-26647": { + "cmt_msg": "drm/amd/display: Fix late derefrence 'dsc' check in 'link_set_dsc_pps_packet()'" }, - "CVE-2024-24859": { - "cmt_msg": "" + "CVE-2021-3640": { + "cmt_msg": "Bluetooth: sco: Fix lock_sock() blockage by memcpy_from_msg()" }, - "CVE-2024-24858": { - "cmt_msg": "" + "CVE-2020-11608": { + "cmt_msg": "media: ov519: add missing endpoint sanity checks" }, - "CVE-2024-24855": { - "cmt_msg": "scsi: lpfc: Fix a possible data race in lpfc_unregister_fcf_rescan()" + "CVE-2020-10732": { + "cmt_msg": "fs/binfmt_elf.c: allocate initialized memory in fill_thread_core_info()" }, - "CVE-2024-24857": { - "cmt_msg": "" + "CVE-2019-9466": { + "cmt_msg": "brcmfmac: add subtype check for event handling in data path" }, - "CVE-2022-3545": { - "cmt_msg": "nfp: fix use-after-free in area_cache_get()" + "CVE-2017-17975": { + "cmt_msg": "media: usbtv: prevent double free in error case" }, "CVE-2019-16921": { "cmt_msg": "RDMA/hns: Fix init resp when alloc ucontext" }, - "CVE-2023-1838": { - "cmt_msg": "Fix double fget() in vhost_net_set_backend()" - }, - "CVE-2023-1382": { - "cmt_msg": "tipc: set con sock in tipc_conn_alloc" - }, - "CVE-2023-1380": { - "cmt_msg": "wifi: brcmfmac: slab-out-of-bounds read in brcmf_get_assoc_ies()" - }, - "CVE-2020-0347": { - "cmt_msg": "" + "CVE-2021-0512": { + "cmt_msg": "HID: make arrays usage and value to be the same" }, "CVE-2022-41222": { "cmt_msg": "mm/mremap: hold the rmap lock in write mode when moving page table entries." }, - "CVE-2019-12455": { - "cmt_msg": "clk-sunxi: fix a missing-check bug in sunxi_divs_clk_setup()" + "CVE-2017-18595": { + "cmt_msg": "tracing: Fix possible double free on failure of allocating trace buffer" }, - "CVE-2019-12456": { - "cmt_msg": "" + "CVE-2024-26720": { + "cmt_msg": "mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again" }, - "CVE-2021-33655": { - "cmt_msg": "fbcon: Disallow setting font bigger than screen size" + "CVE-2024-26726": { + "cmt_msg": "btrfs: don't drop extent_map for free space inode on write error" }, - "CVE-2023-1206": { - "cmt_msg": "tcp: Reduce chance of collisions in inet6_hashfn()." + "CVE-2019-6974": { + "cmt_msg": "kvm: fix kvm_ioctl_create_device() reference counting (CVE-2019-6974)" }, "CVE-2023-2985": { "cmt_msg": "fs: hfsplus: fix UAF issue in hfsplus_put_super" }, - "CVE-2021-45469": { - "cmt_msg": "f2fs: fix to do sanity check on last xattr entry in __f2fs_setxattr()" - }, - "CVE-2022-3642": { - "cmt_msg": "" + "CVE-2017-17806": { + "cmt_msg": "crypto: hmac - require that the underlying hash algorithm is unkeyed" }, - "CVE-2024-0584": { - "cmt_msg": "ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet" + "CVE-2017-17807": { + "cmt_msg": "KEYS: add missing permission check for request_key() destination" }, - "CVE-2019-2025": { - "cmt_msg": "binder: fix race that allows malicious free of live buffer" + "CVE-2017-17805": { + "cmt_msg": "crypto: salsa20 - fix blkcipher_walk API usage" }, - "CVE-2021-4218": { - "cmt_msg": "sysctl: pass kernel pointers to ->proc_handler" + "CVE-2023-52519": { + "cmt_msg": "HID: intel-ish-hid: ipc: Disable and reenable ACPI GPE bit" }, - "CVE-2024-25739": { - "cmt_msg": "" + "CVE-2023-52516": { + "cmt_msg": "dma-debug: don't call __dma_entry_alloc_check_leak() under free_entries_lock" }, - "CVE-2023-3358": { - "cmt_msg": "HID: intel_ish-hid: Add check for ishtp_dma_tx_map" + "CVE-2023-52517": { + "cmt_msg": "spi: sun6i: fix race between DMA RX transfer completion and RX FIFO drain" }, - "CVE-2024-0340": { - "cmt_msg": "vhost: use kzalloc() instead of kmalloc() followed by memset()" + "CVE-2023-52515": { + "cmt_msg": "RDMA/srp: Do not call scsi_done() from srp_abort()" }, - "CVE-2023-6535": { - "cmt_msg": "" + "CVE-2019-15902": { + "cmt_msg": "unknown" }, - "CVE-2023-6536": { - "cmt_msg": "" + "CVE-2023-52511": { + "cmt_msg": "spi: sun6i: reduce DMA RX transfer width to single byte" }, - "CVE-2020-15780": { - "cmt_msg": "ACPI: configfs: Disallow loading ACPI tables when locked down" + "CVE-2019-20054": { + "cmt_msg": "fs/proc/proc_sysctl.c: fix NULL pointer dereference in put_links" }, "CVE-2018-17977": { "cmt_msg": "" }, + "CVE-2024-26659": { + "cmt_msg": "xhci: handle isoc Babble and Buffer Overrun events properly" + }, + "CVE-2024-26658": { + "cmt_msg": "bcachefs: grab s_umount only if snapshotting" + }, "CVE-2010-5321": { "cmt_msg": "" }, - "CVE-2017-5967": { - "cmt_msg": "time: Remove CONFIG_TIMER_STATS" + "CVE-2024-26655": { + "cmt_msg": "Fix memory leak in posix_clock_open()" }, - "CVE-2022-3169": { - "cmt_msg": "nvme: ensure subsystem reset is single threaded" + "CVE-2024-26654": { + "cmt_msg": "ALSA: sh: aica: reorder cleanup operations to avoid UAF bugs" + }, + "CVE-2024-26656": { + "cmt_msg": "drm/amdgpu: fix use-after-free bug" + }, + "CVE-2024-26651": { + "cmt_msg": "sr9800: Add check for usbnet_get_endpoints" + }, + "CVE-2024-26650": { + "cmt_msg": "platform/x86: p2sb: Allow p2sb_bar() calls during PCI device probe" }, "CVE-2022-1048": { "cmt_msg": "ALSA: pcm: Fix races among concurrent hw_params and hw_free calls" }, - "CVE-2023-22995": { - "cmt_msg": "usb: dwc3: dwc3-qcom: Add missing platform_device_put() in dwc3_qcom_acpi_register_core" + "CVE-2023-52475": { + "cmt_msg": "Input: powermate - fix use-after-free in powermate_config_complete" }, - "CVE-2024-21803": { - "cmt_msg": "" + "CVE-2023-52477": { + "cmt_msg": "usb: hub: Guard against accesses to uninitialized BOS descriptors" }, - "CVE-2021-3542": { - "cmt_msg": "" + "CVE-2023-52476": { + "cmt_msg": "perf/x86/lbr: Filter vsyscall addresses" }, - "CVE-2023-30456": { - "cmt_msg": "KVM: nVMX: add missing consistency checks for CR0 and CR4" + "CVE-2023-52470": { + "cmt_msg": "drm/radeon: check the alloc_workqueue return value in radeon_crtc_init()" }, - "CVE-2023-34255": { - "cmt_msg": "xfs: verify buffer contents when we skip log replay" + "CVE-2023-52479": { + "cmt_msg": "ksmbd: fix uaf in smb20_oplock_break_ack" }, - "CVE-2023-34256": { - "cmt_msg": "ext4: avoid a potential slab-out-of-bounds in ext4_group_desc_csum" + "CVE-2023-52478": { + "cmt_msg": "HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect" }, - "CVE-2018-12929": { - "cmt_msg": "" + "CVE-2022-26365": { + "cmt_msg": "xen/blkfront: fix leaking data in shared pages" }, - "CVE-2019-12380": { - "cmt_msg": "efi/x86/Add missing error handling to old_memmap 1:1 mapping code" + "CVE-2020-12652": { + "cmt_msg": "scsi: mptfusion: Fix double fetch bug in ioctl" }, - "CVE-2020-36310": { - "cmt_msg": "KVM: SVM: avoid infinite loop on NPF from bad address" + "CVE-2020-12653": { + "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_cmd_append_vsie_tlv()" }, - "CVE-2020-36313": { - "cmt_msg": "KVM: Fix out of range accesses to memslots" + "CVE-2020-12656": { + "cmt_msg": "sunrpc: check that domain table is empty at module unload." + }, + "CVE-2017-14051": { + "cmt_msg": "scsi: qla2xxx: Fix an integer overflow in sysfs code" + }, + "CVE-2020-12654": { + "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_ret_wmm_get_status()" + }, + "CVE-2022-23042": { + "cmt_msg": "xen/netfront: react properly to failing gnttab_end_foreign_access_ref()" }, "CVE-2024-25740": { "cmt_msg": "" }, - "CVE-2020-10708": { - "cmt_msg": "" + "CVE-2022-4744": { + "cmt_msg": "tun: avoid double free in tun_free_netdev" }, "CVE-2022-0400": { "cmt_msg": "" @@ -103723,17 +135121,23 @@ "CVE-2024-25741": { "cmt_msg": "" }, + "CVE-2022-26966": { + "cmt_msg": "sr9700: sanity check for packet length" + }, "CVE-2023-1989": { "cmt_msg": "Bluetooth: btsdio: fix use after free bug in btsdio_remove due to unfinished work" }, - "CVE-2022-20369": { - "cmt_msg": "media: v4l2-mem2mem: Apply DST_QUEUE_OFF_BASE on MMAP buffers across ioctls" - }, "CVE-2022-25265": { "cmt_msg": "" }, - "CVE-2022-21499": { - "cmt_msg": "lockdown: also lock down previous kgdb use" + "CVE-2020-25285": { + "cmt_msg": "mm/hugetlb: fix a race between hugetlb sysctl handlers" + }, + "CVE-2020-11609": { + "cmt_msg": "media: stv06xx: add missing descriptor sanity checks" + }, + "CVE-2020-25284": { + "cmt_msg": "rbd: require global CAP_SYS_ADMIN for mapping and unmapping" }, "CVE-2023-4208": { "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free" @@ -103744,17 +135148,11 @@ "CVE-2023-4207": { "cmt_msg": "net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free" }, - "CVE-2023-3640": { - "cmt_msg": "" - }, - "CVE-2023-20593": { - "cmt_msg": "x86/cpu/amd: Add a Zenbleed fix" - }, - "CVE-2023-2124": { - "cmt_msg": "xfs: verify buffer contents when we skip log replay" + "CVE-2021-47046": { + "cmt_msg": "drm/amd/display: Fix off by one in hdmi_14_process_transaction()" }, - "CVE-2023-4010": { - "cmt_msg": "" + "CVE-2020-29370": { + "cmt_msg": "mm: slub: add missing TID bump in kmem_cache_alloc_bulk()" }, "CVE-2022-20424": { "cmt_msg": "io_uring: remove io_identity" @@ -103762,14 +135160,11 @@ "CVE-2022-20422": { "cmt_msg": "arm64: fix oops in concurrently setting insn_emulation sysctls" }, - "CVE-2019-19378": { - "cmt_msg": "" - }, - "CVE-2019-19377": { - "cmt_msg": "btrfs: Don't submit any btree write bio if the fs has errors" + "CVE-2017-8831": { + "cmt_msg": "[media] saa7164: fix double fetch PCIe access condition" }, - "CVE-2021-3759": { - "cmt_msg": "memcg: enable accounting of ipc resources" + "CVE-2022-45934": { + "cmt_msg": "Bluetooth: L2CAP: Fix u8 overflow" }, "CVE-2021-4197": { "cmt_msg": "cgroup: Use open-time credentials for process migraton perm checks" @@ -103780,1395 +135175,1499 @@ "CVE-2020-24502": { "cmt_msg": "" }, - "CVE-2019-19449": { - "cmt_msg": "f2fs: fix to do sanity check on segment/section count" - }, - "CVE-2023-1118": { - "cmt_msg": "media: rc: Fix use-after-free bugs caused by ene_tx_irqsim()" - }, - "CVE-2020-11725": { - "cmt_msg": "" - }, - "CVE-2023-7192": { - "cmt_msg": "netfilter: ctnetlink: fix possible refcount leak in ctnetlink_create_conntrack()" - }, - "CVE-2022-1263": { - "cmt_msg": "KVM: avoid NULL pointer dereference in kvm_dirty_ring_push" - }, - "CVE-2021-35477": { - "cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4" + "CVE-2024-26774": { + "cmt_msg": "ext4: avoid dividing by 0 in mb_update_avg_fragment_size() when block bitmap corrupt" }, "CVE-2023-31436": { "cmt_msg": "net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg" }, - "CVE-2022-47929": { - "cmt_msg": "net: sched: disallow noqueue for qdisc classes" - }, - "CVE-2022-3606": { - "cmt_msg": "" - }, - "CVE-2022-2209": { - "cmt_msg": "" - }, - "CVE-2023-7042": { - "cmt_msg": "" + "CVE-2019-8980": { + "cmt_msg": "exec: Fix mem leak in kernel_read_file" }, - "CVE-2022-3595": { - "cmt_msg": "cifs: fix double-fault crash during ntlmssp" + "CVE-2024-26775": { + "cmt_msg": "aoe: avoid potential deadlock at set_capacity" }, - "CVE-2023-47233": { - "cmt_msg": "" + "CVE-2018-14609": { + "cmt_msg": "btrfs: relocation: Only remove reloc rb_trees if reloc control has been initialized" }, "CVE-2024-23851": { "cmt_msg": "dm: limit the number of targets and parameter size area" }, - "CVE-2023-6606": { - "cmt_msg": "smb: client: fix OOB in smbCalcSize()" - }, - "CVE-2023-3006": { - "cmt_msg": "arm64: Add AMPERE1 to the Spectre-BHB affected list" - }, "CVE-2020-27777": { "cmt_msg": "powerpc/rtas: Restrict RTAS requests from userspace" }, + "CVE-2019-11486": { + "cmt_msg": "tty: mark Siemens R3964 line discipline as BROKEN" + }, + "CVE-2019-11487": { + "cmt_msg": "fs: prevent page refcount overflow in pipe_buf_get" + }, + "CVE-2018-8043": { + "cmt_msg": "net: phy: mdio-bcm-unimac: fix potential NULL dereference in unimac_mdio_probe()" + }, "CVE-2019-20908": { "cmt_msg": "efi: Restrict efivar_ssdt_load when the kernel is locked down" }, - "CVE-2023-52435": { - "cmt_msg": "net: prevent mss overflow in skb_segment()" + "CVE-2019-19060": { + "cmt_msg": "iio: imu: adis16400: release allocated memory on failure" }, - "CVE-2023-52434": { - "cmt_msg": "smb: client: fix potential OOBs in smb2_parse_contexts()" + "CVE-2019-19061": { + "cmt_msg": "iio: imu: adis16400: fix memory leak" }, - "CVE-2023-52436": { - "cmt_msg": "f2fs: explicitly null-terminate the xattr list" + "CVE-2019-19062": { + "cmt_msg": "crypto: user - fix memory leak in crypto_report" }, - "CVE-2019-9444": { - "cmt_msg": "printk: hash addresses printed with %p" + "CVE-2019-19063": { + "cmt_msg": "rtlwifi: prevent memory leak in rtl_usb_probe" }, - "CVE-2022-2961": { - "cmt_msg": "" + "CVE-2017-17741": { + "cmt_msg": "KVM: Fix stack-out-of-bounds read in write_mmio" }, - "CVE-2021-3506": { - "cmt_msg": "f2fs: fix to avoid out-of-bounds memory access" + "CVE-2019-19066": { + "cmt_msg": "scsi: bfa: release allocated memory in case of error" }, "CVE-2019-19067": { "cmt_msg": "drm/amdgpu: fix multiple memory leaks in acp_hw_init" }, - "CVE-2020-0435": { - "cmt_msg": "f2fs: fix to do sanity check with i_extra_isize" + "CVE-2019-19068": { + "cmt_msg": "rtl8xxxu: prevent leaking urb" }, - "CVE-2023-51779": { - "cmt_msg": "Bluetooth: af_bluetooth: Fix Use-After-Free in bt_sock_recvmsg" + "CVE-2017-7184": { + "cmt_msg": "xfrm_user: validate XFRM_MSG_NEWAE XFRMA_REPLAY_ESN_VAL replay_window" + }, + "CVE-2017-7187": { + "cmt_msg": "scsi: sg: check length passed to SG_NEXT_CMD_LEN" }, "CVE-2019-3874": { "cmt_msg": "sctp: implement memory accounting on tx path" }, - "CVE-2023-6915": { - "cmt_msg": "ida: Fix crash in ida_free when the bitmap is empty" + "CVE-2017-12193": { + "cmt_msg": "assoc_array: Fix a buggy node-splitting case" }, - "CVE-2010-4563": { + "CVE-2017-12192": { + "cmt_msg": "KEYS: prevent KEYCTL_READ on negative key" + }, + "CVE-2017-12190": { + "cmt_msg": "fix unbalanced page refcounting in bio_map_user_iov" + }, + "CVE-2020-36516": { + "cmt_msg": "ipv4: avoid using shared IP generator for connected sockets" + }, + "CVE-2012-4542": { "cmt_msg": "" }, - "CVE-2023-1249": { - "cmt_msg": "coredump: Use the vma snapshot in fill_files_note" + "CVE-2018-1000028": { + "cmt_msg": "nfsd: auth: Fix gid sorting when rootsquash enabled" }, - "CVE-2023-2162": { - "cmt_msg": "scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress" + "CVE-2018-1000026": { + "cmt_msg": "bnx2x: disable GSO where gso_size is too big for hardware" }, - "CVE-2023-45871": { - "cmt_msg": "igb: set max size RX buffer when store bad packet is enabled" + "CVE-2017-2596": { + "cmt_msg": "kvm: fix page struct leak in handle_vmon" }, - "CVE-2023-4622": { - "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES" + "CVE-2020-36777": { + "cmt_msg": "media: dvbdev: Fix memory leak in dvb_media_device_free()" }, - "CVE-2023-4623": { - "cmt_msg": "net/sched: sch_hfsc: Ensure inner classes have fsc curve" + "CVE-2020-36775": { + "cmt_msg": "f2fs: fix to avoid potential deadlock" }, - "CVE-2023-6040": { - "cmt_msg": "netfilter: nf_tables: Reject tables of unsupported family" + "CVE-2021-20292": { + "cmt_msg": "drm/ttm/nouveau: don't call tt destroy callback on alloc failure." }, - "CVE-2021-38300": { - "cmt_msg": "bpf, mips: Validate conditional branch offsets" + "CVE-2023-2269": { + "cmt_msg": "dm ioctl: fix nested locking in table_clear() to remove deadlock concern" }, - "CVE-2021-4023": { - "cmt_msg": "io-wq: fix cancellation on create-worker failure" + "CVE-2020-10690": { + "cmt_msg": "ptp: fix the race between the release of ptp_clock and cdev" }, - "CVE-2021-0399": { - "cmt_msg": "" + "CVE-2021-3659": { + "cmt_msg": "net: mac802154: Fix general protection fault" }, - "CVE-2020-36691": { - "cmt_msg": "netlink: limit recursion depth in policy validation" + "CVE-2021-3653": { + "cmt_msg": "KVM: nSVM: avoid picking up unsupported bits from L2 in int_ctl (CVE-2021-3653)" }, - "CVE-2023-42755": { - "cmt_msg": "net/sched: Retire rsvp classifier" + "CVE-2021-3655": { + "cmt_msg": "sctp: validate from_addr_param return" }, - "CVE-2023-3161": { - "cmt_msg": "fbcon: Check font dimension limits" + "CVE-2019-12614": { + "cmt_msg": "powerpc/pseries/dlpar: Fix a missing check in dlpar_parse_cc_property()" }, - "CVE-2012-4542": { + "CVE-2019-12615": { + "cmt_msg": "mdesc: fix a missing-check bug in get_vdev_port_node_info()" + }, + "CVE-2021-3896": { + "cmt_msg": "isdn: cpai: check ctr->cnr to avoid array index out of bound" + }, + "CVE-2021-3892": { "cmt_msg": "" }, - "CVE-2023-42752": { - "cmt_msg": "igmp: limit igmpv3_newpack() packet size to IP_MAX_MTU" + "CVE-2022-27223": { + "cmt_msg": "USB: gadget: validate endpoint index for xilinx udc" }, - "CVE-2023-4128": { - "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free" + "CVE-2022-24958": { + "cmt_msg": "usb: gadget: don't release an existing dev->buf" }, - "CVE-2019-11191": { - "cmt_msg": "x86: Deprecate a.out support" + "CVE-2020-36557": { + "cmt_msg": "vt: vt_ioctl: fix VT_DISALLOCATE freeing in-use virtual console" }, - "CVE-2018-12130": { - "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" + "CVE-2020-12888": { + "cmt_msg": "vfio-pci: Invalidate mmaps and block MMIO access on disabled memory" }, - "CVE-2017-8065": { - "cmt_msg": "crypto: ccm - move cbcmac input off the stack" + "CVE-2023-2194": { + "cmt_msg": "i2c: xgene-slimpro: Fix out-of-bounds bug in xgene_slimpro_i2c_xfer()" }, - "CVE-2020-11669": { - "cmt_msg": "powerpc/powernv/idle: Restore AMR/UAMOR/AMOR after idle" + "CVE-2017-6353": { + "cmt_msg": "sctp: deny peeloff operation on asocs with threads sleeping on it" }, - "CVE-2023-2269": { - "cmt_msg": "dm ioctl: fix nested locking in table_clear() to remove deadlock concern" + "CVE-2022-41218": { + "cmt_msg": "media: dvb-core: Fix UAF due to refcount races at releasing" }, - "CVE-2023-0394": { - "cmt_msg": "ipv6: raw: Deduct extension header length in rawv6_push_pending_frames" + "CVE-2011-4917": { + "cmt_msg": "" }, - "CVE-2023-32269": { - "cmt_msg": "netrom: Fix use-after-free caused by accept on already connected socket" + "CVE-2021-45485": { + "cmt_msg": "ipv6: use prandom_u32() for ID generation" }, - "CVE-2021-4150": { - "cmt_msg": "block: fix incorrect references to disk objects" + "CVE-2020-0030": { + "cmt_msg": "ANDROID: binder: synchronize_rcu() when using POLLFREE." }, - "CVE-2021-4159": { - "cmt_msg": "bpf: Verifer, adjust_scalar_min_max_vals to always call update_reg_bounds()" + "CVE-2019-18806": { + "cmt_msg": "net: qlogic: Fix memory leak in ql_alloc_large_buffers" }, - "CVE-2021-29155": { - "cmt_msg": "bpf: Use correct permission flag for mixed signed bounds arithmetic" + "CVE-2018-7754": { + "cmt_msg": "printk: hash addresses printed with %p" }, - "CVE-2021-3714": { + "CVE-2019-3900": { + "cmt_msg": "vhost_net: fix possible infinite loop" + }, + "CVE-2022-40982": { + "cmt_msg": "x86/speculation: Add Gather Data Sampling mitigation" + }, + "CVE-2021-39801": { "cmt_msg": "" }, - "CVE-2019-16230": { - "cmt_msg": "drm/amdkfd: fix a potential NULL pointer dereference (v2)" + "CVE-2021-39800": { + "cmt_msg": "" }, - "CVE-2023-3117": { - "cmt_msg": "netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE" + "CVE-2024-22099": { + "cmt_msg": "Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security" }, - "CVE-2023-3111": { - "cmt_msg": "btrfs: unset reloc control if transaction commit fails in prepare_to_relocate()" + "CVE-2021-4202": { + "cmt_msg": "NFC: reorganize the functions in nci_request" }, - "CVE-2021-39636": { - "cmt_msg": "netfilter: x_tables: fix pointer leaks to userspace" + "CVE-2021-4203": { + "cmt_msg": "af_unix: fix races in sk_peer_pid and sk_peer_cred accesses" }, - "CVE-2024-24860": { - "cmt_msg": "Bluetooth: Fix atomicity violation in {min,max}_key_size_set" + "CVE-2023-52509": { + "cmt_msg": "ravb: Fix use-after-free issue in ravb_tx_timeout_work()" }, - "CVE-2024-24861": { - "cmt_msg": "" + "CVE-2023-46343": { + "cmt_msg": "nfc: nci: fix possible NULL pointer dereference in send_acknowledge()" }, - "CVE-2018-20509": { - "cmt_msg": "binder: refactor binder ref inc/dec for thread safety" + "CVE-2023-52507": { + "cmt_msg": "nfc: nci: assert requested protocol is valid" }, - "CVE-2024-24864": { + "CVE-2023-52506": { + "cmt_msg": "LoongArch: Set all reserved memblocks on Node#0 at initialization" + }, + "CVE-2023-52501": { + "cmt_msg": "ring-buffer: Do not attempt to read past \"commit\"" + }, + "CVE-2023-52500": { + "cmt_msg": "scsi: pm80xx: Avoid leaking tags when processing OPC_INB_SET_CONTROLLER_CONFIG command" + }, + "CVE-2023-52502": { + "cmt_msg": "net: nfc: fix races in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn()" + }, + "CVE-2023-2513": { + "cmt_msg": "ext4: fix use-after-free in ext4_xattr_set_entry" + }, + "CVE-2017-1000": { + "cmt_msg": "udp: consistently apply ufo or fragmentation" + }, + "CVE-2024-26668": { + "cmt_msg": "netfilter: nft_limit: reject configurations that cause integer overflow" + }, + "CVE-2017-0605": { + "cmt_msg": "tracing: Use strlcpy() instead of strcpy() in __trace_find_cmdline()" + }, + "CVE-2024-24858": { "cmt_msg": "" }, + "CVE-2024-26664": { + "cmt_msg": "hwmon: (coretemp) Fix out-of-bounds memory access" + }, + "CVE-2021-38198": { + "cmt_msg": "KVM: X86: MMU: Use the correct inherited permissions to get shadow page" + }, + "CVE-2021-38199": { + "cmt_msg": "NFSv4: Initialise connection to the server in nfs4_alloc_client()" + }, + "CVE-2022-1679": { + "cmt_msg": "ath9k: fix use-after-free in ath9k_hif_usb_rx_cb" + }, + "CVE-2023-34256": { + "cmt_msg": "ext4: avoid a potential slab-out-of-bounds in ext4_group_desc_csum" + }, + "CVE-2023-52442": { + "cmt_msg": "ksmbd: validate session id and tree id in compound request" + }, + "CVE-2022-40768": { + "cmt_msg": "scsi: stex: Properly zero out the passthrough command structure" + }, "CVE-2023-52444": { "cmt_msg": "f2fs: fix to avoid dirent corruption" }, - "CVE-2023-2194": { - "cmt_msg": "i2c: xgene-slimpro: Fix out-of-bounds bug in xgene_slimpro_i2c_xfer()" + "CVE-2023-52445": { + "cmt_msg": "media: pvrusb2: fix use after free on context disconnection" }, - "CVE-2022-41218": { - "cmt_msg": "media: dvb-core: Fix UAF due to refcount races at releasing" + "CVE-2023-52449": { + "cmt_msg": "mtd: Fix gluebi NULL pointer dereference caused by ftl notifier" }, - "CVE-2022-23222": { - "cmt_msg": "bpf: Replace PTR_TO_XXX_OR_NULL with PTR_TO_XXX | PTR_MAYBE_NULL" + "CVE-2019-15807": { + "cmt_msg": "scsi: libsas: delete sas port if expander discover failed" }, - "CVE-2023-52456": { - "cmt_msg": "serial: imx: fix tx statemachine deadlock" + "CVE-2024-26719": { + "cmt_msg": "nouveau: offload fence uevents work to workqueue" }, - "CVE-2022-41848": { + "CVE-2024-26715": { + "cmt_msg": "usb: dwc3: gadget: Fix NULL pointer dereference in dwc3_gadget_suspend" + }, + "CVE-2024-1312": { + "cmt_msg": "mm: lock_vma_under_rcu() must check vma->anon_vma under vma lock" + }, + "CVE-2019-14284": { + "cmt_msg": "floppy: fix div-by-zero in setup_format_params" + }, + "CVE-2019-14283": { + "cmt_msg": "floppy: fix out-of-bounds read in copy_buffer" + }, + "CVE-2023-3338": { + "cmt_msg": "Remove DECnet support from kernel" + }, + "CVE-2018-10882": { + "cmt_msg": "ext4: add more inode number paranoia checks" + }, + "CVE-2018-10883": { + "cmt_msg": "jbd2: don't mark block as modified if the handle is out of credits" + }, + "CVE-2020-29368": { + "cmt_msg": "mm: thp: make the THP mapcount atomic against __split_huge_pmd_locked()" + }, + "CVE-2020-12464": { + "cmt_msg": "USB: core: Fix free-while-in-use bug in the USB S-Glibrary" + }, + "CVE-2022-47520": { + "cmt_msg": "wifi: wilc1000: validate pairwise and authentication suite offsets" + }, + "CVE-2018-10087": { + "cmt_msg": "kernel/exit.c: avoid undefined behaviour when calling wait4()" + }, + "CVE-2023-3159": { + "cmt_msg": "firewire: fix potential uaf in outbound_phy_packet_callback()" + }, + "CVE-2021-47059": { + "cmt_msg": "crypto: sun8i-ss - fix result memory leak on error path" + }, + "CVE-2021-47052": { + "cmt_msg": "crypto: sa2ul - Fix memory leak of rxd" + }, + "CVE-2021-47056": { + "cmt_msg": "crypto: qat - ADF_STATUS_PF_RUNNING should be set after adf_dev_init" + }, + "CVE-2017-7374": { + "cmt_msg": "fscrypt: remove broken support for detecting keyring key revocation" + }, + "CVE-2022-21125": { + "cmt_msg": "x86/speculation/mmio: Reuse SRBDS mitigation for SBDS" + }, + "CVE-2019-19241": { + "cmt_msg": "io_uring: async workers should inherit the user creds" + }, + "CVE-2022-21123": { + "cmt_msg": "x86/speculation/mmio: Add mitigation for Processor MMIO Stale Data" + }, + "CVE-2020-26559": { "cmt_msg": "" }, - "CVE-2022-40982": { - "cmt_msg": "x86/speculation: Add Gather Data Sampling mitigation" + "CVE-2021-43975": { + "cmt_msg": "atlantic: Fix OOB read and write in hw_atl_utils_fw_rpc_wait" }, - "CVE-2023-6546": { - "cmt_msg": "tty: n_gsm: fix the UAF caused by race condition in gsm_cleanup_mux" + "CVE-2018-6927": { + "cmt_msg": "futex: Prevent overflow by strengthen input validation" + }, + "CVE-2018-3639": { + "cmt_msg": "x86/nospec: Simplify alternative_msr_write()" + }, + "CVE-2023-0590": { + "cmt_msg": "net: sched: fix race condition in qdisc_graft()" + }, + "CVE-2023-0597": { + "cmt_msg": "x86/mm: Randomize per-cpu entry area" + }, + "CVE-2022-28390": { + "cmt_msg": "can: ems_usb: ems_usb_start_xmit(): fix double dev_kfree_skb() in error path" + }, + "CVE-2019-3460": { + "cmt_msg": "Bluetooth: Check L2CAP option sizes returned from l2cap_get_conf_opt" + }, + "CVE-2022-3202": { + "cmt_msg": "jfs: prevent NULL deref in diFree" + }, + "CVE-2017-7518": { + "cmt_msg": "KVM: x86: fix singlestepping over syscall" + }, + "CVE-2019-11477": { + "cmt_msg": "tcp: limit payload size of sacked skbs" + }, + "CVE-2021-46908": { + "cmt_msg": "bpf: Use correct permission flag for mixed signed bounds arithmetic" + }, + "CVE-2021-46906": { + "cmt_msg": "HID: usbhid: fix info leak in hid_submit_ctrl" + }, + "CVE-2018-14614": { + "cmt_msg": "f2fs: fix to do sanity check with cp_pack_start_sum" + }, + "CVE-2018-14617": { + "cmt_msg": "hfsplus: fix NULL dereference in hfsplus_lookup()" + }, + "CVE-2018-14616": { + "cmt_msg": "f2fs: fix to do sanity check with block address in main area v2" + }, + "CVE-2018-14611": { + "cmt_msg": "btrfs: validate type when reading a chunk" + }, + "CVE-2018-14610": { + "cmt_msg": "btrfs: Check that each block group has corresponding chunk at mount time" + }, + "CVE-2018-14613": { + "cmt_msg": "btrfs: tree-checker: Verify block_group_item" + }, + "CVE-2018-14612": { + "cmt_msg": "btrfs: tree-checker: Detect invalid and empty essential trees" + }, + "CVE-2024-23848": { + "cmt_msg": "" + }, + "CVE-2020-27418": { + "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region" + }, + "CVE-2017-2618": { + "cmt_msg": "selinux: fix off-by-one in setprocattr" + }, + "CVE-2019-2025": { + "cmt_msg": "binder: fix race that allows malicious free of live buffer" + }, + "CVE-2019-2024": { + "cmt_msg": "media: em28xx: Fix use-after-free when disconnecting" + }, + "CVE-2017-15951": { + "cmt_msg": "KEYS: Fix race between updating and finding a negative key" + }, + "CVE-2019-19074": { + "cmt_msg": "ath9k: release allocated buffer if timed out" + }, + "CVE-2019-19073": { + "cmt_msg": "ath9k_htc: release allocated buffer if timed out" + }, + "CVE-2019-1125": { + "cmt_msg": "x86/speculation: Prepare entry code for Spectre v1 swapgs mitigations" + }, + "CVE-2023-31085": { + "cmt_msg": "ubi: Refuse attaching if mtd's erasesize is 0" + }, + "CVE-2023-31084": { + "cmt_msg": "media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*()" + }, + "CVE-2023-31083": { + "cmt_msg": "Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO" + }, + "CVE-2023-31082": { + "cmt_msg": "" + }, + "CVE-2023-31081": { + "cmt_msg": "" + }, + "CVE-2022-32296": { + "cmt_msg": "tcp: increase source port perturb table to 2^16" }, - "CVE-2021-39801": { - "cmt_msg": "" + "CVE-2020-28974": { + "cmt_msg": "vt: Disable KD_FONT_OP_COPY" }, - "CVE-2021-39800": { - "cmt_msg": "" + "CVE-2019-20806": { + "cmt_msg": "media: tw5864: Fix possible NULL pointer dereference in tw5864_handle_frame" }, - "CVE-2022-20166": { - "cmt_msg": "drivers core: Use sysfs_emit and sysfs_emit_at for show(device *...) functions" + "CVE-2022-3028": { + "cmt_msg": "af_key: Do not call xfrm_probe_algs in parallel" }, - "CVE-2024-22099": { + "CVE-2020-14304": { "cmt_msg": "" }, - "CVE-2022-45885": { - "cmt_msg": "" + "CVE-2018-17972": { + "cmt_msg": "proc: restrict kernel stack dumps to root" }, - "CVE-2022-45884": { - "cmt_msg": "" + "CVE-2022-33981": { + "cmt_msg": "floppy: disable FDRAWCMD by default" }, - "CVE-2022-45887": { - "cmt_msg": "media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb()" + "CVE-2017-16995": { + "cmt_msg": "bpf: fix incorrect sign extension in check_alu_op()" }, - "CVE-2022-45886": { - "cmt_msg": "media: dvb-core: Fix use-after-free due on race condition at dvb_net" + "CVE-2017-16994": { + "cmt_msg": "mm/pagewalk.c: report holes in hugetlb ranges" }, - "CVE-2023-46343": { - "cmt_msg": "nfc: nci: fix possible NULL pointer dereference in send_acknowledge()" + "CVE-2017-2583": { + "cmt_msg": "KVM: x86: fix emulation of \"MOV SS, null selector\"" }, - "CVE-2024-25744": { - "cmt_msg": "x86/coco: Disable 32-bit emulation by default on TDX and SEV" + "CVE-2017-2584": { + "cmt_msg": "KVM: x86: Introduce segmented_write_std" }, - "CVE-2019-10220": { - "cmt_msg": "Convert filldir[64]() from __put_user() to unsafe_put_user()" + "CVE-2017-6001": { + "cmt_msg": "perf/core: Fix concurrent sys_perf_event_open() vs. 'move_group' race" }, - "CVE-2023-3022": { - "cmt_msg": "ipv6: Use result arg in fib_lookup_arg consistently" + "CVE-2017-17558": { + "cmt_msg": "USB: core: prevent malicious bNumInterfaces overflow" }, - "CVE-2021-44879": { - "cmt_msg": "f2fs: fix to do sanity check on inode type during garbage collection" + "CVE-2019-11479": { + "cmt_msg": "tcp: add tcp_min_snd_mss sysctl" }, - "CVE-2023-1855": { - "cmt_msg": "hwmon: (xgene) Fix use after free bug in xgene_hwmon_remove due to race condition" + "CVE-2020-10751": { + "cmt_msg": "selinux: properly handle multiple messages in selinux_netlink_send()" }, - "CVE-2022-27672": { - "cmt_msg": "x86/speculation: Identify processors vulnerable to SMT RSB predictions" + "CVE-2020-10757": { + "cmt_msg": "mm: Fix mremap not considering huge pmd devmap" }, - "CVE-2015-2877": { + "CVE-2022-1116": { "cmt_msg": "" }, - "CVE-2022-1679": { - "cmt_msg": "ath9k: fix use-after-free in ath9k_hif_usb_rx_cb" + "CVE-2021-28660": { + "cmt_msg": "staging: rtl8188eu: prevent ->ssid overflow in rtw_wx_set_scan()" }, - "CVE-2023-1513": { - "cmt_msg": "kvm: initialize all of the kvm_debugregs structure before sending it to userspace" + "CVE-2017-6348": { + "cmt_msg": "irda: Fix lockdep annotations in hashbin_delete()." }, - "CVE-2021-3847": { - "cmt_msg": "" + "CVE-2020-36386": { + "cmt_msg": "Bluetooth: Fix slab-out-of-bounds read in hci_extended_inquiry_result_evt()" }, - "CVE-2023-52442": { - "cmt_msg": "ksmbd: validate session id and tree id in compound request" + "CVE-2017-6345": { + "cmt_msg": "net/llc: avoid BUG_ON() in skb_orphan()" }, - "CVE-2022-1280": { - "cmt_msg": "drm: avoid circular locks in drm_mode_getconnector" + "CVE-2017-6346": { + "cmt_msg": "packet: fix races in fanout_add()" }, - "CVE-2023-52445": { - "cmt_msg": "media: pvrusb2: fix use after free on context disconnection" + "CVE-2017-6347": { + "cmt_msg": "ip: fix IP_CHECKSUM handling" }, - "CVE-2011-4917": { - "cmt_msg": "" + "CVE-2018-9385": { + "cmt_msg": "ARM: amba: Don't read past the end of sysfs \"driver_override\" buffer" }, - "CVE-2011-4916": { - "cmt_msg": "" + "CVE-2020-0009": { + "cmt_msg": "staging: android: ashmem: Disallow ashmem memory from being remapped" }, - "CVE-2023-52449": { - "cmt_msg": "mtd: Fix gluebi NULL pointer dereference caused by ftl notifier" + "CVE-2019-14615": { + "cmt_msg": "drm/i915/gen9: Clear residual context state on context switch" }, - "CVE-2023-23039": { - "cmt_msg": "" + "CVE-2018-9415": { + "cmt_msg": "ARM: amba: Fix race condition with driver_override" }, - "CVE-2019-5489": { - "cmt_msg": "Change mincore() to count \"mapped\" pages rather than \"cached\" pages" + "CVE-2019-13648": { + "cmt_msg": "powerpc/tm: Fix oops on sigreturn on systems without TM" }, - "CVE-2024-1312": { - "cmt_msg": "mm: lock_vma_under_rcu() must check vma->anon_vma under vma lock" + "CVE-2018-15572": { + "cmt_msg": "x86/speculation: Protect against userspace-userspace spectreRSB" }, - "CVE-2023-3338": { - "cmt_msg": "Remove DECnet support from kernel" + "CVE-2022-1204": { + "cmt_msg": "ax25: Fix refcount leaks caused by ax25_cb_del()" }, - "CVE-2017-16648": { - "cmt_msg": "dvb_frontend: don't use-after-free the frontend struct" - } - } - }, - "4.8": { - "4.8.1": { - "CVE-2017-15102": { - "cmt_msg": "usb: misc: legousbtower: Fix NULL pointer deference", - "cmt_id": "540ce809d333a4579a61146777b0bea4c3263e31" - } - }, - "4.8.3": { - "CVE-2016-5195": { - "cmt_msg": "mm: remove gup_flags FOLL_WRITE games from __get_user_pages()", - "cmt_id": "89eeba1594ac641a30b91942961e80fae978f839" - } - }, - "4.8.4": { - "CVE-2016-7425": { - "cmt_msg": "scsi: arcmsr: Buffer overflow in arcmsr_iop_message_xfer()", - "cmt_id": "cf4dc8d4d44078c0c9063df957caad12c79d79b3" - } - }, - "4.8.6": { - "CVE-2016-10907": { - "cmt_msg": "iio: ad5755: fix off-by-one on devnr limit check", - "cmt_id": "4100d32ab5a3df4292db4cda2396b0896bc3facc" + "CVE-2018-9363": { + "cmt_msg": "Bluetooth: hidp: buffer overflow in hidp_process_report" }, - "CVE-2016-7097": { - "cmt_msg": "posix_acl: Clear SGID bit when setting file permissions", - "cmt_id": "ea288a690cc4e53a528ae6a1d37cd6e14320ed27" - } - }, - "4.8.7": { - "CVE-2016-7042": { - "cmt_msg": "KEYS: Fix short sprintf buffer in /proc/keys show function", - "cmt_id": "5daa841d04370f5234aab2a6b63702584c1be608" + "CVE-2016-10723": { + "cmt_msg": "mm, oom: remove sleep from under oom_lock" }, - "CVE-2016-8633": { - "cmt_msg": "firewire: net: guard against rx buffer overflows", - "cmt_id": "032430fb6a2cb0392801ca260396f31bc7798632" + "CVE-2022-26490": { + "cmt_msg": "nfc: st21nfca: Fix potential buffer overflows in EVT_TRANSACTION" }, - "CVE-2016-9313": { - "cmt_msg": "KEYS: Sort out big_key initialisation", - "cmt_id": "5152986c9257e797436688d09ebd582b9eadcd2d" + "CVE-2020-8832": { + "cmt_msg": "drm/i915: Record the default hw state after reset upon load" }, - "CVE-2016-8630": { - "cmt_msg": "kvm: x86: Check memopp before dereference (CVE-2016-8630)", - "cmt_id": "0c879624701dc719022950552227516ac87a10d5" - } - }, - "4.8.8": { - "CVE-2016-7039": { - "cmt_msg": "net: add recursion limit to GRO", - "cmt_id": "23c110c4cdbce17b6c5df90298168fc4b990ecc1" + "CVE-2020-8834": { + "cmt_msg": "KVM: PPC: Book3S HV: Factor fake-suspend handling out of kvmppc_save/restore_tm" }, - "CVE-2016-9555": { - "cmt_msg": "sctp: validate chunk len before actually using it", - "cmt_id": "c9e086b9009a1cf189dd96abad95285bc9627624" - } - }, - "4.8.10": { - "CVE-2016-8645": { - "cmt_msg": "tcp: take care of truncations done by sk_filter()", - "cmt_id": "2b5f22e4f7fd208c8d392e5c3755cea1f562cb98" - } - }, - "4.8.11": { - "CVE-2017-12168": { - "cmt_msg": "arm64: KVM: pmu: Fix AArch32 cycle counter access", - "cmt_id": "8d8b37e242decffb789cd86f501100dd881ded10" - } - }, - "4.8.12": { - "CVE-2016-9756": { - "cmt_msg": "KVM: x86: drop error recovery in em_jmp_far and em_ret_far", - "cmt_id": "39b653013527ce0cdff1fc27db5a1b874538387d" + "CVE-2023-52531": { + "cmt_msg": "wifi: iwlwifi: mvm: Fix a memory corruption issue" }, - "CVE-2016-8650": { - "cmt_msg": "mpi: Fix NULL ptr dereference in mpi_powm()", - "cmt_id": "0257b7e20c07e7d1fac3c7e20ef3c01792cef5a3" + "CVE-2023-52532": { + "cmt_msg": "net: mana: Fix TX CQE error handling" }, - "CVE-2016-9777": { - "cmt_msg": "KVM: x86: fix out-of-bounds accesses of rtc_eoi map", - "cmt_id": "c02d13809180bba04cc4ebdf29e3146e808a0eaa" - } - }, - "4.8.13": { - "CVE-2016-10150": { - "cmt_msg": "KVM: use after free in kvm_ioctl_create_device()", - "cmt_id": "6c69476139799ccf8d3e76edfc892c64ced80bc4" - } - }, - "4.8.14": { - "CVE-2016-9793": { - "cmt_msg": "net: avoid signed overflows for SO_{SND|RCV}BUFFORCE", - "cmt_id": "f818e5d86aef49c067296d29f1e277c7ee1713e8" + "CVE-2023-39189": { + "cmt_msg": "netfilter: nfnetlink_osf: avoid OOB read" }, - "CVE-2016-8632": { - "cmt_msg": "tipc: check minimum bearer MTU", - "cmt_id": "4daa2c73eb05aaa93a4409823e2861beb3eb1ed9" + "CVE-2024-26677": { + "cmt_msg": "rxrpc: Fix delayed ACKs to not set the reference serial number" }, - "CVE-2016-10200": { - "cmt_msg": "l2tp: fix racy SOCK_ZAPPED flag check in l2tp_ip{,6}_bind()", - "cmt_id": "84df56749f48aed274bbfd2db6b6fb9dd540ff6b" + "CVE-2020-25211": { + "cmt_msg": "netfilter: ctnetlink: add a range check for l3/l4 protonum" }, - "CVE-2016-8655": { - "cmt_msg": "packet: fix race condition in packet_set_ring", - "cmt_id": "cef222d40f2e22e5938bac009bb5d8b526cc44ef" + "CVE-2020-25212": { + "cmt_msg": "nfs: Fix getxattr kernel panic and memory overflow" }, - "CVE-2016-8399": { - "cmt_msg": "net: ping: check minimum size on ICMP header length", - "cmt_id": "5ff5e5c06c25b91335cc32e25315dbb450b71838" - } - }, - "4.8.15": { - "CVE-2016-10147": { - "cmt_msg": "crypto: mcryptd - Check mcryptd algorithm compatibility", - "cmt_id": "bfef274e4dae76cdee275b5985c85758e346e825" - } - }, - "4.8.16": { - "CVE-2015-8709": { - "cmt_msg": "mm: Add a user_ns owner to mm_struct and fix ptrace permission checks", - "cmt_id": "e45692fa1aea06676449b63ef3c2b6e1e72b7578" - } - }, - "4.8.17": { - "CVE-2016-9588": { - "cmt_msg": "kvm: nVMX: Allow L1 to intercept software exceptions (#BP and #OF)", - "cmt_id": "43983ce75e6119b0ba3249a38f1160805e3d761c" + "CVE-2020-28374": { + "cmt_msg": "scsi: target: Fix XCOPY NAA identifier lookup" }, - "CVE-2016-10088": { - "cmt_msg": "sg_write()/bsg_write() is not fit to be called under KERNEL_DS", - "cmt_id": "48f26edb689c83af15b6afe657e96424ca9d13d9" - } - }, - "outstanding": { - "CVE-2017-5897": { - "cmt_msg": "ip6_gre: fix ip6gre_err() invalid reads" + "CVE-2024-26672": { + "cmt_msg": "drm/amdgpu: Fix variable 'mca_funcs' dereferenced before NULL check in 'amdgpu_mca_smu_get_mca_entry()'" }, - "CVE-2020-10711": { - "cmt_msg": "netlabel: cope with NULL catmap" + "CVE-2024-26671": { + "cmt_msg": "blk-mq: fix IO hang from sbitmap wakeup race" }, - "CVE-2020-35508": { - "cmt_msg": "fork: fix copy_process(CLONE_PARENT) race with the exiting ->real_parent" + "CVE-2024-26679": { + "cmt_msg": "inet: read sk->sk_family once in inet_recv_error()" }, - "CVE-2022-3649": { - "cmt_msg": "nilfs2: fix use-after-free bug of struct nilfs_root" + "CVE-2023-52458": { + "cmt_msg": "block: add check that partition length needs to be aligned with block size" }, - "CVE-2020-35501": { - "cmt_msg": "" + "CVE-2023-52451": { + "cmt_msg": "powerpc/pseries/memhp: Fix access beyond end of drmem array" }, - "CVE-2019-15098": { - "cmt_msg": "ath6kl: fix a NULL-ptr-deref bug in ath6kl_usb_alloc_urb_from_pipe()" + "CVE-2018-9568": { + "cmt_msg": "net: Set sk_prot_creator when cloning sockets to the right proto" }, - "CVE-2020-29368": { - "cmt_msg": "mm: thp: make the THP mapcount atomic against __split_huge_pmd_locked()" + "CVE-2022-0644": { + "cmt_msg": "vfs: check fd has read access in kernel_read_file_from_fd()" }, - "CVE-2017-17806": { - "cmt_msg": "crypto: hmac - require that the underlying hash algorithm is unkeyed" + "CVE-2019-14816": { + "cmt_msg": "mwifiex: Fix three heap overflow at parsing element in cfg80211_ap_settings" }, - "CVE-2023-3611": { - "cmt_msg": "net/sched: sch_qfq: account for stab overhead in qfq_enqueue" + "CVE-2019-14814": { + "cmt_msg": "mwifiex: Fix three heap overflow at parsing element in cfg80211_ap_settings" }, - "CVE-2022-0001": { - "cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE" + "CVE-2024-26700": { + "cmt_msg": "drm/amd/display: Fix MST Null Ptr for RV" }, - "CVE-2020-12464": { - "cmt_msg": "USB: core: Fix free-while-in-use bug in the USB S-Glibrary" + "CVE-2024-26706": { + "cmt_msg": "parisc: Fix random data corruption from exception handler" }, - "CVE-2017-10662": { - "cmt_msg": "f2fs: sanity check segment count" + "CVE-2024-26704": { + "cmt_msg": "ext4: fix double-free of blocks due to wrong extents moved_len" }, - "CVE-2019-19965": { - "cmt_msg": "scsi: libsas: stop discovering if oob mode is disconnected" + "CVE-2020-25672": { + "cmt_msg": "nfc: fix memory leak in llcp_sock_connect()" }, - "CVE-2019-19966": { - "cmt_msg": "media: cpia2: Fix use-after-free in cpia2_exit" + "CVE-2020-25673": { + "cmt_msg": "nfc: Avoid endless loops caused by repeated llcp_sock_connect()" }, - "CVE-2022-1184": { - "cmt_msg": "ext4: verify dir block before splitting it" + "CVE-2020-25670": { + "cmt_msg": "nfc: fix refcount leak in llcp_sock_bind()" }, - "CVE-2020-24587": { - "cmt_msg": "mac80211: prevent mixed key and fragment cache attacks" + "CVE-2020-25671": { + "cmt_msg": "nfc: fix refcount leak in llcp_sock_connect()" }, - "CVE-2020-24586": { - "cmt_msg": "mac80211: prevent mixed key and fragment cache attacks" + "CVE-2019-19813": { + "cmt_msg": "btrfs: inode: Verify inode mode to avoid NULL pointer dereference" }, - "CVE-2017-1000410": { - "cmt_msg": "Bluetooth: Prevent stack info leak from the EFS element." + "CVE-2020-29374": { + "cmt_msg": "gup: document and work around \"COW can break either way\" issue" }, - "CVE-2023-6270": { - "cmt_msg": "" + "CVE-2019-19815": { + "cmt_msg": "f2fs: support swap file w/ DIO" }, - "CVE-2022-3642": { + "CVE-2019-19814": { "cmt_msg": "" }, - "CVE-2021-0129": { - "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical" + "CVE-2020-29371": { + "cmt_msg": "romfs: fix uninitialized memory leak in romfs_dev_read()" }, - "CVE-2019-20096": { - "cmt_msg": "dccp: Fix memleak in __feat_register_sp" + "CVE-2019-19816": { + "cmt_msg": "btrfs: inode: Verify inode mode to avoid NULL pointer dereference" }, - "CVE-2022-47520": { - "cmt_msg": "wifi: wilc1000: validate pairwise and authentication suite offsets" + "CVE-2018-18710": { + "cmt_msg": "cdrom: fix improper type cast, which can leat to information leak." }, - "CVE-2023-42755": { - "cmt_msg": "net/sched: Retire rsvp classifier" + "CVE-2023-34255": { + "cmt_msg": "xfs: verify buffer contents when we skip log replay" }, - "CVE-2023-5717": { - "cmt_msg": "perf: Disallow mis-matched inherited group reads" + "CVE-2022-23040": { + "cmt_msg": "xen/xenbus: don't let xenbus_grant_ring() remove grants in error case" }, - "CVE-2022-3643": { - "cmt_msg": "xen/netback: Ensure protocol headers don't fall in the non-linear area" + "CVE-2023-3141": { + "cmt_msg": "memstick: r592: Fix UAF bug in r592_remove due to race condition" }, - "CVE-2021-38300": { - "cmt_msg": "bpf, mips: Validate conditional branch offsets" + "CVE-2020-12655": { + "cmt_msg": "xfs: add agf freeblocks verify in xfs_agf_verify" }, - "CVE-2018-10940": { - "cmt_msg": "cdrom: information leak in cdrom_ioctl_media_changed()" + "CVE-2022-3524": { + "cmt_msg": "tcp/udp: Fix memory leak in ipv6_renew_options()." }, - "CVE-2022-32250": { - "cmt_msg": "netfilter: nf_tables: disallow non-stateful expression in sets earlier" + "CVE-2022-3523": { + "cmt_msg": "mm/memory.c: fix race when faulting a device private page" }, - "CVE-2018-10087": { - "cmt_msg": "kernel/exit.c: avoid undefined behaviour when calling wait4()" + "CVE-2022-3522": { + "cmt_msg": "mm/hugetlb: use hugetlb_pte_stable in migration race check" }, - "CVE-2021-39634": { - "cmt_msg": "epoll: do not insert into poll queues until all sanity checks are done" + "CVE-2022-3521": { + "cmt_msg": "kcm: avoid potential race in kcm_tx_work" }, - "CVE-2019-9500": { - "cmt_msg": "brcmfmac: assure SSID length from firmware is limited" + "CVE-2018-7755": { + "cmt_msg": "floppy: Do not copy a kernel pointer to user memory in FDGETPRM ioctl" }, - "CVE-2019-19074": { - "cmt_msg": "ath9k: release allocated buffer if timed out" + "CVE-2017-7346": { + "cmt_msg": "drm/vmwgfx: limit the number of mip levels in vmw_gb_surface_define_ioctl()" }, - "CVE-2018-6555": { - "cmt_msg": "staging: irda: remove the irda network stack and drivers" + "CVE-2018-7757": { + "cmt_msg": "scsi: libsas: fix memory leak in sas_smp_get_phy_events()" }, - "CVE-2023-3159": { - "cmt_msg": "firewire: fix potential uaf in outbound_phy_packet_callback()" + "CVE-2022-0330": { + "cmt_msg": "drm/i915: Flush TLBs before releasing backing store" }, - "CVE-2022-0480": { - "cmt_msg": "memcg: enable accounting for file lock caches" + "CVE-2022-4095": { + "cmt_msg": "staging: rtl8712: fix use after free bugs" }, - "CVE-2018-10124": { - "cmt_msg": "kernel/signal.c: avoid undefined behaviour in kill_something_info" + "CVE-2017-10911": { + "cmt_msg": "xen-blkback: don't leak stack data via response ring" }, - "CVE-2022-0487": { - "cmt_msg": "moxart: fix potential use-after-free on remove path" + "CVE-2022-45919": { + "cmt_msg": "media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221" }, - "CVE-2023-52429": { - "cmt_msg": "dm: limit the number of targets and parameter size area" + "CVE-2018-5873": { + "cmt_msg": "nsfs: mark dentry with DCACHE_RCUACCESS" }, - "CVE-2021-28964": { - "cmt_msg": "btrfs: fix race when cloning extent buffer during rewind of an old root" + "CVE-2021-3669": { + "cmt_msg": "ipc: replace costly bailout check in sysvipc_find_ipc()" }, - "CVE-2020-26558": { - "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical" + "CVE-2019-3701": { + "cmt_msg": "can: gw: ensure DLC boundaries after CAN frame modification" }, - "CVE-2021-0920": { - "cmt_msg": "af_unix: fix garbage collect vs MSG_PEEK" + "CVE-2023-1095": { + "cmt_msg": "netfilter: nf_tables: fix null deref due to zeroed list head" }, - "CVE-2023-1249": { - "cmt_msg": "coredump: Use the vma snapshot in fill_files_note" + "CVE-2022-3239": { + "cmt_msg": "media: em28xx: initialize refcount before kref_get" }, - "CVE-2022-23825": { + "CVE-2022-4543": { "cmt_msg": "" }, - "CVE-2022-1974": { - "cmt_msg": "nfc: replace improper check device_is_registered() in netlink related functions" - }, - "CVE-2019-13631": { - "cmt_msg": "Input: gtco - bounds check collection indent level" + "CVE-2017-11089": { + "cmt_msg": "cfg80211: Define nla_policy for NL80211_ATTR_LOCAL_MESH_POWER_MODE" }, - "CVE-2017-7374": { - "cmt_msg": "fscrypt: remove broken support for detecting keyring key revocation" + "CVE-2019-18282": { + "cmt_msg": "net/flow_dissector: switch to siphash" }, - "CVE-2024-26588": { - "cmt_msg": "LoongArch: BPF: Prevent out-of-bounds memory access" + "CVE-2021-34981": { + "cmt_msg": "Bluetooth: cmtp: fix file refcount when cmtp_attach_device fails" }, - "CVE-2023-2162": { - "cmt_msg": "scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress" + "CVE-2018-14625": { + "cmt_msg": "vhost/vsock: fix use-after-free in network stack callers" }, - "CVE-2017-5551": { - "cmt_msg": "tmpfs: clear S_ISGID when setting posix ACLs" + "CVE-2023-4881": { + "cmt_msg": "netfilter: nftables: exthdr: fix 4-byte stack OOB write" }, - "CVE-2024-24857": { + "CVE-2013-7445": { "cmt_msg": "" }, - "CVE-2019-19241": { - "cmt_msg": "io_uring: async workers should inherit the user creds" + "CVE-2024-26804": { + "cmt_msg": "net: ip_tunnel: prevent perpetual headroom growth" }, - "CVE-2022-40307": { - "cmt_msg": "efi: capsule-loader: Fix use-after-free in efi_capsule_write" + "CVE-2022-3303": { + "cmt_msg": "ALSA: pcm: oss: Fix race at SNDCTL_DSP_SYNC" }, - "CVE-2022-21123": { - "cmt_msg": "x86/speculation/mmio: Add mitigation for Processor MMIO Stale Data" + "CVE-2020-12771": { + "cmt_msg": "bcache: fix potential deadlock problem in btree_gc_coalesce" }, - "CVE-2023-3390": { - "cmt_msg": "netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE" + "CVE-2024-0607": { + "cmt_msg": "netfilter: nf_tables: fix pointer math issue in nft_byteorder_eval()" }, - "CVE-2021-28688": { - "cmt_msg": "xen-blkback: don't leak persistent grants from xen_blkbk_map()" + "CVE-2024-26801": { + "cmt_msg": "Bluetooth: Avoid potential use-after-free in hci_error_reset" }, - "CVE-2021-39686": { - "cmt_msg": "binder: use euid from cred instead of using task" + "CVE-2022-28388": { + "cmt_msg": "can: usb_8dev: usb_8dev_start_xmit(): fix double dev_kfree_skb() in error path" }, - "CVE-2021-39685": { - "cmt_msg": "USB: gadget: detect too-big endpoint 0 requests" + "CVE-2018-6412": { + "cmt_msg": "fbdev: Fixing arbitrary kernel leak in case FBIOGETCMAP_SPARC in sbusfb_ioctl_helper()." }, - "CVE-2023-6535": { - "cmt_msg": "" + "CVE-2018-1000004": { + "cmt_msg": "ALSA: seq: Make ioctls race-free" }, - "CVE-2021-43975": { - "cmt_msg": "atlantic: Fix OOB read and write in hw_atl_utils_fw_rpc_wait" + "CVE-2023-52607": { + "cmt_msg": "powerpc/mm: Fix null-pointer dereference in pgtable_cache_add" }, - "CVE-2018-6927": { - "cmt_msg": "futex: Prevent overflow by strengthen input validation" + "CVE-2019-20811": { + "cmt_msg": "net-sysfs: call dev_hold if kobject_init_and_add success" }, - "CVE-2020-0466": { - "cmt_msg": "do_epoll_ctl(): clean the failure exits up a bit" + "CVE-2019-20810": { + "cmt_msg": "media: go7007: fix a miss of snd_card_free" }, - "CVE-2019-10207": { - "cmt_msg": "Bluetooth: hci_uart: check for missing tty operations" + "CVE-2019-20812": { + "cmt_msg": "af_packet: set defaule value for tmo" }, - "CVE-2023-1073": { - "cmt_msg": "HID: check empty report_list in hid_validate_values()" + "CVE-2018-1118": { + "cmt_msg": "vhost: fix info leak due to uninitialized memory" }, - "CVE-2019-14835": { - "cmt_msg": "vhost: make sure log_num < in_num" + "CVE-2019-18660": { + "cmt_msg": "powerpc/book3s64: Fix link stack flush on context switch" }, - "CVE-2023-0459": { - "cmt_msg": "uaccess: Add speculation barrier to copy_from_user()" + "CVE-2019-12380": { + "cmt_msg": "efi/x86/Add missing error handling to old_memmap 1:1 mapping code" }, - "CVE-2023-0458": { - "cmt_msg": "prlimit: do_prlimit needs to have a speculation check" + "CVE-2019-12381": { + "cmt_msg": "ip_sockglue: Fix missing-check bug in ip_ra_control()" }, - "CVE-2018-1000204": { - "cmt_msg": "scsi: sg: allocate with __GFP_ZERO in sg_build_indirect()" + "CVE-2019-12382": { + "cmt_msg": "drm/edid: Fix a missing-check bug in drm_load_edid_firmware()" }, - "CVE-2017-8924": { - "cmt_msg": "USB: serial: io_ti: fix information leak in completion handler" + "CVE-2020-10766": { + "cmt_msg": "x86/speculation: Prevent rogue cross-process SSBD shutdown" }, - "CVE-2017-8925": { - "cmt_msg": "USB: serial: omninet: fix reference leaks at open" + "CVE-2020-10767": { + "cmt_msg": "x86/speculation: Avoid force-disabling IBPB based on STIBP and enhanced IBRS." }, - "CVE-2019-12379": { - "cmt_msg": "consolemap: Fix a memory leaking bug in drivers/tty/vt/consolemap.c" + "CVE-2019-25162": { + "cmt_msg": "i2c: Fix a potential use after free" }, - "CVE-2017-12134": { - "cmt_msg": "xen: fix bio vec merging" + "CVE-2019-25160": { + "cmt_msg": "netlabel: fix out-of-bounds memory accesses" }, - "CVE-2023-0597": { - "cmt_msg": "x86/mm: Randomize per-cpu entry area" + "CVE-2020-10768": { + "cmt_msg": "x86/speculation: PR_SPEC_FORCE_DISABLE enforcement for indirect branches." }, - "CVE-2021-30002": { - "cmt_msg": "media: v4l: ioctl: Fix memory leak in video_usercopy" + "CVE-2020-10769": { + "cmt_msg": "crypto: authenc - fix parsing key with misaligned rta_len" }, - "CVE-2017-17450": { - "cmt_msg": "netfilter: xt_osf: Add missing permission checks" + "CVE-2020-10942": { + "cmt_msg": "vhost: Check docket sk_family instead of call getname" }, - "CVE-2021-0941": { - "cmt_msg": "bpf: Remove MTU check in __bpf_skb_max_len" + "CVE-2020-26139": { + "cmt_msg": "mac80211: do not accept/forward invalid EAPOL frames" }, - "CVE-2017-7294": { - "cmt_msg": "drm/vmwgfx: fix integer overflow in vmw_surface_define_ioctl()" + "CVE-2019-19536": { + "cmt_msg": "can: peak_usb: pcan_usb_pro: Fix info-leaks to USB devices" }, - "CVE-2024-26591": { - "cmt_msg": "bpf: Fix re-attachment branch in bpf_tracing_prog_attach" + "CVE-2019-19537": { + "cmt_msg": "USB: core: Fix races in character device registration and deregistraion" }, - "CVE-2020-15802": { - "cmt_msg": "" + "CVE-2019-19534": { + "cmt_msg": "can: peak_usb: fix slab info leak" }, - "CVE-2024-26594": { - "cmt_msg": "ksmbd: validate mech token in session setup" + "CVE-2019-19535": { + "cmt_msg": "can: peak_usb: pcan_usb_fd: Fix info-leaks to USB devices" }, - "CVE-2023-4623": { - "cmt_msg": "net/sched: sch_hfsc: Ensure inner classes have fsc curve" + "CVE-2020-11565": { + "cmt_msg": "mm: mempolicy: require at least one nodeid for MPOL_PREFERRED" }, - "CVE-2017-18270": { - "cmt_msg": "KEYS: prevent creating a different user's keyrings" + "CVE-2019-19533": { + "cmt_msg": "media: ttusb-dec: Fix info-leak in ttusb_dec_send_command()" }, - "CVE-2022-3636": { - "cmt_msg": "net: ethernet: mtk_eth_soc: use after free in __mtk_ppe_check_skb()" + "CVE-2019-19530": { + "cmt_msg": "usb: cdc-acm: make sure a refcount is taken early enough" }, - "CVE-2022-3635": { - "cmt_msg": "atm: idt77252: fix use-after-free bugs caused by tst_timer" + "CVE-2019-19531": { + "cmt_msg": "usb: yurex: Fix use-after-free in yurex_delete" }, - "CVE-2022-0002": { - "cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE" + "CVE-2017-18257": { + "cmt_msg": "f2fs: fix a dead loop in f2fs_fiemap()" }, - "CVE-2021-34556": { - "cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4" + "CVE-2017-18255": { + "cmt_msg": "perf/core: Fix the perf_cpu_time_max_percent check" }, - "CVE-2020-0543": { - "cmt_msg": "x86/cpu: Add 'table' argument to cpu_matches()" + "CVE-2023-52527": { + "cmt_msg": "ipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data()" }, - "CVE-2022-40982": { - "cmt_msg": "x86/speculation: Add Gather Data Sampling mitigation" + "CVE-2023-3006": { + "cmt_msg": "arm64: Add AMPERE1 to the Spectre-BHB affected list" }, - "CVE-2017-6001": { - "cmt_msg": "perf/core: Fix concurrent sys_perf_event_open() vs. 'move_group' race" + "CVE-2023-52522": { + "cmt_msg": "net: fix possible store tearing in neigh_periodic_work()" }, - "CVE-2022-3202": { - "cmt_msg": "jfs: prevent NULL deref in diFree" + "CVE-2023-52528": { + "cmt_msg": "net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg" }, - "CVE-2018-3646": { - "cmt_msg": "x86/microcode: Allow late microcode loading with SMT disabled" + "CVE-2020-0305": { + "cmt_msg": "chardev: Avoid potential use-after-free in 'chrdev_open()'" }, - "CVE-2017-7518": { - "cmt_msg": "KVM: x86: fix singlestepping over syscall" + "CVE-2023-39198": { + "cmt_msg": "drm/qxl: fix UAF on handle creation" }, - "CVE-2019-9213": { - "cmt_msg": "mm: enforce min addr even if capable() in expand_downwards()" + "CVE-2023-39194": { + "cmt_msg": "net: xfrm: Fix xfrm_address_filter OOB read" }, - "CVE-2021-28712": { - "cmt_msg": "xen/netfront: harden netfront against event channel storms" + "CVE-2023-39197": { + "cmt_msg": "netfilter: conntrack: dccp: copy entire header to stack buffer, not just basic one" }, - "CVE-2024-24861": { - "cmt_msg": "" + "CVE-2023-39193": { + "cmt_msg": "netfilter: xt_sctp: validate the flag_info count" }, - "CVE-2017-17558": { - "cmt_msg": "USB: core: prevent malicious bNumInterfaces overflow" + "CVE-2023-39192": { + "cmt_msg": "netfilter: xt_u32: validate user space input" }, - "CVE-2019-11477": { - "cmt_msg": "tcp: limit payload size of sacked skbs" + "CVE-2024-26600": { + "cmt_msg": "phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP" }, - "CVE-2021-28711": { - "cmt_msg": "xen/blkfront: harden blkfront against event channel storms" + "CVE-2024-26606": { + "cmt_msg": "binder: signal epoll threads of self-work" }, - "CVE-2017-7895": { - "cmt_msg": "nfsd: stricter decoding of write-like NFSv2/v3 ops" + "CVE-2017-14156": { + "cmt_msg": "video: fbdev: aty: do not leak uninitialized padding in clk to userspace" }, - "CVE-2018-14614": { - "cmt_msg": "f2fs: fix to do sanity check with cp_pack_start_sum" + "CVE-2023-52429": { + "cmt_msg": "dm: limit the number of targets and parameter size area" }, - "CVE-2018-14617": { - "cmt_msg": "hfsplus: fix NULL dereference in hfsplus_lookup()" + "CVE-2022-1652": { + "cmt_msg": "floppy: use a statically allocated error counter" }, - "CVE-2018-14616": { - "cmt_msg": "f2fs: fix to do sanity check with block address in main area v2" + "CVE-2020-29568": { + "cmt_msg": "xen/xenbus: Allow watches discard events before queueing" }, - "CVE-2018-14611": { - "cmt_msg": "btrfs: validate type when reading a chunk" + "CVE-2016-8660": { + "cmt_msg": "" }, - "CVE-2018-14610": { - "cmt_msg": "btrfs: Check that each block group has corresponding chunk at mount time" + "CVE-2020-14314": { + "cmt_msg": "ext4: fix potential negative array index in do_split()" }, - "CVE-2018-14613": { - "cmt_msg": "btrfs: tree-checker: Verify block_group_item" + "CVE-2019-13272": { + "cmt_msg": "ptrace: Fix ->ptracer_cred handling for PTRACE_TRACEME" }, - "CVE-2018-14612": { - "cmt_msg": "btrfs: tree-checker: Detect invalid and empty essential trees" + "CVE-2022-1786": { + "cmt_msg": "io_uring: remove io_identity" }, - "CVE-2020-26145": { - "cmt_msg": "ath10k: drop fragments with multicast DA for PCIe" + "CVE-2020-25669": { + "cmt_msg": "Input: sunkbd - avoid use-after-free in teardown paths" }, - "CVE-2017-13216": { - "cmt_msg": "staging: android: ashmem: fix a race condition in ASHMEM_SET_SIZE ioctl" + "CVE-2020-25668": { + "cmt_msg": "tty: make FONTX ioctl use the tty pointer they were actually passed" }, - "CVE-2020-26147": { - "cmt_msg": "mac80211: assure all fragments are encrypted" + "CVE-2008-4609": { + "cmt_msg": "" }, - "CVE-2018-5814": { - "cmt_msg": "usbip: usbip_host: fix NULL-ptr deref and use-after-free errors" + "CVE-2022-0435": { + "cmt_msg": "tipc: improve size validations for received domain records" }, - "CVE-2020-26140": { - "cmt_msg": "" + "CVE-2023-26607": { + "cmt_msg": "ntfs: fix out-of-bounds read in ntfs_attr_find()" }, - "CVE-2020-26143": { - "cmt_msg": "" + "CVE-2021-4037": { + "cmt_msg": "xfs: fix up non-directory creation in SGID directories" }, - "CVE-2020-26142": { - "cmt_msg": "" + "CVE-2021-22543": { + "cmt_msg": "KVM: do not allow mapping valid but non-reference-counted pages" }, - "CVE-2019-17053": { - "cmt_msg": "ieee802154: enforce CAP_NET_RAW for raw sockets" + "CVE-2018-18386": { + "cmt_msg": "n_tty: fix EXTPROC vs ICANON interaction with TIOCINQ (aka FIONREAD)" }, - "CVE-2019-17052": { - "cmt_msg": "ax25: enforce CAP_NET_RAW for raw sockets" + "CVE-2021-47169": { + "cmt_msg": "serial: rp2: use 'request_firmware' instead of 'request_firmware_nowait'" }, - "CVE-2017-14497": { - "cmt_msg": "packet: Don't write vnet header beyond end of buffer" + "CVE-2016-8405": { + "cmt_msg": "fbdev: color map copying bounds checking" }, - "CVE-2020-27418": { - "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region" + "CVE-2023-3776": { + "cmt_msg": "net/sched: cls_fw: Fix improper refcount update leads to use-after-free" }, - "CVE-2019-17056": { - "cmt_msg": "nfc: enforce CAP_NET_RAW for raw sockets" + "CVE-2017-9242": { + "cmt_msg": "ipv6: fix out of bound writes in __ip6_append_data()" }, - "CVE-2019-17055": { - "cmt_msg": "mISDN: enforce CAP_NET_RAW for raw sockets" + "CVE-2023-3772": { + "cmt_msg": "xfrm: add NULL check in xfrm_update_ae_params" }, - "CVE-2019-17054": { - "cmt_msg": "appletalk: enforce CAP_NET_RAW for raw sockets" + "CVE-2022-3533": { + "cmt_msg": "" }, - "CVE-2018-13093": { - "cmt_msg": "xfs: validate cached inodes are free when allocated" + "CVE-2022-3534": { + "cmt_msg": "libbpf: Fix use-after-free in btf_dump_name_dups" }, - "CVE-2017-2618": { - "cmt_msg": "selinux: fix off-by-one in setprocattr" + "CVE-2021-4149": { + "cmt_msg": "btrfs: unlock newly allocated extent buffer after error" }, - "CVE-2023-51781": { - "cmt_msg": "appletalk: Fix Use-After-Free in atalk_ioctl" + "CVE-2022-21385": { + "cmt_msg": "net/rds: fix warn in rds_message_alloc_sgs" }, - "CVE-2018-13096": { - "cmt_msg": "f2fs: fix to do sanity check with node footer and iblocks" + "CVE-2021-47180": { + "cmt_msg": "NFC: nci: fix memory leak in nci_allocate_device" }, - "CVE-2018-13097": { - "cmt_msg": "f2fs: fix to do sanity check with user_block_count" + "CVE-2020-28097": { + "cmt_msg": "vgacon: remove software scrollback support" }, - "CVE-2018-13094": { - "cmt_msg": "xfs: don't call xfs_da_shrink_inode with NULL bp" + "CVE-2017-7533": { + "cmt_msg": "dentry name snapshots" }, - "CVE-2018-13095": { - "cmt_msg": "xfs: More robust inode extent count validation" + "CVE-2018-8897": { + "cmt_msg": "x86/entry/64: Don't use IST entry for #BP stack" }, - "CVE-2020-29661": { - "cmt_msg": "tty: Fix ->pgrp locking in tiocspgrp()" + "CVE-2020-14416": { + "cmt_msg": "can, slip: Protect tty->disc_data in write_wakeup and close with RCU" }, - "CVE-2020-29660": { - "cmt_msg": "tty: Fix ->session locking" + "CVE-2021-46928": { + "cmt_msg": "parisc: Clear stale IIR value on instruction access rights trap" }, - "CVE-2018-13098": { - "cmt_msg": "f2fs: fix to do sanity check with extra_attr feature" + "CVE-2018-14634": { + "cmt_msg": "exec: Limit arg stack to at most 75% of _STK_LIM" }, - "CVE-2018-13099": { - "cmt_msg": "f2fs: fix to do sanity check with reserved blkaddr of inline inode" + "CVE-2018-14633": { + "cmt_msg": "scsi: target: iscsi: Use hex2bin instead of a re-implementation" }, - "CVE-2022-1734": { - "cmt_msg": "nfc: nfcmrvl: main: reorder destructive operations in nfcmrvl_nci_unregister_dev to avoid bugs" + "CVE-2021-46924": { + "cmt_msg": "NFC: st21nfca: Fix memory leak in device probe and remove" }, - "CVE-2017-15951": { - "cmt_msg": "KEYS: Fix race between updating and finding a negative key" + "CVE-2021-46926": { + "cmt_msg": "ALSA: hda: intel-sdw-acpi: harden detection of controller" }, - "CVE-2023-28772": { - "cmt_msg": "seq_buf: Fix overflow in seq_buf_putmem_hex()" + "CVE-2016-9755": { + "cmt_msg": "netfilter: ipv6: nf_defrag: drop mangled skb on ream error" }, - "CVE-2019-14895": { - "cmt_msg": "mwifiex: fix possible heap overflow in mwifiex_process_country_ie()" + "CVE-2017-2636": { + "cmt_msg": "tty: n_hdlc: get rid of racy n_hdlc.tbuf" }, - "CVE-2022-24448": { - "cmt_msg": "NFSv4: Handle case where the lookup of a directory fails" + "CVE-2023-1206": { + "cmt_msg": "tcp: Reduce chance of collisions in inet6_hashfn()." }, - "CVE-2019-11884": { - "cmt_msg": "Bluetooth: hidp: fix buffer overflow" + "CVE-2022-3649": { + "cmt_msg": "nilfs2: fix use-after-free bug of struct nilfs_root" }, - "CVE-2020-15780": { - "cmt_msg": "ACPI: configfs: Disallow loading ACPI tables when locked down" + "CVE-2022-3646": { + "cmt_msg": "nilfs2: fix leak of nilfs_root in case of writer thread creation failure" }, - "CVE-2016-10764": { - "cmt_msg": "mtd: spi-nor: Off by one in cqspi_setup_flash()" + "CVE-2022-3642": { + "cmt_msg": "" }, - "CVE-2019-18683": { - "cmt_msg": "media: vivid: Fix wrong locking that causes race conditions on streaming stop" + "CVE-2022-3643": { + "cmt_msg": "xen/netback: Ensure protocol headers don't fall in the non-linear area" }, - "CVE-2022-2503": { - "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag" + "CVE-2021-1048": { + "cmt_msg": "fix regression in \"epoll: Keep a reference on files added to the check list\"" }, - "CVE-2022-48619": { - "cmt_msg": "Input: add bounds checking to input_set_capability()" + "CVE-2020-0543": { + "cmt_msg": "x86/cpu: Add 'table' argument to cpu_matches()" }, - "CVE-2019-18680": { - "cmt_msg": "unknown" + "CVE-2024-25739": { + "cmt_msg": "" }, - "CVE-2022-23038": { - "cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()" + "CVE-2023-6535": { + "cmt_msg": "" }, - "CVE-2017-6074": { - "cmt_msg": "dccp: fix freeing skb too early for IPV6_RECVPKTINFO" + "CVE-2023-6536": { + "cmt_msg": "nvmet-tcp: fix a crash in nvmet_req_complete()" + }, + "CVE-2020-15780": { + "cmt_msg": "ACPI: configfs: Disallow loading ACPI tables when locked down" }, "CVE-2019-11815": { "cmt_msg": "net: rds: force to destroy connection if t_sock is NULL in rds_tcp_kill_sock()." }, - "CVE-2022-20158": { - "cmt_msg": "net/packet: fix slab-out-of-bounds access in packet_recvmsg()" - }, - "CVE-2022-23037": { - "cmt_msg": "xen/netfront: don't use gnttab_query_foreign_access() for mapped status" + "CVE-2022-36280": { + "cmt_msg": "drm/vmwgfx: Validate the box size for the snooped cursor" }, - "CVE-2023-20588": { - "cmt_msg": "x86/CPU/AMD: Do not leak quotient data after a division by 0" + "CVE-2024-21803": { + "cmt_msg": "" }, - "CVE-2017-5669": { - "cmt_msg": "ipc/shm: Fix shmat mmap nil-page protection" + "CVE-2018-7995": { + "cmt_msg": "x86/MCE: Serialize sysfs changes" }, - "CVE-2019-15924": { - "cmt_msg": "fm10k: Fix a potential NULL pointer dereference" + "CVE-2018-16276": { + "cmt_msg": "USB: yurex: fix out-of-bounds uaccess in read handler" }, - "CVE-2019-15538": { - "cmt_msg": "xfs: fix missing ILOCK unlock when xfs_setattr_nonsize fails due to EDQUOT" + "CVE-2023-2176": { + "cmt_msg": "RDMA/core: Refactor rdma_bind_addr" }, - "CVE-2019-15926": { - "cmt_msg": "ath6kl: add some bounds checking" + "CVE-2019-16413": { + "cmt_msg": "9p: use inode->i_lock to protect i_size_write() under 32-bit" }, - "CVE-2019-14821": { - "cmt_msg": "KVM: coalesced_mmio: add bounds checking" + "CVE-2019-7222": { + "cmt_msg": "KVM: x86: work around leak of uninitialized stack contents (CVE-2019-7222)" }, - "CVE-2020-12826": { - "cmt_msg": "signal: Extend exec_id to 64bits" + "CVE-2019-7221": { + "cmt_msg": "KVM: nVMX: unconditionally cancel preemption timer in free_nested (CVE-2019-7221)" }, - "CVE-2019-3701": { - "cmt_msg": "can: gw: ensure DLC boundaries after CAN frame modification" + "CVE-2020-10773": { + "cmt_msg": "s390/cmm: fix information leak in cmm_timeout_handler()" }, - "CVE-2021-42008": { - "cmt_msg": "net: 6pack: fix slab-out-of-bounds in decode_data" + "CVE-2020-36780": { + "cmt_msg": "i2c: sprd: fix reference leak when pm_runtime_get_sync fails" }, - "CVE-2022-39188": { - "cmt_msg": "mmu_gather: Force tlb-flush VM_PFNMAP vmas" + "CVE-2018-18281": { + "cmt_msg": "mremap: properly flush TLB before releasing the page" }, - "CVE-2018-9465": { - "cmt_msg": "binder: fix proc->files use-after-free" + "CVE-2022-2663": { + "cmt_msg": "netfilter: nf_conntrack_irc: Fix forged IP logic" }, - "CVE-2019-1125": { - "cmt_msg": "x86/speculation: Prepare entry code for Spectre v1 swapgs mitigations" + "CVE-2024-26803": { + "cmt_msg": "net: veth: clear GRO when clearing XDP even when down" }, - "CVE-2019-15218": { - "cmt_msg": "media: usb: siano: Fix general protection fault in smsusb" + "CVE-2020-25643": { + "cmt_msg": "hdlc_ppp: add range checks in ppp_cp_parse_cr()" }, - "CVE-2019-15666": { - "cmt_msg": "xfrm: policy: Fix out-of-bound array accesses in __xfrm_policy_unlink" + "CVE-2020-4788": { + "cmt_msg": "powerpc/64s: flush L1D on kernel entry" }, - "CVE-2020-25641": { - "cmt_msg": "block: allow for_each_bvec to support zero len bvec" + "CVE-2021-39698": { + "cmt_msg": "wait: add wake_up_pollfree()" }, - "CVE-2005-3660": { - "cmt_msg": "" + "CVE-2018-5333": { + "cmt_msg": "RDS: null pointer dereference in rds_atomic_free_op" }, - "CVE-2017-14106": { - "cmt_msg": "tcp: initialize rcv_mss to TCP_MIN_MSS instead of 0" + "CVE-2018-5332": { + "cmt_msg": "RDS: Heap OOB write in rds_message_alloc_sgs()" }, - "CVE-2019-15212": { - "cmt_msg": "USB: rio500: refuse more than one device at a time" + "CVE-2021-3759": { + "cmt_msg": "memcg: enable accounting of ipc resources" }, - "CVE-2019-15211": { - "cmt_msg": "media: radio-raremono: change devm_k*alloc to k*alloc" + "CVE-2019-19528": { + "cmt_msg": "USB: iowarrior: fix use-after-free on disconnect" }, - "CVE-2023-1095": { - "cmt_msg": "netfilter: nf_tables: fix null deref due to zeroed list head" + "CVE-2017-17448": { + "cmt_msg": "netfilter: nfnetlink_cthelper: Add missing permission checks" }, - "CVE-2015-1350": { - "cmt_msg": "fs: Avoid premature clearing of capabilities" + "CVE-2017-17449": { + "cmt_msg": "netlink: Add netns check on taps" }, - "CVE-2019-14896": { - "cmt_msg": "libertas: Fix two buffer overflows at parsing bss descriptor" + "CVE-2019-19525": { + "cmt_msg": "ieee802154: atusb: fix use-after-free at disconnect" }, - "CVE-2017-1000380": { - "cmt_msg": "ALSA: timer: Fix race between read and ioctl" + "CVE-2019-19524": { + "cmt_msg": "Input: ff-memless - kill timer in destroy()" }, - "CVE-2019-15214": { - "cmt_msg": "ALSA: core: Fix card races between register and disconnect" + "CVE-2019-19527": { + "cmt_msg": "HID: hiddev: do cleanup in failure of opening a device" }, - "CVE-2020-24588": { - "cmt_msg": "cfg80211: mitigate A-MSDU aggregation attacks" + "CVE-2021-3753": { + "cmt_msg": "vt_kdsetmode: extend console locking" }, - "CVE-2021-33034": { - "cmt_msg": "Bluetooth: verify AMP hci_chan before amp_destroy" + "CVE-2021-3752": { + "cmt_msg": "Bluetooth: fix use-after-free error in lock_sock_nested()" }, - "CVE-2019-19922": { - "cmt_msg": "sched/fair: Fix low cpu usage with high throttling by removing expiration of cpu-local slices" + "CVE-2023-7192": { + "cmt_msg": "netfilter: ctnetlink: fix possible refcount leak in ctnetlink_create_conntrack()" }, - "CVE-2021-33033": { - "cmt_msg": "cipso,calipso: resolve a number of problems with the DOI refcounts" + "CVE-2017-18249": { + "cmt_msg": "f2fs: fix race condition in between free nid allocator/initializer" }, - "CVE-2019-19927": { - "cmt_msg": "drm/ttm: fix incrementing the page pointer for huge pages" + "CVE-2022-1263": { + "cmt_msg": "KVM: avoid NULL pointer dereference in kvm_dirty_ring_push" }, - "CVE-2017-18509": { - "cmt_msg": "ipv6: check sk sk_type and protocol early in ip_mroute_set/getsockopt" + "CVE-2017-18241": { + "cmt_msg": "f2fs: fix a panic caused by NULL flush_cmd_control" }, - "CVE-2017-5986": { - "cmt_msg": "sctp: avoid BUG_ON on sctp_wait_for_sndbuf" + "CVE-2021-41864": { + "cmt_msg": "bpf: Fix integer overflow in prealloc_elems_and_freelist()" }, - "CVE-2022-44032": { - "cmt_msg": "char: pcmcia: remove all the drivers" + "CVE-2019-15215": { + "cmt_msg": "media: cpia2_usb: first wake up, then free in disconnect" }, - "CVE-2024-23307": { + "CVE-2022-2209": { "cmt_msg": "" }, - "CVE-2020-8648": { - "cmt_msg": "vt: selection, close sel_buffer race" - }, - "CVE-2022-32296": { - "cmt_msg": "tcp: increase source port perturb table to 2^16" + "CVE-2023-7042": { + "cmt_msg": "wifi: ath10k: fix NULL pointer dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev()" }, - "CVE-2017-11600": { - "cmt_msg": "xfrm: policy: check policy direction value" + "CVE-2023-52559": { + "cmt_msg": "iommu/vt-d: Avoid memory allocation in iommu_suspend()" }, - "CVE-2023-3567": { - "cmt_msg": "vc_screen: move load of struct vc_data pointer in vcs_read() to avoid UAF" + "CVE-2023-47233": { + "cmt_msg": "wifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach" }, - "CVE-2019-20806": { - "cmt_msg": "media: tw5864: Fix possible NULL pointer dereference in tw5864_handle_frame" + "CVE-2022-1462": { + "cmt_msg": "tty: use new tty_insert_flip_string_and_push_buffer() in pty_write()" }, - "CVE-2022-3028": { - "cmt_msg": "af_key: Do not call xfrm_probe_algs in parallel" + "CVE-2024-26614": { + "cmt_msg": "tcp: make sure init the accept_queue's spinlocks once" }, - "CVE-2019-2181": { - "cmt_msg": "binder: check for overflow when alloc for security context" + "CVE-2019-20636": { + "cmt_msg": "Input: add safety guards to input_set_keycode()" }, - "CVE-2020-14304": { - "cmt_msg": "" + "CVE-2023-52435": { + "cmt_msg": "net: prevent mss overflow in skb_segment()" }, - "CVE-2010-5321": { - "cmt_msg": "" + "CVE-2023-52434": { + "cmt_msg": "smb: client: fix potential OOBs in smb2_parse_contexts()" }, - "CVE-2020-15393": { - "cmt_msg": "usb: usbtest: fix missing kfree(dev->buf) in usbtest_disconnect" + "CVE-2023-52436": { + "cmt_msg": "f2fs: explicitly null-terminate the xattr list" }, - "CVE-2022-33981": { - "cmt_msg": "floppy: disable FDRAWCMD by default" + "CVE-2023-51779": { + "cmt_msg": "Bluetooth: af_bluetooth: Fix Use-After-Free in bt_sock_recvmsg" }, - "CVE-2021-3564": { - "cmt_msg": "Bluetooth: fix the erroneous flush_work() order" + "CVE-2018-10877": { + "cmt_msg": "ext4: verify the depth of extent tree in ext4_find_extent()" }, - "CVE-2019-9506": { - "cmt_msg": "Bluetooth: Fix faulty expression for minimum encryption key size check" + "CVE-2018-10876": { + "cmt_msg": "ext4: only look at the bg_flags field if it is valid" }, - "CVE-2023-1476": { + "CVE-2010-4563": { "cmt_msg": "" }, - "CVE-2017-16995": { - "cmt_msg": "bpf: fix incorrect sign extension in check_alu_op()" + "CVE-2023-2162": { + "cmt_msg": "scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress" }, - "CVE-2017-16994": { - "cmt_msg": "mm/pagewalk.c: report holes in hugetlb ranges" + "CVE-2018-10879": { + "cmt_msg": "ext4: make sure bitmaps and the inode table don't overlap with bg descriptors" }, - "CVE-2019-2025": { - "cmt_msg": "binder: fix race that allows malicious free of live buffer" + "CVE-2019-14835": { + "cmt_msg": "vhost: make sure log_num < in_num" }, - "CVE-2017-2583": { - "cmt_msg": "KVM: x86: fix emulation of \"MOV SS, null selector\"" + "CVE-2023-4622": { + "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES" }, - "CVE-2020-26560": { - "cmt_msg": "" + "CVE-2023-4623": { + "cmt_msg": "net/sched: sch_hfsc: Ensure inner classes have fsc curve" }, - "CVE-2017-2584": { - "cmt_msg": "KVM: x86: Introduce segmented_write_std" + "CVE-2019-0146": { + "cmt_msg": "i40e: add num_vectors checker in iwarp handler" }, - "CVE-2023-39198": { - "cmt_msg": "drm/qxl: fix UAF on handle creation" + "CVE-2021-38300": { + "cmt_msg": "bpf, mips: Validate conditional branch offsets" }, - "CVE-2017-13080": { - "cmt_msg": "mac80211: accept key reinstall without changing anything" + "CVE-2020-25656": { + "cmt_msg": "vt: keyboard, extend func_buf_lock to readers" }, - "CVE-2021-20321": { - "cmt_msg": "ovl: fix missing negative dentry check in ovl_rename()" + "CVE-2021-4023": { + "cmt_msg": "io-wq: fix cancellation on create-worker failure" }, - "CVE-2019-9503": { - "cmt_msg": "brcmfmac: add subtype check for event handling in data path" + "CVE-2019-0145": { + "cmt_msg": "i40e: add num_vectors checker in iwarp handler" }, - "CVE-2018-12127": { - "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" + "CVE-2021-22555": { + "cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write" + }, + "CVE-2023-3161": { + "cmt_msg": "fbcon: Check font dimension limits" + }, + "CVE-2018-7191": { + "cmt_msg": "tun: call dev_get_valid_name() before register_netdevice()" + }, + "CVE-2018-10675": { + "cmt_msg": "mm/mempolicy: fix use after free when calling get_mempolicy" }, - "CVE-2018-12126": { - "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" + "CVE-2017-0786": { + "cmt_msg": "brcmfmac: add length check in brcmf_cfg80211_escan_handler()" }, - "CVE-2022-23816": { - "cmt_msg": "x86/kvm/vmx: Make noinstr clean" + "CVE-2021-47082": { + "cmt_msg": "tun: avoid double free in tun_free_netdev" }, - "CVE-2020-36158": { - "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_cmd_802_11_ad_hoc_start" + "CVE-2021-47083": { + "cmt_msg": "pinctrl: mediatek: fix global-out-of-bounds issue" }, - "CVE-2017-9077": { - "cmt_msg": "ipv6/dccp: do not inherit ipv6_mc_list from parent" + "CVE-2021-31916": { + "cmt_msg": "dm ioctl: fix out of bounds array access when no devices" }, - "CVE-2017-9076": { - "cmt_msg": "ipv6/dccp: do not inherit ipv6_mc_list from parent" + "CVE-2021-47086": { + "cmt_msg": "phonet/pep: refuse to enable an unbound pipe" }, - "CVE-2017-9075": { - "cmt_msg": "sctp: do not inherit ipv6_{mc|ac|fl}_list from parent" + "CVE-2023-32269": { + "cmt_msg": "netrom: Fix use-after-free caused by accept on already connected socket" }, - "CVE-2017-9074": { - "cmt_msg": "ipv6: Prevent overrun when parsing v6 header options" + "CVE-2021-4157": { + "cmt_msg": "pNFS/flexfiles: fix incorrect size check in decode_nfs_fh()" }, - "CVE-2022-20572": { - "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag" + "CVE-2021-4155": { + "cmt_msg": "xfs: map unwritten blocks in XFS_IOC_{ALLOC,FREE}SP just like fallocate" }, - "CVE-2018-10021": { - "cmt_msg": "scsi: libsas: defer ata device eh commands to libata" + "CVE-2021-4150": { + "cmt_msg": "block: fix incorrect references to disk objects" }, - "CVE-2022-20132": { - "cmt_msg": "HID: add hid_is_usb() function to make it simpler for USB detection" + "CVE-2021-4159": { + "cmt_msg": "bpf: Verifer, adjust_scalar_min_max_vals to always call update_reg_bounds()" }, - "CVE-2019-2024": { - "cmt_msg": "media: em28xx: Fix use-after-free when disconnecting" + "CVE-2021-29154": { + "cmt_msg": "bpf, x86: Validate computation of branch displacements for x86-64" }, - "CVE-2023-39194": { - "cmt_msg": "net: xfrm: Fix xfrm_address_filter OOB read" + "CVE-2021-29155": { + "cmt_msg": "bpf: Use correct permission flag for mixed signed bounds arithmetic" }, - "CVE-2020-0067": { - "cmt_msg": "f2fs: fix to avoid memory leakage in f2fs_listxattr" + "CVE-2018-10902": { + "cmt_msg": "ALSA: rawmidi: Change resized buffers atomically" }, - "CVE-2019-10126": { - "cmt_msg": "mwifiex: Fix heap overflow in mwifiex_uap_parse_tail_ies()" + "CVE-2022-25375": { + "cmt_msg": "usb: gadget: rndis: check size of RNDIS_MSG_SET command" }, - "CVE-2019-10124": { - "cmt_msg": "mm: hwpoison: fix thp split handing in soft_offline_in_use_page()" + "CVE-2021-47158": { + "cmt_msg": "net: dsa: sja1105: add error handling in sja1105_setup()" }, - "CVE-2020-14353": { - "cmt_msg": "KEYS: prevent creating a different user's keyrings" + "CVE-2021-47159": { + "cmt_msg": "net: dsa: fix a crash if ->get_sset_count() fails" }, - "CVE-2020-13974": { - "cmt_msg": "vt: keyboard: avoid signed integer overflow in k_ascii" + "CVE-2021-47153": { + "cmt_msg": "i2c: i801: Don't generate an interrupt on bus reset" }, - "CVE-2016-6213": { - "cmt_msg": "mnt: Add a per mount namespace limit on the number of mounts" + "CVE-2021-47150": { + "cmt_msg": "net: fec: fix the potential memory leak in fec_enet_init()" }, - "CVE-2021-4083": { - "cmt_msg": "fget: check that the fd still exists after getting a ref to it" + "CVE-2021-47151": { + "cmt_msg": "interconnect: qcom: bcm-voter: add a missing of_node_put()" }, - "CVE-2023-33288": { - "cmt_msg": "power: supply: bq24190: Fix use after free bug in bq24190_remove due to race condition" + "CVE-2021-46936": { + "cmt_msg": "net: fix use-after-free in tw_timer_handler" }, - "CVE-2018-10938": { - "cmt_msg": "Cipso: cipso_v4_optptr enter infinite loop" + "CVE-2021-46933": { + "cmt_msg": "usb: gadget: f_fs: Clear ffs_eventfd in ffs_data_clear." }, - "CVE-2017-1000251": { - "cmt_msg": "Bluetooth: Properly check L2CAP config option output buffer length" + "CVE-2021-46932": { + "cmt_msg": "Input: appletouch - initialize work before device registration" }, - "CVE-2017-1000252": { - "cmt_msg": "KVM: VMX: Do not BUG() on out-of-bounds guest IRQ" + "CVE-2021-46939": { + "cmt_msg": "tracing: Restructure trace_clock_global() to never block" }, - "CVE-2022-29901": { - "cmt_msg": "x86/kvm/vmx: Make noinstr clean" + "CVE-2021-46938": { + "cmt_msg": "dm rq: fix double free of blk_mq_tag_set in dev remove after table load fails" }, - "CVE-2021-4197": { - "cmt_msg": "cgroup: Use open-time credentials for process migraton perm checks" + "CVE-2018-16862": { + "cmt_msg": "mm: cleancache: fix corruption on missed inode invalidation" }, - "CVE-2018-12233": { - "cmt_msg": "jfs: Fix inconsistency between memory allocation and ea_buf->max_size" + "CVE-2024-26623": { + "cmt_msg": "pds_core: Prevent race issues involving the adminq" }, - "CVE-2019-19227": { - "cmt_msg": "appletalk: Fix potential NULL pointer dereference in unregister_snap_client" + "CVE-2018-16884": { + "cmt_msg": "sunrpc: use-after-free in svc_process_common()" }, - "CVE-2020-10751": { - "cmt_msg": "selinux: properly handle multiple messages in selinux_netlink_send()" + "CVE-2022-45885": { + "cmt_msg": "" }, - "CVE-2022-3567": { - "cmt_msg": "ipv6: Fix data races around sk->sk_prot." + "CVE-2022-45884": { + "cmt_msg": "" }, - "CVE-2023-39192": { - "cmt_msg": "netfilter: xt_u32: validate user space input" + "CVE-2022-45887": { + "cmt_msg": "media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb()" }, - "CVE-2022-23042": { - "cmt_msg": "xen/netfront: react properly to failing gnttab_end_foreign_access_ref()" + "CVE-2022-45886": { + "cmt_msg": "media: dvb-core: Fix use-after-free due on race condition at dvb_net" }, - "CVE-2020-10757": { - "cmt_msg": "mm: Fix mremap not considering huge pmd devmap" + "CVE-2024-25744": { + "cmt_msg": "x86/coco: Disable 32-bit emulation by default on TDX and SEV" }, - "CVE-2018-20511": { - "cmt_msg": "net/appletalk: fix minor pointer leak to userspace in SIOCFINDIPDDPRT" + "CVE-2015-2877": { + "cmt_msg": "" }, - "CVE-2018-20510": { - "cmt_msg": "binder: replace \"%p\" with \"%pK\"" + "CVE-2023-37454": { + "cmt_msg": "" }, - "CVE-2020-15437": { - "cmt_msg": "serial: 8250: fix null-ptr-deref in serial8250_start_tx()" + "CVE-2018-1130": { + "cmt_msg": "dccp: check sk for closed state in dccp_sendmsg()" }, - "CVE-2020-15436": { - "cmt_msg": "block: Fix use-after-free in blkdev_get()" + "CVE-2021-45486": { + "cmt_msg": "inet: use bigger hash table for IP ID generation" }, - "CVE-2022-1116": { - "cmt_msg": "" + "CVE-2021-3506": { + "cmt_msg": "f2fs: fix to avoid out-of-bounds memory access" }, - "CVE-2021-28660": { - "cmt_msg": "staging: rtl8188eu: prevent ->ssid overflow in rtw_wx_set_scan()" + "CVE-2020-14331": { + "cmt_msg": "vgacon: Fix for missing check in scrollback handling" }, - "CVE-2024-0775": { - "cmt_msg": "ext4: improve error recovery code paths in __ext4_remount()" + "CVE-2022-36123": { + "cmt_msg": "x86: Clear .brk area at early boot" }, - "CVE-2020-8647": { - "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region" + "CVE-2019-19532": { + "cmt_msg": "HID: Fix assumption that devices have inputs" }, - "CVE-2019-0155": { - "cmt_msg": "drm/i915: Rename gen7 cmdparser tables" + "CVE-2020-36558": { + "cmt_msg": "vt: vt_ioctl: fix race in VT_RESIZEX" }, - "CVE-2019-0154": { - "cmt_msg": "drm/i915: Lower RM timeout to avoid DSI hard hangs" + "CVE-2018-13100": { + "cmt_msg": "f2fs: fix to do sanity check with secs_per_zone" }, - "CVE-2023-35827": { - "cmt_msg": "ravb: Fix use-after-free issue in ravb_tx_timeout_work()" + "CVE-2017-5897": { + "cmt_msg": "ip6_gre: fix ip6gre_err() invalid reads" }, - "CVE-2020-36386": { - "cmt_msg": "Bluetooth: Fix slab-out-of-bounds read in hci_extended_inquiry_result_evt()" + "CVE-2017-6074": { + "cmt_msg": "dccp: fix freeing skb too early for IPV6_RECVPKTINFO" }, - "CVE-2017-6348": { - "cmt_msg": "irda: Fix lockdep annotations in hashbin_delete()." + "CVE-2020-36158": { + "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_cmd_802_11_ad_hoc_start" }, - "CVE-2022-3566": { - "cmt_msg": "tcp: Fix data races around icsk->icsk_af_ops." + "CVE-2022-40307": { + "cmt_msg": "efi: capsule-loader: Fix use-after-free in efi_capsule_write" }, - "CVE-2022-3565": { - "cmt_msg": "mISDN: fix use-after-free bugs in l1oip timer handlers" + "CVE-2021-39686": { + "cmt_msg": "binder: use euid from cred instead of using task" }, - "CVE-2022-3564": { - "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free caused by l2cap_reassemble_sdu" + "CVE-2021-39685": { + "cmt_msg": "USB: gadget: detect too-big endpoint 0 requests" }, - "CVE-2018-19407": { - "cmt_msg": "KVM: X86: Fix scan ioapic use-before-initialization" + "CVE-2018-1000204": { + "cmt_msg": "scsi: sg: allocate with __GFP_ZERO in sg_build_indirect()" }, - "CVE-2017-6345": { - "cmt_msg": "net/llc: avoid BUG_ON() in skb_orphan()" + "CVE-2017-12134": { + "cmt_msg": "xen: fix bio vec merging" }, - "CVE-2017-6346": { - "cmt_msg": "packet: fix races in fanout_add()" + "CVE-2017-17450": { + "cmt_msg": "netfilter: xt_osf: Add missing permission checks" }, - "CVE-2017-6347": { - "cmt_msg": "ip: fix IP_CHECKSUM handling" + "CVE-2024-26592": { + "cmt_msg": "ksmbd: fix UAF issue in ksmbd_tcp_new_connection()" }, - "CVE-2022-3628": { - "cmt_msg": "wifi: brcmfmac: Fix potential buffer overflow in brcmf_fweh_event_worker()" + "CVE-2024-26594": { + "cmt_msg": "ksmbd: validate mech token in session setup" }, - "CVE-2019-14897": { - "cmt_msg": "libertas: Fix two buffer overflows at parsing bss descriptor" + "CVE-2017-18270": { + "cmt_msg": "KEYS: prevent creating a different user's keyrings" }, - "CVE-2018-9385": { - "cmt_msg": "ARM: amba: Don't read past the end of sysfs \"driver_override\" buffer" + "CVE-2024-26598": { + "cmt_msg": "KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache" }, - "CVE-2020-0009": { - "cmt_msg": "staging: android: ashmem: Disallow ashmem memory from being remapped" + "CVE-2018-3646": { + "cmt_msg": "x86/microcode: Allow late microcode loading with SMT disabled" }, - "CVE-2023-52340": { - "cmt_msg": "ipv6: remove max_size check inline with ipv4" + "CVE-2022-29900": { + "cmt_msg": "x86/kvm/vmx: Make noinstr clean" }, - "CVE-2023-31082": { - "cmt_msg": "" + "CVE-2023-2007": { + "cmt_msg": "scsi: dpt_i2o: Remove obsolete driver" }, - "CVE-2018-7480": { - "cmt_msg": "blkcg: fix double free of new_blkg in blkcg_init_queue" + "CVE-2022-1419": { + "cmt_msg": "drm/vgem: Close use-after-free race in vgem_gem_create" }, - "CVE-2019-14615": { - "cmt_msg": "drm/i915/gen9: Clear residual context state on context switch" + "CVE-2017-16913": { + "cmt_msg": "usbip: fix stub_rx: harden CMD_SUBMIT path to handle malicious input" }, - "CVE-2018-16871": { - "cmt_msg": "nfsd: COPY and CLONE operations require the saved filehandle to be set" + "CVE-2022-2503": { + "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag" }, - "CVE-2018-9415": { - "cmt_msg": "ARM: amba: Fix race condition with driver_override" + "CVE-2022-23038": { + "cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()" }, - "CVE-2023-52442": { - "cmt_msg": "ksmbd: validate session id and tree id in compound request" + "CVE-2022-23039": { + "cmt_msg": "xen/gntalloc: don't use gnttab_query_foreign_access()" }, - "CVE-2019-13648": { - "cmt_msg": "powerpc/tm: Fix oops on sigreturn on systems without TM" + "CVE-2022-23036": { + "cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()" }, - "CVE-2023-0030": { - "cmt_msg": "drm/nouveau/mmu: add more general vmm free/node handling functions" + "CVE-2022-23037": { + "cmt_msg": "xen/netfront: don't use gnttab_query_foreign_access() for mapped status" }, - "CVE-2020-16120": { - "cmt_msg": "ovl: switch to mounter creds in readdir" + "CVE-2017-5669": { + "cmt_msg": "ipc/shm: Fix shmat mmap nil-page protection" }, - "CVE-2019-11599": { - "cmt_msg": "coredump: fix race condition between mmget_not_zero()/get_task_mm() and core dumping" + "CVE-2019-15538": { + "cmt_msg": "xfs: fix missing ILOCK unlock when xfs_setattr_nonsize fails due to EDQUOT" }, - "CVE-2018-16658": { - "cmt_msg": "cdrom: Fix info leak/OOB read in cdrom_ioctl_drive_status" + "CVE-2019-14821": { + "cmt_msg": "KVM: coalesced_mmio: add bounds checking" }, - "CVE-2018-15572": { - "cmt_msg": "x86/speculation: Protect against userspace-userspace spectreRSB" + "CVE-2020-12826": { + "cmt_msg": "signal: Extend exec_id to 64bits" }, - "CVE-2022-1204": { - "cmt_msg": "ax25: Fix refcount leaks caused by ax25_cb_del()" + "CVE-2021-42008": { + "cmt_msg": "net: 6pack: fix slab-out-of-bounds in decode_data" }, - "CVE-2019-2101": { - "cmt_msg": "media: uvcvideo: Fix 'type' check leading to overflow" + "CVE-2020-25645": { + "cmt_msg": "geneve: add transport ports in route lookup for geneve" }, - "CVE-2019-17666": { - "cmt_msg": "rtlwifi: Fix potential overflow on P2P code" + "CVE-2019-15666": { + "cmt_msg": "xfrm: policy: Fix out-of-bound array accesses in __xfrm_policy_unlink" }, - "CVE-2018-9363": { - "cmt_msg": "Bluetooth: hidp: buffer overflow in hidp_process_report" + "CVE-2020-25641": { + "cmt_msg": "block: allow for_each_bvec to support zero len bvec" }, - "CVE-2018-15471": { - "cmt_msg": "xen-netback: fix input validation in xenvif_set_hash_mapping()" + "CVE-2015-1350": { + "cmt_msg": "fs: Avoid premature clearing of capabilities" }, - "CVE-2016-10723": { - "cmt_msg": "mm, oom: remove sleep from under oom_lock" + "CVE-2021-33034": { + "cmt_msg": "Bluetooth: verify AMP hci_chan before amp_destroy" }, - "CVE-2021-3573": { - "cmt_msg": "Bluetooth: use correct lock to prevent UAF of hdev object" + "CVE-2021-33033": { + "cmt_msg": "cipso,calipso: resolve a number of problems with the DOI refcounts" }, - "CVE-2020-25212": { - "cmt_msg": "nfs: Fix getxattr kernel panic and memory overflow" + "CVE-2017-18509": { + "cmt_msg": "ipv6: check sk sk_type and protocol early in ip_mroute_set/getsockopt" }, - "CVE-2019-19036": { - "cmt_msg": "btrfs: Detect unbalanced tree with empty leaf before crashing btree operations" + "CVE-2017-11600": { + "cmt_msg": "xfrm: policy: check policy direction value" }, - "CVE-2019-3459": { - "cmt_msg": "Bluetooth: Verify that l2cap_get_conf_opt provides large enough buffer" + "CVE-2024-26625": { + "cmt_msg": "llc: call sock_orphan() at release time" }, - "CVE-2020-11494": { - "cmt_msg": "slcan: Don't transmit uninitialized stack data in padding" + "CVE-2024-26627": { + "cmt_msg": "scsi: core: Move scsi_host_busy() out of host lock for waking up EH handler" }, - "CVE-2017-8797": { - "cmt_msg": "nfsd: fix undefined behavior in nfsd4_layout_verify" + "CVE-2024-26622": { + "cmt_msg": "tomoyo: fix UAF write bug in tomoyo_write_control()" }, - "CVE-2020-0444": { - "cmt_msg": "audit: fix error handling in audit_data_to_entry()" + "CVE-2024-22386": { + "cmt_msg": "" }, - "CVE-2018-10675": { - "cmt_msg": "mm/mempolicy: fix use after free when calling get_mempolicy" + "CVE-2018-10021": { + "cmt_msg": "scsi: libsas: defer ata device eh commands to libata" }, - "CVE-2017-16526": { - "cmt_msg": "uwb: properly check kthread_run return value" + "CVE-2017-18221": { + "cmt_msg": "mlock: fix mlock count can not decrease in race condition" }, - "CVE-2017-16527": { - "cmt_msg": "ALSA: usb-audio: Kill stray URB at exiting" + "CVE-2019-10126": { + "cmt_msg": "mwifiex: Fix heap overflow in mwifiex_uap_parse_tail_ies()" }, - "CVE-2017-16525": { - "cmt_msg": "USB: serial: console: fix use-after-free after failed setup" + "CVE-2019-10124": { + "cmt_msg": "mm: hwpoison: fix thp split handing in soft_offline_in_use_page()" }, - "CVE-2022-1836": { - "cmt_msg": "floppy: disable FDRAWCMD by default" + "CVE-2020-13974": { + "cmt_msg": "vt: keyboard: avoid signed integer overflow in k_ascii" }, - "CVE-2020-8834": { - "cmt_msg": "KVM: PPC: Book3S HV: Factor fake-suspend handling out of kvmppc_save/restore_tm" + "CVE-2018-10938": { + "cmt_msg": "Cipso: cipso_v4_optptr enter infinite loop" }, - "CVE-2021-32078": { - "cmt_msg": "ARM: footbridge: remove personal server platform" + "CVE-2020-15437": { + "cmt_msg": "serial: 8250: fix null-ptr-deref in serial8250_start_tx()" }, - "CVE-2022-30594": { - "cmt_msg": "ptrace: Check PTRACE_O_SUSPEND_SECCOMP permission on PTRACE_SEIZE" + "CVE-2020-15436": { + "cmt_msg": "block: Fix use-after-free in blkdev_get()" }, - "CVE-2017-16528": { - "cmt_msg": "ALSA: seq: Cancel pending autoload work at unbinding device" + "CVE-2021-47065": { + "cmt_msg": "rtw88: Fix array overrun in rtw_get_tx_power_params()" }, - "CVE-2017-16529": { - "cmt_msg": "ALSA: usb-audio: Check out-of-bounds access by corrupted buffer descriptor" + "CVE-2022-23816": { + "cmt_msg": "x86/kvm/vmx: Make noinstr clean" }, - "CVE-2019-11833": { - "cmt_msg": "ext4: zero out the unused memory region in the extent tree block" + "CVE-2021-47145": { + "cmt_msg": "btrfs: do not BUG_ON in link_to_fixup_dir" }, - "CVE-2021-38205": { - "cmt_msg": "net: xilinx_emaclite: Do not print real IOMEM pointer" + "CVE-2021-47149": { + "cmt_msg": "net: fujitsu: fix potential null-ptr-deref" }, - "CVE-2020-27835": { - "cmt_msg": "IB/hfi1: Ensure correct mm is used at all times" + "CVE-2018-19407": { + "cmt_msg": "KVM: X86: Fix scan ioapic use-before-initialization" }, - "CVE-2020-0255": { - "cmt_msg": "selinux: properly handle multiple messages in selinux_netlink_send()" + "CVE-2021-47144": { + "cmt_msg": "drm/amd/amdgpu: fix refcount leak" }, - "CVE-2019-2215": { - "cmt_msg": "ANDROID: binder: remove waitqueue when thread exits." + "CVE-2021-47147": { + "cmt_msg": "ptp: ocp: Fix a resource leak in an error handling path" }, - "CVE-2021-3892": { - "cmt_msg": "" + "CVE-2021-47146": { + "cmt_msg": "mld: fix panic in mld_newpack()" }, - "CVE-2021-38208": { - "cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect" + "CVE-2021-47140": { + "cmt_msg": "iommu/amd: Clear DMA ops when switching domain" }, - "CVE-2018-7995": { - "cmt_msg": "x86/MCE: Serialize sysfs changes" + "CVE-2021-47143": { + "cmt_msg": "net/smc: remove device from smcd_dev_list after failed device_add()" }, - "CVE-2017-18232": { - "cmt_msg": "scsi: libsas: direct call probe and destruct" + "CVE-2021-47142": { + "cmt_msg": "drm/amdgpu: Fix a use-after-free" }, - "CVE-2019-2213": { - "cmt_msg": "binder: fix possible UAF when freeing buffer" + "CVE-2024-26765": { + "cmt_msg": "LoongArch: Disable IRQ before init_fn() for nonboot CPUs" }, - "CVE-2020-25211": { - "cmt_msg": "netfilter: ctnetlink: add a range check for l3/l4 protonum" + "CVE-2018-16871": { + "cmt_msg": "nfsd: COPY and CLONE operations require the saved filehandle to be set" }, - "CVE-2017-14140": { - "cmt_msg": "Sanitize 'move_pages()' permission checks" + "CVE-2018-16658": { + "cmt_msg": "cdrom: Fix info leak/OOB read in cdrom_ioctl_drive_status" }, - "CVE-2020-26556": { - "cmt_msg": "" + "CVE-2019-19036": { + "cmt_msg": "btrfs: Detect unbalanced tree with empty leaf before crashing btree operations" }, - "CVE-2018-9518": { - "cmt_msg": "NFC: llcp: Limit size of SDP URI" + "CVE-2017-8797": { + "cmt_msg": "nfsd: fix undefined behavior in nfsd4_layout_verify" }, - "CVE-2020-26555": { - "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical" + "CVE-2021-32078": { + "cmt_msg": "ARM: footbridge: remove personal server platform" }, - "CVE-2018-9517": { - "cmt_msg": "l2tp: pass tunnel pointer to ->session_create()" + "CVE-2022-4662": { + "cmt_msg": "USB: core: Prevent nested device-reset calls" }, - "CVE-2018-9516": { - "cmt_msg": "HID: debug: check length before copy_to_user()" + "CVE-2019-11833": { + "cmt_msg": "ext4: zero out the unused memory region in the extent tree block" }, - "CVE-2023-3397": { - "cmt_msg": "" + "CVE-2020-27835": { + "cmt_msg": "IB/hfi1: Ensure correct mm is used at all times" + }, + "CVE-2018-5953": { + "cmt_msg": "printk: hash addresses printed with %p" }, "CVE-2018-1128": { "cmt_msg": "libceph: add authorizer challenge" @@ -105176,15 +136675,6 @@ "CVE-2018-1129": { "cmt_msg": "libceph: implement CEPHX_V2 calculation mode" }, - "CVE-2018-1087": { - "cmt_msg": "kvm/x86: fix icebp instruction handling" - }, - "CVE-2022-26365": { - "cmt_msg": "xen/blkfront: fix leaking data in shared pages" - }, - "CVE-2022-21125": { - "cmt_msg": "x86/speculation/mmio: Reuse SRBDS mitigation for SBDS" - }, "CVE-2018-20854": { "cmt_msg": "phy: ocelot-serdes: fix out-of-bounds read" }, @@ -105194,4889 +136684,4862 @@ "CVE-2018-20856": { "cmt_msg": "block: blk_init_allocated_queue() set q->fq as NULL in the fail case" }, - "CVE-2023-52451": { - "cmt_msg": "powerpc/pseries/memhp: Fix access beyond end of drmem array" - }, - "CVE-2021-31916": { - "cmt_msg": "dm ioctl: fix out of bounds array access when no devices" - }, - "CVE-2017-5754": { - "cmt_msg": "x86/cpufeatures: Add Intel feature bits for Speculation Control" - }, "CVE-2022-3061": { "cmt_msg": "video: fbdev: i740fb: Error out if 'pixclock' equals zero" }, - "CVE-2017-5753": { - "cmt_msg": "x86/cpufeatures: Add X86_BUG_SPECTRE_V[12]" + "CVE-2020-27784": { + "cmt_msg": "usb: gadget: function: printer: fix use-after-free in __lock_acquire" }, - "CVE-2022-2961": { - "cmt_msg": "" + "CVE-2020-27786": { + "cmt_msg": "ALSA: rawmidi: Fix racy buffer resize under concurrent accesses" }, - "CVE-2022-20369": { - "cmt_msg": "media: v4l2-mem2mem: Apply DST_QUEUE_OFF_BASE on MMAP buffers across ioctls" + "CVE-2023-6240": { + "cmt_msg": "" }, - "CVE-2023-2176": { - "cmt_msg": "RDMA/core: Refactor rdma_bind_addr" + "CVE-2022-39842": { + "cmt_msg": "video: fbdev: pxa3xx-gcu: Fix integer overflow in pxa3xx_gcu_write" }, - "CVE-2024-1086": { - "cmt_msg": "netfilter: nf_tables: reject QUEUE/DROP verdict parameters" + "CVE-2023-51043": { + "cmt_msg": "drm/atomic: Fix potential use-after-free in nonblocking commits" }, - "CVE-2022-32981": { - "cmt_msg": "powerpc/32: Fix overread/overwrite of thread_struct via ptrace" + "CVE-2019-9454": { + "cmt_msg": "i2c: core-smbus: prevent stack corruption on read I2C_BLOCK_DATA" }, - "CVE-2016-10208": { - "cmt_msg": "ext4: validate s_first_meta_bg at mount time" + "CVE-2017-16939": { + "cmt_msg": "ipsec: Fix aborted xfrm policy dump crash" }, - "CVE-2020-11565": { - "cmt_msg": "mm: mempolicy: require at least one nodeid for MPOL_PREFERRED" + "CVE-2016-10741": { + "cmt_msg": "xfs: don't BUG() on mixed direct and mapped I/O" }, - "CVE-2019-19049": { - "cmt_msg": "of: unittest: fix memory leak in unittest_data_add" + "CVE-2021-26931": { + "cmt_msg": "xen-blkback: don't \"handle\" error by BUG()" }, - "CVE-2018-9568": { - "cmt_msg": "net: Set sk_prot_creator when cloning sockets to the right proto" + "CVE-2021-26930": { + "cmt_msg": "xen-blkback: fix error handling in xen_blkbk_map()" }, - "CVE-2022-0644": { - "cmt_msg": "vfs: check fd has read access in kernel_read_file_from_fd()" + "CVE-2021-26932": { + "cmt_msg": "Xen/x86: don't bail early from clear_foreign_p2m_mapping()" }, - "CVE-2020-27784": { - "cmt_msg": "usb: gadget: function: printer: fix use-after-free in __lock_acquire" + "CVE-2022-36402": { + "cmt_msg": "drm/vmwgfx: Fix shader stage validation" }, - "CVE-2018-13053": { - "cmt_msg": "alarmtimer: Prevent overflow for relative nanosleep" + "CVE-2021-3178": { + "cmt_msg": "nfsd4: readdirplus shouldn't return parent of export" }, - "CVE-2020-27786": { - "cmt_msg": "ALSA: rawmidi: Fix racy buffer resize under concurrent accesses" + "CVE-2023-1611": { + "cmt_msg": "btrfs: fix race between quota disable and quota assign ioctls" }, - "CVE-2019-14816": { - "cmt_msg": "mwifiex: Fix three heap overflow at parsing element in cfg80211_ap_settings" + "CVE-2021-3772": { + "cmt_msg": "sctp: use init_tag from inithdr for ABORT chunk" }, - "CVE-2019-14814": { - "cmt_msg": "mwifiex: Fix three heap overflow at parsing element in cfg80211_ap_settings" + "CVE-2021-34556": { + "cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4" }, - "CVE-2023-6240": { - "cmt_msg": "" + "CVE-2021-28714": { + "cmt_msg": "xen/netback: fix rx queue stall detection" }, - "CVE-2023-23559": { - "cmt_msg": "wifi: rndis_wlan: Prevent buffer overflow in rndis_query_oid" + "CVE-2021-28713": { + "cmt_msg": "xen/console: harden hvc_xen against event channel storms" }, - "CVE-2020-10720": { - "cmt_msg": "net-gro: fix use-after-free read in napi_gro_frags()" + "CVE-2021-28712": { + "cmt_msg": "xen/netfront: harden netfront against event channel storms" }, - "CVE-2020-14351": { - "cmt_msg": "perf/core: Fix race in the perf_mmap_close() function" + "CVE-2021-28711": { + "cmt_msg": "xen/blkfront: harden blkfront against event channel storms" }, - "CVE-2022-0382": { - "cmt_msg": "net ticp:fix a kernel-infoleak in __tipc_sendmsg()" + "CVE-2022-1247": { + "cmt_msg": "" }, - "CVE-2019-9456": { - "cmt_msg": "usb: usbmon: Read text within supplied buffer size" + "CVE-2022-2991": { + "cmt_msg": "remove the lightnvm subsystem" }, - "CVE-2023-32233": { - "cmt_msg": "netfilter: nf_tables: deactivate anonymous set from preparation phase" + "CVE-2017-11473": { + "cmt_msg": "x86/acpi: Prevent out of bound access caused by broken ACPI tables" }, - "CVE-2020-25672": { - "cmt_msg": "nfc: fix memory leak in llcp_sock_connect()" + "CVE-2017-11472": { + "cmt_msg": "ACPICA: Namespace: fix operand cache leak" }, - "CVE-2019-9455": { - "cmt_msg": "media: videobuf2-v4l2: drop WARN_ON in vb2_warn_zero_bytesused()" + "CVE-2017-17862": { + "cmt_msg": "bpf: fix branch pruning logic" }, - "CVE-2020-25670": { - "cmt_msg": "nfc: fix refcount leak in llcp_sock_bind()" + "CVE-2021-39657": { + "cmt_msg": "scsi: ufs: Correct the LUN used in eh_device_reset_handler() callback" }, - "CVE-2020-25671": { - "cmt_msg": "nfc: fix refcount leak in llcp_sock_connect()" + "CVE-2023-52578": { + "cmt_msg": "net: bridge: use DEV_STATS_INC()" }, - "CVE-2018-21008": { - "cmt_msg": "rsi: add fix for crash during assertions" + "CVE-2023-52574": { + "cmt_msg": "team: fix null-ptr-deref when team device type is changed" }, - "CVE-2019-15223": { - "cmt_msg": "ALSA: line6: Assure canceling delayed work at disconnection" + "CVE-2023-3567": { + "cmt_msg": "vc_screen: move load of struct vc_data pointer in vcs_read() to avoid UAF" }, - "CVE-2019-15220": { - "cmt_msg": "p54usb: Fix race between disconnect and firmware loading" + "CVE-2023-52571": { + "cmt_msg": "power: supply: rk817: Fix node refcount leak" }, - "CVE-2019-15221": { - "cmt_msg": "ALSA: line6: Fix write on zero-sized buffer" + "CVE-2023-52572": { + "cmt_msg": "cifs: Fix UAF in cifs_demultiplex_thread()" }, - "CVE-2019-19815": { - "cmt_msg": "f2fs: support swap file w/ DIO" + "CVE-2017-14340": { + "cmt_msg": "xfs: XFS_IS_REALTIME_INODE() should be false if no rt device present" }, - "CVE-2019-19814": { - "cmt_msg": "" + "CVE-2019-19039": { + "cmt_msg": "btrfs: Don't submit any btree write bio if the fs has errors" }, - "CVE-2020-29371": { - "cmt_msg": "romfs: fix uninitialized memory leak in romfs_dev_read()" + "CVE-2016-8636": { + "cmt_msg": "IB/rxe: Fix mem_check_range integer overflow" }, - "CVE-2019-19816": { - "cmt_msg": "btrfs: inode: Verify inode mode to avoid NULL pointer dereference" + "CVE-2020-12362": { + "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" }, - "CVE-2017-16939": { - "cmt_msg": "ipsec: Fix aborted xfrm policy dump crash" + "CVE-2020-12363": { + "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" }, - "CVE-2019-9453": { - "cmt_msg": "f2fs: fix to avoid accessing xattr across the boundary" + "CVE-2019-12881": { + "cmt_msg": "drm/i915/userptr: reject zero user_size" }, - "CVE-2022-1016": { - "cmt_msg": "netfilter: nf_tables: initialize registers in nft_do_chain()" + "CVE-2022-4129": { + "cmt_msg": "l2tp: Serialize access to sk_user_data with sk_callback_lock" }, - "CVE-2018-18710": { - "cmt_msg": "cdrom: fix improper type cast, which can leat to information leak." + "CVE-2020-12364": { + "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" }, - "CVE-2016-2188": { - "cmt_msg": "USB: iowarrior: fix NULL-deref at probe" + "CVE-2021-4002": { + "cmt_msg": "hugetlbfs: flush TLBs correctly after huge_pmd_unshare" }, - "CVE-2022-1012": { - "cmt_msg": "secure_seq: use the 64 bits of the siphash for port offset calculation" + "CVE-2023-26545": { + "cmt_msg": "net: mpls: fix stale pointer if allocation fails during device rename" }, - "CVE-2020-12114": { - "cmt_msg": "make struct mountpoint bear the dentry reference to mountpoint, not struct mount" + "CVE-2019-15292": { + "cmt_msg": "appletalk: Fix use-after-free in atalk_proc_exit" }, - "CVE-2020-8649": { - "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region" + "CVE-2019-15291": { + "cmt_msg": "media: b2c2-flexcop-usb: add sanity checking" }, - "CVE-2023-3161": { - "cmt_msg": "fbcon: Check font dimension limits" + "CVE-2019-15290": { + "cmt_msg": "" }, - "CVE-2020-12656": { - "cmt_msg": "sunrpc: check that domain table is empty at module unload." + "CVE-2023-3212": { + "cmt_msg": "gfs2: Don't deref jdesc in evict" }, - "CVE-2020-14356": { - "cmt_msg": "cgroup: fix cgroup_sk_alloc() for sk_clone_lock()" + "CVE-2017-9211": { + "cmt_msg": "crypto: skcipher - Add missing API setkey checks" }, - "CVE-2017-1000405": { - "cmt_msg": "mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d()" + "CVE-2024-26633": { + "cmt_msg": "ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim()" }, - "CVE-2021-26930": { - "cmt_msg": "xen-blkback: fix error handling in xen_blkbk_map()" + "CVE-2024-26636": { + "cmt_msg": "llc: make llc_ui_sendmsg() more robust against bonding changes" }, - "CVE-2017-1000407": { - "cmt_msg": "KVM: VMX: remove I/O port 0x80 bypass on Intel hosts" + "CVE-2024-26635": { + "cmt_msg": "llc: Drop support for ETH_P_TR_802_2." }, - "CVE-2021-26932": { - "cmt_msg": "Xen/x86: don't bail early from clear_foreign_p2m_mapping()" + "CVE-2017-7308": { + "cmt_msg": "net/packet: fix overflow in check for priv area size" }, - "CVE-2024-25740": { - "cmt_msg": "" + "CVE-2020-12769": { + "cmt_msg": "spi: spi-dw: Add lock protect dw_spi rx/tx to prevent concurrent calls" }, - "CVE-2023-52456": { - "cmt_msg": "serial: imx: fix tx statemachine deadlock" + "CVE-2017-8890": { + "cmt_msg": "dccp/tcp: do not inherit mc_list from parent" }, - "CVE-2023-3141": { - "cmt_msg": "memstick: r592: Fix UAF bug in r592_remove due to race condition" + "CVE-2023-52635": { + "cmt_msg": "PM / devfreq: Synchronize devfreq_monitor_[start/stop]" }, - "CVE-2023-37454": { - "cmt_msg": "" + "CVE-2023-52634": { + "cmt_msg": "drm/amd/display: Fix disable_otg_wa logic" }, - "CVE-2019-3892": { - "cmt_msg": "coredump: fix race condition between mmget_not_zero()/get_task_mm() and core dumping" + "CVE-2017-18208": { + "cmt_msg": "mm/madvise.c: fix madvise() infinite loop under special circumstances" }, - "CVE-2020-12352": { - "cmt_msg": "Bluetooth: A2MP: Fix not initializing all members" + "CVE-2017-1000364": { + "cmt_msg": "mm: larger stack guard gap, between vmas" }, - "CVE-2020-12351": { - "cmt_msg": "Bluetooth: L2CAP: Fix calling sk_filter on non-socket based channel" + "CVE-2017-1000365": { + "cmt_msg": "fs/exec.c: account for argv/envp pointers" }, - "CVE-2020-12655": { - "cmt_msg": "xfs: add agf freeblocks verify in xfs_agf_verify" + "CVE-2020-13143": { + "cmt_msg": "USB: gadget: fix illegal array access in binding with UDC" }, - "CVE-2021-43976": { - "cmt_msg": "mwifiex: Fix skb_over_panic in mwifiex_usb_recv()" + "CVE-2017-1000363": { + "cmt_msg": "char: lp: fix possible integer overflow in lp_setup()" }, - "CVE-2022-0494": { - "cmt_msg": "block-map: add __GFP_ZERO flag for alloc_page in function bio_copy_kern" + "CVE-2022-3903": { + "cmt_msg": "media: mceusb: Use new usb_control_msg_*() routines" }, - "CVE-2023-2269": { - "cmt_msg": "dm ioctl: fix nested locking in table_clear() to remove deadlock concern" + "CVE-2018-20449": { + "cmt_msg": "printk: hash addresses printed with %p" }, - "CVE-2020-26088": { - "cmt_msg": "net/nfc/rawsock.c: add CAP_NET_RAW check." + "CVE-2017-15299": { + "cmt_msg": "KEYS: don't let add_key() update an uninstantiated key" }, - "CVE-2022-3524": { - "cmt_msg": "tcp/udp: Fix memory leak in ipv6_renew_options()." + "CVE-2021-47179": { + "cmt_msg": "NFSv4: Fix a NULL pointer dereference in pnfs_mark_matching_lsegs_return()" }, - "CVE-2022-3523": { - "cmt_msg": "mm/memory.c: fix race when faulting a device private page" + "CVE-2019-11191": { + "cmt_msg": "x86: Deprecate a.out support" }, - "CVE-2022-3522": { - "cmt_msg": "mm/hugetlb: use hugetlb_pte_stable in migration race check" + "CVE-2021-47170": { + "cmt_msg": "USB: usbfs: Don't WARN about excessively large memory allocations" }, - "CVE-2008-2544": { - "cmt_msg": "" + "CVE-2021-47171": { + "cmt_msg": "net: usb: fix memory leak in smsc75xx_bind" }, - "CVE-2021-3178": { - "cmt_msg": "nfsd4: readdirplus shouldn't return parent of export" + "CVE-2021-47172": { + "cmt_msg": "iio: adc: ad7124: Fix potential overflow due to non sequential channel numbers" }, - "CVE-2022-2318": { - "cmt_msg": "net: rose: fix UAF bugs caused by timer handler" + "CVE-2021-47173": { + "cmt_msg": "misc/uss720: fix memory leak in uss720_probe" }, - "CVE-2022-42703": { - "cmt_msg": "mm/rmap: Fix anon_vma->degree ambiguity leading to double-reuse" + "CVE-2021-47175": { + "cmt_msg": "net/sched: fq_pie: fix OOB access in the traffic path" }, - "CVE-2023-23455": { - "cmt_msg": "net: sched: atm: dont intepret cls results when asked to drop" + "CVE-2018-10323": { + "cmt_msg": "xfs: set format back to extents if xfs_bmap_extents_to_btree" }, - "CVE-2018-7755": { - "cmt_msg": "floppy: Do not copy a kernel pointer to user memory in FDGETPRM ioctl" + "CVE-2018-10322": { + "cmt_msg": "xfs: enhance dinode verifier" }, - "CVE-2017-7346": { - "cmt_msg": "drm/vmwgfx: limit the number of mip levels in vmw_gb_surface_define_ioctl()" + "CVE-2021-46951": { + "cmt_msg": "tpm: efi: Use local variable for calculating final log size" }, - "CVE-2018-7757": { - "cmt_msg": "scsi: libsas: fix memory leak in sas_smp_get_phy_events()" + "CVE-2021-46950": { + "cmt_msg": "md/raid1: properly indicate failure when ending a failed write request" }, - "CVE-2022-0330": { - "cmt_msg": "drm/i915: Flush TLBs before releasing backing store" + "CVE-2021-46952": { + "cmt_msg": "NFS: fs_context: validate UDP retrans to prevent shift out-of-bounds" }, - "CVE-2007-3719": { - "cmt_msg": "" + "CVE-2021-46959": { + "cmt_msg": "spi: Fix use-after-free with devm_spi_alloc_*" }, - "CVE-2023-3863": { - "cmt_msg": "net: nfc: Fix use-after-free caused by nfc_llcp_find_local" + "CVE-2017-18193": { + "cmt_msg": "f2fs: fix a bug caused by NULL extent tree" }, - "CVE-2023-0590": { - "cmt_msg": "net: sched: fix race condition in qdisc_graft()" + "CVE-2023-5178": { + "cmt_msg": "nvmet-tcp: Fix a possible UAF in queue intialization setup" }, - "CVE-2022-29900": { - "cmt_msg": "x86/kvm/vmx: Make noinstr clean" + "CVE-2021-0929": { + "cmt_msg": "staging/android/ion: delete dma_buf->kmap/unmap implemenation" }, - "CVE-2022-4095": { - "cmt_msg": "staging: rtl8712: fix use after free bugs" + "CVE-2018-19985": { + "cmt_msg": "USB: hso: Fix OOB memory access in hso_probe/hso_get_config_data" }, - "CVE-2017-10911": { - "cmt_msg": "xen-blkback: don't leak stack data via response ring" + "CVE-2021-0920": { + "cmt_msg": "af_unix: fix garbage collect vs MSG_PEEK" }, - "CVE-2023-34255": { - "cmt_msg": "xfs: verify buffer contents when we skip log replay" + "CVE-2017-7273": { + "cmt_msg": "HID: hid-cypress: validate length of report" }, - "CVE-2022-45919": { - "cmt_msg": "media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221" + "CVE-2017-7477": { + "cmt_msg": "macsec: avoid heap overflow in skb_to_sgvec" }, - "CVE-2019-19319": { - "cmt_msg": "ext4: protect journal inode's blocks using block_validity" + "CVE-2023-0615": { + "cmt_msg": "media: vivid: dev->bitmap_cap wasn't freed in all cases" }, - "CVE-2023-2248": { - "cmt_msg": "net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg" + "CVE-2017-7472": { + "cmt_msg": "KEYS: fix keyctl_set_reqkey_keyring() to not leak thread keyrings" }, - "CVE-2023-30772": { - "cmt_msg": "power: supply: da9150: Fix use after free bug in da9150_charger_remove due to race condition" + "CVE-2022-3586": { + "cmt_msg": "sch_sfb: Don't assume the skb is still around after enqueueing to child" }, - "CVE-2017-18017": { - "cmt_msg": "netfilter: xt_TCPMSS: add more sanity tests on tcph->doff" + "CVE-2020-27825": { + "cmt_msg": "tracing: Fix race in trace_open and buffer resize call" }, - "CVE-2022-24958": { - "cmt_msg": "usb: gadget: don't release an existing dev->buf" + "CVE-2019-2181": { + "cmt_msg": "binder: check for overflow when alloc for security context" }, - "CVE-2023-1611": { - "cmt_msg": "btrfs: fix race between quota disable and quota assign ioctls" + "CVE-2019-2182": { + "cmt_msg": "arm64: Enforce BBM for huge IO/VMAP mappings" }, - "CVE-2021-3772": { - "cmt_msg": "sctp: use init_tag from inithdr for ABORT chunk" + "CVE-2020-27820": { + "cmt_msg": "drm/nouveau: use drm_dev_unplug() during device removal" }, - "CVE-2023-3268": { - "cmt_msg": "relayfs: fix out-of-bounds access in relay_file_read" + "CVE-2023-6610": { + "cmt_msg": "smb: client: fix potential OOB in smb2_dump_detail()" }, - "CVE-2021-3679": { - "cmt_msg": "tracing: Fix bug in rb_per_cpu_empty() that might cause deadloop." + "CVE-2023-1476": { + "cmt_msg": "" }, - "CVE-2021-37159": { - "cmt_msg": "usb: hso: fix error handling code of hso_create_net_device" + "CVE-2023-1670": { + "cmt_msg": "xirc2ps_cs: Fix use after free bug in xirc2ps_detach" }, - "CVE-2022-2586": { - "cmt_msg": "netfilter: nf_tables: do not allow SET_ID to refer to another table" + "CVE-2020-14351": { + "cmt_msg": "perf/core: Fix race in the perf_mmap_close() function" }, - "CVE-2022-3629": { - "cmt_msg": "vsock: Fix memory leak in vsock_connect()" + "CVE-2020-14353": { + "cmt_msg": "KEYS: prevent creating a different user's keyrings" }, - "CVE-2021-28715": { - "cmt_msg": "xen/netback: don't queue unlimited number of packages" + "CVE-2020-0429": { + "cmt_msg": "l2tp: fix race between l2tp_session_delete() and l2tp_tunnel_closeall()" }, - "CVE-2021-28714": { - "cmt_msg": "xen/netback: fix rx queue stall detection" + "CVE-2020-14356": { + "cmt_msg": "cgroup: fix cgroup_sk_alloc() for sk_clone_lock()" }, - "CVE-2021-28713": { - "cmt_msg": "xen/console: harden hvc_xen against event channel storms" + "CVE-2022-20132": { + "cmt_msg": "HID: add hid_is_usb() function to make it simpler for USB detection" }, - "CVE-2018-5873": { - "cmt_msg": "nsfs: mark dentry with DCACHE_RCUACCESS" + "CVE-2023-6270": { + "cmt_msg": "aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts" }, - "CVE-2017-18261": { - "cmt_msg": "clocksource/drivers/arm_arch_timer: Avoid infinite recursion when ftrace is enabled" + "CVE-2023-1582": { + "cmt_msg": "fs/proc: task_mmu.c: don't read mapcount for migration entry" }, - "CVE-2021-4157": { - "cmt_msg": "pNFS/flexfiles: fix incorrect size check in decode_nfs_fh()" + "CVE-2019-17351": { + "cmt_msg": "xen: let alloc_xenballooned_pages() fail if not enough memory free" }, - "CVE-2022-2991": { - "cmt_msg": "remove the lightnvm subsystem" + "CVE-2018-1120": { + "cmt_msg": "proc: do not access cmdline nor environ from file-backed areas" }, - "CVE-2022-3621": { - "cmt_msg": "nilfs2: fix NULL pointer dereference at nilfs_bmap_lookup_at_level()" + "CVE-2018-20855": { + "cmt_msg": "IB/mlx5: Fix leaking stack memory to userspace" }, - "CVE-2017-11473": { - "cmt_msg": "x86/acpi: Prevent out of bound access caused by broken ACPI tables" + "CVE-2023-35824": { + "cmt_msg": "media: dm1105: Fix use after free bug in dm1105_remove due to race condition" }, - "CVE-2017-11472": { - "cmt_msg": "ACPICA: Namespace: fix operand cache leak" + "CVE-2019-1999": { + "cmt_msg": "binder: fix race between munmap() and direct reclaim" }, - "CVE-2022-3624": { - "cmt_msg": "bonding: fix reference count leak in balance-alb mode" + "CVE-2018-1065": { + "cmt_msg": "netfilter: add back stackpointer size checks" }, - "CVE-2017-17862": { - "cmt_msg": "bpf: fix branch pruning logic" + "CVE-2018-1066": { + "cmt_msg": "CIFS: Enable encryption during session setup phase" }, - "CVE-2021-39657": { - "cmt_msg": "scsi: ufs: Correct the LUN used in eh_device_reset_handler() callback" + "CVE-2018-1068": { + "cmt_msg": "netfilter: ebtables: CONFIG_COMPAT: don't trust userland offsets" }, - "CVE-2021-3669": { - "cmt_msg": "ipc: replace costly bailout check in sysvipc_find_ipc()" + "CVE-2017-17053": { + "cmt_msg": "x86/mm: Fix use-after-free of ldt_struct" }, - "CVE-2019-18885": { - "cmt_msg": "btrfs: merge btrfs_find_device and find_device" + "CVE-2017-17052": { + "cmt_msg": "fork: fix incorrect fput of ->exe_file causing use-after-free" }, - "CVE-2017-7889": { - "cmt_msg": "mm: Tighten x86 /dev/mem with zeroing reads" + "CVE-2019-7308": { + "cmt_msg": "bpf: fix sanitation of alu op with pointer / scalar type from different paths" }, - "CVE-2019-12378": { - "cmt_msg": "ipv6_sockglue: Fix a missing-check bug in ip6_ra_control()" + "CVE-2018-1000199": { + "cmt_msg": "perf/hwbp: Simplify the perf-hwbp code, fix documentation" }, - "CVE-2019-11091": { - "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" + "CVE-2022-1966": { + "cmt_msg": "netfilter: nf_tables: disallow non-stateful expression in sets earlier" }, - "CVE-2022-3239": { - "cmt_msg": "media: em28xx: initialize refcount before kref_get" + "CVE-2021-3587": { + "cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect" }, - "CVE-2022-4543": { - "cmt_msg": "" + "CVE-2019-16995": { + "cmt_msg": "net: hsr: fix memory leak in hsr_dev_finalize()" }, - "CVE-2019-18660": { - "cmt_msg": "powerpc/book3s64: Fix link stack flush on context switch" + "CVE-2017-18075": { + "cmt_msg": "crypto: pcrypt - fix freeing pcrypt instances" }, - "CVE-2023-4921": { - "cmt_msg": "net: sched: sch_qfq: Fix UAF in qfq_dequeue()" + "CVE-2017-18079": { + "cmt_msg": "Input: i8042 - fix crash at boot time" }, - "CVE-2022-3424": { - "cmt_msg": "misc: sgi-gru: fix use-after-free error in gru_set_context_option, gru_fault and gru_handle_user_call_os" + "CVE-2023-6121": { + "cmt_msg": "nvmet: nul-terminate the NQNs passed in the connect command" }, - "CVE-2017-15649": { - "cmt_msg": "packet: in packet_do_bind, test fanout with bind_lock held" + "CVE-2020-1749": { + "cmt_msg": "net: ipv6_stub: use ip6_dst_lookup_flow instead of ip6_dst_lookup" }, - "CVE-2017-11089": { - "cmt_msg": "cfg80211: Define nla_policy for NL80211_ATTR_LOCAL_MESH_POWER_MODE" + "CVE-2021-3760": { + "cmt_msg": "nfc: nci: fix the UAF of rf_conn_info object" }, - "CVE-2023-1829": { - "cmt_msg": "net/sched: Retire tcindex classifier" + "CVE-2017-18216": { + "cmt_msg": "ocfs2: subsystem.su_mutex is required while accessing the item->ci_parent" }, - "CVE-2019-18282": { - "cmt_msg": "net/flow_dissector: switch to siphash" + "CVE-2017-18218": { + "cmt_msg": "net: hns: Fix a skb used after free bug" }, - "CVE-2021-34981": { - "cmt_msg": "Bluetooth: cmtp: fix file refcount when cmtp_attach_device fails" + "CVE-2021-39648": { + "cmt_msg": "usb: gadget: configfs: Fix use-after-free issue with udc_name" }, - "CVE-2023-1670": { - "cmt_msg": "xirc2ps_cs: Fix use after free bug in xirc2ps_detach" + "CVE-2023-52569": { + "cmt_msg": "btrfs: remove BUG() after failure to insert delayed dir index item" }, - "CVE-2018-14625": { - "cmt_msg": "vhost/vsock: fix use-after-free in network stack callers" + "CVE-2023-52568": { + "cmt_msg": "x86/sgx: Resolves SECS reclaim vs. page fault for EAUG race" }, - "CVE-2023-4881": { - "cmt_msg": "netfilter: nftables: exthdr: fix 4-byte stack OOB write" + "CVE-2019-0136": { + "cmt_msg": "mac80211: drop robust management frames from unknown TA" }, - "CVE-2017-14489": { - "cmt_msg": "scsi: scsi_transport_iscsi: fix the issue that iscsi_if_rx doesn't parse nlmsg properly" + "CVE-2023-52563": { + "cmt_msg": "drm/meson: fix memory leak on ->hpd_notify callback" }, - "CVE-2023-6915": { - "cmt_msg": "ida: Fix crash in ida_free when the bitmap is empty" + "CVE-2023-52561": { + "cmt_msg": "arm64: dts: qcom: sdm845-db845c: Mark cont splash memory region as reserved" }, - "CVE-2022-20148": { - "cmt_msg": "f2fs: fix UAF in f2fs_available_free_memory" + "CVE-2022-3344": { + "cmt_msg": "KVM: x86: nSVM: harden svm_free_nested against freeing vmcb02 while still in use" }, - "CVE-2022-1786": { - "cmt_msg": "io_uring: remove io_identity" + "CVE-2023-52566": { + "cmt_msg": "nilfs2: fix potential use after free in nilfs_gccache_submit_read_data()" }, - "CVE-2013-7445": { - "cmt_msg": "" + "CVE-2023-52565": { + "cmt_msg": "media: uvcvideo: Fix OOB read" }, - "CVE-2016-9604": { - "cmt_msg": "KEYS: Disallow keyrings beginning with '.' to be joined as session keyrings" + "CVE-2018-12896": { + "cmt_msg": "posix-timers: Sanitize overrun handling" }, - "CVE-2022-3646": { - "cmt_msg": "nilfs2: fix leak of nilfs_root in case of writer thread creation failure" + "CVE-2020-0347": { + "cmt_msg": "" }, - "CVE-2022-28390": { - "cmt_msg": "can: ems_usb: ems_usb_start_xmit(): fix double dev_kfree_skb() in error path" + "CVE-2021-40490": { + "cmt_msg": "ext4: fix race writing to an inline_data file while its xattrs are changing" }, - "CVE-2019-15292": { - "cmt_msg": "appletalk: Fix use-after-free in atalk_proc_exit" + "CVE-2021-33909": { + "cmt_msg": "seq_file: disallow extremely large seq buffer allocations" }, - "CVE-2020-12652": { - "cmt_msg": "scsi: mptfusion: Fix double fetch bug in ioctl" + "CVE-2019-12455": { + "cmt_msg": "clk-sunxi: fix a missing-check bug in sunxi_divs_clk_setup()" }, - "CVE-2024-25741": { + "CVE-2019-12456": { "cmt_msg": "" }, - "CVE-2017-14340": { - "cmt_msg": "xfs: XFS_IS_REALTIME_INODE() should be false if no rt device present" + "CVE-2022-0812": { + "cmt_msg": "xprtrdma: fix incorrect header size calculations" }, - "CVE-2022-26966": { - "cmt_msg": "sr9700: sanity check for packet length" + "CVE-2019-5108": { + "cmt_msg": "mac80211: Do not send Layer 2 Update frame before authorization" }, - "CVE-2019-19535": { - "cmt_msg": "can: peak_usb: pcan_usb_fd: Fix info-leaks to USB devices" + "CVE-2019-17133": { + "cmt_msg": "cfg80211: wext: avoid copying malformed SSIDs" }, - "CVE-2020-14386": { - "cmt_msg": "net/packet: fix overflow in tpacket_rcv" + "CVE-2021-33656": { + "cmt_msg": "vt: drop old FONT ioctls" }, - "CVE-2021-34693": { - "cmt_msg": "can: bcm: fix infoleak in struct bcm_msg_head" + "CVE-2021-33655": { + "cmt_msg": "fbcon: Disallow setting font bigger than screen size" }, - "CVE-2020-14381": { - "cmt_msg": "futex: Fix inode life-time issue" + "CVE-2022-41858": { + "cmt_msg": "drivers: net: slip: fix NPD bug in sl_tx_timeout()" }, - "CVE-2023-30456": { - "cmt_msg": "KVM: nVMX: add missing consistency checks for CR0 and CR4" + "CVE-2022-41850": { + "cmt_msg": "HID: roccat: Fix use-after-free in roccat_read()" }, - "CVE-2019-19768": { - "cmt_msg": "blktrace: Protect q->blk_trace with RCU" + "CVE-2017-10663": { + "cmt_msg": "f2fs: sanity check checkpoint segno and blkoff" }, - "CVE-2022-3303": { - "cmt_msg": "ALSA: pcm: oss: Fix race at SNDCTL_DSP_SYNC" + "CVE-2017-10662": { + "cmt_msg": "f2fs: sanity check segment count" }, - "CVE-2019-19039": { - "cmt_msg": "btrfs: Don't submit any btree write bio if the fs has errors" + "CVE-2017-10661": { + "cmt_msg": "timerfd: Protect the might cancel mechanism proper" }, - "CVE-2017-5715": { - "cmt_msg": "x86/cpufeatures: Add X86_BUG_SPECTRE_V[12]" + "CVE-2022-1184": { + "cmt_msg": "ext4: verify dir block before splitting it" }, - "CVE-2022-20141": { - "cmt_msg": "igmp: Add ip_mc_list lock in ip_check_mc_rcu" + "CVE-2017-14991": { + "cmt_msg": "scsi: sg: fixup infoleak when using SG_GET_REQUEST_TABLE" }, - "CVE-2020-25704": { - "cmt_msg": "perf/core: Fix a memory leak in perf_event_parse_addr_filter()" + "CVE-2018-7566": { + "cmt_msg": "ALSA: seq: Fix racy pool initializations" }, - "CVE-2021-45095": { - "cmt_msg": "phonet: refcount leak in pep_sock_accep" + "CVE-2017-7645": { + "cmt_msg": "nfsd: check for oversized NFSv2/v3 arguments" }, - "CVE-2023-23454": { - "cmt_msg": "net: sched: cbq: dont intepret cls results when asked to drop" + "CVE-2024-26808": { + "cmt_msg": "netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain" }, - "CVE-2020-12771": { - "cmt_msg": "bcache: fix potential deadlock problem in btree_gc_coalesce" + "CVE-2024-26809": { + "cmt_msg": "netfilter: nft_set_pipapo: release elements in clone only from destroy path" }, - "CVE-2018-3620": { - "cmt_msg": "x86/microcode: Allow late microcode loading with SMT disabled" + "CVE-2021-42739": { + "cmt_msg": "media: firewire: firedtv-avc: fix a buffer overflow in avc_ca_pmt()" }, - "CVE-2023-6932": { - "cmt_msg": "ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet" + "CVE-2024-26805": { + "cmt_msg": "netlink: Fix kernel-infoleak-after-free in __skb_datagram_iter" }, - "CVE-2016-8636": { - "cmt_msg": "IB/rxe: Fix mem_check_range integer overflow" + "CVE-2024-26806": { + "cmt_msg": "spi: cadence-qspi: remove system-wide suspend helper calls from runtime PM hooks" }, - "CVE-2019-3460": { - "cmt_msg": "Bluetooth: Check L2CAP option sizes returned from l2cap_get_conf_opt" + "CVE-2021-37159": { + "cmt_msg": "usb: hso: fix error handling code of hso_create_net_device" }, - "CVE-2018-8781": { - "cmt_msg": "drm: udl: Properly check framebuffer mmap offsets" + "CVE-2020-12770": { + "cmt_msg": "scsi: sg: add sg_remove_request in sg_write" }, - "CVE-2021-29155": { - "cmt_msg": "bpf: Use correct permission flag for mixed signed bounds arithmetic" + "CVE-2024-26802": { + "cmt_msg": "stmmac: Clear variable when destroying workqueue" }, - "CVE-2024-22386": { - "cmt_msg": "" + "CVE-2017-15115": { + "cmt_msg": "sctp: do not peel off an assoc from one netns to another one" }, - "CVE-2021-33631": { - "cmt_msg": "ext4: fix kernel BUG in 'ext4_write_inline_data_end()'" + "CVE-2023-52606": { + "cmt_msg": "powerpc/lib: Validate size for vector operations" }, - "CVE-2019-15916": { - "cmt_msg": "net-sysfs: Fix mem leak in netdev_register_kobject" + "CVE-2018-21008": { + "cmt_msg": "rsi: add fix for crash during assertions" }, - "CVE-2019-15917": { - "cmt_msg": "Bluetooth: hci_ldisc: Postpone HCI_UART_PROTO_READY bit set in hci_uart_set_proto()" + "CVE-2023-52604": { + "cmt_msg": "FS:JFS:UBSAN:array-index-out-of-bounds in dbAdjTree" }, - "CVE-2017-18344": { - "cmt_msg": "posix-timer: Properly check sigevent->sigev_notify" + "CVE-2023-52602": { + "cmt_msg": "jfs: fix slab-out-of-bounds Read in dtSearch" }, - "CVE-2017-15115": { - "cmt_msg": "sctp: do not peel off an assoc from one netns to another one" + "CVE-2023-52603": { + "cmt_msg": "UBSAN: array-index-out-of-bounds in dtSplitRoot" }, - "CVE-2017-15265": { - "cmt_msg": "ALSA: seq: Fix use-after-free at creating a port" + "CVE-2023-52600": { + "cmt_msg": "jfs: fix uaf in jfs_evict_inode" }, - "CVE-2021-27363": { - "cmt_msg": "scsi: iscsi: Restrict sessions and handles to admin capabilities" + "CVE-2023-52601": { + "cmt_msg": "jfs: fix array-index-out-of-bounds in dbAdjTree" }, - "CVE-2020-12362": { - "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" + "CVE-2023-52609": { + "cmt_msg": "binder: fix race between mmput() and do_exit()" }, - "CVE-2020-12363": { - "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" + "CVE-2024-23196": { + "cmt_msg": "ALSA: hda: fix a possible null-pointer dereference due to data race in snd_hdac_regmap_sync()" }, - "CVE-2019-12881": { - "cmt_msg": "drm/i915/userptr: reject zero user_size" + "CVE-2017-1000379": { + "cmt_msg": "mm: larger stack guard gap, between vmas" }, - "CVE-2022-4129": { - "cmt_msg": "l2tp: Serialize access to sk_user_data with sk_callback_lock" + "CVE-2023-3640": { + "cmt_msg": "" }, - "CVE-2023-3117": { - "cmt_msg": "netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE" + "CVE-2017-1000371": { + "cmt_msg": "binfmt_elf: use ELF_ET_DYN_BASE only for PIE" }, - "CVE-2018-1000004": { - "cmt_msg": "ALSA: seq: Make ioctls race-free" + "CVE-2017-1000370": { + "cmt_msg": "binfmt_elf: use ELF_ET_DYN_BASE only for PIE" }, - "CVE-2019-19530": { - "cmt_msg": "usb: cdc-acm: make sure a refcount is taken early enough" + "CVE-2023-3022": { + "cmt_msg": "ipv6: Use result arg in fib_lookup_arg consistently" }, - "CVE-2018-18690": { - "cmt_msg": "xfs: don't fail when converting shortform attr to long form during ATTR_REPLACE" + "CVE-2022-43750": { + "cmt_msg": "usb: mon: make mmapped memory read only" }, - "CVE-2022-28388": { - "cmt_msg": "can: usb_8dev: usb_8dev_start_xmit(): fix double dev_kfree_skb() in error path" + "CVE-2023-0047": { + "cmt_msg": "mm, oom: do not trigger out_of_memory from the #PF" }, - "CVE-2017-0627": { - "cmt_msg": "media: uvcvideo: Prevent heap overflow when accessing mapped controls" + "CVE-2023-4010": { + "cmt_msg": "" }, - "CVE-2021-0605": { - "cmt_msg": "af_key: pfkey_dump needs parameter validation" + "CVE-2021-47167": { + "cmt_msg": "NFS: Fix an Oopsable condition in __nfs_pageio_add_request()" }, - "CVE-2021-3896": { - "cmt_msg": "isdn: cpai: check ctr->cnr to avoid array index out of bound" + "CVE-2021-47166": { + "cmt_msg": "NFS: Don't corrupt the value of pg_bytes_written in nfs_do_recoalesce()" }, - "CVE-2021-4002": { - "cmt_msg": "hugetlbfs: flush TLBs correctly after huge_pmd_unshare" + "CVE-2021-47165": { + "cmt_msg": "drm/meson: fix shutdown crash when component not probed" }, - "CVE-2023-26545": { - "cmt_msg": "net: mpls: fix stale pointer if allocation fails during device rename" + "CVE-2021-47163": { + "cmt_msg": "tipc: wait and exit until all work queues are done" }, - "CVE-2021-38204": { - "cmt_msg": "usb: max-3421: Prevent corruption of freed memory" + "CVE-2021-47162": { + "cmt_msg": "tipc: skb_linearize the head skb when reassembling msgs" }, - "CVE-2022-34918": { - "cmt_msg": "netfilter: nf_tables: stricter validation of element data" + "CVE-2021-47160": { + "cmt_msg": "net: dsa: mt7530: fix VLAN traffic leaks" }, - "CVE-2018-20961": { - "cmt_msg": "USB: gadget: f_midi: fixing a possible double-free in f_midi" + "CVE-2023-4385": { + "cmt_msg": "fs: jfs: fix possible NULL pointer dereference in dbFree()" }, - "CVE-2019-20811": { - "cmt_msg": "net-sysfs: call dev_hold if kobject_init_and_add success" + "CVE-2021-46965": { + "cmt_msg": "mtd: physmap: physmap-bt1-rom: Fix unintentional stack access" }, - "CVE-2019-20810": { - "cmt_msg": "media: go7007: fix a miss of snd_card_free" + "CVE-2023-4387": { + "cmt_msg": "net: vmxnet3: fix possible use-after-free bugs in vmxnet3_rq_alloc_rx_buf()" }, - "CVE-2019-20812": { - "cmt_msg": "af_packet: set defaule value for tmo" + "CVE-2021-46962": { + "cmt_msg": "mmc: uniphier-sd: Fix a resource leak in the remove function" }, - "CVE-2023-1990": { - "cmt_msg": "nfc: st-nci: Fix use after free bug in ndlc_remove due to race condition" + "CVE-2021-47168": { + "cmt_msg": "NFS: fix an incorrect limit in filelayout_decode_layout()" }, - "CVE-2018-1118": { - "cmt_msg": "vhost: fix info leak due to uninitialized memory" + "CVE-2019-19378": { + "cmt_msg": "" }, - "CVE-2023-6040": { - "cmt_msg": "netfilter: nf_tables: Reject tables of unsupported family" + "CVE-2022-36879": { + "cmt_msg": "xfrm: xfrm_policy: fix a possible double xfrm_pols_put() in xfrm_bundle_lookup()" }, - "CVE-2018-5391": { - "cmt_msg": "ip: discard IPv4 datagrams with overlapping segments." + "CVE-2019-19377": { + "cmt_msg": "btrfs: Don't submit any btree write bio if the fs has errors" }, - "CVE-2022-26373": { - "cmt_msg": "x86/speculation: Add RSB VM Exit protections" + "CVE-2017-7482": { + "cmt_msg": "rxrpc: Fix several cases where a padded len isn't checked in ticket decode" }, - "CVE-2018-5995": { - "cmt_msg": "printk: hash addresses printed with %p" + "CVE-2017-7487": { + "cmt_msg": "ipx: call ipxitf_put() in ioctl error path" }, - "CVE-2018-18386": { - "cmt_msg": "n_tty: fix EXTPROC vs ICANON interaction with TIOCINQ (aka FIONREAD)" + "CVE-2017-9150": { + "cmt_msg": "bpf: don't let ldimm64 leak map addresses on unprivileged" }, - "CVE-2019-15291": { - "cmt_msg": "media: b2c2-flexcop-usb: add sanity checking" + "CVE-2023-1118": { + "cmt_msg": "media: rc: Fix use-after-free bugs caused by ene_tx_irqsim()" }, - "CVE-2019-15290": { - "cmt_msg": "" + "CVE-2021-0937": { + "cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write" }, - "CVE-2023-3212": { - "cmt_msg": "gfs2: Don't deref jdesc in evict" + "CVE-2017-7261": { + "cmt_msg": "drm/vmwgfx: NULL pointer dereference in vmw_surface_define_ioctl()" }, - "CVE-2024-23848": { - "cmt_msg": "" + "CVE-2022-47929": { + "cmt_msg": "net: sched: disallow noqueue for qdisc classes" }, - "CVE-2017-9211": { - "cmt_msg": "crypto: skcipher - Add missing API setkey checks" + "CVE-2019-16746": { + "cmt_msg": "nl80211: validate beacon head" }, - "CVE-2018-7273": { - "cmt_msg": "printk: hash addresses printed with %p" + "CVE-2022-3606": { + "cmt_msg": "" }, - "CVE-2023-52444": { - "cmt_msg": "f2fs: fix to avoid dirent corruption" + "CVE-2018-18021": { + "cmt_msg": "arm64: KVM: Tighten guest core register access from userspace" }, - "CVE-2022-0617": { - "cmt_msg": "udf: Fix NULL ptr deref when converting from inline format" + "CVE-2021-37576": { + "cmt_msg": "KVM: PPC: Book3S: Fix H_RTAS rets buffer overflow" }, - "CVE-2023-4459": { - "cmt_msg": "net: vmxnet3: fix possible NULL pointer dereference in vmxnet3_rq_cleanup()" + "CVE-2022-3594": { + "cmt_msg": "r8152: Rate limit overflow messages" }, - "CVE-2023-52457": { - "cmt_msg": "serial: 8250: omap: Don't skip resource freeing if pm_runtime_resume_and_get() failed" + "CVE-2022-3595": { + "cmt_msg": "cifs: fix double-fault crash during ntlmssp" }, - "CVE-2022-23036": { - "cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()" + "CVE-2018-5803": { + "cmt_msg": "sctp: verify size of a new chunk in _sctp_make_chunk()" }, - "CVE-2022-2153": { - "cmt_msg": "KVM: x86: Avoid theoretical NULL pointer dereference in kvm_irq_delivery_to_apic_fast()" + "CVE-2020-27815": { + "cmt_msg": "jfs: Fix array index bounds check in dbAdjTree" }, - "CVE-2019-19531": { - "cmt_msg": "usb: yurex: Fix use-after-free in yurex_delete" + "CVE-2023-6606": { + "cmt_msg": "smb: client: fix OOB in smbCalcSize()" }, - "CVE-2022-20566": { - "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free caused by l2cap_chan_put" + "CVE-2020-27673": { + "cmt_msg": "xen/events: add a proper barrier to 2-level uevent unmasking" }, - "CVE-2018-12930": { - "cmt_msg": "" + "CVE-2020-27675": { + "cmt_msg": "xen/events: avoid removing an event channel while handling it" }, - "CVE-2018-12931": { - "cmt_msg": "" + "CVE-2020-28915": { + "cmt_msg": "fbcon: Fix global-out-of-bounds read in fbcon_get_font()" }, - "CVE-2017-7308": { - "cmt_msg": "net/packet: fix overflow in check for priv area size" + "CVE-2022-3111": { + "cmt_msg": "power: supply: wm8350-power: Add missing free in free_charger_irq" }, - "CVE-2024-23196": { - "cmt_msg": "" + "CVE-2020-0435": { + "cmt_msg": "f2fs: fix to do sanity check with i_extra_isize" }, - "CVE-2020-12769": { - "cmt_msg": "spi: spi-dw: Add lock protect dw_spi rx/tx to prevent concurrent calls" + "CVE-2020-0432": { + "cmt_msg": "staging: most: net: fix buffer overflow" }, - "CVE-2017-8890": { - "cmt_msg": "dccp/tcp: do not inherit mc_list from parent" + "CVE-2020-0433": { + "cmt_msg": "blk-mq: sync the update nr_hw_queues with blk_mq_queue_tag_busy_iter" }, - "CVE-2022-4662": { - "cmt_msg": "USB: core: Prevent nested device-reset calls" + "CVE-2020-0431": { + "cmt_msg": "HID: hid-input: clear unmapped usages" }, - "CVE-2021-32399": { - "cmt_msg": "bluetooth: eliminate the potential race condition when removing the HCI controller" + "CVE-2023-6915": { + "cmt_msg": "ida: Fix crash in ida_free when the bitmap is empty" }, - "CVE-2021-45868": { - "cmt_msg": "quota: check block number when reading the block in quota file" + "CVE-2021-47006": { + "cmt_msg": "ARM: 9064/1: hw_breakpoint: Do not directly check the event's overflow_handler hook" }, - "CVE-2019-12380": { - "cmt_msg": "efi/x86/Add missing error handling to old_memmap 1:1 mapping code" + "CVE-2023-1249": { + "cmt_msg": "coredump: Use the vma snapshot in fill_files_note" }, - "CVE-2019-12381": { - "cmt_msg": "ip_sockglue: Fix missing-check bug in ip_ra_control()" + "CVE-2021-3483": { + "cmt_msg": "firewire: nosy: Fix a use-after-free bug in nosy_ioctl()" }, - "CVE-2019-12382": { - "cmt_msg": "drm/edid: Fix a missing-check bug in drm_load_edid_firmware()" + "CVE-2023-6040": { + "cmt_msg": "netfilter: nf_tables: Reject tables of unsupported family" }, - "CVE-2017-10810": { - "cmt_msg": "drm/virtio: don't leak bo on drm_gem_object_init failure" + "CVE-2017-16912": { + "cmt_msg": "usbip: fix stub_rx: get_pipe() to validate endpoint number" }, - "CVE-2020-12364": { - "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" + "CVE-2017-16911": { + "cmt_msg": "usbip: prevent vhci_hcd driver from leaking a socket pointer address" }, - "CVE-2022-20166": { - "cmt_msg": "drivers core: Use sysfs_emit and sysfs_emit_at for show(device *...) functions" + "CVE-2017-16914": { + "cmt_msg": "usbip: fix stub_send_ret_submit() vulnerability to null transfer_buffer" }, - "CVE-2017-12146": { - "cmt_msg": "driver core: platform: fix race condition with driver_override" + "CVE-2020-36691": { + "cmt_msg": "netlink: limit recursion depth in policy validation" }, - "CVE-2021-3732": { - "cmt_msg": "ovl: prevent private clone if bind mount is not allowed" + "CVE-2023-42755": { + "cmt_msg": "net/sched: Retire rsvp classifier" }, - "CVE-2022-25375": { - "cmt_msg": "usb: gadget: rndis: check size of RNDIS_MSG_SET command" + "CVE-2023-42752": { + "cmt_msg": "igmp: limit igmpv3_newpack() packet size to IP_MAX_MTU" }, - "CVE-2020-10766": { - "cmt_msg": "x86/speculation: Prevent rogue cross-process SSBD shutdown" + "CVE-2021-3573": { + "cmt_msg": "Bluetooth: use correct lock to prevent UAF of hdev object" }, - "CVE-2017-13166": { - "cmt_msg": "media: v4l2-ioctl.c: use check_fmt for enum/g/s/try_fmt" + "CVE-2022-1974": { + "cmt_msg": "nfc: replace improper check device_is_registered() in netlink related functions" }, - "CVE-2018-12207": { - "cmt_msg": "kvm: x86, powerpc: do not allow clearing largepages debugfs entry" + "CVE-2022-1975": { + "cmt_msg": "NFC: netlink: fix sleep in atomic bug when firmware download timeout" }, - "CVE-2017-1000364": { - "cmt_msg": "mm: larger stack guard gap, between vmas" + "CVE-2023-1380": { + "cmt_msg": "wifi: brcmfmac: slab-out-of-bounds read in brcmf_get_assoc_ies()" }, - "CVE-2017-1000365": { - "cmt_msg": "fs/exec.c: account for argv/envp pointers" + "CVE-2018-12130": { + "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" }, - "CVE-2020-13143": { - "cmt_msg": "USB: gadget: fix illegal array access in binding with UDC" + "CVE-2022-32981": { + "cmt_msg": "powerpc/32: Fix overread/overwrite of thread_struct via ptrace" }, - "CVE-2023-5178": { - "cmt_msg": "nvmet-tcp: Fix a possible UAF in queue intialization setup" + "CVE-2018-13405": { + "cmt_msg": "Fix up non-directory creation in SGID directories" }, - "CVE-2020-10768": { - "cmt_msg": "x86/speculation: PR_SPEC_FORCE_DISABLE enforcement for indirect branches." + "CVE-2018-13406": { + "cmt_msg": "video: uvesafb: Fix integer overflow in allocation" }, - "CVE-2017-13168": { - "cmt_msg": "scsi: sg: mitigate read/write abuse" + "CVE-2020-11668": { + "cmt_msg": "media: xirlink_cit: add missing descriptor sanity checks" }, - "CVE-2017-1000363": { - "cmt_msg": "char: lp: fix possible integer overflow in lp_setup()" + "CVE-2020-11669": { + "cmt_msg": "powerpc/powernv/idle: Restore AMR/UAMOR/AMOR after idle" }, - "CVE-2019-0148": { - "cmt_msg": "i40e: Wrong truncation from u16 to u8" + "CVE-2019-14901": { + "cmt_msg": "mwifiex: Fix heap overflow in mmwifiex_process_tdls_action_frame()" }, - "CVE-2022-2978": { - "cmt_msg": "fs: fix UAF/GPF bug in nilfs_mdt_destroy" + "CVE-2020-8694": { + "cmt_msg": "powercap: restrict energy meter to root access" }, - "CVE-2019-17075": { - "cmt_msg": "RDMA/cxgb4: Do not dma memory off of the stack" + "CVE-2021-3715": { + "cmt_msg": "net_sched: cls_route: remove the right filter from hashtable" }, - "CVE-2022-3903": { - "cmt_msg": "media: mceusb: Use new usb_control_msg_*() routines" + "CVE-2021-3714": { + "cmt_msg": "" }, - "CVE-2022-23960": { - "cmt_msg": "ARM: report Spectre v2 status through sysfs" + "CVE-2019-16230": { + "cmt_msg": "drm/amdkfd: fix a potential NULL pointer dereference (v2)" }, - "CVE-2023-39189": { - "cmt_msg": "netfilter: nfnetlink_osf: avoid OOB read" + "CVE-2019-16231": { + "cmt_msg": "fjes: Handle workqueue allocation failure" }, - "CVE-2019-0146": { - "cmt_msg": "i40e: add num_vectors checker in iwarp handler" + "CVE-2019-16232": { + "cmt_msg": "libertas: fix a potential NULL pointer dereference" }, - "CVE-2019-0147": { - "cmt_msg": "i40e: add num_vectors checker in iwarp handler" + "CVE-2019-16233": { + "cmt_msg": "scsi: qla2xxx: fix a potential NULL pointer dereference" }, - "CVE-2018-20449": { - "cmt_msg": "printk: hash addresses printed with %p" + "CVE-2019-16234": { + "cmt_msg": "iwlwifi: pcie: fix rb_allocator workqueue allocation" }, - "CVE-2018-3693": { - "cmt_msg": "ext4: fix spectre gadget in ext4_mb_regular_allocator()" + "CVE-2019-6133": { + "cmt_msg": "fork: record start_time late" }, - "CVE-2017-15299": { - "cmt_msg": "KEYS: don't let add_key() update an uninstantiated key" + "CVE-2021-39633": { + "cmt_msg": "ip_gre: add validation for csum_start" }, - "CVE-2023-3338": { - "cmt_msg": "Remove DECnet support from kernel" + "CVE-2017-18203": { + "cmt_msg": "dm: fix race between dm_get_from_kobject() and __dm_destroy()" }, - "CVE-2022-44033": { - "cmt_msg": "char: pcmcia: remove all the drivers" + "CVE-2017-18202": { + "cmt_msg": "mm, oom_reaper: gather each vma to prevent leaking TLB entry" }, - "CVE-2019-11191": { - "cmt_msg": "x86: Deprecate a.out support" + "CVE-2021-39636": { + "cmt_msg": "netfilter: x_tables: fix pointer leaks to userspace" }, - "CVE-2023-4385": { - "cmt_msg": "fs: jfs: fix possible NULL pointer dereference in dbFree()" + "CVE-2017-18204": { + "cmt_msg": "ocfs2: should wait dio before inode lock in ocfs2_setattr()" }, - "CVE-2023-35001": { - "cmt_msg": "netfilter: nf_tables: prevent OOB access in nft_byteorder_eval" + "CVE-2021-39634": { + "cmt_msg": "epoll: do not insert into poll queues until all sanity checks are done" }, - "CVE-2018-10323": { - "cmt_msg": "xfs: set format back to extents if xfs_bmap_extents_to_btree" + "CVE-2022-33742": { + "cmt_msg": "xen/blkfront: force data bouncing when backend is untrusted" }, - "CVE-2018-10322": { - "cmt_msg": "xfs: enhance dinode verifier" + "CVE-2022-33741": { + "cmt_msg": "xen/netfront: force data bouncing when backend is untrusted" }, - "CVE-2023-1989": { - "cmt_msg": "Bluetooth: btsdio: fix use after free bug in btsdio_remove due to unfinished work" + "CVE-2022-33740": { + "cmt_msg": "xen/netfront: fix leaking data in shared pages" }, - "CVE-2017-5576": { - "cmt_msg": "drm/vc4: Fix an integer overflow in temporary allocation layout." + "CVE-2022-33744": { + "cmt_msg": "xen/arm: Fix race in RB-tree based P2M accounting" }, - "CVE-2017-5577": { - "cmt_msg": "drm/vc4: Return -EINVAL on the overflow checks failing." + "CVE-2023-52596": { + "cmt_msg": "sysctl: Fix out of bounds access for empty sysctl registers" }, - "CVE-2017-8824": { - "cmt_msg": "dccp: CVE-2017-8824: use-after-free in DCCP code" + "CVE-2023-52597": { + "cmt_msg": "KVM: s390: fix setting of fpc register" }, - "CVE-2018-7492": { - "cmt_msg": "rds: Fix NULL pointer dereference in __rds_rdma_map" + "CVE-2023-52594": { + "cmt_msg": "wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus()" }, - "CVE-2020-26139": { - "cmt_msg": "mac80211: do not accept/forward invalid EAPOL frames" + "CVE-2023-52595": { + "cmt_msg": "wifi: rt2x00: restart beacon queue when hardware reset" }, - "CVE-2017-12188": { - "cmt_msg": "KVM: nVMX: update last_nonleaf_level when initializing nested EPT" + "CVE-2023-52593": { + "cmt_msg": "wifi: wfx: fix possible NULL pointer dereference in wfx_set_mfp_ap()" }, - "CVE-2018-17182": { - "cmt_msg": "mm: get rid of vmacache_flush_all() entirely" + "CVE-2023-52590": { + "cmt_msg": "ocfs2: Avoid touching renamed directory if parent does not change" }, - "CVE-2017-13305": { - "cmt_msg": "KEYS: encrypted: fix buffer overread in valid_master_desc()" + "CVE-2023-52591": { + "cmt_msg": "reiserfs: Avoid touching renamed directory if parent does not change" }, - "CVE-2019-19536": { - "cmt_msg": "can: peak_usb: pcan_usb_pro: Fix info-leaks to USB devices" + "CVE-2023-52598": { + "cmt_msg": "s390/ptrace: handle setting of fpc register correctly" }, - "CVE-2019-19537": { - "cmt_msg": "USB: core: Fix races in character device registration and deregistraion" + "CVE-2023-52599": { + "cmt_msg": "jfs: fix array-index-out-of-bounds in diNewExt" }, - "CVE-2019-19534": { - "cmt_msg": "can: peak_usb: fix slab info leak" + "CVE-2021-0447": { + "cmt_msg": "l2tp: protect sock pointer of struct pppol2tp_session with RCU" }, - "CVE-2017-1000370": { - "cmt_msg": "binfmt_elf: use ELF_ET_DYN_BASE only for PIE" + "CVE-2022-23222": { + "cmt_msg": "bpf: Replace PTR_TO_XXX_OR_NULL with PTR_TO_XXX | PTR_MAYBE_NULL" }, - "CVE-2019-19532": { - "cmt_msg": "HID: Fix assumption that devices have inputs" + "CVE-2021-0448": { + "cmt_msg": "netfilter: ctnetlink: add a range check for l3/l4 protonum" }, - "CVE-2019-11479": { - "cmt_msg": "tcp: add tcp_min_snd_mss sysctl" + "CVE-2017-12762": { + "cmt_msg": "isdn/i4l: fix buffer overflow" }, - "CVE-2019-10638": { - "cmt_msg": "inet: switch IP ID generator to siphash" + "CVE-2022-41849": { + "cmt_msg": "fbdev: smscufx: Fix use-after-free in ufx_ops_open()" }, - "CVE-2019-10639": { - "cmt_msg": "netns: provide pure entropy for net_hash_mix()" + "CVE-2022-41848": { + "cmt_msg": "" }, - "CVE-2021-0929": { - "cmt_msg": "staging/android/ion: delete dma_buf->kmap/unmap implemenation" + "CVE-2023-6356": { + "cmt_msg": "nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length" }, - "CVE-2019-11478": { - "cmt_msg": "tcp: tcp_fragment() should apply sane memory limits" + "CVE-2022-1353": { + "cmt_msg": "af_key: add __GFP_ZERO flag for compose_sadb_supported in function pfkey_register" }, - "CVE-2018-19985": { - "cmt_msg": "USB: hso: Fix OOB memory access in hso_probe/hso_get_config_data" + "CVE-2022-1198": { + "cmt_msg": "drivers: hamradio: 6pack: fix UAF bug caused by mod_timer()" }, - "CVE-2018-6554": { - "cmt_msg": "staging: irda: remove the irda network stack and drivers" + "CVE-2022-1199": { + "cmt_msg": "ax25: Fix NULL pointer dereference in ax25_kill_by_device" }, - "CVE-2017-18257": { - "cmt_msg": "f2fs: fix a dead loop in f2fs_fiemap()" + "CVE-2022-1195": { + "cmt_msg": "hamradio: improve the incomplete fix to avoid NPD" }, - "CVE-2023-6546": { - "cmt_msg": "tty: n_gsm: fix the UAF caused by race condition in gsm_cleanup_mux" + "CVE-2023-2124": { + "cmt_msg": "xfs: verify buffer contents when we skip log replay" }, - "CVE-2017-18255": { - "cmt_msg": "perf/core: Fix the perf_cpu_time_max_percent check" + "CVE-2019-15505": { + "cmt_msg": "media: technisat-usb2: break out of loop at end of buffer" }, - "CVE-2017-7273": { - "cmt_msg": "HID: hid-cypress: validate length of report" + "CVE-2022-27672": { + "cmt_msg": "x86/speculation: Identify processors vulnerable to SMT RSB predictions" }, - "CVE-2018-5953": { - "cmt_msg": "printk: hash addresses printed with %p" + "CVE-2023-52508": { + "cmt_msg": "nvme-fc: Prevent null pointer dereference in nvme_fc_io_getuuid()" }, - "CVE-2024-26587": { - "cmt_msg": "net: netdevsim: don't try to destroy PHC on VFs" + "CVE-2022-1280": { + "cmt_msg": "drm: avoid circular locks in drm_mode_getconnector" }, - "CVE-2023-51043": { - "cmt_msg": "drm/atomic: Fix potential use-after-free in nonblocking commits" + "CVE-2018-10880": { + "cmt_msg": "ext4: never move the system.data xattr out of the inode body" }, - "CVE-2020-28374": { - "cmt_msg": "scsi: target: Fix XCOPY NAA identifier lookup" + "CVE-2018-10881": { + "cmt_msg": "ext4: clear i_data in ext4_inode_info when removing inline data" }, + "CVE-2024-26713": { + "cmt_msg": "powerpc/pseries/iommu: Fix iommu initialisation during DLPAR add" + } + } + }, + "4.11": { + "4.11": { "CVE-2017-7477": { - "cmt_msg": "macsec: avoid heap overflow in skb_to_sgvec" + "cmt_msg": "macsec: avoid heap overflow in skb_to_sgvec", + "cmt_id": "4d6fa57b4dab0d77f4d8e9d9c73d1e63f6fe8fee" }, - "CVE-2023-2007": { - "cmt_msg": "scsi: dpt_i2o: Remove obsolete driver" + "CVE-2017-7645": { + "cmt_msg": "nfsd: check for oversized NFSv2/v3 arguments", + "cmt_id": "e6838a29ecb484c97e4efef9429643b9851fba6e" }, - "CVE-2023-0615": { - "cmt_msg": "media: vivid: dev->bitmap_cap wasn't freed in all cases" + "CVE-2017-7895": { + "cmt_msg": "nfsd: stricter decoding of write-like NFSv2/v3 ops", + "cmt_id": "13bf9fbff0e5e099e2b6f003a0ab8ae145436309" + } + }, + "4.11.1": { + "CVE-2017-9150": { + "cmt_msg": "bpf: don't let ldimm64 leak map addresses on unprivileged", + "cmt_id": "ced12308e58cc95002404b584fdc756a233581ab" }, - "CVE-2017-7472": { - "cmt_msg": "KEYS: fix keyctl_set_reqkey_keyring() to not leak thread keyrings" + "CVE-2017-10662": { + "cmt_msg": "f2fs: sanity check segment count", + "cmt_id": "c7f765b5d6bda480ae1aa2bf5734c9613d851f5f" + } + }, + "4.11.3": { + "CVE-2017-18360": { + "cmt_msg": "USB: serial: io_ti: fix div-by-zero in set_termios", + "cmt_id": "3a82455292c2b817031db57f6954f8b7e7b1dd38" }, - "CVE-2017-16535": { - "cmt_msg": "USB: core: fix out-of-bounds access bug in usb_get_bos_descriptor()" + "CVE-2017-7487": { + "cmt_msg": "ipx: call ipxitf_put() in ioctl error path", + "cmt_id": "b13b3f39851681b3e7f0f4ea2fcea4a0e47f4f0a" }, - "CVE-2017-16534": { - "cmt_msg": "USB: core: harden cdc_parse_cdc_header" + "CVE-2017-8797": { + "cmt_msg": "nfsd: fix undefined behavior in nfsd4_layout_verify", + "cmt_id": "06cc61e8f9edb5d50156622c0940b32e8cca0f3a" }, - "CVE-2017-16537": { - "cmt_msg": "media: imon: Fix null-ptr-deref in imon_probe" + "CVE-2017-1000363": { + "cmt_msg": "char: lp: fix possible integer overflow in lp_setup()", + "cmt_id": "28c7411cdbc41396dceff7e1b37dbb659f7bdfb2" + } + }, + "4.11.4": { + "CVE-2017-9077": { + "cmt_msg": "ipv6/dccp: do not inherit ipv6_mc_list from parent", + "cmt_id": "8e929937f8813fb209a2d733ee1367db80b6f622" }, - "CVE-2017-16536": { - "cmt_msg": "[media] cx231xx-cards: fix NULL-deref on missing association descriptor" + "CVE-2017-9076": { + "cmt_msg": "ipv6/dccp: do not inherit ipv6_mc_list from parent", + "cmt_id": "8e929937f8813fb209a2d733ee1367db80b6f622" }, - "CVE-2017-16531": { - "cmt_msg": "USB: fix out-of-bounds in usb_set_configuration" + "CVE-2017-9075": { + "cmt_msg": "sctp: do not inherit ipv6_{mc|ac|fl}_list from parent", + "cmt_id": "703a20827411c3906b644713bc4462d4b3fb6a5f" }, - "CVE-2017-16530": { - "cmt_msg": "USB: uas: fix bug in handling of alternate settings" + "CVE-2017-9074": { + "cmt_msg": "ipv6: Prevent overrun when parsing v6 header options", + "cmt_id": "9909e4e4ff16e3f66b4e33e118621d7fe92fc6d4" }, - "CVE-2017-16533": { - "cmt_msg": "HID: usbhid: fix out-of-bounds bug" + "CVE-2017-9211": { + "cmt_msg": "crypto: skcipher - Add missing API setkey checks", + "cmt_id": "f5eef8d2458bb569ca521b3c2b0a19af62536745" }, - "CVE-2017-16532": { - "cmt_msg": "usb: usbtest: fix NULL pointer dereference" + "CVE-2017-18221": { + "cmt_msg": "mlock: fix mlock count can not decrease in race condition", + "cmt_id": "f814bf465578b4bf2d4ae1329e8f35d89c040d2d" }, - "CVE-2023-35824": { - "cmt_msg": "media: dm1105: Fix use after free bug in dm1105_remove due to race condition" + "CVE-2017-8890": { + "cmt_msg": "dccp/tcp: do not inherit mc_list from parent", + "cmt_id": "db8ebc6da8cfd1057dc94e69fbd7a8c5ff34cef6" }, - "CVE-2022-43750": { - "cmt_msg": "usb: mon: make mmapped memory read only" + "CVE-2017-9242": { + "cmt_msg": "ipv6: fix out of bound writes in __ip6_append_data()", + "cmt_id": "827624c3d1cfd1b569ec2c6593a6a50ab65c72bb" + } + }, + "4.11.5": { + "CVE-2017-9605": { + "cmt_msg": "drm/vmwgfx: Make sure backup_handle is always valid", + "cmt_id": "3bc7a4a5643e79a819ac56132826480d5102d48c" }, - "CVE-2017-16538": { - "cmt_msg": "media: dvb-usb-v2: lmedm04: Improve logic checking of warm start" + "CVE-2017-15274": { + "cmt_msg": "KEYS: fix dereferencing NULL payload with nonzero length", + "cmt_id": "5def69023aec63f6d2facb39fde6f4cdf9c12710" }, - "CVE-2023-3006": { - "cmt_msg": "arm64: Add AMPERE1 to the Spectre-BHB affected list" + "CVE-2017-7346": { + "cmt_msg": "drm/vmwgfx: limit the number of mip levels in vmw_gb_surface_define_ioctl()", + "cmt_id": "6a6a4857199fb593b2e14621304546977a5acff3" }, - "CVE-2020-27825": { - "cmt_msg": "tracing: Fix race in trace_open and buffer resize call" + "CVE-2017-1000380": { + "cmt_msg": "ALSA: timer: Fix race between read and ioctl", + "cmt_id": "9018818b2410fcaf51042f1c0315cc4498c6c6e9" + } + }, + "4.11.7": { + "CVE-2017-1000364": { + "cmt_msg": "mm: larger stack guard gap, between vmas", + "cmt_id": "27f9070614aa5f05dc00e06bc288ac9e0ca7d430" }, - "CVE-2016-9084": { - "cmt_msg": "vfio/pci: Fix integer overflows, bitmask check" + "CVE-2017-1000379": { + "cmt_msg": "mm: larger stack guard gap, between vmas", + "cmt_id": "27f9070614aa5f05dc00e06bc288ac9e0ca7d430" + } + }, + "4.11.8": { + "CVE-2017-10911": { + "cmt_msg": "xen-blkback: don't leak stack data via response ring", + "cmt_id": "b919d2dc590952b2985e43d03b2724b84e5dc2a0" }, - "CVE-2019-2182": { - "cmt_msg": "arm64: Enforce BBM for huge IO/VMAP mappings" + "CVE-2017-1000365": { + "cmt_msg": "fs/exec.c: account for argv/envp pointers", + "cmt_id": "fed07e89078ddfbdddb2c54f340a934e94bee2b2" }, - "CVE-2020-27820": { - "cmt_msg": "drm/nouveau: use drm_dev_unplug() during device removal" + "CVE-2017-7482": { + "cmt_msg": "rxrpc: Fix several cases where a padded len isn't checked in ticket decode", + "cmt_id": "575cd7d4cec3ad0aa13c9d156fbcc3979db6f3ae" }, - "CVE-2016-9083": { - "cmt_msg": "vfio/pci: Fix integer overflows, bitmask check" + "CVE-2017-7518": { + "cmt_msg": "KVM: x86: fix singlestepping over syscall", + "cmt_id": "3af2b32a50c23af81403e6fed880f18e9ae0cb30" + } + }, + "4.11.10": { + "CVE-2017-12146": { + "cmt_msg": "driver core: platform: fix race condition with driver_override", + "cmt_id": "89488f31939230feadf0f2324ed2920888b616de" }, - "CVE-2017-18222": { - "cmt_msg": "net: hns: fix ethtool_get_strings overflow in hns driver" + "CVE-2017-10810": { + "cmt_msg": "drm/virtio: don't leak bo on drm_gem_object_init failure", + "cmt_id": "a2746d8b78fa470f43de7b3a472f8854fb8fa423" + } + }, + "4.11.11": { + "CVE-2017-11176": { + "cmt_msg": "mqueue: fix a use-after-free in sys_mq_notify()", + "cmt_id": "c353aee3bcd93a7529e5f971ab4dee21762c1baa" + } + }, + "4.11.12": { + "CVE-2019-9457": { + "cmt_msg": "exec: Limit arg stack to at most 75% of _STK_LIM", + "cmt_id": "2ee500dcfdcb688aceb06ea164541a5e99aecfac" }, - "CVE-2017-18221": { - "cmt_msg": "mlock: fix mlock count can not decrease in race condition" + "CVE-2018-14634": { + "cmt_msg": "exec: Limit arg stack to at most 75% of _STK_LIM", + "cmt_id": "2ee500dcfdcb688aceb06ea164541a5e99aecfac" }, - "CVE-2023-4622": { - "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES" + "CVE-2017-11089": { + "cmt_msg": "cfg80211: Define nla_policy for NL80211_ATTR_LOCAL_MESH_POWER_MODE", + "cmt_id": "61d3f24df74b44a00f4662a679446d0ed1f5fdf5" }, - "CVE-2019-20794": { - "cmt_msg": "" + "CVE-2017-7541": { + "cmt_msg": "brcmfmac: fix possible buffer overflow in brcmf_cfg80211_mgmt_tx()", + "cmt_id": "0dc4be778d53ba5ffc2ef434f7c6eabdf509e802" }, - "CVE-2023-39193": { - "cmt_msg": "netfilter: xt_sctp: validate the flag_info count" + "CVE-2017-1000371": { + "cmt_msg": "binfmt_elf: use ELF_ET_DYN_BASE only for PIE", + "cmt_id": "9b1bbf6ea9b2b596ba271bec23b93c48181ad896" }, - "CVE-2017-18224": { - "cmt_msg": "ocfs2: ip_alloc_sem should be taken in ocfs2_get_block()" + "CVE-2017-1000370": { + "cmt_msg": "binfmt_elf: use ELF_ET_DYN_BASE only for PIE", + "cmt_id": "9b1bbf6ea9b2b596ba271bec23b93c48181ad896" + } + }, + "outstanding": { + "CVE-2019-15090": { + "cmt_msg": "scsi: qedi: remove memset/memcpy to nfunc and use func instead" }, - "CVE-2020-26541": { - "cmt_msg": "certs: Add EFI_CERT_X509_GUID support for dbx entries" + "CVE-2019-15098": { + "cmt_msg": "ath6kl: fix a NULL-ptr-deref bug in ath6kl_usb_alloc_urb_from_pipe()" }, - "CVE-2023-6610": { - "cmt_msg": "smb: client: fix potential OOB in smb2_dump_detail()" + "CVE-2017-17712": { + "cmt_msg": "net: ipv4: fix for a race condition in raw_sendmsg" }, - "CVE-2020-26559": { - "cmt_msg": "" + "CVE-2022-0001": { + "cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE" }, - "CVE-2020-27673": { - "cmt_msg": "xen/events: add a proper barrier to 2-level uevent unmasking" + "CVE-2023-2248": { + "cmt_msg": "net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg" }, - "CVE-2021-43389": { - "cmt_msg": "isdn: cpai: check ctr->cnr to avoid array index out of bound" + "CVE-2022-0002": { + "cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE" }, - "CVE-2017-14156": { - "cmt_msg": "video: fbdev: aty: do not leak uninitialized padding in clk to userspace" + "CVE-2019-19965": { + "cmt_msg": "scsi: libsas: stop discovering if oob mode is disconnected" }, - "CVE-2021-33061": { - "cmt_msg": "ixgbe: add improvement for MDD response functionality" + "CVE-2019-19966": { + "cmt_msg": "media: cpia2: Fix use-after-free in cpia2_exit" }, - "CVE-2024-26592": { - "cmt_msg": "ksmbd: fix UAF issue in ksmbd_tcp_new_connection()" + "CVE-2023-52615": { + "cmt_msg": "hwrng: core - Fix page fault dead lock on mmap-ed hwrng" }, - "CVE-2017-2671": { - "cmt_msg": "ping: implement proper locking" + "CVE-2023-52614": { + "cmt_msg": "PM / devfreq: Fix buffer overflow in trans_stat_show" }, - "CVE-2018-1092": { - "cmt_msg": "ext4: fail ext4_iget for root directory if unallocated" + "CVE-2023-52617": { + "cmt_msg": "PCI: switchtec: Fix stdev_release() crash after surprise hot remove" }, - "CVE-2018-1093": { - "cmt_msg": "ext4: add validity checks for bitmap block numbers" + "CVE-2020-24587": { + "cmt_msg": "mac80211: prevent mixed key and fragment cache attacks" }, - "CVE-2017-18551": { - "cmt_msg": "i2c: core-smbus: prevent stack corruption on read I2C_BLOCK_DATA" + "CVE-2020-24586": { + "cmt_msg": "mac80211: prevent mixed key and fragment cache attacks" }, - "CVE-2023-1074": { - "cmt_msg": "sctp: fail if no bound addresses can be used for a given scope" + "CVE-2023-52612": { + "cmt_msg": "crypto: scomp - fix req->dst buffer overflow" }, - "CVE-2017-18552": { - "cmt_msg": "RDS: validate the requested traces user input against max supported" + "CVE-2021-0129": { + "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical" }, - "CVE-2021-26931": { - "cmt_msg": "xen-blkback: don't \"handle\" error by BUG()" + "CVE-2020-24588": { + "cmt_msg": "cfg80211: mitigate A-MSDU aggregation attacks" }, - "CVE-2024-26584": { - "cmt_msg": "net: tls: handle backlogging of crypto requests" + "CVE-2023-52619": { + "cmt_msg": "pstore/ram: Fix crash when setting number of cpus to an odd number" }, - "CVE-2022-1652": { - "cmt_msg": "floppy: use a statically allocated error counter" + "CVE-2023-52618": { + "cmt_msg": "block/rnbd-srv: Check for unlikely string overflow" }, - "CVE-2020-29568": { - "cmt_msg": "xen/xenbus: Allow watches discard events before queueing" + "CVE-2023-5717": { + "cmt_msg": "perf: Disallow mis-matched inherited group reads" }, - "CVE-2018-18559": { - "cmt_msg": "net/packet: fix a race in packet_bind() and packet_notifier()" + "CVE-2018-10940": { + "cmt_msg": "cdrom: information leak in cdrom_ioctl_media_changed()" }, - "CVE-2019-9457": { - "cmt_msg": "exec: Limit arg stack to at most 75% of _STK_LIM" + "CVE-2019-9506": { + "cmt_msg": "Bluetooth: Fix faulty expression for minimum encryption key size check" }, - "CVE-2019-19054": { - "cmt_msg": "media: rc: prevent memory leak in cx23888_ir_probe" + "CVE-2019-9500": { + "cmt_msg": "brcmfmac: assure SSID length from firmware is limited" }, - "CVE-2019-19057": { - "cmt_msg": "mwifiex: pcie: Fix memory leak in mwifiex_pcie_init_evt_ring" + "CVE-2019-9503": { + "cmt_msg": "brcmfmac: add subtype check for event handling in data path" }, - "CVE-2019-19056": { - "cmt_msg": "mwifiex: pcie: Fix memory leak in mwifiex_pcie_alloc_cmdrsp_buf" + "CVE-2022-0480": { + "cmt_msg": "memcg: enable accounting for file lock caches" }, - "CVE-2016-10741": { - "cmt_msg": "xfs: don't BUG() on mixed direct and mapped I/O" + "CVE-2018-10124": { + "cmt_msg": "kernel/signal.c: avoid undefined behaviour in kill_something_info" }, - "CVE-2023-23039": { + "CVE-2022-0487": { + "cmt_msg": "moxart: fix potential use-after-free on remove path" + }, + "CVE-2022-23825": { "cmt_msg": "" }, - "CVE-2019-19052": { - "cmt_msg": "can: gs_usb: gs_can_open(): prevent memory leak" + "CVE-2021-47112": { + "cmt_msg": "x86/kvm: Teardown PV features on boot CPU as well" }, - "CVE-2019-3846": { - "cmt_msg": "mwifiex: Fix possible buffer overflows at parsing bss descriptor" + "CVE-2021-47113": { + "cmt_msg": "btrfs: abort in rename_exchange if we fail to insert the second ref" }, - "CVE-2023-46838": { - "cmt_msg": "xen-netback: don't produce zero-size SKB frags" + "CVE-2021-47110": { + "cmt_msg": "x86/kvm: Disable kvmclock on all CPUs on shutdown" }, - "CVE-2020-0427": { - "cmt_msg": "pinctrl: devicetree: Avoid taking direct reference to device name string" + "CVE-2021-47116": { + "cmt_msg": "ext4: fix memory leak in ext4_mb_init_backend on error path." }, - "CVE-2019-9458": { - "cmt_msg": "media: v4l: event: Prevent freeing event subscriptions while accessed" + "CVE-2021-47117": { + "cmt_msg": "ext4: fix bug on in ext4_es_cache_extent as ext4_split_extent_at failed" }, - "CVE-2021-39714": { - "cmt_msg": "staging: android: ion: Drop ion_map_kernel interface" + "CVE-2021-47114": { + "cmt_msg": "ocfs2: fix data corruption by fallocate" }, - "CVE-2023-39197": { - "cmt_msg": "netfilter: conntrack: dccp: copy entire header to stack buffer, not just basic one" + "CVE-2021-47118": { + "cmt_msg": "pid: take a reference when initializing `cad_pid`" }, - "CVE-2017-9242": { - "cmt_msg": "ipv6: fix out of bound writes in __ip6_append_data()" + "CVE-2021-46970": { + "cmt_msg": "bus: mhi: pci_generic: Remove WQ_MEM_RECLAIM flag from state workqueue" }, - "CVE-2016-8660": { - "cmt_msg": "" + "CVE-2019-10207": { + "cmt_msg": "Bluetooth: hci_uart: check for missing tty operations" }, - "CVE-2020-14314": { - "cmt_msg": "ext4: fix potential negative array index in do_split()" + "CVE-2023-0459": { + "cmt_msg": "uaccess: Add speculation barrier to copy_from_user()" }, - "CVE-2023-3090": { - "cmt_msg": "ipvlan:Fix out-of-bounds caused by unclear skb->cb" + "CVE-2023-0458": { + "cmt_msg": "prlimit: do_prlimit needs to have a speculation check" }, - "CVE-2019-13272": { - "cmt_msg": "ptrace: Fix ->ptracer_cred handling for PTRACE_TRACEME" + "CVE-2021-30002": { + "cmt_msg": "media: v4l: ioctl: Fix memory leak in video_usercopy" }, - "CVE-2021-3587": { - "cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect" + "CVE-2021-0941": { + "cmt_msg": "bpf: Remove MTU check in __bpf_skb_max_len" }, - "CVE-2023-45862": { - "cmt_msg": "USB: ene_usb6250: Allocate enough memory for full object" + "CVE-2020-15802": { + "cmt_msg": "" }, - "CVE-2023-45863": { - "cmt_msg": "kobject: Fix slab-out-of-bounds in fill_kobj_path()" + "CVE-2022-3636": { + "cmt_msg": "net: ethernet: mtk_eth_soc: use after free in __mtk_ppe_check_skb()" }, - "CVE-2023-1582": { - "cmt_msg": "fs/proc: task_mmu.c: don't read mapcount for migration entry" + "CVE-2022-3635": { + "cmt_msg": "atm: idt77252: fix use-after-free bugs caused by tst_timer" }, - "CVE-2017-15537": { - "cmt_msg": "x86/fpu: Don't let userspace set bogus xcomp_bv" + "CVE-2021-28715": { + "cmt_msg": "xen/netback: don't queue unlimited number of packages" }, - "CVE-2022-2588": { - "cmt_msg": "net_sched: cls_route: remove from list when handle is 0" + "CVE-2022-34918": { + "cmt_msg": "netfilter: nf_tables: stricter validation of element data" }, - "CVE-2019-17351": { - "cmt_msg": "xen: let alloc_xenballooned_pages() fail if not enough memory free" + "CVE-2021-47028": { + "cmt_msg": "mt76: mt7915: fix txrate reporting" }, - "CVE-2020-36322": { - "cmt_msg": "fuse: fix bad inode" + "CVE-2019-11085": { + "cmt_msg": "drm/i915/gvt: Fix mmap range check" }, - "CVE-2022-23222": { - "cmt_msg": "bpf: Replace PTR_TO_XXX_OR_NULL with PTR_TO_XXX | PTR_MAYBE_NULL" + "CVE-2017-18261": { + "cmt_msg": "clocksource/drivers/arm_arch_timer: Avoid infinite recursion when ftrace is enabled" }, - "CVE-2020-25669": { - "cmt_msg": "Input: sunkbd - avoid use-after-free in teardown paths" + "CVE-2018-5814": { + "cmt_msg": "usbip: usbip_host: fix NULL-ptr deref and use-after-free errors" }, - "CVE-2020-25668": { - "cmt_msg": "tty: make FONTX ioctl use the tty pointer they were actually passed" + "CVE-2021-43389": { + "cmt_msg": "isdn: cpai: check ctr->cnr to avoid array index out of bound" }, - "CVE-2008-4609": { - "cmt_msg": "" + "CVE-2023-1074": { + "cmt_msg": "sctp: fail if no bound addresses can be used for a given scope" }, - "CVE-2020-25705": { - "cmt_msg": "icmp: randomize the global rate limiter" + "CVE-2023-1076": { + "cmt_msg": "tun: tun_chr_open(): correctly initialize socket uid" }, - "CVE-2023-52458": { - "cmt_msg": "block: add check that partition length needs to be aligned with block size" + "CVE-2023-1077": { + "cmt_msg": "sched/rt: pick_next_rt_entity(): check list_entry" }, "CVE-2023-40283": { "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb" }, - "CVE-2022-0435": { - "cmt_msg": "tipc: improve size validations for received domain records" + "CVE-2023-1073": { + "cmt_msg": "HID: check empty report_list in hid_validate_values()" }, - "CVE-2022-20565": { - "cmt_msg": "HID: core: Correctly handle ReportSize being zero" + "CVE-2018-13093": { + "cmt_msg": "xfs: validate cached inodes are free when allocated" }, - "CVE-2022-1419": { - "cmt_msg": "drm/vgem: Close use-after-free race in vgem_gem_create" + "CVE-2018-13096": { + "cmt_msg": "f2fs: fix to do sanity check with node footer and iblocks" }, - "CVE-2018-1120": { - "cmt_msg": "proc: do not access cmdline nor environ from file-backed areas" + "CVE-2018-13097": { + "cmt_msg": "f2fs: fix to do sanity check with user_block_count" }, - "CVE-2018-25020": { - "cmt_msg": "bpf: fix truncated jump targets on heavy expansions" + "CVE-2018-13094": { + "cmt_msg": "xfs: don't call xfs_da_shrink_inode with NULL bp" }, - "CVE-2022-3533": { - "cmt_msg": "" + "CVE-2018-13095": { + "cmt_msg": "xfs: More robust inode extent count validation" }, - "CVE-2023-26607": { - "cmt_msg": "ntfs: fix out-of-bounds read in ntfs_attr_find()" + "CVE-2018-13098": { + "cmt_msg": "f2fs: fix to do sanity check with extra_attr feature" }, - "CVE-2018-20855": { - "cmt_msg": "IB/mlx5: Fix leaking stack memory to userspace" + "CVE-2018-13099": { + "cmt_msg": "f2fs: fix to do sanity check with reserved blkaddr of inline inode" }, - "CVE-2019-15239": { - "cmt_msg": "unknown" + "CVE-2019-19770": { + "cmt_msg": "blktrace: fix debugfs use after free" }, - "CVE-2017-15129": { - "cmt_msg": "net: Fix double free and memory corruption in get_net_ns_by_id()" + "CVE-2019-11884": { + "cmt_msg": "Bluetooth: hidp: fix buffer overflow" }, - "CVE-2021-4037": { - "cmt_msg": "xfs: fix up non-directory creation in SGID directories" + "CVE-2019-11810": { + "cmt_msg": "scsi: megaraid_sas: return error when create DMA pool failed" }, - "CVE-2021-22543": { - "cmt_msg": "KVM: do not allow mapping valid but non-reference-counted pages" + "CVE-2021-39657": { + "cmt_msg": "scsi: ufs: Correct the LUN used in eh_device_reset_handler() callback" }, - "CVE-2022-45884": { + "CVE-2019-18683": { + "cmt_msg": "media: vivid: Fix wrong locking that causes race conditions on streaming stop" + }, + "CVE-2019-18680": { "cmt_msg": "" }, - "CVE-2019-1999": { - "cmt_msg": "binder: fix race between munmap() and direct reclaim" + "CVE-2021-45868": { + "cmt_msg": "quota: check block number when reading the block in quota file" }, - "CVE-2018-1065": { - "cmt_msg": "netfilter: add back stackpointer size checks" + "CVE-2022-20158": { + "cmt_msg": "net/packet: fix slab-out-of-bounds access in packet_recvmsg()" }, - "CVE-2023-20941": { - "cmt_msg": "" + "CVE-2020-0404": { + "cmt_msg": "media: uvcvideo: Avoid cyclic entity chains due to malformed USB descriptors" }, - "CVE-2018-1066": { - "cmt_msg": "CIFS: Enable encryption during session setup phase" + "CVE-2022-39188": { + "cmt_msg": "mmu_gather: Force tlb-flush VM_PFNMAP vmas" }, - "CVE-2018-20836": { - "cmt_msg": "scsi: libsas: fix a race condition when smp task timeout" + "CVE-2020-27067": { + "cmt_msg": "l2tp: fix l2tp_eth module loading" }, - "CVE-2018-1068": { - "cmt_msg": "netfilter: ebtables: CONFIG_COMPAT: don't trust userland offsets" + "CVE-2020-27066": { + "cmt_msg": "xfrm: policy: Fix doulbe free in xfrm_policy_timer" }, - "CVE-2017-17053": { - "cmt_msg": "x86/mm: Fix use-after-free of ldt_struct" + "CVE-2020-27068": { + "cmt_msg": "cfg80211: add missing policy for NL80211_ATTR_STATUS_CODE" }, - "CVE-2017-17052": { - "cmt_msg": "fork: fix incorrect fput of ->exe_file causing use-after-free" + "CVE-2024-23307": { + "cmt_msg": "md/raid5: fix atomicity violation in raid5_cache_count" }, - "CVE-2020-0030": { - "cmt_msg": "ANDROID: binder: synchronize_rcu() when using POLLFREE." + "CVE-2017-0861": { + "cmt_msg": "ALSA: pcm: prevent UAF in snd_pcm_info" }, - "CVE-2020-10135": { - "cmt_msg": "Bluetooth: Consolidate encryption handling in hci_encrypt_cfm" + "CVE-2020-15393": { + "cmt_msg": "usb: usbtest: fix missing kfree(dev->buf) in usbtest_disconnect" }, - "CVE-2020-25285": { - "cmt_msg": "mm/hugetlb: fix a race between hugetlb sysctl handlers" + "CVE-2021-3564": { + "cmt_msg": "Bluetooth: fix the erroneous flush_work() order" }, - "CVE-2019-7308": { - "cmt_msg": "bpf: fix sanitation of alu op with pointer / scalar type from different paths" + "CVE-2017-13080": { + "cmt_msg": "mac80211: accept key reinstall without changing anything" }, - "CVE-2016-8405": { - "cmt_msg": "fbdev: color map copying bounds checking" + "CVE-2018-12127": { + "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" }, - "CVE-2018-1000199": { - "cmt_msg": "perf/hwbp: Simplify the perf-hwbp code, fix documentation" + "CVE-2018-12126": { + "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" }, - "CVE-2022-1966": { - "cmt_msg": "netfilter: nf_tables: disallow non-stateful expression in sets earlier" + "CVE-2021-28964": { + "cmt_msg": "btrfs: fix race when cloning extent buffer during rewind of an old root" }, - "CVE-2023-31084": { - "cmt_msg": "media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*()" + "CVE-2019-13631": { + "cmt_msg": "Input: gtco - bounds check collection indent level" }, - "CVE-2017-9986": { - "cmt_msg": "sound: Retire OSS" + "CVE-2018-12233": { + "cmt_msg": "jfs: Fix inconsistency between memory allocation and ea_buf->max_size" }, - "CVE-2017-9985": { - "cmt_msg": "ALSA: msnd: Optimize / harden DSP and MIDI loops" + "CVE-2018-12232": { + "cmt_msg": "socket: close race condition between sock_close() and sockfs_setattr()" }, - "CVE-2017-9984": { - "cmt_msg": "ALSA: msnd: Optimize / harden DSP and MIDI loops" + "CVE-2018-9465": { + "cmt_msg": "binder: fix proc->files use-after-free" }, - "CVE-2019-16995": { - "cmt_msg": "net: hsr: fix memory leak in hsr_dev_finalize()" + "CVE-2020-8649": { + "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region" }, - "CVE-2017-18075": { - "cmt_msg": "crypto: pcrypt - fix freeing pcrypt instances" + "CVE-2020-8648": { + "cmt_msg": "vt: selection, close sel_buffer race" }, - "CVE-2022-3534": { - "cmt_msg": "libbpf: Fix use-after-free in btf_dump_name_dups" + "CVE-2020-8647": { + "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region" }, - "CVE-2023-34256": { - "cmt_msg": "ext4: avoid a potential slab-out-of-bounds in ext4_group_desc_csum" + "CVE-2019-0155": { + "cmt_msg": "drm/i915: Rename gen7 cmdparser tables" }, - "CVE-2020-36516": { - "cmt_msg": "ipv4: avoid using shared IP generator for connected sockets" + "CVE-2019-0154": { + "cmt_msg": "drm/i915: Lower RM timeout to avoid DSI hard hangs" }, - "CVE-2020-36766": { - "cmt_msg": "cec-api: prevent leaking memory through hole in structure" + "CVE-2023-35827": { + "cmt_msg": "ravb: Fix use-after-free issue in ravb_tx_timeout_work()" }, - "CVE-2017-18079": { - "cmt_msg": "Input: i8042 - fix crash at boot time" + "CVE-2023-52585": { + "cmt_msg": "drm/amdgpu: Fix possible NULL dereference in amdgpu_ras_query_error_status_helper()" }, - "CVE-2023-28328": { - "cmt_msg": "media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer()" + "CVE-2023-52584": { + "cmt_msg": "spmi: mediatek: Fix UAF on device remove" }, - "CVE-2023-0386": { - "cmt_msg": "ovl: fail on invalid uid/gid mapping at copy up" + "CVE-2023-52587": { + "cmt_msg": "IB/ipoib: Fix mcast list locking" }, - "CVE-2023-6121": { - "cmt_msg": "nvmet: nul-terminate the NQNs passed in the connect command" + "CVE-2023-52586": { + "cmt_msg": "drm/msm/dpu: Add mutex lock in control vblank irq" }, - "CVE-2017-13693": { - "cmt_msg": "" + "CVE-2023-52583": { + "cmt_msg": "ceph: fix deadlock or deadcode of misusing dget()" }, - "CVE-2017-13695": { - "cmt_msg": "ACPICA: acpi: acpica: fix acpi operand cache leak in nseval.c" + "CVE-2023-52589": { + "cmt_msg": "media: rkisp1: Fix IRQ disable race issue" }, - "CVE-2017-13694": { - "cmt_msg": "" + "CVE-2023-52588": { + "cmt_msg": "f2fs: fix to tag gcing flag on page during block migration" }, - "CVE-2021-4149": { - "cmt_msg": "btrfs: unlock newly allocated extent buffer after error" + "CVE-2023-52340": { + "cmt_msg": "ipv6: remove max_size check inline with ipv4" }, - "CVE-2022-21385": { - "cmt_msg": "net/rds: fix warn in rds_message_alloc_sgs" + "CVE-2021-46969": { + "cmt_msg": "bus: mhi: core: Fix invalid error returning in mhi_queue" }, - "CVE-2021-3864": { - "cmt_msg": "" + "CVE-2020-16120": { + "cmt_msg": "ovl: switch to mounter creds in readdir" }, - "CVE-2021-3640": { - "cmt_msg": "Bluetooth: sco: Fix lock_sock() blockage by memcpy_from_msg()" + "CVE-2019-17666": { + "cmt_msg": "rtlwifi: Fix potential overflow on P2P code" }, - "CVE-2017-7618": { - "cmt_msg": "crypto: ahash - Fix EINPROGRESS notification callback" + "CVE-2018-15471": { + "cmt_msg": "xen-netback: fix input validation in xenvif_set_hash_mapping()" }, - "CVE-2020-1749": { - "cmt_msg": "net: ipv6_stub: use ip6_dst_lookup_flow instead of ip6_dst_lookup" + "CVE-2021-34693": { + "cmt_msg": "can: bcm: fix infoleak in struct bcm_msg_head" }, - "CVE-2022-42896": { - "cmt_msg": "Bluetooth: L2CAP: Fix accepting connection request for invalid SPSM" + "CVE-2020-11494": { + "cmt_msg": "slcan: Don't transmit uninitialized stack data in padding" }, - "CVE-2021-3760": { - "cmt_msg": "nfc: nci: fix the UAF of rf_conn_info object" + "CVE-2024-26797": { + "cmt_msg": "drm/amd/display: Prevent potential buffer overflow in map_hw_resources" }, - "CVE-2022-36123": { - "cmt_msg": "x86: Clear .brk area at early boot" + "CVE-2024-26791": { + "cmt_msg": "btrfs: dev-replace: properly validate device names" }, - "CVE-2020-11608": { - "cmt_msg": "media: ov519: add missing endpoint sanity checks" + "CVE-2024-26793": { + "cmt_msg": "gtp: fix use-after-free and null-ptr-deref in gtp_newlink()" }, - "CVE-2020-10732": { - "cmt_msg": "fs/binfmt_elf.c: allocate initialized memory in fill_thread_core_info()" + "CVE-2022-30594": { + "cmt_msg": "ptrace: Check PTRACE_O_SUSPEND_SECCOMP permission on PTRACE_SEIZE" }, - "CVE-2020-28097": { - "cmt_msg": "vgacon: remove software scrollback support" + "CVE-2024-26798": { + "cmt_msg": "fbcon: always restore the old font data in fbcon_do_set_font()" }, - "CVE-2017-7616": { - "cmt_msg": "mm/mempolicy.c: fix error handling in set_mempolicy and mbind." + "CVE-2021-38204": { + "cmt_msg": "usb: max-3421: Prevent corruption of freed memory" }, - "CVE-2023-6931": { - "cmt_msg": "perf: Fix perf_event_validate_size()" + "CVE-2021-38205": { + "cmt_msg": "net: xilinx_emaclite: Do not print real IOMEM pointer" }, - "CVE-2017-18216": { - "cmt_msg": "ocfs2: subsystem.su_mutex is required while accessing the item->ci_parent" + "CVE-2020-0255": { + "cmt_msg": "selinux: properly handle multiple messages in selinux_netlink_send()" }, - "CVE-2017-1000112": { - "cmt_msg": "udp: consistently apply ufo or fragmentation" + "CVE-2023-35001": { + "cmt_msg": "netfilter: nf_tables: prevent OOB access in nft_byteorder_eval" }, - "CVE-2017-1000111": { - "cmt_msg": "packet: fix tp_reserve race in packet_set_ring" + "CVE-2022-27666": { + "cmt_msg": "esp: Fix possible buffer overflow in ESP transformation" }, - "CVE-2024-24855": { - "cmt_msg": "scsi: lpfc: Fix a possible data race in lpfc_unregister_fcf_rescan()" + "CVE-2021-38208": { + "cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect" }, - "CVE-2019-9466": { - "cmt_msg": "brcmfmac: add subtype check for event handling in data path" + "CVE-2018-7995": { + "cmt_msg": "x86/MCE: Serialize sysfs changes" }, - "CVE-2017-18218": { - "cmt_msg": "net: hns: Fix a skb used after free bug" + "CVE-2017-18232": { + "cmt_msg": "scsi: libsas: direct call probe and destruct" }, - "CVE-2017-7533": { - "cmt_msg": "dentry name snapshots" + "CVE-2022-0168": { + "cmt_msg": "cifs: fix NULL ptr dereference in smb2_ioctl_query_info()" }, - "CVE-2018-8897": { - "cmt_msg": "x86/entry/64: Don't use IST entry for #BP stack" + "CVE-2020-26556": { + "cmt_msg": "" }, - "CVE-2021-29265": { - "cmt_msg": "usbip: fix stub_dev usbip_sockfd_store() races leading to gpf" + "CVE-2018-9518": { + "cmt_msg": "NFC: llcp: Limit size of SDP URI" }, - "CVE-2021-39648": { - "cmt_msg": "usb: gadget: configfs: Fix use-after-free issue with udc_name" + "CVE-2024-26778": { + "cmt_msg": "fbdev: savage: Error out if pixclock equals zero" }, - "CVE-2022-3545": { - "cmt_msg": "nfp: fix use-after-free in area_cache_get()" + "CVE-2020-26555": { + "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical" }, - "CVE-2022-3542": { - "cmt_msg": "bnx2x: fix potential memory leak in bnx2x_tpa_stop()" + "CVE-2024-26776": { + "cmt_msg": "spi: hisi-sfc-v3xx: Return IRQ_NONE if no interrupts were detected" }, - "CVE-2020-14416": { - "cmt_msg": "can, slip: Protect tty->disc_data in write_wakeup and close with RCU" + "CVE-2024-26777": { + "cmt_msg": "fbdev: sis: Error out if pixclock equals zero" + }, + "CVE-2020-26558": { + "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical" }, - "CVE-2019-0136": { - "cmt_msg": "mac80211: drop robust management frames from unknown TA" + "CVE-2023-3390": { + "cmt_msg": "netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE" }, - "CVE-2017-17975": { - "cmt_msg": "media: usbtv: prevent double free in error case" + "CVE-2023-3397": { + "cmt_msg": "" }, - "CVE-2019-16921": { - "cmt_msg": "RDMA/hns: Fix init resp when alloc ucontext" + "CVE-2024-26773": { + "cmt_msg": "ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found()" }, - "CVE-2019-19377": { - "cmt_msg": "btrfs: Don't submit any btree write bio if the fs has errors" + "CVE-2024-26770": { + "cmt_msg": "HID: nvidia-shield: Add missing null pointer checks to LED initialization" }, - "CVE-2021-21781": { - "cmt_msg": "ARM: ensure the signal page contains defined contents" + "CVE-2024-26771": { + "cmt_msg": "dmaengine: ti: edma: Add some null pointer checks to the edma_probe" }, - "CVE-2021-0512": { - "cmt_msg": "HID: make arrays usage and value to be the same" + "CVE-2017-18549": { + "cmt_msg": "scsi: aacraid: Don't copy uninitialized stack memory to userspace" }, - "CVE-2018-14634": { - "cmt_msg": "exec: Limit arg stack to at most 75% of _STK_LIM" + "CVE-2023-28746": { + "cmt_msg": "x86/mmio: Disable KVM mitigation when X86_FEATURE_CLEAR_CPU_BUF is set" }, - "CVE-2018-14633": { - "cmt_msg": "scsi: target: iscsi: Use hex2bin instead of a re-implementation" + "CVE-2017-5754": { + "cmt_msg": "x86/cpufeatures: Add Intel feature bits for Speculation Control" }, - "CVE-2018-12896": { - "cmt_msg": "posix-timers: Sanitize overrun handling" + "CVE-2021-47119": { + "cmt_msg": "ext4: fix memory leak in ext4_fill_super" }, - "CVE-2023-1382": { - "cmt_msg": "tipc: set con sock in tipc_conn_alloc" + "CVE-2017-5753": { + "cmt_msg": "x86/cpufeatures: Add X86_BUG_SPECTRE_V[12]" }, - "CVE-2019-19073": { - "cmt_msg": "ath9k_htc: release allocated buffer if timed out" + "CVE-2024-1086": { + "cmt_msg": "netfilter: nf_tables: reject QUEUE/DROP verdict parameters" }, - "CVE-2018-14734": { - "cmt_msg": "infiniband: fix a possible use-after-free bug" + "CVE-2019-9466": { + "cmt_msg": "brcmfmac: add subtype check for event handling in data path" }, - "CVE-2017-15306": { - "cmt_msg": "KVM: PPC: Fix oops when checking KVM_CAP_PPC_HTM" + "CVE-2022-0382": { + "cmt_msg": "net ticp:fix a kernel-infoleak in __tipc_sendmsg()" }, - "CVE-2020-0347": { - "cmt_msg": "" + "CVE-2023-32233": { + "cmt_msg": "netfilter: nf_tables: deactivate anonymous set from preparation phase" }, - "CVE-2022-41222": { - "cmt_msg": "mm/mremap: hold the rmap lock in write mode when moving page table entries." + "CVE-2019-15222": { + "cmt_msg": "ALSA: usb-audio: Fix gpf in snd_usb_pipe_sanity_check" }, - "CVE-2018-8822": { - "cmt_msg": "staging: ncpfs: memory corruption in ncp_read_kernel()" + "CVE-2019-15223": { + "cmt_msg": "ALSA: line6: Assure canceling delayed work at disconnection" }, - "CVE-2021-40490": { - "cmt_msg": "ext4: fix race writing to an inline_data file while its xattrs are changing" + "CVE-2019-15220": { + "cmt_msg": "p54usb: Fix race between disconnect and firmware loading" }, - "CVE-2021-33909": { - "cmt_msg": "seq_file: disallow extremely large seq buffer allocations" + "CVE-2019-15221": { + "cmt_msg": "ALSA: line6: Fix write on zero-sized buffer" }, - "CVE-2016-9755": { - "cmt_msg": "netfilter: ipv6: nf_defrag: drop mangled skb on ream error" + "CVE-2022-1016": { + "cmt_msg": "netfilter: nf_tables: initialize registers in nft_do_chain()" }, - "CVE-2019-12455": { - "cmt_msg": "clk-sunxi: fix a missing-check bug in sunxi_divs_clk_setup()" + "CVE-2022-1011": { + "cmt_msg": "fuse: fix pipe buffer lifetime for direct_io" }, - "CVE-2019-12456": { - "cmt_msg": "" + "CVE-2022-1012": { + "cmt_msg": "secure_seq: use the 64 bits of the siphash for port offset calculation" }, - "CVE-2023-20569": { - "cmt_msg": "x86/bugs: Increase the x86 bugs vector size to two u32s" + "CVE-2023-52620": { + "cmt_msg": "netfilter: nf_tables: disallow timeout for anonymous sets" }, - "CVE-2022-0812": { - "cmt_msg": "xprtrdma: fix incorrect header size calculations" + "CVE-2023-52621": { + "cmt_msg": "bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers" }, - "CVE-2021-29647": { - "cmt_msg": "net: qrtr: fix a kernel-infoleak in qrtr_recvmsg()" + "CVE-2023-52622": { + "cmt_msg": "ext4: avoid online resizing failures due to oversized flex bg" }, - "CVE-2019-5108": { - "cmt_msg": "mac80211: Do not send Layer 2 Update frame before authorization" + "CVE-2023-52623": { + "cmt_msg": "SUNRPC: Fix a suspicious RCU usage warning" }, - "CVE-2019-17133": { - "cmt_msg": "cfg80211: wext: avoid copying malformed SSIDs" + "CVE-2023-52624": { + "cmt_msg": "drm/amd/display: Wake DMCUB before executing GPINT commands" }, - "CVE-2017-18595": { - "cmt_msg": "tracing: Fix possible double free on failure of allocating trace buffer" + "CVE-2023-52625": { + "cmt_msg": "drm/amd/display: Refactor DMCUB enter/exit idle interface" }, - "CVE-2021-33655": { - "cmt_msg": "fbcon: Disallow setting font bigger than screen size" + "CVE-2023-52628": { + "cmt_msg": "netfilter: nftables: exthdr: fix 4-byte stack OOB write" }, - "CVE-2021-3612": { - "cmt_msg": "Input: joydev - prevent potential read overflow in ioctl" + "CVE-2023-52629": { + "cmt_msg": "sh: push-switch: Reorder cleanup operations to avoid use-after-free bug" }, - "CVE-2017-2636": { - "cmt_msg": "tty: n_hdlc: get rid of racy n_hdlc.tbuf" + "CVE-2018-14617": { + "cmt_msg": "hfsplus: fix NULL dereference in hfsplus_lookup()" }, - "CVE-2017-7487": { - "cmt_msg": "ipx: call ipxitf_put() in ioctl error path" + "CVE-2022-0492": { + "cmt_msg": "cgroup-v1: Require capabilities to set release_agent" }, - "CVE-2019-6974": { - "cmt_msg": "kvm: fix kvm_ioctl_create_device() reference counting (CVE-2019-6974)" + "CVE-2020-12352": { + "cmt_msg": "Bluetooth: A2MP: Fix not initializing all members" }, - "CVE-2022-41850": { - "cmt_msg": "HID: roccat: Fix use-after-free in roccat_read()" + "CVE-2020-12351": { + "cmt_msg": "Bluetooth: L2CAP: Fix calling sk_filter on non-socket based channel" }, - "CVE-2019-19525": { - "cmt_msg": "ieee802154: atusb: fix use-after-free at disconnect" + "CVE-2021-43976": { + "cmt_msg": "mwifiex: Fix skb_over_panic in mwifiex_usb_recv()" }, - "CVE-2022-0168": { - "cmt_msg": "cifs: fix NULL ptr dereference in smb2_ioctl_query_info()" + "CVE-2022-0494": { + "cmt_msg": "block-map: add __GFP_ZERO flag for alloc_page in function bio_copy_kern" }, - "CVE-2023-2985": { - "cmt_msg": "fs: hfsplus: fix UAF issue in hfsplus_put_super" + "CVE-2021-47101": { + "cmt_msg": "asix: fix uninit-value in asix_mdio_read()" }, - "CVE-2020-14390": { - "cmt_msg": "fbcon: remove soft scrollback code" + "CVE-2021-47103": { + "cmt_msg": "inet: fully convert sk->sk_rx_dst to RCU rules" }, - "CVE-2023-4132": { - "cmt_msg": "media: usb: siano: Fix warning due to null work_func_t function pointer" + "CVE-2021-46982": { + "cmt_msg": "f2fs: compress: fix race condition of overwrite vs truncate" }, - "CVE-2020-24502": { + "CVE-2007-3719": { "cmt_msg": "" }, - "CVE-2017-17712": { - "cmt_msg": "net: ipv4: fix for a race condition in raw_sendmsg" + "CVE-2021-46988": { + "cmt_msg": "userfaultfd: release page in error path to avoid BUG_ON" }, - "CVE-2017-17807": { - "cmt_msg": "KEYS: add missing permission check for request_key() destination" + "CVE-2019-19319": { + "cmt_msg": "ext4: protect journal inode's blocks using block_validity" }, - "CVE-2017-10661": { - "cmt_msg": "timerfd: Protect the might cancel mechanism proper" + "CVE-2022-3628": { + "cmt_msg": "wifi: brcmfmac: Fix potential buffer overflow in brcmf_fweh_event_worker()" }, - "CVE-2017-17805": { - "cmt_msg": "crypto: salsa20 - fix blkcipher_walk API usage" + "CVE-2022-3629": { + "cmt_msg": "vsock: Fix memory leak in vsock_connect()" }, - "CVE-2017-7541": { - "cmt_msg": "brcmfmac: fix possible buffer overflow in brcmf_cfg80211_mgmt_tx()" + "CVE-2022-3621": { + "cmt_msg": "nilfs2: fix NULL pointer dereference at nilfs_bmap_lookup_at_level()" }, - "CVE-2019-19527": { - "cmt_msg": "HID: hiddev: do cleanup in failure of opening a device" + "CVE-2022-23960": { + "cmt_msg": "ARM: report Spectre v2 status through sysfs" }, - "CVE-2017-7542": { - "cmt_msg": "ipv6: avoid overflow of offset in ip6_find_1stfragopt" + "CVE-2022-3624": { + "cmt_msg": "bonding: fix reference count leak in balance-alb mode" }, - "CVE-2024-0584": { - "cmt_msg": "ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet" + "CVE-2019-11091": { + "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" }, - "CVE-2020-26141": { - "cmt_msg": "ath10k: Fix TKIP Michael MIC verification for PCIe" + "CVE-2023-4921": { + "cmt_msg": "net: sched: sch_qfq: Fix UAF in qfq_dequeue()" }, - "CVE-2020-0465": { - "cmt_msg": "HID: core: Sanitize event code and type when mapping input" + "CVE-2017-15649": { + "cmt_msg": "packet: in packet_do_bind, test fanout with bind_lock held" }, - "CVE-2020-0305": { - "cmt_msg": "chardev: Avoid potential use-after-free in 'chrdev_open()'" + "CVE-2023-1829": { + "cmt_msg": "net/sched: Retire tcindex classifier" }, - "CVE-2018-3639": { - "cmt_msg": "x86/nospec: Simplify alternative_msr_write()" + "CVE-2019-19227": { + "cmt_msg": "appletalk: Fix potential NULL pointer dereference in unregister_snap_client" }, - "CVE-2021-4218": { - "cmt_msg": "sysctl: pass kernel pointers to ->proc_handler" + "CVE-2024-0775": { + "cmt_msg": "ext4: improve error recovery code paths in __ext4_remount()" }, - "CVE-2019-15902": { - "cmt_msg": "unknown" + "CVE-2020-24394": { + "cmt_msg": "nfsd: apply umask on fs without ACL support" }, - "CVE-2024-25739": { - "cmt_msg": "" + "CVE-2020-14386": { + "cmt_msg": "net/packet: fix overflow in tpacket_rcv" }, - "CVE-2019-20054": { - "cmt_msg": "fs/proc/proc_sysctl.c: fix NULL pointer dereference in put_links" + "CVE-2020-14381": { + "cmt_msg": "futex: Fix inode life-time issue" }, - "CVE-2017-15274": { - "cmt_msg": "KEYS: fix dereferencing NULL payload with nonzero length" + "CVE-2019-19768": { + "cmt_msg": "blktrace: Protect q->blk_trace with RCU" }, - "CVE-2024-0340": { - "cmt_msg": "vhost: use kzalloc() instead of kmalloc() followed by memset()" + "CVE-2022-20141": { + "cmt_msg": "igmp: Add ip_mc_list lock in ip_check_mc_rcu" }, - "CVE-2021-3753": { - "cmt_msg": "vt_kdsetmode: extend console locking" + "CVE-2023-23455": { + "cmt_msg": "net: sched: atm: dont intepret cls results when asked to drop" }, - "CVE-2023-6536": { - "cmt_msg": "" + "CVE-2023-23454": { + "cmt_msg": "net: sched: cbq: dont intepret cls results when asked to drop" }, - "CVE-2019-11135": { - "cmt_msg": "x86/msr: Add the IA32_TSX_CTRL MSR" + "CVE-2022-20148": { + "cmt_msg": "f2fs: fix UAF in f2fs_available_free_memory" }, - "CVE-2019-11810": { - "cmt_msg": "scsi: megaraid_sas: return error when create DMA pool failed" + "CVE-2023-6931": { + "cmt_msg": "perf: Fix perf_event_validate_size()" }, - "CVE-2021-27365": { - "cmt_msg": "scsi: iscsi: Ensure sysfs attributes are limited to PAGE_SIZE" + "CVE-2023-6932": { + "cmt_msg": "ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet" }, - "CVE-2021-27364": { - "cmt_msg": "scsi: iscsi: Restrict sessions and handles to admin capabilities" + "CVE-2018-8781": { + "cmt_msg": "drm: udl: Properly check framebuffer mmap offsets" }, - "CVE-2017-14991": { - "cmt_msg": "scsi: sg: fixup infoleak when using SG_GET_REQUEST_TABLE" + "CVE-2017-15265": { + "cmt_msg": "ALSA: seq: Fix use-after-free at creating a port" }, - "CVE-2020-0431": { - "cmt_msg": "HID: hid-input: clear unmapped usages" + "CVE-2021-0605": { + "cmt_msg": "af_key: pfkey_dump needs parameter validation" }, - "CVE-2022-39842": { - "cmt_msg": "video: fbdev: pxa3xx-gcu: Fix integer overflow in pxa3xx_gcu_write" + "CVE-2018-20961": { + "cmt_msg": "USB: gadget: f_midi: fixing a possible double-free in f_midi" }, - "CVE-2018-17977": { + "CVE-2018-5995": { + "cmt_msg": "printk: hash addresses printed with %p" + }, + "CVE-2022-2153": { + "cmt_msg": "KVM: x86: Avoid theoretical NULL pointer dereference in kvm_irq_delivery_to_apic_fast()" + }, + "CVE-2024-2193": { "cmt_msg": "" }, - "CVE-2023-31081": { + "CVE-2018-12930": { "cmt_msg": "" }, - "CVE-2018-17972": { - "cmt_msg": "proc: restrict kernel stack dumps to root" + "CVE-2018-12931": { + "cmt_msg": "" }, - "CVE-2021-20320": { - "cmt_msg": "s390/bpf: Fix optimizing out zero-extensions" + "CVE-2021-28972": { + "cmt_msg": "PCI: rpadlpar: Fix potential drc_name corruption in store functions" }, - "CVE-2020-28974": { - "cmt_msg": "vt: Disable KD_FONT_OP_COPY" + "CVE-2021-28971": { + "cmt_msg": "perf/x86/intel: Fix a crash caused by zero PEBS status" }, - "CVE-2018-7566": { - "cmt_msg": "ALSA: seq: Fix racy pool initializations" + "CVE-2019-19543": { + "cmt_msg": "media: serial_ir: Fix use-after-free in serial_ir_init_module" }, - "CVE-2020-11725": { - "cmt_msg": "" + "CVE-2020-36780": { + "cmt_msg": "i2c: sprd: fix reference leak when pm_runtime_get_sync fails" }, - "CVE-2022-33742": { - "cmt_msg": "xen/blkfront: force data bouncing when backend is untrusted" + "CVE-2020-36781": { + "cmt_msg": "i2c: imx: fix reference leak when pm_runtime_get_sync fails" }, - "CVE-2022-26490": { - "cmt_msg": "nfc: st21nfca: Fix potential buffer overflows in EVT_TRANSACTION" + "CVE-2021-3732": { + "cmt_msg": "ovl: prevent private clone if bind mount is not allowed" }, - "CVE-2017-5967": { - "cmt_msg": "time: Remove CONFIG_TIMER_STATS" + "CVE-2020-36784": { + "cmt_msg": "i2c: cadence: fix reference leak when pm_runtime_get_sync fails" }, - "CVE-2021-0937": { - "cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write" + "CVE-2017-13166": { + "cmt_msg": "media: v4l2-ioctl.c: use check_fmt for enum/g/s/try_fmt" }, - "CVE-2022-42895": { - "cmt_msg": "Bluetooth: L2CAP: Fix attempting to access uninitialized memory" + "CVE-2018-12207": { + "cmt_msg": "kvm: x86, powerpc: do not allow clearing largepages debugfs entry" }, - "CVE-2021-29264": { - "cmt_msg": "gianfar: fix jumbo packets+napi+rx overrun crash" + "CVE-2022-20369": { + "cmt_msg": "media: v4l2-mem2mem: Apply DST_QUEUE_OFF_BASE on MMAP buffers across ioctls" }, - "CVE-2022-4744": { - "cmt_msg": "tun: avoid double free in tun_free_netdev" + "CVE-2017-13168": { + "cmt_msg": "scsi: sg: mitigate read/write abuse" }, - "CVE-2022-36280": { - "cmt_msg": "drm/vmwgfx: Validate the box size for the snooped cursor" + "CVE-2019-0148": { + "cmt_msg": "i40e: Wrong truncation from u16 to u8" }, - "CVE-2022-1048": { - "cmt_msg": "ALSA: pcm: Fix races among concurrent hw_params and hw_free calls" + "CVE-2019-17075": { + "cmt_msg": "RDMA/cxgb4: Do not dma memory off of the stack" }, - "CVE-2020-0404": { - "cmt_msg": "media: uvcvideo: Avoid cyclic entity chains due to malformed USB descriptors" + "CVE-2023-20588": { + "cmt_msg": "x86/CPU/AMD: Do not leak quotient data after a division by 0" }, - "CVE-2018-20976": { - "cmt_msg": "xfs: clear sb->s_fs_info on mount failure" + "CVE-2019-0147": { + "cmt_msg": "i40e: add num_vectors checker in iwarp handler" }, - "CVE-2023-22995": { - "cmt_msg": "usb: dwc3: dwc3-qcom: Add missing platform_device_put() in dwc3_qcom_acpi_register_core" + "CVE-2019-0145": { + "cmt_msg": "i40e: add num_vectors checker in iwarp handler" }, - "CVE-2024-21803": { - "cmt_msg": "" + "CVE-2022-44034": { + "cmt_msg": "char: pcmcia: remove all the drivers" }, - "CVE-2018-1108": { - "cmt_msg": "random: fix crng_ready() test" + "CVE-2022-44033": { + "cmt_msg": "char: pcmcia: remove all the drivers" }, - "CVE-2018-16276": { - "cmt_msg": "USB: yurex: fix out-of-bounds uaccess in read handler" + "CVE-2022-44032": { + "cmt_msg": "char: pcmcia: remove all the drivers" }, - "CVE-2019-15927": { - "cmt_msg": "ALSA: usb-audio: Avoid access before bLength check in build_audio_procunit()" + "CVE-2021-3609": { + "cmt_msg": "can: bcm: delay release of struct bcm_op after synchronize_rcu()" }, - "CVE-2021-3542": { - "cmt_msg": "" + "CVE-2017-13305": { + "cmt_msg": "KEYS: encrypted: fix buffer overread in valid_master_desc()" }, - "CVE-2019-16413": { - "cmt_msg": "9p: use inode->i_lock to protect i_size_write() under 32-bit" + "CVE-2021-23133": { + "cmt_msg": "net/sctp: fix race condition in sctp_destroy_sock" }, - "CVE-2024-24860": { - "cmt_msg": "Bluetooth: Fix atomicity violation in {min,max}_key_size_set" + "CVE-2019-11478": { + "cmt_msg": "tcp: tcp_fragment() should apply sane memory limits" }, - "CVE-2023-2194": { - "cmt_msg": "i2c: xgene-slimpro: Fix out-of-bounds bug in xgene_slimpro_i2c_xfer()" + "CVE-2019-20095": { + "cmt_msg": "mwifiex: Fix mem leak in mwifiex_tm_cmd" }, - "CVE-2022-1263": { - "cmt_msg": "KVM: avoid NULL pointer dereference in kvm_dirty_ring_push" + "CVE-2019-20096": { + "cmt_msg": "dccp: Fix memleak in __feat_register_sp" }, - "CVE-2017-16650": { - "cmt_msg": "net: qmi_wwan: fix divide by 0 on bad descriptors" + "CVE-2018-6554": { + "cmt_msg": "staging: irda: remove the irda network stack and drivers" }, - "CVE-2020-12653": { - "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_cmd_append_vsie_tlv()" + "CVE-2018-6555": { + "cmt_msg": "staging: irda: remove the irda network stack and drivers" }, - "CVE-2019-7222": { - "cmt_msg": "KVM: x86: work around leak of uninitialized stack contents (CVE-2019-7222)" + "CVE-2019-9213": { + "cmt_msg": "mm: enforce min addr even if capable() in expand_downwards()" }, - "CVE-2017-14051": { - "cmt_msg": "scsi: qla2xxx: Fix an integer overflow in sysfs code" + "CVE-2019-14896": { + "cmt_msg": "libertas: Fix two buffer overflows at parsing bss descriptor" }, - "CVE-2020-12654": { - "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_ret_wmm_get_status()" + "CVE-2019-14897": { + "cmt_msg": "libertas: Fix two buffer overflows at parsing bss descriptor" }, - "CVE-2019-7221": { - "cmt_msg": "KVM: nVMX: unconditionally cancel preemption timer in free_nested (CVE-2019-7221)" + "CVE-2019-14895": { + "cmt_msg": "mwifiex: fix possible heap overflow in mwifiex_process_country_ie()" }, - "CVE-2018-12929": { - "cmt_msg": "" + "CVE-2024-26784": { + "cmt_msg": "pmdomain: arm: Fix NULL dereference on scmi_perf_domain removal" }, - "CVE-2018-12928": { - "cmt_msg": "" + "CVE-2024-26789": { + "cmt_msg": "crypto: arm64/neonbs - fix out-of-bounds access on short input" }, - "CVE-2017-7645": { - "cmt_msg": "nfsd: check for oversized NFSv2/v3 arguments" + "CVE-2017-18222": { + "cmt_msg": "net: hns: fix ethtool_get_strings overflow in hns driver" }, - "CVE-2020-36310": { - "cmt_msg": "KVM: SVM: avoid infinite loop on NPF from bad address" + "CVE-2020-0067": { + "cmt_msg": "f2fs: fix to avoid memory leakage in f2fs_listxattr" }, - "CVE-2020-36313": { - "cmt_msg": "KVM: Fix out of range accesses to memslots" + "CVE-2017-18224": { + "cmt_msg": "ocfs2: ip_alloc_sem should be taken in ocfs2_get_block()" }, - "CVE-2020-35519": { - "cmt_msg": "net/x25: prevent a couple of overflows" + "CVE-2020-26541": { + "cmt_msg": "certs: Add EFI_CERT_X509_GUID support for dbx entries" }, - "CVE-2023-31436": { - "cmt_msg": "net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg" + "CVE-2019-20794": { + "cmt_msg": "" }, - "CVE-2022-33740": { - "cmt_msg": "xen/netfront: fix leaking data in shared pages" + "CVE-2024-26769": { + "cmt_msg": "nvmet-fc: avoid deadlock on delete association path" }, - "CVE-2023-51782": { - "cmt_msg": "net/rose: Fix Use-After-Free in rose_ioctl" + "CVE-2024-26768": { + "cmt_msg": "LoongArch: Change acpi_core_pic[NR_CPUS] to acpi_core_pic[MAX_CORE_PIC]" }, - "CVE-2021-28971": { - "cmt_msg": "perf/x86/intel: Fix a crash caused by zero PEBS status" + "CVE-2021-33061": { + "cmt_msg": "ixgbe: add improvement for MDD response functionality" }, - "CVE-2020-10708": { - "cmt_msg": "" + "CVE-2024-26764": { + "cmt_msg": "fs/aio: Restrict kiocb_set_cancel_fn() to I/O submitted via libaio" }, - "CVE-2020-25673": { - "cmt_msg": "nfc: Avoid endless loops caused by repeated llcp_sock_connect()" + "CVE-2024-26767": { + "cmt_msg": "drm/amd/display: fixed integer types and null check locations" }, - "CVE-2022-0400": { - "cmt_msg": "" + "CVE-2024-26766": { + "cmt_msg": "IB/hfi1: Fix sdma.h tx->num_descs off-by-one error" }, - "CVE-2022-45886": { - "cmt_msg": "media: dvb-core: Fix use-after-free due on race condition at dvb_net" + "CVE-2024-26763": { + "cmt_msg": "dm-crypt: don't modify the data when using authenticated encryption" }, - "CVE-2021-38160": { - "cmt_msg": "virtio_console: Assure used length from device is limited" + "CVE-2017-18551": { + "cmt_msg": "i2c: core-smbus: prevent stack corruption on read I2C_BLOCK_DATA" }, - "CVE-2021-42739": { - "cmt_msg": "media: firewire: firedtv-avc: fix a buffer overflow in avc_ca_pmt()" + "CVE-2017-18550": { + "cmt_msg": "scsi: aacraid: Don't copy uninitialized stack memory to userspace" }, - "CVE-2022-3344": { - "cmt_msg": "KVM: x86: nSVM: harden svm_free_nested against freeing vmcb02 while still in use" + "CVE-2018-18559": { + "cmt_msg": "net/packet: fix a race in packet_bind() and packet_notifier()" }, - "CVE-2022-3111": { - "cmt_msg": "power: supply: wm8350-power: Add missing free in free_charger_irq" + "CVE-2019-9456": { + "cmt_msg": "usb: usbmon: Read text within supplied buffer size" }, - "CVE-2018-5344": { - "cmt_msg": "loop: fix concurrent lo_open/lo_release" + "CVE-2019-9455": { + "cmt_msg": "media: videobuf2-v4l2: drop WARN_ON in vb2_warn_zero_bytesused()" }, - "CVE-2020-12770": { - "cmt_msg": "scsi: sg: add sg_remove_request in sg_write" + "CVE-2022-2978": { + "cmt_msg": "fs: fix UAF/GPF bug in nilfs_mdt_destroy" }, - "CVE-2018-6412": { - "cmt_msg": "fbdev: Fixing arbitrary kernel leak in case FBIOGETCMAP_SPARC in sbusfb_ioctl_helper()." + "CVE-2019-9453": { + "cmt_msg": "f2fs: fix to avoid accessing xattr across the boundary" }, - "CVE-2019-15222": { - "cmt_msg": "ALSA: usb-audio: Fix gpf in snd_usb_pipe_sanity_check" + "CVE-2023-20569": { + "cmt_msg": "x86/bugs: Increase the x86 bugs vector size to two u32s" }, - "CVE-2024-25744": { - "cmt_msg": "x86/coco: Disable 32-bit emulation by default on TDX and SEV" + "CVE-2023-46838": { + "cmt_msg": "xen-netback: don't produce zero-size SKB frags" }, - "CVE-2022-25265": { - "cmt_msg": "" + "CVE-2019-9458": { + "cmt_msg": "media: v4l: event: Prevent freeing event subscriptions while accessed" }, - "CVE-2022-20368": { - "cmt_msg": "net/packet: fix slab-out-of-bounds access in packet_recvmsg()" + "CVE-2023-3090": { + "cmt_msg": "ipvlan:Fix out-of-bounds caused by unclear skb->cb" }, - "CVE-2017-12153": { - "cmt_msg": "nl80211: check for the required netlink attributes presence" + "CVE-2023-45862": { + "cmt_msg": "USB: ene_usb6250: Allocate enough memory for full object" }, - "CVE-2019-19813": { - "cmt_msg": "btrfs: inode: Verify inode mode to avoid NULL pointer dereference" + "CVE-2023-45863": { + "cmt_msg": "kobject: Fix slab-out-of-bounds in fill_kobj_path()" }, - "CVE-2017-12154": { - "cmt_msg": "kvm: nVMX: Don't allow L2 to access the hardware CR8" + "CVE-2020-25704": { + "cmt_msg": "perf/core: Fix a memory leak in perf_event_parse_addr_filter()" }, - "CVE-2020-10773": { - "cmt_msg": "s390/cmm: fix information leak in cmm_timeout_handler()" + "CVE-2020-25705": { + "cmt_msg": "icmp: randomize the global rate limiter" }, - "CVE-2022-21499": { - "cmt_msg": "lockdown: also lock down previous kgdb use" + "CVE-2017-15127": { + "cmt_msg": "userfaultfd: hugetlbfs: remove superfluous page unlock in VM_SHARED case" }, - "CVE-2020-25284": { - "cmt_msg": "rbd: require global CAP_SYS_ADMIN for mapping and unmapping" + "CVE-2017-15126": { + "cmt_msg": "userfaultfd: non-cooperative: fix fork use after free" }, - "CVE-2023-4208": { - "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free" + "CVE-2023-52639": { + "cmt_msg": "KVM: s390: vsie: fix race during shadow creation" }, - "CVE-2017-1000379": { - "cmt_msg": "mm: larger stack guard gap, between vmas" + "CVE-2023-52638": { + "cmt_msg": "can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock" }, - "CVE-2022-3606": { + "CVE-2019-15239": { "cmt_msg": "" }, - "CVE-2023-4206": { - "cmt_msg": "net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free" - }, - "CVE-2023-4207": { - "cmt_msg": "net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free" + "CVE-2017-15129": { + "cmt_msg": "net: Fix double free and memory corruption in get_net_ns_by_id()" }, - "CVE-2023-3640": { - "cmt_msg": "" + "CVE-2022-26373": { + "cmt_msg": "x86/speculation: Add RSB VM Exit protections" }, - "CVE-2017-1000371": { - "cmt_msg": "binfmt_elf: use ELF_ET_DYN_BASE only for PIE" + "CVE-2023-52633": { + "cmt_msg": "um: time-travel: fix time corruption" }, - "CVE-2018-18281": { - "cmt_msg": "mremap: properly flush TLB before releasing the page" + "CVE-2023-52632": { + "cmt_msg": "drm/amdkfd: Fix lock dependency warning with srcu" }, - "CVE-2023-20593": { - "cmt_msg": "x86/cpu/amd: Add a Zenbleed fix" + "CVE-2017-9986": { + "cmt_msg": "sound: Retire OSS" }, - "CVE-2019-18675": { - "cmt_msg": "mmap: introduce sane default mmap limits" + "CVE-2017-9985": { + "cmt_msg": "ALSA: msnd: Optimize / harden DSP and MIDI loops" }, - "CVE-2023-3022": { - "cmt_msg": "ipv6: Use result arg in fib_lookup_arg consistently" + "CVE-2017-9984": { + "cmt_msg": "ALSA: msnd: Optimize / harden DSP and MIDI loops" }, - "CVE-2022-2663": { - "cmt_msg": "netfilter: nf_conntrack_irc: Fix forged IP logic" + "CVE-2017-9059": { + "cmt_msg": "NFSv4: Fix callback server shutdown" }, - "CVE-2020-24503": { - "cmt_msg": "" + "CVE-2021-47135": { + "cmt_msg": "mt76: mt7921: fix possible AOOB issue in mt7921_mcu_tx_rate_report" }, - "CVE-2023-51780": { - "cmt_msg": "atm: Fix Use-After-Free in do_vcc_ioctl" + "CVE-2021-47136": { + "cmt_msg": "net: zero-initialize tc skb extension on allocation" }, - "CVE-2023-0047": { - "cmt_msg": "mm, oom: do not trigger out_of_memory from the #PF" + "CVE-2021-47137": { + "cmt_msg": "net: lantiq: fix memory corruption in RX ring" }, - "CVE-2020-29370": { - "cmt_msg": "mm: slub: add missing TID bump in kmem_cache_alloc_bulk()" + "CVE-2021-47131": { + "cmt_msg": "net/tls: Fix use-after-free after the TLS device goes down and up" }, - "CVE-2019-15219": { - "cmt_msg": "USB: sisusbvga: fix oops in error path of sisusb_probe" + "CVE-2021-47133": { + "cmt_msg": "HID: amd_sfh: Fix memory leak in amd_sfh_work" }, - "CVE-2022-20424": { - "cmt_msg": "io_uring: remove io_identity" + "CVE-2024-26675": { + "cmt_msg": "ppp_async: limit MRU to 64K" }, - "CVE-2022-0850": { - "cmt_msg": "ext4: fix kernel infoleak via ext4_extent_header" + "CVE-2023-0386": { + "cmt_msg": "ovl: fail on invalid uid/gid mapping at copy up" }, - "CVE-2022-20422": { - "cmt_msg": "arm64: fix oops in concurrently setting insn_emulation sysctls" + "CVE-2022-42896": { + "cmt_msg": "Bluetooth: L2CAP: Fix accepting connection request for invalid SPSM" }, - "CVE-2017-5549": { - "cmt_msg": "USB: serial: kl5kusb105: fix line-state error handling" + "CVE-2022-42895": { + "cmt_msg": "Bluetooth: L2CAP: Fix attempting to access uninitialized memory" }, - "CVE-2017-5547": { - "cmt_msg": "HID: corsair: fix DMA buffers on stack" + "CVE-2022-48626": { + "cmt_msg": "moxart: fix potential use-after-free on remove path" }, - "CVE-2017-5546": { - "cmt_msg": "mm/slab.c: fix SLAB freelist randomization duplicate entries" + "CVE-2022-48627": { + "cmt_msg": "vt: fix memory overlapping when deleting chars in the buffer" }, - "CVE-2023-4387": { - "cmt_msg": "net: vmxnet3: fix possible use-after-free bugs in vmxnet3_rq_alloc_rx_buf()" + "CVE-2022-48628": { + "cmt_msg": "ceph: drop messages from MDS when unmounting" }, - "CVE-2024-24858": { + "CVE-2024-24859": { "cmt_msg": "" }, - "CVE-2019-19378": { + "CVE-2017-1000112": { + "cmt_msg": "udp: consistently apply ufo or fragmentation" + }, + "CVE-2017-1000111": { + "cmt_msg": "packet: fix tp_reserve race in packet_set_ring" + }, + "CVE-2024-24855": { + "cmt_msg": "scsi: lpfc: Fix a possible data race in lpfc_unregister_fcf_rescan()" + }, + "CVE-2024-24857": { "cmt_msg": "" }, - "CVE-2020-4788": { - "cmt_msg": "powerpc/64s: flush L1D on kernel entry" + "CVE-2019-3892": { + "cmt_msg": "coredump: fix race condition between mmget_not_zero()/get_task_mm() and core dumping" }, - "CVE-2022-36879": { - "cmt_msg": "xfrm: xfrm_policy: fix a possible double xfrm_pols_put() in xfrm_bundle_lookup()" + "CVE-2021-29264": { + "cmt_msg": "gianfar: fix jumbo packets+napi+rx overrun crash" }, - "CVE-2017-8831": { - "cmt_msg": "[media] saa7164: fix double fetch PCIe access condition" + "CVE-2021-29265": { + "cmt_msg": "usbip: fix stub_dev usbip_sockfd_store() races leading to gpf" }, - "CVE-2021-39698": { - "cmt_msg": "wait: add wake_up_pollfree()" + "CVE-2022-3545": { + "cmt_msg": "nfp: fix use-after-free in area_cache_get()" }, - "CVE-2022-45934": { - "cmt_msg": "Bluetooth: L2CAP: Fix u8 overflow" + "CVE-2022-3542": { + "cmt_msg": "bnx2x: fix potential memory leak in bnx2x_tpa_stop()" }, - "CVE-2018-5333": { - "cmt_msg": "RDS: null pointer dereference in rds_atomic_free_op" + "CVE-2021-21781": { + "cmt_msg": "ARM: ensure the signal page contains defined contents" }, - "CVE-2018-5332": { - "cmt_msg": "RDS: Heap OOB write in rds_message_alloc_sgs()" + "CVE-2023-1838": { + "cmt_msg": "Fix double fget() in vhost_net_set_backend()" }, - "CVE-2022-2380": { - "cmt_msg": "video: fbdev: sm712fb: Fix crash in smtcfb_read()" + "CVE-2023-1382": { + "cmt_msg": "tipc: set con sock in tipc_conn_alloc" }, - "CVE-2017-7482": { - "cmt_msg": "rxrpc: Fix several cases where a padded len isn't checked in ticket decode" + "CVE-2018-14734": { + "cmt_msg": "infiniband: fix a possible use-after-free bug" }, - "CVE-2020-10767": { - "cmt_msg": "x86/speculation: Avoid force-disabling IBPB based on STIBP and enhanced IBRS." + "CVE-2017-15306": { + "cmt_msg": "KVM: PPC: Fix oops when checking KVM_CAP_PPC_HTM" }, - "CVE-2021-3759": { - "cmt_msg": "memcg: enable accounting of ipc resources" + "CVE-2018-8822": { + "cmt_msg": "staging: ncpfs: memory corruption in ncp_read_kernel()" }, - "CVE-2019-19447": { - "cmt_msg": "ext4: work around deleting a file with i_nlink == 0 safely" + "CVE-2021-29647": { + "cmt_msg": "net: qrtr: fix a kernel-infoleak in qrtr_recvmsg()" }, - "CVE-2017-17448": { - "cmt_msg": "netfilter: nfnetlink_cthelper: Add missing permission checks" + "CVE-2023-6546": { + "cmt_msg": "tty: n_gsm: fix the UAF caused by race condition in gsm_cleanup_mux" }, - "CVE-2017-17449": { - "cmt_msg": "netlink: Add netns check on taps" + "CVE-2020-14390": { + "cmt_msg": "fbcon: remove soft scrollback code" }, - "CVE-2017-9150": { - "cmt_msg": "bpf: don't let ldimm64 leak map addresses on unprivileged" + "CVE-2021-45469": { + "cmt_msg": "f2fs: fix to do sanity check on last xattr entry in __f2fs_setxattr()" }, - "CVE-2019-19524": { - "cmt_msg": "Input: ff-memless - kill timer in destroy()" + "CVE-2017-7542": { + "cmt_msg": "ipv6: avoid overflow of offset in ip6_find_1stfragopt" }, - "CVE-2019-19448": { - "cmt_msg": "btrfs: only search for left_info if there is no right_info in try_merge_free_space" + "CVE-2024-0584": { + "cmt_msg": "ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet" }, - "CVE-2019-19449": { - "cmt_msg": "f2fs: fix to do sanity check on segment/section count" + "CVE-2020-0465": { + "cmt_msg": "HID: core: Sanitize event code and type when mapping input" }, - "CVE-2023-31085": { - "cmt_msg": "ubi: Refuse attaching if mtd's erasesize is 0" + "CVE-2020-0466": { + "cmt_msg": "do_epoll_ctl(): clean the failure exits up a bit" + }, + "CVE-2024-0340": { + "cmt_msg": "vhost: use kzalloc() instead of kmalloc() followed by memset()" }, "CVE-2019-19523": { "cmt_msg": "USB: adutux: fix use-after-free on disconnect" }, - "CVE-2021-3752": { - "cmt_msg": "Bluetooth: fix use-after-free error in lock_sock_nested()" - }, - "CVE-2017-10663": { - "cmt_msg": "f2fs: sanity check checkpoint segno and blkoff" - }, - "CVE-2017-18360": { - "cmt_msg": "USB: serial: io_ti: fix div-by-zero in set_termios" + "CVE-2019-11135": { + "cmt_msg": "x86/msr: Add the IA32_TSX_CTRL MSR" }, - "CVE-2018-5848": { - "cmt_msg": "wil6210: missing length check in wmi_set_ie" + "CVE-2021-27365": { + "cmt_msg": "scsi: iscsi: Ensure sysfs attributes are limited to PAGE_SIZE" }, - "CVE-2017-18249": { - "cmt_msg": "f2fs: fix race condition in between free nid allocator/initializer" + "CVE-2021-27364": { + "cmt_msg": "scsi: iscsi: Restrict sessions and handles to admin capabilities" }, - "CVE-2017-7261": { - "cmt_msg": "drm/vmwgfx: NULL pointer dereference in vmw_surface_define_ioctl()" + "CVE-2021-27363": { + "cmt_msg": "scsi: iscsi: Restrict sessions and handles to admin capabilities" }, - "CVE-2021-35477": { - "cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4" + "CVE-2021-20320": { + "cmt_msg": "s390/bpf: Fix optimizing out zero-extensions" }, - "CVE-2017-18241": { - "cmt_msg": "f2fs: fix a panic caused by NULL flush_cmd_control" + "CVE-2021-20321": { + "cmt_msg": "ovl: fix missing negative dentry check in ovl_rename()" }, - "CVE-2022-3521": { - "cmt_msg": "kcm: avoid potential race in kcm_tx_work" + "CVE-2022-3169": { + "cmt_msg": "nvme: ensure subsystem reset is single threaded" }, - "CVE-2019-15216": { - "cmt_msg": "USB: yurex: Fix protection fault after device removal" + "CVE-2018-20976": { + "cmt_msg": "xfs: clear sb->s_fs_info on mount failure" }, - "CVE-2022-47929": { - "cmt_msg": "net: sched: disallow noqueue for qdisc classes" + "CVE-2023-22995": { + "cmt_msg": "usb: dwc3: dwc3-qcom: Add missing platform_device_put() in dwc3_qcom_acpi_register_core" }, - "CVE-2019-16746": { - "cmt_msg": "nl80211: validate beacon head" + "CVE-2021-3542": { + "cmt_msg": "" }, - "CVE-2021-41864": { - "cmt_msg": "bpf: Fix integer overflow in prealloc_elems_and_freelist()" + "CVE-2017-16650": { + "cmt_msg": "net: qmi_wwan: fix divide by 0 on bad descriptors" }, - "CVE-2019-15215": { - "cmt_msg": "media: cpia2_usb: first wake up, then free in disconnect" + "CVE-2018-12929": { + "cmt_msg": "" }, - "CVE-2022-2209": { + "CVE-2018-12928": { "cmt_msg": "" }, - "CVE-2018-18021": { - "cmt_msg": "arm64: KVM: Tighten guest core register access from userspace" + "CVE-2020-36310": { + "cmt_msg": "KVM: SVM: avoid infinite loop on NPF from bad address" }, - "CVE-2021-37576": { - "cmt_msg": "KVM: PPC: Book3S: Fix H_RTAS rets buffer overflow" + "CVE-2020-36313": { + "cmt_msg": "KVM: Fix out of range accesses to memslots" }, - "CVE-2019-8980": { - "cmt_msg": "exec: Fix mem leak in kernel_read_file" + "CVE-2020-35519": { + "cmt_msg": "net/x25: prevent a couple of overflows" }, - "CVE-2023-7042": { + "CVE-2020-35513": { + "cmt_msg": "nfsd: fix incorrect umasks" + }, + "CVE-2020-10708": { "cmt_msg": "" }, - "CVE-2021-20317": { - "cmt_msg": "lib/timerqueue: Rely on rbtree semantics for next timer" + "CVE-2018-5344": { + "cmt_msg": "loop: fix concurrent lo_open/lo_release" }, - "CVE-2023-45871": { - "cmt_msg": "igb: set max size RX buffer when store bad packet is enabled" + "CVE-2017-12153": { + "cmt_msg": "nl80211: check for the required netlink attributes presence" }, - "CVE-2023-46343": { - "cmt_msg": "nfc: nci: fix possible NULL pointer dereference in send_acknowledge()" + "CVE-2017-12154": { + "cmt_msg": "kvm: nVMX: Don't allow L2 to access the hardware CR8" }, - "CVE-2022-3594": { - "cmt_msg": "r8152: Rate limit overflow messages" + "CVE-2022-21499": { + "cmt_msg": "lockdown: also lock down previous kgdb use" }, - "CVE-2018-14609": { - "cmt_msg": "btrfs: relocation: Only remove reloc rb_trees if reloc control has been initialized" + "CVE-2023-20593": { + "cmt_msg": "x86/cpu/amd: Add a Zenbleed fix" }, - "CVE-2022-27672": { - "cmt_msg": "x86/speculation: Identify processors vulnerable to SMT RSB predictions" + "CVE-2022-2380": { + "cmt_msg": "video: fbdev: sm712fb: Fix crash in smtcfb_read()" }, - "CVE-2021-33098": { - "cmt_msg": "ixgbe: fix large MTU request from VF" + "CVE-2022-0850": { + "cmt_msg": "ext4: fix kernel infoleak via ext4_extent_header" }, - "CVE-2022-3595": { - "cmt_msg": "cifs: fix double-fault crash during ntlmssp" + "CVE-2019-19447": { + "cmt_msg": "ext4: work around deleting a file with i_nlink == 0 safely" }, - "CVE-2022-38096": { - "cmt_msg": "" + "CVE-2021-3612": { + "cmt_msg": "Input: joydev - prevent potential read overflow in ioctl" }, - "CVE-2023-47233": { - "cmt_msg": "" + "CVE-2019-19448": { + "cmt_msg": "btrfs: only search for left_info if there is no right_info in try_merge_free_space" }, - "CVE-2020-10769": { - "cmt_msg": "crypto: authenc - fix parsing key with misaligned rta_len" + "CVE-2019-19449": { + "cmt_msg": "f2fs: fix to do sanity check on segment/section count" }, - "CVE-2023-6606": { - "cmt_msg": "smb: client: fix OOB in smbCalcSize()" + "CVE-2020-11725": { + "cmt_msg": "" }, - "CVE-2018-5803": { - "cmt_msg": "sctp: verify size of a new chunk in _sctp_make_chunk()" + "CVE-2023-30456": { + "cmt_msg": "KVM: nVMX: add missing consistency checks for CR0 and CR4" }, - "CVE-2020-27815": { - "cmt_msg": "jfs: Fix array index bounds check in dbAdjTree" + "CVE-2021-35477": { + "cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4" }, - "CVE-2021-45486": { - "cmt_msg": "inet: use bigger hash table for IP ID generation" + "CVE-2024-26758": { + "cmt_msg": "md: Don't ignore suspended array in md_check_recovery()" }, - "CVE-2022-1462": { - "cmt_msg": "tty: use new tty_insert_flip_string_and_push_buffer() in pty_write()" + "CVE-2024-26759": { + "cmt_msg": "mm/swap: fix race when skipping swapcache" }, - "CVE-2022-27223": { - "cmt_msg": "USB: gadget: validate endpoint index for xilinx udc" + "CVE-2022-1729": { + "cmt_msg": "perf: Fix sys_perf_event_open() race against self" }, - "CVE-2020-27067": { - "cmt_msg": "l2tp: fix l2tp_eth module loading" + "CVE-2024-26752": { + "cmt_msg": "l2tp: pass correct message length to ip6_append_data" }, - "CVE-2020-27777": { - "cmt_msg": "powerpc/rtas: Restrict RTAS requests from userspace" + "CVE-2024-26754": { + "cmt_msg": "gtp: fix use-after-free and null-ptr-deref in gtp_genl_dump_pdp()" }, - "CVE-2019-20636": { - "cmt_msg": "Input: add safety guards to input_set_keycode()" + "CVE-2024-26756": { + "cmt_msg": "md: Don't register sync_thread for reshape directly" }, - "CVE-2019-11486": { - "cmt_msg": "tty: mark Siemens R3964 line discipline as BROKEN" + "CVE-2024-26757": { + "cmt_msg": "md: Don't ignore read-only array in md_check_recovery()" }, - "CVE-2019-11487": { - "cmt_msg": "fs: prevent page refcount overflow in pipe_buf_get" + "CVE-2021-28038": { + "cmt_msg": "Xen/gnttab: handle p2m update errors on a per-slot basis" }, - "CVE-2018-8043": { - "cmt_msg": "net: phy: mdio-bcm-unimac: fix potential NULL dereference in unimac_mdio_probe()" + "CVE-2020-14305": { + "cmt_msg": "netfilter: helpers: remove data_len usage for inkernel helpers" }, - "CVE-2020-27675": { - "cmt_msg": "xen/events: avoid removing an event channel while handling it" + "CVE-2022-2964": { + "cmt_msg": "net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup" }, - "CVE-2020-28915": { - "cmt_msg": "fbcon: Fix global-out-of-bounds read in fbcon_get_font()" + "CVE-2024-26689": { + "cmt_msg": "ceph: prevent use-after-free in encode_cap_msg()" }, - "CVE-2023-7192": { - "cmt_msg": "netfilter: ctnetlink: fix possible refcount leak in ctnetlink_create_conntrack()" + "CVE-2019-9444": { + "cmt_msg": "printk: hash addresses printed with %p" }, - "CVE-2019-20908": { - "cmt_msg": "efi: Restrict efivar_ssdt_load when the kernel is locked down" + "CVE-2022-2961": { + "cmt_msg": "" }, - "CVE-2023-3776": { - "cmt_msg": "net/sched: cls_fw: Fix improper refcount update leads to use-after-free" + "CVE-2024-26686": { + "cmt_msg": "fs/proc: do_task_stat: use sig->stats_lock to gather the threads/children stats" }, - "CVE-2021-28038": { - "cmt_msg": "Xen/gnttab: handle p2m update errors on a per-slot basis" + "CVE-2024-26687": { + "cmt_msg": "xen/events: close evtchn after mapping cleanup" }, - "CVE-2020-27068": { - "cmt_msg": "cfg80211: add missing policy for NL80211_ATTR_STATUS_CODE" + "CVE-2023-3268": { + "cmt_msg": "relayfs: fix out-of-bounds access in relay_file_read" }, - "CVE-2022-23040": { - "cmt_msg": "xen/xenbus: don't let xenbus_grant_ring() remove grants in error case" + "CVE-2023-45871": { + "cmt_msg": "igb: set max size RX buffer when store bad packet is enabled" }, - "CVE-2021-29154": { - "cmt_msg": "bpf, x86: Validate computation of branch displacements for x86-64" + "CVE-2020-12114": { + "cmt_msg": "make struct mountpoint bear the dentry reference to mountpoint, not struct mount" }, - "CVE-2023-52435": { - "cmt_msg": "net: prevent mss overflow in skb_segment()" + "CVE-2021-4218": { + "cmt_msg": "sysctl: pass kernel pointers to ->proc_handler" }, - "CVE-2023-52434": { - "cmt_msg": "smb: client: fix potential OOBs in smb2_parse_contexts()" + "CVE-2023-0266": { + "cmt_msg": "ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF" }, - "CVE-2021-45469": { - "cmt_msg": "f2fs: fix to do sanity check on last xattr entry in __f2fs_setxattr()" + "CVE-2019-10142": { + "cmt_msg": "drivers/virt/fsl_hypervisor.c: prevent integer overflow in ioctl" }, - "CVE-2023-52436": { - "cmt_msg": "f2fs: explicitly null-terminate the xattr list" + "CVE-2023-52640": { + "cmt_msg": "fs/ntfs3: Fix oob in ntfs_listxattr" }, - "CVE-2019-19060": { - "cmt_msg": "iio: imu: adis16400: release allocated memory on failure" + "CVE-2023-52641": { + "cmt_msg": "fs/ntfs3: Add NULL ptr dereference checking at the end of attr_allocate_frame()" }, - "CVE-2019-19061": { - "cmt_msg": "iio: imu: adis16400: fix memory leak" + "CVE-2021-0399": { + "cmt_msg": "" }, - "CVE-2019-19062": { - "cmt_msg": "crypto: user - fix memory leak in crypto_report" + "CVE-2023-52488": { + "cmt_msg": "serial: sc16is7xx: convert from _raw_ to _noinc_ regmap functions for FIFO" }, - "CVE-2019-19063": { - "cmt_msg": "rtlwifi: prevent memory leak in rtl_usb_probe" + "CVE-2023-52489": { + "cmt_msg": "mm/sparsemem: fix race in accessing memory_section->usage" }, - "CVE-2017-17741": { - "cmt_msg": "KVM: Fix stack-out-of-bounds read in write_mmio" + "CVE-2023-52484": { + "cmt_msg": "iommu/arm-smmu-v3: Fix soft lockup triggered by arm_smmu_mm_invalidate_range" }, - "CVE-2019-9445": { - "cmt_msg": "f2fs: check if file namelen exceeds max value" + "CVE-2020-2732": { + "cmt_msg": "KVM: nVMX: Don't emulate instructions in guest mode" }, - "CVE-2019-19066": { - "cmt_msg": "scsi: bfa: release allocated memory in case of error" + "CVE-2023-52486": { + "cmt_msg": "drm: Don't unref the same fb many times by mistake due to deadlock handling" }, - "CVE-2019-19067": { - "cmt_msg": "drm/amdgpu: fix multiple memory leaks in acp_hw_init" + "CVE-2023-52480": { + "cmt_msg": "ksmbd: fix race condition between session lookup and expire" }, - "CVE-2019-19068": { - "cmt_msg": "rtl8xxxu: prevent leaking urb" + "CVE-2023-52481": { + "cmt_msg": "arm64: errata: Add Cortex-A520 speculative unprivileged load workaround" }, - "CVE-2017-7184": { - "cmt_msg": "xfrm_user: validate XFRM_MSG_NEWAE XFRMA_REPLAY_ESN_VAL replay_window" + "CVE-2023-52482": { + "cmt_msg": "x86/srso: Add SRSO mitigation for Hygon processors" }, - "CVE-2017-7187": { - "cmt_msg": "scsi: sg: check length passed to SG_NEXT_CMD_LEN" + "CVE-2023-4128": { + "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free" }, - "CVE-2020-0435": { - "cmt_msg": "f2fs: fix to do sanity check with i_extra_isize" + "CVE-2021-47128": { + "cmt_msg": "bpf, lockdown, audit: Fix buggy SELinux lockdown permission checks" }, - "CVE-2020-0432": { - "cmt_msg": "staging: most: net: fix buffer overflow" + "CVE-2018-17182": { + "cmt_msg": "mm: get rid of vmacache_flush_all() entirely" }, - "CVE-2020-0433": { - "cmt_msg": "blk-mq: sync the update nr_hw_queues with blk_mq_queue_tag_busy_iter" + "CVE-2021-47122": { + "cmt_msg": "net: caif: fix memory leak in caif_device_notify" }, - "CVE-2023-51779": { - "cmt_msg": "Bluetooth: af_bluetooth: Fix Use-After-Free in bt_sock_recvmsg" + "CVE-2021-47121": { + "cmt_msg": "net: caif: fix memory leak in cfusbl_device_notify" }, - "CVE-2019-3874": { - "cmt_msg": "sctp: implement memory accounting on tx path" + "CVE-2021-47125": { + "cmt_msg": "sch_htb: fix refcount leak in htb_parent_to_leaf_offload" }, - "CVE-2018-10877": { - "cmt_msg": "ext4: verify the depth of extent tree in ext4_find_extent()" + "CVE-2021-47124": { + "cmt_msg": "io_uring: fix link timeout refs" }, - "CVE-2018-10876": { - "cmt_msg": "ext4: only look at the bg_flags field if it is valid" + "CVE-2019-15118": { + "cmt_msg": "ALSA: usb-audio: Fix a stack buffer overflow bug in check_input_term" }, - "CVE-2010-4563": { - "cmt_msg": "" + "CVE-2019-12818": { + "cmt_msg": "net: nfc: Fix NULL dereference on nfc_llcp_build_tlv fails" }, - "CVE-2019-15217": { - "cmt_msg": "media: usb:zr364xx:Fix KASAN:null-ptr-deref Read in zr364xx_vidioc_querycap" + "CVE-2019-12819": { + "cmt_msg": "mdio_bus: Fix use-after-free on device_register fails" }, - "CVE-2020-14331": { - "cmt_msg": "vgacon: Fix for missing check in scrollback handling" + "CVE-2023-0394": { + "cmt_msg": "ipv6: raw: Deduct extension header length in rawv6_push_pending_frames" }, - "CVE-2018-10879": { - "cmt_msg": "ext4: make sure bitmaps and the inode table don't overlap with bg descriptors" + "CVE-2019-19332": { + "cmt_msg": "KVM: x86: fix out-of-bounds write in KVM_GET_EMULATED_CPUID (CVE-2019-19332)" }, - "CVE-2018-10878": { - "cmt_msg": "ext4: always check block group bounds in ext4_init_block_bitmap()" + "CVE-2019-15117": { + "cmt_msg": "ALSA: usb-audio: Fix an OOB bug in parse_audio_mixer_unit" }, - "CVE-2024-23851": { - "cmt_msg": "dm: limit the number of targets and parameter size area" + "CVE-2022-25258": { + "cmt_msg": "USB: gadget: validate interface OS descriptor requests" }, - "CVE-2023-0266": { - "cmt_msg": "ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF" + "CVE-2020-3702": { + "cmt_msg": "ath: Use safer key clearing with key cache entries" }, - "CVE-2023-1838": { - "cmt_msg": "Fix double fget() in vhost_net_set_backend()" + "CVE-2023-3117": { + "cmt_msg": "netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE" }, - "CVE-2021-3483": { - "cmt_msg": "firewire: nosy: Fix a use-after-free bug in nosy_ioctl()" + "CVE-2018-10322": { + "cmt_msg": "xfs: enhance dinode verifier" }, - "CVE-2019-15807": { - "cmt_msg": "scsi: libsas: delete sas port if expander discover failed" + "CVE-2023-3111": { + "cmt_msg": "btrfs: unset reloc control if transaction commit fails in prepare_to_relocate()" }, - "CVE-2022-3169": { - "cmt_msg": "nvme: ensure subsystem reset is single threaded" + "CVE-2024-24860": { + "cmt_msg": "Bluetooth: Fix atomicity violation in {min,max}_key_size_set" }, - "CVE-2017-16913": { - "cmt_msg": "usbip: fix stub_rx: harden CMD_SUBMIT path to handle malicious input" + "CVE-2024-24861": { + "cmt_msg": "media: xc4000: Fix atomicity violation in xc4000_get_frequency" }, - "CVE-2017-16912": { - "cmt_msg": "usbip: fix stub_rx: get_pipe() to validate endpoint number" + "CVE-2019-18675": { + "cmt_msg": "mmap: introduce sane default mmap limits" }, - "CVE-2017-16911": { - "cmt_msg": "usbip: prevent vhci_hcd driver from leaking a socket pointer address" + "CVE-2024-24864": { + "cmt_msg": "" }, - "CVE-2017-0861": { - "cmt_msg": "ALSA: pcm: prevent UAF in snd_pcm_info" + "CVE-2017-15128": { + "cmt_msg": "userfaultfd: hugetlbfs: prevent UFFDIO_COPY to fill beyond the end of i_size" }, - "CVE-2020-25656": { - "cmt_msg": "vt: keyboard, extend func_buf_lock to readers" + "CVE-2017-16647": { + "cmt_msg": "net: usb: asix: fill null-ptr-deref in asix_suspend" }, - "CVE-2017-16914": { - "cmt_msg": "usbip: fix stub_send_ret_submit() vulnerability to null transfer_buffer" + "CVE-2022-36946": { + "cmt_msg": "netfilter: nf_queue: do not allow packet truncation below transport header offset" }, - "CVE-2023-1390": { - "cmt_msg": "tipc: fix NULL deref in tipc_link_xmit()" + "CVE-2018-19824": { + "cmt_msg": "ALSA: usb-audio: Fix UAF decrement if card has no live interfaces in card.c" }, - "CVE-2022-0492": { - "cmt_msg": "cgroup-v1: Require capabilities to set release_agent" + "CVE-2022-21166": { + "cmt_msg": "x86/speculation/mmio: Enable CPU Fill buffer clearing on idle" }, - "CVE-2024-26598": { - "cmt_msg": "KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache" + "CVE-2021-29650": { + "cmt_msg": "netfilter: x_tables: Use correct memory barriers." }, - "CVE-2020-10942": { - "cmt_msg": "vhost: Check docket sk_family instead of call getname" + "CVE-2018-20169": { + "cmt_msg": "USB: check usb_get_extra_descriptor for proper size" }, - "CVE-2019-10142": { - "cmt_msg": "drivers/virt/fsl_hypervisor.c: prevent integer overflow in ioctl" + "CVE-2020-36312": { + "cmt_msg": "KVM: fix memory leak in kvm_io_bus_unregister_dev()" }, - "CVE-2021-4023": { - "cmt_msg": "io-wq: fix cancellation on create-worker failure" + "CVE-2022-28356": { + "cmt_msg": "llc: fix netdevice reference leaks in llc_ui_bind()" }, - "CVE-2017-11176": { - "cmt_msg": "mqueue: fix a use-after-free in sys_mq_notify()" + "CVE-2018-5750": { + "cmt_msg": "ACPI: sbshc: remove raw pointer from printk() message" }, - "CVE-2019-0145": { - "cmt_msg": "i40e: add num_vectors checker in iwarp handler" + "CVE-2017-7558": { + "cmt_msg": "sctp: Avoid out-of-bounds reads from address storage" }, - "CVE-2017-12193": { - "cmt_msg": "assoc_array: Fix a buggy node-splitting case" + "CVE-2022-20166": { + "cmt_msg": "drivers core: Use sysfs_emit and sysfs_emit_at for show(device *...) functions" }, - "CVE-2017-12192": { - "cmt_msg": "KEYS: prevent KEYCTL_READ on negative key" + "CVE-2019-10220": { + "cmt_msg": "Convert filldir[64]() from __put_user() to unsafe_put_user()" }, - "CVE-2021-22555": { - "cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write" + "CVE-2021-44879": { + "cmt_msg": "f2fs: fix to do sanity check on inode type during garbage collection" }, - "CVE-2017-12190": { - "cmt_msg": "fix unbalanced page refcounting in bio_map_user_iov" + "CVE-2020-9383": { + "cmt_msg": "floppy: check FDC index for errors before assigning it" }, - "CVE-2022-1011": { - "cmt_msg": "fuse: fix pipe buffer lifetime for direct_io" + "CVE-2023-1513": { + "cmt_msg": "kvm: initialize all of the kvm_debugregs structure before sending it to userspace" }, - "CVE-2021-0399": { - "cmt_msg": "" + "CVE-2021-26401": { + "cmt_msg": "x86/speculation: Use generic retpoline by default on AMD" }, - "CVE-2020-36691": { - "cmt_msg": "netlink: limit recursion depth in policy validation" + "CVE-2021-3847": { + "cmt_msg": "" }, - "CVE-2023-3111": { - "cmt_msg": "btrfs: unset reloc control if transaction commit fails in prepare_to_relocate()" + "CVE-2019-9445": { + "cmt_msg": "f2fs: check if file namelen exceeds max value" }, - "CVE-2020-2732": { - "cmt_msg": "KVM: nVMX: Don't emulate instructions in guest mode" + "CVE-2019-20934": { + "cmt_msg": "sched/fair: Don't free p->numa_faults with concurrent readers" }, - "CVE-2012-4542": { + "CVE-2011-4916": { "cmt_msg": "" }, - "CVE-2022-1729": { - "cmt_msg": "perf: Fix sys_perf_event_open() race against self" - }, - "CVE-2023-42752": { - "cmt_msg": "igmp: limit igmpv3_newpack() packet size to IP_MAX_MTU" - }, - "CVE-2023-4128": { - "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free" + "CVE-2023-23039": { + "cmt_msg": "" }, - "CVE-2018-1000028": { - "cmt_msg": "nfsd: auth: Fix gid sorting when rootsquash enabled" + "CVE-2017-16646": { + "cmt_msg": "media: dib0700: fix invalid dvb_detach argument" }, - "CVE-2023-1118": { - "cmt_msg": "media: rc: Fix use-after-free bugs caused by ene_tx_irqsim()" + "CVE-2017-16645": { + "cmt_msg": "Input: ims-psu - check if CDC union descriptor is sane" }, - "CVE-2018-7191": { - "cmt_msg": "tun: call dev_get_valid_name() before register_netdevice()" + "CVE-2017-16644": { + "cmt_msg": "media: hdpvr: Fix an error handling path in hdpvr_probe()" }, - "CVE-2024-0607": { - "cmt_msg": "netfilter: nf_tables: fix pointer math issue in nft_byteorder_eval()" + "CVE-2017-16643": { + "cmt_msg": "Input: gtco - fix potential out-of-bound access" }, - "CVE-2018-1000026": { - "cmt_msg": "bnx2x: disable GSO where gso_size is too big for hardware" + "CVE-2019-5489": { + "cmt_msg": "Change mincore() to count \"mapped\" pages rather than \"cached\" pages" }, - "CVE-2022-1975": { - "cmt_msg": "NFC: netlink: fix sleep in atomic bug when firmware download timeout" + "CVE-2017-16649": { + "cmt_msg": "net: cdc_ether: fix divide by 0 on bad descriptors" }, - "CVE-2023-1380": { - "cmt_msg": "wifi: brcmfmac: slab-out-of-bounds read in brcmf_get_assoc_ies()" + "CVE-2017-16648": { + "cmt_msg": "dvb_frontend: don't use-after-free the frontend struct" }, - "CVE-2017-2596": { - "cmt_msg": "kvm: fix page struct leak in handle_vmon" + "CVE-2020-36322": { + "cmt_msg": "fuse: fix bad inode" }, - "CVE-2017-0786": { - "cmt_msg": "brcmfmac: add length check in brcmf_cfg80211_escan_handler()" + "CVE-2020-10711": { + "cmt_msg": "netlabel: cope with NULL catmap" }, - "CVE-2021-28972": { - "cmt_msg": "PCI: rpadlpar: Fix potential drc_name corruption in store functions" + "CVE-2020-35508": { + "cmt_msg": "fork: fix copy_process(CLONE_PARENT) race with the exiting ->real_parent" }, - "CVE-2018-12130": { - "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" + "CVE-2020-35501": { + "cmt_msg": "" }, - "CVE-2020-14305": { - "cmt_msg": "netfilter: helpers: remove data_len usage for inkernel helpers" + "CVE-2021-45095": { + "cmt_msg": "phonet: refcount leak in pep_sock_accep" }, - "CVE-2021-20292": { - "cmt_msg": "drm/ttm/nouveau: don't call tt destroy callback on alloc failure." + "CVE-2024-26685": { + "cmt_msg": "nilfs2: fix potential bug in end_buffer_async_write" }, - "CVE-2017-8066": { - "cmt_msg": "can: gs_usb: Don't use stack memory for USB transfers" + "CVE-2021-32399": { + "cmt_msg": "bluetooth: eliminate the potential race condition when removing the HCI controller" }, - "CVE-2017-8065": { - "cmt_msg": "crypto: ccm - move cbcmac input off the stack" + "CVE-2017-1000410": { + "cmt_msg": "Bluetooth: Prevent stack info leak from the EFS element." }, - "CVE-2017-8064": { - "cmt_msg": "[media] dvb-usb-v2: avoid use-after-free" + "CVE-2022-32250": { + "cmt_msg": "netfilter: nf_tables: disallow non-stateful expression in sets earlier" }, - "CVE-2018-13405": { - "cmt_msg": "Fix up non-directory creation in SGID directories" + "CVE-2021-28688": { + "cmt_msg": "xen-blkback: don't leak persistent grants from xen_blkbk_map()" }, - "CVE-2020-25645": { - "cmt_msg": "geneve: add transport ports in route lookup for geneve" + "CVE-2019-14835": { + "cmt_msg": "vhost: make sure log_num < in_num" }, - "CVE-2018-13406": { - "cmt_msg": "video: uvesafb: Fix integer overflow in allocation" + "CVE-2019-12379": { + "cmt_msg": "consolemap: Fix a memory leaking bug in drivers/tty/vt/consolemap.c" }, - "CVE-2022-1280": { - "cmt_msg": "drm: avoid circular locks in drm_mode_getconnector" + "CVE-2019-12378": { + "cmt_msg": "ipv6_sockglue: Fix a missing-check bug in ip6_ra_control()" }, - "CVE-2023-3772": { - "cmt_msg": "xfrm: add NULL check in xfrm_update_ae_params" + "CVE-2017-18379": { + "cmt_msg": "nvmet-fc: ensure target queue id within range." }, - "CVE-2020-11668": { - "cmt_msg": "media: xirlink_cit: add missing descriptor sanity checks" + "CVE-2020-26145": { + "cmt_msg": "ath10k: drop fragments with multicast DA for PCIe" }, - "CVE-2020-11669": { - "cmt_msg": "powerpc/powernv/idle: Restore AMR/UAMOR/AMOR after idle" + "CVE-2017-13216": { + "cmt_msg": "staging: android: ashmem: fix a race condition in ASHMEM_SET_SIZE ioctl" }, - "CVE-2019-15118": { - "cmt_msg": "ALSA: usb-audio: Fix a stack buffer overflow bug in check_input_term" + "CVE-2020-26147": { + "cmt_msg": "mac80211: assure all fragments are encrypted" }, - "CVE-2019-12818": { - "cmt_msg": "net: nfc: Fix NULL dereference on nfc_llcp_build_tlv fails" + "CVE-2020-26141": { + "cmt_msg": "ath10k: Fix TKIP Michael MIC verification for PCIe" }, - "CVE-2019-12819": { - "cmt_msg": "mdio_bus: Fix use-after-free on device_register fails" + "CVE-2020-26140": { + "cmt_msg": "" }, - "CVE-2023-0394": { - "cmt_msg": "ipv6: raw: Deduct extension header length in rawv6_push_pending_frames" + "CVE-2020-26143": { + "cmt_msg": "" }, - "CVE-2020-10690": { - "cmt_msg": "ptp: fix the race between the release of ptp_clock and cdev" + "CVE-2020-26142": { + "cmt_msg": "" }, - "CVE-2022-36402": { - "cmt_msg": "drm/vmwgfx: Fix shader stage validation" + "CVE-2019-17053": { + "cmt_msg": "ieee802154: enforce CAP_NET_RAW for raw sockets" }, - "CVE-2019-19332": { - "cmt_msg": "KVM: x86: fix out-of-bounds write in KVM_GET_EMULATED_CPUID (CVE-2019-19332)" + "CVE-2019-17052": { + "cmt_msg": "ax25: enforce CAP_NET_RAW for raw sockets" }, - "CVE-2019-15117": { - "cmt_msg": "ALSA: usb-audio: Fix an OOB bug in parse_audio_mixer_unit" + "CVE-2017-14497": { + "cmt_msg": "packet: Don't write vnet header beyond end of buffer" }, - "CVE-2021-3659": { - "cmt_msg": "net: mac802154: Fix general protection fault" + "CVE-2019-17056": { + "cmt_msg": "nfc: enforce CAP_NET_RAW for raw sockets" }, - "CVE-2022-25258": { - "cmt_msg": "USB: gadget: validate interface OS descriptor requests" + "CVE-2019-17055": { + "cmt_msg": "mISDN: enforce CAP_NET_RAW for raw sockets" }, - "CVE-2021-4155": { - "cmt_msg": "xfs: map unwritten blocks in XFS_IOC_{ALLOC,FREE}SP just like fallocate" + "CVE-2019-17054": { + "cmt_msg": "appletalk: enforce CAP_NET_RAW for raw sockets" }, - "CVE-2019-14901": { - "cmt_msg": "mwifiex: Fix heap overflow in mmwifiex_process_tdls_action_frame()" + "CVE-2024-26745": { + "cmt_msg": "powerpc/pseries/iommu: IOMMU table is not initialized for kdump over SR-IOV" }, - "CVE-2021-4150": { - "cmt_msg": "block: fix incorrect references to disk objects" + "CVE-2024-26744": { + "cmt_msg": "RDMA/srpt: Support specifying the srpt_service_guid parameter" }, - "CVE-2020-3702": { - "cmt_msg": "ath: Use safer key clearing with key cache entries" + "CVE-2024-26743": { + "cmt_msg": "RDMA/qedr: Fix qedr_create_user_qp error flow" }, - "CVE-2020-16166": { - "cmt_msg": "random32: update the net random state on interrupt and activity" + "CVE-2024-26740": { + "cmt_msg": "net/sched: act_mirred: use the backlog for mirred ingress" }, - "CVE-2021-3653": { - "cmt_msg": "KVM: nSVM: avoid picking up unsupported bits from L2 in int_ctl (CVE-2021-3653)" + "CVE-2020-29661": { + "cmt_msg": "tty: Fix ->pgrp locking in tiocspgrp()" }, - "CVE-2021-3655": { - "cmt_msg": "sctp: validate from_addr_param return" + "CVE-2020-29660": { + "cmt_msg": "tty: Fix ->session locking" }, - "CVE-2020-8694": { - "cmt_msg": "powercap: restrict energy meter to root access" + "CVE-2022-1734": { + "cmt_msg": "nfc: nfcmrvl: main: reorder destructive operations in nfcmrvl_nci_unregister_dev to avoid bugs" }, - "CVE-2021-4159": { - "cmt_msg": "bpf: Verifer, adjust_scalar_min_max_vals to always call update_reg_bounds()" + "CVE-2024-26748": { + "cmt_msg": "usb: cdns3: fix memory double free when handle zero packet" }, - "CVE-2019-12614": { - "cmt_msg": "powerpc/pseries/dlpar: Fix a missing check in dlpar_parse_cc_property()" + "CVE-2023-28772": { + "cmt_msg": "seq_buf: Fix overflow in seq_buf_putmem_hex()" }, - "CVE-2019-12615": { - "cmt_msg": "mdesc: fix a missing-check bug in get_vdev_port_node_info()" + "CVE-2024-26699": { + "cmt_msg": "drm/amd/display: Fix array-index-out-of-bounds in dcn35_clkmgr" }, - "CVE-2021-3715": { - "cmt_msg": "net_sched: cls_route: remove the right filter from hashtable" + "CVE-2024-26691": { + "cmt_msg": "KVM: arm64: Fix circular locking dependency" }, - "CVE-2021-3714": { - "cmt_msg": "" + "CVE-2022-4269": { + "cmt_msg": "act_mirred: use the backlog for nested calls to mirred ingress" }, - "CVE-2019-16230": { - "cmt_msg": "drm/amdkfd: fix a potential NULL pointer dereference (v2)" + "CVE-2024-26697": { + "cmt_msg": "nilfs2: fix data corruption in dsync block recovery for small block sizes" }, - "CVE-2019-16231": { - "cmt_msg": "fjes: Handle workqueue allocation failure" + "CVE-2024-26696": { + "cmt_msg": "nilfs2: fix hang in nilfs_lookup_dirty_data_buffers()" }, - "CVE-2019-16232": { - "cmt_msg": "libertas: fix a potential NULL pointer dereference" + "CVE-2019-15924": { + "cmt_msg": "fm10k: Fix a potential NULL pointer dereference" }, - "CVE-2019-16233": { - "cmt_msg": "scsi: qla2xxx: fix a potential NULL pointer dereference" + "CVE-2019-15927": { + "cmt_msg": "ALSA: usb-audio: Avoid access before bLength check in build_audio_procunit()" }, - "CVE-2019-16234": { - "cmt_msg": "iwlwifi: pcie: fix rb_allocator workqueue allocation" + "CVE-2019-15926": { + "cmt_msg": "ath6kl: add some bounds checking" }, - "CVE-2019-6133": { - "cmt_msg": "fork: record start_time late" + "CVE-2019-15921": { + "cmt_msg": "genetlink: Fix a memory leak on error path" }, - "CVE-2018-10902": { - "cmt_msg": "ALSA: rawmidi: Change resized buffers atomically" + "CVE-2021-38160": { + "cmt_msg": "virtio_console: Assure used length from device is limited" }, - "CVE-2021-39633": { - "cmt_msg": "ip_gre: add validation for csum_start" + "CVE-2019-15219": { + "cmt_msg": "USB: sisusbvga: fix oops in error path of sisusb_probe" }, - "CVE-2017-18203": { - "cmt_msg": "dm: fix race between dm_get_from_kobject() and __dm_destroy()" + "CVE-2019-15218": { + "cmt_msg": "media: usb: siano: Fix general protection fault in smsusb" }, - "CVE-2017-18202": { - "cmt_msg": "mm, oom_reaper: gather each vma to prevent leaking TLB entry" + "CVE-2005-3660": { + "cmt_msg": "" }, - "CVE-2021-39636": { - "cmt_msg": "netfilter: x_tables: fix pointer leaks to userspace" + "CVE-2017-14106": { + "cmt_msg": "tcp: initialize rcv_mss to TCP_MIN_MSS instead of 0" }, - "CVE-2017-18204": { - "cmt_msg": "ocfs2: should wait dio before inode lock in ocfs2_setattr()" + "CVE-2019-15212": { + "cmt_msg": "USB: rio500: refuse more than one device at a time" }, - "CVE-2020-25643": { - "cmt_msg": "hdlc_ppp: add range checks in ppp_cp_parse_cr()" + "CVE-2019-15211": { + "cmt_msg": "media: radio-raremono: change devm_k*alloc to k*alloc" }, - "CVE-2019-3882": { - "cmt_msg": "vfio/type1: Limit DMA mappings per container" + "CVE-2019-15217": { + "cmt_msg": "media: usb:zr364xx:Fix KASAN:null-ptr-deref Read in zr364xx_vidioc_querycap" }, - "CVE-2017-18208": { - "cmt_msg": "mm/madvise.c: fix madvise() infinite loop under special circumstances" + "CVE-2019-15216": { + "cmt_msg": "USB: yurex: Fix protection fault after device removal" }, - "CVE-2022-33741": { - "cmt_msg": "xen/netfront: force data bouncing when backend is untrusted" + "CVE-2019-15215": { + "cmt_msg": "media: cpia2_usb: first wake up, then free in disconnect" }, - "CVE-2018-20509": { - "cmt_msg": "binder: refactor binder ref inc/dec for thread safety" + "CVE-2019-15214": { + "cmt_msg": "ALSA: core: Fix card races between register and disconnect" }, - "CVE-2024-24864": { - "cmt_msg": "" + "CVE-2019-19922": { + "cmt_msg": "sched/fair: Fix low cpu usage with high throttling by removing expiration of cpu-local slices" }, - "CVE-2022-45885": { - "cmt_msg": "" + "CVE-2019-19927": { + "cmt_msg": "drm/ttm: fix incrementing the page pointer for huge pages" }, - "CVE-2022-33744": { - "cmt_msg": "xen/arm: Fix race in RB-tree based P2M accounting" + "CVE-2023-52498": { + "cmt_msg": "PM: sleep: Fix possible deadlocks in core system-wide PM code" }, - "CVE-2017-9605": { - "cmt_msg": "drm/vmwgfx: Make sure backup_handle is always valid" + "CVE-2022-2318": { + "cmt_msg": "net: rose: fix UAF bugs caused by timer handler" }, - "CVE-2017-18193": { - "cmt_msg": "f2fs: fix a bug caused by NULL extent tree" + "CVE-2023-3611": { + "cmt_msg": "net/sched: sch_qfq: account for stab overhead in qfq_enqueue" }, - "CVE-2022-40768": { - "cmt_msg": "scsi: stex: Properly zero out the passthrough command structure" + "CVE-2023-4132": { + "cmt_msg": "media: usb: siano: Fix warning due to null work_func_t function pointer" }, - "CVE-2019-9454": { - "cmt_msg": "i2c: core-smbus: prevent stack corruption on read I2C_BLOCK_DATA" + "CVE-2020-26560": { + "cmt_msg": "" }, - "CVE-2020-12888": { - "cmt_msg": "vfio-pci: Invalidate mmaps and block MMIO access on disabled memory" + "CVE-2023-4134": { + "cmt_msg": "Input: cyttsp4_core - change del_timer_sync() to timer_shutdown_sync()" }, - "CVE-2017-6214": { - "cmt_msg": "tcp: avoid infinite loop in tcp_splice_read()" + "CVE-2023-37454": { + "cmt_msg": "" }, - "CVE-2023-52445": { - "cmt_msg": "media: pvrusb2: fix use after free on context disconnection" + "CVE-2023-35824": { + "cmt_msg": "media: dm1105: Fix use after free bug in dm1105_remove due to race condition" }, - "CVE-2017-6353": { - "cmt_msg": "sctp: deny peeloff operation on asocs with threads sleeping on it" + "CVE-2022-20572": { + "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag" }, - "CVE-2021-0447": { - "cmt_msg": "l2tp: protect sock pointer of struct pppol2tp_session with RCU" + "CVE-2022-42703": { + "cmt_msg": "mm/rmap: Fix anon_vma->degree ambiguity leading to double-reuse" }, - "CVE-2022-41218": { - "cmt_msg": "media: dvb-core: Fix UAF due to refcount races at releasing" + "CVE-2021-4083": { + "cmt_msg": "fget: check that the fd still exists after getting a ref to it" }, - "CVE-2019-20934": { - "cmt_msg": "sched/fair: Don't free p->numa_faults with concurrent readers" + "CVE-2023-33288": { + "cmt_msg": "power: supply: bq24190: Fix use after free bug in bq24190_remove due to race condition" }, - "CVE-2022-1247": { - "cmt_msg": "" + "CVE-2017-1000251": { + "cmt_msg": "Bluetooth: Properly check L2CAP config option output buffer length" }, - "CVE-2022-36946": { - "cmt_msg": "netfilter: nf_queue: do not allow packet truncation below transport header offset" + "CVE-2017-1000252": { + "cmt_msg": "KVM: VMX: Do not BUG() on out-of-bounds guest IRQ" }, - "CVE-2021-45485": { - "cmt_msg": "ipv6: use prandom_u32() for ID generation" + "CVE-2022-29901": { + "cmt_msg": "x86/kvm/vmx: Make noinstr clean" }, - "CVE-2021-0448": { - "cmt_msg": "netfilter: ctnetlink: add a range check for l3/l4 protonum" + "CVE-2017-1000255": { + "cmt_msg": "powerpc/64s: Use emergency stack for kernel TM Bad Thing program checks" }, - "CVE-2018-19824": { - "cmt_msg": "ALSA: usb-audio: Fix UAF decrement if card has no live interfaces in card.c" + "CVE-2023-52485": { + "cmt_msg": "drm/amd/display: Wake DMCUB before sending a command" }, - "CVE-2022-21166": { - "cmt_msg": "x86/speculation/mmio: Enable CPU Fill buffer clearing on idle" + "CVE-2018-20511": { + "cmt_msg": "net/appletalk: fix minor pointer leak to userspace in SIOCFINDIPDDPRT" }, - "CVE-2020-29374": { - "cmt_msg": "gup: document and work around \"COW can break either way\" issue" + "CVE-2018-20510": { + "cmt_msg": "binder: replace \"%p\" with \"%pK\"" }, - "CVE-2016-9191": { - "cmt_msg": "sysctl: Drop reference added by grab_header in proc_sys_readdir" + "CVE-2022-3567": { + "cmt_msg": "ipv6: Fix data races around sk->sk_prot." }, - "CVE-2023-4134": { - "cmt_msg": "Input: cyttsp4_core - change del_timer_sync() to timer_shutdown_sync()" + "CVE-2022-3566": { + "cmt_msg": "tcp: Fix data races around icsk->icsk_af_ops." }, - "CVE-2018-16862": { - "cmt_msg": "mm: cleancache: fix corruption on missed inode invalidation" + "CVE-2022-3565": { + "cmt_msg": "mISDN: fix use-after-free bugs in l1oip timer handlers" }, - "CVE-2023-52449": { - "cmt_msg": "mtd: Fix gluebi NULL pointer dereference caused by ftl notifier" + "CVE-2022-3564": { + "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free caused by l2cap_reassemble_sdu" }, - "CVE-2021-29650": { - "cmt_msg": "netfilter: x_tables: Use correct memory barriers." + "CVE-2023-0030": { + "cmt_msg": "drm/nouveau/mmu: add more general vmm free/node handling functions" }, - "CVE-2019-18806": { - "cmt_msg": "net: qlogic: Fix memory leak in ql_alloc_large_buffers" + "CVE-2019-11599": { + "cmt_msg": "coredump: fix race condition between mmget_not_zero()/get_task_mm() and core dumping" }, - "CVE-2023-4010": { - "cmt_msg": "" + "CVE-2019-2101": { + "cmt_msg": "media: uvcvideo: Fix 'type' check leading to overflow" }, - "CVE-2018-20169": { - "cmt_msg": "USB: check usb_get_extra_descriptor for proper size" + "CVE-2019-3459": { + "cmt_msg": "Bluetooth: Verify that l2cap_get_conf_opt provides large enough buffer" }, - "CVE-2017-12762": { - "cmt_msg": "isdn/i4l: fix buffer overflow" + "CVE-2020-0444": { + "cmt_msg": "audit: fix error handling in audit_data_to_entry()" }, - "CVE-2018-7754": { - "cmt_msg": "printk: hash addresses printed with %p" + "CVE-2017-16526": { + "cmt_msg": "uwb: properly check kthread_run return value" }, - "CVE-2021-33656": { - "cmt_msg": "vt: drop old FONT ioctls" + "CVE-2017-16527": { + "cmt_msg": "ALSA: usb-audio: Kill stray URB at exiting" }, - "CVE-2020-36558": { - "cmt_msg": "vt: vt_ioctl: fix race in VT_RESIZEX" + "CVE-2017-16525": { + "cmt_msg": "USB: serial: console: fix use-after-free after failed setup" }, - "CVE-2022-41849": { - "cmt_msg": "fbdev: smscufx: Fix use-after-free in ufx_ops_open()" + "CVE-2022-1836": { + "cmt_msg": "floppy: disable FDRAWCMD by default" }, - "CVE-2022-41848": { - "cmt_msg": "" + "CVE-2017-16528": { + "cmt_msg": "ALSA: seq: Cancel pending autoload work at unbinding device" }, - "CVE-2023-6356": { - "cmt_msg": "" + "CVE-2017-16529": { + "cmt_msg": "ALSA: usb-audio: Check out-of-bounds access by corrupted buffer descriptor" }, - "CVE-2022-1353": { - "cmt_msg": "af_key: add __GFP_ZERO flag for compose_sadb_supported in function pfkey_register" + "CVE-2019-2215": { + "cmt_msg": "ANDROID: binder: remove waitqueue when thread exits." }, - "CVE-2022-28356": { - "cmt_msg": "llc: fix netdevice reference leaks in llc_ui_bind()" + "CVE-2019-2213": { + "cmt_msg": "binder: fix possible UAF when freeing buffer" }, - "CVE-2022-1198": { - "cmt_msg": "drivers: hamradio: 6pack: fix UAF bug caused by mod_timer()" + "CVE-2018-1087": { + "cmt_msg": "kvm/x86: fix icebp instruction handling" }, - "CVE-2022-1199": { - "cmt_msg": "ax25: Fix NULL pointer dereference in ax25_kill_by_device" + "CVE-2019-19049": { + "cmt_msg": "of: unittest: fix memory leak in unittest_data_add" }, - "CVE-2018-5750": { - "cmt_msg": "ACPI: sbshc: remove raw pointer from printk() message" + "CVE-2018-13053": { + "cmt_msg": "alarmtimer: Prevent overflow for relative nanosleep" }, - "CVE-2021-39801": { - "cmt_msg": "" + "CVE-2023-23559": { + "cmt_msg": "wifi: rndis_wlan: Prevent buffer overflow in rndis_query_oid" }, - "CVE-2021-39800": { - "cmt_msg": "" + "CVE-2020-10720": { + "cmt_msg": "net-gro: fix use-after-free read in napi_gro_frags()" }, - "CVE-2017-7558": { - "cmt_msg": "sctp: Avoid out-of-bounds reads from address storage" + "CVE-2018-21008": { + "cmt_msg": "rsi: add fix for crash during assertions" }, - "CVE-2018-16884": { - "cmt_msg": "sunrpc: use-after-free in svc_process_common()" + "CVE-2022-20368": { + "cmt_msg": "net/packet: fix slab-out-of-bounds access in packet_recvmsg()" }, - "CVE-2022-1195": { - "cmt_msg": "hamradio: improve the incomplete fix to avoid NPD" + "CVE-2022-3424": { + "cmt_msg": "misc: sgi-gru: fix use-after-free error in gru_set_context_option, gru_fault and gru_handle_user_call_os" }, - "CVE-2024-22099": { - "cmt_msg": "" + "CVE-2019-5108": { + "cmt_msg": "mac80211: Do not send Layer 2 Update frame before authorization" }, - "CVE-2021-4202": { - "cmt_msg": "NFC: reorganize the functions in nci_request" + "CVE-2017-1000405": { + "cmt_msg": "mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d()" }, - "CVE-2021-4203": { - "cmt_msg": "af_unix: fix races in sk_peer_pid and sk_peer_cred accesses" + "CVE-2017-1000407": { + "cmt_msg": "KVM: VMX: remove I/O port 0x80 bypass on Intel hosts" }, - "CVE-2022-45887": { - "cmt_msg": "media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb()" + "CVE-2022-24448": { + "cmt_msg": "NFSv4: Handle case where the lookup of a directory fails" }, - "CVE-2022-23039": { - "cmt_msg": "xen/gntalloc: don't use gnttab_query_foreign_access()" + "CVE-2020-0427": { + "cmt_msg": "pinctrl: devicetree: Avoid taking direct reference to device name string" }, - "CVE-2022-41858": { - "cmt_msg": "drivers: net: slip: fix NPD bug in sl_tx_timeout()" + "CVE-2020-26088": { + "cmt_msg": "net/nfc/rawsock.c: add CAP_NET_RAW check." }, - "CVE-2024-24859": { + "CVE-2008-2544": { "cmt_msg": "" }, - "CVE-2019-10220": { - "cmt_msg": "Convert filldir[64]() from __put_user() to unsafe_put_user()" + "CVE-2019-19462": { + "cmt_msg": "kernel/relay.c: handle alloc_percpu returning NULL in relay_open" }, - "CVE-2023-2124": { - "cmt_msg": "xfs: verify buffer contents when we skip log replay" + "CVE-2023-30772": { + "cmt_msg": "power: supply: da9150: Fix use after free bug in da9150_charger_remove due to race condition" }, - "CVE-2020-26557": { - "cmt_msg": "" + "CVE-2021-3679": { + "cmt_msg": "tracing: Fix bug in rb_per_cpu_empty() that might cause deadloop." }, - "CVE-2021-3609": { - "cmt_msg": "can: bcm: delay release of struct bcm_op after synchronize_rcu()" + "CVE-2022-2586": { + "cmt_msg": "netfilter: nf_tables: do not allow SET_ID to refer to another table" }, - "CVE-2021-44879": { - "cmt_msg": "f2fs: fix to do sanity check on inode type during garbage collection" + "CVE-2021-39714": { + "cmt_msg": "staging: android: ion: Drop ion_map_kernel interface" }, - "CVE-2019-15505": { - "cmt_msg": "media: technisat-usb2: break out of loop at end of buffer" + "CVE-2023-51782": { + "cmt_msg": "net/rose: Fix Use-After-Free in rose_ioctl" }, - "CVE-2023-2513": { - "cmt_msg": "ext4: fix use-after-free in ext4_xattr_set_entry" + "CVE-2023-51780": { + "cmt_msg": "atm: Fix Use-After-Free in do_vcc_ioctl" }, - "CVE-2017-1000": { - "cmt_msg": "udp: consistently apply ufo or fragmentation" + "CVE-2023-51781": { + "cmt_msg": "appletalk: Fix Use-After-Free in atalk_ioctl" }, - "CVE-2020-11609": { - "cmt_msg": "media: stv06xx: add missing descriptor sanity checks" + "CVE-2022-2588": { + "cmt_msg": "net_sched: cls_route: remove from list when handle is 0" }, - "CVE-2020-36385": { - "cmt_msg": "RDMA/ucma: Rework ucma_migrate_id() to avoid races with destroy" + "CVE-2019-18885": { + "cmt_msg": "btrfs: merge btrfs_find_device and find_device" }, - "CVE-2020-0429": { - "cmt_msg": "l2tp: fix race between l2tp_session_delete() and l2tp_tunnel_closeall()" + "CVE-2017-14489": { + "cmt_msg": "scsi: scsi_transport_iscsi: fix the issue that iscsi_if_rx doesn't parse nlmsg properly" }, - "CVE-2020-27066": { - "cmt_msg": "xfrm: policy: Fix doulbe free in xfrm_policy_timer" + "CVE-2024-26733": { + "cmt_msg": "arp: Prevent overflow in arp_req_get()." }, - "CVE-2022-2964": { - "cmt_msg": "net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup" + "CVE-2024-26735": { + "cmt_msg": "ipv6: sr: fix possible use-after-free and null-ptr-deref" }, - "CVE-2017-0605": { - "cmt_msg": "tracing: Use strlcpy() instead of strcpy() in __trace_find_cmdline()" + "CVE-2024-26738": { + "cmt_msg": "powerpc/pseries/iommu: DLPAR add doesn't completely initialize pci_controller" }, - "CVE-2021-1048": { - "cmt_msg": "fix regression in \"epoll: Keep a reference on files added to the check list\"" + "CVE-2024-26739": { + "cmt_msg": "net/sched: act_mirred: don't override retval if we already lost the skb" }, - "CVE-2015-2877": { + "CVE-2022-38096": { "cmt_msg": "" }, - "CVE-2020-9383": { - "cmt_msg": "floppy: check FDC index for errors before assigning it" + "CVE-2017-5715": { + "cmt_msg": "x86/cpufeatures: Add X86_BUG_SPECTRE_V[12]" }, - "CVE-2022-3586": { - "cmt_msg": "sch_sfb: Don't assume the skb is still around after enqueueing to child" + "CVE-2018-3620": { + "cmt_msg": "x86/microcode: Allow late microcode loading with SMT disabled" }, - "CVE-2023-32269": { - "cmt_msg": "netrom: Fix use-after-free caused by accept on already connected socket" + "CVE-2020-16166": { + "cmt_msg": "random32: update the net random state on interrupt and activity" }, - "CVE-2023-1206": { - "cmt_msg": "tcp: Reduce chance of collisions in inet6_hashfn()." + "CVE-2021-33631": { + "cmt_msg": "ext4: fix kernel BUG in 'ext4_write_inline_data_end()'" }, - "CVE-2021-38198": { - "cmt_msg": "KVM: X86: MMU: Use the correct inherited permissions to get shadow page" + "CVE-2019-15916": { + "cmt_msg": "net-sysfs: Fix mem leak in netdev_register_kobject" }, - "CVE-2021-38199": { - "cmt_msg": "NFSv4: Initialise connection to the server in nfs4_alloc_client()" + "CVE-2019-15917": { + "cmt_msg": "Bluetooth: hci_ldisc: Postpone HCI_UART_PROTO_READY bit set in hci_uart_set_proto()" }, - "CVE-2022-1679": { - "cmt_msg": "ath9k: fix use-after-free in ath9k_hif_usb_rx_cb" + "CVE-2017-18344": { + "cmt_msg": "posix-timer: Properly check sigevent->sigev_notify" }, - "CVE-2020-8832": { - "cmt_msg": "drm/i915: Record the default hw state after reset upon load" + "CVE-2024-26648": { + "cmt_msg": "drm/amd/display: Fix variable deferencing before NULL check in edp_setup_replay()" }, - "CVE-2017-5970": { - "cmt_msg": "ipv4: keep skb->dst around in presence of IP options" + "CVE-2024-26646": { + "cmt_msg": "thermal: intel: hfi: Add syscore callbacks for system-wide PM" }, - "CVE-2023-1513": { - "cmt_msg": "kvm: initialize all of the kvm_debugregs structure before sending it to userspace" + "CVE-2018-18690": { + "cmt_msg": "xfs: don't fail when converting shortform attr to long form during ATTR_REPLACE" }, - "CVE-2021-26401": { - "cmt_msg": "x86/speculation: Use generic retpoline by default on AMD" + "CVE-2024-26644": { + "cmt_msg": "btrfs: don't abort filesystem when attempting to snapshot deleted subvolume" }, - "CVE-2021-3847": { - "cmt_msg": "" + "CVE-2024-26642": { + "cmt_msg": "netfilter: nf_tables: disallow anonymous set with timeout flag" }, - "CVE-2018-1130": { - "cmt_msg": "dccp: check sk for closed state in dccp_sendmsg()" + "CVE-2017-0627": { + "cmt_msg": "media: uvcvideo: Prevent heap overflow when accessing mapped controls" }, - "CVE-2023-1077": { - "cmt_msg": "sched/rt: pick_next_rt_entity(): check list_entry" + "CVE-2024-26641": { + "cmt_msg": "ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv()" }, - "CVE-2019-14284": { - "cmt_msg": "floppy: fix div-by-zero in setup_format_params" + "CVE-2018-25020": { + "cmt_msg": "bpf: fix truncated jump targets on heavy expansions" }, - "CVE-2020-36557": { - "cmt_msg": "vt: vt_ioctl: fix VT_DISALLOCATE freeing in-use virtual console" + "CVE-2023-52469": { + "cmt_msg": "drivers/amd/pm: fix a use-after-free in kv_parse_power_table" }, - "CVE-2021-3506": { - "cmt_msg": "f2fs: fix to avoid out-of-bounds memory access" + "CVE-2021-46904": { + "cmt_msg": "net: hso: fix null-ptr-deref during tty device unregistration" }, - "CVE-2011-4917": { - "cmt_msg": "" + "CVE-2018-7273": { + "cmt_msg": "printk: hash addresses printed with %p" }, - "CVE-2011-4916": { - "cmt_msg": "" + "CVE-2022-0617": { + "cmt_msg": "udf: Fix NULL ptr deref when converting from inline format" }, - "CVE-2019-14283": { - "cmt_msg": "floppy: fix out-of-bounds read in copy_buffer" + "CVE-2023-4459": { + "cmt_msg": "net: vmxnet3: fix possible NULL pointer dereference in vmxnet3_rq_cleanup()" }, - "CVE-2019-3900": { - "cmt_msg": "vhost_net: fix possible infinite loop" + "CVE-2022-20566": { + "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free caused by l2cap_chan_put" }, - "CVE-2019-19528": { - "cmt_msg": "USB: iowarrior: fix use-after-free on disconnect" + "CVE-2022-20565": { + "cmt_msg": "HID: core: Correctly handle ReportSize being zero" }, - "CVE-2019-19533": { - "cmt_msg": "media: ttusb-dec: Fix info-leak in ttusb_dec_send_command()" + "CVE-2023-1990": { + "cmt_msg": "nfc: st-nci: Fix use after free bug in ndlc_remove due to race condition" }, - "CVE-2018-13100": { - "cmt_msg": "f2fs: fix to do sanity check with secs_per_zone" + "CVE-2021-33098": { + "cmt_msg": "ixgbe: fix large MTU request from VF" }, - "CVE-2017-16646": { - "cmt_msg": "media: dib0700: fix invalid dvb_detach argument" + "CVE-2022-48619": { + "cmt_msg": "Input: add bounds checking to input_set_capability()" }, - "CVE-2017-16645": { - "cmt_msg": "Input: ims-psu - check if CDC union descriptor is sane" + "CVE-2019-3882": { + "cmt_msg": "vfio/type1: Limit DMA mappings per container" }, - "CVE-2017-16644": { - "cmt_msg": "media: hdpvr: Fix an error handling path in hdpvr_probe()" + "CVE-2018-20509": { + "cmt_msg": "binder: refactor binder ref inc/dec for thread safety" }, - "CVE-2017-16643": { - "cmt_msg": "Input: gtco - fix potential out-of-bound access" + "CVE-2021-47070": { + "cmt_msg": "uio_hv_generic: Fix another memory leak in error handling paths" }, - "CVE-2017-16649": { - "cmt_msg": "net: cdc_ether: fix divide by 0 on bad descriptors" + "CVE-2021-47075": { + "cmt_msg": "nvmet: fix memory leak in nvmet_alloc_ctrl()" }, - "CVE-2023-31083": { - "cmt_msg": "Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO" + "CVE-2021-47074": { + "cmt_msg": "nvme-loop: fix memory leak in nvme_loop_create_ctrl()" }, - "CVE-2019-5489": { - "cmt_msg": "Change mincore() to count \"mapped\" pages rather than \"cached\" pages" + "CVE-2021-47077": { + "cmt_msg": "scsi: qedf: Add pointer checks in qedf_update_link_speed()" }, - "CVE-2024-1312": { - "cmt_msg": "mm: lock_vma_under_rcu() must check vma->anon_vma under vma lock" + "CVE-2021-47076": { + "cmt_msg": "RDMA/rxe: Return CQE error if invalid lkey was supplied" }, - "CVE-2017-16648": { - "cmt_msg": "dvb_frontend: don't use-after-free the frontend struct" + "CVE-2021-47078": { + "cmt_msg": "RDMA/rxe: Clear all QP fields if creation failed" }, - "CVE-2018-10880": { - "cmt_msg": "ext4: never move the system.data xattr out of the inode body" + "CVE-2017-8824": { + "cmt_msg": "dccp: CVE-2017-8824: use-after-free in DCCP code" }, - "CVE-2018-10881": { - "cmt_msg": "ext4: clear i_data in ext4_inode_info when removing inline data" + "CVE-2018-7492": { + "cmt_msg": "rds: Fix NULL pointer dereference in __rds_rdma_map" }, - "CVE-2018-10882": { - "cmt_msg": "ext4: add more inode number paranoia checks" + "CVE-2017-12188": { + "cmt_msg": "KVM: nVMX: update last_nonleaf_level when initializing nested EPT" }, - "CVE-2018-10883": { - "cmt_msg": "jbd2: don't mark block as modified if the handle is out of credits" - } - } - }, - "4.11": { - "4.11": { - "CVE-2017-7477": { - "cmt_msg": "macsec: avoid heap overflow in skb_to_sgvec", - "cmt_id": "4d6fa57b4dab0d77f4d8e9d9c73d1e63f6fe8fee" + "CVE-2018-5848": { + "cmt_msg": "wil6210: missing length check in wmi_set_ie" }, - "CVE-2017-7645": { - "cmt_msg": "nfsd: check for oversized NFSv2/v3 arguments", - "cmt_id": "e6838a29ecb484c97e4efef9429643b9851fba6e" + "CVE-2021-47013": { + "cmt_msg": "net:emac/emac-mac: Fix a use after free in emac_mac_tx_buf_send" }, - "CVE-2017-7895": { - "cmt_msg": "nfsd: stricter decoding of write-like NFSv2/v3 ops", - "cmt_id": "13bf9fbff0e5e099e2b6f003a0ab8ae145436309" - } - }, - "4.11.1": { - "CVE-2017-9150": { - "cmt_msg": "bpf: don't let ldimm64 leak map addresses on unprivileged", - "cmt_id": "ced12308e58cc95002404b584fdc756a233581ab" + "CVE-2019-10638": { + "cmt_msg": "inet: switch IP ID generator to siphash" }, - "CVE-2017-10662": { - "cmt_msg": "f2fs: sanity check segment count", - "cmt_id": "c7f765b5d6bda480ae1aa2bf5734c9613d851f5f" - } - }, - "4.11.3": { - "CVE-2017-18360": { - "cmt_msg": "USB: serial: io_ti: fix div-by-zero in set_termios", - "cmt_id": "3a82455292c2b817031db57f6954f8b7e7b1dd38" + "CVE-2019-10639": { + "cmt_msg": "netns: provide pure entropy for net_hash_mix()" }, - "CVE-2017-7487": { - "cmt_msg": "ipx: call ipxitf_put() in ioctl error path", - "cmt_id": "b13b3f39851681b3e7f0f4ea2fcea4a0e47f4f0a" + "CVE-2024-26676": { + "cmt_msg": "af_unix: Call kfree_skb() for dead unix_(sk)->oob_skb in GC." }, - "CVE-2017-8797": { - "cmt_msg": "nfsd: fix undefined behavior in nfsd4_layout_verify", - "cmt_id": "06cc61e8f9edb5d50156622c0940b32e8cca0f3a" + "CVE-2017-14140": { + "cmt_msg": "Sanitize 'move_pages()' permission checks" }, - "CVE-2017-1000363": { - "cmt_msg": "char: lp: fix possible integer overflow in lp_setup()", - "cmt_id": "28c7411cdbc41396dceff7e1b37dbb659f7bdfb2" - } - }, - "4.11.4": { - "CVE-2017-9077": { - "cmt_msg": "ipv6/dccp: do not inherit ipv6_mc_list from parent", - "cmt_id": "8e929937f8813fb209a2d733ee1367db80b6f622" + "CVE-2020-26557": { + "cmt_msg": "" }, - "CVE-2017-9076": { - "cmt_msg": "ipv6/dccp: do not inherit ipv6_mc_list from parent", - "cmt_id": "8e929937f8813fb209a2d733ee1367db80b6f622" + "CVE-2017-16535": { + "cmt_msg": "USB: core: fix out-of-bounds access bug in usb_get_bos_descriptor()" }, - "CVE-2017-9075": { - "cmt_msg": "sctp: do not inherit ipv6_{mc|ac|fl}_list from parent", - "cmt_id": "703a20827411c3906b644713bc4462d4b3fb6a5f" + "CVE-2017-16534": { + "cmt_msg": "USB: core: harden cdc_parse_cdc_header" }, - "CVE-2017-9074": { - "cmt_msg": "ipv6: Prevent overrun when parsing v6 header options", - "cmt_id": "9909e4e4ff16e3f66b4e33e118621d7fe92fc6d4" + "CVE-2017-16537": { + "cmt_msg": "media: imon: Fix null-ptr-deref in imon_probe" }, - "CVE-2017-9211": { - "cmt_msg": "crypto: skcipher - Add missing API setkey checks", - "cmt_id": "f5eef8d2458bb569ca521b3c2b0a19af62536745" + "CVE-2017-16536": { + "cmt_msg": "[media] cx231xx-cards: fix NULL-deref on missing association descriptor" }, - "CVE-2017-18221": { - "cmt_msg": "mlock: fix mlock count can not decrease in race condition", - "cmt_id": "f814bf465578b4bf2d4ae1329e8f35d89c040d2d" + "CVE-2017-16531": { + "cmt_msg": "USB: fix out-of-bounds in usb_set_configuration" }, - "CVE-2017-8890": { - "cmt_msg": "dccp/tcp: do not inherit mc_list from parent", - "cmt_id": "db8ebc6da8cfd1057dc94e69fbd7a8c5ff34cef6" + "CVE-2017-16530": { + "cmt_msg": "USB: uas: fix bug in handling of alternate settings" }, - "CVE-2017-9242": { - "cmt_msg": "ipv6: fix out of bound writes in __ip6_append_data()", - "cmt_id": "827624c3d1cfd1b569ec2c6593a6a50ab65c72bb" - } - }, - "4.11.5": { - "CVE-2017-9605": { - "cmt_msg": "drm/vmwgfx: Make sure backup_handle is always valid", - "cmt_id": "3bc7a4a5643e79a819ac56132826480d5102d48c" + "CVE-2017-16533": { + "cmt_msg": "HID: usbhid: fix out-of-bounds bug" }, - "CVE-2017-15274": { - "cmt_msg": "KEYS: fix dereferencing NULL payload with nonzero length", - "cmt_id": "5def69023aec63f6d2facb39fde6f4cdf9c12710" + "CVE-2017-16532": { + "cmt_msg": "usb: usbtest: fix NULL pointer dereference" }, - "CVE-2017-7346": { - "cmt_msg": "drm/vmwgfx: limit the number of mip levels in vmw_gb_surface_define_ioctl()", - "cmt_id": "6a6a4857199fb593b2e14621304546977a5acff3" + "CVE-2024-26779": { + "cmt_msg": "wifi: mac80211: fix race condition on enabling fast-xmit" }, - "CVE-2017-1000380": { - "cmt_msg": "ALSA: timer: Fix race between read and ioctl", - "cmt_id": "9018818b2410fcaf51042f1c0315cc4498c6c6e9" - } - }, - "4.11.7": { - "CVE-2017-1000364": { - "cmt_msg": "mm: larger stack guard gap, between vmas", - "cmt_id": "27f9070614aa5f05dc00e06bc288ac9e0ca7d430" + "CVE-2017-16538": { + "cmt_msg": "media: dvb-usb-v2: lmedm04: Improve logic checking of warm start" }, - "CVE-2017-1000379": { - "cmt_msg": "mm: larger stack guard gap, between vmas", - "cmt_id": "27f9070614aa5f05dc00e06bc288ac9e0ca7d430" - } - }, - "4.11.8": { - "CVE-2017-10911": { - "cmt_msg": "xen-blkback: don't leak stack data via response ring", - "cmt_id": "b919d2dc590952b2985e43d03b2724b84e5dc2a0" + "CVE-2018-9517": { + "cmt_msg": "l2tp: pass tunnel pointer to ->session_create()" }, - "CVE-2017-1000365": { - "cmt_msg": "fs/exec.c: account for argv/envp pointers", - "cmt_id": "fed07e89078ddfbdddb2c54f340a934e94bee2b2" + "CVE-2018-9516": { + "cmt_msg": "HID: debug: check length before copy_to_user()" }, - "CVE-2017-7482": { - "cmt_msg": "rxrpc: Fix several cases where a padded len isn't checked in ticket decode", - "cmt_id": "575cd7d4cec3ad0aa13c9d156fbcc3979db6f3ae" + "CVE-2021-20317": { + "cmt_msg": "lib/timerqueue: Rely on rbtree semantics for next timer" }, - "CVE-2017-7518": { - "cmt_msg": "KVM: x86: fix singlestepping over syscall", - "cmt_id": "3af2b32a50c23af81403e6fed880f18e9ae0cb30" - } - }, - "4.11.10": { - "CVE-2017-12146": { - "cmt_msg": "driver core: platform: fix race condition with driver_override", - "cmt_id": "89488f31939230feadf0f2324ed2920888b616de" + "CVE-2024-26772": { + "cmt_msg": "ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal()" }, - "CVE-2017-10810": { - "cmt_msg": "drm/virtio: don't leak bo on drm_gem_object_init failure", - "cmt_id": "a2746d8b78fa470f43de7b3a472f8854fb8fa423" - } - }, - "4.11.11": { - "CVE-2017-11176": { - "cmt_msg": "mqueue: fix a use-after-free in sys_mq_notify()", - "cmt_id": "c353aee3bcd93a7529e5f971ab4dee21762c1baa" - } - }, - "4.11.12": { - "CVE-2019-9457": { - "cmt_msg": "exec: Limit arg stack to at most 75% of _STK_LIM", - "cmt_id": "2ee500dcfdcb688aceb06ea164541a5e99aecfac" + "CVE-2018-1092": { + "cmt_msg": "ext4: fail ext4_iget for root directory if unallocated" }, - "CVE-2018-14634": { - "cmt_msg": "exec: Limit arg stack to at most 75% of _STK_LIM", - "cmt_id": "2ee500dcfdcb688aceb06ea164541a5e99aecfac" + "CVE-2018-1093": { + "cmt_msg": "ext4: add validity checks for bitmap block numbers" }, - "CVE-2017-11089": { - "cmt_msg": "cfg80211: Define nla_policy for NL80211_ATTR_LOCAL_MESH_POWER_MODE", - "cmt_id": "61d3f24df74b44a00f4662a679446d0ed1f5fdf5" + "CVE-2021-3864": { + "cmt_msg": "" }, - "CVE-2017-7541": { - "cmt_msg": "brcmfmac: fix possible buffer overflow in brcmf_cfg80211_mgmt_tx()", - "cmt_id": "0dc4be778d53ba5ffc2ef434f7c6eabdf509e802" + "CVE-2019-19054": { + "cmt_msg": "media: rc: prevent memory leak in cx23888_ir_probe" }, - "CVE-2017-1000371": { - "cmt_msg": "binfmt_elf: use ELF_ET_DYN_BASE only for PIE", - "cmt_id": "9b1bbf6ea9b2b596ba271bec23b93c48181ad896" + "CVE-2019-19057": { + "cmt_msg": "mwifiex: pcie: Fix memory leak in mwifiex_pcie_init_evt_ring" }, - "CVE-2017-1000370": { - "cmt_msg": "binfmt_elf: use ELF_ET_DYN_BASE only for PIE", - "cmt_id": "9b1bbf6ea9b2b596ba271bec23b93c48181ad896" - } - }, - "outstanding": { - "CVE-2020-36322": { - "cmt_msg": "fuse: fix bad inode" + "CVE-2019-19056": { + "cmt_msg": "mwifiex: pcie: Fix memory leak in mwifiex_pcie_alloc_cmdrsp_buf" }, - "CVE-2020-10711": { - "cmt_msg": "netlabel: cope with NULL catmap" + "CVE-2019-19052": { + "cmt_msg": "can: gs_usb: gs_can_open(): prevent memory leak" }, - "CVE-2019-15090": { - "cmt_msg": "scsi: qedi: remove memset/memcpy to nfunc and use func instead" + "CVE-2019-3846": { + "cmt_msg": "mwifiex: Fix possible buffer overflows at parsing bss descriptor" }, - "CVE-2022-3649": { - "cmt_msg": "nilfs2: fix use-after-free bug of struct nilfs_root" + "CVE-2019-19058": { + "cmt_msg": "iwlwifi: dbg_ini: fix memory leak in alloc_sgtable" }, - "CVE-2020-35501": { - "cmt_msg": "" + "CVE-2017-15537": { + "cmt_msg": "x86/fpu: Don't let userspace set bogus xcomp_bv" }, - "CVE-2019-15098": { - "cmt_msg": "ath6kl: fix a NULL-ptr-deref bug in ath6kl_usb_alloc_urb_from_pipe()" + "CVE-2018-5391": { + "cmt_msg": "ip: discard IPv4 datagrams with overlapping segments." }, - "CVE-2020-29368": { - "cmt_msg": "mm: thp: make the THP mapcount atomic against __split_huge_pmd_locked()" + "CVE-2018-5390": { + "cmt_msg": "tcp: free batches of packets in tcp_prune_ofo_queue()" }, - "CVE-2017-17806": { - "cmt_msg": "crypto: hmac - require that the underlying hash algorithm is unkeyed" + "CVE-2023-20941": { + "cmt_msg": "" }, - "CVE-2023-3611": { - "cmt_msg": "net/sched: sch_qfq: account for stab overhead in qfq_enqueue" + "CVE-2018-20836": { + "cmt_msg": "scsi: libsas: fix a race condition when smp task timeout" }, - "CVE-2022-0001": { - "cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE" + "CVE-2020-10135": { + "cmt_msg": "Bluetooth: Consolidate encryption handling in hci_encrypt_cfm" }, - "CVE-2020-12464": { - "cmt_msg": "USB: core: Fix free-while-in-use bug in the USB S-Glibrary" + "CVE-2020-36766": { + "cmt_msg": "cec-api: prevent leaking memory through hole in structure" }, - "CVE-2021-45469": { - "cmt_msg": "f2fs: fix to do sanity check on last xattr entry in __f2fs_setxattr()" + "CVE-2023-28328": { + "cmt_msg": "media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer()" }, - "CVE-2019-19965": { - "cmt_msg": "scsi: libsas: stop discovering if oob mode is disconnected" + "CVE-2017-13693": { + "cmt_msg": "" }, - "CVE-2019-19966": { - "cmt_msg": "media: cpia2: Fix use-after-free in cpia2_exit" + "CVE-2017-13695": { + "cmt_msg": "ACPICA: acpi: acpica: fix acpi operand cache leak in nseval.c" }, - "CVE-2022-42703": { - "cmt_msg": "mm/rmap: Fix anon_vma->degree ambiguity leading to double-reuse" + "CVE-2017-13694": { + "cmt_msg": "" }, - "CVE-2020-35508": { - "cmt_msg": "fork: fix copy_process(CLONE_PARENT) race with the exiting ->real_parent" + "CVE-2024-26647": { + "cmt_msg": "drm/amd/display: Fix late derefrence 'dsc' check in 'link_set_dsc_pps_packet()'" }, - "CVE-2021-3894": { - "cmt_msg": "sctp: account stream padding length for reconf chunk" + "CVE-2021-3640": { + "cmt_msg": "Bluetooth: sco: Fix lock_sock() blockage by memcpy_from_msg()" }, - "CVE-2020-24587": { - "cmt_msg": "mac80211: prevent mixed key and fragment cache attacks" + "CVE-2020-11608": { + "cmt_msg": "media: ov519: add missing endpoint sanity checks" }, - "CVE-2020-24586": { - "cmt_msg": "mac80211: prevent mixed key and fragment cache attacks" + "CVE-2020-10732": { + "cmt_msg": "fs/binfmt_elf.c: allocate initialized memory in fill_thread_core_info()" }, - "CVE-2017-1000410": { - "cmt_msg": "Bluetooth: Prevent stack info leak from the EFS element." + "CVE-2017-17975": { + "cmt_msg": "media: usbtv: prevent double free in error case" }, - "CVE-2023-6270": { - "cmt_msg": "" + "CVE-2019-16921": { + "cmt_msg": "RDMA/hns: Fix init resp when alloc ucontext" }, - "CVE-2021-0129": { - "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical" + "CVE-2021-0512": { + "cmt_msg": "HID: make arrays usage and value to be the same" }, - "CVE-2019-20096": { - "cmt_msg": "dccp: Fix memleak in __feat_register_sp" + "CVE-2022-41222": { + "cmt_msg": "mm/mremap: hold the rmap lock in write mode when moving page table entries." }, - "CVE-2022-47520": { - "cmt_msg": "wifi: wilc1000: validate pairwise and authentication suite offsets" + "CVE-2017-18595": { + "cmt_msg": "tracing: Fix possible double free on failure of allocating trace buffer" }, - "CVE-2023-42755": { - "cmt_msg": "net/sched: Retire rsvp classifier" + "CVE-2024-26720": { + "cmt_msg": "mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again" }, - "CVE-2023-5717": { - "cmt_msg": "perf: Disallow mis-matched inherited group reads" + "CVE-2024-26726": { + "cmt_msg": "btrfs: don't drop extent_map for free space inode on write error" }, - "CVE-2022-3643": { - "cmt_msg": "xen/netback: Ensure protocol headers don't fall in the non-linear area" + "CVE-2019-6974": { + "cmt_msg": "kvm: fix kvm_ioctl_create_device() reference counting (CVE-2019-6974)" }, - "CVE-2018-10940": { - "cmt_msg": "cdrom: information leak in cdrom_ioctl_media_changed()" + "CVE-2023-2985": { + "cmt_msg": "fs: hfsplus: fix UAF issue in hfsplus_put_super" }, - "CVE-2022-32250": { - "cmt_msg": "netfilter: nf_tables: disallow non-stateful expression in sets earlier" + "CVE-2017-17806": { + "cmt_msg": "crypto: hmac - require that the underlying hash algorithm is unkeyed" }, - "CVE-2018-10087": { - "cmt_msg": "kernel/exit.c: avoid undefined behaviour when calling wait4()" + "CVE-2017-17807": { + "cmt_msg": "KEYS: add missing permission check for request_key() destination" }, - "CVE-2019-9500": { - "cmt_msg": "brcmfmac: assure SSID length from firmware is limited" + "CVE-2017-17805": { + "cmt_msg": "crypto: salsa20 - fix blkcipher_walk API usage" }, - "CVE-2019-9503": { - "cmt_msg": "brcmfmac: add subtype check for event handling in data path" + "CVE-2024-26700": { + "cmt_msg": "drm/amd/display: Fix MST Null Ptr for RV" }, - "CVE-2020-36158": { - "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_cmd_802_11_ad_hoc_start" + "CVE-2023-52519": { + "cmt_msg": "HID: intel-ish-hid: ipc: Disable and reenable ACPI GPE bit" }, - "CVE-2023-3159": { - "cmt_msg": "firewire: fix potential uaf in outbound_phy_packet_callback()" + "CVE-2023-52516": { + "cmt_msg": "dma-debug: don't call __dma_entry_alloc_check_leak() under free_entries_lock" }, - "CVE-2022-0480": { - "cmt_msg": "memcg: enable accounting for file lock caches" + "CVE-2023-52517": { + "cmt_msg": "spi: sun6i: fix race between DMA RX transfer completion and RX FIFO drain" }, - "CVE-2018-10124": { - "cmt_msg": "kernel/signal.c: avoid undefined behaviour in kill_something_info" + "CVE-2023-52515": { + "cmt_msg": "RDMA/srp: Do not call scsi_done() from srp_abort()" }, - "CVE-2022-0487": { - "cmt_msg": "moxart: fix potential use-after-free on remove path" + "CVE-2019-15902": { + "cmt_msg": "" }, - "CVE-2023-52429": { - "cmt_msg": "dm: limit the number of targets and parameter size area" + "CVE-2023-52511": { + "cmt_msg": "spi: sun6i: reduce DMA RX transfer width to single byte" }, - "CVE-2021-28964": { - "cmt_msg": "btrfs: fix race when cloning extent buffer during rewind of an old root" + "CVE-2019-20054": { + "cmt_msg": "fs/proc/proc_sysctl.c: fix NULL pointer dereference in put_links" }, - "CVE-2020-26558": { - "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical" + "CVE-2018-17977": { + "cmt_msg": "" }, - "CVE-2022-23825": { + "CVE-2024-26659": { + "cmt_msg": "xhci: handle isoc Babble and Buffer Overrun events properly" + }, + "CVE-2024-26658": { + "cmt_msg": "bcachefs: grab s_umount only if snapshotting" + }, + "CVE-2010-5321": { "cmt_msg": "" }, - "CVE-2022-1974": { - "cmt_msg": "nfc: replace improper check device_is_registered() in netlink related functions" + "CVE-2024-26655": { + "cmt_msg": "Fix memory leak in posix_clock_open()" }, - "CVE-2019-10124": { - "cmt_msg": "mm: hwpoison: fix thp split handing in soft_offline_in_use_page()" + "CVE-2024-26654": { + "cmt_msg": "ALSA: sh: aica: reorder cleanup operations to avoid UAF bugs" }, - "CVE-2024-26588": { - "cmt_msg": "LoongArch: BPF: Prevent out-of-bounds memory access" + "CVE-2024-26656": { + "cmt_msg": "drm/amdgpu: fix use-after-free bug" }, - "CVE-2023-2162": { - "cmt_msg": "scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress" + "CVE-2024-26651": { + "cmt_msg": "sr9800: Add check for usbnet_get_endpoints" }, - "CVE-2022-21125": { - "cmt_msg": "x86/speculation/mmio: Reuse SRBDS mitigation for SBDS" + "CVE-2024-26650": { + "cmt_msg": "platform/x86: p2sb: Allow p2sb_bar() calls during PCI device probe" }, - "CVE-2024-24857": { - "cmt_msg": "" + "CVE-2022-1048": { + "cmt_msg": "ALSA: pcm: Fix races among concurrent hw_params and hw_free calls" }, - "CVE-2019-19241": { - "cmt_msg": "io_uring: async workers should inherit the user creds" + "CVE-2023-52475": { + "cmt_msg": "Input: powermate - fix use-after-free in powermate_config_complete" }, - "CVE-2022-40307": { - "cmt_msg": "efi: capsule-loader: Fix use-after-free in efi_capsule_write" + "CVE-2023-52477": { + "cmt_msg": "usb: hub: Guard against accesses to uninitialized BOS descriptors" }, - "CVE-2022-21123": { - "cmt_msg": "x86/speculation/mmio: Add mitigation for Processor MMIO Stale Data" + "CVE-2023-52476": { + "cmt_msg": "perf/x86/lbr: Filter vsyscall addresses" }, - "CVE-2023-3390": { - "cmt_msg": "netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE" + "CVE-2023-52470": { + "cmt_msg": "drm/radeon: check the alloc_workqueue return value in radeon_crtc_init()" }, - "CVE-2021-28688": { - "cmt_msg": "xen-blkback: don't leak persistent grants from xen_blkbk_map()" + "CVE-2023-52479": { + "cmt_msg": "ksmbd: fix uaf in smb20_oplock_break_ack" }, - "CVE-2021-39686": { - "cmt_msg": "binder: use euid from cred instead of using task" + "CVE-2023-52478": { + "cmt_msg": "HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect" }, - "CVE-2021-39685": { - "cmt_msg": "USB: gadget: detect too-big endpoint 0 requests" + "CVE-2022-26365": { + "cmt_msg": "xen/blkfront: fix leaking data in shared pages" }, - "CVE-2023-6535": { - "cmt_msg": "" + "CVE-2020-12652": { + "cmt_msg": "scsi: mptfusion: Fix double fetch bug in ioctl" }, - "CVE-2021-43975": { - "cmt_msg": "atlantic: Fix OOB read and write in hw_atl_utils_fw_rpc_wait" + "CVE-2020-12653": { + "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_cmd_append_vsie_tlv()" }, - "CVE-2018-6927": { - "cmt_msg": "futex: Prevent overflow by strengthen input validation" + "CVE-2020-12656": { + "cmt_msg": "sunrpc: check that domain table is empty at module unload." }, - "CVE-2020-0466": { - "cmt_msg": "do_epoll_ctl(): clean the failure exits up a bit" + "CVE-2017-14051": { + "cmt_msg": "scsi: qla2xxx: Fix an integer overflow in sysfs code" }, - "CVE-2019-10207": { - "cmt_msg": "Bluetooth: hci_uart: check for missing tty operations" + "CVE-2020-12654": { + "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_ret_wmm_get_status()" }, - "CVE-2023-1073": { - "cmt_msg": "HID: check empty report_list in hid_validate_values()" + "CVE-2022-23042": { + "cmt_msg": "xen/netfront: react properly to failing gnttab_end_foreign_access_ref()" }, - "CVE-2018-10878": { - "cmt_msg": "ext4: always check block group bounds in ext4_init_block_bitmap()" + "CVE-2022-45887": { + "cmt_msg": "media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb()" }, - "CVE-2023-0459": { - "cmt_msg": "uaccess: Add speculation barrier to copy_from_user()" + "CVE-2022-4744": { + "cmt_msg": "tun: avoid double free in tun_free_netdev" }, - "CVE-2023-0458": { - "cmt_msg": "prlimit: do_prlimit needs to have a speculation check" + "CVE-2022-0400": { + "cmt_msg": "" }, - "CVE-2020-26141": { - "cmt_msg": "ath10k: Fix TKIP Michael MIC verification for PCIe" + "CVE-2022-45886": { + "cmt_msg": "media: dvb-core: Fix use-after-free due on race condition at dvb_net" }, - "CVE-2018-1000204": { - "cmt_msg": "scsi: sg: allocate with __GFP_ZERO in sg_build_indirect()" + "CVE-2022-26966": { + "cmt_msg": "sr9700: sanity check for packet length" }, - "CVE-2023-0597": { - "cmt_msg": "x86/mm: Randomize per-cpu entry area" + "CVE-2023-1989": { + "cmt_msg": "Bluetooth: btsdio: fix use after free bug in btsdio_remove due to unfinished work" + }, + "CVE-2022-25265": { + "cmt_msg": "" + }, + "CVE-2020-25285": { + "cmt_msg": "mm/hugetlb: fix a race between hugetlb sysctl handlers" }, - "CVE-2019-12379": { - "cmt_msg": "consolemap: Fix a memory leaking bug in drivers/tty/vt/consolemap.c" + "CVE-2020-11609": { + "cmt_msg": "media: stv06xx: add missing descriptor sanity checks" }, - "CVE-2019-12378": { - "cmt_msg": "ipv6_sockglue: Fix a missing-check bug in ip6_ra_control()" + "CVE-2020-25284": { + "cmt_msg": "rbd: require global CAP_SYS_ADMIN for mapping and unmapping" }, - "CVE-2023-2002": { - "cmt_msg": "bluetooth: Perform careful capability checks in hci_sock_ioctl()" + "CVE-2023-4208": { + "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free" }, - "CVE-2021-30002": { - "cmt_msg": "media: v4l: ioctl: Fix memory leak in video_usercopy" + "CVE-2023-4206": { + "cmt_msg": "net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free" }, - "CVE-2017-17450": { - "cmt_msg": "netfilter: xt_osf: Add missing permission checks" + "CVE-2023-4207": { + "cmt_msg": "net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free" }, - "CVE-2021-0941": { - "cmt_msg": "bpf: Remove MTU check in __bpf_skb_max_len" + "CVE-2021-47046": { + "cmt_msg": "drm/amd/display: Fix off by one in hdmi_14_process_transaction()" }, - "CVE-2022-3628": { - "cmt_msg": "wifi: brcmfmac: Fix potential buffer overflow in brcmf_fweh_event_worker()" + "CVE-2020-29370": { + "cmt_msg": "mm: slub: add missing TID bump in kmem_cache_alloc_bulk()" }, - "CVE-2024-26591": { - "cmt_msg": "bpf: Fix re-attachment branch in bpf_tracing_prog_attach" + "CVE-2022-20424": { + "cmt_msg": "io_uring: remove io_identity" }, - "CVE-2020-15802": { - "cmt_msg": "" + "CVE-2022-20422": { + "cmt_msg": "arm64: fix oops in concurrently setting insn_emulation sysctls" }, - "CVE-2024-26594": { - "cmt_msg": "ksmbd: validate mech token in session setup" + "CVE-2017-8831": { + "cmt_msg": "[media] saa7164: fix double fetch PCIe access condition" }, - "CVE-2023-2483": { - "cmt_msg": "net: qcom/emac: Fix use after free bug in emac_remove due to race condition" + "CVE-2022-45934": { + "cmt_msg": "Bluetooth: L2CAP: Fix u8 overflow" }, - "CVE-2017-18270": { - "cmt_msg": "KEYS: prevent creating a different user's keyrings" + "CVE-2021-4197": { + "cmt_msg": "cgroup: Use open-time credentials for process migraton perm checks" }, - "CVE-2022-3636": { - "cmt_msg": "net: ethernet: mtk_eth_soc: use after free in __mtk_ppe_check_skb()" + "CVE-2020-24503": { + "cmt_msg": "" }, - "CVE-2022-3635": { - "cmt_msg": "atm: idt77252: fix use-after-free bugs caused by tst_timer" + "CVE-2020-24502": { + "cmt_msg": "" }, - "CVE-2022-0002": { - "cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE" + "CVE-2024-26774": { + "cmt_msg": "ext4: avoid dividing by 0 in mb_update_avg_fragment_size() when block bitmap corrupt" }, - "CVE-2021-34556": { - "cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4" + "CVE-2023-31436": { + "cmt_msg": "net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg" }, - "CVE-2020-0543": { - "cmt_msg": "x86/cpu: Add 'table' argument to cpu_matches()" + "CVE-2019-8980": { + "cmt_msg": "exec: Fix mem leak in kernel_read_file" }, - "CVE-2022-40982": { - "cmt_msg": "x86/speculation: Add Gather Data Sampling mitigation" + "CVE-2024-26775": { + "cmt_msg": "aoe: avoid potential deadlock at set_capacity" }, - "CVE-2022-3202": { - "cmt_msg": "jfs: prevent NULL deref in diFree" + "CVE-2018-14609": { + "cmt_msg": "btrfs: relocation: Only remove reloc rb_trees if reloc control has been initialized" }, - "CVE-2018-3646": { - "cmt_msg": "x86/microcode: Allow late microcode loading with SMT disabled" + "CVE-2024-23851": { + "cmt_msg": "dm: limit the number of targets and parameter size area" }, - "CVE-2019-11085": { - "cmt_msg": "drm/i915/gvt: Fix mmap range check" + "CVE-2020-27777": { + "cmt_msg": "powerpc/rtas: Restrict RTAS requests from userspace" }, - "CVE-2024-24861": { - "cmt_msg": "" + "CVE-2019-11486": { + "cmt_msg": "tty: mark Siemens R3964 line discipline as BROKEN" }, - "CVE-2017-17558": { - "cmt_msg": "USB: core: prevent malicious bNumInterfaces overflow" + "CVE-2019-11487": { + "cmt_msg": "fs: prevent page refcount overflow in pipe_buf_get" }, - "CVE-2019-11477": { - "cmt_msg": "tcp: limit payload size of sacked skbs" + "CVE-2018-8043": { + "cmt_msg": "net: phy: mdio-bcm-unimac: fix potential NULL dereference in unimac_mdio_probe()" }, - "CVE-2021-28711": { - "cmt_msg": "xen/blkfront: harden blkfront against event channel storms" + "CVE-2019-20908": { + "cmt_msg": "efi: Restrict efivar_ssdt_load when the kernel is locked down" }, - "CVE-2018-14614": { - "cmt_msg": "f2fs: fix to do sanity check with cp_pack_start_sum" + "CVE-2019-19060": { + "cmt_msg": "iio: imu: adis16400: release allocated memory on failure" }, - "CVE-2019-11479": { - "cmt_msg": "tcp: add tcp_min_snd_mss sysctl" + "CVE-2019-19061": { + "cmt_msg": "iio: imu: adis16400: fix memory leak" }, - "CVE-2018-14616": { - "cmt_msg": "f2fs: fix to do sanity check with block address in main area v2" + "CVE-2019-19062": { + "cmt_msg": "crypto: user - fix memory leak in crypto_report" }, - "CVE-2018-14611": { - "cmt_msg": "btrfs: validate type when reading a chunk" + "CVE-2019-19063": { + "cmt_msg": "rtlwifi: prevent memory leak in rtl_usb_probe" }, - "CVE-2018-14610": { - "cmt_msg": "btrfs: Check that each block group has corresponding chunk at mount time" + "CVE-2017-17741": { + "cmt_msg": "KVM: Fix stack-out-of-bounds read in write_mmio" }, - "CVE-2018-14613": { - "cmt_msg": "btrfs: tree-checker: Verify block_group_item" + "CVE-2019-19066": { + "cmt_msg": "scsi: bfa: release allocated memory in case of error" }, - "CVE-2018-14612": { - "cmt_msg": "btrfs: tree-checker: Detect invalid and empty essential trees" + "CVE-2019-19067": { + "cmt_msg": "drm/amdgpu: fix multiple memory leaks in acp_hw_init" }, - "CVE-2020-26145": { - "cmt_msg": "ath10k: drop fragments with multicast DA for PCIe" + "CVE-2019-19068": { + "cmt_msg": "rtl8xxxu: prevent leaking urb" }, - "CVE-2017-13216": { - "cmt_msg": "staging: android: ashmem: fix a race condition in ASHMEM_SET_SIZE ioctl" + "CVE-2019-3874": { + "cmt_msg": "sctp: implement memory accounting on tx path" }, - "CVE-2020-26147": { - "cmt_msg": "mac80211: assure all fragments are encrypted" + "CVE-2017-12193": { + "cmt_msg": "assoc_array: Fix a buggy node-splitting case" }, - "CVE-2018-5814": { - "cmt_msg": "usbip: usbip_host: fix NULL-ptr deref and use-after-free errors" + "CVE-2017-12192": { + "cmt_msg": "KEYS: prevent KEYCTL_READ on negative key" }, - "CVE-2020-26140": { - "cmt_msg": "" + "CVE-2017-12190": { + "cmt_msg": "fix unbalanced page refcounting in bio_map_user_iov" }, - "CVE-2020-26143": { - "cmt_msg": "" + "CVE-2020-36516": { + "cmt_msg": "ipv4: avoid using shared IP generator for connected sockets" }, - "CVE-2020-26142": { + "CVE-2012-4542": { "cmt_msg": "" }, - "CVE-2019-17053": { - "cmt_msg": "ieee802154: enforce CAP_NET_RAW for raw sockets" - }, - "CVE-2019-17052": { - "cmt_msg": "ax25: enforce CAP_NET_RAW for raw sockets" + "CVE-2018-1000028": { + "cmt_msg": "nfsd: auth: Fix gid sorting when rootsquash enabled" }, - "CVE-2023-1076": { - "cmt_msg": "tun: tun_chr_open(): correctly initialize socket uid" + "CVE-2018-1000026": { + "cmt_msg": "bnx2x: disable GSO where gso_size is too big for hardware" }, - "CVE-2017-14497": { - "cmt_msg": "packet: Don't write vnet header beyond end of buffer" + "CVE-2020-36777": { + "cmt_msg": "media: dvbdev: Fix memory leak in dvb_media_device_free()" }, - "CVE-2020-27418": { - "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region" + "CVE-2020-36775": { + "cmt_msg": "f2fs: fix to avoid potential deadlock" }, - "CVE-2019-17056": { - "cmt_msg": "nfc: enforce CAP_NET_RAW for raw sockets" + "CVE-2021-20292": { + "cmt_msg": "drm/ttm/nouveau: don't call tt destroy callback on alloc failure." }, - "CVE-2019-17055": { - "cmt_msg": "mISDN: enforce CAP_NET_RAW for raw sockets" + "CVE-2023-2269": { + "cmt_msg": "dm ioctl: fix nested locking in table_clear() to remove deadlock concern" }, - "CVE-2019-17054": { - "cmt_msg": "appletalk: enforce CAP_NET_RAW for raw sockets" + "CVE-2020-10690": { + "cmt_msg": "ptp: fix the race between the release of ptp_clock and cdev" }, - "CVE-2018-13093": { - "cmt_msg": "xfs: validate cached inodes are free when allocated" + "CVE-2021-3659": { + "cmt_msg": "net: mac802154: Fix general protection fault" }, - "CVE-2021-38300": { - "cmt_msg": "bpf, mips: Validate conditional branch offsets" + "CVE-2021-3653": { + "cmt_msg": "KVM: nSVM: avoid picking up unsupported bits from L2 in int_ctl (CVE-2021-3653)" }, - "CVE-2023-51781": { - "cmt_msg": "appletalk: Fix Use-After-Free in atalk_ioctl" + "CVE-2021-3655": { + "cmt_msg": "sctp: validate from_addr_param return" }, - "CVE-2018-13096": { - "cmt_msg": "f2fs: fix to do sanity check with node footer and iblocks" + "CVE-2019-12614": { + "cmt_msg": "powerpc/pseries/dlpar: Fix a missing check in dlpar_parse_cc_property()" }, - "CVE-2018-13097": { - "cmt_msg": "f2fs: fix to do sanity check with user_block_count" + "CVE-2019-12615": { + "cmt_msg": "mdesc: fix a missing-check bug in get_vdev_port_node_info()" }, - "CVE-2018-13094": { - "cmt_msg": "xfs: don't call xfs_da_shrink_inode with NULL bp" + "CVE-2021-3896": { + "cmt_msg": "isdn: cpai: check ctr->cnr to avoid array index out of bound" }, - "CVE-2018-13095": { - "cmt_msg": "xfs: More robust inode extent count validation" + "CVE-2021-3894": { + "cmt_msg": "sctp: account stream padding length for reconf chunk" }, - "CVE-2020-29661": { - "cmt_msg": "tty: Fix ->pgrp locking in tiocspgrp()" + "CVE-2021-3892": { + "cmt_msg": "" }, - "CVE-2020-29660": { - "cmt_msg": "tty: Fix ->session locking" + "CVE-2022-27223": { + "cmt_msg": "USB: gadget: validate endpoint index for xilinx udc" }, - "CVE-2018-13098": { - "cmt_msg": "f2fs: fix to do sanity check with extra_attr feature" + "CVE-2022-24958": { + "cmt_msg": "usb: gadget: don't release an existing dev->buf" }, - "CVE-2018-13099": { - "cmt_msg": "f2fs: fix to do sanity check with reserved blkaddr of inline inode" + "CVE-2020-36557": { + "cmt_msg": "vt: vt_ioctl: fix VT_DISALLOCATE freeing in-use virtual console" }, - "CVE-2022-1734": { - "cmt_msg": "nfc: nfcmrvl: main: reorder destructive operations in nfcmrvl_nci_unregister_dev to avoid bugs" + "CVE-2020-12888": { + "cmt_msg": "vfio-pci: Invalidate mmaps and block MMIO access on disabled memory" }, - "CVE-2017-15951": { - "cmt_msg": "KEYS: Fix race between updating and finding a negative key" + "CVE-2023-2194": { + "cmt_msg": "i2c: xgene-slimpro: Fix out-of-bounds bug in xgene_slimpro_i2c_xfer()" }, - "CVE-2023-28772": { - "cmt_msg": "seq_buf: Fix overflow in seq_buf_putmem_hex()" + "CVE-2022-41218": { + "cmt_msg": "media: dvb-core: Fix UAF due to refcount races at releasing" }, - "CVE-2019-14895": { - "cmt_msg": "mwifiex: fix possible heap overflow in mwifiex_process_country_ie()" + "CVE-2011-4917": { + "cmt_msg": "" }, - "CVE-2019-19770": { - "cmt_msg": "blktrace: fix debugfs use after free" + "CVE-2021-45485": { + "cmt_msg": "ipv6: use prandom_u32() for ID generation" }, - "CVE-2022-24448": { - "cmt_msg": "NFSv4: Handle case where the lookup of a directory fails" + "CVE-2020-0030": { + "cmt_msg": "ANDROID: binder: synchronize_rcu() when using POLLFREE." }, - "CVE-2019-11884": { - "cmt_msg": "Bluetooth: hidp: fix buffer overflow" + "CVE-2019-18806": { + "cmt_msg": "net: qlogic: Fix memory leak in ql_alloc_large_buffers" }, - "CVE-2020-15780": { - "cmt_msg": "ACPI: configfs: Disallow loading ACPI tables when locked down" + "CVE-2019-3900": { + "cmt_msg": "vhost_net: fix possible infinite loop" }, - "CVE-2019-19074": { - "cmt_msg": "ath9k: release allocated buffer if timed out" + "CVE-2022-40982": { + "cmt_msg": "x86/speculation: Add Gather Data Sampling mitigation" }, - "CVE-2019-18683": { - "cmt_msg": "media: vivid: Fix wrong locking that causes race conditions on streaming stop" + "CVE-2021-39801": { + "cmt_msg": "" }, - "CVE-2022-2503": { - "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag" + "CVE-2021-39800": { + "cmt_msg": "" }, - "CVE-2022-48619": { - "cmt_msg": "Input: add bounds checking to input_set_capability()" + "CVE-2024-22099": { + "cmt_msg": "Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security" }, - "CVE-2019-18680": { - "cmt_msg": "" + "CVE-2021-4202": { + "cmt_msg": "NFC: reorganize the functions in nci_request" }, - "CVE-2022-23038": { - "cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()" + "CVE-2021-4203": { + "cmt_msg": "af_unix: fix races in sk_peer_pid and sk_peer_cred accesses" }, - "CVE-2022-23039": { - "cmt_msg": "xen/gntalloc: don't use gnttab_query_foreign_access()" + "CVE-2023-52509": { + "cmt_msg": "ravb: Fix use-after-free issue in ravb_tx_timeout_work()" }, - "CVE-2017-14991": { - "cmt_msg": "scsi: sg: fixup infoleak when using SG_GET_REQUEST_TABLE" + "CVE-2023-52508": { + "cmt_msg": "nvme-fc: Prevent null pointer dereference in nvme_fc_io_getuuid()" }, - "CVE-2022-20158": { - "cmt_msg": "net/packet: fix slab-out-of-bounds access in packet_recvmsg()" + "CVE-2023-52507": { + "cmt_msg": "nfc: nci: assert requested protocol is valid" }, - "CVE-2022-23037": { - "cmt_msg": "xen/netfront: don't use gnttab_query_foreign_access() for mapped status" + "CVE-2023-52506": { + "cmt_msg": "LoongArch: Set all reserved memblocks on Node#0 at initialization" }, - "CVE-2023-20588": { - "cmt_msg": "x86/CPU/AMD: Do not leak quotient data after a division by 0" + "CVE-2023-52501": { + "cmt_msg": "ring-buffer: Do not attempt to read past \"commit\"" }, - "CVE-2020-0404": { - "cmt_msg": "media: uvcvideo: Avoid cyclic entity chains due to malformed USB descriptors" + "CVE-2023-52500": { + "cmt_msg": "scsi: pm80xx: Avoid leaking tags when processing OPC_INB_SET_CONTROLLER_CONFIG command" }, - "CVE-2019-15924": { - "cmt_msg": "fm10k: Fix a potential NULL pointer dereference" + "CVE-2023-52502": { + "cmt_msg": "net: nfc: fix races in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn()" }, - "CVE-2019-15538": { - "cmt_msg": "xfs: fix missing ILOCK unlock when xfs_setattr_nonsize fails due to EDQUOT" + "CVE-2023-3863": { + "cmt_msg": "net: nfc: Fix use-after-free caused by nfc_llcp_find_local" }, - "CVE-2019-15926": { - "cmt_msg": "ath6kl: add some bounds checking" + "CVE-2017-1000": { + "cmt_msg": "udp: consistently apply ufo or fragmentation" }, - "CVE-2019-15921": { - "cmt_msg": "genetlink: Fix a memory leak on error path" + "CVE-2024-26668": { + "cmt_msg": "netfilter: nft_limit: reject configurations that cause integer overflow" }, - "CVE-2019-14821": { - "cmt_msg": "KVM: coalesced_mmio: add bounds checking" + "CVE-2017-0605": { + "cmt_msg": "tracing: Use strlcpy() instead of strcpy() in __trace_find_cmdline()" }, - "CVE-2020-12826": { - "cmt_msg": "signal: Extend exec_id to 64bits" + "CVE-2024-24858": { + "cmt_msg": "" }, - "CVE-2019-3701": { - "cmt_msg": "can: gw: ensure DLC boundaries after CAN frame modification" + "CVE-2024-26663": { + "cmt_msg": "tipc: Check the bearer type before calling tipc_udp_nl_bearer_add()" }, - "CVE-2021-42008": { - "cmt_msg": "net: 6pack: fix slab-out-of-bounds in decode_data" + "CVE-2024-26664": { + "cmt_msg": "hwmon: (coretemp) Fix out-of-bounds memory access" }, - "CVE-2022-39188": { - "cmt_msg": "mmu_gather: Force tlb-flush VM_PFNMAP vmas" + "CVE-2021-38198": { + "cmt_msg": "KVM: X86: MMU: Use the correct inherited permissions to get shadow page" }, - "CVE-2018-20511": { - "cmt_msg": "net/appletalk: fix minor pointer leak to userspace in SIOCFINDIPDDPRT" + "CVE-2021-38199": { + "cmt_msg": "NFSv4: Initialise connection to the server in nfs4_alloc_client()" }, - "CVE-2019-1125": { - "cmt_msg": "x86/speculation: Prepare entry code for Spectre v1 swapgs mitigations" + "CVE-2022-1679": { + "cmt_msg": "ath9k: fix use-after-free in ath9k_hif_usb_rx_cb" }, - "CVE-2019-15218": { - "cmt_msg": "media: usb: siano: Fix general protection fault in smsusb" + "CVE-2023-34256": { + "cmt_msg": "ext4: avoid a potential slab-out-of-bounds in ext4_group_desc_csum" }, - "CVE-2019-15666": { - "cmt_msg": "xfrm: policy: Fix out-of-bound array accesses in __xfrm_policy_unlink" + "CVE-2023-52442": { + "cmt_msg": "ksmbd: validate session id and tree id in compound request" }, - "CVE-2020-25641": { - "cmt_msg": "block: allow for_each_bvec to support zero len bvec" + "CVE-2023-52443": { + "cmt_msg": "apparmor: avoid crash when parsed profile name is empty" }, - "CVE-2005-3660": { - "cmt_msg": "" + "CVE-2023-52444": { + "cmt_msg": "f2fs: fix to avoid dirent corruption" }, - "CVE-2017-14106": { - "cmt_msg": "tcp: initialize rcv_mss to TCP_MIN_MSS instead of 0" + "CVE-2023-52445": { + "cmt_msg": "media: pvrusb2: fix use after free on context disconnection" }, - "CVE-2019-15212": { - "cmt_msg": "USB: rio500: refuse more than one device at a time" + "CVE-2023-52449": { + "cmt_msg": "mtd: Fix gluebi NULL pointer dereference caused by ftl notifier" }, - "CVE-2019-15211": { - "cmt_msg": "media: radio-raremono: change devm_k*alloc to k*alloc" + "CVE-2019-15807": { + "cmt_msg": "scsi: libsas: delete sas port if expander discover failed" }, - "CVE-2023-1095": { - "cmt_msg": "netfilter: nf_tables: fix null deref due to zeroed list head" + "CVE-2024-26719": { + "cmt_msg": "nouveau: offload fence uevents work to workqueue" }, - "CVE-2019-15217": { - "cmt_msg": "media: usb:zr364xx:Fix KASAN:null-ptr-deref Read in zr364xx_vidioc_querycap" + "CVE-2024-26715": { + "cmt_msg": "usb: dwc3: gadget: Fix NULL pointer dereference in dwc3_gadget_suspend" }, - "CVE-2019-14896": { - "cmt_msg": "libertas: Fix two buffer overflows at parsing bss descriptor" + "CVE-2024-1312": { + "cmt_msg": "mm: lock_vma_under_rcu() must check vma->anon_vma under vma lock" }, - "CVE-2019-15215": { - "cmt_msg": "media: cpia2_usb: first wake up, then free in disconnect" + "CVE-2019-14284": { + "cmt_msg": "floppy: fix div-by-zero in setup_format_params" }, - "CVE-2019-15214": { - "cmt_msg": "ALSA: core: Fix card races between register and disconnect" + "CVE-2018-10880": { + "cmt_msg": "ext4: never move the system.data xattr out of the inode body" }, - "CVE-2020-24588": { - "cmt_msg": "cfg80211: mitigate A-MSDU aggregation attacks" + "CVE-2023-3338": { + "cmt_msg": "Remove DECnet support from kernel" }, - "CVE-2021-33034": { - "cmt_msg": "Bluetooth: verify AMP hci_chan before amp_destroy" + "CVE-2018-10882": { + "cmt_msg": "ext4: add more inode number paranoia checks" }, - "CVE-2019-19922": { - "cmt_msg": "sched/fair: Fix low cpu usage with high throttling by removing expiration of cpu-local slices" + "CVE-2018-10883": { + "cmt_msg": "jbd2: don't mark block as modified if the handle is out of credits" }, - "CVE-2021-33033": { - "cmt_msg": "cipso,calipso: resolve a number of problems with the DOI refcounts" + "CVE-2020-29368": { + "cmt_msg": "mm: thp: make the THP mapcount atomic against __split_huge_pmd_locked()" }, - "CVE-2019-19927": { - "cmt_msg": "drm/ttm: fix incrementing the page pointer for huge pages" + "CVE-2020-12464": { + "cmt_msg": "USB: core: Fix free-while-in-use bug in the USB S-Glibrary" }, - "CVE-2020-27066": { - "cmt_msg": "xfrm: policy: Fix doulbe free in xfrm_policy_timer" + "CVE-2022-47520": { + "cmt_msg": "wifi: wilc1000: validate pairwise and authentication suite offsets" }, - "CVE-2020-27068": { - "cmt_msg": "cfg80211: add missing policy for NL80211_ATTR_STATUS_CODE" + "CVE-2018-10087": { + "cmt_msg": "kernel/exit.c: avoid undefined behaviour when calling wait4()" }, - "CVE-2024-23307": { - "cmt_msg": "" + "CVE-2023-3159": { + "cmt_msg": "firewire: fix potential uaf in outbound_phy_packet_callback()" }, - "CVE-2020-8648": { - "cmt_msg": "vt: selection, close sel_buffer race" + "CVE-2021-47059": { + "cmt_msg": "crypto: sun8i-ss - fix result memory leak on error path" }, - "CVE-2022-32296": { - "cmt_msg": "tcp: increase source port perturb table to 2^16" + "CVE-2021-47052": { + "cmt_msg": "crypto: sa2ul - Fix memory leak of rxd" }, - "CVE-2017-11600": { - "cmt_msg": "xfrm: policy: check policy direction value" + "CVE-2021-47056": { + "cmt_msg": "crypto: qat - ADF_STATUS_PF_RUNNING should be set after adf_dev_init" }, - "CVE-2023-3567": { - "cmt_msg": "vc_screen: move load of struct vc_data pointer in vcs_read() to avoid UAF" + "CVE-2021-47054": { + "cmt_msg": "bus: qcom: Put child node before return" }, - "CVE-2019-20806": { - "cmt_msg": "media: tw5864: Fix possible NULL pointer dereference in tw5864_handle_frame" + "CVE-2022-21125": { + "cmt_msg": "x86/speculation/mmio: Reuse SRBDS mitigation for SBDS" }, - "CVE-2022-3028": { - "cmt_msg": "af_key: Do not call xfrm_probe_algs in parallel" + "CVE-2019-19241": { + "cmt_msg": "io_uring: async workers should inherit the user creds" }, - "CVE-2017-16648": { - "cmt_msg": "dvb_frontend: don't use-after-free the frontend struct" + "CVE-2022-21123": { + "cmt_msg": "x86/speculation/mmio: Add mitigation for Processor MMIO Stale Data" }, - "CVE-2020-14304": { + "CVE-2020-26559": { "cmt_msg": "" }, - "CVE-2010-5321": { - "cmt_msg": "" + "CVE-2021-43975": { + "cmt_msg": "atlantic: Fix OOB read and write in hw_atl_utils_fw_rpc_wait" }, - "CVE-2020-15393": { - "cmt_msg": "usb: usbtest: fix missing kfree(dev->buf) in usbtest_disconnect" + "CVE-2018-6927": { + "cmt_msg": "futex: Prevent overflow by strengthen input validation" }, - "CVE-2022-33981": { - "cmt_msg": "floppy: disable FDRAWCMD by default" + "CVE-2018-3639": { + "cmt_msg": "x86/nospec: Simplify alternative_msr_write()" }, - "CVE-2021-3564": { - "cmt_msg": "Bluetooth: fix the erroneous flush_work() order" + "CVE-2023-0590": { + "cmt_msg": "net: sched: fix race condition in qdisc_graft()" }, - "CVE-2019-9506": { - "cmt_msg": "Bluetooth: Fix faulty expression for minimum encryption key size check" + "CVE-2023-0597": { + "cmt_msg": "x86/mm: Randomize per-cpu entry area" }, - "CVE-2023-1476": { - "cmt_msg": "" + "CVE-2022-28390": { + "cmt_msg": "can: ems_usb: ems_usb_start_xmit(): fix double dev_kfree_skb() in error path" }, - "CVE-2017-16995": { - "cmt_msg": "bpf: fix incorrect sign extension in check_alu_op()" + "CVE-2019-3460": { + "cmt_msg": "Bluetooth: Check L2CAP option sizes returned from l2cap_get_conf_opt" }, - "CVE-2017-16994": { - "cmt_msg": "mm/pagewalk.c: report holes in hugetlb ranges" + "CVE-2022-3202": { + "cmt_msg": "jfs: prevent NULL deref in diFree" }, - "CVE-2019-2025": { - "cmt_msg": "binder: fix race that allows malicious free of live buffer" + "CVE-2019-11477": { + "cmt_msg": "tcp: limit payload size of sacked skbs" }, - "CVE-2020-26560": { - "cmt_msg": "" + "CVE-2021-46908": { + "cmt_msg": "bpf: Use correct permission flag for mixed signed bounds arithmetic" }, - "CVE-2022-38096": { - "cmt_msg": "" + "CVE-2021-46906": { + "cmt_msg": "HID: usbhid: fix info leak in hid_submit_ctrl" }, - "CVE-2018-18397": { - "cmt_msg": "userfaultfd: use ENOENT instead of EFAULT if the atomic copy user fails" + "CVE-2018-14614": { + "cmt_msg": "f2fs: fix to do sanity check with cp_pack_start_sum" }, - "CVE-2017-13080": { - "cmt_msg": "mac80211: accept key reinstall without changing anything" + "CVE-2019-11479": { + "cmt_msg": "tcp: add tcp_min_snd_mss sysctl" }, - "CVE-2021-20321": { - "cmt_msg": "ovl: fix missing negative dentry check in ovl_rename()" + "CVE-2018-14616": { + "cmt_msg": "f2fs: fix to do sanity check with block address in main area v2" }, - "CVE-2018-12127": { - "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" + "CVE-2018-14611": { + "cmt_msg": "btrfs: validate type when reading a chunk" }, - "CVE-2018-12126": { - "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" + "CVE-2018-14610": { + "cmt_msg": "btrfs: Check that each block group has corresponding chunk at mount time" }, - "CVE-2022-23816": { - "cmt_msg": "x86/kvm/vmx: Make noinstr clean" + "CVE-2018-14613": { + "cmt_msg": "btrfs: tree-checker: Verify block_group_item" }, - "CVE-2023-37454": { - "cmt_msg": "" + "CVE-2018-14612": { + "cmt_msg": "btrfs: tree-checker: Detect invalid and empty essential trees" }, - "CVE-2021-3892": { - "cmt_msg": "" + "CVE-2024-23849": { + "cmt_msg": "net/rds: Fix UBSAN: array-index-out-of-bounds in rds_cmsg_recv" }, - "CVE-2022-20572": { - "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag" + "CVE-2024-23848": { + "cmt_msg": "" }, - "CVE-2018-10021": { - "cmt_msg": "scsi: libsas: defer ata device eh commands to libata" + "CVE-2020-27418": { + "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region" }, - "CVE-2022-20132": { - "cmt_msg": "HID: add hid_is_usb() function to make it simpler for USB detection" + "CVE-2019-2025": { + "cmt_msg": "binder: fix race that allows malicious free of live buffer" }, "CVE-2019-2024": { "cmt_msg": "media: em28xx: Fix use-after-free when disconnecting" }, - "CVE-2023-39194": { - "cmt_msg": "net: xfrm: Fix xfrm_address_filter OOB read" + "CVE-2017-15951": { + "cmt_msg": "KEYS: Fix race between updating and finding a negative key" }, - "CVE-2023-39197": { - "cmt_msg": "netfilter: conntrack: dccp: copy entire header to stack buffer, not just basic one" + "CVE-2019-19074": { + "cmt_msg": "ath9k: release allocated buffer if timed out" }, - "CVE-2019-10126": { - "cmt_msg": "mwifiex: Fix heap overflow in mwifiex_uap_parse_tail_ies()" + "CVE-2019-19073": { + "cmt_msg": "ath9k_htc: release allocated buffer if timed out" }, - "CVE-2023-52443": { - "cmt_msg": "apparmor: avoid crash when parsed profile name is empty" + "CVE-2019-1125": { + "cmt_msg": "x86/speculation: Prepare entry code for Spectre v1 swapgs mitigations" }, - "CVE-2019-13631": { - "cmt_msg": "Input: gtco - bounds check collection indent level" + "CVE-2023-31085": { + "cmt_msg": "ubi: Refuse attaching if mtd's erasesize is 0" }, - "CVE-2020-14353": { - "cmt_msg": "KEYS: prevent creating a different user's keyrings" + "CVE-2023-31084": { + "cmt_msg": "media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*()" }, - "CVE-2020-13974": { - "cmt_msg": "vt: keyboard: avoid signed integer overflow in k_ascii" + "CVE-2023-31083": { + "cmt_msg": "Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO" }, - "CVE-2021-4083": { - "cmt_msg": "fget: check that the fd still exists after getting a ref to it" + "CVE-2023-31082": { + "cmt_msg": "" }, - "CVE-2023-33288": { - "cmt_msg": "power: supply: bq24190: Fix use after free bug in bq24190_remove due to race condition" + "CVE-2023-31081": { + "cmt_msg": "" }, - "CVE-2018-10938": { - "cmt_msg": "Cipso: cipso_v4_optptr enter infinite loop" + "CVE-2022-32296": { + "cmt_msg": "tcp: increase source port perturb table to 2^16" }, - "CVE-2017-1000251": { - "cmt_msg": "Bluetooth: Properly check L2CAP config option output buffer length" + "CVE-2020-28974": { + "cmt_msg": "vt: Disable KD_FONT_OP_COPY" }, - "CVE-2017-1000252": { - "cmt_msg": "KVM: VMX: Do not BUG() on out-of-bounds guest IRQ" + "CVE-2019-20806": { + "cmt_msg": "media: tw5864: Fix possible NULL pointer dereference in tw5864_handle_frame" }, - "CVE-2022-29901": { - "cmt_msg": "x86/kvm/vmx: Make noinstr clean" + "CVE-2022-3028": { + "cmt_msg": "af_key: Do not call xfrm_probe_algs in parallel" }, - "CVE-2017-1000255": { - "cmt_msg": "powerpc/64s: Use emergency stack for kernel TM Bad Thing program checks" + "CVE-2020-14304": { + "cmt_msg": "" }, - "CVE-2018-12233": { - "cmt_msg": "jfs: Fix inconsistency between memory allocation and ea_buf->max_size" + "CVE-2018-17972": { + "cmt_msg": "proc: restrict kernel stack dumps to root" }, - "CVE-2018-12232": { - "cmt_msg": "socket: close race condition between sock_close() and sockfs_setattr()" + "CVE-2022-33981": { + "cmt_msg": "floppy: disable FDRAWCMD by default" }, - "CVE-2020-10751": { - "cmt_msg": "selinux: properly handle multiple messages in selinux_netlink_send()" + "CVE-2017-16995": { + "cmt_msg": "bpf: fix incorrect sign extension in check_alu_op()" }, - "CVE-2023-39192": { - "cmt_msg": "netfilter: xt_u32: validate user space input" + "CVE-2017-16994": { + "cmt_msg": "mm/pagewalk.c: report holes in hugetlb ranges" }, - "CVE-2022-23042": { - "cmt_msg": "xen/netfront: react properly to failing gnttab_end_foreign_access_ref()" + "CVE-2018-18397": { + "cmt_msg": "userfaultfd: use ENOENT instead of EFAULT if the atomic copy user fails" }, - "CVE-2020-10757": { - "cmt_msg": "mm: Fix mremap not considering huge pmd devmap" + "CVE-2017-17558": { + "cmt_msg": "USB: core: prevent malicious bNumInterfaces overflow" }, - "CVE-2018-9465": { - "cmt_msg": "binder: fix proc->files use-after-free" + "CVE-2023-1390": { + "cmt_msg": "tipc: fix NULL deref in tipc_link_xmit()" }, - "CVE-2018-20510": { - "cmt_msg": "binder: replace \"%p\" with \"%pK\"" + "CVE-2020-10751": { + "cmt_msg": "selinux: properly handle multiple messages in selinux_netlink_send()" }, - "CVE-2022-20166": { - "cmt_msg": "drivers core: Use sysfs_emit and sysfs_emit_at for show(device *...) functions" + "CVE-2020-10757": { + "cmt_msg": "mm: Fix mremap not considering huge pmd devmap" }, "CVE-2019-14763": { "cmt_msg": "usb: dwc3: gadget: never call ->complete() from ->ep_queue()" }, - "CVE-2020-15437": { - "cmt_msg": "serial: 8250: fix null-ptr-deref in serial8250_start_tx()" - }, - "CVE-2020-15436": { - "cmt_msg": "block: Fix use-after-free in blkdev_get()" - }, "CVE-2022-1116": { "cmt_msg": "" }, "CVE-2021-28660": { "cmt_msg": "staging: rtl8188eu: prevent ->ssid overflow in rtw_wx_set_scan()" }, - "CVE-2024-0775": { - "cmt_msg": "ext4: improve error recovery code paths in __ext4_remount()" - }, - "CVE-2020-8647": { - "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region" - }, - "CVE-2019-0155": { - "cmt_msg": "drm/i915: Rename gen7 cmdparser tables" - }, - "CVE-2019-0154": { - "cmt_msg": "drm/i915: Lower RM timeout to avoid DSI hard hangs" - }, - "CVE-2023-35827": { - "cmt_msg": "ravb: Fix use-after-free issue in ravb_tx_timeout_work()" - }, "CVE-2020-36386": { "cmt_msg": "Bluetooth: Fix slab-out-of-bounds read in hci_extended_inquiry_result_evt()" }, - "CVE-2022-3567": { - "cmt_msg": "ipv6: Fix data races around sk->sk_prot." - }, - "CVE-2022-3566": { - "cmt_msg": "tcp: Fix data races around icsk->icsk_af_ops." - }, - "CVE-2022-3565": { - "cmt_msg": "mISDN: fix use-after-free bugs in l1oip timer handlers" - }, - "CVE-2022-3564": { - "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free caused by l2cap_reassemble_sdu" - }, - "CVE-2018-19407": { - "cmt_msg": "KVM: X86: Fix scan ioapic use-before-initialization" - }, - "CVE-2021-20317": { - "cmt_msg": "lib/timerqueue: Rely on rbtree semantics for next timer" - }, "CVE-2020-36385": { "cmt_msg": "RDMA/ucma: Rework ucma_migrate_id() to avoid races with destroy" }, - "CVE-2019-14897": { - "cmt_msg": "libertas: Fix two buffer overflows at parsing bss descriptor" - }, "CVE-2018-9385": { "cmt_msg": "ARM: amba: Don't read past the end of sysfs \"driver_override\" buffer" }, "CVE-2020-0009": { "cmt_msg": "staging: android: ashmem: Disallow ashmem memory from being remapped" }, - "CVE-2023-52340": { - "cmt_msg": "ipv6: remove max_size check inline with ipv4" - }, - "CVE-2023-31082": { - "cmt_msg": "" - }, - "CVE-2020-24394": { - "cmt_msg": "nfsd: apply umask on fs without ACL support" - }, "CVE-2019-14615": { "cmt_msg": "drm/i915/gen9: Clear residual context state on context switch" }, - "CVE-2018-16871": { - "cmt_msg": "nfsd: COPY and CLONE operations require the saved filehandle to be set" - }, "CVE-2018-9415": { "cmt_msg": "ARM: amba: Fix race condition with driver_override" }, - "CVE-2023-52442": { - "cmt_msg": "ksmbd: validate session id and tree id in compound request" - }, "CVE-2019-13648": { "cmt_msg": "powerpc/tm: Fix oops on sigreturn on systems without TM" }, - "CVE-2023-0030": { - "cmt_msg": "drm/nouveau/mmu: add more general vmm free/node handling functions" - }, - "CVE-2020-16120": { - "cmt_msg": "ovl: switch to mounter creds in readdir" - }, - "CVE-2019-11599": { - "cmt_msg": "coredump: fix race condition between mmget_not_zero()/get_task_mm() and core dumping" - }, - "CVE-2018-16658": { - "cmt_msg": "cdrom: Fix info leak/OOB read in cdrom_ioctl_drive_status" - }, "CVE-2018-15572": { "cmt_msg": "x86/speculation: Protect against userspace-userspace spectreRSB" }, "CVE-2022-1204": { "cmt_msg": "ax25: Fix refcount leaks caused by ax25_cb_del()" }, - "CVE-2019-2101": { - "cmt_msg": "media: uvcvideo: Fix 'type' check leading to overflow" - }, - "CVE-2019-17666": { - "cmt_msg": "rtlwifi: Fix potential overflow on P2P code" - }, - "CVE-2021-23133": { - "cmt_msg": "net/sctp: fix race condition in sctp_destroy_sock" - }, "CVE-2018-9363": { "cmt_msg": "Bluetooth: hidp: buffer overflow in hidp_process_report" }, - "CVE-2018-15471": { - "cmt_msg": "xen-netback: fix input validation in xenvif_set_hash_mapping()" - }, "CVE-2016-10723": { "cmt_msg": "mm, oom: remove sleep from under oom_lock" }, - "CVE-2021-3573": { - "cmt_msg": "Bluetooth: use correct lock to prevent UAF of hdev object" + "CVE-2022-26490": { + "cmt_msg": "nfc: st21nfca: Fix potential buffer overflows in EVT_TRANSACTION" + }, + "CVE-2020-8832": { + "cmt_msg": "drm/i915: Record the default hw state after reset upon load" + }, + "CVE-2020-8834": { + "cmt_msg": "KVM: PPC: Book3S HV: Factor fake-suspend handling out of kvmppc_save/restore_tm" + }, + "CVE-2023-52531": { + "cmt_msg": "wifi: iwlwifi: mvm: Fix a memory corruption issue" + }, + "CVE-2023-52532": { + "cmt_msg": "net: mana: Fix TX CQE error handling" + }, + "CVE-2023-39189": { + "cmt_msg": "netfilter: nfnetlink_osf: avoid OOB read" + }, + "CVE-2024-26677": { + "cmt_msg": "rxrpc: Fix delayed ACKs to not set the reference serial number" + }, + "CVE-2020-25211": { + "cmt_msg": "netfilter: ctnetlink: add a range check for l3/l4 protonum" }, "CVE-2020-25212": { "cmt_msg": "nfs: Fix getxattr kernel panic and memory overflow" }, - "CVE-2019-19036": { - "cmt_msg": "btrfs: Detect unbalanced tree with empty leaf before crashing btree operations" + "CVE-2020-28374": { + "cmt_msg": "scsi: target: Fix XCOPY NAA identifier lookup" }, - "CVE-2019-3459": { - "cmt_msg": "Bluetooth: Verify that l2cap_get_conf_opt provides large enough buffer" + "CVE-2024-26672": { + "cmt_msg": "drm/amdgpu: Fix variable 'mca_funcs' dereferenced before NULL check in 'amdgpu_mca_smu_get_mca_entry()'" }, - "CVE-2020-11494": { - "cmt_msg": "slcan: Don't transmit uninitialized stack data in padding" + "CVE-2024-26671": { + "cmt_msg": "blk-mq: fix IO hang from sbitmap wakeup race" }, - "CVE-2019-19039": { - "cmt_msg": "btrfs: Don't submit any btree write bio if the fs has errors" + "CVE-2024-26679": { + "cmt_msg": "inet: read sk->sk_family once in inet_recv_error()" }, - "CVE-2020-0444": { - "cmt_msg": "audit: fix error handling in audit_data_to_entry()" + "CVE-2023-52458": { + "cmt_msg": "block: add check that partition length needs to be aligned with block size" }, - "CVE-2018-10675": { - "cmt_msg": "mm/mempolicy: fix use after free when calling get_mempolicy" + "CVE-2023-52451": { + "cmt_msg": "powerpc/pseries/memhp: Fix access beyond end of drmem array" }, - "CVE-2017-16526": { - "cmt_msg": "uwb: properly check kthread_run return value" + "CVE-2018-9568": { + "cmt_msg": "net: Set sk_prot_creator when cloning sockets to the right proto" }, - "CVE-2017-16527": { - "cmt_msg": "ALSA: usb-audio: Kill stray URB at exiting" + "CVE-2022-0644": { + "cmt_msg": "vfs: check fd has read access in kernel_read_file_from_fd()" }, - "CVE-2017-16525": { - "cmt_msg": "USB: serial: console: fix use-after-free after failed setup" + "CVE-2019-14816": { + "cmt_msg": "mwifiex: Fix three heap overflow at parsing element in cfg80211_ap_settings" }, - "CVE-2022-1836": { - "cmt_msg": "floppy: disable FDRAWCMD by default" + "CVE-2019-14814": { + "cmt_msg": "mwifiex: Fix three heap overflow at parsing element in cfg80211_ap_settings" }, - "CVE-2020-8834": { - "cmt_msg": "KVM: PPC: Book3S HV: Factor fake-suspend handling out of kvmppc_save/restore_tm" + "CVE-2019-14815": { + "cmt_msg": "mwifiex: Fix three heap overflow at parsing element in cfg80211_ap_settings" }, - "CVE-2021-32078": { - "cmt_msg": "ARM: footbridge: remove personal server platform" + "CVE-2024-26706": { + "cmt_msg": "parisc: Fix random data corruption from exception handler" }, - "CVE-2022-30594": { - "cmt_msg": "ptrace: Check PTRACE_O_SUSPEND_SECCOMP permission on PTRACE_SEIZE" + "CVE-2024-26704": { + "cmt_msg": "ext4: fix double-free of blocks due to wrong extents moved_len" }, - "CVE-2017-16528": { - "cmt_msg": "ALSA: seq: Cancel pending autoload work at unbinding device" + "CVE-2020-25672": { + "cmt_msg": "nfc: fix memory leak in llcp_sock_connect()" }, - "CVE-2017-16529": { - "cmt_msg": "ALSA: usb-audio: Check out-of-bounds access by corrupted buffer descriptor" + "CVE-2020-25673": { + "cmt_msg": "nfc: Avoid endless loops caused by repeated llcp_sock_connect()" }, - "CVE-2019-11833": { - "cmt_msg": "ext4: zero out the unused memory region in the extent tree block" + "CVE-2020-25670": { + "cmt_msg": "nfc: fix refcount leak in llcp_sock_bind()" }, - "CVE-2021-38205": { - "cmt_msg": "net: xilinx_emaclite: Do not print real IOMEM pointer" + "CVE-2020-25671": { + "cmt_msg": "nfc: fix refcount leak in llcp_sock_connect()" }, - "CVE-2020-27835": { - "cmt_msg": "IB/hfi1: Ensure correct mm is used at all times" + "CVE-2019-19813": { + "cmt_msg": "btrfs: inode: Verify inode mode to avoid NULL pointer dereference" }, - "CVE-2020-0255": { - "cmt_msg": "selinux: properly handle multiple messages in selinux_netlink_send()" + "CVE-2020-29374": { + "cmt_msg": "gup: document and work around \"COW can break either way\" issue" }, - "CVE-2019-2215": { - "cmt_msg": "ANDROID: binder: remove waitqueue when thread exits." + "CVE-2019-19815": { + "cmt_msg": "f2fs: support swap file w/ DIO" }, - "CVE-2023-35001": { - "cmt_msg": "netfilter: nf_tables: prevent OOB access in nft_byteorder_eval" + "CVE-2019-19814": { + "cmt_msg": "" }, - "CVE-2022-27666": { - "cmt_msg": "esp: Fix possible buffer overflow in ESP transformation" + "CVE-2020-29371": { + "cmt_msg": "romfs: fix uninitialized memory leak in romfs_dev_read()" }, - "CVE-2021-38208": { - "cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect" + "CVE-2019-19816": { + "cmt_msg": "btrfs: inode: Verify inode mode to avoid NULL pointer dereference" }, - "CVE-2018-1108": { - "cmt_msg": "random: fix crng_ready() test" + "CVE-2018-18710": { + "cmt_msg": "cdrom: fix improper type cast, which can leat to information leak." }, - "CVE-2017-18232": { - "cmt_msg": "scsi: libsas: direct call probe and destruct" + "CVE-2023-34255": { + "cmt_msg": "xfs: verify buffer contents when we skip log replay" }, - "CVE-2019-2213": { - "cmt_msg": "binder: fix possible UAF when freeing buffer" + "CVE-2022-23040": { + "cmt_msg": "xen/xenbus: don't let xenbus_grant_ring() remove grants in error case" }, - "CVE-2023-3338": { - "cmt_msg": "Remove DECnet support from kernel" + "CVE-2023-3141": { + "cmt_msg": "memstick: r592: Fix UAF bug in r592_remove due to race condition" }, - "CVE-2020-25211": { - "cmt_msg": "netfilter: ctnetlink: add a range check for l3/l4 protonum" + "CVE-2020-12655": { + "cmt_msg": "xfs: add agf freeblocks verify in xfs_agf_verify" }, - "CVE-2017-14140": { - "cmt_msg": "Sanitize 'move_pages()' permission checks" + "CVE-2022-3524": { + "cmt_msg": "tcp/udp: Fix memory leak in ipv6_renew_options()." }, - "CVE-2020-26556": { - "cmt_msg": "" + "CVE-2022-3523": { + "cmt_msg": "mm/memory.c: fix race when faulting a device private page" }, - "CVE-2018-9518": { - "cmt_msg": "NFC: llcp: Limit size of SDP URI" + "CVE-2022-3522": { + "cmt_msg": "mm/hugetlb: use hugetlb_pte_stable in migration race check" }, - "CVE-2020-26555": { - "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical" + "CVE-2022-3521": { + "cmt_msg": "kcm: avoid potential race in kcm_tx_work" }, - "CVE-2018-9517": { - "cmt_msg": "l2tp: pass tunnel pointer to ->session_create()" + "CVE-2018-7755": { + "cmt_msg": "floppy: Do not copy a kernel pointer to user memory in FDGETPRM ioctl" }, - "CVE-2018-9516": { - "cmt_msg": "HID: debug: check length before copy_to_user()" + "CVE-2018-7754": { + "cmt_msg": "printk: hash addresses printed with %p" }, - "CVE-2023-3397": { - "cmt_msg": "" + "CVE-2018-7757": { + "cmt_msg": "scsi: libsas: fix memory leak in sas_smp_get_phy_events()" }, - "CVE-2018-1128": { - "cmt_msg": "libceph: add authorizer challenge" + "CVE-2022-0330": { + "cmt_msg": "drm/i915: Flush TLBs before releasing backing store" }, - "CVE-2018-1129": { - "cmt_msg": "libceph: implement CEPHX_V2 calculation mode" + "CVE-2022-4095": { + "cmt_msg": "staging: rtl8712: fix use after free bugs" }, - "CVE-2018-1087": { - "cmt_msg": "kvm/x86: fix icebp instruction handling" + "CVE-2022-45919": { + "cmt_msg": "media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221" }, - "CVE-2022-26365": { - "cmt_msg": "xen/blkfront: fix leaking data in shared pages" + "CVE-2021-3669": { + "cmt_msg": "ipc: replace costly bailout check in sysvipc_find_ipc()" }, - "CVE-2022-1652": { - "cmt_msg": "floppy: use a statically allocated error counter" + "CVE-2019-3701": { + "cmt_msg": "can: gw: ensure DLC boundaries after CAN frame modification" }, - "CVE-2018-1120": { - "cmt_msg": "proc: do not access cmdline nor environ from file-backed areas" + "CVE-2023-1095": { + "cmt_msg": "netfilter: nf_tables: fix null deref due to zeroed list head" }, - "CVE-2018-1121": { + "CVE-2022-3239": { + "cmt_msg": "media: em28xx: initialize refcount before kref_get" + }, + "CVE-2022-4543": { "cmt_msg": "" }, - "CVE-2018-20856": { - "cmt_msg": "block: blk_init_allocated_queue() set q->fq as NULL in the fail case" + "CVE-2019-18282": { + "cmt_msg": "net/flow_dissector: switch to siphash" }, - "CVE-2017-18549": { - "cmt_msg": "scsi: aacraid: Don't copy uninitialized stack memory to userspace" + "CVE-2021-34981": { + "cmt_msg": "Bluetooth: cmtp: fix file refcount when cmtp_attach_device fails" }, - "CVE-2023-52451": { - "cmt_msg": "powerpc/pseries/memhp: Fix access beyond end of drmem array" + "CVE-2018-14625": { + "cmt_msg": "vhost/vsock: fix use-after-free in network stack callers" }, - "CVE-2017-5754": { - "cmt_msg": "x86/cpufeatures: Add Intel feature bits for Speculation Control" + "CVE-2023-4881": { + "cmt_msg": "netfilter: nftables: exthdr: fix 4-byte stack OOB write" }, - "CVE-2022-3061": { - "cmt_msg": "video: fbdev: i740fb: Error out if 'pixclock' equals zero" + "CVE-2013-7445": { + "cmt_msg": "" }, - "CVE-2017-5753": { - "cmt_msg": "x86/cpufeatures: Add X86_BUG_SPECTRE_V[12]" + "CVE-2024-26804": { + "cmt_msg": "net: ip_tunnel: prevent perpetual headroom growth" }, - "CVE-2022-2961": { - "cmt_msg": "" + "CVE-2024-26805": { + "cmt_msg": "netlink: Fix kernel-infoleak-after-free in __skb_datagram_iter" }, - "CVE-2023-2176": { - "cmt_msg": "RDMA/core: Refactor rdma_bind_addr" + "CVE-2022-3303": { + "cmt_msg": "ALSA: pcm: oss: Fix race at SNDCTL_DSP_SYNC" }, - "CVE-2024-1086": { - "cmt_msg": "netfilter: nf_tables: reject QUEUE/DROP verdict parameters" + "CVE-2020-12771": { + "cmt_msg": "bcache: fix potential deadlock problem in btree_gc_coalesce" }, - "CVE-2024-22386": { - "cmt_msg": "" + "CVE-2024-26595": { + "cmt_msg": "mlxsw: spectrum_acl_tcam: Fix NULL pointer dereference in error path" }, - "CVE-2019-9466": { - "cmt_msg": "brcmfmac: add subtype check for event handling in data path" + "CVE-2024-0607": { + "cmt_msg": "netfilter: nf_tables: fix pointer math issue in nft_byteorder_eval()" }, - "CVE-2020-11565": { - "cmt_msg": "mm: mempolicy: require at least one nodeid for MPOL_PREFERRED" + "CVE-2024-26801": { + "cmt_msg": "Bluetooth: Avoid potential use-after-free in hci_error_reset" }, - "CVE-2019-19049": { - "cmt_msg": "of: unittest: fix memory leak in unittest_data_add" + "CVE-2022-28388": { + "cmt_msg": "can: usb_8dev: usb_8dev_start_xmit(): fix double dev_kfree_skb() in error path" }, - "CVE-2018-9568": { - "cmt_msg": "net: Set sk_prot_creator when cloning sockets to the right proto" + "CVE-2018-6412": { + "cmt_msg": "fbdev: Fixing arbitrary kernel leak in case FBIOGETCMAP_SPARC in sbusfb_ioctl_helper()." }, - "CVE-2022-0644": { - "cmt_msg": "vfs: check fd has read access in kernel_read_file_from_fd()" + "CVE-2018-1000004": { + "cmt_msg": "ALSA: seq: Make ioctls race-free" }, - "CVE-2020-27784": { - "cmt_msg": "usb: gadget: function: printer: fix use-after-free in __lock_acquire" + "CVE-2019-20811": { + "cmt_msg": "net-sysfs: call dev_hold if kobject_init_and_add success" }, - "CVE-2018-13053": { - "cmt_msg": "alarmtimer: Prevent overflow for relative nanosleep" + "CVE-2019-20810": { + "cmt_msg": "media: go7007: fix a miss of snd_card_free" }, - "CVE-2020-27786": { - "cmt_msg": "ALSA: rawmidi: Fix racy buffer resize under concurrent accesses" + "CVE-2019-20812": { + "cmt_msg": "af_packet: set defaule value for tmo" }, - "CVE-2019-14816": { - "cmt_msg": "mwifiex: Fix three heap overflow at parsing element in cfg80211_ap_settings" + "CVE-2018-1118": { + "cmt_msg": "vhost: fix info leak due to uninitialized memory" }, - "CVE-2019-14814": { - "cmt_msg": "mwifiex: Fix three heap overflow at parsing element in cfg80211_ap_settings" + "CVE-2019-18660": { + "cmt_msg": "powerpc/book3s64: Fix link stack flush on context switch" }, - "CVE-2019-14815": { - "cmt_msg": "mwifiex: Fix three heap overflow at parsing element in cfg80211_ap_settings" + "CVE-2019-12380": { + "cmt_msg": "efi/x86/Add missing error handling to old_memmap 1:1 mapping code" }, - "CVE-2023-6240": { - "cmt_msg": "" + "CVE-2019-12381": { + "cmt_msg": "ip_sockglue: Fix missing-check bug in ip_ra_control()" }, - "CVE-2023-23559": { - "cmt_msg": "wifi: rndis_wlan: Prevent buffer overflow in rndis_query_oid" + "CVE-2019-12382": { + "cmt_msg": "drm/edid: Fix a missing-check bug in drm_load_edid_firmware()" }, - "CVE-2020-10720": { - "cmt_msg": "net-gro: fix use-after-free read in napi_gro_frags()" + "CVE-2020-10766": { + "cmt_msg": "x86/speculation: Prevent rogue cross-process SSBD shutdown" }, - "CVE-2022-0382": { - "cmt_msg": "net ticp:fix a kernel-infoleak in __tipc_sendmsg()" + "CVE-2020-10767": { + "cmt_msg": "x86/speculation: Avoid force-disabling IBPB based on STIBP and enhanced IBRS." }, - "CVE-2019-9456": { - "cmt_msg": "usb: usbmon: Read text within supplied buffer size" + "CVE-2019-25162": { + "cmt_msg": "i2c: Fix a potential use after free" }, - "CVE-2023-32233": { - "cmt_msg": "netfilter: nf_tables: deactivate anonymous set from preparation phase" + "CVE-2019-25160": { + "cmt_msg": "netlabel: fix out-of-bounds memory accesses" }, - "CVE-2020-25672": { - "cmt_msg": "nfc: fix memory leak in llcp_sock_connect()" + "CVE-2020-10768": { + "cmt_msg": "x86/speculation: PR_SPEC_FORCE_DISABLE enforcement for indirect branches." }, - "CVE-2019-9455": { - "cmt_msg": "media: videobuf2-v4l2: drop WARN_ON in vb2_warn_zero_bytesused()" + "CVE-2020-10769": { + "cmt_msg": "crypto: authenc - fix parsing key with misaligned rta_len" }, - "CVE-2020-25670": { - "cmt_msg": "nfc: fix refcount leak in llcp_sock_bind()" + "CVE-2020-10942": { + "cmt_msg": "vhost: Check docket sk_family instead of call getname" }, - "CVE-2020-25671": { - "cmt_msg": "nfc: fix refcount leak in llcp_sock_connect()" + "CVE-2020-26139": { + "cmt_msg": "mac80211: do not accept/forward invalid EAPOL frames" }, - "CVE-2018-21008": { - "cmt_msg": "rsi: add fix for crash during assertions" + "CVE-2019-19536": { + "cmt_msg": "can: peak_usb: pcan_usb_pro: Fix info-leaks to USB devices" }, - "CVE-2019-15223": { - "cmt_msg": "ALSA: line6: Assure canceling delayed work at disconnection" + "CVE-2019-19537": { + "cmt_msg": "USB: core: Fix races in character device registration and deregistraion" }, - "CVE-2019-15220": { - "cmt_msg": "p54usb: Fix race between disconnect and firmware loading" + "CVE-2019-19534": { + "cmt_msg": "can: peak_usb: fix slab info leak" }, - "CVE-2019-15221": { - "cmt_msg": "ALSA: line6: Fix write on zero-sized buffer" + "CVE-2019-19535": { + "cmt_msg": "can: peak_usb: pcan_usb_fd: Fix info-leaks to USB devices" }, - "CVE-2019-19815": { - "cmt_msg": "f2fs: support swap file w/ DIO" + "CVE-2020-11565": { + "cmt_msg": "mm: mempolicy: require at least one nodeid for MPOL_PREFERRED" }, - "CVE-2019-19814": { - "cmt_msg": "" + "CVE-2019-19533": { + "cmt_msg": "media: ttusb-dec: Fix info-leak in ttusb_dec_send_command()" }, - "CVE-2020-29371": { - "cmt_msg": "romfs: fix uninitialized memory leak in romfs_dev_read()" + "CVE-2019-19530": { + "cmt_msg": "usb: cdc-acm: make sure a refcount is taken early enough" }, - "CVE-2019-19816": { - "cmt_msg": "btrfs: inode: Verify inode mode to avoid NULL pointer dereference" + "CVE-2019-19531": { + "cmt_msg": "usb: yurex: Fix use-after-free in yurex_delete" }, - "CVE-2017-16939": { - "cmt_msg": "ipsec: Fix aborted xfrm policy dump crash" + "CVE-2023-52527": { + "cmt_msg": "ipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data()" }, - "CVE-2020-0429": { - "cmt_msg": "l2tp: fix race between l2tp_session_delete() and l2tp_tunnel_closeall()" + "CVE-2023-3006": { + "cmt_msg": "arm64: Add AMPERE1 to the Spectre-BHB affected list" }, - "CVE-2022-1016": { - "cmt_msg": "netfilter: nf_tables: initialize registers in nft_do_chain()" + "CVE-2023-52522": { + "cmt_msg": "net: fix possible store tearing in neigh_periodic_work()" }, - "CVE-2018-18710": { - "cmt_msg": "cdrom: fix improper type cast, which can leat to information leak." + "CVE-2019-8912": { + "cmt_msg": "net: crypto set sk to NULL when af_alg_release." }, - "CVE-2019-5108": { - "cmt_msg": "mac80211: Do not send Layer 2 Update frame before authorization" + "CVE-2023-52528": { + "cmt_msg": "net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg" + }, + "CVE-2020-0305": { + "cmt_msg": "chardev: Avoid potential use-after-free in 'chrdev_open()'" + }, + "CVE-2024-22386": { + "cmt_msg": "" }, - "CVE-2022-1012": { - "cmt_msg": "secure_seq: use the 64 bits of the siphash for port offset calculation" + "CVE-2023-39194": { + "cmt_msg": "net: xfrm: Fix xfrm_address_filter OOB read" }, - "CVE-2020-12114": { - "cmt_msg": "make struct mountpoint bear the dentry reference to mountpoint, not struct mount" + "CVE-2023-39197": { + "cmt_msg": "netfilter: conntrack: dccp: copy entire header to stack buffer, not just basic one" }, - "CVE-2020-8649": { - "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region" + "CVE-2023-39193": { + "cmt_msg": "netfilter: xt_sctp: validate the flag_info count" }, - "CVE-2020-12351": { - "cmt_msg": "Bluetooth: L2CAP: Fix calling sk_filter on non-socket based channel" + "CVE-2023-39192": { + "cmt_msg": "netfilter: xt_u32: validate user space input" }, - "CVE-2020-12656": { - "cmt_msg": "sunrpc: check that domain table is empty at module unload." + "CVE-2024-26600": { + "cmt_msg": "phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP" }, - "CVE-2020-14356": { - "cmt_msg": "cgroup: fix cgroup_sk_alloc() for sk_clone_lock()" + "CVE-2024-26606": { + "cmt_msg": "binder: signal epoll threads of self-work" }, - "CVE-2017-1000405": { - "cmt_msg": "mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d()" + "CVE-2017-14156": { + "cmt_msg": "video: fbdev: aty: do not leak uninitialized padding in clk to userspace" }, - "CVE-2021-26930": { - "cmt_msg": "xen-blkback: fix error handling in xen_blkbk_map()" + "CVE-2023-52429": { + "cmt_msg": "dm: limit the number of targets and parameter size area" }, - "CVE-2017-1000407": { - "cmt_msg": "KVM: VMX: remove I/O port 0x80 bypass on Intel hosts" + "CVE-2022-1652": { + "cmt_msg": "floppy: use a statically allocated error counter" }, - "CVE-2021-26932": { - "cmt_msg": "Xen/x86: don't bail early from clear_foreign_p2m_mapping()" + "CVE-2020-29568": { + "cmt_msg": "xen/xenbus: Allow watches discard events before queueing" }, - "CVE-2023-52456": { - "cmt_msg": "serial: imx: fix tx statemachine deadlock" + "CVE-2016-8660": { + "cmt_msg": "" }, - "CVE-2023-3141": { - "cmt_msg": "memstick: r592: Fix UAF bug in r592_remove due to race condition" + "CVE-2020-14314": { + "cmt_msg": "ext4: fix potential negative array index in do_split()" }, - "CVE-2019-3892": { - "cmt_msg": "coredump: fix race condition between mmget_not_zero()/get_task_mm() and core dumping" + "CVE-2019-13272": { + "cmt_msg": "ptrace: Fix ->ptracer_cred handling for PTRACE_TRACEME" }, - "CVE-2020-12352": { - "cmt_msg": "Bluetooth: A2MP: Fix not initializing all members" + "CVE-2022-1786": { + "cmt_msg": "io_uring: remove io_identity" }, - "CVE-2019-3460": { - "cmt_msg": "Bluetooth: Check L2CAP option sizes returned from l2cap_get_conf_opt" + "CVE-2020-25669": { + "cmt_msg": "Input: sunkbd - avoid use-after-free in teardown paths" }, - "CVE-2020-12655": { - "cmt_msg": "xfs: add agf freeblocks verify in xfs_agf_verify" + "CVE-2020-25668": { + "cmt_msg": "tty: make FONTX ioctl use the tty pointer they were actually passed" }, - "CVE-2021-43976": { - "cmt_msg": "mwifiex: Fix skb_over_panic in mwifiex_usb_recv()" + "CVE-2008-4609": { + "cmt_msg": "" }, - "CVE-2022-0494": { - "cmt_msg": "block-map: add __GFP_ZERO flag for alloc_page in function bio_copy_kern" + "CVE-2022-0435": { + "cmt_msg": "tipc: improve size validations for received domain records" }, - "CVE-2023-2269": { - "cmt_msg": "dm ioctl: fix nested locking in table_clear() to remove deadlock concern" + "CVE-2023-26607": { + "cmt_msg": "ntfs: fix out-of-bounds read in ntfs_attr_find()" }, - "CVE-2020-26088": { - "cmt_msg": "net/nfc/rawsock.c: add CAP_NET_RAW check." + "CVE-2021-4037": { + "cmt_msg": "xfs: fix up non-directory creation in SGID directories" }, - "CVE-2022-3524": { - "cmt_msg": "tcp/udp: Fix memory leak in ipv6_renew_options()." + "CVE-2021-22543": { + "cmt_msg": "KVM: do not allow mapping valid but non-reference-counted pages" }, - "CVE-2022-3523": { - "cmt_msg": "mm/memory.c: fix race when faulting a device private page" + "CVE-2018-18386": { + "cmt_msg": "n_tty: fix EXTPROC vs ICANON interaction with TIOCINQ (aka FIONREAD)" }, - "CVE-2022-3522": { - "cmt_msg": "mm/hugetlb: use hugetlb_pte_stable in migration race check" + "CVE-2021-47169": { + "cmt_msg": "serial: rp2: use 'request_firmware' instead of 'request_firmware_nowait'" }, - "CVE-2008-2544": { - "cmt_msg": "" + "CVE-2023-3776": { + "cmt_msg": "net/sched: cls_fw: Fix improper refcount update leads to use-after-free" }, - "CVE-2021-3178": { - "cmt_msg": "nfsd4: readdirplus shouldn't return parent of export" + "CVE-2023-3772": { + "cmt_msg": "xfrm: add NULL check in xfrm_update_ae_params" }, - "CVE-2022-2318": { - "cmt_msg": "net: rose: fix UAF bugs caused by timer handler" + "CVE-2022-3533": { + "cmt_msg": "" }, - "CVE-2020-10690": { - "cmt_msg": "ptp: fix the race between the release of ptp_clock and cdev" + "CVE-2022-3534": { + "cmt_msg": "libbpf: Fix use-after-free in btf_dump_name_dups" }, - "CVE-2018-7755": { - "cmt_msg": "floppy: Do not copy a kernel pointer to user memory in FDGETPRM ioctl" + "CVE-2018-7740": { + "cmt_msg": "hugetlbfs: check for pgoff value overflow" }, - "CVE-2018-7754": { - "cmt_msg": "printk: hash addresses printed with %p" + "CVE-2022-0322": { + "cmt_msg": "sctp: account stream padding length for reconf chunk" }, - "CVE-2018-7757": { - "cmt_msg": "scsi: libsas: fix memory leak in sas_smp_get_phy_events()" + "CVE-2021-4149": { + "cmt_msg": "btrfs: unlock newly allocated extent buffer after error" }, - "CVE-2022-0330": { - "cmt_msg": "drm/i915: Flush TLBs before releasing backing store" + "CVE-2022-21385": { + "cmt_msg": "net/rds: fix warn in rds_message_alloc_sgs" }, - "CVE-2007-3719": { - "cmt_msg": "" + "CVE-2021-47180": { + "cmt_msg": "NFC: nci: fix memory leak in nci_allocate_device" }, - "CVE-2023-3863": { - "cmt_msg": "net: nfc: Fix use-after-free caused by nfc_llcp_find_local" + "CVE-2020-28097": { + "cmt_msg": "vgacon: remove software scrollback support" }, - "CVE-2023-0590": { - "cmt_msg": "net: sched: fix race condition in qdisc_graft()" + "CVE-2017-7533": { + "cmt_msg": "dentry name snapshots" }, - "CVE-2022-29900": { - "cmt_msg": "x86/kvm/vmx: Make noinstr clean" + "CVE-2018-8897": { + "cmt_msg": "x86/entry/64: Don't use IST entry for #BP stack" }, - "CVE-2022-4095": { - "cmt_msg": "staging: rtl8712: fix use after free bugs" + "CVE-2020-14416": { + "cmt_msg": "can, slip: Protect tty->disc_data in write_wakeup and close with RCU" }, - "CVE-2022-45919": { - "cmt_msg": "media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221" + "CVE-2021-46928": { + "cmt_msg": "parisc: Clear stale IIR value on instruction access rights trap" }, - "CVE-2019-19319": { - "cmt_msg": "ext4: protect journal inode's blocks using block_validity" + "CVE-2018-14633": { + "cmt_msg": "scsi: target: iscsi: Use hex2bin instead of a re-implementation" }, - "CVE-2019-19462": { - "cmt_msg": "kernel/relay.c: handle alloc_percpu returning NULL in relay_open" + "CVE-2021-46924": { + "cmt_msg": "NFC: st21nfca: Fix memory leak in device probe and remove" }, - "CVE-2023-30772": { - "cmt_msg": "power: supply: da9150: Fix use after free bug in da9150_charger_remove due to race condition" + "CVE-2021-46925": { + "cmt_msg": "net/smc: fix kernel panic caused by race of smc_sock" }, - "CVE-2019-19530": { - "cmt_msg": "usb: cdc-acm: make sure a refcount is taken early enough" + "CVE-2021-46926": { + "cmt_msg": "ALSA: hda: intel-sdw-acpi: harden detection of controller" }, - "CVE-2022-24958": { - "cmt_msg": "usb: gadget: don't release an existing dev->buf" + "CVE-2023-1206": { + "cmt_msg": "tcp: Reduce chance of collisions in inet6_hashfn()." }, - "CVE-2023-1611": { - "cmt_msg": "btrfs: fix race between quota disable and quota assign ioctls" + "CVE-2022-3649": { + "cmt_msg": "nilfs2: fix use-after-free bug of struct nilfs_root" }, - "CVE-2021-3772": { - "cmt_msg": "sctp: use init_tag from inithdr for ABORT chunk" + "CVE-2022-3646": { + "cmt_msg": "nilfs2: fix leak of nilfs_root in case of writer thread creation failure" }, - "CVE-2023-3268": { - "cmt_msg": "relayfs: fix out-of-bounds access in relay_file_read" + "CVE-2022-3642": { + "cmt_msg": "" }, - "CVE-2021-3679": { - "cmt_msg": "tracing: Fix bug in rb_per_cpu_empty() that might cause deadloop." + "CVE-2022-3643": { + "cmt_msg": "xen/netback: Ensure protocol headers don't fall in the non-linear area" }, - "CVE-2021-37159": { - "cmt_msg": "usb: hso: fix error handling code of hso_create_net_device" + "CVE-2021-1048": { + "cmt_msg": "fix regression in \"epoll: Keep a reference on files added to the check list\"" }, - "CVE-2022-2586": { - "cmt_msg": "netfilter: nf_tables: do not allow SET_ID to refer to another table" + "CVE-2020-0543": { + "cmt_msg": "x86/cpu: Add 'table' argument to cpu_matches()" }, - "CVE-2022-3629": { - "cmt_msg": "vsock: Fix memory leak in vsock_connect()" + "CVE-2024-25739": { + "cmt_msg": "" }, - "CVE-2021-28715": { - "cmt_msg": "xen/netback: don't queue unlimited number of packages" + "CVE-2023-6535": { + "cmt_msg": "" }, - "CVE-2021-28714": { - "cmt_msg": "xen/netback: fix rx queue stall detection" + "CVE-2023-6536": { + "cmt_msg": "nvmet-tcp: fix a crash in nvmet_req_complete()" }, - "CVE-2021-28713": { - "cmt_msg": "xen/console: harden hvc_xen against event channel storms" + "CVE-2020-15780": { + "cmt_msg": "ACPI: configfs: Disallow loading ACPI tables when locked down" }, - "CVE-2021-28712": { - "cmt_msg": "xen/netfront: harden netfront against event channel storms" + "CVE-2019-11815": { + "cmt_msg": "net: rds: force to destroy connection if t_sock is NULL in rds_tcp_kill_sock()." }, - "CVE-2017-18261": { - "cmt_msg": "clocksource/drivers/arm_arch_timer: Avoid infinite recursion when ftrace is enabled" + "CVE-2022-36280": { + "cmt_msg": "drm/vmwgfx: Validate the box size for the snooped cursor" }, - "CVE-2021-4157": { - "cmt_msg": "pNFS/flexfiles: fix incorrect size check in decode_nfs_fh()" + "CVE-2024-21803": { + "cmt_msg": "" }, - "CVE-2022-2991": { - "cmt_msg": "remove the lightnvm subsystem" + "CVE-2018-1108": { + "cmt_msg": "random: fix crng_ready() test" }, - "CVE-2022-3621": { - "cmt_msg": "nilfs2: fix NULL pointer dereference at nilfs_bmap_lookup_at_level()" + "CVE-2018-16276": { + "cmt_msg": "USB: yurex: fix out-of-bounds uaccess in read handler" }, - "CVE-2017-11473": { - "cmt_msg": "x86/acpi: Prevent out of bound access caused by broken ACPI tables" + "CVE-2023-2176": { + "cmt_msg": "RDMA/core: Refactor rdma_bind_addr" }, - "CVE-2017-11472": { - "cmt_msg": "ACPICA: Namespace: fix operand cache leak" + "CVE-2019-16413": { + "cmt_msg": "9p: use inode->i_lock to protect i_size_write() under 32-bit" }, - "CVE-2022-3624": { - "cmt_msg": "bonding: fix reference count leak in balance-alb mode" + "CVE-2019-7222": { + "cmt_msg": "KVM: x86: work around leak of uninitialized stack contents (CVE-2019-7222)" }, - "CVE-2017-17862": { - "cmt_msg": "bpf: fix branch pruning logic" + "CVE-2019-7221": { + "cmt_msg": "KVM: nVMX: unconditionally cancel preemption timer in free_nested (CVE-2019-7221)" }, - "CVE-2017-17863": { - "cmt_msg": "bpf: fix integer overflows" + "CVE-2020-10773": { + "cmt_msg": "s390/cmm: fix information leak in cmm_timeout_handler()" }, - "CVE-2021-3669": { - "cmt_msg": "ipc: replace costly bailout check in sysvipc_find_ipc()" + "CVE-2018-18281": { + "cmt_msg": "mremap: properly flush TLB before releasing the page" }, - "CVE-2019-18885": { - "cmt_msg": "btrfs: merge btrfs_find_device and find_device" + "CVE-2022-2663": { + "cmt_msg": "netfilter: nf_conntrack_irc: Fix forged IP logic" }, - "CVE-2022-4744": { - "cmt_msg": "tun: avoid double free in tun_free_netdev" + "CVE-2024-26803": { + "cmt_msg": "net: veth: clear GRO when clearing XDP even when down" }, - "CVE-2017-12134": { - "cmt_msg": "xen: fix bio vec merging" + "CVE-2020-25643": { + "cmt_msg": "hdlc_ppp: add range checks in ppp_cp_parse_cr()" }, - "CVE-2019-11091": { - "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" + "CVE-2020-4788": { + "cmt_msg": "powerpc/64s: flush L1D on kernel entry" }, - "CVE-2022-3239": { - "cmt_msg": "media: em28xx: initialize refcount before kref_get" + "CVE-2021-39698": { + "cmt_msg": "wait: add wake_up_pollfree()" }, - "CVE-2022-4543": { - "cmt_msg": "" + "CVE-2018-5333": { + "cmt_msg": "RDS: null pointer dereference in rds_atomic_free_op" }, - "CVE-2019-18660": { - "cmt_msg": "powerpc/book3s64: Fix link stack flush on context switch" + "CVE-2018-5332": { + "cmt_msg": "RDS: Heap OOB write in rds_message_alloc_sgs()" }, - "CVE-2023-4921": { - "cmt_msg": "net: sched: sch_qfq: Fix UAF in qfq_dequeue()" + "CVE-2021-3759": { + "cmt_msg": "memcg: enable accounting of ipc resources" }, - "CVE-2022-3424": { - "cmt_msg": "misc: sgi-gru: fix use-after-free error in gru_set_context_option, gru_fault and gru_handle_user_call_os" + "CVE-2019-19528": { + "cmt_msg": "USB: iowarrior: fix use-after-free on disconnect" }, - "CVE-2017-15649": { - "cmt_msg": "packet: in packet_do_bind, test fanout with bind_lock held" + "CVE-2017-17448": { + "cmt_msg": "netfilter: nfnetlink_cthelper: Add missing permission checks" }, - "CVE-2023-23455": { - "cmt_msg": "net: sched: atm: dont intepret cls results when asked to drop" + "CVE-2017-17449": { + "cmt_msg": "netlink: Add netns check on taps" }, - "CVE-2023-1829": { - "cmt_msg": "net/sched: Retire tcindex classifier" + "CVE-2019-19525": { + "cmt_msg": "ieee802154: atusb: fix use-after-free at disconnect" }, - "CVE-2019-18282": { - "cmt_msg": "net/flow_dissector: switch to siphash" + "CVE-2019-19524": { + "cmt_msg": "Input: ff-memless - kill timer in destroy()" }, - "CVE-2021-34981": { - "cmt_msg": "Bluetooth: cmtp: fix file refcount when cmtp_attach_device fails" + "CVE-2019-19527": { + "cmt_msg": "HID: hiddev: do cleanup in failure of opening a device" }, - "CVE-2023-1670": { - "cmt_msg": "xirc2ps_cs: Fix use after free bug in xirc2ps_detach" + "CVE-2021-3753": { + "cmt_msg": "vt_kdsetmode: extend console locking" }, - "CVE-2018-14625": { - "cmt_msg": "vhost/vsock: fix use-after-free in network stack callers" + "CVE-2021-3752": { + "cmt_msg": "Bluetooth: fix use-after-free error in lock_sock_nested()" }, - "CVE-2023-4881": { - "cmt_msg": "netfilter: nftables: exthdr: fix 4-byte stack OOB write" + "CVE-2023-7192": { + "cmt_msg": "netfilter: ctnetlink: fix possible refcount leak in ctnetlink_create_conntrack()" }, - "CVE-2017-14489": { - "cmt_msg": "scsi: scsi_transport_iscsi: fix the issue that iscsi_if_rx doesn't parse nlmsg properly" + "CVE-2017-18249": { + "cmt_msg": "f2fs: fix race condition in between free nid allocator/initializer" }, - "CVE-2023-6915": { - "cmt_msg": "ida: Fix crash in ida_free when the bitmap is empty" + "CVE-2022-1263": { + "cmt_msg": "KVM: avoid NULL pointer dereference in kvm_dirty_ring_push" }, - "CVE-2022-20148": { - "cmt_msg": "f2fs: fix UAF in f2fs_available_free_memory" + "CVE-2017-18241": { + "cmt_msg": "f2fs: fix a panic caused by NULL flush_cmd_control" }, - "CVE-2022-1786": { - "cmt_msg": "io_uring: remove io_identity" + "CVE-2021-41864": { + "cmt_msg": "bpf: Fix integer overflow in prealloc_elems_and_freelist()" }, - "CVE-2013-7445": { + "CVE-2022-2209": { "cmt_msg": "" }, - "CVE-2022-3646": { - "cmt_msg": "nilfs2: fix leak of nilfs_root in case of writer thread creation failure" + "CVE-2023-7042": { + "cmt_msg": "wifi: ath10k: fix NULL pointer dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev()" }, - "CVE-2022-28390": { - "cmt_msg": "can: ems_usb: ems_usb_start_xmit(): fix double dev_kfree_skb() in error path" + "CVE-2023-52559": { + "cmt_msg": "iommu/vt-d: Avoid memory allocation in iommu_suspend()" }, - "CVE-2020-12652": { - "cmt_msg": "scsi: mptfusion: Fix double fetch bug in ioctl" + "CVE-2023-47233": { + "cmt_msg": "wifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach" }, - "CVE-2017-14340": { - "cmt_msg": "xfs: XFS_IS_REALTIME_INODE() should be false if no rt device present" + "CVE-2022-1462": { + "cmt_msg": "tty: use new tty_insert_flip_string_and_push_buffer() in pty_write()" }, - "CVE-2022-26966": { - "cmt_msg": "sr9700: sanity check for packet length" + "CVE-2024-26614": { + "cmt_msg": "tcp: make sure init the accept_queue's spinlocks once" }, - "CVE-2023-6931": { - "cmt_msg": "perf: Fix perf_event_validate_size()" + "CVE-2019-20636": { + "cmt_msg": "Input: add safety guards to input_set_keycode()" }, - "CVE-2020-14386": { - "cmt_msg": "net/packet: fix overflow in tpacket_rcv" + "CVE-2023-52435": { + "cmt_msg": "net: prevent mss overflow in skb_segment()" }, - "CVE-2021-34693": { - "cmt_msg": "can: bcm: fix infoleak in struct bcm_msg_head" + "CVE-2023-52434": { + "cmt_msg": "smb: client: fix potential OOBs in smb2_parse_contexts()" }, - "CVE-2020-14381": { - "cmt_msg": "futex: Fix inode life-time issue" + "CVE-2023-52436": { + "cmt_msg": "f2fs: explicitly null-terminate the xattr list" }, - "CVE-2023-30456": { - "cmt_msg": "KVM: nVMX: add missing consistency checks for CR0 and CR4" + "CVE-2023-51779": { + "cmt_msg": "Bluetooth: af_bluetooth: Fix Use-After-Free in bt_sock_recvmsg" }, - "CVE-2019-19768": { - "cmt_msg": "blktrace: Protect q->blk_trace with RCU" + "CVE-2018-10877": { + "cmt_msg": "ext4: verify the depth of extent tree in ext4_find_extent()" }, - "CVE-2022-3303": { - "cmt_msg": "ALSA: pcm: oss: Fix race at SNDCTL_DSP_SYNC" + "CVE-2018-10876": { + "cmt_msg": "ext4: only look at the bg_flags field if it is valid" }, - "CVE-2017-5715": { - "cmt_msg": "x86/cpufeatures: Add X86_BUG_SPECTRE_V[12]" + "CVE-2010-4563": { + "cmt_msg": "" }, - "CVE-2022-20141": { - "cmt_msg": "igmp: Add ip_mc_list lock in ip_check_mc_rcu" + "CVE-2023-2162": { + "cmt_msg": "scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress" }, - "CVE-2020-25704": { - "cmt_msg": "perf/core: Fix a memory leak in perf_event_parse_addr_filter()" + "CVE-2018-10879": { + "cmt_msg": "ext4: make sure bitmaps and the inode table don't overlap with bg descriptors" }, - "CVE-2021-45095": { - "cmt_msg": "phonet: refcount leak in pep_sock_accep" + "CVE-2018-10878": { + "cmt_msg": "ext4: always check block group bounds in ext4_init_block_bitmap()" }, - "CVE-2023-23454": { - "cmt_msg": "net: sched: cbq: dont intepret cls results when asked to drop" + "CVE-2023-4622": { + "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES" }, - "CVE-2020-12771": { - "cmt_msg": "bcache: fix potential deadlock problem in btree_gc_coalesce" + "CVE-2023-4623": { + "cmt_msg": "net/sched: sch_hfsc: Ensure inner classes have fsc curve" }, - "CVE-2024-26595": { - "cmt_msg": "mlxsw: spectrum_acl_tcam: Fix NULL pointer dereference in error path" + "CVE-2019-0146": { + "cmt_msg": "i40e: add num_vectors checker in iwarp handler" }, - "CVE-2018-10853": { - "cmt_msg": "kvm: x86: use correct privilege level for sgdt/sidt/fxsave/fxrstor access" + "CVE-2021-38300": { + "cmt_msg": "bpf, mips: Validate conditional branch offsets" }, - "CVE-2018-3620": { - "cmt_msg": "x86/microcode: Allow late microcode loading with SMT disabled" + "CVE-2020-25656": { + "cmt_msg": "vt: keyboard, extend func_buf_lock to readers" }, - "CVE-2023-6932": { - "cmt_msg": "ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet" + "CVE-2021-4023": { + "cmt_msg": "io-wq: fix cancellation on create-worker failure" }, - "CVE-2017-18379": { - "cmt_msg": "nvmet-fc: ensure target queue id within range." + "CVE-2018-3693": { + "cmt_msg": "ext4: fix spectre gadget in ext4_mb_regular_allocator()" }, - "CVE-2018-8781": { - "cmt_msg": "drm: udl: Properly check framebuffer mmap offsets" + "CVE-2021-22555": { + "cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write" }, - "CVE-2021-29155": { - "cmt_msg": "bpf: Use correct permission flag for mixed signed bounds arithmetic" + "CVE-2023-3161": { + "cmt_msg": "fbcon: Check font dimension limits" }, - "CVE-2021-33631": { - "cmt_msg": "ext4: fix kernel BUG in 'ext4_write_inline_data_end()'" + "CVE-2018-7191": { + "cmt_msg": "tun: call dev_get_valid_name() before register_netdevice()" }, - "CVE-2019-15916": { - "cmt_msg": "net-sysfs: Fix mem leak in netdev_register_kobject" + "CVE-2018-10675": { + "cmt_msg": "mm/mempolicy: fix use after free when calling get_mempolicy" }, - "CVE-2019-15917": { - "cmt_msg": "Bluetooth: hci_ldisc: Postpone HCI_UART_PROTO_READY bit set in hci_uart_set_proto()" + "CVE-2017-0786": { + "cmt_msg": "brcmfmac: add length check in brcmf_cfg80211_escan_handler()" }, - "CVE-2017-18344": { - "cmt_msg": "posix-timer: Properly check sigevent->sigev_notify" + "CVE-2021-47082": { + "cmt_msg": "tun: avoid double free in tun_free_netdev" }, - "CVE-2017-15115": { - "cmt_msg": "sctp: do not peel off an assoc from one netns to another one" + "CVE-2021-47083": { + "cmt_msg": "pinctrl: mediatek: fix global-out-of-bounds issue" }, - "CVE-2017-15265": { - "cmt_msg": "ALSA: seq: Fix use-after-free at creating a port" + "CVE-2021-31916": { + "cmt_msg": "dm ioctl: fix out of bounds array access when no devices" }, - "CVE-2021-27363": { - "cmt_msg": "scsi: iscsi: Restrict sessions and handles to admin capabilities" + "CVE-2021-47086": { + "cmt_msg": "phonet/pep: refuse to enable an unbound pipe" }, - "CVE-2020-12362": { - "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" + "CVE-2018-11506": { + "cmt_msg": "sr: pass down correctly sized SCSI sense buffer" }, - "CVE-2020-12363": { - "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" + "CVE-2023-32269": { + "cmt_msg": "netrom: Fix use-after-free caused by accept on already connected socket" }, - "CVE-2019-12881": { - "cmt_msg": "drm/i915/userptr: reject zero user_size" + "CVE-2021-4157": { + "cmt_msg": "pNFS/flexfiles: fix incorrect size check in decode_nfs_fh()" }, - "CVE-2022-4129": { - "cmt_msg": "l2tp: Serialize access to sk_user_data with sk_callback_lock" + "CVE-2021-4155": { + "cmt_msg": "xfs: map unwritten blocks in XFS_IOC_{ALLOC,FREE}SP just like fallocate" }, - "CVE-2023-3117": { - "cmt_msg": "netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE" + "CVE-2021-4150": { + "cmt_msg": "block: fix incorrect references to disk objects" }, - "CVE-2018-1000004": { - "cmt_msg": "ALSA: seq: Make ioctls race-free" + "CVE-2021-4159": { + "cmt_msg": "bpf: Verifer, adjust_scalar_min_max_vals to always call update_reg_bounds()" }, - "CVE-2018-18690": { - "cmt_msg": "xfs: don't fail when converting shortform attr to long form during ATTR_REPLACE" + "CVE-2021-29154": { + "cmt_msg": "bpf, x86: Validate computation of branch displacements for x86-64" }, - "CVE-2022-28388": { - "cmt_msg": "can: usb_8dev: usb_8dev_start_xmit(): fix double dev_kfree_skb() in error path" + "CVE-2021-29155": { + "cmt_msg": "bpf: Use correct permission flag for mixed signed bounds arithmetic" }, - "CVE-2023-33203": { - "cmt_msg": "net: qcom/emac: Fix use after free bug in emac_remove due to race condition" + "CVE-2019-3016": { + "cmt_msg": "x86/kvm: Be careful not to clear KVM_VCPU_FLUSH_TLB bit" }, - "CVE-2017-0627": { - "cmt_msg": "media: uvcvideo: Prevent heap overflow when accessing mapped controls" + "CVE-2022-25375": { + "cmt_msg": "usb: gadget: rndis: check size of RNDIS_MSG_SET command" }, - "CVE-2021-0605": { - "cmt_msg": "af_key: pfkey_dump needs parameter validation" + "CVE-2021-47158": { + "cmt_msg": "net: dsa: sja1105: add error handling in sja1105_setup()" }, - "CVE-2021-3896": { - "cmt_msg": "isdn: cpai: check ctr->cnr to avoid array index out of bound" + "CVE-2021-47159": { + "cmt_msg": "net: dsa: fix a crash if ->get_sset_count() fails" }, - "CVE-2021-4002": { - "cmt_msg": "hugetlbfs: flush TLBs correctly after huge_pmd_unshare" + "CVE-2021-47153": { + "cmt_msg": "i2c: i801: Don't generate an interrupt on bus reset" }, - "CVE-2023-26545": { - "cmt_msg": "net: mpls: fix stale pointer if allocation fails during device rename" + "CVE-2021-47150": { + "cmt_msg": "net: fec: fix the potential memory leak in fec_enet_init()" }, - "CVE-2021-38204": { - "cmt_msg": "usb: max-3421: Prevent corruption of freed memory" + "CVE-2021-47151": { + "cmt_msg": "interconnect: qcom: bcm-voter: add a missing of_node_put()" }, - "CVE-2022-34918": { - "cmt_msg": "netfilter: nf_tables: stricter validation of element data" + "CVE-2021-46936": { + "cmt_msg": "net: fix use-after-free in tw_timer_handler" }, - "CVE-2018-20961": { - "cmt_msg": "USB: gadget: f_midi: fixing a possible double-free in f_midi" + "CVE-2021-46933": { + "cmt_msg": "usb: gadget: f_fs: Clear ffs_eventfd in ffs_data_clear." }, - "CVE-2019-20811": { - "cmt_msg": "net-sysfs: call dev_hold if kobject_init_and_add success" + "CVE-2021-46932": { + "cmt_msg": "Input: appletouch - initialize work before device registration" }, - "CVE-2019-20810": { - "cmt_msg": "media: go7007: fix a miss of snd_card_free" + "CVE-2021-46939": { + "cmt_msg": "tracing: Restructure trace_clock_global() to never block" }, - "CVE-2019-20812": { - "cmt_msg": "af_packet: set defaule value for tmo" + "CVE-2021-46938": { + "cmt_msg": "dm rq: fix double free of blk_mq_tag_set in dev remove after table load fails" }, - "CVE-2023-1990": { - "cmt_msg": "nfc: st-nci: Fix use after free bug in ndlc_remove due to race condition" + "CVE-2018-16862": { + "cmt_msg": "mm: cleancache: fix corruption on missed inode invalidation" }, - "CVE-2018-1118": { - "cmt_msg": "vhost: fix info leak due to uninitialized memory" + "CVE-2024-26623": { + "cmt_msg": "pds_core: Prevent race issues involving the adminq" }, - "CVE-2023-6040": { - "cmt_msg": "netfilter: nf_tables: Reject tables of unsupported family" + "CVE-2018-16884": { + "cmt_msg": "sunrpc: use-after-free in svc_process_common()" }, - "CVE-2018-5391": { - "cmt_msg": "ip: discard IPv4 datagrams with overlapping segments." + "CVE-2022-45885": { + "cmt_msg": "" }, - "CVE-2022-26373": { - "cmt_msg": "x86/speculation: Add RSB VM Exit protections" + "CVE-2022-45884": { + "cmt_msg": "" }, - "CVE-2018-5995": { - "cmt_msg": "printk: hash addresses printed with %p" + "CVE-2024-25740": { + "cmt_msg": "" }, - "CVE-2018-18386": { - "cmt_msg": "n_tty: fix EXTPROC vs ICANON interaction with TIOCINQ (aka FIONREAD)" + "CVE-2024-25741": { + "cmt_msg": "" }, - "CVE-2019-15291": { - "cmt_msg": "media: b2c2-flexcop-usb: add sanity checking" + "CVE-2024-25744": { + "cmt_msg": "x86/coco: Disable 32-bit emulation by default on TDX and SEV" }, - "CVE-2019-15290": { - "cmt_msg": "" + "CVE-2023-2513": { + "cmt_msg": "ext4: fix use-after-free in ext4_xattr_set_entry" }, - "CVE-2023-3212": { - "cmt_msg": "gfs2: Don't deref jdesc in evict" + "CVE-2023-1855": { + "cmt_msg": "hwmon: (xgene) Fix use after free bug in xgene_hwmon_remove due to race condition" }, - "CVE-2024-23848": { + "CVE-2015-2877": { "cmt_msg": "" }, - "CVE-2018-7273": { - "cmt_msg": "printk: hash addresses printed with %p" + "CVE-2018-1130": { + "cmt_msg": "dccp: check sk for closed state in dccp_sendmsg()" }, - "CVE-2023-52444": { - "cmt_msg": "f2fs: fix to avoid dirent corruption" + "CVE-2021-45486": { + "cmt_msg": "inet: use bigger hash table for IP ID generation" }, - "CVE-2019-3016": { - "cmt_msg": "x86/kvm: Be careful not to clear KVM_VCPU_FLUSH_TLB bit" + "CVE-2021-3506": { + "cmt_msg": "f2fs: fix to avoid out-of-bounds memory access" }, - "CVE-2023-4459": { - "cmt_msg": "net: vmxnet3: fix possible NULL pointer dereference in vmxnet3_rq_cleanup()" + "CVE-2020-14331": { + "cmt_msg": "vgacon: Fix for missing check in scrollback handling" }, - "CVE-2023-52457": { - "cmt_msg": "serial: 8250: omap: Don't skip resource freeing if pm_runtime_resume_and_get() failed" + "CVE-2022-36123": { + "cmt_msg": "x86: Clear .brk area at early boot" }, - "CVE-2022-23036": { - "cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()" + "CVE-2019-19532": { + "cmt_msg": "HID: Fix assumption that devices have inputs" }, - "CVE-2022-2153": { - "cmt_msg": "KVM: x86: Avoid theoretical NULL pointer dereference in kvm_irq_delivery_to_apic_fast()" + "CVE-2020-36558": { + "cmt_msg": "vt: vt_ioctl: fix race in VT_RESIZEX" }, - "CVE-2019-19531": { - "cmt_msg": "usb: yurex: Fix use-after-free in yurex_delete" + "CVE-2018-13100": { + "cmt_msg": "f2fs: fix to do sanity check with secs_per_zone" }, - "CVE-2022-20566": { - "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free caused by l2cap_chan_put" + "CVE-2018-8087": { + "cmt_msg": "mac80211_hwsim: fix possible memory leak in hwsim_new_radio_nl()" }, - "CVE-2018-12930": { - "cmt_msg": "" + "CVE-2020-36158": { + "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_cmd_802_11_ad_hoc_start" }, - "CVE-2018-12931": { - "cmt_msg": "" + "CVE-2022-40307": { + "cmt_msg": "efi: capsule-loader: Fix use-after-free in efi_capsule_write" }, - "CVE-2024-23196": { - "cmt_msg": "" + "CVE-2021-39686": { + "cmt_msg": "binder: use euid from cred instead of using task" }, - "CVE-2020-12769": { - "cmt_msg": "spi: spi-dw: Add lock protect dw_spi rx/tx to prevent concurrent calls" + "CVE-2021-39685": { + "cmt_msg": "USB: gadget: detect too-big endpoint 0 requests" }, - "CVE-2022-4662": { - "cmt_msg": "USB: core: Prevent nested device-reset calls" + "CVE-2018-1000204": { + "cmt_msg": "scsi: sg: allocate with __GFP_ZERO in sg_build_indirect()" }, - "CVE-2021-32399": { - "cmt_msg": "bluetooth: eliminate the potential race condition when removing the HCI controller" + "CVE-2017-12134": { + "cmt_msg": "xen: fix bio vec merging" }, - "CVE-2021-45868": { - "cmt_msg": "quota: check block number when reading the block in quota file" + "CVE-2017-17450": { + "cmt_msg": "netfilter: xt_osf: Add missing permission checks" }, - "CVE-2019-12380": { - "cmt_msg": "efi/x86/Add missing error handling to old_memmap 1:1 mapping code" + "CVE-2024-26592": { + "cmt_msg": "ksmbd: fix UAF issue in ksmbd_tcp_new_connection()" }, - "CVE-2019-12381": { - "cmt_msg": "ip_sockglue: Fix missing-check bug in ip_ra_control()" + "CVE-2024-26594": { + "cmt_msg": "ksmbd: validate mech token in session setup" }, - "CVE-2019-12382": { - "cmt_msg": "drm/edid: Fix a missing-check bug in drm_load_edid_firmware()" + "CVE-2023-2483": { + "cmt_msg": "net: qcom/emac: Fix use after free bug in emac_remove due to race condition" }, - "CVE-2020-12364": { - "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" + "CVE-2017-18270": { + "cmt_msg": "KEYS: prevent creating a different user's keyrings" }, - "CVE-2019-19543": { - "cmt_msg": "media: serial_ir: Fix use-after-free in serial_ir_init_module" + "CVE-2024-26598": { + "cmt_msg": "KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache" }, - "CVE-2021-3732": { - "cmt_msg": "ovl: prevent private clone if bind mount is not allowed" + "CVE-2018-3646": { + "cmt_msg": "x86/microcode: Allow late microcode loading with SMT disabled" }, - "CVE-2022-25375": { - "cmt_msg": "usb: gadget: rndis: check size of RNDIS_MSG_SET command" + "CVE-2023-2002": { + "cmt_msg": "bluetooth: Perform careful capability checks in hci_sock_ioctl()" }, - "CVE-2020-10766": { - "cmt_msg": "x86/speculation: Prevent rogue cross-process SSBD shutdown" + "CVE-2022-29900": { + "cmt_msg": "x86/kvm/vmx: Make noinstr clean" }, - "CVE-2017-13166": { - "cmt_msg": "media: v4l2-ioctl.c: use check_fmt for enum/g/s/try_fmt" + "CVE-2023-2007": { + "cmt_msg": "scsi: dpt_i2o: Remove obsolete driver" }, - "CVE-2018-12207": { - "cmt_msg": "kvm: x86, powerpc: do not allow clearing largepages debugfs entry" + "CVE-2022-1419": { + "cmt_msg": "drm/vgem: Close use-after-free race in vgem_gem_create" }, - "CVE-2022-20369": { - "cmt_msg": "media: v4l2-mem2mem: Apply DST_QUEUE_OFF_BASE on MMAP buffers across ioctls" + "CVE-2017-16913": { + "cmt_msg": "usbip: fix stub_rx: harden CMD_SUBMIT path to handle malicious input" }, - "CVE-2020-13143": { - "cmt_msg": "USB: gadget: fix illegal array access in binding with UDC" + "CVE-2022-2503": { + "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag" }, - "CVE-2023-5178": { - "cmt_msg": "nvmet-tcp: Fix a possible UAF in queue intialization setup" + "CVE-2022-23038": { + "cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()" }, - "CVE-2020-10768": { - "cmt_msg": "x86/speculation: PR_SPEC_FORCE_DISABLE enforcement for indirect branches." + "CVE-2022-23039": { + "cmt_msg": "xen/gntalloc: don't use gnttab_query_foreign_access()" }, - "CVE-2017-13168": { - "cmt_msg": "scsi: sg: mitigate read/write abuse" + "CVE-2022-23036": { + "cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()" }, - "CVE-2024-25740": { - "cmt_msg": "" + "CVE-2022-23037": { + "cmt_msg": "xen/netfront: don't use gnttab_query_foreign_access() for mapped status" }, - "CVE-2019-0148": { - "cmt_msg": "i40e: Wrong truncation from u16 to u8" + "CVE-2019-15538": { + "cmt_msg": "xfs: fix missing ILOCK unlock when xfs_setattr_nonsize fails due to EDQUOT" }, - "CVE-2022-2978": { - "cmt_msg": "fs: fix UAF/GPF bug in nilfs_mdt_destroy" + "CVE-2019-14821": { + "cmt_msg": "KVM: coalesced_mmio: add bounds checking" }, - "CVE-2019-17075": { - "cmt_msg": "RDMA/cxgb4: Do not dma memory off of the stack" + "CVE-2020-12826": { + "cmt_msg": "signal: Extend exec_id to 64bits" }, - "CVE-2022-3903": { - "cmt_msg": "media: mceusb: Use new usb_control_msg_*() routines" + "CVE-2021-42008": { + "cmt_msg": "net: 6pack: fix slab-out-of-bounds in decode_data" }, - "CVE-2022-23960": { - "cmt_msg": "ARM: report Spectre v2 status through sysfs" + "CVE-2020-25645": { + "cmt_msg": "geneve: add transport ports in route lookup for geneve" }, - "CVE-2023-39189": { - "cmt_msg": "netfilter: nfnetlink_osf: avoid OOB read" + "CVE-2019-15666": { + "cmt_msg": "xfrm: policy: Fix out-of-bound array accesses in __xfrm_policy_unlink" }, - "CVE-2019-0146": { - "cmt_msg": "i40e: add num_vectors checker in iwarp handler" + "CVE-2020-25641": { + "cmt_msg": "block: allow for_each_bvec to support zero len bvec" }, - "CVE-2019-0147": { - "cmt_msg": "i40e: add num_vectors checker in iwarp handler" + "CVE-2021-33034": { + "cmt_msg": "Bluetooth: verify AMP hci_chan before amp_destroy" }, - "CVE-2018-20449": { - "cmt_msg": "printk: hash addresses printed with %p" + "CVE-2021-33033": { + "cmt_msg": "cipso,calipso: resolve a number of problems with the DOI refcounts" }, - "CVE-2019-0145": { - "cmt_msg": "i40e: add num_vectors checker in iwarp handler" + "CVE-2022-40768": { + "cmt_msg": "scsi: stex: Properly zero out the passthrough command structure" }, - "CVE-2017-15299": { - "cmt_msg": "KEYS: don't let add_key() update an uninstantiated key" + "CVE-2017-11600": { + "cmt_msg": "xfrm: policy: check policy direction value" }, - "CVE-2022-44034": { - "cmt_msg": "char: pcmcia: remove all the drivers" + "CVE-2024-26625": { + "cmt_msg": "llc: call sock_orphan() at release time" }, - "CVE-2022-44033": { - "cmt_msg": "char: pcmcia: remove all the drivers" + "CVE-2024-26627": { + "cmt_msg": "scsi: core: Move scsi_host_busy() out of host lock for waking up EH handler" }, - "CVE-2019-11191": { - "cmt_msg": "x86: Deprecate a.out support" + "CVE-2024-26622": { + "cmt_msg": "tomoyo: fix UAF write bug in tomoyo_write_control()" }, "CVE-2023-39198": { "cmt_msg": "drm/qxl: fix UAF on handle creation" }, - "CVE-2018-10323": { - "cmt_msg": "xfs: set format back to extents if xfs_bmap_extents_to_btree" + "CVE-2018-10021": { + "cmt_msg": "scsi: libsas: defer ata device eh commands to libata" }, - "CVE-2018-10322": { - "cmt_msg": "xfs: enhance dinode verifier" + "CVE-2019-10126": { + "cmt_msg": "mwifiex: Fix heap overflow in mwifiex_uap_parse_tail_ies()" }, - "CVE-2023-1989": { - "cmt_msg": "Bluetooth: btsdio: fix use after free bug in btsdio_remove due to unfinished work" + "CVE-2019-10124": { + "cmt_msg": "mm: hwpoison: fix thp split handing in soft_offline_in_use_page()" }, - "CVE-2017-8824": { - "cmt_msg": "dccp: CVE-2017-8824: use-after-free in DCCP code" + "CVE-2020-13974": { + "cmt_msg": "vt: keyboard: avoid signed integer overflow in k_ascii" }, - "CVE-2018-7492": { - "cmt_msg": "rds: Fix NULL pointer dereference in __rds_rdma_map" + "CVE-2018-10938": { + "cmt_msg": "Cipso: cipso_v4_optptr enter infinite loop" }, - "CVE-2020-26139": { - "cmt_msg": "mac80211: do not accept/forward invalid EAPOL frames" + "CVE-2020-15437": { + "cmt_msg": "serial: 8250: fix null-ptr-deref in serial8250_start_tx()" }, - "CVE-2018-20836": { - "cmt_msg": "scsi: libsas: fix a race condition when smp task timeout" + "CVE-2020-15436": { + "cmt_msg": "block: Fix use-after-free in blkdev_get()" }, - "CVE-2021-3609": { - "cmt_msg": "can: bcm: delay release of struct bcm_op after synchronize_rcu()" + "CVE-2021-47065": { + "cmt_msg": "rtw88: Fix array overrun in rtw_get_tx_power_params()" }, - "CVE-2017-13305": { - "cmt_msg": "KEYS: encrypted: fix buffer overread in valid_master_desc()" + "CVE-2022-23816": { + "cmt_msg": "x86/kvm/vmx: Make noinstr clean" }, - "CVE-2019-19536": { - "cmt_msg": "can: peak_usb: pcan_usb_pro: Fix info-leaks to USB devices" + "CVE-2021-47145": { + "cmt_msg": "btrfs: do not BUG_ON in link_to_fixup_dir" }, - "CVE-2019-19537": { - "cmt_msg": "USB: core: Fix races in character device registration and deregistraion" + "CVE-2021-47149": { + "cmt_msg": "net: fujitsu: fix potential null-ptr-deref" }, - "CVE-2019-19534": { - "cmt_msg": "can: peak_usb: fix slab info leak" + "CVE-2018-19407": { + "cmt_msg": "KVM: X86: Fix scan ioapic use-before-initialization" }, - "CVE-2019-19535": { - "cmt_msg": "can: peak_usb: pcan_usb_fd: Fix info-leaks to USB devices" + "CVE-2021-47144": { + "cmt_msg": "drm/amd/amdgpu: fix refcount leak" }, - "CVE-2019-19532": { - "cmt_msg": "HID: Fix assumption that devices have inputs" + "CVE-2021-47147": { + "cmt_msg": "ptp: ocp: Fix a resource leak in an error handling path" }, - "CVE-2018-14617": { - "cmt_msg": "hfsplus: fix NULL dereference in hfsplus_lookup()" + "CVE-2021-47146": { + "cmt_msg": "mld: fix panic in mld_newpack()" }, - "CVE-2019-10638": { - "cmt_msg": "inet: switch IP ID generator to siphash" + "CVE-2021-47140": { + "cmt_msg": "iommu/amd: Clear DMA ops when switching domain" }, - "CVE-2019-10639": { - "cmt_msg": "netns: provide pure entropy for net_hash_mix()" + "CVE-2021-47143": { + "cmt_msg": "net/smc: remove device from smcd_dev_list after failed device_add()" }, - "CVE-2022-3533": { - "cmt_msg": "" + "CVE-2021-47142": { + "cmt_msg": "drm/amdgpu: Fix a use-after-free" }, - "CVE-2021-0929": { - "cmt_msg": "staging/android/ion: delete dma_buf->kmap/unmap implemenation" + "CVE-2024-26765": { + "cmt_msg": "LoongArch: Disable IRQ before init_fn() for nonboot CPUs" }, - "CVE-2019-11478": { - "cmt_msg": "tcp: tcp_fragment() should apply sane memory limits" + "CVE-2018-16871": { + "cmt_msg": "nfsd: COPY and CLONE operations require the saved filehandle to be set" }, - "CVE-2019-20095": { - "cmt_msg": "mwifiex: Fix mem leak in mwifiex_tm_cmd" + "CVE-2018-16658": { + "cmt_msg": "cdrom: Fix info leak/OOB read in cdrom_ioctl_drive_status" }, - "CVE-2018-19985": { - "cmt_msg": "USB: hso: Fix OOB memory access in hso_probe/hso_get_config_data" + "CVE-2019-19036": { + "cmt_msg": "btrfs: Detect unbalanced tree with empty leaf before crashing btree operations" }, - "CVE-2018-6554": { - "cmt_msg": "staging: irda: remove the irda network stack and drivers" + "CVE-2019-19039": { + "cmt_msg": "btrfs: Don't submit any btree write bio if the fs has errors" }, - "CVE-2018-6555": { - "cmt_msg": "staging: irda: remove the irda network stack and drivers" + "CVE-2021-32078": { + "cmt_msg": "ARM: footbridge: remove personal server platform" }, - "CVE-2023-6546": { - "cmt_msg": "tty: n_gsm: fix the UAF caused by race condition in gsm_cleanup_mux" + "CVE-2022-4662": { + "cmt_msg": "USB: core: Prevent nested device-reset calls" }, - "CVE-2021-0920": { - "cmt_msg": "af_unix: fix garbage collect vs MSG_PEEK" + "CVE-2019-11833": { + "cmt_msg": "ext4: zero out the unused memory region in the extent tree block" + }, + "CVE-2020-27835": { + "cmt_msg": "IB/hfi1: Ensure correct mm is used at all times" }, "CVE-2018-5953": { "cmt_msg": "printk: hash addresses printed with %p" }, - "CVE-2024-26587": { - "cmt_msg": "net: netdevsim: don't try to destroy PHC on VFs" - }, - "CVE-2023-51043": { - "cmt_msg": "drm/atomic: Fix potential use-after-free in nonblocking commits" + "CVE-2018-1128": { + "cmt_msg": "libceph: add authorizer challenge" }, - "CVE-2020-28374": { - "cmt_msg": "scsi: target: Fix XCOPY NAA identifier lookup" + "CVE-2018-1129": { + "cmt_msg": "libceph: implement CEPHX_V2 calculation mode" }, - "CVE-2019-9213": { - "cmt_msg": "mm: enforce min addr even if capable() in expand_downwards()" + "CVE-2018-1120": { + "cmt_msg": "proc: do not access cmdline nor environ from file-backed areas" }, - "CVE-2023-2007": { - "cmt_msg": "scsi: dpt_i2o: Remove obsolete driver" + "CVE-2018-1121": { + "cmt_msg": "" }, - "CVE-2023-0615": { - "cmt_msg": "media: vivid: dev->bitmap_cap wasn't freed in all cases" + "CVE-2018-20856": { + "cmt_msg": "block: blk_init_allocated_queue() set q->fq as NULL in the fail case" }, - "CVE-2020-26557": { - "cmt_msg": "" + "CVE-2022-3061": { + "cmt_msg": "video: fbdev: i740fb: Error out if 'pixclock' equals zero" }, - "CVE-2017-16535": { - "cmt_msg": "USB: core: fix out-of-bounds access bug in usb_get_bos_descriptor()" + "CVE-2020-27784": { + "cmt_msg": "usb: gadget: function: printer: fix use-after-free in __lock_acquire" }, - "CVE-2017-16534": { - "cmt_msg": "USB: core: harden cdc_parse_cdc_header" + "CVE-2020-27786": { + "cmt_msg": "ALSA: rawmidi: Fix racy buffer resize under concurrent accesses" }, - "CVE-2017-16537": { - "cmt_msg": "media: imon: Fix null-ptr-deref in imon_probe" + "CVE-2023-6240": { + "cmt_msg": "" }, - "CVE-2017-16536": { - "cmt_msg": "[media] cx231xx-cards: fix NULL-deref on missing association descriptor" + "CVE-2022-39842": { + "cmt_msg": "video: fbdev: pxa3xx-gcu: Fix integer overflow in pxa3xx_gcu_write" }, - "CVE-2017-16531": { - "cmt_msg": "USB: fix out-of-bounds in usb_set_configuration" + "CVE-2023-51043": { + "cmt_msg": "drm/atomic: Fix potential use-after-free in nonblocking commits" }, - "CVE-2017-16530": { - "cmt_msg": "USB: uas: fix bug in handling of alternate settings" + "CVE-2024-23196": { + "cmt_msg": "ALSA: hda: fix a possible null-pointer dereference due to data race in snd_hdac_regmap_sync()" }, - "CVE-2017-16533": { - "cmt_msg": "HID: usbhid: fix out-of-bounds bug" + "CVE-2017-16939": { + "cmt_msg": "ipsec: Fix aborted xfrm policy dump crash" }, - "CVE-2017-16532": { - "cmt_msg": "usb: usbtest: fix NULL pointer dereference" + "CVE-2021-26931": { + "cmt_msg": "xen-blkback: don't \"handle\" error by BUG()" }, - "CVE-2024-26592": { - "cmt_msg": "ksmbd: fix UAF issue in ksmbd_tcp_new_connection()" + "CVE-2021-26930": { + "cmt_msg": "xen-blkback: fix error handling in xen_blkbk_map()" }, - "CVE-2022-43750": { - "cmt_msg": "usb: mon: make mmapped memory read only" + "CVE-2021-26932": { + "cmt_msg": "Xen/x86: don't bail early from clear_foreign_p2m_mapping()" }, - "CVE-2017-16538": { - "cmt_msg": "media: dvb-usb-v2: lmedm04: Improve logic checking of warm start" + "CVE-2022-36402": { + "cmt_msg": "drm/vmwgfx: Fix shader stage validation" }, - "CVE-2023-3006": { - "cmt_msg": "arm64: Add AMPERE1 to the Spectre-BHB affected list" + "CVE-2021-3178": { + "cmt_msg": "nfsd4: readdirplus shouldn't return parent of export" }, - "CVE-2020-27825": { - "cmt_msg": "tracing: Fix race in trace_open and buffer resize call" + "CVE-2023-1611": { + "cmt_msg": "btrfs: fix race between quota disable and quota assign ioctls" }, - "CVE-2019-2181": { - "cmt_msg": "binder: check for overflow when alloc for security context" + "CVE-2021-3772": { + "cmt_msg": "sctp: use init_tag from inithdr for ABORT chunk" }, - "CVE-2019-2182": { - "cmt_msg": "arm64: Enforce BBM for huge IO/VMAP mappings" + "CVE-2021-34556": { + "cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4" }, - "CVE-2020-27820": { - "cmt_msg": "drm/nouveau: use drm_dev_unplug() during device removal" + "CVE-2021-28714": { + "cmt_msg": "xen/netback: fix rx queue stall detection" }, - "CVE-2017-18222": { - "cmt_msg": "net: hns: fix ethtool_get_strings overflow in hns driver" + "CVE-2021-28713": { + "cmt_msg": "xen/console: harden hvc_xen against event channel storms" }, - "CVE-2020-0067": { - "cmt_msg": "f2fs: fix to avoid memory leakage in f2fs_listxattr" + "CVE-2021-28712": { + "cmt_msg": "xen/netfront: harden netfront against event channel storms" }, - "CVE-2023-4622": { - "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES" + "CVE-2021-28711": { + "cmt_msg": "xen/blkfront: harden blkfront against event channel storms" }, - "CVE-2019-20794": { + "CVE-2022-1247": { "cmt_msg": "" }, - "CVE-2023-39193": { - "cmt_msg": "netfilter: xt_sctp: validate the flag_info count" + "CVE-2022-2991": { + "cmt_msg": "remove the lightnvm subsystem" }, - "CVE-2017-18224": { - "cmt_msg": "ocfs2: ip_alloc_sem should be taken in ocfs2_get_block()" + "CVE-2017-11473": { + "cmt_msg": "x86/acpi: Prevent out of bound access caused by broken ACPI tables" }, - "CVE-2020-26541": { - "cmt_msg": "certs: Add EFI_CERT_X509_GUID support for dbx entries" + "CVE-2017-11472": { + "cmt_msg": "ACPICA: Namespace: fix operand cache leak" }, - "CVE-2023-6610": { - "cmt_msg": "smb: client: fix potential OOB in smb2_dump_detail()" + "CVE-2017-17862": { + "cmt_msg": "bpf: fix branch pruning logic" }, - "CVE-2020-26559": { - "cmt_msg": "" + "CVE-2017-17863": { + "cmt_msg": "bpf: fix integer overflows" }, - "CVE-2020-27673": { - "cmt_msg": "xen/events: add a proper barrier to 2-level uevent unmasking" + "CVE-2023-52578": { + "cmt_msg": "net: bridge: use DEV_STATS_INC()" }, - "CVE-2021-43389": { - "cmt_msg": "isdn: cpai: check ctr->cnr to avoid array index out of bound" + "CVE-2023-52574": { + "cmt_msg": "team: fix null-ptr-deref when team device type is changed" }, - "CVE-2017-14156": { - "cmt_msg": "video: fbdev: aty: do not leak uninitialized padding in clk to userspace" + "CVE-2023-3567": { + "cmt_msg": "vc_screen: move load of struct vc_data pointer in vcs_read() to avoid UAF" }, - "CVE-2021-33061": { - "cmt_msg": "ixgbe: add improvement for MDD response functionality" + "CVE-2023-52571": { + "cmt_msg": "power: supply: rk817: Fix node refcount leak" }, - "CVE-2018-1092": { - "cmt_msg": "ext4: fail ext4_iget for root directory if unallocated" + "CVE-2023-52572": { + "cmt_msg": "cifs: Fix UAF in cifs_demultiplex_thread()" }, - "CVE-2018-1093": { - "cmt_msg": "ext4: add validity checks for bitmap block numbers" + "CVE-2017-14340": { + "cmt_msg": "xfs: XFS_IS_REALTIME_INODE() should be false if no rt device present" }, - "CVE-2017-18551": { - "cmt_msg": "i2c: core-smbus: prevent stack corruption on read I2C_BLOCK_DATA" + "CVE-2018-10902": { + "cmt_msg": "ALSA: rawmidi: Change resized buffers atomically" }, - "CVE-2017-18550": { - "cmt_msg": "scsi: aacraid: Don't copy uninitialized stack memory to userspace" + "CVE-2018-10853": { + "cmt_msg": "kvm: x86: use correct privilege level for sgdt/sidt/fxsave/fxrstor access" }, - "CVE-2021-3864": { - "cmt_msg": "" + "CVE-2020-12362": { + "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" }, - "CVE-2021-26931": { - "cmt_msg": "xen-blkback: don't \"handle\" error by BUG()" + "CVE-2020-12363": { + "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" }, - "CVE-2024-26584": { - "cmt_msg": "net: tls: handle backlogging of crypto requests" + "CVE-2019-12881": { + "cmt_msg": "drm/i915/userptr: reject zero user_size" }, - "CVE-2021-4203": { - "cmt_msg": "af_unix: fix races in sk_peer_pid and sk_peer_cred accesses" + "CVE-2022-4129": { + "cmt_msg": "l2tp: Serialize access to sk_user_data with sk_callback_lock" }, - "CVE-2023-4623": { - "cmt_msg": "net/sched: sch_hfsc: Ensure inner classes have fsc curve" + "CVE-2020-12364": { + "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" }, - "CVE-2024-23849": { - "cmt_msg": "net/rds: Fix UBSAN: array-index-out-of-bounds in rds_cmsg_recv" + "CVE-2023-33203": { + "cmt_msg": "net: qcom/emac: Fix use after free bug in emac_remove due to race condition" }, - "CVE-2020-29568": { - "cmt_msg": "xen/xenbus: Allow watches discard events before queueing" + "CVE-2021-4002": { + "cmt_msg": "hugetlbfs: flush TLBs correctly after huge_pmd_unshare" }, - "CVE-2018-18559": { - "cmt_msg": "net/packet: fix a race in packet_bind() and packet_notifier()" + "CVE-2023-26545": { + "cmt_msg": "net: mpls: fix stale pointer if allocation fails during device rename" }, - "CVE-2020-14351": { - "cmt_msg": "perf/core: Fix race in the perf_mmap_close() function" + "CVE-2019-15292": { + "cmt_msg": "appletalk: Fix use-after-free in atalk_proc_exit" }, - "CVE-2019-19054": { - "cmt_msg": "media: rc: prevent memory leak in cx23888_ir_probe" + "CVE-2019-15291": { + "cmt_msg": "media: b2c2-flexcop-usb: add sanity checking" }, - "CVE-2019-19057": { - "cmt_msg": "mwifiex: pcie: Fix memory leak in mwifiex_pcie_init_evt_ring" + "CVE-2019-15290": { + "cmt_msg": "" }, - "CVE-2019-19056": { - "cmt_msg": "mwifiex: pcie: Fix memory leak in mwifiex_pcie_alloc_cmdrsp_buf" + "CVE-2023-3212": { + "cmt_msg": "gfs2: Don't deref jdesc in evict" }, - "CVE-2019-9453": { - "cmt_msg": "f2fs: fix to avoid accessing xattr across the boundary" + "CVE-2024-26633": { + "cmt_msg": "ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim()" }, - "CVE-2023-23039": { - "cmt_msg": "" + "CVE-2024-26636": { + "cmt_msg": "llc: make llc_ui_sendmsg() more robust against bonding changes" }, - "CVE-2019-19052": { - "cmt_msg": "can: gs_usb: gs_can_open(): prevent memory leak" + "CVE-2024-26635": { + "cmt_msg": "llc: Drop support for ETH_P_TR_802_2." }, - "CVE-2019-3846": { - "cmt_msg": "mwifiex: Fix possible buffer overflows at parsing bss descriptor" + "CVE-2020-12769": { + "cmt_msg": "spi: spi-dw: Add lock protect dw_spi rx/tx to prevent concurrent calls" }, - "CVE-2023-46838": { - "cmt_msg": "xen-netback: don't produce zero-size SKB frags" + "CVE-2023-52635": { + "cmt_msg": "PM / devfreq: Synchronize devfreq_monitor_[start/stop]" }, - "CVE-2020-0427": { - "cmt_msg": "pinctrl: devicetree: Avoid taking direct reference to device name string" + "CVE-2023-52634": { + "cmt_msg": "drm/amd/display: Fix disable_otg_wa logic" }, - "CVE-2019-19227": { - "cmt_msg": "appletalk: Fix potential NULL pointer dereference in unregister_snap_client" + "CVE-2023-2860": { + "cmt_msg": "ipv6: sr: fix out-of-bounds read when setting HMAC data." }, - "CVE-2019-19058": { - "cmt_msg": "iwlwifi: dbg_ini: fix memory leak in alloc_sgtable" + "CVE-2017-18208": { + "cmt_msg": "mm/madvise.c: fix madvise() infinite loop under special circumstances" + }, + "CVE-2020-13143": { + "cmt_msg": "USB: gadget: fix illegal array access in binding with UDC" + }, + "CVE-2022-3903": { + "cmt_msg": "media: mceusb: Use new usb_control_msg_*() routines" }, - "CVE-2019-9458": { - "cmt_msg": "media: v4l: event: Prevent freeing event subscriptions while accessed" + "CVE-2018-20449": { + "cmt_msg": "printk: hash addresses printed with %p" }, - "CVE-2021-39714": { - "cmt_msg": "staging: android: ion: Drop ion_map_kernel interface" + "CVE-2017-15299": { + "cmt_msg": "KEYS: don't let add_key() update an uninstantiated key" }, - "CVE-2023-34255": { - "cmt_msg": "xfs: verify buffer contents when we skip log replay" + "CVE-2021-47179": { + "cmt_msg": "NFSv4: Fix a NULL pointer dereference in pnfs_mark_matching_lsegs_return()" }, - "CVE-2016-8660": { - "cmt_msg": "" + "CVE-2019-11191": { + "cmt_msg": "x86: Deprecate a.out support" }, - "CVE-2020-14314": { - "cmt_msg": "ext4: fix potential negative array index in do_split()" + "CVE-2021-47170": { + "cmt_msg": "USB: usbfs: Don't WARN about excessively large memory allocations" }, - "CVE-2023-3090": { - "cmt_msg": "ipvlan:Fix out-of-bounds caused by unclear skb->cb" + "CVE-2021-47171": { + "cmt_msg": "net: usb: fix memory leak in smsc75xx_bind" }, - "CVE-2019-13272": { - "cmt_msg": "ptrace: Fix ->ptracer_cred handling for PTRACE_TRACEME" + "CVE-2021-47172": { + "cmt_msg": "iio: adc: ad7124: Fix potential overflow due to non sequential channel numbers" }, - "CVE-2021-3587": { - "cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect" + "CVE-2021-47173": { + "cmt_msg": "misc/uss720: fix memory leak in uss720_probe" }, - "CVE-2023-45862": { - "cmt_msg": "USB: ene_usb6250: Allocate enough memory for full object" + "CVE-2021-47175": { + "cmt_msg": "net/sched: fq_pie: fix OOB access in the traffic path" }, - "CVE-2023-45863": { - "cmt_msg": "kobject: Fix slab-out-of-bounds in fill_kobj_path()" + "CVE-2018-10323": { + "cmt_msg": "xfs: set format back to extents if xfs_bmap_extents_to_btree" }, - "CVE-2023-1582": { - "cmt_msg": "fs/proc: task_mmu.c: don't read mapcount for migration entry" + "CVE-2021-47177": { + "cmt_msg": "iommu/vt-d: Fix sysfs leak in alloc_iommu()" }, - "CVE-2017-15537": { - "cmt_msg": "x86/fpu: Don't let userspace set bogus xcomp_bv" + "CVE-2021-46951": { + "cmt_msg": "tpm: efi: Use local variable for calculating final log size" }, - "CVE-2022-2588": { - "cmt_msg": "net_sched: cls_route: remove from list when handle is 0" + "CVE-2021-46950": { + "cmt_msg": "md/raid1: properly indicate failure when ending a failed write request" }, - "CVE-2019-17351": { - "cmt_msg": "xen: let alloc_xenballooned_pages() fail if not enough memory free" + "CVE-2021-46952": { + "cmt_msg": "NFS: fs_context: validate UDP retrans to prevent shift out-of-bounds" }, - "CVE-2022-23222": { - "cmt_msg": "bpf: Replace PTR_TO_XXX_OR_NULL with PTR_TO_XXX | PTR_MAYBE_NULL" + "CVE-2021-46959": { + "cmt_msg": "spi: Fix use-after-free with devm_spi_alloc_*" }, - "CVE-2020-25669": { - "cmt_msg": "Input: sunkbd - avoid use-after-free in teardown paths" + "CVE-2017-18193": { + "cmt_msg": "f2fs: fix a bug caused by NULL extent tree" }, - "CVE-2020-25668": { - "cmt_msg": "tty: make FONTX ioctl use the tty pointer they were actually passed" + "CVE-2023-5178": { + "cmt_msg": "nvmet-tcp: Fix a possible UAF in queue intialization setup" }, - "CVE-2008-4609": { - "cmt_msg": "" + "CVE-2021-0929": { + "cmt_msg": "staging/android/ion: delete dma_buf->kmap/unmap implemenation" }, - "CVE-2020-25705": { - "cmt_msg": "icmp: randomize the global rate limiter" + "CVE-2018-19985": { + "cmt_msg": "USB: hso: Fix OOB memory access in hso_probe/hso_get_config_data" }, - "CVE-2023-52458": { - "cmt_msg": "block: add check that partition length needs to be aligned with block size" + "CVE-2021-0920": { + "cmt_msg": "af_unix: fix garbage collect vs MSG_PEEK" }, - "CVE-2023-40283": { - "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb" + "CVE-2023-0615": { + "cmt_msg": "media: vivid: dev->bitmap_cap wasn't freed in all cases" }, - "CVE-2022-0435": { - "cmt_msg": "tipc: improve size validations for received domain records" + "CVE-2022-3586": { + "cmt_msg": "sch_sfb: Don't assume the skb is still around after enqueueing to child" }, - "CVE-2022-20565": { - "cmt_msg": "HID: core: Correctly handle ReportSize being zero" + "CVE-2020-27825": { + "cmt_msg": "tracing: Fix race in trace_open and buffer resize call" }, - "CVE-2022-1419": { - "cmt_msg": "drm/vgem: Close use-after-free race in vgem_gem_create" + "CVE-2019-2181": { + "cmt_msg": "binder: check for overflow when alloc for security context" }, - "CVE-2018-20854": { - "cmt_msg": "phy: ocelot-serdes: fix out-of-bounds read" + "CVE-2019-2182": { + "cmt_msg": "arm64: Enforce BBM for huge IO/VMAP mappings" }, - "CVE-2018-25020": { - "cmt_msg": "bpf: fix truncated jump targets on heavy expansions" + "CVE-2020-27820": { + "cmt_msg": "drm/nouveau: use drm_dev_unplug() during device removal" }, - "CVE-2018-5390": { - "cmt_msg": "tcp: free batches of packets in tcp_prune_ofo_queue()" + "CVE-2023-6610": { + "cmt_msg": "smb: client: fix potential OOB in smb2_dump_detail()" }, - "CVE-2017-15127": { - "cmt_msg": "userfaultfd: hugetlbfs: remove superfluous page unlock in VM_SHARED case" + "CVE-2023-1476": { + "cmt_msg": "" }, - "CVE-2017-15126": { - "cmt_msg": "userfaultfd: non-cooperative: fix fork use after free" + "CVE-2023-1670": { + "cmt_msg": "xirc2ps_cs: Fix use after free bug in xirc2ps_detach" }, - "CVE-2023-26607": { - "cmt_msg": "ntfs: fix out-of-bounds read in ntfs_attr_find()" + "CVE-2020-14351": { + "cmt_msg": "perf/core: Fix race in the perf_mmap_close() function" }, - "CVE-2018-20855": { - "cmt_msg": "IB/mlx5: Fix leaking stack memory to userspace" + "CVE-2020-14353": { + "cmt_msg": "KEYS: prevent creating a different user's keyrings" }, - "CVE-2019-15239": { - "cmt_msg": "" + "CVE-2020-0429": { + "cmt_msg": "l2tp: fix race between l2tp_session_delete() and l2tp_tunnel_closeall()" }, - "CVE-2022-3534": { - "cmt_msg": "libbpf: Fix use-after-free in btf_dump_name_dups" + "CVE-2020-14356": { + "cmt_msg": "cgroup: fix cgroup_sk_alloc() for sk_clone_lock()" }, - "CVE-2017-15129": { - "cmt_msg": "net: Fix double free and memory corruption in get_net_ns_by_id()" + "CVE-2022-20132": { + "cmt_msg": "HID: add hid_is_usb() function to make it simpler for USB detection" }, - "CVE-2017-15128": { - "cmt_msg": "userfaultfd: hugetlbfs: prevent UFFDIO_COPY to fill beyond the end of i_size" + "CVE-2023-6270": { + "cmt_msg": "aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts" }, - "CVE-2021-4037": { - "cmt_msg": "xfs: fix up non-directory creation in SGID directories" + "CVE-2023-1582": { + "cmt_msg": "fs/proc: task_mmu.c: don't read mapcount for migration entry" }, - "CVE-2021-22543": { - "cmt_msg": "KVM: do not allow mapping valid but non-reference-counted pages" + "CVE-2019-17351": { + "cmt_msg": "xen: let alloc_xenballooned_pages() fail if not enough memory free" }, - "CVE-2022-45884": { - "cmt_msg": "" + "CVE-2018-20854": { + "cmt_msg": "phy: ocelot-serdes: fix out-of-bounds read" + }, + "CVE-2018-20855": { + "cmt_msg": "IB/mlx5: Fix leaking stack memory to userspace" }, "CVE-2021-3348": { "cmt_msg": "nbd: freeze the queue while we're adding connections" @@ -110087,15 +141550,6 @@ "CVE-2018-1065": { "cmt_msg": "netfilter: add back stackpointer size checks" }, - "CVE-2023-20941": { - "cmt_msg": "" - }, - "CVE-2019-15292": { - "cmt_msg": "appletalk: Fix use-after-free in atalk_proc_exit" - }, - "CVE-2017-12188": { - "cmt_msg": "KVM: nVMX: update last_nonleaf_level when initializing nested EPT" - }, "CVE-2018-1068": { "cmt_msg": "netfilter: ebtables: CONFIG_COMPAT: don't trust userland offsets" }, @@ -110105,15 +141559,6 @@ "CVE-2017-17052": { "cmt_msg": "fork: fix incorrect fput of ->exe_file causing use-after-free" }, - "CVE-2021-4197": { - "cmt_msg": "cgroup: Use open-time credentials for process migraton perm checks" - }, - "CVE-2020-10135": { - "cmt_msg": "Bluetooth: Consolidate encryption handling in hci_encrypt_cfm" - }, - "CVE-2020-25285": { - "cmt_msg": "mm/hugetlb: fix a race between hugetlb sysctl handlers" - }, "CVE-2019-7308": { "cmt_msg": "bpf: fix sanitation of alu op with pointer / scalar type from different paths" }, @@ -110123,17 +141568,8 @@ "CVE-2022-1966": { "cmt_msg": "netfilter: nf_tables: disallow non-stateful expression in sets earlier" }, - "CVE-2023-31084": { - "cmt_msg": "media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*()" - }, - "CVE-2017-9986": { - "cmt_msg": "sound: Retire OSS" - }, - "CVE-2017-9985": { - "cmt_msg": "ALSA: msnd: Optimize / harden DSP and MIDI loops" - }, - "CVE-2017-9984": { - "cmt_msg": "ALSA: msnd: Optimize / harden DSP and MIDI loops" + "CVE-2021-3587": { + "cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect" }, "CVE-2019-16995": { "cmt_msg": "net: hsr: fix memory leak in hsr_dev_finalize()" @@ -110141,153 +141577,57 @@ "CVE-2017-18075": { "cmt_msg": "crypto: pcrypt - fix freeing pcrypt instances" }, - "CVE-2017-9059": { - "cmt_msg": "NFSv4: Fix callback server shutdown" - }, - "CVE-2023-34256": { - "cmt_msg": "ext4: avoid a potential slab-out-of-bounds in ext4_group_desc_csum" - }, - "CVE-2020-36516": { - "cmt_msg": "ipv4: avoid using shared IP generator for connected sockets" - }, - "CVE-2020-36766": { - "cmt_msg": "cec-api: prevent leaking memory through hole in structure" - }, "CVE-2017-18079": { "cmt_msg": "Input: i8042 - fix crash at boot time" }, - "CVE-2018-7740": { - "cmt_msg": "hugetlbfs: check for pgoff value overflow" - }, - "CVE-2023-28328": { - "cmt_msg": "media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer()" - }, - "CVE-2022-0322": { - "cmt_msg": "sctp: account stream padding length for reconf chunk" - }, - "CVE-2023-0386": { - "cmt_msg": "ovl: fail on invalid uid/gid mapping at copy up" - }, "CVE-2023-6121": { "cmt_msg": "nvmet: nul-terminate the NQNs passed in the connect command" }, - "CVE-2017-13693": { - "cmt_msg": "" - }, - "CVE-2022-0617": { - "cmt_msg": "udf: Fix NULL ptr deref when converting from inline format" - }, - "CVE-2017-13695": { - "cmt_msg": "ACPICA: acpi: acpica: fix acpi operand cache leak in nseval.c" - }, - "CVE-2017-13694": { - "cmt_msg": "" - }, - "CVE-2021-4149": { - "cmt_msg": "btrfs: unlock newly allocated extent buffer after error" - }, - "CVE-2022-21385": { - "cmt_msg": "net/rds: fix warn in rds_message_alloc_sgs" - }, - "CVE-2022-42895": { - "cmt_msg": "Bluetooth: L2CAP: Fix attempting to access uninitialized memory" - }, - "CVE-2021-3640": { - "cmt_msg": "Bluetooth: sco: Fix lock_sock() blockage by memcpy_from_msg()" - }, "CVE-2020-1749": { "cmt_msg": "net: ipv6_stub: use ip6_dst_lookup_flow instead of ip6_dst_lookup" }, - "CVE-2022-42896": { - "cmt_msg": "Bluetooth: L2CAP: Fix accepting connection request for invalid SPSM" - }, "CVE-2021-3760": { "cmt_msg": "nfc: nci: fix the UAF of rf_conn_info object" }, - "CVE-2022-36123": { - "cmt_msg": "x86: Clear .brk area at early boot" - }, - "CVE-2020-11608": { - "cmt_msg": "media: ov519: add missing endpoint sanity checks" - }, - "CVE-2020-10732": { - "cmt_msg": "fs/binfmt_elf.c: allocate initialized memory in fill_thread_core_info()" - }, - "CVE-2020-28097": { - "cmt_msg": "vgacon: remove software scrollback support" - }, "CVE-2017-18216": { "cmt_msg": "ocfs2: subsystem.su_mutex is required while accessing the item->ci_parent" }, - "CVE-2017-1000112": { - "cmt_msg": "udp: consistently apply ufo or fragmentation" - }, - "CVE-2017-1000111": { - "cmt_msg": "packet: fix tp_reserve race in packet_set_ring" - }, - "CVE-2024-24855": { - "cmt_msg": "scsi: lpfc: Fix a possible data race in lpfc_unregister_fcf_rescan()" - }, "CVE-2017-18218": { "cmt_msg": "net: hns: Fix a skb used after free bug" }, - "CVE-2017-7533": { - "cmt_msg": "dentry name snapshots" - }, - "CVE-2018-8897": { - "cmt_msg": "x86/entry/64: Don't use IST entry for #BP stack" - }, - "CVE-2021-29265": { - "cmt_msg": "usbip: fix stub_dev usbip_sockfd_store() races leading to gpf" + "CVE-2021-46992": { + "cmt_msg": "netfilter: nftables: avoid overflows in nft_hash_buckets()" }, "CVE-2021-39648": { "cmt_msg": "usb: gadget: configfs: Fix use-after-free issue with udc_name" }, - "CVE-2022-3545": { - "cmt_msg": "nfp: fix use-after-free in area_cache_get()" - }, - "CVE-2022-3542": { - "cmt_msg": "bnx2x: fix potential memory leak in bnx2x_tpa_stop()" + "CVE-2023-52569": { + "cmt_msg": "btrfs: remove BUG() after failure to insert delayed dir index item" }, - "CVE-2020-14416": { - "cmt_msg": "can, slip: Protect tty->disc_data in write_wakeup and close with RCU" + "CVE-2023-52568": { + "cmt_msg": "x86/sgx: Resolves SECS reclaim vs. page fault for EAUG race" }, "CVE-2019-0136": { "cmt_msg": "mac80211: drop robust management frames from unknown TA" }, - "CVE-2017-17975": { - "cmt_msg": "media: usbtv: prevent double free in error case" - }, - "CVE-2019-16921": { - "cmt_msg": "RDMA/hns: Fix init resp when alloc ucontext" + "CVE-2023-52563": { + "cmt_msg": "drm/meson: fix memory leak on ->hpd_notify callback" }, - "CVE-2019-19377": { - "cmt_msg": "btrfs: Don't submit any btree write bio if the fs has errors" + "CVE-2023-52561": { + "cmt_msg": "arm64: dts: qcom: sdm845-db845c: Mark cont splash memory region as reserved" }, - "CVE-2021-21781": { - "cmt_msg": "ARM: ensure the signal page contains defined contents" + "CVE-2022-3344": { + "cmt_msg": "KVM: x86: nSVM: harden svm_free_nested against freeing vmcb02 while still in use" }, - "CVE-2021-0512": { - "cmt_msg": "HID: make arrays usage and value to be the same" + "CVE-2023-52566": { + "cmt_msg": "nilfs2: fix potential use after free in nilfs_gccache_submit_read_data()" }, - "CVE-2018-14633": { - "cmt_msg": "scsi: target: iscsi: Use hex2bin instead of a re-implementation" + "CVE-2023-52565": { + "cmt_msg": "media: uvcvideo: Fix OOB read" }, "CVE-2018-12896": { "cmt_msg": "posix-timers: Sanitize overrun handling" }, - "CVE-2023-1382": { - "cmt_msg": "tipc: set con sock in tipc_conn_alloc" - }, - "CVE-2019-19073": { - "cmt_msg": "ath9k_htc: release allocated buffer if timed out" - }, - "CVE-2018-14734": { - "cmt_msg": "infiniband: fix a possible use-after-free bug" - }, - "CVE-2017-15306": { - "cmt_msg": "KVM: PPC: Fix oops when checking KVM_CAP_PPC_HTM" - }, "CVE-2020-0347": { "cmt_msg": "" }, @@ -110297,12 +141637,6 @@ "CVE-2019-18808": { "cmt_msg": "crypto: ccp - Release all allocated memory if sha type is invalid" }, - "CVE-2022-41222": { - "cmt_msg": "mm/mremap: hold the rmap lock in write mode when moving page table entries." - }, - "CVE-2018-8822": { - "cmt_msg": "staging: ncpfs: memory corruption in ncp_read_kernel()" - }, "CVE-2021-40490": { "cmt_msg": "ext4: fix race writing to an inline_data file while its xattrs are changing" }, @@ -110315,461 +141649,161 @@ "CVE-2019-12456": { "cmt_msg": "" }, - "CVE-2023-20569": { - "cmt_msg": "x86/bugs: Increase the x86 bugs vector size to two u32s" - }, "CVE-2022-0812": { "cmt_msg": "xprtrdma: fix incorrect header size calculations" }, - "CVE-2021-29647": { - "cmt_msg": "net: qrtr: fix a kernel-infoleak in qrtr_recvmsg()" - }, "CVE-2019-17133": { "cmt_msg": "cfg80211: wext: avoid copying malformed SSIDs" }, - "CVE-2017-18595": { - "cmt_msg": "tracing: Fix possible double free on failure of allocating trace buffer" + "CVE-2021-33656": { + "cmt_msg": "vt: drop old FONT ioctls" }, "CVE-2021-33655": { "cmt_msg": "fbcon: Disallow setting font bigger than screen size" }, - "CVE-2021-3612": { - "cmt_msg": "Input: joydev - prevent potential read overflow in ioctl" - }, "CVE-2022-41858": { "cmt_msg": "drivers: net: slip: fix NPD bug in sl_tx_timeout()" }, - "CVE-2019-6974": { - "cmt_msg": "kvm: fix kvm_ioctl_create_device() reference counting (CVE-2019-6974)" - }, "CVE-2022-41850": { "cmt_msg": "HID: roccat: Fix use-after-free in roccat_read()" }, - "CVE-2020-24503": { - "cmt_msg": "" - }, - "CVE-2022-0168": { - "cmt_msg": "cifs: fix NULL ptr dereference in smb2_ioctl_query_info()" - }, - "CVE-2023-2985": { - "cmt_msg": "fs: hfsplus: fix UAF issue in hfsplus_put_super" - }, - "CVE-2020-14390": { - "cmt_msg": "fbcon: remove soft scrollback code" - }, - "CVE-2020-24502": { - "cmt_msg": "" - }, - "CVE-2017-17712": { - "cmt_msg": "net: ipv4: fix for a race condition in raw_sendmsg" - }, - "CVE-2017-17807": { - "cmt_msg": "KEYS: add missing permission check for request_key() destination" - }, - "CVE-2017-17805": { - "cmt_msg": "crypto: salsa20 - fix blkcipher_walk API usage" - }, - "CVE-2022-3642": { - "cmt_msg": "" - }, - "CVE-2019-19527": { - "cmt_msg": "HID: hiddev: do cleanup in failure of opening a device" - }, - "CVE-2017-7542": { - "cmt_msg": "ipv6: avoid overflow of offset in ip6_find_1stfragopt" + "CVE-2017-10663": { + "cmt_msg": "f2fs: sanity check checkpoint segno and blkoff" }, - "CVE-2024-0584": { - "cmt_msg": "ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet" + "CVE-2022-1184": { + "cmt_msg": "ext4: verify dir block before splitting it" }, "CVE-2019-9245": { "cmt_msg": "f2fs: sanity check of xattr entry size" }, - "CVE-2020-0465": { - "cmt_msg": "HID: core: Sanitize event code and type when mapping input" - }, - "CVE-2020-0305": { - "cmt_msg": "chardev: Avoid potential use-after-free in 'chrdev_open()'" - }, - "CVE-2018-3639": { - "cmt_msg": "x86/nospec: Simplify alternative_msr_write()" - }, - "CVE-2021-4218": { - "cmt_msg": "sysctl: pass kernel pointers to ->proc_handler" - }, - "CVE-2019-15902": { - "cmt_msg": "" - }, - "CVE-2024-25739": { - "cmt_msg": "" - }, "CVE-2023-3358": { "cmt_msg": "HID: intel_ish-hid: Add check for ishtp_dma_tx_map" }, - "CVE-2019-20054": { - "cmt_msg": "fs/proc/proc_sysctl.c: fix NULL pointer dereference in put_links" - }, - "CVE-2024-0340": { - "cmt_msg": "vhost: use kzalloc() instead of kmalloc() followed by memset()" - }, - "CVE-2021-3753": { - "cmt_msg": "vt_kdsetmode: extend console locking" - }, - "CVE-2023-6536": { - "cmt_msg": "" - }, - "CVE-2019-11135": { - "cmt_msg": "x86/msr: Add the IA32_TSX_CTRL MSR" - }, - "CVE-2019-11810": { - "cmt_msg": "scsi: megaraid_sas: return error when create DMA pool failed" - }, - "CVE-2021-27365": { - "cmt_msg": "scsi: iscsi: Ensure sysfs attributes are limited to PAGE_SIZE" - }, - "CVE-2021-27364": { - "cmt_msg": "scsi: iscsi: Restrict sessions and handles to admin capabilities" - }, - "CVE-2019-11815": { - "cmt_msg": "net: rds: force to destroy connection if t_sock is NULL in rds_tcp_kill_sock()." - }, - "CVE-2020-0431": { - "cmt_msg": "HID: hid-input: clear unmapped usages" - }, - "CVE-2022-39842": { - "cmt_msg": "video: fbdev: pxa3xx-gcu: Fix integer overflow in pxa3xx_gcu_write" - }, - "CVE-2018-17977": { - "cmt_msg": "" - }, - "CVE-2018-17972": { - "cmt_msg": "proc: restrict kernel stack dumps to root" - }, - "CVE-2021-20320": { - "cmt_msg": "s390/bpf: Fix optimizing out zero-extensions" - }, - "CVE-2020-28974": { - "cmt_msg": "vt: Disable KD_FONT_OP_COPY" + "CVE-2017-14991": { + "cmt_msg": "scsi: sg: fixup infoleak when using SG_GET_REQUEST_TABLE" }, "CVE-2018-7566": { "cmt_msg": "ALSA: seq: Fix racy pool initializations" }, - "CVE-2022-33742": { - "cmt_msg": "xen/blkfront: force data bouncing when backend is untrusted" - }, - "CVE-2022-26490": { - "cmt_msg": "nfc: st21nfca: Fix potential buffer overflows in EVT_TRANSACTION" - }, - "CVE-2021-0937": { - "cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write" - }, - "CVE-2022-3169": { - "cmt_msg": "nvme: ensure subsystem reset is single threaded" - }, - "CVE-2022-36280": { - "cmt_msg": "drm/vmwgfx: Validate the box size for the snooped cursor" - }, - "CVE-2022-1048": { - "cmt_msg": "ALSA: pcm: Fix races among concurrent hw_params and hw_free calls" - }, - "CVE-2018-20976": { - "cmt_msg": "xfs: clear sb->s_fs_info on mount failure" - }, - "CVE-2023-22995": { - "cmt_msg": "usb: dwc3: dwc3-qcom: Add missing platform_device_put() in dwc3_qcom_acpi_register_core" - }, - "CVE-2024-21803": { - "cmt_msg": "" - }, - "CVE-2018-7995": { - "cmt_msg": "x86/MCE: Serialize sysfs changes" - }, - "CVE-2018-16276": { - "cmt_msg": "USB: yurex: fix out-of-bounds uaccess in read handler" - }, - "CVE-2019-15927": { - "cmt_msg": "ALSA: usb-audio: Avoid access before bLength check in build_audio_procunit()" - }, - "CVE-2021-3542": { - "cmt_msg": "" - }, - "CVE-2019-16413": { - "cmt_msg": "9p: use inode->i_lock to protect i_size_write() under 32-bit" - }, - "CVE-2024-24860": { - "cmt_msg": "Bluetooth: Fix atomicity violation in {min,max}_key_size_set" - }, - "CVE-2022-1263": { - "cmt_msg": "KVM: avoid NULL pointer dereference in kvm_dirty_ring_push" - }, - "CVE-2017-16650": { - "cmt_msg": "net: qmi_wwan: fix divide by 0 on bad descriptors" - }, - "CVE-2020-12653": { - "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_cmd_append_vsie_tlv()" - }, - "CVE-2019-7222": { - "cmt_msg": "KVM: x86: work around leak of uninitialized stack contents (CVE-2019-7222)" - }, - "CVE-2017-14051": { - "cmt_msg": "scsi: qla2xxx: Fix an integer overflow in sysfs code" - }, - "CVE-2020-12654": { - "cmt_msg": "mwifiex: Fix possible buffer overflows in mwifiex_ret_wmm_get_status()" - }, - "CVE-2019-7221": { - "cmt_msg": "KVM: nVMX: unconditionally cancel preemption timer in free_nested (CVE-2019-7221)" - }, - "CVE-2018-12929": { - "cmt_msg": "" - }, - "CVE-2018-12928": { - "cmt_msg": "" - }, - "CVE-2020-36310": { - "cmt_msg": "KVM: SVM: avoid infinite loop on NPF from bad address" - }, - "CVE-2020-36313": { - "cmt_msg": "KVM: Fix out of range accesses to memslots" - }, - "CVE-2020-35519": { - "cmt_msg": "net/x25: prevent a couple of overflows" - }, - "CVE-2023-31436": { - "cmt_msg": "net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg" - }, - "CVE-2022-33740": { - "cmt_msg": "xen/netfront: fix leaking data in shared pages" - }, - "CVE-2023-51782": { - "cmt_msg": "net/rose: Fix Use-After-Free in rose_ioctl" - }, - "CVE-2020-35513": { - "cmt_msg": "nfsd: fix incorrect umasks" - }, - "CVE-2020-10708": { - "cmt_msg": "" - }, - "CVE-2020-25673": { - "cmt_msg": "nfc: Avoid endless loops caused by repeated llcp_sock_connect()" - }, - "CVE-2022-0400": { - "cmt_msg": "" - }, - "CVE-2023-6356": { - "cmt_msg": "" - }, - "CVE-2024-25741": { - "cmt_msg": "" + "CVE-2024-26808": { + "cmt_msg": "netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain" }, - "CVE-2021-38160": { - "cmt_msg": "virtio_console: Assure used length from device is limited" + "CVE-2024-26809": { + "cmt_msg": "netfilter: nft_set_pipapo: release elements in clone only from destroy path" }, "CVE-2021-42739": { "cmt_msg": "media: firewire: firedtv-avc: fix a buffer overflow in avc_ca_pmt()" }, - "CVE-2022-3344": { - "cmt_msg": "KVM: x86: nSVM: harden svm_free_nested against freeing vmcb02 while still in use" + "CVE-2023-46343": { + "cmt_msg": "nfc: nci: fix possible NULL pointer dereference in send_acknowledge()" }, - "CVE-2022-3111": { - "cmt_msg": "power: supply: wm8350-power: Add missing free in free_charger_irq" + "CVE-2024-26806": { + "cmt_msg": "spi: cadence-qspi: remove system-wide suspend helper calls from runtime PM hooks" }, - "CVE-2018-5344": { - "cmt_msg": "loop: fix concurrent lo_open/lo_release" + "CVE-2021-37159": { + "cmt_msg": "usb: hso: fix error handling code of hso_create_net_device" }, "CVE-2020-12770": { "cmt_msg": "scsi: sg: add sg_remove_request in sg_write" }, - "CVE-2018-6412": { - "cmt_msg": "fbdev: Fixing arbitrary kernel leak in case FBIOGETCMAP_SPARC in sbusfb_ioctl_helper()." - }, - "CVE-2019-15222": { - "cmt_msg": "ALSA: usb-audio: Fix gpf in snd_usb_pipe_sanity_check" - }, - "CVE-2024-25744": { - "cmt_msg": "x86/coco: Disable 32-bit emulation by default on TDX and SEV" - }, - "CVE-2022-25265": { - "cmt_msg": "" - }, - "CVE-2022-20368": { - "cmt_msg": "net/packet: fix slab-out-of-bounds access in packet_recvmsg()" - }, - "CVE-2017-12153": { - "cmt_msg": "nl80211: check for the required netlink attributes presence" + "CVE-2024-26802": { + "cmt_msg": "stmmac: Clear variable when destroying workqueue" }, - "CVE-2019-19813": { - "cmt_msg": "btrfs: inode: Verify inode mode to avoid NULL pointer dereference" + "CVE-2017-15115": { + "cmt_msg": "sctp: do not peel off an assoc from one netns to another one" }, - "CVE-2017-12154": { - "cmt_msg": "kvm: nVMX: Don't allow L2 to access the hardware CR8" + "CVE-2023-52606": { + "cmt_msg": "powerpc/lib: Validate size for vector operations" }, - "CVE-2020-10773": { - "cmt_msg": "s390/cmm: fix information leak in cmm_timeout_handler()" + "CVE-2023-52607": { + "cmt_msg": "powerpc/mm: Fix null-pointer dereference in pgtable_cache_add" }, - "CVE-2022-21499": { - "cmt_msg": "lockdown: also lock down previous kgdb use" + "CVE-2023-52604": { + "cmt_msg": "FS:JFS:UBSAN:array-index-out-of-bounds in dbAdjTree" }, - "CVE-2020-25284": { - "cmt_msg": "rbd: require global CAP_SYS_ADMIN for mapping and unmapping" + "CVE-2023-52602": { + "cmt_msg": "jfs: fix slab-out-of-bounds Read in dtSearch" }, - "CVE-2023-4208": { - "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free" + "CVE-2023-52603": { + "cmt_msg": "UBSAN: array-index-out-of-bounds in dtSplitRoot" }, - "CVE-2022-3606": { - "cmt_msg": "" + "CVE-2023-52600": { + "cmt_msg": "jfs: fix uaf in jfs_evict_inode" }, - "CVE-2023-4206": { - "cmt_msg": "net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free" + "CVE-2023-52601": { + "cmt_msg": "jfs: fix array-index-out-of-bounds in dbAdjTree" }, - "CVE-2023-4207": { - "cmt_msg": "net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free" + "CVE-2023-52609": { + "cmt_msg": "binder: fix race between mmput() and do_exit()" }, "CVE-2023-3640": { "cmt_msg": "" }, - "CVE-2018-18281": { - "cmt_msg": "mremap: properly flush TLB before releasing the page" - }, - "CVE-2023-20593": { - "cmt_msg": "x86/cpu/amd: Add a Zenbleed fix" - }, - "CVE-2019-18675": { - "cmt_msg": "mmap: introduce sane default mmap limits" - }, "CVE-2023-3022": { "cmt_msg": "ipv6: Use result arg in fib_lookup_arg consistently" }, - "CVE-2022-2663": { - "cmt_msg": "netfilter: nf_conntrack_irc: Fix forged IP logic" - }, - "CVE-2019-8912": { - "cmt_msg": "net: crypto set sk to NULL when af_alg_release." - }, - "CVE-2023-51780": { - "cmt_msg": "atm: Fix Use-After-Free in do_vcc_ioctl" + "CVE-2022-43750": { + "cmt_msg": "usb: mon: make mmapped memory read only" }, "CVE-2023-0047": { "cmt_msg": "mm, oom: do not trigger out_of_memory from the #PF" }, - "CVE-2020-29370": { - "cmt_msg": "mm: slub: add missing TID bump in kmem_cache_alloc_bulk()" + "CVE-2023-4010": { + "cmt_msg": "" }, - "CVE-2019-15219": { - "cmt_msg": "USB: sisusbvga: fix oops in error path of sisusb_probe" + "CVE-2021-47167": { + "cmt_msg": "NFS: Fix an Oopsable condition in __nfs_pageio_add_request()" }, - "CVE-2022-20424": { - "cmt_msg": "io_uring: remove io_identity" + "CVE-2021-47166": { + "cmt_msg": "NFS: Don't corrupt the value of pg_bytes_written in nfs_do_recoalesce()" }, - "CVE-2022-20422": { - "cmt_msg": "arm64: fix oops in concurrently setting insn_emulation sysctls" + "CVE-2021-47165": { + "cmt_msg": "drm/meson: fix shutdown crash when component not probed" + }, + "CVE-2021-47163": { + "cmt_msg": "tipc: wait and exit until all work queues are done" + }, + "CVE-2021-47162": { + "cmt_msg": "tipc: skb_linearize the head skb when reassembling msgs" + }, + "CVE-2021-47161": { + "cmt_msg": "spi: spi-fsl-dspi: Fix a resource leak in an error handling path" + }, + "CVE-2021-47160": { + "cmt_msg": "net: dsa: mt7530: fix VLAN traffic leaks" }, "CVE-2023-4385": { "cmt_msg": "fs: jfs: fix possible NULL pointer dereference in dbFree()" }, - "CVE-2020-25643": { - "cmt_msg": "hdlc_ppp: add range checks in ppp_cp_parse_cr()" + "CVE-2021-46965": { + "cmt_msg": "mtd: physmap: physmap-bt1-rom: Fix unintentional stack access" }, "CVE-2023-4387": { "cmt_msg": "net: vmxnet3: fix possible use-after-free bugs in vmxnet3_rq_alloc_rx_buf()" }, - "CVE-2021-39657": { - "cmt_msg": "scsi: ufs: Correct the LUN used in eh_device_reset_handler() callback" + "CVE-2021-46960": { + "cmt_msg": "cifs: Return correct error code from smb2_get_enc_key" }, - "CVE-2024-24858": { - "cmt_msg": "" + "CVE-2021-46962": { + "cmt_msg": "mmc: uniphier-sd: Fix a resource leak in the remove function" + }, + "CVE-2021-47168": { + "cmt_msg": "NFS: fix an incorrect limit in filelayout_decode_layout()" }, "CVE-2019-19378": { "cmt_msg": "" }, - "CVE-2020-4788": { - "cmt_msg": "powerpc/64s: flush L1D on kernel entry" - }, "CVE-2022-36879": { "cmt_msg": "xfrm: xfrm_policy: fix a possible double xfrm_pols_put() in xfrm_bundle_lookup()" }, - "CVE-2017-8831": { - "cmt_msg": "[media] saa7164: fix double fetch PCIe access condition" - }, - "CVE-2021-39698": { - "cmt_msg": "wait: add wake_up_pollfree()" - }, - "CVE-2022-45934": { - "cmt_msg": "Bluetooth: L2CAP: Fix u8 overflow" - }, - "CVE-2018-5333": { - "cmt_msg": "RDS: null pointer dereference in rds_atomic_free_op" - }, - "CVE-2018-5332": { - "cmt_msg": "RDS: Heap OOB write in rds_message_alloc_sgs()" - }, - "CVE-2022-2380": { - "cmt_msg": "video: fbdev: sm712fb: Fix crash in smtcfb_read()" - }, - "CVE-2022-0850": { - "cmt_msg": "ext4: fix kernel infoleak via ext4_extent_header" - }, - "CVE-2020-10767": { - "cmt_msg": "x86/speculation: Avoid force-disabling IBPB based on STIBP and enhanced IBRS." - }, - "CVE-2021-3759": { - "cmt_msg": "memcg: enable accounting of ipc resources" - }, - "CVE-2019-19447": { - "cmt_msg": "ext4: work around deleting a file with i_nlink == 0 safely" - }, - "CVE-2017-17448": { - "cmt_msg": "netfilter: nfnetlink_cthelper: Add missing permission checks" - }, - "CVE-2017-17449": { - "cmt_msg": "netlink: Add netns check on taps" - }, - "CVE-2019-19525": { - "cmt_msg": "ieee802154: atusb: fix use-after-free at disconnect" - }, - "CVE-2019-19524": { - "cmt_msg": "Input: ff-memless - kill timer in destroy()" - }, - "CVE-2019-19448": { - "cmt_msg": "btrfs: only search for left_info if there is no right_info in try_merge_free_space" - }, - "CVE-2019-19449": { - "cmt_msg": "f2fs: fix to do sanity check on segment/section count" - }, - "CVE-2023-31085": { - "cmt_msg": "ubi: Refuse attaching if mtd's erasesize is 0" - }, - "CVE-2019-19523": { - "cmt_msg": "USB: adutux: fix use-after-free on disconnect" - }, - "CVE-2021-3752": { - "cmt_msg": "Bluetooth: fix use-after-free error in lock_sock_nested()" - }, - "CVE-2017-10663": { - "cmt_msg": "f2fs: sanity check checkpoint segno and blkoff" - }, - "CVE-2020-11725": { - "cmt_msg": "" - }, - "CVE-2018-5848": { - "cmt_msg": "wil6210: missing length check in wmi_set_ie" - }, - "CVE-2017-18249": { - "cmt_msg": "f2fs: fix race condition in between free nid allocator/initializer" - }, - "CVE-2021-29264": { - "cmt_msg": "gianfar: fix jumbo packets+napi+rx overrun crash" - }, - "CVE-2021-35477": { - "cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4" - }, - "CVE-2017-18241": { - "cmt_msg": "f2fs: fix a panic caused by NULL flush_cmd_control" + "CVE-2019-19377": { + "cmt_msg": "btrfs: Don't submit any btree write bio if the fs has errors" }, - "CVE-2022-3521": { - "cmt_msg": "kcm: avoid potential race in kcm_tx_work" + "CVE-2023-1118": { + "cmt_msg": "media: rc: Fix use-after-free bugs caused by ene_tx_irqsim()" }, - "CVE-2019-15216": { - "cmt_msg": "USB: yurex: Fix protection fault after device removal" + "CVE-2021-0937": { + "cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write" }, "CVE-2022-47929": { "cmt_msg": "net: sched: disallow noqueue for qdisc classes" @@ -110777,95 +141811,32 @@ "CVE-2019-16746": { "cmt_msg": "nl80211: validate beacon head" }, - "CVE-2021-41864": { - "cmt_msg": "bpf: Fix integer overflow in prealloc_elems_and_freelist()" - }, - "CVE-2023-31081": { - "cmt_msg": "" - }, - "CVE-2022-2209": { + "CVE-2022-3606": { "cmt_msg": "" }, "CVE-2018-18021": { "cmt_msg": "arm64: KVM: Tighten guest core register access from userspace" }, - "CVE-2022-45887": { - "cmt_msg": "media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb()" - }, "CVE-2021-37576": { "cmt_msg": "KVM: PPC: Book3S: Fix H_RTAS rets buffer overflow" }, - "CVE-2019-8980": { - "cmt_msg": "exec: Fix mem leak in kernel_read_file" - }, - "CVE-2023-45871": { - "cmt_msg": "igb: set max size RX buffer when store bad packet is enabled" - }, - "CVE-2023-1855": { - "cmt_msg": "hwmon: (xgene) Fix use after free bug in xgene_hwmon_remove due to race condition" - }, - "CVE-2023-7042": { - "cmt_msg": "" - }, "CVE-2022-3594": { "cmt_msg": "r8152: Rate limit overflow messages" }, - "CVE-2018-14609": { - "cmt_msg": "btrfs: relocation: Only remove reloc rb_trees if reloc control has been initialized" - }, - "CVE-2023-35824": { - "cmt_msg": "media: dm1105: Fix use after free bug in dm1105_remove due to race condition" - }, - "CVE-2021-33098": { - "cmt_msg": "ixgbe: fix large MTU request from VF" - }, "CVE-2022-3595": { "cmt_msg": "cifs: fix double-fault crash during ntlmssp" }, - "CVE-2021-28971": { - "cmt_msg": "perf/x86/intel: Fix a crash caused by zero PEBS status" - }, - "CVE-2023-47233": { - "cmt_msg": "" - }, - "CVE-2020-10769": { - "cmt_msg": "crypto: authenc - fix parsing key with misaligned rta_len" - }, - "CVE-2023-6606": { - "cmt_msg": "smb: client: fix OOB in smbCalcSize()" - }, "CVE-2018-5803": { "cmt_msg": "sctp: verify size of a new chunk in _sctp_make_chunk()" }, "CVE-2020-27815": { "cmt_msg": "jfs: Fix array index bounds check in dbAdjTree" }, - "CVE-2021-45486": { - "cmt_msg": "inet: use bigger hash table for IP ID generation" - }, - "CVE-2022-1462": { - "cmt_msg": "tty: use new tty_insert_flip_string_and_push_buffer() in pty_write()" - }, - "CVE-2022-27223": { - "cmt_msg": "USB: gadget: validate endpoint index for xilinx udc" - }, - "CVE-2020-27067": { - "cmt_msg": "l2tp: fix l2tp_eth module loading" - }, - "CVE-2020-27777": { - "cmt_msg": "powerpc/rtas: Restrict RTAS requests from userspace" - }, - "CVE-2019-20636": { - "cmt_msg": "Input: add safety guards to input_set_keycode()" - }, - "CVE-2019-11486": { - "cmt_msg": "tty: mark Siemens R3964 line discipline as BROKEN" - }, - "CVE-2019-11487": { - "cmt_msg": "fs: prevent page refcount overflow in pipe_buf_get" + "CVE-2023-6606": { + "cmt_msg": "smb: client: fix OOB in smbCalcSize()" }, - "CVE-2018-8043": { - "cmt_msg": "net: phy: mdio-bcm-unimac: fix potential NULL dereference in unimac_mdio_probe()" + "CVE-2020-27673": { + "cmt_msg": "xen/events: add a proper barrier to 2-level uevent unmasking" }, "CVE-2020-27675": { "cmt_msg": "xen/events: avoid removing an event channel while handling it" @@ -110873,62 +141844,8 @@ "CVE-2020-28915": { "cmt_msg": "fbcon: Fix global-out-of-bounds read in fbcon_get_font()" }, - "CVE-2023-7192": { - "cmt_msg": "netfilter: ctnetlink: fix possible refcount leak in ctnetlink_create_conntrack()" - }, - "CVE-2019-20908": { - "cmt_msg": "efi: Restrict efivar_ssdt_load when the kernel is locked down" - }, - "CVE-2023-3776": { - "cmt_msg": "net/sched: cls_fw: Fix improper refcount update leads to use-after-free" - }, - "CVE-2021-28038": { - "cmt_msg": "Xen/gnttab: handle p2m update errors on a per-slot basis" - }, - "CVE-2022-23040": { - "cmt_msg": "xen/xenbus: don't let xenbus_grant_ring() remove grants in error case" - }, - "CVE-2021-29154": { - "cmt_msg": "bpf, x86: Validate computation of branch displacements for x86-64" - }, - "CVE-2023-52435": { - "cmt_msg": "net: prevent mss overflow in skb_segment()" - }, - "CVE-2023-52434": { - "cmt_msg": "smb: client: fix potential OOBs in smb2_parse_contexts()" - }, - "CVE-2023-3161": { - "cmt_msg": "fbcon: Check font dimension limits" - }, - "CVE-2023-52436": { - "cmt_msg": "f2fs: explicitly null-terminate the xattr list" - }, - "CVE-2019-19060": { - "cmt_msg": "iio: imu: adis16400: release allocated memory on failure" - }, - "CVE-2019-19061": { - "cmt_msg": "iio: imu: adis16400: fix memory leak" - }, - "CVE-2019-19062": { - "cmt_msg": "crypto: user - fix memory leak in crypto_report" - }, - "CVE-2019-19063": { - "cmt_msg": "rtlwifi: prevent memory leak in rtl_usb_probe" - }, - "CVE-2017-17741": { - "cmt_msg": "KVM: Fix stack-out-of-bounds read in write_mmio" - }, - "CVE-2019-9445": { - "cmt_msg": "f2fs: check if file namelen exceeds max value" - }, - "CVE-2019-19066": { - "cmt_msg": "scsi: bfa: release allocated memory in case of error" - }, - "CVE-2019-19067": { - "cmt_msg": "drm/amdgpu: fix multiple memory leaks in acp_hw_init" - }, - "CVE-2019-19068": { - "cmt_msg": "rtl8xxxu: prevent leaking urb" + "CVE-2022-3111": { + "cmt_msg": "power: supply: wm8350-power: Add missing free in free_charger_irq" }, "CVE-2020-0435": { "cmt_msg": "f2fs: fix to do sanity check with i_extra_isize" @@ -110939,50 +141856,23 @@ "CVE-2020-0433": { "cmt_msg": "blk-mq: sync the update nr_hw_queues with blk_mq_queue_tag_busy_iter" }, - "CVE-2023-51779": { - "cmt_msg": "Bluetooth: af_bluetooth: Fix Use-After-Free in bt_sock_recvmsg" - }, - "CVE-2019-3874": { - "cmt_msg": "sctp: implement memory accounting on tx path" - }, - "CVE-2018-10877": { - "cmt_msg": "ext4: verify the depth of extent tree in ext4_find_extent()" + "CVE-2020-0431": { + "cmt_msg": "HID: hid-input: clear unmapped usages" }, - "CVE-2018-10876": { - "cmt_msg": "ext4: only look at the bg_flags field if it is valid" + "CVE-2023-6915": { + "cmt_msg": "ida: Fix crash in ida_free when the bitmap is empty" }, - "CVE-2010-4563": { - "cmt_msg": "" + "CVE-2021-47006": { + "cmt_msg": "ARM: 9064/1: hw_breakpoint: Do not directly check the event's overflow_handler hook" }, "CVE-2023-1249": { "cmt_msg": "coredump: Use the vma snapshot in fill_files_note" }, - "CVE-2020-14331": { - "cmt_msg": "vgacon: Fix for missing check in scrollback handling" - }, - "CVE-2018-10879": { - "cmt_msg": "ext4: make sure bitmaps and the inode table don't overlap with bg descriptors" - }, - "CVE-2019-14835": { - "cmt_msg": "vhost: make sure log_num < in_num" - }, - "CVE-2023-2248": { - "cmt_msg": "net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg" - }, - "CVE-2023-0266": { - "cmt_msg": "ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF" - }, - "CVE-2023-1838": { - "cmt_msg": "Fix double fget() in vhost_net_set_backend()" - }, "CVE-2021-3483": { "cmt_msg": "firewire: nosy: Fix a use-after-free bug in nosy_ioctl()" }, - "CVE-2019-15807": { - "cmt_msg": "scsi: libsas: delete sas port if expander discover failed" - }, - "CVE-2017-16913": { - "cmt_msg": "usbip: fix stub_rx: harden CMD_SUBMIT path to handle malicious input" + "CVE-2023-6040": { + "cmt_msg": "netfilter: nf_tables: Reject tables of unsupported family" }, "CVE-2017-16912": { "cmt_msg": "usbip: fix stub_rx: get_pipe() to validate endpoint number" @@ -110990,89 +141880,23 @@ "CVE-2017-16911": { "cmt_msg": "usbip: prevent vhci_hcd driver from leaking a socket pointer address" }, - "CVE-2017-0861": { - "cmt_msg": "ALSA: pcm: prevent UAF in snd_pcm_info" - }, - "CVE-2020-25656": { - "cmt_msg": "vt: keyboard, extend func_buf_lock to readers" - }, "CVE-2017-16914": { "cmt_msg": "usbip: fix stub_send_ret_submit() vulnerability to null transfer_buffer" }, - "CVE-2023-1390": { - "cmt_msg": "tipc: fix NULL deref in tipc_link_xmit()" - }, - "CVE-2022-0492": { - "cmt_msg": "cgroup-v1: Require capabilities to set release_agent" - }, - "CVE-2024-26598": { - "cmt_msg": "KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache" - }, - "CVE-2020-10942": { - "cmt_msg": "vhost: Check docket sk_family instead of call getname" - }, - "CVE-2019-10142": { - "cmt_msg": "drivers/virt/fsl_hypervisor.c: prevent integer overflow in ioctl" - }, - "CVE-2021-4023": { - "cmt_msg": "io-wq: fix cancellation on create-worker failure" - }, - "CVE-2018-3693": { - "cmt_msg": "ext4: fix spectre gadget in ext4_mb_regular_allocator()" - }, - "CVE-2017-12193": { - "cmt_msg": "assoc_array: Fix a buggy node-splitting case" - }, - "CVE-2017-12192": { - "cmt_msg": "KEYS: prevent KEYCTL_READ on negative key" - }, - "CVE-2021-22555": { - "cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write" - }, - "CVE-2017-12190": { - "cmt_msg": "fix unbalanced page refcounting in bio_map_user_iov" - }, - "CVE-2022-1011": { - "cmt_msg": "fuse: fix pipe buffer lifetime for direct_io" - }, - "CVE-2021-0399": { - "cmt_msg": "" - }, "CVE-2020-36691": { "cmt_msg": "netlink: limit recursion depth in policy validation" }, - "CVE-2023-3111": { - "cmt_msg": "btrfs: unset reloc control if transaction commit fails in prepare_to_relocate()" - }, - "CVE-2020-2732": { - "cmt_msg": "KVM: nVMX: Don't emulate instructions in guest mode" - }, - "CVE-2012-4542": { - "cmt_msg": "" - }, - "CVE-2022-1729": { - "cmt_msg": "perf: Fix sys_perf_event_open() race against self" + "CVE-2023-42755": { + "cmt_msg": "net/sched: Retire rsvp classifier" }, "CVE-2023-42752": { "cmt_msg": "igmp: limit igmpv3_newpack() packet size to IP_MAX_MTU" }, - "CVE-2023-4128": { - "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free" - }, - "CVE-2018-1000028": { - "cmt_msg": "nfsd: auth: Fix gid sorting when rootsquash enabled" - }, - "CVE-2023-1118": { - "cmt_msg": "media: rc: Fix use-after-free bugs caused by ene_tx_irqsim()" - }, - "CVE-2018-7191": { - "cmt_msg": "tun: call dev_get_valid_name() before register_netdevice()" - }, - "CVE-2024-0607": { - "cmt_msg": "netfilter: nf_tables: fix pointer math issue in nft_byteorder_eval()" + "CVE-2021-3573": { + "cmt_msg": "Bluetooth: use correct lock to prevent UAF of hdev object" }, - "CVE-2018-1000026": { - "cmt_msg": "bnx2x: disable GSO where gso_size is too big for hardware" + "CVE-2022-1974": { + "cmt_msg": "nfc: replace improper check device_is_registered() in netlink related functions" }, "CVE-2022-1975": { "cmt_msg": "NFC: netlink: fix sleep in atomic bug when firmware download timeout" @@ -111080,117 +141904,30 @@ "CVE-2023-1380": { "cmt_msg": "wifi: brcmfmac: slab-out-of-bounds read in brcmf_get_assoc_ies()" }, - "CVE-2022-44032": { - "cmt_msg": "char: pcmcia: remove all the drivers" - }, - "CVE-2017-0786": { - "cmt_msg": "brcmfmac: add length check in brcmf_cfg80211_escan_handler()" - }, - "CVE-2021-28972": { - "cmt_msg": "PCI: rpadlpar: Fix potential drc_name corruption in store functions" - }, "CVE-2018-12130": { "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" }, - "CVE-2020-14305": { - "cmt_msg": "netfilter: helpers: remove data_len usage for inkernel helpers" - }, - "CVE-2021-20292": { - "cmt_msg": "drm/ttm/nouveau: don't call tt destroy callback on alloc failure." - }, - "CVE-2021-31916": { - "cmt_msg": "dm ioctl: fix out of bounds array access when no devices" - }, - "CVE-2018-17182": { - "cmt_msg": "mm: get rid of vmacache_flush_all() entirely" - }, "CVE-2022-32981": { "cmt_msg": "powerpc/32: Fix overread/overwrite of thread_struct via ptrace" }, "CVE-2018-13405": { "cmt_msg": "Fix up non-directory creation in SGID directories" }, - "CVE-2020-25645": { - "cmt_msg": "geneve: add transport ports in route lookup for geneve" - }, "CVE-2018-13406": { "cmt_msg": "video: uvesafb: Fix integer overflow in allocation" }, - "CVE-2022-1280": { - "cmt_msg": "drm: avoid circular locks in drm_mode_getconnector" - }, - "CVE-2023-3772": { - "cmt_msg": "xfrm: add NULL check in xfrm_update_ae_params" - }, "CVE-2020-11668": { "cmt_msg": "media: xirlink_cit: add missing descriptor sanity checks" }, "CVE-2020-11669": { "cmt_msg": "powerpc/powernv/idle: Restore AMR/UAMOR/AMOR after idle" }, - "CVE-2019-15118": { - "cmt_msg": "ALSA: usb-audio: Fix a stack buffer overflow bug in check_input_term" - }, - "CVE-2019-12818": { - "cmt_msg": "net: nfc: Fix NULL dereference on nfc_llcp_build_tlv fails" - }, - "CVE-2019-12819": { - "cmt_msg": "mdio_bus: Fix use-after-free on device_register fails" - }, - "CVE-2023-0394": { - "cmt_msg": "ipv6: raw: Deduct extension header length in rawv6_push_pending_frames" - }, - "CVE-2018-11506": { - "cmt_msg": "sr: pass down correctly sized SCSI sense buffer" - }, - "CVE-2022-36402": { - "cmt_msg": "drm/vmwgfx: Fix shader stage validation" - }, - "CVE-2019-19332": { - "cmt_msg": "KVM: x86: fix out-of-bounds write in KVM_GET_EMULATED_CPUID (CVE-2019-19332)" - }, - "CVE-2019-15117": { - "cmt_msg": "ALSA: usb-audio: Fix an OOB bug in parse_audio_mixer_unit" - }, - "CVE-2021-3659": { - "cmt_msg": "net: mac802154: Fix general protection fault" - }, - "CVE-2022-25258": { - "cmt_msg": "USB: gadget: validate interface OS descriptor requests" - }, - "CVE-2021-4155": { - "cmt_msg": "xfs: map unwritten blocks in XFS_IOC_{ALLOC,FREE}SP just like fallocate" - }, "CVE-2019-14901": { "cmt_msg": "mwifiex: Fix heap overflow in mmwifiex_process_tdls_action_frame()" }, - "CVE-2021-4150": { - "cmt_msg": "block: fix incorrect references to disk objects" - }, - "CVE-2020-3702": { - "cmt_msg": "ath: Use safer key clearing with key cache entries" - }, - "CVE-2020-16166": { - "cmt_msg": "random32: update the net random state on interrupt and activity" - }, - "CVE-2021-3653": { - "cmt_msg": "KVM: nSVM: avoid picking up unsupported bits from L2 in int_ctl (CVE-2021-3653)" - }, - "CVE-2021-3655": { - "cmt_msg": "sctp: validate from_addr_param return" - }, "CVE-2020-8694": { "cmt_msg": "powercap: restrict energy meter to root access" }, - "CVE-2021-4159": { - "cmt_msg": "bpf: Verifer, adjust_scalar_min_max_vals to always call update_reg_bounds()" - }, - "CVE-2019-12614": { - "cmt_msg": "powerpc/pseries/dlpar: Fix a missing check in dlpar_parse_cc_property()" - }, - "CVE-2019-12615": { - "cmt_msg": "mdesc: fix a missing-check bug in get_vdev_port_node_info()" - }, "CVE-2021-3715": { "cmt_msg": "net_sched: cls_route: remove the right filter from hashtable" }, @@ -111215,9 +141952,6 @@ "CVE-2019-6133": { "cmt_msg": "fork: record start_time late" }, - "CVE-2018-10902": { - "cmt_msg": "ALSA: rawmidi: Change resized buffers atomically" - }, "CVE-2021-39633": { "cmt_msg": "ip_gre: add validation for csum_start" }, @@ -111236,317 +141970,92 @@ "CVE-2021-39634": { "cmt_msg": "epoll: do not insert into poll queues until all sanity checks are done" }, - "CVE-2024-23851": { - "cmt_msg": "dm: limit the number of targets and parameter size area" - }, - "CVE-2019-3882": { - "cmt_msg": "vfio/type1: Limit DMA mappings per container" - }, - "CVE-2017-18208": { - "cmt_msg": "mm/madvise.c: fix madvise() infinite loop under special circumstances" + "CVE-2022-33742": { + "cmt_msg": "xen/blkfront: force data bouncing when backend is untrusted" }, "CVE-2022-33741": { "cmt_msg": "xen/netfront: force data bouncing when backend is untrusted" }, - "CVE-2018-20509": { - "cmt_msg": "binder: refactor binder ref inc/dec for thread safety" - }, - "CVE-2024-24864": { - "cmt_msg": "" - }, - "CVE-2022-45885": { - "cmt_msg": "" + "CVE-2022-33740": { + "cmt_msg": "xen/netfront: fix leaking data in shared pages" }, "CVE-2022-33744": { "cmt_msg": "xen/arm: Fix race in RB-tree based P2M accounting" }, - "CVE-2023-4132": { - "cmt_msg": "media: usb: siano: Fix warning due to null work_func_t function pointer" - }, - "CVE-2017-18193": { - "cmt_msg": "f2fs: fix a bug caused by NULL extent tree" + "CVE-2023-52596": { + "cmt_msg": "sysctl: Fix out of bounds access for empty sysctl registers" }, - "CVE-2022-40768": { - "cmt_msg": "scsi: stex: Properly zero out the passthrough command structure" + "CVE-2023-52597": { + "cmt_msg": "KVM: s390: fix setting of fpc register" }, - "CVE-2019-9454": { - "cmt_msg": "i2c: core-smbus: prevent stack corruption on read I2C_BLOCK_DATA" + "CVE-2023-52594": { + "cmt_msg": "wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus()" }, - "CVE-2020-12888": { - "cmt_msg": "vfio-pci: Invalidate mmaps and block MMIO access on disabled memory" + "CVE-2023-52595": { + "cmt_msg": "wifi: rt2x00: restart beacon queue when hardware reset" }, - "CVE-2023-2194": { - "cmt_msg": "i2c: xgene-slimpro: Fix out-of-bounds bug in xgene_slimpro_i2c_xfer()" + "CVE-2023-52593": { + "cmt_msg": "wifi: wfx: fix possible NULL pointer dereference in wfx_set_mfp_ap()" }, - "CVE-2023-52445": { - "cmt_msg": "media: pvrusb2: fix use after free on context disconnection" + "CVE-2023-52590": { + "cmt_msg": "ocfs2: Avoid touching renamed directory if parent does not change" }, - "CVE-2021-0447": { - "cmt_msg": "l2tp: protect sock pointer of struct pppol2tp_session with RCU" + "CVE-2023-52591": { + "cmt_msg": "reiserfs: Avoid touching renamed directory if parent does not change" }, - "CVE-2022-41218": { - "cmt_msg": "media: dvb-core: Fix UAF due to refcount races at releasing" + "CVE-2019-9454": { + "cmt_msg": "i2c: core-smbus: prevent stack corruption on read I2C_BLOCK_DATA" }, - "CVE-2019-20934": { - "cmt_msg": "sched/fair: Don't free p->numa_faults with concurrent readers" + "CVE-2023-52598": { + "cmt_msg": "s390/ptrace: handle setting of fpc register correctly" }, - "CVE-2022-1247": { - "cmt_msg": "" + "CVE-2023-52599": { + "cmt_msg": "jfs: fix array-index-out-of-bounds in diNewExt" }, - "CVE-2022-36946": { - "cmt_msg": "netfilter: nf_queue: do not allow packet truncation below transport header offset" - }, - "CVE-2022-1184": { - "cmt_msg": "ext4: verify dir block before splitting it" + "CVE-2021-0447": { + "cmt_msg": "l2tp: protect sock pointer of struct pppol2tp_session with RCU" }, - "CVE-2021-45485": { - "cmt_msg": "ipv6: use prandom_u32() for ID generation" + "CVE-2022-23222": { + "cmt_msg": "bpf: Replace PTR_TO_XXX_OR_NULL with PTR_TO_XXX | PTR_MAYBE_NULL" }, "CVE-2021-0448": { "cmt_msg": "netfilter: ctnetlink: add a range check for l3/l4 protonum" }, - "CVE-2018-19824": { - "cmt_msg": "ALSA: usb-audio: Fix UAF decrement if card has no live interfaces in card.c" - }, - "CVE-2022-21166": { - "cmt_msg": "x86/speculation/mmio: Enable CPU Fill buffer clearing on idle" - }, - "CVE-2020-29374": { - "cmt_msg": "gup: document and work around \"COW can break either way\" issue" - }, - "CVE-2020-0030": { - "cmt_msg": "ANDROID: binder: synchronize_rcu() when using POLLFREE." - }, - "CVE-2023-4134": { - "cmt_msg": "Input: cyttsp4_core - change del_timer_sync() to timer_shutdown_sync()" - }, - "CVE-2018-16862": { - "cmt_msg": "mm: cleancache: fix corruption on missed inode invalidation" - }, - "CVE-2023-52449": { - "cmt_msg": "mtd: Fix gluebi NULL pointer dereference caused by ftl notifier" - }, - "CVE-2021-29650": { - "cmt_msg": "netfilter: x_tables: Use correct memory barriers." - }, - "CVE-2019-18806": { - "cmt_msg": "net: qlogic: Fix memory leak in ql_alloc_large_buffers" - }, - "CVE-2023-4010": { - "cmt_msg": "" - }, - "CVE-2018-20169": { - "cmt_msg": "USB: check usb_get_extra_descriptor for proper size" - }, "CVE-2017-12762": { "cmt_msg": "isdn/i4l: fix buffer overflow" }, - "CVE-2021-33656": { - "cmt_msg": "vt: drop old FONT ioctls" - }, - "CVE-2020-36558": { - "cmt_msg": "vt: vt_ioctl: fix race in VT_RESIZEX" - }, "CVE-2022-41849": { "cmt_msg": "fbdev: smscufx: Fix use-after-free in ufx_ops_open()" }, "CVE-2022-41848": { "cmt_msg": "" }, - "CVE-2020-36312": { - "cmt_msg": "KVM: fix memory leak in kvm_io_bus_unregister_dev()" + "CVE-2023-6356": { + "cmt_msg": "nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length" }, "CVE-2022-1353": { "cmt_msg": "af_key: add __GFP_ZERO flag for compose_sadb_supported in function pfkey_register" }, - "CVE-2022-28356": { - "cmt_msg": "llc: fix netdevice reference leaks in llc_ui_bind()" - }, "CVE-2022-1198": { "cmt_msg": "drivers: hamradio: 6pack: fix UAF bug caused by mod_timer()" }, "CVE-2022-1199": { "cmt_msg": "ax25: Fix NULL pointer dereference in ax25_kill_by_device" }, - "CVE-2018-5750": { - "cmt_msg": "ACPI: sbshc: remove raw pointer from printk() message" - }, - "CVE-2021-39801": { - "cmt_msg": "" - }, - "CVE-2021-39800": { - "cmt_msg": "" - }, - "CVE-2017-7558": { - "cmt_msg": "sctp: Avoid out-of-bounds reads from address storage" - }, - "CVE-2018-16884": { - "cmt_msg": "sunrpc: use-after-free in svc_process_common()" - }, - "CVE-2023-1074": { - "cmt_msg": "sctp: fail if no bound addresses can be used for a given scope" - }, "CVE-2022-1195": { "cmt_msg": "hamradio: improve the incomplete fix to avoid NPD" }, - "CVE-2024-22099": { - "cmt_msg": "" - }, - "CVE-2021-4202": { - "cmt_msg": "NFC: reorganize the functions in nci_request" - }, - "CVE-2017-16647": { - "cmt_msg": "net: usb: asix: fill null-ptr-deref in asix_suspend" - }, - "CVE-2022-4269": { - "cmt_msg": "act_mirred: use the backlog for nested calls to mirred ingress" - }, - "CVE-2022-45886": { - "cmt_msg": "media: dvb-core: Fix use-after-free due on race condition at dvb_net" - }, - "CVE-2023-46343": { - "cmt_msg": "nfc: nci: fix possible NULL pointer dereference in send_acknowledge()" - }, - "CVE-2024-24859": { - "cmt_msg": "" - }, - "CVE-2019-10220": { - "cmt_msg": "Convert filldir[64]() from __put_user() to unsafe_put_user()" - }, "CVE-2023-2124": { "cmt_msg": "xfs: verify buffer contents when we skip log replay" }, - "CVE-2023-2860": { - "cmt_msg": "ipv6: sr: fix out-of-bounds read when setting HMAC data." - }, - "CVE-2021-44879": { - "cmt_msg": "f2fs: fix to do sanity check on inode type during garbage collection" - }, "CVE-2019-15505": { "cmt_msg": "media: technisat-usb2: break out of loop at end of buffer" }, - "CVE-2023-2513": { - "cmt_msg": "ext4: fix use-after-free in ext4_xattr_set_entry" - }, - "CVE-2017-1000": { - "cmt_msg": "udp: consistently apply ufo or fragmentation" - }, - "CVE-2020-11609": { - "cmt_msg": "media: stv06xx: add missing descriptor sanity checks" - }, "CVE-2022-27672": { "cmt_msg": "x86/speculation: Identify processors vulnerable to SMT RSB predictions" }, - "CVE-2022-2964": { - "cmt_msg": "net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup" - }, - "CVE-2017-0605": { - "cmt_msg": "tracing: Use strlcpy() instead of strcpy() in __trace_find_cmdline()" - }, - "CVE-2021-1048": { - "cmt_msg": "fix regression in \"epoll: Keep a reference on files added to the check list\"" - }, - "CVE-2015-2877": { - "cmt_msg": "" - }, - "CVE-2020-9383": { - "cmt_msg": "floppy: check FDC index for errors before assigning it" - }, - "CVE-2022-3586": { - "cmt_msg": "sch_sfb: Don't assume the skb is still around after enqueueing to child" - }, - "CVE-2023-32269": { - "cmt_msg": "netrom: Fix use-after-free caused by accept on already connected socket" - }, - "CVE-2023-1206": { - "cmt_msg": "tcp: Reduce chance of collisions in inet6_hashfn()." - }, - "CVE-2021-38198": { - "cmt_msg": "KVM: X86: MMU: Use the correct inherited permissions to get shadow page" - }, - "CVE-2021-38199": { - "cmt_msg": "NFSv4: Initialise connection to the server in nfs4_alloc_client()" - }, - "CVE-2022-1679": { - "cmt_msg": "ath9k: fix use-after-free in ath9k_hif_usb_rx_cb" - }, - "CVE-2020-8832": { - "cmt_msg": "drm/i915: Record the default hw state after reset upon load" - }, - "CVE-2023-1513": { - "cmt_msg": "kvm: initialize all of the kvm_debugregs structure before sending it to userspace" - }, - "CVE-2019-9444": { - "cmt_msg": "printk: hash addresses printed with %p" - }, - "CVE-2021-26401": { - "cmt_msg": "x86/speculation: Use generic retpoline by default on AMD" - }, - "CVE-2021-3847": { - "cmt_msg": "" - }, - "CVE-2018-1130": { - "cmt_msg": "dccp: check sk for closed state in dccp_sendmsg()" - }, - "CVE-2023-1077": { - "cmt_msg": "sched/rt: pick_next_rt_entity(): check list_entry" - }, - "CVE-2019-14284": { - "cmt_msg": "floppy: fix div-by-zero in setup_format_params" - }, - "CVE-2020-36557": { - "cmt_msg": "vt: vt_ioctl: fix VT_DISALLOCATE freeing in-use virtual console" - }, - "CVE-2021-3506": { - "cmt_msg": "f2fs: fix to avoid out-of-bounds memory access" - }, - "CVE-2011-4917": { - "cmt_msg": "" - }, - "CVE-2011-4916": { - "cmt_msg": "" - }, - "CVE-2018-10880": { - "cmt_msg": "ext4: never move the system.data xattr out of the inode body" - }, - "CVE-2019-3900": { - "cmt_msg": "vhost_net: fix possible infinite loop" - }, - "CVE-2019-19528": { - "cmt_msg": "USB: iowarrior: fix use-after-free on disconnect" - }, - "CVE-2019-19533": { - "cmt_msg": "media: ttusb-dec: Fix info-leak in ttusb_dec_send_command()" - }, - "CVE-2018-13100": { - "cmt_msg": "f2fs: fix to do sanity check with secs_per_zone" - }, - "CVE-2017-16646": { - "cmt_msg": "media: dib0700: fix invalid dvb_detach argument" - }, - "CVE-2017-16645": { - "cmt_msg": "Input: ims-psu - check if CDC union descriptor is sane" - }, - "CVE-2017-16644": { - "cmt_msg": "media: hdpvr: Fix an error handling path in hdpvr_probe()" - }, - "CVE-2017-16643": { - "cmt_msg": "Input: gtco - fix potential out-of-bound access" - }, - "CVE-2017-16649": { - "cmt_msg": "net: cdc_ether: fix divide by 0 on bad descriptors" - }, - "CVE-2023-31083": { - "cmt_msg": "Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO" - }, - "CVE-2019-5489": { - "cmt_msg": "Change mincore() to count \"mapped\" pages rather than \"cached\" pages" - }, - "CVE-2024-1312": { - "cmt_msg": "mm: lock_vma_under_rcu() must check vma->anon_vma under vma lock" - }, - "CVE-2018-8087": { - "cmt_msg": "mac80211_hwsim: fix possible memory leak in hwsim_new_radio_nl()" + "CVE-2022-1280": { + "cmt_msg": "drm: avoid circular locks in drm_mode_getconnector" }, "CVE-2019-14283": { "cmt_msg": "floppy: fix out-of-bounds read in copy_buffer" @@ -111554,11 +142063,8 @@ "CVE-2018-10881": { "cmt_msg": "ext4: clear i_data in ext4_inode_info when removing inline data" }, - "CVE-2018-10882": { - "cmt_msg": "ext4: add more inode number paranoia checks" - }, - "CVE-2018-10883": { - "cmt_msg": "jbd2: don't mark block as modified if the handle is out of credits" + "CVE-2024-26713": { + "cmt_msg": "powerpc/pseries/iommu: Fix iommu initialisation during DLPAR add" } } }, @@ -111575,6 +142081,10 @@ "CVE-2019-12818": { "cmt_msg": "net: nfc: Fix NULL dereference on nfc_llcp_build_tlv fails", "cmt_id": "58bdd544e2933a21a51eecf17c3f5f94038261b5" + }, + "CVE-2019-25160": { + "cmt_msg": "netlabel: fix out-of-bounds memory accesses", + "cmt_id": "5578de4834fe0f2a34fedc7374be691443396d1f" } }, "5.0-rc1": { @@ -111835,6 +142345,12 @@ "CVE-2019-15090": { "cmt_msg": "scsi: qedi: remove memset/memcpy to nfunc and use func instead" }, + "CVE-2021-47177": { + "cmt_msg": "iommu/vt-d: Fix sysfs leak in alloc_iommu()" + }, + "CVE-2024-26686": { + "cmt_msg": "fs/proc: do_task_stat: use sig->stats_lock to gather the threads/children stats" + }, "CVE-2022-3649": { "cmt_msg": "nilfs2: fix use-after-free bug of struct nilfs_root" }, @@ -111865,18 +142381,39 @@ "CVE-2021-3752": { "cmt_msg": "Bluetooth: fix use-after-free error in lock_sock_nested()" }, + "CVE-2024-26704": { + "cmt_msg": "ext4: fix double-free of blocks due to wrong extents moved_len" + }, "CVE-2019-3874": { "cmt_msg": "sctp: implement memory accounting on tx path" }, + "CVE-2022-42703": { + "cmt_msg": "mm/rmap: Fix anon_vma->degree ambiguity leading to double-reuse" + }, "CVE-2020-35508": { "cmt_msg": "fork: fix copy_process(CLONE_PARENT) race with the exiting ->real_parent" }, + "CVE-2023-52615": { + "cmt_msg": "hwrng: core - Fix page fault dead lock on mmap-ed hwrng" + }, + "CVE-2023-52614": { + "cmt_msg": "PM / devfreq: Fix buffer overflow in trans_stat_show" + }, + "CVE-2023-52617": { + "cmt_msg": "PCI: switchtec: Fix stdev_release() crash after surprise hot remove" + }, + "CVE-2023-52474": { + "cmt_msg": "IB/hfi1: Fix bugs with non-PAGE_SIZE-end multi-iovec user SDMA requests" + }, "CVE-2020-24587": { "cmt_msg": "mac80211: prevent mixed key and fragment cache attacks" }, "CVE-2020-24586": { "cmt_msg": "mac80211: prevent mixed key and fragment cache attacks" }, + "CVE-2023-52612": { + "cmt_msg": "crypto: scomp - fix req->dst buffer overflow" + }, "CVE-2022-3105": { "cmt_msg": "RDMA/uverbs: Check for null return of kmalloc_array" }, @@ -111889,6 +142426,9 @@ "CVE-2022-47520": { "cmt_msg": "wifi: wilc1000: validate pairwise and authentication suite offsets" }, + "CVE-2023-52618": { + "cmt_msg": "block/rnbd-srv: Check for unlikely string overflow" + }, "CVE-2023-5717": { "cmt_msg": "perf: Disallow mis-matched inherited group reads" }, @@ -111925,6 +142465,9 @@ "CVE-2021-28964": { "cmt_msg": "btrfs: fix race when cloning extent buffer during rewind of an old root" }, + "CVE-2021-47059": { + "cmt_msg": "crypto: sun8i-ss - fix result memory leak on error path" + }, "CVE-2022-23825": { "cmt_msg": "" }, @@ -111934,20 +142477,50 @@ "CVE-2020-35501": { "cmt_msg": "" }, - "CVE-2024-26588": { - "cmt_msg": "LoongArch: BPF: Prevent out-of-bounds memory access" + "CVE-2024-26625": { + "cmt_msg": "llc: call sock_orphan() at release time" + }, + "CVE-2021-47056": { + "cmt_msg": "crypto: qat - ADF_STATUS_PF_RUNNING should be set after adf_dev_init" + }, + "CVE-2021-47054": { + "cmt_msg": "bus: qcom: Put child node before return" + }, + "CVE-2021-47112": { + "cmt_msg": "x86/kvm: Teardown PV features on boot CPU as well" + }, + "CVE-2021-47113": { + "cmt_msg": "btrfs: abort in rename_exchange if we fail to insert the second ref" + }, + "CVE-2021-47110": { + "cmt_msg": "x86/kvm: Disable kvmclock on all CPUs on shutdown" + }, + "CVE-2021-47116": { + "cmt_msg": "ext4: fix memory leak in ext4_mb_init_backend on error path." + }, + "CVE-2021-47117": { + "cmt_msg": "ext4: fix bug on in ext4_es_cache_extent as ext4_split_extent_at failed" + }, + "CVE-2021-47114": { + "cmt_msg": "ocfs2: fix data corruption by fallocate" }, "CVE-2022-21125": { "cmt_msg": "x86/speculation/mmio: Reuse SRBDS mitigation for SBDS" }, + "CVE-2021-47118": { + "cmt_msg": "pid: take a reference when initializing `cad_pid`" + }, + "CVE-2021-46970": { + "cmt_msg": "bus: mhi: pci_generic: Remove WQ_MEM_RECLAIM flag from state workqueue" + }, "CVE-2019-19241": { "cmt_msg": "io_uring: async workers should inherit the user creds" }, "CVE-2022-40307": { "cmt_msg": "efi: capsule-loader: Fix use-after-free in efi_capsule_write" }, - "CVE-2022-21123": { - "cmt_msg": "x86/speculation/mmio: Add mitigation for Processor MMIO Stale Data" + "CVE-2021-46974": { + "cmt_msg": "bpf: Fix masking negation logic upon negative dst register" }, "CVE-2023-3390": { "cmt_msg": "netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE" @@ -111985,6 +142558,9 @@ "CVE-2023-0458": { "cmt_msg": "prlimit: do_prlimit needs to have a speculation check" }, + "CVE-2023-52565": { + "cmt_msg": "media: uvcvideo: Fix OOB read" + }, "CVE-2023-0597": { "cmt_msg": "x86/mm: Randomize per-cpu entry area" }, @@ -112009,9 +142585,6 @@ "CVE-2022-3628": { "cmt_msg": "wifi: brcmfmac: Fix potential buffer overflow in brcmf_fweh_event_worker()" }, - "CVE-2024-26591": { - "cmt_msg": "bpf: Fix re-attachment branch in bpf_tracing_prog_attach" - }, "CVE-2020-15802": { "cmt_msg": "" }, @@ -112042,9 +142615,21 @@ "CVE-2022-3202": { "cmt_msg": "jfs: prevent NULL deref in diFree" }, + "CVE-2024-25739": { + "cmt_msg": "" + }, + "CVE-2021-47028": { + "cmt_msg": "mt76: mt7915: fix txrate reporting" + }, "CVE-2024-26585": { "cmt_msg": "tls: fix race between tx work scheduling and socket close" }, + "CVE-2023-52511": { + "cmt_msg": "spi: sun6i: reduce DMA RX transfer width to single byte" + }, + "CVE-2021-47020": { + "cmt_msg": "soundwire: stream: fix memory leak in stream config error path" + }, "CVE-2024-26584": { "cmt_msg": "net: tls: handle backlogging of crypto requests" }, @@ -112057,6 +142642,15 @@ "CVE-2023-39189": { "cmt_msg": "netfilter: nfnetlink_osf: avoid OOB read" }, + "CVE-2021-46908": { + "cmt_msg": "bpf: Use correct permission flag for mixed signed bounds arithmetic" + }, + "CVE-2021-46909": { + "cmt_msg": "ARM: footbridge: fix PCI interrupt mapping" + }, + "CVE-2021-46906": { + "cmt_msg": "HID: usbhid: fix info leak in hid_submit_ctrl" + }, "CVE-2019-11479": { "cmt_msg": "tcp: add tcp_min_snd_mss sysctl" }, @@ -112111,9 +142705,21 @@ "CVE-2019-17054": { "cmt_msg": "appletalk: enforce CAP_NET_RAW for raw sockets" }, + "CVE-2024-26747": { + "cmt_msg": "usb: roles: fix NULL pointer issue when put module's reference" + }, + "CVE-2023-52527": { + "cmt_msg": "ipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data()" + }, + "CVE-2024-26745": { + "cmt_msg": "powerpc/pseries/iommu: IOMMU table is not initialized for kdump over SR-IOV" + }, "CVE-2023-51042": { "cmt_msg": "drm/amdgpu: Fix potential fence use-after-free v2" }, + "CVE-2024-26743": { + "cmt_msg": "RDMA/qedr: Fix qedr_create_user_qp error flow" + }, "CVE-2023-3006": { "cmt_msg": "arm64: Add AMPERE1 to the Spectre-BHB affected list" }, @@ -112132,6 +142738,9 @@ "CVE-2022-1734": { "cmt_msg": "nfc: nfcmrvl: main: reorder destructive operations in nfcmrvl_nci_unregister_dev to avoid bugs" }, + "CVE-2024-26748": { + "cmt_msg": "usb: cdns3: fix memory double free when handle zero packet" + }, "CVE-2023-28772": { "cmt_msg": "seq_buf: Fix overflow in seq_buf_putmem_hex()" }, @@ -112168,6 +142777,9 @@ "CVE-2019-19070": { "cmt_msg": "spi: gpio: prevent memory leak in spi_gpio_probe" }, + "CVE-2024-26699": { + "cmt_msg": "drm/amd/display: Fix array-index-out-of-bounds in dcn35_clkmgr" + }, "CVE-2023-42753": { "cmt_msg": "netfilter: ipset: add the missing IP_SET_HASH_WITH_NET0 macro for ip_set_hash_netportnet.c" }, @@ -112180,6 +142792,9 @@ "CVE-2022-20154": { "cmt_msg": "sctp: use call_rcu to free endpoint" }, + "CVE-2024-26691": { + "cmt_msg": "KVM: arm64: Fix circular locking dependency" + }, "CVE-2021-45868": { "cmt_msg": "quota: check block number when reading the block in quota file" }, @@ -112195,12 +142810,18 @@ "CVE-2024-0565": { "cmt_msg": "smb: client: fix OOB in receive_encrypted_standard()" }, + "CVE-2024-26697": { + "cmt_msg": "nilfs2: fix data corruption in dsync block recovery for small block sizes" + }, "CVE-2020-0404": { "cmt_msg": "media: uvcvideo: Avoid cyclic entity chains due to malformed USB descriptors" }, "CVE-2019-15925": { "cmt_msg": "net: hns3: add some error checking in hclge_tm module" }, + "CVE-2024-26633": { + "cmt_msg": "ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim()" + }, "CVE-2019-15538": { "cmt_msg": "xfs: fix missing ILOCK unlock when xfs_setattr_nonsize fails due to EDQUOT" }, @@ -112285,8 +142906,14 @@ "CVE-2020-27068": { "cmt_msg": "cfg80211: add missing policy for NL80211_ATTR_STATUS_CODE" }, - "CVE-2024-23307": { - "cmt_msg": "" + "CVE-2022-44032": { + "cmt_msg": "char: pcmcia: remove all the drivers" + }, + "CVE-2024-0646": { + "cmt_msg": "net: tls, update curr on splice as well" + }, + "CVE-2023-52598": { + "cmt_msg": "s390/ptrace: handle setting of fpc register correctly" }, "CVE-2020-8648": { "cmt_msg": "vt: selection, close sel_buffer race" @@ -112294,6 +142921,9 @@ "CVE-2022-32296": { "cmt_msg": "tcp: increase source port perturb table to 2^16" }, + "CVE-2024-26789": { + "cmt_msg": "crypto: arm64/neonbs - fix out-of-bounds access on short input" + }, "CVE-2020-28974": { "cmt_msg": "vt: Disable KD_FONT_OP_COPY" }, @@ -112324,6 +142954,9 @@ "CVE-2019-19082": { "cmt_msg": "drm/amd/display: prevent memory leak" }, + "CVE-2024-26655": { + "cmt_msg": "Fix memory leak in posix_clock_open()" + }, "CVE-2019-19080": { "cmt_msg": "nfp: flower: prevent memory leak in nfp_flower_spawn_phy_reprs" }, @@ -112348,6 +142981,9 @@ "CVE-2023-39198": { "cmt_msg": "drm/qxl: fix UAF on handle creation" }, + "CVE-2023-42752": { + "cmt_msg": "igmp: limit igmpv3_newpack() packet size to IP_MAX_MTU" + }, "CVE-2022-23816": { "cmt_msg": "x86/kvm/vmx: Make noinstr clean" }, @@ -112366,15 +143002,27 @@ "CVE-2023-39194": { "cmt_msg": "net: xfrm: Fix xfrm_address_filter OOB read" }, + "CVE-2023-2002": { + "cmt_msg": "bluetooth: Perform careful capability checks in hci_sock_ioctl()" + }, "CVE-2023-39197": { "cmt_msg": "netfilter: conntrack: dccp: copy entire header to stack buffer, not just basic one" }, + "CVE-2023-52489": { + "cmt_msg": "mm/sparsemem: fix race in accessing memory_section->usage" + }, "CVE-2019-10126": { "cmt_msg": "mwifiex: Fix heap overflow in mwifiex_uap_parse_tail_ies()" }, "CVE-2019-13631": { "cmt_msg": "Input: gtco - bounds check collection indent level" }, + "CVE-2023-52469": { + "cmt_msg": "drivers/amd/pm: fix a use-after-free in kv_parse_power_table" + }, + "CVE-2023-52584": { + "cmt_msg": "spmi: mediatek: Fix UAF on device remove" + }, "CVE-2020-13974": { "cmt_msg": "vt: keyboard: avoid signed integer overflow in k_ascii" }, @@ -112387,6 +143035,9 @@ "CVE-2022-36402": { "cmt_msg": "drm/vmwgfx: Fix shader stage validation" }, + "CVE-2023-52484": { + "cmt_msg": "iommu/arm-smmu-v3: Fix soft lockup triggered by arm_smmu_mm_invalidate_range" + }, "CVE-2022-29900": { "cmt_msg": "x86/kvm/vmx: Make noinstr clean" }, @@ -112402,6 +143053,9 @@ "CVE-2020-10751": { "cmt_msg": "selinux: properly handle multiple messages in selinux_netlink_send()" }, + "CVE-2022-3567": { + "cmt_msg": "ipv6: Fix data races around sk->sk_prot." + }, "CVE-2023-39192": { "cmt_msg": "netfilter: xt_u32: validate user space input" }, @@ -112426,9 +143080,15 @@ "CVE-2021-28660": { "cmt_msg": "staging: rtl8188eu: prevent ->ssid overflow in rtw_wx_set_scan()" }, + "CVE-2024-26736": { + "cmt_msg": "afs: Increase buffer size in afs_update_volume_status()" + }, "CVE-2020-8647": { "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region" }, + "CVE-2022-3564": { + "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free caused by l2cap_reassemble_sdu" + }, "CVE-2019-0155": { "cmt_msg": "drm/i915: Rename gen7 cmdparser tables" }, @@ -112438,11 +143098,23 @@ "CVE-2023-35827": { "cmt_msg": "ravb: Fix use-after-free issue in ravb_tx_timeout_work()" }, - "CVE-2022-2961": { - "cmt_msg": "" + "CVE-2023-52481": { + "cmt_msg": "arm64: errata: Add Cortex-A520 speculative unprivileged load workaround" }, - "CVE-2022-3567": { - "cmt_msg": "ipv6: Fix data races around sk->sk_prot." + "CVE-2023-52585": { + "cmt_msg": "drm/amdgpu: Fix possible NULL dereference in amdgpu_ras_query_error_status_helper()" + }, + "CVE-2021-47063": { + "cmt_msg": "drm: bridge/panel: Cleanup connector on bridge detach" + }, + "CVE-2023-52587": { + "cmt_msg": "IB/ipoib: Fix mcast list locking" + }, + "CVE-2023-52586": { + "cmt_msg": "drm/msm/dpu: Add mutex lock in control vblank irq" + }, + "CVE-2021-47149": { + "cmt_msg": "net: fujitsu: fix potential null-ptr-deref" }, "CVE-2022-3566": { "cmt_msg": "tcp: Fix data races around icsk->icsk_af_ops." @@ -112450,15 +143122,39 @@ "CVE-2022-3565": { "cmt_msg": "mISDN: fix use-after-free bugs in l1oip timer handlers" }, - "CVE-2022-3564": { - "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free caused by l2cap_reassemble_sdu" + "CVE-2021-47065": { + "cmt_msg": "rtw88: Fix array overrun in rtw_get_tx_power_params()" }, "CVE-2020-36386": { "cmt_msg": "Bluetooth: Fix slab-out-of-bounds read in hci_extended_inquiry_result_evt()" }, + "CVE-2021-47144": { + "cmt_msg": "drm/amd/amdgpu: fix refcount leak" + }, + "CVE-2021-47147": { + "cmt_msg": "ptp: ocp: Fix a resource leak in an error handling path" + }, "CVE-2020-36385": { "cmt_msg": "RDMA/ucma: Rework ucma_migrate_id() to avoid races with destroy" }, + "CVE-2023-52589": { + "cmt_msg": "media: rkisp1: Fix IRQ disable race issue" + }, + "CVE-2021-47140": { + "cmt_msg": "iommu/amd: Clear DMA ops when switching domain" + }, + "CVE-2021-47143": { + "cmt_msg": "net/smc: remove device from smcd_dev_list after failed device_add()" + }, + "CVE-2021-47142": { + "cmt_msg": "drm/amdgpu: Fix a use-after-free" + }, + "CVE-2021-47145": { + "cmt_msg": "btrfs: do not BUG_ON in link_to_fixup_dir" + }, + "CVE-2021-46941": { + "cmt_msg": "usb: dwc3: core: Do core softreset when switch mode" + }, "CVE-2020-0009": { "cmt_msg": "staging: android: ashmem: Disallow ashmem memory from being remapped" }, @@ -112471,12 +143167,21 @@ "CVE-2023-28466": { "cmt_msg": "net: tls: fix possible race condition between do_tls_getsockopt_conf() and do_tls_setsockopt_conf()" }, + "CVE-2023-52588": { + "cmt_msg": "f2fs: fix to tag gcing flag on page during block migration" + }, "CVE-2019-14615": { "cmt_msg": "drm/i915/gen9: Clear residual context state on context switch" }, "CVE-2022-2503": { "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag" }, + "CVE-2023-52578": { + "cmt_msg": "net: bridge: use DEV_STATS_INC()" + }, + "CVE-2021-47052": { + "cmt_msg": "crypto: sa2ul - Fix memory leak of rxd" + }, "CVE-2019-19048": { "cmt_msg": "virt: vbox: fix memory leak in hgcm_call_preprocess_linaddr" }, @@ -112516,18 +143221,36 @@ "CVE-2022-1419": { "cmt_msg": "drm/vgem: Close use-after-free race in vgem_gem_create" }, + "CVE-2021-47125": { + "cmt_msg": "sch_htb: fix refcount leak in htb_parent_to_leaf_offload" + }, + "CVE-2024-26797": { + "cmt_msg": "drm/amd/display: Prevent potential buffer overflow in map_hw_resources" + }, "CVE-2022-1836": { "cmt_msg": "floppy: disable FDRAWCMD by default" }, "CVE-2020-11884": { "cmt_msg": "s390/mm: fix page table upgrade vs 2ndary address mode accesses" }, + "CVE-2024-26793": { + "cmt_msg": "gtp: fix use-after-free and null-ptr-deref in gtp_newlink()" + }, + "CVE-2023-52530": { + "cmt_msg": "wifi: mac80211: fix potential key use-after-free" + }, "CVE-2021-32078": { "cmt_msg": "ARM: footbridge: remove personal server platform" }, + "CVE-2023-52532": { + "cmt_msg": "net: mana: Fix TX CQE error handling" + }, "CVE-2022-30594": { "cmt_msg": "ptrace: Check PTRACE_O_SUSPEND_SECCOMP permission on PTRACE_SEIZE" }, + "CVE-2024-26798": { + "cmt_msg": "fbcon: always restore the old font data in fbcon_do_set_font()" + }, "CVE-2022-4662": { "cmt_msg": "USB: core: Prevent nested device-reset calls" }, @@ -112558,6 +143281,9 @@ "CVE-2019-2213": { "cmt_msg": "binder: fix possible UAF when freeing buffer" }, + "CVE-2024-26677": { + "cmt_msg": "rxrpc: Fix delayed ACKs to not set the reference serial number" + }, "CVE-2020-25211": { "cmt_msg": "netfilter: ctnetlink: add a range check for l3/l4 protonum" }, @@ -112576,6 +143302,12 @@ "CVE-2020-26555": { "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical" }, + "CVE-2024-26776": { + "cmt_msg": "spi: hisi-sfc-v3xx: Return IRQ_NONE if no interrupts were detected" + }, + "CVE-2024-26777": { + "cmt_msg": "fbdev: sis: Error out if pixclock equals zero" + }, "CVE-2019-20794": { "cmt_msg": "" }, @@ -112585,24 +143317,36 @@ "CVE-2023-3397": { "cmt_msg": "" }, + "CVE-2021-47082": { + "cmt_msg": "tun: avoid double free in tun_free_netdev" + }, + "CVE-2024-26679": { + "cmt_msg": "inet: read sk->sk_family once in inet_recv_error()" + }, + "CVE-2023-52478": { + "cmt_msg": "HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect" + }, "CVE-2023-3117": { "cmt_msg": "netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE" }, + "CVE-2021-47128": { + "cmt_msg": "bpf, lockdown, audit: Fix buggy SELinux lockdown permission checks" + }, "CVE-2022-26365": { "cmt_msg": "xen/blkfront: fix leaking data in shared pages" }, "CVE-2023-52458": { "cmt_msg": "block: add check that partition length needs to be aligned with block size" }, - "CVE-2023-52457": { - "cmt_msg": "serial: 8250: omap: Don't skip resource freeing if pm_runtime_resume_and_get() failed" - }, "CVE-2018-1121": { "cmt_msg": "" }, "CVE-2023-52454": { "cmt_msg": "nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length" }, + "CVE-2023-28746": { + "cmt_msg": "x86/mmio: Disable KVM mitigation when X86_FEATURE_CLEAR_CPU_BUF is set" + }, "CVE-2023-52451": { "cmt_msg": "powerpc/pseries/memhp: Fix access beyond end of drmem array" }, @@ -112612,6 +143356,12 @@ "CVE-2019-19045": { "cmt_msg": "net/mlx5: prevent memory leak in mlx5_fpga_conn_create_cq" }, + "CVE-2022-2961": { + "cmt_msg": "" + }, + "CVE-2024-26602": { + "cmt_msg": "sched/membarrier: reduce the ability to hammer on sys_membarrier" + }, "CVE-2024-1086": { "cmt_msg": "netfilter: nf_tables: reject QUEUE/DROP verdict parameters" }, @@ -112642,12 +143392,18 @@ "CVE-2019-14816": { "cmt_msg": "mwifiex: Fix three heap overflow at parsing element in cfg80211_ap_settings" }, + "CVE-2024-26702": { + "cmt_msg": "iio: magnetometer: rm3100: add boundary check for the value read from RM3100_REG_TMRC" + }, "CVE-2019-14814": { "cmt_msg": "mwifiex: Fix three heap overflow at parsing element in cfg80211_ap_settings" }, "CVE-2019-14815": { "cmt_msg": "mwifiex: Fix three heap overflow at parsing element in cfg80211_ap_settings" }, + "CVE-2024-26706": { + "cmt_msg": "parisc: Fix random data corruption from exception handler" + }, "CVE-2023-6240": { "cmt_msg": "" }, @@ -112669,6 +143425,9 @@ "CVE-2023-32233": { "cmt_msg": "netfilter: nf_tables: deactivate anonymous set from preparation phase" }, + "CVE-2024-26685": { + "cmt_msg": "nilfs2: fix potential bug in end_buffer_async_write" + }, "CVE-2020-25672": { "cmt_msg": "nfc: fix memory leak in llcp_sock_connect()" }, @@ -112708,8 +143467,8 @@ "CVE-2023-1118": { "cmt_msg": "media: rc: Fix use-after-free bugs caused by ene_tx_irqsim()" }, - "CVE-2022-1016": { - "cmt_msg": "netfilter: nf_tables: initialize registers in nft_do_chain()" + "CVE-2021-47124": { + "cmt_msg": "io_uring: fix link timeout refs" }, "CVE-2022-1011": { "cmt_msg": "fuse: fix pipe buffer lifetime for direct_io" @@ -112723,15 +143482,30 @@ "CVE-2022-1012": { "cmt_msg": "secure_seq: use the 64 bits of the siphash for port offset calculation" }, + "CVE-2023-52620": { + "cmt_msg": "netfilter: nf_tables: disallow timeout for anonymous sets" + }, "CVE-2022-38096": { "cmt_msg": "" }, + "CVE-2023-52622": { + "cmt_msg": "ext4: avoid online resizing failures due to oversized flex bg" + }, "CVE-2020-8649": { "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region" }, + "CVE-2023-52619": { + "cmt_msg": "pstore/ram: Fix crash when setting number of cpus to an odd number" + }, "CVE-2023-3161": { "cmt_msg": "fbcon: Check font dimension limits" }, + "CVE-2023-52641": { + "cmt_msg": "fs/ntfs3: Add NULL ptr dereference checking at the end of attr_allocate_frame()" + }, + "CVE-2023-52628": { + "cmt_msg": "netfilter: nftables: exthdr: fix 4-byte stack OOB write" + }, "CVE-2021-26934": { "cmt_msg": "" }, @@ -112792,8 +143566,17 @@ "CVE-2021-3178": { "cmt_msg": "nfsd4: readdirplus shouldn't return parent of export" }, - "CVE-2022-42703": { - "cmt_msg": "mm/rmap: Fix anon_vma->degree ambiguity leading to double-reuse" + "CVE-2021-47101": { + "cmt_msg": "asix: fix uninit-value in asix_mdio_read()" + }, + "CVE-2021-47100": { + "cmt_msg": "ipmi: Fix UAF when uninstall ipmi_si and ipmi_msghandler module" + }, + "CVE-2021-46984": { + "cmt_msg": "kyber: fix out of bounds access when preempted" + }, + "CVE-2021-46982": { + "cmt_msg": "f2fs: compress: fix race condition of overwrite vs truncate" }, "CVE-2019-15031": { "cmt_msg": "powerpc/tm: Fix restoring FP/VMX facility incorrectly on interrupts" @@ -112801,6 +143584,9 @@ "CVE-2019-15030": { "cmt_msg": "powerpc/tm: Fix FP/VMX unavailable exceptions inside a transaction" }, + "CVE-2021-47109": { + "cmt_msg": "neighbour: allow NUD_NOARP entries to be forced GCed" + }, "CVE-2019-19252": { "cmt_msg": "vcs: prevent write access to vcsu devices" }, @@ -112810,12 +143596,21 @@ "CVE-2007-3719": { "cmt_msg": "" }, - "CVE-2023-3863": { - "cmt_msg": "net: nfc: Fix use-after-free caused by nfc_llcp_find_local" + "CVE-2021-46988": { + "cmt_msg": "userfaultfd: release page in error path to avoid BUG_ON" + }, + "CVE-2021-46989": { + "cmt_msg": "hfsplus: prevent corruption in shrinking truncate" + }, + "CVE-2024-26606": { + "cmt_msg": "binder: signal epoll threads of self-work" }, "CVE-2023-0590": { "cmt_msg": "net: sched: fix race condition in qdisc_graft()" }, + "CVE-2023-52583": { + "cmt_msg": "ceph: fix deadlock or deadcode of misusing dget()" + }, "CVE-2022-4095": { "cmt_msg": "staging: rtl8712: fix use after free bugs" }, @@ -112831,6 +143626,9 @@ "CVE-2023-30772": { "cmt_msg": "power: supply: da9150: Fix use after free bug in da9150_charger_remove due to race condition" }, + "CVE-2021-47119": { + "cmt_msg": "ext4: fix memory leak in ext4_fill_super" + }, "CVE-2022-24958": { "cmt_msg": "usb: gadget: don't release an existing dev->buf" }, @@ -112840,6 +143638,15 @@ "CVE-2021-3679": { "cmt_msg": "tracing: Fix bug in rb_per_cpu_empty() that might cause deadloop." }, + "CVE-2024-26656": { + "cmt_msg": "drm/amdgpu: fix use-after-free bug" + }, + "CVE-2024-26607": { + "cmt_msg": "drm/bridge: sii902x: Fix probing race issue" + }, + "CVE-2023-52517": { + "cmt_msg": "spi: sun6i: fix race between DMA RX transfer completion and RX FIFO drain" + }, "CVE-2022-2586": { "cmt_msg": "netfilter: nf_tables: do not allow SET_ID to refer to another table" }, @@ -112900,12 +143707,24 @@ "CVE-2023-1095": { "cmt_msg": "netfilter: nf_tables: fix null deref due to zeroed list head" }, + "CVE-2023-52574": { + "cmt_msg": "team: fix null-ptr-deref when team device type is changed" + }, + "CVE-2021-47034": { + "cmt_msg": "powerpc/64s: Fix pte update for kernel memory on radix" + }, "CVE-2022-3239": { "cmt_msg": "media: em28xx: initialize refcount before kref_get" }, "CVE-2022-4543": { "cmt_msg": "" }, + "CVE-2023-52571": { + "cmt_msg": "power: supply: rk817: Fix node refcount leak" + }, + "CVE-2023-52572": { + "cmt_msg": "cifs: Fix UAF in cifs_demultiplex_thread()" + }, "CVE-2023-4921": { "cmt_msg": "net: sched: sch_qfq: Fix UAF in qfq_dequeue()" }, @@ -112918,6 +143737,9 @@ "CVE-2023-1829": { "cmt_msg": "net/sched: Retire tcindex classifier" }, + "CVE-2021-46915": { + "cmt_msg": "netfilter: nft_limit: avoid possible divide error in nft_limit_init" + }, "CVE-2019-19227": { "cmt_msg": "appletalk: Fix potential NULL pointer dereference in unregister_snap_client" }, @@ -112933,14 +143755,17 @@ "CVE-2020-24394": { "cmt_msg": "nfsd: apply umask on fs without ACL support" }, + "CVE-2024-26769": { + "cmt_msg": "nvmet-fc: avoid deadlock on delete association path" + }, "CVE-2022-20148": { "cmt_msg": "f2fs: fix UAF in f2fs_available_free_memory" }, "CVE-2019-18813": { "cmt_msg": "usb: dwc3: pci: prevent memory leak in dwc3_pci_probe" }, - "CVE-2024-0607": { - "cmt_msg": "netfilter: nf_tables: fix pointer math issue in nft_byteorder_eval()" + "CVE-2022-1786": { + "cmt_msg": "io_uring: remove io_identity" }, "CVE-2013-7445": { "cmt_msg": "" @@ -112957,12 +143782,24 @@ "CVE-2019-13233": { "cmt_msg": "x86/insn-eval: Fix use-after-free access to LDT entry" }, + "CVE-2024-26735": { + "cmt_msg": "ipv6: sr: fix possible use-after-free and null-ptr-deref" + }, + "CVE-2024-26738": { + "cmt_msg": "powerpc/pseries/iommu: DLPAR add doesn't completely initialize pci_controller" + }, + "CVE-2024-26739": { + "cmt_msg": "net/sched: act_mirred: don't override retval if we already lost the skb" + }, "CVE-2021-3655": { "cmt_msg": "sctp: validate from_addr_param return" }, "CVE-2020-14386": { "cmt_msg": "net/packet: fix overflow in tpacket_rcv" }, + "CVE-2024-26804": { + "cmt_msg": "net: ip_tunnel: prevent perpetual headroom growth" + }, "CVE-2020-14385": { "cmt_msg": "xfs: fix boundary test in xfs_attr_shortform_verify" }, @@ -113005,12 +143842,18 @@ "CVE-2024-26595": { "cmt_msg": "mlxsw: spectrum_acl_tcam: Fix NULL pointer dereference in error path" }, + "CVE-2023-52506": { + "cmt_msg": "LoongArch: Set all reserved memblocks on Node#0 at initialization" + }, "CVE-2021-29154": { "cmt_msg": "bpf, x86: Validate computation of branch displacements for x86-64" }, "CVE-2023-6932": { "cmt_msg": "ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet" }, + "CVE-2024-26801": { + "cmt_msg": "Bluetooth: Avoid potential use-after-free in hci_error_reset" + }, "CVE-2020-16166": { "cmt_msg": "random32: update the net random state on interrupt and activity" }, @@ -113029,9 +143872,15 @@ "CVE-2011-4917": { "cmt_msg": "" }, + "CVE-2024-26803": { + "cmt_msg": "net: veth: clear GRO when clearing XDP even when down" + }, "CVE-2023-52444": { "cmt_msg": "f2fs: fix to avoid dirent corruption" }, + "CVE-2024-26768": { + "cmt_msg": "LoongArch: Change acpi_core_pic[NR_CPUS] to acpi_core_pic[MAX_CORE_PIC]" + }, "CVE-2020-12362": { "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" }, @@ -113044,9 +143893,27 @@ "CVE-2020-12364": { "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" }, + "CVE-2023-52607": { + "cmt_msg": "powerpc/mm: Fix null-pointer dereference in pgtable_cache_add" + }, + "CVE-2024-26646": { + "cmt_msg": "thermal: intel: hfi: Add syscore callbacks for system-wide PM" + }, + "CVE-2024-26647": { + "cmt_msg": "drm/amd/display: Fix late derefrence 'dsc' check in 'link_set_dsc_pps_packet()'" + }, + "CVE-2024-26644": { + "cmt_msg": "btrfs: don't abort filesystem when attempting to snapshot deleted subvolume" + }, + "CVE-2024-26645": { + "cmt_msg": "tracing: Ensure visibility when inserting an element into tracing_map" + }, "CVE-2023-33203": { "cmt_msg": "net: qcom/emac: Fix use after free bug in emac_remove due to race condition" }, + "CVE-2024-26640": { + "cmt_msg": "tcp: add sanity checks to rx zerocopy" + }, "CVE-2021-0605": { "cmt_msg": "af_key: pfkey_dump needs parameter validation" }, @@ -113059,6 +143926,9 @@ "CVE-2023-26545": { "cmt_msg": "net: mpls: fix stale pointer if allocation fails during device rename" }, + "CVE-2023-52519": { + "cmt_msg": "HID: intel-ish-hid: ipc: Disable and reenable ACPI GPE bit" + }, "CVE-2022-34918": { "cmt_msg": "netfilter: nf_tables: stricter validation of element data" }, @@ -113068,6 +143938,12 @@ "CVE-2021-3894": { "cmt_msg": "sctp: account stream padding length for reconf chunk" }, + "CVE-2024-26641": { + "cmt_msg": "ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv()" + }, + "CVE-2024-26791": { + "cmt_msg": "btrfs: dev-replace: properly validate device names" + }, "CVE-2019-18786": { "cmt_msg": "media: rcar_drif: fix a memory disclosure" }, @@ -113080,9 +143956,15 @@ "CVE-2019-20812": { "cmt_msg": "af_packet: set defaule value for tmo" }, + "CVE-2023-52600": { + "cmt_msg": "jfs: fix uaf in jfs_evict_inode" + }, "CVE-2020-14314": { "cmt_msg": "ext4: fix potential negative array index in do_split()" }, + "CVE-2023-52601": { + "cmt_msg": "jfs: fix array-index-out-of-bounds in dbAdjTree" + }, "CVE-2022-26373": { "cmt_msg": "x86/speculation: Add RSB VM Exit protections" }, @@ -113101,6 +143983,12 @@ "CVE-2024-23848": { "cmt_msg": "" }, + "CVE-2021-46904": { + "cmt_msg": "net: hso: fix null-ptr-deref during tty device unregistration" + }, + "CVE-2021-47159": { + "cmt_msg": "net: dsa: fix a crash if ->get_sset_count() fails" + }, "CVE-2022-0617": { "cmt_msg": "udf: Fix NULL ptr deref when converting from inline format" }, @@ -113108,11 +143996,23 @@ "cmt_msg": "net: vmxnet3: fix possible NULL pointer dereference in vmxnet3_rq_cleanup()" }, "CVE-2024-24861": { - "cmt_msg": "" + "cmt_msg": "media: xc4000: Fix atomicity violation in xc4000_get_frequency" + }, + "CVE-2024-26635": { + "cmt_msg": "llc: Drop support for ETH_P_TR_802_2." + }, + "CVE-2022-41218": { + "cmt_msg": "media: dvb-core: Fix UAF due to refcount races at releasing" + }, + "CVE-2023-52639": { + "cmt_msg": "KVM: s390: vsie: fix race during shadow creation" }, "CVE-2022-2153": { "cmt_msg": "KVM: x86: Avoid theoretical NULL pointer dereference in kvm_irq_delivery_to_apic_fast()" }, + "CVE-2024-2193": { + "cmt_msg": "" + }, "CVE-2022-20566": { "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free caused by l2cap_chan_put" }, @@ -113125,8 +144025,11 @@ "CVE-2024-23851": { "cmt_msg": "dm: limit the number of targets and parameter size area" }, + "CVE-2022-20424": { + "cmt_msg": "io_uring: remove io_identity" + }, "CVE-2024-23196": { - "cmt_msg": "" + "cmt_msg": "ALSA: hda: fix a possible null-pointer dereference due to data race in snd_hdac_regmap_sync()" }, "CVE-2020-12768": { "cmt_msg": "KVM: SVM: Fix potential memory leak in svm_cpu_init()" @@ -113134,6 +144037,12 @@ "CVE-2020-12769": { "cmt_msg": "spi: spi-dw: Add lock protect dw_spi rx/tx to prevent concurrent calls" }, + "CVE-2024-26765": { + "cmt_msg": "LoongArch: Disable IRQ before init_fn() for nonboot CPUs" + }, + "CVE-2023-52609": { + "cmt_msg": "binder: fix race between mmput() and do_exit()" + }, "CVE-2021-32399": { "cmt_msg": "bluetooth: eliminate the potential race condition when removing the HCI controller" }, @@ -113146,14 +144055,32 @@ "CVE-2019-12382": { "cmt_msg": "drm/edid: Fix a missing-check bug in drm_load_edid_firmware()" }, + "CVE-2023-52634": { + "cmt_msg": "drm/amd/display: Fix disable_otg_wa logic" + }, "CVE-2022-22942": { "cmt_msg": "drm/vmwgfx: Fix stale file descriptors on failed usercopy" }, "CVE-2021-3739": { "cmt_msg": "btrfs: fix NULL pointer dereference when deleting device by invalid id" }, - "CVE-2021-3732": { - "cmt_msg": "ovl: prevent private clone if bind mount is not allowed" + "CVE-2020-36782": { + "cmt_msg": "i2c: imx-lpi2c: fix reference leak when pm_runtime_get_sync fails" + }, + "CVE-2020-36783": { + "cmt_msg": "i2c: img-scb: fix reference leak when pm_runtime_get_sync fails" + }, + "CVE-2020-36780": { + "cmt_msg": "i2c: sprd: fix reference leak when pm_runtime_get_sync fails" + }, + "CVE-2020-36781": { + "cmt_msg": "i2c: imx: fix reference leak when pm_runtime_get_sync fails" + }, + "CVE-2020-36787": { + "cmt_msg": "media: aspeed: fix clock handling logic" + }, + "CVE-2020-36784": { + "cmt_msg": "i2c: cadence: fix reference leak when pm_runtime_get_sync fails" }, "CVE-2024-24860": { "cmt_msg": "Bluetooth: Fix atomicity violation in {min,max}_key_size_set" @@ -113164,9 +144091,15 @@ "CVE-2020-10767": { "cmt_msg": "x86/speculation: Avoid force-disabling IBPB based on STIBP and enhanced IBRS." }, + "CVE-2019-25162": { + "cmt_msg": "i2c: Fix a potential use after free" + }, "CVE-2018-12207": { "cmt_msg": "kvm: x86, powerpc: do not allow clearing largepages debugfs entry" }, + "CVE-2024-26627": { + "cmt_msg": "scsi: core: Move scsi_host_busy() out of host lock for waking up EH handler" + }, "CVE-2020-13143": { "cmt_msg": "USB: gadget: fix illegal array access in binding with UDC" }, @@ -113188,12 +144121,15 @@ "CVE-2019-17075": { "cmt_msg": "RDMA/cxgb4: Do not dma memory off of the stack" }, - "CVE-2023-3220": { - "cmt_msg": "drm/msm/dpu: Add check for pstates" + "CVE-2022-48626": { + "cmt_msg": "moxart: fix potential use-after-free on remove path" }, "CVE-2022-3903": { "cmt_msg": "media: mceusb: Use new usb_control_msg_*() routines" }, + "CVE-2024-26642": { + "cmt_msg": "netfilter: nf_tables: disallow anonymous set with timeout flag" + }, "CVE-2022-3577": { "cmt_msg": "HID: bigben: fix slab-out-of-bounds Write in bigben_probe" }, @@ -113209,27 +144145,87 @@ "CVE-2019-0145": { "cmt_msg": "i40e: add num_vectors checker in iwarp handler" }, + "CVE-2021-47071": { + "cmt_msg": "uio_hv_generic: Fix a memory leak in error handling paths" + }, + "CVE-2021-47070": { + "cmt_msg": "uio_hv_generic: Fix another memory leak in error handling paths" + }, + "CVE-2021-47073": { + "cmt_msg": "platform/x86: dell-smbios-wmi: Fix oops on rmmod dell_smbios" + }, "CVE-2022-44034": { "cmt_msg": "char: pcmcia: remove all the drivers" }, - "CVE-2022-44033": { - "cmt_msg": "char: pcmcia: remove all the drivers" + "CVE-2021-47075": { + "cmt_msg": "nvmet: fix memory leak in nvmet_alloc_ctrl()" }, "CVE-2019-11191": { "cmt_msg": "x86: Deprecate a.out support" }, + "CVE-2021-47077": { + "cmt_msg": "scsi: qedf: Add pointer checks in qedf_update_link_speed()" + }, + "CVE-2021-47076": { + "cmt_msg": "RDMA/rxe: Return CQE error if invalid lkey was supplied" + }, + "CVE-2021-47170": { + "cmt_msg": "USB: usbfs: Don't WARN about excessively large memory allocations" + }, + "CVE-2021-47078": { + "cmt_msg": "RDMA/rxe: Clear all QP fields if creation failed" + }, + "CVE-2021-47172": { + "cmt_msg": "iio: adc: ad7124: Fix potential overflow due to non sequential channel numbers" + }, + "CVE-2021-47173": { + "cmt_msg": "misc/uss720: fix memory leak in uss720_probe" + }, + "CVE-2022-36123": { + "cmt_msg": "x86: Clear .brk area at early boot" + }, + "CVE-2021-47175": { + "cmt_msg": "net/sched: fq_pie: fix OOB access in the traffic path" + }, "CVE-2020-10781": { "cmt_msg": "Revert \"zram: convert remaining CLASS_ATTR() to CLASS_ATTR_RO()\"" }, + "CVE-2021-46951": { + "cmt_msg": "tpm: efi: Use local variable for calculating final log size" + }, + "CVE-2021-46950": { + "cmt_msg": "md/raid1: properly indicate failure when ending a failed write request" + }, + "CVE-2021-46953": { + "cmt_msg": "ACPI: GTDT: Don't corrupt interrupt mappings on watchdow probe failure" + }, + "CVE-2021-46952": { + "cmt_msg": "NFS: fs_context: validate UDP retrans to prevent shift out-of-bounds" + }, + "CVE-2021-46955": { + "cmt_msg": "openvswitch: fix stack OOB read while fragmenting IPv4 packets" + }, + "CVE-2024-0607": { + "cmt_msg": "netfilter: nf_tables: fix pointer math issue in nft_byteorder_eval()" + }, + "CVE-2021-46959": { + "cmt_msg": "spi: Fix use-after-free with devm_spi_alloc_*" + }, "CVE-2020-26139": { "cmt_msg": "mac80211: do not accept/forward invalid EAPOL frames" }, + "CVE-2024-26772": { + "cmt_msg": "ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal()" + }, "CVE-2019-10220": { "cmt_msg": "Convert filldir[64]() from __put_user() to unsafe_put_user()" }, "CVE-2021-3609": { "cmt_msg": "can: bcm: delay release of struct bcm_op after synchronize_rcu()" }, + "CVE-2023-52595": { + "cmt_msg": "wifi: rt2x00: restart beacon queue when hardware reset" + }, "CVE-2019-19536": { "cmt_msg": "can: peak_usb: pcan_usb_pro: Fix info-leaks to USB devices" }, @@ -113260,6 +144256,9 @@ "CVE-2021-0929": { "cmt_msg": "staging/android/ion: delete dma_buf->kmap/unmap implemenation" }, + "CVE-2023-52590": { + "cmt_msg": "ocfs2: Avoid touching renamed directory if parent does not change" + }, "CVE-2019-20096": { "cmt_msg": "dccp: Fix memleak in __feat_register_sp" }, @@ -113269,9 +144268,6 @@ "CVE-2022-0168": { "cmt_msg": "cifs: fix NULL ptr dereference in smb2_ioctl_query_info()" }, - "CVE-2024-26587": { - "cmt_msg": "net: netdevsim: don't try to destroy PHC on VFs" - }, "CVE-2023-51043": { "cmt_msg": "drm/atomic: Fix potential use-after-free in nonblocking commits" }, @@ -113281,6 +144277,9 @@ "CVE-2023-0615": { "cmt_msg": "media: vivid: dev->bitmap_cap wasn't freed in all cases" }, + "CVE-2024-26672": { + "cmt_msg": "drm/amdgpu: Fix variable 'mca_funcs' dereferenced before NULL check in 'amdgpu_mca_smu_get_mca_entry()'" + }, "CVE-2019-14896": { "cmt_msg": "libertas: Fix two buffer overflows at parsing bss descriptor" }, @@ -113290,14 +144289,26 @@ "CVE-2019-14895": { "cmt_msg": "mwifiex: fix possible heap overflow in mwifiex_process_country_ie()" }, + "CVE-2024-26787": { + "cmt_msg": "mmc: mmci: stm32: fix DMA API overlapping mappings warning" + }, + "CVE-2023-52522": { + "cmt_msg": "net: fix possible store tearing in neigh_periodic_work()" + }, "CVE-2022-3586": { "cmt_msg": "sch_sfb: Don't assume the skb is still around after enqueueing to child" }, + "CVE-2024-26636": { + "cmt_msg": "llc: make llc_ui_sendmsg() more robust against bonding changes" + }, + "CVE-2024-26779": { + "cmt_msg": "wifi: mac80211: fix race condition on enabling fast-xmit" + }, "CVE-2024-26586": { "cmt_msg": "mlxsw: spectrum_acl_tcam: Fix stack corruption" }, - "CVE-2024-0646": { - "cmt_msg": "net: tls, update curr on splice as well" + "CVE-2023-52528": { + "cmt_msg": "net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg" }, "CVE-2020-27825": { "cmt_msg": "tracing: Fix race in trace_open and buffer resize call" @@ -113305,6 +144316,9 @@ "CVE-2019-2181": { "cmt_msg": "binder: check for overflow when alloc for security context" }, + "CVE-2022-20422": { + "cmt_msg": "arm64: fix oops in concurrently setting insn_emulation sysctls" + }, "CVE-2020-27820": { "cmt_msg": "drm/nouveau: use drm_dev_unplug() during device removal" }, @@ -113314,6 +144328,9 @@ "CVE-2020-0067": { "cmt_msg": "f2fs: fix to avoid memory leakage in f2fs_listxattr" }, + "CVE-2021-47151": { + "cmt_msg": "interconnect: qcom: bcm-voter: add a missing of_node_put()" + }, "CVE-2023-4622": { "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES" }, @@ -113332,6 +144349,9 @@ "CVE-2023-6610": { "cmt_msg": "smb: client: fix potential OOB in smb2_dump_detail()" }, + "CVE-2024-26600": { + "cmt_msg": "phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP" + }, "CVE-2023-0045": { "cmt_msg": "x86/bugs: Flush IBP in ib_prctl_set()" }, @@ -113347,30 +144367,51 @@ "CVE-2021-33061": { "cmt_msg": "ixgbe: add improvement for MDD response functionality" }, + "CVE-2024-26764": { + "cmt_msg": "fs/aio: Restrict kiocb_set_cancel_fn() to I/O submitted via libaio" + }, + "CVE-2024-26767": { + "cmt_msg": "drm/amd/display: fixed integer types and null check locations" + }, + "CVE-2024-26766": { + "cmt_msg": "IB/hfi1: Fix sdma.h tx->num_descs off-by-one error" + }, "CVE-2024-26589": { "cmt_msg": "bpf: Reject variable offset alu on PTR_TO_FLOW_KEYS" }, "CVE-2023-1476": { "cmt_msg": "" }, - "CVE-2023-4010": { - "cmt_msg": "" + "CVE-2021-47041": { + "cmt_msg": "nvmet-tcp: fix incorrect locking in state_change sk callback" }, "CVE-2023-1074": { "cmt_msg": "sctp: fail if no bound addresses can be used for a given scope" }, + "CVE-2023-3220": { + "cmt_msg": "drm/msm/dpu: Add check for pstates" + }, "CVE-2021-3864": { "cmt_msg": "" }, + "CVE-2024-26770": { + "cmt_msg": "HID: nvidia-shield: Add missing null pointer checks to LED initialization" + }, "CVE-2023-1075": { "cmt_msg": "net/tls: tls_is_tx_ready() checked list_entry" }, + "CVE-2024-23307": { + "cmt_msg": "md/raid5: fix atomicity violation in raid5_cache_count" + }, "CVE-2022-1652": { "cmt_msg": "floppy: use a statically allocated error counter" }, "CVE-2023-4623": { "cmt_msg": "net/sched: sch_hfsc: Ensure inner classes have fsc curve" }, + "CVE-2024-26771": { + "cmt_msg": "dmaengine: ti: edma: Add some null pointer checks to the edma_probe" + }, "CVE-2024-23849": { "cmt_msg": "net/rds: Fix UBSAN: array-index-out-of-bounds in rds_cmsg_recv" }, @@ -113422,6 +144463,9 @@ "CVE-2020-0423": { "cmt_msg": "binder: fix UAF when releasing todo list" }, + "CVE-2022-23222": { + "cmt_msg": "bpf: Replace PTR_TO_XXX_OR_NULL with PTR_TO_XXX | PTR_MAYBE_NULL" + }, "CVE-2022-1789": { "cmt_msg": "KVM: x86/mmu: fix NULL pointer dereference on guest INVPCID" }, @@ -113432,7 +144476,7 @@ "cmt_msg": "" }, "CVE-2023-6270": { - "cmt_msg": "" + "cmt_msg": "aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts" }, "CVE-2023-3090": { "cmt_msg": "ipvlan:Fix out-of-bounds caused by unclear skb->cb" @@ -113452,14 +144496,14 @@ "CVE-2023-1582": { "cmt_msg": "fs/proc: task_mmu.c: don't read mapcount for migration entry" }, - "CVE-2022-1786": { - "cmt_msg": "io_uring: remove io_identity" + "CVE-2021-47162": { + "cmt_msg": "tipc: skb_linearize the head skb when reassembling msgs" }, "CVE-2019-17351": { "cmt_msg": "xen: let alloc_xenballooned_pages() fail if not enough memory free" }, - "CVE-2022-23222": { - "cmt_msg": "bpf: Replace PTR_TO_XXX_OR_NULL with PTR_TO_XXX | PTR_MAYBE_NULL" + "CVE-2022-21166": { + "cmt_msg": "x86/speculation/mmio: Enable CPU Fill buffer clearing on idle" }, "CVE-2020-25669": { "cmt_msg": "Input: sunkbd - avoid use-after-free in teardown paths" @@ -113473,6 +144517,9 @@ "CVE-2020-25705": { "cmt_msg": "icmp: randomize the global rate limiter" }, + "CVE-2022-20421": { + "cmt_msg": "binder: fix UAF of ref->proc caused by race condition" + }, "CVE-2022-0435": { "cmt_msg": "tipc: improve size validations for received domain records" }, @@ -113483,20 +144530,38 @@ "cmt_msg": "can: kvaser_usb: kvaser_usb_leaf: Fix some info-leaks to USB devices" }, "CVE-2023-6356": { + "cmt_msg": "nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length" + }, + "CVE-2022-3533": { "cmt_msg": "" }, + "CVE-2024-26648": { + "cmt_msg": "drm/amd/display: Fix variable deferencing before NULL check in edp_setup_replay()" + }, "CVE-2021-4135": { "cmt_msg": "netdevsim: Zero-initialize memory for new map's value in function nsim_bpf_map_alloc" }, "CVE-2023-26607": { "cmt_msg": "ntfs: fix out-of-bounds read in ntfs_attr_find()" }, - "CVE-2023-52456": { - "cmt_msg": "serial: imx: fix tx statemachine deadlock" + "CVE-2023-52638": { + "cmt_msg": "can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock" }, "CVE-2019-15239": { "cmt_msg": "unknown" }, + "CVE-2023-52635": { + "cmt_msg": "PM / devfreq: Synchronize devfreq_monitor_[start/stop]" + }, + "CVE-2021-46938": { + "cmt_msg": "dm rq: fix double free of blk_mq_tag_set in dev remove after table load fails" + }, + "CVE-2023-52633": { + "cmt_msg": "um: time-travel: fix time corruption" + }, + "CVE-2023-52632": { + "cmt_msg": "drm/amdkfd: Fix lock dependency warning with srcu" + }, "CVE-2021-4037": { "cmt_msg": "xfs: fix up non-directory creation in SGID directories" }, @@ -113515,6 +144580,18 @@ "CVE-2023-20941": { "cmt_msg": "" }, + "CVE-2024-26773": { + "cmt_msg": "ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found()" + }, + "CVE-2023-2194": { + "cmt_msg": "i2c: xgene-slimpro: Fix out-of-bounds bug in xgene_slimpro_i2c_xfer()" + }, + "CVE-2022-21123": { + "cmt_msg": "x86/speculation/mmio: Add mitigation for Processor MMIO Stale Data" + }, + "CVE-2024-26740": { + "cmt_msg": "net/sched: act_mirred: use the backlog for mirred ingress" + }, "CVE-2021-3347": { "cmt_msg": "futex: Ensure the correct return value from futex_lock_pi()" }, @@ -113524,6 +144601,12 @@ "CVE-2020-25285": { "cmt_msg": "mm/hugetlb: fix a race between hugetlb sysctl handlers" }, + "CVE-2021-47169": { + "cmt_msg": "serial: rp2: use 'request_firmware' instead of 'request_firmware_nowait'" + }, + "CVE-2024-26784": { + "cmt_msg": "pmdomain: arm: Fix NULL dereference on scmi_perf_domain removal" + }, "CVE-2022-1966": { "cmt_msg": "netfilter: nf_tables: disallow non-stateful expression in sets earlier" }, @@ -113533,8 +144616,8 @@ "CVE-2021-44733": { "cmt_msg": "tee: handle lookup of shm with reference count 0" }, - "CVE-2022-3533": { - "cmt_msg": "" + "CVE-2021-47137": { + "cmt_msg": "net: lantiq: fix memory corruption in RX ring" }, "CVE-2022-3534": { "cmt_msg": "libbpf: Fix use-after-free in btf_dump_name_dups" @@ -113542,30 +144625,51 @@ "CVE-2022-3535": { "cmt_msg": "net: mvpp2: fix mvpp2 debugfs leak" }, + "CVE-2021-47135": { + "cmt_msg": "mt76: mt7921: fix possible AOOB issue in mt7921_mcu_tx_rate_report" + }, + "CVE-2021-47136": { + "cmt_msg": "net: zero-initialize tc skb extension on allocation" + }, "CVE-2020-36516": { "cmt_msg": "ipv4: avoid using shared IP generator for connected sockets" }, + "CVE-2024-26808": { + "cmt_msg": "netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain" + }, + "CVE-2021-47131": { + "cmt_msg": "net/tls: Fix use-after-free after the TLS device goes down and up" + }, "CVE-2020-36766": { "cmt_msg": "cec-api: prevent leaking memory through hole in structure" }, + "CVE-2021-47133": { + "cmt_msg": "HID: amd_sfh: Fix memory leak in amd_sfh_work" + }, "CVE-2022-2977": { "cmt_msg": "tpm: fix reference counting for struct tpm_chip" }, + "CVE-2024-26675": { + "cmt_msg": "ppp_async: limit MRU to 64K" + }, "CVE-2022-3061": { "cmt_msg": "video: fbdev: i740fb: Error out if 'pixclock' equals zero" }, - "CVE-2023-28328": { - "cmt_msg": "media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer()" + "CVE-2021-46991": { + "cmt_msg": "i40e: Fix use-after-free in i40e_client_subtask()" }, "CVE-2022-0322": { "cmt_msg": "sctp: account stream padding length for reconf chunk" }, - "CVE-2023-0386": { - "cmt_msg": "ovl: fail on invalid uid/gid mapping at copy up" + "CVE-2021-46992": { + "cmt_msg": "netfilter: nftables: avoid overflows in nft_hash_buckets()" }, "CVE-2023-6121": { "cmt_msg": "nvmet: nul-terminate the NQNs passed in the connect command" }, + "CVE-2021-46998": { + "cmt_msg": "ethernet:enic: Fix a use after free bug in enic_hard_start_xmit" + }, "CVE-2017-13693": { "cmt_msg": "" }, @@ -113599,8 +144703,20 @@ "CVE-2021-3760": { "cmt_msg": "nfc: nci: fix the UAF of rf_conn_info object" }, - "CVE-2022-36123": { - "cmt_msg": "x86: Clear .brk area at early boot" + "CVE-2022-48627": { + "cmt_msg": "vt: fix memory overlapping when deleting chars in the buffer" + }, + "CVE-2023-52593": { + "cmt_msg": "wifi: wfx: fix possible NULL pointer dereference in wfx_set_mfp_ap()" + }, + "CVE-2021-47180": { + "cmt_msg": "NFC: nci: fix memory leak in nci_allocate_device" + }, + "CVE-2022-48628": { + "cmt_msg": "ceph: drop messages from MDS when unmounting" + }, + "CVE-2022-48629": { + "cmt_msg": "crypto: qcom-rng - ensure buffer for generate is completely filled" }, "CVE-2020-11608": { "cmt_msg": "media: ov519: add missing endpoint sanity checks" @@ -113623,6 +144739,9 @@ "CVE-2024-24857": { "cmt_msg": "" }, + "CVE-2023-0386": { + "cmt_msg": "ovl: fail on invalid uid/gid mapping at copy up" + }, "CVE-2021-29264": { "cmt_msg": "gianfar: fix jumbo packets+napi+rx overrun crash" }, @@ -113635,6 +144754,12 @@ "CVE-2022-3545": { "cmt_msg": "nfp: fix use-after-free in area_cache_get()" }, + "CVE-2023-52569": { + "cmt_msg": "btrfs: remove BUG() after failure to insert delayed dir index item" + }, + "CVE-2023-52568": { + "cmt_msg": "x86/sgx: Resolves SECS reclaim vs. page fault for EAUG race" + }, "CVE-2020-14416": { "cmt_msg": "can, slip: Protect tty->disc_data in write_wakeup and close with RCU" }, @@ -113644,15 +144769,30 @@ "CVE-2022-3542": { "cmt_msg": "bnx2x: fix potential memory leak in bnx2x_tpa_stop()" }, + "CVE-2023-52563": { + "cmt_msg": "drm/meson: fix memory leak on ->hpd_notify callback" + }, + "CVE-2023-52561": { + "cmt_msg": "arm64: dts: qcom: sdm845-db845c: Mark cont splash memory region as reserved" + }, "CVE-2022-3344": { "cmt_msg": "KVM: x86: nSVM: harden svm_free_nested against freeing vmcb02 while still in use" }, + "CVE-2021-47004": { + "cmt_msg": "f2fs: fix to avoid touching checkpointed data in get_victim()" + }, + "CVE-2023-52566": { + "cmt_msg": "nilfs2: fix potential use after free in nilfs_gccache_submit_read_data()" + }, "CVE-2021-21781": { "cmt_msg": "ARM: ensure the signal page contains defined contents" }, "CVE-2021-0512": { "cmt_msg": "HID: make arrays usage and value to be the same" }, + "CVE-2021-46929": { + "cmt_msg": "sctp: use call_rcu to free endpoint" + }, "CVE-2023-1382": { "cmt_msg": "tipc: set con sock in tipc_conn_alloc" }, @@ -113662,6 +144802,15 @@ "CVE-2023-1380": { "cmt_msg": "wifi: brcmfmac: slab-out-of-bounds read in brcmf_get_assoc_ies()" }, + "CVE-2021-46924": { + "cmt_msg": "NFC: st21nfca: Fix memory leak in device probe and remove" + }, + "CVE-2021-46925": { + "cmt_msg": "net/smc: fix kernel panic caused by race of smc_sock" + }, + "CVE-2021-46926": { + "cmt_msg": "ALSA: hda: intel-sdw-acpi: harden detection of controller" + }, "CVE-2020-0347": { "cmt_msg": "" }, @@ -113671,6 +144820,9 @@ "CVE-2019-18808": { "cmt_msg": "crypto: ccp - Release all allocated memory if sha type is invalid" }, + "CVE-2023-52591": { + "cmt_msg": "reiserfs: Avoid touching renamed directory if parent does not change" + }, "CVE-2022-41222": { "cmt_msg": "mm/mremap: hold the rmap lock in write mode when moving page table entries." }, @@ -113701,6 +144853,9 @@ "CVE-2021-33656": { "cmt_msg": "vt: drop old FONT ioctls" }, + "CVE-2024-26713": { + "cmt_msg": "powerpc/pseries/iommu: Fix iommu initialisation during DLPAR add" + }, "CVE-2021-33655": { "cmt_msg": "fbcon: Disallow setting font bigger than screen size" }, @@ -113710,6 +144865,12 @@ "CVE-2022-41858": { "cmt_msg": "drivers: net: slip: fix NPD bug in sl_tx_timeout()" }, + "CVE-2024-26726": { + "cmt_msg": "btrfs: don't drop extent_map for free space inode on write error" + }, + "CVE-2024-26671": { + "cmt_msg": "blk-mq: fix IO hang from sbitmap wakeup race" + }, "CVE-2023-1206": { "cmt_msg": "tcp: Reduce chance of collisions in inet6_hashfn()." }, @@ -113761,14 +144922,20 @@ "CVE-2020-0466": { "cmt_msg": "do_epoll_ctl(): clean the failure exits up a bit" }, + "CVE-2023-52516": { + "cmt_msg": "dma-debug: don't call __dma_entry_alloc_check_leak() under free_entries_lock" + }, "CVE-2021-4218": { "cmt_msg": "sysctl: pass kernel pointers to ->proc_handler" }, + "CVE-2023-52515": { + "cmt_msg": "RDMA/srp: Do not call scsi_done() from srp_abort()" + }, "CVE-2020-0543": { "cmt_msg": "x86/cpu: Add 'table' argument to cpu_matches()" }, - "CVE-2024-25739": { - "cmt_msg": "" + "CVE-2023-52510": { + "cmt_msg": "ieee802154: ca8210: Fix a potential UAF in ca8210_probe" }, "CVE-2023-3358": { "cmt_msg": "HID: intel_ish-hid: Add check for ishtp_dma_tx_map" @@ -113780,7 +144947,7 @@ "cmt_msg": "vt_kdsetmode: extend console locking" }, "CVE-2023-6536": { - "cmt_msg": "" + "cmt_msg": "nvmet-tcp: fix a crash in nvmet_req_complete()" }, "CVE-2019-11135": { "cmt_msg": "x86/msr: Add the IA32_TSX_CTRL MSR" @@ -113806,18 +144973,33 @@ "CVE-2024-1151": { "cmt_msg": "net: openvswitch: limit the number of recursions from action sets" }, + "CVE-2024-26659": { + "cmt_msg": "xhci: handle isoc Babble and Buffer Overrun events properly" + }, + "CVE-2024-26658": { + "cmt_msg": "bcachefs: grab s_umount only if snapshotting" + }, "CVE-2010-5321": { "cmt_msg": "" }, "CVE-2021-20322": { "cmt_msg": "ipv6: make exception cache less predictible" }, + "CVE-2024-26654": { + "cmt_msg": "ALSA: sh: aica: reorder cleanup operations to avoid UAF bugs" + }, "CVE-2019-15219": { "cmt_msg": "USB: sisusbvga: fix oops in error path of sisusb_probe" }, "CVE-2021-20321": { "cmt_msg": "ovl: fix missing negative dentry check in ovl_rename()" }, + "CVE-2024-26651": { + "cmt_msg": "sr9800: Add check for usbnet_get_endpoints" + }, + "CVE-2024-26650": { + "cmt_msg": "platform/x86: p2sb: Allow p2sb_bar() calls during PCI device probe" + }, "CVE-2022-26490": { "cmt_msg": "nfc: st21nfca: Fix potential buffer overflows in EVT_TRANSACTION" }, @@ -113839,15 +145021,33 @@ "CVE-2022-1048": { "cmt_msg": "ALSA: pcm: Fix races among concurrent hw_params and hw_free calls" }, + "CVE-2024-26696": { + "cmt_msg": "nilfs2: fix hang in nilfs_lookup_dirty_data_buffers()" + }, + "CVE-2023-52475": { + "cmt_msg": "Input: powermate - fix use-after-free in powermate_config_complete" + }, "CVE-2021-0342": { "cmt_msg": "tun: correct header offsets in napi frags mode" }, + "CVE-2023-52477": { + "cmt_msg": "usb: hub: Guard against accesses to uninitialized BOS descriptors" + }, + "CVE-2023-52476": { + "cmt_msg": "perf/x86/lbr: Filter vsyscall addresses" + }, "CVE-2023-22995": { "cmt_msg": "usb: dwc3: dwc3-qcom: Add missing platform_device_put() in dwc3_qcom_acpi_register_core" }, + "CVE-2023-52470": { + "cmt_msg": "drm/radeon: check the alloc_workqueue return value in radeon_crtc_init()" + }, "CVE-2024-21803": { "cmt_msg": "" }, + "CVE-2023-52479": { + "cmt_msg": "ksmbd: fix uaf in smb20_oplock_break_ack" + }, "CVE-2023-2176": { "cmt_msg": "RDMA/core: Refactor rdma_bind_addr" }, @@ -113860,6 +145060,9 @@ "CVE-2020-12659": { "cmt_msg": "xsk: Add missing check on user supplied headroom size" }, + "CVE-2024-22099": { + "cmt_msg": "Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security" + }, "CVE-2023-30456": { "cmt_msg": "KVM: nVMX: add missing consistency checks for CR0 and CR4" }, @@ -113887,6 +145090,9 @@ "CVE-2018-12928": { "cmt_msg": "" }, + "CVE-2024-26700": { + "cmt_msg": "drm/amd/display: Fix MST Null Ptr for RV" + }, "CVE-2020-36311": { "cmt_msg": "KVM: SVM: Periodically schedule when unregistering regions on destroy" }, @@ -113917,6 +145123,12 @@ "CVE-2024-25741": { "cmt_msg": "" }, + "CVE-2024-26778": { + "cmt_msg": "fbdev: savage: Error out if pixclock equals zero" + }, + "CVE-2024-26809": { + "cmt_msg": "netfilter: nft_set_pipapo: release elements in clone only from destroy path" + }, "CVE-2022-26966": { "cmt_msg": "sr9700: sanity check for packet length" }, @@ -113926,15 +145138,39 @@ "CVE-2023-1989": { "cmt_msg": "Bluetooth: btsdio: fix use after free bug in btsdio_remove due to unfinished work" }, + "CVE-2024-26806": { + "cmt_msg": "spi: cadence-qspi: remove system-wide suspend helper calls from runtime PM hooks" + }, "CVE-2020-12771": { "cmt_msg": "bcache: fix potential deadlock problem in btree_gc_coalesce" }, "CVE-2020-12770": { "cmt_msg": "scsi: sg: add sg_remove_request in sg_write" }, + "CVE-2024-26802": { + "cmt_msg": "stmmac: Clear variable when destroying workqueue" + }, + "CVE-2023-52508": { + "cmt_msg": "nvme-fc: Prevent null pointer dereference in nvme_fc_io_getuuid()" + }, + "CVE-2023-52606": { + "cmt_msg": "powerpc/lib: Validate size for vector operations" + }, "CVE-2022-20369": { "cmt_msg": "media: v4l2-mem2mem: Apply DST_QUEUE_OFF_BASE on MMAP buffers across ioctls" }, + "CVE-2023-52604": { + "cmt_msg": "FS:JFS:UBSAN:array-index-out-of-bounds in dbAdjTree" + }, + "CVE-2023-52531": { + "cmt_msg": "wifi: iwlwifi: mvm: Fix a memory corruption issue" + }, + "CVE-2023-52602": { + "cmt_msg": "jfs: fix slab-out-of-bounds Read in dtSearch" + }, + "CVE-2023-52603": { + "cmt_msg": "UBSAN: array-index-out-of-bounds in dtSplitRoot" + }, "CVE-2022-25265": { "cmt_msg": "" }, @@ -113983,6 +145219,9 @@ "CVE-2022-2663": { "cmt_msg": "netfilter: nf_conntrack_irc: Fix forged IP logic" }, + "CVE-2021-47049": { + "cmt_msg": "Drivers: hv: vmbus: Use after free in __vmbus_open()" + }, "CVE-2022-43750": { "cmt_msg": "usb: mon: make mmapped memory read only" }, @@ -113992,36 +145231,75 @@ "CVE-2023-0047": { "cmt_msg": "mm, oom: do not trigger out_of_memory from the #PF" }, + "CVE-2021-47046": { + "cmt_msg": "drm/amd/display: Fix off by one in hdmi_14_process_transaction()" + }, "CVE-2020-29370": { "cmt_msg": "mm: slub: add missing TID bump in kmem_cache_alloc_bulk()" }, "CVE-2019-1125": { "cmt_msg": "x86/speculation: Prepare entry code for Spectre v1 swapgs mitigations" }, - "CVE-2022-38457": { - "cmt_msg": "drm/vmwgfx: Remove rcu locks from user resources" + "CVE-2021-3732": { + "cmt_msg": "ovl: prevent private clone if bind mount is not allowed" }, - "CVE-2022-20424": { - "cmt_msg": "io_uring: remove io_identity" + "CVE-2021-47167": { + "cmt_msg": "NFS: Fix an Oopsable condition in __nfs_pageio_add_request()" }, - "CVE-2022-20422": { - "cmt_msg": "arm64: fix oops in concurrently setting insn_emulation sysctls" + "CVE-2021-47166": { + "cmt_msg": "NFS: Don't corrupt the value of pg_bytes_written in nfs_do_recoalesce()" }, - "CVE-2022-20421": { - "cmt_msg": "binder: fix UAF of ref->proc caused by race condition" + "CVE-2021-47165": { + "cmt_msg": "drm/meson: fix shutdown crash when component not probed" + }, + "CVE-2021-47163": { + "cmt_msg": "tipc: wait and exit until all work queues are done" + }, + "CVE-2021-46969": { + "cmt_msg": "bus: mhi: core: Fix invalid error returning in mhi_queue" + }, + "CVE-2021-47161": { + "cmt_msg": "spi: spi-fsl-dspi: Fix a resource leak in an error handling path" + }, + "CVE-2021-47160": { + "cmt_msg": "net: dsa: mt7530: fix VLAN traffic leaks" }, "CVE-2023-4385": { "cmt_msg": "fs: jfs: fix possible NULL pointer dereference in dbFree()" }, + "CVE-2021-46965": { + "cmt_msg": "mtd: physmap: physmap-bt1-rom: Fix unintentional stack access" + }, "CVE-2023-4387": { "cmt_msg": "net: vmxnet3: fix possible use-after-free bugs in vmxnet3_rq_alloc_rx_buf()" }, + "CVE-2021-46960": { + "cmt_msg": "cifs: Return correct error code from smb2_get_enc_key" + }, + "CVE-2021-46962": { + "cmt_msg": "mmc: uniphier-sd: Fix a resource leak in the remove function" + }, + "CVE-2021-47168": { + "cmt_msg": "NFS: fix an incorrect limit in filelayout_decode_layout()" + }, "CVE-2019-19378": { "cmt_msg": "" }, + "CVE-2023-52482": { + "cmt_msg": "x86/srso: Add SRSO mitigation for Hygon processors" + }, + "CVE-2023-52599": { + "cmt_msg": "jfs: fix array-index-out-of-bounds in diNewExt" + }, + "CVE-2022-1016": { + "cmt_msg": "netfilter: nf_tables: initialize registers in nft_do_chain()" + }, "CVE-2020-4788": { "cmt_msg": "powerpc/64s: flush L1D on kernel entry" }, + "CVE-2024-26744": { + "cmt_msg": "RDMA/srpt: Support specifying the srpt_service_guid parameter" + }, "CVE-2022-36879": { "cmt_msg": "xfrm: xfrm_policy: fix a possible double xfrm_pols_put() in xfrm_bundle_lookup()" }, @@ -114082,6 +145360,9 @@ "CVE-2021-0937": { "cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write" }, + "CVE-2023-52621": { + "cmt_msg": "bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers" + }, "CVE-2022-1263": { "cmt_msg": "KVM: avoid NULL pointer dereference in kvm_dirty_ring_push" }, @@ -114100,6 +145381,9 @@ "CVE-2019-16746": { "cmt_msg": "nl80211: validate beacon head" }, + "CVE-2023-52623": { + "cmt_msg": "SUNRPC: Fix a suspicious RCU usage warning" + }, "CVE-2021-41864": { "cmt_msg": "bpf: Fix integer overflow in prealloc_elems_and_freelist()" }, @@ -114109,14 +145393,23 @@ "CVE-2022-2209": { "cmt_msg": "" }, + "CVE-2023-52624": { + "cmt_msg": "drm/amd/display: Wake DMCUB before executing GPINT commands" + }, "CVE-2022-45887": { "cmt_msg": "media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb()" }, "CVE-2021-37576": { "cmt_msg": "KVM: PPC: Book3S: Fix H_RTAS rets buffer overflow" }, + "CVE-2023-52625": { + "cmt_msg": "drm/amd/display: Refactor DMCUB enter/exit idle interface" + }, + "CVE-2024-26775": { + "cmt_msg": "aoe: avoid potential deadlock at set_capacity" + }, "CVE-2023-7042": { - "cmt_msg": "" + "cmt_msg": "wifi: ath10k: fix NULL pointer dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev()" }, "CVE-2022-3594": { "cmt_msg": "r8152: Rate limit overflow messages" @@ -114134,35 +145427,65 @@ "cmt_msg": "tipc: fix NULL deref in tipc_link_xmit()" }, "CVE-2023-47233": { - "cmt_msg": "" + "cmt_msg": "wifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach" }, "CVE-2020-27815": { "cmt_msg": "jfs: Fix array index bounds check in dbAdjTree" }, + "CVE-2023-52629": { + "cmt_msg": "sh: push-switch: Reorder cleanup operations to avoid use-after-free bug" + }, "CVE-2022-23041": { "cmt_msg": "xen/9p: use alloc/free_pages_exact()" }, "CVE-2022-1462": { "cmt_msg": "tty: use new tty_insert_flip_string_and_push_buffer() in pty_write()" }, + "CVE-2024-26758": { + "cmt_msg": "md: Don't ignore suspended array in md_check_recovery()" + }, + "CVE-2024-26759": { + "cmt_msg": "mm/swap: fix race when skipping swapcache" + }, "CVE-2022-3115": { "cmt_msg": "drm: mali-dp: potential dereference of null pointer" }, "CVE-2023-6606": { "cmt_msg": "smb: client: fix OOB in smbCalcSize()" }, + "CVE-2024-26614": { + "cmt_msg": "tcp: make sure init the accept_queue's spinlocks once" + }, "CVE-2020-27777": { "cmt_msg": "powerpc/rtas: Restrict RTAS requests from userspace" }, "CVE-2019-20636": { "cmt_msg": "Input: add safety guards to input_set_keycode()" }, + "CVE-2023-52559": { + "cmt_msg": "iommu/vt-d: Avoid memory allocation in iommu_suspend()" + }, + "CVE-2024-26751": { + "cmt_msg": "ARM: ep93xx: Add terminator to gpiod_lookup_table" + }, + "CVE-2024-26752": { + "cmt_msg": "l2tp: pass correct message length to ip6_append_data" + }, "CVE-2020-27673": { "cmt_msg": "xen/events: add a proper barrier to 2-level uevent unmasking" }, + "CVE-2024-26754": { + "cmt_msg": "gtp: fix use-after-free and null-ptr-deref in gtp_genl_dump_pdp()" + }, "CVE-2020-27675": { "cmt_msg": "xen/events: avoid removing an event channel while handling it" }, + "CVE-2024-26756": { + "cmt_msg": "md: Don't register sync_thread for reshape directly" + }, + "CVE-2024-26757": { + "cmt_msg": "md: Don't ignore read-only array in md_check_recovery()" + }, "CVE-2023-52439": { "cmt_msg": "uio: Fix use-after-free in uio_open" }, @@ -114181,6 +145504,9 @@ "CVE-2022-23040": { "cmt_msg": "xen/xenbus: don't let xenbus_grant_ring() remove grants in error case" }, + "CVE-2024-26805": { + "cmt_msg": "netlink: Fix kernel-infoleak-after-free in __skb_datagram_iter" + }, "CVE-2022-3111": { "cmt_msg": "power: supply: wm8350-power: Add missing free in free_charger_irq" }, @@ -114223,6 +145549,9 @@ "CVE-2020-0432": { "cmt_msg": "staging: most: net: fix buffer overflow" }, + "CVE-2024-26687": { + "cmt_msg": "xen/events: close evtchn after mapping cleanup" + }, "CVE-2023-51779": { "cmt_msg": "Bluetooth: af_bluetooth: Fix Use-After-Free in bt_sock_recvmsg" }, @@ -114238,6 +145567,9 @@ "CVE-2010-4563": { "cmt_msg": "" }, + "CVE-2021-47006": { + "cmt_msg": "ARM: 9064/1: hw_breakpoint: Do not directly check the event's overflow_handler hook" + }, "CVE-2023-1249": { "cmt_msg": "coredump: Use the vma snapshot in fill_files_note" }, @@ -114256,15 +145588,21 @@ "CVE-2023-0266": { "cmt_msg": "ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF" }, - "CVE-2023-1838": { - "cmt_msg": "Fix double fget() in vhost_net_set_backend()" + "CVE-2021-46928": { + "cmt_msg": "parisc: Clear stale IIR value on instruction access rights trap" }, "CVE-2021-3483": { "cmt_msg": "firewire: nosy: Fix a use-after-free bug in nosy_ioctl()" }, + "CVE-2024-26663": { + "cmt_msg": "tipc: Check the bearer type before calling tipc_udp_nl_bearer_add()" + }, "CVE-2021-20177": { "cmt_msg": "netfilter: add and use nf_hook_slow_list()" }, + "CVE-2024-26598": { + "cmt_msg": "KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache" + }, "CVE-2023-6040": { "cmt_msg": "netfilter: nf_tables: Reject tables of unsupported family" }, @@ -114283,12 +145621,18 @@ "CVE-2022-24448": { "cmt_msg": "NFSv4: Handle case where the lookup of a directory fails" }, - "CVE-2024-26598": { - "cmt_msg": "KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache" + "CVE-2023-52498": { + "cmt_msg": "PM: sleep: Fix possible deadlocks in core system-wide PM code" + }, + "CVE-2024-26774": { + "cmt_msg": "ext4: avoid dividing by 0 in mb_update_avg_fragment_size() when block bitmap corrupt" }, "CVE-2021-4023": { "cmt_msg": "io-wq: fix cancellation on create-worker failure" }, + "CVE-2023-52640": { + "cmt_msg": "fs/ntfs3: Fix oob in ntfs_listxattr" + }, "CVE-2023-3268": { "cmt_msg": "relayfs: fix out-of-bounds access in relay_file_read" }, @@ -114301,23 +145645,38 @@ "CVE-2021-0399": { "cmt_msg": "" }, + "CVE-2023-52488": { + "cmt_msg": "serial: sc16is7xx: convert from _raw_ to _noinc_ regmap functions for FIFO" + }, "CVE-2020-36691": { "cmt_msg": "netlink: limit recursion depth in policy validation" }, + "CVE-2021-47179": { + "cmt_msg": "NFSv4: Fix a NULL pointer dereference in pnfs_mark_matching_lsegs_return()" + }, "CVE-2023-42755": { "cmt_msg": "net/sched: Retire rsvp classifier" }, "CVE-2020-2732": { "cmt_msg": "KVM: nVMX: Don't emulate instructions in guest mode" }, + "CVE-2023-52486": { + "cmt_msg": "drm: Don't unref the same fb many times by mistake due to deadlock handling" + }, + "CVE-2023-52480": { + "cmt_msg": "ksmbd: fix race condition between session lookup and expire" + }, "CVE-2012-4542": { "cmt_msg": "" }, "CVE-2022-1729": { "cmt_msg": "perf: Fix sys_perf_event_open() race against self" }, - "CVE-2023-42752": { - "cmt_msg": "igmp: limit igmpv3_newpack() packet size to IP_MAX_MTU" + "CVE-2023-1838": { + "cmt_msg": "Fix double fget() in vhost_net_set_backend()" + }, + "CVE-2023-28328": { + "cmt_msg": "media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer()" }, "CVE-2023-4128": { "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free" @@ -114325,32 +145684,59 @@ "CVE-2021-3573": { "cmt_msg": "Bluetooth: use correct lock to prevent UAF of hdev object" }, + "CVE-2021-46921": { + "cmt_msg": "locking/qrwlock: Fix ordering in queued_write_lock_slowpath()" + }, "CVE-2023-3609": { "cmt_msg": "net/sched: cls_u32: Fix reference counter leak leading to overflow" }, + "CVE-2022-44033": { + "cmt_msg": "char: pcmcia: remove all the drivers" + }, "CVE-2022-1974": { "cmt_msg": "nfc: replace improper check device_is_registered() in netlink related functions" }, "CVE-2022-1975": { "cmt_msg": "NFC: netlink: fix sleep in atomic bug when firmware download timeout" }, - "CVE-2022-44032": { - "cmt_msg": "char: pcmcia: remove all the drivers" + "CVE-2023-52491": { + "cmt_msg": "media: mtk-jpeg: Fix use after free bug due to error path handling in mtk_jpeg_dec_device_run" + }, + "CVE-2021-47074": { + "cmt_msg": "nvme-loop: fix memory leak in nvme_loop_create_ctrl()" + }, + "CVE-2020-36777": { + "cmt_msg": "media: dvbdev: Fix memory leak in dvb_media_device_free()" }, "CVE-2021-28972": { "cmt_msg": "PCI: rpadlpar: Fix potential drc_name corruption in store functions" }, + "CVE-2020-36775": { + "cmt_msg": "f2fs: fix to avoid potential deadlock" + }, + "CVE-2021-47083": { + "cmt_msg": "pinctrl: mediatek: fix global-out-of-bounds issue" + }, "CVE-2021-20292": { "cmt_msg": "drm/ttm/nouveau: don't call tt destroy callback on alloc failure." }, "CVE-2021-31916": { "cmt_msg": "dm ioctl: fix out of bounds array access when no devices" }, + "CVE-2021-47086": { + "cmt_msg": "phonet/pep: refuse to enable an unbound pipe" + }, "CVE-2022-32981": { "cmt_msg": "powerpc/32: Fix overread/overwrite of thread_struct via ptrace" }, - "CVE-2023-2002": { - "cmt_msg": "bluetooth: Perform careful capability checks in hci_sock_ioctl()" + "CVE-2021-47122": { + "cmt_msg": "net: caif: fix memory leak in caif_device_notify" + }, + "CVE-2021-47121": { + "cmt_msg": "net: caif: fix memory leak in cfusbl_device_notify" + }, + "CVE-2021-47120": { + "cmt_msg": "HID: magicmouse: fix NULL-deref on disconnect" }, "CVE-2022-1280": { "cmt_msg": "drm: avoid circular locks in drm_mode_getconnector" @@ -114373,9 +145759,15 @@ "CVE-2023-0394": { "cmt_msg": "ipv6: raw: Deduct extension header length in rawv6_push_pending_frames" }, + "CVE-2021-47171": { + "cmt_msg": "net: usb: fix memory leak in smsc75xx_bind" + }, "CVE-2020-10690": { "cmt_msg": "ptp: fix the race between the release of ptp_clock and cdev" }, + "CVE-2024-26615": { + "cmt_msg": "net/smc: fix illegal rmb_desc access in SMC-D connection dump" + }, "CVE-2019-12817": { "cmt_msg": "powerpc/mm/64s/hash: Reallocate context ids on fork" }, @@ -114406,6 +145798,9 @@ "CVE-2020-3702": { "cmt_msg": "ath: Use safer key clearing with key cache entries" }, + "CVE-2023-52485": { + "cmt_msg": "drm/amd/display: Wake DMCUB before sending a command" + }, "CVE-2021-3653": { "cmt_msg": "KVM: nSVM: avoid picking up unsupported bits from L2 in int_ctl (CVE-2021-3653)" }, @@ -114433,6 +145828,9 @@ "CVE-2021-3714": { "cmt_msg": "" }, + "CVE-2021-46932": { + "cmt_msg": "Input: appletouch - initialize work before device registration" + }, "CVE-2019-16230": { "cmt_msg": "drm/amdkfd: fix a potential NULL pointer dereference (v2)" }, @@ -114493,26 +145891,56 @@ "CVE-2022-33744": { "cmt_msg": "xen/arm: Fix race in RB-tree based P2M accounting" }, + "CVE-2023-52596": { + "cmt_msg": "sysctl: Fix out of bounds access for empty sysctl registers" + }, + "CVE-2023-52597": { + "cmt_msg": "KVM: s390: fix setting of fpc register" + }, + "CVE-2023-52594": { + "cmt_msg": "wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus()" + }, "CVE-2022-40768": { "cmt_msg": "scsi: stex: Properly zero out the passthrough command structure" }, + "CVE-2021-47013": { + "cmt_msg": "net:emac/emac-mac: Fix a use after free in emac_mac_tx_buf_send" + }, "CVE-2022-3707": { "cmt_msg": "drm/i915/gvt: fix double free bug in split_2MB_gtt_entry" }, + "CVE-2021-47158": { + "cmt_msg": "net: dsa: sja1105: add error handling in sja1105_setup()" + }, + "CVE-2021-47010": { + "cmt_msg": "net: Only allow init netns to set default tcp cong to a restricted algo" + }, "CVE-2021-45486": { "cmt_msg": "inet: use bigger hash table for IP ID generation" }, "CVE-2020-12888": { "cmt_msg": "vfio-pci: Invalidate mmaps and block MMIO access on disabled memory" }, - "CVE-2023-2194": { - "cmt_msg": "i2c: xgene-slimpro: Fix out-of-bounds bug in xgene_slimpro_i2c_xfer()" + "CVE-2021-47153": { + "cmt_msg": "i2c: i801: Don't generate an interrupt on bus reset" + }, + "CVE-2021-47150": { + "cmt_msg": "net: fec: fix the potential memory leak in fec_enet_init()" }, "CVE-2021-3923": { "cmt_msg": "RDMA/core: Don't infoleak GRH fields" }, - "CVE-2022-41218": { - "cmt_msg": "media: dvb-core: Fix UAF due to refcount races at releasing" + "CVE-2021-46936": { + "cmt_msg": "net: fix use-after-free in tw_timer_handler" + }, + "CVE-2021-46935": { + "cmt_msg": "binder: fix async_free_space accounting for empty parcels" + }, + "CVE-2021-46934": { + "cmt_msg": "i2c: validate user data in compat ioctl" + }, + "CVE-2021-46933": { + "cmt_msg": "usb: gadget: f_fs: Clear ffs_eventfd in ffs_data_clear." }, "CVE-2019-20934": { "cmt_msg": "sched/fair: Don't free p->numa_faults with concurrent readers" @@ -114529,12 +145957,18 @@ "CVE-2021-0448": { "cmt_msg": "netfilter: ctnetlink: add a range check for l3/l4 protonum" }, - "CVE-2022-21166": { - "cmt_msg": "x86/speculation/mmio: Enable CPU Fill buffer clearing on idle" + "CVE-2021-47103": { + "cmt_msg": "inet: fully convert sk->sk_rx_dst to RCU rules" + }, + "CVE-2021-46939": { + "cmt_msg": "tracing: Restructure trace_clock_global() to never block" }, "CVE-2020-29374": { "cmt_msg": "gup: document and work around \"COW can break either way\" issue" }, + "CVE-2024-26622": { + "cmt_msg": "tomoyo: fix UAF write bug in tomoyo_write_control()" + }, "CVE-2023-52449": { "cmt_msg": "mtd: Fix gluebi NULL pointer dereference caused by ftl notifier" }, @@ -114544,6 +145978,9 @@ "CVE-2019-18806": { "cmt_msg": "net: qlogic: Fix memory leak in ql_alloc_large_buffers" }, + "CVE-2023-4010": { + "cmt_msg": "" + }, "CVE-2020-36558": { "cmt_msg": "vt: vt_ioctl: fix race in VT_RESIZEX" }, @@ -114556,6 +145993,9 @@ "CVE-2020-36312": { "cmt_msg": "KVM: fix memory leak in kvm_io_bus_unregister_dev()" }, + "CVE-2024-26720": { + "cmt_msg": "mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again" + }, "CVE-2022-1353": { "cmt_msg": "af_key: add __GFP_ZERO flag for compose_sadb_supported in function pfkey_register" }, @@ -114580,11 +146020,14 @@ "CVE-2021-39800": { "cmt_msg": "" }, + "CVE-2024-26676": { + "cmt_msg": "af_unix: Call kfree_skb() for dead unix_(sk)->oob_skb in GC." + }, "CVE-2022-1195": { "cmt_msg": "hamradio: improve the incomplete fix to avoid NPD" }, - "CVE-2024-22099": { - "cmt_msg": "" + "CVE-2023-3863": { + "cmt_msg": "net: nfc: Fix use-after-free caused by nfc_llcp_find_local" }, "CVE-2021-4202": { "cmt_msg": "NFC: reorganize the functions in nci_request" @@ -114598,15 +146041,33 @@ "CVE-2022-45886": { "cmt_msg": "media: dvb-core: Fix use-after-free due on race condition at dvb_net" }, + "CVE-2023-52509": { + "cmt_msg": "ravb: Fix use-after-free issue in ravb_tx_timeout_work()" + }, "CVE-2023-46343": { "cmt_msg": "nfc: nci: fix possible NULL pointer dereference in send_acknowledge()" }, "CVE-2024-25744": { "cmt_msg": "x86/coco: Disable 32-bit emulation by default on TDX and SEV" }, + "CVE-2023-52504": { + "cmt_msg": "x86/alternatives: Disable KASAN in apply_alternatives()" + }, + "CVE-2023-52507": { + "cmt_msg": "nfc: nci: assert requested protocol is valid" + }, "CVE-2023-2124": { "cmt_msg": "xfs: verify buffer contents when we skip log replay" }, + "CVE-2023-52501": { + "cmt_msg": "ring-buffer: Do not attempt to read past \"commit\"" + }, + "CVE-2023-52500": { + "cmt_msg": "scsi: pm80xx: Avoid leaking tags when processing OPC_INB_SET_CONTROLLER_CONFIG command" + }, + "CVE-2023-52502": { + "cmt_msg": "net: nfc: fix races in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn()" + }, "CVE-2023-1281": { "cmt_msg": "net/sched: tcindex: update imperfect hash filters respecting rcu" }, @@ -114631,9 +146092,21 @@ "CVE-2022-27672": { "cmt_msg": "x86/speculation: Identify processors vulnerable to SMT RSB predictions" }, + "CVE-2024-26623": { + "cmt_msg": "pds_core: Prevent race issues involving the adminq" + }, + "CVE-2024-26668": { + "cmt_msg": "netfilter: nft_limit: reject configurations that cause integer overflow" + }, "CVE-2022-2964": { "cmt_msg": "net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup" }, + "CVE-2021-47146": { + "cmt_msg": "mld: fix panic in mld_newpack()" + }, + "CVE-2022-38457": { + "cmt_msg": "drm/vmwgfx: Remove rcu locks from user resources" + }, "CVE-2015-2877": { "cmt_msg": "" }, @@ -114643,6 +146116,9 @@ "CVE-2023-26242": { "cmt_msg": "" }, + "CVE-2024-26664": { + "cmt_msg": "hwmon: (coretemp) Fix out-of-bounds memory access" + }, "CVE-2019-16089": { "cmt_msg": "" }, @@ -114652,12 +146128,18 @@ "CVE-2021-38199": { "cmt_msg": "NFSv4: Initialise connection to the server in nfs4_alloc_client()" }, + "CVE-2024-26689": { + "cmt_msg": "ceph: prevent use-after-free in encode_cap_msg()" + }, "CVE-2022-1679": { "cmt_msg": "ath9k: fix use-after-free in ath9k_hif_usb_rx_cb" }, "CVE-2023-34256": { "cmt_msg": "ext4: avoid a potential slab-out-of-bounds in ext4_group_desc_csum" }, + "CVE-2024-26763": { + "cmt_msg": "dm-crypt: don't modify the data when using authenticated encryption" + }, "CVE-2023-1513": { "cmt_msg": "kvm: initialize all of the kvm_debugregs structure before sending it to userspace" }, @@ -114709,9 +146191,18 @@ "CVE-2019-15807": { "cmt_msg": "scsi: libsas: delete sas port if expander discover failed" }, + "CVE-2024-26733": { + "cmt_msg": "arp: Prevent overflow in arp_req_get()." + }, + "CVE-2024-26719": { + "cmt_msg": "nouveau: offload fence uevents work to workqueue" + }, "CVE-2023-31083": { "cmt_msg": "Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO" }, + "CVE-2024-26715": { + "cmt_msg": "usb: dwc3: gadget: Fix NULL pointer dereference in dwc3_gadget_suspend" + }, "CVE-2024-1312": { "cmt_msg": "mm: lock_vma_under_rcu() must check vma->anon_vma under vma lock" }, @@ -114962,6 +146453,12 @@ "CVE-2020-35508": { "cmt_msg": "fork: fix copy_process(CLONE_PARENT) race with the exiting ->real_parent" }, + "CVE-2021-47177": { + "cmt_msg": "iommu/vt-d: Fix sysfs leak in alloc_iommu()" + }, + "CVE-2024-26686": { + "cmt_msg": "fs/proc: do_task_stat: use sig->stats_lock to gather the threads/children stats" + }, "CVE-2022-3649": { "cmt_msg": "nilfs2: fix use-after-free bug of struct nilfs_root" }, @@ -114992,15 +146489,33 @@ "CVE-2021-3752": { "cmt_msg": "Bluetooth: fix use-after-free error in lock_sock_nested()" }, + "CVE-2024-26704": { + "cmt_msg": "ext4: fix double-free of blocks due to wrong extents moved_len" + }, "CVE-2019-3874": { "cmt_msg": "sctp: implement memory accounting on tx path" }, + "CVE-2023-52615": { + "cmt_msg": "hwrng: core - Fix page fault dead lock on mmap-ed hwrng" + }, + "CVE-2023-52614": { + "cmt_msg": "PM / devfreq: Fix buffer overflow in trans_stat_show" + }, + "CVE-2023-52617": { + "cmt_msg": "PCI: switchtec: Fix stdev_release() crash after surprise hot remove" + }, + "CVE-2023-52474": { + "cmt_msg": "IB/hfi1: Fix bugs with non-PAGE_SIZE-end multi-iovec user SDMA requests" + }, "CVE-2020-24587": { "cmt_msg": "mac80211: prevent mixed key and fragment cache attacks" }, "CVE-2020-24586": { "cmt_msg": "mac80211: prevent mixed key and fragment cache attacks" }, + "CVE-2023-52612": { + "cmt_msg": "crypto: scomp - fix req->dst buffer overflow" + }, "CVE-2022-3105": { "cmt_msg": "RDMA/uverbs: Check for null return of kmalloc_array" }, @@ -115013,6 +146528,9 @@ "CVE-2022-47520": { "cmt_msg": "wifi: wilc1000: validate pairwise and authentication suite offsets" }, + "CVE-2023-52618": { + "cmt_msg": "block/rnbd-srv: Check for unlikely string overflow" + }, "CVE-2023-5717": { "cmt_msg": "perf: Disallow mis-matched inherited group reads" }, @@ -115046,6 +146564,9 @@ "CVE-2022-42703": { "cmt_msg": "mm/rmap: Fix anon_vma->degree ambiguity leading to double-reuse" }, + "CVE-2021-47059": { + "cmt_msg": "crypto: sun8i-ss - fix result memory leak on error path" + }, "CVE-2022-23825": { "cmt_msg": "" }, @@ -115055,23 +146576,53 @@ "CVE-2020-35501": { "cmt_msg": "" }, + "CVE-2024-26625": { + "cmt_msg": "llc: call sock_orphan() at release time" + }, "CVE-2023-42754": { "cmt_msg": "ipv4: fix null-deref in ipv4_link_failure" }, - "CVE-2024-26588": { - "cmt_msg": "LoongArch: BPF: Prevent out-of-bounds memory access" + "CVE-2021-47056": { + "cmt_msg": "crypto: qat - ADF_STATUS_PF_RUNNING should be set after adf_dev_init" + }, + "CVE-2021-47054": { + "cmt_msg": "bus: qcom: Put child node before return" + }, + "CVE-2021-47112": { + "cmt_msg": "x86/kvm: Teardown PV features on boot CPU as well" + }, + "CVE-2021-47113": { + "cmt_msg": "btrfs: abort in rename_exchange if we fail to insert the second ref" + }, + "CVE-2021-47110": { + "cmt_msg": "x86/kvm: Disable kvmclock on all CPUs on shutdown" + }, + "CVE-2021-47116": { + "cmt_msg": "ext4: fix memory leak in ext4_mb_init_backend on error path." + }, + "CVE-2021-47117": { + "cmt_msg": "ext4: fix bug on in ext4_es_cache_extent as ext4_split_extent_at failed" + }, + "CVE-2021-47114": { + "cmt_msg": "ocfs2: fix data corruption by fallocate" }, "CVE-2022-21125": { "cmt_msg": "x86/speculation/mmio: Reuse SRBDS mitigation for SBDS" }, + "CVE-2021-47118": { + "cmt_msg": "pid: take a reference when initializing `cad_pid`" + }, + "CVE-2021-46970": { + "cmt_msg": "bus: mhi: pci_generic: Remove WQ_MEM_RECLAIM flag from state workqueue" + }, "CVE-2019-19241": { "cmt_msg": "io_uring: async workers should inherit the user creds" }, "CVE-2022-40307": { "cmt_msg": "efi: capsule-loader: Fix use-after-free in efi_capsule_write" }, - "CVE-2022-21123": { - "cmt_msg": "x86/speculation/mmio: Add mitigation for Processor MMIO Stale Data" + "CVE-2021-46974": { + "cmt_msg": "bpf: Fix masking negation logic upon negative dst register" }, "CVE-2023-3390": { "cmt_msg": "netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE" @@ -115109,6 +146660,9 @@ "CVE-2023-0458": { "cmt_msg": "prlimit: do_prlimit needs to have a speculation check" }, + "CVE-2023-52565": { + "cmt_msg": "media: uvcvideo: Fix OOB read" + }, "CVE-2023-0597": { "cmt_msg": "x86/mm: Randomize per-cpu entry area" }, @@ -115136,8 +146690,8 @@ "CVE-2022-3628": { "cmt_msg": "wifi: brcmfmac: Fix potential buffer overflow in brcmf_fweh_event_worker()" }, - "CVE-2024-26591": { - "cmt_msg": "bpf: Fix re-attachment branch in bpf_tracing_prog_attach" + "CVE-2023-52515": { + "cmt_msg": "RDMA/srp: Do not call scsi_done() from srp_abort()" }, "CVE-2020-15802": { "cmt_msg": "" @@ -115169,12 +146723,24 @@ "CVE-2022-3202": { "cmt_msg": "jfs: prevent NULL deref in diFree" }, + "CVE-2024-25739": { + "cmt_msg": "" + }, + "CVE-2021-47028": { + "cmt_msg": "mt76: mt7915: fix txrate reporting" + }, "CVE-2022-2602": { "cmt_msg": "io_uring/af_unix: defer registered files gc to io_uring release" }, "CVE-2024-26585": { "cmt_msg": "tls: fix race between tx work scheduling and socket close" }, + "CVE-2023-52511": { + "cmt_msg": "spi: sun6i: reduce DMA RX transfer width to single byte" + }, + "CVE-2021-47020": { + "cmt_msg": "soundwire: stream: fix memory leak in stream config error path" + }, "CVE-2024-26584": { "cmt_msg": "net: tls: handle backlogging of crypto requests" }, @@ -115184,8 +146750,17 @@ "CVE-2023-39189": { "cmt_msg": "netfilter: nfnetlink_osf: avoid OOB read" }, - "CVE-2023-2002": { - "cmt_msg": "bluetooth: Perform careful capability checks in hci_sock_ioctl()" + "CVE-2021-46908": { + "cmt_msg": "bpf: Use correct permission flag for mixed signed bounds arithmetic" + }, + "CVE-2021-46909": { + "cmt_msg": "ARM: footbridge: fix PCI interrupt mapping" + }, + "CVE-2021-46906": { + "cmt_msg": "HID: usbhid: fix info leak in hid_submit_ctrl" + }, + "CVE-2021-46904": { + "cmt_msg": "net: hso: fix null-ptr-deref during tty device unregistration" }, "CVE-2022-1247": { "cmt_msg": "" @@ -115238,9 +146813,24 @@ "CVE-2019-17054": { "cmt_msg": "appletalk: enforce CAP_NET_RAW for raw sockets" }, + "CVE-2024-26747": { + "cmt_msg": "usb: roles: fix NULL pointer issue when put module's reference" + }, + "CVE-2023-52527": { + "cmt_msg": "ipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data()" + }, + "CVE-2024-26745": { + "cmt_msg": "powerpc/pseries/iommu: IOMMU table is not initialized for kdump over SR-IOV" + }, "CVE-2023-51042": { "cmt_msg": "drm/amdgpu: Fix potential fence use-after-free v2" }, + "CVE-2024-26743": { + "cmt_msg": "RDMA/qedr: Fix qedr_create_user_qp error flow" + }, + "CVE-2023-52566": { + "cmt_msg": "nilfs2: fix potential use after free in nilfs_gccache_submit_read_data()" + }, "CVE-2023-3006": { "cmt_msg": "arm64: Add AMPERE1 to the Spectre-BHB affected list" }, @@ -115301,6 +146891,9 @@ "CVE-2019-19070": { "cmt_msg": "spi: gpio: prevent memory leak in spi_gpio_probe" }, + "CVE-2024-26699": { + "cmt_msg": "drm/amd/display: Fix array-index-out-of-bounds in dcn35_clkmgr" + }, "CVE-2023-42753": { "cmt_msg": "netfilter: ipset: add the missing IP_SET_HASH_WITH_NET0 macro for ip_set_hash_netportnet.c" }, @@ -115313,6 +146906,9 @@ "CVE-2022-20154": { "cmt_msg": "sctp: use call_rcu to free endpoint" }, + "CVE-2024-26691": { + "cmt_msg": "KVM: arm64: Fix circular locking dependency" + }, "CVE-2021-45868": { "cmt_msg": "quota: check block number when reading the block in quota file" }, @@ -115328,9 +146924,15 @@ "CVE-2024-0565": { "cmt_msg": "smb: client: fix OOB in receive_encrypted_standard()" }, + "CVE-2024-26697": { + "cmt_msg": "nilfs2: fix data corruption in dsync block recovery for small block sizes" + }, "CVE-2020-0404": { "cmt_msg": "media: uvcvideo: Avoid cyclic entity chains due to malformed USB descriptors" }, + "CVE-2024-26633": { + "cmt_msg": "ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim()" + }, "CVE-2019-15538": { "cmt_msg": "xfs: fix missing ILOCK unlock when xfs_setattr_nonsize fails due to EDQUOT" }, @@ -115364,6 +146966,9 @@ "CVE-2020-25645": { "cmt_msg": "geneve: add transport ports in route lookup for geneve" }, + "CVE-2024-26788": { + "cmt_msg": "dmaengine: fsl-qdma: init irq after reg initialization" + }, "CVE-2020-25643": { "cmt_msg": "hdlc_ppp: add range checks in ppp_cp_parse_cr()" }, @@ -115373,6 +146978,9 @@ "CVE-2005-3660": { "cmt_msg": "" }, + "CVE-2023-52619": { + "cmt_msg": "pstore/ram: Fix crash when setting number of cpus to an odd number" + }, "CVE-2019-15211": { "cmt_msg": "media: radio-raremono: change devm_k*alloc to k*alloc" }, @@ -115403,8 +147011,11 @@ "CVE-2020-27068": { "cmt_msg": "cfg80211: add missing policy for NL80211_ATTR_STATUS_CODE" }, - "CVE-2024-23307": { - "cmt_msg": "" + "CVE-2024-0646": { + "cmt_msg": "net: tls, update curr on splice as well" + }, + "CVE-2023-52598": { + "cmt_msg": "s390/ptrace: handle setting of fpc register correctly" }, "CVE-2020-8648": { "cmt_msg": "vt: selection, close sel_buffer race" @@ -115412,6 +147023,9 @@ "CVE-2022-32296": { "cmt_msg": "tcp: increase source port perturb table to 2^16" }, + "CVE-2024-26789": { + "cmt_msg": "crypto: arm64/neonbs - fix out-of-bounds access on short input" + }, "CVE-2020-28974": { "cmt_msg": "vt: Disable KD_FONT_OP_COPY" }, @@ -115442,6 +147056,9 @@ "CVE-2019-19082": { "cmt_msg": "drm/amd/display: prevent memory leak" }, + "CVE-2024-26655": { + "cmt_msg": "Fix memory leak in posix_clock_open()" + }, "CVE-2019-19080": { "cmt_msg": "nfp: flower: prevent memory leak in nfp_flower_spawn_phy_reprs" }, @@ -115469,6 +147086,9 @@ "CVE-2022-0185": { "cmt_msg": "vfs: fs_context: fix up param length parsing in legacy_parse_param" }, + "CVE-2023-42752": { + "cmt_msg": "igmp: limit igmpv3_newpack() packet size to IP_MAX_MTU" + }, "CVE-2022-23816": { "cmt_msg": "x86/kvm/vmx: Make noinstr clean" }, @@ -115487,12 +147107,21 @@ "CVE-2023-39194": { "cmt_msg": "net: xfrm: Fix xfrm_address_filter OOB read" }, + "CVE-2023-2002": { + "cmt_msg": "bluetooth: Perform careful capability checks in hci_sock_ioctl()" + }, "CVE-2023-39197": { "cmt_msg": "netfilter: conntrack: dccp: copy entire header to stack buffer, not just basic one" }, + "CVE-2023-52489": { + "cmt_msg": "mm/sparsemem: fix race in accessing memory_section->usage" + }, "CVE-2021-28964": { "cmt_msg": "btrfs: fix race when cloning extent buffer during rewind of an old root" }, + "CVE-2023-52584": { + "cmt_msg": "spmi: mediatek: Fix UAF on device remove" + }, "CVE-2020-13974": { "cmt_msg": "vt: keyboard: avoid signed integer overflow in k_ascii" }, @@ -115505,6 +147134,9 @@ "CVE-2022-36402": { "cmt_msg": "drm/vmwgfx: Fix shader stage validation" }, + "CVE-2023-52484": { + "cmt_msg": "iommu/arm-smmu-v3: Fix soft lockup triggered by arm_smmu_mm_invalidate_range" + }, "CVE-2022-29900": { "cmt_msg": "x86/kvm/vmx: Make noinstr clean" }, @@ -115514,12 +147146,15 @@ "CVE-2021-4197": { "cmt_msg": "cgroup: Use open-time credentials for process migraton perm checks" }, - "CVE-2020-2732": { - "cmt_msg": "KVM: nVMX: Don't emulate instructions in guest mode" + "CVE-2020-36516": { + "cmt_msg": "ipv4: avoid using shared IP generator for connected sockets" }, "CVE-2020-10751": { "cmt_msg": "selinux: properly handle multiple messages in selinux_netlink_send()" }, + "CVE-2022-3567": { + "cmt_msg": "ipv6: Fix data races around sk->sk_prot." + }, "CVE-2023-39192": { "cmt_msg": "netfilter: xt_u32: validate user space input" }, @@ -115544,9 +147179,15 @@ "CVE-2021-28660": { "cmt_msg": "staging: rtl8188eu: prevent ->ssid overflow in rtw_wx_set_scan()" }, + "CVE-2024-26645": { + "cmt_msg": "tracing: Ensure visibility when inserting an element into tracing_map" + }, "CVE-2020-8647": { "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region" }, + "CVE-2022-3564": { + "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free caused by l2cap_reassemble_sdu" + }, "CVE-2019-0155": { "cmt_msg": "drm/i915: Rename gen7 cmdparser tables" }, @@ -115556,11 +147197,23 @@ "CVE-2023-35827": { "cmt_msg": "ravb: Fix use-after-free issue in ravb_tx_timeout_work()" }, - "CVE-2022-4269": { - "cmt_msg": "act_mirred: use the backlog for nested calls to mirred ingress" + "CVE-2023-52481": { + "cmt_msg": "arm64: errata: Add Cortex-A520 speculative unprivileged load workaround" }, - "CVE-2022-3567": { - "cmt_msg": "ipv6: Fix data races around sk->sk_prot." + "CVE-2023-52585": { + "cmt_msg": "drm/amdgpu: Fix possible NULL dereference in amdgpu_ras_query_error_status_helper()" + }, + "CVE-2021-47063": { + "cmt_msg": "drm: bridge/panel: Cleanup connector on bridge detach" + }, + "CVE-2023-52587": { + "cmt_msg": "IB/ipoib: Fix mcast list locking" + }, + "CVE-2023-52586": { + "cmt_msg": "drm/msm/dpu: Add mutex lock in control vblank irq" + }, + "CVE-2021-47149": { + "cmt_msg": "net: fujitsu: fix potential null-ptr-deref" }, "CVE-2022-3566": { "cmt_msg": "tcp: Fix data races around icsk->icsk_af_ops." @@ -115568,15 +147221,39 @@ "CVE-2022-3565": { "cmt_msg": "mISDN: fix use-after-free bugs in l1oip timer handlers" }, - "CVE-2022-3564": { - "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free caused by l2cap_reassemble_sdu" + "CVE-2021-47065": { + "cmt_msg": "rtw88: Fix array overrun in rtw_get_tx_power_params()" }, "CVE-2020-36386": { "cmt_msg": "Bluetooth: Fix slab-out-of-bounds read in hci_extended_inquiry_result_evt()" }, + "CVE-2021-47144": { + "cmt_msg": "drm/amd/amdgpu: fix refcount leak" + }, + "CVE-2021-47147": { + "cmt_msg": "ptp: ocp: Fix a resource leak in an error handling path" + }, "CVE-2020-36385": { "cmt_msg": "RDMA/ucma: Rework ucma_migrate_id() to avoid races with destroy" }, + "CVE-2023-52589": { + "cmt_msg": "media: rkisp1: Fix IRQ disable race issue" + }, + "CVE-2021-47140": { + "cmt_msg": "iommu/amd: Clear DMA ops when switching domain" + }, + "CVE-2021-47143": { + "cmt_msg": "net/smc: remove device from smcd_dev_list after failed device_add()" + }, + "CVE-2021-47142": { + "cmt_msg": "drm/amdgpu: Fix a use-after-free" + }, + "CVE-2021-47145": { + "cmt_msg": "btrfs: do not BUG_ON in link_to_fixup_dir" + }, + "CVE-2021-46941": { + "cmt_msg": "usb: dwc3: core: Do core softreset when switch mode" + }, "CVE-2020-0009": { "cmt_msg": "staging: android: ashmem: Disallow ashmem memory from being remapped" }, @@ -115589,12 +147266,21 @@ "CVE-2023-28466": { "cmt_msg": "net: tls: fix possible race condition between do_tls_getsockopt_conf() and do_tls_setsockopt_conf()" }, + "CVE-2023-52588": { + "cmt_msg": "f2fs: fix to tag gcing flag on page during block migration" + }, "CVE-2019-14615": { "cmt_msg": "drm/i915/gen9: Clear residual context state on context switch" }, "CVE-2022-2503": { "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag" }, + "CVE-2023-52578": { + "cmt_msg": "net: bridge: use DEV_STATS_INC()" + }, + "CVE-2021-47052": { + "cmt_msg": "crypto: sa2ul - Fix memory leak of rxd" + }, "CVE-2021-3635": { "cmt_msg": "netfilter: nf_tables: fix flowtable list del corruption" }, @@ -115634,21 +147320,45 @@ "CVE-2020-0444": { "cmt_msg": "audit: fix error handling in audit_data_to_entry()" }, + "CVE-2024-23849": { + "cmt_msg": "net/rds: Fix UBSAN: array-index-out-of-bounds in rds_cmsg_recv" + }, "CVE-2022-1419": { "cmt_msg": "drm/vgem: Close use-after-free race in vgem_gem_create" }, + "CVE-2021-47125": { + "cmt_msg": "sch_htb: fix refcount leak in htb_parent_to_leaf_offload" + }, + "CVE-2024-26797": { + "cmt_msg": "drm/amd/display: Prevent potential buffer overflow in map_hw_resources" + }, + "CVE-2024-26790": { + "cmt_msg": "dmaengine: fsl-qdma: fix SoC may hang on 16 byte unaligned read" + }, "CVE-2022-1836": { "cmt_msg": "floppy: disable FDRAWCMD by default" }, "CVE-2020-11884": { "cmt_msg": "s390/mm: fix page table upgrade vs 2ndary address mode accesses" }, + "CVE-2024-26793": { + "cmt_msg": "gtp: fix use-after-free and null-ptr-deref in gtp_newlink()" + }, + "CVE-2023-52530": { + "cmt_msg": "wifi: mac80211: fix potential key use-after-free" + }, "CVE-2021-32078": { "cmt_msg": "ARM: footbridge: remove personal server platform" }, + "CVE-2023-52532": { + "cmt_msg": "net: mana: Fix TX CQE error handling" + }, "CVE-2022-30594": { "cmt_msg": "ptrace: Check PTRACE_O_SUSPEND_SECCOMP permission on PTRACE_SEIZE" }, + "CVE-2024-26798": { + "cmt_msg": "fbcon: always restore the old font data in fbcon_do_set_font()" + }, "CVE-2022-4662": { "cmt_msg": "USB: core: Prevent nested device-reset calls" }, @@ -115679,6 +147389,9 @@ "CVE-2021-38208": { "cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect" }, + "CVE-2024-26677": { + "cmt_msg": "rxrpc: Fix delayed ACKs to not set the reference serial number" + }, "CVE-2020-25211": { "cmt_msg": "netfilter: ctnetlink: add a range check for l3/l4 protonum" }, @@ -115697,6 +147410,12 @@ "CVE-2020-26555": { "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical" }, + "CVE-2024-26776": { + "cmt_msg": "spi: hisi-sfc-v3xx: Return IRQ_NONE if no interrupts were detected" + }, + "CVE-2024-26777": { + "cmt_msg": "fbdev: sis: Error out if pixclock equals zero" + }, "CVE-2019-20794": { "cmt_msg": "" }, @@ -115706,24 +147425,36 @@ "CVE-2023-3397": { "cmt_msg": "" }, + "CVE-2021-47082": { + "cmt_msg": "tun: avoid double free in tun_free_netdev" + }, + "CVE-2024-26679": { + "cmt_msg": "inet: read sk->sk_family once in inet_recv_error()" + }, + "CVE-2023-52478": { + "cmt_msg": "HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect" + }, "CVE-2023-3117": { "cmt_msg": "netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE" }, + "CVE-2021-47128": { + "cmt_msg": "bpf, lockdown, audit: Fix buggy SELinux lockdown permission checks" + }, "CVE-2022-26365": { "cmt_msg": "xen/blkfront: fix leaking data in shared pages" }, "CVE-2023-52458": { "cmt_msg": "block: add check that partition length needs to be aligned with block size" }, - "CVE-2023-52457": { - "cmt_msg": "serial: 8250: omap: Don't skip resource freeing if pm_runtime_resume_and_get() failed" - }, "CVE-2018-1121": { "cmt_msg": "" }, "CVE-2023-52454": { "cmt_msg": "nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length" }, + "CVE-2023-28746": { + "cmt_msg": "x86/mmio: Disable KVM mitigation when X86_FEATURE_CLEAR_CPU_BUF is set" + }, "CVE-2023-52451": { "cmt_msg": "powerpc/pseries/memhp: Fix access beyond end of drmem array" }, @@ -115733,6 +147464,9 @@ "CVE-2019-19045": { "cmt_msg": "net/mlx5: prevent memory leak in mlx5_fpga_conn_create_cq" }, + "CVE-2024-26602": { + "cmt_msg": "sched/membarrier: reduce the ability to hammer on sys_membarrier" + }, "CVE-2024-1086": { "cmt_msg": "netfilter: nf_tables: reject QUEUE/DROP verdict parameters" }, @@ -115763,12 +147497,18 @@ "CVE-2019-14816": { "cmt_msg": "mwifiex: Fix three heap overflow at parsing element in cfg80211_ap_settings" }, + "CVE-2024-26702": { + "cmt_msg": "iio: magnetometer: rm3100: add boundary check for the value read from RM3100_REG_TMRC" + }, "CVE-2019-14814": { "cmt_msg": "mwifiex: Fix three heap overflow at parsing element in cfg80211_ap_settings" }, "CVE-2019-14815": { "cmt_msg": "mwifiex: Fix three heap overflow at parsing element in cfg80211_ap_settings" }, + "CVE-2024-26706": { + "cmt_msg": "parisc: Fix random data corruption from exception handler" + }, "CVE-2023-23559": { "cmt_msg": "wifi: rndis_wlan: Prevent buffer overflow in rndis_query_oid" }, @@ -115784,6 +147524,9 @@ "CVE-2023-32233": { "cmt_msg": "netfilter: nf_tables: deactivate anonymous set from preparation phase" }, + "CVE-2024-26685": { + "cmt_msg": "nilfs2: fix potential bug in end_buffer_async_write" + }, "CVE-2020-25672": { "cmt_msg": "nfc: fix memory leak in llcp_sock_connect()" }, @@ -115823,8 +147566,8 @@ "CVE-2023-1118": { "cmt_msg": "media: rc: Fix use-after-free bugs caused by ene_tx_irqsim()" }, - "CVE-2022-1016": { - "cmt_msg": "netfilter: nf_tables: initialize registers in nft_do_chain()" + "CVE-2021-47124": { + "cmt_msg": "io_uring: fix link timeout refs" }, "CVE-2022-1011": { "cmt_msg": "fuse: fix pipe buffer lifetime for direct_io" @@ -115838,15 +147581,30 @@ "CVE-2022-1012": { "cmt_msg": "secure_seq: use the 64 bits of the siphash for port offset calculation" }, + "CVE-2023-52620": { + "cmt_msg": "netfilter: nf_tables: disallow timeout for anonymous sets" + }, "CVE-2022-38096": { "cmt_msg": "" }, + "CVE-2023-52622": { + "cmt_msg": "ext4: avoid online resizing failures due to oversized flex bg" + }, "CVE-2020-8649": { "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region" }, + "CVE-2023-52624": { + "cmt_msg": "drm/amd/display: Wake DMCUB before executing GPINT commands" + }, "CVE-2023-3161": { "cmt_msg": "fbcon: Check font dimension limits" }, + "CVE-2023-52641": { + "cmt_msg": "fs/ntfs3: Add NULL ptr dereference checking at the end of attr_allocate_frame()" + }, + "CVE-2023-52628": { + "cmt_msg": "netfilter: nftables: exthdr: fix 4-byte stack OOB write" + }, "CVE-2021-26934": { "cmt_msg": "" }, @@ -115904,12 +147662,27 @@ "CVE-2021-3178": { "cmt_msg": "nfsd4: readdirplus shouldn't return parent of export" }, + "CVE-2021-47101": { + "cmt_msg": "asix: fix uninit-value in asix_mdio_read()" + }, + "CVE-2021-47100": { + "cmt_msg": "ipmi: Fix UAF when uninstall ipmi_si and ipmi_msghandler module" + }, + "CVE-2021-46984": { + "cmt_msg": "kyber: fix out of bounds access when preempted" + }, + "CVE-2021-46982": { + "cmt_msg": "f2fs: compress: fix race condition of overwrite vs truncate" + }, "CVE-2019-15031": { "cmt_msg": "powerpc/tm: Fix restoring FP/VMX facility incorrectly on interrupts" }, "CVE-2019-15030": { "cmt_msg": "powerpc/tm: Fix FP/VMX unavailable exceptions inside a transaction" }, + "CVE-2021-47109": { + "cmt_msg": "neighbour: allow NUD_NOARP entries to be forced GCed" + }, "CVE-2019-19252": { "cmt_msg": "vcs: prevent write access to vcsu devices" }, @@ -115919,12 +147692,21 @@ "CVE-2007-3719": { "cmt_msg": "" }, - "CVE-2023-3863": { - "cmt_msg": "net: nfc: Fix use-after-free caused by nfc_llcp_find_local" + "CVE-2021-46988": { + "cmt_msg": "userfaultfd: release page in error path to avoid BUG_ON" + }, + "CVE-2021-46989": { + "cmt_msg": "hfsplus: prevent corruption in shrinking truncate" + }, + "CVE-2024-26606": { + "cmt_msg": "binder: signal epoll threads of self-work" }, "CVE-2023-0590": { "cmt_msg": "net: sched: fix race condition in qdisc_graft()" }, + "CVE-2023-52583": { + "cmt_msg": "ceph: fix deadlock or deadcode of misusing dget()" + }, "CVE-2022-4095": { "cmt_msg": "staging: rtl8712: fix use after free bugs" }, @@ -115940,6 +147722,9 @@ "CVE-2023-30772": { "cmt_msg": "power: supply: da9150: Fix use after free bug in da9150_charger_remove due to race condition" }, + "CVE-2021-47119": { + "cmt_msg": "ext4: fix memory leak in ext4_fill_super" + }, "CVE-2022-24958": { "cmt_msg": "usb: gadget: don't release an existing dev->buf" }, @@ -115952,6 +147737,15 @@ "CVE-2021-3679": { "cmt_msg": "tracing: Fix bug in rb_per_cpu_empty() that might cause deadloop." }, + "CVE-2024-26656": { + "cmt_msg": "drm/amdgpu: fix use-after-free bug" + }, + "CVE-2024-26607": { + "cmt_msg": "drm/bridge: sii902x: Fix probing race issue" + }, + "CVE-2023-52517": { + "cmt_msg": "spi: sun6i: fix race between DMA RX transfer completion and RX FIFO drain" + }, "CVE-2022-2586": { "cmt_msg": "netfilter: nf_tables: do not allow SET_ID to refer to another table" }, @@ -116012,12 +147806,27 @@ "CVE-2023-1095": { "cmt_msg": "netfilter: nf_tables: fix null deref due to zeroed list head" }, + "CVE-2023-52574": { + "cmt_msg": "team: fix null-ptr-deref when team device type is changed" + }, + "CVE-2021-47034": { + "cmt_msg": "powerpc/64s: Fix pte update for kernel memory on radix" + }, "CVE-2022-3239": { "cmt_msg": "media: em28xx: initialize refcount before kref_get" }, "CVE-2022-4543": { "cmt_msg": "" }, + "CVE-2023-52571": { + "cmt_msg": "power: supply: rk817: Fix node refcount leak" + }, + "CVE-2023-52572": { + "cmt_msg": "cifs: Fix UAF in cifs_demultiplex_thread()" + }, + "CVE-2023-52573": { + "cmt_msg": "net: rds: Fix possible NULL-pointer dereference" + }, "CVE-2023-4921": { "cmt_msg": "net: sched: sch_qfq: Fix UAF in qfq_dequeue()" }, @@ -116030,6 +147839,9 @@ "CVE-2023-1829": { "cmt_msg": "net/sched: Retire tcindex classifier" }, + "CVE-2021-46915": { + "cmt_msg": "netfilter: nft_limit: avoid possible divide error in nft_limit_init" + }, "CVE-2019-18282": { "cmt_msg": "net/flow_dissector: switch to siphash" }, @@ -116045,14 +147857,17 @@ "CVE-2020-24394": { "cmt_msg": "nfsd: apply umask on fs without ACL support" }, + "CVE-2024-26769": { + "cmt_msg": "nvmet-fc: avoid deadlock on delete association path" + }, "CVE-2022-20148": { "cmt_msg": "f2fs: fix UAF in f2fs_available_free_memory" }, "CVE-2019-18813": { "cmt_msg": "usb: dwc3: pci: prevent memory leak in dwc3_pci_probe" }, - "CVE-2024-0607": { - "cmt_msg": "netfilter: nf_tables: fix pointer math issue in nft_byteorder_eval()" + "CVE-2022-1786": { + "cmt_msg": "io_uring: remove io_identity" }, "CVE-2013-7445": { "cmt_msg": "" @@ -116066,12 +147881,27 @@ "CVE-2023-34255": { "cmt_msg": "xfs: verify buffer contents when we skip log replay" }, + "CVE-2024-26736": { + "cmt_msg": "afs: Increase buffer size in afs_update_volume_status()" + }, + "CVE-2024-26735": { + "cmt_msg": "ipv6: sr: fix possible use-after-free and null-ptr-deref" + }, + "CVE-2024-26738": { + "cmt_msg": "powerpc/pseries/iommu: DLPAR add doesn't completely initialize pci_controller" + }, + "CVE-2024-26739": { + "cmt_msg": "net/sched: act_mirred: don't override retval if we already lost the skb" + }, "CVE-2021-3655": { "cmt_msg": "sctp: validate from_addr_param return" }, "CVE-2020-14386": { "cmt_msg": "net/packet: fix overflow in tpacket_rcv" }, + "CVE-2024-26804": { + "cmt_msg": "net: ip_tunnel: prevent perpetual headroom growth" + }, "CVE-2020-14385": { "cmt_msg": "xfs: fix boundary test in xfs_attr_shortform_verify" }, @@ -116114,12 +147944,18 @@ "CVE-2024-26595": { "cmt_msg": "mlxsw: spectrum_acl_tcam: Fix NULL pointer dereference in error path" }, + "CVE-2023-52506": { + "cmt_msg": "LoongArch: Set all reserved memblocks on Node#0 at initialization" + }, "CVE-2021-29154": { "cmt_msg": "bpf, x86: Validate computation of branch displacements for x86-64" }, "CVE-2023-6932": { "cmt_msg": "ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet" }, + "CVE-2024-26801": { + "cmt_msg": "Bluetooth: Avoid potential use-after-free in hci_error_reset" + }, "CVE-2020-16166": { "cmt_msg": "random32: update the net random state on interrupt and activity" }, @@ -116135,9 +147971,15 @@ "CVE-2011-4917": { "cmt_msg": "" }, + "CVE-2024-26803": { + "cmt_msg": "net: veth: clear GRO when clearing XDP even when down" + }, "CVE-2023-52444": { "cmt_msg": "f2fs: fix to avoid dirent corruption" }, + "CVE-2024-26768": { + "cmt_msg": "LoongArch: Change acpi_core_pic[NR_CPUS] to acpi_core_pic[MAX_CORE_PIC]" + }, "CVE-2020-12362": { "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" }, @@ -116150,12 +147992,27 @@ "CVE-2020-12364": { "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" }, + "CVE-2023-52607": { + "cmt_msg": "powerpc/mm: Fix null-pointer dereference in pgtable_cache_add" + }, + "CVE-2024-26646": { + "cmt_msg": "thermal: intel: hfi: Add syscore callbacks for system-wide PM" + }, + "CVE-2024-26647": { + "cmt_msg": "drm/amd/display: Fix late derefrence 'dsc' check in 'link_set_dsc_pps_packet()'" + }, + "CVE-2024-26644": { + "cmt_msg": "btrfs: don't abort filesystem when attempting to snapshot deleted subvolume" + }, "CVE-2020-25639": { "cmt_msg": "drm/nouveau: bail out of nouveau_channel_new if channel init fails" }, "CVE-2023-33203": { "cmt_msg": "net: qcom/emac: Fix use after free bug in emac_remove due to race condition" }, + "CVE-2024-26640": { + "cmt_msg": "tcp: add sanity checks to rx zerocopy" + }, "CVE-2021-0605": { "cmt_msg": "af_key: pfkey_dump needs parameter validation" }, @@ -116171,8 +148028,8 @@ "CVE-2022-1055": { "cmt_msg": "net: sched: fix use-after-free in tc_new_tfilter()" }, - "CVE-2024-23849": { - "cmt_msg": "net/rds: Fix UBSAN: array-index-out-of-bounds in rds_cmsg_recv" + "CVE-2023-52519": { + "cmt_msg": "HID: intel-ish-hid: ipc: Disable and reenable ACPI GPE bit" }, "CVE-2023-50431": { "cmt_msg": "accel/habanalabs: fix information leak in sec_attest_info()" @@ -116186,6 +148043,12 @@ "CVE-2021-3894": { "cmt_msg": "sctp: account stream padding length for reconf chunk" }, + "CVE-2024-26641": { + "cmt_msg": "ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv()" + }, + "CVE-2024-26791": { + "cmt_msg": "btrfs: dev-replace: properly validate device names" + }, "CVE-2019-18786": { "cmt_msg": "media: rcar_drif: fix a memory disclosure" }, @@ -116198,6 +148061,9 @@ "CVE-2019-20812": { "cmt_msg": "af_packet: set defaule value for tmo" }, + "CVE-2023-52600": { + "cmt_msg": "jfs: fix uaf in jfs_evict_inode" + }, "CVE-2020-14314": { "cmt_msg": "ext4: fix potential negative array index in do_split()" }, @@ -116219,6 +148085,12 @@ "CVE-2024-23848": { "cmt_msg": "" }, + "CVE-2023-52531": { + "cmt_msg": "wifi: iwlwifi: mvm: Fix a memory corruption issue" + }, + "CVE-2021-47159": { + "cmt_msg": "net: dsa: fix a crash if ->get_sset_count() fails" + }, "CVE-2022-0617": { "cmt_msg": "udf: Fix NULL ptr deref when converting from inline format" }, @@ -116226,11 +148098,23 @@ "cmt_msg": "net: vmxnet3: fix possible NULL pointer dereference in vmxnet3_rq_cleanup()" }, "CVE-2024-24861": { - "cmt_msg": "" + "cmt_msg": "media: xc4000: Fix atomicity violation in xc4000_get_frequency" + }, + "CVE-2024-26635": { + "cmt_msg": "llc: Drop support for ETH_P_TR_802_2." + }, + "CVE-2022-41218": { + "cmt_msg": "media: dvb-core: Fix UAF due to refcount races at releasing" + }, + "CVE-2023-52639": { + "cmt_msg": "KVM: s390: vsie: fix race during shadow creation" }, "CVE-2022-2153": { "cmt_msg": "KVM: x86: Avoid theoretical NULL pointer dereference in kvm_irq_delivery_to_apic_fast()" }, + "CVE-2024-2193": { + "cmt_msg": "" + }, "CVE-2022-20566": { "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free caused by l2cap_chan_put" }, @@ -116243,8 +148127,11 @@ "CVE-2024-23851": { "cmt_msg": "dm: limit the number of targets and parameter size area" }, + "CVE-2022-20424": { + "cmt_msg": "io_uring: remove io_identity" + }, "CVE-2024-23196": { - "cmt_msg": "" + "cmt_msg": "ALSA: hda: fix a possible null-pointer dereference due to data race in snd_hdac_regmap_sync()" }, "CVE-2020-12768": { "cmt_msg": "KVM: SVM: Fix potential memory leak in svm_cpu_init()" @@ -116252,6 +148139,12 @@ "CVE-2020-12769": { "cmt_msg": "spi: spi-dw: Add lock protect dw_spi rx/tx to prevent concurrent calls" }, + "CVE-2024-26765": { + "cmt_msg": "LoongArch: Disable IRQ before init_fn() for nonboot CPUs" + }, + "CVE-2023-52609": { + "cmt_msg": "binder: fix race between mmput() and do_exit()" + }, "CVE-2021-32399": { "cmt_msg": "bluetooth: eliminate the potential race condition when removing the HCI controller" }, @@ -116264,14 +148157,32 @@ "CVE-2019-12382": { "cmt_msg": "drm/edid: Fix a missing-check bug in drm_load_edid_firmware()" }, + "CVE-2023-52634": { + "cmt_msg": "drm/amd/display: Fix disable_otg_wa logic" + }, "CVE-2022-22942": { "cmt_msg": "drm/vmwgfx: Fix stale file descriptors on failed usercopy" }, "CVE-2021-3739": { "cmt_msg": "btrfs: fix NULL pointer dereference when deleting device by invalid id" }, - "CVE-2021-3732": { - "cmt_msg": "ovl: prevent private clone if bind mount is not allowed" + "CVE-2020-36782": { + "cmt_msg": "i2c: imx-lpi2c: fix reference leak when pm_runtime_get_sync fails" + }, + "CVE-2020-36783": { + "cmt_msg": "i2c: img-scb: fix reference leak when pm_runtime_get_sync fails" + }, + "CVE-2020-36780": { + "cmt_msg": "i2c: sprd: fix reference leak when pm_runtime_get_sync fails" + }, + "CVE-2020-36781": { + "cmt_msg": "i2c: imx: fix reference leak when pm_runtime_get_sync fails" + }, + "CVE-2020-36787": { + "cmt_msg": "media: aspeed: fix clock handling logic" + }, + "CVE-2020-36784": { + "cmt_msg": "i2c: cadence: fix reference leak when pm_runtime_get_sync fails" }, "CVE-2024-24860": { "cmt_msg": "Bluetooth: Fix atomicity violation in {min,max}_key_size_set" @@ -116282,9 +148193,15 @@ "CVE-2020-10767": { "cmt_msg": "x86/speculation: Avoid force-disabling IBPB based on STIBP and enhanced IBRS." }, + "CVE-2019-25162": { + "cmt_msg": "i2c: Fix a potential use after free" + }, "CVE-2018-12207": { "cmt_msg": "kvm: x86, powerpc: do not allow clearing largepages debugfs entry" }, + "CVE-2024-26627": { + "cmt_msg": "scsi: core: Move scsi_host_busy() out of host lock for waking up EH handler" + }, "CVE-2020-13143": { "cmt_msg": "USB: gadget: fix illegal array access in binding with UDC" }, @@ -116306,12 +148223,15 @@ "CVE-2019-17075": { "cmt_msg": "RDMA/cxgb4: Do not dma memory off of the stack" }, - "CVE-2023-3220": { - "cmt_msg": "drm/msm/dpu: Add check for pstates" + "CVE-2022-48626": { + "cmt_msg": "moxart: fix potential use-after-free on remove path" }, "CVE-2022-3903": { "cmt_msg": "media: mceusb: Use new usb_control_msg_*() routines" }, + "CVE-2024-26642": { + "cmt_msg": "netfilter: nf_tables: disallow anonymous set with timeout flag" + }, "CVE-2022-3577": { "cmt_msg": "HID: bigben: fix slab-out-of-bounds Write in bigben_probe" }, @@ -116327,30 +148247,87 @@ "CVE-2019-0145": { "cmt_msg": "i40e: add num_vectors checker in iwarp handler" }, + "CVE-2021-47071": { + "cmt_msg": "uio_hv_generic: Fix a memory leak in error handling paths" + }, + "CVE-2021-47070": { + "cmt_msg": "uio_hv_generic: Fix another memory leak in error handling paths" + }, + "CVE-2021-47073": { + "cmt_msg": "platform/x86: dell-smbios-wmi: Fix oops on rmmod dell_smbios" + }, "CVE-2022-44034": { "cmt_msg": "char: pcmcia: remove all the drivers" }, - "CVE-2022-44033": { - "cmt_msg": "char: pcmcia: remove all the drivers" + "CVE-2021-47075": { + "cmt_msg": "nvmet: fix memory leak in nvmet_alloc_ctrl()" }, - "CVE-2022-44032": { - "cmt_msg": "char: pcmcia: remove all the drivers" + "CVE-2021-47074": { + "cmt_msg": "nvme-loop: fix memory leak in nvme_loop_create_ctrl()" + }, + "CVE-2021-47077": { + "cmt_msg": "scsi: qedf: Add pointer checks in qedf_update_link_speed()" + }, + "CVE-2021-47076": { + "cmt_msg": "RDMA/rxe: Return CQE error if invalid lkey was supplied" + }, + "CVE-2021-47170": { + "cmt_msg": "USB: usbfs: Don't WARN about excessively large memory allocations" + }, + "CVE-2021-47078": { + "cmt_msg": "RDMA/rxe: Clear all QP fields if creation failed" + }, + "CVE-2021-47172": { + "cmt_msg": "iio: adc: ad7124: Fix potential overflow due to non sequential channel numbers" + }, + "CVE-2021-47173": { + "cmt_msg": "misc/uss720: fix memory leak in uss720_probe" + }, + "CVE-2022-36123": { + "cmt_msg": "x86: Clear .brk area at early boot" + }, + "CVE-2021-47175": { + "cmt_msg": "net/sched: fq_pie: fix OOB access in the traffic path" }, "CVE-2020-10781": { "cmt_msg": "Revert \"zram: convert remaining CLASS_ATTR() to CLASS_ATTR_RO()\"" }, - "CVE-2023-1989": { - "cmt_msg": "Bluetooth: btsdio: fix use after free bug in btsdio_remove due to unfinished work" + "CVE-2021-46951": { + "cmt_msg": "tpm: efi: Use local variable for calculating final log size" + }, + "CVE-2021-46950": { + "cmt_msg": "md/raid1: properly indicate failure when ending a failed write request" + }, + "CVE-2021-46953": { + "cmt_msg": "ACPI: GTDT: Don't corrupt interrupt mappings on watchdow probe failure" + }, + "CVE-2021-46952": { + "cmt_msg": "NFS: fs_context: validate UDP retrans to prevent shift out-of-bounds" + }, + "CVE-2021-46955": { + "cmt_msg": "openvswitch: fix stack OOB read while fragmenting IPv4 packets" + }, + "CVE-2024-0607": { + "cmt_msg": "netfilter: nf_tables: fix pointer math issue in nft_byteorder_eval()" + }, + "CVE-2021-46959": { + "cmt_msg": "spi: Fix use-after-free with devm_spi_alloc_*" }, "CVE-2020-26139": { "cmt_msg": "mac80211: do not accept/forward invalid EAPOL frames" }, + "CVE-2024-26772": { + "cmt_msg": "ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal()" + }, "CVE-2019-10220": { "cmt_msg": "Convert filldir[64]() from __put_user() to unsafe_put_user()" }, "CVE-2021-3609": { "cmt_msg": "can: bcm: delay release of struct bcm_op after synchronize_rcu()" }, + "CVE-2023-52595": { + "cmt_msg": "wifi: rt2x00: restart beacon queue when hardware reset" + }, "CVE-2019-19536": { "cmt_msg": "can: peak_usb: pcan_usb_pro: Fix info-leaks to USB devices" }, @@ -116381,14 +148358,20 @@ "CVE-2021-0929": { "cmt_msg": "staging/android/ion: delete dma_buf->kmap/unmap implemenation" }, + "CVE-2023-52590": { + "cmt_msg": "ocfs2: Avoid touching renamed directory if parent does not change" + }, + "CVE-2024-26676": { + "cmt_msg": "af_unix: Call kfree_skb() for dead unix_(sk)->oob_skb in GC." + }, "CVE-2021-0920": { "cmt_msg": "af_unix: fix garbage collect vs MSG_PEEK" }, "CVE-2022-0168": { "cmt_msg": "cifs: fix NULL ptr dereference in smb2_ioctl_query_info()" }, - "CVE-2024-26587": { - "cmt_msg": "net: netdevsim: don't try to destroy PHC on VFs" + "CVE-2024-26622": { + "cmt_msg": "tomoyo: fix UAF write bug in tomoyo_write_control()" }, "CVE-2023-51043": { "cmt_msg": "drm/atomic: Fix potential use-after-free in nonblocking commits" @@ -116399,6 +148382,9 @@ "CVE-2023-0615": { "cmt_msg": "media: vivid: dev->bitmap_cap wasn't freed in all cases" }, + "CVE-2024-26672": { + "cmt_msg": "drm/amdgpu: Fix variable 'mca_funcs' dereferenced before NULL check in 'amdgpu_mca_smu_get_mca_entry()'" + }, "CVE-2019-14896": { "cmt_msg": "libertas: Fix two buffer overflows at parsing bss descriptor" }, @@ -116408,17 +148394,29 @@ "CVE-2019-14895": { "cmt_msg": "mwifiex: fix possible heap overflow in mwifiex_process_country_ie()" }, + "CVE-2024-26787": { + "cmt_msg": "mmc: mmci: stm32: fix DMA API overlapping mappings warning" + }, + "CVE-2023-52522": { + "cmt_msg": "net: fix possible store tearing in neigh_periodic_work()" + }, "CVE-2022-3586": { "cmt_msg": "sch_sfb: Don't assume the skb is still around after enqueueing to child" }, "CVE-2023-35824": { "cmt_msg": "media: dm1105: Fix use after free bug in dm1105_remove due to race condition" }, + "CVE-2024-26636": { + "cmt_msg": "llc: make llc_ui_sendmsg() more robust against bonding changes" + }, + "CVE-2024-26779": { + "cmt_msg": "wifi: mac80211: fix race condition on enabling fast-xmit" + }, "CVE-2024-26586": { "cmt_msg": "mlxsw: spectrum_acl_tcam: Fix stack corruption" }, - "CVE-2024-0646": { - "cmt_msg": "net: tls, update curr on splice as well" + "CVE-2023-52528": { + "cmt_msg": "net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg" }, "CVE-2020-27825": { "cmt_msg": "tracing: Fix race in trace_open and buffer resize call" @@ -116435,6 +148433,9 @@ "CVE-2020-0067": { "cmt_msg": "f2fs: fix to avoid memory leakage in f2fs_listxattr" }, + "CVE-2021-47151": { + "cmt_msg": "interconnect: qcom: bcm-voter: add a missing of_node_put()" + }, "CVE-2023-4622": { "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES" }, @@ -116453,6 +148454,9 @@ "CVE-2023-6610": { "cmt_msg": "smb: client: fix potential OOB in smb2_dump_detail()" }, + "CVE-2024-26600": { + "cmt_msg": "phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP" + }, "CVE-2023-0045": { "cmt_msg": "x86/bugs: Flush IBP in ib_prctl_set()" }, @@ -116468,6 +148472,15 @@ "CVE-2021-33061": { "cmt_msg": "ixgbe: add improvement for MDD response functionality" }, + "CVE-2024-26764": { + "cmt_msg": "fs/aio: Restrict kiocb_set_cancel_fn() to I/O submitted via libaio" + }, + "CVE-2024-26767": { + "cmt_msg": "drm/amd/display: fixed integer types and null check locations" + }, + "CVE-2024-26766": { + "cmt_msg": "IB/hfi1: Fix sdma.h tx->num_descs off-by-one error" + }, "CVE-2024-26589": { "cmt_msg": "bpf: Reject variable offset alu on PTR_TO_FLOW_KEYS" }, @@ -116477,24 +148490,36 @@ "CVE-2023-1476": { "cmt_msg": "" }, - "CVE-2023-4010": { - "cmt_msg": "" + "CVE-2021-47041": { + "cmt_msg": "nvmet-tcp: fix incorrect locking in state_change sk callback" }, "CVE-2023-1074": { "cmt_msg": "sctp: fail if no bound addresses can be used for a given scope" }, + "CVE-2023-3220": { + "cmt_msg": "drm/msm/dpu: Add check for pstates" + }, "CVE-2021-3864": { "cmt_msg": "" }, + "CVE-2024-26770": { + "cmt_msg": "HID: nvidia-shield: Add missing null pointer checks to LED initialization" + }, "CVE-2023-1075": { "cmt_msg": "net/tls: tls_is_tx_ready() checked list_entry" }, + "CVE-2024-23307": { + "cmt_msg": "md/raid5: fix atomicity violation in raid5_cache_count" + }, "CVE-2022-1652": { "cmt_msg": "floppy: use a statically allocated error counter" }, "CVE-2023-4623": { "cmt_msg": "net/sched: sch_hfsc: Ensure inner classes have fsc curve" }, + "CVE-2024-26771": { + "cmt_msg": "dmaengine: ti: edma: Add some null pointer checks to the edma_probe" + }, "CVE-2023-1076": { "cmt_msg": "tun: tun_chr_open(): correctly initialize socket uid" }, @@ -116540,6 +148565,9 @@ "CVE-2020-0423": { "cmt_msg": "binder: fix UAF when releasing todo list" }, + "CVE-2022-23222": { + "cmt_msg": "bpf: Replace PTR_TO_XXX_OR_NULL with PTR_TO_XXX | PTR_MAYBE_NULL" + }, "CVE-2022-1789": { "cmt_msg": "KVM: x86/mmu: fix NULL pointer dereference on guest INVPCID" }, @@ -116550,11 +148578,14 @@ "cmt_msg": "" }, "CVE-2023-6270": { - "cmt_msg": "" + "cmt_msg": "aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts" }, "CVE-2023-3090": { "cmt_msg": "ipvlan:Fix out-of-bounds caused by unclear skb->cb" }, + "CVE-2022-20422": { + "cmt_msg": "arm64: fix oops in concurrently setting insn_emulation sysctls" + }, "CVE-2023-1073": { "cmt_msg": "HID: check empty report_list in hid_validate_values()" }, @@ -116567,11 +148598,11 @@ "CVE-2023-1582": { "cmt_msg": "fs/proc: task_mmu.c: don't read mapcount for migration entry" }, - "CVE-2022-1786": { - "cmt_msg": "io_uring: remove io_identity" + "CVE-2021-47162": { + "cmt_msg": "tipc: skb_linearize the head skb when reassembling msgs" }, - "CVE-2022-23222": { - "cmt_msg": "bpf: Replace PTR_TO_XXX_OR_NULL with PTR_TO_XXX | PTR_MAYBE_NULL" + "CVE-2022-21166": { + "cmt_msg": "x86/speculation/mmio: Enable CPU Fill buffer clearing on idle" }, "CVE-2020-25669": { "cmt_msg": "Input: sunkbd - avoid use-after-free in teardown paths" @@ -116585,6 +148616,9 @@ "CVE-2020-25705": { "cmt_msg": "icmp: randomize the global rate limiter" }, + "CVE-2022-20421": { + "cmt_msg": "binder: fix UAF of ref->proc caused by race condition" + }, "CVE-2022-0435": { "cmt_msg": "tipc: improve size validations for received domain records" }, @@ -116595,7 +148629,13 @@ "cmt_msg": "can: kvaser_usb: kvaser_usb_leaf: Fix some info-leaks to USB devices" }, "CVE-2023-6356": { - "cmt_msg": "" + "cmt_msg": "nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length" + }, + "CVE-2024-26744": { + "cmt_msg": "RDMA/srpt: Support specifying the srpt_service_guid parameter" + }, + "CVE-2024-26648": { + "cmt_msg": "drm/amd/display: Fix variable deferencing before NULL check in edp_setup_replay()" }, "CVE-2021-4135": { "cmt_msg": "netdevsim: Zero-initialize memory for new map's value in function nsim_bpf_map_alloc" @@ -116603,12 +148643,24 @@ "CVE-2023-26607": { "cmt_msg": "ntfs: fix out-of-bounds read in ntfs_attr_find()" }, - "CVE-2023-52456": { - "cmt_msg": "serial: imx: fix tx statemachine deadlock" + "CVE-2023-52638": { + "cmt_msg": "can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock" }, "CVE-2019-15239": { "cmt_msg": "unknown" }, + "CVE-2023-52635": { + "cmt_msg": "PM / devfreq: Synchronize devfreq_monitor_[start/stop]" + }, + "CVE-2023-52469": { + "cmt_msg": "drivers/amd/pm: fix a use-after-free in kv_parse_power_table" + }, + "CVE-2023-52594": { + "cmt_msg": "wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus()" + }, + "CVE-2023-52632": { + "cmt_msg": "drm/amdkfd: Fix lock dependency warning with srcu" + }, "CVE-2021-4037": { "cmt_msg": "xfs: fix up non-directory creation in SGID directories" }, @@ -116627,12 +148679,30 @@ "CVE-2023-20941": { "cmt_msg": "" }, + "CVE-2024-26773": { + "cmt_msg": "ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found()" + }, + "CVE-2023-2194": { + "cmt_msg": "i2c: xgene-slimpro: Fix out-of-bounds bug in xgene_slimpro_i2c_xfer()" + }, + "CVE-2022-21123": { + "cmt_msg": "x86/speculation/mmio: Add mitigation for Processor MMIO Stale Data" + }, + "CVE-2024-26740": { + "cmt_msg": "net/sched: act_mirred: use the backlog for mirred ingress" + }, "CVE-2021-3347": { "cmt_msg": "futex: Ensure the correct return value from futex_lock_pi()" }, "CVE-2020-10135": { "cmt_msg": "Bluetooth: Consolidate encryption handling in hci_encrypt_cfm" }, + "CVE-2021-47169": { + "cmt_msg": "serial: rp2: use 'request_firmware' instead of 'request_firmware_nowait'" + }, + "CVE-2024-26784": { + "cmt_msg": "pmdomain: arm: Fix NULL dereference on scmi_perf_domain removal" + }, "CVE-2022-1966": { "cmt_msg": "netfilter: nf_tables: disallow non-stateful expression in sets earlier" }, @@ -116651,27 +148721,54 @@ "CVE-2022-3535": { "cmt_msg": "net: mvpp2: fix mvpp2 debugfs leak" }, + "CVE-2021-47135": { + "cmt_msg": "mt76: mt7921: fix possible AOOB issue in mt7921_mcu_tx_rate_report" + }, + "CVE-2021-47136": { + "cmt_msg": "net: zero-initialize tc skb extension on allocation" + }, + "CVE-2021-47137": { + "cmt_msg": "net: lantiq: fix memory corruption in RX ring" + }, + "CVE-2024-26808": { + "cmt_msg": "netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain" + }, + "CVE-2021-47131": { + "cmt_msg": "net/tls: Fix use-after-free after the TLS device goes down and up" + }, "CVE-2020-36766": { "cmt_msg": "cec-api: prevent leaking memory through hole in structure" }, + "CVE-2021-47133": { + "cmt_msg": "HID: amd_sfh: Fix memory leak in amd_sfh_work" + }, "CVE-2022-2977": { "cmt_msg": "tpm: fix reference counting for struct tpm_chip" }, + "CVE-2024-26675": { + "cmt_msg": "ppp_async: limit MRU to 64K" + }, "CVE-2022-3061": { "cmt_msg": "video: fbdev: i740fb: Error out if 'pixclock' equals zero" }, - "CVE-2023-28328": { - "cmt_msg": "media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer()" + "CVE-2021-46991": { + "cmt_msg": "i40e: Fix use-after-free in i40e_client_subtask()" }, "CVE-2022-0322": { "cmt_msg": "sctp: account stream padding length for reconf chunk" }, - "CVE-2023-0386": { - "cmt_msg": "ovl: fail on invalid uid/gid mapping at copy up" + "CVE-2021-46992": { + "cmt_msg": "netfilter: nftables: avoid overflows in nft_hash_buckets()" }, "CVE-2023-6121": { "cmt_msg": "nvmet: nul-terminate the NQNs passed in the connect command" }, + "CVE-2024-26748": { + "cmt_msg": "usb: cdns3: fix memory double free when handle zero packet" + }, + "CVE-2021-46998": { + "cmt_msg": "ethernet:enic: Fix a use after free bug in enic_hard_start_xmit" + }, "CVE-2017-13693": { "cmt_msg": "" }, @@ -116705,8 +148802,20 @@ "CVE-2021-3760": { "cmt_msg": "nfc: nci: fix the UAF of rf_conn_info object" }, - "CVE-2022-36123": { - "cmt_msg": "x86: Clear .brk area at early boot" + "CVE-2022-48627": { + "cmt_msg": "vt: fix memory overlapping when deleting chars in the buffer" + }, + "CVE-2023-52593": { + "cmt_msg": "wifi: wfx: fix possible NULL pointer dereference in wfx_set_mfp_ap()" + }, + "CVE-2021-47180": { + "cmt_msg": "NFC: nci: fix memory leak in nci_allocate_device" + }, + "CVE-2022-48628": { + "cmt_msg": "ceph: drop messages from MDS when unmounting" + }, + "CVE-2022-48629": { + "cmt_msg": "crypto: qcom-rng - ensure buffer for generate is completely filled" }, "CVE-2020-11608": { "cmt_msg": "media: ov519: add missing endpoint sanity checks" @@ -116729,6 +148838,9 @@ "CVE-2024-24857": { "cmt_msg": "" }, + "CVE-2023-0386": { + "cmt_msg": "ovl: fail on invalid uid/gid mapping at copy up" + }, "CVE-2021-29264": { "cmt_msg": "gianfar: fix jumbo packets+napi+rx overrun crash" }, @@ -116741,6 +148853,12 @@ "CVE-2022-3545": { "cmt_msg": "nfp: fix use-after-free in area_cache_get()" }, + "CVE-2023-52569": { + "cmt_msg": "btrfs: remove BUG() after failure to insert delayed dir index item" + }, + "CVE-2023-52568": { + "cmt_msg": "x86/sgx: Resolves SECS reclaim vs. page fault for EAUG race" + }, "CVE-2020-14416": { "cmt_msg": "can, slip: Protect tty->disc_data in write_wakeup and close with RCU" }, @@ -116750,15 +148868,30 @@ "CVE-2022-3542": { "cmt_msg": "bnx2x: fix potential memory leak in bnx2x_tpa_stop()" }, + "CVE-2023-52563": { + "cmt_msg": "drm/meson: fix memory leak on ->hpd_notify callback" + }, + "CVE-2023-52561": { + "cmt_msg": "arm64: dts: qcom: sdm845-db845c: Mark cont splash memory region as reserved" + }, "CVE-2019-19377": { "cmt_msg": "btrfs: Don't submit any btree write bio if the fs has errors" }, + "CVE-2021-47004": { + "cmt_msg": "f2fs: fix to avoid touching checkpointed data in get_victim()" + }, + "CVE-2021-47005": { + "cmt_msg": "PCI: endpoint: Fix NULL pointer dereference for ->get_features()" + }, "CVE-2021-21781": { "cmt_msg": "ARM: ensure the signal page contains defined contents" }, "CVE-2021-0512": { "cmt_msg": "HID: make arrays usage and value to be the same" }, + "CVE-2021-46929": { + "cmt_msg": "sctp: use call_rcu to free endpoint" + }, "CVE-2023-1382": { "cmt_msg": "tipc: set con sock in tipc_conn_alloc" }, @@ -116768,6 +148901,15 @@ "CVE-2023-1380": { "cmt_msg": "wifi: brcmfmac: slab-out-of-bounds read in brcmf_get_assoc_ies()" }, + "CVE-2021-46924": { + "cmt_msg": "NFC: st21nfca: Fix memory leak in device probe and remove" + }, + "CVE-2021-46925": { + "cmt_msg": "net/smc: fix kernel panic caused by race of smc_sock" + }, + "CVE-2021-46926": { + "cmt_msg": "ALSA: hda: intel-sdw-acpi: harden detection of controller" + }, "CVE-2020-0347": { "cmt_msg": "" }, @@ -116777,6 +148919,9 @@ "CVE-2019-18808": { "cmt_msg": "crypto: ccp - Release all allocated memory if sha type is invalid" }, + "CVE-2023-52591": { + "cmt_msg": "reiserfs: Avoid touching renamed directory if parent does not change" + }, "CVE-2022-41222": { "cmt_msg": "mm/mremap: hold the rmap lock in write mode when moving page table entries." }, @@ -116810,6 +148955,9 @@ "CVE-2021-33656": { "cmt_msg": "vt: drop old FONT ioctls" }, + "CVE-2024-26720": { + "cmt_msg": "mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again" + }, "CVE-2021-33655": { "cmt_msg": "fbcon: Disallow setting font bigger than screen size" }, @@ -116819,9 +148967,15 @@ "CVE-2022-41858": { "cmt_msg": "drivers: net: slip: fix NPD bug in sl_tx_timeout()" }, + "CVE-2024-26726": { + "cmt_msg": "btrfs: don't drop extent_map for free space inode on write error" + }, "CVE-2022-3176": { "cmt_msg": "io_uring: fix UAF due to missing POLLFREE handling" }, + "CVE-2024-26671": { + "cmt_msg": "blk-mq: fix IO hang from sbitmap wakeup race" + }, "CVE-2023-1206": { "cmt_msg": "tcp: Reduce chance of collisions in inet6_hashfn()." }, @@ -116873,6 +149027,9 @@ "CVE-2020-0466": { "cmt_msg": "do_epoll_ctl(): clean the failure exits up a bit" }, + "CVE-2023-52516": { + "cmt_msg": "dma-debug: don't call __dma_entry_alloc_check_leak() under free_entries_lock" + }, "CVE-2021-4218": { "cmt_msg": "sysctl: pass kernel pointers to ->proc_handler" }, @@ -116882,12 +149039,15 @@ "CVE-2020-0543": { "cmt_msg": "x86/cpu: Add 'table' argument to cpu_matches()" }, - "CVE-2024-25739": { - "cmt_msg": "" + "CVE-2023-52510": { + "cmt_msg": "ieee802154: ca8210: Fix a potential UAF in ca8210_probe" }, "CVE-2023-3358": { "cmt_msg": "HID: intel_ish-hid: Add check for ishtp_dma_tx_map" }, + "CVE-2023-52633": { + "cmt_msg": "um: time-travel: fix time corruption" + }, "CVE-2024-0340": { "cmt_msg": "vhost: use kzalloc() instead of kmalloc() followed by memset()" }, @@ -116895,7 +149055,7 @@ "cmt_msg": "vt_kdsetmode: extend console locking" }, "CVE-2023-6536": { - "cmt_msg": "" + "cmt_msg": "nvmet-tcp: fix a crash in nvmet_req_complete()" }, "CVE-2019-11135": { "cmt_msg": "x86/msr: Add the IA32_TSX_CTRL MSR" @@ -116921,6 +149081,12 @@ "CVE-2024-1151": { "cmt_msg": "net: openvswitch: limit the number of recursions from action sets" }, + "CVE-2024-26659": { + "cmt_msg": "xhci: handle isoc Babble and Buffer Overrun events properly" + }, + "CVE-2024-26658": { + "cmt_msg": "bcachefs: grab s_umount only if snapshotting" + }, "CVE-2020-35519": { "cmt_msg": "net/x25: prevent a couple of overflows" }, @@ -116930,12 +149096,21 @@ "CVE-2021-20322": { "cmt_msg": "ipv6: make exception cache less predictible" }, + "CVE-2024-26654": { + "cmt_msg": "ALSA: sh: aica: reorder cleanup operations to avoid UAF bugs" + }, "CVE-2021-20320": { "cmt_msg": "s390/bpf: Fix optimizing out zero-extensions" }, "CVE-2021-20321": { "cmt_msg": "ovl: fix missing negative dentry check in ovl_rename()" }, + "CVE-2024-26651": { + "cmt_msg": "sr9800: Add check for usbnet_get_endpoints" + }, + "CVE-2024-26650": { + "cmt_msg": "platform/x86: p2sb: Allow p2sb_bar() calls during PCI device probe" + }, "CVE-2022-26490": { "cmt_msg": "nfc: st21nfca: Fix potential buffer overflows in EVT_TRANSACTION" }, @@ -116954,15 +149129,33 @@ "CVE-2022-1048": { "cmt_msg": "ALSA: pcm: Fix races among concurrent hw_params and hw_free calls" }, + "CVE-2024-26696": { + "cmt_msg": "nilfs2: fix hang in nilfs_lookup_dirty_data_buffers()" + }, + "CVE-2023-52475": { + "cmt_msg": "Input: powermate - fix use-after-free in powermate_config_complete" + }, "CVE-2021-0342": { "cmt_msg": "tun: correct header offsets in napi frags mode" }, + "CVE-2023-52477": { + "cmt_msg": "usb: hub: Guard against accesses to uninitialized BOS descriptors" + }, + "CVE-2023-52476": { + "cmt_msg": "perf/x86/lbr: Filter vsyscall addresses" + }, "CVE-2023-22995": { "cmt_msg": "usb: dwc3: dwc3-qcom: Add missing platform_device_put() in dwc3_qcom_acpi_register_core" }, + "CVE-2023-52470": { + "cmt_msg": "drm/radeon: check the alloc_workqueue return value in radeon_crtc_init()" + }, "CVE-2024-21803": { "cmt_msg": "" }, + "CVE-2023-52479": { + "cmt_msg": "ksmbd: fix uaf in smb20_oplock_break_ack" + }, "CVE-2023-2176": { "cmt_msg": "RDMA/core: Refactor rdma_bind_addr" }, @@ -116975,6 +149168,9 @@ "CVE-2020-12659": { "cmt_msg": "xsk: Add missing check on user supplied headroom size" }, + "CVE-2024-22099": { + "cmt_msg": "Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security" + }, "CVE-2023-30456": { "cmt_msg": "KVM: nVMX: add missing consistency checks for CR0 and CR4" }, @@ -117002,6 +149198,9 @@ "CVE-2018-12928": { "cmt_msg": "" }, + "CVE-2024-26700": { + "cmt_msg": "drm/amd/display: Fix MST Null Ptr for RV" + }, "CVE-2020-36311": { "cmt_msg": "KVM: SVM: Periodically schedule when unregistering regions on destroy" }, @@ -117032,6 +149231,12 @@ "CVE-2024-25741": { "cmt_msg": "" }, + "CVE-2024-26778": { + "cmt_msg": "fbdev: savage: Error out if pixclock equals zero" + }, + "CVE-2024-26809": { + "cmt_msg": "netfilter: nft_set_pipapo: release elements in clone only from destroy path" + }, "CVE-2022-26966": { "cmt_msg": "sr9700: sanity check for packet length" }, @@ -117041,18 +149246,42 @@ "CVE-2022-3344": { "cmt_msg": "KVM: x86: nSVM: harden svm_free_nested against freeing vmcb02 while still in use" }, + "CVE-2024-26806": { + "cmt_msg": "spi: cadence-qspi: remove system-wide suspend helper calls from runtime PM hooks" + }, "CVE-2020-12771": { "cmt_msg": "bcache: fix potential deadlock problem in btree_gc_coalesce" }, "CVE-2020-12770": { "cmt_msg": "scsi: sg: add sg_remove_request in sg_write" }, + "CVE-2024-26802": { + "cmt_msg": "stmmac: Clear variable when destroying workqueue" + }, + "CVE-2023-52508": { + "cmt_msg": "nvme-fc: Prevent null pointer dereference in nvme_fc_io_getuuid()" + }, + "CVE-2023-52606": { + "cmt_msg": "powerpc/lib: Validate size for vector operations" + }, "CVE-2022-20369": { "cmt_msg": "media: v4l2-mem2mem: Apply DST_QUEUE_OFF_BASE on MMAP buffers across ioctls" }, + "CVE-2023-52604": { + "cmt_msg": "FS:JFS:UBSAN:array-index-out-of-bounds in dbAdjTree" + }, + "CVE-2023-52602": { + "cmt_msg": "jfs: fix slab-out-of-bounds Read in dtSearch" + }, + "CVE-2023-52603": { + "cmt_msg": "UBSAN: array-index-out-of-bounds in dtSplitRoot" + }, "CVE-2022-25265": { "cmt_msg": "" }, + "CVE-2023-52601": { + "cmt_msg": "jfs: fix array-index-out-of-bounds in dbAdjTree" + }, "CVE-2020-25285": { "cmt_msg": "mm/hugetlb: fix a race between hugetlb sysctl handlers" }, @@ -117095,6 +149324,9 @@ "CVE-2022-2663": { "cmt_msg": "netfilter: nf_conntrack_irc: Fix forged IP logic" }, + "CVE-2021-47049": { + "cmt_msg": "Drivers: hv: vmbus: Use after free in __vmbus_open()" + }, "CVE-2022-43750": { "cmt_msg": "usb: mon: make mmapped memory read only" }, @@ -117104,33 +149336,75 @@ "CVE-2023-0047": { "cmt_msg": "mm, oom: do not trigger out_of_memory from the #PF" }, + "CVE-2021-47046": { + "cmt_msg": "drm/amd/display: Fix off by one in hdmi_14_process_transaction()" + }, "CVE-2020-29370": { "cmt_msg": "mm: slub: add missing TID bump in kmem_cache_alloc_bulk()" }, "CVE-2019-1125": { "cmt_msg": "x86/speculation: Prepare entry code for Spectre v1 swapgs mitigations" }, - "CVE-2022-38457": { - "cmt_msg": "drm/vmwgfx: Remove rcu locks from user resources" + "CVE-2023-1989": { + "cmt_msg": "Bluetooth: btsdio: fix use after free bug in btsdio_remove due to unfinished work" }, - "CVE-2022-20424": { - "cmt_msg": "io_uring: remove io_identity" + "CVE-2021-3732": { + "cmt_msg": "ovl: prevent private clone if bind mount is not allowed" }, - "CVE-2022-20422": { - "cmt_msg": "arm64: fix oops in concurrently setting insn_emulation sysctls" + "CVE-2021-47167": { + "cmt_msg": "NFS: Fix an Oopsable condition in __nfs_pageio_add_request()" }, - "CVE-2022-20421": { - "cmt_msg": "binder: fix UAF of ref->proc caused by race condition" + "CVE-2021-47166": { + "cmt_msg": "NFS: Don't corrupt the value of pg_bytes_written in nfs_do_recoalesce()" + }, + "CVE-2021-47165": { + "cmt_msg": "drm/meson: fix shutdown crash when component not probed" + }, + "CVE-2021-47163": { + "cmt_msg": "tipc: wait and exit until all work queues are done" + }, + "CVE-2021-46969": { + "cmt_msg": "bus: mhi: core: Fix invalid error returning in mhi_queue" + }, + "CVE-2021-47161": { + "cmt_msg": "spi: spi-fsl-dspi: Fix a resource leak in an error handling path" + }, + "CVE-2021-47160": { + "cmt_msg": "net: dsa: mt7530: fix VLAN traffic leaks" }, "CVE-2023-4385": { "cmt_msg": "fs: jfs: fix possible NULL pointer dereference in dbFree()" }, + "CVE-2021-46965": { + "cmt_msg": "mtd: physmap: physmap-bt1-rom: Fix unintentional stack access" + }, "CVE-2023-4387": { "cmt_msg": "net: vmxnet3: fix possible use-after-free bugs in vmxnet3_rq_alloc_rx_buf()" }, + "CVE-2021-46960": { + "cmt_msg": "cifs: Return correct error code from smb2_get_enc_key" + }, + "CVE-2021-46961": { + "cmt_msg": "irqchip/gic-v3: Do not enable irqs when handling spurious interrups" + }, + "CVE-2021-46962": { + "cmt_msg": "mmc: uniphier-sd: Fix a resource leak in the remove function" + }, + "CVE-2021-47168": { + "cmt_msg": "NFS: fix an incorrect limit in filelayout_decode_layout()" + }, "CVE-2019-19378": { "cmt_msg": "" }, + "CVE-2023-52482": { + "cmt_msg": "x86/srso: Add SRSO mitigation for Hygon processors" + }, + "CVE-2023-52599": { + "cmt_msg": "jfs: fix array-index-out-of-bounds in diNewExt" + }, + "CVE-2022-1016": { + "cmt_msg": "netfilter: nf_tables: initialize registers in nft_do_chain()" + }, "CVE-2020-4788": { "cmt_msg": "powerpc/64s: flush L1D on kernel entry" }, @@ -117194,6 +149468,9 @@ "CVE-2021-0937": { "cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write" }, + "CVE-2023-52621": { + "cmt_msg": "bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers" + }, "CVE-2022-1263": { "cmt_msg": "KVM: avoid NULL pointer dereference in kvm_dirty_ring_push" }, @@ -117212,6 +149489,9 @@ "CVE-2019-16746": { "cmt_msg": "nl80211: validate beacon head" }, + "CVE-2023-52623": { + "cmt_msg": "SUNRPC: Fix a suspicious RCU usage warning" + }, "CVE-2021-41864": { "cmt_msg": "bpf: Fix integer overflow in prealloc_elems_and_freelist()" }, @@ -117221,11 +149501,20 @@ "CVE-2022-2209": { "cmt_msg": "" }, + "CVE-2022-45887": { + "cmt_msg": "media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb()" + }, "CVE-2021-37576": { "cmt_msg": "KVM: PPC: Book3S: Fix H_RTAS rets buffer overflow" }, + "CVE-2023-52625": { + "cmt_msg": "drm/amd/display: Refactor DMCUB enter/exit idle interface" + }, + "CVE-2024-26775": { + "cmt_msg": "aoe: avoid potential deadlock at set_capacity" + }, "CVE-2023-7042": { - "cmt_msg": "" + "cmt_msg": "wifi: ath10k: fix NULL pointer dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev()" }, "CVE-2022-3594": { "cmt_msg": "r8152: Rate limit overflow messages" @@ -117243,11 +149532,14 @@ "cmt_msg": "tipc: fix NULL deref in tipc_link_xmit()" }, "CVE-2023-47233": { - "cmt_msg": "" + "cmt_msg": "wifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach" }, "CVE-2020-27815": { "cmt_msg": "jfs: Fix array index bounds check in dbAdjTree" }, + "CVE-2023-52629": { + "cmt_msg": "sh: push-switch: Reorder cleanup operations to avoid use-after-free bug" + }, "CVE-2022-23041": { "cmt_msg": "xen/9p: use alloc/free_pages_exact()" }, @@ -117257,24 +149549,51 @@ "CVE-2023-21400": { "cmt_msg": "" }, + "CVE-2024-26758": { + "cmt_msg": "md: Don't ignore suspended array in md_check_recovery()" + }, + "CVE-2024-26759": { + "cmt_msg": "mm/swap: fix race when skipping swapcache" + }, "CVE-2022-3115": { "cmt_msg": "drm: mali-dp: potential dereference of null pointer" }, "CVE-2023-6606": { "cmt_msg": "smb: client: fix OOB in smbCalcSize()" }, + "CVE-2024-26614": { + "cmt_msg": "tcp: make sure init the accept_queue's spinlocks once" + }, "CVE-2020-27777": { "cmt_msg": "powerpc/rtas: Restrict RTAS requests from userspace" }, "CVE-2019-20636": { "cmt_msg": "Input: add safety guards to input_set_keycode()" }, + "CVE-2023-52559": { + "cmt_msg": "iommu/vt-d: Avoid memory allocation in iommu_suspend()" + }, + "CVE-2024-26751": { + "cmt_msg": "ARM: ep93xx: Add terminator to gpiod_lookup_table" + }, + "CVE-2024-26752": { + "cmt_msg": "l2tp: pass correct message length to ip6_append_data" + }, "CVE-2020-27673": { "cmt_msg": "xen/events: add a proper barrier to 2-level uevent unmasking" }, + "CVE-2024-26754": { + "cmt_msg": "gtp: fix use-after-free and null-ptr-deref in gtp_genl_dump_pdp()" + }, "CVE-2020-27675": { "cmt_msg": "xen/events: avoid removing an event channel while handling it" }, + "CVE-2024-26756": { + "cmt_msg": "md: Don't register sync_thread for reshape directly" + }, + "CVE-2024-26757": { + "cmt_msg": "md: Don't ignore read-only array in md_check_recovery()" + }, "CVE-2023-52439": { "cmt_msg": "uio: Fix use-after-free in uio_open" }, @@ -117293,6 +149612,9 @@ "CVE-2022-23040": { "cmt_msg": "xen/xenbus: don't let xenbus_grant_ring() remove grants in error case" }, + "CVE-2024-26805": { + "cmt_msg": "netlink: Fix kernel-infoleak-after-free in __skb_datagram_iter" + }, "CVE-2022-3111": { "cmt_msg": "power: supply: wm8350-power: Add missing free in free_charger_irq" }, @@ -117338,6 +149660,9 @@ "CVE-2020-0432": { "cmt_msg": "staging: most: net: fix buffer overflow" }, + "CVE-2024-26687": { + "cmt_msg": "xen/events: close evtchn after mapping cleanup" + }, "CVE-2023-51779": { "cmt_msg": "Bluetooth: af_bluetooth: Fix Use-After-Free in bt_sock_recvmsg" }, @@ -117353,6 +149678,9 @@ "CVE-2010-4563": { "cmt_msg": "" }, + "CVE-2021-47006": { + "cmt_msg": "ARM: 9064/1: hw_breakpoint: Do not directly check the event's overflow_handler hook" + }, "CVE-2023-1249": { "cmt_msg": "coredump: Use the vma snapshot in fill_files_note" }, @@ -117371,15 +149699,21 @@ "CVE-2023-0266": { "cmt_msg": "ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF" }, - "CVE-2023-1838": { - "cmt_msg": "Fix double fget() in vhost_net_set_backend()" + "CVE-2021-46928": { + "cmt_msg": "parisc: Clear stale IIR value on instruction access rights trap" }, "CVE-2021-3483": { "cmt_msg": "firewire: nosy: Fix a use-after-free bug in nosy_ioctl()" }, + "CVE-2024-26663": { + "cmt_msg": "tipc: Check the bearer type before calling tipc_udp_nl_bearer_add()" + }, "CVE-2021-20177": { "cmt_msg": "netfilter: add and use nf_hook_slow_list()" }, + "CVE-2024-26598": { + "cmt_msg": "KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache" + }, "CVE-2023-6040": { "cmt_msg": "netfilter: nf_tables: Reject tables of unsupported family" }, @@ -117398,12 +149732,18 @@ "CVE-2022-24448": { "cmt_msg": "NFSv4: Handle case where the lookup of a directory fails" }, - "CVE-2024-26598": { - "cmt_msg": "KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache" + "CVE-2023-52498": { + "cmt_msg": "PM: sleep: Fix possible deadlocks in core system-wide PM code" + }, + "CVE-2024-26774": { + "cmt_msg": "ext4: avoid dividing by 0 in mb_update_avg_fragment_size() when block bitmap corrupt" }, "CVE-2021-4023": { "cmt_msg": "io-wq: fix cancellation on create-worker failure" }, + "CVE-2023-52640": { + "cmt_msg": "fs/ntfs3: Fix oob in ntfs_listxattr" + }, "CVE-2023-3268": { "cmt_msg": "relayfs: fix out-of-bounds access in relay_file_read" }, @@ -117416,14 +149756,26 @@ "CVE-2021-0399": { "cmt_msg": "" }, + "CVE-2023-52488": { + "cmt_msg": "serial: sc16is7xx: convert from _raw_ to _noinc_ regmap functions for FIFO" + }, "CVE-2020-36691": { "cmt_msg": "netlink: limit recursion depth in policy validation" }, + "CVE-2021-47179": { + "cmt_msg": "NFSv4: Fix a NULL pointer dereference in pnfs_mark_matching_lsegs_return()" + }, "CVE-2023-42755": { "cmt_msg": "net/sched: Retire rsvp classifier" }, - "CVE-2020-36516": { - "cmt_msg": "ipv4: avoid using shared IP generator for connected sockets" + "CVE-2020-2732": { + "cmt_msg": "KVM: nVMX: Don't emulate instructions in guest mode" + }, + "CVE-2023-52486": { + "cmt_msg": "drm: Don't unref the same fb many times by mistake due to deadlock handling" + }, + "CVE-2023-52480": { + "cmt_msg": "ksmbd: fix race condition between session lookup and expire" }, "CVE-2012-4542": { "cmt_msg": "" @@ -117431,8 +149783,11 @@ "CVE-2022-1729": { "cmt_msg": "perf: Fix sys_perf_event_open() race against self" }, - "CVE-2023-42752": { - "cmt_msg": "igmp: limit igmpv3_newpack() packet size to IP_MAX_MTU" + "CVE-2023-1838": { + "cmt_msg": "Fix double fget() in vhost_net_set_backend()" + }, + "CVE-2023-28328": { + "cmt_msg": "media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer()" }, "CVE-2023-4128": { "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free" @@ -117440,27 +149795,60 @@ "CVE-2021-3573": { "cmt_msg": "Bluetooth: use correct lock to prevent UAF of hdev object" }, + "CVE-2021-46921": { + "cmt_msg": "locking/qrwlock: Fix ordering in queued_write_lock_slowpath()" + }, "CVE-2023-3609": { "cmt_msg": "net/sched: cls_u32: Fix reference counter leak leading to overflow" }, + "CVE-2022-44033": { + "cmt_msg": "char: pcmcia: remove all the drivers" + }, "CVE-2022-1974": { "cmt_msg": "nfc: replace improper check device_is_registered() in netlink related functions" }, "CVE-2022-1975": { "cmt_msg": "NFC: netlink: fix sleep in atomic bug when firmware download timeout" }, + "CVE-2023-52491": { + "cmt_msg": "media: mtk-jpeg: Fix use after free bug due to error path handling in mtk_jpeg_dec_device_run" + }, + "CVE-2022-44032": { + "cmt_msg": "char: pcmcia: remove all the drivers" + }, + "CVE-2020-36777": { + "cmt_msg": "media: dvbdev: Fix memory leak in dvb_media_device_free()" + }, "CVE-2021-28972": { "cmt_msg": "PCI: rpadlpar: Fix potential drc_name corruption in store functions" }, + "CVE-2020-36775": { + "cmt_msg": "f2fs: fix to avoid potential deadlock" + }, + "CVE-2021-47083": { + "cmt_msg": "pinctrl: mediatek: fix global-out-of-bounds issue" + }, "CVE-2021-20292": { "cmt_msg": "drm/ttm/nouveau: don't call tt destroy callback on alloc failure." }, "CVE-2021-31916": { "cmt_msg": "dm ioctl: fix out of bounds array access when no devices" }, + "CVE-2021-47086": { + "cmt_msg": "phonet/pep: refuse to enable an unbound pipe" + }, "CVE-2022-32981": { "cmt_msg": "powerpc/32: Fix overread/overwrite of thread_struct via ptrace" }, + "CVE-2021-47122": { + "cmt_msg": "net: caif: fix memory leak in caif_device_notify" + }, + "CVE-2021-47121": { + "cmt_msg": "net: caif: fix memory leak in cfusbl_device_notify" + }, + "CVE-2021-47120": { + "cmt_msg": "HID: magicmouse: fix NULL-deref on disconnect" + }, "CVE-2022-1280": { "cmt_msg": "drm: avoid circular locks in drm_mode_getconnector" }, @@ -117482,9 +149870,18 @@ "CVE-2023-0394": { "cmt_msg": "ipv6: raw: Deduct extension header length in rawv6_push_pending_frames" }, + "CVE-2021-47171": { + "cmt_msg": "net: usb: fix memory leak in smsc75xx_bind" + }, "CVE-2020-10690": { "cmt_msg": "ptp: fix the race between the release of ptp_clock and cdev" }, + "CVE-2024-26615": { + "cmt_msg": "net/smc: fix illegal rmb_desc access in SMC-D connection dump" + }, + "CVE-2024-26669": { + "cmt_msg": "net/sched: flower: Fix chain template offload" + }, "CVE-2022-3108": { "cmt_msg": "drm/amdkfd: Check for null pointer after calling kmemdup" }, @@ -117512,6 +149909,9 @@ "CVE-2020-3702": { "cmt_msg": "ath: Use safer key clearing with key cache entries" }, + "CVE-2023-52485": { + "cmt_msg": "drm/amd/display: Wake DMCUB before sending a command" + }, "CVE-2021-3653": { "cmt_msg": "KVM: nSVM: avoid picking up unsupported bits from L2 in int_ctl (CVE-2021-3653)" }, @@ -117539,6 +149939,9 @@ "CVE-2021-3714": { "cmt_msg": "" }, + "CVE-2021-46932": { + "cmt_msg": "Input: appletouch - initialize work before device registration" + }, "CVE-2019-16230": { "cmt_msg": "drm/amdkfd: fix a potential NULL pointer dereference (v2)" }, @@ -117602,26 +150005,56 @@ "CVE-2022-33744": { "cmt_msg": "xen/arm: Fix race in RB-tree based P2M accounting" }, + "CVE-2023-52596": { + "cmt_msg": "sysctl: Fix out of bounds access for empty sysctl registers" + }, + "CVE-2023-52597": { + "cmt_msg": "KVM: s390: fix setting of fpc register" + }, + "CVE-2021-47015": { + "cmt_msg": "bnxt_en: Fix RX consumer index logic in the error path." + }, "CVE-2022-40768": { "cmt_msg": "scsi: stex: Properly zero out the passthrough command structure" }, + "CVE-2021-47013": { + "cmt_msg": "net:emac/emac-mac: Fix a use after free in emac_mac_tx_buf_send" + }, "CVE-2022-2327": { "cmt_msg": "io_uring: remove any grabbing of context" }, + "CVE-2021-47158": { + "cmt_msg": "net: dsa: sja1105: add error handling in sja1105_setup()" + }, + "CVE-2021-47010": { + "cmt_msg": "net: Only allow init netns to set default tcp cong to a restricted algo" + }, "CVE-2021-45486": { "cmt_msg": "inet: use bigger hash table for IP ID generation" }, "CVE-2020-12888": { "cmt_msg": "vfio-pci: Invalidate mmaps and block MMIO access on disabled memory" }, - "CVE-2023-2194": { - "cmt_msg": "i2c: xgene-slimpro: Fix out-of-bounds bug in xgene_slimpro_i2c_xfer()" + "CVE-2021-47153": { + "cmt_msg": "i2c: i801: Don't generate an interrupt on bus reset" + }, + "CVE-2021-47150": { + "cmt_msg": "net: fec: fix the potential memory leak in fec_enet_init()" }, "CVE-2021-3923": { "cmt_msg": "RDMA/core: Don't infoleak GRH fields" }, - "CVE-2022-41218": { - "cmt_msg": "media: dvb-core: Fix UAF due to refcount races at releasing" + "CVE-2021-46936": { + "cmt_msg": "net: fix use-after-free in tw_timer_handler" + }, + "CVE-2021-46935": { + "cmt_msg": "binder: fix async_free_space accounting for empty parcels" + }, + "CVE-2021-46934": { + "cmt_msg": "i2c: validate user data in compat ioctl" + }, + "CVE-2021-46933": { + "cmt_msg": "usb: gadget: f_fs: Clear ffs_eventfd in ffs_data_clear." }, "CVE-2019-20934": { "cmt_msg": "sched/fair: Don't free p->numa_faults with concurrent readers" @@ -117638,11 +150071,17 @@ "CVE-2021-0448": { "cmt_msg": "netfilter: ctnetlink: add a range check for l3/l4 protonum" }, - "CVE-2022-21166": { - "cmt_msg": "x86/speculation/mmio: Enable CPU Fill buffer clearing on idle" + "CVE-2021-47103": { + "cmt_msg": "inet: fully convert sk->sk_rx_dst to RCU rules" + }, + "CVE-2021-46939": { + "cmt_msg": "tracing: Restructure trace_clock_global() to never block" + }, + "CVE-2021-46938": { + "cmt_msg": "dm rq: fix double free of blk_mq_tag_set in dev remove after table load fails" }, "CVE-2024-0841": { - "cmt_msg": "" + "cmt_msg": "fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super" }, "CVE-2023-52449": { "cmt_msg": "mtd: Fix gluebi NULL pointer dereference caused by ftl notifier" @@ -117653,6 +150092,9 @@ "CVE-2019-18806": { "cmt_msg": "net: qlogic: Fix memory leak in ql_alloc_large_buffers" }, + "CVE-2023-4010": { + "cmt_msg": "" + }, "CVE-2020-36558": { "cmt_msg": "vt: vt_ioctl: fix race in VT_RESIZEX" }, @@ -117698,8 +150140,8 @@ "CVE-2022-1195": { "cmt_msg": "hamradio: improve the incomplete fix to avoid NPD" }, - "CVE-2024-22099": { - "cmt_msg": "" + "CVE-2023-3863": { + "cmt_msg": "net: nfc: Fix use-after-free caused by nfc_llcp_find_local" }, "CVE-2021-4202": { "cmt_msg": "NFC: reorganize the functions in nci_request" @@ -117707,21 +150149,39 @@ "CVE-2021-4203": { "cmt_msg": "af_unix: fix races in sk_peer_pid and sk_peer_cred accesses" }, - "CVE-2022-45887": { - "cmt_msg": "media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb()" + "CVE-2022-4269": { + "cmt_msg": "act_mirred: use the backlog for nested calls to mirred ingress" }, "CVE-2022-45886": { "cmt_msg": "media: dvb-core: Fix use-after-free due on race condition at dvb_net" }, + "CVE-2023-52509": { + "cmt_msg": "ravb: Fix use-after-free issue in ravb_tx_timeout_work()" + }, "CVE-2023-46343": { "cmt_msg": "nfc: nci: fix possible NULL pointer dereference in send_acknowledge()" }, "CVE-2024-25744": { "cmt_msg": "x86/coco: Disable 32-bit emulation by default on TDX and SEV" }, + "CVE-2023-52504": { + "cmt_msg": "x86/alternatives: Disable KASAN in apply_alternatives()" + }, + "CVE-2023-52507": { + "cmt_msg": "nfc: nci: assert requested protocol is valid" + }, "CVE-2023-2124": { "cmt_msg": "xfs: verify buffer contents when we skip log replay" }, + "CVE-2023-52501": { + "cmt_msg": "ring-buffer: Do not attempt to read past \"commit\"" + }, + "CVE-2023-52500": { + "cmt_msg": "scsi: pm80xx: Avoid leaking tags when processing OPC_INB_SET_CONTROLLER_CONFIG command" + }, + "CVE-2023-52502": { + "cmt_msg": "net: nfc: fix races in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn()" + }, "CVE-2023-1281": { "cmt_msg": "net/sched: tcindex: update imperfect hash filters respecting rcu" }, @@ -117746,9 +150206,21 @@ "CVE-2022-27672": { "cmt_msg": "x86/speculation: Identify processors vulnerable to SMT RSB predictions" }, + "CVE-2024-26623": { + "cmt_msg": "pds_core: Prevent race issues involving the adminq" + }, + "CVE-2024-26668": { + "cmt_msg": "netfilter: nft_limit: reject configurations that cause integer overflow" + }, "CVE-2022-2964": { "cmt_msg": "net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup" }, + "CVE-2021-47146": { + "cmt_msg": "mld: fix panic in mld_newpack()" + }, + "CVE-2022-38457": { + "cmt_msg": "drm/vmwgfx: Remove rcu locks from user resources" + }, "CVE-2015-2877": { "cmt_msg": "" }, @@ -117758,6 +150230,12 @@ "CVE-2023-26242": { "cmt_msg": "" }, + "CVE-2024-26664": { + "cmt_msg": "hwmon: (coretemp) Fix out-of-bounds memory access" + }, + "CVE-2024-26688": { + "cmt_msg": "fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super" + }, "CVE-2019-16089": { "cmt_msg": "" }, @@ -117767,12 +150245,18 @@ "CVE-2021-38199": { "cmt_msg": "NFSv4: Initialise connection to the server in nfs4_alloc_client()" }, + "CVE-2024-26689": { + "cmt_msg": "ceph: prevent use-after-free in encode_cap_msg()" + }, "CVE-2022-1679": { "cmt_msg": "ath9k: fix use-after-free in ath9k_hif_usb_rx_cb" }, "CVE-2023-34256": { "cmt_msg": "ext4: avoid a potential slab-out-of-bounds in ext4_group_desc_csum" }, + "CVE-2024-26763": { + "cmt_msg": "dm-crypt: don't modify the data when using authenticated encryption" + }, "CVE-2023-1513": { "cmt_msg": "kvm: initialize all of the kvm_debugregs structure before sending it to userspace" }, @@ -117821,9 +150305,21 @@ "CVE-2023-23039": { "cmt_msg": "" }, + "CVE-2024-26733": { + "cmt_msg": "arp: Prevent overflow in arp_req_get()." + }, + "CVE-2024-26719": { + "cmt_msg": "nouveau: offload fence uevents work to workqueue" + }, + "CVE-2024-26715": { + "cmt_msg": "usb: dwc3: gadget: Fix NULL pointer dereference in dwc3_gadget_suspend" + }, "CVE-2024-1312": { "cmt_msg": "mm: lock_vma_under_rcu() must check vma->anon_vma under vma lock" }, + "CVE-2024-26713": { + "cmt_msg": "powerpc/pseries/iommu: Fix iommu initialisation during DLPAR add" + }, "CVE-2023-3338": { "cmt_msg": "Remove DECnet support from kernel" }, @@ -118091,6 +150587,12 @@ "CVE-2020-35508": { "cmt_msg": "fork: fix copy_process(CLONE_PARENT) race with the exiting ->real_parent" }, + "CVE-2021-47177": { + "cmt_msg": "iommu/vt-d: Fix sysfs leak in alloc_iommu()" + }, + "CVE-2024-26686": { + "cmt_msg": "fs/proc: do_task_stat: use sig->stats_lock to gather the threads/children stats" + }, "CVE-2022-2938": { "cmt_msg": "psi: Fix uaf issue when psi trigger is destroyed while being polled" }, @@ -118121,15 +150623,33 @@ "CVE-2021-3752": { "cmt_msg": "Bluetooth: fix use-after-free error in lock_sock_nested()" }, + "CVE-2024-26704": { + "cmt_msg": "ext4: fix double-free of blocks due to wrong extents moved_len" + }, "CVE-2023-3268": { "cmt_msg": "relayfs: fix out-of-bounds access in relay_file_read" }, + "CVE-2023-52615": { + "cmt_msg": "hwrng: core - Fix page fault dead lock on mmap-ed hwrng" + }, + "CVE-2023-52614": { + "cmt_msg": "PM / devfreq: Fix buffer overflow in trans_stat_show" + }, + "CVE-2023-52617": { + "cmt_msg": "PCI: switchtec: Fix stdev_release() crash after surprise hot remove" + }, + "CVE-2023-52474": { + "cmt_msg": "IB/hfi1: Fix bugs with non-PAGE_SIZE-end multi-iovec user SDMA requests" + }, "CVE-2020-24587": { "cmt_msg": "mac80211: prevent mixed key and fragment cache attacks" }, "CVE-2020-24586": { "cmt_msg": "mac80211: prevent mixed key and fragment cache attacks" }, + "CVE-2023-52612": { + "cmt_msg": "crypto: scomp - fix req->dst buffer overflow" + }, "CVE-2022-3105": { "cmt_msg": "RDMA/uverbs: Check for null return of kmalloc_array" }, @@ -118142,6 +150662,9 @@ "CVE-2022-47520": { "cmt_msg": "wifi: wilc1000: validate pairwise and authentication suite offsets" }, + "CVE-2023-52618": { + "cmt_msg": "block/rnbd-srv: Check for unlikely string overflow" + }, "CVE-2019-19602": { "cmt_msg": "x86/fpu: Don't cache access to fpu_fpregs_owner_ctx" }, @@ -118169,6 +150692,9 @@ "CVE-2022-42703": { "cmt_msg": "mm/rmap: Fix anon_vma->degree ambiguity leading to double-reuse" }, + "CVE-2021-47059": { + "cmt_msg": "crypto: sun8i-ss - fix result memory leak on error path" + }, "CVE-2022-23825": { "cmt_msg": "" }, @@ -118178,23 +150704,53 @@ "CVE-2020-35501": { "cmt_msg": "" }, + "CVE-2021-47051": { + "cmt_msg": "spi: fsl-lpspi: Fix PM reference leak in lpspi_prepare_xfer_hardware()" + }, "CVE-2023-42754": { "cmt_msg": "ipv4: fix null-deref in ipv4_link_failure" }, - "CVE-2024-26588": { - "cmt_msg": "LoongArch: BPF: Prevent out-of-bounds memory access" + "CVE-2021-47056": { + "cmt_msg": "crypto: qat - ADF_STATUS_PF_RUNNING should be set after adf_dev_init" + }, + "CVE-2021-47054": { + "cmt_msg": "bus: qcom: Put child node before return" + }, + "CVE-2021-47112": { + "cmt_msg": "x86/kvm: Teardown PV features on boot CPU as well" + }, + "CVE-2021-47113": { + "cmt_msg": "btrfs: abort in rename_exchange if we fail to insert the second ref" + }, + "CVE-2021-47110": { + "cmt_msg": "x86/kvm: Disable kvmclock on all CPUs on shutdown" + }, + "CVE-2021-47116": { + "cmt_msg": "ext4: fix memory leak in ext4_mb_init_backend on error path." + }, + "CVE-2021-47117": { + "cmt_msg": "ext4: fix bug on in ext4_es_cache_extent as ext4_split_extent_at failed" + }, + "CVE-2021-47114": { + "cmt_msg": "ocfs2: fix data corruption by fallocate" }, "CVE-2022-21125": { "cmt_msg": "x86/speculation/mmio: Reuse SRBDS mitigation for SBDS" }, + "CVE-2021-47118": { + "cmt_msg": "pid: take a reference when initializing `cad_pid`" + }, + "CVE-2021-46970": { + "cmt_msg": "bus: mhi: pci_generic: Remove WQ_MEM_RECLAIM flag from state workqueue" + }, "CVE-2019-19241": { "cmt_msg": "io_uring: async workers should inherit the user creds" }, "CVE-2022-40307": { "cmt_msg": "efi: capsule-loader: Fix use-after-free in efi_capsule_write" }, - "CVE-2022-21123": { - "cmt_msg": "x86/speculation/mmio: Add mitigation for Processor MMIO Stale Data" + "CVE-2021-46974": { + "cmt_msg": "bpf: Fix masking negation logic upon negative dst register" }, "CVE-2021-28688": { "cmt_msg": "xen-blkback: don't leak persistent grants from xen_blkbk_map()" @@ -118217,12 +150773,18 @@ "CVE-2021-1048": { "cmt_msg": "fix regression in \"epoll: Keep a reference on files added to the check list\"" }, + "CVE-2024-26774": { + "cmt_msg": "ext4: avoid dividing by 0 in mb_update_avg_fragment_size() when block bitmap corrupt" + }, "CVE-2023-0459": { "cmt_msg": "uaccess: Add speculation barrier to copy_from_user()" }, "CVE-2023-0458": { "cmt_msg": "prlimit: do_prlimit needs to have a speculation check" }, + "CVE-2023-52565": { + "cmt_msg": "media: uvcvideo: Fix OOB read" + }, "CVE-2023-0597": { "cmt_msg": "x86/mm: Randomize per-cpu entry area" }, @@ -118253,8 +150815,8 @@ "CVE-2022-3628": { "cmt_msg": "wifi: brcmfmac: Fix potential buffer overflow in brcmf_fweh_event_worker()" }, - "CVE-2024-26591": { - "cmt_msg": "bpf: Fix re-attachment branch in bpf_tracing_prog_attach" + "CVE-2023-52515": { + "cmt_msg": "RDMA/srp: Do not call scsi_done() from srp_abort()" }, "CVE-2020-15802": { "cmt_msg": "" @@ -118286,15 +150848,27 @@ "CVE-2022-3202": { "cmt_msg": "jfs: prevent NULL deref in diFree" }, + "CVE-2024-25739": { + "cmt_msg": "" + }, + "CVE-2021-47028": { + "cmt_msg": "mt76: mt7915: fix txrate reporting" + }, "CVE-2022-2602": { "cmt_msg": "io_uring/af_unix: defer registered files gc to io_uring release" }, "CVE-2024-26585": { "cmt_msg": "tls: fix race between tx work scheduling and socket close" }, + "CVE-2021-47024": { + "cmt_msg": "vsock/virtio: free queued packets when closing socket" + }, "CVE-2023-3358": { "cmt_msg": "HID: intel_ish-hid: Add check for ishtp_dma_tx_map" }, + "CVE-2021-47020": { + "cmt_msg": "soundwire: stream: fix memory leak in stream config error path" + }, "CVE-2024-26584": { "cmt_msg": "net: tls: handle backlogging of crypto requests" }, @@ -118304,8 +150878,17 @@ "CVE-2023-39189": { "cmt_msg": "netfilter: nfnetlink_osf: avoid OOB read" }, - "CVE-2023-2002": { - "cmt_msg": "bluetooth: Perform careful capability checks in hci_sock_ioctl()" + "CVE-2021-46908": { + "cmt_msg": "bpf: Use correct permission flag for mixed signed bounds arithmetic" + }, + "CVE-2021-46909": { + "cmt_msg": "ARM: footbridge: fix PCI interrupt mapping" + }, + "CVE-2021-46906": { + "cmt_msg": "HID: usbhid: fix info leak in hid_submit_ctrl" + }, + "CVE-2021-46904": { + "cmt_msg": "net: hso: fix null-ptr-deref during tty device unregistration" }, "CVE-2022-1247": { "cmt_msg": "" @@ -118358,9 +150941,24 @@ "CVE-2023-1073": { "cmt_msg": "HID: check empty report_list in hid_validate_values()" }, + "CVE-2024-26747": { + "cmt_msg": "usb: roles: fix NULL pointer issue when put module's reference" + }, + "CVE-2023-52527": { + "cmt_msg": "ipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data()" + }, + "CVE-2024-26745": { + "cmt_msg": "powerpc/pseries/iommu: IOMMU table is not initialized for kdump over SR-IOV" + }, "CVE-2023-51042": { "cmt_msg": "drm/amdgpu: Fix potential fence use-after-free v2" }, + "CVE-2024-26743": { + "cmt_msg": "RDMA/qedr: Fix qedr_create_user_qp error flow" + }, + "CVE-2023-52566": { + "cmt_msg": "nilfs2: fix potential use after free in nilfs_gccache_submit_read_data()" + }, "CVE-2023-3006": { "cmt_msg": "arm64: Add AMPERE1 to the Spectre-BHB affected list" }, @@ -118421,6 +151019,9 @@ "CVE-2019-19070": { "cmt_msg": "spi: gpio: prevent memory leak in spi_gpio_probe" }, + "CVE-2024-26699": { + "cmt_msg": "drm/amd/display: Fix array-index-out-of-bounds in dcn35_clkmgr" + }, "CVE-2023-42753": { "cmt_msg": "netfilter: ipset: add the missing IP_SET_HASH_WITH_NET0 macro for ip_set_hash_netportnet.c" }, @@ -118433,6 +151034,9 @@ "CVE-2022-20154": { "cmt_msg": "sctp: use call_rcu to free endpoint" }, + "CVE-2024-26691": { + "cmt_msg": "KVM: arm64: Fix circular locking dependency" + }, "CVE-2021-45868": { "cmt_msg": "quota: check block number when reading the block in quota file" }, @@ -118448,9 +151052,15 @@ "CVE-2024-0565": { "cmt_msg": "smb: client: fix OOB in receive_encrypted_standard()" }, + "CVE-2024-26697": { + "cmt_msg": "nilfs2: fix data corruption in dsync block recovery for small block sizes" + }, "CVE-2020-0404": { "cmt_msg": "media: uvcvideo: Avoid cyclic entity chains due to malformed USB descriptors" }, + "CVE-2024-26633": { + "cmt_msg": "ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim()" + }, "CVE-2023-2176": { "cmt_msg": "RDMA/core: Refactor rdma_bind_addr" }, @@ -118481,6 +151091,9 @@ "CVE-2020-25645": { "cmt_msg": "geneve: add transport ports in route lookup for geneve" }, + "CVE-2024-26788": { + "cmt_msg": "dmaengine: fsl-qdma: init irq after reg initialization" + }, "CVE-2020-25643": { "cmt_msg": "hdlc_ppp: add range checks in ppp_cp_parse_cr()" }, @@ -118490,6 +151103,9 @@ "CVE-2005-3660": { "cmt_msg": "" }, + "CVE-2023-52619": { + "cmt_msg": "pstore/ram: Fix crash when setting number of cpus to an odd number" + }, "CVE-2023-31085": { "cmt_msg": "ubi: Refuse attaching if mtd's erasesize is 0" }, @@ -118520,8 +151136,11 @@ "CVE-2020-27068": { "cmt_msg": "cfg80211: add missing policy for NL80211_ATTR_STATUS_CODE" }, - "CVE-2024-23307": { - "cmt_msg": "" + "CVE-2024-0646": { + "cmt_msg": "net: tls, update curr on splice as well" + }, + "CVE-2023-52598": { + "cmt_msg": "s390/ptrace: handle setting of fpc register correctly" }, "CVE-2020-15436": { "cmt_msg": "block: Fix use-after-free in blkdev_get()" @@ -118529,6 +151148,9 @@ "CVE-2022-32296": { "cmt_msg": "tcp: increase source port perturb table to 2^16" }, + "CVE-2024-26789": { + "cmt_msg": "crypto: arm64/neonbs - fix out-of-bounds access on short input" + }, "CVE-2020-28974": { "cmt_msg": "vt: Disable KD_FONT_OP_COPY" }, @@ -118553,12 +151175,18 @@ "CVE-2019-19082": { "cmt_msg": "drm/amd/display: prevent memory leak" }, + "CVE-2024-26655": { + "cmt_msg": "Fix memory leak in posix_clock_open()" + }, "CVE-2021-3564": { "cmt_msg": "Bluetooth: fix the erroneous flush_work() order" }, "CVE-2023-3611": { "cmt_msg": "net/sched: sch_qfq: account for stab overhead in qfq_enqueue" }, + "CVE-2022-48627": { + "cmt_msg": "vt: fix memory overlapping when deleting chars in the buffer" + }, "CVE-2023-4132": { "cmt_msg": "media: usb: siano: Fix warning due to null work_func_t function pointer" }, @@ -118580,6 +151208,9 @@ "CVE-2022-0185": { "cmt_msg": "vfs: fs_context: fix up param length parsing in legacy_parse_param" }, + "CVE-2023-42752": { + "cmt_msg": "igmp: limit igmpv3_newpack() packet size to IP_MAX_MTU" + }, "CVE-2022-23816": { "cmt_msg": "x86/kvm/vmx: Make noinstr clean" }, @@ -118598,12 +151229,21 @@ "CVE-2023-39194": { "cmt_msg": "net: xfrm: Fix xfrm_address_filter OOB read" }, + "CVE-2023-2002": { + "cmt_msg": "bluetooth: Perform careful capability checks in hci_sock_ioctl()" + }, "CVE-2023-39197": { "cmt_msg": "netfilter: conntrack: dccp: copy entire header to stack buffer, not just basic one" }, + "CVE-2023-52489": { + "cmt_msg": "mm/sparsemem: fix race in accessing memory_section->usage" + }, "CVE-2021-28964": { "cmt_msg": "btrfs: fix race when cloning extent buffer during rewind of an old root" }, + "CVE-2023-52584": { + "cmt_msg": "spmi: mediatek: Fix UAF on device remove" + }, "CVE-2020-13974": { "cmt_msg": "vt: keyboard: avoid signed integer overflow in k_ascii" }, @@ -118613,6 +151253,9 @@ "CVE-2023-33288": { "cmt_msg": "power: supply: bq24190: Fix use after free bug in bq24190_remove due to race condition" }, + "CVE-2023-52484": { + "cmt_msg": "iommu/arm-smmu-v3: Fix soft lockup triggered by arm_smmu_mm_invalidate_range" + }, "CVE-2022-29900": { "cmt_msg": "x86/kvm/vmx: Make noinstr clean" }, @@ -118628,6 +151271,9 @@ "CVE-2020-10751": { "cmt_msg": "selinux: properly handle multiple messages in selinux_netlink_send()" }, + "CVE-2022-3567": { + "cmt_msg": "ipv6: Fix data races around sk->sk_prot." + }, "CVE-2023-39192": { "cmt_msg": "netfilter: xt_u32: validate user space input" }, @@ -118640,6 +151286,9 @@ "CVE-2023-35828": { "cmt_msg": "usb: gadget: udc: renesas_usb3: Fix use after free bug in renesas_usb3_remove due to race condition" }, + "CVE-2022-20166": { + "cmt_msg": "drivers core: Use sysfs_emit and sysfs_emit_at for show(device *...) functions" + }, "CVE-2020-8649": { "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region" }, @@ -118652,9 +151301,15 @@ "CVE-2021-28660": { "cmt_msg": "staging: rtl8188eu: prevent ->ssid overflow in rtw_wx_set_scan()" }, + "CVE-2024-26645": { + "cmt_msg": "tracing: Ensure visibility when inserting an element into tracing_map" + }, "CVE-2020-8647": { "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region" }, + "CVE-2022-3564": { + "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free caused by l2cap_reassemble_sdu" + }, "CVE-2019-0155": { "cmt_msg": "drm/i915: Rename gen7 cmdparser tables" }, @@ -118664,11 +151319,23 @@ "CVE-2023-35827": { "cmt_msg": "ravb: Fix use-after-free issue in ravb_tx_timeout_work()" }, - "CVE-2022-4269": { - "cmt_msg": "act_mirred: use the backlog for nested calls to mirred ingress" + "CVE-2023-52481": { + "cmt_msg": "arm64: errata: Add Cortex-A520 speculative unprivileged load workaround" }, - "CVE-2022-3567": { - "cmt_msg": "ipv6: Fix data races around sk->sk_prot." + "CVE-2023-52585": { + "cmt_msg": "drm/amdgpu: Fix possible NULL dereference in amdgpu_ras_query_error_status_helper()" + }, + "CVE-2021-47063": { + "cmt_msg": "drm: bridge/panel: Cleanup connector on bridge detach" + }, + "CVE-2023-52587": { + "cmt_msg": "IB/ipoib: Fix mcast list locking" + }, + "CVE-2023-52586": { + "cmt_msg": "drm/msm/dpu: Add mutex lock in control vblank irq" + }, + "CVE-2021-47149": { + "cmt_msg": "net: fujitsu: fix potential null-ptr-deref" }, "CVE-2022-3566": { "cmt_msg": "tcp: Fix data races around icsk->icsk_af_ops." @@ -118676,15 +151343,42 @@ "CVE-2022-3565": { "cmt_msg": "mISDN: fix use-after-free bugs in l1oip timer handlers" }, - "CVE-2022-3564": { - "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free caused by l2cap_reassemble_sdu" + "CVE-2021-47065": { + "cmt_msg": "rtw88: Fix array overrun in rtw_get_tx_power_params()" }, "CVE-2020-36386": { "cmt_msg": "Bluetooth: Fix slab-out-of-bounds read in hci_extended_inquiry_result_evt()" }, + "CVE-2021-47144": { + "cmt_msg": "drm/amd/amdgpu: fix refcount leak" + }, + "CVE-2021-47147": { + "cmt_msg": "ptp: ocp: Fix a resource leak in an error handling path" + }, "CVE-2020-36385": { "cmt_msg": "RDMA/ucma: Rework ucma_migrate_id() to avoid races with destroy" }, + "CVE-2023-52589": { + "cmt_msg": "media: rkisp1: Fix IRQ disable race issue" + }, + "CVE-2021-47140": { + "cmt_msg": "iommu/amd: Clear DMA ops when switching domain" + }, + "CVE-2021-47143": { + "cmt_msg": "net/smc: remove device from smcd_dev_list after failed device_add()" + }, + "CVE-2021-47142": { + "cmt_msg": "drm/amdgpu: Fix a use-after-free" + }, + "CVE-2021-46943": { + "cmt_msg": "media: staging/intel-ipu3: Fix set_fmt error handling" + }, + "CVE-2021-47145": { + "cmt_msg": "btrfs: do not BUG_ON in link_to_fixup_dir" + }, + "CVE-2021-46941": { + "cmt_msg": "usb: dwc3: core: Do core softreset when switch mode" + }, "CVE-2020-0009": { "cmt_msg": "staging: android: ashmem: Disallow ashmem memory from being remapped" }, @@ -118694,12 +151388,24 @@ "CVE-2023-28466": { "cmt_msg": "net: tls: fix possible race condition between do_tls_getsockopt_conf() and do_tls_setsockopt_conf()" }, + "CVE-2023-52588": { + "cmt_msg": "f2fs: fix to tag gcing flag on page during block migration" + }, "CVE-2019-14615": { "cmt_msg": "drm/i915/gen9: Clear residual context state on context switch" }, "CVE-2022-2503": { "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag" }, + "CVE-2023-52578": { + "cmt_msg": "net: bridge: use DEV_STATS_INC()" + }, + "CVE-2021-47052": { + "cmt_msg": "crypto: sa2ul - Fix memory leak of rxd" + }, + "CVE-2023-52438": { + "cmt_msg": "binder: fix use-after-free in shinker's callback" + }, "CVE-2021-3635": { "cmt_msg": "netfilter: nf_tables: fix flowtable list del corruption" }, @@ -118721,6 +151427,9 @@ "CVE-2019-17666": { "cmt_msg": "rtlwifi: Fix potential overflow on P2P code" }, + "CVE-2024-26763": { + "cmt_msg": "dm-crypt: don't modify the data when using authenticated encryption" + }, "CVE-2021-34693": { "cmt_msg": "can: bcm: fix infoleak in struct bcm_msg_head" }, @@ -118733,21 +151442,45 @@ "CVE-2020-0444": { "cmt_msg": "audit: fix error handling in audit_data_to_entry()" }, + "CVE-2024-23849": { + "cmt_msg": "net/rds: Fix UBSAN: array-index-out-of-bounds in rds_cmsg_recv" + }, "CVE-2022-1419": { "cmt_msg": "drm/vgem: Close use-after-free race in vgem_gem_create" }, - "CVE-2022-1836": { - "cmt_msg": "floppy: disable FDRAWCMD by default" + "CVE-2021-47125": { + "cmt_msg": "sch_htb: fix refcount leak in htb_parent_to_leaf_offload" + }, + "CVE-2024-26797": { + "cmt_msg": "drm/amd/display: Prevent potential buffer overflow in map_hw_resources" + }, + "CVE-2024-26790": { + "cmt_msg": "dmaengine: fsl-qdma: fix SoC may hang on 16 byte unaligned read" + }, + "CVE-2021-46944": { + "cmt_msg": "media: staging/intel-ipu3: Fix memory leak in imu_fmt" }, "CVE-2020-11884": { "cmt_msg": "s390/mm: fix page table upgrade vs 2ndary address mode accesses" }, + "CVE-2024-26793": { + "cmt_msg": "gtp: fix use-after-free and null-ptr-deref in gtp_newlink()" + }, + "CVE-2023-52530": { + "cmt_msg": "wifi: mac80211: fix potential key use-after-free" + }, "CVE-2021-32078": { "cmt_msg": "ARM: footbridge: remove personal server platform" }, + "CVE-2023-52532": { + "cmt_msg": "net: mana: Fix TX CQE error handling" + }, "CVE-2022-30594": { "cmt_msg": "ptrace: Check PTRACE_O_SUSPEND_SECCOMP permission on PTRACE_SEIZE" }, + "CVE-2024-26798": { + "cmt_msg": "fbcon: always restore the old font data in fbcon_do_set_font()" + }, "CVE-2022-4662": { "cmt_msg": "USB: core: Prevent nested device-reset calls" }, @@ -118775,6 +151508,9 @@ "CVE-2021-38208": { "cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect" }, + "CVE-2024-26677": { + "cmt_msg": "rxrpc: Fix delayed ACKs to not set the reference serial number" + }, "CVE-2020-25211": { "cmt_msg": "netfilter: ctnetlink: add a range check for l3/l4 protonum" }, @@ -118787,9 +151523,18 @@ "CVE-2020-26557": { "cmt_msg": "" }, + "CVE-2022-48619": { + "cmt_msg": "Input: add bounds checking to input_set_capability()" + }, "CVE-2020-26555": { "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical" }, + "CVE-2024-26776": { + "cmt_msg": "spi: hisi-sfc-v3xx: Return IRQ_NONE if no interrupts were detected" + }, + "CVE-2024-26777": { + "cmt_msg": "fbdev: sis: Error out if pixclock equals zero" + }, "CVE-2019-20794": { "cmt_msg": "" }, @@ -118799,24 +151544,36 @@ "CVE-2023-3397": { "cmt_msg": "" }, + "CVE-2021-47082": { + "cmt_msg": "tun: avoid double free in tun_free_netdev" + }, + "CVE-2024-26679": { + "cmt_msg": "inet: read sk->sk_family once in inet_recv_error()" + }, + "CVE-2024-26771": { + "cmt_msg": "dmaengine: ti: edma: Add some null pointer checks to the edma_probe" + }, "CVE-2023-3117": { "cmt_msg": "netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE" }, + "CVE-2021-47128": { + "cmt_msg": "bpf, lockdown, audit: Fix buggy SELinux lockdown permission checks" + }, "CVE-2022-26365": { "cmt_msg": "xen/blkfront: fix leaking data in shared pages" }, "CVE-2023-52458": { "cmt_msg": "block: add check that partition length needs to be aligned with block size" }, - "CVE-2023-52457": { - "cmt_msg": "serial: 8250: omap: Don't skip resource freeing if pm_runtime_resume_and_get() failed" - }, "CVE-2018-1121": { "cmt_msg": "" }, "CVE-2023-52454": { "cmt_msg": "nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length" }, + "CVE-2023-28746": { + "cmt_msg": "x86/mmio: Disable KVM mitigation when X86_FEATURE_CLEAR_CPU_BUF is set" + }, "CVE-2023-52451": { "cmt_msg": "powerpc/pseries/memhp: Fix access beyond end of drmem array" }, @@ -118826,6 +151583,9 @@ "CVE-2019-19045": { "cmt_msg": "net/mlx5: prevent memory leak in mlx5_fpga_conn_create_cq" }, + "CVE-2024-26602": { + "cmt_msg": "sched/membarrier: reduce the ability to hammer on sys_membarrier" + }, "CVE-2024-1086": { "cmt_msg": "netfilter: nf_tables: reject QUEUE/DROP verdict parameters" }, @@ -118853,9 +151613,18 @@ "CVE-2020-27786": { "cmt_msg": "ALSA: rawmidi: Fix racy buffer resize under concurrent accesses" }, + "CVE-2024-26702": { + "cmt_msg": "iio: magnetometer: rm3100: add boundary check for the value read from RM3100_REG_TMRC" + }, "CVE-2023-6240": { "cmt_msg": "" }, + "CVE-2022-21123": { + "cmt_msg": "x86/speculation/mmio: Add mitigation for Processor MMIO Stale Data" + }, + "CVE-2024-26706": { + "cmt_msg": "parisc: Fix random data corruption from exception handler" + }, "CVE-2023-23559": { "cmt_msg": "wifi: rndis_wlan: Prevent buffer overflow in rndis_query_oid" }, @@ -118871,6 +151640,9 @@ "CVE-2023-32233": { "cmt_msg": "netfilter: nf_tables: deactivate anonymous set from preparation phase" }, + "CVE-2024-26685": { + "cmt_msg": "nilfs2: fix potential bug in end_buffer_async_write" + }, "CVE-2020-25672": { "cmt_msg": "nfc: fix memory leak in llcp_sock_connect()" }, @@ -118922,12 +151694,30 @@ "CVE-2022-1012": { "cmt_msg": "secure_seq: use the 64 bits of the siphash for port offset calculation" }, + "CVE-2023-52620": { + "cmt_msg": "netfilter: nf_tables: disallow timeout for anonymous sets" + }, "CVE-2022-38096": { "cmt_msg": "" }, + "CVE-2023-52622": { + "cmt_msg": "ext4: avoid online resizing failures due to oversized flex bg" + }, + "CVE-2023-52623": { + "cmt_msg": "SUNRPC: Fix a suspicious RCU usage warning" + }, + "CVE-2023-52624": { + "cmt_msg": "drm/amd/display: Wake DMCUB before executing GPINT commands" + }, "CVE-2023-3161": { "cmt_msg": "fbcon: Check font dimension limits" }, + "CVE-2024-26669": { + "cmt_msg": "net/sched: flower: Fix chain template offload" + }, + "CVE-2023-52628": { + "cmt_msg": "netfilter: nftables: exthdr: fix 4-byte stack OOB write" + }, "CVE-2021-26934": { "cmt_msg": "" }, @@ -118985,6 +151775,21 @@ "CVE-2021-3178": { "cmt_msg": "nfsd4: readdirplus shouldn't return parent of export" }, + "CVE-2021-47101": { + "cmt_msg": "asix: fix uninit-value in asix_mdio_read()" + }, + "CVE-2021-47100": { + "cmt_msg": "ipmi: Fix UAF when uninstall ipmi_si and ipmi_msghandler module" + }, + "CVE-2021-46984": { + "cmt_msg": "kyber: fix out of bounds access when preempted" + }, + "CVE-2021-46982": { + "cmt_msg": "f2fs: compress: fix race condition of overwrite vs truncate" + }, + "CVE-2021-47109": { + "cmt_msg": "neighbour: allow NUD_NOARP entries to be forced GCed" + }, "CVE-2019-19252": { "cmt_msg": "vcs: prevent write access to vcsu devices" }, @@ -118994,12 +151799,21 @@ "CVE-2007-3719": { "cmt_msg": "" }, - "CVE-2023-3863": { - "cmt_msg": "net: nfc: Fix use-after-free caused by nfc_llcp_find_local" + "CVE-2021-46988": { + "cmt_msg": "userfaultfd: release page in error path to avoid BUG_ON" + }, + "CVE-2021-46989": { + "cmt_msg": "hfsplus: prevent corruption in shrinking truncate" + }, + "CVE-2024-26606": { + "cmt_msg": "binder: signal epoll threads of self-work" }, "CVE-2023-0590": { "cmt_msg": "net: sched: fix race condition in qdisc_graft()" }, + "CVE-2023-52583": { + "cmt_msg": "ceph: fix deadlock or deadcode of misusing dget()" + }, "CVE-2022-4095": { "cmt_msg": "staging: rtl8712: fix use after free bugs" }, @@ -119015,6 +151829,9 @@ "CVE-2023-30772": { "cmt_msg": "power: supply: da9150: Fix use after free bug in da9150_charger_remove due to race condition" }, + "CVE-2021-47119": { + "cmt_msg": "ext4: fix memory leak in ext4_fill_super" + }, "CVE-2022-24958": { "cmt_msg": "usb: gadget: don't release an existing dev->buf" }, @@ -119027,6 +151844,15 @@ "CVE-2021-3679": { "cmt_msg": "tracing: Fix bug in rb_per_cpu_empty() that might cause deadloop." }, + "CVE-2024-26656": { + "cmt_msg": "drm/amdgpu: fix use-after-free bug" + }, + "CVE-2024-26607": { + "cmt_msg": "drm/bridge: sii902x: Fix probing race issue" + }, + "CVE-2023-52517": { + "cmt_msg": "spi: sun6i: fix race between DMA RX transfer completion and RX FIFO drain" + }, "CVE-2022-2586": { "cmt_msg": "netfilter: nf_tables: do not allow SET_ID to refer to another table" }, @@ -119087,12 +151913,27 @@ "CVE-2023-1095": { "cmt_msg": "netfilter: nf_tables: fix null deref due to zeroed list head" }, + "CVE-2023-52574": { + "cmt_msg": "team: fix null-ptr-deref when team device type is changed" + }, + "CVE-2021-47034": { + "cmt_msg": "powerpc/64s: Fix pte update for kernel memory on radix" + }, "CVE-2022-3239": { "cmt_msg": "media: em28xx: initialize refcount before kref_get" }, "CVE-2022-4543": { "cmt_msg": "" }, + "CVE-2023-52571": { + "cmt_msg": "power: supply: rk817: Fix node refcount leak" + }, + "CVE-2023-52572": { + "cmt_msg": "cifs: Fix UAF in cifs_demultiplex_thread()" + }, + "CVE-2023-52573": { + "cmt_msg": "net: rds: Fix possible NULL-pointer dereference" + }, "CVE-2023-4921": { "cmt_msg": "net: sched: sch_qfq: Fix UAF in qfq_dequeue()" }, @@ -119108,6 +151949,9 @@ "CVE-2023-5717": { "cmt_msg": "perf: Disallow mis-matched inherited group reads" }, + "CVE-2021-46915": { + "cmt_msg": "netfilter: nft_limit: avoid possible divide error in nft_limit_init" + }, "CVE-2019-18282": { "cmt_msg": "net/flow_dissector: switch to siphash" }, @@ -119123,6 +151967,9 @@ "CVE-2020-24394": { "cmt_msg": "nfsd: apply umask on fs without ACL support" }, + "CVE-2024-26769": { + "cmt_msg": "nvmet-fc: avoid deadlock on delete association path" + }, "CVE-2022-20148": { "cmt_msg": "f2fs: fix UAF in f2fs_available_free_memory" }, @@ -119141,12 +151988,27 @@ "CVE-2022-28390": { "cmt_msg": "can: ems_usb: ems_usb_start_xmit(): fix double dev_kfree_skb() in error path" }, + "CVE-2024-26736": { + "cmt_msg": "afs: Increase buffer size in afs_update_volume_status()" + }, + "CVE-2024-26735": { + "cmt_msg": "ipv6: sr: fix possible use-after-free and null-ptr-deref" + }, + "CVE-2024-26738": { + "cmt_msg": "powerpc/pseries/iommu: DLPAR add doesn't completely initialize pci_controller" + }, + "CVE-2024-26739": { + "cmt_msg": "net/sched: act_mirred: don't override retval if we already lost the skb" + }, "CVE-2022-42719": { "cmt_msg": "wifi: mac80211: fix MBSSID parsing use-after-free" }, "CVE-2020-14386": { "cmt_msg": "net/packet: fix overflow in tpacket_rcv" }, + "CVE-2024-26804": { + "cmt_msg": "net: ip_tunnel: prevent perpetual headroom growth" + }, "CVE-2020-14385": { "cmt_msg": "xfs: fix boundary test in xfs_attr_shortform_verify" }, @@ -119195,6 +152057,9 @@ "CVE-2023-6932": { "cmt_msg": "ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet" }, + "CVE-2024-26801": { + "cmt_msg": "Bluetooth: Avoid potential use-after-free in hci_error_reset" + }, "CVE-2020-16166": { "cmt_msg": "random32: update the net random state on interrupt and activity" }, @@ -119207,9 +152072,18 @@ "CVE-2022-28388": { "cmt_msg": "can: usb_8dev: usb_8dev_start_xmit(): fix double dev_kfree_skb() in error path" }, + "CVE-2022-41218": { + "cmt_msg": "media: dvb-core: Fix UAF due to refcount races at releasing" + }, + "CVE-2024-26803": { + "cmt_msg": "net: veth: clear GRO when clearing XDP even when down" + }, "CVE-2023-52444": { "cmt_msg": "f2fs: fix to avoid dirent corruption" }, + "CVE-2024-26768": { + "cmt_msg": "LoongArch: Change acpi_core_pic[NR_CPUS] to acpi_core_pic[MAX_CORE_PIC]" + }, "CVE-2020-12362": { "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" }, @@ -119222,12 +152096,24 @@ "CVE-2020-12364": { "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" }, + "CVE-2024-26646": { + "cmt_msg": "thermal: intel: hfi: Add syscore callbacks for system-wide PM" + }, + "CVE-2024-26647": { + "cmt_msg": "drm/amd/display: Fix late derefrence 'dsc' check in 'link_set_dsc_pps_packet()'" + }, + "CVE-2024-26644": { + "cmt_msg": "btrfs: don't abort filesystem when attempting to snapshot deleted subvolume" + }, "CVE-2020-25639": { "cmt_msg": "drm/nouveau: bail out of nouveau_channel_new if channel init fails" }, "CVE-2023-33203": { "cmt_msg": "net: qcom/emac: Fix use after free bug in emac_remove due to race condition" }, + "CVE-2024-26640": { + "cmt_msg": "tcp: add sanity checks to rx zerocopy" + }, "CVE-2021-0605": { "cmt_msg": "af_key: pfkey_dump needs parameter validation" }, @@ -119243,8 +152129,8 @@ "CVE-2022-1055": { "cmt_msg": "net: sched: fix use-after-free in tc_new_tfilter()" }, - "CVE-2024-23849": { - "cmt_msg": "net/rds: Fix UBSAN: array-index-out-of-bounds in rds_cmsg_recv" + "CVE-2023-52519": { + "cmt_msg": "HID: intel-ish-hid: ipc: Disable and reenable ACPI GPE bit" }, "CVE-2023-50431": { "cmt_msg": "accel/habanalabs: fix information leak in sec_attest_info()" @@ -119258,6 +152144,12 @@ "CVE-2021-3894": { "cmt_msg": "sctp: account stream padding length for reconf chunk" }, + "CVE-2024-26641": { + "cmt_msg": "ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv()" + }, + "CVE-2022-1836": { + "cmt_msg": "floppy: disable FDRAWCMD by default" + }, "CVE-2019-18786": { "cmt_msg": "media: rcar_drif: fix a memory disclosure" }, @@ -119270,6 +152162,9 @@ "CVE-2019-20812": { "cmt_msg": "af_packet: set defaule value for tmo" }, + "CVE-2023-52600": { + "cmt_msg": "jfs: fix uaf in jfs_evict_inode" + }, "CVE-2020-14314": { "cmt_msg": "ext4: fix potential negative array index in do_split()" }, @@ -119291,6 +152186,12 @@ "CVE-2024-23848": { "cmt_msg": "" }, + "CVE-2023-52531": { + "cmt_msg": "wifi: iwlwifi: mvm: Fix a memory corruption issue" + }, + "CVE-2021-47159": { + "cmt_msg": "net: dsa: fix a crash if ->get_sset_count() fails" + }, "CVE-2022-0617": { "cmt_msg": "udf: Fix NULL ptr deref when converting from inline format" }, @@ -119298,11 +152199,20 @@ "cmt_msg": "net: vmxnet3: fix possible NULL pointer dereference in vmxnet3_rq_cleanup()" }, "CVE-2024-24861": { - "cmt_msg": "" + "cmt_msg": "media: xc4000: Fix atomicity violation in xc4000_get_frequency" + }, + "CVE-2024-26635": { + "cmt_msg": "llc: Drop support for ETH_P_TR_802_2." + }, + "CVE-2023-52639": { + "cmt_msg": "KVM: s390: vsie: fix race during shadow creation" }, "CVE-2022-2153": { "cmt_msg": "KVM: x86: Avoid theoretical NULL pointer dereference in kvm_irq_delivery_to_apic_fast()" }, + "CVE-2024-2193": { + "cmt_msg": "" + }, "CVE-2022-20566": { "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free caused by l2cap_chan_put" }, @@ -119315,8 +152225,8 @@ "CVE-2024-23851": { "cmt_msg": "dm: limit the number of targets and parameter size area" }, - "CVE-2024-23196": { - "cmt_msg": "" + "CVE-2022-20424": { + "cmt_msg": "io_uring: remove io_identity" }, "CVE-2020-12768": { "cmt_msg": "KVM: SVM: Fix potential memory leak in svm_cpu_init()" @@ -119324,6 +152234,12 @@ "CVE-2020-12769": { "cmt_msg": "spi: spi-dw: Add lock protect dw_spi rx/tx to prevent concurrent calls" }, + "CVE-2024-26765": { + "cmt_msg": "LoongArch: Disable IRQ before init_fn() for nonboot CPUs" + }, + "CVE-2023-52609": { + "cmt_msg": "binder: fix race between mmput() and do_exit()" + }, "CVE-2021-32399": { "cmt_msg": "bluetooth: eliminate the potential race condition when removing the HCI controller" }, @@ -119336,17 +152252,32 @@ "CVE-2021-28971": { "cmt_msg": "perf/x86/intel: Fix a crash caused by zero PEBS status" }, + "CVE-2023-52634": { + "cmt_msg": "drm/amd/display: Fix disable_otg_wa logic" + }, "CVE-2022-22942": { "cmt_msg": "drm/vmwgfx: Fix stale file descriptors on failed usercopy" }, "CVE-2021-3739": { "cmt_msg": "btrfs: fix NULL pointer dereference when deleting device by invalid id" }, - "CVE-2022-20166": { - "cmt_msg": "drivers core: Use sysfs_emit and sysfs_emit_at for show(device *...) functions" + "CVE-2020-36782": { + "cmt_msg": "i2c: imx-lpi2c: fix reference leak when pm_runtime_get_sync fails" }, - "CVE-2021-3732": { - "cmt_msg": "ovl: prevent private clone if bind mount is not allowed" + "CVE-2020-36783": { + "cmt_msg": "i2c: img-scb: fix reference leak when pm_runtime_get_sync fails" + }, + "CVE-2020-36780": { + "cmt_msg": "i2c: sprd: fix reference leak when pm_runtime_get_sync fails" + }, + "CVE-2020-36781": { + "cmt_msg": "i2c: imx: fix reference leak when pm_runtime_get_sync fails" + }, + "CVE-2020-36787": { + "cmt_msg": "media: aspeed: fix clock handling logic" + }, + "CVE-2020-36784": { + "cmt_msg": "i2c: cadence: fix reference leak when pm_runtime_get_sync fails" }, "CVE-2024-24860": { "cmt_msg": "Bluetooth: Fix atomicity violation in {min,max}_key_size_set" @@ -119357,9 +152288,15 @@ "CVE-2020-10767": { "cmt_msg": "x86/speculation: Avoid force-disabling IBPB based on STIBP and enhanced IBRS." }, + "CVE-2019-25162": { + "cmt_msg": "i2c: Fix a potential use after free" + }, "CVE-2018-12207": { "cmt_msg": "kvm: x86, powerpc: do not allow clearing largepages debugfs entry" }, + "CVE-2024-26627": { + "cmt_msg": "scsi: core: Move scsi_host_busy() out of host lock for waking up EH handler" + }, "CVE-2020-13143": { "cmt_msg": "USB: gadget: fix illegal array access in binding with UDC" }, @@ -119378,12 +152315,15 @@ "CVE-2019-17075": { "cmt_msg": "RDMA/cxgb4: Do not dma memory off of the stack" }, - "CVE-2023-3220": { - "cmt_msg": "drm/msm/dpu: Add check for pstates" + "CVE-2022-48626": { + "cmt_msg": "moxart: fix potential use-after-free on remove path" }, "CVE-2022-3903": { "cmt_msg": "media: mceusb: Use new usb_control_msg_*() routines" }, + "CVE-2024-26642": { + "cmt_msg": "netfilter: nf_tables: disallow anonymous set with timeout flag" + }, "CVE-2022-3577": { "cmt_msg": "HID: bigben: fix slab-out-of-bounds Write in bigben_probe" }, @@ -119393,30 +152333,93 @@ "CVE-2020-10942": { "cmt_msg": "vhost: Check docket sk_family instead of call getname" }, + "CVE-2021-47071": { + "cmt_msg": "uio_hv_generic: Fix a memory leak in error handling paths" + }, + "CVE-2021-47070": { + "cmt_msg": "uio_hv_generic: Fix another memory leak in error handling paths" + }, + "CVE-2021-47073": { + "cmt_msg": "platform/x86: dell-smbios-wmi: Fix oops on rmmod dell_smbios" + }, "CVE-2022-44034": { "cmt_msg": "char: pcmcia: remove all the drivers" }, - "CVE-2022-44033": { - "cmt_msg": "char: pcmcia: remove all the drivers" + "CVE-2021-47075": { + "cmt_msg": "nvmet: fix memory leak in nvmet_alloc_ctrl()" }, - "CVE-2022-44032": { - "cmt_msg": "char: pcmcia: remove all the drivers" + "CVE-2021-47074": { + "cmt_msg": "nvme-loop: fix memory leak in nvme_loop_create_ctrl()" + }, + "CVE-2021-47077": { + "cmt_msg": "scsi: qedf: Add pointer checks in qedf_update_link_speed()" + }, + "CVE-2021-47076": { + "cmt_msg": "RDMA/rxe: Return CQE error if invalid lkey was supplied" + }, + "CVE-2021-47170": { + "cmt_msg": "USB: usbfs: Don't WARN about excessively large memory allocations" + }, + "CVE-2021-47078": { + "cmt_msg": "RDMA/rxe: Clear all QP fields if creation failed" + }, + "CVE-2021-47172": { + "cmt_msg": "iio: adc: ad7124: Fix potential overflow due to non sequential channel numbers" + }, + "CVE-2021-47173": { + "cmt_msg": "misc/uss720: fix memory leak in uss720_probe" + }, + "CVE-2022-36123": { + "cmt_msg": "x86: Clear .brk area at early boot" + }, + "CVE-2021-47175": { + "cmt_msg": "net/sched: fq_pie: fix OOB access in the traffic path" }, "CVE-2020-10781": { "cmt_msg": "Revert \"zram: convert remaining CLASS_ATTR() to CLASS_ATTR_RO()\"" }, - "CVE-2023-1989": { - "cmt_msg": "Bluetooth: btsdio: fix use after free bug in btsdio_remove due to unfinished work" + "CVE-2021-46951": { + "cmt_msg": "tpm: efi: Use local variable for calculating final log size" + }, + "CVE-2021-46950": { + "cmt_msg": "md/raid1: properly indicate failure when ending a failed write request" + }, + "CVE-2021-46953": { + "cmt_msg": "ACPI: GTDT: Don't corrupt interrupt mappings on watchdow probe failure" + }, + "CVE-2021-46952": { + "cmt_msg": "NFS: fs_context: validate UDP retrans to prevent shift out-of-bounds" + }, + "CVE-2021-46955": { + "cmt_msg": "openvswitch: fix stack OOB read while fragmenting IPv4 packets" + }, + "CVE-2024-0607": { + "cmt_msg": "netfilter: nf_tables: fix pointer math issue in nft_byteorder_eval()" + }, + "CVE-2023-52597": { + "cmt_msg": "KVM: s390: fix setting of fpc register" + }, + "CVE-2021-46959": { + "cmt_msg": "spi: Fix use-after-free with devm_spi_alloc_*" }, "CVE-2020-26139": { "cmt_msg": "mac80211: do not accept/forward invalid EAPOL frames" }, + "CVE-2024-26772": { + "cmt_msg": "ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal()" + }, "CVE-2019-10220": { "cmt_msg": "Convert filldir[64]() from __put_user() to unsafe_put_user()" }, "CVE-2021-3609": { "cmt_msg": "can: bcm: delay release of struct bcm_op after synchronize_rcu()" }, + "CVE-2023-52595": { + "cmt_msg": "wifi: rt2x00: restart beacon queue when hardware reset" + }, + "CVE-2024-26671": { + "cmt_msg": "blk-mq: fix IO hang from sbitmap wakeup race" + }, "CVE-2019-19534": { "cmt_msg": "can: peak_usb: fix slab info leak" }, @@ -119429,20 +152432,29 @@ "CVE-2021-23133": { "cmt_msg": "net/sctp: fix race condition in sctp_destroy_sock" }, + "CVE-2023-52593": { + "cmt_msg": "wifi: wfx: fix possible NULL pointer dereference in wfx_set_mfp_ap()" + }, "CVE-2022-33981": { "cmt_msg": "floppy: disable FDRAWCMD by default" }, "CVE-2021-0929": { "cmt_msg": "staging/android/ion: delete dma_buf->kmap/unmap implemenation" }, + "CVE-2023-52590": { + "cmt_msg": "ocfs2: Avoid touching renamed directory if parent does not change" + }, + "CVE-2024-26676": { + "cmt_msg": "af_unix: Call kfree_skb() for dead unix_(sk)->oob_skb in GC." + }, "CVE-2021-0920": { "cmt_msg": "af_unix: fix garbage collect vs MSG_PEEK" }, "CVE-2022-0168": { "cmt_msg": "cifs: fix NULL ptr dereference in smb2_ioctl_query_info()" }, - "CVE-2024-26587": { - "cmt_msg": "net: netdevsim: don't try to destroy PHC on VFs" + "CVE-2024-26622": { + "cmt_msg": "tomoyo: fix UAF write bug in tomoyo_write_control()" }, "CVE-2023-51043": { "cmt_msg": "drm/atomic: Fix potential use-after-free in nonblocking commits" @@ -119453,6 +152465,9 @@ "CVE-2023-0615": { "cmt_msg": "media: vivid: dev->bitmap_cap wasn't freed in all cases" }, + "CVE-2024-26672": { + "cmt_msg": "drm/amdgpu: Fix variable 'mca_funcs' dereferenced before NULL check in 'amdgpu_mca_smu_get_mca_entry()'" + }, "CVE-2019-14896": { "cmt_msg": "libertas: Fix two buffer overflows at parsing bss descriptor" }, @@ -119462,17 +152477,29 @@ "CVE-2019-14895": { "cmt_msg": "mwifiex: fix possible heap overflow in mwifiex_process_country_ie()" }, + "CVE-2024-26787": { + "cmt_msg": "mmc: mmci: stm32: fix DMA API overlapping mappings warning" + }, + "CVE-2023-52522": { + "cmt_msg": "net: fix possible store tearing in neigh_periodic_work()" + }, "CVE-2022-3586": { "cmt_msg": "sch_sfb: Don't assume the skb is still around after enqueueing to child" }, "CVE-2023-35824": { "cmt_msg": "media: dm1105: Fix use after free bug in dm1105_remove due to race condition" }, + "CVE-2024-26636": { + "cmt_msg": "llc: make llc_ui_sendmsg() more robust against bonding changes" + }, + "CVE-2024-26779": { + "cmt_msg": "wifi: mac80211: fix race condition on enabling fast-xmit" + }, "CVE-2024-26586": { "cmt_msg": "mlxsw: spectrum_acl_tcam: Fix stack corruption" }, - "CVE-2024-0646": { - "cmt_msg": "net: tls, update curr on splice as well" + "CVE-2023-52528": { + "cmt_msg": "net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg" }, "CVE-2020-27825": { "cmt_msg": "tracing: Fix race in trace_open and buffer resize call" @@ -119489,6 +152516,9 @@ "CVE-2020-0067": { "cmt_msg": "f2fs: fix to avoid memory leakage in f2fs_listxattr" }, + "CVE-2021-47151": { + "cmt_msg": "interconnect: qcom: bcm-voter: add a missing of_node_put()" + }, "CVE-2023-4622": { "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES" }, @@ -119507,6 +152537,9 @@ "CVE-2023-6610": { "cmt_msg": "smb: client: fix potential OOB in smb2_dump_detail()" }, + "CVE-2024-26600": { + "cmt_msg": "phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP" + }, "CVE-2023-3390": { "cmt_msg": "netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE" }, @@ -119522,6 +152555,15 @@ "CVE-2021-33061": { "cmt_msg": "ixgbe: add improvement for MDD response functionality" }, + "CVE-2024-26764": { + "cmt_msg": "fs/aio: Restrict kiocb_set_cancel_fn() to I/O submitted via libaio" + }, + "CVE-2024-26767": { + "cmt_msg": "drm/amd/display: fixed integer types and null check locations" + }, + "CVE-2024-26766": { + "cmt_msg": "IB/hfi1: Fix sdma.h tx->num_descs off-by-one error" + }, "CVE-2024-26589": { "cmt_msg": "bpf: Reject variable offset alu on PTR_TO_FLOW_KEYS" }, @@ -119531,9 +152573,21 @@ "CVE-2023-1476": { "cmt_msg": "" }, + "CVE-2023-4010": { + "cmt_msg": "" + }, + "CVE-2023-3220": { + "cmt_msg": "drm/msm/dpu: Add check for pstates" + }, "CVE-2021-3864": { "cmt_msg": "" }, + "CVE-2024-26770": { + "cmt_msg": "HID: nvidia-shield: Add missing null pointer checks to LED initialization" + }, + "CVE-2024-23307": { + "cmt_msg": "md/raid5: fix atomicity violation in raid5_cache_count" + }, "CVE-2022-1652": { "cmt_msg": "floppy: use a statically allocated error counter" }, @@ -119585,6 +152639,9 @@ "CVE-2020-0423": { "cmt_msg": "binder: fix UAF when releasing todo list" }, + "CVE-2022-23222": { + "cmt_msg": "bpf: Replace PTR_TO_XXX_OR_NULL with PTR_TO_XXX | PTR_MAYBE_NULL" + }, "CVE-2022-1789": { "cmt_msg": "KVM: x86/mmu: fix NULL pointer dereference on guest INVPCID" }, @@ -119592,11 +152649,14 @@ "cmt_msg": "" }, "CVE-2023-6270": { - "cmt_msg": "" + "cmt_msg": "aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts" }, "CVE-2023-3090": { "cmt_msg": "ipvlan:Fix out-of-bounds caused by unclear skb->cb" }, + "CVE-2022-20422": { + "cmt_msg": "arm64: fix oops in concurrently setting insn_emulation sysctls" + }, "CVE-2023-3772": { "cmt_msg": "xfrm: add NULL check in xfrm_update_ae_params" }, @@ -119609,11 +152669,11 @@ "CVE-2023-1582": { "cmt_msg": "fs/proc: task_mmu.c: don't read mapcount for migration entry" }, - "CVE-2022-1786": { - "cmt_msg": "io_uring: remove io_identity" + "CVE-2021-47162": { + "cmt_msg": "tipc: skb_linearize the head skb when reassembling msgs" }, - "CVE-2022-23222": { - "cmt_msg": "bpf: Replace PTR_TO_XXX_OR_NULL with PTR_TO_XXX | PTR_MAYBE_NULL" + "CVE-2022-21166": { + "cmt_msg": "x86/speculation/mmio: Enable CPU Fill buffer clearing on idle" }, "CVE-2020-25669": { "cmt_msg": "Input: sunkbd - avoid use-after-free in teardown paths" @@ -119627,6 +152687,9 @@ "CVE-2020-25705": { "cmt_msg": "icmp: randomize the global rate limiter" }, + "CVE-2022-20421": { + "cmt_msg": "binder: fix UAF of ref->proc caused by race condition" + }, "CVE-2022-0435": { "cmt_msg": "tipc: improve size validations for received domain records" }, @@ -119637,7 +152700,13 @@ "cmt_msg": "can: kvaser_usb: kvaser_usb_leaf: Fix some info-leaks to USB devices" }, "CVE-2023-6356": { - "cmt_msg": "" + "cmt_msg": "nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length" + }, + "CVE-2024-26744": { + "cmt_msg": "RDMA/srpt: Support specifying the srpt_service_guid parameter" + }, + "CVE-2024-26648": { + "cmt_msg": "drm/amd/display: Fix variable deferencing before NULL check in edp_setup_replay()" }, "CVE-2021-4135": { "cmt_msg": "netdevsim: Zero-initialize memory for new map's value in function nsim_bpf_map_alloc" @@ -119645,12 +152714,27 @@ "CVE-2023-26607": { "cmt_msg": "ntfs: fix out-of-bounds read in ntfs_attr_find()" }, - "CVE-2023-52456": { - "cmt_msg": "serial: imx: fix tx statemachine deadlock" + "CVE-2023-52638": { + "cmt_msg": "can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock" }, "CVE-2019-15239": { "cmt_msg": "unknown" }, + "CVE-2022-3534": { + "cmt_msg": "libbpf: Fix use-after-free in btf_dump_name_dups" + }, + "CVE-2023-52635": { + "cmt_msg": "PM / devfreq: Synchronize devfreq_monitor_[start/stop]" + }, + "CVE-2023-52469": { + "cmt_msg": "drivers/amd/pm: fix a use-after-free in kv_parse_power_table" + }, + "CVE-2023-52594": { + "cmt_msg": "wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus()" + }, + "CVE-2023-52632": { + "cmt_msg": "drm/amdkfd: Fix lock dependency warning with srcu" + }, "CVE-2021-4037": { "cmt_msg": "xfs: fix up non-directory creation in SGID directories" }, @@ -119666,12 +152750,27 @@ "CVE-2023-20941": { "cmt_msg": "" }, + "CVE-2024-26773": { + "cmt_msg": "ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found()" + }, + "CVE-2023-2194": { + "cmt_msg": "i2c: xgene-slimpro: Fix out-of-bounds bug in xgene_slimpro_i2c_xfer()" + }, + "CVE-2024-26740": { + "cmt_msg": "net/sched: act_mirred: use the backlog for mirred ingress" + }, "CVE-2021-3347": { "cmt_msg": "futex: Ensure the correct return value from futex_lock_pi()" }, "CVE-2020-10135": { "cmt_msg": "Bluetooth: Consolidate encryption handling in hci_encrypt_cfm" }, + "CVE-2021-47169": { + "cmt_msg": "serial: rp2: use 'request_firmware' instead of 'request_firmware_nowait'" + }, + "CVE-2024-26784": { + "cmt_msg": "pmdomain: arm: Fix NULL dereference on scmi_perf_domain removal" + }, "CVE-2022-1966": { "cmt_msg": "netfilter: nf_tables: disallow non-stateful expression in sets earlier" }, @@ -119684,33 +152783,60 @@ "CVE-2022-3533": { "cmt_msg": "" }, - "CVE-2022-3534": { - "cmt_msg": "libbpf: Fix use-after-free in btf_dump_name_dups" + "CVE-2021-47138": { + "cmt_msg": "cxgb4: avoid accessing registers when clearing filters" }, "CVE-2022-3535": { "cmt_msg": "net: mvpp2: fix mvpp2 debugfs leak" }, + "CVE-2021-47135": { + "cmt_msg": "mt76: mt7921: fix possible AOOB issue in mt7921_mcu_tx_rate_report" + }, + "CVE-2021-47136": { + "cmt_msg": "net: zero-initialize tc skb extension on allocation" + }, + "CVE-2021-47137": { + "cmt_msg": "net: lantiq: fix memory corruption in RX ring" + }, + "CVE-2024-26808": { + "cmt_msg": "netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain" + }, + "CVE-2021-47131": { + "cmt_msg": "net/tls: Fix use-after-free after the TLS device goes down and up" + }, "CVE-2020-36766": { "cmt_msg": "cec-api: prevent leaking memory through hole in structure" }, + "CVE-2021-47133": { + "cmt_msg": "HID: amd_sfh: Fix memory leak in amd_sfh_work" + }, "CVE-2022-2977": { "cmt_msg": "tpm: fix reference counting for struct tpm_chip" }, + "CVE-2024-26675": { + "cmt_msg": "ppp_async: limit MRU to 64K" + }, "CVE-2022-3061": { "cmt_msg": "video: fbdev: i740fb: Error out if 'pixclock' equals zero" }, - "CVE-2023-28328": { - "cmt_msg": "media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer()" + "CVE-2021-46991": { + "cmt_msg": "i40e: Fix use-after-free in i40e_client_subtask()" }, "CVE-2022-0322": { "cmt_msg": "sctp: account stream padding length for reconf chunk" }, - "CVE-2023-0386": { - "cmt_msg": "ovl: fail on invalid uid/gid mapping at copy up" + "CVE-2021-46992": { + "cmt_msg": "netfilter: nftables: avoid overflows in nft_hash_buckets()" }, "CVE-2023-6121": { "cmt_msg": "nvmet: nul-terminate the NQNs passed in the connect command" }, + "CVE-2024-26748": { + "cmt_msg": "usb: cdns3: fix memory double free when handle zero packet" + }, + "CVE-2021-46998": { + "cmt_msg": "ethernet:enic: Fix a use after free bug in enic_hard_start_xmit" + }, "CVE-2017-13693": { "cmt_msg": "" }, @@ -119747,8 +152873,17 @@ "CVE-2021-3760": { "cmt_msg": "nfc: nci: fix the UAF of rf_conn_info object" }, - "CVE-2022-36123": { - "cmt_msg": "x86: Clear .brk area at early boot" + "CVE-2022-1786": { + "cmt_msg": "io_uring: remove io_identity" + }, + "CVE-2021-47180": { + "cmt_msg": "NFC: nci: fix memory leak in nci_allocate_device" + }, + "CVE-2022-48628": { + "cmt_msg": "ceph: drop messages from MDS when unmounting" + }, + "CVE-2022-48629": { + "cmt_msg": "crypto: qcom-rng - ensure buffer for generate is completely filled" }, "CVE-2020-11608": { "cmt_msg": "media: ov519: add missing endpoint sanity checks" @@ -119759,6 +152894,9 @@ "CVE-2020-28097": { "cmt_msg": "vgacon: remove software scrollback support" }, + "CVE-2023-52591": { + "cmt_msg": "reiserfs: Avoid touching renamed directory if parent does not change" + }, "CVE-2024-24859": { "cmt_msg": "" }, @@ -119771,6 +152909,9 @@ "CVE-2024-24857": { "cmt_msg": "" }, + "CVE-2023-0386": { + "cmt_msg": "ovl: fail on invalid uid/gid mapping at copy up" + }, "CVE-2021-29264": { "cmt_msg": "gianfar: fix jumbo packets+napi+rx overrun crash" }, @@ -119786,6 +152927,12 @@ "CVE-2021-43056": { "cmt_msg": "KVM: PPC: Book3S HV: Make idle_kvm_start_guest() return 0 if it went to guest" }, + "CVE-2023-52569": { + "cmt_msg": "btrfs: remove BUG() after failure to insert delayed dir index item" + }, + "CVE-2023-52568": { + "cmt_msg": "x86/sgx: Resolves SECS reclaim vs. page fault for EAUG race" + }, "CVE-2020-14416": { "cmt_msg": "can, slip: Protect tty->disc_data in write_wakeup and close with RCU" }, @@ -119795,15 +152942,30 @@ "CVE-2022-3542": { "cmt_msg": "bnx2x: fix potential memory leak in bnx2x_tpa_stop()" }, + "CVE-2023-52563": { + "cmt_msg": "drm/meson: fix memory leak on ->hpd_notify callback" + }, + "CVE-2023-52561": { + "cmt_msg": "arm64: dts: qcom: sdm845-db845c: Mark cont splash memory region as reserved" + }, "CVE-2019-19377": { "cmt_msg": "btrfs: Don't submit any btree write bio if the fs has errors" }, + "CVE-2021-47004": { + "cmt_msg": "f2fs: fix to avoid touching checkpointed data in get_victim()" + }, + "CVE-2021-47005": { + "cmt_msg": "PCI: endpoint: Fix NULL pointer dereference for ->get_features()" + }, "CVE-2021-21781": { "cmt_msg": "ARM: ensure the signal page contains defined contents" }, "CVE-2021-0512": { "cmt_msg": "HID: make arrays usage and value to be the same" }, + "CVE-2021-46929": { + "cmt_msg": "sctp: use call_rcu to free endpoint" + }, "CVE-2023-1382": { "cmt_msg": "tipc: set con sock in tipc_conn_alloc" }, @@ -119813,6 +152975,15 @@ "CVE-2023-1380": { "cmt_msg": "wifi: brcmfmac: slab-out-of-bounds read in brcmf_get_assoc_ies()" }, + "CVE-2021-46924": { + "cmt_msg": "NFC: st21nfca: Fix memory leak in device probe and remove" + }, + "CVE-2021-46925": { + "cmt_msg": "net/smc: fix kernel panic caused by race of smc_sock" + }, + "CVE-2021-46926": { + "cmt_msg": "ALSA: hda: intel-sdw-acpi: harden detection of controller" + }, "CVE-2020-0347": { "cmt_msg": "" }, @@ -119861,12 +153032,18 @@ "CVE-2021-33656": { "cmt_msg": "vt: drop old FONT ioctls" }, + "CVE-2024-26720": { + "cmt_msg": "mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again" + }, "CVE-2021-33655": { "cmt_msg": "fbcon: Disallow setting font bigger than screen size" }, "CVE-2022-41858": { "cmt_msg": "drivers: net: slip: fix NPD bug in sl_tx_timeout()" }, + "CVE-2024-26726": { + "cmt_msg": "btrfs: don't drop extent_map for free space inode on write error" + }, "CVE-2022-3176": { "cmt_msg": "io_uring: fix UAF due to missing POLLFREE handling" }, @@ -119924,6 +153101,9 @@ "CVE-2020-0466": { "cmt_msg": "do_epoll_ctl(): clean the failure exits up a bit" }, + "CVE-2023-52516": { + "cmt_msg": "dma-debug: don't call __dma_entry_alloc_check_leak() under free_entries_lock" + }, "CVE-2021-4218": { "cmt_msg": "sysctl: pass kernel pointers to ->proc_handler" }, @@ -119933,12 +153113,15 @@ "CVE-2020-0543": { "cmt_msg": "x86/cpu: Add 'table' argument to cpu_matches()" }, - "CVE-2024-25739": { - "cmt_msg": "" + "CVE-2023-52510": { + "cmt_msg": "ieee802154: ca8210: Fix a potential UAF in ca8210_probe" }, "CVE-2020-8992": { "cmt_msg": "ext4: add cond_resched() to ext4_protect_reserved_inode" }, + "CVE-2023-52633": { + "cmt_msg": "um: time-travel: fix time corruption" + }, "CVE-2024-0340": { "cmt_msg": "vhost: use kzalloc() instead of kmalloc() followed by memset()" }, @@ -119946,7 +153129,7 @@ "cmt_msg": "vt_kdsetmode: extend console locking" }, "CVE-2023-6536": { - "cmt_msg": "" + "cmt_msg": "nvmet-tcp: fix a crash in nvmet_req_complete()" }, "CVE-2019-11135": { "cmt_msg": "x86/msr: Add the IA32_TSX_CTRL MSR" @@ -119972,18 +153155,33 @@ "CVE-2024-1151": { "cmt_msg": "net: openvswitch: limit the number of recursions from action sets" }, + "CVE-2024-26659": { + "cmt_msg": "xhci: handle isoc Babble and Buffer Overrun events properly" + }, + "CVE-2024-26658": { + "cmt_msg": "bcachefs: grab s_umount only if snapshotting" + }, "CVE-2010-5321": { "cmt_msg": "" }, "CVE-2021-20322": { "cmt_msg": "ipv6: make exception cache less predictible" }, + "CVE-2024-26654": { + "cmt_msg": "ALSA: sh: aica: reorder cleanup operations to avoid UAF bugs" + }, "CVE-2021-20320": { "cmt_msg": "s390/bpf: Fix optimizing out zero-extensions" }, "CVE-2021-20321": { "cmt_msg": "ovl: fix missing negative dentry check in ovl_rename()" }, + "CVE-2024-26651": { + "cmt_msg": "sr9800: Add check for usbnet_get_endpoints" + }, + "CVE-2024-26650": { + "cmt_msg": "platform/x86: p2sb: Allow p2sb_bar() calls during PCI device probe" + }, "CVE-2022-26490": { "cmt_msg": "nfc: st21nfca: Fix potential buffer overflows in EVT_TRANSACTION" }, @@ -120002,15 +153200,36 @@ "CVE-2022-1048": { "cmt_msg": "ALSA: pcm: Fix races among concurrent hw_params and hw_free calls" }, + "CVE-2024-26696": { + "cmt_msg": "nilfs2: fix hang in nilfs_lookup_dirty_data_buffers()" + }, + "CVE-2023-52475": { + "cmt_msg": "Input: powermate - fix use-after-free in powermate_config_complete" + }, "CVE-2021-0342": { "cmt_msg": "tun: correct header offsets in napi frags mode" }, + "CVE-2023-52477": { + "cmt_msg": "usb: hub: Guard against accesses to uninitialized BOS descriptors" + }, + "CVE-2023-52476": { + "cmt_msg": "perf/x86/lbr: Filter vsyscall addresses" + }, "CVE-2023-22995": { "cmt_msg": "usb: dwc3: dwc3-qcom: Add missing platform_device_put() in dwc3_qcom_acpi_register_core" }, + "CVE-2023-52470": { + "cmt_msg": "drm/radeon: check the alloc_workqueue return value in radeon_crtc_init()" + }, "CVE-2024-21803": { "cmt_msg": "" }, + "CVE-2023-52479": { + "cmt_msg": "ksmbd: fix uaf in smb20_oplock_break_ack" + }, + "CVE-2023-52478": { + "cmt_msg": "HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect" + }, "CVE-2021-3542": { "cmt_msg": "" }, @@ -120020,6 +153239,9 @@ "CVE-2020-12659": { "cmt_msg": "xsk: Add missing check on user supplied headroom size" }, + "CVE-2024-22099": { + "cmt_msg": "Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security" + }, "CVE-2023-30456": { "cmt_msg": "KVM: nVMX: add missing consistency checks for CR0 and CR4" }, @@ -120047,6 +153269,12 @@ "CVE-2018-12928": { "cmt_msg": "" }, + "CVE-2024-26700": { + "cmt_msg": "drm/amd/display: Fix MST Null Ptr for RV" + }, + "CVE-2023-52511": { + "cmt_msg": "spi: sun6i: reduce DMA RX transfer width to single byte" + }, "CVE-2020-36311": { "cmt_msg": "KVM: SVM: Periodically schedule when unregistering regions on destroy" }, @@ -120065,8 +153293,8 @@ "CVE-2024-26592": { "cmt_msg": "ksmbd: fix UAF issue in ksmbd_tcp_new_connection()" }, - "CVE-2022-48619": { - "cmt_msg": "Input: add bounds checking to input_set_capability()" + "CVE-2022-45887": { + "cmt_msg": "media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb()" }, "CVE-2020-10708": { "cmt_msg": "" @@ -120077,6 +153305,12 @@ "CVE-2024-25741": { "cmt_msg": "" }, + "CVE-2024-26778": { + "cmt_msg": "fbdev: savage: Error out if pixclock equals zero" + }, + "CVE-2024-26809": { + "cmt_msg": "netfilter: nft_set_pipapo: release elements in clone only from destroy path" + }, "CVE-2022-26966": { "cmt_msg": "sr9700: sanity check for packet length" }, @@ -120086,15 +153320,42 @@ "CVE-2022-3344": { "cmt_msg": "KVM: x86: nSVM: harden svm_free_nested against freeing vmcb02 while still in use" }, + "CVE-2024-26806": { + "cmt_msg": "spi: cadence-qspi: remove system-wide suspend helper calls from runtime PM hooks" + }, "CVE-2020-12771": { "cmt_msg": "bcache: fix potential deadlock problem in btree_gc_coalesce" }, "CVE-2020-12770": { "cmt_msg": "scsi: sg: add sg_remove_request in sg_write" }, + "CVE-2024-26802": { + "cmt_msg": "stmmac: Clear variable when destroying workqueue" + }, + "CVE-2023-52508": { + "cmt_msg": "nvme-fc: Prevent null pointer dereference in nvme_fc_io_getuuid()" + }, + "CVE-2023-52606": { + "cmt_msg": "powerpc/lib: Validate size for vector operations" + }, + "CVE-2023-52607": { + "cmt_msg": "powerpc/mm: Fix null-pointer dereference in pgtable_cache_add" + }, + "CVE-2023-52604": { + "cmt_msg": "FS:JFS:UBSAN:array-index-out-of-bounds in dbAdjTree" + }, + "CVE-2023-52602": { + "cmt_msg": "jfs: fix slab-out-of-bounds Read in dtSearch" + }, + "CVE-2023-52603": { + "cmt_msg": "UBSAN: array-index-out-of-bounds in dtSplitRoot" + }, "CVE-2022-25265": { "cmt_msg": "" }, + "CVE-2023-52601": { + "cmt_msg": "jfs: fix array-index-out-of-bounds in dbAdjTree" + }, "CVE-2020-10732": { "cmt_msg": "fs/binfmt_elf.c: allocate initialized memory in fill_thread_core_info()" }, @@ -120128,42 +153389,90 @@ "CVE-2023-0160": { "cmt_msg": "bpf, sockmap: fix deadlocks in the sockhash and sockmap" }, + "CVE-2023-52506": { + "cmt_msg": "LoongArch: Set all reserved memblocks on Node#0 at initialization" + }, "CVE-2022-2663": { "cmt_msg": "netfilter: nf_conntrack_irc: Fix forged IP logic" }, + "CVE-2021-47049": { + "cmt_msg": "Drivers: hv: vmbus: Use after free in __vmbus_open()" + }, "CVE-2022-43750": { "cmt_msg": "usb: mon: make mmapped memory read only" }, "CVE-2023-0047": { "cmt_msg": "mm, oom: do not trigger out_of_memory from the #PF" }, + "CVE-2021-47046": { + "cmt_msg": "drm/amd/display: Fix off by one in hdmi_14_process_transaction()" + }, "CVE-2023-0045": { "cmt_msg": "x86/bugs: Flush IBP in ib_prctl_set()" }, - "CVE-2023-4010": { - "cmt_msg": "" + "CVE-2021-47041": { + "cmt_msg": "nvmet-tcp: fix incorrect locking in state_change sk callback" }, - "CVE-2022-38457": { - "cmt_msg": "drm/vmwgfx: Remove rcu locks from user resources" + "CVE-2023-1989": { + "cmt_msg": "Bluetooth: btsdio: fix use after free bug in btsdio_remove due to unfinished work" }, - "CVE-2022-20424": { - "cmt_msg": "io_uring: remove io_identity" + "CVE-2021-3732": { + "cmt_msg": "ovl: prevent private clone if bind mount is not allowed" }, - "CVE-2022-20422": { - "cmt_msg": "arm64: fix oops in concurrently setting insn_emulation sysctls" + "CVE-2021-47167": { + "cmt_msg": "NFS: Fix an Oopsable condition in __nfs_pageio_add_request()" }, - "CVE-2022-20421": { - "cmt_msg": "binder: fix UAF of ref->proc caused by race condition" + "CVE-2021-47166": { + "cmt_msg": "NFS: Don't corrupt the value of pg_bytes_written in nfs_do_recoalesce()" + }, + "CVE-2021-47165": { + "cmt_msg": "drm/meson: fix shutdown crash when component not probed" + }, + "CVE-2024-26625": { + "cmt_msg": "llc: call sock_orphan() at release time" + }, + "CVE-2021-47163": { + "cmt_msg": "tipc: wait and exit until all work queues are done" + }, + "CVE-2021-46969": { + "cmt_msg": "bus: mhi: core: Fix invalid error returning in mhi_queue" + }, + "CVE-2021-47161": { + "cmt_msg": "spi: spi-fsl-dspi: Fix a resource leak in an error handling path" + }, + "CVE-2021-47160": { + "cmt_msg": "net: dsa: mt7530: fix VLAN traffic leaks" }, "CVE-2023-4385": { "cmt_msg": "fs: jfs: fix possible NULL pointer dereference in dbFree()" }, + "CVE-2021-46965": { + "cmt_msg": "mtd: physmap: physmap-bt1-rom: Fix unintentional stack access" + }, "CVE-2023-4387": { "cmt_msg": "net: vmxnet3: fix possible use-after-free bugs in vmxnet3_rq_alloc_rx_buf()" }, + "CVE-2021-46960": { + "cmt_msg": "cifs: Return correct error code from smb2_get_enc_key" + }, + "CVE-2021-46961": { + "cmt_msg": "irqchip/gic-v3: Do not enable irqs when handling spurious interrups" + }, + "CVE-2021-46962": { + "cmt_msg": "mmc: uniphier-sd: Fix a resource leak in the remove function" + }, + "CVE-2021-47168": { + "cmt_msg": "NFS: fix an incorrect limit in filelayout_decode_layout()" + }, "CVE-2019-19378": { "cmt_msg": "" }, + "CVE-2023-52482": { + "cmt_msg": "x86/srso: Add SRSO mitigation for Hygon processors" + }, + "CVE-2023-52599": { + "cmt_msg": "jfs: fix array-index-out-of-bounds in diNewExt" + }, "CVE-2020-4788": { "cmt_msg": "powerpc/64s: flush L1D on kernel entry" }, @@ -120224,6 +153533,9 @@ "CVE-2021-0937": { "cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write" }, + "CVE-2023-52621": { + "cmt_msg": "bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers" + }, "CVE-2022-1263": { "cmt_msg": "KVM: avoid NULL pointer dereference in kvm_dirty_ring_push" }, @@ -120251,8 +153563,14 @@ "CVE-2021-37576": { "cmt_msg": "KVM: PPC: Book3S: Fix H_RTAS rets buffer overflow" }, + "CVE-2023-52625": { + "cmt_msg": "drm/amd/display: Refactor DMCUB enter/exit idle interface" + }, + "CVE-2024-26775": { + "cmt_msg": "aoe: avoid potential deadlock at set_capacity" + }, "CVE-2023-7042": { - "cmt_msg": "" + "cmt_msg": "wifi: ath10k: fix NULL pointer dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev()" }, "CVE-2022-3594": { "cmt_msg": "r8152: Rate limit overflow messages" @@ -120267,11 +153585,14 @@ "cmt_msg": "tipc: fix NULL deref in tipc_link_xmit()" }, "CVE-2023-47233": { - "cmt_msg": "" + "cmt_msg": "wifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach" }, "CVE-2020-27815": { "cmt_msg": "jfs: Fix array index bounds check in dbAdjTree" }, + "CVE-2023-52629": { + "cmt_msg": "sh: push-switch: Reorder cleanup operations to avoid use-after-free bug" + }, "CVE-2022-23041": { "cmt_msg": "xen/9p: use alloc/free_pages_exact()" }, @@ -120281,24 +153602,51 @@ "CVE-2023-21400": { "cmt_msg": "" }, + "CVE-2024-26758": { + "cmt_msg": "md: Don't ignore suspended array in md_check_recovery()" + }, + "CVE-2024-26759": { + "cmt_msg": "mm/swap: fix race when skipping swapcache" + }, "CVE-2022-3115": { "cmt_msg": "drm: mali-dp: potential dereference of null pointer" }, "CVE-2023-6606": { "cmt_msg": "smb: client: fix OOB in smbCalcSize()" }, + "CVE-2024-26614": { + "cmt_msg": "tcp: make sure init the accept_queue's spinlocks once" + }, "CVE-2020-27777": { "cmt_msg": "powerpc/rtas: Restrict RTAS requests from userspace" }, "CVE-2019-20636": { "cmt_msg": "Input: add safety guards to input_set_keycode()" }, + "CVE-2023-52559": { + "cmt_msg": "iommu/vt-d: Avoid memory allocation in iommu_suspend()" + }, + "CVE-2024-26751": { + "cmt_msg": "ARM: ep93xx: Add terminator to gpiod_lookup_table" + }, + "CVE-2024-26752": { + "cmt_msg": "l2tp: pass correct message length to ip6_append_data" + }, "CVE-2020-27673": { "cmt_msg": "xen/events: add a proper barrier to 2-level uevent unmasking" }, + "CVE-2024-26754": { + "cmt_msg": "gtp: fix use-after-free and null-ptr-deref in gtp_genl_dump_pdp()" + }, "CVE-2020-27675": { "cmt_msg": "xen/events: avoid removing an event channel while handling it" }, + "CVE-2024-26756": { + "cmt_msg": "md: Don't register sync_thread for reshape directly" + }, + "CVE-2024-26757": { + "cmt_msg": "md: Don't ignore read-only array in md_check_recovery()" + }, "CVE-2023-52439": { "cmt_msg": "uio: Fix use-after-free in uio_open" }, @@ -120317,6 +153665,9 @@ "CVE-2022-23040": { "cmt_msg": "xen/xenbus: don't let xenbus_grant_ring() remove grants in error case" }, + "CVE-2024-26805": { + "cmt_msg": "netlink: Fix kernel-infoleak-after-free in __skb_datagram_iter" + }, "CVE-2022-3111": { "cmt_msg": "power: supply: wm8350-power: Add missing free in free_charger_irq" }, @@ -120365,6 +153716,9 @@ "CVE-2020-0432": { "cmt_msg": "staging: most: net: fix buffer overflow" }, + "CVE-2024-26687": { + "cmt_msg": "xen/events: close evtchn after mapping cleanup" + }, "CVE-2023-51779": { "cmt_msg": "Bluetooth: af_bluetooth: Fix Use-After-Free in bt_sock_recvmsg" }, @@ -120380,6 +153734,9 @@ "CVE-2010-4563": { "cmt_msg": "" }, + "CVE-2021-47006": { + "cmt_msg": "ARM: 9064/1: hw_breakpoint: Do not directly check the event's overflow_handler hook" + }, "CVE-2023-1249": { "cmt_msg": "coredump: Use the vma snapshot in fill_files_note" }, @@ -120398,18 +153755,27 @@ "CVE-2023-0266": { "cmt_msg": "ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF" }, - "CVE-2023-1838": { - "cmt_msg": "Fix double fget() in vhost_net_set_backend()" + "CVE-2021-46928": { + "cmt_msg": "parisc: Clear stale IIR value on instruction access rights trap" }, "CVE-2021-3483": { "cmt_msg": "firewire: nosy: Fix a use-after-free bug in nosy_ioctl()" }, + "CVE-2024-26663": { + "cmt_msg": "tipc: Check the bearer type before calling tipc_udp_nl_bearer_add()" + }, "CVE-2021-20177": { "cmt_msg": "netfilter: add and use nf_hook_slow_list()" }, + "CVE-2024-26598": { + "cmt_msg": "KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache" + }, "CVE-2023-6040": { "cmt_msg": "netfilter: nf_tables: Reject tables of unsupported family" }, + "CVE-2024-23196": { + "cmt_msg": "ALSA: hda: fix a possible null-pointer dereference due to data race in snd_hdac_regmap_sync()" + }, "CVE-2021-38300": { "cmt_msg": "bpf, mips: Validate conditional branch offsets" }, @@ -120422,12 +153788,18 @@ "CVE-2022-24448": { "cmt_msg": "NFSv4: Handle case where the lookup of a directory fails" }, - "CVE-2024-26598": { - "cmt_msg": "KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache" + "CVE-2023-52498": { + "cmt_msg": "PM: sleep: Fix possible deadlocks in core system-wide PM code" }, "CVE-2021-4023": { "cmt_msg": "io-wq: fix cancellation on create-worker failure" }, + "CVE-2023-52640": { + "cmt_msg": "fs/ntfs3: Fix oob in ntfs_listxattr" + }, + "CVE-2023-52641": { + "cmt_msg": "fs/ntfs3: Add NULL ptr dereference checking at the end of attr_allocate_frame()" + }, "CVE-2021-22555": { "cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write" }, @@ -120437,23 +153809,41 @@ "CVE-2021-0399": { "cmt_msg": "" }, + "CVE-2023-52488": { + "cmt_msg": "serial: sc16is7xx: convert from _raw_ to _noinc_ regmap functions for FIFO" + }, "CVE-2020-36691": { "cmt_msg": "netlink: limit recursion depth in policy validation" }, + "CVE-2021-47179": { + "cmt_msg": "NFSv4: Fix a NULL pointer dereference in pnfs_mark_matching_lsegs_return()" + }, "CVE-2023-42755": { "cmt_msg": "net/sched: Retire rsvp classifier" }, "CVE-2020-36516": { "cmt_msg": "ipv4: avoid using shared IP generator for connected sockets" }, + "CVE-2023-52486": { + "cmt_msg": "drm: Don't unref the same fb many times by mistake due to deadlock handling" + }, + "CVE-2024-26791": { + "cmt_msg": "btrfs: dev-replace: properly validate device names" + }, + "CVE-2023-52480": { + "cmt_msg": "ksmbd: fix race condition between session lookup and expire" + }, "CVE-2012-4542": { "cmt_msg": "" }, "CVE-2022-1729": { "cmt_msg": "perf: Fix sys_perf_event_open() race against self" }, - "CVE-2023-42752": { - "cmt_msg": "igmp: limit igmpv3_newpack() packet size to IP_MAX_MTU" + "CVE-2023-1838": { + "cmt_msg": "Fix double fget() in vhost_net_set_backend()" + }, + "CVE-2023-28328": { + "cmt_msg": "media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer()" }, "CVE-2023-4128": { "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free" @@ -120461,42 +153851,81 @@ "CVE-2021-3573": { "cmt_msg": "Bluetooth: use correct lock to prevent UAF of hdev object" }, - "CVE-2024-0607": { - "cmt_msg": "netfilter: nf_tables: fix pointer math issue in nft_byteorder_eval()" + "CVE-2021-46921": { + "cmt_msg": "locking/qrwlock: Fix ordering in queued_write_lock_slowpath()" }, "CVE-2023-3609": { "cmt_msg": "net/sched: cls_u32: Fix reference counter leak leading to overflow" }, + "CVE-2022-44033": { + "cmt_msg": "char: pcmcia: remove all the drivers" + }, "CVE-2022-1974": { "cmt_msg": "nfc: replace improper check device_is_registered() in netlink related functions" }, "CVE-2022-1975": { "cmt_msg": "NFC: netlink: fix sleep in atomic bug when firmware download timeout" }, + "CVE-2023-52491": { + "cmt_msg": "media: mtk-jpeg: Fix use after free bug due to error path handling in mtk_jpeg_dec_device_run" + }, + "CVE-2022-44032": { + "cmt_msg": "char: pcmcia: remove all the drivers" + }, + "CVE-2020-36777": { + "cmt_msg": "media: dvbdev: Fix memory leak in dvb_media_device_free()" + }, + "CVE-2020-36775": { + "cmt_msg": "f2fs: fix to avoid potential deadlock" + }, + "CVE-2021-47083": { + "cmt_msg": "pinctrl: mediatek: fix global-out-of-bounds issue" + }, "CVE-2021-20292": { "cmt_msg": "drm/ttm/nouveau: don't call tt destroy callback on alloc failure." }, "CVE-2021-31916": { "cmt_msg": "dm ioctl: fix out of bounds array access when no devices" }, + "CVE-2021-47086": { + "cmt_msg": "phonet/pep: refuse to enable an unbound pipe" + }, "CVE-2022-32981": { "cmt_msg": "powerpc/32: Fix overread/overwrite of thread_struct via ptrace" }, + "CVE-2021-47122": { + "cmt_msg": "net: caif: fix memory leak in caif_device_notify" + }, + "CVE-2021-47121": { + "cmt_msg": "net: caif: fix memory leak in cfusbl_device_notify" + }, + "CVE-2021-47120": { + "cmt_msg": "HID: magicmouse: fix NULL-deref on disconnect" + }, "CVE-2022-1280": { "cmt_msg": "drm: avoid circular locks in drm_mode_getconnector" }, "CVE-2020-11668": { "cmt_msg": "media: xirlink_cit: add missing descriptor sanity checks" }, + "CVE-2021-47124": { + "cmt_msg": "io_uring: fix link timeout refs" + }, "CVE-2023-2269": { "cmt_msg": "dm ioctl: fix nested locking in table_clear() to remove deadlock concern" }, "CVE-2023-0394": { "cmt_msg": "ipv6: raw: Deduct extension header length in rawv6_push_pending_frames" }, + "CVE-2021-47171": { + "cmt_msg": "net: usb: fix memory leak in smsc75xx_bind" + }, "CVE-2020-10690": { "cmt_msg": "ptp: fix the race between the release of ptp_clock and cdev" }, + "CVE-2024-26615": { + "cmt_msg": "net/smc: fix illegal rmb_desc access in SMC-D connection dump" + }, "CVE-2022-3108": { "cmt_msg": "drm/amdkfd: Check for null pointer after calling kmemdup" }, @@ -120524,6 +153953,9 @@ "CVE-2020-3702": { "cmt_msg": "ath: Use safer key clearing with key cache entries" }, + "CVE-2023-52485": { + "cmt_msg": "drm/amd/display: Wake DMCUB before sending a command" + }, "CVE-2021-3653": { "cmt_msg": "KVM: nSVM: avoid picking up unsupported bits from L2 in int_ctl (CVE-2021-3653)" }, @@ -120551,6 +153983,9 @@ "CVE-2021-3714": { "cmt_msg": "" }, + "CVE-2021-46932": { + "cmt_msg": "Input: appletouch - initialize work before device registration" + }, "CVE-2019-16230": { "cmt_msg": "drm/amdkfd: fix a potential NULL pointer dereference (v2)" }, @@ -120611,32 +154046,62 @@ "CVE-2022-33744": { "cmt_msg": "xen/arm: Fix race in RB-tree based P2M accounting" }, + "CVE-2023-52596": { + "cmt_msg": "sysctl: Fix out of bounds access for empty sysctl registers" + }, + "CVE-2021-47016": { + "cmt_msg": "m68k: mvme147,mvme16x: Don't wipe PCC timer config bits" + }, + "CVE-2021-47015": { + "cmt_msg": "bnxt_en: Fix RX consumer index logic in the error path." + }, "CVE-2023-52443": { "cmt_msg": "apparmor: avoid crash when parsed profile name is empty" }, + "CVE-2021-47013": { + "cmt_msg": "net:emac/emac-mac: Fix a use after free in emac_mac_tx_buf_send" + }, "CVE-2022-2327": { "cmt_msg": "io_uring: remove any grabbing of context" }, + "CVE-2021-47158": { + "cmt_msg": "net: dsa: sja1105: add error handling in sja1105_setup()" + }, + "CVE-2021-47010": { + "cmt_msg": "net: Only allow init netns to set default tcp cong to a restricted algo" + }, "CVE-2021-45486": { "cmt_msg": "inet: use bigger hash table for IP ID generation" }, "CVE-2020-12888": { "cmt_msg": "vfio-pci: Invalidate mmaps and block MMIO access on disabled memory" }, - "CVE-2023-2194": { - "cmt_msg": "i2c: xgene-slimpro: Fix out-of-bounds bug in xgene_slimpro_i2c_xfer()" + "CVE-2021-47153": { + "cmt_msg": "i2c: i801: Don't generate an interrupt on bus reset" + }, + "CVE-2021-47150": { + "cmt_msg": "net: fec: fix the potential memory leak in fec_enet_init()" }, "CVE-2021-3923": { "cmt_msg": "RDMA/core: Don't infoleak GRH fields" }, - "CVE-2022-41218": { - "cmt_msg": "media: dvb-core: Fix UAF due to refcount races at releasing" + "CVE-2021-46936": { + "cmt_msg": "net: fix use-after-free in tw_timer_handler" + }, + "CVE-2021-46935": { + "cmt_msg": "binder: fix async_free_space accounting for empty parcels" + }, + "CVE-2021-46934": { + "cmt_msg": "i2c: validate user data in compat ioctl" + }, + "CVE-2021-46933": { + "cmt_msg": "usb: gadget: f_fs: Clear ffs_eventfd in ffs_data_clear." }, "CVE-2011-4917": { "cmt_msg": "" }, - "CVE-2023-52438": { - "cmt_msg": "binder: fix use-after-free in shinker's callback" + "CVE-2021-46930": { + "cmt_msg": "usb: mtu3: fix list_head check warning" }, "CVE-2022-36946": { "cmt_msg": "netfilter: nf_queue: do not allow packet truncation below transport header offset" @@ -120647,11 +154112,17 @@ "CVE-2021-0448": { "cmt_msg": "netfilter: ctnetlink: add a range check for l3/l4 protonum" }, - "CVE-2022-21166": { - "cmt_msg": "x86/speculation/mmio: Enable CPU Fill buffer clearing on idle" + "CVE-2021-47103": { + "cmt_msg": "inet: fully convert sk->sk_rx_dst to RCU rules" + }, + "CVE-2021-46939": { + "cmt_msg": "tracing: Restructure trace_clock_global() to never block" + }, + "CVE-2021-46938": { + "cmt_msg": "dm rq: fix double free of blk_mq_tag_set in dev remove after table load fails" }, "CVE-2024-0841": { - "cmt_msg": "" + "cmt_msg": "fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super" }, "CVE-2023-52449": { "cmt_msg": "mtd: Fix gluebi NULL pointer dereference caused by ftl notifier" @@ -120704,8 +154175,8 @@ "CVE-2022-1195": { "cmt_msg": "hamradio: improve the incomplete fix to avoid NPD" }, - "CVE-2024-22099": { - "cmt_msg": "" + "CVE-2023-3863": { + "cmt_msg": "net: nfc: Fix use-after-free caused by nfc_llcp_find_local" }, "CVE-2021-4202": { "cmt_msg": "NFC: reorganize the functions in nci_request" @@ -120713,21 +154184,39 @@ "CVE-2021-4203": { "cmt_msg": "af_unix: fix races in sk_peer_pid and sk_peer_cred accesses" }, - "CVE-2022-45887": { - "cmt_msg": "media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb()" + "CVE-2022-4269": { + "cmt_msg": "act_mirred: use the backlog for nested calls to mirred ingress" }, "CVE-2022-45886": { "cmt_msg": "media: dvb-core: Fix use-after-free due on race condition at dvb_net" }, + "CVE-2023-52509": { + "cmt_msg": "ravb: Fix use-after-free issue in ravb_tx_timeout_work()" + }, "CVE-2023-46343": { "cmt_msg": "nfc: nci: fix possible NULL pointer dereference in send_acknowledge()" }, "CVE-2024-25744": { "cmt_msg": "x86/coco: Disable 32-bit emulation by default on TDX and SEV" }, + "CVE-2023-52504": { + "cmt_msg": "x86/alternatives: Disable KASAN in apply_alternatives()" + }, + "CVE-2023-52507": { + "cmt_msg": "nfc: nci: assert requested protocol is valid" + }, "CVE-2023-2124": { "cmt_msg": "xfs: verify buffer contents when we skip log replay" }, + "CVE-2023-52501": { + "cmt_msg": "ring-buffer: Do not attempt to read past \"commit\"" + }, + "CVE-2023-52500": { + "cmt_msg": "scsi: pm80xx: Avoid leaking tags when processing OPC_INB_SET_CONTROLLER_CONFIG command" + }, + "CVE-2023-52502": { + "cmt_msg": "net: nfc: fix races in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn()" + }, "CVE-2023-1281": { "cmt_msg": "net/sched: tcindex: update imperfect hash filters respecting rcu" }, @@ -120749,9 +154238,21 @@ "CVE-2022-27672": { "cmt_msg": "x86/speculation: Identify processors vulnerable to SMT RSB predictions" }, + "CVE-2024-26623": { + "cmt_msg": "pds_core: Prevent race issues involving the adminq" + }, + "CVE-2024-26668": { + "cmt_msg": "netfilter: nft_limit: reject configurations that cause integer overflow" + }, "CVE-2022-2964": { "cmt_msg": "net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup" }, + "CVE-2021-47146": { + "cmt_msg": "mld: fix panic in mld_newpack()" + }, + "CVE-2022-38457": { + "cmt_msg": "drm/vmwgfx: Remove rcu locks from user resources" + }, "CVE-2015-2877": { "cmt_msg": "" }, @@ -120761,6 +154262,12 @@ "CVE-2023-26242": { "cmt_msg": "" }, + "CVE-2024-26664": { + "cmt_msg": "hwmon: (coretemp) Fix out-of-bounds memory access" + }, + "CVE-2024-26688": { + "cmt_msg": "fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super" + }, "CVE-2019-16089": { "cmt_msg": "" }, @@ -120770,6 +154277,9 @@ "CVE-2021-38199": { "cmt_msg": "NFSv4: Initialise connection to the server in nfs4_alloc_client()" }, + "CVE-2024-26689": { + "cmt_msg": "ceph: prevent use-after-free in encode_cap_msg()" + }, "CVE-2022-1679": { "cmt_msg": "ath9k: fix use-after-free in ath9k_hif_usb_rx_cb" }, @@ -120821,9 +154331,21 @@ "CVE-2023-23039": { "cmt_msg": "" }, + "CVE-2024-26733": { + "cmt_msg": "arp: Prevent overflow in arp_req_get()." + }, + "CVE-2024-26719": { + "cmt_msg": "nouveau: offload fence uevents work to workqueue" + }, + "CVE-2024-26715": { + "cmt_msg": "usb: dwc3: gadget: Fix NULL pointer dereference in dwc3_gadget_suspend" + }, "CVE-2024-1312": { "cmt_msg": "mm: lock_vma_under_rcu() must check vma->anon_vma under vma lock" }, + "CVE-2024-26713": { + "cmt_msg": "powerpc/pseries/iommu: Fix iommu initialisation during DLPAR add" + }, "CVE-2023-3338": { "cmt_msg": "Remove DECnet support from kernel" }, @@ -120834,12 +154356,38 @@ }, "5.12": { "5.12": { + "CVE-2021-46921": { + "cmt_msg": "locking/qrwlock: Fix ordering in queued_write_lock_slowpath()", + "cmt_id": "84a24bf8c52e66b7ac89ada5e3cfbe72d65c1896" + }, + "CVE-2021-46922": { + "cmt_msg": "KEYS: trusted: Fix TPM reservation for seal/unseal", + "cmt_id": "9d5171eab462a63e2fbebfccf6026e92be018f20" + }, "CVE-2019-15794": { "cmt_msg": "ovl: fix reference counting in ovl_mmap error path", "cmt_id": "2896900e22f8212606a1837d89a6bbce314ceeda" } }, + "5.12.1": { + "CVE-2021-46905": { + "cmt_msg": "net: hso: fix NULL-deref on disconnect regression", + "cmt_id": "41c44e1f3112d7265dae522c026399b2a42d19ef" + } + }, "5.12.2": { + "CVE-2021-46973": { + "cmt_msg": "net: qrtr: Avoid potential use after free in MHI send", + "cmt_id": "03c649dee8b1eb5600212a249542a70f47a5ab40" + }, + "CVE-2021-46972": { + "cmt_msg": "ovl: fix leaked dentry", + "cmt_id": "d587cfaef72b1b6f4b2774827123bce91f497cc8" + }, + "CVE-2021-46971": { + "cmt_msg": "perf/core: Fix unconditional security_locked_down() call", + "cmt_id": "c7b0208ee370b89d20486fae71cd9abb759819c1" + }, "CVE-2021-38209": { "cmt_msg": "netfilter: conntrack: Make global sysctls readonly in non-init netns", "cmt_id": "671c54ea8c7ff47bd88444f3fffb65bf9799ce43" @@ -120847,16 +154395,152 @@ "CVE-2021-31829": { "cmt_msg": "bpf: Fix masking negation logic upon negative dst register", "cmt_id": "7cf64d8679ca1cb20cf57d6a88bfee79a0922a66" + }, + "CVE-2021-46974": { + "cmt_msg": "bpf: Fix masking negation logic upon negative dst register", + "cmt_id": "7cf64d8679ca1cb20cf57d6a88bfee79a0922a66" } }, "5.12.3": { - "CVE-2021-3506": { - "cmt_msg": "f2fs: fix to avoid out-of-bounds memory access", - "cmt_id": "0b60f23e29c8dfcf1b8a037fae1167e4f2e3249e" + "CVE-2020-36777": { + "cmt_msg": "media: dvbdev: Fix memory leak in dvb_media_device_free()", + "cmt_id": "cede24d13be6c2a62be6d7ceea63c2719b0cfa82" + }, + "CVE-2020-36776": { + "cmt_msg": "thermal/drivers/cpufreq_cooling: Fix slab OOB issue", + "cmt_id": "6bf443acf6ca4f666d0e4225614ba9993a3aa1a9" + }, + "CVE-2021-46968": { + "cmt_msg": "s390/zcrypt: fix zcard and zqueue hot-unplug memleak", + "cmt_id": "971dc8706cee47393d393905d294ea47e39503d3" + }, + "CVE-2021-46969": { + "cmt_msg": "bus: mhi: core: Fix invalid error returning in mhi_queue", + "cmt_id": "a99b661c3187365f81026d89b1133a76cd2652b3" + }, + "CVE-2021-46964": { + "cmt_msg": "scsi: qla2xxx: Reserve extra IRQ vectors", + "cmt_id": "0f86d66b38501e3ac66cf2d9f9f8ad6838bad0e6" + }, + "CVE-2021-46965": { + "cmt_msg": "mtd: physmap: physmap-bt1-rom: Fix unintentional stack access", + "cmt_id": "4d786870e3262ec098a3b4ed10b895176bc66ecb" + }, + "CVE-2021-46966": { + "cmt_msg": "ACPI: custom_method: fix potential use-after-free issue", + "cmt_id": "b7a5baaae212a686ceb812c32fceed79c03c0234" + }, + "CVE-2021-46967": { + "cmt_msg": "vhost-vdpa: fix vm_flags for virtqueue doorbell mapping", + "cmt_id": "93dbbf20e3ffad14f04227a0b7105f6e6f0387ce" + }, + "CVE-2021-46960": { + "cmt_msg": "cifs: Return correct error code from smb2_get_enc_key", + "cmt_id": "b399c1a3ea0b9d10047ff266d65533df7f15532f" + }, + "CVE-2021-46961": { + "cmt_msg": "irqchip/gic-v3: Do not enable irqs when handling spurious interrups", + "cmt_id": "3f72d3709f53af72835af7dc8b15ba61611a0e36" + }, + "CVE-2021-46962": { + "cmt_msg": "mmc: uniphier-sd: Fix a resource leak in the remove function", + "cmt_id": "d6e7fda496978f2763413b5523557b38dc2bf6c2" + }, + "CVE-2021-46963": { + "cmt_msg": "scsi: qla2xxx: Fix crash in qla2xxx_mqueuecommand()", + "cmt_id": "a73208e3244127ef9f2cdf24e4adb947aaa32053" + }, + "CVE-2021-46942": { + "cmt_msg": "io_uring: fix shared sqpoll cancellation hangs", + "cmt_id": "cb5e0b3d0f993a6268c1a2c7ede2f9aa0c17ef68" + }, + "CVE-2021-46943": { + "cmt_msg": "media: staging/intel-ipu3: Fix set_fmt error handling", + "cmt_id": "6fb617e37a39db0a3eca4489431359d0bdf3b9bc" + }, + "CVE-2021-46940": { + "cmt_msg": "tools/power turbostat: Fix offset overflow issue in index converting", + "cmt_id": "337b1546cde87fb8588ddaedf0201b769baa572a" + }, + "CVE-2021-46941": { + "cmt_msg": "usb: dwc3: core: Do core softreset when switch mode", + "cmt_id": "1c10fd60c8595ea7ff7e29d3cf1fa88069941da3" + }, + "CVE-2021-46947": { + "cmt_msg": "sfc: adjust efx->xdp_tx_queue_count with the real number of initialized queues", + "cmt_id": "ebeac958b690123a0b40aa61f688f2f170035fad" + }, + "CVE-2021-46944": { + "cmt_msg": "media: staging/intel-ipu3: Fix memory leak in imu_fmt", + "cmt_id": "74ba0adb5e983503b18a96121d965cad34ac7ce3" + }, + "CVE-2021-46945": { + "cmt_msg": "ext4: always panic when errors=panic is specified", + "cmt_id": "1e9ea8f4637026b8e965128953f2da061ccae9c4" + }, + "CVE-2021-46948": { + "cmt_msg": "sfc: farch: fix TX queue lookup in TX event handling", + "cmt_id": "e531db1ea6f98c9612cb2de093a107c7eadfb96c" + }, + "CVE-2021-46949": { + "cmt_msg": "sfc: farch: fix TX queue lookup in TX flush done handling", + "cmt_id": "98d91180748986bfb6dfb3e72765f3225719a647" }, "CVE-2021-3543": { "cmt_msg": "nitro_enclaves: Fix stale file descriptors on failed usercopy", "cmt_id": "3494c68d79cbb7ddff88fd35e0796343ef736606" + }, + "CVE-2021-46970": { + "cmt_msg": "bus: mhi: pci_generic: Remove WQ_MEM_RECLAIM flag from state workqueue", + "cmt_id": "ed541cff35cbdb695f0c98ef506dd7218883fc07" + }, + "CVE-2021-46954": { + "cmt_msg": "net/sched: sch_frag: fix stack OOB read while fragmenting IPv4 packets", + "cmt_id": "8e6dfb7beeb6489ac1365b8a71052e737f5da76e" + }, + "CVE-2021-46951": { + "cmt_msg": "tpm: efi: Use local variable for calculating final log size", + "cmt_id": "ac07c557ca12ec9276c0375517bac7ae5be4e50c" + }, + "CVE-2021-46950": { + "cmt_msg": "md/raid1: properly indicate failure when ending a failed write request", + "cmt_id": "538244fba59fde17186322776247cd9c05be86dd" + }, + "CVE-2021-46953": { + "cmt_msg": "ACPI: GTDT: Don't corrupt interrupt mappings on watchdow probe failure", + "cmt_id": "596e079c362ac17ed02aa1b99fdc444d62072a01" + }, + "CVE-2021-46952": { + "cmt_msg": "NFS: fs_context: validate UDP retrans to prevent shift out-of-bounds", + "cmt_id": "3d0163821c035040a46d816a42c0780f0f0a30a8" + }, + "CVE-2021-46955": { + "cmt_msg": "openvswitch: fix stack OOB read while fragmenting IPv4 packets", + "cmt_id": "b3502b04e84ac5349be95fc033c17bd701d2787a" + }, + "CVE-2021-3506": { + "cmt_msg": "f2fs: fix to avoid out-of-bounds memory access", + "cmt_id": "0b60f23e29c8dfcf1b8a037fae1167e4f2e3249e" + }, + "CVE-2021-46957": { + "cmt_msg": "riscv/kprobe: fix kernel panic when invoking sys_read traced by kprobe", + "cmt_id": "fd0f06590d35c99f98d12c7984897ec4201a6263" + }, + "CVE-2021-46956": { + "cmt_msg": "virtiofs: fix memory leak in virtio_fs_probe()", + "cmt_id": "5116e79fc6e6725b8acdad8b7e928a83ab7b47e6" + }, + "CVE-2021-46958": { + "cmt_msg": "btrfs: fix race between transaction aborts and fsyncs leading to use-after-free", + "cmt_id": "e2da98788369bfba1138bada72765c47989a4338" + }, + "CVE-2021-46939": { + "cmt_msg": "tracing: Restructure trace_clock_global() to never block", + "cmt_id": "2a1bd74b8186d7938bf004f5603f25b84785f63e" + }, + "CVE-2021-46938": { + "cmt_msg": "dm rq: fix double free of blk_mq_tag_set in dev remove after table load fails", + "cmt_id": "d757bf4c69cda3c3ab7f775dfabbf5a80e2f6f9d" } }, "5.12.4": { @@ -120868,58 +154552,594 @@ "cmt_msg": "io_uring: truncate lengths larger than MAX_RW_COUNT on provide buffers", "cmt_id": "ca2960d35c36f2e601563c49f6673efd111b94c0" }, - "CVE-2021-45486": { - "cmt_msg": "inet: use bigger hash table for IP ID generation", - "cmt_id": "806245375ff907cc8771de7a11585992a96d7937" + "CVE-2021-47048": { + "cmt_msg": "spi: spi-zynqmp-gqspi: fix use-after-free in zynqmp_qspi_exec_op", + "cmt_id": "23269ac9f123eca3aea7682d3345c02e71ed696c" + }, + "CVE-2021-47049": { + "cmt_msg": "Drivers: hv: vmbus: Use after free in __vmbus_open()", + "cmt_id": "2728f289b3270b0e273292b46c534421a33bbfd5" + }, + "CVE-2021-47044": { + "cmt_msg": "sched/fair: Fix shift-out-of-bounds in load_balance()", + "cmt_id": "805cea93e66ca7deaaf6ad3b67224ce47c104c2f" + }, + "CVE-2021-47045": { + "cmt_msg": "scsi: lpfc: Fix null pointer dereference in lpfc_prep_els_iocb()", + "cmt_id": "9bdcfbed2a9fe24d2c7eaa1bad7c705e18de8cc7" + }, + "CVE-2021-47046": { + "cmt_msg": "drm/amd/display: Fix off by one in hdmi_14_process_transaction()", + "cmt_id": "080bd41d6478a64edf96704fddcda52b1fd5fed7" + }, + "CVE-2021-47047": { + "cmt_msg": "spi: spi-zynqmp-gqspi: return -ENOMEM if dma_map_single fails", + "cmt_id": "bad5a23cf2b477fa78b85fd392736dae09a1e818" + }, + "CVE-2021-47040": { + "cmt_msg": "io_uring: fix overflows checks in provide buffers", + "cmt_id": "84b8c266c4bfe9ed5128e13253c388deb74b1b03" + }, + "CVE-2021-47041": { + "cmt_msg": "nvmet-tcp: fix incorrect locking in state_change sk callback", + "cmt_id": "906c538340dde6d891df89fe7dac8eaa724e40da" + }, + "CVE-2020-36779": { + "cmt_msg": "i2c: stm32f7: fix reference leak when pm_runtime_get_sync fails", + "cmt_id": "c7ea772c9fcf711ed566814b92eecaffc0e2bfd0" + }, + "CVE-2020-36778": { + "cmt_msg": "i2c: xiic: fix reference leak when pm_runtime_get_sync fails", + "cmt_id": "a42ac16e6573f19c78f556ea292f5b534fcc4514" + }, + "CVE-2021-47062": { + "cmt_msg": "KVM: SVM: Use online_vcpus, not created_vcpus, to iterate over vCPUs", + "cmt_id": "ba7bf5d6336aa9c0d977b161bfa420c56d46ee40" + }, + "CVE-2021-47063": { + "cmt_msg": "drm: bridge/panel: Cleanup connector on bridge detach", + "cmt_id": "98d7d76a74e48ec3ddf2e23950adff7edcab9327" + }, + "CVE-2021-33034": { + "cmt_msg": "Bluetooth: verify AMP hci_chan before amp_destroy", + "cmt_id": "c026c3dc3947c714a19779d0a6c596b55e63685d" + }, + "CVE-2021-47061": { + "cmt_msg": "KVM: Destroy I/O bus devices on unregister failure _after_ sync'ing SRCU", + "cmt_id": "30f46c6993731efb2a690c9197c0fd9ed425da2d" + }, + "CVE-2021-47066": { + "cmt_msg": "async_xor: increase src_offs when dropping destination page", + "cmt_id": "53f8208e11abd6dde9480dfcb97fecdb1bc2ac18" + }, + "CVE-2021-47067": { + "cmt_msg": "soc/tegra: regulators: Fix locking up when voltage-spread is out of range", + "cmt_id": "ff39adf5d31c72025bba799aec69c5c86d81d549" + }, + "CVE-2021-47028": { + "cmt_msg": "mt76: mt7915: fix txrate reporting", + "cmt_id": "4bd926e5ca88eac4d95eacb806b229f8729bc62e" + }, + "CVE-2021-47029": { + "cmt_msg": "mt76: connac: fix kernel warning adding monitor interface", + "cmt_id": "2554b9cb4b5e097c6071ec3ed5bc7c665c477ca7" + }, + "CVE-2021-47026": { + "cmt_msg": "RDMA/rtrs-clt: destroy sysfs after removing session from active list", + "cmt_id": "d3cca8067d43dfee4a3535c645b55f618708dccb" + }, + "CVE-2021-47027": { + "cmt_msg": "mt76: mt7921: fix kernel crash when the firmware fails to download", + "cmt_id": "a46b536cd60c0dbd4bf767c62a8774dec52bf099" + }, + "CVE-2021-47024": { + "cmt_msg": "vsock/virtio: free queued packets when closing socket", + "cmt_id": "37c38674ef2f8d7e8629e5d433c37d6c1273d16b" + }, + "CVE-2021-47025": { + "cmt_msg": "iommu/mediatek: Always enable the clk on resume", + "cmt_id": "5cad9e2caa9613fdcd246bd4ebf0ffbec1cba2ca" + }, + "CVE-2021-47022": { + "cmt_msg": "mt76: mt7615: fix memleak when mt7615_unregister_device()", + "cmt_id": "6c5b2b0c6e5a6ce2d8f9f85b8b72bfad60eaa506" + }, + "CVE-2021-47023": { + "cmt_msg": "net: marvell: prestera: fix port event handling on init", + "cmt_id": "9d1ba11fabdd8f25abb24272ef1621417981320b" + }, + "CVE-2021-47020": { + "cmt_msg": "soundwire: stream: fix memory leak in stream config error path", + "cmt_id": "effd2bd62b416f6629e18e3ce077c60de14cfdea" + }, + "CVE-2021-47021": { + "cmt_msg": "mt76: mt7915: fix memleak when mt7915_unregister_device()", + "cmt_id": "d754c80ae82a662e692a82faad71b8c218cb7f52" + }, + "CVE-2021-47068": { + "cmt_msg": "net/nfc: fix use-after-free llcp_sock_bind/connect", + "cmt_id": "18175fe17ae043a0b81e5d511f8817825784c299" }, "CVE-2021-32399": { "cmt_msg": "bluetooth: eliminate the potential race condition when removing the HCI controller", "cmt_id": "93d388c087d71aed0e79b8c7db3132f28c010197" }, + "CVE-2020-36782": { + "cmt_msg": "i2c: imx-lpi2c: fix reference leak when pm_runtime_get_sync fails", + "cmt_id": "b100650d80cd2292f6c152f5f2943b5944b3e8ce" + }, + "CVE-2020-36783": { + "cmt_msg": "i2c: img-scb: fix reference leak when pm_runtime_get_sync fails", + "cmt_id": "7ee35cde1e810ad6ca589980b9ec2b7b62946a5b" + }, + "CVE-2020-36780": { + "cmt_msg": "i2c: sprd: fix reference leak when pm_runtime_get_sync fails", + "cmt_id": "d3406ab52097328a3bc4cbe124bfd8f6d51fb86f" + }, + "CVE-2020-36781": { + "cmt_msg": "i2c: imx: fix reference leak when pm_runtime_get_sync fails", + "cmt_id": "ff406f6cd09c273337ab4854292e4aca48f8affd" + }, + "CVE-2020-36786": { + "cmt_msg": "media: [next] staging: media: atomisp: fix memory leak of object flash", + "cmt_id": "27d2eab69f7da8e94e4751ac5c6d22d809275484" + }, + "CVE-2020-36787": { + "cmt_msg": "media: aspeed: fix clock handling logic", + "cmt_id": "75321dc8aebe3f30eff226028fe6da340fe0bf02" + }, + "CVE-2020-36784": { + "cmt_msg": "i2c: cadence: fix reference leak when pm_runtime_get_sync fails", + "cmt_id": "a45fc41beed8e0fe31864619c34aa00797fb60c1" + }, + "CVE-2020-36785": { + "cmt_msg": "media: atomisp: Fix use after free in atomisp_alloc_css_stat_bufs()", + "cmt_id": "8267ccd7b9df7ab682043507dd682fe0621cf045" + }, + "CVE-2021-47053": { + "cmt_msg": "crypto: sun8i-ss - Fix memory leak of pad", + "cmt_id": "d3d702084d125689edb2b9395c707e09b471352e" + }, + "CVE-2021-47033": { + "cmt_msg": "mt76: mt7615: fix tx skb dma unmap", + "cmt_id": "821ae236ccea989a1fcc6abfc4d5b74ad4ba39d2" + }, + "CVE-2021-47043": { + "cmt_msg": "media: venus: core: Fix some resource leaks in the error path of 'venus_probe()'", + "cmt_id": "711acdf0228dc71601247f28b56f13e850e395c8" + }, + "CVE-2021-47032": { + "cmt_msg": "mt76: mt7915: fix tx skb dma unmap", + "cmt_id": "e2cdc9cb33c5963efe1a7c022753386f9463d1b7" + }, + "CVE-2021-47065": { + "cmt_msg": "rtw88: Fix array overrun in rtw_get_tx_power_params()", + "cmt_id": "9cd09722e18a08b6a3d68b8bccfac39ddc22434c" + }, + "CVE-2021-47059": { + "cmt_msg": "crypto: sun8i-ss - fix result memory leak on error path", + "cmt_id": "50e7b39b808430ad49a637dc6fb72ca93b451b13" + }, + "CVE-2021-47058": { + "cmt_msg": "regmap: set debugfs_name to NULL after it is freed", + "cmt_id": "b9e569ae1da3a113b3acee8703c94777fd20938a" + }, "CVE-2021-3489": { "cmt_msg": "bpf, ringbuf: Deny reserve of buffers larger than ringbuf", "cmt_id": "53eb85cc663089f0eff42679f54ae915dcefc433" }, + "CVE-2021-47052": { + "cmt_msg": "crypto: sa2ul - Fix memory leak of rxd", + "cmt_id": "b7bd0657c2036add71981d88a7fae50188150b6e" + }, + "CVE-2021-47051": { + "cmt_msg": "spi: fsl-lpspi: Fix PM reference leak in lpspi_prepare_xfer_hardware()", + "cmt_id": "6a2b5cee0d31ab6cc51030c441135b0e31217282" + }, + "CVE-2021-47050": { + "cmt_msg": "memory: renesas-rpc-if: fix possible NULL pointer dereference of resource", + "cmt_id": "a74cb41af7dbe019e4096171f8bc641c7ce910ad" + }, + "CVE-2021-47057": { + "cmt_msg": "crypto: sun8i-ss - Fix memory leak of object d when dma_iv fails to map", + "cmt_id": "6516cb852d704ff8d615de1f93cd443a99736c3d" + }, + "CVE-2021-47056": { + "cmt_msg": "crypto: qat - ADF_STATUS_PF_RUNNING should be set after adf_dev_init", + "cmt_id": "1ea500ce6f7c9106e4a561d28e69215f3d451818" + }, + "CVE-2021-47055": { + "cmt_msg": "mtd: require write permissions for locking and badblock ioctls", + "cmt_id": "a08799d3e8c8088640956237c183f83463c39668" + }, + "CVE-2021-47054": { + "cmt_msg": "bus: qcom: Put child node before return", + "cmt_id": "c6f8e0dc8da1cd78d640dee392071cc2326ec1b2" + }, + "CVE-2021-47017": { + "cmt_msg": "ath10k: Fix a use after free in ath10k_htc_send_bundle", + "cmt_id": "5e413c0831ff4700d1739db3fa3ae9f859744676" + }, + "CVE-2021-47016": { + "cmt_msg": "m68k: mvme147,mvme16x: Don't wipe PCC timer config bits", + "cmt_id": "5d34225169346cab5145978d153b9ce90e9ace21" + }, + "CVE-2021-47015": { + "cmt_msg": "bnxt_en: Fix RX consumer index logic in the error path.", + "cmt_id": "3fbc5bc651d688fbea2a59cdc91520a2f5334d0a" + }, + "CVE-2021-47014": { + "cmt_msg": "net/sched: act_ct: fix wild memory access when clearing fragments", + "cmt_id": "0648941f4c8bbf8b4b6c0b270889ae7aa769b921" + }, + "CVE-2021-47013": { + "cmt_msg": "net:emac/emac-mac: Fix a use after free in emac_mac_tx_buf_send", + "cmt_id": "e407495ba6788a67d1bd41714158c079e340879b" + }, + "CVE-2021-47012": { + "cmt_msg": "RDMA/siw: Fix a use after free in siw_alloc_mr", + "cmt_id": "ad9ce7188432650469a6c7625bf479f5ed0b6155" + }, + "CVE-2021-47011": { + "cmt_msg": "mm: memcontrol: slab: fix obtain a reference to a freeing memcg", + "cmt_id": "c3ae6a3f3ca4f02f6ccddf213c027302586580d0" + }, + "CVE-2021-47010": { + "cmt_msg": "net: Only allow init netns to set default tcp cong to a restricted algo", + "cmt_id": "e7d7bedd507bb732e600403b7a96f9fe48d0ca31" + }, + "CVE-2021-47035": { + "cmt_msg": "iommu/vt-d: Remove WO permissions on second-level paging entries", + "cmt_id": "66c24699f266ff310381a9552d3576eea8ad6e20" + }, + "CVE-2021-47034": { + "cmt_msg": "powerpc/64s: Fix pte update for kernel memory on radix", + "cmt_id": "e40c52ee67b155ad59f59e73ea136d02685f0e0d" + }, + "CVE-2021-47037": { + "cmt_msg": "ASoC: q6afe-clocks: fix reprobing of the driver", + "cmt_id": "62413972f5266568848a36fd15160397b211fa74" + }, + "CVE-2021-47036": { + "cmt_msg": "udp: skip L4 aggregation for UDP tunnel packets", + "cmt_id": "450687386cd16d081b58cd7a342acff370a96078" + }, + "CVE-2021-47031": { + "cmt_msg": "mt76: mt7921: fix memory leak in mt7921_coredump_work", + "cmt_id": "4811226374453607175ea057777faa7e7f752204" + }, + "CVE-2021-47030": { + "cmt_msg": "mt76: mt7615: fix memory leak in mt7615_coredump_work", + "cmt_id": "54b989653c5531bc4416ced33f146b9cb633d978" + }, + "CVE-2021-47019": { + "cmt_msg": "mt76: mt7921: fix possible invalid register access", + "cmt_id": "b13cbc536990ff609afa878b6211cd6f6265ba60" + }, + "CVE-2021-47018": { + "cmt_msg": "powerpc/64: Fix the definition of the fixmap area", + "cmt_id": "a84df7c80bdac598d6ac9268ae578da6928883e8" + }, + "CVE-2021-45486": { + "cmt_msg": "inet: use bigger hash table for IP ID generation", + "cmt_id": "806245375ff907cc8771de7a11585992a96d7937" + }, + "CVE-2021-47064": { + "cmt_msg": "mt76: fix potential DMA mapping leak", + "cmt_id": "91b9548d413fda488ea853cd1b9f59b572db3a0c" + }, "CVE-2021-31440": { "cmt_msg": "bpf: Fix propagation of 32 bit unsigned bounds from 64 bit bounds", "cmt_id": "b64a9914918d4f2112fd244fe7bb6f98b20e8f60" }, - "CVE-2021-33034": { - "cmt_msg": "Bluetooth: verify AMP hci_chan before amp_destroy", - "cmt_id": "c026c3dc3947c714a19779d0a6c596b55e63685d" + "CVE-2021-47042": { + "cmt_msg": "drm/amd/display: Free local data after use", + "cmt_id": "296443139f893b554dddd56a99ba8471ab5802d4" + }, + "CVE-2021-47060": { + "cmt_msg": "KVM: Stop looking for coalesced MMIO zones if the bus is destroyed", + "cmt_id": "50cbad42bfea8c052b7ca590bd4126cdc898713c" + }, + "CVE-2021-47039": { + "cmt_msg": "ataflop: potential out of bounds in do_format()", + "cmt_id": "2a3a8bbca28b899806844c00d49ed1b7ccb50957" }, "CVE-2021-23134": { "cmt_msg": "net/nfc: fix use-after-free llcp_sock_bind/connect", "cmt_id": "18175fe17ae043a0b81e5d511f8817825784c299" + }, + "CVE-2021-47038": { + "cmt_msg": "Bluetooth: avoid deadlock between hci_dev->lock and socket lock", + "cmt_id": "332e69eb3bd90370f2d9f2c2ca7974ff523dea17" } }, "5.12.5": { + "CVE-2021-46986": { + "cmt_msg": "usb: dwc3: gadget: Free gadget structure only after freeing endpoints", + "cmt_id": "b4b8e9601d7ee8806d2687f081a42485d27674a1" + }, + "CVE-2021-46987": { + "cmt_msg": "btrfs: fix deadlock when cloning inline extents and using qgroups", + "cmt_id": "96157707c0420e3d3edfe046f1cc797fee117ade" + }, + "CVE-2021-46984": { + "cmt_msg": "kyber: fix out of bounds access when preempted", + "cmt_id": "2ef3c76540c49167a0bc3d5f80d00fd1fc4586df" + }, + "CVE-2021-46985": { + "cmt_msg": "ACPI: scan: Fix a memory leak in an error handling path", + "cmt_id": "a7e17a8d421ae23c920240625b4413c7b94d94a4" + }, + "CVE-2021-46982": { + "cmt_msg": "f2fs: compress: fix race condition of overwrite vs truncate", + "cmt_id": "936158b15e2648253afb824d252c910c496d34b5" + }, + "CVE-2021-46983": { + "cmt_msg": "nvmet-rdma: Fix NULL deref when SEND is completed with error", + "cmt_id": "5bdb34466ad8370546dfa0497594fb1d6f2fed90" + }, + "CVE-2021-46980": { + "cmt_msg": "usb: typec: ucsi: Retrieve all the PDOs instead of just the first 4", + "cmt_id": "5e9c6f58b01e6fdfbc740390c01f542a35c97e57" + }, + "CVE-2021-46981": { + "cmt_msg": "nbd: Fix NULL pointer in flush_workqueue", + "cmt_id": "54b78ba7e96e5fe1edb8054e375d31a6c0dc60dc" + }, + "CVE-2021-47000": { + "cmt_msg": "ceph: fix inode leak on getattr error in __fh_to_dentry", + "cmt_id": "0a219432127d396120fc88cabd82785e0ff72a2f" + }, + "CVE-2021-47001": { + "cmt_msg": "xprtrdma: Fix cwnd update ordering", + "cmt_id": "19b5fa9489b5706bc878c3a522a7f771079e2fa0" + }, + "CVE-2021-47002": { + "cmt_msg": "SUNRPC: Fix null pointer dereference in svc_rqst_free()", + "cmt_id": "c664aaec9aee544538a78ba4893a44bc73a6d742" + }, + "CVE-2021-47003": { + "cmt_msg": "dmaengine: idxd: Fix potential null dereference on pointer status", + "cmt_id": "7bc402f843e7817a4a808e7b9ab0bcd7ffd55bfa" + }, + "CVE-2021-47004": { + "cmt_msg": "f2fs: fix to avoid touching checkpointed data in get_victim()", + "cmt_id": "211372b2571520e394b56b431a0705586013b3ff" + }, + "CVE-2021-47005": { + "cmt_msg": "PCI: endpoint: Fix NULL pointer dereference for ->get_features()", + "cmt_id": "0169d4f0bee44fdfef908c13ed21fcb326c38695" + }, + "CVE-2021-46988": { + "cmt_msg": "userfaultfd: release page in error path to avoid BUG_ON", + "cmt_id": "2d59a0ed8b26b8f3638d8afc31f839e27759f1f6" + }, + "CVE-2021-46989": { + "cmt_msg": "hfsplus: prevent corruption in shrinking truncate", + "cmt_id": "97314e45aa1223a42d60256a62c5d9af54baf446" + }, "CVE-2021-4157": { "cmt_msg": "pNFS/flexfiles: fix incorrect size check in decode_nfs_fh()", "cmt_id": "754efbbdaf4e99f9e8d9bd0ef1470ff639cdb5f4" + }, + "CVE-2021-46999": { + "cmt_msg": "sctp: do asoc update earlier in sctp_sf_do_dupcook_a", + "cmt_id": "0bfd913c2121b3d553bfd52810fe6061d542d625" + }, + "CVE-2021-46998": { + "cmt_msg": "ethernet:enic: Fix a use after free bug in enic_hard_start_xmit", + "cmt_id": "d90529392aaf498dafa95d212295d64b2cea4e24" + }, + "CVE-2021-47006": { + "cmt_msg": "ARM: 9064/1: hw_breakpoint: Do not directly check the event's overflow_handler hook", + "cmt_id": "dabe299425b1a53a69461fed7ac8922ea6733a25" + }, + "CVE-2021-47007": { + "cmt_msg": "f2fs: fix panic during f2fs_resize_fs()", + "cmt_id": "822054e5026c43b1dd60cf387dd999e95ee2ecc2" + }, + "CVE-2021-46995": { + "cmt_msg": "can: mcp251xfd: mcp251xfd_probe(): fix an error pointer dereference in probe", + "cmt_id": "15f8f96ec7fc35024d4e03296e4d838fcea33d83" + }, + "CVE-2021-46994": { + "cmt_msg": "can: mcp251x: fix resume from sleep before interface was brought up", + "cmt_id": "e1e10a390fd9479209c4d834d916ca5e6d5d396b" + }, + "CVE-2021-46979": { + "cmt_msg": "iio: core: fix ioctl handlers removal", + "cmt_id": "ab6c935ba3a04317632f3b8b68675bdbaf395303" + }, + "CVE-2021-46996": { + "cmt_msg": "netfilter: nftables: Fix a memleak from userdata error path in new objects", + "cmt_id": "dd3bebf515f336214a91994348a2b86b9a1d3d7f" + }, + "CVE-2021-46991": { + "cmt_msg": "i40e: Fix use-after-free in i40e_client_subtask()", + "cmt_id": "1fd5d262e7442192ac7611ff1597a36c5b044323" + }, + "CVE-2021-46990": { + "cmt_msg": "powerpc/64s: Fix crashes when toggling entry flush barrier", + "cmt_id": "5bc00fdda1e934c557351a9c751a205293e68cbf" + }, + "CVE-2021-46993": { + "cmt_msg": "sched: Fix out-of-bound access in uclamp", + "cmt_id": "42ee47c7e3569d9a0e2cb5053c496d97d380472f" + }, + "CVE-2021-46992": { + "cmt_msg": "netfilter: nftables: avoid overflows in nft_hash_buckets()", + "cmt_id": "a388d10961ff8578b1a6691945d406c0f33aa71b" + }, + "CVE-2021-46977": { + "cmt_msg": "KVM: VMX: Disable preemption when probing user return MSRs", + "cmt_id": "e3ea1895df719c4ef87862501bb10d95f4177bed" + }, + "CVE-2021-46976": { + "cmt_msg": "drm/i915: Fix crash in auto_retire", + "cmt_id": "f7520970d5353cb1fa4d9089a1b23669c5da97fe" + }, + "CVE-2021-47008": { + "cmt_msg": "KVM: SVM: Make sure GHCB is mapped before updating", + "cmt_id": "fd722a57fe0b80133dacae4e1c852ee4212f9b2e" + }, + "CVE-2021-47009": { + "cmt_msg": "KEYS: trusted: Fix memory leak on object td", + "cmt_id": "3e24fbd37e72e8a67b74991970fecc82d14f57af" + }, + "CVE-2021-46997": { + "cmt_msg": "arm64: entry: always set GIC_PRIO_PSR_I_SET during entry", + "cmt_id": "d8d52005f57bbb4a4ec02f647e2555d327135c68" + }, + "CVE-2021-46978": { + "cmt_msg": "KVM: nVMX: Always make an attempt to map eVMCS after migration", + "cmt_id": "bd0e8455b85b651a4c77de9616e307129b15aaa7" } }, "5.12.7": { - "CVE-2020-26558": { + "CVE-2021-47080": { + "cmt_msg": "RDMA/core: Prevent divide-by-zero error triggered by the user", + "cmt_id": "e6871b4270c05f8b212e7d98aee82b357972c80a" + }, + "CVE-2021-47081": { + "cmt_msg": "habanalabs/gaudi: Fix a potential use after free in gaudi_memset_device_memory", + "cmt_id": "b49f5af30b0e4064fbd91e83823a4bfcb2c7a3e7" + }, + "CVE-2020-26555": { "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical", "cmt_id": "58cca5ec43be72a1af95f11966381e9953b0c9f5" }, - "CVE-2021-0129": { + "CVE-2020-26558": { "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical", "cmt_id": "58cca5ec43be72a1af95f11966381e9953b0c9f5" }, - "CVE-2020-26555": { + "CVE-2021-47071": { + "cmt_msg": "uio_hv_generic: Fix a memory leak in error handling paths", + "cmt_id": "53486c467e356e06aa37047c984fccd64d78c827" + }, + "CVE-2021-47070": { + "cmt_msg": "uio_hv_generic: Fix another memory leak in error handling paths", + "cmt_id": "5f59240cf25b2f7a0fdffc2701482a70310fec07" + }, + "CVE-2021-47073": { + "cmt_msg": "platform/x86: dell-smbios-wmi: Fix oops on rmmod dell_smbios", + "cmt_id": "8d746ea7c687bab060a2c05a35c449302406cd52" + }, + "CVE-2021-47072": { + "cmt_msg": "btrfs: fix removed dentries still existing after log is synced", + "cmt_id": "6d0924c5b742036b4f20a0ffdf2b6cf3f963f5f6" + }, + "CVE-2021-47075": { + "cmt_msg": "nvmet: fix memory leak in nvmet_alloc_ctrl()", + "cmt_id": "afb680ed7ecbb7fd66ddb43650e9b533fd8b4b9a" + }, + "CVE-2021-47074": { + "cmt_msg": "nvme-loop: fix memory leak in nvme_loop_create_ctrl()", + "cmt_id": "551ba08d4b7eb26f75758cdb9f15105b276517ad" + }, + "CVE-2021-47077": { + "cmt_msg": "scsi: qedf: Add pointer checks in qedf_update_link_speed()", + "cmt_id": "11014efcec378bb0050a6cf08eaf375e3693400a" + }, + "CVE-2021-47076": { + "cmt_msg": "RDMA/rxe: Return CQE error if invalid lkey was supplied", + "cmt_id": "abe31d25facdb9109fe2cf69890748295291570c" + }, + "CVE-2021-47079": { + "cmt_msg": "platform/x86: ideapad-laptop: fix a NULL pointer dereference", + "cmt_id": "beab753fe3b4e087411a850a64c6cd748544d8a1" + }, + "CVE-2021-47078": { + "cmt_msg": "RDMA/rxe: Clear all QP fields if creation failed", + "cmt_id": "03344e843ab6dd3b3f2cadfb65ed910590856c70" + }, + "CVE-2021-47069": { + "cmt_msg": "ipc/mqueue, msg, sem: avoid relying on a stack reference past its expiry", + "cmt_id": "807fa14536b26803b858da878b643be72952a097" + }, + "CVE-2021-0129": { "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical", "cmt_id": "58cca5ec43be72a1af95f11966381e9953b0c9f5" } }, "5.12.8": { + "CVE-2021-47180": { + "cmt_msg": "NFC: nci: fix memory leak in nci_allocate_device", + "cmt_id": "65234f50a90b64b335cbb9164b8a98c2a0d031dd" + }, "CVE-2021-33200": { "cmt_msg": "bpf: Wrap aux data inside bpf_sanitize_info container", "cmt_id": "9accd53bd479974c434554e3446149884890623a" } }, "5.12.9": { + "CVE-2021-47177": { + "cmt_msg": "iommu/vt-d: Fix sysfs leak in alloc_iommu()", + "cmt_id": "ca466561eef36d1ec657673e3944eb6340bddb5b" + }, + "CVE-2021-47167": { + "cmt_msg": "NFS: Fix an Oopsable condition in __nfs_pageio_add_request()", + "cmt_id": "15ac6f14787649e8ebd75c142e2c5d2a243c8490" + }, + "CVE-2021-47166": { + "cmt_msg": "NFS: Don't corrupt the value of pg_bytes_written in nfs_do_recoalesce()", + "cmt_id": "2fe1cac336b55a1f79e603e9ce3552c3623e90eb" + }, + "CVE-2021-47165": { + "cmt_msg": "drm/meson: fix shutdown crash when component not probed", + "cmt_id": "b4b91033a0b11fe9ade58156cd9168f89f4a8c1a" + }, + "CVE-2021-47164": { + "cmt_msg": "net/mlx5e: Fix null deref accessing lag dev", + "cmt_id": "bdfd3593a8248eea6ecfcbf7b47b56b86515672d" + }, + "CVE-2021-47149": { + "cmt_msg": "net: fujitsu: fix potential null-ptr-deref", + "cmt_id": "f14bf57a08779a5dee9936f63ada0149ea89c5e6" + }, + "CVE-2021-47148": { + "cmt_msg": "octeontx2-pf: fix a buffer overflow in otx2_set_rxfh_context()", + "cmt_id": "389146bc6d2bbb20714d06624b74856320ce40f7" + }, + "CVE-2021-47161": { + "cmt_msg": "spi: spi-fsl-dspi: Fix a resource leak in an error handling path", + "cmt_id": "12391be4724acc9269e1845ccbd881df37de4b56" + }, + "CVE-2021-47160": { + "cmt_msg": "net: dsa: mt7530: fix VLAN traffic leaks", + "cmt_id": "82ae35b6c14feae5f216913d5b433e143c756d4e" + }, + "CVE-2021-47145": { + "cmt_msg": "btrfs: do not BUG_ON in link_to_fixup_dir", + "cmt_id": "b545442133580dcb2f2496133bf850824d41255c" + }, + "CVE-2021-47144": { + "cmt_msg": "drm/amd/amdgpu: fix refcount leak", + "cmt_id": "95a4ec905e51a30c64cf2d78b04a7acbeae5ca94" + }, + "CVE-2021-47147": { + "cmt_msg": "ptp: ocp: Fix a resource leak in an error handling path", + "cmt_id": "0e38e702f1152479e6afac34f151dbfd99417f99" + }, + "CVE-2021-47146": { + "cmt_msg": "mld: fix panic in mld_newpack()", + "cmt_id": "a76fb9ba545289379acf409653ad5f74417be59c" + }, + "CVE-2021-47141": { + "cmt_msg": "gve: Add NULL pointer checks when freeing irqs.", + "cmt_id": "5278c75266c5094d3c0958793bf12fc90300e580" + }, + "CVE-2021-47140": { + "cmt_msg": "iommu/amd: Clear DMA ops when switching domain", + "cmt_id": "f3f2cf46291a693eab21adb94171b0128c2a9ec1" + }, + "CVE-2021-47143": { + "cmt_msg": "net/smc: remove device from smcd_dev_list after failed device_add()", + "cmt_id": "40588782f1016c655ae1d302892f61d35af96842" + }, + "CVE-2021-47142": { + "cmt_msg": "drm/amdgpu: Fix a use-after-free", + "cmt_id": "d4ea141fd4b40636a8326df5a377d9c5cf9b3faa" + }, "CVE-2021-33098": { "cmt_msg": "ixgbe: fix large MTU request from VF", "cmt_id": "027c76ea1f107881babb79ddc04b5dfb27a8d4c3" @@ -120932,17 +155152,17 @@ "cmt_msg": "mac80211: prevent mixed key and fragment cache attacks", "cmt_id": "94eebceb18e552c72b845055ca9d12c3debc0c99" }, - "CVE-2021-34981": { - "cmt_msg": "Bluetooth: cmtp: fix file refcount when cmtp_attach_device fails", - "cmt_id": "3178e0a38f204a61ed4fe5739d6a4732879b34d1" + "CVE-2021-47174": { + "cmt_msg": "netfilter: nft_set_pipapo_avx2: Add irq_fpu_usable() check, fallback to non-AVX2 version", + "cmt_id": "727a2b4fc951ee69847d4904d98961856ea9fbe6" }, "CVE-2020-24588": { "cmt_msg": "cfg80211: mitigate A-MSDU aggregation attacks", "cmt_id": "6eec99250f3a0763de58a7ef9ffca53e137356db" }, - "CVE-2020-26139": { - "cmt_msg": "mac80211: do not accept/forward invalid EAPOL frames", - "cmt_id": "a98c4c030cfb69c6ec3d1b951a904b80fea90d8a" + "CVE-2021-47175": { + "cmt_msg": "net/sched: fq_pie: fix OOB access in the traffic path", + "cmt_id": "7a1bdec12e43e29cc34a4394590337069d8812ce" }, "CVE-2020-26145": { "cmt_msg": "ath10k: drop fragments with multicast DA for PCIe", @@ -120956,29 +155176,217 @@ "cmt_msg": "ath10k: Fix TKIP Michael MIC verification for PCIe", "cmt_id": "a15a0151da2134545d5016ea068a39f96d1272f5" }, + "CVE-2021-47169": { + "cmt_msg": "serial: rp2: use 'request_firmware' instead of 'request_firmware_nowait'", + "cmt_id": "9b07b6973f7359e2dd6a9fe6db0c142634c823b7" + }, + "CVE-2021-47168": { + "cmt_msg": "NFS: fix an incorrect limit in filelayout_decode_layout()", + "cmt_id": "d34fb628f6ef522f996205a9e578216bbee09e84" + }, + "CVE-2021-47138": { + "cmt_msg": "cxgb4: avoid accessing registers when clearing filters", + "cmt_id": "285207a558ab456aa7d8aa877ecc7e91fcc51710" + }, + "CVE-2021-47139": { + "cmt_msg": "net: hns3: put off calling register_netdev() until client initialize complete", + "cmt_id": "0921a0620b5077796fddffb22a8e6bc635a4bb50" + }, + "CVE-2021-47136": { + "cmt_msg": "net: zero-initialize tc skb extension on allocation", + "cmt_id": "86ab133b695ed7ba1f8786b12f4ca43137ad8c18" + }, + "CVE-2021-47137": { + "cmt_msg": "net: lantiq: fix memory corruption in RX ring", + "cmt_id": "46dd4abced3cb2c912916f4a5353e0927db0c4a2" + }, + "CVE-2021-47178": { + "cmt_msg": "scsi: target: core: Avoid smp_processor_id() in preemptible code", + "cmt_id": "a20b6eaf4f35046a429cde57bee7eb5f13d6857f" + }, + "CVE-2021-47179": { + "cmt_msg": "NFSv4: Fix a NULL pointer dereference in pnfs_mark_matching_lsegs_return()", + "cmt_id": "b090d110e66636bca473fd8b98d5c97b555a965a" + }, + "CVE-2021-47158": { + "cmt_msg": "net: dsa: sja1105: add error handling in sja1105_setup()", + "cmt_id": "987e4ab8b8a4fcbf783069e03e7524cd39ffd563" + }, + "CVE-2021-47159": { + "cmt_msg": "net: dsa: fix a crash if ->get_sset_count() fails", + "cmt_id": "7b22466648a4f8e3e94f57ca428d1531866d1373" + }, + "CVE-2021-47170": { + "cmt_msg": "USB: usbfs: Don't WARN about excessively large memory allocations", + "cmt_id": "9f7cb3f01a10d9064cf13b3d26fb7e7a5827d098" + }, + "CVE-2021-47171": { + "cmt_msg": "net: usb: fix memory leak in smsc75xx_bind", + "cmt_id": "70c886ac93f87ae7214a0c69151a28a8075dd95b" + }, + "CVE-2021-47172": { + "cmt_msg": "iio: adc: ad7124: Fix potential overflow due to non sequential channel numbers", + "cmt_id": "26da8040eccc6c6b0e415e9a3baf72fd39eb2fdc" + }, + "CVE-2021-47173": { + "cmt_msg": "misc/uss720: fix memory leak in uss720_probe", + "cmt_id": "a3c3face38cb49932c62adcc1289914f1c742096" + }, + "CVE-2021-47152": { + "cmt_msg": "mptcp: fix data stream corruption", + "cmt_id": "18e7f0580da15cac1e79d73683ada5a9e70980f8" + }, + "CVE-2021-47153": { + "cmt_msg": "i2c: i801: Don't generate an interrupt on bus reset", + "cmt_id": "1f583d3813f204449037cd2acbfc09168171362a" + }, + "CVE-2021-47150": { + "cmt_msg": "net: fec: fix the potential memory leak in fec_enet_init()", + "cmt_id": "32a1777fd113335c3f70dc445dffee0ad1c6870f" + }, + "CVE-2021-47151": { + "cmt_msg": "interconnect: qcom: bcm-voter: add a missing of_node_put()", + "cmt_id": "93d1dbe7043b3c9492bdf396b2e98a008435b55b" + }, + "CVE-2021-47176": { + "cmt_msg": "s390/dasd: add missing discipline function", + "cmt_id": "a16be88a3d7e5efcb59a15edea87a8bd369630c6" + }, + "CVE-2021-34981": { + "cmt_msg": "Bluetooth: cmtp: fix file refcount when cmtp_attach_device fails", + "cmt_id": "3178e0a38f204a61ed4fe5739d6a4732879b34d1" + }, + "CVE-2020-26139": { + "cmt_msg": "mac80211: do not accept/forward invalid EAPOL frames", + "cmt_id": "a98c4c030cfb69c6ec3d1b951a904b80fea90d8a" + }, "CVE-2021-32606": { "cmt_msg": "can: isotp: prevent race between isotp_bind() and isotp_setsockopt()", "cmt_id": "b190618d8337b9466d985854e417dc0e8b012e3c" + }, + "CVE-2021-47163": { + "cmt_msg": "tipc: wait and exit until all work queues are done", + "cmt_id": "b9f5b7ad4ac3af006443f535b1ce7bff1d130d7d" + }, + "CVE-2021-47162": { + "cmt_msg": "tipc: skb_linearize the head skb when reassembling msgs", + "cmt_id": "ace300eecbccaa698e2b472843c74a5f33f7dce8" } }, "5.12.10": { - "CVE-2021-3564": { - "cmt_msg": "Bluetooth: fix the erroneous flush_work() order", - "cmt_id": "3556fac71e41f342d61331f3367d48bbbc292308" + "CVE-2021-47129": { + "cmt_msg": "netfilter: nft_ct: skip expectations for confirmed conntrack", + "cmt_id": "2c0e6b35b88a961127066a1028bce9c727cbc3e5" + }, + "CVE-2021-47128": { + "cmt_msg": "bpf, lockdown, audit: Fix buggy SELinux lockdown permission checks", + "cmt_id": "acc43fc6cf0d50612193813c5906a1ab9d433e1e" + }, + "CVE-2021-47123": { + "cmt_msg": "io_uring: fix ltout double free on completion race", + "cmt_id": "1f64f5e903b9d1d157875721e02adadc9d6f0a5d" + }, + "CVE-2021-47122": { + "cmt_msg": "net: caif: fix memory leak in caif_device_notify", + "cmt_id": "6a0e317f61094d377335547e015dd2ff12caf893" + }, + "CVE-2021-47121": { + "cmt_msg": "net: caif: fix memory leak in cfusbl_device_notify", + "cmt_id": "dde8686985ec24d6b00487080a906609bd613ea1" + }, + "CVE-2021-47120": { + "cmt_msg": "HID: magicmouse: fix NULL-deref on disconnect", + "cmt_id": "9cf27473f21913a3eaf4702dd2a25415afd5f33f" + }, + "CVE-2021-47127": { + "cmt_msg": "ice: track AF_XDP ZC enabled queues in bitmap", + "cmt_id": "1d34fa4fcf06649036ba0c97854fcf7a741ee18c" + }, + "CVE-2021-47126": { + "cmt_msg": "ipv6: Fix KASAN: slab-out-of-bounds Read in fib6_nh_flush_exceptions", + "cmt_id": "0a462e25ef0f7ab305081a08d435bbd1f13c0a94" + }, + "CVE-2021-47125": { + "cmt_msg": "sch_htb: fix refcount leak in htb_parent_to_leaf_offload", + "cmt_id": "2411c02d03892a5057499f8102d0cc1e0f852416" + }, + "CVE-2021-47109": { + "cmt_msg": "neighbour: allow NUD_NOARP entries to be forced GCed", + "cmt_id": "ddf088d7aaaaacfc836104f2e632b29b1d383cfc" }, "CVE-2021-28691": { "cmt_msg": "xen-netback: take a reference to the RX task thread", "cmt_id": "caec9bcaeb1a5f03f2d406305355c853af10c13e" }, - "CVE-2021-38208": { + "CVE-2021-3564": { + "cmt_msg": "Bluetooth: fix the erroneous flush_work() order", + "cmt_id": "3556fac71e41f342d61331f3367d48bbbc292308" + }, + "CVE-2021-3587": { "cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect", "cmt_id": "0c4559736d9a4ec1ca58ba98ca34e7c4da4c422b" }, + "CVE-2021-47134": { + "cmt_msg": "efi/fdt: fix panic when no valid fdt found", + "cmt_id": "8a7e8b4e5631a03ea2fee27957857a56612108ca" + }, + "CVE-2021-47135": { + "cmt_msg": "mt76: mt7921: fix possible AOOB issue in mt7921_mcu_tx_rate_report", + "cmt_id": "6919e8a24e70b6ba148fe07f44f835bcdd1a8d02" + }, + "CVE-2021-47130": { + "cmt_msg": "nvmet: fix freeing unallocated p2pmem", + "cmt_id": "8a452d62e7cea3c8a2676a3b89a9118755a1a271" + }, + "CVE-2021-47131": { + "cmt_msg": "net/tls: Fix use-after-free after the TLS device goes down and up", + "cmt_id": "0f1e6fe66977a864fe850522316f713d7b926fd9" + }, + "CVE-2021-47132": { + "cmt_msg": "mptcp: fix sk_forward_memory corruption on retransmission", + "cmt_id": "b9c78b1a95966a7bd2ddae05b73eafc0cda4fba3" + }, + "CVE-2021-47133": { + "cmt_msg": "HID: amd_sfh: Fix memory leak in amd_sfh_work", + "cmt_id": "29beadea66a226d744d5ffdcde6b984623053d24" + }, + "CVE-2021-47112": { + "cmt_msg": "x86/kvm: Teardown PV features on boot CPU as well", + "cmt_id": "d1629b5b925de9b27979e929dae7fcb766daf6b6" + }, + "CVE-2021-47113": { + "cmt_msg": "btrfs: abort in rename_exchange if we fail to insert the second ref", + "cmt_id": "ff8de2cec65a8c8521faade12a31b39c80e49f5b" + }, + "CVE-2021-47110": { + "cmt_msg": "x86/kvm: Disable kvmclock on all CPUs on shutdown", + "cmt_id": "1df2dc09926f61319116c80ee85701df33577d70" + }, + "CVE-2021-47111": { + "cmt_msg": "xen-netback: take a reference to the RX task thread", + "cmt_id": "caec9bcaeb1a5f03f2d406305355c853af10c13e" + }, + "CVE-2021-47116": { + "cmt_msg": "ext4: fix memory leak in ext4_mb_init_backend on error path.", + "cmt_id": "04fb2baa0b147f51db065a1b13a11954abe592d0" + }, + "CVE-2021-47117": { + "cmt_msg": "ext4: fix bug on in ext4_es_cache_extent as ext4_split_extent_at failed", + "cmt_id": "48105dc98c9ca35af418746277b087cb2bc6df7c" + }, + "CVE-2021-47114": { + "cmt_msg": "ocfs2: fix data corruption by fallocate", + "cmt_id": "0a31dd6fd2f4e7db538fb6eb1f06973d81f8dd3b" + }, + "CVE-2021-47118": { + "cmt_msg": "pid: take a reference when initializing `cad_pid`", + "cmt_id": "b8ff869f20152fbe66b6c2e2715d26a2f9897cca" + }, "CVE-2021-3573": { "cmt_msg": "Bluetooth: use correct lock to prevent UAF of hdev object", "cmt_id": "7422eadcf201f2e25eb45b46ffc900fc4214e14f" }, - "CVE-2021-3587": { + "CVE-2021-38208": { "cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect", "cmt_id": "0c4559736d9a4ec1ca58ba98ca34e7c4da4c422b" } @@ -120989,6 +155397,12 @@ "cmt_id": "7707f7244d813f8279143d5dfdee7a318801231b" } }, + "5.12.12": { + "CVE-2021-46906": { + "cmt_msg": "HID: usbhid: fix info leak in hid_submit_ctrl", + "cmt_id": "21883bff0fd854e07429a773ff18f1e9658f50e8" + } + }, "5.12.13": { "CVE-2021-38206": { "cmt_msg": "mac80211: Fix NULL ptr deref for injected rate info", @@ -121048,6 +155462,14 @@ "cmt_msg": "net: xilinx_emaclite: Do not print real IOMEM pointer", "cmt_id": "7a9bfd7589c18c20df5a5b9278549a2807627e30" }, + "CVE-2021-45485": { + "cmt_msg": "ipv6: use prandom_u32() for ID generation", + "cmt_id": "478ec08ae2097b7262a69d951f95e9ef16ff45a0" + }, + "CVE-2021-3655": { + "cmt_msg": "sctp: validate from_addr_param return", + "cmt_id": "d91adac26d5ebac78c731b3aa23ff2c210ce2a0d" + }, "CVE-2023-28772": { "cmt_msg": "seq_buf: Fix overflow in seq_buf_putmem_hex()", "cmt_id": "681f78589bdb473de5276e0f5b7811101c0c7b87" @@ -121056,28 +155478,24 @@ "cmt_msg": "mm/mremap: hold the rmap lock in write mode when moving page table entries.", "cmt_id": "864c4d1d25170def283b2bf87726218126634f04" }, - "CVE-2021-3655": { - "cmt_msg": "sctp: validate from_addr_param return", - "cmt_id": "d91adac26d5ebac78c731b3aa23ff2c210ce2a0d" - }, - "CVE-2021-45485": { - "cmt_msg": "ipv6: use prandom_u32() for ID generation", - "cmt_id": "478ec08ae2097b7262a69d951f95e9ef16ff45a0" + "CVE-2021-47119": { + "cmt_msg": "ext4: fix memory leak in ext4_fill_super", + "cmt_id": "cecfdb9cf9a700d1037066173abac0617f6788df" } }, "5.12.19": { - "CVE-2021-38160": { - "cmt_msg": "virtio_console: Assure used length from device is limited", - "cmt_id": "445a2298edc919f3cc82345ff8c004e9e1f5017a" + "CVE-2021-4154": { + "cmt_msg": "cgroup: verify that source is a string", + "cmt_id": "242f80be5b13257173eadbc03a90932e786b4c9b" + }, + "CVE-2021-47124": { + "cmt_msg": "io_uring: fix link timeout refs", + "cmt_id": "ff4a96ba5c8f9b266706280ff8021d2ef3f17e86" }, "CVE-2021-38199": { "cmt_msg": "NFSv4: Initialise connection to the server in nfs4_alloc_client()", "cmt_id": "87871d990a2c1879fb5c543f7244f360532e2f28" }, - "CVE-2021-4154": { - "cmt_msg": "cgroup: verify that source is a string", - "cmt_id": "242f80be5b13257173eadbc03a90932e786b4c9b" - }, "CVE-2021-38201": { "cmt_msg": "sunrpc: Avoid a KASAN slab-out-of-bounds bug in xdr_set_page_base()", "cmt_id": "9a4f77f171f68e5a275c4fabd8d78579af7b4950" @@ -121085,6 +155503,10 @@ "CVE-2021-33909": { "cmt_msg": "seq_file: disallow extremely large seq buffer allocations", "cmt_id": "514b6531b1cbb64199db63bfdb80953d71998cca" + }, + "CVE-2021-38160": { + "cmt_msg": "virtio_console: Assure used length from device is limited", + "cmt_id": "445a2298edc919f3cc82345ff8c004e9e1f5017a" } }, "outstanding": { @@ -121112,12 +155534,30 @@ "CVE-2022-0002": { "cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE" }, + "CVE-2024-26685": { + "cmt_msg": "nilfs2: fix potential bug in end_buffer_async_write" + }, + "CVE-2023-52615": { + "cmt_msg": "hwrng: core - Fix page fault dead lock on mmap-ed hwrng" + }, + "CVE-2023-52614": { + "cmt_msg": "PM / devfreq: Fix buffer overflow in trans_stat_show" + }, + "CVE-2023-52617": { + "cmt_msg": "PCI: switchtec: Fix stdev_release() crash after surprise hot remove" + }, + "CVE-2023-52616": { + "cmt_msg": "crypto: lib/mpi - Fix unexpected pointer access in mpi_ec_init" + }, "CVE-2022-3108": { "cmt_msg": "drm/amdkfd: Check for null pointer after calling kmemdup" }, "CVE-2022-0995": { "cmt_msg": "watch_queue: Fix filter limit check" }, + "CVE-2023-52612": { + "cmt_msg": "crypto: scomp - fix req->dst buffer overflow" + }, "CVE-2022-3105": { "cmt_msg": "RDMA/uverbs: Check for null return of kmalloc_array" }, @@ -121127,8 +155567,8 @@ "CVE-2022-3107": { "cmt_msg": "hv_netvsc: Add check for kvmalloc_array" }, - "CVE-2022-3106": { - "cmt_msg": "sfc_ef100: potential dereference of null pointer" + "CVE-2022-0998": { + "cmt_msg": "vdpa: clean up get_config_size ret value handling" }, "CVE-2022-47520": { "cmt_msg": "wifi: wilc1000: validate pairwise and authentication suite offsets" @@ -121175,9 +155615,15 @@ "CVE-2024-0584": { "cmt_msg": "ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet" }, + "CVE-2024-26663": { + "cmt_msg": "tipc: Check the bearer type before calling tipc_udp_nl_bearer_add()" + }, "CVE-2023-2163": { "cmt_msg": "bpf: Fix incorrect verifier pruning due to missing register precision taints" }, + "CVE-2024-26759": { + "cmt_msg": "mm/swap: fix race when skipping swapcache" + }, "CVE-2022-21125": { "cmt_msg": "x86/speculation/mmio: Reuse SRBDS mitigation for SBDS" }, @@ -121226,9 +155672,6 @@ "CVE-2022-3628": { "cmt_msg": "wifi: brcmfmac: Fix potential buffer overflow in brcmf_fweh_event_worker()" }, - "CVE-2024-26591": { - "cmt_msg": "bpf: Fix re-attachment branch in bpf_tracing_prog_attach" - }, "CVE-2020-15802": { "cmt_msg": "" }, @@ -121262,21 +155705,24 @@ "CVE-2022-3202": { "cmt_msg": "jfs: prevent NULL deref in diFree" }, + "CVE-2024-25739": { + "cmt_msg": "" + }, "CVE-2022-2602": { "cmt_msg": "io_uring/af_unix: defer registered files gc to io_uring release" }, "CVE-2024-26585": { "cmt_msg": "tls: fix race between tx work scheduling and socket close" }, + "CVE-2023-52511": { + "cmt_msg": "spi: sun6i: reduce DMA RX transfer width to single byte" + }, "CVE-2024-26584": { "cmt_msg": "net: tls: handle backlogging of crypto requests" }, "CVE-2023-2008": { "cmt_msg": "udmabuf: add back sanity check" }, - "CVE-2024-26587": { - "cmt_msg": "net: netdevsim: don't try to destroy PHC on VFs" - }, "CVE-2023-2002": { "cmt_msg": "bluetooth: Perform careful capability checks in hci_sock_ioctl()" }, @@ -121328,21 +155774,45 @@ "CVE-2023-1073": { "cmt_msg": "HID: check empty report_list in hid_validate_values()" }, + "CVE-2024-26747": { + "cmt_msg": "usb: roles: fix NULL pointer issue when put module's reference" + }, + "CVE-2024-26745": { + "cmt_msg": "powerpc/pseries/iommu: IOMMU table is not initialized for kdump over SR-IOV" + }, "CVE-2023-51781": { "cmt_msg": "appletalk: Fix Use-After-Free in atalk_ioctl" }, + "CVE-2024-26743": { + "cmt_msg": "RDMA/qedr: Fix qedr_create_user_qp error flow" + }, + "CVE-2024-26740": { + "cmt_msg": "net/sched: act_mirred: use the backlog for mirred ingress" + }, "CVE-2024-22386": { "cmt_msg": "" }, "CVE-2022-1734": { "cmt_msg": "nfc: nfcmrvl: main: reorder destructive operations in nfcmrvl_nci_unregister_dev to avoid bugs" }, + "CVE-2024-26749": { + "cmt_msg": "usb: cdns3: fixed memory use after free at cdns3_gadget_ep_disable()" + }, + "CVE-2024-26748": { + "cmt_msg": "usb: cdns3: fix memory double free when handle zero packet" + }, "CVE-2022-3707": { "cmt_msg": "drm/i915/gvt: fix double free bug in split_2MB_gtt_entry" }, "CVE-2022-2503": { "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag" }, + "CVE-2023-52610": { + "cmt_msg": "net/sched: act_ct: fix skb leak and crash on ooo frags" + }, + "CVE-2024-26699": { + "cmt_msg": "drm/amd/display: Fix array-index-out-of-bounds in dcn35_clkmgr" + }, "CVE-2022-20153": { "cmt_msg": "io_uring: return back safer resurrect" }, @@ -121355,6 +155825,9 @@ "CVE-2022-20154": { "cmt_msg": "sctp: use call_rcu to free endpoint" }, + "CVE-2024-26691": { + "cmt_msg": "KVM: arm64: Fix circular locking dependency" + }, "CVE-2022-20158": { "cmt_msg": "net/packet: fix slab-out-of-bounds access in packet_recvmsg()" }, @@ -121367,6 +155840,12 @@ "CVE-2024-0565": { "cmt_msg": "smb: client: fix OOB in receive_encrypted_standard()" }, + "CVE-2024-26697": { + "cmt_msg": "nilfs2: fix data corruption in dsync block recovery for small block sizes" + }, + "CVE-2024-26696": { + "cmt_msg": "nilfs2: fix hang in nilfs_lookup_dirty_data_buffers()" + }, "CVE-2023-2176": { "cmt_msg": "RDMA/core: Refactor rdma_bind_addr" }, @@ -121379,14 +155858,17 @@ "CVE-2021-42008": { "cmt_msg": "net: 6pack: fix slab-out-of-bounds in decode_data" }, + "CVE-2024-26789": { + "cmt_msg": "crypto: arm64/neonbs - fix out-of-bounds access on short input" + }, "CVE-2022-39189": { "cmt_msg": "KVM: x86: do not report a vCPU as preempted outside instruction boundaries" }, "CVE-2021-38166": { "cmt_msg": "bpf: Fix integer overflow involving bucket_size" }, - "CVE-2022-0998": { - "cmt_msg": "vdpa: clean up get_config_size ret value handling" + "CVE-2022-3106": { + "cmt_msg": "sfc_ef100: potential dereference of null pointer" }, "CVE-2005-3660": { "cmt_msg": "" @@ -121409,30 +155891,51 @@ "CVE-2023-31081": { "cmt_msg": "" }, + "CVE-2023-52618": { + "cmt_msg": "block/rnbd-srv: Check for unlikely string overflow" + }, "CVE-2022-0286": { "cmt_msg": "bonding: fix null dereference in bond_ipsec_add_sa()" }, - "CVE-2024-23307": { - "cmt_msg": "" + "CVE-2024-0646": { + "cmt_msg": "net: tls, update curr on splice as well" + }, + "CVE-2023-52598": { + "cmt_msg": "s390/ptrace: handle setting of fpc register correctly" }, "CVE-2022-32296": { "cmt_msg": "tcp: increase source port perturb table to 2^16" }, + "CVE-2023-52499": { + "cmt_msg": "powerpc/47x: Fix 47x syscall return crash" + }, "CVE-2023-3567": { "cmt_msg": "vc_screen: move load of struct vc_data pointer in vcs_read() to avoid UAF" }, "CVE-2022-3028": { "cmt_msg": "af_key: Do not call xfrm_probe_algs in parallel" }, + "CVE-2023-52493": { + "cmt_msg": "bus: mhi: host: Drop chan lock before queuing buffers" + }, + "CVE-2023-52485": { + "cmt_msg": "drm/amd/display: Wake DMCUB before sending a command" + }, "CVE-2020-14304": { "cmt_msg": "" }, "CVE-2022-2318": { "cmt_msg": "net: rose: fix UAF bugs caused by timer handler" }, + "CVE-2023-52497": { + "cmt_msg": "erofs: fix lz4 inplace decompression" + }, "CVE-2022-33981": { "cmt_msg": "floppy: disable FDRAWCMD by default" }, + "CVE-2024-26655": { + "cmt_msg": "Fix memory leak in posix_clock_open()" + }, "CVE-2023-3610": { "cmt_msg": "netfilter: nf_tables: fix chain binding transaction logic" }, @@ -121454,6 +155957,9 @@ "CVE-2023-39198": { "cmt_msg": "drm/qxl: fix UAF on handle creation" }, + "CVE-2024-26656": { + "cmt_msg": "drm/amdgpu: fix use-after-free bug" + }, "CVE-2021-42327": { "cmt_msg": "drm/amdgpu: fix out of bounds write" }, @@ -121481,6 +155987,9 @@ "CVE-2023-33288": { "cmt_msg": "power: supply: bq24190: Fix use after free bug in bq24190_remove due to race condition" }, + "CVE-2023-52484": { + "cmt_msg": "iommu/arm-smmu-v3: Fix soft lockup triggered by arm_smmu_mm_invalidate_range" + }, "CVE-2022-29900": { "cmt_msg": "x86/kvm/vmx: Make noinstr clean" }, @@ -121496,6 +156005,9 @@ "CVE-2023-25012": { "cmt_msg": "HID: bigben: use spinlock to safely schedule workers" }, + "CVE-2023-52580": { + "cmt_msg": "net/core: Fix ETH_P_1588 flow dissector" + }, "CVE-2023-35829": { "cmt_msg": "media: rkvdec: fix use after free bug in rkvdec_remove" }, @@ -121505,6 +156017,9 @@ "CVE-2022-29582": { "cmt_msg": "io_uring: fix race between timeout flush and removal" }, + "CVE-2023-52583": { + "cmt_msg": "ceph: fix deadlock or deadcode of misusing dget()" + }, "CVE-2022-1116": { "cmt_msg": "" }, @@ -121523,6 +156038,21 @@ "CVE-2023-35827": { "cmt_msg": "ravb: Fix use-after-free issue in ravb_tx_timeout_work()" }, + "CVE-2023-52481": { + "cmt_msg": "arm64: errata: Add Cortex-A520 speculative unprivileged load workaround" + }, + "CVE-2023-52585": { + "cmt_msg": "drm/amdgpu: Fix possible NULL dereference in amdgpu_ras_query_error_status_helper()" + }, + "CVE-2023-52584": { + "cmt_msg": "spmi: mediatek: Fix UAF on device remove" + }, + "CVE-2023-52587": { + "cmt_msg": "IB/ipoib: Fix mcast list locking" + }, + "CVE-2023-52586": { + "cmt_msg": "drm/msm/dpu: Add mutex lock in control vblank irq" + }, "CVE-2022-3567": { "cmt_msg": "ipv6: Fix data races around sk->sk_prot." }, @@ -121538,9 +156068,51 @@ "CVE-2022-4269": { "cmt_msg": "act_mirred: use the backlog for nested calls to mirred ingress" }, + "CVE-2024-26606": { + "cmt_msg": "binder: signal epoll threads of self-work" + }, + "CVE-2023-52589": { + "cmt_msg": "media: rkisp1: Fix IRQ disable race issue" + }, + "CVE-2023-52588": { + "cmt_msg": "f2fs: fix to tag gcing flag on page during block migration" + }, + "CVE-2024-26607": { + "cmt_msg": "drm/bridge: sii902x: Fix probing race issue" + }, + "CVE-2024-26727": { + "cmt_msg": "btrfs: do not ASSERT() if the newly created subvolume already got read" + }, "CVE-2023-52340": { "cmt_msg": "ipv6: remove max_size check inline with ipv4" }, + "CVE-2024-26765": { + "cmt_msg": "LoongArch: Disable IRQ before init_fn() for nonboot CPUs" + }, + "CVE-2024-26684": { + "cmt_msg": "net: stmmac: xgmac: fix handling of DPP safety error for DMA channels" + }, + "CVE-2021-47097": { + "cmt_msg": "Input: elantech - fix stack out of bound access in elantech_change_report_id()" + }, + "CVE-2021-47095": { + "cmt_msg": "ipmi: ssif: initialize ssif_info->client early" + }, + "CVE-2021-47094": { + "cmt_msg": "KVM: x86/mmu: Don't advance iterator after restart due to yielding" + }, + "CVE-2021-47093": { + "cmt_msg": "platform/x86: intel_pmc_core: fix memleak on registration failure" + }, + "CVE-2021-47091": { + "cmt_msg": "mac80211: fix locking in ieee80211_start_ap error path" + }, + "CVE-2021-47090": { + "cmt_msg": "mm/hwpoison: clear MF_COUNT_INCREASED before retrying get_any_page()" + }, + "CVE-2024-26726": { + "cmt_msg": "btrfs: don't drop extent_map for free space inode on write error" + }, "CVE-2023-6560": { "cmt_msg": "io_uring: don't allow discontig pages for IORING_SETUP_NO_MMAP" }, @@ -121550,21 +156122,45 @@ "CVE-2023-1611": { "cmt_msg": "btrfs: fix race between quota disable and quota assign ioctls" }, + "CVE-2024-26763": { + "cmt_msg": "dm-crypt: don't modify the data when using authenticated encryption" + }, "CVE-2022-26490": { "cmt_msg": "nfc: st21nfca: Fix potential buffer overflows in EVT_TRANSACTION" }, "CVE-2023-6817": { "cmt_msg": "netfilter: nft_set_pipapo: skip inactive elements during set walk" }, + "CVE-2024-26795": { + "cmt_msg": "riscv: Sparse-Memory/vmemmap out-of-bounds fix" + }, + "CVE-2024-26797": { + "cmt_msg": "drm/amd/display: Prevent potential buffer overflow in map_hw_resources" + }, + "CVE-2024-26790": { + "cmt_msg": "dmaengine: fsl-qdma: fix SoC may hang on 16 byte unaligned read" + }, "CVE-2022-1836": { "cmt_msg": "floppy: disable FDRAWCMD by default" }, + "CVE-2024-26793": { + "cmt_msg": "gtp: fix use-after-free and null-ptr-deref in gtp_newlink()" + }, + "CVE-2023-52530": { + "cmt_msg": "wifi: mac80211: fix potential key use-after-free" + }, "CVE-2021-32078": { "cmt_msg": "ARM: footbridge: remove personal server platform" }, + "CVE-2023-52532": { + "cmt_msg": "net: mana: Fix TX CQE error handling" + }, "CVE-2022-30594": { "cmt_msg": "ptrace: Check PTRACE_O_SUSPEND_SECCOMP permission on PTRACE_SEIZE" }, + "CVE-2024-26798": { + "cmt_msg": "fbcon: always restore the old font data in fbcon_do_set_font()" + }, "CVE-2022-4662": { "cmt_msg": "USB: core: Prevent nested device-reset calls" }, @@ -121586,6 +156182,12 @@ "CVE-2023-46862": { "cmt_msg": "io_uring/fdinfo: lock SQ thread while retrieving thread cpu/pid" }, + "CVE-2024-26677": { + "cmt_msg": "rxrpc: Fix delayed ACKs to not set the reference serial number" + }, + "CVE-2024-26676": { + "cmt_msg": "af_unix: Call kfree_skb() for dead unix_(sk)->oob_skb in GC." + }, "CVE-2022-0168": { "cmt_msg": "cifs: fix NULL ptr dereference in smb2_ioctl_query_info()" }, @@ -121595,9 +156197,18 @@ "CVE-2020-26557": { "cmt_msg": "" }, + "CVE-2024-26671": { + "cmt_msg": "blk-mq: fix IO hang from sbitmap wakeup race" + }, "CVE-2023-34324": { "cmt_msg": "xen/events: replace evtchn_rwlock with RCU" }, + "CVE-2024-26776": { + "cmt_msg": "spi: hisi-sfc-v3xx: Return IRQ_NONE if no interrupts were detected" + }, + "CVE-2024-26777": { + "cmt_msg": "fbdev: sis: Error out if pixclock equals zero" + }, "CVE-2019-20794": { "cmt_msg": "" }, @@ -121607,21 +156218,30 @@ "CVE-2023-3397": { "cmt_msg": "" }, + "CVE-2024-26773": { + "cmt_msg": "ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found()" + }, + "CVE-2024-26679": { + "cmt_msg": "inet: read sk->sk_family once in inet_recv_error()" + }, + "CVE-2024-26771": { + "cmt_msg": "dmaengine: ti: edma: Add some null pointer checks to the edma_probe" + }, "CVE-2021-3542": { "cmt_msg": "" }, "CVE-2023-52458": { "cmt_msg": "block: add check that partition length needs to be aligned with block size" }, - "CVE-2023-52457": { - "cmt_msg": "serial: 8250: omap: Don't skip resource freeing if pm_runtime_resume_and_get() failed" - }, "CVE-2018-1121": { "cmt_msg": "" }, "CVE-2023-52454": { "cmt_msg": "nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length" }, + "CVE-2023-28746": { + "cmt_msg": "x86/mmio: Disable KVM mitigation when X86_FEATURE_CLEAR_CPU_BUF is set" + }, "CVE-2023-52452": { "cmt_msg": "bpf: Fix accesses to uninit stack slots" }, @@ -121634,6 +156254,9 @@ "CVE-2024-1086": { "cmt_msg": "netfilter: nf_tables: reject QUEUE/DROP verdict parameters" }, + "CVE-2024-26735": { + "cmt_msg": "ipv6: sr: fix possible use-after-free and null-ptr-deref" + }, "CVE-2022-3344": { "cmt_msg": "KVM: x86: nSVM: harden svm_free_nested against freeing vmcb02 while still in use" }, @@ -121655,9 +156278,21 @@ "CVE-2023-23002": { "cmt_msg": "Bluetooth: hci_qca: Fix NULL vs IS_ERR_OR_NULL check in qca_serdev_probe" }, + "CVE-2024-26702": { + "cmt_msg": "iio: magnetometer: rm3100: add boundary check for the value read from RM3100_REG_TMRC" + }, "CVE-2023-6240": { "cmt_msg": "" }, + "CVE-2024-26700": { + "cmt_msg": "drm/amd/display: Fix MST Null Ptr for RV" + }, + "CVE-2024-26707": { + "cmt_msg": "net: hsr: remove WARN_ONCE() in send_hsr_supervision_frame()" + }, + "CVE-2024-26706": { + "cmt_msg": "parisc: Fix random data corruption from exception handler" + }, "CVE-2023-23559": { "cmt_msg": "wifi: rndis_wlan: Prevent buffer overflow in rndis_query_oid" }, @@ -121685,9 +156320,6 @@ "CVE-2019-19814": { "cmt_msg": "" }, - "CVE-2024-26588": { - "cmt_msg": "LoongArch: BPF: Prevent out-of-bounds memory access" - }, "CVE-2022-1015": { "cmt_msg": "netfilter: nf_tables: validate registers coming from userspace." }, @@ -121700,6 +156332,30 @@ "CVE-2022-1012": { "cmt_msg": "secure_seq: use the 64 bits of the siphash for port offset calculation" }, + "CVE-2023-52620": { + "cmt_msg": "netfilter: nf_tables: disallow timeout for anonymous sets" + }, + "CVE-2023-52621": { + "cmt_msg": "bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers" + }, + "CVE-2023-52622": { + "cmt_msg": "ext4: avoid online resizing failures due to oversized flex bg" + }, + "CVE-2023-52623": { + "cmt_msg": "SUNRPC: Fix a suspicious RCU usage warning" + }, + "CVE-2023-52619": { + "cmt_msg": "pstore/ram: Fix crash when setting number of cpus to an odd number" + }, + "CVE-2023-52625": { + "cmt_msg": "drm/amd/display: Refactor DMCUB enter/exit idle interface" + }, + "CVE-2023-52627": { + "cmt_msg": "iio: adc: ad7091r: Allow users to configure device events" + }, + "CVE-2023-52628": { + "cmt_msg": "netfilter: nftables: exthdr: fix 4-byte stack OOB write" + }, "CVE-2021-26934": { "cmt_msg": "" }, @@ -121730,6 +156386,9 @@ "CVE-2022-0494": { "cmt_msg": "block-map: add __GFP_ZERO flag for alloc_page in function bio_copy_kern" }, + "CVE-2024-26601": { + "cmt_msg": "ext4: regenerate buddy after block freeing failed if under fc replay" + }, "CVE-2022-3524": { "cmt_msg": "tcp/udp: Fix memory leak in ipv6_renew_options()." }, @@ -121742,9 +156401,27 @@ "CVE-2022-3521": { "cmt_msg": "kcm: avoid potential race in kcm_tx_work" }, + "CVE-2022-41218": { + "cmt_msg": "media: dvb-core: Fix UAF due to refcount races at releasing" + }, + "CVE-2021-47101": { + "cmt_msg": "asix: fix uninit-value in asix_mdio_read()" + }, + "CVE-2021-47100": { + "cmt_msg": "ipmi: Fix UAF when uninstall ipmi_si and ipmi_msghandler module" + }, + "CVE-2021-47103": { + "cmt_msg": "inet: fully convert sk->sk_rx_dst to RCU rules" + }, + "CVE-2021-47105": { + "cmt_msg": "ice: xsk: return xsk buffers back to pool when cleaning the ring" + }, "CVE-2022-2196": { "cmt_msg": "KVM: VMX: Execute IBPB on emulated VM-exit when guest has IBRS" }, + "CVE-2023-52513": { + "cmt_msg": "RDMA/siw: Fix connection failure handling" + }, "CVE-2022-0330": { "cmt_msg": "drm/i915: Flush TLBs before releasing backing store" }, @@ -121826,18 +156503,33 @@ "CVE-2023-3090": { "cmt_msg": "ipvlan:Fix out-of-bounds caused by unclear skb->cb" }, + "CVE-2023-52578": { + "cmt_msg": "net: bridge: use DEV_STATS_INC()" + }, "CVE-2022-4744": { "cmt_msg": "tun: avoid double free in tun_free_netdev" }, "CVE-2023-1095": { "cmt_msg": "netfilter: nf_tables: fix null deref due to zeroed list head" }, + "CVE-2023-52574": { + "cmt_msg": "team: fix null-ptr-deref when team device type is changed" + }, "CVE-2022-3239": { "cmt_msg": "media: em28xx: initialize refcount before kref_get" }, "CVE-2022-4543": { "cmt_msg": "" }, + "CVE-2023-52571": { + "cmt_msg": "power: supply: rk817: Fix node refcount leak" + }, + "CVE-2023-52572": { + "cmt_msg": "cifs: Fix UAF in cifs_demultiplex_thread()" + }, + "CVE-2023-52573": { + "cmt_msg": "net: rds: Fix possible NULL-pointer dereference" + }, "CVE-2023-4921": { "cmt_msg": "net: sched: sch_qfq: Fix UAF in qfq_dequeue()" }, @@ -121853,18 +156545,39 @@ "CVE-2023-4881": { "cmt_msg": "netfilter: nftables: exthdr: fix 4-byte stack OOB write" }, + "CVE-2024-26769": { + "cmt_msg": "nvmet-fc: avoid deadlock on delete association path" + }, + "CVE-2024-26704": { + "cmt_msg": "ext4: fix double-free of blocks due to wrong extents moved_len" + }, "CVE-2013-7445": { "cmt_msg": "" }, "CVE-2023-31248": { "cmt_msg": "netfilter: nf_tables: do not ignore genmask when looking up chain by id" }, + "CVE-2024-26736": { + "cmt_msg": "afs: Increase buffer size in afs_update_volume_status()" + }, "CVE-2024-26593": { "cmt_msg": "i2c: i801: Fix block process call transactions" }, + "CVE-2024-26738": { + "cmt_msg": "powerpc/pseries/iommu: DLPAR add doesn't completely initialize pci_controller" + }, + "CVE-2024-26739": { + "cmt_msg": "net/sched: act_mirred: don't override retval if we already lost the skb" + }, "CVE-2022-38096": { "cmt_msg": "" }, + "CVE-2024-26804": { + "cmt_msg": "net: ip_tunnel: prevent perpetual headroom growth" + }, + "CVE-2024-26805": { + "cmt_msg": "netlink: Fix kernel-infoleak-after-free in __skb_datagram_iter" + }, "CVE-2022-1158": { "cmt_msg": "KVM: x86/mmu: do compare-and-exchange of gPTE via the user address" }, @@ -121895,6 +156608,9 @@ "CVE-2023-6932": { "cmt_msg": "ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet" }, + "CVE-2024-26801": { + "cmt_msg": "Bluetooth: Avoid potential use-after-free in hci_error_reset" + }, "CVE-2024-0607": { "cmt_msg": "netfilter: nf_tables: fix pointer math issue in nft_byteorder_eval()" }, @@ -121907,18 +156623,45 @@ "CVE-2022-28388": { "cmt_msg": "can: usb_8dev: usb_8dev_start_xmit(): fix double dev_kfree_skb() in error path" }, + "CVE-2011-4917": { + "cmt_msg": "" + }, + "CVE-2024-26803": { + "cmt_msg": "net: veth: clear GRO when clearing XDP even when down" + }, "CVE-2023-52444": { "cmt_msg": "f2fs: fix to avoid dirent corruption" }, + "CVE-2024-26768": { + "cmt_msg": "LoongArch: Change acpi_core_pic[NR_CPUS] to acpi_core_pic[MAX_CORE_PIC]" + }, "CVE-2022-4129": { "cmt_msg": "l2tp: Serialize access to sk_user_data with sk_callback_lock" }, + "CVE-2024-26648": { + "cmt_msg": "drm/amd/display: Fix variable deferencing before NULL check in edp_setup_replay()" + }, "CVE-2022-0500": { "cmt_msg": "bpf: Introduce MEM_RDONLY flag" }, + "CVE-2024-26647": { + "cmt_msg": "drm/amd/display: Fix late derefrence 'dsc' check in 'link_set_dsc_pps_packet()'" + }, + "CVE-2024-26644": { + "cmt_msg": "btrfs: don't abort filesystem when attempting to snapshot deleted subvolume" + }, + "CVE-2024-26645": { + "cmt_msg": "tracing: Ensure visibility when inserting an element into tracing_map" + }, "CVE-2023-33203": { "cmt_msg": "net: qcom/emac: Fix use after free bug in emac_remove due to race condition" }, + "CVE-2024-26640": { + "cmt_msg": "tcp: add sanity checks to rx zerocopy" + }, + "CVE-2024-26641": { + "cmt_msg": "ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv()" + }, "CVE-2021-4001": { "cmt_msg": "bpf: Fix toctou on read-only map's constant scalar tracking" }, @@ -121931,9 +156674,6 @@ "CVE-2022-1055": { "cmt_msg": "net: sched: fix use-after-free in tc_new_tfilter()" }, - "CVE-2011-4916": { - "cmt_msg": "" - }, "CVE-2023-50431": { "cmt_msg": "accel/habanalabs: fix information leak in sec_attest_info()" }, @@ -121943,9 +156683,15 @@ "CVE-2023-3117": { "cmt_msg": "netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE" }, + "CVE-2024-26791": { + "cmt_msg": "btrfs: dev-replace: properly validate device names" + }, "CVE-2023-32269": { "cmt_msg": "netrom: Fix use-after-free caused by accept on already connected socket" }, + "CVE-2023-52467": { + "cmt_msg": "mfd: syscon: Fix null pointer dereference in of_syscon_register()" + }, "CVE-2023-52464": { "cmt_msg": "EDAC/thunderx: Fix possible out-of-bounds string access" }, @@ -121967,6 +156713,12 @@ "CVE-2024-23848": { "cmt_msg": "" }, + "CVE-2023-52531": { + "cmt_msg": "wifi: iwlwifi: mvm: Fix a memory corruption issue" + }, + "CVE-2024-26633": { + "cmt_msg": "ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim()" + }, "CVE-2023-6622": { "cmt_msg": "netfilter: nf_tables: bail out on mismatching dynset and set expressions" }, @@ -121976,9 +156728,21 @@ "CVE-2023-4459": { "cmt_msg": "net: vmxnet3: fix possible NULL pointer dereference in vmxnet3_rq_cleanup()" }, + "CVE-2024-26625": { + "cmt_msg": "llc: call sock_orphan() at release time" + }, + "CVE-2024-26635": { + "cmt_msg": "llc: Drop support for ETH_P_TR_802_2." + }, + "CVE-2023-52639": { + "cmt_msg": "KVM: s390: vsie: fix race during shadow creation" + }, "CVE-2022-2153": { "cmt_msg": "KVM: x86: Avoid theoretical NULL pointer dereference in kvm_irq_delivery_to_apic_fast()" }, + "CVE-2024-2193": { + "cmt_msg": "" + }, "CVE-2022-20566": { "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free caused by l2cap_chan_put" }, @@ -121988,6 +156752,9 @@ "CVE-2018-12931": { "cmt_msg": "" }, + "CVE-2023-52637": { + "cmt_msg": "can: j1939: Fix UAF in j1939_sk_match_filter during setsockopt(SO_J1939_FILTER)" + }, "CVE-2023-1990": { "cmt_msg": "nfc: st-nci: Fix use after free bug in ndlc_remove due to race condition" }, @@ -122003,6 +156770,9 @@ "CVE-2022-48619": { "cmt_msg": "Input: add bounds checking to input_set_capability()" }, + "CVE-2023-52634": { + "cmt_msg": "drm/amd/display: Fix disable_otg_wa logic" + }, "CVE-2022-22942": { "cmt_msg": "drm/vmwgfx: Fix stale file descriptors on failed usercopy" }, @@ -122015,12 +156785,21 @@ "CVE-2022-25375": { "cmt_msg": "usb: gadget: rndis: check size of RNDIS_MSG_SET command" }, + "CVE-2019-25162": { + "cmt_msg": "i2c: Fix a potential use after free" + }, "CVE-2024-24861": { - "cmt_msg": "" + "cmt_msg": "media: xc4000: Fix atomicity violation in xc4000_get_frequency" + }, + "CVE-2024-26627": { + "cmt_msg": "scsi: core: Move scsi_host_busy() out of host lock for waking up EH handler" }, "CVE-2022-3903": { "cmt_msg": "media: mceusb: Use new usb_control_msg_*() routines" }, + "CVE-2024-26642": { + "cmt_msg": "netfilter: nf_tables: disallow anonymous set with timeout flag" + }, "CVE-2022-3577": { "cmt_msg": "HID: bigben: fix slab-out-of-bounds Write in bigben_probe" }, @@ -122045,15 +156824,30 @@ "CVE-2023-4207": { "cmt_msg": "net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free" }, + "CVE-2021-46959": { + "cmt_msg": "spi: Fix use-after-free with devm_spi_alloc_*" + }, + "CVE-2023-52595": { + "cmt_msg": "wifi: rt2x00: restart beacon queue when hardware reset" + }, "CVE-2022-0847": { "cmt_msg": "lib/iov_iter: initialize \"flags\" in new pipe_buffer" }, "CVE-2021-41073": { "cmt_msg": "io_uring: ensure symmetry in handling iter types in loop_rw_iter()" }, + "CVE-2024-26782": { + "cmt_msg": "mptcp: fix double-free on socket dismantle" + }, "CVE-2021-0920": { "cmt_msg": "af_unix: fix garbage collect vs MSG_PEEK" }, + "CVE-2024-26675": { + "cmt_msg": "ppp_async: limit MRU to 64K" + }, + "CVE-2024-26622": { + "cmt_msg": "tomoyo: fix UAF write bug in tomoyo_write_control()" + }, "CVE-2023-28410": { "cmt_msg": "drm/i915/gem: add missing boundary check in vm_access" }, @@ -122063,23 +156857,44 @@ "CVE-2023-4147": { "cmt_msg": "netfilter: nf_tables: disallow rule addition to bound chain via NFTA_RULE_CHAIN_ID" }, + "CVE-2024-26718": { + "cmt_msg": "dm-crypt, dm-verity: disable tasklets" + }, "CVE-2023-0615": { "cmt_msg": "media: vivid: dev->bitmap_cap wasn't freed in all cases" }, + "CVE-2024-26672": { + "cmt_msg": "drm/amdgpu: Fix variable 'mca_funcs' dereferenced before NULL check in 'amdgpu_mca_smu_get_mca_entry()'" + }, + "CVE-2023-52527": { + "cmt_msg": "ipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data()" + }, "CVE-2023-3006": { "cmt_msg": "arm64: Add AMPERE1 to the Spectre-BHB affected list" }, + "CVE-2024-26787": { + "cmt_msg": "mmc: mmci: stm32: fix DMA API overlapping mappings warning" + }, + "CVE-2023-52522": { + "cmt_msg": "net: fix possible store tearing in neigh_periodic_work()" + }, "CVE-2022-3586": { "cmt_msg": "sch_sfb: Don't assume the skb is still around after enqueueing to child" }, "CVE-2024-0641": { "cmt_msg": "tipc: fix a potential deadlock on &tx->lock" }, + "CVE-2024-26636": { + "cmt_msg": "llc: make llc_ui_sendmsg() more robust against bonding changes" + }, "CVE-2022-43945": { "cmt_msg": "NFSD: Protect against send buffer overflow in NFSv2 READDIR" }, - "CVE-2024-0646": { - "cmt_msg": "net: tls, update curr on splice as well" + "CVE-2023-52528": { + "cmt_msg": "net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg" + }, + "CVE-2024-26623": { + "cmt_msg": "pds_core: Prevent race issues involving the adminq" }, "CVE-2020-27820": { "cmt_msg": "drm/nouveau: use drm_dev_unplug() during device removal" @@ -122087,24 +156902,39 @@ "CVE-2023-1872": { "cmt_msg": "io_uring: propagate issue_flags state down to file assignment" }, + "CVE-2024-25744": { + "cmt_msg": "x86/coco: Disable 32-bit emulation by default on TDX and SEV" + }, "CVE-2023-39194": { "cmt_msg": "net: xfrm: Fix xfrm_address_filter OOB read" }, "CVE-2023-39197": { "cmt_msg": "netfilter: conntrack: dccp: copy entire header to stack buffer, not just basic one" }, + "CVE-2023-52599": { + "cmt_msg": "jfs: fix array-index-out-of-bounds in diNewExt" + }, "CVE-2023-4622": { "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES" }, + "CVE-2024-26774": { + "cmt_msg": "ext4: avoid dividing by 0 in mb_update_avg_fragment_size() when block bitmap corrupt" + }, "CVE-2023-39193": { "cmt_msg": "netfilter: xt_sctp: validate the flag_info count" }, "CVE-2023-1079": { "cmt_msg": "HID: asus: use spinlock to safely schedule workers" }, + "CVE-2024-26602": { + "cmt_msg": "sched/membarrier: reduce the ability to hammer on sys_membarrier" + }, "CVE-2023-6610": { "cmt_msg": "smb: client: fix potential OOB in smb2_dump_detail()" }, + "CVE-2024-26600": { + "cmt_msg": "phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP" + }, "CVE-2023-3390": { "cmt_msg": "netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE" }, @@ -122117,6 +156947,15 @@ "CVE-2021-33061": { "cmt_msg": "ixgbe: add improvement for MDD response functionality" }, + "CVE-2024-26764": { + "cmt_msg": "fs/aio: Restrict kiocb_set_cancel_fn() to I/O submitted via libaio" + }, + "CVE-2024-26767": { + "cmt_msg": "drm/amd/display: fixed integer types and null check locations" + }, + "CVE-2024-26766": { + "cmt_msg": "IB/hfi1: Fix sdma.h tx->num_descs off-by-one error" + }, "CVE-2024-26589": { "cmt_msg": "bpf: Reject variable offset alu on PTR_TO_FLOW_KEYS" }, @@ -122129,6 +156968,9 @@ "CVE-2021-3864": { "cmt_msg": "" }, + "CVE-2024-26770": { + "cmt_msg": "HID: nvidia-shield: Add missing null pointer checks to LED initialization" + }, "CVE-2022-1652": { "cmt_msg": "floppy: use a statically allocated error counter" }, @@ -122166,7 +157008,7 @@ "cmt_msg": "" }, "CVE-2023-6270": { - "cmt_msg": "" + "cmt_msg": "aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts" }, "CVE-2023-2156": { "cmt_msg": "net: rpl: fix rpl header size calculation" @@ -122196,7 +157038,10 @@ "cmt_msg": "tipc: improve size validations for received domain records" }, "CVE-2023-6356": { - "cmt_msg": "" + "cmt_msg": "nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length" + }, + "CVE-2024-26744": { + "cmt_msg": "RDMA/srpt: Support specifying the srpt_service_guid parameter" }, "CVE-2021-4135": { "cmt_msg": "netdevsim: Zero-initialize memory for new map's value in function nsim_bpf_map_alloc" @@ -122210,6 +157055,21 @@ "CVE-2019-15239": { "cmt_msg": "unknown" }, + "CVE-2023-52635": { + "cmt_msg": "PM / devfreq: Synchronize devfreq_monitor_[start/stop]" + }, + "CVE-2023-52469": { + "cmt_msg": "drivers/amd/pm: fix a use-after-free in kv_parse_power_table" + }, + "CVE-2023-52633": { + "cmt_msg": "um: time-travel: fix time corruption" + }, + "CVE-2023-52632": { + "cmt_msg": "drm/amdkfd: Fix lock dependency warning with srcu" + }, + "CVE-2023-52630": { + "cmt_msg": "blk-iocost: Fix an UBSAN shift-out-of-bounds warning" + }, "CVE-2022-21505": { "cmt_msg": "lockdown: Fix kexec lockdown bypass with ima policy" }, @@ -122243,6 +157103,12 @@ "CVE-2022-3535": { "cmt_msg": "net: mvpp2: fix mvpp2 debugfs leak" }, + "CVE-2024-26808": { + "cmt_msg": "netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain" + }, + "CVE-2024-26646": { + "cmt_msg": "thermal: intel: hfi: Add syscore callbacks for system-wide PM" + }, "CVE-2021-22600": { "cmt_msg": "net/packet: rx_owner_map depends on pg_vec" }, @@ -122261,6 +157127,9 @@ "CVE-2023-28327": { "cmt_msg": "af_unix: Get user_ns from in_skb in unix_diag_get_exact()." }, + "CVE-2023-52638": { + "cmt_msg": "can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock" + }, "CVE-2017-13693": { "cmt_msg": "" }, @@ -122294,11 +157163,20 @@ "CVE-2021-3760": { "cmt_msg": "nfc: nci: fix the UAF of rf_conn_info object" }, + "CVE-2022-48627": { + "cmt_msg": "vt: fix memory overlapping when deleting chars in the buffer" + }, "CVE-2022-4382": { "cmt_msg": "USB: gadgetfs: Fix race between mounting and unmounting" }, - "CVE-2023-4732": { - "cmt_msg": "mm/userfaultfd: fix uffd-wp special cases for fork()" + "CVE-2022-36123": { + "cmt_msg": "x86: Clear .brk area at early boot" + }, + "CVE-2022-48628": { + "cmt_msg": "ceph: drop messages from MDS when unmounting" + }, + "CVE-2022-48629": { + "cmt_msg": "crypto: qcom-rng - ensure buffer for generate is completely filled" }, "CVE-2024-24859": { "cmt_msg": "" @@ -122306,6 +157184,9 @@ "CVE-2024-24858": { "cmt_msg": "" }, + "CVE-2024-22099": { + "cmt_msg": "Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security" + }, "CVE-2024-24855": { "cmt_msg": "scsi: lpfc: Fix a possible data race in lpfc_unregister_fcf_rescan()" }, @@ -122315,20 +157196,44 @@ "CVE-2022-1508": { "cmt_msg": "io_uring: reexpand under-reexpanded iters" }, + "CVE-2024-26673": { + "cmt_msg": "netfilter: nft_ct: sanitize layer 3 and 4 protocol number in custom expectations" + }, "CVE-2022-3545": { "cmt_msg": "nfp: fix use-after-free in area_cache_get()" }, "CVE-2021-43056": { "cmt_msg": "KVM: PPC: Book3S HV: Make idle_kvm_start_guest() return 0 if it went to guest" }, + "CVE-2023-52569": { + "cmt_msg": "btrfs: remove BUG() after failure to insert delayed dir index item" + }, + "CVE-2023-52568": { + "cmt_msg": "x86/sgx: Resolves SECS reclaim vs. page fault for EAUG race" + }, "CVE-2022-3542": { "cmt_msg": "bnx2x: fix potential memory leak in bnx2x_tpa_stop()" }, + "CVE-2023-52563": { + "cmt_msg": "drm/meson: fix memory leak on ->hpd_notify callback" + }, + "CVE-2023-52561": { + "cmt_msg": "arm64: dts: qcom: sdm845-db845c: Mark cont splash memory region as reserved" + }, "CVE-2023-5197": { "cmt_msg": "netfilter: nf_tables: disallow rule removal from chain binding" }, - "CVE-2023-1838": { - "cmt_msg": "Fix double fget() in vhost_net_set_backend()" + "CVE-2023-52566": { + "cmt_msg": "nilfs2: fix potential use after free in nilfs_gccache_submit_read_data()" + }, + "CVE-2023-52565": { + "cmt_msg": "media: uvcvideo: Fix OOB read" + }, + "CVE-2021-46928": { + "cmt_msg": "parisc: Clear stale IIR value on instruction access rights trap" + }, + "CVE-2021-46929": { + "cmt_msg": "sctp: use call_rcu to free endpoint" }, "CVE-2023-1382": { "cmt_msg": "tipc: set con sock in tipc_conn_alloc" @@ -122336,9 +157241,24 @@ "CVE-2023-1380": { "cmt_msg": "wifi: brcmfmac: slab-out-of-bounds read in brcmf_get_assoc_ies()" }, + "CVE-2021-46923": { + "cmt_msg": "fs/mount_setattr: always cleanup mount_kattr" + }, + "CVE-2021-46924": { + "cmt_msg": "NFC: st21nfca: Fix memory leak in device probe and remove" + }, + "CVE-2021-46925": { + "cmt_msg": "net/smc: fix kernel panic caused by race of smc_sock" + }, + "CVE-2021-46926": { + "cmt_msg": "ALSA: hda: intel-sdw-acpi: harden detection of controller" + }, "CVE-2020-0347": { "cmt_msg": "" }, + "CVE-2024-26788": { + "cmt_msg": "dmaengine: fsl-qdma: init irq after reg initialization" + }, "CVE-2022-27223": { "cmt_msg": "USB: gadget: validate endpoint index for xilinx udc" }, @@ -122348,12 +157268,18 @@ "CVE-2019-12456": { "cmt_msg": "" }, + "CVE-2024-26720": { + "cmt_msg": "mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again" + }, "CVE-2021-33655": { "cmt_msg": "fbcon: Disallow setting font bigger than screen size" }, "CVE-2022-41858": { "cmt_msg": "drivers: net: slip: fix NPD bug in sl_tx_timeout()" }, + "CVE-2024-26698": { + "cmt_msg": "hv_netvsc: Fix race condition between netvsc_probe and netvsc_remove" + }, "CVE-2023-1206": { "cmt_msg": "tcp: Reduce chance of collisions in inet6_hashfn()." }, @@ -122390,11 +157316,23 @@ "CVE-2023-3355": { "cmt_msg": "drm/msm/gem: Add check for kmalloc" }, + "CVE-2023-52519": { + "cmt_msg": "HID: intel-ish-hid: ipc: Disable and reenable ACPI GPE bit" + }, + "CVE-2023-52516": { + "cmt_msg": "dma-debug: don't call __dma_entry_alloc_check_leak() under free_entries_lock" + }, + "CVE-2023-52517": { + "cmt_msg": "spi: sun6i: fix race between DMA RX transfer completion and RX FIFO drain" + }, + "CVE-2023-52515": { + "cmt_msg": "RDMA/srp: Do not call scsi_done() from srp_abort()" + }, "CVE-2019-15902": { "cmt_msg": "unknown" }, - "CVE-2024-25739": { - "cmt_msg": "" + "CVE-2023-52510": { + "cmt_msg": "ieee802154: ca8210: Fix a potential UAF in ca8210_probe" }, "CVE-2023-3358": { "cmt_msg": "HID: intel_ish-hid: Add check for ishtp_dma_tx_map" @@ -122406,7 +157344,7 @@ "cmt_msg": "" }, "CVE-2023-6536": { - "cmt_msg": "" + "cmt_msg": "nvmet-tcp: fix a crash in nvmet_req_complete()" }, "CVE-2023-1118": { "cmt_msg": "media: rc: Fix use-after-free bugs caused by ene_tx_irqsim()" @@ -122423,18 +157361,33 @@ "CVE-2024-1151": { "cmt_msg": "net: openvswitch: limit the number of recursions from action sets" }, + "CVE-2024-26659": { + "cmt_msg": "xhci: handle isoc Babble and Buffer Overrun events properly" + }, + "CVE-2024-26658": { + "cmt_msg": "bcachefs: grab s_umount only if snapshotting" + }, "CVE-2010-5321": { "cmt_msg": "" }, "CVE-2021-20322": { "cmt_msg": "ipv6: make exception cache less predictible" }, + "CVE-2024-26654": { + "cmt_msg": "ALSA: sh: aica: reorder cleanup operations to avoid UAF bugs" + }, "CVE-2021-20320": { "cmt_msg": "s390/bpf: Fix optimizing out zero-extensions" }, "CVE-2021-20321": { "cmt_msg": "ovl: fix missing negative dentry check in ovl_rename()" }, + "CVE-2024-26651": { + "cmt_msg": "sr9800: Add check for usbnet_get_endpoints" + }, + "CVE-2024-26650": { + "cmt_msg": "platform/x86: p2sb: Allow p2sb_bar() calls during PCI device probe" + }, "CVE-2022-42896": { "cmt_msg": "Bluetooth: L2CAP: Fix accepting connection request for invalid SPSM" }, @@ -122450,9 +157403,24 @@ "CVE-2022-1048": { "cmt_msg": "ALSA: pcm: Fix races among concurrent hw_params and hw_free calls" }, + "CVE-2023-52475": { + "cmt_msg": "Input: powermate - fix use-after-free in powermate_config_complete" + }, + "CVE-2023-52474": { + "cmt_msg": "IB/hfi1: Fix bugs with non-PAGE_SIZE-end multi-iovec user SDMA requests" + }, + "CVE-2023-52477": { + "cmt_msg": "usb: hub: Guard against accesses to uninitialized BOS descriptors" + }, + "CVE-2023-52476": { + "cmt_msg": "perf/x86/lbr: Filter vsyscall addresses" + }, "CVE-2023-22995": { "cmt_msg": "usb: dwc3: dwc3-qcom: Add missing platform_device_put() in dwc3_qcom_acpi_register_core" }, + "CVE-2023-52470": { + "cmt_msg": "drm/radeon: check the alloc_workqueue return value in radeon_crtc_init()" + }, "CVE-2024-21803": { "cmt_msg": "" }, @@ -122465,6 +157433,12 @@ "CVE-2023-4563": { "cmt_msg": "netfilter: nf_tables: don't skip expired elements during walk" }, + "CVE-2023-52479": { + "cmt_msg": "ksmbd: fix uaf in smb20_oplock_break_ack" + }, + "CVE-2023-52478": { + "cmt_msg": "HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect" + }, "CVE-2022-26365": { "cmt_msg": "xen/blkfront: fix leaking data in shared pages" }, @@ -122474,12 +157448,15 @@ "CVE-2023-3220": { "cmt_msg": "drm/msm/dpu: Add check for pstates" }, - "CVE-2024-22099": { - "cmt_msg": "" + "CVE-2023-4623": { + "cmt_msg": "net/sched: sch_hfsc: Ensure inner classes have fsc curve" }, "CVE-2023-30456": { "cmt_msg": "KVM: nVMX: add missing consistency checks for CR0 and CR4" }, + "CVE-2022-48626": { + "cmt_msg": "moxart: fix potential use-after-free on remove path" + }, "CVE-2022-23041": { "cmt_msg": "xen/9p: use alloc/free_pages_exact()" }, @@ -122516,6 +157493,12 @@ "CVE-2024-25741": { "cmt_msg": "" }, + "CVE-2024-26778": { + "cmt_msg": "fbdev: savage: Error out if pixclock equals zero" + }, + "CVE-2024-26809": { + "cmt_msg": "netfilter: nft_set_pipapo: release elements in clone only from destroy path" + }, "CVE-2022-26966": { "cmt_msg": "sr9700: sanity check for packet length" }, @@ -122525,20 +157508,59 @@ "CVE-2023-1989": { "cmt_msg": "Bluetooth: btsdio: fix use after free bug in btsdio_remove due to unfinished work" }, + "CVE-2024-26806": { + "cmt_msg": "spi: cadence-qspi: remove system-wide suspend helper calls from runtime PM hooks" + }, "CVE-2021-37159": { "cmt_msg": "usb: hso: fix error handling code of hso_create_net_device" }, - "CVE-2024-25744": { - "cmt_msg": "x86/coco: Disable 32-bit emulation by default on TDX and SEV" + "CVE-2023-4732": { + "cmt_msg": "mm/userfaultfd: fix uffd-wp special cases for fork()" + }, + "CVE-2024-26802": { + "cmt_msg": "stmmac: Clear variable when destroying workqueue" + }, + "CVE-2023-52508": { + "cmt_msg": "nvme-fc: Prevent null pointer dereference in nvme_fc_io_getuuid()" + }, + "CVE-2023-52606": { + "cmt_msg": "powerpc/lib: Validate size for vector operations" + }, + "CVE-2023-52607": { + "cmt_msg": "powerpc/mm: Fix null-pointer dereference in pgtable_cache_add" + }, + "CVE-2023-52604": { + "cmt_msg": "FS:JFS:UBSAN:array-index-out-of-bounds in dbAdjTree" + }, + "CVE-2023-52602": { + "cmt_msg": "jfs: fix slab-out-of-bounds Read in dtSearch" + }, + "CVE-2023-52603": { + "cmt_msg": "UBSAN: array-index-out-of-bounds in dtSplitRoot" }, "CVE-2022-25265": { "cmt_msg": "" }, + "CVE-2023-52601": { + "cmt_msg": "jfs: fix array-index-out-of-bounds in dbAdjTree" + }, + "CVE-2024-26779": { + "cmt_msg": "wifi: mac80211: fix race condition on enabling fast-xmit" + }, + "CVE-2023-52600": { + "cmt_msg": "jfs: fix uaf in jfs_evict_inode" + }, + "CVE-2023-52608": { + "cmt_msg": "firmware: arm_scmi: Check mailbox/SMT channel for consistency" + }, + "CVE-2023-52609": { + "cmt_msg": "binder: fix race between mmput() and do_exit()" + }, "CVE-2022-21499": { "cmt_msg": "lockdown: also lock down previous kgdb use" }, "CVE-2024-23196": { - "cmt_msg": "" + "cmt_msg": "ALSA: hda: fix a possible null-pointer dereference due to data race in snd_hdac_regmap_sync()" }, "CVE-2023-4208": { "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free" @@ -122564,6 +157586,9 @@ "CVE-2023-0160": { "cmt_msg": "bpf, sockmap: fix deadlocks in the sockhash and sockmap" }, + "CVE-2023-52506": { + "cmt_msg": "LoongArch: Set all reserved memblocks on Node#0 at initialization" + }, "CVE-2022-2663": { "cmt_msg": "netfilter: nf_conntrack_irc: Fix forged IP logic" }, @@ -122600,6 +157625,9 @@ "CVE-2019-19378": { "cmt_msg": "" }, + "CVE-2023-52482": { + "cmt_msg": "x86/srso: Add SRSO mitigation for Hygon processors" + }, "CVE-2022-36879": { "cmt_msg": "xfrm: xfrm_policy: fix a possible double xfrm_pols_put() in xfrm_bundle_lookup()" }, @@ -122660,6 +157688,9 @@ "CVE-2022-2209": { "cmt_msg": "" }, + "CVE-2023-52624": { + "cmt_msg": "drm/amd/display: Wake DMCUB before executing GPINT commands" + }, "CVE-2022-1852": { "cmt_msg": "KVM: x86: avoid calling x86 emulator without a decoded instruction" }, @@ -122667,7 +157698,10 @@ "cmt_msg": "KVM: PPC: Book3S: Fix H_RTAS rets buffer overflow" }, "CVE-2023-7042": { - "cmt_msg": "" + "cmt_msg": "wifi: ath10k: fix NULL pointer dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev()" + }, + "CVE-2024-26775": { + "cmt_msg": "aoe: avoid potential deadlock at set_capacity" }, "CVE-2023-2019": { "cmt_msg": "netdevsim: fib: Fix reference count leak on route deletion failure" @@ -122678,8 +157712,11 @@ "CVE-2022-3595": { "cmt_msg": "cifs: fix double-fault crash during ntlmssp" }, + "CVE-2023-52559": { + "cmt_msg": "iommu/vt-d: Avoid memory allocation in iommu_suspend()" + }, "CVE-2023-47233": { - "cmt_msg": "" + "cmt_msg": "wifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach" }, "CVE-2024-23850": { "cmt_msg": "btrfs: do not ASSERT() if the newly created subvolume already got read" @@ -122687,15 +157724,42 @@ "CVE-2024-23851": { "cmt_msg": "dm: limit the number of targets and parameter size area" }, + "CVE-2023-52629": { + "cmt_msg": "sh: push-switch: Reorder cleanup operations to avoid use-after-free bug" + }, "CVE-2022-1462": { "cmt_msg": "tty: use new tty_insert_flip_string_and_push_buffer() in pty_write()" }, + "CVE-2024-26758": { + "cmt_msg": "md: Don't ignore suspended array in md_check_recovery()" + }, + "CVE-2024-26610": { + "cmt_msg": "wifi: iwlwifi: fix a memory corruption" + }, "CVE-2023-6606": { "cmt_msg": "smb: client: fix OOB in smbCalcSize()" }, + "CVE-2024-26614": { + "cmt_msg": "tcp: make sure init the accept_queue's spinlocks once" + }, "CVE-2022-1729": { "cmt_msg": "perf: Fix sys_perf_event_open() race against self" }, + "CVE-2024-26751": { + "cmt_msg": "ARM: ep93xx: Add terminator to gpiod_lookup_table" + }, + "CVE-2024-26752": { + "cmt_msg": "l2tp: pass correct message length to ip6_append_data" + }, + "CVE-2024-26754": { + "cmt_msg": "gtp: fix use-after-free and null-ptr-deref in gtp_genl_dump_pdp()" + }, + "CVE-2024-26756": { + "cmt_msg": "md: Don't register sync_thread for reshape directly" + }, + "CVE-2024-26757": { + "cmt_msg": "md: Don't ignore read-only array in md_check_recovery()" + }, "CVE-2023-52439": { "cmt_msg": "uio: Fix use-after-free in uio_open" }, @@ -122717,9 +157781,24 @@ "CVE-2022-2964": { "cmt_msg": "net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup" }, + "CVE-2024-26688": { + "cmt_msg": "fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super" + }, + "CVE-2024-23307": { + "cmt_msg": "md/raid5: fix atomicity violation in raid5_cache_count" + }, "CVE-2022-2961": { "cmt_msg": "" }, + "CVE-2024-26680": { + "cmt_msg": "net: atlantic: Fix DMA mapping for PTP hwts ring" + }, + "CVE-2024-26686": { + "cmt_msg": "fs/proc: do_task_stat: use sig->stats_lock to gather the threads/children stats" + }, + "CVE-2024-26687": { + "cmt_msg": "xen/events: close evtchn after mapping cleanup" + }, "CVE-2023-51779": { "cmt_msg": "Bluetooth: af_bluetooth: Fix Use-After-Free in bt_sock_recvmsg" }, @@ -122753,8 +157832,8 @@ "CVE-2023-0266": { "cmt_msg": "ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF" }, - "CVE-2023-4623": { - "cmt_msg": "net/sched: sch_hfsc: Ensure inner classes have fsc curve" + "CVE-2023-1838": { + "cmt_msg": "Fix double fget() in vhost_net_set_backend()" }, "CVE-2022-29156": { "cmt_msg": "RDMA/rtrs-clt: Fix possible double free in error case" @@ -122771,18 +157850,39 @@ "CVE-2021-4028": { "cmt_msg": "RDMA/cma: Do not change route.addr.src_addr.ss_family" }, + "CVE-2023-52498": { + "cmt_msg": "PM: sleep: Fix possible deadlocks in core system-wide PM code" + }, "CVE-2021-4023": { "cmt_msg": "io-wq: fix cancellation on create-worker failure" }, + "CVE-2023-52640": { + "cmt_msg": "fs/ntfs3: Fix oob in ntfs_listxattr" + }, + "CVE-2023-52641": { + "cmt_msg": "fs/ntfs3: Add NULL ptr dereference checking at the end of attr_allocate_frame()" + }, "CVE-2021-0399": { "cmt_msg": "" }, + "CVE-2023-52488": { + "cmt_msg": "serial: sc16is7xx: convert from _raw_ to _noinc_ regmap functions for FIFO" + }, + "CVE-2023-52489": { + "cmt_msg": "mm/sparsemem: fix race in accessing memory_section->usage" + }, "CVE-2023-42755": { "cmt_msg": "net/sched: Retire rsvp classifier" }, "CVE-2020-36516": { "cmt_msg": "ipv4: avoid using shared IP generator for connected sockets" }, + "CVE-2023-52486": { + "cmt_msg": "drm: Don't unref the same fb many times by mistake due to deadlock handling" + }, + "CVE-2023-52480": { + "cmt_msg": "ksmbd: fix race condition between session lookup and expire" + }, "CVE-2012-4542": { "cmt_msg": "" }, @@ -122804,6 +157904,9 @@ "CVE-2024-26598": { "cmt_msg": "KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache" }, + "CVE-2023-52492": { + "cmt_msg": "dmaengine: fix NULL pointer in channel unregistration function" + }, "CVE-2023-3609": { "cmt_msg": "net/sched: cls_u32: Fix reference counter leak leading to overflow" }, @@ -122816,9 +157919,27 @@ "CVE-2022-1972": { "cmt_msg": "netfilter: nf_tables: sanitize nft_set_desc_concat_parse()" }, + "CVE-2023-52491": { + "cmt_msg": "media: mtk-jpeg: Fix use after free bug due to error path handling in mtk_jpeg_dec_device_run" + }, + "CVE-2024-26772": { + "cmt_msg": "ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal()" + }, + "CVE-2021-47082": { + "cmt_msg": "tun: avoid double free in tun_free_netdev" + }, + "CVE-2021-47083": { + "cmt_msg": "pinctrl: mediatek: fix global-out-of-bounds issue" + }, + "CVE-2021-47086": { + "cmt_msg": "phonet/pep: refuse to enable an unbound pipe" + }, "CVE-2022-32981": { "cmt_msg": "powerpc/32: Fix overread/overwrite of thread_struct via ptrace" }, + "CVE-2021-47089": { + "cmt_msg": "kfence: fix memory leak when cat kfence objects" + }, "CVE-2022-3424": { "cmt_msg": "misc: sgi-gru: fix use-after-free error in gru_set_context_option, gru_fault and gru_handle_user_call_os" }, @@ -122828,6 +157949,9 @@ "CVE-2023-0394": { "cmt_msg": "ipv6: raw: Deduct extension header length in rawv6_push_pending_frames" }, + "CVE-2024-26615": { + "cmt_msg": "net/smc: fix illegal rmb_desc access in SMC-D connection dump" + }, "CVE-2022-36402": { "cmt_msg": "drm/vmwgfx: Fix shader stage validation" }, @@ -122870,6 +157994,9 @@ "CVE-2021-3714": { "cmt_msg": "" }, + "CVE-2024-26733": { + "cmt_msg": "arp: Prevent overflow in arp_req_get()." + }, "CVE-2021-3896": { "cmt_msg": "isdn: cpai: check ctr->cnr to avoid array index out of bound" }, @@ -122915,9 +158042,27 @@ "CVE-2022-33744": { "cmt_msg": "xen/arm: Fix race in RB-tree based P2M accounting" }, + "CVE-2023-52596": { + "cmt_msg": "sysctl: Fix out of bounds access for empty sysctl registers" + }, + "CVE-2023-52597": { + "cmt_msg": "KVM: s390: fix setting of fpc register" + }, + "CVE-2023-52594": { + "cmt_msg": "wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus()" + }, "CVE-2023-52443": { "cmt_msg": "apparmor: avoid crash when parsed profile name is empty" }, + "CVE-2023-52593": { + "cmt_msg": "wifi: wfx: fix possible NULL pointer dereference in wfx_set_mfp_ap()" + }, + "CVE-2023-52590": { + "cmt_msg": "ocfs2: Avoid touching renamed directory if parent does not change" + }, + "CVE-2023-52591": { + "cmt_msg": "reiserfs: Avoid touching renamed directory if parent does not change" + }, "CVE-2022-1280": { "cmt_msg": "drm: avoid circular locks in drm_mode_getconnector" }, @@ -122927,11 +158072,26 @@ "CVE-2023-52445": { "cmt_msg": "media: pvrusb2: fix use after free on context disconnection" }, - "CVE-2022-41218": { - "cmt_msg": "media: dvb-core: Fix UAF due to refcount races at releasing" + "CVE-2021-46936": { + "cmt_msg": "net: fix use-after-free in tw_timer_handler" }, - "CVE-2011-4917": { - "cmt_msg": "" + "CVE-2021-46935": { + "cmt_msg": "binder: fix async_free_space accounting for empty parcels" + }, + "CVE-2021-46934": { + "cmt_msg": "i2c: validate user data in compat ioctl" + }, + "CVE-2021-46933": { + "cmt_msg": "usb: gadget: f_fs: Clear ffs_eventfd in ffs_data_clear." + }, + "CVE-2021-46932": { + "cmt_msg": "Input: appletouch - initialize work before device registration" + }, + "CVE-2021-46931": { + "cmt_msg": "net/mlx5e: Wrap the tx reporter dump callback to extract the sq" + }, + "CVE-2021-46930": { + "cmt_msg": "usb: mtu3: fix list_head check warning" }, "CVE-2022-36946": { "cmt_msg": "netfilter: nf_queue: do not allow packet truncation below transport header offset" @@ -122943,7 +158103,7 @@ "cmt_msg": "x86/speculation/mmio: Enable CPU Fill buffer clearing on idle" }, "CVE-2024-0841": { - "cmt_msg": "" + "cmt_msg": "fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super" }, "CVE-2023-52449": { "cmt_msg": "mtd: Fix gluebi NULL pointer dereference caused by ftl notifier" @@ -122981,6 +158141,9 @@ "CVE-2021-39800": { "cmt_msg": "" }, + "CVE-2024-26784": { + "cmt_msg": "pmdomain: arm: Fix NULL dereference on scmi_perf_domain removal" + }, "CVE-2022-1195": { "cmt_msg": "hamradio: improve the incomplete fix to avoid NPD" }, @@ -122999,15 +158162,36 @@ "CVE-2022-45886": { "cmt_msg": "media: dvb-core: Fix use-after-free due on race condition at dvb_net" }, + "CVE-2023-52509": { + "cmt_msg": "ravb: Fix use-after-free issue in ravb_tx_timeout_work()" + }, "CVE-2023-46343": { "cmt_msg": "nfc: nci: fix possible NULL pointer dereference in send_acknowledge()" }, "CVE-2021-4204": { "cmt_msg": "bpf: Generalize check_ctx_reg for reuse with other types" }, + "CVE-2023-52504": { + "cmt_msg": "x86/alternatives: Disable KASAN in apply_alternatives()" + }, + "CVE-2023-52507": { + "cmt_msg": "nfc: nci: assert requested protocol is valid" + }, "CVE-2023-2124": { "cmt_msg": "xfs: verify buffer contents when we skip log replay" }, + "CVE-2023-52501": { + "cmt_msg": "ring-buffer: Do not attempt to read past \"commit\"" + }, + "CVE-2023-52500": { + "cmt_msg": "scsi: pm80xx: Avoid leaking tags when processing OPC_INB_SET_CONTROLLER_CONFIG command" + }, + "CVE-2023-52503": { + "cmt_msg": "tee: amdtee: fix use-after-free vulnerability in amdtee_close_session" + }, + "CVE-2023-52502": { + "cmt_msg": "net: nfc: fix races in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn()" + }, "CVE-2023-1281": { "cmt_msg": "net/sched: tcindex: update imperfect hash filters respecting rcu" }, @@ -123032,6 +158216,12 @@ "CVE-2022-27672": { "cmt_msg": "x86/speculation: Identify processors vulnerable to SMT RSB predictions" }, + "CVE-2024-26668": { + "cmt_msg": "netfilter: nft_limit: reject configurations that cause integer overflow" + }, + "CVE-2024-26669": { + "cmt_msg": "net/sched: flower: Fix chain template offload" + }, "CVE-2020-25220": { "cmt_msg": "" }, @@ -123041,12 +158231,27 @@ "CVE-2022-0171": { "cmt_msg": "KVM: SEV: add cache flush to solve SEV cache incoherency issues" }, + "CVE-2024-26661": { + "cmt_msg": "drm/amd/display: Add NULL test for 'timing generator' in 'dcn21_set_pipe()'" + }, + "CVE-2024-26662": { + "cmt_msg": "drm/amd/display: Fix 'panel_cntl' could be null in 'dcn21_set_backlight_level()'" + }, "CVE-2023-26242": { "cmt_msg": "" }, + "CVE-2024-26664": { + "cmt_msg": "hwmon: (coretemp) Fix out-of-bounds memory access" + }, + "CVE-2024-26665": { + "cmt_msg": "tunnels: fix out of bounds access when building IPv6 PMTU error" + }, "CVE-2019-16089": { "cmt_msg": "" }, + "CVE-2024-26689": { + "cmt_msg": "ceph: prevent use-after-free in encode_cap_msg()" + }, "CVE-2022-1679": { "cmt_msg": "ath9k: fix use-after-free in ath9k_hif_usb_rx_cb" }, @@ -123074,8 +158279,8 @@ "CVE-2022-3077": { "cmt_msg": "i2c: ismt: prevent memory corruption in ismt_access()" }, - "CVE-2022-36123": { - "cmt_msg": "x86: Clear .brk area at early boot" + "CVE-2011-4916": { + "cmt_msg": "" }, "CVE-2023-52448": { "cmt_msg": "gfs2: Fix kernel NULL pointer dereference in gfs2_rgrp_dump" @@ -123086,11 +158291,29 @@ "CVE-2023-23039": { "cmt_msg": "" }, + "CVE-2024-26660": { + "cmt_msg": "drm/amd/display: Implement bounds check for stream encoder creation in DCN301" + }, + "CVE-2024-26719": { + "cmt_msg": "nouveau: offload fence uevents work to workqueue" + }, + "CVE-2024-26715": { + "cmt_msg": "usb: dwc3: gadget: Fix NULL pointer dereference in dwc3_gadget_suspend" + }, "CVE-2024-1312": { "cmt_msg": "mm: lock_vma_under_rcu() must check vma->anon_vma under vma lock" }, + "CVE-2024-26717": { + "cmt_msg": "HID: i2c-hid-of: fix NULL-deref on failed power up" + }, "CVE-2023-3338": { "cmt_msg": "Remove DECnet support from kernel" + }, + "CVE-2024-26712": { + "cmt_msg": "powerpc/kasan: Fix addr error caused by page alignment" + }, + "CVE-2024-26713": { + "cmt_msg": "powerpc/pseries/iommu: Fix iommu initialisation during DLPAR add" } } }, @@ -123312,12 +158535,30 @@ "CVE-2022-0002": { "cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE" }, + "CVE-2024-26685": { + "cmt_msg": "nilfs2: fix potential bug in end_buffer_async_write" + }, + "CVE-2023-52615": { + "cmt_msg": "hwrng: core - Fix page fault dead lock on mmap-ed hwrng" + }, + "CVE-2023-52614": { + "cmt_msg": "PM / devfreq: Fix buffer overflow in trans_stat_show" + }, + "CVE-2023-52617": { + "cmt_msg": "PCI: switchtec: Fix stdev_release() crash after surprise hot remove" + }, + "CVE-2023-52616": { + "cmt_msg": "crypto: lib/mpi - Fix unexpected pointer access in mpi_ec_init" + }, "CVE-2022-3108": { "cmt_msg": "drm/amdkfd: Check for null pointer after calling kmemdup" }, "CVE-2022-0995": { "cmt_msg": "watch_queue: Fix filter limit check" }, + "CVE-2023-52612": { + "cmt_msg": "crypto: scomp - fix req->dst buffer overflow" + }, "CVE-2022-3105": { "cmt_msg": "RDMA/uverbs: Check for null return of kmalloc_array" }, @@ -123327,8 +158568,8 @@ "CVE-2022-3107": { "cmt_msg": "hv_netvsc: Add check for kvmalloc_array" }, - "CVE-2022-3106": { - "cmt_msg": "sfc_ef100: potential dereference of null pointer" + "CVE-2022-0998": { + "cmt_msg": "vdpa: clean up get_config_size ret value handling" }, "CVE-2022-47520": { "cmt_msg": "wifi: wilc1000: validate pairwise and authentication suite offsets" @@ -123372,9 +158613,15 @@ "CVE-2024-0584": { "cmt_msg": "ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet" }, + "CVE-2024-26663": { + "cmt_msg": "tipc: Check the bearer type before calling tipc_udp_nl_bearer_add()" + }, "CVE-2023-2163": { "cmt_msg": "bpf: Fix incorrect verifier pruning due to missing register precision taints" }, + "CVE-2024-26759": { + "cmt_msg": "mm/swap: fix race when skipping swapcache" + }, "CVE-2022-21125": { "cmt_msg": "x86/speculation/mmio: Reuse SRBDS mitigation for SBDS" }, @@ -123462,21 +158709,24 @@ "CVE-2022-3202": { "cmt_msg": "jfs: prevent NULL deref in diFree" }, + "CVE-2024-25739": { + "cmt_msg": "" + }, "CVE-2022-2602": { "cmt_msg": "io_uring/af_unix: defer registered files gc to io_uring release" }, "CVE-2024-26585": { "cmt_msg": "tls: fix race between tx work scheduling and socket close" }, + "CVE-2023-52511": { + "cmt_msg": "spi: sun6i: reduce DMA RX transfer width to single byte" + }, "CVE-2024-26584": { "cmt_msg": "net: tls: handle backlogging of crypto requests" }, "CVE-2023-2008": { "cmt_msg": "udmabuf: add back sanity check" }, - "CVE-2024-26587": { - "cmt_msg": "net: netdevsim: don't try to destroy PHC on VFs" - }, "CVE-2023-2002": { "cmt_msg": "bluetooth: Perform careful capability checks in hci_sock_ioctl()" }, @@ -123528,21 +158778,51 @@ "CVE-2023-1073": { "cmt_msg": "HID: check empty report_list in hid_validate_values()" }, + "CVE-2024-26747": { + "cmt_msg": "usb: roles: fix NULL pointer issue when put module's reference" + }, + "CVE-2024-26745": { + "cmt_msg": "powerpc/pseries/iommu: IOMMU table is not initialized for kdump over SR-IOV" + }, "CVE-2023-51781": { "cmt_msg": "appletalk: Fix Use-After-Free in atalk_ioctl" }, + "CVE-2024-26743": { + "cmt_msg": "RDMA/qedr: Fix qedr_create_user_qp error flow" + }, + "CVE-2024-26740": { + "cmt_msg": "net/sched: act_mirred: use the backlog for mirred ingress" + }, "CVE-2024-22386": { "cmt_msg": "" }, "CVE-2022-1734": { "cmt_msg": "nfc: nfcmrvl: main: reorder destructive operations in nfcmrvl_nci_unregister_dev to avoid bugs" }, + "CVE-2024-26749": { + "cmt_msg": "usb: cdns3: fixed memory use after free at cdns3_gadget_ep_disable()" + }, + "CVE-2024-26748": { + "cmt_msg": "usb: cdns3: fix memory double free when handle zero packet" + }, + "CVE-2024-26787": { + "cmt_msg": "mmc: mmci: stm32: fix DMA API overlapping mappings warning" + }, "CVE-2022-3707": { "cmt_msg": "drm/i915/gvt: fix double free bug in split_2MB_gtt_entry" }, "CVE-2022-2503": { "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag" }, + "CVE-2023-52610": { + "cmt_msg": "net/sched: act_ct: fix skb leak and crash on ooo frags" + }, + "CVE-2024-26699": { + "cmt_msg": "drm/amd/display: Fix array-index-out-of-bounds in dcn35_clkmgr" + }, + "CVE-2024-26698": { + "cmt_msg": "hv_netvsc: Fix race condition between netvsc_probe and netvsc_remove" + }, "CVE-2022-23038": { "cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()" }, @@ -123552,6 +158832,9 @@ "CVE-2022-20154": { "cmt_msg": "sctp: use call_rcu to free endpoint" }, + "CVE-2024-26691": { + "cmt_msg": "KVM: arm64: Fix circular locking dependency" + }, "CVE-2022-20158": { "cmt_msg": "net/packet: fix slab-out-of-bounds access in packet_recvmsg()" }, @@ -123564,6 +158847,12 @@ "CVE-2024-0565": { "cmt_msg": "smb: client: fix OOB in receive_encrypted_standard()" }, + "CVE-2024-26697": { + "cmt_msg": "nilfs2: fix data corruption in dsync block recovery for small block sizes" + }, + "CVE-2024-26696": { + "cmt_msg": "nilfs2: fix hang in nilfs_lookup_dirty_data_buffers()" + }, "CVE-2023-2176": { "cmt_msg": "RDMA/core: Refactor rdma_bind_addr" }, @@ -123573,14 +158862,17 @@ "CVE-2023-1252": { "cmt_msg": "ovl: fix use after free in struct ovl_aio_req" }, + "CVE-2024-26789": { + "cmt_msg": "crypto: arm64/neonbs - fix out-of-bounds access on short input" + }, "CVE-2022-39189": { "cmt_msg": "KVM: x86: do not report a vCPU as preempted outside instruction boundaries" }, "CVE-2022-39188": { "cmt_msg": "mmu_gather: Force tlb-flush VM_PFNMAP vmas" }, - "CVE-2022-0998": { - "cmt_msg": "vdpa: clean up get_config_size ret value handling" + "CVE-2022-3106": { + "cmt_msg": "sfc_ef100: potential dereference of null pointer" }, "CVE-2005-3660": { "cmt_msg": "" @@ -123603,27 +158895,48 @@ "CVE-2023-31081": { "cmt_msg": "" }, - "CVE-2024-26588": { - "cmt_msg": "LoongArch: BPF: Prevent out-of-bounds memory access" + "CVE-2023-52618": { + "cmt_msg": "block/rnbd-srv: Check for unlikely string overflow" }, - "CVE-2024-23307": { - "cmt_msg": "" + "CVE-2024-0646": { + "cmt_msg": "net: tls, update curr on splice as well" + }, + "CVE-2023-52598": { + "cmt_msg": "s390/ptrace: handle setting of fpc register correctly" + }, + "CVE-2023-52576": { + "cmt_msg": "x86/mm, kexec, ima: Use memblock_free_late() from ima_free_kexec_buffer()" }, "CVE-2022-32296": { "cmt_msg": "tcp: increase source port perturb table to 2^16" }, + "CVE-2023-52499": { + "cmt_msg": "powerpc/47x: Fix 47x syscall return crash" + }, "CVE-2023-3567": { "cmt_msg": "vc_screen: move load of struct vc_data pointer in vcs_read() to avoid UAF" }, "CVE-2022-3028": { "cmt_msg": "af_key: Do not call xfrm_probe_algs in parallel" }, + "CVE-2023-52493": { + "cmt_msg": "bus: mhi: host: Drop chan lock before queuing buffers" + }, + "CVE-2023-52485": { + "cmt_msg": "drm/amd/display: Wake DMCUB before sending a command" + }, "CVE-2020-14304": { "cmt_msg": "" }, "CVE-2022-2318": { "cmt_msg": "net: rose: fix UAF bugs caused by timer handler" }, + "CVE-2023-52497": { + "cmt_msg": "erofs: fix lz4 inplace decompression" + }, + "CVE-2023-52494": { + "cmt_msg": "bus: mhi: host: Add alignment check for event ring read pointer" + }, "CVE-2022-33981": { "cmt_msg": "floppy: disable FDRAWCMD by default" }, @@ -123648,6 +158961,9 @@ "CVE-2023-39198": { "cmt_msg": "drm/qxl: fix UAF on handle creation" }, + "CVE-2024-26656": { + "cmt_msg": "drm/amdgpu: fix use-after-free bug" + }, "CVE-2021-42327": { "cmt_msg": "drm/amdgpu: fix out of bounds write" }, @@ -123669,6 +158985,9 @@ "CVE-2023-33288": { "cmt_msg": "power: supply: bq24190: Fix use after free bug in bq24190_remove due to race condition" }, + "CVE-2023-52484": { + "cmt_msg": "iommu/arm-smmu-v3: Fix soft lockup triggered by arm_smmu_mm_invalidate_range" + }, "CVE-2022-29900": { "cmt_msg": "x86/kvm/vmx: Make noinstr clean" }, @@ -123684,6 +159003,9 @@ "CVE-2023-25012": { "cmt_msg": "HID: bigben: use spinlock to safely schedule workers" }, + "CVE-2023-52580": { + "cmt_msg": "net/core: Fix ETH_P_1588 flow dissector" + }, "CVE-2023-35829": { "cmt_msg": "media: rkvdec: fix use after free bug in rkvdec_remove" }, @@ -123693,6 +159015,9 @@ "CVE-2022-29582": { "cmt_msg": "io_uring: fix race between timeout flush and removal" }, + "CVE-2023-52583": { + "cmt_msg": "ceph: fix deadlock or deadcode of misusing dget()" + }, "CVE-2022-1116": { "cmt_msg": "" }, @@ -123702,6 +159027,9 @@ "CVE-2023-35823": { "cmt_msg": "media: saa7134: fix use after free bug in saa7134_finidev due to race condition" }, + "CVE-2023-52582": { + "cmt_msg": "netfs: Only call folio_start_fscache() one time for each folio" + }, "CVE-2022-23816": { "cmt_msg": "x86/kvm/vmx: Make noinstr clean" }, @@ -123711,6 +159039,21 @@ "CVE-2023-35827": { "cmt_msg": "ravb: Fix use-after-free issue in ravb_tx_timeout_work()" }, + "CVE-2023-52481": { + "cmt_msg": "arm64: errata: Add Cortex-A520 speculative unprivileged load workaround" + }, + "CVE-2023-52585": { + "cmt_msg": "drm/amdgpu: Fix possible NULL dereference in amdgpu_ras_query_error_status_helper()" + }, + "CVE-2023-52584": { + "cmt_msg": "spmi: mediatek: Fix UAF on device remove" + }, + "CVE-2023-52587": { + "cmt_msg": "IB/ipoib: Fix mcast list locking" + }, + "CVE-2023-52586": { + "cmt_msg": "drm/msm/dpu: Add mutex lock in control vblank irq" + }, "CVE-2022-3567": { "cmt_msg": "ipv6: Fix data races around sk->sk_prot." }, @@ -123726,15 +159069,57 @@ "CVE-2022-4269": { "cmt_msg": "act_mirred: use the backlog for nested calls to mirred ingress" }, + "CVE-2024-26606": { + "cmt_msg": "binder: signal epoll threads of self-work" + }, + "CVE-2023-52589": { + "cmt_msg": "media: rkisp1: Fix IRQ disable race issue" + }, + "CVE-2023-52588": { + "cmt_msg": "f2fs: fix to tag gcing flag on page during block migration" + }, + "CVE-2024-26607": { + "cmt_msg": "drm/bridge: sii902x: Fix probing race issue" + }, "CVE-2022-34494": { "cmt_msg": "rpmsg: virtio: Fix possible double free in rpmsg_virtio_add_ctrl_dev()" }, "CVE-2022-34495": { "cmt_msg": "rpmsg: virtio: Fix possible double free in rpmsg_probe()" }, + "CVE-2024-26727": { + "cmt_msg": "btrfs: do not ASSERT() if the newly created subvolume already got read" + }, "CVE-2023-52340": { "cmt_msg": "ipv6: remove max_size check inline with ipv4" }, + "CVE-2024-26765": { + "cmt_msg": "LoongArch: Disable IRQ before init_fn() for nonboot CPUs" + }, + "CVE-2021-47099": { + "cmt_msg": "veth: ensure skb entering GRO are not cloned." + }, + "CVE-2021-47097": { + "cmt_msg": "Input: elantech - fix stack out of bound access in elantech_change_report_id()" + }, + "CVE-2021-47095": { + "cmt_msg": "ipmi: ssif: initialize ssif_info->client early" + }, + "CVE-2021-47094": { + "cmt_msg": "KVM: x86/mmu: Don't advance iterator after restart due to yielding" + }, + "CVE-2021-47093": { + "cmt_msg": "platform/x86: intel_pmc_core: fix memleak on registration failure" + }, + "CVE-2021-47091": { + "cmt_msg": "mac80211: fix locking in ieee80211_start_ap error path" + }, + "CVE-2021-47090": { + "cmt_msg": "mm/hwpoison: clear MF_COUNT_INCREASED before retrying get_any_page()" + }, + "CVE-2023-52475": { + "cmt_msg": "Input: powermate - fix use-after-free in powermate_config_complete" + }, "CVE-2023-6560": { "cmt_msg": "io_uring: don't allow discontig pages for IORING_SETUP_NO_MMAP" }, @@ -123744,18 +159129,45 @@ "CVE-2023-1611": { "cmt_msg": "btrfs: fix race between quota disable and quota assign ioctls" }, + "CVE-2024-26763": { + "cmt_msg": "dm-crypt: don't modify the data when using authenticated encryption" + }, "CVE-2022-26490": { "cmt_msg": "nfc: st21nfca: Fix potential buffer overflows in EVT_TRANSACTION" }, "CVE-2023-6817": { "cmt_msg": "netfilter: nft_set_pipapo: skip inactive elements during set walk" }, + "CVE-2024-26795": { + "cmt_msg": "riscv: Sparse-Memory/vmemmap out-of-bounds fix" + }, + "CVE-2024-26797": { + "cmt_msg": "drm/amd/display: Prevent potential buffer overflow in map_hw_resources" + }, + "CVE-2024-26790": { + "cmt_msg": "dmaengine: fsl-qdma: fix SoC may hang on 16 byte unaligned read" + }, "CVE-2022-1836": { "cmt_msg": "floppy: disable FDRAWCMD by default" }, + "CVE-2024-26793": { + "cmt_msg": "gtp: fix use-after-free and null-ptr-deref in gtp_newlink()" + }, + "CVE-2023-52530": { + "cmt_msg": "wifi: mac80211: fix potential key use-after-free" + }, + "CVE-2023-52531": { + "cmt_msg": "wifi: iwlwifi: mvm: Fix a memory corruption issue" + }, + "CVE-2023-52532": { + "cmt_msg": "net: mana: Fix TX CQE error handling" + }, "CVE-2022-30594": { "cmt_msg": "ptrace: Check PTRACE_O_SUSPEND_SECCOMP permission on PTRACE_SEIZE" }, + "CVE-2024-26798": { + "cmt_msg": "fbcon: always restore the old font data in fbcon_do_set_font()" + }, "CVE-2022-4662": { "cmt_msg": "USB: core: Prevent nested device-reset calls" }, @@ -123774,6 +159186,12 @@ "CVE-2023-46862": { "cmt_msg": "io_uring/fdinfo: lock SQ thread while retrieving thread cpu/pid" }, + "CVE-2024-26677": { + "cmt_msg": "rxrpc: Fix delayed ACKs to not set the reference serial number" + }, + "CVE-2024-26676": { + "cmt_msg": "af_unix: Call kfree_skb() for dead unix_(sk)->oob_skb in GC." + }, "CVE-2022-0168": { "cmt_msg": "cifs: fix NULL ptr dereference in smb2_ioctl_query_info()" }, @@ -123783,9 +159201,18 @@ "CVE-2020-26557": { "cmt_msg": "" }, + "CVE-2024-26671": { + "cmt_msg": "blk-mq: fix IO hang from sbitmap wakeup race" + }, "CVE-2023-34324": { "cmt_msg": "xen/events: replace evtchn_rwlock with RCU" }, + "CVE-2024-26776": { + "cmt_msg": "spi: hisi-sfc-v3xx: Return IRQ_NONE if no interrupts were detected" + }, + "CVE-2024-26777": { + "cmt_msg": "fbdev: sis: Error out if pixclock equals zero" + }, "CVE-2019-20794": { "cmt_msg": "" }, @@ -123795,21 +159222,30 @@ "CVE-2023-3397": { "cmt_msg": "" }, + "CVE-2024-26773": { + "cmt_msg": "ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found()" + }, + "CVE-2024-26679": { + "cmt_msg": "inet: read sk->sk_family once in inet_recv_error()" + }, + "CVE-2024-26771": { + "cmt_msg": "dmaengine: ti: edma: Add some null pointer checks to the edma_probe" + }, "CVE-2021-3542": { "cmt_msg": "" }, "CVE-2023-52458": { "cmt_msg": "block: add check that partition length needs to be aligned with block size" }, - "CVE-2023-52457": { - "cmt_msg": "serial: 8250: omap: Don't skip resource freeing if pm_runtime_resume_and_get() failed" - }, "CVE-2018-1121": { "cmt_msg": "" }, "CVE-2023-52454": { "cmt_msg": "nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length" }, + "CVE-2023-28746": { + "cmt_msg": "x86/mmio: Disable KVM mitigation when X86_FEATURE_CLEAR_CPU_BUF is set" + }, "CVE-2023-52452": { "cmt_msg": "bpf: Fix accesses to uninit stack slots" }, @@ -123825,6 +159261,9 @@ "CVE-2024-1086": { "cmt_msg": "netfilter: nf_tables: reject QUEUE/DROP verdict parameters" }, + "CVE-2024-26735": { + "cmt_msg": "ipv6: sr: fix possible use-after-free and null-ptr-deref" + }, "CVE-2022-3344": { "cmt_msg": "KVM: x86: nSVM: harden svm_free_nested against freeing vmcb02 while still in use" }, @@ -123846,9 +159285,21 @@ "CVE-2023-23002": { "cmt_msg": "Bluetooth: hci_qca: Fix NULL vs IS_ERR_OR_NULL check in qca_serdev_probe" }, + "CVE-2024-26702": { + "cmt_msg": "iio: magnetometer: rm3100: add boundary check for the value read from RM3100_REG_TMRC" + }, "CVE-2023-6240": { "cmt_msg": "" }, + "CVE-2024-26700": { + "cmt_msg": "drm/amd/display: Fix MST Null Ptr for RV" + }, + "CVE-2024-26707": { + "cmt_msg": "net: hsr: remove WARN_ONCE() in send_hsr_supervision_frame()" + }, + "CVE-2024-26706": { + "cmt_msg": "parisc: Fix random data corruption from exception handler" + }, "CVE-2023-23559": { "cmt_msg": "wifi: rndis_wlan: Prevent buffer overflow in rndis_query_oid" }, @@ -123888,6 +159339,30 @@ "CVE-2022-1012": { "cmt_msg": "secure_seq: use the 64 bits of the siphash for port offset calculation" }, + "CVE-2023-52620": { + "cmt_msg": "netfilter: nf_tables: disallow timeout for anonymous sets" + }, + "CVE-2023-52621": { + "cmt_msg": "bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers" + }, + "CVE-2023-52622": { + "cmt_msg": "ext4: avoid online resizing failures due to oversized flex bg" + }, + "CVE-2023-52623": { + "cmt_msg": "SUNRPC: Fix a suspicious RCU usage warning" + }, + "CVE-2023-52619": { + "cmt_msg": "pstore/ram: Fix crash when setting number of cpus to an odd number" + }, + "CVE-2023-52625": { + "cmt_msg": "drm/amd/display: Refactor DMCUB enter/exit idle interface" + }, + "CVE-2023-52627": { + "cmt_msg": "iio: adc: ad7091r: Allow users to configure device events" + }, + "CVE-2023-52628": { + "cmt_msg": "netfilter: nftables: exthdr: fix 4-byte stack OOB write" + }, "CVE-2021-26934": { "cmt_msg": "" }, @@ -123924,6 +159399,9 @@ "CVE-2022-3526": { "cmt_msg": "macvlan: Fix leaking skb in source mode with nodst option" }, + "CVE-2024-26601": { + "cmt_msg": "ext4: regenerate buddy after block freeing failed if under fc replay" + }, "CVE-2022-3524": { "cmt_msg": "tcp/udp: Fix memory leak in ipv6_renew_options()." }, @@ -123936,9 +159414,30 @@ "CVE-2022-3521": { "cmt_msg": "kcm: avoid potential race in kcm_tx_work" }, + "CVE-2022-41218": { + "cmt_msg": "media: dvb-core: Fix UAF due to refcount races at releasing" + }, + "CVE-2021-47101": { + "cmt_msg": "asix: fix uninit-value in asix_mdio_read()" + }, + "CVE-2021-47100": { + "cmt_msg": "ipmi: Fix UAF when uninstall ipmi_si and ipmi_msghandler module" + }, + "CVE-2021-47103": { + "cmt_msg": "inet: fully convert sk->sk_rx_dst to RCU rules" + }, + "CVE-2021-47105": { + "cmt_msg": "ice: xsk: return xsk buffers back to pool when cleaning the ring" + }, + "CVE-2021-47107": { + "cmt_msg": "NFSD: Fix READDIR buffer overflow" + }, "CVE-2022-2196": { "cmt_msg": "KVM: VMX: Execute IBPB on emulated VM-exit when guest has IBRS" }, + "CVE-2023-52513": { + "cmt_msg": "RDMA/siw: Fix connection failure handling" + }, "CVE-2022-0330": { "cmt_msg": "drm/i915: Flush TLBs before releasing backing store" }, @@ -124020,18 +159519,33 @@ "CVE-2023-3090": { "cmt_msg": "ipvlan:Fix out-of-bounds caused by unclear skb->cb" }, + "CVE-2023-52578": { + "cmt_msg": "net: bridge: use DEV_STATS_INC()" + }, "CVE-2022-4744": { "cmt_msg": "tun: avoid double free in tun_free_netdev" }, "CVE-2023-1095": { "cmt_msg": "netfilter: nf_tables: fix null deref due to zeroed list head" }, + "CVE-2023-52574": { + "cmt_msg": "team: fix null-ptr-deref when team device type is changed" + }, "CVE-2022-3239": { "cmt_msg": "media: em28xx: initialize refcount before kref_get" }, "CVE-2022-4543": { "cmt_msg": "" }, + "CVE-2023-52571": { + "cmt_msg": "power: supply: rk817: Fix node refcount leak" + }, + "CVE-2023-52572": { + "cmt_msg": "cifs: Fix UAF in cifs_demultiplex_thread()" + }, + "CVE-2023-52573": { + "cmt_msg": "net: rds: Fix possible NULL-pointer dereference" + }, "CVE-2023-4921": { "cmt_msg": "net: sched: sch_qfq: Fix UAF in qfq_dequeue()" }, @@ -124047,24 +159561,45 @@ "CVE-2023-4881": { "cmt_msg": "netfilter: nftables: exthdr: fix 4-byte stack OOB write" }, + "CVE-2024-26704": { + "cmt_msg": "ext4: fix double-free of blocks due to wrong extents moved_len" + }, "CVE-2013-7445": { "cmt_msg": "" }, "CVE-2023-31248": { "cmt_msg": "netfilter: nf_tables: do not ignore genmask when looking up chain by id" }, + "CVE-2024-26736": { + "cmt_msg": "afs: Increase buffer size in afs_update_volume_status()" + }, "CVE-2024-26593": { "cmt_msg": "i2c: i801: Fix block process call transactions" }, + "CVE-2024-26738": { + "cmt_msg": "powerpc/pseries/iommu: DLPAR add doesn't completely initialize pci_controller" + }, + "CVE-2024-26739": { + "cmt_msg": "net/sched: act_mirred: don't override retval if we already lost the skb" + }, "CVE-2022-38096": { "cmt_msg": "" }, + "CVE-2024-26804": { + "cmt_msg": "net: ip_tunnel: prevent perpetual headroom growth" + }, + "CVE-2024-26805": { + "cmt_msg": "netlink: Fix kernel-infoleak-after-free in __skb_datagram_iter" + }, "CVE-2022-1158": { "cmt_msg": "KVM: x86/mmu: do compare-and-exchange of gPTE via the user address" }, "CVE-2022-3303": { "cmt_msg": "ALSA: pcm: oss: Fix race at SNDCTL_DSP_SYNC" }, + "CVE-2024-26769": { + "cmt_msg": "nvmet-fc: avoid deadlock on delete association path" + }, "CVE-2022-45869": { "cmt_msg": "KVM: x86/mmu: Fix race condition in direct_page_fault" }, @@ -124098,18 +159633,45 @@ "CVE-2022-28388": { "cmt_msg": "can: usb_8dev: usb_8dev_start_xmit(): fix double dev_kfree_skb() in error path" }, + "CVE-2011-4917": { + "cmt_msg": "" + }, + "CVE-2024-26803": { + "cmt_msg": "net: veth: clear GRO when clearing XDP even when down" + }, "CVE-2023-52444": { "cmt_msg": "f2fs: fix to avoid dirent corruption" }, + "CVE-2024-26768": { + "cmt_msg": "LoongArch: Change acpi_core_pic[NR_CPUS] to acpi_core_pic[MAX_CORE_PIC]" + }, "CVE-2022-4129": { "cmt_msg": "l2tp: Serialize access to sk_user_data with sk_callback_lock" }, + "CVE-2024-26648": { + "cmt_msg": "drm/amd/display: Fix variable deferencing before NULL check in edp_setup_replay()" + }, "CVE-2022-0500": { "cmt_msg": "bpf: Introduce MEM_RDONLY flag" }, + "CVE-2024-26647": { + "cmt_msg": "drm/amd/display: Fix late derefrence 'dsc' check in 'link_set_dsc_pps_packet()'" + }, + "CVE-2024-26644": { + "cmt_msg": "btrfs: don't abort filesystem when attempting to snapshot deleted subvolume" + }, + "CVE-2024-26645": { + "cmt_msg": "tracing: Ensure visibility when inserting an element into tracing_map" + }, "CVE-2023-33203": { "cmt_msg": "net: qcom/emac: Fix use after free bug in emac_remove due to race condition" }, + "CVE-2024-26640": { + "cmt_msg": "tcp: add sanity checks to rx zerocopy" + }, + "CVE-2024-26641": { + "cmt_msg": "ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv()" + }, "CVE-2021-4001": { "cmt_msg": "bpf: Fix toctou on read-only map's constant scalar tracking" }, @@ -124137,6 +159699,9 @@ "CVE-2024-0639": { "cmt_msg": "sctp: fix potential deadlock on &net->sctp.addr_wq_lock" }, + "CVE-2023-52467": { + "cmt_msg": "mfd: syscon: Fix null pointer dereference in of_syscon_register()" + }, "CVE-2023-52464": { "cmt_msg": "EDAC/thunderx: Fix possible out-of-bounds string access" }, @@ -124158,6 +159723,9 @@ "CVE-2024-23848": { "cmt_msg": "" }, + "CVE-2024-26633": { + "cmt_msg": "ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim()" + }, "CVE-2023-6622": { "cmt_msg": "netfilter: nf_tables: bail out on mismatching dynset and set expressions" }, @@ -124167,12 +159735,24 @@ "CVE-2023-4459": { "cmt_msg": "net: vmxnet3: fix possible NULL pointer dereference in vmxnet3_rq_cleanup()" }, + "CVE-2024-26625": { + "cmt_msg": "llc: call sock_orphan() at release time" + }, + "CVE-2024-26635": { + "cmt_msg": "llc: Drop support for ETH_P_TR_802_2." + }, "CVE-2022-26878": { "cmt_msg": "" }, + "CVE-2023-52639": { + "cmt_msg": "KVM: s390: vsie: fix race during shadow creation" + }, "CVE-2022-2153": { "cmt_msg": "KVM: x86: Avoid theoretical NULL pointer dereference in kvm_irq_delivery_to_apic_fast()" }, + "CVE-2024-2193": { + "cmt_msg": "" + }, "CVE-2022-20566": { "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free caused by l2cap_chan_put" }, @@ -124182,27 +159762,45 @@ "CVE-2018-12931": { "cmt_msg": "" }, + "CVE-2023-52637": { + "cmt_msg": "can: j1939: Fix UAF in j1939_sk_match_filter during setsockopt(SO_J1939_FILTER)" + }, "CVE-2023-1990": { "cmt_msg": "nfc: st-nci: Fix use after free bug in ndlc_remove due to race condition" }, + "CVE-2024-26684": { + "cmt_msg": "net: stmmac: xgmac: fix handling of DPP safety error for DMA channels" + }, "CVE-2022-0185": { "cmt_msg": "vfs: fs_context: fix up param length parsing in legacy_parse_param" }, "CVE-2022-48619": { "cmt_msg": "Input: add bounds checking to input_set_capability()" }, + "CVE-2023-52634": { + "cmt_msg": "drm/amd/display: Fix disable_otg_wa logic" + }, "CVE-2022-22942": { "cmt_msg": "drm/vmwgfx: Fix stale file descriptors on failed usercopy" }, "CVE-2022-25375": { "cmt_msg": "usb: gadget: rndis: check size of RNDIS_MSG_SET command" }, + "CVE-2019-25162": { + "cmt_msg": "i2c: Fix a potential use after free" + }, "CVE-2024-24861": { - "cmt_msg": "" + "cmt_msg": "media: xc4000: Fix atomicity violation in xc4000_get_frequency" + }, + "CVE-2024-26627": { + "cmt_msg": "scsi: core: Move scsi_host_busy() out of host lock for waking up EH handler" }, "CVE-2022-3903": { "cmt_msg": "media: mceusb: Use new usb_control_msg_*() routines" }, + "CVE-2024-26642": { + "cmt_msg": "netfilter: nf_tables: disallow anonymous set with timeout flag" + }, "CVE-2022-3577": { "cmt_msg": "HID: bigben: fix slab-out-of-bounds Write in bigben_probe" }, @@ -124224,12 +159822,24 @@ "CVE-2022-47518": { "cmt_msg": "wifi: wilc1000: validate number of channels" }, + "CVE-2023-52595": { + "cmt_msg": "wifi: rt2x00: restart beacon queue when hardware reset" + }, "CVE-2022-0847": { "cmt_msg": "lib/iov_iter: initialize \"flags\" in new pipe_buffer" }, "CVE-2021-41073": { "cmt_msg": "io_uring: ensure symmetry in handling iter types in loop_rw_iter()" }, + "CVE-2024-26782": { + "cmt_msg": "mptcp: fix double-free on socket dismantle" + }, + "CVE-2024-26675": { + "cmt_msg": "ppp_async: limit MRU to 64K" + }, + "CVE-2024-26622": { + "cmt_msg": "tomoyo: fix UAF write bug in tomoyo_write_control()" + }, "CVE-2023-28410": { "cmt_msg": "drm/i915/gem: add missing boundary check in vm_access" }, @@ -124239,23 +159849,44 @@ "CVE-2023-4147": { "cmt_msg": "netfilter: nf_tables: disallow rule addition to bound chain via NFTA_RULE_CHAIN_ID" }, + "CVE-2024-26718": { + "cmt_msg": "dm-crypt, dm-verity: disable tasklets" + }, "CVE-2023-0615": { "cmt_msg": "media: vivid: dev->bitmap_cap wasn't freed in all cases" }, + "CVE-2024-26672": { + "cmt_msg": "drm/amdgpu: Fix variable 'mca_funcs' dereferenced before NULL check in 'amdgpu_mca_smu_get_mca_entry()'" + }, + "CVE-2023-52527": { + "cmt_msg": "ipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data()" + }, "CVE-2023-3006": { "cmt_msg": "arm64: Add AMPERE1 to the Spectre-BHB affected list" }, + "CVE-2023-52523": { + "cmt_msg": "bpf, sockmap: Reject sk_msg egress redirects to non-TCP sockets" + }, + "CVE-2023-52522": { + "cmt_msg": "net: fix possible store tearing in neigh_periodic_work()" + }, "CVE-2022-3586": { "cmt_msg": "sch_sfb: Don't assume the skb is still around after enqueueing to child" }, "CVE-2024-0641": { "cmt_msg": "tipc: fix a potential deadlock on &tx->lock" }, + "CVE-2024-26636": { + "cmt_msg": "llc: make llc_ui_sendmsg() more robust against bonding changes" + }, "CVE-2022-43945": { "cmt_msg": "NFSD: Protect against send buffer overflow in NFSv2 READDIR" }, - "CVE-2024-0646": { - "cmt_msg": "net: tls, update curr on splice as well" + "CVE-2023-52528": { + "cmt_msg": "net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg" + }, + "CVE-2024-26623": { + "cmt_msg": "pds_core: Prevent race issues involving the adminq" }, "CVE-2020-27820": { "cmt_msg": "drm/nouveau: use drm_dev_unplug() during device removal" @@ -124263,24 +159894,39 @@ "CVE-2023-1872": { "cmt_msg": "io_uring: propagate issue_flags state down to file assignment" }, + "CVE-2024-25744": { + "cmt_msg": "x86/coco: Disable 32-bit emulation by default on TDX and SEV" + }, "CVE-2023-39194": { "cmt_msg": "net: xfrm: Fix xfrm_address_filter OOB read" }, "CVE-2023-39197": { "cmt_msg": "netfilter: conntrack: dccp: copy entire header to stack buffer, not just basic one" }, + "CVE-2023-52599": { + "cmt_msg": "jfs: fix array-index-out-of-bounds in diNewExt" + }, "CVE-2023-4622": { "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES" }, + "CVE-2024-26774": { + "cmt_msg": "ext4: avoid dividing by 0 in mb_update_avg_fragment_size() when block bitmap corrupt" + }, "CVE-2023-39193": { "cmt_msg": "netfilter: xt_sctp: validate the flag_info count" }, "CVE-2023-1079": { "cmt_msg": "HID: asus: use spinlock to safely schedule workers" }, + "CVE-2024-26602": { + "cmt_msg": "sched/membarrier: reduce the ability to hammer on sys_membarrier" + }, "CVE-2023-6610": { "cmt_msg": "smb: client: fix potential OOB in smb2_dump_detail()" }, + "CVE-2024-26600": { + "cmt_msg": "phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP" + }, "CVE-2023-3390": { "cmt_msg": "netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE" }, @@ -124293,6 +159939,15 @@ "CVE-2021-33061": { "cmt_msg": "ixgbe: add improvement for MDD response functionality" }, + "CVE-2024-26764": { + "cmt_msg": "fs/aio: Restrict kiocb_set_cancel_fn() to I/O submitted via libaio" + }, + "CVE-2024-26767": { + "cmt_msg": "drm/amd/display: fixed integer types and null check locations" + }, + "CVE-2024-26766": { + "cmt_msg": "IB/hfi1: Fix sdma.h tx->num_descs off-by-one error" + }, "CVE-2024-26589": { "cmt_msg": "bpf: Reject variable offset alu on PTR_TO_FLOW_KEYS" }, @@ -124305,6 +159960,9 @@ "CVE-2021-3864": { "cmt_msg": "" }, + "CVE-2024-26770": { + "cmt_msg": "HID: nvidia-shield: Add missing null pointer checks to LED initialization" + }, "CVE-2022-1652": { "cmt_msg": "floppy: use a statically allocated error counter" }, @@ -124342,7 +160000,7 @@ "cmt_msg": "" }, "CVE-2023-6270": { - "cmt_msg": "" + "cmt_msg": "aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts" }, "CVE-2023-2156": { "cmt_msg": "net: rpl: fix rpl header size calculation" @@ -124372,7 +160030,10 @@ "cmt_msg": "tipc: improve size validations for received domain records" }, "CVE-2023-6356": { - "cmt_msg": "" + "cmt_msg": "nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length" + }, + "CVE-2024-26744": { + "cmt_msg": "RDMA/srpt: Support specifying the srpt_service_guid parameter" }, "CVE-2021-4135": { "cmt_msg": "netdevsim: Zero-initialize memory for new map's value in function nsim_bpf_map_alloc" @@ -124386,6 +160047,21 @@ "CVE-2019-15239": { "cmt_msg": "unknown" }, + "CVE-2023-52635": { + "cmt_msg": "PM / devfreq: Synchronize devfreq_monitor_[start/stop]" + }, + "CVE-2023-52469": { + "cmt_msg": "drivers/amd/pm: fix a use-after-free in kv_parse_power_table" + }, + "CVE-2023-52633": { + "cmt_msg": "um: time-travel: fix time corruption" + }, + "CVE-2023-52632": { + "cmt_msg": "drm/amdkfd: Fix lock dependency warning with srcu" + }, + "CVE-2023-52630": { + "cmt_msg": "blk-iocost: Fix an UBSAN shift-out-of-bounds warning" + }, "CVE-2022-21505": { "cmt_msg": "lockdown: Fix kexec lockdown bypass with ima policy" }, @@ -124419,6 +160095,12 @@ "CVE-2022-3535": { "cmt_msg": "net: mvpp2: fix mvpp2 debugfs leak" }, + "CVE-2024-26808": { + "cmt_msg": "netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain" + }, + "CVE-2024-26646": { + "cmt_msg": "thermal: intel: hfi: Add syscore callbacks for system-wide PM" + }, "CVE-2021-22600": { "cmt_msg": "net/packet: rx_owner_map depends on pg_vec" }, @@ -124437,6 +160119,12 @@ "CVE-2023-28327": { "cmt_msg": "af_unix: Get user_ns from in_skb in unix_diag_get_exact()." }, + "CVE-2023-52638": { + "cmt_msg": "can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock" + }, + "CVE-2024-26631": { + "cmt_msg": "ipv6: mcast: fix data-race in ipv6_mc_down / mld_ifc_work" + }, "CVE-2017-13693": { "cmt_msg": "" }, @@ -124470,15 +160158,27 @@ "CVE-2021-3760": { "cmt_msg": "nfc: nci: fix the UAF of rf_conn_info object" }, + "CVE-2022-48627": { + "cmt_msg": "vt: fix memory overlapping when deleting chars in the buffer" + }, "CVE-2022-4382": { "cmt_msg": "USB: gadgetfs: Fix race between mounting and unmounting" }, + "CVE-2022-48628": { + "cmt_msg": "ceph: drop messages from MDS when unmounting" + }, + "CVE-2022-48629": { + "cmt_msg": "crypto: qcom-rng - ensure buffer for generate is completely filled" + }, "CVE-2024-24859": { "cmt_msg": "" }, "CVE-2024-24858": { "cmt_msg": "" }, + "CVE-2024-22099": { + "cmt_msg": "Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security" + }, "CVE-2024-24855": { "cmt_msg": "scsi: lpfc: Fix a possible data race in lpfc_unregister_fcf_rescan()" }, @@ -124488,20 +160188,44 @@ "CVE-2022-1508": { "cmt_msg": "io_uring: reexpand under-reexpanded iters" }, + "CVE-2024-26673": { + "cmt_msg": "netfilter: nft_ct: sanitize layer 3 and 4 protocol number in custom expectations" + }, "CVE-2022-3545": { "cmt_msg": "nfp: fix use-after-free in area_cache_get()" }, "CVE-2021-43056": { "cmt_msg": "KVM: PPC: Book3S HV: Make idle_kvm_start_guest() return 0 if it went to guest" }, + "CVE-2023-52569": { + "cmt_msg": "btrfs: remove BUG() after failure to insert delayed dir index item" + }, + "CVE-2023-52568": { + "cmt_msg": "x86/sgx: Resolves SECS reclaim vs. page fault for EAUG race" + }, "CVE-2022-3542": { "cmt_msg": "bnx2x: fix potential memory leak in bnx2x_tpa_stop()" }, + "CVE-2023-52563": { + "cmt_msg": "drm/meson: fix memory leak on ->hpd_notify callback" + }, + "CVE-2023-52561": { + "cmt_msg": "arm64: dts: qcom: sdm845-db845c: Mark cont splash memory region as reserved" + }, "CVE-2023-5197": { "cmt_msg": "netfilter: nf_tables: disallow rule removal from chain binding" }, - "CVE-2023-1838": { - "cmt_msg": "Fix double fget() in vhost_net_set_backend()" + "CVE-2023-52566": { + "cmt_msg": "nilfs2: fix potential use after free in nilfs_gccache_submit_read_data()" + }, + "CVE-2023-52565": { + "cmt_msg": "media: uvcvideo: Fix OOB read" + }, + "CVE-2021-46928": { + "cmt_msg": "parisc: Clear stale IIR value on instruction access rights trap" + }, + "CVE-2021-46929": { + "cmt_msg": "sctp: use call_rcu to free endpoint" }, "CVE-2023-1382": { "cmt_msg": "tipc: set con sock in tipc_conn_alloc" @@ -124509,14 +160233,29 @@ "CVE-2023-1380": { "cmt_msg": "wifi: brcmfmac: slab-out-of-bounds read in brcmf_get_assoc_ies()" }, + "CVE-2021-46923": { + "cmt_msg": "fs/mount_setattr: always cleanup mount_kattr" + }, + "CVE-2021-46924": { + "cmt_msg": "NFC: st21nfca: Fix memory leak in device probe and remove" + }, + "CVE-2021-46925": { + "cmt_msg": "net/smc: fix kernel panic caused by race of smc_sock" + }, + "CVE-2021-46926": { + "cmt_msg": "ALSA: hda: intel-sdw-acpi: harden detection of controller" + }, "CVE-2020-0347": { "cmt_msg": "" }, + "CVE-2024-26788": { + "cmt_msg": "dmaengine: fsl-qdma: init irq after reg initialization" + }, "CVE-2022-27223": { "cmt_msg": "USB: gadget: validate endpoint index for xilinx udc" }, - "CVE-2022-1353": { - "cmt_msg": "af_key: add __GFP_ZERO flag for compose_sadb_supported in function pfkey_register" + "CVE-2022-40982": { + "cmt_msg": "x86/speculation: Add Gather Data Sampling mitigation" }, "CVE-2019-12456": { "cmt_msg": "" @@ -124524,6 +160263,9 @@ "CVE-2023-20569": { "cmt_msg": "x86/bugs: Increase the x86 bugs vector size to two u32s" }, + "CVE-2024-26720": { + "cmt_msg": "mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again" + }, "CVE-2021-33655": { "cmt_msg": "fbcon: Disallow setting font bigger than screen size" }, @@ -124533,6 +160275,9 @@ "CVE-2022-41858": { "cmt_msg": "drivers: net: slip: fix NPD bug in sl_tx_timeout()" }, + "CVE-2024-26726": { + "cmt_msg": "btrfs: don't drop extent_map for free space inode on write error" + }, "CVE-2023-1206": { "cmt_msg": "tcp: Reduce chance of collisions in inet6_hashfn()." }, @@ -124569,11 +160314,23 @@ "CVE-2023-3355": { "cmt_msg": "drm/msm/gem: Add check for kmalloc" }, + "CVE-2023-52519": { + "cmt_msg": "HID: intel-ish-hid: ipc: Disable and reenable ACPI GPE bit" + }, + "CVE-2023-52516": { + "cmt_msg": "dma-debug: don't call __dma_entry_alloc_check_leak() under free_entries_lock" + }, + "CVE-2023-52517": { + "cmt_msg": "spi: sun6i: fix race between DMA RX transfer completion and RX FIFO drain" + }, + "CVE-2023-52515": { + "cmt_msg": "RDMA/srp: Do not call scsi_done() from srp_abort()" + }, "CVE-2019-15902": { "cmt_msg": "unknown" }, - "CVE-2024-25739": { - "cmt_msg": "" + "CVE-2023-52510": { + "cmt_msg": "ieee802154: ca8210: Fix a potential UAF in ca8210_probe" }, "CVE-2023-3358": { "cmt_msg": "HID: intel_ish-hid: Add check for ishtp_dma_tx_map" @@ -124585,7 +160342,7 @@ "cmt_msg": "" }, "CVE-2023-6536": { - "cmt_msg": "" + "cmt_msg": "nvmet-tcp: fix a crash in nvmet_req_complete()" }, "CVE-2023-1118": { "cmt_msg": "media: rc: Fix use-after-free bugs caused by ene_tx_irqsim()" @@ -124602,15 +160359,33 @@ "CVE-2024-1151": { "cmt_msg": "net: openvswitch: limit the number of recursions from action sets" }, + "CVE-2024-26659": { + "cmt_msg": "xhci: handle isoc Babble and Buffer Overrun events properly" + }, + "CVE-2024-26658": { + "cmt_msg": "bcachefs: grab s_umount only if snapshotting" + }, "CVE-2010-5321": { "cmt_msg": "" }, + "CVE-2024-26655": { + "cmt_msg": "Fix memory leak in posix_clock_open()" + }, + "CVE-2024-26654": { + "cmt_msg": "ALSA: sh: aica: reorder cleanup operations to avoid UAF bugs" + }, "CVE-2021-20320": { "cmt_msg": "s390/bpf: Fix optimizing out zero-extensions" }, "CVE-2021-20321": { "cmt_msg": "ovl: fix missing negative dentry check in ovl_rename()" }, + "CVE-2024-26651": { + "cmt_msg": "sr9800: Add check for usbnet_get_endpoints" + }, + "CVE-2024-26650": { + "cmt_msg": "platform/x86: p2sb: Allow p2sb_bar() calls during PCI device probe" + }, "CVE-2022-42896": { "cmt_msg": "Bluetooth: L2CAP: Fix accepting connection request for invalid SPSM" }, @@ -124629,9 +160404,21 @@ "CVE-2023-4569": { "cmt_msg": "netfilter: nf_tables: deactivate catchall elements in next generation" }, + "CVE-2023-52474": { + "cmt_msg": "IB/hfi1: Fix bugs with non-PAGE_SIZE-end multi-iovec user SDMA requests" + }, + "CVE-2023-52477": { + "cmt_msg": "usb: hub: Guard against accesses to uninitialized BOS descriptors" + }, + "CVE-2023-52476": { + "cmt_msg": "perf/x86/lbr: Filter vsyscall addresses" + }, "CVE-2023-22995": { "cmt_msg": "usb: dwc3: dwc3-qcom: Add missing platform_device_put() in dwc3_qcom_acpi_register_core" }, + "CVE-2023-52470": { + "cmt_msg": "drm/radeon: check the alloc_workqueue return value in radeon_crtc_init()" + }, "CVE-2024-21803": { "cmt_msg": "" }, @@ -124644,6 +160431,12 @@ "CVE-2023-4563": { "cmt_msg": "netfilter: nf_tables: don't skip expired elements during walk" }, + "CVE-2023-52479": { + "cmt_msg": "ksmbd: fix uaf in smb20_oplock_break_ack" + }, + "CVE-2023-52478": { + "cmt_msg": "HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect" + }, "CVE-2022-26365": { "cmt_msg": "xen/blkfront: fix leaking data in shared pages" }, @@ -124653,12 +160446,15 @@ "CVE-2023-3220": { "cmt_msg": "drm/msm/dpu: Add check for pstates" }, - "CVE-2024-22099": { - "cmt_msg": "" + "CVE-2023-4623": { + "cmt_msg": "net/sched: sch_hfsc: Ensure inner classes have fsc curve" }, "CVE-2023-30456": { "cmt_msg": "KVM: nVMX: add missing consistency checks for CR0 and CR4" }, + "CVE-2022-48626": { + "cmt_msg": "moxart: fix potential use-after-free on remove path" + }, "CVE-2022-23041": { "cmt_msg": "xen/9p: use alloc/free_pages_exact()" }, @@ -124695,6 +160491,12 @@ "CVE-2024-25741": { "cmt_msg": "" }, + "CVE-2024-26778": { + "cmt_msg": "fbdev: savage: Error out if pixclock equals zero" + }, + "CVE-2024-26809": { + "cmt_msg": "netfilter: nft_set_pipapo: release elements in clone only from destroy path" + }, "CVE-2022-26966": { "cmt_msg": "sr9700: sanity check for packet length" }, @@ -124704,17 +160506,56 @@ "CVE-2023-1989": { "cmt_msg": "Bluetooth: btsdio: fix use after free bug in btsdio_remove due to unfinished work" }, - "CVE-2024-25744": { - "cmt_msg": "x86/coco: Disable 32-bit emulation by default on TDX and SEV" + "CVE-2024-26806": { + "cmt_msg": "spi: cadence-qspi: remove system-wide suspend helper calls from runtime PM hooks" + }, + "CVE-2024-26801": { + "cmt_msg": "Bluetooth: Avoid potential use-after-free in hci_error_reset" + }, + "CVE-2024-26802": { + "cmt_msg": "stmmac: Clear variable when destroying workqueue" + }, + "CVE-2023-52508": { + "cmt_msg": "nvme-fc: Prevent null pointer dereference in nvme_fc_io_getuuid()" + }, + "CVE-2023-52606": { + "cmt_msg": "powerpc/lib: Validate size for vector operations" + }, + "CVE-2023-52607": { + "cmt_msg": "powerpc/mm: Fix null-pointer dereference in pgtable_cache_add" + }, + "CVE-2023-52604": { + "cmt_msg": "FS:JFS:UBSAN:array-index-out-of-bounds in dbAdjTree" + }, + "CVE-2023-52602": { + "cmt_msg": "jfs: fix slab-out-of-bounds Read in dtSearch" + }, + "CVE-2023-52603": { + "cmt_msg": "UBSAN: array-index-out-of-bounds in dtSplitRoot" }, "CVE-2022-25265": { "cmt_msg": "" }, + "CVE-2023-52601": { + "cmt_msg": "jfs: fix array-index-out-of-bounds in dbAdjTree" + }, + "CVE-2024-26779": { + "cmt_msg": "wifi: mac80211: fix race condition on enabling fast-xmit" + }, + "CVE-2023-52600": { + "cmt_msg": "jfs: fix uaf in jfs_evict_inode" + }, + "CVE-2023-52608": { + "cmt_msg": "firmware: arm_scmi: Check mailbox/SMT channel for consistency" + }, + "CVE-2023-52609": { + "cmt_msg": "binder: fix race between mmput() and do_exit()" + }, "CVE-2022-21499": { "cmt_msg": "lockdown: also lock down previous kgdb use" }, "CVE-2024-23196": { - "cmt_msg": "" + "cmt_msg": "ALSA: hda: fix a possible null-pointer dereference due to data race in snd_hdac_regmap_sync()" }, "CVE-2023-4208": { "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free" @@ -124740,6 +160581,9 @@ "CVE-2023-0160": { "cmt_msg": "bpf, sockmap: fix deadlocks in the sockhash and sockmap" }, + "CVE-2023-52506": { + "cmt_msg": "LoongArch: Set all reserved memblocks on Node#0 at initialization" + }, "CVE-2022-2663": { "cmt_msg": "netfilter: nf_conntrack_irc: Fix forged IP logic" }, @@ -124776,6 +160620,9 @@ "CVE-2019-19378": { "cmt_msg": "" }, + "CVE-2023-52482": { + "cmt_msg": "x86/srso: Add SRSO mitigation for Hygon processors" + }, "CVE-2022-36879": { "cmt_msg": "xfrm: xfrm_policy: fix a possible double xfrm_pols_put() in xfrm_bundle_lookup()" }, @@ -124833,11 +160680,17 @@ "CVE-2022-1998": { "cmt_msg": "fanotify: Fix stale file descriptor in copy_event_to_user()" }, + "CVE-2023-52624": { + "cmt_msg": "drm/amd/display: Wake DMCUB before executing GPINT commands" + }, "CVE-2022-1852": { "cmt_msg": "KVM: x86: avoid calling x86 emulator without a decoded instruction" }, "CVE-2023-7042": { - "cmt_msg": "" + "cmt_msg": "wifi: ath10k: fix NULL pointer dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev()" + }, + "CVE-2024-26775": { + "cmt_msg": "aoe: avoid potential deadlock at set_capacity" }, "CVE-2021-43057": { "cmt_msg": "selinux,smack: fix subjective/objective credential use mixups" @@ -124851,8 +160704,11 @@ "CVE-2022-3595": { "cmt_msg": "cifs: fix double-fault crash during ntlmssp" }, + "CVE-2023-52559": { + "cmt_msg": "iommu/vt-d: Avoid memory allocation in iommu_suspend()" + }, "CVE-2023-47233": { - "cmt_msg": "" + "cmt_msg": "wifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach" }, "CVE-2024-23850": { "cmt_msg": "btrfs: do not ASSERT() if the newly created subvolume already got read" @@ -124860,15 +160716,42 @@ "CVE-2024-23851": { "cmt_msg": "dm: limit the number of targets and parameter size area" }, + "CVE-2023-52629": { + "cmt_msg": "sh: push-switch: Reorder cleanup operations to avoid use-after-free bug" + }, "CVE-2022-1462": { "cmt_msg": "tty: use new tty_insert_flip_string_and_push_buffer() in pty_write()" }, + "CVE-2024-26758": { + "cmt_msg": "md: Don't ignore suspended array in md_check_recovery()" + }, + "CVE-2024-26610": { + "cmt_msg": "wifi: iwlwifi: fix a memory corruption" + }, "CVE-2023-6606": { "cmt_msg": "smb: client: fix OOB in smbCalcSize()" }, + "CVE-2024-26614": { + "cmt_msg": "tcp: make sure init the accept_queue's spinlocks once" + }, "CVE-2022-1729": { "cmt_msg": "perf: Fix sys_perf_event_open() race against self" }, + "CVE-2024-26751": { + "cmt_msg": "ARM: ep93xx: Add terminator to gpiod_lookup_table" + }, + "CVE-2024-26752": { + "cmt_msg": "l2tp: pass correct message length to ip6_append_data" + }, + "CVE-2024-26754": { + "cmt_msg": "gtp: fix use-after-free and null-ptr-deref in gtp_genl_dump_pdp()" + }, + "CVE-2024-26756": { + "cmt_msg": "md: Don't register sync_thread for reshape directly" + }, + "CVE-2024-26757": { + "cmt_msg": "md: Don't ignore read-only array in md_check_recovery()" + }, "CVE-2023-52439": { "cmt_msg": "uio: Fix use-after-free in uio_open" }, @@ -124890,9 +160773,24 @@ "CVE-2022-2964": { "cmt_msg": "net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup" }, + "CVE-2024-26688": { + "cmt_msg": "fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super" + }, + "CVE-2024-23307": { + "cmt_msg": "md/raid5: fix atomicity violation in raid5_cache_count" + }, "CVE-2022-2961": { "cmt_msg": "" }, + "CVE-2024-26680": { + "cmt_msg": "net: atlantic: Fix DMA mapping for PTP hwts ring" + }, + "CVE-2024-26686": { + "cmt_msg": "fs/proc: do_task_stat: use sig->stats_lock to gather the threads/children stats" + }, + "CVE-2024-26687": { + "cmt_msg": "xen/events: close evtchn after mapping cleanup" + }, "CVE-2023-51779": { "cmt_msg": "Bluetooth: af_bluetooth: Fix Use-After-Free in bt_sock_recvmsg" }, @@ -124926,8 +160824,8 @@ "CVE-2023-0266": { "cmt_msg": "ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF" }, - "CVE-2023-4623": { - "cmt_msg": "net/sched: sch_hfsc: Ensure inner classes have fsc curve" + "CVE-2023-1838": { + "cmt_msg": "Fix double fget() in vhost_net_set_backend()" }, "CVE-2022-29156": { "cmt_msg": "RDMA/rtrs-clt: Fix possible double free in error case" @@ -124944,18 +160842,42 @@ "CVE-2021-4028": { "cmt_msg": "RDMA/cma: Do not change route.addr.src_addr.ss_family" }, + "CVE-2023-52498": { + "cmt_msg": "PM: sleep: Fix possible deadlocks in core system-wide PM code" + }, "CVE-2021-4023": { "cmt_msg": "io-wq: fix cancellation on create-worker failure" }, + "CVE-2023-52640": { + "cmt_msg": "fs/ntfs3: Fix oob in ntfs_listxattr" + }, + "CVE-2023-52641": { + "cmt_msg": "fs/ntfs3: Add NULL ptr dereference checking at the end of attr_allocate_frame()" + }, "CVE-2021-0399": { "cmt_msg": "" }, + "CVE-2023-52488": { + "cmt_msg": "serial: sc16is7xx: convert from _raw_ to _noinc_ regmap functions for FIFO" + }, + "CVE-2023-52489": { + "cmt_msg": "mm/sparsemem: fix race in accessing memory_section->usage" + }, "CVE-2023-42755": { "cmt_msg": "net/sched: Retire rsvp classifier" }, "CVE-2020-36516": { "cmt_msg": "ipv4: avoid using shared IP generator for connected sockets" }, + "CVE-2023-52486": { + "cmt_msg": "drm: Don't unref the same fb many times by mistake due to deadlock handling" + }, + "CVE-2024-26791": { + "cmt_msg": "btrfs: dev-replace: properly validate device names" + }, + "CVE-2023-52480": { + "cmt_msg": "ksmbd: fix race condition between session lookup and expire" + }, "CVE-2012-4542": { "cmt_msg": "" }, @@ -124977,6 +160899,9 @@ "CVE-2024-26598": { "cmt_msg": "KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache" }, + "CVE-2023-52492": { + "cmt_msg": "dmaengine: fix NULL pointer in channel unregistration function" + }, "CVE-2023-3609": { "cmt_msg": "net/sched: cls_u32: Fix reference counter leak leading to overflow" }, @@ -124989,9 +160914,27 @@ "CVE-2022-1972": { "cmt_msg": "netfilter: nf_tables: sanitize nft_set_desc_concat_parse()" }, + "CVE-2023-52491": { + "cmt_msg": "media: mtk-jpeg: Fix use after free bug due to error path handling in mtk_jpeg_dec_device_run" + }, + "CVE-2024-26772": { + "cmt_msg": "ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal()" + }, + "CVE-2021-47082": { + "cmt_msg": "tun: avoid double free in tun_free_netdev" + }, + "CVE-2021-47083": { + "cmt_msg": "pinctrl: mediatek: fix global-out-of-bounds issue" + }, + "CVE-2021-47086": { + "cmt_msg": "phonet/pep: refuse to enable an unbound pipe" + }, "CVE-2022-32981": { "cmt_msg": "powerpc/32: Fix overread/overwrite of thread_struct via ptrace" }, + "CVE-2021-47089": { + "cmt_msg": "kfence: fix memory leak when cat kfence objects" + }, "CVE-2022-3424": { "cmt_msg": "misc: sgi-gru: fix use-after-free error in gru_set_context_option, gru_fault and gru_handle_user_call_os" }, @@ -125001,6 +160944,9 @@ "CVE-2023-0394": { "cmt_msg": "ipv6: raw: Deduct extension header length in rawv6_push_pending_frames" }, + "CVE-2024-26615": { + "cmt_msg": "net/smc: fix illegal rmb_desc access in SMC-D connection dump" + }, "CVE-2022-36402": { "cmt_msg": "drm/vmwgfx: Fix shader stage validation" }, @@ -125037,6 +160983,9 @@ "CVE-2021-3714": { "cmt_msg": "" }, + "CVE-2024-26733": { + "cmt_msg": "arp: Prevent overflow in arp_req_get()." + }, "CVE-2021-3896": { "cmt_msg": "isdn: cpai: check ctr->cnr to avoid array index out of bound" }, @@ -125082,9 +161031,27 @@ "CVE-2022-33744": { "cmt_msg": "xen/arm: Fix race in RB-tree based P2M accounting" }, + "CVE-2023-52596": { + "cmt_msg": "sysctl: Fix out of bounds access for empty sysctl registers" + }, + "CVE-2023-52597": { + "cmt_msg": "KVM: s390: fix setting of fpc register" + }, + "CVE-2023-52594": { + "cmt_msg": "wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus()" + }, "CVE-2023-52443": { "cmt_msg": "apparmor: avoid crash when parsed profile name is empty" }, + "CVE-2023-52593": { + "cmt_msg": "wifi: wfx: fix possible NULL pointer dereference in wfx_set_mfp_ap()" + }, + "CVE-2023-52590": { + "cmt_msg": "ocfs2: Avoid touching renamed directory if parent does not change" + }, + "CVE-2023-52591": { + "cmt_msg": "reiserfs: Avoid touching renamed directory if parent does not change" + }, "CVE-2022-1280": { "cmt_msg": "drm: avoid circular locks in drm_mode_getconnector" }, @@ -125094,11 +161061,26 @@ "CVE-2023-52445": { "cmt_msg": "media: pvrusb2: fix use after free on context disconnection" }, - "CVE-2022-41218": { - "cmt_msg": "media: dvb-core: Fix UAF due to refcount races at releasing" + "CVE-2021-46936": { + "cmt_msg": "net: fix use-after-free in tw_timer_handler" }, - "CVE-2011-4917": { - "cmt_msg": "" + "CVE-2021-46935": { + "cmt_msg": "binder: fix async_free_space accounting for empty parcels" + }, + "CVE-2021-46934": { + "cmt_msg": "i2c: validate user data in compat ioctl" + }, + "CVE-2021-46933": { + "cmt_msg": "usb: gadget: f_fs: Clear ffs_eventfd in ffs_data_clear." + }, + "CVE-2021-46932": { + "cmt_msg": "Input: appletouch - initialize work before device registration" + }, + "CVE-2021-46931": { + "cmt_msg": "net/mlx5e: Wrap the tx reporter dump callback to extract the sq" + }, + "CVE-2021-46930": { + "cmt_msg": "usb: mtu3: fix list_head check warning" }, "CVE-2022-36946": { "cmt_msg": "netfilter: nf_queue: do not allow packet truncation below transport header offset" @@ -125110,7 +161092,7 @@ "cmt_msg": "x86/speculation/mmio: Enable CPU Fill buffer clearing on idle" }, "CVE-2024-0841": { - "cmt_msg": "" + "cmt_msg": "fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super" }, "CVE-2023-52449": { "cmt_msg": "mtd: Fix gluebi NULL pointer dereference caused by ftl notifier" @@ -125124,12 +161106,15 @@ "CVE-2022-41848": { "cmt_msg": "" }, - "CVE-2022-40982": { - "cmt_msg": "x86/speculation: Add Gather Data Sampling mitigation" + "CVE-2022-1353": { + "cmt_msg": "af_key: add __GFP_ZERO flag for compose_sadb_supported in function pfkey_register" }, "CVE-2022-28356": { "cmt_msg": "llc: fix netdevice reference leaks in llc_ui_bind()" }, + "CVE-2021-47106": { + "cmt_msg": "netfilter: nf_tables: fix use-after-free in nft_set_catchall_destroy()" + }, "CVE-2020-16119": { "cmt_msg": "dccp: don't duplicate ccid when cloning dccp sock" }, @@ -125148,6 +161133,9 @@ "CVE-2021-39800": { "cmt_msg": "" }, + "CVE-2024-26784": { + "cmt_msg": "pmdomain: arm: Fix NULL dereference on scmi_perf_domain removal" + }, "CVE-2022-1195": { "cmt_msg": "hamradio: improve the incomplete fix to avoid NPD" }, @@ -125166,15 +161154,36 @@ "CVE-2022-45886": { "cmt_msg": "media: dvb-core: Fix use-after-free due on race condition at dvb_net" }, + "CVE-2023-52509": { + "cmt_msg": "ravb: Fix use-after-free issue in ravb_tx_timeout_work()" + }, "CVE-2023-46343": { "cmt_msg": "nfc: nci: fix possible NULL pointer dereference in send_acknowledge()" }, "CVE-2021-4204": { "cmt_msg": "bpf: Generalize check_ctx_reg for reuse with other types" }, + "CVE-2023-52504": { + "cmt_msg": "x86/alternatives: Disable KASAN in apply_alternatives()" + }, + "CVE-2023-52507": { + "cmt_msg": "nfc: nci: assert requested protocol is valid" + }, "CVE-2023-2124": { "cmt_msg": "xfs: verify buffer contents when we skip log replay" }, + "CVE-2023-52501": { + "cmt_msg": "ring-buffer: Do not attempt to read past \"commit\"" + }, + "CVE-2023-52500": { + "cmt_msg": "scsi: pm80xx: Avoid leaking tags when processing OPC_INB_SET_CONTROLLER_CONFIG command" + }, + "CVE-2023-52503": { + "cmt_msg": "tee: amdtee: fix use-after-free vulnerability in amdtee_close_session" + }, + "CVE-2023-52502": { + "cmt_msg": "net: nfc: fix races in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn()" + }, "CVE-2023-1281": { "cmt_msg": "net/sched: tcindex: update imperfect hash filters respecting rcu" }, @@ -125199,6 +161208,12 @@ "CVE-2022-27672": { "cmt_msg": "x86/speculation: Identify processors vulnerable to SMT RSB predictions" }, + "CVE-2024-26668": { + "cmt_msg": "netfilter: nft_limit: reject configurations that cause integer overflow" + }, + "CVE-2024-26669": { + "cmt_msg": "net/sched: flower: Fix chain template offload" + }, "CVE-2020-25220": { "cmt_msg": "" }, @@ -125208,12 +161223,27 @@ "CVE-2022-0171": { "cmt_msg": "KVM: SEV: add cache flush to solve SEV cache incoherency issues" }, + "CVE-2024-26661": { + "cmt_msg": "drm/amd/display: Add NULL test for 'timing generator' in 'dcn21_set_pipe()'" + }, + "CVE-2024-26662": { + "cmt_msg": "drm/amd/display: Fix 'panel_cntl' could be null in 'dcn21_set_backlight_level()'" + }, "CVE-2023-26242": { "cmt_msg": "" }, + "CVE-2024-26664": { + "cmt_msg": "hwmon: (coretemp) Fix out-of-bounds memory access" + }, + "CVE-2024-26665": { + "cmt_msg": "tunnels: fix out of bounds access when building IPv6 PMTU error" + }, "CVE-2019-16089": { "cmt_msg": "" }, + "CVE-2024-26689": { + "cmt_msg": "ceph: prevent use-after-free in encode_cap_msg()" + }, "CVE-2022-1679": { "cmt_msg": "ath9k: fix use-after-free in ath9k_hif_usb_rx_cb" }, @@ -125253,11 +161283,29 @@ "CVE-2023-23039": { "cmt_msg": "" }, + "CVE-2024-26660": { + "cmt_msg": "drm/amd/display: Implement bounds check for stream encoder creation in DCN301" + }, + "CVE-2024-26719": { + "cmt_msg": "nouveau: offload fence uevents work to workqueue" + }, + "CVE-2024-26715": { + "cmt_msg": "usb: dwc3: gadget: Fix NULL pointer dereference in dwc3_gadget_suspend" + }, "CVE-2024-1312": { "cmt_msg": "mm: lock_vma_under_rcu() must check vma->anon_vma under vma lock" }, + "CVE-2024-26717": { + "cmt_msg": "HID: i2c-hid-of: fix NULL-deref on failed power up" + }, "CVE-2023-3338": { "cmt_msg": "Remove DECnet support from kernel" + }, + "CVE-2024-26712": { + "cmt_msg": "powerpc/kasan: Fix addr error caused by page alignment" + }, + "CVE-2024-26713": { + "cmt_msg": "powerpc/pseries/iommu: Fix iommu initialisation during DLPAR add" } } }, @@ -125535,6 +161583,10 @@ "cmt_msg": "net: mac802154: Fix general protection fault", "cmt_id": "38731bbcd9f0bb8228baaed5feb4a1f76530e49c" }, + "CVE-2021-46904": { + "cmt_msg": "net: hso: fix null-ptr-deref during tty device unregistration", + "cmt_id": "dc195928d7e4ec7b5cfc6cd10dc4c8d87a7c72ac" + }, "CVE-2020-25672": { "cmt_msg": "nfc: fix memory leak in llcp_sock_connect()", "cmt_id": "568ac94df580b1a65837dc299e8758635e7b1423" @@ -125567,6 +161619,42 @@ "cmt_msg": "KVM: VMX: Don't use vcpu->run->internal.ndata as an array index", "cmt_id": "7f64753835a78c7d2cc2932a5808ef3b7fd4c050" }, + "CVE-2021-46919": { + "cmt_msg": "dmaengine: idxd: fix wq size store permission state", + "cmt_id": "4ecf25595273203010bc8318c4aee60ad64037ae" + }, + "CVE-2021-46908": { + "cmt_msg": "bpf: Use correct permission flag for mixed signed bounds arithmetic", + "cmt_id": "4f3ff11204eac0ee23acf64deecb3bad7b0db0c6" + }, + "CVE-2021-46909": { + "cmt_msg": "ARM: footbridge: fix PCI interrupt mapping", + "cmt_id": "1fc087fdb98d556b416c82ed6e3964a30885f47a" + }, + "CVE-2021-46915": { + "cmt_msg": "netfilter: nft_limit: avoid possible divide error in nft_limit_init", + "cmt_id": "dc1732baa9da5b68621586bf8636ebbc27dc62d2" + }, + "CVE-2021-46914": { + "cmt_msg": "ixgbe: fix unbalanced device enable/disable in suspend/resume", + "cmt_id": "be07581aacae7cd0a073afae8e8862032f794309" + }, + "CVE-2021-46917": { + "cmt_msg": "dmaengine: idxd: fix wq cleanup of WQCFG registers", + "cmt_id": "e5eb9757fe4c2392e069246ae78badc573af1833" + }, + "CVE-2021-46911": { + "cmt_msg": "ch_ktls: Fix kernel panic", + "cmt_id": "8d5a9dbd2116a852f8f0f91f6fbc42a0afe1091f" + }, + "CVE-2021-46912": { + "cmt_msg": "net: Make tcp_allowed_congestion_control readonly in non-init netns", + "cmt_id": "35d7491e2f77ce480097cabcaf93ed409e916e12" + }, + "CVE-2021-46920": { + "cmt_msg": "dmaengine: idxd: Fix clobbering of SWERR overflow bit on writeback", + "cmt_id": "a5ad12d5d69c63af289a37f05187a0c6fe93553d" + }, "CVE-2021-29155": { "cmt_msg": "bpf: Use correct permission flag for mixed signed bounds arithmetic", "cmt_id": "4f3ff11204eac0ee23acf64deecb3bad7b0db0c6" @@ -125576,7 +161664,25 @@ "cmt_id": "5a627026be4a17e5b9db23558cd28e62b2cbc66e" } }, + "5.10.33": { + "CVE-2021-46921": { + "cmt_msg": "locking/qrwlock: Fix ordering in queued_write_lock_slowpath()", + "cmt_id": "82fa9ced35d88581cffa4a1c856fc41fca96d80a" + } + }, "5.10.35": { + "CVE-2021-46973": { + "cmt_msg": "net: qrtr: Avoid potential use after free in MHI send", + "cmt_id": "48ec949ac979b4b42d740f67b6177797af834f80" + }, + "CVE-2021-46972": { + "cmt_msg": "ovl: fix leaked dentry", + "cmt_id": "71d58457a8afc650da5d3292a7f7029317654d95" + }, + "CVE-2021-46971": { + "cmt_msg": "perf/core: Fix unconditional security_locked_down() call", + "cmt_id": "4348d3b5027bc3ff6336368b6c60605d4ef8e1ce" + }, "CVE-2021-38209": { "cmt_msg": "netfilter: conntrack: Make global sysctls readonly in non-init netns", "cmt_id": "d3598eb3915cc0c0d8cab42f4a6258ff44c4033e" @@ -125584,16 +161690,120 @@ "CVE-2021-31829": { "cmt_msg": "bpf: Fix masking negation logic upon negative dst register", "cmt_id": "2cfa537674cd1051a3b8111536d77d0558f33d5d" + }, + "CVE-2021-46974": { + "cmt_msg": "bpf: Fix masking negation logic upon negative dst register", + "cmt_id": "2cfa537674cd1051a3b8111536d77d0558f33d5d" } }, "5.10.36": { - "CVE-2021-3506": { - "cmt_msg": "f2fs: fix to avoid out-of-bounds memory access", - "cmt_id": "9aa4602237d535b83c579eb752e8fc1c3e7e7055" + "CVE-2020-36777": { + "cmt_msg": "media: dvbdev: Fix memory leak in dvb_media_device_free()", + "cmt_id": "43263fd43083e412311fa764cd04a727b0c6a749" + }, + "CVE-2020-36776": { + "cmt_msg": "thermal/drivers/cpufreq_cooling: Fix slab OOB issue", + "cmt_id": "c24a20912eef00587416628149c438e885eb1304" + }, + "CVE-2021-46968": { + "cmt_msg": "s390/zcrypt: fix zcard and zqueue hot-unplug memleak", + "cmt_id": "026499a9c2e002e621ad568d1378324ae97e5524" + }, + "CVE-2021-46965": { + "cmt_msg": "mtd: physmap: physmap-bt1-rom: Fix unintentional stack access", + "cmt_id": "34ec706bf0b7c4ca249a729c1bcb91f706c7a7be" + }, + "CVE-2021-46966": { + "cmt_msg": "ACPI: custom_method: fix potential use-after-free issue", + "cmt_id": "62dc2440ebb552aa0d7f635e1697e077d9d21203" + }, + "CVE-2021-46967": { + "cmt_msg": "vhost-vdpa: fix vm_flags for virtqueue doorbell mapping", + "cmt_id": "3b8b6399666a29daa30b0bb3f5c9e3fc81c5a6a6" + }, + "CVE-2021-46960": { + "cmt_msg": "cifs: Return correct error code from smb2_get_enc_key", + "cmt_id": "aaa0faa5c28a91c362352d6b35dc3ed10df56fb0" + }, + "CVE-2021-46961": { + "cmt_msg": "irqchip/gic-v3: Do not enable irqs when handling spurious interrups", + "cmt_id": "7be4db5c2b59fa77071c93ca4329876fb9777202" + }, + "CVE-2021-46962": { + "cmt_msg": "mmc: uniphier-sd: Fix a resource leak in the remove function", + "cmt_id": "25ac6ce65f1ab458982d15ec1caf441acd37106a" + }, + "CVE-2021-46963": { + "cmt_msg": "scsi: qla2xxx: Fix crash in qla2xxx_mqueuecommand()", + "cmt_id": "702cdaa2c6283c135ef16d52e0e4e3c1005aa538" + }, + "CVE-2021-46943": { + "cmt_msg": "media: staging/intel-ipu3: Fix set_fmt error handling", + "cmt_id": "c6b81b897f6f9445d57f8d47c4e060ec21556137" + }, + "CVE-2021-46940": { + "cmt_msg": "tools/power turbostat: Fix offset overflow issue in index converting", + "cmt_id": "ea6803ff2cd1a2d7d880256bf562172b708a76ff" + }, + "CVE-2021-46941": { + "cmt_msg": "usb: dwc3: core: Do core softreset when switch mode", + "cmt_id": "fce7bbcd07d59ac30dba8ce225316b3b4c1c7b50" + }, + "CVE-2021-46944": { + "cmt_msg": "media: staging/intel-ipu3: Fix memory leak in imu_fmt", + "cmt_id": "517f6f570566a863c2422b843c8b7d099474f6a9" + }, + "CVE-2021-46948": { + "cmt_msg": "sfc: farch: fix TX queue lookup in TX event handling", + "cmt_id": "bf2b941d0a6f2d3b9f5fa3c4c21bdd54f71ce253" + }, + "CVE-2021-46949": { + "cmt_msg": "sfc: farch: fix TX queue lookup in TX flush done handling", + "cmt_id": "fb791572d6747ef385f628450f8d57cd132e6e5a" }, "CVE-2021-3543": { "cmt_msg": "nitro_enclaves: Fix stale file descriptors on failed usercopy", "cmt_id": "ed9cfd60c7875b0597e672e89c0bad09a88307d2" + }, + "CVE-2021-46951": { + "cmt_msg": "tpm: efi: Use local variable for calculating final log size", + "cmt_id": "60a01ecc9f68067e4314a0b55148e39e5d58a51b" + }, + "CVE-2021-46950": { + "cmt_msg": "md/raid1: properly indicate failure when ending a failed write request", + "cmt_id": "661061a45e32d8b2cc0e306da9f169ad44011382" + }, + "CVE-2021-46953": { + "cmt_msg": "ACPI: GTDT: Don't corrupt interrupt mappings on watchdow probe failure", + "cmt_id": "e0f2d86481eaa83df33b0793f75212919db7a19d" + }, + "CVE-2021-46952": { + "cmt_msg": "NFS: fs_context: validate UDP retrans to prevent shift out-of-bounds", + "cmt_id": "96fa26b74cdcf9f5c98996bf36bec9fb5b19ffe2" + }, + "CVE-2021-46955": { + "cmt_msg": "openvswitch: fix stack OOB read while fragmenting IPv4 packets", + "cmt_id": "a1478374b0bda89b4277a8afd39208271faad4be" + }, + "CVE-2021-3506": { + "cmt_msg": "f2fs: fix to avoid out-of-bounds memory access", + "cmt_id": "9aa4602237d535b83c579eb752e8fc1c3e7e7055" + }, + "CVE-2021-46956": { + "cmt_msg": "virtiofs: fix memory leak in virtio_fs_probe()", + "cmt_id": "d19555ff225d0896a33246a49279e6d578095f15" + }, + "CVE-2021-46958": { + "cmt_msg": "btrfs: fix race between transaction aborts and fsyncs leading to use-after-free", + "cmt_id": "a4794be7b00b7eda4b45fffd283ab7d76df7e5d6" + }, + "CVE-2021-46939": { + "cmt_msg": "tracing: Restructure trace_clock_global() to never block", + "cmt_id": "a33614d52e97fc8077eb0b292189ca7d964cc534" + }, + "CVE-2021-46938": { + "cmt_msg": "dm rq: fix double free of blk_mq_tag_set in dev remove after table load fails", + "cmt_id": "1cb02dc76f4c0a2749a02b26469512d6984252e9" } }, "5.10.37": { @@ -125605,48 +161815,446 @@ "cmt_msg": "io_uring: truncate lengths larger than MAX_RW_COUNT on provide buffers", "cmt_id": "7e916d0124e5f40d7912f93a633f5dee2c3ad735" }, - "CVE-2021-45486": { - "cmt_msg": "inet: use bigger hash table for IP ID generation", - "cmt_id": "a273c27d7255fc527023edeb528386d1b64bedf5" + "CVE-2021-47048": { + "cmt_msg": "spi: spi-zynqmp-gqspi: fix use-after-free in zynqmp_qspi_exec_op", + "cmt_id": "1231279389b5e638bc3b66b9741c94077aed4b5a" + }, + "CVE-2021-47049": { + "cmt_msg": "Drivers: hv: vmbus: Use after free in __vmbus_open()", + "cmt_id": "d5c7b42c9f56ca46b286daa537d181bd7f69214f" + }, + "CVE-2021-47044": { + "cmt_msg": "sched/fair: Fix shift-out-of-bounds in load_balance()", + "cmt_id": "80862cbf76c2646f709a57c4517aefe0b094c774" + }, + "CVE-2021-47046": { + "cmt_msg": "drm/amd/display: Fix off by one in hdmi_14_process_transaction()", + "cmt_id": "403c4528e5887af3deb9838cb77a557631d1e138" + }, + "CVE-2021-47047": { + "cmt_msg": "spi: spi-zynqmp-gqspi: return -ENOMEM if dma_map_single fails", + "cmt_id": "5980a3b9c933408bc22b0e349b78c3ebd7cbf880" + }, + "CVE-2021-47040": { + "cmt_msg": "io_uring: fix overflows checks in provide buffers", + "cmt_id": "cbbc13b115b8f18e0a714d89f87fbdc499acfe2d" + }, + "CVE-2021-47041": { + "cmt_msg": "nvmet-tcp: fix incorrect locking in state_change sk callback", + "cmt_id": "60ade0d56b06537a28884745059b3801c78e03bc" + }, + "CVE-2020-36779": { + "cmt_msg": "i2c: stm32f7: fix reference leak when pm_runtime_get_sync fails", + "cmt_id": "c323b270a52a26aa8038a4d1fd9a850904a41166" + }, + "CVE-2020-36778": { + "cmt_msg": "i2c: xiic: fix reference leak when pm_runtime_get_sync fails", + "cmt_id": "c977426db644ba476938125597947979e8aba725" + }, + "CVE-2021-47063": { + "cmt_msg": "drm: bridge/panel: Cleanup connector on bridge detach", + "cmt_id": "ce450934a00cf896e648fde08d0bd1426653d7a2" + }, + "CVE-2021-33034": { + "cmt_msg": "Bluetooth: verify AMP hci_chan before amp_destroy", + "cmt_id": "1d7bd87a2c8d264ca3e5c9ba6f3eafc23e994028" + }, + "CVE-2021-47061": { + "cmt_msg": "KVM: Destroy I/O bus devices on unregister failure _after_ sync'ing SRCU", + "cmt_id": "03c6cccedd3913006744faa252a4da5145299343" + }, + "CVE-2021-47066": { + "cmt_msg": "async_xor: increase src_offs when dropping destination page", + "cmt_id": "cab2e8e5997b592fdb7d02cf2387b4b8e3057174" + }, + "CVE-2021-47067": { + "cmt_msg": "soc/tegra: regulators: Fix locking up when voltage-spread is out of range", + "cmt_id": "a1ad124c836816fac8bd5e461d36eaf33cee4e24" + }, + "CVE-2021-47064": { + "cmt_msg": "mt76: fix potential DMA mapping leak", + "cmt_id": "9fa26701cd1fc4d932d431971efc5746325bdfce" + }, + "CVE-2021-47065": { + "cmt_msg": "rtw88: Fix array overrun in rtw_get_tx_power_params()", + "cmt_id": "95fb153c6027924cda3422120169d1890737f3a0" + }, + "CVE-2021-47026": { + "cmt_msg": "RDMA/rtrs-clt: destroy sysfs after removing session from active list", + "cmt_id": "b64415c6b3476cf9fa4d0aea3807065b8403a937" + }, + "CVE-2021-47024": { + "cmt_msg": "vsock/virtio: free queued packets when closing socket", + "cmt_id": "b605673b523fe33abeafb2136759bcbc9c1e6ebf" + }, + "CVE-2021-47023": { + "cmt_msg": "net: marvell: prestera: fix port event handling on init", + "cmt_id": "0ce6052802be2cb61a57b753e41301339c88c839" + }, + "CVE-2021-47020": { + "cmt_msg": "soundwire: stream: fix memory leak in stream config error path", + "cmt_id": "7c468deae306d0cbbd539408c26cfec04c66159a" }, "CVE-2021-32399": { "cmt_msg": "bluetooth: eliminate the potential race condition when removing the HCI controller", "cmt_id": "2d84ef4e6569a818f912d93d5345c21542807ac7" }, + "CVE-2020-36782": { + "cmt_msg": "i2c: imx-lpi2c: fix reference leak when pm_runtime_get_sync fails", + "cmt_id": "cc49d206414240483bb93ffa3d80243e6a776916" + }, + "CVE-2020-36783": { + "cmt_msg": "i2c: img-scb: fix reference leak when pm_runtime_get_sync fails", + "cmt_id": "e80ae8bde41266d3b8bf012460b6593851766006" + }, + "CVE-2020-36780": { + "cmt_msg": "i2c: sprd: fix reference leak when pm_runtime_get_sync fails", + "cmt_id": "e547640cee7981fd751d2c9cde3a61bdb678b755" + }, + "CVE-2020-36781": { + "cmt_msg": "i2c: imx: fix reference leak when pm_runtime_get_sync fails", + "cmt_id": "3a0cdd336d92c429b51a79bf4f64b17eafa0325d" + }, + "CVE-2020-36786": { + "cmt_msg": "media: [next] staging: media: atomisp: fix memory leak of object flash", + "cmt_id": "cc4cc2fb5aaf9adb83c02211eb13b16cfcb7ba64" + }, + "CVE-2020-36787": { + "cmt_msg": "media: aspeed: fix clock handling logic", + "cmt_id": "a59d01384c80a8a4392665802df57c3df20055f5" + }, + "CVE-2020-36784": { + "cmt_msg": "i2c: cadence: fix reference leak when pm_runtime_get_sync fails", + "cmt_id": "30410519328c94367e561fd878e5f0d3a0303585" + }, + "CVE-2020-36785": { + "cmt_msg": "media: atomisp: Fix use after free in atomisp_alloc_css_stat_bufs()", + "cmt_id": "d218c7a0284f6b92a7b82d2e19706e18663b4193" + }, + "CVE-2021-47053": { + "cmt_msg": "crypto: sun8i-ss - Fix memory leak of pad", + "cmt_id": "2c67a9333da9d0a3b87310e0d116b7c9070c7b00" + }, + "CVE-2021-47032": { + "cmt_msg": "mt76: mt7915: fix tx skb dma unmap", + "cmt_id": "4e7914ce23306b28d377ec395e00e5fde0e6f96e" + }, + "CVE-2021-47059": { + "cmt_msg": "crypto: sun8i-ss - fix result memory leak on error path", + "cmt_id": "1f12aaf07f61122cf5074d29714ee26f8d44b0e7" + }, "CVE-2021-3489": { "cmt_msg": "bpf, ringbuf: Deny reserve of buffers larger than ringbuf", "cmt_id": "1ca284f0867079a34f52a6f811747695828166c6" }, + "CVE-2021-47052": { + "cmt_msg": "crypto: sa2ul - Fix memory leak of rxd", + "cmt_id": "0e596b3734649041ed77edc86a23c0442bbe062b" + }, + "CVE-2021-47051": { + "cmt_msg": "spi: fsl-lpspi: Fix PM reference leak in lpspi_prepare_xfer_hardware()", + "cmt_id": "ce02e58ddf8658a4c3bed2296f32a5873b3f7cce" + }, + "CVE-2021-47050": { + "cmt_msg": "memory: renesas-rpc-if: fix possible NULL pointer dereference of resource", + "cmt_id": "71bcc1b4a1743534d8abdcb57ff912e6bc390438" + }, + "CVE-2021-47057": { + "cmt_msg": "crypto: sun8i-ss - Fix memory leak of object d when dma_iv fails to map", + "cmt_id": "617ec35ed51f731a593ae7274228ef2cfc9cb781" + }, + "CVE-2021-47056": { + "cmt_msg": "crypto: qat - ADF_STATUS_PF_RUNNING should be set after adf_dev_init", + "cmt_id": "1f50392650ae794a1aea41c213c6a3e1c824413c" + }, + "CVE-2021-47055": { + "cmt_msg": "mtd: require write permissions for locking and badblock ioctls", + "cmt_id": "7b6552719c0ccbbea29dde4be141da54fdb5877e" + }, + "CVE-2021-47054": { + "cmt_msg": "bus: qcom: Put child node before return", + "cmt_id": "00f6abd3509b1d70d0ab0fbe65ce5685cebed8be" + }, + "CVE-2021-47017": { + "cmt_msg": "ath10k: Fix a use after free in ath10k_htc_send_bundle", + "cmt_id": "8bb054fb336f4250002fff4e0b075221c05c3c65" + }, + "CVE-2021-47016": { + "cmt_msg": "m68k: mvme147,mvme16x: Don't wipe PCC timer config bits", + "cmt_id": "1dfb26df15fc7036a74221d43de7427f74293dae" + }, + "CVE-2021-47015": { + "cmt_msg": "bnxt_en: Fix RX consumer index logic in the error path.", + "cmt_id": "4fcaad2b7dac3f16704f8118c7e481024ddbd3ed" + }, + "CVE-2021-47013": { + "cmt_msg": "net:emac/emac-mac: Fix a use after free in emac_mac_tx_buf_send", + "cmt_id": "9dc373f74097edd0e35f3393d6248eda8d1ba99d" + }, + "CVE-2021-47012": { + "cmt_msg": "RDMA/siw: Fix a use after free in siw_alloc_mr", + "cmt_id": "608a4b90ece039940e9425ee2b39c8beff27e00c" + }, + "CVE-2021-47010": { + "cmt_msg": "net: Only allow init netns to set default tcp cong to a restricted algo", + "cmt_id": "6c1ea8bee75df8fe2184a50fcd0f70bf82986f42" + }, + "CVE-2021-47034": { + "cmt_msg": "powerpc/64s: Fix pte update for kernel memory on radix", + "cmt_id": "84c0762633f2a7ac8399e6b97d3b9bb8e6e1d50f" + }, + "CVE-2021-47043": { + "cmt_msg": "media: venus: core: Fix some resource leaks in the error path of 'venus_probe()'", + "cmt_id": "00b68a7478343afdf83f30c43e64db5296057030" + }, + "CVE-2021-47033": { + "cmt_msg": "mt76: mt7615: fix tx skb dma unmap", + "cmt_id": "75bc5f779a7664d1fc19cb915039439c6e58bb94" + }, + "CVE-2021-47018": { + "cmt_msg": "powerpc/64: Fix the definition of the fixmap area", + "cmt_id": "4b9fb2c9039a206d37f215936a4d5bee7b1bf9cd" + }, + "CVE-2021-45486": { + "cmt_msg": "inet: use bigger hash table for IP ID generation", + "cmt_id": "a273c27d7255fc527023edeb528386d1b64bedf5" + }, "CVE-2021-31440": { "cmt_msg": "bpf: Fix propagation of 32 bit unsigned bounds from 64 bit bounds", "cmt_id": "4394be0a1866fb78a4dfe0ea38e29c4ed107b890" }, - "CVE-2021-33034": { - "cmt_msg": "Bluetooth: verify AMP hci_chan before amp_destroy", - "cmt_id": "1d7bd87a2c8d264ca3e5c9ba6f3eafc23e994028" + "CVE-2021-47060": { + "cmt_msg": "KVM: Stop looking for coalesced MMIO zones if the bus is destroyed", + "cmt_id": "2a20592baff59c5351c5200ec667e1a2aa22af85" + }, + "CVE-2021-47038": { + "cmt_msg": "Bluetooth: avoid deadlock between hci_dev->lock and socket lock", + "cmt_id": "7cc0ba67883c6c8d3bddb283f56c167fc837a555" } }, "5.10.38": { + "CVE-2021-46986": { + "cmt_msg": "usb: dwc3: gadget: Free gadget structure only after freeing endpoints", + "cmt_id": "1ea775021282d90e1d08d696b7ab54aa75d688e5" + }, + "CVE-2021-46984": { + "cmt_msg": "kyber: fix out of bounds access when preempted", + "cmt_id": "54dbe2d2c1fcabf650c7a8b747601da355cd7f9f" + }, + "CVE-2021-46982": { + "cmt_msg": "f2fs: compress: fix race condition of overwrite vs truncate", + "cmt_id": "5639b73fd3bc6fc8ca72e3a9ac15aacaabd7ebff" + }, + "CVE-2021-46983": { + "cmt_msg": "nvmet-rdma: Fix NULL deref when SEND is completed with error", + "cmt_id": "64f3410c7bfc389b1a58611d0799f4a36ce4b6b5" + }, + "CVE-2021-46980": { + "cmt_msg": "usb: typec: ucsi: Retrieve all the PDOs instead of just the first 4", + "cmt_id": "e5366bea0277425e1868ba20eeb27c879d5a6e2d" + }, + "CVE-2021-46981": { + "cmt_msg": "nbd: Fix NULL pointer in flush_workqueue", + "cmt_id": "cde4b55cfb24522dcbba80bbdb0c082303e76c43" + }, + "CVE-2021-47000": { + "cmt_msg": "ceph: fix inode leak on getattr error in __fh_to_dentry", + "cmt_id": "bf45c9fe99aa8003d2703f1bd353f956dea47e40" + }, + "CVE-2021-47001": { + "cmt_msg": "xprtrdma: Fix cwnd update ordering", + "cmt_id": "eddae8be7944096419c2ae29477a45f767d0fcd4" + }, + "CVE-2021-47004": { + "cmt_msg": "f2fs: fix to avoid touching checkpointed data in get_victim()", + "cmt_id": "105155a8146ddb54c119d8318964eef3859d109d" + }, + "CVE-2021-47005": { + "cmt_msg": "PCI: endpoint: Fix NULL pointer dereference for ->get_features()", + "cmt_id": "bbed83d7060e07a5d309104d25a00f0a24441428" + }, + "CVE-2021-46988": { + "cmt_msg": "userfaultfd: release page in error path to avoid BUG_ON", + "cmt_id": "140cfd9980124aecb6c03ef2e69c72d0548744de" + }, + "CVE-2021-46989": { + "cmt_msg": "hfsplus: prevent corruption in shrinking truncate", + "cmt_id": "adbd8a2a8cc05d9e501f93e5c95c59307874cc99" + }, "CVE-2021-4157": { "cmt_msg": "pNFS/flexfiles: fix incorrect size check in decode_nfs_fh()", "cmt_id": "1fbea60ea658ab887fb899532d783732b04e53e6" + }, + "CVE-2021-46977": { + "cmt_msg": "KVM: VMX: Disable preemption when probing user return MSRs", + "cmt_id": "31f29749ee970c251b3a7e5b914108425940d089" + }, + "CVE-2021-46976": { + "cmt_msg": "drm/i915: Fix crash in auto_retire", + "cmt_id": "805c990a9c54b9451d3daff640b850909c31ab9d" + }, + "CVE-2021-47006": { + "cmt_msg": "ARM: 9064/1: hw_breakpoint: Do not directly check the event's overflow_handler hook", + "cmt_id": "630146203108bf6b8934eec0dfdb3e46dcb917de" + }, + "CVE-2021-47007": { + "cmt_msg": "f2fs: fix panic during f2fs_resize_fs()", + "cmt_id": "1c20a4896409f5ca1c770e1880c33d0a28a8b10f" + }, + "CVE-2021-46994": { + "cmt_msg": "can: mcp251x: fix resume from sleep before interface was brought up", + "cmt_id": "eecb4df8ec9f896b19ee05bfa632ac6c1dcd8f21" + }, + "CVE-2021-46997": { + "cmt_msg": "arm64: entry: always set GIC_PRIO_PSR_I_SET during entry", + "cmt_id": "51524fa8b5f7b879ba569227738375d283b79382" + }, + "CVE-2021-46996": { + "cmt_msg": "netfilter: nftables: Fix a memleak from userdata error path in new objects", + "cmt_id": "2c784a500f5edd337258b0fdb2f31bc9abde1a23" + }, + "CVE-2021-46991": { + "cmt_msg": "i40e: Fix use-after-free in i40e_client_subtask()", + "cmt_id": "829a713450b8fb127cbabfc1244c1d8179ec5107" + }, + "CVE-2021-46990": { + "cmt_msg": "powerpc/64s: Fix crashes when toggling entry flush barrier", + "cmt_id": "d2e3590ca39ccfd8a5a46d8c7f095cb6c7b9ae92" + }, + "CVE-2021-46993": { + "cmt_msg": "sched: Fix out-of-bound access in uclamp", + "cmt_id": "f7347c85490b92dd144fa1fba9e1eca501656ab3" + }, + "CVE-2021-46992": { + "cmt_msg": "netfilter: nftables: avoid overflows in nft_hash_buckets()", + "cmt_id": "72b49dd116ca00a46a11d5a4d8d7987f05ed9cd7" + }, + "CVE-2021-47035": { + "cmt_msg": "iommu/vt-d: Remove WO permissions on second-level paging entries", + "cmt_id": "89bd620798704a8805fc9db0d71d7f812cf5b3d2" + }, + "CVE-2021-46999": { + "cmt_msg": "sctp: do asoc update earlier in sctp_sf_do_dupcook_a", + "cmt_id": "f01988ecf3654f805282dce2d3bb9afe68d2691e" + }, + "CVE-2021-46998": { + "cmt_msg": "ethernet:enic: Fix a use after free bug in enic_hard_start_xmit", + "cmt_id": "7afdd6aba95c8a526038e7abe283eeac3e4320f1" } }, "5.10.40": { - "CVE-2020-26558": { + "CVE-2021-47080": { + "cmt_msg": "RDMA/core: Prevent divide-by-zero error triggered by the user", + "cmt_id": "66ab7fcdac34b890017f04f391507ef5b2b89a13" + }, + "CVE-2020-26555": { "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical", "cmt_id": "d8d261c7cfb3a5dd921b4aeeb944718afc3f3961" }, - "CVE-2021-0129": { + "CVE-2020-26558": { "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical", "cmt_id": "d8d261c7cfb3a5dd921b4aeeb944718afc3f3961" }, - "CVE-2020-26555": { + "CVE-2021-47071": { + "cmt_msg": "uio_hv_generic: Fix a memory leak in error handling paths", + "cmt_id": "d84b5e912212b05f6b5bde9f682046accfbe0354" + }, + "CVE-2021-47073": { + "cmt_msg": "platform/x86: dell-smbios-wmi: Fix oops on rmmod dell_smbios", + "cmt_id": "0cf036a0d325200e6c27b90908e51195bbc557b1" + }, + "CVE-2021-47075": { + "cmt_msg": "nvmet: fix memory leak in nvmet_alloc_ctrl()", + "cmt_id": "4720f29acb3fe67aa8aa71e6b675b079d193aaeb" + }, + "CVE-2021-47074": { + "cmt_msg": "nvme-loop: fix memory leak in nvme_loop_create_ctrl()", + "cmt_id": "9c980795ccd77e8abec33dd6fe28dfe1c4083e65" + }, + "CVE-2021-47077": { + "cmt_msg": "scsi: qedf: Add pointer checks in qedf_update_link_speed()", + "cmt_id": "a6362a737572f66051deb7637f3f77ddf7a4402f" + }, + "CVE-2021-47078": { + "cmt_msg": "RDMA/rxe: Clear all QP fields if creation failed", + "cmt_id": "2ee4d79c364914989c80de382c0b1a7259a7e4b3" + }, + "CVE-2021-47069": { + "cmt_msg": "ipc/mqueue, msg, sem: avoid relying on a stack reference past its expiry", + "cmt_id": "4528c0c323085e645b8765913b4a7fd42cf49b65" + }, + "CVE-2021-0129": { "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical", "cmt_id": "d8d261c7cfb3a5dd921b4aeeb944718afc3f3961" } }, + "5.10.41": { + "CVE-2021-47180": { + "cmt_msg": "NFC: nci: fix memory leak in nci_allocate_device", + "cmt_id": "b34cb7ac32cc8e5471dc773180ea9ae676b1a745" + } + }, "5.10.42": { + "CVE-2021-47177": { + "cmt_msg": "iommu/vt-d: Fix sysfs leak in alloc_iommu()", + "cmt_id": "f01134321d04f47c718bb41b799bcdeda27873d2" + }, + "CVE-2021-47167": { + "cmt_msg": "NFS: Fix an Oopsable condition in __nfs_pageio_add_request()", + "cmt_id": "ee21cd3aa8548e0cbc8c67a80b62113aedd2d101" + }, + "CVE-2021-47166": { + "cmt_msg": "NFS: Don't corrupt the value of pg_bytes_written in nfs_do_recoalesce()", + "cmt_id": "7087db95c0a06ab201b8ebfac6a7ec1e34257997" + }, + "CVE-2021-47165": { + "cmt_msg": "drm/meson: fix shutdown crash when component not probed", + "cmt_id": "d66083c0d6f5125a4d982aa177dd71ab4cd3d212" + }, + "CVE-2021-47164": { + "cmt_msg": "net/mlx5e: Fix null deref accessing lag dev", + "cmt_id": "2e4b0b95a489259f9d35a3db17023061f8f3d587" + }, + "CVE-2021-47149": { + "cmt_msg": "net: fujitsu: fix potential null-ptr-deref", + "cmt_id": "71723a796ab7881f491d663c6cd94b29be5fba50" + }, + "CVE-2021-47162": { + "cmt_msg": "tipc: skb_linearize the head skb when reassembling msgs", + "cmt_id": "6da24cfc83ba4f97ea44fc7ae9999a006101755c" + }, + "CVE-2021-47161": { + "cmt_msg": "spi: spi-fsl-dspi: Fix a resource leak in an error handling path", + "cmt_id": "fe6921e3b8451a537e01c031b8212366bb386e3e" + }, + "CVE-2021-47160": { + "cmt_msg": "net: dsa: mt7530: fix VLAN traffic leaks", + "cmt_id": "b91117b66fe875723a4e79ec6263526fffdb44d2" + }, + "CVE-2021-47145": { + "cmt_msg": "btrfs: do not BUG_ON in link_to_fixup_dir", + "cmt_id": "7e13db503918820e6333811cdc6f151dcea5090a" + }, + "CVE-2021-47144": { + "cmt_msg": "drm/amd/amdgpu: fix refcount leak", + "cmt_id": "9fdb8ed37a3a44f9c49372b69f87fd5f61cb3240" + }, + "CVE-2021-47146": { + "cmt_msg": "mld: fix panic in mld_newpack()", + "cmt_id": "beb39adb150f8f3b516ddf7c39835a9788704d23" + }, + "CVE-2021-47141": { + "cmt_msg": "gve: Add NULL pointer checks when freeing irqs.", + "cmt_id": "da21a35c00ff1a1794d4f166d3b3fa8db4d0f6fb" + }, + "CVE-2021-47143": { + "cmt_msg": "net/smc: remove device from smcd_dev_list after failed device_add()", + "cmt_id": "8b2cdc004d21a7255f219706dca64411108f7897" + }, + "CVE-2021-47142": { + "cmt_msg": "drm/amdgpu: Fix a use-after-free", + "cmt_id": "f98cdf084405333ee2f5be548a91b2d168e49276" + }, "CVE-2021-33098": { "cmt_msg": "ixgbe: fix large MTU request from VF", "cmt_id": "3cfd11506ed032446358eedf7e31b4defd819d91" @@ -125659,17 +162267,17 @@ "cmt_msg": "mac80211: prevent mixed key and fragment cache attacks", "cmt_id": "42d98e02193d163c1523a8840a2effcc4c6eb111" }, - "CVE-2021-34981": { - "cmt_msg": "Bluetooth: cmtp: fix file refcount when cmtp_attach_device fails", - "cmt_id": "1b364f8ede200e79e25df0df588fcedc322518fb" + "CVE-2021-47174": { + "cmt_msg": "netfilter: nft_set_pipapo_avx2: Add irq_fpu_usable() check, fallback to non-AVX2 version", + "cmt_id": "b1f45a26bd322525c14edd9504f6d46dfad679a4" }, "CVE-2020-24588": { "cmt_msg": "cfg80211: mitigate A-MSDU aggregation attacks", "cmt_id": "c730d72aa6e85a71ee74530d601d4d894d791b43" }, - "CVE-2020-26139": { - "cmt_msg": "mac80211: do not accept/forward invalid EAPOL frames", - "cmt_id": "2b9b07b9a06fab16bda3d33da3be70fe33bd95cb" + "CVE-2021-47175": { + "cmt_msg": "net/sched: fq_pie: fix OOB access in the traffic path", + "cmt_id": "e6294c06e7c62ffdd5bf3df696d3a4fcbb753d3c" }, "CVE-2020-26145": { "cmt_msg": "ath10k: drop fragments with multicast DA for PCIe", @@ -125682,26 +162290,178 @@ "CVE-2020-26141": { "cmt_msg": "ath10k: Fix TKIP Michael MIC verification for PCIe", "cmt_id": "6643b21aee1c3cac10da9dfb0fa17aacc431fa91" + }, + "CVE-2021-47169": { + "cmt_msg": "serial: rp2: use 'request_firmware' instead of 'request_firmware_nowait'", + "cmt_id": "6a931ceb0b9401fe18d0c500e08164bf9cc7be4b" + }, + "CVE-2021-47168": { + "cmt_msg": "NFS: fix an incorrect limit in filelayout_decode_layout()", + "cmt_id": "9b367fe770b1b80d7bf64ed0d177544a44405f6e" + }, + "CVE-2021-47138": { + "cmt_msg": "cxgb4: avoid accessing registers when clearing filters", + "cmt_id": "02f03883fdb10ad7e66717c70ea163a8d27ae6e7" + }, + "CVE-2021-47139": { + "cmt_msg": "net: hns3: put off calling register_netdev() until client initialize complete", + "cmt_id": "a663c1e418a3b5b8e8edfad4bc8e7278c312d6fc" + }, + "CVE-2021-47136": { + "cmt_msg": "net: zero-initialize tc skb extension on allocation", + "cmt_id": "ac493452e937b8939eaf2d24cac51a4804b6c20e" + }, + "CVE-2021-47137": { + "cmt_msg": "net: lantiq: fix memory corruption in RX ring", + "cmt_id": "5ac72351655f8b033a2935646f53b7465c903418" + }, + "CVE-2021-47179": { + "cmt_msg": "NFSv4: Fix a NULL pointer dereference in pnfs_mark_matching_lsegs_return()", + "cmt_id": "f9890652185b72b8de9ebeb4406037640b6e1b53" + }, + "CVE-2021-47158": { + "cmt_msg": "net: dsa: sja1105: add error handling in sja1105_setup()", + "cmt_id": "dd8609f203448ca6d58ae71461208b3f6b0329b0" + }, + "CVE-2021-47159": { + "cmt_msg": "net: dsa: fix a crash if ->get_sset_count() fails", + "cmt_id": "caff86f85512b8e0d9830e8b8b0dfe13c68ce5b6" + }, + "CVE-2021-47170": { + "cmt_msg": "USB: usbfs: Don't WARN about excessively large memory allocations", + "cmt_id": "8d83f109e920d2776991fa142bb904d985dca2ed" + }, + "CVE-2021-47171": { + "cmt_msg": "net: usb: fix memory leak in smsc75xx_bind", + "cmt_id": "635ac38b36255d3cfb8312cf7c471334f4d537e0" + }, + "CVE-2021-47172": { + "cmt_msg": "iio: adc: ad7124: Fix potential overflow due to non sequential channel numbers", + "cmt_id": "f70122825076117787b91e7f219e21c09f11a5b9" + }, + "CVE-2021-47173": { + "cmt_msg": "misc/uss720: fix memory leak in uss720_probe", + "cmt_id": "5394ae9d8c7961dd93807fdf1b12a1dde96b0a55" + }, + "CVE-2021-47152": { + "cmt_msg": "mptcp: fix data stream corruption", + "cmt_id": "3267a061096efc91eda52c2a0c61ba76e46e4b34" + }, + "CVE-2021-47153": { + "cmt_msg": "i2c: i801: Don't generate an interrupt on bus reset", + "cmt_id": "b523feb7e8e44652f92f3babb953a976e7ccbbef" + }, + "CVE-2021-47150": { + "cmt_msg": "net: fec: fix the potential memory leak in fec_enet_init()", + "cmt_id": "8ee7ef4a57a9e1228b6f345aaa70aa8951c7e9cd" + }, + "CVE-2021-47151": { + "cmt_msg": "interconnect: qcom: bcm-voter: add a missing of_node_put()", + "cmt_id": "4e3cea8035b6f1b9055e69cc6ebf9fa4e50763ae" + }, + "CVE-2021-34981": { + "cmt_msg": "Bluetooth: cmtp: fix file refcount when cmtp_attach_device fails", + "cmt_id": "1b364f8ede200e79e25df0df588fcedc322518fb" + }, + "CVE-2020-26139": { + "cmt_msg": "mac80211: do not accept/forward invalid EAPOL frames", + "cmt_id": "2b9b07b9a06fab16bda3d33da3be70fe33bd95cb" + }, + "CVE-2021-47163": { + "cmt_msg": "tipc: wait and exit until all work queues are done", + "cmt_id": "5195ec5e365a2a9331bfeb585b613a6e94f98dba" } }, "5.10.43": { - "CVE-2021-3564": { - "cmt_msg": "Bluetooth: fix the erroneous flush_work() order", - "cmt_id": "3795007c8dfc8bca176529bfeceb17c6f4ef7e44" + "CVE-2021-47129": { + "cmt_msg": "netfilter: nft_ct: skip expectations for confirmed conntrack", + "cmt_id": "5f3429c05e4028a0e241afdad856dd15dec2ffb9" + }, + "CVE-2021-47128": { + "cmt_msg": "bpf, lockdown, audit: Fix buggy SELinux lockdown permission checks", + "cmt_id": "ff5039ec75c83d2ed5b781dc7733420ee8c985fc" + }, + "CVE-2021-47122": { + "cmt_msg": "net: caif: fix memory leak in caif_device_notify", + "cmt_id": "af2806345a37313f01b1c9f15e046745b8ee2daa" + }, + "CVE-2021-47121": { + "cmt_msg": "net: caif: fix memory leak in cfusbl_device_notify", + "cmt_id": "46403c1f80b0d3f937ff9c4f5edc63bb64bc5051" + }, + "CVE-2021-47120": { + "cmt_msg": "HID: magicmouse: fix NULL-deref on disconnect", + "cmt_id": "b5d013c4c76b276890135b5d32803c4c63924b77" + }, + "CVE-2021-47126": { + "cmt_msg": "ipv6: Fix KASAN: slab-out-of-bounds Read in fib6_nh_flush_exceptions", + "cmt_id": "09870235827451409ff546b073d754a19fd17e2e" + }, + "CVE-2021-47109": { + "cmt_msg": "neighbour: allow NUD_NOARP entries to be forced GCed", + "cmt_id": "d17d47da59f726dc4c87caebda3a50333d7e2fd3" }, "CVE-2021-28691": { "cmt_msg": "xen-netback: take a reference to the RX task thread", "cmt_id": "6b53db8c4c14b4e7256f058d202908b54a7b85b4" }, - "CVE-2021-38208": { + "CVE-2021-3564": { + "cmt_msg": "Bluetooth: fix the erroneous flush_work() order", + "cmt_id": "3795007c8dfc8bca176529bfeceb17c6f4ef7e44" + }, + "CVE-2021-3587": { "cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect", "cmt_id": "48ee0db61c8299022ec88c79ad137f290196cac2" }, + "CVE-2021-47134": { + "cmt_msg": "efi/fdt: fix panic when no valid fdt found", + "cmt_id": "5148066edbdc89c6fe5bc419c31a5c22e5f83bdb" + }, + "CVE-2021-47130": { + "cmt_msg": "nvmet: fix freeing unallocated p2pmem", + "cmt_id": "c440cd080761b18a52cac20f2a42e5da1e3995af" + }, + "CVE-2021-47131": { + "cmt_msg": "net/tls: Fix use-after-free after the TLS device goes down and up", + "cmt_id": "f1d4184f128dede82a59a841658ed40d4e6d3aa2" + }, + "CVE-2021-47112": { + "cmt_msg": "x86/kvm: Teardown PV features on boot CPU as well", + "cmt_id": "38b858da1c58ad46519a257764e059e663b59ff2" + }, + "CVE-2021-47113": { + "cmt_msg": "btrfs: abort in rename_exchange if we fail to insert the second ref", + "cmt_id": "0df50d47d17401f9f140dfbe752a65e5d72f9932" + }, + "CVE-2021-47110": { + "cmt_msg": "x86/kvm: Disable kvmclock on all CPUs on shutdown", + "cmt_id": "3b0becf8b1ecf642a9edaf4c9628ffc641e490d6" + }, + "CVE-2021-47111": { + "cmt_msg": "xen-netback: take a reference to the RX task thread", + "cmt_id": "6b53db8c4c14b4e7256f058d202908b54a7b85b4" + }, + "CVE-2021-47116": { + "cmt_msg": "ext4: fix memory leak in ext4_mb_init_backend on error path.", + "cmt_id": "2050c6e5b161e5e25ce3c420fef58b24fa388a49" + }, + "CVE-2021-47117": { + "cmt_msg": "ext4: fix bug on in ext4_es_cache_extent as ext4_split_extent_at failed", + "cmt_id": "d3b668b96ad3192c0581a248ae2f596cd054792a" + }, + "CVE-2021-47114": { + "cmt_msg": "ocfs2: fix data corruption by fallocate", + "cmt_id": "c8d5faee46242c3f33b8a71a4d7d52214785bfcc" + }, + "CVE-2021-47118": { + "cmt_msg": "pid: take a reference when initializing `cad_pid`", + "cmt_id": "7178be006d495ffb741c329012da289b62dddfe6" + }, "CVE-2021-3573": { "cmt_msg": "Bluetooth: use correct lock to prevent UAF of hdev object", "cmt_id": "74caf718cc7422a957aac381c73d798c0a999a65" }, - "CVE-2021-3587": { + "CVE-2021-38208": { "cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect", "cmt_id": "48ee0db61c8299022ec88c79ad137f290196cac2" } @@ -125712,6 +162472,12 @@ "cmt_id": "6b6ff4d1f349cb35a7c7d2057819af1b14f80437" } }, + "5.10.45": { + "CVE-2021-46906": { + "cmt_msg": "HID: usbhid: fix info leak in hid_submit_ctrl", + "cmt_id": "b1e3596416d74ce95cc0b7b38472329a3818f8a9" + } + }, "5.10.46": { "CVE-2021-34693": { "cmt_msg": "can: bcm: fix infoleak in struct bcm_msg_head", @@ -125763,6 +162529,10 @@ "cmt_msg": "seq_buf: Fix overflow in seq_buf_putmem_hex()", "cmt_id": "f9fb4986f4d81182f938d16beb4f983fe71212aa" }, + "CVE-2021-47119": { + "cmt_msg": "ext4: fix memory leak in ext4_fill_super", + "cmt_id": "5e4f5138bd8522ebe231a137682d3857209a2c07" + }, "CVE-2021-3655": { "cmt_msg": "sctp: validate from_addr_param return", "cmt_id": "d4dbef7046e24669278eba4455e9e8053ead6ba0" @@ -125822,6 +162592,10 @@ "CVE-2021-0920": { "cmt_msg": "af_unix: fix garbage collect vs MSG_PEEK", "cmt_id": "93c5951e0ce137e994237c19cd75a7caa1f80543" + }, + "CVE-2021-47124": { + "cmt_msg": "io_uring: fix link timeout refs", + "cmt_id": "6f5d7a45f58d3abe3a936de1441b8d6318f978ff" } }, "5.10.56": { @@ -125897,6 +162671,10 @@ "cmt_msg": "igmp: Add ip_mc_list lock in ip_check_mc_rcu", "cmt_id": "ddd7e8b7b84836c584a284b98ca9bd7a348a0558" }, + "CVE-2021-46913": { + "cmt_msg": "netfilter: nftables: clone set element expression template", + "cmt_id": "e51ff3ffc316377cca21de8b80404eed0c37b3c3" + }, "CVE-2021-46283": { "cmt_msg": "netfilter: nf_tables: initialize set before expression setup", "cmt_id": "36983fc2f87ea3b74a33bf460c9ee7329735b7b5" @@ -126133,23 +162911,95 @@ "cmt_msg": "tee: handle lookup of shm with reference count 0", "cmt_id": "c05d8f66ec3470e5212c4d08c46d6cb5738d600d" }, + "CVE-2021-47083": { + "cmt_msg": "pinctrl: mediatek: fix global-out-of-bounds issue", + "cmt_id": "441d3873664d170982922c5d2fc01fa89d9439ed" + }, + "CVE-2021-47086": { + "cmt_msg": "phonet/pep: refuse to enable an unbound pipe", + "cmt_id": "52ad5da8e316fa11e3a50b3f089aa63e4089bf52" + }, + "CVE-2021-47100": { + "cmt_msg": "ipmi: Fix UAF when uninstall ipmi_si and ipmi_msghandler module", + "cmt_id": "6809da5185141e61401da5b01896b79a4deed1ad" + }, "CVE-2021-45469": { "cmt_msg": "f2fs: fix to do sanity check on last xattr entry in __f2fs_setxattr()", "cmt_id": "fffb6581a23add416239dfcf7e7f3980c6b913da" }, + "CVE-2021-47095": { + "cmt_msg": "ipmi: ssif: initialize ssif_info->client early", + "cmt_id": "1f6ab847461ce7dd89ae9db2dd4658c993355d7c" + }, + "CVE-2021-47093": { + "cmt_msg": "platform/x86: intel_pmc_core: fix memleak on registration failure", + "cmt_id": "7a37f2e370699e2feca3dca6c8178c71ceee7e8a" + }, "CVE-2022-1195": { "cmt_msg": "hamradio: improve the incomplete fix to avoid NPD", "cmt_id": "7dd52af1eb5798f590d9d9e1c56ed8f5744ee0ca" + }, + "CVE-2021-47091": { + "cmt_msg": "mac80211: fix locking in ieee80211_start_ap error path", + "cmt_id": "ac61b9c6c0549aaeb98194cf429d93c41bfe5f79" + }, + "CVE-2021-47090": { + "cmt_msg": "mm/hwpoison: clear MF_COUNT_INCREASED before retrying get_any_page()", + "cmt_id": "1f207076740101fed87074a6bc924dbe806f08a5" } }, "5.10.90": { - "CVE-2023-23006": { - "cmt_msg": "net/mlx5: DR, Fix NULL vs IS_ERR checking in dr_domain_init_resources", - "cmt_id": "4cd1da02f0c39606e3378c9255f17d6f85d106c7" + "CVE-2021-46928": { + "cmt_msg": "parisc: Clear stale IIR value on instruction access rights trap", + "cmt_id": "d01e9ce1af6116f812491d3d3873d204f10ae0b8" + }, + "CVE-2021-46929": { + "cmt_msg": "sctp: use call_rcu to free endpoint", + "cmt_id": "769d14abd35e0e153b5149c3e1e989a9d719e3ff" + }, + "CVE-2021-46935": { + "cmt_msg": "binder: fix async_free_space accounting for empty parcels", + "cmt_id": "1cb8444f3114f0bb2f6e3bcadcf09aa4a28425d4" + }, + "CVE-2021-46934": { + "cmt_msg": "i2c: validate user data in compat ioctl", + "cmt_id": "8d31cbab4c295d7010ebb729e9d02d0e9cece18f" + }, + "CVE-2021-46933": { + "cmt_msg": "usb: gadget: f_fs: Clear ffs_eventfd in ffs_data_clear.", + "cmt_id": "1c4ace3e6b8575745c50dca9e76e0021e697d645" + }, + "CVE-2021-46932": { + "cmt_msg": "Input: appletouch - initialize work before device registration", + "cmt_id": "9f329d0d6c91142cf0ad08d23c72dd195db2633c" + }, + "CVE-2021-46931": { + "cmt_msg": "net/mlx5e: Wrap the tx reporter dump callback to extract the sq", + "cmt_id": "73665165b64a8f3c5b3534009a69be55bb744f05" + }, + "CVE-2021-46930": { + "cmt_msg": "usb: mtu3: fix list_head check warning", + "cmt_id": "3b6efe0b7ba03cc2acf0694b46d6ff33c5b4c295" + }, + "CVE-2021-46924": { + "cmt_msg": "NFC: st21nfca: Fix memory leak in device probe and remove", + "cmt_id": "e553265ea56482da5700f56319fda9ff53e7dcb4" + }, + "CVE-2021-46925": { + "cmt_msg": "net/smc: fix kernel panic caused by race of smc_sock", + "cmt_id": "e8a5988a85c719ce7205cb00dcf0716dcf611332" }, "CVE-2022-20154": { "cmt_msg": "sctp: use call_rcu to free endpoint", "cmt_id": "769d14abd35e0e153b5149c3e1e989a9d719e3ff" + }, + "CVE-2023-23006": { + "cmt_msg": "net/mlx5: DR, Fix NULL vs IS_ERR checking in dr_domain_init_resources", + "cmt_id": "4cd1da02f0c39606e3378c9255f17d6f85d106c7" + }, + "CVE-2021-46936": { + "cmt_msg": "net: fix use-after-free in tw_timer_handler", + "cmt_id": "2386e81a1d277f540e1285565c9d41d531bb69d4" } }, "5.10.91": { @@ -126233,6 +163083,10 @@ "cmt_msg": "KVM: s390: Return error on SIDA memop on normal guest", "cmt_id": "b62267b8b06e9b8bb429ae8f962ee431e6535d60" }, + "CVE-2022-48626": { + "cmt_msg": "moxart: fix potential use-after-free on remove path", + "cmt_id": "be93028d306dac9f5b59ebebd9ec7abcfc69c156" + }, "CVE-2022-0435": { "cmt_msg": "tipc: improve size validations for received domain records", "cmt_id": "3c7e5943553594f68bbc070683db6bb6f6e9e78e" @@ -126366,6 +163220,10 @@ "CVE-2022-3107": { "cmt_msg": "hv_netvsc: Add check for kvmalloc_array", "cmt_id": "9b763ceda6f8963cc99df5772540c54ba46ba37c" + }, + "CVE-2022-48629": { + "cmt_msg": "crypto: qcom-rng - ensure buffer for generate is completely filled", + "cmt_id": "0f9b7b8df17525e464294c916acc8194ce38446b" } }, "5.10.109": { @@ -126717,6 +163575,10 @@ } }, "5.10.132": { + "CVE-2022-48627": { + "cmt_msg": "vt: fix memory overlapping when deleting chars in the buffer", + "cmt_id": "bfee93c9a6c395f9aa62268f1cedf64999844926" + }, "CVE-2022-36123": { "cmt_msg": "x86: Clear .brk area at early boot", "cmt_id": "136d7987fcfdeca73ee3c6a29e48f99fdd0f4d87" @@ -126765,6 +163627,10 @@ } }, "5.10.136": { + "CVE-2021-47082": { + "cmt_msg": "tun: avoid double free in tun_free_netdev", + "cmt_id": "a01a4e9f5dc93335c716fa4023b1901956e8c904" + }, "CVE-2022-4744": { "cmt_msg": "tun: avoid double free in tun_free_netdev", "cmt_id": "a01a4e9f5dc93335c716fa4023b1901956e8c904" @@ -126787,25 +163653,29 @@ "cmt_msg": "KVM: x86: Avoid theoretical NULL pointer dereference in kvm_irq_delivery_to_apic_fast()", "cmt_id": "ac7de8c2ba1292856fdd4a4c0764669b9607cf0a" }, - "CVE-2022-2588": { - "cmt_msg": "net_sched: cls_route: remove from list when handle is 0", - "cmt_id": "7018f03d97daf344e49b16200caf4363a1407cab" + "CVE-2022-20422": { + "cmt_msg": "arm64: fix oops in concurrently setting insn_emulation sysctls", + "cmt_id": "353b4673d01c512303c45cf2346f630cda73b5c9" }, "CVE-2022-41222": { "cmt_msg": "mm/mremap: hold the rmap lock in write mode when moving page table entries.", "cmt_id": "2613baa3ab2153cc45b175c58700d93f72ef36c4" }, - "CVE-2022-20422": { - "cmt_msg": "arm64: fix oops in concurrently setting insn_emulation sysctls", - "cmt_id": "353b4673d01c512303c45cf2346f630cda73b5c9" + "CVE-2022-1679": { + "cmt_msg": "ath9k: fix use-after-free in ath9k_hif_usb_rx_cb", + "cmt_id": "eccd7c3e2596b574241a7670b5b53f5322f470e5" + }, + "CVE-2022-2588": { + "cmt_msg": "net_sched: cls_route: remove from list when handle is 0", + "cmt_id": "7018f03d97daf344e49b16200caf4363a1407cab" }, "CVE-2023-1095": { "cmt_msg": "netfilter: nf_tables: fix null deref due to zeroed list head", "cmt_id": "80977126bc20309f7f7bae6d8621356b393e8b41" }, - "CVE-2022-1679": { - "cmt_msg": "ath9k: fix use-after-free in ath9k_hif_usb_rx_cb", - "cmt_id": "eccd7c3e2596b574241a7670b5b53f5322f470e5" + "CVE-2019-25162": { + "cmt_msg": "i2c: Fix a potential use after free", + "cmt_id": "81cb31756888bb062e92d2dca21cd629d77a46a9" } }, "5.10.138": { @@ -126975,6 +163845,10 @@ "cmt_msg": "HID: roccat: Fix use-after-free in roccat_read()", "cmt_id": "dbcca76435a606a352c794956e6df62eedd3a353" }, + "CVE-2021-47103": { + "cmt_msg": "inet: fully convert sk->sk_rx_dst to RCU rules", + "cmt_id": "f039b43cbaea5e0700980c2f0052da05a70782e0" + }, "CVE-2022-3565": { "cmt_msg": "mISDN: fix use-after-free bugs in l1oip timer handlers", "cmt_id": "2a1d0363208528a3bacbc2c37264d60182efd482" @@ -127413,6 +164287,10 @@ "cmt_msg": "usb: gadget: udc: renesas_usb3: Fix use after free bug in renesas_usb3_remove due to race condition", "cmt_id": "36c237b202a406ba441892eabcf44e60dae7ad73" }, + "CVE-2023-52474": { + "cmt_msg": "IB/hfi1: Fix bugs with non-PAGE_SIZE-end multi-iovec user SDMA requests", + "cmt_id": "9c4c6512d7330b743c4ffd18bd999a86ca26db0d" + }, "CVE-2023-2269": { "cmt_msg": "dm ioctl: fix nested locking in table_clear() to remove deadlock concern", "cmt_id": "ea827627a9249154b34b646b1e1007013402afea" @@ -127623,6 +164501,10 @@ "cmt_msg": "drm/amdgpu: Fix potential fence use-after-free v2", "cmt_id": "b870b9a47fdba29bd6828f690e4817c950fa3430" }, + "CVE-2024-23196": { + "cmt_msg": "ALSA: hda: fix a possible null-pointer dereference due to data race in snd_hdac_regmap_sync()", + "cmt_id": "9f9eed451176ffcac6b5ba0f6dae1a6b4a1cb0eb" + }, "CVE-2023-3772": { "cmt_msg": "xfrm: add NULL check in xfrm_update_ae_params", "cmt_id": "bd30aa9c7febb6e709670cd5154194189ca3b7b5" @@ -127679,6 +164561,10 @@ } }, "5.10.198": { + "CVE-2023-52527": { + "cmt_msg": "ipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data()", + "cmt_id": "96b2e1090397217839fcd6c9b6d8f5d439e705ed" + }, "CVE-2023-34324": { "cmt_msg": "xen/events: replace evtchn_rwlock with RCU", "cmt_id": "660627c71bc1098aa94e5f208f14748b105b73bc" @@ -127687,6 +164573,18 @@ "cmt_msg": "tipc: fix a potential deadlock on &tx->lock", "cmt_id": "6a24d0661fa389c241d935da38e0f6a5ee8eb1ae" }, + "CVE-2023-52522": { + "cmt_msg": "net: fix possible store tearing in neigh_periodic_work()", + "cmt_id": "2ea52a2fb8e87067e26bbab4efb8872639240eb0" + }, + "CVE-2023-52566": { + "cmt_msg": "nilfs2: fix potential use after free in nilfs_gccache_submit_read_data()", + "cmt_id": "7130a87ca32396eb9bf48b71a2d42259ae44c6c7" + }, + "CVE-2023-52516": { + "cmt_msg": "dma-debug: don't call __dma_entry_alloc_check_leak() under free_entries_lock", + "cmt_id": "c79300599923daaa30f417c75555d5566b3d31ae" + }, "CVE-2023-42754": { "cmt_msg": "ipv4: fix null-deref in ipv4_link_failure", "cmt_id": "8689c9ace976d6c078e6dc844b09598796e84099" @@ -127695,14 +164593,42 @@ "cmt_msg": "ubi: Refuse attaching if mtd's erasesize is 0", "cmt_id": "a5f643ab11631095c60c9852705220edf1659d6f" }, + "CVE-2023-52501": { + "cmt_msg": "ring-buffer: Do not attempt to read past \"commit\"", + "cmt_id": "cee5151c5410e868826b8afecfb356f3799ebea3" + }, + "CVE-2023-52500": { + "cmt_msg": "scsi: pm80xx: Avoid leaking tags when processing OPC_INB_SET_CONTROLLER_CONFIG command", + "cmt_id": "2afd8fcee0c4d65a482e30c3ad2a92c25e5e92d4" + }, "CVE-2023-4881": { "cmt_msg": "netfilter: nftables: exthdr: fix 4-byte stack OOB write", "cmt_id": "a7d86a77c33ba1c357a7504341172cc1507f0698" }, + "CVE-2023-52628": { + "cmt_msg": "netfilter: nftables: exthdr: fix 4-byte stack OOB write", + "cmt_id": "a7d86a77c33ba1c357a7504341172cc1507f0698" + }, "CVE-2023-4244": { "cmt_msg": "netfilter: nf_tables: fix GC transaction races with netns and netlink event exit path", "cmt_id": "4046f2b56e5a7ba7e123ff961dd51187b8d59e78" }, + "CVE-2023-52513": { + "cmt_msg": "RDMA/siw: Fix connection failure handling", + "cmt_id": "0d520cdb0cd095eac5d00078dfd318408c9b5eed" + }, + "CVE-2023-52574": { + "cmt_msg": "team: fix null-ptr-deref when team device type is changed", + "cmt_id": "b44dd92e2afd89eb6e9d27616858e72a67bdc1a7" + }, + "CVE-2023-52578": { + "cmt_msg": "net: bridge: use DEV_STATS_INC()", + "cmt_id": "04cc361f029c14dd067ad180525c7392334c9bfd" + }, + "CVE-2023-52528": { + "cmt_msg": "net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg", + "cmt_id": "30bc4d7aebe33904b0f2d3aad4b4a9c6029ad0c5" + }, "CVE-2023-5197": { "cmt_msg": "netfilter: nf_tables: disallow rule removal from chain binding", "cmt_id": "5a03b42ae1ed646eb5f5acceff1fb2b1d85ec077" @@ -127710,24 +164636,68 @@ "CVE-2023-4563": { "cmt_msg": "netfilter: nf_tables: don't skip expired elements during walk", "cmt_id": "b15ea4017af82011dd55225ce77cce3d4dfc169c" + }, + "CVE-2023-52573": { + "cmt_msg": "net: rds: Fix possible NULL-pointer dereference", + "cmt_id": "f515112e833791001aaa8ab886af3ca78503617f" } }, "5.10.199": { - "CVE-2023-46813": { - "cmt_msg": "x86/sev: Check for user-space IOIO pointing to kernel space", - "cmt_id": "6550cbe25de182f6c0176909a90b324cb375133f" + "CVE-2023-52475": { + "cmt_msg": "Input: powermate - fix use-after-free in powermate_config_complete", + "cmt_id": "cd2fbfd8b922b7fdd50732e47d797754ab59cb06" }, - "CVE-2023-5717": { - "cmt_msg": "perf: Disallow mis-matched inherited group reads", - "cmt_id": "487a8e24643a0effb2ba19cad3227fc75dc3c4b7" + "CVE-2023-52477": { + "cmt_msg": "usb: hub: Guard against accesses to uninitialized BOS descriptors", + "cmt_id": "241f230324337ed5eae3846a554fb6d15169872c" + }, + "CVE-2023-52509": { + "cmt_msg": "ravb: Fix use-after-free issue in ravb_tx_timeout_work()", + "cmt_id": "db9aafa19547833240f58c2998aed7baf414dc82" }, "CVE-2023-46343": { "cmt_msg": "nfc: nci: fix possible NULL pointer dereference in send_acknowledge()", "cmt_id": "c95fa5b20fe03609e0894656fa43c18045b5097e" }, + "CVE-2023-52510": { + "cmt_msg": "ieee802154: ca8210: Fix a potential UAF in ca8210_probe", + "cmt_id": "55e06850c7894f00d41b767c5f5665459f83f58f" + }, + "CVE-2023-52504": { + "cmt_msg": "x86/alternatives: Disable KASAN in apply_alternatives()", + "cmt_id": "6788b10620ca6e98575d1e06e72a8974aad7657e" + }, + "CVE-2023-52507": { + "cmt_msg": "nfc: nci: assert requested protocol is valid", + "cmt_id": "a424807d860ba816aaafc3064b46b456361c0802" + }, + "CVE-2023-52515": { + "cmt_msg": "RDMA/srp: Do not call scsi_done() from srp_abort()", + "cmt_id": "26788a5b48d9d5cd3283d777d238631c8cd7495a" + }, + "CVE-2023-52478": { + "cmt_msg": "HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect", + "cmt_id": "093af62c023537f097d2ebdfaa0bc7c1a6e874e1" + }, "CVE-2023-35827": { "cmt_msg": "ravb: Fix use-after-free issue in ravb_tx_timeout_work()", "cmt_id": "db9aafa19547833240f58c2998aed7baf414dc82" + }, + "CVE-2023-52502": { + "cmt_msg": "net: nfc: fix races in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn()", + "cmt_id": "6ac22ecdaad2ecc662048f8c6b0ceb1ca0699ef9" + }, + "CVE-2023-52503": { + "cmt_msg": "tee: amdtee: fix use-after-free vulnerability in amdtee_close_session", + "cmt_id": "da7ce52a2f6c468946195b116615297d3d113a27" + }, + "CVE-2023-5717": { + "cmt_msg": "perf: Disallow mis-matched inherited group reads", + "cmt_id": "487a8e24643a0effb2ba19cad3227fc75dc3c4b7" + }, + "CVE-2023-46813": { + "cmt_msg": "x86/sev: Check for user-space IOIO pointing to kernel space", + "cmt_id": "6550cbe25de182f6c0176909a90b324cb375133f" } }, "5.10.200": { @@ -127817,6 +164787,74 @@ "cmt_msg": "net: qualcomm: rmnet: fix global oob in rmnet_policy", "cmt_id": "2295c22348faf795e1ccdf618f6eb7afdb2f7447" }, + "CVE-2024-26598": { + "cmt_msg": "KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache", + "cmt_id": "ba7be666740847d967822bed15500656b26bc703" + }, + "CVE-2023-52439": { + "cmt_msg": "uio: Fix use-after-free in uio_open", + "cmt_id": "5e0be1229ae199ebb90b33102f74a0f22d152570" + }, + "CVE-2023-52438": { + "cmt_msg": "binder: fix use-after-free in shinker's callback", + "cmt_id": "c8c1158ffb007197f31f9d9170cf13e4f34cbb5c" + }, + "CVE-2023-6356": { + "cmt_msg": "nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length", + "cmt_id": "f775f2621c2ac5cc3a0b3a64665dad4fb146e510" + }, + "CVE-2023-52456": { + "cmt_msg": "serial: imx: fix tx statemachine deadlock", + "cmt_id": "6e04a9d30509fb53ba6df5d655ed61d607a7cfda" + }, + "CVE-2023-52609": { + "cmt_msg": "binder: fix race between mmput() and do_exit()", + "cmt_id": "7e7a0d86542b0ea903006d3f42f33c4f7ead6918" + }, + "CVE-2023-52451": { + "cmt_msg": "powerpc/pseries/memhp: Fix access beyond end of drmem array", + "cmt_id": "b582aa1f66411d4adcc1aa55b8c575683fb4687e" + }, + "CVE-2023-52436": { + "cmt_msg": "f2fs: explicitly null-terminate the xattr list", + "cmt_id": "3e47740091b05ac8d7836a33afd8646b6863ca52" + }, + "CVE-2023-52454": { + "cmt_msg": "nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length", + "cmt_id": "f775f2621c2ac5cc3a0b3a64665dad4fb146e510" + }, + "CVE-2023-52470": { + "cmt_msg": "drm/radeon: check the alloc_workqueue return value in radeon_crtc_init()", + "cmt_id": "57ca7984806d79b38af528de88fd803babf27feb" + }, + "CVE-2023-52612": { + "cmt_msg": "crypto: scomp - fix req->dst buffer overflow", + "cmt_id": "4518dc468cdd796757190515a9be7408adc8911e" + }, + "CVE-2023-6915": { + "cmt_msg": "ida: Fix crash in ida_free when the bitmap is empty", + "cmt_id": "dbf8b0d9387fa02de0aa047ce23eb3a7bd134e03" + }, + "CVE-2023-46838": { + "cmt_msg": "xen-netback: don't produce zero-size SKB frags", + "cmt_id": "cce8ba6fa4ec43ad778d64823a2f8ca120d362c1" + }, + "CVE-2024-26586": { + "cmt_msg": "mlxsw: spectrum_acl_tcam: Fix stack corruption", + "cmt_id": "56750ea5d15426b5f307554e7699e8b5f76c3182" + }, + "CVE-2024-24860": { + "cmt_msg": "Bluetooth: Fix atomicity violation in {min,max}_key_size_set", + "cmt_id": "394c6c0b6d9bdd7d6ebca35ca9cfbabf44c0c257" + }, + "CVE-2023-52463": { + "cmt_msg": "efivarfs: force RO when remounting if SetVariable is not supported", + "cmt_id": "94c742324ed7e42c5bd6a9ed22e4ec6d764db4d8" + }, + "CVE-2023-52467": { + "cmt_msg": "mfd: syscon: Fix null pointer dereference in of_syscon_register()", + "cmt_id": "927626a2073887ee30ba00633260d4d203f8e875" + }, "CVE-2023-52464": { "cmt_msg": "EDAC/thunderx: Fix possible out-of-bounds string access", "cmt_id": "6aa7865ba7ff7f0ede0035180fb3b9400ceb405a" @@ -127833,10 +164871,6 @@ "cmt_msg": "media: pvrusb2: fix use after free on context disconnection", "cmt_id": "3233d8bf7893550045682192cb227af7fa3defeb" }, - "CVE-2024-26586": { - "cmt_msg": "mlxsw: spectrum_acl_tcam: Fix stack corruption", - "cmt_id": "56750ea5d15426b5f307554e7699e8b5f76c3182" - }, "CVE-2023-52448": { "cmt_msg": "gfs2: Fix kernel NULL pointer dereference in gfs2_rgrp_dump", "cmt_id": "5c28478af371a1c3fdb570ca67f110e1ae60fc37" @@ -127845,53 +164879,17 @@ "cmt_msg": "mtd: Fix gluebi NULL pointer dereference caused by ftl notifier", "cmt_id": "001a3f59d8c914ef8273461d4bf495df384cc5f8" }, - "CVE-2024-24860": { - "cmt_msg": "Bluetooth: Fix atomicity violation in {min,max}_key_size_set", - "cmt_id": "394c6c0b6d9bdd7d6ebca35ca9cfbabf44c0c257" - }, - "CVE-2023-52439": { - "cmt_msg": "uio: Fix use-after-free in uio_open", - "cmt_id": "5e0be1229ae199ebb90b33102f74a0f22d152570" - }, - "CVE-2023-52438": { - "cmt_msg": "binder: fix use-after-free in shinker's callback", - "cmt_id": "c8c1158ffb007197f31f9d9170cf13e4f34cbb5c" + "CVE-2023-52469": { + "cmt_msg": "drivers/amd/pm: fix a use-after-free in kv_parse_power_table", + "cmt_id": "520e213a0b97b64735a13950e9371e0a5d7a5dc3" }, - "CVE-2023-6915": { - "cmt_msg": "ida: Fix crash in ida_free when the bitmap is empty", - "cmt_id": "dbf8b0d9387fa02de0aa047ce23eb3a7bd134e03" - }, - "CVE-2023-52463": { - "cmt_msg": "efivarfs: force RO when remounting if SetVariable is not supported", - "cmt_id": "94c742324ed7e42c5bd6a9ed22e4ec6d764db4d8" - }, - "CVE-2023-52457": { - "cmt_msg": "serial: 8250: omap: Don't skip resource freeing if pm_runtime_resume_and_get() failed", - "cmt_id": "bc57f3ef8a9eb0180606696f586a6dcfaa175ed0" - }, - "CVE-2023-52456": { - "cmt_msg": "serial: imx: fix tx statemachine deadlock", - "cmt_id": "6e04a9d30509fb53ba6df5d655ed61d607a7cfda" - }, - "CVE-2023-52454": { - "cmt_msg": "nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length", - "cmt_id": "f775f2621c2ac5cc3a0b3a64665dad4fb146e510" - }, - "CVE-2023-46838": { - "cmt_msg": "xen-netback: don't produce zero-size SKB frags", - "cmt_id": "cce8ba6fa4ec43ad778d64823a2f8ca120d362c1" - }, - "CVE-2024-26598": { - "cmt_msg": "KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache", - "cmt_id": "ba7be666740847d967822bed15500656b26bc703" - }, - "CVE-2023-52451": { - "cmt_msg": "powerpc/pseries/memhp: Fix access beyond end of drmem array", - "cmt_id": "b582aa1f66411d4adcc1aa55b8c575683fb4687e" + "CVE-2023-6536": { + "cmt_msg": "nvmet-tcp: fix a crash in nvmet_req_complete()", + "cmt_id": "39669fae69f302961d89f38d969c6fcc1d07eb02" }, - "CVE-2023-52436": { - "cmt_msg": "f2fs: explicitly null-terminate the xattr list", - "cmt_id": "3e47740091b05ac8d7836a33afd8646b6863ca52" + "CVE-2024-26633": { + "cmt_msg": "ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim()", + "cmt_id": "da23bd709b46168f7dfc36055801011222b076cd" } }, "5.10.210": { @@ -127899,22 +164897,282 @@ "cmt_msg": "i2c: i801: Fix block process call transactions", "cmt_id": "7a14b8a477b88607d157c24aeb23e7389ec3319f" }, + "CVE-2024-26675": { + "cmt_msg": "ppp_async: limit MRU to 64K", + "cmt_id": "b06e067e93fa4b98acfd3a9f38a398ab91bbc58b" + }, "CVE-2024-1151": { "cmt_msg": "net: openvswitch: limit the number of recursions from action sets", "cmt_id": "55cfccb658fc142d7fbfeae2d0496b7841d128c3" }, - "CVE-2024-1086": { - "cmt_msg": "netfilter: nf_tables: reject QUEUE/DROP verdict parameters", - "cmt_id": "55a60251fa50d4e68175e36666b536a602ce4f6c" + "CVE-2024-26615": { + "cmt_msg": "net/smc: fix illegal rmb_desc access in SMC-D connection dump", + "cmt_id": "5fed92ca32eafbfae8b6bee8ca34cca71c6a8b6d" + }, + "CVE-2024-26614": { + "cmt_msg": "tcp: make sure init the accept_queue's spinlocks once", + "cmt_id": "bc99dcedd2f422d602516762b96c8ef1ae6b2882" + }, + "CVE-2024-26671": { + "cmt_msg": "blk-mq: fix IO hang from sbitmap wakeup race", + "cmt_id": "7610ba1319253225a9ba8a9d28d472fc883b4e2f" + }, + "CVE-2024-26610": { + "cmt_msg": "wifi: iwlwifi: fix a memory corruption", + "cmt_id": "05dd9facfb9a1e056752c0901c6e86416037d15a" + }, + "CVE-2024-26665": { + "cmt_msg": "tunnels: fix out of bounds access when building IPv6 PMTU error", + "cmt_id": "e77bf828f1ca1c47fcff58bdc26b60a9d3dfbe1d" + }, + "CVE-2024-26679": { + "cmt_msg": "inet: read sk->sk_family once in inet_recv_error()", + "cmt_id": "88081ba415224cf413101def4343d660f56d082b" + }, + "CVE-2023-52587": { + "cmt_msg": "IB/ipoib: Fix mcast list locking", + "cmt_id": "ac2630fd3c90ffec34a0bfc4d413668538b0e8f2" + }, + "CVE-2023-52583": { + "cmt_msg": "ceph: fix deadlock or deadcode of misusing dget()", + "cmt_id": "e016e358461b89b231626fcf78c5c38e35c44fd3" + }, + "CVE-2023-52637": { + "cmt_msg": "can: j1939: Fix UAF in j1939_sk_match_filter during setsockopt(SO_J1939_FILTER)", + "cmt_id": "978e50ef8c38dc71bd14d1b0143d554ff5d188ba" + }, + "CVE-2024-26673": { + "cmt_msg": "netfilter: nft_ct: sanitize layer 3 and 4 protocol number in custom expectations", + "cmt_id": "65ee90efc928410c6f73b3d2e0afdd762652c09d" + }, + "CVE-2023-52635": { + "cmt_msg": "PM / devfreq: Synchronize devfreq_monitor_[start/stop]", + "cmt_id": "3399cc7013e761fee9d6eec795e9b31ab0cbe475" + }, + "CVE-2024-26696": { + "cmt_msg": "nilfs2: fix hang in nilfs_lookup_dirty_data_buffers()", + "cmt_id": "98a4026b22ff440c7f47056481bcbbe442f607d6" + }, + "CVE-2023-52435": { + "cmt_msg": "net: prevent mss overflow in skb_segment()", + "cmt_id": "8f8f185643747fbb448de6aab0efa51c679909a3" + }, + "CVE-2023-52630": { + "cmt_msg": "blk-iocost: Fix an UBSAN shift-out-of-bounds warning", + "cmt_id": "9f56f38331171c9a19754004f0664686d67ee48d" + }, + "CVE-2023-52615": { + "cmt_msg": "hwrng: core - Fix page fault dead lock on mmap-ed hwrng", + "cmt_id": "c6a8111aacbfe7a8a70f46cc0de8eed00561693c" + }, + "CVE-2023-52616": { + "cmt_msg": "crypto: lib/mpi - Fix unexpected pointer access in mpi_ec_init", + "cmt_id": "0c3687822259a7628c85cd21a3445cbe3c367165" + }, + "CVE-2023-52617": { + "cmt_msg": "PCI: switchtec: Fix stdev_release() crash after surprise hot remove", + "cmt_id": "4a5d0528cf19dbf060313dffbe047bc11c90c24c" + }, + "CVE-2023-52498": { + "cmt_msg": "PM: sleep: Fix possible deadlocks in core system-wide PM code", + "cmt_id": "f46eb832389f162ad13cb780d0b8cde93641990d" + }, + "CVE-2023-52493": { + "cmt_msg": "bus: mhi: host: Drop chan lock before queuing buffers", + "cmt_id": "20a6dea2d1c68d4e03c6bb50bc12e72e226b5c0e" + }, + "CVE-2023-52492": { + "cmt_msg": "dmaengine: fix NULL pointer in channel unregistration function", + "cmt_id": "9de69732dde4e443c1c7f89acbbed2c45a6a8e17" + }, + "CVE-2023-52491": { + "cmt_msg": "media: mtk-jpeg: Fix use after free bug due to error path handling in mtk_jpeg_dec_device_run", + "cmt_id": "43872f44eee6c6781fea1348b38885d8e78face9" + }, + "CVE-2023-52619": { + "cmt_msg": "pstore/ram: Fix crash when setting number of cpus to an odd number", + "cmt_id": "a63e48cd835c34c38ef671d344cc029b1ea5bf10" + }, + "CVE-2023-52618": { + "cmt_msg": "block/rnbd-srv: Check for unlikely string overflow", + "cmt_id": "95bc866c11974d3e4a9d922275ea8127ff809cf7" + }, + "CVE-2024-26684": { + "cmt_msg": "net: stmmac: xgmac: fix handling of DPP safety error for DMA channels", + "cmt_id": "2fc45a4631ac7837a5c497cb4f7e2115d950fc37" + }, + "CVE-2024-26685": { + "cmt_msg": "nilfs2: fix potential bug in end_buffer_async_write", + "cmt_id": "f3e4963566f58726d3265a727116a42b591f6596" }, "CVE-2024-0607": { "cmt_msg": "netfilter: nf_tables: fix pointer math issue in nft_byteorder_eval()", "cmt_id": "9a865a11d6890d4a789db1eaafebdc8bd092b12c" }, + "CVE-2024-23850": { + "cmt_msg": "btrfs: do not ASSERT() if the newly created subvolume already got read", + "cmt_id": "3f5d47eb163bceb1b9e613c9003bae5fefc0046f" + }, + "CVE-2024-23849": { + "cmt_msg": "net/rds: Fix UBSAN: array-index-out-of-bounds in rds_cmsg_recv", + "cmt_id": "5ae8d50044633306ff160fcf7faa24994175efe1" + }, + "CVE-2023-52599": { + "cmt_msg": "jfs: fix array-index-out-of-bounds in diNewExt", + "cmt_id": "e2b77d107b33bb31c8b1f5c4cb8f277b23728f1e" + }, + "CVE-2024-26707": { + "cmt_msg": "net: hsr: remove WARN_ONCE() in send_hsr_supervision_frame()", + "cmt_id": "0d8011a878fdf96123bc0d6a12e2fe7ced5fddfb" + }, + "CVE-2024-26704": { + "cmt_msg": "ext4: fix double-free of blocks due to wrong extents moved_len", + "cmt_id": "d033a555d9a1cf53dbf3301af7199cc4a4c8f537" + }, + "CVE-2024-26602": { + "cmt_msg": "sched/membarrier: reduce the ability to hammer on sys_membarrier", + "cmt_id": "db896bbe4a9c67cee377e5f6a743350d3ae4acf6" + }, + "CVE-2024-26720": { + "cmt_msg": "mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again", + "cmt_id": "81e7d2530d458548b90a5c5e76b77ad5e5d1c0df" + }, + "CVE-2024-26600": { + "cmt_msg": "phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP", + "cmt_id": "be3b82e4871ba00e9b5d0ede92d396d579d7b3b3" + }, + "CVE-2024-26663": { + "cmt_msg": "tipc: Check the bearer type before calling tipc_udp_nl_bearer_add()", + "cmt_id": "19d7314f2fb9515bdaac9829d4d8eb34edd1fe95" + }, + "CVE-2024-26606": { + "cmt_msg": "binder: signal epoll threads of self-work", + "cmt_id": "a423042052ec2bdbf1e552e621e6a768922363cc" + }, + "CVE-2024-26702": { + "cmt_msg": "iio: magnetometer: rm3100: add boundary check for the value read from RM3100_REG_TMRC", + "cmt_id": "36a49290d7e6d554020057a409747a092b1d3b56" + }, + "CVE-2024-26727": { + "cmt_msg": "btrfs: do not ASSERT() if the newly created subvolume already got read", + "cmt_id": "3f5d47eb163bceb1b9e613c9003bae5fefc0046f" + }, + "CVE-2024-26698": { + "cmt_msg": "hv_netvsc: Fix race condition between netvsc_probe and netvsc_remove", + "cmt_id": "9ec807e7b6f5fcf9499f3baa69f254bb239a847f" + }, + "CVE-2024-26712": { + "cmt_msg": "powerpc/kasan: Fix addr error caused by page alignment", + "cmt_id": "230e89b5ad0a33f530a2a976b3e5e4385cb27882" + }, + "CVE-2024-26644": { + "cmt_msg": "btrfs: don't abort filesystem when attempting to snapshot deleted subvolume", + "cmt_id": "2bdf872bcfe629a6202ffd6641615a8ed00e8464" + }, + "CVE-2024-26645": { + "cmt_msg": "tracing: Ensure visibility when inserting an element into tracing_map", + "cmt_id": "ef70dfa0b1e5084f32635156c9a5c795352ad860" + }, + "CVE-2024-26664": { + "cmt_msg": "hwmon: (coretemp) Fix out-of-bounds memory access", + "cmt_id": "f0da068c75c20ffc5ba28243ff577531dc2af1fd" + }, + "CVE-2023-52622": { + "cmt_msg": "ext4: avoid online resizing failures due to oversized flex bg", + "cmt_id": "cfbbb3199e71b63fc26cee0ebff327c47128a1e8" + }, + "CVE-2024-26640": { + "cmt_msg": "tcp: add sanity checks to rx zerocopy", + "cmt_id": "f48bf9a83b1666d934247cb58a9887d7b3127b6f" + }, + "CVE-2024-26641": { + "cmt_msg": "ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv()", + "cmt_id": "a9bc32879a08f23cdb80a48c738017e39aea1080" + }, + "CVE-2023-52597": { + "cmt_msg": "KVM: s390: fix setting of fpc register", + "cmt_id": "150a3a3871490e8c454ffbac2e60abeafcecff99" + }, + "CVE-2023-52594": { + "cmt_msg": "wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus()", + "cmt_id": "84770a996ad8d7f121ff2fb5a8d149aad52d64c1" + }, "CVE-2023-52429": { "cmt_msg": "dm: limit the number of targets and parameter size area", "cmt_id": "a891a0621e725e85529985139cada8cb5a74a116" }, + "CVE-2024-26627": { + "cmt_msg": "scsi: core: Move scsi_host_busy() out of host lock for waking up EH handler", + "cmt_id": "f5944853f7a961fedc1227dc8f60393f8936d37c" + }, + "CVE-2024-26689": { + "cmt_msg": "ceph: prevent use-after-free in encode_cap_msg()", + "cmt_id": "8180d0c27b93a6eb60da1b08ea079e3926328214" + }, + "CVE-2024-26625": { + "cmt_msg": "llc: call sock_orphan() at release time", + "cmt_id": "d0b5b1f12429df3cd9751ab8b2f53729b77733b7" + }, + "CVE-2023-52598": { + "cmt_msg": "s390/ptrace: handle setting of fpc register correctly", + "cmt_id": "856caf2730ea18cb39e95833719c02a02447dc0a" + }, + "CVE-2023-52603": { + "cmt_msg": "UBSAN: array-index-out-of-bounds in dtSplitRoot", + "cmt_id": "7aa33854477d9c346f5560a1a1fcb3fe7783e2a8" + }, + "CVE-2023-52606": { + "cmt_msg": "powerpc/lib: Validate size for vector operations", + "cmt_id": "beee482cc4c9a6b1dcffb2e190b4fd8782258678" + }, + "CVE-2023-52607": { + "cmt_msg": "powerpc/mm: Fix null-pointer dereference in pgtable_cache_add", + "cmt_id": "aa28eecb43cac6e20ef14dfc50b8892c1fbcda5b" + }, + "CVE-2023-52604": { + "cmt_msg": "FS:JFS:UBSAN:array-index-out-of-bounds in dbAdjTree", + "cmt_id": "de34de6e57bbbc868e4fcf9e98c76b3587cabb0b" + }, + "CVE-2023-52623": { + "cmt_msg": "SUNRPC: Fix a suspicious RCU usage warning", + "cmt_id": "c430e6bb43955c6bf573665fcebf31694925b9f7" + }, + "CVE-2023-52602": { + "cmt_msg": "jfs: fix slab-out-of-bounds Read in dtSearch", + "cmt_id": "1c40ca3d39d769931b28295b3145c25f1decf5a6" + }, + "CVE-2023-52489": { + "cmt_msg": "mm/sparsemem: fix race in accessing memory_section->usage", + "cmt_id": "90ad17575d26874287271127d43ef3c2af876cea" + }, + "CVE-2023-52600": { + "cmt_msg": "jfs: fix uaf in jfs_evict_inode", + "cmt_id": "bc6ef64dbe71136f327d63b2b9071b828af2c2a8" + }, + "CVE-2023-52601": { + "cmt_msg": "jfs: fix array-index-out-of-bounds in dbAdjTree", + "cmt_id": "2037cb9d95f1741885f7daf50e8a028c4ade5317" + }, + "CVE-2023-52486": { + "cmt_msg": "drm: Don't unref the same fb many times by mistake due to deadlock handling", + "cmt_id": "f55261469be87c55df13db76dc945f6bcd825105" + }, + "CVE-2023-52627": { + "cmt_msg": "iio: adc: ad7091r: Allow users to configure device events", + "cmt_id": "1eba6f7ffa295a0eec098c107043074be7cc4ec5" + }, + "CVE-2024-26697": { + "cmt_msg": "nilfs2: fix data corruption in dsync block recovery for small block sizes", + "cmt_id": "364a66be2abdcd4fd426ffa44d9b8f40aafb3caa" + }, + "CVE-2024-26636": { + "cmt_msg": "llc: make llc_ui_sendmsg() more robust against bonding changes", + "cmt_id": "04f2a74b562f3a7498be0399309669f342793d8c" + }, + "CVE-2023-52595": { + "cmt_msg": "wifi: rt2x00: restart beacon queue when hardware reset", + "cmt_id": "69e905beca193125820c201ab3db4fb0e245124e" + }, "CVE-2024-0340": { "cmt_msg": "vhost: use kzalloc() instead of kmalloc() followed by memset()", "cmt_id": "cda4ca038cafe016bd8dcac8cac83d771dfdcbf0" @@ -127923,20 +165181,210 @@ "cmt_msg": "dm: limit the number of targets and parameter size area", "cmt_id": "a891a0621e725e85529985139cada8cb5a74a116" }, - "CVE-2024-23850": { - "cmt_msg": "btrfs: do not ASSERT() if the newly created subvolume already got read", - "cmt_id": "3f5d47eb163bceb1b9e613c9003bae5fefc0046f" + "CVE-2024-26808": { + "cmt_msg": "netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain", + "cmt_id": "9489e214ea8f2a90345516016aa51f2db3a8cc2f" }, - "CVE-2024-23849": { - "cmt_msg": "net/rds: Fix UBSAN: array-index-out-of-bounds in rds_cmsg_recv", - "cmt_id": "5ae8d50044633306ff160fcf7faa24994175efe1" + "CVE-2024-1086": { + "cmt_msg": "netfilter: nf_tables: reject QUEUE/DROP verdict parameters", + "cmt_id": "55a60251fa50d4e68175e36666b536a602ce4f6c" }, - "CVE-2023-52435": { - "cmt_msg": "net: prevent mss overflow in skb_segment()", - "cmt_id": "8f8f185643747fbb448de6aab0efa51c679909a3" + "CVE-2024-26635": { + "cmt_msg": "llc: Drop support for ETH_P_TR_802_2.", + "cmt_id": "9ccdef19cf9497c2803b005369668feb91cacdfd" + } + }, + "5.10.211": { + "CVE-2024-26733": { + "cmt_msg": "arp: Prevent overflow in arp_req_get().", + "cmt_id": "dbc9b22d0ed319b4e29034ce0a3fe32a3ee2c587" + }, + "CVE-2024-26736": { + "cmt_msg": "afs: Increase buffer size in afs_update_volume_status()", + "cmt_id": "d9b5e2b7a8196850383c70d099bfd39e81ab6637" + }, + "CVE-2024-26778": { + "cmt_msg": "fbdev: savage: Error out if pixclock equals zero", + "cmt_id": "512ee6d6041e007ef5bf200c6e388e172a2c5b24" + }, + "CVE-2024-26735": { + "cmt_msg": "ipv6: sr: fix possible use-after-free and null-ptr-deref", + "cmt_id": "65c38f23d10ff79feea1e5d50b76dc7af383c1e6" + }, + "CVE-2024-26776": { + "cmt_msg": "spi: hisi-sfc-v3xx: Return IRQ_NONE if no interrupts were detected", + "cmt_id": "e94da8aca2e78ef9ecca02eb211869eacd5504e5" + }, + "CVE-2024-26777": { + "cmt_msg": "fbdev: sis: Error out if pixclock equals zero", + "cmt_id": "cd36da760bd1f78c63c7078407baf01dd724f313" + }, + "CVE-2024-26752": { + "cmt_msg": "l2tp: pass correct message length to ip6_append_data", + "cmt_id": "dcb4d14268595065c85dc5528056713928e17243" + }, + "CVE-2024-26754": { + "cmt_msg": "gtp: fix use-after-free and null-ptr-deref in gtp_genl_dump_pdp()", + "cmt_id": "2e534fd15e5c2ca15821c897352cf0e8a3e30dca" + }, + "CVE-2024-26773": { + "cmt_msg": "ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found()", + "cmt_id": "927794a02169778c9c2e7b25c768ab3ea8c1dc03" + }, + "CVE-2024-26771": { + "cmt_msg": "dmaengine: ti: edma: Add some null pointer checks to the edma_probe", + "cmt_id": "c432094aa7c9970f2fa10d2305d550d3810657ce" + }, + "CVE-2023-52434": { + "cmt_msg": "smb: client: fix potential OOBs in smb2_parse_contexts()", + "cmt_id": "13fb0fc4917621f3dfa285a27eaf7151d770b5e5" + }, + "CVE-2024-26779": { + "cmt_msg": "wifi: mac80211: fix race condition on enabling fast-xmit", + "cmt_id": "5ffab99e070b9f8ae0cf60c3c3602b84eee818dd" + }, + "CVE-2023-52497": { + "cmt_msg": "erofs: fix lz4 inplace decompression", + "cmt_id": "a0180e940cf1aefa7d516e20b259ad34f7a8b379" + }, + "CVE-2024-26751": { + "cmt_msg": "ARM: ep93xx: Add terminator to gpiod_lookup_table", + "cmt_id": "70d92abbe29692a3de8697ae082c60f2d21ab482" + }, + "CVE-2024-26747": { + "cmt_msg": "usb: roles: fix NULL pointer issue when put module's reference", + "cmt_id": "e279bf8e51893e1fe160b3d8126ef2dd00f661e1" + }, + "CVE-2024-26744": { + "cmt_msg": "RDMA/srpt: Support specifying the srpt_service_guid parameter", + "cmt_id": "5a5c039dac1b1b7ba3e91c791f4421052bf79b82" + }, + "CVE-2024-26743": { + "cmt_msg": "RDMA/qedr: Fix qedr_create_user_qp error flow", + "cmt_id": "5639414a52a29336ffa1ede80a67c6d927acbc5a" + }, + "CVE-2024-26764": { + "cmt_msg": "fs/aio: Restrict kiocb_set_cancel_fn() to I/O submitted via libaio", + "cmt_id": "ea1cd64d59f22d6d13f367d62ec6e27b9344695f" + }, + "CVE-2024-26766": { + "cmt_msg": "IB/hfi1: Fix sdma.h tx->num_descs off-by-one error", + "cmt_id": "3f38d22e645e2e994979426ea5a35186102ff3c2" + }, + "CVE-2024-26749": { + "cmt_msg": "usb: cdns3: fixed memory use after free at cdns3_gadget_ep_disable()", + "cmt_id": "b40328eea93c75a5645891408010141a0159f643" + }, + "CVE-2024-26748": { + "cmt_msg": "usb: cdns3: fix memory double free when handle zero packet", + "cmt_id": "1e204a8e9eb514e22a6567fb340ebb47df3f3a48" + }, + "CVE-2024-26763": { + "cmt_msg": "dm-crypt: don't modify the data when using authenticated encryption", + "cmt_id": "3c652f6fa1e1f9f02c3fbf359d260ad153ec5f90" + }, + "CVE-2024-0565": { + "cmt_msg": "smb: client: fix OOB in receive_encrypted_standard()", + "cmt_id": "b03c8099a738a04d2343547ae6a04e5f0f63d3fa" + }, + "CVE-2024-26772": { + "cmt_msg": "ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal()", + "cmt_id": "ffeb72a80a82aba59a6774b0611f792e0ed3b0b7" + } + }, + "5.10.212": { + "CVE-2024-26782": { + "cmt_msg": "mptcp: fix double-free on socket dismantle", + "cmt_id": "f74362a004225df935863dea6eb7d82daaa5b16e" + }, + "CVE-2024-26688": { + "cmt_msg": "fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super", + "cmt_id": "80d852299987a8037be145a94f41874228f1a773" + }, + "CVE-2024-26790": { + "cmt_msg": "dmaengine: fsl-qdma: fix SoC may hang on 16 byte unaligned read", + "cmt_id": "bb3a06e9b9a30e33d96aadc0e077be095a4f8580" + }, + "CVE-2024-26791": { + "cmt_msg": "btrfs: dev-replace: properly validate device names", + "cmt_id": "2886fe308a83968dde252302884a1e63351cf16d" + }, + "CVE-2024-26793": { + "cmt_msg": "gtp: fix use-after-free and null-ptr-deref in gtp_newlink()", + "cmt_id": "e668b92a3a01429923fd5ca13e99642aab47de69" + }, + "CVE-2024-26788": { + "cmt_msg": "dmaengine: fsl-qdma: init irq after reg initialization", + "cmt_id": "9579a21e99fe8dab22a253050ddff28d340d74e1" + }, + "CVE-2024-26795": { + "cmt_msg": "riscv: Sparse-Memory/vmemmap out-of-bounds fix", + "cmt_id": "8af1c121b0102041809bc137ec600d1865eaeedd" + }, + "CVE-2024-0841": { + "cmt_msg": "fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super", + "cmt_id": "80d852299987a8037be145a94f41874228f1a773" + }, + "CVE-2024-26804": { + "cmt_msg": "net: ip_tunnel: prevent perpetual headroom growth", + "cmt_id": "2e95350fe9db9d53c701075060ac8ac883b68aee" + }, + "CVE-2024-26805": { + "cmt_msg": "netlink: Fix kernel-infoleak-after-free in __skb_datagram_iter", + "cmt_id": "f19d1f98e60e68b11fc60839105dd02a30ec0d77" + }, + "CVE-2024-26801": { + "cmt_msg": "Bluetooth: Avoid potential use-after-free in hci_error_reset", + "cmt_id": "6dd0a9dfa99f8990a08eb8fdd8e79bee31c7d8e2" + }, + "CVE-2024-26622": { + "cmt_msg": "tomoyo: fix UAF write bug in tomoyo_write_control()", + "cmt_id": "a23ac1788e2c828c097119e9a3178f0b7e503fee" + } + }, + "5.10.213": { + "CVE-2024-26787": { + "cmt_msg": "mmc: mmci: stm32: fix DMA API overlapping mappings warning", + "cmt_id": "0224cbc53ba82b84affa7619b6d1b1a254bc2c53" + }, + "CVE-2024-26659": { + "cmt_msg": "xhci: handle isoc Babble and Buffer Overrun events properly", + "cmt_id": "696e4112e5c1ee61996198f0ebb6ca3fab55166e" + } + }, + "5.10.214": { + "CVE-2023-7042": { + "cmt_msg": "wifi: ath10k: fix NULL pointer dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev()", + "cmt_id": "e1dc7aa814a95aeeb1b2c05be2b62af8423b15cc" + }, + "CVE-2023-52447": { + "cmt_msg": "bpf: Defer the free of inner map when necessary", + "cmt_id": "90c445799fd1dc214d7c6279c144e33a35e29ef2" + }, + "CVE-2024-26651": { + "cmt_msg": "sr9800: Add check for usbnet_get_endpoints", + "cmt_id": "6b4a39acafaf0186ed8e97c16e0aa6fca0e52009" + }, + "CVE-2024-26809": { + "cmt_msg": "netfilter: nft_set_pipapo: release elements in clone only from destroy path", + "cmt_id": "b36b83297ff4910dfc8705402c8abffd4bbf8144" + }, + "CVE-2023-6270": { + "cmt_msg": "aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts", + "cmt_id": "faf0b4c5e00bb680e8e43ac936df24d3f48c8e65" + }, + "CVE-2024-22099": { + "cmt_msg": "Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security", + "cmt_id": "81d7d920a22fd58ef9aedb1bd0a68ee32bd23e96" } }, "outstanding": { + "CVE-2024-26677": { + "cmt_msg": "rxrpc: Fix delayed ACKs to not set the reference serial number" + }, + "CVE-2024-26676": { + "cmt_msg": "af_unix: Call kfree_skb() for dead unix_(sk)->oob_skb in GC." + }, "CVE-2020-26556": { "cmt_msg": "" }, @@ -127955,24 +165403,51 @@ "CVE-2023-4010": { "cmt_msg": "" }, + "CVE-2024-26770": { + "cmt_msg": "HID: nvidia-shield: Add missing null pointer checks to LED initialization" + }, "CVE-2022-38457": { "cmt_msg": "drm/vmwgfx: Remove rcu locks from user resources" }, "CVE-2022-20424": { "cmt_msg": "io_uring: remove io_identity" }, + "CVE-2024-26774": { + "cmt_msg": "ext4: avoid dividing by 0 in mb_update_avg_fragment_size() when block bitmap corrupt" + }, + "CVE-2021-46969": { + "cmt_msg": "bus: mhi: core: Fix invalid error returning in mhi_queue" + }, + "CVE-2024-26803": { + "cmt_msg": "net: veth: clear GRO when clearing XDP even when down" + }, "CVE-2023-52458": { "cmt_msg": "block: add check that partition length needs to be aligned with block size" }, "CVE-2018-1121": { "cmt_msg": "" }, + "CVE-2023-28746": { + "cmt_msg": "x86/mmio: Disable KVM mitigation when X86_FEATURE_CLEAR_CPU_BUF is set" + }, + "CVE-2024-26672": { + "cmt_msg": "drm/amdgpu: Fix variable 'mca_funcs' dereferenced before NULL check in 'amdgpu_mca_smu_get_mca_entry()'" + }, "CVE-2019-19378": { "cmt_msg": "" }, + "CVE-2023-52614": { + "cmt_msg": "PM / devfreq: Fix buffer overflow in trans_stat_show" + }, "CVE-2022-3108": { "cmt_msg": "drm/amdkfd: Check for null pointer after calling kmemdup" }, + "CVE-2024-26784": { + "cmt_msg": "pmdomain: arm: Fix NULL dereference on scmi_perf_domain removal" + }, + "CVE-2024-26789": { + "cmt_msg": "crypto: arm64/neonbs - fix out-of-bounds access on short input" + }, "CVE-2022-0998": { "cmt_msg": "vdpa: clean up get_config_size ret value handling" }, @@ -127982,6 +165457,9 @@ "CVE-2022-3344": { "cmt_msg": "KVM: x86: nSVM: harden svm_free_nested against freeing vmcb02 while still in use" }, + "CVE-2023-31081": { + "cmt_msg": "" + }, "CVE-2023-23000": { "cmt_msg": "phy: tegra: xusb: Fix return value of tegra_xusb_find_port_node function" }, @@ -128003,6 +165481,12 @@ "CVE-2023-6240": { "cmt_msg": "" }, + "CVE-2024-26700": { + "cmt_msg": "drm/amd/display: Fix MST Null Ptr for RV" + }, + "CVE-2024-26706": { + "cmt_msg": "parisc: Fix random data corruption from exception handler" + }, "CVE-2020-24504": { "cmt_msg": "ice: create scheduler aggregator node config and move VSIs" }, @@ -128012,20 +165496,32 @@ "CVE-2020-11725": { "cmt_msg": "" }, + "CVE-2024-26739": { + "cmt_msg": "net/sched: act_mirred: don't override retval if we already lost the skb" + }, "CVE-2022-0382": { "cmt_msg": "net ticp:fix a kernel-infoleak in __tipc_sendmsg()" }, + "CVE-2024-26607": { + "cmt_msg": "drm/bridge: sii902x: Fix probing race issue" + }, "CVE-2022-23825": { "cmt_msg": "" }, + "CVE-2023-52621": { + "cmt_msg": "bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers" + }, "CVE-2021-33061": { "cmt_msg": "ixgbe: add improvement for MDD response functionality" }, "CVE-2022-1263": { "cmt_msg": "KVM: avoid NULL pointer dereference in kvm_dirty_ring_push" }, - "CVE-2024-26589": { - "cmt_msg": "bpf: Reject variable offset alu on PTR_TO_FLOW_KEYS" + "CVE-2024-26767": { + "cmt_msg": "drm/amd/display: fixed integer types and null check locations" + }, + "CVE-2023-52629": { + "cmt_msg": "sh: push-switch: Reorder cleanup operations to avoid use-after-free bug" }, "CVE-2023-3389": { "cmt_msg": "io_uring: mutex locked poll hashing" @@ -128045,8 +165541,20 @@ "CVE-2022-2209": { "cmt_msg": "" }, - "CVE-2023-7042": { - "cmt_msg": "" + "CVE-2021-46970": { + "cmt_msg": "bus: mhi: pci_generic: Remove WQ_MEM_RECLAIM flag from state workqueue" + }, + "CVE-2023-52620": { + "cmt_msg": "netfilter: nf_tables: disallow timeout for anonymous sets" + }, + "CVE-2022-4696": { + "cmt_msg": "io_uring: remove any grabbing of context" + }, + "CVE-2023-52624": { + "cmt_msg": "drm/amd/display: Wake DMCUB before executing GPINT commands" + }, + "CVE-2023-52625": { + "cmt_msg": "drm/amd/display: Refactor DMCUB enter/exit idle interface" }, "CVE-2022-3595": { "cmt_msg": "cifs: fix double-fault crash during ntlmssp" @@ -128054,8 +165562,11 @@ "CVE-2021-26934": { "cmt_msg": "" }, + "CVE-2023-52559": { + "cmt_msg": "iommu/vt-d: Avoid memory allocation in iommu_suspend()" + }, "CVE-2023-47233": { - "cmt_msg": "" + "cmt_msg": "wifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach" }, "CVE-2022-3176": { "cmt_msg": "io_uring: fix UAF due to missing POLLFREE handling" @@ -128069,14 +165580,20 @@ "CVE-2021-3669": { "cmt_msg": "ipc: replace costly bailout check in sysvipc_find_ipc()" }, + "CVE-2024-26691": { + "cmt_msg": "KVM: arm64: Fix circular locking dependency" + }, "CVE-2023-3397": { "cmt_msg": "" }, "CVE-2024-26592": { "cmt_msg": "ksmbd: fix UAF issue in ksmbd_tcp_new_connection()" }, - "CVE-2024-26591": { - "cmt_msg": "bpf: Fix re-attachment branch in bpf_tracing_prog_attach" + "CVE-2024-26668": { + "cmt_msg": "netfilter: nft_limit: reject configurations that cause integer overflow" + }, + "CVE-2024-26589": { + "cmt_msg": "bpf: Reject variable offset alu on PTR_TO_FLOW_KEYS" }, "CVE-2020-15802": { "cmt_msg": "" @@ -128093,11 +165610,35 @@ "CVE-2022-3636": { "cmt_msg": "net: ethernet: mtk_eth_soc: use after free in __mtk_ppe_check_skb()" }, - "CVE-2023-6356": { - "cmt_msg": "" + "CVE-2024-26738": { + "cmt_msg": "powerpc/pseries/iommu: DLPAR add doesn't completely initialize pci_controller" }, - "CVE-2022-4696": { - "cmt_msg": "io_uring: remove any grabbing of context" + "CVE-2024-26745": { + "cmt_msg": "powerpc/pseries/iommu: IOMMU table is not initialized for kdump over SR-IOV" + }, + "CVE-2024-26756": { + "cmt_msg": "md: Don't register sync_thread for reshape directly" + }, + "CVE-2024-26757": { + "cmt_msg": "md: Don't ignore read-only array in md_check_recovery()" + }, + "CVE-2021-47101": { + "cmt_msg": "asix: fix uninit-value in asix_mdio_read()" + }, + "CVE-2021-46987": { + "cmt_msg": "btrfs: fix deadlock when cloning inline extents and using qgroups" + }, + "CVE-2024-26661": { + "cmt_msg": "drm/amd/display: Add NULL test for 'timing generator' in 'dcn21_set_pipe()'" + }, + "CVE-2021-47105": { + "cmt_msg": "ice: xsk: return xsk buffers back to pool when cleaning the ring" + }, + "CVE-2021-47028": { + "cmt_msg": "mt76: mt7915: fix txrate reporting" + }, + "CVE-2023-52638": { + "cmt_msg": "can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock" }, "CVE-2019-15239": { "cmt_msg": "unknown" @@ -128105,15 +165646,30 @@ "CVE-2022-20409": { "cmt_msg": "io_uring: remove io_identity" }, + "CVE-2023-52634": { + "cmt_msg": "drm/amd/display: Fix disable_otg_wa logic" + }, "CVE-2007-3719": { "cmt_msg": "" }, - "CVE-2023-52434": { - "cmt_msg": "smb: client: fix potential OOBs in smb2_parse_contexts()" + "CVE-2023-52632": { + "cmt_msg": "drm/amdkfd: Fix lock dependency warning with srcu" }, "CVE-2022-2961": { "cmt_msg": "" }, + "CVE-2024-26680": { + "cmt_msg": "net: atlantic: Fix DMA mapping for PTP hwts ring" + }, + "CVE-2024-26740": { + "cmt_msg": "net/sched: act_mirred: use the backlog for mirred ingress" + }, + "CVE-2024-26686": { + "cmt_msg": "fs/proc: do_task_stat: use sig->stats_lock to gather the threads/children stats" + }, + "CVE-2024-26687": { + "cmt_msg": "xen/events: close evtchn after mapping cleanup" + }, "CVE-2023-21400": { "cmt_msg": "" }, @@ -128141,6 +165697,9 @@ "CVE-2024-23848": { "cmt_msg": "" }, + "CVE-2023-52639": { + "cmt_msg": "KVM: s390: vsie: fix race during shadow creation" + }, "CVE-2023-6535": { "cmt_msg": "" }, @@ -128159,26 +165718,20 @@ "CVE-2024-26584": { "cmt_msg": "net: tls: handle backlogging of crypto requests" }, - "CVE-2024-26587": { - "cmt_msg": "net: netdevsim: don't try to destroy PHC on VFs" - }, "CVE-2022-1247": { "cmt_msg": "" }, "CVE-2022-2991": { "cmt_msg": "remove the lightnvm subsystem" }, - "CVE-2024-26588": { - "cmt_msg": "LoongArch: BPF: Prevent out-of-bounds memory access" - }, - "CVE-2023-6270": { - "cmt_msg": "" + "CVE-2021-47135": { + "cmt_msg": "mt76: mt7921: fix possible AOOB issue in mt7921_mcu_tx_rate_report" }, "CVE-2022-3624": { "cmt_msg": "bonding: fix reference count leak in balance-alb mode" }, - "CVE-2024-0841": { - "cmt_msg": "" + "CVE-2021-47133": { + "cmt_msg": "HID: amd_sfh: Fix memory leak in amd_sfh_work" }, "CVE-2022-47946": { "cmt_msg": "io_uring: kill sqo_dead and sqo submission halting" @@ -128192,8 +165745,20 @@ "CVE-2021-4023": { "cmt_msg": "io-wq: fix cancellation on create-worker failure" }, - "CVE-2022-4543": { - "cmt_msg": "" + "CVE-2021-47037": { + "cmt_msg": "ASoC: q6afe-clocks: fix reprobing of the driver" + }, + "CVE-2021-47036": { + "cmt_msg": "udp: skip L4 aggregation for UDP tunnel packets" + }, + "CVE-2023-52571": { + "cmt_msg": "power: supply: rk817: Fix node refcount leak" + }, + "CVE-2023-52572": { + "cmt_msg": "cifs: Fix UAF in cifs_demultiplex_thread()" + }, + "CVE-2023-52610": { + "cmt_msg": "net/sched: act_ct: fix skb leak and crash on ooo frags" }, "CVE-2017-13693": { "cmt_msg": "" @@ -128201,27 +165766,54 @@ "CVE-2021-0399": { "cmt_msg": "" }, + "CVE-2024-26648": { + "cmt_msg": "drm/amd/display: Fix variable deferencing before NULL check in edp_setup_replay()" + }, + "CVE-2023-52488": { + "cmt_msg": "serial: sc16is7xx: convert from _raw_ to _noinc_ regmap functions for FIFO" + }, + "CVE-2023-52641": { + "cmt_msg": "fs/ntfs3: Add NULL ptr dereference checking at the end of attr_allocate_frame()" + }, "CVE-2017-13694": { "cmt_msg": "" }, - "CVE-2024-0564": { - "cmt_msg": "" + "CVE-2023-52484": { + "cmt_msg": "iommu/arm-smmu-v3: Fix soft lockup triggered by arm_smmu_mm_invalidate_range" + }, + "CVE-2023-52485": { + "cmt_msg": "drm/amd/display: Wake DMCUB before sending a command" + }, + "CVE-2023-52480": { + "cmt_msg": "ksmbd: fix race condition between session lookup and expire" }, "CVE-2012-4542": { "cmt_msg": "" }, + "CVE-2023-52482": { + "cmt_msg": "x86/srso: Add SRSO mitigation for Hygon processors" + }, "CVE-2023-23586": { "cmt_msg": "io_uring: remove io_identity" }, "CVE-2023-2176": { "cmt_msg": "RDMA/core: Refactor rdma_bind_addr" }, + "CVE-2022-48628": { + "cmt_msg": "ceph: drop messages from MDS when unmounting" + }, "CVE-2013-7445": { "cmt_msg": "" }, "CVE-2022-39188": { "cmt_msg": "mmu_gather: Force tlb-flush VM_PFNMAP vmas" }, + "CVE-2024-26758": { + "cmt_msg": "md: Don't ignore suspended array in md_check_recovery()" + }, + "CVE-2024-26775": { + "cmt_msg": "aoe: avoid potential deadlock at set_capacity" + }, "CVE-2024-24859": { "cmt_msg": "" }, @@ -128246,16 +165838,46 @@ "CVE-2023-31082": { "cmt_msg": "" }, - "CVE-2023-31081": { - "cmt_msg": "" + "CVE-2021-47125": { + "cmt_msg": "sch_htb: fix refcount leak in htb_parent_to_leaf_offload" }, "CVE-2022-38096": { "cmt_msg": "" }, + "CVE-2023-52569": { + "cmt_msg": "btrfs: remove BUG() after failure to insert delayed dir index item" + }, + "CVE-2023-52568": { + "cmt_msg": "x86/sgx: Resolves SECS reclaim vs. page fault for EAUG race" + }, + "CVE-2024-26759": { + "cmt_msg": "mm/swap: fix race when skipping swapcache" + }, + "CVE-2023-52563": { + "cmt_msg": "drm/meson: fix memory leak on ->hpd_notify callback" + }, "CVE-2022-3523": { "cmt_msg": "mm/memory.c: fix race when faulting a device private page" }, + "CVE-2023-52561": { + "cmt_msg": "arm64: dts: qcom: sdm845-db845c: Mark cont splash memory region as reserved" + }, "CVE-2024-23307": { + "cmt_msg": "md/raid5: fix atomicity violation in raid5_cache_count" + }, + "CVE-2023-52640": { + "cmt_msg": "fs/ntfs3: Fix oob in ntfs_listxattr" + }, + "CVE-2023-52565": { + "cmt_msg": "media: uvcvideo: Fix OOB read" + }, + "CVE-2024-26658": { + "cmt_msg": "bcachefs: grab s_umount only if snapshotting" + }, + "CVE-2024-26669": { + "cmt_msg": "net/sched: flower: Fix chain template offload" + }, + "CVE-2022-4543": { "cmt_msg": "" }, "CVE-2008-4609": { @@ -128273,12 +165895,27 @@ "CVE-2022-20568": { "cmt_msg": "Merge tag 'io_uring-worker.v3-2021-02-25' of git://git.kernel.dk/linux-block" }, + "CVE-2024-26699": { + "cmt_msg": "drm/amd/display: Fix array-index-out-of-bounds in dcn35_clkmgr" + }, + "CVE-2021-46926": { + "cmt_msg": "ALSA: hda: intel-sdw-acpi: harden detection of controller" + }, "CVE-2020-0347": { "cmt_msg": "" }, + "CVE-2024-26655": { + "cmt_msg": "Fix memory leak in posix_clock_open()" + }, + "CVE-2023-52591": { + "cmt_msg": "reiserfs: Avoid touching renamed directory if parent does not change" + }, "CVE-2021-3714": { "cmt_msg": "" }, + "CVE-2024-26654": { + "cmt_msg": "ALSA: sh: aica: reorder cleanup operations to avoid UAF bugs" + }, "CVE-2023-4133": { "cmt_msg": "cxgb4: fix use after free bugs caused by circular dependency problem" }, @@ -128294,20 +165931,29 @@ "CVE-2023-20928": { "cmt_msg": "android: binder: stop saving a pointer to the VMA" }, + "CVE-2024-26623": { + "cmt_msg": "pds_core: Prevent race issues involving the adminq" + }, "CVE-2020-12362": { "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" }, "CVE-2020-12363": { "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" }, + "CVE-2024-26656": { + "cmt_msg": "drm/amdgpu: fix use-after-free bug" + }, "CVE-2020-12364": { "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" }, + "CVE-2024-26726": { + "cmt_msg": "btrfs: don't drop extent_map for free space inode on write error" + }, "CVE-2022-0500": { "cmt_msg": "bpf: Introduce MEM_RDONLY flag" }, "CVE-2024-24861": { - "cmt_msg": "" + "cmt_msg": "media: xc4000: Fix atomicity violation in xc4000_get_frequency" }, "CVE-2024-24864": { "cmt_msg": "" @@ -128315,9 +165961,18 @@ "CVE-2023-37454": { "cmt_msg": "" }, + "CVE-2023-52596": { + "cmt_msg": "sysctl: Fix out of bounds access for empty sysctl registers" + }, + "CVE-2021-47014": { + "cmt_msg": "net/sched: act_ct: fix wild memory access when clearing fragments" + }, "CVE-2022-2327": { "cmt_msg": "io_uring: remove any grabbing of context" }, + "CVE-2023-52590": { + "cmt_msg": "ocfs2: Avoid touching renamed directory if parent does not change" + }, "CVE-2022-0480": { "cmt_msg": "memcg: enable accounting for file lock caches" }, @@ -128327,27 +165982,39 @@ "CVE-2022-3642": { "cmt_msg": "" }, - "CVE-2011-4917": { + "CVE-2022-25265": { "cmt_msg": "" }, + "CVE-2023-52519": { + "cmt_msg": "HID: intel-ish-hid: ipc: Disable and reenable ACPI GPE bit" + }, + "CVE-2023-52517": { + "cmt_msg": "spi: sun6i: fix race between DMA RX transfer completion and RX FIFO drain" + }, "CVE-2022-23222": { "cmt_msg": "bpf: Replace PTR_TO_XXX_OR_NULL with PTR_TO_XXX | PTR_MAYBE_NULL" }, + "CVE-2024-26797": { + "cmt_msg": "drm/amd/display: Prevent potential buffer overflow in map_hw_resources" + }, "CVE-2019-15902": { "cmt_msg": "unknown" }, "CVE-2024-25739": { "cmt_msg": "" }, + "CVE-2023-52511": { + "cmt_msg": "spi: sun6i: reduce DMA RX transfer width to single byte" + }, + "CVE-2023-52530": { + "cmt_msg": "wifi: mac80211: fix potential key use-after-free" + }, "CVE-2019-15290": { "cmt_msg": "" }, "CVE-2023-4134": { "cmt_msg": "Input: cyttsp4_core - change del_timer_sync() to timer_shutdown_sync()" }, - "CVE-2023-6536": { - "cmt_msg": "" - }, "CVE-2023-1295": { "cmt_msg": "io_uring: get rid of intermediate IORING_OP_CLOSE stage" }, @@ -128369,14 +166036,32 @@ "CVE-2010-5321": { "cmt_msg": "" }, + "CVE-2024-2193": { + "cmt_msg": "" + }, + "CVE-2024-0564": { + "cmt_msg": "" + }, "CVE-2018-12930": { "cmt_msg": "" }, "CVE-2018-12931": { "cmt_msg": "" }, - "CVE-2024-0565": { - "cmt_msg": "smb: client: fix OOB in receive_encrypted_standard()" + "CVE-2024-26650": { + "cmt_msg": "platform/x86: p2sb: Allow p2sb_bar() calls during PCI device probe" + }, + "CVE-2023-52481": { + "cmt_msg": "arm64: errata: Add Cortex-A520 speculative unprivileged load workaround" + }, + "CVE-2023-52585": { + "cmt_msg": "drm/amdgpu: Fix possible NULL dereference in amdgpu_ras_query_error_status_helper()" + }, + "CVE-2023-52584": { + "cmt_msg": "spmi: mediatek: Fix UAF on device remove" + }, + "CVE-2023-52586": { + "cmt_msg": "drm/msm/dpu: Add mutex lock in control vblank irq" }, "CVE-2021-39801": { "cmt_msg": "" @@ -128384,11 +166069,23 @@ "CVE-2021-39800": { "cmt_msg": "" }, - "CVE-2023-52447": { - "cmt_msg": "bpf: Defer the free of inner map when necessary" + "CVE-2024-26765": { + "cmt_msg": "LoongArch: Disable IRQ before init_fn() for nonboot CPUs" }, - "CVE-2024-22099": { - "cmt_msg": "" + "CVE-2024-26769": { + "cmt_msg": "nvmet-fc: avoid deadlock on delete association path" + }, + "CVE-2021-47147": { + "cmt_msg": "ptp: ocp: Fix a resource leak in an error handling path" + }, + "CVE-2023-52589": { + "cmt_msg": "media: rkisp1: Fix IRQ disable race issue" + }, + "CVE-2021-47140": { + "cmt_msg": "iommu/amd: Clear DMA ops when switching domain" + }, + "CVE-2024-26768": { + "cmt_msg": "LoongArch: Change acpi_core_pic[NR_CPUS] to acpi_core_pic[MAX_CORE_PIC]" }, "CVE-2022-45885": { "cmt_msg": "" @@ -128399,21 +166096,45 @@ "CVE-2024-25740": { "cmt_msg": "" }, - "CVE-2024-25741": { - "cmt_msg": "" + "CVE-2023-52476": { + "cmt_msg": "perf/x86/lbr: Filter vsyscall addresses" }, "CVE-2023-22995": { "cmt_msg": "usb: dwc3: dwc3-qcom: Add missing platform_device_put() in dwc3_qcom_acpi_register_core" }, + "CVE-2023-52508": { + "cmt_msg": "nvme-fc: Prevent null pointer dereference in nvme_fc_io_getuuid()" + }, "CVE-2021-4204": { "cmt_msg": "bpf: Generalize check_ctx_reg for reuse with other types" }, + "CVE-2023-52633": { + "cmt_msg": "um: time-travel: fix time corruption" + }, + "CVE-2023-52506": { + "cmt_msg": "LoongArch: Set all reserved memblocks on Node#0 at initialization" + }, + "CVE-2023-52479": { + "cmt_msg": "ksmbd: fix uaf in smb20_oplock_break_ack" + }, "CVE-2024-26594": { "cmt_msg": "ksmbd: validate mech token in session setup" }, "CVE-2021-3542": { "cmt_msg": "" }, + "CVE-2023-52588": { + "cmt_msg": "f2fs: fix to tag gcing flag on page during block migration" + }, + "CVE-2024-26646": { + "cmt_msg": "thermal: intel: hfi: Add syscore callbacks for system-wide PM" + }, + "CVE-2024-26647": { + "cmt_msg": "drm/amd/display: Fix late derefrence 'dsc' check in 'link_set_dsc_pps_packet()'" + }, + "CVE-2021-47094": { + "cmt_msg": "KVM: x86/mmu: Don't advance iterator after restart due to yielding" + }, "CVE-2022-27672": { "cmt_msg": "x86/speculation: Identify processors vulnerable to SMT RSB predictions" }, @@ -128435,14 +166156,20 @@ "CVE-2015-2877": { "cmt_msg": "" }, + "CVE-2024-26642": { + "cmt_msg": "netfilter: nf_tables: disallow anonymous set with timeout flag" + }, + "CVE-2024-26662": { + "cmt_msg": "drm/amd/display: Fix 'panel_cntl' could be null in 'dcn21_set_backlight_level()'" + }, "CVE-2023-26242": { "cmt_msg": "" }, "CVE-2019-16089": { "cmt_msg": "" }, - "CVE-2022-0400": { - "cmt_msg": "" + "CVE-2021-47070": { + "cmt_msg": "uio_hv_generic: Fix another memory leak in error handling paths" }, "CVE-2022-44034": { "cmt_msg": "char: pcmcia: remove all the drivers" @@ -128453,6 +166180,15 @@ "CVE-2022-44032": { "cmt_msg": "char: pcmcia: remove all the drivers" }, + "CVE-2021-47076": { + "cmt_msg": "RDMA/rxe: Return CQE error if invalid lkey was supplied" + }, + "CVE-2024-26806": { + "cmt_msg": "spi: cadence-qspi: remove system-wide suspend helper calls from runtime PM hooks" + }, + "CVE-2024-25741": { + "cmt_msg": "" + }, "CVE-2021-3847": { "cmt_msg": "" }, @@ -128462,32 +166198,65 @@ "CVE-2023-52442": { "cmt_msg": "ksmbd: validate session id and tree id in compound request" }, + "CVE-2023-52531": { + "cmt_msg": "wifi: iwlwifi: mvm: Fix a memory corruption issue" + }, "CVE-2022-1280": { "cmt_msg": "drm: avoid circular locks in drm_mode_getconnector" }, "CVE-2024-21803": { "cmt_msg": "" }, - "CVE-2022-25265": { + "CVE-2011-4917": { "cmt_msg": "" }, "CVE-2011-4916": { "cmt_msg": "" }, + "CVE-2021-46959": { + "cmt_msg": "spi: Fix use-after-free with devm_spi_alloc_*" + }, "CVE-2021-32078": { "cmt_msg": "ARM: footbridge: remove personal server platform" }, + "CVE-2023-52532": { + "cmt_msg": "net: mana: Fix TX CQE error handling" + }, + "CVE-2024-26798": { + "cmt_msg": "fbcon: always restore the old font data in fbcon_do_set_font()" + }, + "CVE-2023-52608": { + "cmt_msg": "firmware: arm_scmi: Check mailbox/SMT channel for consistency" + }, "CVE-2023-23039": { "cmt_msg": "" }, - "CVE-2024-23196": { + "CVE-2022-0400": { "cmt_msg": "" }, + "CVE-2024-26718": { + "cmt_msg": "dm-crypt, dm-verity: disable tasklets" + }, + "CVE-2024-26719": { + "cmt_msg": "nouveau: offload fence uevents work to workqueue" + }, + "CVE-2024-26802": { + "cmt_msg": "stmmac: Clear variable when destroying workqueue" + }, + "CVE-2024-26715": { + "cmt_msg": "usb: dwc3: gadget: Fix NULL pointer dereference in dwc3_gadget_suspend" + }, "CVE-2024-1312": { "cmt_msg": "mm: lock_vma_under_rcu() must check vma->anon_vma under vma lock" }, + "CVE-2024-26713": { + "cmt_msg": "powerpc/pseries/iommu: Fix iommu initialisation during DLPAR add" + }, "CVE-2023-3640": { "cmt_msg": "" + }, + "CVE-2023-52593": { + "cmt_msg": "wifi: wfx: fix possible NULL pointer dereference in wfx_set_mfp_ap()" } } }, @@ -128685,6 +166454,10 @@ "cmt_msg": "net: mac802154: Fix general protection fault", "cmt_id": "743c9072afafd1919b41ae319044513ed014a58f" }, + "CVE-2021-46904": { + "cmt_msg": "net: hso: fix null-ptr-deref during tty device unregistration", + "cmt_id": "388d05f70f1ee0cac4a2068fd295072f1a44152a" + }, "CVE-2020-25672": { "cmt_msg": "nfc: fix memory leak in llcp_sock_connect()", "cmt_id": "596ad6296f07c63bed3cbd573de42f99b7984599" @@ -128717,6 +166490,58 @@ "cmt_msg": "KVM: VMX: Don't use vcpu->run->internal.ndata as an array index", "cmt_id": "ce541d7b59566a0d94c7c99bfb5d34b050e6af70" }, + "CVE-2021-46919": { + "cmt_msg": "dmaengine: idxd: fix wq size store permission state", + "cmt_id": "05b7791c4c4aa8304368fdc55ae911f6b34e7281" + }, + "CVE-2021-46918": { + "cmt_msg": "dmaengine: idxd: clear MSIX permission entry on shutdown", + "cmt_id": "c84b8982d7aa9b4717dc36a1c6cbc93ee153b500" + }, + "CVE-2021-46908": { + "cmt_msg": "bpf: Use correct permission flag for mixed signed bounds arithmetic", + "cmt_id": "4ccdc6c6cae38b91c871293fb0ed8c6845a61b51" + }, + "CVE-2021-46909": { + "cmt_msg": "ARM: footbridge: fix PCI interrupt mapping", + "cmt_id": "c3efce8cc9807339633ee30e39882f4c8626ee1d" + }, + "CVE-2021-46915": { + "cmt_msg": "netfilter: nft_limit: avoid possible divide error in nft_limit_init", + "cmt_id": "1bb3ee4259936cc3b2d80a4a480bbb4868575071" + }, + "CVE-2021-46914": { + "cmt_msg": "ixgbe: fix unbalanced device enable/disable in suspend/resume", + "cmt_id": "f1b4be4a753caa4056496f679d70550d0c11a264" + }, + "CVE-2021-46917": { + "cmt_msg": "dmaengine: idxd: fix wq cleanup of WQCFG registers", + "cmt_id": "f7dc8f5619165e1fa3383d0c2519f502d9e2a1a9" + }, + "CVE-2021-46916": { + "cmt_msg": "ixgbe: Fix NULL pointer dereference in ethtool loopback test", + "cmt_id": "758d19098df4b0bbca9f40d6ae6c82c9c18b9bba" + }, + "CVE-2021-46911": { + "cmt_msg": "ch_ktls: Fix kernel panic", + "cmt_id": "8348665d4181c68b0ca1205b48e1753d78bc810f" + }, + "CVE-2021-46910": { + "cmt_msg": "ARM: 9063/1: mm: reduce maximum number of CPUs if DEBUG_KMAP_LOCAL is enabled", + "cmt_id": "5965ac11b1d5fcb38464728931649cd9df79c7c9" + }, + "CVE-2021-46913": { + "cmt_msg": "netfilter: nftables: clone set element expression template", + "cmt_id": "47d8de3c226574a3ddb8b87d0c152028d1bafef4" + }, + "CVE-2021-46912": { + "cmt_msg": "net: Make tcp_allowed_congestion_control readonly in non-init netns", + "cmt_id": "1ccdf1bed140820240e383ba0accc474ffc7f006" + }, + "CVE-2021-46920": { + "cmt_msg": "dmaengine: idxd: Fix clobbering of SWERR overflow bit on writeback", + "cmt_id": "02981a44a0e402089775416371bd2e0c935685f8" + }, "CVE-2021-29155": { "cmt_msg": "bpf: Use correct permission flag for mixed signed bounds arithmetic", "cmt_id": "4ccdc6c6cae38b91c871293fb0ed8c6845a61b51" @@ -128727,12 +166552,28 @@ } }, "5.11.17": { + "CVE-2021-46921": { + "cmt_msg": "locking/qrwlock: Fix ordering in queued_write_lock_slowpath()", + "cmt_id": "d558fcdb17139728347bccc60a16af3e639649d2" + }, "CVE-2019-15794": { "cmt_msg": "ovl: fix reference counting in ovl_mmap error path", "cmt_id": "f65c0fdb7db2750677bf2cb53e62d7d205c20ab5" } }, "5.11.19": { + "CVE-2021-46973": { + "cmt_msg": "net: qrtr: Avoid potential use after free in MHI send", + "cmt_id": "ea474054c2cc6e1284604b21361f475c7cc8c0a0" + }, + "CVE-2021-46972": { + "cmt_msg": "ovl: fix leaked dentry", + "cmt_id": "cf3e3330bc5719fa9d658e3e2f596bde89344a94" + }, + "CVE-2021-46971": { + "cmt_msg": "perf/core: Fix unconditional security_locked_down() call", + "cmt_id": "f5809ca4c311b71bfaba6d13f4e39eab0557895e" + }, "CVE-2021-38209": { "cmt_msg": "netfilter: conntrack: Make global sysctls readonly in non-init netns", "cmt_id": "fbf85a34ce17c4cf0a37ee253f4c582bbfb8231b" @@ -128740,16 +166581,136 @@ "CVE-2021-31829": { "cmt_msg": "bpf: Fix masking negation logic upon negative dst register", "cmt_id": "6eba92a4d4be8feb4dc33976abac544fa99d6ecc" + }, + "CVE-2021-46974": { + "cmt_msg": "bpf: Fix masking negation logic upon negative dst register", + "cmt_id": "6eba92a4d4be8feb4dc33976abac544fa99d6ecc" } }, "5.11.20": { - "CVE-2021-3506": { - "cmt_msg": "f2fs: fix to avoid out-of-bounds memory access", - "cmt_id": "7fe4c47161c21f3b1c3581c2653147281ca0e4fa" + "CVE-2020-36777": { + "cmt_msg": "media: dvbdev: Fix memory leak in dvb_media_device_free()", + "cmt_id": "9ad15e214fcd73694ea51967d86055f47b802066" + }, + "CVE-2020-36776": { + "cmt_msg": "thermal/drivers/cpufreq_cooling: Fix slab OOB issue", + "cmt_id": "876a5f33e5d961d879c5436987c09b3d9ef70379" + }, + "CVE-2021-46968": { + "cmt_msg": "s390/zcrypt: fix zcard and zqueue hot-unplug memleak", + "cmt_id": "055a063a18bcd19b93709e3eac8078d6b2f04599" + }, + "CVE-2021-46964": { + "cmt_msg": "scsi: qla2xxx: Reserve extra IRQ vectors", + "cmt_id": "4ecd42dec858b6632c5f024fe13e9ad6c30f2734" + }, + "CVE-2021-46965": { + "cmt_msg": "mtd: physmap: physmap-bt1-rom: Fix unintentional stack access", + "cmt_id": "4e4ebb827bf09311469ffd9d0c14ed40ed9747aa" + }, + "CVE-2021-46966": { + "cmt_msg": "ACPI: custom_method: fix potential use-after-free issue", + "cmt_id": "f16737caf41fc06cfe6e49048becb09657074d4b" + }, + "CVE-2021-46967": { + "cmt_msg": "vhost-vdpa: fix vm_flags for virtqueue doorbell mapping", + "cmt_id": "940230a5c31e2714722aee04c521a21f484b4df7" + }, + "CVE-2021-46960": { + "cmt_msg": "cifs: Return correct error code from smb2_get_enc_key", + "cmt_id": "f59a9242942fef0de7b926e438ba4eae65d4b4dd" + }, + "CVE-2021-46961": { + "cmt_msg": "irqchip/gic-v3: Do not enable irqs when handling spurious interrups", + "cmt_id": "ea817ac1014c04f47885532b55f5d0898deadfba" + }, + "CVE-2021-46962": { + "cmt_msg": "mmc: uniphier-sd: Fix a resource leak in the remove function", + "cmt_id": "ebe0f12cf4c044f812c6d17011531582f9ac8bb3" + }, + "CVE-2021-46963": { + "cmt_msg": "scsi: qla2xxx: Fix crash in qla2xxx_mqueuecommand()", + "cmt_id": "80ef24175df2cba3860d0369d1c662b49ee2de56" + }, + "CVE-2021-46943": { + "cmt_msg": "media: staging/intel-ipu3: Fix set_fmt error handling", + "cmt_id": "34892ea938387d83ffcfb7775ec55f0f80767916" + }, + "CVE-2021-46940": { + "cmt_msg": "tools/power turbostat: Fix offset overflow issue in index converting", + "cmt_id": "dbdf22fc825fdb1d97f23230064e0f9819471628" + }, + "CVE-2021-46941": { + "cmt_msg": "usb: dwc3: core: Do core softreset when switch mode", + "cmt_id": "800f58217626c8b147aa40660e572ed8a0d56e3b" + }, + "CVE-2021-46944": { + "cmt_msg": "media: staging/intel-ipu3: Fix memory leak in imu_fmt", + "cmt_id": "14d0e99c3ef6b0648535a31bf2eaabb4eff97b9e" + }, + "CVE-2021-46945": { + "cmt_msg": "ext4: always panic when errors=panic is specified", + "cmt_id": "64e1eebe2131183174f4fbb6b1491355f96c6cde" + }, + "CVE-2021-46948": { + "cmt_msg": "sfc: farch: fix TX queue lookup in TX event handling", + "cmt_id": "35c7a83ad1bb1d48ae249346e61b1132bcbf9052" + }, + "CVE-2021-46949": { + "cmt_msg": "sfc: farch: fix TX queue lookup in TX flush done handling", + "cmt_id": "a1570985ec04116cc665b760faf666a104154170" }, "CVE-2021-3543": { "cmt_msg": "nitro_enclaves: Fix stale file descriptors on failed usercopy", "cmt_id": "5f4a8ccfc15c1498d897139e5dbff82a35005144" + }, + "CVE-2021-46970": { + "cmt_msg": "bus: mhi: pci_generic: Remove WQ_MEM_RECLAIM flag from state workqueue", + "cmt_id": "abd1510c08a13c88d24b622a83c82e87ff1d3135" + }, + "CVE-2021-46954": { + "cmt_msg": "net/sched: sch_frag: fix stack OOB read while fragmenting IPv4 packets", + "cmt_id": "018bb8da5b5888e19585f9b802f036afe643fcef" + }, + "CVE-2021-46951": { + "cmt_msg": "tpm: efi: Use local variable for calculating final log size", + "cmt_id": "3818b753277f5ca0c170bf5b98e0a5a225542fcb" + }, + "CVE-2021-46950": { + "cmt_msg": "md/raid1: properly indicate failure when ending a failed write request", + "cmt_id": "59452e551784b7a57a45d971727e9db63b192515" + }, + "CVE-2021-46953": { + "cmt_msg": "ACPI: GTDT: Don't corrupt interrupt mappings on watchdow probe failure", + "cmt_id": "42e69521ee1fa5abf21f478d147d06bbfe6bf6a8" + }, + "CVE-2021-46952": { + "cmt_msg": "NFS: fs_context: validate UDP retrans to prevent shift out-of-bounds", + "cmt_id": "2f3380121d49e829fb73ba86240c181bc32ad897" + }, + "CVE-2021-46955": { + "cmt_msg": "openvswitch: fix stack OOB read while fragmenting IPv4 packets", + "cmt_id": "d841d3cf5297fde4ce6a41ff35451d0e82917f3e" + }, + "CVE-2021-3506": { + "cmt_msg": "f2fs: fix to avoid out-of-bounds memory access", + "cmt_id": "7fe4c47161c21f3b1c3581c2653147281ca0e4fa" + }, + "CVE-2021-46956": { + "cmt_msg": "virtiofs: fix memory leak in virtio_fs_probe()", + "cmt_id": "9b9d60c0eb8ada99cce2a9ab5c15dffc523b01ae" + }, + "CVE-2021-46958": { + "cmt_msg": "btrfs: fix race between transaction aborts and fsyncs leading to use-after-free", + "cmt_id": "633f7f216663587f17601eaa1cf2ac3d5654874c" + }, + "CVE-2021-46939": { + "cmt_msg": "tracing: Restructure trace_clock_global() to never block", + "cmt_id": "6e2418576228eeb12e7ba82edb8f9500623942ff" + }, + "CVE-2021-46938": { + "cmt_msg": "dm rq: fix double free of blk_mq_tag_set in dev remove after table load fails", + "cmt_id": "6086f957416a6e87236c06079fcaba7a3998aeca" } }, "5.11.21": { @@ -128761,31 +166722,383 @@ "cmt_msg": "io_uring: truncate lengths larger than MAX_RW_COUNT on provide buffers", "cmt_id": "7a8411015f744e68013d77432d869be5ad34208f" }, - "CVE-2021-45486": { - "cmt_msg": "inet: use bigger hash table for IP ID generation", - "cmt_id": "4bfdd8b53f7440ac0f6290720c6e1ad5952377ec" + "CVE-2021-47048": { + "cmt_msg": "spi: spi-zynqmp-gqspi: fix use-after-free in zynqmp_qspi_exec_op", + "cmt_id": "d67e0d6bd92ebbb0294e7062bbf5cdc773764e62" + }, + "CVE-2021-47049": { + "cmt_msg": "Drivers: hv: vmbus: Use after free in __vmbus_open()", + "cmt_id": "f37dd5d1b5d38a79a4f7b8dd7bbb705505f05560" + }, + "CVE-2021-47044": { + "cmt_msg": "sched/fair: Fix shift-out-of-bounds in load_balance()", + "cmt_id": "2f3eab368e313dba35fc2f51ede778bf7b030b54" + }, + "CVE-2021-47045": { + "cmt_msg": "scsi: lpfc: Fix null pointer dereference in lpfc_prep_els_iocb()", + "cmt_id": "a09677de458d500b00701f6036baa423d9995408" + }, + "CVE-2021-47046": { + "cmt_msg": "drm/amd/display: Fix off by one in hdmi_14_process_transaction()", + "cmt_id": "6a58310d5d1e5b02d0fc9b393ba540c9367bced5" + }, + "CVE-2021-47047": { + "cmt_msg": "spi: spi-zynqmp-gqspi: return -ENOMEM if dma_map_single fails", + "cmt_id": "c26c026eb496261dbc0adbf606cc81989cd2038c" + }, + "CVE-2021-47040": { + "cmt_msg": "io_uring: fix overflows checks in provide buffers", + "cmt_id": "51bf90901952aaac564bbdb36b2b503050c53dd9" + }, + "CVE-2021-47041": { + "cmt_msg": "nvmet-tcp: fix incorrect locking in state_change sk callback", + "cmt_id": "06beaa1a9f6e501213195e47c30416032fd2bbd5" + }, + "CVE-2020-36779": { + "cmt_msg": "i2c: stm32f7: fix reference leak when pm_runtime_get_sync fails", + "cmt_id": "d791b90f5c5e5aa8ccf9e33386c16bd2b7e333a4" + }, + "CVE-2020-36778": { + "cmt_msg": "i2c: xiic: fix reference leak when pm_runtime_get_sync fails", + "cmt_id": "e2ba996577eaea423694dc69ae43d56f1410a22b" + }, + "CVE-2021-47062": { + "cmt_msg": "KVM: SVM: Use online_vcpus, not created_vcpus, to iterate over vCPUs", + "cmt_id": "bd0cced2ae93195668f983d443f7f17e8efd24d2" + }, + "CVE-2021-47063": { + "cmt_msg": "drm: bridge/panel: Cleanup connector on bridge detach", + "cmt_id": "18149b420c9bd93c443e8d1f48a063d71d9f6aa1" + }, + "CVE-2021-33034": { + "cmt_msg": "Bluetooth: verify AMP hci_chan before amp_destroy", + "cmt_id": "7064d5651ba08adbcd3d8a2fc78f8a117a768935" + }, + "CVE-2021-47061": { + "cmt_msg": "KVM: Destroy I/O bus devices on unregister failure _after_ sync'ing SRCU", + "cmt_id": "4e899ca848636b37e9ac124bc1723862a7d7d927" + }, + "CVE-2021-47066": { + "cmt_msg": "async_xor: increase src_offs when dropping destination page", + "cmt_id": "29ffa50f33de824b5491f8239c88c4a0efdd03af" + }, + "CVE-2021-47067": { + "cmt_msg": "soc/tegra: regulators: Fix locking up when voltage-spread is out of range", + "cmt_id": "dc4452867200fa94589b382740952b58aa1c3e6c" + }, + "CVE-2021-47028": { + "cmt_msg": "mt76: mt7915: fix txrate reporting", + "cmt_id": "dfc8a71448c7d4fec38fb22bdc8a76d79c14b6da" + }, + "CVE-2021-47065": { + "cmt_msg": "rtw88: Fix array overrun in rtw_get_tx_power_params()", + "cmt_id": "5f3dbced8eaa5c9ed7d6943f3fea99f235a6516a" + }, + "CVE-2021-47026": { + "cmt_msg": "RDMA/rtrs-clt: destroy sysfs after removing session from active list", + "cmt_id": "676171f9405dcaa45a33d18241c32f387dbaae39" + }, + "CVE-2021-47024": { + "cmt_msg": "vsock/virtio: free queued packets when closing socket", + "cmt_id": "27691665145e74a45034a9dccf1150cf1894763a" + }, + "CVE-2021-47023": { + "cmt_msg": "net: marvell: prestera: fix port event handling on init", + "cmt_id": "b5bba6ede42693f50ce1c9944315cefed7491061" + }, + "CVE-2021-47020": { + "cmt_msg": "soundwire: stream: fix memory leak in stream config error path", + "cmt_id": "2f17ac005b320c85d686088cfd4c2e7017912b88" }, "CVE-2021-32399": { "cmt_msg": "bluetooth: eliminate the potential race condition when removing the HCI controller", "cmt_id": "c20a95f000bc369176d1698fce2515656b5db924" }, + "CVE-2020-36782": { + "cmt_msg": "i2c: imx-lpi2c: fix reference leak when pm_runtime_get_sync fails", + "cmt_id": "bb300acc867e937edc2a6898e92b21f88e4e4e66" + }, + "CVE-2020-36783": { + "cmt_msg": "i2c: img-scb: fix reference leak when pm_runtime_get_sync fails", + "cmt_id": "96c4a03658d661666c360959aa80cdabfe2972ed" + }, + "CVE-2020-36780": { + "cmt_msg": "i2c: sprd: fix reference leak when pm_runtime_get_sync fails", + "cmt_id": "9223505e938ba3db5907e058f4209770cff2f2a7" + }, + "CVE-2020-36781": { + "cmt_msg": "i2c: imx: fix reference leak when pm_runtime_get_sync fails", + "cmt_id": "1ecc0ebc2ebbad4a22a670a07d27a21fa0b59c77" + }, + "CVE-2020-36786": { + "cmt_msg": "media: [next] staging: media: atomisp: fix memory leak of object flash", + "cmt_id": "4f0f37d03cde8f4341df8454f9b40a67fda94a33" + }, + "CVE-2020-36787": { + "cmt_msg": "media: aspeed: fix clock handling logic", + "cmt_id": "2964c37563e86cfdc439f217eb3c5a69adfdba6a" + }, + "CVE-2020-36784": { + "cmt_msg": "i2c: cadence: fix reference leak when pm_runtime_get_sync fails", + "cmt_id": "d57ff04e0ed6f3be1682ae861ead33f879225e07" + }, + "CVE-2020-36785": { + "cmt_msg": "media: atomisp: Fix use after free in atomisp_alloc_css_stat_bufs()", + "cmt_id": "801c1d505894008c888bc71d08d5cff5d87f8aba" + }, + "CVE-2021-47053": { + "cmt_msg": "crypto: sun8i-ss - Fix memory leak of pad", + "cmt_id": "c633e025bd04f54d7b33331cfcdb71354b08ce59" + }, + "CVE-2021-47032": { + "cmt_msg": "mt76: mt7915: fix tx skb dma unmap", + "cmt_id": "4a9dcd6efb2a268fc5707dcfb3b0c412975c4462" + }, + "CVE-2021-47059": { + "cmt_msg": "crypto: sun8i-ss - fix result memory leak on error path", + "cmt_id": "ca065a93699f8cf3f42c60eefed73086007e928e" + }, + "CVE-2021-47058": { + "cmt_msg": "regmap: set debugfs_name to NULL after it is freed", + "cmt_id": "c764e375ae647832de1ee73d43a4bb3ef8a8f43d" + }, "CVE-2021-3489": { "cmt_msg": "bpf, ringbuf: Deny reserve of buffers larger than ringbuf", "cmt_id": "646f2a9b0ecc57817352830d4efa409d89542e1d" }, + "CVE-2021-47052": { + "cmt_msg": "crypto: sa2ul - Fix memory leak of rxd", + "cmt_id": "dfd6443bf49ac17adf882ca46c40c506a0284bd6" + }, + "CVE-2021-47051": { + "cmt_msg": "spi: fsl-lpspi: Fix PM reference leak in lpspi_prepare_xfer_hardware()", + "cmt_id": "b8207bfc539cd07d15e753ff2d179c5b61c673b1" + }, + "CVE-2021-47050": { + "cmt_msg": "memory: renesas-rpc-if: fix possible NULL pointer dereference of resource", + "cmt_id": "e16acc3a37f09e18835dc5d8014942c2ef6ca957" + }, + "CVE-2021-47057": { + "cmt_msg": "crypto: sun8i-ss - Fix memory leak of object d when dma_iv fails to map", + "cmt_id": "e1f2d739849c3239df1ea3f97d40bade4b808410" + }, + "CVE-2021-47056": { + "cmt_msg": "crypto: qat - ADF_STATUS_PF_RUNNING should be set after adf_dev_init", + "cmt_id": "20fd40fc6f2c2b41dc6f637f88d494b14e9c21f1" + }, + "CVE-2021-47055": { + "cmt_msg": "mtd: require write permissions for locking and badblock ioctls", + "cmt_id": "077259f5e777c3c8821f6b41dee709fcda27306b" + }, + "CVE-2021-47054": { + "cmt_msg": "bus: qcom: Put child node before return", + "cmt_id": "6b68c03dfc79cd95a58dfd03f91f6e82829a1b0c" + }, + "CVE-2021-47017": { + "cmt_msg": "ath10k: Fix a use after free in ath10k_htc_send_bundle", + "cmt_id": "3b1ac40c6012140828caa79e592a438a18ebf71b" + }, + "CVE-2021-47016": { + "cmt_msg": "m68k: mvme147,mvme16x: Don't wipe PCC timer config bits", + "cmt_id": "73fdeb612d25b5e105c219e05434285a45d23576" + }, + "CVE-2021-47015": { + "cmt_msg": "bnxt_en: Fix RX consumer index logic in the error path.", + "cmt_id": "e187ef83c04a5d23e68d39cfdff1a1931e29890c" + }, + "CVE-2021-47013": { + "cmt_msg": "net:emac/emac-mac: Fix a use after free in emac_mac_tx_buf_send", + "cmt_id": "8c06f34785068b87e2b560534c77c163d6c6dca7" + }, + "CVE-2021-47012": { + "cmt_msg": "RDMA/siw: Fix a use after free in siw_alloc_mr", + "cmt_id": "3e22b88e02c194f6c80867abfef5cc09383461f4" + }, + "CVE-2021-47011": { + "cmt_msg": "mm: memcontrol: slab: fix obtain a reference to a freeing memcg", + "cmt_id": "89b1ed358e01e1b0417f5d3b0082359a23355552" + }, + "CVE-2021-47010": { + "cmt_msg": "net: Only allow init netns to set default tcp cong to a restricted algo", + "cmt_id": "efe1532a6e1a8e3c343d04fff510f0ed80328f9c" + }, + "CVE-2021-47035": { + "cmt_msg": "iommu/vt-d: Remove WO permissions on second-level paging entries", + "cmt_id": "25faff78138933244c678c7fc78f7c0340fa04a0" + }, + "CVE-2021-47034": { + "cmt_msg": "powerpc/64s: Fix pte update for kernel memory on radix", + "cmt_id": "01ac203e2119d8922126886ddea309fb676f955f" + }, + "CVE-2021-47037": { + "cmt_msg": "ASoC: q6afe-clocks: fix reprobing of the driver", + "cmt_id": "6893df3753beafa5f7351228a9dd8157a57d7492" + }, + "CVE-2021-47043": { + "cmt_msg": "media: venus: core: Fix some resource leaks in the error path of 'venus_probe()'", + "cmt_id": "940d01eceb3a7866fbfca136a55a5625fc75a565" + }, + "CVE-2021-47033": { + "cmt_msg": "mt76: mt7615: fix tx skb dma unmap", + "cmt_id": "a025277a80add18c33d01042525a74fe5b875f25" + }, + "CVE-2021-47018": { + "cmt_msg": "powerpc/64: Fix the definition of the fixmap area", + "cmt_id": "abb07dc5e8b61ab7b1dde20dd73aa01a3aeb183f" + }, + "CVE-2021-45486": { + "cmt_msg": "inet: use bigger hash table for IP ID generation", + "cmt_id": "4bfdd8b53f7440ac0f6290720c6e1ad5952377ec" + }, + "CVE-2021-47064": { + "cmt_msg": "mt76: fix potential DMA mapping leak", + "cmt_id": "9b68ce2856dadc0e1cb6fd21fbeb850da49efd08" + }, "CVE-2021-31440": { "cmt_msg": "bpf: Fix propagation of 32 bit unsigned bounds from 64 bit bounds", "cmt_id": "d11e645725e9850109a40031997fc05b7dda34c7" }, - "CVE-2021-33034": { - "cmt_msg": "Bluetooth: verify AMP hci_chan before amp_destroy", - "cmt_id": "7064d5651ba08adbcd3d8a2fc78f8a117a768935" + "CVE-2021-47060": { + "cmt_msg": "KVM: Stop looking for coalesced MMIO zones if the bus is destroyed", + "cmt_id": "168e82f640ed1891a700bdb43e37da354b2ab63c" + }, + "CVE-2021-47039": { + "cmt_msg": "ataflop: potential out of bounds in do_format()", + "cmt_id": "07f86aa8f4fe077be1b018cc177eb8c6573e5671" + }, + "CVE-2021-47038": { + "cmt_msg": "Bluetooth: avoid deadlock between hci_dev->lock and socket lock", + "cmt_id": "fee71f480bc1dec5f6ae3b0b185ff12a62bceabc" } }, "5.11.22": { + "CVE-2021-46986": { + "cmt_msg": "usb: dwc3: gadget: Free gadget structure only after freeing endpoints", + "cmt_id": "bc0cdd72493236fb72b390ad38ce581e353c143c" + }, + "CVE-2021-46987": { + "cmt_msg": "btrfs: fix deadlock when cloning inline extents and using qgroups", + "cmt_id": "d5347827d0b4b2250cbce6eccaa1c81dc78d8651" + }, + "CVE-2021-46984": { + "cmt_msg": "kyber: fix out of bounds access when preempted", + "cmt_id": "a287cd84e047045f5a4d4da793414e848de627c6" + }, + "CVE-2021-46982": { + "cmt_msg": "f2fs: compress: fix race condition of overwrite vs truncate", + "cmt_id": "64acb100fe3beb5d20184d0ae3307235bd3555c4" + }, + "CVE-2021-46983": { + "cmt_msg": "nvmet-rdma: Fix NULL deref when SEND is completed with error", + "cmt_id": "17fb6dfa5162b89ecfa07df891a53afec321abe8" + }, + "CVE-2021-46980": { + "cmt_msg": "usb: typec: ucsi: Retrieve all the PDOs instead of just the first 4", + "cmt_id": "a453bfd7ef15fd9d524004d3ca7b05353a302911" + }, + "CVE-2021-46981": { + "cmt_msg": "nbd: Fix NULL pointer in flush_workqueue", + "cmt_id": "b31d237796fd618379ec8e0f4de3370b5e4aeee7" + }, + "CVE-2021-47000": { + "cmt_msg": "ceph: fix inode leak on getattr error in __fh_to_dentry", + "cmt_id": "22fa4c8288f1ec40f6d62d7a32c57ac176f9f0bc" + }, + "CVE-2021-47001": { + "cmt_msg": "xprtrdma: Fix cwnd update ordering", + "cmt_id": "8834ecb5df22b7ff3c9b0deba7726579bb613f95" + }, + "CVE-2021-47002": { + "cmt_msg": "SUNRPC: Fix null pointer dereference in svc_rqst_free()", + "cmt_id": "1e10f58f1c9a6b667b045513c7a4e6111c24fe7c" + }, + "CVE-2021-47003": { + "cmt_msg": "dmaengine: idxd: Fix potential null dereference on pointer status", + "cmt_id": "2280b4cc29d8cdd2be3d1b2d1ea4f958e2131c97" + }, + "CVE-2021-47004": { + "cmt_msg": "f2fs: fix to avoid touching checkpointed data in get_victim()", + "cmt_id": "1e116f87825f01a6380286472196882746b16f63" + }, + "CVE-2021-47005": { + "cmt_msg": "PCI: endpoint: Fix NULL pointer dereference for ->get_features()", + "cmt_id": "679ebad058b8168f10e63876d63b0877fd2fe784" + }, + "CVE-2021-46988": { + "cmt_msg": "userfaultfd: release page in error path to avoid BUG_ON", + "cmt_id": "ad53127973034c63b5348715a1043d0e80ceb330" + }, + "CVE-2021-46989": { + "cmt_msg": "hfsplus: prevent corruption in shrinking truncate", + "cmt_id": "c477f62db1a0c0ecaa60a29713006ceeeb04b685" + }, "CVE-2021-4157": { "cmt_msg": "pNFS/flexfiles: fix incorrect size check in decode_nfs_fh()", "cmt_id": "fd02a794aaeac693c7c092a4b482f87256d151fc" + }, + "CVE-2021-46999": { + "cmt_msg": "sctp: do asoc update earlier in sctp_sf_do_dupcook_a", + "cmt_id": "61b877bad9bb0d82b7d8841be50872557090a704" + }, + "CVE-2021-46976": { + "cmt_msg": "drm/i915: Fix crash in auto_retire", + "cmt_id": "608441de3976c526b02af4d7063093c8adf351e3" + }, + "CVE-2021-47006": { + "cmt_msg": "ARM: 9064/1: hw_breakpoint: Do not directly check the event's overflow_handler hook", + "cmt_id": "7eeacc6728c5478e3c01bc82a1f08958eaa12366" + }, + "CVE-2021-47007": { + "cmt_msg": "f2fs: fix panic during f2fs_resize_fs()", + "cmt_id": "860afd680d9cc1dabd61cda3cd246f60aa1eb705" + }, + "CVE-2021-46994": { + "cmt_msg": "can: mcp251x: fix resume from sleep before interface was brought up", + "cmt_id": "6f8f1c27b577de15f69fefce3c502bb6300d825c" + }, + "CVE-2021-46997": { + "cmt_msg": "arm64: entry: always set GIC_PRIO_PSR_I_SET during entry", + "cmt_id": "e67a83f078005461b59b4c776e6b5addd11725fa" + }, + "CVE-2021-46996": { + "cmt_msg": "netfilter: nftables: Fix a memleak from userdata error path in new objects", + "cmt_id": "59fa98bfa1f4013d658d990cac88c87b46ff410c" + }, + "CVE-2021-46991": { + "cmt_msg": "i40e: Fix use-after-free in i40e_client_subtask()", + "cmt_id": "4ebc10aa7cd17fd9857dedac69600465c9dd16d1" + }, + "CVE-2021-46990": { + "cmt_msg": "powerpc/64s: Fix crashes when toggling entry flush barrier", + "cmt_id": "dd0d6117052faace5440db20fc37175efe921c7d" + }, + "CVE-2021-46993": { + "cmt_msg": "sched: Fix out-of-bound access in uclamp", + "cmt_id": "3da3f804b82a0a382d523a21acf4cf3bb35f936d" + }, + "CVE-2021-46992": { + "cmt_msg": "netfilter: nftables: avoid overflows in nft_hash_buckets()", + "cmt_id": "1e8ab479cfbe5751efccedb95afb9b112a5ba475" + }, + "CVE-2021-46977": { + "cmt_msg": "KVM: VMX: Disable preemption when probing user return MSRs", + "cmt_id": "5adcdeb57007ccf8ab7ac20bf787ffb6fafb1a94" + }, + "CVE-2021-46998": { + "cmt_msg": "ethernet:enic: Fix a use after free bug in enic_hard_start_xmit", + "cmt_id": "6892396ebf04ea2c021d80e10f4075e014cd7cc3" + }, + "CVE-2021-47008": { + "cmt_msg": "KVM: SVM: Make sure GHCB is mapped before updating", + "cmt_id": "fb9e14f4f8217a0980f8da2c8ff70dee058cbe47" + }, + "CVE-2021-46979": { + "cmt_msg": "iio: core: fix ioctl handlers removal", + "cmt_id": "11e1cae5da4096552f7c091476cbadbc0d1817da" + }, + "CVE-2021-46978": { + "cmt_msg": "KVM: nVMX: Always make an attempt to map eVMCS after migration", + "cmt_id": "200a45649ab7361bc80c70aebf7165b64f9a6c9f" } }, "outstanding": { @@ -128813,6 +167126,21 @@ "CVE-2022-0002": { "cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE" }, + "CVE-2024-26685": { + "cmt_msg": "nilfs2: fix potential bug in end_buffer_async_write" + }, + "CVE-2023-52615": { + "cmt_msg": "hwrng: core - Fix page fault dead lock on mmap-ed hwrng" + }, + "CVE-2023-52614": { + "cmt_msg": "PM / devfreq: Fix buffer overflow in trans_stat_show" + }, + "CVE-2023-52617": { + "cmt_msg": "PCI: switchtec: Fix stdev_release() crash after surprise hot remove" + }, + "CVE-2023-52616": { + "cmt_msg": "crypto: lib/mpi - Fix unexpected pointer access in mpi_ec_init" + }, "CVE-2020-24587": { "cmt_msg": "mac80211: prevent mixed key and fragment cache attacks" }, @@ -128822,6 +167150,9 @@ "CVE-2022-0995": { "cmt_msg": "watch_queue: Fix filter limit check" }, + "CVE-2023-52612": { + "cmt_msg": "crypto: scomp - fix req->dst buffer overflow" + }, "CVE-2022-3105": { "cmt_msg": "RDMA/uverbs: Check for null return of kmalloc_array" }, @@ -128867,9 +167198,6 @@ "CVE-2022-23825": { "cmt_msg": "" }, - "CVE-2021-3847": { - "cmt_msg": "" - }, "CVE-2021-42252": { "cmt_msg": "soc: aspeed: lpc-ctrl: Fix boundary check for mmap" }, @@ -128882,12 +167210,42 @@ "CVE-2024-0584": { "cmt_msg": "ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet" }, - "CVE-2023-2163": { - "cmt_msg": "bpf: Fix incorrect verifier pruning due to missing register precision taints" + "CVE-2021-47112": { + "cmt_msg": "x86/kvm: Teardown PV features on boot CPU as well" + }, + "CVE-2021-47113": { + "cmt_msg": "btrfs: abort in rename_exchange if we fail to insert the second ref" + }, + "CVE-2021-47110": { + "cmt_msg": "x86/kvm: Disable kvmclock on all CPUs on shutdown" + }, + "CVE-2021-47111": { + "cmt_msg": "xen-netback: take a reference to the RX task thread" + }, + "CVE-2021-47116": { + "cmt_msg": "ext4: fix memory leak in ext4_mb_init_backend on error path." + }, + "CVE-2021-47117": { + "cmt_msg": "ext4: fix bug on in ext4_es_cache_extent as ext4_split_extent_at failed" + }, + "CVE-2021-47114": { + "cmt_msg": "ocfs2: fix data corruption by fallocate" + }, + "CVE-2023-2162": { + "cmt_msg": "scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress" + }, + "CVE-2024-26759": { + "cmt_msg": "mm/swap: fix race when skipping swapcache" }, "CVE-2022-21125": { "cmt_msg": "x86/speculation/mmio: Reuse SRBDS mitigation for SBDS" }, + "CVE-2021-47118": { + "cmt_msg": "pid: take a reference when initializing `cad_pid`" + }, + "CVE-2021-47119": { + "cmt_msg": "ext4: fix memory leak in ext4_fill_super" + }, "CVE-2023-28466": { "cmt_msg": "net: tls: fix possible race condition between do_tls_getsockopt_conf() and do_tls_setsockopt_conf()" }, @@ -128906,8 +167264,11 @@ "CVE-2021-43975": { "cmt_msg": "atlantic: Fix OOB read and write in hw_atl_utils_fw_rpc_wait" }, - "CVE-2022-25636": { - "cmt_msg": "netfilter: nf_tables_offload: incorrect flow offload action array size" + "CVE-2021-43976": { + "cmt_msg": "mwifiex: Fix skb_over_panic in mwifiex_usb_recv()" + }, + "CVE-2022-3106": { + "cmt_msg": "sfc_ef100: potential dereference of null pointer" }, "CVE-2023-0459": { "cmt_msg": "uaccess: Add speculation barrier to copy_from_user()" @@ -128936,11 +167297,8 @@ "CVE-2022-3628": { "cmt_msg": "wifi: brcmfmac: Fix potential buffer overflow in brcmf_fweh_event_worker()" }, - "CVE-2024-26591": { - "cmt_msg": "bpf: Fix re-attachment branch in bpf_tracing_prog_attach" - }, - "CVE-2020-15802": { - "cmt_msg": "" + "CVE-2022-1158": { + "cmt_msg": "KVM: x86/mmu: do compare-and-exchange of gPTE via the user address" }, "CVE-2024-26597": { "cmt_msg": "net: qualcomm: rmnet: fix global oob in rmnet_policy" @@ -128969,26 +167327,35 @@ "CVE-2022-40982": { "cmt_msg": "x86/speculation: Add Gather Data Sampling mitigation" }, - "CVE-2021-28714": { - "cmt_msg": "xen/netback: fix rx queue stall detection" + "CVE-2022-2585": { + "cmt_msg": "posix-cpu-timers: Cleanup CPU timers before freeing them during exec" }, "CVE-2022-3202": { "cmt_msg": "jfs: prevent NULL deref in diFree" }, + "CVE-2024-25739": { + "cmt_msg": "" + }, + "CVE-2023-52513": { + "cmt_msg": "RDMA/siw: Fix connection failure handling" + }, "CVE-2022-2602": { "cmt_msg": "io_uring/af_unix: defer registered files gc to io_uring release" }, "CVE-2024-26585": { "cmt_msg": "tls: fix race between tx work scheduling and socket close" }, + "CVE-2023-52511": { + "cmt_msg": "spi: sun6i: reduce DMA RX transfer width to single byte" + }, "CVE-2024-26584": { "cmt_msg": "net: tls: handle backlogging of crypto requests" }, "CVE-2023-2008": { "cmt_msg": "udmabuf: add back sanity check" }, - "CVE-2024-26587": { - "cmt_msg": "net: netdevsim: don't try to destroy PHC on VFs" + "CVE-2021-46906": { + "cmt_msg": "HID: usbhid: fix info leak in hid_submit_ctrl" }, "CVE-2023-2002": { "cmt_msg": "bluetooth: Perform careful capability checks in hci_sock_ioctl()" @@ -129047,15 +167414,33 @@ "CVE-2023-1073": { "cmt_msg": "HID: check empty report_list in hid_validate_values()" }, + "CVE-2024-26747": { + "cmt_msg": "usb: roles: fix NULL pointer issue when put module's reference" + }, + "CVE-2024-26745": { + "cmt_msg": "powerpc/pseries/iommu: IOMMU table is not initialized for kdump over SR-IOV" + }, "CVE-2023-51781": { "cmt_msg": "appletalk: Fix Use-After-Free in atalk_ioctl" }, + "CVE-2024-26743": { + "cmt_msg": "RDMA/qedr: Fix qedr_create_user_qp error flow" + }, + "CVE-2024-26740": { + "cmt_msg": "net/sched: act_mirred: use the backlog for mirred ingress" + }, "CVE-2024-22386": { "cmt_msg": "" }, + "CVE-2022-42432": { + "cmt_msg": "netfilter: nfnetlink_osf: fix possible bogus match in nf_osf_find()" + }, "CVE-2022-1734": { "cmt_msg": "nfc: nfcmrvl: main: reorder destructive operations in nfcmrvl_nci_unregister_dev to avoid bugs" }, + "CVE-2024-26749": { + "cmt_msg": "usb: cdns3: fixed memory use after free at cdns3_gadget_ep_disable()" + }, "CVE-2022-3625": { "cmt_msg": "devlink: Fix use-after-free after a failed reload" }, @@ -129071,6 +167456,12 @@ "CVE-2022-3108": { "cmt_msg": "drm/amdkfd: Check for null pointer after calling kmemdup" }, + "CVE-2024-26699": { + "cmt_msg": "drm/amd/display: Fix array-index-out-of-bounds in dcn35_clkmgr" + }, + "CVE-2024-26698": { + "cmt_msg": "hv_netvsc: Fix race condition between netvsc_probe and netvsc_remove" + }, "CVE-2022-23038": { "cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()" }, @@ -129080,6 +167471,9 @@ "CVE-2022-20154": { "cmt_msg": "sctp: use call_rcu to free endpoint" }, + "CVE-2024-26691": { + "cmt_msg": "KVM: arm64: Fix circular locking dependency" + }, "CVE-2022-20158": { "cmt_msg": "net/packet: fix slab-out-of-bounds access in packet_recvmsg()" }, @@ -129092,6 +167486,12 @@ "CVE-2024-0565": { "cmt_msg": "smb: client: fix OOB in receive_encrypted_standard()" }, + "CVE-2024-26697": { + "cmt_msg": "nilfs2: fix data corruption in dsync block recovery for small block sizes" + }, + "CVE-2024-26696": { + "cmt_msg": "nilfs2: fix hang in nilfs_lookup_dirty_data_buffers()" + }, "CVE-2023-2176": { "cmt_msg": "RDMA/core: Refactor rdma_bind_addr" }, @@ -129143,30 +167543,51 @@ "CVE-2023-31081": { "cmt_msg": "" }, + "CVE-2023-52618": { + "cmt_msg": "block/rnbd-srv: Check for unlikely string overflow" + }, "CVE-2022-0286": { "cmt_msg": "bonding: fix null dereference in bond_ipsec_add_sa()" }, - "CVE-2024-23307": { - "cmt_msg": "" + "CVE-2024-0646": { + "cmt_msg": "net: tls, update curr on splice as well" + }, + "CVE-2023-52598": { + "cmt_msg": "s390/ptrace: handle setting of fpc register correctly" }, "CVE-2022-32296": { "cmt_msg": "tcp: increase source port perturb table to 2^16" }, - "CVE-2023-3567": { - "cmt_msg": "vc_screen: move load of struct vc_data pointer in vcs_read() to avoid UAF" + "CVE-2024-26789": { + "cmt_msg": "crypto: arm64/neonbs - fix out-of-bounds access on short input" + }, + "CVE-2022-4543": { + "cmt_msg": "" }, "CVE-2022-3028": { "cmt_msg": "af_key: Do not call xfrm_probe_algs in parallel" }, + "CVE-2023-52493": { + "cmt_msg": "bus: mhi: host: Drop chan lock before queuing buffers" + }, + "CVE-2023-52485": { + "cmt_msg": "drm/amd/display: Wake DMCUB before sending a command" + }, "CVE-2020-14304": { "cmt_msg": "" }, "CVE-2022-29581": { "cmt_msg": "net/sched: cls_u32: fix netns refcount changes in u32_change()" }, + "CVE-2023-52497": { + "cmt_msg": "erofs: fix lz4 inplace decompression" + }, "CVE-2022-33981": { "cmt_msg": "floppy: disable FDRAWCMD by default" }, + "CVE-2024-26655": { + "cmt_msg": "Fix memory leak in posix_clock_open()" + }, "CVE-2021-3564": { "cmt_msg": "Bluetooth: fix the erroneous flush_work() order" }, @@ -129188,6 +167609,9 @@ "CVE-2023-39198": { "cmt_msg": "drm/qxl: fix UAF on handle creation" }, + "CVE-2024-26656": { + "cmt_msg": "drm/amdgpu: fix use-after-free bug" + }, "CVE-2021-42327": { "cmt_msg": "drm/amdgpu: fix out of bounds write" }, @@ -129206,12 +167630,18 @@ "CVE-2023-1829": { "cmt_msg": "net/sched: Retire tcindex classifier" }, + "CVE-2023-52584": { + "cmt_msg": "spmi: mediatek: Fix UAF on device remove" + }, "CVE-2021-4083": { "cmt_msg": "fget: check that the fd still exists after getting a ref to it" }, "CVE-2023-33288": { "cmt_msg": "power: supply: bq24190: Fix use after free bug in bq24190_remove due to race condition" }, + "CVE-2023-52484": { + "cmt_msg": "iommu/arm-smmu-v3: Fix soft lockup triggered by arm_smmu_mm_invalidate_range" + }, "CVE-2022-29900": { "cmt_msg": "x86/kvm/vmx: Make noinstr clean" }, @@ -129221,12 +167651,18 @@ "CVE-2023-3161": { "cmt_msg": "fbcon: Check font dimension limits" }, + "CVE-2022-3567": { + "cmt_msg": "ipv6: Fix data races around sk->sk_prot." + }, "CVE-2023-39192": { "cmt_msg": "netfilter: xt_u32: validate user space input" }, "CVE-2023-25012": { "cmt_msg": "HID: bigben: use spinlock to safely schedule workers" }, + "CVE-2023-4389": { + "cmt_msg": "btrfs: fix root ref counts in error handling in btrfs_get_root_ref" + }, "CVE-2023-35829": { "cmt_msg": "media: rkvdec: fix use after free bug in rkvdec_remove" }, @@ -129236,6 +167672,9 @@ "CVE-2022-29582": { "cmt_msg": "io_uring: fix race between timeout flush and removal" }, + "CVE-2023-52583": { + "cmt_msg": "ceph: fix deadlock or deadcode of misusing dget()" + }, "CVE-2022-1116": { "cmt_msg": "" }, @@ -129254,8 +167693,23 @@ "CVE-2023-35827": { "cmt_msg": "ravb: Fix use-after-free issue in ravb_tx_timeout_work()" }, - "CVE-2022-3567": { - "cmt_msg": "ipv6: Fix data races around sk->sk_prot." + "CVE-2023-52481": { + "cmt_msg": "arm64: errata: Add Cortex-A520 speculative unprivileged load workaround" + }, + "CVE-2023-52585": { + "cmt_msg": "drm/amdgpu: Fix possible NULL dereference in amdgpu_ras_query_error_status_helper()" + }, + "CVE-2022-4269": { + "cmt_msg": "act_mirred: use the backlog for nested calls to mirred ingress" + }, + "CVE-2023-52587": { + "cmt_msg": "IB/ipoib: Fix mcast list locking" + }, + "CVE-2023-52586": { + "cmt_msg": "drm/msm/dpu: Add mutex lock in control vblank irq" + }, + "CVE-2021-47149": { + "cmt_msg": "net: fujitsu: fix potential null-ptr-deref" }, "CVE-2022-3566": { "cmt_msg": "tcp: Fix data races around icsk->icsk_af_ops." @@ -129266,12 +167720,72 @@ "CVE-2022-3564": { "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free caused by l2cap_reassemble_sdu" }, - "CVE-2022-4269": { - "cmt_msg": "act_mirred: use the backlog for nested calls to mirred ingress" + "CVE-2021-47145": { + "cmt_msg": "btrfs: do not BUG_ON in link_to_fixup_dir" + }, + "CVE-2021-47144": { + "cmt_msg": "drm/amd/amdgpu: fix refcount leak" + }, + "CVE-2021-47147": { + "cmt_msg": "ptp: ocp: Fix a resource leak in an error handling path" + }, + "CVE-2021-47069": { + "cmt_msg": "ipc/mqueue, msg, sem: avoid relying on a stack reference past its expiry" + }, + "CVE-2021-47141": { + "cmt_msg": "gve: Add NULL pointer checks when freeing irqs." + }, + "CVE-2021-47140": { + "cmt_msg": "iommu/amd: Clear DMA ops when switching domain" + }, + "CVE-2021-47143": { + "cmt_msg": "net/smc: remove device from smcd_dev_list after failed device_add()" + }, + "CVE-2021-47142": { + "cmt_msg": "drm/amdgpu: Fix a use-after-free" + }, + "CVE-2021-47146": { + "cmt_msg": "mld: fix panic in mld_newpack()" + }, + "CVE-2024-26727": { + "cmt_msg": "btrfs: do not ASSERT() if the newly created subvolume already got read" + }, + "CVE-2023-3567": { + "cmt_msg": "vc_screen: move load of struct vc_data pointer in vcs_read() to avoid UAF" }, "CVE-2023-52340": { "cmt_msg": "ipv6: remove max_size check inline with ipv4" }, + "CVE-2023-52589": { + "cmt_msg": "media: rkisp1: Fix IRQ disable race issue" + }, + "CVE-2023-52588": { + "cmt_msg": "f2fs: fix to tag gcing flag on page during block migration" + }, + "CVE-2024-26765": { + "cmt_msg": "LoongArch: Disable IRQ before init_fn() for nonboot CPUs" + }, + "CVE-2023-52578": { + "cmt_msg": "net: bridge: use DEV_STATS_INC()" + }, + "CVE-2021-47097": { + "cmt_msg": "Input: elantech - fix stack out of bound access in elantech_change_report_id()" + }, + "CVE-2021-47095": { + "cmt_msg": "ipmi: ssif: initialize ssif_info->client early" + }, + "CVE-2021-47094": { + "cmt_msg": "KVM: x86/mmu: Don't advance iterator after restart due to yielding" + }, + "CVE-2021-47093": { + "cmt_msg": "platform/x86: intel_pmc_core: fix memleak on registration failure" + }, + "CVE-2021-47091": { + "cmt_msg": "mac80211: fix locking in ieee80211_start_ap error path" + }, + "CVE-2021-47090": { + "cmt_msg": "mm/hwpoison: clear MF_COUNT_INCREASED before retrying get_any_page()" + }, "CVE-2023-6560": { "cmt_msg": "io_uring: don't allow discontig pages for IORING_SETUP_NO_MMAP" }, @@ -129284,6 +167798,9 @@ "CVE-2023-1611": { "cmt_msg": "btrfs: fix race between quota disable and quota assign ioctls" }, + "CVE-2024-26763": { + "cmt_msg": "dm-crypt: don't modify the data when using authenticated encryption" + }, "CVE-2021-34693": { "cmt_msg": "can: bcm: fix infoleak in struct bcm_msg_head" }, @@ -129293,15 +167810,36 @@ "CVE-2023-6817": { "cmt_msg": "netfilter: nft_set_pipapo: skip inactive elements during set walk" }, + "CVE-2024-26795": { + "cmt_msg": "riscv: Sparse-Memory/vmemmap out-of-bounds fix" + }, + "CVE-2024-26797": { + "cmt_msg": "drm/amd/display: Prevent potential buffer overflow in map_hw_resources" + }, + "CVE-2024-26790": { + "cmt_msg": "dmaengine: fsl-qdma: fix SoC may hang on 16 byte unaligned read" + }, "CVE-2022-1836": { "cmt_msg": "floppy: disable FDRAWCMD by default" }, + "CVE-2024-26793": { + "cmt_msg": "gtp: fix use-after-free and null-ptr-deref in gtp_newlink()" + }, + "CVE-2023-52530": { + "cmt_msg": "wifi: mac80211: fix potential key use-after-free" + }, "CVE-2021-32078": { "cmt_msg": "ARM: footbridge: remove personal server platform" }, + "CVE-2023-52532": { + "cmt_msg": "net: mana: Fix TX CQE error handling" + }, "CVE-2022-30594": { "cmt_msg": "ptrace: Check PTRACE_O_SUSPEND_SECCOMP permission on PTRACE_SEIZE" }, + "CVE-2024-26798": { + "cmt_msg": "fbcon: always restore the old font data in fbcon_do_set_font()" + }, "CVE-2022-4662": { "cmt_msg": "USB: core: Prevent nested device-reset calls" }, @@ -129338,6 +167876,12 @@ "CVE-2023-46862": { "cmt_msg": "io_uring/fdinfo: lock SQ thread while retrieving thread cpu/pid" }, + "CVE-2024-26677": { + "cmt_msg": "rxrpc: Fix delayed ACKs to not set the reference serial number" + }, + "CVE-2024-26676": { + "cmt_msg": "af_unix: Call kfree_skb() for dead unix_(sk)->oob_skb in GC." + }, "CVE-2022-0168": { "cmt_msg": "cifs: fix NULL ptr dereference in smb2_ioctl_query_info()" }, @@ -129347,9 +167891,18 @@ "CVE-2020-26557": { "cmt_msg": "" }, + "CVE-2024-26671": { + "cmt_msg": "blk-mq: fix IO hang from sbitmap wakeup race" + }, "CVE-2020-26555": { "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical" }, + "CVE-2024-26776": { + "cmt_msg": "spi: hisi-sfc-v3xx: Return IRQ_NONE if no interrupts were detected" + }, + "CVE-2024-26777": { + "cmt_msg": "fbdev: sis: Error out if pixclock equals zero" + }, "CVE-2019-20794": { "cmt_msg": "" }, @@ -129359,30 +167912,48 @@ "CVE-2023-3397": { "cmt_msg": "" }, - "CVE-2021-3542": { - "cmt_msg": "" + "CVE-2021-47082": { + "cmt_msg": "tun: avoid double free in tun_free_netdev" + }, + "CVE-2024-26679": { + "cmt_msg": "inet: read sk->sk_family once in inet_recv_error()" + }, + "CVE-2024-26771": { + "cmt_msg": "dmaengine: ti: edma: Add some null pointer checks to the edma_probe" + }, + "CVE-2021-47128": { + "cmt_msg": "bpf, lockdown, audit: Fix buggy SELinux lockdown permission checks" + }, + "CVE-2022-26365": { + "cmt_msg": "xen/blkfront: fix leaking data in shared pages" }, "CVE-2023-52458": { "cmt_msg": "block: add check that partition length needs to be aligned with block size" }, - "CVE-2023-52457": { - "cmt_msg": "serial: 8250: omap: Don't skip resource freeing if pm_runtime_resume_and_get() failed" - }, "CVE-2018-1121": { "cmt_msg": "" }, "CVE-2023-52454": { "cmt_msg": "nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length" }, + "CVE-2023-28746": { + "cmt_msg": "x86/mmio: Disable KVM mitigation when X86_FEATURE_CLEAR_CPU_BUF is set" + }, "CVE-2023-52451": { "cmt_msg": "powerpc/pseries/memhp: Fix access beyond end of drmem array" }, "CVE-2022-3061": { "cmt_msg": "video: fbdev: i740fb: Error out if 'pixclock' equals zero" }, + "CVE-2024-26602": { + "cmt_msg": "sched/membarrier: reduce the ability to hammer on sys_membarrier" + }, "CVE-2024-1086": { "cmt_msg": "netfilter: nf_tables: reject QUEUE/DROP verdict parameters" }, + "CVE-2024-26735": { + "cmt_msg": "ipv6: sr: fix possible use-after-free and null-ptr-deref" + }, "CVE-2022-3344": { "cmt_msg": "KVM: x86: nSVM: harden svm_free_nested against freeing vmcb02 while still in use" }, @@ -129404,9 +167975,21 @@ "CVE-2023-23002": { "cmt_msg": "Bluetooth: hci_qca: Fix NULL vs IS_ERR_OR_NULL check in qca_serdev_probe" }, + "CVE-2024-26702": { + "cmt_msg": "iio: magnetometer: rm3100: add boundary check for the value read from RM3100_REG_TMRC" + }, "CVE-2023-6240": { "cmt_msg": "" }, + "CVE-2024-26700": { + "cmt_msg": "drm/amd/display: Fix MST Null Ptr for RV" + }, + "CVE-2024-26707": { + "cmt_msg": "net: hsr: remove WARN_ONCE() in send_hsr_supervision_frame()" + }, + "CVE-2024-26706": { + "cmt_msg": "parisc: Fix random data corruption from exception handler" + }, "CVE-2023-23559": { "cmt_msg": "wifi: rndis_wlan: Prevent buffer overflow in rndis_query_oid" }, @@ -129434,9 +168017,6 @@ "CVE-2019-19814": { "cmt_msg": "" }, - "CVE-2024-26588": { - "cmt_msg": "LoongArch: BPF: Prevent out-of-bounds memory access" - }, "CVE-2023-1118": { "cmt_msg": "media: rc: Fix use-after-free bugs caused by ene_tx_irqsim()" }, @@ -129449,6 +168029,30 @@ "CVE-2022-1012": { "cmt_msg": "secure_seq: use the 64 bits of the siphash for port offset calculation" }, + "CVE-2023-52620": { + "cmt_msg": "netfilter: nf_tables: disallow timeout for anonymous sets" + }, + "CVE-2023-52621": { + "cmt_msg": "bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers" + }, + "CVE-2023-52622": { + "cmt_msg": "ext4: avoid online resizing failures due to oversized flex bg" + }, + "CVE-2023-52623": { + "cmt_msg": "SUNRPC: Fix a suspicious RCU usage warning" + }, + "CVE-2023-52619": { + "cmt_msg": "pstore/ram: Fix crash when setting number of cpus to an odd number" + }, + "CVE-2023-52625": { + "cmt_msg": "drm/amd/display: Refactor DMCUB enter/exit idle interface" + }, + "CVE-2023-52627": { + "cmt_msg": "iio: adc: ad7091r: Allow users to configure device events" + }, + "CVE-2023-52628": { + "cmt_msg": "netfilter: nftables: exthdr: fix 4-byte stack OOB write" + }, "CVE-2021-26934": { "cmt_msg": "" }, @@ -129473,12 +168077,15 @@ "CVE-2023-34256": { "cmt_msg": "ext4: avoid a potential slab-out-of-bounds in ext4_group_desc_csum" }, - "CVE-2021-43976": { - "cmt_msg": "mwifiex: Fix skb_over_panic in mwifiex_usb_recv()" + "CVE-2022-25636": { + "cmt_msg": "netfilter: nf_tables_offload: incorrect flow offload action array size" }, "CVE-2022-0494": { "cmt_msg": "block-map: add __GFP_ZERO flag for alloc_page in function bio_copy_kern" }, + "CVE-2024-26601": { + "cmt_msg": "ext4: regenerate buddy after block freeing failed if under fc replay" + }, "CVE-2022-3524": { "cmt_msg": "tcp/udp: Fix memory leak in ipv6_renew_options()." }, @@ -129488,12 +168095,27 @@ "CVE-2022-3522": { "cmt_msg": "mm/hugetlb: use hugetlb_pte_stable in migration race check" }, - "CVE-2022-3521": { - "cmt_msg": "kcm: avoid potential race in kcm_tx_work" + "CVE-2008-2544": { + "cmt_msg": "" + }, + "CVE-2021-47101": { + "cmt_msg": "asix: fix uninit-value in asix_mdio_read()" + }, + "CVE-2021-47100": { + "cmt_msg": "ipmi: Fix UAF when uninstall ipmi_si and ipmi_msghandler module" + }, + "CVE-2021-47103": { + "cmt_msg": "inet: fully convert sk->sk_rx_dst to RCU rules" + }, + "CVE-2021-47105": { + "cmt_msg": "ice: xsk: return xsk buffers back to pool when cleaning the ring" }, "CVE-2022-2196": { "cmt_msg": "KVM: VMX: Execute IBPB on emulated VM-exit when guest has IBRS" }, + "CVE-2021-47109": { + "cmt_msg": "neighbour: allow NUD_NOARP entries to be forced GCed" + }, "CVE-2022-20409": { "cmt_msg": "io_uring: remove io_identity" }, @@ -129506,6 +168128,9 @@ "CVE-2023-3863": { "cmt_msg": "net: nfc: Fix use-after-free caused by nfc_llcp_find_local" }, + "CVE-2024-26606": { + "cmt_msg": "binder: signal epoll threads of self-work" + }, "CVE-2023-0590": { "cmt_msg": "net: sched: fix race condition in qdisc_graft()" }, @@ -129530,6 +168155,9 @@ "CVE-2021-3679": { "cmt_msg": "tracing: Fix bug in rb_per_cpu_empty() that might cause deadloop." }, + "CVE-2024-26607": { + "cmt_msg": "drm/bridge: sii902x: Fix probing race issue" + }, "CVE-2022-2586": { "cmt_msg": "netfilter: nf_tables: do not allow SET_ID to refer to another table" }, @@ -129539,8 +168167,8 @@ "CVE-2021-34556": { "cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4" }, - "CVE-2022-2585": { - "cmt_msg": "posix-cpu-timers: Cleanup CPU timers before freeing them during exec" + "CVE-2021-28714": { + "cmt_msg": "xen/netback: fix rx queue stall detection" }, "CVE-2021-28713": { "cmt_msg": "xen/console: harden hvc_xen against event channel storms" @@ -129569,8 +168197,8 @@ "CVE-2022-3624": { "cmt_msg": "bonding: fix reference count leak in balance-alb mode" }, - "CVE-2021-4154": { - "cmt_msg": "cgroup: verify that source is a string" + "CVE-2022-25258": { + "cmt_msg": "USB: gadget: validate interface OS descriptor requests" }, "CVE-2022-2588": { "cmt_msg": "net_sched: cls_route: remove from list when handle is 0" @@ -129587,15 +168215,30 @@ "CVE-2023-1095": { "cmt_msg": "netfilter: nf_tables: fix null deref due to zeroed list head" }, + "CVE-2023-52574": { + "cmt_msg": "team: fix null-ptr-deref when team device type is changed" + }, "CVE-2022-3239": { "cmt_msg": "media: em28xx: initialize refcount before kref_get" }, - "CVE-2022-4543": { - "cmt_msg": "" + "CVE-2021-47036": { + "cmt_msg": "udp: skip L4 aggregation for UDP tunnel packets" + }, + "CVE-2023-52571": { + "cmt_msg": "power: supply: rk817: Fix node refcount leak" + }, + "CVE-2023-52572": { + "cmt_msg": "cifs: Fix UAF in cifs_demultiplex_thread()" + }, + "CVE-2023-52573": { + "cmt_msg": "net: rds: Fix possible NULL-pointer dereference" }, "CVE-2023-4921": { "cmt_msg": "net: sched: sch_qfq: Fix UAF in qfq_dequeue()" }, + "CVE-2022-3424": { + "cmt_msg": "misc: sgi-gru: fix use-after-free error in gru_set_context_option, gru_fault and gru_handle_user_call_os" + }, "CVE-2021-34866": { "cmt_msg": "bpf: Fix ringbuf helper function compatibility" }, @@ -129611,8 +168254,14 @@ "CVE-2023-4881": { "cmt_msg": "netfilter: nftables: exthdr: fix 4-byte stack OOB write" }, - "CVE-2022-42432": { - "cmt_msg": "netfilter: nfnetlink_osf: fix possible bogus match in nf_osf_find()" + "CVE-2024-26769": { + "cmt_msg": "nvmet-fc: avoid deadlock on delete association path" + }, + "CVE-2024-26704": { + "cmt_msg": "ext4: fix double-free of blocks due to wrong extents moved_len" + }, + "CVE-2022-1786": { + "cmt_msg": "io_uring: remove io_identity" }, "CVE-2013-7445": { "cmt_msg": "" @@ -129620,21 +168269,39 @@ "CVE-2023-31248": { "cmt_msg": "netfilter: nf_tables: do not ignore genmask when looking up chain by id" }, + "CVE-2024-26736": { + "cmt_msg": "afs: Increase buffer size in afs_update_volume_status()" + }, "CVE-2023-23586": { "cmt_msg": "io_uring: remove io_identity" }, + "CVE-2024-26738": { + "cmt_msg": "powerpc/pseries/iommu: DLPAR add doesn't completely initialize pci_controller" + }, + "CVE-2024-26739": { + "cmt_msg": "net/sched: act_mirred: don't override retval if we already lost the skb" + }, "CVE-2022-42719": { "cmt_msg": "wifi: mac80211: fix MBSSID parsing use-after-free" }, "CVE-2022-38096": { "cmt_msg": "" }, - "CVE-2022-1158": { - "cmt_msg": "KVM: x86/mmu: do compare-and-exchange of gPTE via the user address" + "CVE-2024-26804": { + "cmt_msg": "net: ip_tunnel: prevent perpetual headroom growth" + }, + "CVE-2024-26805": { + "cmt_msg": "netlink: Fix kernel-infoleak-after-free in __skb_datagram_iter" + }, + "CVE-2020-15802": { + "cmt_msg": "" }, "CVE-2022-3303": { "cmt_msg": "ALSA: pcm: oss: Fix race at SNDCTL_DSP_SYNC" }, + "CVE-2023-52443": { + "cmt_msg": "apparmor: avoid crash when parsed profile name is empty" + }, "CVE-2022-20141": { "cmt_msg": "igmp: Add ip_mc_list lock in ip_check_mc_rcu" }, @@ -129656,6 +168323,9 @@ "CVE-2023-6932": { "cmt_msg": "ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet" }, + "CVE-2024-26801": { + "cmt_msg": "Bluetooth: Avoid potential use-after-free in hci_error_reset" + }, "CVE-2024-0607": { "cmt_msg": "netfilter: nf_tables: fix pointer math issue in nft_byteorder_eval()" }, @@ -129668,18 +168338,45 @@ "CVE-2022-28388": { "cmt_msg": "can: usb_8dev: usb_8dev_start_xmit(): fix double dev_kfree_skb() in error path" }, + "CVE-2022-41218": { + "cmt_msg": "media: dvb-core: Fix UAF due to refcount races at releasing" + }, + "CVE-2022-47518": { + "cmt_msg": "wifi: wilc1000: validate number of channels" + }, "CVE-2023-52444": { "cmt_msg": "f2fs: fix to avoid dirent corruption" }, + "CVE-2024-26768": { + "cmt_msg": "LoongArch: Change acpi_core_pic[NR_CPUS] to acpi_core_pic[MAX_CORE_PIC]" + }, "CVE-2022-4129": { "cmt_msg": "l2tp: Serialize access to sk_user_data with sk_callback_lock" }, + "CVE-2024-26648": { + "cmt_msg": "drm/amd/display: Fix variable deferencing before NULL check in edp_setup_replay()" + }, "CVE-2022-0500": { "cmt_msg": "bpf: Introduce MEM_RDONLY flag" }, + "CVE-2024-26647": { + "cmt_msg": "drm/amd/display: Fix late derefrence 'dsc' check in 'link_set_dsc_pps_packet()'" + }, + "CVE-2024-26644": { + "cmt_msg": "btrfs: don't abort filesystem when attempting to snapshot deleted subvolume" + }, + "CVE-2024-26645": { + "cmt_msg": "tracing: Ensure visibility when inserting an element into tracing_map" + }, "CVE-2023-33203": { "cmt_msg": "net: qcom/emac: Fix use after free bug in emac_remove due to race condition" }, + "CVE-2024-26640": { + "cmt_msg": "tcp: add sanity checks to rx zerocopy" + }, + "CVE-2024-26641": { + "cmt_msg": "ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv()" + }, "CVE-2021-4001": { "cmt_msg": "bpf: Fix toctou on read-only map's constant scalar tracking" }, @@ -129692,21 +168389,27 @@ "CVE-2022-1055": { "cmt_msg": "net: sched: fix use-after-free in tc_new_tfilter()" }, - "CVE-2011-4916": { - "cmt_msg": "" - }, "CVE-2023-50431": { "cmt_msg": "accel/habanalabs: fix information leak in sec_attest_info()" }, + "CVE-2023-52445": { + "cmt_msg": "media: pvrusb2: fix use after free on context disconnection" + }, "CVE-2022-20008": { "cmt_msg": "mmc: block: fix read single on recovery logic" }, "CVE-2023-3117": { "cmt_msg": "netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE" }, + "CVE-2024-26791": { + "cmt_msg": "btrfs: dev-replace: properly validate device names" + }, "CVE-2023-32269": { "cmt_msg": "netrom: Fix use-after-free caused by accept on already connected socket" }, + "CVE-2023-52467": { + "cmt_msg": "mfd: syscon: Fix null pointer dereference in of_syscon_register()" + }, "CVE-2023-52464": { "cmt_msg": "EDAC/thunderx: Fix possible out-of-bounds string access" }, @@ -129728,6 +168431,12 @@ "CVE-2024-23848": { "cmt_msg": "" }, + "CVE-2023-52531": { + "cmt_msg": "wifi: iwlwifi: mvm: Fix a memory corruption issue" + }, + "CVE-2024-26633": { + "cmt_msg": "ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim()" + }, "CVE-2023-6622": { "cmt_msg": "netfilter: nf_tables: bail out on mismatching dynset and set expressions" }, @@ -129737,12 +168446,24 @@ "CVE-2023-4459": { "cmt_msg": "net: vmxnet3: fix possible NULL pointer dereference in vmxnet3_rq_cleanup()" }, + "CVE-2024-26625": { + "cmt_msg": "llc: call sock_orphan() at release time" + }, + "CVE-2024-26635": { + "cmt_msg": "llc: Drop support for ETH_P_TR_802_2." + }, + "CVE-2023-52639": { + "cmt_msg": "KVM: s390: vsie: fix race during shadow creation" + }, "CVE-2022-2153": { "cmt_msg": "KVM: x86: Avoid theoretical NULL pointer dereference in kvm_irq_delivery_to_apic_fast()" }, "CVE-2022-20568": { "cmt_msg": "Merge tag 'io_uring-worker.v3-2021-02-25' of git://git.kernel.dk/linux-block" }, + "CVE-2024-2193": { + "cmt_msg": "" + }, "CVE-2022-20566": { "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free caused by l2cap_chan_put" }, @@ -129752,12 +168473,18 @@ "CVE-2018-12931": { "cmt_msg": "" }, + "CVE-2023-52637": { + "cmt_msg": "can: j1939: Fix UAF in j1939_sk_match_filter during setsockopt(SO_J1939_FILTER)" + }, "CVE-2023-1990": { "cmt_msg": "nfc: st-nci: Fix use after free bug in ndlc_remove due to race condition" }, "CVE-2024-26583": { "cmt_msg": "tls: fix race between async notify and socket close" }, + "CVE-2024-26684": { + "cmt_msg": "net: stmmac: xgmac: fix handling of DPP safety error for DMA channels" + }, "CVE-2021-33098": { "cmt_msg": "ixgbe: fix large MTU request from VF" }, @@ -129767,57 +168494,120 @@ "CVE-2022-48619": { "cmt_msg": "Input: add bounds checking to input_set_capability()" }, + "CVE-2023-52634": { + "cmt_msg": "drm/amd/display: Fix disable_otg_wa logic" + }, "CVE-2022-22942": { "cmt_msg": "drm/vmwgfx: Fix stale file descriptors on failed usercopy" }, "CVE-2021-3739": { "cmt_msg": "btrfs: fix NULL pointer dereference when deleting device by invalid id" }, + "CVE-2024-26808": { + "cmt_msg": "netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain" + }, "CVE-2021-3732": { "cmt_msg": "ovl: prevent private clone if bind mount is not allowed" }, - "CVE-2022-25375": { - "cmt_msg": "usb: gadget: rndis: check size of RNDIS_MSG_SET command" + "CVE-2022-33743": { + "cmt_msg": "xen-netfront: restore __skb_queue_tail() positioning in xennet_get_responses()" + }, + "CVE-2019-25162": { + "cmt_msg": "i2c: Fix a potential use after free" }, "CVE-2024-24861": { - "cmt_msg": "" + "cmt_msg": "media: xc4000: Fix atomicity violation in xc4000_get_frequency" + }, + "CVE-2024-26627": { + "cmt_msg": "scsi: core: Move scsi_host_busy() out of host lock for waking up EH handler" + }, + "CVE-2023-52630": { + "cmt_msg": "blk-iocost: Fix an UBSAN shift-out-of-bounds warning" }, "CVE-2021-35039": { "cmt_msg": "module: limit enabling module.sig_enforce" }, + "CVE-2022-3535": { + "cmt_msg": "net: mvpp2: fix mvpp2 debugfs leak" + }, "CVE-2022-3903": { "cmt_msg": "media: mceusb: Use new usb_control_msg_*() routines" }, + "CVE-2024-26642": { + "cmt_msg": "netfilter: nf_tables: disallow anonymous set with timeout flag" + }, "CVE-2022-3577": { "cmt_msg": "HID: bigben: fix slab-out-of-bounds Write in bigben_probe" }, "CVE-2023-20588": { "cmt_msg": "x86/CPU/AMD: Do not leak quotient data after a division by 0" }, - "CVE-2022-4379": { - "cmt_msg": "NFSD: fix use-after-free in __nfs42_ssc_open()" + "CVE-2021-47178": { + "cmt_msg": "scsi: target: core: Avoid smp_processor_id() in preemptible code" + }, + "CVE-2021-47179": { + "cmt_msg": "NFSv4: Fix a NULL pointer dereference in pnfs_mark_matching_lsegs_return()" + }, + "CVE-2021-47073": { + "cmt_msg": "platform/x86: dell-smbios-wmi: Fix oops on rmmod dell_smbios" }, "CVE-2022-4378": { "cmt_msg": "proc: proc_skip_spaces() shouldn't think it is working on C strings" }, - "CVE-2022-44033": { - "cmt_msg": "char: pcmcia: remove all the drivers" + "CVE-2021-47075": { + "cmt_msg": "nvmet: fix memory leak in nvmet_alloc_ctrl()" }, - "CVE-2022-44032": { - "cmt_msg": "char: pcmcia: remove all the drivers" + "CVE-2021-47074": { + "cmt_msg": "nvme-loop: fix memory leak in nvme_loop_create_ctrl()" }, - "CVE-2022-47518": { - "cmt_msg": "wifi: wilc1000: validate number of channels" + "CVE-2021-47077": { + "cmt_msg": "scsi: qedf: Add pointer checks in qedf_update_link_speed()" + }, + "CVE-2021-47076": { + "cmt_msg": "RDMA/rxe: Return CQE error if invalid lkey was supplied" + }, + "CVE-2021-47170": { + "cmt_msg": "USB: usbfs: Don't WARN about excessively large memory allocations" + }, + "CVE-2021-47171": { + "cmt_msg": "net: usb: fix memory leak in smsc75xx_bind" + }, + "CVE-2021-47172": { + "cmt_msg": "iio: adc: ad7124: Fix potential overflow due to non sequential channel numbers" + }, + "CVE-2021-47173": { + "cmt_msg": "misc/uss720: fix memory leak in uss720_probe" + }, + "CVE-2021-47174": { + "cmt_msg": "netfilter: nft_set_pipapo_avx2: Add irq_fpu_usable() check, fallback to non-AVX2 version" + }, + "CVE-2021-47175": { + "cmt_msg": "net/sched: fq_pie: fix OOB access in the traffic path" + }, + "CVE-2021-47176": { + "cmt_msg": "s390/dasd: add missing discipline function" + }, + "CVE-2021-47177": { + "cmt_msg": "iommu/vt-d: Fix sysfs leak in alloc_iommu()" }, "CVE-2023-4207": { "cmt_msg": "net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free" }, + "CVE-2021-46959": { + "cmt_msg": "spi: Fix use-after-free with devm_spi_alloc_*" + }, "CVE-2020-26139": { "cmt_msg": "mac80211: do not accept/forward invalid EAPOL frames" }, + "CVE-2024-26772": { + "cmt_msg": "ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal()" + }, "CVE-2021-3609": { "cmt_msg": "can: bcm: delay release of struct bcm_op after synchronize_rcu()" }, + "CVE-2023-52595": { + "cmt_msg": "wifi: rt2x00: restart beacon queue when hardware reset" + }, "CVE-2023-46813": { "cmt_msg": "x86/sev: Check for user-space IOIO pointing to kernel space" }, @@ -129827,35 +168617,71 @@ "CVE-2023-34324": { "cmt_msg": "xen/events: replace evtchn_rwlock with RCU" }, + "CVE-2023-52593": { + "cmt_msg": "wifi: wfx: fix possible NULL pointer dereference in wfx_set_mfp_ap()" + }, "CVE-2021-41073": { "cmt_msg": "io_uring: ensure symmetry in handling iter types in loop_rw_iter()" }, + "CVE-2023-52590": { + "cmt_msg": "ocfs2: Avoid touching renamed directory if parent does not change" + }, "CVE-2021-0920": { "cmt_msg": "af_unix: fix garbage collect vs MSG_PEEK" }, + "CVE-2024-26675": { + "cmt_msg": "ppp_async: limit MRU to 64K" + }, + "CVE-2024-26779": { + "cmt_msg": "wifi: mac80211: fix race condition on enabling fast-xmit" + }, + "CVE-2024-26622": { + "cmt_msg": "tomoyo: fix UAF write bug in tomoyo_write_control()" + }, "CVE-2023-28410": { "cmt_msg": "drm/i915/gem: add missing boundary check in vm_access" }, "CVE-2023-4147": { "cmt_msg": "netfilter: nf_tables: disallow rule addition to bound chain via NFTA_RULE_CHAIN_ID" }, + "CVE-2024-26718": { + "cmt_msg": "dm-crypt, dm-verity: disable tasklets" + }, "CVE-2023-0615": { "cmt_msg": "media: vivid: dev->bitmap_cap wasn't freed in all cases" }, + "CVE-2024-26672": { + "cmt_msg": "drm/amdgpu: Fix variable 'mca_funcs' dereferenced before NULL check in 'amdgpu_mca_smu_get_mca_entry()'" + }, + "CVE-2023-52527": { + "cmt_msg": "ipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data()" + }, "CVE-2023-3006": { "cmt_msg": "arm64: Add AMPERE1 to the Spectre-BHB affected list" }, + "CVE-2024-26787": { + "cmt_msg": "mmc: mmci: stm32: fix DMA API overlapping mappings warning" + }, + "CVE-2023-52522": { + "cmt_msg": "net: fix possible store tearing in neigh_periodic_work()" + }, "CVE-2022-3586": { "cmt_msg": "sch_sfb: Don't assume the skb is still around after enqueueing to child" }, "CVE-2024-0641": { "cmt_msg": "tipc: fix a potential deadlock on &tx->lock" }, + "CVE-2024-26636": { + "cmt_msg": "llc: make llc_ui_sendmsg() more robust against bonding changes" + }, "CVE-2022-43945": { "cmt_msg": "NFSD: Protect against send buffer overflow in NFSv2 READDIR" }, - "CVE-2024-0646": { - "cmt_msg": "net: tls, update curr on splice as well" + "CVE-2023-52528": { + "cmt_msg": "net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg" + }, + "CVE-2024-26623": { + "cmt_msg": "pds_core: Prevent race issues involving the adminq" }, "CVE-2020-27820": { "cmt_msg": "drm/nouveau: use drm_dev_unplug() during device removal" @@ -129863,12 +168689,18 @@ "CVE-2023-1872": { "cmt_msg": "io_uring: propagate issue_flags state down to file assignment" }, + "CVE-2024-25744": { + "cmt_msg": "x86/coco: Disable 32-bit emulation by default on TDX and SEV" + }, "CVE-2023-1078": { "cmt_msg": "rds: rds_rm_zerocopy_callback() use list_first_entry()" }, "CVE-2023-39197": { "cmt_msg": "netfilter: conntrack: dccp: copy entire header to stack buffer, not just basic one" }, + "CVE-2023-52599": { + "cmt_msg": "jfs: fix array-index-out-of-bounds in diNewExt" + }, "CVE-2023-4622": { "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES" }, @@ -129887,6 +168719,9 @@ "CVE-2023-6610": { "cmt_msg": "smb: client: fix potential OOB in smb2_dump_detail()" }, + "CVE-2024-26600": { + "cmt_msg": "phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP" + }, "CVE-2023-3390": { "cmt_msg": "netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE" }, @@ -129899,6 +168734,15 @@ "CVE-2021-33061": { "cmt_msg": "ixgbe: add improvement for MDD response functionality" }, + "CVE-2024-26764": { + "cmt_msg": "fs/aio: Restrict kiocb_set_cancel_fn() to I/O submitted via libaio" + }, + "CVE-2024-26767": { + "cmt_msg": "drm/amd/display: fixed integer types and null check locations" + }, + "CVE-2024-26766": { + "cmt_msg": "IB/hfi1: Fix sdma.h tx->num_descs off-by-one error" + }, "CVE-2024-26589": { "cmt_msg": "bpf: Reject variable offset alu on PTR_TO_FLOW_KEYS" }, @@ -129908,12 +168752,21 @@ "CVE-2023-1476": { "cmt_msg": "" }, + "CVE-2024-26773": { + "cmt_msg": "ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found()" + }, "CVE-2021-3864": { "cmt_msg": "" }, + "CVE-2024-26770": { + "cmt_msg": "HID: nvidia-shield: Add missing null pointer checks to LED initialization" + }, "CVE-2022-1652": { "cmt_msg": "floppy: use a statically allocated error counter" }, + "CVE-2023-4623": { + "cmt_msg": "net/sched: sch_hfsc: Ensure inner classes have fsc curve" + }, "CVE-2024-23849": { "cmt_msg": "net/rds: Fix UBSAN: array-index-out-of-bounds in rds_cmsg_recv" }, @@ -129929,8 +168782,8 @@ "CVE-2022-2978": { "cmt_msg": "fs: fix UAF/GPF bug in nilfs_mdt_destroy" }, - "CVE-2023-20569": { - "cmt_msg": "x86/bugs: Increase the x86 bugs vector size to two u32s" + "CVE-2022-38457": { + "cmt_msg": "drm/vmwgfx: Remove rcu locks from user resources" }, "CVE-2022-20132": { "cmt_msg": "HID: add hid_is_usb() function to make it simpler for USB detection" @@ -129938,6 +168791,9 @@ "CVE-2022-2977": { "cmt_msg": "tpm: fix reference counting for struct tpm_chip" }, + "CVE-2022-20424": { + "cmt_msg": "io_uring: remove io_identity" + }, "CVE-2022-1789": { "cmt_msg": "KVM: x86/mmu: fix NULL pointer dereference on guest INVPCID" }, @@ -129945,13 +168801,13 @@ "cmt_msg": "" }, "CVE-2023-6270": { - "cmt_msg": "" + "cmt_msg": "aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts" }, "CVE-2023-2156": { "cmt_msg": "net: rpl: fix rpl header size calculation" }, - "CVE-2023-4389": { - "cmt_msg": "btrfs: fix root ref counts in error handling in btrfs_get_root_ref" + "CVE-2022-20422": { + "cmt_msg": "arm64: fix oops in concurrently setting insn_emulation sysctls" }, "CVE-2023-3772": { "cmt_msg": "xfrm: add NULL check in xfrm_update_ae_params" @@ -129965,20 +168821,26 @@ "CVE-2023-1582": { "cmt_msg": "fs/proc: task_mmu.c: don't read mapcount for migration entry" }, - "CVE-2022-1786": { - "cmt_msg": "io_uring: remove io_identity" + "CVE-2021-47162": { + "cmt_msg": "tipc: skb_linearize the head skb when reassembling msgs" }, - "CVE-2022-45885": { - "cmt_msg": "" + "CVE-2022-23222": { + "cmt_msg": "bpf: Replace PTR_TO_XXX_OR_NULL with PTR_TO_XXX | PTR_MAYBE_NULL" }, "CVE-2008-4609": { "cmt_msg": "" }, + "CVE-2022-20421": { + "cmt_msg": "binder: fix UAF of ref->proc caused by race condition" + }, "CVE-2022-0435": { "cmt_msg": "tipc: improve size validations for received domain records" }, "CVE-2023-6356": { - "cmt_msg": "" + "cmt_msg": "nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length" + }, + "CVE-2024-26744": { + "cmt_msg": "RDMA/srpt: Support specifying the srpt_service_guid parameter" }, "CVE-2021-4135": { "cmt_msg": "netdevsim: Zero-initialize memory for new map's value in function nsim_bpf_map_alloc" @@ -129992,6 +168854,21 @@ "CVE-2019-15239": { "cmt_msg": "unknown" }, + "CVE-2022-3534": { + "cmt_msg": "libbpf: Fix use-after-free in btf_dump_name_dups" + }, + "CVE-2023-52635": { + "cmt_msg": "PM / devfreq: Synchronize devfreq_monitor_[start/stop]" + }, + "CVE-2023-52469": { + "cmt_msg": "drivers/amd/pm: fix a use-after-free in kv_parse_power_table" + }, + "CVE-2023-52633": { + "cmt_msg": "um: time-travel: fix time corruption" + }, + "CVE-2023-52632": { + "cmt_msg": "drm/amdkfd: Fix lock dependency warning with srcu" + }, "CVE-2021-4037": { "cmt_msg": "xfs: fix up non-directory creation in SGID directories" }, @@ -130007,6 +168884,9 @@ "CVE-2023-52447": { "cmt_msg": "bpf: Defer the free of inner map when necessary" }, + "CVE-2023-2194": { + "cmt_msg": "i2c: xgene-slimpro: Fix out-of-bounds bug in xgene_slimpro_i2c_xfer()" + }, "CVE-2023-4155": { "cmt_msg": "KVM: SEV: only access GHCB fields once" }, @@ -130025,11 +168905,35 @@ "CVE-2022-3533": { "cmt_msg": "" }, - "CVE-2022-3534": { - "cmt_msg": "libbpf: Fix use-after-free in btf_dump_name_dups" + "CVE-2021-47138": { + "cmt_msg": "cxgb4: avoid accessing registers when clearing filters" }, - "CVE-2022-3535": { - "cmt_msg": "net: mvpp2: fix mvpp2 debugfs leak" + "CVE-2021-47139": { + "cmt_msg": "net: hns3: put off calling register_netdev() until client initialize complete" + }, + "CVE-2021-47134": { + "cmt_msg": "efi/fdt: fix panic when no valid fdt found" + }, + "CVE-2021-47135": { + "cmt_msg": "mt76: mt7921: fix possible AOOB issue in mt7921_mcu_tx_rate_report" + }, + "CVE-2021-47136": { + "cmt_msg": "net: zero-initialize tc skb extension on allocation" + }, + "CVE-2021-47137": { + "cmt_msg": "net: lantiq: fix memory corruption in RX ring" + }, + "CVE-2021-47130": { + "cmt_msg": "nvmet: fix freeing unallocated p2pmem" + }, + "CVE-2021-47131": { + "cmt_msg": "net/tls: Fix use-after-free after the TLS device goes down and up" + }, + "CVE-2021-47133": { + "cmt_msg": "HID: amd_sfh: Fix memory leak in amd_sfh_work" + }, + "CVE-2024-26646": { + "cmt_msg": "thermal: intel: hfi: Add syscore callbacks for system-wide PM" }, "CVE-2021-22600": { "cmt_msg": "net/packet: rx_owner_map depends on pg_vec" @@ -130049,6 +168953,9 @@ "CVE-2023-28327": { "cmt_msg": "af_unix: Get user_ns from in_skb in unix_diag_get_exact()." }, + "CVE-2023-52638": { + "cmt_msg": "can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock" + }, "CVE-2017-13693": { "cmt_msg": "" }, @@ -130082,14 +168989,23 @@ "CVE-2021-3760": { "cmt_msg": "nfc: nci: fix the UAF of rf_conn_info object" }, + "CVE-2022-48627": { + "cmt_msg": "vt: fix memory overlapping when deleting chars in the buffer" + }, "CVE-2022-4382": { "cmt_msg": "USB: gadgetfs: Fix race between mounting and unmounting" }, - "CVE-2022-36123": { - "cmt_msg": "x86: Clear .brk area at early boot" + "CVE-2021-47180": { + "cmt_msg": "NFC: nci: fix memory leak in nci_allocate_device" }, - "CVE-2023-4732": { - "cmt_msg": "mm/userfaultfd: fix uffd-wp special cases for fork()" + "CVE-2022-48628": { + "cmt_msg": "ceph: drop messages from MDS when unmounting" + }, + "CVE-2022-48629": { + "cmt_msg": "crypto: qcom-rng - ensure buffer for generate is completely filled" + }, + "CVE-2022-4379": { + "cmt_msg": "NFSD: fix use-after-free in __nfs42_ssc_open()" }, "CVE-2024-24859": { "cmt_msg": "" @@ -130106,20 +169022,44 @@ "CVE-2022-1508": { "cmt_msg": "io_uring: reexpand under-reexpanded iters" }, + "CVE-2024-26673": { + "cmt_msg": "netfilter: nft_ct: sanitize layer 3 and 4 protocol number in custom expectations" + }, "CVE-2022-3545": { "cmt_msg": "nfp: fix use-after-free in area_cache_get()" }, "CVE-2021-43056": { "cmt_msg": "KVM: PPC: Book3S HV: Make idle_kvm_start_guest() return 0 if it went to guest" }, + "CVE-2023-52569": { + "cmt_msg": "btrfs: remove BUG() after failure to insert delayed dir index item" + }, + "CVE-2023-52568": { + "cmt_msg": "x86/sgx: Resolves SECS reclaim vs. page fault for EAUG race" + }, "CVE-2022-3542": { "cmt_msg": "bnx2x: fix potential memory leak in bnx2x_tpa_stop()" }, + "CVE-2023-52563": { + "cmt_msg": "drm/meson: fix memory leak on ->hpd_notify callback" + }, + "CVE-2023-52561": { + "cmt_msg": "arm64: dts: qcom: sdm845-db845c: Mark cont splash memory region as reserved" + }, "CVE-2023-5197": { "cmt_msg": "netfilter: nf_tables: disallow rule removal from chain binding" }, - "CVE-2023-1838": { - "cmt_msg": "Fix double fget() in vhost_net_set_backend()" + "CVE-2023-52566": { + "cmt_msg": "nilfs2: fix potential use after free in nilfs_gccache_submit_read_data()" + }, + "CVE-2023-52565": { + "cmt_msg": "media: uvcvideo: Fix OOB read" + }, + "CVE-2021-46928": { + "cmt_msg": "parisc: Clear stale IIR value on instruction access rights trap" + }, + "CVE-2021-46929": { + "cmt_msg": "sctp: use call_rcu to free endpoint" }, "CVE-2022-4696": { "cmt_msg": "io_uring: remove any grabbing of context" @@ -130130,9 +169070,24 @@ "CVE-2023-1380": { "cmt_msg": "wifi: brcmfmac: slab-out-of-bounds read in brcmf_get_assoc_ies()" }, + "CVE-2021-46924": { + "cmt_msg": "NFC: st21nfca: Fix memory leak in device probe and remove" + }, + "CVE-2021-46925": { + "cmt_msg": "net/smc: fix kernel panic caused by race of smc_sock" + }, + "CVE-2021-46926": { + "cmt_msg": "ALSA: hda: intel-sdw-acpi: harden detection of controller" + }, "CVE-2020-0347": { "cmt_msg": "" }, + "CVE-2024-26788": { + "cmt_msg": "dmaengine: fsl-qdma: init irq after reg initialization" + }, + "CVE-2023-52591": { + "cmt_msg": "reiserfs: Avoid touching renamed directory if parent does not change" + }, "CVE-2022-41222": { "cmt_msg": "mm/mremap: hold the rmap lock in write mode when moving page table entries." }, @@ -130145,15 +169100,30 @@ "CVE-2019-12456": { "cmt_msg": "" }, + "CVE-2023-20569": { + "cmt_msg": "x86/bugs: Increase the x86 bugs vector size to two u32s" + }, "CVE-2021-33656": { "cmt_msg": "vt: drop old FONT ioctls" }, + "CVE-2024-26720": { + "cmt_msg": "mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again" + }, "CVE-2021-33655": { "cmt_msg": "fbcon: Disallow setting font bigger than screen size" }, "CVE-2022-41858": { "cmt_msg": "drivers: net: slip: fix NPD bug in sl_tx_timeout()" }, + "CVE-2024-26726": { + "cmt_msg": "btrfs: don't drop extent_map for free space inode on write error" + }, + "CVE-2022-3176": { + "cmt_msg": "io_uring: fix UAF due to missing POLLFREE handling" + }, + "CVE-2023-2163": { + "cmt_msg": "bpf: Fix incorrect verifier pruning due to missing register precision taints" + }, "CVE-2023-1206": { "cmt_msg": "tcp: Reduce chance of collisions in inet6_hashfn()." }, @@ -130190,11 +169160,23 @@ "CVE-2023-3355": { "cmt_msg": "drm/msm/gem: Add check for kmalloc" }, + "CVE-2023-52519": { + "cmt_msg": "HID: intel-ish-hid: ipc: Disable and reenable ACPI GPE bit" + }, + "CVE-2023-52516": { + "cmt_msg": "dma-debug: don't call __dma_entry_alloc_check_leak() under free_entries_lock" + }, + "CVE-2023-52517": { + "cmt_msg": "spi: sun6i: fix race between DMA RX transfer completion and RX FIFO drain" + }, + "CVE-2023-52515": { + "cmt_msg": "RDMA/srp: Do not call scsi_done() from srp_abort()" + }, "CVE-2019-15902": { "cmt_msg": "unknown" }, - "CVE-2024-25739": { - "cmt_msg": "" + "CVE-2023-52510": { + "cmt_msg": "ieee802154: ca8210: Fix a potential UAF in ca8210_probe" }, "CVE-2023-3358": { "cmt_msg": "HID: intel_ish-hid: Add check for ishtp_dma_tx_map" @@ -130206,7 +169188,7 @@ "cmt_msg": "" }, "CVE-2023-6536": { - "cmt_msg": "" + "cmt_msg": "nvmet-tcp: fix a crash in nvmet_req_complete()" }, "CVE-2021-33624": { "cmt_msg": "bpf: Inherit expanded/patched seen count from old aux data" @@ -130226,18 +169208,33 @@ "CVE-2024-1151": { "cmt_msg": "net: openvswitch: limit the number of recursions from action sets" }, + "CVE-2024-26659": { + "cmt_msg": "xhci: handle isoc Babble and Buffer Overrun events properly" + }, + "CVE-2024-26658": { + "cmt_msg": "bcachefs: grab s_umount only if snapshotting" + }, "CVE-2010-5321": { "cmt_msg": "" }, "CVE-2021-20322": { "cmt_msg": "ipv6: make exception cache less predictible" }, + "CVE-2024-26654": { + "cmt_msg": "ALSA: sh: aica: reorder cleanup operations to avoid UAF bugs" + }, "CVE-2021-20320": { "cmt_msg": "s390/bpf: Fix optimizing out zero-extensions" }, "CVE-2021-20321": { "cmt_msg": "ovl: fix missing negative dentry check in ovl_rename()" }, + "CVE-2024-26651": { + "cmt_msg": "sr9800: Add check for usbnet_get_endpoints" + }, + "CVE-2024-26650": { + "cmt_msg": "platform/x86: p2sb: Allow p2sb_bar() calls during PCI device probe" + }, "CVE-2022-42896": { "cmt_msg": "Bluetooth: L2CAP: Fix accepting connection request for invalid SPSM" }, @@ -130250,9 +169247,27 @@ "CVE-2022-1048": { "cmt_msg": "ALSA: pcm: Fix races among concurrent hw_params and hw_free calls" }, + "CVE-2024-26803": { + "cmt_msg": "net: veth: clear GRO when clearing XDP even when down" + }, + "CVE-2023-52475": { + "cmt_msg": "Input: powermate - fix use-after-free in powermate_config_complete" + }, + "CVE-2023-52474": { + "cmt_msg": "IB/hfi1: Fix bugs with non-PAGE_SIZE-end multi-iovec user SDMA requests" + }, + "CVE-2023-52477": { + "cmt_msg": "usb: hub: Guard against accesses to uninitialized BOS descriptors" + }, + "CVE-2023-52476": { + "cmt_msg": "perf/x86/lbr: Filter vsyscall addresses" + }, "CVE-2023-22995": { "cmt_msg": "usb: dwc3: dwc3-qcom: Add missing platform_device_put() in dwc3_qcom_acpi_register_core" }, + "CVE-2023-52470": { + "cmt_msg": "drm/radeon: check the alloc_workqueue return value in radeon_crtc_init()" + }, "CVE-2024-21803": { "cmt_msg": "" }, @@ -130262,8 +169277,14 @@ "CVE-2023-4563": { "cmt_msg": "netfilter: nf_tables: don't skip expired elements during walk" }, - "CVE-2022-26365": { - "cmt_msg": "xen/blkfront: fix leaking data in shared pages" + "CVE-2023-52479": { + "cmt_msg": "ksmbd: fix uaf in smb20_oplock_break_ack" + }, + "CVE-2023-52478": { + "cmt_msg": "HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect" + }, + "CVE-2021-3542": { + "cmt_msg": "" }, "CVE-2024-24860": { "cmt_msg": "Bluetooth: Fix atomicity violation in {min,max}_key_size_set" @@ -130272,11 +169293,14 @@ "cmt_msg": "drm/msm/dpu: Add check for pstates" }, "CVE-2024-22099": { - "cmt_msg": "" + "cmt_msg": "Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security" }, "CVE-2023-30456": { "cmt_msg": "KVM: nVMX: add missing consistency checks for CR0 and CR4" }, + "CVE-2022-48626": { + "cmt_msg": "moxart: fix potential use-after-free on remove path" + }, "CVE-2022-23041": { "cmt_msg": "xen/9p: use alloc/free_pages_exact()" }, @@ -130295,6 +169319,9 @@ "CVE-2021-43267": { "cmt_msg": "tipc: fix size validations for the MSG_CRYPTO type" }, + "CVE-2021-47071": { + "cmt_msg": "uio_hv_generic: Fix a memory leak in error handling paths" + }, "CVE-2022-45884": { "cmt_msg": "" }, @@ -130313,6 +169340,12 @@ "CVE-2024-25741": { "cmt_msg": "" }, + "CVE-2024-26778": { + "cmt_msg": "fbdev: savage: Error out if pixclock equals zero" + }, + "CVE-2024-26809": { + "cmt_msg": "netfilter: nft_set_pipapo: release elements in clone only from destroy path" + }, "CVE-2022-26966": { "cmt_msg": "sr9700: sanity check for packet length" }, @@ -130322,23 +169355,59 @@ "CVE-2023-1989": { "cmt_msg": "Bluetooth: btsdio: fix use after free bug in btsdio_remove due to unfinished work" }, + "CVE-2024-26806": { + "cmt_msg": "spi: cadence-qspi: remove system-wide suspend helper calls from runtime PM hooks" + }, "CVE-2021-37159": { "cmt_msg": "usb: hso: fix error handling code of hso_create_net_device" }, - "CVE-2024-25744": { - "cmt_msg": "x86/coco: Disable 32-bit emulation by default on TDX and SEV" + "CVE-2023-4732": { + "cmt_msg": "mm/userfaultfd: fix uffd-wp special cases for fork()" + }, + "CVE-2024-26802": { + "cmt_msg": "stmmac: Clear variable when destroying workqueue" + }, + "CVE-2023-52508": { + "cmt_msg": "nvme-fc: Prevent null pointer dereference in nvme_fc_io_getuuid()" + }, + "CVE-2023-52606": { + "cmt_msg": "powerpc/lib: Validate size for vector operations" + }, + "CVE-2023-52607": { + "cmt_msg": "powerpc/mm: Fix null-pointer dereference in pgtable_cache_add" + }, + "CVE-2023-52604": { + "cmt_msg": "FS:JFS:UBSAN:array-index-out-of-bounds in dbAdjTree" + }, + "CVE-2023-52602": { + "cmt_msg": "jfs: fix slab-out-of-bounds Read in dtSearch" + }, + "CVE-2023-52603": { + "cmt_msg": "UBSAN: array-index-out-of-bounds in dtSplitRoot" }, "CVE-2022-25265": { "cmt_msg": "" }, + "CVE-2023-52601": { + "cmt_msg": "jfs: fix array-index-out-of-bounds in dbAdjTree" + }, "CVE-2024-26593": { "cmt_msg": "i2c: i801: Fix block process call transactions" }, + "CVE-2023-52600": { + "cmt_msg": "jfs: fix uaf in jfs_evict_inode" + }, + "CVE-2023-52608": { + "cmt_msg": "firmware: arm_scmi: Check mailbox/SMT channel for consistency" + }, + "CVE-2023-52609": { + "cmt_msg": "binder: fix race between mmput() and do_exit()" + }, "CVE-2022-21499": { "cmt_msg": "lockdown: also lock down previous kgdb use" }, "CVE-2024-23196": { - "cmt_msg": "" + "cmt_msg": "ALSA: hda: fix a possible null-pointer dereference due to data race in snd_hdac_regmap_sync()" }, "CVE-2023-4208": { "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free" @@ -130364,9 +169433,15 @@ "CVE-2023-0160": { "cmt_msg": "bpf, sockmap: fix deadlocks in the sockhash and sockmap" }, + "CVE-2023-52506": { + "cmt_msg": "LoongArch: Set all reserved memblocks on Node#0 at initialization" + }, "CVE-2022-2663": { "cmt_msg": "netfilter: nf_conntrack_irc: Fix forged IP logic" }, + "CVE-2024-26782": { + "cmt_msg": "mptcp: fix double-free on socket dismantle" + }, "CVE-2022-43750": { "cmt_msg": "usb: mon: make mmapped memory read only" }, @@ -130382,17 +169457,29 @@ "CVE-2023-4010": { "cmt_msg": "" }, - "CVE-2022-38457": { - "cmt_msg": "drm/vmwgfx: Remove rcu locks from user resources" + "CVE-2021-47167": { + "cmt_msg": "NFS: Fix an Oopsable condition in __nfs_pageio_add_request()" }, - "CVE-2022-20424": { - "cmt_msg": "io_uring: remove io_identity" + "CVE-2021-47166": { + "cmt_msg": "NFS: Don't corrupt the value of pg_bytes_written in nfs_do_recoalesce()" }, - "CVE-2022-20422": { - "cmt_msg": "arm64: fix oops in concurrently setting insn_emulation sysctls" + "CVE-2021-47165": { + "cmt_msg": "drm/meson: fix shutdown crash when component not probed" }, - "CVE-2022-20421": { - "cmt_msg": "binder: fix UAF of ref->proc caused by race condition" + "CVE-2021-47164": { + "cmt_msg": "net/mlx5e: Fix null deref accessing lag dev" + }, + "CVE-2021-47163": { + "cmt_msg": "tipc: wait and exit until all work queues are done" + }, + "CVE-2021-46969": { + "cmt_msg": "bus: mhi: core: Fix invalid error returning in mhi_queue" + }, + "CVE-2021-47161": { + "cmt_msg": "spi: spi-fsl-dspi: Fix a resource leak in an error handling path" + }, + "CVE-2021-47160": { + "cmt_msg": "net: dsa: mt7530: fix VLAN traffic leaks" }, "CVE-2023-4385": { "cmt_msg": "fs: jfs: fix possible NULL pointer dereference in dbFree()" @@ -130400,9 +169487,18 @@ "CVE-2023-4387": { "cmt_msg": "net: vmxnet3: fix possible use-after-free bugs in vmxnet3_rq_alloc_rx_buf()" }, + "CVE-2021-47169": { + "cmt_msg": "serial: rp2: use 'request_firmware' instead of 'request_firmware_nowait'" + }, + "CVE-2021-47168": { + "cmt_msg": "NFS: fix an incorrect limit in filelayout_decode_layout()" + }, "CVE-2019-19378": { "cmt_msg": "" }, + "CVE-2023-52482": { + "cmt_msg": "x86/srso: Add SRSO mitigation for Hygon processors" + }, "CVE-2022-36879": { "cmt_msg": "xfrm: xfrm_policy: fix a possible double xfrm_pols_put() in xfrm_bundle_lookup()" }, @@ -130454,6 +169550,9 @@ "CVE-2022-1263": { "cmt_msg": "KVM: avoid NULL pointer dereference in kvm_dirty_ring_push" }, + "CVE-2023-52610": { + "cmt_msg": "net/sched: act_ct: fix skb leak and crash on ooo frags" + }, "CVE-2021-35477": { "cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4" }, @@ -130469,11 +169568,20 @@ "CVE-2022-2209": { "cmt_msg": "" }, + "CVE-2023-52624": { + "cmt_msg": "drm/amd/display: Wake DMCUB before executing GPINT commands" + }, "CVE-2021-37576": { "cmt_msg": "KVM: PPC: Book3S: Fix H_RTAS rets buffer overflow" }, + "CVE-2024-26775": { + "cmt_msg": "aoe: avoid potential deadlock at set_capacity" + }, + "CVE-2022-36123": { + "cmt_msg": "x86: Clear .brk area at early boot" + }, "CVE-2023-7042": { - "cmt_msg": "" + "cmt_msg": "wifi: ath10k: fix NULL pointer dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev()" }, "CVE-2022-3594": { "cmt_msg": "r8152: Rate limit overflow messages" @@ -130481,8 +169589,11 @@ "CVE-2022-3595": { "cmt_msg": "cifs: fix double-fault crash during ntlmssp" }, + "CVE-2023-52559": { + "cmt_msg": "iommu/vt-d: Avoid memory allocation in iommu_suspend()" + }, "CVE-2023-47233": { - "cmt_msg": "" + "cmt_msg": "wifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach" }, "CVE-2024-23850": { "cmt_msg": "btrfs: do not ASSERT() if the newly created subvolume already got read" @@ -130490,18 +169601,45 @@ "CVE-2024-23851": { "cmt_msg": "dm: limit the number of targets and parameter size area" }, + "CVE-2023-52629": { + "cmt_msg": "sh: push-switch: Reorder cleanup operations to avoid use-after-free bug" + }, "CVE-2023-3610": { "cmt_msg": "netfilter: nf_tables: fix chain binding transaction logic" }, "CVE-2022-1462": { "cmt_msg": "tty: use new tty_insert_flip_string_and_push_buffer() in pty_write()" }, + "CVE-2024-26758": { + "cmt_msg": "md: Don't ignore suspended array in md_check_recovery()" + }, + "CVE-2024-26610": { + "cmt_msg": "wifi: iwlwifi: fix a memory corruption" + }, "CVE-2023-6606": { "cmt_msg": "smb: client: fix OOB in smbCalcSize()" }, + "CVE-2024-26614": { + "cmt_msg": "tcp: make sure init the accept_queue's spinlocks once" + }, "CVE-2022-1729": { "cmt_msg": "perf: Fix sys_perf_event_open() race against self" }, + "CVE-2024-26751": { + "cmt_msg": "ARM: ep93xx: Add terminator to gpiod_lookup_table" + }, + "CVE-2024-26752": { + "cmt_msg": "l2tp: pass correct message length to ip6_append_data" + }, + "CVE-2024-26754": { + "cmt_msg": "gtp: fix use-after-free and null-ptr-deref in gtp_genl_dump_pdp()" + }, + "CVE-2024-26756": { + "cmt_msg": "md: Don't register sync_thread for reshape directly" + }, + "CVE-2024-26757": { + "cmt_msg": "md: Don't ignore read-only array in md_check_recovery()" + }, "CVE-2023-52439": { "cmt_msg": "uio: Fix use-after-free in uio_open" }, @@ -130523,9 +169661,24 @@ "CVE-2022-2964": { "cmt_msg": "net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup" }, + "CVE-2024-26688": { + "cmt_msg": "fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super" + }, + "CVE-2024-23307": { + "cmt_msg": "md/raid5: fix atomicity violation in raid5_cache_count" + }, "CVE-2022-2961": { "cmt_msg": "" }, + "CVE-2024-26680": { + "cmt_msg": "net: atlantic: Fix DMA mapping for PTP hwts ring" + }, + "CVE-2024-26686": { + "cmt_msg": "fs/proc: do_task_stat: use sig->stats_lock to gather the threads/children stats" + }, + "CVE-2024-26687": { + "cmt_msg": "xen/events: close evtchn after mapping cleanup" + }, "CVE-2023-51779": { "cmt_msg": "Bluetooth: af_bluetooth: Fix Use-After-Free in bt_sock_recvmsg" }, @@ -130547,8 +169700,8 @@ "CVE-2022-39190": { "cmt_msg": "netfilter: nf_tables: disallow binding to already bound chain" }, - "CVE-2023-2162": { - "cmt_msg": "scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress" + "CVE-2022-3077": { + "cmt_msg": "i2c: ismt: prevent memory corruption in ismt_access()" }, "CVE-2023-45871": { "cmt_msg": "igb: set max size RX buffer when store bad packet is enabled" @@ -130556,8 +169709,14 @@ "CVE-2023-0266": { "cmt_msg": "ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF" }, - "CVE-2023-4623": { - "cmt_msg": "net/sched: sch_hfsc: Ensure inner classes have fsc curve" + "CVE-2023-1838": { + "cmt_msg": "Fix double fget() in vhost_net_set_backend()" + }, + "CVE-2024-26663": { + "cmt_msg": "tipc: Check the bearer type before calling tipc_udp_nl_bearer_add()" + }, + "CVE-2024-26598": { + "cmt_msg": "KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache" }, "CVE-2023-6040": { "cmt_msg": "netfilter: nf_tables: Reject tables of unsupported family" @@ -130571,17 +169730,32 @@ "CVE-2021-4028": { "cmt_msg": "RDMA/cma: Do not change route.addr.src_addr.ss_family" }, - "CVE-2024-26598": { - "cmt_msg": "KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache" + "CVE-2023-52498": { + "cmt_msg": "PM: sleep: Fix possible deadlocks in core system-wide PM code" + }, + "CVE-2024-26774": { + "cmt_msg": "ext4: avoid dividing by 0 in mb_update_avg_fragment_size() when block bitmap corrupt" }, "CVE-2021-4023": { "cmt_msg": "io-wq: fix cancellation on create-worker failure" }, + "CVE-2023-52640": { + "cmt_msg": "fs/ntfs3: Fix oob in ntfs_listxattr" + }, + "CVE-2023-52641": { + "cmt_msg": "fs/ntfs3: Add NULL ptr dereference checking at the end of attr_allocate_frame()" + }, "CVE-2021-0399": { "cmt_msg": "" }, - "CVE-2021-38199": { - "cmt_msg": "NFSv4: Initialise connection to the server in nfs4_alloc_client()" + "CVE-2023-52488": { + "cmt_msg": "serial: sc16is7xx: convert from _raw_ to _noinc_ regmap functions for FIFO" + }, + "CVE-2023-52489": { + "cmt_msg": "mm/sparsemem: fix race in accessing memory_section->usage" + }, + "CVE-2021-47070": { + "cmt_msg": "uio_hv_generic: Fix another memory leak in error handling paths" }, "CVE-2023-42755": { "cmt_msg": "net/sched: Retire rsvp classifier" @@ -130589,6 +169763,12 @@ "CVE-2020-36516": { "cmt_msg": "ipv4: avoid using shared IP generator for connected sockets" }, + "CVE-2023-52486": { + "cmt_msg": "drm: Don't unref the same fb many times by mistake due to deadlock handling" + }, + "CVE-2023-52480": { + "cmt_msg": "ksmbd: fix race condition between session lookup and expire" + }, "CVE-2012-4542": { "cmt_msg": "" }, @@ -130610,9 +169790,15 @@ "CVE-2021-46283": { "cmt_msg": "netfilter: nf_tables: initialize set before expression setup" }, + "CVE-2023-52492": { + "cmt_msg": "dmaengine: fix NULL pointer in channel unregistration function" + }, "CVE-2023-3609": { "cmt_msg": "net/sched: cls_u32: Fix reference counter leak leading to overflow" }, + "CVE-2022-44033": { + "cmt_msg": "char: pcmcia: remove all the drivers" + }, "CVE-2022-1974": { "cmt_msg": "nfc: replace improper check device_is_registered() in netlink related functions" }, @@ -130622,11 +169808,47 @@ "CVE-2022-1972": { "cmt_msg": "netfilter: nf_tables: sanitize nft_set_desc_concat_parse()" }, + "CVE-2023-52491": { + "cmt_msg": "media: mtk-jpeg: Fix use after free bug due to error path handling in mtk_jpeg_dec_device_run" + }, + "CVE-2022-44032": { + "cmt_msg": "char: pcmcia: remove all the drivers" + }, + "CVE-2021-47080": { + "cmt_msg": "RDMA/core: Prevent divide-by-zero error triggered by the user" + }, + "CVE-2021-47129": { + "cmt_msg": "netfilter: nft_ct: skip expectations for confirmed conntrack" + }, + "CVE-2021-47083": { + "cmt_msg": "pinctrl: mediatek: fix global-out-of-bounds issue" + }, + "CVE-2021-47086": { + "cmt_msg": "phonet/pep: refuse to enable an unbound pipe" + }, "CVE-2022-32981": { "cmt_msg": "powerpc/32: Fix overread/overwrite of thread_struct via ptrace" }, - "CVE-2022-3424": { - "cmt_msg": "misc: sgi-gru: fix use-after-free error in gru_set_context_option, gru_fault and gru_handle_user_call_os" + "CVE-2021-47123": { + "cmt_msg": "io_uring: fix ltout double free on completion race" + }, + "CVE-2021-47122": { + "cmt_msg": "net: caif: fix memory leak in caif_device_notify" + }, + "CVE-2021-47121": { + "cmt_msg": "net: caif: fix memory leak in cfusbl_device_notify" + }, + "CVE-2021-47120": { + "cmt_msg": "HID: magicmouse: fix NULL-deref on disconnect" + }, + "CVE-2021-47126": { + "cmt_msg": "ipv6: Fix KASAN: slab-out-of-bounds Read in fib6_nh_flush_exceptions" + }, + "CVE-2021-47125": { + "cmt_msg": "sch_htb: fix refcount leak in htb_parent_to_leaf_offload" + }, + "CVE-2021-47124": { + "cmt_msg": "io_uring: fix link timeout refs" }, "CVE-2023-2269": { "cmt_msg": "dm ioctl: fix nested locking in table_clear() to remove deadlock concern" @@ -130634,17 +169856,23 @@ "CVE-2023-0394": { "cmt_msg": "ipv6: raw: Deduct extension header length in rawv6_push_pending_frames" }, + "CVE-2021-47078": { + "cmt_msg": "RDMA/rxe: Clear all QP fields if creation failed" + }, + "CVE-2024-26615": { + "cmt_msg": "net/smc: fix illegal rmb_desc access in SMC-D connection dump" + }, "CVE-2022-36402": { "cmt_msg": "drm/vmwgfx: Fix shader stage validation" }, - "CVE-2022-25258": { - "cmt_msg": "USB: gadget: validate interface OS descriptor requests" + "CVE-2021-4154": { + "cmt_msg": "cgroup: verify that source is a string" }, "CVE-2021-4155": { "cmt_msg": "xfs: map unwritten blocks in XFS_IOC_{ALLOC,FREE}SP just like fallocate" }, - "CVE-2008-2544": { - "cmt_msg": "" + "CVE-2022-3521": { + "cmt_msg": "kcm: avoid potential race in kcm_tx_work" }, "CVE-2021-4150": { "cmt_msg": "block: fix incorrect references to disk objects" @@ -130676,6 +169904,9 @@ "CVE-2021-3714": { "cmt_msg": "" }, + "CVE-2024-26733": { + "cmt_msg": "arp: Prevent overflow in arp_req_get()." + }, "CVE-2021-3896": { "cmt_msg": "isdn: cpai: check ctr->cnr to avoid array index out of bound" }, @@ -130706,8 +169937,8 @@ "CVE-2022-24959": { "cmt_msg": "yam: fix a memory leak in yam_siocdevprivate()" }, - "CVE-2022-33743": { - "cmt_msg": "xen-netfront: restore __skb_queue_tail() positioning in xennet_get_responses()" + "CVE-2022-25375": { + "cmt_msg": "usb: gadget: rndis: check size of RNDIS_MSG_SET command" }, "CVE-2022-33742": { "cmt_msg": "xen/blkfront: force data bouncing when backend is untrusted" @@ -130721,41 +169952,80 @@ "CVE-2024-24864": { "cmt_msg": "" }, + "CVE-2022-45885": { + "cmt_msg": "" + }, "CVE-2022-33744": { "cmt_msg": "xen/arm: Fix race in RB-tree based P2M accounting" }, - "CVE-2023-52443": { - "cmt_msg": "apparmor: avoid crash when parsed profile name is empty" + "CVE-2023-52596": { + "cmt_msg": "sysctl: Fix out of bounds access for empty sysctl registers" + }, + "CVE-2023-52597": { + "cmt_msg": "KVM: s390: fix setting of fpc register" + }, + "CVE-2023-52594": { + "cmt_msg": "wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus()" + }, + "CVE-2021-47014": { + "cmt_msg": "net/sched: act_ct: fix wild memory access when clearing fragments" }, "CVE-2022-2327": { "cmt_msg": "io_uring: remove any grabbing of context" }, - "CVE-2022-1280": { - "cmt_msg": "drm: avoid circular locks in drm_mode_getconnector" + "CVE-2021-47158": { + "cmt_msg": "net: dsa: sja1105: add error handling in sja1105_setup()" }, - "CVE-2023-2194": { - "cmt_msg": "i2c: xgene-slimpro: Fix out-of-bounds bug in xgene_slimpro_i2c_xfer()" + "CVE-2021-47159": { + "cmt_msg": "net: dsa: fix a crash if ->get_sset_count() fails" }, - "CVE-2023-52445": { - "cmt_msg": "media: pvrusb2: fix use after free on context disconnection" + "CVE-2022-2959": { + "cmt_msg": "pipe: Fix missing lock in pipe_resize_ring()" }, - "CVE-2022-41218": { - "cmt_msg": "media: dvb-core: Fix UAF due to refcount races at releasing" + "CVE-2021-47152": { + "cmt_msg": "mptcp: fix data stream corruption" }, - "CVE-2011-4917": { - "cmt_msg": "" + "CVE-2021-47153": { + "cmt_msg": "i2c: i801: Don't generate an interrupt on bus reset" + }, + "CVE-2021-47150": { + "cmt_msg": "net: fec: fix the potential memory leak in fec_enet_init()" + }, + "CVE-2021-47151": { + "cmt_msg": "interconnect: qcom: bcm-voter: add a missing of_node_put()" + }, + "CVE-2021-46936": { + "cmt_msg": "net: fix use-after-free in tw_timer_handler" + }, + "CVE-2021-46935": { + "cmt_msg": "binder: fix async_free_space accounting for empty parcels" + }, + "CVE-2021-46934": { + "cmt_msg": "i2c: validate user data in compat ioctl" + }, + "CVE-2021-46933": { + "cmt_msg": "usb: gadget: f_fs: Clear ffs_eventfd in ffs_data_clear." + }, + "CVE-2021-46932": { + "cmt_msg": "Input: appletouch - initialize work before device registration" + }, + "CVE-2021-46931": { + "cmt_msg": "net/mlx5e: Wrap the tx reporter dump callback to extract the sq" + }, + "CVE-2021-46930": { + "cmt_msg": "usb: mtu3: fix list_head check warning" }, "CVE-2022-36946": { "cmt_msg": "netfilter: nf_queue: do not allow packet truncation below transport header offset" }, - "CVE-2022-23222": { - "cmt_msg": "bpf: Replace PTR_TO_XXX_OR_NULL with PTR_TO_XXX | PTR_MAYBE_NULL" + "CVE-2011-4916": { + "cmt_msg": "" }, "CVE-2022-21166": { "cmt_msg": "x86/speculation/mmio: Enable CPU Fill buffer clearing on idle" }, "CVE-2024-0841": { - "cmt_msg": "" + "cmt_msg": "fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super" }, "CVE-2023-52449": { "cmt_msg": "mtd: Fix gluebi NULL pointer dereference caused by ftl notifier" @@ -130778,6 +170048,9 @@ "CVE-2020-16119": { "cmt_msg": "dccp: don't duplicate ccid when cloning dccp sock" }, + "CVE-2024-26748": { + "cmt_msg": "usb: cdns3: fix memory double free when handle zero packet" + }, "CVE-2022-1198": { "cmt_msg": "drivers: hamradio: 6pack: fix UAF bug caused by mod_timer()" }, @@ -130793,6 +170066,9 @@ "CVE-2021-39800": { "cmt_msg": "" }, + "CVE-2024-26784": { + "cmt_msg": "pmdomain: arm: Fix NULL dereference on scmi_perf_domain removal" + }, "CVE-2022-1195": { "cmt_msg": "hamradio: improve the incomplete fix to avoid NPD" }, @@ -130811,15 +170087,36 @@ "CVE-2022-45886": { "cmt_msg": "media: dvb-core: Fix use-after-free due on race condition at dvb_net" }, + "CVE-2023-52509": { + "cmt_msg": "ravb: Fix use-after-free issue in ravb_tx_timeout_work()" + }, "CVE-2023-46343": { "cmt_msg": "nfc: nci: fix possible NULL pointer dereference in send_acknowledge()" }, "CVE-2021-4204": { "cmt_msg": "bpf: Generalize check_ctx_reg for reuse with other types" }, + "CVE-2023-52504": { + "cmt_msg": "x86/alternatives: Disable KASAN in apply_alternatives()" + }, + "CVE-2023-52507": { + "cmt_msg": "nfc: nci: assert requested protocol is valid" + }, "CVE-2023-2124": { "cmt_msg": "xfs: verify buffer contents when we skip log replay" }, + "CVE-2023-52501": { + "cmt_msg": "ring-buffer: Do not attempt to read past \"commit\"" + }, + "CVE-2023-52500": { + "cmt_msg": "scsi: pm80xx: Avoid leaking tags when processing OPC_INB_SET_CONTROLLER_CONFIG command" + }, + "CVE-2023-52503": { + "cmt_msg": "tee: amdtee: fix use-after-free vulnerability in amdtee_close_session" + }, + "CVE-2023-52502": { + "cmt_msg": "net: nfc: fix races in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn()" + }, "CVE-2023-1281": { "cmt_msg": "net/sched: tcindex: update imperfect hash filters respecting rcu" }, @@ -130844,6 +170141,12 @@ "CVE-2022-27672": { "cmt_msg": "x86/speculation: Identify processors vulnerable to SMT RSB predictions" }, + "CVE-2024-26668": { + "cmt_msg": "netfilter: nft_limit: reject configurations that cause integer overflow" + }, + "CVE-2024-26669": { + "cmt_msg": "net/sched: flower: Fix chain template offload" + }, "CVE-2020-25220": { "cmt_msg": "" }, @@ -130853,17 +170156,32 @@ "CVE-2022-0171": { "cmt_msg": "KVM: SEV: add cache flush to solve SEV cache incoherency issues" }, + "CVE-2024-26661": { + "cmt_msg": "drm/amd/display: Add NULL test for 'timing generator' in 'dcn21_set_pipe()'" + }, + "CVE-2024-26662": { + "cmt_msg": "drm/amd/display: Fix 'panel_cntl' could be null in 'dcn21_set_backlight_level()'" + }, "CVE-2023-26242": { "cmt_msg": "" }, + "CVE-2024-26664": { + "cmt_msg": "hwmon: (coretemp) Fix out-of-bounds memory access" + }, + "CVE-2024-26665": { + "cmt_msg": "tunnels: fix out of bounds access when building IPv6 PMTU error" + }, "CVE-2019-16089": { "cmt_msg": "" }, "CVE-2021-38198": { "cmt_msg": "KVM: X86: MMU: Use the correct inherited permissions to get shadow page" }, - "CVE-2022-3106": { - "cmt_msg": "sfc_ef100: potential dereference of null pointer" + "CVE-2021-38199": { + "cmt_msg": "NFSv4: Initialise connection to the server in nfs4_alloc_client()" + }, + "CVE-2024-26689": { + "cmt_msg": "ceph: prevent use-after-free in encode_cap_msg()" }, "CVE-2022-1679": { "cmt_msg": "ath9k: fix use-after-free in ath9k_hif_usb_rx_cb" @@ -130874,8 +170192,8 @@ "CVE-2022-1671": { "cmt_msg": "rxrpc: fix some null-ptr-deref bugs in server_key.c" }, - "CVE-2022-3176": { - "cmt_msg": "io_uring: fix UAF due to missing POLLFREE handling" + "CVE-2021-3847": { + "cmt_msg": "" }, "CVE-2023-52442": { "cmt_msg": "ksmbd: validate session id and tree id in compound request" @@ -130883,14 +170201,14 @@ "CVE-2022-40768": { "cmt_msg": "scsi: stex: Properly zero out the passthrough command structure" }, - "CVE-2022-2959": { - "cmt_msg": "pipe: Fix missing lock in pipe_resize_ring()" + "CVE-2022-1280": { + "cmt_msg": "drm: avoid circular locks in drm_mode_getconnector" }, "CVE-2021-3923": { "cmt_msg": "RDMA/core: Don't infoleak GRH fields" }, - "CVE-2022-3077": { - "cmt_msg": "i2c: ismt: prevent memory corruption in ismt_access()" + "CVE-2011-4917": { + "cmt_msg": "" }, "CVE-2021-45485": { "cmt_msg": "ipv6: use prandom_u32() for ID generation" @@ -130904,11 +170222,26 @@ "CVE-2023-23039": { "cmt_msg": "" }, + "CVE-2024-26660": { + "cmt_msg": "drm/amd/display: Implement bounds check for stream encoder creation in DCN301" + }, + "CVE-2024-26719": { + "cmt_msg": "nouveau: offload fence uevents work to workqueue" + }, + "CVE-2024-26715": { + "cmt_msg": "usb: dwc3: gadget: Fix NULL pointer dereference in dwc3_gadget_suspend" + }, "CVE-2024-1312": { "cmt_msg": "mm: lock_vma_under_rcu() must check vma->anon_vma under vma lock" }, "CVE-2023-3338": { "cmt_msg": "Remove DECnet support from kernel" + }, + "CVE-2024-26712": { + "cmt_msg": "powerpc/kasan: Fix addr error caused by page alignment" + }, + "CVE-2024-26713": { + "cmt_msg": "powerpc/pseries/iommu: Fix iommu initialisation during DLPAR add" } } }, @@ -131026,6 +170359,10 @@ "cmt_msg": "KVM: s390: Return error on SIDA memop on normal guest", "cmt_id": "8c68c50109c22502b647f4e86ec74400c7a3f6e0" }, + "CVE-2022-48626": { + "cmt_msg": "moxart: fix potential use-after-free on remove path", + "cmt_id": "7f901d53f120d1921f84f7b9b118e87e94b403c5" + }, "CVE-2022-0435": { "cmt_msg": "tipc: improve size validations for received domain records", "cmt_id": "59ff7514f8c56f166aadca49bcecfa028e0ad50f" @@ -131188,6 +170525,10 @@ "cmt_msg": "net/packet: fix slab-out-of-bounds access in packet_recvmsg()", "cmt_id": "ef591b35176029fdefea38e8388ffa371e18f4b2" }, + "CVE-2022-48629": { + "cmt_msg": "crypto: qcom-rng - ensure buffer for generate is completely filled", + "cmt_id": "485995cbc98a4f77cfd4f8ed4dd7ff8ab262964d" + }, "CVE-2022-3107": { "cmt_msg": "hv_netvsc: Add check for kvmalloc_array", "cmt_id": "411e256ddf6c2295439c74f2176b0ed630c148f3" @@ -131337,6 +170678,27 @@ "CVE-2023-21400": { "cmt_msg": "" }, + "CVE-2024-26685": { + "cmt_msg": "nilfs2: fix potential bug in end_buffer_async_write" + }, + "CVE-2023-52615": { + "cmt_msg": "hwrng: core - Fix page fault dead lock on mmap-ed hwrng" + }, + "CVE-2023-52614": { + "cmt_msg": "PM / devfreq: Fix buffer overflow in trans_stat_show" + }, + "CVE-2023-52617": { + "cmt_msg": "PCI: switchtec: Fix stdev_release() crash after surprise hot remove" + }, + "CVE-2023-52616": { + "cmt_msg": "crypto: lib/mpi - Fix unexpected pointer access in mpi_ec_init" + }, + "CVE-2023-52610": { + "cmt_msg": "net/sched: act_ct: fix skb leak and crash on ooo frags" + }, + "CVE-2023-52612": { + "cmt_msg": "crypto: scomp - fix req->dst buffer overflow" + }, "CVE-2022-3104": { "cmt_msg": "lkdtm/bugs: Check for the NULL pointer after calling kmalloc" }, @@ -131379,9 +170741,18 @@ "CVE-2024-0584": { "cmt_msg": "ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet" }, + "CVE-2024-26663": { + "cmt_msg": "tipc: Check the bearer type before calling tipc_udp_nl_bearer_add()" + }, + "CVE-2024-26614": { + "cmt_msg": "tcp: make sure init the accept_queue's spinlocks once" + }, "CVE-2022-39190": { "cmt_msg": "netfilter: nf_tables: disallow binding to already bound chain" }, + "CVE-2024-26759": { + "cmt_msg": "mm/swap: fix race when skipping swapcache" + }, "CVE-2022-21125": { "cmt_msg": "x86/speculation/mmio: Reuse SRBDS mitigation for SBDS" }, @@ -131397,6 +170768,9 @@ "CVE-2022-21123": { "cmt_msg": "x86/speculation/mmio: Add mitigation for Processor MMIO Stale Data" }, + "CVE-2024-26774": { + "cmt_msg": "ext4: avoid dividing by 0 in mb_update_avg_fragment_size() when block bitmap corrupt" + }, "CVE-2023-0459": { "cmt_msg": "uaccess: Add speculation barrier to copy_from_user()" }, @@ -131448,9 +170822,15 @@ "CVE-2022-34918": { "cmt_msg": "netfilter: nf_tables: stricter validation of element data" }, + "CVE-2024-25739": { + "cmt_msg": "" + }, "CVE-2022-2602": { "cmt_msg": "io_uring/af_unix: defer registered files gc to io_uring release" }, + "CVE-2023-52511": { + "cmt_msg": "spi: sun6i: reduce DMA RX transfer width to single byte" + }, "CVE-2022-47939": { "cmt_msg": "ksmbd: fix use-after-free bug in smb2_tree_disconect" }, @@ -131508,30 +170888,69 @@ "CVE-2023-1073": { "cmt_msg": "HID: check empty report_list in hid_validate_values()" }, + "CVE-2024-26747": { + "cmt_msg": "usb: roles: fix NULL pointer issue when put module's reference" + }, + "CVE-2024-26745": { + "cmt_msg": "powerpc/pseries/iommu: IOMMU table is not initialized for kdump over SR-IOV" + }, "CVE-2023-51781": { "cmt_msg": "appletalk: Fix Use-After-Free in atalk_ioctl" }, + "CVE-2024-26743": { + "cmt_msg": "RDMA/qedr: Fix qedr_create_user_qp error flow" + }, + "CVE-2024-26740": { + "cmt_msg": "net/sched: act_mirred: use the backlog for mirred ingress" + }, "CVE-2022-1734": { "cmt_msg": "nfc: nfcmrvl: main: reorder destructive operations in nfcmrvl_nci_unregister_dev to avoid bugs" }, + "CVE-2024-26749": { + "cmt_msg": "usb: cdns3: fixed memory use after free at cdns3_gadget_ep_disable()" + }, + "CVE-2024-26748": { + "cmt_msg": "usb: cdns3: fix memory double free when handle zero packet" + }, "CVE-2023-1652": { "cmt_msg": "NFSD: fix use-after-free in nfsd4_ssc_setup_dul()" }, + "CVE-2024-26787": { + "cmt_msg": "mmc: mmci: stm32: fix DMA API overlapping mappings warning" + }, "CVE-2022-3707": { "cmt_msg": "drm/i915/gvt: fix double free bug in split_2MB_gtt_entry" }, "CVE-2022-2503": { "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag" }, + "CVE-2024-26699": { + "cmt_msg": "drm/amd/display: Fix array-index-out-of-bounds in dcn35_clkmgr" + }, + "CVE-2024-26698": { + "cmt_msg": "hv_netvsc: Fix race condition between netvsc_probe and netvsc_remove" + }, + "CVE-2024-26691": { + "cmt_msg": "KVM: arm64: Fix circular locking dependency" + }, "CVE-2024-0562": { "cmt_msg": "writeback: avoid use-after-free after removing device" }, + "CVE-2023-52520": { + "cmt_msg": "platform/x86: think-lmi: Fix reference leak" + }, "CVE-2024-0564": { "cmt_msg": "" }, "CVE-2024-0565": { "cmt_msg": "smb: client: fix OOB in receive_encrypted_standard()" }, + "CVE-2024-26697": { + "cmt_msg": "nilfs2: fix data corruption in dsync block recovery for small block sizes" + }, + "CVE-2024-26696": { + "cmt_msg": "nilfs2: fix hang in nilfs_lookup_dirty_data_buffers()" + }, "CVE-2023-2176": { "cmt_msg": "RDMA/core: Refactor rdma_bind_addr" }, @@ -131544,9 +170963,15 @@ "CVE-2022-39188": { "cmt_msg": "mmu_gather: Force tlb-flush VM_PFNMAP vmas" }, + "CVE-2024-26788": { + "cmt_msg": "dmaengine: fsl-qdma: init irq after reg initialization" + }, "CVE-2005-3660": { "cmt_msg": "" }, + "CVE-2023-52619": { + "cmt_msg": "pstore/ram: Fix crash when setting number of cpus to an odd number" + }, "CVE-2023-31085": { "cmt_msg": "ubi: Refuse attaching if mtd's erasesize is 0" }, @@ -131562,24 +170987,45 @@ "CVE-2023-31081": { "cmt_msg": "" }, - "CVE-2024-23307": { - "cmt_msg": "" + "CVE-2023-52618": { + "cmt_msg": "block/rnbd-srv: Check for unlikely string overflow" + }, + "CVE-2024-0646": { + "cmt_msg": "net: tls, update curr on splice as well" + }, + "CVE-2023-52598": { + "cmt_msg": "s390/ptrace: handle setting of fpc register correctly" }, "CVE-2022-32296": { "cmt_msg": "tcp: increase source port perturb table to 2^16" }, + "CVE-2023-52499": { + "cmt_msg": "powerpc/47x: Fix 47x syscall return crash" + }, "CVE-2022-4543": { "cmt_msg": "" }, "CVE-2022-3028": { "cmt_msg": "af_key: Do not call xfrm_probe_algs in parallel" }, + "CVE-2023-52493": { + "cmt_msg": "bus: mhi: host: Drop chan lock before queuing buffers" + }, + "CVE-2023-52492": { + "cmt_msg": "dmaengine: fix NULL pointer in channel unregistration function" + }, "CVE-2020-14304": { "cmt_msg": "" }, "CVE-2022-2318": { "cmt_msg": "net: rose: fix UAF bugs caused by timer handler" }, + "CVE-2023-52497": { + "cmt_msg": "erofs: fix lz4 inplace decompression" + }, + "CVE-2023-52494": { + "cmt_msg": "bus: mhi: host: Add alignment check for event ring read pointer" + }, "CVE-2022-33981": { "cmt_msg": "floppy: disable FDRAWCMD by default" }, @@ -131604,6 +171050,9 @@ "CVE-2024-22386": { "cmt_msg": "" }, + "CVE-2024-26656": { + "cmt_msg": "drm/amdgpu: fix use-after-free bug" + }, "CVE-2023-37454": { "cmt_msg": "" }, @@ -131619,6 +171068,9 @@ "CVE-2023-33288": { "cmt_msg": "power: supply: bq24190: Fix use after free bug in bq24190_remove due to race condition" }, + "CVE-2023-52484": { + "cmt_msg": "iommu/arm-smmu-v3: Fix soft lockup triggered by arm_smmu_mm_invalidate_range" + }, "CVE-2022-29900": { "cmt_msg": "x86/kvm/vmx: Make noinstr clean" }, @@ -131631,12 +171083,18 @@ "CVE-2023-39192": { "cmt_msg": "netfilter: xt_u32: validate user space input" }, + "CVE-2023-52580": { + "cmt_msg": "net/core: Fix ETH_P_1588 flow dissector" + }, "CVE-2023-35829": { "cmt_msg": "media: rkvdec: fix use after free bug in rkvdec_remove" }, "CVE-2023-35828": { "cmt_msg": "usb: gadget: udc: renesas_usb3: Fix use after free bug in renesas_usb3_remove due to race condition" }, + "CVE-2023-52583": { + "cmt_msg": "ceph: fix deadlock or deadcode of misusing dget()" + }, "CVE-2022-1116": { "cmt_msg": "" }, @@ -131646,6 +171104,9 @@ "CVE-2023-35823": { "cmt_msg": "media: saa7134: fix use after free bug in saa7134_finidev due to race condition" }, + "CVE-2023-52582": { + "cmt_msg": "netfs: Only call folio_start_fscache() one time for each folio" + }, "CVE-2022-23816": { "cmt_msg": "x86/kvm/vmx: Make noinstr clean" }, @@ -131655,6 +171116,18 @@ "CVE-2023-35827": { "cmt_msg": "ravb: Fix use-after-free issue in ravb_tx_timeout_work()" }, + "CVE-2023-52481": { + "cmt_msg": "arm64: errata: Add Cortex-A520 speculative unprivileged load workaround" + }, + "CVE-2023-52585": { + "cmt_msg": "drm/amdgpu: Fix possible NULL dereference in amdgpu_ras_query_error_status_helper()" + }, + "CVE-2023-52584": { + "cmt_msg": "spmi: mediatek: Fix UAF on device remove" + }, + "CVE-2023-52587": { + "cmt_msg": "IB/ipoib: Fix mcast list locking" + }, "CVE-2023-38432": { "cmt_msg": "ksmbd: validate command payload size" }, @@ -131673,30 +171146,87 @@ "CVE-2022-4269": { "cmt_msg": "act_mirred: use the backlog for nested calls to mirred ingress" }, + "CVE-2024-26769": { + "cmt_msg": "nvmet-fc: avoid deadlock on delete association path" + }, + "CVE-2023-52483": { + "cmt_msg": "mctp: perform route lookups under a RCU read-side lock" + }, + "CVE-2023-52589": { + "cmt_msg": "media: rkisp1: Fix IRQ disable race issue" + }, + "CVE-2023-52588": { + "cmt_msg": "f2fs: fix to tag gcing flag on page during block migration" + }, + "CVE-2024-26768": { + "cmt_msg": "LoongArch: Change acpi_core_pic[NR_CPUS] to acpi_core_pic[MAX_CORE_PIC]" + }, "CVE-2022-34494": { "cmt_msg": "rpmsg: virtio: Fix possible double free in rpmsg_virtio_add_ctrl_dev()" }, "CVE-2022-34495": { "cmt_msg": "rpmsg: virtio: Fix possible double free in rpmsg_probe()" }, + "CVE-2024-26727": { + "cmt_msg": "btrfs: do not ASSERT() if the newly created subvolume already got read" + }, "CVE-2023-3567": { "cmt_msg": "vc_screen: move load of struct vc_data pointer in vcs_read() to avoid UAF" }, "CVE-2023-52340": { "cmt_msg": "ipv6: remove max_size check inline with ipv4" }, + "CVE-2024-26765": { + "cmt_msg": "LoongArch: Disable IRQ before init_fn() for nonboot CPUs" + }, + "CVE-2024-26767": { + "cmt_msg": "drm/amd/display: fixed integer types and null check locations" + }, + "CVE-2023-52475": { + "cmt_msg": "Input: powermate - fix use-after-free in powermate_config_complete" + }, "CVE-2023-6560": { "cmt_msg": "io_uring: don't allow discontig pages for IORING_SETUP_NO_MMAP" }, - "CVE-2023-30772": { - "cmt_msg": "power: supply: da9150: Fix use after free bug in da9150_charger_remove due to race condition" + "CVE-2022-1204": { + "cmt_msg": "ax25: Fix refcount leaks caused by ax25_cb_del()" }, "CVE-2023-1611": { "cmt_msg": "btrfs: fix race between quota disable and quota assign ioctls" }, + "CVE-2024-26763": { + "cmt_msg": "dm-crypt: don't modify the data when using authenticated encryption" + }, + "CVE-2024-26756": { + "cmt_msg": "md: Don't register sync_thread for reshape directly" + }, + "CVE-2024-26795": { + "cmt_msg": "riscv: Sparse-Memory/vmemmap out-of-bounds fix" + }, + "CVE-2024-26797": { + "cmt_msg": "drm/amd/display: Prevent potential buffer overflow in map_hw_resources" + }, + "CVE-2024-26790": { + "cmt_msg": "dmaengine: fsl-qdma: fix SoC may hang on 16 byte unaligned read" + }, "CVE-2022-1836": { "cmt_msg": "floppy: disable FDRAWCMD by default" }, + "CVE-2024-26793": { + "cmt_msg": "gtp: fix use-after-free and null-ptr-deref in gtp_newlink()" + }, + "CVE-2023-52530": { + "cmt_msg": "wifi: mac80211: fix potential key use-after-free" + }, + "CVE-2023-52531": { + "cmt_msg": "wifi: iwlwifi: mvm: Fix a memory corruption issue" + }, + "CVE-2023-52532": { + "cmt_msg": "net: mana: Fix TX CQE error handling" + }, + "CVE-2024-26798": { + "cmt_msg": "fbcon: always restore the old font data in fbcon_do_set_font()" + }, "CVE-2022-48425": { "cmt_msg": "fs/ntfs3: Validate MFT flags before replaying logs" }, @@ -131712,15 +171242,33 @@ "CVE-2023-46862": { "cmt_msg": "io_uring/fdinfo: lock SQ thread while retrieving thread cpu/pid" }, + "CVE-2024-26677": { + "cmt_msg": "rxrpc: Fix delayed ACKs to not set the reference serial number" + }, + "CVE-2024-26676": { + "cmt_msg": "af_unix: Call kfree_skb() for dead unix_(sk)->oob_skb in GC." + }, + "CVE-2024-26675": { + "cmt_msg": "ppp_async: limit MRU to 64K" + }, "CVE-2020-26556": { "cmt_msg": "" }, "CVE-2020-26557": { "cmt_msg": "" }, + "CVE-2024-26671": { + "cmt_msg": "blk-mq: fix IO hang from sbitmap wakeup race" + }, "CVE-2023-34324": { "cmt_msg": "xen/events: replace evtchn_rwlock with RCU" }, + "CVE-2024-26776": { + "cmt_msg": "spi: hisi-sfc-v3xx: Return IRQ_NONE if no interrupts were detected" + }, + "CVE-2024-26777": { + "cmt_msg": "fbdev: sis: Error out if pixclock equals zero" + }, "CVE-2019-20794": { "cmt_msg": "" }, @@ -131730,21 +171278,30 @@ "CVE-2023-3397": { "cmt_msg": "" }, + "CVE-2024-26773": { + "cmt_msg": "ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found()" + }, + "CVE-2024-26679": { + "cmt_msg": "inet: read sk->sk_family once in inet_recv_error()" + }, + "CVE-2024-26771": { + "cmt_msg": "dmaengine: ti: edma: Add some null pointer checks to the edma_probe" + }, "CVE-2021-3542": { "cmt_msg": "" }, "CVE-2023-52458": { "cmt_msg": "block: add check that partition length needs to be aligned with block size" }, - "CVE-2023-52457": { - "cmt_msg": "serial: 8250: omap: Don't skip resource freeing if pm_runtime_resume_and_get() failed" - }, "CVE-2018-1121": { "cmt_msg": "" }, "CVE-2023-52454": { "cmt_msg": "nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length" }, + "CVE-2023-28746": { + "cmt_msg": "x86/mmio: Disable KVM mitigation when X86_FEATURE_CLEAR_CPU_BUF is set" + }, "CVE-2023-52452": { "cmt_msg": "bpf: Fix accesses to uninit stack slots" }, @@ -131754,12 +171311,18 @@ "CVE-2022-3061": { "cmt_msg": "video: fbdev: i740fb: Error out if 'pixclock' equals zero" }, + "CVE-2024-26602": { + "cmt_msg": "sched/membarrier: reduce the ability to hammer on sys_membarrier" + }, "CVE-2024-1085": { "cmt_msg": "netfilter: nf_tables: check if catch-all set element is active in next generation" }, "CVE-2024-1086": { "cmt_msg": "netfilter: nf_tables: reject QUEUE/DROP verdict parameters" }, + "CVE-2024-26735": { + "cmt_msg": "ipv6: sr: fix possible use-after-free and null-ptr-deref" + }, "CVE-2022-3344": { "cmt_msg": "KVM: x86: nSVM: harden svm_free_nested against freeing vmcb02 while still in use" }, @@ -131775,15 +171338,33 @@ "CVE-2023-6240": { "cmt_msg": "" }, + "CVE-2024-26700": { + "cmt_msg": "drm/amd/display: Fix MST Null Ptr for RV" + }, + "CVE-2024-26707": { + "cmt_msg": "net: hsr: remove WARN_ONCE() in send_hsr_supervision_frame()" + }, + "CVE-2024-26706": { + "cmt_msg": "parisc: Fix random data corruption from exception handler" + }, "CVE-2023-23559": { "cmt_msg": "wifi: rndis_wlan: Prevent buffer overflow in rndis_query_oid" }, "CVE-2022-39842": { "cmt_msg": "video: fbdev: pxa3xx-gcu: Fix integer overflow in pxa3xx_gcu_write" }, + "CVE-2024-26702": { + "cmt_msg": "iio: magnetometer: rm3100: add boundary check for the value read from RM3100_REG_TMRC" + }, + "CVE-2024-26603": { + "cmt_msg": "x86/fpu: Stop relying on userspace for info to fault in xsave buffer" + }, "CVE-2023-32233": { "cmt_msg": "netfilter: nf_tables: deactivate anonymous set from preparation phase" }, + "CVE-2023-52586": { + "cmt_msg": "drm/msm/dpu: Add mutex lock in control vblank irq" + }, "CVE-2023-44466": { "cmt_msg": "libceph: harden msgr2.1 frame segment length checks" }, @@ -131796,6 +171377,30 @@ "CVE-2022-1012": { "cmt_msg": "secure_seq: use the 64 bits of the siphash for port offset calculation" }, + "CVE-2023-52620": { + "cmt_msg": "netfilter: nf_tables: disallow timeout for anonymous sets" + }, + "CVE-2023-52621": { + "cmt_msg": "bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers" + }, + "CVE-2023-52622": { + "cmt_msg": "ext4: avoid online resizing failures due to oversized flex bg" + }, + "CVE-2023-52623": { + "cmt_msg": "SUNRPC: Fix a suspicious RCU usage warning" + }, + "CVE-2023-52624": { + "cmt_msg": "drm/amd/display: Wake DMCUB before executing GPINT commands" + }, + "CVE-2023-52625": { + "cmt_msg": "drm/amd/display: Refactor DMCUB enter/exit idle interface" + }, + "CVE-2023-52627": { + "cmt_msg": "iio: adc: ad7091r: Allow users to configure device events" + }, + "CVE-2023-52628": { + "cmt_msg": "netfilter: nftables: exthdr: fix 4-byte stack OOB write" + }, "CVE-2021-26934": { "cmt_msg": "" }, @@ -131820,6 +171425,9 @@ "CVE-2022-3526": { "cmt_msg": "macvlan: Fix leaking skb in source mode with nodst option" }, + "CVE-2024-26601": { + "cmt_msg": "ext4: regenerate buddy after block freeing failed if under fc replay" + }, "CVE-2022-3524": { "cmt_msg": "tcp/udp: Fix memory leak in ipv6_renew_options()." }, @@ -131862,8 +171470,8 @@ "CVE-2023-2248": { "cmt_msg": "net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg" }, - "CVE-2022-1204": { - "cmt_msg": "ax25: Fix refcount leaks caused by ax25_cb_del()" + "CVE-2023-30772": { + "cmt_msg": "power: supply: da9150: Fix use after free bug in da9150_charger_remove due to race condition" }, "CVE-2023-32269": { "cmt_msg": "netrom: Fix use-after-free caused by accept on already connected socket" @@ -131886,9 +171494,6 @@ "CVE-2024-26584": { "cmt_msg": "net: tls: handle backlogging of crypto requests" }, - "CVE-2024-26587": { - "cmt_msg": "net: netdevsim: don't try to destroy PHC on VFs" - }, "CVE-2022-1247": { "cmt_msg": "" }, @@ -131925,12 +171530,30 @@ "CVE-2022-47941": { "cmt_msg": "ksmbd: fix memory leak in smb2_handle_negotiate" }, + "CVE-2023-52578": { + "cmt_msg": "net: bridge: use DEV_STATS_INC()" + }, "CVE-2023-1095": { "cmt_msg": "netfilter: nf_tables: fix null deref due to zeroed list head" }, + "CVE-2023-52574": { + "cmt_msg": "team: fix null-ptr-deref when team device type is changed" + }, + "CVE-2023-52576": { + "cmt_msg": "x86/mm, kexec, ima: Use memblock_free_late() from ima_free_kexec_buffer()" + }, "CVE-2022-3238": { "cmt_msg": "" }, + "CVE-2023-52571": { + "cmt_msg": "power: supply: rk817: Fix node refcount leak" + }, + "CVE-2023-52572": { + "cmt_msg": "cifs: Fix UAF in cifs_demultiplex_thread()" + }, + "CVE-2023-52573": { + "cmt_msg": "net: rds: Fix possible NULL-pointer dereference" + }, "CVE-2023-4921": { "cmt_msg": "net: sched: sch_qfq: Fix UAF in qfq_dequeue()" }, @@ -131958,15 +171581,30 @@ "CVE-2023-31248": { "cmt_msg": "netfilter: nf_tables: do not ignore genmask when looking up chain by id" }, + "CVE-2024-26736": { + "cmt_msg": "afs: Increase buffer size in afs_update_volume_status()" + }, + "CVE-2024-26737": { + "cmt_msg": "bpf: Fix racing between bpf_timer_cancel_and_free and bpf_timer_cancel" + }, "CVE-2024-26593": { "cmt_msg": "i2c: i801: Fix block process call transactions" }, + "CVE-2024-26738": { + "cmt_msg": "powerpc/pseries/iommu: DLPAR add doesn't completely initialize pci_controller" + }, + "CVE-2024-26739": { + "cmt_msg": "net/sched: act_mirred: don't override retval if we already lost the skb" + }, "CVE-2022-38096": { "cmt_msg": "" }, "CVE-2022-24122": { "cmt_msg": "ucount: Make get_ucount a safe get_user replacement" }, + "CVE-2024-26805": { + "cmt_msg": "netlink: Fix kernel-infoleak-after-free in __skb_datagram_iter" + }, "CVE-2022-3303": { "cmt_msg": "ALSA: pcm: oss: Fix race at SNDCTL_DSP_SYNC" }, @@ -132000,15 +171638,42 @@ "CVE-2021-33631": { "cmt_msg": "ext4: fix kernel BUG in 'ext4_write_inline_data_end()'" }, + "CVE-2023-52513": { + "cmt_msg": "RDMA/siw: Fix connection failure handling" + }, + "CVE-2023-52491": { + "cmt_msg": "media: mtk-jpeg: Fix use after free bug due to error path handling in mtk_jpeg_dec_device_run" + }, "CVE-2024-26598": { "cmt_msg": "KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache" }, "CVE-2022-4129": { "cmt_msg": "l2tp: Serialize access to sk_user_data with sk_callback_lock" }, + "CVE-2024-26648": { + "cmt_msg": "drm/amd/display: Fix variable deferencing before NULL check in edp_setup_replay()" + }, + "CVE-2024-26646": { + "cmt_msg": "thermal: intel: hfi: Add syscore callbacks for system-wide PM" + }, + "CVE-2024-26647": { + "cmt_msg": "drm/amd/display: Fix late derefrence 'dsc' check in 'link_set_dsc_pps_packet()'" + }, + "CVE-2024-26644": { + "cmt_msg": "btrfs: don't abort filesystem when attempting to snapshot deleted subvolume" + }, + "CVE-2024-26645": { + "cmt_msg": "tracing: Ensure visibility when inserting an element into tracing_map" + }, "CVE-2023-33203": { "cmt_msg": "net: qcom/emac: Fix use after free bug in emac_remove due to race condition" }, + "CVE-2024-26640": { + "cmt_msg": "tcp: add sanity checks to rx zerocopy" + }, + "CVE-2024-26641": { + "cmt_msg": "ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv()" + }, "CVE-2023-26544": { "cmt_msg": "fs/ntfs3: Fix slab-out-of-bounds read in run_unpack" }, @@ -132021,6 +171686,9 @@ "CVE-2024-0639": { "cmt_msg": "sctp: fix potential deadlock on &net->sctp.addr_wq_lock" }, + "CVE-2023-52467": { + "cmt_msg": "mfd: syscon: Fix null pointer dereference in of_syscon_register()" + }, "CVE-2023-52464": { "cmt_msg": "EDAC/thunderx: Fix possible out-of-bounds string access" }, @@ -132045,15 +171713,30 @@ "CVE-2024-23848": { "cmt_msg": "" }, + "CVE-2024-26633": { + "cmt_msg": "ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim()" + }, "CVE-2023-6622": { "cmt_msg": "netfilter: nf_tables: bail out on mismatching dynset and set expressions" }, "CVE-2023-4459": { "cmt_msg": "net: vmxnet3: fix possible NULL pointer dereference in vmxnet3_rq_cleanup()" }, + "CVE-2024-26625": { + "cmt_msg": "llc: call sock_orphan() at release time" + }, + "CVE-2024-26635": { + "cmt_msg": "llc: Drop support for ETH_P_TR_802_2." + }, "CVE-2022-26878": { "cmt_msg": "" }, + "CVE-2023-52639": { + "cmt_msg": "KVM: s390: vsie: fix race during shadow creation" + }, + "CVE-2024-2193": { + "cmt_msg": "" + }, "CVE-2022-20566": { "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free caused by l2cap_chan_put" }, @@ -132063,6 +171746,9 @@ "CVE-2023-25012": { "cmt_msg": "HID: bigben: use spinlock to safely schedule workers" }, + "CVE-2023-52637": { + "cmt_msg": "can: j1939: Fix UAF in j1939_sk_match_filter during setsockopt(SO_J1939_FILTER)" + }, "CVE-2023-1990": { "cmt_msg": "nfc: st-nci: Fix use after free bug in ndlc_remove due to race condition" }, @@ -132072,14 +171758,23 @@ "CVE-2022-4662": { "cmt_msg": "USB: core: Prevent nested device-reset calls" }, + "CVE-2024-26684": { + "cmt_msg": "net: stmmac: xgmac: fix handling of DPP safety error for DMA channels" + }, "CVE-2022-48619": { "cmt_msg": "Input: add bounds checking to input_set_capability()" }, + "CVE-2023-52634": { + "cmt_msg": "drm/amd/display: Fix disable_otg_wa logic" + }, "CVE-2024-24860": { "cmt_msg": "Bluetooth: Fix atomicity violation in {min,max}_key_size_set" }, + "CVE-2019-25162": { + "cmt_msg": "i2c: Fix a potential use after free" + }, "CVE-2024-24861": { - "cmt_msg": "" + "cmt_msg": "media: xc4000: Fix atomicity violation in xc4000_get_frequency" }, "CVE-2024-25740": { "cmt_msg": "" @@ -132090,6 +171785,9 @@ "CVE-2022-3903": { "cmt_msg": "media: mceusb: Use new usb_control_msg_*() routines" }, + "CVE-2024-26642": { + "cmt_msg": "netfilter: nf_tables: disallow anonymous set with timeout flag" + }, "CVE-2023-1195": { "cmt_msg": "cifs: fix use-after-free caused by invalid pointer `hostname`" }, @@ -132114,15 +171812,27 @@ "CVE-2022-44032": { "cmt_msg": "char: pcmcia: remove all the drivers" }, + "CVE-2023-52597": { + "cmt_msg": "KVM: s390: fix setting of fpc register" + }, + "CVE-2023-52595": { + "cmt_msg": "wifi: rt2x00: restart beacon queue when hardware reset" + }, "CVE-2022-48502": { "cmt_msg": "fs/ntfs3: Check fields while reading" }, + "CVE-2024-26782": { + "cmt_msg": "mptcp: fix double-free on socket dismantle" + }, "CVE-2023-21102": { "cmt_msg": "efi: rt-wrapper: Add missing include" }, "CVE-2024-22705": { "cmt_msg": "ksmbd: fix slab-out-of-bounds in smb_strndup_from_utf16()" }, + "CVE-2024-26622": { + "cmt_msg": "tomoyo: fix UAF write bug in tomoyo_write_control()" + }, "CVE-2022-3619": { "cmt_msg": "Bluetooth: L2CAP: Fix memory leak in vhci_write" }, @@ -132135,20 +171845,35 @@ "CVE-2023-38427": { "cmt_msg": "ksmbd: fix out-of-bound read in deassemble_neg_contexts()" }, + "CVE-2023-52527": { + "cmt_msg": "ipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data()" + }, "CVE-2023-3006": { "cmt_msg": "arm64: Add AMPERE1 to the Spectre-BHB affected list" }, + "CVE-2023-52523": { + "cmt_msg": "bpf, sockmap: Reject sk_msg egress redirects to non-TCP sockets" + }, + "CVE-2023-52522": { + "cmt_msg": "net: fix possible store tearing in neigh_periodic_work()" + }, "CVE-2022-3586": { "cmt_msg": "sch_sfb: Don't assume the skb is still around after enqueueing to child" }, "CVE-2024-0641": { "cmt_msg": "tipc: fix a potential deadlock on &tx->lock" }, + "CVE-2024-26789": { + "cmt_msg": "crypto: arm64/neonbs - fix out-of-bounds access on short input" + }, "CVE-2022-43945": { "cmt_msg": "NFSD: Protect against send buffer overflow in NFSv2 READDIR" }, - "CVE-2024-0646": { - "cmt_msg": "net: tls, update curr on splice as well" + "CVE-2023-52529": { + "cmt_msg": "HID: sony: Fix a potential memory leak in sony_probe()" + }, + "CVE-2023-52528": { + "cmt_msg": "net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg" }, "CVE-2023-39198": { "cmt_msg": "drm/qxl: fix UAF on handle creation" @@ -132156,6 +171881,9 @@ "CVE-2023-1872": { "cmt_msg": "io_uring: propagate issue_flags state down to file assignment" }, + "CVE-2024-25744": { + "cmt_msg": "x86/coco: Disable 32-bit emulation by default on TDX and SEV" + }, "CVE-2023-39194": { "cmt_msg": "net: xfrm: Fix xfrm_address_filter OOB read" }, @@ -132180,12 +171908,30 @@ "CVE-2023-38430": { "cmt_msg": "ksmbd: validate smb request protocol id" }, + "CVE-2024-26600": { + "cmt_msg": "phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP" + }, "CVE-2023-3390": { "cmt_msg": "netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE" }, + "CVE-2024-26606": { + "cmt_msg": "binder: signal epoll threads of self-work" + }, + "CVE-2024-26607": { + "cmt_msg": "drm/bridge: sii902x: Fix probing race issue" + }, "CVE-2021-33061": { "cmt_msg": "ixgbe: add improvement for MDD response functionality" }, + "CVE-2024-26764": { + "cmt_msg": "fs/aio: Restrict kiocb_set_cancel_fn() to I/O submitted via libaio" + }, + "CVE-2024-26608": { + "cmt_msg": "ksmbd: fix global oob in ksmbd_nl_policy" + }, + "CVE-2024-26766": { + "cmt_msg": "IB/hfi1: Fix sdma.h tx->num_descs off-by-one error" + }, "CVE-2023-3389": { "cmt_msg": "io_uring: mutex locked poll hashing" }, @@ -132195,6 +171941,9 @@ "CVE-2021-3864": { "cmt_msg": "" }, + "CVE-2024-26770": { + "cmt_msg": "HID: nvidia-shield: Add missing null pointer checks to LED initialization" + }, "CVE-2022-1652": { "cmt_msg": "floppy: use a statically allocated error counter" }, @@ -132219,9 +171968,6 @@ "CVE-2023-20569": { "cmt_msg": "x86/bugs: Increase the x86 bugs vector size to two u32s" }, - "CVE-2024-26588": { - "cmt_msg": "LoongArch: BPF: Prevent out-of-bounds memory access" - }, "CVE-2018-12931": { "cmt_msg": "" }, @@ -132232,7 +171978,7 @@ "cmt_msg": "" }, "CVE-2023-6270": { - "cmt_msg": "" + "cmt_msg": "aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts" }, "CVE-2023-2156": { "cmt_msg": "net: rpl: fix rpl header size calculation" @@ -132253,7 +171999,10 @@ "cmt_msg": "" }, "CVE-2023-6356": { - "cmt_msg": "" + "cmt_msg": "nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length" + }, + "CVE-2024-26744": { + "cmt_msg": "RDMA/srpt: Support specifying the srpt_service_guid parameter" }, "CVE-2023-26607": { "cmt_msg": "ntfs: fix out-of-bounds read in ntfs_attr_find()" @@ -132264,6 +172013,24 @@ "CVE-2019-15239": { "cmt_msg": "unknown" }, + "CVE-2023-52635": { + "cmt_msg": "PM / devfreq: Synchronize devfreq_monitor_[start/stop]" + }, + "CVE-2023-52469": { + "cmt_msg": "drivers/amd/pm: fix a use-after-free in kv_parse_power_table" + }, + "CVE-2023-52633": { + "cmt_msg": "um: time-travel: fix time corruption" + }, + "CVE-2023-52632": { + "cmt_msg": "drm/amdkfd: Fix lock dependency warning with srcu" + }, + "CVE-2023-52631": { + "cmt_msg": "fs/ntfs3: Fix an NULL dereference bug" + }, + "CVE-2023-52630": { + "cmt_msg": "blk-iocost: Fix an UBSAN shift-out-of-bounds warning" + }, "CVE-2022-21505": { "cmt_msg": "lockdown: Fix kexec lockdown bypass with ima policy" }, @@ -132309,6 +172076,12 @@ "CVE-2023-28327": { "cmt_msg": "af_unix: Get user_ns from in_skb in unix_diag_get_exact()." }, + "CVE-2023-52638": { + "cmt_msg": "can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock" + }, + "CVE-2024-26631": { + "cmt_msg": "ipv6: mcast: fix data-race in ipv6_mc_down / mld_ifc_work" + }, "CVE-2017-13693": { "cmt_msg": "" }, @@ -132330,12 +172103,21 @@ "CVE-2022-42895": { "cmt_msg": "Bluetooth: L2CAP: Fix attempting to access uninitialized memory" }, + "CVE-2024-26636": { + "cmt_msg": "llc: make llc_ui_sendmsg() more robust against bonding changes" + }, "CVE-2022-29968": { "cmt_msg": "io_uring: fix uninitialized field in rw io_kiocb" }, + "CVE-2022-48627": { + "cmt_msg": "vt: fix memory overlapping when deleting chars in the buffer" + }, "CVE-2022-4382": { "cmt_msg": "USB: gadgetfs: Fix race between mounting and unmounting" }, + "CVE-2022-48628": { + "cmt_msg": "ceph: drop messages from MDS when unmounting" + }, "CVE-2024-24859": { "cmt_msg": "" }, @@ -132348,18 +172130,42 @@ "CVE-2024-24857": { "cmt_msg": "" }, + "CVE-2024-26673": { + "cmt_msg": "netfilter: nft_ct: sanitize layer 3 and 4 protocol number in custom expectations" + }, "CVE-2022-3545": { "cmt_msg": "nfp: fix use-after-free in area_cache_get()" }, + "CVE-2023-52569": { + "cmt_msg": "btrfs: remove BUG() after failure to insert delayed dir index item" + }, + "CVE-2023-52568": { + "cmt_msg": "x86/sgx: Resolves SECS reclaim vs. page fault for EAUG race" + }, "CVE-2022-3543": { "cmt_msg": "af_unix: Fix memory leaks of the whole sk due to OOB skb." }, "CVE-2022-3542": { "cmt_msg": "bnx2x: fix potential memory leak in bnx2x_tpa_stop()" }, + "CVE-2023-52563": { + "cmt_msg": "drm/meson: fix memory leak on ->hpd_notify callback" + }, + "CVE-2023-52561": { + "cmt_msg": "arm64: dts: qcom: sdm845-db845c: Mark cont splash memory region as reserved" + }, + "CVE-2023-52560": { + "cmt_msg": "mm/damon/vaddr-test: fix memory leak in damon_do_test_apply_three_regions()" + }, "CVE-2023-5197": { "cmt_msg": "netfilter: nf_tables: disallow rule removal from chain binding" }, + "CVE-2023-52566": { + "cmt_msg": "nilfs2: fix potential use after free in nilfs_gccache_submit_read_data()" + }, + "CVE-2023-52565": { + "cmt_msg": "media: uvcvideo: Fix OOB read" + }, "CVE-2023-1838": { "cmt_msg": "Fix double fget() in vhost_net_set_backend()" }, @@ -132369,18 +172175,30 @@ "CVE-2023-1380": { "cmt_msg": "wifi: brcmfmac: slab-out-of-bounds read in brcmf_get_assoc_ies()" }, + "CVE-2024-26672": { + "cmt_msg": "drm/amdgpu: Fix variable 'mca_funcs' dereferenced before NULL check in 'amdgpu_mca_smu_get_mca_entry()'" + }, "CVE-2020-0347": { "cmt_msg": "" }, "CVE-2019-12456": { "cmt_msg": "" }, + "CVE-2024-26720": { + "cmt_msg": "mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again" + }, "CVE-2021-33655": { "cmt_msg": "fbcon: Disallow setting font bigger than screen size" }, "CVE-2022-41858": { "cmt_msg": "drivers: net: slip: fix NPD bug in sl_tx_timeout()" }, + "CVE-2024-26726": { + "cmt_msg": "btrfs: don't drop extent_map for free space inode on write error" + }, + "CVE-2024-26615": { + "cmt_msg": "net/smc: fix illegal rmb_desc access in SMC-D connection dump" + }, "CVE-2023-1206": { "cmt_msg": "tcp: Reduce chance of collisions in inet6_hashfn()." }, @@ -132411,11 +172229,26 @@ "CVE-2023-3355": { "cmt_msg": "drm/msm/gem: Add check for kmalloc" }, + "CVE-2023-52518": { + "cmt_msg": "Bluetooth: hci_codec: Fix leaking content of local_codecs" + }, + "CVE-2023-52519": { + "cmt_msg": "HID: intel-ish-hid: ipc: Disable and reenable ACPI GPE bit" + }, + "CVE-2023-52516": { + "cmt_msg": "dma-debug: don't call __dma_entry_alloc_check_leak() under free_entries_lock" + }, + "CVE-2023-52517": { + "cmt_msg": "spi: sun6i: fix race between DMA RX transfer completion and RX FIFO drain" + }, + "CVE-2023-52515": { + "cmt_msg": "RDMA/srp: Do not call scsi_done() from srp_abort()" + }, "CVE-2019-15902": { "cmt_msg": "unknown" }, - "CVE-2024-25739": { - "cmt_msg": "" + "CVE-2023-52510": { + "cmt_msg": "ieee802154: ca8210: Fix a potential UAF in ca8210_probe" }, "CVE-2023-3358": { "cmt_msg": "HID: intel_ish-hid: Add check for ishtp_dma_tx_map" @@ -132427,7 +172260,10 @@ "cmt_msg": "" }, "CVE-2023-6536": { - "cmt_msg": "" + "cmt_msg": "nvmet-tcp: fix a crash in nvmet_req_complete()" + }, + "CVE-2024-26704": { + "cmt_msg": "ext4: fix double-free of blocks due to wrong extents moved_len" }, "CVE-2018-17977": { "cmt_msg": "" @@ -132435,12 +172271,30 @@ "CVE-2024-1151": { "cmt_msg": "net: openvswitch: limit the number of recursions from action sets" }, + "CVE-2024-26659": { + "cmt_msg": "xhci: handle isoc Babble and Buffer Overrun events properly" + }, + "CVE-2024-26658": { + "cmt_msg": "bcachefs: grab s_umount only if snapshotting" + }, "CVE-2010-5321": { "cmt_msg": "" }, + "CVE-2024-26655": { + "cmt_msg": "Fix memory leak in posix_clock_open()" + }, + "CVE-2024-26654": { + "cmt_msg": "ALSA: sh: aica: reorder cleanup operations to avoid UAF bugs" + }, "CVE-2023-32247": { "cmt_msg": "ksmbd: destroy expired sessions" }, + "CVE-2024-26651": { + "cmt_msg": "sr9800: Add check for usbnet_get_endpoints" + }, + "CVE-2024-26650": { + "cmt_msg": "platform/x86: p2sb: Allow p2sb_bar() calls during PCI device probe" + }, "CVE-2023-4147": { "cmt_msg": "netfilter: nf_tables: disallow rule addition to bound chain via NFTA_RULE_CHAIN_ID" }, @@ -132453,9 +172307,21 @@ "CVE-2023-4569": { "cmt_msg": "netfilter: nf_tables: deactivate catchall elements in next generation" }, + "CVE-2023-52474": { + "cmt_msg": "IB/hfi1: Fix bugs with non-PAGE_SIZE-end multi-iovec user SDMA requests" + }, + "CVE-2023-52477": { + "cmt_msg": "usb: hub: Guard against accesses to uninitialized BOS descriptors" + }, + "CVE-2023-52476": { + "cmt_msg": "perf/x86/lbr: Filter vsyscall addresses" + }, "CVE-2023-22995": { "cmt_msg": "usb: dwc3: dwc3-qcom: Add missing platform_device_put() in dwc3_qcom_acpi_register_core" }, + "CVE-2023-52470": { + "cmt_msg": "drm/radeon: check the alloc_workqueue return value in radeon_crtc_init()" + }, "CVE-2024-21803": { "cmt_msg": "" }, @@ -132465,6 +172331,12 @@ "CVE-2023-4563": { "cmt_msg": "netfilter: nf_tables: don't skip expired elements during walk" }, + "CVE-2023-52479": { + "cmt_msg": "ksmbd: fix uaf in smb20_oplock_break_ack" + }, + "CVE-2023-52478": { + "cmt_msg": "HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect" + }, "CVE-2022-26365": { "cmt_msg": "xen/blkfront: fix leaking data in shared pages" }, @@ -132495,6 +172367,9 @@ "CVE-2023-32257": { "cmt_msg": "ksmbd: fix racy issue from session setup and logoff" }, + "CVE-2024-26778": { + "cmt_msg": "fbdev: savage: Error out if pixclock equals zero" + }, "CVE-2023-32254": { "cmt_msg": "ksmbd: fix racy issue under cocurrent smb2 tree disconnect" }, @@ -132516,20 +172391,68 @@ "CVE-2024-25741": { "cmt_msg": "" }, + "CVE-2024-26808": { + "cmt_msg": "netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain" + }, + "CVE-2024-26809": { + "cmt_msg": "netfilter: nft_set_pipapo: release elements in clone only from destroy path" + }, + "CVE-2024-26804": { + "cmt_msg": "net: ip_tunnel: prevent perpetual headroom growth" + }, "CVE-2023-1989": { "cmt_msg": "Bluetooth: btsdio: fix use after free bug in btsdio_remove due to unfinished work" }, - "CVE-2024-25744": { - "cmt_msg": "x86/coco: Disable 32-bit emulation by default on TDX and SEV" + "CVE-2024-26806": { + "cmt_msg": "spi: cadence-qspi: remove system-wide suspend helper calls from runtime PM hooks" + }, + "CVE-2024-26801": { + "cmt_msg": "Bluetooth: Avoid potential use-after-free in hci_error_reset" + }, + "CVE-2024-26802": { + "cmt_msg": "stmmac: Clear variable when destroying workqueue" + }, + "CVE-2023-52508": { + "cmt_msg": "nvme-fc: Prevent null pointer dereference in nvme_fc_io_getuuid()" + }, + "CVE-2023-52606": { + "cmt_msg": "powerpc/lib: Validate size for vector operations" + }, + "CVE-2023-52607": { + "cmt_msg": "powerpc/mm: Fix null-pointer dereference in pgtable_cache_add" + }, + "CVE-2023-52604": { + "cmt_msg": "FS:JFS:UBSAN:array-index-out-of-bounds in dbAdjTree" + }, + "CVE-2023-52602": { + "cmt_msg": "jfs: fix slab-out-of-bounds Read in dtSearch" + }, + "CVE-2023-52603": { + "cmt_msg": "UBSAN: array-index-out-of-bounds in dtSplitRoot" }, "CVE-2022-25265": { "cmt_msg": "" }, + "CVE-2023-52601": { + "cmt_msg": "jfs: fix array-index-out-of-bounds in dbAdjTree" + }, + "CVE-2024-26779": { + "cmt_msg": "wifi: mac80211: fix race condition on enabling fast-xmit" + }, + "CVE-2023-52600": { + "cmt_msg": "jfs: fix uaf in jfs_evict_inode" + }, + "CVE-2023-52608": { + "cmt_msg": "firmware: arm_scmi: Check mailbox/SMT channel for consistency" + }, + "CVE-2023-52609": { + "cmt_msg": "binder: fix race between mmput() and do_exit()" + }, "CVE-2022-21499": { "cmt_msg": "lockdown: also lock down previous kgdb use" }, "CVE-2024-23196": { - "cmt_msg": "" + "cmt_msg": "ALSA: hda: fix a possible null-pointer dereference due to data race in snd_hdac_regmap_sync()" }, "CVE-2023-4208": { "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free" @@ -132555,6 +172478,9 @@ "CVE-2023-0160": { "cmt_msg": "bpf, sockmap: fix deadlocks in the sockhash and sockmap" }, + "CVE-2023-52506": { + "cmt_msg": "LoongArch: Set all reserved memblocks on Node#0 at initialization" + }, "CVE-2022-2663": { "cmt_msg": "netfilter: nf_conntrack_irc: Fix forged IP logic" }, @@ -132570,12 +172496,18 @@ "CVE-2023-4010": { "cmt_msg": "" }, + "CVE-2023-52500": { + "cmt_msg": "scsi: pm80xx: Avoid leaking tags when processing OPC_INB_SET_CONTROLLER_CONFIG command" + }, "CVE-2022-38457": { "cmt_msg": "drm/vmwgfx: Remove rcu locks from user resources" }, "CVE-2022-20422": { "cmt_msg": "arm64: fix oops in concurrently setting insn_emulation sysctls" }, + "CVE-2024-26803": { + "cmt_msg": "net: veth: clear GRO when clearing XDP even when down" + }, "CVE-2022-20421": { "cmt_msg": "binder: fix UAF of ref->proc caused by race condition" }, @@ -132585,9 +172517,15 @@ "CVE-2023-4387": { "cmt_msg": "net: vmxnet3: fix possible use-after-free bugs in vmxnet3_rq_alloc_rx_buf()" }, + "CVE-2023-52502": { + "cmt_msg": "net: nfc: fix races in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn()" + }, "CVE-2019-19378": { "cmt_msg": "" }, + "CVE-2023-52482": { + "cmt_msg": "x86/srso: Add SRSO mitigation for Hygon processors" + }, "CVE-2022-36879": { "cmt_msg": "xfrm: xfrm_policy: fix a possible double xfrm_pols_put() in xfrm_bundle_lookup()" }, @@ -132631,7 +172569,10 @@ "cmt_msg": "KVM: x86: avoid calling x86 emulator without a decoded instruction" }, "CVE-2023-7042": { - "cmt_msg": "" + "cmt_msg": "wifi: ath10k: fix NULL pointer dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev()" + }, + "CVE-2024-26775": { + "cmt_msg": "aoe: avoid potential deadlock at set_capacity" }, "CVE-2022-3594": { "cmt_msg": "r8152: Rate limit overflow messages" @@ -132642,8 +172583,11 @@ "CVE-2022-3595": { "cmt_msg": "cifs: fix double-fault crash during ntlmssp" }, + "CVE-2023-52559": { + "cmt_msg": "iommu/vt-d: Avoid memory allocation in iommu_suspend()" + }, "CVE-2023-47233": { - "cmt_msg": "" + "cmt_msg": "wifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach" }, "CVE-2024-23850": { "cmt_msg": "btrfs: do not ASSERT() if the newly created subvolume already got read" @@ -132651,9 +172595,18 @@ "CVE-2024-23851": { "cmt_msg": "dm: limit the number of targets and parameter size area" }, + "CVE-2023-52629": { + "cmt_msg": "sh: push-switch: Reorder cleanup operations to avoid use-after-free bug" + }, "CVE-2022-1462": { "cmt_msg": "tty: use new tty_insert_flip_string_and_push_buffer() in pty_write()" }, + "CVE-2024-26758": { + "cmt_msg": "md: Don't ignore suspended array in md_check_recovery()" + }, + "CVE-2024-26610": { + "cmt_msg": "wifi: iwlwifi: fix a memory corruption" + }, "CVE-2022-42329": { "cmt_msg": "xen/netback: don't call kfree_skb() with interrupts disabled" }, @@ -132663,9 +172616,21 @@ "CVE-2022-1729": { "cmt_msg": "perf: Fix sys_perf_event_open() race against self" }, + "CVE-2024-26751": { + "cmt_msg": "ARM: ep93xx: Add terminator to gpiod_lookup_table" + }, + "CVE-2024-26752": { + "cmt_msg": "l2tp: pass correct message length to ip6_append_data" + }, + "CVE-2024-26754": { + "cmt_msg": "gtp: fix use-after-free and null-ptr-deref in gtp_genl_dump_pdp()" + }, "CVE-2023-21255": { "cmt_msg": "binder: fix UAF caused by faulty buffer cleanup" }, + "CVE-2024-26757": { + "cmt_msg": "md: Don't ignore read-only array in md_check_recovery()" + }, "CVE-2023-52439": { "cmt_msg": "uio: Fix use-after-free in uio_open" }, @@ -132684,9 +172649,24 @@ "CVE-2023-52436": { "cmt_msg": "f2fs: explicitly null-terminate the xattr list" }, + "CVE-2024-26688": { + "cmt_msg": "fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super" + }, + "CVE-2024-23307": { + "cmt_msg": "md/raid5: fix atomicity violation in raid5_cache_count" + }, "CVE-2022-2961": { "cmt_msg": "" }, + "CVE-2024-26680": { + "cmt_msg": "net: atlantic: Fix DMA mapping for PTP hwts ring" + }, + "CVE-2024-26686": { + "cmt_msg": "fs/proc: do_task_stat: use sig->stats_lock to gather the threads/children stats" + }, + "CVE-2024-26687": { + "cmt_msg": "xen/events: close evtchn after mapping cleanup" + }, "CVE-2023-51779": { "cmt_msg": "Bluetooth: af_bluetooth: Fix Use-After-Free in bt_sock_recvmsg" }, @@ -132729,15 +172709,39 @@ "CVE-2023-1193": { "cmt_msg": "ksmbd: delete asynchronous work from list" }, + "CVE-2023-52498": { + "cmt_msg": "PM: sleep: Fix possible deadlocks in core system-wide PM code" + }, + "CVE-2023-52640": { + "cmt_msg": "fs/ntfs3: Fix oob in ntfs_listxattr" + }, + "CVE-2023-52641": { + "cmt_msg": "fs/ntfs3: Add NULL ptr dereference checking at the end of attr_allocate_frame()" + }, "CVE-2021-0399": { "cmt_msg": "" }, + "CVE-2023-52488": { + "cmt_msg": "serial: sc16is7xx: convert from _raw_ to _noinc_ regmap functions for FIFO" + }, + "CVE-2023-52489": { + "cmt_msg": "mm/sparsemem: fix race in accessing memory_section->usage" + }, "CVE-2023-42755": { "cmt_msg": "net/sched: Retire rsvp classifier" }, "CVE-2023-3161": { "cmt_msg": "fbcon: Check font dimension limits" }, + "CVE-2023-52486": { + "cmt_msg": "drm: Don't unref the same fb many times by mistake due to deadlock handling" + }, + "CVE-2024-26791": { + "cmt_msg": "btrfs: dev-replace: properly validate device names" + }, + "CVE-2023-52480": { + "cmt_msg": "ksmbd: fix race condition between session lookup and expire" + }, "CVE-2012-4542": { "cmt_msg": "" }, @@ -132771,6 +172775,9 @@ "CVE-2022-1973": { "cmt_msg": "fs/ntfs3: Fix invalid free in log_replay" }, + "CVE-2024-26772": { + "cmt_msg": "ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal()" + }, "CVE-2022-32981": { "cmt_msg": "powerpc/32: Fix overread/overwrite of thread_struct via ptrace" }, @@ -132795,6 +172802,9 @@ "CVE-2008-2544": { "cmt_msg": "" }, + "CVE-2023-52485": { + "cmt_msg": "drm/amd/display: Wake DMCUB before sending a command" + }, "CVE-2021-4095": { "cmt_msg": "KVM: x86: Fix wall clock writes in Xen shared_info not to mark page dirty" }, @@ -132807,6 +172817,9 @@ "CVE-2021-3714": { "cmt_msg": "" }, + "CVE-2024-26733": { + "cmt_msg": "arp: Prevent overflow in arp_req_get()." + }, "CVE-2023-3117": { "cmt_msg": "netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE" }, @@ -132843,18 +172856,39 @@ "CVE-2022-33744": { "cmt_msg": "xen/arm: Fix race in RB-tree based P2M accounting" }, + "CVE-2023-52596": { + "cmt_msg": "sysctl: Fix out of bounds access for empty sysctl registers" + }, "CVE-2023-4132": { "cmt_msg": "media: usb: siano: Fix warning due to null work_func_t function pointer" }, + "CVE-2023-52594": { + "cmt_msg": "wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus()" + }, "CVE-2023-52443": { "cmt_msg": "apparmor: avoid crash when parsed profile name is empty" }, + "CVE-2023-52593": { + "cmt_msg": "wifi: wfx: fix possible NULL pointer dereference in wfx_set_mfp_ap()" + }, + "CVE-2023-52590": { + "cmt_msg": "ocfs2: Avoid touching renamed directory if parent does not change" + }, + "CVE-2023-52591": { + "cmt_msg": "reiserfs: Avoid touching renamed directory if parent does not change" + }, "CVE-2023-52444": { "cmt_msg": "f2fs: fix to avoid dirent corruption" }, "CVE-2023-2194": { "cmt_msg": "i2c: xgene-slimpro: Fix out-of-bounds bug in xgene_slimpro_i2c_xfer()" }, + "CVE-2023-52599": { + "cmt_msg": "jfs: fix array-index-out-of-bounds in diNewExt" + }, + "CVE-2024-26627": { + "cmt_msg": "scsi: core: Move scsi_host_busy() out of host lock for waking up EH handler" + }, "CVE-2022-41218": { "cmt_msg": "media: dvb-core: Fix UAF due to refcount races at releasing" }, @@ -132871,7 +172905,10 @@ "cmt_msg": "x86/speculation/mmio: Enable CPU Fill buffer clearing on idle" }, "CVE-2024-0841": { - "cmt_msg": "" + "cmt_msg": "fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super" + }, + "CVE-2024-26623": { + "cmt_msg": "pds_core: Prevent race issues involving the adminq" }, "CVE-2022-41849": { "cmt_msg": "fbdev: smscufx: Fix use-after-free in ufx_ops_open()" @@ -132891,8 +172928,11 @@ "CVE-2021-39800": { "cmt_msg": "" }, + "CVE-2024-26784": { + "cmt_msg": "pmdomain: arm: Fix NULL dereference on scmi_perf_domain removal" + }, "CVE-2024-22099": { - "cmt_msg": "" + "cmt_msg": "Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security" }, "CVE-2022-45885": { "cmt_msg": "" @@ -132906,18 +172946,33 @@ "CVE-2022-45886": { "cmt_msg": "media: dvb-core: Fix use-after-free due on race condition at dvb_net" }, + "CVE-2023-52509": { + "cmt_msg": "ravb: Fix use-after-free issue in ravb_tx_timeout_work()" + }, "CVE-2023-46343": { "cmt_msg": "nfc: nci: fix possible NULL pointer dereference in send_acknowledge()" }, "CVE-2021-4204": { "cmt_msg": "bpf: Generalize check_ctx_reg for reuse with other types" }, + "CVE-2023-52504": { + "cmt_msg": "x86/alternatives: Disable KASAN in apply_alternatives()" + }, + "CVE-2023-52507": { + "cmt_msg": "nfc: nci: assert requested protocol is valid" + }, "CVE-2023-2124": { "cmt_msg": "xfs: verify buffer contents when we skip log replay" }, + "CVE-2023-52501": { + "cmt_msg": "ring-buffer: Do not attempt to read past \"commit\"" + }, "CVE-2022-45888": { "cmt_msg": "char: xillybus: Prevent use-after-free due to race condition" }, + "CVE-2023-52503": { + "cmt_msg": "tee: amdtee: fix use-after-free vulnerability in amdtee_close_session" + }, "CVE-2023-3439": { "cmt_msg": "mctp: defer the kfree of object mdev->addrs" }, @@ -132933,12 +172988,21 @@ "CVE-2023-1859": { "cmt_msg": "9p/xen : Fix use after free bug in xen_9pfs_front_remove due to race condition" }, + "CVE-2024-26718": { + "cmt_msg": "dm-crypt, dm-verity: disable tasklets" + }, "CVE-2023-1855": { "cmt_msg": "hwmon: (xgene) Fix use after free bug in xgene_hwmon_remove due to race condition" }, "CVE-2022-27672": { "cmt_msg": "x86/speculation: Identify processors vulnerable to SMT RSB predictions" }, + "CVE-2024-26668": { + "cmt_msg": "netfilter: nft_limit: reject configurations that cause integer overflow" + }, + "CVE-2024-26669": { + "cmt_msg": "net/sched: flower: Fix chain template offload" + }, "CVE-2020-25220": { "cmt_msg": "" }, @@ -132948,12 +173012,27 @@ "CVE-2022-0171": { "cmt_msg": "KVM: SEV: add cache flush to solve SEV cache incoherency issues" }, + "CVE-2024-26661": { + "cmt_msg": "drm/amd/display: Add NULL test for 'timing generator' in 'dcn21_set_pipe()'" + }, + "CVE-2024-26662": { + "cmt_msg": "drm/amd/display: Fix 'panel_cntl' could be null in 'dcn21_set_backlight_level()'" + }, "CVE-2023-26242": { "cmt_msg": "" }, + "CVE-2024-26664": { + "cmt_msg": "hwmon: (coretemp) Fix out-of-bounds memory access" + }, + "CVE-2024-26665": { + "cmt_msg": "tunnels: fix out of bounds access when building IPv6 PMTU error" + }, "CVE-2019-16089": { "cmt_msg": "" }, + "CVE-2024-26689": { + "cmt_msg": "ceph: prevent use-after-free in encode_cap_msg()" + }, "CVE-2022-1679": { "cmt_msg": "ath9k: fix use-after-free in ath9k_hif_usb_rx_cb" }, @@ -132993,11 +173072,32 @@ "CVE-2023-23039": { "cmt_msg": "" }, + "CVE-2024-26660": { + "cmt_msg": "drm/amd/display: Implement bounds check for stream encoder creation in DCN301" + }, + "CVE-2024-26719": { + "cmt_msg": "nouveau: offload fence uevents work to workqueue" + }, + "CVE-2024-26714": { + "cmt_msg": "interconnect: qcom: sc8180x: Mark CO0 BCM keepalive" + }, + "CVE-2024-26715": { + "cmt_msg": "usb: dwc3: gadget: Fix NULL pointer dereference in dwc3_gadget_suspend" + }, "CVE-2024-1312": { "cmt_msg": "mm: lock_vma_under_rcu() must check vma->anon_vma under vma lock" }, + "CVE-2024-26717": { + "cmt_msg": "HID: i2c-hid-of: fix NULL-deref on failed power up" + }, "CVE-2023-3338": { "cmt_msg": "Remove DECnet support from kernel" + }, + "CVE-2024-26712": { + "cmt_msg": "powerpc/kasan: Fix addr error caused by page alignment" + }, + "CVE-2024-26713": { + "cmt_msg": "powerpc/pseries/iommu: Fix iommu initialisation during DLPAR add" } } }, @@ -133011,17 +173111,21 @@ "cmt_msg": "net/packet: fix slab-out-of-bounds access in packet_recvmsg()", "cmt_id": "c700525fcc06b05adfea78039de02628af79e07a" }, - "CVE-2022-3107": { - "cmt_msg": "hv_netvsc: Add check for kvmalloc_array", - "cmt_id": "886e44c9298a6b428ae046e2fa092ca52e822e6a" + "CVE-2022-20368": { + "cmt_msg": "net/packet: fix slab-out-of-bounds access in packet_recvmsg()", + "cmt_id": "c700525fcc06b05adfea78039de02628af79e07a" }, "CVE-2022-20423": { "cmt_msg": "usb: gadget: rndis: prevent integer overflow in rndis_set_response()", "cmt_id": "65f3324f4b6fed78b8761c3b74615ecf0ffa81fa" }, - "CVE-2022-20368": { - "cmt_msg": "net/packet: fix slab-out-of-bounds access in packet_recvmsg()", - "cmt_id": "c700525fcc06b05adfea78039de02628af79e07a" + "CVE-2022-48629": { + "cmt_msg": "crypto: qcom-rng - ensure buffer for generate is completely filled", + "cmt_id": "a680b1832ced3b5fa7c93484248fd221ea0d614b" + }, + "CVE-2022-3107": { + "cmt_msg": "hv_netvsc: Add check for kvmalloc_array", + "cmt_id": "886e44c9298a6b428ae046e2fa092ca52e822e6a" } }, "5.17.1": { @@ -133263,6 +173367,10 @@ "cmt_msg": "lockdown: also lock down previous kgdb use", "cmt_id": "281d356a035132f2603724ee0f04767d70e2e98e" }, + "CVE-2022-48630": { + "cmt_msg": "crypto: qcom-rng - fix infinite loop on requests not multiple of WORD_SZ", + "cmt_id": "05d4d17475d8d094c519bb51658bc47899c175e3" + }, "CVE-2022-1652": { "cmt_msg": "floppy: use a statically allocated error counter", "cmt_id": "88887ced7803132ed357a42d050560a2fb5c7ce6" @@ -133369,6 +173477,9 @@ } }, "outstanding": { + "CVE-2024-26625": { + "cmt_msg": "llc: call sock_orphan() at release time" + }, "CVE-2020-35501": { "cmt_msg": "" }, @@ -133378,8 +173489,26 @@ "CVE-2023-21400": { "cmt_msg": "" }, - "CVE-2024-21803": { - "cmt_msg": "" + "CVE-2024-26685": { + "cmt_msg": "nilfs2: fix potential bug in end_buffer_async_write" + }, + "CVE-2023-52615": { + "cmt_msg": "hwrng: core - Fix page fault dead lock on mmap-ed hwrng" + }, + "CVE-2023-52614": { + "cmt_msg": "PM / devfreq: Fix buffer overflow in trans_stat_show" + }, + "CVE-2023-52617": { + "cmt_msg": "PCI: switchtec: Fix stdev_release() crash after surprise hot remove" + }, + "CVE-2023-33952": { + "cmt_msg": "drm/vmwgfx: Do not drop the reference to the handle too soon" + }, + "CVE-2023-52610": { + "cmt_msg": "net/sched: act_ct: fix skb leak and crash on ooo frags" + }, + "CVE-2023-52612": { + "cmt_msg": "crypto: scomp - fix req->dst buffer overflow" }, "CVE-2022-47520": { "cmt_msg": "wifi: wilc1000: validate pairwise and authentication suite offsets" @@ -133390,6 +173519,9 @@ "CVE-2023-5717": { "cmt_msg": "perf: Disallow mis-matched inherited group reads" }, + "CVE-2024-26615": { + "cmt_msg": "net/smc: fix illegal rmb_desc access in SMC-D connection dump" + }, "CVE-2023-4273": { "cmt_msg": "exfat: check if filename entries exceeds max filename length" }, @@ -133408,6 +173540,9 @@ "CVE-2024-0584": { "cmt_msg": "ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet" }, + "CVE-2024-26614": { + "cmt_msg": "tcp: make sure init the accept_queue's spinlocks once" + }, "CVE-2022-39190": { "cmt_msg": "netfilter: nf_tables: disallow binding to already bound chain" }, @@ -133426,6 +173561,9 @@ "CVE-2022-21123": { "cmt_msg": "x86/speculation/mmio: Add mitigation for Processor MMIO Stale Data" }, + "CVE-2024-26774": { + "cmt_msg": "ext4: avoid dividing by 0 in mb_update_avg_fragment_size() when block bitmap corrupt" + }, "CVE-2023-0459": { "cmt_msg": "uaccess: Add speculation barrier to copy_from_user()" }, @@ -133477,9 +173615,15 @@ "CVE-2022-34918": { "cmt_msg": "netfilter: nf_tables: stricter validation of element data" }, + "CVE-2024-25739": { + "cmt_msg": "" + }, "CVE-2022-2602": { "cmt_msg": "io_uring/af_unix: defer registered files gc to io_uring release" }, + "CVE-2023-52511": { + "cmt_msg": "spi: sun6i: reduce DMA RX transfer width to single byte" + }, "CVE-2022-47939": { "cmt_msg": "ksmbd: fix use-after-free bug in smb2_tree_disconect" }, @@ -133537,24 +173681,66 @@ "CVE-2023-1073": { "cmt_msg": "HID: check empty report_list in hid_validate_values()" }, + "CVE-2024-26747": { + "cmt_msg": "usb: roles: fix NULL pointer issue when put module's reference" + }, + "CVE-2024-26745": { + "cmt_msg": "powerpc/pseries/iommu: IOMMU table is not initialized for kdump over SR-IOV" + }, "CVE-2023-51781": { "cmt_msg": "appletalk: Fix Use-After-Free in atalk_ioctl" }, + "CVE-2024-26743": { + "cmt_msg": "RDMA/qedr: Fix qedr_create_user_qp error flow" + }, + "CVE-2024-26740": { + "cmt_msg": "net/sched: act_mirred: use the backlog for mirred ingress" + }, + "CVE-2024-26749": { + "cmt_msg": "usb: cdns3: fixed memory use after free at cdns3_gadget_ep_disable()" + }, + "CVE-2024-26748": { + "cmt_msg": "usb: cdns3: fix memory double free when handle zero packet" + }, + "CVE-2023-52616": { + "cmt_msg": "crypto: lib/mpi - Fix unexpected pointer access in mpi_ec_init" + }, "CVE-2023-1652": { "cmt_msg": "NFSD: fix use-after-free in nfsd4_ssc_setup_dul()" }, + "CVE-2024-26787": { + "cmt_msg": "mmc: mmci: stm32: fix DMA API overlapping mappings warning" + }, "CVE-2022-3707": { "cmt_msg": "drm/i915/gvt: fix double free bug in split_2MB_gtt_entry" }, + "CVE-2024-26699": { + "cmt_msg": "drm/amd/display: Fix array-index-out-of-bounds in dcn35_clkmgr" + }, + "CVE-2024-26698": { + "cmt_msg": "hv_netvsc: Fix race condition between netvsc_probe and netvsc_remove" + }, + "CVE-2024-26691": { + "cmt_msg": "KVM: arm64: Fix circular locking dependency" + }, "CVE-2024-0562": { "cmt_msg": "writeback: avoid use-after-free after removing device" }, + "CVE-2023-52520": { + "cmt_msg": "platform/x86: think-lmi: Fix reference leak" + }, "CVE-2024-0564": { "cmt_msg": "" }, "CVE-2024-0565": { "cmt_msg": "smb: client: fix OOB in receive_encrypted_standard()" }, + "CVE-2024-26697": { + "cmt_msg": "nilfs2: fix data corruption in dsync block recovery for small block sizes" + }, + "CVE-2024-26696": { + "cmt_msg": "nilfs2: fix hang in nilfs_lookup_dirty_data_buffers()" + }, "CVE-2023-2176": { "cmt_msg": "RDMA/core: Refactor rdma_bind_addr" }, @@ -133570,9 +173756,15 @@ "CVE-2022-4139": { "cmt_msg": "drm/i915: fix TLB invalidation for Gen12 video and compute engines" }, + "CVE-2024-26788": { + "cmt_msg": "dmaengine: fsl-qdma: init irq after reg initialization" + }, "CVE-2005-3660": { "cmt_msg": "" }, + "CVE-2023-52619": { + "cmt_msg": "pstore/ram: Fix crash when setting number of cpus to an odd number" + }, "CVE-2023-31085": { "cmt_msg": "ubi: Refuse attaching if mtd's erasesize is 0" }, @@ -133588,8 +173780,17 @@ "CVE-2023-31081": { "cmt_msg": "" }, - "CVE-2024-23307": { - "cmt_msg": "" + "CVE-2023-52618": { + "cmt_msg": "block/rnbd-srv: Check for unlikely string overflow" + }, + "CVE-2024-0646": { + "cmt_msg": "net: tls, update curr on splice as well" + }, + "CVE-2023-52598": { + "cmt_msg": "s390/ptrace: handle setting of fpc register correctly" + }, + "CVE-2023-52499": { + "cmt_msg": "powerpc/47x: Fix 47x syscall return crash" }, "CVE-2022-4543": { "cmt_msg": "" @@ -133597,9 +173798,21 @@ "CVE-2022-3028": { "cmt_msg": "af_key: Do not call xfrm_probe_algs in parallel" }, + "CVE-2023-52493": { + "cmt_msg": "bus: mhi: host: Drop chan lock before queuing buffers" + }, + "CVE-2023-52492": { + "cmt_msg": "dmaengine: fix NULL pointer in channel unregistration function" + }, "CVE-2020-14304": { "cmt_msg": "" }, + "CVE-2023-52497": { + "cmt_msg": "erofs: fix lz4 inplace decompression" + }, + "CVE-2023-52494": { + "cmt_msg": "bus: mhi: host: Add alignment check for event ring read pointer" + }, "CVE-2023-3610": { "cmt_msg": "netfilter: nf_tables: fix chain binding transaction logic" }, @@ -133621,6 +173834,9 @@ "CVE-2024-22386": { "cmt_msg": "" }, + "CVE-2024-26656": { + "cmt_msg": "drm/amdgpu: fix use-after-free bug" + }, "CVE-2023-37454": { "cmt_msg": "" }, @@ -133636,6 +173852,9 @@ "CVE-2022-36402": { "cmt_msg": "drm/vmwgfx: Fix shader stage validation" }, + "CVE-2023-52484": { + "cmt_msg": "iommu/arm-smmu-v3: Fix soft lockup triggered by arm_smmu_mm_invalidate_range" + }, "CVE-2022-29900": { "cmt_msg": "x86/kvm/vmx: Make noinstr clean" }, @@ -133648,12 +173867,18 @@ "CVE-2023-39192": { "cmt_msg": "netfilter: xt_u32: validate user space input" }, + "CVE-2023-52580": { + "cmt_msg": "net/core: Fix ETH_P_1588 flow dissector" + }, "CVE-2023-35829": { "cmt_msg": "media: rkvdec: fix use after free bug in rkvdec_remove" }, "CVE-2023-35828": { "cmt_msg": "usb: gadget: udc: renesas_usb3: Fix use after free bug in renesas_usb3_remove due to race condition" }, + "CVE-2023-52583": { + "cmt_msg": "ceph: fix deadlock or deadcode of misusing dget()" + }, "CVE-2022-1116": { "cmt_msg": "" }, @@ -133663,6 +173888,9 @@ "CVE-2023-35823": { "cmt_msg": "media: saa7134: fix use after free bug in saa7134_finidev due to race condition" }, + "CVE-2023-52582": { + "cmt_msg": "netfs: Only call folio_start_fscache() one time for each folio" + }, "CVE-2022-23816": { "cmt_msg": "x86/kvm/vmx: Make noinstr clean" }, @@ -133672,6 +173900,18 @@ "CVE-2023-35827": { "cmt_msg": "ravb: Fix use-after-free issue in ravb_tx_timeout_work()" }, + "CVE-2023-52481": { + "cmt_msg": "arm64: errata: Add Cortex-A520 speculative unprivileged load workaround" + }, + "CVE-2023-52585": { + "cmt_msg": "drm/amdgpu: Fix possible NULL dereference in amdgpu_ras_query_error_status_helper()" + }, + "CVE-2023-52584": { + "cmt_msg": "spmi: mediatek: Fix UAF on device remove" + }, + "CVE-2023-52587": { + "cmt_msg": "IB/ipoib: Fix mcast list locking" + }, "CVE-2023-38432": { "cmt_msg": "ksmbd: validate command payload size" }, @@ -133690,12 +173930,36 @@ "CVE-2022-4269": { "cmt_msg": "act_mirred: use the backlog for nested calls to mirred ingress" }, + "CVE-2024-26769": { + "cmt_msg": "nvmet-fc: avoid deadlock on delete association path" + }, + "CVE-2023-52483": { + "cmt_msg": "mctp: perform route lookups under a RCU read-side lock" + }, + "CVE-2023-52589": { + "cmt_msg": "media: rkisp1: Fix IRQ disable race issue" + }, + "CVE-2023-52588": { + "cmt_msg": "f2fs: fix to tag gcing flag on page during block migration" + }, + "CVE-2024-26768": { + "cmt_msg": "LoongArch: Change acpi_core_pic[NR_CPUS] to acpi_core_pic[MAX_CORE_PIC]" + }, "CVE-2023-52340": { "cmt_msg": "ipv6: remove max_size check inline with ipv4" }, + "CVE-2024-26765": { + "cmt_msg": "LoongArch: Disable IRQ before init_fn() for nonboot CPUs" + }, "CVE-2022-1882": { "cmt_msg": "watchqueue: make sure to serialize 'wqueue->defunct' properly" }, + "CVE-2024-26767": { + "cmt_msg": "drm/amd/display: fixed integer types and null check locations" + }, + "CVE-2023-52475": { + "cmt_msg": "Input: powermate - fix use-after-free in powermate_config_complete" + }, "CVE-2023-6560": { "cmt_msg": "io_uring: don't allow discontig pages for IORING_SETUP_NO_MMAP" }, @@ -133705,9 +173969,39 @@ "CVE-2023-1611": { "cmt_msg": "btrfs: fix race between quota disable and quota assign ioctls" }, + "CVE-2024-26763": { + "cmt_msg": "dm-crypt: don't modify the data when using authenticated encryption" + }, + "CVE-2024-26756": { + "cmt_msg": "md: Don't register sync_thread for reshape directly" + }, + "CVE-2024-26795": { + "cmt_msg": "riscv: Sparse-Memory/vmemmap out-of-bounds fix" + }, + "CVE-2024-26797": { + "cmt_msg": "drm/amd/display: Prevent potential buffer overflow in map_hw_resources" + }, + "CVE-2024-26790": { + "cmt_msg": "dmaengine: fsl-qdma: fix SoC may hang on 16 byte unaligned read" + }, "CVE-2024-0639": { "cmt_msg": "sctp: fix potential deadlock on &net->sctp.addr_wq_lock" }, + "CVE-2024-26793": { + "cmt_msg": "gtp: fix use-after-free and null-ptr-deref in gtp_newlink()" + }, + "CVE-2023-52530": { + "cmt_msg": "wifi: mac80211: fix potential key use-after-free" + }, + "CVE-2023-52531": { + "cmt_msg": "wifi: iwlwifi: mvm: Fix a memory corruption issue" + }, + "CVE-2023-52532": { + "cmt_msg": "net: mana: Fix TX CQE error handling" + }, + "CVE-2024-26798": { + "cmt_msg": "fbcon: always restore the old font data in fbcon_do_set_font()" + }, "CVE-2013-7445": { "cmt_msg": "" }, @@ -133723,15 +174017,33 @@ "CVE-2023-46862": { "cmt_msg": "io_uring/fdinfo: lock SQ thread while retrieving thread cpu/pid" }, + "CVE-2024-26677": { + "cmt_msg": "rxrpc: Fix delayed ACKs to not set the reference serial number" + }, + "CVE-2024-26676": { + "cmt_msg": "af_unix: Call kfree_skb() for dead unix_(sk)->oob_skb in GC." + }, + "CVE-2024-26675": { + "cmt_msg": "ppp_async: limit MRU to 64K" + }, "CVE-2020-26556": { "cmt_msg": "" }, "CVE-2020-26557": { "cmt_msg": "" }, + "CVE-2024-26671": { + "cmt_msg": "blk-mq: fix IO hang from sbitmap wakeup race" + }, "CVE-2023-34324": { "cmt_msg": "xen/events: replace evtchn_rwlock with RCU" }, + "CVE-2024-26776": { + "cmt_msg": "spi: hisi-sfc-v3xx: Return IRQ_NONE if no interrupts were detected" + }, + "CVE-2024-26777": { + "cmt_msg": "fbdev: sis: Error out if pixclock equals zero" + }, "CVE-2019-20794": { "cmt_msg": "" }, @@ -133741,21 +174053,30 @@ "CVE-2023-3397": { "cmt_msg": "" }, - "CVE-2021-3542": { - "cmt_msg": "" + "CVE-2024-26773": { + "cmt_msg": "ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found()" + }, + "CVE-2024-26679": { + "cmt_msg": "inet: read sk->sk_family once in inet_recv_error()" + }, + "CVE-2024-26771": { + "cmt_msg": "dmaengine: ti: edma: Add some null pointer checks to the edma_probe" + }, + "CVE-2022-26365": { + "cmt_msg": "xen/blkfront: fix leaking data in shared pages" }, "CVE-2023-52458": { "cmt_msg": "block: add check that partition length needs to be aligned with block size" }, - "CVE-2023-52457": { - "cmt_msg": "serial: 8250: omap: Don't skip resource freeing if pm_runtime_resume_and_get() failed" - }, "CVE-2018-1121": { "cmt_msg": "" }, "CVE-2023-52454": { "cmt_msg": "nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length" }, + "CVE-2023-28746": { + "cmt_msg": "x86/mmio: Disable KVM mitigation when X86_FEATURE_CLEAR_CPU_BUF is set" + }, "CVE-2023-52452": { "cmt_msg": "bpf: Fix accesses to uninit stack slots" }, @@ -133765,12 +174086,18 @@ "CVE-2022-3061": { "cmt_msg": "video: fbdev: i740fb: Error out if 'pixclock' equals zero" }, + "CVE-2024-26602": { + "cmt_msg": "sched/membarrier: reduce the ability to hammer on sys_membarrier" + }, "CVE-2024-1085": { "cmt_msg": "netfilter: nf_tables: check if catch-all set element is active in next generation" }, "CVE-2024-1086": { "cmt_msg": "netfilter: nf_tables: reject QUEUE/DROP verdict parameters" }, + "CVE-2024-26735": { + "cmt_msg": "ipv6: sr: fix possible use-after-free and null-ptr-deref" + }, "CVE-2022-3344": { "cmt_msg": "KVM: x86: nSVM: harden svm_free_nested against freeing vmcb02 while still in use" }, @@ -133783,15 +174110,33 @@ "CVE-2023-6240": { "cmt_msg": "" }, + "CVE-2024-26700": { + "cmt_msg": "drm/amd/display: Fix MST Null Ptr for RV" + }, + "CVE-2024-26707": { + "cmt_msg": "net: hsr: remove WARN_ONCE() in send_hsr_supervision_frame()" + }, + "CVE-2024-26706": { + "cmt_msg": "parisc: Fix random data corruption from exception handler" + }, "CVE-2023-23559": { "cmt_msg": "wifi: rndis_wlan: Prevent buffer overflow in rndis_query_oid" }, "CVE-2022-39842": { "cmt_msg": "video: fbdev: pxa3xx-gcu: Fix integer overflow in pxa3xx_gcu_write" }, + "CVE-2024-26702": { + "cmt_msg": "iio: magnetometer: rm3100: add boundary check for the value read from RM3100_REG_TMRC" + }, + "CVE-2024-26603": { + "cmt_msg": "x86/fpu: Stop relying on userspace for info to fault in xsave buffer" + }, "CVE-2023-32233": { "cmt_msg": "netfilter: nf_tables: deactivate anonymous set from preparation phase" }, + "CVE-2023-52586": { + "cmt_msg": "drm/msm/dpu: Add mutex lock in control vblank irq" + }, "CVE-2023-44466": { "cmt_msg": "libceph: harden msgr2.1 frame segment length checks" }, @@ -133801,12 +174146,39 @@ "CVE-2019-19814": { "cmt_msg": "" }, + "CVE-2023-52620": { + "cmt_msg": "netfilter: nf_tables: disallow timeout for anonymous sets" + }, + "CVE-2023-52621": { + "cmt_msg": "bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers" + }, + "CVE-2023-52622": { + "cmt_msg": "ext4: avoid online resizing failures due to oversized flex bg" + }, + "CVE-2023-52623": { + "cmt_msg": "SUNRPC: Fix a suspicious RCU usage warning" + }, + "CVE-2023-52624": { + "cmt_msg": "drm/amd/display: Wake DMCUB before executing GPINT commands" + }, + "CVE-2023-52625": { + "cmt_msg": "drm/amd/display: Refactor DMCUB enter/exit idle interface" + }, + "CVE-2023-52627": { + "cmt_msg": "iio: adc: ad7091r: Allow users to configure device events" + }, + "CVE-2023-52628": { + "cmt_msg": "netfilter: nftables: exthdr: fix 4-byte stack OOB write" + }, "CVE-2021-26934": { "cmt_msg": "" }, "CVE-2022-3114": { "cmt_msg": "clk: imx: Add check for kcalloc" }, + "CVE-2024-21803": { + "cmt_msg": "" + }, "CVE-2023-52456": { "cmt_msg": "serial: imx: fix tx statemachine deadlock" }, @@ -133816,6 +174188,9 @@ "CVE-2023-0210": { "cmt_msg": "ksmbd: check nt_len to be at least CIFS_ENCPWD_SIZE in ksmbd_decode_ntlmssp_auth_blob" }, + "CVE-2024-26601": { + "cmt_msg": "ext4: regenerate buddy after block freeing failed if under fc replay" + }, "CVE-2022-3524": { "cmt_msg": "tcp/udp: Fix memory leak in ipv6_renew_options()." }, @@ -133876,9 +174251,6 @@ "CVE-2024-26584": { "cmt_msg": "net: tls: handle backlogging of crypto requests" }, - "CVE-2024-26587": { - "cmt_msg": "net: netdevsim: don't try to destroy PHC on VFs" - }, "CVE-2022-1247": { "cmt_msg": "" }, @@ -133915,12 +174287,30 @@ "CVE-2022-47941": { "cmt_msg": "ksmbd: fix memory leak in smb2_handle_negotiate" }, + "CVE-2023-52578": { + "cmt_msg": "net: bridge: use DEV_STATS_INC()" + }, "CVE-2023-1095": { "cmt_msg": "netfilter: nf_tables: fix null deref due to zeroed list head" }, + "CVE-2023-52574": { + "cmt_msg": "team: fix null-ptr-deref when team device type is changed" + }, + "CVE-2023-52576": { + "cmt_msg": "x86/mm, kexec, ima: Use memblock_free_late() from ima_free_kexec_buffer()" + }, "CVE-2022-3238": { "cmt_msg": "" }, + "CVE-2023-52571": { + "cmt_msg": "power: supply: rk817: Fix node refcount leak" + }, + "CVE-2023-52572": { + "cmt_msg": "cifs: Fix UAF in cifs_demultiplex_thread()" + }, + "CVE-2023-52573": { + "cmt_msg": "net: rds: Fix possible NULL-pointer dereference" + }, "CVE-2023-4921": { "cmt_msg": "net: sched: sch_qfq: Fix UAF in qfq_dequeue()" }, @@ -133948,12 +174338,27 @@ "CVE-2023-31248": { "cmt_msg": "netfilter: nf_tables: do not ignore genmask when looking up chain by id" }, + "CVE-2024-26736": { + "cmt_msg": "afs: Increase buffer size in afs_update_volume_status()" + }, + "CVE-2024-26737": { + "cmt_msg": "bpf: Fix racing between bpf_timer_cancel_and_free and bpf_timer_cancel" + }, "CVE-2024-26593": { "cmt_msg": "i2c: i801: Fix block process call transactions" }, + "CVE-2024-26738": { + "cmt_msg": "powerpc/pseries/iommu: DLPAR add doesn't completely initialize pci_controller" + }, + "CVE-2024-26739": { + "cmt_msg": "net/sched: act_mirred: don't override retval if we already lost the skb" + }, "CVE-2022-38096": { "cmt_msg": "" }, + "CVE-2024-26805": { + "cmt_msg": "netlink: Fix kernel-infoleak-after-free in __skb_datagram_iter" + }, "CVE-2022-3303": { "cmt_msg": "ALSA: pcm: oss: Fix race at SNDCTL_DSP_SYNC" }, @@ -133987,6 +174392,12 @@ "CVE-2021-33631": { "cmt_msg": "ext4: fix kernel BUG in 'ext4_write_inline_data_end()'" }, + "CVE-2023-52513": { + "cmt_msg": "RDMA/siw: Fix connection failure handling" + }, + "CVE-2024-26803": { + "cmt_msg": "net: veth: clear GRO when clearing XDP even when down" + }, "CVE-2024-26598": { "cmt_msg": "KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache" }, @@ -133996,9 +174407,30 @@ "CVE-2022-4129": { "cmt_msg": "l2tp: Serialize access to sk_user_data with sk_callback_lock" }, + "CVE-2024-26648": { + "cmt_msg": "drm/amd/display: Fix variable deferencing before NULL check in edp_setup_replay()" + }, + "CVE-2024-26646": { + "cmt_msg": "thermal: intel: hfi: Add syscore callbacks for system-wide PM" + }, + "CVE-2024-26647": { + "cmt_msg": "drm/amd/display: Fix late derefrence 'dsc' check in 'link_set_dsc_pps_packet()'" + }, + "CVE-2024-26644": { + "cmt_msg": "btrfs: don't abort filesystem when attempting to snapshot deleted subvolume" + }, + "CVE-2024-26645": { + "cmt_msg": "tracing: Ensure visibility when inserting an element into tracing_map" + }, "CVE-2023-33203": { "cmt_msg": "net: qcom/emac: Fix use after free bug in emac_remove due to race condition" }, + "CVE-2024-26640": { + "cmt_msg": "tcp: add sanity checks to rx zerocopy" + }, + "CVE-2024-26641": { + "cmt_msg": "ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv()" + }, "CVE-2023-26544": { "cmt_msg": "fs/ntfs3: Fix slab-out-of-bounds read in run_unpack" }, @@ -134008,6 +174440,12 @@ "CVE-2023-50431": { "cmt_msg": "accel/habanalabs: fix information leak in sec_attest_info()" }, + "CVE-2024-26791": { + "cmt_msg": "btrfs: dev-replace: properly validate device names" + }, + "CVE-2023-52467": { + "cmt_msg": "mfd: syscon: Fix null pointer dereference in of_syscon_register()" + }, "CVE-2023-52464": { "cmt_msg": "EDAC/thunderx: Fix possible out-of-bounds string access" }, @@ -134032,15 +174470,33 @@ "CVE-2024-23848": { "cmt_msg": "" }, + "CVE-2024-26633": { + "cmt_msg": "ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim()" + }, + "CVE-2024-26632": { + "cmt_msg": "block: Fix iterating over an empty bio with bio_for_each_folio_all" + }, "CVE-2023-6622": { "cmt_msg": "netfilter: nf_tables: bail out on mismatching dynset and set expressions" }, + "CVE-2024-26733": { + "cmt_msg": "arp: Prevent overflow in arp_req_get()." + }, "CVE-2023-28866": { "cmt_msg": "Bluetooth: HCI: Fix global-out-of-bounds" }, + "CVE-2024-26635": { + "cmt_msg": "llc: Drop support for ETH_P_TR_802_2." + }, "CVE-2022-26878": { "cmt_msg": "" }, + "CVE-2023-52639": { + "cmt_msg": "KVM: s390: vsie: fix race during shadow creation" + }, + "CVE-2024-2193": { + "cmt_msg": "" + }, "CVE-2022-20566": { "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free caused by l2cap_chan_put" }, @@ -134050,6 +174506,9 @@ "CVE-2023-25012": { "cmt_msg": "HID: bigben: use spinlock to safely schedule workers" }, + "CVE-2023-52637": { + "cmt_msg": "can: j1939: Fix UAF in j1939_sk_match_filter during setsockopt(SO_J1939_FILTER)" + }, "CVE-2023-32247": { "cmt_msg": "ksmbd: destroy expired sessions" }, @@ -134059,11 +174518,20 @@ "CVE-2022-4662": { "cmt_msg": "USB: core: Prevent nested device-reset calls" }, + "CVE-2024-26684": { + "cmt_msg": "net: stmmac: xgmac: fix handling of DPP safety error for DMA channels" + }, + "CVE-2023-52634": { + "cmt_msg": "drm/amd/display: Fix disable_otg_wa logic" + }, "CVE-2024-24860": { "cmt_msg": "Bluetooth: Fix atomicity violation in {min,max}_key_size_set" }, + "CVE-2019-25162": { + "cmt_msg": "i2c: Fix a potential use after free" + }, "CVE-2024-24861": { - "cmt_msg": "" + "cmt_msg": "media: xc4000: Fix atomicity violation in xc4000_get_frequency" }, "CVE-2024-25740": { "cmt_msg": "" @@ -134074,6 +174542,9 @@ "CVE-2022-3903": { "cmt_msg": "media: mceusb: Use new usb_control_msg_*() routines" }, + "CVE-2024-26642": { + "cmt_msg": "netfilter: nf_tables: disallow anonymous set with timeout flag" + }, "CVE-2023-1195": { "cmt_msg": "cifs: fix use-after-free caused by invalid pointer `hostname`" }, @@ -134098,15 +174569,24 @@ "CVE-2022-44032": { "cmt_msg": "char: pcmcia: remove all the drivers" }, + "CVE-2023-52595": { + "cmt_msg": "wifi: rt2x00: restart beacon queue when hardware reset" + }, "CVE-2022-48502": { "cmt_msg": "fs/ntfs3: Check fields while reading" }, + "CVE-2024-26782": { + "cmt_msg": "mptcp: fix double-free on socket dismantle" + }, "CVE-2023-0160": { "cmt_msg": "bpf, sockmap: fix deadlocks in the sockhash and sockmap" }, "CVE-2024-22705": { "cmt_msg": "ksmbd: fix slab-out-of-bounds in smb_strndup_from_utf16()" }, + "CVE-2024-26622": { + "cmt_msg": "tomoyo: fix UAF write bug in tomoyo_write_control()" + }, "CVE-2022-3619": { "cmt_msg": "Bluetooth: L2CAP: Fix memory leak in vhci_write" }, @@ -134119,20 +174599,35 @@ "CVE-2023-38427": { "cmt_msg": "ksmbd: fix out-of-bound read in deassemble_neg_contexts()" }, + "CVE-2023-52527": { + "cmt_msg": "ipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data()" + }, "CVE-2023-3006": { "cmt_msg": "arm64: Add AMPERE1 to the Spectre-BHB affected list" }, + "CVE-2023-52523": { + "cmt_msg": "bpf, sockmap: Reject sk_msg egress redirects to non-TCP sockets" + }, + "CVE-2023-52522": { + "cmt_msg": "net: fix possible store tearing in neigh_periodic_work()" + }, "CVE-2022-3586": { "cmt_msg": "sch_sfb: Don't assume the skb is still around after enqueueing to child" }, "CVE-2024-0641": { "cmt_msg": "tipc: fix a potential deadlock on &tx->lock" }, + "CVE-2024-26789": { + "cmt_msg": "crypto: arm64/neonbs - fix out-of-bounds access on short input" + }, "CVE-2022-43945": { "cmt_msg": "NFSD: Protect against send buffer overflow in NFSv2 READDIR" }, - "CVE-2024-0646": { - "cmt_msg": "net: tls, update curr on splice as well" + "CVE-2023-52529": { + "cmt_msg": "HID: sony: Fix a potential memory leak in sony_probe()" + }, + "CVE-2023-52528": { + "cmt_msg": "net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg" }, "CVE-2023-39198": { "cmt_msg": "drm/qxl: fix UAF on handle creation" @@ -134161,12 +174656,30 @@ "CVE-2023-38430": { "cmt_msg": "ksmbd: validate smb request protocol id" }, + "CVE-2024-26600": { + "cmt_msg": "phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP" + }, "CVE-2023-3390": { "cmt_msg": "netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE" }, + "CVE-2024-26606": { + "cmt_msg": "binder: signal epoll threads of self-work" + }, + "CVE-2024-26607": { + "cmt_msg": "drm/bridge: sii902x: Fix probing race issue" + }, "CVE-2021-33061": { "cmt_msg": "ixgbe: add improvement for MDD response functionality" }, + "CVE-2024-26764": { + "cmt_msg": "fs/aio: Restrict kiocb_set_cancel_fn() to I/O submitted via libaio" + }, + "CVE-2024-26608": { + "cmt_msg": "ksmbd: fix global oob in ksmbd_nl_policy" + }, + "CVE-2024-26766": { + "cmt_msg": "IB/hfi1: Fix sdma.h tx->num_descs off-by-one error" + }, "CVE-2023-3389": { "cmt_msg": "io_uring: mutex locked poll hashing" }, @@ -134176,6 +174689,9 @@ "CVE-2021-3864": { "cmt_msg": "" }, + "CVE-2024-26770": { + "cmt_msg": "HID: nvidia-shield: Add missing null pointer checks to LED initialization" + }, "CVE-2024-23849": { "cmt_msg": "net/rds: Fix UBSAN: array-index-out-of-bounds in rds_cmsg_recv" }, @@ -134194,9 +174710,6 @@ "CVE-2023-20569": { "cmt_msg": "x86/bugs: Increase the x86 bugs vector size to two u32s" }, - "CVE-2024-26588": { - "cmt_msg": "LoongArch: BPF: Prevent out-of-bounds memory access" - }, "CVE-2018-12931": { "cmt_msg": "" }, @@ -134204,7 +174717,7 @@ "cmt_msg": "" }, "CVE-2023-6270": { - "cmt_msg": "" + "cmt_msg": "aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts" }, "CVE-2023-2156": { "cmt_msg": "net: rpl: fix rpl header size calculation" @@ -134222,7 +174735,10 @@ "cmt_msg": "" }, "CVE-2023-6356": { - "cmt_msg": "" + "cmt_msg": "nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length" + }, + "CVE-2024-26744": { + "cmt_msg": "RDMA/srpt: Support specifying the srpt_service_guid parameter" }, "CVE-2023-26607": { "cmt_msg": "ntfs: fix out-of-bounds read in ntfs_attr_find()" @@ -134233,6 +174749,24 @@ "CVE-2019-15239": { "cmt_msg": "unknown" }, + "CVE-2023-52635": { + "cmt_msg": "PM / devfreq: Synchronize devfreq_monitor_[start/stop]" + }, + "CVE-2023-52469": { + "cmt_msg": "drivers/amd/pm: fix a use-after-free in kv_parse_power_table" + }, + "CVE-2023-52633": { + "cmt_msg": "um: time-travel: fix time corruption" + }, + "CVE-2023-52632": { + "cmt_msg": "drm/amdkfd: Fix lock dependency warning with srcu" + }, + "CVE-2023-52631": { + "cmt_msg": "fs/ntfs3: Fix an NULL dereference bug" + }, + "CVE-2023-52630": { + "cmt_msg": "blk-iocost: Fix an UBSAN shift-out-of-bounds warning" + }, "CVE-2022-21505": { "cmt_msg": "lockdown: Fix kexec lockdown bypass with ima policy" }, @@ -134281,6 +174815,12 @@ "CVE-2023-28327": { "cmt_msg": "af_unix: Get user_ns from in_skb in unix_diag_get_exact()." }, + "CVE-2023-52638": { + "cmt_msg": "can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock" + }, + "CVE-2024-26631": { + "cmt_msg": "ipv6: mcast: fix data-race in ipv6_mc_down / mld_ifc_work" + }, "CVE-2017-13693": { "cmt_msg": "" }, @@ -134302,8 +174842,11 @@ "CVE-2022-42895": { "cmt_msg": "Bluetooth: L2CAP: Fix attempting to access uninitialized memory" }, - "CVE-2023-33952": { - "cmt_msg": "drm/vmwgfx: Do not drop the reference to the handle too soon" + "CVE-2024-26636": { + "cmt_msg": "llc: make llc_ui_sendmsg() more robust against bonding changes" + }, + "CVE-2022-48627": { + "cmt_msg": "vt: fix memory overlapping when deleting chars in the buffer" }, "CVE-2023-33951": { "cmt_msg": "drm/vmwgfx: Do not drop the reference to the handle too soon" @@ -134311,6 +174854,9 @@ "CVE-2022-4382": { "cmt_msg": "USB: gadgetfs: Fix race between mounting and unmounting" }, + "CVE-2022-48628": { + "cmt_msg": "ceph: drop messages from MDS when unmounting" + }, "CVE-2024-24859": { "cmt_msg": "" }, @@ -134323,33 +174869,69 @@ "CVE-2024-24857": { "cmt_msg": "" }, + "CVE-2024-26673": { + "cmt_msg": "netfilter: nft_ct: sanitize layer 3 and 4 protocol number in custom expectations" + }, "CVE-2022-3545": { "cmt_msg": "nfp: fix use-after-free in area_cache_get()" }, + "CVE-2023-52569": { + "cmt_msg": "btrfs: remove BUG() after failure to insert delayed dir index item" + }, + "CVE-2023-52568": { + "cmt_msg": "x86/sgx: Resolves SECS reclaim vs. page fault for EAUG race" + }, "CVE-2022-3543": { "cmt_msg": "af_unix: Fix memory leaks of the whole sk due to OOB skb." }, "CVE-2022-3542": { "cmt_msg": "bnx2x: fix potential memory leak in bnx2x_tpa_stop()" }, + "CVE-2023-52563": { + "cmt_msg": "drm/meson: fix memory leak on ->hpd_notify callback" + }, + "CVE-2023-52561": { + "cmt_msg": "arm64: dts: qcom: sdm845-db845c: Mark cont splash memory region as reserved" + }, + "CVE-2023-52560": { + "cmt_msg": "mm/damon/vaddr-test: fix memory leak in damon_do_test_apply_three_regions()" + }, "CVE-2023-5197": { "cmt_msg": "netfilter: nf_tables: disallow rule removal from chain binding" }, + "CVE-2023-52566": { + "cmt_msg": "nilfs2: fix potential use after free in nilfs_gccache_submit_read_data()" + }, + "CVE-2023-52565": { + "cmt_msg": "media: uvcvideo: Fix OOB read" + }, "CVE-2023-1382": { "cmt_msg": "tipc: set con sock in tipc_conn_alloc" }, "CVE-2023-1380": { "cmt_msg": "wifi: brcmfmac: slab-out-of-bounds read in brcmf_get_assoc_ies()" }, + "CVE-2024-26672": { + "cmt_msg": "drm/amdgpu: Fix variable 'mca_funcs' dereferenced before NULL check in 'amdgpu_mca_smu_get_mca_entry()'" + }, "CVE-2020-0347": { "cmt_msg": "" }, "CVE-2019-12456": { "cmt_msg": "" }, + "CVE-2024-26720": { + "cmt_msg": "mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again" + }, "CVE-2021-33655": { "cmt_msg": "fbcon: Disallow setting font bigger than screen size" }, + "CVE-2024-26727": { + "cmt_msg": "btrfs: do not ASSERT() if the newly created subvolume already got read" + }, + "CVE-2024-26726": { + "cmt_msg": "btrfs: don't drop extent_map for free space inode on write error" + }, "CVE-2023-1206": { "cmt_msg": "tcp: Reduce chance of collisions in inet6_hashfn()." }, @@ -134377,11 +174959,26 @@ "CVE-2023-3355": { "cmt_msg": "drm/msm/gem: Add check for kmalloc" }, + "CVE-2023-52518": { + "cmt_msg": "Bluetooth: hci_codec: Fix leaking content of local_codecs" + }, + "CVE-2023-52519": { + "cmt_msg": "HID: intel-ish-hid: ipc: Disable and reenable ACPI GPE bit" + }, + "CVE-2023-52516": { + "cmt_msg": "dma-debug: don't call __dma_entry_alloc_check_leak() under free_entries_lock" + }, + "CVE-2023-52517": { + "cmt_msg": "spi: sun6i: fix race between DMA RX transfer completion and RX FIFO drain" + }, + "CVE-2023-52515": { + "cmt_msg": "RDMA/srp: Do not call scsi_done() from srp_abort()" + }, "CVE-2019-15902": { "cmt_msg": "unknown" }, - "CVE-2024-25739": { - "cmt_msg": "" + "CVE-2023-52510": { + "cmt_msg": "ieee802154: ca8210: Fix a potential UAF in ca8210_probe" }, "CVE-2023-3358": { "cmt_msg": "HID: intel_ish-hid: Add check for ishtp_dma_tx_map" @@ -134393,7 +174990,10 @@ "cmt_msg": "" }, "CVE-2023-6536": { - "cmt_msg": "" + "cmt_msg": "nvmet-tcp: fix a crash in nvmet_req_complete()" + }, + "CVE-2024-26704": { + "cmt_msg": "ext4: fix double-free of blocks due to wrong extents moved_len" }, "CVE-2018-17977": { "cmt_msg": "" @@ -134401,12 +175001,30 @@ "CVE-2024-1151": { "cmt_msg": "net: openvswitch: limit the number of recursions from action sets" }, + "CVE-2024-26659": { + "cmt_msg": "xhci: handle isoc Babble and Buffer Overrun events properly" + }, + "CVE-2024-26658": { + "cmt_msg": "bcachefs: grab s_umount only if snapshotting" + }, "CVE-2010-5321": { "cmt_msg": "" }, + "CVE-2024-26655": { + "cmt_msg": "Fix memory leak in posix_clock_open()" + }, + "CVE-2024-26654": { + "cmt_msg": "ALSA: sh: aica: reorder cleanup operations to avoid UAF bugs" + }, "CVE-2023-1990": { "cmt_msg": "nfc: st-nci: Fix use after free bug in ndlc_remove due to race condition" }, + "CVE-2024-26651": { + "cmt_msg": "sr9800: Add check for usbnet_get_endpoints" + }, + "CVE-2024-26650": { + "cmt_msg": "platform/x86: p2sb: Allow p2sb_bar() calls during PCI device probe" + }, "CVE-2023-4147": { "cmt_msg": "netfilter: nf_tables: disallow rule addition to bound chain via NFTA_RULE_CHAIN_ID" }, @@ -134419,6 +175037,18 @@ "CVE-2023-4569": { "cmt_msg": "netfilter: nf_tables: deactivate catchall elements in next generation" }, + "CVE-2023-52474": { + "cmt_msg": "IB/hfi1: Fix bugs with non-PAGE_SIZE-end multi-iovec user SDMA requests" + }, + "CVE-2023-52477": { + "cmt_msg": "usb: hub: Guard against accesses to uninitialized BOS descriptors" + }, + "CVE-2023-52476": { + "cmt_msg": "perf/x86/lbr: Filter vsyscall addresses" + }, + "CVE-2023-52470": { + "cmt_msg": "drm/radeon: check the alloc_workqueue return value in radeon_crtc_init()" + }, "CVE-2023-22997": { "cmt_msg": "module: Fix NULL vs IS_ERR checking for module_get_next_page" }, @@ -134428,8 +175058,14 @@ "CVE-2023-4563": { "cmt_msg": "netfilter: nf_tables: don't skip expired elements during walk" }, - "CVE-2022-26365": { - "cmt_msg": "xen/blkfront: fix leaking data in shared pages" + "CVE-2023-52479": { + "cmt_msg": "ksmbd: fix uaf in smb20_oplock_break_ack" + }, + "CVE-2023-52478": { + "cmt_msg": "HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect" + }, + "CVE-2021-3542": { + "cmt_msg": "" }, "CVE-2023-3220": { "cmt_msg": "drm/msm/dpu: Add check for pstates" @@ -134458,6 +175094,9 @@ "CVE-2023-32257": { "cmt_msg": "ksmbd: fix racy issue from session setup and logoff" }, + "CVE-2024-26778": { + "cmt_msg": "fbdev: savage: Error out if pixclock equals zero" + }, "CVE-2023-32254": { "cmt_msg": "ksmbd: fix racy issue under cocurrent smb2 tree disconnect" }, @@ -134479,14 +175118,65 @@ "CVE-2024-25741": { "cmt_msg": "" }, + "CVE-2024-26808": { + "cmt_msg": "netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain" + }, + "CVE-2024-26809": { + "cmt_msg": "netfilter: nft_set_pipapo: release elements in clone only from destroy path" + }, + "CVE-2024-26804": { + "cmt_msg": "net: ip_tunnel: prevent perpetual headroom growth" + }, "CVE-2023-1989": { "cmt_msg": "Bluetooth: btsdio: fix use after free bug in btsdio_remove due to unfinished work" }, + "CVE-2024-26806": { + "cmt_msg": "spi: cadence-qspi: remove system-wide suspend helper calls from runtime PM hooks" + }, + "CVE-2024-26801": { + "cmt_msg": "Bluetooth: Avoid potential use-after-free in hci_error_reset" + }, + "CVE-2024-26802": { + "cmt_msg": "stmmac: Clear variable when destroying workqueue" + }, + "CVE-2023-52508": { + "cmt_msg": "nvme-fc: Prevent null pointer dereference in nvme_fc_io_getuuid()" + }, + "CVE-2023-52606": { + "cmt_msg": "powerpc/lib: Validate size for vector operations" + }, + "CVE-2023-52607": { + "cmt_msg": "powerpc/mm: Fix null-pointer dereference in pgtable_cache_add" + }, + "CVE-2023-52604": { + "cmt_msg": "FS:JFS:UBSAN:array-index-out-of-bounds in dbAdjTree" + }, + "CVE-2023-52602": { + "cmt_msg": "jfs: fix slab-out-of-bounds Read in dtSearch" + }, + "CVE-2023-52603": { + "cmt_msg": "UBSAN: array-index-out-of-bounds in dtSplitRoot" + }, "CVE-2022-25265": { "cmt_msg": "" }, + "CVE-2023-52601": { + "cmt_msg": "jfs: fix array-index-out-of-bounds in dbAdjTree" + }, + "CVE-2024-26779": { + "cmt_msg": "wifi: mac80211: fix race condition on enabling fast-xmit" + }, + "CVE-2023-52600": { + "cmt_msg": "jfs: fix uaf in jfs_evict_inode" + }, + "CVE-2023-52608": { + "cmt_msg": "firmware: arm_scmi: Check mailbox/SMT channel for consistency" + }, + "CVE-2023-52609": { + "cmt_msg": "binder: fix race between mmput() and do_exit()" + }, "CVE-2024-23196": { - "cmt_msg": "" + "cmt_msg": "ALSA: hda: fix a possible null-pointer dereference due to data race in snd_hdac_regmap_sync()" }, "CVE-2023-4208": { "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free" @@ -134512,6 +175202,9 @@ "CVE-2023-21102": { "cmt_msg": "efi: rt-wrapper: Add missing include" }, + "CVE-2023-52506": { + "cmt_msg": "LoongArch: Set all reserved memblocks on Node#0 at initialization" + }, "CVE-2022-2663": { "cmt_msg": "netfilter: nf_conntrack_irc: Fix forged IP logic" }, @@ -134527,6 +175220,9 @@ "CVE-2023-4010": { "cmt_msg": "" }, + "CVE-2023-52500": { + "cmt_msg": "scsi: pm80xx: Avoid leaking tags when processing OPC_INB_SET_CONTROLLER_CONFIG command" + }, "CVE-2022-38457": { "cmt_msg": "drm/vmwgfx: Remove rcu locks from user resources" }, @@ -134539,6 +175235,9 @@ "CVE-2019-19378": { "cmt_msg": "" }, + "CVE-2023-52482": { + "cmt_msg": "x86/srso: Add SRSO mitigation for Hygon processors" + }, "CVE-2022-36879": { "cmt_msg": "xfrm: xfrm_policy: fix a possible double xfrm_pols_put() in xfrm_bundle_lookup()" }, @@ -134579,7 +175278,10 @@ "cmt_msg": "" }, "CVE-2023-7042": { - "cmt_msg": "" + "cmt_msg": "wifi: ath10k: fix NULL pointer dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev()" + }, + "CVE-2024-26775": { + "cmt_msg": "aoe: avoid potential deadlock at set_capacity" }, "CVE-2022-3594": { "cmt_msg": "r8152: Rate limit overflow messages" @@ -134590,8 +175292,11 @@ "CVE-2022-3595": { "cmt_msg": "cifs: fix double-fault crash during ntlmssp" }, + "CVE-2023-52559": { + "cmt_msg": "iommu/vt-d: Avoid memory allocation in iommu_suspend()" + }, "CVE-2023-47233": { - "cmt_msg": "" + "cmt_msg": "wifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach" }, "CVE-2024-23850": { "cmt_msg": "btrfs: do not ASSERT() if the newly created subvolume already got read" @@ -134599,18 +175304,42 @@ "CVE-2024-23851": { "cmt_msg": "dm: limit the number of targets and parameter size area" }, + "CVE-2023-52629": { + "cmt_msg": "sh: push-switch: Reorder cleanup operations to avoid use-after-free bug" + }, "CVE-2022-1462": { "cmt_msg": "tty: use new tty_insert_flip_string_and_push_buffer() in pty_write()" }, + "CVE-2024-26758": { + "cmt_msg": "md: Don't ignore suspended array in md_check_recovery()" + }, + "CVE-2024-26610": { + "cmt_msg": "wifi: iwlwifi: fix a memory corruption" + }, + "CVE-2024-26612": { + "cmt_msg": "netfs, fscache: Prevent Oops in fscache_put_cache()" + }, "CVE-2022-42329": { "cmt_msg": "xen/netback: don't call kfree_skb() with interrupts disabled" }, "CVE-2022-42328": { "cmt_msg": "xen/netback: don't call kfree_skb() with interrupts disabled" }, + "CVE-2024-26751": { + "cmt_msg": "ARM: ep93xx: Add terminator to gpiod_lookup_table" + }, + "CVE-2024-26752": { + "cmt_msg": "l2tp: pass correct message length to ip6_append_data" + }, + "CVE-2024-26754": { + "cmt_msg": "gtp: fix use-after-free and null-ptr-deref in gtp_genl_dump_pdp()" + }, "CVE-2023-21255": { "cmt_msg": "binder: fix UAF caused by faulty buffer cleanup" }, + "CVE-2024-26757": { + "cmt_msg": "md: Don't ignore read-only array in md_check_recovery()" + }, "CVE-2023-52439": { "cmt_msg": "uio: Fix use-after-free in uio_open" }, @@ -134626,9 +175355,24 @@ "CVE-2023-52436": { "cmt_msg": "f2fs: explicitly null-terminate the xattr list" }, + "CVE-2024-26688": { + "cmt_msg": "fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super" + }, + "CVE-2024-23307": { + "cmt_msg": "md/raid5: fix atomicity violation in raid5_cache_count" + }, "CVE-2022-2961": { "cmt_msg": "" }, + "CVE-2024-26680": { + "cmt_msg": "net: atlantic: Fix DMA mapping for PTP hwts ring" + }, + "CVE-2024-26686": { + "cmt_msg": "fs/proc: do_task_stat: use sig->stats_lock to gather the threads/children stats" + }, + "CVE-2024-26687": { + "cmt_msg": "xen/events: close evtchn after mapping cleanup" + }, "CVE-2023-51779": { "cmt_msg": "Bluetooth: af_bluetooth: Fix Use-After-Free in bt_sock_recvmsg" }, @@ -134662,21 +175406,45 @@ "CVE-2023-4623": { "cmt_msg": "net/sched: sch_hfsc: Ensure inner classes have fsc curve" }, + "CVE-2024-26663": { + "cmt_msg": "tipc: Check the bearer type before calling tipc_udp_nl_bearer_add()" + }, "CVE-2023-6040": { "cmt_msg": "netfilter: nf_tables: Reject tables of unsupported family" }, "CVE-2023-1193": { "cmt_msg": "ksmbd: delete asynchronous work from list" }, + "CVE-2023-52498": { + "cmt_msg": "PM: sleep: Fix possible deadlocks in core system-wide PM code" + }, + "CVE-2023-52640": { + "cmt_msg": "fs/ntfs3: Fix oob in ntfs_listxattr" + }, + "CVE-2023-52641": { + "cmt_msg": "fs/ntfs3: Add NULL ptr dereference checking at the end of attr_allocate_frame()" + }, "CVE-2021-0399": { "cmt_msg": "" }, + "CVE-2023-52488": { + "cmt_msg": "serial: sc16is7xx: convert from _raw_ to _noinc_ regmap functions for FIFO" + }, + "CVE-2023-52489": { + "cmt_msg": "mm/sparsemem: fix race in accessing memory_section->usage" + }, "CVE-2023-42755": { "cmt_msg": "net/sched: Retire rsvp classifier" }, "CVE-2023-3161": { "cmt_msg": "fbcon: Check font dimension limits" }, + "CVE-2023-52486": { + "cmt_msg": "drm: Don't unref the same fb many times by mistake due to deadlock handling" + }, + "CVE-2023-52480": { + "cmt_msg": "ksmbd: fix race condition between session lookup and expire" + }, "CVE-2012-4542": { "cmt_msg": "" }, @@ -134698,6 +175466,15 @@ "CVE-2023-3609": { "cmt_msg": "net/sched: cls_u32: Fix reference counter leak leading to overflow" }, + "CVE-2023-52491": { + "cmt_msg": "media: mtk-jpeg: Fix use after free bug due to error path handling in mtk_jpeg_dec_device_run" + }, + "CVE-2024-26772": { + "cmt_msg": "ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal()" + }, + "CVE-2024-26759": { + "cmt_msg": "mm/swap: fix race when skipping swapcache" + }, "CVE-2022-3424": { "cmt_msg": "misc: sgi-gru: fix use-after-free error in gru_set_context_option, gru_fault and gru_handle_user_call_os" }, @@ -134719,6 +175496,9 @@ "CVE-2008-2544": { "cmt_msg": "" }, + "CVE-2023-52485": { + "cmt_msg": "drm/amd/display: Wake DMCUB before sending a command" + }, "CVE-2022-42719": { "cmt_msg": "wifi: mac80211: fix MBSSID parsing use-after-free" }, @@ -134767,12 +175547,36 @@ "CVE-2022-33744": { "cmt_msg": "xen/arm: Fix race in RB-tree based P2M accounting" }, + "CVE-2023-52596": { + "cmt_msg": "sysctl: Fix out of bounds access for empty sysctl registers" + }, + "CVE-2023-52597": { + "cmt_msg": "KVM: s390: fix setting of fpc register" + }, + "CVE-2023-52594": { + "cmt_msg": "wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus()" + }, "CVE-2023-52443": { "cmt_msg": "apparmor: avoid crash when parsed profile name is empty" }, + "CVE-2023-52593": { + "cmt_msg": "wifi: wfx: fix possible NULL pointer dereference in wfx_set_mfp_ap()" + }, + "CVE-2023-52590": { + "cmt_msg": "ocfs2: Avoid touching renamed directory if parent does not change" + }, + "CVE-2023-52591": { + "cmt_msg": "reiserfs: Avoid touching renamed directory if parent does not change" + }, "CVE-2023-2194": { "cmt_msg": "i2c: xgene-slimpro: Fix out-of-bounds bug in xgene_slimpro_i2c_xfer()" }, + "CVE-2023-52599": { + "cmt_msg": "jfs: fix array-index-out-of-bounds in diNewExt" + }, + "CVE-2024-26627": { + "cmt_msg": "scsi: core: Move scsi_host_busy() out of host lock for waking up EH handler" + }, "CVE-2022-41218": { "cmt_msg": "media: dvb-core: Fix UAF due to refcount races at releasing" }, @@ -134786,7 +175590,10 @@ "cmt_msg": "x86/speculation/mmio: Enable CPU Fill buffer clearing on idle" }, "CVE-2024-0841": { - "cmt_msg": "" + "cmt_msg": "fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super" + }, + "CVE-2024-26623": { + "cmt_msg": "pds_core: Prevent race issues involving the adminq" }, "CVE-2022-41849": { "cmt_msg": "fbdev: smscufx: Fix use-after-free in ufx_ops_open()" @@ -134806,8 +175613,11 @@ "CVE-2021-39800": { "cmt_msg": "" }, + "CVE-2024-26784": { + "cmt_msg": "pmdomain: arm: Fix NULL dereference on scmi_perf_domain removal" + }, "CVE-2024-22099": { - "cmt_msg": "" + "cmt_msg": "Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security" }, "CVE-2022-45885": { "cmt_msg": "" @@ -134821,18 +175631,36 @@ "CVE-2022-45886": { "cmt_msg": "media: dvb-core: Fix use-after-free due on race condition at dvb_net" }, + "CVE-2023-52509": { + "cmt_msg": "ravb: Fix use-after-free issue in ravb_tx_timeout_work()" + }, "CVE-2023-46343": { "cmt_msg": "nfc: nci: fix possible NULL pointer dereference in send_acknowledge()" }, "CVE-2024-25744": { "cmt_msg": "x86/coco: Disable 32-bit emulation by default on TDX and SEV" }, + "CVE-2023-52504": { + "cmt_msg": "x86/alternatives: Disable KASAN in apply_alternatives()" + }, + "CVE-2023-52507": { + "cmt_msg": "nfc: nci: assert requested protocol is valid" + }, "CVE-2023-2124": { "cmt_msg": "xfs: verify buffer contents when we skip log replay" }, + "CVE-2023-52501": { + "cmt_msg": "ring-buffer: Do not attempt to read past \"commit\"" + }, "CVE-2022-45888": { "cmt_msg": "char: xillybus: Prevent use-after-free due to race condition" }, + "CVE-2023-52503": { + "cmt_msg": "tee: amdtee: fix use-after-free vulnerability in amdtee_close_session" + }, + "CVE-2023-52502": { + "cmt_msg": "net: nfc: fix races in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn()" + }, "CVE-2023-1281": { "cmt_msg": "net/sched: tcindex: update imperfect hash filters respecting rcu" }, @@ -134845,12 +175673,21 @@ "CVE-2023-1859": { "cmt_msg": "9p/xen : Fix use after free bug in xen_9pfs_front_remove due to race condition" }, + "CVE-2024-26718": { + "cmt_msg": "dm-crypt, dm-verity: disable tasklets" + }, "CVE-2023-1855": { "cmt_msg": "hwmon: (xgene) Fix use after free bug in xgene_hwmon_remove due to race condition" }, "CVE-2022-27672": { "cmt_msg": "x86/speculation: Identify processors vulnerable to SMT RSB predictions" }, + "CVE-2024-26668": { + "cmt_msg": "netfilter: nft_limit: reject configurations that cause integer overflow" + }, + "CVE-2024-26669": { + "cmt_msg": "net/sched: flower: Fix chain template offload" + }, "CVE-2020-25220": { "cmt_msg": "" }, @@ -134860,12 +175697,27 @@ "CVE-2022-0171": { "cmt_msg": "KVM: SEV: add cache flush to solve SEV cache incoherency issues" }, + "CVE-2024-26661": { + "cmt_msg": "drm/amd/display: Add NULL test for 'timing generator' in 'dcn21_set_pipe()'" + }, + "CVE-2024-26662": { + "cmt_msg": "drm/amd/display: Fix 'panel_cntl' could be null in 'dcn21_set_backlight_level()'" + }, "CVE-2023-26242": { "cmt_msg": "" }, + "CVE-2024-26664": { + "cmt_msg": "hwmon: (coretemp) Fix out-of-bounds memory access" + }, + "CVE-2024-26665": { + "cmt_msg": "tunnels: fix out of bounds access when building IPv6 PMTU error" + }, "CVE-2019-16089": { "cmt_msg": "" }, + "CVE-2024-26689": { + "cmt_msg": "ceph: prevent use-after-free in encode_cap_msg()" + }, "CVE-2022-1679": { "cmt_msg": "ath9k: fix use-after-free in ath9k_hif_usb_rx_cb" }, @@ -134911,11 +175763,32 @@ "CVE-2023-23039": { "cmt_msg": "" }, + "CVE-2024-26660": { + "cmt_msg": "drm/amd/display: Implement bounds check for stream encoder creation in DCN301" + }, + "CVE-2024-26719": { + "cmt_msg": "nouveau: offload fence uevents work to workqueue" + }, + "CVE-2024-26714": { + "cmt_msg": "interconnect: qcom: sc8180x: Mark CO0 BCM keepalive" + }, + "CVE-2024-26715": { + "cmt_msg": "usb: dwc3: gadget: Fix NULL pointer dereference in dwc3_gadget_suspend" + }, "CVE-2024-1312": { "cmt_msg": "mm: lock_vma_under_rcu() must check vma->anon_vma under vma lock" }, + "CVE-2024-26717": { + "cmt_msg": "HID: i2c-hid-of: fix NULL-deref on failed power up" + }, "CVE-2023-3338": { "cmt_msg": "Remove DECnet support from kernel" + }, + "CVE-2024-26712": { + "cmt_msg": "powerpc/kasan: Fix addr error caused by page alignment" + }, + "CVE-2024-26713": { + "cmt_msg": "powerpc/pseries/iommu: Fix iommu initialisation during DLPAR add" } } }, @@ -135132,6 +176005,9 @@ "CVE-2021-45095": { "cmt_msg": "phonet: refcount leak in pep_sock_accep" }, + "CVE-2023-52520": { + "cmt_msg": "platform/x86: think-lmi: Fix reference leak" + }, "CVE-2022-0001": { "cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE" }, @@ -135141,12 +176017,30 @@ "CVE-2022-0002": { "cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE" }, + "CVE-2024-26685": { + "cmt_msg": "nilfs2: fix potential bug in end_buffer_async_write" + }, + "CVE-2023-52615": { + "cmt_msg": "hwrng: core - Fix page fault dead lock on mmap-ed hwrng" + }, + "CVE-2023-52614": { + "cmt_msg": "PM / devfreq: Fix buffer overflow in trans_stat_show" + }, + "CVE-2023-52617": { + "cmt_msg": "PCI: switchtec: Fix stdev_release() crash after surprise hot remove" + }, + "CVE-2023-52616": { + "cmt_msg": "crypto: lib/mpi - Fix unexpected pointer access in mpi_ec_init" + }, "CVE-2022-3108": { "cmt_msg": "drm/amdkfd: Check for null pointer after calling kmemdup" }, "CVE-2022-0995": { "cmt_msg": "watch_queue: Fix filter limit check" }, + "CVE-2023-52612": { + "cmt_msg": "crypto: scomp - fix req->dst buffer overflow" + }, "CVE-2022-3105": { "cmt_msg": "RDMA/uverbs: Check for null return of kmalloc_array" }, @@ -135201,9 +176095,15 @@ "CVE-2024-0584": { "cmt_msg": "ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet" }, + "CVE-2024-26663": { + "cmt_msg": "tipc: Check the bearer type before calling tipc_udp_nl_bearer_add()" + }, "CVE-2023-2163": { "cmt_msg": "bpf: Fix incorrect verifier pruning due to missing register precision taints" }, + "CVE-2024-26759": { + "cmt_msg": "mm/swap: fix race when skipping swapcache" + }, "CVE-2022-21125": { "cmt_msg": "x86/speculation/mmio: Reuse SRBDS mitigation for SBDS" }, @@ -135279,27 +176179,30 @@ "CVE-2022-34918": { "cmt_msg": "netfilter: nf_tables: stricter validation of element data" }, - "CVE-2021-28714": { - "cmt_msg": "xen/netback: fix rx queue stall detection" + "CVE-2022-2585": { + "cmt_msg": "posix-cpu-timers: Cleanup CPU timers before freeing them during exec" }, "CVE-2022-3202": { "cmt_msg": "jfs: prevent NULL deref in diFree" }, + "CVE-2024-25739": { + "cmt_msg": "" + }, "CVE-2022-2602": { "cmt_msg": "io_uring/af_unix: defer registered files gc to io_uring release" }, "CVE-2024-26585": { "cmt_msg": "tls: fix race between tx work scheduling and socket close" }, + "CVE-2023-52511": { + "cmt_msg": "spi: sun6i: reduce DMA RX transfer width to single byte" + }, "CVE-2024-26584": { "cmt_msg": "net: tls: handle backlogging of crypto requests" }, "CVE-2023-2008": { "cmt_msg": "udmabuf: add back sanity check" }, - "CVE-2024-26587": { - "cmt_msg": "net: netdevsim: don't try to destroy PHC on VFs" - }, "CVE-2023-2002": { "cmt_msg": "bluetooth: Perform careful capability checks in hci_sock_ioctl()" }, @@ -135351,24 +176254,54 @@ "CVE-2023-1073": { "cmt_msg": "HID: check empty report_list in hid_validate_values()" }, + "CVE-2024-26747": { + "cmt_msg": "usb: roles: fix NULL pointer issue when put module's reference" + }, + "CVE-2024-26745": { + "cmt_msg": "powerpc/pseries/iommu: IOMMU table is not initialized for kdump over SR-IOV" + }, "CVE-2023-51781": { "cmt_msg": "appletalk: Fix Use-After-Free in atalk_ioctl" }, + "CVE-2024-26743": { + "cmt_msg": "RDMA/qedr: Fix qedr_create_user_qp error flow" + }, + "CVE-2024-26740": { + "cmt_msg": "net/sched: act_mirred: use the backlog for mirred ingress" + }, "CVE-2024-22386": { "cmt_msg": "" }, "CVE-2022-1734": { "cmt_msg": "nfc: nfcmrvl: main: reorder destructive operations in nfcmrvl_nci_unregister_dev to avoid bugs" }, + "CVE-2024-26749": { + "cmt_msg": "usb: cdns3: fixed memory use after free at cdns3_gadget_ep_disable()" + }, + "CVE-2024-26748": { + "cmt_msg": "usb: cdns3: fix memory double free when handle zero packet" + }, "CVE-2023-1652": { "cmt_msg": "NFSD: fix use-after-free in nfsd4_ssc_setup_dul()" }, + "CVE-2024-26787": { + "cmt_msg": "mmc: mmci: stm32: fix DMA API overlapping mappings warning" + }, "CVE-2022-3707": { "cmt_msg": "drm/i915/gvt: fix double free bug in split_2MB_gtt_entry" }, "CVE-2022-2503": { "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag" }, + "CVE-2023-52610": { + "cmt_msg": "net/sched: act_ct: fix skb leak and crash on ooo frags" + }, + "CVE-2024-26699": { + "cmt_msg": "drm/amd/display: Fix array-index-out-of-bounds in dcn35_clkmgr" + }, + "CVE-2024-26698": { + "cmt_msg": "hv_netvsc: Fix race condition between netvsc_probe and netvsc_remove" + }, "CVE-2022-23038": { "cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()" }, @@ -135378,6 +176311,9 @@ "CVE-2022-20154": { "cmt_msg": "sctp: use call_rcu to free endpoint" }, + "CVE-2024-26691": { + "cmt_msg": "KVM: arm64: Fix circular locking dependency" + }, "CVE-2022-20158": { "cmt_msg": "net/packet: fix slab-out-of-bounds access in packet_recvmsg()" }, @@ -135390,6 +176326,12 @@ "CVE-2024-0565": { "cmt_msg": "smb: client: fix OOB in receive_encrypted_standard()" }, + "CVE-2024-26697": { + "cmt_msg": "nilfs2: fix data corruption in dsync block recovery for small block sizes" + }, + "CVE-2024-26696": { + "cmt_msg": "nilfs2: fix hang in nilfs_lookup_dirty_data_buffers()" + }, "CVE-2023-2176": { "cmt_msg": "RDMA/core: Refactor rdma_bind_addr" }, @@ -135426,27 +176368,48 @@ "CVE-2023-31081": { "cmt_msg": "" }, - "CVE-2024-26588": { - "cmt_msg": "LoongArch: BPF: Prevent out-of-bounds memory access" + "CVE-2023-52618": { + "cmt_msg": "block/rnbd-srv: Check for unlikely string overflow" }, - "CVE-2024-23307": { - "cmt_msg": "" + "CVE-2024-0646": { + "cmt_msg": "net: tls, update curr on splice as well" + }, + "CVE-2023-52598": { + "cmt_msg": "s390/ptrace: handle setting of fpc register correctly" + }, + "CVE-2023-52576": { + "cmt_msg": "x86/mm, kexec, ima: Use memblock_free_late() from ima_free_kexec_buffer()" }, "CVE-2022-32296": { "cmt_msg": "tcp: increase source port perturb table to 2^16" }, + "CVE-2023-52499": { + "cmt_msg": "powerpc/47x: Fix 47x syscall return crash" + }, "CVE-2023-3567": { "cmt_msg": "vc_screen: move load of struct vc_data pointer in vcs_read() to avoid UAF" }, "CVE-2022-3028": { "cmt_msg": "af_key: Do not call xfrm_probe_algs in parallel" }, + "CVE-2023-52493": { + "cmt_msg": "bus: mhi: host: Drop chan lock before queuing buffers" + }, + "CVE-2023-52492": { + "cmt_msg": "dmaengine: fix NULL pointer in channel unregistration function" + }, "CVE-2020-14304": { "cmt_msg": "" }, "CVE-2022-2318": { "cmt_msg": "net: rose: fix UAF bugs caused by timer handler" }, + "CVE-2023-52497": { + "cmt_msg": "erofs: fix lz4 inplace decompression" + }, + "CVE-2023-52494": { + "cmt_msg": "bus: mhi: host: Add alignment check for event ring read pointer" + }, "CVE-2022-33981": { "cmt_msg": "floppy: disable FDRAWCMD by default" }, @@ -135471,6 +176434,9 @@ "CVE-2023-39198": { "cmt_msg": "drm/qxl: fix UAF on handle creation" }, + "CVE-2024-26656": { + "cmt_msg": "drm/amdgpu: fix use-after-free bug" + }, "CVE-2023-37454": { "cmt_msg": "" }, @@ -135489,6 +176455,9 @@ "CVE-2023-33288": { "cmt_msg": "power: supply: bq24190: Fix use after free bug in bq24190_remove due to race condition" }, + "CVE-2023-52484": { + "cmt_msg": "iommu/arm-smmu-v3: Fix soft lockup triggered by arm_smmu_mm_invalidate_range" + }, "CVE-2022-29900": { "cmt_msg": "x86/kvm/vmx: Make noinstr clean" }, @@ -135504,6 +176473,9 @@ "CVE-2023-25012": { "cmt_msg": "HID: bigben: use spinlock to safely schedule workers" }, + "CVE-2023-52580": { + "cmt_msg": "net/core: Fix ETH_P_1588 flow dissector" + }, "CVE-2023-35829": { "cmt_msg": "media: rkvdec: fix use after free bug in rkvdec_remove" }, @@ -135513,6 +176485,9 @@ "CVE-2022-29582": { "cmt_msg": "io_uring: fix race between timeout flush and removal" }, + "CVE-2023-52583": { + "cmt_msg": "ceph: fix deadlock or deadcode of misusing dget()" + }, "CVE-2022-1116": { "cmt_msg": "" }, @@ -135522,6 +176497,9 @@ "CVE-2023-35823": { "cmt_msg": "media: saa7134: fix use after free bug in saa7134_finidev due to race condition" }, + "CVE-2023-52582": { + "cmt_msg": "netfs: Only call folio_start_fscache() one time for each folio" + }, "CVE-2022-23816": { "cmt_msg": "x86/kvm/vmx: Make noinstr clean" }, @@ -135531,6 +176509,21 @@ "CVE-2023-35827": { "cmt_msg": "ravb: Fix use-after-free issue in ravb_tx_timeout_work()" }, + "CVE-2023-52481": { + "cmt_msg": "arm64: errata: Add Cortex-A520 speculative unprivileged load workaround" + }, + "CVE-2023-52585": { + "cmt_msg": "drm/amdgpu: Fix possible NULL dereference in amdgpu_ras_query_error_status_helper()" + }, + "CVE-2023-52584": { + "cmt_msg": "spmi: mediatek: Fix UAF on device remove" + }, + "CVE-2023-52587": { + "cmt_msg": "IB/ipoib: Fix mcast list locking" + }, + "CVE-2023-52586": { + "cmt_msg": "drm/msm/dpu: Add mutex lock in control vblank irq" + }, "CVE-2022-3567": { "cmt_msg": "ipv6: Fix data races around sk->sk_prot." }, @@ -135546,15 +176539,60 @@ "CVE-2022-4269": { "cmt_msg": "act_mirred: use the backlog for nested calls to mirred ingress" }, + "CVE-2024-26606": { + "cmt_msg": "binder: signal epoll threads of self-work" + }, + "CVE-2023-52589": { + "cmt_msg": "media: rkisp1: Fix IRQ disable race issue" + }, + "CVE-2023-52588": { + "cmt_msg": "f2fs: fix to tag gcing flag on page during block migration" + }, + "CVE-2024-26768": { + "cmt_msg": "LoongArch: Change acpi_core_pic[NR_CPUS] to acpi_core_pic[MAX_CORE_PIC]" + }, "CVE-2022-34494": { "cmt_msg": "rpmsg: virtio: Fix possible double free in rpmsg_virtio_add_ctrl_dev()" }, "CVE-2022-34495": { "cmt_msg": "rpmsg: virtio: Fix possible double free in rpmsg_probe()" }, + "CVE-2024-26727": { + "cmt_msg": "btrfs: do not ASSERT() if the newly created subvolume already got read" + }, "CVE-2023-52340": { "cmt_msg": "ipv6: remove max_size check inline with ipv4" }, + "CVE-2024-26765": { + "cmt_msg": "LoongArch: Disable IRQ before init_fn() for nonboot CPUs" + }, + "CVE-2021-47099": { + "cmt_msg": "veth: ensure skb entering GRO are not cloned." + }, + "CVE-2021-47098": { + "cmt_msg": "hwmon: (lm90) Prevent integer overflow/underflow in hysteresis calculations" + }, + "CVE-2021-47097": { + "cmt_msg": "Input: elantech - fix stack out of bound access in elantech_change_report_id()" + }, + "CVE-2021-47095": { + "cmt_msg": "ipmi: ssif: initialize ssif_info->client early" + }, + "CVE-2021-47094": { + "cmt_msg": "KVM: x86/mmu: Don't advance iterator after restart due to yielding" + }, + "CVE-2021-47093": { + "cmt_msg": "platform/x86: intel_pmc_core: fix memleak on registration failure" + }, + "CVE-2021-47091": { + "cmt_msg": "mac80211: fix locking in ieee80211_start_ap error path" + }, + "CVE-2021-47090": { + "cmt_msg": "mm/hwpoison: clear MF_COUNT_INCREASED before retrying get_any_page()" + }, + "CVE-2023-52475": { + "cmt_msg": "Input: powermate - fix use-after-free in powermate_config_complete" + }, "CVE-2023-6560": { "cmt_msg": "io_uring: don't allow discontig pages for IORING_SETUP_NO_MMAP" }, @@ -135564,18 +176602,45 @@ "CVE-2023-1611": { "cmt_msg": "btrfs: fix race between quota disable and quota assign ioctls" }, + "CVE-2024-26763": { + "cmt_msg": "dm-crypt: don't modify the data when using authenticated encryption" + }, "CVE-2022-26490": { "cmt_msg": "nfc: st21nfca: Fix potential buffer overflows in EVT_TRANSACTION" }, "CVE-2023-6817": { "cmt_msg": "netfilter: nft_set_pipapo: skip inactive elements during set walk" }, + "CVE-2024-26795": { + "cmt_msg": "riscv: Sparse-Memory/vmemmap out-of-bounds fix" + }, + "CVE-2024-26797": { + "cmt_msg": "drm/amd/display: Prevent potential buffer overflow in map_hw_resources" + }, + "CVE-2024-26790": { + "cmt_msg": "dmaengine: fsl-qdma: fix SoC may hang on 16 byte unaligned read" + }, "CVE-2022-1836": { "cmt_msg": "floppy: disable FDRAWCMD by default" }, + "CVE-2024-26793": { + "cmt_msg": "gtp: fix use-after-free and null-ptr-deref in gtp_newlink()" + }, + "CVE-2023-52530": { + "cmt_msg": "wifi: mac80211: fix potential key use-after-free" + }, + "CVE-2023-52531": { + "cmt_msg": "wifi: iwlwifi: mvm: Fix a memory corruption issue" + }, + "CVE-2023-52532": { + "cmt_msg": "net: mana: Fix TX CQE error handling" + }, "CVE-2022-30594": { "cmt_msg": "ptrace: Check PTRACE_O_SUSPEND_SECCOMP permission on PTRACE_SEIZE" }, + "CVE-2024-26798": { + "cmt_msg": "fbcon: always restore the old font data in fbcon_do_set_font()" + }, "CVE-2022-4662": { "cmt_msg": "USB: core: Prevent nested device-reset calls" }, @@ -135594,6 +176659,12 @@ "CVE-2023-46862": { "cmt_msg": "io_uring/fdinfo: lock SQ thread while retrieving thread cpu/pid" }, + "CVE-2024-26677": { + "cmt_msg": "rxrpc: Fix delayed ACKs to not set the reference serial number" + }, + "CVE-2024-26676": { + "cmt_msg": "af_unix: Call kfree_skb() for dead unix_(sk)->oob_skb in GC." + }, "CVE-2022-0168": { "cmt_msg": "cifs: fix NULL ptr dereference in smb2_ioctl_query_info()" }, @@ -135603,9 +176674,18 @@ "CVE-2020-26557": { "cmt_msg": "" }, + "CVE-2024-26671": { + "cmt_msg": "blk-mq: fix IO hang from sbitmap wakeup race" + }, "CVE-2023-34324": { "cmt_msg": "xen/events: replace evtchn_rwlock with RCU" }, + "CVE-2024-26776": { + "cmt_msg": "spi: hisi-sfc-v3xx: Return IRQ_NONE if no interrupts were detected" + }, + "CVE-2024-26777": { + "cmt_msg": "fbdev: sis: Error out if pixclock equals zero" + }, "CVE-2019-20794": { "cmt_msg": "" }, @@ -135615,21 +176695,30 @@ "CVE-2023-3397": { "cmt_msg": "" }, + "CVE-2024-26773": { + "cmt_msg": "ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found()" + }, + "CVE-2024-26679": { + "cmt_msg": "inet: read sk->sk_family once in inet_recv_error()" + }, + "CVE-2024-26771": { + "cmt_msg": "dmaengine: ti: edma: Add some null pointer checks to the edma_probe" + }, "CVE-2021-3542": { "cmt_msg": "" }, "CVE-2023-52458": { "cmt_msg": "block: add check that partition length needs to be aligned with block size" }, - "CVE-2023-52457": { - "cmt_msg": "serial: 8250: omap: Don't skip resource freeing if pm_runtime_resume_and_get() failed" - }, "CVE-2018-1121": { "cmt_msg": "" }, "CVE-2023-52454": { "cmt_msg": "nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length" }, + "CVE-2023-28746": { + "cmt_msg": "x86/mmio: Disable KVM mitigation when X86_FEATURE_CLEAR_CPU_BUF is set" + }, "CVE-2023-52452": { "cmt_msg": "bpf: Fix accesses to uninit stack slots" }, @@ -135645,6 +176734,9 @@ "CVE-2024-1086": { "cmt_msg": "netfilter: nf_tables: reject QUEUE/DROP verdict parameters" }, + "CVE-2022-32981": { + "cmt_msg": "powerpc/32: Fix overread/overwrite of thread_struct via ptrace" + }, "CVE-2022-3344": { "cmt_msg": "KVM: x86: nSVM: harden svm_free_nested against freeing vmcb02 while still in use" }, @@ -135663,9 +176755,21 @@ "CVE-2023-23002": { "cmt_msg": "Bluetooth: hci_qca: Fix NULL vs IS_ERR_OR_NULL check in qca_serdev_probe" }, + "CVE-2024-26702": { + "cmt_msg": "iio: magnetometer: rm3100: add boundary check for the value read from RM3100_REG_TMRC" + }, "CVE-2023-6240": { "cmt_msg": "" }, + "CVE-2024-26700": { + "cmt_msg": "drm/amd/display: Fix MST Null Ptr for RV" + }, + "CVE-2024-26707": { + "cmt_msg": "net: hsr: remove WARN_ONCE() in send_hsr_supervision_frame()" + }, + "CVE-2024-26706": { + "cmt_msg": "parisc: Fix random data corruption from exception handler" + }, "CVE-2023-23559": { "cmt_msg": "wifi: rndis_wlan: Prevent buffer overflow in rndis_query_oid" }, @@ -135675,6 +176779,9 @@ "CVE-2022-0382": { "cmt_msg": "net ticp:fix a kernel-infoleak in __tipc_sendmsg()" }, + "CVE-2024-26603": { + "cmt_msg": "x86/fpu: Stop relying on userspace for info to fault in xsave buffer" + }, "CVE-2023-32233": { "cmt_msg": "netfilter: nf_tables: deactivate anonymous set from preparation phase" }, @@ -135705,6 +176812,30 @@ "CVE-2022-1012": { "cmt_msg": "secure_seq: use the 64 bits of the siphash for port offset calculation" }, + "CVE-2023-52620": { + "cmt_msg": "netfilter: nf_tables: disallow timeout for anonymous sets" + }, + "CVE-2023-52621": { + "cmt_msg": "bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers" + }, + "CVE-2023-52622": { + "cmt_msg": "ext4: avoid online resizing failures due to oversized flex bg" + }, + "CVE-2023-52623": { + "cmt_msg": "SUNRPC: Fix a suspicious RCU usage warning" + }, + "CVE-2023-52619": { + "cmt_msg": "pstore/ram: Fix crash when setting number of cpus to an odd number" + }, + "CVE-2023-52625": { + "cmt_msg": "drm/amd/display: Refactor DMCUB enter/exit idle interface" + }, + "CVE-2023-52627": { + "cmt_msg": "iio: adc: ad7091r: Allow users to configure device events" + }, + "CVE-2023-52628": { + "cmt_msg": "netfilter: nftables: exthdr: fix 4-byte stack OOB write" + }, "CVE-2021-26934": { "cmt_msg": "" }, @@ -135741,6 +176872,9 @@ "CVE-2022-3526": { "cmt_msg": "macvlan: Fix leaking skb in source mode with nodst option" }, + "CVE-2024-26601": { + "cmt_msg": "ext4: regenerate buddy after block freeing failed if under fc replay" + }, "CVE-2022-3524": { "cmt_msg": "tcp/udp: Fix memory leak in ipv6_renew_options()." }, @@ -135753,12 +176887,33 @@ "CVE-2022-3521": { "cmt_msg": "kcm: avoid potential race in kcm_tx_work" }, - "CVE-2018-12928": { - "cmt_msg": "" + "CVE-2021-47101": { + "cmt_msg": "asix: fix uninit-value in asix_mdio_read()" + }, + "CVE-2021-47100": { + "cmt_msg": "ipmi: Fix UAF when uninstall ipmi_si and ipmi_msghandler module" + }, + "CVE-2021-47103": { + "cmt_msg": "inet: fully convert sk->sk_rx_dst to RCU rules" + }, + "CVE-2021-47102": { + "cmt_msg": "net: marvell: prestera: fix incorrect structure access" + }, + "CVE-2021-47105": { + "cmt_msg": "ice: xsk: return xsk buffers back to pool when cleaning the ring" + }, + "CVE-2021-47107": { + "cmt_msg": "NFSD: Fix READDIR buffer overflow" }, "CVE-2022-2196": { "cmt_msg": "KVM: VMX: Execute IBPB on emulated VM-exit when guest has IBRS" }, + "CVE-2023-52513": { + "cmt_msg": "RDMA/siw: Fix connection failure handling" + }, + "CVE-2021-47108": { + "cmt_msg": "drm/mediatek: hdmi: Perform NULL pointer check for mtk_hdmi_conf" + }, "CVE-2022-0330": { "cmt_msg": "drm/i915: Flush TLBs before releasing backing store" }, @@ -135798,8 +176953,8 @@ "CVE-2021-28715": { "cmt_msg": "xen/netback: don't queue unlimited number of packages" }, - "CVE-2022-2585": { - "cmt_msg": "posix-cpu-timers: Cleanup CPU timers before freeing them during exec" + "CVE-2021-28714": { + "cmt_msg": "xen/netback: fix rx queue stall detection" }, "CVE-2021-28713": { "cmt_msg": "xen/console: harden hvc_xen against event channel storms" @@ -135837,18 +176992,33 @@ "CVE-2023-3090": { "cmt_msg": "ipvlan:Fix out-of-bounds caused by unclear skb->cb" }, + "CVE-2023-52578": { + "cmt_msg": "net: bridge: use DEV_STATS_INC()" + }, "CVE-2022-4744": { "cmt_msg": "tun: avoid double free in tun_free_netdev" }, "CVE-2023-1095": { "cmt_msg": "netfilter: nf_tables: fix null deref due to zeroed list head" }, + "CVE-2023-52574": { + "cmt_msg": "team: fix null-ptr-deref when team device type is changed" + }, "CVE-2022-3239": { "cmt_msg": "media: em28xx: initialize refcount before kref_get" }, "CVE-2022-4543": { "cmt_msg": "" }, + "CVE-2023-52571": { + "cmt_msg": "power: supply: rk817: Fix node refcount leak" + }, + "CVE-2023-52572": { + "cmt_msg": "cifs: Fix UAF in cifs_demultiplex_thread()" + }, + "CVE-2023-52573": { + "cmt_msg": "net: rds: Fix possible NULL-pointer dereference" + }, "CVE-2023-4921": { "cmt_msg": "net: sched: sch_qfq: Fix UAF in qfq_dequeue()" }, @@ -135864,27 +177034,45 @@ "CVE-2023-4881": { "cmt_msg": "netfilter: nftables: exthdr: fix 4-byte stack OOB write" }, + "CVE-2024-26808": { + "cmt_msg": "netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain" + }, "CVE-2013-7445": { "cmt_msg": "" }, "CVE-2023-31248": { "cmt_msg": "netfilter: nf_tables: do not ignore genmask when looking up chain by id" }, + "CVE-2024-26736": { + "cmt_msg": "afs: Increase buffer size in afs_update_volume_status()" + }, "CVE-2024-26593": { "cmt_msg": "i2c: i801: Fix block process call transactions" }, + "CVE-2024-26738": { + "cmt_msg": "powerpc/pseries/iommu: DLPAR add doesn't completely initialize pci_controller" + }, + "CVE-2024-26739": { + "cmt_msg": "net/sched: act_mirred: don't override retval if we already lost the skb" + }, "CVE-2022-38096": { "cmt_msg": "" }, "CVE-2022-24122": { "cmt_msg": "ucount: Make get_ucount a safe get_user replacement" }, + "CVE-2024-26805": { + "cmt_msg": "netlink: Fix kernel-infoleak-after-free in __skb_datagram_iter" + }, "CVE-2022-1158": { "cmt_msg": "KVM: x86/mmu: do compare-and-exchange of gPTE via the user address" }, "CVE-2022-3303": { "cmt_msg": "ALSA: pcm: oss: Fix race at SNDCTL_DSP_SYNC" }, + "CVE-2024-26769": { + "cmt_msg": "nvmet-fc: avoid deadlock on delete association path" + }, "CVE-2022-45869": { "cmt_msg": "KVM: x86/mmu: Fix race condition in direct_page_fault" }, @@ -135915,18 +177103,42 @@ "CVE-2022-28388": { "cmt_msg": "can: usb_8dev: usb_8dev_start_xmit(): fix double dev_kfree_skb() in error path" }, + "CVE-2011-4917": { + "cmt_msg": "" + }, + "CVE-2024-26803": { + "cmt_msg": "net: veth: clear GRO when clearing XDP even when down" + }, "CVE-2023-52444": { "cmt_msg": "f2fs: fix to avoid dirent corruption" }, "CVE-2022-4129": { "cmt_msg": "l2tp: Serialize access to sk_user_data with sk_callback_lock" }, + "CVE-2024-26648": { + "cmt_msg": "drm/amd/display: Fix variable deferencing before NULL check in edp_setup_replay()" + }, "CVE-2022-0500": { "cmt_msg": "bpf: Introduce MEM_RDONLY flag" }, + "CVE-2024-26647": { + "cmt_msg": "drm/amd/display: Fix late derefrence 'dsc' check in 'link_set_dsc_pps_packet()'" + }, + "CVE-2024-26644": { + "cmt_msg": "btrfs: don't abort filesystem when attempting to snapshot deleted subvolume" + }, + "CVE-2024-26645": { + "cmt_msg": "tracing: Ensure visibility when inserting an element into tracing_map" + }, "CVE-2023-33203": { "cmt_msg": "net: qcom/emac: Fix use after free bug in emac_remove due to race condition" }, + "CVE-2024-26640": { + "cmt_msg": "tcp: add sanity checks to rx zerocopy" + }, + "CVE-2024-26641": { + "cmt_msg": "ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv()" + }, "CVE-2021-4001": { "cmt_msg": "bpf: Fix toctou on read-only map's constant scalar tracking" }, @@ -135951,6 +177163,9 @@ "CVE-2024-0639": { "cmt_msg": "sctp: fix potential deadlock on &net->sctp.addr_wq_lock" }, + "CVE-2023-52467": { + "cmt_msg": "mfd: syscon: Fix null pointer dereference in of_syscon_register()" + }, "CVE-2023-52464": { "cmt_msg": "EDAC/thunderx: Fix possible out-of-bounds string access" }, @@ -135972,6 +177187,12 @@ "CVE-2024-23848": { "cmt_msg": "" }, + "CVE-2024-26633": { + "cmt_msg": "ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim()" + }, + "CVE-2021-46933": { + "cmt_msg": "usb: gadget: f_fs: Clear ffs_eventfd in ffs_data_clear." + }, "CVE-2023-6622": { "cmt_msg": "netfilter: nf_tables: bail out on mismatching dynset and set expressions" }, @@ -135981,12 +177202,24 @@ "CVE-2023-4459": { "cmt_msg": "net: vmxnet3: fix possible NULL pointer dereference in vmxnet3_rq_cleanup()" }, + "CVE-2024-26625": { + "cmt_msg": "llc: call sock_orphan() at release time" + }, + "CVE-2024-26635": { + "cmt_msg": "llc: Drop support for ETH_P_TR_802_2." + }, "CVE-2022-26878": { "cmt_msg": "" }, + "CVE-2023-52639": { + "cmt_msg": "KVM: s390: vsie: fix race during shadow creation" + }, "CVE-2022-2153": { "cmt_msg": "KVM: x86: Avoid theoretical NULL pointer dereference in kvm_irq_delivery_to_apic_fast()" }, + "CVE-2024-2193": { + "cmt_msg": "" + }, "CVE-2022-20566": { "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free caused by l2cap_chan_put" }, @@ -135996,27 +177229,45 @@ "CVE-2018-12931": { "cmt_msg": "" }, + "CVE-2023-52637": { + "cmt_msg": "can: j1939: Fix UAF in j1939_sk_match_filter during setsockopt(SO_J1939_FILTER)" + }, "CVE-2023-1990": { "cmt_msg": "nfc: st-nci: Fix use after free bug in ndlc_remove due to race condition" }, + "CVE-2024-26684": { + "cmt_msg": "net: stmmac: xgmac: fix handling of DPP safety error for DMA channels" + }, "CVE-2022-0185": { "cmt_msg": "vfs: fs_context: fix up param length parsing in legacy_parse_param" }, "CVE-2022-48619": { "cmt_msg": "Input: add bounds checking to input_set_capability()" }, + "CVE-2023-52634": { + "cmt_msg": "drm/amd/display: Fix disable_otg_wa logic" + }, "CVE-2022-22942": { "cmt_msg": "drm/vmwgfx: Fix stale file descriptors on failed usercopy" }, "CVE-2022-25375": { "cmt_msg": "usb: gadget: rndis: check size of RNDIS_MSG_SET command" }, + "CVE-2019-25162": { + "cmt_msg": "i2c: Fix a potential use after free" + }, "CVE-2024-24861": { - "cmt_msg": "" + "cmt_msg": "media: xc4000: Fix atomicity violation in xc4000_get_frequency" + }, + "CVE-2024-26627": { + "cmt_msg": "scsi: core: Move scsi_host_busy() out of host lock for waking up EH handler" }, "CVE-2022-3903": { "cmt_msg": "media: mceusb: Use new usb_control_msg_*() routines" }, + "CVE-2024-26642": { + "cmt_msg": "netfilter: nf_tables: disallow anonymous set with timeout flag" + }, "CVE-2022-3577": { "cmt_msg": "HID: bigben: fix slab-out-of-bounds Write in bigben_probe" }, @@ -136026,8 +177277,8 @@ "CVE-2022-4379": { "cmt_msg": "NFSD: fix use-after-free in __nfs42_ssc_open()" }, - "CVE-2022-44034": { - "cmt_msg": "char: pcmcia: remove all the drivers" + "CVE-2022-4378": { + "cmt_msg": "proc: proc_skip_spaces() shouldn't think it is working on C strings" }, "CVE-2022-44033": { "cmt_msg": "char: pcmcia: remove all the drivers" @@ -136035,12 +177286,24 @@ "CVE-2022-44032": { "cmt_msg": "char: pcmcia: remove all the drivers" }, + "CVE-2023-52595": { + "cmt_msg": "wifi: rt2x00: restart beacon queue when hardware reset" + }, "CVE-2022-0847": { "cmt_msg": "lib/iov_iter: initialize \"flags\" in new pipe_buffer" }, + "CVE-2024-26782": { + "cmt_msg": "mptcp: fix double-free on socket dismantle" + }, "CVE-2023-21102": { "cmt_msg": "efi: rt-wrapper: Add missing include" }, + "CVE-2024-26675": { + "cmt_msg": "ppp_async: limit MRU to 64K" + }, + "CVE-2024-26622": { + "cmt_msg": "tomoyo: fix UAF write bug in tomoyo_write_control()" + }, "CVE-2023-28410": { "cmt_msg": "drm/i915/gem: add missing boundary check in vm_access" }, @@ -136050,23 +177313,50 @@ "CVE-2023-4147": { "cmt_msg": "netfilter: nf_tables: disallow rule addition to bound chain via NFTA_RULE_CHAIN_ID" }, + "CVE-2024-26718": { + "cmt_msg": "dm-crypt, dm-verity: disable tasklets" + }, "CVE-2023-0615": { "cmt_msg": "media: vivid: dev->bitmap_cap wasn't freed in all cases" }, + "CVE-2024-26672": { + "cmt_msg": "drm/amdgpu: Fix variable 'mca_funcs' dereferenced before NULL check in 'amdgpu_mca_smu_get_mca_entry()'" + }, + "CVE-2023-52527": { + "cmt_msg": "ipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data()" + }, "CVE-2023-3006": { "cmt_msg": "arm64: Add AMPERE1 to the Spectre-BHB affected list" }, + "CVE-2023-52523": { + "cmt_msg": "bpf, sockmap: Reject sk_msg egress redirects to non-TCP sockets" + }, + "CVE-2023-52522": { + "cmt_msg": "net: fix possible store tearing in neigh_periodic_work()" + }, "CVE-2022-3586": { "cmt_msg": "sch_sfb: Don't assume the skb is still around after enqueueing to child" }, "CVE-2024-0641": { "cmt_msg": "tipc: fix a potential deadlock on &tx->lock" }, + "CVE-2024-26789": { + "cmt_msg": "crypto: arm64/neonbs - fix out-of-bounds access on short input" + }, "CVE-2022-43945": { "cmt_msg": "NFSD: Protect against send buffer overflow in NFSv2 READDIR" }, - "CVE-2024-0646": { - "cmt_msg": "net: tls, update curr on splice as well" + "CVE-2023-52529": { + "cmt_msg": "HID: sony: Fix a potential memory leak in sony_probe()" + }, + "CVE-2023-52528": { + "cmt_msg": "net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg" + }, + "CVE-2024-26735": { + "cmt_msg": "ipv6: sr: fix possible use-after-free and null-ptr-deref" + }, + "CVE-2024-26623": { + "cmt_msg": "pds_core: Prevent race issues involving the adminq" }, "CVE-2020-27820": { "cmt_msg": "drm/nouveau: use drm_dev_unplug() during device removal" @@ -136074,33 +177364,60 @@ "CVE-2023-1872": { "cmt_msg": "io_uring: propagate issue_flags state down to file assignment" }, + "CVE-2024-25744": { + "cmt_msg": "x86/coco: Disable 32-bit emulation by default on TDX and SEV" + }, "CVE-2023-39194": { "cmt_msg": "net: xfrm: Fix xfrm_address_filter OOB read" }, "CVE-2023-39197": { "cmt_msg": "netfilter: conntrack: dccp: copy entire header to stack buffer, not just basic one" }, + "CVE-2023-52599": { + "cmt_msg": "jfs: fix array-index-out-of-bounds in diNewExt" + }, "CVE-2023-4622": { "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES" }, + "CVE-2024-26774": { + "cmt_msg": "ext4: avoid dividing by 0 in mb_update_avg_fragment_size() when block bitmap corrupt" + }, "CVE-2023-39193": { "cmt_msg": "netfilter: xt_sctp: validate the flag_info count" }, "CVE-2023-1079": { "cmt_msg": "HID: asus: use spinlock to safely schedule workers" }, + "CVE-2024-26602": { + "cmt_msg": "sched/membarrier: reduce the ability to hammer on sys_membarrier" + }, "CVE-2023-6610": { "cmt_msg": "smb: client: fix potential OOB in smb2_dump_detail()" }, + "CVE-2024-26600": { + "cmt_msg": "phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP" + }, "CVE-2023-3390": { "cmt_msg": "netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE" }, "CVE-2023-3812": { "cmt_msg": "net: tun: fix bugs for oversize packet when napi frags enabled" }, + "CVE-2024-26607": { + "cmt_msg": "drm/bridge: sii902x: Fix probing race issue" + }, "CVE-2021-33061": { "cmt_msg": "ixgbe: add improvement for MDD response functionality" }, + "CVE-2024-26764": { + "cmt_msg": "fs/aio: Restrict kiocb_set_cancel_fn() to I/O submitted via libaio" + }, + "CVE-2024-26767": { + "cmt_msg": "drm/amd/display: fixed integer types and null check locations" + }, + "CVE-2024-26766": { + "cmt_msg": "IB/hfi1: Fix sdma.h tx->num_descs off-by-one error" + }, "CVE-2024-26589": { "cmt_msg": "bpf: Reject variable offset alu on PTR_TO_FLOW_KEYS" }, @@ -136113,6 +177430,9 @@ "CVE-2021-3864": { "cmt_msg": "" }, + "CVE-2024-26770": { + "cmt_msg": "HID: nvidia-shield: Add missing null pointer checks to LED initialization" + }, "CVE-2022-1652": { "cmt_msg": "floppy: use a statically allocated error counter" }, @@ -136150,7 +177470,7 @@ "cmt_msg": "" }, "CVE-2023-6270": { - "cmt_msg": "" + "cmt_msg": "aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts" }, "CVE-2023-2156": { "cmt_msg": "net: rpl: fix rpl header size calculation" @@ -136170,6 +177490,9 @@ "CVE-2022-42432": { "cmt_msg": "netfilter: nfnetlink_osf: fix possible bogus match in nf_osf_find()" }, + "CVE-2022-45885": { + "cmt_msg": "" + }, "CVE-2008-4609": { "cmt_msg": "" }, @@ -136177,7 +177500,10 @@ "cmt_msg": "tipc: improve size validations for received domain records" }, "CVE-2023-6356": { - "cmt_msg": "" + "cmt_msg": "nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length" + }, + "CVE-2024-26744": { + "cmt_msg": "RDMA/srpt: Support specifying the srpt_service_guid parameter" }, "CVE-2021-4135": { "cmt_msg": "netdevsim: Zero-initialize memory for new map's value in function nsim_bpf_map_alloc" @@ -136191,6 +177517,21 @@ "CVE-2019-15239": { "cmt_msg": "unknown" }, + "CVE-2023-52635": { + "cmt_msg": "PM / devfreq: Synchronize devfreq_monitor_[start/stop]" + }, + "CVE-2023-52469": { + "cmt_msg": "drivers/amd/pm: fix a use-after-free in kv_parse_power_table" + }, + "CVE-2023-52633": { + "cmt_msg": "um: time-travel: fix time corruption" + }, + "CVE-2023-52632": { + "cmt_msg": "drm/amdkfd: Fix lock dependency warning with srcu" + }, + "CVE-2023-52630": { + "cmt_msg": "blk-iocost: Fix an UBSAN shift-out-of-bounds warning" + }, "CVE-2022-21505": { "cmt_msg": "lockdown: Fix kexec lockdown bypass with ima policy" }, @@ -136224,6 +177565,9 @@ "CVE-2022-3535": { "cmt_msg": "net: mvpp2: fix mvpp2 debugfs leak" }, + "CVE-2024-26646": { + "cmt_msg": "thermal: intel: hfi: Add syscore callbacks for system-wide PM" + }, "CVE-2021-22600": { "cmt_msg": "net/packet: rx_owner_map depends on pg_vec" }, @@ -136239,6 +177583,12 @@ "CVE-2023-28327": { "cmt_msg": "af_unix: Get user_ns from in_skb in unix_diag_get_exact()." }, + "CVE-2023-52638": { + "cmt_msg": "can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock" + }, + "CVE-2024-26631": { + "cmt_msg": "ipv6: mcast: fix data-race in ipv6_mc_down / mld_ifc_work" + }, "CVE-2017-13693": { "cmt_msg": "" }, @@ -136260,15 +177610,33 @@ "CVE-2022-42895": { "cmt_msg": "Bluetooth: L2CAP: Fix attempting to access uninitialized memory" }, + "CVE-2024-26636": { + "cmt_msg": "llc: make llc_ui_sendmsg() more robust against bonding changes" + }, + "CVE-2022-48626": { + "cmt_msg": "moxart: fix potential use-after-free on remove path" + }, + "CVE-2022-48627": { + "cmt_msg": "vt: fix memory overlapping when deleting chars in the buffer" + }, "CVE-2022-4382": { "cmt_msg": "USB: gadgetfs: Fix race between mounting and unmounting" }, + "CVE-2022-48628": { + "cmt_msg": "ceph: drop messages from MDS when unmounting" + }, + "CVE-2022-48629": { + "cmt_msg": "crypto: qcom-rng - ensure buffer for generate is completely filled" + }, "CVE-2024-24859": { "cmt_msg": "" }, "CVE-2024-24858": { "cmt_msg": "" }, + "CVE-2024-22099": { + "cmt_msg": "Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security" + }, "CVE-2024-24855": { "cmt_msg": "scsi: lpfc: Fix a possible data race in lpfc_unregister_fcf_rescan()" }, @@ -136278,17 +177646,41 @@ "CVE-2022-1508": { "cmt_msg": "io_uring: reexpand under-reexpanded iters" }, + "CVE-2024-26673": { + "cmt_msg": "netfilter: nft_ct: sanitize layer 3 and 4 protocol number in custom expectations" + }, "CVE-2022-3545": { "cmt_msg": "nfp: fix use-after-free in area_cache_get()" }, + "CVE-2023-52569": { + "cmt_msg": "btrfs: remove BUG() after failure to insert delayed dir index item" + }, + "CVE-2023-52568": { + "cmt_msg": "x86/sgx: Resolves SECS reclaim vs. page fault for EAUG race" + }, "CVE-2022-3542": { "cmt_msg": "bnx2x: fix potential memory leak in bnx2x_tpa_stop()" }, + "CVE-2023-52563": { + "cmt_msg": "drm/meson: fix memory leak on ->hpd_notify callback" + }, + "CVE-2023-52561": { + "cmt_msg": "arm64: dts: qcom: sdm845-db845c: Mark cont splash memory region as reserved" + }, "CVE-2023-5197": { "cmt_msg": "netfilter: nf_tables: disallow rule removal from chain binding" }, - "CVE-2023-1838": { - "cmt_msg": "Fix double fget() in vhost_net_set_backend()" + "CVE-2023-52566": { + "cmt_msg": "nilfs2: fix potential use after free in nilfs_gccache_submit_read_data()" + }, + "CVE-2023-52565": { + "cmt_msg": "media: uvcvideo: Fix OOB read" + }, + "CVE-2021-46928": { + "cmt_msg": "parisc: Clear stale IIR value on instruction access rights trap" + }, + "CVE-2021-46929": { + "cmt_msg": "sctp: use call_rcu to free endpoint" }, "CVE-2023-1382": { "cmt_msg": "tipc: set con sock in tipc_conn_alloc" @@ -136296,14 +177688,29 @@ "CVE-2023-1380": { "cmt_msg": "wifi: brcmfmac: slab-out-of-bounds read in brcmf_get_assoc_ies()" }, + "CVE-2021-46923": { + "cmt_msg": "fs/mount_setattr: always cleanup mount_kattr" + }, + "CVE-2021-46924": { + "cmt_msg": "NFC: st21nfca: Fix memory leak in device probe and remove" + }, + "CVE-2021-46925": { + "cmt_msg": "net/smc: fix kernel panic caused by race of smc_sock" + }, + "CVE-2021-46926": { + "cmt_msg": "ALSA: hda: intel-sdw-acpi: harden detection of controller" + }, "CVE-2020-0347": { "cmt_msg": "" }, + "CVE-2024-26788": { + "cmt_msg": "dmaengine: fsl-qdma: init irq after reg initialization" + }, "CVE-2022-27223": { "cmt_msg": "USB: gadget: validate endpoint index for xilinx udc" }, - "CVE-2022-1353": { - "cmt_msg": "af_key: add __GFP_ZERO flag for compose_sadb_supported in function pfkey_register" + "CVE-2022-40982": { + "cmt_msg": "x86/speculation: Add Gather Data Sampling mitigation" }, "CVE-2019-12456": { "cmt_msg": "" @@ -136311,6 +177718,9 @@ "CVE-2023-20569": { "cmt_msg": "x86/bugs: Increase the x86 bugs vector size to two u32s" }, + "CVE-2024-26720": { + "cmt_msg": "mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again" + }, "CVE-2021-33655": { "cmt_msg": "fbcon: Disallow setting font bigger than screen size" }, @@ -136320,6 +177730,9 @@ "CVE-2022-41858": { "cmt_msg": "drivers: net: slip: fix NPD bug in sl_tx_timeout()" }, + "CVE-2024-26726": { + "cmt_msg": "btrfs: don't drop extent_map for free space inode on write error" + }, "CVE-2023-1206": { "cmt_msg": "tcp: Reduce chance of collisions in inet6_hashfn()." }, @@ -136356,11 +177769,23 @@ "CVE-2023-3355": { "cmt_msg": "drm/msm/gem: Add check for kmalloc" }, + "CVE-2023-52519": { + "cmt_msg": "HID: intel-ish-hid: ipc: Disable and reenable ACPI GPE bit" + }, + "CVE-2023-52516": { + "cmt_msg": "dma-debug: don't call __dma_entry_alloc_check_leak() under free_entries_lock" + }, + "CVE-2023-52517": { + "cmt_msg": "spi: sun6i: fix race between DMA RX transfer completion and RX FIFO drain" + }, + "CVE-2023-52515": { + "cmt_msg": "RDMA/srp: Do not call scsi_done() from srp_abort()" + }, "CVE-2019-15902": { "cmt_msg": "unknown" }, - "CVE-2024-25739": { - "cmt_msg": "" + "CVE-2023-52510": { + "cmt_msg": "ieee802154: ca8210: Fix a potential UAF in ca8210_probe" }, "CVE-2023-3358": { "cmt_msg": "HID: intel_ish-hid: Add check for ishtp_dma_tx_map" @@ -136372,7 +177797,10 @@ "cmt_msg": "" }, "CVE-2023-6536": { - "cmt_msg": "" + "cmt_msg": "nvmet-tcp: fix a crash in nvmet_req_complete()" + }, + "CVE-2024-26704": { + "cmt_msg": "ext4: fix double-free of blocks due to wrong extents moved_len" }, "CVE-2022-23036": { "cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()" @@ -136383,9 +177811,30 @@ "CVE-2024-1151": { "cmt_msg": "net: openvswitch: limit the number of recursions from action sets" }, + "CVE-2024-26659": { + "cmt_msg": "xhci: handle isoc Babble and Buffer Overrun events properly" + }, + "CVE-2024-26658": { + "cmt_msg": "bcachefs: grab s_umount only if snapshotting" + }, "CVE-2010-5321": { "cmt_msg": "" }, + "CVE-2024-26655": { + "cmt_msg": "Fix memory leak in posix_clock_open()" + }, + "CVE-2024-26654": { + "cmt_msg": "ALSA: sh: aica: reorder cleanup operations to avoid UAF bugs" + }, + "CVE-2023-52485": { + "cmt_msg": "drm/amd/display: Wake DMCUB before sending a command" + }, + "CVE-2024-26651": { + "cmt_msg": "sr9800: Add check for usbnet_get_endpoints" + }, + "CVE-2024-26650": { + "cmt_msg": "platform/x86: p2sb: Allow p2sb_bar() calls during PCI device probe" + }, "CVE-2022-0264": { "cmt_msg": "bpf: Fix kernel address leakage in atomic fetch" }, @@ -136401,9 +177850,21 @@ "CVE-2023-4569": { "cmt_msg": "netfilter: nf_tables: deactivate catchall elements in next generation" }, + "CVE-2023-52474": { + "cmt_msg": "IB/hfi1: Fix bugs with non-PAGE_SIZE-end multi-iovec user SDMA requests" + }, + "CVE-2023-52477": { + "cmt_msg": "usb: hub: Guard against accesses to uninitialized BOS descriptors" + }, + "CVE-2023-52476": { + "cmt_msg": "perf/x86/lbr: Filter vsyscall addresses" + }, "CVE-2023-22995": { "cmt_msg": "usb: dwc3: dwc3-qcom: Add missing platform_device_put() in dwc3_qcom_acpi_register_core" }, + "CVE-2023-52470": { + "cmt_msg": "drm/radeon: check the alloc_workqueue return value in radeon_crtc_init()" + }, "CVE-2024-21803": { "cmt_msg": "" }, @@ -136416,6 +177877,12 @@ "CVE-2023-4563": { "cmt_msg": "netfilter: nf_tables: don't skip expired elements during walk" }, + "CVE-2023-52479": { + "cmt_msg": "ksmbd: fix uaf in smb20_oplock_break_ack" + }, + "CVE-2023-52478": { + "cmt_msg": "HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect" + }, "CVE-2022-26365": { "cmt_msg": "xen/blkfront: fix leaking data in shared pages" }, @@ -136425,8 +177892,8 @@ "CVE-2023-3220": { "cmt_msg": "drm/msm/dpu: Add check for pstates" }, - "CVE-2024-22099": { - "cmt_msg": "" + "CVE-2023-4623": { + "cmt_msg": "net/sched: sch_hfsc: Ensure inner classes have fsc curve" }, "CVE-2023-30456": { "cmt_msg": "KVM: nVMX: add missing consistency checks for CR0 and CR4" @@ -136443,8 +177910,8 @@ "CVE-2018-12929": { "cmt_msg": "" }, - "CVE-2021-4202": { - "cmt_msg": "NFC: reorganize the functions in nci_request" + "CVE-2018-12928": { + "cmt_msg": "" }, "CVE-2023-25775": { "cmt_msg": "RDMA/irdma: Prevent zero-length STAG registration" @@ -136467,23 +177934,71 @@ "CVE-2024-25741": { "cmt_msg": "" }, + "CVE-2024-26778": { + "cmt_msg": "fbdev: savage: Error out if pixclock equals zero" + }, + "CVE-2024-26809": { + "cmt_msg": "netfilter: nft_set_pipapo: release elements in clone only from destroy path" + }, "CVE-2022-26966": { "cmt_msg": "sr9700: sanity check for packet length" }, + "CVE-2024-26804": { + "cmt_msg": "net: ip_tunnel: prevent perpetual headroom growth" + }, "CVE-2023-1989": { "cmt_msg": "Bluetooth: btsdio: fix use after free bug in btsdio_remove due to unfinished work" }, - "CVE-2024-25744": { - "cmt_msg": "x86/coco: Disable 32-bit emulation by default on TDX and SEV" + "CVE-2024-26806": { + "cmt_msg": "spi: cadence-qspi: remove system-wide suspend helper calls from runtime PM hooks" + }, + "CVE-2024-26801": { + "cmt_msg": "Bluetooth: Avoid potential use-after-free in hci_error_reset" + }, + "CVE-2024-26802": { + "cmt_msg": "stmmac: Clear variable when destroying workqueue" + }, + "CVE-2023-52508": { + "cmt_msg": "nvme-fc: Prevent null pointer dereference in nvme_fc_io_getuuid()" + }, + "CVE-2023-52606": { + "cmt_msg": "powerpc/lib: Validate size for vector operations" + }, + "CVE-2023-52607": { + "cmt_msg": "powerpc/mm: Fix null-pointer dereference in pgtable_cache_add" + }, + "CVE-2023-52604": { + "cmt_msg": "FS:JFS:UBSAN:array-index-out-of-bounds in dbAdjTree" + }, + "CVE-2023-52602": { + "cmt_msg": "jfs: fix slab-out-of-bounds Read in dtSearch" + }, + "CVE-2023-52603": { + "cmt_msg": "UBSAN: array-index-out-of-bounds in dtSplitRoot" }, "CVE-2022-25265": { "cmt_msg": "" }, + "CVE-2023-52601": { + "cmt_msg": "jfs: fix array-index-out-of-bounds in dbAdjTree" + }, + "CVE-2024-26779": { + "cmt_msg": "wifi: mac80211: fix race condition on enabling fast-xmit" + }, + "CVE-2023-52600": { + "cmt_msg": "jfs: fix uaf in jfs_evict_inode" + }, + "CVE-2023-52608": { + "cmt_msg": "firmware: arm_scmi: Check mailbox/SMT channel for consistency" + }, + "CVE-2023-52609": { + "cmt_msg": "binder: fix race between mmput() and do_exit()" + }, "CVE-2022-21499": { "cmt_msg": "lockdown: also lock down previous kgdb use" }, "CVE-2024-23196": { - "cmt_msg": "" + "cmt_msg": "ALSA: hda: fix a possible null-pointer dereference due to data race in snd_hdac_regmap_sync()" }, "CVE-2023-4208": { "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free" @@ -136509,6 +178024,9 @@ "CVE-2023-0160": { "cmt_msg": "bpf, sockmap: fix deadlocks in the sockhash and sockmap" }, + "CVE-2023-52506": { + "cmt_msg": "LoongArch: Set all reserved memblocks on Node#0 at initialization" + }, "CVE-2022-2663": { "cmt_msg": "netfilter: nf_conntrack_irc: Fix forged IP logic" }, @@ -136524,6 +178042,9 @@ "CVE-2023-4010": { "cmt_msg": "" }, + "CVE-2023-52500": { + "cmt_msg": "scsi: pm80xx: Avoid leaking tags when processing OPC_INB_SET_CONTROLLER_CONFIG command" + }, "CVE-2022-2209": { "cmt_msg": "" }, @@ -136542,6 +178063,9 @@ "CVE-2019-19378": { "cmt_msg": "" }, + "CVE-2023-52482": { + "cmt_msg": "x86/srso: Add SRSO mitigation for Hygon processors" + }, "CVE-2022-36879": { "cmt_msg": "xfrm: xfrm_policy: fix a possible double xfrm_pols_put() in xfrm_bundle_lookup()" }, @@ -136596,11 +178120,17 @@ "CVE-2022-1998": { "cmt_msg": "fanotify: Fix stale file descriptor in copy_event_to_user()" }, + "CVE-2023-52624": { + "cmt_msg": "drm/amd/display: Wake DMCUB before executing GPINT commands" + }, "CVE-2022-1852": { "cmt_msg": "KVM: x86: avoid calling x86 emulator without a decoded instruction" }, "CVE-2023-7042": { - "cmt_msg": "" + "cmt_msg": "wifi: ath10k: fix NULL pointer dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev()" + }, + "CVE-2024-26775": { + "cmt_msg": "aoe: avoid potential deadlock at set_capacity" }, "CVE-2023-2019": { "cmt_msg": "netdevsim: fib: Fix reference count leak on route deletion failure" @@ -136611,8 +178141,11 @@ "CVE-2022-3595": { "cmt_msg": "cifs: fix double-fault crash during ntlmssp" }, + "CVE-2023-52559": { + "cmt_msg": "iommu/vt-d: Avoid memory allocation in iommu_suspend()" + }, "CVE-2023-47233": { - "cmt_msg": "" + "cmt_msg": "wifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach" }, "CVE-2024-23850": { "cmt_msg": "btrfs: do not ASSERT() if the newly created subvolume already got read" @@ -136620,15 +178153,42 @@ "CVE-2024-23851": { "cmt_msg": "dm: limit the number of targets and parameter size area" }, + "CVE-2023-52629": { + "cmt_msg": "sh: push-switch: Reorder cleanup operations to avoid use-after-free bug" + }, "CVE-2022-1462": { "cmt_msg": "tty: use new tty_insert_flip_string_and_push_buffer() in pty_write()" }, + "CVE-2024-26758": { + "cmt_msg": "md: Don't ignore suspended array in md_check_recovery()" + }, + "CVE-2024-26610": { + "cmt_msg": "wifi: iwlwifi: fix a memory corruption" + }, "CVE-2023-6606": { "cmt_msg": "smb: client: fix OOB in smbCalcSize()" }, + "CVE-2024-26614": { + "cmt_msg": "tcp: make sure init the accept_queue's spinlocks once" + }, "CVE-2022-1729": { "cmt_msg": "perf: Fix sys_perf_event_open() race against self" }, + "CVE-2024-26751": { + "cmt_msg": "ARM: ep93xx: Add terminator to gpiod_lookup_table" + }, + "CVE-2024-26752": { + "cmt_msg": "l2tp: pass correct message length to ip6_append_data" + }, + "CVE-2024-26754": { + "cmt_msg": "gtp: fix use-after-free and null-ptr-deref in gtp_genl_dump_pdp()" + }, + "CVE-2024-26756": { + "cmt_msg": "md: Don't register sync_thread for reshape directly" + }, + "CVE-2024-26757": { + "cmt_msg": "md: Don't ignore read-only array in md_check_recovery()" + }, "CVE-2023-52439": { "cmt_msg": "uio: Fix use-after-free in uio_open" }, @@ -136650,9 +178210,24 @@ "CVE-2022-2964": { "cmt_msg": "net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup" }, + "CVE-2024-26688": { + "cmt_msg": "fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super" + }, + "CVE-2024-23307": { + "cmt_msg": "md/raid5: fix atomicity violation in raid5_cache_count" + }, "CVE-2022-2961": { "cmt_msg": "" }, + "CVE-2024-26680": { + "cmt_msg": "net: atlantic: Fix DMA mapping for PTP hwts ring" + }, + "CVE-2024-26686": { + "cmt_msg": "fs/proc: do_task_stat: use sig->stats_lock to gather the threads/children stats" + }, + "CVE-2024-26687": { + "cmt_msg": "xen/events: close evtchn after mapping cleanup" + }, "CVE-2023-51779": { "cmt_msg": "Bluetooth: af_bluetooth: Fix Use-After-Free in bt_sock_recvmsg" }, @@ -136686,8 +178261,8 @@ "CVE-2023-0266": { "cmt_msg": "ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF" }, - "CVE-2023-4623": { - "cmt_msg": "net/sched: sch_hfsc: Ensure inner classes have fsc curve" + "CVE-2023-1838": { + "cmt_msg": "Fix double fget() in vhost_net_set_backend()" }, "CVE-2022-29156": { "cmt_msg": "RDMA/rtrs-clt: Fix possible double free in error case" @@ -136698,18 +178273,42 @@ "CVE-2022-24448": { "cmt_msg": "NFSv4: Handle case where the lookup of a directory fails" }, + "CVE-2023-52498": { + "cmt_msg": "PM: sleep: Fix possible deadlocks in core system-wide PM code" + }, "CVE-2021-4023": { "cmt_msg": "io-wq: fix cancellation on create-worker failure" }, + "CVE-2023-52640": { + "cmt_msg": "fs/ntfs3: Fix oob in ntfs_listxattr" + }, + "CVE-2023-52641": { + "cmt_msg": "fs/ntfs3: Add NULL ptr dereference checking at the end of attr_allocate_frame()" + }, "CVE-2021-0399": { "cmt_msg": "" }, + "CVE-2023-52488": { + "cmt_msg": "serial: sc16is7xx: convert from _raw_ to _noinc_ regmap functions for FIFO" + }, + "CVE-2023-52489": { + "cmt_msg": "mm/sparsemem: fix race in accessing memory_section->usage" + }, "CVE-2023-42755": { "cmt_msg": "net/sched: Retire rsvp classifier" }, "CVE-2020-36516": { "cmt_msg": "ipv4: avoid using shared IP generator for connected sockets" }, + "CVE-2023-52486": { + "cmt_msg": "drm: Don't unref the same fb many times by mistake due to deadlock handling" + }, + "CVE-2024-26791": { + "cmt_msg": "btrfs: dev-replace: properly validate device names" + }, + "CVE-2023-52480": { + "cmt_msg": "ksmbd: fix race condition between session lookup and expire" + }, "CVE-2012-4542": { "cmt_msg": "" }, @@ -136722,8 +178321,8 @@ "CVE-2023-4128": { "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free" }, - "CVE-2022-4378": { - "cmt_msg": "proc: proc_skip_spaces() shouldn't think it is working on C strings" + "CVE-2022-44034": { + "cmt_msg": "char: pcmcia: remove all the drivers" }, "CVE-2023-4244": { "cmt_msg": "netfilter: nf_tables: fix GC transaction races with netns and netlink event exit path" @@ -136743,8 +178342,26 @@ "CVE-2022-1972": { "cmt_msg": "netfilter: nf_tables: sanitize nft_set_desc_concat_parse()" }, - "CVE-2022-32981": { - "cmt_msg": "powerpc/32: Fix overread/overwrite of thread_struct via ptrace" + "CVE-2023-52491": { + "cmt_msg": "media: mtk-jpeg: Fix use after free bug due to error path handling in mtk_jpeg_dec_device_run" + }, + "CVE-2024-26772": { + "cmt_msg": "ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal()" + }, + "CVE-2021-47082": { + "cmt_msg": "tun: avoid double free in tun_free_netdev" + }, + "CVE-2021-47083": { + "cmt_msg": "pinctrl: mediatek: fix global-out-of-bounds issue" + }, + "CVE-2021-47086": { + "cmt_msg": "phonet/pep: refuse to enable an unbound pipe" + }, + "CVE-2021-47087": { + "cmt_msg": "tee: optee: Fix incorrect page free bug" + }, + "CVE-2021-47089": { + "cmt_msg": "kfence: fix memory leak when cat kfence objects" }, "CVE-2022-3424": { "cmt_msg": "misc: sgi-gru: fix use-after-free error in gru_set_context_option, gru_fault and gru_handle_user_call_os" @@ -136755,6 +178372,9 @@ "CVE-2023-0394": { "cmt_msg": "ipv6: raw: Deduct extension header length in rawv6_push_pending_frames" }, + "CVE-2024-26615": { + "cmt_msg": "net/smc: fix illegal rmb_desc access in SMC-D connection dump" + }, "CVE-2022-36402": { "cmt_msg": "drm/vmwgfx: Fix shader stage validation" }, @@ -136788,6 +178408,9 @@ "CVE-2021-3714": { "cmt_msg": "" }, + "CVE-2024-26733": { + "cmt_msg": "arp: Prevent overflow in arp_req_get()." + }, "CVE-2023-3117": { "cmt_msg": "netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE" }, @@ -136830,9 +178453,27 @@ "CVE-2022-33744": { "cmt_msg": "xen/arm: Fix race in RB-tree based P2M accounting" }, + "CVE-2023-52596": { + "cmt_msg": "sysctl: Fix out of bounds access for empty sysctl registers" + }, + "CVE-2023-52597": { + "cmt_msg": "KVM: s390: fix setting of fpc register" + }, + "CVE-2023-52594": { + "cmt_msg": "wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus()" + }, "CVE-2023-52443": { "cmt_msg": "apparmor: avoid crash when parsed profile name is empty" }, + "CVE-2023-52593": { + "cmt_msg": "wifi: wfx: fix possible NULL pointer dereference in wfx_set_mfp_ap()" + }, + "CVE-2023-52590": { + "cmt_msg": "ocfs2: Avoid touching renamed directory if parent does not change" + }, + "CVE-2023-52591": { + "cmt_msg": "reiserfs: Avoid touching renamed directory if parent does not change" + }, "CVE-2022-1280": { "cmt_msg": "drm: avoid circular locks in drm_mode_getconnector" }, @@ -136842,11 +178483,26 @@ "CVE-2023-52445": { "cmt_msg": "media: pvrusb2: fix use after free on context disconnection" }, + "CVE-2021-46936": { + "cmt_msg": "net: fix use-after-free in tw_timer_handler" + }, + "CVE-2021-46935": { + "cmt_msg": "binder: fix async_free_space accounting for empty parcels" + }, + "CVE-2021-46934": { + "cmt_msg": "i2c: validate user data in compat ioctl" + }, "CVE-2022-41218": { "cmt_msg": "media: dvb-core: Fix UAF due to refcount races at releasing" }, - "CVE-2011-4917": { - "cmt_msg": "" + "CVE-2021-46932": { + "cmt_msg": "Input: appletouch - initialize work before device registration" + }, + "CVE-2021-46931": { + "cmt_msg": "net/mlx5e: Wrap the tx reporter dump callback to extract the sq" + }, + "CVE-2021-46930": { + "cmt_msg": "usb: mtu3: fix list_head check warning" }, "CVE-2022-36946": { "cmt_msg": "netfilter: nf_queue: do not allow packet truncation below transport header offset" @@ -136858,7 +178514,7 @@ "cmt_msg": "x86/speculation/mmio: Enable CPU Fill buffer clearing on idle" }, "CVE-2024-0841": { - "cmt_msg": "" + "cmt_msg": "fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super" }, "CVE-2023-52449": { "cmt_msg": "mtd: Fix gluebi NULL pointer dereference caused by ftl notifier" @@ -136872,12 +178528,15 @@ "CVE-2022-41848": { "cmt_msg": "" }, - "CVE-2022-40982": { - "cmt_msg": "x86/speculation: Add Gather Data Sampling mitigation" + "CVE-2022-1353": { + "cmt_msg": "af_key: add __GFP_ZERO flag for compose_sadb_supported in function pfkey_register" }, "CVE-2022-28356": { "cmt_msg": "llc: fix netdevice reference leaks in llc_ui_bind()" }, + "CVE-2021-47106": { + "cmt_msg": "netfilter: nf_tables: fix use-after-free in nft_set_catchall_destroy()" + }, "CVE-2022-1198": { "cmt_msg": "drivers: hamradio: 6pack: fix UAF bug caused by mod_timer()" }, @@ -136893,14 +178552,17 @@ "CVE-2021-39800": { "cmt_msg": "" }, + "CVE-2024-26784": { + "cmt_msg": "pmdomain: arm: Fix NULL dereference on scmi_perf_domain removal" + }, "CVE-2022-1195": { "cmt_msg": "hamradio: improve the incomplete fix to avoid NPD" }, "CVE-2023-42754": { "cmt_msg": "ipv4: fix null-deref in ipv4_link_failure" }, - "CVE-2022-45885": { - "cmt_msg": "" + "CVE-2021-4202": { + "cmt_msg": "NFC: reorganize the functions in nci_request" }, "CVE-2022-45884": { "cmt_msg": "" @@ -136911,18 +178573,36 @@ "CVE-2022-45886": { "cmt_msg": "media: dvb-core: Fix use-after-free due on race condition at dvb_net" }, + "CVE-2023-52509": { + "cmt_msg": "ravb: Fix use-after-free issue in ravb_tx_timeout_work()" + }, "CVE-2023-46343": { "cmt_msg": "nfc: nci: fix possible NULL pointer dereference in send_acknowledge()" }, "CVE-2021-4204": { "cmt_msg": "bpf: Generalize check_ctx_reg for reuse with other types" }, + "CVE-2023-52504": { + "cmt_msg": "x86/alternatives: Disable KASAN in apply_alternatives()" + }, + "CVE-2023-52507": { + "cmt_msg": "nfc: nci: assert requested protocol is valid" + }, "CVE-2023-2124": { "cmt_msg": "xfs: verify buffer contents when we skip log replay" }, + "CVE-2023-52501": { + "cmt_msg": "ring-buffer: Do not attempt to read past \"commit\"" + }, "CVE-2022-45888": { "cmt_msg": "char: xillybus: Prevent use-after-free due to race condition" }, + "CVE-2023-52503": { + "cmt_msg": "tee: amdtee: fix use-after-free vulnerability in amdtee_close_session" + }, + "CVE-2023-52502": { + "cmt_msg": "net: nfc: fix races in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn()" + }, "CVE-2023-1281": { "cmt_msg": "net/sched: tcindex: update imperfect hash filters respecting rcu" }, @@ -136947,6 +178627,12 @@ "CVE-2022-27672": { "cmt_msg": "x86/speculation: Identify processors vulnerable to SMT RSB predictions" }, + "CVE-2024-26668": { + "cmt_msg": "netfilter: nft_limit: reject configurations that cause integer overflow" + }, + "CVE-2024-26669": { + "cmt_msg": "net/sched: flower: Fix chain template offload" + }, "CVE-2020-25220": { "cmt_msg": "" }, @@ -136956,12 +178642,27 @@ "CVE-2022-0171": { "cmt_msg": "KVM: SEV: add cache flush to solve SEV cache incoherency issues" }, + "CVE-2024-26661": { + "cmt_msg": "drm/amd/display: Add NULL test for 'timing generator' in 'dcn21_set_pipe()'" + }, + "CVE-2024-26662": { + "cmt_msg": "drm/amd/display: Fix 'panel_cntl' could be null in 'dcn21_set_backlight_level()'" + }, "CVE-2023-26242": { "cmt_msg": "" }, + "CVE-2024-26664": { + "cmt_msg": "hwmon: (coretemp) Fix out-of-bounds memory access" + }, + "CVE-2024-26665": { + "cmt_msg": "tunnels: fix out of bounds access when building IPv6 PMTU error" + }, "CVE-2019-16089": { "cmt_msg": "" }, + "CVE-2024-26689": { + "cmt_msg": "ceph: prevent use-after-free in encode_cap_msg()" + }, "CVE-2022-1679": { "cmt_msg": "ath9k: fix use-after-free in ath9k_hif_usb_rx_cb" }, @@ -137001,11 +178702,29 @@ "CVE-2023-23039": { "cmt_msg": "" }, + "CVE-2024-26660": { + "cmt_msg": "drm/amd/display: Implement bounds check for stream encoder creation in DCN301" + }, + "CVE-2024-26719": { + "cmt_msg": "nouveau: offload fence uevents work to workqueue" + }, + "CVE-2024-26715": { + "cmt_msg": "usb: dwc3: gadget: Fix NULL pointer dereference in dwc3_gadget_suspend" + }, "CVE-2024-1312": { "cmt_msg": "mm: lock_vma_under_rcu() must check vma->anon_vma under vma lock" }, + "CVE-2024-26717": { + "cmt_msg": "HID: i2c-hid-of: fix NULL-deref on failed power up" + }, "CVE-2023-3338": { "cmt_msg": "Remove DECnet support from kernel" + }, + "CVE-2024-26712": { + "cmt_msg": "powerpc/kasan: Fix addr error caused by page alignment" + }, + "CVE-2024-26713": { + "cmt_msg": "powerpc/pseries/iommu: Fix iommu initialisation during DLPAR add" } } }, @@ -137159,35 +178878,195 @@ } }, "5.15.12": { - "CVE-2021-44733": { - "cmt_msg": "tee: handle lookup of shm with reference count 0", - "cmt_id": "492eb7afe858d60408b2da09adc78540c4d16543" + "CVE-2021-47082": { + "cmt_msg": "tun: avoid double free in tun_free_netdev", + "cmt_id": "3cb5ae77799e8ed6ec3fec0b6b4cd07f01650cc5" }, - "CVE-2021-45469": { - "cmt_msg": "f2fs: fix to do sanity check on last xattr entry in __f2fs_setxattr()", - "cmt_id": "a8a9d753edd7f71e6a2edaa580d8182530b68791" + "CVE-2021-47083": { + "cmt_msg": "pinctrl: mediatek: fix global-out-of-bounds issue", + "cmt_id": "fb563baa3eb8e7a15f2cff3c2695e2cca0493e69" + }, + "CVE-2021-47086": { + "cmt_msg": "phonet/pep: refuse to enable an unbound pipe", + "cmt_id": "53ccdc73eedaf0e922c45b569b797d2796fbaafa" + }, + "CVE-2021-47087": { + "cmt_msg": "tee: optee: Fix incorrect page free bug", + "cmt_id": "91e94e42f6fc49635f1a16d8ae3f79552bcfda29" + }, + "CVE-2021-47088": { + "cmt_msg": "mm/damon/dbgfs: protect targets destructions with kdamond_lock", + "cmt_id": "330c6117a82c16a9a365a51cec5c9ab30b13245c" + }, + "CVE-2021-47089": { + "cmt_msg": "kfence: fix memory leak when cat kfence objects", + "cmt_id": "2f06c8293d27f6337f907042c602c9c953988c48" + }, + "CVE-2021-47101": { + "cmt_msg": "asix: fix uninit-value in asix_mdio_read()", + "cmt_id": "d259f621c85949f30cc578cac813b82bb5169f56" + }, + "CVE-2021-47100": { + "cmt_msg": "ipmi: Fix UAF when uninstall ipmi_si and ipmi_msghandler module", + "cmt_id": "6b3f7e4b10f343f05b5fb513b07a9168fbf1172e" + }, + "CVE-2021-47103": { + "cmt_msg": "inet: fully convert sk->sk_rx_dst to RCU rules", + "cmt_id": "0249a4b8a554f2eb6a27b62516fa50168584faa4" + }, + "CVE-2021-47102": { + "cmt_msg": "net: marvell: prestera: fix incorrect structure access", + "cmt_id": "5c553a0cd1263e4da5f220d80fa713fc3959c1d0" + }, + "CVE-2021-47105": { + "cmt_msg": "ice: xsk: return xsk buffers back to pool when cleaning the ring", + "cmt_id": "ad6d20da2cfbe14b7b1200d15f39e65988b0b9e8" + }, + "CVE-2021-47104": { + "cmt_msg": "IB/qib: Fix memory leak in qib_user_sdma_queue_pkts()", + "cmt_id": "aefcc25f3a0cd28a87d11d41d30419a12cd26a34" + }, + "CVE-2021-47107": { + "cmt_msg": "NFSD: Fix READDIR buffer overflow", + "cmt_id": "eabc0aab98e5218ceecd82069b0d6fdfff5ee885" + }, + "CVE-2021-47106": { + "cmt_msg": "netfilter: nf_tables: fix use-after-free in nft_set_catchall_destroy()", + "cmt_id": "9d558e5f0d6fdd0a568f73dceb0b40c4f5012e5a" + }, + "CVE-2021-47108": { + "cmt_msg": "drm/mediatek: hdmi: Perform NULL pointer check for mtk_hdmi_conf", + "cmt_id": "71d07ebc5000b9c1d140e99e7493b0bafa954776" }, "CVE-2022-1195": { "cmt_msg": "hamradio: improve the incomplete fix to avoid NPD", "cmt_id": "03d00f7f1815ec00dab5035851b3de83afd054a8" }, + "CVE-2021-47099": { + "cmt_msg": "veth: ensure skb entering GRO are not cloned.", + "cmt_id": "d2269ae48598e05b59ec9ea9e6e44fd33941130d" + }, + "CVE-2021-47098": { + "cmt_msg": "hwmon: (lm90) Prevent integer overflow/underflow in hysteresis calculations", + "cmt_id": "d105f30bea9104c590a9e5b495cb8a49bdfe405f" + }, + "CVE-2021-47097": { + "cmt_msg": "Input: elantech - fix stack out of bound access in elantech_change_report_id()", + "cmt_id": "dfd5b60b5342b6b505a104e48f08ad9b9bdbbd7b" + }, + "CVE-2021-47096": { + "cmt_msg": "ALSA: rawmidi - fix the uninitalized user_pversion", + "cmt_id": "b398fcbe4de1e1100867fdb6f447c6fbc8fe7085" + }, + "CVE-2021-47095": { + "cmt_msg": "ipmi: ssif: initialize ssif_info->client early", + "cmt_id": "77a7311ca167aa5b7055c549a940a56e73ee5f29" + }, + "CVE-2021-47094": { + "cmt_msg": "KVM: x86/mmu: Don't advance iterator after restart due to yielding", + "cmt_id": "d884eefd75cc54887bc2e9e724207443525dfb2c" + }, + "CVE-2021-47093": { + "cmt_msg": "platform/x86: intel_pmc_core: fix memleak on registration failure", + "cmt_id": "9ca1324755f1f8629a370af5cc315b175331f5d1" + }, + "CVE-2021-47092": { + "cmt_msg": "KVM: VMX: Always clear vmx->fail on emulation_required", + "cmt_id": "e4e4e7cb229821cd215031abc47efdab5486a67c" + }, + "CVE-2021-47091": { + "cmt_msg": "mac80211: fix locking in ieee80211_start_ap error path", + "cmt_id": "c1d1ec4db5f7264cfc21993e59e8f2dcecf4b44f" + }, + "CVE-2021-47090": { + "cmt_msg": "mm/hwpoison: clear MF_COUNT_INCREASED before retrying get_any_page()", + "cmt_id": "c691e7575eff76e563b0199c23ec46bd454f43e3" + }, + "CVE-2021-44733": { + "cmt_msg": "tee: handle lookup of shm with reference count 0", + "cmt_id": "492eb7afe858d60408b2da09adc78540c4d16543" + }, "CVE-2022-4744": { "cmt_msg": "tun: avoid double free in tun_free_netdev", "cmt_id": "3cb5ae77799e8ed6ec3fec0b6b4cd07f01650cc5" }, + "CVE-2021-45469": { + "cmt_msg": "f2fs: fix to do sanity check on last xattr entry in __f2fs_setxattr()", + "cmt_id": "a8a9d753edd7f71e6a2edaa580d8182530b68791" + }, "CVE-2021-45100": { "cmt_msg": "ksmbd: disable SMB2_GLOBAL_CAP_ENCRYPTION for SMB 3.1.1", "cmt_id": "a2c144d17623984fdafa4634ecf4ab64580d29bb" } }, "5.15.13": { + "CVE-2021-46928": { + "cmt_msg": "parisc: Clear stale IIR value on instruction access rights trap", + "cmt_id": "e96373f0a5f484bc1e193f9951dcb3adf24bf3f7" + }, + "CVE-2021-46929": { + "cmt_msg": "sctp: use call_rcu to free endpoint", + "cmt_id": "75799e71df1da11394740b43ae5686646179561d" + }, + "CVE-2021-46935": { + "cmt_msg": "binder: fix async_free_space accounting for empty parcels", + "cmt_id": "17691bada6b2f1d5f1c0f6d28cd9d0727023b0ff" + }, + "CVE-2021-46934": { + "cmt_msg": "i2c: validate user data in compat ioctl", + "cmt_id": "f68599581067e8a5a8901ba9eb270b4519690e26" + }, + "CVE-2021-46933": { + "cmt_msg": "usb: gadget: f_fs: Clear ffs_eventfd in ffs_data_clear.", + "cmt_id": "ebef2aa29f370b5096c16020c104e393192ef684" + }, + "CVE-2021-46932": { + "cmt_msg": "Input: appletouch - initialize work before device registration", + "cmt_id": "e79ff8c68acb1eddf709d3ac84716868f2a91012" + }, + "CVE-2021-46931": { + "cmt_msg": "net/mlx5e: Wrap the tx reporter dump callback to extract the sq", + "cmt_id": "07f13d58a8ecc3baf9a488588fb38c5cb0db484f" + }, + "CVE-2021-46930": { + "cmt_msg": "usb: mtu3: fix list_head check warning", + "cmt_id": "249ddfbe00570d6dc76208e88017937d4d374c79" + }, + "CVE-2021-46923": { + "cmt_msg": "fs/mount_setattr: always cleanup mount_kattr", + "cmt_id": "47b5d0a7532d39e42a938f81e3904268145c341d" + }, + "CVE-2021-46924": { + "cmt_msg": "NFC: st21nfca: Fix memory leak in device probe and remove", + "cmt_id": "238920381b8925d070d32d73cd9ce52ab29896fe" + }, + "CVE-2021-46925": { + "cmt_msg": "net/smc: fix kernel panic caused by race of smc_sock", + "cmt_id": "b85f751d71ae8e2a15e9bda98852ea9af35282eb" + }, + "CVE-2021-46926": { + "cmt_msg": "ALSA: hda: intel-sdw-acpi: harden detection of controller", + "cmt_id": "cce476954401e3421afafb25bbaa926050688b1d" + }, + "CVE-2021-46927": { + "cmt_msg": "nitro_enclaves: Use get_user_pages_unlocked() call to handle mmap assert", + "cmt_id": "90d2beed5e753805c5eab656b8d48257638fe543" + }, "CVE-2023-23006": { "cmt_msg": "net/mlx5: DR, Fix NULL vs IS_ERR checking in dr_domain_init_resources", "cmt_id": "4595dffccfa5b9360162c72cc0f6a33477d871cf" }, + "CVE-2021-46937": { + "cmt_msg": "mm/damon/dbgfs: fix 'struct pid' leaks in 'dbgfs_target_ids_write()'", + "cmt_id": "ffe4a1ba1a82c416a6b3a09d46594f6a885ae141" + }, "CVE-2022-20154": { "cmt_msg": "sctp: use call_rcu to free endpoint", "cmt_id": "75799e71df1da11394740b43ae5686646179561d" + }, + "CVE-2021-46936": { + "cmt_msg": "net: fix use-after-free in tw_timer_handler", + "cmt_id": "08eacbd141e2495d2fcdde84358a06c4f95cbb13" } }, "5.15.14": { @@ -137299,6 +179178,10 @@ "cmt_msg": "KVM: s390: Return error on SIDA memop on normal guest", "cmt_id": "14f880ea779e11a6c162f122c1199e3578e6e3f3" }, + "CVE-2022-48626": { + "cmt_msg": "moxart: fix potential use-after-free on remove path", + "cmt_id": "af0e6c49438b1596e4be8a267d218a0c88a42323" + }, "CVE-2022-0435": { "cmt_msg": "tipc: improve size validations for received domain records", "cmt_id": "1f1788616157b0222b0c2153828b475d95e374a7" @@ -137453,6 +179336,10 @@ "cmt_msg": "net/packet: fix slab-out-of-bounds access in packet_recvmsg()", "cmt_id": "a055f5f2841f7522b44a2b1eccb1951b4b03d51a" }, + "CVE-2022-48629": { + "cmt_msg": "crypto: qcom-rng - ensure buffer for generate is completely filled", + "cmt_id": "ab9337c7cb6f875b6286440b1adfbeeef2b2b2bd" + }, "CVE-2022-3107": { "cmt_msg": "hv_netvsc: Add check for kvmalloc_array", "cmt_id": "ab0ab176183191cffc69fe9dd8ac6c8db23f60d3" @@ -137855,6 +179742,10 @@ } }, "5.15.56": { + "CVE-2022-48627": { + "cmt_msg": "vt: fix memory overlapping when deleting chars in the buffer", + "cmt_id": "57964a5710252bc82fe22d9fa98c180c58c20244" + }, "CVE-2022-36123": { "cmt_msg": "x86: Clear .brk area at early boot", "cmt_id": "26bb7afc027ce6ac8ab6747babec674d55689ff0" @@ -137937,13 +179828,17 @@ "cmt_msg": "net_sched: cls_route: remove from list when handle is 0", "cmt_id": "57bbb691a93bd39d0644c5c879b354232d0e0eed" }, + "CVE-2022-20422": { + "cmt_msg": "arm64: fix oops in concurrently setting insn_emulation sysctls", + "cmt_id": "cc69ef95988b9ef2fc730ec452a7441efb90ef5e" + }, "CVE-2022-47941": { "cmt_msg": "ksmbd: fix memory leak in smb2_handle_negotiate", "cmt_id": "dd4e4c811898410e6a3ae3b63207b7c542860907" }, - "CVE-2022-20422": { - "cmt_msg": "arm64: fix oops in concurrently setting insn_emulation sysctls", - "cmt_id": "cc69ef95988b9ef2fc730ec452a7441efb90ef5e" + "CVE-2022-1679": { + "cmt_msg": "ath9k: fix use-after-free in ath9k_hif_usb_rx_cb", + "cmt_id": "03ca957c5f7b55660957eda20b5db4110319ac7a" }, "CVE-2023-20928": { "cmt_msg": "android: binder: stop saving a pointer to the VMA", @@ -137953,9 +179848,9 @@ "cmt_msg": "netfilter: nf_tables: fix null deref due to zeroed list head", "cmt_id": "8a2df34b5bf652566f2889d9fa321f3b398547ef" }, - "CVE-2022-1679": { - "cmt_msg": "ath9k: fix use-after-free in ath9k_hif_usb_rx_cb", - "cmt_id": "03ca957c5f7b55660957eda20b5db4110319ac7a" + "CVE-2019-25162": { + "cmt_msg": "i2c: Fix a potential use after free", + "cmt_id": "35927d7509ab9bf41896b7e44f639504eae08af7" }, "CVE-2022-47939": { "cmt_msg": "ksmbd: fix use-after-free bug in smb2_tree_disconect", @@ -138677,6 +180572,10 @@ "cmt_msg": "relayfs: fix out-of-bounds access in relay_file_read", "cmt_id": "0b46ee654a9dcd330e8183856b88505a9f633f7d" }, + "CVE-2023-52474": { + "cmt_msg": "IB/hfi1: Fix bugs with non-PAGE_SIZE-end multi-iovec user SDMA requests", + "cmt_id": "a2bd706ab63509793b5cd5065e685b7ef5cba678" + }, "CVE-2023-2269": { "cmt_msg": "dm ioctl: fix nested locking in table_clear() to remove deadlock concern", "cmt_id": "e11765cea2050fa25fc3e03da858e83284c5ce79" @@ -138923,6 +180822,10 @@ "cmt_msg": "drm/amdgpu: Fix potential fence use-after-free v2", "cmt_id": "ef568da1fd843581e855c79a368209b752dea2c1" }, + "CVE-2024-23196": { + "cmt_msg": "ALSA: hda: fix a possible null-pointer dereference due to data race in snd_hdac_regmap_sync()", + "cmt_id": "8703b26387e1fa4f8749db98d24c67617b873acb" + }, "CVE-2023-6546": { "cmt_msg": "tty: n_gsm: fix the UAF caused by race condition in gsm_cleanup_mux", "cmt_id": "2a523446438376bb7c224f3169ae9b98ce0fb893" @@ -138959,6 +180862,10 @@ "cmt_msg": "net/sched: sch_hfsc: Ensure inner classes have fsc curve", "cmt_id": "4cf994d3f4ff42d604fae2b461bdd5195a7dfabd" }, + "CVE-2023-52628": { + "cmt_msg": "netfilter: nftables: exthdr: fix 4-byte stack OOB write", + "cmt_id": "1ad7b189cc1411048434e8595ffcbe7873b71082" + }, "CVE-2023-42753": { "cmt_msg": "netfilter: ipset: add the missing IP_SET_HASH_WITH_NET0 macro for ip_set_hash_netportnet.c", "cmt_id": "a9e6142e5f8f6ac7d1bca45c1b2b13b084ea9e14" @@ -138999,6 +180906,14 @@ } }, "5.15.134": { + "CVE-2023-52574": { + "cmt_msg": "team: fix null-ptr-deref when team device type is changed", + "cmt_id": "cd05eec2ee0cc396813a32ef675634e403748255" + }, + "CVE-2023-52484": { + "cmt_msg": "iommu/arm-smmu-v3: Fix soft lockup triggered by arm_smmu_mm_invalidate_range", + "cmt_id": "f5a604757aa8e37ea9c7011dc9da54fa1b30f29b" + }, "CVE-2023-42754": { "cmt_msg": "ipv4: fix null-deref in ipv4_link_failure", "cmt_id": "8860d354f653628b6330e1c5b06b2828948135a4" @@ -139007,43 +180922,175 @@ "cmt_msg": "netfilter: nf_tables: don't skip expired elements during walk", "cmt_id": "7c7e658a36f8b1522bd3586d8137e5f93a25ddc5" }, + "CVE-2023-52501": { + "cmt_msg": "ring-buffer: Do not attempt to read past \"commit\"", + "cmt_id": "344f2f3e61a90f0150c754796ec9a17fcaeec03d" + }, + "CVE-2023-52500": { + "cmt_msg": "scsi: pm80xx: Avoid leaking tags when processing OPC_INB_SET_CONTROLLER_CONFIG command", + "cmt_id": "d540a4370aba378fbedf349ba0bb68e96e24243d" + }, + "CVE-2023-52482": { + "cmt_msg": "x86/srso: Add SRSO mitigation for Hygon processors", + "cmt_id": "f090a8b4d2e3ec6f318d6fdab243a2edc5a8cc37" + }, + "CVE-2023-52511": { + "cmt_msg": "spi: sun6i: reduce DMA RX transfer width to single byte", + "cmt_id": "ff05ed4ae214011464a0156f05cac1b0b46b5fbc" + }, + "CVE-2023-52516": { + "cmt_msg": "dma-debug: don't call __dma_entry_alloc_check_leak() under free_entries_lock", + "cmt_id": "ac0d068099349cbca3d93f2e3b15bb329364b08c" + }, "CVE-2023-4244": { "cmt_msg": "netfilter: nf_tables: fix GC transaction races with netns and netlink event exit path", "cmt_id": "6796800f0d8e5a892bceca7c198c115c4ca9d719" }, + "CVE-2023-52580": { + "cmt_msg": "net/core: Fix ETH_P_1588 flow dissector", + "cmt_id": "f90a7b9586d72f907092078a9f394733ca502cc9" + }, + "CVE-2023-52517": { + "cmt_msg": "spi: sun6i: fix race between DMA RX transfer completion and RX FIFO drain", + "cmt_id": "bd1ec7f9983b5cd3c77e0f7cda3fa8aed041af2f" + }, + "CVE-2023-52563": { + "cmt_msg": "drm/meson: fix memory leak on ->hpd_notify callback", + "cmt_id": "66cb6d74f5a1b6eafe3370b56bf2cb575a91acbc" + }, + "CVE-2023-52578": { + "cmt_msg": "net: bridge: use DEV_STATS_INC()", + "cmt_id": "8bc97117b51d68d5cea8f5351cca2d8c4153f394" + }, "CVE-2023-5197": { "cmt_msg": "netfilter: nf_tables: disallow rule removal from chain binding", "cmt_id": "0c5fd85fb01fa1a5dbb9f213b0d1925e671f30df" + }, + "CVE-2023-52566": { + "cmt_msg": "nilfs2: fix potential use after free in nilfs_gccache_submit_read_data()", + "cmt_id": "3936e8714907cd55e37c7cc50e50229e4a9042e8" + }, + "CVE-2023-52573": { + "cmt_msg": "net: rds: Fix possible NULL-pointer dereference", + "cmt_id": "ea82139e6e3561100d38d14401d57c0ea93fc07e" } }, "5.15.135": { - "CVE-2024-0641": { - "cmt_msg": "tipc: fix a potential deadlock on &tx->lock", - "cmt_id": "24fb22bddb71c6bfbe0fe25e1b7f793c5b580918" + "CVE-2023-52527": { + "cmt_msg": "ipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data()", + "cmt_id": "cd1189956393bf850b2e275e37411855d3bd86bb" }, "CVE-2023-34324": { "cmt_msg": "xen/events: replace evtchn_rwlock with RCU", "cmt_id": "c8af81a9d36e0d2e5f198eaceb38a743d834dfe2" }, + "CVE-2023-52523": { + "cmt_msg": "bpf, sockmap: Reject sk_msg egress redirects to non-TCP sockets", + "cmt_id": "bc8b89b6963803a123f64aa9494155a037b3d728" + }, + "CVE-2023-52522": { + "cmt_msg": "net: fix possible store tearing in neigh_periodic_work()", + "cmt_id": "147d89ee41434b97043c2dcb17a97dc151859baa" + }, + "CVE-2023-52519": { + "cmt_msg": "HID: intel-ish-hid: ipc: Disable and reenable ACPI GPE bit", + "cmt_id": "8781fe259dd5a178fdd1069401bbd1437f9491c5" + }, + "CVE-2024-0641": { + "cmt_msg": "tipc: fix a potential deadlock on &tx->lock", + "cmt_id": "24fb22bddb71c6bfbe0fe25e1b7f793c5b580918" + }, + "CVE-2023-52531": { + "cmt_msg": "wifi: iwlwifi: mvm: Fix a memory corruption issue", + "cmt_id": "7c8faa31080342aec4903c9acb20caf82fcca1ef" + }, "CVE-2023-31085": { "cmt_msg": "ubi: Refuse attaching if mtd's erasesize is 0", "cmt_id": "0ea2a63497333019bd2931975ed489216b365755" }, + "CVE-2023-52479": { + "cmt_msg": "ksmbd: fix uaf in smb20_oplock_break_ack", + "cmt_id": "694e13732e830cbbfedb562e57f28644927c33fd" + }, + "CVE-2023-52513": { + "cmt_msg": "RDMA/siw: Fix connection failure handling", + "cmt_id": "81b7bf367eea795d259d0261710c6a89f548844d" + }, + "CVE-2023-52529": { + "cmt_msg": "HID: sony: Fix a potential memory leak in sony_probe()", + "cmt_id": "bb0707fde7492121917fd9ddb43829e96ec0bb9e" + }, + "CVE-2023-52528": { + "cmt_msg": "net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg", + "cmt_id": "cda10784a176d7192f08ecb518f777a4e9575812" + }, "CVE-2023-5158": { "cmt_msg": "vringh: don't use vringh_kiov_advance() in vringh_iov_xfer()", "cmt_id": "1e69422efcc60571cc04f6c1940da848a8c2f21b" } }, "5.15.136": { + "CVE-2023-52475": { + "cmt_msg": "Input: powermate - fix use-after-free in powermate_config_complete", + "cmt_id": "6a4a396386404e62fb59bc3bde48871a64a82b4f" + }, + "CVE-2023-52477": { + "cmt_msg": "usb: hub: Guard against accesses to uninitialized BOS descriptors", + "cmt_id": "528f0ba9f7a4bc1b61c9b6eb591ff97ca37cac6b" + }, + "CVE-2023-52559": { + "cmt_msg": "iommu/vt-d: Avoid memory allocation in iommu_suspend()", + "cmt_id": "29298c85a81abdc512e87537515ed4b1a9601d0e" + }, + "CVE-2023-52509": { + "cmt_msg": "ravb: Fix use-after-free issue in ravb_tx_timeout_work()", + "cmt_id": "616761cf9df9af838c0a1a1232a69322a9eb67e6" + }, + "CVE-2023-52510": { + "cmt_msg": "ieee802154: ca8210: Fix a potential UAF in ca8210_probe", + "cmt_id": "84c6aa0ae5c4dc121f9996bb8fed46c80909d80e" + }, + "CVE-2023-52520": { + "cmt_msg": "platform/x86: think-lmi: Fix reference leak", + "cmt_id": "124cf0ea4b82e1444ec8c7420af4e7db5558c293" + }, + "CVE-2023-52504": { + "cmt_msg": "x86/alternatives: Disable KASAN in apply_alternatives()", + "cmt_id": "ecba5afe86f30605eb9dfb7f265a8de0218d4cfc" + }, + "CVE-2023-52507": { + "cmt_msg": "nfc: nci: assert requested protocol is valid", + "cmt_id": "25dd54b95abfdca423b65a4ee620a774777d8213" + }, + "CVE-2023-52515": { + "cmt_msg": "RDMA/srp: Do not call scsi_done() from srp_abort()", + "cmt_id": "b9bdffb3f9aaeff8379c83f5449c6b42cb71c2b5" + }, + "CVE-2023-52478": { + "cmt_msg": "HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect", + "cmt_id": "28ddc1e0b898291323b62d770b1b931de131a528" + }, + "CVE-2023-52503": { + "cmt_msg": "tee: amdtee: fix use-after-free vulnerability in amdtee_close_session", + "cmt_id": "1680c82929bc14d706065f123dab77f2f1293116" + }, + "CVE-2023-52502": { + "cmt_msg": "net: nfc: fix races in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn()", + "cmt_id": "d888d3f70b0de32b4f51534175f039ddab15eef8" + }, "CVE-2023-35827": { "cmt_msg": "ravb: Fix use-after-free issue in ravb_tx_timeout_work()", "cmt_id": "616761cf9df9af838c0a1a1232a69322a9eb67e6" } }, "5.15.137": { - "CVE-2023-46813": { - "cmt_msg": "x86/sev: Check for user-space IOIO pointing to kernel space", - "cmt_id": "582f7993353c7b116651f88385b1785dffa14c5d" + "CVE-2023-52499": { + "cmt_msg": "powerpc/47x: Fix 47x syscall return crash", + "cmt_id": "29017ab1a539101d9c7bec63cc13a019f97b2820" + }, + "CVE-2023-52476": { + "cmt_msg": "perf/x86/lbr: Filter vsyscall addresses", + "cmt_id": "403d201d1fd144cb249836dafb222f6375871c6c" }, "CVE-2023-46343": { "cmt_msg": "nfc: nci: fix possible NULL pointer dereference in send_acknowledge()", @@ -139052,6 +181099,14 @@ "CVE-2023-5717": { "cmt_msg": "perf: Disallow mis-matched inherited group reads", "cmt_id": "71d224acc4d1df1b61a294abee0f1032a9b03b40" + }, + "CVE-2023-52483": { + "cmt_msg": "mctp: perform route lookups under a RCU read-side lock", + "cmt_id": "6c52b12159049046483fdb0c411a0a1869c41a67" + }, + "CVE-2023-46813": { + "cmt_msg": "x86/sev: Check for user-space IOIO pointing to kernel space", + "cmt_id": "582f7993353c7b116651f88385b1785dffa14c5d" } }, "5.15.140": { @@ -139141,6 +181196,10 @@ "cmt_msg": "ksmbd: fix racy issue from session setup and logoff", "cmt_id": "708c304b583d789957399dd8237f212cf8ad1e4d" }, + "CVE-2023-52480": { + "cmt_msg": "ksmbd: fix race condition between session lookup and expire", + "cmt_id": "c77fd3e25a51ac92b0f1b347a96eff6a0b4f066f" + }, "CVE-2023-1194": { "cmt_msg": "ksmbd: fix out-of-bound read in parse_lease_state()", "cmt_id": "55ceeb4e1c71793e852c20ad01ffd31515303546" @@ -139223,21 +181282,21 @@ "cmt_msg": "binder: fix use-after-free in shinker's callback", "cmt_id": "8ad4d580e8aff8de2a4d57c5930fcc29f1ffd4a6" }, + "CVE-2023-6356": { + "cmt_msg": "nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length", + "cmt_id": "4cb3cf7177ae3666be7fb27d4ad4d72a295fb02d" + }, "CVE-2023-52458": { "cmt_msg": "block: add check that partition length needs to be aligned with block size", "cmt_id": "5010c27120962c85d2f421d2cf211791c9603503" }, - "CVE-2023-52457": { - "cmt_msg": "serial: 8250: omap: Don't skip resource freeing if pm_runtime_resume_and_get() failed", - "cmt_id": "828cd829483f0cda920710997aed79130b0af690" - }, "CVE-2023-52456": { "cmt_msg": "serial: imx: fix tx statemachine deadlock", "cmt_id": "ff168d4fdb0e1ba35fb413a749b3d6cce918ec19" }, - "CVE-2023-52454": { - "cmt_msg": "nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length", - "cmt_id": "4cb3cf7177ae3666be7fb27d4ad4d72a295fb02d" + "CVE-2023-52609": { + "cmt_msg": "binder: fix race between mmput() and do_exit()", + "cmt_id": "98fee5bee97ad47b527a997d5786410430d1f0e9" }, "CVE-2023-52451": { "cmt_msg": "powerpc/pseries/memhp: Fix access beyond end of drmem array", @@ -139247,6 +181306,18 @@ "cmt_msg": "f2fs: explicitly null-terminate the xattr list", "cmt_id": "32a6cfc67675ee96fe107aeed5af9776fec63f11" }, + "CVE-2023-52454": { + "cmt_msg": "nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length", + "cmt_id": "4cb3cf7177ae3666be7fb27d4ad4d72a295fb02d" + }, + "CVE-2023-52470": { + "cmt_msg": "drm/radeon: check the alloc_workqueue return value in radeon_crtc_init()", + "cmt_id": "14bbfaa5df273b26cde6707f6e655585700e6fe1" + }, + "CVE-2023-52612": { + "cmt_msg": "crypto: scomp - fix req->dst buffer overflow", + "cmt_id": "a5f2f91b3fd7387e5102060809316a0f8f0bc625" + }, "CVE-2024-1085": { "cmt_msg": "netfilter: nf_tables: check if catch-all set element is active in next generation", "cmt_id": "c9ed30eea4f7bfa2441235ce23abd339ee671f50" @@ -139271,10 +181342,18 @@ "cmt_msg": "Bluetooth: Fix atomicity violation in {min,max}_key_size_set", "cmt_id": "4c71c01df8ef209e7fe22b58666cd2cf3dbafb44" }, + "CVE-2023-52610": { + "cmt_msg": "net/sched: act_ct: fix skb leak and crash on ooo frags", + "cmt_id": "172ba7d46c202e679f3ccb10264c67416aaeb1c4" + }, "CVE-2023-52463": { "cmt_msg": "efivarfs: force RO when remounting if SetVariable is not supported", "cmt_id": "2aa141f8bc580f8f9811dfe4e0e6009812b73826" }, + "CVE-2023-52467": { + "cmt_msg": "mfd: syscon: Fix null pointer dereference in of_syscon_register()", + "cmt_id": "c3e3a2144bf50877551138ffce9f7aa6ddfe385b" + }, "CVE-2023-52464": { "cmt_msg": "EDAC/thunderx: Fix possible out-of-bounds string access", "cmt_id": "700cf4bead80fac994dcc43ae1ca5d86d8959b21" @@ -139298,55 +181377,614 @@ "CVE-2023-52449": { "cmt_msg": "mtd: Fix gluebi NULL pointer dereference caused by ftl notifier", "cmt_id": "d8ac2537763b54d278b80b2b080e1652523c7d4c" + }, + "CVE-2023-52469": { + "cmt_msg": "drivers/amd/pm: fix a use-after-free in kv_parse_power_table", + "cmt_id": "b6dcba02ee178282e0d28684d241e0b8462dea6a" + }, + "CVE-2023-6536": { + "cmt_msg": "nvmet-tcp: fix a crash in nvmet_req_complete()", + "cmt_id": "0613a2fbdf8d32c3f8f1e62d704e92251a100795" + }, + "CVE-2024-26633": { + "cmt_msg": "ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim()", + "cmt_id": "4329426cf6b8e22b798db2331c7ef1dd2a9c748d" + }, + "CVE-2024-26631": { + "cmt_msg": "ipv6: mcast: fix data-race in ipv6_mc_down / mld_ifc_work", + "cmt_id": "62b3387beef11738eb6ce667601a28fa089fa02c" } }, "5.15.149": { - "CVE-2024-26592": { - "cmt_msg": "ksmbd: fix UAF issue in ksmbd_tcp_new_connection()", - "cmt_id": "999daf367b924fdf14e9d83e034ee0f86bc17ec6" + "CVE-2024-26676": { + "cmt_msg": "af_unix: Call kfree_skb() for dead unix_(sk)->oob_skb in GC.", + "cmt_id": "4fe505c63aa3273135a57597fda761e9aecc7668" }, - "CVE-2024-26593": { - "cmt_msg": "i2c: i801: Fix block process call transactions", - "cmt_id": "1f8d0691c50581ba6043f009ec9e8b9f78f09d5a" + "CVE-2024-26675": { + "cmt_msg": "ppp_async: limit MRU to 64K", + "cmt_id": "58fbe665b097bf7b3144da7e7b91fb27aa8d0ae3" }, - "CVE-2024-1151": { - "cmt_msg": "net: openvswitch: limit the number of recursions from action sets", - "cmt_id": "c45f2fa92cb273f77be33b60a120ff7cf6df8085" + "CVE-2024-26673": { + "cmt_msg": "netfilter: nft_ct: sanitize layer 3 and 4 protocol number in custom expectations", + "cmt_id": "b775ced05489f4b77a35fe203e9aeb22f428e38f" }, - "CVE-2024-26594": { - "cmt_msg": "ksmbd: validate mech token in session setup", - "cmt_id": "dd1de9268745f0eac83a430db7afc32cbd62e84b" + "CVE-2024-26671": { + "cmt_msg": "blk-mq: fix IO hang from sbitmap wakeup race", + "cmt_id": "89e0e66682e1538aeeaa3109503473663cd24c8b" + }, + "CVE-2024-26679": { + "cmt_msg": "inet: read sk->sk_family once in inet_recv_error()", + "cmt_id": "3266e638ba5cc1165f5e6989eb8c0720f1cc4b41" + }, + "CVE-2023-52615": { + "cmt_msg": "hwrng: core - Fix page fault dead lock on mmap-ed hwrng", + "cmt_id": "26cc6d7006f922df6cc4389248032d955750b2a0" + }, + "CVE-2023-52614": { + "cmt_msg": "PM / devfreq: Fix buffer overflow in trans_stat_show", + "cmt_id": "796d3fad8c35ee9df9027899fb90ceaeb41b958f" + }, + "CVE-2023-52617": { + "cmt_msg": "PCI: switchtec: Fix stdev_release() crash after surprise hot remove", + "cmt_id": "ff1c7e2fb9e9c3f53715fbe04d3ac47b80be7eb8" + }, + "CVE-2023-52616": { + "cmt_msg": "crypto: lib/mpi - Fix unexpected pointer access in mpi_ec_init", + "cmt_id": "2bb86817b33c9d704e127f92b838035a72c315b6" }, "CVE-2024-1086": { "cmt_msg": "netfilter: nf_tables: reject QUEUE/DROP verdict parameters", "cmt_id": "960cf4f812530f01f6acc6878ceaa5404c06af7b" }, + "CVE-2023-52619": { + "cmt_msg": "pstore/ram: Fix crash when setting number of cpus to an odd number", + "cmt_id": "2a37905d47bffec61e95d99f0c1cc5dc6377956c" + }, + "CVE-2023-52618": { + "cmt_msg": "block/rnbd-srv: Check for unlikely string overflow", + "cmt_id": "f6abd5e17da33eba15df2bddc93413e76c2b55f7" + }, + "CVE-2024-26702": { + "cmt_msg": "iio: magnetometer: rm3100: add boundary check for the value read from RM3100_REG_TMRC", + "cmt_id": "8d5838a473e8e6d812257c69745f5920e4924a60" + }, + "CVE-2024-26707": { + "cmt_msg": "net: hsr: remove WARN_ONCE() in send_hsr_supervision_frame()", + "cmt_id": "de769423b2f053182a41317c4db5a927e90622a0" + }, + "CVE-2024-26704": { + "cmt_msg": "ext4: fix double-free of blocks due to wrong extents moved_len", + "cmt_id": "afba9d11320dad5ce222ac8964caf64b7b4bedb1" + }, + "CVE-2024-26602": { + "cmt_msg": "sched/membarrier: reduce the ability to hammer on sys_membarrier", + "cmt_id": "50fb4e17df319bb33be6f14e2a856950c1577dee" + }, + "CVE-2024-26600": { + "cmt_msg": "phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP", + "cmt_id": "8cc889b9dea0579726be9520fcc766077890b462" + }, + "CVE-2024-26606": { + "cmt_msg": "binder: signal epoll threads of self-work", + "cmt_id": "82722b453dc2f967b172603e389ee7dc1b3137cc" + }, + "CVE-2024-26608": { + "cmt_msg": "ksmbd: fix global oob in ksmbd_nl_policy", + "cmt_id": "aaa1f1a2ee80888c12ae2783f3a0be10e14067c5" + }, "CVE-2023-52429": { "cmt_msg": "dm: limit the number of targets and parameter size area", "cmt_id": "888a0a46b80fa37eacfe81faf47ba0b83876251d" }, - "CVE-2024-0340": { - "cmt_msg": "vhost: use kzalloc() instead of kmalloc() followed by memset()", - "cmt_id": "be38f291fd4d106be66370debd23d625c576023e" + "CVE-2023-52622": { + "cmt_msg": "ext4: avoid online resizing failures due to oversized flex bg", + "cmt_id": "d76c8d7ffe163c6bf2f1ef680b0539c2b3902b90" }, - "CVE-2024-23851": { - "cmt_msg": "dm: limit the number of targets and parameter size area", - "cmt_id": "888a0a46b80fa37eacfe81faf47ba0b83876251d" + "CVE-2023-52623": { + "cmt_msg": "SUNRPC: Fix a suspicious RCU usage warning", + "cmt_id": "f8cf4dabbdcb8bef85335b0ed7ad5b25fd82ff56" + }, + "CVE-2023-52627": { + "cmt_msg": "iio: adc: ad7091r: Allow users to configure device events", + "cmt_id": "49f322ce1f265935f15e5512da69a399f27a5091" }, "CVE-2024-23850": { "cmt_msg": "btrfs: do not ASSERT() if the newly created subvolume already got read", "cmt_id": "e31546b0f34af21738c4ceac47d662c00ee6382f" }, - "CVE-2024-23849": { - "cmt_msg": "net/rds: Fix UBSAN: array-index-out-of-bounds in rds_cmsg_recv", - "cmt_id": "00d1ee8e1d02194f7b7b433e904e04bbcd2cc0dc" + "CVE-2024-23851": { + "cmt_msg": "dm: limit the number of targets and parameter size area", + "cmt_id": "888a0a46b80fa37eacfe81faf47ba0b83876251d" + }, + "CVE-2024-26592": { + "cmt_msg": "ksmbd: fix UAF issue in ksmbd_tcp_new_connection()", + "cmt_id": "999daf367b924fdf14e9d83e034ee0f86bc17ec6" + }, + "CVE-2024-26593": { + "cmt_msg": "i2c: i801: Fix block process call transactions", + "cmt_id": "1f8d0691c50581ba6043f009ec9e8b9f78f09d5a" + }, + "CVE-2024-26615": { + "cmt_msg": "net/smc: fix illegal rmb_desc access in SMC-D connection dump", + "cmt_id": "68b888d51ac82f2b96bf5e077a31d76afcdef25a" + }, + "CVE-2024-26614": { + "cmt_msg": "tcp: make sure init the accept_queue's spinlocks once", + "cmt_id": "d86cc6ab33b085eaef27ea88b78fc8e2375c0ef3" + }, + "CVE-2024-26594": { + "cmt_msg": "ksmbd: validate mech token in session setup", + "cmt_id": "dd1de9268745f0eac83a430db7afc32cbd62e84b" + }, + "CVE-2023-52638": { + "cmt_msg": "can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock", + "cmt_id": "03358aba991668d3bb2c65b3c82aa32c36851170" + }, + "CVE-2023-52637": { + "cmt_msg": "can: j1939: Fix UAF in j1939_sk_match_filter during setsockopt(SO_J1939_FILTER)", + "cmt_id": "41ccb5bcbf03f02d820bc6ea8390811859f558f8" + }, + "CVE-2023-52635": { + "cmt_msg": "PM / devfreq: Synchronize devfreq_monitor_[start/stop]", + "cmt_id": "099f6a9edbe30b142c1d97fe9a4748601d995675" }, "CVE-2023-52435": { "cmt_msg": "net: prevent mss overflow in skb_segment()", "cmt_id": "6c53e8547687d9c767c139cd4b50af566f58c29a" + }, + "CVE-2023-52631": { + "cmt_msg": "fs/ntfs3: Fix an NULL dereference bug", + "cmt_id": "ae4acad41b0f93f1c26cc0fc9135bb79d8282d0b" + }, + "CVE-2023-52630": { + "cmt_msg": "blk-iocost: Fix an UBSAN shift-out-of-bounds warning", + "cmt_id": "1e4d3f8bd880e02932a9ea179f90bfa74fd2e899" + }, + "CVE-2024-26689": { + "cmt_msg": "ceph: prevent use-after-free in encode_cap_msg()", + "cmt_id": "70e329b440762390258a6fe8c0de93c9fdd56c77" + }, + "CVE-2024-26684": { + "cmt_msg": "net: stmmac: xgmac: fix handling of DPP safety error for DMA channels", + "cmt_id": "6609e98ed82966a1b3168c142aca30f8284a7b89" + }, + "CVE-2024-26685": { + "cmt_msg": "nilfs2: fix potential bug in end_buffer_async_write", + "cmt_id": "8fa90634ec3e9cc50f42dd605eec60f2d146ced8" + }, + "CVE-2024-23849": { + "cmt_msg": "net/rds: Fix UBSAN: array-index-out-of-bounds in rds_cmsg_recv", + "cmt_id": "00d1ee8e1d02194f7b7b433e904e04bbcd2cc0dc" + }, + "CVE-2024-26698": { + "cmt_msg": "hv_netvsc: Fix race condition between netvsc_probe and netvsc_remove", + "cmt_id": "7656372ae190e54e8c8cf1039725a5ea59fdf84a" + }, + "CVE-2023-52489": { + "cmt_msg": "mm/sparsemem: fix race in accessing memory_section->usage", + "cmt_id": "b448de2459b6d62a53892487ab18b7d823ff0529" + }, + "CVE-2023-52486": { + "cmt_msg": "drm: Don't unref the same fb many times by mistake due to deadlock handling", + "cmt_id": "b4af63da9d94986c529d74499fdfe44289acd551" + }, + "CVE-2024-26697": { + "cmt_msg": "nilfs2: fix data corruption in dsync block recovery for small block sizes", + "cmt_id": "120f7fa2008e3bd8b7680b4ab5df942decf60fd5" + }, + "CVE-2024-26696": { + "cmt_msg": "nilfs2: fix hang in nilfs_lookup_dirty_data_buffers()", + "cmt_id": "7e9b622bd0748cc104d66535b76d9b3535f9dc0f" + }, + "CVE-2024-26610": { + "cmt_msg": "wifi: iwlwifi: fix a memory corruption", + "cmt_id": "99a23462fe1a6f709f0fda3ebbe8b6b193ac75bd" + }, + "CVE-2023-52498": { + "cmt_msg": "PM: sleep: Fix possible deadlocks in core system-wide PM code", + "cmt_id": "a1d62c775b07213c73f81ae842424c74dd14b5f0" + }, + "CVE-2023-52493": { + "cmt_msg": "bus: mhi: host: Drop chan lock before queuing buffers", + "cmt_id": "6e4c84316e2b70709f0d00c33ba3358d9fc8eece" + }, + "CVE-2023-52492": { + "cmt_msg": "dmaengine: fix NULL pointer in channel unregistration function", + "cmt_id": "047fce470412ab64cb7345f9ff5d06919078ad79" + }, + "CVE-2023-52491": { + "cmt_msg": "media: mtk-jpeg: Fix use after free bug due to error path handling in mtk_jpeg_dec_device_run", + "cmt_id": "1b1036c60a37a30caf6759a90fe5ecd06ec35590" + }, + "CVE-2023-52494": { + "cmt_msg": "bus: mhi: host: Add alignment check for event ring read pointer", + "cmt_id": "94991728c84f8df54fd9eec9b85855ef9057ea08" + }, + "CVE-2024-26625": { + "cmt_msg": "llc: call sock_orphan() at release time", + "cmt_id": "dbc1b89981f9c5360277071d33d7f04a43ffda4a" + }, + "CVE-2024-26627": { + "cmt_msg": "scsi: core: Move scsi_host_busy() out of host lock for waking up EH handler", + "cmt_id": "d37c1c81419fdef66ebd0747cf76fb8b7d979059" + }, + "CVE-2024-26720": { + "cmt_msg": "mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again", + "cmt_id": "5099871b370335809c0fd1abad74d9c7c205d43f" + }, + "CVE-2024-26727": { + "cmt_msg": "btrfs: do not ASSERT() if the newly created subvolume already got read", + "cmt_id": "e31546b0f34af21738c4ceac47d662c00ee6382f" + }, + "CVE-2024-26644": { + "cmt_msg": "btrfs: don't abort filesystem when attempting to snapshot deleted subvolume", + "cmt_id": "0877497dc97834728e1b528ddf1e1c484292c29c" + }, + "CVE-2024-26645": { + "cmt_msg": "tracing: Ensure visibility when inserting an element into tracing_map", + "cmt_id": "aef1cb00856ccfd614467cfb50b791278992e177" + }, + "CVE-2024-26640": { + "cmt_msg": "tcp: add sanity checks to rx zerocopy", + "cmt_id": "718f446e60316bf606946f7f42367d691d21541e" + }, + "CVE-2024-26641": { + "cmt_msg": "ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv()", + "cmt_id": "af6b5c50d47ab43e5272ad61935d0ed2e264d3f0" + }, + "CVE-2023-52597": { + "cmt_msg": "KVM: s390: fix setting of fpc register", + "cmt_id": "732a3bea7aba5b15026ea42d14953c3425cc7dc2" + }, + "CVE-2023-52594": { + "cmt_msg": "wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus()", + "cmt_id": "9003fa9a0198ce004b30738766c67eb7373479c9" + }, + "CVE-2023-52595": { + "cmt_msg": "wifi: rt2x00: restart beacon queue when hardware reset", + "cmt_id": "4cc198580a7b93a36f5beb923f40f7ae27a3716c" + }, + "CVE-2023-52598": { + "cmt_msg": "s390/ptrace: handle setting of fpc register correctly", + "cmt_id": "28a1f492cb527f64593457a0a0f0d809b3f36c25" + }, + "CVE-2023-52599": { + "cmt_msg": "jfs: fix array-index-out-of-bounds in diNewExt", + "cmt_id": "6aa30020879042d46df9f747e4f0a486eea6fe98" + }, + "CVE-2024-0340": { + "cmt_msg": "vhost: use kzalloc() instead of kmalloc() followed by memset()", + "cmt_id": "be38f291fd4d106be66370debd23d625c576023e" + }, + "CVE-2024-26636": { + "cmt_msg": "llc: make llc_ui_sendmsg() more robust against bonding changes", + "cmt_id": "c22044270da68881074fda81a7d34812726cb249" + }, + "CVE-2024-26635": { + "cmt_msg": "llc: Drop support for ETH_P_TR_802_2.", + "cmt_id": "c0fe2fe7a5a291dfcf6dc64301732c8d3dc6a828" + }, + "CVE-2024-1151": { + "cmt_msg": "net: openvswitch: limit the number of recursions from action sets", + "cmt_id": "c45f2fa92cb273f77be33b60a120ff7cf6df8085" + }, + "CVE-2023-52587": { + "cmt_msg": "IB/ipoib: Fix mcast list locking", + "cmt_id": "ed790bd0903ed3352ebf7f650d910f49b7319b34" + }, + "CVE-2023-52583": { + "cmt_msg": "ceph: fix deadlock or deadcode of misusing dget()", + "cmt_id": "a9c15d6e8aee074fae66c04d114f20b84274fcca" + }, + "CVE-2023-52588": { + "cmt_msg": "f2fs: fix to tag gcing flag on page during block migration", + "cmt_id": "7ea0f29d9fd84905051be020c0df7d557e286136" + }, + "CVE-2023-52633": { + "cmt_msg": "um: time-travel: fix time corruption", + "cmt_id": "0c7478a2da3f5fe106b4658338873d50c86ac7ab" + }, + "CVE-2024-26668": { + "cmt_msg": "netfilter: nft_limit: reject configurations that cause integer overflow", + "cmt_id": "79d4efd75e7dbecd855a3b8a63e65f7265f466e1" + }, + "CVE-2024-26660": { + "cmt_msg": "drm/amd/display: Implement bounds check for stream encoder creation in DCN301", + "cmt_id": "42442f74314d41ddc68227047036fa3e78940054" + }, + "CVE-2024-26663": { + "cmt_msg": "tipc: Check the bearer type before calling tipc_udp_nl_bearer_add()", + "cmt_id": "c1701ea85ef0ec7be6a1b36c7da69f572ed2fd12" + }, + "CVE-2024-26664": { + "cmt_msg": "hwmon: (coretemp) Fix out-of-bounds memory access", + "cmt_id": "a16afec8e83c56b14a4a73d2e3fb8eec3a8a057e" + }, + "CVE-2024-26665": { + "cmt_msg": "tunnels: fix out of bounds access when building IPv6 PMTU error", + "cmt_id": "d964dd1bc1452594b4207d9229c157d9386e5d8a" + }, + "CVE-2024-26808": { + "cmt_msg": "netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain", + "cmt_id": "70f17b48c86622217a58d5099d29242fc9adac58" + }, + "CVE-2023-52606": { + "cmt_msg": "powerpc/lib: Validate size for vector operations", + "cmt_id": "de4f5ed63b8a199704d8cdcbf810309d7eb4b36b" + }, + "CVE-2023-52607": { + "cmt_msg": "powerpc/mm: Fix null-pointer dereference in pgtable_cache_add", + "cmt_id": "ac3ed969a40357b0542d20f096a6d43acdfa6cc7" + }, + "CVE-2023-52604": { + "cmt_msg": "FS:JFS:UBSAN:array-index-out-of-bounds in dbAdjTree", + "cmt_id": "6fe8b702125aeee6ce83f20092a2341446704e7b" + }, + "CVE-2023-52602": { + "cmt_msg": "jfs: fix slab-out-of-bounds Read in dtSearch", + "cmt_id": "6c6a96c3d74df185ee344977d46944d6f33bb4dd" + }, + "CVE-2023-52603": { + "cmt_msg": "UBSAN: array-index-out-of-bounds in dtSplitRoot", + "cmt_id": "e4ce01c25ccbea02a09a5291c21749b1fc358e39" + }, + "CVE-2023-52600": { + "cmt_msg": "jfs: fix uaf in jfs_evict_inode", + "cmt_id": "8e44dc3f96e903815dab1d74fff8faafdc6feb61" + }, + "CVE-2023-52601": { + "cmt_msg": "jfs: fix array-index-out-of-bounds in dbAdjTree", + "cmt_id": "8393c80cce45f40c1256d72e21ad351b3650c57e" + }, + "CVE-2023-52608": { + "cmt_msg": "firmware: arm_scmi: Check mailbox/SMT channel for consistency", + "cmt_id": "614cc65032dcb0b64d23f5c5e338a8a04b12be5d" + }, + "CVE-2024-26715": { + "cmt_msg": "usb: dwc3: gadget: Fix NULL pointer dereference in dwc3_gadget_suspend", + "cmt_id": "88936ceab6b426f1312327e9ef849c215c6007a7" + }, + "CVE-2024-26717": { + "cmt_msg": "HID: i2c-hid-of: fix NULL-deref on failed power up", + "cmt_id": "62f5d219edbd174829aa18d4b3d97cd5fefbb783" + }, + "CVE-2024-26712": { + "cmt_msg": "powerpc/kasan: Fix addr error caused by page alignment", + "cmt_id": "2738e0aa2fb24a7ab9c878d912dc2b239738c6c6" + } + }, + "5.15.150": { + "CVE-2024-26733": { + "cmt_msg": "arp: Prevent overflow in arp_req_get().", + "cmt_id": "97eaa2955db4120ce6ec2ef123e860bc32232c50" + }, + "CVE-2024-26736": { + "cmt_msg": "afs: Increase buffer size in afs_update_volume_status()", + "cmt_id": "e56662160fc24d28cb75ac095cc6415ae1bda43e" + }, + "CVE-2024-26737": { + "cmt_msg": "bpf: Fix racing between bpf_timer_cancel_and_free and bpf_timer_cancel", + "cmt_id": "5268bb02107b9eedfdcd51db75b407d10043368c" + }, + "CVE-2024-26778": { + "cmt_msg": "fbdev: savage: Error out if pixclock equals zero", + "cmt_id": "8c54acf33e5adaad6374bf3ec1e3aff0591cc8e1" + }, + "CVE-2024-26735": { + "cmt_msg": "ipv6: sr: fix possible use-after-free and null-ptr-deref", + "cmt_id": "91b020aaa1e59bfb669d34c968e3db3d5416bcee" + }, + "CVE-2024-26776": { + "cmt_msg": "spi: hisi-sfc-v3xx: Return IRQ_NONE if no interrupts were detected", + "cmt_id": "0399d7eba41d9b28f5bdd7757ec21a5b7046858d" + }, + "CVE-2024-26751": { + "cmt_msg": "ARM: ep93xx: Add terminator to gpiod_lookup_table", + "cmt_id": "eec6cbbfa1e8d685cc245cfd5626d0715a127a48" + }, + "CVE-2024-26752": { + "cmt_msg": "l2tp: pass correct message length to ip6_append_data", + "cmt_id": "0da15a70395182ee8cb75716baf00dddc0bea38d" + }, + "CVE-2024-26754": { + "cmt_msg": "gtp: fix use-after-free and null-ptr-deref in gtp_genl_dump_pdp()", + "cmt_id": "a576308800be28f2eaa099e7caad093b97d66e77" + }, + "CVE-2024-26773": { + "cmt_msg": "ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found()", + "cmt_id": "4c21fa60a6f4606f6214a38f50612b17b2f738f5" + }, + "CVE-2024-26771": { + "cmt_msg": "dmaengine: ti: edma: Add some null pointer checks to the edma_probe", + "cmt_id": "4fe4e5adc7d29d214c59b59f61db73dec505ca3d" + }, + "CVE-2024-26744": { + "cmt_msg": "RDMA/srpt: Support specifying the srpt_service_guid parameter", + "cmt_id": "989af2f29342a9a7c7515523d879b698ac8465f4" + }, + "CVE-2024-26769": { + "cmt_msg": "nvmet-fc: avoid deadlock on delete association path", + "cmt_id": "5e0bc09a52b6169ce90f7ac6e195791adb16cec4" + }, + "CVE-2023-52434": { + "cmt_msg": "smb: client: fix potential OOBs in smb2_parse_contexts()", + "cmt_id": "890bc4fac3c0973a49cac35f634579bebba7fe48" + }, + "CVE-2024-26779": { + "cmt_msg": "wifi: mac80211: fix race condition on enabling fast-xmit", + "cmt_id": "88c18fd06608b3adee547102505d715f21075c9d" + }, + "CVE-2023-52497": { + "cmt_msg": "erofs: fix lz4 inplace decompression", + "cmt_id": "77cbc04a1a8610e303a0e0d74f2676667876a184" + }, + "CVE-2024-26777": { + "cmt_msg": "fbdev: sis: Error out if pixclock equals zero", + "cmt_id": "df6e2088c6f4cad539cf67cba2d6764461e798d1" + }, + "CVE-2024-26774": { + "cmt_msg": "ext4: avoid dividing by 0 in mb_update_avg_fragment_size() when block bitmap corrupt", + "cmt_id": "687061cfaa2ac3095170e136dd9c29a4974f41d4" + }, + "CVE-2024-26747": { + "cmt_msg": "usb: roles: fix NULL pointer issue when put module's reference", + "cmt_id": "ef982fc41055fcebb361a92288d3225783d12913" + }, + "CVE-2024-26603": { + "cmt_msg": "x86/fpu: Stop relying on userspace for info to fault in xsave buffer", + "cmt_id": "8bd3eee7720c14b59a206bd05b98d7586bccf99a" + }, + "CVE-2024-26601": { + "cmt_msg": "ext4: regenerate buddy after block freeing failed if under fc replay", + "cmt_id": "c1317822e2de80e78f137d3a2d99febab1b80326" + }, + "CVE-2024-26743": { + "cmt_msg": "RDMA/qedr: Fix qedr_create_user_qp error flow", + "cmt_id": "135e5465fefa463c5ec93c4eede48b9fedac894a" + }, + "CVE-2024-26764": { + "cmt_msg": "fs/aio: Restrict kiocb_set_cancel_fn() to I/O submitted via libaio", + "cmt_id": "d7b6fa97ec894edd02f64b83e5e72e1aa352f353" + }, + "CVE-2024-26766": { + "cmt_msg": "IB/hfi1: Fix sdma.h tx->num_descs off-by-one error", + "cmt_id": "47ae64df23ed1318e27bd9844e135a5e1c0e6e39" + }, + "CVE-2024-26749": { + "cmt_msg": "usb: cdns3: fixed memory use after free at cdns3_gadget_ep_disable()", + "cmt_id": "4e5c73b15d95452c1ba9c771dd013a3fbe052ff3" + }, + "CVE-2024-26748": { + "cmt_msg": "usb: cdns3: fix memory double free when handle zero packet", + "cmt_id": "3a2a909942b5335b7ea66366d84261b3ed5f89c8" + }, + "CVE-2024-26763": { + "cmt_msg": "dm-crypt: don't modify the data when using authenticated encryption", + "cmt_id": "1a4371db68a31076afbe56ecce34fbbe6c80c529" + }, + "CVE-2023-52640": { + "cmt_msg": "fs/ntfs3: Fix oob in ntfs_listxattr", + "cmt_id": "a585faf0591548fe0920641950ebfa8a6eefe1cd" + }, + "CVE-2023-52641": { + "cmt_msg": "fs/ntfs3: Add NULL ptr dereference checking at the end of attr_allocate_frame()", + "cmt_id": "ee8db6475cb15c8122855f72ad4cfa5375af6a7b" + }, + "CVE-2024-0565": { + "cmt_msg": "smb: client: fix OOB in receive_encrypted_standard()", + "cmt_id": "858e73ff25639a0cc1f6f8d2587b62c045867e41" + }, + "CVE-2024-26772": { + "cmt_msg": "ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal()", + "cmt_id": "8de8305a25bfda607fc13475ebe84b978c96d7ff" + } + }, + "5.15.151": { + "CVE-2023-52620": { + "cmt_msg": "netfilter: nf_tables: disallow timeout for anonymous sets", + "cmt_id": "00b19ee0dcc1aef06294471ab489bae26d94524e" + }, + "CVE-2024-26782": { + "cmt_msg": "mptcp: fix double-free on socket dismantle", + "cmt_id": "4a4eeb6912538c2d0b158e8d11b62d96c1dada4e" + }, + "CVE-2024-26688": { + "cmt_msg": "fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super", + "cmt_id": "22850c9950a4e43a67299755d11498f3292d02ff" + }, + "CVE-2024-26790": { + "cmt_msg": "dmaengine: fsl-qdma: fix SoC may hang on 16 byte unaligned read", + "cmt_id": "106c1ac953a66556ec77456c46e818208d3a9bce" + }, + "CVE-2024-26791": { + "cmt_msg": "btrfs: dev-replace: properly validate device names", + "cmt_id": "ab2d68655d0f04650bef09fee948ff80597c5fb9" + }, + "CVE-2024-26793": { + "cmt_msg": "gtp: fix use-after-free and null-ptr-deref in gtp_newlink()", + "cmt_id": "9376d059a705c5dfaac566c2d09891242013ae16" + }, + "CVE-2024-26788": { + "cmt_msg": "dmaengine: fsl-qdma: init irq after reg initialization", + "cmt_id": "4529c084a320be78ff2c5e64297ae998c6fdf66b" + }, + "CVE-2024-26798": { + "cmt_msg": "fbcon: always restore the old font data in fbcon_do_set_font()", + "cmt_id": "20a4b5214f7bee13c897477168c77bbf79683c3d" + }, + "CVE-2024-26804": { + "cmt_msg": "net: ip_tunnel: prevent perpetual headroom growth", + "cmt_id": "afec0c5cd2ed71ca95a8b36a5e6d03333bf34282" + }, + "CVE-2024-26795": { + "cmt_msg": "riscv: Sparse-Memory/vmemmap out-of-bounds fix", + "cmt_id": "5941a90c55d3bfba732b32208d58d997600b44ef" + }, + "CVE-2024-0841": { + "cmt_msg": "fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super", + "cmt_id": "22850c9950a4e43a67299755d11498f3292d02ff" + }, + "CVE-2024-26802": { + "cmt_msg": "stmmac: Clear variable when destroying workqueue", + "cmt_id": "8e99556301172465c8fe33c7f78c39a3d4ce8462" + }, + "CVE-2024-26805": { + "cmt_msg": "netlink: Fix kernel-infoleak-after-free in __skb_datagram_iter", + "cmt_id": "c71ed29d15b1a1ed6c464f8c3536996963046285" + }, + "CVE-2024-26801": { + "cmt_msg": "Bluetooth: Avoid potential use-after-free in hci_error_reset", + "cmt_id": "da4569d450b193e39e87119fd316c0291b585d14" + }, + "CVE-2024-26622": { + "cmt_msg": "tomoyo: fix UAF write bug in tomoyo_write_control()", + "cmt_id": "7d930a4da17958f869ef679ee0e4a8729337affc" + }, + "CVE-2024-26803": { + "cmt_msg": "net: veth: clear GRO when clearing XDP even when down", + "cmt_id": "f011c103e654d83dc85f057a7d1bd0960d02831c" + } + }, + "5.15.152": { + "CVE-2024-26787": { + "cmt_msg": "mmc: mmci: stm32: fix DMA API overlapping mappings warning", + "cmt_id": "5ae5060e17a3fc38e54c3e5bd8abd6b1d5bfae7c" + }, + "CVE-2024-26659": { + "cmt_msg": "xhci: handle isoc Babble and Buffer Overrun events properly", + "cmt_id": "2aa7bcfdbb46241c701811bbc0d64d7884e3346c" + } + }, + "5.15.153": { + "CVE-2023-7042": { + "cmt_msg": "wifi: ath10k: fix NULL pointer dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev()", + "cmt_id": "4c4e592266b6eec748ce90e82bd9cbc9838f3633" + }, + "CVE-2023-52447": { + "cmt_msg": "bpf: Defer the free of inner map when necessary", + "cmt_id": "37d98fb9c3144c0fddf7f6e99aece9927ac8dce6" + }, + "CVE-2024-26651": { + "cmt_msg": "sr9800: Add check for usbnet_get_endpoints", + "cmt_id": "276873ae26c8d75b00747c1dadb9561d6ef20581" + }, + "CVE-2024-26809": { + "cmt_msg": "netfilter: nft_set_pipapo: release elements in clone only from destroy path", + "cmt_id": "362508506bf545e9ce18c72a2c48dcbfb891ab9c" + }, + "CVE-2023-6270": { + "cmt_msg": "aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts", + "cmt_id": "7dd09fa80b0765ce68bfae92f4e2f395ccf0fba4" + }, + "CVE-2024-22099": { + "cmt_msg": "Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security", + "cmt_id": "8d1753973f598531baaa2c1033cf7f7b5bb004b0" } }, "outstanding": { + "CVE-2024-26677": { + "cmt_msg": "rxrpc: Fix delayed ACKs to not set the reference serial number" + }, "CVE-2020-26556": { "cmt_msg": "" }, @@ -139365,18 +182003,36 @@ "CVE-2023-4010": { "cmt_msg": "" }, + "CVE-2024-26770": { + "cmt_msg": "HID: nvidia-shield: Add missing null pointer checks to LED initialization" + }, "CVE-2022-38457": { "cmt_msg": "drm/vmwgfx: Remove rcu locks from user resources" }, + "CVE-2024-26661": { + "cmt_msg": "drm/amd/display: Add NULL test for 'timing generator' in 'dcn21_set_pipe()'" + }, "CVE-2018-1121": { "cmt_msg": "" }, + "CVE-2023-28746": { + "cmt_msg": "x86/mmio: Disable KVM mitigation when X86_FEATURE_CLEAR_CPU_BUF is set" + }, "CVE-2023-52452": { "cmt_msg": "bpf: Fix accesses to uninit stack slots" }, + "CVE-2024-26672": { + "cmt_msg": "drm/amdgpu: Fix variable 'mca_funcs' dereferenced before NULL check in 'amdgpu_mca_smu_get_mca_entry()'" + }, "CVE-2019-19378": { "cmt_msg": "" }, + "CVE-2024-26784": { + "cmt_msg": "pmdomain: arm: Fix NULL dereference on scmi_perf_domain removal" + }, + "CVE-2024-26789": { + "cmt_msg": "crypto: arm64/neonbs - fix out-of-bounds access on short input" + }, "CVE-2022-0998": { "cmt_msg": "vdpa: clean up get_config_size ret value handling" }, @@ -139401,12 +182057,24 @@ "CVE-2023-6240": { "cmt_msg": "" }, + "CVE-2024-26700": { + "cmt_msg": "drm/amd/display: Fix MST Null Ptr for RV" + }, + "CVE-2024-26706": { + "cmt_msg": "parisc: Fix random data corruption from exception handler" + }, "CVE-2023-6610": { "cmt_msg": "smb: client: fix potential OOB in smb2_dump_detail()" }, "CVE-2020-11725": { "cmt_msg": "" }, + "CVE-2024-26739": { + "cmt_msg": "net/sched: act_mirred: don't override retval if we already lost the skb" + }, + "CVE-2024-26607": { + "cmt_msg": "drm/bridge: sii902x: Fix probing race issue" + }, "CVE-2022-23825": { "cmt_msg": "" }, @@ -139416,6 +182084,9 @@ "CVE-2023-3397": { "cmt_msg": "" }, + "CVE-2024-26767": { + "cmt_msg": "drm/amd/display: fixed integer types and null check locations" + }, "CVE-2023-3389": { "cmt_msg": "io_uring: mutex locked poll hashing" }, @@ -139437,8 +182108,17 @@ "CVE-2022-2209": { "cmt_msg": "" }, - "CVE-2023-7042": { - "cmt_msg": "" + "CVE-2024-26775": { + "cmt_msg": "aoe: avoid potential deadlock at set_capacity" + }, + "CVE-2023-52621": { + "cmt_msg": "bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers" + }, + "CVE-2023-52624": { + "cmt_msg": "drm/amd/display: Wake DMCUB before executing GPINT commands" + }, + "CVE-2023-52625": { + "cmt_msg": "drm/amd/display: Refactor DMCUB enter/exit idle interface" }, "CVE-2022-3595": { "cmt_msg": "cifs: fix double-fault crash during ntlmssp" @@ -139450,7 +182130,7 @@ "cmt_msg": "clk: imx: Add check for kcalloc" }, "CVE-2023-47233": { - "cmt_msg": "" + "cmt_msg": "wifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach" }, "CVE-2016-8660": { "cmt_msg": "" @@ -139458,6 +182138,12 @@ "CVE-2023-0597": { "cmt_msg": "x86/mm: Randomize per-cpu entry area" }, + "CVE-2024-26758": { + "cmt_msg": "md: Don't ignore suspended array in md_check_recovery()" + }, + "CVE-2024-26759": { + "cmt_msg": "mm/swap: fix race when skipping swapcache" + }, "CVE-2020-15802": { "cmt_msg": "" }, @@ -139473,21 +182159,48 @@ "CVE-2022-3636": { "cmt_msg": "net: ethernet: mtk_eth_soc: use after free in __mtk_ppe_check_skb()" }, - "CVE-2023-6356": { - "cmt_msg": "" + "CVE-2024-26738": { + "cmt_msg": "powerpc/pseries/iommu: DLPAR add doesn't completely initialize pci_controller" + }, + "CVE-2024-26745": { + "cmt_msg": "powerpc/pseries/iommu: IOMMU table is not initialized for kdump over SR-IOV" + }, + "CVE-2024-26756": { + "cmt_msg": "md: Don't register sync_thread for reshape directly" + }, + "CVE-2024-26757": { + "cmt_msg": "md: Don't ignore read-only array in md_check_recovery()" + }, + "CVE-2023-52639": { + "cmt_msg": "KVM: s390: vsie: fix race during shadow creation" }, "CVE-2019-15239": { "cmt_msg": "unknown" }, + "CVE-2023-52634": { + "cmt_msg": "drm/amd/display: Fix disable_otg_wa logic" + }, "CVE-2007-3719": { "cmt_msg": "" }, - "CVE-2023-52434": { - "cmt_msg": "smb: client: fix potential OOBs in smb2_parse_contexts()" + "CVE-2023-52632": { + "cmt_msg": "drm/amdkfd: Fix lock dependency warning with srcu" }, "CVE-2022-2961": { "cmt_msg": "" }, + "CVE-2024-26680": { + "cmt_msg": "net: atlantic: Fix DMA mapping for PTP hwts ring" + }, + "CVE-2024-26740": { + "cmt_msg": "net/sched: act_mirred: use the backlog for mirred ingress" + }, + "CVE-2024-26686": { + "cmt_msg": "fs/proc: do_task_stat: use sig->stats_lock to gather the threads/children stats" + }, + "CVE-2024-26687": { + "cmt_msg": "xen/events: close evtchn after mapping cleanup" + }, "CVE-2023-21400": { "cmt_msg": "" }, @@ -139530,39 +182243,45 @@ "CVE-2024-26584": { "cmt_msg": "net: tls: handle backlogging of crypto requests" }, - "CVE-2024-26587": { - "cmt_msg": "net: netdevsim: don't try to destroy PHC on VFs" - }, "CVE-2022-1247": { "cmt_msg": "" }, - "CVE-2024-26588": { - "cmt_msg": "LoongArch: BPF: Prevent out-of-bounds memory access" - }, - "CVE-2023-6270": { - "cmt_msg": "" - }, "CVE-2022-3624": { "cmt_msg": "bonding: fix reference count leak in balance-alb mode" }, - "CVE-2024-0841": { - "cmt_msg": "" - }, "CVE-2020-10708": { "cmt_msg": "" }, + "CVE-2023-52576": { + "cmt_msg": "x86/mm, kexec, ima: Use memblock_free_late() from ima_free_kexec_buffer()" + }, "CVE-2022-3238": { "cmt_msg": "" }, + "CVE-2023-52571": { + "cmt_msg": "power: supply: rk817: Fix node refcount leak" + }, + "CVE-2023-52572": { + "cmt_msg": "cifs: Fix UAF in cifs_demultiplex_thread()" + }, "CVE-2017-13693": { "cmt_msg": "" }, "CVE-2021-0399": { "cmt_msg": "" }, + "CVE-2023-52488": { + "cmt_msg": "serial: sc16is7xx: convert from _raw_ to _noinc_ regmap functions for FIFO" + }, "CVE-2017-13694": { "cmt_msg": "" }, + "CVE-2024-26691": { + "cmt_msg": "KVM: arm64: Fix circular locking dependency" + }, + "CVE-2023-52485": { + "cmt_msg": "drm/amd/display: Wake DMCUB before sending a command" + }, "CVE-2024-0564": { "cmt_msg": "" }, @@ -139572,6 +182291,9 @@ "CVE-2023-2176": { "cmt_msg": "RDMA/core: Refactor rdma_bind_addr" }, + "CVE-2022-48628": { + "cmt_msg": "ceph: drop messages from MDS when unmounting" + }, "CVE-2021-4095": { "cmt_msg": "KVM: x86: Fix wall clock writes in Xen shared_info not to mark page dirty" }, @@ -139608,14 +182330,32 @@ "CVE-2022-38096": { "cmt_msg": "" }, + "CVE-2023-52569": { + "cmt_msg": "btrfs: remove BUG() after failure to insert delayed dir index item" + }, + "CVE-2023-52568": { + "cmt_msg": "x86/sgx: Resolves SECS reclaim vs. page fault for EAUG race" + }, "CVE-2023-6039": { "cmt_msg": "net: usb: lan78xx: reorder cleanup operations to avoid UAF bugs" }, "CVE-2022-3523": { "cmt_msg": "mm/memory.c: fix race when faulting a device private page" }, + "CVE-2023-52561": { + "cmt_msg": "arm64: dts: qcom: sdm845-db845c: Mark cont splash memory region as reserved" + }, "CVE-2024-23307": { - "cmt_msg": "" + "cmt_msg": "md/raid5: fix atomicity violation in raid5_cache_count" + }, + "CVE-2023-52565": { + "cmt_msg": "media: uvcvideo: Fix OOB read" + }, + "CVE-2024-26658": { + "cmt_msg": "bcachefs: grab s_umount only if snapshotting" + }, + "CVE-2024-26669": { + "cmt_msg": "net/sched: flower: Fix chain template offload" }, "CVE-2022-4543": { "cmt_msg": "" @@ -139629,6 +182369,9 @@ "CVE-2020-0347": { "cmt_msg": "" }, + "CVE-2024-26655": { + "cmt_msg": "Fix memory leak in posix_clock_open()" + }, "CVE-2021-3714": { "cmt_msg": "" }, @@ -139647,8 +182390,26 @@ "CVE-2023-4134": { "cmt_msg": "Input: cyttsp4_core - change del_timer_sync() to timer_shutdown_sync()" }, + "CVE-2024-26623": { + "cmt_msg": "pds_core: Prevent race issues involving the adminq" + }, + "CVE-2024-26699": { + "cmt_msg": "drm/amd/display: Fix array-index-out-of-bounds in dcn35_clkmgr" + }, + "CVE-2024-26656": { + "cmt_msg": "drm/amdgpu: fix use-after-free bug" + }, + "CVE-2024-26648": { + "cmt_msg": "drm/amd/display: Fix variable deferencing before NULL check in edp_setup_replay()" + }, + "CVE-2024-26726": { + "cmt_msg": "btrfs: don't drop extent_map for free space inode on write error" + }, + "CVE-2024-26646": { + "cmt_msg": "thermal: intel: hfi: Add syscore callbacks for system-wide PM" + }, "CVE-2024-24861": { - "cmt_msg": "" + "cmt_msg": "media: xc4000: Fix atomicity violation in xc4000_get_frequency" }, "CVE-2024-24864": { "cmt_msg": "" @@ -139656,6 +182417,18 @@ "CVE-2023-37454": { "cmt_msg": "" }, + "CVE-2023-52596": { + "cmt_msg": "sysctl: Fix out of bounds access for empty sysctl registers" + }, + "CVE-2023-52593": { + "cmt_msg": "wifi: wfx: fix possible NULL pointer dereference in wfx_set_mfp_ap()" + }, + "CVE-2023-52590": { + "cmt_msg": "ocfs2: Avoid touching renamed directory if parent does not change" + }, + "CVE-2023-52591": { + "cmt_msg": "reiserfs: Avoid touching renamed directory if parent does not change" + }, "CVE-2023-50431": { "cmt_msg": "accel/habanalabs: fix information leak in sec_attest_info()" }, @@ -139665,8 +182438,8 @@ "CVE-2011-4917": { "cmt_msg": "" }, - "CVE-2023-52447": { - "cmt_msg": "bpf: Defer the free of inner map when necessary" + "CVE-2023-52629": { + "cmt_msg": "sh: push-switch: Reorder cleanup operations to avoid use-after-free bug" }, "CVE-2019-15902": { "cmt_msg": "unknown" @@ -139680,9 +182453,6 @@ "CVE-2023-6535": { "cmt_msg": "" }, - "CVE-2023-6536": { - "cmt_msg": "" - }, "CVE-2022-3567": { "cmt_msg": "ipv6: Fix data races around sk->sk_prot." }, @@ -139704,14 +182474,32 @@ "CVE-2010-5321": { "cmt_msg": "" }, + "CVE-2024-2193": { + "cmt_msg": "" + }, + "CVE-2024-26654": { + "cmt_msg": "ALSA: sh: aica: reorder cleanup operations to avoid UAF bugs" + }, "CVE-2018-12930": { "cmt_msg": "" }, "CVE-2018-12931": { "cmt_msg": "" }, - "CVE-2024-0565": { - "cmt_msg": "smb: client: fix OOB in receive_encrypted_standard()" + "CVE-2024-26650": { + "cmt_msg": "platform/x86: p2sb: Allow p2sb_bar() calls during PCI device probe" + }, + "CVE-2023-52481": { + "cmt_msg": "arm64: errata: Add Cortex-A520 speculative unprivileged load workaround" + }, + "CVE-2023-52585": { + "cmt_msg": "drm/amdgpu: Fix possible NULL dereference in amdgpu_ras_query_error_status_helper()" + }, + "CVE-2023-52584": { + "cmt_msg": "spmi: mediatek: Fix UAF on device remove" + }, + "CVE-2023-52586": { + "cmt_msg": "drm/msm/dpu: Add mutex lock in control vblank irq" }, "CVE-2021-39801": { "cmt_msg": "" @@ -139719,8 +182507,14 @@ "CVE-2021-39800": { "cmt_msg": "" }, - "CVE-2024-22099": { - "cmt_msg": "" + "CVE-2023-52582": { + "cmt_msg": "netfs: Only call folio_start_fscache() one time for each folio" + }, + "CVE-2023-52589": { + "cmt_msg": "media: rkisp1: Fix IRQ disable race issue" + }, + "CVE-2024-26768": { + "cmt_msg": "LoongArch: Change acpi_core_pic[NR_CPUS] to acpi_core_pic[MAX_CORE_PIC]" }, "CVE-2022-45885": { "cmt_msg": "" @@ -139737,9 +182531,15 @@ "CVE-2023-22995": { "cmt_msg": "usb: dwc3: dwc3-qcom: Add missing platform_device_put() in dwc3_qcom_acpi_register_core" }, + "CVE-2023-52508": { + "cmt_msg": "nvme-fc: Prevent null pointer dereference in nvme_fc_io_getuuid()" + }, "CVE-2021-4204": { "cmt_msg": "bpf: Generalize check_ctx_reg for reuse with other types" }, + "CVE-2023-52506": { + "cmt_msg": "LoongArch: Set all reserved memblocks on Node#0 at initialization" + }, "CVE-2022-45888": { "cmt_msg": "char: xillybus: Prevent use-after-free due to race condition" }, @@ -139749,6 +182549,12 @@ "CVE-2023-3439": { "cmt_msg": "mctp: defer the kfree of object mdev->addrs" }, + "CVE-2024-26765": { + "cmt_msg": "LoongArch: Disable IRQ before init_fn() for nonboot CPUs" + }, + "CVE-2024-26647": { + "cmt_msg": "drm/amd/display: Fix late derefrence 'dsc' check in 'link_set_dsc_pps_packet()'" + }, "CVE-2018-12929": { "cmt_msg": "" }, @@ -139767,6 +182573,12 @@ "CVE-2015-2877": { "cmt_msg": "" }, + "CVE-2024-26642": { + "cmt_msg": "netfilter: nf_tables: disallow anonymous set with timeout flag" + }, + "CVE-2024-26662": { + "cmt_msg": "drm/amd/display: Fix 'panel_cntl' could be null in 'dcn21_set_backlight_level()'" + }, "CVE-2023-26242": { "cmt_msg": "" }, @@ -139785,12 +182597,18 @@ "CVE-2022-44032": { "cmt_msg": "char: pcmcia: remove all the drivers" }, + "CVE-2024-26806": { + "cmt_msg": "spi: cadence-qspi: remove system-wide suspend helper calls from runtime PM hooks" + }, "CVE-2021-3847": { "cmt_msg": "" }, "CVE-2023-20941": { "cmt_msg": "" }, + "CVE-2024-26797": { + "cmt_msg": "drm/amd/display: Prevent potential buffer overflow in map_hw_resources" + }, "CVE-2024-21803": { "cmt_msg": "" }, @@ -139800,20 +182618,35 @@ "CVE-2011-4916": { "cmt_msg": "" }, + "CVE-2023-52530": { + "cmt_msg": "wifi: mac80211: fix potential key use-after-free" + }, + "CVE-2023-52532": { + "cmt_msg": "net: mana: Fix TX CQE error handling" + }, "CVE-2013-7445": { "cmt_msg": "" }, "CVE-2023-23039": { "cmt_msg": "" }, - "CVE-2024-23196": { - "cmt_msg": "" + "CVE-2024-26718": { + "cmt_msg": "dm-crypt, dm-verity: disable tasklets" + }, + "CVE-2024-26719": { + "cmt_msg": "nouveau: offload fence uevents work to workqueue" + }, + "CVE-2024-26714": { + "cmt_msg": "interconnect: qcom: sc8180x: Mark CO0 BCM keepalive" }, "CVE-2024-1312": { "cmt_msg": "mm: lock_vma_under_rcu() must check vma->anon_vma under vma lock" }, "CVE-2023-3640": { "cmt_msg": "" + }, + "CVE-2024-26713": { + "cmt_msg": "powerpc/pseries/iommu: Fix iommu initialisation during DLPAR add" } } }, @@ -139935,6 +182768,10 @@ } }, "4.20.15": { + "CVE-2019-8980": { + "cmt_msg": "exec: Fix mem leak in kernel_read_file", + "cmt_id": "1ffa4ebedacb578fad9a207a3c3f897b467d045e" + }, "CVE-2019-16994": { "cmt_msg": "net: sit: fix memory leak in sit_init_net()", "cmt_id": "058a6cc9f0ded32822b4f2370de110c940438fcb" @@ -139943,9 +182780,9 @@ "cmt_msg": "net: nfc: Fix NULL dereference on nfc_llcp_build_tlv fails", "cmt_id": "97dc863bf0bda8d6edac8c932ef0d4b12b679607" }, - "CVE-2019-8980": { - "cmt_msg": "exec: Fix mem leak in kernel_read_file", - "cmt_id": "1ffa4ebedacb578fad9a207a3c3f897b467d045e" + "CVE-2019-25160": { + "cmt_msg": "netlabel: fix out-of-bounds memory accesses", + "cmt_id": "fbf9578919d6c91100ec63acf2cba641383f6c78" }, "CVE-2019-15916": { "cmt_msg": "net-sysfs: Fix mem leak in netdev_register_kobject", @@ -139978,6 +182815,12 @@ "CVE-2019-15090": { "cmt_msg": "scsi: qedi: remove memset/memcpy to nfunc and use func instead" }, + "CVE-2021-47177": { + "cmt_msg": "iommu/vt-d: Fix sysfs leak in alloc_iommu()" + }, + "CVE-2024-26686": { + "cmt_msg": "fs/proc: do_task_stat: use sig->stats_lock to gather the threads/children stats" + }, "CVE-2022-3649": { "cmt_msg": "nilfs2: fix use-after-free bug of struct nilfs_root" }, @@ -140011,18 +182854,39 @@ "CVE-2021-3752": { "cmt_msg": "Bluetooth: fix use-after-free error in lock_sock_nested()" }, + "CVE-2024-26704": { + "cmt_msg": "ext4: fix double-free of blocks due to wrong extents moved_len" + }, "CVE-2019-19966": { "cmt_msg": "media: cpia2: Fix use-after-free in cpia2_exit" }, + "CVE-2022-42703": { + "cmt_msg": "mm/rmap: Fix anon_vma->degree ambiguity leading to double-reuse" + }, "CVE-2020-35508": { "cmt_msg": "fork: fix copy_process(CLONE_PARENT) race with the exiting ->real_parent" }, + "CVE-2023-52615": { + "cmt_msg": "hwrng: core - Fix page fault dead lock on mmap-ed hwrng" + }, + "CVE-2023-52614": { + "cmt_msg": "PM / devfreq: Fix buffer overflow in trans_stat_show" + }, + "CVE-2023-52617": { + "cmt_msg": "PCI: switchtec: Fix stdev_release() crash after surprise hot remove" + }, + "CVE-2023-52474": { + "cmt_msg": "IB/hfi1: Fix bugs with non-PAGE_SIZE-end multi-iovec user SDMA requests" + }, "CVE-2020-24587": { "cmt_msg": "mac80211: prevent mixed key and fragment cache attacks" }, "CVE-2020-24586": { "cmt_msg": "mac80211: prevent mixed key and fragment cache attacks" }, + "CVE-2023-52612": { + "cmt_msg": "crypto: scomp - fix req->dst buffer overflow" + }, "CVE-2021-0129": { "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical" }, @@ -140032,6 +182896,9 @@ "CVE-2022-47520": { "cmt_msg": "wifi: wilc1000: validate pairwise and authentication suite offsets" }, + "CVE-2023-52618": { + "cmt_msg": "block/rnbd-srv: Check for unlikely string overflow" + }, "CVE-2023-5717": { "cmt_msg": "perf: Disallow mis-matched inherited group reads" }, @@ -140071,6 +182938,9 @@ "CVE-2021-28964": { "cmt_msg": "btrfs: fix race when cloning extent buffer during rewind of an old root" }, + "CVE-2021-47059": { + "cmt_msg": "crypto: sun8i-ss - fix result memory leak on error path" + }, "CVE-2022-23825": { "cmt_msg": "" }, @@ -140080,15 +182950,42 @@ "CVE-2020-35501": { "cmt_msg": "" }, + "CVE-2024-26625": { + "cmt_msg": "llc: call sock_orphan() at release time" + }, "CVE-2019-10124": { "cmt_msg": "mm: hwpoison: fix thp split handing in soft_offline_in_use_page()" }, - "CVE-2024-26588": { - "cmt_msg": "LoongArch: BPF: Prevent out-of-bounds memory access" + "CVE-2021-47054": { + "cmt_msg": "bus: qcom: Put child node before return" + }, + "CVE-2021-47112": { + "cmt_msg": "x86/kvm: Teardown PV features on boot CPU as well" + }, + "CVE-2021-47113": { + "cmt_msg": "btrfs: abort in rename_exchange if we fail to insert the second ref" + }, + "CVE-2021-47110": { + "cmt_msg": "x86/kvm: Disable kvmclock on all CPUs on shutdown" + }, + "CVE-2021-47116": { + "cmt_msg": "ext4: fix memory leak in ext4_mb_init_backend on error path." + }, + "CVE-2021-47117": { + "cmt_msg": "ext4: fix bug on in ext4_es_cache_extent as ext4_split_extent_at failed" + }, + "CVE-2021-47114": { + "cmt_msg": "ocfs2: fix data corruption by fallocate" }, "CVE-2022-21125": { "cmt_msg": "x86/speculation/mmio: Reuse SRBDS mitigation for SBDS" }, + "CVE-2021-47118": { + "cmt_msg": "pid: take a reference when initializing `cad_pid`" + }, + "CVE-2021-46970": { + "cmt_msg": "bus: mhi: pci_generic: Remove WQ_MEM_RECLAIM flag from state workqueue" + }, "CVE-2019-19241": { "cmt_msg": "io_uring: async workers should inherit the user creds" }, @@ -140134,6 +183031,9 @@ "CVE-2023-0458": { "cmt_msg": "prlimit: do_prlimit needs to have a speculation check" }, + "CVE-2023-52565": { + "cmt_msg": "media: uvcvideo: Fix OOB read" + }, "CVE-2023-0597": { "cmt_msg": "x86/mm: Randomize per-cpu entry area" }, @@ -140158,9 +183058,6 @@ "CVE-2022-3628": { "cmt_msg": "wifi: brcmfmac: Fix potential buffer overflow in brcmf_fweh_event_worker()" }, - "CVE-2024-26591": { - "cmt_msg": "bpf: Fix re-attachment branch in bpf_tracing_prog_attach" - }, "CVE-2020-15802": { "cmt_msg": "" }, @@ -140194,9 +183091,21 @@ "CVE-2022-3202": { "cmt_msg": "jfs: prevent NULL deref in diFree" }, + "CVE-2024-25739": { + "cmt_msg": "" + }, + "CVE-2021-47028": { + "cmt_msg": "mt76: mt7915: fix txrate reporting" + }, "CVE-2024-26585": { "cmt_msg": "tls: fix race between tx work scheduling and socket close" }, + "CVE-2023-52511": { + "cmt_msg": "spi: sun6i: reduce DMA RX transfer width to single byte" + }, + "CVE-2021-47020": { + "cmt_msg": "soundwire: stream: fix memory leak in stream config error path" + }, "CVE-2024-26584": { "cmt_msg": "net: tls: handle backlogging of crypto requests" }, @@ -140209,6 +183118,15 @@ "CVE-2023-39189": { "cmt_msg": "netfilter: nfnetlink_osf: avoid OOB read" }, + "CVE-2021-46908": { + "cmt_msg": "bpf: Use correct permission flag for mixed signed bounds arithmetic" + }, + "CVE-2021-46909": { + "cmt_msg": "ARM: footbridge: fix PCI interrupt mapping" + }, + "CVE-2021-46906": { + "cmt_msg": "HID: usbhid: fix info leak in hid_submit_ctrl" + }, "CVE-2019-11479": { "cmt_msg": "tcp: add tcp_min_snd_mss sysctl" }, @@ -140263,9 +183181,21 @@ "CVE-2019-17054": { "cmt_msg": "appletalk: enforce CAP_NET_RAW for raw sockets" }, + "CVE-2024-26747": { + "cmt_msg": "usb: roles: fix NULL pointer issue when put module's reference" + }, + "CVE-2023-52527": { + "cmt_msg": "ipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data()" + }, + "CVE-2024-26745": { + "cmt_msg": "powerpc/pseries/iommu: IOMMU table is not initialized for kdump over SR-IOV" + }, "CVE-2023-51042": { "cmt_msg": "drm/amdgpu: Fix potential fence use-after-free v2" }, + "CVE-2024-26743": { + "cmt_msg": "RDMA/qedr: Fix qedr_create_user_qp error flow" + }, "CVE-2023-3006": { "cmt_msg": "arm64: Add AMPERE1 to the Spectre-BHB affected list" }, @@ -140284,6 +183214,9 @@ "CVE-2022-1734": { "cmt_msg": "nfc: nfcmrvl: main: reorder destructive operations in nfcmrvl_nci_unregister_dev to avoid bugs" }, + "CVE-2024-26748": { + "cmt_msg": "usb: cdns3: fix memory double free when handle zero packet" + }, "CVE-2023-28772": { "cmt_msg": "seq_buf: Fix overflow in seq_buf_putmem_hex()" }, @@ -140320,6 +183253,9 @@ "CVE-2019-19070": { "cmt_msg": "spi: gpio: prevent memory leak in spi_gpio_probe" }, + "CVE-2024-26699": { + "cmt_msg": "drm/amd/display: Fix array-index-out-of-bounds in dcn35_clkmgr" + }, "CVE-2023-42753": { "cmt_msg": "netfilter: ipset: add the missing IP_SET_HASH_WITH_NET0 macro for ip_set_hash_netportnet.c" }, @@ -140332,6 +183268,9 @@ "CVE-2022-20154": { "cmt_msg": "sctp: use call_rcu to free endpoint" }, + "CVE-2024-26691": { + "cmt_msg": "KVM: arm64: Fix circular locking dependency" + }, "CVE-2021-27363": { "cmt_msg": "scsi: iscsi: Restrict sessions and handles to admin capabilities" }, @@ -140347,6 +183286,9 @@ "CVE-2024-0565": { "cmt_msg": "smb: client: fix OOB in receive_encrypted_standard()" }, + "CVE-2024-26697": { + "cmt_msg": "nilfs2: fix data corruption in dsync block recovery for small block sizes" + }, "CVE-2020-0404": { "cmt_msg": "media: uvcvideo: Avoid cyclic entity chains due to malformed USB descriptors" }, @@ -140431,6 +183373,9 @@ "CVE-2022-45885": { "cmt_msg": "" }, + "CVE-2023-52574": { + "cmt_msg": "team: fix null-ptr-deref when team device type is changed" + }, "CVE-2021-33034": { "cmt_msg": "Bluetooth: verify AMP hci_chan before amp_destroy" }, @@ -140449,8 +183394,14 @@ "CVE-2020-27068": { "cmt_msg": "cfg80211: add missing policy for NL80211_ATTR_STATUS_CODE" }, - "CVE-2024-23307": { - "cmt_msg": "" + "CVE-2022-44032": { + "cmt_msg": "char: pcmcia: remove all the drivers" + }, + "CVE-2024-0646": { + "cmt_msg": "net: tls, update curr on splice as well" + }, + "CVE-2023-52598": { + "cmt_msg": "s390/ptrace: handle setting of fpc register correctly" }, "CVE-2020-8648": { "cmt_msg": "vt: selection, close sel_buffer race" @@ -140458,6 +183409,9 @@ "CVE-2022-32296": { "cmt_msg": "tcp: increase source port perturb table to 2^16" }, + "CVE-2024-26789": { + "cmt_msg": "crypto: arm64/neonbs - fix out-of-bounds access on short input" + }, "CVE-2020-28974": { "cmt_msg": "vt: Disable KD_FONT_OP_COPY" }, @@ -140488,6 +183442,9 @@ "CVE-2019-19082": { "cmt_msg": "drm/amd/display: prevent memory leak" }, + "CVE-2024-26655": { + "cmt_msg": "Fix memory leak in posix_clock_open()" + }, "CVE-2019-19080": { "cmt_msg": "nfp: flower: prevent memory leak in nfp_flower_spawn_phy_reprs" }, @@ -140503,6 +183460,9 @@ "CVE-2020-26560": { "cmt_msg": "" }, + "CVE-2024-26633": { + "cmt_msg": "ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim()" + }, "CVE-2023-35823": { "cmt_msg": "media: saa7134: fix use after free bug in saa7134_finidev due to race condition" }, @@ -140512,12 +183472,18 @@ "CVE-2023-39198": { "cmt_msg": "drm/qxl: fix UAF on handle creation" }, + "CVE-2023-42752": { + "cmt_msg": "igmp: limit igmpv3_newpack() packet size to IP_MAX_MTU" + }, "CVE-2018-12127": { "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" }, "CVE-2018-12126": { "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" }, + "CVE-2024-26751": { + "cmt_msg": "ARM: ep93xx: Add terminator to gpiod_lookup_table" + }, "CVE-2022-23816": { "cmt_msg": "x86/kvm/vmx: Make noinstr clean" }, @@ -140533,6 +183499,9 @@ "CVE-2022-20572": { "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag" }, + "CVE-2024-24858": { + "cmt_msg": "" + }, "CVE-2023-39194": { "cmt_msg": "net: xfrm: Fix xfrm_address_filter OOB read" }, @@ -140542,6 +183511,9 @@ "CVE-2023-39197": { "cmt_msg": "netfilter: conntrack: dccp: copy entire header to stack buffer, not just basic one" }, + "CVE-2023-52489": { + "cmt_msg": "mm/sparsemem: fix race in accessing memory_section->usage" + }, "CVE-2019-10126": { "cmt_msg": "mwifiex: Fix heap overflow in mwifiex_uap_parse_tail_ies()" }, @@ -140551,6 +183523,9 @@ "CVE-2019-10125": { "cmt_msg": "aio: simplify - and fix - fget/fput for io_submit()" }, + "CVE-2023-52584": { + "cmt_msg": "spmi: mediatek: Fix UAF on device remove" + }, "CVE-2020-13974": { "cmt_msg": "vt: keyboard: avoid signed integer overflow in k_ascii" }, @@ -140563,6 +183538,9 @@ "CVE-2022-36402": { "cmt_msg": "drm/vmwgfx: Fix shader stage validation" }, + "CVE-2023-52484": { + "cmt_msg": "iommu/arm-smmu-v3: Fix soft lockup triggered by arm_smmu_mm_invalidate_range" + }, "CVE-2022-29900": { "cmt_msg": "x86/kvm/vmx: Make noinstr clean" }, @@ -140578,6 +183556,12 @@ "CVE-2020-10751": { "cmt_msg": "selinux: properly handle multiple messages in selinux_netlink_send()" }, + "CVE-2022-3567": { + "cmt_msg": "ipv6: Fix data races around sk->sk_prot." + }, + "CVE-2024-26773": { + "cmt_msg": "ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found()" + }, "CVE-2023-39192": { "cmt_msg": "netfilter: xt_u32: validate user space input" }, @@ -140605,9 +183589,15 @@ "CVE-2021-28660": { "cmt_msg": "staging: rtl8188eu: prevent ->ssid overflow in rtw_wx_set_scan()" }, + "CVE-2024-26645": { + "cmt_msg": "tracing: Ensure visibility when inserting an element into tracing_map" + }, "CVE-2020-8647": { "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region" }, + "CVE-2022-3564": { + "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free caused by l2cap_reassemble_sdu" + }, "CVE-2019-0155": { "cmt_msg": "drm/i915: Rename gen7 cmdparser tables" }, @@ -140620,11 +183610,20 @@ "CVE-2023-1859": { "cmt_msg": "9p/xen : Fix use after free bug in xen_9pfs_front_remove due to race condition" }, - "CVE-2022-2961": { - "cmt_msg": "" + "CVE-2023-52585": { + "cmt_msg": "drm/amdgpu: Fix possible NULL dereference in amdgpu_ras_query_error_status_helper()" }, - "CVE-2022-3567": { - "cmt_msg": "ipv6: Fix data races around sk->sk_prot." + "CVE-2021-47063": { + "cmt_msg": "drm: bridge/panel: Cleanup connector on bridge detach" + }, + "CVE-2023-52587": { + "cmt_msg": "IB/ipoib: Fix mcast list locking" + }, + "CVE-2023-52586": { + "cmt_msg": "drm/msm/dpu: Add mutex lock in control vblank irq" + }, + "CVE-2021-47149": { + "cmt_msg": "net: fujitsu: fix potential null-ptr-deref" }, "CVE-2022-3566": { "cmt_msg": "tcp: Fix data races around icsk->icsk_af_ops." @@ -140632,8 +183631,8 @@ "CVE-2022-3565": { "cmt_msg": "mISDN: fix use-after-free bugs in l1oip timer handlers" }, - "CVE-2022-3564": { - "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free caused by l2cap_reassemble_sdu" + "CVE-2021-47065": { + "cmt_msg": "rtw88: Fix array overrun in rtw_get_tx_power_params()" }, "CVE-2020-36386": { "cmt_msg": "Bluetooth: Fix slab-out-of-bounds read in hci_extended_inquiry_result_evt()" @@ -140641,9 +183640,30 @@ "CVE-2021-20317": { "cmt_msg": "lib/timerqueue: Rely on rbtree semantics for next timer" }, + "CVE-2021-47147": { + "cmt_msg": "ptp: ocp: Fix a resource leak in an error handling path" + }, "CVE-2020-36385": { "cmt_msg": "RDMA/ucma: Rework ucma_migrate_id() to avoid races with destroy" }, + "CVE-2023-52589": { + "cmt_msg": "media: rkisp1: Fix IRQ disable race issue" + }, + "CVE-2021-47140": { + "cmt_msg": "iommu/amd: Clear DMA ops when switching domain" + }, + "CVE-2021-47143": { + "cmt_msg": "net/smc: remove device from smcd_dev_list after failed device_add()" + }, + "CVE-2021-47142": { + "cmt_msg": "drm/amdgpu: Fix a use-after-free" + }, + "CVE-2021-47145": { + "cmt_msg": "btrfs: do not BUG_ON in link_to_fixup_dir" + }, + "CVE-2021-46941": { + "cmt_msg": "usb: dwc3: core: Do core softreset when switch mode" + }, "CVE-2020-0009": { "cmt_msg": "staging: android: ashmem: Disallow ashmem memory from being remapped" }, @@ -140656,12 +183676,21 @@ "CVE-2023-28466": { "cmt_msg": "net: tls: fix possible race condition between do_tls_getsockopt_conf() and do_tls_setsockopt_conf()" }, + "CVE-2023-52588": { + "cmt_msg": "f2fs: fix to tag gcing flag on page during block migration" + }, "CVE-2019-14615": { "cmt_msg": "drm/i915/gen9: Clear residual context state on context switch" }, "CVE-2022-2503": { "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag" }, + "CVE-2023-52578": { + "cmt_msg": "net: bridge: use DEV_STATS_INC()" + }, + "CVE-2021-47052": { + "cmt_msg": "crypto: sa2ul - Fix memory leak of rxd" + }, "CVE-2019-19048": { "cmt_msg": "virt: vbox: fix memory leak in hgcm_call_preprocess_linaddr" }, @@ -140689,6 +183718,9 @@ "CVE-2019-17666": { "cmt_msg": "rtlwifi: Fix potential overflow on P2P code" }, + "CVE-2021-47056": { + "cmt_msg": "crypto: qat - ADF_STATUS_PF_RUNNING should be set after adf_dev_init" + }, "CVE-2019-19036": { "cmt_msg": "btrfs: Detect unbalanced tree with empty leaf before crashing btree operations" }, @@ -140707,18 +183739,36 @@ "CVE-2022-1419": { "cmt_msg": "drm/vgem: Close use-after-free race in vgem_gem_create" }, + "CVE-2021-47125": { + "cmt_msg": "sch_htb: fix refcount leak in htb_parent_to_leaf_offload" + }, + "CVE-2024-26797": { + "cmt_msg": "drm/amd/display: Prevent potential buffer overflow in map_hw_resources" + }, "CVE-2022-1836": { "cmt_msg": "floppy: disable FDRAWCMD by default" }, "CVE-2020-11884": { "cmt_msg": "s390/mm: fix page table upgrade vs 2ndary address mode accesses" }, + "CVE-2024-26793": { + "cmt_msg": "gtp: fix use-after-free and null-ptr-deref in gtp_newlink()" + }, + "CVE-2023-52530": { + "cmt_msg": "wifi: mac80211: fix potential key use-after-free" + }, "CVE-2021-32078": { "cmt_msg": "ARM: footbridge: remove personal server platform" }, + "CVE-2023-52532": { + "cmt_msg": "net: mana: Fix TX CQE error handling" + }, "CVE-2022-30594": { "cmt_msg": "ptrace: Check PTRACE_O_SUSPEND_SECCOMP permission on PTRACE_SEIZE" }, + "CVE-2024-26798": { + "cmt_msg": "fbcon: always restore the old font data in fbcon_do_set_font()" + }, "CVE-2022-4662": { "cmt_msg": "USB: core: Prevent nested device-reset calls" }, @@ -140749,6 +183799,9 @@ "CVE-2019-2213": { "cmt_msg": "binder: fix possible UAF when freeing buffer" }, + "CVE-2024-26677": { + "cmt_msg": "rxrpc: Fix delayed ACKs to not set the reference serial number" + }, "CVE-2020-25211": { "cmt_msg": "netfilter: ctnetlink: add a range check for l3/l4 protonum" }, @@ -140767,6 +183820,12 @@ "CVE-2020-26555": { "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical" }, + "CVE-2024-26776": { + "cmt_msg": "spi: hisi-sfc-v3xx: Return IRQ_NONE if no interrupts were detected" + }, + "CVE-2024-26777": { + "cmt_msg": "fbdev: sis: Error out if pixclock equals zero" + }, "CVE-2019-20794": { "cmt_msg": "" }, @@ -140776,21 +183835,33 @@ "CVE-2023-3397": { "cmt_msg": "" }, + "CVE-2020-36775": { + "cmt_msg": "f2fs: fix to avoid potential deadlock" + }, + "CVE-2024-26679": { + "cmt_msg": "inet: read sk->sk_family once in inet_recv_error()" + }, + "CVE-2023-52478": { + "cmt_msg": "HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect" + }, "CVE-2023-3117": { "cmt_msg": "netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE" }, + "CVE-2021-47128": { + "cmt_msg": "bpf, lockdown, audit: Fix buggy SELinux lockdown permission checks" + }, "CVE-2022-26365": { "cmt_msg": "xen/blkfront: fix leaking data in shared pages" }, "CVE-2023-52458": { "cmt_msg": "block: add check that partition length needs to be aligned with block size" }, - "CVE-2023-52457": { - "cmt_msg": "serial: 8250: omap: Don't skip resource freeing if pm_runtime_resume_and_get() failed" - }, "CVE-2018-1121": { "cmt_msg": "" }, + "CVE-2023-28746": { + "cmt_msg": "x86/mmio: Disable KVM mitigation when X86_FEATURE_CLEAR_CPU_BUF is set" + }, "CVE-2023-52451": { "cmt_msg": "powerpc/pseries/memhp: Fix access beyond end of drmem array" }, @@ -140800,6 +183871,12 @@ "CVE-2019-19045": { "cmt_msg": "net/mlx5: prevent memory leak in mlx5_fpga_conn_create_cq" }, + "CVE-2022-2961": { + "cmt_msg": "" + }, + "CVE-2024-26602": { + "cmt_msg": "sched/membarrier: reduce the ability to hammer on sys_membarrier" + }, "CVE-2024-1086": { "cmt_msg": "netfilter: nf_tables: reject QUEUE/DROP verdict parameters" }, @@ -140839,6 +183916,9 @@ "CVE-2019-14815": { "cmt_msg": "mwifiex: Fix three heap overflow at parsing element in cfg80211_ap_settings" }, + "CVE-2021-47121": { + "cmt_msg": "net: caif: fix memory leak in cfusbl_device_notify" + }, "CVE-2023-6240": { "cmt_msg": "" }, @@ -140860,6 +183940,9 @@ "CVE-2023-32233": { "cmt_msg": "netfilter: nf_tables: deactivate anonymous set from preparation phase" }, + "CVE-2024-26685": { + "cmt_msg": "nilfs2: fix potential bug in end_buffer_async_write" + }, "CVE-2020-25672": { "cmt_msg": "nfc: fix memory leak in llcp_sock_connect()" }, @@ -140899,8 +183982,8 @@ "CVE-2023-1118": { "cmt_msg": "media: rc: Fix use-after-free bugs caused by ene_tx_irqsim()" }, - "CVE-2022-1016": { - "cmt_msg": "netfilter: nf_tables: initialize registers in nft_do_chain()" + "CVE-2021-47124": { + "cmt_msg": "io_uring: fix link timeout refs" }, "CVE-2022-1011": { "cmt_msg": "fuse: fix pipe buffer lifetime for direct_io" @@ -140914,12 +183997,30 @@ "CVE-2022-1012": { "cmt_msg": "secure_seq: use the 64 bits of the siphash for port offset calculation" }, + "CVE-2023-52620": { + "cmt_msg": "netfilter: nf_tables: disallow timeout for anonymous sets" + }, "CVE-2022-38096": { "cmt_msg": "" }, + "CVE-2023-52622": { + "cmt_msg": "ext4: avoid online resizing failures due to oversized flex bg" + }, "CVE-2020-8649": { "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region" }, + "CVE-2023-52619": { + "cmt_msg": "pstore/ram: Fix crash when setting number of cpus to an odd number" + }, + "CVE-2023-52625": { + "cmt_msg": "drm/amd/display: Refactor DMCUB enter/exit idle interface" + }, + "CVE-2023-52641": { + "cmt_msg": "fs/ntfs3: Add NULL ptr dereference checking at the end of attr_allocate_frame()" + }, + "CVE-2023-52628": { + "cmt_msg": "netfilter: nftables: exthdr: fix 4-byte stack OOB write" + }, "CVE-2021-26934": { "cmt_msg": "" }, @@ -140980,8 +184081,17 @@ "CVE-2021-3178": { "cmt_msg": "nfsd4: readdirplus shouldn't return parent of export" }, - "CVE-2022-42703": { - "cmt_msg": "mm/rmap: Fix anon_vma->degree ambiguity leading to double-reuse" + "CVE-2021-47101": { + "cmt_msg": "asix: fix uninit-value in asix_mdio_read()" + }, + "CVE-2021-47100": { + "cmt_msg": "ipmi: Fix UAF when uninstall ipmi_si and ipmi_msghandler module" + }, + "CVE-2021-46984": { + "cmt_msg": "kyber: fix out of bounds access when preempted" + }, + "CVE-2021-46982": { + "cmt_msg": "f2fs: compress: fix race condition of overwrite vs truncate" }, "CVE-2019-15031": { "cmt_msg": "powerpc/tm: Fix restoring FP/VMX facility incorrectly on interrupts" @@ -140998,12 +184108,21 @@ "CVE-2007-3719": { "cmt_msg": "" }, - "CVE-2023-3863": { - "cmt_msg": "net: nfc: Fix use-after-free caused by nfc_llcp_find_local" + "CVE-2021-46988": { + "cmt_msg": "userfaultfd: release page in error path to avoid BUG_ON" + }, + "CVE-2021-46989": { + "cmt_msg": "hfsplus: prevent corruption in shrinking truncate" + }, + "CVE-2024-26606": { + "cmt_msg": "binder: signal epoll threads of self-work" }, "CVE-2023-0590": { "cmt_msg": "net: sched: fix race condition in qdisc_graft()" }, + "CVE-2023-52583": { + "cmt_msg": "ceph: fix deadlock or deadcode of misusing dget()" + }, "CVE-2022-4095": { "cmt_msg": "staging: rtl8712: fix use after free bugs" }, @@ -141019,6 +184138,9 @@ "CVE-2023-30772": { "cmt_msg": "power: supply: da9150: Fix use after free bug in da9150_charger_remove due to race condition" }, + "CVE-2021-47119": { + "cmt_msg": "ext4: fix memory leak in ext4_fill_super" + }, "CVE-2022-24958": { "cmt_msg": "usb: gadget: don't release an existing dev->buf" }, @@ -141028,6 +184150,15 @@ "CVE-2021-3679": { "cmt_msg": "tracing: Fix bug in rb_per_cpu_empty() that might cause deadloop." }, + "CVE-2024-26656": { + "cmt_msg": "drm/amdgpu: fix use-after-free bug" + }, + "CVE-2024-26706": { + "cmt_msg": "parisc: Fix random data corruption from exception handler" + }, + "CVE-2023-52517": { + "cmt_msg": "spi: sun6i: fix race between DMA RX transfer completion and RX FIFO drain" + }, "CVE-2022-2586": { "cmt_msg": "netfilter: nf_tables: do not allow SET_ID to refer to another table" }, @@ -141091,12 +184222,21 @@ "CVE-2019-11091": { "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" }, + "CVE-2021-47034": { + "cmt_msg": "powerpc/64s: Fix pte update for kernel memory on radix" + }, "CVE-2022-3239": { "cmt_msg": "media: em28xx: initialize refcount before kref_get" }, "CVE-2022-4543": { "cmt_msg": "" }, + "CVE-2023-52571": { + "cmt_msg": "power: supply: rk817: Fix node refcount leak" + }, + "CVE-2023-52572": { + "cmt_msg": "cifs: Fix UAF in cifs_demultiplex_thread()" + }, "CVE-2023-4921": { "cmt_msg": "net: sched: sch_qfq: Fix UAF in qfq_dequeue()" }, @@ -141109,6 +184249,9 @@ "CVE-2023-1829": { "cmt_msg": "net/sched: Retire tcindex classifier" }, + "CVE-2021-46915": { + "cmt_msg": "netfilter: nft_limit: avoid possible divide error in nft_limit_init" + }, "CVE-2019-19227": { "cmt_msg": "appletalk: Fix potential NULL pointer dereference in unregister_snap_client" }, @@ -141124,14 +184267,17 @@ "CVE-2020-24394": { "cmt_msg": "nfsd: apply umask on fs without ACL support" }, + "CVE-2024-26769": { + "cmt_msg": "nvmet-fc: avoid deadlock on delete association path" + }, "CVE-2022-20148": { "cmt_msg": "f2fs: fix UAF in f2fs_available_free_memory" }, "CVE-2019-18813": { "cmt_msg": "usb: dwc3: pci: prevent memory leak in dwc3_pci_probe" }, - "CVE-2024-0607": { - "cmt_msg": "netfilter: nf_tables: fix pointer math issue in nft_byteorder_eval()" + "CVE-2022-1786": { + "cmt_msg": "io_uring: remove io_identity" }, "CVE-2013-7445": { "cmt_msg": "" @@ -141148,6 +184294,15 @@ "CVE-2019-13233": { "cmt_msg": "x86/insn-eval: Fix use-after-free access to LDT entry" }, + "CVE-2024-26735": { + "cmt_msg": "ipv6: sr: fix possible use-after-free and null-ptr-deref" + }, + "CVE-2024-26738": { + "cmt_msg": "powerpc/pseries/iommu: DLPAR add doesn't completely initialize pci_controller" + }, + "CVE-2024-26739": { + "cmt_msg": "net/sched: act_mirred: don't override retval if we already lost the skb" + }, "CVE-2021-3655": { "cmt_msg": "sctp: validate from_addr_param return" }, @@ -141196,12 +184351,18 @@ "CVE-2024-26595": { "cmt_msg": "mlxsw: spectrum_acl_tcam: Fix NULL pointer dereference in error path" }, + "CVE-2023-52506": { + "cmt_msg": "LoongArch: Set all reserved memblocks on Node#0 at initialization" + }, "CVE-2021-29154": { "cmt_msg": "bpf, x86: Validate computation of branch displacements for x86-64" }, "CVE-2023-6932": { "cmt_msg": "ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet" }, + "CVE-2024-26801": { + "cmt_msg": "Bluetooth: Avoid potential use-after-free in hci_error_reset" + }, "CVE-2020-16166": { "cmt_msg": "random32: update the net random state on interrupt and activity" }, @@ -141223,9 +184384,15 @@ "CVE-2019-15919": { "cmt_msg": "cifs: Fix use-after-free in SMB2_write" }, + "CVE-2024-26803": { + "cmt_msg": "net: veth: clear GRO when clearing XDP even when down" + }, "CVE-2023-52444": { "cmt_msg": "f2fs: fix to avoid dirent corruption" }, + "CVE-2024-26768": { + "cmt_msg": "LoongArch: Change acpi_core_pic[NR_CPUS] to acpi_core_pic[MAX_CORE_PIC]" + }, "CVE-2020-12362": { "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" }, @@ -141241,12 +184408,24 @@ "CVE-2019-10639": { "cmt_msg": "netns: provide pure entropy for net_hash_mix()" }, + "CVE-2024-26646": { + "cmt_msg": "thermal: intel: hfi: Add syscore callbacks for system-wide PM" + }, + "CVE-2024-26647": { + "cmt_msg": "drm/amd/display: Fix late derefrence 'dsc' check in 'link_set_dsc_pps_packet()'" + }, + "CVE-2024-26644": { + "cmt_msg": "btrfs: don't abort filesystem when attempting to snapshot deleted subvolume" + }, "CVE-2022-28388": { "cmt_msg": "can: usb_8dev: usb_8dev_start_xmit(): fix double dev_kfree_skb() in error path" }, "CVE-2023-33203": { "cmt_msg": "net: qcom/emac: Fix use after free bug in emac_remove due to race condition" }, + "CVE-2024-26640": { + "cmt_msg": "tcp: add sanity checks to rx zerocopy" + }, "CVE-2021-0605": { "cmt_msg": "af_key: pfkey_dump needs parameter validation" }, @@ -141259,6 +184438,9 @@ "CVE-2023-26545": { "cmt_msg": "net: mpls: fix stale pointer if allocation fails during device rename" }, + "CVE-2023-52519": { + "cmt_msg": "HID: intel-ish-hid: ipc: Disable and reenable ACPI GPE bit" + }, "CVE-2021-38204": { "cmt_msg": "usb: max-3421: Prevent corruption of freed memory" }, @@ -141271,6 +184453,12 @@ "CVE-2021-3894": { "cmt_msg": "sctp: account stream padding length for reconf chunk" }, + "CVE-2024-26641": { + "cmt_msg": "ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv()" + }, + "CVE-2023-52603": { + "cmt_msg": "UBSAN: array-index-out-of-bounds in dtSplitRoot" + }, "CVE-2019-18786": { "cmt_msg": "media: rcar_drif: fix a memory disclosure" }, @@ -141283,9 +184471,15 @@ "CVE-2019-20812": { "cmt_msg": "af_packet: set defaule value for tmo" }, + "CVE-2023-52600": { + "cmt_msg": "jfs: fix uaf in jfs_evict_inode" + }, "CVE-2020-14314": { "cmt_msg": "ext4: fix potential negative array index in do_split()" }, + "CVE-2023-52601": { + "cmt_msg": "jfs: fix array-index-out-of-bounds in dbAdjTree" + }, "CVE-2022-26373": { "cmt_msg": "x86/speculation: Add RSB VM Exit protections" }, @@ -141304,6 +184498,12 @@ "CVE-2024-23848": { "cmt_msg": "" }, + "CVE-2021-46904": { + "cmt_msg": "net: hso: fix null-ptr-deref during tty device unregistration" + }, + "CVE-2021-47159": { + "cmt_msg": "net: dsa: fix a crash if ->get_sset_count() fails" + }, "CVE-2022-0617": { "cmt_msg": "udf: Fix NULL ptr deref when converting from inline format" }, @@ -141311,14 +184511,26 @@ "cmt_msg": "net: vmxnet3: fix possible NULL pointer dereference in vmxnet3_rq_cleanup()" }, "CVE-2024-24861": { - "cmt_msg": "" + "cmt_msg": "media: xc4000: Fix atomicity violation in xc4000_get_frequency" + }, + "CVE-2024-26635": { + "cmt_msg": "llc: Drop support for ETH_P_TR_802_2." + }, + "CVE-2022-41218": { + "cmt_msg": "media: dvb-core: Fix UAF due to refcount races at releasing" }, "CVE-2022-23036": { "cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()" }, + "CVE-2023-52639": { + "cmt_msg": "KVM: s390: vsie: fix race during shadow creation" + }, "CVE-2022-2153": { "cmt_msg": "KVM: x86: Avoid theoretical NULL pointer dereference in kvm_irq_delivery_to_apic_fast()" }, + "CVE-2024-2193": { + "cmt_msg": "" + }, "CVE-2022-20566": { "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free caused by l2cap_chan_put" }, @@ -141331,8 +184543,11 @@ "CVE-2024-23851": { "cmt_msg": "dm: limit the number of targets and parameter size area" }, + "CVE-2022-20424": { + "cmt_msg": "io_uring: remove io_identity" + }, "CVE-2024-23196": { - "cmt_msg": "" + "cmt_msg": "ALSA: hda: fix a possible null-pointer dereference due to data race in snd_hdac_regmap_sync()" }, "CVE-2020-12768": { "cmt_msg": "KVM: SVM: Fix potential memory leak in svm_cpu_init()" @@ -141340,6 +184555,12 @@ "CVE-2020-12769": { "cmt_msg": "spi: spi-dw: Add lock protect dw_spi rx/tx to prevent concurrent calls" }, + "CVE-2024-26765": { + "cmt_msg": "LoongArch: Disable IRQ before init_fn() for nonboot CPUs" + }, + "CVE-2023-52609": { + "cmt_msg": "binder: fix race between mmput() and do_exit()" + }, "CVE-2021-32399": { "cmt_msg": "bluetooth: eliminate the potential race condition when removing the HCI controller" }, @@ -141352,18 +184573,36 @@ "CVE-2019-12382": { "cmt_msg": "drm/edid: Fix a missing-check bug in drm_load_edid_firmware()" }, + "CVE-2023-52634": { + "cmt_msg": "drm/amd/display: Fix disable_otg_wa logic" + }, "CVE-2022-22942": { "cmt_msg": "drm/vmwgfx: Fix stale file descriptors on failed usercopy" }, "CVE-2018-20669": { "cmt_msg": "make 'user_access_begin()' do 'access_ok()'" }, + "CVE-2022-21499": { + "cmt_msg": "lockdown: also lock down previous kgdb use" + }, "CVE-2019-19543": { "cmt_msg": "media: serial_ir: Fix use-after-free in serial_ir_init_module" }, + "CVE-2020-36783": { + "cmt_msg": "i2c: img-scb: fix reference leak when pm_runtime_get_sync fails" + }, + "CVE-2020-36780": { + "cmt_msg": "i2c: sprd: fix reference leak when pm_runtime_get_sync fails" + }, + "CVE-2020-36781": { + "cmt_msg": "i2c: imx: fix reference leak when pm_runtime_get_sync fails" + }, "CVE-2021-3732": { "cmt_msg": "ovl: prevent private clone if bind mount is not allowed" }, + "CVE-2020-36784": { + "cmt_msg": "i2c: cadence: fix reference leak when pm_runtime_get_sync fails" + }, "CVE-2022-25375": { "cmt_msg": "usb: gadget: rndis: check size of RNDIS_MSG_SET command" }, @@ -141373,9 +184612,18 @@ "CVE-2020-10767": { "cmt_msg": "x86/speculation: Avoid force-disabling IBPB based on STIBP and enhanced IBRS." }, + "CVE-2019-25162": { + "cmt_msg": "i2c: Fix a potential use after free" + }, + "CVE-2024-26764": { + "cmt_msg": "fs/aio: Restrict kiocb_set_cancel_fn() to I/O submitted via libaio" + }, "CVE-2018-12207": { "cmt_msg": "kvm: x86, powerpc: do not allow clearing largepages debugfs entry" }, + "CVE-2024-26627": { + "cmt_msg": "scsi: core: Move scsi_host_busy() out of host lock for waking up EH handler" + }, "CVE-2020-13143": { "cmt_msg": "USB: gadget: fix illegal array access in binding with UDC" }, @@ -141397,9 +184645,15 @@ "CVE-2019-17075": { "cmt_msg": "RDMA/cxgb4: Do not dma memory off of the stack" }, + "CVE-2022-48626": { + "cmt_msg": "moxart: fix potential use-after-free on remove path" + }, "CVE-2022-3903": { "cmt_msg": "media: mceusb: Use new usb_control_msg_*() routines" }, + "CVE-2024-26642": { + "cmt_msg": "netfilter: nf_tables: disallow anonymous set with timeout flag" + }, "CVE-2022-3577": { "cmt_msg": "HID: bigben: fix slab-out-of-bounds Write in bigben_probe" }, @@ -141415,27 +184669,87 @@ "CVE-2019-0145": { "cmt_msg": "i40e: add num_vectors checker in iwarp handler" }, + "CVE-2021-47071": { + "cmt_msg": "uio_hv_generic: Fix a memory leak in error handling paths" + }, + "CVE-2021-47070": { + "cmt_msg": "uio_hv_generic: Fix another memory leak in error handling paths" + }, + "CVE-2021-47073": { + "cmt_msg": "platform/x86: dell-smbios-wmi: Fix oops on rmmod dell_smbios" + }, "CVE-2022-44034": { "cmt_msg": "char: pcmcia: remove all the drivers" }, - "CVE-2022-44033": { - "cmt_msg": "char: pcmcia: remove all the drivers" + "CVE-2021-47075": { + "cmt_msg": "nvmet: fix memory leak in nvmet_alloc_ctrl()" }, "CVE-2019-11191": { "cmt_msg": "x86: Deprecate a.out support" }, + "CVE-2021-47077": { + "cmt_msg": "scsi: qedf: Add pointer checks in qedf_update_link_speed()" + }, + "CVE-2021-47076": { + "cmt_msg": "RDMA/rxe: Return CQE error if invalid lkey was supplied" + }, + "CVE-2021-47170": { + "cmt_msg": "USB: usbfs: Don't WARN about excessively large memory allocations" + }, + "CVE-2021-47078": { + "cmt_msg": "RDMA/rxe: Clear all QP fields if creation failed" + }, + "CVE-2021-47172": { + "cmt_msg": "iio: adc: ad7124: Fix potential overflow due to non sequential channel numbers" + }, + "CVE-2021-47173": { + "cmt_msg": "misc/uss720: fix memory leak in uss720_probe" + }, + "CVE-2022-36123": { + "cmt_msg": "x86: Clear .brk area at early boot" + }, + "CVE-2021-47175": { + "cmt_msg": "net/sched: fq_pie: fix OOB access in the traffic path" + }, "CVE-2020-10781": { "cmt_msg": "Revert \"zram: convert remaining CLASS_ATTR() to CLASS_ATTR_RO()\"" }, + "CVE-2021-46951": { + "cmt_msg": "tpm: efi: Use local variable for calculating final log size" + }, + "CVE-2021-46950": { + "cmt_msg": "md/raid1: properly indicate failure when ending a failed write request" + }, + "CVE-2021-46953": { + "cmt_msg": "ACPI: GTDT: Don't corrupt interrupt mappings on watchdow probe failure" + }, + "CVE-2021-46952": { + "cmt_msg": "NFS: fs_context: validate UDP retrans to prevent shift out-of-bounds" + }, + "CVE-2021-46955": { + "cmt_msg": "openvswitch: fix stack OOB read while fragmenting IPv4 packets" + }, + "CVE-2024-0607": { + "cmt_msg": "netfilter: nf_tables: fix pointer math issue in nft_byteorder_eval()" + }, + "CVE-2021-46959": { + "cmt_msg": "spi: Fix use-after-free with devm_spi_alloc_*" + }, "CVE-2020-26139": { "cmt_msg": "mac80211: do not accept/forward invalid EAPOL frames" }, + "CVE-2024-26772": { + "cmt_msg": "ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal()" + }, "CVE-2019-10220": { "cmt_msg": "Convert filldir[64]() from __put_user() to unsafe_put_user()" }, "CVE-2021-3609": { "cmt_msg": "can: bcm: delay release of struct bcm_op after synchronize_rcu()" }, + "CVE-2023-52595": { + "cmt_msg": "wifi: rt2x00: restart beacon queue when hardware reset" + }, "CVE-2019-19536": { "cmt_msg": "can: peak_usb: pcan_usb_pro: Fix info-leaks to USB devices" }, @@ -141469,6 +184783,9 @@ "CVE-2019-20095": { "cmt_msg": "mwifiex: Fix mem leak in mwifiex_tm_cmd" }, + "CVE-2023-52590": { + "cmt_msg": "ocfs2: Avoid touching renamed directory if parent does not change" + }, "CVE-2019-20096": { "cmt_msg": "dccp: Fix memleak in __feat_register_sp" }, @@ -141478,18 +184795,21 @@ "CVE-2022-0168": { "cmt_msg": "cifs: fix NULL ptr dereference in smb2_ioctl_query_info()" }, - "CVE-2024-26587": { - "cmt_msg": "net: netdevsim: don't try to destroy PHC on VFs" - }, "CVE-2023-51043": { "cmt_msg": "drm/atomic: Fix potential use-after-free in nonblocking commits" }, "CVE-2020-28374": { "cmt_msg": "scsi: target: Fix XCOPY NAA identifier lookup" }, + "CVE-2023-52469": { + "cmt_msg": "drivers/amd/pm: fix a use-after-free in kv_parse_power_table" + }, "CVE-2023-0615": { "cmt_msg": "media: vivid: dev->bitmap_cap wasn't freed in all cases" }, + "CVE-2024-26672": { + "cmt_msg": "drm/amdgpu: Fix variable 'mca_funcs' dereferenced before NULL check in 'amdgpu_mca_smu_get_mca_entry()'" + }, "CVE-2019-14896": { "cmt_msg": "libertas: Fix two buffer overflows at parsing bss descriptor" }, @@ -141499,14 +184819,29 @@ "CVE-2019-14895": { "cmt_msg": "mwifiex: fix possible heap overflow in mwifiex_process_country_ie()" }, + "CVE-2024-26787": { + "cmt_msg": "mmc: mmci: stm32: fix DMA API overlapping mappings warning" + }, + "CVE-2023-52522": { + "cmt_msg": "net: fix possible store tearing in neigh_periodic_work()" + }, "CVE-2022-3586": { "cmt_msg": "sch_sfb: Don't assume the skb is still around after enqueueing to child" }, + "CVE-2024-26636": { + "cmt_msg": "llc: make llc_ui_sendmsg() more robust against bonding changes" + }, + "CVE-2024-26779": { + "cmt_msg": "wifi: mac80211: fix race condition on enabling fast-xmit" + }, + "CVE-2024-26594": { + "cmt_msg": "ksmbd: validate mech token in session setup" + }, "CVE-2024-26586": { "cmt_msg": "mlxsw: spectrum_acl_tcam: Fix stack corruption" }, - "CVE-2024-0646": { - "cmt_msg": "net: tls, update curr on splice as well" + "CVE-2023-52528": { + "cmt_msg": "net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg" }, "CVE-2020-27825": { "cmt_msg": "tracing: Fix race in trace_open and buffer resize call" @@ -141514,6 +184849,9 @@ "CVE-2019-2181": { "cmt_msg": "binder: check for overflow when alloc for security context" }, + "CVE-2022-20422": { + "cmt_msg": "arm64: fix oops in concurrently setting insn_emulation sysctls" + }, "CVE-2020-27820": { "cmt_msg": "drm/nouveau: use drm_dev_unplug() during device removal" }, @@ -141523,6 +184861,9 @@ "CVE-2020-0067": { "cmt_msg": "f2fs: fix to avoid memory leakage in f2fs_listxattr" }, + "CVE-2021-47151": { + "cmt_msg": "interconnect: qcom: bcm-voter: add a missing of_node_put()" + }, "CVE-2023-4622": { "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES" }, @@ -141541,6 +184882,9 @@ "CVE-2019-20811": { "cmt_msg": "net-sysfs: call dev_hold if kobject_init_and_add success" }, + "CVE-2024-26600": { + "cmt_msg": "phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP" + }, "CVE-2023-0045": { "cmt_msg": "x86/bugs: Flush IBP in ib_prctl_set()" }, @@ -141556,14 +184900,23 @@ "CVE-2021-33061": { "cmt_msg": "ixgbe: add improvement for MDD response functionality" }, + "CVE-2023-52559": { + "cmt_msg": "iommu/vt-d: Avoid memory allocation in iommu_suspend()" + }, + "CVE-2024-26767": { + "cmt_msg": "drm/amd/display: fixed integer types and null check locations" + }, + "CVE-2024-26766": { + "cmt_msg": "IB/hfi1: Fix sdma.h tx->num_descs off-by-one error" + }, "CVE-2024-26589": { "cmt_msg": "bpf: Reject variable offset alu on PTR_TO_FLOW_KEYS" }, "CVE-2023-1476": { "cmt_msg": "" }, - "CVE-2023-4010": { - "cmt_msg": "" + "CVE-2021-47144": { + "cmt_msg": "drm/amd/amdgpu: fix refcount leak" }, "CVE-2023-1074": { "cmt_msg": "sctp: fail if no bound addresses can be used for a given scope" @@ -141571,15 +184924,24 @@ "CVE-2021-3864": { "cmt_msg": "" }, + "CVE-2024-26770": { + "cmt_msg": "HID: nvidia-shield: Add missing null pointer checks to LED initialization" + }, "CVE-2023-1075": { "cmt_msg": "net/tls: tls_is_tx_ready() checked list_entry" }, + "CVE-2024-23307": { + "cmt_msg": "md/raid5: fix atomicity violation in raid5_cache_count" + }, "CVE-2022-1652": { "cmt_msg": "floppy: use a statically allocated error counter" }, "CVE-2023-4623": { "cmt_msg": "net/sched: sch_hfsc: Ensure inner classes have fsc curve" }, + "CVE-2024-26771": { + "cmt_msg": "dmaengine: ti: edma: Add some null pointer checks to the edma_probe" + }, "CVE-2024-23849": { "cmt_msg": "net/rds: Fix UBSAN: array-index-out-of-bounds in rds_cmsg_recv" }, @@ -141631,6 +184993,9 @@ "CVE-2020-0423": { "cmt_msg": "binder: fix UAF when releasing todo list" }, + "CVE-2022-23222": { + "cmt_msg": "bpf: Replace PTR_TO_XXX_OR_NULL with PTR_TO_XXX | PTR_MAYBE_NULL" + }, "CVE-2022-1789": { "cmt_msg": "KVM: x86/mmu: fix NULL pointer dereference on guest INVPCID" }, @@ -141641,7 +185006,7 @@ "cmt_msg": "" }, "CVE-2023-6270": { - "cmt_msg": "" + "cmt_msg": "aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts" }, "CVE-2023-3090": { "cmt_msg": "ipvlan:Fix out-of-bounds caused by unclear skb->cb" @@ -141661,14 +185026,14 @@ "CVE-2023-1582": { "cmt_msg": "fs/proc: task_mmu.c: don't read mapcount for migration entry" }, - "CVE-2022-1786": { - "cmt_msg": "io_uring: remove io_identity" + "CVE-2021-47162": { + "cmt_msg": "tipc: skb_linearize the head skb when reassembling msgs" }, "CVE-2019-17351": { "cmt_msg": "xen: let alloc_xenballooned_pages() fail if not enough memory free" }, - "CVE-2022-23222": { - "cmt_msg": "bpf: Replace PTR_TO_XXX_OR_NULL with PTR_TO_XXX | PTR_MAYBE_NULL" + "CVE-2022-21166": { + "cmt_msg": "x86/speculation/mmio: Enable CPU Fill buffer clearing on idle" }, "CVE-2020-25669": { "cmt_msg": "Input: sunkbd - avoid use-after-free in teardown paths" @@ -141682,6 +185047,9 @@ "CVE-2020-25705": { "cmt_msg": "icmp: randomize the global rate limiter" }, + "CVE-2022-20421": { + "cmt_msg": "binder: fix UAF of ref->proc caused by race condition" + }, "CVE-2022-0435": { "cmt_msg": "tipc: improve size validations for received domain records" }, @@ -141692,20 +185060,38 @@ "cmt_msg": "can: kvaser_usb: kvaser_usb_leaf: Fix some info-leaks to USB devices" }, "CVE-2023-6356": { + "cmt_msg": "nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length" + }, + "CVE-2022-3533": { "cmt_msg": "" }, + "CVE-2024-26648": { + "cmt_msg": "drm/amd/display: Fix variable deferencing before NULL check in edp_setup_replay()" + }, "CVE-2021-4135": { "cmt_msg": "netdevsim: Zero-initialize memory for new map's value in function nsim_bpf_map_alloc" }, "CVE-2023-26607": { "cmt_msg": "ntfs: fix out-of-bounds read in ntfs_attr_find()" }, - "CVE-2023-52456": { - "cmt_msg": "serial: imx: fix tx statemachine deadlock" + "CVE-2021-46965": { + "cmt_msg": "mtd: physmap: physmap-bt1-rom: Fix unintentional stack access" }, "CVE-2019-15239": { "cmt_msg": "unknown" }, + "CVE-2023-52635": { + "cmt_msg": "PM / devfreq: Synchronize devfreq_monitor_[start/stop]" + }, + "CVE-2021-46938": { + "cmt_msg": "dm rq: fix double free of blk_mq_tag_set in dev remove after table load fails" + }, + "CVE-2023-52633": { + "cmt_msg": "um: time-travel: fix time corruption" + }, + "CVE-2023-52632": { + "cmt_msg": "drm/amdkfd: Fix lock dependency warning with srcu" + }, "CVE-2021-4037": { "cmt_msg": "xfs: fix up non-directory creation in SGID directories" }, @@ -141727,6 +185113,12 @@ "CVE-2019-15292": { "cmt_msg": "appletalk: Fix use-after-free in atalk_proc_exit" }, + "CVE-2023-2194": { + "cmt_msg": "i2c: xgene-slimpro: Fix out-of-bounds bug in xgene_slimpro_i2c_xfer()" + }, + "CVE-2024-26740": { + "cmt_msg": "net/sched: act_mirred: use the backlog for mirred ingress" + }, "CVE-2021-3347": { "cmt_msg": "futex: Ensure the correct return value from futex_lock_pi()" }, @@ -141736,6 +185128,9 @@ "CVE-2020-25285": { "cmt_msg": "mm/hugetlb: fix a race between hugetlb sysctl handlers" }, + "CVE-2021-47169": { + "cmt_msg": "serial: rp2: use 'request_firmware' instead of 'request_firmware_nowait'" + }, "CVE-2021-45868": { "cmt_msg": "quota: check block number when reading the block in quota file" }, @@ -141748,8 +185143,8 @@ "CVE-2021-44733": { "cmt_msg": "tee: handle lookup of shm with reference count 0" }, - "CVE-2022-3533": { - "cmt_msg": "" + "CVE-2021-47137": { + "cmt_msg": "net: lantiq: fix memory corruption in RX ring" }, "CVE-2022-3534": { "cmt_msg": "libbpf: Fix use-after-free in btf_dump_name_dups" @@ -141757,33 +185152,60 @@ "CVE-2022-3535": { "cmt_msg": "net: mvpp2: fix mvpp2 debugfs leak" }, + "CVE-2021-47135": { + "cmt_msg": "mt76: mt7921: fix possible AOOB issue in mt7921_mcu_tx_rate_report" + }, + "CVE-2021-47136": { + "cmt_msg": "net: zero-initialize tc skb extension on allocation" + }, "CVE-2020-36516": { "cmt_msg": "ipv4: avoid using shared IP generator for connected sockets" }, + "CVE-2024-26808": { + "cmt_msg": "netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain" + }, + "CVE-2021-47131": { + "cmt_msg": "net/tls: Fix use-after-free after the TLS device goes down and up" + }, "CVE-2020-36766": { "cmt_msg": "cec-api: prevent leaking memory through hole in structure" }, + "CVE-2021-47133": { + "cmt_msg": "HID: amd_sfh: Fix memory leak in amd_sfh_work" + }, "CVE-2022-2977": { "cmt_msg": "tpm: fix reference counting for struct tpm_chip" }, + "CVE-2024-26675": { + "cmt_msg": "ppp_async: limit MRU to 64K" + }, "CVE-2022-3061": { "cmt_msg": "video: fbdev: i740fb: Error out if 'pixclock' equals zero" }, - "CVE-2023-28328": { - "cmt_msg": "media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer()" + "CVE-2021-46991": { + "cmt_msg": "i40e: Fix use-after-free in i40e_client_subtask()" }, "CVE-2022-0322": { "cmt_msg": "sctp: account stream padding length for reconf chunk" }, - "CVE-2023-0386": { - "cmt_msg": "ovl: fail on invalid uid/gid mapping at copy up" + "CVE-2021-46992": { + "cmt_msg": "netfilter: nftables: avoid overflows in nft_hash_buckets()" }, "CVE-2023-6121": { "cmt_msg": "nvmet: nul-terminate the NQNs passed in the connect command" }, + "CVE-2023-52638": { + "cmt_msg": "can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock" + }, + "CVE-2021-46998": { + "cmt_msg": "ethernet:enic: Fix a use after free bug in enic_hard_start_xmit" + }, "CVE-2017-13693": { "cmt_msg": "" }, + "CVE-2023-52481": { + "cmt_msg": "arm64: errata: Add Cortex-A520 speculative unprivileged load workaround" + }, "CVE-2017-13694": { "cmt_msg": "" }, @@ -141811,8 +185233,20 @@ "CVE-2021-3760": { "cmt_msg": "nfc: nci: fix the UAF of rf_conn_info object" }, - "CVE-2022-36123": { - "cmt_msg": "x86: Clear .brk area at early boot" + "CVE-2022-48627": { + "cmt_msg": "vt: fix memory overlapping when deleting chars in the buffer" + }, + "CVE-2023-52593": { + "cmt_msg": "wifi: wfx: fix possible NULL pointer dereference in wfx_set_mfp_ap()" + }, + "CVE-2021-47180": { + "cmt_msg": "NFC: nci: fix memory leak in nci_allocate_device" + }, + "CVE-2022-48628": { + "cmt_msg": "ceph: drop messages from MDS when unmounting" + }, + "CVE-2022-48629": { + "cmt_msg": "crypto: qcom-rng - ensure buffer for generate is completely filled" }, "CVE-2020-11608": { "cmt_msg": "media: ov519: add missing endpoint sanity checks" @@ -141850,6 +185284,12 @@ "CVE-2022-3545": { "cmt_msg": "nfp: fix use-after-free in area_cache_get()" }, + "CVE-2023-52569": { + "cmt_msg": "btrfs: remove BUG() after failure to insert delayed dir index item" + }, + "CVE-2023-52568": { + "cmt_msg": "x86/sgx: Resolves SECS reclaim vs. page fault for EAUG race" + }, "CVE-2020-14416": { "cmt_msg": "can, slip: Protect tty->disc_data in write_wakeup and close with RCU" }, @@ -141859,15 +185299,30 @@ "CVE-2022-3542": { "cmt_msg": "bnx2x: fix potential memory leak in bnx2x_tpa_stop()" }, + "CVE-2023-52563": { + "cmt_msg": "drm/meson: fix memory leak on ->hpd_notify callback" + }, + "CVE-2023-52561": { + "cmt_msg": "arm64: dts: qcom: sdm845-db845c: Mark cont splash memory region as reserved" + }, "CVE-2022-3344": { "cmt_msg": "KVM: x86: nSVM: harden svm_free_nested against freeing vmcb02 while still in use" }, + "CVE-2021-47004": { + "cmt_msg": "f2fs: fix to avoid touching checkpointed data in get_victim()" + }, + "CVE-2023-52566": { + "cmt_msg": "nilfs2: fix potential use after free in nilfs_gccache_submit_read_data()" + }, "CVE-2021-21781": { "cmt_msg": "ARM: ensure the signal page contains defined contents" }, "CVE-2021-0512": { "cmt_msg": "HID: make arrays usage and value to be the same" }, + "CVE-2021-46929": { + "cmt_msg": "sctp: use call_rcu to free endpoint" + }, "CVE-2023-1382": { "cmt_msg": "tipc: set con sock in tipc_conn_alloc" }, @@ -141877,6 +185332,15 @@ "CVE-2023-1380": { "cmt_msg": "wifi: brcmfmac: slab-out-of-bounds read in brcmf_get_assoc_ies()" }, + "CVE-2021-46924": { + "cmt_msg": "NFC: st21nfca: Fix memory leak in device probe and remove" + }, + "CVE-2021-46925": { + "cmt_msg": "net/smc: fix kernel panic caused by race of smc_sock" + }, + "CVE-2021-46926": { + "cmt_msg": "ALSA: hda: intel-sdw-acpi: harden detection of controller" + }, "CVE-2020-0347": { "cmt_msg": "" }, @@ -141886,6 +185350,9 @@ "CVE-2019-18808": { "cmt_msg": "crypto: ccp - Release all allocated memory if sha type is invalid" }, + "CVE-2023-52591": { + "cmt_msg": "reiserfs: Avoid touching renamed directory if parent does not change" + }, "CVE-2022-41222": { "cmt_msg": "mm/mremap: hold the rmap lock in write mode when moving page table entries." }, @@ -141916,23 +185383,38 @@ "CVE-2021-33656": { "cmt_msg": "vt: drop old FONT ioctls" }, + "CVE-2024-26713": { + "cmt_msg": "powerpc/pseries/iommu: Fix iommu initialisation during DLPAR add" + }, "CVE-2021-33655": { "cmt_msg": "fbcon: Disallow setting font bigger than screen size" }, + "CVE-2024-26804": { + "cmt_msg": "net: ip_tunnel: prevent perpetual headroom growth" + }, "CVE-2023-3611": { "cmt_msg": "net/sched: sch_qfq: account for stab overhead in qfq_enqueue" }, "CVE-2022-41858": { "cmt_msg": "drivers: net: slip: fix NPD bug in sl_tx_timeout()" }, + "CVE-2024-26726": { + "cmt_msg": "btrfs: don't drop extent_map for free space inode on write error" + }, + "CVE-2024-26671": { + "cmt_msg": "blk-mq: fix IO hang from sbitmap wakeup race" + }, "CVE-2023-1206": { "cmt_msg": "tcp: Reduce chance of collisions in inet6_hashfn()." }, "CVE-2022-41850": { "cmt_msg": "HID: roccat: Fix use-after-free in roccat_read()" }, - "CVE-2019-19525": { - "cmt_msg": "ieee802154: atusb: fix use-after-free at disconnect" + "CVE-2020-24503": { + "cmt_msg": "" + }, + "CVE-2023-52607": { + "cmt_msg": "powerpc/mm: Fix null-pointer dereference in pgtable_cache_add" }, "CVE-2023-2985": { "cmt_msg": "fs: hfsplus: fix UAF issue in hfsplus_put_super" @@ -141976,14 +185458,20 @@ "CVE-2020-0466": { "cmt_msg": "do_epoll_ctl(): clean the failure exits up a bit" }, + "CVE-2023-52516": { + "cmt_msg": "dma-debug: don't call __dma_entry_alloc_check_leak() under free_entries_lock" + }, "CVE-2021-4218": { "cmt_msg": "sysctl: pass kernel pointers to ->proc_handler" }, + "CVE-2023-52515": { + "cmt_msg": "RDMA/srp: Do not call scsi_done() from srp_abort()" + }, "CVE-2020-0543": { "cmt_msg": "x86/cpu: Add 'table' argument to cpu_matches()" }, - "CVE-2024-25739": { - "cmt_msg": "" + "CVE-2023-52510": { + "cmt_msg": "ieee802154: ca8210: Fix a potential UAF in ca8210_probe" }, "CVE-2023-3358": { "cmt_msg": "HID: intel_ish-hid: Add check for ishtp_dma_tx_map" @@ -141998,7 +185486,7 @@ "cmt_msg": "vt_kdsetmode: extend console locking" }, "CVE-2023-6536": { - "cmt_msg": "" + "cmt_msg": "nvmet-tcp: fix a crash in nvmet_req_complete()" }, "CVE-2019-11135": { "cmt_msg": "x86/msr: Add the IA32_TSX_CTRL MSR" @@ -142030,18 +185518,33 @@ "CVE-2024-1151": { "cmt_msg": "net: openvswitch: limit the number of recursions from action sets" }, + "CVE-2024-26659": { + "cmt_msg": "xhci: handle isoc Babble and Buffer Overrun events properly" + }, + "CVE-2024-26658": { + "cmt_msg": "bcachefs: grab s_umount only if snapshotting" + }, "CVE-2010-5321": { "cmt_msg": "" }, "CVE-2021-20322": { "cmt_msg": "ipv6: make exception cache less predictible" }, + "CVE-2024-26654": { + "cmt_msg": "ALSA: sh: aica: reorder cleanup operations to avoid UAF bugs" + }, "CVE-2021-20320": { "cmt_msg": "s390/bpf: Fix optimizing out zero-extensions" }, "CVE-2021-20321": { "cmt_msg": "ovl: fix missing negative dentry check in ovl_rename()" }, + "CVE-2024-26651": { + "cmt_msg": "sr9800: Add check for usbnet_get_endpoints" + }, + "CVE-2024-26650": { + "cmt_msg": "platform/x86: p2sb: Allow p2sb_bar() calls during PCI device probe" + }, "CVE-2022-26490": { "cmt_msg": "nfc: st21nfca: Fix potential buffer overflows in EVT_TRANSACTION" }, @@ -142063,15 +185566,33 @@ "CVE-2022-1048": { "cmt_msg": "ALSA: pcm: Fix races among concurrent hw_params and hw_free calls" }, + "CVE-2024-26696": { + "cmt_msg": "nilfs2: fix hang in nilfs_lookup_dirty_data_buffers()" + }, + "CVE-2023-52475": { + "cmt_msg": "Input: powermate - fix use-after-free in powermate_config_complete" + }, "CVE-2021-0342": { "cmt_msg": "tun: correct header offsets in napi frags mode" }, + "CVE-2023-52477": { + "cmt_msg": "usb: hub: Guard against accesses to uninitialized BOS descriptors" + }, + "CVE-2023-52476": { + "cmt_msg": "perf/x86/lbr: Filter vsyscall addresses" + }, "CVE-2023-22995": { "cmt_msg": "usb: dwc3: dwc3-qcom: Add missing platform_device_put() in dwc3_qcom_acpi_register_core" }, + "CVE-2023-52470": { + "cmt_msg": "drm/radeon: check the alloc_workqueue return value in radeon_crtc_init()" + }, "CVE-2024-21803": { "cmt_msg": "" }, + "CVE-2023-52479": { + "cmt_msg": "ksmbd: fix uaf in smb20_oplock_break_ack" + }, "CVE-2023-2176": { "cmt_msg": "RDMA/core: Refactor rdma_bind_addr" }, @@ -142087,6 +185608,9 @@ "CVE-2020-12659": { "cmt_msg": "xsk: Add missing check on user supplied headroom size" }, + "CVE-2024-22099": { + "cmt_msg": "Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security" + }, "CVE-2023-30456": { "cmt_msg": "KVM: nVMX: add missing consistency checks for CR0 and CR4" }, @@ -142114,6 +185638,9 @@ "CVE-2018-12928": { "cmt_msg": "" }, + "CVE-2024-26700": { + "cmt_msg": "drm/amd/display: Fix MST Null Ptr for RV" + }, "CVE-2020-36311": { "cmt_msg": "KVM: SVM: Periodically schedule when unregistering regions on destroy" }, @@ -142147,6 +185674,12 @@ "CVE-2024-25741": { "cmt_msg": "" }, + "CVE-2024-26778": { + "cmt_msg": "fbdev: savage: Error out if pixclock equals zero" + }, + "CVE-2024-26809": { + "cmt_msg": "netfilter: nft_set_pipapo: release elements in clone only from destroy path" + }, "CVE-2022-26966": { "cmt_msg": "sr9700: sanity check for packet length" }, @@ -142156,15 +185689,36 @@ "CVE-2023-1989": { "cmt_msg": "Bluetooth: btsdio: fix use after free bug in btsdio_remove due to unfinished work" }, + "CVE-2024-26806": { + "cmt_msg": "spi: cadence-qspi: remove system-wide suspend helper calls from runtime PM hooks" + }, "CVE-2020-12771": { "cmt_msg": "bcache: fix potential deadlock problem in btree_gc_coalesce" }, "CVE-2020-12770": { "cmt_msg": "scsi: sg: add sg_remove_request in sg_write" }, + "CVE-2024-26802": { + "cmt_msg": "stmmac: Clear variable when destroying workqueue" + }, + "CVE-2023-52508": { + "cmt_msg": "nvme-fc: Prevent null pointer dereference in nvme_fc_io_getuuid()" + }, + "CVE-2023-52606": { + "cmt_msg": "powerpc/lib: Validate size for vector operations" + }, "CVE-2022-20369": { "cmt_msg": "media: v4l2-mem2mem: Apply DST_QUEUE_OFF_BASE on MMAP buffers across ioctls" }, + "CVE-2023-52604": { + "cmt_msg": "FS:JFS:UBSAN:array-index-out-of-bounds in dbAdjTree" + }, + "CVE-2023-52531": { + "cmt_msg": "wifi: iwlwifi: mvm: Fix a memory corruption issue" + }, + "CVE-2023-52602": { + "cmt_msg": "jfs: fix slab-out-of-bounds Read in dtSearch" + }, "CVE-2021-3739": { "cmt_msg": "btrfs: fix NULL pointer dereference when deleting device by invalid id" }, @@ -142183,8 +185737,8 @@ "CVE-2020-10773": { "cmt_msg": "s390/cmm: fix information leak in cmm_timeout_handler()" }, - "CVE-2022-21499": { - "cmt_msg": "lockdown: also lock down previous kgdb use" + "CVE-2020-36782": { + "cmt_msg": "i2c: imx-lpi2c: fix reference leak when pm_runtime_get_sync fails" }, "CVE-2020-25284": { "cmt_msg": "rbd: require global CAP_SYS_ADMIN for mapping and unmapping" @@ -142216,6 +185770,9 @@ "CVE-2022-2663": { "cmt_msg": "netfilter: nf_conntrack_irc: Fix forged IP logic" }, + "CVE-2021-47049": { + "cmt_msg": "Drivers: hv: vmbus: Use after free in __vmbus_open()" + }, "CVE-2022-43750": { "cmt_msg": "usb: mon: make mmapped memory read only" }, @@ -142225,23 +185782,35 @@ "CVE-2023-0047": { "cmt_msg": "mm, oom: do not trigger out_of_memory from the #PF" }, + "CVE-2021-47046": { + "cmt_msg": "drm/amd/display: Fix off by one in hdmi_14_process_transaction()" + }, "CVE-2020-29370": { "cmt_msg": "mm: slub: add missing TID bump in kmem_cache_alloc_bulk()" }, "CVE-2019-15219": { "cmt_msg": "USB: sisusbvga: fix oops in error path of sisusb_probe" }, - "CVE-2022-38457": { - "cmt_msg": "drm/vmwgfx: Remove rcu locks from user resources" + "CVE-2021-47167": { + "cmt_msg": "NFS: Fix an Oopsable condition in __nfs_pageio_add_request()" }, - "CVE-2022-20424": { - "cmt_msg": "io_uring: remove io_identity" + "CVE-2021-47166": { + "cmt_msg": "NFS: Don't corrupt the value of pg_bytes_written in nfs_do_recoalesce()" }, - "CVE-2022-20422": { - "cmt_msg": "arm64: fix oops in concurrently setting insn_emulation sysctls" + "CVE-2021-47165": { + "cmt_msg": "drm/meson: fix shutdown crash when component not probed" }, - "CVE-2022-20421": { - "cmt_msg": "binder: fix UAF of ref->proc caused by race condition" + "CVE-2021-47163": { + "cmt_msg": "tipc: wait and exit until all work queues are done" + }, + "CVE-2021-46969": { + "cmt_msg": "bus: mhi: core: Fix invalid error returning in mhi_queue" + }, + "CVE-2021-47161": { + "cmt_msg": "spi: spi-fsl-dspi: Fix a resource leak in an error handling path" + }, + "CVE-2021-47160": { + "cmt_msg": "net: dsa: mt7530: fix VLAN traffic leaks" }, "CVE-2023-4385": { "cmt_msg": "fs: jfs: fix possible NULL pointer dereference in dbFree()" @@ -142252,15 +185821,33 @@ "CVE-2023-4387": { "cmt_msg": "net: vmxnet3: fix possible use-after-free bugs in vmxnet3_rq_alloc_rx_buf()" }, - "CVE-2024-24858": { - "cmt_msg": "" + "CVE-2021-46960": { + "cmt_msg": "cifs: Return correct error code from smb2_get_enc_key" + }, + "CVE-2021-46962": { + "cmt_msg": "mmc: uniphier-sd: Fix a resource leak in the remove function" + }, + "CVE-2021-47168": { + "cmt_msg": "NFS: fix an incorrect limit in filelayout_decode_layout()" }, "CVE-2019-19378": { "cmt_msg": "" }, + "CVE-2023-52482": { + "cmt_msg": "x86/srso: Add SRSO mitigation for Hygon processors" + }, + "CVE-2023-52599": { + "cmt_msg": "jfs: fix array-index-out-of-bounds in diNewExt" + }, + "CVE-2022-1016": { + "cmt_msg": "netfilter: nf_tables: initialize registers in nft_do_chain()" + }, "CVE-2020-4788": { "cmt_msg": "powerpc/64s: flush L1D on kernel entry" }, + "CVE-2024-26744": { + "cmt_msg": "RDMA/srpt: Support specifying the srpt_service_guid parameter" + }, "CVE-2022-36879": { "cmt_msg": "xfrm: xfrm_policy: fix a possible double xfrm_pols_put() in xfrm_bundle_lookup()" }, @@ -142294,8 +185881,8 @@ "CVE-2021-3612": { "cmt_msg": "Input: joydev - prevent potential read overflow in ioctl" }, - "CVE-2020-24503": { - "cmt_msg": "" + "CVE-2019-19525": { + "cmt_msg": "ieee802154: atusb: fix use-after-free at disconnect" }, "CVE-2020-24502": { "cmt_msg": "" @@ -142321,6 +185908,9 @@ "CVE-2021-0937": { "cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write" }, + "CVE-2023-52621": { + "cmt_msg": "bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers" + }, "CVE-2022-1263": { "cmt_msg": "KVM: avoid NULL pointer dereference in kvm_dirty_ring_push" }, @@ -142342,6 +185932,9 @@ "CVE-2019-16746": { "cmt_msg": "nl80211: validate beacon head" }, + "CVE-2023-52623": { + "cmt_msg": "SUNRPC: Fix a suspicious RCU usage warning" + }, "CVE-2021-41864": { "cmt_msg": "bpf: Fix integer overflow in prealloc_elems_and_freelist()" }, @@ -142351,14 +185944,20 @@ "CVE-2022-2209": { "cmt_msg": "" }, + "CVE-2023-52624": { + "cmt_msg": "drm/amd/display: Wake DMCUB before executing GPINT commands" + }, "CVE-2022-45887": { "cmt_msg": "media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb()" }, "CVE-2021-37576": { "cmt_msg": "KVM: PPC: Book3S: Fix H_RTAS rets buffer overflow" }, + "CVE-2024-26775": { + "cmt_msg": "aoe: avoid potential deadlock at set_capacity" + }, "CVE-2023-7042": { - "cmt_msg": "" + "cmt_msg": "wifi: ath10k: fix NULL pointer dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev()" }, "CVE-2022-3594": { "cmt_msg": "r8152: Rate limit overflow messages" @@ -142376,23 +185975,38 @@ "cmt_msg": "tipc: fix NULL deref in tipc_link_xmit()" }, "CVE-2023-47233": { - "cmt_msg": "" + "cmt_msg": "wifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach" }, "CVE-2020-27815": { "cmt_msg": "jfs: Fix array index bounds check in dbAdjTree" }, + "CVE-2023-52629": { + "cmt_msg": "sh: push-switch: Reorder cleanup operations to avoid use-after-free bug" + }, + "CVE-2024-26736": { + "cmt_msg": "afs: Increase buffer size in afs_update_volume_status()" + }, "CVE-2022-23041": { "cmt_msg": "xen/9p: use alloc/free_pages_exact()" }, "CVE-2022-1462": { "cmt_msg": "tty: use new tty_insert_flip_string_and_push_buffer() in pty_write()" }, + "CVE-2024-26758": { + "cmt_msg": "md: Don't ignore suspended array in md_check_recovery()" + }, + "CVE-2024-26759": { + "cmt_msg": "mm/swap: fix race when skipping swapcache" + }, "CVE-2022-3115": { "cmt_msg": "drm: mali-dp: potential dereference of null pointer" }, "CVE-2023-6606": { "cmt_msg": "smb: client: fix OOB in smbCalcSize()" }, + "CVE-2024-26614": { + "cmt_msg": "tcp: make sure init the accept_queue's spinlocks once" + }, "CVE-2020-27777": { "cmt_msg": "powerpc/rtas: Restrict RTAS requests from userspace" }, @@ -142405,12 +186019,24 @@ "CVE-2019-11487": { "cmt_msg": "fs: prevent page refcount overflow in pipe_buf_get" }, + "CVE-2024-26752": { + "cmt_msg": "l2tp: pass correct message length to ip6_append_data" + }, "CVE-2020-27673": { "cmt_msg": "xen/events: add a proper barrier to 2-level uevent unmasking" }, + "CVE-2024-26754": { + "cmt_msg": "gtp: fix use-after-free and null-ptr-deref in gtp_genl_dump_pdp()" + }, "CVE-2020-27675": { "cmt_msg": "xen/events: avoid removing an event channel while handling it" }, + "CVE-2024-26756": { + "cmt_msg": "md: Don't register sync_thread for reshape directly" + }, + "CVE-2024-26757": { + "cmt_msg": "md: Don't ignore read-only array in md_check_recovery()" + }, "CVE-2023-52439": { "cmt_msg": "uio: Fix use-after-free in uio_open" }, @@ -142429,6 +186055,9 @@ "CVE-2022-23040": { "cmt_msg": "xen/xenbus: don't let xenbus_grant_ring() remove grants in error case" }, + "CVE-2024-26805": { + "cmt_msg": "netlink: Fix kernel-infoleak-after-free in __skb_datagram_iter" + }, "CVE-2022-3111": { "cmt_msg": "power: supply: wm8350-power: Add missing free in free_charger_irq" }, @@ -142471,6 +186100,9 @@ "CVE-2020-0432": { "cmt_msg": "staging: most: net: fix buffer overflow" }, + "CVE-2024-26687": { + "cmt_msg": "xen/events: close evtchn after mapping cleanup" + }, "CVE-2023-51779": { "cmt_msg": "Bluetooth: af_bluetooth: Fix Use-After-Free in bt_sock_recvmsg" }, @@ -142486,6 +186118,9 @@ "CVE-2010-4563": { "cmt_msg": "" }, + "CVE-2021-47006": { + "cmt_msg": "ARM: 9064/1: hw_breakpoint: Do not directly check the event's overflow_handler hook" + }, "CVE-2023-1249": { "cmt_msg": "coredump: Use the vma snapshot in fill_files_note" }, @@ -142504,15 +186139,21 @@ "CVE-2023-0266": { "cmt_msg": "ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF" }, - "CVE-2023-1838": { - "cmt_msg": "Fix double fget() in vhost_net_set_backend()" + "CVE-2021-46928": { + "cmt_msg": "parisc: Clear stale IIR value on instruction access rights trap" }, "CVE-2021-3483": { "cmt_msg": "firewire: nosy: Fix a use-after-free bug in nosy_ioctl()" }, + "CVE-2024-26663": { + "cmt_msg": "tipc: Check the bearer type before calling tipc_udp_nl_bearer_add()" + }, "CVE-2021-20177": { "cmt_msg": "netfilter: add and use nf_hook_slow_list()" }, + "CVE-2024-26598": { + "cmt_msg": "KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache" + }, "CVE-2023-6040": { "cmt_msg": "netfilter: nf_tables: Reject tables of unsupported family" }, @@ -142531,8 +186172,8 @@ "CVE-2022-24448": { "cmt_msg": "NFSv4: Handle case where the lookup of a directory fails" }, - "CVE-2024-26598": { - "cmt_msg": "KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache" + "CVE-2023-52498": { + "cmt_msg": "PM: sleep: Fix possible deadlocks in core system-wide PM code" }, "CVE-2019-16229": { "cmt_msg": "drm/amdkfd: fix a potential NULL pointer dereference (v2)" @@ -142540,9 +186181,15 @@ "CVE-2019-10142": { "cmt_msg": "drivers/virt/fsl_hypervisor.c: prevent integer overflow in ioctl" }, + "CVE-2024-26774": { + "cmt_msg": "ext4: avoid dividing by 0 in mb_update_avg_fragment_size() when block bitmap corrupt" + }, "CVE-2021-4023": { "cmt_msg": "io-wq: fix cancellation on create-worker failure" }, + "CVE-2023-52640": { + "cmt_msg": "fs/ntfs3: Fix oob in ntfs_listxattr" + }, "CVE-2023-3268": { "cmt_msg": "relayfs: fix out-of-bounds access in relay_file_read" }, @@ -142555,23 +186202,41 @@ "CVE-2021-0399": { "cmt_msg": "" }, + "CVE-2023-52488": { + "cmt_msg": "serial: sc16is7xx: convert from _raw_ to _noinc_ regmap functions for FIFO" + }, "CVE-2020-36691": { "cmt_msg": "netlink: limit recursion depth in policy validation" }, + "CVE-2021-47179": { + "cmt_msg": "NFSv4: Fix a NULL pointer dereference in pnfs_mark_matching_lsegs_return()" + }, "CVE-2023-42755": { "cmt_msg": "net/sched: Retire rsvp classifier" }, "CVE-2020-2732": { "cmt_msg": "KVM: nVMX: Don't emulate instructions in guest mode" }, + "CVE-2023-52486": { + "cmt_msg": "drm: Don't unref the same fb many times by mistake due to deadlock handling" + }, + "CVE-2024-26791": { + "cmt_msg": "btrfs: dev-replace: properly validate device names" + }, + "CVE-2023-52480": { + "cmt_msg": "ksmbd: fix race condition between session lookup and expire" + }, "CVE-2012-4542": { "cmt_msg": "" }, "CVE-2022-1729": { "cmt_msg": "perf: Fix sys_perf_event_open() race against self" }, - "CVE-2023-42752": { - "cmt_msg": "igmp: limit igmpv3_newpack() packet size to IP_MAX_MTU" + "CVE-2023-1838": { + "cmt_msg": "Fix double fget() in vhost_net_set_backend()" + }, + "CVE-2023-28328": { + "cmt_msg": "media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer()" }, "CVE-2023-4128": { "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free" @@ -142579,17 +186244,29 @@ "CVE-2021-3573": { "cmt_msg": "Bluetooth: use correct lock to prevent UAF of hdev object" }, + "CVE-2021-46921": { + "cmt_msg": "locking/qrwlock: Fix ordering in queued_write_lock_slowpath()" + }, "CVE-2023-3609": { "cmt_msg": "net/sched: cls_u32: Fix reference counter leak leading to overflow" }, + "CVE-2022-44033": { + "cmt_msg": "char: pcmcia: remove all the drivers" + }, "CVE-2022-1974": { "cmt_msg": "nfc: replace improper check device_is_registered() in netlink related functions" }, "CVE-2022-1975": { "cmt_msg": "NFC: netlink: fix sleep in atomic bug when firmware download timeout" }, - "CVE-2022-44032": { - "cmt_msg": "char: pcmcia: remove all the drivers" + "CVE-2023-52491": { + "cmt_msg": "media: mtk-jpeg: Fix use after free bug due to error path handling in mtk_jpeg_dec_device_run" + }, + "CVE-2021-47074": { + "cmt_msg": "nvme-loop: fix memory leak in nvme_loop_create_ctrl()" + }, + "CVE-2020-36777": { + "cmt_msg": "media: dvbdev: Fix memory leak in dvb_media_device_free()" }, "CVE-2021-28972": { "cmt_msg": "PCI: rpadlpar: Fix potential drc_name corruption in store functions" @@ -142597,18 +186274,30 @@ "CVE-2018-12130": { "cmt_msg": "s390/speculation: Support 'mitigations=' cmdline option" }, + "CVE-2021-47083": { + "cmt_msg": "pinctrl: mediatek: fix global-out-of-bounds issue" + }, "CVE-2021-20292": { "cmt_msg": "drm/ttm/nouveau: don't call tt destroy callback on alloc failure." }, "CVE-2021-31916": { "cmt_msg": "dm ioctl: fix out of bounds array access when no devices" }, + "CVE-2021-47086": { + "cmt_msg": "phonet/pep: refuse to enable an unbound pipe" + }, "CVE-2022-32981": { "cmt_msg": "powerpc/32: Fix overread/overwrite of thread_struct via ptrace" }, + "CVE-2021-47122": { + "cmt_msg": "net: caif: fix memory leak in caif_device_notify" + }, "CVE-2020-25645": { "cmt_msg": "geneve: add transport ports in route lookup for geneve" }, + "CVE-2021-47120": { + "cmt_msg": "HID: magicmouse: fix NULL-deref on disconnect" + }, "CVE-2022-1280": { "cmt_msg": "drm: avoid circular locks in drm_mode_getconnector" }, @@ -142630,9 +186319,15 @@ "CVE-2023-0394": { "cmt_msg": "ipv6: raw: Deduct extension header length in rawv6_push_pending_frames" }, + "CVE-2021-47171": { + "cmt_msg": "net: usb: fix memory leak in smsc75xx_bind" + }, "CVE-2020-10690": { "cmt_msg": "ptp: fix the race between the release of ptp_clock and cdev" }, + "CVE-2024-26615": { + "cmt_msg": "net/smc: fix illegal rmb_desc access in SMC-D connection dump" + }, "CVE-2019-12817": { "cmt_msg": "powerpc/mm/64s/hash: Reallocate context ids on fork" }, @@ -142645,6 +186340,9 @@ "CVE-2019-15117": { "cmt_msg": "ALSA: usb-audio: Fix an OOB bug in parse_audio_mixer_unit" }, + "CVE-2023-0386": { + "cmt_msg": "ovl: fail on invalid uid/gid mapping at copy up" + }, "CVE-2021-3659": { "cmt_msg": "net: mac802154: Fix general protection fault" }, @@ -142663,6 +186361,9 @@ "CVE-2020-3702": { "cmt_msg": "ath: Use safer key clearing with key cache entries" }, + "CVE-2023-52485": { + "cmt_msg": "drm/amd/display: Wake DMCUB before sending a command" + }, "CVE-2021-3653": { "cmt_msg": "KVM: nSVM: avoid picking up unsupported bits from L2 in int_ctl (CVE-2021-3653)" }, @@ -142690,6 +186391,12 @@ "CVE-2021-3714": { "cmt_msg": "" }, + "CVE-2021-47103": { + "cmt_msg": "inet: fully convert sk->sk_rx_dst to RCU rules" + }, + "CVE-2021-46932": { + "cmt_msg": "Input: appletouch - initialize work before device registration" + }, "CVE-2019-16230": { "cmt_msg": "drm/amdkfd: fix a potential NULL pointer dereference (v2)" }, @@ -142750,26 +186457,56 @@ "CVE-2022-33744": { "cmt_msg": "xen/arm: Fix race in RB-tree based P2M accounting" }, + "CVE-2023-52596": { + "cmt_msg": "sysctl: Fix out of bounds access for empty sysctl registers" + }, + "CVE-2023-52597": { + "cmt_msg": "KVM: s390: fix setting of fpc register" + }, + "CVE-2023-52594": { + "cmt_msg": "wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus()" + }, "CVE-2022-40768": { "cmt_msg": "scsi: stex: Properly zero out the passthrough command structure" }, + "CVE-2021-47013": { + "cmt_msg": "net:emac/emac-mac: Fix a use after free in emac_mac_tx_buf_send" + }, "CVE-2022-3707": { "cmt_msg": "drm/i915/gvt: fix double free bug in split_2MB_gtt_entry" }, + "CVE-2021-47158": { + "cmt_msg": "net: dsa: sja1105: add error handling in sja1105_setup()" + }, + "CVE-2021-47010": { + "cmt_msg": "net: Only allow init netns to set default tcp cong to a restricted algo" + }, "CVE-2021-45486": { "cmt_msg": "inet: use bigger hash table for IP ID generation" }, "CVE-2020-12888": { "cmt_msg": "vfio-pci: Invalidate mmaps and block MMIO access on disabled memory" }, - "CVE-2023-2194": { - "cmt_msg": "i2c: xgene-slimpro: Fix out-of-bounds bug in xgene_slimpro_i2c_xfer()" + "CVE-2021-47153": { + "cmt_msg": "i2c: i801: Don't generate an interrupt on bus reset" + }, + "CVE-2021-47150": { + "cmt_msg": "net: fec: fix the potential memory leak in fec_enet_init()" }, "CVE-2021-3923": { "cmt_msg": "RDMA/core: Don't infoleak GRH fields" }, - "CVE-2022-41218": { - "cmt_msg": "media: dvb-core: Fix UAF due to refcount races at releasing" + "CVE-2021-46936": { + "cmt_msg": "net: fix use-after-free in tw_timer_handler" + }, + "CVE-2021-46935": { + "cmt_msg": "binder: fix async_free_space accounting for empty parcels" + }, + "CVE-2021-46934": { + "cmt_msg": "i2c: validate user data in compat ioctl" + }, + "CVE-2021-46933": { + "cmt_msg": "usb: gadget: f_fs: Clear ffs_eventfd in ffs_data_clear." }, "CVE-2019-20934": { "cmt_msg": "sched/fair: Don't free p->numa_faults with concurrent readers" @@ -142792,8 +186529,8 @@ "CVE-2019-19447": { "cmt_msg": "ext4: work around deleting a file with i_nlink == 0 safely" }, - "CVE-2022-21166": { - "cmt_msg": "x86/speculation/mmio: Enable CPU Fill buffer clearing on idle" + "CVE-2021-46939": { + "cmt_msg": "tracing: Restructure trace_clock_global() to never block" }, "CVE-2020-29374": { "cmt_msg": "gup: document and work around \"COW can break either way\" issue" @@ -142801,6 +186538,9 @@ "CVE-2019-25045": { "cmt_msg": "xfrm: clean up xfrm protocol checks" }, + "CVE-2024-26622": { + "cmt_msg": "tomoyo: fix UAF write bug in tomoyo_write_control()" + }, "CVE-2023-52449": { "cmt_msg": "mtd: Fix gluebi NULL pointer dereference caused by ftl notifier" }, @@ -142810,6 +186550,9 @@ "CVE-2019-18806": { "cmt_msg": "net: qlogic: Fix memory leak in ql_alloc_large_buffers" }, + "CVE-2023-4010": { + "cmt_msg": "" + }, "CVE-2020-36558": { "cmt_msg": "vt: vt_ioctl: fix race in VT_RESIZEX" }, @@ -142822,6 +186565,9 @@ "CVE-2020-36312": { "cmt_msg": "KVM: fix memory leak in kvm_io_bus_unregister_dev()" }, + "CVE-2024-26720": { + "cmt_msg": "mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again" + }, "CVE-2022-1353": { "cmt_msg": "af_key: add __GFP_ZERO flag for compose_sadb_supported in function pfkey_register" }, @@ -142846,11 +186592,17 @@ "CVE-2021-39800": { "cmt_msg": "" }, + "CVE-2024-26676": { + "cmt_msg": "af_unix: Call kfree_skb() for dead unix_(sk)->oob_skb in GC." + }, + "CVE-2024-26784": { + "cmt_msg": "pmdomain: arm: Fix NULL dereference on scmi_perf_domain removal" + }, "CVE-2022-1195": { "cmt_msg": "hamradio: improve the incomplete fix to avoid NPD" }, - "CVE-2024-22099": { - "cmt_msg": "" + "CVE-2023-3863": { + "cmt_msg": "net: nfc: Fix use-after-free caused by nfc_llcp_find_local" }, "CVE-2021-4202": { "cmt_msg": "NFC: reorganize the functions in nci_request" @@ -142864,6 +186616,9 @@ "CVE-2022-45886": { "cmt_msg": "media: dvb-core: Fix use-after-free due on race condition at dvb_net" }, + "CVE-2023-52509": { + "cmt_msg": "ravb: Fix use-after-free issue in ravb_tx_timeout_work()" + }, "CVE-2023-46343": { "cmt_msg": "nfc: nci: fix possible NULL pointer dereference in send_acknowledge()" }, @@ -142873,11 +186628,23 @@ "CVE-2023-5178": { "cmt_msg": "nvmet-tcp: Fix a possible UAF in queue intialization setup" }, + "CVE-2023-52504": { + "cmt_msg": "x86/alternatives: Disable KASAN in apply_alternatives()" + }, + "CVE-2023-52507": { + "cmt_msg": "nfc: nci: assert requested protocol is valid" + }, "CVE-2023-2124": { "cmt_msg": "xfs: verify buffer contents when we skip log replay" }, - "CVE-2024-26594": { - "cmt_msg": "ksmbd: validate mech token in session setup" + "CVE-2023-52501": { + "cmt_msg": "ring-buffer: Do not attempt to read past \"commit\"" + }, + "CVE-2023-52500": { + "cmt_msg": "scsi: pm80xx: Avoid leaking tags when processing OPC_INB_SET_CONTROLLER_CONFIG command" + }, + "CVE-2023-52502": { + "cmt_msg": "net: nfc: fix races in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn()" }, "CVE-2023-1281": { "cmt_msg": "net/sched: tcindex: update imperfect hash filters respecting rcu" @@ -142903,9 +186670,24 @@ "CVE-2022-27672": { "cmt_msg": "x86/speculation: Identify processors vulnerable to SMT RSB predictions" }, + "CVE-2024-26623": { + "cmt_msg": "pds_core: Prevent race issues involving the adminq" + }, + "CVE-2024-26719": { + "cmt_msg": "nouveau: offload fence uevents work to workqueue" + }, + "CVE-2024-26668": { + "cmt_msg": "netfilter: nft_limit: reject configurations that cause integer overflow" + }, "CVE-2022-2964": { "cmt_msg": "net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup" }, + "CVE-2021-47146": { + "cmt_msg": "mld: fix panic in mld_newpack()" + }, + "CVE-2022-38457": { + "cmt_msg": "drm/vmwgfx: Remove rcu locks from user resources" + }, "CVE-2015-2877": { "cmt_msg": "" }, @@ -142915,6 +186697,9 @@ "CVE-2023-26242": { "cmt_msg": "" }, + "CVE-2024-26664": { + "cmt_msg": "hwmon: (coretemp) Fix out-of-bounds memory access" + }, "CVE-2019-16089": { "cmt_msg": "" }, @@ -142924,18 +186709,30 @@ "CVE-2021-38199": { "cmt_msg": "NFSv4: Initialise connection to the server in nfs4_alloc_client()" }, + "CVE-2024-26689": { + "cmt_msg": "ceph: prevent use-after-free in encode_cap_msg()" + }, "CVE-2022-1679": { "cmt_msg": "ath9k: fix use-after-free in ath9k_hif_usb_rx_cb" }, "CVE-2023-34256": { "cmt_msg": "ext4: avoid a potential slab-out-of-bounds in ext4_group_desc_csum" }, + "CVE-2024-26763": { + "cmt_msg": "dm-crypt: don't modify the data when using authenticated encryption" + }, + "CVE-2024-26715": { + "cmt_msg": "usb: dwc3: gadget: Fix NULL pointer dereference in dwc3_gadget_suspend" + }, "CVE-2023-1513": { "cmt_msg": "kvm: initialize all of the kvm_debugregs structure before sending it to userspace" }, "CVE-2021-26401": { "cmt_msg": "x86/speculation: Use generic retpoline by default on AMD" }, + "CVE-2024-1312": { + "cmt_msg": "mm: lock_vma_under_rcu() must check vma->anon_vma under vma lock" + }, "CVE-2020-28941": { "cmt_msg": "speakup: Do not let the line discipline be used several times" }, @@ -142981,6 +186778,9 @@ "CVE-2019-15807": { "cmt_msg": "scsi: libsas: delete sas port if expander discover failed" }, + "CVE-2024-26733": { + "cmt_msg": "arp: Prevent overflow in arp_req_get()." + }, "CVE-2019-10638": { "cmt_msg": "inet: switch IP ID generator to siphash" }, @@ -142990,8 +186790,8 @@ "CVE-2019-5489": { "cmt_msg": "Change mincore() to count \"mapped\" pages rather than \"cached\" pages" }, - "CVE-2024-1312": { - "cmt_msg": "mm: lock_vma_under_rcu() must check vma->anon_vma under vma lock" + "CVE-2021-47082": { + "cmt_msg": "tun: avoid double free in tun_free_netdev" }, "CVE-2019-14284": { "cmt_msg": "floppy: fix div-by-zero in setup_format_params" @@ -144099,6 +187899,10 @@ "cmt_msg": "net: mac802154: Fix general protection fault", "cmt_id": "38ea2b3ed00fb4632a706f2c796d6aa4a884f573" }, + "CVE-2021-46904": { + "cmt_msg": "net: hso: fix null-ptr-deref during tty device unregistration", + "cmt_id": "4a2933c88399c0ebc738db39bbce3ae89786d723" + }, "CVE-2020-25672": { "cmt_msg": "nfc: fix memory leak in llcp_sock_connect()", "cmt_id": "404daa4d62a364623b48349eb73a18579edf51ac" @@ -144127,28 +187931,102 @@ } }, "5.4.114": { + "CVE-2021-46915": { + "cmt_msg": "netfilter: nft_limit: avoid possible divide error in nft_limit_init", + "cmt_id": "01fb1626b620cb37a65ad08e0f626489e8f042ef" + }, "CVE-2021-23133": { "cmt_msg": "net/sctp: fix race condition in sctp_destroy_sock", "cmt_id": "6180d2274b17fc0473fb0764d3417c0bddb99b2e" + }, + "CVE-2021-46909": { + "cmt_msg": "ARM: footbridge: fix PCI interrupt mapping", + "cmt_id": "871b569a3e67f570df9f5ba195444dc7c621293b" + } + }, + "5.4.115": { + "CVE-2021-46921": { + "cmt_msg": "locking/qrwlock: Fix ordering in queued_write_lock_slowpath()", + "cmt_id": "82808cc026811fbc3ecf0c0b267a12a339eead56" } }, "5.4.117": { + "CVE-2021-46971": { + "cmt_msg": "perf/core: Fix unconditional security_locked_down() call", + "cmt_id": "b246759284d6a2bc5b6f1009caeeb3abce2ec9ff" + }, "CVE-2021-31829": { "cmt_msg": "bpf: Fix masking negation logic upon negative dst register", "cmt_id": "53e0db429b37a32b8fc706d0d90eb4583ad13848" + }, + "CVE-2021-46974": { + "cmt_msg": "bpf: Fix masking negation logic upon negative dst register", + "cmt_id": "53e0db429b37a32b8fc706d0d90eb4583ad13848" } }, "5.4.118": { + "CVE-2020-36777": { + "cmt_msg": "media: dvbdev: Fix memory leak in dvb_media_device_free()", + "cmt_id": "9185b3b1c143b8da409c19ac5a785aa18d67a81b" + }, + "CVE-2021-46943": { + "cmt_msg": "media: staging/intel-ipu3: Fix set_fmt error handling", + "cmt_id": "a03fb1e8a110658215a4cefc3e2ad53279e496a6" + }, + "CVE-2021-46953": { + "cmt_msg": "ACPI: GTDT: Don't corrupt interrupt mappings on watchdow probe failure", + "cmt_id": "504632a3577a049dd9bb7aabae5b4476f9c586b4" + }, + "CVE-2021-46955": { + "cmt_msg": "openvswitch: fix stack OOB read while fragmenting IPv4 packets", + "cmt_id": "490ad0a2390442d0a7b8c00972a83dbb09cab142" + }, "CVE-2021-3506": { "cmt_msg": "f2fs: fix to avoid out-of-bounds memory access", "cmt_id": "27a130638406815eba083c632ee083f0c5e688c2" + }, + "CVE-2021-46944": { + "cmt_msg": "media: staging/intel-ipu3: Fix memory leak in imu_fmt", + "cmt_id": "ff792ae52005c85a2d829c153e08d99a356e007d" + }, + "CVE-2021-46950": { + "cmt_msg": "md/raid1: properly indicate failure when ending a failed write request", + "cmt_id": "6920cef604fa57f9409e3960413e9cc11f5c5a40" + }, + "CVE-2021-46951": { + "cmt_msg": "tpm: efi: Use local variable for calculating final log size", + "cmt_id": "2f12258b5224cfaa808c54fd29345f3c1cbfca76" + }, + "CVE-2021-46956": { + "cmt_msg": "virtiofs: fix memory leak in virtio_fs_probe()", + "cmt_id": "310efc95c72c13faf855c692d19cd4d054d827c8" + }, + "CVE-2021-46939": { + "cmt_msg": "tracing: Restructure trace_clock_global() to never block", + "cmt_id": "c64da3294a7d59a4bf6874c664c13be892f15f44" + }, + "CVE-2021-46938": { + "cmt_msg": "dm rq: fix double free of blk_mq_tag_set in dev remove after table load fails", + "cmt_id": "a992a283c0b77d0a7c2c348add0e6a21fb1dab67" + }, + "CVE-2021-46966": { + "cmt_msg": "ACPI: custom_method: fix potential use-after-free issue", + "cmt_id": "72814a94c38a33239793f7622cec6ace1e540c4b" + }, + "CVE-2021-46960": { + "cmt_msg": "cifs: Return correct error code from smb2_get_enc_key", + "cmt_id": "93f3339b22ba17e66f0808737467b70ba087eaec" + }, + "CVE-2021-46961": { + "cmt_msg": "irqchip/gic-v3: Do not enable irqs when handling spurious interrups", + "cmt_id": "e7ea8e46e3b777be26aa855fe07778c415f24926" + }, + "CVE-2021-46962": { + "cmt_msg": "mmc: uniphier-sd: Fix a resource leak in the remove function", + "cmt_id": "0d8941b9b2d3e7b3481fdf43b1a6189d162175b7" } }, "5.4.119": { - "CVE-2021-33034": { - "cmt_msg": "Bluetooth: verify AMP hci_chan before amp_destroy", - "cmt_id": "3a826ffa80d5c73ad7338fd98ace9c5b53844968" - }, "CVE-2021-45486": { "cmt_msg": "inet: use bigger hash table for IP ID generation", "cmt_id": "fee81285bd09ec2080ce2cbb5063aad0e58eb272" @@ -144156,29 +188034,203 @@ "CVE-2021-32399": { "cmt_msg": "bluetooth: eliminate the potential race condition when removing the HCI controller", "cmt_id": "eeec325c9944b4427f482018d00b737220c31fd9" + }, + "CVE-2020-36782": { + "cmt_msg": "i2c: imx-lpi2c: fix reference leak when pm_runtime_get_sync fails", + "cmt_id": "815859cb1d2302e74f11bf6894bceace9ca9eb4a" + }, + "CVE-2020-36783": { + "cmt_msg": "i2c: img-scb: fix reference leak when pm_runtime_get_sync fails", + "cmt_id": "4734c4b1d9573c9d20bbc46cf37dde095ee011b8" + }, + "CVE-2020-36780": { + "cmt_msg": "i2c: sprd: fix reference leak when pm_runtime_get_sync fails", + "cmt_id": "7e1764312440c5df9dfe6b436035a03673b0c1b9" + }, + "CVE-2021-47065": { + "cmt_msg": "rtw88: Fix array overrun in rtw_get_tx_power_params()", + "cmt_id": "6b5aa0cf321c25f41e09a61c83ee4dc7ab9549cb" + }, + "CVE-2020-36787": { + "cmt_msg": "media: aspeed: fix clock handling logic", + "cmt_id": "1dc1d30ac101bb8335d9852de2107af60c2580e7" + }, + "CVE-2021-47056": { + "cmt_msg": "crypto: qat - ADF_STATUS_PF_RUNNING should be set after adf_dev_init", + "cmt_id": "05ec8192ee4bfdf2a8894a68350dac9f1a155fa6" + }, + "CVE-2021-47041": { + "cmt_msg": "nvmet-tcp: fix incorrect locking in state_change sk callback", + "cmt_id": "999d606a820c36ae9b9e9611360c8b3d8d4bb777" + }, + "CVE-2021-47016": { + "cmt_msg": "m68k: mvme147,mvme16x: Don't wipe PCC timer config bits", + "cmt_id": "f6a90818a32058fca62cda3a2027a6a2364e1878" + }, + "CVE-2021-33034": { + "cmt_msg": "Bluetooth: verify AMP hci_chan before amp_destroy", + "cmt_id": "3a826ffa80d5c73ad7338fd98ace9c5b53844968" + }, + "CVE-2021-47013": { + "cmt_msg": "net:emac/emac-mac: Fix a use after free in emac_mac_tx_buf_send", + "cmt_id": "55fcdd1258faaecca74b91b88cc0921f9edd775d" + }, + "CVE-2021-47012": { + "cmt_msg": "RDMA/siw: Fix a use after free in siw_alloc_mr", + "cmt_id": "30b9e92d0b5e5d5dc1101ab856c17009537cbca4" + }, + "CVE-2021-47010": { + "cmt_msg": "net: Only allow init netns to set default tcp cong to a restricted algo", + "cmt_id": "9884f745108f7d25b189bbcd6754e284fb29ab68" + }, + "CVE-2021-47034": { + "cmt_msg": "powerpc/64s: Fix pte update for kernel memory on radix", + "cmt_id": "73f9dccb29e4f82574bec2765c0090cdb0404301" + }, + "CVE-2021-47054": { + "cmt_msg": "bus: qcom: Put child node before return", + "cmt_id": "3a76ec28824c01b57aa1f0927841d75e4f167cb8" + }, + "CVE-2021-47015": { + "cmt_msg": "bnxt_en: Fix RX consumer index logic in the error path.", + "cmt_id": "b1523e4ba293b2a32d9fabaf70c1dcaa6e3e2847" + }, + "CVE-2021-47051": { + "cmt_msg": "spi: fsl-lpspi: Fix PM reference leak in lpspi_prepare_xfer_hardware()", + "cmt_id": "4a01ad002d2e03c399af536562693752af7c81b1" + }, + "CVE-2021-47020": { + "cmt_msg": "soundwire: stream: fix memory leak in stream config error path", + "cmt_id": "870533403ffa28ff63e173045fc5369365642002" } }, "5.4.120": { "CVE-2021-4157": { "cmt_msg": "pNFS/flexfiles: fix incorrect size check in decode_nfs_fh()", "cmt_id": "89862bd77e9cf511628eb7a97fe7f8d246192eec" + }, + "CVE-2021-46992": { + "cmt_msg": "netfilter: nftables: avoid overflows in nft_hash_buckets()", + "cmt_id": "c77e2ef18167ad334e27610ced9a7f6af5ec1787" + }, + "CVE-2021-46984": { + "cmt_msg": "kyber: fix out of bounds access when preempted", + "cmt_id": "0b6b4b90b74c27bea968c214d820ba4254b903a5" + }, + "CVE-2021-46991": { + "cmt_msg": "i40e: Fix use-after-free in i40e_client_subtask()", + "cmt_id": "d718c15a2bf9ae082d5ae4d177fb19ef23cb4132" + }, + "CVE-2021-47006": { + "cmt_msg": "ARM: 9064/1: hw_breakpoint: Do not directly check the event's overflow_handler hook", + "cmt_id": "3ed8832aeaa9a37b0fc386bb72ff604352567c80" + }, + "CVE-2021-46993": { + "cmt_msg": "sched: Fix out-of-bound access in uclamp", + "cmt_id": "687f523c134b7f0bd040ee1230f6d17990d54172" + }, + "CVE-2021-46981": { + "cmt_msg": "nbd: Fix NULL pointer in flush_workqueue", + "cmt_id": "1c4962df938891af9ab4775f5224ef8601764107" + }, + "CVE-2021-46998": { + "cmt_msg": "ethernet:enic: Fix a use after free bug in enic_hard_start_xmit", + "cmt_id": "f7f6f07774091a6ddd98500b85386c3c6afb30d3" + }, + "CVE-2021-46988": { + "cmt_msg": "userfaultfd: release page in error path to avoid BUG_ON", + "cmt_id": "b3f1731c6d7fbc1ebe3ed8eff6d6bec56d76ff43" + }, + "CVE-2021-46989": { + "cmt_msg": "hfsplus: prevent corruption in shrinking truncate", + "cmt_id": "c451a6bafb5f422197d31536f82116aed132b72c" } }, "5.4.122": { - "CVE-2020-26558": { + "CVE-2020-26555": { "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical", "cmt_id": "f97257cde764ad6979a7dbeb460b9fb69276342e" }, - "CVE-2021-0129": { + "CVE-2020-26558": { "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical", "cmt_id": "f97257cde764ad6979a7dbeb460b9fb69276342e" }, - "CVE-2020-26555": { + "CVE-2021-47071": { + "cmt_msg": "uio_hv_generic: Fix a memory leak in error handling paths", + "cmt_id": "cdd91637d4ef33e2be19a8e16e72e7d00c996d76" + }, + "CVE-2021-47073": { + "cmt_msg": "platform/x86: dell-smbios-wmi: Fix oops on rmmod dell_smbios", + "cmt_id": "6fa78a6b9a3beb676a010dc489c1257f7e432525" + }, + "CVE-2021-47078": { + "cmt_msg": "RDMA/rxe: Clear all QP fields if creation failed", + "cmt_id": "a62225d951d77eb20208fed8fc199e0c9b1df08b" + }, + "CVE-2021-0129": { "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical", "cmt_id": "f97257cde764ad6979a7dbeb460b9fb69276342e" } }, + "5.4.123": { + "CVE-2021-47180": { + "cmt_msg": "NFC: nci: fix memory leak in nci_allocate_device", + "cmt_id": "af2a4426baf71163c0c354580ae98c7888a9aba7" + } + }, "5.4.124": { + "CVE-2021-47167": { + "cmt_msg": "NFS: Fix an Oopsable condition in __nfs_pageio_add_request()", + "cmt_id": "1fc5f4eb9d31268ac3ce152d74ad5501ad24ca3e" + }, + "CVE-2021-47166": { + "cmt_msg": "NFS: Don't corrupt the value of pg_bytes_written in nfs_do_recoalesce()", + "cmt_id": "785917316b25685c9b3a2a88f933139f2de75e33" + }, + "CVE-2021-47165": { + "cmt_msg": "drm/meson: fix shutdown crash when component not probed", + "cmt_id": "4ce2bf20b4a6e307e114847d60b2bf40a6a1fac0" + }, + "CVE-2021-47149": { + "cmt_msg": "net: fujitsu: fix potential null-ptr-deref", + "cmt_id": "22049c3d40f08facd1867548716a484dad6b3251" + }, + "CVE-2021-47162": { + "cmt_msg": "tipc: skb_linearize the head skb when reassembling msgs", + "cmt_id": "64d17ec9f1ded042c4b188d15734f33486ed9966" + }, + "CVE-2021-47161": { + "cmt_msg": "spi: spi-fsl-dspi: Fix a resource leak in an error handling path", + "cmt_id": "15d1cc4b4b585f9a2ce72c52cca004d5d735bdf1" + }, + "CVE-2021-47160": { + "cmt_msg": "net: dsa: mt7530: fix VLAN traffic leaks", + "cmt_id": "4fe4e1f48ba119bdbc7c897c83b04ba0d08f5488" + }, + "CVE-2021-47145": { + "cmt_msg": "btrfs: do not BUG_ON in link_to_fixup_dir", + "cmt_id": "0ed102453aa1cd12fefde8f6b60b9519b0b1f003" + }, + "CVE-2021-47144": { + "cmt_msg": "drm/amd/amdgpu: fix refcount leak", + "cmt_id": "dde2656e0bbb2ac7d83a7bd95a8d5c3c95bbc009" + }, + "CVE-2021-47146": { + "cmt_msg": "mld: fix panic in mld_newpack()", + "cmt_id": "37d697759958d111439080bab7e14d2b0e7b39f5" + }, + "CVE-2021-47141": { + "cmt_msg": "gve: Add NULL pointer checks when freeing irqs.", + "cmt_id": "821149ee88c206fa37e79c1868cc270518484876" + }, + "CVE-2021-47169": { + "cmt_msg": "serial: rp2: use 'request_firmware' instead of 'request_firmware_nowait'", + "cmt_id": "915452f40e2f495e187276c4407a4f567ec2307e" + }, + "CVE-2021-47142": { + "cmt_msg": "drm/amdgpu: Fix a use-after-free", + "cmt_id": "7398c2aab4da960761ec182d04d6d5abbb4a226e" + }, "CVE-2021-33098": { "cmt_msg": "ixgbe: fix large MTU request from VF", "cmt_id": "cf20c704a26eb763daf6bfb10369a4f11fef2d9a" @@ -144191,18 +188243,10 @@ "cmt_msg": "mac80211: prevent mixed key and fragment cache attacks", "cmt_id": "14f29a67f40496c832ca9fe8502e03b10cca6e59" }, - "CVE-2021-34981": { - "cmt_msg": "Bluetooth: cmtp: fix file refcount when cmtp_attach_device fails", - "cmt_id": "fe201316ac36c48fc3cb2891dfdc8ab68058734d" - }, "CVE-2020-24588": { "cmt_msg": "cfg80211: mitigate A-MSDU aggregation attacks", "cmt_id": "fa00d4928eafe4fe8d854028f73f7af8fdbc9c3c" }, - "CVE-2020-26139": { - "cmt_msg": "mac80211: do not accept/forward invalid EAPOL frames", - "cmt_id": "88664d5e5dc9eedddbea9cc8ebb3d57d933f9f8a" - }, "CVE-2020-26145": { "cmt_msg": "ath10k: drop fragments with multicast DA for PCIe", "cmt_id": "96d4d82652fa013d8b452871305a0c1e5f805d9e" @@ -144214,26 +188258,136 @@ "CVE-2020-26141": { "cmt_msg": "ath10k: Fix TKIP Michael MIC verification for PCIe", "cmt_id": "aee0121afee53cde39e49086317af5d029911857" + }, + "CVE-2021-47168": { + "cmt_msg": "NFS: fix an incorrect limit in filelayout_decode_layout()", + "cmt_id": "e411df81cd862ef3d5b878120b2a2fef0ca9cdb1" + }, + "CVE-2021-47138": { + "cmt_msg": "cxgb4: avoid accessing registers when clearing filters", + "cmt_id": "0bf49b3c8d8b3a43ce09f1b2db70e5484d31fcdf" + }, + "CVE-2021-47137": { + "cmt_msg": "net: lantiq: fix memory corruption in RX ring", + "cmt_id": "8bb1077448d43a871ed667520763e3b9f9b7975d" + }, + "CVE-2021-47179": { + "cmt_msg": "NFSv4: Fix a NULL pointer dereference in pnfs_mark_matching_lsegs_return()", + "cmt_id": "aba3c7795f51717ae316f3566442dee7cc3eeccb" + }, + "CVE-2021-47159": { + "cmt_msg": "net: dsa: fix a crash if ->get_sset_count() fails", + "cmt_id": "ce5355f140a7987011388c7e30c4f8fbe180d3e8" + }, + "CVE-2021-47170": { + "cmt_msg": "USB: usbfs: Don't WARN about excessively large memory allocations", + "cmt_id": "2c835fede13e03f2743a333e4370b5ed2db91e83" + }, + "CVE-2021-47171": { + "cmt_msg": "net: usb: fix memory leak in smsc75xx_bind", + "cmt_id": "b95fb96e6339e34694dd578fb6bde3575b01af17" + }, + "CVE-2021-47172": { + "cmt_msg": "iio: adc: ad7124: Fix potential overflow due to non sequential channel numbers", + "cmt_id": "f49149964d2423fb618fb6b755bb1eaa431cca2c" + }, + "CVE-2021-47173": { + "cmt_msg": "misc/uss720: fix memory leak in uss720_probe", + "cmt_id": "36b5ff1db1a4ef4fdbc2bae364344279f033ad88" + }, + "CVE-2021-47153": { + "cmt_msg": "i2c: i801: Don't generate an interrupt on bus reset", + "cmt_id": "04cc05e3716ae31b17ecdab7bc55c8170def1b8b" + }, + "CVE-2021-47150": { + "cmt_msg": "net: fec: fix the potential memory leak in fec_enet_init()", + "cmt_id": "20255d41ac560397b6a07d8d87dcc5e2efc7672a" + }, + "CVE-2021-47177": { + "cmt_msg": "iommu/vt-d: Fix sysfs leak in alloc_iommu()", + "cmt_id": "044bbe8b92ab4e542de7f6c93c88ea65cccd8e29" + }, + "CVE-2021-34981": { + "cmt_msg": "Bluetooth: cmtp: fix file refcount when cmtp_attach_device fails", + "cmt_id": "fe201316ac36c48fc3cb2891dfdc8ab68058734d" + }, + "CVE-2020-26139": { + "cmt_msg": "mac80211: do not accept/forward invalid EAPOL frames", + "cmt_id": "88664d5e5dc9eedddbea9cc8ebb3d57d933f9f8a" + }, + "CVE-2021-47163": { + "cmt_msg": "tipc: wait and exit until all work queues are done", + "cmt_id": "d1f76dfadaf8f47ed1753f97dbcbd41c16215ffa" } }, "5.4.125": { + "CVE-2021-47129": { + "cmt_msg": "netfilter: nft_ct: skip expectations for confirmed conntrack", + "cmt_id": "da8d31e80ff425f5a65dab7060d5c4aba749e562" + }, + "CVE-2021-47114": { + "cmt_msg": "ocfs2: fix data corruption by fallocate", + "cmt_id": "cc2edb99ea606a45182b5ea38cc8f4e583aa0774" + }, + "CVE-2021-47122": { + "cmt_msg": "net: caif: fix memory leak in caif_device_notify", + "cmt_id": "f52f4fd67264c70cd0b4ba326962ebe12d9cba94" + }, + "CVE-2021-47121": { + "cmt_msg": "net: caif: fix memory leak in cfusbl_device_notify", + "cmt_id": "4d94f530cd24c85aede6e72b8923f371b45d6886" + }, + "CVE-2021-47120": { + "cmt_msg": "HID: magicmouse: fix NULL-deref on disconnect", + "cmt_id": "368c5d45a87e1bcc7f1e98e0c255c37b7b12c5d6" + }, + "CVE-2021-47110": { + "cmt_msg": "x86/kvm: Disable kvmclock on all CPUs on shutdown", + "cmt_id": "9084fe1b3572664ad276f427dce575f580c9799a" + }, + "CVE-2021-47126": { + "cmt_msg": "ipv6: Fix KASAN: slab-out-of-bounds Read in fib6_nh_flush_exceptions", + "cmt_id": "7ba7fa78a92dc410b6f93ed73075ab669c3a0b59" + }, + "CVE-2021-47112": { + "cmt_msg": "x86/kvm: Teardown PV features on boot CPU as well", + "cmt_id": "7620a669111b52f224d006dea9e1e688e2d62c54" + }, "CVE-2021-3564": { "cmt_msg": "Bluetooth: fix the erroneous flush_work() order", "cmt_id": "8d3d0ac73a4a1d31e3d4f7c068312aba78470166" }, - "CVE-2021-38208": { - "cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect", - "cmt_id": "5d4c4b06ed9fb7a69d0b2e2a73fc73226d25ab70" + "CVE-2021-47117": { + "cmt_msg": "ext4: fix bug on in ext4_es_cache_extent as ext4_split_extent_at failed", + "cmt_id": "920697b004e49cb026e2e15fe91be065bf0741b7" }, "CVE-2021-3573": { "cmt_msg": "Bluetooth: use correct lock to prevent UAF of hdev object", "cmt_id": "b6f97555c71f78288682bc967121572f10715c89" }, + "CVE-2021-47109": { + "cmt_msg": "neighbour: allow NUD_NOARP entries to be forced GCed", + "cmt_id": "d99029e6aab62aef0a0251588b2867e77e83b137" + }, + "CVE-2021-47118": { + "cmt_msg": "pid: take a reference when initializing `cad_pid`", + "cmt_id": "2cd6eedfa6344f5ef5c3dac3aee57a39b5b46dff" + }, + "CVE-2021-38208": { + "cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect", + "cmt_id": "5d4c4b06ed9fb7a69d0b2e2a73fc73226d25ab70" + }, "CVE-2021-3587": { "cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect", "cmt_id": "5d4c4b06ed9fb7a69d0b2e2a73fc73226d25ab70" } }, + "5.4.127": { + "CVE-2021-46906": { + "cmt_msg": "HID: usbhid: fix info leak in hid_submit_ctrl", + "cmt_id": "7f5a4b24cdbd7372770a02f23e347d7d9a9ac8f1" + } + }, "5.4.128": { "CVE-2021-34693": { "cmt_msg": "can: bcm: fix infoleak in struct bcm_msg_head", @@ -144585,10 +188739,26 @@ } }, "5.4.169": { + "CVE-2021-47083": { + "cmt_msg": "pinctrl: mediatek: fix global-out-of-bounds issue", + "cmt_id": "f373298e1bf0c6ea097c0bcc558dc43ad53e421f" + }, + "CVE-2021-47086": { + "cmt_msg": "phonet/pep: refuse to enable an unbound pipe", + "cmt_id": "48c76fc53582e7f13c1e0b11c916e503256c4d0b" + }, + "CVE-2021-47100": { + "cmt_msg": "ipmi: Fix UAF when uninstall ipmi_si and ipmi_msghandler module", + "cmt_id": "992649b8b16843d27eb39ceea5f9cf85ffb50a18" + }, "CVE-2021-45469": { "cmt_msg": "f2fs: fix to do sanity check on last xattr entry in __f2fs_setxattr()", "cmt_id": "b0406b5ef4e2c4fb21d9e7d5c36a0453b4279e9b" }, + "CVE-2021-47095": { + "cmt_msg": "ipmi: ssif: initialize ssif_info->client early", + "cmt_id": "8efd6a3391f7b0b19fb0c38e50add06ca30c94af" + }, "CVE-2022-1195": { "cmt_msg": "hamradio: improve the incomplete fix to avoid NPD", "cmt_id": "a5c6a13e9056d87805ba3042c208fbd4164ad22b" @@ -144599,13 +188769,45 @@ "cmt_msg": "tee: handle lookup of shm with reference count 0", "cmt_id": "940e68e57ab69248fabba5889e615305789db8a7" }, - "CVE-2023-23006": { - "cmt_msg": "net/mlx5: DR, Fix NULL vs IS_ERR checking in dr_domain_init_resources", - "cmt_id": "db484d35a9482d21a7f36da4dfc7a68aa2e9e1d6" + "CVE-2021-46929": { + "cmt_msg": "sctp: use call_rcu to free endpoint", + "cmt_id": "831de271452b87657fcf8d715ee20519b79caef5" + }, + "CVE-2021-46935": { + "cmt_msg": "binder: fix async_free_space accounting for empty parcels", + "cmt_id": "103b16a8c51f96d5fe063022869ea906c256e5da" + }, + "CVE-2021-46934": { + "cmt_msg": "i2c: validate user data in compat ioctl", + "cmt_id": "9e4a3f47eff476097e0c7faac04d1831fc70237d" + }, + "CVE-2021-46933": { + "cmt_msg": "usb: gadget: f_fs: Clear ffs_eventfd in ffs_data_clear.", + "cmt_id": "240fc586e83d645912accce081a48aa63a45f6ee" + }, + "CVE-2021-46932": { + "cmt_msg": "Input: appletouch - initialize work before device registration", + "cmt_id": "975774ea7528b489930b76a77ffc4d5379b95ff2" }, "CVE-2022-20154": { "cmt_msg": "sctp: use call_rcu to free endpoint", "cmt_id": "831de271452b87657fcf8d715ee20519b79caef5" + }, + "CVE-2021-46930": { + "cmt_msg": "usb: mtu3: fix list_head check warning", + "cmt_id": "585e2b244dda7ea733274e4b8fa27853d625d3bf" + }, + "CVE-2021-46924": { + "cmt_msg": "NFC: st21nfca: Fix memory leak in device probe and remove", + "cmt_id": "1cd4063dbc91cf7965d73a6a3855e2028cd4613b" + }, + "CVE-2023-23006": { + "cmt_msg": "net/mlx5: DR, Fix NULL vs IS_ERR checking in dr_domain_init_resources", + "cmt_id": "db484d35a9482d21a7f36da4dfc7a68aa2e9e1d6" + }, + "CVE-2021-46936": { + "cmt_msg": "net: fix use-after-free in tw_timer_handler", + "cmt_id": "fe5838c22b986c1190f1dce9aa09bf6a491c1a69" } }, "5.4.171": { @@ -144681,6 +188883,10 @@ } }, "5.4.179": { + "CVE-2022-48626": { + "cmt_msg": "moxart: fix potential use-after-free on remove path", + "cmt_id": "3a0a7ec5574b510b067cfc734b8bdb6564b31d4e" + }, "CVE-2022-0435": { "cmt_msg": "tipc: improve size validations for received domain records", "cmt_id": "d692e3406e052dbf9f6d9da0cba36cb763272529" @@ -144795,6 +189001,10 @@ "cmt_msg": "net/packet: fix slab-out-of-bounds access in packet_recvmsg()", "cmt_id": "268dcf1f7b3193bc446ec3d14e08a240e9561e4d" }, + "CVE-2022-48629": { + "cmt_msg": "crypto: qcom-rng - ensure buffer for generate is completely filled", + "cmt_id": "184f7bd08ce56f003530fc19f160d54e75bf5c9d" + }, "CVE-2022-3107": { "cmt_msg": "hv_netvsc: Add check for kvmalloc_array", "cmt_id": "b01e2df5fbf68719dfb8e766c1ca6089234144c2" @@ -144827,6 +189037,10 @@ "cmt_msg": "video: fbdev: sm712fb: Fix crash in smtcfb_read()", "cmt_id": "478154be3a8c21ff106310bb1037b1fc9d81dc62" }, + "CVE-2020-36775": { + "cmt_msg": "f2fs: fix to avoid potential deadlock", + "cmt_id": "0478ccdc8ea016de1ebaf6fe6da0275c2b258c5b" + }, "CVE-2022-1158": { "cmt_msg": "KVM: x86/mmu: do compare-and-exchange of gPTE via the user address", "cmt_id": "1553126eccf4fad17afaeaed08db9e5944aa2d55" @@ -145149,21 +189363,25 @@ "cmt_msg": "net_sched: cls_route: remove from list when handle is 0", "cmt_id": "1fcd691cc2e7f808eca2e644adee1f1c6c1527fd" }, + "CVE-2022-20422": { + "cmt_msg": "arm64: fix oops in concurrently setting insn_emulation sysctls", + "cmt_id": "04549063d5701976034d8c2bfda3d3a8cbf0409f" + }, "CVE-2022-41222": { "cmt_msg": "mm/mremap: hold the rmap lock in write mode when moving page table entries.", "cmt_id": "79e522101cf40735f1936a10312e17f937b8dcad" }, - "CVE-2022-20422": { - "cmt_msg": "arm64: fix oops in concurrently setting insn_emulation sysctls", - "cmt_id": "04549063d5701976034d8c2bfda3d3a8cbf0409f" + "CVE-2022-1679": { + "cmt_msg": "ath9k: fix use-after-free in ath9k_hif_usb_rx_cb", + "cmt_id": "e9e21206b8ea62220b486310c61277e7ebfe7cec" }, "CVE-2023-1095": { "cmt_msg": "netfilter: nf_tables: fix null deref due to zeroed list head", "cmt_id": "a452bc3deb23bf93f8a13d3e24611b7ef39645dc" }, - "CVE-2022-1679": { - "cmt_msg": "ath9k: fix use-after-free in ath9k_hif_usb_rx_cb", - "cmt_id": "e9e21206b8ea62220b486310c61277e7ebfe7cec" + "CVE-2019-25162": { + "cmt_msg": "i2c: Fix a potential use after free", + "cmt_id": "871a1e94929a27bf6e2cd99523865c840bbc2d87" } }, "5.4.212": { @@ -145275,6 +189493,10 @@ } }, "5.4.220": { + "CVE-2022-3649": { + "cmt_msg": "nilfs2: fix use-after-free bug of struct nilfs_root", + "cmt_id": "d1c2d820a2cd73867b7d352e89e92fb3ac29e926" + }, "CVE-2022-41849": { "cmt_msg": "fbdev: smscufx: Fix use-after-free in ufx_ops_open()", "cmt_id": "3742e9fd552e6c4193ebc5eb3d2cd02d429cad9c" @@ -145287,25 +189509,25 @@ "cmt_msg": "r8152: Rate limit overflow messages", "cmt_id": "61fd56b0a1a3e923aced4455071177778dd59e88" }, - "CVE-2022-3542": { - "cmt_msg": "bnx2x: fix potential memory leak in bnx2x_tpa_stop()", - "cmt_id": "71e0ab5b7598d88001762fddbfeb331543c62841" + "CVE-2022-2602": { + "cmt_msg": "io_uring/af_unix: defer registered files gc to io_uring release", + "cmt_id": "04df9719df1865f6770af9bc7880874af0e594b2" }, "CVE-2022-41850": { "cmt_msg": "HID: roccat: Fix use-after-free in roccat_read()", "cmt_id": "e30c3a9a88818e5cf3df3fda6ab8388bef3bc6cd" }, + "CVE-2021-47103": { + "cmt_msg": "inet: fully convert sk->sk_rx_dst to RCU rules", + "cmt_id": "c3bb4a7e8cbc984e1cdac0fe6af60e880214ed6e" + }, "CVE-2022-3565": { "cmt_msg": "mISDN: fix use-after-free bugs in l1oip timer handlers", "cmt_id": "466ed722f205c2cf8caba5982f3cd9729e767903" }, - "CVE-2022-3649": { - "cmt_msg": "nilfs2: fix use-after-free bug of struct nilfs_root", - "cmt_id": "d1c2d820a2cd73867b7d352e89e92fb3ac29e926" - }, - "CVE-2022-2602": { - "cmt_msg": "io_uring/af_unix: defer registered files gc to io_uring release", - "cmt_id": "04df9719df1865f6770af9bc7880874af0e594b2" + "CVE-2022-3542": { + "cmt_msg": "bnx2x: fix potential memory leak in bnx2x_tpa_stop()", + "cmt_id": "71e0ab5b7598d88001762fddbfeb331543c62841" } }, "5.4.223": { @@ -145559,6 +189781,14 @@ } }, "5.4.240": { + "CVE-2021-47082": { + "cmt_msg": "tun: avoid double free in tun_free_netdev", + "cmt_id": "0c0e566f0387490d16f166808c72e9c772027681" + }, + "CVE-2023-2194": { + "cmt_msg": "i2c: xgene-slimpro: Fix out-of-bounds bug in xgene_slimpro_i2c_xfer()", + "cmt_id": "f8cbad984b1601435d087125ac760d3cae90213a" + }, "CVE-2023-2483": { "cmt_msg": "net: qcom/emac: Fix use after free bug in emac_remove due to race condition", "cmt_id": "0e5c7d00ec4f2f359234044b809eb23b7032d9b0" @@ -145579,9 +189809,9 @@ "cmt_msg": "net: sched: fix race condition in qdisc_graft()", "cmt_id": "0f5c0e0a4c0b081e5f959578a8e56c7921e63a2d" }, - "CVE-2023-1670": { - "cmt_msg": "xirc2ps_cs: Fix use after free bug in xirc2ps_detach", - "cmt_id": "a07ec453e86abbd14e2d06d59367b4dd11437358" + "CVE-2021-33631": { + "cmt_msg": "ext4: fix kernel BUG in 'ext4_write_inline_data_end()'", + "cmt_id": "14b6ad56df25c3a4a50cfbc0638e176577a9fce9" }, "CVE-2023-1989": { "cmt_msg": "Bluetooth: btsdio: fix use after free bug in btsdio_remove due to unfinished work", @@ -145591,13 +189821,9 @@ "cmt_msg": "net: tls: fix possible race condition between do_tls_getsockopt_conf() and do_tls_setsockopt_conf()", "cmt_id": "754838aa02050ff3d8675bef79d172097218ea71" }, - "CVE-2023-2194": { - "cmt_msg": "i2c: xgene-slimpro: Fix out-of-bounds bug in xgene_slimpro_i2c_xfer()", - "cmt_id": "f8cbad984b1601435d087125ac760d3cae90213a" - }, - "CVE-2021-33631": { - "cmt_msg": "ext4: fix kernel BUG in 'ext4_write_inline_data_end()'", - "cmt_id": "14b6ad56df25c3a4a50cfbc0638e176577a9fce9" + "CVE-2023-1670": { + "cmt_msg": "xirc2ps_cs: Fix use after free bug in xirc2ps_detach", + "cmt_id": "a07ec453e86abbd14e2d06d59367b4dd11437358" } }, "5.4.241": { @@ -145833,6 +190059,10 @@ "cmt_msg": "net: xfrm: Fix xfrm_address_filter OOB read", "cmt_id": "373848d51fde9138cdc539b1d97dc6b301cc04d5" }, + "CVE-2024-23196": { + "cmt_msg": "ALSA: hda: fix a possible null-pointer dereference due to data race in snd_hdac_regmap_sync()", + "cmt_id": "109f0aaa0b8838a88af9125b79579023539300a7" + }, "CVE-2023-51042": { "cmt_msg": "drm/amdgpu: Fix potential fence use-after-free v2", "cmt_id": "c6059af6bf5ed436b4aa5229e8113bd2546322d4" @@ -145881,6 +190111,14 @@ } }, "5.4.258": { + "CVE-2023-52527": { + "cmt_msg": "ipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data()", + "cmt_id": "1fc793d68d50dee4782ef2e808913d5dd880bcc6" + }, + "CVE-2023-52522": { + "cmt_msg": "net: fix possible store tearing in neigh_periodic_work()", + "cmt_id": "95eabb075a5902f4c0834ab1fb12dc35730c05af" + }, "CVE-2023-42754": { "cmt_msg": "ipv4: fix null-deref in ipv4_link_failure", "cmt_id": "810fd23d9715474aa27997584e8fc9396ef3cb67" @@ -145888,20 +190126,72 @@ "CVE-2023-31085": { "cmt_msg": "ubi: Refuse attaching if mtd's erasesize is 0", "cmt_id": "c6d358387632a6d45b3e5d4c310cfec1bde59423" + }, + "CVE-2023-52513": { + "cmt_msg": "RDMA/siw: Fix connection failure handling", + "cmt_id": "6e26812e289b374c17677d238164a5a8f5770594" + }, + "CVE-2023-52528": { + "cmt_msg": "net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg", + "cmt_id": "310f1c92f65ad905b7e81fe14de82d979ebbd825" + }, + "CVE-2023-52578": { + "cmt_msg": "net: bridge: use DEV_STATS_INC()", + "cmt_id": "ad8d39c7b437fcdab7208a6a56c093d222c008d5" + }, + "CVE-2023-52574": { + "cmt_msg": "team: fix null-ptr-deref when team device type is changed", + "cmt_id": "c5f6478686bb45f453031594ae19b6c9723a780d" + }, + "CVE-2023-52566": { + "cmt_msg": "nilfs2: fix potential use after free in nilfs_gccache_submit_read_data()", + "cmt_id": "193b5a1c6c67c36b430989dc063fe7ea4e200a33" + }, + "CVE-2023-52573": { + "cmt_msg": "net: rds: Fix possible NULL-pointer dereference", + "cmt_id": "812da2a08dc5cc75fb71e29083ea20904510ac7a" } }, "5.4.259": { - "CVE-2023-5717": { - "cmt_msg": "perf: Disallow mis-matched inherited group reads", - "cmt_id": "7252c8b981853bb8930de44fab924f947362683f" + "CVE-2023-52475": { + "cmt_msg": "Input: powermate - fix use-after-free in powermate_config_complete", + "cmt_id": "5aa514100aaf59868d745196258269a16737c7bd" + }, + "CVE-2023-52477": { + "cmt_msg": "usb: hub: Guard against accesses to uninitialized BOS descriptors", + "cmt_id": "6ad3e9fd3632106696692232bf7ff88b9f7e1bc3" + }, + "CVE-2023-52509": { + "cmt_msg": "ravb: Fix use-after-free issue in ravb_tx_timeout_work()", + "cmt_id": "65d34cfd4e347054eb4193bc95d9da7eaa72dee5" }, "CVE-2023-46343": { "cmt_msg": "nfc: nci: fix possible NULL pointer dereference in send_acknowledge()", "cmt_id": "76050b0cc5a72e0c7493287b7e18e1cb9e3c4612" }, + "CVE-2023-52507": { + "cmt_msg": "nfc: nci: assert requested protocol is valid", + "cmt_id": "95733ea130e35ef9ec5949a5908dde3feaba92cb" + }, + "CVE-2023-5717": { + "cmt_msg": "perf: Disallow mis-matched inherited group reads", + "cmt_id": "7252c8b981853bb8930de44fab924f947362683f" + }, + "CVE-2023-52478": { + "cmt_msg": "HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect", + "cmt_id": "cd0e2bf7fb22fe9b989c59c42dca06367fd10e6b" + }, "CVE-2023-35827": { "cmt_msg": "ravb: Fix use-after-free issue in ravb_tx_timeout_work()", "cmt_id": "65d34cfd4e347054eb4193bc95d9da7eaa72dee5" + }, + "CVE-2023-52502": { + "cmt_msg": "net: nfc: fix races in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn()", + "cmt_id": "7adcf014bda16cdbf804af5c164d94d5d025db2d" + }, + "CVE-2023-52510": { + "cmt_msg": "ieee802154: ca8210: Fix a potential UAF in ca8210_probe", + "cmt_id": "85c2857ef90041f567ce98722c1c342c4d31f4bc" } }, "5.4.260": { @@ -145989,6 +190279,10 @@ "cmt_msg": "media: pvrusb2: fix use after free on context disconnection", "cmt_id": "47aa8fcd5e8b5563af4042a00f25ba89bef8f33d" }, + "CVE-2023-52612": { + "cmt_msg": "crypto: scomp - fix req->dst buffer overflow", + "cmt_id": "e0e3f4a18784182cfe34e20c00eca11e78d53e76" + }, "CVE-2023-52448": { "cmt_msg": "gfs2: Fix kernel NULL pointer dereference in gfs2_rgrp_dump", "cmt_id": "efc8ef87ab9185a23d5676f2f7d986022d91bcde" @@ -145997,6 +190291,14 @@ "cmt_msg": "mtd: Fix gluebi NULL pointer dereference caused by ftl notifier", "cmt_id": "1bf4fe14e97cda621522eb2f28b0a4e87c5b0745" }, + "CVE-2023-52470": { + "cmt_msg": "drm/radeon: check the alloc_workqueue return value in radeon_crtc_init()", + "cmt_id": "5d12c5d75f7c78b83a738025947651ec5c95b4d4" + }, + "CVE-2023-52469": { + "cmt_msg": "drivers/amd/pm: fix a use-after-free in kv_parse_power_table", + "cmt_id": "8b55b06e737feb2a645b0293ea27e38418876d63" + }, "CVE-2023-52439": { "cmt_msg": "uio: Fix use-after-free in uio_open", "cmt_id": "e93da893d52d82d57fc0db2ca566024e0f26ff50" @@ -146005,13 +190307,25 @@ "cmt_msg": "binder: fix use-after-free in shinker's callback", "cmt_id": "a53e15e592b4dcc91c3a3b8514e484a0bdbc53a3" }, + "CVE-2023-6356": { + "cmt_msg": "nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length", + "cmt_id": "ee5e7632e981673f42a50ade25e71e612e543d9d" + }, "CVE-2023-6915": { "cmt_msg": "ida: Fix crash in ida_free when the bitmap is empty", "cmt_id": "ef7152f8705fed11796641d7644acc3c950b5967" }, - "CVE-2023-52457": { - "cmt_msg": "serial: 8250: omap: Don't skip resource freeing if pm_runtime_resume_and_get() failed", - "cmt_id": "b502fb43f7fb55aaf07f6092ab44657595214b93" + "CVE-2023-6536": { + "cmt_msg": "nvmet-tcp: fix a crash in nvmet_req_complete()", + "cmt_id": "9638beb4e10ac116c6a4fc13315e9c3608055ac0" + }, + "CVE-2023-52609": { + "cmt_msg": "binder: fix race between mmput() and do_exit()", + "cmt_id": "252a2a5569eb9f8d16428872cc24dea1ac0bb097" + }, + "CVE-2024-26633": { + "cmt_msg": "ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim()", + "cmt_id": "3f15ba3dc14e6ee002ea01b4faddc3d49200377c" }, "CVE-2023-52454": { "cmt_msg": "nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length", @@ -146035,355 +190349,969 @@ "cmt_msg": "i2c: i801: Fix block process call transactions", "cmt_id": "d074d5ff5ae77b18300e5079c6bda6342a4d44b7" }, + "CVE-2024-26675": { + "cmt_msg": "ppp_async: limit MRU to 64K", + "cmt_id": "56fae81633ccee307cfcb032f706bf1863a56982" + }, + "CVE-2024-26615": { + "cmt_msg": "net/smc: fix illegal rmb_desc access in SMC-D connection dump", + "cmt_id": "1fea9969b81c67d0cb1611d1b8b7d19049d937be" + }, + "CVE-2024-26671": { + "cmt_msg": "blk-mq: fix IO hang from sbitmap wakeup race", + "cmt_id": "ecd7744a1446eb02ccc63e493e2eb6ede4ef1e10" + }, + "CVE-2024-26598": { + "cmt_msg": "KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache", + "cmt_id": "d04acadb6490aa3314f9c9e087691e55de153b88" + }, + "CVE-2024-26679": { + "cmt_msg": "inet: read sk->sk_family once in inet_recv_error()", + "cmt_id": "5993f121fbc01dc2d734f0ff2628009b258fb1dd" + }, + "CVE-2023-52587": { + "cmt_msg": "IB/ipoib: Fix mcast list locking", + "cmt_id": "615e3adc2042b7be4ad122a043fc9135e6342c90" + }, + "CVE-2023-52583": { + "cmt_msg": "ceph: fix deadlock or deadcode of misusing dget()", + "cmt_id": "6ab4fd508fad942f1f1ba940492f2735e078e980" + }, + "CVE-2023-52637": { + "cmt_msg": "can: j1939: Fix UAF in j1939_sk_match_filter during setsockopt(SO_J1939_FILTER)", + "cmt_id": "08de58abedf6e69396e1207e4f99ef8904b2b532" + }, + "CVE-2024-26673": { + "cmt_msg": "netfilter: nft_ct: sanitize layer 3 and 4 protocol number in custom expectations", + "cmt_id": "f549f340c91f08b938d60266e792ff7748dae483" + }, + "CVE-2023-52435": { + "cmt_msg": "net: prevent mss overflow in skb_segment()", + "cmt_id": "cd1022eaf87be8e6151435bd4df4c242c347e083" + }, + "CVE-2023-52615": { + "cmt_msg": "hwrng: core - Fix page fault dead lock on mmap-ed hwrng", + "cmt_id": "5030d4c798863ccb266563201b341a099e8cdd48" + }, + "CVE-2023-52617": { + "cmt_msg": "PCI: switchtec: Fix stdev_release() crash after surprise hot remove", + "cmt_id": "d8c293549946ee5078ed0ab77793cec365559355" + }, "CVE-2024-1086": { "cmt_msg": "netfilter: nf_tables: reject QUEUE/DROP verdict parameters", "cmt_id": "4e66422f1b56149761dc76030e6345d1cca6f869" }, + "CVE-2023-52619": { + "cmt_msg": "pstore/ram: Fix crash when setting number of cpus to an odd number", + "cmt_id": "e9f6ac50890104fdf8194f2865680689239d30fb" + }, + "CVE-2024-26684": { + "cmt_msg": "net: stmmac: xgmac: fix handling of DPP safety error for DMA channels", + "cmt_id": "e9837c83befb5b852fa76425dde98a87b737df00" + }, + "CVE-2024-26685": { + "cmt_msg": "nilfs2: fix potential bug in end_buffer_async_write", + "cmt_id": "d31c8721e816eff5ca6573cc487754f357c093cd" + }, "CVE-2024-0607": { "cmt_msg": "netfilter: nf_tables: fix pointer math issue in nft_byteorder_eval()", "cmt_id": "25b42be4e067e107a2559266b54bf07fa5b094fb" }, - "CVE-2024-0340": { - "cmt_msg": "vhost: use kzalloc() instead of kmalloc() followed by memset()", - "cmt_id": "88c7e1e7a6b82d38ff82ca446862f3d5de34192a" + "CVE-2024-26625": { + "cmt_msg": "llc: call sock_orphan() at release time", + "cmt_id": "64babb17e8150771c58575d8f93a35c5296b499f" }, "CVE-2024-23849": { "cmt_msg": "net/rds: Fix UBSAN: array-index-out-of-bounds in rds_cmsg_recv", "cmt_id": "a37ae111db5e0f7e3d6b692056c30e3e0f6f79cd" }, - "CVE-2023-52435": { - "cmt_msg": "net: prevent mss overflow in skb_segment()", - "cmt_id": "cd1022eaf87be8e6151435bd4df4c242c347e083" + "CVE-2024-26704": { + "cmt_msg": "ext4: fix double-free of blocks due to wrong extents moved_len", + "cmt_id": "afbcad9ae7d6d11608399188f03a837451b6b3a1" }, - "CVE-2024-26598": { - "cmt_msg": "KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache", - "cmt_id": "d04acadb6490aa3314f9c9e087691e55de153b88" + "CVE-2024-26602": { + "cmt_msg": "sched/membarrier: reduce the ability to hammer on sys_membarrier", + "cmt_id": "2441a64070b85c14eecc3728cc87e883f953f265" + }, + "CVE-2024-26720": { + "cmt_msg": "mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again", + "cmt_id": "1f12e4b3284d6c863f272eb2de0d4248ed211cf4" + }, + "CVE-2024-26600": { + "cmt_msg": "phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP", + "cmt_id": "8398d8d735ee93a04fb9e9f490e8cacd737e3bf5" + }, + "CVE-2024-26663": { + "cmt_msg": "tipc: Check the bearer type before calling tipc_udp_nl_bearer_add()", + "cmt_id": "6f70f0b412458c622a12d4292782c8e92e210c2f" + }, + "CVE-2024-26606": { + "cmt_msg": "binder: signal epoll threads of self-work", + "cmt_id": "42beab162dcee1e691ee4934292d51581c29df61" + }, + "CVE-2024-26645": { + "cmt_msg": "tracing: Ensure visibility when inserting an element into tracing_map", + "cmt_id": "dad9b28f675ed99b4dec261db2a397efeb80b74c" + }, + "CVE-2024-26664": { + "cmt_msg": "hwmon: (coretemp) Fix out-of-bounds memory access", + "cmt_id": "1eb74c00c9c3b13cb65e508c5d5a2f11afb96b8b" + }, + "CVE-2023-52622": { + "cmt_msg": "ext4: avoid online resizing failures due to oversized flex bg", + "cmt_id": "b183fe8702e78bba3dcef8e7193cab6898abee07" + }, + "CVE-2023-52597": { + "cmt_msg": "KVM: s390: fix setting of fpc register", + "cmt_id": "5e63c9ae8055109d805aacdaf2a4fe2c3b371ba1" + }, + "CVE-2023-52594": { + "cmt_msg": "wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus()", + "cmt_id": "f11f0fd1ad6c11ae7856d4325fe9d05059767225" + }, + "CVE-2023-52595": { + "cmt_msg": "wifi: rt2x00: restart beacon queue when hardware reset", + "cmt_id": "e1f113b57ddd18274d7c83618deca25cc880bc48" + }, + "CVE-2024-26702": { + "cmt_msg": "iio: magnetometer: rm3100: add boundary check for the value read from RM3100_REG_TMRC", + "cmt_id": "7200170e88e3ec54d9e9c63f07514c3cead11481" + }, + "CVE-2023-52598": { + "cmt_msg": "s390/ptrace: handle setting of fpc register correctly", + "cmt_id": "6d0822f2cc9b153bf2df49a84599195a2e0d21a8" + }, + "CVE-2023-52599": { + "cmt_msg": "jfs: fix array-index-out-of-bounds in diNewExt", + "cmt_id": "de6a91aed1e0b1a23e9c11e7d7557f088eeeb017" + }, + "CVE-2023-52606": { + "cmt_msg": "powerpc/lib: Validate size for vector operations", + "cmt_id": "0580f4403ad33f379eef865c2a6fe94de37febdf" + }, + "CVE-2023-52607": { + "cmt_msg": "powerpc/mm: Fix null-pointer dereference in pgtable_cache_add", + "cmt_id": "f6781add1c311c17eff43e14c786004bbacf901e" + }, + "CVE-2023-52604": { + "cmt_msg": "FS:JFS:UBSAN:array-index-out-of-bounds in dbAdjTree", + "cmt_id": "98f9537fe61b8382b3cc5dd97347531698517c56" + }, + "CVE-2023-52623": { + "cmt_msg": "SUNRPC: Fix a suspicious RCU usage warning", + "cmt_id": "7a96d85bf196c170dcf1b47a82e9bb97cca69aa6" + }, + "CVE-2023-52602": { + "cmt_msg": "jfs: fix slab-out-of-bounds Read in dtSearch", + "cmt_id": "1b9d6828589d57f94a23fb1c46112cda39d7efdb" + }, + "CVE-2023-52603": { + "cmt_msg": "UBSAN: array-index-out-of-bounds in dtSplitRoot", + "cmt_id": "fd3486a893778770557649fe28afa5e463d4ed07" + }, + "CVE-2023-52600": { + "cmt_msg": "jfs: fix uaf in jfs_evict_inode", + "cmt_id": "93df0a2a0b3cde2d7ab3a52ed46ea1d6d4aaba5f" + }, + "CVE-2023-52601": { + "cmt_msg": "jfs: fix array-index-out-of-bounds in dbAdjTree", + "cmt_id": "3f8217c323fd6ecd6829a0c3ae7ac3f14eac368e" + }, + "CVE-2023-52486": { + "cmt_msg": "drm: Don't unref the same fb many times by mistake due to deadlock handling", + "cmt_id": "9dd334a8245011ace45e53298175c7b659edb3e7" + }, + "CVE-2024-26697": { + "cmt_msg": "nilfs2: fix data corruption in dsync block recovery for small block sizes", + "cmt_id": "a6efe6dbaaf504f5b3f8a5c3f711fe54e7dda0ba" + }, + "CVE-2024-26696": { + "cmt_msg": "nilfs2: fix hang in nilfs_lookup_dirty_data_buffers()", + "cmt_id": "862ee4422c38be5c249844a684b00d0dbe9d1e46" + }, + "CVE-2024-0340": { + "cmt_msg": "vhost: use kzalloc() instead of kmalloc() followed by memset()", + "cmt_id": "88c7e1e7a6b82d38ff82ca446862f3d5de34192a" + }, + "CVE-2024-26636": { + "cmt_msg": "llc: make llc_ui_sendmsg() more robust against bonding changes", + "cmt_id": "b643d0defcbacd7fe548bc65c3e4e6f17dc5eb2d" + }, + "CVE-2024-26635": { + "cmt_msg": "llc: Drop support for ETH_P_TR_802_2.", + "cmt_id": "b8e8838f82f332ae80c643dbb1ca4418d0628097" } }, - "outstanding": { - "CVE-2021-0929": { - "cmt_msg": "staging/android/ion: delete dma_buf->kmap/unmap implemenation" + "5.4.270": { + "CVE-2024-26736": { + "cmt_msg": "afs: Increase buffer size in afs_update_volume_status()", + "cmt_id": "5c27d85a69fa16a08813ba37ddfb4bbc9a1ed6b5" }, - "CVE-2020-26556": { - "cmt_msg": "" + "CVE-2024-26778": { + "cmt_msg": "fbdev: savage: Error out if pixclock equals zero", + "cmt_id": "84dce0f6a4cc5b7bfd7242ef9290db8ac1dd77ff" }, - "CVE-2020-26557": { - "cmt_msg": "" + "CVE-2024-26735": { + "cmt_msg": "ipv6: sr: fix possible use-after-free and null-ptr-deref", + "cmt_id": "82831e3ff76ef09fb184eb93b79a3eb3fb284f1d" }, - "CVE-2019-20794": { - "cmt_msg": "" + "CVE-2024-26779": { + "cmt_msg": "wifi: mac80211: fix race condition on enabling fast-xmit", + "cmt_id": "85720b69aef177318f4a18efbcc4302228a340e5" }, - "CVE-2020-26559": { - "cmt_msg": "" + "CVE-2024-26751": { + "cmt_msg": "ARM: ep93xx: Add terminator to gpiod_lookup_table", + "cmt_id": "999a8bb70da2946336327b4480824d1691cae1fa" }, - "CVE-2020-35501": { - "cmt_msg": "" + "CVE-2024-26752": { + "cmt_msg": "l2tp: pass correct message length to ip6_append_data", + "cmt_id": "c1d3a84a67db910ce28a871273c992c3d7f9efb5" }, - "CVE-2022-0168": { - "cmt_msg": "cifs: fix NULL ptr dereference in smb2_ioctl_query_info()" + "CVE-2024-26766": { + "cmt_msg": "IB/hfi1: Fix sdma.h tx->num_descs off-by-one error", + "cmt_id": "5833024a9856f454a964a198c63a57e59e07baf5" }, - "CVE-2022-38457": { - "cmt_msg": "drm/vmwgfx: Remove rcu locks from user resources" + "CVE-2024-26754": { + "cmt_msg": "gtp: fix use-after-free and null-ptr-deref in gtp_genl_dump_pdp()", + "cmt_id": "f8cbd1791900b5d96466eede8e9439a5b9ca4de7" }, - "CVE-2022-20424": { - "cmt_msg": "io_uring: remove io_identity" + "CVE-2024-26773": { + "cmt_msg": "ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found()", + "cmt_id": "260fc96283c0f594de18a1b045faf6d8fb42874d" }, - "CVE-2023-51779": { - "cmt_msg": "Bluetooth: af_bluetooth: Fix Use-After-Free in bt_sock_recvmsg" + "CVE-2024-26749": { + "cmt_msg": "usb: cdns3: fixed memory use after free at cdns3_gadget_ep_disable()", + "cmt_id": "cfa9abb5570c489dabf6f7fb3a066cc576fc8824" }, - "CVE-2023-52458": { - "cmt_msg": "block: add check that partition length needs to be aligned with block size" + "CVE-2024-26748": { + "cmt_msg": "usb: cdns3: fix memory double free when handle zero packet", + "cmt_id": "aad6132ae6e4809e375431f8defd1521985e44e7" }, - "CVE-2018-1121": { - "cmt_msg": "" + "CVE-2024-26763": { + "cmt_msg": "dm-crypt: don't modify the data when using authenticated encryption", + "cmt_id": "0dccbb93538fe89a86c6de31d4b1c8c560848eaa" }, - "CVE-2019-19378": { + "CVE-2024-26764": { + "cmt_msg": "fs/aio: Restrict kiocb_set_cancel_fn() to I/O submitted via libaio", + "cmt_id": "b4eea7a05ee0ab5ab0514421e6ba8c5d249cf942" + }, + "CVE-2023-52504": { + "cmt_msg": "x86/alternatives: Disable KASAN in apply_alternatives()", + "cmt_id": "3770c38cd6a60494da29ac2da73ff8156440a2d1" + }, + "CVE-2024-26777": { + "cmt_msg": "fbdev: sis: Error out if pixclock equals zero", + "cmt_id": "6db07619d173765bd8622d63809cbfe361f04207" + }, + "CVE-2024-26772": { + "cmt_msg": "ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal()", + "cmt_id": "6b92b1bc16d691c95b152c6dbf027ad64315668d" + } + }, + "5.4.271": { + "CVE-2024-26688": { + "cmt_msg": "fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super", + "cmt_id": "1dde8ef4b7a749ae1bc73617c91775631d167557" + }, + "CVE-2024-26790": { + "cmt_msg": "dmaengine: fsl-qdma: fix SoC may hang on 16 byte unaligned read", + "cmt_id": "518d78b4fac68cac29a263554d7f3b19da99d0da" + }, + "CVE-2024-26791": { + "cmt_msg": "btrfs: dev-replace: properly validate device names", + "cmt_id": "c6652e20d7d783d060fe5f987eac7b5cabe31311" + }, + "CVE-2024-26793": { + "cmt_msg": "gtp: fix use-after-free and null-ptr-deref in gtp_newlink()", + "cmt_id": "ec92aa2cab6f0048f10d6aa4f025c5885cb1a1b6" + }, + "CVE-2024-26788": { + "cmt_msg": "dmaengine: fsl-qdma: init irq after reg initialization", + "cmt_id": "3cc5fb824c2125aa3740d905b3e5b378c8a09478" + }, + "CVE-2024-26804": { + "cmt_msg": "net: ip_tunnel: prevent perpetual headroom growth", + "cmt_id": "f81e94d2dcd2397137edcb8b85f4c5bed5d22383" + }, + "CVE-2024-26805": { + "cmt_msg": "netlink: Fix kernel-infoleak-after-free in __skb_datagram_iter", + "cmt_id": "9ae51361da43270f4ba0eb924427a07e87e48777" + }, + "CVE-2024-26801": { + "cmt_msg": "Bluetooth: Avoid potential use-after-free in hci_error_reset", + "cmt_id": "98fb98fd37e42fd4ce13ff657ea64503e24b6090" + }, + "CVE-2024-0841": { + "cmt_msg": "fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super", + "cmt_id": "1dde8ef4b7a749ae1bc73617c91775631d167557" + } + }, + "5.4.273": { + "CVE-2024-26651": { + "cmt_msg": "sr9800: Add check for usbnet_get_endpoints", + "cmt_id": "8a8b6a24684bc278036c3f159f7b3a31ad89546a" + }, + "CVE-2023-7042": { + "cmt_msg": "wifi: ath10k: fix NULL pointer dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev()", + "cmt_id": "88a9dffaec779504ab3680d33cf677741c029420" + }, + "CVE-2024-22099": { + "cmt_msg": "Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security", + "cmt_id": "5f369efd9d963c1f711a06c9b8baf9f5ce616d85" + }, + "CVE-2023-6270": { + "cmt_msg": "aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts", + "cmt_id": "1a54aa506b3b2f31496731039e49778f54eee881" + } + }, + "outstanding": { + "CVE-2020-35501": { "cmt_msg": "" }, - "CVE-2022-3061": { - "cmt_msg": "video: fbdev: i740fb: Error out if 'pixclock' equals zero" + "CVE-2021-20239": { + "cmt_msg": "net: pass a sockptr_t into ->setsockopt" + }, + "CVE-2023-52614": { + "cmt_msg": "PM / devfreq: Fix buffer overflow in trans_stat_show" }, "CVE-2022-3108": { "cmt_msg": "drm/amdkfd: Check for null pointer after calling kmemdup" }, - "CVE-2024-26585": { - "cmt_msg": "tls: fix race between tx work scheduling and socket close" - }, "CVE-2022-47520": { "cmt_msg": "wifi: wilc1000: validate pairwise and authentication suite offsets" }, - "CVE-2019-15794": { - "cmt_msg": "ovl: fix reference counting in ovl_mmap error path" + "CVE-2023-52618": { + "cmt_msg": "block/rnbd-srv: Check for unlikely string overflow" }, - "CVE-2022-3344": { - "cmt_msg": "KVM: x86: nSVM: harden svm_free_nested against freeing vmcb02 while still in use" + "CVE-2022-0480": { + "cmt_msg": "memcg: enable accounting for file lock caches" }, - "CVE-2023-23004": { - "cmt_msg": "malidp: Fix NULL vs IS_ERR() checking" + "CVE-2021-47059": { + "cmt_msg": "crypto: sun8i-ss - fix result memory leak on error path" }, - "CVE-2023-23000": { - "cmt_msg": "phy: tegra: xusb: Fix return value of tegra_xusb_find_port_node function" + "CVE-2022-23825": { + "cmt_msg": "" }, - "CVE-2023-39198": { - "cmt_msg": "drm/qxl: fix UAF on handle creation" + "CVE-2021-3847": { + "cmt_msg": "" }, - "CVE-2020-24503": { + "CVE-2021-47052": { + "cmt_msg": "crypto: sa2ul - Fix memory leak of rxd" + }, + "CVE-2021-47113": { + "cmt_msg": "btrfs: abort in rename_exchange if we fail to insert the second ref" + }, + "CVE-2021-47116": { + "cmt_msg": "ext4: fix memory leak in ext4_mb_init_backend on error path." + }, + "CVE-2021-47119": { + "cmt_msg": "ext4: fix memory leak in ext4_fill_super" + }, + "CVE-2023-0597": { + "cmt_msg": "x86/mm: Randomize per-cpu entry area" + }, + "CVE-2021-3669": { + "cmt_msg": "ipc: replace costly bailout check in sysvipc_find_ipc()" + }, + "CVE-2024-26592": { + "cmt_msg": "ksmbd: fix UAF issue in ksmbd_tcp_new_connection()" + }, + "CVE-2020-15802": { "cmt_msg": "" }, - "CVE-2020-24502": { + "CVE-2024-26594": { + "cmt_msg": "ksmbd: validate mech token in session setup" + }, + "CVE-2024-26595": { + "cmt_msg": "mlxsw: spectrum_acl_tcam: Fix NULL pointer dereference in error path" + }, + "CVE-2022-3636": { + "cmt_msg": "net: ethernet: mtk_eth_soc: use after free in __mtk_ppe_check_skb()" + }, + "CVE-2021-47028": { + "cmt_msg": "mt76: mt7915: fix txrate reporting" + }, + "CVE-2021-47024": { + "cmt_msg": "vsock/virtio: free queued packets when closing socket" + }, + "CVE-2021-46908": { + "cmt_msg": "bpf: Use correct permission flag for mixed signed bounds arithmetic" + }, + "CVE-2022-1247": { "cmt_msg": "" }, - "CVE-2023-6240": { + "CVE-2023-2007": { + "cmt_msg": "scsi: dpt_i2o: Remove obsolete driver" + }, + "CVE-2022-2991": { + "cmt_msg": "remove the lightnvm subsystem" + }, + "CVE-2020-26140": { "cmt_msg": "" }, - "CVE-2019-19449": { - "cmt_msg": "f2fs: fix to do sanity check on segment/section count" + "CVE-2020-26143": { + "cmt_msg": "" }, - "CVE-2020-24504": { - "cmt_msg": "ice: create scheduler aggregator node config and move VSIs" + "CVE-2020-26142": { + "cmt_msg": "" }, - "CVE-2023-6610": { - "cmt_msg": "smb: client: fix potential OOB in smb2_dump_detail()" + "CVE-2023-1075": { + "cmt_msg": "net/tls: tls_is_tx_ready() checked list_entry" }, - "CVE-2020-11725": { + "CVE-2024-23848": { "cmt_msg": "" }, - "CVE-2022-0382": { - "cmt_msg": "net ticp:fix a kernel-infoleak in __tipc_sendmsg()" + "CVE-2024-26747": { + "cmt_msg": "usb: roles: fix NULL pointer issue when put module's reference" }, - "CVE-2023-1249": { - "cmt_msg": "coredump: Use the vma snapshot in fill_files_note" + "CVE-2024-26745": { + "cmt_msg": "powerpc/pseries/iommu: IOMMU table is not initialized for kdump over SR-IOV" }, - "CVE-2022-23825": { + "CVE-2024-26744": { + "cmt_msg": "RDMA/srpt: Support specifying the srpt_service_guid parameter" + }, + "CVE-2024-26743": { + "cmt_msg": "RDMA/qedr: Fix qedr_create_user_qp error flow" + }, + "CVE-2024-26740": { + "cmt_msg": "net/sched: act_mirred: use the backlog for mirred ingress" + }, + "CVE-2023-52610": { + "cmt_msg": "net/sched: act_ct: fix skb leak and crash on ooo frags" + }, + "CVE-2024-26699": { + "cmt_msg": "drm/amd/display: Fix array-index-out-of-bounds in dcn35_clkmgr" + }, + "CVE-2024-26691": { + "cmt_msg": "KVM: arm64: Fix circular locking dependency" + }, + "CVE-2024-0564": { "cmt_msg": "" }, - "CVE-2021-33061": { - "cmt_msg": "ixgbe: add improvement for MDD response functionality" + "CVE-2024-0565": { + "cmt_msg": "smb: client: fix OOB in receive_encrypted_standard()" }, - "CVE-2022-1263": { - "cmt_msg": "KVM: avoid NULL pointer dereference in kvm_dirty_ring_push" + "CVE-2023-2176": { + "cmt_msg": "RDMA/core: Refactor rdma_bind_addr" }, - "CVE-2024-26589": { - "cmt_msg": "bpf: Reject variable offset alu on PTR_TO_FLOW_KEYS" + "CVE-2022-39188": { + "cmt_msg": "mmu_gather: Force tlb-flush VM_PFNMAP vmas" }, - "CVE-2023-3389": { - "cmt_msg": "io_uring: mutex locked poll hashing" + "CVE-2005-3660": { + "cmt_msg": "" }, - "CVE-2023-1476": { + "CVE-2023-31084": { + "cmt_msg": "media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*()" + }, + "CVE-2023-31083": { + "cmt_msg": "Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO" + }, + "CVE-2023-31082": { "cmt_msg": "" }, - "CVE-2023-4010": { + "CVE-2023-31081": { "cmt_msg": "" }, - "CVE-2021-3864": { + "CVE-2024-23307": { + "cmt_msg": "md/raid5: fix atomicity violation in raid5_cache_count" + }, + "CVE-2023-52498": { + "cmt_msg": "PM: sleep: Fix possible deadlocks in core system-wide PM code" + }, + "CVE-2020-14304": { "cmt_msg": "" }, - "CVE-2020-29373": { - "cmt_msg": "io_uring: grab ->fs as part of async preparation" + "CVE-2023-52497": { + "cmt_msg": "erofs: fix lz4 inplace decompression" }, - "CVE-2019-19814": { + "CVE-2023-4133": { + "cmt_msg": "cxgb4: fix use after free bugs caused by circular dependency problem" + }, + "CVE-2020-26560": { "cmt_msg": "" }, - "CVE-2022-2209": { + "CVE-2024-26622": { + "cmt_msg": "tomoyo: fix UAF write bug in tomoyo_write_control()" + }, + "CVE-2024-22386": { + "cmt_msg": "" + }, + "CVE-2023-37454": { + "cmt_msg": "" + }, + "CVE-2023-52489": { + "cmt_msg": "mm/sparsemem: fix race in accessing memory_section->usage" + }, + "CVE-2021-47063": { + "cmt_msg": "drm: bridge/panel: Cleanup connector on bridge detach" + }, + "CVE-2023-33288": { + "cmt_msg": "power: supply: bq24190: Fix use after free bug in bq24190_remove due to race condition" + }, + "CVE-2022-1116": { "cmt_msg": "" }, + "CVE-2012-4542": { + "cmt_msg": "" + }, + "CVE-2023-52585": { + "cmt_msg": "drm/amdgpu: Fix possible NULL dereference in amdgpu_ras_query_error_status_helper()" + }, + "CVE-2023-52584": { + "cmt_msg": "spmi: mediatek: Fix UAF on device remove" + }, + "CVE-2023-52586": { + "cmt_msg": "drm/msm/dpu: Add mutex lock in control vblank irq" + }, + "CVE-2022-3567": { + "cmt_msg": "ipv6: Fix data races around sk->sk_prot." + }, + "CVE-2022-3566": { + "cmt_msg": "tcp: Fix data races around icsk->icsk_af_ops." + }, + "CVE-2022-4269": { + "cmt_msg": "act_mirred: use the backlog for nested calls to mirred ingress" + }, + "CVE-2021-47147": { + "cmt_msg": "ptp: ocp: Fix a resource leak in an error handling path" + }, + "CVE-2020-36385": { + "cmt_msg": "RDMA/ucma: Rework ucma_migrate_id() to avoid races with destroy" + }, + "CVE-2023-52589": { + "cmt_msg": "media: rkisp1: Fix IRQ disable race issue" + }, + "CVE-2023-52588": { + "cmt_msg": "f2fs: fix to tag gcing flag on page during block migration" + }, + "CVE-2021-47143": { + "cmt_msg": "net/smc: remove device from smcd_dev_list after failed device_add()" + }, + "CVE-2024-26768": { + "cmt_msg": "LoongArch: Change acpi_core_pic[NR_CPUS] to acpi_core_pic[MAX_CORE_PIC]" + }, + "CVE-2021-46941": { + "cmt_msg": "usb: dwc3: core: Do core softreset when switch mode" + }, + "CVE-2021-47140": { + "cmt_msg": "iommu/amd: Clear DMA ops when switching domain" + }, + "CVE-2024-26765": { + "cmt_msg": "LoongArch: Disable IRQ before init_fn() for nonboot CPUs" + }, + "CVE-2020-16120": { + "cmt_msg": "ovl: switch to mounter creds in readdir" + }, + "CVE-2023-6560": { + "cmt_msg": "io_uring: don't allow discontig pages for IORING_SETUP_NO_MMAP" + }, + "CVE-2024-26795": { + "cmt_msg": "riscv: Sparse-Memory/vmemmap out-of-bounds fix" + }, + "CVE-2024-26797": { + "cmt_msg": "drm/amd/display: Prevent potential buffer overflow in map_hw_resources" + }, + "CVE-2023-52530": { + "cmt_msg": "wifi: mac80211: fix potential key use-after-free" + }, + "CVE-2023-52531": { + "cmt_msg": "wifi: iwlwifi: mvm: Fix a memory corruption issue" + }, + "CVE-2023-52532": { + "cmt_msg": "net: mana: Fix TX CQE error handling" + }, + "CVE-2024-26798": { + "cmt_msg": "fbcon: always restore the old font data in fbcon_do_set_font()" + }, "CVE-2023-52429": { "cmt_msg": "dm: limit the number of targets and parameter size area" }, - "CVE-2023-7042": { + "CVE-2024-26677": { + "cmt_msg": "rxrpc: Fix delayed ACKs to not set the reference serial number" + }, + "CVE-2024-26676": { + "cmt_msg": "af_unix: Call kfree_skb() for dead unix_(sk)->oob_skb in GC." + }, + "CVE-2022-0168": { + "cmt_msg": "cifs: fix NULL ptr dereference in smb2_ioctl_query_info()" + }, + "CVE-2020-26556": { "cmt_msg": "" }, - "CVE-2022-3595": { - "cmt_msg": "cifs: fix double-fault crash during ntlmssp" + "CVE-2020-26557": { + "cmt_msg": "" }, - "CVE-2021-26934": { + "CVE-2024-26776": { + "cmt_msg": "spi: hisi-sfc-v3xx: Return IRQ_NONE if no interrupts were detected" + }, + "CVE-2019-20794": { "cmt_msg": "" }, - "CVE-2023-0240": { - "cmt_msg": "io_uring: COW io_identity on mismatch" + "CVE-2020-26559": { + "cmt_msg": "" }, - "CVE-2023-47233": { + "CVE-2023-3397": { "cmt_msg": "" }, - "CVE-2022-1789": { - "cmt_msg": "KVM: x86/mmu: fix NULL pointer dereference on guest INVPCID" + "CVE-2024-26770": { + "cmt_msg": "HID: nvidia-shield: Add missing null pointer checks to LED initialization" }, - "CVE-2024-23851": { - "cmt_msg": "dm: limit the number of targets and parameter size area" + "CVE-2024-26771": { + "cmt_msg": "dmaengine: ti: edma: Add some null pointer checks to the edma_probe" }, - "CVE-2016-8660": { + "CVE-2023-52458": { + "cmt_msg": "block: add check that partition length needs to be aligned with block size" + }, + "CVE-2018-1121": { "cmt_msg": "" }, - "CVE-2023-0597": { - "cmt_msg": "x86/mm: Randomize per-cpu entry area" + "CVE-2023-28746": { + "cmt_msg": "x86/mmio: Disable KVM mitigation when X86_FEATURE_CLEAR_CPU_BUF is set" }, - "CVE-2021-3669": { - "cmt_msg": "ipc: replace costly bailout check in sysvipc_find_ipc()" + "CVE-2021-46970": { + "cmt_msg": "bus: mhi: pci_generic: Remove WQ_MEM_RECLAIM flag from state workqueue" }, - "CVE-2023-1582": { - "cmt_msg": "fs/proc: task_mmu.c: don't read mapcount for migration entry" + "CVE-2019-15794": { + "cmt_msg": "ovl: fix reference counting in ovl_mmap error path" }, - "CVE-2022-1786": { - "cmt_msg": "io_uring: remove io_identity" + "CVE-2022-3344": { + "cmt_msg": "KVM: x86: nSVM: harden svm_free_nested against freeing vmcb02 while still in use" }, - "CVE-2024-26592": { - "cmt_msg": "ksmbd: fix UAF issue in ksmbd_tcp_new_connection()" + "CVE-2023-23004": { + "cmt_msg": "malidp: Fix NULL vs IS_ERR() checking" }, - "CVE-2018-12929": { + "CVE-2023-23000": { + "cmt_msg": "phy: tegra: xusb: Fix return value of tegra_xusb_find_port_node function" + }, + "CVE-2023-6240": { "cmt_msg": "" }, - "CVE-2024-26591": { - "cmt_msg": "bpf: Fix re-attachment branch in bpf_tracing_prog_attach" + "CVE-2024-26700": { + "cmt_msg": "drm/amd/display: Fix MST Null Ptr for RV" }, - "CVE-2020-15802": { + "CVE-2024-26706": { + "cmt_msg": "parisc: Fix random data corruption from exception handler" + }, + "CVE-2022-0382": { + "cmt_msg": "net ticp:fix a kernel-infoleak in __tipc_sendmsg()" + }, + "CVE-2020-29373": { + "cmt_msg": "io_uring: grab ->fs as part of async preparation" + }, + "CVE-2019-19814": { "cmt_msg": "" }, + "CVE-2023-52620": { + "cmt_msg": "netfilter: nf_tables: disallow timeout for anonymous sets" + }, + "CVE-2023-52621": { + "cmt_msg": "bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers" + }, + "CVE-2023-52624": { + "cmt_msg": "drm/amd/display: Wake DMCUB before executing GPINT commands" + }, + "CVE-2023-52625": { + "cmt_msg": "drm/amd/display: Refactor DMCUB enter/exit idle interface" + }, + "CVE-2023-52628": { + "cmt_msg": "netfilter: nftables: exthdr: fix 4-byte stack OOB write" + }, + "CVE-2023-52629": { + "cmt_msg": "sh: push-switch: Reorder cleanup operations to avoid use-after-free bug" + }, + "CVE-2022-3523": { + "cmt_msg": "mm/memory.c: fix race when faulting a device private page" + }, "CVE-2022-3522": { "cmt_msg": "mm/hugetlb: use hugetlb_pte_stable in migration race check" }, "CVE-2008-2544": { "cmt_msg": "" }, - "CVE-2024-26595": { - "cmt_msg": "mlxsw: spectrum_acl_tcam: Fix NULL pointer dereference in error path" + "CVE-2021-47101": { + "cmt_msg": "asix: fix uninit-value in asix_mdio_read()" }, - "CVE-2022-3636": { - "cmt_msg": "net: ethernet: mtk_eth_soc: use after free in __mtk_ppe_check_skb()" + "CVE-2021-46982": { + "cmt_msg": "f2fs: compress: fix race condition of overwrite vs truncate" }, - "CVE-2023-6356": { + "CVE-2007-3719": { "cmt_msg": "" }, - "CVE-2023-52456": { - "cmt_msg": "serial: imx: fix tx statemachine deadlock" + "CVE-2023-21400": { + "cmt_msg": "" }, - "CVE-2019-15239": { - "cmt_msg": "unknown" + "CVE-2024-26585": { + "cmt_msg": "tls: fix race between tx work scheduling and socket close" }, - "CVE-2022-3534": { - "cmt_msg": "libbpf: Fix use-after-free in btf_dump_name_dups" + "CVE-2024-26584": { + "cmt_msg": "net: tls: handle backlogging of crypto requests" }, - "CVE-2007-3719": { - "cmt_msg": "" + "CVE-2024-26586": { + "cmt_msg": "mlxsw: spectrum_acl_tcam: Fix stack corruption" }, - "CVE-2023-52434": { - "cmt_msg": "smb: client: fix potential OOBs in smb2_parse_contexts()" + "CVE-2024-26589": { + "cmt_msg": "bpf: Reject variable offset alu on PTR_TO_FLOW_KEYS" }, - "CVE-2023-3397": { + "CVE-2022-3624": { + "cmt_msg": "bonding: fix reference count leak in balance-alb mode" + }, + "CVE-2022-47946": { + "cmt_msg": "io_uring: kill sqo_dead and sqo submission halting" + }, + "CVE-2022-4543": { "cmt_msg": "" }, - "CVE-2022-2961": { + "CVE-2023-52571": { + "cmt_msg": "power: supply: rk817: Fix node refcount leak" + }, + "CVE-2023-52572": { + "cmt_msg": "cifs: Fix UAF in cifs_demultiplex_thread()" + }, + "CVE-2023-4881": { + "cmt_msg": "netfilter: nftables: exthdr: fix 4-byte stack OOB write" + }, + "CVE-2013-7445": { "cmt_msg": "" }, - "CVE-2024-26586": { - "cmt_msg": "mlxsw: spectrum_acl_tcam: Fix stack corruption" + "CVE-2024-26733": { + "cmt_msg": "arp: Prevent overflow in arp_req_get()." }, - "CVE-2023-21400": { + "CVE-2024-26738": { + "cmt_msg": "powerpc/pseries/iommu: DLPAR add doesn't completely initialize pci_controller" + }, + "CVE-2024-26739": { + "cmt_msg": "net/sched: act_mirred: don't override retval if we already lost the skb" + }, + "CVE-2022-38096": { "cmt_msg": "" }, - "CVE-2023-2007": { - "cmt_msg": "scsi: dpt_i2o: Remove obsolete driver" + "CVE-2022-20148": { + "cmt_msg": "f2fs: fix UAF in f2fs_available_free_memory" }, - "CVE-2022-40133": { - "cmt_msg": "drm/vmwgfx: Remove rcu locks from user resources" + "CVE-2020-12362": { + "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" }, - "CVE-2010-4563": { + "CVE-2020-12363": { + "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" + }, + "CVE-2024-26648": { + "cmt_msg": "drm/amd/display: Fix variable deferencing before NULL check in edp_setup_replay()" + }, + "CVE-2024-26646": { + "cmt_msg": "thermal: intel: hfi: Add syscore callbacks for system-wide PM" + }, + "CVE-2024-26647": { + "cmt_msg": "drm/amd/display: Fix late derefrence 'dsc' check in 'link_set_dsc_pps_packet()'" + }, + "CVE-2024-26644": { + "cmt_msg": "btrfs: don't abort filesystem when attempting to snapshot deleted subvolume" + }, + "CVE-2024-26642": { + "cmt_msg": "netfilter: nf_tables: disallow anonymous set with timeout flag" + }, + "CVE-2024-26640": { + "cmt_msg": "tcp: add sanity checks to rx zerocopy" + }, + "CVE-2024-26641": { + "cmt_msg": "ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv()" + }, + "CVE-2023-50431": { + "cmt_msg": "accel/habanalabs: fix information leak in sec_attest_info()" + }, + "CVE-2019-15290": { "cmt_msg": "" }, - "CVE-2020-26140": { + "CVE-2021-32078": { + "cmt_msg": "ARM: footbridge: remove personal server platform" + }, + "CVE-2024-2193": { "cmt_msg": "" }, - "CVE-2020-26143": { + "CVE-2018-12930": { "cmt_msg": "" }, - "CVE-2020-26142": { + "CVE-2018-12931": { "cmt_msg": "" }, - "CVE-2023-1075": { - "cmt_msg": "net/tls: tls_is_tx_ready() checked list_entry" + "CVE-2020-12364": { + "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" }, - "CVE-2024-23848": { - "cmt_msg": "" + "CVE-2020-36781": { + "cmt_msg": "i2c: imx: fix reference leak when pm_runtime_get_sync fails" }, - "CVE-2023-6535": { - "cmt_msg": "" + "CVE-2020-36784": { + "cmt_msg": "i2c: cadence: fix reference leak when pm_runtime_get_sync fails" }, - "CVE-2023-4622": { - "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES" + "CVE-2020-27835": { + "cmt_msg": "IB/hfi1: Ensure correct mm is used at all times" }, - "CVE-2022-3533": { - "cmt_msg": "" + "CVE-2023-0240": { + "cmt_msg": "io_uring: COW io_identity on mismatch" }, - "CVE-2021-20177": { - "cmt_msg": "netfilter: add and use nf_hook_slow_list()" + "CVE-2022-3903": { + "cmt_msg": "media: mceusb: Use new usb_control_msg_*() routines" }, - "CVE-2024-26584": { - "cmt_msg": "net: tls: handle backlogging of crypto requests" + "CVE-2023-20588": { + "cmt_msg": "x86/CPU/AMD: Do not leak quotient data after a division by 0" }, - "CVE-2024-26587": { - "cmt_msg": "net: netdevsim: don't try to destroy PHC on VFs" + "CVE-2021-47070": { + "cmt_msg": "uio_hv_generic: Fix another memory leak in error handling paths" }, - "CVE-2022-1247": { - "cmt_msg": "" + "CVE-2022-44034": { + "cmt_msg": "char: pcmcia: remove all the drivers" }, - "CVE-2022-2991": { - "cmt_msg": "remove the lightnvm subsystem" + "CVE-2022-44033": { + "cmt_msg": "char: pcmcia: remove all the drivers" }, - "CVE-2024-26588": { - "cmt_msg": "LoongArch: BPF: Prevent out-of-bounds memory access" + "CVE-2022-44032": { + "cmt_msg": "char: pcmcia: remove all the drivers" }, - "CVE-2023-6270": { - "cmt_msg": "" + "CVE-2021-47077": { + "cmt_msg": "scsi: qedf: Add pointer checks in qedf_update_link_speed()" }, - "CVE-2022-3624": { - "cmt_msg": "bonding: fix reference count leak in balance-alb mode" + "CVE-2021-47076": { + "cmt_msg": "RDMA/rxe: Return CQE error if invalid lkey was supplied" }, - "CVE-2024-0841": { + "CVE-2021-47175": { + "cmt_msg": "net/sched: fq_pie: fix OOB access in the traffic path" + }, + "CVE-2021-46952": { + "cmt_msg": "NFS: fs_context: validate UDP retrans to prevent shift out-of-bounds" + }, + "CVE-2021-46959": { + "cmt_msg": "spi: Fix use-after-free with devm_spi_alloc_*" + }, + "CVE-2023-52593": { + "cmt_msg": "wifi: wfx: fix possible NULL pointer dereference in wfx_set_mfp_ap()" + }, + "CVE-2021-0929": { + "cmt_msg": "staging/android/ion: delete dma_buf->kmap/unmap implemenation" + }, + "CVE-2021-47158": { + "cmt_msg": "net: dsa: sja1105: add error handling in sja1105_setup()" + }, + "CVE-2024-26672": { + "cmt_msg": "drm/amdgpu: Fix variable 'mca_funcs' dereferenced before NULL check in 'amdgpu_mca_smu_get_mca_entry()'" + }, + "CVE-2024-26787": { + "cmt_msg": "mmc: mmci: stm32: fix DMA API overlapping mappings warning" + }, + "CVE-2024-26784": { + "cmt_msg": "pmdomain: arm: Fix NULL dereference on scmi_perf_domain removal" + }, + "CVE-2024-26789": { + "cmt_msg": "crypto: arm64/neonbs - fix out-of-bounds access on short input" + }, + "CVE-2023-39198": { + "cmt_msg": "drm/qxl: fix UAF on handle creation" + }, + "CVE-2024-26774": { + "cmt_msg": "ext4: avoid dividing by 0 in mb_update_avg_fragment_size() when block bitmap corrupt" + }, + "CVE-2023-6610": { + "cmt_msg": "smb: client: fix potential OOB in smb2_dump_detail()" + }, + "CVE-2024-26775": { + "cmt_msg": "aoe: avoid potential deadlock at set_capacity" + }, + "CVE-2024-26769": { + "cmt_msg": "nvmet-fc: avoid deadlock on delete association path" + }, + "CVE-2024-26607": { + "cmt_msg": "drm/bridge: sii902x: Fix probing race issue" + }, + "CVE-2021-33061": { + "cmt_msg": "ixgbe: add improvement for MDD response functionality" + }, + "CVE-2024-26767": { + "cmt_msg": "drm/amd/display: fixed integer types and null check locations" + }, + "CVE-2023-3389": { + "cmt_msg": "io_uring: mutex locked poll hashing" + }, + "CVE-2023-1476": { "cmt_msg": "" }, - "CVE-2022-47946": { - "cmt_msg": "io_uring: kill sqo_dead and sqo submission halting" + "CVE-2021-3864": { + "cmt_msg": "" }, - "CVE-2020-10708": { + "CVE-2022-1789": { + "cmt_msg": "KVM: x86/mmu: fix NULL pointer dereference on guest INVPCID" + }, + "CVE-2016-8660": { "cmt_msg": "" }, - "CVE-2023-0386": { - "cmt_msg": "ovl: fail on invalid uid/gid mapping at copy up" + "CVE-2023-1582": { + "cmt_msg": "fs/proc: task_mmu.c: don't read mapcount for migration entry" }, - "CVE-2021-4023": { - "cmt_msg": "io-wq: fix cancellation on create-worker failure" + "CVE-2022-1786": { + "cmt_msg": "io_uring: remove io_identity" }, - "CVE-2022-4543": { + "CVE-2008-4609": { "cmt_msg": "" }, - "CVE-2017-13693": { + "CVE-2023-52639": { + "cmt_msg": "KVM: s390: vsie: fix race during shadow creation" + }, + "CVE-2023-52638": { + "cmt_msg": "can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock" + }, + "CVE-2019-15239": { + "cmt_msg": "unknown" + }, + "CVE-2023-52635": { + "cmt_msg": "PM / devfreq: Synchronize devfreq_monitor_[start/stop]" + }, + "CVE-2023-52634": { + "cmt_msg": "drm/amd/display: Fix disable_otg_wa logic" + }, + "CVE-2023-52633": { + "cmt_msg": "um: time-travel: fix time corruption" + }, + "CVE-2023-52632": { + "cmt_msg": "drm/amdkfd: Fix lock dependency warning with srcu" + }, + "CVE-2023-20941": { "cmt_msg": "" }, - "CVE-2021-0399": { + "CVE-2022-3533": { "cmt_msg": "" }, - "CVE-2020-36691": { - "cmt_msg": "netlink: limit recursion depth in policy validation" + "CVE-2022-3534": { + "cmt_msg": "libbpf: Fix use-after-free in btf_dump_name_dups" }, - "CVE-2017-13694": { + "CVE-2021-47135": { + "cmt_msg": "mt76: mt7921: fix possible AOOB issue in mt7921_mcu_tx_rate_report" + }, + "CVE-2021-47136": { + "cmt_msg": "net: zero-initialize tc skb extension on allocation" + }, + "CVE-2021-47131": { + "cmt_msg": "net/tls: Fix use-after-free after the TLS device goes down and up" + }, + "CVE-2021-47133": { + "cmt_msg": "HID: amd_sfh: Fix memory leak in amd_sfh_work" + }, + "CVE-2022-3061": { + "cmt_msg": "video: fbdev: i740fb: Error out if 'pixclock' equals zero" + }, + "CVE-2023-0386": { + "cmt_msg": "ovl: fail on invalid uid/gid mapping at copy up" + }, + "CVE-2017-13693": { "cmt_msg": "" }, - "CVE-2024-0564": { + "CVE-2017-13694": { "cmt_msg": "" }, "CVE-2021-4148": { "cmt_msg": "mm: khugepaged: skip huge page collapse for special files" }, - "CVE-2023-4881": { - "cmt_msg": "netfilter: nftables: exthdr: fix 4-byte stack OOB write" - }, - "CVE-2023-2176": { - "cmt_msg": "RDMA/core: Refactor rdma_bind_addr" - }, - "CVE-2013-7445": { - "cmt_msg": "" + "CVE-2022-48627": { + "cmt_msg": "vt: fix memory overlapping when deleting chars in the buffer" }, - "CVE-2022-39188": { - "cmt_msg": "mmu_gather: Force tlb-flush VM_PFNMAP vmas" + "CVE-2022-48628": { + "cmt_msg": "ceph: drop messages from MDS when unmounting" }, "CVE-2024-24859": { "cmt_msg": "" @@ -146391,204 +191319,399 @@ "CVE-2024-24858": { "cmt_msg": "" }, - "CVE-2005-3660": { - "cmt_msg": "" - }, "CVE-2024-24855": { "cmt_msg": "scsi: lpfc: Fix a possible data race in lpfc_unregister_fcf_rescan()" }, "CVE-2024-24857": { "cmt_msg": "" }, - "CVE-2023-31084": { - "cmt_msg": "media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*()" + "CVE-2023-52569": { + "cmt_msg": "btrfs: remove BUG() after failure to insert delayed dir index item" }, - "CVE-2023-31083": { - "cmt_msg": "Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO" + "CVE-2023-52568": { + "cmt_msg": "x86/sgx: Resolves SECS reclaim vs. page fault for EAUG race" }, - "CVE-2023-31082": { - "cmt_msg": "" + "CVE-2023-52563": { + "cmt_msg": "drm/meson: fix memory leak on ->hpd_notify callback" }, - "CVE-2023-31081": { + "CVE-2023-52561": { + "cmt_msg": "arm64: dts: qcom: sdm845-db845c: Mark cont splash memory region as reserved" + }, + "CVE-2021-47004": { + "cmt_msg": "f2fs: fix to avoid touching checkpointed data in get_victim()" + }, + "CVE-2021-47005": { + "cmt_msg": "PCI: endpoint: Fix NULL pointer dereference for ->get_features()" + }, + "CVE-2023-52565": { + "cmt_msg": "media: uvcvideo: Fix OOB read" + }, + "CVE-2021-46928": { + "cmt_msg": "parisc: Clear stale IIR value on instruction access rights trap" + }, + "CVE-2021-46925": { + "cmt_msg": "net/smc: fix kernel panic caused by race of smc_sock" + }, + "CVE-2021-46926": { + "cmt_msg": "ALSA: hda: intel-sdw-acpi: harden detection of controller" + }, + "CVE-2020-0347": { "cmt_msg": "" }, - "CVE-2022-38096": { + "CVE-2019-12456": { "cmt_msg": "" }, - "CVE-2022-3903": { - "cmt_msg": "media: mceusb: Use new usb_control_msg_*() routines" + "CVE-2023-6546": { + "cmt_msg": "tty: n_gsm: fix the UAF caused by race condition in gsm_cleanup_mux" }, - "CVE-2022-3523": { - "cmt_msg": "mm/memory.c: fix race when faulting a device private page" + "CVE-2024-26726": { + "cmt_msg": "btrfs: don't drop extent_map for free space inode on write error" }, - "CVE-2024-23307": { + "CVE-2022-3642": { "cmt_msg": "" }, - "CVE-2022-36402": { - "cmt_msg": "drm/vmwgfx: Fix shader stage validation" + "CVE-2023-52519": { + "cmt_msg": "HID: intel-ish-hid: ipc: Disable and reenable ACPI GPE bit" }, - "CVE-2008-4609": { + "CVE-2023-52516": { + "cmt_msg": "dma-debug: don't call __dma_entry_alloc_check_leak() under free_entries_lock" + }, + "CVE-2023-52517": { + "cmt_msg": "spi: sun6i: fix race between DMA RX transfer completion and RX FIFO drain" + }, + "CVE-2023-52515": { + "cmt_msg": "RDMA/srp: Do not call scsi_done() from srp_abort()" + }, + "CVE-2019-15902": { + "cmt_msg": "unknown" + }, + "CVE-2024-25739": { "cmt_msg": "" }, - "CVE-2021-4150": { - "cmt_msg": "block: fix incorrect references to disk objects" + "CVE-2023-52511": { + "cmt_msg": "spi: sun6i: reduce DMA RX transfer width to single byte" }, - "CVE-2022-20148": { - "cmt_msg": "f2fs: fix UAF in f2fs_available_free_memory" + "CVE-2023-6535": { + "cmt_msg": "" }, - "CVE-2020-14304": { + "CVE-2018-17977": { "cmt_msg": "" }, - "CVE-2020-0347": { + "CVE-2024-1151": { + "cmt_msg": "net: openvswitch: limit the number of recursions from action sets" + }, + "CVE-2024-26659": { + "cmt_msg": "xhci: handle isoc Babble and Buffer Overrun events properly" + }, + "CVE-2024-26658": { + "cmt_msg": "bcachefs: grab s_umount only if snapshotting" + }, + "CVE-2010-5321": { "cmt_msg": "" }, - "CVE-2021-29155": { - "cmt_msg": "bpf: Use correct permission flag for mixed signed bounds arithmetic" + "CVE-2024-26655": { + "cmt_msg": "Fix memory leak in posix_clock_open()" }, - "CVE-2021-3714": { + "CVE-2024-26654": { + "cmt_msg": "ALSA: sh: aica: reorder cleanup operations to avoid UAF bugs" + }, + "CVE-2024-26656": { + "cmt_msg": "drm/amdgpu: fix use-after-free bug" + }, + "CVE-2024-26650": { + "cmt_msg": "platform/x86: p2sb: Allow p2sb_bar() calls during PCI device probe" + }, + "CVE-2023-52474": { + "cmt_msg": "IB/hfi1: Fix bugs with non-PAGE_SIZE-end multi-iovec user SDMA requests" + }, + "CVE-2023-52476": { + "cmt_msg": "perf/x86/lbr: Filter vsyscall addresses" + }, + "CVE-2023-22995": { + "cmt_msg": "usb: dwc3: dwc3-qcom: Add missing platform_device_put() in dwc3_qcom_acpi_register_core" + }, + "CVE-2024-21803": { "cmt_msg": "" }, - "CVE-2023-4133": { - "cmt_msg": "cxgb4: fix use after free bugs caused by circular dependency problem" + "CVE-2023-52479": { + "cmt_msg": "ksmbd: fix uaf in smb20_oplock_break_ack" }, - "CVE-2019-12456": { + "CVE-2021-3542": { "cmt_msg": "" }, - "CVE-2020-26560": { + "CVE-2018-12929": { "cmt_msg": "" }, - "CVE-2021-3892": { + "CVE-2018-12928": { "cmt_msg": "" }, - "CVE-2023-20928": { - "cmt_msg": "android: binder: stop saving a pointer to the VMA" + "CVE-2020-36310": { + "cmt_msg": "KVM: SVM: avoid infinite loop on NPF from bad address" }, - "CVE-2024-22386": { + "CVE-2020-36313": { + "cmt_msg": "KVM: Fix out of range accesses to memslots" + }, + "CVE-2020-10708": { "cmt_msg": "" }, - "CVE-2020-12362": { - "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" + "CVE-2022-0400": { + "cmt_msg": "" }, - "CVE-2020-12363": { - "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" + "CVE-2024-26808": { + "cmt_msg": "netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain" }, - "CVE-2023-6546": { - "cmt_msg": "tty: n_gsm: fix the UAF caused by race condition in gsm_cleanup_mux" + "CVE-2024-26809": { + "cmt_msg": "netfilter: nft_set_pipapo: release elements in clone only from destroy path" }, - "CVE-2020-12364": { - "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" + "CVE-2024-26806": { + "cmt_msg": "spi: cadence-qspi: remove system-wide suspend helper calls from runtime PM hooks" }, - "CVE-2022-3176": { - "cmt_msg": "io_uring: fix UAF due to missing POLLFREE handling" + "CVE-2024-26802": { + "cmt_msg": "stmmac: Clear variable when destroying workqueue" }, - "CVE-2024-24861": { + "CVE-2024-26803": { + "cmt_msg": "net: veth: clear GRO when clearing XDP even when down" + }, + "CVE-2022-25265": { "cmt_msg": "" }, - "CVE-2024-24864": { + "CVE-2023-3640": { "cmt_msg": "" }, - "CVE-2023-37454": { + "CVE-2021-47049": { + "cmt_msg": "Drivers: hv: vmbus: Use after free in __vmbus_open()" + }, + "CVE-2021-47046": { + "cmt_msg": "drm/amd/display: Fix off by one in hdmi_14_process_transaction()" + }, + "CVE-2023-4010": { "cmt_msg": "" }, - "CVE-2022-2327": { - "cmt_msg": "io_uring: remove any grabbing of context" + "CVE-2022-38457": { + "cmt_msg": "drm/vmwgfx: Remove rcu locks from user resources" }, - "CVE-2022-0480": { - "cmt_msg": "memcg: enable accounting for file lock caches" + "CVE-2022-20424": { + "cmt_msg": "io_uring: remove io_identity" }, - "CVE-2023-50431": { - "cmt_msg": "accel/habanalabs: fix information leak in sec_attest_info()" + "CVE-2021-46969": { + "cmt_msg": "bus: mhi: core: Fix invalid error returning in mhi_queue" }, - "CVE-2022-3642": { - "cmt_msg": "" + "CVE-2021-46965": { + "cmt_msg": "mtd: physmap: physmap-bt1-rom: Fix unintentional stack access" }, - "CVE-2024-0565": { - "cmt_msg": "smb: client: fix OOB in receive_encrypted_standard()" + "CVE-2019-19378": { + "cmt_msg": "" }, - "CVE-2022-25265": { + "CVE-2020-24503": { "cmt_msg": "" }, - "CVE-2021-4218": { - "cmt_msg": "sysctl: pass kernel pointers to ->proc_handler" + "CVE-2020-24502": { + "cmt_msg": "" }, - "CVE-2022-23222": { - "cmt_msg": "bpf: Replace PTR_TO_XXX_OR_NULL with PTR_TO_XXX | PTR_MAYBE_NULL" + "CVE-2019-19449": { + "cmt_msg": "f2fs: fix to do sanity check on segment/section count" }, - "CVE-2019-15902": { - "cmt_msg": "unknown" + "CVE-2020-24504": { + "cmt_msg": "ice: create scheduler aggregator node config and move VSIs" }, - "CVE-2024-25739": { + "CVE-2020-11725": { "cmt_msg": "" }, - "CVE-2023-33288": { - "cmt_msg": "power: supply: bq24190: Fix use after free bug in bq24190_remove due to race condition" + "CVE-2022-1263": { + "cmt_msg": "KVM: avoid NULL pointer dereference in kvm_dirty_ring_push" }, - "CVE-2019-15290": { + "CVE-2022-3606": { "cmt_msg": "" }, - "CVE-2023-4134": { - "cmt_msg": "Input: cyttsp4_core - change del_timer_sync() to timer_shutdown_sync()" - }, - "CVE-2023-6536": { + "CVE-2022-2209": { "cmt_msg": "" }, - "CVE-2022-3567": { - "cmt_msg": "ipv6: Fix data races around sk->sk_prot." + "CVE-2022-3595": { + "cmt_msg": "cifs: fix double-fault crash during ntlmssp" }, - "CVE-2022-3566": { - "cmt_msg": "tcp: Fix data races around icsk->icsk_af_ops." + "CVE-2023-52559": { + "cmt_msg": "iommu/vt-d: Avoid memory allocation in iommu_suspend()" }, - "CVE-2018-17977": { + "CVE-2023-47233": { + "cmt_msg": "wifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach" + }, + "CVE-2024-23851": { + "cmt_msg": "dm: limit the number of targets and parameter size area" + }, + "CVE-2021-26934": { "cmt_msg": "" }, - "CVE-2024-1151": { - "cmt_msg": "net: openvswitch: limit the number of recursions from action sets" + "CVE-2024-26758": { + "cmt_msg": "md: Don't ignore suspended array in md_check_recovery()" }, - "CVE-2022-41848": { + "CVE-2024-26759": { + "cmt_msg": "mm/swap: fix race when skipping swapcache" + }, + "CVE-2024-26614": { + "cmt_msg": "tcp: make sure init the accept_queue's spinlocks once" + }, + "CVE-2024-26756": { + "cmt_msg": "md: Don't register sync_thread for reshape directly" + }, + "CVE-2024-26757": { + "cmt_msg": "md: Don't ignore read-only array in md_check_recovery()" + }, + "CVE-2023-52434": { + "cmt_msg": "smb: client: fix potential OOBs in smb2_parse_contexts()" + }, + "CVE-2024-26689": { + "cmt_msg": "ceph: prevent use-after-free in encode_cap_msg()" + }, + "CVE-2022-2961": { "cmt_msg": "" }, - "CVE-2022-1116": { + "CVE-2024-26686": { + "cmt_msg": "fs/proc: do_task_stat: use sig->stats_lock to gather the threads/children stats" + }, + "CVE-2024-26687": { + "cmt_msg": "xen/events: close evtchn after mapping cleanup" + }, + "CVE-2023-51779": { + "cmt_msg": "Bluetooth: af_bluetooth: Fix Use-After-Free in bt_sock_recvmsg" + }, + "CVE-2022-40133": { + "cmt_msg": "drm/vmwgfx: Remove rcu locks from user resources" + }, + "CVE-2010-4563": { "cmt_msg": "" }, - "CVE-2010-5321": { + "CVE-2023-1249": { + "cmt_msg": "coredump: Use the vma snapshot in fill_files_note" + }, + "CVE-2021-4218": { + "cmt_msg": "sysctl: pass kernel pointers to ->proc_handler" + }, + "CVE-2023-4622": { + "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES" + }, + "CVE-2021-20177": { + "cmt_msg": "netfilter: add and use nf_hook_slow_list()" + }, + "CVE-2021-4023": { + "cmt_msg": "io-wq: fix cancellation on create-worker failure" + }, + "CVE-2023-52640": { + "cmt_msg": "fs/ntfs3: Fix oob in ntfs_listxattr" + }, + "CVE-2023-52641": { + "cmt_msg": "fs/ntfs3: Add NULL ptr dereference checking at the end of attr_allocate_frame()" + }, + "CVE-2021-0399": { "cmt_msg": "" }, - "CVE-2018-12930": { + "CVE-2023-52488": { + "cmt_msg": "serial: sc16is7xx: convert from _raw_ to _noinc_ regmap functions for FIFO" + }, + "CVE-2020-36691": { + "cmt_msg": "netlink: limit recursion depth in policy validation" + }, + "CVE-2023-52484": { + "cmt_msg": "iommu/arm-smmu-v3: Fix soft lockup triggered by arm_smmu_mm_invalidate_range" + }, + "CVE-2023-52485": { + "cmt_msg": "drm/amd/display: Wake DMCUB before sending a command" + }, + "CVE-2023-52480": { + "cmt_msg": "ksmbd: fix race condition between session lookup and expire" + }, + "CVE-2023-52481": { + "cmt_msg": "arm64: errata: Add Cortex-A520 speculative unprivileged load workaround" + }, + "CVE-2023-52482": { + "cmt_msg": "x86/srso: Add SRSO mitigation for Hygon processors" + }, + "CVE-2021-47075": { + "cmt_msg": "nvmet: fix memory leak in nvmet_alloc_ctrl()" + }, + "CVE-2023-52491": { + "cmt_msg": "media: mtk-jpeg: Fix use after free bug due to error path handling in mtk_jpeg_dec_device_run" + }, + "CVE-2021-47074": { + "cmt_msg": "nvme-loop: fix memory leak in nvme_loop_create_ctrl()" + }, + "CVE-2021-47128": { + "cmt_msg": "bpf, lockdown, audit: Fix buggy SELinux lockdown permission checks" + }, + "CVE-2021-47125": { + "cmt_msg": "sch_htb: fix refcount leak in htb_parent_to_leaf_offload" + }, + "CVE-2021-47124": { + "cmt_msg": "io_uring: fix link timeout refs" + }, + "CVE-2022-36402": { + "cmt_msg": "drm/vmwgfx: Fix shader stage validation" + }, + "CVE-2021-4150": { + "cmt_msg": "block: fix incorrect references to disk objects" + }, + "CVE-2021-29155": { + "cmt_msg": "bpf: Use correct permission flag for mixed signed bounds arithmetic" + }, + "CVE-2021-3714": { "cmt_msg": "" }, - "CVE-2018-12931": { + "CVE-2021-3892": { "cmt_msg": "" }, - "CVE-2020-29534": { - "cmt_msg": "io_uring: don't rely on weak ->files references" + "CVE-2023-20928": { + "cmt_msg": "android: binder: stop saving a pointer to the VMA" }, - "CVE-2012-4542": { + "CVE-2024-24860": { + "cmt_msg": "Bluetooth: Fix atomicity violation in {min,max}_key_size_set" + }, + "CVE-2024-24861": { + "cmt_msg": "media: xc4000: Fix atomicity violation in xc4000_get_frequency" + }, + "CVE-2024-24864": { "cmt_msg": "" }, - "CVE-2021-20239": { - "cmt_msg": "net: pass a sockptr_t into ->setsockopt" + "CVE-2023-52596": { + "cmt_msg": "sysctl: Fix out of bounds access for empty sysctl registers" }, - "CVE-2024-23196": { + "CVE-2022-2327": { + "cmt_msg": "io_uring: remove any grabbing of context" + }, + "CVE-2023-52590": { + "cmt_msg": "ocfs2: Avoid touching renamed directory if parent does not change" + }, + "CVE-2023-52591": { + "cmt_msg": "reiserfs: Avoid touching renamed directory if parent does not change" + }, + "CVE-2021-47151": { + "cmt_msg": "interconnect: qcom: bcm-voter: add a missing of_node_put()" + }, + "CVE-2024-26627": { + "cmt_msg": "scsi: core: Move scsi_host_busy() out of host lock for waking up EH handler" + }, + "CVE-2022-23222": { + "cmt_msg": "bpf: Replace PTR_TO_XXX_OR_NULL with PTR_TO_XXX | PTR_MAYBE_NULL" + }, + "CVE-2023-4134": { + "cmt_msg": "Input: cyttsp4_core - change del_timer_sync() to timer_shutdown_sync()" + }, + "CVE-2024-26623": { + "cmt_msg": "pds_core: Prevent race issues involving the adminq" + }, + "CVE-2022-41848": { "cmt_msg": "" }, + "CVE-2020-29534": { + "cmt_msg": "io_uring: don't rely on weak ->files references" + }, "CVE-2021-39801": { "cmt_msg": "" }, "CVE-2021-39800": { "cmt_msg": "" }, - "CVE-2022-4269": { - "cmt_msg": "act_mirred: use the backlog for nested calls to mirred ingress" - }, - "CVE-2020-36385": { - "cmt_msg": "RDMA/ucma: Rework ucma_migrate_id() to avoid races with destroy" - }, "CVE-2022-20166": { "cmt_msg": "drivers core: Use sysfs_emit and sysfs_emit_at for show(device *...) functions" }, - "CVE-2024-22099": { - "cmt_msg": "" - }, "CVE-2022-45885": { "cmt_msg": "" }, @@ -146601,20 +191724,20 @@ "CVE-2024-25741": { "cmt_msg": "" }, - "CVE-2023-22995": { - "cmt_msg": "usb: dwc3: dwc3-qcom: Add missing platform_device_put() in dwc3_qcom_acpi_register_core" + "CVE-2023-52508": { + "cmt_msg": "nvme-fc: Prevent null pointer dereference in nvme_fc_io_getuuid()" }, - "CVE-2024-21803": { - "cmt_msg": "" + "CVE-2024-25744": { + "cmt_msg": "x86/coco: Disable 32-bit emulation by default on TDX and SEV" }, - "CVE-2024-26594": { - "cmt_msg": "ksmbd: validate mech token in session setup" + "CVE-2023-52506": { + "cmt_msg": "LoongArch: Set all reserved memblocks on Node#0 at initialization" }, - "CVE-2021-3542": { - "cmt_msg": "" + "CVE-2023-52501": { + "cmt_msg": "ring-buffer: Do not attempt to read past \"commit\"" }, - "CVE-2024-24860": { - "cmt_msg": "Bluetooth: Fix atomicity violation in {min,max}_key_size_set" + "CVE-2023-52500": { + "cmt_msg": "scsi: pm80xx: Avoid leaking tags when processing OPC_INB_SET_CONTROLLER_CONFIG command" }, "CVE-2023-1281": { "cmt_msg": "net/sched: tcindex: update imperfect hash filters respecting rcu" @@ -146622,20 +191745,11 @@ "CVE-2022-27672": { "cmt_msg": "x86/speculation: Identify processors vulnerable to SMT RSB predictions" }, - "CVE-2020-16120": { - "cmt_msg": "ovl: switch to mounter creds in readdir" - }, - "CVE-2018-12928": { - "cmt_msg": "" - }, - "CVE-2023-6560": { - "cmt_msg": "io_uring: don't allow discontig pages for IORING_SETUP_NO_MMAP" - }, - "CVE-2020-36310": { - "cmt_msg": "KVM: SVM: avoid infinite loop on NPF from bad address" + "CVE-2024-26668": { + "cmt_msg": "netfilter: nft_limit: reject configurations that cause integer overflow" }, - "CVE-2020-36313": { - "cmt_msg": "KVM: Fix out of range accesses to memslots" + "CVE-2024-26669": { + "cmt_msg": "net/sched: flower: Fix chain template offload" }, "CVE-2015-2877": { "cmt_msg": "" @@ -146643,29 +191757,11 @@ "CVE-2023-26242": { "cmt_msg": "" }, - "CVE-2023-20588": { - "cmt_msg": "x86/CPU/AMD: Do not leak quotient data after a division by 0" - }, "CVE-2019-16089": { "cmt_msg": "" }, - "CVE-2022-0400": { - "cmt_msg": "" - }, - "CVE-2022-44034": { - "cmt_msg": "char: pcmcia: remove all the drivers" - }, - "CVE-2022-44033": { - "cmt_msg": "char: pcmcia: remove all the drivers" - }, - "CVE-2022-44032": { - "cmt_msg": "char: pcmcia: remove all the drivers" - }, - "CVE-2021-3847": { - "cmt_msg": "" - }, - "CVE-2023-20941": { - "cmt_msg": "" + "CVE-2022-3176": { + "cmt_msg": "io_uring: fix UAF due to missing POLLFREE handling" }, "CVE-2023-52442": { "cmt_msg": "ksmbd: validate session id and tree id in compound request" @@ -146673,44 +191769,49 @@ "CVE-2022-1280": { "cmt_msg": "drm: avoid circular locks in drm_mode_getconnector" }, - "CVE-2024-25744": { - "cmt_msg": "x86/coco: Disable 32-bit emulation by default on TDX and SEV" - }, "CVE-2011-4917": { "cmt_msg": "" }, "CVE-2011-4916": { "cmt_msg": "" }, - "CVE-2021-32078": { - "cmt_msg": "ARM: footbridge: remove personal server platform" - }, "CVE-2023-23039": { "cmt_msg": "" }, - "CVE-2020-27835": { - "cmt_msg": "IB/hfi1: Ensure correct mm is used at all times" + "CVE-2024-26719": { + "cmt_msg": "nouveau: offload fence uevents work to workqueue" }, - "CVE-2022-3606": { - "cmt_msg": "" + "CVE-2024-26715": { + "cmt_msg": "usb: dwc3: gadget: Fix NULL pointer dereference in dwc3_gadget_suspend" }, "CVE-2024-1312": { "cmt_msg": "mm: lock_vma_under_rcu() must check vma->anon_vma under vma lock" }, - "CVE-2023-3640": { - "cmt_msg": "" + "CVE-2024-26712": { + "cmt_msg": "powerpc/kasan: Fix addr error caused by page alignment" + }, + "CVE-2024-26713": { + "cmt_msg": "powerpc/pseries/iommu: Fix iommu initialisation during DLPAR add" } } }, "5.18": { "5.18": { + "CVE-2023-1838": { + "cmt_msg": "Fix double fget() in vhost_net_set_backend()", + "cmt_id": "fb4554c2232e44d595920f4d5c66cf8f7d13f9bc" + }, + "CVE-2022-1729": { + "cmt_msg": "perf: Fix sys_perf_event_open() race against self", + "cmt_id": "3ac6487e584a1eb54071dbe1212e05b884136704" + }, "CVE-2022-1789": { "cmt_msg": "KVM: x86/mmu: fix NULL pointer dereference on guest INVPCID", "cmt_id": "9f46c187e2e680ecd9de7983e4d081c3391acc76" }, - "CVE-2023-1838": { - "cmt_msg": "Fix double fget() in vhost_net_set_backend()", - "cmt_id": "fb4554c2232e44d595920f4d5c66cf8f7d13f9bc" + "CVE-2022-48630": { + "cmt_msg": "crypto: qcom-rng - fix infinite loop on requests not multiple of WORD_SZ", + "cmt_id": "16287397ec5c08aa58db6acf7dbc55470d78087d" }, "CVE-2023-4387": { "cmt_msg": "net: vmxnet3: fix possible use-after-free bugs in vmxnet3_rq_alloc_rx_buf()", @@ -146719,10 +191820,6 @@ "CVE-2023-4459": { "cmt_msg": "net: vmxnet3: fix possible NULL pointer dereference in vmxnet3_rq_cleanup()", "cmt_id": "edf410cb74dc612fd47ef5be319c5a0bcd6e6ccd" - }, - "CVE-2022-1729": { - "cmt_msg": "perf: Fix sys_perf_event_open() race against self", - "cmt_id": "3ac6487e584a1eb54071dbe1212e05b884136704" } }, "5.18-rc1": { @@ -146894,6 +191991,10 @@ "cmt_msg": "mptcp: fix subflow traversal at disconnect time", "cmt_id": "ff151c477f6a529b0e4643d90f4f0b8eca85de04" }, + "CVE-2022-48627": { + "cmt_msg": "vt: fix memory overlapping when deleting chars in the buffer", + "cmt_id": "14d2cc21ca622310babf373e3a8f0b40acfe8265" + }, "CVE-2022-1462": { "cmt_msg": "tty: use new tty_insert_flip_string_and_push_buffer() in pty_write()", "cmt_id": "fa3302714c03e4e6c9b5aad5dacae33e75f76cf7" @@ -146976,6 +192077,10 @@ "cmt_msg": "drm/virtio: Fix NULL vs IS_ERR checking in virtio_gpu_object_shmem_init", "cmt_id": "5e836ae771218ba91435d962c346cb116f0c1b8c" }, + "CVE-2022-47940": { + "cmt_msg": "ksmbd: validate length in smb2_write()", + "cmt_id": "61eb8b5368006fe0be0f6b1e2dff3ab284db256f" + }, "CVE-2022-2588": { "cmt_msg": "net_sched: cls_route: remove from list when handle is 0", "cmt_id": "e832c26e7edfa2ddbd2dcdd48016d13d747de6da" @@ -146988,17 +192093,17 @@ "cmt_msg": "ksmbd: prevent out of bound read for SMB2_WRITE", "cmt_id": "d3015b3bf4a3a0c5e04edcf8bb941146ce9206fd" }, - "CVE-2022-47940": { - "cmt_msg": "ksmbd: validate length in smb2_write()", - "cmt_id": "61eb8b5368006fe0be0f6b1e2dff3ab284db256f" + "CVE-2022-20422": { + "cmt_msg": "arm64: fix oops in concurrently setting insn_emulation sysctls", + "cmt_id": "6a2fd114678d7fc1b5a0f8865ae98f1c17787455" }, "CVE-2022-47941": { "cmt_msg": "ksmbd: fix memory leak in smb2_handle_negotiate", "cmt_id": "8a8315a5960bd2b5ffc75f44fc089e57c3b17c44" }, - "CVE-2022-20422": { - "cmt_msg": "arm64: fix oops in concurrently setting insn_emulation sysctls", - "cmt_id": "6a2fd114678d7fc1b5a0f8865ae98f1c17787455" + "CVE-2022-1679": { + "cmt_msg": "ath9k: fix use-after-free in ath9k_hif_usb_rx_cb", + "cmt_id": "6b14ab47937ba441e75e8dbb9fbfc9c55efa41c6" }, "CVE-2023-20928": { "cmt_msg": "android: binder: stop saving a pointer to the VMA", @@ -147008,9 +192113,9 @@ "cmt_msg": "netfilter: nf_tables: fix null deref due to zeroed list head", "cmt_id": "c90b99a6b44f2a5f8498d91cfdcf3cf28ea7c130" }, - "CVE-2022-1679": { - "cmt_msg": "ath9k: fix use-after-free in ath9k_hif_usb_rx_cb", - "cmt_id": "6b14ab47937ba441e75e8dbb9fbfc9c55efa41c6" + "CVE-2019-25162": { + "cmt_msg": "i2c: Fix a potential use after free", + "cmt_id": "e8e1a046cf87c8b1363e5de835114f2779e2aaf4" }, "CVE-2022-47939": { "cmt_msg": "ksmbd: fix use-after-free bug in smb2_tree_disconect", @@ -147031,8 +192136,26 @@ "CVE-2023-2248": { "cmt_msg": "net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg" }, - "CVE-2024-21803": { - "cmt_msg": "" + "CVE-2024-26685": { + "cmt_msg": "nilfs2: fix potential bug in end_buffer_async_write" + }, + "CVE-2023-52615": { + "cmt_msg": "hwrng: core - Fix page fault dead lock on mmap-ed hwrng" + }, + "CVE-2023-52614": { + "cmt_msg": "PM / devfreq: Fix buffer overflow in trans_stat_show" + }, + "CVE-2023-52617": { + "cmt_msg": "PCI: switchtec: Fix stdev_release() crash after surprise hot remove" + }, + "CVE-2023-52616": { + "cmt_msg": "crypto: lib/mpi - Fix unexpected pointer access in mpi_ec_init" + }, + "CVE-2023-52610": { + "cmt_msg": "net/sched: act_ct: fix skb leak and crash on ooo frags" + }, + "CVE-2023-52612": { + "cmt_msg": "crypto: scomp - fix req->dst buffer overflow" }, "CVE-2022-47520": { "cmt_msg": "wifi: wilc1000: validate pairwise and authentication suite offsets" @@ -147043,6 +192166,9 @@ "CVE-2023-5717": { "cmt_msg": "perf: Disallow mis-matched inherited group reads" }, + "CVE-2024-26615": { + "cmt_msg": "net/smc: fix illegal rmb_desc access in SMC-D connection dump" + }, "CVE-2023-4273": { "cmt_msg": "exfat: check if filename entries exceeds max filename length" }, @@ -147061,6 +192187,9 @@ "CVE-2024-0584": { "cmt_msg": "ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet" }, + "CVE-2024-26614": { + "cmt_msg": "tcp: make sure init the accept_queue's spinlocks once" + }, "CVE-2023-2163": { "cmt_msg": "bpf: Fix incorrect verifier pruning due to missing register precision taints" }, @@ -147121,12 +192250,21 @@ "CVE-2022-3633": { "cmt_msg": "can: j1939: j1939_session_destroy(): fix memory leak of skbs" }, - "CVE-2024-25739": { - "cmt_msg": "" + "CVE-2023-52506": { + "cmt_msg": "LoongArch: Set all reserved memblocks on Node#0 at initialization" + }, + "CVE-2023-52513": { + "cmt_msg": "RDMA/siw: Fix connection failure handling" + }, + "CVE-2023-52510": { + "cmt_msg": "ieee802154: ca8210: Fix a potential UAF in ca8210_probe" }, "CVE-2022-2602": { "cmt_msg": "io_uring/af_unix: defer registered files gc to io_uring release" }, + "CVE-2023-52511": { + "cmt_msg": "spi: sun6i: reduce DMA RX transfer width to single byte" + }, "CVE-2023-2002": { "cmt_msg": "bluetooth: Perform careful capability checks in hci_sock_ioctl()" }, @@ -147175,30 +192313,69 @@ "CVE-2023-1073": { "cmt_msg": "HID: check empty report_list in hid_validate_values()" }, + "CVE-2024-26747": { + "cmt_msg": "usb: roles: fix NULL pointer issue when put module's reference" + }, + "CVE-2024-26783": { + "cmt_msg": "mm/vmscan: fix a bug calling wakeup_kswapd() with a wrong zone index" + }, + "CVE-2024-26745": { + "cmt_msg": "powerpc/pseries/iommu: IOMMU table is not initialized for kdump over SR-IOV" + }, "CVE-2023-51781": { "cmt_msg": "appletalk: Fix Use-After-Free in atalk_ioctl" }, + "CVE-2024-26743": { + "cmt_msg": "RDMA/qedr: Fix qedr_create_user_qp error flow" + }, "CVE-2023-3006": { "cmt_msg": "arm64: Add AMPERE1 to the Spectre-BHB affected list" }, + "CVE-2024-26749": { + "cmt_msg": "usb: cdns3: fixed memory use after free at cdns3_gadget_ep_disable()" + }, + "CVE-2024-26748": { + "cmt_msg": "usb: cdns3: fix memory double free when handle zero packet" + }, "CVE-2023-1652": { "cmt_msg": "NFSD: fix use-after-free in nfsd4_ssc_setup_dul()" }, + "CVE-2024-26787": { + "cmt_msg": "mmc: mmci: stm32: fix DMA API overlapping mappings warning" + }, "CVE-2022-3707": { "cmt_msg": "drm/i915/gvt: fix double free bug in split_2MB_gtt_entry" }, "CVE-2024-22386": { "cmt_msg": "" }, + "CVE-2024-26699": { + "cmt_msg": "drm/amd/display: Fix array-index-out-of-bounds in dcn35_clkmgr" + }, + "CVE-2024-26698": { + "cmt_msg": "hv_netvsc: Fix race condition between netvsc_probe and netvsc_remove" + }, + "CVE-2024-26691": { + "cmt_msg": "KVM: arm64: Fix circular locking dependency" + }, "CVE-2024-0562": { "cmt_msg": "writeback: avoid use-after-free after removing device" }, + "CVE-2023-52520": { + "cmt_msg": "platform/x86: think-lmi: Fix reference leak" + }, "CVE-2024-0564": { "cmt_msg": "" }, "CVE-2024-0565": { "cmt_msg": "smb: client: fix OOB in receive_encrypted_standard()" }, + "CVE-2024-26697": { + "cmt_msg": "nilfs2: fix data corruption in dsync block recovery for small block sizes" + }, + "CVE-2024-26696": { + "cmt_msg": "nilfs2: fix hang in nilfs_lookup_dirty_data_buffers()" + }, "CVE-2023-2176": { "cmt_msg": "RDMA/core: Refactor rdma_bind_addr" }, @@ -147208,9 +192385,15 @@ "CVE-2022-4139": { "cmt_msg": "drm/i915: fix TLB invalidation for Gen12 video and compute engines" }, + "CVE-2024-26788": { + "cmt_msg": "dmaengine: fsl-qdma: init irq after reg initialization" + }, "CVE-2005-3660": { "cmt_msg": "" }, + "CVE-2023-52619": { + "cmt_msg": "pstore/ram: Fix crash when setting number of cpus to an odd number" + }, "CVE-2023-31085": { "cmt_msg": "ubi: Refuse attaching if mtd's erasesize is 0" }, @@ -147226,8 +192409,17 @@ "CVE-2023-31081": { "cmt_msg": "" }, - "CVE-2024-23307": { - "cmt_msg": "" + "CVE-2023-52618": { + "cmt_msg": "block/rnbd-srv: Check for unlikely string overflow" + }, + "CVE-2024-0646": { + "cmt_msg": "net: tls, update curr on splice as well" + }, + "CVE-2023-52598": { + "cmt_msg": "s390/ptrace: handle setting of fpc register correctly" + }, + "CVE-2023-52499": { + "cmt_msg": "powerpc/47x: Fix 47x syscall return crash" }, "CVE-2022-4543": { "cmt_msg": "" @@ -147235,9 +192427,21 @@ "CVE-2022-3028": { "cmt_msg": "af_key: Do not call xfrm_probe_algs in parallel" }, + "CVE-2023-52493": { + "cmt_msg": "bus: mhi: host: Drop chan lock before queuing buffers" + }, + "CVE-2023-52492": { + "cmt_msg": "dmaengine: fix NULL pointer in channel unregistration function" + }, "CVE-2020-14304": { "cmt_msg": "" }, + "CVE-2023-52497": { + "cmt_msg": "erofs: fix lz4 inplace decompression" + }, + "CVE-2023-52494": { + "cmt_msg": "bus: mhi: host: Add alignment check for event ring read pointer" + }, "CVE-2023-3610": { "cmt_msg": "netfilter: nf_tables: fix chain binding transaction logic" }, @@ -147259,6 +192463,9 @@ "CVE-2023-39198": { "cmt_msg": "drm/qxl: fix UAF on handle creation" }, + "CVE-2024-26656": { + "cmt_msg": "drm/amdgpu: fix use-after-free bug" + }, "CVE-2023-37454": { "cmt_msg": "" }, @@ -147274,15 +192481,27 @@ "CVE-2022-36402": { "cmt_msg": "drm/vmwgfx: Fix shader stage validation" }, + "CVE-2023-52484": { + "cmt_msg": "iommu/arm-smmu-v3: Fix soft lockup triggered by arm_smmu_mm_invalidate_range" + }, + "CVE-2023-52586": { + "cmt_msg": "drm/msm/dpu: Add mutex lock in control vblank irq" + }, "CVE-2023-42754": { "cmt_msg": "ipv4: fix null-deref in ipv4_link_failure" }, + "CVE-2023-52580": { + "cmt_msg": "net/core: Fix ETH_P_1588 flow dissector" + }, "CVE-2023-35829": { "cmt_msg": "media: rkvdec: fix use after free bug in rkvdec_remove" }, "CVE-2023-35828": { "cmt_msg": "usb: gadget: udc: renesas_usb3: Fix use after free bug in renesas_usb3_remove due to race condition" }, + "CVE-2023-52583": { + "cmt_msg": "ceph: fix deadlock or deadcode of misusing dget()" + }, "CVE-2022-1116": { "cmt_msg": "" }, @@ -147292,6 +192511,9 @@ "CVE-2023-35823": { "cmt_msg": "media: saa7134: fix use after free bug in saa7134_finidev due to race condition" }, + "CVE-2023-52582": { + "cmt_msg": "netfs: Only call folio_start_fscache() one time for each folio" + }, "CVE-2023-35824": { "cmt_msg": "media: dm1105: Fix use after free bug in dm1105_remove due to race condition" }, @@ -147301,6 +192523,15 @@ "CVE-2023-35826": { "cmt_msg": "media: cedrus: fix use after free bug in cedrus_remove due to race condition" }, + "CVE-2023-52585": { + "cmt_msg": "drm/amdgpu: Fix possible NULL dereference in amdgpu_ras_query_error_status_helper()" + }, + "CVE-2023-52584": { + "cmt_msg": "spmi: mediatek: Fix UAF on device remove" + }, + "CVE-2023-52587": { + "cmt_msg": "IB/ipoib: Fix mcast list locking" + }, "CVE-2023-38432": { "cmt_msg": "ksmbd: validate command payload size" }, @@ -147319,9 +192550,30 @@ "CVE-2022-4269": { "cmt_msg": "act_mirred: use the backlog for nested calls to mirred ingress" }, + "CVE-2024-26769": { + "cmt_msg": "nvmet-fc: avoid deadlock on delete association path" + }, + "CVE-2023-52483": { + "cmt_msg": "mctp: perform route lookups under a RCU read-side lock" + }, + "CVE-2023-52589": { + "cmt_msg": "media: rkisp1: Fix IRQ disable race issue" + }, + "CVE-2023-52588": { + "cmt_msg": "f2fs: fix to tag gcing flag on page during block migration" + }, + "CVE-2024-26768": { + "cmt_msg": "LoongArch: Change acpi_core_pic[NR_CPUS] to acpi_core_pic[MAX_CORE_PIC]" + }, "CVE-2023-52340": { "cmt_msg": "ipv6: remove max_size check inline with ipv4" }, + "CVE-2024-26767": { + "cmt_msg": "drm/amd/display: fixed integer types and null check locations" + }, + "CVE-2023-52475": { + "cmt_msg": "Input: powermate - fix use-after-free in powermate_config_complete" + }, "CVE-2023-6560": { "cmt_msg": "io_uring: don't allow discontig pages for IORING_SETUP_NO_MMAP" }, @@ -147331,9 +192583,45 @@ "CVE-2023-1611": { "cmt_msg": "btrfs: fix race between quota disable and quota assign ioctls" }, + "CVE-2024-25739": { + "cmt_msg": "" + }, + "CVE-2024-26763": { + "cmt_msg": "dm-crypt: don't modify the data when using authenticated encryption" + }, + "CVE-2024-26756": { + "cmt_msg": "md: Don't register sync_thread for reshape directly" + }, + "CVE-2024-26795": { + "cmt_msg": "riscv: Sparse-Memory/vmemmap out-of-bounds fix" + }, + "CVE-2024-26797": { + "cmt_msg": "drm/amd/display: Prevent potential buffer overflow in map_hw_resources" + }, + "CVE-2024-26790": { + "cmt_msg": "dmaengine: fsl-qdma: fix SoC may hang on 16 byte unaligned read" + }, "CVE-2024-0639": { "cmt_msg": "sctp: fix potential deadlock on &net->sctp.addr_wq_lock" }, + "CVE-2024-26793": { + "cmt_msg": "gtp: fix use-after-free and null-ptr-deref in gtp_newlink()" + }, + "CVE-2023-52530": { + "cmt_msg": "wifi: mac80211: fix potential key use-after-free" + }, + "CVE-2023-52531": { + "cmt_msg": "wifi: iwlwifi: mvm: Fix a memory corruption issue" + }, + "CVE-2023-52532": { + "cmt_msg": "net: mana: Fix TX CQE error handling" + }, + "CVE-2024-26798": { + "cmt_msg": "fbcon: always restore the old font data in fbcon_do_set_font()" + }, + "CVE-2024-26799": { + "cmt_msg": "ASoC: qcom: Fix uninitialized pointer dmactl" + }, "CVE-2013-7445": { "cmt_msg": "" }, @@ -147349,15 +192637,33 @@ "CVE-2023-46862": { "cmt_msg": "io_uring/fdinfo: lock SQ thread while retrieving thread cpu/pid" }, + "CVE-2024-26677": { + "cmt_msg": "rxrpc: Fix delayed ACKs to not set the reference serial number" + }, + "CVE-2024-26676": { + "cmt_msg": "af_unix: Call kfree_skb() for dead unix_(sk)->oob_skb in GC." + }, + "CVE-2024-26675": { + "cmt_msg": "ppp_async: limit MRU to 64K" + }, "CVE-2020-26556": { "cmt_msg": "" }, "CVE-2020-26557": { "cmt_msg": "" }, + "CVE-2024-26671": { + "cmt_msg": "blk-mq: fix IO hang from sbitmap wakeup race" + }, "CVE-2023-34324": { "cmt_msg": "xen/events: replace evtchn_rwlock with RCU" }, + "CVE-2024-26776": { + "cmt_msg": "spi: hisi-sfc-v3xx: Return IRQ_NONE if no interrupts were detected" + }, + "CVE-2024-26777": { + "cmt_msg": "fbdev: sis: Error out if pixclock equals zero" + }, "CVE-2019-20794": { "cmt_msg": "" }, @@ -147367,45 +192673,78 @@ "CVE-2023-3397": { "cmt_msg": "" }, + "CVE-2024-26773": { + "cmt_msg": "ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found()" + }, + "CVE-2024-26679": { + "cmt_msg": "inet: read sk->sk_family once in inet_recv_error()" + }, + "CVE-2024-26771": { + "cmt_msg": "dmaengine: ti: edma: Add some null pointer checks to the edma_probe" + }, "CVE-2023-52458": { "cmt_msg": "block: add check that partition length needs to be aligned with block size" }, - "CVE-2023-52457": { - "cmt_msg": "serial: 8250: omap: Don't skip resource freeing if pm_runtime_resume_and_get() failed" - }, "CVE-2018-1121": { "cmt_msg": "" }, "CVE-2023-52454": { "cmt_msg": "nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length" }, + "CVE-2023-28746": { + "cmt_msg": "x86/mmio: Disable KVM mitigation when X86_FEATURE_CLEAR_CPU_BUF is set" + }, "CVE-2023-52452": { "cmt_msg": "bpf: Fix accesses to uninit stack slots" }, "CVE-2023-52451": { "cmt_msg": "powerpc/pseries/memhp: Fix access beyond end of drmem array" }, + "CVE-2024-26602": { + "cmt_msg": "sched/membarrier: reduce the ability to hammer on sys_membarrier" + }, "CVE-2024-1085": { "cmt_msg": "netfilter: nf_tables: check if catch-all set element is active in next generation" }, "CVE-2024-1086": { "cmt_msg": "netfilter: nf_tables: reject QUEUE/DROP verdict parameters" }, + "CVE-2024-26735": { + "cmt_msg": "ipv6: sr: fix possible use-after-free and null-ptr-deref" + }, "CVE-2022-3344": { "cmt_msg": "KVM: x86: nSVM: harden svm_free_nested against freeing vmcb02 while still in use" }, "CVE-2023-23004": { "cmt_msg": "malidp: Fix NULL vs IS_ERR() checking" }, + "CVE-2024-21803": { + "cmt_msg": "" + }, "CVE-2023-6240": { "cmt_msg": "" }, + "CVE-2024-26700": { + "cmt_msg": "drm/amd/display: Fix MST Null Ptr for RV" + }, + "CVE-2024-26707": { + "cmt_msg": "net: hsr: remove WARN_ONCE() in send_hsr_supervision_frame()" + }, + "CVE-2024-26706": { + "cmt_msg": "parisc: Fix random data corruption from exception handler" + }, "CVE-2023-23559": { "cmt_msg": "wifi: rndis_wlan: Prevent buffer overflow in rndis_query_oid" }, "CVE-2022-39842": { "cmt_msg": "video: fbdev: pxa3xx-gcu: Fix integer overflow in pxa3xx_gcu_write" }, + "CVE-2024-26702": { + "cmt_msg": "iio: magnetometer: rm3100: add boundary check for the value read from RM3100_REG_TMRC" + }, + "CVE-2024-26603": { + "cmt_msg": "x86/fpu: Stop relying on userspace for info to fault in xsave buffer" + }, "CVE-2023-3812": { "cmt_msg": "net: tun: fix bugs for oversize packet when napi frags enabled" }, @@ -147418,6 +192757,30 @@ "CVE-2019-19814": { "cmt_msg": "" }, + "CVE-2023-52620": { + "cmt_msg": "netfilter: nf_tables: disallow timeout for anonymous sets" + }, + "CVE-2023-52621": { + "cmt_msg": "bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers" + }, + "CVE-2023-52622": { + "cmt_msg": "ext4: avoid online resizing failures due to oversized flex bg" + }, + "CVE-2023-52623": { + "cmt_msg": "SUNRPC: Fix a suspicious RCU usage warning" + }, + "CVE-2023-52624": { + "cmt_msg": "drm/amd/display: Wake DMCUB before executing GPINT commands" + }, + "CVE-2023-52625": { + "cmt_msg": "drm/amd/display: Refactor DMCUB enter/exit idle interface" + }, + "CVE-2023-52627": { + "cmt_msg": "iio: adc: ad7091r: Allow users to configure device events" + }, + "CVE-2023-52628": { + "cmt_msg": "netfilter: nftables: exthdr: fix 4-byte stack OOB write" + }, "CVE-2021-26934": { "cmt_msg": "" }, @@ -147433,6 +192796,9 @@ "CVE-2023-0210": { "cmt_msg": "ksmbd: check nt_len to be at least CIFS_ENCPWD_SIZE in ksmbd_decode_ntlmssp_auth_blob" }, + "CVE-2024-26601": { + "cmt_msg": "ext4: regenerate buddy after block freeing failed if under fc replay" + }, "CVE-2022-3524": { "cmt_msg": "tcp/udp: Fix memory leak in ipv6_renew_options()." }, @@ -147490,9 +192856,6 @@ "CVE-2024-26584": { "cmt_msg": "net: tls: handle backlogging of crypto requests" }, - "CVE-2024-26587": { - "cmt_msg": "net: netdevsim: don't try to destroy PHC on VFs" - }, "CVE-2022-1247": { "cmt_msg": "" }, @@ -147514,12 +192877,33 @@ "CVE-2022-3625": { "cmt_msg": "devlink: Fix use-after-free after a failed reload" }, + "CVE-2024-26625": { + "cmt_msg": "llc: call sock_orphan() at release time" + }, "CVE-2023-3090": { "cmt_msg": "ipvlan:Fix out-of-bounds caused by unclear skb->cb" }, + "CVE-2023-52578": { + "cmt_msg": "net: bridge: use DEV_STATS_INC()" + }, + "CVE-2023-52574": { + "cmt_msg": "team: fix null-ptr-deref when team device type is changed" + }, + "CVE-2023-52576": { + "cmt_msg": "x86/mm, kexec, ima: Use memblock_free_late() from ima_free_kexec_buffer()" + }, "CVE-2022-3238": { "cmt_msg": "" }, + "CVE-2023-52571": { + "cmt_msg": "power: supply: rk817: Fix node refcount leak" + }, + "CVE-2023-52572": { + "cmt_msg": "cifs: Fix UAF in cifs_demultiplex_thread()" + }, + "CVE-2023-52573": { + "cmt_msg": "net: rds: Fix possible NULL-pointer dereference" + }, "CVE-2023-4921": { "cmt_msg": "net: sched: sch_qfq: Fix UAF in qfq_dequeue()" }, @@ -147547,12 +192931,27 @@ "CVE-2023-31248": { "cmt_msg": "netfilter: nf_tables: do not ignore genmask when looking up chain by id" }, + "CVE-2024-26736": { + "cmt_msg": "afs: Increase buffer size in afs_update_volume_status()" + }, + "CVE-2024-26737": { + "cmt_msg": "bpf: Fix racing between bpf_timer_cancel_and_free and bpf_timer_cancel" + }, "CVE-2024-26593": { "cmt_msg": "i2c: i801: Fix block process call transactions" }, + "CVE-2024-26738": { + "cmt_msg": "powerpc/pseries/iommu: DLPAR add doesn't completely initialize pci_controller" + }, + "CVE-2024-26739": { + "cmt_msg": "net/sched: act_mirred: don't override retval if we already lost the skb" + }, "CVE-2022-38096": { "cmt_msg": "" }, + "CVE-2024-26805": { + "cmt_msg": "netlink: Fix kernel-infoleak-after-free in __skb_datagram_iter" + }, "CVE-2022-3303": { "cmt_msg": "ALSA: pcm: oss: Fix race at SNDCTL_DSP_SYNC" }, @@ -147583,15 +192982,39 @@ "CVE-2021-33631": { "cmt_msg": "ext4: fix kernel BUG in 'ext4_write_inline_data_end()'" }, + "CVE-2024-26803": { + "cmt_msg": "net: veth: clear GRO when clearing XDP even when down" + }, "CVE-2024-26598": { "cmt_msg": "KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache" }, "CVE-2022-4129": { "cmt_msg": "l2tp: Serialize access to sk_user_data with sk_callback_lock" }, + "CVE-2024-26648": { + "cmt_msg": "drm/amd/display: Fix variable deferencing before NULL check in edp_setup_replay()" + }, + "CVE-2024-26646": { + "cmt_msg": "thermal: intel: hfi: Add syscore callbacks for system-wide PM" + }, + "CVE-2024-26647": { + "cmt_msg": "drm/amd/display: Fix late derefrence 'dsc' check in 'link_set_dsc_pps_packet()'" + }, + "CVE-2024-26644": { + "cmt_msg": "btrfs: don't abort filesystem when attempting to snapshot deleted subvolume" + }, + "CVE-2024-26645": { + "cmt_msg": "tracing: Ensure visibility when inserting an element into tracing_map" + }, "CVE-2023-33203": { "cmt_msg": "net: qcom/emac: Fix use after free bug in emac_remove due to race condition" }, + "CVE-2024-26640": { + "cmt_msg": "tcp: add sanity checks to rx zerocopy" + }, + "CVE-2024-26641": { + "cmt_msg": "ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv()" + }, "CVE-2023-26544": { "cmt_msg": "fs/ntfs3: Fix slab-out-of-bounds read in run_unpack" }, @@ -147601,6 +193024,12 @@ "CVE-2023-50431": { "cmt_msg": "accel/habanalabs: fix information leak in sec_attest_info()" }, + "CVE-2024-26791": { + "cmt_msg": "btrfs: dev-replace: properly validate device names" + }, + "CVE-2023-52467": { + "cmt_msg": "mfd: syscon: Fix null pointer dereference in of_syscon_register()" + }, "CVE-2023-52464": { "cmt_msg": "EDAC/thunderx: Fix possible out-of-bounds string access" }, @@ -147613,6 +193042,9 @@ "CVE-2021-3892": { "cmt_msg": "" }, + "CVE-2023-52469": { + "cmt_msg": "drivers/amd/pm: fix a use-after-free in kv_parse_power_table" + }, "CVE-2019-15290": { "cmt_msg": "" }, @@ -147622,21 +193054,42 @@ "CVE-2024-23848": { "cmt_msg": "" }, + "CVE-2024-26633": { + "cmt_msg": "ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim()" + }, + "CVE-2024-26632": { + "cmt_msg": "block: Fix iterating over an empty bio with bio_for_each_folio_all" + }, "CVE-2023-6622": { "cmt_msg": "netfilter: nf_tables: bail out on mismatching dynset and set expressions" }, + "CVE-2024-26733": { + "cmt_msg": "arp: Prevent overflow in arp_req_get()." + }, "CVE-2023-28866": { "cmt_msg": "Bluetooth: HCI: Fix global-out-of-bounds" }, + "CVE-2024-26635": { + "cmt_msg": "llc: Drop support for ETH_P_TR_802_2." + }, "CVE-2022-26878": { "cmt_msg": "" }, + "CVE-2023-52639": { + "cmt_msg": "KVM: s390: vsie: fix race during shadow creation" + }, + "CVE-2024-2193": { + "cmt_msg": "" + }, "CVE-2018-12930": { "cmt_msg": "" }, "CVE-2023-25012": { "cmt_msg": "HID: bigben: use spinlock to safely schedule workers" }, + "CVE-2023-52637": { + "cmt_msg": "can: j1939: Fix UAF in j1939_sk_match_filter during setsockopt(SO_J1939_FILTER)" + }, "CVE-2023-1990": { "cmt_msg": "nfc: st-nci: Fix use after free bug in ndlc_remove due to race condition" }, @@ -147646,6 +193099,9 @@ "CVE-2022-4662": { "cmt_msg": "USB: core: Prevent nested device-reset calls" }, + "CVE-2024-26684": { + "cmt_msg": "net: stmmac: xgmac: fix handling of DPP safety error for DMA channels" + }, "CVE-2024-25740": { "cmt_msg": "" }, @@ -147655,6 +193111,9 @@ "CVE-2022-3903": { "cmt_msg": "media: mceusb: Use new usb_control_msg_*() routines" }, + "CVE-2024-26642": { + "cmt_msg": "netfilter: nf_tables: disallow anonymous set with timeout flag" + }, "CVE-2023-1195": { "cmt_msg": "cifs: fix use-after-free caused by invalid pointer `hostname`" }, @@ -147679,18 +193138,27 @@ "CVE-2022-44032": { "cmt_msg": "char: pcmcia: remove all the drivers" }, + "CVE-2023-52595": { + "cmt_msg": "wifi: rt2x00: restart beacon queue when hardware reset" + }, "CVE-2022-48502": { "cmt_msg": "fs/ntfs3: Check fields while reading" }, "CVE-2022-3977": { "cmt_msg": "mctp: prevent double key removal and unref" }, + "CVE-2024-26782": { + "cmt_msg": "mptcp: fix double-free on socket dismantle" + }, "CVE-2023-21102": { "cmt_msg": "efi: rt-wrapper: Add missing include" }, "CVE-2024-22705": { "cmt_msg": "ksmbd: fix slab-out-of-bounds in smb_strndup_from_utf16()" }, + "CVE-2024-26622": { + "cmt_msg": "tomoyo: fix UAF write bug in tomoyo_write_control()" + }, "CVE-2022-3619": { "cmt_msg": "Bluetooth: L2CAP: Fix memory leak in vhci_write" }, @@ -147703,20 +193171,35 @@ "CVE-2023-38427": { "cmt_msg": "ksmbd: fix out-of-bound read in deassemble_neg_contexts()" }, + "CVE-2023-52527": { + "cmt_msg": "ipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data()" + }, "CVE-2022-2785": { "cmt_msg": "bpf: Disallow bpf programs call prog_run command." }, + "CVE-2023-52523": { + "cmt_msg": "bpf, sockmap: Reject sk_msg egress redirects to non-TCP sockets" + }, + "CVE-2023-52522": { + "cmt_msg": "net: fix possible store tearing in neigh_periodic_work()" + }, "CVE-2022-3586": { "cmt_msg": "sch_sfb: Don't assume the skb is still around after enqueueing to child" }, "CVE-2024-0641": { "cmt_msg": "tipc: fix a potential deadlock on &tx->lock" }, + "CVE-2024-26789": { + "cmt_msg": "crypto: arm64/neonbs - fix out-of-bounds access on short input" + }, "CVE-2022-43945": { "cmt_msg": "NFSD: Protect against send buffer overflow in NFSv2 READDIR" }, - "CVE-2024-0646": { - "cmt_msg": "net: tls, update curr on splice as well" + "CVE-2023-52529": { + "cmt_msg": "HID: sony: Fix a potential memory leak in sony_probe()" + }, + "CVE-2023-52528": { + "cmt_msg": "net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg" }, "CVE-2023-2430": { "cmt_msg": "io_uring/msg_ring: fix missing lock on overflow for IOPOLL" @@ -147742,9 +193225,30 @@ "CVE-2023-38430": { "cmt_msg": "ksmbd: validate smb request protocol id" }, + "CVE-2024-26600": { + "cmt_msg": "phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP" + }, "CVE-2023-3390": { "cmt_msg": "netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE" }, + "CVE-2024-26606": { + "cmt_msg": "binder: signal epoll threads of self-work" + }, + "CVE-2024-26607": { + "cmt_msg": "drm/bridge: sii902x: Fix probing race issue" + }, + "CVE-2024-26765": { + "cmt_msg": "LoongArch: Disable IRQ before init_fn() for nonboot CPUs" + }, + "CVE-2024-26764": { + "cmt_msg": "fs/aio: Restrict kiocb_set_cancel_fn() to I/O submitted via libaio" + }, + "CVE-2024-26608": { + "cmt_msg": "ksmbd: fix global oob in ksmbd_nl_policy" + }, + "CVE-2024-26766": { + "cmt_msg": "IB/hfi1: Fix sdma.h tx->num_descs off-by-one error" + }, "CVE-2023-3389": { "cmt_msg": "io_uring: mutex locked poll hashing" }, @@ -147754,6 +193258,9 @@ "CVE-2021-3864": { "cmt_msg": "" }, + "CVE-2024-26770": { + "cmt_msg": "HID: nvidia-shield: Add missing null pointer checks to LED initialization" + }, "CVE-2024-23849": { "cmt_msg": "net/rds: Fix UBSAN: array-index-out-of-bounds in rds_cmsg_recv" }, @@ -147772,14 +193279,11 @@ "CVE-2023-20569": { "cmt_msg": "x86/bugs: Increase the x86 bugs vector size to two u32s" }, - "CVE-2024-26588": { - "cmt_msg": "LoongArch: BPF: Prevent out-of-bounds memory access" - }, "CVE-2016-8660": { "cmt_msg": "" }, "CVE-2023-6270": { - "cmt_msg": "" + "cmt_msg": "aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts" }, "CVE-2023-2156": { "cmt_msg": "net: rpl: fix rpl header size calculation" @@ -147797,7 +193301,10 @@ "cmt_msg": "" }, "CVE-2023-6356": { - "cmt_msg": "" + "cmt_msg": "nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length" + }, + "CVE-2024-26744": { + "cmt_msg": "RDMA/srpt: Support specifying the srpt_service_guid parameter" }, "CVE-2023-26607": { "cmt_msg": "ntfs: fix out-of-bounds read in ntfs_attr_find()" @@ -147808,9 +193315,30 @@ "CVE-2019-15239": { "cmt_msg": "unknown" }, + "CVE-2023-52635": { + "cmt_msg": "PM / devfreq: Synchronize devfreq_monitor_[start/stop]" + }, + "CVE-2023-52634": { + "cmt_msg": "drm/amd/display: Fix disable_otg_wa logic" + }, + "CVE-2023-52633": { + "cmt_msg": "um: time-travel: fix time corruption" + }, + "CVE-2023-52632": { + "cmt_msg": "drm/amdkfd: Fix lock dependency warning with srcu" + }, + "CVE-2023-52631": { + "cmt_msg": "fs/ntfs3: Fix an NULL dereference bug" + }, + "CVE-2023-52630": { + "cmt_msg": "blk-iocost: Fix an UBSAN shift-out-of-bounds warning" + }, "CVE-2023-20941": { "cmt_msg": "" }, + "CVE-2024-26740": { + "cmt_msg": "net/sched: act_mirred: use the backlog for mirred ingress" + }, "CVE-2023-4155": { "cmt_msg": "KVM: SEV: only access GHCB fields once" }, @@ -147853,6 +193381,12 @@ "CVE-2023-28327": { "cmt_msg": "af_unix: Get user_ns from in_skb in unix_diag_get_exact()." }, + "CVE-2023-52638": { + "cmt_msg": "can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock" + }, + "CVE-2024-26631": { + "cmt_msg": "ipv6: mcast: fix data-race in ipv6_mc_down / mld_ifc_work" + }, "CVE-2017-13693": { "cmt_msg": "" }, @@ -147874,6 +193408,9 @@ "CVE-2022-42895": { "cmt_msg": "Bluetooth: L2CAP: Fix attempting to access uninitialized memory" }, + "CVE-2024-26636": { + "cmt_msg": "llc: make llc_ui_sendmsg() more robust against bonding changes" + }, "CVE-2023-33952": { "cmt_msg": "drm/vmwgfx: Do not drop the reference to the handle too soon" }, @@ -147883,6 +193420,9 @@ "CVE-2022-4382": { "cmt_msg": "USB: gadgetfs: Fix race between mounting and unmounting" }, + "CVE-2022-48628": { + "cmt_msg": "ceph: drop messages from MDS when unmounting" + }, "CVE-2024-24859": { "cmt_msg": "" }, @@ -147895,36 +193435,72 @@ "CVE-2024-24857": { "cmt_msg": "" }, + "CVE-2024-26673": { + "cmt_msg": "netfilter: nft_ct: sanitize layer 3 and 4 protocol number in custom expectations" + }, "CVE-2022-3545": { "cmt_msg": "nfp: fix use-after-free in area_cache_get()" }, "CVE-2022-3544": { "cmt_msg": "" }, + "CVE-2023-52569": { + "cmt_msg": "btrfs: remove BUG() after failure to insert delayed dir index item" + }, + "CVE-2023-52568": { + "cmt_msg": "x86/sgx: Resolves SECS reclaim vs. page fault for EAUG race" + }, "CVE-2022-3543": { "cmt_msg": "af_unix: Fix memory leaks of the whole sk due to OOB skb." }, "CVE-2022-3542": { "cmt_msg": "bnx2x: fix potential memory leak in bnx2x_tpa_stop()" }, + "CVE-2023-52563": { + "cmt_msg": "drm/meson: fix memory leak on ->hpd_notify callback" + }, + "CVE-2023-52561": { + "cmt_msg": "arm64: dts: qcom: sdm845-db845c: Mark cont splash memory region as reserved" + }, + "CVE-2023-52560": { + "cmt_msg": "mm/damon/vaddr-test: fix memory leak in damon_do_test_apply_three_regions()" + }, "CVE-2023-5197": { "cmt_msg": "netfilter: nf_tables: disallow rule removal from chain binding" }, + "CVE-2023-52566": { + "cmt_msg": "nilfs2: fix potential use after free in nilfs_gccache_submit_read_data()" + }, + "CVE-2023-52565": { + "cmt_msg": "media: uvcvideo: Fix OOB read" + }, "CVE-2023-1382": { "cmt_msg": "tipc: set con sock in tipc_conn_alloc" }, "CVE-2023-1380": { "cmt_msg": "wifi: brcmfmac: slab-out-of-bounds read in brcmf_get_assoc_ies()" }, + "CVE-2024-26672": { + "cmt_msg": "drm/amdgpu: Fix variable 'mca_funcs' dereferenced before NULL check in 'amdgpu_mca_smu_get_mca_entry()'" + }, "CVE-2020-0347": { "cmt_msg": "" }, "CVE-2019-12456": { "cmt_msg": "" }, + "CVE-2024-26720": { + "cmt_msg": "mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again" + }, "CVE-2018-12931": { "cmt_msg": "" }, + "CVE-2024-26727": { + "cmt_msg": "btrfs: do not ASSERT() if the newly created subvolume already got read" + }, + "CVE-2024-26726": { + "cmt_msg": "btrfs: don't drop extent_map for free space inode on write error" + }, "CVE-2023-1206": { "cmt_msg": "tcp: Reduce chance of collisions in inet6_hashfn()." }, @@ -147952,6 +193528,24 @@ "CVE-2023-3355": { "cmt_msg": "drm/msm/gem: Add check for kmalloc" }, + "CVE-2023-52518": { + "cmt_msg": "Bluetooth: hci_codec: Fix leaking content of local_codecs" + }, + "CVE-2023-52519": { + "cmt_msg": "HID: intel-ish-hid: ipc: Disable and reenable ACPI GPE bit" + }, + "CVE-2023-52516": { + "cmt_msg": "dma-debug: don't call __dma_entry_alloc_check_leak() under free_entries_lock" + }, + "CVE-2023-52517": { + "cmt_msg": "spi: sun6i: fix race between DMA RX transfer completion and RX FIFO drain" + }, + "CVE-2023-52515": { + "cmt_msg": "RDMA/srp: Do not call scsi_done() from srp_abort()" + }, + "CVE-2023-52512": { + "cmt_msg": "pinctrl: nuvoton: wpcm450: fix out of bounds write" + }, "CVE-2019-15902": { "cmt_msg": "unknown" }, @@ -147968,7 +193562,10 @@ "cmt_msg": "" }, "CVE-2023-6536": { - "cmt_msg": "" + "cmt_msg": "nvmet-tcp: fix a crash in nvmet_req_complete()" + }, + "CVE-2024-26704": { + "cmt_msg": "ext4: fix double-free of blocks due to wrong extents moved_len" }, "CVE-2020-26140": { "cmt_msg": "" @@ -147979,12 +193576,30 @@ "CVE-2024-1151": { "cmt_msg": "net: openvswitch: limit the number of recursions from action sets" }, + "CVE-2024-26659": { + "cmt_msg": "xhci: handle isoc Babble and Buffer Overrun events properly" + }, + "CVE-2024-26658": { + "cmt_msg": "bcachefs: grab s_umount only if snapshotting" + }, "CVE-2010-5321": { "cmt_msg": "" }, + "CVE-2024-26655": { + "cmt_msg": "Fix memory leak in posix_clock_open()" + }, + "CVE-2024-26654": { + "cmt_msg": "ALSA: sh: aica: reorder cleanup operations to avoid UAF bugs" + }, "CVE-2023-32247": { "cmt_msg": "ksmbd: destroy expired sessions" }, + "CVE-2024-26651": { + "cmt_msg": "sr9800: Add check for usbnet_get_endpoints" + }, + "CVE-2024-26650": { + "cmt_msg": "platform/x86: p2sb: Allow p2sb_bar() calls during PCI device probe" + }, "CVE-2023-4147": { "cmt_msg": "netfilter: nf_tables: disallow rule addition to bound chain via NFTA_RULE_CHAIN_ID" }, @@ -147997,12 +193612,30 @@ "CVE-2023-4569": { "cmt_msg": "netfilter: nf_tables: deactivate catchall elements in next generation" }, + "CVE-2023-52474": { + "cmt_msg": "IB/hfi1: Fix bugs with non-PAGE_SIZE-end multi-iovec user SDMA requests" + }, + "CVE-2023-52477": { + "cmt_msg": "usb: hub: Guard against accesses to uninitialized BOS descriptors" + }, + "CVE-2023-52476": { + "cmt_msg": "perf/x86/lbr: Filter vsyscall addresses" + }, + "CVE-2023-52470": { + "cmt_msg": "drm/radeon: check the alloc_workqueue return value in radeon_crtc_init()" + }, "CVE-2023-22997": { "cmt_msg": "module: Fix NULL vs IS_ERR checking for module_get_next_page" }, "CVE-2023-4563": { "cmt_msg": "netfilter: nf_tables: don't skip expired elements during walk" }, + "CVE-2023-52479": { + "cmt_msg": "ksmbd: fix uaf in smb20_oplock_break_ack" + }, + "CVE-2023-52478": { + "cmt_msg": "HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect" + }, "CVE-2021-3542": { "cmt_msg": "" }, @@ -148033,6 +193666,9 @@ "CVE-2023-32257": { "cmt_msg": "ksmbd: fix racy issue from session setup and logoff" }, + "CVE-2024-26778": { + "cmt_msg": "fbdev: savage: Error out if pixclock equals zero" + }, "CVE-2023-32254": { "cmt_msg": "ksmbd: fix racy issue under cocurrent smb2 tree disconnect" }, @@ -148054,14 +193690,65 @@ "CVE-2024-25741": { "cmt_msg": "" }, + "CVE-2024-26808": { + "cmt_msg": "netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain" + }, + "CVE-2024-26809": { + "cmt_msg": "netfilter: nft_set_pipapo: release elements in clone only from destroy path" + }, + "CVE-2024-26804": { + "cmt_msg": "net: ip_tunnel: prevent perpetual headroom growth" + }, "CVE-2023-1989": { "cmt_msg": "Bluetooth: btsdio: fix use after free bug in btsdio_remove due to unfinished work" }, + "CVE-2024-26806": { + "cmt_msg": "spi: cadence-qspi: remove system-wide suspend helper calls from runtime PM hooks" + }, + "CVE-2024-26801": { + "cmt_msg": "Bluetooth: Avoid potential use-after-free in hci_error_reset" + }, + "CVE-2024-26802": { + "cmt_msg": "stmmac: Clear variable when destroying workqueue" + }, + "CVE-2023-52508": { + "cmt_msg": "nvme-fc: Prevent null pointer dereference in nvme_fc_io_getuuid()" + }, + "CVE-2023-52606": { + "cmt_msg": "powerpc/lib: Validate size for vector operations" + }, + "CVE-2023-52607": { + "cmt_msg": "powerpc/mm: Fix null-pointer dereference in pgtable_cache_add" + }, + "CVE-2023-52604": { + "cmt_msg": "FS:JFS:UBSAN:array-index-out-of-bounds in dbAdjTree" + }, + "CVE-2023-52602": { + "cmt_msg": "jfs: fix slab-out-of-bounds Read in dtSearch" + }, + "CVE-2023-52603": { + "cmt_msg": "UBSAN: array-index-out-of-bounds in dtSplitRoot" + }, "CVE-2022-25265": { "cmt_msg": "" }, + "CVE-2023-52601": { + "cmt_msg": "jfs: fix array-index-out-of-bounds in dbAdjTree" + }, + "CVE-2024-26779": { + "cmt_msg": "wifi: mac80211: fix race condition on enabling fast-xmit" + }, + "CVE-2023-52600": { + "cmt_msg": "jfs: fix uaf in jfs_evict_inode" + }, + "CVE-2023-52608": { + "cmt_msg": "firmware: arm_scmi: Check mailbox/SMT channel for consistency" + }, + "CVE-2023-52609": { + "cmt_msg": "binder: fix race between mmput() and do_exit()" + }, "CVE-2024-23196": { - "cmt_msg": "" + "cmt_msg": "ALSA: hda: fix a possible null-pointer dereference due to data race in snd_hdac_regmap_sync()" }, "CVE-2023-4208": { "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free" @@ -148087,6 +193774,9 @@ "CVE-2023-0160": { "cmt_msg": "bpf, sockmap: fix deadlocks in the sockhash and sockmap" }, + "CVE-2023-52481": { + "cmt_msg": "arm64: errata: Add Cortex-A520 speculative unprivileged load workaround" + }, "CVE-2022-2663": { "cmt_msg": "netfilter: nf_conntrack_irc: Fix forged IP logic" }, @@ -148105,15 +193795,24 @@ "CVE-2023-4010": { "cmt_msg": "" }, + "CVE-2023-52500": { + "cmt_msg": "scsi: pm80xx: Avoid leaking tags when processing OPC_INB_SET_CONTROLLER_CONFIG command" + }, "CVE-2022-38457": { "cmt_msg": "drm/vmwgfx: Remove rcu locks from user resources" }, + "CVE-2024-26774": { + "cmt_msg": "ext4: avoid dividing by 0 in mb_update_avg_fragment_size() when block bitmap corrupt" + }, "CVE-2022-20421": { "cmt_msg": "binder: fix UAF of ref->proc caused by race condition" }, "CVE-2019-19378": { "cmt_msg": "" }, + "CVE-2023-52482": { + "cmt_msg": "x86/srso: Add SRSO mitigation for Hygon processors" + }, "CVE-2022-45934": { "cmt_msg": "Bluetooth: L2CAP: Fix u8 overflow" }, @@ -148150,8 +193849,11 @@ "CVE-2022-2209": { "cmt_msg": "" }, + "CVE-2024-26775": { + "cmt_msg": "aoe: avoid potential deadlock at set_capacity" + }, "CVE-2023-7042": { - "cmt_msg": "" + "cmt_msg": "wifi: ath10k: fix NULL pointer dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev()" }, "CVE-2022-3594": { "cmt_msg": "r8152: Rate limit overflow messages" @@ -148159,8 +193861,11 @@ "CVE-2022-3595": { "cmt_msg": "cifs: fix double-fault crash during ntlmssp" }, + "CVE-2023-52559": { + "cmt_msg": "iommu/vt-d: Avoid memory allocation in iommu_suspend()" + }, "CVE-2023-47233": { - "cmt_msg": "" + "cmt_msg": "wifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach" }, "CVE-2024-23850": { "cmt_msg": "btrfs: do not ASSERT() if the newly created subvolume already got read" @@ -148168,15 +193873,45 @@ "CVE-2024-23851": { "cmt_msg": "dm: limit the number of targets and parameter size area" }, + "CVE-2023-52629": { + "cmt_msg": "sh: push-switch: Reorder cleanup operations to avoid use-after-free bug" + }, + "CVE-2024-26772": { + "cmt_msg": "ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal()" + }, + "CVE-2024-26758": { + "cmt_msg": "md: Don't ignore suspended array in md_check_recovery()" + }, + "CVE-2024-26610": { + "cmt_msg": "wifi: iwlwifi: fix a memory corruption" + }, + "CVE-2024-26612": { + "cmt_msg": "netfs, fscache: Prevent Oops in fscache_put_cache()" + }, "CVE-2022-42329": { "cmt_msg": "xen/netback: don't call kfree_skb() with interrupts disabled" }, "CVE-2022-42328": { "cmt_msg": "xen/netback: don't call kfree_skb() with interrupts disabled" }, + "CVE-2024-26751": { + "cmt_msg": "ARM: ep93xx: Add terminator to gpiod_lookup_table" + }, + "CVE-2024-26752": { + "cmt_msg": "l2tp: pass correct message length to ip6_append_data" + }, + "CVE-2024-26753": { + "cmt_msg": "crypto: virtio/akcipher - Fix stack overflow on memcpy" + }, + "CVE-2024-26754": { + "cmt_msg": "gtp: fix use-after-free and null-ptr-deref in gtp_genl_dump_pdp()" + }, "CVE-2023-21255": { "cmt_msg": "binder: fix UAF caused by faulty buffer cleanup" }, + "CVE-2024-26757": { + "cmt_msg": "md: Don't ignore read-only array in md_check_recovery()" + }, "CVE-2023-52439": { "cmt_msg": "uio: Fix use-after-free in uio_open" }, @@ -148192,9 +193927,24 @@ "CVE-2023-52436": { "cmt_msg": "f2fs: explicitly null-terminate the xattr list" }, + "CVE-2024-26688": { + "cmt_msg": "fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super" + }, + "CVE-2024-23307": { + "cmt_msg": "md/raid5: fix atomicity violation in raid5_cache_count" + }, "CVE-2022-2961": { "cmt_msg": "" }, + "CVE-2024-26680": { + "cmt_msg": "net: atlantic: Fix DMA mapping for PTP hwts ring" + }, + "CVE-2024-26686": { + "cmt_msg": "fs/proc: do_task_stat: use sig->stats_lock to gather the threads/children stats" + }, + "CVE-2024-26687": { + "cmt_msg": "xen/events: close evtchn after mapping cleanup" + }, "CVE-2023-51779": { "cmt_msg": "Bluetooth: af_bluetooth: Fix Use-After-Free in bt_sock_recvmsg" }, @@ -148228,18 +193978,42 @@ "CVE-2023-4623": { "cmt_msg": "net/sched: sch_hfsc: Ensure inner classes have fsc curve" }, + "CVE-2024-26663": { + "cmt_msg": "tipc: Check the bearer type before calling tipc_udp_nl_bearer_add()" + }, "CVE-2023-1193": { "cmt_msg": "ksmbd: delete asynchronous work from list" }, + "CVE-2023-52498": { + "cmt_msg": "PM: sleep: Fix possible deadlocks in core system-wide PM code" + }, + "CVE-2023-52640": { + "cmt_msg": "fs/ntfs3: Fix oob in ntfs_listxattr" + }, + "CVE-2023-52641": { + "cmt_msg": "fs/ntfs3: Add NULL ptr dereference checking at the end of attr_allocate_frame()" + }, "CVE-2021-0399": { "cmt_msg": "" }, + "CVE-2023-52488": { + "cmt_msg": "serial: sc16is7xx: convert from _raw_ to _noinc_ regmap functions for FIFO" + }, + "CVE-2023-52489": { + "cmt_msg": "mm/sparsemem: fix race in accessing memory_section->usage" + }, "CVE-2023-42755": { "cmt_msg": "net/sched: Retire rsvp classifier" }, "CVE-2023-3161": { "cmt_msg": "fbcon: Check font dimension limits" }, + "CVE-2023-52486": { + "cmt_msg": "drm: Don't unref the same fb many times by mistake due to deadlock handling" + }, + "CVE-2023-52480": { + "cmt_msg": "ksmbd: fix race condition between session lookup and expire" + }, "CVE-2012-4542": { "cmt_msg": "" }, @@ -148261,6 +194035,12 @@ "CVE-2023-3609": { "cmt_msg": "net/sched: cls_u32: Fix reference counter leak leading to overflow" }, + "CVE-2023-52491": { + "cmt_msg": "media: mtk-jpeg: Fix use after free bug due to error path handling in mtk_jpeg_dec_device_run" + }, + "CVE-2024-26759": { + "cmt_msg": "mm/swap: fix race when skipping swapcache" + }, "CVE-2022-3424": { "cmt_msg": "misc: sgi-gru: fix use-after-free error in gru_set_context_option, gru_fault and gru_handle_user_call_os" }, @@ -148282,6 +194062,9 @@ "CVE-2008-2544": { "cmt_msg": "" }, + "CVE-2023-52485": { + "cmt_msg": "drm/amd/display: Wake DMCUB before sending a command" + }, "CVE-2022-42719": { "cmt_msg": "wifi: mac80211: fix MBSSID parsing use-after-free" }, @@ -148313,17 +194096,41 @@ "cmt_msg": "Bluetooth: Fix atomicity violation in {min,max}_key_size_set" }, "CVE-2024-24861": { - "cmt_msg": "" + "cmt_msg": "media: xc4000: Fix atomicity violation in xc4000_get_frequency" }, "CVE-2024-24864": { "cmt_msg": "" }, + "CVE-2023-52596": { + "cmt_msg": "sysctl: Fix out of bounds access for empty sysctl registers" + }, + "CVE-2023-52597": { + "cmt_msg": "KVM: s390: fix setting of fpc register" + }, + "CVE-2023-52594": { + "cmt_msg": "wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus()" + }, "CVE-2023-52443": { "cmt_msg": "apparmor: avoid crash when parsed profile name is empty" }, + "CVE-2023-52593": { + "cmt_msg": "wifi: wfx: fix possible NULL pointer dereference in wfx_set_mfp_ap()" + }, + "CVE-2023-52590": { + "cmt_msg": "ocfs2: Avoid touching renamed directory if parent does not change" + }, + "CVE-2023-52591": { + "cmt_msg": "reiserfs: Avoid touching renamed directory if parent does not change" + }, "CVE-2023-2194": { "cmt_msg": "i2c: xgene-slimpro: Fix out-of-bounds bug in xgene_slimpro_i2c_xfer()" }, + "CVE-2023-52599": { + "cmt_msg": "jfs: fix array-index-out-of-bounds in diNewExt" + }, + "CVE-2024-26627": { + "cmt_msg": "scsi: core: Move scsi_host_busy() out of host lock for waking up EH handler" + }, "CVE-2022-41218": { "cmt_msg": "media: dvb-core: Fix UAF due to refcount races at releasing" }, @@ -148331,7 +194138,10 @@ "cmt_msg": "bpf: Defer the free of inner map when necessary" }, "CVE-2024-0841": { - "cmt_msg": "" + "cmt_msg": "fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super" + }, + "CVE-2024-26623": { + "cmt_msg": "pds_core: Prevent race issues involving the adminq" }, "CVE-2022-41849": { "cmt_msg": "fbdev: smscufx: Fix use-after-free in ufx_ops_open()" @@ -148351,8 +194161,11 @@ "CVE-2021-39800": { "cmt_msg": "" }, + "CVE-2024-26784": { + "cmt_msg": "pmdomain: arm: Fix NULL dereference on scmi_perf_domain removal" + }, "CVE-2024-22099": { - "cmt_msg": "" + "cmt_msg": "Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security" }, "CVE-2022-45885": { "cmt_msg": "" @@ -148366,18 +194179,39 @@ "CVE-2022-45886": { "cmt_msg": "media: dvb-core: Fix use-after-free due on race condition at dvb_net" }, + "CVE-2023-52509": { + "cmt_msg": "ravb: Fix use-after-free issue in ravb_tx_timeout_work()" + }, "CVE-2023-46343": { "cmt_msg": "nfc: nci: fix possible NULL pointer dereference in send_acknowledge()" }, "CVE-2024-25744": { "cmt_msg": "x86/coco: Disable 32-bit emulation by default on TDX and SEV" }, + "CVE-2023-52505": { + "cmt_msg": "phy: lynx-28g: serialize concurrent phy_set_mode_ext() calls to shared registers" + }, + "CVE-2023-52504": { + "cmt_msg": "x86/alternatives: Disable KASAN in apply_alternatives()" + }, + "CVE-2023-52507": { + "cmt_msg": "nfc: nci: assert requested protocol is valid" + }, "CVE-2023-2124": { "cmt_msg": "xfs: verify buffer contents when we skip log replay" }, + "CVE-2023-52501": { + "cmt_msg": "ring-buffer: Do not attempt to read past \"commit\"" + }, "CVE-2022-45888": { "cmt_msg": "char: xillybus: Prevent use-after-free due to race condition" }, + "CVE-2023-52503": { + "cmt_msg": "tee: amdtee: fix use-after-free vulnerability in amdtee_close_session" + }, + "CVE-2023-52502": { + "cmt_msg": "net: nfc: fix races in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn()" + }, "CVE-2023-1281": { "cmt_msg": "net/sched: tcindex: update imperfect hash filters respecting rcu" }, @@ -148393,18 +194227,42 @@ "CVE-2022-27672": { "cmt_msg": "x86/speculation: Identify processors vulnerable to SMT RSB predictions" }, + "CVE-2024-26668": { + "cmt_msg": "netfilter: nft_limit: reject configurations that cause integer overflow" + }, + "CVE-2024-26669": { + "cmt_msg": "net/sched: flower: Fix chain template offload" + }, "CVE-2020-25220": { "cmt_msg": "" }, "CVE-2015-2877": { "cmt_msg": "" }, + "CVE-2024-26660": { + "cmt_msg": "drm/amd/display: Implement bounds check for stream encoder creation in DCN301" + }, + "CVE-2024-26661": { + "cmt_msg": "drm/amd/display: Add NULL test for 'timing generator' in 'dcn21_set_pipe()'" + }, + "CVE-2024-26662": { + "cmt_msg": "drm/amd/display: Fix 'panel_cntl' could be null in 'dcn21_set_backlight_level()'" + }, "CVE-2023-26242": { "cmt_msg": "" }, + "CVE-2024-26664": { + "cmt_msg": "hwmon: (coretemp) Fix out-of-bounds memory access" + }, + "CVE-2024-26665": { + "cmt_msg": "tunnels: fix out of bounds access when building IPv6 PMTU error" + }, "CVE-2019-16089": { "cmt_msg": "" }, + "CVE-2024-26689": { + "cmt_msg": "ceph: prevent use-after-free in encode_cap_msg()" + }, "CVE-2023-21264": { "cmt_msg": "KVM: arm64: Prevent unconditional donation of unmapped regions from the host" }, @@ -148447,11 +194305,32 @@ "CVE-2023-23039": { "cmt_msg": "" }, + "CVE-2024-26718": { + "cmt_msg": "dm-crypt, dm-verity: disable tasklets" + }, + "CVE-2024-26719": { + "cmt_msg": "nouveau: offload fence uevents work to workqueue" + }, + "CVE-2024-26714": { + "cmt_msg": "interconnect: qcom: sc8180x: Mark CO0 BCM keepalive" + }, + "CVE-2024-26715": { + "cmt_msg": "usb: dwc3: gadget: Fix NULL pointer dereference in dwc3_gadget_suspend" + }, "CVE-2024-1312": { "cmt_msg": "mm: lock_vma_under_rcu() must check vma->anon_vma under vma lock" }, + "CVE-2024-26717": { + "cmt_msg": "HID: i2c-hid-of: fix NULL-deref on failed power up" + }, "CVE-2023-3338": { "cmt_msg": "Remove DECnet support from kernel" + }, + "CVE-2024-26712": { + "cmt_msg": "powerpc/kasan: Fix addr error caused by page alignment" + }, + "CVE-2024-26713": { + "cmt_msg": "powerpc/pseries/iommu: Fix iommu initialisation during DLPAR add" } } }, @@ -148699,6 +194578,10 @@ "cmt_msg": "mm/hugetlb: fix races when looking up a CONT-PTE/PMD size hugetlb page", "cmt_id": "86a913d55c89dd13ba070a87f61a493563e94b54" }, + "CVE-2022-41850": { + "cmt_msg": "HID: roccat: Fix use-after-free in roccat_read()", + "cmt_id": "2d38886ae0365463cdba3db669170eef1e3d55c0" + }, "CVE-2022-3565": { "cmt_msg": "mISDN: fix use-after-free bugs in l1oip timer handlers", "cmt_id": "1f76323ac43fe0b00677794c930dee9f66ea2999" @@ -148722,8 +194605,26 @@ "CVE-2023-2248": { "cmt_msg": "net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg" }, - "CVE-2024-21803": { - "cmt_msg": "" + "CVE-2024-26685": { + "cmt_msg": "nilfs2: fix potential bug in end_buffer_async_write" + }, + "CVE-2023-52615": { + "cmt_msg": "hwrng: core - Fix page fault dead lock on mmap-ed hwrng" + }, + "CVE-2023-52614": { + "cmt_msg": "PM / devfreq: Fix buffer overflow in trans_stat_show" + }, + "CVE-2023-52617": { + "cmt_msg": "PCI: switchtec: Fix stdev_release() crash after surprise hot remove" + }, + "CVE-2023-52616": { + "cmt_msg": "crypto: lib/mpi - Fix unexpected pointer access in mpi_ec_init" + }, + "CVE-2023-52610": { + "cmt_msg": "net/sched: act_ct: fix skb leak and crash on ooo frags" + }, + "CVE-2023-52612": { + "cmt_msg": "crypto: scomp - fix req->dst buffer overflow" }, "CVE-2022-47520": { "cmt_msg": "wifi: wilc1000: validate pairwise and authentication suite offsets" @@ -148734,6 +194635,9 @@ "CVE-2023-5717": { "cmt_msg": "perf: Disallow mis-matched inherited group reads" }, + "CVE-2024-26615": { + "cmt_msg": "net/smc: fix illegal rmb_desc access in SMC-D connection dump" + }, "CVE-2023-4273": { "cmt_msg": "exfat: check if filename entries exceeds max filename length" }, @@ -148752,6 +194656,9 @@ "CVE-2024-0584": { "cmt_msg": "ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet" }, + "CVE-2024-26614": { + "cmt_msg": "tcp: make sure init the accept_queue's spinlocks once" + }, "CVE-2023-28466": { "cmt_msg": "net: tls: fix possible race condition between do_tls_getsockopt_conf() and do_tls_setsockopt_conf()" }, @@ -148800,12 +194707,21 @@ "CVE-2022-3633": { "cmt_msg": "can: j1939: j1939_session_destroy(): fix memory leak of skbs" }, - "CVE-2024-25739": { - "cmt_msg": "" + "CVE-2023-52506": { + "cmt_msg": "LoongArch: Set all reserved memblocks on Node#0 at initialization" + }, + "CVE-2023-52513": { + "cmt_msg": "RDMA/siw: Fix connection failure handling" + }, + "CVE-2023-52510": { + "cmt_msg": "ieee802154: ca8210: Fix a potential UAF in ca8210_probe" }, "CVE-2023-25012": { "cmt_msg": "HID: bigben: use spinlock to safely schedule workers" }, + "CVE-2023-52511": { + "cmt_msg": "spi: sun6i: reduce DMA RX transfer width to single byte" + }, "CVE-2023-2002": { "cmt_msg": "bluetooth: Perform careful capability checks in hci_sock_ioctl()" }, @@ -148854,30 +194770,81 @@ "CVE-2023-1073": { "cmt_msg": "HID: check empty report_list in hid_validate_values()" }, + "CVE-2024-26747": { + "cmt_msg": "usb: roles: fix NULL pointer issue when put module's reference" + }, + "CVE-2024-26783": { + "cmt_msg": "mm/vmscan: fix a bug calling wakeup_kswapd() with a wrong zone index" + }, + "CVE-2024-26745": { + "cmt_msg": "powerpc/pseries/iommu: IOMMU table is not initialized for kdump over SR-IOV" + }, + "CVE-2024-26744": { + "cmt_msg": "RDMA/srpt: Support specifying the srpt_service_guid parameter" + }, + "CVE-2024-26743": { + "cmt_msg": "RDMA/qedr: Fix qedr_create_user_qp error flow" + }, + "CVE-2024-26740": { + "cmt_msg": "net/sched: act_mirred: use the backlog for mirred ingress" + }, + "CVE-2024-26749": { + "cmt_msg": "usb: cdns3: fixed memory use after free at cdns3_gadget_ep_disable()" + }, + "CVE-2024-26748": { + "cmt_msg": "usb: cdns3: fix memory double free when handle zero packet" + }, "CVE-2023-1652": { "cmt_msg": "NFSD: fix use-after-free in nfsd4_ssc_setup_dul()" }, + "CVE-2024-26787": { + "cmt_msg": "mmc: mmci: stm32: fix DMA API overlapping mappings warning" + }, "CVE-2022-3707": { "cmt_msg": "drm/i915/gvt: fix double free bug in split_2MB_gtt_entry" }, "CVE-2024-22386": { "cmt_msg": "" }, + "CVE-2024-26699": { + "cmt_msg": "drm/amd/display: Fix array-index-out-of-bounds in dcn35_clkmgr" + }, + "CVE-2024-26698": { + "cmt_msg": "hv_netvsc: Fix race condition between netvsc_probe and netvsc_remove" + }, + "CVE-2024-26691": { + "cmt_msg": "KVM: arm64: Fix circular locking dependency" + }, + "CVE-2024-26784": { + "cmt_msg": "pmdomain: arm: Fix NULL dereference on scmi_perf_domain removal" + }, "CVE-2024-0564": { "cmt_msg": "" }, "CVE-2024-0565": { "cmt_msg": "smb: client: fix OOB in receive_encrypted_standard()" }, + "CVE-2024-26697": { + "cmt_msg": "nilfs2: fix data corruption in dsync block recovery for small block sizes" + }, + "CVE-2024-26696": { + "cmt_msg": "nilfs2: fix hang in nilfs_lookup_dirty_data_buffers()" + }, "CVE-2023-2176": { "cmt_msg": "RDMA/core: Refactor rdma_bind_addr" }, "CVE-2022-4139": { "cmt_msg": "drm/i915: fix TLB invalidation for Gen12 video and compute engines" }, + "CVE-2024-26788": { + "cmt_msg": "dmaengine: fsl-qdma: init irq after reg initialization" + }, "CVE-2005-3660": { "cmt_msg": "" }, + "CVE-2023-52619": { + "cmt_msg": "pstore/ram: Fix crash when setting number of cpus to an odd number" + }, "CVE-2023-31085": { "cmt_msg": "ubi: Refuse attaching if mtd's erasesize is 0" }, @@ -148893,21 +194860,42 @@ "CVE-2023-31081": { "cmt_msg": "" }, - "CVE-2024-23307": { - "cmt_msg": "" + "CVE-2023-52618": { + "cmt_msg": "block/rnbd-srv: Check for unlikely string overflow" + }, + "CVE-2024-0646": { + "cmt_msg": "net: tls, update curr on splice as well" + }, + "CVE-2023-52499": { + "cmt_msg": "powerpc/47x: Fix 47x syscall return crash" }, "CVE-2022-4543": { "cmt_msg": "" }, + "CVE-2023-52493": { + "cmt_msg": "bus: mhi: host: Drop chan lock before queuing buffers" + }, + "CVE-2023-52492": { + "cmt_msg": "dmaengine: fix NULL pointer in channel unregistration function" + }, "CVE-2020-14304": { "cmt_msg": "" }, + "CVE-2023-52497": { + "cmt_msg": "erofs: fix lz4 inplace decompression" + }, + "CVE-2023-52494": { + "cmt_msg": "bus: mhi: host: Add alignment check for event ring read pointer" + }, "CVE-2023-3610": { "cmt_msg": "netfilter: nf_tables: fix chain binding transaction logic" }, "CVE-2023-3611": { "cmt_msg": "net/sched: sch_qfq: account for stab overhead in qfq_enqueue" }, + "CVE-2024-26629": { + "cmt_msg": "nfsd: fix RELEASE_LOCKOWNER" + }, "CVE-2023-4132": { "cmt_msg": "media: usb: siano: Fix warning due to null work_func_t function pointer" }, @@ -148923,6 +194911,9 @@ "CVE-2023-39198": { "cmt_msg": "drm/qxl: fix UAF on handle creation" }, + "CVE-2024-26656": { + "cmt_msg": "drm/amdgpu: fix use-after-free bug" + }, "CVE-2023-37454": { "cmt_msg": "" }, @@ -148932,12 +194923,21 @@ "CVE-2023-33288": { "cmt_msg": "power: supply: bq24190: Fix use after free bug in bq24190_remove due to race condition" }, + "CVE-2023-52484": { + "cmt_msg": "iommu/arm-smmu-v3: Fix soft lockup triggered by arm_smmu_mm_invalidate_range" + }, + "CVE-2023-52586": { + "cmt_msg": "drm/msm/dpu: Add mutex lock in control vblank irq" + }, "CVE-2023-42754": { "cmt_msg": "ipv4: fix null-deref in ipv4_link_failure" }, "CVE-2023-39192": { "cmt_msg": "netfilter: xt_u32: validate user space input" }, + "CVE-2023-52580": { + "cmt_msg": "net/core: Fix ETH_P_1588 flow dissector" + }, "CVE-2023-35829": { "cmt_msg": "media: rkvdec: fix use after free bug in rkvdec_remove" }, @@ -148953,6 +194953,9 @@ "CVE-2023-35823": { "cmt_msg": "media: saa7134: fix use after free bug in saa7134_finidev due to race condition" }, + "CVE-2023-52582": { + "cmt_msg": "netfs: Only call folio_start_fscache() one time for each folio" + }, "CVE-2023-35824": { "cmt_msg": "media: dm1105: Fix use after free bug in dm1105_remove due to race condition" }, @@ -148962,6 +194965,15 @@ "CVE-2023-35826": { "cmt_msg": "media: cedrus: fix use after free bug in cedrus_remove due to race condition" }, + "CVE-2023-52585": { + "cmt_msg": "drm/amdgpu: Fix possible NULL dereference in amdgpu_ras_query_error_status_helper()" + }, + "CVE-2023-52584": { + "cmt_msg": "spmi: mediatek: Fix UAF on device remove" + }, + "CVE-2023-52587": { + "cmt_msg": "IB/ipoib: Fix mcast list locking" + }, "CVE-2023-38432": { "cmt_msg": "ksmbd: validate command payload size" }, @@ -148971,18 +194983,45 @@ "CVE-2022-3566": { "cmt_msg": "tcp: Fix data races around icsk->icsk_af_ops." }, + "CVE-2023-52583": { + "cmt_msg": "ceph: fix deadlock or deadcode of misusing dget()" + }, "CVE-2022-3564": { "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free caused by l2cap_reassemble_sdu" }, "CVE-2022-4269": { "cmt_msg": "act_mirred: use the backlog for nested calls to mirred ingress" }, + "CVE-2024-26769": { + "cmt_msg": "nvmet-fc: avoid deadlock on delete association path" + }, + "CVE-2023-52483": { + "cmt_msg": "mctp: perform route lookups under a RCU read-side lock" + }, + "CVE-2023-52589": { + "cmt_msg": "media: rkisp1: Fix IRQ disable race issue" + }, + "CVE-2023-52588": { + "cmt_msg": "f2fs: fix to tag gcing flag on page during block migration" + }, + "CVE-2024-26768": { + "cmt_msg": "LoongArch: Change acpi_core_pic[NR_CPUS] to acpi_core_pic[MAX_CORE_PIC]" + }, "CVE-2023-52340": { "cmt_msg": "ipv6: remove max_size check inline with ipv4" }, "CVE-2023-1032": { "cmt_msg": "net: avoid double iput when sock_alloc_file fails" }, + "CVE-2024-26684": { + "cmt_msg": "net: stmmac: xgmac: fix handling of DPP safety error for DMA channels" + }, + "CVE-2024-26767": { + "cmt_msg": "drm/amd/display: fixed integer types and null check locations" + }, + "CVE-2023-52475": { + "cmt_msg": "Input: powermate - fix use-after-free in powermate_config_complete" + }, "CVE-2023-6560": { "cmt_msg": "io_uring: don't allow discontig pages for IORING_SETUP_NO_MMAP" }, @@ -148992,9 +195031,45 @@ "CVE-2023-1611": { "cmt_msg": "btrfs: fix race between quota disable and quota assign ioctls" }, + "CVE-2024-25739": { + "cmt_msg": "" + }, + "CVE-2024-26763": { + "cmt_msg": "dm-crypt: don't modify the data when using authenticated encryption" + }, + "CVE-2024-26756": { + "cmt_msg": "md: Don't register sync_thread for reshape directly" + }, + "CVE-2024-26795": { + "cmt_msg": "riscv: Sparse-Memory/vmemmap out-of-bounds fix" + }, + "CVE-2024-26797": { + "cmt_msg": "drm/amd/display: Prevent potential buffer overflow in map_hw_resources" + }, + "CVE-2024-26790": { + "cmt_msg": "dmaengine: fsl-qdma: fix SoC may hang on 16 byte unaligned read" + }, "CVE-2024-0639": { "cmt_msg": "sctp: fix potential deadlock on &net->sctp.addr_wq_lock" }, + "CVE-2024-26793": { + "cmt_msg": "gtp: fix use-after-free and null-ptr-deref in gtp_newlink()" + }, + "CVE-2023-52530": { + "cmt_msg": "wifi: mac80211: fix potential key use-after-free" + }, + "CVE-2023-52531": { + "cmt_msg": "wifi: iwlwifi: mvm: Fix a memory corruption issue" + }, + "CVE-2023-52532": { + "cmt_msg": "net: mana: Fix TX CQE error handling" + }, + "CVE-2024-26798": { + "cmt_msg": "fbcon: always restore the old font data in fbcon_do_set_font()" + }, + "CVE-2024-26799": { + "cmt_msg": "ASoC: qcom: Fix uninitialized pointer dmactl" + }, "CVE-2022-48425": { "cmt_msg": "fs/ntfs3: Validate MFT flags before replaying logs" }, @@ -149010,15 +195085,33 @@ "CVE-2023-46862": { "cmt_msg": "io_uring/fdinfo: lock SQ thread while retrieving thread cpu/pid" }, + "CVE-2024-26677": { + "cmt_msg": "rxrpc: Fix delayed ACKs to not set the reference serial number" + }, + "CVE-2024-26676": { + "cmt_msg": "af_unix: Call kfree_skb() for dead unix_(sk)->oob_skb in GC." + }, + "CVE-2024-26675": { + "cmt_msg": "ppp_async: limit MRU to 64K" + }, "CVE-2020-26556": { "cmt_msg": "" }, "CVE-2020-26557": { "cmt_msg": "" }, + "CVE-2024-26671": { + "cmt_msg": "blk-mq: fix IO hang from sbitmap wakeup race" + }, "CVE-2023-34324": { "cmt_msg": "xen/events: replace evtchn_rwlock with RCU" }, + "CVE-2024-26776": { + "cmt_msg": "spi: hisi-sfc-v3xx: Return IRQ_NONE if no interrupts were detected" + }, + "CVE-2024-26777": { + "cmt_msg": "fbdev: sis: Error out if pixclock equals zero" + }, "CVE-2019-20794": { "cmt_msg": "" }, @@ -149028,42 +195121,75 @@ "CVE-2023-3397": { "cmt_msg": "" }, + "CVE-2024-26773": { + "cmt_msg": "ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found()" + }, + "CVE-2024-26679": { + "cmt_msg": "inet: read sk->sk_family once in inet_recv_error()" + }, + "CVE-2024-26771": { + "cmt_msg": "dmaengine: ti: edma: Add some null pointer checks to the edma_probe" + }, "CVE-2023-52458": { "cmt_msg": "block: add check that partition length needs to be aligned with block size" }, - "CVE-2023-52457": { - "cmt_msg": "serial: 8250: omap: Don't skip resource freeing if pm_runtime_resume_and_get() failed" - }, "CVE-2018-1121": { "cmt_msg": "" }, "CVE-2023-52454": { "cmt_msg": "nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length" }, + "CVE-2023-28746": { + "cmt_msg": "x86/mmio: Disable KVM mitigation when X86_FEATURE_CLEAR_CPU_BUF is set" + }, "CVE-2023-52452": { "cmt_msg": "bpf: Fix accesses to uninit stack slots" }, "CVE-2023-52451": { "cmt_msg": "powerpc/pseries/memhp: Fix access beyond end of drmem array" }, + "CVE-2024-26602": { + "cmt_msg": "sched/membarrier: reduce the ability to hammer on sys_membarrier" + }, "CVE-2024-1085": { "cmt_msg": "netfilter: nf_tables: check if catch-all set element is active in next generation" }, "CVE-2024-1086": { "cmt_msg": "netfilter: nf_tables: reject QUEUE/DROP verdict parameters" }, + "CVE-2024-26735": { + "cmt_msg": "ipv6: sr: fix possible use-after-free and null-ptr-deref" + }, "CVE-2022-3344": { "cmt_msg": "KVM: x86: nSVM: harden svm_free_nested against freeing vmcb02 while still in use" }, "CVE-2023-32250": { "cmt_msg": "ksmbd: fix racy issue from session setup and logoff" }, + "CVE-2024-21803": { + "cmt_msg": "" + }, "CVE-2023-6240": { "cmt_msg": "" }, + "CVE-2024-26700": { + "cmt_msg": "drm/amd/display: Fix MST Null Ptr for RV" + }, + "CVE-2024-26707": { + "cmt_msg": "net: hsr: remove WARN_ONCE() in send_hsr_supervision_frame()" + }, + "CVE-2024-26706": { + "cmt_msg": "parisc: Fix random data corruption from exception handler" + }, "CVE-2023-23559": { "cmt_msg": "wifi: rndis_wlan: Prevent buffer overflow in rndis_query_oid" }, + "CVE-2024-26702": { + "cmt_msg": "iio: magnetometer: rm3100: add boundary check for the value read from RM3100_REG_TMRC" + }, + "CVE-2024-26603": { + "cmt_msg": "x86/fpu: Stop relying on userspace for info to fault in xsave buffer" + }, "CVE-2023-3812": { "cmt_msg": "net: tun: fix bugs for oversize packet when napi frags enabled" }, @@ -149071,11 +195197,35 @@ "cmt_msg": "libceph: harden msgr2.1 frame segment length checks" }, "CVE-2024-23196": { - "cmt_msg": "" + "cmt_msg": "ALSA: hda: fix a possible null-pointer dereference due to data race in snd_hdac_regmap_sync()" }, "CVE-2019-19814": { "cmt_msg": "" }, + "CVE-2023-52620": { + "cmt_msg": "netfilter: nf_tables: disallow timeout for anonymous sets" + }, + "CVE-2023-52621": { + "cmt_msg": "bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers" + }, + "CVE-2023-52622": { + "cmt_msg": "ext4: avoid online resizing failures due to oversized flex bg" + }, + "CVE-2023-52623": { + "cmt_msg": "SUNRPC: Fix a suspicious RCU usage warning" + }, + "CVE-2023-52624": { + "cmt_msg": "drm/amd/display: Wake DMCUB before executing GPINT commands" + }, + "CVE-2023-52625": { + "cmt_msg": "drm/amd/display: Refactor DMCUB enter/exit idle interface" + }, + "CVE-2023-52627": { + "cmt_msg": "iio: adc: ad7091r: Allow users to configure device events" + }, + "CVE-2023-52628": { + "cmt_msg": "netfilter: nftables: exthdr: fix 4-byte stack OOB write" + }, "CVE-2021-26934": { "cmt_msg": "" }, @@ -149088,6 +195238,9 @@ "CVE-2023-0210": { "cmt_msg": "ksmbd: check nt_len to be at least CIFS_ENCPWD_SIZE in ksmbd_decode_ntlmssp_auth_blob" }, + "CVE-2024-26601": { + "cmt_msg": "ext4: regenerate buddy after block freeing failed if under fc replay" + }, "CVE-2022-3524": { "cmt_msg": "tcp/udp: Fix memory leak in ipv6_renew_options()." }, @@ -149142,18 +195295,12 @@ "CVE-2024-26584": { "cmt_msg": "net: tls: handle backlogging of crypto requests" }, - "CVE-2024-26587": { - "cmt_msg": "net: netdevsim: don't try to destroy PHC on VFs" - }, "CVE-2022-1247": { "cmt_msg": "" }, "CVE-2023-51782": { "cmt_msg": "net/rose: Fix Use-After-Free in rose_ioctl" }, - "CVE-2024-26588": { - "cmt_msg": "LoongArch: BPF: Prevent out-of-bounds memory access" - }, "CVE-2023-51780": { "cmt_msg": "atm: Fix Use-After-Free in do_vcc_ioctl" }, @@ -149163,12 +195310,33 @@ "CVE-2022-3624": { "cmt_msg": "bonding: fix reference count leak in balance-alb mode" }, + "CVE-2024-26625": { + "cmt_msg": "llc: call sock_orphan() at release time" + }, "CVE-2023-3090": { "cmt_msg": "ipvlan:Fix out-of-bounds caused by unclear skb->cb" }, + "CVE-2023-52578": { + "cmt_msg": "net: bridge: use DEV_STATS_INC()" + }, + "CVE-2023-52574": { + "cmt_msg": "team: fix null-ptr-deref when team device type is changed" + }, + "CVE-2023-52576": { + "cmt_msg": "x86/mm, kexec, ima: Use memblock_free_late() from ima_free_kexec_buffer()" + }, "CVE-2022-3238": { "cmt_msg": "" }, + "CVE-2023-52571": { + "cmt_msg": "power: supply: rk817: Fix node refcount leak" + }, + "CVE-2023-52572": { + "cmt_msg": "cifs: Fix UAF in cifs_demultiplex_thread()" + }, + "CVE-2023-52573": { + "cmt_msg": "net: rds: Fix possible NULL-pointer dereference" + }, "CVE-2023-4921": { "cmt_msg": "net: sched: sch_qfq: Fix UAF in qfq_dequeue()" }, @@ -149196,12 +195364,27 @@ "CVE-2023-31248": { "cmt_msg": "netfilter: nf_tables: do not ignore genmask when looking up chain by id" }, + "CVE-2024-26736": { + "cmt_msg": "afs: Increase buffer size in afs_update_volume_status()" + }, + "CVE-2024-26737": { + "cmt_msg": "bpf: Fix racing between bpf_timer_cancel_and_free and bpf_timer_cancel" + }, "CVE-2024-26593": { "cmt_msg": "i2c: i801: Fix block process call transactions" }, + "CVE-2024-26738": { + "cmt_msg": "powerpc/pseries/iommu: DLPAR add doesn't completely initialize pci_controller" + }, + "CVE-2024-26739": { + "cmt_msg": "net/sched: act_mirred: don't override retval if we already lost the skb" + }, "CVE-2022-38096": { "cmt_msg": "" }, + "CVE-2024-26805": { + "cmt_msg": "netlink: Fix kernel-infoleak-after-free in __skb_datagram_iter" + }, "CVE-2022-45869": { "cmt_msg": "KVM: x86/mmu: Fix race condition in direct_page_fault" }, @@ -149226,12 +195409,36 @@ "CVE-2021-33631": { "cmt_msg": "ext4: fix kernel BUG in 'ext4_write_inline_data_end()'" }, + "CVE-2024-26803": { + "cmt_msg": "net: veth: clear GRO when clearing XDP even when down" + }, "CVE-2022-4129": { "cmt_msg": "l2tp: Serialize access to sk_user_data with sk_callback_lock" }, + "CVE-2024-26648": { + "cmt_msg": "drm/amd/display: Fix variable deferencing before NULL check in edp_setup_replay()" + }, + "CVE-2024-26646": { + "cmt_msg": "thermal: intel: hfi: Add syscore callbacks for system-wide PM" + }, + "CVE-2024-26647": { + "cmt_msg": "drm/amd/display: Fix late derefrence 'dsc' check in 'link_set_dsc_pps_packet()'" + }, + "CVE-2024-26644": { + "cmt_msg": "btrfs: don't abort filesystem when attempting to snapshot deleted subvolume" + }, + "CVE-2024-26645": { + "cmt_msg": "tracing: Ensure visibility when inserting an element into tracing_map" + }, "CVE-2023-33203": { "cmt_msg": "net: qcom/emac: Fix use after free bug in emac_remove due to race condition" }, + "CVE-2024-26640": { + "cmt_msg": "tcp: add sanity checks to rx zerocopy" + }, + "CVE-2024-26641": { + "cmt_msg": "ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv()" + }, "CVE-2023-26544": { "cmt_msg": "fs/ntfs3: Fix slab-out-of-bounds read in run_unpack" }, @@ -149241,6 +195448,12 @@ "CVE-2023-50431": { "cmt_msg": "accel/habanalabs: fix information leak in sec_attest_info()" }, + "CVE-2024-26791": { + "cmt_msg": "btrfs: dev-replace: properly validate device names" + }, + "CVE-2023-52467": { + "cmt_msg": "mfd: syscon: Fix null pointer dereference in of_syscon_register()" + }, "CVE-2023-52464": { "cmt_msg": "EDAC/thunderx: Fix possible out-of-bounds string access" }, @@ -149250,6 +195463,9 @@ "CVE-2023-52463": { "cmt_msg": "efivarfs: force RO when remounting if SetVariable is not supported" }, + "CVE-2023-52469": { + "cmt_msg": "drivers/amd/pm: fix a use-after-free in kv_parse_power_table" + }, "CVE-2019-15290": { "cmt_msg": "" }, @@ -149259,15 +195475,33 @@ "CVE-2024-23848": { "cmt_msg": "" }, + "CVE-2024-26633": { + "cmt_msg": "ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim()" + }, + "CVE-2024-26632": { + "cmt_msg": "block: Fix iterating over an empty bio with bio_for_each_folio_all" + }, "CVE-2023-6622": { "cmt_msg": "netfilter: nf_tables: bail out on mismatching dynset and set expressions" }, + "CVE-2024-26733": { + "cmt_msg": "arp: Prevent overflow in arp_req_get()." + }, "CVE-2023-28866": { "cmt_msg": "Bluetooth: HCI: Fix global-out-of-bounds" }, + "CVE-2024-26635": { + "cmt_msg": "llc: Drop support for ETH_P_TR_802_2." + }, "CVE-2022-26878": { "cmt_msg": "" }, + "CVE-2023-52639": { + "cmt_msg": "KVM: s390: vsie: fix race during shadow creation" + }, + "CVE-2024-2193": { + "cmt_msg": "" + }, "CVE-2022-20566": { "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free caused by l2cap_chan_put" }, @@ -149277,6 +195511,9 @@ "CVE-2018-12931": { "cmt_msg": "" }, + "CVE-2023-52637": { + "cmt_msg": "can: j1939: Fix UAF in j1939_sk_match_filter during setsockopt(SO_J1939_FILTER)" + }, "CVE-2023-1990": { "cmt_msg": "nfc: st-nci: Fix use after free bug in ndlc_remove due to race condition" }, @@ -149286,12 +195523,18 @@ "CVE-2023-1998": { "cmt_msg": "x86/speculation: Allow enabling STIBP with legacy IBRS" }, + "CVE-2019-25162": { + "cmt_msg": "i2c: Fix a potential use after free" + }, "CVE-2024-25740": { "cmt_msg": "" }, "CVE-2022-3903": { "cmt_msg": "media: mceusb: Use new usb_control_msg_*() routines" }, + "CVE-2024-26642": { + "cmt_msg": "netfilter: nf_tables: disallow anonymous set with timeout flag" + }, "CVE-2023-1195": { "cmt_msg": "cifs: fix use-after-free caused by invalid pointer `hostname`" }, @@ -149322,12 +195565,18 @@ "CVE-2022-3977": { "cmt_msg": "mctp: prevent double key removal and unref" }, + "CVE-2024-26782": { + "cmt_msg": "mptcp: fix double-free on socket dismantle" + }, "CVE-2023-21102": { "cmt_msg": "efi: rt-wrapper: Add missing include" }, "CVE-2024-22705": { "cmt_msg": "ksmbd: fix slab-out-of-bounds in smb_strndup_from_utf16()" }, + "CVE-2024-26622": { + "cmt_msg": "tomoyo: fix UAF write bug in tomoyo_write_control()" + }, "CVE-2022-3619": { "cmt_msg": "Bluetooth: L2CAP: Fix memory leak in vhci_write" }, @@ -149340,14 +195589,35 @@ "CVE-2023-38427": { "cmt_msg": "ksmbd: fix out-of-bound read in deassemble_neg_contexts()" }, + "CVE-2023-52527": { + "cmt_msg": "ipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data()" + }, "CVE-2023-3006": { "cmt_msg": "arm64: Add AMPERE1 to the Spectre-BHB affected list" }, + "CVE-2023-52523": { + "cmt_msg": "bpf, sockmap: Reject sk_msg egress redirects to non-TCP sockets" + }, + "CVE-2023-52522": { + "cmt_msg": "net: fix possible store tearing in neigh_periodic_work()" + }, + "CVE-2023-52520": { + "cmt_msg": "platform/x86: think-lmi: Fix reference leak" + }, "CVE-2024-0641": { "cmt_msg": "tipc: fix a potential deadlock on &tx->lock" }, - "CVE-2024-0646": { - "cmt_msg": "net: tls, update curr on splice as well" + "CVE-2024-26789": { + "cmt_msg": "crypto: arm64/neonbs - fix out-of-bounds access on short input" + }, + "CVE-2024-26779": { + "cmt_msg": "wifi: mac80211: fix race condition on enabling fast-xmit" + }, + "CVE-2023-52529": { + "cmt_msg": "HID: sony: Fix a potential memory leak in sony_probe()" + }, + "CVE-2023-52528": { + "cmt_msg": "net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg" }, "CVE-2023-2430": { "cmt_msg": "io_uring/msg_ring: fix missing lock on overflow for IOPOLL" @@ -149376,9 +195646,33 @@ "CVE-2023-38430": { "cmt_msg": "ksmbd: validate smb request protocol id" }, + "CVE-2024-26600": { + "cmt_msg": "phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP" + }, "CVE-2023-3390": { "cmt_msg": "netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE" }, + "CVE-2024-26606": { + "cmt_msg": "binder: signal epoll threads of self-work" + }, + "CVE-2024-26607": { + "cmt_msg": "drm/bridge: sii902x: Fix probing race issue" + }, + "CVE-2024-26765": { + "cmt_msg": "LoongArch: Disable IRQ before init_fn() for nonboot CPUs" + }, + "CVE-2024-26764": { + "cmt_msg": "fs/aio: Restrict kiocb_set_cancel_fn() to I/O submitted via libaio" + }, + "CVE-2024-26608": { + "cmt_msg": "ksmbd: fix global oob in ksmbd_nl_policy" + }, + "CVE-2024-26766": { + "cmt_msg": "IB/hfi1: Fix sdma.h tx->num_descs off-by-one error" + }, + "CVE-2024-26761": { + "cmt_msg": "cxl/pci: Fix disabling memory if DVSEC CXL Range does not match a CFMWS window" + }, "CVE-2023-3389": { "cmt_msg": "io_uring: mutex locked poll hashing" }, @@ -149388,6 +195682,9 @@ "CVE-2021-3864": { "cmt_msg": "" }, + "CVE-2024-26770": { + "cmt_msg": "HID: nvidia-shield: Add missing null pointer checks to LED initialization" + }, "CVE-2024-23849": { "cmt_msg": "net/rds: Fix UBSAN: array-index-out-of-bounds in rds_cmsg_recv" }, @@ -149410,7 +195707,7 @@ "cmt_msg": "" }, "CVE-2023-6270": { - "cmt_msg": "" + "cmt_msg": "aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts" }, "CVE-2023-2156": { "cmt_msg": "net: rpl: fix rpl header size calculation" @@ -149428,7 +195725,7 @@ "cmt_msg": "" }, "CVE-2023-6356": { - "cmt_msg": "" + "cmt_msg": "nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length" }, "CVE-2023-26607": { "cmt_msg": "ntfs: fix out-of-bounds read in ntfs_attr_find()" @@ -149439,9 +195736,30 @@ "CVE-2019-15239": { "cmt_msg": "unknown" }, + "CVE-2023-52635": { + "cmt_msg": "PM / devfreq: Synchronize devfreq_monitor_[start/stop]" + }, + "CVE-2023-52634": { + "cmt_msg": "drm/amd/display: Fix disable_otg_wa logic" + }, + "CVE-2023-52633": { + "cmt_msg": "um: time-travel: fix time corruption" + }, + "CVE-2023-52632": { + "cmt_msg": "drm/amdkfd: Fix lock dependency warning with srcu" + }, + "CVE-2023-52631": { + "cmt_msg": "fs/ntfs3: Fix an NULL dereference bug" + }, + "CVE-2023-52630": { + "cmt_msg": "blk-iocost: Fix an UBSAN shift-out-of-bounds warning" + }, "CVE-2023-20941": { "cmt_msg": "" }, + "CVE-2024-26638": { + "cmt_msg": "nbd: always initialize struct msghdr completely" + }, "CVE-2023-4155": { "cmt_msg": "KVM: SEV: only access GHCB fields once" }, @@ -149484,6 +195802,12 @@ "CVE-2023-28327": { "cmt_msg": "af_unix: Get user_ns from in_skb in unix_diag_get_exact()." }, + "CVE-2023-52638": { + "cmt_msg": "can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock" + }, + "CVE-2024-26631": { + "cmt_msg": "ipv6: mcast: fix data-race in ipv6_mc_down / mld_ifc_work" + }, "CVE-2017-13693": { "cmt_msg": "" }, @@ -149496,6 +195820,9 @@ "CVE-2022-42895": { "cmt_msg": "Bluetooth: L2CAP: Fix attempting to access uninitialized memory" }, + "CVE-2024-26636": { + "cmt_msg": "llc: make llc_ui_sendmsg() more robust against bonding changes" + }, "CVE-2023-33952": { "cmt_msg": "drm/vmwgfx: Do not drop the reference to the handle too soon" }, @@ -149505,6 +195832,9 @@ "CVE-2022-4382": { "cmt_msg": "USB: gadgetfs: Fix race between mounting and unmounting" }, + "CVE-2022-48628": { + "cmt_msg": "ceph: drop messages from MDS when unmounting" + }, "CVE-2024-24859": { "cmt_msg": "" }, @@ -149517,42 +195847,75 @@ "CVE-2024-24857": { "cmt_msg": "" }, + "CVE-2024-26673": { + "cmt_msg": "netfilter: nft_ct: sanitize layer 3 and 4 protocol number in custom expectations" + }, "CVE-2022-3545": { "cmt_msg": "nfp: fix use-after-free in area_cache_get()" }, "CVE-2022-3544": { "cmt_msg": "" }, + "CVE-2023-52569": { + "cmt_msg": "btrfs: remove BUG() after failure to insert delayed dir index item" + }, + "CVE-2023-52568": { + "cmt_msg": "x86/sgx: Resolves SECS reclaim vs. page fault for EAUG race" + }, "CVE-2022-3541": { "cmt_msg": "eth: sp7021: fix use after free bug in spl2sw_nvmem_get_mac_address" }, "CVE-2022-3543": { "cmt_msg": "af_unix: Fix memory leaks of the whole sk due to OOB skb." }, + "CVE-2023-52563": { + "cmt_msg": "drm/meson: fix memory leak on ->hpd_notify callback" + }, + "CVE-2023-52561": { + "cmt_msg": "arm64: dts: qcom: sdm845-db845c: Mark cont splash memory region as reserved" + }, + "CVE-2023-52560": { + "cmt_msg": "mm/damon/vaddr-test: fix memory leak in damon_do_test_apply_three_regions()" + }, "CVE-2023-5197": { "cmt_msg": "netfilter: nf_tables: disallow rule removal from chain binding" }, + "CVE-2023-52566": { + "cmt_msg": "nilfs2: fix potential use after free in nilfs_gccache_submit_read_data()" + }, + "CVE-2023-52565": { + "cmt_msg": "media: uvcvideo: Fix OOB read" + }, "CVE-2023-1382": { "cmt_msg": "tipc: set con sock in tipc_conn_alloc" }, "CVE-2023-1380": { "cmt_msg": "wifi: brcmfmac: slab-out-of-bounds read in brcmf_get_assoc_ies()" }, + "CVE-2024-26672": { + "cmt_msg": "drm/amdgpu: Fix variable 'mca_funcs' dereferenced before NULL check in 'amdgpu_mca_smu_get_mca_entry()'" + }, "CVE-2020-0347": { "cmt_msg": "" }, "CVE-2019-12456": { "cmt_msg": "" }, + "CVE-2024-26720": { + "cmt_msg": "mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again" + }, "CVE-2023-6546": { "cmt_msg": "tty: n_gsm: fix the UAF caused by race condition in gsm_cleanup_mux" }, + "CVE-2024-26727": { + "cmt_msg": "btrfs: do not ASSERT() if the newly created subvolume already got read" + }, + "CVE-2024-26726": { + "cmt_msg": "btrfs: don't drop extent_map for free space inode on write error" + }, "CVE-2023-1206": { "cmt_msg": "tcp: Reduce chance of collisions in inet6_hashfn()." }, - "CVE-2022-41850": { - "cmt_msg": "HID: roccat: Fix use-after-free in roccat_read()" - }, "CVE-2023-2985": { "cmt_msg": "fs: hfsplus: fix UAF issue in hfsplus_put_super" }, @@ -149574,6 +195937,24 @@ "CVE-2023-3355": { "cmt_msg": "drm/msm/gem: Add check for kmalloc" }, + "CVE-2023-52518": { + "cmt_msg": "Bluetooth: hci_codec: Fix leaking content of local_codecs" + }, + "CVE-2023-52519": { + "cmt_msg": "HID: intel-ish-hid: ipc: Disable and reenable ACPI GPE bit" + }, + "CVE-2023-52516": { + "cmt_msg": "dma-debug: don't call __dma_entry_alloc_check_leak() under free_entries_lock" + }, + "CVE-2023-52517": { + "cmt_msg": "spi: sun6i: fix race between DMA RX transfer completion and RX FIFO drain" + }, + "CVE-2023-52515": { + "cmt_msg": "RDMA/srp: Do not call scsi_done() from srp_abort()" + }, + "CVE-2023-52512": { + "cmt_msg": "pinctrl: nuvoton: wpcm450: fix out of bounds write" + }, "CVE-2019-15902": { "cmt_msg": "unknown" }, @@ -149590,7 +195971,10 @@ "cmt_msg": "" }, "CVE-2023-6536": { - "cmt_msg": "" + "cmt_msg": "nvmet-tcp: fix a crash in nvmet_req_complete()" + }, + "CVE-2024-26704": { + "cmt_msg": "ext4: fix double-free of blocks due to wrong extents moved_len" }, "CVE-2018-17977": { "cmt_msg": "" @@ -149598,12 +195982,30 @@ "CVE-2024-1151": { "cmt_msg": "net: openvswitch: limit the number of recursions from action sets" }, + "CVE-2024-26659": { + "cmt_msg": "xhci: handle isoc Babble and Buffer Overrun events properly" + }, + "CVE-2024-26658": { + "cmt_msg": "bcachefs: grab s_umount only if snapshotting" + }, "CVE-2010-5321": { "cmt_msg": "" }, + "CVE-2024-26655": { + "cmt_msg": "Fix memory leak in posix_clock_open()" + }, + "CVE-2024-26654": { + "cmt_msg": "ALSA: sh: aica: reorder cleanup operations to avoid UAF bugs" + }, "CVE-2023-32247": { "cmt_msg": "ksmbd: destroy expired sessions" }, + "CVE-2024-26651": { + "cmt_msg": "sr9800: Add check for usbnet_get_endpoints" + }, + "CVE-2024-26650": { + "cmt_msg": "platform/x86: p2sb: Allow p2sb_bar() calls during PCI device probe" + }, "CVE-2023-4147": { "cmt_msg": "netfilter: nf_tables: disallow rule addition to bound chain via NFTA_RULE_CHAIN_ID" }, @@ -149616,12 +196018,30 @@ "CVE-2023-4569": { "cmt_msg": "netfilter: nf_tables: deactivate catchall elements in next generation" }, + "CVE-2023-52474": { + "cmt_msg": "IB/hfi1: Fix bugs with non-PAGE_SIZE-end multi-iovec user SDMA requests" + }, + "CVE-2023-52477": { + "cmt_msg": "usb: hub: Guard against accesses to uninitialized BOS descriptors" + }, + "CVE-2023-52476": { + "cmt_msg": "perf/x86/lbr: Filter vsyscall addresses" + }, + "CVE-2023-52470": { + "cmt_msg": "drm/radeon: check the alloc_workqueue return value in radeon_crtc_init()" + }, "CVE-2023-22997": { "cmt_msg": "module: Fix NULL vs IS_ERR checking for module_get_next_page" }, "CVE-2023-4563": { "cmt_msg": "netfilter: nf_tables: don't skip expired elements during walk" }, + "CVE-2023-52479": { + "cmt_msg": "ksmbd: fix uaf in smb20_oplock_break_ack" + }, + "CVE-2023-52478": { + "cmt_msg": "HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect" + }, "CVE-2021-3542": { "cmt_msg": "" }, @@ -149652,6 +196072,9 @@ "CVE-2023-32257": { "cmt_msg": "ksmbd: fix racy issue from session setup and logoff" }, + "CVE-2024-26778": { + "cmt_msg": "fbdev: savage: Error out if pixclock equals zero" + }, "CVE-2023-32254": { "cmt_msg": "ksmbd: fix racy issue under cocurrent smb2 tree disconnect" }, @@ -149673,12 +196096,60 @@ "CVE-2024-25741": { "cmt_msg": "" }, + "CVE-2024-26808": { + "cmt_msg": "netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain" + }, + "CVE-2024-26809": { + "cmt_msg": "netfilter: nft_set_pipapo: release elements in clone only from destroy path" + }, + "CVE-2024-26804": { + "cmt_msg": "net: ip_tunnel: prevent perpetual headroom growth" + }, "CVE-2023-1989": { "cmt_msg": "Bluetooth: btsdio: fix use after free bug in btsdio_remove due to unfinished work" }, + "CVE-2024-26806": { + "cmt_msg": "spi: cadence-qspi: remove system-wide suspend helper calls from runtime PM hooks" + }, + "CVE-2024-26801": { + "cmt_msg": "Bluetooth: Avoid potential use-after-free in hci_error_reset" + }, + "CVE-2024-26802": { + "cmt_msg": "stmmac: Clear variable when destroying workqueue" + }, + "CVE-2023-52508": { + "cmt_msg": "nvme-fc: Prevent null pointer dereference in nvme_fc_io_getuuid()" + }, + "CVE-2023-52606": { + "cmt_msg": "powerpc/lib: Validate size for vector operations" + }, + "CVE-2023-52607": { + "cmt_msg": "powerpc/mm: Fix null-pointer dereference in pgtable_cache_add" + }, + "CVE-2023-52604": { + "cmt_msg": "FS:JFS:UBSAN:array-index-out-of-bounds in dbAdjTree" + }, + "CVE-2023-52602": { + "cmt_msg": "jfs: fix slab-out-of-bounds Read in dtSearch" + }, + "CVE-2023-52603": { + "cmt_msg": "UBSAN: array-index-out-of-bounds in dtSplitRoot" + }, "CVE-2022-25265": { "cmt_msg": "" }, + "CVE-2023-52601": { + "cmt_msg": "jfs: fix array-index-out-of-bounds in dbAdjTree" + }, + "CVE-2023-52600": { + "cmt_msg": "jfs: fix uaf in jfs_evict_inode" + }, + "CVE-2023-52608": { + "cmt_msg": "firmware: arm_scmi: Check mailbox/SMT channel for consistency" + }, + "CVE-2023-52609": { + "cmt_msg": "binder: fix race between mmput() and do_exit()" + }, "CVE-2023-4208": { "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free" }, @@ -149703,6 +196174,12 @@ "CVE-2023-0160": { "cmt_msg": "bpf, sockmap: fix deadlocks in the sockhash and sockmap" }, + "CVE-2023-52481": { + "cmt_msg": "arm64: errata: Add Cortex-A520 speculative unprivileged load workaround" + }, + "CVE-2023-52598": { + "cmt_msg": "s390/ptrace: handle setting of fpc register correctly" + }, "CVE-2023-21106": { "cmt_msg": "drm/msm/gpu: Fix potential double-free" }, @@ -149715,12 +196192,21 @@ "CVE-2023-4010": { "cmt_msg": "" }, + "CVE-2023-52500": { + "cmt_msg": "scsi: pm80xx: Avoid leaking tags when processing OPC_INB_SET_CONTROLLER_CONFIG command" + }, "CVE-2022-38457": { "cmt_msg": "drm/vmwgfx: Remove rcu locks from user resources" }, + "CVE-2024-26774": { + "cmt_msg": "ext4: avoid dividing by 0 in mb_update_avg_fragment_size() when block bitmap corrupt" + }, "CVE-2019-19378": { "cmt_msg": "" }, + "CVE-2023-52482": { + "cmt_msg": "x86/srso: Add SRSO mitigation for Hygon processors" + }, "CVE-2022-45934": { "cmt_msg": "Bluetooth: L2CAP: Fix u8 overflow" }, @@ -149754,14 +196240,20 @@ "CVE-2022-2209": { "cmt_msg": "" }, + "CVE-2024-26775": { + "cmt_msg": "aoe: avoid potential deadlock at set_capacity" + }, "CVE-2023-7042": { - "cmt_msg": "" + "cmt_msg": "wifi: ath10k: fix NULL pointer dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev()" }, "CVE-2022-3595": { "cmt_msg": "cifs: fix double-fault crash during ntlmssp" }, + "CVE-2023-52559": { + "cmt_msg": "iommu/vt-d: Avoid memory allocation in iommu_suspend()" + }, "CVE-2023-47233": { - "cmt_msg": "" + "cmt_msg": "wifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach" }, "CVE-2024-23850": { "cmt_msg": "btrfs: do not ASSERT() if the newly created subvolume already got read" @@ -149769,15 +196261,45 @@ "CVE-2024-23851": { "cmt_msg": "dm: limit the number of targets and parameter size area" }, + "CVE-2023-52629": { + "cmt_msg": "sh: push-switch: Reorder cleanup operations to avoid use-after-free bug" + }, + "CVE-2024-26772": { + "cmt_msg": "ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal()" + }, + "CVE-2024-26758": { + "cmt_msg": "md: Don't ignore suspended array in md_check_recovery()" + }, + "CVE-2024-26610": { + "cmt_msg": "wifi: iwlwifi: fix a memory corruption" + }, + "CVE-2024-26612": { + "cmt_msg": "netfs, fscache: Prevent Oops in fscache_put_cache()" + }, "CVE-2022-42329": { "cmt_msg": "xen/netback: don't call kfree_skb() with interrupts disabled" }, "CVE-2022-42328": { "cmt_msg": "xen/netback: don't call kfree_skb() with interrupts disabled" }, + "CVE-2024-26751": { + "cmt_msg": "ARM: ep93xx: Add terminator to gpiod_lookup_table" + }, + "CVE-2024-26752": { + "cmt_msg": "l2tp: pass correct message length to ip6_append_data" + }, + "CVE-2024-26753": { + "cmt_msg": "crypto: virtio/akcipher - Fix stack overflow on memcpy" + }, + "CVE-2024-26754": { + "cmt_msg": "gtp: fix use-after-free and null-ptr-deref in gtp_genl_dump_pdp()" + }, "CVE-2023-21255": { "cmt_msg": "binder: fix UAF caused by faulty buffer cleanup" }, + "CVE-2024-26757": { + "cmt_msg": "md: Don't ignore read-only array in md_check_recovery()" + }, "CVE-2023-52439": { "cmt_msg": "uio: Fix use-after-free in uio_open" }, @@ -149793,9 +196315,24 @@ "CVE-2023-52436": { "cmt_msg": "f2fs: explicitly null-terminate the xattr list" }, + "CVE-2024-26688": { + "cmt_msg": "fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super" + }, + "CVE-2024-23307": { + "cmt_msg": "md/raid5: fix atomicity violation in raid5_cache_count" + }, "CVE-2022-2961": { "cmt_msg": "" }, + "CVE-2024-26680": { + "cmt_msg": "net: atlantic: Fix DMA mapping for PTP hwts ring" + }, + "CVE-2024-26686": { + "cmt_msg": "fs/proc: do_task_stat: use sig->stats_lock to gather the threads/children stats" + }, + "CVE-2024-26687": { + "cmt_msg": "xen/events: close evtchn after mapping cleanup" + }, "CVE-2023-51779": { "cmt_msg": "Bluetooth: af_bluetooth: Fix Use-After-Free in bt_sock_recvmsg" }, @@ -149832,18 +196369,42 @@ "CVE-2023-4623": { "cmt_msg": "net/sched: sch_hfsc: Ensure inner classes have fsc curve" }, + "CVE-2024-26663": { + "cmt_msg": "tipc: Check the bearer type before calling tipc_udp_nl_bearer_add()" + }, "CVE-2023-1193": { "cmt_msg": "ksmbd: delete asynchronous work from list" }, + "CVE-2023-52498": { + "cmt_msg": "PM: sleep: Fix possible deadlocks in core system-wide PM code" + }, + "CVE-2023-52640": { + "cmt_msg": "fs/ntfs3: Fix oob in ntfs_listxattr" + }, + "CVE-2023-52641": { + "cmt_msg": "fs/ntfs3: Add NULL ptr dereference checking at the end of attr_allocate_frame()" + }, "CVE-2021-0399": { "cmt_msg": "" }, + "CVE-2023-52488": { + "cmt_msg": "serial: sc16is7xx: convert from _raw_ to _noinc_ regmap functions for FIFO" + }, + "CVE-2023-52489": { + "cmt_msg": "mm/sparsemem: fix race in accessing memory_section->usage" + }, "CVE-2023-42755": { "cmt_msg": "net/sched: Retire rsvp classifier" }, "CVE-2023-3161": { "cmt_msg": "fbcon: Check font dimension limits" }, + "CVE-2023-52486": { + "cmt_msg": "drm: Don't unref the same fb many times by mistake due to deadlock handling" + }, + "CVE-2023-52480": { + "cmt_msg": "ksmbd: fix race condition between session lookup and expire" + }, "CVE-2012-4542": { "cmt_msg": "" }, @@ -149868,6 +196429,12 @@ "CVE-2023-3609": { "cmt_msg": "net/sched: cls_u32: Fix reference counter leak leading to overflow" }, + "CVE-2023-52491": { + "cmt_msg": "media: mtk-jpeg: Fix use after free bug due to error path handling in mtk_jpeg_dec_device_run" + }, + "CVE-2024-26759": { + "cmt_msg": "mm/swap: fix race when skipping swapcache" + }, "CVE-2022-3424": { "cmt_msg": "misc: sgi-gru: fix use-after-free error in gru_set_context_option, gru_fault and gru_handle_user_call_os" }, @@ -149889,6 +196456,9 @@ "CVE-2008-2544": { "cmt_msg": "" }, + "CVE-2023-52485": { + "cmt_msg": "drm/amd/display: Wake DMCUB before sending a command" + }, "CVE-2023-0461": { "cmt_msg": "net/ulp: prevent ULP without clone op from entering the LISTEN status" }, @@ -149910,6 +196480,9 @@ "CVE-2023-20928": { "cmt_msg": "android: binder: stop saving a pointer to the VMA" }, + "CVE-2024-26760": { + "cmt_msg": "scsi: target: pscsi: Fix bio_put() for error case" + }, "CVE-2023-35788": { "cmt_msg": "net/sched: flower: fix possible OOB write in fl_set_geneve_opt()" }, @@ -149923,14 +196496,41 @@ "cmt_msg": "Bluetooth: Fix atomicity violation in {min,max}_key_size_set" }, "CVE-2024-24861": { - "cmt_msg": "" + "cmt_msg": "media: xc4000: Fix atomicity violation in xc4000_get_frequency" }, "CVE-2024-24864": { "cmt_msg": "" }, + "CVE-2023-52596": { + "cmt_msg": "sysctl: Fix out of bounds access for empty sysctl registers" + }, + "CVE-2023-52597": { + "cmt_msg": "KVM: s390: fix setting of fpc register" + }, + "CVE-2023-52594": { + "cmt_msg": "wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus()" + }, + "CVE-2023-52595": { + "cmt_msg": "wifi: rt2x00: restart beacon queue when hardware reset" + }, + "CVE-2023-52593": { + "cmt_msg": "wifi: wfx: fix possible NULL pointer dereference in wfx_set_mfp_ap()" + }, + "CVE-2023-52590": { + "cmt_msg": "ocfs2: Avoid touching renamed directory if parent does not change" + }, + "CVE-2023-52591": { + "cmt_msg": "reiserfs: Avoid touching renamed directory if parent does not change" + }, "CVE-2023-2194": { "cmt_msg": "i2c: xgene-slimpro: Fix out-of-bounds bug in xgene_slimpro_i2c_xfer()" }, + "CVE-2023-52599": { + "cmt_msg": "jfs: fix array-index-out-of-bounds in diNewExt" + }, + "CVE-2024-26627": { + "cmt_msg": "scsi: core: Move scsi_host_busy() out of host lock for waking up EH handler" + }, "CVE-2022-41218": { "cmt_msg": "media: dvb-core: Fix UAF due to refcount races at releasing" }, @@ -149938,7 +196538,10 @@ "cmt_msg": "bpf: Defer the free of inner map when necessary" }, "CVE-2024-0841": { - "cmt_msg": "" + "cmt_msg": "fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super" + }, + "CVE-2024-26623": { + "cmt_msg": "pds_core: Prevent race issues involving the adminq" }, "CVE-2022-41849": { "cmt_msg": "fbdev: smscufx: Fix use-after-free in ufx_ops_open()" @@ -149956,7 +196559,7 @@ "cmt_msg": "" }, "CVE-2024-22099": { - "cmt_msg": "" + "cmt_msg": "Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security" }, "CVE-2022-45885": { "cmt_msg": "" @@ -149970,18 +196573,39 @@ "CVE-2022-45886": { "cmt_msg": "media: dvb-core: Fix use-after-free due on race condition at dvb_net" }, + "CVE-2023-52509": { + "cmt_msg": "ravb: Fix use-after-free issue in ravb_tx_timeout_work()" + }, "CVE-2023-46343": { "cmt_msg": "nfc: nci: fix possible NULL pointer dereference in send_acknowledge()" }, "CVE-2024-25744": { "cmt_msg": "x86/coco: Disable 32-bit emulation by default on TDX and SEV" }, + "CVE-2023-52505": { + "cmt_msg": "phy: lynx-28g: serialize concurrent phy_set_mode_ext() calls to shared registers" + }, + "CVE-2023-52504": { + "cmt_msg": "x86/alternatives: Disable KASAN in apply_alternatives()" + }, + "CVE-2023-52507": { + "cmt_msg": "nfc: nci: assert requested protocol is valid" + }, "CVE-2023-2124": { "cmt_msg": "xfs: verify buffer contents when we skip log replay" }, + "CVE-2023-52501": { + "cmt_msg": "ring-buffer: Do not attempt to read past \"commit\"" + }, "CVE-2022-45888": { "cmt_msg": "char: xillybus: Prevent use-after-free due to race condition" }, + "CVE-2023-52503": { + "cmt_msg": "tee: amdtee: fix use-after-free vulnerability in amdtee_close_session" + }, + "CVE-2023-52502": { + "cmt_msg": "net: nfc: fix races in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn()" + }, "CVE-2023-1281": { "cmt_msg": "net/sched: tcindex: update imperfect hash filters respecting rcu" }, @@ -149997,18 +196621,45 @@ "CVE-2022-27672": { "cmt_msg": "x86/speculation: Identify processors vulnerable to SMT RSB predictions" }, + "CVE-2024-26668": { + "cmt_msg": "netfilter: nft_limit: reject configurations that cause integer overflow" + }, + "CVE-2024-26669": { + "cmt_msg": "net/sched: flower: Fix chain template offload" + }, "CVE-2020-25220": { "cmt_msg": "" }, "CVE-2015-2877": { "cmt_msg": "" }, + "CVE-2024-26660": { + "cmt_msg": "drm/amd/display: Implement bounds check for stream encoder creation in DCN301" + }, + "CVE-2024-26661": { + "cmt_msg": "drm/amd/display: Add NULL test for 'timing generator' in 'dcn21_set_pipe()'" + }, + "CVE-2024-26662": { + "cmt_msg": "drm/amd/display: Fix 'panel_cntl' could be null in 'dcn21_set_backlight_level()'" + }, "CVE-2023-26242": { "cmt_msg": "" }, + "CVE-2024-26664": { + "cmt_msg": "hwmon: (coretemp) Fix out-of-bounds memory access" + }, + "CVE-2024-26665": { + "cmt_msg": "tunnels: fix out of bounds access when building IPv6 PMTU error" + }, "CVE-2019-16089": { "cmt_msg": "" }, + "CVE-2024-26667": { + "cmt_msg": "drm/msm/dpu: check for valid hw_pp in dpu_encoder_helper_phys_cleanup" + }, + "CVE-2024-26689": { + "cmt_msg": "ceph: prevent use-after-free in encode_cap_msg()" + }, "CVE-2023-21264": { "cmt_msg": "KVM: arm64: Prevent unconditional donation of unmapped regions from the host" }, @@ -150051,11 +196702,32 @@ "CVE-2023-23039": { "cmt_msg": "" }, + "CVE-2024-26718": { + "cmt_msg": "dm-crypt, dm-verity: disable tasklets" + }, + "CVE-2024-26719": { + "cmt_msg": "nouveau: offload fence uevents work to workqueue" + }, + "CVE-2024-26714": { + "cmt_msg": "interconnect: qcom: sc8180x: Mark CO0 BCM keepalive" + }, + "CVE-2024-26715": { + "cmt_msg": "usb: dwc3: gadget: Fix NULL pointer dereference in dwc3_gadget_suspend" + }, "CVE-2024-1312": { "cmt_msg": "mm: lock_vma_under_rcu() must check vma->anon_vma under vma lock" }, + "CVE-2024-26717": { + "cmt_msg": "HID: i2c-hid-of: fix NULL-deref on failed power up" + }, "CVE-2023-3338": { "cmt_msg": "Remove DECnet support from kernel" + }, + "CVE-2024-26712": { + "cmt_msg": "powerpc/kasan: Fix addr error caused by page alignment" + }, + "CVE-2024-26713": { + "cmt_msg": "powerpc/pseries/iommu: Fix iommu initialisation during DLPAR add" } } }, @@ -150428,6 +197100,9 @@ "CVE-2020-35508": { "cmt_msg": "fork: fix copy_process(CLONE_PARENT) race with the exiting ->real_parent" }, + "CVE-2024-26686": { + "cmt_msg": "fs/proc: do_task_stat: use sig->stats_lock to gather the threads/children stats" + }, "CVE-2022-3649": { "cmt_msg": "nilfs2: fix use-after-free bug of struct nilfs_root" }, @@ -150458,12 +197133,24 @@ "CVE-2023-3268": { "cmt_msg": "relayfs: fix out-of-bounds access in relay_file_read" }, + "CVE-2023-52615": { + "cmt_msg": "hwrng: core - Fix page fault dead lock on mmap-ed hwrng" + }, + "CVE-2023-52614": { + "cmt_msg": "PM / devfreq: Fix buffer overflow in trans_stat_show" + }, + "CVE-2023-52617": { + "cmt_msg": "PCI: switchtec: Fix stdev_release() crash after surprise hot remove" + }, "CVE-2020-24587": { "cmt_msg": "mac80211: prevent mixed key and fragment cache attacks" }, "CVE-2020-24586": { "cmt_msg": "mac80211: prevent mixed key and fragment cache attacks" }, + "CVE-2023-52612": { + "cmt_msg": "crypto: scomp - fix req->dst buffer overflow" + }, "CVE-2022-3105": { "cmt_msg": "RDMA/uverbs: Check for null return of kmalloc_array" }, @@ -150476,6 +197163,9 @@ "CVE-2022-47520": { "cmt_msg": "wifi: wilc1000: validate pairwise and authentication suite offsets" }, + "CVE-2023-52618": { + "cmt_msg": "block/rnbd-srv: Check for unlikely string overflow" + }, "CVE-2023-5717": { "cmt_msg": "perf: Disallow mis-matched inherited group reads" }, @@ -150503,6 +197193,9 @@ "CVE-2022-42703": { "cmt_msg": "mm/rmap: Fix anon_vma->degree ambiguity leading to double-reuse" }, + "CVE-2021-47059": { + "cmt_msg": "crypto: sun8i-ss - fix result memory leak on error path" + }, "CVE-2022-23825": { "cmt_msg": "" }, @@ -150512,23 +197205,53 @@ "CVE-2021-42252": { "cmt_msg": "soc: aspeed: lpc-ctrl: Fix boundary check for mmap" }, + "CVE-2021-47051": { + "cmt_msg": "spi: fsl-lpspi: Fix PM reference leak in lpspi_prepare_xfer_hardware()" + }, "CVE-2023-42754": { "cmt_msg": "ipv4: fix null-deref in ipv4_link_failure" }, - "CVE-2024-26588": { - "cmt_msg": "LoongArch: BPF: Prevent out-of-bounds memory access" + "CVE-2021-47056": { + "cmt_msg": "crypto: qat - ADF_STATUS_PF_RUNNING should be set after adf_dev_init" + }, + "CVE-2021-47054": { + "cmt_msg": "bus: qcom: Put child node before return" + }, + "CVE-2021-47112": { + "cmt_msg": "x86/kvm: Teardown PV features on boot CPU as well" + }, + "CVE-2021-47113": { + "cmt_msg": "btrfs: abort in rename_exchange if we fail to insert the second ref" + }, + "CVE-2021-47110": { + "cmt_msg": "x86/kvm: Disable kvmclock on all CPUs on shutdown" + }, + "CVE-2021-47116": { + "cmt_msg": "ext4: fix memory leak in ext4_mb_init_backend on error path." + }, + "CVE-2021-47117": { + "cmt_msg": "ext4: fix bug on in ext4_es_cache_extent as ext4_split_extent_at failed" + }, + "CVE-2021-47114": { + "cmt_msg": "ocfs2: fix data corruption by fallocate" }, "CVE-2022-21125": { "cmt_msg": "x86/speculation/mmio: Reuse SRBDS mitigation for SBDS" }, + "CVE-2021-47118": { + "cmt_msg": "pid: take a reference when initializing `cad_pid`" + }, + "CVE-2021-46970": { + "cmt_msg": "bus: mhi: pci_generic: Remove WQ_MEM_RECLAIM flag from state workqueue" + }, "CVE-2023-28466": { "cmt_msg": "net: tls: fix possible race condition between do_tls_getsockopt_conf() and do_tls_setsockopt_conf()" }, "CVE-2022-40307": { "cmt_msg": "efi: capsule-loader: Fix use-after-free in efi_capsule_write" }, - "CVE-2022-21123": { - "cmt_msg": "x86/speculation/mmio: Add mitigation for Processor MMIO Stale Data" + "CVE-2021-46974": { + "cmt_msg": "bpf: Fix masking negation logic upon negative dst register" }, "CVE-2021-28688": { "cmt_msg": "xen-blkback: don't leak persistent grants from xen_blkbk_map()" @@ -150548,12 +197271,18 @@ "CVE-2020-0466": { "cmt_msg": "do_epoll_ctl(): clean the failure exits up a bit" }, + "CVE-2024-26774": { + "cmt_msg": "ext4: avoid dividing by 0 in mb_update_avg_fragment_size() when block bitmap corrupt" + }, "CVE-2023-0459": { "cmt_msg": "uaccess: Add speculation barrier to copy_from_user()" }, "CVE-2023-0458": { "cmt_msg": "prlimit: do_prlimit needs to have a speculation check" }, + "CVE-2023-52565": { + "cmt_msg": "media: uvcvideo: Fix OOB read" + }, "CVE-2023-0597": { "cmt_msg": "x86/mm: Randomize per-cpu entry area" }, @@ -150581,8 +197310,8 @@ "CVE-2022-3628": { "cmt_msg": "wifi: brcmfmac: Fix potential buffer overflow in brcmf_fweh_event_worker()" }, - "CVE-2024-26591": { - "cmt_msg": "bpf: Fix re-attachment branch in bpf_tracing_prog_attach" + "CVE-2023-52515": { + "cmt_msg": "RDMA/srp: Do not call scsi_done() from srp_abort()" }, "CVE-2020-15802": { "cmt_msg": "" @@ -150611,18 +197340,33 @@ "CVE-2022-40982": { "cmt_msg": "x86/speculation: Add Gather Data Sampling mitigation" }, + "CVE-2024-26735": { + "cmt_msg": "ipv6: sr: fix possible use-after-free and null-ptr-deref" + }, "CVE-2022-3202": { "cmt_msg": "jfs: prevent NULL deref in diFree" }, + "CVE-2024-25739": { + "cmt_msg": "" + }, + "CVE-2021-47028": { + "cmt_msg": "mt76: mt7915: fix txrate reporting" + }, "CVE-2022-2602": { "cmt_msg": "io_uring/af_unix: defer registered files gc to io_uring release" }, "CVE-2024-26585": { "cmt_msg": "tls: fix race between tx work scheduling and socket close" }, + "CVE-2021-47024": { + "cmt_msg": "vsock/virtio: free queued packets when closing socket" + }, "CVE-2023-3358": { "cmt_msg": "HID: intel_ish-hid: Add check for ishtp_dma_tx_map" }, + "CVE-2021-47020": { + "cmt_msg": "soundwire: stream: fix memory leak in stream config error path" + }, "CVE-2024-26584": { "cmt_msg": "net: tls: handle backlogging of crypto requests" }, @@ -150632,8 +197376,17 @@ "CVE-2023-39189": { "cmt_msg": "netfilter: nfnetlink_osf: avoid OOB read" }, - "CVE-2023-2002": { - "cmt_msg": "bluetooth: Perform careful capability checks in hci_sock_ioctl()" + "CVE-2021-46908": { + "cmt_msg": "bpf: Use correct permission flag for mixed signed bounds arithmetic" + }, + "CVE-2021-46909": { + "cmt_msg": "ARM: footbridge: fix PCI interrupt mapping" + }, + "CVE-2021-46906": { + "cmt_msg": "HID: usbhid: fix info leak in hid_submit_ctrl" + }, + "CVE-2021-46904": { + "cmt_msg": "net: hso: fix null-ptr-deref during tty device unregistration" }, "CVE-2022-1247": { "cmt_msg": "" @@ -150686,9 +197439,24 @@ "CVE-2023-1073": { "cmt_msg": "HID: check empty report_list in hid_validate_values()" }, + "CVE-2024-26747": { + "cmt_msg": "usb: roles: fix NULL pointer issue when put module's reference" + }, + "CVE-2023-52527": { + "cmt_msg": "ipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data()" + }, + "CVE-2024-26745": { + "cmt_msg": "powerpc/pseries/iommu: IOMMU table is not initialized for kdump over SR-IOV" + }, "CVE-2023-51042": { "cmt_msg": "drm/amdgpu: Fix potential fence use-after-free v2" }, + "CVE-2024-26743": { + "cmt_msg": "RDMA/qedr: Fix qedr_create_user_qp error flow" + }, + "CVE-2023-52566": { + "cmt_msg": "nilfs2: fix potential use after free in nilfs_gccache_submit_read_data()" + }, "CVE-2023-3006": { "cmt_msg": "arm64: Add AMPERE1 to the Spectre-BHB affected list" }, @@ -150701,6 +197469,9 @@ "CVE-2023-1990": { "cmt_msg": "nfc: st-nci: Fix use after free bug in ndlc_remove due to race condition" }, + "CVE-2022-42432": { + "cmt_msg": "netfilter: nfnetlink_osf: fix possible bogus match in nf_osf_find()" + }, "CVE-2022-1734": { "cmt_msg": "nfc: nfcmrvl: main: reorder destructive operations in nfcmrvl_nci_unregister_dev to avoid bugs" }, @@ -150737,6 +197508,9 @@ "CVE-2019-19070": { "cmt_msg": "spi: gpio: prevent memory leak in spi_gpio_probe" }, + "CVE-2024-26699": { + "cmt_msg": "drm/amd/display: Fix array-index-out-of-bounds in dcn35_clkmgr" + }, "CVE-2023-42753": { "cmt_msg": "netfilter: ipset: add the missing IP_SET_HASH_WITH_NET0 macro for ip_set_hash_netportnet.c" }, @@ -150749,6 +197523,9 @@ "CVE-2022-20154": { "cmt_msg": "sctp: use call_rcu to free endpoint" }, + "CVE-2024-26691": { + "cmt_msg": "KVM: arm64: Fix circular locking dependency" + }, "CVE-2021-45868": { "cmt_msg": "quota: check block number when reading the block in quota file" }, @@ -150764,9 +197541,15 @@ "CVE-2024-0565": { "cmt_msg": "smb: client: fix OOB in receive_encrypted_standard()" }, + "CVE-2024-26697": { + "cmt_msg": "nilfs2: fix data corruption in dsync block recovery for small block sizes" + }, "CVE-2020-0404": { "cmt_msg": "media: uvcvideo: Avoid cyclic entity chains due to malformed USB descriptors" }, + "CVE-2024-26633": { + "cmt_msg": "ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim()" + }, "CVE-2023-2176": { "cmt_msg": "RDMA/core: Refactor rdma_bind_addr" }, @@ -150797,6 +197580,9 @@ "CVE-2020-25645": { "cmt_msg": "geneve: add transport ports in route lookup for geneve" }, + "CVE-2024-26788": { + "cmt_msg": "dmaengine: fsl-qdma: init irq after reg initialization" + }, "CVE-2020-25643": { "cmt_msg": "hdlc_ppp: add range checks in ppp_cp_parse_cr()" }, @@ -150806,6 +197592,9 @@ "CVE-2005-3660": { "cmt_msg": "" }, + "CVE-2023-52619": { + "cmt_msg": "pstore/ram: Fix crash when setting number of cpus to an odd number" + }, "CVE-2023-31085": { "cmt_msg": "ubi: Refuse attaching if mtd's erasesize is 0" }, @@ -150824,6 +197613,9 @@ "CVE-2021-33034": { "cmt_msg": "Bluetooth: verify AMP hci_chan before amp_destroy" }, + "CVE-2023-52519": { + "cmt_msg": "HID: intel-ish-hid: ipc: Disable and reenable ACPI GPE bit" + }, "CVE-2021-33033": { "cmt_msg": "cipso,calipso: resolve a number of problems with the DOI refcounts" }, @@ -150833,8 +197625,11 @@ "CVE-2020-27068": { "cmt_msg": "cfg80211: add missing policy for NL80211_ATTR_STATUS_CODE" }, - "CVE-2024-23307": { - "cmt_msg": "" + "CVE-2024-0646": { + "cmt_msg": "net: tls, update curr on splice as well" + }, + "CVE-2023-52598": { + "cmt_msg": "s390/ptrace: handle setting of fpc register correctly" }, "CVE-2020-15436": { "cmt_msg": "block: Fix use-after-free in blkdev_get()" @@ -150842,6 +197637,9 @@ "CVE-2022-32296": { "cmt_msg": "tcp: increase source port perturb table to 2^16" }, + "CVE-2024-26789": { + "cmt_msg": "crypto: arm64/neonbs - fix out-of-bounds access on short input" + }, "CVE-2020-28974": { "cmt_msg": "vt: Disable KD_FONT_OP_COPY" }, @@ -150857,12 +197655,18 @@ "CVE-2022-2318": { "cmt_msg": "net: rose: fix UAF bugs caused by timer handler" }, + "CVE-2023-52497": { + "cmt_msg": "erofs: fix lz4 inplace decompression" + }, "CVE-2020-15393": { "cmt_msg": "usb: usbtest: fix missing kfree(dev->buf) in usbtest_disconnect" }, "CVE-2019-19082": { "cmt_msg": "drm/amd/display: prevent memory leak" }, + "CVE-2024-26655": { + "cmt_msg": "Fix memory leak in posix_clock_open()" + }, "CVE-2021-3564": { "cmt_msg": "Bluetooth: fix the erroneous flush_work() order" }, @@ -150890,6 +197694,9 @@ "CVE-2022-0185": { "cmt_msg": "vfs: fs_context: fix up param length parsing in legacy_parse_param" }, + "CVE-2023-42752": { + "cmt_msg": "igmp: limit igmpv3_newpack() packet size to IP_MAX_MTU" + }, "CVE-2023-37454": { "cmt_msg": "" }, @@ -150899,15 +197706,27 @@ "CVE-2022-20572": { "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag" }, + "CVE-2024-24858": { + "cmt_msg": "" + }, "CVE-2023-39194": { "cmt_msg": "net: xfrm: Fix xfrm_address_filter OOB read" }, + "CVE-2023-2002": { + "cmt_msg": "bluetooth: Perform careful capability checks in hci_sock_ioctl()" + }, "CVE-2023-39197": { "cmt_msg": "netfilter: conntrack: dccp: copy entire header to stack buffer, not just basic one" }, + "CVE-2023-52489": { + "cmt_msg": "mm/sparsemem: fix race in accessing memory_section->usage" + }, "CVE-2021-28964": { "cmt_msg": "btrfs: fix race when cloning extent buffer during rewind of an old root" }, + "CVE-2021-47063": { + "cmt_msg": "drm: bridge/panel: Cleanup connector on bridge detach" + }, "CVE-2020-13974": { "cmt_msg": "vt: keyboard: avoid signed integer overflow in k_ascii" }, @@ -150917,6 +197736,9 @@ "CVE-2023-33288": { "cmt_msg": "power: supply: bq24190: Fix use after free bug in bq24190_remove due to race condition" }, + "CVE-2023-52484": { + "cmt_msg": "iommu/arm-smmu-v3: Fix soft lockup triggered by arm_smmu_mm_invalidate_range" + }, "CVE-2022-29900": { "cmt_msg": "x86/kvm/vmx: Make noinstr clean" }, @@ -150929,6 +197751,9 @@ "CVE-2020-10751": { "cmt_msg": "selinux: properly handle multiple messages in selinux_netlink_send()" }, + "CVE-2022-3567": { + "cmt_msg": "ipv6: Fix data races around sk->sk_prot." + }, "CVE-2023-39192": { "cmt_msg": "netfilter: xt_u32: validate user space input" }, @@ -150941,6 +197766,9 @@ "CVE-2023-35828": { "cmt_msg": "usb: gadget: udc: renesas_usb3: Fix use after free bug in renesas_usb3_remove due to race condition" }, + "CVE-2022-20166": { + "cmt_msg": "drivers core: Use sysfs_emit and sysfs_emit_at for show(device *...) functions" + }, "CVE-2020-8649": { "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region" }, @@ -150953,9 +197781,15 @@ "CVE-2021-28660": { "cmt_msg": "staging: rtl8188eu: prevent ->ssid overflow in rtw_wx_set_scan()" }, + "CVE-2024-26645": { + "cmt_msg": "tracing: Ensure visibility when inserting an element into tracing_map" + }, "CVE-2020-8647": { "cmt_msg": "vgacon: Fix a UAF in vgacon_invert_region" }, + "CVE-2022-3564": { + "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free caused by l2cap_reassemble_sdu" + }, "CVE-2022-23816": { "cmt_msg": "x86/kvm/vmx: Make noinstr clean" }, @@ -150965,11 +197799,23 @@ "CVE-2023-35827": { "cmt_msg": "ravb: Fix use-after-free issue in ravb_tx_timeout_work()" }, + "CVE-2023-52481": { + "cmt_msg": "arm64: errata: Add Cortex-A520 speculative unprivileged load workaround" + }, + "CVE-2023-52585": { + "cmt_msg": "drm/amdgpu: Fix possible NULL dereference in amdgpu_ras_query_error_status_helper()" + }, "CVE-2021-20239": { "cmt_msg": "net: pass a sockptr_t into ->setsockopt" }, - "CVE-2022-3567": { - "cmt_msg": "ipv6: Fix data races around sk->sk_prot." + "CVE-2023-52587": { + "cmt_msg": "IB/ipoib: Fix mcast list locking" + }, + "CVE-2023-52586": { + "cmt_msg": "drm/msm/dpu: Add mutex lock in control vblank irq" + }, + "CVE-2021-47149": { + "cmt_msg": "net: fujitsu: fix potential null-ptr-deref" }, "CVE-2022-3566": { "cmt_msg": "tcp: Fix data races around icsk->icsk_af_ops." @@ -150977,27 +197823,69 @@ "CVE-2022-3565": { "cmt_msg": "mISDN: fix use-after-free bugs in l1oip timer handlers" }, - "CVE-2022-3564": { - "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free caused by l2cap_reassemble_sdu" + "CVE-2021-47065": { + "cmt_msg": "rtw88: Fix array overrun in rtw_get_tx_power_params()" }, "CVE-2020-36386": { "cmt_msg": "Bluetooth: Fix slab-out-of-bounds read in hci_extended_inquiry_result_evt()" }, + "CVE-2021-47144": { + "cmt_msg": "drm/amd/amdgpu: fix refcount leak" + }, + "CVE-2021-47147": { + "cmt_msg": "ptp: ocp: Fix a resource leak in an error handling path" + }, "CVE-2020-36385": { "cmt_msg": "RDMA/ucma: Rework ucma_migrate_id() to avoid races with destroy" }, + "CVE-2021-47141": { + "cmt_msg": "gve: Add NULL pointer checks when freeing irqs." + }, + "CVE-2021-47140": { + "cmt_msg": "iommu/amd: Clear DMA ops when switching domain" + }, + "CVE-2021-47143": { + "cmt_msg": "net/smc: remove device from smcd_dev_list after failed device_add()" + }, + "CVE-2021-47142": { + "cmt_msg": "drm/amdgpu: Fix a use-after-free" + }, + "CVE-2021-46943": { + "cmt_msg": "media: staging/intel-ipu3: Fix set_fmt error handling" + }, + "CVE-2021-47145": { + "cmt_msg": "btrfs: do not BUG_ON in link_to_fixup_dir" + }, + "CVE-2021-46941": { + "cmt_msg": "usb: dwc3: core: Do core softreset when switch mode" + }, "CVE-2020-0009": { "cmt_msg": "staging: android: ashmem: Disallow ashmem memory from being remapped" }, "CVE-2023-52340": { "cmt_msg": "ipv6: remove max_size check inline with ipv4" }, + "CVE-2023-52589": { + "cmt_msg": "media: rkisp1: Fix IRQ disable race issue" + }, + "CVE-2023-52588": { + "cmt_msg": "f2fs: fix to tag gcing flag on page during block migration" + }, "CVE-2019-14615": { "cmt_msg": "drm/i915/gen9: Clear residual context state on context switch" }, "CVE-2022-2503": { "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag" }, + "CVE-2023-52578": { + "cmt_msg": "net: bridge: use DEV_STATS_INC()" + }, + "CVE-2021-47052": { + "cmt_msg": "crypto: sa2ul - Fix memory leak of rxd" + }, + "CVE-2023-52438": { + "cmt_msg": "binder: fix use-after-free in shinker's callback" + }, "CVE-2021-3635": { "cmt_msg": "netfilter: nf_tables: fix flowtable list del corruption" }, @@ -151019,6 +197907,9 @@ "CVE-2019-19037": { "cmt_msg": "ext4: fix ext4_empty_dir() for directories with holes" }, + "CVE-2024-26763": { + "cmt_msg": "dm-crypt: don't modify the data when using authenticated encryption" + }, "CVE-2021-34693": { "cmt_msg": "can: bcm: fix infoleak in struct bcm_msg_head" }, @@ -151034,18 +197925,39 @@ "CVE-2022-1419": { "cmt_msg": "drm/vgem: Close use-after-free race in vgem_gem_create" }, - "CVE-2022-1836": { - "cmt_msg": "floppy: disable FDRAWCMD by default" + "CVE-2021-47125": { + "cmt_msg": "sch_htb: fix refcount leak in htb_parent_to_leaf_offload" + }, + "CVE-2024-26797": { + "cmt_msg": "drm/amd/display: Prevent potential buffer overflow in map_hw_resources" + }, + "CVE-2024-26790": { + "cmt_msg": "dmaengine: fsl-qdma: fix SoC may hang on 16 byte unaligned read" + }, + "CVE-2021-46944": { + "cmt_msg": "media: staging/intel-ipu3: Fix memory leak in imu_fmt" }, "CVE-2020-11884": { "cmt_msg": "s390/mm: fix page table upgrade vs 2ndary address mode accesses" }, + "CVE-2024-26793": { + "cmt_msg": "gtp: fix use-after-free and null-ptr-deref in gtp_newlink()" + }, + "CVE-2023-52530": { + "cmt_msg": "wifi: mac80211: fix potential key use-after-free" + }, "CVE-2021-32078": { "cmt_msg": "ARM: footbridge: remove personal server platform" }, + "CVE-2023-52532": { + "cmt_msg": "net: mana: Fix TX CQE error handling" + }, "CVE-2022-30594": { "cmt_msg": "ptrace: Check PTRACE_O_SUSPEND_SECCOMP permission on PTRACE_SEIZE" }, + "CVE-2024-26798": { + "cmt_msg": "fbcon: always restore the old font data in fbcon_do_set_font()" + }, "CVE-2022-4662": { "cmt_msg": "USB: core: Prevent nested device-reset calls" }, @@ -151073,6 +197985,9 @@ "CVE-2021-38208": { "cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect" }, + "CVE-2024-26677": { + "cmt_msg": "rxrpc: Fix delayed ACKs to not set the reference serial number" + }, "CVE-2020-25211": { "cmt_msg": "netfilter: ctnetlink: add a range check for l3/l4 protonum" }, @@ -151085,9 +198000,18 @@ "CVE-2020-26557": { "cmt_msg": "" }, + "CVE-2024-26671": { + "cmt_msg": "blk-mq: fix IO hang from sbitmap wakeup race" + }, "CVE-2020-26555": { "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical" }, + "CVE-2024-26776": { + "cmt_msg": "spi: hisi-sfc-v3xx: Return IRQ_NONE if no interrupts were detected" + }, + "CVE-2024-26777": { + "cmt_msg": "fbdev: sis: Error out if pixclock equals zero" + }, "CVE-2019-20794": { "cmt_msg": "" }, @@ -151097,36 +198021,54 @@ "CVE-2023-3397": { "cmt_msg": "" }, + "CVE-2021-47082": { + "cmt_msg": "tun: avoid double free in tun_free_netdev" + }, + "CVE-2024-26679": { + "cmt_msg": "inet: read sk->sk_family once in inet_recv_error()" + }, + "CVE-2024-26771": { + "cmt_msg": "dmaengine: ti: edma: Add some null pointer checks to the edma_probe" + }, + "CVE-2023-52584": { + "cmt_msg": "spmi: mediatek: Fix UAF on device remove" + }, "CVE-2023-3117": { "cmt_msg": "netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE" }, + "CVE-2021-47128": { + "cmt_msg": "bpf, lockdown, audit: Fix buggy SELinux lockdown permission checks" + }, "CVE-2022-26365": { "cmt_msg": "xen/blkfront: fix leaking data in shared pages" }, "CVE-2023-52458": { "cmt_msg": "block: add check that partition length needs to be aligned with block size" }, - "CVE-2023-52457": { - "cmt_msg": "serial: 8250: omap: Don't skip resource freeing if pm_runtime_resume_and_get() failed" - }, "CVE-2018-1121": { "cmt_msg": "" }, "CVE-2023-52454": { "cmt_msg": "nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length" }, + "CVE-2023-28746": { + "cmt_msg": "x86/mmio: Disable KVM mitigation when X86_FEATURE_CLEAR_CPU_BUF is set" + }, "CVE-2023-52451": { "cmt_msg": "powerpc/pseries/memhp: Fix access beyond end of drmem array" }, "CVE-2019-19046": { "cmt_msg": "ipmi: Fix memory leak in __ipmi_bmc_register" }, - "CVE-2022-3061": { - "cmt_msg": "video: fbdev: i740fb: Error out if 'pixclock' equals zero" + "CVE-2021-47119": { + "cmt_msg": "ext4: fix memory leak in ext4_fill_super" }, "CVE-2019-19043": { "cmt_msg": "i40e: prevent memory leak in i40e_setup_macvlans" }, + "CVE-2024-26602": { + "cmt_msg": "sched/membarrier: reduce the ability to hammer on sys_membarrier" + }, "CVE-2024-1086": { "cmt_msg": "netfilter: nf_tables: reject QUEUE/DROP verdict parameters" }, @@ -151154,9 +198096,18 @@ "CVE-2020-27786": { "cmt_msg": "ALSA: rawmidi: Fix racy buffer resize under concurrent accesses" }, + "CVE-2024-26702": { + "cmt_msg": "iio: magnetometer: rm3100: add boundary check for the value read from RM3100_REG_TMRC" + }, "CVE-2023-6240": { "cmt_msg": "" }, + "CVE-2022-21123": { + "cmt_msg": "x86/speculation/mmio: Add mitigation for Processor MMIO Stale Data" + }, + "CVE-2024-26706": { + "cmt_msg": "parisc: Fix random data corruption from exception handler" + }, "CVE-2023-23559": { "cmt_msg": "wifi: rndis_wlan: Prevent buffer overflow in rndis_query_oid" }, @@ -151172,6 +198123,9 @@ "CVE-2023-32233": { "cmt_msg": "netfilter: nf_tables: deactivate anonymous set from preparation phase" }, + "CVE-2024-26685": { + "cmt_msg": "nilfs2: fix potential bug in end_buffer_async_write" + }, "CVE-2020-25672": { "cmt_msg": "nfc: fix memory leak in llcp_sock_connect()" }, @@ -151220,12 +198174,27 @@ "CVE-2022-1012": { "cmt_msg": "secure_seq: use the 64 bits of the siphash for port offset calculation" }, + "CVE-2023-52620": { + "cmt_msg": "netfilter: nf_tables: disallow timeout for anonymous sets" + }, "CVE-2022-38096": { "cmt_msg": "" }, + "CVE-2023-52622": { + "cmt_msg": "ext4: avoid online resizing failures due to oversized flex bg" + }, + "CVE-2023-52623": { + "cmt_msg": "SUNRPC: Fix a suspicious RCU usage warning" + }, + "CVE-2023-52624": { + "cmt_msg": "drm/amd/display: Wake DMCUB before executing GPINT commands" + }, "CVE-2023-3161": { "cmt_msg": "fbcon: Check font dimension limits" }, + "CVE-2023-52628": { + "cmt_msg": "netfilter: nftables: exthdr: fix 4-byte stack OOB write" + }, "CVE-2021-26934": { "cmt_msg": "" }, @@ -151280,18 +198249,42 @@ "CVE-2021-3178": { "cmt_msg": "nfsd4: readdirplus shouldn't return parent of export" }, + "CVE-2021-47101": { + "cmt_msg": "asix: fix uninit-value in asix_mdio_read()" + }, + "CVE-2021-47100": { + "cmt_msg": "ipmi: Fix UAF when uninstall ipmi_si and ipmi_msghandler module" + }, + "CVE-2021-46984": { + "cmt_msg": "kyber: fix out of bounds access when preempted" + }, + "CVE-2021-46982": { + "cmt_msg": "f2fs: compress: fix race condition of overwrite vs truncate" + }, + "CVE-2021-47109": { + "cmt_msg": "neighbour: allow NUD_NOARP entries to be forced GCed" + }, "CVE-2022-0330": { "cmt_msg": "drm/i915: Flush TLBs before releasing backing store" }, "CVE-2007-3719": { "cmt_msg": "" }, - "CVE-2023-3863": { - "cmt_msg": "net: nfc: Fix use-after-free caused by nfc_llcp_find_local" + "CVE-2021-46988": { + "cmt_msg": "userfaultfd: release page in error path to avoid BUG_ON" + }, + "CVE-2021-46989": { + "cmt_msg": "hfsplus: prevent corruption in shrinking truncate" + }, + "CVE-2024-26606": { + "cmt_msg": "binder: signal epoll threads of self-work" }, "CVE-2023-0590": { "cmt_msg": "net: sched: fix race condition in qdisc_graft()" }, + "CVE-2023-52583": { + "cmt_msg": "ceph: fix deadlock or deadcode of misusing dget()" + }, "CVE-2022-4095": { "cmt_msg": "staging: rtl8712: fix use after free bugs" }, @@ -151319,6 +198312,15 @@ "CVE-2021-3679": { "cmt_msg": "tracing: Fix bug in rb_per_cpu_empty() that might cause deadloop." }, + "CVE-2024-26656": { + "cmt_msg": "drm/amdgpu: fix use-after-free bug" + }, + "CVE-2024-26607": { + "cmt_msg": "drm/bridge: sii902x: Fix probing race issue" + }, + "CVE-2023-52517": { + "cmt_msg": "spi: sun6i: fix race between DMA RX transfer completion and RX FIFO drain" + }, "CVE-2022-2586": { "cmt_msg": "netfilter: nf_tables: do not allow SET_ID to refer to another table" }, @@ -151376,12 +198378,27 @@ "CVE-2023-1095": { "cmt_msg": "netfilter: nf_tables: fix null deref due to zeroed list head" }, + "CVE-2023-52574": { + "cmt_msg": "team: fix null-ptr-deref when team device type is changed" + }, + "CVE-2021-47034": { + "cmt_msg": "powerpc/64s: Fix pte update for kernel memory on radix" + }, "CVE-2022-3239": { "cmt_msg": "media: em28xx: initialize refcount before kref_get" }, "CVE-2022-4543": { "cmt_msg": "" }, + "CVE-2023-52571": { + "cmt_msg": "power: supply: rk817: Fix node refcount leak" + }, + "CVE-2023-52572": { + "cmt_msg": "cifs: Fix UAF in cifs_demultiplex_thread()" + }, + "CVE-2023-52573": { + "cmt_msg": "net: rds: Fix possible NULL-pointer dereference" + }, "CVE-2023-4921": { "cmt_msg": "net: sched: sch_qfq: Fix UAF in qfq_dequeue()" }, @@ -151394,6 +198411,9 @@ "CVE-2023-1829": { "cmt_msg": "net/sched: Retire tcindex classifier" }, + "CVE-2021-46915": { + "cmt_msg": "netfilter: nft_limit: avoid possible divide error in nft_limit_init" + }, "CVE-2023-1390": { "cmt_msg": "tipc: fix NULL deref in tipc_link_xmit()" }, @@ -151409,14 +198429,20 @@ "CVE-2020-24394": { "cmt_msg": "nfsd: apply umask on fs without ACL support" }, + "CVE-2024-26769": { + "cmt_msg": "nvmet-fc: avoid deadlock on delete association path" + }, "CVE-2022-20148": { "cmt_msg": "f2fs: fix UAF in f2fs_available_free_memory" }, "CVE-2019-18812": { "cmt_msg": "ASoC: SOF: Fix memory leak in sof_dfsentry_write" }, - "CVE-2022-42432": { - "cmt_msg": "netfilter: nfnetlink_osf: fix possible bogus match in nf_osf_find()" + "CVE-2024-26704": { + "cmt_msg": "ext4: fix double-free of blocks due to wrong extents moved_len" + }, + "CVE-2022-1786": { + "cmt_msg": "io_uring: remove io_identity" }, "CVE-2013-7445": { "cmt_msg": "" @@ -151427,15 +198453,27 @@ "CVE-2022-28390": { "cmt_msg": "can: ems_usb: ems_usb_start_xmit(): fix double dev_kfree_skb() in error path" }, + "CVE-2024-26736": { + "cmt_msg": "afs: Increase buffer size in afs_update_volume_status()" + }, "CVE-2024-26593": { "cmt_msg": "i2c: i801: Fix block process call transactions" }, + "CVE-2024-26738": { + "cmt_msg": "powerpc/pseries/iommu: DLPAR add doesn't completely initialize pci_controller" + }, + "CVE-2024-26739": { + "cmt_msg": "net/sched: act_mirred: don't override retval if we already lost the skb" + }, "CVE-2022-42719": { "cmt_msg": "wifi: mac80211: fix MBSSID parsing use-after-free" }, "CVE-2020-14386": { "cmt_msg": "net/packet: fix overflow in tpacket_rcv" }, + "CVE-2024-26804": { + "cmt_msg": "net: ip_tunnel: prevent perpetual headroom growth" + }, "CVE-2020-14385": { "cmt_msg": "xfs: fix boundary test in xfs_attr_shortform_verify" }, @@ -151481,6 +198519,9 @@ "CVE-2023-6932": { "cmt_msg": "ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet" }, + "CVE-2024-26801": { + "cmt_msg": "Bluetooth: Avoid potential use-after-free in hci_error_reset" + }, "CVE-2020-16166": { "cmt_msg": "random32: update the net random state on interrupt and activity" }, @@ -151493,9 +198534,18 @@ "CVE-2022-28388": { "cmt_msg": "can: usb_8dev: usb_8dev_start_xmit(): fix double dev_kfree_skb() in error path" }, + "CVE-2022-41218": { + "cmt_msg": "media: dvb-core: Fix UAF due to refcount races at releasing" + }, + "CVE-2024-26803": { + "cmt_msg": "net: veth: clear GRO when clearing XDP even when down" + }, "CVE-2023-52444": { "cmt_msg": "f2fs: fix to avoid dirent corruption" }, + "CVE-2024-26768": { + "cmt_msg": "LoongArch: Change acpi_core_pic[NR_CPUS] to acpi_core_pic[MAX_CORE_PIC]" + }, "CVE-2020-12362": { "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" }, @@ -151508,12 +198558,24 @@ "CVE-2020-12364": { "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" }, + "CVE-2024-26646": { + "cmt_msg": "thermal: intel: hfi: Add syscore callbacks for system-wide PM" + }, + "CVE-2024-26647": { + "cmt_msg": "drm/amd/display: Fix late derefrence 'dsc' check in 'link_set_dsc_pps_packet()'" + }, + "CVE-2024-26644": { + "cmt_msg": "btrfs: don't abort filesystem when attempting to snapshot deleted subvolume" + }, "CVE-2020-25639": { "cmt_msg": "drm/nouveau: bail out of nouveau_channel_new if channel init fails" }, "CVE-2023-33203": { "cmt_msg": "net: qcom/emac: Fix use after free bug in emac_remove due to race condition" }, + "CVE-2024-26640": { + "cmt_msg": "tcp: add sanity checks to rx zerocopy" + }, "CVE-2021-0605": { "cmt_msg": "af_key: pfkey_dump needs parameter validation" }, @@ -151541,6 +198603,12 @@ "CVE-2021-3894": { "cmt_msg": "sctp: account stream padding length for reconf chunk" }, + "CVE-2024-26641": { + "cmt_msg": "ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv()" + }, + "CVE-2022-1836": { + "cmt_msg": "floppy: disable FDRAWCMD by default" + }, "CVE-2019-18786": { "cmt_msg": "media: rcar_drif: fix a memory disclosure" }, @@ -151553,6 +198621,9 @@ "CVE-2019-20812": { "cmt_msg": "af_packet: set defaule value for tmo" }, + "CVE-2023-52600": { + "cmt_msg": "jfs: fix uaf in jfs_evict_inode" + }, "CVE-2020-14314": { "cmt_msg": "ext4: fix potential negative array index in do_split()" }, @@ -151568,15 +198639,33 @@ "CVE-2024-23848": { "cmt_msg": "" }, + "CVE-2023-52531": { + "cmt_msg": "wifi: iwlwifi: mvm: Fix a memory corruption issue" + }, + "CVE-2021-47159": { + "cmt_msg": "net: dsa: fix a crash if ->get_sset_count() fails" + }, "CVE-2022-0617": { "cmt_msg": "udf: Fix NULL ptr deref when converting from inline format" }, "CVE-2023-4459": { "cmt_msg": "net: vmxnet3: fix possible NULL pointer dereference in vmxnet3_rq_cleanup()" }, + "CVE-2024-26625": { + "cmt_msg": "llc: call sock_orphan() at release time" + }, + "CVE-2024-26635": { + "cmt_msg": "llc: Drop support for ETH_P_TR_802_2." + }, + "CVE-2023-52639": { + "cmt_msg": "KVM: s390: vsie: fix race during shadow creation" + }, "CVE-2022-2153": { "cmt_msg": "KVM: x86: Avoid theoretical NULL pointer dereference in kvm_irq_delivery_to_apic_fast()" }, + "CVE-2024-2193": { + "cmt_msg": "" + }, "CVE-2022-20566": { "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free caused by l2cap_chan_put" }, @@ -151589,8 +198678,8 @@ "CVE-2024-23851": { "cmt_msg": "dm: limit the number of targets and parameter size area" }, - "CVE-2024-23196": { - "cmt_msg": "" + "CVE-2022-20424": { + "cmt_msg": "io_uring: remove io_identity" }, "CVE-2020-12768": { "cmt_msg": "KVM: SVM: Fix potential memory leak in svm_cpu_init()" @@ -151598,6 +198687,12 @@ "CVE-2020-12769": { "cmt_msg": "spi: spi-dw: Add lock protect dw_spi rx/tx to prevent concurrent calls" }, + "CVE-2024-26765": { + "cmt_msg": "LoongArch: Disable IRQ before init_fn() for nonboot CPUs" + }, + "CVE-2023-52609": { + "cmt_msg": "binder: fix race between mmput() and do_exit()" + }, "CVE-2021-32399": { "cmt_msg": "bluetooth: eliminate the potential race condition when removing the HCI controller" }, @@ -151610,17 +198705,32 @@ "CVE-2021-28971": { "cmt_msg": "perf/x86/intel: Fix a crash caused by zero PEBS status" }, + "CVE-2023-52634": { + "cmt_msg": "drm/amd/display: Fix disable_otg_wa logic" + }, "CVE-2022-22942": { "cmt_msg": "drm/vmwgfx: Fix stale file descriptors on failed usercopy" }, "CVE-2021-3739": { "cmt_msg": "btrfs: fix NULL pointer dereference when deleting device by invalid id" }, - "CVE-2022-20166": { - "cmt_msg": "drivers core: Use sysfs_emit and sysfs_emit_at for show(device *...) functions" + "CVE-2020-36782": { + "cmt_msg": "i2c: imx-lpi2c: fix reference leak when pm_runtime_get_sync fails" }, - "CVE-2021-3732": { - "cmt_msg": "ovl: prevent private clone if bind mount is not allowed" + "CVE-2020-36783": { + "cmt_msg": "i2c: img-scb: fix reference leak when pm_runtime_get_sync fails" + }, + "CVE-2020-36780": { + "cmt_msg": "i2c: sprd: fix reference leak when pm_runtime_get_sync fails" + }, + "CVE-2020-36781": { + "cmt_msg": "i2c: imx: fix reference leak when pm_runtime_get_sync fails" + }, + "CVE-2020-36787": { + "cmt_msg": "media: aspeed: fix clock handling logic" + }, + "CVE-2020-36784": { + "cmt_msg": "i2c: cadence: fix reference leak when pm_runtime_get_sync fails" }, "CVE-2024-24860": { "cmt_msg": "Bluetooth: Fix atomicity violation in {min,max}_key_size_set" @@ -151631,8 +198741,14 @@ "CVE-2020-10767": { "cmt_msg": "x86/speculation: Avoid force-disabling IBPB based on STIBP and enhanced IBRS." }, + "CVE-2019-25162": { + "cmt_msg": "i2c: Fix a potential use after free" + }, "CVE-2024-24861": { - "cmt_msg": "" + "cmt_msg": "media: xc4000: Fix atomicity violation in xc4000_get_frequency" + }, + "CVE-2024-26627": { + "cmt_msg": "scsi: core: Move scsi_host_busy() out of host lock for waking up EH handler" }, "CVE-2020-13143": { "cmt_msg": "USB: gadget: fix illegal array access in binding with UDC" @@ -151649,9 +198765,15 @@ "CVE-2022-2978": { "cmt_msg": "fs: fix UAF/GPF bug in nilfs_mdt_destroy" }, + "CVE-2022-48626": { + "cmt_msg": "moxart: fix potential use-after-free on remove path" + }, "CVE-2022-3903": { "cmt_msg": "media: mceusb: Use new usb_control_msg_*() routines" }, + "CVE-2024-26642": { + "cmt_msg": "netfilter: nf_tables: disallow anonymous set with timeout flag" + }, "CVE-2022-3577": { "cmt_msg": "HID: bigben: fix slab-out-of-bounds Write in bigben_probe" }, @@ -151661,24 +198783,84 @@ "CVE-2020-10942": { "cmt_msg": "vhost: Check docket sk_family instead of call getname" }, + "CVE-2021-47071": { + "cmt_msg": "uio_hv_generic: Fix a memory leak in error handling paths" + }, + "CVE-2021-47070": { + "cmt_msg": "uio_hv_generic: Fix another memory leak in error handling paths" + }, + "CVE-2021-47073": { + "cmt_msg": "platform/x86: dell-smbios-wmi: Fix oops on rmmod dell_smbios" + }, "CVE-2022-44034": { "cmt_msg": "char: pcmcia: remove all the drivers" }, - "CVE-2022-44033": { - "cmt_msg": "char: pcmcia: remove all the drivers" + "CVE-2021-47075": { + "cmt_msg": "nvmet: fix memory leak in nvmet_alloc_ctrl()" }, - "CVE-2022-44032": { - "cmt_msg": "char: pcmcia: remove all the drivers" + "CVE-2021-47074": { + "cmt_msg": "nvme-loop: fix memory leak in nvme_loop_create_ctrl()" + }, + "CVE-2021-47077": { + "cmt_msg": "scsi: qedf: Add pointer checks in qedf_update_link_speed()" + }, + "CVE-2021-47076": { + "cmt_msg": "RDMA/rxe: Return CQE error if invalid lkey was supplied" + }, + "CVE-2021-47170": { + "cmt_msg": "USB: usbfs: Don't WARN about excessively large memory allocations" + }, + "CVE-2021-47078": { + "cmt_msg": "RDMA/rxe: Clear all QP fields if creation failed" + }, + "CVE-2021-47172": { + "cmt_msg": "iio: adc: ad7124: Fix potential overflow due to non sequential channel numbers" + }, + "CVE-2021-47173": { + "cmt_msg": "misc/uss720: fix memory leak in uss720_probe" + }, + "CVE-2022-36123": { + "cmt_msg": "x86: Clear .brk area at early boot" + }, + "CVE-2021-47175": { + "cmt_msg": "net/sched: fq_pie: fix OOB access in the traffic path" }, "CVE-2020-10781": { "cmt_msg": "Revert \"zram: convert remaining CLASS_ATTR() to CLASS_ATTR_RO()\"" }, + "CVE-2021-46951": { + "cmt_msg": "tpm: efi: Use local variable for calculating final log size" + }, + "CVE-2021-46950": { + "cmt_msg": "md/raid1: properly indicate failure when ending a failed write request" + }, + "CVE-2021-46953": { + "cmt_msg": "ACPI: GTDT: Don't corrupt interrupt mappings on watchdow probe failure" + }, + "CVE-2021-46952": { + "cmt_msg": "NFS: fs_context: validate UDP retrans to prevent shift out-of-bounds" + }, + "CVE-2021-46955": { + "cmt_msg": "openvswitch: fix stack OOB read while fragmenting IPv4 packets" + }, + "CVE-2023-52597": { + "cmt_msg": "KVM: s390: fix setting of fpc register" + }, + "CVE-2021-46959": { + "cmt_msg": "spi: Fix use-after-free with devm_spi_alloc_*" + }, "CVE-2020-26139": { "cmt_msg": "mac80211: do not accept/forward invalid EAPOL frames" }, + "CVE-2024-26772": { + "cmt_msg": "ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal()" + }, "CVE-2021-3609": { "cmt_msg": "can: bcm: delay release of struct bcm_op after synchronize_rcu()" }, + "CVE-2023-52595": { + "cmt_msg": "wifi: rt2x00: restart beacon queue when hardware reset" + }, "CVE-2021-3600": { "cmt_msg": "bpf: Fix 32 bit src register truncation on div/mod" }, @@ -151688,20 +198870,29 @@ "CVE-2021-23133": { "cmt_msg": "net/sctp: fix race condition in sctp_destroy_sock" }, + "CVE-2022-2327": { + "cmt_msg": "io_uring: remove any grabbing of context" + }, "CVE-2022-33981": { "cmt_msg": "floppy: disable FDRAWCMD by default" }, "CVE-2021-0929": { "cmt_msg": "staging/android/ion: delete dma_buf->kmap/unmap implemenation" }, + "CVE-2023-52590": { + "cmt_msg": "ocfs2: Avoid touching renamed directory if parent does not change" + }, + "CVE-2024-26676": { + "cmt_msg": "af_unix: Call kfree_skb() for dead unix_(sk)->oob_skb in GC." + }, "CVE-2021-0920": { "cmt_msg": "af_unix: fix garbage collect vs MSG_PEEK" }, "CVE-2022-0168": { "cmt_msg": "cifs: fix NULL ptr dereference in smb2_ioctl_query_info()" }, - "CVE-2024-26587": { - "cmt_msg": "net: netdevsim: don't try to destroy PHC on VFs" + "CVE-2024-26622": { + "cmt_msg": "tomoyo: fix UAF write bug in tomoyo_write_control()" }, "CVE-2023-51043": { "cmt_msg": "drm/atomic: Fix potential use-after-free in nonblocking commits" @@ -151712,6 +198903,9 @@ "CVE-2023-0615": { "cmt_msg": "media: vivid: dev->bitmap_cap wasn't freed in all cases" }, + "CVE-2024-26672": { + "cmt_msg": "drm/amdgpu: Fix variable 'mca_funcs' dereferenced before NULL check in 'amdgpu_mca_smu_get_mca_entry()'" + }, "CVE-2019-14896": { "cmt_msg": "libertas: Fix two buffer overflows at parsing bss descriptor" }, @@ -151721,14 +198915,26 @@ "CVE-2019-14895": { "cmt_msg": "mwifiex: fix possible heap overflow in mwifiex_process_country_ie()" }, + "CVE-2024-26787": { + "cmt_msg": "mmc: mmci: stm32: fix DMA API overlapping mappings warning" + }, + "CVE-2023-52522": { + "cmt_msg": "net: fix possible store tearing in neigh_periodic_work()" + }, "CVE-2022-3586": { "cmt_msg": "sch_sfb: Don't assume the skb is still around after enqueueing to child" }, + "CVE-2024-26636": { + "cmt_msg": "llc: make llc_ui_sendmsg() more robust against bonding changes" + }, + "CVE-2024-26779": { + "cmt_msg": "wifi: mac80211: fix race condition on enabling fast-xmit" + }, "CVE-2024-26586": { "cmt_msg": "mlxsw: spectrum_acl_tcam: Fix stack corruption" }, - "CVE-2024-0646": { - "cmt_msg": "net: tls, update curr on splice as well" + "CVE-2023-52528": { + "cmt_msg": "net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg" }, "CVE-2020-27825": { "cmt_msg": "tracing: Fix race in trace_open and buffer resize call" @@ -151745,6 +198951,9 @@ "CVE-2020-0067": { "cmt_msg": "f2fs: fix to avoid memory leakage in f2fs_listxattr" }, + "CVE-2021-47151": { + "cmt_msg": "interconnect: qcom: bcm-voter: add a missing of_node_put()" + }, "CVE-2023-4622": { "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES" }, @@ -151763,6 +198972,9 @@ "CVE-2023-6610": { "cmt_msg": "smb: client: fix potential OOB in smb2_dump_detail()" }, + "CVE-2024-26600": { + "cmt_msg": "phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP" + }, "CVE-2023-3390": { "cmt_msg": "netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE" }, @@ -151778,6 +198990,15 @@ "CVE-2021-33061": { "cmt_msg": "ixgbe: add improvement for MDD response functionality" }, + "CVE-2024-26764": { + "cmt_msg": "fs/aio: Restrict kiocb_set_cancel_fn() to I/O submitted via libaio" + }, + "CVE-2024-26767": { + "cmt_msg": "drm/amd/display: fixed integer types and null check locations" + }, + "CVE-2024-26766": { + "cmt_msg": "IB/hfi1: Fix sdma.h tx->num_descs off-by-one error" + }, "CVE-2024-26589": { "cmt_msg": "bpf: Reject variable offset alu on PTR_TO_FLOW_KEYS" }, @@ -151787,9 +199008,18 @@ "CVE-2023-1476": { "cmt_msg": "" }, + "CVE-2023-4010": { + "cmt_msg": "" + }, "CVE-2021-3864": { "cmt_msg": "" }, + "CVE-2024-26770": { + "cmt_msg": "HID: nvidia-shield: Add missing null pointer checks to LED initialization" + }, + "CVE-2024-23307": { + "cmt_msg": "md/raid5: fix atomicity violation in raid5_cache_count" + }, "CVE-2022-1652": { "cmt_msg": "floppy: use a statically allocated error counter" }, @@ -151838,6 +199068,9 @@ "CVE-2020-0423": { "cmt_msg": "binder: fix UAF when releasing todo list" }, + "CVE-2022-23222": { + "cmt_msg": "bpf: Replace PTR_TO_XXX_OR_NULL with PTR_TO_XXX | PTR_MAYBE_NULL" + }, "CVE-2022-1789": { "cmt_msg": "KVM: x86/mmu: fix NULL pointer dereference on guest INVPCID" }, @@ -151845,11 +199078,14 @@ "cmt_msg": "" }, "CVE-2023-6270": { - "cmt_msg": "" + "cmt_msg": "aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts" }, "CVE-2023-3090": { "cmt_msg": "ipvlan:Fix out-of-bounds caused by unclear skb->cb" }, + "CVE-2022-20422": { + "cmt_msg": "arm64: fix oops in concurrently setting insn_emulation sysctls" + }, "CVE-2023-3772": { "cmt_msg": "xfrm: add NULL check in xfrm_update_ae_params" }, @@ -151862,11 +199098,11 @@ "CVE-2023-1582": { "cmt_msg": "fs/proc: task_mmu.c: don't read mapcount for migration entry" }, - "CVE-2022-1786": { - "cmt_msg": "io_uring: remove io_identity" + "CVE-2021-47162": { + "cmt_msg": "tipc: skb_linearize the head skb when reassembling msgs" }, - "CVE-2022-23222": { - "cmt_msg": "bpf: Replace PTR_TO_XXX_OR_NULL with PTR_TO_XXX | PTR_MAYBE_NULL" + "CVE-2022-21166": { + "cmt_msg": "x86/speculation/mmio: Enable CPU Fill buffer clearing on idle" }, "CVE-2020-25669": { "cmt_msg": "Input: sunkbd - avoid use-after-free in teardown paths" @@ -151880,6 +199116,9 @@ "CVE-2020-25705": { "cmt_msg": "icmp: randomize the global rate limiter" }, + "CVE-2022-20421": { + "cmt_msg": "binder: fix UAF of ref->proc caused by race condition" + }, "CVE-2022-0435": { "cmt_msg": "tipc: improve size validations for received domain records" }, @@ -151890,7 +199129,13 @@ "cmt_msg": "can: kvaser_usb: kvaser_usb_leaf: Fix some info-leaks to USB devices" }, "CVE-2023-6356": { - "cmt_msg": "" + "cmt_msg": "nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length" + }, + "CVE-2024-26744": { + "cmt_msg": "RDMA/srpt: Support specifying the srpt_service_guid parameter" + }, + "CVE-2024-26648": { + "cmt_msg": "drm/amd/display: Fix variable deferencing before NULL check in edp_setup_replay()" }, "CVE-2021-4135": { "cmt_msg": "netdevsim: Zero-initialize memory for new map's value in function nsim_bpf_map_alloc" @@ -151898,12 +199143,27 @@ "CVE-2023-26607": { "cmt_msg": "ntfs: fix out-of-bounds read in ntfs_attr_find()" }, - "CVE-2023-52456": { - "cmt_msg": "serial: imx: fix tx statemachine deadlock" + "CVE-2023-52513": { + "cmt_msg": "RDMA/siw: Fix connection failure handling" }, "CVE-2019-15239": { "cmt_msg": "unknown" }, + "CVE-2022-3534": { + "cmt_msg": "libbpf: Fix use-after-free in btf_dump_name_dups" + }, + "CVE-2023-52635": { + "cmt_msg": "PM / devfreq: Synchronize devfreq_monitor_[start/stop]" + }, + "CVE-2023-52469": { + "cmt_msg": "drivers/amd/pm: fix a use-after-free in kv_parse_power_table" + }, + "CVE-2023-52594": { + "cmt_msg": "wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus()" + }, + "CVE-2023-52632": { + "cmt_msg": "drm/amdkfd: Fix lock dependency warning with srcu" + }, "CVE-2021-4037": { "cmt_msg": "xfs: fix up non-directory creation in SGID directories" }, @@ -151919,12 +199179,27 @@ "CVE-2023-20941": { "cmt_msg": "" }, + "CVE-2024-26773": { + "cmt_msg": "ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found()" + }, + "CVE-2023-2194": { + "cmt_msg": "i2c: xgene-slimpro: Fix out-of-bounds bug in xgene_slimpro_i2c_xfer()" + }, + "CVE-2024-26740": { + "cmt_msg": "net/sched: act_mirred: use the backlog for mirred ingress" + }, "CVE-2021-3347": { "cmt_msg": "futex: Ensure the correct return value from futex_lock_pi()" }, "CVE-2020-10135": { "cmt_msg": "Bluetooth: Consolidate encryption handling in hci_encrypt_cfm" }, + "CVE-2021-47169": { + "cmt_msg": "serial: rp2: use 'request_firmware' instead of 'request_firmware_nowait'" + }, + "CVE-2024-26784": { + "cmt_msg": "pmdomain: arm: Fix NULL dereference on scmi_perf_domain removal" + }, "CVE-2022-1966": { "cmt_msg": "netfilter: nf_tables: disallow non-stateful expression in sets earlier" }, @@ -151937,26 +199212,50 @@ "CVE-2022-3533": { "cmt_msg": "" }, - "CVE-2022-3534": { - "cmt_msg": "libbpf: Fix use-after-free in btf_dump_name_dups" + "CVE-2021-47138": { + "cmt_msg": "cxgb4: avoid accessing registers when clearing filters" }, "CVE-2022-3535": { "cmt_msg": "net: mvpp2: fix mvpp2 debugfs leak" }, + "CVE-2021-47135": { + "cmt_msg": "mt76: mt7921: fix possible AOOB issue in mt7921_mcu_tx_rate_report" + }, + "CVE-2021-47136": { + "cmt_msg": "net: zero-initialize tc skb extension on allocation" + }, + "CVE-2021-47137": { + "cmt_msg": "net: lantiq: fix memory corruption in RX ring" + }, + "CVE-2024-26808": { + "cmt_msg": "netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain" + }, + "CVE-2021-47131": { + "cmt_msg": "net/tls: Fix use-after-free after the TLS device goes down and up" + }, "CVE-2020-36766": { "cmt_msg": "cec-api: prevent leaking memory through hole in structure" }, + "CVE-2021-47133": { + "cmt_msg": "HID: amd_sfh: Fix memory leak in amd_sfh_work" + }, "CVE-2022-2977": { "cmt_msg": "tpm: fix reference counting for struct tpm_chip" }, - "CVE-2023-28328": { - "cmt_msg": "media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer()" + "CVE-2024-26675": { + "cmt_msg": "ppp_async: limit MRU to 64K" }, - "CVE-2022-0322": { - "cmt_msg": "sctp: account stream padding length for reconf chunk" + "CVE-2022-3061": { + "cmt_msg": "video: fbdev: i740fb: Error out if 'pixclock' equals zero" }, - "CVE-2023-0386": { - "cmt_msg": "ovl: fail on invalid uid/gid mapping at copy up" + "CVE-2021-46991": { + "cmt_msg": "i40e: Fix use-after-free in i40e_client_subtask()" + }, + "CVE-2021-46993": { + "cmt_msg": "sched: Fix out-of-bound access in uclamp" + }, + "CVE-2021-46992": { + "cmt_msg": "netfilter: nftables: avoid overflows in nft_hash_buckets()" }, "CVE-2023-6121": { "cmt_msg": "nvmet: nul-terminate the NQNs passed in the connect command" @@ -151964,6 +199263,12 @@ "CVE-2023-28327": { "cmt_msg": "af_unix: Get user_ns from in_skb in unix_diag_get_exact()." }, + "CVE-2023-52638": { + "cmt_msg": "can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock" + }, + "CVE-2021-46998": { + "cmt_msg": "ethernet:enic: Fix a use after free bug in enic_hard_start_xmit" + }, "CVE-2017-13693": { "cmt_msg": "" }, @@ -151997,11 +199302,23 @@ "CVE-2021-3760": { "cmt_msg": "nfc: nci: fix the UAF of rf_conn_info object" }, + "CVE-2022-48627": { + "cmt_msg": "vt: fix memory overlapping when deleting chars in the buffer" + }, + "CVE-2023-52593": { + "cmt_msg": "wifi: wfx: fix possible NULL pointer dereference in wfx_set_mfp_ap()" + }, "CVE-2022-4382": { "cmt_msg": "USB: gadgetfs: Fix race between mounting and unmounting" }, - "CVE-2022-36123": { - "cmt_msg": "x86: Clear .brk area at early boot" + "CVE-2021-47180": { + "cmt_msg": "NFC: nci: fix memory leak in nci_allocate_device" + }, + "CVE-2022-48628": { + "cmt_msg": "ceph: drop messages from MDS when unmounting" + }, + "CVE-2022-48629": { + "cmt_msg": "crypto: qcom-rng - ensure buffer for generate is completely filled" }, "CVE-2020-11608": { "cmt_msg": "media: ov519: add missing endpoint sanity checks" @@ -152015,8 +199332,8 @@ "CVE-2024-24859": { "cmt_msg": "" }, - "CVE-2024-24858": { - "cmt_msg": "" + "CVE-2022-0322": { + "cmt_msg": "sctp: account stream padding length for reconf chunk" }, "CVE-2024-24855": { "cmt_msg": "scsi: lpfc: Fix a possible data race in lpfc_unregister_fcf_rescan()" @@ -152024,12 +199341,18 @@ "CVE-2024-24857": { "cmt_msg": "" }, + "CVE-2023-0386": { + "cmt_msg": "ovl: fail on invalid uid/gid mapping at copy up" + }, "CVE-2021-29264": { "cmt_msg": "gianfar: fix jumbo packets+napi+rx overrun crash" }, "CVE-2021-29265": { "cmt_msg": "usbip: fix stub_dev usbip_sockfd_store() races leading to gpf" }, + "CVE-2024-26673": { + "cmt_msg": "netfilter: nft_ct: sanitize layer 3 and 4 protocol number in custom expectations" + }, "CVE-2021-39648": { "cmt_msg": "usb: gadget: configfs: Fix use-after-free issue with udc_name" }, @@ -152039,30 +199362,60 @@ "CVE-2021-43056": { "cmt_msg": "KVM: PPC: Book3S HV: Make idle_kvm_start_guest() return 0 if it went to guest" }, + "CVE-2023-52569": { + "cmt_msg": "btrfs: remove BUG() after failure to insert delayed dir index item" + }, + "CVE-2023-52568": { + "cmt_msg": "x86/sgx: Resolves SECS reclaim vs. page fault for EAUG race" + }, "CVE-2020-14416": { "cmt_msg": "can, slip: Protect tty->disc_data in write_wakeup and close with RCU" }, "CVE-2022-3542": { "cmt_msg": "bnx2x: fix potential memory leak in bnx2x_tpa_stop()" }, + "CVE-2023-52563": { + "cmt_msg": "drm/meson: fix memory leak on ->hpd_notify callback" + }, + "CVE-2023-52561": { + "cmt_msg": "arm64: dts: qcom: sdm845-db845c: Mark cont splash memory region as reserved" + }, "CVE-2020-28588": { "cmt_msg": "lib/syscall: fix syscall registers retrieval on 32-bit platforms" }, + "CVE-2021-47004": { + "cmt_msg": "f2fs: fix to avoid touching checkpointed data in get_victim()" + }, + "CVE-2021-47005": { + "cmt_msg": "PCI: endpoint: Fix NULL pointer dereference for ->get_features()" + }, "CVE-2021-21781": { "cmt_msg": "ARM: ensure the signal page contains defined contents" }, "CVE-2021-0512": { "cmt_msg": "HID: make arrays usage and value to be the same" }, + "CVE-2021-46929": { + "cmt_msg": "sctp: use call_rcu to free endpoint" + }, "CVE-2023-1382": { "cmt_msg": "tipc: set con sock in tipc_conn_alloc" }, - "CVE-2022-3707": { - "cmt_msg": "drm/i915/gvt: fix double free bug in split_2MB_gtt_entry" + "CVE-2021-46921": { + "cmt_msg": "locking/qrwlock: Fix ordering in queued_write_lock_slowpath()" }, "CVE-2023-1380": { "cmt_msg": "wifi: brcmfmac: slab-out-of-bounds read in brcmf_get_assoc_ies()" }, + "CVE-2021-46924": { + "cmt_msg": "NFC: st21nfca: Fix memory leak in device probe and remove" + }, + "CVE-2021-46925": { + "cmt_msg": "net/smc: fix kernel panic caused by race of smc_sock" + }, + "CVE-2021-46926": { + "cmt_msg": "ALSA: hda: intel-sdw-acpi: harden detection of controller" + }, "CVE-2020-0347": { "cmt_msg": "" }, @@ -152072,6 +199425,9 @@ "CVE-2019-18808": { "cmt_msg": "crypto: ccp - Release all allocated memory if sha type is invalid" }, + "CVE-2023-52591": { + "cmt_msg": "reiserfs: Avoid touching renamed directory if parent does not change" + }, "CVE-2022-41222": { "cmt_msg": "mm/mremap: hold the rmap lock in write mode when moving page table entries." }, @@ -152081,6 +199437,9 @@ "CVE-2021-33909": { "cmt_msg": "seq_file: disallow extremely large seq buffer allocations" }, + "CVE-2021-47129": { + "cmt_msg": "netfilter: nft_ct: skip expectations for confirmed conntrack" + }, "CVE-2023-23000": { "cmt_msg": "phy: tegra: xusb: Fix return value of tegra_xusb_find_port_node function" }, @@ -152099,12 +199458,18 @@ "CVE-2021-33656": { "cmt_msg": "vt: drop old FONT ioctls" }, + "CVE-2024-26720": { + "cmt_msg": "mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again" + }, "CVE-2021-33655": { "cmt_msg": "fbcon: Disallow setting font bigger than screen size" }, "CVE-2022-41858": { "cmt_msg": "drivers: net: slip: fix NPD bug in sl_tx_timeout()" }, + "CVE-2024-26726": { + "cmt_msg": "btrfs: don't drop extent_map for free space inode on write error" + }, "CVE-2022-3176": { "cmt_msg": "io_uring: fix UAF due to missing POLLFREE handling" }, @@ -152117,6 +199482,9 @@ "CVE-2022-41850": { "cmt_msg": "HID: roccat: Fix use-after-free in roccat_read()" }, + "CVE-2023-52474": { + "cmt_msg": "IB/hfi1: Fix bugs with non-PAGE_SIZE-end multi-iovec user SDMA requests" + }, "CVE-2023-2985": { "cmt_msg": "fs: hfsplus: fix UAF issue in hfsplus_put_super" }, @@ -152147,24 +199515,36 @@ "CVE-2024-0584": { "cmt_msg": "ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet" }, + "CVE-2024-26700": { + "cmt_msg": "drm/amd/display: Fix MST Null Ptr for RV" + }, "CVE-2020-0465": { "cmt_msg": "HID: core: Sanitize event code and type when mapping input" }, "CVE-2021-1048": { "cmt_msg": "fix regression in \"epoll: Keep a reference on files added to the check list\"" }, + "CVE-2023-52516": { + "cmt_msg": "dma-debug: don't call __dma_entry_alloc_check_leak() under free_entries_lock" + }, "CVE-2021-4218": { "cmt_msg": "sysctl: pass kernel pointers to ->proc_handler" }, + "CVE-2022-3707": { + "cmt_msg": "drm/i915/gvt: fix double free bug in split_2MB_gtt_entry" + }, "CVE-2020-0543": { "cmt_msg": "x86/cpu: Add 'table' argument to cpu_matches()" }, - "CVE-2024-25739": { - "cmt_msg": "" + "CVE-2023-52510": { + "cmt_msg": "ieee802154: ca8210: Fix a potential UAF in ca8210_probe" }, "CVE-2020-8992": { "cmt_msg": "ext4: add cond_resched() to ext4_protect_reserved_inode" }, + "CVE-2023-52633": { + "cmt_msg": "um: time-travel: fix time corruption" + }, "CVE-2024-0340": { "cmt_msg": "vhost: use kzalloc() instead of kmalloc() followed by memset()" }, @@ -152172,7 +199552,7 @@ "cmt_msg": "" }, "CVE-2023-6536": { - "cmt_msg": "" + "cmt_msg": "nvmet-tcp: fix a crash in nvmet_req_complete()" }, "CVE-2021-33624": { "cmt_msg": "bpf: Inherit expanded/patched seen count from old aux data" @@ -152198,18 +199578,33 @@ "CVE-2024-1151": { "cmt_msg": "net: openvswitch: limit the number of recursions from action sets" }, + "CVE-2024-26659": { + "cmt_msg": "xhci: handle isoc Babble and Buffer Overrun events properly" + }, + "CVE-2024-26658": { + "cmt_msg": "bcachefs: grab s_umount only if snapshotting" + }, "CVE-2010-5321": { "cmt_msg": "" }, "CVE-2021-20322": { "cmt_msg": "ipv6: make exception cache less predictible" }, + "CVE-2024-26654": { + "cmt_msg": "ALSA: sh: aica: reorder cleanup operations to avoid UAF bugs" + }, "CVE-2021-20320": { "cmt_msg": "s390/bpf: Fix optimizing out zero-extensions" }, "CVE-2021-20321": { "cmt_msg": "ovl: fix missing negative dentry check in ovl_rename()" }, + "CVE-2024-26651": { + "cmt_msg": "sr9800: Add check for usbnet_get_endpoints" + }, + "CVE-2024-26650": { + "cmt_msg": "platform/x86: p2sb: Allow p2sb_bar() calls during PCI device probe" + }, "CVE-2022-26490": { "cmt_msg": "nfc: st21nfca: Fix potential buffer overflows in EVT_TRANSACTION" }, @@ -152228,15 +199623,36 @@ "CVE-2022-1048": { "cmt_msg": "ALSA: pcm: Fix races among concurrent hw_params and hw_free calls" }, + "CVE-2024-26696": { + "cmt_msg": "nilfs2: fix hang in nilfs_lookup_dirty_data_buffers()" + }, + "CVE-2023-52475": { + "cmt_msg": "Input: powermate - fix use-after-free in powermate_config_complete" + }, "CVE-2021-0342": { "cmt_msg": "tun: correct header offsets in napi frags mode" }, + "CVE-2023-52477": { + "cmt_msg": "usb: hub: Guard against accesses to uninitialized BOS descriptors" + }, + "CVE-2023-52476": { + "cmt_msg": "perf/x86/lbr: Filter vsyscall addresses" + }, "CVE-2023-22995": { "cmt_msg": "usb: dwc3: dwc3-qcom: Add missing platform_device_put() in dwc3_qcom_acpi_register_core" }, + "CVE-2023-52470": { + "cmt_msg": "drm/radeon: check the alloc_workqueue return value in radeon_crtc_init()" + }, "CVE-2024-21803": { "cmt_msg": "" }, + "CVE-2023-52479": { + "cmt_msg": "ksmbd: fix uaf in smb20_oplock_break_ack" + }, + "CVE-2023-52478": { + "cmt_msg": "HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect" + }, "CVE-2021-3542": { "cmt_msg": "" }, @@ -152246,6 +199662,9 @@ "CVE-2020-12659": { "cmt_msg": "xsk: Add missing check on user supplied headroom size" }, + "CVE-2024-22099": { + "cmt_msg": "Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security" + }, "CVE-2023-30456": { "cmt_msg": "KVM: nVMX: add missing consistency checks for CR0 and CR4" }, @@ -152273,6 +199692,9 @@ "CVE-2018-12928": { "cmt_msg": "" }, + "CVE-2023-52511": { + "cmt_msg": "spi: sun6i: reduce DMA RX transfer width to single byte" + }, "CVE-2020-36311": { "cmt_msg": "KVM: SVM: Periodically schedule when unregistering regions on destroy" }, @@ -152303,6 +199725,12 @@ "CVE-2024-25741": { "cmt_msg": "" }, + "CVE-2024-26778": { + "cmt_msg": "fbdev: savage: Error out if pixclock equals zero" + }, + "CVE-2024-26809": { + "cmt_msg": "netfilter: nft_set_pipapo: release elements in clone only from destroy path" + }, "CVE-2022-26966": { "cmt_msg": "sr9700: sanity check for packet length" }, @@ -152312,15 +199740,42 @@ "CVE-2023-1989": { "cmt_msg": "Bluetooth: btsdio: fix use after free bug in btsdio_remove due to unfinished work" }, + "CVE-2024-26806": { + "cmt_msg": "spi: cadence-qspi: remove system-wide suspend helper calls from runtime PM hooks" + }, "CVE-2020-12771": { "cmt_msg": "bcache: fix potential deadlock problem in btree_gc_coalesce" }, "CVE-2020-12770": { "cmt_msg": "scsi: sg: add sg_remove_request in sg_write" }, + "CVE-2024-26802": { + "cmt_msg": "stmmac: Clear variable when destroying workqueue" + }, + "CVE-2023-52508": { + "cmt_msg": "nvme-fc: Prevent null pointer dereference in nvme_fc_io_getuuid()" + }, + "CVE-2023-52606": { + "cmt_msg": "powerpc/lib: Validate size for vector operations" + }, + "CVE-2023-52607": { + "cmt_msg": "powerpc/mm: Fix null-pointer dereference in pgtable_cache_add" + }, + "CVE-2023-52604": { + "cmt_msg": "FS:JFS:UBSAN:array-index-out-of-bounds in dbAdjTree" + }, + "CVE-2023-52602": { + "cmt_msg": "jfs: fix slab-out-of-bounds Read in dtSearch" + }, + "CVE-2023-52603": { + "cmt_msg": "UBSAN: array-index-out-of-bounds in dtSplitRoot" + }, "CVE-2022-25265": { "cmt_msg": "" }, + "CVE-2023-52601": { + "cmt_msg": "jfs: fix array-index-out-of-bounds in dbAdjTree" + }, "CVE-2020-10732": { "cmt_msg": "fs/binfmt_elf.c: allocate initialized memory in fill_thread_core_info()" }, @@ -152351,42 +199806,84 @@ "CVE-2023-0160": { "cmt_msg": "bpf, sockmap: fix deadlocks in the sockhash and sockmap" }, + "CVE-2023-52506": { + "cmt_msg": "LoongArch: Set all reserved memblocks on Node#0 at initialization" + }, "CVE-2022-2663": { "cmt_msg": "netfilter: nf_conntrack_irc: Fix forged IP logic" }, + "CVE-2021-47049": { + "cmt_msg": "Drivers: hv: vmbus: Use after free in __vmbus_open()" + }, "CVE-2022-43750": { "cmt_msg": "usb: mon: make mmapped memory read only" }, "CVE-2023-0047": { "cmt_msg": "mm, oom: do not trigger out_of_memory from the #PF" }, + "CVE-2021-47046": { + "cmt_msg": "drm/amd/display: Fix off by one in hdmi_14_process_transaction()" + }, "CVE-2023-0045": { "cmt_msg": "x86/bugs: Flush IBP in ib_prctl_set()" }, - "CVE-2023-4010": { - "cmt_msg": "" + "CVE-2021-47041": { + "cmt_msg": "nvmet-tcp: fix incorrect locking in state_change sk callback" }, - "CVE-2022-38457": { - "cmt_msg": "drm/vmwgfx: Remove rcu locks from user resources" + "CVE-2021-3732": { + "cmt_msg": "ovl: prevent private clone if bind mount is not allowed" }, - "CVE-2022-20424": { - "cmt_msg": "io_uring: remove io_identity" + "CVE-2021-47167": { + "cmt_msg": "NFS: Fix an Oopsable condition in __nfs_pageio_add_request()" }, - "CVE-2022-20422": { - "cmt_msg": "arm64: fix oops in concurrently setting insn_emulation sysctls" + "CVE-2021-47166": { + "cmt_msg": "NFS: Don't corrupt the value of pg_bytes_written in nfs_do_recoalesce()" }, - "CVE-2022-20421": { - "cmt_msg": "binder: fix UAF of ref->proc caused by race condition" + "CVE-2021-47165": { + "cmt_msg": "drm/meson: fix shutdown crash when component not probed" + }, + "CVE-2021-47163": { + "cmt_msg": "tipc: wait and exit until all work queues are done" + }, + "CVE-2021-46969": { + "cmt_msg": "bus: mhi: core: Fix invalid error returning in mhi_queue" + }, + "CVE-2021-47161": { + "cmt_msg": "spi: spi-fsl-dspi: Fix a resource leak in an error handling path" + }, + "CVE-2021-47160": { + "cmt_msg": "net: dsa: mt7530: fix VLAN traffic leaks" }, "CVE-2023-4385": { "cmt_msg": "fs: jfs: fix possible NULL pointer dereference in dbFree()" }, + "CVE-2021-46965": { + "cmt_msg": "mtd: physmap: physmap-bt1-rom: Fix unintentional stack access" + }, "CVE-2023-4387": { "cmt_msg": "net: vmxnet3: fix possible use-after-free bugs in vmxnet3_rq_alloc_rx_buf()" }, + "CVE-2021-46960": { + "cmt_msg": "cifs: Return correct error code from smb2_get_enc_key" + }, + "CVE-2021-46961": { + "cmt_msg": "irqchip/gic-v3: Do not enable irqs when handling spurious interrups" + }, + "CVE-2021-46962": { + "cmt_msg": "mmc: uniphier-sd: Fix a resource leak in the remove function" + }, + "CVE-2021-47168": { + "cmt_msg": "NFS: fix an incorrect limit in filelayout_decode_layout()" + }, "CVE-2019-19378": { "cmt_msg": "" }, + "CVE-2023-52482": { + "cmt_msg": "x86/srso: Add SRSO mitigation for Hygon processors" + }, + "CVE-2023-52599": { + "cmt_msg": "jfs: fix array-index-out-of-bounds in diNewExt" + }, "CVE-2020-4788": { "cmt_msg": "powerpc/64s: flush L1D on kernel entry" }, @@ -152447,9 +199944,15 @@ "CVE-2021-0937": { "cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write" }, + "CVE-2023-52621": { + "cmt_msg": "bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers" + }, "CVE-2022-1263": { "cmt_msg": "KVM: avoid NULL pointer dereference in kvm_dirty_ring_push" }, + "CVE-2023-52610": { + "cmt_msg": "net/sched: act_ct: fix skb leak and crash on ooo frags" + }, "CVE-2021-35477": { "cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4" }, @@ -152471,8 +199974,14 @@ "CVE-2021-37576": { "cmt_msg": "KVM: PPC: Book3S: Fix H_RTAS rets buffer overflow" }, + "CVE-2023-52625": { + "cmt_msg": "drm/amd/display: Refactor DMCUB enter/exit idle interface" + }, + "CVE-2024-26775": { + "cmt_msg": "aoe: avoid potential deadlock at set_capacity" + }, "CVE-2023-7042": { - "cmt_msg": "" + "cmt_msg": "wifi: ath10k: fix NULL pointer dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev()" }, "CVE-2022-3594": { "cmt_msg": "r8152: Rate limit overflow messages" @@ -152483,12 +199992,18 @@ "CVE-2023-0240": { "cmt_msg": "io_uring: COW io_identity on mismatch" }, + "CVE-2023-52559": { + "cmt_msg": "iommu/vt-d: Avoid memory allocation in iommu_suspend()" + }, "CVE-2023-47233": { - "cmt_msg": "" + "cmt_msg": "wifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach" }, "CVE-2020-27815": { "cmt_msg": "jfs: Fix array index bounds check in dbAdjTree" }, + "CVE-2023-52629": { + "cmt_msg": "sh: push-switch: Reorder cleanup operations to avoid use-after-free bug" + }, "CVE-2022-23041": { "cmt_msg": "xen/9p: use alloc/free_pages_exact()" }, @@ -152498,21 +200013,45 @@ "CVE-2023-21400": { "cmt_msg": "" }, + "CVE-2024-26758": { + "cmt_msg": "md: Don't ignore suspended array in md_check_recovery()" + }, + "CVE-2024-26759": { + "cmt_msg": "mm/swap: fix race when skipping swapcache" + }, "CVE-2023-6606": { "cmt_msg": "smb: client: fix OOB in smbCalcSize()" }, + "CVE-2024-26614": { + "cmt_msg": "tcp: make sure init the accept_queue's spinlocks once" + }, "CVE-2020-27777": { "cmt_msg": "powerpc/rtas: Restrict RTAS requests from userspace" }, "CVE-2019-20636": { "cmt_msg": "Input: add safety guards to input_set_keycode()" }, + "CVE-2024-26751": { + "cmt_msg": "ARM: ep93xx: Add terminator to gpiod_lookup_table" + }, + "CVE-2024-26752": { + "cmt_msg": "l2tp: pass correct message length to ip6_append_data" + }, "CVE-2020-27673": { "cmt_msg": "xen/events: add a proper barrier to 2-level uevent unmasking" }, + "CVE-2024-26754": { + "cmt_msg": "gtp: fix use-after-free and null-ptr-deref in gtp_genl_dump_pdp()" + }, "CVE-2020-27675": { "cmt_msg": "xen/events: avoid removing an event channel while handling it" }, + "CVE-2024-26756": { + "cmt_msg": "md: Don't register sync_thread for reshape directly" + }, + "CVE-2024-26757": { + "cmt_msg": "md: Don't ignore read-only array in md_check_recovery()" + }, "CVE-2023-52439": { "cmt_msg": "uio: Fix use-after-free in uio_open" }, @@ -152531,6 +200070,9 @@ "CVE-2022-23040": { "cmt_msg": "xen/xenbus: don't let xenbus_grant_ring() remove grants in error case" }, + "CVE-2024-26805": { + "cmt_msg": "netlink: Fix kernel-infoleak-after-free in __skb_datagram_iter" + }, "CVE-2022-3111": { "cmt_msg": "power: supply: wm8350-power: Add missing free in free_charger_irq" }, @@ -152549,6 +200091,9 @@ "CVE-2022-2964": { "cmt_msg": "net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup" }, + "CVE-2024-26688": { + "cmt_msg": "fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super" + }, "CVE-2019-19063": { "cmt_msg": "rtlwifi: prevent memory leak in rtl_usb_probe" }, @@ -152567,6 +200112,9 @@ "CVE-2020-0432": { "cmt_msg": "staging: most: net: fix buffer overflow" }, + "CVE-2024-26687": { + "cmt_msg": "xen/events: close evtchn after mapping cleanup" + }, "CVE-2023-51779": { "cmt_msg": "Bluetooth: af_bluetooth: Fix Use-After-Free in bt_sock_recvmsg" }, @@ -152582,6 +200130,9 @@ "CVE-2010-4563": { "cmt_msg": "" }, + "CVE-2021-47006": { + "cmt_msg": "ARM: 9064/1: hw_breakpoint: Do not directly check the event's overflow_handler hook" + }, "CVE-2023-1249": { "cmt_msg": "coredump: Use the vma snapshot in fill_files_note" }, @@ -152603,18 +200154,27 @@ "CVE-2023-0266": { "cmt_msg": "ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF" }, - "CVE-2023-1838": { - "cmt_msg": "Fix double fget() in vhost_net_set_backend()" + "CVE-2021-46928": { + "cmt_msg": "parisc: Clear stale IIR value on instruction access rights trap" }, "CVE-2021-3483": { "cmt_msg": "firewire: nosy: Fix a use-after-free bug in nosy_ioctl()" }, + "CVE-2024-26663": { + "cmt_msg": "tipc: Check the bearer type before calling tipc_udp_nl_bearer_add()" + }, "CVE-2021-20177": { "cmt_msg": "netfilter: add and use nf_hook_slow_list()" }, + "CVE-2024-26598": { + "cmt_msg": "KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache" + }, "CVE-2023-6040": { "cmt_msg": "netfilter: nf_tables: Reject tables of unsupported family" }, + "CVE-2024-23196": { + "cmt_msg": "ALSA: hda: fix a possible null-pointer dereference due to data race in snd_hdac_regmap_sync()" + }, "CVE-2021-38300": { "cmt_msg": "bpf, mips: Validate conditional branch offsets" }, @@ -152624,12 +200184,18 @@ "CVE-2022-24448": { "cmt_msg": "NFSv4: Handle case where the lookup of a directory fails" }, - "CVE-2024-26598": { - "cmt_msg": "KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache" + "CVE-2023-52498": { + "cmt_msg": "PM: sleep: Fix possible deadlocks in core system-wide PM code" }, "CVE-2021-4023": { "cmt_msg": "io-wq: fix cancellation on create-worker failure" }, + "CVE-2023-52640": { + "cmt_msg": "fs/ntfs3: Fix oob in ntfs_listxattr" + }, + "CVE-2023-52641": { + "cmt_msg": "fs/ntfs3: Add NULL ptr dereference checking at the end of attr_allocate_frame()" + }, "CVE-2021-22555": { "cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write" }, @@ -152639,23 +200205,41 @@ "CVE-2021-0399": { "cmt_msg": "" }, + "CVE-2023-52488": { + "cmt_msg": "serial: sc16is7xx: convert from _raw_ to _noinc_ regmap functions for FIFO" + }, "CVE-2020-36691": { "cmt_msg": "netlink: limit recursion depth in policy validation" }, + "CVE-2021-47179": { + "cmt_msg": "NFSv4: Fix a NULL pointer dereference in pnfs_mark_matching_lsegs_return()" + }, "CVE-2023-42755": { "cmt_msg": "net/sched: Retire rsvp classifier" }, "CVE-2020-2732": { "cmt_msg": "KVM: nVMX: Don't emulate instructions in guest mode" }, + "CVE-2023-52486": { + "cmt_msg": "drm: Don't unref the same fb many times by mistake due to deadlock handling" + }, + "CVE-2024-26791": { + "cmt_msg": "btrfs: dev-replace: properly validate device names" + }, + "CVE-2023-52480": { + "cmt_msg": "ksmbd: fix race condition between session lookup and expire" + }, "CVE-2012-4542": { "cmt_msg": "" }, "CVE-2022-1729": { "cmt_msg": "perf: Fix sys_perf_event_open() race against self" }, - "CVE-2023-42752": { - "cmt_msg": "igmp: limit igmpv3_newpack() packet size to IP_MAX_MTU" + "CVE-2023-1838": { + "cmt_msg": "Fix double fget() in vhost_net_set_backend()" + }, + "CVE-2023-28328": { + "cmt_msg": "media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer()" }, "CVE-2023-4128": { "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free" @@ -152669,33 +200253,75 @@ "CVE-2023-3609": { "cmt_msg": "net/sched: cls_u32: Fix reference counter leak leading to overflow" }, + "CVE-2022-44033": { + "cmt_msg": "char: pcmcia: remove all the drivers" + }, "CVE-2022-1974": { "cmt_msg": "nfc: replace improper check device_is_registered() in netlink related functions" }, "CVE-2022-1975": { "cmt_msg": "NFC: netlink: fix sleep in atomic bug when firmware download timeout" }, + "CVE-2023-52491": { + "cmt_msg": "media: mtk-jpeg: Fix use after free bug due to error path handling in mtk_jpeg_dec_device_run" + }, + "CVE-2022-44032": { + "cmt_msg": "char: pcmcia: remove all the drivers" + }, + "CVE-2020-36777": { + "cmt_msg": "media: dvbdev: Fix memory leak in dvb_media_device_free()" + }, + "CVE-2020-36775": { + "cmt_msg": "f2fs: fix to avoid potential deadlock" + }, + "CVE-2021-47083": { + "cmt_msg": "pinctrl: mediatek: fix global-out-of-bounds issue" + }, "CVE-2021-20292": { "cmt_msg": "drm/ttm/nouveau: don't call tt destroy callback on alloc failure." }, "CVE-2021-31916": { "cmt_msg": "dm ioctl: fix out of bounds array access when no devices" }, + "CVE-2021-47086": { + "cmt_msg": "phonet/pep: refuse to enable an unbound pipe" + }, "CVE-2022-32981": { "cmt_msg": "powerpc/32: Fix overread/overwrite of thread_struct via ptrace" }, + "CVE-2021-47122": { + "cmt_msg": "net: caif: fix memory leak in caif_device_notify" + }, + "CVE-2021-47121": { + "cmt_msg": "net: caif: fix memory leak in cfusbl_device_notify" + }, + "CVE-2021-47120": { + "cmt_msg": "HID: magicmouse: fix NULL-deref on disconnect" + }, + "CVE-2021-47126": { + "cmt_msg": "ipv6: Fix KASAN: slab-out-of-bounds Read in fib6_nh_flush_exceptions" + }, "CVE-2020-11668": { "cmt_msg": "media: xirlink_cit: add missing descriptor sanity checks" }, + "CVE-2021-47124": { + "cmt_msg": "io_uring: fix link timeout refs" + }, "CVE-2023-2269": { "cmt_msg": "dm ioctl: fix nested locking in table_clear() to remove deadlock concern" }, "CVE-2023-0394": { "cmt_msg": "ipv6: raw: Deduct extension header length in rawv6_push_pending_frames" }, + "CVE-2021-47171": { + "cmt_msg": "net: usb: fix memory leak in smsc75xx_bind" + }, "CVE-2020-10690": { "cmt_msg": "ptp: fix the race between the release of ptp_clock and cdev" }, + "CVE-2024-26615": { + "cmt_msg": "net/smc: fix illegal rmb_desc access in SMC-D connection dump" + }, "CVE-2022-3108": { "cmt_msg": "drm/amdkfd: Check for null pointer after calling kmemdup" }, @@ -152720,6 +200346,9 @@ "CVE-2020-3702": { "cmt_msg": "ath: Use safer key clearing with key cache entries" }, + "CVE-2023-52485": { + "cmt_msg": "drm/amd/display: Wake DMCUB before sending a command" + }, "CVE-2021-3653": { "cmt_msg": "KVM: nSVM: avoid picking up unsupported bits from L2 in int_ctl (CVE-2021-3653)" }, @@ -152747,12 +200376,18 @@ "CVE-2021-3714": { "cmt_msg": "" }, + "CVE-2021-46932": { + "cmt_msg": "Input: appletouch - initialize work before device registration" + }, "CVE-2019-16230": { "cmt_msg": "drm/amdkfd: fix a potential NULL pointer dereference (v2)" }, "CVE-2019-16232": { "cmt_msg": "libertas: fix a potential NULL pointer dereference" }, + "CVE-2021-47177": { + "cmt_msg": "iommu/vt-d: Fix sysfs leak in alloc_iommu()" + }, "CVE-2019-16234": { "cmt_msg": "iwlwifi: pcie: fix rb_allocator workqueue allocation" }, @@ -152804,11 +200439,29 @@ "CVE-2022-33744": { "cmt_msg": "xen/arm: Fix race in RB-tree based P2M accounting" }, + "CVE-2023-52596": { + "cmt_msg": "sysctl: Fix out of bounds access for empty sysctl registers" + }, + "CVE-2021-47016": { + "cmt_msg": "m68k: mvme147,mvme16x: Don't wipe PCC timer config bits" + }, + "CVE-2021-47015": { + "cmt_msg": "bnxt_en: Fix RX consumer index logic in the error path." + }, "CVE-2023-52443": { "cmt_msg": "apparmor: avoid crash when parsed profile name is empty" }, - "CVE-2022-2327": { - "cmt_msg": "io_uring: remove any grabbing of context" + "CVE-2021-47013": { + "cmt_msg": "net:emac/emac-mac: Fix a use after free in emac_mac_tx_buf_send" + }, + "CVE-2021-47012": { + "cmt_msg": "RDMA/siw: Fix a use after free in siw_alloc_mr" + }, + "CVE-2021-47158": { + "cmt_msg": "net: dsa: sja1105: add error handling in sja1105_setup()" + }, + "CVE-2021-47010": { + "cmt_msg": "net: Only allow init netns to set default tcp cong to a restricted algo" }, "CVE-2021-45486": { "cmt_msg": "inet: use bigger hash table for IP ID generation" @@ -152816,20 +200469,32 @@ "CVE-2020-12888": { "cmt_msg": "vfio-pci: Invalidate mmaps and block MMIO access on disabled memory" }, - "CVE-2023-2194": { - "cmt_msg": "i2c: xgene-slimpro: Fix out-of-bounds bug in xgene_slimpro_i2c_xfer()" + "CVE-2021-47153": { + "cmt_msg": "i2c: i801: Don't generate an interrupt on bus reset" + }, + "CVE-2021-47150": { + "cmt_msg": "net: fec: fix the potential memory leak in fec_enet_init()" }, "CVE-2021-3923": { "cmt_msg": "RDMA/core: Don't infoleak GRH fields" }, - "CVE-2022-41218": { - "cmt_msg": "media: dvb-core: Fix UAF due to refcount races at releasing" + "CVE-2021-46936": { + "cmt_msg": "net: fix use-after-free in tw_timer_handler" + }, + "CVE-2021-46935": { + "cmt_msg": "binder: fix async_free_space accounting for empty parcels" + }, + "CVE-2021-46934": { + "cmt_msg": "i2c: validate user data in compat ioctl" + }, + "CVE-2021-46933": { + "cmt_msg": "usb: gadget: f_fs: Clear ffs_eventfd in ffs_data_clear." }, "CVE-2011-4917": { "cmt_msg": "" }, - "CVE-2023-52438": { - "cmt_msg": "binder: fix use-after-free in shinker's callback" + "CVE-2021-46930": { + "cmt_msg": "usb: mtu3: fix list_head check warning" }, "CVE-2022-36946": { "cmt_msg": "netfilter: nf_queue: do not allow packet truncation below transport header offset" @@ -152840,11 +200505,17 @@ "CVE-2021-0448": { "cmt_msg": "netfilter: ctnetlink: add a range check for l3/l4 protonum" }, - "CVE-2022-21166": { - "cmt_msg": "x86/speculation/mmio: Enable CPU Fill buffer clearing on idle" + "CVE-2021-47103": { + "cmt_msg": "inet: fully convert sk->sk_rx_dst to RCU rules" + }, + "CVE-2021-46939": { + "cmt_msg": "tracing: Restructure trace_clock_global() to never block" + }, + "CVE-2021-46938": { + "cmt_msg": "dm rq: fix double free of blk_mq_tag_set in dev remove after table load fails" }, "CVE-2024-0841": { - "cmt_msg": "" + "cmt_msg": "fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super" }, "CVE-2021-29650": { "cmt_msg": "netfilter: x_tables: Use correct memory barriers." @@ -152870,6 +200541,9 @@ "CVE-2020-29534": { "cmt_msg": "io_uring: don't rely on weak ->files references" }, + "CVE-2024-26748": { + "cmt_msg": "usb: cdns3: fix memory double free when handle zero packet" + }, "CVE-2022-1198": { "cmt_msg": "drivers: hamradio: 6pack: fix UAF bug caused by mod_timer()" }, @@ -152891,8 +200565,8 @@ "CVE-2022-1195": { "cmt_msg": "hamradio: improve the incomplete fix to avoid NPD" }, - "CVE-2024-22099": { - "cmt_msg": "" + "CVE-2023-3863": { + "cmt_msg": "net: nfc: Fix use-after-free caused by nfc_llcp_find_local" }, "CVE-2021-4202": { "cmt_msg": "NFC: reorganize the functions in nci_request" @@ -152906,15 +200580,33 @@ "CVE-2022-45886": { "cmt_msg": "media: dvb-core: Fix use-after-free due on race condition at dvb_net" }, + "CVE-2023-52509": { + "cmt_msg": "ravb: Fix use-after-free issue in ravb_tx_timeout_work()" + }, "CVE-2023-46343": { "cmt_msg": "nfc: nci: fix possible NULL pointer dereference in send_acknowledge()" }, "CVE-2024-25744": { "cmt_msg": "x86/coco: Disable 32-bit emulation by default on TDX and SEV" }, + "CVE-2023-52504": { + "cmt_msg": "x86/alternatives: Disable KASAN in apply_alternatives()" + }, + "CVE-2023-52507": { + "cmt_msg": "nfc: nci: assert requested protocol is valid" + }, "CVE-2023-2124": { "cmt_msg": "xfs: verify buffer contents when we skip log replay" }, + "CVE-2023-52501": { + "cmt_msg": "ring-buffer: Do not attempt to read past \"commit\"" + }, + "CVE-2023-52500": { + "cmt_msg": "scsi: pm80xx: Avoid leaking tags when processing OPC_INB_SET_CONTROLLER_CONFIG command" + }, + "CVE-2023-52502": { + "cmt_msg": "net: nfc: fix races in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn()" + }, "CVE-2023-1281": { "cmt_msg": "net/sched: tcindex: update imperfect hash filters respecting rcu" }, @@ -152936,6 +200628,21 @@ "CVE-2022-27672": { "cmt_msg": "x86/speculation: Identify processors vulnerable to SMT RSB predictions" }, + "CVE-2024-26623": { + "cmt_msg": "pds_core: Prevent race issues involving the adminq" + }, + "CVE-2024-26668": { + "cmt_msg": "netfilter: nft_limit: reject configurations that cause integer overflow" + }, + "CVE-2024-26669": { + "cmt_msg": "net/sched: flower: Fix chain template offload" + }, + "CVE-2021-47146": { + "cmt_msg": "mld: fix panic in mld_newpack()" + }, + "CVE-2022-38457": { + "cmt_msg": "drm/vmwgfx: Remove rcu locks from user resources" + }, "CVE-2015-2877": { "cmt_msg": "" }, @@ -152945,6 +200652,9 @@ "CVE-2023-26242": { "cmt_msg": "" }, + "CVE-2024-26664": { + "cmt_msg": "hwmon: (coretemp) Fix out-of-bounds memory access" + }, "CVE-2019-16089": { "cmt_msg": "" }, @@ -152954,6 +200664,9 @@ "CVE-2021-38199": { "cmt_msg": "NFSv4: Initialise connection to the server in nfs4_alloc_client()" }, + "CVE-2024-26689": { + "cmt_msg": "ceph: prevent use-after-free in encode_cap_msg()" + }, "CVE-2022-1679": { "cmt_msg": "ath9k: fix use-after-free in ath9k_hif_usb_rx_cb" }, @@ -153002,9 +200715,21 @@ "CVE-2023-23039": { "cmt_msg": "" }, + "CVE-2024-26733": { + "cmt_msg": "arp: Prevent overflow in arp_req_get()." + }, + "CVE-2024-26719": { + "cmt_msg": "nouveau: offload fence uevents work to workqueue" + }, + "CVE-2024-26715": { + "cmt_msg": "usb: dwc3: gadget: Fix NULL pointer dereference in dwc3_gadget_suspend" + }, "CVE-2024-1312": { "cmt_msg": "mm: lock_vma_under_rcu() must check vma->anon_vma under vma lock" }, + "CVE-2024-26713": { + "cmt_msg": "powerpc/pseries/iommu: Fix iommu initialisation during DLPAR add" + }, "CVE-2023-3338": { "cmt_msg": "Remove DECnet support from kernel" }, @@ -153079,6 +200804,10 @@ } }, "5.6.7": { + "CVE-2020-36775": { + "cmt_msg": "f2fs: fix to avoid potential deadlock", + "cmt_id": "8e8542437bb4070423c9754d5ba270ffdbae8c8d" + }, "CVE-2020-12659": { "cmt_msg": "xsk: Add missing check on user supplied headroom size", "cmt_id": "98d3c852e63b49129515dd18c875999efaf8530a" @@ -153210,12 +200939,30 @@ "CVE-2022-0002": { "cmt_msg": "x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE" }, + "CVE-2021-3752": { + "cmt_msg": "Bluetooth: fix use-after-free error in lock_sock_nested()" + }, + "CVE-2024-26685": { + "cmt_msg": "nilfs2: fix potential bug in end_buffer_async_write" + }, + "CVE-2023-52615": { + "cmt_msg": "hwrng: core - Fix page fault dead lock on mmap-ed hwrng" + }, + "CVE-2023-52614": { + "cmt_msg": "PM / devfreq: Fix buffer overflow in trans_stat_show" + }, + "CVE-2023-52617": { + "cmt_msg": "PCI: switchtec: Fix stdev_release() crash after surprise hot remove" + }, "CVE-2020-24587": { "cmt_msg": "mac80211: prevent mixed key and fragment cache attacks" }, "CVE-2020-24586": { "cmt_msg": "mac80211: prevent mixed key and fragment cache attacks" }, + "CVE-2023-52612": { + "cmt_msg": "crypto: scomp - fix req->dst buffer overflow" + }, "CVE-2022-3105": { "cmt_msg": "RDMA/uverbs: Check for null return of kmalloc_array" }, @@ -153228,6 +200975,9 @@ "CVE-2022-47520": { "cmt_msg": "wifi: wilc1000: validate pairwise and authentication suite offsets" }, + "CVE-2023-52618": { + "cmt_msg": "block/rnbd-srv: Check for unlikely string overflow" + }, "CVE-2023-5717": { "cmt_msg": "perf: Disallow mis-matched inherited group reads" }, @@ -153255,6 +201005,9 @@ "CVE-2022-42703": { "cmt_msg": "mm/rmap: Fix anon_vma->degree ambiguity leading to double-reuse" }, + "CVE-2021-47059": { + "cmt_msg": "crypto: sun8i-ss - fix result memory leak on error path" + }, "CVE-2022-23825": { "cmt_msg": "" }, @@ -153264,26 +201017,65 @@ "CVE-2021-42252": { "cmt_msg": "soc: aspeed: lpc-ctrl: Fix boundary check for mmap" }, - "CVE-2023-4004": { - "cmt_msg": "netfilter: nft_set_pipapo: fix improper element removal" + "CVE-2021-47051": { + "cmt_msg": "spi: fsl-lpspi: Fix PM reference leak in lpspi_prepare_xfer_hardware()" }, "CVE-2023-0179": { "cmt_msg": "netfilter: nft_payload: incorrect arithmetics when fetching VLAN header bits" }, - "CVE-2024-26588": { - "cmt_msg": "LoongArch: BPF: Prevent out-of-bounds memory access" + "CVE-2021-47056": { + "cmt_msg": "crypto: qat - ADF_STATUS_PF_RUNNING should be set after adf_dev_init" + }, + "CVE-2021-47054": { + "cmt_msg": "bus: qcom: Put child node before return" + }, + "CVE-2021-47112": { + "cmt_msg": "x86/kvm: Teardown PV features on boot CPU as well" + }, + "CVE-2021-47113": { + "cmt_msg": "btrfs: abort in rename_exchange if we fail to insert the second ref" + }, + "CVE-2021-47110": { + "cmt_msg": "x86/kvm: Disable kvmclock on all CPUs on shutdown" + }, + "CVE-2021-47111": { + "cmt_msg": "xen-netback: take a reference to the RX task thread" + }, + "CVE-2021-47116": { + "cmt_msg": "ext4: fix memory leak in ext4_mb_init_backend on error path." + }, + "CVE-2021-47117": { + "cmt_msg": "ext4: fix bug on in ext4_es_cache_extent as ext4_split_extent_at failed" + }, + "CVE-2021-47114": { + "cmt_msg": "ocfs2: fix data corruption by fallocate" + }, + "CVE-2023-2162": { + "cmt_msg": "scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress" + }, + "CVE-2024-26759": { + "cmt_msg": "mm/swap: fix race when skipping swapcache" }, "CVE-2022-21125": { "cmt_msg": "x86/speculation/mmio: Reuse SRBDS mitigation for SBDS" }, + "CVE-2021-46971": { + "cmt_msg": "perf/core: Fix unconditional security_locked_down() call" + }, + "CVE-2021-46970": { + "cmt_msg": "bus: mhi: pci_generic: Remove WQ_MEM_RECLAIM flag from state workqueue" + }, + "CVE-2021-46977": { + "cmt_msg": "KVM: VMX: Disable preemption when probing user return MSRs" + }, "CVE-2023-28466": { "cmt_msg": "net: tls: fix possible race condition between do_tls_getsockopt_conf() and do_tls_setsockopt_conf()" }, "CVE-2022-40307": { "cmt_msg": "efi: capsule-loader: Fix use-after-free in efi_capsule_write" }, - "CVE-2022-21123": { - "cmt_msg": "x86/speculation/mmio: Add mitigation for Processor MMIO Stale Data" + "CVE-2021-46974": { + "cmt_msg": "bpf: Fix masking negation logic upon negative dst register" }, "CVE-2020-29368": { "cmt_msg": "mm: thp: make the THP mapcount atomic against __split_huge_pmd_locked()" @@ -153303,6 +201095,9 @@ "CVE-2020-0466": { "cmt_msg": "do_epoll_ctl(): clean the failure exits up a bit" }, + "CVE-2024-26774": { + "cmt_msg": "ext4: avoid dividing by 0 in mb_update_avg_fragment_size() when block bitmap corrupt" + }, "CVE-2023-0459": { "cmt_msg": "uaccess: Add speculation barrier to copy_from_user()" }, @@ -153336,9 +201131,6 @@ "CVE-2022-3628": { "cmt_msg": "wifi: brcmfmac: Fix potential buffer overflow in brcmf_fweh_event_worker()" }, - "CVE-2024-26591": { - "cmt_msg": "bpf: Fix re-attachment branch in bpf_tracing_prog_attach" - }, "CVE-2020-15802": { "cmt_msg": "" }, @@ -153369,26 +201161,50 @@ "CVE-2022-40982": { "cmt_msg": "x86/speculation: Add Gather Data Sampling mitigation" }, + "CVE-2024-26735": { + "cmt_msg": "ipv6: sr: fix possible use-after-free and null-ptr-deref" + }, "CVE-2022-3202": { "cmt_msg": "jfs: prevent NULL deref in diFree" }, + "CVE-2024-25739": { + "cmt_msg": "" + }, + "CVE-2021-47028": { + "cmt_msg": "mt76: mt7915: fix txrate reporting" + }, "CVE-2022-2602": { "cmt_msg": "io_uring/af_unix: defer registered files gc to io_uring release" }, "CVE-2024-26585": { "cmt_msg": "tls: fix race between tx work scheduling and socket close" }, + "CVE-2021-47024": { + "cmt_msg": "vsock/virtio: free queued packets when closing socket" + }, + "CVE-2023-52511": { + "cmt_msg": "spi: sun6i: reduce DMA RX transfer width to single byte" + }, + "CVE-2021-47020": { + "cmt_msg": "soundwire: stream: fix memory leak in stream config error path" + }, "CVE-2024-26584": { "cmt_msg": "net: tls: handle backlogging of crypto requests" }, "CVE-2023-2008": { "cmt_msg": "udmabuf: add back sanity check" }, - "CVE-2024-26587": { - "cmt_msg": "net: netdevsim: don't try to destroy PHC on VFs" + "CVE-2021-46908": { + "cmt_msg": "bpf: Use correct permission flag for mixed signed bounds arithmetic" }, - "CVE-2023-2002": { - "cmt_msg": "bluetooth: Perform careful capability checks in hci_sock_ioctl()" + "CVE-2021-46909": { + "cmt_msg": "ARM: footbridge: fix PCI interrupt mapping" + }, + "CVE-2021-46906": { + "cmt_msg": "HID: usbhid: fix info leak in hid_submit_ctrl" + }, + "CVE-2021-46904": { + "cmt_msg": "net: hso: fix null-ptr-deref during tty device unregistration" }, "CVE-2022-1247": { "cmt_msg": "" @@ -153441,18 +201257,39 @@ "CVE-2023-1073": { "cmt_msg": "HID: check empty report_list in hid_validate_values()" }, + "CVE-2024-26747": { + "cmt_msg": "usb: roles: fix NULL pointer issue when put module's reference" + }, + "CVE-2024-26745": { + "cmt_msg": "powerpc/pseries/iommu: IOMMU table is not initialized for kdump over SR-IOV" + }, "CVE-2023-51042": { "cmt_msg": "drm/amdgpu: Fix potential fence use-after-free v2" }, + "CVE-2024-26743": { + "cmt_msg": "RDMA/qedr: Fix qedr_create_user_qp error flow" + }, + "CVE-2023-52566": { + "cmt_msg": "nilfs2: fix potential use after free in nilfs_gccache_submit_read_data()" + }, + "CVE-2024-26740": { + "cmt_msg": "net/sched: act_mirred: use the backlog for mirred ingress" + }, "CVE-2020-29661": { "cmt_msg": "tty: Fix ->pgrp locking in tiocspgrp()" }, "CVE-2020-29660": { "cmt_msg": "tty: Fix ->session locking" }, + "CVE-2022-42432": { + "cmt_msg": "netfilter: nfnetlink_osf: fix possible bogus match in nf_osf_find()" + }, "CVE-2022-1734": { "cmt_msg": "nfc: nfcmrvl: main: reorder destructive operations in nfcmrvl_nci_unregister_dev to avoid bugs" }, + "CVE-2024-26749": { + "cmt_msg": "usb: cdns3: fixed memory use after free at cdns3_gadget_ep_disable()" + }, "CVE-2022-3625": { "cmt_msg": "devlink: Fix use-after-free after a failed reload" }, @@ -153477,8 +201314,8 @@ "CVE-2021-32399": { "cmt_msg": "bluetooth: eliminate the potential race condition when removing the HCI controller" }, - "CVE-2021-27364": { - "cmt_msg": "scsi: iscsi: Restrict sessions and handles to admin capabilities" + "CVE-2024-26699": { + "cmt_msg": "drm/amd/display: Fix array-index-out-of-bounds in dcn35_clkmgr" }, "CVE-2022-23038": { "cmt_msg": "xen/grant-table: add gnttab_try_end_foreign_access()" @@ -153489,6 +201326,9 @@ "CVE-2022-20154": { "cmt_msg": "sctp: use call_rcu to free endpoint" }, + "CVE-2024-26691": { + "cmt_msg": "KVM: arm64: Fix circular locking dependency" + }, "CVE-2021-45868": { "cmt_msg": "quota: check block number when reading the block in quota file" }, @@ -153504,12 +201344,24 @@ "CVE-2024-0565": { "cmt_msg": "smb: client: fix OOB in receive_encrypted_standard()" }, + "CVE-2024-26697": { + "cmt_msg": "nilfs2: fix data corruption in dsync block recovery for small block sizes" + }, + "CVE-2024-26696": { + "cmt_msg": "nilfs2: fix hang in nilfs_lookup_dirty_data_buffers()" + }, + "CVE-2024-26633": { + "cmt_msg": "ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim()" + }, "CVE-2023-2176": { "cmt_msg": "RDMA/core: Refactor rdma_bind_addr" }, "CVE-2023-2177": { "cmt_msg": "sctp: leave the err path free in sctp_stream_init to sctp_stream_free" }, + "CVE-2022-0812": { + "cmt_msg": "xprtrdma: fix incorrect header size calculations" + }, "CVE-2021-38160": { "cmt_msg": "virtio_console: Assure used length from device is limited" }, @@ -153531,6 +201383,9 @@ "CVE-2020-25645": { "cmt_msg": "geneve: add transport ports in route lookup for geneve" }, + "CVE-2024-26788": { + "cmt_msg": "dmaengine: fsl-qdma: init irq after reg initialization" + }, "CVE-2020-25643": { "cmt_msg": "hdlc_ppp: add range checks in ppp_cp_parse_cr()" }, @@ -153540,6 +201395,9 @@ "CVE-2005-3660": { "cmt_msg": "" }, + "CVE-2023-52619": { + "cmt_msg": "pstore/ram: Fix crash when setting number of cpus to an odd number" + }, "CVE-2023-31085": { "cmt_msg": "ubi: Refuse attaching if mtd's erasesize is 0" }, @@ -153555,42 +201413,63 @@ "CVE-2023-31081": { "cmt_msg": "" }, + "CVE-2023-52574": { + "cmt_msg": "team: fix null-ptr-deref when team device type is changed" + }, "CVE-2021-33034": { "cmt_msg": "Bluetooth: verify AMP hci_chan before amp_destroy" }, + "CVE-2023-52519": { + "cmt_msg": "HID: intel-ish-hid: ipc: Disable and reenable ACPI GPE bit" + }, "CVE-2021-33033": { "cmt_msg": "cipso,calipso: resolve a number of problems with the DOI refcounts" }, "CVE-2022-29582": { "cmt_msg": "io_uring: fix race between timeout flush and removal" }, - "CVE-2024-23307": { - "cmt_msg": "" + "CVE-2024-0646": { + "cmt_msg": "net: tls, update curr on splice as well" + }, + "CVE-2023-52598": { + "cmt_msg": "s390/ptrace: handle setting of fpc register correctly" }, "CVE-2022-32296": { "cmt_msg": "tcp: increase source port perturb table to 2^16" }, + "CVE-2024-26789": { + "cmt_msg": "crypto: arm64/neonbs - fix out-of-bounds access on short input" + }, "CVE-2020-28974": { "cmt_msg": "vt: Disable KD_FONT_OP_COPY" }, - "CVE-2023-3567": { - "cmt_msg": "vc_screen: move load of struct vc_data pointer in vcs_read() to avoid UAF" + "CVE-2022-4543": { + "cmt_msg": "" }, "CVE-2022-3028": { "cmt_msg": "af_key: Do not call xfrm_probe_algs in parallel" }, + "CVE-2023-52492": { + "cmt_msg": "dmaengine: fix NULL pointer in channel unregistration function" + }, "CVE-2020-14304": { "cmt_msg": "" }, "CVE-2022-2318": { "cmt_msg": "net: rose: fix UAF bugs caused by timer handler" }, + "CVE-2023-52497": { + "cmt_msg": "erofs: fix lz4 inplace decompression" + }, "CVE-2020-15393": { "cmt_msg": "usb: usbtest: fix missing kfree(dev->buf) in usbtest_disconnect" }, "CVE-2022-33981": { "cmt_msg": "floppy: disable FDRAWCMD by default" }, + "CVE-2024-26655": { + "cmt_msg": "Fix memory leak in posix_clock_open()" + }, "CVE-2021-3564": { "cmt_msg": "Bluetooth: fix the erroneous flush_work() order" }, @@ -153612,24 +201491,45 @@ "CVE-2023-39198": { "cmt_msg": "drm/qxl: fix UAF on handle creation" }, + "CVE-2022-0185": { + "cmt_msg": "vfs: fs_context: fix up param length parsing in legacy_parse_param" + }, + "CVE-2023-42752": { + "cmt_msg": "igmp: limit igmpv3_newpack() packet size to IP_MAX_MTU" + }, "CVE-2023-37454": { "cmt_msg": "" }, "CVE-2022-20572": { "cmt_msg": "dm verity: set DM_TARGET_IMMUTABLE feature flag" }, + "CVE-2024-24858": { + "cmt_msg": "" + }, "CVE-2023-39194": { "cmt_msg": "net: xfrm: Fix xfrm_address_filter OOB read" }, + "CVE-2023-2002": { + "cmt_msg": "bluetooth: Perform careful capability checks in hci_sock_ioctl()" + }, + "CVE-2023-52489": { + "cmt_msg": "mm/sparsemem: fix race in accessing memory_section->usage" + }, "CVE-2021-28964": { "cmt_msg": "btrfs: fix race when cloning extent buffer during rewind of an old root" }, + "CVE-2021-47063": { + "cmt_msg": "drm: bridge/panel: Cleanup connector on bridge detach" + }, "CVE-2021-4083": { "cmt_msg": "fget: check that the fd still exists after getting a ref to it" }, "CVE-2023-33288": { "cmt_msg": "power: supply: bq24190: Fix use after free bug in bq24190_remove due to race condition" }, + "CVE-2023-52484": { + "cmt_msg": "iommu/arm-smmu-v3: Fix soft lockup triggered by arm_smmu_mm_invalidate_range" + }, "CVE-2022-29900": { "cmt_msg": "x86/kvm/vmx: Make noinstr clean" }, @@ -153639,15 +201539,27 @@ "CVE-2023-3161": { "cmt_msg": "fbcon: Check font dimension limits" }, + "CVE-2022-3567": { + "cmt_msg": "ipv6: Fix data races around sk->sk_prot." + }, "CVE-2023-39192": { "cmt_msg": "netfilter: xt_u32: validate user space input" }, - "CVE-2023-25012": { - "cmt_msg": "HID: bigben: use spinlock to safely schedule workers" + "CVE-2021-47069": { + "cmt_msg": "ipc/mqueue, msg, sem: avoid relying on a stack reference past its expiry" + }, + "CVE-2023-52597": { + "cmt_msg": "KVM: s390: fix setting of fpc register" + }, + "CVE-2022-3566": { + "cmt_msg": "tcp: Fix data races around icsk->icsk_af_ops." }, "CVE-2023-35828": { "cmt_msg": "usb: gadget: udc: renesas_usb3: Fix use after free bug in renesas_usb3_remove due to race condition" }, + "CVE-2022-20166": { + "cmt_msg": "drivers core: Use sysfs_emit and sysfs_emit_at for show(device *...) functions" + }, "CVE-2020-15437": { "cmt_msg": "serial: 8250: fix null-ptr-deref in serial8250_start_tx()" }, @@ -153660,9 +201572,15 @@ "CVE-2021-28660": { "cmt_msg": "staging: rtl8188eu: prevent ->ssid overflow in rtw_wx_set_scan()" }, + "CVE-2024-26645": { + "cmt_msg": "tracing: Ensure visibility when inserting an element into tracing_map" + }, "CVE-2023-35823": { "cmt_msg": "media: saa7134: fix use after free bug in saa7134_finidev due to race condition" }, + "CVE-2022-3564": { + "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free caused by l2cap_reassemble_sdu" + }, "CVE-2022-23816": { "cmt_msg": "x86/kvm/vmx: Make noinstr clean" }, @@ -153672,29 +201590,101 @@ "CVE-2023-35827": { "cmt_msg": "ravb: Fix use-after-free issue in ravb_tx_timeout_work()" }, + "CVE-2023-52481": { + "cmt_msg": "arm64: errata: Add Cortex-A520 speculative unprivileged load workaround" + }, + "CVE-2023-52585": { + "cmt_msg": "drm/amdgpu: Fix possible NULL dereference in amdgpu_ras_query_error_status_helper()" + }, "CVE-2021-20239": { "cmt_msg": "net: pass a sockptr_t into ->setsockopt" }, - "CVE-2022-3567": { - "cmt_msg": "ipv6: Fix data races around sk->sk_prot." + "CVE-2023-52587": { + "cmt_msg": "IB/ipoib: Fix mcast list locking" }, - "CVE-2022-3566": { - "cmt_msg": "tcp: Fix data races around icsk->icsk_af_ops." + "CVE-2023-52586": { + "cmt_msg": "drm/msm/dpu: Add mutex lock in control vblank irq" + }, + "CVE-2021-47149": { + "cmt_msg": "net: fujitsu: fix potential null-ptr-deref" + }, + "CVE-2021-47067": { + "cmt_msg": "soc/tegra: regulators: Fix locking up when voltage-spread is out of range" }, "CVE-2022-3565": { "cmt_msg": "mISDN: fix use-after-free bugs in l1oip timer handlers" }, - "CVE-2022-3564": { - "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free caused by l2cap_reassemble_sdu" + "CVE-2021-47065": { + "cmt_msg": "rtw88: Fix array overrun in rtw_get_tx_power_params()" }, "CVE-2020-36386": { "cmt_msg": "Bluetooth: Fix slab-out-of-bounds read in hci_extended_inquiry_result_evt()" }, + "CVE-2021-47144": { + "cmt_msg": "drm/amd/amdgpu: fix refcount leak" + }, + "CVE-2021-47147": { + "cmt_msg": "ptp: ocp: Fix a resource leak in an error handling path" + }, "CVE-2020-36385": { "cmt_msg": "RDMA/ucma: Rework ucma_migrate_id() to avoid races with destroy" }, - "CVE-2023-52340": { - "cmt_msg": "ipv6: remove max_size check inline with ipv4" + "CVE-2021-47141": { + "cmt_msg": "gve: Add NULL pointer checks when freeing irqs." + }, + "CVE-2021-47140": { + "cmt_msg": "iommu/amd: Clear DMA ops when switching domain" + }, + "CVE-2021-47143": { + "cmt_msg": "net/smc: remove device from smcd_dev_list after failed device_add()" + }, + "CVE-2021-47142": { + "cmt_msg": "drm/amdgpu: Fix a use-after-free" + }, + "CVE-2021-46943": { + "cmt_msg": "media: staging/intel-ipu3: Fix set_fmt error handling" + }, + "CVE-2021-47145": { + "cmt_msg": "btrfs: do not BUG_ON in link_to_fixup_dir" + }, + "CVE-2021-46941": { + "cmt_msg": "usb: dwc3: core: Do core softreset when switch mode" + }, + "CVE-2023-3567": { + "cmt_msg": "vc_screen: move load of struct vc_data pointer in vcs_read() to avoid UAF" + }, + "CVE-2021-46944": { + "cmt_msg": "media: staging/intel-ipu3: Fix memory leak in imu_fmt" + }, + "CVE-2023-4128": { + "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free" + }, + "CVE-2023-52589": { + "cmt_msg": "media: rkisp1: Fix IRQ disable race issue" + }, + "CVE-2023-52588": { + "cmt_msg": "f2fs: fix to tag gcing flag on page during block migration" + }, + "CVE-2024-26765": { + "cmt_msg": "LoongArch: Disable IRQ before init_fn() for nonboot CPUs" + }, + "CVE-2023-52578": { + "cmt_msg": "net: bridge: use DEV_STATS_INC()" + }, + "CVE-2024-26684": { + "cmt_msg": "net: stmmac: xgmac: fix handling of DPP safety error for DMA channels" + }, + "CVE-2021-47052": { + "cmt_msg": "crypto: sa2ul - Fix memory leak of rxd" + }, + "CVE-2023-52438": { + "cmt_msg": "binder: fix use-after-free in shinker's callback" + }, + "CVE-2021-47095": { + "cmt_msg": "ipmi: ssif: initialize ssif_info->client early" + }, + "CVE-2023-4004": { + "cmt_msg": "netfilter: nft_set_pipapo: fix improper element removal" }, "CVE-2020-26088": { "cmt_msg": "net/nfc/rawsock.c: add CAP_NET_RAW check." @@ -153711,6 +201701,9 @@ "CVE-2023-1611": { "cmt_msg": "btrfs: fix race between quota disable and quota assign ioctls" }, + "CVE-2024-26763": { + "cmt_msg": "dm-crypt: don't modify the data when using authenticated encryption" + }, "CVE-2021-34693": { "cmt_msg": "can: bcm: fix infoleak in struct bcm_msg_head" }, @@ -153720,15 +201713,42 @@ "CVE-2023-6817": { "cmt_msg": "netfilter: nft_set_pipapo: skip inactive elements during set walk" }, + "CVE-2023-52470": { + "cmt_msg": "drm/radeon: check the alloc_workqueue return value in radeon_crtc_init()" + }, + "CVE-2024-26795": { + "cmt_msg": "riscv: Sparse-Memory/vmemmap out-of-bounds fix" + }, + "CVE-2021-47125": { + "cmt_msg": "sch_htb: fix refcount leak in htb_parent_to_leaf_offload" + }, + "CVE-2024-26797": { + "cmt_msg": "drm/amd/display: Prevent potential buffer overflow in map_hw_resources" + }, + "CVE-2024-26790": { + "cmt_msg": "dmaengine: fsl-qdma: fix SoC may hang on 16 byte unaligned read" + }, "CVE-2022-1836": { "cmt_msg": "floppy: disable FDRAWCMD by default" }, + "CVE-2024-26793": { + "cmt_msg": "gtp: fix use-after-free and null-ptr-deref in gtp_newlink()" + }, + "CVE-2023-52530": { + "cmt_msg": "wifi: mac80211: fix potential key use-after-free" + }, "CVE-2021-32078": { "cmt_msg": "ARM: footbridge: remove personal server platform" }, + "CVE-2023-52532": { + "cmt_msg": "net: mana: Fix TX CQE error handling" + }, "CVE-2022-30594": { "cmt_msg": "ptrace: Check PTRACE_O_SUSPEND_SECCOMP permission on PTRACE_SEIZE" }, + "CVE-2024-26798": { + "cmt_msg": "fbcon: always restore the old font data in fbcon_do_set_font()" + }, "CVE-2022-4662": { "cmt_msg": "USB: core: Prevent nested device-reset calls" }, @@ -153756,6 +201776,9 @@ "CVE-2021-38208": { "cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect" }, + "CVE-2024-26677": { + "cmt_msg": "rxrpc: Fix delayed ACKs to not set the reference serial number" + }, "CVE-2020-25211": { "cmt_msg": "netfilter: ctnetlink: add a range check for l3/l4 protonum" }, @@ -153768,9 +201791,18 @@ "CVE-2020-26557": { "cmt_msg": "" }, + "CVE-2024-26671": { + "cmt_msg": "blk-mq: fix IO hang from sbitmap wakeup race" + }, "CVE-2020-26555": { "cmt_msg": "Bluetooth: SMP: Fail if remote and local public keys are identical" }, + "CVE-2024-26776": { + "cmt_msg": "spi: hisi-sfc-v3xx: Return IRQ_NONE if no interrupts were detected" + }, + "CVE-2024-26777": { + "cmt_msg": "fbdev: sis: Error out if pixclock equals zero" + }, "CVE-2019-20794": { "cmt_msg": "" }, @@ -153780,26 +201812,47 @@ "CVE-2023-3397": { "cmt_msg": "" }, + "CVE-2021-47129": { + "cmt_msg": "netfilter: nft_ct: skip expectations for confirmed conntrack" + }, + "CVE-2024-26679": { + "cmt_msg": "inet: read sk->sk_family once in inet_recv_error()" + }, + "CVE-2024-26771": { + "cmt_msg": "dmaengine: ti: edma: Add some null pointer checks to the edma_probe" + }, + "CVE-2023-52584": { + "cmt_msg": "spmi: mediatek: Fix UAF on device remove" + }, + "CVE-2021-47128": { + "cmt_msg": "bpf, lockdown, audit: Fix buggy SELinux lockdown permission checks" + }, "CVE-2022-26365": { "cmt_msg": "xen/blkfront: fix leaking data in shared pages" }, "CVE-2023-52458": { "cmt_msg": "block: add check that partition length needs to be aligned with block size" }, - "CVE-2023-52457": { - "cmt_msg": "serial: 8250: omap: Don't skip resource freeing if pm_runtime_resume_and_get() failed" - }, "CVE-2018-1121": { "cmt_msg": "" }, "CVE-2023-52454": { "cmt_msg": "nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length" }, + "CVE-2023-28746": { + "cmt_msg": "x86/mmio: Disable KVM mitigation when X86_FEATURE_CLEAR_CPU_BUF is set" + }, + "CVE-2021-47118": { + "cmt_msg": "pid: take a reference when initializing `cad_pid`" + }, "CVE-2023-52451": { "cmt_msg": "powerpc/pseries/memhp: Fix access beyond end of drmem array" }, - "CVE-2022-3061": { - "cmt_msg": "video: fbdev: i740fb: Error out if 'pixclock' equals zero" + "CVE-2021-47119": { + "cmt_msg": "ext4: fix memory leak in ext4_fill_super" + }, + "CVE-2024-26602": { + "cmt_msg": "sched/membarrier: reduce the ability to hammer on sys_membarrier" }, "CVE-2024-1086": { "cmt_msg": "netfilter: nf_tables: reject QUEUE/DROP verdict parameters" @@ -153828,9 +201881,18 @@ "CVE-2023-1670": { "cmt_msg": "xirc2ps_cs: Fix use after free bug in xirc2ps_detach" }, + "CVE-2024-26702": { + "cmt_msg": "iio: magnetometer: rm3100: add boundary check for the value read from RM3100_REG_TMRC" + }, "CVE-2023-6240": { "cmt_msg": "" }, + "CVE-2022-21123": { + "cmt_msg": "x86/speculation/mmio: Add mitigation for Processor MMIO Stale Data" + }, + "CVE-2024-26706": { + "cmt_msg": "parisc: Fix random data corruption from exception handler" + }, "CVE-2023-23559": { "cmt_msg": "wifi: rndis_wlan: Prevent buffer overflow in rndis_query_oid" }, @@ -153879,8 +201941,8 @@ "CVE-2023-1118": { "cmt_msg": "media: rc: Fix use-after-free bugs caused by ene_tx_irqsim()" }, - "CVE-2022-1016": { - "cmt_msg": "netfilter: nf_tables: initialize registers in nft_do_chain()" + "CVE-2021-47124": { + "cmt_msg": "io_uring: fix link timeout refs" }, "CVE-2022-1011": { "cmt_msg": "fuse: fix pipe buffer lifetime for direct_io" @@ -153888,9 +201950,30 @@ "CVE-2022-1012": { "cmt_msg": "secure_seq: use the 64 bits of the siphash for port offset calculation" }, + "CVE-2023-52620": { + "cmt_msg": "netfilter: nf_tables: disallow timeout for anonymous sets" + }, "CVE-2022-38096": { "cmt_msg": "" }, + "CVE-2023-52622": { + "cmt_msg": "ext4: avoid online resizing failures due to oversized flex bg" + }, + "CVE-2023-52623": { + "cmt_msg": "SUNRPC: Fix a suspicious RCU usage warning" + }, + "CVE-2023-52624": { + "cmt_msg": "drm/amd/display: Wake DMCUB before executing GPINT commands" + }, + "CVE-2023-52625": { + "cmt_msg": "drm/amd/display: Refactor DMCUB enter/exit idle interface" + }, + "CVE-2023-52627": { + "cmt_msg": "iio: adc: ad7091r: Allow users to configure device events" + }, + "CVE-2023-52628": { + "cmt_msg": "netfilter: nftables: exthdr: fix 4-byte stack OOB write" + }, "CVE-2021-26934": { "cmt_msg": "" }, @@ -153945,18 +202028,45 @@ "CVE-2021-3178": { "cmt_msg": "nfsd4: readdirplus shouldn't return parent of export" }, + "CVE-2021-47101": { + "cmt_msg": "asix: fix uninit-value in asix_mdio_read()" + }, + "CVE-2021-47100": { + "cmt_msg": "ipmi: Fix UAF when uninstall ipmi_si and ipmi_msghandler module" + }, + "CVE-2021-46984": { + "cmt_msg": "kyber: fix out of bounds access when preempted" + }, + "CVE-2021-46982": { + "cmt_msg": "f2fs: compress: fix race condition of overwrite vs truncate" + }, + "CVE-2021-46981": { + "cmt_msg": "nbd: Fix NULL pointer in flush_workqueue" + }, + "CVE-2021-47109": { + "cmt_msg": "neighbour: allow NUD_NOARP entries to be forced GCed" + }, "CVE-2022-0330": { "cmt_msg": "drm/i915: Flush TLBs before releasing backing store" }, "CVE-2007-3719": { "cmt_msg": "" }, - "CVE-2023-3863": { - "cmt_msg": "net: nfc: Fix use-after-free caused by nfc_llcp_find_local" + "CVE-2021-46988": { + "cmt_msg": "userfaultfd: release page in error path to avoid BUG_ON" + }, + "CVE-2021-46989": { + "cmt_msg": "hfsplus: prevent corruption in shrinking truncate" + }, + "CVE-2024-26606": { + "cmt_msg": "binder: signal epoll threads of self-work" }, "CVE-2023-0590": { "cmt_msg": "net: sched: fix race condition in qdisc_graft()" }, + "CVE-2023-52583": { + "cmt_msg": "ceph: fix deadlock or deadcode of misusing dget()" + }, "CVE-2022-4095": { "cmt_msg": "staging: rtl8712: fix use after free bugs" }, @@ -153984,6 +202094,15 @@ "CVE-2021-3679": { "cmt_msg": "tracing: Fix bug in rb_per_cpu_empty() that might cause deadloop." }, + "CVE-2024-26656": { + "cmt_msg": "drm/amdgpu: fix use-after-free bug" + }, + "CVE-2024-26607": { + "cmt_msg": "drm/bridge: sii902x: Fix probing race issue" + }, + "CVE-2023-52517": { + "cmt_msg": "spi: sun6i: fix race between DMA RX transfer completion and RX FIFO drain" + }, "CVE-2022-2586": { "cmt_msg": "netfilter: nf_tables: do not allow SET_ID to refer to another table" }, @@ -154041,18 +202160,42 @@ "CVE-2023-1095": { "cmt_msg": "netfilter: nf_tables: fix null deref due to zeroed list head" }, + "CVE-2021-47035": { + "cmt_msg": "iommu/vt-d: Remove WO permissions on second-level paging entries" + }, + "CVE-2021-47034": { + "cmt_msg": "powerpc/64s: Fix pte update for kernel memory on radix" + }, "CVE-2022-3239": { "cmt_msg": "media: em28xx: initialize refcount before kref_get" }, - "CVE-2022-4543": { - "cmt_msg": "" + "CVE-2021-47036": { + "cmt_msg": "udp: skip L4 aggregation for UDP tunnel packets" + }, + "CVE-2023-52571": { + "cmt_msg": "power: supply: rk817: Fix node refcount leak" + }, + "CVE-2023-52572": { + "cmt_msg": "cifs: Fix UAF in cifs_demultiplex_thread()" + }, + "CVE-2023-52573": { + "cmt_msg": "net: rds: Fix possible NULL-pointer dereference" }, "CVE-2023-4921": { "cmt_msg": "net: sched: sch_qfq: Fix UAF in qfq_dequeue()" }, + "CVE-2022-3424": { + "cmt_msg": "misc: sgi-gru: fix use-after-free error in gru_set_context_option, gru_fault and gru_handle_user_call_os" + }, + "CVE-2021-46919": { + "cmt_msg": "dmaengine: idxd: fix wq size store permission state" + }, "CVE-2023-1829": { "cmt_msg": "net/sched: Retire tcindex classifier" }, + "CVE-2021-46915": { + "cmt_msg": "netfilter: nft_limit: avoid possible divide error in nft_limit_init" + }, "CVE-2023-1390": { "cmt_msg": "tipc: fix NULL deref in tipc_link_xmit()" }, @@ -154071,11 +202214,17 @@ "CVE-2020-24394": { "cmt_msg": "nfsd: apply umask on fs without ACL support" }, + "CVE-2024-26769": { + "cmt_msg": "nvmet-fc: avoid deadlock on delete association path" + }, "CVE-2022-20148": { "cmt_msg": "f2fs: fix UAF in f2fs_available_free_memory" }, - "CVE-2022-42432": { - "cmt_msg": "netfilter: nfnetlink_osf: fix possible bogus match in nf_osf_find()" + "CVE-2024-26704": { + "cmt_msg": "ext4: fix double-free of blocks due to wrong extents moved_len" + }, + "CVE-2022-1786": { + "cmt_msg": "io_uring: remove io_identity" }, "CVE-2013-7445": { "cmt_msg": "" @@ -154083,21 +202232,36 @@ "CVE-2022-28390": { "cmt_msg": "can: ems_usb: ems_usb_start_xmit(): fix double dev_kfree_skb() in error path" }, + "CVE-2024-26736": { + "cmt_msg": "afs: Increase buffer size in afs_update_volume_status()" + }, "CVE-2024-26593": { "cmt_msg": "i2c: i801: Fix block process call transactions" }, + "CVE-2024-26738": { + "cmt_msg": "powerpc/pseries/iommu: DLPAR add doesn't completely initialize pci_controller" + }, + "CVE-2024-26739": { + "cmt_msg": "net/sched: act_mirred: don't override retval if we already lost the skb" + }, "CVE-2022-42719": { "cmt_msg": "wifi: mac80211: fix MBSSID parsing use-after-free" }, "CVE-2020-14386": { "cmt_msg": "net/packet: fix overflow in tpacket_rcv" }, + "CVE-2024-26804": { + "cmt_msg": "net: ip_tunnel: prevent perpetual headroom growth" + }, "CVE-2020-14385": { "cmt_msg": "xfs: fix boundary test in xfs_attr_shortform_verify" }, "CVE-2021-3656": { "cmt_msg": "KVM: nSVM: always intercept VMLOAD/VMSAVE when nested (CVE-2021-3656)" }, + "CVE-2024-26805": { + "cmt_msg": "netlink: Fix kernel-infoleak-after-free in __skb_datagram_iter" + }, "CVE-2022-1158": { "cmt_msg": "KVM: x86/mmu: do compare-and-exchange of gPTE via the user address" }, @@ -154140,9 +202304,18 @@ "CVE-2022-28388": { "cmt_msg": "can: usb_8dev: usb_8dev_start_xmit(): fix double dev_kfree_skb() in error path" }, + "CVE-2022-41218": { + "cmt_msg": "media: dvb-core: Fix UAF due to refcount races at releasing" + }, + "CVE-2024-26803": { + "cmt_msg": "net: veth: clear GRO when clearing XDP even when down" + }, "CVE-2023-52444": { "cmt_msg": "f2fs: fix to avoid dirent corruption" }, + "CVE-2024-26768": { + "cmt_msg": "LoongArch: Change acpi_core_pic[NR_CPUS] to acpi_core_pic[MAX_CORE_PIC]" + }, "CVE-2020-12362": { "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" }, @@ -154155,12 +202328,24 @@ "CVE-2020-12364": { "cmt_msg": "drm/i915/guc: Update to use firmware v49.0.1" }, + "CVE-2024-26646": { + "cmt_msg": "thermal: intel: hfi: Add syscore callbacks for system-wide PM" + }, + "CVE-2024-26647": { + "cmt_msg": "drm/amd/display: Fix late derefrence 'dsc' check in 'link_set_dsc_pps_packet()'" + }, + "CVE-2024-26644": { + "cmt_msg": "btrfs: don't abort filesystem when attempting to snapshot deleted subvolume" + }, "CVE-2020-25639": { "cmt_msg": "drm/nouveau: bail out of nouveau_channel_new if channel init fails" }, "CVE-2023-33203": { "cmt_msg": "net: qcom/emac: Fix use after free bug in emac_remove due to race condition" }, + "CVE-2024-26640": { + "cmt_msg": "tcp: add sanity checks to rx zerocopy" + }, "CVE-2021-0605": { "cmt_msg": "af_key: pfkey_dump needs parameter validation" }, @@ -154179,18 +202364,30 @@ "CVE-2023-50431": { "cmt_msg": "accel/habanalabs: fix information leak in sec_attest_info()" }, + "CVE-2023-52445": { + "cmt_msg": "media: pvrusb2: fix use after free on context disconnection" + }, "CVE-2022-20008": { "cmt_msg": "mmc: block: fix read single on recovery logic" }, "CVE-2023-3117": { "cmt_msg": "netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE" }, + "CVE-2024-26641": { + "cmt_msg": "ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv()" + }, + "CVE-2024-26791": { + "cmt_msg": "btrfs: dev-replace: properly validate device names" + }, "CVE-2023-32269": { "cmt_msg": "netrom: Fix use-after-free caused by accept on already connected socket" }, "CVE-2023-52464": { "cmt_msg": "EDAC/thunderx: Fix possible out-of-bounds string access" }, + "CVE-2023-52600": { + "cmt_msg": "jfs: fix uaf in jfs_evict_inode" + }, "CVE-2020-14314": { "cmt_msg": "ext4: fix potential negative array index in do_split()" }, @@ -154212,15 +202409,30 @@ "CVE-2023-1295": { "cmt_msg": "io_uring: get rid of intermediate IORING_OP_CLOSE stage" }, + "CVE-2021-47159": { + "cmt_msg": "net: dsa: fix a crash if ->get_sset_count() fails" + }, "CVE-2022-0617": { "cmt_msg": "udf: Fix NULL ptr deref when converting from inline format" }, "CVE-2023-4459": { "cmt_msg": "net: vmxnet3: fix possible NULL pointer dereference in vmxnet3_rq_cleanup()" }, + "CVE-2024-26625": { + "cmt_msg": "llc: call sock_orphan() at release time" + }, + "CVE-2024-26635": { + "cmt_msg": "llc: Drop support for ETH_P_TR_802_2." + }, + "CVE-2023-52639": { + "cmt_msg": "KVM: s390: vsie: fix race during shadow creation" + }, "CVE-2022-2153": { "cmt_msg": "KVM: x86: Avoid theoretical NULL pointer dereference in kvm_irq_delivery_to_apic_fast()" }, + "CVE-2024-2193": { + "cmt_msg": "" + }, "CVE-2022-20566": { "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free caused by l2cap_chan_put" }, @@ -154230,41 +202442,71 @@ "CVE-2018-12931": { "cmt_msg": "" }, + "CVE-2023-52637": { + "cmt_msg": "can: j1939: Fix UAF in j1939_sk_match_filter during setsockopt(SO_J1939_FILTER)" + }, "CVE-2024-23196": { - "cmt_msg": "" + "cmt_msg": "ALSA: hda: fix a possible null-pointer dereference due to data race in snd_hdac_regmap_sync()" }, "CVE-2023-1990": { "cmt_msg": "nfc: st-nci: Fix use after free bug in ndlc_remove due to race condition" }, + "CVE-2023-3863": { + "cmt_msg": "net: nfc: Fix use-after-free caused by nfc_llcp_find_local" + }, "CVE-2021-33098": { "cmt_msg": "ixgbe: fix large MTU request from VF" }, - "CVE-2022-0185": { - "cmt_msg": "vfs: fs_context: fix up param length parsing in legacy_parse_param" + "CVE-2021-28972": { + "cmt_msg": "PCI: rpadlpar: Fix potential drc_name corruption in store functions" }, "CVE-2021-28971": { "cmt_msg": "perf/x86/intel: Fix a crash caused by zero PEBS status" }, + "CVE-2023-52634": { + "cmt_msg": "drm/amd/display: Fix disable_otg_wa logic" + }, "CVE-2022-22942": { "cmt_msg": "drm/vmwgfx: Fix stale file descriptors on failed usercopy" }, "CVE-2021-3739": { "cmt_msg": "btrfs: fix NULL pointer dereference when deleting device by invalid id" }, - "CVE-2022-20166": { - "cmt_msg": "drivers core: Use sysfs_emit and sysfs_emit_at for show(device *...) functions" + "CVE-2020-36782": { + "cmt_msg": "i2c: imx-lpi2c: fix reference leak when pm_runtime_get_sync fails" + }, + "CVE-2020-36783": { + "cmt_msg": "i2c: img-scb: fix reference leak when pm_runtime_get_sync fails" + }, + "CVE-2020-36780": { + "cmt_msg": "i2c: sprd: fix reference leak when pm_runtime_get_sync fails" + }, + "CVE-2020-36781": { + "cmt_msg": "i2c: imx: fix reference leak when pm_runtime_get_sync fails" }, "CVE-2021-3732": { "cmt_msg": "ovl: prevent private clone if bind mount is not allowed" }, + "CVE-2020-36784": { + "cmt_msg": "i2c: cadence: fix reference leak when pm_runtime_get_sync fails" + }, + "CVE-2023-52632": { + "cmt_msg": "drm/amdkfd: Fix lock dependency warning with srcu" + }, "CVE-2024-24860": { "cmt_msg": "Bluetooth: Fix atomicity violation in {min,max}_key_size_set" }, "CVE-2020-27835": { "cmt_msg": "IB/hfi1: Ensure correct mm is used at all times" }, + "CVE-2019-25162": { + "cmt_msg": "i2c: Fix a potential use after free" + }, "CVE-2024-24861": { - "cmt_msg": "" + "cmt_msg": "media: xc4000: Fix atomicity violation in xc4000_get_frequency" + }, + "CVE-2024-26627": { + "cmt_msg": "scsi: core: Move scsi_host_busy() out of host lock for waking up EH handler" }, "CVE-2023-0240": { "cmt_msg": "io_uring: COW io_identity on mismatch" @@ -154275,35 +202517,89 @@ "CVE-2024-25740": { "cmt_msg": "" }, + "CVE-2022-3535": { + "cmt_msg": "net: mvpp2: fix mvpp2 debugfs leak" + }, + "CVE-2022-2978": { + "cmt_msg": "fs: fix UAF/GPF bug in nilfs_mdt_destroy" + }, "CVE-2022-3903": { "cmt_msg": "media: mceusb: Use new usb_control_msg_*() routines" }, + "CVE-2024-26642": { + "cmt_msg": "netfilter: nf_tables: disallow anonymous set with timeout flag" + }, "CVE-2022-3577": { "cmt_msg": "HID: bigben: fix slab-out-of-bounds Write in bigben_probe" }, "CVE-2023-20588": { "cmt_msg": "x86/CPU/AMD: Do not leak quotient data after a division by 0" }, + "CVE-2021-47071": { + "cmt_msg": "uio_hv_generic: Fix a memory leak in error handling paths" + }, "CVE-2021-20226": { "cmt_msg": "io_uring: don't rely on weak ->files references" }, - "CVE-2022-4379": { - "cmt_msg": "NFSD: fix use-after-free in __nfs42_ssc_open()" + "CVE-2021-47073": { + "cmt_msg": "platform/x86: dell-smbios-wmi: Fix oops on rmmod dell_smbios" }, "CVE-2022-44034": { "cmt_msg": "char: pcmcia: remove all the drivers" }, - "CVE-2022-44033": { - "cmt_msg": "char: pcmcia: remove all the drivers" + "CVE-2021-47075": { + "cmt_msg": "nvmet: fix memory leak in nvmet_alloc_ctrl()" }, - "CVE-2022-44032": { - "cmt_msg": "char: pcmcia: remove all the drivers" + "CVE-2021-47074": { + "cmt_msg": "nvme-loop: fix memory leak in nvme_loop_create_ctrl()" + }, + "CVE-2021-47077": { + "cmt_msg": "scsi: qedf: Add pointer checks in qedf_update_link_speed()" + }, + "CVE-2021-47076": { + "cmt_msg": "RDMA/rxe: Return CQE error if invalid lkey was supplied" + }, + "CVE-2021-47170": { + "cmt_msg": "USB: usbfs: Don't WARN about excessively large memory allocations" + }, + "CVE-2021-47078": { + "cmt_msg": "RDMA/rxe: Clear all QP fields if creation failed" + }, + "CVE-2021-47172": { + "cmt_msg": "iio: adc: ad7124: Fix potential overflow due to non sequential channel numbers" + }, + "CVE-2021-47173": { + "cmt_msg": "misc/uss720: fix memory leak in uss720_probe" + }, + "CVE-2022-36123": { + "cmt_msg": "x86: Clear .brk area at early boot" + }, + "CVE-2021-47175": { + "cmt_msg": "net/sched: fq_pie: fix OOB access in the traffic path" }, "CVE-2020-10781": { "cmt_msg": "Revert \"zram: convert remaining CLASS_ATTR() to CLASS_ATTR_RO()\"" }, - "CVE-2023-4207": { - "cmt_msg": "net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free" + "CVE-2021-46951": { + "cmt_msg": "tpm: efi: Use local variable for calculating final log size" + }, + "CVE-2021-46950": { + "cmt_msg": "md/raid1: properly indicate failure when ending a failed write request" + }, + "CVE-2021-46953": { + "cmt_msg": "ACPI: GTDT: Don't corrupt interrupt mappings on watchdow probe failure" + }, + "CVE-2021-46952": { + "cmt_msg": "NFS: fs_context: validate UDP retrans to prevent shift out-of-bounds" + }, + "CVE-2021-46955": { + "cmt_msg": "openvswitch: fix stack OOB read while fragmenting IPv4 packets" + }, + "CVE-2021-46956": { + "cmt_msg": "virtiofs: fix memory leak in virtio_fs_probe()" + }, + "CVE-2021-46959": { + "cmt_msg": "spi: Fix use-after-free with devm_spi_alloc_*" }, "CVE-2020-26139": { "cmt_msg": "mac80211: do not accept/forward invalid EAPOL frames" @@ -154311,45 +202607,87 @@ "CVE-2023-42754": { "cmt_msg": "ipv4: fix null-deref in ipv4_link_failure" }, + "CVE-2024-26772": { + "cmt_msg": "ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal()" + }, + "CVE-2022-3061": { + "cmt_msg": "video: fbdev: i740fb: Error out if 'pixclock' equals zero" + }, "CVE-2021-3609": { "cmt_msg": "can: bcm: delay release of struct bcm_op after synchronize_rcu()" }, + "CVE-2023-52595": { + "cmt_msg": "wifi: rt2x00: restart beacon queue when hardware reset" + }, "CVE-2021-3600": { "cmt_msg": "bpf: Fix 32 bit src register truncation on div/mod" }, "CVE-2021-23133": { "cmt_msg": "net/sctp: fix race condition in sctp_destroy_sock" }, + "CVE-2022-2327": { + "cmt_msg": "io_uring: remove any grabbing of context" + }, + "CVE-2023-52590": { + "cmt_msg": "ocfs2: Avoid touching renamed directory if parent does not change" + }, + "CVE-2024-26676": { + "cmt_msg": "af_unix: Call kfree_skb() for dead unix_(sk)->oob_skb in GC." + }, "CVE-2021-0920": { "cmt_msg": "af_unix: fix garbage collect vs MSG_PEEK" }, "CVE-2022-0168": { "cmt_msg": "cifs: fix NULL ptr dereference in smb2_ioctl_query_info()" }, + "CVE-2024-26622": { + "cmt_msg": "tomoyo: fix UAF write bug in tomoyo_write_control()" + }, "CVE-2020-28374": { "cmt_msg": "scsi: target: Fix XCOPY NAA identifier lookup" }, "CVE-2023-0615": { "cmt_msg": "media: vivid: dev->bitmap_cap wasn't freed in all cases" }, + "CVE-2024-26672": { + "cmt_msg": "drm/amdgpu: Fix variable 'mca_funcs' dereferenced before NULL check in 'amdgpu_mca_smu_get_mca_entry()'" + }, + "CVE-2023-52527": { + "cmt_msg": "ipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data()" + }, "CVE-2023-3006": { "cmt_msg": "arm64: Add AMPERE1 to the Spectre-BHB affected list" }, + "CVE-2024-26787": { + "cmt_msg": "mmc: mmci: stm32: fix DMA API overlapping mappings warning" + }, + "CVE-2023-52522": { + "cmt_msg": "net: fix possible store tearing in neigh_periodic_work()" + }, "CVE-2022-3586": { "cmt_msg": "sch_sfb: Don't assume the skb is still around after enqueueing to child" }, "CVE-2024-0641": { "cmt_msg": "tipc: fix a potential deadlock on &tx->lock" }, + "CVE-2024-26636": { + "cmt_msg": "llc: make llc_ui_sendmsg() more robust against bonding changes" + }, + "CVE-2024-26779": { + "cmt_msg": "wifi: mac80211: fix race condition on enabling fast-xmit" + }, "CVE-2024-26586": { "cmt_msg": "mlxsw: spectrum_acl_tcam: Fix stack corruption" }, - "CVE-2024-0646": { - "cmt_msg": "net: tls, update curr on splice as well" + "CVE-2023-52528": { + "cmt_msg": "net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg" }, "CVE-2020-27825": { "cmt_msg": "tracing: Fix race in trace_open and buffer resize call" }, + "CVE-2024-26623": { + "cmt_msg": "pds_core: Prevent race issues involving the adminq" + }, "CVE-2020-27820": { "cmt_msg": "drm/nouveau: use drm_dev_unplug() during device removal" }, @@ -154380,11 +202718,14 @@ "CVE-2023-6610": { "cmt_msg": "smb: client: fix potential OOB in smb2_dump_detail()" }, + "CVE-2024-26600": { + "cmt_msg": "phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP" + }, "CVE-2023-3390": { "cmt_msg": "netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE" }, - "CVE-2023-3812": { - "cmt_msg": "net: tun: fix bugs for oversize packet when napi frags enabled" + "CVE-2023-28328": { + "cmt_msg": "media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer()" }, "CVE-2020-26143": { "cmt_msg": "" @@ -154395,6 +202736,15 @@ "CVE-2021-33061": { "cmt_msg": "ixgbe: add improvement for MDD response functionality" }, + "CVE-2024-26764": { + "cmt_msg": "fs/aio: Restrict kiocb_set_cancel_fn() to I/O submitted via libaio" + }, + "CVE-2024-26767": { + "cmt_msg": "drm/amd/display: fixed integer types and null check locations" + }, + "CVE-2024-26766": { + "cmt_msg": "IB/hfi1: Fix sdma.h tx->num_descs off-by-one error" + }, "CVE-2024-26589": { "cmt_msg": "bpf: Reject variable offset alu on PTR_TO_FLOW_KEYS" }, @@ -154404,15 +202754,24 @@ "CVE-2023-1476": { "cmt_msg": "" }, + "CVE-2023-4010": { + "cmt_msg": "" + }, "CVE-2021-3864": { "cmt_msg": "" }, + "CVE-2024-26770": { + "cmt_msg": "HID: nvidia-shield: Add missing null pointer checks to LED initialization" + }, "CVE-2022-1652": { "cmt_msg": "floppy: use a statically allocated error counter" }, "CVE-2023-4623": { "cmt_msg": "net/sched: sch_hfsc: Ensure inner classes have fsc curve" }, + "CVE-2021-47043": { + "cmt_msg": "media: venus: core: Fix some resource leaks in the error path of 'venus_probe()'" + }, "CVE-2024-23849": { "cmt_msg": "net/rds: Fix UBSAN: array-index-out-of-bounds in rds_cmsg_recv" }, @@ -154428,8 +202787,8 @@ "CVE-2023-51043": { "cmt_msg": "drm/atomic: Fix potential use-after-free in nonblocking commits" }, - "CVE-2022-2978": { - "cmt_msg": "fs: fix UAF/GPF bug in nilfs_mdt_destroy" + "CVE-2022-1966": { + "cmt_msg": "netfilter: nf_tables: disallow non-stateful expression in sets earlier" }, "CVE-2020-14356": { "cmt_msg": "cgroup: fix cgroup_sk_alloc() for sk_clone_lock()" @@ -154440,21 +202799,33 @@ "CVE-2022-2977": { "cmt_msg": "tpm: fix reference counting for struct tpm_chip" }, + "CVE-2022-20424": { + "cmt_msg": "io_uring: remove io_identity" + }, "CVE-2020-0423": { "cmt_msg": "binder: fix UAF when releasing todo list" }, + "CVE-2022-23222": { + "cmt_msg": "bpf: Replace PTR_TO_XXX_OR_NULL with PTR_TO_XXX | PTR_MAYBE_NULL" + }, "CVE-2022-1789": { "cmt_msg": "KVM: x86/mmu: fix NULL pointer dereference on guest INVPCID" }, + "CVE-2023-25012": { + "cmt_msg": "HID: bigben: use spinlock to safely schedule workers" + }, "CVE-2016-8660": { "cmt_msg": "" }, "CVE-2023-6270": { - "cmt_msg": "" + "cmt_msg": "aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts" }, "CVE-2023-3090": { "cmt_msg": "ipvlan:Fix out-of-bounds caused by unclear skb->cb" }, + "CVE-2022-20422": { + "cmt_msg": "arm64: fix oops in concurrently setting insn_emulation sysctls" + }, "CVE-2023-3772": { "cmt_msg": "xfrm: add NULL check in xfrm_update_ae_params" }, @@ -154467,11 +202838,11 @@ "CVE-2023-1582": { "cmt_msg": "fs/proc: task_mmu.c: don't read mapcount for migration entry" }, - "CVE-2022-1786": { - "cmt_msg": "io_uring: remove io_identity" + "CVE-2021-47162": { + "cmt_msg": "tipc: skb_linearize the head skb when reassembling msgs" }, - "CVE-2022-23222": { - "cmt_msg": "bpf: Replace PTR_TO_XXX_OR_NULL with PTR_TO_XXX | PTR_MAYBE_NULL" + "CVE-2022-21166": { + "cmt_msg": "x86/speculation/mmio: Enable CPU Fill buffer clearing on idle" }, "CVE-2020-25669": { "cmt_msg": "Input: sunkbd - avoid use-after-free in teardown paths" @@ -154485,6 +202856,9 @@ "CVE-2020-25705": { "cmt_msg": "icmp: randomize the global rate limiter" }, + "CVE-2022-20421": { + "cmt_msg": "binder: fix UAF of ref->proc caused by race condition" + }, "CVE-2022-0435": { "cmt_msg": "tipc: improve size validations for received domain records" }, @@ -154492,7 +202866,13 @@ "cmt_msg": "HID: core: Correctly handle ReportSize being zero" }, "CVE-2023-6356": { - "cmt_msg": "" + "cmt_msg": "nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length" + }, + "CVE-2024-26744": { + "cmt_msg": "RDMA/srpt: Support specifying the srpt_service_guid parameter" + }, + "CVE-2024-26648": { + "cmt_msg": "drm/amd/display: Fix variable deferencing before NULL check in edp_setup_replay()" }, "CVE-2021-4135": { "cmt_msg": "netdevsim: Zero-initialize memory for new map's value in function nsim_bpf_map_alloc" @@ -154500,12 +202880,27 @@ "CVE-2023-26607": { "cmt_msg": "ntfs: fix out-of-bounds read in ntfs_attr_find()" }, - "CVE-2023-52456": { - "cmt_msg": "serial: imx: fix tx statemachine deadlock" + "CVE-2023-52513": { + "cmt_msg": "RDMA/siw: Fix connection failure handling" }, "CVE-2019-15239": { "cmt_msg": "unknown" }, + "CVE-2022-3534": { + "cmt_msg": "libbpf: Fix use-after-free in btf_dump_name_dups" + }, + "CVE-2023-52635": { + "cmt_msg": "PM / devfreq: Synchronize devfreq_monitor_[start/stop]" + }, + "CVE-2023-52469": { + "cmt_msg": "drivers/amd/pm: fix a use-after-free in kv_parse_power_table" + }, + "CVE-2023-52594": { + "cmt_msg": "wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus()" + }, + "CVE-2023-4387": { + "cmt_msg": "net: vmxnet3: fix possible use-after-free bugs in vmxnet3_rq_alloc_rx_buf()" + }, "CVE-2021-4037": { "cmt_msg": "xfs: fix up non-directory creation in SGID directories" }, @@ -154524,14 +202919,26 @@ "CVE-2023-20941": { "cmt_msg": "" }, + "CVE-2024-26773": { + "cmt_msg": "ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found()" + }, + "CVE-2023-2194": { + "cmt_msg": "i2c: xgene-slimpro: Fix out-of-bounds bug in xgene_slimpro_i2c_xfer()" + }, "CVE-2021-3347": { "cmt_msg": "futex: Ensure the correct return value from futex_lock_pi()" }, "CVE-2020-10135": { "cmt_msg": "Bluetooth: Consolidate encryption handling in hci_encrypt_cfm" }, - "CVE-2022-1966": { - "cmt_msg": "netfilter: nf_tables: disallow non-stateful expression in sets earlier" + "CVE-2021-47169": { + "cmt_msg": "serial: rp2: use 'request_firmware' instead of 'request_firmware_nowait'" + }, + "CVE-2024-26784": { + "cmt_msg": "pmdomain: arm: Fix NULL dereference on scmi_perf_domain removal" + }, + "CVE-2021-47168": { + "cmt_msg": "NFS: fix an incorrect limit in filelayout_decode_layout()" }, "CVE-2021-3587": { "cmt_msg": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect" @@ -154542,26 +202949,50 @@ "CVE-2022-3533": { "cmt_msg": "" }, - "CVE-2022-3534": { - "cmt_msg": "libbpf: Fix use-after-free in btf_dump_name_dups" + "CVE-2021-47138": { + "cmt_msg": "cxgb4: avoid accessing registers when clearing filters" }, - "CVE-2022-3535": { - "cmt_msg": "net: mvpp2: fix mvpp2 debugfs leak" + "CVE-2021-47139": { + "cmt_msg": "net: hns3: put off calling register_netdev() until client initialize complete" + }, + "CVE-2021-47135": { + "cmt_msg": "mt76: mt7921: fix possible AOOB issue in mt7921_mcu_tx_rate_report" + }, + "CVE-2021-47136": { + "cmt_msg": "net: zero-initialize tc skb extension on allocation" + }, + "CVE-2021-47137": { + "cmt_msg": "net: lantiq: fix memory corruption in RX ring" + }, + "CVE-2024-26808": { + "cmt_msg": "netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain" + }, + "CVE-2021-47131": { + "cmt_msg": "net/tls: Fix use-after-free after the TLS device goes down and up" }, "CVE-2020-36766": { "cmt_msg": "cec-api: prevent leaking memory through hole in structure" }, + "CVE-2021-47133": { + "cmt_msg": "HID: amd_sfh: Fix memory leak in amd_sfh_work" + }, + "CVE-2021-46994": { + "cmt_msg": "can: mcp251x: fix resume from sleep before interface was brought up" + }, + "CVE-2024-26675": { + "cmt_msg": "ppp_async: limit MRU to 64K" + }, "CVE-2021-22600": { "cmt_msg": "net/packet: rx_owner_map depends on pg_vec" }, - "CVE-2023-28328": { - "cmt_msg": "media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer()" + "CVE-2021-46991": { + "cmt_msg": "i40e: Fix use-after-free in i40e_client_subtask()" }, - "CVE-2022-0322": { - "cmt_msg": "sctp: account stream padding length for reconf chunk" + "CVE-2021-46993": { + "cmt_msg": "sched: Fix out-of-bound access in uclamp" }, - "CVE-2023-0386": { - "cmt_msg": "ovl: fail on invalid uid/gid mapping at copy up" + "CVE-2021-46992": { + "cmt_msg": "netfilter: nftables: avoid overflows in nft_hash_buckets()" }, "CVE-2023-6121": { "cmt_msg": "nvmet: nul-terminate the NQNs passed in the connect command" @@ -154569,9 +203000,18 @@ "CVE-2023-28327": { "cmt_msg": "af_unix: Get user_ns from in_skb in unix_diag_get_exact()." }, + "CVE-2023-52638": { + "cmt_msg": "can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock" + }, + "CVE-2021-46998": { + "cmt_msg": "ethernet:enic: Fix a use after free bug in enic_hard_start_xmit" + }, "CVE-2017-13693": { "cmt_msg": "" }, + "CVE-2021-47151": { + "cmt_msg": "interconnect: qcom: bcm-voter: add a missing of_node_put()" + }, "CVE-2017-13694": { "cmt_msg": "" }, @@ -154599,20 +203039,35 @@ "CVE-2021-3760": { "cmt_msg": "nfc: nci: fix the UAF of rf_conn_info object" }, + "CVE-2022-48627": { + "cmt_msg": "vt: fix memory overlapping when deleting chars in the buffer" + }, + "CVE-2023-52593": { + "cmt_msg": "wifi: wfx: fix possible NULL pointer dereference in wfx_set_mfp_ap()" + }, "CVE-2022-4382": { "cmt_msg": "USB: gadgetfs: Fix race between mounting and unmounting" }, - "CVE-2022-36123": { - "cmt_msg": "x86: Clear .brk area at early boot" + "CVE-2021-47180": { + "cmt_msg": "NFC: nci: fix memory leak in nci_allocate_device" + }, + "CVE-2022-48628": { + "cmt_msg": "ceph: drop messages from MDS when unmounting" + }, + "CVE-2022-48629": { + "cmt_msg": "crypto: qcom-rng - ensure buffer for generate is completely filled" }, "CVE-2020-28097": { "cmt_msg": "vgacon: remove software scrollback support" }, + "CVE-2022-4379": { + "cmt_msg": "NFSD: fix use-after-free in __nfs42_ssc_open()" + }, "CVE-2024-24859": { "cmt_msg": "" }, - "CVE-2024-24858": { - "cmt_msg": "" + "CVE-2022-0322": { + "cmt_msg": "sctp: account stream padding length for reconf chunk" }, "CVE-2024-24855": { "cmt_msg": "scsi: lpfc: Fix a possible data race in lpfc_unregister_fcf_rescan()" @@ -154620,12 +203075,18 @@ "CVE-2024-24857": { "cmt_msg": "" }, + "CVE-2023-0386": { + "cmt_msg": "ovl: fail on invalid uid/gid mapping at copy up" + }, "CVE-2021-29264": { "cmt_msg": "gianfar: fix jumbo packets+napi+rx overrun crash" }, "CVE-2021-29265": { "cmt_msg": "usbip: fix stub_dev usbip_sockfd_store() races leading to gpf" }, + "CVE-2024-26673": { + "cmt_msg": "netfilter: nft_ct: sanitize layer 3 and 4 protocol number in custom expectations" + }, "CVE-2021-39648": { "cmt_msg": "usb: gadget: configfs: Fix use-after-free issue with udc_name" }, @@ -154635,24 +203096,63 @@ "CVE-2021-43056": { "cmt_msg": "KVM: PPC: Book3S HV: Make idle_kvm_start_guest() return 0 if it went to guest" }, + "CVE-2023-52569": { + "cmt_msg": "btrfs: remove BUG() after failure to insert delayed dir index item" + }, + "CVE-2023-52568": { + "cmt_msg": "x86/sgx: Resolves SECS reclaim vs. page fault for EAUG race" + }, "CVE-2022-3542": { "cmt_msg": "bnx2x: fix potential memory leak in bnx2x_tpa_stop()" }, + "CVE-2023-52563": { + "cmt_msg": "drm/meson: fix memory leak on ->hpd_notify callback" + }, + "CVE-2021-47001": { + "cmt_msg": "xprtrdma: Fix cwnd update ordering" + }, + "CVE-2023-52561": { + "cmt_msg": "arm64: dts: qcom: sdm845-db845c: Mark cont splash memory region as reserved" + }, + "CVE-2021-47004": { + "cmt_msg": "f2fs: fix to avoid touching checkpointed data in get_victim()" + }, + "CVE-2021-47005": { + "cmt_msg": "PCI: endpoint: Fix NULL pointer dereference for ->get_features()" + }, "CVE-2021-21781": { "cmt_msg": "ARM: ensure the signal page contains defined contents" }, - "CVE-2021-0512": { - "cmt_msg": "HID: make arrays usage and value to be the same" + "CVE-2021-46928": { + "cmt_msg": "parisc: Clear stale IIR value on instruction access rights trap" }, - "CVE-2023-1382": { - "cmt_msg": "tipc: set con sock in tipc_conn_alloc" + "CVE-2021-46929": { + "cmt_msg": "sctp: use call_rcu to free endpoint" + }, + "CVE-2021-46920": { + "cmt_msg": "dmaengine: idxd: Fix clobbering of SWERR overflow bit on writeback" + }, + "CVE-2021-46921": { + "cmt_msg": "locking/qrwlock: Fix ordering in queued_write_lock_slowpath()" }, "CVE-2023-1380": { "cmt_msg": "wifi: brcmfmac: slab-out-of-bounds read in brcmf_get_assoc_ies()" }, + "CVE-2021-46924": { + "cmt_msg": "NFC: st21nfca: Fix memory leak in device probe and remove" + }, + "CVE-2021-46925": { + "cmt_msg": "net/smc: fix kernel panic caused by race of smc_sock" + }, + "CVE-2021-46926": { + "cmt_msg": "ALSA: hda: intel-sdw-acpi: harden detection of controller" + }, "CVE-2020-0347": { "cmt_msg": "" }, + "CVE-2023-52591": { + "cmt_msg": "reiserfs: Avoid touching renamed directory if parent does not change" + }, "CVE-2022-41222": { "cmt_msg": "mm/mremap: hold the rmap lock in write mode when moving page table entries." }, @@ -154671,8 +203171,8 @@ "CVE-2023-20569": { "cmt_msg": "x86/bugs: Increase the x86 bugs vector size to two u32s" }, - "CVE-2022-0812": { - "cmt_msg": "xprtrdma: fix incorrect header size calculations" + "CVE-2021-29646": { + "cmt_msg": "tipc: better validate user input in tipc_nl_retrieve_key()" }, "CVE-2021-29647": { "cmt_msg": "net: qrtr: fix a kernel-infoleak in qrtr_recvmsg()" @@ -154680,12 +203180,18 @@ "CVE-2021-33656": { "cmt_msg": "vt: drop old FONT ioctls" }, + "CVE-2024-26720": { + "cmt_msg": "mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again" + }, "CVE-2021-33655": { "cmt_msg": "fbcon: Disallow setting font bigger than screen size" }, "CVE-2022-41858": { "cmt_msg": "drivers: net: slip: fix NPD bug in sl_tx_timeout()" }, + "CVE-2024-26726": { + "cmt_msg": "btrfs: don't drop extent_map for free space inode on write error" + }, "CVE-2022-3176": { "cmt_msg": "io_uring: fix UAF due to missing POLLFREE handling" }, @@ -154722,24 +203228,36 @@ "CVE-2024-0584": { "cmt_msg": "ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet" }, + "CVE-2024-26700": { + "cmt_msg": "drm/amd/display: Fix MST Null Ptr for RV" + }, "CVE-2020-0465": { "cmt_msg": "HID: core: Sanitize event code and type when mapping input" }, "CVE-2021-1048": { "cmt_msg": "fix regression in \"epoll: Keep a reference on files added to the check list\"" }, + "CVE-2023-52516": { + "cmt_msg": "dma-debug: don't call __dma_entry_alloc_check_leak() under free_entries_lock" + }, "CVE-2021-4218": { "cmt_msg": "sysctl: pass kernel pointers to ->proc_handler" }, + "CVE-2023-52515": { + "cmt_msg": "RDMA/srp: Do not call scsi_done() from srp_abort()" + }, "CVE-2019-15902": { "cmt_msg": "unknown" }, - "CVE-2024-25739": { - "cmt_msg": "" + "CVE-2023-52510": { + "cmt_msg": "ieee802154: ca8210: Fix a potential UAF in ca8210_probe" }, "CVE-2023-3358": { "cmt_msg": "HID: intel_ish-hid: Add check for ishtp_dma_tx_map" }, + "CVE-2023-52633": { + "cmt_msg": "um: time-travel: fix time corruption" + }, "CVE-2024-0340": { "cmt_msg": "vhost: use kzalloc() instead of kmalloc() followed by memset()" }, @@ -154747,7 +203265,7 @@ "cmt_msg": "" }, "CVE-2023-6536": { - "cmt_msg": "" + "cmt_msg": "nvmet-tcp: fix a crash in nvmet_req_complete()" }, "CVE-2021-33624": { "cmt_msg": "bpf: Inherit expanded/patched seen count from old aux data" @@ -154758,8 +203276,8 @@ "CVE-2021-27365": { "cmt_msg": "scsi: iscsi: Ensure sysfs attributes are limited to PAGE_SIZE" }, - "CVE-2021-3752": { - "cmt_msg": "Bluetooth: fix use-after-free error in lock_sock_nested()" + "CVE-2021-27364": { + "cmt_msg": "scsi: iscsi: Restrict sessions and handles to admin capabilities" }, "CVE-2021-27363": { "cmt_msg": "scsi: iscsi: Restrict sessions and handles to admin capabilities" @@ -154773,21 +203291,39 @@ "CVE-2024-1151": { "cmt_msg": "net: openvswitch: limit the number of recursions from action sets" }, + "CVE-2024-26659": { + "cmt_msg": "xhci: handle isoc Babble and Buffer Overrun events properly" + }, + "CVE-2024-26658": { + "cmt_msg": "bcachefs: grab s_umount only if snapshotting" + }, "CVE-2010-5321": { "cmt_msg": "" }, "CVE-2021-20322": { "cmt_msg": "ipv6: make exception cache less predictible" }, + "CVE-2024-26654": { + "cmt_msg": "ALSA: sh: aica: reorder cleanup operations to avoid UAF bugs" + }, "CVE-2021-20320": { "cmt_msg": "s390/bpf: Fix optimizing out zero-extensions" }, "CVE-2021-20321": { "cmt_msg": "ovl: fix missing negative dentry check in ovl_rename()" }, + "CVE-2024-26651": { + "cmt_msg": "sr9800: Add check for usbnet_get_endpoints" + }, + "CVE-2024-26650": { + "cmt_msg": "platform/x86: p2sb: Allow p2sb_bar() calls during PCI device probe" + }, "CVE-2022-42896": { "cmt_msg": "Bluetooth: L2CAP: Fix accepting connection request for invalid SPSM" }, + "CVE-2023-3812": { + "cmt_msg": "net: tun: fix bugs for oversize packet when napi frags enabled" + }, "CVE-2023-7192": { "cmt_msg": "netfilter: ctnetlink: fix possible refcount leak in ctnetlink_create_conntrack()" }, @@ -154800,15 +203336,36 @@ "CVE-2022-1048": { "cmt_msg": "ALSA: pcm: Fix races among concurrent hw_params and hw_free calls" }, + "CVE-2023-52475": { + "cmt_msg": "Input: powermate - fix use-after-free in powermate_config_complete" + }, + "CVE-2023-52474": { + "cmt_msg": "IB/hfi1: Fix bugs with non-PAGE_SIZE-end multi-iovec user SDMA requests" + }, + "CVE-2023-52477": { + "cmt_msg": "usb: hub: Guard against accesses to uninitialized BOS descriptors" + }, + "CVE-2023-52476": { + "cmt_msg": "perf/x86/lbr: Filter vsyscall addresses" + }, "CVE-2023-22995": { "cmt_msg": "usb: dwc3: dwc3-qcom: Add missing platform_device_put() in dwc3_qcom_acpi_register_core" }, + "CVE-2023-52340": { + "cmt_msg": "ipv6: remove max_size check inline with ipv4" + }, "CVE-2024-21803": { "cmt_msg": "" }, "CVE-2023-4563": { "cmt_msg": "netfilter: nf_tables: don't skip expired elements during walk" }, + "CVE-2023-52479": { + "cmt_msg": "ksmbd: fix uaf in smb20_oplock_break_ack" + }, + "CVE-2023-52478": { + "cmt_msg": "HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect" + }, "CVE-2021-3542": { "cmt_msg": "" }, @@ -154819,11 +203376,14 @@ "cmt_msg": "drm/msm/dpu: Add check for pstates" }, "CVE-2024-22099": { - "cmt_msg": "" + "cmt_msg": "Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security" }, "CVE-2023-30456": { "cmt_msg": "KVM: nVMX: add missing consistency checks for CR0 and CR4" }, + "CVE-2022-48626": { + "cmt_msg": "moxart: fix potential use-after-free on remove path" + }, "CVE-2020-12656": { "cmt_msg": "sunrpc: check that domain table is empty at module unload." }, @@ -154869,6 +203429,12 @@ "CVE-2024-25741": { "cmt_msg": "" }, + "CVE-2024-26778": { + "cmt_msg": "fbdev: savage: Error out if pixclock equals zero" + }, + "CVE-2024-26809": { + "cmt_msg": "netfilter: nft_set_pipapo: release elements in clone only from destroy path" + }, "CVE-2022-26966": { "cmt_msg": "sr9700: sanity check for packet length" }, @@ -154878,12 +203444,48 @@ "CVE-2023-1989": { "cmt_msg": "Bluetooth: btsdio: fix use after free bug in btsdio_remove due to unfinished work" }, + "CVE-2024-26806": { + "cmt_msg": "spi: cadence-qspi: remove system-wide suspend helper calls from runtime PM hooks" + }, "CVE-2021-37159": { "cmt_msg": "usb: hso: fix error handling code of hso_create_net_device" }, + "CVE-2024-26801": { + "cmt_msg": "Bluetooth: Avoid potential use-after-free in hci_error_reset" + }, + "CVE-2024-26802": { + "cmt_msg": "stmmac: Clear variable when destroying workqueue" + }, + "CVE-2023-52508": { + "cmt_msg": "nvme-fc: Prevent null pointer dereference in nvme_fc_io_getuuid()" + }, + "CVE-2023-52606": { + "cmt_msg": "powerpc/lib: Validate size for vector operations" + }, + "CVE-2023-52607": { + "cmt_msg": "powerpc/mm: Fix null-pointer dereference in pgtable_cache_add" + }, + "CVE-2023-52604": { + "cmt_msg": "FS:JFS:UBSAN:array-index-out-of-bounds in dbAdjTree" + }, + "CVE-2023-52531": { + "cmt_msg": "wifi: iwlwifi: mvm: Fix a memory corruption issue" + }, + "CVE-2023-52602": { + "cmt_msg": "jfs: fix slab-out-of-bounds Read in dtSearch" + }, + "CVE-2023-52603": { + "cmt_msg": "UBSAN: array-index-out-of-bounds in dtSplitRoot" + }, "CVE-2022-25265": { "cmt_msg": "" }, + "CVE-2023-52601": { + "cmt_msg": "jfs: fix array-index-out-of-bounds in dbAdjTree" + }, + "CVE-2023-52609": { + "cmt_msg": "binder: fix race between mmput() and do_exit()" + }, "CVE-2022-21499": { "cmt_msg": "lockdown: also lock down previous kgdb use" }, @@ -154911,42 +203513,90 @@ "CVE-2023-0160": { "cmt_msg": "bpf, sockmap: fix deadlocks in the sockhash and sockmap" }, + "CVE-2023-52506": { + "cmt_msg": "LoongArch: Set all reserved memblocks on Node#0 at initialization" + }, "CVE-2022-2663": { "cmt_msg": "netfilter: nf_conntrack_irc: Fix forged IP logic" }, + "CVE-2021-47049": { + "cmt_msg": "Drivers: hv: vmbus: Use after free in __vmbus_open()" + }, + "CVE-2024-26782": { + "cmt_msg": "mptcp: fix double-free on socket dismantle" + }, "CVE-2022-43750": { "cmt_msg": "usb: mon: make mmapped memory read only" }, "CVE-2023-0047": { "cmt_msg": "mm, oom: do not trigger out_of_memory from the #PF" }, + "CVE-2021-47046": { + "cmt_msg": "drm/amd/display: Fix off by one in hdmi_14_process_transaction()" + }, "CVE-2023-0045": { "cmt_msg": "x86/bugs: Flush IBP in ib_prctl_set()" }, - "CVE-2023-4010": { - "cmt_msg": "" + "CVE-2021-47041": { + "cmt_msg": "nvmet-tcp: fix incorrect locking in state_change sk callback" }, - "CVE-2022-38457": { - "cmt_msg": "drm/vmwgfx: Remove rcu locks from user resources" + "CVE-2020-36787": { + "cmt_msg": "media: aspeed: fix clock handling logic" }, - "CVE-2022-20424": { - "cmt_msg": "io_uring: remove io_identity" + "CVE-2021-47167": { + "cmt_msg": "NFS: Fix an Oopsable condition in __nfs_pageio_add_request()" }, - "CVE-2022-20422": { - "cmt_msg": "arm64: fix oops in concurrently setting insn_emulation sysctls" + "CVE-2021-47166": { + "cmt_msg": "NFS: Don't corrupt the value of pg_bytes_written in nfs_do_recoalesce()" }, - "CVE-2022-20421": { - "cmt_msg": "binder: fix UAF of ref->proc caused by race condition" + "CVE-2021-47165": { + "cmt_msg": "drm/meson: fix shutdown crash when component not probed" + }, + "CVE-2021-47163": { + "cmt_msg": "tipc: wait and exit until all work queues are done" + }, + "CVE-2021-46969": { + "cmt_msg": "bus: mhi: core: Fix invalid error returning in mhi_queue" + }, + "CVE-2021-47161": { + "cmt_msg": "spi: spi-fsl-dspi: Fix a resource leak in an error handling path" + }, + "CVE-2021-47160": { + "cmt_msg": "net: dsa: mt7530: fix VLAN traffic leaks" }, "CVE-2023-4385": { "cmt_msg": "fs: jfs: fix possible NULL pointer dereference in dbFree()" }, - "CVE-2023-4387": { - "cmt_msg": "net: vmxnet3: fix possible use-after-free bugs in vmxnet3_rq_alloc_rx_buf()" + "CVE-2021-46965": { + "cmt_msg": "mtd: physmap: physmap-bt1-rom: Fix unintentional stack access" + }, + "CVE-2021-46966": { + "cmt_msg": "ACPI: custom_method: fix potential use-after-free issue" + }, + "CVE-2021-46960": { + "cmt_msg": "cifs: Return correct error code from smb2_get_enc_key" + }, + "CVE-2021-46961": { + "cmt_msg": "irqchip/gic-v3: Do not enable irqs when handling spurious interrups" + }, + "CVE-2021-46962": { + "cmt_msg": "mmc: uniphier-sd: Fix a resource leak in the remove function" + }, + "CVE-2021-46963": { + "cmt_msg": "scsi: qla2xxx: Fix crash in qla2xxx_mqueuecommand()" }, "CVE-2019-19378": { "cmt_msg": "" }, + "CVE-2023-52482": { + "cmt_msg": "x86/srso: Add SRSO mitigation for Hygon processors" + }, + "CVE-2023-52599": { + "cmt_msg": "jfs: fix array-index-out-of-bounds in diNewExt" + }, + "CVE-2022-1016": { + "cmt_msg": "netfilter: nf_tables: initialize registers in nft_do_chain()" + }, "CVE-2020-4788": { "cmt_msg": "powerpc/64s: flush L1D on kernel entry" }, @@ -154956,6 +203606,9 @@ "CVE-2022-36879": { "cmt_msg": "xfrm: xfrm_policy: fix a possible double xfrm_pols_put() in xfrm_bundle_lookup()" }, + "CVE-2023-52565": { + "cmt_msg": "media: uvcvideo: Fix OOB read" + }, "CVE-2021-28691": { "cmt_msg": "xen-netback: take a reference to the RX task thread" }, @@ -154986,9 +203639,6 @@ "CVE-2021-3612": { "cmt_msg": "Input: joydev - prevent potential read overflow in ioctl" }, - "CVE-2021-29646": { - "cmt_msg": "tipc: better validate user input in tipc_nl_retrieve_key()" - }, "CVE-2020-24503": { "cmt_msg": "" }, @@ -155013,9 +203663,15 @@ "CVE-2021-0937": { "cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write" }, + "CVE-2023-52621": { + "cmt_msg": "bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers" + }, "CVE-2022-1263": { "cmt_msg": "KVM: avoid NULL pointer dereference in kvm_dirty_ring_push" }, + "CVE-2023-52610": { + "cmt_msg": "net/sched: act_ct: fix skb leak and crash on ooo frags" + }, "CVE-2021-35477": { "cmt_msg": "bpf: Introduce BPF nospec instruction for mitigating Spectre v4" }, @@ -155037,8 +203693,14 @@ "CVE-2021-37576": { "cmt_msg": "KVM: PPC: Book3S: Fix H_RTAS rets buffer overflow" }, + "CVE-2024-26775": { + "cmt_msg": "aoe: avoid potential deadlock at set_capacity" + }, + "CVE-2021-47179": { + "cmt_msg": "NFSv4: Fix a NULL pointer dereference in pnfs_mark_matching_lsegs_return()" + }, "CVE-2023-7042": { - "cmt_msg": "" + "cmt_msg": "wifi: ath10k: fix NULL pointer dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev()" }, "CVE-2022-3594": { "cmt_msg": "r8152: Rate limit overflow messages" @@ -155046,30 +203708,60 @@ "CVE-2022-3595": { "cmt_msg": "cifs: fix double-fault crash during ntlmssp" }, + "CVE-2023-52559": { + "cmt_msg": "iommu/vt-d: Avoid memory allocation in iommu_suspend()" + }, "CVE-2023-47233": { - "cmt_msg": "" + "cmt_msg": "wifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach" }, "CVE-2020-27815": { "cmt_msg": "jfs: Fix array index bounds check in dbAdjTree" }, + "CVE-2023-52629": { + "cmt_msg": "sh: push-switch: Reorder cleanup operations to avoid use-after-free bug" + }, "CVE-2022-23041": { "cmt_msg": "xen/9p: use alloc/free_pages_exact()" }, "CVE-2022-1462": { "cmt_msg": "tty: use new tty_insert_flip_string_and_push_buffer() in pty_write()" }, + "CVE-2024-26758": { + "cmt_msg": "md: Don't ignore suspended array in md_check_recovery()" + }, + "CVE-2024-26610": { + "cmt_msg": "wifi: iwlwifi: fix a memory corruption" + }, "CVE-2023-6606": { "cmt_msg": "smb: client: fix OOB in smbCalcSize()" }, + "CVE-2024-26614": { + "cmt_msg": "tcp: make sure init the accept_queue's spinlocks once" + }, "CVE-2020-27777": { "cmt_msg": "powerpc/rtas: Restrict RTAS requests from userspace" }, + "CVE-2024-26751": { + "cmt_msg": "ARM: ep93xx: Add terminator to gpiod_lookup_table" + }, + "CVE-2024-26752": { + "cmt_msg": "l2tp: pass correct message length to ip6_append_data" + }, "CVE-2020-27673": { "cmt_msg": "xen/events: add a proper barrier to 2-level uevent unmasking" }, + "CVE-2024-26754": { + "cmt_msg": "gtp: fix use-after-free and null-ptr-deref in gtp_genl_dump_pdp()" + }, "CVE-2020-27675": { "cmt_msg": "xen/events: avoid removing an event channel while handling it" }, + "CVE-2024-26756": { + "cmt_msg": "md: Don't register sync_thread for reshape directly" + }, + "CVE-2024-26757": { + "cmt_msg": "md: Don't ignore read-only array in md_check_recovery()" + }, "CVE-2023-52439": { "cmt_msg": "uio: Fix use-after-free in uio_open" }, @@ -155100,12 +203792,27 @@ "CVE-2022-2964": { "cmt_msg": "net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup" }, + "CVE-2024-26688": { + "cmt_msg": "fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super" + }, + "CVE-2024-23307": { + "cmt_msg": "md/raid5: fix atomicity violation in raid5_cache_count" + }, "CVE-2022-2961": { "cmt_msg": "" }, "CVE-2021-3506": { "cmt_msg": "f2fs: fix to avoid out-of-bounds memory access" }, + "CVE-2024-26680": { + "cmt_msg": "net: atlantic: Fix DMA mapping for PTP hwts ring" + }, + "CVE-2024-26686": { + "cmt_msg": "fs/proc: do_task_stat: use sig->stats_lock to gather the threads/children stats" + }, + "CVE-2024-26687": { + "cmt_msg": "xen/events: close evtchn after mapping cleanup" + }, "CVE-2023-51779": { "cmt_msg": "Bluetooth: af_bluetooth: Fix Use-After-Free in bt_sock_recvmsg" }, @@ -155121,14 +203828,17 @@ "CVE-2010-4563": { "cmt_msg": "" }, + "CVE-2021-47006": { + "cmt_msg": "ARM: 9064/1: hw_breakpoint: Do not directly check the event's overflow_handler hook" + }, "CVE-2023-1249": { "cmt_msg": "coredump: Use the vma snapshot in fill_files_note" }, "CVE-2023-2163": { "cmt_msg": "bpf: Fix incorrect verifier pruning due to missing register precision taints" }, - "CVE-2023-2162": { - "cmt_msg": "scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress" + "CVE-2020-14331": { + "cmt_msg": "vgacon: Fix for missing check in scrollback handling" }, "CVE-2023-45871": { "cmt_msg": "igb: set max size RX buffer when store bad packet is enabled" @@ -155139,12 +203849,18 @@ "CVE-2023-0266": { "cmt_msg": "ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF" }, - "CVE-2023-1838": { - "cmt_msg": "Fix double fget() in vhost_net_set_backend()" + "CVE-2021-0512": { + "cmt_msg": "HID: make arrays usage and value to be the same" }, "CVE-2021-3483": { "cmt_msg": "firewire: nosy: Fix a use-after-free bug in nosy_ioctl()" }, + "CVE-2024-26663": { + "cmt_msg": "tipc: Check the bearer type before calling tipc_udp_nl_bearer_add()" + }, + "CVE-2024-26598": { + "cmt_msg": "KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache" + }, "CVE-2023-6040": { "cmt_msg": "netfilter: nf_tables: Reject tables of unsupported family" }, @@ -155157,12 +203873,18 @@ "CVE-2022-24448": { "cmt_msg": "NFSv4: Handle case where the lookup of a directory fails" }, - "CVE-2024-26598": { - "cmt_msg": "KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache" + "CVE-2023-52498": { + "cmt_msg": "PM: sleep: Fix possible deadlocks in core system-wide PM code" }, "CVE-2021-4023": { "cmt_msg": "io-wq: fix cancellation on create-worker failure" }, + "CVE-2023-52640": { + "cmt_msg": "fs/ntfs3: Fix oob in ntfs_listxattr" + }, + "CVE-2023-52641": { + "cmt_msg": "fs/ntfs3: Add NULL ptr dereference checking at the end of attr_allocate_frame()" + }, "CVE-2021-22555": { "cmt_msg": "netfilter: x_tables: fix compat match/target pad out-of-bound write" }, @@ -155172,26 +203894,38 @@ "CVE-2021-0399": { "cmt_msg": "" }, + "CVE-2023-52488": { + "cmt_msg": "serial: sc16is7xx: convert from _raw_ to _noinc_ regmap functions for FIFO" + }, "CVE-2020-36691": { "cmt_msg": "netlink: limit recursion depth in policy validation" }, + "CVE-2021-47070": { + "cmt_msg": "uio_hv_generic: Fix another memory leak in error handling paths" + }, "CVE-2023-42755": { "cmt_msg": "net/sched: Retire rsvp classifier" }, "CVE-2020-36516": { "cmt_msg": "ipv4: avoid using shared IP generator for connected sockets" }, + "CVE-2023-52486": { + "cmt_msg": "drm: Don't unref the same fb many times by mistake due to deadlock handling" + }, + "CVE-2023-52480": { + "cmt_msg": "ksmbd: fix race condition between session lookup and expire" + }, "CVE-2012-4542": { "cmt_msg": "" }, "CVE-2023-42753": { "cmt_msg": "netfilter: ipset: add the missing IP_SET_HASH_WITH_NET0 macro for ip_set_hash_netportnet.c" }, - "CVE-2023-42752": { - "cmt_msg": "igmp: limit igmpv3_newpack() packet size to IP_MAX_MTU" + "CVE-2023-1838": { + "cmt_msg": "Fix double fget() in vhost_net_set_backend()" }, - "CVE-2023-4128": { - "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free" + "CVE-2023-1382": { + "cmt_msg": "tipc: set con sock in tipc_conn_alloc" }, "CVE-2023-4244": { "cmt_msg": "netfilter: nf_tables: fix GC transaction races with netns and netlink event exit path" @@ -155205,6 +203939,9 @@ "CVE-2023-3609": { "cmt_msg": "net/sched: cls_u32: Fix reference counter leak leading to overflow" }, + "CVE-2022-44033": { + "cmt_msg": "char: pcmcia: remove all the drivers" + }, "CVE-2022-1974": { "cmt_msg": "nfc: replace improper check device_is_registered() in netlink related functions" }, @@ -155214,8 +203951,20 @@ "CVE-2022-1972": { "cmt_msg": "netfilter: nf_tables: sanitize nft_set_desc_concat_parse()" }, - "CVE-2021-28972": { - "cmt_msg": "PCI: rpadlpar: Fix potential drc_name corruption in store functions" + "CVE-2023-52491": { + "cmt_msg": "media: mtk-jpeg: Fix use after free bug due to error path handling in mtk_jpeg_dec_device_run" + }, + "CVE-2022-44032": { + "cmt_msg": "char: pcmcia: remove all the drivers" + }, + "CVE-2020-36777": { + "cmt_msg": "media: dvbdev: Fix memory leak in dvb_media_device_free()" + }, + "CVE-2021-47082": { + "cmt_msg": "tun: avoid double free in tun_free_netdev" + }, + "CVE-2021-47083": { + "cmt_msg": "pinctrl: mediatek: fix global-out-of-bounds issue" }, "CVE-2021-20292": { "cmt_msg": "drm/ttm/nouveau: don't call tt destroy callback on alloc failure." @@ -155223,11 +203972,29 @@ "CVE-2021-31916": { "cmt_msg": "dm ioctl: fix out of bounds array access when no devices" }, + "CVE-2021-47086": { + "cmt_msg": "phonet/pep: refuse to enable an unbound pipe" + }, "CVE-2022-32981": { "cmt_msg": "powerpc/32: Fix overread/overwrite of thread_struct via ptrace" }, - "CVE-2022-3424": { - "cmt_msg": "misc: sgi-gru: fix use-after-free error in gru_set_context_option, gru_fault and gru_handle_user_call_os" + "CVE-2021-47122": { + "cmt_msg": "net: caif: fix memory leak in caif_device_notify" + }, + "CVE-2021-47121": { + "cmt_msg": "net: caif: fix memory leak in cfusbl_device_notify" + }, + "CVE-2021-47120": { + "cmt_msg": "HID: magicmouse: fix NULL-deref on disconnect" + }, + "CVE-2021-47126": { + "cmt_msg": "ipv6: Fix KASAN: slab-out-of-bounds Read in fib6_nh_flush_exceptions" + }, + "CVE-2020-36779": { + "cmt_msg": "i2c: stm32f7: fix reference leak when pm_runtime_get_sync fails" + }, + "CVE-2020-36778": { + "cmt_msg": "i2c: xiic: fix reference leak when pm_runtime_get_sync fails" }, "CVE-2023-2269": { "cmt_msg": "dm ioctl: fix nested locking in table_clear() to remove deadlock concern" @@ -155235,6 +204002,12 @@ "CVE-2023-0394": { "cmt_msg": "ipv6: raw: Deduct extension header length in rawv6_push_pending_frames" }, + "CVE-2021-47171": { + "cmt_msg": "net: usb: fix memory leak in smsc75xx_bind" + }, + "CVE-2024-26615": { + "cmt_msg": "net/smc: fix illegal rmb_desc access in SMC-D connection dump" + }, "CVE-2022-3108": { "cmt_msg": "drm/amdkfd: Check for null pointer after calling kmemdup" }, @@ -155259,6 +204032,9 @@ "CVE-2020-3702": { "cmt_msg": "ath: Use safer key clearing with key cache entries" }, + "CVE-2023-52485": { + "cmt_msg": "drm/amd/display: Wake DMCUB before sending a command" + }, "CVE-2021-3653": { "cmt_msg": "KVM: nSVM: avoid picking up unsupported bits from L2 in int_ctl (CVE-2021-3653)" }, @@ -155283,12 +204059,18 @@ "CVE-2021-3714": { "cmt_msg": "" }, + "CVE-2024-26733": { + "cmt_msg": "arp: Prevent overflow in arp_req_get()." + }, "CVE-2021-3896": { "cmt_msg": "isdn: cpai: check ctr->cnr to avoid array index out of bound" }, "CVE-2021-3894": { "cmt_msg": "sctp: account stream padding length for reconf chunk" }, + "CVE-2021-47177": { + "cmt_msg": "iommu/vt-d: Fix sysfs leak in alloc_iommu()" + }, "CVE-2021-3892": { "cmt_msg": "" }, @@ -155334,11 +204116,29 @@ "CVE-2022-33744": { "cmt_msg": "xen/arm: Fix race in RB-tree based P2M accounting" }, + "CVE-2023-52596": { + "cmt_msg": "sysctl: Fix out of bounds access for empty sysctl registers" + }, + "CVE-2021-47016": { + "cmt_msg": "m68k: mvme147,mvme16x: Don't wipe PCC timer config bits" + }, + "CVE-2021-47015": { + "cmt_msg": "bnxt_en: Fix RX consumer index logic in the error path." + }, "CVE-2023-52443": { "cmt_msg": "apparmor: avoid crash when parsed profile name is empty" }, - "CVE-2022-2327": { - "cmt_msg": "io_uring: remove any grabbing of context" + "CVE-2021-47013": { + "cmt_msg": "net:emac/emac-mac: Fix a use after free in emac_mac_tx_buf_send" + }, + "CVE-2021-47012": { + "cmt_msg": "RDMA/siw: Fix a use after free in siw_alloc_mr" + }, + "CVE-2021-47158": { + "cmt_msg": "net: dsa: sja1105: add error handling in sja1105_setup()" + }, + "CVE-2021-47010": { + "cmt_msg": "net: Only allow init netns to set default tcp cong to a restricted algo" }, "CVE-2022-1280": { "cmt_msg": "drm: avoid circular locks in drm_mode_getconnector" @@ -155346,20 +204146,32 @@ "CVE-2020-12888": { "cmt_msg": "vfio-pci: Invalidate mmaps and block MMIO access on disabled memory" }, - "CVE-2023-2194": { - "cmt_msg": "i2c: xgene-slimpro: Fix out-of-bounds bug in xgene_slimpro_i2c_xfer()" + "CVE-2021-47153": { + "cmt_msg": "i2c: i801: Don't generate an interrupt on bus reset" }, - "CVE-2023-52445": { - "cmt_msg": "media: pvrusb2: fix use after free on context disconnection" + "CVE-2021-47150": { + "cmt_msg": "net: fec: fix the potential memory leak in fec_enet_init()" }, - "CVE-2022-41218": { - "cmt_msg": "media: dvb-core: Fix UAF due to refcount races at releasing" + "CVE-2021-47018": { + "cmt_msg": "powerpc/64: Fix the definition of the fixmap area" }, - "CVE-2020-14331": { - "cmt_msg": "vgacon: Fix for missing check in scrollback handling" + "CVE-2021-46936": { + "cmt_msg": "net: fix use-after-free in tw_timer_handler" }, - "CVE-2023-52438": { - "cmt_msg": "binder: fix use-after-free in shinker's callback" + "CVE-2021-46935": { + "cmt_msg": "binder: fix async_free_space accounting for empty parcels" + }, + "CVE-2021-46934": { + "cmt_msg": "i2c: validate user data in compat ioctl" + }, + "CVE-2021-46933": { + "cmt_msg": "usb: gadget: f_fs: Clear ffs_eventfd in ffs_data_clear." + }, + "CVE-2021-46932": { + "cmt_msg": "Input: appletouch - initialize work before device registration" + }, + "CVE-2021-46930": { + "cmt_msg": "usb: mtu3: fix list_head check warning" }, "CVE-2022-36946": { "cmt_msg": "netfilter: nf_queue: do not allow packet truncation below transport header offset" @@ -155373,11 +204185,20 @@ "CVE-2021-0448": { "cmt_msg": "netfilter: ctnetlink: add a range check for l3/l4 protonum" }, - "CVE-2022-21166": { - "cmt_msg": "x86/speculation/mmio: Enable CPU Fill buffer clearing on idle" + "CVE-2021-47103": { + "cmt_msg": "inet: fully convert sk->sk_rx_dst to RCU rules" + }, + "CVE-2021-46939": { + "cmt_msg": "tracing: Restructure trace_clock_global() to never block" + }, + "CVE-2021-46938": { + "cmt_msg": "dm rq: fix double free of blk_mq_tag_set in dev remove after table load fails" + }, + "CVE-2021-47105": { + "cmt_msg": "ice: xsk: return xsk buffers back to pool when cleaning the ring" }, "CVE-2024-0841": { - "cmt_msg": "" + "cmt_msg": "fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super" }, "CVE-2021-29650": { "cmt_msg": "netfilter: x_tables: Use correct memory barriers." @@ -155403,6 +204224,9 @@ "CVE-2020-29534": { "cmt_msg": "io_uring: don't rely on weak ->files references" }, + "CVE-2024-26748": { + "cmt_msg": "usb: cdns3: fix memory double free when handle zero packet" + }, "CVE-2022-1198": { "cmt_msg": "drivers: hamradio: 6pack: fix UAF bug caused by mod_timer()" }, @@ -155439,15 +204263,36 @@ "CVE-2022-45886": { "cmt_msg": "media: dvb-core: Fix use-after-free due on race condition at dvb_net" }, + "CVE-2023-52509": { + "cmt_msg": "ravb: Fix use-after-free issue in ravb_tx_timeout_work()" + }, "CVE-2023-46343": { "cmt_msg": "nfc: nci: fix possible NULL pointer dereference in send_acknowledge()" }, "CVE-2024-25744": { "cmt_msg": "x86/coco: Disable 32-bit emulation by default on TDX and SEV" }, + "CVE-2023-52504": { + "cmt_msg": "x86/alternatives: Disable KASAN in apply_alternatives()" + }, + "CVE-2023-52507": { + "cmt_msg": "nfc: nci: assert requested protocol is valid" + }, "CVE-2023-2124": { "cmt_msg": "xfs: verify buffer contents when we skip log replay" }, + "CVE-2023-52501": { + "cmt_msg": "ring-buffer: Do not attempt to read past \"commit\"" + }, + "CVE-2023-52500": { + "cmt_msg": "scsi: pm80xx: Avoid leaking tags when processing OPC_INB_SET_CONTROLLER_CONFIG command" + }, + "CVE-2023-52503": { + "cmt_msg": "tee: amdtee: fix use-after-free vulnerability in amdtee_close_session" + }, + "CVE-2023-52502": { + "cmt_msg": "net: nfc: fix races in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn()" + }, "CVE-2023-1281": { "cmt_msg": "net/sched: tcindex: update imperfect hash filters respecting rcu" }, @@ -155469,12 +204314,27 @@ "CVE-2022-27672": { "cmt_msg": "x86/speculation: Identify processors vulnerable to SMT RSB predictions" }, + "CVE-2024-26668": { + "cmt_msg": "netfilter: nft_limit: reject configurations that cause integer overflow" + }, + "CVE-2024-26669": { + "cmt_msg": "net/sched: flower: Fix chain template offload" + }, + "CVE-2021-47146": { + "cmt_msg": "mld: fix panic in mld_newpack()" + }, + "CVE-2022-38457": { + "cmt_msg": "drm/vmwgfx: Remove rcu locks from user resources" + }, "CVE-2015-2877": { "cmt_msg": "" }, "CVE-2023-26242": { "cmt_msg": "" }, + "CVE-2024-26664": { + "cmt_msg": "hwmon: (coretemp) Fix out-of-bounds memory access" + }, "CVE-2019-16089": { "cmt_msg": "" }, @@ -155484,433 +204344,1142 @@ "CVE-2021-38199": { "cmt_msg": "NFSv4: Initialise connection to the server in nfs4_alloc_client()" }, - "CVE-2022-1679": { - "cmt_msg": "ath9k: fix use-after-free in ath9k_hif_usb_rx_cb" + "CVE-2024-26689": { + "cmt_msg": "ceph: prevent use-after-free in encode_cap_msg()" + }, + "CVE-2022-1679": { + "cmt_msg": "ath9k: fix use-after-free in ath9k_hif_usb_rx_cb" + }, + "CVE-2023-34256": { + "cmt_msg": "ext4: avoid a potential slab-out-of-bounds in ext4_group_desc_csum" + }, + "CVE-2023-1513": { + "cmt_msg": "kvm: initialize all of the kvm_debugregs structure before sending it to userspace" + }, + "CVE-2021-26401": { + "cmt_msg": "x86/speculation: Use generic retpoline by default on AMD" + }, + "CVE-2020-28941": { + "cmt_msg": "speakup: Do not let the line discipline be used several times" + }, + "CVE-2023-4207": { + "cmt_msg": "net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free" + }, + "CVE-2023-52442": { + "cmt_msg": "ksmbd: validate session id and tree id in compound request" + }, + "CVE-2022-40768": { + "cmt_msg": "scsi: stex: Properly zero out the passthrough command structure" + }, + "CVE-2021-45486": { + "cmt_msg": "inet: use bigger hash table for IP ID generation" + }, + "CVE-2021-3923": { + "cmt_msg": "RDMA/core: Don't infoleak GRH fields" + }, + "CVE-2011-4917": { + "cmt_msg": "" + }, + "CVE-2021-45485": { + "cmt_msg": "ipv6: use prandom_u32() for ID generation" + }, + "CVE-2023-52448": { + "cmt_msg": "gfs2: Fix kernel NULL pointer dereference in gfs2_rgrp_dump" + }, + "CVE-2023-52449": { + "cmt_msg": "mtd: Fix gluebi NULL pointer dereference caused by ftl notifier" + }, + "CVE-2023-23039": { + "cmt_msg": "" + }, + "CVE-2024-26719": { + "cmt_msg": "nouveau: offload fence uevents work to workqueue" + }, + "CVE-2024-26715": { + "cmt_msg": "usb: dwc3: gadget: Fix NULL pointer dereference in dwc3_gadget_suspend" + }, + "CVE-2024-1312": { + "cmt_msg": "mm: lock_vma_under_rcu() must check vma->anon_vma under vma lock" + }, + "CVE-2024-26713": { + "cmt_msg": "powerpc/pseries/iommu: Fix iommu initialisation during DLPAR add" + }, + "CVE-2023-3338": { + "cmt_msg": "Remove DECnet support from kernel" + }, + "CVE-2024-26712": { + "cmt_msg": "powerpc/kasan: Fix addr error caused by page alignment" + }, + "CVE-2023-1637": { + "cmt_msg": "x86/speculation: Restore speculation related MSRs during S3 resume" + } + } + }, + "6.3": { + "6.3": { + "CVE-2023-2156": { + "cmt_msg": "net: rpl: fix rpl header size calculation", + "cmt_id": "4e006c7a6dac0ead4c1bf606000aa90a372fc253" + }, + "CVE-2023-2163": { + "cmt_msg": "bpf: Fix incorrect verifier pruning due to missing register precision taints", + "cmt_id": "71b547f561247897a0a14f3082730156c0533fed" + }, + "CVE-2023-31436": { + "cmt_msg": "net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg", + "cmt_id": "3037933448f60f9acb705997eae62013ecb81e0d" + }, + "CVE-2023-2248": { + "cmt_msg": "net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg", + "cmt_id": "3037933448f60f9acb705997eae62013ecb81e0d" + }, + "CVE-2023-4133": { + "cmt_msg": "cxgb4: fix use after free bugs caused by circular dependency problem", + "cmt_id": "e50b9b9e8610d47b7c22529443e45a16b1ea3a15" + } + }, + "6.3-rc1": { + "CVE-2023-33952": { + "cmt_msg": "drm/vmwgfx: Do not drop the reference to the handle too soon", + "cmt_id": "a950b989ea29ab3b38ea7f6e3d2540700a3c54e8" + }, + "CVE-2023-33951": { + "cmt_msg": "drm/vmwgfx: Do not drop the reference to the handle too soon", + "cmt_id": "a950b989ea29ab3b38ea7f6e3d2540700a3c54e8" + } + }, + "6.3.1": { + "CVE-2023-1380": { + "cmt_msg": "wifi: brcmfmac: slab-out-of-bounds read in brcmf_get_assoc_ies()", + "cmt_id": "21bee3e649d87f78fe8aef6ae02edd3d6f310fd0" + }, + "CVE-2023-2002": { + "cmt_msg": "bluetooth: Perform careful capability checks in hci_sock_ioctl()", + "cmt_id": "dd30f9da333748488d96b7cb3c5a17bbaf86b32d" + } + }, + "6.3.2": { + "CVE-2023-35829": { + "cmt_msg": "media: rkvdec: fix use after free bug in rkvdec_remove", + "cmt_id": "2115e94838adc9d1e7b75043c9f26abcc910f6fb" + }, + "CVE-2023-0160": { + "cmt_msg": "bpf, sockmap: fix deadlocks in the sockhash and sockmap", + "cmt_id": "d2b8cf384c39ddb6fdb9e9034cd9b9887e09e735" + }, + "CVE-2023-2598": { + "cmt_msg": "io_uring/rsrc: check for nonconsecutive pages", + "cmt_id": "3a0a9211d7d0138d55aecd209b05e6d4a9eec383" + }, + "CVE-2023-32258": { + "cmt_msg": "ksmbd: fix racy issue from smb2 close and logoff with multichannel", + "cmt_id": "920d5dd2d041484bf001c9713c2e3bcc6de79726" + }, + "CVE-2023-32257": { + "cmt_msg": "ksmbd: fix racy issue from session setup and logoff", + "cmt_id": "02f41d88f15d6b7d523e52cc3f87488f57e9265b" + }, + "CVE-2023-35824": { + "cmt_msg": "media: dm1105: Fix use after free bug in dm1105_remove due to race condition", + "cmt_id": "d730bc84064364cafdb20c6ee7fda2cd7416407a" + }, + "CVE-2023-32233": { + "cmt_msg": "netfilter: nf_tables: deactivate anonymous set from preparation phase", + "cmt_id": "f8486683ffa30456e0be4290282a44c4459a3287" + }, + "CVE-2023-32254": { + "cmt_msg": "ksmbd: fix racy issue under cocurrent smb2 tree disconnect", + "cmt_id": "39366b47a59d46af15ac57beb0996268bf911f6a" + }, + "CVE-2023-32252": { + "cmt_msg": "ksmbd: fix racy issue from session setup and logoff", + "cmt_id": "02f41d88f15d6b7d523e52cc3f87488f57e9265b" + }, + "CVE-2023-32250": { + "cmt_msg": "ksmbd: fix racy issue from session setup and logoff", + "cmt_id": "02f41d88f15d6b7d523e52cc3f87488f57e9265b" + }, + "CVE-2023-35828": { + "cmt_msg": "usb: gadget: udc: renesas_usb3: Fix use after free bug in renesas_usb3_remove due to race condition", + "cmt_id": "231598b40a070a6bf780c0df1ff5ae3e57102900" + }, + "CVE-2023-3312": { + "cmt_msg": "cpufreq: qcom-cpufreq-hw: fix double IO unmap and resource release on exit", + "cmt_id": "d9bad836cf156ee87d577f0bd1ed01501b31a253" + }, + "CVE-2023-35826": { + "cmt_msg": "media: cedrus: fix use after free bug in cedrus_remove due to race condition", + "cmt_id": "565c863bd982584aa4393f7bdb345dbccb3ad488" + }, + "CVE-2023-2269": { + "cmt_msg": "dm ioctl: fix nested locking in table_clear() to remove deadlock concern", + "cmt_id": "a554e6ec3626d4c11f55d7eef8d6aa93fb211c24" + }, + "CVE-2023-32247": { + "cmt_msg": "ksmbd: destroy expired sessions", + "cmt_id": "6775ee7ef4b37c521aa4cf3730f54554c4875542" + }, + "CVE-2023-32248": { + "cmt_msg": "ksmbd: fix NULL pointer dereference in smb2_get_info_filesystem()", + "cmt_id": "1636e09779f83e10e6ed57d91ef94abcefdd206b" + }, + "CVE-2023-52474": { + "cmt_msg": "IB/hfi1: Fix bugs with non-PAGE_SIZE-end multi-iovec user SDMA requests", + "cmt_id": "7e6010f79b58f45b204cf18aa58f4b73c3f30adc" + }, + "CVE-2023-3268": { + "cmt_msg": "relayfs: fix out-of-bounds access in relay_file_read", + "cmt_id": "35ca4fb494c0c9f226fbcfa1c1688e6cc1e5062e" + }, + "CVE-2023-35823": { + "cmt_msg": "media: saa7134: fix use after free bug in saa7134_finidev due to race condition", + "cmt_id": "3a60e51489a3ec61565f5bc53f726ac9ccc6083c" + } + }, + "6.3.3": { + "CVE-2024-0775": { + "cmt_msg": "ext4: improve error recovery code paths in __ext4_remount()", + "cmt_id": "536ecbd569cb99b2e8a4422c43926590c7893aef" + }, + "CVE-2023-34256": { + "cmt_msg": "ext4: avoid a potential slab-out-of-bounds in ext4_group_desc_csum", + "cmt_id": "be7b6374a2ee8a59c1ff5addcbe25ebc1b4efd9f" + } + }, + "6.3.4": { + "CVE-2023-38426": { + "cmt_msg": "ksmbd: fix global-out-of-bounds in smb2_find_context_vals", + "cmt_id": "0adcdc220fa555935bb37a273f08956616f8601a" + }, + "CVE-2023-38428": { + "cmt_msg": "ksmbd: fix wrong UserName check in session_user", + "cmt_id": "3df195fbddfae60ca24a9bbc209402d9fccdef68" + }, + "CVE-2023-38429": { + "cmt_msg": "ksmbd: allocate one more byte for implied bcc[0]", + "cmt_id": "778aae5a513ea09aa5addfa352bd70a5b71dda85" + }, + "CVE-2023-1192": { + "cmt_msg": "fs/ntfs3: Validate MFT flags before replaying logs", + "cmt_id": "e6f4b1c32d6d6047958d7700d12fed6d91f441e7" + }, + "CVE-2023-3141": { + "cmt_msg": "memstick: r592: Fix UAF bug in r592_remove due to race condition", + "cmt_id": "76fec5f01c9c70e11b85fdeb3f2707589c9238ca" + }, + "CVE-2023-3090": { + "cmt_msg": "ipvlan:Fix out-of-bounds caused by unclear skb->cb", + "cmt_id": "3cd16c6a6a6b68bba02fbbc54b9906f44640ffde" + }, + "CVE-2022-48425": { + "cmt_msg": "fs/ntfs3: Validate MFT flags before replaying logs", + "cmt_id": "e6f4b1c32d6d6047958d7700d12fed6d91f441e7" + } + }, + "6.3.5": { + "CVE-2023-21255": { + "cmt_msg": "binder: fix UAF caused by faulty buffer cleanup", + "cmt_id": "c9e6aae1f26758f3e87b93cff18d79dfd80f2f25" + } + }, + "6.3.7": { + "CVE-2022-45887": { + "cmt_msg": "media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb()", + "cmt_id": "dbef7d1ffea0ccc95446c5383e0be65babedf667" + }, + "CVE-2022-45886": { + "cmt_msg": "media: dvb-core: Fix use-after-free due on race condition at dvb_net", + "cmt_id": "8bade849b15b3ecb62893f328b2cc4cdc65ac0c6" + }, + "CVE-2023-35788": { + "cmt_msg": "net/sched: flower: fix possible OOB write in fl_set_geneve_opt()", + "cmt_id": "900fab73a9cd3dd6a3a69f89980f8f3c9a738d5a" + }, + "CVE-2022-45919": { + "cmt_msg": "media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221", + "cmt_id": "59918dd7a6d1ad098550ca6fcf154c1ae6842bc7" + }, + "CVE-2023-2124": { + "cmt_msg": "xfs: verify buffer contents when we skip log replay", + "cmt_id": "69ebe82c73f4f9f4b49ed3b35ce347af20716d0a" + }, + "CVE-2023-3212": { + "cmt_msg": "gfs2: Don't deref jdesc in evict", + "cmt_id": "14c454764a37b194dc916c07488ce7339c82bc4f" + }, + "CVE-2023-21264": { + "cmt_msg": "KVM: arm64: Prevent unconditional donation of unmapped regions from the host", + "cmt_id": "c3cd33abe63f0ea32c3966ae67a7efc48e86c3e0" + }, + "CVE-2023-34255": { + "cmt_msg": "xfs: verify buffer contents when we skip log replay", + "cmt_id": "69ebe82c73f4f9f4b49ed3b35ce347af20716d0a" + } + }, + "6.3.8": { + "CVE-2023-38431": { + "cmt_msg": "ksmbd: check the validation of pdu_size in ksmbd_conn_handler_loop", + "cmt_id": "e9cb7be2fcbaee9e808b729e92948d38d52e5add" + }, + "CVE-2023-1194": { + "cmt_msg": "ksmbd: fix out-of-bound read in parse_lease_state()", + "cmt_id": "61dfe01204daf5469f21cc639f710f9e28e929c8" + }, + "CVE-2023-38427": { + "cmt_msg": "ksmbd: fix out-of-bound read in deassemble_neg_contexts()", + "cmt_id": "205279b96b5c40c60c6de4f9342416e02ee279f1" + } + }, + "6.3.9": { + "CVE-2023-3609": { + "cmt_msg": "net/sched: cls_u32: Fix reference counter leak leading to overflow", + "cmt_id": "4efd555a43dc24f3342bcc036522c430f5869e6f" + }, + "CVE-2023-38430": { + "cmt_msg": "ksmbd: validate smb request protocol id", + "cmt_id": "75e7d81679ef7995422adc84ef597fded99c24a6" + }, + "CVE-2023-3117": { + "cmt_msg": "netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE", + "cmt_id": "bdace3b1a51887211d3e49417a18fdbd315a313b" + }, + "CVE-2023-3390": { + "cmt_msg": "netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE", + "cmt_id": "bdace3b1a51887211d3e49417a18fdbd315a313b" + }, + "CVE-2024-0443": { + "cmt_msg": "blk-cgroup: Flush stats before releasing blkcg_gq", + "cmt_id": "0f6090d90f627d8c58f939067d6c6821ce1b3c68" + } + }, + "6.3.10": { + "CVE-2023-3865": { + "cmt_msg": "ksmbd: fix out-of-bound read in smb2_write", + "cmt_id": "58a9c41064df27632e780c5a3ae3e0e4284957d1" + }, + "CVE-2023-3610": { + "cmt_msg": "netfilter: nf_tables: fix chain binding transaction logic", + "cmt_id": "a1547f81341f14b1b355df04218152e8b5d4b264" + }, + "CVE-2023-38432": { + "cmt_msg": "ksmbd: validate command payload size", + "cmt_id": "768caf4019f0391c0b6452afe34cea1704133f7b" + }, + "CVE-2023-3866": { + "cmt_msg": "ksmbd: validate session id and tree id in the compound request", + "cmt_id": "d1066c1b3663401cd23c0d6e60cdae750ce00c0f" + } + }, + "6.3.11": { + "CVE-2023-3269": { + "cmt_msg": "mm: introduce new 'lock_mm_and_find_vma()' page fault helper", + "cmt_id": "bce721f87edd54379120ffb85111357923f4f326" + } + }, + "6.3.13": { + "CVE-2023-39197": { + "cmt_msg": "netfilter: conntrack: dccp: copy entire header to stack buffer, not just basic one", + "cmt_id": "26bd1f210d3783a691052c51d76bb8a8bbd24c67" + }, + "CVE-2023-33250": { + "cmt_msg": "iommufd: Call iopt_area_contig_done() under the lock", + "cmt_id": "1d2b603d938c898b5fd8da6e3d80184366ca6ea0" + }, + "CVE-2023-4134": { + "cmt_msg": "Input: cyttsp4_core - change del_timer_sync() to timer_shutdown_sync()", + "cmt_id": "c261139c1df65c9c4bf00e96c91183bcfc1919ec" + }, + "CVE-2023-3863": { + "cmt_msg": "net: nfc: Fix use-after-free caused by nfc_llcp_find_local", + "cmt_id": "b3ad46e155a6d91b36c6e892019a43e3ef3c696d" + } + }, + "outstanding": { + "CVE-2020-35501": { + "cmt_msg": "" + }, + "CVE-2023-6176": { + "cmt_msg": "net/tls: do not free tls_rec on async operation in bpf_exec_tx_verdict()" + }, + "CVE-2024-26684": { + "cmt_msg": "net: stmmac: xgmac: fix handling of DPP safety error for DMA channels" + }, + "CVE-2023-52615": { + "cmt_msg": "hwrng: core - Fix page fault dead lock on mmap-ed hwrng" + }, + "CVE-2023-52614": { + "cmt_msg": "PM / devfreq: Fix buffer overflow in trans_stat_show" + }, + "CVE-2023-52617": { + "cmt_msg": "PCI: switchtec: Fix stdev_release() crash after surprise hot remove" + }, + "CVE-2023-52616": { + "cmt_msg": "crypto: lib/mpi - Fix unexpected pointer access in mpi_ec_init" + }, + "CVE-2023-52610": { + "cmt_msg": "net/sched: act_ct: fix skb leak and crash on ooo frags" + }, + "CVE-2023-52612": { + "cmt_msg": "crypto: scomp - fix req->dst buffer overflow" + }, + "CVE-2023-52619": { + "cmt_msg": "pstore/ram: Fix crash when setting number of cpus to an odd number" + }, + "CVE-2023-52618": { + "cmt_msg": "block/rnbd-srv: Check for unlikely string overflow" + }, + "CVE-2023-5717": { + "cmt_msg": "perf: Disallow mis-matched inherited group reads" + }, + "CVE-2023-4273": { + "cmt_msg": "exfat: check if filename entries exceeds max filename length" + }, + "CVE-2022-23825": { + "cmt_msg": "" + }, + "CVE-2023-4004": { + "cmt_msg": "netfilter: nft_set_pipapo: fix improper element removal" + }, + "CVE-2023-5158": { + "cmt_msg": "vringh: don't use vringh_kiov_advance() in vringh_iov_xfer()" + }, + "CVE-2024-26592": { + "cmt_msg": "ksmbd: fix UAF issue in ksmbd_tcp_new_connection()" + }, + "CVE-2024-26593": { + "cmt_msg": "i2c: i801: Fix block process call transactions" + }, + "CVE-2024-26590": { + "cmt_msg": "erofs: fix inconsistent per-file compression format" + }, + "CVE-2024-26591": { + "cmt_msg": "bpf: Fix re-attachment branch in bpf_tracing_prog_attach" + }, + "CVE-2020-15802": { + "cmt_msg": "" + }, + "CVE-2024-26597": { + "cmt_msg": "net: qualcomm: rmnet: fix global oob in rmnet_policy" + }, + "CVE-2024-26594": { + "cmt_msg": "ksmbd: validate mech token in session setup" + }, + "CVE-2023-2898": { + "cmt_msg": "f2fs: fix to avoid NULL pointer dereference f2fs_write_end_io()" + }, + "CVE-2024-26598": { + "cmt_msg": "KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache" + }, + "CVE-2024-26599": { + "cmt_msg": "pwm: Fix out-of-bounds access in of_pwm_single_xlate()" + }, + "CVE-2023-40791": { + "cmt_msg": "crypto, cifs: fix error handling in extract_iter_to_sg()" + }, + "CVE-2019-15902": { + "cmt_msg": "unknown" + }, + "CVE-2024-25739": { + "cmt_msg": "" + }, + "CVE-2024-26586": { + "cmt_msg": "mlxsw: spectrum_acl_tcam: Fix stack corruption" + }, + "CVE-2024-26589": { + "cmt_msg": "bpf: Reject variable offset alu on PTR_TO_FLOW_KEYS" + }, + "CVE-2020-26140": { + "cmt_msg": "" + }, + "CVE-2020-26143": { + "cmt_msg": "" + }, + "CVE-2020-26142": { + "cmt_msg": "" + }, + "CVE-2024-23849": { + "cmt_msg": "net/rds: Fix UBSAN: array-index-out-of-bounds in rds_cmsg_recv" + }, + "CVE-2024-23848": { + "cmt_msg": "" + }, + "CVE-2023-46838": { + "cmt_msg": "xen-netback: don't produce zero-size SKB frags" + }, + "CVE-2023-40283": { + "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb" + }, + "CVE-2024-26747": { + "cmt_msg": "usb: roles: fix NULL pointer issue when put module's reference" + }, + "CVE-2024-26783": { + "cmt_msg": "mm/vmscan: fix a bug calling wakeup_kswapd() with a wrong zone index" + }, + "CVE-2024-26745": { + "cmt_msg": "powerpc/pseries/iommu: IOMMU table is not initialized for kdump over SR-IOV" + }, + "CVE-2024-26744": { + "cmt_msg": "RDMA/srpt: Support specifying the srpt_service_guid parameter" + }, + "CVE-2024-26743": { + "cmt_msg": "RDMA/qedr: Fix qedr_create_user_qp error flow" + }, + "CVE-2024-26742": { + "cmt_msg": "scsi: smartpqi: Fix disable_managed_interrupts" + }, + "CVE-2024-26741": { + "cmt_msg": "dccp/tcp: Unhash sk from ehash for tb2 alloc failure after check_estalblished()." + }, + "CVE-2024-26740": { + "cmt_msg": "net/sched: act_mirred: use the backlog for mirred ingress" + }, + "CVE-2024-26749": { + "cmt_msg": "usb: cdns3: fixed memory use after free at cdns3_gadget_ep_disable()" + }, + "CVE-2024-26748": { + "cmt_msg": "usb: cdns3: fix memory double free when handle zero packet" + }, + "CVE-2024-26787": { + "cmt_msg": "mmc: mmci: stm32: fix DMA API overlapping mappings warning" + }, + "CVE-2024-26699": { + "cmt_msg": "drm/amd/display: Fix array-index-out-of-bounds in dcn35_clkmgr" + }, + "CVE-2024-26698": { + "cmt_msg": "hv_netvsc: Fix race condition between netvsc_probe and netvsc_remove" + }, + "CVE-2024-26691": { + "cmt_msg": "KVM: arm64: Fix circular locking dependency" + }, + "CVE-2024-26692": { + "cmt_msg": "smb: Fix regression in writes when non-standard maximum write size negotiated" + }, + "CVE-2024-0564": { + "cmt_msg": "" + }, + "CVE-2024-0565": { + "cmt_msg": "smb: client: fix OOB in receive_encrypted_standard()" + }, + "CVE-2024-26697": { + "cmt_msg": "nilfs2: fix data corruption in dsync block recovery for small block sizes" + }, + "CVE-2024-26696": { + "cmt_msg": "nilfs2: fix hang in nilfs_lookup_dirty_data_buffers()" + }, + "CVE-2024-26695": { + "cmt_msg": "crypto: ccp - Fix null pointer dereference in __sev_platform_shutdown_locked" + }, + "CVE-2024-26788": { + "cmt_msg": "dmaengine: fsl-qdma: init irq after reg initialization" + }, + "CVE-2005-3660": { + "cmt_msg": "" + }, + "CVE-2023-31085": { + "cmt_msg": "ubi: Refuse attaching if mtd's erasesize is 0" + }, + "CVE-2023-31084": { + "cmt_msg": "media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*()" + }, + "CVE-2023-31083": { + "cmt_msg": "Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO" + }, + "CVE-2023-31082": { + "cmt_msg": "" + }, + "CVE-2023-31081": { + "cmt_msg": "" + }, + "CVE-2024-0646": { + "cmt_msg": "net: tls, update curr on splice as well" + }, + "CVE-2023-52499": { + "cmt_msg": "powerpc/47x: Fix 47x syscall return crash" + }, + "CVE-2023-52498": { + "cmt_msg": "PM: sleep: Fix possible deadlocks in core system-wide PM code" + }, + "CVE-2023-52493": { + "cmt_msg": "bus: mhi: host: Drop chan lock before queuing buffers" + }, + "CVE-2023-52492": { + "cmt_msg": "dmaengine: fix NULL pointer in channel unregistration function" + }, + "CVE-2020-14304": { + "cmt_msg": "" + }, + "CVE-2023-52490": { + "cmt_msg": "mm: migrate: fix getting incorrect page mapping during page migration" + }, + "CVE-2023-52497": { + "cmt_msg": "erofs: fix lz4 inplace decompression" + }, + "CVE-2023-52495": { + "cmt_msg": "soc: qcom: pmic_glink_altmode: fix port sanity check" + }, + "CVE-2023-52494": { + "cmt_msg": "bus: mhi: host: Add alignment check for event ring read pointer" + }, + "CVE-2023-3611": { + "cmt_msg": "net/sched: sch_qfq: account for stab overhead in qfq_enqueue" + }, + "CVE-2024-26629": { + "cmt_msg": "nfsd: fix RELEASE_LOCKOWNER" + }, + "CVE-2023-4132": { + "cmt_msg": "media: usb: siano: Fix warning due to null work_func_t function pointer" + }, + "CVE-2024-26625": { + "cmt_msg": "llc: call sock_orphan() at release time" + }, + "CVE-2020-26560": { + "cmt_msg": "" + }, + "CVE-2024-26620": { + "cmt_msg": "s390/vfio-ap: always filter entire AP matrix" + }, + "CVE-2024-0841": { + "cmt_msg": "fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super" + }, + "CVE-2024-22386": { + "cmt_msg": "" + }, + "CVE-2022-3238": { + "cmt_msg": "" + }, + "CVE-2023-37453": { + "cmt_msg": "USB: core: Fix race by not overwriting udev->descriptor in hub_port_init()" + }, + "CVE-2023-37454": { + "cmt_msg": "" + }, + "CVE-2023-39194": { + "cmt_msg": "net: xfrm: Fix xfrm_address_filter OOB read" + }, + "CVE-2023-52485": { + "cmt_msg": "drm/amd/display: Wake DMCUB before sending a command" + }, + "CVE-2023-52580": { + "cmt_msg": "net/core: Fix ETH_P_1588 flow dissector" + }, + "CVE-2022-1116": { + "cmt_msg": "" + }, + "CVE-2024-26603": { + "cmt_msg": "x86/fpu: Stop relying on userspace for info to fault in xsave buffer" + }, + "CVE-2023-35827": { + "cmt_msg": "ravb: Fix use-after-free issue in ravb_tx_timeout_work()" + }, + "CVE-2023-52481": { + "cmt_msg": "arm64: errata: Add Cortex-A520 speculative unprivileged load workaround" + }, + "CVE-2023-52585": { + "cmt_msg": "drm/amdgpu: Fix possible NULL dereference in amdgpu_ras_query_error_status_helper()" + }, + "CVE-2023-52584": { + "cmt_msg": "spmi: mediatek: Fix UAF on device remove" + }, + "CVE-2023-52587": { + "cmt_msg": "IB/ipoib: Fix mcast list locking" + }, + "CVE-2023-52586": { + "cmt_msg": "drm/msm/dpu: Add mutex lock in control vblank irq" + }, + "CVE-2023-42753": { + "cmt_msg": "netfilter: ipset: add the missing IP_SET_HASH_WITH_NET0 macro for ip_set_hash_netportnet.c" + }, + "CVE-2023-52583": { + "cmt_msg": "ceph: fix deadlock or deadcode of misusing dget()" + }, + "CVE-2023-52582": { + "cmt_msg": "netfs: Only call folio_start_fscache() one time for each folio" + }, + "CVE-2024-26769": { + "cmt_msg": "nvmet-fc: avoid deadlock on delete association path" + }, + "CVE-2023-42752": { + "cmt_msg": "igmp: limit igmpv3_newpack() packet size to IP_MAX_MTU" + }, + "CVE-2023-52589": { + "cmt_msg": "media: rkisp1: Fix IRQ disable race issue" + }, + "CVE-2023-52588": { + "cmt_msg": "f2fs: fix to tag gcing flag on page during block migration" + }, + "CVE-2024-26768": { + "cmt_msg": "LoongArch: Change acpi_core_pic[NR_CPUS] to acpi_core_pic[MAX_CORE_PIC]" + }, + "CVE-2024-26767": { + "cmt_msg": "drm/amd/display: fixed integer types and null check locations" + }, + "CVE-2023-4569": { + "cmt_msg": "netfilter: nf_tables: deactivate catchall elements in next generation" + }, + "CVE-2023-6560": { + "cmt_msg": "io_uring: don't allow discontig pages for IORING_SETUP_NO_MMAP" + }, + "CVE-2024-26763": { + "cmt_msg": "dm-crypt: don't modify the data when using authenticated encryption" + }, + "CVE-2024-26795": { + "cmt_msg": "riscv: Sparse-Memory/vmemmap out-of-bounds fix" + }, + "CVE-2024-26797": { + "cmt_msg": "drm/amd/display: Prevent potential buffer overflow in map_hw_resources" + }, + "CVE-2024-26790": { + "cmt_msg": "dmaengine: fsl-qdma: fix SoC may hang on 16 byte unaligned read" + }, + "CVE-2024-0639": { + "cmt_msg": "sctp: fix potential deadlock on &net->sctp.addr_wq_lock" + }, + "CVE-2024-26793": { + "cmt_msg": "gtp: fix use-after-free and null-ptr-deref in gtp_newlink()" + }, + "CVE-2023-52530": { + "cmt_msg": "wifi: mac80211: fix potential key use-after-free" + }, + "CVE-2023-52531": { + "cmt_msg": "wifi: iwlwifi: mvm: Fix a memory corruption issue" + }, + "CVE-2023-52532": { + "cmt_msg": "net: mana: Fix TX CQE error handling" + }, + "CVE-2024-26798": { + "cmt_msg": "fbcon: always restore the old font data in fbcon_do_set_font()" + }, + "CVE-2024-26799": { + "cmt_msg": "ASoC: qcom: Fix uninitialized pointer dmactl" + }, + "CVE-2023-52429": { + "cmt_msg": "dm: limit the number of targets and parameter size area" + }, + "CVE-2023-39189": { + "cmt_msg": "netfilter: nfnetlink_osf: avoid OOB read" + }, + "CVE-2023-35001": { + "cmt_msg": "netfilter: nf_tables: prevent OOB access in nft_byteorder_eval" + }, + "CVE-2023-46862": { + "cmt_msg": "io_uring/fdinfo: lock SQ thread while retrieving thread cpu/pid" + }, + "CVE-2024-26677": { + "cmt_msg": "rxrpc: Fix delayed ACKs to not set the reference serial number" + }, + "CVE-2024-26676": { + "cmt_msg": "af_unix: Call kfree_skb() for dead unix_(sk)->oob_skb in GC." + }, + "CVE-2024-26675": { + "cmt_msg": "ppp_async: limit MRU to 64K" + }, + "CVE-2020-26556": { + "cmt_msg": "" + }, + "CVE-2020-26557": { + "cmt_msg": "" + }, + "CVE-2024-26671": { + "cmt_msg": "blk-mq: fix IO hang from sbitmap wakeup race" + }, + "CVE-2023-31248": { + "cmt_msg": "netfilter: nf_tables: do not ignore genmask when looking up chain by id" + }, + "CVE-2024-26776": { + "cmt_msg": "spi: hisi-sfc-v3xx: Return IRQ_NONE if no interrupts were detected" + }, + "CVE-2024-26777": { + "cmt_msg": "fbdev: sis: Error out if pixclock equals zero" + }, + "CVE-2019-20794": { + "cmt_msg": "" + }, + "CVE-2020-26559": { + "cmt_msg": "" + }, + "CVE-2023-3397": { + "cmt_msg": "" + }, + "CVE-2024-26773": { + "cmt_msg": "ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found()" + }, + "CVE-2024-26679": { + "cmt_msg": "inet: read sk->sk_family once in inet_recv_error()" + }, + "CVE-2024-26771": { + "cmt_msg": "dmaengine: ti: edma: Add some null pointer checks to the edma_probe" + }, + "CVE-2023-52458": { + "cmt_msg": "block: add check that partition length needs to be aligned with block size" + }, + "CVE-2023-52457": { + "cmt_msg": "serial: 8250: omap: Don't skip resource freeing if pm_runtime_resume_and_get() failed" + }, + "CVE-2018-1121": { + "cmt_msg": "" + }, + "CVE-2023-52455": { + "cmt_msg": "iommu: Don't reserve 0-length IOVA region" + }, + "CVE-2023-52454": { + "cmt_msg": "nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length" + }, + "CVE-2023-28746": { + "cmt_msg": "x86/mmio: Disable KVM mitigation when X86_FEATURE_CLEAR_CPU_BUF is set" + }, + "CVE-2023-52452": { + "cmt_msg": "bpf: Fix accesses to uninit stack slots" + }, + "CVE-2023-52451": { + "cmt_msg": "powerpc/pseries/memhp: Fix access beyond end of drmem array" + }, + "CVE-2023-52450": { + "cmt_msg": "perf/x86/intel/uncore: Fix NULL pointer dereference issue in upi_fill_topology()" + }, + "CVE-2024-1085": { + "cmt_msg": "netfilter: nf_tables: check if catch-all set element is active in next generation" + }, + "CVE-2024-1086": { + "cmt_msg": "netfilter: nf_tables: reject QUEUE/DROP verdict parameters" + }, + "CVE-2024-26708": { + "cmt_msg": "mptcp: really cope with fastopen race" + }, + "CVE-2024-26702": { + "cmt_msg": "iio: magnetometer: rm3100: add boundary check for the value read from RM3100_REG_TMRC" + }, + "CVE-2023-6240": { + "cmt_msg": "" + }, + "CVE-2024-26700": { + "cmt_msg": "drm/amd/display: Fix MST Null Ptr for RV" + }, + "CVE-2024-26707": { + "cmt_msg": "net: hsr: remove WARN_ONCE() in send_hsr_supervision_frame()" + }, + "CVE-2024-26706": { + "cmt_msg": "parisc: Fix random data corruption from exception handler" + }, + "CVE-2024-26704": { + "cmt_msg": "ext4: fix double-free of blocks due to wrong extents moved_len" + }, + "CVE-2024-26739": { + "cmt_msg": "net/sched: act_mirred: don't override retval if we already lost the skb" + }, + "CVE-2023-44466": { + "cmt_msg": "libceph: harden msgr2.1 frame segment length checks" + }, + "CVE-2024-23196": { + "cmt_msg": "ALSA: hda: fix a possible null-pointer dereference due to data race in snd_hdac_regmap_sync()" }, - "CVE-2023-34256": { - "cmt_msg": "ext4: avoid a potential slab-out-of-bounds in ext4_group_desc_csum" + "CVE-2019-19814": { + "cmt_msg": "" }, - "CVE-2023-1513": { - "cmt_msg": "kvm: initialize all of the kvm_debugregs structure before sending it to userspace" + "CVE-2023-52620": { + "cmt_msg": "netfilter: nf_tables: disallow timeout for anonymous sets" }, - "CVE-2021-26401": { - "cmt_msg": "x86/speculation: Use generic retpoline by default on AMD" + "CVE-2023-52621": { + "cmt_msg": "bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers" }, - "CVE-2020-28941": { - "cmt_msg": "speakup: Do not let the line discipline be used several times" + "CVE-2023-52622": { + "cmt_msg": "ext4: avoid online resizing failures due to oversized flex bg" }, - "CVE-2023-52442": { - "cmt_msg": "ksmbd: validate session id and tree id in compound request" + "CVE-2023-52623": { + "cmt_msg": "SUNRPC: Fix a suspicious RCU usage warning" }, - "CVE-2022-40768": { - "cmt_msg": "scsi: stex: Properly zero out the passthrough command structure" + "CVE-2023-52624": { + "cmt_msg": "drm/amd/display: Wake DMCUB before executing GPINT commands" }, - "CVE-2021-45486": { - "cmt_msg": "inet: use bigger hash table for IP ID generation" + "CVE-2023-52625": { + "cmt_msg": "drm/amd/display: Refactor DMCUB enter/exit idle interface" }, - "CVE-2021-3923": { - "cmt_msg": "RDMA/core: Don't infoleak GRH fields" + "CVE-2023-52627": { + "cmt_msg": "iio: adc: ad7091r: Allow users to configure device events" }, - "CVE-2011-4917": { + "CVE-2023-52628": { + "cmt_msg": "netfilter: nftables: exthdr: fix 4-byte stack OOB write" + }, + "CVE-2021-26934": { "cmt_msg": "" }, - "CVE-2021-45485": { - "cmt_msg": "ipv6: use prandom_u32() for ID generation" + "CVE-2022-36402": { + "cmt_msg": "drm/vmwgfx: Fix shader stage validation" }, - "CVE-2023-52448": { - "cmt_msg": "gfs2: Fix kernel NULL pointer dereference in gfs2_rgrp_dump" + "CVE-2008-2544": { + "cmt_msg": "" }, - "CVE-2023-52449": { - "cmt_msg": "mtd: Fix gluebi NULL pointer dereference caused by ftl notifier" + "CVE-2023-3867": { + "cmt_msg": "ksmbd: add missing compound request handing in some commands" }, - "CVE-2023-23039": { + "CVE-2007-3719": { "cmt_msg": "" }, - "CVE-2024-1312": { - "cmt_msg": "mm: lock_vma_under_rcu() must check vma->anon_vma under vma lock" + "CVE-2023-21400": { + "cmt_msg": "" }, - "CVE-2023-3338": { - "cmt_msg": "Remove DECnet support from kernel" + "CVE-2023-5633": { + "cmt_msg": "drm/vmwgfx: Keep a gem reference to user bos in surfaces" }, - "CVE-2023-1637": { - "cmt_msg": "x86/speculation: Restore speculation related MSRs during S3 resume" - } - } - }, - "6.3": { - "6.3": { - "CVE-2023-2156": { - "cmt_msg": "net: rpl: fix rpl header size calculation", - "cmt_id": "4e006c7a6dac0ead4c1bf606000aa90a372fc253" + "CVE-2024-26583": { + "cmt_msg": "tls: fix race between async notify and socket close" }, - "CVE-2023-2163": { - "cmt_msg": "bpf: Fix incorrect verifier pruning due to missing register precision taints", - "cmt_id": "71b547f561247897a0a14f3082730156c0533fed" + "CVE-2024-26582": { + "cmt_msg": "net: tls: fix use-after-free with partial reads and async decrypt" }, - "CVE-2023-31436": { - "cmt_msg": "net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg", - "cmt_id": "3037933448f60f9acb705997eae62013ecb81e0d" + "CVE-2024-26585": { + "cmt_msg": "tls: fix race between tx work scheduling and socket close" }, - "CVE-2023-2248": { - "cmt_msg": "net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg", - "cmt_id": "3037933448f60f9acb705997eae62013ecb81e0d" + "CVE-2024-26584": { + "cmt_msg": "net: tls: handle backlogging of crypto requests" }, - "CVE-2023-4133": { - "cmt_msg": "cxgb4: fix use after free bugs caused by circular dependency problem", - "cmt_id": "e50b9b9e8610d47b7c22529443e45a16b1ea3a15" - } - }, - "6.3-rc1": { - "CVE-2023-33952": { - "cmt_msg": "drm/vmwgfx: Do not drop the reference to the handle too soon", - "cmt_id": "a950b989ea29ab3b38ea7f6e3d2540700a3c54e8" + "CVE-2022-1247": { + "cmt_msg": "" }, - "CVE-2023-33951": { - "cmt_msg": "drm/vmwgfx: Do not drop the reference to the handle too soon", - "cmt_id": "a950b989ea29ab3b38ea7f6e3d2540700a3c54e8" - } - }, - "6.3.1": { - "CVE-2023-1380": { - "cmt_msg": "wifi: brcmfmac: slab-out-of-bounds read in brcmf_get_assoc_ies()", - "cmt_id": "21bee3e649d87f78fe8aef6ae02edd3d6f310fd0" + "CVE-2023-51782": { + "cmt_msg": "net/rose: Fix Use-After-Free in rose_ioctl" }, - "CVE-2023-2002": { - "cmt_msg": "bluetooth: Perform careful capability checks in hci_sock_ioctl()", - "cmt_id": "dd30f9da333748488d96b7cb3c5a17bbaf86b32d" - } - }, - "6.3.2": { - "CVE-2023-35829": { - "cmt_msg": "media: rkvdec: fix use after free bug in rkvdec_remove", - "cmt_id": "2115e94838adc9d1e7b75043c9f26abcc910f6fb" + "CVE-2024-26588": { + "cmt_msg": "LoongArch: BPF: Prevent out-of-bounds memory access" }, - "CVE-2023-0160": { - "cmt_msg": "bpf, sockmap: fix deadlocks in the sockhash and sockmap", - "cmt_id": "d2b8cf384c39ddb6fdb9e9034cd9b9887e09e735" + "CVE-2023-51780": { + "cmt_msg": "atm: Fix Use-After-Free in do_vcc_ioctl" }, - "CVE-2023-2598": { - "cmt_msg": "io_uring/rsrc: check for nonconsecutive pages", - "cmt_id": "3a0a9211d7d0138d55aecd209b05e6d4a9eec383" + "CVE-2023-51781": { + "cmt_msg": "appletalk: Fix Use-After-Free in atalk_ioctl" }, - "CVE-2023-32258": { - "cmt_msg": "ksmbd: fix racy issue from smb2 close and logoff with multichannel", - "cmt_id": "920d5dd2d041484bf001c9713c2e3bcc6de79726" + "CVE-2023-52578": { + "cmt_msg": "net: bridge: use DEV_STATS_INC()" }, - "CVE-2023-32257": { - "cmt_msg": "ksmbd: fix racy issue from session setup and logoff", - "cmt_id": "02f41d88f15d6b7d523e52cc3f87488f57e9265b" + "CVE-2023-52574": { + "cmt_msg": "team: fix null-ptr-deref when team device type is changed" }, - "CVE-2023-35824": { - "cmt_msg": "media: dm1105: Fix use after free bug in dm1105_remove due to race condition", - "cmt_id": "d730bc84064364cafdb20c6ee7fda2cd7416407a" + "CVE-2023-52576": { + "cmt_msg": "x86/mm, kexec, ima: Use memblock_free_late() from ima_free_kexec_buffer()" }, - "CVE-2023-32233": { - "cmt_msg": "netfilter: nf_tables: deactivate anonymous set from preparation phase", - "cmt_id": "f8486683ffa30456e0be4290282a44c4459a3287" + "CVE-2022-4543": { + "cmt_msg": "" }, - "CVE-2023-32254": { - "cmt_msg": "ksmbd: fix racy issue under cocurrent smb2 tree disconnect", - "cmt_id": "39366b47a59d46af15ac57beb0996268bf911f6a" + "CVE-2023-52570": { + "cmt_msg": "vfio/mdev: Fix a null-ptr-deref bug for mdev_unregister_parent()" }, - "CVE-2023-32252": { - "cmt_msg": "ksmbd: fix racy issue from session setup and logoff", - "cmt_id": "02f41d88f15d6b7d523e52cc3f87488f57e9265b" + "CVE-2023-52571": { + "cmt_msg": "power: supply: rk817: Fix node refcount leak" }, - "CVE-2023-32250": { - "cmt_msg": "ksmbd: fix racy issue from session setup and logoff", - "cmt_id": "02f41d88f15d6b7d523e52cc3f87488f57e9265b" + "CVE-2023-52572": { + "cmt_msg": "cifs: Fix UAF in cifs_demultiplex_thread()" }, - "CVE-2023-35828": { - "cmt_msg": "usb: gadget: udc: renesas_usb3: Fix use after free bug in renesas_usb3_remove due to race condition", - "cmt_id": "231598b40a070a6bf780c0df1ff5ae3e57102900" + "CVE-2023-52573": { + "cmt_msg": "net: rds: Fix possible NULL-pointer dereference" }, - "CVE-2023-3312": { - "cmt_msg": "cpufreq: qcom-cpufreq-hw: fix double IO unmap and resource release on exit", - "cmt_id": "d9bad836cf156ee87d577f0bd1ed01501b31a253" + "CVE-2023-4921": { + "cmt_msg": "net: sched: sch_qfq: Fix UAF in qfq_dequeue()" }, - "CVE-2023-35826": { - "cmt_msg": "media: cedrus: fix use after free bug in cedrus_remove due to race condition", - "cmt_id": "565c863bd982584aa4393f7bdb345dbccb3ad488" + "CVE-2023-4881": { + "cmt_msg": "netfilter: nftables: exthdr: fix 4-byte stack OOB write" }, - "CVE-2023-2269": { - "cmt_msg": "dm ioctl: fix nested locking in table_clear() to remove deadlock concern", - "cmt_id": "a554e6ec3626d4c11f55d7eef8d6aa93fb211c24" + "CVE-2013-7445": { + "cmt_msg": "" }, - "CVE-2023-32247": { - "cmt_msg": "ksmbd: destroy expired sessions", - "cmt_id": "6775ee7ef4b37c521aa4cf3730f54554c4875542" + "CVE-2023-34324": { + "cmt_msg": "xen/events: replace evtchn_rwlock with RCU" }, - "CVE-2023-32248": { - "cmt_msg": "ksmbd: fix NULL pointer dereference in smb2_get_info_filesystem()", - "cmt_id": "1636e09779f83e10e6ed57d91ef94abcefdd206b" + "CVE-2024-26736": { + "cmt_msg": "afs: Increase buffer size in afs_update_volume_status()" }, - "CVE-2023-3268": { - "cmt_msg": "relayfs: fix out-of-bounds access in relay_file_read", - "cmt_id": "35ca4fb494c0c9f226fbcfa1c1688e6cc1e5062e" + "CVE-2024-26737": { + "cmt_msg": "bpf: Fix racing between bpf_timer_cancel_and_free and bpf_timer_cancel" }, - "CVE-2023-35823": { - "cmt_msg": "media: saa7134: fix use after free bug in saa7134_finidev due to race condition", - "cmt_id": "3a60e51489a3ec61565f5bc53f726ac9ccc6083c" - } - }, - "6.3.3": { - "CVE-2024-0775": { - "cmt_msg": "ext4: improve error recovery code paths in __ext4_remount()", - "cmt_id": "536ecbd569cb99b2e8a4422c43926590c7893aef" + "CVE-2024-26734": { + "cmt_msg": "devlink: fix possible use-after-free and memory leaks in devlink_init()" }, - "CVE-2023-34256": { - "cmt_msg": "ext4: avoid a potential slab-out-of-bounds in ext4_group_desc_csum", - "cmt_id": "be7b6374a2ee8a59c1ff5addcbe25ebc1b4efd9f" - } - }, - "6.3.4": { - "CVE-2023-38426": { - "cmt_msg": "ksmbd: fix global-out-of-bounds in smb2_find_context_vals", - "cmt_id": "0adcdc220fa555935bb37a273f08956616f8601a" + "CVE-2024-26735": { + "cmt_msg": "ipv6: sr: fix possible use-after-free and null-ptr-deref" }, - "CVE-2023-38428": { - "cmt_msg": "ksmbd: fix wrong UserName check in session_user", - "cmt_id": "3df195fbddfae60ca24a9bbc209402d9fccdef68" + "CVE-2024-26738": { + "cmt_msg": "powerpc/pseries/iommu: DLPAR add doesn't completely initialize pci_controller" }, - "CVE-2023-38429": { - "cmt_msg": "ksmbd: allocate one more byte for implied bcc[0]", - "cmt_id": "778aae5a513ea09aa5addfa352bd70a5b71dda85" + "CVE-2023-6238": { + "cmt_msg": "" }, - "CVE-2023-1192": { - "cmt_msg": "fs/ntfs3: Validate MFT flags before replaying logs", - "cmt_id": "e6f4b1c32d6d6047958d7700d12fed6d91f441e7" + "CVE-2022-38096": { + "cmt_msg": "" }, - "CVE-2023-3141": { - "cmt_msg": "memstick: r592: Fix UAF bug in r592_remove due to race condition", - "cmt_id": "76fec5f01c9c70e11b85fdeb3f2707589c9238ca" + "CVE-2024-26596": { + "cmt_msg": "net: dsa: fix netdev_priv() dereference before check on non-DSA netdevice events" }, - "CVE-2023-3090": { - "cmt_msg": "ipvlan:Fix out-of-bounds caused by unclear skb->cb", - "cmt_id": "3cd16c6a6a6b68bba02fbbc54b9906f44640ffde" + "CVE-2023-52443": { + "cmt_msg": "apparmor: avoid crash when parsed profile name is empty" }, - "CVE-2022-48425": { - "cmt_msg": "fs/ntfs3: Validate MFT flags before replaying logs", - "cmt_id": "e6f4b1c32d6d6047958d7700d12fed6d91f441e7" - } - }, - "6.3.5": { - "CVE-2023-21255": { - "cmt_msg": "binder: fix UAF caused by faulty buffer cleanup", - "cmt_id": "c9e6aae1f26758f3e87b93cff18d79dfd80f2f25" - } - }, - "6.3.7": { - "CVE-2022-45887": { - "cmt_msg": "media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb()", - "cmt_id": "dbef7d1ffea0ccc95446c5383e0be65babedf667" + "CVE-2024-26595": { + "cmt_msg": "mlxsw: spectrum_acl_tcam: Fix NULL pointer dereference in error path" }, - "CVE-2022-45886": { - "cmt_msg": "media: dvb-core: Fix use-after-free due on race condition at dvb_net", - "cmt_id": "8bade849b15b3ecb62893f328b2cc4cdc65ac0c6" + "CVE-2023-6931": { + "cmt_msg": "perf: Fix perf_event_validate_size()" }, - "CVE-2023-35788": { - "cmt_msg": "net/sched: flower: fix possible OOB write in fl_set_geneve_opt()", - "cmt_id": "900fab73a9cd3dd6a3a69f89980f8f3c9a738d5a" + "CVE-2023-6932": { + "cmt_msg": "ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet" }, - "CVE-2022-45919": { - "cmt_msg": "media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221", - "cmt_id": "59918dd7a6d1ad098550ca6fcf154c1ae6842bc7" + "CVE-2024-0607": { + "cmt_msg": "netfilter: nf_tables: fix pointer math issue in nft_byteorder_eval()" }, - "CVE-2023-2124": { - "cmt_msg": "xfs: verify buffer contents when we skip log replay", - "cmt_id": "69ebe82c73f4f9f4b49ed3b35ce347af20716d0a" + "CVE-2024-26803": { + "cmt_msg": "net: veth: clear GRO when clearing XDP even when down" }, - "CVE-2023-3212": { - "cmt_msg": "gfs2: Don't deref jdesc in evict", - "cmt_id": "14c454764a37b194dc916c07488ce7339c82bc4f" + "CVE-2024-26648": { + "cmt_msg": "drm/amd/display: Fix variable deferencing before NULL check in edp_setup_replay()" }, - "CVE-2023-21264": { - "cmt_msg": "KVM: arm64: Prevent unconditional donation of unmapped regions from the host", - "cmt_id": "c3cd33abe63f0ea32c3966ae67a7efc48e86c3e0" + "CVE-2024-26649": { + "cmt_msg": "drm/amdgpu: Fix the null pointer when load rlc firmware" }, - "CVE-2023-34255": { - "cmt_msg": "xfs: verify buffer contents when we skip log replay", - "cmt_id": "69ebe82c73f4f9f4b49ed3b35ce347af20716d0a" - } - }, - "6.3.8": { - "CVE-2023-38431": { - "cmt_msg": "ksmbd: check the validation of pdu_size in ksmbd_conn_handler_loop", - "cmt_id": "e9cb7be2fcbaee9e808b729e92948d38d52e5add" + "CVE-2024-26646": { + "cmt_msg": "thermal: intel: hfi: Add syscore callbacks for system-wide PM" }, - "CVE-2023-1194": { - "cmt_msg": "ksmbd: fix out-of-bound read in parse_lease_state()", - "cmt_id": "61dfe01204daf5469f21cc639f710f9e28e929c8" + "CVE-2024-26647": { + "cmt_msg": "drm/amd/display: Fix late derefrence 'dsc' check in 'link_set_dsc_pps_packet()'" }, - "CVE-2023-38427": { - "cmt_msg": "ksmbd: fix out-of-bound read in deassemble_neg_contexts()", - "cmt_id": "205279b96b5c40c60c6de4f9342416e02ee279f1" - } - }, - "6.3.9": { - "CVE-2023-3609": { - "cmt_msg": "net/sched: cls_u32: Fix reference counter leak leading to overflow", - "cmt_id": "4efd555a43dc24f3342bcc036522c430f5869e6f" + "CVE-2024-26644": { + "cmt_msg": "btrfs: don't abort filesystem when attempting to snapshot deleted subvolume" }, - "CVE-2023-38430": { - "cmt_msg": "ksmbd: validate smb request protocol id", - "cmt_id": "75e7d81679ef7995422adc84ef597fded99c24a6" + "CVE-2024-26645": { + "cmt_msg": "tracing: Ensure visibility when inserting an element into tracing_map" }, - "CVE-2023-3117": { - "cmt_msg": "netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE", - "cmt_id": "bdace3b1a51887211d3e49417a18fdbd315a313b" + "CVE-2023-4194": { + "cmt_msg": "net: tun_chr_open(): set sk_uid from current_fsuid()" }, - "CVE-2023-3390": { - "cmt_msg": "netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE", - "cmt_id": "bdace3b1a51887211d3e49417a18fdbd315a313b" + "CVE-2024-26640": { + "cmt_msg": "tcp: add sanity checks to rx zerocopy" }, - "CVE-2024-0443": { - "cmt_msg": "blk-cgroup: Flush stats before releasing blkcg_gq", - "cmt_id": "0f6090d90f627d8c58f939067d6c6821ce1b3c68" - } - }, - "6.3.10": { - "CVE-2023-3865": { - "cmt_msg": "ksmbd: fix out-of-bound read in smb2_write", - "cmt_id": "58a9c41064df27632e780c5a3ae3e0e4284957d1" + "CVE-2024-26641": { + "cmt_msg": "ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv()" }, - "CVE-2023-3610": { - "cmt_msg": "netfilter: nf_tables: fix chain binding transaction logic", - "cmt_id": "a1547f81341f14b1b355df04218152e8b5d4b264" + "CVE-2023-50431": { + "cmt_msg": "accel/habanalabs: fix information leak in sec_attest_info()" }, - "CVE-2023-38432": { - "cmt_msg": "ksmbd: validate command payload size", - "cmt_id": "768caf4019f0391c0b6452afe34cea1704133f7b" + "CVE-2024-26791": { + "cmt_msg": "btrfs: dev-replace: properly validate device names" }, - "CVE-2023-3866": { - "cmt_msg": "ksmbd: validate session id and tree id in the compound request", - "cmt_id": "d1066c1b3663401cd23c0d6e60cdae750ce00c0f" - } - }, - "6.3.11": { - "CVE-2023-3269": { - "cmt_msg": "mm: introduce new 'lock_mm_and_find_vma()' page fault helper", - "cmt_id": "bce721f87edd54379120ffb85111357923f4f326" - } - }, - "6.3.13": { - "CVE-2023-39197": { - "cmt_msg": "netfilter: conntrack: dccp: copy entire header to stack buffer, not just basic one", - "cmt_id": "26bd1f210d3783a691052c51d76bb8a8bbd24c67" + "CVE-2023-52467": { + "cmt_msg": "mfd: syscon: Fix null pointer dereference in of_syscon_register()" }, - "CVE-2023-33250": { - "cmt_msg": "iommufd: Call iopt_area_contig_done() under the lock", - "cmt_id": "1d2b603d938c898b5fd8da6e3d80184366ca6ea0" + "CVE-2023-52464": { + "cmt_msg": "EDAC/thunderx: Fix possible out-of-bounds string access" }, - "CVE-2023-4134": { - "cmt_msg": "Input: cyttsp4_core - change del_timer_sync() to timer_shutdown_sync()", - "cmt_id": "c261139c1df65c9c4bf00e96c91183bcfc1919ec" + "CVE-2023-52462": { + "cmt_msg": "bpf: fix check for attempt to corrupt spilled pointer" }, - "CVE-2023-3863": { - "cmt_msg": "net: nfc: Fix use-after-free caused by nfc_llcp_find_local", - "cmt_id": "b3ad46e155a6d91b36c6e892019a43e3ef3c696d" - } - }, - "outstanding": { - "CVE-2023-20593": { - "cmt_msg": "x86/cpu/amd: Add a Zenbleed fix" + "CVE-2023-52463": { + "cmt_msg": "efivarfs: force RO when remounting if SetVariable is not supported" }, - "CVE-2020-26556": { + "CVE-2022-25265": { "cmt_msg": "" }, - "CVE-2020-26557": { + "CVE-2023-52469": { + "cmt_msg": "drivers/amd/pm: fix a use-after-free in kv_parse_power_table" + }, + "CVE-2019-15290": { "cmt_msg": "" }, - "CVE-2023-34324": { - "cmt_msg": "xen/events: replace evtchn_rwlock with RCU" + "CVE-2024-26633": { + "cmt_msg": "ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim()" }, - "CVE-2023-4015": { - "cmt_msg": "netfilter: nf_tables: skip immediate deactivate in _PREPARE_ERROR" + "CVE-2024-26632": { + "cmt_msg": "block: Fix iterating over an empty bio with bio_for_each_folio_all" }, - "CVE-2019-20794": { + "CVE-2023-6622": { + "cmt_msg": "netfilter: nf_tables: bail out on mismatching dynset and set expressions" + }, + "CVE-2024-26733": { + "cmt_msg": "arp: Prevent overflow in arp_req_get()." + }, + "CVE-2024-26636": { + "cmt_msg": "llc: make llc_ui_sendmsg() more robust against bonding changes" + }, + "CVE-2024-26635": { + "cmt_msg": "llc: Drop support for ETH_P_TR_802_2." + }, + "CVE-2022-26878": { "cmt_msg": "" }, - "CVE-2020-26559": { + "CVE-2024-2193": { "cmt_msg": "" }, - "CVE-2020-35501": { + "CVE-2018-12930": { "cmt_msg": "" }, - "CVE-2023-4010": { + "CVE-2018-12931": { "cmt_msg": "" }, - "CVE-2023-6176": { - "cmt_msg": "net/tls: do not free tls_rec on async operation in bpf_exec_tx_verdict()" + "CVE-2023-52637": { + "cmt_msg": "can: j1939: Fix UAF in j1939_sk_match_filter during setsockopt(SO_J1939_FILTER)" }, - "CVE-2023-46813": { - "cmt_msg": "x86/sev: Check for user-space IOIO pointing to kernel space" + "CVE-2024-26642": { + "cmt_msg": "netfilter: nf_tables: disallow anonymous set with timeout flag" }, - "CVE-2023-52458": { - "cmt_msg": "block: add check that partition length needs to be aligned with block size" + "CVE-2023-20588": { + "cmt_msg": "x86/CPU/AMD: Do not leak quotient data after a division by 0" }, - "CVE-2023-52457": { - "cmt_msg": "serial: 8250: omap: Don't skip resource freeing if pm_runtime_resume_and_get() failed" + "CVE-2022-44034": { + "cmt_msg": "char: pcmcia: remove all the drivers" }, - "CVE-2018-1121": { - "cmt_msg": "" + "CVE-2022-44033": { + "cmt_msg": "char: pcmcia: remove all the drivers" }, - "CVE-2023-52451": { - "cmt_msg": "powerpc/pseries/memhp: Fix access beyond end of drmem array" + "CVE-2022-44032": { + "cmt_msg": "char: pcmcia: remove all the drivers" }, - "CVE-2023-52454": { - "cmt_msg": "nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length" + "CVE-2024-26782": { + "cmt_msg": "mptcp: fix double-free on socket dismantle" }, - "CVE-2023-52453": { - "cmt_msg": "hisi_acc_vfio_pci: Update migration data pointer correctly on saving/resume" + "CVE-2024-22705": { + "cmt_msg": "ksmbd: fix slab-out-of-bounds in smb_strndup_from_utf16()" }, - "CVE-2023-52452": { - "cmt_msg": "bpf: Fix accesses to uninit stack slots" + "CVE-2023-4147": { + "cmt_msg": "netfilter: nf_tables: disallow rule addition to bound chain via NFTA_RULE_CHAIN_ID" }, "CVE-2023-5090": { "cmt_msg": "x86: KVM: SVM: always update the x2avic msr interception" }, - "CVE-2023-51779": { - "cmt_msg": "Bluetooth: af_bluetooth: Fix Use-After-Free in bt_sock_recvmsg" + "CVE-2024-26672": { + "cmt_msg": "drm/amdgpu: Fix variable 'mca_funcs' dereferenced before NULL check in 'amdgpu_mca_smu_get_mca_entry()'" }, - "CVE-2019-19378": { - "cmt_msg": "" + "CVE-2023-52527": { + "cmt_msg": "ipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data()" }, - "CVE-2024-0641": { - "cmt_msg": "tipc: fix a potential deadlock on &tx->lock" + "CVE-2023-52526": { + "cmt_msg": "erofs: fix memory leak of LZMA global compressed deduplication" }, - "CVE-2024-1085": { - "cmt_msg": "netfilter: nf_tables: check if catch-all set element is active in next generation" + "CVE-2023-52523": { + "cmt_msg": "bpf, sockmap: Reject sk_msg egress redirects to non-TCP sockets" }, - "CVE-2024-1086": { - "cmt_msg": "netfilter: nf_tables: reject QUEUE/DROP verdict parameters" + "CVE-2023-52522": { + "cmt_msg": "net: fix possible store tearing in neigh_periodic_work()" }, - "CVE-2023-5345": { - "cmt_msg": "fs/smb/client: Reset password pointer to NULL" + "CVE-2023-52520": { + "cmt_msg": "platform/x86: think-lmi: Fix reference leak" }, - "CVE-2023-5717": { - "cmt_msg": "perf: Disallow mis-matched inherited group reads" + "CVE-2024-0641": { + "cmt_msg": "tipc: fix a potential deadlock on &tx->lock" }, - "CVE-2024-0646": { - "cmt_msg": "net: tls, update curr on splice as well" + "CVE-2024-26789": { + "cmt_msg": "crypto: arm64/neonbs - fix out-of-bounds access on short input" }, - "CVE-2023-39198": { - "cmt_msg": "drm/qxl: fix UAF on handle creation" + "CVE-2024-26779": { + "cmt_msg": "wifi: mac80211: fix race condition on enabling fast-xmit" }, - "CVE-2024-25744": { - "cmt_msg": "x86/coco: Disable 32-bit emulation by default on TDX and SEV" + "CVE-2023-52529": { + "cmt_msg": "HID: sony: Fix a potential memory leak in sony_probe()" }, - "CVE-2020-24503": { - "cmt_msg": "" + "CVE-2023-52528": { + "cmt_msg": "net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg" }, - "CVE-2020-24502": { - "cmt_msg": "" + "CVE-2023-39198": { + "cmt_msg": "drm/qxl: fix UAF on handle creation" }, - "CVE-2023-4273": { - "cmt_msg": "exfat: check if filename entries exceeds max filename length" + "CVE-2023-46813": { + "cmt_msg": "x86/sev: Check for user-space IOIO pointing to kernel space" }, - "CVE-2024-22705": { - "cmt_msg": "ksmbd: fix slab-out-of-bounds in smb_strndup_from_utf16()" + "CVE-2024-26774": { + "cmt_msg": "ext4: avoid dividing by 0 in mb_update_avg_fragment_size() when block bitmap corrupt" }, "CVE-2023-39193": { "cmt_msg": "netfilter: xt_sctp: validate the flag_info count" @@ -155918,59 +205487,50 @@ "CVE-2023-39192": { "cmt_msg": "netfilter: xt_u32: validate user space input" }, + "CVE-2024-26602": { + "cmt_msg": "sched/membarrier: reduce the ability to hammer on sys_membarrier" + }, "CVE-2023-6610": { "cmt_msg": "smb: client: fix potential OOB in smb2_dump_detail()" }, - "CVE-2020-11725": { - "cmt_msg": "" - }, - "CVE-2023-6238": { - "cmt_msg": "" - }, - "CVE-2022-23825": { - "cmt_msg": "" + "CVE-2024-26600": { + "cmt_msg": "phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP" }, - "CVE-2023-3397": { - "cmt_msg": "" + "CVE-2024-26601": { + "cmt_msg": "ext4: regenerate buddy after block freeing failed if under fc replay" }, - "CVE-2023-4004": { - "cmt_msg": "netfilter: nft_set_pipapo: fix improper element removal" + "CVE-2024-26606": { + "cmt_msg": "binder: signal epoll threads of self-work" }, - "CVE-2024-0584": { - "cmt_msg": "ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet" + "CVE-2024-26607": { + "cmt_msg": "drm/bridge: sii902x: Fix probing race issue" }, - "CVE-2023-1476": { - "cmt_msg": "" + "CVE-2024-26765": { + "cmt_msg": "LoongArch: Disable IRQ before init_fn() for nonboot CPUs" }, - "CVE-2023-4147": { - "cmt_msg": "netfilter: nf_tables: disallow rule addition to bound chain via NFTA_RULE_CHAIN_ID" + "CVE-2024-26764": { + "cmt_msg": "fs/aio: Restrict kiocb_set_cancel_fn() to I/O submitted via libaio" }, - "CVE-2023-5633": { - "cmt_msg": "drm/vmwgfx: Keep a gem reference to user bos in surfaces" + "CVE-2024-26608": { + "cmt_msg": "ksmbd: fix global oob in ksmbd_nl_policy" }, - "CVE-2021-3864": { - "cmt_msg": "" + "CVE-2024-26766": { + "cmt_msg": "IB/hfi1: Fix sdma.h tx->num_descs off-by-one error" }, - "CVE-2022-3606": { - "cmt_msg": "" + "CVE-2024-26761": { + "cmt_msg": "cxl/pci: Fix disabling memory if DVSEC CXL Range does not match a CFMWS window" }, - "CVE-2019-19814": { - "cmt_msg": "" + "CVE-2024-26760": { + "cmt_msg": "scsi: target: pscsi: Fix bio_put() for error case" }, - "CVE-2022-2209": { + "CVE-2023-1476": { "cmt_msg": "" }, - "CVE-2024-24857": { + "CVE-2021-3864": { "cmt_msg": "" }, - "CVE-2024-23849": { - "cmt_msg": "net/rds: Fix UBSAN: array-index-out-of-bounds in rds_cmsg_recv" - }, - "CVE-2024-1312": { - "cmt_msg": "mm: lock_vma_under_rcu() must check vma->anon_vma under vma lock" - }, - "CVE-2023-52463": { - "cmt_msg": "efivarfs: force RO when remounting if SetVariable is not supported" + "CVE-2024-26770": { + "cmt_msg": "HID: nvidia-shield: Add missing null pointer checks to LED initialization" }, "CVE-2023-51043": { "cmt_msg": "drm/atomic: Fix potential use-after-free in nonblocking commits" @@ -155978,446 +205538,617 @@ "CVE-2023-51042": { "cmt_msg": "drm/amdgpu: Fix potential fence use-after-free v2" }, - "CVE-2023-7042": { - "cmt_msg": "" - }, "CVE-2023-20569": { "cmt_msg": "x86/bugs: Increase the x86 bugs vector size to two u32s" }, - "CVE-2021-26934": { + "CVE-2016-8660": { "cmt_msg": "" }, - "CVE-2023-47233": { + "CVE-2023-6270": { + "cmt_msg": "aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts" + }, + "CVE-2008-4609": { "cmt_msg": "" }, - "CVE-2024-23850": { - "cmt_msg": "btrfs: do not ASSERT() if the newly created subvolume already got read" + "CVE-2023-6356": { + "cmt_msg": "nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length" }, - "CVE-2023-40283": { - "cmt_msg": "Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb" + "CVE-2023-52639": { + "cmt_msg": "KVM: s390: vsie: fix race during shadow creation" }, - "CVE-2016-8660": { - "cmt_msg": "" + "CVE-2023-52456": { + "cmt_msg": "serial: imx: fix tx statemachine deadlock" }, - "CVE-2023-6270": { - "cmt_msg": "" + "CVE-2019-15239": { + "cmt_msg": "unknown" }, - "CVE-2024-26594": { - "cmt_msg": "ksmbd: validate mech token in session setup" + "CVE-2023-52635": { + "cmt_msg": "PM / devfreq: Synchronize devfreq_monitor_[start/stop]" }, - "CVE-2023-5158": { - "cmt_msg": "vringh: don't use vringh_kiov_advance() in vringh_iov_xfer()" + "CVE-2023-52634": { + "cmt_msg": "drm/amd/display: Fix disable_otg_wa logic" }, - "CVE-2024-26592": { - "cmt_msg": "ksmbd: fix UAF issue in ksmbd_tcp_new_connection()" + "CVE-2023-52633": { + "cmt_msg": "um: time-travel: fix time corruption" }, - "CVE-2024-26593": { - "cmt_msg": "i2c: i801: Fix block process call transactions" + "CVE-2023-52632": { + "cmt_msg": "drm/amdkfd: Fix lock dependency warning with srcu" }, - "CVE-2024-26590": { - "cmt_msg": "erofs: fix inconsistent per-file compression format" + "CVE-2023-52631": { + "cmt_msg": "fs/ntfs3: Fix an NULL dereference bug" }, - "CVE-2024-26591": { - "cmt_msg": "bpf: Fix re-attachment branch in bpf_tracing_prog_attach" + "CVE-2023-52630": { + "cmt_msg": "blk-iocost: Fix an UBSAN shift-out-of-bounds warning" }, - "CVE-2020-15802": { + "CVE-2023-20941": { "cmt_msg": "" }, - "CVE-2022-36402": { - "cmt_msg": "drm/vmwgfx: Fix shader stage validation" - }, - "CVE-2008-2544": { - "cmt_msg": "" + "CVE-2023-52453": { + "cmt_msg": "hisi_acc_vfio_pci: Update migration data pointer correctly on saving/resume" }, - "CVE-2023-2898": { - "cmt_msg": "f2fs: fix to avoid NULL pointer dereference f2fs_write_end_io()" + "CVE-2024-26638": { + "cmt_msg": "nbd: always initialize struct msghdr completely" }, - "CVE-2024-26598": { - "cmt_msg": "KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache" + "CVE-2023-4155": { + "cmt_msg": "KVM: SEV: only access GHCB fields once" }, - "CVE-2024-26599": { - "cmt_msg": "pwm: Fix out-of-bounds access in of_pwm_single_xlate()" + "CVE-2023-3777": { + "cmt_msg": "netfilter: nf_tables: skip bound chain on rule flush" }, - "CVE-2023-40791": { - "cmt_msg": "crypto, cifs: fix error handling in extract_iter_to_sg()" + "CVE-2023-3776": { + "cmt_msg": "net/sched: cls_fw: Fix improper refcount update leads to use-after-free" }, - "CVE-2023-52439": { - "cmt_msg": "uio: Fix use-after-free in uio_open" + "CVE-2023-3773": { + "cmt_msg": "xfrm: add forgotten nla_policy for XFRMA_MTIMER_THRESH" }, - "CVE-2023-52438": { - "cmt_msg": "binder: fix use-after-free in shinker's callback" + "CVE-2023-3772": { + "cmt_msg": "xfrm: add NULL check in xfrm_update_ae_params" }, - "CVE-2023-6356": { + "CVE-2022-3533": { "cmt_msg": "" }, - "CVE-2024-26582": { - "cmt_msg": "net: tls: fix use-after-free with partial reads and async decrypt" - }, - "CVE-2023-52456": { - "cmt_msg": "serial: imx: fix tx statemachine deadlock" + "CVE-2023-6121": { + "cmt_msg": "nvmet: nul-terminate the NQNs passed in the connect command" }, - "CVE-2019-15239": { - "cmt_msg": "unknown" + "CVE-2023-52638": { + "cmt_msg": "can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock" }, - "CVE-2023-3867": { - "cmt_msg": "ksmbd: add missing compound request handing in some commands" + "CVE-2024-26631": { + "cmt_msg": "ipv6: mcast: fix data-race in ipv6_mc_down / mld_ifc_work" }, - "CVE-2007-3719": { + "CVE-2017-13693": { "cmt_msg": "" }, - "CVE-2023-52434": { - "cmt_msg": "smb: client: fix potential OOBs in smb2_parse_contexts()" + "CVE-2017-13694": { + "cmt_msg": "" }, - "CVE-2023-25775": { - "cmt_msg": "RDMA/irdma: Prevent zero-length STAG registration" + "CVE-2022-48628": { + "cmt_msg": "ceph: drop messages from MDS when unmounting" }, - "CVE-2024-24861": { + "CVE-2024-24859": { "cmt_msg": "" }, - "CVE-2023-20941": { + "CVE-2024-24858": { "cmt_msg": "" }, - "CVE-2024-26586": { - "cmt_msg": "mlxsw: spectrum_acl_tcam: Fix stack corruption" + "CVE-2023-5345": { + "cmt_msg": "fs/smb/client: Reset password pointer to NULL" }, - "CVE-2023-21400": { + "CVE-2024-24855": { + "cmt_msg": "scsi: lpfc: Fix a possible data race in lpfc_unregister_fcf_rescan()" + }, + "CVE-2024-24857": { "cmt_msg": "" }, - "CVE-2024-26589": { - "cmt_msg": "bpf: Reject variable offset alu on PTR_TO_FLOW_KEYS" + "CVE-2024-26673": { + "cmt_msg": "netfilter: nft_ct: sanitize layer 3 and 4 protocol number in custom expectations" }, - "CVE-2023-2640": { + "CVE-2022-3544": { "cmt_msg": "" }, - "CVE-2023-6915": { - "cmt_msg": "ida: Fix crash in ida_free when the bitmap is empty" + "CVE-2023-52569": { + "cmt_msg": "btrfs: remove BUG() after failure to insert delayed dir index item" }, - "CVE-2010-4563": { - "cmt_msg": "" + "CVE-2023-52568": { + "cmt_msg": "x86/sgx: Resolves SECS reclaim vs. page fault for EAUG race" }, - "CVE-2020-26140": { - "cmt_msg": "" + "CVE-2023-52563": { + "cmt_msg": "drm/meson: fix memory leak on ->hpd_notify callback" }, - "CVE-2020-26143": { + "CVE-2023-52562": { + "cmt_msg": "mm/slab_common: fix slab_caches list corruption after kmem_cache_destroy()" + }, + "CVE-2023-52561": { + "cmt_msg": "arm64: dts: qcom: sdm845-db845c: Mark cont splash memory region as reserved" + }, + "CVE-2023-52560": { + "cmt_msg": "mm/damon/vaddr-test: fix memory leak in damon_do_test_apply_three_regions()" + }, + "CVE-2023-5197": { + "cmt_msg": "netfilter: nf_tables: disallow rule removal from chain binding" + }, + "CVE-2023-52566": { + "cmt_msg": "nilfs2: fix potential use after free in nilfs_gccache_submit_read_data()" + }, + "CVE-2023-52565": { + "cmt_msg": "media: uvcvideo: Fix OOB read" + }, + "CVE-2020-0347": { "cmt_msg": "" }, - "CVE-2020-26142": { + "CVE-2019-12456": { "cmt_msg": "" }, - "CVE-2023-4155": { - "cmt_msg": "KVM: SEV: only access GHCB fields once" + "CVE-2024-26720": { + "cmt_msg": "mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again" }, - "CVE-2023-3777": { - "cmt_msg": "netfilter: nf_tables: skip bound chain on rule flush" + "CVE-2024-26723": { + "cmt_msg": "lan966x: Fix crash when adding interface under a lag" }, - "CVE-2023-3776": { - "cmt_msg": "net/sched: cls_fw: Fix improper refcount update leads to use-after-free" + "CVE-2023-6546": { + "cmt_msg": "tty: n_gsm: fix the UAF caused by race condition in gsm_cleanup_mux" }, - "CVE-2023-45871": { - "cmt_msg": "igb: set max size RX buffer when store bad packet is enabled" + "CVE-2024-26727": { + "cmt_msg": "btrfs: do not ASSERT() if the newly created subvolume already got read" }, - "CVE-2023-3773": { - "cmt_msg": "xfrm: add forgotten nla_policy for XFRMA_MTIMER_THRESH" + "CVE-2024-26726": { + "cmt_msg": "btrfs: don't drop extent_map for free space inode on write error" }, - "CVE-2023-3772": { - "cmt_msg": "xfrm: add NULL check in xfrm_update_ae_params" + "CVE-2023-34319": { + "cmt_msg": "xen/netback: Fix buffer overrun triggered by unusual packet" }, - "CVE-2023-4622": { - "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES" + "CVE-2023-1206": { + "cmt_msg": "tcp: Reduce chance of collisions in inet6_hashfn()." }, - "CVE-2023-4623": { - "cmt_msg": "net/sched: sch_hfsc: Ensure inner classes have fsc curve" + "CVE-2022-3642": { + "cmt_msg": "" }, - "CVE-2024-26583": { - "cmt_msg": "tls: fix race between async notify and socket close" + "CVE-2024-0584": { + "cmt_msg": "ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet" }, - "CVE-2022-3533": { - "cmt_msg": "" + "CVE-2023-52518": { + "cmt_msg": "Bluetooth: hci_codec: Fix leaking content of local_codecs" }, - "CVE-2024-26585": { - "cmt_msg": "tls: fix race between tx work scheduling and socket close" + "CVE-2023-52519": { + "cmt_msg": "HID: intel-ish-hid: ipc: Disable and reenable ACPI GPE bit" }, - "CVE-2024-26584": { - "cmt_msg": "net: tls: handle backlogging of crypto requests" + "CVE-2023-52516": { + "cmt_msg": "dma-debug: don't call __dma_entry_alloc_check_leak() under free_entries_lock" }, - "CVE-2024-26587": { - "cmt_msg": "net: netdevsim: don't try to destroy PHC on VFs" + "CVE-2023-52517": { + "cmt_msg": "spi: sun6i: fix race between DMA RX transfer completion and RX FIFO drain" }, - "CVE-2022-1247": { - "cmt_msg": "" + "CVE-2023-52515": { + "cmt_msg": "RDMA/srp: Do not call scsi_done() from srp_abort()" }, - "CVE-2023-51782": { - "cmt_msg": "net/rose: Fix Use-After-Free in rose_ioctl" + "CVE-2023-52512": { + "cmt_msg": "pinctrl: nuvoton: wpcm450: fix out of bounds write" }, - "CVE-2024-26588": { - "cmt_msg": "LoongArch: BPF: Prevent out-of-bounds memory access" + "CVE-2023-52513": { + "cmt_msg": "RDMA/siw: Fix connection failure handling" }, - "CVE-2023-51780": { - "cmt_msg": "atm: Fix Use-After-Free in do_vcc_ioctl" + "CVE-2023-52510": { + "cmt_msg": "ieee802154: ca8210: Fix a potential UAF in ca8210_probe" }, - "CVE-2023-51781": { - "cmt_msg": "appletalk: Fix Use-After-Free in atalk_ioctl" + "CVE-2023-52511": { + "cmt_msg": "spi: sun6i: reduce DMA RX transfer width to single byte" }, - "CVE-2020-10708": { - "cmt_msg": "" + "CVE-2023-6531": { + "cmt_msg": "io_uring/af_unix: disable sending io_uring over sockets" }, - "CVE-2023-6121": { - "cmt_msg": "nvmet: nul-terminate the NQNs passed in the connect command" + "CVE-2024-0340": { + "cmt_msg": "vhost: use kzalloc() instead of kmalloc() followed by memset()" }, - "CVE-2022-4543": { + "CVE-2023-6535": { "cmt_msg": "" }, - "CVE-2017-13693": { - "cmt_msg": "" + "CVE-2023-6536": { + "cmt_msg": "nvmet-tcp: fix a crash in nvmet_req_complete()" }, - "CVE-2021-0399": { + "CVE-2018-17977": { "cmt_msg": "" }, - "CVE-2017-13694": { - "cmt_msg": "" + "CVE-2024-1151": { + "cmt_msg": "net: openvswitch: limit the number of recursions from action sets" }, - "CVE-2023-42754": { - "cmt_msg": "ipv4: fix null-deref in ipv4_link_failure" + "CVE-2024-26659": { + "cmt_msg": "xhci: handle isoc Babble and Buffer Overrun events properly" }, - "CVE-2024-0564": { - "cmt_msg": "" + "CVE-2024-26658": { + "cmt_msg": "bcachefs: grab s_umount only if snapshotting" }, - "CVE-2012-4542": { + "CVE-2010-5321": { "cmt_msg": "" }, - "CVE-2023-42753": { - "cmt_msg": "netfilter: ipset: add the missing IP_SET_HASH_WITH_NET0 macro for ip_set_hash_netportnet.c" + "CVE-2024-26655": { + "cmt_msg": "Fix memory leak in posix_clock_open()" }, - "CVE-2023-42752": { - "cmt_msg": "igmp: limit igmpv3_newpack() packet size to IP_MAX_MTU" + "CVE-2024-26654": { + "cmt_msg": "ALSA: sh: aica: reorder cleanup operations to avoid UAF bugs" }, - "CVE-2023-4128": { - "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free" + "CVE-2024-26656": { + "cmt_msg": "drm/amdgpu: fix use-after-free bug" }, - "CVE-2023-4244": { - "cmt_msg": "netfilter: nf_tables: fix GC transaction races with netns and netlink event exit path" + "CVE-2024-26651": { + "cmt_msg": "sr9800: Add check for usbnet_get_endpoints" }, - "CVE-2013-7445": { - "cmt_msg": "" + "CVE-2024-26650": { + "cmt_msg": "platform/x86: p2sb: Allow p2sb_bar() calls during PCI device probe" }, - "CVE-2023-31248": { - "cmt_msg": "netfilter: nf_tables: do not ignore genmask when looking up chain by id" + "CVE-2023-52475": { + "cmt_msg": "Input: powermate - fix use-after-free in powermate_config_complete" }, - "CVE-2024-24859": { - "cmt_msg": "" + "CVE-2023-52477": { + "cmt_msg": "usb: hub: Guard against accesses to uninitialized BOS descriptors" }, - "CVE-2024-24858": { - "cmt_msg": "" + "CVE-2023-52476": { + "cmt_msg": "perf/x86/lbr: Filter vsyscall addresses" }, - "CVE-2005-3660": { + "CVE-2023-52470": { + "cmt_msg": "drm/radeon: check the alloc_workqueue return value in radeon_crtc_init()" + }, + "CVE-2024-21803": { "cmt_msg": "" }, - "CVE-2024-24855": { - "cmt_msg": "scsi: lpfc: Fix a possible data race in lpfc_unregister_fcf_rescan()" + "CVE-2023-4563": { + "cmt_msg": "netfilter: nf_tables: don't skip expired elements during walk" }, - "CVE-2023-31085": { - "cmt_msg": "ubi: Refuse attaching if mtd's erasesize is 0" + "CVE-2023-52479": { + "cmt_msg": "ksmbd: fix uaf in smb20_oplock_break_ack" }, - "CVE-2023-31084": { - "cmt_msg": "media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*()" + "CVE-2023-52478": { + "cmt_msg": "HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect" }, - "CVE-2023-31083": { - "cmt_msg": "Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO" + "CVE-2021-3542": { + "cmt_msg": "" }, - "CVE-2023-31082": { + "CVE-2018-12929": { "cmt_msg": "" }, - "CVE-2023-31081": { + "CVE-2018-12928": { "cmt_msg": "" }, - "CVE-2022-38096": { + "CVE-2023-25775": { + "cmt_msg": "RDMA/irdma: Prevent zero-length STAG registration" + }, + "CVE-2024-26778": { + "cmt_msg": "fbdev: savage: Error out if pixclock equals zero" + }, + "CVE-2020-10708": { "cmt_msg": "" }, - "CVE-2022-3544": { + "CVE-2023-32629": { "cmt_msg": "" }, - "CVE-2024-1151": { - "cmt_msg": "net: openvswitch: limit the number of recursions from action sets" + "CVE-2022-0400": { + "cmt_msg": "" }, - "CVE-2023-6039": { - "cmt_msg": "net: usb: lan78xx: reorder cleanup operations to avoid UAF bugs" + "CVE-2024-26808": { + "cmt_msg": "netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain" }, - "CVE-2023-6606": { - "cmt_msg": "smb: client: fix OOB in smbCalcSize()" + "CVE-2024-26809": { + "cmt_msg": "netfilter: nft_set_pipapo: release elements in clone only from destroy path" }, - "CVE-2024-23307": { - "cmt_msg": "" + "CVE-2024-26804": { + "cmt_msg": "net: ip_tunnel: prevent perpetual headroom growth" }, - "CVE-2023-5197": { - "cmt_msg": "netfilter: nf_tables: disallow rule removal from chain binding" + "CVE-2024-26805": { + "cmt_msg": "netlink: Fix kernel-infoleak-after-free in __skb_datagram_iter" }, - "CVE-2024-26597": { - "cmt_msg": "net: qualcomm: rmnet: fix global oob in rmnet_policy" + "CVE-2024-26806": { + "cmt_msg": "spi: cadence-qspi: remove system-wide suspend helper calls from runtime PM hooks" }, - "CVE-2022-3238": { - "cmt_msg": "" + "CVE-2024-26801": { + "cmt_msg": "Bluetooth: Avoid potential use-after-free in hci_error_reset" }, - "CVE-2008-4609": { - "cmt_msg": "" + "CVE-2024-26802": { + "cmt_msg": "stmmac: Clear variable when destroying workqueue" }, - "CVE-2020-14304": { - "cmt_msg": "" + "CVE-2023-52508": { + "cmt_msg": "nvme-fc: Prevent null pointer dereference in nvme_fc_io_getuuid()" }, - "CVE-2024-26595": { - "cmt_msg": "mlxsw: spectrum_acl_tcam: Fix NULL pointer dereference in error path" + "CVE-2023-52606": { + "cmt_msg": "powerpc/lib: Validate size for vector operations" }, - "CVE-2023-6931": { - "cmt_msg": "perf: Fix perf_event_validate_size()" + "CVE-2023-52607": { + "cmt_msg": "powerpc/mm: Fix null-pointer dereference in pgtable_cache_add" }, - "CVE-2023-6932": { - "cmt_msg": "ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet" + "CVE-2023-52604": { + "cmt_msg": "FS:JFS:UBSAN:array-index-out-of-bounds in dbAdjTree" }, - "CVE-2020-0347": { + "CVE-2023-52602": { + "cmt_msg": "jfs: fix slab-out-of-bounds Read in dtSearch" + }, + "CVE-2023-52603": { + "cmt_msg": "UBSAN: array-index-out-of-bounds in dtSplitRoot" + }, + "CVE-2023-52600": { + "cmt_msg": "jfs: fix uaf in jfs_evict_inode" + }, + "CVE-2023-52601": { + "cmt_msg": "jfs: fix array-index-out-of-bounds in dbAdjTree" + }, + "CVE-2023-52608": { + "cmt_msg": "firmware: arm_scmi: Check mailbox/SMT channel for consistency" + }, + "CVE-2023-52609": { + "cmt_msg": "binder: fix race between mmput() and do_exit()" + }, + "CVE-2023-4208": { + "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free" + }, + "CVE-2023-4206": { + "cmt_msg": "net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free" + }, + "CVE-2023-4207": { + "cmt_msg": "net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free" + }, + "CVE-2023-3640": { "cmt_msg": "" }, - "CVE-2024-0607": { - "cmt_msg": "netfilter: nf_tables: fix pointer math issue in nft_byteorder_eval()" + "CVE-2023-20593": { + "cmt_msg": "x86/cpu/amd: Add a Zenbleed fix" }, - "CVE-2023-3611": { - "cmt_msg": "net/sched: sch_qfq: account for stab overhead in qfq_enqueue" + "CVE-2023-4015": { + "cmt_msg": "netfilter: nf_tables: skip immediate deactivate in _PREPARE_ERROR" }, - "CVE-2021-3714": { + "CVE-2023-4010": { "cmt_msg": "" }, - "CVE-2023-4132": { - "cmt_msg": "media: usb: siano: Fix warning due to null work_func_t function pointer" + "CVE-2019-19378": { + "cmt_msg": "" }, - "CVE-2019-12456": { + "CVE-2020-24503": { "cmt_msg": "" }, - "CVE-2020-26560": { + "CVE-2020-24502": { "cmt_msg": "" }, - "CVE-2021-3892": { + "CVE-2020-11725": { "cmt_msg": "" }, - "CVE-2024-0841": { + "CVE-2022-3606": { "cmt_msg": "" }, - "CVE-2024-22386": { + "CVE-2022-2209": { "cmt_msg": "" }, - "CVE-2023-4921": { - "cmt_msg": "net: sched: sch_qfq: Fix UAF in qfq_dequeue()" + "CVE-2024-26775": { + "cmt_msg": "aoe: avoid potential deadlock at set_capacity" }, - "CVE-2023-6546": { - "cmt_msg": "tty: n_gsm: fix the UAF caused by race condition in gsm_cleanup_mux" + "CVE-2023-7042": { + "cmt_msg": "wifi: ath10k: fix NULL pointer dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev()" + }, + "CVE-2023-52559": { + "cmt_msg": "iommu/vt-d: Avoid memory allocation in iommu_suspend()" + }, + "CVE-2023-47233": { + "cmt_msg": "wifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach" + }, + "CVE-2024-23850": { + "cmt_msg": "btrfs: do not ASSERT() if the newly created subvolume already got read" }, "CVE-2024-23851": { "cmt_msg": "dm: limit the number of targets and parameter size area" }, - "CVE-2024-24860": { - "cmt_msg": "Bluetooth: Fix atomicity violation in {min,max}_key_size_set" + "CVE-2023-52629": { + "cmt_msg": "sh: push-switch: Reorder cleanup operations to avoid use-after-free bug" }, - "CVE-2023-34319": { - "cmt_msg": "xen/netback: Fix buffer overrun triggered by unusual packet" + "CVE-2024-26772": { + "cmt_msg": "ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal()" }, - "CVE-2023-4194": { - "cmt_msg": "net: tun_chr_open(): set sk_uid from current_fsuid()" + "CVE-2024-26758": { + "cmt_msg": "md: Don't ignore suspended array in md_check_recovery()" }, - "CVE-2023-1206": { - "cmt_msg": "tcp: Reduce chance of collisions in inet6_hashfn()." + "CVE-2024-26610": { + "cmt_msg": "wifi: iwlwifi: fix a memory corruption" }, - "CVE-2023-37454": { - "cmt_msg": "" + "CVE-2024-26612": { + "cmt_msg": "netfs, fscache: Prevent Oops in fscache_put_cache()" }, - "CVE-2023-5972": { - "cmt_msg": "nf_tables: fix NULL pointer dereference in nft_expr_inner_parse()" + "CVE-2023-6606": { + "cmt_msg": "smb: client: fix OOB in smbCalcSize()" }, - "CVE-2023-39194": { - "cmt_msg": "net: xfrm: Fix xfrm_address_filter OOB read" + "CVE-2024-26614": { + "cmt_msg": "tcp: make sure init the accept_queue's spinlocks once" }, - "CVE-2023-50431": { - "cmt_msg": "accel/habanalabs: fix information leak in sec_attest_info()" + "CVE-2024-26751": { + "cmt_msg": "ARM: ep93xx: Add terminator to gpiod_lookup_table" }, - "CVE-2022-3642": { - "cmt_msg": "" + "CVE-2024-26752": { + "cmt_msg": "l2tp: pass correct message length to ip6_append_data" }, - "CVE-2023-6240": { - "cmt_msg": "" + "CVE-2024-26753": { + "cmt_msg": "crypto: virtio/akcipher - Fix stack overflow on memcpy" }, - "CVE-2024-0639": { - "cmt_msg": "sctp: fix potential deadlock on &net->sctp.addr_wq_lock" + "CVE-2024-26754": { + "cmt_msg": "gtp: fix use-after-free and null-ptr-deref in gtp_genl_dump_pdp()" }, - "CVE-2023-52464": { - "cmt_msg": "EDAC/thunderx: Fix possible out-of-bounds string access" + "CVE-2024-26756": { + "cmt_msg": "md: Don't register sync_thread for reshape directly" }, - "CVE-2023-52462": { - "cmt_msg": "bpf: fix check for attempt to corrupt spilled pointer" + "CVE-2024-26757": { + "cmt_msg": "md: Don't ignore read-only array in md_check_recovery()" }, - "CVE-2011-4917": { - "cmt_msg": "" + "CVE-2023-52439": { + "cmt_msg": "uio: Fix use-after-free in uio_open" }, - "CVE-2023-52447": { - "cmt_msg": "bpf: Defer the free of inner map when necessary" + "CVE-2023-52438": { + "cmt_msg": "binder: fix use-after-free in shinker's callback" }, - "CVE-2019-15902": { - "cmt_msg": "unknown" + "CVE-2023-52435": { + "cmt_msg": "net: prevent mss overflow in skb_segment()" }, - "CVE-2024-25739": { - "cmt_msg": "" + "CVE-2023-52434": { + "cmt_msg": "smb: client: fix potential OOBs in smb2_parse_contexts()" }, - "CVE-2023-6531": { - "cmt_msg": "io_uring/af_unix: disable sending io_uring over sockets" + "CVE-2023-52436": { + "cmt_msg": "f2fs: explicitly null-terminate the xattr list" }, - "CVE-2019-15290": { + "CVE-2024-26688": { + "cmt_msg": "fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super" + }, + "CVE-2024-23307": { + "cmt_msg": "md/raid5: fix atomicity violation in raid5_cache_count" + }, + "CVE-2022-2961": { "cmt_msg": "" }, - "CVE-2024-0340": { - "cmt_msg": "vhost: use kzalloc() instead of kmalloc() followed by memset()" + "CVE-2024-26680": { + "cmt_msg": "net: atlantic: Fix DMA mapping for PTP hwts ring" }, - "CVE-2023-6535": { + "CVE-2024-26681": { + "cmt_msg": "netdevsim: avoid potential loop in nsim_dev_trap_report_work()" + }, + "CVE-2024-26686": { + "cmt_msg": "fs/proc: do_task_stat: use sig->stats_lock to gather the threads/children stats" + }, + "CVE-2024-26687": { + "cmt_msg": "xen/events: close evtchn after mapping cleanup" + }, + "CVE-2023-51779": { + "cmt_msg": "Bluetooth: af_bluetooth: Fix Use-After-Free in bt_sock_recvmsg" + }, + "CVE-2024-26685": { + "cmt_msg": "nilfs2: fix potential bug in end_buffer_async_write" + }, + "CVE-2023-2640": { "cmt_msg": "" }, - "CVE-2023-6536": { + "CVE-2023-6915": { + "cmt_msg": "ida: Fix crash in ida_free when the bitmap is empty" + }, + "CVE-2010-4563": { "cmt_msg": "" }, - "CVE-2023-52446": { - "cmt_msg": "bpf: Fix a race condition between btf_put() and map_free()" + "CVE-2023-45871": { + "cmt_msg": "igb: set max size RX buffer when store bad packet is enabled" }, - "CVE-2023-6622": { - "cmt_msg": "netfilter: nf_tables: bail out on mismatching dynset and set expressions" + "CVE-2023-4622": { + "cmt_msg": "unix: Convert unix_stream_sendpage() to use MSG_SPLICE_PAGES" }, - "CVE-2018-17977": { - "cmt_msg": "" + "CVE-2023-4623": { + "cmt_msg": "net/sched: sch_hfsc: Ensure inner classes have fsc curve" }, - "CVE-2022-26878": { + "CVE-2024-26663": { + "cmt_msg": "tipc: Check the bearer type before calling tipc_udp_nl_bearer_add()" + }, + "CVE-2023-52640": { + "cmt_msg": "fs/ntfs3: Fix oob in ntfs_listxattr" + }, + "CVE-2023-52641": { + "cmt_msg": "fs/ntfs3: Add NULL ptr dereference checking at the end of attr_allocate_frame()" + }, + "CVE-2021-0399": { "cmt_msg": "" }, - "CVE-2022-41848": { + "CVE-2023-52488": { + "cmt_msg": "serial: sc16is7xx: convert from _raw_ to _noinc_ regmap functions for FIFO" + }, + "CVE-2023-52489": { + "cmt_msg": "mm/sparsemem: fix race in accessing memory_section->usage" + }, + "CVE-2023-52484": { + "cmt_msg": "iommu/arm-smmu-v3: Fix soft lockup triggered by arm_smmu_mm_invalidate_range" + }, + "CVE-2023-42754": { + "cmt_msg": "ipv4: fix null-deref in ipv4_link_failure" + }, + "CVE-2023-52486": { + "cmt_msg": "drm: Don't unref the same fb many times by mistake due to deadlock handling" + }, + "CVE-2023-52480": { + "cmt_msg": "ksmbd: fix race condition between session lookup and expire" + }, + "CVE-2012-4542": { "cmt_msg": "" }, - "CVE-2022-1116": { + "CVE-2023-52482": { + "cmt_msg": "x86/srso: Add SRSO mitigation for Hygon processors" + }, + "CVE-2023-52483": { + "cmt_msg": "mctp: perform route lookups under a RCU read-side lock" + }, + "CVE-2023-4128": { + "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free" + }, + "CVE-2023-4244": { + "cmt_msg": "netfilter: nf_tables: fix GC transaction races with netns and netlink event exit path" + }, + "CVE-2023-52491": { + "cmt_msg": "media: mtk-jpeg: Fix use after free bug due to error path handling in mtk_jpeg_dec_device_run" + }, + "CVE-2024-26759": { + "cmt_msg": "mm/swap: fix race when skipping swapcache" + }, + "CVE-2023-6039": { + "cmt_msg": "net: usb: lan78xx: reorder cleanup operations to avoid UAF bugs" + }, + "CVE-2024-26615": { + "cmt_msg": "net/smc: fix illegal rmb_desc access in SMC-D connection dump" + }, + "CVE-2021-3714": { "cmt_msg": "" }, - "CVE-2010-5321": { + "CVE-2021-3892": { "cmt_msg": "" }, - "CVE-2022-40982": { - "cmt_msg": "x86/speculation: Add Gather Data Sampling mitigation" + "CVE-2024-24860": { + "cmt_msg": "Bluetooth: Fix atomicity violation in {min,max}_key_size_set" }, - "CVE-2018-12930": { + "CVE-2024-24861": { + "cmt_msg": "media: xc4000: Fix atomicity violation in xc4000_get_frequency" + }, + "CVE-2024-24864": { "cmt_msg": "" }, - "CVE-2018-12931": { + "CVE-2023-52596": { + "cmt_msg": "sysctl: Fix out of bounds access for empty sysctl registers" + }, + "CVE-2023-52597": { + "cmt_msg": "KVM: s390: fix setting of fpc register" + }, + "CVE-2023-52594": { + "cmt_msg": "wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus()" + }, + "CVE-2023-52595": { + "cmt_msg": "wifi: rt2x00: restart beacon queue when hardware reset" + }, + "CVE-2023-52593": { + "cmt_msg": "wifi: wfx: fix possible NULL pointer dereference in wfx_set_mfp_ap()" + }, + "CVE-2023-52590": { + "cmt_msg": "ocfs2: Avoid touching renamed directory if parent does not change" + }, + "CVE-2023-52591": { + "cmt_msg": "reiserfs: Avoid touching renamed directory if parent does not change" + }, + "CVE-2023-52598": { + "cmt_msg": "s390/ptrace: handle setting of fpc register correctly" + }, + "CVE-2023-52599": { + "cmt_msg": "jfs: fix array-index-out-of-bounds in diNewExt" + }, + "CVE-2024-26627": { + "cmt_msg": "scsi: core: Move scsi_host_busy() out of host lock for waking up EH handler" + }, + "CVE-2023-52446": { + "cmt_msg": "bpf: Fix a race condition between btf_put() and map_free()" + }, + "CVE-2011-4916": { "cmt_msg": "" }, - "CVE-2023-35827": { - "cmt_msg": "ravb: Fix use-after-free issue in ravb_tx_timeout_work()" + "CVE-2024-26622": { + "cmt_msg": "tomoyo: fix UAF write bug in tomoyo_write_control()" }, - "CVE-2024-0565": { - "cmt_msg": "smb: client: fix OOB in receive_encrypted_standard()" + "CVE-2024-26623": { + "cmt_msg": "pds_core: Prevent race issues involving the adminq" }, - "CVE-2024-23196": { + "CVE-2022-41848": { "cmt_msg": "" }, - "CVE-2023-46838": { - "cmt_msg": "xen-netback: don't produce zero-size SKB frags" + "CVE-2022-40982": { + "cmt_msg": "x86/speculation: Add Gather Data Sampling mitigation" }, "CVE-2021-39801": { "cmt_msg": "" @@ -156425,17 +206156,11 @@ "CVE-2021-39800": { "cmt_msg": "" }, - "CVE-2024-23848": { - "cmt_msg": "" - }, - "CVE-2023-4881": { - "cmt_msg": "netfilter: nftables: exthdr: fix 4-byte stack OOB write" - }, - "CVE-2023-52450": { - "cmt_msg": "perf/x86/intel/uncore: Fix NULL pointer dereference issue in upi_fill_topology()" + "CVE-2024-26784": { + "cmt_msg": "pmdomain: arm: Fix NULL dereference on scmi_perf_domain removal" }, "CVE-2024-22099": { - "cmt_msg": "" + "cmt_msg": "Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security" }, "CVE-2022-45885": { "cmt_msg": "" @@ -156443,50 +206168,53 @@ "CVE-2022-45884": { "cmt_msg": "" }, - "CVE-2023-52455": { - "cmt_msg": "iommu: Don't reserve 0-length IOVA region" + "CVE-2024-25740": { + "cmt_msg": "" }, "CVE-2024-25741": { "cmt_msg": "" }, + "CVE-2023-52509": { + "cmt_msg": "ravb: Fix use-after-free issue in ravb_tx_timeout_work()" + }, "CVE-2023-46343": { "cmt_msg": "nfc: nci: fix possible NULL pointer dereference in send_acknowledge()" }, - "CVE-2024-21803": { - "cmt_msg": "" + "CVE-2024-25744": { + "cmt_msg": "x86/coco: Disable 32-bit emulation by default on TDX and SEV" }, - "CVE-2023-52435": { - "cmt_msg": "net: prevent mss overflow in skb_segment()" + "CVE-2023-52505": { + "cmt_msg": "phy: lynx-28g: serialize concurrent phy_set_mode_ext() calls to shared registers" }, - "CVE-2023-4563": { - "cmt_msg": "netfilter: nf_tables: don't skip expired elements during walk" + "CVE-2023-52504": { + "cmt_msg": "x86/alternatives: Disable KASAN in apply_alternatives()" }, - "CVE-2021-3542": { - "cmt_msg": "" + "CVE-2023-52507": { + "cmt_msg": "nfc: nci: assert requested protocol is valid" }, - "CVE-2023-4569": { - "cmt_msg": "netfilter: nf_tables: deactivate catchall elements in next generation" + "CVE-2023-52506": { + "cmt_msg": "LoongArch: Set all reserved memblocks on Node#0 at initialization" }, - "CVE-2023-6817": { - "cmt_msg": "netfilter: nft_set_pipapo: skip inactive elements during set walk" + "CVE-2023-52501": { + "cmt_msg": "ring-buffer: Do not attempt to read past \"commit\"" }, - "CVE-2024-26596": { - "cmt_msg": "net: dsa: fix netdev_priv() dereference before check on non-DSA netdevice events" + "CVE-2023-52500": { + "cmt_msg": "scsi: pm80xx: Avoid leaking tags when processing OPC_INB_SET_CONTROLLER_CONFIG command" }, - "CVE-2023-37453": { - "cmt_msg": "USB: core: Fix race by not overwriting udev->descriptor in hub_port_init()" + "CVE-2023-52503": { + "cmt_msg": "tee: amdtee: fix use-after-free vulnerability in amdtee_close_session" }, - "CVE-2023-52436": { - "cmt_msg": "f2fs: explicitly null-terminate the xattr list" + "CVE-2023-52502": { + "cmt_msg": "net: nfc: fix races in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn()" }, - "CVE-2018-12929": { - "cmt_msg": "" + "CVE-2023-6817": { + "cmt_msg": "netfilter: nft_set_pipapo: skip inactive elements during set walk" }, - "CVE-2018-12928": { - "cmt_msg": "" + "CVE-2024-26668": { + "cmt_msg": "netfilter: nft_limit: reject configurations that cause integer overflow" }, - "CVE-2023-6560": { - "cmt_msg": "io_uring: don't allow discontig pages for IORING_SETUP_NO_MMAP" + "CVE-2024-26669": { + "cmt_msg": "net/sched: flower: Fix chain template offload" }, "CVE-2020-25220": { "cmt_msg": "" @@ -156494,48 +206222,36 @@ "CVE-2015-2877": { "cmt_msg": "" }, - "CVE-2024-24864": { - "cmt_msg": "" + "CVE-2024-26660": { + "cmt_msg": "drm/amd/display: Implement bounds check for stream encoder creation in DCN301" }, - "CVE-2023-26242": { - "cmt_msg": "" + "CVE-2024-26661": { + "cmt_msg": "drm/amd/display: Add NULL test for 'timing generator' in 'dcn21_set_pipe()'" }, - "CVE-2023-20588": { - "cmt_msg": "x86/CPU/AMD: Do not leak quotient data after a division by 0" + "CVE-2024-26662": { + "cmt_msg": "drm/amd/display: Fix 'panel_cntl' could be null in 'dcn21_set_backlight_level()'" }, - "CVE-2024-25740": { + "CVE-2023-26242": { "cmt_msg": "" }, - "CVE-2019-16089": { - "cmt_msg": "" + "CVE-2024-26664": { + "cmt_msg": "hwmon: (coretemp) Fix out-of-bounds memory access" }, - "CVE-2023-32629": { - "cmt_msg": "" + "CVE-2024-26665": { + "cmt_msg": "tunnels: fix out of bounds access when building IPv6 PMTU error" }, - "CVE-2022-0400": { + "CVE-2019-16089": { "cmt_msg": "" }, - "CVE-2022-44034": { - "cmt_msg": "char: pcmcia: remove all the drivers" - }, - "CVE-2022-44033": { - "cmt_msg": "char: pcmcia: remove all the drivers" - }, - "CVE-2022-44032": { - "cmt_msg": "char: pcmcia: remove all the drivers" - }, - "CVE-2023-44466": { - "cmt_msg": "libceph: harden msgr2.1 frame segment length checks" + "CVE-2024-26667": { + "cmt_msg": "drm/msm/dpu: check for valid hw_pp in dpu_encoder_helper_phys_cleanup" }, - "CVE-2023-4206": { - "cmt_msg": "net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free" + "CVE-2024-26689": { + "cmt_msg": "ceph: prevent use-after-free in encode_cap_msg()" }, "CVE-2021-3847": { "cmt_msg": "" }, - "CVE-2022-2961": { - "cmt_msg": "" - }, "CVE-2023-52440": { "cmt_msg": "ksmbd: fix slub overflow in ksmbd_decode_ntlmssp_auth_blob()" }, @@ -156545,8 +206261,8 @@ "CVE-2023-52442": { "cmt_msg": "ksmbd: validate session id and tree id in compound request" }, - "CVE-2023-52443": { - "cmt_msg": "apparmor: avoid crash when parsed profile name is empty" + "CVE-2023-5972": { + "cmt_msg": "nf_tables: fix NULL pointer dereference in nft_expr_inner_parse()" }, "CVE-2023-52444": { "cmt_msg": "f2fs: fix to avoid dirent corruption" @@ -156554,11 +206270,11 @@ "CVE-2023-52445": { "cmt_msg": "media: pvrusb2: fix use after free on context disconnection" }, - "CVE-2022-25265": { + "CVE-2011-4917": { "cmt_msg": "" }, - "CVE-2011-4916": { - "cmt_msg": "" + "CVE-2023-52447": { + "cmt_msg": "bpf: Defer the free of inner map when necessary" }, "CVE-2023-52448": { "cmt_msg": "gfs2: Fix kernel NULL pointer dereference in gfs2_rgrp_dump" @@ -156566,29 +206282,35 @@ "CVE-2023-52449": { "cmt_msg": "mtd: Fix gluebi NULL pointer dereference caused by ftl notifier" }, - "CVE-2023-46862": { - "cmt_msg": "io_uring/fdinfo: lock SQ thread while retrieving thread cpu/pid" - }, "CVE-2023-23039": { "cmt_msg": "" }, - "CVE-2023-52429": { - "cmt_msg": "dm: limit the number of targets and parameter size area" + "CVE-2024-26718": { + "cmt_msg": "dm-crypt, dm-verity: disable tasklets" }, - "CVE-2023-4208": { - "cmt_msg": "net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free" + "CVE-2024-26719": { + "cmt_msg": "nouveau: offload fence uevents work to workqueue" }, - "CVE-2023-39189": { - "cmt_msg": "netfilter: nfnetlink_osf: avoid OOB read" + "CVE-2024-26714": { + "cmt_msg": "interconnect: qcom: sc8180x: Mark CO0 BCM keepalive" }, - "CVE-2023-35001": { - "cmt_msg": "netfilter: nf_tables: prevent OOB access in nft_byteorder_eval" + "CVE-2024-26715": { + "cmt_msg": "usb: dwc3: gadget: Fix NULL pointer dereference in dwc3_gadget_suspend" }, - "CVE-2023-4207": { - "cmt_msg": "net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free" + "CVE-2024-1312": { + "cmt_msg": "mm: lock_vma_under_rcu() must check vma->anon_vma under vma lock" }, - "CVE-2023-3640": { - "cmt_msg": "" + "CVE-2024-26717": { + "cmt_msg": "HID: i2c-hid-of: fix NULL-deref on failed power up" + }, + "CVE-2024-26711": { + "cmt_msg": "iio: adc: ad4130: zero-initialize clock init data" + }, + "CVE-2024-26712": { + "cmt_msg": "powerpc/kasan: Fix addr error caused by page alignment" + }, + "CVE-2024-26713": { + "cmt_msg": "powerpc/pseries/iommu: Fix iommu initialisation during DLPAR add" } } } diff --git a/data/stream_fixes.json b/data/stream_fixes.json index 7264de006..82579d759 100644 --- a/data/stream_fixes.json +++ b/data/stream_fixes.json @@ -21233,6 +21233,66 @@ "fixed_version": "5.1" } }, + "CVE-2019-25160": { + "3.16": { + "cmt_id": "97bc3683c24999ee621d847c9348c75d2fe86272", + "fixed_version": "3.16.66" + }, + "3.18": { + "cmt_id": "c61d01faa5550e06794dcf86125ccd325bfad950", + "fixed_version": "3.18.137" + }, + "4.14": { + "cmt_id": "fcfe700acdc1c72eab231300e82b962bac2b2b2c", + "fixed_version": "4.14.106" + }, + "4.19": { + "cmt_id": "e3713abc4248aa6bcc11173d754c418b02a62cbb", + "fixed_version": "4.19.28" + }, + "4.20": { + "cmt_id": "fbf9578919d6c91100ec63acf2cba641383f6c78", + "fixed_version": "4.20.15" + }, + "4.4": { + "cmt_id": "dc18101f95fa6e815f426316b8b9a5cee28a334e", + "fixed_version": "4.4.177" + }, + "4.9": { + "cmt_id": "1c973f9c7cc2b3caae93192fdc8ecb3f0b4ac000", + "fixed_version": "4.9.163" + }, + "5.0": { + "cmt_id": "5578de4834fe0f2a34fedc7374be691443396d1f", + "fixed_version": "5.0" + } + }, + "CVE-2019-25162": { + "4.14": { + "cmt_id": "e6412ba3b6508bdf9c074d310bf4144afa6aec1a", + "fixed_version": "4.14.291" + }, + "4.19": { + "cmt_id": "23a191b132cd87f746c62f3dc27da33683d85829", + "fixed_version": "4.19.256" + }, + "5.10": { + "cmt_id": "81cb31756888bb062e92d2dca21cd629d77a46a9", + "fixed_version": "5.10.137" + }, + "5.15": { + "cmt_id": "35927d7509ab9bf41896b7e44f639504eae08af7", + "fixed_version": "5.15.61" + }, + "5.18": { + "cmt_id": "e8e1a046cf87c8b1363e5de835114f2779e2aaf4", + "fixed_version": "5.18.18" + }, + "5.4": { + "cmt_id": "871a1e94929a27bf6e2cd99523865c840bbc2d87", + "fixed_version": "5.4.211" + } + }, "CVE-2019-3016": { "4.14": { "cmt_id": "fd4a641bb5731c0ce5397698560a823602dbaac2", @@ -25849,6 +25909,216 @@ "fixed_version": "5.8.6" } }, + "CVE-2020-36775": { + "5.4": { + "cmt_id": "0478ccdc8ea016de1ebaf6fe6da0275c2b258c5b", + "fixed_version": "5.4.189" + }, + "5.6": { + "cmt_id": "8e8542437bb4070423c9754d5ba270ffdbae8c8d", + "fixed_version": "5.6.7" + } + }, + "CVE-2020-36776": { + "5.10": { + "cmt_id": "c24a20912eef00587416628149c438e885eb1304", + "fixed_version": "5.10.36" + }, + "5.11": { + "cmt_id": "876a5f33e5d961d879c5436987c09b3d9ef70379", + "fixed_version": "5.11.20" + }, + "5.12": { + "cmt_id": "6bf443acf6ca4f666d0e4225614ba9993a3aa1a9", + "fixed_version": "5.12.3" + } + }, + "CVE-2020-36777": { + "4.14": { + "cmt_id": "32168ca1f123316848fffb85d059860adf3c409f", + "fixed_version": "4.14.233" + }, + "4.19": { + "cmt_id": "cd89f79be5d553c78202f686e8e4caa5fbe94e98", + "fixed_version": "4.19.191" + }, + "4.9": { + "cmt_id": "06854b943e0571ccbd7ad0a529babed1a98ff275", + "fixed_version": "4.9.269" + }, + "5.10": { + "cmt_id": "43263fd43083e412311fa764cd04a727b0c6a749", + "fixed_version": "5.10.36" + }, + "5.11": { + "cmt_id": "9ad15e214fcd73694ea51967d86055f47b802066", + "fixed_version": "5.11.20" + }, + "5.12": { + "cmt_id": "cede24d13be6c2a62be6d7ceea63c2719b0cfa82", + "fixed_version": "5.12.3" + }, + "5.4": { + "cmt_id": "9185b3b1c143b8da409c19ac5a785aa18d67a81b", + "fixed_version": "5.4.118" + } + }, + "CVE-2020-36778": { + "5.10": { + "cmt_id": "c977426db644ba476938125597947979e8aba725", + "fixed_version": "5.10.37" + }, + "5.11": { + "cmt_id": "e2ba996577eaea423694dc69ae43d56f1410a22b", + "fixed_version": "5.11.21" + }, + "5.12": { + "cmt_id": "a42ac16e6573f19c78f556ea292f5b534fcc4514", + "fixed_version": "5.12.4" + } + }, + "CVE-2020-36779": { + "5.10": { + "cmt_id": "c323b270a52a26aa8038a4d1fd9a850904a41166", + "fixed_version": "5.10.37" + }, + "5.11": { + "cmt_id": "d791b90f5c5e5aa8ccf9e33386c16bd2b7e333a4", + "fixed_version": "5.11.21" + }, + "5.12": { + "cmt_id": "c7ea772c9fcf711ed566814b92eecaffc0e2bfd0", + "fixed_version": "5.12.4" + } + }, + "CVE-2020-36780": { + "5.10": { + "cmt_id": "e547640cee7981fd751d2c9cde3a61bdb678b755", + "fixed_version": "5.10.37" + }, + "5.11": { + "cmt_id": "9223505e938ba3db5907e058f4209770cff2f2a7", + "fixed_version": "5.11.21" + }, + "5.12": { + "cmt_id": "d3406ab52097328a3bc4cbe124bfd8f6d51fb86f", + "fixed_version": "5.12.4" + }, + "5.4": { + "cmt_id": "7e1764312440c5df9dfe6b436035a03673b0c1b9", + "fixed_version": "5.4.119" + } + }, + "CVE-2020-36781": { + "5.10": { + "cmt_id": "3a0cdd336d92c429b51a79bf4f64b17eafa0325d", + "fixed_version": "5.10.37" + }, + "5.11": { + "cmt_id": "1ecc0ebc2ebbad4a22a670a07d27a21fa0b59c77", + "fixed_version": "5.11.21" + }, + "5.12": { + "cmt_id": "ff406f6cd09c273337ab4854292e4aca48f8affd", + "fixed_version": "5.12.4" + } + }, + "CVE-2020-36782": { + "5.10": { + "cmt_id": "cc49d206414240483bb93ffa3d80243e6a776916", + "fixed_version": "5.10.37" + }, + "5.11": { + "cmt_id": "bb300acc867e937edc2a6898e92b21f88e4e4e66", + "fixed_version": "5.11.21" + }, + "5.12": { + "cmt_id": "b100650d80cd2292f6c152f5f2943b5944b3e8ce", + "fixed_version": "5.12.4" + }, + "5.4": { + "cmt_id": "815859cb1d2302e74f11bf6894bceace9ca9eb4a", + "fixed_version": "5.4.119" + } + }, + "CVE-2020-36783": { + "5.10": { + "cmt_id": "e80ae8bde41266d3b8bf012460b6593851766006", + "fixed_version": "5.10.37" + }, + "5.11": { + "cmt_id": "96c4a03658d661666c360959aa80cdabfe2972ed", + "fixed_version": "5.11.21" + }, + "5.12": { + "cmt_id": "7ee35cde1e810ad6ca589980b9ec2b7b62946a5b", + "fixed_version": "5.12.4" + }, + "5.4": { + "cmt_id": "4734c4b1d9573c9d20bbc46cf37dde095ee011b8", + "fixed_version": "5.4.119" + } + }, + "CVE-2020-36784": { + "5.10": { + "cmt_id": "30410519328c94367e561fd878e5f0d3a0303585", + "fixed_version": "5.10.37" + }, + "5.11": { + "cmt_id": "d57ff04e0ed6f3be1682ae861ead33f879225e07", + "fixed_version": "5.11.21" + }, + "5.12": { + "cmt_id": "a45fc41beed8e0fe31864619c34aa00797fb60c1", + "fixed_version": "5.12.4" + } + }, + "CVE-2020-36785": { + "5.10": { + "cmt_id": "d218c7a0284f6b92a7b82d2e19706e18663b4193", + "fixed_version": "5.10.37" + }, + "5.11": { + "cmt_id": "801c1d505894008c888bc71d08d5cff5d87f8aba", + "fixed_version": "5.11.21" + }, + "5.12": { + "cmt_id": "8267ccd7b9df7ab682043507dd682fe0621cf045", + "fixed_version": "5.12.4" + } + }, + "CVE-2020-36786": { + "5.10": { + "cmt_id": "cc4cc2fb5aaf9adb83c02211eb13b16cfcb7ba64", + "fixed_version": "5.10.37" + }, + "5.11": { + "cmt_id": "4f0f37d03cde8f4341df8454f9b40a67fda94a33", + "fixed_version": "5.11.21" + }, + "5.12": { + "cmt_id": "27d2eab69f7da8e94e4751ac5c6d22d809275484", + "fixed_version": "5.12.4" + } + }, + "CVE-2020-36787": { + "5.10": { + "cmt_id": "a59d01384c80a8a4392665802df57c3df20055f5", + "fixed_version": "5.10.37" + }, + "5.11": { + "cmt_id": "2964c37563e86cfdc439f217eb3c5a69adfdba6a", + "fixed_version": "5.11.21" + }, + "5.12": { + "cmt_id": "75321dc8aebe3f30eff226028fe6da340fe0bf02", + "fixed_version": "5.12.4" + }, + "5.4": { + "cmt_id": "1dc1d30ac101bb8335d9852de2107af60c2580e7", + "fixed_version": "5.4.119" + } + }, "CVE-2020-3702": { "4.14": { "cmt_id": "2cbb22fd4b4fb4d0822d185bf5bd6d027107bfda", @@ -30439,12856 +30709,22842 @@ "fixed_version": "5.12.13" } }, - "CVE-2022-0001": { + "CVE-2021-46904": { "4.14": { - "cmt_id": "35c13d13becb5b951ea0fc708dda03fe900cf879", - "fixed_version": "4.14.271" + "cmt_id": "caf5ac93b3b5d5fac032fc11fbea680e115421b4", + "fixed_version": "4.14.232" }, "4.19": { - "cmt_id": "25440a8c77dd2fde6a8e9cfc0c616916febf408e", - "fixed_version": "4.19.234" + "cmt_id": "92028d7a31e55d53e41cff679156b9432cffcb36", + "fixed_version": "4.19.187" + }, + "4.4": { + "cmt_id": "a462067d7c8e6953a733bf5ade8db947b1bb5449", + "fixed_version": "4.4.268" }, "4.9": { - "cmt_id": "a771511caa8e31cb5cac4fa39165ebbca3e62795", - "fixed_version": "4.9.306" + "cmt_id": "145c89c441d27696961752bf51b323f347601bee", + "fixed_version": "4.9.268" }, "5.10": { - "cmt_id": "f38774bb6e231d647d40ceeb8ddf9082eabde667", - "fixed_version": "5.10.105" - }, - "5.15": { - "cmt_id": "f150b6fccf7fa0e7e7275f0785798547db832c7b", - "fixed_version": "5.15.28" + "cmt_id": "dc195928d7e4ec7b5cfc6cd10dc4c8d87a7c72ac", + "fixed_version": "5.10.30" }, - "5.16": { - "cmt_id": "56829c19c8171303faca18d6ab3511ecdf3e7e23", - "fixed_version": "5.16.14" + "5.11": { + "cmt_id": "388d05f70f1ee0cac4a2068fd295072f1a44152a", + "fixed_version": "5.11.14" }, "5.4": { - "cmt_id": "41b50510e593541e2ee1537614652e91e71f6bf5", - "fixed_version": "5.4.184" + "cmt_id": "4a2933c88399c0ebc738db39bbce3ae89786d723", + "fixed_version": "5.4.112" } }, - "CVE-2022-0002": { + "CVE-2021-46905": { + "5.12": { + "cmt_id": "41c44e1f3112d7265dae522c026399b2a42d19ef", + "fixed_version": "5.12.1" + } + }, + "CVE-2021-46906": { "4.14": { - "cmt_id": "35c13d13becb5b951ea0fc708dda03fe900cf879", - "fixed_version": "4.14.271" + "cmt_id": "8c064eece9a51856f3f275104520c7e3017fc5c0", + "fixed_version": "4.14.238" }, "4.19": { - "cmt_id": "25440a8c77dd2fde6a8e9cfc0c616916febf408e", - "fixed_version": "4.19.234" + "cmt_id": "0e280502be1b003c3483ae03fc60dea554fcfa82", + "fixed_version": "4.19.196" + }, + "4.4": { + "cmt_id": "c5d3c142f2d57d40c55e65d5622d319125a45366", + "fixed_version": "4.4.274" }, "4.9": { - "cmt_id": "a771511caa8e31cb5cac4fa39165ebbca3e62795", - "fixed_version": "4.9.306" + "cmt_id": "41b1e71a2c57366b08dcca1a28b0d45ca69429ce", + "fixed_version": "4.9.274" }, "5.10": { - "cmt_id": "f38774bb6e231d647d40ceeb8ddf9082eabde667", - "fixed_version": "5.10.105" - }, - "5.15": { - "cmt_id": "f150b6fccf7fa0e7e7275f0785798547db832c7b", - "fixed_version": "5.15.28" + "cmt_id": "b1e3596416d74ce95cc0b7b38472329a3818f8a9", + "fixed_version": "5.10.45" }, - "5.16": { - "cmt_id": "56829c19c8171303faca18d6ab3511ecdf3e7e23", - "fixed_version": "5.16.14" + "5.12": { + "cmt_id": "21883bff0fd854e07429a773ff18f1e9658f50e8", + "fixed_version": "5.12.12" }, "5.4": { - "cmt_id": "41b50510e593541e2ee1537614652e91e71f6bf5", - "fixed_version": "5.4.184" + "cmt_id": "7f5a4b24cdbd7372770a02f23e347d7d9a9ac8f1", + "fixed_version": "5.4.127" } }, - "CVE-2022-0168": { + "CVE-2021-46908": { "5.10": { - "cmt_id": "edefc4b2a8e8310eee8e2b1714709ad5b2a93928", - "fixed_version": "5.10.110" + "cmt_id": "4f3ff11204eac0ee23acf64deecb3bad7b0db0c6", + "fixed_version": "5.10.32" }, - "5.15": { - "cmt_id": "39a4bf7d1a23dd172526c2fb0db480c5d5c63bd6", - "fixed_version": "5.15.33" + "5.11": { + "cmt_id": "4ccdc6c6cae38b91c871293fb0ed8c6845a61b51", + "fixed_version": "5.11.16" + } + }, + "CVE-2021-46909": { + "4.14": { + "cmt_id": "532747fd5c7aaa17ee5cf79f3e947c31eb0e35cf", + "fixed_version": "4.14.232" }, - "5.16": { - "cmt_id": "0f0ce73e7dad17084222da19989049ebfb8be541", - "fixed_version": "5.16.19" + "4.19": { + "cmt_id": "2643da6aa57920d9159a1a579fb04f89a2b0d29a", + "fixed_version": "4.19.189" }, - "5.17": { - "cmt_id": "49bef50e585d738e957060f669e872b4ad15eb87", - "fixed_version": "5.17.2" + "5.10": { + "cmt_id": "1fc087fdb98d556b416c82ed6e3964a30885f47a", + "fixed_version": "5.10.32" + }, + "5.11": { + "cmt_id": "c3efce8cc9807339633ee30e39882f4c8626ee1d", + "fixed_version": "5.11.16" + }, + "5.4": { + "cmt_id": "871b569a3e67f570df9f5ba195444dc7c621293b", + "fixed_version": "5.4.114" } }, - "CVE-2022-0171": { + "CVE-2021-46910": { + "5.11": { + "cmt_id": "5965ac11b1d5fcb38464728931649cd9df79c7c9", + "fixed_version": "5.11.16" + } + }, + "CVE-2021-46911": { "5.10": { - "cmt_id": "a60babeb60ff276963d4756c7fd2e7bf242bb777", - "fixed_version": "5.10.146" + "cmt_id": "8d5a9dbd2116a852f8f0f91f6fbc42a0afe1091f", + "fixed_version": "5.10.32" }, - "5.15": { - "cmt_id": "39b0235284c7aa33a64e07b825add7a2c108094a", - "fixed_version": "5.15.70" + "5.11": { + "cmt_id": "8348665d4181c68b0ca1205b48e1753d78bc810f", + "fixed_version": "5.11.16" } }, - "CVE-2022-0185": { + "CVE-2021-46912": { "5.10": { - "cmt_id": "eadde287a62e66b2f9e62d007c59a8f50d4b8413", - "fixed_version": "5.10.93" - }, - "5.15": { - "cmt_id": "e192ccc17ecf3e78a1c6fb81badf9b50bd791115", - "fixed_version": "5.15.16" - }, - "5.16": { - "cmt_id": "8b1530a3772ae5b49c6d8d171fd3146bb947430f", - "fixed_version": "5.16.2" + "cmt_id": "35d7491e2f77ce480097cabcaf93ed409e916e12", + "fixed_version": "5.10.32" }, - "5.4": { - "cmt_id": "bd2aed0464ae3d6e83ce064cd91fc1a7fec48826", - "fixed_version": "5.4.173" + "5.11": { + "cmt_id": "1ccdf1bed140820240e383ba0accc474ffc7f006", + "fixed_version": "5.11.16" } }, - "CVE-2022-0264": { - "5.15": { - "cmt_id": "423628125a484538111c2c6d9bb1588eb086053b", - "fixed_version": "5.15.11" + "CVE-2021-46913": { + "5.10": { + "cmt_id": "e51ff3ffc316377cca21de8b80404eed0c37b3c3", + "fixed_version": "5.10.64" + }, + "5.11": { + "cmt_id": "47d8de3c226574a3ddb8b87d0c152028d1bafef4", + "fixed_version": "5.11.16" } }, - "CVE-2022-0286": { + "CVE-2021-46914": { "5.10": { - "cmt_id": "ba7bfcdff1ad4ea475395079add1cd7b79f81684", - "fixed_version": "5.10.54" + "cmt_id": "be07581aacae7cd0a073afae8e8862032f794309", + "fixed_version": "5.10.32" }, - "5.13": { - "cmt_id": "9863701fa0ecd2abfadb27b0e7a9b0fe1c9d02b6", - "fixed_version": "5.13.6" + "5.11": { + "cmt_id": "f1b4be4a753caa4056496f679d70550d0c11a264", + "fixed_version": "5.11.16" } }, - "CVE-2022-0322": { + "CVE-2021-46915": { "4.14": { - "cmt_id": "41f0bcc7d9eac315259d4e9fb441552f60e8ec9e", - "fixed_version": "4.14.252" + "cmt_id": "9065ccb9ec92c5120e7e97958397ebdb454f23d6", + "fixed_version": "4.14.232" }, "4.19": { - "cmt_id": "c57fdeff69b152185fafabd37e6bfecfce51efda", - "fixed_version": "4.19.213" + "cmt_id": "fadd3c4afdf3d4c21f4d138502f8b76334987e26", + "fixed_version": "4.19.189" }, "5.10": { - "cmt_id": "d84a69ac410f6228873d05d35120f6bdddab7fc3", - "fixed_version": "5.10.75" + "cmt_id": "dc1732baa9da5b68621586bf8636ebbc27dc62d2", + "fixed_version": "5.10.32" }, - "5.14": { - "cmt_id": "4f0bc44b9191b176d7b558f1f5ca1865339a27ef", - "fixed_version": "5.14.14" + "5.11": { + "cmt_id": "1bb3ee4259936cc3b2d80a4a480bbb4868575071", + "fixed_version": "5.11.16" }, "5.4": { - "cmt_id": "d88774539539dcbf825a25e61234f110513f5963", - "fixed_version": "5.4.155" + "cmt_id": "01fb1626b620cb37a65ad08e0f626489e8f042ef", + "fixed_version": "5.4.114" } }, - "CVE-2022-0330": { - "4.14": { - "cmt_id": "eed39c1918f1803948d736c444bfacba2a482ad0", - "fixed_version": "4.14.264" + "CVE-2021-46916": { + "5.11": { + "cmt_id": "758d19098df4b0bbca9f40d6ae6c82c9c18b9bba", + "fixed_version": "5.11.16" + } + }, + "CVE-2021-46917": { + "5.10": { + "cmt_id": "e5eb9757fe4c2392e069246ae78badc573af1833", + "fixed_version": "5.10.32" }, - "4.19": { - "cmt_id": "b188780649081782e341e52223db47c49f172712", - "fixed_version": "4.19.227" + "5.11": { + "cmt_id": "f7dc8f5619165e1fa3383d0c2519f502d9e2a1a9", + "fixed_version": "5.11.16" + } + }, + "CVE-2021-46918": { + "5.11": { + "cmt_id": "c84b8982d7aa9b4717dc36a1c6cbc93ee153b500", + "fixed_version": "5.11.16" + } + }, + "CVE-2021-46919": { + "5.10": { + "cmt_id": "4ecf25595273203010bc8318c4aee60ad64037ae", + "fixed_version": "5.10.32" }, - "4.4": { - "cmt_id": "db6a2082d5a2ebc5ffa41f7213a544d55f73793a", - "fixed_version": "4.4.301" + "5.11": { + "cmt_id": "05b7791c4c4aa8304368fdc55ae911f6b34e7281", + "fixed_version": "5.11.16" + } + }, + "CVE-2021-46920": { + "5.10": { + "cmt_id": "a5ad12d5d69c63af289a37f05187a0c6fe93553d", + "fixed_version": "5.10.32" }, - "4.9": { - "cmt_id": "84f4ab5b47d955ad2bb30115d7841d3e8f0994f4", - "fixed_version": "4.9.299" + "5.11": { + "cmt_id": "02981a44a0e402089775416371bd2e0c935685f8", + "fixed_version": "5.11.16" + } + }, + "CVE-2021-46921": { + "4.19": { + "cmt_id": "5902f9453a313be8fe78cbd7e7ca9dba9319fc6e", + "fixed_version": "4.19.189" }, "5.10": { - "cmt_id": "6a6acf927895c38bdd9f3cd76b8dbfc25ac03e88", - "fixed_version": "5.10.95" + "cmt_id": "82fa9ced35d88581cffa4a1c856fc41fca96d80a", + "fixed_version": "5.10.33" }, - "5.15": { - "cmt_id": "8a17a077e7e9ecce25c95dbdb27843d2d6c2f0f7", - "fixed_version": "5.15.18" + "5.11": { + "cmt_id": "d558fcdb17139728347bccc60a16af3e639649d2", + "fixed_version": "5.11.17" }, - "5.16": { - "cmt_id": "ec1b6497a2bc0293c064337e981ea1f6cbe57930", - "fixed_version": "5.16.4" + "5.12": { + "cmt_id": "84a24bf8c52e66b7ac89ada5e3cfbe72d65c1896", + "fixed_version": "5.12" }, "5.4": { - "cmt_id": "1b5553c79d52f17e735cd924ff2178a2409e6d0b", - "fixed_version": "5.4.175" + "cmt_id": "82808cc026811fbc3ecf0c0b267a12a339eead56", + "fixed_version": "5.4.115" } }, - "CVE-2022-0382": { - "5.15": { - "cmt_id": "d57da5185defccf383be53f41604fd5f006aba8c", - "fixed_version": "5.15.14" - }, - "5.16": { - "cmt_id": "d6d86830705f173fca6087a3e67ceaf68db80523", - "fixed_version": "5.16" + "CVE-2021-46922": { + "5.12": { + "cmt_id": "9d5171eab462a63e2fbebfccf6026e92be018f20", + "fixed_version": "5.12" } }, - "CVE-2022-0433": { - "5.16": { - "cmt_id": "f7a6dd58e0817b063252d7c5bec88e588df34b31", - "fixed_version": "5.16.3" + "CVE-2021-46923": { + "5.15": { + "cmt_id": "47b5d0a7532d39e42a938f81e3904268145c341d", + "fixed_version": "5.15.13" } }, - "CVE-2022-0435": { + "CVE-2021-46924": { "4.14": { - "cmt_id": "fde4ddeadd099bf9fbb9ccbee8e1b5c20d530a2d", - "fixed_version": "4.14.266" + "cmt_id": "38c3e320e7ff46f2dc67bc5045333e63d9f8918d", + "fixed_version": "4.14.261" }, "4.19": { - "cmt_id": "f1af11edd08dd8376f7a84487cbb0ea8203e3a1d", - "fixed_version": "4.19.229" - }, - "4.9": { - "cmt_id": "175db196e45d6f0e6047eccd09c8ba55465eb131", - "fixed_version": "4.9.301" + "cmt_id": "a1e0080a35a16ce3808f7040fe0c3a8fdb052349", + "fixed_version": "4.19.224" }, "5.10": { - "cmt_id": "3c7e5943553594f68bbc070683db6bb6f6e9e78e", - "fixed_version": "5.10.100" + "cmt_id": "e553265ea56482da5700f56319fda9ff53e7dcb4", + "fixed_version": "5.10.90" }, "5.15": { - "cmt_id": "1f1788616157b0222b0c2153828b475d95e374a7", - "fixed_version": "5.15.23" - }, - "5.16": { - "cmt_id": "59ff7514f8c56f166aadca49bcecfa028e0ad50f", - "fixed_version": "5.16.9" + "cmt_id": "238920381b8925d070d32d73cd9ce52ab29896fe", + "fixed_version": "5.15.13" }, "5.4": { - "cmt_id": "d692e3406e052dbf9f6d9da0cba36cb763272529", - "fixed_version": "5.4.179" + "cmt_id": "1cd4063dbc91cf7965d73a6a3855e2028cd4613b", + "fixed_version": "5.4.170" } }, - "CVE-2022-0487": { - "4.14": { - "cmt_id": "e6f580d0b3349646d4ee1ce0057eb273e8fb7e2e", - "fixed_version": "4.14.266" - }, - "4.19": { - "cmt_id": "9c25d5ff1856b91bd4365e813f566cb59aaa9552", - "fixed_version": "4.19.229" - }, - "4.9": { - "cmt_id": "f5dc193167591e88797262ec78515a0cbe79ff5f", - "fixed_version": "4.9.301" - }, + "CVE-2021-46925": { "5.10": { - "cmt_id": "be93028d306dac9f5b59ebebd9ec7abcfc69c156", - "fixed_version": "5.10.100" + "cmt_id": "e8a5988a85c719ce7205cb00dcf0716dcf611332", + "fixed_version": "5.10.90" }, "5.15": { - "cmt_id": "af0e6c49438b1596e4be8a267d218a0c88a42323", - "fixed_version": "5.15.23" - }, - "5.16": { - "cmt_id": "7f901d53f120d1921f84f7b9b118e87e94b403c5", - "fixed_version": "5.16.9" + "cmt_id": "b85f751d71ae8e2a15e9bda98852ea9af35282eb", + "fixed_version": "5.15.13" + } + }, + "CVE-2021-46926": { + "5.15": { + "cmt_id": "cce476954401e3421afafb25bbaa926050688b1d", + "fixed_version": "5.15.13" + } + }, + "CVE-2021-46927": { + "5.15": { + "cmt_id": "90d2beed5e753805c5eab656b8d48257638fe543", + "fixed_version": "5.15.13" + } + }, + "CVE-2021-46928": { + "5.10": { + "cmt_id": "d01e9ce1af6116f812491d3d3873d204f10ae0b8", + "fixed_version": "5.10.90" }, - "5.4": { - "cmt_id": "3a0a7ec5574b510b067cfc734b8bdb6564b31d4e", - "fixed_version": "5.4.179" + "5.15": { + "cmt_id": "e96373f0a5f484bc1e193f9951dcb3adf24bf3f7", + "fixed_version": "5.15.13" } }, - "CVE-2022-0492": { + "CVE-2021-46929": { "4.14": { - "cmt_id": "b391bb3554dd6e04b7a8ede975dbd3342526a045", - "fixed_version": "4.14.266" + "cmt_id": "8873140f95d4977bf37e4cf0d5c5e3f6e34cdd3e", + "fixed_version": "4.14.261" }, "4.19": { - "cmt_id": "939f8b491887c27585933ea7dc5ad4123de58ff3", - "fixed_version": "4.19.229" - }, - "4.9": { - "cmt_id": "7e33a0ad792f04bad920c7197bda8cc2ea08d304", - "fixed_version": "4.9.301" + "cmt_id": "af6e6e58f7ebf86b4e7201694b1e4f3a62cbc3ec", + "fixed_version": "4.19.224" }, "5.10": { - "cmt_id": "1fc3444cda9a78c65b769e3fa93455e09ff7a0d3", - "fixed_version": "5.10.97" + "cmt_id": "769d14abd35e0e153b5149c3e1e989a9d719e3ff", + "fixed_version": "5.10.90" }, "5.15": { - "cmt_id": "4b1c32bfaa02255a5df602b41587174004996477", - "fixed_version": "5.15.20" - }, - "5.16": { - "cmt_id": "9c9dbb954e618e3d9110f13cc02c5db1fb73ea5d", - "fixed_version": "5.16.6" + "cmt_id": "75799e71df1da11394740b43ae5686646179561d", + "fixed_version": "5.15.13" }, "5.4": { - "cmt_id": "0e8283cbe4996ae046cd680b3ed598a8f2b0d5d8", - "fixed_version": "5.4.177" + "cmt_id": "831de271452b87657fcf8d715ee20519b79caef5", + "fixed_version": "5.4.170" } }, - "CVE-2022-0494": { - "4.14": { - "cmt_id": "4f3ea768c56e8dce55ae538f18b37420366c5c22", - "fixed_version": "4.14.282" - }, - "4.19": { - "cmt_id": "18243d8479fd77952bdb6340024169d30b173a40", - "fixed_version": "4.19.246" - }, - "4.9": { - "cmt_id": "d59073bedb7cf752b8cd4027dd0f67cf7ac4330f", - "fixed_version": "4.9.317" - }, + "CVE-2021-46930": { "5.10": { - "cmt_id": "a439819f4797f0846c7cffa9475f44aef23c541f", - "fixed_version": "5.10.115" + "cmt_id": "3b6efe0b7ba03cc2acf0694b46d6ff33c5b4c295", + "fixed_version": "5.10.90" }, "5.15": { - "cmt_id": "a1ba98731518b811ff90009505c1aebf6e400bc2", - "fixed_version": "5.15.27" - }, - "5.16": { - "cmt_id": "f8c61361a4f52c2a186269982587facc852dba62", - "fixed_version": "5.16.13" + "cmt_id": "249ddfbe00570d6dc76208e88017937d4d374c79", + "fixed_version": "5.15.13" }, "5.4": { - "cmt_id": "c7337efd1d11acb6f84c68ffee57d3f312e87b24", - "fixed_version": "5.4.193" - } - }, - "CVE-2022-0500": { - "5.15": { - "cmt_id": "b453361384c2db1c703dacb806d5fd36aec4ceca", - "fixed_version": "5.15.37" - }, - "5.16": { - "cmt_id": "e982070f8970bb62e69ed7c9cafff886ed200349", - "fixed_version": "5.16.11" + "cmt_id": "585e2b244dda7ea733274e4b8fa27853d625d3bf", + "fixed_version": "5.4.170" } }, - "CVE-2022-0516": { + "CVE-2021-46931": { "5.10": { - "cmt_id": "b62267b8b06e9b8bb429ae8f962ee431e6535d60", - "fixed_version": "5.10.100" + "cmt_id": "73665165b64a8f3c5b3534009a69be55bb744f05", + "fixed_version": "5.10.90" }, "5.15": { - "cmt_id": "14f880ea779e11a6c162f122c1199e3578e6e3f3", - "fixed_version": "5.15.23" - }, - "5.16": { - "cmt_id": "8c68c50109c22502b647f4e86ec74400c7a3f6e0", - "fixed_version": "5.16.9" + "cmt_id": "07f13d58a8ecc3baf9a488588fb38c5cb0db484f", + "fixed_version": "5.15.13" } }, - "CVE-2022-0617": { + "CVE-2021-46932": { "4.14": { - "cmt_id": "a312cbdb9045a52e5c1fec4ac7b86895f508dc76", - "fixed_version": "4.14.265" + "cmt_id": "292d2ac61fb0d9276a0f7b7ce4f50426f2a1c99f", + "fixed_version": "4.14.261" }, "4.19": { - "cmt_id": "a23a59717f9f01a49394488f515550f9382fbada", - "fixed_version": "4.19.228" + "cmt_id": "a02e1404e27855089d2b0a0acc4652c2ce65fe46", + "fixed_version": "4.19.224" }, "4.4": { - "cmt_id": "0f28e1a57baf48a583093e350ea2bd3e4c09b8ea", - "fixed_version": "4.4.302" + "cmt_id": "d2cb2bf39a6d17ef4bdc0e59c1a35cf5751ad8f4", + "fixed_version": "4.4.298" }, "4.9": { - "cmt_id": "f24454e42b5a58267928b0de53b0dd9b43e4dd46", - "fixed_version": "4.9.300" + "cmt_id": "d1962f263a176f493400b8f91bfbf2bfedce951e", + "fixed_version": "4.9.296" }, "5.10": { - "cmt_id": "de7cc8bcca90a9d77c915ee1d922dbd670c47d84", - "fixed_version": "5.10.96" + "cmt_id": "9f329d0d6c91142cf0ad08d23c72dd195db2633c", + "fixed_version": "5.10.90" }, "5.15": { - "cmt_id": "cbf96c58e28b1fece9630102781a93ff32c347f7", - "fixed_version": "5.15.19" - }, - "5.16": { - "cmt_id": "620e8243cf5389e706c1c8f66ffacb3c84308a9e", - "fixed_version": "5.16.5" + "cmt_id": "e79ff8c68acb1eddf709d3ac84716868f2a91012", + "fixed_version": "5.15.13" }, "5.4": { - "cmt_id": "31136e5467f381cf18e2cfd467207dda7678c7a2", - "fixed_version": "5.4.176" + "cmt_id": "975774ea7528b489930b76a77ffc4d5379b95ff2", + "fixed_version": "5.4.170" } }, - "CVE-2022-0644": { + "CVE-2021-46933": { "4.14": { - "cmt_id": "aaa5e83805b09c7ed24c06227321575278e3de1d", - "fixed_version": "4.14.253" + "cmt_id": "52500239e3f2d6fc77b6f58632a9fb98fe74ac09", + "fixed_version": "4.14.261" }, "4.19": { - "cmt_id": "c1ba20965b59c2eeb54a845ca5cab4fc7bcf9735", - "fixed_version": "4.19.214" + "cmt_id": "33f6a0cbb7772146e1c11f38028fffbfed14728b", + "fixed_version": "4.19.224" + }, + "4.4": { + "cmt_id": "f976dd7011150244a7ba820f2c331e9fb253befa", + "fixed_version": "4.4.298" }, "4.9": { - "cmt_id": "52ed5a196b1146e0368e95edc23c38fa1b50825a", - "fixed_version": "4.9.288" + "cmt_id": "cc8c8028c21b2a3842a1e98e99e55028df275919", + "fixed_version": "4.9.296" }, "5.10": { - "cmt_id": "b721500c979b71a9f02eb84ca384082722c62d4e", - "fixed_version": "5.10.76" - }, - "5.14": { - "cmt_id": "abe046ddf31133287fdd5508168078377a2508a5", - "fixed_version": "5.14.15" + "cmt_id": "1c4ace3e6b8575745c50dca9e76e0021e697d645", + "fixed_version": "5.10.90" }, - "5.4": { - "cmt_id": "0f218ba4c8aac7041cd8b81a5a893b0d121e6316", - "fixed_version": "5.4.156" - } - }, - "CVE-2022-0742": { "5.15": { - "cmt_id": "771aca9bc70709771f66c3e7c00ce87339aa1790", - "fixed_version": "5.15.27" + "cmt_id": "ebef2aa29f370b5096c16020c104e393192ef684", + "fixed_version": "5.15.13" }, - "5.16": { - "cmt_id": "5ed9983ce67341b405cf6fda826e29aed26a7371", - "fixed_version": "5.16.13" + "5.4": { + "cmt_id": "240fc586e83d645912accce081a48aa63a45f6ee", + "fixed_version": "5.4.170" } }, - "CVE-2022-0812": { - "4.14": { - "cmt_id": "4779af1ec4a6c88a7005c8aabe69f409cf926d58", - "fixed_version": "4.14.285" - }, + "CVE-2021-46934": { "4.19": { - "cmt_id": "4103bc54d8684a099615ae1fbab0590cf2167024", - "fixed_version": "4.19.249" - }, - "4.9": { - "cmt_id": "ca6226b5c5b4cf8c41ab7c759686c9aab43a2a33", - "fixed_version": "4.9.320" - }, - "5.4": { - "cmt_id": "c8a4452da9f4b09c28d904f70247b097d4c14932", - "fixed_version": "5.4.53" + "cmt_id": "407c8708fb1bf2d4afc5337ef50635cf540c364b", + "fixed_version": "4.19.224" }, - "5.7": { - "cmt_id": "fe3b01c6588829a4a5d89e4b6d4254087aa40f20", - "fixed_version": "5.7.10" - } - }, - "CVE-2022-0847": { "5.10": { - "cmt_id": "b19ec7afa9297d862ed86443e0164643b97250ab", - "fixed_version": "5.10.102" + "cmt_id": "8d31cbab4c295d7010ebb729e9d02d0e9cece18f", + "fixed_version": "5.10.90" }, "5.15": { - "cmt_id": "114e9f141822e6977633d322c1b03e89bd209932", - "fixed_version": "5.15.25" + "cmt_id": "f68599581067e8a5a8901ba9eb270b4519690e26", + "fixed_version": "5.15.13" }, - "5.16": { - "cmt_id": "eddef98207d678f21261c2bd07da55938680df4e", - "fixed_version": "5.16.11" + "5.4": { + "cmt_id": "9e4a3f47eff476097e0c7faac04d1831fc70237d", + "fixed_version": "5.4.170" } }, - "CVE-2022-0850": { + "CVE-2021-46935": { "4.14": { - "cmt_id": "29d882f9a6a6219a1c59729e1f43fa40663903e4", - "fixed_version": "4.14.240" + "cmt_id": "2d2df539d05205fd83c404d5f2dff48d36f9b495", + "fixed_version": "4.14.261" }, "4.19": { - "cmt_id": "9ed3a3d3a8d2cbe99d9e4386a98856491f0eade0", - "fixed_version": "4.19.198" - }, - "4.4": { - "cmt_id": "ce14bff239a107344b153bd6504a2f8165f672e9", - "fixed_version": "4.4.276" - }, - "4.9": { - "cmt_id": "25dcc64fa0c9399653e1fd1a4bad6c1e8cb31f3f", - "fixed_version": "4.9.276" + "cmt_id": "7c7064402609aeb6fb11be1b4ec10673ff17b593", + "fixed_version": "4.19.224" }, "5.10": { - "cmt_id": "ea5466f1a77720217a25a859b5a58b618aaba544", - "fixed_version": "5.10.50" - }, - "5.12": { - "cmt_id": "e8b477fbeca6ab88ad9ed410faae156e6b99d15b", - "fixed_version": "5.12.17" + "cmt_id": "1cb8444f3114f0bb2f6e3bcadcf09aa4a28425d4", + "fixed_version": "5.10.90" }, - "5.13": { - "cmt_id": "befdd44d46329dc8ab9459c891287cc29f2ef4bf", - "fixed_version": "5.13.2" + "5.15": { + "cmt_id": "17691bada6b2f1d5f1c0f6d28cd9d0727023b0ff", + "fixed_version": "5.15.13" }, "5.4": { - "cmt_id": "ed628b2531196cc76d7c9b730abe4020cad26b0b", - "fixed_version": "5.4.132" + "cmt_id": "103b16a8c51f96d5fe063022869ea906c256e5da", + "fixed_version": "5.4.170" } }, - "CVE-2022-0854": { + "CVE-2021-46936": { "4.14": { - "cmt_id": "aaf166f37eb6bb55d81c3e40a2a460c8875c8813", - "fixed_version": "4.14.281" + "cmt_id": "5c2fe20ad37ff56070ae0acb34152333976929b4", + "fixed_version": "4.14.261" }, "4.19": { - "cmt_id": "06cb238b0f7ac1669cb06390704c61794724c191", - "fixed_version": "4.19.245" + "cmt_id": "a8e1944b44f94f5c5f530e434c5eaee787254566", + "fixed_version": "4.19.224" + }, + "4.4": { + "cmt_id": "15579e1301f856ad9385d720c9267c11032a5022", + "fixed_version": "4.4.298" + }, + "4.9": { + "cmt_id": "e73164e89d1be561228a4534e1091369ee4ba41a", + "fixed_version": "4.9.296" }, "5.10": { - "cmt_id": "f3f2247ac31cb71d1f05f56536df5946c6652f4a", - "fixed_version": "5.10.118" + "cmt_id": "2386e81a1d277f540e1285565c9d41d531bb69d4", + "fixed_version": "5.10.90" }, "5.15": { - "cmt_id": "2c1f97af38be151527380796d31d3c9adb054bf9", - "fixed_version": "5.15.29" - }, - "5.16": { - "cmt_id": "62b27d925655999350d0ea775a025919fd88d27f", - "fixed_version": "5.16.15" + "cmt_id": "08eacbd141e2495d2fcdde84358a06c4f95cbb13", + "fixed_version": "5.15.13" }, "5.4": { - "cmt_id": "b2f140a9f980806f572d672e1780acea66b9a25c", - "fixed_version": "5.4.196" + "cmt_id": "fe5838c22b986c1190f1dce9aa09bf6a491c1a69", + "fixed_version": "5.4.170" } }, - "CVE-2022-0995": { - "5.10": { - "cmt_id": "648895da69ced90ca770fd941c3d9479a9d72c16", - "fixed_version": "5.10.106" - }, + "CVE-2021-46937": { "5.15": { - "cmt_id": "1b09f28f70a5046acd64138075ae3f095238b045", - "fixed_version": "5.15.29" - }, - "5.16": { - "cmt_id": "b36588ebbcef74583824c08352e75838d6fb4ff2", - "fixed_version": "5.16.15" + "cmt_id": "ffe4a1ba1a82c416a6b3a09d46594f6a885ae141", + "fixed_version": "5.15.13" } }, - "CVE-2022-1011": { + "CVE-2021-46938": { "4.14": { - "cmt_id": "0ab55e14cf5fd40c39109969c8b04a25870f5d1e", - "fixed_version": "4.14.276" + "cmt_id": "b42c0a33dfdd451d9be62dd5de58c39f2750b6e3", + "fixed_version": "4.14.233" }, "4.19": { - "cmt_id": "99db28212be68030c1db3a525f6bbdce39b039e9", - "fixed_version": "4.19.238" + "cmt_id": "772b9f59657665af3b68d24d12b9d172d31f0dfb", + "fixed_version": "4.19.191" }, "4.9": { - "cmt_id": "b79d4d0da659a3c7bd1d5913e62188ceb9be9c49", - "fixed_version": "4.9.320" + "cmt_id": "8ae0185255eaf05bd66f4215c81e99bf01140fd9", + "fixed_version": "4.9.269" }, "5.10": { - "cmt_id": "ab5595b45f732212b3b1974041b43a257153edb7", - "fixed_version": "5.10.106" + "cmt_id": "1cb02dc76f4c0a2749a02b26469512d6984252e9", + "fixed_version": "5.10.36" }, - "5.15": { - "cmt_id": "ca62747b38f59d4e75967ebf63c992de8852ca1b", - "fixed_version": "5.15.29" + "5.11": { + "cmt_id": "6086f957416a6e87236c06079fcaba7a3998aeca", + "fixed_version": "5.11.20" }, - "5.16": { - "cmt_id": "58a9bdff32fde29137731e574b17c42592875fd0", - "fixed_version": "5.16.15" + "5.12": { + "cmt_id": "d757bf4c69cda3c3ab7f775dfabbf5a80e2f6f9d", + "fixed_version": "5.12.3" }, "5.4": { - "cmt_id": "a9174077febfb1608ec3361622bf5f91e2668d7f", - "fixed_version": "5.4.185" + "cmt_id": "a992a283c0b77d0a7c2c348add0e6a21fb1dab67", + "fixed_version": "5.4.118" } }, - "CVE-2022-1012": { + "CVE-2021-46939": { "4.14": { - "cmt_id": "40d20f3186ddd9b6b94598f4ef3d07644b0fa43c", - "fixed_version": "4.14.282" + "cmt_id": "1fca00920327be96f3318224f502e4d5460f9545", + "fixed_version": "4.14.233" }, "4.19": { - "cmt_id": "695309c5c71526d32f5539f008bbf20ed2218528", - "fixed_version": "4.19.246" + "cmt_id": "d43d56dbf452ccecc1ec735cd4b6840118005d7c", + "fixed_version": "4.19.191" + }, + "4.4": { + "cmt_id": "91ca6f6a91f679c8645d7f3307e03ce86ad518c4", + "fixed_version": "4.4.269" }, "4.9": { - "cmt_id": "576696ed0dee677ec868960c39d96ae3b8c95a3f", - "fixed_version": "4.9.320" + "cmt_id": "859b47a43f5a0e5b9a92b621dc6ceaad39fb5c8b", + "fixed_version": "4.9.269" }, "5.10": { - "cmt_id": "a5c68f457fbf52c5564ca4eea03f84776ef14e41", - "fixed_version": "5.10.119" + "cmt_id": "a33614d52e97fc8077eb0b292189ca7d964cc534", + "fixed_version": "5.10.36" }, - "5.15": { - "cmt_id": "1a8ee547da2b64d6a2aedbd38a691578eff14718", - "fixed_version": "5.15.41" + "5.11": { + "cmt_id": "6e2418576228eeb12e7ba82edb8f9500623942ff", + "fixed_version": "5.11.20" }, - "5.17": { - "cmt_id": "6976724355f5fdada89de528730f9a7b4928f2e3", - "fixed_version": "5.17.9" + "5.12": { + "cmt_id": "2a1bd74b8186d7938bf004f5603f25b84785f63e", + "fixed_version": "5.12.3" }, "5.4": { - "cmt_id": "ab5b00cfe0500f5f5a3648ca945b892156b839fb", - "fixed_version": "5.4.197" + "cmt_id": "c64da3294a7d59a4bf6874c664c13be892f15f44", + "fixed_version": "5.4.118" } }, - "CVE-2022-1015": { - "5.15": { - "cmt_id": "1bd57dea456149619f3b80d67eee012122325af8", - "fixed_version": "5.15.32" + "CVE-2021-46940": { + "5.10": { + "cmt_id": "ea6803ff2cd1a2d7d880256bf562172b708a76ff", + "fixed_version": "5.10.36" }, - "5.16": { - "cmt_id": "2c8ebdaa7c9755b85d90c07530210e83665bad9a", - "fixed_version": "5.16.18" + "5.11": { + "cmt_id": "dbdf22fc825fdb1d97f23230064e0f9819471628", + "fixed_version": "5.11.20" }, - "5.17": { - "cmt_id": "afdc3f4b81f0ec9f97f0910476af4620a2481a6d", - "fixed_version": "5.17.1" + "5.12": { + "cmt_id": "337b1546cde87fb8588ddaedf0201b769baa572a", + "fixed_version": "5.12.3" } }, - "CVE-2022-1016": { - "4.14": { - "cmt_id": "a3cc32863b175168283cb0a5fde08de6a1e27df9", - "fixed_version": "4.14.274" - }, - "4.19": { - "cmt_id": "88791b79a1eb2ba94e95d039243e28433583a67b", - "fixed_version": "4.19.237" - }, - "4.9": { - "cmt_id": "4d28522acd1c4415c85f6b33463713a268f68965", - "fixed_version": "4.9.309" - }, + "CVE-2021-46941": { "5.10": { - "cmt_id": "2c74374c2e88c7b7992bf808d9f9391f7452f9d9", - "fixed_version": "5.10.109" - }, - "5.15": { - "cmt_id": "fafb904156fbb8f1dd34970cd5223e00b47c33be", - "fixed_version": "5.15.32" - }, - "5.16": { - "cmt_id": "64f24c76dd0ce53d0fa3a0bfb9aeea507c769485", - "fixed_version": "5.16.18" + "cmt_id": "fce7bbcd07d59ac30dba8ce225316b3b4c1c7b50", + "fixed_version": "5.10.36" }, - "5.17": { - "cmt_id": "dd03640529204ef4b8189fbdea08217d8d98271f", - "fixed_version": "5.17.1" + "5.11": { + "cmt_id": "800f58217626c8b147aa40660e572ed8a0d56e3b", + "fixed_version": "5.11.20" }, - "5.4": { - "cmt_id": "06f0ff82c70241a766a811ae1acf07d6e2734dcb", - "fixed_version": "5.4.188" + "5.12": { + "cmt_id": "1c10fd60c8595ea7ff7e29d3cf1fa88069941da3", + "fixed_version": "5.12.3" } }, - "CVE-2022-1043": { - "5.10": { - "cmt_id": "695ab28a7fa107d0350ab19eba8ec89fac45a95d", - "fixed_version": "5.10.61" - }, - "5.13": { - "cmt_id": "a57b2a703e4440b9490cc8888618af9b05f2b457", - "fixed_version": "5.13.13" + "CVE-2021-46942": { + "5.12": { + "cmt_id": "cb5e0b3d0f993a6268c1a2c7ede2f9aa0c17ef68", + "fixed_version": "5.12.3" } }, - "CVE-2022-1048": { - "4.14": { - "cmt_id": "a42aa926843acca96c0dfbde2e835b8137f2f092", - "fixed_version": "4.14.279" - }, - "4.19": { - "cmt_id": "9cb6c40a6ebe4a0cfc9d6a181958211682cffea9", - "fixed_version": "4.19.243" - }, + "CVE-2021-46943": { "5.10": { - "cmt_id": "0f6947f5f5208f6ebd4d76a82a4757e2839a23f8", - "fixed_version": "5.10.109" - }, - "5.15": { - "cmt_id": "33061d0fba51d2bf70a2ef9645f703c33fe8e438", - "fixed_version": "5.15.32" + "cmt_id": "c6b81b897f6f9445d57f8d47c4e060ec21556137", + "fixed_version": "5.10.36" }, - "5.16": { - "cmt_id": "0090c13cbbdffd7da079ac56f80373a9a1be0bf8", - "fixed_version": "5.16.18" + "5.11": { + "cmt_id": "34892ea938387d83ffcfb7775ec55f0f80767916", + "fixed_version": "5.11.20" }, - "5.17": { - "cmt_id": "1bbf82d9f961414d6c76a08f7f843ea068e0ab7b", - "fixed_version": "5.17.1" + "5.12": { + "cmt_id": "6fb617e37a39db0a3eca4489431359d0bdf3b9bc", + "fixed_version": "5.12.3" }, "5.4": { - "cmt_id": "fbeb492694ce0441053de57699e1e2b7bc148a69", - "fixed_version": "5.4.193" + "cmt_id": "a03fb1e8a110658215a4cefc3e2ad53279e496a6", + "fixed_version": "5.4.118" } }, - "CVE-2022-1055": { + "CVE-2021-46944": { "5.10": { - "cmt_id": "e7be56926397cf9d992be8913f74a76152f8f08d", - "fixed_version": "5.10.97" + "cmt_id": "517f6f570566a863c2422b843c8b7d099474f6a9", + "fixed_version": "5.10.36" }, - "5.15": { - "cmt_id": "f36cacd6c933183c1a8827d5987cf2cfc0a44c76", - "fixed_version": "5.15.20" + "5.11": { + "cmt_id": "14d0e99c3ef6b0648535a31bf2eaabb4eff97b9e", + "fixed_version": "5.11.20" }, - "5.16": { - "cmt_id": "95e34f61b58a152656cbe8d6e19843cc343fb089", - "fixed_version": "5.16.6" + "5.12": { + "cmt_id": "74ba0adb5e983503b18a96121d965cad34ac7ce3", + "fixed_version": "5.12.3" }, "5.4": { - "cmt_id": "b1d17e920dfcd4b56fa2edced5710c191f7e50b5", - "fixed_version": "5.4.177" + "cmt_id": "ff792ae52005c85a2d829c153e08d99a356e007d", + "fixed_version": "5.4.118" } }, - "CVE-2022-1158": { + "CVE-2021-46945": { + "5.11": { + "cmt_id": "64e1eebe2131183174f4fbb6b1491355f96c6cde", + "fixed_version": "5.11.20" + }, + "5.12": { + "cmt_id": "1e9ea8f4637026b8e965128953f2da061ccae9c4", + "fixed_version": "5.12.3" + } + }, + "CVE-2021-46947": { + "5.12": { + "cmt_id": "ebeac958b690123a0b40aa61f688f2f170035fad", + "fixed_version": "5.12.3" + } + }, + "CVE-2021-46948": { "5.10": { - "cmt_id": "e90518d10c7dd59d5ebbe25b0f0083a7dbffa42f", - "fixed_version": "5.10.110" + "cmt_id": "bf2b941d0a6f2d3b9f5fa3c4c21bdd54f71ce253", + "fixed_version": "5.10.36" }, - "5.15": { - "cmt_id": "8771d9673e0bdb7148299f3c074667124bde6dff", - "fixed_version": "5.15.33" + "5.11": { + "cmt_id": "35c7a83ad1bb1d48ae249346e61b1132bcbf9052", + "fixed_version": "5.11.20" }, - "5.16": { - "cmt_id": "9a611c57530050dc359a83177c2f97678b1f961e", - "fixed_version": "5.16.19" + "5.12": { + "cmt_id": "e531db1ea6f98c9612cb2de093a107c7eadfb96c", + "fixed_version": "5.12.3" + } + }, + "CVE-2021-46949": { + "5.10": { + "cmt_id": "fb791572d6747ef385f628450f8d57cd132e6e5a", + "fixed_version": "5.10.36" }, - "5.17": { - "cmt_id": "5051c04d70c6e035c2c923c04fbe015a4468b08d", - "fixed_version": "5.17.2" + "5.11": { + "cmt_id": "a1570985ec04116cc665b760faf666a104154170", + "fixed_version": "5.11.20" }, - "5.4": { - "cmt_id": "1553126eccf4fad17afaeaed08db9e5944aa2d55", - "fixed_version": "5.4.189" + "5.12": { + "cmt_id": "98d91180748986bfb6dfb3e72765f3225719a647", + "fixed_version": "5.12.3" } }, - "CVE-2022-1184": { + "CVE-2021-46950": { "4.14": { - "cmt_id": "d27d3caddbeff10871982d5e25e6557be0fdc29a", - "fixed_version": "4.14.283" + "cmt_id": "12216d0919b64ee2ea5dc7a50e455670f44383d5", + "fixed_version": "4.14.233" }, "4.19": { - "cmt_id": "78398c2b2cc14f9a9c8592cf6d334c5a479ed611", - "fixed_version": "4.19.247" - }, - "4.9": { - "cmt_id": "93bbf0498ba20eadcd7132bd3cfdaff54eb72751", - "fixed_version": "4.9.318" + "cmt_id": "a6e17cab00fc5bf85472434c52ac751426257c6f", + "fixed_version": "4.19.191" }, "5.10": { - "cmt_id": "da2f05919238c7bdc6e28c79539f55c8355408bb", - "fixed_version": "5.10.121" - }, - "5.15": { - "cmt_id": "ca17db384762be0ec38373a12460081d22a8b42d", - "fixed_version": "5.15.46" + "cmt_id": "661061a45e32d8b2cc0e306da9f169ad44011382", + "fixed_version": "5.10.36" }, - "5.17": { - "cmt_id": "4b1cd51256e9267140153f04f4e62148adb2908c", - "fixed_version": "5.17.14" + "5.11": { + "cmt_id": "59452e551784b7a57a45d971727e9db63b192515", + "fixed_version": "5.11.20" }, - "5.18": { - "cmt_id": "298659c0e7074f774a794fc293df4014617b87be", - "fixed_version": "5.18.3" + "5.12": { + "cmt_id": "538244fba59fde17186322776247cd9c05be86dd", + "fixed_version": "5.12.3" }, "5.4": { - "cmt_id": "17034d45ec443fb0e3c0e7297f9cd10f70446064", - "fixed_version": "5.4.198" + "cmt_id": "6920cef604fa57f9409e3960413e9cc11f5c5a40", + "fixed_version": "5.4.118" } }, - "CVE-2022-1195": { - "4.14": { - "cmt_id": "a7b0ae2cc486fcb601f9f9d87d98138cc7b7f7f9", - "fixed_version": "4.14.260" - }, - "4.19": { - "cmt_id": "b68f41c6320b2b7fbb54a95f07a69f3dc7e56c59", - "fixed_version": "4.19.223" + "CVE-2021-46951": { + "5.10": { + "cmt_id": "60a01ecc9f68067e4314a0b55148e39e5d58a51b", + "fixed_version": "5.10.36" }, - "4.4": { - "cmt_id": "371a874ea06f147d6ca30be43dad33683965eba6", - "fixed_version": "4.4.297" + "5.11": { + "cmt_id": "3818b753277f5ca0c170bf5b98e0a5a225542fcb", + "fixed_version": "5.11.20" }, - "4.9": { - "cmt_id": "83ba6ec97c74fb1a60f7779a26b6a94b28741d8a", - "fixed_version": "4.9.295" + "5.12": { + "cmt_id": "ac07c557ca12ec9276c0375517bac7ae5be4e50c", + "fixed_version": "5.12.3" }, + "5.4": { + "cmt_id": "2f12258b5224cfaa808c54fd29345f3c1cbfca76", + "fixed_version": "5.4.118" + } + }, + "CVE-2021-46952": { "5.10": { - "cmt_id": "7dd52af1eb5798f590d9d9e1c56ed8f5744ee0ca", - "fixed_version": "5.10.89" + "cmt_id": "96fa26b74cdcf9f5c98996bf36bec9fb5b19ffe2", + "fixed_version": "5.10.36" }, - "5.15": { - "cmt_id": "03d00f7f1815ec00dab5035851b3de83afd054a8", - "fixed_version": "5.15.12" + "5.11": { + "cmt_id": "2f3380121d49e829fb73ba86240c181bc32ad897", + "fixed_version": "5.11.20" }, - "5.4": { - "cmt_id": "a5c6a13e9056d87805ba3042c208fbd4164ad22b", - "fixed_version": "5.4.169" + "5.12": { + "cmt_id": "3d0163821c035040a46d816a42c0780f0f0a30a8", + "fixed_version": "5.12.3" } }, - "CVE-2022-1198": { + "CVE-2021-46953": { "4.14": { - "cmt_id": "a2793cb58444d4411810cc555eb45b8f4a228018", - "fixed_version": "4.14.276" + "cmt_id": "c3385a9122f8db15b453e07bfc88117fce7f3724", + "fixed_version": "4.14.233" }, "4.19": { - "cmt_id": "79e2f40c210a47f283bca352745068207798fbb9", - "fixed_version": "4.19.238" - }, - "4.9": { - "cmt_id": "45d1a63bacf2b6ab27f9b11b5a2431e19d34d01f", - "fixed_version": "4.9.311" + "cmt_id": "7b2162db1498c71962a4bb2f776fa4e76d4d305b", + "fixed_version": "4.19.191" }, "5.10": { - "cmt_id": "f67a1400788f550d201c71aeaf56706afe57f0da", - "fixed_version": "5.10.110" + "cmt_id": "e0f2d86481eaa83df33b0793f75212919db7a19d", + "fixed_version": "5.10.36" }, - "5.15": { - "cmt_id": "3eb18f8a1d02a9462a0e4903efc674ca3d0406d1", - "fixed_version": "5.15.33" + "5.11": { + "cmt_id": "42e69521ee1fa5abf21f478d147d06bbfe6bf6a8", + "fixed_version": "5.11.20" }, - "5.16": { - "cmt_id": "4356343fb70c899901bce33acedf4fede797d21f", - "fixed_version": "5.16.15" + "5.12": { + "cmt_id": "596e079c362ac17ed02aa1b99fdc444d62072a01", + "fixed_version": "5.12.3" }, "5.4": { - "cmt_id": "28c8fd84bea13cbf238d7b19d392de2fcc31331c", - "fixed_version": "5.4.189" + "cmt_id": "504632a3577a049dd9bb7aabae5b4476f9c586b4", + "fixed_version": "5.4.118" } }, - "CVE-2022-1199": { - "4.14": { - "cmt_id": "d03aba820f1549c9f3b1d14bf48fa082663d22b5", - "fixed_version": "4.14.272" + "CVE-2021-46954": { + "5.11": { + "cmt_id": "018bb8da5b5888e19585f9b802f036afe643fcef", + "fixed_version": "5.11.20" }, + "5.12": { + "cmt_id": "8e6dfb7beeb6489ac1365b8a71052e737f5da76e", + "fixed_version": "5.12.3" + } + }, + "CVE-2021-46955": { "4.19": { - "cmt_id": "5ab8de9377edde3eaf1de9872e2f01d43157cd6c", - "fixed_version": "4.19.235" - }, - "4.9": { - "cmt_id": "cad71f1094834eb69f7ceec8100d300c26b43053", - "fixed_version": "4.9.307" + "cmt_id": "df9e900de24637be41879e2c50afb713ec4e8b2e", + "fixed_version": "4.19.191" }, "5.10": { - "cmt_id": "e2201ef32f933944ee02e59205adb566bafcdf91", - "fixed_version": "5.10.106" + "cmt_id": "a1478374b0bda89b4277a8afd39208271faad4be", + "fixed_version": "5.10.36" }, - "5.15": { - "cmt_id": "46ad629e58ce3a88c924ff3c5a7e9129b0df5659", - "fixed_version": "5.15.29" + "5.11": { + "cmt_id": "d841d3cf5297fde4ce6a41ff35451d0e82917f3e", + "fixed_version": "5.11.20" }, - "5.16": { - "cmt_id": "1d83a95214bc516bd8778fa423cb8383d925f8c8", - "fixed_version": "5.16.15" + "5.12": { + "cmt_id": "b3502b04e84ac5349be95fc033c17bd701d2787a", + "fixed_version": "5.12.3" }, "5.4": { - "cmt_id": "0a64aea5fe023cf1e4973676b11f49038b1f045b", - "fixed_version": "5.4.185" + "cmt_id": "490ad0a2390442d0a7b8c00972a83dbb09cab142", + "fixed_version": "5.4.118" } }, - "CVE-2022-1204": { - "4.14": { - "cmt_id": "c44a453ffe16eb08acdc6129ac4fa0192dbc0456", - "fixed_version": "4.14.277" - }, - "4.19": { - "cmt_id": "de55a1338e6a48ff1e41ea8db1432496fbe2a62b", - "fixed_version": "4.19.240" - }, + "CVE-2021-46956": { "5.10": { - "cmt_id": "b20a5ab0f5fb175750c6bafd4cf12daccf00c738", - "fixed_version": "5.10.112" + "cmt_id": "d19555ff225d0896a33246a49279e6d578095f15", + "fixed_version": "5.10.36" }, - "5.15": { - "cmt_id": "452ae92b99062d2f6a34324eaf705a3b7eac9f8b", - "fixed_version": "5.15.35" + "5.11": { + "cmt_id": "9b9d60c0eb8ada99cce2a9ab5c15dffc523b01ae", + "fixed_version": "5.11.20" }, - "5.17": { - "cmt_id": "534156dd4ed768e30a43de0036f45dca7c54818f", - "fixed_version": "5.17.2" + "5.12": { + "cmt_id": "5116e79fc6e6725b8acdad8b7e928a83ab7b47e6", + "fixed_version": "5.12.3" }, "5.4": { - "cmt_id": "9e1e088a57c23251f1cfe9601bbd90ade2ea73b9", - "fixed_version": "5.4.190" + "cmt_id": "310efc95c72c13faf855c692d19cd4d054d827c8", + "fixed_version": "5.4.118" } }, - "CVE-2022-1205": { - "4.14": { - "cmt_id": "331210983ba5ce82bf63b827bca0e1c833f293db", - "fixed_version": "4.14.277" - }, - "4.19": { - "cmt_id": "512f09df261b51b088f17d86dbdf300a3492523d", - "fixed_version": "4.19.240" - }, - "5.10": { - "cmt_id": "f934fa478dd17411bc6884153dc824ff9e7505d8", - "fixed_version": "5.10.112" - }, - "5.15": { - "cmt_id": "43c107021d9160f6a1610bafba6dadc0323ae548", - "fixed_version": "5.15.35" - }, - "5.17": { - "cmt_id": "a45dba71849a963c427637b3330e2ccf098f42d1", - "fixed_version": "5.17.2" - }, - "5.4": { - "cmt_id": "40cb8b3b19c087a4e20f6740701e53fefbe19a7b", - "fixed_version": "5.4.190" + "CVE-2021-46957": { + "5.12": { + "cmt_id": "fd0f06590d35c99f98d12c7984897ec4201a6263", + "fixed_version": "5.12.3" } }, - "CVE-2022-1263": { - "5.15": { - "cmt_id": "226b4327ef5c88572fc12187193f1b5073c10837", - "fixed_version": "5.15.34" + "CVE-2021-46958": { + "5.10": { + "cmt_id": "a4794be7b00b7eda4b45fffd283ab7d76df7e5d6", + "fixed_version": "5.10.36" }, - "5.16": { - "cmt_id": "a1f48251918d825785af9cab83996d4c12ef795a", - "fixed_version": "5.16.20" + "5.11": { + "cmt_id": "633f7f216663587f17601eaa1cf2ac3d5654874c", + "fixed_version": "5.11.20" }, - "5.17": { - "cmt_id": "e8d7f0dad29e634e26d4614cfbd081514c16e042", - "fixed_version": "5.17.3" + "5.12": { + "cmt_id": "e2da98788369bfba1138bada72765c47989a4338", + "fixed_version": "5.12.3" } }, - "CVE-2022-1353": { + "CVE-2021-46960": { "4.14": { - "cmt_id": "fcdaaeb7eb5d52941ceb2fdcec0e2170c9bf3031", - "fixed_version": "4.14.276" + "cmt_id": "e94851629c49c65b4fbb29a5725ddfd7988f8f20", + "fixed_version": "4.14.233" }, "4.19": { - "cmt_id": "693fe8af9a2625139de07bd1ae212a7d89c37795", - "fixed_version": "4.19.238" - }, - "4.9": { - "cmt_id": "7b0e01a9b7f2aaeb6fa73b35864b1d7dc6e795c4", - "fixed_version": "4.9.311" + "cmt_id": "e486f8397f3f14a7cadc166138141fdb14379a54", + "fixed_version": "4.19.191" }, "5.10": { - "cmt_id": "8d3f4ad43054619379ccc697cfcbdb2c266800d8", - "fixed_version": "5.10.110" - }, - "5.15": { - "cmt_id": "d06ee4572fd916fbb34d16dc81eb37d1dff83446", - "fixed_version": "5.15.33" + "cmt_id": "aaa0faa5c28a91c362352d6b35dc3ed10df56fb0", + "fixed_version": "5.10.36" }, - "5.16": { - "cmt_id": "16d974fa4ddda389bf58bb5e4fc8cad8910ba66d", - "fixed_version": "5.16.19" + "5.11": { + "cmt_id": "f59a9242942fef0de7b926e438ba4eae65d4b4dd", + "fixed_version": "5.11.20" }, - "5.17": { - "cmt_id": "9a564bccb78a76740ea9d75a259942df8143d02c", - "fixed_version": "5.17" + "5.12": { + "cmt_id": "b399c1a3ea0b9d10047ff266d65533df7f15532f", + "fixed_version": "5.12.3" }, "5.4": { - "cmt_id": "ef388db2fe351230ff7194b37d507784bef659ec", - "fixed_version": "5.4.189" + "cmt_id": "93f3339b22ba17e66f0808737467b70ba087eaec", + "fixed_version": "5.4.118" } }, - "CVE-2022-1419": { - "4.14": { - "cmt_id": "d2b8e8fbac9f175388d2808ade90d86402642b01", - "fixed_version": "4.14.278" + "CVE-2021-46961": { + "5.10": { + "cmt_id": "7be4db5c2b59fa77071c93ca4329876fb9777202", + "fixed_version": "5.10.36" }, - "4.19": { - "cmt_id": "df2c1f38939aabb8c6beca108f08b90f050b9ebc", - "fixed_version": "4.19.242" + "5.11": { + "cmt_id": "ea817ac1014c04f47885532b55f5d0898deadfba", + "fixed_version": "5.11.20" }, - "5.4": { - "cmt_id": "3ea7f138cec139be98f8bb9fc1a6b432003f834e", - "fixed_version": "5.4.21" + "5.12": { + "cmt_id": "3f72d3709f53af72835af7dc8b15ba61611a0e36", + "fixed_version": "5.12.3" }, - "5.5": { - "cmt_id": "c578f31bba29d2c6a97d2ad279ae3cd261dcc786", - "fixed_version": "5.5.5" + "5.4": { + "cmt_id": "e7ea8e46e3b777be26aa855fe07778c415f24926", + "fixed_version": "5.4.118" } }, - "CVE-2022-1462": { - "4.14": { - "cmt_id": "e9274a2732e1de3ca36076126284b4e5ffe6d587", - "fixed_version": "4.14.290" - }, - "4.19": { - "cmt_id": "eb059bf8c237fe41fbaed4a6cccacce687b83222", - "fixed_version": "4.19.254" - }, - "4.9": { - "cmt_id": "41ce14090db93fc2f0c8a27ce8a324b0192da7b5", - "fixed_version": "4.9.325" - }, + "CVE-2021-46962": { "5.10": { - "cmt_id": "08afa87f58d83dfe040572ed591b47e8cb9e225c", - "fixed_version": "5.10.134" + "cmt_id": "25ac6ce65f1ab458982d15ec1caf441acd37106a", + "fixed_version": "5.10.36" }, - "5.15": { - "cmt_id": "b2d1e4cd558cffec6bfe318f5d74e6cffc374d29", - "fixed_version": "5.15.58" + "5.11": { + "cmt_id": "ebe0f12cf4c044f812c6d17011531582f9ac8bb3", + "fixed_version": "5.11.20" }, - "5.18": { - "cmt_id": "fa3302714c03e4e6c9b5aad5dacae33e75f76cf7", - "fixed_version": "5.18.13" + "5.12": { + "cmt_id": "d6e7fda496978f2763413b5523557b38dc2bf6c2", + "fixed_version": "5.12.3" }, "5.4": { - "cmt_id": "f7785092cb7f022f59ebdaa181651f7c877df132", - "fixed_version": "5.4.208" + "cmt_id": "0d8941b9b2d3e7b3481fdf43b1a6189d162175b7", + "fixed_version": "5.4.118" } }, - "CVE-2022-1516": { - "4.14": { - "cmt_id": "858642789ada1b48630f322e59416ca9fca3e6b7", - "fixed_version": "4.14.276" - }, - "4.19": { - "cmt_id": "4c240c5a105557e4546d0836e694868f22fd09b0", - "fixed_version": "4.19.238" - }, - "4.9": { - "cmt_id": "dffc859d1d9560da594e4282091781b8d2715f00", - "fixed_version": "4.9.311" - }, + "CVE-2021-46963": { "5.10": { - "cmt_id": "5c94b6205e87411dbe9dc1ca088eb36b8837fb47", - "fixed_version": "5.10.110" - }, - "5.15": { - "cmt_id": "409570a619c1cda2e0fde6018a256b9e3d3ba0ee", - "fixed_version": "5.15.33" - }, - "5.16": { - "cmt_id": "4a279d7ee1c65411b4055ecd428b8aa2b1711c1f", - "fixed_version": "5.16.19" + "cmt_id": "702cdaa2c6283c135ef16d52e0e4e3c1005aa538", + "fixed_version": "5.10.36" }, - "5.17": { - "cmt_id": "671529db75e6be777bb1c76aa07c2bdd2992be6d", - "fixed_version": "5.17.2" + "5.11": { + "cmt_id": "80ef24175df2cba3860d0369d1c662b49ee2de56", + "fixed_version": "5.11.20" }, - "5.4": { - "cmt_id": "9acf05b4e7b55fdb712ef7b331dbce5bcd391d0f", - "fixed_version": "5.4.189" + "5.12": { + "cmt_id": "a73208e3244127ef9f2cdf24e4adb947aaa32053", + "fixed_version": "5.12.3" } }, - "CVE-2022-1651": { - "5.15": { - "cmt_id": "1d5103d9bb7d42fc220afe9f01ec6b9fe0ea5773", - "fixed_version": "5.15.33" - }, - "5.16": { - "cmt_id": "ee827d86ee73583c0f0b65db877467d9b5551aa4", - "fixed_version": "5.16.19" + "CVE-2021-46964": { + "5.11": { + "cmt_id": "4ecd42dec858b6632c5f024fe13e9ad6c30f2734", + "fixed_version": "5.11.20" }, - "5.17": { - "cmt_id": "f8e6e18d117e461110c849a11c6a396dcccdbd4e", - "fixed_version": "5.17.2" + "5.12": { + "cmt_id": "0f86d66b38501e3ac66cf2d9f9f8ad6838bad0e6", + "fixed_version": "5.12.3" } }, - "CVE-2022-1652": { - "4.14": { - "cmt_id": "dc650d53bad770f169e498f1231671c51b0b321d", - "fixed_version": "4.14.281" - }, - "4.19": { - "cmt_id": "3392d8711ad9e5b688999c948fd36d798c0d075d", - "fixed_version": "4.19.245" + "CVE-2021-46965": { + "5.10": { + "cmt_id": "34ec706bf0b7c4ca249a729c1bcb91f706c7a7be", + "fixed_version": "5.10.36" }, - "4.9": { - "cmt_id": "2adafe1c646b462c755e99216f966927eec96059", - "fixed_version": "4.9.316" + "5.11": { + "cmt_id": "4e4ebb827bf09311469ffd9d0c14ed40ed9747aa", + "fixed_version": "5.11.20" }, + "5.12": { + "cmt_id": "4d786870e3262ec098a3b4ed10b895176bc66ecb", + "fixed_version": "5.12.3" + } + }, + "CVE-2021-46966": { "5.10": { - "cmt_id": "911b36267855501f7f80a75927c128c0ac03fe58", - "fixed_version": "5.10.118" + "cmt_id": "62dc2440ebb552aa0d7f635e1697e077d9d21203", + "fixed_version": "5.10.36" }, - "5.15": { - "cmt_id": "fc2bee93e31bbba920e9eeba76af72264ced066f", - "fixed_version": "5.15.42" + "5.11": { + "cmt_id": "f16737caf41fc06cfe6e49048becb09657074d4b", + "fixed_version": "5.11.20" }, - "5.17": { - "cmt_id": "88887ced7803132ed357a42d050560a2fb5c7ce6", - "fixed_version": "5.17.10" + "5.12": { + "cmt_id": "b7a5baaae212a686ceb812c32fceed79c03c0234", + "fixed_version": "5.12.3" }, "5.4": { - "cmt_id": "67e2b62461b5d02a1e63103e8a02c0bca75e26c7", - "fixed_version": "5.4.196" + "cmt_id": "72814a94c38a33239793f7622cec6ace1e540c4b", + "fixed_version": "5.4.118" } }, - "CVE-2022-1671": { - "5.15": { - "cmt_id": "432297011caf71dbc95c3365a65adf365e79aff3", - "fixed_version": "5.15.33" + "CVE-2021-46967": { + "5.10": { + "cmt_id": "3b8b6399666a29daa30b0bb3f5c9e3fc81c5a6a6", + "fixed_version": "5.10.36" }, - "5.16": { - "cmt_id": "c3c415ae0c82da1349d85b8c9b18e6480aa6a230", - "fixed_version": "5.16.19" + "5.11": { + "cmt_id": "940230a5c31e2714722aee04c521a21f484b4df7", + "fixed_version": "5.11.20" }, - "5.17": { - "cmt_id": "4e1f670e1b440dc783dbeb881d575bca31474f73", - "fixed_version": "5.17.2" + "5.12": { + "cmt_id": "93dbbf20e3ffad14f04227a0b7105f6e6f0387ce", + "fixed_version": "5.12.3" } }, - "CVE-2022-1678": { - "4.19": { - "cmt_id": "0a70f118475e037732557796accd0878a00fc25a", - "fixed_version": "4.19.228" + "CVE-2021-46968": { + "5.10": { + "cmt_id": "026499a9c2e002e621ad568d1378324ae97e5524", + "fixed_version": "5.10.36" + }, + "5.11": { + "cmt_id": "055a063a18bcd19b93709e3eac8078d6b2f04599", + "fixed_version": "5.11.20" + }, + "5.12": { + "cmt_id": "971dc8706cee47393d393905d294ea47e39503d3", + "fixed_version": "5.12.3" } }, - "CVE-2022-1679": { - "4.14": { - "cmt_id": "62bc1ea5c7401d77eaf73d0c6a15f3d2e742856e", - "fixed_version": "4.14.291" - }, - "4.19": { - "cmt_id": "ab7a0ddf5f1cdec63cb21840369873806fc36d80", - "fixed_version": "4.19.256" + "CVE-2021-46969": { + "5.12": { + "cmt_id": "a99b661c3187365f81026d89b1133a76cd2652b3", + "fixed_version": "5.12.3" + } + }, + "CVE-2021-46970": { + "5.11": { + "cmt_id": "abd1510c08a13c88d24b622a83c82e87ff1d3135", + "fixed_version": "5.11.20" }, + "5.12": { + "cmt_id": "ed541cff35cbdb695f0c98ef506dd7218883fc07", + "fixed_version": "5.12.3" + } + }, + "CVE-2021-46971": { "5.10": { - "cmt_id": "eccd7c3e2596b574241a7670b5b53f5322f470e5", - "fixed_version": "5.10.137" - }, - "5.15": { - "cmt_id": "03ca957c5f7b55660957eda20b5db4110319ac7a", - "fixed_version": "5.15.61" + "cmt_id": "4348d3b5027bc3ff6336368b6c60605d4ef8e1ce", + "fixed_version": "5.10.35" }, - "5.18": { - "cmt_id": "6b14ab47937ba441e75e8dbb9fbfc9c55efa41c6", - "fixed_version": "5.18.18" + "5.11": { + "cmt_id": "f5809ca4c311b71bfaba6d13f4e39eab0557895e", + "fixed_version": "5.11.19" }, - "5.19": { - "cmt_id": "b66ebac40f64336ae2d053883bee85261060bd27", - "fixed_version": "5.19.2" + "5.12": { + "cmt_id": "c7b0208ee370b89d20486fae71cd9abb759819c1", + "fixed_version": "5.12.2" }, "5.4": { - "cmt_id": "e9e21206b8ea62220b486310c61277e7ebfe7cec", - "fixed_version": "5.4.211" + "cmt_id": "b246759284d6a2bc5b6f1009caeeb3abce2ec9ff", + "fixed_version": "5.4.117" } }, - "CVE-2022-1729": { - "4.14": { - "cmt_id": "dee63319e2d1abd5d37a89de046ccf32ca8a8451", - "fixed_version": "4.14.281" - }, - "4.19": { - "cmt_id": "6cdd53a49aa7413e53c14ece27d826f0b628b18a", - "fixed_version": "4.19.245" - }, - "4.9": { - "cmt_id": "a1466528d8ae5d9a3bb29781f0098fa3476e9e1c", - "fixed_version": "4.9.316" - }, + "CVE-2021-46972": { "5.10": { - "cmt_id": "3ee8e109c3c316073a3e0f83ec0769c7ee8a7375", - "fixed_version": "5.10.118" - }, - "5.15": { - "cmt_id": "e085354dde254bc6c83ee604ea66c2b36f9f9067", - "fixed_version": "5.15.42" - }, - "5.17": { - "cmt_id": "22fb2974224c9836eeaf0d24fdd481fcdaa0aea8", - "fixed_version": "5.17.10" + "cmt_id": "71d58457a8afc650da5d3292a7f7029317654d95", + "fixed_version": "5.10.35" }, - "5.18": { - "cmt_id": "3ac6487e584a1eb54071dbe1212e05b884136704", - "fixed_version": "5.18" + "5.11": { + "cmt_id": "cf3e3330bc5719fa9d658e3e2f596bde89344a94", + "fixed_version": "5.11.19" }, - "5.4": { - "cmt_id": "dd0ea88b0a0f913f82500e988ef38158a9ad9885", - "fixed_version": "5.4.196" + "5.12": { + "cmt_id": "d587cfaef72b1b6f4b2774827123bce91f497cc8", + "fixed_version": "5.12.2" } }, - "CVE-2022-1734": { - "4.14": { - "cmt_id": "ced30680fb1c7c1daae39a9384d23cd1a022585f", - "fixed_version": "4.14.278" - }, - "4.19": { - "cmt_id": "b266f492b2af82269aaaab871ac3949420ae678c", - "fixed_version": "4.19.242" + "CVE-2021-46973": { + "5.10": { + "cmt_id": "48ec949ac979b4b42d740f67b6177797af834f80", + "fixed_version": "5.10.35" }, - "4.9": { - "cmt_id": "4721695be941626e4b18b89e0641e36fc385cfd8", - "fixed_version": "4.9.313" + "5.11": { + "cmt_id": "ea474054c2cc6e1284604b21361f475c7cc8c0a0", + "fixed_version": "5.11.19" }, + "5.12": { + "cmt_id": "03c649dee8b1eb5600212a249542a70f47a5ab40", + "fixed_version": "5.12.2" + } + }, + "CVE-2021-46974": { "5.10": { - "cmt_id": "1961c5a688edb53fe3bc25cbda57f47adf12563c", - "fixed_version": "5.10.115" + "cmt_id": "2cfa537674cd1051a3b8111536d77d0558f33d5d", + "fixed_version": "5.10.35" }, - "5.15": { - "cmt_id": "b8f2b836e7d0a553b886654e8b3925a85862d2eb", - "fixed_version": "5.15.39" + "5.11": { + "cmt_id": "6eba92a4d4be8feb4dc33976abac544fa99d6ecc", + "fixed_version": "5.11.19" }, - "5.17": { - "cmt_id": "f4bfbac45121c8638db5eacb1ebbb61ee956c668", - "fixed_version": "5.17.7" + "5.12": { + "cmt_id": "7cf64d8679ca1cb20cf57d6a88bfee79a0922a66", + "fixed_version": "5.12.2" }, "5.4": { - "cmt_id": "33d3e76fc7a7037f402246c824d750542e2eb37f", - "fixed_version": "5.4.193" + "cmt_id": "53e0db429b37a32b8fc706d0d90eb4583ad13848", + "fixed_version": "5.4.117" } }, - "CVE-2022-1786": { + "CVE-2021-46976": { "5.10": { - "cmt_id": "29f077d070519a88a793fbc70f1e6484dc6d9e35", - "fixed_version": "5.10.117" + "cmt_id": "805c990a9c54b9451d3daff640b850909c31ab9d", + "fixed_version": "5.10.38" + }, + "5.11": { + "cmt_id": "608441de3976c526b02af4d7063093c8adf351e3", + "fixed_version": "5.11.22" + }, + "5.12": { + "cmt_id": "f7520970d5353cb1fa4d9089a1b23669c5da97fe", + "fixed_version": "5.12.5" } }, - "CVE-2022-1789": { + "CVE-2021-46977": { "5.10": { - "cmt_id": "9b4aa0d80b18b9d19e62dd47d22e274ce92cdc95", - "fixed_version": "5.10.119" + "cmt_id": "31f29749ee970c251b3a7e5b914108425940d089", + "fixed_version": "5.10.38" }, - "5.15": { - "cmt_id": "acd12d16528152b32fa09be2c5ef95047f69af05", - "fixed_version": "5.15.44" + "5.11": { + "cmt_id": "5adcdeb57007ccf8ab7ac20bf787ffb6fafb1a94", + "fixed_version": "5.11.22" }, - "5.17": { - "cmt_id": "19a66796d1f0dd4ce4b05f76d53ce1d0a7dc817d", - "fixed_version": "5.17.12" + "5.12": { + "cmt_id": "e3ea1895df719c4ef87862501bb10d95f4177bed", + "fixed_version": "5.12.5" + } + }, + "CVE-2021-46978": { + "5.11": { + "cmt_id": "200a45649ab7361bc80c70aebf7165b64f9a6c9f", + "fixed_version": "5.11.22" }, - "5.18": { - "cmt_id": "9f46c187e2e680ecd9de7983e4d081c3391acc76", - "fixed_version": "5.18" + "5.12": { + "cmt_id": "bd0e8455b85b651a4c77de9616e307129b15aaa7", + "fixed_version": "5.12.5" } }, - "CVE-2022-1836": { - "4.14": { - "cmt_id": "b7fa84ae1171a3c5ea5d710899080a6e63cfe084", - "fixed_version": "4.14.278" + "CVE-2021-46979": { + "5.11": { + "cmt_id": "11e1cae5da4096552f7c091476cbadbc0d1817da", + "fixed_version": "5.11.22" }, - "4.19": { - "cmt_id": "0e535976774504af36fab1dfb54f3d4d6cc577a9", - "fixed_version": "4.19.241" + "5.12": { + "cmt_id": "ab6c935ba3a04317632f3b8b68675bdbaf395303", + "fixed_version": "5.12.5" + } + }, + "CVE-2021-46980": { + "5.10": { + "cmt_id": "e5366bea0277425e1868ba20eeb27c879d5a6e2d", + "fixed_version": "5.10.38" }, - "4.9": { - "cmt_id": "0dd02ff72c6daf4e7800fb5dd1109fbacdde97dc", - "fixed_version": "4.9.313" + "5.11": { + "cmt_id": "a453bfd7ef15fd9d524004d3ca7b05353a302911", + "fixed_version": "5.11.22" }, + "5.12": { + "cmt_id": "5e9c6f58b01e6fdfbc740390c01f542a35c97e57", + "fixed_version": "5.12.5" + } + }, + "CVE-2021-46981": { "5.10": { - "cmt_id": "54c028cfc49624bfc27a571b94edecc79bbaaab4", - "fixed_version": "5.10.114" + "cmt_id": "cde4b55cfb24522dcbba80bbdb0c082303e76c43", + "fixed_version": "5.10.38" }, - "5.15": { - "cmt_id": "e52da8e4632f9c8fe78bf1c5881ce6871c7e08f3", - "fixed_version": "5.15.37" + "5.11": { + "cmt_id": "b31d237796fd618379ec8e0f4de3370b5e4aeee7", + "fixed_version": "5.11.22" }, - "5.17": { - "cmt_id": "d91ca05d52fabf68c0376bcfeed1a52be68a8e1b", - "fixed_version": "5.17.6" + "5.12": { + "cmt_id": "54b78ba7e96e5fe1edb8054e375d31a6c0dc60dc", + "fixed_version": "5.12.5" }, "5.4": { - "cmt_id": "7dea5913000c6a2974a00d9af8e7ffb54e47eac1", - "fixed_version": "5.4.192" + "cmt_id": "1c4962df938891af9ab4775f5224ef8601764107", + "fixed_version": "5.4.120" } }, - "CVE-2022-1852": { + "CVE-2021-46982": { "5.10": { - "cmt_id": "3d8fc6e28f321d753ab727e3c3e740daf36a8fa3", - "fixed_version": "5.10.120" - }, - "5.15": { - "cmt_id": "531d1070d864c78283b7597449e60ddc53319d88", - "fixed_version": "5.15.45" + "cmt_id": "5639b73fd3bc6fc8ca72e3a9ac15aacaabd7ebff", + "fixed_version": "5.10.38" }, - "5.17": { - "cmt_id": "dca5ea67a3e627a3022fe58722a2807c1ef61c29", - "fixed_version": "5.17.13" + "5.11": { + "cmt_id": "64acb100fe3beb5d20184d0ae3307235bd3555c4", + "fixed_version": "5.11.22" }, - "5.18": { - "cmt_id": "02ea15c02befea2539d5f0d6b60ce8df88de418b", - "fixed_version": "5.18.2" - } - }, - "CVE-2022-1882": { - "5.18": { - "cmt_id": "49cbb4820e4f1895130755732485afb2d18508f9", - "fixed_version": "5.18.15" + "5.12": { + "cmt_id": "936158b15e2648253afb824d252c910c496d34b5", + "fixed_version": "5.12.5" } }, - "CVE-2022-1943": { - "5.15": { - "cmt_id": "9e951f2d85c9430ea8ae0c8448e47e3c234f1580", - "fixed_version": "5.15.40" + "CVE-2021-46983": { + "5.10": { + "cmt_id": "64f3410c7bfc389b1a58611d0799f4a36ce4b6b5", + "fixed_version": "5.10.38" }, - "5.17": { - "cmt_id": "cfd64b858cb2b56969138df7970cb0b7f2388fb0", - "fixed_version": "5.17.8" + "5.11": { + "cmt_id": "17fb6dfa5162b89ecfa07df891a53afec321abe8", + "fixed_version": "5.11.22" + }, + "5.12": { + "cmt_id": "5bdb34466ad8370546dfa0497594fb1d6f2fed90", + "fixed_version": "5.12.5" } }, - "CVE-2022-1966": { - "4.14": { - "cmt_id": "5b732a9e8e22395d911b3e6c343cbed0e1cec275", - "fixed_version": "4.14.283" + "CVE-2021-46984": { + "5.10": { + "cmt_id": "54dbe2d2c1fcabf650c7a8b747601da355cd7f9f", + "fixed_version": "5.10.38" }, - "4.19": { - "cmt_id": "ed44398b45add3d9be56b7457cc9e05282e518b4", - "fixed_version": "4.19.247" + "5.11": { + "cmt_id": "a287cd84e047045f5a4d4da793414e848de627c6", + "fixed_version": "5.11.22" }, - "4.9": { - "cmt_id": "94e9b75919619ba8c4072abc4917011a7a888a79", - "fixed_version": "4.9.318" - }, - "5.10": { - "cmt_id": "ea62d169b6e731e0b54abda1d692406f6bc6a696", - "fixed_version": "5.10.120" - }, - "5.15": { - "cmt_id": "f692bcffd1f2ce5488d24fbcb8eab5f351abf79d", - "fixed_version": "5.15.45" - }, - "5.17": { - "cmt_id": "d8db0465bcc4d4b54ecfb67b820ed26eb1440da7", - "fixed_version": "5.17.13" - }, - "5.18": { - "cmt_id": "8f44c83e51b4ca49c815f8dd0d9c38f497cdbcb0", - "fixed_version": "5.18.2" + "5.12": { + "cmt_id": "2ef3c76540c49167a0bc3d5f80d00fd1fc4586df", + "fixed_version": "5.12.5" }, "5.4": { - "cmt_id": "f36736fbd48491a8d85cd22f4740d542c5a1546e", - "fixed_version": "5.4.198" + "cmt_id": "0b6b4b90b74c27bea968c214d820ba4254b903a5", + "fixed_version": "5.4.120" } }, - "CVE-2022-1972": { + "CVE-2021-46985": { + "5.12": { + "cmt_id": "a7e17a8d421ae23c920240625b4413c7b94d94a4", + "fixed_version": "5.12.5" + } + }, + "CVE-2021-46986": { "5.10": { - "cmt_id": "c0aff1faf66b6b7a19103f83e6a5d0fdc64b9048", - "fixed_version": "5.10.120" - }, - "5.15": { - "cmt_id": "89ef50fe03a55feccf5681c237673a2f98161161", - "fixed_version": "5.15.45" + "cmt_id": "1ea775021282d90e1d08d696b7ab54aa75d688e5", + "fixed_version": "5.10.38" }, - "5.17": { - "cmt_id": "c88f3e3d243d701586239c5b69356ec2b1fd05f1", - "fixed_version": "5.17.13" + "5.11": { + "cmt_id": "bc0cdd72493236fb72b390ad38ce581e353c143c", + "fixed_version": "5.11.22" }, - "5.18": { - "cmt_id": "c9a46a3d549286861259c19af4747e12cfaeece9", - "fixed_version": "5.18.2" + "5.12": { + "cmt_id": "b4b8e9601d7ee8806d2687f081a42485d27674a1", + "fixed_version": "5.12.5" } }, - "CVE-2022-1973": { - "5.15": { - "cmt_id": "61decb58486d7c0cbded25fe4d301ab4fa148cd8", - "fixed_version": "5.15.46" - }, - "5.17": { - "cmt_id": "2088cc00491e8d25a99d0f247df843e9c3df2040", - "fixed_version": "5.17.14" + "CVE-2021-46987": { + "5.11": { + "cmt_id": "d5347827d0b4b2250cbce6eccaa1c81dc78d8651", + "fixed_version": "5.11.22" }, - "5.18": { - "cmt_id": "2aafbe9fb210a355d6e0e92a91f294dee80e5d44", - "fixed_version": "5.18.3" + "5.12": { + "cmt_id": "96157707c0420e3d3edfe046f1cc797fee117ade", + "fixed_version": "5.12.5" } }, - "CVE-2022-1974": { + "CVE-2021-46988": { "4.14": { - "cmt_id": "6f0ac4cd0377ab4e0b49b8f6efd37057c21336a9", - "fixed_version": "4.14.278" + "cmt_id": "319116227e52d49eee671f0aa278bac89b3c1b69", + "fixed_version": "4.14.233" }, "4.19": { - "cmt_id": "7deebb94a311da0e02e621e765c3aef3d5936572", - "fixed_version": "4.19.242" - }, - "4.9": { - "cmt_id": "fa2217b66467917a623993c14d671661ad625fb6", - "fixed_version": "4.9.313" + "cmt_id": "07c9b834c97d0fa3402fb7f3f3b32df370a6ff1f", + "fixed_version": "4.19.191" }, "5.10": { - "cmt_id": "8a9e7c64f4a02c4c397e55ba379609168ec7df4a", - "fixed_version": "5.10.115" + "cmt_id": "140cfd9980124aecb6c03ef2e69c72d0548744de", + "fixed_version": "5.10.38" }, - "5.15": { - "cmt_id": "a2168fb3128a576d0175443403c15dcf8bf128f6", - "fixed_version": "5.15.39" + "5.11": { + "cmt_id": "ad53127973034c63b5348715a1043d0e80ceb330", + "fixed_version": "5.11.22" }, - "5.17": { - "cmt_id": "8b58d6e565d83443c51b3fc076bd4472674aca0c", - "fixed_version": "5.17.7" + "5.12": { + "cmt_id": "2d59a0ed8b26b8f3638d8afc31f839e27759f1f6", + "fixed_version": "5.12.5" }, "5.4": { - "cmt_id": "85aecdef77f9c5b5c0d8988db6681960f0d46ab3", - "fixed_version": "5.4.193" + "cmt_id": "b3f1731c6d7fbc1ebe3ed8eff6d6bec56d76ff43", + "fixed_version": "5.4.120" } }, - "CVE-2022-1975": { - "4.14": { - "cmt_id": "c33b2afffe8ae90e0bd4790e0505edd92addf14c", - "fixed_version": "4.14.278" - }, + "CVE-2021-46989": { "4.19": { - "cmt_id": "d360fc8df363ecd7892d755d69ffc8c61d699e38", - "fixed_version": "4.19.242" - }, - "4.9": { - "cmt_id": "a93ea9595fde438996d7b9322749d4d1921162f7", - "fixed_version": "4.9.313" + "cmt_id": "52dde855663e5db824af51db39b5757d2ef3e28a", + "fixed_version": "4.19.191" }, "5.10": { - "cmt_id": "879b075a9a364a325988d4484b74311edfef82a1", - "fixed_version": "5.10.115" + "cmt_id": "adbd8a2a8cc05d9e501f93e5c95c59307874cc99", + "fixed_version": "5.10.38" }, - "5.15": { - "cmt_id": "7bd81a05d48942ef2c48630e5e7963b187e95727", - "fixed_version": "5.15.39" + "5.11": { + "cmt_id": "c477f62db1a0c0ecaa60a29713006ceeeb04b685", + "fixed_version": "5.11.22" }, - "5.17": { - "cmt_id": "63a545103b77091f2309b44a8975cdf255bb99b2", - "fixed_version": "5.17.7" + "5.12": { + "cmt_id": "97314e45aa1223a42d60256a62c5d9af54baf446", + "fixed_version": "5.12.5" }, "5.4": { - "cmt_id": "01d4363dd7176fd780066cd020f66c0f55c4b6f9", - "fixed_version": "5.4.193" - } - }, - "CVE-2022-1976": { - "5.18": { - "cmt_id": "bba36a27c38650eefc79d18c33a0acd0dcbeabb8", - "fixed_version": "5.18.6" + "cmt_id": "c451a6bafb5f422197d31536f82116aed132b72c", + "fixed_version": "5.4.120" } }, - "CVE-2022-1998": { + "CVE-2021-46990": { "5.10": { - "cmt_id": "7b4741644cf718c422187e74fb07661ef1d68e85", - "fixed_version": "5.10.97" + "cmt_id": "d2e3590ca39ccfd8a5a46d8c7f095cb6c7b9ae92", + "fixed_version": "5.10.38" }, - "5.15": { - "cmt_id": "60765e43e40fbf7a1df828116172440510fcc3e4", - "fixed_version": "5.15.20" + "5.11": { + "cmt_id": "dd0d6117052faace5440db20fc37175efe921c7d", + "fixed_version": "5.11.22" }, - "5.16": { - "cmt_id": "dea4fec0d87d4401b5d2717aa7c6c6cad050fb62", - "fixed_version": "5.16.6" + "5.12": { + "cmt_id": "5bc00fdda1e934c557351a9c751a205293e68cbf", + "fixed_version": "5.12.5" } }, - "CVE-2022-20008": { + "CVE-2021-46991": { "4.19": { - "cmt_id": "c91b06297563e84ac072464fe6cc141cc15435f0", - "fixed_version": "4.19.231" + "cmt_id": "c1322eaeb8af0d8985b5cc5fa759140fa0e57b84", + "fixed_version": "4.19.191" }, "5.10": { - "cmt_id": "ab2b4e65a130d67478bd5b35ca9004b2075805fa", - "fixed_version": "5.10.102" + "cmt_id": "829a713450b8fb127cbabfc1244c1d8179ec5107", + "fixed_version": "5.10.38" }, - "5.15": { - "cmt_id": "f3ff5f75d8f6367eac7556c9db1227bb43e5c615", - "fixed_version": "5.15.25" + "5.11": { + "cmt_id": "4ebc10aa7cd17fd9857dedac69600465c9dd16d1", + "fixed_version": "5.11.22" }, - "5.16": { - "cmt_id": "cccf23c660cc96c5687335d73cad103e983e6165", - "fixed_version": "5.16.11" + "5.12": { + "cmt_id": "1fd5d262e7442192ac7611ff1597a36c5b044323", + "fixed_version": "5.12.5" }, "5.4": { - "cmt_id": "902528183f4d94945a0c1ed6048d4a5d4e1e712e", - "fixed_version": "5.4.181" + "cmt_id": "d718c15a2bf9ae082d5ae4d177fb19ef23cb4132", + "fixed_version": "5.4.120" } }, - "CVE-2022-20132": { + "CVE-2021-46992": { "4.14": { - "cmt_id": "43cc4686b15d7d3a2b65b125393ea3f3d477e7d1", - "fixed_version": "4.14.258" + "cmt_id": "2824cafc6a93792d9ad85939c499161214d84c4b", + "fixed_version": "4.14.233" }, "4.19": { - "cmt_id": "b1efa723b986a84f84a95b6907cffe3a357338c9", - "fixed_version": "4.19.221" - }, - "4.4": { - "cmt_id": "6a0bc60a84cb5186a84e7501616dacfd9e991b54", - "fixed_version": "4.4.295" - }, - "4.9": { - "cmt_id": "28d8244f3ec961a11bfb4ad83cdc48ff9b8c47a7", - "fixed_version": "4.9.293" + "cmt_id": "efcd730ddd6f25578bd31bfe703e593e2421d708", + "fixed_version": "4.19.191" }, "5.10": { - "cmt_id": "61144329606cb9518642b7d2e940b21eb3214204", - "fixed_version": "5.10.85" + "cmt_id": "72b49dd116ca00a46a11d5a4d8d7987f05ed9cd7", + "fixed_version": "5.10.38" }, - "5.15": { - "cmt_id": "e1e21632a4c4d2f85587e204939883ce59d18447", - "fixed_version": "5.15.8" + "5.11": { + "cmt_id": "1e8ab479cfbe5751efccedb95afb9b112a5ba475", + "fixed_version": "5.11.22" + }, + "5.12": { + "cmt_id": "a388d10961ff8578b1a6691945d406c0f33aa71b", + "fixed_version": "5.12.5" }, "5.4": { - "cmt_id": "6e1e0a01425810494ce00d7b800b69482790b198", - "fixed_version": "5.4.165" + "cmt_id": "c77e2ef18167ad334e27610ced9a7f6af5ec1787", + "fixed_version": "5.4.120" } }, - "CVE-2022-20141": { - "4.14": { - "cmt_id": "78967749984cf3614de346c90f3e259ff8272735", - "fixed_version": "4.14.247" - }, - "4.19": { - "cmt_id": "4768973dffed4d0126854514335ed4fe87bec1ab", - "fixed_version": "4.19.207" - }, - "4.4": { - "cmt_id": "b24065948ae6c48c9e20891f8cfe9850f1d748be", - "fixed_version": "4.4.284" - }, - "4.9": { - "cmt_id": "e9924c4204ede999b0515fd31a370a1e27f676bc", - "fixed_version": "4.9.283" - }, + "CVE-2021-46993": { "5.10": { - "cmt_id": "ddd7e8b7b84836c584a284b98ca9bd7a348a0558", - "fixed_version": "5.10.64" + "cmt_id": "f7347c85490b92dd144fa1fba9e1eca501656ab3", + "fixed_version": "5.10.38" }, - "5.13": { - "cmt_id": "961447ff60291b91e27d5c32fa549c1411ad3b70", - "fixed_version": "5.13.16" + "5.11": { + "cmt_id": "3da3f804b82a0a382d523a21acf4cf3bb35f936d", + "fixed_version": "5.11.22" }, - "5.14": { - "cmt_id": "d1a3c6d5925a8d00a32c5ef2d674dd9c0ce89c95", - "fixed_version": "5.14.3" + "5.12": { + "cmt_id": "42ee47c7e3569d9a0e2cb5053c496d97d380472f", + "fixed_version": "5.12.5" }, "5.4": { - "cmt_id": "d84708451d9041dff8a81e3718f821f12d2eb6c5", - "fixed_version": "5.4.145" + "cmt_id": "687f523c134b7f0bd040ee1230f6d17990d54172", + "fixed_version": "5.4.120" } }, - "CVE-2022-20148": { - "5.14": { - "cmt_id": "5b67adb7425e758655e464bda4eb4174ac88b625", - "fixed_version": "5.14.19" + "CVE-2021-46994": { + "5.10": { + "cmt_id": "eecb4df8ec9f896b19ee05bfa632ac6c1dcd8f21", + "fixed_version": "5.10.38" }, - "5.15": { - "cmt_id": "5e1b901dd470659bcfeaa76811d2af9165579d77", - "fixed_version": "5.15.3" + "5.11": { + "cmt_id": "6f8f1c27b577de15f69fefce3c502bb6300d825c", + "fixed_version": "5.11.22" + }, + "5.12": { + "cmt_id": "e1e10a390fd9479209c4d834d916ca5e6d5d396b", + "fixed_version": "5.12.5" } }, - "CVE-2022-20153": { - "5.10": { - "cmt_id": "dc1163203ae6e24b86168390fe5b4a3295fcba7f", - "fixed_version": "5.10.107" + "CVE-2021-46995": { + "5.12": { + "cmt_id": "15f8f96ec7fc35024d4e03296e4d838fcea33d83", + "fixed_version": "5.12.5" } }, - "CVE-2022-20154": { - "4.14": { - "cmt_id": "8873140f95d4977bf37e4cf0d5c5e3f6e34cdd3e", - "fixed_version": "4.14.261" + "CVE-2021-46996": { + "5.10": { + "cmt_id": "2c784a500f5edd337258b0fdb2f31bc9abde1a23", + "fixed_version": "5.10.38" }, - "4.19": { - "cmt_id": "af6e6e58f7ebf86b4e7201694b1e4f3a62cbc3ec", - "fixed_version": "4.19.224" + "5.11": { + "cmt_id": "59fa98bfa1f4013d658d990cac88c87b46ff410c", + "fixed_version": "5.11.22" }, + "5.12": { + "cmt_id": "dd3bebf515f336214a91994348a2b86b9a1d3d7f", + "fixed_version": "5.12.5" + } + }, + "CVE-2021-46997": { "5.10": { - "cmt_id": "769d14abd35e0e153b5149c3e1e989a9d719e3ff", - "fixed_version": "5.10.90" + "cmt_id": "51524fa8b5f7b879ba569227738375d283b79382", + "fixed_version": "5.10.38" }, - "5.15": { - "cmt_id": "75799e71df1da11394740b43ae5686646179561d", - "fixed_version": "5.15.13" + "5.11": { + "cmt_id": "e67a83f078005461b59b4c776e6b5addd11725fa", + "fixed_version": "5.11.22" }, - "5.4": { - "cmt_id": "831de271452b87657fcf8d715ee20519b79caef5", - "fixed_version": "5.4.170" + "5.12": { + "cmt_id": "d8d52005f57bbb4a4ec02f647e2555d327135c68", + "fixed_version": "5.12.5" } }, - "CVE-2022-20158": { - "4.14": { - "cmt_id": "b1e27cda1e3c12b705875bb7e247a97168580e33", - "fixed_version": "4.14.273" - }, + "CVE-2021-46998": { "4.19": { - "cmt_id": "a33dd1e6693f80d805155b3f69c18c2f642915da", - "fixed_version": "4.19.236" - }, - "4.9": { - "cmt_id": "b9d5772d60f8e7ef34e290f72fc20e3a4883e7d0", - "fixed_version": "4.9.308" + "cmt_id": "25a87b1f566b5eb2af2857a928f0e2310d900976", + "fixed_version": "4.19.191" }, "5.10": { - "cmt_id": "70b7b3c055fd4a464da8da55ff4c1f84269f9b02", - "fixed_version": "5.10.108" - }, - "5.15": { - "cmt_id": "a055f5f2841f7522b44a2b1eccb1951b4b03d51a", - "fixed_version": "5.15.31" + "cmt_id": "7afdd6aba95c8a526038e7abe283eeac3e4320f1", + "fixed_version": "5.10.38" }, - "5.16": { - "cmt_id": "ef591b35176029fdefea38e8388ffa371e18f4b2", - "fixed_version": "5.16.17" + "5.11": { + "cmt_id": "6892396ebf04ea2c021d80e10f4075e014cd7cc3", + "fixed_version": "5.11.22" }, - "5.17": { - "cmt_id": "c700525fcc06b05adfea78039de02628af79e07a", - "fixed_version": "5.17" + "5.12": { + "cmt_id": "d90529392aaf498dafa95d212295d64b2cea4e24", + "fixed_version": "5.12.5" }, "5.4": { - "cmt_id": "268dcf1f7b3193bc446ec3d14e08a240e9561e4d", - "fixed_version": "5.4.187" + "cmt_id": "f7f6f07774091a6ddd98500b85386c3c6afb30d3", + "fixed_version": "5.4.120" } }, - "CVE-2022-20368": { - "4.14": { - "cmt_id": "b1e27cda1e3c12b705875bb7e247a97168580e33", - "fixed_version": "4.14.273" - }, - "4.19": { - "cmt_id": "a33dd1e6693f80d805155b3f69c18c2f642915da", - "fixed_version": "4.19.236" + "CVE-2021-46999": { + "5.10": { + "cmt_id": "f01988ecf3654f805282dce2d3bb9afe68d2691e", + "fixed_version": "5.10.38" }, - "4.9": { - "cmt_id": "b9d5772d60f8e7ef34e290f72fc20e3a4883e7d0", - "fixed_version": "4.9.308" + "5.11": { + "cmt_id": "61b877bad9bb0d82b7d8841be50872557090a704", + "fixed_version": "5.11.22" }, + "5.12": { + "cmt_id": "0bfd913c2121b3d553bfd52810fe6061d542d625", + "fixed_version": "5.12.5" + } + }, + "CVE-2021-47000": { "5.10": { - "cmt_id": "70b7b3c055fd4a464da8da55ff4c1f84269f9b02", - "fixed_version": "5.10.108" + "cmt_id": "bf45c9fe99aa8003d2703f1bd353f956dea47e40", + "fixed_version": "5.10.38" }, - "5.15": { - "cmt_id": "a055f5f2841f7522b44a2b1eccb1951b4b03d51a", - "fixed_version": "5.15.31" + "5.11": { + "cmt_id": "22fa4c8288f1ec40f6d62d7a32c57ac176f9f0bc", + "fixed_version": "5.11.22" }, - "5.16": { - "cmt_id": "ef591b35176029fdefea38e8388ffa371e18f4b2", - "fixed_version": "5.16.17" + "5.12": { + "cmt_id": "0a219432127d396120fc88cabd82785e0ff72a2f", + "fixed_version": "5.12.5" + } + }, + "CVE-2021-47001": { + "5.10": { + "cmt_id": "eddae8be7944096419c2ae29477a45f767d0fcd4", + "fixed_version": "5.10.38" }, - "5.17": { - "cmt_id": "c700525fcc06b05adfea78039de02628af79e07a", - "fixed_version": "5.17" + "5.11": { + "cmt_id": "8834ecb5df22b7ff3c9b0deba7726579bb613f95", + "fixed_version": "5.11.22" }, - "5.4": { - "cmt_id": "268dcf1f7b3193bc446ec3d14e08a240e9561e4d", - "fixed_version": "5.4.187" + "5.12": { + "cmt_id": "19b5fa9489b5706bc878c3a522a7f771079e2fa0", + "fixed_version": "5.12.5" } }, - "CVE-2022-20369": { - "4.14": { - "cmt_id": "7339b6bdf9e084f9e83c084ccc8879b6ae80b75a", - "fixed_version": "4.14.298" + "CVE-2021-47002": { + "5.11": { + "cmt_id": "1e10f58f1c9a6b667b045513c7a4e6111c24fe7c", + "fixed_version": "5.11.22" }, - "4.19": { - "cmt_id": "95c4751705f7eef0f16a245e121259857f867c4a", - "fixed_version": "4.19.264" + "5.12": { + "cmt_id": "c664aaec9aee544538a78ba4893a44bc73a6d742", + "fixed_version": "5.12.5" + } + }, + "CVE-2021-47003": { + "5.11": { + "cmt_id": "2280b4cc29d8cdd2be3d1b2d1ea4f958e2131c97", + "fixed_version": "5.11.22" }, + "5.12": { + "cmt_id": "7bc402f843e7817a4a808e7b9ab0bcd7ffd55bfa", + "fixed_version": "5.12.5" + } + }, + "CVE-2021-47004": { "5.10": { - "cmt_id": "8a83731a09a5954b85b1ce49c01ff5c2a3465cb7", - "fixed_version": "5.10.110" + "cmt_id": "105155a8146ddb54c119d8318964eef3859d109d", + "fixed_version": "5.10.38" }, - "5.15": { - "cmt_id": "48d00e24822e4384edcee3aae03d54c1b7982eba", - "fixed_version": "5.15.33" + "5.11": { + "cmt_id": "1e116f87825f01a6380286472196882746b16f63", + "fixed_version": "5.11.22" }, - "5.16": { - "cmt_id": "2a5fd6b402049521f657966a42c4277f083a63c0", - "fixed_version": "5.16.19" + "5.12": { + "cmt_id": "211372b2571520e394b56b431a0705586013b3ff", + "fixed_version": "5.12.5" + } + }, + "CVE-2021-47005": { + "5.10": { + "cmt_id": "bbed83d7060e07a5d309104d25a00f0a24441428", + "fixed_version": "5.10.38" }, - "5.17": { - "cmt_id": "3c6ec01525254e4489c6e60df2a8c48ee81f6f78", - "fixed_version": "5.17.2" + "5.11": { + "cmt_id": "679ebad058b8168f10e63876d63b0877fd2fe784", + "fixed_version": "5.11.22" }, - "5.4": { - "cmt_id": "54e1abbe856020522a7952140c26a4426f01dab6", - "fixed_version": "5.4.210" + "5.12": { + "cmt_id": "0169d4f0bee44fdfef908c13ed21fcb326c38695", + "fixed_version": "5.12.5" } }, - "CVE-2022-20421": { + "CVE-2021-47006": { "4.14": { - "cmt_id": "229f47603dd306bc0eb1a831439adb8e48bb0eae", - "fixed_version": "4.14.293" + "cmt_id": "ed1f67465327cec4457bb988775245b199da86e6", + "fixed_version": "4.14.233" }, "4.19": { - "cmt_id": "06e5b43ca4dab06a92bf4c2f33766e6fb11b880a", - "fixed_version": "4.19.258" + "cmt_id": "a9938d6d78a238d6ab8de57a4d3dcf77adceb9bb", + "fixed_version": "4.19.191" + }, + "4.9": { + "cmt_id": "555a70f7fff03bd669123487905c47ae27dbdaac", + "fixed_version": "4.9.269" }, "5.10": { - "cmt_id": "9629f2dfdb1dad294b468038ff8e161e94d0b609", - "fixed_version": "5.10.142" + "cmt_id": "630146203108bf6b8934eec0dfdb3e46dcb917de", + "fixed_version": "5.10.38" }, - "5.15": { - "cmt_id": "c2a4b5dc8fa71af73bab704d0cac42ac39767ed6", - "fixed_version": "5.15.66" + "5.11": { + "cmt_id": "7eeacc6728c5478e3c01bc82a1f08958eaa12366", + "fixed_version": "5.11.22" }, - "5.19": { - "cmt_id": "603a47f2ae56bf68288784d3c0a8c5b8e0a827ed", - "fixed_version": "5.19.8" + "5.12": { + "cmt_id": "dabe299425b1a53a69461fed7ac8922ea6733a25", + "fixed_version": "5.12.5" }, "5.4": { - "cmt_id": "30d0901b307f27d36b2655fb3048cf31ee0e89c0", - "fixed_version": "5.4.213" + "cmt_id": "3ed8832aeaa9a37b0fc386bb72ff604352567c80", + "fixed_version": "5.4.120" } }, - "CVE-2022-20422": { - "4.14": { - "cmt_id": "9d5fec6ba2e4117d196a8259ab54615ffe562460", - "fixed_version": "4.14.291" + "CVE-2021-47007": { + "5.10": { + "cmt_id": "1c20a4896409f5ca1c770e1880c33d0a28a8b10f", + "fixed_version": "5.10.38" + }, + "5.11": { + "cmt_id": "860afd680d9cc1dabd61cda3cd246f60aa1eb705", + "fixed_version": "5.11.22" + }, + "5.12": { + "cmt_id": "822054e5026c43b1dd60cf387dd999e95ee2ecc2", + "fixed_version": "5.12.5" + } + }, + "CVE-2021-47008": { + "5.11": { + "cmt_id": "fb9e14f4f8217a0980f8da2c8ff70dee058cbe47", + "fixed_version": "5.11.22" }, + "5.12": { + "cmt_id": "fd722a57fe0b80133dacae4e1c852ee4212f9b2e", + "fixed_version": "5.12.5" + } + }, + "CVE-2021-47009": { + "5.12": { + "cmt_id": "3e24fbd37e72e8a67b74991970fecc82d14f57af", + "fixed_version": "5.12.5" + } + }, + "CVE-2021-47010": { "4.19": { - "cmt_id": "b51881b1da57fe9877125dfdd0aac5172958fcfd", - "fixed_version": "4.19.256" + "cmt_id": "992de06308d9a9584d59b96d294ac676f924e437", + "fixed_version": "4.19.191" }, "5.10": { - "cmt_id": "353b4673d01c512303c45cf2346f630cda73b5c9", - "fixed_version": "5.10.137" - }, - "5.15": { - "cmt_id": "cc69ef95988b9ef2fc730ec452a7441efb90ef5e", - "fixed_version": "5.15.61" + "cmt_id": "6c1ea8bee75df8fe2184a50fcd0f70bf82986f42", + "fixed_version": "5.10.37" }, - "5.18": { - "cmt_id": "6a2fd114678d7fc1b5a0f8865ae98f1c17787455", - "fixed_version": "5.18.18" + "5.11": { + "cmt_id": "efe1532a6e1a8e3c343d04fff510f0ed80328f9c", + "fixed_version": "5.11.21" }, - "5.19": { - "cmt_id": "07022e07017ee5540f5559b0aeb916e8383c1e1a", - "fixed_version": "5.19.2" + "5.12": { + "cmt_id": "e7d7bedd507bb732e600403b7a96f9fe48d0ca31", + "fixed_version": "5.12.4" }, "5.4": { - "cmt_id": "04549063d5701976034d8c2bfda3d3a8cbf0409f", - "fixed_version": "5.4.211" + "cmt_id": "9884f745108f7d25b189bbcd6754e284fb29ab68", + "fixed_version": "5.4.119" } }, - "CVE-2022-20423": { - "4.14": { - "cmt_id": "c7953cf03a26876d676145ce5d2ae6d8c9630b90", - "fixed_version": "4.14.273" - }, - "4.19": { - "cmt_id": "138d4f739b35dfb40438a0d5d7054965763bfbe7", - "fixed_version": "4.19.236" - }, - "4.9": { - "cmt_id": "8b3e4d26bc9cd0f6373d0095b9ffd99e7da8006b", - "fixed_version": "4.9.308" + "CVE-2021-47011": { + "5.11": { + "cmt_id": "89b1ed358e01e1b0417f5d3b0082359a23355552", + "fixed_version": "5.11.21" }, + "5.12": { + "cmt_id": "c3ae6a3f3ca4f02f6ccddf213c027302586580d0", + "fixed_version": "5.12.4" + } + }, + "CVE-2021-47012": { "5.10": { - "cmt_id": "28bc0267399f42f987916a7174e2e32f0833cc65", - "fixed_version": "5.10.108" - }, - "5.15": { - "cmt_id": "56b38e3ca4064041d93c1ca18828c8cedad2e16c", - "fixed_version": "5.15.31" + "cmt_id": "608a4b90ece039940e9425ee2b39c8beff27e00c", + "fixed_version": "5.10.37" }, - "5.16": { - "cmt_id": "df7e088d51cdf78b1a0bf1f3d405c2593295c7b0", - "fixed_version": "5.16.17" + "5.11": { + "cmt_id": "3e22b88e02c194f6c80867abfef5cc09383461f4", + "fixed_version": "5.11.21" }, - "5.17": { - "cmt_id": "65f3324f4b6fed78b8761c3b74615ecf0ffa81fa", - "fixed_version": "5.17" + "5.12": { + "cmt_id": "ad9ce7188432650469a6c7625bf479f5ed0b6155", + "fixed_version": "5.12.4" }, "5.4": { - "cmt_id": "21829376268397f9fd2c35cfa9135937b6aa3a1e", - "fixed_version": "5.4.187" + "cmt_id": "30b9e92d0b5e5d5dc1101ab856c17009537cbca4", + "fixed_version": "5.4.119" } }, - "CVE-2022-20565": { + "CVE-2021-47013": { "4.14": { - "cmt_id": "9e5894b7e2229e6d89319864fb08304571fd44f7", - "fixed_version": "4.14.197" + "cmt_id": "dc1b438a35773d030be0ee80d9c635c3e558a322", + "fixed_version": "4.14.233" }, "4.19": { - "cmt_id": "abae259fdccc5e41ff302dd80a2b944ce385c970", - "fixed_version": "4.19.144" - }, - "4.4": { - "cmt_id": "12b27c445f2fd4a2e2c49136f26be26635cc1c73", - "fixed_version": "4.4.236" + "cmt_id": "16d8c44be52e3650917736d45f5904384a9da834", + "fixed_version": "4.19.191" }, "4.9": { - "cmt_id": "cf7797ea60e3e721e3ae5090edbc2ec72d715436", - "fixed_version": "4.9.236" - }, - "5.4": { - "cmt_id": "667514df10a08e4a65cb88f5fd5ffeccd027c4af", - "fixed_version": "5.4.63" - }, - "5.8": { - "cmt_id": "b070b1e2076809ea192d4f3344833afcfdaf146d", - "fixed_version": "5.8.7" - } - }, - "CVE-2022-20566": { - "4.14": { - "cmt_id": "5bb395334392891dffae5a0e8f37dbe1d70496c9", - "fixed_version": "4.14.291" - }, - "4.19": { - "cmt_id": "bbd1fdb0e1adf827997a93bf108f20ede038e56e", - "fixed_version": "4.19.255" - }, - "4.9": { - "cmt_id": "d255c861e268ba342e855244639a15f12d7a0bf2", - "fixed_version": "4.9.326" + "cmt_id": "c7f75d11fe72913d2619f97b2334b083cd7bb955", + "fixed_version": "4.9.269" }, "5.10": { - "cmt_id": "de5d4654ac6c22b1be756fdf7db18471e7df01ea", - "fixed_version": "5.10.135" + "cmt_id": "9dc373f74097edd0e35f3393d6248eda8d1ba99d", + "fixed_version": "5.10.37" }, - "5.15": { - "cmt_id": "f32d5615a78a1256c4f557ccc6543866e75d03f4", - "fixed_version": "5.15.59" + "5.11": { + "cmt_id": "8c06f34785068b87e2b560534c77c163d6c6dca7", + "fixed_version": "5.11.21" }, - "5.18": { - "cmt_id": "59a55ec33a54a7179fa178f8aaf8b1cb8e63bd93", - "fixed_version": "5.18.16" + "5.12": { + "cmt_id": "e407495ba6788a67d1bd41714158c079e340879b", + "fixed_version": "5.12.4" }, "5.4": { - "cmt_id": "098e07ef0059296e710a801cdbd74b59016e6624", - "fixed_version": "5.4.209" + "cmt_id": "55fcdd1258faaecca74b91b88cc0921f9edd775d", + "fixed_version": "5.4.119" } }, - "CVE-2022-20567": { - "4.15": { - "cmt_id": "08ffa7bbb46e2a298287c66343ba44039a931ba4", - "fixed_version": "4.15.8" + "CVE-2021-47014": { + "5.12": { + "cmt_id": "0648941f4c8bbf8b4b6c0b270889ae7aa769b921", + "fixed_version": "5.12.4" } }, - "CVE-2022-20572": { - "4.14": { - "cmt_id": "388bc1e69663956f8cee43af3bd02bd3061d222d", - "fixed_version": "4.14.282" - }, - "4.19": { - "cmt_id": "6bff6107d1364c95109609c3fd680e6c8d7fa503", - "fixed_version": "4.19.246" - }, - "4.9": { - "cmt_id": "27798cca4e54fe9c390396c4cc655480f827bbd5", - "fixed_version": "4.9.317" - }, + "CVE-2021-47015": { "5.10": { - "cmt_id": "8df42bcd364cc3b41105215d841792aea787b133", - "fixed_version": "5.10.120" - }, - "5.15": { - "cmt_id": "69712b170237ec5979f168149cd31e851a465853", - "fixed_version": "5.15.45" + "cmt_id": "4fcaad2b7dac3f16704f8118c7e481024ddbd3ed", + "fixed_version": "5.10.37" }, - "5.17": { - "cmt_id": "a40560bbf6228ecf754d45aa7b1c50b488fed519", - "fixed_version": "5.17.13" + "5.11": { + "cmt_id": "e187ef83c04a5d23e68d39cfdff1a1931e29890c", + "fixed_version": "5.11.21" }, - "5.18": { - "cmt_id": "417c73db67ea7ad8f03dfd34c6b0bb5f54294fa9", - "fixed_version": "5.18.2" + "5.12": { + "cmt_id": "3fbc5bc651d688fbea2a59cdc91520a2f5334d0a", + "fixed_version": "5.12.4" }, "5.4": { - "cmt_id": "fd2f7e9984850a0162bfb6948b98ffac9fb5fa58", - "fixed_version": "5.4.197" + "cmt_id": "b1523e4ba293b2a32d9fabaf70c1dcaa6e3e2847", + "fixed_version": "5.4.119" } }, - "CVE-2022-2078": { + "CVE-2021-47016": { "5.10": { - "cmt_id": "c0aff1faf66b6b7a19103f83e6a5d0fdc64b9048", - "fixed_version": "5.10.120" + "cmt_id": "1dfb26df15fc7036a74221d43de7427f74293dae", + "fixed_version": "5.10.37" }, - "5.15": { - "cmt_id": "89ef50fe03a55feccf5681c237673a2f98161161", - "fixed_version": "5.15.45" + "5.11": { + "cmt_id": "73fdeb612d25b5e105c219e05434285a45d23576", + "fixed_version": "5.11.21" }, - "5.17": { - "cmt_id": "c88f3e3d243d701586239c5b69356ec2b1fd05f1", - "fixed_version": "5.17.13" + "5.12": { + "cmt_id": "5d34225169346cab5145978d153b9ce90e9ace21", + "fixed_version": "5.12.4" }, - "5.18": { - "cmt_id": "c9a46a3d549286861259c19af4747e12cfaeece9", - "fixed_version": "5.18.2" + "5.4": { + "cmt_id": "f6a90818a32058fca62cda3a2027a6a2364e1878", + "fixed_version": "5.4.119" } }, - "CVE-2022-21123": { - "4.14": { - "cmt_id": "d6087dda37d3ffa3c8efe6385757d73d9ed173c5", - "fixed_version": "4.14.284" - }, - "4.19": { - "cmt_id": "9f2ce43ebc33713ba02a89a66bd5f93c2f3a82cf", - "fixed_version": "4.19.248" - }, - "4.9": { - "cmt_id": "a11f2f05f5c605d1f6573b0cdcd2a6f38667fda1", - "fixed_version": "4.9.319" - }, + "CVE-2021-47017": { "5.10": { - "cmt_id": "26f6f231f6a5a79ccc274967939b22602dec76e8", - "fixed_version": "5.10.123" - }, - "5.15": { - "cmt_id": "d74f4eb1ddf076a55ff0682a89e66af5c1974321", - "fixed_version": "5.15.48" + "cmt_id": "8bb054fb336f4250002fff4e0b075221c05c3c65", + "fixed_version": "5.10.37" }, - "5.18": { - "cmt_id": "bc4d37b2338a32a6668d94803feebc9cbc85572e", - "fixed_version": "5.18.5" + "5.11": { + "cmt_id": "3b1ac40c6012140828caa79e592a438a18ebf71b", + "fixed_version": "5.11.21" }, - "5.4": { - "cmt_id": "0800f1b45bf6d85e5a168db9ae91fb816f0a8c34", - "fixed_version": "5.4.199" + "5.12": { + "cmt_id": "5e413c0831ff4700d1739db3fa3ae9f859744676", + "fixed_version": "5.12.4" } }, - "CVE-2022-21125": { - "4.14": { - "cmt_id": "532c3a51316b6b1fdc6cb01926e2d139ef7e25da", - "fixed_version": "4.14.284" - }, - "4.19": { - "cmt_id": "0e94464009ee37217a7e450c96ea1f8d42d3a6b5", - "fixed_version": "4.19.248" - }, - "4.9": { - "cmt_id": "b7efb3a62fffa509e21d076aa2e75331c79fe36d", - "fixed_version": "4.9.319" - }, + "CVE-2021-47018": { "5.10": { - "cmt_id": "6df693dca31218f76c63b6fd4aa7b7db3bd6e049", - "fixed_version": "5.10.123" - }, - "5.15": { - "cmt_id": "ebd0f558b48082c265fd594ffb205ae5350bfe79", - "fixed_version": "5.15.48" + "cmt_id": "4b9fb2c9039a206d37f215936a4d5bee7b1bf9cd", + "fixed_version": "5.10.37" }, - "5.18": { - "cmt_id": "dce28a791e9632f96ba018f2ef708e012edb4133", - "fixed_version": "5.18.5" + "5.11": { + "cmt_id": "abb07dc5e8b61ab7b1dde20dd73aa01a3aeb183f", + "fixed_version": "5.11.21" }, - "5.4": { - "cmt_id": "d961592635932bd1ea32a534412a41fb794e2212", - "fixed_version": "5.4.199" + "5.12": { + "cmt_id": "a84df7c80bdac598d6ac9268ae578da6928883e8", + "fixed_version": "5.12.4" } }, - "CVE-2022-21166": { - "4.14": { - "cmt_id": "e0fccc13ebe3ed1205f69d119d49789ef039c1fd", - "fixed_version": "4.14.284" - }, + "CVE-2021-47019": { + "5.12": { + "cmt_id": "b13cbc536990ff609afa878b6211cd6f6265ba60", + "fixed_version": "5.12.4" + } + }, + "CVE-2021-47020": { "4.19": { - "cmt_id": "8b42145e8c9903d4805651e08f4fca628e166642", - "fixed_version": "4.19.248" - }, - "4.9": { - "cmt_id": "6ecdbc9dc777a5b66a9ec293af88ab330dd644a2", - "fixed_version": "4.9.319" + "cmt_id": "342260fe821047c3d515e3d28085d73fbdce3e80", + "fixed_version": "4.19.191" }, "5.10": { - "cmt_id": "3eb1180564fa0ecedc33b44029da7687c0a9fbf5", - "fixed_version": "5.10.123" + "cmt_id": "7c468deae306d0cbbd539408c26cfec04c66159a", + "fixed_version": "5.10.37" }, - "5.15": { - "cmt_id": "2044838ab2283c23869ffa7b062e5f388136e432", - "fixed_version": "5.15.48" + "5.11": { + "cmt_id": "2f17ac005b320c85d686088cfd4c2e7017912b88", + "fixed_version": "5.11.21" }, - "5.18": { - "cmt_id": "8547d4ae6a95543b69d523f3706dbf887496e9f3", - "fixed_version": "5.18.5" + "5.12": { + "cmt_id": "effd2bd62b416f6629e18e3ce077c60de14cfdea", + "fixed_version": "5.12.4" }, "5.4": { - "cmt_id": "8d25482fc96aa2cb24a221295fdd498f40565415", - "fixed_version": "5.4.199" + "cmt_id": "870533403ffa28ff63e173045fc5369365642002", + "fixed_version": "5.4.119" } }, - "CVE-2022-21385": { - "4.19": { - "cmt_id": "5be4bb315de29ad3ae558a8f6b92f13a1b4bfb84", - "fixed_version": "4.19.36" - }, - "4.20": { - "cmt_id": "ea010070d0a7497253d5a6f919f6dd107450b31a", - "fixed_version": "4.20" + "CVE-2021-47021": { + "5.12": { + "cmt_id": "d754c80ae82a662e692a82faad71b8c218cb7f52", + "fixed_version": "5.12.4" } }, - "CVE-2022-21499": { + "CVE-2021-47022": { + "5.12": { + "cmt_id": "6c5b2b0c6e5a6ce2d8f9f85b8b72bfad60eaa506", + "fixed_version": "5.12.4" + } + }, + "CVE-2021-47023": { "5.10": { - "cmt_id": "a8f4d63142f947cd22fa615b8b3b8921cdaf4991", - "fixed_version": "5.10.119" + "cmt_id": "0ce6052802be2cb61a57b753e41301339c88c839", + "fixed_version": "5.10.37" }, - "5.15": { - "cmt_id": "69c5d307dce1560fafcb852f39d7a1bf5e266641", - "fixed_version": "5.15.42" + "5.11": { + "cmt_id": "b5bba6ede42693f50ce1c9944315cefed7491061", + "fixed_version": "5.11.21" }, - "5.17": { - "cmt_id": "281d356a035132f2603724ee0f04767d70e2e98e", - "fixed_version": "5.17.10" + "5.12": { + "cmt_id": "9d1ba11fabdd8f25abb24272ef1621417981320b", + "fixed_version": "5.12.4" + } + }, + "CVE-2021-47024": { + "5.10": { + "cmt_id": "b605673b523fe33abeafb2136759bcbc9c1e6ebf", + "fixed_version": "5.10.37" }, - "5.18": { - "cmt_id": "eca56bf0066ef2f1e7be0e3fa7564b85a309872c", - "fixed_version": "5.18.1" + "5.11": { + "cmt_id": "27691665145e74a45034a9dccf1150cf1894763a", + "fixed_version": "5.11.21" }, - "5.4": { - "cmt_id": "8bb828229da903bb5710d21065e0a29f9afd30e0", - "fixed_version": "5.4.197" + "5.12": { + "cmt_id": "37c38674ef2f8d7e8629e5d433c37d6c1273d16b", + "fixed_version": "5.12.4" } }, - "CVE-2022-21505": { + "CVE-2021-47025": { + "5.12": { + "cmt_id": "5cad9e2caa9613fdcd246bd4ebf0ffbec1cba2ca", + "fixed_version": "5.12.4" + } + }, + "CVE-2021-47026": { "5.10": { - "cmt_id": "ab5050fd7430dde3a9f073129036d3da3facc8ec", - "fixed_version": "5.10.134" - }, - "5.15": { - "cmt_id": "0e66932a9dc9ba47e60405b392e3782a332bc44e", - "fixed_version": "5.15.58" + "cmt_id": "b64415c6b3476cf9fa4d0aea3807065b8403a937", + "fixed_version": "5.10.37" }, - "5.18": { - "cmt_id": "f67ff524f283183c52d2575b11beec00cc4d5092", - "fixed_version": "5.18.15" + "5.11": { + "cmt_id": "676171f9405dcaa45a33d18241c32f387dbaae39", + "fixed_version": "5.11.21" }, - "5.4": { - "cmt_id": "ed3fea55066b4e054c4d212e54f9965abcac9685", - "fixed_version": "5.4.208" + "5.12": { + "cmt_id": "d3cca8067d43dfee4a3535c645b55f618708dccb", + "fixed_version": "5.12.4" } }, - "CVE-2022-2153": { - "4.14": { - "cmt_id": "bcf0a450fbaabe7e14d71f885525805b4f86e855", - "fixed_version": "4.14.291" - }, - "4.19": { - "cmt_id": "b8127a0fd21d70ab42d8177f8bb97df74f503cc1", - "fixed_version": "4.19.256" + "CVE-2021-47027": { + "5.12": { + "cmt_id": "a46b536cd60c0dbd4bf767c62a8774dec52bf099", + "fixed_version": "5.12.4" + } + }, + "CVE-2021-47028": { + "5.11": { + "cmt_id": "dfc8a71448c7d4fec38fb22bdc8a76d79c14b6da", + "fixed_version": "5.11.21" }, + "5.12": { + "cmt_id": "4bd926e5ca88eac4d95eacb806b229f8729bc62e", + "fixed_version": "5.12.4" + } + }, + "CVE-2021-47029": { + "5.12": { + "cmt_id": "2554b9cb4b5e097c6071ec3ed5bc7c665c477ca7", + "fixed_version": "5.12.4" + } + }, + "CVE-2021-47030": { + "5.12": { + "cmt_id": "54b989653c5531bc4416ced33f146b9cb633d978", + "fixed_version": "5.12.4" + } + }, + "CVE-2021-47031": { + "5.12": { + "cmt_id": "4811226374453607175ea057777faa7e7f752204", + "fixed_version": "5.12.4" + } + }, + "CVE-2021-47032": { "5.10": { - "cmt_id": "ac7de8c2ba1292856fdd4a4c0764669b9607cf0a", - "fixed_version": "5.10.137" - }, - "5.15": { - "cmt_id": "0e5dbc0540baa89faf4c04ccc7e9c4fe6b1d7bf4", - "fixed_version": "5.15.33" - }, - "5.16": { - "cmt_id": "9e38128f8bd1d4f2244d8a393bc5dc204a99a541", - "fixed_version": "5.16.19" + "cmt_id": "4e7914ce23306b28d377ec395e00e5fde0e6f96e", + "fixed_version": "5.10.37" }, - "5.17": { - "cmt_id": "9fa2b94443ff41cdecdff6f4d4324d83af01089a", - "fixed_version": "5.17.2" + "5.11": { + "cmt_id": "4a9dcd6efb2a268fc5707dcfb3b0c412975c4462", + "fixed_version": "5.11.21" }, - "5.4": { - "cmt_id": "8cdba919acefdd6fea5dd2b77a119f54fb88ce11", - "fixed_version": "5.4.211" + "5.12": { + "cmt_id": "e2cdc9cb33c5963efe1a7c022753386f9463d1b7", + "fixed_version": "5.12.4" } }, - "CVE-2022-2196": { + "CVE-2021-47033": { "5.10": { - "cmt_id": "1b0cafaae8884726c597caded50af185ffc13349", - "fixed_version": "5.10.170" + "cmt_id": "75bc5f779a7664d1fc19cb915039439c6e58bb94", + "fixed_version": "5.10.37" }, - "5.15": { - "cmt_id": "6b539a7dbb49250f92515c2ba60aea239efc9e35", - "fixed_version": "5.15.96" + "5.11": { + "cmt_id": "a025277a80add18c33d01042525a74fe5b875f25", + "fixed_version": "5.11.21" }, - "6.1": { - "cmt_id": "63fada296062e91ad9f871970d4e7f19e21a6a15", - "fixed_version": "6.1.14" + "5.12": { + "cmt_id": "821ae236ccea989a1fcc6abfc4d5b74ad4ba39d2", + "fixed_version": "5.12.4" } }, - "CVE-2022-22942": { - "4.14": { - "cmt_id": "e8d092a62449dcfc73517ca43963d2b8f44d0516", - "fixed_version": "4.14.264" - }, + "CVE-2021-47034": { "4.19": { - "cmt_id": "0008a0c78fc33a84e2212a7c04e6b21a36ca6f4d", - "fixed_version": "4.19.227" + "cmt_id": "b3d5d0983388d6c4fb35f7d722556d5595f167a7", + "fixed_version": "4.19.191" }, "5.10": { - "cmt_id": "ae2b20f27732fe92055d9e7b350abc5cdf3e2414", - "fixed_version": "5.10.95" + "cmt_id": "84c0762633f2a7ac8399e6b97d3b9bb8e6e1d50f", + "fixed_version": "5.10.37" }, - "5.15": { - "cmt_id": "6066977961fc6f437bc064f628cf9b0e4571c56c", - "fixed_version": "5.15.18" + "5.11": { + "cmt_id": "01ac203e2119d8922126886ddea309fb676f955f", + "fixed_version": "5.11.21" }, - "5.16": { - "cmt_id": "1d833b27fb708d6fdf5de9f6b3a8be4bd4321565", - "fixed_version": "5.16.4" + "5.12": { + "cmt_id": "e40c52ee67b155ad59f59e73ea136d02685f0e0d", + "fixed_version": "5.12.4" }, "5.4": { - "cmt_id": "84b1259fe36ae0915f3d6ddcea6377779de48b82", - "fixed_version": "5.4.175" + "cmt_id": "73f9dccb29e4f82574bec2765c0090cdb0404301", + "fixed_version": "5.4.119" } }, - "CVE-2022-23036": { - "4.14": { - "cmt_id": "1b2f59f854e7069ba059adfe03d648ea643eba51", - "fixed_version": "4.14.271" + "CVE-2021-47035": { + "5.10": { + "cmt_id": "89bd620798704a8805fc9db0d71d7f812cf5b3d2", + "fixed_version": "5.10.38" }, - "4.19": { - "cmt_id": "17659846fe336366b1663194f5669d10f5947f53", - "fixed_version": "4.19.234" + "5.11": { + "cmt_id": "25faff78138933244c678c7fc78f7c0340fa04a0", + "fixed_version": "5.11.21" }, - "4.9": { - "cmt_id": "73e1d9b33f2bd93ce30719dfc8990b6328243b7e", - "fixed_version": "4.9.306" + "5.12": { + "cmt_id": "66c24699f266ff310381a9552d3576eea8ad6e20", + "fixed_version": "5.12.4" + } + }, + "CVE-2021-47036": { + "5.12": { + "cmt_id": "450687386cd16d081b58cd7a342acff370a96078", + "fixed_version": "5.12.4" + } + }, + "CVE-2021-47037": { + "5.11": { + "cmt_id": "6893df3753beafa5f7351228a9dd8157a57d7492", + "fixed_version": "5.11.21" }, + "5.12": { + "cmt_id": "62413972f5266568848a36fd15160397b211fa74", + "fixed_version": "5.12.4" + } + }, + "CVE-2021-47038": { "5.10": { - "cmt_id": "3d81e85f30a8f712c3e4f2a507553d9063a20ed6", - "fixed_version": "5.10.105" - }, - "5.15": { - "cmt_id": "1dd5b4b230f6d1345708c6204ccacdf83d53feaf", - "fixed_version": "5.15.28" + "cmt_id": "7cc0ba67883c6c8d3bddb283f56c167fc837a555", + "fixed_version": "5.10.37" }, - "5.16": { - "cmt_id": "0ba1ab25bb5057869621b340dbd411cca3242467", - "fixed_version": "5.16.14" + "5.11": { + "cmt_id": "fee71f480bc1dec5f6ae3b0b185ff12a62bceabc", + "fixed_version": "5.11.21" }, - "5.4": { - "cmt_id": "44d86dccd2a5f02a66c6784378d1429412d84bf0", - "fixed_version": "5.4.184" + "5.12": { + "cmt_id": "332e69eb3bd90370f2d9f2c2ca7974ff523dea17", + "fixed_version": "5.12.4" } }, - "CVE-2022-23037": { - "4.14": { - "cmt_id": "fbb5d5edd233c25774109dc0a673702c7b4985e5", - "fixed_version": "4.14.271" + "CVE-2021-47039": { + "5.11": { + "cmt_id": "07f86aa8f4fe077be1b018cc177eb8c6573e5671", + "fixed_version": "5.11.21" }, - "4.19": { - "cmt_id": "927e4eb8ddf4968b6a33be992b28063f84552c72", - "fixed_version": "4.19.234" + "5.12": { + "cmt_id": "2a3a8bbca28b899806844c00d49ed1b7ccb50957", + "fixed_version": "5.12.4" + } + }, + "CVE-2021-47040": { + "5.10": { + "cmt_id": "cbbc13b115b8f18e0a714d89f87fbdc499acfe2d", + "fixed_version": "5.10.37" }, - "4.9": { - "cmt_id": "1112bb311ec13e7e6e7045ae4a0b7091bedc6b7a", - "fixed_version": "4.9.306" + "5.11": { + "cmt_id": "51bf90901952aaac564bbdb36b2b503050c53dd9", + "fixed_version": "5.11.21" }, + "5.12": { + "cmt_id": "84b8c266c4bfe9ed5128e13253c388deb74b1b03", + "fixed_version": "5.12.4" + } + }, + "CVE-2021-47041": { "5.10": { - "cmt_id": "f6690dd9446a2a4bd9b024f00f71dd827a98317f", - "fixed_version": "5.10.105" + "cmt_id": "60ade0d56b06537a28884745059b3801c78e03bc", + "fixed_version": "5.10.37" }, - "5.15": { - "cmt_id": "5d5fa1d53a31c799b85112841c3c639c7baac1c4", - "fixed_version": "5.15.28" + "5.11": { + "cmt_id": "06beaa1a9f6e501213195e47c30416032fd2bbd5", + "fixed_version": "5.11.21" }, - "5.16": { - "cmt_id": "741052b05bcdc295dd715a71549b28c926266800", - "fixed_version": "5.16.14" + "5.12": { + "cmt_id": "906c538340dde6d891df89fe7dac8eaa724e40da", + "fixed_version": "5.12.4" }, "5.4": { - "cmt_id": "b507879c1e2d2c55752f658439df71595f4adff2", - "fixed_version": "5.4.184" + "cmt_id": "999d606a820c36ae9b9e9611360c8b3d8d4bb777", + "fixed_version": "5.4.119" } }, - "CVE-2022-23038": { - "4.14": { - "cmt_id": "1b2f59f854e7069ba059adfe03d648ea643eba51", - "fixed_version": "4.14.271" - }, - "4.19": { - "cmt_id": "17659846fe336366b1663194f5669d10f5947f53", - "fixed_version": "4.19.234" - }, - "4.9": { - "cmt_id": "73e1d9b33f2bd93ce30719dfc8990b6328243b7e", - "fixed_version": "4.9.306" - }, + "CVE-2021-47042": { + "5.12": { + "cmt_id": "296443139f893b554dddd56a99ba8471ab5802d4", + "fixed_version": "5.12.4" + } + }, + "CVE-2021-47043": { "5.10": { - "cmt_id": "3d81e85f30a8f712c3e4f2a507553d9063a20ed6", - "fixed_version": "5.10.105" - }, - "5.15": { - "cmt_id": "1dd5b4b230f6d1345708c6204ccacdf83d53feaf", - "fixed_version": "5.15.28" + "cmt_id": "00b68a7478343afdf83f30c43e64db5296057030", + "fixed_version": "5.10.37" }, - "5.16": { - "cmt_id": "0ba1ab25bb5057869621b340dbd411cca3242467", - "fixed_version": "5.16.14" + "5.11": { + "cmt_id": "940d01eceb3a7866fbfca136a55a5625fc75a565", + "fixed_version": "5.11.21" }, - "5.4": { - "cmt_id": "44d86dccd2a5f02a66c6784378d1429412d84bf0", - "fixed_version": "5.4.184" + "5.12": { + "cmt_id": "711acdf0228dc71601247f28b56f13e850e395c8", + "fixed_version": "5.12.4" } }, - "CVE-2022-23039": { - "4.14": { - "cmt_id": "a37eb077983e678bece23d4061fe5a6614f41354", - "fixed_version": "4.14.271" + "CVE-2021-47044": { + "5.10": { + "cmt_id": "80862cbf76c2646f709a57c4517aefe0b094c774", + "fixed_version": "5.10.37" }, - "4.19": { - "cmt_id": "fbc57368ea527dcfa909908fc47a851a56e4e5ce", - "fixed_version": "4.19.234" + "5.11": { + "cmt_id": "2f3eab368e313dba35fc2f51ede778bf7b030b54", + "fixed_version": "5.11.21" }, - "4.9": { - "cmt_id": "97b835c6de03a24db79d374b02d532f0b562fd38", - "fixed_version": "4.9.306" + "5.12": { + "cmt_id": "805cea93e66ca7deaaf6ad3b67224ce47c104c2f", + "fixed_version": "5.12.4" + } + }, + "CVE-2021-47045": { + "5.11": { + "cmt_id": "a09677de458d500b00701f6036baa423d9995408", + "fixed_version": "5.11.21" }, + "5.12": { + "cmt_id": "9bdcfbed2a9fe24d2c7eaa1bad7c705e18de8cc7", + "fixed_version": "5.12.4" + } + }, + "CVE-2021-47046": { "5.10": { - "cmt_id": "5f36ae75b847e7f87e4144602f418a624ca074b7", - "fixed_version": "5.10.105" - }, - "5.15": { - "cmt_id": "f06e3edaeac1942c4ff42072e3d98ee8c762c5fa", - "fixed_version": "5.15.28" + "cmt_id": "403c4528e5887af3deb9838cb77a557631d1e138", + "fixed_version": "5.10.37" }, - "5.16": { - "cmt_id": "3b72403eb1850f79deef77497763a6eb65654863", - "fixed_version": "5.16.14" + "5.11": { + "cmt_id": "6a58310d5d1e5b02d0fc9b393ba540c9367bced5", + "fixed_version": "5.11.21" }, - "5.4": { - "cmt_id": "d193785a4bc91c2b9e004d16d0c9ea5bc0a2f34d", - "fixed_version": "5.4.184" + "5.12": { + "cmt_id": "080bd41d6478a64edf96704fddcda52b1fd5fed7", + "fixed_version": "5.12.4" } }, - "CVE-2022-23040": { - "4.14": { - "cmt_id": "67d21d5bddef88c1977378e4aca2b9c6a4af9edc", - "fixed_version": "4.14.271" + "CVE-2021-47047": { + "5.10": { + "cmt_id": "5980a3b9c933408bc22b0e349b78c3ebd7cbf880", + "fixed_version": "5.10.37" }, - "4.19": { - "cmt_id": "8d521d960aef22781ff499e16899c30af899de8d", - "fixed_version": "4.19.234" - }, - "4.9": { - "cmt_id": "8f80d12f6946a6fe7c64bfc204c062a57f83c7f8", - "fixed_version": "4.9.306" + "5.11": { + "cmt_id": "c26c026eb496261dbc0adbf606cc81989cd2038c", + "fixed_version": "5.11.21" }, + "5.12": { + "cmt_id": "bad5a23cf2b477fa78b85fd392736dae09a1e818", + "fixed_version": "5.12.4" + } + }, + "CVE-2021-47048": { "5.10": { - "cmt_id": "5c600371b8fd02cbbb0eb83a9f664e3f0b75c28e", - "fixed_version": "5.10.105" - }, - "5.15": { - "cmt_id": "66cb2bbb522b0d5e4f6a11558ff7bfdf3f7d31f3", - "fixed_version": "5.15.28" + "cmt_id": "1231279389b5e638bc3b66b9741c94077aed4b5a", + "fixed_version": "5.10.37" }, - "5.16": { - "cmt_id": "69e581afd2eafd51df6d4a24ab488cb8863c2dcd", - "fixed_version": "5.16.14" + "5.11": { + "cmt_id": "d67e0d6bd92ebbb0294e7062bbf5cdc773764e62", + "fixed_version": "5.11.21" }, - "5.4": { - "cmt_id": "95ff82383266a7720d596eb8b4499ed01746a730", - "fixed_version": "5.4.184" + "5.12": { + "cmt_id": "23269ac9f123eca3aea7682d3345c02e71ed696c", + "fixed_version": "5.12.4" } }, - "CVE-2022-23041": { - "4.14": { - "cmt_id": "22fd4f3fc1cd37d3daa4462f3184b20adb9342f5", - "fixed_version": "4.14.271" + "CVE-2021-47049": { + "5.10": { + "cmt_id": "d5c7b42c9f56ca46b286daa537d181bd7f69214f", + "fixed_version": "5.10.37" }, - "4.19": { - "cmt_id": "2466bed361f3274e3e0ca9d8e539532481c06fea", - "fixed_version": "4.19.234" + "5.11": { + "cmt_id": "f37dd5d1b5d38a79a4f7b8dd7bbb705505f05560", + "fixed_version": "5.11.21" }, + "5.12": { + "cmt_id": "2728f289b3270b0e273292b46c534421a33bbfd5", + "fixed_version": "5.12.4" + } + }, + "CVE-2021-47050": { "5.10": { - "cmt_id": "8357d75bfdb85ea63253cf369f405830c7b13d78", - "fixed_version": "5.10.105" - }, - "5.15": { - "cmt_id": "a019d26830e8a04933e38e4fcc507dcfbc6ccc72", - "fixed_version": "5.15.28" + "cmt_id": "71bcc1b4a1743534d8abdcb57ff912e6bc390438", + "fixed_version": "5.10.37" }, - "5.16": { - "cmt_id": "d83dd50f3c23bc887e4c67d547e5a21a23fb8bb8", - "fixed_version": "5.16.14" + "5.11": { + "cmt_id": "e16acc3a37f09e18835dc5d8014942c2ef6ca957", + "fixed_version": "5.11.21" }, - "5.4": { - "cmt_id": "be63ea883e56aacf9326e581b53dff9ac087ace1", - "fixed_version": "5.4.184" + "5.12": { + "cmt_id": "a74cb41af7dbe019e4096171f8bc641c7ce910ad", + "fixed_version": "5.12.4" } }, - "CVE-2022-23042": { - "4.14": { - "cmt_id": "1b9f4115738af90427a8c94a3980bc52fbb23296", - "fixed_version": "4.14.271" + "CVE-2021-47051": { + "5.10": { + "cmt_id": "ce02e58ddf8658a4c3bed2296f32a5873b3f7cce", + "fixed_version": "5.10.37" }, - "4.19": { - "cmt_id": "c307029d811e03546d18d0e512fe295b3103b8e5", - "fixed_version": "4.19.234" + "5.11": { + "cmt_id": "b8207bfc539cd07d15e753ff2d179c5b61c673b1", + "fixed_version": "5.11.21" }, - "4.9": { - "cmt_id": "c4497b057b14274e159434f0ed70439a21f3d2a9", - "fixed_version": "4.9.306" + "5.12": { + "cmt_id": "6a2b5cee0d31ab6cc51030c441135b0e31217282", + "fixed_version": "5.12.4" }, + "5.4": { + "cmt_id": "4a01ad002d2e03c399af536562693752af7c81b1", + "fixed_version": "5.4.119" + } + }, + "CVE-2021-47052": { "5.10": { - "cmt_id": "206c8e271ba2630f1d809123945d9c428f93b0f0", - "fixed_version": "5.10.105" - }, - "5.15": { - "cmt_id": "dea18aef2021022a568f4d385a1386f51a9df6ff", - "fixed_version": "5.15.28" + "cmt_id": "0e596b3734649041ed77edc86a23c0442bbe062b", + "fixed_version": "5.10.37" }, - "5.16": { - "cmt_id": "34630641e955f23ae06db178822d99d0a9d89b20", - "fixed_version": "5.16.14" + "5.11": { + "cmt_id": "dfd6443bf49ac17adf882ca46c40c506a0284bd6", + "fixed_version": "5.11.21" }, - "5.4": { - "cmt_id": "0e35f3ab69bcb01fdbf5aadc78f1731778963b1c", - "fixed_version": "5.4.184" + "5.12": { + "cmt_id": "b7bd0657c2036add71981d88a7fae50188150b6e", + "fixed_version": "5.12.4" } }, - "CVE-2022-2308": { - "5.15": { - "cmt_id": "dc248ddf41eab4566e95b1ee2433c8a5134ad94a", - "fixed_version": "5.15.72" + "CVE-2021-47053": { + "5.10": { + "cmt_id": "2c67a9333da9d0a3b87310e0d116b7c9070c7b00", + "fixed_version": "5.10.37" }, - "5.19": { - "cmt_id": "38d854c4a11c3bbf6a96ea46f14b282670c784ac", - "fixed_version": "5.19.14" + "5.11": { + "cmt_id": "c633e025bd04f54d7b33331cfcdb71354b08ce59", + "fixed_version": "5.11.21" }, - "6.0": { - "cmt_id": "46f8a29272e51b6df7393d58fc5cb8967397ef2b", - "fixed_version": "6.0" + "5.12": { + "cmt_id": "d3d702084d125689edb2b9395c707e09b471352e", + "fixed_version": "5.12.4" } }, - "CVE-2022-2318": { + "CVE-2021-47054": { "4.14": { - "cmt_id": "597b3bbe230caca60c321eeb08de14b9bc4d47c0", - "fixed_version": "4.14.287" + "cmt_id": "94810fc52925eb122a922df7f9966cf3f4ba7391", + "fixed_version": "4.14.233" }, "4.19": { - "cmt_id": "2661f2d88f40e35791257d73def0319b4560b74b", - "fixed_version": "4.19.251" + "cmt_id": "a399dd80e697a02cfb23e2fc09b87849994043d9", + "fixed_version": "4.19.191" }, "4.9": { - "cmt_id": "3ab68a9528780870b84200bbd91efaa47a586a3c", - "fixed_version": "4.9.322" + "cmt_id": "a6191e91c10e50bd51db65a00e03d02b6b0cf8c4", + "fixed_version": "4.9.269" }, "5.10": { - "cmt_id": "8f74cb27c2b4872fd14bf046201fa7b36a46885e", - "fixed_version": "5.10.129" + "cmt_id": "00f6abd3509b1d70d0ab0fbe65ce5685cebed8be", + "fixed_version": "5.10.37" }, - "5.15": { - "cmt_id": "659d39545260100628d8a30020d09fb6bf63b915", - "fixed_version": "5.15.53" + "5.11": { + "cmt_id": "6b68c03dfc79cd95a58dfd03f91f6e82829a1b0c", + "fixed_version": "5.11.21" }, - "5.18": { - "cmt_id": "570b99c2e1508708c4a32a58f98071fbc3c2c351", - "fixed_version": "5.18.10" + "5.12": { + "cmt_id": "c6f8e0dc8da1cd78d640dee392071cc2326ec1b2", + "fixed_version": "5.12.4" }, "5.4": { - "cmt_id": "bb91556d2af066f8ca2e7fd8e334d652e731ee29", - "fixed_version": "5.4.204" + "cmt_id": "3a76ec28824c01b57aa1f0927841d75e4f167cb8", + "fixed_version": "5.4.119" } }, - "CVE-2022-23222": { - "5.15": { - "cmt_id": "8d38cde47a7e17b646401fa92d916503caa5375e", - "fixed_version": "5.15.37" + "CVE-2021-47055": { + "5.10": { + "cmt_id": "7b6552719c0ccbbea29dde4be141da54fdb5877e", + "fixed_version": "5.10.37" }, - "5.16": { - "cmt_id": "77459bc4d5e2c6f24db845780b4d9d60cf82d06a", - "fixed_version": "5.16.11" + "5.11": { + "cmt_id": "077259f5e777c3c8821f6b41dee709fcda27306b", + "fixed_version": "5.11.21" + }, + "5.12": { + "cmt_id": "a08799d3e8c8088640956237c183f83463c39668", + "fixed_version": "5.12.4" } }, - "CVE-2022-2380": { + "CVE-2021-47056": { "4.14": { - "cmt_id": "2a616cc4513217c850865482cbc0bc6e7188580c", - "fixed_version": "4.14.276" + "cmt_id": "446045cf682af12d9294765f6c46084b374b5654", + "fixed_version": "4.14.233" }, "4.19": { - "cmt_id": "1caa40af491dcfe17b3ae870a854388d8ea01984", - "fixed_version": "4.19.238" + "cmt_id": "09d16cee6285d37cc76311c29add6d97a7e4acda", + "fixed_version": "4.19.191" }, "4.9": { - "cmt_id": "e6766bb02614ad69218dcd849668524e46916e11", - "fixed_version": "4.9.311" + "cmt_id": "f4c4e07140687f42bfa40e091bb4a55d7960ce4d", + "fixed_version": "4.9.269" }, "5.10": { - "cmt_id": "72af8810922eb143ed4f116db246789ead2d8543", - "fixed_version": "5.10.110" - }, - "5.15": { - "cmt_id": "46cdbff26c88fd75dccbf28df1d07cbe18007eac", - "fixed_version": "5.15.33" + "cmt_id": "1f50392650ae794a1aea41c213c6a3e1c824413c", + "fixed_version": "5.10.37" }, - "5.16": { - "cmt_id": "34d986f6ee5f5ac48cd2b9e2d061196fd3c29d39", - "fixed_version": "5.16.19" + "5.11": { + "cmt_id": "20fd40fc6f2c2b41dc6f637f88d494b14e9c21f1", + "fixed_version": "5.11.21" }, - "5.17": { - "cmt_id": "e46779a5706941fb9cd6e0264427953eb77d7888", - "fixed_version": "5.17.2" + "5.12": { + "cmt_id": "1ea500ce6f7c9106e4a561d28e69215f3d451818", + "fixed_version": "5.12.4" }, "5.4": { - "cmt_id": "478154be3a8c21ff106310bb1037b1fc9d81dc62", - "fixed_version": "5.4.189" + "cmt_id": "05ec8192ee4bfdf2a8894a68350dac9f1a155fa6", + "fixed_version": "5.4.119" } }, - "CVE-2022-23816": { + "CVE-2021-47057": { "5.10": { - "cmt_id": "7070bbb66c5303117e4c7651711ea7daae4c64b5", - "fixed_version": "5.10.133" - }, - "5.15": { - "cmt_id": "ccb25d7db1a29bc251692be745b000e6f0754048", - "fixed_version": "5.15.57" + "cmt_id": "617ec35ed51f731a593ae7274228ef2cfc9cb781", + "fixed_version": "5.10.37" }, - "5.18": { - "cmt_id": "e492002673b03c636d2297fb869d68ae545c41c4", - "fixed_version": "5.18.14" + "5.11": { + "cmt_id": "e1f2d739849c3239df1ea3f97d40bade4b808410", + "fixed_version": "5.11.21" }, - "5.4": { - "cmt_id": "893cd858b09ca20c8c919db8dc5b009895626da3", - "fixed_version": "5.4.217" + "5.12": { + "cmt_id": "6516cb852d704ff8d615de1f93cd443a99736c3d", + "fixed_version": "5.12.4" } }, - "CVE-2022-23960": { - "4.14": { - "cmt_id": "2d44960d3edf9994998ff798ef618e666c4f0143", - "fixed_version": "4.14.271" + "CVE-2021-47058": { + "5.11": { + "cmt_id": "c764e375ae647832de1ee73d43a4bb3ef8a8f43d", + "fixed_version": "5.11.21" }, - "4.19": { - "cmt_id": "dc64af755099d1e51fd64e99fe3a59b75595814a", - "fixed_version": "4.19.234" + "5.12": { + "cmt_id": "b9e569ae1da3a113b3acee8703c94777fd20938a", + "fixed_version": "5.12.4" + } + }, + "CVE-2021-47059": { + "5.10": { + "cmt_id": "1f12aaf07f61122cf5074d29714ee26f8d44b0e7", + "fixed_version": "5.10.37" }, - "4.9": { - "cmt_id": "b24d4041cfb6dab83f9edf40573375bd1365e619", - "fixed_version": "4.9.306" + "5.11": { + "cmt_id": "ca065a93699f8cf3f42c60eefed73086007e928e", + "fixed_version": "5.11.21" }, + "5.12": { + "cmt_id": "50e7b39b808430ad49a637dc6fb72ca93b451b13", + "fixed_version": "5.12.4" + } + }, + "CVE-2021-47060": { "5.10": { - "cmt_id": "b7f1e73c4ddf2044530091e69114a5fc1a1229d0", - "fixed_version": "5.10.105" + "cmt_id": "2a20592baff59c5351c5200ec667e1a2aa22af85", + "fixed_version": "5.10.37" }, - "5.15": { - "cmt_id": "f02cab2bed1a3493a230e54d83ff117bc59f480e", - "fixed_version": "5.15.28" + "5.11": { + "cmt_id": "168e82f640ed1891a700bdb43e37da354b2ab63c", + "fixed_version": "5.11.21" }, - "5.16": { - "cmt_id": "f5eb0f1dcde4b7c2b5ee920ae53bcecaaba03947", - "fixed_version": "5.16.14" + "5.12": { + "cmt_id": "50cbad42bfea8c052b7ca590bd4126cdc898713c", + "fixed_version": "5.12.4" + } + }, + "CVE-2021-47061": { + "5.10": { + "cmt_id": "03c6cccedd3913006744faa252a4da5145299343", + "fixed_version": "5.10.37" }, - "5.4": { - "cmt_id": "fdfc0baf829dfb306a1ec45900d2cfbee265ae60", - "fixed_version": "5.4.184" + "5.11": { + "cmt_id": "4e899ca848636b37e9ac124bc1723862a7d7d927", + "fixed_version": "5.11.21" + }, + "5.12": { + "cmt_id": "30f46c6993731efb2a690c9197c0fd9ed425da2d", + "fixed_version": "5.12.4" } }, - "CVE-2022-24122": { - "5.15": { - "cmt_id": "348a8501e6029f9308ea7675edfa645b5e669c9e", - "fixed_version": "5.15.19" + "CVE-2021-47062": { + "5.11": { + "cmt_id": "bd0cced2ae93195668f983d443f7f17e8efd24d2", + "fixed_version": "5.11.21" + }, + "5.12": { + "cmt_id": "ba7bf5d6336aa9c0d977b161bfa420c56d46ee40", + "fixed_version": "5.12.4" } }, - "CVE-2022-24448": { - "4.14": { - "cmt_id": "516f348b759f6a92819820a3f56d678458e22cc8", - "fixed_version": "4.14.265" + "CVE-2021-47063": { + "5.10": { + "cmt_id": "ce450934a00cf896e648fde08d0bd1426653d7a2", + "fixed_version": "5.10.37" }, - "4.19": { - "cmt_id": "b00b4c6faad0f21e443fb1584f7a8ea222beb0de", - "fixed_version": "4.19.228" + "5.11": { + "cmt_id": "18149b420c9bd93c443e8d1f48a063d71d9f6aa1", + "fixed_version": "5.11.21" }, - "4.9": { - "cmt_id": "8788981e120694a82a3672e062fe4ea99446634a", - "fixed_version": "4.9.300" + "5.12": { + "cmt_id": "98d7d76a74e48ec3ddf2e23950adff7edcab9327", + "fixed_version": "5.12.4" + } + }, + "CVE-2021-47064": { + "5.10": { + "cmt_id": "9fa26701cd1fc4d932d431971efc5746325bdfce", + "fixed_version": "5.10.37" }, + "5.11": { + "cmt_id": "9b68ce2856dadc0e1cb6fd21fbeb850da49efd08", + "fixed_version": "5.11.21" + }, + "5.12": { + "cmt_id": "91b9548d413fda488ea853cd1b9f59b572db3a0c", + "fixed_version": "5.12.4" + } + }, + "CVE-2021-47065": { "5.10": { - "cmt_id": "ce8c552b88ca25d775ecd0a0fbef4e0e03de9ed2", - "fixed_version": "5.10.96" + "cmt_id": "95fb153c6027924cda3422120169d1890737f3a0", + "fixed_version": "5.10.37" }, - "5.15": { - "cmt_id": "4c36ca387af4a9b5d775e46a6cb9dc2d151bf057", - "fixed_version": "5.15.19" + "5.11": { + "cmt_id": "5f3dbced8eaa5c9ed7d6943f3fea99f235a6516a", + "fixed_version": "5.11.21" }, - "5.16": { - "cmt_id": "f0583af88e7dd413229ea5e670a0db36fdf34ba2", - "fixed_version": "5.16.5" + "5.12": { + "cmt_id": "9cd09722e18a08b6a3d68b8bccfac39ddc22434c", + "fixed_version": "5.12.4" }, "5.4": { - "cmt_id": "0dfacee40021dcc0a9aa991edd965addc04b9370", - "fixed_version": "5.4.176" + "cmt_id": "6b5aa0cf321c25f41e09a61c83ee4dc7ab9549cb", + "fixed_version": "5.4.119" } }, - "CVE-2022-24958": { - "4.14": { - "cmt_id": "6936d1097e9cb891e1daaa8aab1b9c080f5e59a2", - "fixed_version": "4.14.270" + "CVE-2021-47066": { + "5.10": { + "cmt_id": "cab2e8e5997b592fdb7d02cf2387b4b8e3057174", + "fixed_version": "5.10.37" }, - "4.19": { - "cmt_id": "70196d12856306a17ddc3eae0f022b9c1d748e52", - "fixed_version": "4.19.233" + "5.11": { + "cmt_id": "29ffa50f33de824b5491f8239c88c4a0efdd03af", + "fixed_version": "5.11.21" }, - "4.9": { - "cmt_id": "be1bb345f180482b0e57768d967ef020d7cba592", - "fixed_version": "4.9.305" + "5.12": { + "cmt_id": "53f8208e11abd6dde9480dfcb97fecdb1bc2ac18", + "fixed_version": "5.12.4" + } + }, + "CVE-2021-47067": { + "5.10": { + "cmt_id": "a1ad124c836816fac8bd5e461d36eaf33cee4e24", + "fixed_version": "5.10.37" + }, + "5.11": { + "cmt_id": "dc4452867200fa94589b382740952b58aa1c3e6c", + "fixed_version": "5.11.21" }, + "5.12": { + "cmt_id": "ff39adf5d31c72025bba799aec69c5c86d81d549", + "fixed_version": "5.12.4" + } + }, + "CVE-2021-47068": { + "5.12": { + "cmt_id": "18175fe17ae043a0b81e5d511f8817825784c299", + "fixed_version": "5.12.4" + } + }, + "CVE-2021-47069": { "5.10": { - "cmt_id": "c13159a588818a1d2cd6519f4d3b6f7e17a9ffbd", - "fixed_version": "5.10.104" + "cmt_id": "4528c0c323085e645b8765913b4a7fd42cf49b65", + "fixed_version": "5.10.40" }, - "5.15": { - "cmt_id": "07de9a494b5ae41b9253411a8e9576d7fceedcc3", - "fixed_version": "5.15.27" + "5.12": { + "cmt_id": "807fa14536b26803b858da878b643be72952a097", + "fixed_version": "5.12.7" + } + }, + "CVE-2021-47070": { + "5.12": { + "cmt_id": "5f59240cf25b2f7a0fdffc2701482a70310fec07", + "fixed_version": "5.12.7" + } + }, + "CVE-2021-47071": { + "5.10": { + "cmt_id": "d84b5e912212b05f6b5bde9f682046accfbe0354", + "fixed_version": "5.10.40" }, - "5.16": { - "cmt_id": "9e5c16b2a9812cd250f0de0b77391c2d63adf2f2", - "fixed_version": "5.16.13" + "5.12": { + "cmt_id": "53486c467e356e06aa37047c984fccd64d78c827", + "fixed_version": "5.12.7" }, "5.4": { - "cmt_id": "ba6fdd55b16677dcc1d7011270c140d2a37e5f35", - "fixed_version": "5.4.183" + "cmt_id": "cdd91637d4ef33e2be19a8e16e72e7d00c996d76", + "fixed_version": "5.4.122" } }, - "CVE-2022-24959": { + "CVE-2021-47072": { + "5.12": { + "cmt_id": "6d0924c5b742036b4f20a0ffdf2b6cf3f963f5f6", + "fixed_version": "5.12.7" + } + }, + "CVE-2021-47073": { "4.19": { - "cmt_id": "4bd197ce18329e3725fe3af5bd27daa4256d3ac7", - "fixed_version": "4.19.228" + "cmt_id": "75cfc833da4a2111106d4c134e93e0c7f41e35e7", + "fixed_version": "4.19.192" }, "5.10": { - "cmt_id": "729e54636b3ebefb77796702a5b1f1ed5586895e", - "fixed_version": "5.10.96" - }, - "5.15": { - "cmt_id": "0690c3943ed0fa76654e600eca38cde6a13c87ac", - "fixed_version": "5.15.19" + "cmt_id": "0cf036a0d325200e6c27b90908e51195bbc557b1", + "fixed_version": "5.10.40" }, - "5.16": { - "cmt_id": "deb0f02d08276d87212c1f19d9d919b13dc4c033", - "fixed_version": "5.16.5" + "5.12": { + "cmt_id": "8d746ea7c687bab060a2c05a35c449302406cd52", + "fixed_version": "5.12.7" }, "5.4": { - "cmt_id": "7afc09c8915b0735203ebcb8d766d7db37b794c0", - "fixed_version": "5.4.176" + "cmt_id": "6fa78a6b9a3beb676a010dc489c1257f7e432525", + "fixed_version": "5.4.122" } }, - "CVE-2022-2503": { - "4.14": { - "cmt_id": "388bc1e69663956f8cee43af3bd02bd3061d222d", - "fixed_version": "4.14.282" - }, - "4.19": { - "cmt_id": "6bff6107d1364c95109609c3fd680e6c8d7fa503", - "fixed_version": "4.19.246" - }, - "4.9": { - "cmt_id": "27798cca4e54fe9c390396c4cc655480f827bbd5", - "fixed_version": "4.9.317" - }, + "CVE-2021-47074": { "5.10": { - "cmt_id": "8df42bcd364cc3b41105215d841792aea787b133", - "fixed_version": "5.10.120" - }, - "5.15": { - "cmt_id": "69712b170237ec5979f168149cd31e851a465853", - "fixed_version": "5.15.45" + "cmt_id": "9c980795ccd77e8abec33dd6fe28dfe1c4083e65", + "fixed_version": "5.10.40" }, - "5.17": { - "cmt_id": "a40560bbf6228ecf754d45aa7b1c50b488fed519", - "fixed_version": "5.17.13" + "5.12": { + "cmt_id": "551ba08d4b7eb26f75758cdb9f15105b276517ad", + "fixed_version": "5.12.7" + } + }, + "CVE-2021-47075": { + "5.10": { + "cmt_id": "4720f29acb3fe67aa8aa71e6b675b079d193aaeb", + "fixed_version": "5.10.40" }, - "5.18": { - "cmt_id": "417c73db67ea7ad8f03dfd34c6b0bb5f54294fa9", - "fixed_version": "5.18.2" + "5.12": { + "cmt_id": "afb680ed7ecbb7fd66ddb43650e9b533fd8b4b9a", + "fixed_version": "5.12.7" + } + }, + "CVE-2021-47076": { + "5.12": { + "cmt_id": "abe31d25facdb9109fe2cf69890748295291570c", + "fixed_version": "5.12.7" + } + }, + "CVE-2021-47077": { + "5.10": { + "cmt_id": "a6362a737572f66051deb7637f3f77ddf7a4402f", + "fixed_version": "5.10.40" }, - "5.4": { - "cmt_id": "fd2f7e9984850a0162bfb6948b98ffac9fb5fa58", - "fixed_version": "5.4.197" + "5.12": { + "cmt_id": "11014efcec378bb0050a6cf08eaf375e3693400a", + "fixed_version": "5.12.7" } }, - "CVE-2022-25258": { + "CVE-2021-47078": { "4.14": { - "cmt_id": "c7ad83d561df15ac6043d3b0d783aee777cf1731", - "fixed_version": "4.14.267" + "cmt_id": "6a8086a42dfbf548a42bf2ae4faa291645c72c66", + "fixed_version": "4.14.234" }, "4.19": { - "cmt_id": "e5eb8d19aee115d8fb354d1eff1b8df700467164", - "fixed_version": "4.19.230" + "cmt_id": "f3783c415bf6d2ead3d7aa2c38802bbe10723646", + "fixed_version": "4.19.192" }, "4.9": { - "cmt_id": "f3bcd744b0bc8dcc6cdb3ac5be20f54aecfb78a4", - "fixed_version": "4.9.302" + "cmt_id": "c65391dd9f0a47617e96e38bd27e277cbe1c40b0", + "fixed_version": "4.9.270" }, "5.10": { - "cmt_id": "22ec1004728548598f4f5b4a079a7873409eacfd", - "fixed_version": "5.10.101" - }, - "5.15": { - "cmt_id": "3e33e5c67cb9ebd2b791b9a9fb2b71daacebd8d4", - "fixed_version": "5.15.24" + "cmt_id": "2ee4d79c364914989c80de382c0b1a7259a7e4b3", + "fixed_version": "5.10.40" }, - "5.16": { - "cmt_id": "8895017abfc76bbc223499b179919dd205047197", - "fixed_version": "5.16.10" + "5.12": { + "cmt_id": "03344e843ab6dd3b3f2cadfb65ed910590856c70", + "fixed_version": "5.12.7" }, "5.4": { - "cmt_id": "38fd68f55a7ef57fb9cc3102ac65d1ac474a1a18", - "fixed_version": "5.4.180" + "cmt_id": "a62225d951d77eb20208fed8fc199e0c9b1df08b", + "fixed_version": "5.4.122" } }, - "CVE-2022-25375": { - "4.14": { - "cmt_id": "4c22fbcef778badb00fb8bb9f409daa29811c175", - "fixed_version": "4.14.267" + "CVE-2021-47079": { + "5.12": { + "cmt_id": "beab753fe3b4e087411a850a64c6cd748544d8a1", + "fixed_version": "5.12.7" + } + }, + "CVE-2021-47080": { + "5.10": { + "cmt_id": "66ab7fcdac34b890017f04f391507ef5b2b89a13", + "fixed_version": "5.10.40" }, + "5.12": { + "cmt_id": "e6871b4270c05f8b212e7d98aee82b357972c80a", + "fixed_version": "5.12.7" + } + }, + "CVE-2021-47081": { + "5.12": { + "cmt_id": "b49f5af30b0e4064fbd91e83823a4bfcb2c7a3e7", + "fixed_version": "5.12.7" + } + }, + "CVE-2021-47082": { "4.19": { - "cmt_id": "db9aaa3026298d652e98f777bc0f5756e2455dda", - "fixed_version": "4.19.230" - }, - "4.9": { - "cmt_id": "ff0a90739925734c91c7e39befe3f4378e0c1369", - "fixed_version": "4.9.302" + "cmt_id": "8eb43d635950e27c29f1e9e49a23b31637f37757", + "fixed_version": "4.19.280" }, "5.10": { - "cmt_id": "fb4ff0f96de37c44236598e8b53fe43b1df36bf3", - "fixed_version": "5.10.101" + "cmt_id": "a01a4e9f5dc93335c716fa4023b1901956e8c904", + "fixed_version": "5.10.136" }, "5.15": { - "cmt_id": "2da3b0ab54fb7f4d7c5a82757246d0ee33a47197", - "fixed_version": "5.15.24" - }, - "5.16": { - "cmt_id": "2724ebafda0a8df08a9cb91557d33226bee80f7b", - "fixed_version": "5.16.10" + "cmt_id": "3cb5ae77799e8ed6ec3fec0b6b4cd07f01650cc5", + "fixed_version": "5.15.12" }, "5.4": { - "cmt_id": "c9e952871ae47af784b4aef0a77db02e557074d6", - "fixed_version": "5.4.180" + "cmt_id": "0c0e566f0387490d16f166808c72e9c772027681", + "fixed_version": "5.4.240" } }, - "CVE-2022-25636": { + "CVE-2021-47083": { "5.10": { - "cmt_id": "68f19845f580a1d3ac1ef40e95b0250804e046bb", - "fixed_version": "5.10.103" + "cmt_id": "441d3873664d170982922c5d2fc01fa89d9439ed", + "fixed_version": "5.10.89" }, "5.15": { - "cmt_id": "6c5d780469d6c3590729940e2be8a3bd66ea4814", - "fixed_version": "5.15.26" - }, - "5.16": { - "cmt_id": "6bff27caef1ee07a8b190f34cf32c99d6cc37a33", - "fixed_version": "5.16.12" + "cmt_id": "fb563baa3eb8e7a15f2cff3c2695e2cca0493e69", + "fixed_version": "5.15.12" }, "5.4": { - "cmt_id": "49c011a44edd14adb555dbcbaf757f52b1f2f748", - "fixed_version": "5.4.182" + "cmt_id": "f373298e1bf0c6ea097c0bcc558dc43ad53e421f", + "fixed_version": "5.4.169" } }, - "CVE-2022-2585": { - "5.10": { - "cmt_id": "541840859ace9c2ccebc32fa9e376c7bd3def490", - "fixed_version": "5.10.137" + "CVE-2021-47086": { + "4.14": { + "cmt_id": "311601f114859d586d5ef8833d60d3aa23282161", + "fixed_version": "4.14.260" }, - "5.15": { - "cmt_id": "9e255ed238fc67058df87b0388ad6d4b2ef3a2bd", - "fixed_version": "5.15.61" - }, - "5.18": { - "cmt_id": "e8cb6e8fd9890780f1bfcf5592889e1b879e779c", - "fixed_version": "5.18.18" + "4.19": { + "cmt_id": "982b6ba1ce626ef87e5c29f26f2401897554f235", + "fixed_version": "4.19.223" }, - "5.19": { - "cmt_id": "b2fc1723eb65abb83e00d5f011de670296af0b28", - "fixed_version": "5.19.2" - } - }, - "CVE-2022-2586": { - "4.14": { - "cmt_id": "4e0dbab570defe5b747578cbea8e07f9d0709bec", - "fixed_version": "4.14.316" + "4.4": { + "cmt_id": "0bbdd62ce9d44f3a22059b3d20a0df977d9f6d59", + "fixed_version": "4.4.297" }, - "4.19": { - "cmt_id": "77d3b5038b7462318f5183e2ad704b01d57215a2", - "fixed_version": "4.19.256" + "4.9": { + "cmt_id": "b10c7d745615a092a50c2e03ce70446d2bec2aca", + "fixed_version": "4.9.295" }, "5.10": { - "cmt_id": "1a4b18b1ff11ba26f9a852019d674fde9d1d1cff", - "fixed_version": "5.10.137" + "cmt_id": "52ad5da8e316fa11e3a50b3f089aa63e4089bf52", + "fixed_version": "5.10.89" }, "5.15": { - "cmt_id": "faafd9286f1355c76fe9ac3021c280297213330e", - "fixed_version": "5.15.61" - }, - "5.18": { - "cmt_id": "f4fa03410f7c5f5bd8f90e9c11e9a8c4b526ff6f", - "fixed_version": "5.18.18" - }, - "5.19": { - "cmt_id": "0d07039397527361850c554c192e749cfc879ea9", - "fixed_version": "5.19.2" + "cmt_id": "53ccdc73eedaf0e922c45b569b797d2796fbaafa", + "fixed_version": "5.15.12" }, "5.4": { - "cmt_id": "fab2f61cc3b0e441b1749f017cfee75f9bbaded7", - "fixed_version": "5.4.211" + "cmt_id": "48c76fc53582e7f13c1e0b11c916e503256c4d0b", + "fixed_version": "5.4.169" } }, - "CVE-2022-2588": { - "4.14": { - "cmt_id": "d0cce31f328fa10e7256f314e6e044e13cdf6814", - "fixed_version": "4.14.291" - }, - "4.19": { - "cmt_id": "73584dab72d0a826f286a45544305819b58f7b92", - "fixed_version": "4.19.256" - }, - "4.9": { - "cmt_id": "34a475425612bef345634202dda8dac91820b6c8", - "fixed_version": "4.9.326" - }, - "5.10": { - "cmt_id": "7018f03d97daf344e49b16200caf4363a1407cab", - "fixed_version": "5.10.137" - }, + "CVE-2021-47087": { "5.15": { - "cmt_id": "57bbb691a93bd39d0644c5c879b354232d0e0eed", - "fixed_version": "5.15.61" - }, - "5.18": { - "cmt_id": "e832c26e7edfa2ddbd2dcdd48016d13d747de6da", - "fixed_version": "5.18.18" - }, - "5.19": { - "cmt_id": "ee3f18d90e80e79449d575fa3e7a6b775e9fc35e", - "fixed_version": "5.19.2" - }, - "5.4": { - "cmt_id": "1fcd691cc2e7f808eca2e644adee1f1c6c1527fd", - "fixed_version": "5.4.211" + "cmt_id": "91e94e42f6fc49635f1a16d8ae3f79552bcfda29", + "fixed_version": "5.15.12" } }, - "CVE-2022-2590": { - "5.19": { - "cmt_id": "9def52eb10baab3b700858003d462fcf17d62873", - "fixed_version": "5.19.6" + "CVE-2021-47088": { + "5.15": { + "cmt_id": "330c6117a82c16a9a365a51cec5c9ab30b13245c", + "fixed_version": "5.15.12" } }, - "CVE-2022-2602": { + "CVE-2021-47089": { + "5.15": { + "cmt_id": "2f06c8293d27f6337f907042c602c9c953988c48", + "fixed_version": "5.15.12" + } + }, + "CVE-2021-47090": { "5.10": { - "cmt_id": "c378c479c5175833bb22ff71974cda47d7b05401", - "fixed_version": "5.10.150" + "cmt_id": "1f207076740101fed87074a6bc924dbe806f08a5", + "fixed_version": "5.10.89" }, "5.15": { - "cmt_id": "813d8fe5d30388f73a21d3a2bf46b0a1fd72498c", - "fixed_version": "5.15.75" - }, - "5.19": { - "cmt_id": "b4293c01ee0d0ecdd3cb5801e13f62271144667a", - "fixed_version": "5.19.17" - }, - "5.4": { - "cmt_id": "04df9719df1865f6770af9bc7880874af0e594b2", - "fixed_version": "5.4.220" - }, - "6.0": { - "cmt_id": "75e94c7e8859e58aadc15a98cc9704edff47d4f2", - "fixed_version": "6.0.3" + "cmt_id": "c691e7575eff76e563b0199c23ec46bd454f43e3", + "fixed_version": "5.15.12" } }, - "CVE-2022-26365": { - "4.14": { - "cmt_id": "44dc5bcac4b0ec4e876110a69ead25a9b130234b", - "fixed_version": "4.14.287" - }, - "4.19": { - "cmt_id": "f4a1391185e30c977bfe1648435c152f806211c7", - "fixed_version": "4.19.251" - }, - "4.9": { - "cmt_id": "4fbda9d1fc771b44e96ee4cea58f37d926010ffc", - "fixed_version": "4.9.322" - }, + "CVE-2021-47091": { "5.10": { - "cmt_id": "cfea428030be836d79a7690968232bb7fa4410f1", - "fixed_version": "5.10.129" + "cmt_id": "ac61b9c6c0549aaeb98194cf429d93c41bfe5f79", + "fixed_version": "5.10.89" }, "5.15": { - "cmt_id": "7ed65a4ad8fa9f40bc3979b32c54243d6a684ec9", - "fixed_version": "5.15.53" - }, - "5.18": { - "cmt_id": "62b5d188a270a25138a88c18409c596c1406b993", - "fixed_version": "5.18.10" - }, - "5.4": { - "cmt_id": "42112e8f94617d83943f8f3b8de2b66041905506", - "fixed_version": "5.4.204" + "cmt_id": "c1d1ec4db5f7264cfc21993e59e8f2dcecf4b44f", + "fixed_version": "5.15.12" } }, - "CVE-2022-26373": { - "4.14": { - "cmt_id": "7a4d2cba68731673c3ec89a1a5eee3a9af35ffa7", - "fixed_version": "4.14.297" - }, - "4.19": { - "cmt_id": "b6c5011934a15762cd694e36fe74f2f2f93eac9b", - "fixed_version": "4.19.255" - }, + "CVE-2021-47092": { + "5.15": { + "cmt_id": "e4e4e7cb229821cd215031abc47efdab5486a67c", + "fixed_version": "5.15.12" + } + }, + "CVE-2021-47093": { "5.10": { - "cmt_id": "509c2c9fe75ea7493eebbb6bb2f711f37530ae19", - "fixed_version": "5.10.136" + "cmt_id": "7a37f2e370699e2feca3dca6c8178c71ceee7e8a", + "fixed_version": "5.10.89" }, "5.15": { - "cmt_id": "7fcd99e889c0634f8275ae7a6b06aec4a22c8715", - "fixed_version": "5.15.60" - }, - "5.18": { - "cmt_id": "0abdbbd9ae9c81615836278d787a8c8dcd576c36", - "fixed_version": "5.18.17" - }, - "5.19": { - "cmt_id": "f826d0412d80348aa22274ec9884cab0950a350b", - "fixed_version": "5.19.1" - }, - "5.4": { - "cmt_id": "f2f41ef0352db9679bfae250d7a44b3113f3a3cc", - "fixed_version": "5.4.210" + "cmt_id": "9ca1324755f1f8629a370af5cc315b175331f5d1", + "fixed_version": "5.15.12" } }, - "CVE-2022-2639": { - "4.14": { - "cmt_id": "6cde4a87248e8d39fad5e5e72e104b6d74fcabef", - "fixed_version": "4.14.277" - }, - "4.19": { - "cmt_id": "bbbf059337f9a74285c1cf088ff85ee92d149e64", - "fixed_version": "4.19.240" - }, - "4.9": { - "cmt_id": "1aba176280dcd0eb08e291bc59ba6067df22af98", - "fixed_version": "4.9.312" - }, + "CVE-2021-47094": { + "5.15": { + "cmt_id": "d884eefd75cc54887bc2e9e724207443525dfb2c", + "fixed_version": "5.15.12" + } + }, + "CVE-2021-47095": { "5.10": { - "cmt_id": "0837ff17d052b7d755d5086208c3445867aaff82", - "fixed_version": "5.10.113" + "cmt_id": "1f6ab847461ce7dd89ae9db2dd4658c993355d7c", + "fixed_version": "5.10.89" }, "5.15": { - "cmt_id": "e411af98013dba5bce8118ee2b84bd1ad4c36b86", - "fixed_version": "5.15.36" - }, - "5.17": { - "cmt_id": "24f0f311a060fd333f821c4600afc054356ef23f", - "fixed_version": "5.17.5" + "cmt_id": "77a7311ca167aa5b7055c549a940a56e73ee5f29", + "fixed_version": "5.15.12" }, "5.4": { - "cmt_id": "aa70705560871725e963945a2d36ace7849c004e", - "fixed_version": "5.4.191" + "cmt_id": "8efd6a3391f7b0b19fb0c38e50add06ca30c94af", + "fixed_version": "5.4.169" } }, - "CVE-2022-26490": { - "4.14": { - "cmt_id": "d908d2776464a8021a1f63eba6e7417fbe7653c9", - "fixed_version": "4.14.274" - }, + "CVE-2021-47096": { + "5.15": { + "cmt_id": "b398fcbe4de1e1100867fdb6f447c6fbc8fe7085", + "fixed_version": "5.15.12" + } + }, + "CVE-2021-47097": { + "5.15": { + "cmt_id": "dfd5b60b5342b6b505a104e48f08ad9b9bdbbd7b", + "fixed_version": "5.15.12" + } + }, + "CVE-2021-47098": { + "5.15": { + "cmt_id": "d105f30bea9104c590a9e5b495cb8a49bdfe405f", + "fixed_version": "5.15.12" + } + }, + "CVE-2021-47099": { + "5.15": { + "cmt_id": "d2269ae48598e05b59ec9ea9e6e44fd33941130d", + "fixed_version": "5.15.12" + } + }, + "CVE-2021-47100": { "4.19": { - "cmt_id": "0043b74987acb44f1ade537aad901695511cfebe", - "fixed_version": "4.19.237" - }, - "4.9": { - "cmt_id": "c1184fa07428fb81371d5863e09795f0d06d35cf", - "fixed_version": "4.9.309" + "cmt_id": "925229d552724e1bba1abf01d3a0b1318539b012", + "fixed_version": "4.19.223" }, "5.10": { - "cmt_id": "25c23fe40e6e1ef8e6d503c52b4f518b2e520ab7", - "fixed_version": "5.10.109" + "cmt_id": "6809da5185141e61401da5b01896b79a4deed1ad", + "fixed_version": "5.10.89" }, "5.15": { - "cmt_id": "a34c47b1ab07153a047476de83581dc822287f39", - "fixed_version": "5.15.32" - }, - "5.16": { - "cmt_id": "0646efbb6e100a3f93eba3b6a10a7f4c28dd1478", - "fixed_version": "5.16.18" + "cmt_id": "6b3f7e4b10f343f05b5fb513b07a9168fbf1172e", + "fixed_version": "5.15.12" }, "5.4": { - "cmt_id": "0aef7184630b599493a0dcad4eec6d42b3e68e91", - "fixed_version": "5.4.188" + "cmt_id": "992649b8b16843d27eb39ceea5f9cf85ffb50a18", + "fixed_version": "5.4.169" } }, - "CVE-2022-2663": { + "CVE-2021-47101": { + "5.15": { + "cmt_id": "d259f621c85949f30cc578cac813b82bb5169f56", + "fixed_version": "5.15.12" + } + }, + "CVE-2021-47102": { + "5.15": { + "cmt_id": "5c553a0cd1263e4da5f220d80fa713fc3959c1d0", + "fixed_version": "5.15.12" + } + }, + "CVE-2021-47103": { "4.14": { - "cmt_id": "6ce66e3442a5989cbe56a6884384bf0b7d1d0725", - "fixed_version": "4.14.293" + "cmt_id": "92e6e36ecd16808866ac6172b9491b5097cde449", + "fixed_version": "4.14.296" }, "4.19": { - "cmt_id": "3275f7804f40de3c578d2253232349b07c25f146", - "fixed_version": "4.19.258" + "cmt_id": "75a578000ae5e511e5d0e8433c94a14d9c99c412", + "fixed_version": "4.19.262" }, "4.9": { - "cmt_id": "eb4d8d6b44a23ff2b6e2af06c8240de73dff8a7d", - "fixed_version": "4.9.328" + "cmt_id": "68c34ce11ef23328692aa35fa6aaafdd75913100", + "fixed_version": "4.9.331" }, "5.10": { - "cmt_id": "e12ce30fe593dd438c5b392290ad7316befc11ca", - "fixed_version": "5.10.143" + "cmt_id": "f039b43cbaea5e0700980c2f0052da05a70782e0", + "fixed_version": "5.10.150" }, "5.15": { - "cmt_id": "451c9ce1e2fc9b9e40303bef8e5a0dca1a923cc4", - "fixed_version": "5.15.68" - }, - "5.19": { - "cmt_id": "6cf0609154b2ce8d3ae160e7506ab316400a8d3d", - "fixed_version": "5.19.9" + "cmt_id": "0249a4b8a554f2eb6a27b62516fa50168584faa4", + "fixed_version": "5.15.12" }, "5.4": { - "cmt_id": "36f7b71f8ad8e4d224b45f7d6ecfeff63b091547", - "fixed_version": "5.4.213" + "cmt_id": "c3bb4a7e8cbc984e1cdac0fe6af60e880214ed6e", + "fixed_version": "5.4.220" } }, - "CVE-2022-26966": { - "4.14": { - "cmt_id": "fbc3c962b6eb42b1483d00d8ea28b61b9f2fff26", - "fixed_version": "4.14.269" + "CVE-2021-47104": { + "5.15": { + "cmt_id": "aefcc25f3a0cd28a87d11d41d30419a12cd26a34", + "fixed_version": "5.15.12" + } + }, + "CVE-2021-47105": { + "5.15": { + "cmt_id": "ad6d20da2cfbe14b7b1200d15f39e65988b0b9e8", + "fixed_version": "5.15.12" + } + }, + "CVE-2021-47106": { + "5.15": { + "cmt_id": "9d558e5f0d6fdd0a568f73dceb0b40c4f5012e5a", + "fixed_version": "5.15.12" + } + }, + "CVE-2021-47107": { + "5.15": { + "cmt_id": "eabc0aab98e5218ceecd82069b0d6fdfff5ee885", + "fixed_version": "5.15.12" + } + }, + "CVE-2021-47108": { + "5.15": { + "cmt_id": "71d07ebc5000b9c1d140e99e7493b0bafa954776", + "fixed_version": "5.15.12" + } + }, + "CVE-2021-47109": { + "5.10": { + "cmt_id": "d17d47da59f726dc4c87caebda3a50333d7e2fd3", + "fixed_version": "5.10.43" }, - "4.19": { - "cmt_id": "dde5ddf02a47487dd6efcc7077307f1d4e1ba337", - "fixed_version": "4.19.232" + "5.12": { + "cmt_id": "ddf088d7aaaaacfc836104f2e632b29b1d383cfc", + "fixed_version": "5.12.10" }, - "4.9": { - "cmt_id": "89260e0e191e8a3a9872f72836bdf0641853c87f", - "fixed_version": "4.9.304" + "5.4": { + "cmt_id": "d99029e6aab62aef0a0251588b2867e77e83b137", + "fixed_version": "5.4.125" + } + }, + "CVE-2021-47110": { + "5.10": { + "cmt_id": "3b0becf8b1ecf642a9edaf4c9628ffc641e490d6", + "fixed_version": "5.10.43" + }, + "5.12": { + "cmt_id": "1df2dc09926f61319116c80ee85701df33577d70", + "fixed_version": "5.12.10" }, + "5.4": { + "cmt_id": "9084fe1b3572664ad276f427dce575f580c9799a", + "fixed_version": "5.4.125" + } + }, + "CVE-2021-47111": { "5.10": { - "cmt_id": "4f5f5411f0c14ac0b61d5e6a77d996dd3d5b5fd3", - "fixed_version": "5.10.103" + "cmt_id": "6b53db8c4c14b4e7256f058d202908b54a7b85b4", + "fixed_version": "5.10.43" }, - "5.15": { - "cmt_id": "9f2d614779906f3d8ad4fb882c5b3e5ad6150bbe", - "fixed_version": "5.15.26" + "5.12": { + "cmt_id": "caec9bcaeb1a5f03f2d406305355c853af10c13e", + "fixed_version": "5.12.10" + } + }, + "CVE-2021-47112": { + "5.10": { + "cmt_id": "38b858da1c58ad46519a257764e059e663b59ff2", + "fixed_version": "5.10.43" }, - "5.16": { - "cmt_id": "639f72dce8667a3d601561e0e47d53ad999e7f8a", - "fixed_version": "5.16.12" + "5.12": { + "cmt_id": "d1629b5b925de9b27979e929dae7fcb766daf6b6", + "fixed_version": "5.12.10" }, "5.4": { - "cmt_id": "b95d71abeb7d31d4d51cd836d80f99fd783fd6d5", - "fixed_version": "5.4.182" + "cmt_id": "7620a669111b52f224d006dea9e1e688e2d62c54", + "fixed_version": "5.4.125" } }, - "CVE-2022-27223": { + "CVE-2021-47113": { + "5.10": { + "cmt_id": "0df50d47d17401f9f140dfbe752a65e5d72f9932", + "fixed_version": "5.10.43" + }, + "5.12": { + "cmt_id": "ff8de2cec65a8c8521faade12a31b39c80e49f5b", + "fixed_version": "5.12.10" + } + }, + "CVE-2021-47114": { "4.14": { - "cmt_id": "fdc22192d49fa577d8397b39f8ef8141cb1d62aa", - "fixed_version": "4.14.269" + "cmt_id": "a1700479524bb9cb5e8ae720236a6fabd003acae", + "fixed_version": "4.14.236" }, "4.19": { - "cmt_id": "ebc465e894890a534ce05e035eae4829a2a47ba1", - "fixed_version": "4.19.232" + "cmt_id": "cec4e857ffaa8c447f51cd8ab4e72350077b6770", + "fixed_version": "4.19.194" + }, + "4.4": { + "cmt_id": "624fa7baa3788dc9e57840ba5b94bc22b03cda57", + "fixed_version": "4.4.272" }, "4.9": { - "cmt_id": "958b6ab4d70bf991e8c90233504d4cb863aaef8a", - "fixed_version": "4.9.304" + "cmt_id": "33e03adafb29eedae1bae9cdb50c1385279fcf65", + "fixed_version": "4.9.272" }, "5.10": { - "cmt_id": "bfa8ffbaaaaf9752f66bc7cabcef2de715e7621f", - "fixed_version": "5.10.103" - }, - "5.15": { - "cmt_id": "2c775ad1fd5e014b35e483da2aab8400933fb09d", - "fixed_version": "5.15.26" + "cmt_id": "c8d5faee46242c3f33b8a71a4d7d52214785bfcc", + "fixed_version": "5.10.43" }, - "5.16": { - "cmt_id": "3221ef49ba18924e55a4d42a2ea4080cfea12c6c", - "fixed_version": "5.16.12" + "5.12": { + "cmt_id": "0a31dd6fd2f4e7db538fb6eb1f06973d81f8dd3b", + "fixed_version": "5.12.10" }, "5.4": { - "cmt_id": "6b23eda989236fd75b4a9893cc816cd690c29dfc", - "fixed_version": "5.4.182" + "cmt_id": "cc2edb99ea606a45182b5ea38cc8f4e583aa0774", + "fixed_version": "5.4.125" } }, - "CVE-2022-27666": { + "CVE-2021-47116": { + "5.10": { + "cmt_id": "2050c6e5b161e5e25ce3c420fef58b24fa388a49", + "fixed_version": "5.10.43" + }, + "5.12": { + "cmt_id": "04fb2baa0b147f51db065a1b13a11954abe592d0", + "fixed_version": "5.12.10" + } + }, + "CVE-2021-47117": { "4.14": { - "cmt_id": "2c8abafd6c72ef04bc972f40332c76c1dd04446d", - "fixed_version": "4.14.274" + "cmt_id": "d8116743ef5432336289256b2f7c117299213eb9", + "fixed_version": "4.14.236" }, "4.19": { - "cmt_id": "ce89087966651ad41e103770efc5ce2742046284", - "fixed_version": "4.19.237" + "cmt_id": "569496aa3776eea1ff0d49d0174ac1b7e861e107", + "fixed_version": "4.19.194" }, - "5.10": { - "cmt_id": "9248694dac20eda06e22d8503364dc9d03df4e2f", - "fixed_version": "5.10.108" + "4.4": { + "cmt_id": "e33bafad30d34cfa5e9787cb099cab05e2677fcb", + "fixed_version": "4.4.272" }, - "5.15": { - "cmt_id": "4aaabbffc3b0658ce80eebdde9bafa20a3f932e0", - "fixed_version": "5.15.29" + "4.9": { + "cmt_id": "5b3a9a2be59478b013a430ac57b0f3d65471b071", + "fixed_version": "4.9.272" }, - "5.16": { - "cmt_id": "9afe83f62aac348db1facb28bfc106109a06e44d", - "fixed_version": "5.16.15" + "5.10": { + "cmt_id": "d3b668b96ad3192c0581a248ae2f596cd054792a", + "fixed_version": "5.10.43" + }, + "5.12": { + "cmt_id": "48105dc98c9ca35af418746277b087cb2bc6df7c", + "fixed_version": "5.12.10" }, "5.4": { - "cmt_id": "fee4dfbda68ba10f3bbcf51c861d6aa32f08f9e4", - "fixed_version": "5.4.188" + "cmt_id": "920697b004e49cb026e2e15fe91be065bf0741b7", + "fixed_version": "5.4.125" } }, - "CVE-2022-27672": { - "5.15": { - "cmt_id": "8f12dcab90e886d0169a9cd372a8bb35339cfc19", - "fixed_version": "5.15.94" + "CVE-2021-47118": { + "4.14": { + "cmt_id": "4dbd8808a591b49b717862e6e0081bcf14a87788", + "fixed_version": "4.14.236" }, - "6.1": { - "cmt_id": "cc95b5d240b631e42e2863e1dcb6ad83920cc449", - "fixed_version": "6.1.12" + "4.19": { + "cmt_id": "d106f05432e60f9f62d456ef017687f5c73cb414", + "fixed_version": "4.19.194" }, - "6.2": { - "cmt_id": "be8de49bea505e7777a69ef63d60e02ac1712683", - "fixed_version": "6.2" + "4.4": { + "cmt_id": "764c2e892d1fe895392aff62fb353fdce43bb529", + "fixed_version": "4.4.272" + }, + "4.9": { + "cmt_id": "f86c80515a8a3703e0ca2e56deb50fc2879c5ea4", + "fixed_version": "4.9.272" + }, + "5.10": { + "cmt_id": "7178be006d495ffb741c329012da289b62dddfe6", + "fixed_version": "5.10.43" + }, + "5.12": { + "cmt_id": "b8ff869f20152fbe66b6c2e2715d26a2f9897cca", + "fixed_version": "5.12.10" + }, + "5.4": { + "cmt_id": "2cd6eedfa6344f5ef5c3dac3aee57a39b5b46dff", + "fixed_version": "5.4.125" } }, - "CVE-2022-2785": { - "5.19": { - "cmt_id": "b429d0b9a7a0f3dddb1f782b72629e6353f292fd", - "fixed_version": "5.19.4" + "CVE-2021-47119": { + "5.10": { + "cmt_id": "5e4f5138bd8522ebe231a137682d3857209a2c07", + "fixed_version": "5.10.51" + }, + "5.12": { + "cmt_id": "cecfdb9cf9a700d1037066173abac0617f6788df", + "fixed_version": "5.12.18" } }, - "CVE-2022-27950": { - "5.15": { - "cmt_id": "de0d102d0c8c681fc9a3263d842fb35f7cf662f4", - "fixed_version": "5.15.25" + "CVE-2021-47120": { + "5.10": { + "cmt_id": "b5d013c4c76b276890135b5d32803c4c63924b77", + "fixed_version": "5.10.43" }, - "5.16": { - "cmt_id": "80dad7483e3940dc9d9d55f8b34d1f4ba85a505e", - "fixed_version": "5.16.11" + "5.12": { + "cmt_id": "9cf27473f21913a3eaf4702dd2a25415afd5f33f", + "fixed_version": "5.12.10" + }, + "5.4": { + "cmt_id": "368c5d45a87e1bcc7f1e98e0c255c37b7b12c5d6", + "fixed_version": "5.4.125" } }, - "CVE-2022-28356": { + "CVE-2021-47121": { "4.14": { - "cmt_id": "0f294bc04be87f1c9e1d1a908db9fcc84ce94210", - "fixed_version": "4.14.274" + "cmt_id": "e8b37f5009ea7095529790f022859711e6939c76", + "fixed_version": "4.14.236" }, "4.19": { - "cmt_id": "d14193111c436fc5de33206c67c7afd45c730099", - "fixed_version": "4.19.237" + "cmt_id": "9ea0ab48e755d8f29fe89eb235fb86176fdb597f", + "fixed_version": "4.19.194" + }, + "4.4": { + "cmt_id": "cc302e30a504e6b60a9ac8df7988646f46cd0294", + "fixed_version": "4.4.272" }, "4.9": { - "cmt_id": "0a7aad979bfb43c4a78d33a5f356caf4ceb28bca", - "fixed_version": "4.9.309" + "cmt_id": "81afc61cb6e2b553f2c5f992fa79e0ae73857141", + "fixed_version": "4.9.272" }, "5.10": { - "cmt_id": "571df3393f523b59cba87e2f3e80a3a624030f9c", - "fixed_version": "5.10.109" - }, - "5.15": { - "cmt_id": "e9072996108387ab19b497f5b557c93f98d96b0b", - "fixed_version": "5.15.32" - }, - "5.16": { - "cmt_id": "6f5bf395c60ed2643de51f2b1041cb0882e9d97f", - "fixed_version": "5.16.18" + "cmt_id": "46403c1f80b0d3f937ff9c4f5edc63bb64bc5051", + "fixed_version": "5.10.43" }, - "5.17": { - "cmt_id": "ef1a6fe3563cf47ce4fd555727ca80085cf18884", - "fixed_version": "5.17.1" + "5.12": { + "cmt_id": "dde8686985ec24d6b00487080a906609bd613ea1", + "fixed_version": "5.12.10" }, "5.4": { - "cmt_id": "572f9a0d3f3feb8bd3422e88ad71882bc034b3ff", - "fixed_version": "5.4.188" + "cmt_id": "4d94f530cd24c85aede6e72b8923f371b45d6886", + "fixed_version": "5.4.125" } }, - "CVE-2022-28388": { + "CVE-2021-47122": { "4.14": { - "cmt_id": "a5e2259173eb52a728bbf32e02aa9a388451e614", - "fixed_version": "4.14.277" + "cmt_id": "4bca2034b41c15b62d47a19158bb76235fd4455d", + "fixed_version": "4.14.236" }, "4.19": { - "cmt_id": "8eb78da898079c0d7250c32ebf0c35fb81737abe", - "fixed_version": "4.19.240" + "cmt_id": "3be863c11cab725add9fef4237ed4e232c3fc3bb", + "fixed_version": "4.19.194" }, - "5.10": { - "cmt_id": "5318cdf4fd834856ce71238b064f35386f9ef528", - "fixed_version": "5.10.110" + "4.4": { + "cmt_id": "b042e2b2039565eb8f0eb51c14fbe1ef463c8cd8", + "fixed_version": "4.4.272" }, - "5.15": { - "cmt_id": "f2ce5238904f539648aaf56c5ee49e5eaf44d8fc", - "fixed_version": "5.15.33" + "4.9": { + "cmt_id": "9348c1f10932f13b299cbc8b1bd5f780751fae49", + "fixed_version": "4.9.272" }, - "5.16": { - "cmt_id": "3e006cf0fb809815d56e59c9de4486fbe253ccdf", - "fixed_version": "5.16.19" + "5.10": { + "cmt_id": "af2806345a37313f01b1c9f15e046745b8ee2daa", + "fixed_version": "5.10.43" }, - "5.17": { - "cmt_id": "29d6c06168faa23ce23db3321981c8fde576c95c", - "fixed_version": "5.17.2" + "5.12": { + "cmt_id": "6a0e317f61094d377335547e015dd2ff12caf893", + "fixed_version": "5.12.10" }, "5.4": { - "cmt_id": "660784e7194ac2953aebe874c1f75f2441ba3d19", - "fixed_version": "5.4.191" + "cmt_id": "f52f4fd67264c70cd0b4ba326962ebe12d9cba94", + "fixed_version": "5.4.125" } }, - "CVE-2022-28389": { - "4.14": { - "cmt_id": "cdced1015a63a7f100b5867ebb9a40271f891411", - "fixed_version": "4.14.276" - }, - "4.19": { - "cmt_id": "a8bba9fd73775e66b4021b18f2193f769ce48a59", - "fixed_version": "4.19.238" - }, + "CVE-2021-47123": { + "5.12": { + "cmt_id": "1f64f5e903b9d1d157875721e02adadc9d6f0a5d", + "fixed_version": "5.12.10" + } + }, + "CVE-2021-47124": { "5.10": { - "cmt_id": "0801a51d79389282c1271e623613b2e1886e071e", - "fixed_version": "5.10.110" - }, - "5.15": { - "cmt_id": "37f07ad24866c6c1423b37b131c9a42414bcf8a1", - "fixed_version": "5.15.33" + "cmt_id": "6f5d7a45f58d3abe3a936de1441b8d6318f978ff", + "fixed_version": "5.10.55" }, - "5.16": { - "cmt_id": "f913412848defa326a155c47d026267624472190", - "fixed_version": "5.16.19" + "5.12": { + "cmt_id": "ff4a96ba5c8f9b266706280ff8021d2ef3f17e86", + "fixed_version": "5.12.19" + } + }, + "CVE-2021-47125": { + "5.12": { + "cmt_id": "2411c02d03892a5057499f8102d0cc1e0f852416", + "fixed_version": "5.12.10" + } + }, + "CVE-2021-47126": { + "5.10": { + "cmt_id": "09870235827451409ff546b073d754a19fd17e2e", + "fixed_version": "5.10.43" }, - "5.17": { - "cmt_id": "42a4b0dfd365c4f77f96fd1f73a64b47ae443a38", - "fixed_version": "5.17.2" + "5.12": { + "cmt_id": "0a462e25ef0f7ab305081a08d435bbd1f13c0a94", + "fixed_version": "5.12.10" }, "5.4": { - "cmt_id": "2dfe9422d528630e2ce0d454147230cce113f814", - "fixed_version": "5.4.189" + "cmt_id": "7ba7fa78a92dc410b6f93ed73075ab669c3a0b59", + "fixed_version": "5.4.125" } }, - "CVE-2022-28390": { - "4.14": { - "cmt_id": "29d967c18737ce04f372831c4542e71da1a8d5c8", - "fixed_version": "4.14.276" - }, - "4.19": { - "cmt_id": "dec3ed0c76483748268bf36ec278af660b0f80ba", - "fixed_version": "4.19.238" - }, - "4.9": { - "cmt_id": "e9c4ee674586ff0b098d17638af719aa56c9c272", - "fixed_version": "4.9.311" - }, + "CVE-2021-47127": { + "5.12": { + "cmt_id": "1d34fa4fcf06649036ba0c97854fcf7a741ee18c", + "fixed_version": "5.12.10" + } + }, + "CVE-2021-47128": { "5.10": { - "cmt_id": "b417f9c50586588754b2b0453a1f99520cf7c0e8", - "fixed_version": "5.10.110" - }, - "5.15": { - "cmt_id": "459b19f42fd5e031e743dfa119f44aba0b62ff97", - "fixed_version": "5.15.33" + "cmt_id": "ff5039ec75c83d2ed5b781dc7733420ee8c985fc", + "fixed_version": "5.10.43" }, - "5.16": { - "cmt_id": "41f6be840f138c7d42312d7619a6b44c001d6b6e", - "fixed_version": "5.16.19" + "5.12": { + "cmt_id": "acc43fc6cf0d50612193813c5906a1ab9d433e1e", + "fixed_version": "5.12.10" + } + }, + "CVE-2021-47129": { + "5.10": { + "cmt_id": "5f3429c05e4028a0e241afdad856dd15dec2ffb9", + "fixed_version": "5.10.43" }, - "5.17": { - "cmt_id": "3f71f499395545119383f10760b8b19703d2a7dd", - "fixed_version": "5.17.2" + "5.12": { + "cmt_id": "2c0e6b35b88a961127066a1028bce9c727cbc3e5", + "fixed_version": "5.12.10" }, "5.4": { - "cmt_id": "e27caad38b59b5b00b9c5228d04c13111229deec", - "fixed_version": "5.4.189" + "cmt_id": "da8d31e80ff425f5a65dab7060d5c4aba749e562", + "fixed_version": "5.4.125" } }, - "CVE-2022-2873": { - "5.15": { - "cmt_id": "24c6fc6e7453f64cf6cbb4218c62aafdecc16ee1", - "fixed_version": "5.15.45" + "CVE-2021-47130": { + "5.10": { + "cmt_id": "c440cd080761b18a52cac20f2a42e5da1e3995af", + "fixed_version": "5.10.43" }, - "5.17": { - "cmt_id": "fc2f9ee7568609adb68b1f55f0a4c182b09a47e7", - "fixed_version": "5.17.13" + "5.12": { + "cmt_id": "8a452d62e7cea3c8a2676a3b89a9118755a1a271", + "fixed_version": "5.12.10" + } + }, + "CVE-2021-47131": { + "5.10": { + "cmt_id": "f1d4184f128dede82a59a841658ed40d4e6d3aa2", + "fixed_version": "5.10.43" }, - "5.18": { - "cmt_id": "2a81133304e8c10e6afa03e59f1b11beaccc7153", - "fixed_version": "5.18.2" + "5.12": { + "cmt_id": "0f1e6fe66977a864fe850522316f713d7b926fd9", + "fixed_version": "5.12.10" } }, - "CVE-2022-28796": { - "5.17": { - "cmt_id": "bff94c57bd130e3062afa94414c2294871314096", - "fixed_version": "5.17.1" + "CVE-2021-47132": { + "5.12": { + "cmt_id": "b9c78b1a95966a7bd2ddae05b73eafc0cda4fba3", + "fixed_version": "5.12.10" } }, - "CVE-2022-28893": { + "CVE-2021-47133": { + "5.12": { + "cmt_id": "29beadea66a226d744d5ffdcde6b984623053d24", + "fixed_version": "5.12.10" + } + }, + "CVE-2021-47134": { "5.10": { - "cmt_id": "e68b60ae29de10c7bd7636e227164a8dbe305a82", - "fixed_version": "5.10.117" + "cmt_id": "5148066edbdc89c6fe5bc419c31a5c22e5f83bdb", + "fixed_version": "5.10.43" }, - "5.15": { - "cmt_id": "54f6834b283d9b4d070b0639d9ef5e1d156fe7b0", - "fixed_version": "5.15.41" + "5.12": { + "cmt_id": "8a7e8b4e5631a03ea2fee27957857a56612108ca", + "fixed_version": "5.12.10" + } + }, + "CVE-2021-47135": { + "5.12": { + "cmt_id": "6919e8a24e70b6ba148fe07f44f835bcdd1a8d02", + "fixed_version": "5.12.10" + } + }, + "CVE-2021-47136": { + "5.10": { + "cmt_id": "ac493452e937b8939eaf2d24cac51a4804b6c20e", + "fixed_version": "5.10.42" }, - "5.16": { - "cmt_id": "7a0921a23cae42e9fa5ce964f6907181b6dc80d8", - "fixed_version": "5.16.20" + "5.12": { + "cmt_id": "86ab133b695ed7ba1f8786b12f4ca43137ad8c18", + "fixed_version": "5.12.9" + } + }, + "CVE-2021-47137": { + "5.10": { + "cmt_id": "5ac72351655f8b033a2935646f53b7465c903418", + "fixed_version": "5.10.42" }, - "5.17": { - "cmt_id": "d21287d8a4589dd8513038f887ece980fbc399cf", - "fixed_version": "5.17.3" + "5.12": { + "cmt_id": "46dd4abced3cb2c912916f4a5353e0927db0c4a2", + "fixed_version": "5.12.9" }, "5.4": { - "cmt_id": "2f8f6c393b11b5da059b1fc10a69fc2f2b6c446a", - "fixed_version": "5.4.196" + "cmt_id": "8bb1077448d43a871ed667520763e3b9f9b7975d", + "fixed_version": "5.4.124" } }, - "CVE-2022-2905": { + "CVE-2021-47138": { "5.10": { - "cmt_id": "e8979807178434db8ceaa84dfcd44363e71e50bb", - "fixed_version": "5.10.140" + "cmt_id": "02f03883fdb10ad7e66717c70ea163a8d27ae6e7", + "fixed_version": "5.10.42" }, - "5.15": { - "cmt_id": "4f672112f8665102a5842c170be1713f8ff95919", - "fixed_version": "5.15.64" + "5.12": { + "cmt_id": "285207a558ab456aa7d8aa877ecc7e91fcc51710", + "fixed_version": "5.12.9" }, - "5.19": { - "cmt_id": "a36df92c7ff7ecde2fb362241d0ab024dddd0597", - "fixed_version": "5.19.6" + "5.4": { + "cmt_id": "0bf49b3c8d8b3a43ce09f1b2db70e5484d31fcdf", + "fixed_version": "5.4.124" } }, - "CVE-2022-29156": { + "CVE-2021-47139": { "5.10": { - "cmt_id": "8260f1800f83e667f26c80baa7f0b9d92ae271d7", - "fixed_version": "5.10.103" - }, - "5.15": { - "cmt_id": "bf2cfad0c6e4b0d1b34d26420fddaf18dc25e56d", - "fixed_version": "5.15.26" + "cmt_id": "a663c1e418a3b5b8e8edfad4bc8e7278c312d6fc", + "fixed_version": "5.10.42" }, - "5.16": { - "cmt_id": "fa498059c631e94e91dcb6d78070909d8de56d99", - "fixed_version": "5.16.12" + "5.12": { + "cmt_id": "0921a0620b5077796fddffb22a8e6bc635a4bb50", + "fixed_version": "5.12.9" } }, - "CVE-2022-2938": { + "CVE-2021-47140": { + "5.12": { + "cmt_id": "f3f2cf46291a693eab21adb94171b0128c2a9ec1", + "fixed_version": "5.12.9" + } + }, + "CVE-2021-47141": { "5.10": { - "cmt_id": "d4e4e61d4a5b87bfc9953c306a11d35d869417fd", - "fixed_version": "5.10.97" - }, - "5.15": { - "cmt_id": "d3e4c61e143e69671803ef3f52140cf7a7258ee7", - "fixed_version": "5.15.19" + "cmt_id": "da21a35c00ff1a1794d4f166d3b3fa8db4d0f6fb", + "fixed_version": "5.10.42" }, - "5.16": { - "cmt_id": "991ced6a3a926e58df1f446819b9f2790e1c0daa", - "fixed_version": "5.16.5" + "5.12": { + "cmt_id": "5278c75266c5094d3c0958793bf12fc90300e580", + "fixed_version": "5.12.9" }, "5.4": { - "cmt_id": "2fd752ed77ab9880da927257b73294f29a199f1a", - "fixed_version": "5.4.177" + "cmt_id": "821149ee88c206fa37e79c1868cc270518484876", + "fixed_version": "5.4.124" } }, - "CVE-2022-29581": { + "CVE-2021-47142": { "4.14": { - "cmt_id": "0511cdd41a03ab396602dded4e778c5edcd8dcd1", - "fixed_version": "4.14.278" + "cmt_id": "952ab3f9f48eb0e8050596d41951cf516be6b122", + "fixed_version": "4.14.235" }, "4.19": { - "cmt_id": "75b0cc7904da7b40c6e8f2cf3ec4223b292b1184", - "fixed_version": "4.19.241" + "cmt_id": "a849e218556f932576c0fb1c5a88714b61709a17", + "fixed_version": "4.19.193" }, - "5.10": { - "cmt_id": "43ce33a68e2bcc431097e1075aad5393d0bf53ba", - "fixed_version": "5.10.113" + "4.4": { + "cmt_id": "0707c3fea8102d211631ba515ef2159707561b0d", + "fixed_version": "4.4.271" }, - "5.15": { - "cmt_id": "ba9e9a794fd1689bf7e8a7452c55f3d3cbda7728", - "fixed_version": "5.15.36" + "4.9": { + "cmt_id": "3293cf3513d69f00c14d43e2020826d45ea0e46a", + "fixed_version": "4.9.271" }, - "5.17": { - "cmt_id": "64c87076791198b23da730186b0c141d9a6ce80c", - "fixed_version": "5.17.5" + "5.10": { + "cmt_id": "f98cdf084405333ee2f5be548a91b2d168e49276", + "fixed_version": "5.10.42" + }, + "5.12": { + "cmt_id": "d4ea141fd4b40636a8326df5a377d9c5cf9b3faa", + "fixed_version": "5.12.9" }, "5.4": { - "cmt_id": "5a4f3eba211a532b2eb5045102ad3ceea5e9f0f9", - "fixed_version": "5.4.191" + "cmt_id": "7398c2aab4da960761ec182d04d6d5abbb4a226e", + "fixed_version": "5.4.124" } }, - "CVE-2022-29582": { + "CVE-2021-47143": { "5.10": { - "cmt_id": "2827328e646d0c2d3db1bfcad4b5f5016ce0d643", - "fixed_version": "5.10.111" - }, - "5.15": { - "cmt_id": "ba7261af2b030ab2c06189be1fc77b273716839f", - "fixed_version": "5.15.34" - }, - "5.16": { - "cmt_id": "d568c13d9d29d3151540a0d1b20c3a1ca801a662", - "fixed_version": "5.16.20" + "cmt_id": "8b2cdc004d21a7255f219706dca64411108f7897", + "fixed_version": "5.10.42" }, - "5.17": { - "cmt_id": "11cd7959400258beb1dc17c8680055966263f316", - "fixed_version": "5.17.3" + "5.12": { + "cmt_id": "40588782f1016c655ae1d302892f61d35af96842", + "fixed_version": "5.12.9" } }, - "CVE-2022-2959": { + "CVE-2021-47144": { + "4.19": { + "cmt_id": "599e5d61ace952b0bb9bd942b198bbd0cfded1d7", + "fixed_version": "4.19.193" + }, "5.10": { - "cmt_id": "8fbd54ab06c955d247c1a91d5d980cddc868f1e7", - "fixed_version": "5.10.120" + "cmt_id": "9fdb8ed37a3a44f9c49372b69f87fd5f61cb3240", + "fixed_version": "5.10.42" }, - "5.15": { - "cmt_id": "cf2fbc56c478a34a68ff1fa6ad08460054dfd499", - "fixed_version": "5.15.45" + "5.12": { + "cmt_id": "95a4ec905e51a30c64cf2d78b04a7acbeae5ca94", + "fixed_version": "5.12.9" }, - "5.17": { - "cmt_id": "f0d6abaa98060c6892e42f44f61b1938d923ac6d", - "fixed_version": "5.17.13" - }, - "5.18": { - "cmt_id": "71c603806614c6715165eed06099e24c2e41ad58", - "fixed_version": "5.18.2" + "5.4": { + "cmt_id": "dde2656e0bbb2ac7d83a7bd95a8d5c3c95bbc009", + "fixed_version": "5.4.124" } }, - "CVE-2022-2964": { + "CVE-2021-47145": { "4.14": { - "cmt_id": "63f0cfb36c1f1964a59ce544156677601e2d8740", - "fixed_version": "4.14.268" + "cmt_id": "0eaf383c6a4a83c09f60fd07a1bea9f1a9181611", + "fixed_version": "4.14.235" }, "4.19": { - "cmt_id": "1668781ed24da43498799aa4f65714a7de201930", - "fixed_version": "4.19.231" + "cmt_id": "6eccfb28f8dca70c9b1b3bb3194ca54cbe73a9fa", + "fixed_version": "4.19.193" + }, + "4.4": { + "cmt_id": "76bfd8ac20bebeae599452a03dfc5724c0475dcf", + "fixed_version": "4.4.271" }, "4.9": { - "cmt_id": "711b6bf3fb052f0a6b5b3205d50e30c0c2980382", - "fixed_version": "4.9.303" + "cmt_id": "e934c4ee17b33bafb0444f2f9766cda7166d3c40", + "fixed_version": "4.9.271" }, "5.10": { - "cmt_id": "758290defe93a865a2880d10c5d5abd288b64b5d", - "fixed_version": "5.10.101" - }, - "5.15": { - "cmt_id": "ffd0393adcdcefab7e131488e10dcfde5e02d6eb", - "fixed_version": "5.15.24" + "cmt_id": "7e13db503918820e6333811cdc6f151dcea5090a", + "fixed_version": "5.10.42" }, - "5.16": { - "cmt_id": "9681823f96a811268265f35307072ad80713c274", - "fixed_version": "5.16.10" + "5.12": { + "cmt_id": "b545442133580dcb2f2496133bf850824d41255c", + "fixed_version": "5.12.9" }, "5.4": { - "cmt_id": "a0fd5492ee769029a636f1fb521716b022b1423d", - "fixed_version": "5.4.180" + "cmt_id": "0ed102453aa1cd12fefde8f6b60b9519b0b1f003", + "fixed_version": "5.4.124" } }, - "CVE-2022-2977": { + "CVE-2021-47146": { "4.14": { - "cmt_id": "473a66f99cb8173c14138c5a5c69bfad04e8f9ac", - "fixed_version": "4.14.276" + "cmt_id": "221142038f36d9f28b64e83e954774da4d4ccd17", + "fixed_version": "4.14.235" }, "4.19": { - "cmt_id": "cb64bd038beacb4331fe464a36c8b5481e8f51e2", - "fixed_version": "4.19.238" + "cmt_id": "4b77ad9097067b31237eeeee0bf70f80849680a0", + "fixed_version": "4.19.193" }, - "5.10": { - "cmt_id": "290e05f346d1829e849662c97e42d5ad984f5258", - "fixed_version": "5.10.110" + "4.4": { + "cmt_id": "0e35b7457b7b6e73ffeaaca1a577fdf1af0feca1", + "fixed_version": "4.4.271" }, - "5.15": { - "cmt_id": "662893b4f6bd466ff9e1cd454c44c26d32d554fe", - "fixed_version": "5.15.33" + "4.9": { + "cmt_id": "17728616a4c85baf0edc975c60ba4e4157684d9a", + "fixed_version": "4.9.271" }, - "5.16": { - "cmt_id": "2f928c0d5c02dbab49e8c19d98725c822f6fc409", - "fixed_version": "5.16.19" + "5.10": { + "cmt_id": "beb39adb150f8f3b516ddf7c39835a9788704d23", + "fixed_version": "5.10.42" }, - "5.17": { - "cmt_id": "6e7baf84149fb43950631415de231b3a41915aa3", - "fixed_version": "5.17.1" + "5.12": { + "cmt_id": "a76fb9ba545289379acf409653ad5f74417be59c", + "fixed_version": "5.12.9" }, "5.4": { - "cmt_id": "a27ed2f3695baf15f9b34d2d7a1f9fc105539a81", - "fixed_version": "5.4.189" + "cmt_id": "37d697759958d111439080bab7e14d2b0e7b39f5", + "fixed_version": "5.4.124" } }, - "CVE-2022-2978": { + "CVE-2021-47147": { + "5.12": { + "cmt_id": "0e38e702f1152479e6afac34f151dbfd99417f99", + "fixed_version": "5.12.9" + } + }, + "CVE-2021-47148": { + "5.12": { + "cmt_id": "389146bc6d2bbb20714d06624b74856320ce40f7", + "fixed_version": "5.12.9" + } + }, + "CVE-2021-47149": { "4.14": { - "cmt_id": "c0aa76b0f17f59dd9c9d3463550a2986a1d592e4", - "fixed_version": "4.14.296" + "cmt_id": "c4f1c23edbe921ab2ecd6140d700e756cd44c5f7", + "fixed_version": "4.14.235" }, "4.19": { - "cmt_id": "ec2aab115eb38ac4992ea2fcc2a02fbe7af5cf48", - "fixed_version": "4.19.262" + "cmt_id": "7883d3895d0fbb0ba9bff0f8665f99974b45210f", + "fixed_version": "4.19.193" + }, + "4.4": { + "cmt_id": "b92170e209f7746ed72eaac98f2c2f4b9af734e6", + "fixed_version": "4.4.271" }, "4.9": { - "cmt_id": "d1ff475d7c83289d0a7faef346ea3bbf90818bad", - "fixed_version": "4.9.331" + "cmt_id": "6dbf1101594f7c76990b63c35b5a40205a914b6b", + "fixed_version": "4.9.271" }, "5.10": { - "cmt_id": "1e555c3ed1fce4b278aaebe18a64a934cece57d8", - "fixed_version": "5.10.148" - }, - "5.15": { - "cmt_id": "64b79e632869ad3ef6c098a4731d559381da1115", - "fixed_version": "5.15.73" + "cmt_id": "71723a796ab7881f491d663c6cd94b29be5fba50", + "fixed_version": "5.10.42" }, - "5.19": { - "cmt_id": "81de80330fa6907aec32eb54c5619059e6e36452", - "fixed_version": "5.19.15" + "5.12": { + "cmt_id": "f14bf57a08779a5dee9936f63ada0149ea89c5e6", + "fixed_version": "5.12.9" }, "5.4": { - "cmt_id": "70e4f70d54e0225f91814e8610477d65f33cefe4", - "fixed_version": "5.4.218" - }, - "6.0": { - "cmt_id": "2a96b532098284ecf8e4849b8b9e5fc7a28bdee9", - "fixed_version": "6.0.1" + "cmt_id": "22049c3d40f08facd1867548716a484dad6b3251", + "fixed_version": "5.4.124" } }, - "CVE-2022-29900": { - "5.10": { - "cmt_id": "7070bbb66c5303117e4c7651711ea7daae4c64b5", - "fixed_version": "5.10.133" + "CVE-2021-47150": { + "4.19": { + "cmt_id": "15102886bc8f5f29daaadf2d925591d564c17e9f", + "fixed_version": "4.19.193" }, - "5.15": { - "cmt_id": "ccb25d7db1a29bc251692be745b000e6f0754048", - "fixed_version": "5.15.57" + "5.10": { + "cmt_id": "8ee7ef4a57a9e1228b6f345aaa70aa8951c7e9cd", + "fixed_version": "5.10.42" }, - "5.18": { - "cmt_id": "e492002673b03c636d2297fb869d68ae545c41c4", - "fixed_version": "5.18.14" + "5.12": { + "cmt_id": "32a1777fd113335c3f70dc445dffee0ad1c6870f", + "fixed_version": "5.12.9" }, "5.4": { - "cmt_id": "893cd858b09ca20c8c919db8dc5b009895626da3", - "fixed_version": "5.4.217" + "cmt_id": "20255d41ac560397b6a07d8d87dcc5e2efc7672a", + "fixed_version": "5.4.124" } }, - "CVE-2022-29901": { + "CVE-2021-47151": { "5.10": { - "cmt_id": "7070bbb66c5303117e4c7651711ea7daae4c64b5", - "fixed_version": "5.10.133" - }, - "5.15": { - "cmt_id": "ccb25d7db1a29bc251692be745b000e6f0754048", - "fixed_version": "5.15.57" - }, - "5.18": { - "cmt_id": "e492002673b03c636d2297fb869d68ae545c41c4", - "fixed_version": "5.18.14" + "cmt_id": "4e3cea8035b6f1b9055e69cc6ebf9fa4e50763ae", + "fixed_version": "5.10.42" }, - "5.4": { - "cmt_id": "893cd858b09ca20c8c919db8dc5b009895626da3", - "fixed_version": "5.4.217" + "5.12": { + "cmt_id": "93d1dbe7043b3c9492bdf396b2e98a008435b55b", + "fixed_version": "5.12.9" } }, - "CVE-2022-29968": { - "5.17": { - "cmt_id": "77089e6ff273f43c42e99a690ae45ee39a6a62de", - "fixed_version": "5.17.6" + "CVE-2021-47152": { + "5.10": { + "cmt_id": "3267a061096efc91eda52c2a0c61ba76e46e4b34", + "fixed_version": "5.10.42" + }, + "5.12": { + "cmt_id": "18e7f0580da15cac1e79d73683ada5a9e70980f8", + "fixed_version": "5.12.9" } }, - "CVE-2022-3028": { + "CVE-2021-47153": { "4.14": { - "cmt_id": "f1b1b63e307478e93548f59e18bd844744b396d3", - "fixed_version": "4.14.292" + "cmt_id": "dfa8929e117b0228a7765f5c3f5988a4a028f3c6", + "fixed_version": "4.14.235" }, "4.19": { - "cmt_id": "7dbfc8f25f22fe2a64dd808266e00c8d2661ebdd", - "fixed_version": "4.19.257" + "cmt_id": "c70e1ba2e7e65255a0ce004f531dd90dada97a8c", + "fixed_version": "4.19.193" + }, + "4.4": { + "cmt_id": "f9469082126cebb7337db3992d143f5e4edfe629", + "fixed_version": "4.4.271" }, "4.9": { - "cmt_id": "e580d3201ed222c4752ced7e629ad96bc0340713", - "fixed_version": "4.9.327" + "cmt_id": "09c9e79f4c10cfb6b9e0e1b4dd355232e4b5a3b3", + "fixed_version": "4.9.271" }, "5.10": { - "cmt_id": "c5c4d4c9806dadac7bc82f9c29ef4e1b78894775", - "fixed_version": "5.10.140" - }, - "5.15": { - "cmt_id": "103bd319c0fc90f1cb013c3a508615e6df8af823", - "fixed_version": "5.15.64" + "cmt_id": "b523feb7e8e44652f92f3babb953a976e7ccbbef", + "fixed_version": "5.10.42" }, - "5.19": { - "cmt_id": "6901885656c029c976498290b52f67f2c251e6a0", - "fixed_version": "5.19.6" + "5.12": { + "cmt_id": "1f583d3813f204449037cd2acbfc09168171362a", + "fixed_version": "5.12.9" }, "5.4": { - "cmt_id": "8ee27a4f0f1ad36d430221842767880df6494147", - "fixed_version": "5.4.212" + "cmt_id": "04cc05e3716ae31b17ecdab7bc55c8170def1b8b", + "fixed_version": "5.4.124" } }, - "CVE-2022-30594": { - "4.14": { - "cmt_id": "f1442ed84c43610ca8ab77deb9ca991e7354746c", - "fixed_version": "4.14.276" + "CVE-2021-47158": { + "5.10": { + "cmt_id": "dd8609f203448ca6d58ae71461208b3f6b0329b0", + "fixed_version": "5.10.42" }, + "5.12": { + "cmt_id": "987e4ab8b8a4fcbf783069e03e7524cd39ffd563", + "fixed_version": "5.12.9" + } + }, + "CVE-2021-47159": { "4.19": { - "cmt_id": "b1f438f872dcda10a79e6aeaf06fd52dfb15a6ab", - "fixed_version": "4.19.238" - }, - "4.9": { - "cmt_id": "4f96b94a8342fac058117962f1a76fc7ebd1c245", - "fixed_version": "4.9.311" + "cmt_id": "0f2cb08c57edefb0e7b5045e0e3e9980a3d3aa37", + "fixed_version": "4.19.193" }, "5.10": { - "cmt_id": "5a41a3033a9344d7683340e3d83f5435ffb06501", - "fixed_version": "5.10.110" - }, - "5.15": { - "cmt_id": "b6d75218ff65f4d63c9cf4986f6c55666fb90a1a", - "fixed_version": "5.15.33" - }, - "5.16": { - "cmt_id": "c8248775c1b96b00b680e067f99f8feaaa7c7dbc", - "fixed_version": "5.16.19" + "cmt_id": "caff86f85512b8e0d9830e8b8b0dfe13c68ce5b6", + "fixed_version": "5.10.42" }, - "5.17": { - "cmt_id": "4d51bbc8a3799febf50471eb6888b1b58e87111e", - "fixed_version": "5.17.2" + "5.12": { + "cmt_id": "7b22466648a4f8e3e94f57ca428d1531866d1373", + "fixed_version": "5.12.9" }, "5.4": { - "cmt_id": "2458ecd21f29a3e5571d7d97764c043083deed5e", - "fixed_version": "5.4.189" + "cmt_id": "ce5355f140a7987011388c7e30c4f8fbe180d3e8", + "fixed_version": "5.4.124" } }, - "CVE-2022-3061": { + "CVE-2021-47160": { + "4.19": { + "cmt_id": "ae389812733b1b1e8e07fcc238e41db166b5c78d", + "fixed_version": "4.19.193" + }, "5.10": { - "cmt_id": "e00582a36198888ffe91ed6b097d86556c8bb253", - "fixed_version": "5.10.145" + "cmt_id": "b91117b66fe875723a4e79ec6263526fffdb44d2", + "fixed_version": "5.10.42" }, - "5.15": { - "cmt_id": "59b756da49bfa51a00a0b58b4147ce2652bc3d28", - "fixed_version": "5.15.70" + "5.12": { + "cmt_id": "82ae35b6c14feae5f216913d5b433e143c756d4e", + "fixed_version": "5.12.9" + }, + "5.4": { + "cmt_id": "4fe4e1f48ba119bdbc7c897c83b04ba0d08f5488", + "fixed_version": "5.4.124" } }, - "CVE-2022-3077": { - "5.15": { - "cmt_id": "24c6fc6e7453f64cf6cbb4218c62aafdecc16ee1", - "fixed_version": "5.15.45" + "CVE-2021-47161": { + "4.14": { + "cmt_id": "10a089bae827ec30ad9b6cb7048020a62fae0cfa", + "fixed_version": "4.14.241" }, - "5.17": { - "cmt_id": "fc2f9ee7568609adb68b1f55f0a4c182b09a47e7", - "fixed_version": "5.17.13" + "4.19": { + "cmt_id": "00450ed03a17143e2433b461a656ef9cd17c2f1d", + "fixed_version": "4.19.199" }, - "5.18": { - "cmt_id": "2a81133304e8c10e6afa03e59f1b11beaccc7153", - "fixed_version": "5.18.2" - } - }, - "CVE-2022-3078": { "5.10": { - "cmt_id": "663e7a72871f89f7a10cc8d7b2f17f27c64e071d", - "fixed_version": "5.10.110" + "cmt_id": "fe6921e3b8451a537e01c031b8212366bb386e3e", + "fixed_version": "5.10.42" }, - "5.15": { - "cmt_id": "9dd2fd7a1f84c947561af29424c5ddcecfcf2cbe", - "fixed_version": "5.15.33" + "5.12": { + "cmt_id": "12391be4724acc9269e1845ccbd881df37de4b56", + "fixed_version": "5.12.9" }, - "5.16": { - "cmt_id": "dd18f929458762f07b969d24d46e1d0a0d94c908", - "fixed_version": "5.16.19" - }, - "5.17": { - "cmt_id": "79d17521953d0a16f4df91be59a543a54d1d8c4a", - "fixed_version": "5.17.2" + "5.4": { + "cmt_id": "15d1cc4b4b585f9a2ce72c52cca004d5d735bdf1", + "fixed_version": "5.4.124" } }, - "CVE-2022-3104": { - "5.10": { - "cmt_id": "56ac04f35fc5dc8b5b67a1fa2f7204282aa887d5", - "fixed_version": "5.10.122" + "CVE-2021-47162": { + "4.14": { + "cmt_id": "436d650d374329a591c30339a91fa5078052ed1e", + "fixed_version": "4.14.235" }, - "5.15": { - "cmt_id": "1aeeca2b8397e3805c16a4ff26bf3cc8485f9853", - "fixed_version": "5.15.47" + "4.19": { + "cmt_id": "4b1761898861117c97066aea6c58f68a7787f0bf", + "fixed_version": "4.19.193" }, - "5.17": { - "cmt_id": "ec89c6200f8d94a86d57b2bb881fb079417f4901", - "fixed_version": "5.17.15" + "4.4": { + "cmt_id": "b2c8d28c34b3070407cb1741f9ba3f15d0284b8b", + "fixed_version": "4.4.271" }, - "5.18": { - "cmt_id": "ce12f7f6b19596edd6b250716930a4ce38bd1f96", - "fixed_version": "5.18.4" + "4.9": { + "cmt_id": "5489f30bb78ff0dafb4229a69632afc2ba20765c", + "fixed_version": "4.9.271" + }, + "5.10": { + "cmt_id": "6da24cfc83ba4f97ea44fc7ae9999a006101755c", + "fixed_version": "5.10.42" + }, + "5.12": { + "cmt_id": "ace300eecbccaa698e2b472843c74a5f33f7dce8", + "fixed_version": "5.12.9" + }, + "5.4": { + "cmt_id": "64d17ec9f1ded042c4b188d15734f33486ed9966", + "fixed_version": "5.4.124" } }, - "CVE-2022-3105": { + "CVE-2021-47163": { "5.10": { - "cmt_id": "16e5cad6eca1e506c38c39dc256298643fa1852a", - "fixed_version": "5.10.91" - }, - "5.15": { - "cmt_id": "0ea8bb0811ba0ec22903cbb48ff2cd872382e8d4", - "fixed_version": "5.15.14" + "cmt_id": "5195ec5e365a2a9331bfeb585b613a6e94f98dba", + "fixed_version": "5.10.42" }, - "5.16": { - "cmt_id": "7694a7de22c53a312ea98960fcafc6ec62046531", - "fixed_version": "5.16" + "5.12": { + "cmt_id": "b9f5b7ad4ac3af006443f535b1ce7bff1d130d7d", + "fixed_version": "5.12.9" }, "5.4": { - "cmt_id": "7646a340b25bb68cfb6d2e087a608802346d0f7b", - "fixed_version": "5.4.171" + "cmt_id": "d1f76dfadaf8f47ed1753f97dbcbd41c16215ffa", + "fixed_version": "5.4.124" } }, - "CVE-2022-3106": { + "CVE-2021-47164": { "5.10": { - "cmt_id": "734a3f3106053ee41cecae2a995b3d4d0c246764", - "fixed_version": "5.10.88" + "cmt_id": "2e4b0b95a489259f9d35a3db17023061f8f3d587", + "fixed_version": "5.10.42" }, - "5.15": { - "cmt_id": "9a77c02d1d2147a76bd187af1bf5a34242662d12", - "fixed_version": "5.15.11" + "5.12": { + "cmt_id": "bdfd3593a8248eea6ecfcbf7b47b56b86515672d", + "fixed_version": "5.12.9" } }, - "CVE-2022-3107": { + "CVE-2021-47165": { + "4.14": { + "cmt_id": "b4298d33c1fcce511ffe84d8d3de07e220300f9b", + "fixed_version": "4.14.235" + }, "4.19": { - "cmt_id": "a30c7c81db60f7f7ad52f75a4f7de5f628063df4", - "fixed_version": "4.19.236" + "cmt_id": "e256a0eb43e17209e347409a80805b1659398d68", + "fixed_version": "4.19.193" }, "5.10": { - "cmt_id": "9b763ceda6f8963cc99df5772540c54ba46ba37c", - "fixed_version": "5.10.108" - }, - "5.15": { - "cmt_id": "ab0ab176183191cffc69fe9dd8ac6c8db23f60d3", - "fixed_version": "5.15.31" - }, - "5.16": { - "cmt_id": "411e256ddf6c2295439c74f2176b0ed630c148f3", - "fixed_version": "5.16.17" + "cmt_id": "d66083c0d6f5125a4d982aa177dd71ab4cd3d212", + "fixed_version": "5.10.42" }, - "5.17": { - "cmt_id": "886e44c9298a6b428ae046e2fa092ca52e822e6a", - "fixed_version": "5.17" + "5.12": { + "cmt_id": "b4b91033a0b11fe9ade58156cd9168f89f4a8c1a", + "fixed_version": "5.12.9" }, "5.4": { - "cmt_id": "b01e2df5fbf68719dfb8e766c1ca6089234144c2", - "fixed_version": "5.4.187" - } - }, - "CVE-2022-3108": { - "5.15": { - "cmt_id": "5609b7803947eea1711516dd8659c7ed39f5a868", - "fixed_version": "5.15.27" - }, - "5.16": { - "cmt_id": "506c9632d77c0ae755fb66f5a0b8578c0b65a84b", - "fixed_version": "5.16.3" - } - }, - "CVE-2022-3110": { - "5.15": { - "cmt_id": "029983ea88e59f4c7dc0d56ade2b16d6b869bf94", - "fixed_version": "5.15.47" - }, - "5.17": { - "cmt_id": "8ae7bf782eacad803f752c83a183393b0a67127b", - "fixed_version": "5.17.15" - }, - "5.18": { - "cmt_id": "ba6c278b3364ceef05e63a93787fb01081e2b263", - "fixed_version": "5.18.4" + "cmt_id": "4ce2bf20b4a6e307e114847d60b2bf40a6a1fac0", + "fixed_version": "5.4.124" } }, - "CVE-2022-3111": { + "CVE-2021-47166": { "4.14": { - "cmt_id": "ae64b838bececea902b819a69731cb80cca8f31a", - "fixed_version": "4.14.276" + "cmt_id": "c757c1f1e65d89429db1409429436cf40d47c008", + "fixed_version": "4.14.235" }, "4.19": { - "cmt_id": "60dd1082322966f192f42fe2a6605dfa08eef41f", - "fixed_version": "4.19.238" + "cmt_id": "40f139a6d50c232c0d1fd1c5e65a845c62db0ede", + "fixed_version": "4.19.193" + }, + "4.4": { + "cmt_id": "e8b8418ce14ae66ee55179901edd12191ab06a9e", + "fixed_version": "4.4.271" }, "4.9": { - "cmt_id": "a6a3ec1626846fba62609330673a2dd5007d6a53", - "fixed_version": "4.9.311" + "cmt_id": "b291baae24f876acd5a5dd57d0bb2bbac8a68b0c", + "fixed_version": "4.9.271" }, "5.10": { - "cmt_id": "48d23ef90116c8c702bfa4cad93744e4e5588d7d", - "fixed_version": "5.10.110" - }, - "5.15": { - "cmt_id": "4124966fbd95eeecca26d52433f393e2b9649a33", - "fixed_version": "5.15.33" - }, - "5.16": { - "cmt_id": "ae07ec8110ba83295c88bff7e85835cc2f6cc4ea", - "fixed_version": "5.16.19" + "cmt_id": "7087db95c0a06ab201b8ebfac6a7ec1e34257997", + "fixed_version": "5.10.42" }, - "5.17": { - "cmt_id": "011ce263361608bb2a1a5cbcc0e3c53b1d7a41d7", - "fixed_version": "5.17.2" + "5.12": { + "cmt_id": "2fe1cac336b55a1f79e603e9ce3552c3623e90eb", + "fixed_version": "5.12.9" }, "5.4": { - "cmt_id": "90bec38f6a4c81814775c7f3dfc9acf281d5dcfa", - "fixed_version": "5.4.189" + "cmt_id": "785917316b25685c9b3a2a88f933139f2de75e33", + "fixed_version": "5.4.124" } }, - "CVE-2022-3112": { + "CVE-2021-47167": { "5.10": { - "cmt_id": "032b141a91a82a5f0107ce664a35b201e60c5ce1", - "fixed_version": "5.10.110" - }, - "5.15": { - "cmt_id": "b0b890dd8df3b9a2fe726826980b1cffe17b9679", - "fixed_version": "5.15.33" + "cmt_id": "ee21cd3aa8548e0cbc8c67a80b62113aedd2d101", + "fixed_version": "5.10.42" }, - "5.16": { - "cmt_id": "c316e6a49745b09025eed102e30cc1e9ba2910b2", - "fixed_version": "5.16.19" + "5.12": { + "cmt_id": "15ac6f14787649e8ebd75c142e2c5d2a243c8490", + "fixed_version": "5.12.9" }, - "5.17": { - "cmt_id": "879ab4096ebf996e97a768b8fd8acae4a736cce7", - "fixed_version": "5.17.2" + "5.4": { + "cmt_id": "1fc5f4eb9d31268ac3ce152d74ad5501ad24ca3e", + "fixed_version": "5.4.124" } }, - "CVE-2022-3113": { - "5.10": { - "cmt_id": "bc2573abc691a269b54a6c14a2660f26d88876a5", - "fixed_version": "5.10.110" + "CVE-2021-47168": { + "4.14": { + "cmt_id": "f299522eda1566cbfbae4b15c82970fc41b03714", + "fixed_version": "4.14.235" }, - "5.15": { - "cmt_id": "0022dc8cafa5fcd156da8ae7bfc9ca99497bdffc", - "fixed_version": "5.15.33" + "4.19": { + "cmt_id": "945ebef997227ca8c20bad7f8a8358c8ee57a84a", + "fixed_version": "4.19.193" }, - "5.16": { - "cmt_id": "cbdabb48be7b76d2a61a3554745243e37d81599e", - "fixed_version": "5.16.19" + "4.4": { + "cmt_id": "9d280ab53df1d4a1043bd7a9e7c6a2f9cfbfe040", + "fixed_version": "4.4.271" }, - "5.17": { - "cmt_id": "0aeb244eb2fddbbc34f2227cf3fd85c86e111c9a", - "fixed_version": "5.17.2" + "4.9": { + "cmt_id": "b287521e9e94bb342ebe5fd8c3fd7db9aef4e6f1", + "fixed_version": "4.9.271" + }, + "5.10": { + "cmt_id": "9b367fe770b1b80d7bf64ed0d177544a44405f6e", + "fixed_version": "5.10.42" + }, + "5.12": { + "cmt_id": "d34fb628f6ef522f996205a9e578216bbee09e84", + "fixed_version": "5.12.9" + }, + "5.4": { + "cmt_id": "e411df81cd862ef3d5b878120b2a2fef0ca9cdb1", + "fixed_version": "5.4.124" } }, - "CVE-2022-3115": { - "5.10": { - "cmt_id": "b4c7dd0037e6aeecad9b947b30f0d9eaeda11762", - "fixed_version": "5.10.121" + "CVE-2021-47169": { + "4.14": { + "cmt_id": "1cc57cb32c84e059bd158494f746b665fc14d1b1", + "fixed_version": "4.14.235" }, - "5.15": { - "cmt_id": "4cb37f715f601cee5b026c6f9091a466266b5ba5", - "fixed_version": "5.15.46" + "4.19": { + "cmt_id": "35265552c7fe9553c75e324c80f45e28ff14eb6e", + "fixed_version": "4.19.193" }, - "5.17": { - "cmt_id": "9d091187844de5c884939bfae7421813941f6de1", - "fixed_version": "5.17.14" + "4.4": { + "cmt_id": "1e04d5d5fe5e76af68f834e1941fcbfa439653be", + "fixed_version": "4.4.271" }, - "5.18": { - "cmt_id": "4b60c5f398da8438c4bd2a0f3c1e7d84b1cf65ba", - "fixed_version": "5.18.3" + "4.9": { + "cmt_id": "c697244ce940ec07e2d745ccb63ca97fc0266fbc", + "fixed_version": "4.9.271" + }, + "5.10": { + "cmt_id": "6a931ceb0b9401fe18d0c500e08164bf9cc7be4b", + "fixed_version": "5.10.42" + }, + "5.12": { + "cmt_id": "9b07b6973f7359e2dd6a9fe6db0c142634c823b7", + "fixed_version": "5.12.9" }, "5.4": { - "cmt_id": "fa0d7ba25a53ac2e4bb24ef31aec49ff3578b44f", - "fixed_version": "5.4.198" + "cmt_id": "915452f40e2f495e187276c4407a4f567ec2307e", + "fixed_version": "5.4.124" } }, - "CVE-2022-3169": { + "CVE-2021-47170": { + "4.19": { + "cmt_id": "2ab21d6e1411999b5fb43434f421f00bf50002eb", + "fixed_version": "4.19.193" + }, "5.10": { - "cmt_id": "023435a095d22bcbbaeea7e3a8c534b5c57d0d82", - "fixed_version": "5.10.156" + "cmt_id": "8d83f109e920d2776991fa142bb904d985dca2ed", + "fixed_version": "5.10.42" }, - "5.15": { - "cmt_id": "b1a27b2aad936746e6ef64c8a24bcb6dce6f926a", - "fixed_version": "5.15.80" + "5.12": { + "cmt_id": "9f7cb3f01a10d9064cf13b3d26fb7e7a5827d098", + "fixed_version": "5.12.9" }, "5.4": { - "cmt_id": "99c59256ea00ff7fab4914bb38e10a84850de514", - "fixed_version": "5.4.226" - }, - "6.0": { - "cmt_id": "0c2b1c56252bf19d3412137073c2c07e86f40ba1", - "fixed_version": "6.0.10" - } - }, - "CVE-2022-3176": { - "5.15": { - "cmt_id": "e9d7ca0c4640cbebe6840ee3bac66a25a9bacaf5", - "fixed_version": "5.15.65" + "cmt_id": "2c835fede13e03f2743a333e4370b5ed2db91e83", + "fixed_version": "5.4.124" } }, - "CVE-2022-3202": { + "CVE-2021-47171": { "4.14": { - "cmt_id": "33bd243566a9b1ca94261dcc2e16c7b9e3a71c15", - "fixed_version": "4.14.276" + "cmt_id": "9e6b8c1ff9d997e1fa16cbd2d60739adf6dc1bbc", + "fixed_version": "4.14.235" }, "4.19": { - "cmt_id": "2ef74e3e0089b6615ee124e1183746974c6bb561", - "fixed_version": "4.19.238" + "cmt_id": "9e6a3eccb28779710cbbafc4f4258d92509c6d07", + "fixed_version": "4.19.193" + }, + "4.4": { + "cmt_id": "200dbfcad8011e50c3cec269ed7b980836eeb1fa", + "fixed_version": "4.4.271" }, "4.9": { - "cmt_id": "d2e45f0bc25da09efcac658d6e405115fcfa83c2", - "fixed_version": "4.9.311" + "cmt_id": "22c840596af0c09068b6cf948616e6496e59e07f", + "fixed_version": "4.9.271" }, "5.10": { - "cmt_id": "b9c5ac0a15f24d63b20f899072fa6dd8c93af136", - "fixed_version": "5.10.111" + "cmt_id": "635ac38b36255d3cfb8312cf7c471334f4d537e0", + "fixed_version": "5.10.42" }, - "5.15": { - "cmt_id": "d925b7e78b62805fcc5440d1521181c82b6f03cb", - "fixed_version": "5.15.34" + "5.12": { + "cmt_id": "70c886ac93f87ae7214a0c69151a28a8075dd95b", + "fixed_version": "5.12.9" }, - "5.16": { - "cmt_id": "ffe1d40aec3f6f8cc620369ba07eb5e9bd449d85", - "fixed_version": "5.16.20" + "5.4": { + "cmt_id": "b95fb96e6339e34694dd578fb6bde3575b01af17", + "fixed_version": "5.4.124" + } + }, + "CVE-2021-47172": { + "5.10": { + "cmt_id": "f70122825076117787b91e7f219e21c09f11a5b9", + "fixed_version": "5.10.42" }, - "5.17": { - "cmt_id": "2e0e1de4f7a17e0886524c1d6701b8e2bf5a7363", - "fixed_version": "5.17.3" + "5.12": { + "cmt_id": "26da8040eccc6c6b0e415e9a3baf72fd39eb2fdc", + "fixed_version": "5.12.9" }, "5.4": { - "cmt_id": "e19c3149a80e4fc8df298d6546640e01601f3758", - "fixed_version": "5.4.189" + "cmt_id": "f49149964d2423fb618fb6b755bb1eaa431cca2c", + "fixed_version": "5.4.124" } }, - "CVE-2022-32250": { + "CVE-2021-47173": { "4.14": { - "cmt_id": "5b732a9e8e22395d911b3e6c343cbed0e1cec275", - "fixed_version": "4.14.283" + "cmt_id": "bcb30cc8f8befcbdbcf7a016e4dfd4747c54a364", + "fixed_version": "4.14.235" }, "4.19": { - "cmt_id": "ed44398b45add3d9be56b7457cc9e05282e518b4", - "fixed_version": "4.19.247" + "cmt_id": "386918878ce4cd676e4607233866e03c9399a46a", + "fixed_version": "4.19.193" + }, + "4.4": { + "cmt_id": "5f46b2410db2c8f26b8bb91b40deebf4ec184391", + "fixed_version": "4.4.271" }, "4.9": { - "cmt_id": "94e9b75919619ba8c4072abc4917011a7a888a79", - "fixed_version": "4.9.318" + "cmt_id": "7889c70e6173ef358f3cd7578db127a489035a42", + "fixed_version": "4.9.271" }, "5.10": { - "cmt_id": "ea62d169b6e731e0b54abda1d692406f6bc6a696", - "fixed_version": "5.10.120" - }, - "5.15": { - "cmt_id": "f692bcffd1f2ce5488d24fbcb8eab5f351abf79d", - "fixed_version": "5.15.45" - }, - "5.17": { - "cmt_id": "d8db0465bcc4d4b54ecfb67b820ed26eb1440da7", - "fixed_version": "5.17.13" + "cmt_id": "5394ae9d8c7961dd93807fdf1b12a1dde96b0a55", + "fixed_version": "5.10.42" }, - "5.18": { - "cmt_id": "8f44c83e51b4ca49c815f8dd0d9c38f497cdbcb0", - "fixed_version": "5.18.2" + "5.12": { + "cmt_id": "a3c3face38cb49932c62adcc1289914f1c742096", + "fixed_version": "5.12.9" }, "5.4": { - "cmt_id": "f36736fbd48491a8d85cd22f4740d542c5a1546e", - "fixed_version": "5.4.198" + "cmt_id": "36b5ff1db1a4ef4fdbc2bae364344279f033ad88", + "fixed_version": "5.4.124" } }, - "CVE-2022-32296": { - "4.14": { - "cmt_id": "9044e70fadec49482c3cb3c2f49e81825796ea6d", - "fixed_version": "4.14.285" - }, - "4.19": { - "cmt_id": "514cd2859c5017fdc487165b093b328e24afe954", - "fixed_version": "4.19.249" - }, - "4.9": { - "cmt_id": "3c78eea640f69e2198b69128173e6d65a0bcdc02", - "fixed_version": "4.9.320" - }, + "CVE-2021-47174": { "5.10": { - "cmt_id": "9429b75bc271b6f29e50dbb0ee0751800ff87dd9", - "fixed_version": "5.10.125" - }, - "5.15": { - "cmt_id": "952a238d779eea4ecb2f8deb5004c8f56be79bc9", - "fixed_version": "5.15.41" + "cmt_id": "b1f45a26bd322525c14edd9504f6d46dfad679a4", + "fixed_version": "5.10.42" }, - "5.17": { - "cmt_id": "e3ee7bb47d6509c3e8a3e96e5d8e3bf21549b6e8", - "fixed_version": "5.17.9" + "5.12": { + "cmt_id": "727a2b4fc951ee69847d4904d98961856ea9fbe6", + "fixed_version": "5.12.9" + } + }, + "CVE-2021-47175": { + "5.10": { + "cmt_id": "e6294c06e7c62ffdd5bf3df696d3a4fcbb753d3c", + "fixed_version": "5.10.42" }, - "5.4": { - "cmt_id": "c26e1addf15763ae404f4bbf131719a724e768ab", - "fixed_version": "5.4.201" + "5.12": { + "cmt_id": "7a1bdec12e43e29cc34a4394590337069d8812ce", + "fixed_version": "5.12.9" } }, - "CVE-2022-3239": { + "CVE-2021-47176": { + "5.12": { + "cmt_id": "a16be88a3d7e5efcb59a15edea87a8bd369630c6", + "fixed_version": "5.12.9" + } + }, + "CVE-2021-47177": { "4.14": { - "cmt_id": "1f6ab281f218c3a2b789eb976c5b1ef67139680a", - "fixed_version": "4.14.295" + "cmt_id": "22da9f4978381a99f1abaeaf6c9b83be6ab5ddd8", + "fixed_version": "4.14.235" }, "4.19": { - "cmt_id": "0113fa98a49a8e46a19b0ad80f29c904c6feec23", - "fixed_version": "4.19.238" + "cmt_id": "2ec5e9bb6b0560c90d315559c28a99723c80b996", + "fixed_version": "4.19.193" }, "5.10": { - "cmt_id": "ec8a37b2d9a76a9443feb0af95bd06ac3df25444", - "fixed_version": "5.10.110" - }, - "5.15": { - "cmt_id": "332d45fe51d75a3a95c4a04e2cb7bffef284edd4", - "fixed_version": "5.15.33" - }, - "5.16": { - "cmt_id": "37f808a9e734e9036f7aa42ba4864fc6e91d2572", - "fixed_version": "5.16.19" + "cmt_id": "f01134321d04f47c718bb41b799bcdeda27873d2", + "fixed_version": "5.10.42" }, - "5.17": { - "cmt_id": "d96dd287ca21c5b494bdb55555b33a6afec807cb", - "fixed_version": "5.17.2" + "5.12": { + "cmt_id": "ca466561eef36d1ec657673e3944eb6340bddb5b", + "fixed_version": "5.12.9" }, "5.4": { - "cmt_id": "92f84aa82dfaa8382785874277b0c4bedec89a68", - "fixed_version": "5.4.189" + "cmt_id": "044bbe8b92ab4e542de7f6c93c88ea65cccd8e29", + "fixed_version": "5.4.124" } }, - "CVE-2022-32981": { + "CVE-2021-47178": { + "5.12": { + "cmt_id": "a20b6eaf4f35046a429cde57bee7eb5f13d6857f", + "fixed_version": "5.12.9" + } + }, + "CVE-2021-47179": { "4.14": { - "cmt_id": "d13c94c4b6f816e79b8e4df193db1bdcc7253610", - "fixed_version": "4.14.283" + "cmt_id": "42637ca25c7d7b5a92804a679af5192e8c1a9f48", + "fixed_version": "4.14.235" }, "4.19": { - "cmt_id": "a0e38a2808ea708beb4196a8873cecc23efb8e64", - "fixed_version": "4.19.247" + "cmt_id": "39785761feadf261bc5101372b0b0bbaf6a94494", + "fixed_version": "4.19.193" }, "4.9": { - "cmt_id": "89dda10b73b7ce184caf18754907126ce7ce3fad", - "fixed_version": "4.9.318" + "cmt_id": "4e1ba532dbc1a0e19fc2458d74ab8d98680c4e42", + "fixed_version": "4.9.271" }, "5.10": { - "cmt_id": "3be74fc0afbeadc2aff8dc69f3bf9716fbe66486", - "fixed_version": "5.10.122" - }, - "5.15": { - "cmt_id": "2a0165d278973e30f2282c15c52d91788749d2d4", - "fixed_version": "5.15.47" - }, - "5.17": { - "cmt_id": "638556430658eca42501271edb38154264767ff5", - "fixed_version": "5.17.15" + "cmt_id": "f9890652185b72b8de9ebeb4406037640b6e1b53", + "fixed_version": "5.10.42" }, - "5.18": { - "cmt_id": "7764a258356c454fe56b9f56fc07c0e146a3bccb", - "fixed_version": "5.18.4" + "5.12": { + "cmt_id": "b090d110e66636bca473fd8b98d5c97b555a965a", + "fixed_version": "5.12.9" }, "5.4": { - "cmt_id": "0c4bc0a2f8257f79a70fe02b9a698eb14695a64b", - "fixed_version": "5.4.198" + "cmt_id": "aba3c7795f51717ae316f3566442dee7cc3eeccb", + "fixed_version": "5.4.124" } }, - "CVE-2022-3303": { - "5.10": { - "cmt_id": "fce793a056c604b41a298317cf704dae255f1b36", - "fixed_version": "5.10.148" + "CVE-2021-47180": { + "4.14": { + "cmt_id": "2c2fb2df46ea866b49fea5ec7112ec3cd4896c74", + "fixed_version": "4.14.235" }, - "5.15": { - "cmt_id": "8015ef9e8a0ee5cecfd0cb6805834d007ab26f86", - "fixed_version": "5.15.68" + "4.19": { + "cmt_id": "0365701bc44e078682ee1224866a71897495c7ef", + "fixed_version": "4.19.193" }, - "5.19": { - "cmt_id": "723ac5ab2891b6c10dd6cc78ef5456af593490eb", - "fixed_version": "5.19.9" + "4.4": { + "cmt_id": "448a1cb12977f52142e6feb12022c59662d88dc1", + "fixed_version": "4.4.271" }, - "5.4": { - "cmt_id": "4051324a6dafd7053c74c475e80b3ba10ae672b0", - "fixed_version": "5.4.215" - } - }, - "CVE-2022-3344": { - "5.15": { - "cmt_id": "3e87cb0caa25d667a9ca2fe15fef889e43ab8f95", - "fixed_version": "5.15.81" + "4.9": { + "cmt_id": "4a621621c7af3cec21c47c349b30cd9c3cea11c8", + "fixed_version": "4.9.271" }, - "6.0": { - "cmt_id": "5ca2721b7d3ed4d3da6323a2ea7339f745866d83", - "fixed_version": "6.0.11" + "5.10": { + "cmt_id": "b34cb7ac32cc8e5471dc773180ea9ae676b1a745", + "fixed_version": "5.10.41" + }, + "5.12": { + "cmt_id": "65234f50a90b64b335cbb9164b8a98c2a0d031dd", + "fixed_version": "5.12.8" + }, + "5.4": { + "cmt_id": "af2a4426baf71163c0c354580ae98c7888a9aba7", + "fixed_version": "5.4.123" } }, - "CVE-2022-33740": { + "CVE-2022-0001": { "4.14": { - "cmt_id": "f2c6f208a52df7e201f9fc34ae5efd7f9f40133e", - "fixed_version": "4.14.287" + "cmt_id": "35c13d13becb5b951ea0fc708dda03fe900cf879", + "fixed_version": "4.14.271" }, "4.19": { - "cmt_id": "3650ac3218c1640a3d597a8cee17d8e2fcf0ed4e", - "fixed_version": "4.19.251" + "cmt_id": "25440a8c77dd2fde6a8e9cfc0c616916febf408e", + "fixed_version": "4.19.234" }, "4.9": { - "cmt_id": "d1d69e0c838c2df7089357ec27000942086325c4", - "fixed_version": "4.9.322" + "cmt_id": "a771511caa8e31cb5cac4fa39165ebbca3e62795", + "fixed_version": "4.9.306" }, "5.10": { - "cmt_id": "728d68bfe68d92eae1407b8a9edc7817d6227404", - "fixed_version": "5.10.129" + "cmt_id": "f38774bb6e231d647d40ceeb8ddf9082eabde667", + "fixed_version": "5.10.105" }, "5.15": { - "cmt_id": "5dd0993c36832d33820238fc8dc741ba801b7961", - "fixed_version": "5.15.53" + "cmt_id": "f150b6fccf7fa0e7e7275f0785798547db832c7b", + "fixed_version": "5.15.28" }, - "5.18": { - "cmt_id": "6d98cf6e58b5867225c3b4ea49bc431895ef33f0", - "fixed_version": "5.18.10" + "5.16": { + "cmt_id": "56829c19c8171303faca18d6ab3511ecdf3e7e23", + "fixed_version": "5.16.14" }, "5.4": { - "cmt_id": "04945b5beb73019145ac17a2565526afa7293c14", - "fixed_version": "5.4.204" + "cmt_id": "41b50510e593541e2ee1537614652e91e71f6bf5", + "fixed_version": "5.4.184" } }, - "CVE-2022-33741": { + "CVE-2022-0002": { "4.14": { - "cmt_id": "019eaffbb7cfdbe01b1b4e1b61e7f91688c76c2a", - "fixed_version": "4.14.287" + "cmt_id": "35c13d13becb5b951ea0fc708dda03fe900cf879", + "fixed_version": "4.14.271" }, "4.19": { - "cmt_id": "4b67d8e42dbba42cfafe22ac3e4117d9573fdd74", - "fixed_version": "4.19.251" + "cmt_id": "25440a8c77dd2fde6a8e9cfc0c616916febf408e", + "fixed_version": "4.19.234" }, "4.9": { - "cmt_id": "c6e941364608d911ac7b055d27d86e360fd94aed", - "fixed_version": "4.9.322" + "cmt_id": "a771511caa8e31cb5cac4fa39165ebbca3e62795", + "fixed_version": "4.9.306" }, "5.10": { - "cmt_id": "4923217af5742a796821272ee03f8d6de15c0cca", - "fixed_version": "5.10.129" + "cmt_id": "f38774bb6e231d647d40ceeb8ddf9082eabde667", + "fixed_version": "5.10.105" }, "5.15": { - "cmt_id": "ed3cfc690675d852c3416aedb271e0e7d179bf49", - "fixed_version": "5.15.53" + "cmt_id": "f150b6fccf7fa0e7e7275f0785798547db832c7b", + "fixed_version": "5.15.28" }, - "5.18": { - "cmt_id": "3893cd0fec5e80e8d1c681794ee43167eb799e4d", - "fixed_version": "5.18.10" + "5.16": { + "cmt_id": "56829c19c8171303faca18d6ab3511ecdf3e7e23", + "fixed_version": "5.16.14" }, "5.4": { - "cmt_id": "ede57be88a5fff42cd00e6bcd071503194d398dd", - "fixed_version": "5.4.204" - } + "cmt_id": "41b50510e593541e2ee1537614652e91e71f6bf5", + "fixed_version": "5.4.184" + } }, - "CVE-2022-33742": { - "4.14": { - "cmt_id": "0b06590646e0857a804c9a08545791feb2278ab6", - "fixed_version": "4.14.287" - }, - "4.19": { - "cmt_id": "981de55fb6b5253fa7ae345827c6c3ca77912e5c", - "fixed_version": "4.19.251" - }, - "4.9": { - "cmt_id": "8dad9a67100245295373523375610be850999b37", - "fixed_version": "4.9.322" - }, + "CVE-2022-0168": { "5.10": { - "cmt_id": "cbbd2d2531539212ff090aecbea9877c996e6ce6", - "fixed_version": "5.10.129" + "cmt_id": "edefc4b2a8e8310eee8e2b1714709ad5b2a93928", + "fixed_version": "5.10.110" }, "5.15": { - "cmt_id": "6d0a9127279a4533815202e30ad1b3a39f560ba3", - "fixed_version": "5.15.53" + "cmt_id": "39a4bf7d1a23dd172526c2fb0db480c5d5c63bd6", + "fixed_version": "5.15.33" }, - "5.18": { - "cmt_id": "3ebaa2c13f680889c4fb9f090b243499d25017d0", - "fixed_version": "5.18.10" + "5.16": { + "cmt_id": "0f0ce73e7dad17084222da19989049ebfb8be541", + "fixed_version": "5.16.19" }, - "5.4": { - "cmt_id": "60ac50daad36ef3fe9d70d89cfe3b95d381db997", - "fixed_version": "5.4.204" + "5.17": { + "cmt_id": "49bef50e585d738e957060f669e872b4ad15eb87", + "fixed_version": "5.17.2" } }, - "CVE-2022-33743": { + "CVE-2022-0171": { "5.10": { - "cmt_id": "547b7c640df545a344358ede93e491a89194cdfa", - "fixed_version": "5.10.129" + "cmt_id": "a60babeb60ff276963d4756c7fd2e7bf242bb777", + "fixed_version": "5.10.146" }, "5.15": { - "cmt_id": "1052fc2b7391a43b25168ae69ad658fff5170f04", - "fixed_version": "5.15.53" - }, - "5.18": { - "cmt_id": "a74adaffc8db86b4dbdd98762deff70b155b0f4d", - "fixed_version": "5.18.10" + "cmt_id": "39b0235284c7aa33a64e07b825add7a2c108094a", + "fixed_version": "5.15.70" } }, - "CVE-2022-33744": { - "4.14": { - "cmt_id": "01b86faa64b1f5aa04c0b3ca2001b0a8474f3006", - "fixed_version": "4.14.287" - }, - "4.19": { - "cmt_id": "274cb74da15ed13292fcec9097f04332eb3eea17", - "fixed_version": "4.19.251" - }, - "4.9": { - "cmt_id": "856d1b8e6e826b5087f1ea3fdbabda3557d73599", - "fixed_version": "4.9.322" - }, + "CVE-2022-0185": { "5.10": { - "cmt_id": "43c8d33ce353091f15312cb6de3531517d7bba90", - "fixed_version": "5.10.129" + "cmt_id": "eadde287a62e66b2f9e62d007c59a8f50d4b8413", + "fixed_version": "5.10.93" }, "5.15": { - "cmt_id": "9f83c8f6ab14bbf4311b70bf1b7290d131059101", - "fixed_version": "5.15.53" + "cmt_id": "e192ccc17ecf3e78a1c6fb81badf9b50bd791115", + "fixed_version": "5.15.16" }, - "5.18": { - "cmt_id": "efd9826d4c08abac7e8840757e3e1bfcf2876f70", - "fixed_version": "5.18.10" + "5.16": { + "cmt_id": "8b1530a3772ae5b49c6d8d171fd3146bb947430f", + "fixed_version": "5.16.2" }, "5.4": { - "cmt_id": "5c03cad51b84fb26ccea7fd99130d8ec47949cfc", - "fixed_version": "5.4.204" + "cmt_id": "bd2aed0464ae3d6e83ce064cd91fc1a7fec48826", + "fixed_version": "5.4.173" } }, - "CVE-2022-33981": { + "CVE-2022-0264": { + "5.15": { + "cmt_id": "423628125a484538111c2c6d9bb1588eb086053b", + "fixed_version": "5.15.11" + } + }, + "CVE-2022-0286": { + "5.10": { + "cmt_id": "ba7bfcdff1ad4ea475395079add1cd7b79f81684", + "fixed_version": "5.10.54" + }, + "5.13": { + "cmt_id": "9863701fa0ecd2abfadb27b0e7a9b0fe1c9d02b6", + "fixed_version": "5.13.6" + } + }, + "CVE-2022-0322": { "4.14": { - "cmt_id": "b7fa84ae1171a3c5ea5d710899080a6e63cfe084", - "fixed_version": "4.14.278" + "cmt_id": "41f0bcc7d9eac315259d4e9fb441552f60e8ec9e", + "fixed_version": "4.14.252" }, "4.19": { - "cmt_id": "0e535976774504af36fab1dfb54f3d4d6cc577a9", - "fixed_version": "4.19.241" - }, - "4.9": { - "cmt_id": "0dd02ff72c6daf4e7800fb5dd1109fbacdde97dc", - "fixed_version": "4.9.313" + "cmt_id": "c57fdeff69b152185fafabd37e6bfecfce51efda", + "fixed_version": "4.19.213" }, "5.10": { - "cmt_id": "54c028cfc49624bfc27a571b94edecc79bbaaab4", - "fixed_version": "5.10.114" - }, - "5.15": { - "cmt_id": "e52da8e4632f9c8fe78bf1c5881ce6871c7e08f3", - "fixed_version": "5.15.37" + "cmt_id": "d84a69ac410f6228873d05d35120f6bdddab7fc3", + "fixed_version": "5.10.75" }, - "5.17": { - "cmt_id": "d91ca05d52fabf68c0376bcfeed1a52be68a8e1b", - "fixed_version": "5.17.6" + "5.14": { + "cmt_id": "4f0bc44b9191b176d7b558f1f5ca1865339a27ef", + "fixed_version": "5.14.14" }, "5.4": { - "cmt_id": "7dea5913000c6a2974a00d9af8e7ffb54e47eac1", - "fixed_version": "5.4.192" + "cmt_id": "d88774539539dcbf825a25e61234f110513f5963", + "fixed_version": "5.4.155" } }, - "CVE-2022-3424": { + "CVE-2022-0330": { "4.14": { - "cmt_id": "3eec37e223fabedaf90191e8a0cc61d46a96ab8d", - "fixed_version": "4.14.303" + "cmt_id": "eed39c1918f1803948d736c444bfacba2a482ad0", + "fixed_version": "4.14.264" }, "4.19": { - "cmt_id": "bcda4624e87d6b922e94f5c0fd0bd5f027b8b226", - "fixed_version": "4.19.270" + "cmt_id": "b188780649081782e341e52223db47c49f172712", + "fixed_version": "4.19.227" + }, + "4.4": { + "cmt_id": "db6a2082d5a2ebc5ffa41f7213a544d55f73793a", + "fixed_version": "4.4.301" }, "4.9": { - "cmt_id": "f99d5f1bd8cd1e99931b6e5544a5601a1fe33f82", - "fixed_version": "4.9.337" + "cmt_id": "84f4ab5b47d955ad2bb30115d7841d3e8f0994f4", + "fixed_version": "4.9.299" }, "5.10": { - "cmt_id": "0f67ed565f20ea2fdd98e3b0b0169d9e580bb83c", - "fixed_version": "5.10.163" + "cmt_id": "6a6acf927895c38bdd9f3cd76b8dbfc25ac03e88", + "fixed_version": "5.10.95" }, "5.15": { - "cmt_id": "d5c8f9003a289ee2a9b564d109e021fc4d05d106", - "fixed_version": "5.15.86" - }, - "5.4": { - "cmt_id": "0078dd8758561540ed30b2c5daa1cb647e758977", - "fixed_version": "5.4.229" + "cmt_id": "8a17a077e7e9ecce25c95dbdb27843d2d6c2f0f7", + "fixed_version": "5.15.18" }, - "6.0": { - "cmt_id": "dbc1bb8c8ea930f188b7ce45db162807b3f4b66a", - "fixed_version": "6.0.16" + "5.16": { + "cmt_id": "ec1b6497a2bc0293c064337e981ea1f6cbe57930", + "fixed_version": "5.16.4" }, - "6.1": { - "cmt_id": "4e947fc71bec7c7da791f8562d5da233b235ba5e", - "fixed_version": "6.1.2" - } - }, - "CVE-2022-3435": { - "6.0": { - "cmt_id": "bb20a2ae241be846bc3c11ea4b3a3c69e41d51f2", - "fixed_version": "6.0.12" + "5.4": { + "cmt_id": "1b5553c79d52f17e735cd924ff2178a2409e6d0b", + "fixed_version": "5.4.175" } }, - "CVE-2022-34494": { + "CVE-2022-0382": { "5.15": { - "cmt_id": "b94d40c792de7f0ceda6a2fd8a8dc0597eca6d22", - "fixed_version": "5.15.47" - }, - "5.17": { - "cmt_id": "900373f8f7ee128cbbd3968722182b8d26c1e54e", - "fixed_version": "5.17.15" + "cmt_id": "d57da5185defccf383be53f41604fd5f006aba8c", + "fixed_version": "5.15.14" }, - "5.18": { - "cmt_id": "d51720ac069d465101d937273acecde1f71ea411", - "fixed_version": "5.18.4" + "5.16": { + "cmt_id": "d6d86830705f173fca6087a3e67ceaf68db80523", + "fixed_version": "5.16" } }, - "CVE-2022-34495": { - "5.15": { - "cmt_id": "eaf37bb6b4f7c48a5adaf1be4879107daf4d6024", - "fixed_version": "5.15.47" - }, - "5.17": { - "cmt_id": "c49fb74e050d01ea09703b7c0d5fe8b9c3855b60", - "fixed_version": "5.17.15" - }, - "5.18": { - "cmt_id": "b7e88e4bb41dea89b1dadf7a985d7aff53720629", - "fixed_version": "5.18.4" + "CVE-2022-0433": { + "5.16": { + "cmt_id": "f7a6dd58e0817b063252d7c5bec88e588df34b31", + "fixed_version": "5.16.3" } }, - "CVE-2022-34918": { + "CVE-2022-0435": { "4.14": { - "cmt_id": "acd3e18fbcae6c5f9d79d75455569fc132227162", - "fixed_version": "4.14.316" + "cmt_id": "fde4ddeadd099bf9fbb9ccbee8e1b5c20d530a2d", + "fixed_version": "4.14.266" }, "4.19": { - "cmt_id": "835fd72f61c6162f10471df197f0e4b92b1a7b76", - "fixed_version": "4.19.284" + "cmt_id": "f1af11edd08dd8376f7a84487cbb0ea8203e3a1d", + "fixed_version": "4.19.229" + }, + "4.9": { + "cmt_id": "175db196e45d6f0e6047eccd09c8ba55465eb131", + "fixed_version": "4.9.301" }, "5.10": { - "cmt_id": "0a5e36dbcb448a7a8ba63d1d4b6ade2c9d3cc8bf", - "fixed_version": "5.10.130" + "cmt_id": "3c7e5943553594f68bbc070683db6bb6f6e9e78e", + "fixed_version": "5.10.100" }, "5.15": { - "cmt_id": "c1784d2075138992b00c17ab4ffc6d855171fe6d", - "fixed_version": "5.15.54" + "cmt_id": "1f1788616157b0222b0c2153828b475d95e374a7", + "fixed_version": "5.15.23" }, - "5.18": { - "cmt_id": "6b7488071ea8ed6265a39afebd5a5920f6975d02", - "fixed_version": "5.18.11" + "5.16": { + "cmt_id": "59ff7514f8c56f166aadca49bcecfa028e0ad50f", + "fixed_version": "5.16.9" }, "5.4": { - "cmt_id": "05b4105e6852b584dd115d0a1f0fe96bde9c58c5", - "fixed_version": "5.4.244" + "cmt_id": "d692e3406e052dbf9f6d9da0cba36cb763272529", + "fixed_version": "5.4.179" } }, - "CVE-2022-3521": { + "CVE-2022-0487": { "4.14": { - "cmt_id": "381b6cb3f3e66b84db77028ac7d84f18d80f1153", - "fixed_version": "4.14.300" + "cmt_id": "e6f580d0b3349646d4ee1ce0057eb273e8fb7e2e", + "fixed_version": "4.14.266" }, "4.19": { - "cmt_id": "23a0a5869749c7833772330313ae7aec6581ec60", - "fixed_version": "4.19.267" + "cmt_id": "9c25d5ff1856b91bd4365e813f566cb59aaa9552", + "fixed_version": "4.19.229" }, "4.9": { - "cmt_id": "fe3f79701fdaf8a087bc7043839e7f8b2e61b6fe", - "fixed_version": "4.9.334" - }, + "cmt_id": "f5dc193167591e88797262ec78515a0cbe79ff5f", + "fixed_version": "4.9.301" + }, "5.10": { - "cmt_id": "7deb7a9d33e4941c5ff190108146d3a56bf69e9d", - "fixed_version": "5.10.156" + "cmt_id": "be93028d306dac9f5b59ebebd9ec7abcfc69c156", + "fixed_version": "5.10.100" }, "5.15": { - "cmt_id": "27d706b0d394a907ff8c4f83ffef9d3e5817fa84", - "fixed_version": "5.15.80" + "cmt_id": "af0e6c49438b1596e4be8a267d218a0c88a42323", + "fixed_version": "5.15.23" }, - "5.4": { - "cmt_id": "ad39d09190a545d0f05ae0a82900eee96c5facea", - "fixed_version": "5.4.225" + "5.16": { + "cmt_id": "7f901d53f120d1921f84f7b9b118e87e94b403c5", + "fixed_version": "5.16.9" }, - "6.0": { - "cmt_id": "2526ac6b0f5a9b38e7e9073e37141cf78408078d", - "fixed_version": "6.0.10" + "5.4": { + "cmt_id": "3a0a7ec5574b510b067cfc734b8bdb6564b31d4e", + "fixed_version": "5.4.179" } }, - "CVE-2022-3524": { + "CVE-2022-0492": { "4.14": { - "cmt_id": "205c1e9ac56a5cd1a7d0bc457d8b38871f5b37ed", - "fixed_version": "4.14.301" + "cmt_id": "b391bb3554dd6e04b7a8ede975dbd3342526a045", + "fixed_version": "4.14.266" }, "4.19": { - "cmt_id": "bbfbdca680b0cbea0e57be597b5e2cae19747052", - "fixed_version": "4.19.268" + "cmt_id": "939f8b491887c27585933ea7dc5ad4123de58ff3", + "fixed_version": "4.19.229" }, "4.9": { - "cmt_id": "d2c9e2ebafa14a564b28e237db8d90ab7bdbd061", - "fixed_version": "4.9.335" + "cmt_id": "7e33a0ad792f04bad920c7197bda8cc2ea08d304", + "fixed_version": "4.9.301" }, "5.10": { - "cmt_id": "818c36b988b82f31e4be8ad8415e1be902b8e5f8", - "fixed_version": "5.10.154" + "cmt_id": "1fc3444cda9a78c65b769e3fa93455e09ff7a0d3", + "fixed_version": "5.10.97" }, "5.15": { - "cmt_id": "1401e9336bebaa6dd5a320f83bddc17619d4e3a6", - "fixed_version": "5.15.77" + "cmt_id": "4b1c32bfaa02255a5df602b41587174004996477", + "fixed_version": "5.15.20" }, - "5.4": { - "cmt_id": "92aaa5e8fe90a008828a1207e66a30444bcb1cbd", - "fixed_version": "5.4.224" + "5.16": { + "cmt_id": "9c9dbb954e618e3d9110f13cc02c5db1fb73ea5d", + "fixed_version": "5.16.6" }, - "6.0": { - "cmt_id": "0c5d628f1e1d049c33595693fab1b6e9baf25795", - "fixed_version": "6.0.7" + "5.4": { + "cmt_id": "0e8283cbe4996ae046cd680b3ed598a8f2b0d5d8", + "fixed_version": "5.4.177" } }, - "CVE-2022-3526": { + "CVE-2022-0494": { + "4.14": { + "cmt_id": "4f3ea768c56e8dce55ae538f18b37420366c5c22", + "fixed_version": "4.14.282" + }, + "4.19": { + "cmt_id": "18243d8479fd77952bdb6340024169d30b173a40", + "fixed_version": "4.19.246" + }, + "4.9": { + "cmt_id": "d59073bedb7cf752b8cd4027dd0f67cf7ac4330f", + "fixed_version": "4.9.317" + }, + "5.10": { + "cmt_id": "a439819f4797f0846c7cffa9475f44aef23c541f", + "fixed_version": "5.10.115" + }, "5.15": { - "cmt_id": "8f79ce226ad2e9b2ec598de2b9560863b7549d1b", - "fixed_version": "5.15.35" + "cmt_id": "a1ba98731518b811ff90009505c1aebf6e400bc2", + "fixed_version": "5.15.27" }, - "5.17": { - "cmt_id": "f382df5ff36bc9fa10e0f898f3051d0702085304", - "fixed_version": "5.17.4" - } - }, - "CVE-2022-3531": { - "6.0": { - "cmt_id": "78b772629cc5adec02ab4182b62abe916f2254a0", - "fixed_version": "6.0.16" + "5.16": { + "cmt_id": "f8c61361a4f52c2a186269982587facc852dba62", + "fixed_version": "5.16.13" }, - "6.1": { - "cmt_id": "661e952bc9ef798d1d33ba67f2950a3e0bea455f", - "fixed_version": "6.1.2" + "5.4": { + "cmt_id": "c7337efd1d11acb6f84c68ffee57d3f312e87b24", + "fixed_version": "5.4.193" } }, - "CVE-2022-3532": { - "6.1": { - "cmt_id": "d7dc8fad67fab906530c50155b12cf6117e99299", - "fixed_version": "6.1.2" + "CVE-2022-0500": { + "5.15": { + "cmt_id": "b453361384c2db1c703dacb806d5fd36aec4ceca", + "fixed_version": "5.15.37" + }, + "5.16": { + "cmt_id": "e982070f8970bb62e69ed7c9cafff886ed200349", + "fixed_version": "5.16.11" } }, - "CVE-2022-3534": { + "CVE-2022-0516": { "5.10": { - "cmt_id": "c61650b869e0b6fb0c0a28ed42d928eea969afc8", - "fixed_version": "5.10.163" + "cmt_id": "b62267b8b06e9b8bb429ae8f962ee431e6535d60", + "fixed_version": "5.10.100" }, "5.15": { - "cmt_id": "a733bf10198eb5bb927890940de8ab457491ed3b", - "fixed_version": "5.15.86" - }, - "6.0": { - "cmt_id": "8c64a8e76eb85d422af5ec60ccbf26e3ead8c333", - "fixed_version": "6.0.16" + "cmt_id": "14f880ea779e11a6c162f122c1199e3578e6e3f3", + "fixed_version": "5.15.23" }, - "6.1": { - "cmt_id": "fbe08093fb2334549859829ef81d42570812597d", - "fixed_version": "6.1.2" + "5.16": { + "cmt_id": "8c68c50109c22502b647f4e86ec74400c7a3f6e0", + "fixed_version": "5.16.9" } }, - "CVE-2022-3535": { + "CVE-2022-0617": { + "4.14": { + "cmt_id": "a312cbdb9045a52e5c1fec4ac7b86895f508dc76", + "fixed_version": "4.14.265" + }, "4.19": { - "cmt_id": "84e2394b0be397f7198986aa9a28207f70b29bd4", - "fixed_version": "4.19.262" + "cmt_id": "a23a59717f9f01a49394488f515550f9382fbada", + "fixed_version": "4.19.228" + }, + "4.4": { + "cmt_id": "0f28e1a57baf48a583093e350ea2bd3e4c09b8ea", + "fixed_version": "4.4.302" + }, + "4.9": { + "cmt_id": "f24454e42b5a58267928b0de53b0dd9b43e4dd46", + "fixed_version": "4.9.300" }, "5.10": { - "cmt_id": "29f50bcf0f8b9e49c3c9b0e08fcae2ec3a88cc9f", - "fixed_version": "5.10.150" + "cmt_id": "de7cc8bcca90a9d77c915ee1d922dbd670c47d84", + "fixed_version": "5.10.96" }, "5.15": { - "cmt_id": "a624161ebe0c678c10c4c82b574fed6c04d552d8", - "fixed_version": "5.15.75" + "cmt_id": "cbf96c58e28b1fece9630102781a93ff32c347f7", + "fixed_version": "5.15.19" }, - "5.19": { - "cmt_id": "169aa2664639de359a7c723ba55023ef57c0dc15", - "fixed_version": "5.19.17" + "5.16": { + "cmt_id": "620e8243cf5389e706c1c8f66ffacb3c84308a9e", + "fixed_version": "5.16.5" }, "5.4": { - "cmt_id": "72c0d361940aec02d114d6f8f351147b85190464", - "fixed_version": "5.4.220" - }, - "6.0": { - "cmt_id": "218dbb2ef8597b837c1a8f248ad176c5f3f5b464", - "fixed_version": "6.0.3" - } - }, - "CVE-2022-3541": { - "6.0": { - "cmt_id": "99e229c7fe30a1661f9f306b3df06eaf1db064aa", - "fixed_version": "6.0.3" + "cmt_id": "31136e5467f381cf18e2cfd467207dda7678c7a2", + "fixed_version": "5.4.176" } }, - "CVE-2022-3542": { + "CVE-2022-0644": { "4.14": { - "cmt_id": "f63e896e78c247d0be8165d99d543a28ca0be360", - "fixed_version": "4.14.296" + "cmt_id": "aaa5e83805b09c7ed24c06227321575278e3de1d", + "fixed_version": "4.14.253" }, "4.19": { - "cmt_id": "70421f9708d4cf14c2bd15de58862a3d22e00bbe", - "fixed_version": "4.19.262" + "cmt_id": "c1ba20965b59c2eeb54a845ca5cab4fc7bcf9735", + "fixed_version": "4.19.214" }, "4.9": { - "cmt_id": "9ec3f783f08b57a861700fdf4d3d8f3cfb68f471", - "fixed_version": "4.9.331" + "cmt_id": "52ed5a196b1146e0368e95edc23c38fa1b50825a", + "fixed_version": "4.9.288" }, "5.10": { - "cmt_id": "6cc0e2afc6a137d45b9523f61a1b1b16a68c9dc0", - "fixed_version": "5.10.150" - }, - "5.15": { - "cmt_id": "0b6516a4e3eb0e2dc88a538458f3f732940f44fd", - "fixed_version": "5.15.75" + "cmt_id": "b721500c979b71a9f02eb84ca384082722c62d4e", + "fixed_version": "5.10.76" }, - "5.19": { - "cmt_id": "96c0c14135f5803f9e94e6da2ee9c4b012fdcb20", - "fixed_version": "5.19.17" + "5.14": { + "cmt_id": "abe046ddf31133287fdd5508168078377a2508a5", + "fixed_version": "5.14.15" }, "5.4": { - "cmt_id": "71e0ab5b7598d88001762fddbfeb331543c62841", - "fixed_version": "5.4.220" - }, - "6.0": { - "cmt_id": "a712737af79b4a9a75f9abbf812279062da75777", - "fixed_version": "6.0.3" + "cmt_id": "0f218ba4c8aac7041cd8b81a5a893b0d121e6316", + "fixed_version": "5.4.156" } }, - "CVE-2022-3543": { + "CVE-2022-0742": { "5.15": { - "cmt_id": "3975affcf55f93814a8ae14333d7fc7f183e60a4", - "fixed_version": "5.15.78" + "cmt_id": "771aca9bc70709771f66c3e7c00ce87339aa1790", + "fixed_version": "5.15.27" }, - "6.0": { - "cmt_id": "2f415ad33bc1a729fb1050141921b5a9ec4e062c", - "fixed_version": "6.0.3" + "5.16": { + "cmt_id": "5ed9983ce67341b405cf6fda826e29aed26a7371", + "fixed_version": "5.16.13" } }, - "CVE-2022-3545": { + "CVE-2022-0812": { "4.14": { - "cmt_id": "60537e23e40f7ca9e07679fec28af79d43d9e8f6", - "fixed_version": "4.14.303" + "cmt_id": "4779af1ec4a6c88a7005c8aabe69f409cf926d58", + "fixed_version": "4.14.285" }, "4.19": { - "cmt_id": "6ff23e9b9a04b833388862246838bb38ac0c46b6", - "fixed_version": "4.19.270" - }, - "5.10": { - "cmt_id": "eb6313c12955c58c3d3d40f086c22e44ca1c9a1b", - "fixed_version": "5.10.160" + "cmt_id": "4103bc54d8684a099615ae1fbab0590cf2167024", + "fixed_version": "4.19.249" }, - "5.15": { - "cmt_id": "9d933af8fef33c32799b9f2d3ff6bf58a63d7f24", - "fixed_version": "5.15.84" + "4.9": { + "cmt_id": "ca6226b5c5b4cf8c41ab7c759686c9aab43a2a33", + "fixed_version": "4.9.320" }, "5.4": { - "cmt_id": "3c837460f920a63165961d2b88b425703f59affb", - "fixed_version": "5.4.228" + "cmt_id": "c8a4452da9f4b09c28d904f70247b097d4c14932", + "fixed_version": "5.4.53" + }, + "5.7": { + "cmt_id": "fe3b01c6588829a4a5d89e4b6d4254087aa40f20", + "fixed_version": "5.7.10" } }, - "CVE-2022-3564": { - "4.14": { - "cmt_id": "03af22e23b96fb7ef75fb7885407ef457e8b403d", - "fixed_version": "4.14.299" - }, + "CVE-2022-0847": { + "5.10": { + "cmt_id": "b19ec7afa9297d862ed86443e0164643b97250ab", + "fixed_version": "5.10.102" + }, + "5.15": { + "cmt_id": "114e9f141822e6977633d322c1b03e89bd209932", + "fixed_version": "5.15.25" + }, + "5.16": { + "cmt_id": "eddef98207d678f21261c2bd07da55938680df4e", + "fixed_version": "5.16.11" + } + }, + "CVE-2022-0850": { + "4.14": { + "cmt_id": "29d882f9a6a6219a1c59729e1f43fa40663903e4", + "fixed_version": "4.14.240" + }, "4.19": { - "cmt_id": "6c7407bfbeafc80a04e6eaedcf34d378532a04f2", - "fixed_version": "4.19.265" + "cmt_id": "9ed3a3d3a8d2cbe99d9e4386a98856491f0eade0", + "fixed_version": "4.19.198" + }, + "4.4": { + "cmt_id": "ce14bff239a107344b153bd6504a2f8165f672e9", + "fixed_version": "4.4.276" }, "4.9": { - "cmt_id": "dc30e05bb18852303084430c03ca76e69257d9ea", - "fixed_version": "4.9.333" + "cmt_id": "25dcc64fa0c9399653e1fd1a4bad6c1e8cb31f3f", + "fixed_version": "4.9.276" }, "5.10": { - "cmt_id": "cb1c012099ef5904cd468bdb8d6fcdfdd9bcb569", - "fixed_version": "5.10.154" + "cmt_id": "ea5466f1a77720217a25a859b5a58b618aaba544", + "fixed_version": "5.10.50" }, - "5.15": { - "cmt_id": "8278a87bb1eeea94350d675ef961ee5a03341fde", - "fixed_version": "5.15.78" + "5.12": { + "cmt_id": "e8b477fbeca6ab88ad9ed410faae156e6b99d15b", + "fixed_version": "5.12.17" }, - "5.4": { - "cmt_id": "4cd094fd5d872862ca278e15b9b51b07e915ef3f", - "fixed_version": "5.4.224" + "5.13": { + "cmt_id": "befdd44d46329dc8ab9459c891287cc29f2ef4bf", + "fixed_version": "5.13.2" }, - "6.0": { - "cmt_id": "9a04161244603f502c6e453913e51edd59cb70c1", - "fixed_version": "6.0.8" + "5.4": { + "cmt_id": "ed628b2531196cc76d7c9b730abe4020cad26b0b", + "fixed_version": "5.4.132" } }, - "CVE-2022-3565": { + "CVE-2022-0854": { "4.14": { - "cmt_id": "cbd342376a4e7ea481891181910e9e995390eb24", - "fixed_version": "4.14.296" + "cmt_id": "aaf166f37eb6bb55d81c3e40a2a460c8875c8813", + "fixed_version": "4.14.281" }, "4.19": { - "cmt_id": "27f74a47d5b1cf52d48af15993bb1caa31ad8f5b", - "fixed_version": "4.19.262" - }, - "4.9": { - "cmt_id": "1ba21168faf881c23c270605834d01af260cbb72", - "fixed_version": "4.9.331" + "cmt_id": "06cb238b0f7ac1669cb06390704c61794724c191", + "fixed_version": "4.19.245" }, "5.10": { - "cmt_id": "2a1d0363208528a3bacbc2c37264d60182efd482", - "fixed_version": "5.10.150" + "cmt_id": "f3f2247ac31cb71d1f05f56536df5946c6652f4a", + "fixed_version": "5.10.118" }, "5.15": { - "cmt_id": "7bfa18b05f381162c9d38192bbf0179f1142dd38", - "fixed_version": "5.15.75" + "cmt_id": "2c1f97af38be151527380796d31d3c9adb054bf9", + "fixed_version": "5.15.29" }, - "5.19": { - "cmt_id": "1f76323ac43fe0b00677794c930dee9f66ea2999", - "fixed_version": "5.19.17" + "5.16": { + "cmt_id": "62b27d925655999350d0ea775a025919fd88d27f", + "fixed_version": "5.16.15" }, "5.4": { - "cmt_id": "466ed722f205c2cf8caba5982f3cd9729e767903", - "fixed_version": "5.4.220" - }, - "6.0": { - "cmt_id": "5c9422e2d8563a3efe064493ff7ebbc2948441ea", - "fixed_version": "6.0.3" + "cmt_id": "b2f140a9f980806f572d672e1780acea66b9a25c", + "fixed_version": "5.4.196" } }, - "CVE-2022-3577": { + "CVE-2022-0995": { "5.10": { - "cmt_id": "296f8ca0f73f5268cd9b85cf72ff783596b2264e", - "fixed_version": "5.10.121" + "cmt_id": "648895da69ced90ca770fd941c3d9479a9d72c16", + "fixed_version": "5.10.106" }, "5.15": { - "cmt_id": "22e0b0b84c538b60bdf8eeceee7ab3cebf4a1a09", - "fixed_version": "5.15.46" - }, - "5.17": { - "cmt_id": "2ab0a30f4f709f462d253bbb36fc64bb6de5a135", - "fixed_version": "5.17.14" - }, - "5.18": { - "cmt_id": "50db547e5f25218e1aec3864d77cac0cb2fc51ca", - "fixed_version": "5.18.3" + "cmt_id": "1b09f28f70a5046acd64138075ae3f095238b045", + "fixed_version": "5.15.29" }, - "5.4": { - "cmt_id": "00771de7cc28e405f5ae19ca46facd83a534bb8f", - "fixed_version": "5.4.198" + "5.16": { + "cmt_id": "b36588ebbcef74583824c08352e75838d6fb4ff2", + "fixed_version": "5.16.15" } }, - "CVE-2022-3586": { + "CVE-2022-1011": { "4.14": { - "cmt_id": "a7af71bb5ee6e887d49f098e212ef4f2f7cfbaf6", - "fixed_version": "4.14.293" + "cmt_id": "0ab55e14cf5fd40c39109969c8b04a25870f5d1e", + "fixed_version": "4.14.276" }, "4.19": { - "cmt_id": "9245ed20950afe225bc6d1c4b9d28d55aa152e25", - "fixed_version": "4.19.258" + "cmt_id": "99db28212be68030c1db3a525f6bbdce39b039e9", + "fixed_version": "4.19.238" }, "4.9": { - "cmt_id": "b5aa83141aa97f81c8e06051e4bd925bfb5474fb", - "fixed_version": "4.9.328" + "cmt_id": "b79d4d0da659a3c7bd1d5913e62188ceb9be9c49", + "fixed_version": "4.9.320" }, "5.10": { - "cmt_id": "2ee85ac1b29dbd2ebd2d8e5ac1dd5793235d516b", - "fixed_version": "5.10.143" + "cmt_id": "ab5595b45f732212b3b1974041b43a257153edb7", + "fixed_version": "5.10.106" }, "5.15": { - "cmt_id": "1a889da60afc017050e1f517b3b976b462846668", - "fixed_version": "5.15.68" + "cmt_id": "ca62747b38f59d4e75967ebf63c992de8852ca1b", + "fixed_version": "5.15.29" }, - "5.19": { - "cmt_id": "8f796f36f5ba839c11eb4685150ebeed496c546f", - "fixed_version": "5.19.9" + "5.16": { + "cmt_id": "58a9bdff32fde29137731e574b17c42592875fd0", + "fixed_version": "5.16.15" }, "5.4": { - "cmt_id": "279c7668e354fa151d5fd2e8c42b5153a1de3135", - "fixed_version": "5.4.213" + "cmt_id": "a9174077febfb1608ec3361622bf5f91e2668d7f", + "fixed_version": "5.4.185" } }, - "CVE-2022-3594": { + "CVE-2022-1012": { "4.14": { - "cmt_id": "f5d6c938d51217d6f0f534f1ee606d9c5eb22fdc", - "fixed_version": "4.14.296" + "cmt_id": "40d20f3186ddd9b6b94598f4ef3d07644b0fa43c", + "fixed_version": "4.14.282" }, "4.19": { - "cmt_id": "88d2a93972c369eb812952aa15a25c1385506c1d", - "fixed_version": "4.19.262" + "cmt_id": "695309c5c71526d32f5539f008bbf20ed2218528", + "fixed_version": "4.19.246" }, "4.9": { - "cmt_id": "3723658c287a98875f43cffc3245d0bf1d3ee076", - "fixed_version": "4.9.331" + "cmt_id": "576696ed0dee677ec868960c39d96ae3b8c95a3f", + "fixed_version": "4.9.320" }, "5.10": { - "cmt_id": "484400d433ca1903a87268c55f019e932297538a", - "fixed_version": "5.10.150" + "cmt_id": "a5c68f457fbf52c5564ca4eea03f84776ef14e41", + "fixed_version": "5.10.119" }, "5.15": { - "cmt_id": "b3179865cf7e892b26eedab3d6c54b4747c774a2", - "fixed_version": "5.15.75" + "cmt_id": "1a8ee547da2b64d6a2aedbd38a691578eff14718", + "fixed_version": "5.15.41" }, - "5.19": { - "cmt_id": "2e896abccf99fef76691d8e1019bd44105a12e1f", - "fixed_version": "5.19.17" + "5.17": { + "cmt_id": "6976724355f5fdada89de528730f9a7b4928f2e3", + "fixed_version": "5.17.9" }, "5.4": { - "cmt_id": "61fd56b0a1a3e923aced4455071177778dd59e88", - "fixed_version": "5.4.220" - }, - "6.0": { - "cmt_id": "21f2532974115026fdab1205aab275d6181fb89f", - "fixed_version": "6.0.3" + "cmt_id": "ab5b00cfe0500f5f5a3648ca945b892156b839fb", + "fixed_version": "5.4.197" } }, - "CVE-2022-3595": { - "6.0": { - "cmt_id": "983ec6379b9bab7bf790aa7df5dc3a461ebad72a", - "fixed_version": "6.0.16" + "CVE-2022-1015": { + "5.15": { + "cmt_id": "1bd57dea456149619f3b80d67eee012122325af8", + "fixed_version": "5.15.32" + }, + "5.16": { + "cmt_id": "2c8ebdaa7c9755b85d90c07530210e83665bad9a", + "fixed_version": "5.16.18" + }, + "5.17": { + "cmt_id": "afdc3f4b81f0ec9f97f0910476af4620a2481a6d", + "fixed_version": "5.17.1" } }, - "CVE-2022-36123": { + "CVE-2022-1016": { "4.14": { - "cmt_id": "a24eebede57ff42d5123cca948c5077ccddbffcb", - "fixed_version": "4.14.289" + "cmt_id": "a3cc32863b175168283cb0a5fde08de6a1e27df9", + "fixed_version": "4.14.274" }, "4.19": { - "cmt_id": "36e2f161fb01795722f2ff1a24d95f08100333dd", - "fixed_version": "4.19.253" + "cmt_id": "88791b79a1eb2ba94e95d039243e28433583a67b", + "fixed_version": "4.19.237" }, "4.9": { - "cmt_id": "b3d7c509bcbd4384d4964dcdf028b3c3e0adb7f7", - "fixed_version": "4.9.324" + "cmt_id": "4d28522acd1c4415c85f6b33463713a268f68965", + "fixed_version": "4.9.309" }, "5.10": { - "cmt_id": "136d7987fcfdeca73ee3c6a29e48f99fdd0f4d87", - "fixed_version": "5.10.132" + "cmt_id": "2c74374c2e88c7b7992bf808d9f9391f7452f9d9", + "fixed_version": "5.10.109" }, "5.15": { - "cmt_id": "26bb7afc027ce6ac8ab6747babec674d55689ff0", - "fixed_version": "5.15.56" + "cmt_id": "fafb904156fbb8f1dd34970cd5223e00b47c33be", + "fixed_version": "5.15.32" }, - "5.18": { - "cmt_id": "2334bdfc2da469c9807767002a2831274b82c39a", - "fixed_version": "5.18.13" + "5.16": { + "cmt_id": "64f24c76dd0ce53d0fa3a0bfb9aeea507c769485", + "fixed_version": "5.16.18" + }, + "5.17": { + "cmt_id": "dd03640529204ef4b8189fbdea08217d8d98271f", + "fixed_version": "5.17.1" }, "5.4": { - "cmt_id": "a3c7c1a726a4c6b63b85e8c183f207543fd75e1b", - "fixed_version": "5.4.207" + "cmt_id": "06f0ff82c70241a766a811ae1acf07d6e2734dcb", + "fixed_version": "5.4.188" } }, - "CVE-2022-3619": { - "5.15": { - "cmt_id": "aa16cac06b752e5f609c106735bd7838f444784c", - "fixed_version": "5.15.78" + "CVE-2022-1043": { + "5.10": { + "cmt_id": "695ab28a7fa107d0350ab19eba8ec89fac45a95d", + "fixed_version": "5.10.61" }, - "6.0": { - "cmt_id": "5b4f039a2f487c5edae681d763fe1af505f84c13", - "fixed_version": "6.0.8" + "5.13": { + "cmt_id": "a57b2a703e4440b9490cc8888618af9b05f2b457", + "fixed_version": "5.13.13" } }, - "CVE-2022-3621": { + "CVE-2022-1048": { "4.14": { - "cmt_id": "1ce68de30b663b79073251162123e57cbed2dc84", - "fixed_version": "4.14.296" + "cmt_id": "a42aa926843acca96c0dfbde2e835b8137f2f092", + "fixed_version": "4.14.279" }, "4.19": { - "cmt_id": "fe8015680f383ea1dadec76972894dfabf8aefaa", - "fixed_version": "4.19.262" - }, - "4.9": { - "cmt_id": "bb63454b66f4a73d4b267fd5061aaf3a5657172c", - "fixed_version": "4.9.331" + "cmt_id": "9cb6c40a6ebe4a0cfc9d6a181958211682cffea9", + "fixed_version": "4.19.243" }, "5.10": { - "cmt_id": "3f840480e31495ce674db4a69912882b5ac083f2", - "fixed_version": "5.10.148" + "cmt_id": "0f6947f5f5208f6ebd4d76a82a4757e2839a23f8", + "fixed_version": "5.10.109" }, "5.15": { - "cmt_id": "1e512c65b4adcdbdf7aead052f2162b079cc7f55", - "fixed_version": "5.15.74" + "cmt_id": "33061d0fba51d2bf70a2ef9645f703c33fe8e438", + "fixed_version": "5.15.32" }, - "5.19": { - "cmt_id": "caf2c6b580433b3d3e413a3d54b8414a94725dcd", - "fixed_version": "5.19.16" + "5.16": { + "cmt_id": "0090c13cbbdffd7da079ac56f80373a9a1be0bf8", + "fixed_version": "5.16.18" }, - "5.4": { - "cmt_id": "792211333ad77fcea50a44bb7f695783159fc63c", - "fixed_version": "5.4.218" + "5.17": { + "cmt_id": "1bbf82d9f961414d6c76a08f7f843ea068e0ab7b", + "fixed_version": "5.17.1" }, - "6.0": { - "cmt_id": "037e760a4a009e9545a51e87c98c22d9aaf32df7", - "fixed_version": "6.0.2" + "5.4": { + "cmt_id": "fbeb492694ce0441053de57699e1e2b7bc148a69", + "fixed_version": "5.4.193" } }, - "CVE-2022-3623": { + "CVE-2022-1055": { "5.10": { - "cmt_id": "fccee93eb20d72f5390432ecea7f8c16af88c850", - "fixed_version": "5.10.159" + "cmt_id": "e7be56926397cf9d992be8913f74a76152f8f08d", + "fixed_version": "5.10.97" }, "5.15": { - "cmt_id": "3a44ae4afaa5318baed3c6e2959f24454e0ae4ff", - "fixed_version": "5.15.78" + "cmt_id": "f36cacd6c933183c1a8827d5987cf2cfc0a44c76", + "fixed_version": "5.15.20" }, - "5.19": { - "cmt_id": "86a913d55c89dd13ba070a87f61a493563e94b54", - "fixed_version": "5.19.17" + "5.16": { + "cmt_id": "95e34f61b58a152656cbe8d6e19843cc343fb089", + "fixed_version": "5.16.6" }, "5.4": { - "cmt_id": "176ba4c19d1bb153aa6baaa61d586e785b7d736c", - "fixed_version": "5.4.228" - }, - "6.0": { - "cmt_id": "7c7c79dd5a388758f8dfa3de89b131d5d84f25fd", - "fixed_version": "6.0.3" + "cmt_id": "b1d17e920dfcd4b56fa2edced5710c191f7e50b5", + "fixed_version": "5.4.177" } }, - "CVE-2022-3625": { + "CVE-2022-1158": { "5.10": { - "cmt_id": "0e28678a770df7989108327cfe86f835d8760c33", - "fixed_version": "5.10.138" + "cmt_id": "e90518d10c7dd59d5ebbe25b0f0083a7dbffa42f", + "fixed_version": "5.10.110" }, "5.15": { - "cmt_id": "c4d09fd1e18bac11c2f7cf736048112568687301", - "fixed_version": "5.15.63" + "cmt_id": "8771d9673e0bdb7148299f3c074667124bde6dff", + "fixed_version": "5.15.33" }, - "5.19": { - "cmt_id": "26bef5616255066268c0e40e1da10cc9b78b82e9", - "fixed_version": "5.19.4" + "5.16": { + "cmt_id": "9a611c57530050dc359a83177c2f97678b1f961e", + "fixed_version": "5.16.19" + }, + "5.17": { + "cmt_id": "5051c04d70c6e035c2c923c04fbe015a4468b08d", + "fixed_version": "5.17.2" }, "5.4": { - "cmt_id": "1ad4ba9341f15412cf86dc6addbb73871a10212f", - "fixed_version": "5.4.211" + "cmt_id": "1553126eccf4fad17afaeaed08db9e5944aa2d55", + "fixed_version": "5.4.189" } }, - "CVE-2022-3628": { + "CVE-2022-1184": { "4.14": { - "cmt_id": "b23665bbd39224e15aab89df4a4b60c0ab2ad09d", - "fixed_version": "4.14.299" + "cmt_id": "d27d3caddbeff10871982d5e25e6557be0fdc29a", + "fixed_version": "4.14.283" }, "4.19": { - "cmt_id": "5e7d546917431400b7d6e5e38f588e0bd13083c9", - "fixed_version": "4.19.265" + "cmt_id": "78398c2b2cc14f9a9c8592cf6d334c5a479ed611", + "fixed_version": "4.19.247" }, "4.9": { - "cmt_id": "b1477d95e967bf626b8c5e3838bb885c47381b24", - "fixed_version": "4.9.333" + "cmt_id": "93bbf0498ba20eadcd7132bd3cfdaff54eb72751", + "fixed_version": "4.9.318" }, "5.10": { - "cmt_id": "c6678c8f4f3f8383fe2dff3455de3d504382638f", - "fixed_version": "5.10.154" + "cmt_id": "da2f05919238c7bdc6e28c79539f55c8355408bb", + "fixed_version": "5.10.121" }, "5.15": { - "cmt_id": "7038af4ce95105146d22e461eaa450829f28eeaf", - "fixed_version": "5.15.78" + "cmt_id": "ca17db384762be0ec38373a12460081d22a8b42d", + "fixed_version": "5.15.46" }, - "5.4": { - "cmt_id": "a16415c8f156bec5399ef0345715ee4b90e5bb83", - "fixed_version": "5.4.224" + "5.17": { + "cmt_id": "4b1cd51256e9267140153f04f4e62148adb2908c", + "fixed_version": "5.17.14" }, - "6.0": { - "cmt_id": "631f73deedeb0fbc92ca5037d5a71c9fcae7974d", - "fixed_version": "6.0.8" + "5.18": { + "cmt_id": "298659c0e7074f774a794fc293df4014617b87be", + "fixed_version": "5.18.3" + }, + "5.4": { + "cmt_id": "17034d45ec443fb0e3c0e7297f9cd10f70446064", + "fixed_version": "5.4.198" } }, - "CVE-2022-36280": { + "CVE-2022-1195": { "4.14": { - "cmt_id": "50d177f90b63ea4138560e500d92be5e4c928186", - "fixed_version": "4.14.303" + "cmt_id": "a7b0ae2cc486fcb601f9f9d87d98138cc7b7f7f9", + "fixed_version": "4.14.260" }, "4.19": { - "cmt_id": "6b4e70a428b5a11f56db94047b68e144529fe512", - "fixed_version": "4.19.270" + "cmt_id": "b68f41c6320b2b7fbb54a95f07a69f3dc7e56c59", + "fixed_version": "4.19.223" + }, + "4.4": { + "cmt_id": "371a874ea06f147d6ca30be43dad33683965eba6", + "fixed_version": "4.4.297" }, "4.9": { - "cmt_id": "ee8d31836cbe7c26e207bfa0a4a726f0a25cfcf6", - "fixed_version": "4.9.337" + "cmt_id": "83ba6ec97c74fb1a60f7779a26b6a94b28741d8a", + "fixed_version": "4.9.295" }, "5.10": { - "cmt_id": "439cbbc1519547f9a7b483f0de33b556ebfec901", - "fixed_version": "5.10.163" + "cmt_id": "7dd52af1eb5798f590d9d9e1c56ed8f5744ee0ca", + "fixed_version": "5.10.89" }, "5.15": { - "cmt_id": "6948e570f54f2044dd4da444b10471373a047eeb", - "fixed_version": "5.15.87" + "cmt_id": "03d00f7f1815ec00dab5035851b3de83afd054a8", + "fixed_version": "5.15.12" }, "5.4": { - "cmt_id": "94b283341f9f3f0ed56a360533766377a01540e0", - "fixed_version": "5.4.229" - }, - "6.0": { - "cmt_id": "4d54d11b49860686331c58a00f733b16a93edfc4", - "fixed_version": "6.0.18" - }, - "6.1": { - "cmt_id": "622d527decaac0eb65512acada935a0fdc1d0202", - "fixed_version": "6.1.4" + "cmt_id": "a5c6a13e9056d87805ba3042c208fbd4164ad22b", + "fixed_version": "5.4.169" } }, - "CVE-2022-3629": { + "CVE-2022-1198": { "4.14": { - "cmt_id": "ec0a5b730cc053202df6b6e6dd6c860977990646", - "fixed_version": "4.14.291" + "cmt_id": "a2793cb58444d4411810cc555eb45b8f4a228018", + "fixed_version": "4.14.276" }, "4.19": { - "cmt_id": "2fc2a7767f661e6083f69588718cdf6f07cb9330", - "fixed_version": "4.19.256" + "cmt_id": "79e2f40c210a47f283bca352745068207798fbb9", + "fixed_version": "4.19.238" }, "4.9": { - "cmt_id": "09fc7ffdf11d20049f3748ccdef57c9a49403214", - "fixed_version": "4.9.326" + "cmt_id": "45d1a63bacf2b6ab27f9b11b5a2431e19d34d01f", + "fixed_version": "4.9.311" }, "5.10": { - "cmt_id": "38ddccbda5e8b762c8ee06670bb1f64f1be5ee50", - "fixed_version": "5.10.138" + "cmt_id": "f67a1400788f550d201c71aeaf56706afe57f0da", + "fixed_version": "5.10.110" }, "5.15": { - "cmt_id": "e4c0428f8a6fc8c218d7fd72bddd163f05b29795", - "fixed_version": "5.15.63" + "cmt_id": "3eb18f8a1d02a9462a0e4903efc674ca3d0406d1", + "fixed_version": "5.15.33" }, - "5.19": { - "cmt_id": "8ff5db3c1b3d6797eda5cd326dcd31b9cd1c5f72", - "fixed_version": "5.19.4" + "5.16": { + "cmt_id": "4356343fb70c899901bce33acedf4fede797d21f", + "fixed_version": "5.16.15" }, "5.4": { - "cmt_id": "f82f1e2042b397277cd39f16349950f5abade58d", - "fixed_version": "5.4.211" - } - }, - "CVE-2022-3630": { - "5.19": { - "cmt_id": "7a369dc87b66acc85d0cffcf39984344a203e20b", - "fixed_version": "5.19.4" + "cmt_id": "28c8fd84bea13cbf238d7b19d392de2fcc31331c", + "fixed_version": "5.4.189" } }, - "CVE-2022-3633": { + "CVE-2022-1199": { + "4.14": { + "cmt_id": "d03aba820f1549c9f3b1d14bf48fa082663d22b5", + "fixed_version": "4.14.272" + }, + "4.19": { + "cmt_id": "5ab8de9377edde3eaf1de9872e2f01d43157cd6c", + "fixed_version": "4.19.235" + }, + "4.9": { + "cmt_id": "cad71f1094834eb69f7ceec8100d300c26b43053", + "fixed_version": "4.9.307" + }, "5.10": { - "cmt_id": "a220ff343396bae8d3b6abee72ab51f1f34b3027", - "fixed_version": "5.10.138" + "cmt_id": "e2201ef32f933944ee02e59205adb566bafcdf91", + "fixed_version": "5.10.106" }, "5.15": { - "cmt_id": "98dc8fb08299ab49e0b9c08daedadd2f4de1a2f2", - "fixed_version": "5.15.63" + "cmt_id": "46ad629e58ce3a88c924ff3c5a7e9129b0df5659", + "fixed_version": "5.15.29" + }, + "5.16": { + "cmt_id": "1d83a95214bc516bd8778fa423cb8383d925f8c8", + "fixed_version": "5.16.15" }, "5.4": { - "cmt_id": "04e41b6bacf474f5431491f92e981096e8cc8e93", - "fixed_version": "5.4.211" + "cmt_id": "0a64aea5fe023cf1e4973676b11f49038b1f045b", + "fixed_version": "5.4.185" } }, - "CVE-2022-3635": { + "CVE-2022-1204": { "4.14": { - "cmt_id": "3db3f3bf05a88635beb7391fca235fb0e5213e6f", - "fixed_version": "4.14.291" + "cmt_id": "c44a453ffe16eb08acdc6129ac4fa0192dbc0456", + "fixed_version": "4.14.277" }, "4.19": { - "cmt_id": "52fddbd9754b249546c89315787075b7247b029d", - "fixed_version": "4.19.256" - }, - "4.9": { - "cmt_id": "acf173d9e27877ac1f4b0fc6614bf7f19ac90894", - "fixed_version": "4.9.326" + "cmt_id": "de55a1338e6a48ff1e41ea8db1432496fbe2a62b", + "fixed_version": "4.19.240" }, "5.10": { - "cmt_id": "a0ae122e9aeccbff75014c4d36d11a9d32e7fb5e", - "fixed_version": "5.10.138" + "cmt_id": "b20a5ab0f5fb175750c6bafd4cf12daccf00c738", + "fixed_version": "5.10.112" }, "5.15": { - "cmt_id": "a5d7ce086fe942c5ab422fd2c034968a152be4c4", - "fixed_version": "5.15.63" + "cmt_id": "452ae92b99062d2f6a34324eaf705a3b7eac9f8b", + "fixed_version": "5.15.35" }, - "5.19": { - "cmt_id": "af412b252550f9ac36d9add7b013c2a2c3463835", - "fixed_version": "5.19.4" + "5.17": { + "cmt_id": "534156dd4ed768e30a43de0036f45dca7c54818f", + "fixed_version": "5.17.2" }, "5.4": { - "cmt_id": "9a6cbaa50f263b12df18a051b37f3f42f9fb5253", - "fixed_version": "5.4.211" + "cmt_id": "9e1e088a57c23251f1cfe9601bbd90ade2ea73b9", + "fixed_version": "5.4.190" } }, - "CVE-2022-3640": { - "6.0": { - "cmt_id": "8f7e4cf0694149a5d999d676ebd9ecf1b4cb2cc9", - "fixed_version": "6.0.8" - } - }, - "CVE-2022-36402": { - "5.10": { - "cmt_id": "8735d1c66c7cf54e7b265a2911891f75674db342", - "fixed_version": "5.10.193" - }, - "5.15": { - "cmt_id": "c8aab333d41a4ed6c5e7987c6cc5505ab86b5652", - "fixed_version": "5.15.129" - }, - "6.1": { - "cmt_id": "115f2ccd3a998fe7247f59f8fb5feffc878bcbb7", - "fixed_version": "6.1.50" - }, - "6.4": { - "cmt_id": "5574b0cbb493f3b3cbb2c381e8e1dac52a70213f", - "fixed_version": "6.4.13" - }, - "6.5": { - "cmt_id": "14abdfae508228a7307f7491b5c4215ae70c6542", - "fixed_version": "6.5" - } - }, - "CVE-2022-3643": { + "CVE-2022-1205": { "4.14": { - "cmt_id": "e173cefc814dec81e9836ecc866cdba154e693cd", - "fixed_version": "4.14.302" + "cmt_id": "331210983ba5ce82bf63b827bca0e1c833f293db", + "fixed_version": "4.14.277" }, "4.19": { - "cmt_id": "44dfdecc288b8d5932e09f5e6a597a089d5a82b2", - "fixed_version": "4.19.269" - }, - "4.9": { - "cmt_id": "1a1d9be7b36ee6cbdeb9d160038834d707256e88", - "fixed_version": "4.9.336" + "cmt_id": "512f09df261b51b088f17d86dbdf300a3492523d", + "fixed_version": "4.19.240" }, "5.10": { - "cmt_id": "49e07c0768dbebff672ee1834eff9680fc6277bf", - "fixed_version": "5.10.159" + "cmt_id": "f934fa478dd17411bc6884153dc824ff9e7505d8", + "fixed_version": "5.10.112" }, "5.15": { - "cmt_id": "0fe29bd92594a747a2561589bd452c259451929e", - "fixed_version": "5.15.83" + "cmt_id": "43c107021d9160f6a1610bafba6dadc0323ae548", + "fixed_version": "5.15.35" + }, + "5.17": { + "cmt_id": "a45dba71849a963c427637b3330e2ccf098f42d1", + "fixed_version": "5.17.2" }, "5.4": { - "cmt_id": "8fe1bf6f32cd5b96ddcd2a38110603fe34753e52", - "fixed_version": "5.4.227" + "cmt_id": "40cb8b3b19c087a4e20f6740701e53fefbe19a7b", + "fixed_version": "5.4.190" + } + }, + "CVE-2022-1263": { + "5.15": { + "cmt_id": "226b4327ef5c88572fc12187193f1b5073c10837", + "fixed_version": "5.15.34" }, - "6.0": { - "cmt_id": "e8851d841fe4f29b613a00de45f39c80dbfdb975", - "fixed_version": "6.0.13" + "5.16": { + "cmt_id": "a1f48251918d825785af9cab83996d4c12ef795a", + "fixed_version": "5.16.20" }, - "6.1": { - "cmt_id": "ad7f402ae4f466647c3a669b8a6f3e5d4271c84a", - "fixed_version": "6.1" + "5.17": { + "cmt_id": "e8d7f0dad29e634e26d4614cfbd081514c16e042", + "fixed_version": "5.17.3" } }, - "CVE-2022-3646": { + "CVE-2022-1353": { "4.14": { - "cmt_id": "a832de79d82ac8c9f445f99069e11b17c5d2224a", - "fixed_version": "4.14.296" + "cmt_id": "fcdaaeb7eb5d52941ceb2fdcec0e2170c9bf3031", + "fixed_version": "4.14.276" }, "4.19": { - "cmt_id": "4b748ef0f2afadd31c914623daa610f26385a4dc", - "fixed_version": "4.19.262" + "cmt_id": "693fe8af9a2625139de07bd1ae212a7d89c37795", + "fixed_version": "4.19.238" }, "4.9": { - "cmt_id": "81fe58e4e7f61a1f5200898e7cd4c9748f83051f", - "fixed_version": "4.9.331" + "cmt_id": "7b0e01a9b7f2aaeb6fa73b35864b1d7dc6e795c4", + "fixed_version": "4.9.311" }, "5.10": { - "cmt_id": "aad4c997857f1d4b6c1e296c07e4729d3f8058ee", - "fixed_version": "5.10.148" + "cmt_id": "8d3f4ad43054619379ccc697cfcbdb2c266800d8", + "fixed_version": "5.10.110" }, "5.15": { - "cmt_id": "44b1ee304bac03f1b879be5afe920e3a844e40fc", - "fixed_version": "5.15.74" + "cmt_id": "d06ee4572fd916fbb34d16dc81eb37d1dff83446", + "fixed_version": "5.15.33" }, - "5.19": { - "cmt_id": "4755fcd844240857b525f6e8d8b65ee140fe9570", - "fixed_version": "5.19.16" + "5.16": { + "cmt_id": "16d974fa4ddda389bf58bb5e4fc8cad8910ba66d", + "fixed_version": "5.16.19" }, - "5.4": { - "cmt_id": "b7e409d11db9ce9f8bc05fcdfa24d143f60cd393", - "fixed_version": "5.4.218" + "5.17": { + "cmt_id": "9a564bccb78a76740ea9d75a259942df8143d02c", + "fixed_version": "5.17" }, - "6.0": { - "cmt_id": "9dc48a360e7b6bb16c48625f8f80ab7665bc9648", - "fixed_version": "6.0.2" + "5.4": { + "cmt_id": "ef388db2fe351230ff7194b37d507784bef659ec", + "fixed_version": "5.4.189" } }, - "CVE-2022-3649": { + "CVE-2022-1419": { "4.14": { - "cmt_id": "26b9b66610d6f8f3333cb6f52e97745da875fee1", - "fixed_version": "4.14.296" + "cmt_id": "d2b8e8fbac9f175388d2808ade90d86402642b01", + "fixed_version": "4.14.278" }, "4.19": { - "cmt_id": "bfc82a26545b5f61a64d51ca2179773706fb028f", - "fixed_version": "4.19.262" - }, - "4.9": { - "cmt_id": "a9043a24c6e340d45b204d294a25044726fd2770", - "fixed_version": "4.9.331" - }, - "5.10": { - "cmt_id": "21ee3cffed8fbabb669435facfd576ba18ac8652", - "fixed_version": "5.10.148" - }, - "5.15": { - "cmt_id": "cb602c2b654e26763226d8bd27a702f79cff4006", - "fixed_version": "5.15.74" + "cmt_id": "df2c1f38939aabb8c6beca108f08b90f050b9ebc", + "fixed_version": "4.19.242" }, "5.4": { - "cmt_id": "d1c2d820a2cd73867b7d352e89e92fb3ac29e926", - "fixed_version": "5.4.220" + "cmt_id": "3ea7f138cec139be98f8bb9fc1a6b432003f834e", + "fixed_version": "5.4.21" }, - "6.0": { - "cmt_id": "6251c9c0430d70cc221d0bb907b278bd99d7b066", - "fixed_version": "6.0.2" + "5.5": { + "cmt_id": "c578f31bba29d2c6a97d2ad279ae3cd261dcc786", + "fixed_version": "5.5.5" } }, - "CVE-2022-36879": { + "CVE-2022-1462": { "4.14": { - "cmt_id": "2c9d93e35cb857fc613ec9d58d690d332252747b", + "cmt_id": "e9274a2732e1de3ca36076126284b4e5ffe6d587", "fixed_version": "4.14.290" }, "4.19": { - "cmt_id": "fdb4fba1ba8512fa579a9d091dcb6c410f82f96a", + "cmt_id": "eb059bf8c237fe41fbaed4a6cccacce687b83222", "fixed_version": "4.19.254" }, "4.9": { - "cmt_id": "5aff12fa09504c6ea88fc17749a39cda2c4d6ef7", + "cmt_id": "41ce14090db93fc2f0c8a27ce8a324b0192da7b5", "fixed_version": "4.9.325" }, "5.10": { - "cmt_id": "47b696dd654450cdec3103a833e5bf29c4b83bfa", + "cmt_id": "08afa87f58d83dfe040572ed591b47e8cb9e225c", "fixed_version": "5.10.134" }, "5.15": { - "cmt_id": "c8e32bca0676ac663266a3b16562cb017300adcd", + "cmt_id": "b2d1e4cd558cffec6bfe318f5d74e6cffc374d29", "fixed_version": "5.15.58" }, "5.18": { - "cmt_id": "70f5e35cd5e38017653ed1ca0f7a4ab6d5c5a794", - "fixed_version": "5.18.15" + "cmt_id": "fa3302714c03e4e6c9b5aad5dacae33e75f76cf7", + "fixed_version": "5.18.13" }, "5.4": { - "cmt_id": "f4248bdb7d5c1150a2a6f8c3d3b6da0b71f62a20", + "cmt_id": "f7785092cb7f022f59ebdaa181651f7c877df132", "fixed_version": "5.4.208" } }, - "CVE-2022-36946": { + "CVE-2022-1516": { "4.14": { - "cmt_id": "83636c64b796a7e44fa72f371777f803c1ef9e74", - "fixed_version": "4.14.291" + "cmt_id": "858642789ada1b48630f322e59416ca9fca3e6b7", + "fixed_version": "4.14.276" }, "4.19": { - "cmt_id": "f295d365b30626f82423a923695274024016380e", - "fixed_version": "4.19.255" + "cmt_id": "4c240c5a105557e4546d0836e694868f22fd09b0", + "fixed_version": "4.19.238" }, "4.9": { - "cmt_id": "3b3e2de462323d5fdeb85a3682334a4a3dd07400", - "fixed_version": "4.9.326" + "cmt_id": "dffc859d1d9560da594e4282091781b8d2715f00", + "fixed_version": "4.9.311" }, "5.10": { - "cmt_id": "440dccd80f627e0e11ceb0429e4cdab61857d17e", - "fixed_version": "5.10.135" + "cmt_id": "5c94b6205e87411dbe9dc1ca088eb36b8837fb47", + "fixed_version": "5.10.110" }, "5.15": { - "cmt_id": "91c11008aab0282957b8b8ccb0707d90e74cc3b9", - "fixed_version": "5.15.59" + "cmt_id": "409570a619c1cda2e0fde6018a256b9e3d3ba0ee", + "fixed_version": "5.15.33" }, - "5.18": { - "cmt_id": "883c20911d6261fc651820b63a77327b8c020264", - "fixed_version": "5.18.16" + "5.16": { + "cmt_id": "4a279d7ee1c65411b4055ecd428b8aa2b1711c1f", + "fixed_version": "5.16.19" }, - "5.19": { - "cmt_id": "99a63d36cb3ed5ca3aa6fcb64cffbeaf3b0fb164", - "fixed_version": "5.19" + "5.17": { + "cmt_id": "671529db75e6be777bb1c76aa07c2bdd2992be6d", + "fixed_version": "5.17.2" }, "5.4": { - "cmt_id": "52be29e8b6455788a4d0f501bd87aa679ca3ba3c", - "fixed_version": "5.4.209" + "cmt_id": "9acf05b4e7b55fdb712ef7b331dbce5bcd391d0f", + "fixed_version": "5.4.189" } }, - "CVE-2022-3707": { + "CVE-2022-1651": { + "5.15": { + "cmt_id": "1d5103d9bb7d42fc220afe9f01ec6b9fe0ea5773", + "fixed_version": "5.15.33" + }, + "5.16": { + "cmt_id": "ee827d86ee73583c0f0b65db877467d9b5551aa4", + "fixed_version": "5.16.19" + }, + "5.17": { + "cmt_id": "f8e6e18d117e461110c849a11c6a396dcccdbd4e", + "fixed_version": "5.17.2" + } + }, + "CVE-2022-1652": { + "4.14": { + "cmt_id": "dc650d53bad770f169e498f1231671c51b0b321d", + "fixed_version": "4.14.281" + }, "4.19": { - "cmt_id": "c5245a6cf83ca5c4b68d643f8b31ed0eb127126e", - "fixed_version": "4.19.274" + "cmt_id": "3392d8711ad9e5b688999c948fd36d798c0d075d", + "fixed_version": "4.19.245" + }, + "4.9": { + "cmt_id": "2adafe1c646b462c755e99216f966927eec96059", + "fixed_version": "4.9.316" }, "5.10": { - "cmt_id": "3d743415c6fb092167df6c23e9c7e9f6df7db625", - "fixed_version": "5.10.170" + "cmt_id": "911b36267855501f7f80a75927c128c0ac03fe58", + "fixed_version": "5.10.118" }, "5.15": { - "cmt_id": "0d3d5099a50badadad6837edda00e42149b2f657", - "fixed_version": "5.15.96" - }, - "5.4": { - "cmt_id": "787ef0db014085df8691e5aeb58ab0bb081e5ff0", - "fixed_version": "5.4.233" + "cmt_id": "fc2bee93e31bbba920e9eeba76af72264ced066f", + "fixed_version": "5.15.42" }, - "6.0": { - "cmt_id": "bb84f2e119accfc65d5fa6ebe31751cdc3bca9fb", - "fixed_version": "6.0.19" + "5.17": { + "cmt_id": "88887ced7803132ed357a42d050560a2fb5c7ce6", + "fixed_version": "5.17.10" }, - "6.1": { - "cmt_id": "1022519da69d99d455c58ca181a6c499c562c70e", - "fixed_version": "6.1.5" + "5.4": { + "cmt_id": "67e2b62461b5d02a1e63103e8a02c0bca75e26c7", + "fixed_version": "5.4.196" } }, - "CVE-2022-38457": { - "6.1": { - "cmt_id": "7ac9578e45b20e3f3c0c8eb71f5417a499a7226a", - "fixed_version": "6.1.7" - } - }, - "CVE-2022-3910": { - "5.19": { - "cmt_id": "d50c30b66f040f1a7e3202a95f07c2084f5ca30f", - "fixed_version": "5.19.11" - } - }, - "CVE-2022-39189": { - "5.10": { - "cmt_id": "529f41f0eb1ef995bfa83c121c3cfe3a0720119a", - "fixed_version": "5.10.180" - }, + "CVE-2022-1671": { "5.15": { - "cmt_id": "92343314d34e04da0923cefd3be67521d706fa35", - "fixed_version": "5.15.60" - }, - "5.18": { - "cmt_id": "719492d2bc3b99c067076bddc62e63cda8ad16e2", - "fixed_version": "5.18.17" - }, - "5.4": { - "cmt_id": "1eb3e32de7b1f6ed927dfff3ab3651ce25f3d516", - "fixed_version": "5.4.244" - } - }, - "CVE-2022-39190": { - "5.10": { - "cmt_id": "c08a104a8bce832f6e7a4e8d9ac091777b9982ea", - "fixed_version": "5.10.140" + "cmt_id": "432297011caf71dbc95c3365a65adf365e79aff3", + "fixed_version": "5.15.33" }, - "5.15": { - "cmt_id": "51f192ae71c3431aa69a988449ee2fd288e57648", - "fixed_version": "5.15.64" + "5.16": { + "cmt_id": "c3c415ae0c82da1349d85b8c9b18e6480aa6a230", + "fixed_version": "5.16.19" }, - "5.19": { - "cmt_id": "fdca693fcf26c11596e7aa1e540af2b4a5288c76", - "fixed_version": "5.19.6" + "5.17": { + "cmt_id": "4e1f670e1b440dc783dbeb881d575bca31474f73", + "fixed_version": "5.17.2" } }, - "CVE-2022-3977": { - "6.0": { - "cmt_id": "3c7c84319833259b0bb8c879928700c9e42d6562", - "fixed_version": "6.0.2" + "CVE-2022-1678": { + "4.19": { + "cmt_id": "0a70f118475e037732557796accd0878a00fc25a", + "fixed_version": "4.19.228" } }, - "CVE-2022-39842": { + "CVE-2022-1679": { "4.14": { - "cmt_id": "9556a88a16e381dbd6834da95206742d0973afc6", - "fixed_version": "4.14.295" + "cmt_id": "62bc1ea5c7401d77eaf73d0c6a15f3d2e742856e", + "fixed_version": "4.14.291" }, "4.19": { - "cmt_id": "a34547fc43d02f2662b2b62c9a4c578594cf662d", - "fixed_version": "4.19.260" - }, - "4.9": { - "cmt_id": "a0dcaa48042a56a9eee2efed19563866a0ddbce2", - "fixed_version": "4.9.330" + "cmt_id": "ab7a0ddf5f1cdec63cb21840369873806fc36d80", + "fixed_version": "4.19.256" }, "5.10": { - "cmt_id": "06e194e1130c98f82d46beb40cdbc88a0d4fd6de", - "fixed_version": "5.10.145" + "cmt_id": "eccd7c3e2596b574241a7670b5b53f5322f470e5", + "fixed_version": "5.10.137" }, "5.15": { - "cmt_id": "ab5140c6ddd7473509e12f468948de91138b124e", - "fixed_version": "5.15.70" + "cmt_id": "03ca957c5f7b55660957eda20b5db4110319ac7a", + "fixed_version": "5.15.61" + }, + "5.18": { + "cmt_id": "6b14ab47937ba441e75e8dbb9fbfc9c55efa41c6", + "fixed_version": "5.18.18" + }, + "5.19": { + "cmt_id": "b66ebac40f64336ae2d053883bee85261060bd27", + "fixed_version": "5.19.2" }, "5.4": { - "cmt_id": "1878eaf0edb8c9e58a6ca0cf31b7a647ca346be9", - "fixed_version": "5.4.215" - } - }, - "CVE-2022-40133": { - "6.1": { - "cmt_id": "7ac9578e45b20e3f3c0c8eb71f5417a499a7226a", - "fixed_version": "6.1.7" + "cmt_id": "e9e21206b8ea62220b486310c61277e7ebfe7cec", + "fixed_version": "5.4.211" } }, - "CVE-2022-40307": { + "CVE-2022-1729": { "4.14": { - "cmt_id": "233d5c4d18971feee5fc2f33f00b63d8205cfc67", - "fixed_version": "4.14.293" + "cmt_id": "dee63319e2d1abd5d37a89de046ccf32ca8a8451", + "fixed_version": "4.14.281" }, "4.19": { - "cmt_id": "021805af5bedeafc76c117fc771c100b358ab419", - "fixed_version": "4.19.258" + "cmt_id": "6cdd53a49aa7413e53c14ece27d826f0b628b18a", + "fixed_version": "4.19.245" + }, + "4.9": { + "cmt_id": "a1466528d8ae5d9a3bb29781f0098fa3476e9e1c", + "fixed_version": "4.9.316" }, "5.10": { - "cmt_id": "918d9c4a4bdf5205f2fb3f64dddfb56c9a1d01d6", - "fixed_version": "5.10.143" + "cmt_id": "3ee8e109c3c316073a3e0f83ec0769c7ee8a7375", + "fixed_version": "5.10.118" }, "5.15": { - "cmt_id": "dd291e070be0eca8807476b022bda00c891d9066", - "fixed_version": "5.15.68" + "cmt_id": "e085354dde254bc6c83ee604ea66c2b36f9f9067", + "fixed_version": "5.15.42" }, - "5.19": { - "cmt_id": "d46815a8f26ca6db2336106a148265239f73b0af", - "fixed_version": "5.19.9" + "5.17": { + "cmt_id": "22fb2974224c9836eeaf0d24fdd481fcdaa0aea8", + "fixed_version": "5.17.10" + }, + "5.18": { + "cmt_id": "3ac6487e584a1eb54071dbe1212e05b884136704", + "fixed_version": "5.18" }, "5.4": { - "cmt_id": "8028ff4cdbb3f20d3c1c04be33a83bab0cb94997", - "fixed_version": "5.4.213" + "cmt_id": "dd0ea88b0a0f913f82500e988ef38158a9ad9885", + "fixed_version": "5.4.196" } }, - "CVE-2022-40768": { + "CVE-2022-1734": { "4.14": { - "cmt_id": "5c8395d775ca9044b361af4a19b2ff223485be35", - "fixed_version": "4.14.296" + "cmt_id": "ced30680fb1c7c1daae39a9384d23cd1a022585f", + "fixed_version": "4.14.278" }, "4.19": { - "cmt_id": "a99c5e38dc6c3dc3da28489b78db09a4b9ffc8c3", - "fixed_version": "4.19.262" + "cmt_id": "b266f492b2af82269aaaab871ac3949420ae678c", + "fixed_version": "4.19.242" }, "4.9": { - "cmt_id": "35db0282da84ad200054ad5af0fd6c2f693b17f8", - "fixed_version": "4.9.331" + "cmt_id": "4721695be941626e4b18b89e0641e36fc385cfd8", + "fixed_version": "4.9.313" }, "5.10": { - "cmt_id": "36b33c63515a93246487691046d18dd37a9f589b", - "fixed_version": "5.10.148" + "cmt_id": "1961c5a688edb53fe3bc25cbda57f47adf12563c", + "fixed_version": "5.10.115" }, "5.15": { - "cmt_id": "76efb4897bc38b2f16176bae27ae801037ebf49a", - "fixed_version": "5.15.74" + "cmt_id": "b8f2b836e7d0a553b886654e8b3925a85862d2eb", + "fixed_version": "5.15.39" }, - "5.19": { - "cmt_id": "6ae8aa5dcf0d7ada07964c8638e55d3af5896a86", - "fixed_version": "5.19.16" + "5.17": { + "cmt_id": "f4bfbac45121c8638db5eacb1ebbb61ee956c668", + "fixed_version": "5.17.7" }, "5.4": { - "cmt_id": "20a5bde605979af270f94b9151f753ec2caf8b05", - "fixed_version": "5.4.218" + "cmt_id": "33d3e76fc7a7037f402246c824d750542e2eb37f", + "fixed_version": "5.4.193" + } + }, + "CVE-2022-1786": { + "5.10": { + "cmt_id": "29f077d070519a88a793fbc70f1e6484dc6d9e35", + "fixed_version": "5.10.117" + } + }, + "CVE-2022-1789": { + "5.10": { + "cmt_id": "9b4aa0d80b18b9d19e62dd47d22e274ce92cdc95", + "fixed_version": "5.10.119" }, - "6.0": { - "cmt_id": "b9b7369d89924a366b20045dc26dc4dc6b0567a4", - "fixed_version": "6.0.2" + "5.15": { + "cmt_id": "acd12d16528152b32fa09be2c5ef95047f69af05", + "fixed_version": "5.15.44" + }, + "5.17": { + "cmt_id": "19a66796d1f0dd4ce4b05f76d53ce1d0a7dc817d", + "fixed_version": "5.17.12" + }, + "5.18": { + "cmt_id": "9f46c187e2e680ecd9de7983e4d081c3391acc76", + "fixed_version": "5.18" } }, - "CVE-2022-4095": { + "CVE-2022-1836": { "4.14": { - "cmt_id": "376e15487fec837301d888068a3fcc82efb6171a", - "fixed_version": "4.14.293" + "cmt_id": "b7fa84ae1171a3c5ea5d710899080a6e63cfe084", + "fixed_version": "4.14.278" }, "4.19": { - "cmt_id": "9fd6170c5e2d0ccd027abe26f6f5ffc528e1bb27", - "fixed_version": "4.19.258" + "cmt_id": "0e535976774504af36fab1dfb54f3d4d6cc577a9", + "fixed_version": "4.19.241" }, "4.9": { - "cmt_id": "7dce6b0ee7d78667d6c831ced957a08769973063", - "fixed_version": "4.9.328" + "cmt_id": "0dd02ff72c6daf4e7800fb5dd1109fbacdde97dc", + "fixed_version": "4.9.313" }, "5.10": { - "cmt_id": "19e3f69d19801940abc2ac37c169882769ed9770", - "fixed_version": "5.10.142" + "cmt_id": "54c028cfc49624bfc27a571b94edecc79bbaaab4", + "fixed_version": "5.10.114" }, "5.15": { - "cmt_id": "dc02aaf950015850e7589696521c7fca767cea77", - "fixed_version": "5.15.66" + "cmt_id": "e52da8e4632f9c8fe78bf1c5881ce6871c7e08f3", + "fixed_version": "5.15.37" }, - "5.19": { - "cmt_id": "b1727def850904e4b8ba384043775672841663a1", - "fixed_version": "5.19.8" + "5.17": { + "cmt_id": "d91ca05d52fabf68c0376bcfeed1a52be68a8e1b", + "fixed_version": "5.17.6" }, "5.4": { - "cmt_id": "d0aac7146e96bf39e79c65087d21dfa02ef8db38", - "fixed_version": "5.4.213" + "cmt_id": "7dea5913000c6a2974a00d9af8e7ffb54e47eac1", + "fixed_version": "5.4.192" } }, - "CVE-2022-40982": { - "4.14": { - "cmt_id": "cdc2724c9d060a8fa9652a9aa6347d8324f6cd82", - "fixed_version": "4.14.321" - }, - "4.19": { - "cmt_id": "e81494b7259b6b1ab81a9f9be3385b4aa99a7a59", - "fixed_version": "4.19.290" - }, + "CVE-2022-1852": { "5.10": { - "cmt_id": "288a2f6bc1ce03ddb3f05fd8c79b00d5d7160b4a", - "fixed_version": "5.10.189" + "cmt_id": "3d8fc6e28f321d753ab727e3c3e740daf36a8fa3", + "fixed_version": "5.10.120" }, "5.15": { - "cmt_id": "348a89e2018428c3e55a87cdd9ae3cbd6cc8248a", - "fixed_version": "5.15.125" - }, - "5.4": { - "cmt_id": "f68f9f2df68e246548bdc1a2279c55f98c4ca473", - "fixed_version": "5.4.252" + "cmt_id": "531d1070d864c78283b7597449e60ddc53319d88", + "fixed_version": "5.15.45" }, - "6.1": { - "cmt_id": "c66ebe070d9641c9339e42e1c2d707a5052e9904", - "fixed_version": "6.1.44" + "5.17": { + "cmt_id": "dca5ea67a3e627a3022fe58722a2807c1ef61c29", + "fixed_version": "5.17.13" }, - "6.4": { - "cmt_id": "ff0642207e24f9a7011e8982ab7da1e16db75a38", - "fixed_version": "6.4.9" + "5.18": { + "cmt_id": "02ea15c02befea2539d5f0d6b60ce8df88de418b", + "fixed_version": "5.18.2" } }, - "CVE-2022-41218": { + "CVE-2022-1882": { + "5.18": { + "cmt_id": "49cbb4820e4f1895130755732485afb2d18508f9", + "fixed_version": "5.18.15" + } + }, + "CVE-2022-1943": { + "5.15": { + "cmt_id": "9e951f2d85c9430ea8ae0c8448e47e3c234f1580", + "fixed_version": "5.15.40" + }, + "5.17": { + "cmt_id": "cfd64b858cb2b56969138df7970cb0b7f2388fb0", + "fixed_version": "5.17.8" + } + }, + "CVE-2022-1966": { "4.14": { - "cmt_id": "8d904e99c10e2e443c6c7c418541880513eb9790", - "fixed_version": "4.14.303" + "cmt_id": "5b732a9e8e22395d911b3e6c343cbed0e1cec275", + "fixed_version": "4.14.283" }, "4.19": { - "cmt_id": "8f537a1282cd877f132643ef8f9e9d6032f90025", - "fixed_version": "4.19.270" + "cmt_id": "ed44398b45add3d9be56b7457cc9e05282e518b4", + "fixed_version": "4.19.247" + }, + "4.9": { + "cmt_id": "94e9b75919619ba8c4072abc4917011a7a888a79", + "fixed_version": "4.9.318" }, "5.10": { - "cmt_id": "3df07728abde249e2d3f47cf22f134cb4d4f5fb1", - "fixed_version": "5.10.163" + "cmt_id": "ea62d169b6e731e0b54abda1d692406f6bc6a696", + "fixed_version": "5.10.120" }, "5.15": { - "cmt_id": "8b45a3b19a2e909e830d09a90a7e1ec8601927d9", - "fixed_version": "5.15.87" + "cmt_id": "f692bcffd1f2ce5488d24fbcb8eab5f351abf79d", + "fixed_version": "5.15.45" }, - "5.4": { - "cmt_id": "a29d6213098816ed4574824b6adae94fb1c0457d", - "fixed_version": "5.4.229" + "5.17": { + "cmt_id": "d8db0465bcc4d4b54ecfb67b820ed26eb1440da7", + "fixed_version": "5.17.13" }, - "6.0": { - "cmt_id": "55870fc9e45faa9a65860bcd6b0f8ca8c99afe44", - "fixed_version": "6.0.18" + "5.18": { + "cmt_id": "8f44c83e51b4ca49c815f8dd0d9c38f497cdbcb0", + "fixed_version": "5.18.2" }, - "6.1": { - "cmt_id": "530ca64b44625f7d39eb1d5efb6f9ff21da991e2", - "fixed_version": "6.1.4" + "5.4": { + "cmt_id": "f36736fbd48491a8d85cd22f4740d542c5a1546e", + "fixed_version": "5.4.198" } }, - "CVE-2022-41222": { + "CVE-2022-1972": { "5.10": { - "cmt_id": "2613baa3ab2153cc45b175c58700d93f72ef36c4", - "fixed_version": "5.10.137" + "cmt_id": "c0aff1faf66b6b7a19103f83e6a5d0fdc64b9048", + "fixed_version": "5.10.120" }, - "5.12": { - "cmt_id": "864c4d1d25170def283b2bf87726218126634f04", - "fixed_version": "5.12.18" + "5.15": { + "cmt_id": "89ef50fe03a55feccf5681c237673a2f98161161", + "fixed_version": "5.15.45" }, - "5.13": { - "cmt_id": "987a852734e668e0829cf65dd182e44a03064800", - "fixed_version": "5.13.3" + "5.17": { + "cmt_id": "c88f3e3d243d701586239c5b69356ec2b1fd05f1", + "fixed_version": "5.17.13" }, - "5.4": { - "cmt_id": "79e522101cf40735f1936a10312e17f937b8dcad", - "fixed_version": "5.4.211" - } - }, - "CVE-2022-4128": { "5.18": { - "cmt_id": "ff151c477f6a529b0e4643d90f4f0b8eca85de04", - "fixed_version": "5.18.13" + "cmt_id": "c9a46a3d549286861259c19af4747e12cfaeece9", + "fixed_version": "5.18.2" } }, - "CVE-2022-4129": { - "5.10": { - "cmt_id": "e34a965f771f1977f172593c73e373036c765724", - "fixed_version": "5.10.166" - }, + "CVE-2022-1973": { "5.15": { - "cmt_id": "87d9205d9a57dfc1f39f840b32e38475c3f523f6", - "fixed_version": "5.15.91" + "cmt_id": "61decb58486d7c0cbded25fe4d301ab4fa148cd8", + "fixed_version": "5.15.46" }, - "5.4": { - "cmt_id": "7188c37f3c2527086aa46cbb37060fa73b144c65", - "fixed_version": "5.4.231" - } - }, - "CVE-2022-4139": { - "6.0": { - "cmt_id": "aef39675ad33317c8badc0165ea882e172a633e6", - "fixed_version": "6.0.11" + "5.17": { + "cmt_id": "2088cc00491e8d25a99d0f247df843e9c3df2040", + "fixed_version": "5.17.14" + }, + "5.18": { + "cmt_id": "2aafbe9fb210a355d6e0e92a91f294dee80e5d44", + "fixed_version": "5.18.3" } }, - "CVE-2022-41674": { + "CVE-2022-1974": { + "4.14": { + "cmt_id": "6f0ac4cd0377ab4e0b49b8f6efd37057c21336a9", + "fixed_version": "4.14.278" + }, + "4.19": { + "cmt_id": "7deebb94a311da0e02e621e765c3aef3d5936572", + "fixed_version": "4.19.242" + }, + "4.9": { + "cmt_id": "fa2217b66467917a623993c14d671661ad625fb6", + "fixed_version": "4.9.313" + }, "5.10": { - "cmt_id": "a6408e0b694c1bdd8ae7dd0464a86b98518145ec", - "fixed_version": "5.10.148" + "cmt_id": "8a9e7c64f4a02c4c397e55ba379609168ec7df4a", + "fixed_version": "5.10.115" }, "5.15": { - "cmt_id": "9a8ef2030510a9d6ce86fd535b8d10720230811f", - "fixed_version": "5.15.74" + "cmt_id": "a2168fb3128a576d0175443403c15dcf8bf128f6", + "fixed_version": "5.15.39" }, - "5.19": { - "cmt_id": "42ea11a81ac853c3e870c70d61ab435d0b09b851", - "fixed_version": "5.19.16" + "5.17": { + "cmt_id": "8b58d6e565d83443c51b3fc076bd4472674aca0c", + "fixed_version": "5.17.7" }, "5.4": { - "cmt_id": "020402c7dd587a8a4725d32bbd172a5f7ecc5f8f", - "fixed_version": "5.4.218" - }, - "6.0": { - "cmt_id": "fc1ed6d0c9898a68da7f1f7843560dfda57683e2", - "fixed_version": "6.0.2" + "cmt_id": "85aecdef77f9c5b5c0d8988db6681960f0d46ab3", + "fixed_version": "5.4.193" } }, - "CVE-2022-41849": { + "CVE-2022-1975": { "4.14": { - "cmt_id": "fa008859983d9231b9241a4b9eac7aabfbb45155", - "fixed_version": "4.14.296" + "cmt_id": "c33b2afffe8ae90e0bd4790e0505edd92addf14c", + "fixed_version": "4.14.278" }, "4.19": { - "cmt_id": "6d8dbefc4de96d35d68c723e2e75b5a23173c08c", - "fixed_version": "4.19.262" + "cmt_id": "d360fc8df363ecd7892d755d69ffc8c61d699e38", + "fixed_version": "4.19.242" }, "4.9": { - "cmt_id": "347a969b130c2a496f471f14b354119b82664f0a", - "fixed_version": "4.9.331" + "cmt_id": "a93ea9595fde438996d7b9322749d4d1921162f7", + "fixed_version": "4.9.313" }, "5.10": { - "cmt_id": "e50472949604f385e09ce3fa4e74dce9f44fb19b", - "fixed_version": "5.10.150" + "cmt_id": "879b075a9a364a325988d4484b74311edfef82a1", + "fixed_version": "5.10.115" }, "5.15": { - "cmt_id": "2b0897e33682a332167b7d355eec28693b62119e", - "fixed_version": "5.15.75" + "cmt_id": "7bd81a05d48942ef2c48630e5e7963b187e95727", + "fixed_version": "5.15.39" }, - "5.4": { - "cmt_id": "3742e9fd552e6c4193ebc5eb3d2cd02d429cad9c", - "fixed_version": "5.4.220" + "5.17": { + "cmt_id": "63a545103b77091f2309b44a8975cdf255bb99b2", + "fixed_version": "5.17.7" }, - "6.0": { - "cmt_id": "e2e5264dcf5796559869750a2d6943ac88fe3918", - "fixed_version": "6.0.3" + "5.4": { + "cmt_id": "01d4363dd7176fd780066cd020f66c0f55c4b6f9", + "fixed_version": "5.4.193" } }, - "CVE-2022-41850": { - "4.14": { - "cmt_id": "fb8b43b7721786f551ec95542e07cf9a909f3e56", - "fixed_version": "4.14.296" + "CVE-2022-1976": { + "5.18": { + "cmt_id": "bba36a27c38650eefc79d18c33a0acd0dcbeabb8", + "fixed_version": "5.18.6" + } + }, + "CVE-2022-1998": { + "5.10": { + "cmt_id": "7b4741644cf718c422187e74fb07661ef1d68e85", + "fixed_version": "5.10.97" }, - "4.19": { - "cmt_id": "13de81c7ea0fd68efb48a2d2957e349237905923", - "fixed_version": "4.19.262" + "5.15": { + "cmt_id": "60765e43e40fbf7a1df828116172440510fcc3e4", + "fixed_version": "5.15.20" }, - "4.9": { - "cmt_id": "84607bd3a8542b84b450d19a3579172f96c2bb47", - "fixed_version": "4.9.331" + "5.16": { + "cmt_id": "dea4fec0d87d4401b5d2717aa7c6c6cad050fb62", + "fixed_version": "5.16.6" + } + }, + "CVE-2022-20008": { + "4.19": { + "cmt_id": "c91b06297563e84ac072464fe6cc141cc15435f0", + "fixed_version": "4.19.231" }, "5.10": { - "cmt_id": "dbcca76435a606a352c794956e6df62eedd3a353", - "fixed_version": "5.10.150" + "cmt_id": "ab2b4e65a130d67478bd5b35ca9004b2075805fa", + "fixed_version": "5.10.102" }, "5.15": { - "cmt_id": "c61786dc727d1850336d12c85a032c9a36ae396d", - "fixed_version": "5.15.75" + "cmt_id": "f3ff5f75d8f6367eac7556c9db1227bb43e5c615", + "fixed_version": "5.15.25" }, - "5.4": { - "cmt_id": "e30c3a9a88818e5cf3df3fda6ab8388bef3bc6cd", - "fixed_version": "5.4.220" + "5.16": { + "cmt_id": "cccf23c660cc96c5687335d73cad103e983e6165", + "fixed_version": "5.16.11" }, - "6.0": { - "cmt_id": "8a251549ab577d64ece210a11c404354479bd635", - "fixed_version": "6.0.3" + "5.4": { + "cmt_id": "902528183f4d94945a0c1ed6048d4a5d4e1e712e", + "fixed_version": "5.4.181" } }, - "CVE-2022-41858": { + "CVE-2022-20132": { "4.14": { - "cmt_id": "3fdb033f8f8c978489c7702a4a44494b7ae63424", - "fixed_version": "4.14.276" + "cmt_id": "43cc4686b15d7d3a2b65b125393ea3f3d477e7d1", + "fixed_version": "4.14.258" }, "4.19": { - "cmt_id": "753b9d220a7d36dac70e7c6d05492d10d6f9dd36", - "fixed_version": "4.19.239" + "cmt_id": "b1efa723b986a84f84a95b6907cffe3a357338c9", + "fixed_version": "4.19.221" + }, + "4.4": { + "cmt_id": "6a0bc60a84cb5186a84e7501616dacfd9e991b54", + "fixed_version": "4.4.295" }, "4.9": { - "cmt_id": "113284fe48770841e157e338bf3a2e9f197a8b50", - "fixed_version": "4.9.311" + "cmt_id": "28d8244f3ec961a11bfb4ad83cdc48ff9b8c47a7", + "fixed_version": "4.9.293" }, "5.10": { - "cmt_id": "ca24c5e8f0ac3d43ec0cff29e1c861be73aff165", - "fixed_version": "5.10.112" + "cmt_id": "61144329606cb9518642b7d2e940b21eb3214204", + "fixed_version": "5.10.85" }, "5.15": { - "cmt_id": "efb020924a71391fc12e6f204eaf25694cc116a1", - "fixed_version": "5.15.35" - }, - "5.17": { - "cmt_id": "b39fdc7a0d87f7f5d287dce1ae297a329775a1a3", - "fixed_version": "5.17.4" + "cmt_id": "e1e21632a4c4d2f85587e204939883ce59d18447", + "fixed_version": "5.15.8" }, "5.4": { - "cmt_id": "d05cd68ed8460cb158cc62c41ffe39fe0ca16169", - "fixed_version": "5.4.190" + "cmt_id": "6e1e0a01425810494ce00d7b800b69482790b198", + "fixed_version": "5.4.165" } }, - "CVE-2022-42328": { - "6.0": { - "cmt_id": "3fb02db125bbcf8163e9e30d2824b4adf13f06cb", - "fixed_version": "6.0.13" + "CVE-2022-20141": { + "4.14": { + "cmt_id": "78967749984cf3614de346c90f3e259ff8272735", + "fixed_version": "4.14.247" }, - "6.1": { - "cmt_id": "74e7e1efdad45580cc3839f2a155174cf158f9b5", - "fixed_version": "6.1" + "4.19": { + "cmt_id": "4768973dffed4d0126854514335ed4fe87bec1ab", + "fixed_version": "4.19.207" + }, + "4.4": { + "cmt_id": "b24065948ae6c48c9e20891f8cfe9850f1d748be", + "fixed_version": "4.4.284" + }, + "4.9": { + "cmt_id": "e9924c4204ede999b0515fd31a370a1e27f676bc", + "fixed_version": "4.9.283" + }, + "5.10": { + "cmt_id": "ddd7e8b7b84836c584a284b98ca9bd7a348a0558", + "fixed_version": "5.10.64" + }, + "5.13": { + "cmt_id": "961447ff60291b91e27d5c32fa549c1411ad3b70", + "fixed_version": "5.13.16" + }, + "5.14": { + "cmt_id": "d1a3c6d5925a8d00a32c5ef2d674dd9c0ce89c95", + "fixed_version": "5.14.3" + }, + "5.4": { + "cmt_id": "d84708451d9041dff8a81e3718f821f12d2eb6c5", + "fixed_version": "5.4.145" } }, - "CVE-2022-42329": { - "6.0": { - "cmt_id": "3fb02db125bbcf8163e9e30d2824b4adf13f06cb", - "fixed_version": "6.0.13" + "CVE-2022-20148": { + "5.14": { + "cmt_id": "5b67adb7425e758655e464bda4eb4174ac88b625", + "fixed_version": "5.14.19" }, - "6.1": { - "cmt_id": "74e7e1efdad45580cc3839f2a155174cf158f9b5", - "fixed_version": "6.1" + "5.15": { + "cmt_id": "5e1b901dd470659bcfeaa76811d2af9165579d77", + "fixed_version": "5.15.3" } }, - "CVE-2022-42432": { + "CVE-2022-20153": { "5.10": { - "cmt_id": "5d75fef3e61e797fab5c3fbba88caa74ab92ad47", - "fixed_version": "5.10.146" + "cmt_id": "dc1163203ae6e24b86168390fe5b4a3295fcba7f", + "fixed_version": "5.10.107" + } + }, + "CVE-2022-20154": { + "4.14": { + "cmt_id": "8873140f95d4977bf37e4cf0d5c5e3f6e34cdd3e", + "fixed_version": "4.14.261" }, - "5.15": { - "cmt_id": "816eab147e5c6f6621922b8515ad9010ceb1735e", - "fixed_version": "5.15.71" + "4.19": { + "cmt_id": "af6e6e58f7ebf86b4e7201694b1e4f3a62cbc3ec", + "fixed_version": "4.19.224" }, - "5.19": { - "cmt_id": "633c81c0449663f57d4138326d036dc6cfad674e", - "fixed_version": "5.19.12" + "5.10": { + "cmt_id": "769d14abd35e0e153b5149c3e1e989a9d719e3ff", + "fixed_version": "5.10.90" + }, + "5.15": { + "cmt_id": "75799e71df1da11394740b43ae5686646179561d", + "fixed_version": "5.15.13" }, "5.4": { - "cmt_id": "721ea8ac063d70c2078c4e762212705de6151764", - "fixed_version": "5.4.215" + "cmt_id": "831de271452b87657fcf8d715ee20519b79caef5", + "fixed_version": "5.4.170" } }, - "CVE-2022-4269": { + "CVE-2022-20158": { + "4.14": { + "cmt_id": "b1e27cda1e3c12b705875bb7e247a97168580e33", + "fixed_version": "4.14.273" + }, + "4.19": { + "cmt_id": "a33dd1e6693f80d805155b3f69c18c2f642915da", + "fixed_version": "4.19.236" + }, + "4.9": { + "cmt_id": "b9d5772d60f8e7ef34e290f72fc20e3a4883e7d0", + "fixed_version": "4.9.308" + }, "5.10": { - "cmt_id": "53245103786312f21fb9785327a4367cf10f0dbb", - "fixed_version": "5.10.181" + "cmt_id": "70b7b3c055fd4a464da8da55ff4c1f84269f9b02", + "fixed_version": "5.10.108" }, "5.15": { - "cmt_id": "169a41073993add6b0cfdc44e168e75f92f4834d", - "fixed_version": "5.15.105" + "cmt_id": "a055f5f2841f7522b44a2b1eccb1951b4b03d51a", + "fixed_version": "5.15.31" }, - "6.1": { - "cmt_id": "4c8fc3fe28e47e2a495444347375f7354c24b018", - "fixed_version": "6.1.22" + "5.16": { + "cmt_id": "ef591b35176029fdefea38e8388ffa371e18f4b2", + "fixed_version": "5.16.17" }, - "6.2": { - "cmt_id": "8c9e553c58a491ad328c622441e08178373442dc", - "fixed_version": "6.2.9" + "5.17": { + "cmt_id": "c700525fcc06b05adfea78039de02628af79e07a", + "fixed_version": "5.17" + }, + "5.4": { + "cmt_id": "268dcf1f7b3193bc446ec3d14e08a240e9561e4d", + "fixed_version": "5.4.187" } }, - "CVE-2022-42703": { + "CVE-2022-20368": { "4.14": { - "cmt_id": "978a70601bdc4c32de4003d3beef4dfa23fff1e0", - "fixed_version": "4.14.292" + "cmt_id": "b1e27cda1e3c12b705875bb7e247a97168580e33", + "fixed_version": "4.14.273" }, "4.19": { - "cmt_id": "6dbfc25d68d922736381988d64156a649ccf7bf1", - "fixed_version": "4.19.257" + "cmt_id": "a33dd1e6693f80d805155b3f69c18c2f642915da", + "fixed_version": "4.19.236" }, "4.9": { - "cmt_id": "c24ca0f172905d593ad8ab276b0992bb74353a8d", - "fixed_version": "4.9.327" + "cmt_id": "b9d5772d60f8e7ef34e290f72fc20e3a4883e7d0", + "fixed_version": "4.9.308" }, "5.10": { - "cmt_id": "98f401d36396134c0c86e9e3bd00b6b6b028b521", - "fixed_version": "5.10.141" + "cmt_id": "70b7b3c055fd4a464da8da55ff4c1f84269f9b02", + "fixed_version": "5.10.108" }, "5.15": { - "cmt_id": "c18a209b56e37b2a60414f714bd70b084ef25835", - "fixed_version": "5.15.65" + "cmt_id": "a055f5f2841f7522b44a2b1eccb1951b4b03d51a", + "fixed_version": "5.15.31" }, - "5.19": { - "cmt_id": "7877eaa1131147b4d6a063962f3aac0ab1b8ea1c", - "fixed_version": "5.19.7" + "5.16": { + "cmt_id": "ef591b35176029fdefea38e8388ffa371e18f4b2", + "fixed_version": "5.16.17" + }, + "5.17": { + "cmt_id": "c700525fcc06b05adfea78039de02628af79e07a", + "fixed_version": "5.17" }, "5.4": { - "cmt_id": "2fe3eee48899a890310177d54537d5b8e255eb31", - "fixed_version": "5.4.212" + "cmt_id": "268dcf1f7b3193bc446ec3d14e08a240e9561e4d", + "fixed_version": "5.4.187" } }, - "CVE-2022-42719": { + "CVE-2022-20369": { + "4.14": { + "cmt_id": "7339b6bdf9e084f9e83c084ccc8879b6ae80b75a", + "fixed_version": "4.14.298" + }, + "4.19": { + "cmt_id": "95c4751705f7eef0f16a245e121259857f867c4a", + "fixed_version": "4.19.264" + }, "5.10": { - "cmt_id": "31ce5da48a845bac48930bbde1d45e7449591728", - "fixed_version": "5.10.149" + "cmt_id": "8a83731a09a5954b85b1ce49c01ff5c2a3465cb7", + "fixed_version": "5.10.110" }, "5.15": { - "cmt_id": "de124365a7d2deed22cf706583930f28d537ff0f", - "fixed_version": "5.15.74" + "cmt_id": "48d00e24822e4384edcee3aae03d54c1b7982eba", + "fixed_version": "5.15.33" }, - "5.19": { - "cmt_id": "e6d77ac0132da7e73fdcc4a38dd4c40ac0226466", - "fixed_version": "5.19.16" + "5.16": { + "cmt_id": "2a5fd6b402049521f657966a42c4277f083a63c0", + "fixed_version": "5.16.19" }, - "5.4": { - "cmt_id": "0cb5be43dc4b79da010522f79a06fa56f944d3cd", - "fixed_version": "5.4.219" + "5.17": { + "cmt_id": "3c6ec01525254e4489c6e60df2a8c48ee81f6f78", + "fixed_version": "5.17.2" }, - "6.0": { - "cmt_id": "4afcb8886800131f8dd58d82754ee0c508303d46", - "fixed_version": "6.0.2" + "5.4": { + "cmt_id": "54e1abbe856020522a7952140c26a4426f01dab6", + "fixed_version": "5.4.210" } }, - "CVE-2022-42720": { + "CVE-2022-20421": { + "4.14": { + "cmt_id": "229f47603dd306bc0eb1a831439adb8e48bb0eae", + "fixed_version": "4.14.293" + }, + "4.19": { + "cmt_id": "06e5b43ca4dab06a92bf4c2f33766e6fb11b880a", + "fixed_version": "4.19.258" + }, "5.10": { - "cmt_id": "6b944845031356f3e0c0f6695f9252a8ddc8b02f", - "fixed_version": "5.10.148" + "cmt_id": "9629f2dfdb1dad294b468038ff8e161e94d0b609", + "fixed_version": "5.10.142" }, "5.15": { - "cmt_id": "bfe29873454f38eb1a511a76144ad1a4848ca176", - "fixed_version": "5.15.74" + "cmt_id": "c2a4b5dc8fa71af73bab704d0cac42ac39767ed6", + "fixed_version": "5.15.66" }, "5.19": { - "cmt_id": "46b23a9559580a72d8cc5811b1bce8db099806d6", - "fixed_version": "5.19.16" + "cmt_id": "603a47f2ae56bf68288784d3c0a8c5b8e0a827ed", + "fixed_version": "5.19.8" }, "5.4": { - "cmt_id": "785eaabfe3103e8bfa36aebacff6e8f69f092ed7", - "fixed_version": "5.4.218" - }, - "6.0": { - "cmt_id": "e97a5d7091e6d2df05f8378a518a9bbf81688b77", - "fixed_version": "6.0.2" + "cmt_id": "30d0901b307f27d36b2655fb3048cf31ee0e89c0", + "fixed_version": "5.4.213" } }, - "CVE-2022-42721": { + "CVE-2022-20422": { + "4.14": { + "cmt_id": "9d5fec6ba2e4117d196a8259ab54615ffe562460", + "fixed_version": "4.14.291" + }, + "4.19": { + "cmt_id": "b51881b1da57fe9877125dfdd0aac5172958fcfd", + "fixed_version": "4.19.256" + }, "5.10": { - "cmt_id": "b0e5c5deb7880be5b8a459d584e13e1f9879d307", - "fixed_version": "5.10.148" + "cmt_id": "353b4673d01c512303c45cf2346f630cda73b5c9", + "fixed_version": "5.10.137" }, "5.15": { - "cmt_id": "0a8ee682e4f992eccce226b012bba600bb2251e2", - "fixed_version": "5.15.74" + "cmt_id": "cc69ef95988b9ef2fc730ec452a7441efb90ef5e", + "fixed_version": "5.15.61" + }, + "5.18": { + "cmt_id": "6a2fd114678d7fc1b5a0f8865ae98f1c17787455", + "fixed_version": "5.18.18" }, "5.19": { - "cmt_id": "1d73c990e9bafc2754b1ced71345f73f5beb1781", - "fixed_version": "5.19.16" + "cmt_id": "07022e07017ee5540f5559b0aeb916e8383c1e1a", + "fixed_version": "5.19.2" }, "5.4": { - "cmt_id": "77bb20ccb9dfc9ed4f9c93788c90d08cfd891cdc", - "fixed_version": "5.4.218" - }, - "6.0": { - "cmt_id": "377cb1ce85878c197904ca8383e6b41886e3994d", - "fixed_version": "6.0.2" + "cmt_id": "04549063d5701976034d8c2bfda3d3a8cbf0409f", + "fixed_version": "5.4.211" } }, - "CVE-2022-42722": { + "CVE-2022-20423": { + "4.14": { + "cmt_id": "c7953cf03a26876d676145ce5d2ae6d8c9630b90", + "fixed_version": "4.14.273" + }, + "4.19": { + "cmt_id": "138d4f739b35dfb40438a0d5d7054965763bfbe7", + "fixed_version": "4.19.236" + }, + "4.9": { + "cmt_id": "8b3e4d26bc9cd0f6373d0095b9ffd99e7da8006b", + "fixed_version": "4.9.308" + }, "5.10": { - "cmt_id": "58c0306d0bcd5f541714bea8765d23111c9af68a", - "fixed_version": "5.10.148" + "cmt_id": "28bc0267399f42f987916a7174e2e32f0833cc65", + "fixed_version": "5.10.108" }, "5.15": { - "cmt_id": "93a3a32554079432b49cf87f326607b2a2fab4f2", - "fixed_version": "5.15.74" + "cmt_id": "56b38e3ca4064041d93c1ca18828c8cedad2e16c", + "fixed_version": "5.15.31" }, - "5.19": { - "cmt_id": "fa63b5f6f8853ace755d9a23fb75817d5ba20df5", - "fixed_version": "5.19.16" + "5.16": { + "cmt_id": "df7e088d51cdf78b1a0bf1f3d405c2593295c7b0", + "fixed_version": "5.16.17" }, - "6.0": { - "cmt_id": "8ed62f2df8ebcf79c185f1bc3e4f346ea0905da6", - "fixed_version": "6.0.2" + "5.17": { + "cmt_id": "65f3324f4b6fed78b8761c3b74615ecf0ffa81fa", + "fixed_version": "5.17" + }, + "5.4": { + "cmt_id": "21829376268397f9fd2c35cfa9135937b6aa3a1e", + "fixed_version": "5.4.187" } }, - "CVE-2022-42895": { + "CVE-2022-20565": { "4.14": { - "cmt_id": "999d99c8de09537bd4f4a4a7db2be6b55c6ed817", - "fixed_version": "4.14.299" + "cmt_id": "9e5894b7e2229e6d89319864fb08304571fd44f7", + "fixed_version": "4.14.197" }, "4.19": { - "cmt_id": "36919a82f335784d86b4def308739559bb47943d", - "fixed_version": "4.19.265" - }, - "4.9": { - "cmt_id": "63e3d75298fac7fa50906454603dd5bb4ef22a23", - "fixed_version": "4.9.333" + "cmt_id": "abae259fdccc5e41ff302dd80a2b944ce385c970", + "fixed_version": "4.19.144" }, - "5.10": { - "cmt_id": "26ca2ac091b49281d73df86111d16e5a76e43bd7", - "fixed_version": "5.10.154" + "4.4": { + "cmt_id": "12b27c445f2fd4a2e2c49136f26be26635cc1c73", + "fixed_version": "4.4.236" }, - "5.15": { - "cmt_id": "3e4697ffdfbb38a2755012c4e571546c89ab6422", - "fixed_version": "5.15.78" + "4.9": { + "cmt_id": "cf7797ea60e3e721e3ae5090edbc2ec72d715436", + "fixed_version": "4.9.236" }, "5.4": { - "cmt_id": "6949400ec9feca7f88c0f6ca5cb5fdbcef419c89", - "fixed_version": "5.4.224" + "cmt_id": "667514df10a08e4a65cb88f5fd5ffeccd027c4af", + "fixed_version": "5.4.63" }, - "6.0": { - "cmt_id": "e1aada9b71493b2e11c2a239ece99a97e3f13431", - "fixed_version": "6.0.8" + "5.8": { + "cmt_id": "b070b1e2076809ea192d4f3344833afcfdaf146d", + "fixed_version": "5.8.7" } }, - "CVE-2022-42896": { + "CVE-2022-20566": { "4.14": { - "cmt_id": "9f4624c42db9dd854870ccb212ddd405d8c59041", - "fixed_version": "4.14.301" + "cmt_id": "5bb395334392891dffae5a0e8f37dbe1d70496c9", + "fixed_version": "4.14.291" }, "4.19": { - "cmt_id": "a2045d57e844864605d39e6cfd2237861d800f13", - "fixed_version": "4.19.268" + "cmt_id": "bbd1fdb0e1adf827997a93bf108f20ede038e56e", + "fixed_version": "4.19.255" }, "4.9": { - "cmt_id": "c834df40af8ec156e8c3c388a08ff7381cd90d80", - "fixed_version": "4.9.335" + "cmt_id": "d255c861e268ba342e855244639a15f12d7a0bf2", + "fixed_version": "4.9.326" }, "5.10": { - "cmt_id": "6b6f94fb9a74dd2891f11de4e638c6202bc89476", - "fixed_version": "5.10.154" + "cmt_id": "de5d4654ac6c22b1be756fdf7db18471e7df01ea", + "fixed_version": "5.10.135" }, "5.15": { - "cmt_id": "81035e1201e26d57d9733ac59140a3e29befbc5a", - "fixed_version": "5.15.78" + "cmt_id": "f32d5615a78a1256c4f557ccc6543866e75d03f4", + "fixed_version": "5.15.59" }, - "5.4": { - "cmt_id": "0d87bb6070361e5d1d9cb391ba7ee73413bc109b", - "fixed_version": "5.4.226" + "5.18": { + "cmt_id": "59a55ec33a54a7179fa178f8aaf8b1cb8e63bd93", + "fixed_version": "5.18.16" }, - "6.0": { - "cmt_id": "d7efeb93213becae13c6a12e4150ce1e07bd2c49", - "fixed_version": "6.0.8" + "5.4": { + "cmt_id": "098e07ef0059296e710a801cdbd74b59016e6624", + "fixed_version": "5.4.209" } }, - "CVE-2022-43750": { + "CVE-2022-20567": { + "4.15": { + "cmt_id": "08ffa7bbb46e2a298287c66343ba44039a931ba4", + "fixed_version": "4.15.8" + } + }, + "CVE-2022-20572": { "4.14": { - "cmt_id": "b29f76fcf2db6615b416d98e28c7d81eff4c89a2", - "fixed_version": "4.14.296" + "cmt_id": "388bc1e69663956f8cee43af3bd02bd3061d222d", + "fixed_version": "4.14.282" }, "4.19": { - "cmt_id": "bf7e2cee3899ede4c7c6548f28159ee3775fb67f", - "fixed_version": "4.19.262" + "cmt_id": "6bff6107d1364c95109609c3fd680e6c8d7fa503", + "fixed_version": "4.19.246" }, "4.9": { - "cmt_id": "1b5ad3786a2f2cdbfed34071aa467f80e4903a0b", - "fixed_version": "4.9.331" + "cmt_id": "27798cca4e54fe9c390396c4cc655480f827bbd5", + "fixed_version": "4.9.317" }, "5.10": { - "cmt_id": "1b257f97fec43d7a8a4c9ada8538d14421861b0a", - "fixed_version": "5.10.148" + "cmt_id": "8df42bcd364cc3b41105215d841792aea787b133", + "fixed_version": "5.10.120" }, "5.15": { - "cmt_id": "5ff80339cdc3143b89eee2ad91ae44b4dbf65ad1", - "fixed_version": "5.15.73" + "cmt_id": "69712b170237ec5979f168149cd31e851a465853", + "fixed_version": "5.15.45" }, - "5.19": { - "cmt_id": "9de74019cd44ddddaaca3c677343750ac78b6f73", - "fixed_version": "5.19.15" + "5.17": { + "cmt_id": "a40560bbf6228ecf754d45aa7b1c50b488fed519", + "fixed_version": "5.17.13" }, - "5.4": { - "cmt_id": "21446ad9cb9844b90d7d8e73d8fff03160e51ebc", - "fixed_version": "5.4.218" + "5.18": { + "cmt_id": "417c73db67ea7ad8f03dfd34c6b0bb5f54294fa9", + "fixed_version": "5.18.2" }, - "6.0": { - "cmt_id": "08e2c70e549b77f5f3af9c76da00779d5756f997", - "fixed_version": "6.0.1" + "5.4": { + "cmt_id": "fd2f7e9984850a0162bfb6948b98ffac9fb5fa58", + "fixed_version": "5.4.197" } }, - "CVE-2022-4378": { + "CVE-2022-2078": { "5.10": { - "cmt_id": "9ba389863ac63032d4b6ffad2c90a62cd78082ee", - "fixed_version": "5.10.158" + "cmt_id": "c0aff1faf66b6b7a19103f83e6a5d0fdc64b9048", + "fixed_version": "5.10.120" }, "5.15": { - "cmt_id": "48642f94311b0cf9667aa6833f9f5e3a87d2a0ce", - "fixed_version": "5.15.82" + "cmt_id": "89ef50fe03a55feccf5681c237673a2f98161161", + "fixed_version": "5.15.45" }, - "6.0": { - "cmt_id": "fdf2c95f28bf197bfab421d21e8c697d4f149ea1", - "fixed_version": "6.0.12" + "5.17": { + "cmt_id": "c88f3e3d243d701586239c5b69356ec2b1fd05f1", + "fixed_version": "5.17.13" }, - "6.1": { - "cmt_id": "bce9332220bd677d83b19d21502776ad555a0e73", - "fixed_version": "6.1" + "5.18": { + "cmt_id": "c9a46a3d549286861259c19af4747e12cfaeece9", + "fixed_version": "5.18.2" } }, - "CVE-2022-4379": { + "CVE-2022-21123": { + "4.14": { + "cmt_id": "d6087dda37d3ffa3c8efe6385757d73d9ed173c5", + "fixed_version": "4.14.284" + }, + "4.19": { + "cmt_id": "9f2ce43ebc33713ba02a89a66bd5f93c2f3a82cf", + "fixed_version": "4.19.248" + }, + "4.9": { + "cmt_id": "a11f2f05f5c605d1f6573b0cdcd2a6f38667fda1", + "fixed_version": "4.9.319" + }, "5.10": { - "cmt_id": "01e4c9c03de8a9f8839cb7342bc4bccf9104efe5", - "fixed_version": "5.10.177" + "cmt_id": "26f6f231f6a5a79ccc274967939b22602dec76e8", + "fixed_version": "5.10.123" }, "5.15": { - "cmt_id": "ec5b7814353532243e8a9147d232a32549174909", - "fixed_version": "5.15.105" + "cmt_id": "d74f4eb1ddf076a55ff0682a89e66af5c1974321", + "fixed_version": "5.15.48" }, - "6.1": { - "cmt_id": "650b69b17cfd79f51476d93c2c63bfb73280a77a", - "fixed_version": "6.1.3" + "5.18": { + "cmt_id": "bc4d37b2338a32a6668d94803feebc9cbc85572e", + "fixed_version": "5.18.5" + }, + "5.4": { + "cmt_id": "0800f1b45bf6d85e5a168db9ae91fb816f0a8c34", + "fixed_version": "5.4.199" } }, - "CVE-2022-4382": { + "CVE-2022-21125": { + "4.14": { + "cmt_id": "532c3a51316b6b1fdc6cb01926e2d139ef7e25da", + "fixed_version": "4.14.284" + }, + "4.19": { + "cmt_id": "0e94464009ee37217a7e450c96ea1f8d42d3a6b5", + "fixed_version": "4.19.248" + }, + "4.9": { + "cmt_id": "b7efb3a62fffa509e21d076aa2e75331c79fe36d", + "fixed_version": "4.9.319" + }, "5.10": { - "cmt_id": "856e4b5e53f21edbd15d275dde62228dd94fb2b4", - "fixed_version": "5.10.165" + "cmt_id": "6df693dca31218f76c63b6fd4aa7b7db3bd6e049", + "fixed_version": "5.10.123" }, "5.15": { - "cmt_id": "a2e075f40122d8daf587db126c562a67abd69cf9", - "fixed_version": "5.15.90" + "cmt_id": "ebd0f558b48082c265fd594ffb205ae5350bfe79", + "fixed_version": "5.15.48" }, - "5.4": { - "cmt_id": "9a39f4626b361ee7aa10fd990401c37ec3b466ae", - "fixed_version": "5.4.230" + "5.18": { + "cmt_id": "dce28a791e9632f96ba018f2ef708e012edb4133", + "fixed_version": "5.18.5" }, - "6.1": { - "cmt_id": "616fd34d017000ecf9097368b13d8a266f4920b3", - "fixed_version": "6.1.8" + "5.4": { + "cmt_id": "d961592635932bd1ea32a534412a41fb794e2212", + "fixed_version": "5.4.199" } }, - "CVE-2022-43945": { - "5.15": { - "cmt_id": "dc7f225090c29a5f3b9419b1af32846a201555e7", - "fixed_version": "5.15.75" + "CVE-2022-21166": { + "4.14": { + "cmt_id": "e0fccc13ebe3ed1205f69d119d49789ef039c1fd", + "fixed_version": "4.14.284" }, - "5.19": { - "cmt_id": "c2a878095b5c6f04f90553a3c45872f990dab14e", - "fixed_version": "5.19.17" + "4.19": { + "cmt_id": "8b42145e8c9903d4805651e08f4fca628e166642", + "fixed_version": "4.19.248" + }, + "4.9": { + "cmt_id": "6ecdbc9dc777a5b66a9ec293af88ab330dd644a2", + "fixed_version": "4.9.319" + }, + "5.10": { + "cmt_id": "3eb1180564fa0ecedc33b44029da7687c0a9fbf5", + "fixed_version": "5.10.123" }, - "6.0": { - "cmt_id": "f59c74df82f6ac9d2ea4e01aa3ae7c6c4481652d", - "fixed_version": "6.0.3" - } - }, - "CVE-2022-45869": { "5.15": { - "cmt_id": "f88a6977f8b981bfb5fddd18fbaa75e57e8af293", - "fixed_version": "5.15.82" + "cmt_id": "2044838ab2283c23869ffa7b062e5f388136e432", + "fixed_version": "5.15.48" }, - "6.0": { - "cmt_id": "34ced1da74eb975abdf7ef823512c7719f67601b", - "fixed_version": "6.0.11" + "5.18": { + "cmt_id": "8547d4ae6a95543b69d523f3706dbf887496e9f3", + "fixed_version": "5.18.5" + }, + "5.4": { + "cmt_id": "8d25482fc96aa2cb24a221295fdd498f40565415", + "fixed_version": "5.4.199" } }, - "CVE-2022-45886": { + "CVE-2022-21385": { "4.19": { - "cmt_id": "7bb9c6e05efcecb15b0354d574efbc36ca321d75", - "fixed_version": "4.19.285" + "cmt_id": "5be4bb315de29ad3ae558a8f6b92f13a1b4bfb84", + "fixed_version": "4.19.36" }, + "4.20": { + "cmt_id": "ea010070d0a7497253d5a6f919f6dd107450b31a", + "fixed_version": "4.20" + } + }, + "CVE-2022-21499": { "5.10": { - "cmt_id": "2ea7d26ed851db7176e4bfa8174c8a1380255bbe", - "fixed_version": "5.10.183" + "cmt_id": "a8f4d63142f947cd22fa615b8b3b8921cdaf4991", + "fixed_version": "5.10.119" }, "5.15": { - "cmt_id": "50831747cb3a880dd4bdebe3fc3c81de9e21582d", - "fixed_version": "5.15.116" + "cmt_id": "69c5d307dce1560fafcb852f39d7a1bf5e266641", + "fixed_version": "5.15.42" + }, + "5.17": { + "cmt_id": "281d356a035132f2603724ee0f04767d70e2e98e", + "fixed_version": "5.17.10" + }, + "5.18": { + "cmt_id": "eca56bf0066ef2f1e7be0e3fa7564b85a309872c", + "fixed_version": "5.18.1" }, "5.4": { - "cmt_id": "ed47886a73dbc0477ae09a4a979e27317cf2b52d", - "fixed_version": "5.4.246" + "cmt_id": "8bb828229da903bb5710d21065e0a29f9afd30e0", + "fixed_version": "5.4.197" + } + }, + "CVE-2022-21505": { + "5.10": { + "cmt_id": "ab5050fd7430dde3a9f073129036d3da3facc8ec", + "fixed_version": "5.10.134" }, - "6.1": { - "cmt_id": "93b5dfebcb1821dde466e29404fcf1fb919f4c72", - "fixed_version": "6.1.33" + "5.15": { + "cmt_id": "0e66932a9dc9ba47e60405b392e3782a332bc44e", + "fixed_version": "5.15.58" }, - "6.3": { - "cmt_id": "8bade849b15b3ecb62893f328b2cc4cdc65ac0c6", - "fixed_version": "6.3.7" + "5.18": { + "cmt_id": "f67ff524f283183c52d2575b11beec00cc4d5092", + "fixed_version": "5.18.15" + }, + "5.4": { + "cmt_id": "ed3fea55066b4e054c4d212e54f9965abcac9685", + "fixed_version": "5.4.208" } }, - "CVE-2022-45887": { + "CVE-2022-2153": { "4.14": { - "cmt_id": "cf412b0543b77d01f74ae2303d7f8a97e6bff686", - "fixed_version": "4.14.317" + "cmt_id": "bcf0a450fbaabe7e14d71f885525805b4f86e855", + "fixed_version": "4.14.291" }, "4.19": { - "cmt_id": "3e5af0745a4702ab0df2f880bfe0431eb30f9164", - "fixed_version": "4.19.285" + "cmt_id": "b8127a0fd21d70ab42d8177f8bb97df74f503cc1", + "fixed_version": "4.19.256" }, "5.10": { - "cmt_id": "eb37fef417a246fe54530901a3ea9c0abc914fc2", - "fixed_version": "5.10.183" + "cmt_id": "ac7de8c2ba1292856fdd4a4c0764669b9607cf0a", + "fixed_version": "5.10.137" }, "5.15": { - "cmt_id": "d6c47b23599253d7d866e1e8d60cd410855c1be5", - "fixed_version": "5.15.116" + "cmt_id": "0e5dbc0540baa89faf4c04ccc7e9c4fe6b1d7bf4", + "fixed_version": "5.15.33" + }, + "5.16": { + "cmt_id": "9e38128f8bd1d4f2244d8a393bc5dc204a99a541", + "fixed_version": "5.16.19" + }, + "5.17": { + "cmt_id": "9fa2b94443ff41cdecdff6f4d4324d83af01089a", + "fixed_version": "5.17.2" }, "5.4": { - "cmt_id": "08b20cb8e5b9d69bb3b83c1ad30a702767a9f0ef", - "fixed_version": "5.4.246" + "cmt_id": "8cdba919acefdd6fea5dd2b77a119f54fb88ce11", + "fixed_version": "5.4.211" + } + }, + "CVE-2022-2196": { + "5.10": { + "cmt_id": "1b0cafaae8884726c597caded50af185ffc13349", + "fixed_version": "5.10.170" }, - "6.1": { - "cmt_id": "ea2938c27b0212aaab6702c16b7385e073b35643", - "fixed_version": "6.1.33" + "5.15": { + "cmt_id": "6b539a7dbb49250f92515c2ba60aea239efc9e35", + "fixed_version": "5.15.96" }, - "6.3": { - "cmt_id": "dbef7d1ffea0ccc95446c5383e0be65babedf667", - "fixed_version": "6.3.7" + "6.1": { + "cmt_id": "63fada296062e91ad9f871970d4e7f19e21a6a15", + "fixed_version": "6.1.14" } }, - "CVE-2022-45919": { + "CVE-2022-22942": { "4.14": { - "cmt_id": "66e262ad9b35615b2a1b1cad4751e93e1de90634", - "fixed_version": "4.14.317" + "cmt_id": "e8d092a62449dcfc73517ca43963d2b8f44d0516", + "fixed_version": "4.14.264" }, "4.19": { - "cmt_id": "8624c7e048fa9ba584b7ba43715090ab1aed765c", - "fixed_version": "4.19.285" + "cmt_id": "0008a0c78fc33a84e2212a7c04e6b21a36ca6f4d", + "fixed_version": "4.19.227" }, "5.10": { - "cmt_id": "76169f7490899d74aad4b0e2c4c1b9d4904dd01f", - "fixed_version": "5.10.183" + "cmt_id": "ae2b20f27732fe92055d9e7b350abc5cdf3e2414", + "fixed_version": "5.10.95" }, "5.15": { - "cmt_id": "42624bc8c30c463a9155286bb716223ad04dd2a7", - "fixed_version": "5.15.116" - }, - "5.4": { - "cmt_id": "353fd22693a672efb337d399e610898c64f57b17", - "fixed_version": "5.4.246" + "cmt_id": "6066977961fc6f437bc064f628cf9b0e4571c56c", + "fixed_version": "5.15.18" }, - "6.1": { - "cmt_id": "d5d61f747e3f1ff9042db66896f2f90afa5f3197", - "fixed_version": "6.1.33" + "5.16": { + "cmt_id": "1d833b27fb708d6fdf5de9f6b3a8be4bd4321565", + "fixed_version": "5.16.4" }, - "6.3": { - "cmt_id": "59918dd7a6d1ad098550ca6fcf154c1ae6842bc7", - "fixed_version": "6.3.7" + "5.4": { + "cmt_id": "84b1259fe36ae0915f3d6ddcea6377779de48b82", + "fixed_version": "5.4.175" } }, - "CVE-2022-45934": { + "CVE-2022-23036": { "4.14": { - "cmt_id": "95f1847a361c7b4bf7d74c06ecb6968455082c1a", - "fixed_version": "4.14.303" + "cmt_id": "1b2f59f854e7069ba059adfe03d648ea643eba51", + "fixed_version": "4.14.271" }, "4.19": { - "cmt_id": "ad528fde0702903208d0a79d88d5a42ae3fc235b", - "fixed_version": "4.19.270" + "cmt_id": "17659846fe336366b1663194f5669d10f5947f53", + "fixed_version": "4.19.234" }, "4.9": { - "cmt_id": "49d5867819ab7c744852b45509e8469839c07e0e", - "fixed_version": "4.9.337" + "cmt_id": "73e1d9b33f2bd93ce30719dfc8990b6328243b7e", + "fixed_version": "4.9.306" }, "5.10": { - "cmt_id": "f3fe6817156a2ad4b06f01afab04638a34d7c9a6", - "fixed_version": "5.10.161" + "cmt_id": "3d81e85f30a8f712c3e4f2a507553d9063a20ed6", + "fixed_version": "5.10.105" }, "5.15": { - "cmt_id": "19a78143961a197de8502f4f29c453b913dc3c29", - "fixed_version": "5.15.85" - }, - "5.4": { - "cmt_id": "9fdc79b571434af7bc742da40a3405f038b637a7", - "fixed_version": "5.4.229" + "cmt_id": "1dd5b4b230f6d1345708c6204ccacdf83d53feaf", + "fixed_version": "5.15.28" }, - "6.0": { - "cmt_id": "5550bbf709c323194881737fd290c4bada9e6ead", - "fixed_version": "6.0.15" + "5.16": { + "cmt_id": "0ba1ab25bb5057869621b340dbd411cca3242467", + "fixed_version": "5.16.14" }, - "6.1": { - "cmt_id": "bcd70260ef56e0aee8a4fc6cd214a419900b0765", - "fixed_version": "6.1" + "5.4": { + "cmt_id": "44d86dccd2a5f02a66c6784378d1429412d84bf0", + "fixed_version": "5.4.184" } }, - "CVE-2022-4662": { + "CVE-2022-23037": { "4.14": { - "cmt_id": "1b29498669914c7f9afb619722421418a753d372", - "fixed_version": "4.14.293" + "cmt_id": "fbb5d5edd233c25774109dc0a673702c7b4985e5", + "fixed_version": "4.14.271" }, "4.19": { - "cmt_id": "cc9a12e12808af178c600cc485338bac2e37d2a8", - "fixed_version": "4.19.258" + "cmt_id": "927e4eb8ddf4968b6a33be992b28063f84552c72", + "fixed_version": "4.19.234" }, "4.9": { - "cmt_id": "d90419b8b8322b6924f6da9da952647f2dadc21b", - "fixed_version": "4.9.328" + "cmt_id": "1112bb311ec13e7e6e7045ae4a0b7091bedc6b7a", + "fixed_version": "4.9.306" }, "5.10": { - "cmt_id": "abe3cfb7a7c8e907b312c7dbd7bf4d142b745aa8", - "fixed_version": "5.10.142" + "cmt_id": "f6690dd9446a2a4bd9b024f00f71dd827a98317f", + "fixed_version": "5.10.105" }, "5.15": { - "cmt_id": "c548b99e1c37db6f7df86ecfe9a1f895d6c5966e", - "fixed_version": "5.15.66" + "cmt_id": "5d5fa1d53a31c799b85112841c3c639c7baac1c4", + "fixed_version": "5.15.28" }, - "5.19": { - "cmt_id": "d5eb850b3e8836197a38475840725260b9783e94", - "fixed_version": "5.19.8" + "5.16": { + "cmt_id": "741052b05bcdc295dd715a71549b28c926266800", + "fixed_version": "5.16.14" }, "5.4": { - "cmt_id": "df1875084898b15cbc42f712e93d7f113ae6271b", - "fixed_version": "5.4.213" + "cmt_id": "b507879c1e2d2c55752f658439df71595f4adff2", + "fixed_version": "5.4.184" } }, - "CVE-2022-4744": { + "CVE-2022-23038": { + "4.14": { + "cmt_id": "1b2f59f854e7069ba059adfe03d648ea643eba51", + "fixed_version": "4.14.271" + }, "4.19": { - "cmt_id": "8eb43d635950e27c29f1e9e49a23b31637f37757", - "fixed_version": "4.19.280" + "cmt_id": "17659846fe336366b1663194f5669d10f5947f53", + "fixed_version": "4.19.234" }, - "5.10": { - "cmt_id": "a01a4e9f5dc93335c716fa4023b1901956e8c904", - "fixed_version": "5.10.136" + "4.9": { + "cmt_id": "73e1d9b33f2bd93ce30719dfc8990b6328243b7e", + "fixed_version": "4.9.306" + }, + "5.10": { + "cmt_id": "3d81e85f30a8f712c3e4f2a507553d9063a20ed6", + "fixed_version": "5.10.105" }, "5.15": { - "cmt_id": "3cb5ae77799e8ed6ec3fec0b6b4cd07f01650cc5", - "fixed_version": "5.15.12" + "cmt_id": "1dd5b4b230f6d1345708c6204ccacdf83d53feaf", + "fixed_version": "5.15.28" + }, + "5.16": { + "cmt_id": "0ba1ab25bb5057869621b340dbd411cca3242467", + "fixed_version": "5.16.14" }, "5.4": { - "cmt_id": "0c0e566f0387490d16f166808c72e9c772027681", - "fixed_version": "5.4.240" + "cmt_id": "44d86dccd2a5f02a66c6784378d1429412d84bf0", + "fixed_version": "5.4.184" } }, - "CVE-2022-47518": { - "5.10": { - "cmt_id": "3eb6b89a4e9f9e44c3170d70d8d16c3c8dc8c800", - "fixed_version": "5.10.157" + "CVE-2022-23039": { + "4.14": { + "cmt_id": "a37eb077983e678bece23d4061fe5a6614f41354", + "fixed_version": "4.14.271" }, - "5.15": { - "cmt_id": "7aed1dd5d221dabe3fe258f13ecf5fc7df393cbb", - "fixed_version": "5.15.81" + "4.19": { + "cmt_id": "fbc57368ea527dcfa909908fc47a851a56e4e5ce", + "fixed_version": "4.19.234" + }, + "4.9": { + "cmt_id": "97b835c6de03a24db79d374b02d532f0b562fd38", + "fixed_version": "4.9.306" }, - "6.0": { - "cmt_id": "6195b4838e10a557859862c4e7840dc0eafdd1cd", - "fixed_version": "6.0.11" - } - }, - "CVE-2022-47519": { "5.10": { - "cmt_id": "905f886eae4b065656a575e8a02544045cbaadcf", - "fixed_version": "5.10.157" + "cmt_id": "5f36ae75b847e7f87e4144602f418a624ca074b7", + "fixed_version": "5.10.105" }, "5.15": { - "cmt_id": "143232cb5a4c96d69a7d90b643568665463c6191", - "fixed_version": "5.15.81" + "cmt_id": "f06e3edaeac1942c4ff42072e3d98ee8c762c5fa", + "fixed_version": "5.15.28" }, - "6.0": { - "cmt_id": "c4b629c29a51344a99f279e0bc0caffd25897725", - "fixed_version": "6.0.11" + "5.16": { + "cmt_id": "3b72403eb1850f79deef77497763a6eb65654863", + "fixed_version": "5.16.14" + }, + "5.4": { + "cmt_id": "d193785a4bc91c2b9e004d16d0c9ea5bc0a2f34d", + "fixed_version": "5.4.184" } }, - "CVE-2022-47520": { + "CVE-2022-23040": { + "4.14": { + "cmt_id": "67d21d5bddef88c1977378e4aca2b9c6a4af9edc", + "fixed_version": "4.14.271" + }, + "4.19": { + "cmt_id": "8d521d960aef22781ff499e16899c30af899de8d", + "fixed_version": "4.19.234" + }, + "4.9": { + "cmt_id": "8f80d12f6946a6fe7c64bfc204c062a57f83c7f8", + "fixed_version": "4.9.306" + }, "5.10": { - "cmt_id": "7c6535fb4d67ea37c98a1d1d24ca33dd5ec42693", - "fixed_version": "5.10.157" + "cmt_id": "5c600371b8fd02cbbb0eb83a9f664e3f0b75c28e", + "fixed_version": "5.10.105" }, "5.15": { - "cmt_id": "cd9c4869710bb6e38cfae4478c23e64e91438442", - "fixed_version": "5.15.81" + "cmt_id": "66cb2bbb522b0d5e4f6a11558ff7bfdf3f7d31f3", + "fixed_version": "5.15.28" }, - "6.0": { - "cmt_id": "b3ac275fe82fb2e52085dace26ab65c91b3434b8", - "fixed_version": "6.0.11" + "5.16": { + "cmt_id": "69e581afd2eafd51df6d4a24ab488cb8863c2dcd", + "fixed_version": "5.16.14" + }, + "5.4": { + "cmt_id": "95ff82383266a7720d596eb8b4499ed01746a730", + "fixed_version": "5.4.184" } }, - "CVE-2022-47521": { + "CVE-2022-23041": { + "4.14": { + "cmt_id": "22fd4f3fc1cd37d3daa4462f3184b20adb9342f5", + "fixed_version": "4.14.271" + }, + "4.19": { + "cmt_id": "2466bed361f3274e3e0ca9d8e539532481c06fea", + "fixed_version": "4.19.234" + }, "5.10": { - "cmt_id": "5a068535c0073c8402aa0755e8ef259fb98a33c5", - "fixed_version": "5.10.157" + "cmt_id": "8357d75bfdb85ea63253cf369f405830c7b13d78", + "fixed_version": "5.10.105" }, "5.15": { - "cmt_id": "e9de501cf70d2b508b2793ed3e7d5d5ceabd7a74", - "fixed_version": "5.15.81" + "cmt_id": "a019d26830e8a04933e38e4fcc507dcfbc6ccc72", + "fixed_version": "5.15.28" }, - "6.0": { - "cmt_id": "0269a353bb4bf49902c702e0b55dcab0d470f5aa", - "fixed_version": "6.0.11" + "5.16": { + "cmt_id": "d83dd50f3c23bc887e4c67d547e5a21a23fb8bb8", + "fixed_version": "5.16.14" + }, + "5.4": { + "cmt_id": "be63ea883e56aacf9326e581b53dff9ac087ace1", + "fixed_version": "5.4.184" } }, - "CVE-2022-47929": { + "CVE-2022-23042": { "4.14": { - "cmt_id": "4574e32cbf652d7efcaa6076558752f770b01757", - "fixed_version": "4.14.303" + "cmt_id": "1b9f4115738af90427a8c94a3980bc52fbb23296", + "fixed_version": "4.14.271" }, "4.19": { - "cmt_id": "0195d5ad539382a83e1bfaab51b93b8685f0b7c7", - "fixed_version": "4.19.270" + "cmt_id": "c307029d811e03546d18d0e512fe295b3103b8e5", + "fixed_version": "4.19.234" + }, + "4.9": { + "cmt_id": "c4497b057b14274e159434f0ed70439a21f3d2a9", + "fixed_version": "4.9.306" }, "5.10": { - "cmt_id": "9f7bc28a6b8afc2274e25650511555e93f45470f", - "fixed_version": "5.10.163" + "cmt_id": "206c8e271ba2630f1d809123945d9c428f93b0f0", + "fixed_version": "5.10.105" }, "5.15": { - "cmt_id": "04941c1d5bb59d64165e09813de2947bdf6f4f28", - "fixed_version": "5.15.88" + "cmt_id": "dea18aef2021022a568f4d385a1386f51a9df6ff", + "fixed_version": "5.15.28" }, - "5.4": { - "cmt_id": "9b83ec63d0de7b1f379daa1571e128bc7b9570f8", - "fixed_version": "5.4.229" + "5.16": { + "cmt_id": "34630641e955f23ae06db178822d99d0a9d89b20", + "fixed_version": "5.16.14" }, - "6.1": { - "cmt_id": "e8988e878af693ac13b0fa80ba2e72d22d68f2dd", - "fixed_version": "6.1.6" + "5.4": { + "cmt_id": "0e35f3ab69bcb01fdbf5aadc78f1731778963b1c", + "fixed_version": "5.4.184" } }, - "CVE-2022-47938": { + "CVE-2022-2308": { "5.15": { - "cmt_id": "577619605556a90e64abc759ca3ad9d86bf51176", - "fixed_version": "5.15.61" - }, - "5.18": { - "cmt_id": "9d4d2efe03c84195b06955eae3cb98a72592f7f2", - "fixed_version": "5.18.18" + "cmt_id": "dc248ddf41eab4566e95b1ee2433c8a5134ad94a", + "fixed_version": "5.15.72" }, "5.19": { - "cmt_id": "9ec5086d14c587dce3b81fe984d7009584cd9170", - "fixed_version": "5.19.2" + "cmt_id": "38d854c4a11c3bbf6a96ea46f14b282670c784ac", + "fixed_version": "5.19.14" + }, + "6.0": { + "cmt_id": "46f8a29272e51b6df7393d58fc5cb8967397ef2b", + "fixed_version": "6.0" } }, - "CVE-2022-47939": { - "5.15": { - "cmt_id": "a54c509c32adba9d136f2b9d6a075e8cae1b6d27", - "fixed_version": "5.15.61" + "CVE-2022-2318": { + "4.14": { + "cmt_id": "597b3bbe230caca60c321eeb08de14b9bc4d47c0", + "fixed_version": "4.14.287" }, - "5.18": { - "cmt_id": "3db2001d3a39dc737c2f7e6e5c03467c41ca85bd", - "fixed_version": "5.18.18" + "4.19": { + "cmt_id": "2661f2d88f40e35791257d73def0319b4560b74b", + "fixed_version": "4.19.251" }, - "5.19": { - "cmt_id": "02ed2a9b7874e1fd08bbeccfe998df373a978b6f", - "fixed_version": "5.19.2" - } - }, - "CVE-2022-47940": { - "5.15": { - "cmt_id": "6bb4399303383c2c06bce33f2335c39fbf35d979", - "fixed_version": "5.15.145" + "4.9": { + "cmt_id": "3ab68a9528780870b84200bbd91efaa47a586a3c", + "fixed_version": "4.9.322" + }, + "5.10": { + "cmt_id": "8f74cb27c2b4872fd14bf046201fa7b36a46885e", + "fixed_version": "5.10.129" }, - "5.18": { - "cmt_id": "61eb8b5368006fe0be0f6b1e2dff3ab284db256f", - "fixed_version": "5.18.18" - } - }, - "CVE-2022-47941": { "5.15": { - "cmt_id": "dd4e4c811898410e6a3ae3b63207b7c542860907", - "fixed_version": "5.15.61" + "cmt_id": "659d39545260100628d8a30020d09fb6bf63b915", + "fixed_version": "5.15.53" }, "5.18": { - "cmt_id": "8a8315a5960bd2b5ffc75f44fc089e57c3b17c44", - "fixed_version": "5.18.18" + "cmt_id": "570b99c2e1508708c4a32a58f98071fbc3c2c351", + "fixed_version": "5.18.10" }, - "5.19": { - "cmt_id": "ff20f1875889dbe4a67c9298e609d7c88cf6456d", - "fixed_version": "5.19.2" + "5.4": { + "cmt_id": "bb91556d2af066f8ca2e7fd8e334d652e731ee29", + "fixed_version": "5.4.204" } }, - "CVE-2022-47942": { + "CVE-2022-23222": { "5.15": { - "cmt_id": "cb69d4d6f709f87c94afa28ae64c501576692171", - "fixed_version": "5.15.62" - }, - "5.18": { - "cmt_id": "6e8f4abf584253cbaa596ea4ad13110cf61cd4c9", - "fixed_version": "5.18.18" + "cmt_id": "8d38cde47a7e17b646401fa92d916503caa5375e", + "fixed_version": "5.15.37" }, - "5.19": { - "cmt_id": "8e33102309bd6839b2e2e158f93a7b378cb4655d", - "fixed_version": "5.19.2" + "5.16": { + "cmt_id": "77459bc4d5e2c6f24db845780b4d9d60cf82d06a", + "fixed_version": "5.16.11" } }, - "CVE-2022-47943": { - "5.15": { - "cmt_id": "c76b216753c9eb2950a091037c9976f389e73529", - "fixed_version": "5.15.62" + "CVE-2022-2380": { + "4.14": { + "cmt_id": "2a616cc4513217c850865482cbc0bc6e7188580c", + "fixed_version": "4.14.276" }, - "5.18": { - "cmt_id": "d3015b3bf4a3a0c5e04edcf8bb941146ce9206fd", - "fixed_version": "5.18.18" + "4.19": { + "cmt_id": "1caa40af491dcfe17b3ae870a854388d8ea01984", + "fixed_version": "4.19.238" }, - "5.19": { - "cmt_id": "0f1c9908c8e18a98b3d6a80bf391bef8001d7fb7", - "fixed_version": "5.19.2" - } - }, - "CVE-2022-4842": { - "5.15": { - "cmt_id": "9cca110cf8bb0653b423dba7a7c4cc23ccf91b28", - "fixed_version": "5.15.90" + "4.9": { + "cmt_id": "e6766bb02614ad69218dcd849668524e46916e11", + "fixed_version": "4.9.311" + }, + "5.10": { + "cmt_id": "72af8810922eb143ed4f116db246789ead2d8543", + "fixed_version": "5.10.110" }, - "6.1": { - "cmt_id": "ff3b1a624380c14b81f4e51c48e404a45f047aab", - "fixed_version": "6.1.8" - } - }, - "CVE-2022-48423": { "5.15": { - "cmt_id": "3a52f17867727818ae8dbcfd9425033df32f92e0", - "fixed_version": "5.15.87" + "cmt_id": "46cdbff26c88fd75dccbf28df1d07cbe18007eac", + "fixed_version": "5.15.33" }, - "6.0": { - "cmt_id": "6f6fc680b28a20b51156645c9f32908ec94eb8c9", - "fixed_version": "6.0.17" + "5.16": { + "cmt_id": "34d986f6ee5f5ac48cd2b9e2d061196fd3c29d39", + "fixed_version": "5.16.19" }, - "6.1": { - "cmt_id": "2f041a19f4eb72bcc851f9e3a15f3cfd1ae1addf", - "fixed_version": "6.1.3" + "5.17": { + "cmt_id": "e46779a5706941fb9cd6e0264427953eb77d7888", + "fixed_version": "5.17.2" + }, + "5.4": { + "cmt_id": "478154be3a8c21ff106310bb1037b1fc9d81dc62", + "fixed_version": "5.4.189" } }, - "CVE-2022-48424": { + "CVE-2022-23816": { + "5.10": { + "cmt_id": "7070bbb66c5303117e4c7651711ea7daae4c64b5", + "fixed_version": "5.10.133" + }, "5.15": { - "cmt_id": "c878a915bcb992c12a97ebae1013e377158f560a", - "fixed_version": "5.15.87" + "cmt_id": "ccb25d7db1a29bc251692be745b000e6f0754048", + "fixed_version": "5.15.57" }, - "6.0": { - "cmt_id": "16e8b2159002e45ed0725eea33860ef154818244", - "fixed_version": "6.0.17" + "5.18": { + "cmt_id": "e492002673b03c636d2297fb869d68ae545c41c4", + "fixed_version": "5.18.14" }, - "6.1": { - "cmt_id": "b343c40bb7ff9095430c3f31468a59f8a760dabd", - "fixed_version": "6.1.3" + "5.4": { + "cmt_id": "893cd858b09ca20c8c919db8dc5b009895626da3", + "fixed_version": "5.4.217" } }, - "CVE-2022-48425": { + "CVE-2022-23960": { + "4.14": { + "cmt_id": "2d44960d3edf9994998ff798ef618e666c4f0143", + "fixed_version": "4.14.271" + }, + "4.19": { + "cmt_id": "dc64af755099d1e51fd64e99fe3a59b75595814a", + "fixed_version": "4.19.234" + }, + "4.9": { + "cmt_id": "b24d4041cfb6dab83f9edf40573375bd1365e619", + "fixed_version": "4.9.306" + }, + "5.10": { + "cmt_id": "b7f1e73c4ddf2044530091e69114a5fc1a1229d0", + "fixed_version": "5.10.105" + }, "5.15": { - "cmt_id": "2a67f26f70ab344ae6ea78638890eebc1191a501", - "fixed_version": "5.15.113" + "cmt_id": "f02cab2bed1a3493a230e54d83ff117bc59f480e", + "fixed_version": "5.15.28" }, - "6.1": { - "cmt_id": "a8eaa9a06addbd9cb0238cb1c729921ecbb6504c", - "fixed_version": "6.1.33" + "5.16": { + "cmt_id": "f5eb0f1dcde4b7c2b5ee920ae53bcecaaba03947", + "fixed_version": "5.16.14" }, - "6.3": { - "cmt_id": "e6f4b1c32d6d6047958d7700d12fed6d91f441e7", - "fixed_version": "6.3.4" + "5.4": { + "cmt_id": "fdfc0baf829dfb306a1ec45900d2cfbee265ae60", + "fixed_version": "5.4.184" } }, - "CVE-2022-48502": { + "CVE-2022-24122": { "5.15": { - "cmt_id": "333feb7ba84f69f9b423422417aaac54fd9e7c84", - "fixed_version": "5.15.121" - }, - "6.1": { - "cmt_id": "000a9a72efa4a9df289bab9c9e8ba1639c72e0d6", - "fixed_version": "6.1.40" + "cmt_id": "348a8501e6029f9308ea7675edfa645b5e669c9e", + "fixed_version": "5.15.19" } }, - "CVE-2022-48619": { + "CVE-2022-24448": { "4.14": { - "cmt_id": "9cc62ef5ba044b315c8761942db184a2ef8ff005", - "fixed_version": "4.14.281" + "cmt_id": "516f348b759f6a92819820a3f56d678458e22cc8", + "fixed_version": "4.14.265" }, "4.19": { - "cmt_id": "01d41d7e7fc7eef99ae5b1065d9186f91ff099e7", - "fixed_version": "4.19.245" + "cmt_id": "b00b4c6faad0f21e443fb1584f7a8ea222beb0de", + "fixed_version": "4.19.228" }, "4.9": { - "cmt_id": "3e6fa9e4a7a89d67e01424317f7a2e9551025022", - "fixed_version": "4.9.316" + "cmt_id": "8788981e120694a82a3672e062fe4ea99446634a", + "fixed_version": "4.9.300" }, "5.10": { - "cmt_id": "d5e88c2d76efa9d7bb7ceffaec60fe6c76c748d7", - "fixed_version": "5.10.118" + "cmt_id": "ce8c552b88ca25d775ecd0a0fbef4e0e03de9ed2", + "fixed_version": "5.10.96" }, "5.15": { - "cmt_id": "0211383109832103cfddfd5c5cc99b29d40bb749", - "fixed_version": "5.15.42" + "cmt_id": "4c36ca387af4a9b5d775e46a6cb9dc2d151bf057", + "fixed_version": "5.15.19" }, - "5.17": { - "cmt_id": "93cf9a32d6c21325761503dcaae3c58ae55cc018", - "fixed_version": "5.17.10" + "5.16": { + "cmt_id": "f0583af88e7dd413229ea5e670a0db36fdf34ba2", + "fixed_version": "5.16.5" }, "5.4": { - "cmt_id": "bb83a744bc671804016e23861a892e9db2aee73f", - "fixed_version": "5.4.196" + "cmt_id": "0dfacee40021dcc0a9aa991edd965addc04b9370", + "fixed_version": "5.4.176" } }, - "CVE-2023-0045": { + "CVE-2022-24958": { + "4.14": { + "cmt_id": "6936d1097e9cb891e1daaa8aab1b9c080f5e59a2", + "fixed_version": "4.14.270" + }, + "4.19": { + "cmt_id": "70196d12856306a17ddc3eae0f022b9c1d748e52", + "fixed_version": "4.19.233" + }, + "4.9": { + "cmt_id": "be1bb345f180482b0e57768d967ef020d7cba592", + "fixed_version": "4.9.305" + }, "5.10": { - "cmt_id": "67e39c4f4cb318cfbbf8982ab016c649ed97edaf", - "fixed_version": "5.10.163" + "cmt_id": "c13159a588818a1d2cd6519f4d3b6f7e17a9ffbd", + "fixed_version": "5.10.104" }, "5.15": { - "cmt_id": "cb42aa7b5f726e3fddc8656b8f5c723537d654f1", - "fixed_version": "5.15.87" + "cmt_id": "07de9a494b5ae41b9253411a8e9576d7fceedcc3", + "fixed_version": "5.15.27" + }, + "5.16": { + "cmt_id": "9e5c16b2a9812cd250f0de0b77391c2d63adf2f2", + "fixed_version": "5.16.13" }, "5.4": { - "cmt_id": "8cbd7f26438738238c245a9c0aaf7ebf43283fba", - "fixed_version": "5.4.229" + "cmt_id": "ba6fdd55b16677dcc1d7011270c140d2a37e5f35", + "fixed_version": "5.4.183" + } + }, + "CVE-2022-24959": { + "4.19": { + "cmt_id": "4bd197ce18329e3725fe3af5bd27daa4256d3ac7", + "fixed_version": "4.19.228" }, - "6.0": { - "cmt_id": "09f4f4bf0472eaf6781966573ccd2c0eeacee60f", - "fixed_version": "6.0.19" + "5.10": { + "cmt_id": "729e54636b3ebefb77796702a5b1f1ed5586895e", + "fixed_version": "5.10.96" }, - "6.1": { - "cmt_id": "e8377f0456fb6738a4668d4df16c13d7599925fd", - "fixed_version": "6.1.5" + "5.15": { + "cmt_id": "0690c3943ed0fa76654e600eca38cde6a13c87ac", + "fixed_version": "5.15.19" + }, + "5.16": { + "cmt_id": "deb0f02d08276d87212c1f19d9d919b13dc4c033", + "fixed_version": "5.16.5" + }, + "5.4": { + "cmt_id": "7afc09c8915b0735203ebcb8d766d7db37b794c0", + "fixed_version": "5.4.176" } }, - "CVE-2023-0047": { + "CVE-2022-2503": { "4.14": { - "cmt_id": "bed55513692e0dc720f02ad7da3e528c55e0b663", - "fixed_version": "4.14.256" + "cmt_id": "388bc1e69663956f8cee43af3bd02bd3061d222d", + "fixed_version": "4.14.282" }, "4.19": { - "cmt_id": "d508b70eaa8d6d994c289b757c0ca0355d4dbe29", - "fixed_version": "4.19.218" + "cmt_id": "6bff6107d1364c95109609c3fd680e6c8d7fa503", + "fixed_version": "4.19.246" }, "4.9": { - "cmt_id": "973b61a5f3ba6690624d109a68cca35d0348b91f", - "fixed_version": "4.9.291" + "cmt_id": "27798cca4e54fe9c390396c4cc655480f827bbd5", + "fixed_version": "4.9.317" }, "5.10": { - "cmt_id": "1d457987366f7a92d03e03df80f9a63040133233", - "fixed_version": "5.10.80" - }, - "5.14": { - "cmt_id": "8d55a5f822107de618eb506f36a48a96709e4a68", - "fixed_version": "5.14.19" + "cmt_id": "8df42bcd364cc3b41105215d841792aea787b133", + "fixed_version": "5.10.120" }, "5.15": { - "cmt_id": "c15aeead2488b3b28db6863f9f2ba2338e3c9838", - "fixed_version": "5.15.3" + "cmt_id": "69712b170237ec5979f168149cd31e851a465853", + "fixed_version": "5.15.45" + }, + "5.17": { + "cmt_id": "a40560bbf6228ecf754d45aa7b1c50b488fed519", + "fixed_version": "5.17.13" + }, + "5.18": { + "cmt_id": "417c73db67ea7ad8f03dfd34c6b0bb5f54294fa9", + "fixed_version": "5.18.2" }, "5.4": { - "cmt_id": "66938ba1285778634276a4b4028de367d7f1e8c2", - "fixed_version": "5.4.160" + "cmt_id": "fd2f7e9984850a0162bfb6948b98ffac9fb5fa58", + "fixed_version": "5.4.197" } }, - "CVE-2023-0160": { + "CVE-2022-25258": { + "4.14": { + "cmt_id": "c7ad83d561df15ac6043d3b0d783aee777cf1731", + "fixed_version": "4.14.267" + }, + "4.19": { + "cmt_id": "e5eb8d19aee115d8fb354d1eff1b8df700467164", + "fixed_version": "4.19.230" + }, + "4.9": { + "cmt_id": "f3bcd744b0bc8dcc6cdb3ac5be20f54aecfb78a4", + "fixed_version": "4.9.302" + }, "5.10": { - "cmt_id": "2f9307222227410453e33654f5d9ed6459351455", - "fixed_version": "5.10.180" + "cmt_id": "22ec1004728548598f4f5b4a079a7873409eacfd", + "fixed_version": "5.10.101" }, "5.15": { - "cmt_id": "f333854dce4a079783f00c201869b9ee8f7ff3c3", - "fixed_version": "5.15.111" + "cmt_id": "3e33e5c67cb9ebd2b791b9a9fb2b71daacebd8d4", + "fixed_version": "5.15.24" }, - "5.4": { - "cmt_id": "c229821510dfe35e89899b00ec34f9f5876fbbd2", - "fixed_version": "5.4.243" + "5.16": { + "cmt_id": "8895017abfc76bbc223499b179919dd205047197", + "fixed_version": "5.16.10" }, - "6.1": { - "cmt_id": "1d4ac7b0ffc9dc683b8dafc78b8b93177071a02c", - "fixed_version": "6.1.28" + "5.4": { + "cmt_id": "38fd68f55a7ef57fb9cc3102ac65d1ac474a1a18", + "fixed_version": "5.4.180" + } + }, + "CVE-2022-25375": { + "4.14": { + "cmt_id": "4c22fbcef778badb00fb8bb9f409daa29811c175", + "fixed_version": "4.14.267" }, - "6.2": { - "cmt_id": "d0e34aaea13391e28069c50de5519300d408e985", - "fixed_version": "6.2.15" + "4.19": { + "cmt_id": "db9aaa3026298d652e98f777bc0f5756e2455dda", + "fixed_version": "4.19.230" }, - "6.3": { - "cmt_id": "d2b8cf384c39ddb6fdb9e9034cd9b9887e09e735", - "fixed_version": "6.3.2" + "4.9": { + "cmt_id": "ff0a90739925734c91c7e39befe3f4378e0c1369", + "fixed_version": "4.9.302" + }, + "5.10": { + "cmt_id": "fb4ff0f96de37c44236598e8b53fe43b1df36bf3", + "fixed_version": "5.10.101" + }, + "5.15": { + "cmt_id": "2da3b0ab54fb7f4d7c5a82757246d0ee33a47197", + "fixed_version": "5.15.24" + }, + "5.16": { + "cmt_id": "2724ebafda0a8df08a9cb91557d33226bee80f7b", + "fixed_version": "5.16.10" + }, + "5.4": { + "cmt_id": "c9e952871ae47af784b4aef0a77db02e557074d6", + "fixed_version": "5.4.180" } }, - "CVE-2023-0179": { + "CVE-2022-25636": { "5.10": { - "cmt_id": "550efeff989b041f3746118c0ddd863c39ddc1aa", - "fixed_version": "5.10.164" + "cmt_id": "68f19845f580a1d3ac1ef40e95b0250804e046bb", + "fixed_version": "5.10.103" }, "5.15": { - "cmt_id": "a8acfe2c6fb99f9375a9325807a179cd8c32e6e3", - "fixed_version": "5.15.89" + "cmt_id": "6c5d780469d6c3590729940e2be8a3bd66ea4814", + "fixed_version": "5.15.26" }, - "6.1": { - "cmt_id": "76ef74d4a379faa451003621a84e3498044e7aa3", - "fixed_version": "6.1.7" + "5.16": { + "cmt_id": "6bff27caef1ee07a8b190f34cf32c99d6cc37a33", + "fixed_version": "5.16.12" + }, + "5.4": { + "cmt_id": "49c011a44edd14adb555dbcbaf757f52b1f2f748", + "fixed_version": "5.4.182" } }, - "CVE-2023-0210": { + "CVE-2022-2585": { + "5.10": { + "cmt_id": "541840859ace9c2ccebc32fa9e376c7bd3def490", + "fixed_version": "5.10.137" + }, "5.15": { - "cmt_id": "e32f867b37da7902685c9a106bef819506aa1a92", - "fixed_version": "5.15.87" + "cmt_id": "9e255ed238fc67058df87b0388ad6d4b2ef3a2bd", + "fixed_version": "5.15.61" }, - "6.0": { - "cmt_id": "1e7ed525c60d8d51daf2700777071cd0dfb6f807", - "fixed_version": "6.0.19" + "5.18": { + "cmt_id": "e8cb6e8fd9890780f1bfcf5592889e1b879e779c", + "fixed_version": "5.18.18" }, - "6.1": { - "cmt_id": "5e7d97dbae25ab4cb0ac1b1b98aebc4915689a86", - "fixed_version": "6.1.5" + "5.19": { + "cmt_id": "b2fc1723eb65abb83e00d5f011de670296af0b28", + "fixed_version": "5.19.2" } }, - "CVE-2023-0266": { + "CVE-2022-2586": { "4.14": { - "cmt_id": "c75e7766cef4e492ec156942d2c4d48c25574e5c", - "fixed_version": "4.14.303" + "cmt_id": "4e0dbab570defe5b747578cbea8e07f9d0709bec", + "fixed_version": "4.14.316" }, "4.19": { - "cmt_id": "5b2ea7e91352165054c5b3f8e5442cd31c3e73f9", - "fixed_version": "4.19.270" + "cmt_id": "77d3b5038b7462318f5183e2ad704b01d57215a2", + "fixed_version": "4.19.256" }, "5.10": { - "cmt_id": "df02234e6b87d2a9a82acd3198e44bdeff8488c6", - "fixed_version": "5.10.163" + "cmt_id": "1a4b18b1ff11ba26f9a852019d674fde9d1d1cff", + "fixed_version": "5.10.137" }, "5.15": { - "cmt_id": "26350c21bc5e97a805af878e092eb8125843fe2c", - "fixed_version": "5.15.88" + "cmt_id": "faafd9286f1355c76fe9ac3021c280297213330e", + "fixed_version": "5.15.61" }, - "5.4": { - "cmt_id": "eaa5580a74cc8355260caeb526cf49d34e7304a8", - "fixed_version": "5.4.229" + "5.18": { + "cmt_id": "f4fa03410f7c5f5bd8f90e9c11e9a8c4b526ff6f", + "fixed_version": "5.18.18" }, - "6.1": { - "cmt_id": "d6ad4bd1d896ae1daffd7628cd50f124280fb8b1", - "fixed_version": "6.1.6" - } - }, - "CVE-2023-0386": { - "5.15": { - "cmt_id": "e91308e63710574c4b6a0cadda3e042a3699666e", - "fixed_version": "5.15.91" + "5.19": { + "cmt_id": "0d07039397527361850c554c192e749cfc879ea9", + "fixed_version": "5.19.2" }, - "6.1": { - "cmt_id": "42fea1c35254c49cce07c600d026cbc00c6d3c81", - "fixed_version": "6.1.9" + "5.4": { + "cmt_id": "fab2f61cc3b0e441b1749f017cfee75f9bbaded7", + "fixed_version": "5.4.211" } }, - "CVE-2023-0394": { + "CVE-2022-2588": { "4.14": { - "cmt_id": "35ed8ba485544a31a4ab9b92a1c68e406ab66a47", - "fixed_version": "4.14.303" + "cmt_id": "d0cce31f328fa10e7256f314e6e044e13cdf6814", + "fixed_version": "4.14.291" }, "4.19": { - "cmt_id": "f487d636e49bc1fdfbd8105bc1ab159164e2d8bd", - "fixed_version": "4.19.270" + "cmt_id": "73584dab72d0a826f286a45544305819b58f7b92", + "fixed_version": "4.19.256" + }, + "4.9": { + "cmt_id": "34a475425612bef345634202dda8dac91820b6c8", + "fixed_version": "4.9.326" }, "5.10": { - "cmt_id": "6c9e2c11c33c35563d34d12b343d43b5c12200b5", - "fixed_version": "5.10.164" + "cmt_id": "7018f03d97daf344e49b16200caf4363a1407cab", + "fixed_version": "5.10.137" }, "5.15": { - "cmt_id": "456e3794e08a0b59b259da666e31d0884b376bcf", - "fixed_version": "5.15.89" + "cmt_id": "57bbb691a93bd39d0644c5c879b354232d0e0eed", + "fixed_version": "5.15.61" }, - "5.4": { - "cmt_id": "3998dba0f78a59922b0ef333ccfeb58d9410cd3d", - "fixed_version": "5.4.229" + "5.18": { + "cmt_id": "e832c26e7edfa2ddbd2dcdd48016d13d747de6da", + "fixed_version": "5.18.18" }, - "6.1": { - "cmt_id": "0afa5f0736584411771299074bbeca8c1f9706d4", - "fixed_version": "6.1.7" + "5.19": { + "cmt_id": "ee3f18d90e80e79449d575fa3e7a6b775e9fc35e", + "fixed_version": "5.19.2" + }, + "5.4": { + "cmt_id": "1fcd691cc2e7f808eca2e644adee1f1c6c1527fd", + "fixed_version": "5.4.211" } }, - "CVE-2023-0458": { - "4.14": { - "cmt_id": "291a0395bb298d0ef0bba21d2186f632e4b30053", - "fixed_version": "4.14.304" - }, - "4.19": { - "cmt_id": "d3ee91e50a6b3c5a45398e3dcb912a8a264f575c", - "fixed_version": "4.19.271" - }, + "CVE-2022-2590": { + "5.19": { + "cmt_id": "9def52eb10baab3b700858003d462fcf17d62873", + "fixed_version": "5.19.6" + } + }, + "CVE-2022-2602": { "5.10": { - "cmt_id": "9f8e45720e0e7edb661d0082422f662ed243d8d8", - "fixed_version": "5.10.165" + "cmt_id": "c378c479c5175833bb22ff71974cda47d7b05401", + "fixed_version": "5.10.150" }, "5.15": { - "cmt_id": "f01aefe374d32c4bb1e5fd1e9f931cf77fca621a", - "fixed_version": "5.15.90" + "cmt_id": "813d8fe5d30388f73a21d3a2bf46b0a1fd72498c", + "fixed_version": "5.15.75" + }, + "5.19": { + "cmt_id": "b4293c01ee0d0ecdd3cb5801e13f62271144667a", + "fixed_version": "5.19.17" }, "5.4": { - "cmt_id": "96b02125dd68d77e28a29488e6f370a5eac7fb1c", - "fixed_version": "5.4.230" + "cmt_id": "04df9719df1865f6770af9bc7880874af0e594b2", + "fixed_version": "5.4.220" }, - "6.1": { - "cmt_id": "91185568c99d60534bacf38439846103962d1e2c", - "fixed_version": "6.1.8" + "6.0": { + "cmt_id": "75e94c7e8859e58aadc15a98cc9704edff47d4f2", + "fixed_version": "6.0.3" } }, - "CVE-2023-0459": { + "CVE-2022-26365": { "4.14": { - "cmt_id": "e0fbff18bbcee4f07d46bee172803fad63f6f4dd", - "fixed_version": "4.14.307" + "cmt_id": "44dc5bcac4b0ec4e876110a69ead25a9b130234b", + "fixed_version": "4.14.287" }, "4.19": { - "cmt_id": "f8e54da1c729cc23d9a7b7bd42379323e7fb7979", - "fixed_version": "4.19.274" + "cmt_id": "f4a1391185e30c977bfe1648435c152f806211c7", + "fixed_version": "4.19.251" + }, + "4.9": { + "cmt_id": "4fbda9d1fc771b44e96ee4cea58f37d926010ffc", + "fixed_version": "4.9.322" }, "5.10": { - "cmt_id": "3b6ce54cfa2c04f0636fd0c985913af8703b408d", - "fixed_version": "5.10.170" + "cmt_id": "cfea428030be836d79a7690968232bb7fa4410f1", + "fixed_version": "5.10.129" }, "5.15": { - "cmt_id": "41d8b591d70a7517293b23958a18452baf22588f", - "fixed_version": "5.15.96" - }, - "5.4": { - "cmt_id": "6c750ed0367f6bf1b09c0c353a701781ee05dd22", - "fixed_version": "5.4.233" + "cmt_id": "7ed65a4ad8fa9f40bc3979b32c54243d6a684ec9", + "fixed_version": "5.15.53" }, - "6.1": { - "cmt_id": "684db631a15779c8f3b2235d507efdfe6bb10278", - "fixed_version": "6.1.14" + "5.18": { + "cmt_id": "62b5d188a270a25138a88c18409c596c1406b993", + "fixed_version": "5.18.10" }, - "6.2": { - "cmt_id": "2c8ee21d78942cf48bc836612ad365fd6f06cfbb", - "fixed_version": "6.2.1" + "5.4": { + "cmt_id": "42112e8f94617d83943f8f3b8de2b66041905506", + "fixed_version": "5.4.204" } }, - "CVE-2023-0461": { + "CVE-2022-26373": { "4.14": { - "cmt_id": "b689125d04949841337dfa730d48dd91ada9ce3a", - "fixed_version": "4.14.303" + "cmt_id": "7a4d2cba68731673c3ec89a1a5eee3a9af35ffa7", + "fixed_version": "4.14.297" }, "4.19": { - "cmt_id": "755193f2523ce5157c2f844a4b6d16b95593f830", - "fixed_version": "4.19.270" + "cmt_id": "b6c5011934a15762cd694e36fe74f2f2f93eac9b", + "fixed_version": "4.19.255" }, "5.10": { - "cmt_id": "f8ed0a93b5d576bbaf01639ad816473bdfd1dcb0", - "fixed_version": "5.10.163" - }, + "cmt_id": "509c2c9fe75ea7493eebbb6bb2f711f37530ae19", + "fixed_version": "5.10.136" + }, "5.15": { - "cmt_id": "dadd0dcaa67d27f550131de95c8e182643d2c9d6", - "fixed_version": "5.15.88" + "cmt_id": "7fcd99e889c0634f8275ae7a6b06aec4a22c8715", + "fixed_version": "5.15.60" }, - "5.4": { - "cmt_id": "c6d29a5ffdbc362314853462a0e24e63330a654d", - "fixed_version": "5.4.229" + "5.18": { + "cmt_id": "0abdbbd9ae9c81615836278d787a8c8dcd576c36", + "fixed_version": "5.18.17" }, - "6.0": { - "cmt_id": "c1b5dee463cc1e89cfa655d6beff81ec1c0c4258", - "fixed_version": "6.0.19" + "5.19": { + "cmt_id": "f826d0412d80348aa22274ec9884cab0950a350b", + "fixed_version": "5.19.1" }, - "6.1": { - "cmt_id": "7d242f4a0c8319821548c7176c09a6e0e71f223c", - "fixed_version": "6.1.5" - } - }, - "CVE-2023-0468": { - "6.0": { - "cmt_id": "bc4e6ee16778149811333a969a7a893d4cc110c5", - "fixed_version": "6.0.11" - } - }, - "CVE-2023-0469": { - "6.0": { - "cmt_id": "77a467a3e20978607c56aa4886f46f78ca287054", - "fixed_version": "6.0.11" + "5.4": { + "cmt_id": "f2f41ef0352db9679bfae250d7a44b3113f3a3cc", + "fixed_version": "5.4.210" } }, - "CVE-2023-0590": { + "CVE-2022-2639": { "4.14": { - "cmt_id": "42c50c7efcd1d263455438b81fe9388e685bfb66", - "fixed_version": "4.14.331" + "cmt_id": "6cde4a87248e8d39fad5e5e72e104b6d74fcabef", + "fixed_version": "4.14.277" }, "4.19": { - "cmt_id": "f782929b90b5ac88d4445c853949d9efa6db6bae", - "fixed_version": "4.19.300" + "cmt_id": "bbbf059337f9a74285c1cf088ff85ee92d149e64", + "fixed_version": "4.19.240" + }, + "4.9": { + "cmt_id": "1aba176280dcd0eb08e291bc59ba6067df22af98", + "fixed_version": "4.9.312" }, "5.10": { - "cmt_id": "7aa3d623c11b9ab60f86b7833666e5d55bac4be9", - "fixed_version": "5.10.152" + "cmt_id": "0837ff17d052b7d755d5086208c3445867aaff82", + "fixed_version": "5.10.113" }, "5.15": { - "cmt_id": "ce1234573d183db1ebcab524668ca2d85543bf80", - "fixed_version": "5.15.76" + "cmt_id": "e411af98013dba5bce8118ee2b84bd1ad4c36b86", + "fixed_version": "5.15.36" }, - "5.4": { - "cmt_id": "0f5c0e0a4c0b081e5f959578a8e56c7921e63a2d", - "fixed_version": "5.4.240" + "5.17": { + "cmt_id": "24f0f311a060fd333f821c4600afc054356ef23f", + "fixed_version": "5.17.5" }, - "6.0": { - "cmt_id": "caee0b9d74119911423111a10c4e9f4e5c8e6d41", - "fixed_version": "6.0.6" + "5.4": { + "cmt_id": "aa70705560871725e963945a2d36ace7849c004e", + "fixed_version": "5.4.191" } }, - "CVE-2023-0615": { + "CVE-2022-26490": { "4.14": { - "cmt_id": "b0e20af206273e90d47647e7c806ddcc0a401f65", - "fixed_version": "4.14.298" + "cmt_id": "d908d2776464a8021a1f63eba6e7417fbe7653c9", + "fixed_version": "4.14.274" }, "4.19": { - "cmt_id": "29385e601f3420cfe46550271714b6685719eb33", - "fixed_version": "4.19.264" + "cmt_id": "0043b74987acb44f1ade537aad901695511cfebe", + "fixed_version": "4.19.237" }, "4.9": { - "cmt_id": "e1b5b061987d56d7b64da962fec3be4ae7e78300", - "fixed_version": "4.9.332" + "cmt_id": "c1184fa07428fb81371d5863e09795f0d06d35cf", + "fixed_version": "4.9.309" }, "5.10": { - "cmt_id": "147b8f1892aaa474f912ac75babfd316ee0de672", - "fixed_version": "5.10.153" + "cmt_id": "25c23fe40e6e1ef8e6d503c52b4f518b2e520ab7", + "fixed_version": "5.10.109" }, "5.15": { - "cmt_id": "0f83edbe4fe95d9c68b32aebe07fe413bcf92afe", - "fixed_version": "5.15.77" - }, - "5.4": { - "cmt_id": "d8f479c777b413ba42c63e1a5ce6eee3d25b6714", - "fixed_version": "5.4.223" + "cmt_id": "a34c47b1ab07153a047476de83581dc822287f39", + "fixed_version": "5.15.32" }, - "6.0": { - "cmt_id": "74e2e978d1e36c3b67e998e779c02cbc8f481527", - "fixed_version": "6.0.7" - } - }, - "CVE-2023-1032": { - "6.1": { - "cmt_id": "7c7570791b15c3b78e3229ae97825e7eb869c7da", - "fixed_version": "6.1.16" + "5.16": { + "cmt_id": "0646efbb6e100a3f93eba3b6a10a7f4c28dd1478", + "fixed_version": "5.16.18" }, - "6.2": { - "cmt_id": "cb6aedc1fd9d808d7319db2f953f4886dd46c627", - "fixed_version": "6.2.3" + "5.4": { + "cmt_id": "0aef7184630b599493a0dcad4eec6d42b3e68e91", + "fixed_version": "5.4.188" } }, - "CVE-2023-1073": { + "CVE-2022-2663": { "4.14": { - "cmt_id": "614dd3d1725d329bf10a7ae974ebdfe101150791", - "fixed_version": "4.14.305" + "cmt_id": "6ce66e3442a5989cbe56a6884384bf0b7d1d0725", + "fixed_version": "4.14.293" }, "4.19": { - "cmt_id": "f958da03d9a71808548b2e5418d95482b106eb9a", - "fixed_version": "4.19.272" + "cmt_id": "3275f7804f40de3c578d2253232349b07c25f146", + "fixed_version": "4.19.258" + }, + "4.9": { + "cmt_id": "eb4d8d6b44a23ff2b6e2af06c8240de73dff8a7d", + "fixed_version": "4.9.328" }, "5.10": { - "cmt_id": "5dc3469a1170dd1344d262a332b26994214eeb58", - "fixed_version": "5.10.166" + "cmt_id": "e12ce30fe593dd438c5b392290ad7316befc11ca", + "fixed_version": "5.10.143" }, "5.15": { - "cmt_id": "2b49568254365c9c247beb0eabbaa15d0e279d64", - "fixed_version": "5.15.91" + "cmt_id": "451c9ce1e2fc9b9e40303bef8e5a0dca1a923cc4", + "fixed_version": "5.15.68" }, - "5.4": { - "cmt_id": "89e7fe3999e057c91f157b6ba663264f4cdfcb55", - "fixed_version": "5.4.231" + "5.19": { + "cmt_id": "6cf0609154b2ce8d3ae160e7506ab316400a8d3d", + "fixed_version": "5.19.9" }, - "6.1": { - "cmt_id": "cdcdc0531a51659527fea4b4d064af343452062d", - "fixed_version": "6.1.9" + "5.4": { + "cmt_id": "36f7b71f8ad8e4d224b45f7d6ecfeff63b091547", + "fixed_version": "5.4.213" } }, - "CVE-2023-1074": { + "CVE-2022-26966": { "4.14": { - "cmt_id": "97ca098d8f1a8119b6675c823706cd6231ba6d9b", - "fixed_version": "4.14.305" + "cmt_id": "fbc3c962b6eb42b1483d00d8ea28b61b9f2fff26", + "fixed_version": "4.14.269" }, "4.19": { - "cmt_id": "26436553aabfd9b40e1daa537a099bf5bb13fb55", - "fixed_version": "4.19.272" + "cmt_id": "dde5ddf02a47487dd6efcc7077307f1d4e1ba337", + "fixed_version": "4.19.232" + }, + "4.9": { + "cmt_id": "89260e0e191e8a3a9872f72836bdf0641853c87f", + "fixed_version": "4.9.304" }, "5.10": { - "cmt_id": "6ef652f35dcfaa1ab2b2cf6c1694718595148eee", - "fixed_version": "5.10.166" + "cmt_id": "4f5f5411f0c14ac0b61d5e6a77d996dd3d5b5fd3", + "fixed_version": "5.10.103" }, "5.15": { - "cmt_id": "3391bd42351be0beb14f438c7556912b9f96cb32", - "fixed_version": "5.15.91" + "cmt_id": "9f2d614779906f3d8ad4fb882c5b3e5ad6150bbe", + "fixed_version": "5.15.26" }, - "5.4": { - "cmt_id": "a7585028ac0a5836f39139c11594d79ede97d975", - "fixed_version": "5.4.231" + "5.16": { + "cmt_id": "639f72dce8667a3d601561e0e47d53ad999e7f8a", + "fixed_version": "5.16.12" }, - "6.1": { - "cmt_id": "9f08bb650078dca24a13fea1c375358ed6292df3", - "fixed_version": "6.1.9" - } - }, - "CVE-2023-1075": { - "6.1": { - "cmt_id": "37c0cdf7e4919e5f76381ac60817b67bcbdacb50", - "fixed_version": "6.1.11" + "5.4": { + "cmt_id": "b95d71abeb7d31d4d51cd836d80f99fd783fd6d5", + "fixed_version": "5.4.182" } }, - "CVE-2023-1076": { + "CVE-2022-27223": { + "4.14": { + "cmt_id": "fdc22192d49fa577d8397b39f8ef8141cb1d62aa", + "fixed_version": "4.14.269" + }, + "4.19": { + "cmt_id": "ebc465e894890a534ce05e035eae4829a2a47ba1", + "fixed_version": "4.19.232" + }, + "4.9": { + "cmt_id": "958b6ab4d70bf991e8c90233504d4cb863aaef8a", + "fixed_version": "4.9.304" + }, "5.10": { - "cmt_id": "9a31af61f397500ccae49d56d809b2217d1e2178", - "fixed_version": "5.10.173" + "cmt_id": "bfa8ffbaaaaf9752f66bc7cabcef2de715e7621f", + "fixed_version": "5.10.103" }, "5.15": { - "cmt_id": "67f9f02928a34aad0a2c11dab5eea269f5ecf427", - "fixed_version": "5.15.99" - }, - "5.4": { - "cmt_id": "d92d87000eda9884d49f1acec1c1fccd63cd9b11", - "fixed_version": "5.4.235" + "cmt_id": "2c775ad1fd5e014b35e483da2aab8400933fb09d", + "fixed_version": "5.15.26" }, - "6.1": { - "cmt_id": "b4ada752eaf1341f47bfa3d8ada377eca75a8d44", - "fixed_version": "6.1.16" + "5.16": { + "cmt_id": "3221ef49ba18924e55a4d42a2ea4080cfea12c6c", + "fixed_version": "5.16.12" }, - "6.2": { - "cmt_id": "4aa4b4b3b3e9551c4de2bf2987247c28805fb8f6", - "fixed_version": "6.2.3" + "5.4": { + "cmt_id": "6b23eda989236fd75b4a9893cc816cd690c29dfc", + "fixed_version": "5.4.182" } }, - "CVE-2023-1077": { + "CVE-2022-27666": { + "4.14": { + "cmt_id": "2c8abafd6c72ef04bc972f40332c76c1dd04446d", + "fixed_version": "4.14.274" + }, "4.19": { - "cmt_id": "84d90fb72a053c034b018fcc3cfaa6f606faf1c6", - "fixed_version": "4.19.293" + "cmt_id": "ce89087966651ad41e103770efc5ce2742046284", + "fixed_version": "4.19.237" }, "5.10": { - "cmt_id": "80a1751730b302d8ab63a084b2fa52c820ad0273", - "fixed_version": "5.10.173" + "cmt_id": "9248694dac20eda06e22d8503364dc9d03df4e2f", + "fixed_version": "5.10.108" }, "5.15": { - "cmt_id": "2c36c390a74981d03f04f01fe7ee9c3ac3ea11f7", - "fixed_version": "5.15.99" - }, - "5.4": { - "cmt_id": "084cd75643b61fb924f70cba98a71dea14942938", - "fixed_version": "5.4.235" + "cmt_id": "4aaabbffc3b0658ce80eebdde9bafa20a3f932e0", + "fixed_version": "5.15.29" }, - "6.1": { - "cmt_id": "6b4fcc4e8a3016e85766c161daf0732fca16c3a3", - "fixed_version": "6.1.16" + "5.16": { + "cmt_id": "9afe83f62aac348db1facb28bfc106109a06e44d", + "fixed_version": "5.16.15" }, - "6.2": { - "cmt_id": "1099004ae1664703ec573fc4c61ffb24144bcb63", - "fixed_version": "6.2.3" + "5.4": { + "cmt_id": "fee4dfbda68ba10f3bbcf51c861d6aa32f08f9e4", + "fixed_version": "5.4.188" } }, - "CVE-2023-1078": { - "4.19": { - "cmt_id": "909d5eef5ce792bb76d7b5a9b7a6852b813d8cac", - "fixed_version": "4.19.273" - }, - "5.10": { - "cmt_id": "c53f34ec3fbf3e9f67574118a6bb35ae1146f7ca", - "fixed_version": "5.10.168" - }, + "CVE-2022-27672": { "5.15": { - "cmt_id": "528e3f3a4b53df36dafd10cdf6b8c0fe2aa1c4ba", + "cmt_id": "8f12dcab90e886d0169a9cd372a8bb35339cfc19", "fixed_version": "5.15.94" }, - "5.4": { - "cmt_id": "ba38eacade35dd2316d77b37494e6e0c01bab595", - "fixed_version": "5.4.232" - }, "6.1": { - "cmt_id": "1d52bbfd469af69fbcae88c67f160ce1b968e7f3", + "cmt_id": "cc95b5d240b631e42e2863e1dcb6ad83920cc449", "fixed_version": "6.1.12" + }, + "6.2": { + "cmt_id": "be8de49bea505e7777a69ef63d60e02ac1712683", + "fixed_version": "6.2" } }, - "CVE-2023-1079": { - "4.14": { - "cmt_id": "df0fad94ca3787727b9cdd76797aaacf46fe93ed", - "fixed_version": "4.14.308" - }, - "4.19": { - "cmt_id": "74b78391a9b6f67de90b13f5a85e329e3b3f5a72", - "fixed_version": "4.19.276" - }, - "5.10": { - "cmt_id": "21a2eec4a440060a6eb294dc890eaf553101ba09", - "fixed_version": "5.10.173" - }, + "CVE-2022-2785": { + "5.19": { + "cmt_id": "b429d0b9a7a0f3dddb1f782b72629e6353f292fd", + "fixed_version": "5.19.4" + } + }, + "CVE-2022-27950": { "5.15": { - "cmt_id": "3959316f8ceb17866646abc6be4a332655407138", - "fixed_version": "5.15.99" - }, - "5.4": { - "cmt_id": "dd08e68d04d08d2f42b09162c939a0b0841216cc", - "fixed_version": "5.4.235" - }, - "6.1": { - "cmt_id": "ee907829b36949c452c6f89485cb2a58e97c048e", - "fixed_version": "6.1.16" + "cmt_id": "de0d102d0c8c681fc9a3263d842fb35f7cf662f4", + "fixed_version": "5.15.25" }, - "6.2": { - "cmt_id": "b08bcfb4c97d7bd41b362cff44b2c537ce9e8540", - "fixed_version": "6.2.3" + "5.16": { + "cmt_id": "80dad7483e3940dc9d9d55f8b34d1f4ba85a505e", + "fixed_version": "5.16.11" } }, - "CVE-2023-1095": { + "CVE-2022-28356": { "4.14": { - "cmt_id": "49d57fb1fd44b9d3422f096d3b1b6415685d7364", - "fixed_version": "4.14.291" + "cmt_id": "0f294bc04be87f1c9e1d1a908db9fcc84ce94210", + "fixed_version": "4.14.274" }, "4.19": { - "cmt_id": "d3f409c375490a86d342eae1d0f6271d12dc19d0", - "fixed_version": "4.19.256" + "cmt_id": "d14193111c436fc5de33206c67c7afd45c730099", + "fixed_version": "4.19.237" }, "4.9": { - "cmt_id": "ef6b262e551da27579e7ac255928394176353115", - "fixed_version": "4.9.326" + "cmt_id": "0a7aad979bfb43c4a78d33a5f356caf4ceb28bca", + "fixed_version": "4.9.309" }, "5.10": { - "cmt_id": "80977126bc20309f7f7bae6d8621356b393e8b41", - "fixed_version": "5.10.137" + "cmt_id": "571df3393f523b59cba87e2f3e80a3a624030f9c", + "fixed_version": "5.10.109" }, "5.15": { - "cmt_id": "8a2df34b5bf652566f2889d9fa321f3b398547ef", - "fixed_version": "5.15.61" + "cmt_id": "e9072996108387ab19b497f5b557c93f98d96b0b", + "fixed_version": "5.15.32" }, - "5.18": { - "cmt_id": "c90b99a6b44f2a5f8498d91cfdcf3cf28ea7c130", - "fixed_version": "5.18.18" + "5.16": { + "cmt_id": "6f5bf395c60ed2643de51f2b1041cb0882e9d97f", + "fixed_version": "5.16.18" }, - "5.19": { - "cmt_id": "109539c9ba8497aad2948af4f09077f6a65059fe", - "fixed_version": "5.19.2" + "5.17": { + "cmt_id": "ef1a6fe3563cf47ce4fd555727ca80085cf18884", + "fixed_version": "5.17.1" }, "5.4": { - "cmt_id": "a452bc3deb23bf93f8a13d3e24611b7ef39645dc", - "fixed_version": "5.4.211" + "cmt_id": "572f9a0d3f3feb8bd3422e88ad71882bc034b3ff", + "fixed_version": "5.4.188" } }, - "CVE-2023-1118": { + "CVE-2022-28388": { "4.14": { - "cmt_id": "0987f836bc1a258cb8fb51669a5afb67bb01c31b", - "fixed_version": "4.14.308" + "cmt_id": "a5e2259173eb52a728bbf32e02aa9a388451e614", + "fixed_version": "4.14.277" }, "4.19": { - "cmt_id": "52bde2754d76fc97390f097fba763413607f157a", - "fixed_version": "4.19.276" + "cmt_id": "8eb78da898079c0d7250c32ebf0c35fb81737abe", + "fixed_version": "4.19.240" }, "5.10": { - "cmt_id": "78da5a378bdacd5bf68c3a6389bdc1dd0c0f5b3c", - "fixed_version": "5.10.173" + "cmt_id": "5318cdf4fd834856ce71238b064f35386f9ef528", + "fixed_version": "5.10.110" }, "5.15": { - "cmt_id": "29962c478e8b2e6a6154d8d84b8806dbe36f9c28", - "fixed_version": "5.15.99" + "cmt_id": "f2ce5238904f539648aaf56c5ee49e5eaf44d8fc", + "fixed_version": "5.15.33" }, - "5.4": { - "cmt_id": "d120334278b370b6a1623a75ebe53b0c76cb247c", - "fixed_version": "5.4.235" + "5.16": { + "cmt_id": "3e006cf0fb809815d56e59c9de4486fbe253ccdf", + "fixed_version": "5.16.19" }, - "6.1": { - "cmt_id": "029c1410e345ce579db5c007276340d072aac54a", - "fixed_version": "6.1.16" + "5.17": { + "cmt_id": "29d6c06168faa23ce23db3321981c8fde576c95c", + "fixed_version": "5.17.2" }, - "6.2": { - "cmt_id": "182ea492aae5b64067277e60a4ea5995c4628555", - "fixed_version": "6.2.3" + "5.4": { + "cmt_id": "660784e7194ac2953aebe874c1f75f2441ba3d19", + "fixed_version": "5.4.191" } }, - "CVE-2023-1192": { - "5.15": { - "cmt_id": "2a67f26f70ab344ae6ea78638890eebc1191a501", - "fixed_version": "5.15.113" + "CVE-2022-28389": { + "4.14": { + "cmt_id": "cdced1015a63a7f100b5867ebb9a40271f891411", + "fixed_version": "4.14.276" }, - "6.1": { - "cmt_id": "a8eaa9a06addbd9cb0238cb1c729921ecbb6504c", - "fixed_version": "6.1.33" + "4.19": { + "cmt_id": "a8bba9fd73775e66b4021b18f2193f769ce48a59", + "fixed_version": "4.19.238" }, - "6.3": { - "cmt_id": "e6f4b1c32d6d6047958d7700d12fed6d91f441e7", - "fixed_version": "6.3.4" - } - }, - "CVE-2023-1193": { - "5.15": { - "cmt_id": "9494242c8e76e6a98c8ab5f6aed0fa4bd56ac6d5", - "fixed_version": "5.15.145" + "5.10": { + "cmt_id": "0801a51d79389282c1271e623613b2e1886e071e", + "fixed_version": "5.10.110" }, - "6.1": { - "cmt_id": "8d271ef5e5cac8a470076891b248a28a2c57fb1e", - "fixed_version": "6.1.71" - } - }, - "CVE-2023-1194": { "5.15": { - "cmt_id": "55ceeb4e1c71793e852c20ad01ffd31515303546", - "fixed_version": "5.15.145" + "cmt_id": "37f07ad24866c6c1423b37b131c9a42414bcf8a1", + "fixed_version": "5.15.33" }, - "6.1": { - "cmt_id": "8f2984233c87a1d08f4c45f077130590c7a2c991", - "fixed_version": "6.1.34" + "5.16": { + "cmt_id": "f913412848defa326a155c47d026267624472190", + "fixed_version": "5.16.19" }, - "6.3": { - "cmt_id": "61dfe01204daf5469f21cc639f710f9e28e929c8", - "fixed_version": "6.3.8" + "5.17": { + "cmt_id": "42a4b0dfd365c4f77f96fd1f73a64b47ae443a38", + "fixed_version": "5.17.2" + }, + "5.4": { + "cmt_id": "2dfe9422d528630e2ce0d454147230cce113f814", + "fixed_version": "5.4.189" } }, - "CVE-2023-1206": { + "CVE-2022-28390": { "4.14": { - "cmt_id": "ebfedbfb36eecab2d4bfa6faeaad763cbfe3a0e8", - "fixed_version": "4.14.322" + "cmt_id": "29d967c18737ce04f372831c4542e71da1a8d5c8", + "fixed_version": "4.14.276" }, "4.19": { - "cmt_id": "8fa0dea2fc96f192d81a12434e48deda2e556320", - "fixed_version": "4.19.291" - }, - "5.10": { - "cmt_id": "0cd74fbd3b8327e60525e1ec4a6c28895693909f", - "fixed_version": "5.10.190" - }, - "5.15": { - "cmt_id": "ecb741a17cb2abf693b34d8e05a1e7e40494afb6", - "fixed_version": "5.15.124" - }, - "5.4": { - "cmt_id": "d87d67c8bdd13b2d4f7414ba97c54ba825337c47", - "fixed_version": "5.4.253" + "cmt_id": "dec3ed0c76483748268bf36ec278af660b0f80ba", + "fixed_version": "4.19.238" }, - "6.1": { - "cmt_id": "51aea7e9d5212adb8a3d198510cfcde4125988f9", - "fixed_version": "6.1.43" + "4.9": { + "cmt_id": "e9c4ee674586ff0b098d17638af719aa56c9c272", + "fixed_version": "4.9.311" }, - "6.4": { - "cmt_id": "1e50c11ed44e28a57c6215a5e7643ae85c6297fa", - "fixed_version": "6.4.8" - } - }, - "CVE-2023-1249": { "5.10": { - "cmt_id": "558564db44755dfb3e48b0d64de327d20981e950", + "cmt_id": "b417f9c50586588754b2b0453a1f99520cf7c0e8", "fixed_version": "5.10.110" }, "5.15": { - "cmt_id": "39fd0cc079c98dafcf355997ada7b5e67f0bb10a", + "cmt_id": "459b19f42fd5e031e743dfa119f44aba0b62ff97", "fixed_version": "5.15.33" }, "5.16": { - "cmt_id": "c8015981eaa5bd8901a145c8d1253592a5619d2b", + "cmt_id": "41f6be840f138c7d42312d7619a6b44c001d6b6e", "fixed_version": "5.16.19" }, "5.17": { - "cmt_id": "5c6baf808f409b69ad0799a551a704177b5a7ec1", + "cmt_id": "3f71f499395545119383f10760b8b19703d2a7dd", "fixed_version": "5.17.2" - } - }, - "CVE-2023-1252": { - "5.10": { - "cmt_id": "4fd9f0509a1452b45e89c668e2bab854cb05cd25", - "fixed_version": "5.10.80" - }, - "5.14": { - "cmt_id": "500a1bac743cf7505726ee491efb89772677fc72", - "fixed_version": "5.14.19" }, - "5.15": { - "cmt_id": "2f372e38f5724301056e005353c8beecc3f8d257", - "fixed_version": "5.15.3" + "5.4": { + "cmt_id": "e27caad38b59b5b00b9c5228d04c13111229deec", + "fixed_version": "5.4.189" } }, - "CVE-2023-1281": { - "5.10": { - "cmt_id": "eb8e9d8572d1d9df17272783ad8a84843ce559d4", - "fixed_version": "5.10.169" - }, + "CVE-2022-2873": { "5.15": { - "cmt_id": "becf55394f6acb60dd60634a1c797e73c747f9da", - "fixed_version": "5.15.95" + "cmt_id": "24c6fc6e7453f64cf6cbb4218c62aafdecc16ee1", + "fixed_version": "5.15.45" }, - "6.1": { - "cmt_id": "bd662ba56187b5ef8a62a3511371cd38299a507f", - "fixed_version": "6.1.13" + "5.17": { + "cmt_id": "fc2f9ee7568609adb68b1f55f0a4c182b09a47e7", + "fixed_version": "5.17.13" }, - "6.2": { - "cmt_id": "ee059170b1f7e94e55fa6cadee544e176a6e59c2", - "fixed_version": "6.2" + "5.18": { + "cmt_id": "2a81133304e8c10e6afa03e59f1b11beaccc7153", + "fixed_version": "5.18.2" } }, - "CVE-2023-1295": { - "5.11": { - "cmt_id": "21eba814af427b0901811acdfce415c4b8b7c844", - "fixed_version": "5.11.6" + "CVE-2022-28796": { + "5.17": { + "cmt_id": "bff94c57bd130e3062afa94414c2294871314096", + "fixed_version": "5.17.1" } }, - "CVE-2023-1380": { - "4.14": { - "cmt_id": "ac5305e5d227b9af3aae25fa83380d3ff0225b73", - "fixed_version": "4.14.315" - }, - "4.19": { - "cmt_id": "39f9bd880abac6068bedb24a4e16e7bd26bf92da", - "fixed_version": "4.19.283" - }, + "CVE-2022-28893": { "5.10": { - "cmt_id": "549825602e3e6449927ca1ea1a08fd89868439df", - "fixed_version": "5.10.180" + "cmt_id": "e68b60ae29de10c7bd7636e227164a8dbe305a82", + "fixed_version": "5.10.117" }, "5.15": { - "cmt_id": "936a23293bbb3332bdf4cdb9c1496e80cb0bc2c8", - "fixed_version": "5.15.110" - }, - "5.4": { - "cmt_id": "425eea395f1f5ae349fb55f7fe51d833a5324bfe", - "fixed_version": "5.4.243" + "cmt_id": "54f6834b283d9b4d070b0639d9ef5e1d156fe7b0", + "fixed_version": "5.15.41" }, - "6.1": { - "cmt_id": "e29661611e6e71027159a3140e818ef3b99f32dd", - "fixed_version": "6.1.27" + "5.16": { + "cmt_id": "7a0921a23cae42e9fa5ce964f6907181b6dc80d8", + "fixed_version": "5.16.20" }, - "6.2": { - "cmt_id": "228186629ea970cc78b7d7d5f593f2d32fddf9f6", - "fixed_version": "6.2.14" + "5.17": { + "cmt_id": "d21287d8a4589dd8513038f887ece980fbc399cf", + "fixed_version": "5.17.3" }, - "6.3": { - "cmt_id": "21bee3e649d87f78fe8aef6ae02edd3d6f310fd0", - "fixed_version": "6.3.1" + "5.4": { + "cmt_id": "2f8f6c393b11b5da059b1fc10a69fc2f2b6c446a", + "fixed_version": "5.4.196" } }, - "CVE-2023-1382": { - "4.19": { - "cmt_id": "2c9c64a95d97727c9ada0d35abc90ee5fdbaeff7", - "fixed_version": "4.19.268" - }, + "CVE-2022-2905": { "5.10": { - "cmt_id": "e87a077d09c05985a0edac7c6c49bb307f775d12", - "fixed_version": "5.10.157" + "cmt_id": "e8979807178434db8ceaa84dfcd44363e71e50bb", + "fixed_version": "5.10.140" }, "5.15": { - "cmt_id": "4ae907c45fcad4450423b8cdefa5a74bad772068", - "fixed_version": "5.15.81" - }, - "5.4": { - "cmt_id": "30f91687fa2502abb0b4d79569b63d1381169ccf", - "fixed_version": "5.4.226" + "cmt_id": "4f672112f8665102a5842c170be1713f8ff95919", + "fixed_version": "5.15.64" }, - "6.0": { - "cmt_id": "66d7a37e2ec769fbb4b086cc03c320565be3fbb9", - "fixed_version": "6.0.11" + "5.19": { + "cmt_id": "a36df92c7ff7ecde2fb362241d0ab024dddd0597", + "fixed_version": "5.19.6" } }, - "CVE-2023-1390": { - "4.14": { - "cmt_id": "3ed0b5bb8cf71b4b9f995d4b3763648674fa032a", - "fixed_version": "4.14.217" - }, - "4.19": { - "cmt_id": "4d1d3dddcb3f26000e66cd0a9b8b16f7c2eb41bb", - "fixed_version": "4.19.170" + "CVE-2022-29156": { + "5.10": { + "cmt_id": "8260f1800f83e667f26c80baa7f0b9d92ae271d7", + "fixed_version": "5.10.103" }, - "4.9": { - "cmt_id": "310014f572a59b311c175321265a08c9adfced0c", - "fixed_version": "4.9.253" + "5.15": { + "cmt_id": "bf2cfad0c6e4b0d1b34d26420fddaf18dc25e56d", + "fixed_version": "5.15.26" }, + "5.16": { + "cmt_id": "fa498059c631e94e91dcb6d78070909d8de56d99", + "fixed_version": "5.16.12" + } + }, + "CVE-2022-2938": { "5.10": { - "cmt_id": "60b8b4e6310b7dfc551ba68e8639eeaf70a0b2dd", - "fixed_version": "5.10.10" + "cmt_id": "d4e4e61d4a5b87bfc9953c306a11d35d869417fd", + "fixed_version": "5.10.97" + }, + "5.15": { + "cmt_id": "d3e4c61e143e69671803ef3f52140cf7a7258ee7", + "fixed_version": "5.15.19" + }, + "5.16": { + "cmt_id": "991ced6a3a926e58df1f446819b9f2790e1c0daa", + "fixed_version": "5.16.5" }, "5.4": { - "cmt_id": "56e8947bcf814d195eb4954b4821868803d3dd67", - "fixed_version": "5.4.92" + "cmt_id": "2fd752ed77ab9880da927257b73294f29a199f1a", + "fixed_version": "5.4.177" } }, - "CVE-2023-1513": { + "CVE-2022-29581": { "4.14": { - "cmt_id": "1d43de93b35d85981006ec3c52c0cad8af1f2f6a", - "fixed_version": "4.14.306" + "cmt_id": "0511cdd41a03ab396602dded4e778c5edcd8dcd1", + "fixed_version": "4.14.278" }, "4.19": { - "cmt_id": "669c76e55de332fbcbce5b74fccef1b4698a8936", - "fixed_version": "4.19.273" + "cmt_id": "75b0cc7904da7b40c6e8f2cf3ec4223b292b1184", + "fixed_version": "4.19.241" }, "5.10": { - "cmt_id": "6416c2108ba54d569e4c98d3b62ac78cb12e7107", - "fixed_version": "5.10.169" + "cmt_id": "43ce33a68e2bcc431097e1075aad5393d0bf53ba", + "fixed_version": "5.10.113" }, "5.15": { - "cmt_id": "35351e3060d67eed8af1575d74b71347a87425d8", - "fixed_version": "5.15.95" - }, - "5.4": { - "cmt_id": "9f95a161a7deef62d6d2f57b1a69f94e0546d8d8", - "fixed_version": "5.4.232" + "cmt_id": "ba9e9a794fd1689bf7e8a7452c55f3d3cbda7728", + "fixed_version": "5.15.36" }, - "6.1": { - "cmt_id": "747ca7c8a0c7bce004709143d1cd6596b79b1deb", - "fixed_version": "6.1.13" + "5.17": { + "cmt_id": "64c87076791198b23da730186b0c141d9a6ce80c", + "fixed_version": "5.17.5" }, - "6.2": { - "cmt_id": "2c10b61421a28e95a46ab489fd56c0f442ff6952", - "fixed_version": "6.2" + "5.4": { + "cmt_id": "5a4f3eba211a532b2eb5045102ad3ceea5e9f0f9", + "fixed_version": "5.4.191" } }, - "CVE-2023-1582": { + "CVE-2022-29582": { "5.10": { - "cmt_id": "db3f3636e4aed2cba3e4e7897a053323f7a62249", - "fixed_version": "5.10.102" + "cmt_id": "2827328e646d0c2d3db1bfcad4b5f5016ce0d643", + "fixed_version": "5.10.111" }, "5.15": { - "cmt_id": "a8dd0cfa37792863b6c4bf9542975212a6715d49", - "fixed_version": "5.15.25" + "cmt_id": "ba7261af2b030ab2c06189be1fc77b273716839f", + "fixed_version": "5.15.34" }, "5.16": { - "cmt_id": "05d3f8045efa59457b323caf00bdb9273b7962fa", - "fixed_version": "5.16.10" - } - }, - "CVE-2023-1583": { - "6.1": { - "cmt_id": "7b100a45dc19ffd708f364ba66601efaca1ccf56", - "fixed_version": "6.1.22" + "cmt_id": "d568c13d9d29d3151540a0d1b20c3a1ca801a662", + "fixed_version": "5.16.20" }, - "6.2": { - "cmt_id": "2ff9f7319b915acc42cf8fcf743589f926f4a014", - "fixed_version": "6.2.9" + "5.17": { + "cmt_id": "11cd7959400258beb1dc17c8680055966263f316", + "fixed_version": "5.17.3" } }, - "CVE-2023-1611": { + "CVE-2022-2959": { "5.10": { - "cmt_id": "5f6347034341bf45056ca1ec3fa72040152ecf83", - "fixed_version": "5.10.177" + "cmt_id": "8fbd54ab06c955d247c1a91d5d980cddc868f1e7", + "fixed_version": "5.10.120" }, "5.15": { - "cmt_id": "c976f9233ef926e090db5614a837824a0bcab3fb", - "fixed_version": "5.15.106" - }, - "5.4": { - "cmt_id": "0e0f324c259d87639bda61a0bdea9c32c4aecdc6", - "fixed_version": "5.4.253" + "cmt_id": "cf2fbc56c478a34a68ff1fa6ad08460054dfd499", + "fixed_version": "5.15.45" }, - "6.1": { - "cmt_id": "a38ff2024805a30d9b96f52557c6ea0bbc31252a", - "fixed_version": "6.1.23" + "5.17": { + "cmt_id": "f0d6abaa98060c6892e42f44f61b1938d923ac6d", + "fixed_version": "5.17.13" }, - "6.2": { - "cmt_id": "4caab245b0469ce9258ba099a41e909f5d307b33", - "fixed_version": "6.2.10" + "5.18": { + "cmt_id": "71c603806614c6715165eed06099e24c2e41ad58", + "fixed_version": "5.18.2" } }, - "CVE-2023-1637": { + "CVE-2022-2964": { "4.14": { - "cmt_id": "7b5f17024f115b6aa42d2a079326dd0ca8e3449b", - "fixed_version": "4.14.276" + "cmt_id": "63f0cfb36c1f1964a59ce544156677601e2d8740", + "fixed_version": "4.14.268" }, "4.19": { - "cmt_id": "edc7b755e8fce10009ac85bb234a035557301bc4", - "fixed_version": "4.19.238" + "cmt_id": "1668781ed24da43498799aa4f65714a7de201930", + "fixed_version": "4.19.231" }, "4.9": { - "cmt_id": "1d2e6ac145b6b818542a0810df51c931a696ab0d", - "fixed_version": "4.9.311" + "cmt_id": "711b6bf3fb052f0a6b5b3205d50e30c0c2980382", + "fixed_version": "4.9.303" }, "5.10": { - "cmt_id": "fc4bdaed4d4ea4209e65115bd3948a1e4ac51cbb", - "fixed_version": "5.10.111" + "cmt_id": "758290defe93a865a2880d10c5d5abd288b64b5d", + "fixed_version": "5.10.101" }, "5.15": { - "cmt_id": "fab4b79e869a8e1c0f7d931a4eff0285d9b5efa7", - "fixed_version": "5.15.34" + "cmt_id": "ffd0393adcdcefab7e131488e10dcfde5e02d6eb", + "fixed_version": "5.15.24" }, "5.16": { - "cmt_id": "aeb473e7ed48b1d5e511353cbef5f4e6e00544ac", - "fixed_version": "5.16.20" - }, - "5.17": { - "cmt_id": "9ffaef8717992fd23184a745ca8224d9635f9db3", - "fixed_version": "5.17.3" + "cmt_id": "9681823f96a811268265f35307072ad80713c274", + "fixed_version": "5.16.10" }, "5.4": { - "cmt_id": "17f3e31c860371ff72db7f9b2fb44ab008a133e0", - "fixed_version": "5.4.189" + "cmt_id": "a0fd5492ee769029a636f1fb521716b022b1423d", + "fixed_version": "5.4.180" } }, - "CVE-2023-1652": { - "5.15": { - "cmt_id": "0a27dcd5343026ac0cb168ee63304255372b7a36", - "fixed_version": "5.15.91" - }, - "6.1": { - "cmt_id": "32d5eb95f8f0e362e37c393310b13b9e95404560", - "fixed_version": "6.1.9" - } - }, - "CVE-2023-1670": { - "4.14": { - "cmt_id": "fe7eebebca51d56b900331c3052a6342731f1117", - "fixed_version": "4.14.312" + "CVE-2022-2977": { + "4.14": { + "cmt_id": "473a66f99cb8173c14138c5a5c69bfad04e8f9ac", + "fixed_version": "4.14.276" }, "4.19": { - "cmt_id": "526660c25d3b93b1232a525b75469048388f0928", - "fixed_version": "4.19.280" + "cmt_id": "cb64bd038beacb4331fe464a36c8b5481e8f51e2", + "fixed_version": "4.19.238" }, "5.10": { - "cmt_id": "bfeeb3aaad4ee8eaaefe5d9edd9b2ccb5d9b7505", - "fixed_version": "5.10.177" + "cmt_id": "290e05f346d1829e849662c97e42d5ad984f5258", + "fixed_version": "5.10.110" }, "5.15": { - "cmt_id": "4ab9e85a5ce0b2ef6e63abf861179898da613d78", - "fixed_version": "5.15.105" + "cmt_id": "662893b4f6bd466ff9e1cd454c44c26d32d554fe", + "fixed_version": "5.15.33" }, - "5.4": { - "cmt_id": "a07ec453e86abbd14e2d06d59367b4dd11437358", - "fixed_version": "5.4.240" + "5.16": { + "cmt_id": "2f928c0d5c02dbab49e8c19d98725c822f6fc409", + "fixed_version": "5.16.19" }, - "6.1": { - "cmt_id": "9d882229d365f68f74028252261ab14a8de7faed", - "fixed_version": "6.1.22" + "5.17": { + "cmt_id": "6e7baf84149fb43950631415de231b3a41915aa3", + "fixed_version": "5.17.1" }, - "6.2": { - "cmt_id": "9c515f3290456bb6850bd7ee29d5bf6652d7f103", - "fixed_version": "6.2.9" + "5.4": { + "cmt_id": "a27ed2f3695baf15f9b34d2d7a1f9fc105539a81", + "fixed_version": "5.4.189" } }, - "CVE-2023-1829": { + "CVE-2022-2978": { "4.14": { - "cmt_id": "53af9c793f644d5841d84d8e0ad83bd7ab47f3e0", - "fixed_version": "4.14.308" + "cmt_id": "c0aa76b0f17f59dd9c9d3463550a2986a1d592e4", + "fixed_version": "4.14.296" }, "4.19": { - "cmt_id": "01d0d2b8b4e3cf2110baba9371c0c3d04ad5c77b", - "fixed_version": "4.19.276" + "cmt_id": "ec2aab115eb38ac4992ea2fcc2a02fbe7af5cf48", + "fixed_version": "4.19.262" + }, + "4.9": { + "cmt_id": "d1ff475d7c83289d0a7faef346ea3bbf90818bad", + "fixed_version": "4.9.331" }, "5.10": { - "cmt_id": "18c3fa7a7fdbb4d21dafc8a7710ae2c1680930f6", - "fixed_version": "5.10.173" + "cmt_id": "1e555c3ed1fce4b278aaebe18a64a934cece57d8", + "fixed_version": "5.10.148" }, "5.15": { - "cmt_id": "7c183dc0af472dec33d2c0786a5e356baa8cad19", - "fixed_version": "5.15.100" + "cmt_id": "64b79e632869ad3ef6c098a4731d559381da1115", + "fixed_version": "5.15.73" }, - "5.4": { - "cmt_id": "7a6fb69bbcb21e9ce13bdf18c008c268874f0480", - "fixed_version": "5.4.235" + "5.19": { + "cmt_id": "81de80330fa6907aec32eb54c5619059e6e36452", + "fixed_version": "5.19.15" }, - "6.1": { - "cmt_id": "3abebc503a5148072052c229c6b04b329a420ecd", - "fixed_version": "6.1.18" + "5.4": { + "cmt_id": "70e4f70d54e0225f91814e8610477d65f33cefe4", + "fixed_version": "5.4.218" }, - "6.2": { - "cmt_id": "372ae77cf11d11fb118cbe2d37def9dd5f826abd", - "fixed_version": "6.2.5" + "6.0": { + "cmt_id": "2a96b532098284ecf8e4849b8b9e5fc7a28bdee9", + "fixed_version": "6.0.1" } }, - "CVE-2023-1838": { - "4.14": { - "cmt_id": "d1bcb0ab20980c6da663708c9a47c322703f9fc3", - "fixed_version": "4.14.317" - }, - "4.19": { - "cmt_id": "6ca70982c646cc32e458150ee7f2530a24369b8c", - "fixed_version": "4.19.245" - }, + "CVE-2022-29900": { "5.10": { - "cmt_id": "ec0d801d1a44d9259377142c6218885ecd685e41", - "fixed_version": "5.10.118" + "cmt_id": "7070bbb66c5303117e4c7651711ea7daae4c64b5", + "fixed_version": "5.10.133" }, "5.15": { - "cmt_id": "42d8a6dc45fc6619b8def1a70b7bd0800bcc4574", - "fixed_version": "5.15.42" - }, - "5.17": { - "cmt_id": "d759015c9bcaa87d2ebf41c7bab561f7033c3e80", - "fixed_version": "5.17.10" + "cmt_id": "ccb25d7db1a29bc251692be745b000e6f0754048", + "fixed_version": "5.15.57" }, "5.18": { - "cmt_id": "fb4554c2232e44d595920f4d5c66cf8f7d13f9bc", - "fixed_version": "5.18" + "cmt_id": "e492002673b03c636d2297fb869d68ae545c41c4", + "fixed_version": "5.18.14" }, "5.4": { - "cmt_id": "3a12b2c413b20c17832ec51cb836a0b713b916ac", - "fixed_version": "5.4.196" + "cmt_id": "893cd858b09ca20c8c919db8dc5b009895626da3", + "fixed_version": "5.4.217" } }, - "CVE-2023-1855": { - "4.14": { - "cmt_id": "c809ed776e190edfc04f8d6b25a62855b1386a0d", - "fixed_version": "4.14.311" - }, - "4.19": { - "cmt_id": "e0a37b43cd732038e37b4e7f6c6c0658fe0b6d73", - "fixed_version": "4.19.279" - }, + "CVE-2022-29901": { "5.10": { - "cmt_id": "0a73c8b3cc99d214dff83c51805c844240c4f749", - "fixed_version": "5.10.176" + "cmt_id": "7070bbb66c5303117e4c7651711ea7daae4c64b5", + "fixed_version": "5.10.133" }, "5.15": { - "cmt_id": "7091951c2ca9d3fbec75ef1d677cbd89eeac9793", - "fixed_version": "5.15.104" - }, - "5.4": { - "cmt_id": "26c176ce902861a45f8d699e057245ed7e0bcdf2", - "fixed_version": "5.4.238" - }, - "6.1": { - "cmt_id": "b2ae1f15cd6fe0cb36e432a179ae7d479ae2e6e0", - "fixed_version": "6.1.21" - }, - "6.2": { - "cmt_id": "eacd1f6bb43ac4b9de3bf886083a71c18d5f329f", - "fixed_version": "6.2.8" - } - }, - "CVE-2023-1859": { - "4.14": { - "cmt_id": "b5664e929e2e19f644ea133ae8d87fbd5654ec5a", - "fixed_version": "4.14.313" - }, - "4.19": { - "cmt_id": "c078fcd3f00ea5eadad07da169956d84f65af49b", - "fixed_version": "4.19.281" - }, - "5.10": { - "cmt_id": "9266e939d76279d8710196d86215ba2be6345041", - "fixed_version": "5.10.178" + "cmt_id": "ccb25d7db1a29bc251692be745b000e6f0754048", + "fixed_version": "5.15.57" }, - "5.15": { - "cmt_id": "e35ae49bc198412c9294115677e5acdef95b1fb5", - "fixed_version": "5.15.108" + "5.18": { + "cmt_id": "e492002673b03c636d2297fb869d68ae545c41c4", + "fixed_version": "5.18.14" }, "5.4": { - "cmt_id": "fcd084e199b9a38490bfedd97885bbaba14475e5", - "fixed_version": "5.4.241" - }, - "6.1": { - "cmt_id": "c4002b9d5e837f152a40d1333c56ccb84975147b", - "fixed_version": "6.1.25" - }, - "6.2": { - "cmt_id": "e7dcd834af53c79418ca3cd1c42749a314b9f7dc", - "fixed_version": "6.2.12" + "cmt_id": "893cd858b09ca20c8c919db8dc5b009895626da3", + "fixed_version": "5.4.217" } }, - "CVE-2023-1872": { + "CVE-2022-29968": { "5.17": { - "cmt_id": "d657effd9029e9901243a6cec0467d425ab1fde5", - "fixed_version": "5.17.3" + "cmt_id": "77089e6ff273f43c42e99a690ae45ee39a6a62de", + "fixed_version": "5.17.6" } }, - "CVE-2023-1989": { + "CVE-2022-3028": { "4.14": { - "cmt_id": "95eacef5692545f199fae4e52abfbfa273acb351", - "fixed_version": "4.14.312" + "cmt_id": "f1b1b63e307478e93548f59e18bd844744b396d3", + "fixed_version": "4.14.292" }, "4.19": { - "cmt_id": "af4d48754d5517d33bac5e504ff1f1de0808e29e", - "fixed_version": "4.19.280" + "cmt_id": "7dbfc8f25f22fe2a64dd808266e00c8d2661ebdd", + "fixed_version": "4.19.257" + }, + "4.9": { + "cmt_id": "e580d3201ed222c4752ced7e629ad96bc0340713", + "fixed_version": "4.9.327" }, "5.10": { - "cmt_id": "da3d3fdfb4d523c5da30e35a8dd90e04f0fd8962", - "fixed_version": "5.10.177" + "cmt_id": "c5c4d4c9806dadac7bc82f9c29ef4e1b78894775", + "fixed_version": "5.10.140" }, "5.15": { - "cmt_id": "8efae2112d910d8e5166dd0a836791b08721eef1", - "fixed_version": "5.15.105" - }, - "5.4": { - "cmt_id": "a18fb433ceb56e0787546a9d77056dd0f215e762", - "fixed_version": "5.4.240" + "cmt_id": "103bd319c0fc90f1cb013c3a508615e6df8af823", + "fixed_version": "5.15.64" }, - "6.1": { - "cmt_id": "cbf8deacb7053ce3e3fed64b277c6c6989e65bba", - "fixed_version": "6.1.22" + "5.19": { + "cmt_id": "6901885656c029c976498290b52f67f2c251e6a0", + "fixed_version": "5.19.6" }, - "6.2": { - "cmt_id": "c59c65a14e8f7d738429648833f3bb3f9df0513f", - "fixed_version": "6.2.9" + "5.4": { + "cmt_id": "8ee27a4f0f1ad36d430221842767880df6494147", + "fixed_version": "5.4.212" } }, - "CVE-2023-1990": { + "CVE-2022-30594": { "4.14": { - "cmt_id": "2156490c4b7cacda9a18ec99929940b8376dc0e3", - "fixed_version": "4.14.311" + "cmt_id": "f1442ed84c43610ca8ab77deb9ca991e7354746c", + "fixed_version": "4.14.276" }, "4.19": { - "cmt_id": "3405eb641dafcc8b28d174784b203c1622c121bf", - "fixed_version": "4.19.279" + "cmt_id": "b1f438f872dcda10a79e6aeaf06fd52dfb15a6ab", + "fixed_version": "4.19.238" + }, + "4.9": { + "cmt_id": "4f96b94a8342fac058117962f1a76fc7ebd1c245", + "fixed_version": "4.9.311" }, "5.10": { - "cmt_id": "43aa468df246175207a7d5d7d6d31b231f15b49c", - "fixed_version": "5.10.176" + "cmt_id": "5a41a3033a9344d7683340e3d83f5435ffb06501", + "fixed_version": "5.10.110" }, "5.15": { - "cmt_id": "84dd9cc34014e3a3dcce0eb6d54b8a067e97676b", - "fixed_version": "5.15.104" + "cmt_id": "b6d75218ff65f4d63c9cf4986f6c55666fb90a1a", + "fixed_version": "5.15.33" }, - "5.4": { - "cmt_id": "b0c202a8dc63008205a5d546559736507a9aae66", - "fixed_version": "5.4.238" + "5.16": { + "cmt_id": "c8248775c1b96b00b680e067f99f8feaaa7c7dbc", + "fixed_version": "5.16.19" }, - "6.1": { - "cmt_id": "5e331022b448fbc5e76f24349cd0246844dcad25", - "fixed_version": "6.1.21" + "5.17": { + "cmt_id": "4d51bbc8a3799febf50471eb6888b1b58e87111e", + "fixed_version": "5.17.2" }, - "6.2": { - "cmt_id": "f589e5b56c562d99ea74e05b1c3f0eab78aa17a3", - "fixed_version": "6.2.8" + "5.4": { + "cmt_id": "2458ecd21f29a3e5571d7d97764c043083deed5e", + "fixed_version": "5.4.189" } }, - "CVE-2023-1998": { - "6.1": { - "cmt_id": "08d87c87d6461d16827c9b88d84c48c26b6c994a", - "fixed_version": "6.1.16" + "CVE-2022-3061": { + "5.10": { + "cmt_id": "e00582a36198888ffe91ed6b097d86556c8bb253", + "fixed_version": "5.10.145" }, - "6.2": { - "cmt_id": "ead3c8e54d28fa1d5454b1f8a21b96b4a969b1cb", - "fixed_version": "6.2.3" + "5.15": { + "cmt_id": "59b756da49bfa51a00a0b58b4147ce2652bc3d28", + "fixed_version": "5.15.70" } }, - "CVE-2023-2002": { - "4.14": { - "cmt_id": "73ddc585228db650bd4ff10d5b59c831924fd9ba", - "fixed_version": "4.14.315" - }, - "4.19": { - "cmt_id": "8d59548bae309000442c297bff3e54ab535f0ab7", - "fixed_version": "4.19.283" - }, - "5.10": { - "cmt_id": "98cfbad52fc286c2a1a75e04bf47b98d6489db1f", - "fixed_version": "5.10.180" - }, + "CVE-2022-3077": { "5.15": { - "cmt_id": "f1e6a14d5ae879d6ab6d90c58d2fde1b5716b389", - "fixed_version": "5.15.110" - }, - "5.4": { - "cmt_id": "48cdcb40d589d990ccc1a99fb76843484ce732a0", - "fixed_version": "5.4.243" - }, - "6.1": { - "cmt_id": "47e6893a5b0ad14c0b1c25983a1facb1cf667b6e", - "fixed_version": "6.1.27" + "cmt_id": "24c6fc6e7453f64cf6cbb4218c62aafdecc16ee1", + "fixed_version": "5.15.45" }, - "6.2": { - "cmt_id": "727b3ea80f3fdda6c686806ce3579face0415c76", - "fixed_version": "6.2.14" + "5.17": { + "cmt_id": "fc2f9ee7568609adb68b1f55f0a4c182b09a47e7", + "fixed_version": "5.17.13" }, - "6.3": { - "cmt_id": "dd30f9da333748488d96b7cb3c5a17bbaf86b32d", - "fixed_version": "6.3.1" + "5.18": { + "cmt_id": "2a81133304e8c10e6afa03e59f1b11beaccc7153", + "fixed_version": "5.18.2" } }, - "CVE-2023-2006": { + "CVE-2022-3078": { "5.10": { - "cmt_id": "3535c632e6d16c98f76e615da8dc0cb2750c66cc", - "fixed_version": "5.10.157" + "cmt_id": "663e7a72871f89f7a10cc8d7b2f17f27c64e071d", + "fixed_version": "5.10.110" }, "5.15": { - "cmt_id": "38fe0988bd516f35c614ea9a5ff86c0d29f90c9a", - "fixed_version": "5.15.81" + "cmt_id": "9dd2fd7a1f84c947561af29424c5ddcecfcf2cbe", + "fixed_version": "5.15.33" }, - "6.0": { - "cmt_id": "60272ee9be89f5e8021898e65862f93e9fba90dc", - "fixed_version": "6.0.11" + "5.16": { + "cmt_id": "dd18f929458762f07b969d24d46e1d0a0d94c908", + "fixed_version": "5.16.19" + }, + "5.17": { + "cmt_id": "79d17521953d0a16f4df91be59a543a54d1d8c4a", + "fixed_version": "5.17.2" } }, - "CVE-2023-2008": { + "CVE-2022-3104": { "5.10": { - "cmt_id": "20119c1e0fff89542ff3272ace87e04cf6ee6bea", - "fixed_version": "5.10.127" + "cmt_id": "56ac04f35fc5dc8b5b67a1fa2f7204282aa887d5", + "fixed_version": "5.10.122" }, "5.15": { - "cmt_id": "5b45535865d62633e3816ee30eb8d3213038dc17", - "fixed_version": "5.15.51" - }, - "5.18": { - "cmt_id": "44bb0618ae37c8a05b93acfcd044b9beb42201dd", - "fixed_version": "5.18.8" + "cmt_id": "1aeeca2b8397e3805c16a4ff26bf3cc8485f9853", + "fixed_version": "5.15.47" }, - "5.4": { - "cmt_id": "c7bdaad9cbfe17c83e4f56c7bb7a2d87d944f0fb", - "fixed_version": "5.4.202" - } - }, - "CVE-2023-2019": { - "5.15": { - "cmt_id": "f671cf48f383fccba313346eddb4bd6bcbdb55a4", - "fixed_version": "5.15.61" + "5.17": { + "cmt_id": "ec89c6200f8d94a86d57b2bb881fb079417f4901", + "fixed_version": "5.17.15" }, "5.18": { - "cmt_id": "0579d61ee38cbe0b32e190c29112c002f9e63190", - "fixed_version": "5.18.18" - }, - "5.19": { - "cmt_id": "ece188f236db01f5f60f1bc578bde5af2a816db2", - "fixed_version": "5.19.2" + "cmt_id": "ce12f7f6b19596edd6b250716930a4ce38bd1f96", + "fixed_version": "5.18.4" } }, - "CVE-2023-20569": { + "CVE-2022-3105": { "5.10": { - "cmt_id": "073a28a9b50662991e7d6956c2cf2fc5d54f28cd", - "fixed_version": "5.10.189" + "cmt_id": "16e5cad6eca1e506c38c39dc256298643fa1852a", + "fixed_version": "5.10.91" }, "5.15": { - "cmt_id": "236dd7133394bfe30275191e3aefcc6b3b09962b", - "fixed_version": "5.15.125" - }, - "5.4": { - "cmt_id": "1f0618bb24563aaa51473f23863b1e09bbf2ff2c", - "fixed_version": "5.4.252" + "cmt_id": "0ea8bb0811ba0ec22903cbb48ff2cd872382e8d4", + "fixed_version": "5.15.14" }, - "6.1": { - "cmt_id": "dfede4cb8ef732039b7a479d260bd89d3b474f14", - "fixed_version": "6.1.44" + "5.16": { + "cmt_id": "7694a7de22c53a312ea98960fcafc6ec62046531", + "fixed_version": "5.16" }, - "6.4": { - "cmt_id": "d351cc7c14a6e2af73bfea4aa5ee093321f4c307", - "fixed_version": "6.4.9" + "5.4": { + "cmt_id": "7646a340b25bb68cfb6d2e087a608802346d0f7b", + "fixed_version": "5.4.171" } }, - "CVE-2023-20588": { + "CVE-2022-3106": { "5.10": { - "cmt_id": "b6fc2fbf89089ecfb8eb9a89a7fc91d444f4fec7", - "fixed_version": "5.10.190" + "cmt_id": "734a3f3106053ee41cecae2a995b3d4d0c246764", + "fixed_version": "5.10.88" }, "5.15": { - "cmt_id": "a74878207b02060c5feaf88b5566208ed08eb78d", - "fixed_version": "5.15.126" - }, - "6.1": { - "cmt_id": "f2615bb47be4f53be92c81a6a8aa286c92ef04d9", - "fixed_version": "6.1.45" - }, - "6.4": { - "cmt_id": "c9c0b889e2d33d49b06bb716b95a192ed3449173", - "fixed_version": "6.4.10" + "cmt_id": "9a77c02d1d2147a76bd187af1bf5a34242662d12", + "fixed_version": "5.15.11" } }, - "CVE-2023-20593": { + "CVE-2022-3107": { "4.19": { - "cmt_id": "cfef7bbf0dca27209ea5d82d7060d4fc2c0d72ea", - "fixed_version": "4.19.289" + "cmt_id": "a30c7c81db60f7f7ad52f75a4f7de5f628063df4", + "fixed_version": "4.19.236" }, "5.10": { - "cmt_id": "93df00f9d48d48466ddbe01a06eaaf3311ecfb53", - "fixed_version": "5.10.187" + "cmt_id": "9b763ceda6f8963cc99df5772540c54ba46ba37c", + "fixed_version": "5.10.108" }, "5.15": { - "cmt_id": "be824fdb827dc06f77a31122949fe1bc011e3e1e", - "fixed_version": "5.15.122" + "cmt_id": "ab0ab176183191cffc69fe9dd8ac6c8db23f60d3", + "fixed_version": "5.15.31" }, - "5.4": { - "cmt_id": "00363ef30797211c247605464dc3daaa988531a2", - "fixed_version": "5.4.250" + "5.16": { + "cmt_id": "411e256ddf6c2295439c74f2176b0ed630c148f3", + "fixed_version": "5.16.17" }, - "6.1": { - "cmt_id": "ed9b87010aa84c157096f98c322491e9af8e8f07", - "fixed_version": "6.1.41" + "5.17": { + "cmt_id": "886e44c9298a6b428ae046e2fa092ca52e822e6a", + "fixed_version": "5.17" }, - "6.4": { - "cmt_id": "9b8bb5c4e25678af895dc9dd4a1e82b2f948cacc", - "fixed_version": "6.4.6" + "5.4": { + "cmt_id": "b01e2df5fbf68719dfb8e766c1ca6089234144c2", + "fixed_version": "5.4.187" } }, - "CVE-2023-20928": { + "CVE-2022-3108": { "5.15": { - "cmt_id": "622ef885a89ad04cfb76ee478fb44f051125d1f1", - "fixed_version": "5.15.61" + "cmt_id": "5609b7803947eea1711516dd8659c7ed39f5a868", + "fixed_version": "5.15.27" }, - "5.18": { - "cmt_id": "925e6b6f82c9c80ab3c17acbde8d16f349da7d26", - "fixed_version": "5.18.18" + "5.16": { + "cmt_id": "506c9632d77c0ae755fb66f5a0b8578c0b65a84b", + "fixed_version": "5.16.3" } }, - "CVE-2023-20938": { - "5.10": { - "cmt_id": "ae9e0cc973fb7499ea1b1a8dfd0795f728b84faf", - "fixed_version": "5.10.157" + "CVE-2022-3110": { + "5.15": { + "cmt_id": "029983ea88e59f4c7dc0d56ade2b16d6b869bf94", + "fixed_version": "5.15.47" }, "5.17": { - "cmt_id": "3bf989a7be204470c84534a5b75a8928a7ebe60d", - "fixed_version": "5.17.6" + "cmt_id": "8ae7bf782eacad803f752c83a183393b0a67127b", + "fixed_version": "5.17.15" }, - "5.4": { - "cmt_id": "4741b00cac23d5fe7d6f74858dff1968eeb1b63a", - "fixed_version": "5.4.226" + "5.18": { + "cmt_id": "ba6c278b3364ceef05e63a93787fb01081e2b263", + "fixed_version": "5.18.4" } }, - "CVE-2023-21102": { - "5.10": { - "cmt_id": "d6544bccc1967cd6a883d6abac71fc7d863e8baa", - "fixed_version": "5.10.165" + "CVE-2022-3111": { + "4.14": { + "cmt_id": "ae64b838bececea902b819a69731cb80cca8f31a", + "fixed_version": "4.14.276" }, - "5.15": { - "cmt_id": "7a993c1be595835acf578d0382bfd8f83475f301", - "fixed_version": "5.15.90" + "4.19": { + "cmt_id": "60dd1082322966f192f42fe2a6605dfa08eef41f", + "fixed_version": "4.19.238" + }, + "4.9": { + "cmt_id": "a6a3ec1626846fba62609330673a2dd5007d6a53", + "fixed_version": "4.9.311" }, - "6.1": { - "cmt_id": "72b0e5faa5149f09c6a7a74e4012f29e33509bab", - "fixed_version": "6.1.8" - } - }, - "CVE-2023-21106": { - "6.1": { - "cmt_id": "8103d53f25ec7b9aa99c134642c6e840e896be71", - "fixed_version": "6.1.9" - } - }, - "CVE-2023-2124": { "5.10": { - "cmt_id": "0e98a97f772f2ffcee8ced7a49b71e72916e0aa1", - "fixed_version": "5.10.184" + "cmt_id": "48d23ef90116c8c702bfa4cad93744e4e5588d7d", + "fixed_version": "5.10.110" }, "5.15": { - "cmt_id": "6cfe9ddb6aa698464fa16fb77a0233f68c13360c", - "fixed_version": "5.15.117" + "cmt_id": "4124966fbd95eeecca26d52433f393e2b9649a33", + "fixed_version": "5.15.33" }, - "5.4": { - "cmt_id": "c87439055174b31c51a89f8d66af2600033c664d", - "fixed_version": "5.4.249" + "5.16": { + "cmt_id": "ae07ec8110ba83295c88bff7e85835cc2f6cc4ea", + "fixed_version": "5.16.19" }, - "6.1": { - "cmt_id": "a2961463d74f5c86a8dda3b41c484c28ccc4c289", - "fixed_version": "6.1.33" + "5.17": { + "cmt_id": "011ce263361608bb2a1a5cbcc0e3c53b1d7a41d7", + "fixed_version": "5.17.2" }, - "6.3": { - "cmt_id": "69ebe82c73f4f9f4b49ed3b35ce347af20716d0a", - "fixed_version": "6.3.7" + "5.4": { + "cmt_id": "90bec38f6a4c81814775c7f3dfc9acf281d5dcfa", + "fixed_version": "5.4.189" } }, - "CVE-2023-21255": { - "6.1": { - "cmt_id": "e1e198eff1fbaf56fd8022c4fbbf59c5324ea320", - "fixed_version": "6.1.31" + "CVE-2022-3112": { + "5.10": { + "cmt_id": "032b141a91a82a5f0107ce664a35b201e60c5ce1", + "fixed_version": "5.10.110" }, - "6.3": { - "cmt_id": "c9e6aae1f26758f3e87b93cff18d79dfd80f2f25", - "fixed_version": "6.3.5" - } - }, - "CVE-2023-21264": { - "6.3": { - "cmt_id": "c3cd33abe63f0ea32c3966ae67a7efc48e86c3e0", - "fixed_version": "6.3.7" + "5.15": { + "cmt_id": "b0b890dd8df3b9a2fe726826980b1cffe17b9679", + "fixed_version": "5.15.33" + }, + "5.16": { + "cmt_id": "c316e6a49745b09025eed102e30cc1e9ba2910b2", + "fixed_version": "5.16.19" + }, + "5.17": { + "cmt_id": "879ab4096ebf996e97a768b8fd8acae4a736cce7", + "fixed_version": "5.17.2" } }, - "CVE-2023-2156": { + "CVE-2022-3113": { "5.10": { - "cmt_id": "c972851d3848647f57cd8d5625c48663410c3f96", - "fixed_version": "5.10.179" + "cmt_id": "bc2573abc691a269b54a6c14a2660f26d88876a5", + "fixed_version": "5.10.110" }, "5.15": { - "cmt_id": "4eee0d9d3c1117aa4a1c9f4c7f29287107e7c084", - "fixed_version": "5.15.109" - }, - "6.1": { - "cmt_id": "9a0b96d03c59ba560b074cdb9b6233493fd5492d", - "fixed_version": "6.1.26" + "cmt_id": "0022dc8cafa5fcd156da8ae7bfc9ca99497bdffc", + "fixed_version": "5.15.33" }, - "6.2": { - "cmt_id": "191642f5cfb38c0e44fb4783a37530bae15b8f8e", - "fixed_version": "6.2.13" + "5.16": { + "cmt_id": "cbdabb48be7b76d2a61a3554745243e37d81599e", + "fixed_version": "5.16.19" }, - "6.3": { - "cmt_id": "4e006c7a6dac0ead4c1bf606000aa90a372fc253", - "fixed_version": "6.3" + "5.17": { + "cmt_id": "0aeb244eb2fddbbc34f2227cf3fd85c86e111c9a", + "fixed_version": "5.17.2" } }, - "CVE-2023-2162": { - "4.14": { - "cmt_id": "496af9d3682ed4c28fb734342a09e6cc0c056ea4", - "fixed_version": "4.14.306" - }, - "4.19": { - "cmt_id": "6abd4698f4c8a78e7bbfc421205c060c199554a0", - "fixed_version": "4.19.273" - }, + "CVE-2022-3115": { "5.10": { - "cmt_id": "9758ffe1c07b86aefd7ca8e40d9a461293427ca0", - "fixed_version": "5.10.168" + "cmt_id": "b4c7dd0037e6aeecad9b947b30f0d9eaeda11762", + "fixed_version": "5.10.121" }, "5.15": { - "cmt_id": "0aaabdb900c7415caa2006ef580322f7eac5f6b6", - "fixed_version": "5.15.93" + "cmt_id": "4cb37f715f601cee5b026c6f9091a466266b5ba5", + "fixed_version": "5.15.46" }, - "5.4": { - "cmt_id": "d4d765f4761f9e3a2d62992f825aeee593bcb6b9", - "fixed_version": "5.4.232" + "5.17": { + "cmt_id": "9d091187844de5c884939bfae7421813941f6de1", + "fixed_version": "5.17.14" }, - "6.1": { - "cmt_id": "61e43ebfd243bcbad11be26bd921723027b77441", - "fixed_version": "6.1.11" + "5.18": { + "cmt_id": "4b60c5f398da8438c4bd2a0f3c1e7d84b1cf65ba", + "fixed_version": "5.18.3" + }, + "5.4": { + "cmt_id": "fa0d7ba25a53ac2e4bb24ef31aec49ff3578b44f", + "fixed_version": "5.4.198" } }, - "CVE-2023-2163": { + "CVE-2022-3169": { "5.10": { - "cmt_id": "b1281d008845ae9a4de9ef7510dcc1667557a67a", - "fixed_version": "5.10.179" + "cmt_id": "023435a095d22bcbbaeea7e3a8c534b5c57d0d82", + "fixed_version": "5.10.156" }, "5.15": { - "cmt_id": "e722ea6dae2cc042d1bb7090e2ef8456dd5a0e57", - "fixed_version": "5.15.109" + "cmt_id": "b1a27b2aad936746e6ef64c8a24bcb6dce6f926a", + "fixed_version": "5.15.80" }, "5.4": { - "cmt_id": "0f0a291cc5208dcc6436974246e8c18106e3c3d2", - "fixed_version": "5.4.242" - }, - "6.1": { - "cmt_id": "89603f4c9154e818b9ead1abe08545a053c66ded", - "fixed_version": "6.1.26" - }, - "6.2": { - "cmt_id": "71035a0508c04827b91a5bfeb2c9ef374f321e65", - "fixed_version": "6.2.13" + "cmt_id": "99c59256ea00ff7fab4914bb38e10a84850de514", + "fixed_version": "5.4.226" }, - "6.3": { - "cmt_id": "71b547f561247897a0a14f3082730156c0533fed", - "fixed_version": "6.3" + "6.0": { + "cmt_id": "0c2b1c56252bf19d3412137073c2c07e86f40ba1", + "fixed_version": "6.0.10" } }, - "CVE-2023-2166": { + "CVE-2022-3176": { "5.15": { - "cmt_id": "c142cba37de29f740a3852f01f59876af8ae462a", - "fixed_version": "5.15.83" - }, - "6.0": { - "cmt_id": "fcc63f2f7ee3038d53216edd0d8291e57c752557", - "fixed_version": "6.0.13" - }, - "6.1": { - "cmt_id": "0acc442309a0a1b01bcdaa135e56e6398a49439c", - "fixed_version": "6.1" + "cmt_id": "e9d7ca0c4640cbebe6840ee3bac66a25a9bacaf5", + "fixed_version": "5.15.65" } }, - "CVE-2023-2177": { + "CVE-2022-3202": { + "4.14": { + "cmt_id": "33bd243566a9b1ca94261dcc2e16c7b9e3a71c15", + "fixed_version": "4.14.276" + }, + "4.19": { + "cmt_id": "2ef74e3e0089b6615ee124e1183746974c6bb561", + "fixed_version": "4.19.238" + }, + "4.9": { + "cmt_id": "d2e45f0bc25da09efcac658d6e405115fcfa83c2", + "fixed_version": "4.9.311" + }, "5.10": { - "cmt_id": "6f3505588d66b27220f07d0cab18da380fae2e2d", - "fixed_version": "5.10.135" + "cmt_id": "b9c5ac0a15f24d63b20f899072fa6dd8c93af136", + "fixed_version": "5.10.111" }, "5.15": { - "cmt_id": "e796e1fe20ecaf6da419ef6a5841ba181bba7a0c", - "fixed_version": "5.15.59" + "cmt_id": "d925b7e78b62805fcc5440d1521181c82b6f03cb", + "fixed_version": "5.15.34" }, - "5.18": { - "cmt_id": "d99f144acc3b4b27ab91f78fd6d7085385ccd654", - "fixed_version": "5.18.16" + "5.16": { + "cmt_id": "ffe1d40aec3f6f8cc620369ba07eb5e9bd449d85", + "fixed_version": "5.16.20" }, - "5.19": { - "cmt_id": "181d8d2066c000ba0a0e6940a7ad80f1a0e68e9d", - "fixed_version": "5.19" + "5.17": { + "cmt_id": "2e0e1de4f7a17e0886524c1d6701b8e2bf5a7363", + "fixed_version": "5.17.3" }, "5.4": { - "cmt_id": "8d6dab81ee3d0309c09987ff76164a25486c43e0", - "fixed_version": "5.4.209" + "cmt_id": "e19c3149a80e4fc8df298d6546640e01601f3758", + "fixed_version": "5.4.189" } }, - "CVE-2023-2194": { + "CVE-2022-32250": { "4.14": { - "cmt_id": "b8cb50c68c87f2c4a1d65df9275073e9c94aef5e", - "fixed_version": "4.14.312" + "cmt_id": "5b732a9e8e22395d911b3e6c343cbed0e1cec275", + "fixed_version": "4.14.283" }, "4.19": { - "cmt_id": "5fc2b9485a8722c8350c3379992f5931ccfeaf98", - "fixed_version": "4.19.280" + "cmt_id": "ed44398b45add3d9be56b7457cc9e05282e518b4", + "fixed_version": "4.19.247" + }, + "4.9": { + "cmt_id": "94e9b75919619ba8c4072abc4917011a7a888a79", + "fixed_version": "4.9.318" }, "5.10": { - "cmt_id": "1eaa2b7ae90c5a5e05586df310d804de250747d3", - "fixed_version": "5.10.177" + "cmt_id": "ea62d169b6e731e0b54abda1d692406f6bc6a696", + "fixed_version": "5.10.120" }, "5.15": { - "cmt_id": "272dc775a52f2b0d0d8e844e77fefa7df8ebc653", - "fixed_version": "5.15.105" - }, - "5.4": { - "cmt_id": "f8cbad984b1601435d087125ac760d3cae90213a", - "fixed_version": "5.4.240" - }, - "6.1": { - "cmt_id": "7c64e839585eac8048bf67b1c6dcb7a5ca189a2e", - "fixed_version": "6.1.22" + "cmt_id": "f692bcffd1f2ce5488d24fbcb8eab5f351abf79d", + "fixed_version": "5.15.45" }, - "6.2": { - "cmt_id": "cc3c3ee6d035d38f116a6dec88acf7f74598aebd", - "fixed_version": "6.2.9" - } - }, - "CVE-2023-2235": { - "5.15": { - "cmt_id": "de3ef7ba684a25313c4b7405d007ab22912ef95a", - "fixed_version": "5.15.104" + "5.17": { + "cmt_id": "d8db0465bcc4d4b54ecfb67b820ed26eb1440da7", + "fixed_version": "5.17.13" }, - "6.1": { - "cmt_id": "529546ea2834ce58aa075837d57918740accf713", - "fixed_version": "6.1.21" + "5.18": { + "cmt_id": "8f44c83e51b4ca49c815f8dd0d9c38f497cdbcb0", + "fixed_version": "5.18.2" }, - "6.2": { - "cmt_id": "2c6d1b32838d8cf0114dfdbbb93f4d808e498760", - "fixed_version": "6.2.8" - } - }, - "CVE-2023-2236": { - "6.0": { - "cmt_id": "77a467a3e20978607c56aa4886f46f78ca287054", - "fixed_version": "6.0.11" + "5.4": { + "cmt_id": "f36736fbd48491a8d85cd22f4740d542c5a1546e", + "fixed_version": "5.4.198" } }, - "CVE-2023-2248": { + "CVE-2022-32296": { "4.14": { - "cmt_id": "0616570ce23bbcc1ac842e97fb8e167235f1582d", - "fixed_version": "4.14.314" + "cmt_id": "9044e70fadec49482c3cb3c2f49e81825796ea6d", + "fixed_version": "4.14.285" }, "4.19": { - "cmt_id": "6ef8120262dfa63d9ec517d724e6f15591473a78", - "fixed_version": "4.19.282" + "cmt_id": "514cd2859c5017fdc487165b093b328e24afe954", + "fixed_version": "4.19.249" }, - "5.10": { - "cmt_id": "ddcf35deb8f2a1d9addc74b586cf4c5a1f5d6020", - "fixed_version": "5.10.179" + "4.9": { + "cmt_id": "3c78eea640f69e2198b69128173e6d65a0bcdc02", + "fixed_version": "4.9.320" }, - "5.15": { - "cmt_id": "1ffc0e8105510cb826cb9d27ed1820a1131c82d4", - "fixed_version": "5.15.109" - }, - "5.4": { - "cmt_id": "35dceaeab97c9e5f3fda3b10ce7f8110df0feecd", - "fixed_version": "5.4.242" + "5.10": { + "cmt_id": "9429b75bc271b6f29e50dbb0ee0751800ff87dd9", + "fixed_version": "5.10.125" }, - "6.1": { - "cmt_id": "ce729b06dc33b01f8a6ac84da5ef54154326bf7e", - "fixed_version": "6.1.26" + "5.15": { + "cmt_id": "952a238d779eea4ecb2f8deb5004c8f56be79bc9", + "fixed_version": "5.15.41" }, - "6.2": { - "cmt_id": "420d014b19ff119e210ecc075ff611fe7844690c", - "fixed_version": "6.2.13" + "5.17": { + "cmt_id": "e3ee7bb47d6509c3e8a3e96e5d8e3bf21549b6e8", + "fixed_version": "5.17.9" }, - "6.3": { - "cmt_id": "3037933448f60f9acb705997eae62013ecb81e0d", - "fixed_version": "6.3" + "5.4": { + "cmt_id": "c26e1addf15763ae404f4bbf131719a724e768ab", + "fixed_version": "5.4.201" } }, - "CVE-2023-2269": { + "CVE-2022-3239": { "4.14": { - "cmt_id": "c9dfa8ba3b181e67970f06d80de18aa257d1ecda", - "fixed_version": "4.14.315" + "cmt_id": "1f6ab281f218c3a2b789eb976c5b1ef67139680a", + "fixed_version": "4.14.295" }, "4.19": { - "cmt_id": "b4b94b25c78ed03be0e07fa4e76fe51e64dac533", - "fixed_version": "4.19.283" + "cmt_id": "0113fa98a49a8e46a19b0ad80f29c904c6feec23", + "fixed_version": "4.19.238" }, "5.10": { - "cmt_id": "ea827627a9249154b34b646b1e1007013402afea", - "fixed_version": "5.10.180" + "cmt_id": "ec8a37b2d9a76a9443feb0af95bd06ac3df25444", + "fixed_version": "5.10.110" }, "5.15": { - "cmt_id": "e11765cea2050fa25fc3e03da858e83284c5ce79", - "fixed_version": "5.15.111" - }, - "5.4": { - "cmt_id": "29a1ef57c3be1d53ecadb749d45b0636e8245a89", - "fixed_version": "5.4.243" - }, - "6.1": { - "cmt_id": "9a94ebc74c3540aba5aa2c7b05032da4610a08c9", - "fixed_version": "6.1.28" - }, - "6.2": { - "cmt_id": "243093d536fe3cc78b450f1beb8d584505ea3193", - "fixed_version": "6.2.15" + "cmt_id": "332d45fe51d75a3a95c4a04e2cb7bffef284edd4", + "fixed_version": "5.15.33" }, - "6.3": { - "cmt_id": "a554e6ec3626d4c11f55d7eef8d6aa93fb211c24", - "fixed_version": "6.3.2" - } - }, - "CVE-2023-22996": { "5.16": { - "cmt_id": "2ee39164a701782bb88cf4a564dc7d8cb43c9bff", + "cmt_id": "37f808a9e734e9036f7aa42ba4864fc6e91d2572", "fixed_version": "5.16.19" }, "5.17": { - "cmt_id": "863bf0d2d794de665f7d3dfa5241c55300fad591", + "cmt_id": "d96dd287ca21c5b494bdb55555b33a6afec807cb", "fixed_version": "5.17.2" - } - }, - "CVE-2023-22997": { - "6.0": { - "cmt_id": "052172bb0e4d816cdd3682e4d021d2911b83aa31", - "fixed_version": "6.0.16" }, - "6.1": { - "cmt_id": "7a779e84b3c451ce4713456a413d3300143747a7", - "fixed_version": "6.1.2" + "5.4": { + "cmt_id": "92f84aa82dfaa8382785874277b0c4bedec89a68", + "fixed_version": "5.4.189" } }, - "CVE-2023-22998": { + "CVE-2022-32981": { + "4.14": { + "cmt_id": "d13c94c4b6f816e79b8e4df193db1bdcc7253610", + "fixed_version": "4.14.283" + }, + "4.19": { + "cmt_id": "a0e38a2808ea708beb4196a8873cecc23efb8e64", + "fixed_version": "4.19.247" + }, + "4.9": { + "cmt_id": "89dda10b73b7ce184caf18754907126ce7ce3fad", + "fixed_version": "4.9.318" + }, "5.10": { - "cmt_id": "0a4181b23acf53e9c95b351df6a7891116b98f9b", - "fixed_version": "5.10.171" + "cmt_id": "3be74fc0afbeadc2aff8dc69f3bf9716fbe66486", + "fixed_version": "5.10.122" }, "5.15": { - "cmt_id": "72893aadc0017f0f2998b33e7fa5e6b3a3a72d02", - "fixed_version": "5.15.61" + "cmt_id": "2a0165d278973e30f2282c15c52d91788749d2d4", + "fixed_version": "5.15.47" + }, + "5.17": { + "cmt_id": "638556430658eca42501271edb38154264767ff5", + "fixed_version": "5.17.15" }, "5.18": { - "cmt_id": "5e836ae771218ba91435d962c346cb116f0c1b8c", - "fixed_version": "5.18.18" + "cmt_id": "7764a258356c454fe56b9f56fc07c0e146a3bccb", + "fixed_version": "5.18.4" }, - "5.19": { - "cmt_id": "0cde00c48ea2bef890a0db7a788cd4bfad1573ac", - "fixed_version": "5.19.2" + "5.4": { + "cmt_id": "0c4bc0a2f8257f79a70fe02b9a698eb14695a64b", + "fixed_version": "5.4.198" } }, - "CVE-2023-22999": { + "CVE-2022-3303": { + "5.10": { + "cmt_id": "fce793a056c604b41a298317cf704dae255f1b36", + "fixed_version": "5.10.148" + }, "5.15": { - "cmt_id": "5157828d3975768b53a51cdf569203b953184022", - "fixed_version": "5.15.17" + "cmt_id": "8015ef9e8a0ee5cecfd0cb6805834d007ab26f86", + "fixed_version": "5.15.68" }, - "5.16": { - "cmt_id": "d0ed1113ba26a515af47847cceb3618e8483595a", - "fixed_version": "5.16.3" + "5.19": { + "cmt_id": "723ac5ab2891b6c10dd6cc78ef5456af593490eb", + "fixed_version": "5.19.9" + }, + "5.4": { + "cmt_id": "4051324a6dafd7053c74c475e80b3ba10ae672b0", + "fixed_version": "5.4.215" } }, - "CVE-2023-23001": { + "CVE-2022-3344": { "5.15": { - "cmt_id": "0dc4db8abccf266390b81b72064191f876e55876", - "fixed_version": "5.15.17" + "cmt_id": "3e87cb0caa25d667a9ca2fe15fef889e43ab8f95", + "fixed_version": "5.15.81" }, - "5.16": { - "cmt_id": "c994dbcc58d6d09c0f736dfbf9f5d6a62d26bd5a", - "fixed_version": "5.16.3" + "6.0": { + "cmt_id": "5ca2721b7d3ed4d3da6323a2ea7339f745866d83", + "fixed_version": "6.0.11" } }, - "CVE-2023-23002": { - "5.10": { - "cmt_id": "4579954bf4cc0bdfc4a42c88b16fe596f1e7f82d", - "fixed_version": "5.10.94" + "CVE-2022-33740": { + "4.14": { + "cmt_id": "f2c6f208a52df7e201f9fc34ae5efd7f9f40133e", + "fixed_version": "4.14.287" }, - "5.15": { - "cmt_id": "9186e6ba52af11ba7b5f432aa2321f36e00ad721", - "fixed_version": "5.15.17" + "4.19": { + "cmt_id": "3650ac3218c1640a3d597a8cee17d8e2fcf0ed4e", + "fixed_version": "4.19.251" }, - "5.16": { - "cmt_id": "85446a3b87799d87e6839611e5f528331bbe88fb", - "fixed_version": "5.16.3" - } - }, - "CVE-2023-23004": { - "5.10": { - "cmt_id": "a5bbea50d622b8f49ab8ee3b0eb283107febcf1a", - "fixed_version": "5.10.173" + "4.9": { + "cmt_id": "d1d69e0c838c2df7089357ec27000942086325c4", + "fixed_version": "4.9.322" }, - "5.15": { - "cmt_id": "1c7988d5c79f72287177bb774cde15fde69f3c97", - "fixed_version": "5.15.100" - } - }, - "CVE-2023-23006": { "5.10": { - "cmt_id": "4cd1da02f0c39606e3378c9255f17d6f85d106c7", - "fixed_version": "5.10.90" + "cmt_id": "728d68bfe68d92eae1407b8a9edc7817d6227404", + "fixed_version": "5.10.129" }, "5.15": { - "cmt_id": "4595dffccfa5b9360162c72cc0f6a33477d871cf", - "fixed_version": "5.15.13" + "cmt_id": "5dd0993c36832d33820238fc8dc741ba801b7961", + "fixed_version": "5.15.53" + }, + "5.18": { + "cmt_id": "6d98cf6e58b5867225c3b4ea49bc431895ef33f0", + "fixed_version": "5.18.10" }, "5.4": { - "cmt_id": "db484d35a9482d21a7f36da4dfc7a68aa2e9e1d6", - "fixed_version": "5.4.170" + "cmt_id": "04945b5beb73019145ac17a2565526afa7293c14", + "fixed_version": "5.4.204" } }, - "CVE-2023-23454": { + "CVE-2022-33741": { "4.14": { - "cmt_id": "c4b1e702dc841a79664c5b8000fd99ffe9b3e9c2", - "fixed_version": "4.14.312" + "cmt_id": "019eaffbb7cfdbe01b1b4e1b61e7f91688c76c2a", + "fixed_version": "4.14.287" }, "4.19": { - "cmt_id": "8ed4c82571d848d76877c4d70687686e607766e3", - "fixed_version": "4.19.280" + "cmt_id": "4b67d8e42dbba42cfafe22ac3e4117d9573fdd74", + "fixed_version": "4.19.251" + }, + "4.9": { + "cmt_id": "c6e941364608d911ac7b055d27d86e360fd94aed", + "fixed_version": "4.9.322" }, "5.10": { - "cmt_id": "b2c917e510e5ddbc7896329c87d20036c8b82952", - "fixed_version": "5.10.163" + "cmt_id": "4923217af5742a796821272ee03f8d6de15c0cca", + "fixed_version": "5.10.129" }, "5.15": { - "cmt_id": "04dc4003e5df33fb38d3dd85568b763910c479d4", - "fixed_version": "5.15.87" - }, - "5.4": { - "cmt_id": "6b17b84634f932f4787f04578f5d030874b9ff32", - "fixed_version": "5.4.229" + "cmt_id": "ed3cfc690675d852c3416aedb271e0e7d179bf49", + "fixed_version": "5.15.53" }, - "6.0": { - "cmt_id": "cde7091efe3fcc0b19f736acd0163499d1fd6d31", - "fixed_version": "6.0.19" + "5.18": { + "cmt_id": "3893cd0fec5e80e8d1c681794ee43167eb799e4d", + "fixed_version": "5.18.10" }, - "6.1": { - "cmt_id": "dc46e39b727fddc5aacc0272ef83ee872d51be16", - "fixed_version": "6.1.5" + "5.4": { + "cmt_id": "ede57be88a5fff42cd00e6bcd071503194d398dd", + "fixed_version": "5.4.204" } }, - "CVE-2023-23455": { + "CVE-2022-33742": { "4.14": { - "cmt_id": "db49adc5aff0c84ef0439a666f494a0d57c98bc7", - "fixed_version": "4.14.303" + "cmt_id": "0b06590646e0857a804c9a08545791feb2278ab6", + "fixed_version": "4.14.287" }, "4.19": { - "cmt_id": "5374c455ebe6102e3d5f1842c6d8ff72b3ca659f", - "fixed_version": "4.19.270" + "cmt_id": "981de55fb6b5253fa7ae345827c6c3ca77912e5c", + "fixed_version": "4.19.251" + }, + "4.9": { + "cmt_id": "8dad9a67100245295373523375610be850999b37", + "fixed_version": "4.9.322" }, "5.10": { - "cmt_id": "5f65f48516bfeebaab1ccc52c8fad698ddf21282", - "fixed_version": "5.10.163" + "cmt_id": "cbbd2d2531539212ff090aecbea9877c996e6ce6", + "fixed_version": "5.10.129" }, "5.15": { - "cmt_id": "f02327a4877a06cbc8277e22d4834cb189565187", - "fixed_version": "5.15.87" + "cmt_id": "6d0a9127279a4533815202e30ad1b3a39f560ba3", + "fixed_version": "5.15.53" }, - "5.4": { - "cmt_id": "63e469cb54a87df53edcfd85bb5bcdd84327ae4a", - "fixed_version": "5.4.229" - }, - "6.0": { - "cmt_id": "bbb870c88576239842602b0f7cc58c361dc8e061", - "fixed_version": "6.0.19" + "5.18": { + "cmt_id": "3ebaa2c13f680889c4fb9f090b243499d25017d0", + "fixed_version": "5.18.10" }, - "6.1": { - "cmt_id": "85655c63877aeafdc23226510ea268a9fa0af807", - "fixed_version": "6.1.5" + "5.4": { + "cmt_id": "60ac50daad36ef3fe9d70d89cfe3b95d381db997", + "fixed_version": "5.4.204" } }, - "CVE-2023-23559": { - "4.14": { - "cmt_id": "8a97563bf04358f035a0b98142ae48f1ef095b61", - "fixed_version": "4.14.305" - }, - "4.19": { - "cmt_id": "b4cc9d7ae9bed976de5463958afea2983b4ca57f", - "fixed_version": "4.19.272" - }, + "CVE-2022-33743": { "5.10": { - "cmt_id": "802fd7623e9ed19ee809b503e93fccc1e3f37bd6", - "fixed_version": "5.10.166" + "cmt_id": "547b7c640df545a344358ede93e491a89194cdfa", + "fixed_version": "5.10.129" }, "5.15": { - "cmt_id": "8cbf932c5c40b0c20597fa623c308d5bde0848b5", - "fixed_version": "5.15.91" - }, - "5.4": { - "cmt_id": "9042a9a3f29c942387e6d6036551d90c9ae6ce4f", - "fixed_version": "5.4.231" + "cmt_id": "1052fc2b7391a43b25168ae69ad658fff5170f04", + "fixed_version": "5.15.53" }, - "6.1": { - "cmt_id": "7794efa358bca8b8a2a80070c6e088a74945f018", - "fixed_version": "6.1.9" - } - }, - "CVE-2023-2430": { - "6.1": { - "cmt_id": "22a406b3629a10979916ea7cace47858410117b5", - "fixed_version": "6.1.50" + "5.18": { + "cmt_id": "a74adaffc8db86b4dbdd98762deff70b155b0f4d", + "fixed_version": "5.18.10" } }, - "CVE-2023-2483": { + "CVE-2022-33744": { "4.14": { - "cmt_id": "aee129c0096e479eae92e2127f96f9d08f16ad8f", - "fixed_version": "4.14.312" + "cmt_id": "01b86faa64b1f5aa04c0b3ca2001b0a8474f3006", + "fixed_version": "4.14.287" }, "4.19": { - "cmt_id": "4bbc59ec4feb1ea8d5cb3d9d38d4cb1317943ea4", - "fixed_version": "4.19.280" + "cmt_id": "274cb74da15ed13292fcec9097f04332eb3eea17", + "fixed_version": "4.19.251" + }, + "4.9": { + "cmt_id": "856d1b8e6e826b5087f1ea3fdbabda3557d73599", + "fixed_version": "4.9.322" }, "5.10": { - "cmt_id": "cb5879efde4f9b4de4248b835890df7b6c49ffbc", - "fixed_version": "5.10.177" + "cmt_id": "43c8d33ce353091f15312cb6de3531517d7bba90", + "fixed_version": "5.10.129" }, "5.15": { - "cmt_id": "8c4a180dc12303159592d15e8f077c20deeb1e55", - "fixed_version": "5.15.105" - }, - "5.4": { - "cmt_id": "0e5c7d00ec4f2f359234044b809eb23b7032d9b0", - "fixed_version": "5.4.240" + "cmt_id": "9f83c8f6ab14bbf4311b70bf1b7290d131059101", + "fixed_version": "5.15.53" }, - "6.1": { - "cmt_id": "5fc2c4e311a9341a2b0e044ab5f33afa37b56226", - "fixed_version": "6.1.22" + "5.18": { + "cmt_id": "efd9826d4c08abac7e8840757e3e1bfcf2876f70", + "fixed_version": "5.18.10" }, - "6.2": { - "cmt_id": "514dc3d0f176d280dc2d3cd25e898a7ec329e878", - "fixed_version": "6.2.9" + "5.4": { + "cmt_id": "5c03cad51b84fb26ccea7fd99130d8ec47949cfc", + "fixed_version": "5.4.204" } }, - "CVE-2023-25012": { + "CVE-2022-33981": { + "4.14": { + "cmt_id": "b7fa84ae1171a3c5ea5d710899080a6e63cfe084", + "fixed_version": "4.14.278" + }, + "4.19": { + "cmt_id": "0e535976774504af36fab1dfb54f3d4d6cc577a9", + "fixed_version": "4.19.241" + }, + "4.9": { + "cmt_id": "0dd02ff72c6daf4e7800fb5dd1109fbacdde97dc", + "fixed_version": "4.9.313" + }, "5.10": { - "cmt_id": "fddde36316da8acb45a3cca2e5fda102f5215877", - "fixed_version": "5.10.173" + "cmt_id": "54c028cfc49624bfc27a571b94edecc79bbaaab4", + "fixed_version": "5.10.114" }, "5.15": { - "cmt_id": "0fd9998052926ed24cfb30ab1a294cfeda4d0a8f", - "fixed_version": "5.15.99" + "cmt_id": "e52da8e4632f9c8fe78bf1c5881ce6871c7e08f3", + "fixed_version": "5.15.37" }, - "6.1": { - "cmt_id": "f2bf592ebd5077661e00aa11e12e054c4c8f6dd0", - "fixed_version": "6.1.16" + "5.17": { + "cmt_id": "d91ca05d52fabf68c0376bcfeed1a52be68a8e1b", + "fixed_version": "5.17.6" }, - "6.2": { - "cmt_id": "90289e71514e9533a9c44d694e2b492be9ed2b77", - "fixed_version": "6.2.3" + "5.4": { + "cmt_id": "7dea5913000c6a2974a00d9af8e7ffb54e47eac1", + "fixed_version": "5.4.192" } }, - "CVE-2023-2513": { + "CVE-2022-3424": { "4.14": { - "cmt_id": "ae2c644049184f04f672e23d3fa8122631ef762e", - "fixed_version": "4.14.314" + "cmt_id": "3eec37e223fabedaf90191e8a0cc61d46a96ab8d", + "fixed_version": "4.14.303" }, "4.19": { - "cmt_id": "50c3bf3865da5b4c2fb3fedb79093d3ebcfcae21", - "fixed_version": "4.19.282" + "cmt_id": "bcda4624e87d6b922e94f5c0fd0bd5f027b8b226", + "fixed_version": "4.19.270" }, "4.9": { - "cmt_id": "9337f3877a5fb8db8c563ce93cf6095b24c45151", - "fixed_version": "4.9.326" + "cmt_id": "f99d5f1bd8cd1e99931b6e5544a5601a1fe33f82", + "fixed_version": "4.9.337" }, "5.10": { - "cmt_id": "05cf34a2b6414a1172552d16159b3e17e9da36a3", - "fixed_version": "5.10.179" + "cmt_id": "0f67ed565f20ea2fdd98e3b0b0169d9e580bb83c", + "fixed_version": "5.10.163" }, "5.15": { - "cmt_id": "21f6bd5cbdab8ac7f7e9321de53668e1ef8f22a6", - "fixed_version": "5.15.61" + "cmt_id": "d5c8f9003a289ee2a9b564d109e021fc4d05d106", + "fixed_version": "5.15.86" }, - "5.18": { - "cmt_id": "c71148b6040674bd43c0148301446966048cb140", - "fixed_version": "5.18.18" + "5.4": { + "cmt_id": "0078dd8758561540ed30b2c5daa1cb647e758977", + "fixed_version": "5.4.229" }, - "5.19": { - "cmt_id": "52e6feee51b859c52af61f8a75cfdad70238c100", - "fixed_version": "5.19.2" + "6.0": { + "cmt_id": "dbc1bb8c8ea930f188b7ce45db162807b3f4b66a", + "fixed_version": "6.0.16" }, - "5.4": { - "cmt_id": "5a62248c58556c395c604d4161d53afae16b6fad", - "fixed_version": "5.4.242" + "6.1": { + "cmt_id": "4e947fc71bec7c7da791f8562d5da233b235ba5e", + "fixed_version": "6.1.2" } }, - "CVE-2023-25775": { + "CVE-2022-3435": { + "6.0": { + "cmt_id": "bb20a2ae241be846bc3c11ea4b3a3c69e41d51f2", + "fixed_version": "6.0.12" + } + }, + "CVE-2022-34494": { "5.15": { - "cmt_id": "410c05b60c1af650b37ae45010086091f2d0cebe", - "fixed_version": "5.15.144" - }, - "6.1": { - "cmt_id": "f01cfec8d3456bf389918eb898eda11f46d8b1b7", - "fixed_version": "6.1.53" + "cmt_id": "b94d40c792de7f0ceda6a2fd8a8dc0597eca6d22", + "fixed_version": "5.15.47" }, - "6.4": { - "cmt_id": "ceba966f1d6391800cab3c1c9ac1661b5166bc5b", - "fixed_version": "6.4.16" + "5.17": { + "cmt_id": "900373f8f7ee128cbbd3968722182b8d26c1e54e", + "fixed_version": "5.17.15" }, - "6.5": { - "cmt_id": "782c5702b933477b088e80e6d07b9493145b2916", - "fixed_version": "6.5.3" - } - }, - "CVE-2023-2598": { - "6.3": { - "cmt_id": "3a0a9211d7d0138d55aecd209b05e6d4a9eec383", - "fixed_version": "6.3.2" + "5.18": { + "cmt_id": "d51720ac069d465101d937273acecde1f71ea411", + "fixed_version": "5.18.4" } }, - "CVE-2023-26544": { + "CVE-2022-34495": { "5.15": { - "cmt_id": "9c8471a17f1f15b18cb7b96cba86e6f9bd6aae1c", - "fixed_version": "5.15.87" + "cmt_id": "eaf37bb6b4f7c48a5adaf1be4879107daf4d6024", + "fixed_version": "5.15.47" }, - "6.0": { - "cmt_id": "18f5468aadeef65501f1d0496a426ccdfd242e69", - "fixed_version": "6.0.17" + "5.17": { + "cmt_id": "c49fb74e050d01ea09703b7c0d5fe8b9c3855b60", + "fixed_version": "5.17.15" }, - "6.1": { - "cmt_id": "d34485d40b6a263d65bc476554299c42b2ec0187", - "fixed_version": "6.1.3" + "5.18": { + "cmt_id": "b7e88e4bb41dea89b1dadf7a985d7aff53720629", + "fixed_version": "5.18.4" } }, - "CVE-2023-26545": { + "CVE-2022-34918": { "4.14": { - "cmt_id": "b89824a9b2398d78a32ea75343e5472a0fd4986e", - "fixed_version": "4.14.306" + "cmt_id": "acd3e18fbcae6c5f9d79d75455569fc132227162", + "fixed_version": "4.14.316" }, "4.19": { - "cmt_id": "aa07c86e43ed8780d610ecfb2ce13da326729201", - "fixed_version": "4.19.273" + "cmt_id": "835fd72f61c6162f10471df197f0e4b92b1a7b76", + "fixed_version": "4.19.284" }, "5.10": { - "cmt_id": "7ff0fdba82298d1f456c685e24930da89703c0fb", - "fixed_version": "5.10.169" + "cmt_id": "0a5e36dbcb448a7a8ba63d1d4b6ade2c9d3cc8bf", + "fixed_version": "5.10.130" }, "5.15": { - "cmt_id": "59a74da8da75bdfb464cbdb399e87ba4f7500e96", - "fixed_version": "5.15.95" - }, - "5.4": { - "cmt_id": "df099e65564aa47478eb1cacf81ba69024fb5c69", - "fixed_version": "5.4.232" + "cmt_id": "c1784d2075138992b00c17ab4ffc6d855171fe6d", + "fixed_version": "5.15.54" }, - "6.1": { - "cmt_id": "c376227845eef8f2e62e2c29c3cf2140d35dd8e8", - "fixed_version": "6.1.13" + "5.18": { + "cmt_id": "6b7488071ea8ed6265a39afebd5a5920f6975d02", + "fixed_version": "5.18.11" }, - "6.2": { - "cmt_id": "fda6c89fe3d9aca073495a664e1d5aea28cd4377", - "fixed_version": "6.2" + "5.4": { + "cmt_id": "05b4105e6852b584dd115d0a1f0fe96bde9c58c5", + "fixed_version": "5.4.244" } }, - "CVE-2023-26606": { - "5.15": { - "cmt_id": "ab53749c32db90eeb4495227c998d21dc07ad8c1", - "fixed_version": "5.15.86" - }, - "6.0": { - "cmt_id": "7e686013b7071f4c16644cfad8808e76097724c4", - "fixed_version": "6.0.16" - }, - "6.1": { - "cmt_id": "f2e58e95273ce072ca95a2afa1f274825a1e1772", - "fixed_version": "6.1.2" - } - }, - "CVE-2023-26607": { - "4.14": { - "cmt_id": "801906eea32d9781725905271a1d4ab275743fc9", - "fixed_version": "4.14.300" + "CVE-2022-3521": { + "4.14": { + "cmt_id": "381b6cb3f3e66b84db77028ac7d84f18d80f1153", + "fixed_version": "4.14.300" }, "4.19": { - "cmt_id": "4301aa833a734257ad3715f607cbde17402eda94", + "cmt_id": "23a0a5869749c7833772330313ae7aec6581ec60", "fixed_version": "4.19.267" }, "4.9": { - "cmt_id": "9fa645905c0457d69906eead302f70b1c7115538", + "cmt_id": "fe3f79701fdaf8a087bc7043839e7f8b2e61b6fe", "fixed_version": "4.9.334" }, "5.10": { - "cmt_id": "6322dda483344abe47d17335809f7bbb730bd88b", + "cmt_id": "7deb7a9d33e4941c5ff190108146d3a56bf69e9d", "fixed_version": "5.10.156" }, "5.15": { - "cmt_id": "ab6a1bb17e3c2f6670020d7edeea2fbfe6466690", + "cmt_id": "27d706b0d394a907ff8c4f83ffef9d3e5817fa84", "fixed_version": "5.15.80" }, "5.4": { - "cmt_id": "0e2ce0954b39c8d60928f61217b72f352722a2cf", + "cmt_id": "ad39d09190a545d0f05ae0a82900eee96c5facea", "fixed_version": "5.4.225" }, "6.0": { - "cmt_id": "e9b64d1faa58a4ae3454acbf9c80483dd16692d4", + "cmt_id": "2526ac6b0f5a9b38e7e9073e37141cf78408078d", "fixed_version": "6.0.10" } }, - "CVE-2023-28327": { + "CVE-2022-3524": { + "4.14": { + "cmt_id": "205c1e9ac56a5cd1a7d0bc457d8b38871f5b37ed", + "fixed_version": "4.14.301" + }, + "4.19": { + "cmt_id": "bbfbdca680b0cbea0e57be597b5e2cae19747052", + "fixed_version": "4.19.268" + }, + "4.9": { + "cmt_id": "d2c9e2ebafa14a564b28e237db8d90ab7bdbd061", + "fixed_version": "4.9.335" + }, "5.10": { - "cmt_id": "575a6266f63dbb3b8eb1da03671451f0d81b8034", - "fixed_version": "5.10.159" + "cmt_id": "818c36b988b82f31e4be8ad8415e1be902b8e5f8", + "fixed_version": "5.10.154" }, "5.15": { - "cmt_id": "5c014eb0ed6c8c57f483e94cc6e90f34ce426d91", - "fixed_version": "5.15.83" + "cmt_id": "1401e9336bebaa6dd5a320f83bddc17619d4e3a6", + "fixed_version": "5.15.77" }, "5.4": { - "cmt_id": "c66d78aee55dab72c92020ebfbebc464d4f5dd2a", - "fixed_version": "5.4.227" + "cmt_id": "92aaa5e8fe90a008828a1207e66a30444bcb1cbd", + "fixed_version": "5.4.224" }, "6.0": { - "cmt_id": "9c1d6f79a2c7b8221dcec27defc6dc461052ead4", - "fixed_version": "6.0.13" - }, - "6.1": { - "cmt_id": "b3abe42e94900bdd045c472f9c9be620ba5ce553", - "fixed_version": "6.1" + "cmt_id": "0c5d628f1e1d049c33595693fab1b6e9baf25795", + "fixed_version": "6.0.7" } }, - "CVE-2023-28328": { - "4.14": { - "cmt_id": "c712d1ccbfb787620422b437a5b8fac0802547bd", - "fixed_version": "4.14.303" - }, - "4.19": { - "cmt_id": "7abfe467cd685f5da7ecb415441e45e3e4e2baa8", - "fixed_version": "4.19.270" + "CVE-2022-3526": { + "5.15": { + "cmt_id": "8f79ce226ad2e9b2ec598de2b9560863b7549d1b", + "fixed_version": "5.15.35" }, - "4.9": { - "cmt_id": "2b6a8a1a32746981044e7ab06649c804acb4068a", - "fixed_version": "4.9.337" + "5.17": { + "cmt_id": "f382df5ff36bc9fa10e0f898f3051d0702085304", + "fixed_version": "5.17.4" + } + }, + "CVE-2022-3531": { + "6.0": { + "cmt_id": "78b772629cc5adec02ab4182b62abe916f2254a0", + "fixed_version": "6.0.16" }, + "6.1": { + "cmt_id": "661e952bc9ef798d1d33ba67f2950a3e0bea455f", + "fixed_version": "6.1.2" + } + }, + "CVE-2022-3532": { + "6.1": { + "cmt_id": "d7dc8fad67fab906530c50155b12cf6117e99299", + "fixed_version": "6.1.2" + } + }, + "CVE-2022-3534": { "5.10": { - "cmt_id": "559891d430e3f3a178040c4371ed419edbfa7d65", + "cmt_id": "c61650b869e0b6fb0c0a28ed42d928eea969afc8", "fixed_version": "5.10.163" }, "5.15": { - "cmt_id": "210fcf64be4db82c0e190e74b5111e4eef661a7a", + "cmt_id": "a733bf10198eb5bb927890940de8ab457491ed3b", "fixed_version": "5.15.86" }, - "5.4": { - "cmt_id": "8b256d23361c51aa4b7fdb71176c1ca50966fb39", - "fixed_version": "5.4.229" - }, "6.0": { - "cmt_id": "6fbc44731a4665cbe92a5090e9804a388a72214b", + "cmt_id": "8c64a8e76eb85d422af5ec60ccbf26e3ead8c333", "fixed_version": "6.0.16" }, "6.1": { - "cmt_id": "6b60cf73a931af34b7a0a3f467a79d9fe0df2d70", + "cmt_id": "fbe08093fb2334549859829ef81d42570812597d", "fixed_version": "6.1.2" } }, - "CVE-2023-28410": { + "CVE-2022-3535": { + "4.19": { + "cmt_id": "84e2394b0be397f7198986aa9a28207f70b29bd4", + "fixed_version": "4.19.262" + }, "5.10": { - "cmt_id": "89ddcc81914ab58cc203acc844f27d55ada8ec0e", - "fixed_version": "5.10.110" + "cmt_id": "29f50bcf0f8b9e49c3c9b0e08fcae2ec3a88cc9f", + "fixed_version": "5.10.150" }, "5.15": { - "cmt_id": "312d3d4f49e12f97260bcf972c848c3562126a18", - "fixed_version": "5.15.33" + "cmt_id": "a624161ebe0c678c10c4c82b574fed6c04d552d8", + "fixed_version": "5.15.75" }, - "5.16": { - "cmt_id": "5f6e560e3e86ac053447524224e411034f41f5c7", - "fixed_version": "5.16.19" + "5.19": { + "cmt_id": "169aa2664639de359a7c723ba55023ef57c0dc15", + "fixed_version": "5.19.17" }, - "5.17": { - "cmt_id": "8f0ebea8f6e8c474264ed97d7a64c9c09ed4f5aa", - "fixed_version": "5.17.2" + "5.4": { + "cmt_id": "72c0d361940aec02d114d6f8f351147b85190464", + "fixed_version": "5.4.220" }, - "5.18": { - "cmt_id": "3886a86e7e6cc6ce2ce93c440fecd8f42aed0ce7", - "fixed_version": "5.18-rc1" + "6.0": { + "cmt_id": "218dbb2ef8597b837c1a8f248ad176c5f3f5b464", + "fixed_version": "6.0.3" } }, - "CVE-2023-28466": { + "CVE-2022-3541": { + "6.0": { + "cmt_id": "99e229c7fe30a1661f9f306b3df06eaf1db064aa", + "fixed_version": "6.0.3" + } + }, + "CVE-2022-3542": { + "4.14": { + "cmt_id": "f63e896e78c247d0be8165d99d543a28ca0be360", + "fixed_version": "4.14.296" + }, + "4.19": { + "cmt_id": "70421f9708d4cf14c2bd15de58862a3d22e00bbe", + "fixed_version": "4.19.262" + }, + "4.9": { + "cmt_id": "9ec3f783f08b57a861700fdf4d3d8f3cfb68f471", + "fixed_version": "4.9.331" + }, "5.10": { - "cmt_id": "1fde5782f187daa05919d2bebd872df8ebcc00d1", - "fixed_version": "5.10.177" + "cmt_id": "6cc0e2afc6a137d45b9523f61a1b1b16a68c9dc0", + "fixed_version": "5.10.150" }, "5.15": { - "cmt_id": "0b54d75aa43a1edebc8a3770901f5c3557ee0daa", - "fixed_version": "5.15.105" + "cmt_id": "0b6516a4e3eb0e2dc88a538458f3f732940f44fd", + "fixed_version": "5.15.75" + }, + "5.19": { + "cmt_id": "96c0c14135f5803f9e94e6da2ee9c4b012fdcb20", + "fixed_version": "5.19.17" }, "5.4": { - "cmt_id": "754838aa02050ff3d8675bef79d172097218ea71", - "fixed_version": "5.4.240" + "cmt_id": "71e0ab5b7598d88001762fddbfeb331543c62841", + "fixed_version": "5.4.220" }, - "6.1": { - "cmt_id": "14c17c673e1bba08032d245d5fb025d1cbfee123", - "fixed_version": "6.1.20" + "6.0": { + "cmt_id": "a712737af79b4a9a75f9abbf812279062da75777", + "fixed_version": "6.0.3" + } + }, + "CVE-2022-3543": { + "5.15": { + "cmt_id": "3975affcf55f93814a8ae14333d7fc7f183e60a4", + "fixed_version": "5.15.78" }, - "6.2": { - "cmt_id": "5231fa057bb0e52095591b303cf95ebd17bc62ce", - "fixed_version": "6.2.7" + "6.0": { + "cmt_id": "2f415ad33bc1a729fb1050141921b5a9ec4e062c", + "fixed_version": "6.0.3" } }, - "CVE-2023-2860": { + "CVE-2022-3545": { "4.14": { - "cmt_id": "dc9dbd65c803af1607484fed5da50d41dc8dd864", - "fixed_version": "4.14.293" + "cmt_id": "60537e23e40f7ca9e07679fec28af79d43d9e8f6", + "fixed_version": "4.14.303" }, "4.19": { - "cmt_id": "f684c16971ed5e77dfa25a9ad25b5297e1f58eab", - "fixed_version": "4.19.258" + "cmt_id": "6ff23e9b9a04b833388862246838bb38ac0c46b6", + "fixed_version": "4.19.270" }, "5.10": { - "cmt_id": "076f2479fc5a15c4a970ca3b5e57d42ba09a31fa", - "fixed_version": "5.10.143" + "cmt_id": "eb6313c12955c58c3d3d40f086c22e44ca1c9a1b", + "fixed_version": "5.10.160" }, "5.15": { - "cmt_id": "55195563ec29f80f984237b743de0e2b6ba4d093", - "fixed_version": "5.15.68" + "cmt_id": "9d933af8fef33c32799b9f2d3ff6bf58a63d7f24", + "fixed_version": "5.15.84" }, "5.4": { - "cmt_id": "3df71e11a4773d775c3633c44319f7acdb89011c", - "fixed_version": "5.4.213" + "cmt_id": "3c837460f920a63165961d2b88b425703f59affb", + "fixed_version": "5.4.228" } }, - "CVE-2023-28772": { + "CVE-2022-3564": { "4.14": { - "cmt_id": "50b51460f59acbd403475510ad423bb5ea7a4c97", - "fixed_version": "4.14.240" + "cmt_id": "03af22e23b96fb7ef75fb7885407ef457e8b403d", + "fixed_version": "4.14.299" }, "4.19": { - "cmt_id": "1f4c6061fccee64b2072b28dfa3e93cf859c4c0a", - "fixed_version": "4.19.198" - }, - "4.4": { - "cmt_id": "7ad5c2f4dff68a00d24f0692e027b99c7231b995", - "fixed_version": "4.4.276" + "cmt_id": "6c7407bfbeafc80a04e6eaedcf34d378532a04f2", + "fixed_version": "4.19.265" }, "4.9": { - "cmt_id": "f2b9f758e1dfb593872fd0fcd7644875bcb8757a", - "fixed_version": "4.9.276" + "cmt_id": "dc30e05bb18852303084430c03ca76e69257d9ea", + "fixed_version": "4.9.333" }, "5.10": { - "cmt_id": "f9fb4986f4d81182f938d16beb4f983fe71212aa", - "fixed_version": "5.10.51" - }, - "5.12": { - "cmt_id": "681f78589bdb473de5276e0f5b7811101c0c7b87", - "fixed_version": "5.12.18" + "cmt_id": "cb1c012099ef5904cd468bdb8d6fcdfdd9bcb569", + "fixed_version": "5.10.154" }, - "5.13": { - "cmt_id": "d57fcab190b60f43046d5836c3c56114b4f50080", - "fixed_version": "5.13.3" + "5.15": { + "cmt_id": "8278a87bb1eeea94350d675ef961ee5a03341fde", + "fixed_version": "5.15.78" }, "5.4": { - "cmt_id": "33ab9138a13e379cf1c4ccd76b97ae2ee8c5421b", - "fixed_version": "5.4.133" + "cmt_id": "4cd094fd5d872862ca278e15b9b51b07e915ef3f", + "fixed_version": "5.4.224" + }, + "6.0": { + "cmt_id": "9a04161244603f502c6e453913e51edd59cb70c1", + "fixed_version": "6.0.8" } }, - "CVE-2023-28866": { - "6.1": { - "cmt_id": "b3168abd24245aa0775c5a387dcf94d36ca7e738", - "fixed_version": "6.1.22" - }, - "6.2": { - "cmt_id": "8497222b22b591c6b2d106e0e3c1672ffe4e10e0", - "fixed_version": "6.2.9" - } - }, - "CVE-2023-2898": { - "5.10": { - "cmt_id": "b39ef5b52f10b819bd0ceeb22e8f7df7800880ca", - "fixed_version": "5.10.188" - }, - "5.15": { - "cmt_id": "982c29e0d27a48d65fd0fa0d1bcee501eeb06e76", - "fixed_version": "5.15.121" - }, - "6.1": { - "cmt_id": "ebe83e9bb8a6b3db28603fe938ee80ccaa01ed53", - "fixed_version": "6.1.39" - }, - "6.4": { - "cmt_id": "5619e9aabbd2b369cde2114ad6f55f6eb3e0b5be", - "fixed_version": "6.4.4" - } - }, - "CVE-2023-2985": { + "CVE-2022-3565": { "4.14": { - "cmt_id": "a9433406837c211af58a533d9e6f7a8f865b01f3", - "fixed_version": "4.14.308" + "cmt_id": "cbd342376a4e7ea481891181910e9e995390eb24", + "fixed_version": "4.14.296" }, "4.19": { - "cmt_id": "e226f1fdcee1ca6e68233b132718deb578a84e38", - "fixed_version": "4.19.276" + "cmt_id": "27f74a47d5b1cf52d48af15993bb1caa31ad8f5b", + "fixed_version": "4.19.262" + }, + "4.9": { + "cmt_id": "1ba21168faf881c23c270605834d01af260cbb72", + "fixed_version": "4.9.331" }, "5.10": { - "cmt_id": "ef7d71d7bd57b8b7fe514e459927696c1c6d1047", - "fixed_version": "5.10.173" + "cmt_id": "2a1d0363208528a3bacbc2c37264d60182efd482", + "fixed_version": "5.10.150" }, "5.15": { - "cmt_id": "05103d88482dc3757db108415342fdd86821a79b", - "fixed_version": "5.15.99" + "cmt_id": "7bfa18b05f381162c9d38192bbf0179f1142dd38", + "fixed_version": "5.15.75" }, - "5.4": { - "cmt_id": "3776ef785e1005355cdd86c751a8e838bac8e2e8", - "fixed_version": "5.4.235" + "5.19": { + "cmt_id": "1f76323ac43fe0b00677794c930dee9f66ea2999", + "fixed_version": "5.19.17" }, - "6.1": { - "cmt_id": "0c80bef0b7d297ea86e5408fe79c45479e504a26", - "fixed_version": "6.1.16" + "5.4": { + "cmt_id": "466ed722f205c2cf8caba5982f3cd9729e767903", + "fixed_version": "5.4.220" }, - "6.2": { - "cmt_id": "f348b373cebeaa91bf3552099026951189f14436", - "fixed_version": "6.2.3" + "6.0": { + "cmt_id": "5c9422e2d8563a3efe064493ff7ebbc2948441ea", + "fixed_version": "6.0.3" } }, - "CVE-2023-3006": { + "CVE-2022-3577": { "5.10": { - "cmt_id": "52a43b82006dc88f996bd06da5a3fcfef85220c8", - "fixed_version": "5.10.153" + "cmt_id": "296f8ca0f73f5268cd9b85cf72ff783596b2264e", + "fixed_version": "5.10.121" }, "5.15": { - "cmt_id": "52c2329147cf5d956dcaa3a91c886c550e7bdd39", - "fixed_version": "5.15.77" + "cmt_id": "22e0b0b84c538b60bdf8eeceee7ab3cebf4a1a09", + "fixed_version": "5.15.46" }, - "5.4": { - "cmt_id": "f41cab7a4653a5b39e49f1385fca53c0b8f93324", - "fixed_version": "5.4.253" + "5.17": { + "cmt_id": "2ab0a30f4f709f462d253bbb36fc64bb6de5a135", + "fixed_version": "5.17.14" }, - "6.0": { - "cmt_id": "5b962b004afa3c11e651c07232f2402b4678007b", - "fixed_version": "6.0.7" + "5.18": { + "cmt_id": "50db547e5f25218e1aec3864d77cac0cb2fc51ca", + "fixed_version": "5.18.3" + }, + "5.4": { + "cmt_id": "00771de7cc28e405f5ae19ca46facd83a534bb8f", + "fixed_version": "5.4.198" } }, - "CVE-2023-30456": { + "CVE-2022-3586": { + "4.14": { + "cmt_id": "a7af71bb5ee6e887d49f098e212ef4f2f7cfbaf6", + "fixed_version": "4.14.293" + }, "4.19": { - "cmt_id": "495adb06518bb10f50e1aa1a1dbd5daa47d118f2", - "fixed_version": "4.19.281" + "cmt_id": "9245ed20950afe225bc6d1c4b9d28d55aa152e25", + "fixed_version": "4.19.258" + }, + "4.9": { + "cmt_id": "b5aa83141aa97f81c8e06051e4bd925bfb5474fb", + "fixed_version": "4.9.328" }, "5.10": { - "cmt_id": "c54974ccaff73525462e278602dfe4069877cfaa", - "fixed_version": "5.10.176" + "cmt_id": "2ee85ac1b29dbd2ebd2d8e5ac1dd5793235d516b", + "fixed_version": "5.10.143" }, "5.15": { - "cmt_id": "9c2f09add608a505f0e5fb694805f4766801583f", - "fixed_version": "5.15.104" - }, - "5.4": { - "cmt_id": "65e4c9a6d0c9a8c81ce75576869d46fff5d7964f", - "fixed_version": "5.4.238" + "cmt_id": "1a889da60afc017050e1f517b3b976b462846668", + "fixed_version": "5.15.68" }, - "6.1": { - "cmt_id": "4bba9c8adec804f03d12dc762e50d083ee88b6b0", - "fixed_version": "6.1.21" + "5.19": { + "cmt_id": "8f796f36f5ba839c11eb4685150ebeed496c546f", + "fixed_version": "5.19.9" }, - "6.2": { - "cmt_id": "71d05b9fa0bfc131a6e2250dea045a818ff25550", - "fixed_version": "6.2.8" + "5.4": { + "cmt_id": "279c7668e354fa151d5fd2e8c42b5153a1de3135", + "fixed_version": "5.4.213" } }, - "CVE-2023-30772": { + "CVE-2022-3594": { "4.14": { - "cmt_id": "bbf45f079f41efcf1e51bb65a0a45d2b31061bd5", - "fixed_version": "4.14.312" + "cmt_id": "f5d6c938d51217d6f0f534f1ee606d9c5eb22fdc", + "fixed_version": "4.14.296" }, "4.19": { - "cmt_id": "533d915899b4a5a7b5b5a99eec24b2920ccd1f11", - "fixed_version": "4.19.280" + "cmt_id": "88d2a93972c369eb812952aa15a25c1385506c1d", + "fixed_version": "4.19.262" + }, + "4.9": { + "cmt_id": "3723658c287a98875f43cffc3245d0bf1d3ee076", + "fixed_version": "4.9.331" }, "5.10": { - "cmt_id": "75e2144291e847009fbc0350e10ec588ff96e05a", - "fixed_version": "5.10.177" + "cmt_id": "484400d433ca1903a87268c55f019e932297538a", + "fixed_version": "5.10.150" }, "5.15": { - "cmt_id": "0fdb1cc4fe5255d0198c332b961bc4c1f8787982", - "fixed_version": "5.15.105" + "cmt_id": "b3179865cf7e892b26eedab3d6c54b4747c774a2", + "fixed_version": "5.15.75" }, - "5.4": { - "cmt_id": "6fe078c2864b9defaa632733a5bae969b398b673", - "fixed_version": "5.4.240" + "5.19": { + "cmt_id": "2e896abccf99fef76691d8e1019bd44105a12e1f", + "fixed_version": "5.19.17" }, - "6.1": { - "cmt_id": "47b2e1a67e6da172bb4cf69ef9dafde4458bde5f", - "fixed_version": "6.1.22" + "5.4": { + "cmt_id": "61fd56b0a1a3e923aced4455071177778dd59e88", + "fixed_version": "5.4.220" }, - "6.2": { - "cmt_id": "a7d686b36aa8021ee96128290ac3b58c4c1f6297", - "fixed_version": "6.2.9" + "6.0": { + "cmt_id": "21f2532974115026fdab1205aab275d6181fb89f", + "fixed_version": "6.0.3" } }, - "CVE-2023-3090": { + "CVE-2022-3595": { + "6.0": { + "cmt_id": "983ec6379b9bab7bf790aa7df5dc3a461ebad72a", + "fixed_version": "6.0.16" + } + }, + "CVE-2022-36123": { "4.14": { - "cmt_id": "8747ec637300f1212a47a9f15e2340cfe4dcbb9c", - "fixed_version": "4.14.316" + "cmt_id": "a24eebede57ff42d5123cca948c5077ccddbffcb", + "fixed_version": "4.14.289" }, "4.19": { - "cmt_id": "b36dcf3ed547c103acef6f52bed000a0ac6c074f", - "fixed_version": "4.19.284" + "cmt_id": "36e2f161fb01795722f2ff1a24d95f08100333dd", + "fixed_version": "4.19.253" + }, + "4.9": { + "cmt_id": "b3d7c509bcbd4384d4964dcdf028b3c3e0adb7f7", + "fixed_version": "4.9.324" }, "5.10": { - "cmt_id": "f4a371d3f5a7a71dff1ab48b3122c5cf23cc7ad5", - "fixed_version": "5.10.181" + "cmt_id": "136d7987fcfdeca73ee3c6a29e48f99fdd0f4d87", + "fixed_version": "5.10.132" }, "5.15": { - "cmt_id": "7c8be27727fe194b4625da442ee2b854db76b200", - "fixed_version": "5.15.113" - }, - "5.4": { - "cmt_id": "1aa872e967f2017041bb2284479b3c6ce8d121b5", - "fixed_version": "5.4.244" + "cmt_id": "26bb7afc027ce6ac8ab6747babec674d55689ff0", + "fixed_version": "5.15.56" }, - "6.1": { - "cmt_id": "610a433810b277b3b77389733c07d22e8af68de2", - "fixed_version": "6.1.30" + "5.18": { + "cmt_id": "2334bdfc2da469c9807767002a2831274b82c39a", + "fixed_version": "5.18.13" }, - "6.3": { - "cmt_id": "3cd16c6a6a6b68bba02fbbc54b9906f44640ffde", - "fixed_version": "6.3.4" + "5.4": { + "cmt_id": "a3c7c1a726a4c6b63b85e8c183f207543fd75e1b", + "fixed_version": "5.4.207" } }, - "CVE-2023-3106": { - "3.16": { - "cmt_id": "2dcb72918e387fd1d0af40c1c351822bfe1acf63", - "fixed_version": "3.16.39" + "CVE-2022-3619": { + "5.15": { + "cmt_id": "aa16cac06b752e5f609c106735bd7838f444784c", + "fixed_version": "5.15.78" }, - "4.4": { - "cmt_id": "0cbb0084fa2b444b7316a0967a0d93f5ae520216", - "fixed_version": "4.4.223" + "6.0": { + "cmt_id": "5b4f039a2f487c5edae681d763fe1af505f84c13", + "fixed_version": "6.0.8" } }, - "CVE-2023-31085": { + "CVE-2022-3621": { "4.14": { - "cmt_id": "ef7a4c97a85ab1bff7abc98f885678bd33bb4881", - "fixed_version": "4.14.327" + "cmt_id": "1ce68de30b663b79073251162123e57cbed2dc84", + "fixed_version": "4.14.296" }, "4.19": { - "cmt_id": "a0d71e9e61da8a85a46774c67549739e28fda795", - "fixed_version": "4.19.296" + "cmt_id": "fe8015680f383ea1dadec76972894dfabf8aefaa", + "fixed_version": "4.19.262" + }, + "4.9": { + "cmt_id": "bb63454b66f4a73d4b267fd5061aaf3a5657172c", + "fixed_version": "4.9.331" }, "5.10": { - "cmt_id": "a5f643ab11631095c60c9852705220edf1659d6f", - "fixed_version": "5.10.198" + "cmt_id": "3f840480e31495ce674db4a69912882b5ac083f2", + "fixed_version": "5.10.148" }, "5.15": { - "cmt_id": "0ea2a63497333019bd2931975ed489216b365755", - "fixed_version": "5.15.135" + "cmt_id": "1e512c65b4adcdbdf7aead052f2162b079cc7f55", + "fixed_version": "5.15.74" + }, + "5.19": { + "cmt_id": "caf2c6b580433b3d3e413a3d54b8414a94725dcd", + "fixed_version": "5.19.16" }, "5.4": { - "cmt_id": "c6d358387632a6d45b3e5d4c310cfec1bde59423", - "fixed_version": "5.4.258" - }, - "6.1": { - "cmt_id": "91aeb418b9175d09fc858f0fdf01988cbf990c5d", - "fixed_version": "6.1.57" + "cmt_id": "792211333ad77fcea50a44bb7f695783159fc63c", + "fixed_version": "5.4.218" }, - "6.5": { - "cmt_id": "87b9858e404069817cd4b31830e0a1b9b3d183c4", - "fixed_version": "6.5.7" + "6.0": { + "cmt_id": "037e760a4a009e9545a51e87c98c22d9aaf32df7", + "fixed_version": "6.0.2" } }, - "CVE-2023-3111": { - "4.14": { - "cmt_id": "ff0e8ed8dfb584575cffc1561f17a1d094e8565b", - "fixed_version": "4.14.318" - }, - "4.19": { - "cmt_id": "dcb11fe0a0a9cca2b7425191b9bf30dc29f2ad0f", - "fixed_version": "4.19.286" - }, + "CVE-2022-3623": { "5.10": { - "cmt_id": "b60e862e133f646f19023ece1d476d630a660de1", - "fixed_version": "5.10.184" + "cmt_id": "fccee93eb20d72f5390432ecea7f8c16af88c850", + "fixed_version": "5.10.159" }, "5.15": { - "cmt_id": "78f8c2370e3d33e35f23bdc648653d779aeacb6e", - "fixed_version": "5.15.63" + "cmt_id": "3a44ae4afaa5318baed3c6e2959f24454e0ae4ff", + "fixed_version": "5.15.78" }, "5.19": { - "cmt_id": "5d741afed0bac206640cc64d77b97853283cf719", - "fixed_version": "5.19.4" - }, - "5.4": { - "cmt_id": "8e546674031fc1576da501e27a8fd165222e5a37", - "fixed_version": "5.4.247" - } - }, - "CVE-2023-3117": { - "4.14": { - "cmt_id": "d19a80db742ceffc8d92a0cf78885f60d10c6a6d", - "fixed_version": "4.14.322" - }, - "4.19": { - "cmt_id": "798aa8da13782fe472aa48841c5570d7439339b8", - "fixed_version": "4.19.291" - }, - "5.10": { - "cmt_id": "8180fc2fadd48dde4966f2db2c716c2ce7510d0b", - "fixed_version": "5.10.188" - }, - "5.15": { - "cmt_id": "44ebe988cb38e720b91826f4d7c31692061ca04a", - "fixed_version": "5.15.118" + "cmt_id": "86a913d55c89dd13ba070a87f61a493563e94b54", + "fixed_version": "5.19.17" }, "5.4": { - "cmt_id": "1adb5c272b200c24e9a7dd3bff891ce6eb75b019", - "fixed_version": "5.4.251" - }, - "6.1": { - "cmt_id": "4aaa3b730d16c13cc3feaa127bfca1af201d969d", - "fixed_version": "6.1.35" + "cmt_id": "176ba4c19d1bb153aa6baaa61d586e785b7d736c", + "fixed_version": "5.4.228" }, - "6.3": { - "cmt_id": "bdace3b1a51887211d3e49417a18fdbd315a313b", - "fixed_version": "6.3.9" + "6.0": { + "cmt_id": "7c7c79dd5a388758f8dfa3de89b131d5d84f25fd", + "fixed_version": "6.0.3" } }, - "CVE-2023-31248": { + "CVE-2022-3625": { "5.10": { - "cmt_id": "4ae2e501331aaa506eaf760339bb2f43e5769395", - "fixed_version": "5.10.188" + "cmt_id": "0e28678a770df7989108327cfe86f835d8760c33", + "fixed_version": "5.10.138" }, "5.15": { - "cmt_id": "041e2ac88caef286b39064e83e825e3f53113d36", - "fixed_version": "5.15.121" + "cmt_id": "c4d09fd1e18bac11c2f7cf736048112568687301", + "fixed_version": "5.15.63" }, - "6.1": { - "cmt_id": "fc95c8b02c6160936f1f3d8d9d7f4f66f3c84b49", - "fixed_version": "6.1.39" + "5.19": { + "cmt_id": "26bef5616255066268c0e40e1da10cc9b78b82e9", + "fixed_version": "5.19.4" }, - "6.4": { - "cmt_id": "5e5e967e8505fbdabfb6497367ec1b808cadc356", - "fixed_version": "6.4.4" + "5.4": { + "cmt_id": "1ad4ba9341f15412cf86dc6addbb73871a10212f", + "fixed_version": "5.4.211" } }, - "CVE-2023-3141": { + "CVE-2022-3628": { "4.14": { - "cmt_id": "3faa6fe21c516dbcca469c297df77decbc2fed0f", - "fixed_version": "4.14.316" + "cmt_id": "b23665bbd39224e15aab89df4a4b60c0ab2ad09d", + "fixed_version": "4.14.299" }, "4.19": { - "cmt_id": "dce890c3dfaf631d0a8ac79c2792911f9fc551fa", - "fixed_version": "4.19.284" + "cmt_id": "5e7d546917431400b7d6e5e38f588e0bd13083c9", + "fixed_version": "4.19.265" + }, + "4.9": { + "cmt_id": "b1477d95e967bf626b8c5e3838bb885c47381b24", + "fixed_version": "4.9.333" }, "5.10": { - "cmt_id": "5c23f6da62f71ebfeda6ea3960982ccd926ebb09", - "fixed_version": "5.10.181" + "cmt_id": "c6678c8f4f3f8383fe2dff3455de3d504382638f", + "fixed_version": "5.10.154" }, "5.15": { - "cmt_id": "162a9b321538972a260c7b178638c2368c071f77", - "fixed_version": "5.15.113" + "cmt_id": "7038af4ce95105146d22e461eaa450829f28eeaf", + "fixed_version": "5.15.78" }, "5.4": { - "cmt_id": "a2a5d3a584bf86c9c09017381a8fc63cfaf5a9e6", - "fixed_version": "5.4.244" - }, - "6.1": { - "cmt_id": "9a342d4eb9fb8e52f7d1afe088a79513f3f9a9a5", - "fixed_version": "6.1.30" + "cmt_id": "a16415c8f156bec5399ef0345715ee4b90e5bb83", + "fixed_version": "5.4.224" }, - "6.3": { - "cmt_id": "76fec5f01c9c70e11b85fdeb3f2707589c9238ca", - "fixed_version": "6.3.4" + "6.0": { + "cmt_id": "631f73deedeb0fbc92ca5037d5a71c9fcae7974d", + "fixed_version": "6.0.8" } }, - "CVE-2023-31436": { + "CVE-2022-36280": { "4.14": { - "cmt_id": "0616570ce23bbcc1ac842e97fb8e167235f1582d", - "fixed_version": "4.14.314" + "cmt_id": "50d177f90b63ea4138560e500d92be5e4c928186", + "fixed_version": "4.14.303" }, "4.19": { - "cmt_id": "6ef8120262dfa63d9ec517d724e6f15591473a78", - "fixed_version": "4.19.282" + "cmt_id": "6b4e70a428b5a11f56db94047b68e144529fe512", + "fixed_version": "4.19.270" + }, + "4.9": { + "cmt_id": "ee8d31836cbe7c26e207bfa0a4a726f0a25cfcf6", + "fixed_version": "4.9.337" }, "5.10": { - "cmt_id": "ddcf35deb8f2a1d9addc74b586cf4c5a1f5d6020", - "fixed_version": "5.10.179" + "cmt_id": "439cbbc1519547f9a7b483f0de33b556ebfec901", + "fixed_version": "5.10.163" }, "5.15": { - "cmt_id": "1ffc0e8105510cb826cb9d27ed1820a1131c82d4", - "fixed_version": "5.15.109" + "cmt_id": "6948e570f54f2044dd4da444b10471373a047eeb", + "fixed_version": "5.15.87" }, "5.4": { - "cmt_id": "35dceaeab97c9e5f3fda3b10ce7f8110df0feecd", - "fixed_version": "5.4.242" - }, - "6.1": { - "cmt_id": "ce729b06dc33b01f8a6ac84da5ef54154326bf7e", - "fixed_version": "6.1.26" + "cmt_id": "94b283341f9f3f0ed56a360533766377a01540e0", + "fixed_version": "5.4.229" }, - "6.2": { - "cmt_id": "420d014b19ff119e210ecc075ff611fe7844690c", - "fixed_version": "6.2.13" + "6.0": { + "cmt_id": "4d54d11b49860686331c58a00f733b16a93edfc4", + "fixed_version": "6.0.18" }, - "6.3": { - "cmt_id": "3037933448f60f9acb705997eae62013ecb81e0d", - "fixed_version": "6.3" + "6.1": { + "cmt_id": "622d527decaac0eb65512acada935a0fdc1d0202", + "fixed_version": "6.1.4" } }, - "CVE-2023-3159": { + "CVE-2022-3629": { "4.14": { - "cmt_id": "1269a6567274edecd04ee7fd7871aa4d0c937f2a", - "fixed_version": "4.14.278" + "cmt_id": "ec0a5b730cc053202df6b6e6dd6c860977990646", + "fixed_version": "4.14.291" }, "4.19": { - "cmt_id": "34380b5647f13fecb458fea9a3eb3d8b3a454709", - "fixed_version": "4.19.242" + "cmt_id": "2fc2a7767f661e6083f69588718cdf6f07cb9330", + "fixed_version": "4.19.256" }, "4.9": { - "cmt_id": "2a08a260d2294b2ecd4190cceaaf12ae81f3cb9f", - "fixed_version": "4.9.313" + "cmt_id": "09fc7ffdf11d20049f3748ccdef57c9a49403214", + "fixed_version": "4.9.326" }, "5.10": { - "cmt_id": "e757ff4bbc893bc030c2d10143091094da73b9ff", - "fixed_version": "5.10.115" + "cmt_id": "38ddccbda5e8b762c8ee06670bb1f64f1be5ee50", + "fixed_version": "5.10.138" }, "5.15": { - "cmt_id": "e259ba5c08d3791ab269b7775f1de5b36b06388c", - "fixed_version": "5.15.39" + "cmt_id": "e4c0428f8a6fc8c218d7fd72bddd163f05b29795", + "fixed_version": "5.15.63" }, - "5.17": { - "cmt_id": "bb0aef891131e6347b04528c3f0ce11638d6f419", - "fixed_version": "5.17.7" + "5.19": { + "cmt_id": "8ff5db3c1b3d6797eda5cd326dcd31b9cd1c5f72", + "fixed_version": "5.19.4" }, "5.4": { - "cmt_id": "34b9b91829111a7e44b593c790a22680c89cd402", - "fixed_version": "5.4.193" + "cmt_id": "f82f1e2042b397277cd39f16349950f5abade58d", + "fixed_version": "5.4.211" } }, - "CVE-2023-3161": { - "4.14": { - "cmt_id": "7625513267a2b155a5e31e4ac443bf954591b7fa", - "fixed_version": "4.14.306" - }, - "4.19": { - "cmt_id": "1c3d4901fad1db6a4e2dcdd6b13ed0ea22f227a1", - "fixed_version": "4.19.273" - }, + "CVE-2022-3630": { + "5.19": { + "cmt_id": "7a369dc87b66acc85d0cffcf39984344a203e20b", + "fixed_version": "5.19.4" + } + }, + "CVE-2022-3633": { "5.10": { - "cmt_id": "28d190882ba55cbcee1db8e4ae90c149178dcf64", - "fixed_version": "5.10.168" + "cmt_id": "a220ff343396bae8d3b6abee72ab51f1f34b3027", + "fixed_version": "5.10.138" }, "5.15": { - "cmt_id": "dccbd062d71657648efc32fdc9919b33763cc68b", - "fixed_version": "5.15.93" + "cmt_id": "98dc8fb08299ab49e0b9c08daedadd2f4de1a2f2", + "fixed_version": "5.15.63" }, "5.4": { - "cmt_id": "4abcd352a0222cc807f6f87d2f58d59aeeb70340", - "fixed_version": "5.4.232" - }, - "6.1": { - "cmt_id": "5e7f6e2ade57dfd6d133ff7c643abd2079248943", - "fixed_version": "6.1.11" + "cmt_id": "04e41b6bacf474f5431491f92e981096e8cc8e93", + "fixed_version": "5.4.211" } }, - "CVE-2023-3212": { + "CVE-2022-3635": { "4.14": { - "cmt_id": "6fb4b344382879bd4f8cc8394f6fff77c1388b15", - "fixed_version": "4.14.322" + "cmt_id": "3db3f3bf05a88635beb7391fca235fb0e5213e6f", + "fixed_version": "4.14.291" }, "4.19": { - "cmt_id": "d3af9cea9a1ce56f427e41e5ffcdafe9280f099f", - "fixed_version": "4.19.291" + "cmt_id": "52fddbd9754b249546c89315787075b7247b029d", + "fixed_version": "4.19.256" + }, + "4.9": { + "cmt_id": "acf173d9e27877ac1f4b0fc6614bf7f19ac90894", + "fixed_version": "4.9.326" }, "5.10": { - "cmt_id": "d03d31d3a206093b9b8759dddf0ba9bd843606ba", - "fixed_version": "5.10.183" + "cmt_id": "a0ae122e9aeccbff75014c4d36d11a9d32e7fb5e", + "fixed_version": "5.10.138" }, "5.15": { - "cmt_id": "fd8b4e28f400a067e6ef84569816967be1f0642b", - "fixed_version": "5.15.116" - }, - "5.4": { - "cmt_id": "23f98fe887ce3e7c8bd111f37e62735c5018c534", - "fixed_version": "5.4.251" + "cmt_id": "a5d7ce086fe942c5ab422fd2c034968a152be4c4", + "fixed_version": "5.15.63" }, - "6.1": { - "cmt_id": "5ae4a618a1558d2b536fdd5d42e53d3e2d73870c", - "fixed_version": "6.1.33" + "5.19": { + "cmt_id": "af412b252550f9ac36d9add7b013c2a2c3463835", + "fixed_version": "5.19.4" }, - "6.3": { - "cmt_id": "14c454764a37b194dc916c07488ce7339c82bc4f", - "fixed_version": "6.3.7" + "5.4": { + "cmt_id": "9a6cbaa50f263b12df18a051b37f3f42f9fb5253", + "fixed_version": "5.4.211" } }, - "CVE-2023-3220": { - "4.19": { - "cmt_id": "c746a0b9210cebb29511f01d2becf240408327bf", - "fixed_version": "4.19.276" - }, + "CVE-2022-3640": { + "6.0": { + "cmt_id": "8f7e4cf0694149a5d999d676ebd9ecf1b4cb2cc9", + "fixed_version": "6.0.8" + } + }, + "CVE-2022-36402": { "5.10": { - "cmt_id": "e9743b3052e125c44b555f07f2876a4bdccfd983", - "fixed_version": "5.10.173" + "cmt_id": "8735d1c66c7cf54e7b265a2911891f75674db342", + "fixed_version": "5.10.193" }, "5.15": { - "cmt_id": "c7ee1772e3c36fff8e13daa5ce1ac61426544a33", - "fixed_version": "5.15.99" - }, - "5.4": { - "cmt_id": "dadd30fcc7e3e01561ef3624f6c0e323105ab523", - "fixed_version": "5.4.235" + "cmt_id": "c8aab333d41a4ed6c5e7987c6cc5505ab86b5652", + "fixed_version": "5.15.129" }, "6.1": { - "cmt_id": "dd49cef313e6a62541b55e739261c5943cb06c47", - "fixed_version": "6.1.16" + "cmt_id": "115f2ccd3a998fe7247f59f8fb5feffc878bcbb7", + "fixed_version": "6.1.50" }, - "6.2": { - "cmt_id": "c745fd463ccf21943cfc35cb8842a33dda2ae259", - "fixed_version": "6.2.3" + "6.4": { + "cmt_id": "5574b0cbb493f3b3cbb2c381e8e1dac52a70213f", + "fixed_version": "6.4.13" + }, + "6.5": { + "cmt_id": "14abdfae508228a7307f7491b5c4215ae70c6542", + "fixed_version": "6.5" } }, - "CVE-2023-32233": { + "CVE-2022-3643": { "4.14": { - "cmt_id": "86572872505023e3bb461b271c2f25fdaa3dfcd7", - "fixed_version": "4.14.315" + "cmt_id": "e173cefc814dec81e9836ecc866cdba154e693cd", + "fixed_version": "4.14.302" }, "4.19": { - "cmt_id": "c6989314fd809c5eaf4980d6fa474f19fc653d6c", - "fixed_version": "4.19.283" + "cmt_id": "44dfdecc288b8d5932e09f5e6a597a089d5a82b2", + "fixed_version": "4.19.269" + }, + "4.9": { + "cmt_id": "1a1d9be7b36ee6cbdeb9d160038834d707256e88", + "fixed_version": "4.9.336" }, "5.10": { - "cmt_id": "e044a24447189419c3a7ccc5fa6da7516036dc55", - "fixed_version": "5.10.180" + "cmt_id": "49e07c0768dbebff672ee1834eff9680fc6277bf", + "fixed_version": "5.10.159" }, "5.15": { - "cmt_id": "21c2a454486d5e9c1517ecca19266b3be3df73ca", - "fixed_version": "5.15.111" + "cmt_id": "0fe29bd92594a747a2561589bd452c259451929e", + "fixed_version": "5.15.83" }, "5.4": { - "cmt_id": "c8b6063f13add68f89540aa5030ceee875f48aa2", - "fixed_version": "5.4.243" - }, - "6.1": { - "cmt_id": "4507918cd1f8b80f21a396fa0531d53e372bed66", - "fixed_version": "6.1.28" + "cmt_id": "8fe1bf6f32cd5b96ddcd2a38110603fe34753e52", + "fixed_version": "5.4.227" }, - "6.2": { - "cmt_id": "6b0801dcc1aa4373d28ac8ee396788d2e715c495", - "fixed_version": "6.2.15" + "6.0": { + "cmt_id": "e8851d841fe4f29b613a00de45f39c80dbfdb975", + "fixed_version": "6.0.13" }, - "6.3": { - "cmt_id": "f8486683ffa30456e0be4290282a44c4459a3287", - "fixed_version": "6.3.2" + "6.1": { + "cmt_id": "ad7f402ae4f466647c3a669b8a6f3e5d4271c84a", + "fixed_version": "6.1" } }, - "CVE-2023-32247": { - "5.15": { - "cmt_id": "a6a9601ba995d0fec635324cb9fd8d14f9bea14e", - "fixed_version": "5.15.145" + "CVE-2022-3646": { + "4.14": { + "cmt_id": "a832de79d82ac8c9f445f99069e11b17c5d2224a", + "fixed_version": "4.14.296" }, - "6.1": { - "cmt_id": "1fc8a2b14ef5223f8e0b95faba2ee0a6e4d0f99d", - "fixed_version": "6.1.29" + "4.19": { + "cmt_id": "4b748ef0f2afadd31c914623daa610f26385a4dc", + "fixed_version": "4.19.262" }, - "6.2": { - "cmt_id": "750a2d772e9d9ff377fd32e3b6797bf2cd847a7a", - "fixed_version": "6.2.16" + "4.9": { + "cmt_id": "81fe58e4e7f61a1f5200898e7cd4c9748f83051f", + "fixed_version": "4.9.331" + }, + "5.10": { + "cmt_id": "aad4c997857f1d4b6c1e296c07e4729d3f8058ee", + "fixed_version": "5.10.148" }, - "6.3": { - "cmt_id": "6775ee7ef4b37c521aa4cf3730f54554c4875542", - "fixed_version": "6.3.2" - } - }, - "CVE-2023-32248": { "5.15": { - "cmt_id": "227eb2689b44d0d60da3839b146983e73435924c", - "fixed_version": "5.15.111" + "cmt_id": "44b1ee304bac03f1b879be5afe920e3a844e40fc", + "fixed_version": "5.15.74" }, - "6.1": { - "cmt_id": "a70751dd7b60eab025e97e19b6b2477c6eaf2bbb", - "fixed_version": "6.1.28" + "5.19": { + "cmt_id": "4755fcd844240857b525f6e8d8b65ee140fe9570", + "fixed_version": "5.19.16" }, - "6.2": { - "cmt_id": "b35f6c031b87d9e51f141ff6de0ea59756a8e313", - "fixed_version": "6.2.15" + "5.4": { + "cmt_id": "b7e409d11db9ce9f8bc05fcdfa24d143f60cd393", + "fixed_version": "5.4.218" }, - "6.3": { - "cmt_id": "1636e09779f83e10e6ed57d91ef94abcefdd206b", - "fixed_version": "6.3.2" + "6.0": { + "cmt_id": "9dc48a360e7b6bb16c48625f8f80ab7665bc9648", + "fixed_version": "6.0.2" } }, - "CVE-2023-32250": { - "5.15": { - "cmt_id": "708c304b583d789957399dd8237f212cf8ad1e4d", - "fixed_version": "5.15.145" + "CVE-2022-3649": { + "4.14": { + "cmt_id": "26b9b66610d6f8f3333cb6f52e97745da875fee1", + "fixed_version": "4.14.296" }, - "6.1": { - "cmt_id": "f623f627ad2b1dc215ab3b0df53fb05cfd3a1c3b", - "fixed_version": "6.1.29" + "4.19": { + "cmt_id": "bfc82a26545b5f61a64d51ca2179773706fb028f", + "fixed_version": "4.19.262" }, - "6.2": { - "cmt_id": "d270631c21e68fb8016d6e231d022d7023a2df6f", - "fixed_version": "6.2.16" + "4.9": { + "cmt_id": "a9043a24c6e340d45b204d294a25044726fd2770", + "fixed_version": "4.9.331" }, - "6.3": { - "cmt_id": "02f41d88f15d6b7d523e52cc3f87488f57e9265b", - "fixed_version": "6.3.2" - } - }, - "CVE-2023-32252": { - "5.15": { - "cmt_id": "708c304b583d789957399dd8237f212cf8ad1e4d", - "fixed_version": "5.15.145" + "5.10": { + "cmt_id": "21ee3cffed8fbabb669435facfd576ba18ac8652", + "fixed_version": "5.10.148" }, - "6.1": { - "cmt_id": "f623f627ad2b1dc215ab3b0df53fb05cfd3a1c3b", - "fixed_version": "6.1.29" + "5.15": { + "cmt_id": "cb602c2b654e26763226d8bd27a702f79cff4006", + "fixed_version": "5.15.74" }, - "6.2": { - "cmt_id": "d270631c21e68fb8016d6e231d022d7023a2df6f", - "fixed_version": "6.2.16" + "5.4": { + "cmt_id": "d1c2d820a2cd73867b7d352e89e92fb3ac29e926", + "fixed_version": "5.4.220" }, - "6.3": { - "cmt_id": "02f41d88f15d6b7d523e52cc3f87488f57e9265b", - "fixed_version": "6.3.2" + "6.0": { + "cmt_id": "6251c9c0430d70cc221d0bb907b278bd99d7b066", + "fixed_version": "6.0.2" } }, - "CVE-2023-32254": { - "5.15": { - "cmt_id": "b36295c17fb97424406f0c3ab321b1ccaabb9be8", - "fixed_version": "5.15.145" + "CVE-2022-36879": { + "4.14": { + "cmt_id": "2c9d93e35cb857fc613ec9d58d690d332252747b", + "fixed_version": "4.14.290" }, - "6.1": { - "cmt_id": "bd80d35725a0cf4df9307bfe2f1a3b2cb983d8e6", - "fixed_version": "6.1.28" + "4.19": { + "cmt_id": "fdb4fba1ba8512fa579a9d091dcb6c410f82f96a", + "fixed_version": "4.19.254" }, - "6.2": { - "cmt_id": "dc1c17716c099c90948ebb83e2170dd75a3be6b6", - "fixed_version": "6.2.15" + "4.9": { + "cmt_id": "5aff12fa09504c6ea88fc17749a39cda2c4d6ef7", + "fixed_version": "4.9.325" }, - "6.3": { - "cmt_id": "39366b47a59d46af15ac57beb0996268bf911f6a", - "fixed_version": "6.3.2" - } - }, - "CVE-2023-32257": { - "5.15": { - "cmt_id": "708c304b583d789957399dd8237f212cf8ad1e4d", - "fixed_version": "5.15.145" + "5.10": { + "cmt_id": "47b696dd654450cdec3103a833e5bf29c4b83bfa", + "fixed_version": "5.10.134" }, - "6.1": { - "cmt_id": "f623f627ad2b1dc215ab3b0df53fb05cfd3a1c3b", - "fixed_version": "6.1.29" + "5.15": { + "cmt_id": "c8e32bca0676ac663266a3b16562cb017300adcd", + "fixed_version": "5.15.58" }, - "6.2": { - "cmt_id": "d270631c21e68fb8016d6e231d022d7023a2df6f", - "fixed_version": "6.2.16" + "5.18": { + "cmt_id": "70f5e35cd5e38017653ed1ca0f7a4ab6d5c5a794", + "fixed_version": "5.18.15" }, - "6.3": { - "cmt_id": "02f41d88f15d6b7d523e52cc3f87488f57e9265b", - "fixed_version": "6.3.2" + "5.4": { + "cmt_id": "f4248bdb7d5c1150a2a6f8c3d3b6da0b71f62a20", + "fixed_version": "5.4.208" } }, - "CVE-2023-32258": { - "5.15": { - "cmt_id": "ae06b798f72d6cc792cfa1745490be65da90eb03", - "fixed_version": "5.15.145" - }, - "6.1": { - "cmt_id": "4aba9ab6a007e41182454f84f95c0bddf7d6d7e1", - "fixed_version": "6.1.29" - }, - "6.2": { - "cmt_id": "de428966b40c8b8abe35592ded2e9f4d366ffc38", - "fixed_version": "6.2.16" - }, - "6.3": { - "cmt_id": "920d5dd2d041484bf001c9713c2e3bcc6de79726", - "fixed_version": "6.3.2" - } - }, - "CVE-2023-32269": { + "CVE-2022-36946": { "4.14": { - "cmt_id": "35d5bb094bc7529c15561289a1ea995f897bf2e6", - "fixed_version": "4.14.306" + "cmt_id": "83636c64b796a7e44fa72f371777f803c1ef9e74", + "fixed_version": "4.14.291" }, "4.19": { - "cmt_id": "2c1984d101978e979783bdb2376eb6eca9f8f627", - "fixed_version": "4.19.273" + "cmt_id": "f295d365b30626f82423a923695274024016380e", + "fixed_version": "4.19.255" + }, + "4.9": { + "cmt_id": "3b3e2de462323d5fdeb85a3682334a4a3dd07400", + "fixed_version": "4.9.326" }, "5.10": { - "cmt_id": "dd6991251a1382a9b4984962a0c7a467e9d71812", - "fixed_version": "5.10.168" + "cmt_id": "440dccd80f627e0e11ceb0429e4cdab61857d17e", + "fixed_version": "5.10.135" }, "5.15": { - "cmt_id": "c27e0eac568a008cdf04ae7e4ea2d3c18717e627", - "fixed_version": "5.15.93" + "cmt_id": "91c11008aab0282957b8b8ccb0707d90e74cc3b9", + "fixed_version": "5.15.59" }, - "5.4": { - "cmt_id": "20355b9569bd1fd5a236898524b6dd4117e660d0", - "fixed_version": "5.4.232" + "5.18": { + "cmt_id": "883c20911d6261fc651820b63a77327b8c020264", + "fixed_version": "5.18.16" }, - "6.1": { - "cmt_id": "5c2227f3f17782d5262ee0979ad30609b3e01f6e", - "fixed_version": "6.1.11" + "5.19": { + "cmt_id": "99a63d36cb3ed5ca3aa6fcb64cffbeaf3b0fb164", + "fixed_version": "5.19" + }, + "5.4": { + "cmt_id": "52be29e8b6455788a4d0f501bd87aa679ca3ba3c", + "fixed_version": "5.4.209" } }, - "CVE-2023-3268": { + "CVE-2022-3707": { "4.19": { - "cmt_id": "ed32488417669568308b65ba5d45799418f9ed49", - "fixed_version": "4.19.283" + "cmt_id": "c5245a6cf83ca5c4b68d643f8b31ed0eb127126e", + "fixed_version": "4.19.274" }, "5.10": { - "cmt_id": "1b0df44753bf9e45eaf5cee34f87597193f862e8", - "fixed_version": "5.10.180" + "cmt_id": "3d743415c6fb092167df6c23e9c7e9f6df7db625", + "fixed_version": "5.10.170" }, "5.15": { - "cmt_id": "0b46ee654a9dcd330e8183856b88505a9f633f7d", - "fixed_version": "5.15.111" + "cmt_id": "0d3d5099a50badadad6837edda00e42149b2f657", + "fixed_version": "5.15.96" }, "5.4": { - "cmt_id": "bc0905a76531fa10fd12d661328636453a36f4ce", - "fixed_version": "5.4.243" - }, - "6.1": { - "cmt_id": "f6ee841ff2169d7a7d045340ee72b2b9de9f06c5", - "fixed_version": "6.1.28" + "cmt_id": "787ef0db014085df8691e5aeb58ab0bb081e5ff0", + "fixed_version": "5.4.233" }, - "6.2": { - "cmt_id": "c86ec32b864d5247602c71986e0494d12f6c4d70", - "fixed_version": "6.2.15" + "6.0": { + "cmt_id": "bb84f2e119accfc65d5fa6ebe31751cdc3bca9fb", + "fixed_version": "6.0.19" }, - "6.3": { - "cmt_id": "35ca4fb494c0c9f226fbcfa1c1688e6cc1e5062e", - "fixed_version": "6.3.2" + "6.1": { + "cmt_id": "1022519da69d99d455c58ca181a6c499c562c70e", + "fixed_version": "6.1.5" } }, - "CVE-2023-3269": { + "CVE-2022-38457": { "6.1": { - "cmt_id": "d6a5c7a1a6e52d4c46fe181237ca96cd46a42386", - "fixed_version": "6.1.37" + "cmt_id": "7ac9578e45b20e3f3c0c8eb71f5417a499a7226a", + "fixed_version": "6.1.7" + } + }, + "CVE-2022-3910": { + "5.19": { + "cmt_id": "d50c30b66f040f1a7e3202a95f07c2084f5ca30f", + "fixed_version": "5.19.11" + } + }, + "CVE-2022-39189": { + "5.10": { + "cmt_id": "529f41f0eb1ef995bfa83c121c3cfe3a0720119a", + "fixed_version": "5.10.180" }, - "6.3": { - "cmt_id": "bce721f87edd54379120ffb85111357923f4f326", - "fixed_version": "6.3.11" + "5.15": { + "cmt_id": "92343314d34e04da0923cefd3be67521d706fa35", + "fixed_version": "5.15.60" }, - "6.4": { - "cmt_id": "b11fa3d22ac0fbc0bfaa740b3b3669d43ec48503", - "fixed_version": "6.4.1" + "5.18": { + "cmt_id": "719492d2bc3b99c067076bddc62e63cda8ad16e2", + "fixed_version": "5.18.17" + }, + "5.4": { + "cmt_id": "1eb3e32de7b1f6ed927dfff3ab3651ce25f3d516", + "fixed_version": "5.4.244" } }, - "CVE-2023-3312": { - "6.2": { - "cmt_id": "0dac12ab5780e293b8dc24e513f5c2bf9f93c524", - "fixed_version": "6.2.15" + "CVE-2022-39190": { + "5.10": { + "cmt_id": "c08a104a8bce832f6e7a4e8d9ac091777b9982ea", + "fixed_version": "5.10.140" }, - "6.3": { - "cmt_id": "d9bad836cf156ee87d577f0bd1ed01501b31a253", - "fixed_version": "6.3.2" + "5.15": { + "cmt_id": "51f192ae71c3431aa69a988449ee2fd288e57648", + "fixed_version": "5.15.64" + }, + "5.19": { + "cmt_id": "fdca693fcf26c11596e7aa1e540af2b4a5288c76", + "fixed_version": "5.19.6" } }, - "CVE-2023-3317": { - "6.2": { - "cmt_id": "f1d2977584eb315a88956e457de7c800cb010478", - "fixed_version": "6.2.15" + "CVE-2022-3977": { + "6.0": { + "cmt_id": "3c7c84319833259b0bb8c879928700c9e42d6562", + "fixed_version": "6.0.2" } }, - "CVE-2023-33203": { + "CVE-2022-39842": { "4.14": { - "cmt_id": "aee129c0096e479eae92e2127f96f9d08f16ad8f", - "fixed_version": "4.14.312" + "cmt_id": "9556a88a16e381dbd6834da95206742d0973afc6", + "fixed_version": "4.14.295" }, "4.19": { - "cmt_id": "4bbc59ec4feb1ea8d5cb3d9d38d4cb1317943ea4", - "fixed_version": "4.19.280" + "cmt_id": "a34547fc43d02f2662b2b62c9a4c578594cf662d", + "fixed_version": "4.19.260" + }, + "4.9": { + "cmt_id": "a0dcaa48042a56a9eee2efed19563866a0ddbce2", + "fixed_version": "4.9.330" }, "5.10": { - "cmt_id": "cb5879efde4f9b4de4248b835890df7b6c49ffbc", - "fixed_version": "5.10.177" + "cmt_id": "06e194e1130c98f82d46beb40cdbc88a0d4fd6de", + "fixed_version": "5.10.145" }, "5.15": { - "cmt_id": "8c4a180dc12303159592d15e8f077c20deeb1e55", - "fixed_version": "5.15.105" + "cmt_id": "ab5140c6ddd7473509e12f468948de91138b124e", + "fixed_version": "5.15.70" }, "5.4": { - "cmt_id": "0e5c7d00ec4f2f359234044b809eb23b7032d9b0", - "fixed_version": "5.4.240" - }, - "6.1": { - "cmt_id": "5fc2c4e311a9341a2b0e044ab5f33afa37b56226", - "fixed_version": "6.1.22" - }, - "6.2": { - "cmt_id": "514dc3d0f176d280dc2d3cd25e898a7ec329e878", - "fixed_version": "6.2.9" + "cmt_id": "1878eaf0edb8c9e58a6ca0cf31b7a647ca346be9", + "fixed_version": "5.4.215" } }, - "CVE-2023-33250": { - "6.3": { - "cmt_id": "1d2b603d938c898b5fd8da6e3d80184366ca6ea0", - "fixed_version": "6.3.13" - }, - "6.4": { - "cmt_id": "dbe65261fe1367dc307a89466a1a75c0d80b8233", - "fixed_version": "6.4.4" + "CVE-2022-40133": { + "6.1": { + "cmt_id": "7ac9578e45b20e3f3c0c8eb71f5417a499a7226a", + "fixed_version": "6.1.7" } }, - "CVE-2023-33288": { + "CVE-2022-40307": { + "4.14": { + "cmt_id": "233d5c4d18971feee5fc2f33f00b63d8205cfc67", + "fixed_version": "4.14.293" + }, + "4.19": { + "cmt_id": "021805af5bedeafc76c117fc771c100b358ab419", + "fixed_version": "4.19.258" + }, "5.10": { - "cmt_id": "2b346876b93168541a45551d5f9abd1d26102e89", - "fixed_version": "5.10.177" + "cmt_id": "918d9c4a4bdf5205f2fb3f64dddfb56c9a1d01d6", + "fixed_version": "5.10.143" }, "5.15": { - "cmt_id": "4ca3fd39c72efa250129d2af406c3bb56eec7dd9", - "fixed_version": "5.15.105" + "cmt_id": "dd291e070be0eca8807476b022bda00c891d9066", + "fixed_version": "5.15.68" }, - "6.1": { - "cmt_id": "84bdb3b76b07f2e62183913a1f5da2d4aa25580a", - "fixed_version": "6.1.22" + "5.19": { + "cmt_id": "d46815a8f26ca6db2336106a148265239f73b0af", + "fixed_version": "5.19.9" }, - "6.2": { - "cmt_id": "2da4b860f3055ae40a809c020398778e6c27b856", - "fixed_version": "6.2.9" + "5.4": { + "cmt_id": "8028ff4cdbb3f20d3c1c04be33a83bab0cb94997", + "fixed_version": "5.4.213" } }, - "CVE-2023-3338": { + "CVE-2022-40768": { "4.14": { - "cmt_id": "975840f8dec3c1e6a6b28a387bb7cf55a4775e18", - "fixed_version": "4.14.319" + "cmt_id": "5c8395d775ca9044b361af4a19b2ff223485be35", + "fixed_version": "4.14.296" }, "4.19": { - "cmt_id": "3e77bbc87342841db66c18a3afca0441c8c555e4", - "fixed_version": "4.19.287" + "cmt_id": "a99c5e38dc6c3dc3da28489b78db09a4b9ffc8c3", + "fixed_version": "4.19.262" + }, + "4.9": { + "cmt_id": "35db0282da84ad200054ad5af0fd6c2f693b17f8", + "fixed_version": "4.9.331" }, "5.10": { - "cmt_id": "1c004b379b0327992c1713334198cf5eba29a4ba", - "fixed_version": "5.10.185" + "cmt_id": "36b33c63515a93246487691046d18dd37a9f589b", + "fixed_version": "5.10.148" }, "5.15": { - "cmt_id": "2a974abc09761c05fef697fe229d1b85a7ce3918", - "fixed_version": "5.15.118" + "cmt_id": "76efb4897bc38b2f16176bae27ae801037ebf49a", + "fixed_version": "5.15.74" + }, + "5.19": { + "cmt_id": "6ae8aa5dcf0d7ada07964c8638e55d3af5896a86", + "fixed_version": "5.19.16" }, "5.4": { - "cmt_id": "6b1203ae83c3d07bad90b6f38ebf2e4d5998dd28", - "fixed_version": "5.4.248" + "cmt_id": "20a5bde605979af270f94b9151f753ec2caf8b05", + "fixed_version": "5.4.218" + }, + "6.0": { + "cmt_id": "b9b7369d89924a366b20045dc26dc4dc6b0567a4", + "fixed_version": "6.0.2" } }, - "CVE-2023-3355": { - "5.15": { - "cmt_id": "436fb91cadb82da0b0b114baa4fc3b5ef7e6d557", - "fixed_version": "5.15.99" + "CVE-2022-4095": { + "4.14": { + "cmt_id": "376e15487fec837301d888068a3fcc82efb6171a", + "fixed_version": "4.14.293" }, - "6.1": { - "cmt_id": "31c4251a20fd7addc1bf4fe801f95f9ba1b38990", - "fixed_version": "6.1.16" + "4.19": { + "cmt_id": "9fd6170c5e2d0ccd027abe26f6f5ffc528e1bb27", + "fixed_version": "4.19.258" + }, + "4.9": { + "cmt_id": "7dce6b0ee7d78667d6c831ced957a08769973063", + "fixed_version": "4.9.328" + }, + "5.10": { + "cmt_id": "19e3f69d19801940abc2ac37c169882769ed9770", + "fixed_version": "5.10.142" }, - "6.2": { - "cmt_id": "abadeef9a82f86e6668759259adbcf8be6f44a9b", - "fixed_version": "6.2.3" - } - }, - "CVE-2023-3357": { "5.15": { - "cmt_id": "d238f94b2b61c77dd60db820aa683ff6a58c1543", - "fixed_version": "5.15.86" + "cmt_id": "dc02aaf950015850e7589696521c7fca767cea77", + "fixed_version": "5.15.66" }, - "6.0": { - "cmt_id": "677766555ebd63a81b642a0165eed0dfc63add23", - "fixed_version": "6.0.16" + "5.19": { + "cmt_id": "b1727def850904e4b8ba384043775672841663a1", + "fixed_version": "5.19.8" }, - "6.1": { - "cmt_id": "8a37cf11dc78b71a5e0ef18aa33af41415b5ca38", - "fixed_version": "6.1.2" + "5.4": { + "cmt_id": "d0aac7146e96bf39e79c65087d21dfa02ef8db38", + "fixed_version": "5.4.213" } }, - "CVE-2023-3358": { + "CVE-2022-40982": { "4.14": { - "cmt_id": "eaa86c4ae77e9c6c28e3c417539ebbee987be0c9", - "fixed_version": "4.14.305" + "cmt_id": "cdc2724c9d060a8fa9652a9aa6347d8324f6cd82", + "fixed_version": "4.14.321" }, "4.19": { - "cmt_id": "cc906a3a4432da143ab3d2e894f99ddeff500cd3", - "fixed_version": "4.19.272" + "cmt_id": "e81494b7259b6b1ab81a9f9be3385b4aa99a7a59", + "fixed_version": "4.19.290" }, "5.10": { - "cmt_id": "7b4516ba56f1fcb13ffc91912f3074e28362228d", - "fixed_version": "5.10.166" + "cmt_id": "288a2f6bc1ce03ddb3f05fd8c79b00d5d7160b4a", + "fixed_version": "5.10.189" }, "5.15": { - "cmt_id": "c4cb73febe35f92f7a401f4cbc84f94c764732a9", - "fixed_version": "5.15.91" + "cmt_id": "348a89e2018428c3e55a87cdd9ae3cbd6cc8248a", + "fixed_version": "5.15.125" }, "5.4": { - "cmt_id": "97445814efcd0ba7a347b1463ba86bdf3cdc65aa", - "fixed_version": "5.4.231" + "cmt_id": "f68f9f2df68e246548bdc1a2279c55f98c4ca473", + "fixed_version": "5.4.252" }, "6.1": { - "cmt_id": "9a65e90179ba06eb299badc3e4dc4aa2b1e35af3", - "fixed_version": "6.1.9" - } - }, - "CVE-2023-3359": { - "6.1": { - "cmt_id": "f5249bbae0e736d612d2095ad79dc1389b3e89b5", - "fixed_version": "6.1.11" + "cmt_id": "c66ebe070d9641c9339e42e1c2d707a5052e9904", + "fixed_version": "6.1.44" + }, + "6.4": { + "cmt_id": "ff0642207e24f9a7011e8982ab7da1e16db75a38", + "fixed_version": "6.4.9" } }, - "CVE-2023-3390": { + "CVE-2022-41218": { "4.14": { - "cmt_id": "d19a80db742ceffc8d92a0cf78885f60d10c6a6d", - "fixed_version": "4.14.322" + "cmt_id": "8d904e99c10e2e443c6c7c418541880513eb9790", + "fixed_version": "4.14.303" }, "4.19": { - "cmt_id": "798aa8da13782fe472aa48841c5570d7439339b8", - "fixed_version": "4.19.291" + "cmt_id": "8f537a1282cd877f132643ef8f9e9d6032f90025", + "fixed_version": "4.19.270" }, "5.10": { - "cmt_id": "8180fc2fadd48dde4966f2db2c716c2ce7510d0b", - "fixed_version": "5.10.188" + "cmt_id": "3df07728abde249e2d3f47cf22f134cb4d4f5fb1", + "fixed_version": "5.10.163" }, "5.15": { - "cmt_id": "44ebe988cb38e720b91826f4d7c31692061ca04a", - "fixed_version": "5.15.118" + "cmt_id": "8b45a3b19a2e909e830d09a90a7e1ec8601927d9", + "fixed_version": "5.15.87" }, "5.4": { - "cmt_id": "1adb5c272b200c24e9a7dd3bff891ce6eb75b019", - "fixed_version": "5.4.251" + "cmt_id": "a29d6213098816ed4574824b6adae94fb1c0457d", + "fixed_version": "5.4.229" }, - "6.1": { - "cmt_id": "4aaa3b730d16c13cc3feaa127bfca1af201d969d", - "fixed_version": "6.1.35" + "6.0": { + "cmt_id": "55870fc9e45faa9a65860bcd6b0f8ca8c99afe44", + "fixed_version": "6.0.18" }, - "6.3": { - "cmt_id": "bdace3b1a51887211d3e49417a18fdbd315a313b", - "fixed_version": "6.3.9" + "6.1": { + "cmt_id": "530ca64b44625f7d39eb1d5efb6f9ff21da991e2", + "fixed_version": "6.1.4" } }, - "CVE-2023-33951": { - "6.1": { - "cmt_id": "0a127ac972404600c99eb141c8d5b5348e53ee4f", - "fixed_version": "6.1.13" + "CVE-2022-41222": { + "5.10": { + "cmt_id": "2613baa3ab2153cc45b175c58700d93f72ef36c4", + "fixed_version": "5.10.137" }, - "6.2": { - "cmt_id": "a950b989ea29ab3b38ea7f6e3d2540700a3c54e8", - "fixed_version": "6.2" + "5.12": { + "cmt_id": "864c4d1d25170def283b2bf87726218126634f04", + "fixed_version": "5.12.18" }, - "6.3": { - "cmt_id": "a950b989ea29ab3b38ea7f6e3d2540700a3c54e8", - "fixed_version": "6.3-rc1" + "5.13": { + "cmt_id": "987a852734e668e0829cf65dd182e44a03064800", + "fixed_version": "5.13.3" + }, + "5.4": { + "cmt_id": "79e522101cf40735f1936a10312e17f937b8dcad", + "fixed_version": "5.4.211" } }, - "CVE-2023-33952": { - "6.1": { - "cmt_id": "0a127ac972404600c99eb141c8d5b5348e53ee4f", - "fixed_version": "6.1.13" + "CVE-2022-4128": { + "5.18": { + "cmt_id": "ff151c477f6a529b0e4643d90f4f0b8eca85de04", + "fixed_version": "5.18.13" + } + }, + "CVE-2022-4129": { + "5.10": { + "cmt_id": "e34a965f771f1977f172593c73e373036c765724", + "fixed_version": "5.10.166" }, - "6.2": { - "cmt_id": "a950b989ea29ab3b38ea7f6e3d2540700a3c54e8", - "fixed_version": "6.2" + "5.15": { + "cmt_id": "87d9205d9a57dfc1f39f840b32e38475c3f523f6", + "fixed_version": "5.15.91" }, - "6.3": { - "cmt_id": "a950b989ea29ab3b38ea7f6e3d2540700a3c54e8", - "fixed_version": "6.3-rc1" + "5.4": { + "cmt_id": "7188c37f3c2527086aa46cbb37060fa73b144c65", + "fixed_version": "5.4.231" } }, - "CVE-2023-34255": { + "CVE-2022-4139": { + "6.0": { + "cmt_id": "aef39675ad33317c8badc0165ea882e172a633e6", + "fixed_version": "6.0.11" + } + }, + "CVE-2022-41674": { "5.10": { - "cmt_id": "0e98a97f772f2ffcee8ced7a49b71e72916e0aa1", - "fixed_version": "5.10.184" + "cmt_id": "a6408e0b694c1bdd8ae7dd0464a86b98518145ec", + "fixed_version": "5.10.148" }, "5.15": { - "cmt_id": "6cfe9ddb6aa698464fa16fb77a0233f68c13360c", - "fixed_version": "5.15.117" + "cmt_id": "9a8ef2030510a9d6ce86fd535b8d10720230811f", + "fixed_version": "5.15.74" }, - "5.4": { - "cmt_id": "c87439055174b31c51a89f8d66af2600033c664d", - "fixed_version": "5.4.249" + "5.19": { + "cmt_id": "42ea11a81ac853c3e870c70d61ab435d0b09b851", + "fixed_version": "5.19.16" }, - "6.1": { - "cmt_id": "a2961463d74f5c86a8dda3b41c484c28ccc4c289", - "fixed_version": "6.1.33" + "5.4": { + "cmt_id": "020402c7dd587a8a4725d32bbd172a5f7ecc5f8f", + "fixed_version": "5.4.218" }, - "6.3": { - "cmt_id": "69ebe82c73f4f9f4b49ed3b35ce347af20716d0a", - "fixed_version": "6.3.7" + "6.0": { + "cmt_id": "fc1ed6d0c9898a68da7f1f7843560dfda57683e2", + "fixed_version": "6.0.2" } }, - "CVE-2023-34256": { + "CVE-2022-41849": { "4.14": { - "cmt_id": "64b7487e3769e013fc7edb3804d1a769747f0228", - "fixed_version": "4.14.315" + "cmt_id": "fa008859983d9231b9241a4b9eac7aabfbb45155", + "fixed_version": "4.14.296" }, "4.19": { - "cmt_id": "a733c466cedd1013a41fd8908d5810f2c161072f", - "fixed_version": "4.19.283" + "cmt_id": "6d8dbefc4de96d35d68c723e2e75b5a23173c08c", + "fixed_version": "4.19.262" + }, + "4.9": { + "cmt_id": "347a969b130c2a496f471f14b354119b82664f0a", + "fixed_version": "4.9.331" }, "5.10": { - "cmt_id": "0dde3141c527b09b96bef1e7eeb18b8127810ce9", - "fixed_version": "5.10.180" + "cmt_id": "e50472949604f385e09ce3fa4e74dce9f44fb19b", + "fixed_version": "5.10.150" }, "5.15": { - "cmt_id": "6d9a705a653eb146b4991dbd198b258f787c70b1", - "fixed_version": "5.15.112" + "cmt_id": "2b0897e33682a332167b7d355eec28693b62119e", + "fixed_version": "5.15.75" }, "5.4": { - "cmt_id": "4f4fd982d972a55dee129f7da517b81fa16c408d", - "fixed_version": "5.4.243" - }, - "6.1": { - "cmt_id": "1fffe4750500148f3e744ed77cf233db8342603f", - "fixed_version": "6.1.29" - }, - "6.2": { - "cmt_id": "c06f5f1ecab83772b1e06ea5dcfe5ebb5927a43f", - "fixed_version": "6.2.16" + "cmt_id": "3742e9fd552e6c4193ebc5eb3d2cd02d429cad9c", + "fixed_version": "5.4.220" }, - "6.3": { - "cmt_id": "be7b6374a2ee8a59c1ff5addcbe25ebc1b4efd9f", - "fixed_version": "6.3.3" + "6.0": { + "cmt_id": "e2e5264dcf5796559869750a2d6943ac88fe3918", + "fixed_version": "6.0.3" } }, - "CVE-2023-34319": { + "CVE-2022-41850": { "4.14": { - "cmt_id": "e1142d87c185c7d7bbf05d175754638b5b9dbf16", - "fixed_version": "4.14.321" + "cmt_id": "fb8b43b7721786f551ec95542e07cf9a909f3e56", + "fixed_version": "4.14.296" }, "4.19": { - "cmt_id": "11e6919ae028b5de1fc48007354ea07069561b31", - "fixed_version": "4.19.290" + "cmt_id": "13de81c7ea0fd68efb48a2d2957e349237905923", + "fixed_version": "4.19.262" + }, + "4.9": { + "cmt_id": "84607bd3a8542b84b450d19a3579172f96c2bb47", + "fixed_version": "4.9.331" }, "5.10": { - "cmt_id": "f9167a2d6b943f30743de6ff8163d1981c34f9a9", - "fixed_version": "5.10.189" + "cmt_id": "dbcca76435a606a352c794956e6df62eedd3a353", + "fixed_version": "5.10.150" }, "5.15": { - "cmt_id": "b14a3924c2675c22e07a5a190223b6b6cdc2867d", - "fixed_version": "5.15.125" - }, - "5.4": { - "cmt_id": "bc7b9a6c2ca42b116b0f24dbaa52b5a07d96d1d6", - "fixed_version": "5.4.252" + "cmt_id": "c61786dc727d1850336d12c85a032c9a36ae396d", + "fixed_version": "5.15.75" }, - "6.1": { - "cmt_id": "fa5b932b77c815d0e416612859d5899424bb4212", - "fixed_version": "6.1.44" + "5.19": { + "cmt_id": "2d38886ae0365463cdba3db669170eef1e3d55c0", + "fixed_version": "5.19.17" }, - "6.4": { - "cmt_id": "cf482893f721f76ac60c0a43482a59b2f194156b", - "fixed_version": "6.4.9" + "5.4": { + "cmt_id": "e30c3a9a88818e5cf3df3fda6ab8388bef3bc6cd", + "fixed_version": "5.4.220" + }, + "6.0": { + "cmt_id": "8a251549ab577d64ece210a11c404354479bd635", + "fixed_version": "6.0.3" } }, - "CVE-2023-34324": { + "CVE-2022-41858": { "4.14": { - "cmt_id": "bc32110d6176cc34c58f4efa22194546f103b81a", - "fixed_version": "4.14.327" + "cmt_id": "3fdb033f8f8c978489c7702a4a44494b7ae63424", + "fixed_version": "4.14.276" }, "4.19": { - "cmt_id": "3fdf2be9089b5096a28e76376656c60ce410ac4a", - "fixed_version": "4.19.296" + "cmt_id": "753b9d220a7d36dac70e7c6d05492d10d6f9dd36", + "fixed_version": "4.19.239" + }, + "4.9": { + "cmt_id": "113284fe48770841e157e338bf3a2e9f197a8b50", + "fixed_version": "4.9.311" }, "5.10": { - "cmt_id": "660627c71bc1098aa94e5f208f14748b105b73bc", - "fixed_version": "5.10.198" + "cmt_id": "ca24c5e8f0ac3d43ec0cff29e1c861be73aff165", + "fixed_version": "5.10.112" }, "5.15": { - "cmt_id": "c8af81a9d36e0d2e5f198eaceb38a743d834dfe2", - "fixed_version": "5.15.135" + "cmt_id": "efb020924a71391fc12e6f204eaf25694cc116a1", + "fixed_version": "5.15.35" + }, + "5.17": { + "cmt_id": "b39fdc7a0d87f7f5d287dce1ae297a329775a1a3", + "fixed_version": "5.17.4" }, "5.4": { - "cmt_id": "f70c285cf02c2430da74c58b8a177fcb5df6ca43", - "fixed_version": "5.4.258" + "cmt_id": "d05cd68ed8460cb158cc62c41ffe39fe0ca16169", + "fixed_version": "5.4.190" + } + }, + "CVE-2022-42328": { + "6.0": { + "cmt_id": "3fb02db125bbcf8163e9e30d2824b4adf13f06cb", + "fixed_version": "6.0.13" }, "6.1": { - "cmt_id": "a4cc925e2e12c3bbffb0860acdb9f9c1abde47dd", - "fixed_version": "6.1.57" - }, - "6.5": { - "cmt_id": "76b33722e2d2336a6e2a7d9eacbbb8988478cf98", - "fixed_version": "6.5.7" + "cmt_id": "74e7e1efdad45580cc3839f2a155174cf158f9b5", + "fixed_version": "6.1" } }, - "CVE-2023-3439": { - "5.17": { - "cmt_id": "019e80a7f71e8e62efda501081172dc70b5a635a", - "fixed_version": "5.17.6" + "CVE-2022-42329": { + "6.0": { + "cmt_id": "3fb02db125bbcf8163e9e30d2824b4adf13f06cb", + "fixed_version": "6.0.13" + }, + "6.1": { + "cmt_id": "74e7e1efdad45580cc3839f2a155174cf158f9b5", + "fixed_version": "6.1" } }, - "CVE-2023-35001": { - "4.14": { - "cmt_id": "185a79c8be264720b0b89ce2cc42ca2582dbce6f", - "fixed_version": "4.14.322" - }, - "4.19": { - "cmt_id": "025fd7efe2639773540a5e425b7bc0dc10b6b023", - "fixed_version": "4.19.291" - }, + "CVE-2022-42432": { "5.10": { - "cmt_id": "ea213922249c7e448d217a0a0441c6f86a8155fd", - "fixed_version": "5.10.188" + "cmt_id": "5d75fef3e61e797fab5c3fbba88caa74ab92ad47", + "fixed_version": "5.10.146" }, "5.15": { - "cmt_id": "870dcc31c0cf47cb15a568ade4168dc644b3ccfb", - "fixed_version": "5.15.121" + "cmt_id": "816eab147e5c6f6621922b8515ad9010ceb1735e", + "fixed_version": "5.15.71" + }, + "5.19": { + "cmt_id": "633c81c0449663f57d4138326d036dc6cfad674e", + "fixed_version": "5.19.12" }, "5.4": { - "cmt_id": "b7d636c924eb275651bfb036eb8eca49c3f7bc24", - "fixed_version": "5.4.251" + "cmt_id": "721ea8ac063d70c2078c4e762212705de6151764", + "fixed_version": "5.4.215" + } + }, + "CVE-2022-4269": { + "5.10": { + "cmt_id": "53245103786312f21fb9785327a4367cf10f0dbb", + "fixed_version": "5.10.181" + }, + "5.15": { + "cmt_id": "169a41073993add6b0cfdc44e168e75f92f4834d", + "fixed_version": "5.15.105" }, "6.1": { - "cmt_id": "40f83dd66a823400d8592e3b71e190e3ad978eb5", - "fixed_version": "6.1.39" + "cmt_id": "4c8fc3fe28e47e2a495444347375f7354c24b018", + "fixed_version": "6.1.22" }, - "6.4": { - "cmt_id": "b79c09c2bf2d7643902a6ef26152de602c5c5e4b", - "fixed_version": "6.4.4" + "6.2": { + "cmt_id": "8c9e553c58a491ad328c622441e08178373442dc", + "fixed_version": "6.2.9" } }, - "CVE-2023-3567": { + "CVE-2022-42703": { "4.14": { - "cmt_id": "af79ea9a2443016f64d8fd8d72020cc874f0e066", - "fixed_version": "4.14.329" + "cmt_id": "978a70601bdc4c32de4003d3beef4dfa23fff1e0", + "fixed_version": "4.14.292" }, "4.19": { - "cmt_id": "6332f52f44b9776568bf3c0b714ddfb0bb175e78", - "fixed_version": "4.19.273" + "cmt_id": "6dbfc25d68d922736381988d64156a649ccf7bf1", + "fixed_version": "4.19.257" + }, + "4.9": { + "cmt_id": "c24ca0f172905d593ad8ab276b0992bb74353a8d", + "fixed_version": "4.9.327" }, "5.10": { - "cmt_id": "55515d7d8743b71b80bfe68e89eb9d92630626ab", - "fixed_version": "5.10.168" + "cmt_id": "98f401d36396134c0c86e9e3bd00b6b6b028b521", + "fixed_version": "5.10.141" }, "5.15": { - "cmt_id": "fc9e27f3ba083534b8bbf72ab0f5c810ffdc7d18", - "fixed_version": "5.15.93" + "cmt_id": "c18a209b56e37b2a60414f714bd70b084ef25835", + "fixed_version": "5.15.65" }, - "5.4": { - "cmt_id": "d0332cbf53dad06a22189cc341391237f4ea6d9f", - "fixed_version": "5.4.232" + "5.19": { + "cmt_id": "7877eaa1131147b4d6a063962f3aac0ab1b8ea1c", + "fixed_version": "5.19.7" }, - "6.1": { - "cmt_id": "8506f16aae9daf354e3732bcfd447e2a97f023df", - "fixed_version": "6.1.11" + "5.4": { + "cmt_id": "2fe3eee48899a890310177d54537d5b8e255eb31", + "fixed_version": "5.4.212" } }, - "CVE-2023-35788": { - "4.19": { - "cmt_id": "59a27414bb00e48c4153a8b794fb4e69910a6a1b", - "fixed_version": "4.19.285" - }, + "CVE-2022-42719": { "5.10": { - "cmt_id": "7c5c67aa294444b53f697dc3ddce61b33ff8badd", - "fixed_version": "5.10.183" + "cmt_id": "31ce5da48a845bac48930bbde1d45e7449591728", + "fixed_version": "5.10.149" }, "5.15": { - "cmt_id": "45f47d2cf1142fbfe5d6fc39ad78f4aac058907c", - "fixed_version": "5.15.116" + "cmt_id": "de124365a7d2deed22cf706583930f28d537ff0f", + "fixed_version": "5.15.74" }, - "5.4": { - "cmt_id": "94a00f1142c581fe01d17d7beca314592f85e83a", - "fixed_version": "5.4.246" + "5.19": { + "cmt_id": "e6d77ac0132da7e73fdcc4a38dd4c40ac0226466", + "fixed_version": "5.19.16" }, - "6.1": { - "cmt_id": "eac615ed3c6d91f1196f16f0a0599fff479cb220", - "fixed_version": "6.1.33" + "5.4": { + "cmt_id": "0cb5be43dc4b79da010522f79a06fa56f944d3cd", + "fixed_version": "5.4.219" }, - "6.3": { - "cmt_id": "900fab73a9cd3dd6a3a69f89980f8f3c9a738d5a", - "fixed_version": "6.3.7" + "6.0": { + "cmt_id": "4afcb8886800131f8dd58d82754ee0c508303d46", + "fixed_version": "6.0.2" } }, - "CVE-2023-35823": { - "4.19": { - "cmt_id": "95e684340470a95ff4957cb9a536ec7a0461c75b", - "fixed_version": "4.19.283" - }, + "CVE-2022-42720": { "5.10": { - "cmt_id": "7dac96e9cc985328ec1fae92f0c245f559dc0e11", - "fixed_version": "5.10.180" + "cmt_id": "6b944845031356f3e0c0f6695f9252a8ddc8b02f", + "fixed_version": "5.10.148" }, "5.15": { - "cmt_id": "2f48c0a463a37ac76ac089ec7936f673b9a0a448", - "fixed_version": "5.15.111" - }, - "5.4": { - "cmt_id": "a4b6ab360f56ccdcde29eab29f493d8c464c3ffb", - "fixed_version": "5.4.243" + "cmt_id": "bfe29873454f38eb1a511a76144ad1a4848ca176", + "fixed_version": "5.15.74" }, - "6.1": { - "cmt_id": "5a72aea9acfe945353fb3a2f141f4e526a5f3684", - "fixed_version": "6.1.28" + "5.19": { + "cmt_id": "46b23a9559580a72d8cc5811b1bce8db099806d6", + "fixed_version": "5.19.16" }, - "6.2": { - "cmt_id": "efccd54c41887e66a03bf7af860ff5eb77c47fcf", - "fixed_version": "6.2.15" + "5.4": { + "cmt_id": "785eaabfe3103e8bfa36aebacff6e8f69f092ed7", + "fixed_version": "5.4.218" }, - "6.3": { - "cmt_id": "3a60e51489a3ec61565f5bc53f726ac9ccc6083c", - "fixed_version": "6.3.2" + "6.0": { + "cmt_id": "e97a5d7091e6d2df05f8378a518a9bbf81688b77", + "fixed_version": "6.0.2" } }, - "CVE-2023-35824": { - "4.14": { - "cmt_id": "df01f9c146ce2134de4daf393e29e18d6d5866ec", - "fixed_version": "4.14.315" - }, - "4.19": { - "cmt_id": "722c156c6eab40a6e7dda98dfa66724f9d5aeceb", - "fixed_version": "4.19.283" - }, + "CVE-2022-42721": { "5.10": { - "cmt_id": "e9d64e90a0ada4d00ac6562e351ef10ae7d9b911", - "fixed_version": "5.10.180" + "cmt_id": "b0e5c5deb7880be5b8a459d584e13e1f9879d307", + "fixed_version": "5.10.148" }, "5.15": { - "cmt_id": "c94388b5b9098db82d6ba4627ef6e41a35870818", - "fixed_version": "5.15.111" + "cmt_id": "0a8ee682e4f992eccce226b012bba600bb2251e2", + "fixed_version": "5.15.74" }, - "5.4": { - "cmt_id": "cd1583caed7ea879ecb638ed876960e41363b7b6", - "fixed_version": "5.4.243" + "5.19": { + "cmt_id": "1d73c990e9bafc2754b1ced71345f73f5beb1781", + "fixed_version": "5.19.16" }, - "6.1": { - "cmt_id": "305262a23c949010a056bd81b6e84051fd72a567", - "fixed_version": "6.1.28" + "5.4": { + "cmt_id": "77bb20ccb9dfc9ed4f9c93788c90d08cfd891cdc", + "fixed_version": "5.4.218" }, - "6.2": { - "cmt_id": "ad998076d42b394ca22e41e91c59a6056be6098d", - "fixed_version": "6.2.15" - }, - "6.3": { - "cmt_id": "d730bc84064364cafdb20c6ee7fda2cd7416407a", - "fixed_version": "6.3.2" - } - }, - "CVE-2023-35826": { - "6.1": { - "cmt_id": "2cdc8f729d953143b3bbdc56841bb6800752de7f", - "fixed_version": "6.1.28" - }, - "6.2": { - "cmt_id": "a858e35c62966761cc2bed2e4123cf68d7df546c", - "fixed_version": "6.2.15" - }, - "6.3": { - "cmt_id": "565c863bd982584aa4393f7bdb345dbccb3ad488", - "fixed_version": "6.3.2" + "6.0": { + "cmt_id": "377cb1ce85878c197904ca8383e6b41886e3994d", + "fixed_version": "6.0.2" } }, - "CVE-2023-35827": { + "CVE-2022-42722": { "5.10": { - "cmt_id": "db9aafa19547833240f58c2998aed7baf414dc82", - "fixed_version": "5.10.199" + "cmt_id": "58c0306d0bcd5f541714bea8765d23111c9af68a", + "fixed_version": "5.10.148" }, "5.15": { - "cmt_id": "616761cf9df9af838c0a1a1232a69322a9eb67e6", - "fixed_version": "5.15.136" - }, - "5.4": { - "cmt_id": "65d34cfd4e347054eb4193bc95d9da7eaa72dee5", - "fixed_version": "5.4.259" + "cmt_id": "93a3a32554079432b49cf87f326607b2a2fab4f2", + "fixed_version": "5.15.74" }, - "6.1": { - "cmt_id": "6f6fa8061f756aedb93af12a8a5d3cf659127965", - "fixed_version": "6.1.59" + "5.19": { + "cmt_id": "fa63b5f6f8853ace755d9a23fb75817d5ba20df5", + "fixed_version": "5.19.16" }, - "6.5": { - "cmt_id": "105abd68ad8f781985113aee2e92e0702b133705", - "fixed_version": "6.5.8" + "6.0": { + "cmt_id": "8ed62f2df8ebcf79c185f1bc3e4f346ea0905da6", + "fixed_version": "6.0.2" } }, - "CVE-2023-35828": { + "CVE-2022-42895": { + "4.14": { + "cmt_id": "999d99c8de09537bd4f4a4a7db2be6b55c6ed817", + "fixed_version": "4.14.299" + }, "4.19": { - "cmt_id": "ad03fe033a71ed1fd2cb68a067198ae0e342f991", - "fixed_version": "4.19.283" + "cmt_id": "36919a82f335784d86b4def308739559bb47943d", + "fixed_version": "4.19.265" + }, + "4.9": { + "cmt_id": "63e3d75298fac7fa50906454603dd5bb4ef22a23", + "fixed_version": "4.9.333" }, "5.10": { - "cmt_id": "36c237b202a406ba441892eabcf44e60dae7ad73", - "fixed_version": "5.10.180" + "cmt_id": "26ca2ac091b49281d73df86111d16e5a76e43bd7", + "fixed_version": "5.10.154" }, "5.15": { - "cmt_id": "1e58fb6b1cef4d5e552a0c3038bf946890af6f3b", - "fixed_version": "5.15.111" + "cmt_id": "3e4697ffdfbb38a2755012c4e571546c89ab6422", + "fixed_version": "5.15.78" }, "5.4": { - "cmt_id": "0fee5030c09401818c17be0786f2684c1cc1e440", - "fixed_version": "5.4.243" - }, - "6.1": { - "cmt_id": "df2380520926bdbc264cffab0f45da9a21f304c8", - "fixed_version": "6.1.28" - }, - "6.2": { - "cmt_id": "1029639643c326396ce8e07a9f52ce7165c021c3", - "fixed_version": "6.2.15" + "cmt_id": "6949400ec9feca7f88c0f6ca5cb5fdbcef419c89", + "fixed_version": "5.4.224" }, - "6.3": { - "cmt_id": "231598b40a070a6bf780c0df1ff5ae3e57102900", - "fixed_version": "6.3.2" + "6.0": { + "cmt_id": "e1aada9b71493b2e11c2a239ece99a97e3f13431", + "fixed_version": "6.0.8" } }, - "CVE-2023-35829": { + "CVE-2022-42896": { + "4.14": { + "cmt_id": "9f4624c42db9dd854870ccb212ddd405d8c59041", + "fixed_version": "4.14.301" + }, + "4.19": { + "cmt_id": "a2045d57e844864605d39e6cfd2237861d800f13", + "fixed_version": "4.19.268" + }, + "4.9": { + "cmt_id": "c834df40af8ec156e8c3c388a08ff7381cd90d80", + "fixed_version": "4.9.335" + }, "5.10": { - "cmt_id": "de19d02d734ef29f5dbd2c12fe810fa960ecd83f", - "fixed_version": "5.10.180" + "cmt_id": "6b6f94fb9a74dd2891f11de4e638c6202bc89476", + "fixed_version": "5.10.154" }, "5.15": { - "cmt_id": "cac0f4f36e226c79c83d01dddc049ac59d2de157", - "fixed_version": "5.15.111" - }, - "6.1": { - "cmt_id": "6a17add9c61030683b9c1fc86878f00a2d318a95", - "fixed_version": "6.1.28" + "cmt_id": "81035e1201e26d57d9733ac59140a3e29befbc5a", + "fixed_version": "5.15.78" }, - "6.2": { - "cmt_id": "26f55569eeb045db9fceda0a5523521c2e76d8aa", - "fixed_version": "6.2.15" + "5.4": { + "cmt_id": "0d87bb6070361e5d1d9cb391ba7ee73413bc109b", + "fixed_version": "5.4.226" }, - "6.3": { - "cmt_id": "2115e94838adc9d1e7b75043c9f26abcc910f6fb", - "fixed_version": "6.3.2" + "6.0": { + "cmt_id": "d7efeb93213becae13c6a12e4150ce1e07bd2c49", + "fixed_version": "6.0.8" } }, - "CVE-2023-3609": { + "CVE-2022-43750": { "4.14": { - "cmt_id": "a7f178f8439e939efdd12d190783eb0fabf5990d", - "fixed_version": "4.14.322" + "cmt_id": "b29f76fcf2db6615b416d98e28c7d81eff4c89a2", + "fixed_version": "4.14.296" }, "4.19": { - "cmt_id": "8ffaf24a377519e4396f03da5ccda082edae1ac9", - "fixed_version": "4.19.291" + "cmt_id": "bf7e2cee3899ede4c7c6548f28159ee3775fb67f", + "fixed_version": "4.19.262" + }, + "4.9": { + "cmt_id": "1b5ad3786a2f2cdbfed34071aa467f80e4903a0b", + "fixed_version": "4.9.331" }, "5.10": { - "cmt_id": "af6eaa57986e82d7efd81984ee607927c6de61e4", - "fixed_version": "5.10.185" + "cmt_id": "1b257f97fec43d7a8a4c9ada8538d14421861b0a", + "fixed_version": "5.10.148" }, "5.15": { - "cmt_id": "0e1098d72fa462944c68262e1b5cca045dcb555e", - "fixed_version": "5.15.118" + "cmt_id": "5ff80339cdc3143b89eee2ad91ae44b4dbf65ad1", + "fixed_version": "5.15.73" }, - "5.4": { - "cmt_id": "46305daf8064598a4008af1728651296815a74ed", - "fixed_version": "5.4.248" + "5.19": { + "cmt_id": "9de74019cd44ddddaaca3c677343750ac78b6f73", + "fixed_version": "5.19.15" }, - "6.1": { - "cmt_id": "07f9cc229b44cbcee6385802d390091d915f38c3", - "fixed_version": "6.1.35" + "5.4": { + "cmt_id": "21446ad9cb9844b90d7d8e73d8fff03160e51ebc", + "fixed_version": "5.4.218" }, - "6.3": { - "cmt_id": "4efd555a43dc24f3342bcc036522c430f5869e6f", - "fixed_version": "6.3.9" + "6.0": { + "cmt_id": "08e2c70e549b77f5f3af9c76da00779d5756f997", + "fixed_version": "6.0.1" } }, - "CVE-2023-3610": { + "CVE-2022-4378": { "5.10": { - "cmt_id": "d53c295c1f43b7460d28ba0f0f98a602084fdcb6", - "fixed_version": "5.10.188" + "cmt_id": "9ba389863ac63032d4b6ffad2c90a62cd78082ee", + "fixed_version": "5.10.158" }, "5.15": { - "cmt_id": "314a8697d08092df6d00521450d44c352c602943", - "fixed_version": "5.15.119" - }, - "6.1": { - "cmt_id": "891cd2edddc76c58e842706ad27e2ff96000bd5d", - "fixed_version": "6.1.36" + "cmt_id": "48642f94311b0cf9667aa6833f9f5e3a87d2a0ce", + "fixed_version": "5.15.82" }, - "6.3": { - "cmt_id": "a1547f81341f14b1b355df04218152e8b5d4b264", - "fixed_version": "6.3.10" + "6.0": { + "cmt_id": "fdf2c95f28bf197bfab421d21e8c697d4f149ea1", + "fixed_version": "6.0.12" }, - "6.4": { - "cmt_id": "4bedf9eee016286c835e3d8fa981ddece5338795", - "fixed_version": "6.4" + "6.1": { + "cmt_id": "bce9332220bd677d83b19d21502776ad555a0e73", + "fixed_version": "6.1" } }, - "CVE-2023-3611": { - "4.14": { - "cmt_id": "c3f21ea515cb4ad7db86ddb511cead2f09e1c1e6", - "fixed_version": "4.14.322" - }, - "4.19": { - "cmt_id": "ee3bc829f9b4df96d208d58b654e400fa1f3b46c", - "fixed_version": "4.19.291" - }, + "CVE-2022-4379": { "5.10": { - "cmt_id": "8359ee85fd6dabc5c134ed69fb22faadd8a44071", - "fixed_version": "5.10.188" + "cmt_id": "01e4c9c03de8a9f8839cb7342bc4bccf9104efe5", + "fixed_version": "5.10.177" }, "5.15": { - "cmt_id": "91d3554ab1fc2804c36a815c0f79502d727a41e6", - "fixed_version": "5.15.121" - }, - "5.4": { - "cmt_id": "cf8ecd6ea68099a38e94e9b82cf58f6fd4cdf3c9", - "fixed_version": "5.4.253" + "cmt_id": "ec5b7814353532243e8a9147d232a32549174909", + "fixed_version": "5.15.105" }, "6.1": { - "cmt_id": "70feebdbfad85772ab3ef152812729cab5c6c426", - "fixed_version": "6.1.40" - }, - "6.4": { - "cmt_id": "bd2333fa86dc520823e8c317980b29ba91ee6b87", - "fixed_version": "6.4.5" - } - }, - "CVE-2023-37453": { - "6.4": { - "cmt_id": "b4a074b1fb222164ed7d5c0b8c922dc4a0840848", - "fixed_version": "6.4.16" - }, - "6.5": { - "cmt_id": "b9fbfb349eacc0820f91c797d7f0a3ac7a4935b5", - "fixed_version": "6.5.3" + "cmt_id": "650b69b17cfd79f51476d93c2c63bfb73280a77a", + "fixed_version": "6.1.3" } }, - "CVE-2023-3772": { - "4.14": { - "cmt_id": "ed1cba039309c80b49719fcff3e3d7cdddb73d96", - "fixed_version": "4.14.324" - }, - "4.19": { - "cmt_id": "44f69c96f8a147413c23c68cda4d6fb5e23137cd", - "fixed_version": "4.19.293" - }, + "CVE-2022-4382": { "5.10": { - "cmt_id": "bd30aa9c7febb6e709670cd5154194189ca3b7b5", - "fixed_version": "5.10.192" + "cmt_id": "856e4b5e53f21edbd15d275dde62228dd94fb2b4", + "fixed_version": "5.10.165" }, "5.15": { - "cmt_id": "075448a2eb753f813fe873cfa52853e9fef8eedb", - "fixed_version": "5.15.128" + "cmt_id": "a2e075f40122d8daf587db126c562a67abd69cf9", + "fixed_version": "5.15.90" }, "5.4": { - "cmt_id": "8046beb890ebc83c5820188c650073e1c6066e67", - "fixed_version": "5.4.255" + "cmt_id": "9a39f4626b361ee7aa10fd990401c37ec3b466ae", + "fixed_version": "5.4.230" }, "6.1": { - "cmt_id": "87b655f4936b6fc01f3658aa88a22c923b379ebd", - "fixed_version": "6.1.47" - }, - "6.4": { - "cmt_id": "53df4be4f5221e90dc7aa9ce745a9a21bb7024f4", - "fixed_version": "6.4.12" + "cmt_id": "616fd34d017000ecf9097368b13d8a266f4920b3", + "fixed_version": "6.1.8" } }, - "CVE-2023-3773": { - "6.1": { - "cmt_id": "a442cd17019385c53bbddf3bb92d91474081916b", - "fixed_version": "6.1.47" + "CVE-2022-43945": { + "5.15": { + "cmt_id": "dc7f225090c29a5f3b9419b1af32846a201555e7", + "fixed_version": "5.15.75" }, - "6.4": { - "cmt_id": "a9020514f175ef15bb68eea9345782abfd9afea3", - "fixed_version": "6.4.12" + "5.19": { + "cmt_id": "c2a878095b5c6f04f90553a3c45872f990dab14e", + "fixed_version": "5.19.17" + }, + "6.0": { + "cmt_id": "f59c74df82f6ac9d2ea4e01aa3ae7c6c4481652d", + "fixed_version": "6.0.3" } }, - "CVE-2023-3776": { - "4.14": { - "cmt_id": "fa020e39526994c7248f241f75d615b0df5d7671", - "fixed_version": "4.14.322" + "CVE-2022-45869": { + "5.15": { + "cmt_id": "f88a6977f8b981bfb5fddd18fbaa75e57e8af293", + "fixed_version": "5.15.82" }, + "6.0": { + "cmt_id": "34ced1da74eb975abdf7ef823512c7719f67601b", + "fixed_version": "6.0.11" + } + }, + "CVE-2022-45886": { "4.19": { - "cmt_id": "612f468cfc3df83777ae21058419b1fc8e9037eb", - "fixed_version": "4.19.291" + "cmt_id": "7bb9c6e05efcecb15b0354d574efbc36ca321d75", + "fixed_version": "4.19.285" }, "5.10": { - "cmt_id": "80e0e8d5f54397c5048fa2274144134dd9dc91b5", - "fixed_version": "5.10.188" + "cmt_id": "2ea7d26ed851db7176e4bfa8174c8a1380255bbe", + "fixed_version": "5.10.183" }, "5.15": { - "cmt_id": "5b55f2d6ef403fcda93ae4eb4d8c1ba164c66e92", - "fixed_version": "5.15.121" + "cmt_id": "50831747cb3a880dd4bdebe3fc3c81de9e21582d", + "fixed_version": "5.15.116" }, "5.4": { - "cmt_id": "808211a8d427404331e39e3b8c94ab5242eef8f5", - "fixed_version": "5.4.251" + "cmt_id": "ed47886a73dbc0477ae09a4a979e27317cf2b52d", + "fixed_version": "5.4.246" }, "6.1": { - "cmt_id": "c91fb29bb07ee4dd40aabd1e41f19c0f92ac3199", - "fixed_version": "6.1.40" + "cmt_id": "93b5dfebcb1821dde466e29404fcf1fb919f4c72", + "fixed_version": "6.1.33" }, - "6.4": { - "cmt_id": "0a2e3f49febda459252f58cec2d659623d582800", - "fixed_version": "6.4.5" + "6.3": { + "cmt_id": "8bade849b15b3ecb62893f328b2cc4cdc65ac0c6", + "fixed_version": "6.3.7" } }, - "CVE-2023-3777": { - "5.10": { - "cmt_id": "30e5460d69e631c0e84db37dba2d8f98648778d4", - "fixed_version": "5.10.188" - }, - "5.15": { - "cmt_id": "10013f764ad2957de08968bd02870b6b7683e3f6", - "fixed_version": "5.15.123" - }, - "6.1": { - "cmt_id": "e18922ce3e3169eb97838d1dcba2d679bcca446c", - "fixed_version": "6.1.42" + "CVE-2022-45887": { + "4.14": { + "cmt_id": "cf412b0543b77d01f74ae2303d7f8a97e6bff686", + "fixed_version": "4.14.317" }, - "6.4": { - "cmt_id": "ab87c6b43822a56ae0aadc715364b5f8d4a96037", - "fixed_version": "6.4.7" - } - }, - "CVE-2023-3812": { "4.19": { - "cmt_id": "aa815bf32acf560dad63c3dc46bc7b98ca9a9672", - "fixed_version": "4.19.265" + "cmt_id": "3e5af0745a4702ab0df2f880bfe0431eb30f9164", + "fixed_version": "4.19.285" }, "5.10": { - "cmt_id": "3583826b443a63681deaa855048d3f2b742af47e", - "fixed_version": "5.10.154" + "cmt_id": "eb37fef417a246fe54530901a3ea9c0abc914fc2", + "fixed_version": "5.10.183" }, "5.15": { - "cmt_id": "dcc79cf735b8ec4bedaa82c53bed8c62721c042b", - "fixed_version": "5.15.78" + "cmt_id": "d6c47b23599253d7d866e1e8d60cd410855c1be5", + "fixed_version": "5.15.116" }, "5.4": { - "cmt_id": "ca791952d42c5b40d548ff6c4a879216039b0ca1", - "fixed_version": "5.4.224" + "cmt_id": "08b20cb8e5b9d69bb3b83c1ad30a702767a9f0ef", + "fixed_version": "5.4.246" }, - "6.0": { - "cmt_id": "d24ba55946e6bdcfacae989638621d7728ee0ec8", - "fixed_version": "6.0.8" - } - }, - "CVE-2023-38409": { "6.1": { - "cmt_id": "b15df140fe092c3ac28dab32c6b3acdda1a93c63", - "fixed_version": "6.1.25" + "cmt_id": "ea2938c27b0212aaab6702c16b7385e073b35643", + "fixed_version": "6.1.33" }, - "6.2": { - "cmt_id": "62055fa6fbf8f1f1457f5d6a7d17ce1a45972613", - "fixed_version": "6.2.12" + "6.3": { + "cmt_id": "dbef7d1ffea0ccc95446c5383e0be65babedf667", + "fixed_version": "6.3.7" } }, - "CVE-2023-38426": { - "5.15": { - "cmt_id": "865be1cff2c038984fe55c9deae5461a498cfdf9", - "fixed_version": "5.15.113" + "CVE-2022-45919": { + "4.14": { + "cmt_id": "66e262ad9b35615b2a1b1cad4751e93e1de90634", + "fixed_version": "4.14.317" }, - "6.1": { - "cmt_id": "75378b03a90d75b1349bb03577ac8465194c883e", - "fixed_version": "6.1.30" + "4.19": { + "cmt_id": "8624c7e048fa9ba584b7ba43715090ab1aed765c", + "fixed_version": "4.19.285" + }, + "5.10": { + "cmt_id": "76169f7490899d74aad4b0e2c4c1b9d4904dd01f", + "fixed_version": "5.10.183" }, - "6.3": { - "cmt_id": "0adcdc220fa555935bb37a273f08956616f8601a", - "fixed_version": "6.3.4" - } - }, - "CVE-2023-38427": { "5.15": { - "cmt_id": "4adb4fbd74812aeada97e7cc6de3dad41952443e", - "fixed_version": "5.15.145" + "cmt_id": "42624bc8c30c463a9155286bb716223ad04dd2a7", + "fixed_version": "5.15.116" + }, + "5.4": { + "cmt_id": "353fd22693a672efb337d399e610898c64f57b17", + "fixed_version": "5.4.246" }, "6.1": { - "cmt_id": "bf12d7fb63b365fb766655cedcb5d5f292b0c35e", - "fixed_version": "6.1.34" + "cmt_id": "d5d61f747e3f1ff9042db66896f2f90afa5f3197", + "fixed_version": "6.1.33" }, "6.3": { - "cmt_id": "205279b96b5c40c60c6de4f9342416e02ee279f1", - "fixed_version": "6.3.8" + "cmt_id": "59918dd7a6d1ad098550ca6fcf154c1ae6842bc7", + "fixed_version": "6.3.7" } }, - "CVE-2023-38428": { - "5.15": { - "cmt_id": "7657321b2624197840ef2cfa4f29ccf873d7aa9b", - "fixed_version": "5.15.113" + "CVE-2022-45934": { + "4.14": { + "cmt_id": "95f1847a361c7b4bf7d74c06ecb6968455082c1a", + "fixed_version": "4.14.303" }, - "6.1": { - "cmt_id": "40d90ee0275a1bfcd26fa7690adc4330b4227a69", - "fixed_version": "6.1.30" + "4.19": { + "cmt_id": "ad528fde0702903208d0a79d88d5a42ae3fc235b", + "fixed_version": "4.19.270" }, - "6.3": { - "cmt_id": "3df195fbddfae60ca24a9bbc209402d9fccdef68", - "fixed_version": "6.3.4" - } - }, - "CVE-2023-38429": { - "5.15": { - "cmt_id": "61e043326e72b5abb02b5bc9132f2620a7faf8c5", - "fixed_version": "5.15.113" + "4.9": { + "cmt_id": "49d5867819ab7c744852b45509e8469839c07e0e", + "fixed_version": "4.9.337" }, - "6.1": { - "cmt_id": "af7335a4b946f9f6f9d98398cbcea15cd9850409", - "fixed_version": "6.1.30" + "5.10": { + "cmt_id": "f3fe6817156a2ad4b06f01afab04638a34d7c9a6", + "fixed_version": "5.10.161" }, - "6.3": { - "cmt_id": "778aae5a513ea09aa5addfa352bd70a5b71dda85", - "fixed_version": "6.3.4" - } - }, - "CVE-2023-38430": { "5.15": { - "cmt_id": "0d1a3f97efbe73fe6d6c18574e6ac94cd2492c11", - "fixed_version": "5.15.145" + "cmt_id": "19a78143961a197de8502f4f29c453b913dc3c29", + "fixed_version": "5.15.85" }, - "6.1": { - "cmt_id": "e01fc7caac9ce9ad76df9f42f7f61ef4bf1d27c9", - "fixed_version": "6.1.35" + "5.4": { + "cmt_id": "9fdc79b571434af7bc742da40a3405f038b637a7", + "fixed_version": "5.4.229" }, - "6.3": { - "cmt_id": "75e7d81679ef7995422adc84ef597fded99c24a6", - "fixed_version": "6.3.9" - } - }, - "CVE-2023-38431": { - "5.15": { - "cmt_id": "df3a4518aee64f21bcafa891105b468413f27431", - "fixed_version": "5.15.145" + "6.0": { + "cmt_id": "5550bbf709c323194881737fd290c4bada9e6ead", + "fixed_version": "6.0.15" }, "6.1": { - "cmt_id": "543c12c2644e772caa6880662c2a852cfdc5a10c", - "fixed_version": "6.1.34" - }, - "6.3": { - "cmt_id": "e9cb7be2fcbaee9e808b729e92948d38d52e5add", - "fixed_version": "6.3.8" + "cmt_id": "bcd70260ef56e0aee8a4fc6cd214a419900b0765", + "fixed_version": "6.1" } }, - "CVE-2023-38432": { - "5.15": { - "cmt_id": "35f450f54dca1519bb24faacd0428db09f89a11f", - "fixed_version": "5.15.121" + "CVE-2022-4662": { + "4.14": { + "cmt_id": "1b29498669914c7f9afb619722421418a753d372", + "fixed_version": "4.14.293" }, - "6.1": { - "cmt_id": "9650cf70ec9d94ff34daa088b643229231723c26", - "fixed_version": "6.1.36" + "4.19": { + "cmt_id": "cc9a12e12808af178c600cc485338bac2e37d2a8", + "fixed_version": "4.19.258" }, - "6.3": { - "cmt_id": "768caf4019f0391c0b6452afe34cea1704133f7b", - "fixed_version": "6.3.10" + "4.9": { + "cmt_id": "d90419b8b8322b6924f6da9da952647f2dadc21b", + "fixed_version": "4.9.328" }, - "6.4": { - "cmt_id": "2b9b8f3b68edb3d67d79962f02e26dbb5ae3808d", - "fixed_version": "6.4" - } - }, - "CVE-2023-3863": { "5.10": { - "cmt_id": "96f2c6f272ec04083d828de46285a7d7b17d1aad", - "fixed_version": "5.10.188" + "cmt_id": "abe3cfb7a7c8e907b312c7dbd7bf4d142b745aa8", + "fixed_version": "5.10.142" }, "5.15": { - "cmt_id": "fc8429f8d86801f092fbfbd257c3af821ac0dcd3", - "fixed_version": "5.15.121" - }, - "5.4": { - "cmt_id": "dd6ff3f3862709ab1a12566e73b9d6a9b8f6e548", - "fixed_version": "5.4.251" - }, - "6.1": { - "cmt_id": "425d9d3a92df7d96b3cfb7ee5c240293a21cbde3", - "fixed_version": "6.1.39" + "cmt_id": "c548b99e1c37db6f7df86ecfe9a1f895d6c5966e", + "fixed_version": "5.15.66" }, - "6.3": { - "cmt_id": "b3ad46e155a6d91b36c6e892019a43e3ef3c696d", - "fixed_version": "6.3.13" + "5.19": { + "cmt_id": "d5eb850b3e8836197a38475840725260b9783e94", + "fixed_version": "5.19.8" }, - "6.4": { - "cmt_id": "e5207c1d69b1a9707615ab6ff9376e59fc096815", - "fixed_version": "6.4.4" + "5.4": { + "cmt_id": "df1875084898b15cbc42f712e93d7f113ae6271b", + "fixed_version": "5.4.213" } }, - "CVE-2023-3865": { - "5.15": { - "cmt_id": "3813eee5154d6a4c5875cb4444cb2b63bac8947f", - "fixed_version": "5.15.121" + "CVE-2022-4744": { + "4.19": { + "cmt_id": "8eb43d635950e27c29f1e9e49a23b31637f37757", + "fixed_version": "4.19.280" }, - "6.1": { - "cmt_id": "c86211159bc3178b891e0d60e586a32c7b6a231b", - "fixed_version": "6.1.36" + "5.10": { + "cmt_id": "a01a4e9f5dc93335c716fa4023b1901956e8c904", + "fixed_version": "5.10.136" }, - "6.3": { - "cmt_id": "58a9c41064df27632e780c5a3ae3e0e4284957d1", - "fixed_version": "6.3.10" + "5.15": { + "cmt_id": "3cb5ae77799e8ed6ec3fec0b6b4cd07f01650cc5", + "fixed_version": "5.15.12" }, - "6.4": { - "cmt_id": "5fe7f7b78290638806211046a99f031ff26164e1", - "fixed_version": "6.4" + "5.4": { + "cmt_id": "0c0e566f0387490d16f166808c72e9c772027681", + "fixed_version": "5.4.240" } }, - "CVE-2023-3866": { - "5.15": { - "cmt_id": "eb947403518ea3d93f6d89264bb1f5416bb0c7d0", - "fixed_version": "5.15.121" - }, - "6.1": { - "cmt_id": "854156d12caa9d36de1cf5f084591c7686cc8a9d", - "fixed_version": "6.1.36" + "CVE-2022-47518": { + "5.10": { + "cmt_id": "3eb6b89a4e9f9e44c3170d70d8d16c3c8dc8c800", + "fixed_version": "5.10.157" }, - "6.3": { - "cmt_id": "d1066c1b3663401cd23c0d6e60cdae750ce00c0f", - "fixed_version": "6.3.10" + "5.15": { + "cmt_id": "7aed1dd5d221dabe3fe258f13ecf5fc7df393cbb", + "fixed_version": "5.15.81" }, - "6.4": { - "cmt_id": "5005bcb4219156f1bf7587b185080ec1da08518e", - "fixed_version": "6.4" + "6.0": { + "cmt_id": "6195b4838e10a557859862c4e7840dc0eafdd1cd", + "fixed_version": "6.0.11" } }, - "CVE-2023-3867": { - "5.15": { - "cmt_id": "97f5c1e3086c8ba1473c265d9a5523cc9ef5579e", - "fixed_version": "5.15.145" + "CVE-2022-47519": { + "5.10": { + "cmt_id": "905f886eae4b065656a575e8a02544045cbaadcf", + "fixed_version": "5.10.157" }, - "6.1": { - "cmt_id": "869ef4f2965bbb91157dad220133f76c16faba9b", - "fixed_version": "6.1.40" + "5.15": { + "cmt_id": "143232cb5a4c96d69a7d90b643568665463c6191", + "fixed_version": "5.15.81" }, - "6.4": { - "cmt_id": "ffaa0c85edd9245594a94918c09db9163b71767a", - "fixed_version": "6.4.5" + "6.0": { + "cmt_id": "c4b629c29a51344a99f279e0bc0caffd25897725", + "fixed_version": "6.0.11" } }, - "CVE-2023-39189": { - "4.19": { - "cmt_id": "40d427ffccf9e60bd7288ea3748c066404a35622", - "fixed_version": "4.19.295" - }, + "CVE-2022-47520": { "5.10": { - "cmt_id": "780f60dde29692c42091602fee9c25e9e391f3dc", - "fixed_version": "5.10.195" + "cmt_id": "7c6535fb4d67ea37c98a1d1d24ca33dd5ec42693", + "fixed_version": "5.10.157" }, "5.15": { - "cmt_id": "19280e8dfb52cf9660760fdc86e606e0653170fa", - "fixed_version": "5.15.132" - }, - "5.4": { - "cmt_id": "a44602888bbe89d9dd89cb84baed2e356aba7436", - "fixed_version": "5.4.257" - }, - "6.1": { - "cmt_id": "7bb8d52b4271be7527b6e3120ae6ce4c6cdf6e34", - "fixed_version": "6.1.54" + "cmt_id": "cd9c4869710bb6e38cfae4478c23e64e91438442", + "fixed_version": "5.15.81" }, - "6.5": { - "cmt_id": "a3d0f898b80ac9b049e590b3ee6391716002da17", - "fixed_version": "6.5.4" - } - }, - "CVE-2023-39191": { - "6.2": { - "cmt_id": "720d2504791a93becde81c335abcea2f42d066a7", - "fixed_version": "6.2.3" + "6.0": { + "cmt_id": "b3ac275fe82fb2e52085dace26ab65c91b3434b8", + "fixed_version": "6.0.11" } }, - "CVE-2023-39192": { - "4.14": { - "cmt_id": "e416d65ff456066d60d813c540ab2dd2a06d3d12", - "fixed_version": "4.14.326" - }, - "4.19": { - "cmt_id": "ddf190be80ef0677629416a128f9da91e5800d21", - "fixed_version": "4.19.295" - }, + "CVE-2022-47521": { "5.10": { - "cmt_id": "a1b711c370f5269f4e81a07e7542e351c0c4682e", - "fixed_version": "5.10.195" + "cmt_id": "5a068535c0073c8402aa0755e8ef259fb98a33c5", + "fixed_version": "5.10.157" }, "5.15": { - "cmt_id": "b3d07714ad24e51ff6fc6dced3bd3d960e99ac25", - "fixed_version": "5.15.132" - }, - "5.4": { - "cmt_id": "28ce8495b5599abaa4b4f0bbb45f1f8e89b07e15", - "fixed_version": "5.4.257" - }, - "6.1": { - "cmt_id": "1c164c1e9e93b0a72a03a7edb754e3857d4e4302", - "fixed_version": "6.1.53" - }, - "6.4": { - "cmt_id": "83b995321eaaa0176041d9d79c7d0415cb6ed7e1", - "fixed_version": "6.4.16" + "cmt_id": "e9de501cf70d2b508b2793ed3e7d5d5ceabd7a74", + "fixed_version": "5.15.81" }, - "6.5": { - "cmt_id": "799cc0fb184408f688b030ea381844b16d1d9c62", - "fixed_version": "6.5.3" + "6.0": { + "cmt_id": "0269a353bb4bf49902c702e0b55dcab0d470f5aa", + "fixed_version": "6.0.11" } }, - "CVE-2023-39193": { + "CVE-2022-47929": { "4.14": { - "cmt_id": "be52e3c14651ade0f4539f319f9f0c40a230b076", - "fixed_version": "4.14.326" + "cmt_id": "4574e32cbf652d7efcaa6076558752f770b01757", + "fixed_version": "4.14.303" }, "4.19": { - "cmt_id": "f25dbfadaf525d854597c16420dd753ca47b9396", - "fixed_version": "4.19.295" + "cmt_id": "0195d5ad539382a83e1bfaab51b93b8685f0b7c7", + "fixed_version": "4.19.270" }, "5.10": { - "cmt_id": "5541827d13cf19b905594eaee586527476efaa61", - "fixed_version": "5.10.195" + "cmt_id": "9f7bc28a6b8afc2274e25650511555e93f45470f", + "fixed_version": "5.10.163" }, "5.15": { - "cmt_id": "267a29f8bfdb949ad2a03a3b6d7ad42aeb4c2bab", - "fixed_version": "5.15.132" + "cmt_id": "04941c1d5bb59d64165e09813de2947bdf6f4f28", + "fixed_version": "5.15.88" }, "5.4": { - "cmt_id": "64831fb6a2040c25473ff8c8e85b3a42bd38494c", - "fixed_version": "5.4.257" + "cmt_id": "9b83ec63d0de7b1f379daa1571e128bc7b9570f8", + "fixed_version": "5.4.229" }, "6.1": { - "cmt_id": "4921f9349b66da7c5a2b6418fe45e9ae0ae72924", - "fixed_version": "6.1.53" - }, - "6.4": { - "cmt_id": "b63b4e114593073a1c25087526782258c9dd5347", - "fixed_version": "6.4.16" - }, - "6.5": { - "cmt_id": "85ebbbe845823be6f8c04b4901da9a0a6f866283", - "fixed_version": "6.5.3" + "cmt_id": "e8988e878af693ac13b0fa80ba2e72d22d68f2dd", + "fixed_version": "6.1.6" } }, - "CVE-2023-39194": { - "4.14": { - "cmt_id": "0a42d1335985f9ebfbc997944ba8b1d84b9b661e", - "fixed_version": "4.14.324" - }, - "4.19": { - "cmt_id": "a695f0e724330773283a6d67e149363b89087f76", - "fixed_version": "4.19.293" + "CVE-2022-47938": { + "5.15": { + "cmt_id": "577619605556a90e64abc759ca3ad9d86bf51176", + "fixed_version": "5.15.61" }, - "5.10": { - "cmt_id": "7e50815d29037e08d3d26f3ebc41bcec729847b7", - "fixed_version": "5.10.192" + "5.18": { + "cmt_id": "9d4d2efe03c84195b06955eae3cb98a72592f7f2", + "fixed_version": "5.18.18" }, + "5.19": { + "cmt_id": "9ec5086d14c587dce3b81fe984d7009584cd9170", + "fixed_version": "5.19.2" + } + }, + "CVE-2022-47939": { "5.15": { - "cmt_id": "1960f468078b3471d1ee9aafa0cf06c8c34a505f", - "fixed_version": "5.15.128" - }, - "5.4": { - "cmt_id": "373848d51fde9138cdc539b1d97dc6b301cc04d5", - "fixed_version": "5.4.255" + "cmt_id": "a54c509c32adba9d136f2b9d6a075e8cae1b6d27", + "fixed_version": "5.15.61" }, - "6.1": { - "cmt_id": "9a0056276f5f38e188732bd7b6949edca6a80ea1", - "fixed_version": "6.1.47" + "5.18": { + "cmt_id": "3db2001d3a39dc737c2f7e6e5c03467c41ca85bd", + "fixed_version": "5.18.18" }, - "6.4": { - "cmt_id": "5713c7ca31f563a493281c25cbdbd3f4ef53a9e9", - "fixed_version": "6.4.12" + "5.19": { + "cmt_id": "02ed2a9b7874e1fd08bbeccfe998df373a978b6f", + "fixed_version": "5.19.2" } }, - "CVE-2023-39197": { - "5.10": { - "cmt_id": "9bdcda7abaf22f6453e5b5efb7eb4e524095d5d8", - "fixed_version": "5.10.188" - }, + "CVE-2022-47940": { "5.15": { - "cmt_id": "c052797ac36813419ad3bfa54cb8615db4b41f15", - "fixed_version": "5.15.121" - }, - "5.4": { - "cmt_id": "337fdce450637ea663bc816edc2ba81e5cdad02e", - "fixed_version": "5.4.251" + "cmt_id": "6bb4399303383c2c06bce33f2335c39fbf35d979", + "fixed_version": "5.15.145" }, - "6.1": { - "cmt_id": "5c618daa5038712c4a4ef8923905a2ea1b8836a1", - "fixed_version": "6.1.39" + "5.18": { + "cmt_id": "61eb8b5368006fe0be0f6b1e2dff3ab284db256f", + "fixed_version": "5.18.18" + } + }, + "CVE-2022-47941": { + "5.15": { + "cmt_id": "dd4e4c811898410e6a3ae3b63207b7c542860907", + "fixed_version": "5.15.61" }, - "6.3": { - "cmt_id": "26bd1f210d3783a691052c51d76bb8a8bbd24c67", - "fixed_version": "6.3.13" + "5.18": { + "cmt_id": "8a8315a5960bd2b5ffc75f44fc089e57c3b17c44", + "fixed_version": "5.18.18" }, - "6.4": { - "cmt_id": "8c0980493beed3a80d6329c44ab293dc8c032927", - "fixed_version": "6.4.4" + "5.19": { + "cmt_id": "ff20f1875889dbe4a67c9298e609d7c88cf6456d", + "fixed_version": "5.19.2" } }, - "CVE-2023-39198": { - "5.10": { - "cmt_id": "03585b18b715621a64ced023ca8c1fc36b6b2119", - "fixed_version": "5.10.208" - }, + "CVE-2022-47942": { "5.15": { - "cmt_id": "d578c919deb786b4d6ba8c7639255cb658731671", - "fixed_version": "5.15.128" + "cmt_id": "cb69d4d6f709f87c94afa28ae64c501576692171", + "fixed_version": "5.15.62" }, - "6.1": { - "cmt_id": "a1fa8f0fc58e0ec972f718030710efc442d7304b", - "fixed_version": "6.1.47" + "5.18": { + "cmt_id": "6e8f4abf584253cbaa596ea4ad13110cf61cd4c9", + "fixed_version": "5.18.18" }, - "6.4": { - "cmt_id": "a79aebe5bb68266ce9c7f8714fad166a3216460d", - "fixed_version": "6.4.12" + "5.19": { + "cmt_id": "8e33102309bd6839b2e2e158f93a7b378cb4655d", + "fixed_version": "5.19.2" } }, - "CVE-2023-4004": { - "5.10": { - "cmt_id": "3a91099ecd59a42d1632fcb152bf7222f268ea2b", - "fixed_version": "5.10.188" - }, + "CVE-2022-47943": { "5.15": { - "cmt_id": "706ce3c81b5c8e262a8bcf116ea689d0710c3a13", - "fixed_version": "5.15.123" + "cmt_id": "c76b216753c9eb2950a091037c9976f389e73529", + "fixed_version": "5.15.62" }, - "6.1": { - "cmt_id": "90c3955beb858bb52a9e5c4380ed0e520e3730d1", - "fixed_version": "6.1.42" + "5.18": { + "cmt_id": "d3015b3bf4a3a0c5e04edcf8bb941146ce9206fd", + "fixed_version": "5.18.18" }, - "6.4": { - "cmt_id": "48dbb5d24c667bf26bc2fea8caa7fe51fcc6aa62", - "fixed_version": "6.4.7" + "5.19": { + "cmt_id": "0f1c9908c8e18a98b3d6a80bf391bef8001d7fb7", + "fixed_version": "5.19.2" } }, - "CVE-2023-4015": { - "5.10": { - "cmt_id": "ab5a97a94b57324df76d659686ac2d30494170e6", - "fixed_version": "5.10.190" - }, + "CVE-2022-4842": { "5.15": { - "cmt_id": "98bcfcaecc76c4be288278c213b47d36292f40fa", - "fixed_version": "5.15.124" + "cmt_id": "9cca110cf8bb0653b423dba7a7c4cc23ccf91b28", + "fixed_version": "5.15.90" }, "6.1": { - "cmt_id": "4237462a073e24f71c700f3e5929f07b6ee1bcaa", - "fixed_version": "6.1.43" - }, - "6.4": { - "cmt_id": "027d00132487bcf2a4ee7493bb8de9d6331d48e3", - "fixed_version": "6.4.8" + "cmt_id": "ff3b1a624380c14b81f4e51c48e404a45f047aab", + "fixed_version": "6.1.8" } }, - "CVE-2023-40283": { - "4.14": { - "cmt_id": "51822644a047eac2310fab0799b64e3430b5a111", - "fixed_version": "4.14.322" - }, - "4.19": { - "cmt_id": "82cdb2ccbe43337798393369f0ceb98699fe6037", - "fixed_version": "4.19.291" + "CVE-2022-48423": { + "5.15": { + "cmt_id": "3a52f17867727818ae8dbcfd9425033df32f92e0", + "fixed_version": "5.15.87" }, - "5.10": { - "cmt_id": "06f87c96216bc5cd1094c23492274f77f1d5dd3b", - "fixed_version": "5.10.190" + "6.0": { + "cmt_id": "6f6fc680b28a20b51156645c9f32908ec94eb8c9", + "fixed_version": "6.0.17" }, + "6.1": { + "cmt_id": "2f041a19f4eb72bcc851f9e3a15f3cfd1ae1addf", + "fixed_version": "6.1.3" + } + }, + "CVE-2022-48424": { "5.15": { - "cmt_id": "fbe5a2fed8156cc19eb3b956602b0a1dd46a302d", - "fixed_version": "5.15.126" + "cmt_id": "c878a915bcb992c12a97ebae1013e377158f560a", + "fixed_version": "5.15.87" }, - "5.4": { - "cmt_id": "a2da00d1ea1abfb04f846638e210b5b5166e3c9c", - "fixed_version": "5.4.253" + "6.0": { + "cmt_id": "16e8b2159002e45ed0725eea33860ef154818244", + "fixed_version": "6.0.17" }, "6.1": { - "cmt_id": "29fac18499332211b2615ade356e2bd8b3269f98", - "fixed_version": "6.1.45" + "cmt_id": "b343c40bb7ff9095430c3f31468a59f8a760dabd", + "fixed_version": "6.1.3" + } + }, + "CVE-2022-48425": { + "5.15": { + "cmt_id": "2a67f26f70ab344ae6ea78638890eebc1191a501", + "fixed_version": "5.15.113" }, - "6.4": { - "cmt_id": "10426afe65c8bf7b24dd0c7be4dcc65f86fc99f9", - "fixed_version": "6.4.10" + "6.1": { + "cmt_id": "a8eaa9a06addbd9cb0238cb1c729921ecbb6504c", + "fixed_version": "6.1.33" + }, + "6.3": { + "cmt_id": "e6f4b1c32d6d6047958d7700d12fed6d91f441e7", + "fixed_version": "6.3.4" } }, - "CVE-2023-40791": { - "6.4": { - "cmt_id": "0ba71114c3af9fa44a474d16a12cecd12e3779b9", - "fixed_version": "6.4.12" + "CVE-2022-48502": { + "5.15": { + "cmt_id": "333feb7ba84f69f9b423422417aaac54fd9e7c84", + "fixed_version": "5.15.121" + }, + "6.1": { + "cmt_id": "000a9a72efa4a9df289bab9c9e8ba1639c72e0d6", + "fixed_version": "6.1.40" } }, - "CVE-2023-4128": { + "CVE-2022-48619": { "4.14": { - "cmt_id": "f0f874147a5b00eae875c24281531f8de7900079", - "fixed_version": "4.14.322" + "cmt_id": "9cc62ef5ba044b315c8761942db184a2ef8ff005", + "fixed_version": "4.14.281" }, "4.19": { - "cmt_id": "4aae24015ecd70d824a953e2dc5b0ca2c4769243", - "fixed_version": "4.19.291" + "cmt_id": "01d41d7e7fc7eef99ae5b1065d9186f91ff099e7", + "fixed_version": "4.19.245" + }, + "4.9": { + "cmt_id": "3e6fa9e4a7a89d67e01424317f7a2e9551025022", + "fixed_version": "4.9.316" }, "5.10": { - "cmt_id": "b4256c99a7116c9514224847e8aaee2ecf110a0a", - "fixed_version": "5.10.190" + "cmt_id": "d5e88c2d76efa9d7bb7ceffaec60fe6c76c748d7", + "fixed_version": "5.10.118" }, "5.15": { - "cmt_id": "262430dfc618509246e07acd26211cb4cca79ecc", - "fixed_version": "5.15.126" - }, - "5.4": { - "cmt_id": "be785808db32b595728c4042d002c83d0dd4b66f", - "fixed_version": "5.4.253" + "cmt_id": "0211383109832103cfddfd5c5cc99b29d40bb749", + "fixed_version": "5.15.42" }, - "6.1": { - "cmt_id": "aab2d095ce4dd8d01ca484c0cc641fb497bf74db", - "fixed_version": "6.1.45" + "5.17": { + "cmt_id": "93cf9a32d6c21325761503dcaae3c58ae55cc018", + "fixed_version": "5.17.10" }, - "6.4": { - "cmt_id": "4b717802428fa02cbcbb61209f638f65f9cd4710", - "fixed_version": "6.4.10" + "5.4": { + "cmt_id": "bb83a744bc671804016e23861a892e9db2aee73f", + "fixed_version": "5.4.196" } }, - "CVE-2023-4132": { + "CVE-2022-48626": { "4.14": { - "cmt_id": "45224862e49e1fde86cbd26c7612f029b4e2e662", - "fixed_version": "4.14.322" + "cmt_id": "e6f580d0b3349646d4ee1ce0057eb273e8fb7e2e", + "fixed_version": "4.14.266" }, "4.19": { - "cmt_id": "54073c46cbbd2c0c03d6f7d481540cb95cf181a1", - "fixed_version": "4.19.291" + "cmt_id": "9c25d5ff1856b91bd4365e813f566cb59aaa9552", + "fixed_version": "4.19.229" + }, + "4.9": { + "cmt_id": "f5dc193167591e88797262ec78515a0cbe79ff5f", + "fixed_version": "4.9.301" }, "5.10": { - "cmt_id": "d87ef4e857b790f1616809eccda6b4d0c9c3da11", - "fixed_version": "5.10.188" + "cmt_id": "be93028d306dac9f5b59ebebd9ec7abcfc69c156", + "fixed_version": "5.10.100" }, "5.15": { - "cmt_id": "784a8027b8ac5a876d71cb3d3d4d97b2b6cb5920", - "fixed_version": "5.15.121" - }, - "5.4": { - "cmt_id": "d485150c9a52167a6175f542397a098b4cd89dc9", - "fixed_version": "5.4.251" + "cmt_id": "af0e6c49438b1596e4be8a267d218a0c88a42323", + "fixed_version": "5.15.23" }, - "6.1": { - "cmt_id": "8abb53c5167cfb5bb275512a3da4ec2468478626", - "fixed_version": "6.1.39" + "5.16": { + "cmt_id": "7f901d53f120d1921f84f7b9b118e87e94b403c5", + "fixed_version": "5.16.9" }, - "6.4": { - "cmt_id": "ae65238d3f5a2df48341a7112820e04fb1017422", - "fixed_version": "6.4.4" + "5.4": { + "cmt_id": "3a0a7ec5574b510b067cfc734b8bdb6564b31d4e", + "fixed_version": "5.4.179" } }, - "CVE-2023-4133": { - "6.2": { - "cmt_id": "7977bb80817b552d97bcc8a1ddf2b3029ca5b6a8", - "fixed_version": "6.2.13" + "CVE-2022-48627": { + "5.10": { + "cmt_id": "bfee93c9a6c395f9aa62268f1cedf64999844926", + "fixed_version": "5.10.132" }, - "6.3": { - "cmt_id": "e50b9b9e8610d47b7c22529443e45a16b1ea3a15", - "fixed_version": "6.3" + "5.15": { + "cmt_id": "57964a5710252bc82fe22d9fa98c180c58c20244", + "fixed_version": "5.15.56" + }, + "5.18": { + "cmt_id": "14d2cc21ca622310babf373e3a8f0b40acfe8265", + "fixed_version": "5.18.13" } }, - "CVE-2023-4134": { - "6.3": { - "cmt_id": "c261139c1df65c9c4bf00e96c91183bcfc1919ec", - "fixed_version": "6.3.13" + "CVE-2022-48628": { + "6.1": { + "cmt_id": "89744b64914426cbabceb3d8a149176b5dafdfb5", + "fixed_version": "6.1.56" }, - "6.4": { - "cmt_id": "28dc11949357f10712bd641b724ab373a92318de", - "fixed_version": "6.4.4" + "6.5": { + "cmt_id": "47f82395f04a976d4fa97de7f2acffa1c1096571", + "fixed_version": "6.5.6" } }, - "CVE-2023-4147": { + "CVE-2022-48629": { + "4.19": { + "cmt_id": "a8e32bbb96c25b7ab29b1894dcd45e0b3b08fd9d", + "fixed_version": "4.19.236" + }, "5.10": { - "cmt_id": "308a43f1521d5b7220693d0865b23e8dad3ed137", - "fixed_version": "5.10.190" + "cmt_id": "0f9b7b8df17525e464294c916acc8194ce38446b", + "fixed_version": "5.10.108" }, "5.15": { - "cmt_id": "5bee91121ccea8d69cea51632e9a1dd348ee49a1", - "fixed_version": "5.15.124" + "cmt_id": "ab9337c7cb6f875b6286440b1adfbeeef2b2b2bd", + "fixed_version": "5.15.31" + }, + "5.16": { + "cmt_id": "485995cbc98a4f77cfd4f8ed4dd7ff8ab262964d", + "fixed_version": "5.16.17" + }, + "5.17": { + "cmt_id": "a680b1832ced3b5fa7c93484248fd221ea0d614b", + "fixed_version": "5.17" + }, + "5.4": { + "cmt_id": "184f7bd08ce56f003530fc19f160d54e75bf5c9d", + "fixed_version": "5.4.187" + } + }, + "CVE-2022-48630": { + "5.17": { + "cmt_id": "05d4d17475d8d094c519bb51658bc47899c175e3", + "fixed_version": "5.17.10" + }, + "5.18": { + "cmt_id": "16287397ec5c08aa58db6acf7dbc55470d78087d", + "fixed_version": "5.18" + } + }, + "CVE-2023-0045": { + "5.10": { + "cmt_id": "67e39c4f4cb318cfbbf8982ab016c649ed97edaf", + "fixed_version": "5.10.163" + }, + "5.15": { + "cmt_id": "cb42aa7b5f726e3fddc8656b8f5c723537d654f1", + "fixed_version": "5.15.87" + }, + "5.4": { + "cmt_id": "8cbd7f26438738238c245a9c0aaf7ebf43283fba", + "fixed_version": "5.4.229" + }, + "6.0": { + "cmt_id": "09f4f4bf0472eaf6781966573ccd2c0eeacee60f", + "fixed_version": "6.0.19" }, "6.1": { - "cmt_id": "268cb07ef3ee17b5454a7c4b23376802c5b00c79", - "fixed_version": "6.1.43" + "cmt_id": "e8377f0456fb6738a4668d4df16c13d7599925fd", + "fixed_version": "6.1.5" + } + }, + "CVE-2023-0047": { + "4.14": { + "cmt_id": "bed55513692e0dc720f02ad7da3e528c55e0b663", + "fixed_version": "4.14.256" }, - "6.4": { - "cmt_id": "14448359681062bf51d9c67e0264869548b79853", - "fixed_version": "6.4.8" + "4.19": { + "cmt_id": "d508b70eaa8d6d994c289b757c0ca0355d4dbe29", + "fixed_version": "4.19.218" + }, + "4.9": { + "cmt_id": "973b61a5f3ba6690624d109a68cca35d0348b91f", + "fixed_version": "4.9.291" + }, + "5.10": { + "cmt_id": "1d457987366f7a92d03e03df80f9a63040133233", + "fixed_version": "5.10.80" + }, + "5.14": { + "cmt_id": "8d55a5f822107de618eb506f36a48a96709e4a68", + "fixed_version": "5.14.19" + }, + "5.15": { + "cmt_id": "c15aeead2488b3b28db6863f9f2ba2338e3c9838", + "fixed_version": "5.15.3" + }, + "5.4": { + "cmt_id": "66938ba1285778634276a4b4028de367d7f1e8c2", + "fixed_version": "5.4.160" } }, - "CVE-2023-4155": { + "CVE-2023-0160": { + "5.10": { + "cmt_id": "2f9307222227410453e33654f5d9ed6459351455", + "fixed_version": "5.10.180" + }, + "5.15": { + "cmt_id": "f333854dce4a079783f00c201869b9ee8f7ff3c3", + "fixed_version": "5.15.111" + }, + "5.4": { + "cmt_id": "c229821510dfe35e89899b00ec34f9f5876fbbd2", + "fixed_version": "5.4.243" + }, "6.1": { - "cmt_id": "5bdf1c1f346c81996b6e36b5efd5c92aeda4fbe4", - "fixed_version": "6.1.46" + "cmt_id": "1d4ac7b0ffc9dc683b8dafc78b8b93177071a02c", + "fixed_version": "6.1.28" }, - "6.4": { - "cmt_id": "ab8e9a874574ce511eca21caa5d7ef5426963a54", - "fixed_version": "6.4.11" + "6.2": { + "cmt_id": "d0e34aaea13391e28069c50de5519300d408e985", + "fixed_version": "6.2.15" + }, + "6.3": { + "cmt_id": "d2b8cf384c39ddb6fdb9e9034cd9b9887e09e735", + "fixed_version": "6.3.2" } }, - "CVE-2023-4194": { - "6.4": { - "cmt_id": "36161e7d40e7293d7f213e16d881042d15c8a53a", - "fixed_version": "6.4.10" + "CVE-2023-0179": { + "5.10": { + "cmt_id": "550efeff989b041f3746118c0ddd863c39ddc1aa", + "fixed_version": "5.10.164" + }, + "5.15": { + "cmt_id": "a8acfe2c6fb99f9375a9325807a179cd8c32e6e3", + "fixed_version": "5.15.89" + }, + "6.1": { + "cmt_id": "76ef74d4a379faa451003621a84e3498044e7aa3", + "fixed_version": "6.1.7" } }, - "CVE-2023-4206": { + "CVE-2023-0210": { + "5.15": { + "cmt_id": "e32f867b37da7902685c9a106bef819506aa1a92", + "fixed_version": "5.15.87" + }, + "6.0": { + "cmt_id": "1e7ed525c60d8d51daf2700777071cd0dfb6f807", + "fixed_version": "6.0.19" + }, + "6.1": { + "cmt_id": "5e7d97dbae25ab4cb0ac1b1b98aebc4915689a86", + "fixed_version": "6.1.5" + } + }, + "CVE-2023-0266": { "4.14": { - "cmt_id": "226d84d54a9339b7045aff36c8f56d6ee9270476", - "fixed_version": "4.14.322" + "cmt_id": "c75e7766cef4e492ec156942d2c4d48c25574e5c", + "fixed_version": "4.14.303" }, "4.19": { - "cmt_id": "ad8f36f96696a7f1d191da66637c415959bab6d8", - "fixed_version": "4.19.291" + "cmt_id": "5b2ea7e91352165054c5b3f8e5442cd31c3e73f9", + "fixed_version": "4.19.270" }, "5.10": { - "cmt_id": "aaa71c4e8ad98828ed50dde3eec8e0d545a117f7", - "fixed_version": "5.10.190" + "cmt_id": "df02234e6b87d2a9a82acd3198e44bdeff8488c6", + "fixed_version": "5.10.163" + }, + "5.15": { + "cmt_id": "26350c21bc5e97a805af878e092eb8125843fe2c", + "fixed_version": "5.15.88" + }, + "5.4": { + "cmt_id": "eaa5580a74cc8355260caeb526cf49d34e7304a8", + "fixed_version": "5.4.229" + }, + "6.1": { + "cmt_id": "d6ad4bd1d896ae1daffd7628cd50f124280fb8b1", + "fixed_version": "6.1.6" + } + }, + "CVE-2023-0386": { + "5.15": { + "cmt_id": "e91308e63710574c4b6a0cadda3e042a3699666e", + "fixed_version": "5.15.91" + }, + "6.1": { + "cmt_id": "42fea1c35254c49cce07c600d026cbc00c6d3c81", + "fixed_version": "6.1.9" + } + }, + "CVE-2023-0394": { + "4.14": { + "cmt_id": "35ed8ba485544a31a4ab9b92a1c68e406ab66a47", + "fixed_version": "4.14.303" + }, + "4.19": { + "cmt_id": "f487d636e49bc1fdfbd8105bc1ab159164e2d8bd", + "fixed_version": "4.19.270" + }, + "5.10": { + "cmt_id": "6c9e2c11c33c35563d34d12b343d43b5c12200b5", + "fixed_version": "5.10.164" + }, + "5.15": { + "cmt_id": "456e3794e08a0b59b259da666e31d0884b376bcf", + "fixed_version": "5.15.89" + }, + "5.4": { + "cmt_id": "3998dba0f78a59922b0ef333ccfeb58d9410cd3d", + "fixed_version": "5.4.229" + }, + "6.1": { + "cmt_id": "0afa5f0736584411771299074bbeca8c1f9706d4", + "fixed_version": "6.1.7" + } + }, + "CVE-2023-0458": { + "4.14": { + "cmt_id": "291a0395bb298d0ef0bba21d2186f632e4b30053", + "fixed_version": "4.14.304" + }, + "4.19": { + "cmt_id": "d3ee91e50a6b3c5a45398e3dcb912a8a264f575c", + "fixed_version": "4.19.271" + }, + "5.10": { + "cmt_id": "9f8e45720e0e7edb661d0082422f662ed243d8d8", + "fixed_version": "5.10.165" + }, + "5.15": { + "cmt_id": "f01aefe374d32c4bb1e5fd1e9f931cf77fca621a", + "fixed_version": "5.15.90" + }, + "5.4": { + "cmt_id": "96b02125dd68d77e28a29488e6f370a5eac7fb1c", + "fixed_version": "5.4.230" + }, + "6.1": { + "cmt_id": "91185568c99d60534bacf38439846103962d1e2c", + "fixed_version": "6.1.8" + } + }, + "CVE-2023-0459": { + "4.14": { + "cmt_id": "e0fbff18bbcee4f07d46bee172803fad63f6f4dd", + "fixed_version": "4.14.307" + }, + "4.19": { + "cmt_id": "f8e54da1c729cc23d9a7b7bd42379323e7fb7979", + "fixed_version": "4.19.274" + }, + "5.10": { + "cmt_id": "3b6ce54cfa2c04f0636fd0c985913af8703b408d", + "fixed_version": "5.10.170" + }, + "5.15": { + "cmt_id": "41d8b591d70a7517293b23958a18452baf22588f", + "fixed_version": "5.15.96" + }, + "5.4": { + "cmt_id": "6c750ed0367f6bf1b09c0c353a701781ee05dd22", + "fixed_version": "5.4.233" + }, + "6.1": { + "cmt_id": "684db631a15779c8f3b2235d507efdfe6bb10278", + "fixed_version": "6.1.14" + }, + "6.2": { + "cmt_id": "2c8ee21d78942cf48bc836612ad365fd6f06cfbb", + "fixed_version": "6.2.1" + } + }, + "CVE-2023-0461": { + "4.14": { + "cmt_id": "b689125d04949841337dfa730d48dd91ada9ce3a", + "fixed_version": "4.14.303" + }, + "4.19": { + "cmt_id": "755193f2523ce5157c2f844a4b6d16b95593f830", + "fixed_version": "4.19.270" + }, + "5.10": { + "cmt_id": "f8ed0a93b5d576bbaf01639ad816473bdfd1dcb0", + "fixed_version": "5.10.163" + }, + "5.15": { + "cmt_id": "dadd0dcaa67d27f550131de95c8e182643d2c9d6", + "fixed_version": "5.15.88" + }, + "5.4": { + "cmt_id": "c6d29a5ffdbc362314853462a0e24e63330a654d", + "fixed_version": "5.4.229" + }, + "6.0": { + "cmt_id": "c1b5dee463cc1e89cfa655d6beff81ec1c0c4258", + "fixed_version": "6.0.19" + }, + "6.1": { + "cmt_id": "7d242f4a0c8319821548c7176c09a6e0e71f223c", + "fixed_version": "6.1.5" + } + }, + "CVE-2023-0468": { + "6.0": { + "cmt_id": "bc4e6ee16778149811333a969a7a893d4cc110c5", + "fixed_version": "6.0.11" + } + }, + "CVE-2023-0469": { + "6.0": { + "cmt_id": "77a467a3e20978607c56aa4886f46f78ca287054", + "fixed_version": "6.0.11" + } + }, + "CVE-2023-0590": { + "4.14": { + "cmt_id": "42c50c7efcd1d263455438b81fe9388e685bfb66", + "fixed_version": "4.14.331" + }, + "4.19": { + "cmt_id": "f782929b90b5ac88d4445c853949d9efa6db6bae", + "fixed_version": "4.19.300" + }, + "5.10": { + "cmt_id": "7aa3d623c11b9ab60f86b7833666e5d55bac4be9", + "fixed_version": "5.10.152" + }, + "5.15": { + "cmt_id": "ce1234573d183db1ebcab524668ca2d85543bf80", + "fixed_version": "5.15.76" + }, + "5.4": { + "cmt_id": "0f5c0e0a4c0b081e5f959578a8e56c7921e63a2d", + "fixed_version": "5.4.240" + }, + "6.0": { + "cmt_id": "caee0b9d74119911423111a10c4e9f4e5c8e6d41", + "fixed_version": "6.0.6" + } + }, + "CVE-2023-0615": { + "4.14": { + "cmt_id": "b0e20af206273e90d47647e7c806ddcc0a401f65", + "fixed_version": "4.14.298" + }, + "4.19": { + "cmt_id": "29385e601f3420cfe46550271714b6685719eb33", + "fixed_version": "4.19.264" + }, + "4.9": { + "cmt_id": "e1b5b061987d56d7b64da962fec3be4ae7e78300", + "fixed_version": "4.9.332" + }, + "5.10": { + "cmt_id": "147b8f1892aaa474f912ac75babfd316ee0de672", + "fixed_version": "5.10.153" + }, + "5.15": { + "cmt_id": "0f83edbe4fe95d9c68b32aebe07fe413bcf92afe", + "fixed_version": "5.15.77" + }, + "5.4": { + "cmt_id": "d8f479c777b413ba42c63e1a5ce6eee3d25b6714", + "fixed_version": "5.4.223" + }, + "6.0": { + "cmt_id": "74e2e978d1e36c3b67e998e779c02cbc8f481527", + "fixed_version": "6.0.7" + } + }, + "CVE-2023-1032": { + "6.1": { + "cmt_id": "7c7570791b15c3b78e3229ae97825e7eb869c7da", + "fixed_version": "6.1.16" + }, + "6.2": { + "cmt_id": "cb6aedc1fd9d808d7319db2f953f4886dd46c627", + "fixed_version": "6.2.3" + } + }, + "CVE-2023-1073": { + "4.14": { + "cmt_id": "614dd3d1725d329bf10a7ae974ebdfe101150791", + "fixed_version": "4.14.305" + }, + "4.19": { + "cmt_id": "f958da03d9a71808548b2e5418d95482b106eb9a", + "fixed_version": "4.19.272" + }, + "5.10": { + "cmt_id": "5dc3469a1170dd1344d262a332b26994214eeb58", + "fixed_version": "5.10.166" + }, + "5.15": { + "cmt_id": "2b49568254365c9c247beb0eabbaa15d0e279d64", + "fixed_version": "5.15.91" + }, + "5.4": { + "cmt_id": "89e7fe3999e057c91f157b6ba663264f4cdfcb55", + "fixed_version": "5.4.231" + }, + "6.1": { + "cmt_id": "cdcdc0531a51659527fea4b4d064af343452062d", + "fixed_version": "6.1.9" + } + }, + "CVE-2023-1074": { + "4.14": { + "cmt_id": "97ca098d8f1a8119b6675c823706cd6231ba6d9b", + "fixed_version": "4.14.305" + }, + "4.19": { + "cmt_id": "26436553aabfd9b40e1daa537a099bf5bb13fb55", + "fixed_version": "4.19.272" + }, + "5.10": { + "cmt_id": "6ef652f35dcfaa1ab2b2cf6c1694718595148eee", + "fixed_version": "5.10.166" + }, + "5.15": { + "cmt_id": "3391bd42351be0beb14f438c7556912b9f96cb32", + "fixed_version": "5.15.91" + }, + "5.4": { + "cmt_id": "a7585028ac0a5836f39139c11594d79ede97d975", + "fixed_version": "5.4.231" + }, + "6.1": { + "cmt_id": "9f08bb650078dca24a13fea1c375358ed6292df3", + "fixed_version": "6.1.9" + } + }, + "CVE-2023-1075": { + "6.1": { + "cmt_id": "37c0cdf7e4919e5f76381ac60817b67bcbdacb50", + "fixed_version": "6.1.11" + } + }, + "CVE-2023-1076": { + "5.10": { + "cmt_id": "9a31af61f397500ccae49d56d809b2217d1e2178", + "fixed_version": "5.10.173" + }, + "5.15": { + "cmt_id": "67f9f02928a34aad0a2c11dab5eea269f5ecf427", + "fixed_version": "5.15.99" + }, + "5.4": { + "cmt_id": "d92d87000eda9884d49f1acec1c1fccd63cd9b11", + "fixed_version": "5.4.235" + }, + "6.1": { + "cmt_id": "b4ada752eaf1341f47bfa3d8ada377eca75a8d44", + "fixed_version": "6.1.16" + }, + "6.2": { + "cmt_id": "4aa4b4b3b3e9551c4de2bf2987247c28805fb8f6", + "fixed_version": "6.2.3" + } + }, + "CVE-2023-1077": { + "4.19": { + "cmt_id": "84d90fb72a053c034b018fcc3cfaa6f606faf1c6", + "fixed_version": "4.19.293" + }, + "5.10": { + "cmt_id": "80a1751730b302d8ab63a084b2fa52c820ad0273", + "fixed_version": "5.10.173" + }, + "5.15": { + "cmt_id": "2c36c390a74981d03f04f01fe7ee9c3ac3ea11f7", + "fixed_version": "5.15.99" + }, + "5.4": { + "cmt_id": "084cd75643b61fb924f70cba98a71dea14942938", + "fixed_version": "5.4.235" + }, + "6.1": { + "cmt_id": "6b4fcc4e8a3016e85766c161daf0732fca16c3a3", + "fixed_version": "6.1.16" + }, + "6.2": { + "cmt_id": "1099004ae1664703ec573fc4c61ffb24144bcb63", + "fixed_version": "6.2.3" + } + }, + "CVE-2023-1078": { + "4.19": { + "cmt_id": "909d5eef5ce792bb76d7b5a9b7a6852b813d8cac", + "fixed_version": "4.19.273" + }, + "5.10": { + "cmt_id": "c53f34ec3fbf3e9f67574118a6bb35ae1146f7ca", + "fixed_version": "5.10.168" + }, + "5.15": { + "cmt_id": "528e3f3a4b53df36dafd10cdf6b8c0fe2aa1c4ba", + "fixed_version": "5.15.94" + }, + "5.4": { + "cmt_id": "ba38eacade35dd2316d77b37494e6e0c01bab595", + "fixed_version": "5.4.232" + }, + "6.1": { + "cmt_id": "1d52bbfd469af69fbcae88c67f160ce1b968e7f3", + "fixed_version": "6.1.12" + } + }, + "CVE-2023-1079": { + "4.14": { + "cmt_id": "df0fad94ca3787727b9cdd76797aaacf46fe93ed", + "fixed_version": "4.14.308" + }, + "4.19": { + "cmt_id": "74b78391a9b6f67de90b13f5a85e329e3b3f5a72", + "fixed_version": "4.19.276" + }, + "5.10": { + "cmt_id": "21a2eec4a440060a6eb294dc890eaf553101ba09", + "fixed_version": "5.10.173" + }, + "5.15": { + "cmt_id": "3959316f8ceb17866646abc6be4a332655407138", + "fixed_version": "5.15.99" + }, + "5.4": { + "cmt_id": "dd08e68d04d08d2f42b09162c939a0b0841216cc", + "fixed_version": "5.4.235" + }, + "6.1": { + "cmt_id": "ee907829b36949c452c6f89485cb2a58e97c048e", + "fixed_version": "6.1.16" + }, + "6.2": { + "cmt_id": "b08bcfb4c97d7bd41b362cff44b2c537ce9e8540", + "fixed_version": "6.2.3" + } + }, + "CVE-2023-1095": { + "4.14": { + "cmt_id": "49d57fb1fd44b9d3422f096d3b1b6415685d7364", + "fixed_version": "4.14.291" + }, + "4.19": { + "cmt_id": "d3f409c375490a86d342eae1d0f6271d12dc19d0", + "fixed_version": "4.19.256" + }, + "4.9": { + "cmt_id": "ef6b262e551da27579e7ac255928394176353115", + "fixed_version": "4.9.326" + }, + "5.10": { + "cmt_id": "80977126bc20309f7f7bae6d8621356b393e8b41", + "fixed_version": "5.10.137" + }, + "5.15": { + "cmt_id": "8a2df34b5bf652566f2889d9fa321f3b398547ef", + "fixed_version": "5.15.61" + }, + "5.18": { + "cmt_id": "c90b99a6b44f2a5f8498d91cfdcf3cf28ea7c130", + "fixed_version": "5.18.18" + }, + "5.19": { + "cmt_id": "109539c9ba8497aad2948af4f09077f6a65059fe", + "fixed_version": "5.19.2" + }, + "5.4": { + "cmt_id": "a452bc3deb23bf93f8a13d3e24611b7ef39645dc", + "fixed_version": "5.4.211" + } + }, + "CVE-2023-1118": { + "4.14": { + "cmt_id": "0987f836bc1a258cb8fb51669a5afb67bb01c31b", + "fixed_version": "4.14.308" + }, + "4.19": { + "cmt_id": "52bde2754d76fc97390f097fba763413607f157a", + "fixed_version": "4.19.276" + }, + "5.10": { + "cmt_id": "78da5a378bdacd5bf68c3a6389bdc1dd0c0f5b3c", + "fixed_version": "5.10.173" + }, + "5.15": { + "cmt_id": "29962c478e8b2e6a6154d8d84b8806dbe36f9c28", + "fixed_version": "5.15.99" + }, + "5.4": { + "cmt_id": "d120334278b370b6a1623a75ebe53b0c76cb247c", + "fixed_version": "5.4.235" + }, + "6.1": { + "cmt_id": "029c1410e345ce579db5c007276340d072aac54a", + "fixed_version": "6.1.16" + }, + "6.2": { + "cmt_id": "182ea492aae5b64067277e60a4ea5995c4628555", + "fixed_version": "6.2.3" + } + }, + "CVE-2023-1192": { + "5.15": { + "cmt_id": "2a67f26f70ab344ae6ea78638890eebc1191a501", + "fixed_version": "5.15.113" + }, + "6.1": { + "cmt_id": "a8eaa9a06addbd9cb0238cb1c729921ecbb6504c", + "fixed_version": "6.1.33" + }, + "6.3": { + "cmt_id": "e6f4b1c32d6d6047958d7700d12fed6d91f441e7", + "fixed_version": "6.3.4" + } + }, + "CVE-2023-1193": { + "5.15": { + "cmt_id": "9494242c8e76e6a98c8ab5f6aed0fa4bd56ac6d5", + "fixed_version": "5.15.145" + }, + "6.1": { + "cmt_id": "8d271ef5e5cac8a470076891b248a28a2c57fb1e", + "fixed_version": "6.1.71" + } + }, + "CVE-2023-1194": { + "5.15": { + "cmt_id": "55ceeb4e1c71793e852c20ad01ffd31515303546", + "fixed_version": "5.15.145" + }, + "6.1": { + "cmt_id": "8f2984233c87a1d08f4c45f077130590c7a2c991", + "fixed_version": "6.1.34" + }, + "6.3": { + "cmt_id": "61dfe01204daf5469f21cc639f710f9e28e929c8", + "fixed_version": "6.3.8" + } + }, + "CVE-2023-1206": { + "4.14": { + "cmt_id": "ebfedbfb36eecab2d4bfa6faeaad763cbfe3a0e8", + "fixed_version": "4.14.322" + }, + "4.19": { + "cmt_id": "8fa0dea2fc96f192d81a12434e48deda2e556320", + "fixed_version": "4.19.291" + }, + "5.10": { + "cmt_id": "0cd74fbd3b8327e60525e1ec4a6c28895693909f", + "fixed_version": "5.10.190" + }, + "5.15": { + "cmt_id": "ecb741a17cb2abf693b34d8e05a1e7e40494afb6", + "fixed_version": "5.15.124" + }, + "5.4": { + "cmt_id": "d87d67c8bdd13b2d4f7414ba97c54ba825337c47", + "fixed_version": "5.4.253" + }, + "6.1": { + "cmt_id": "51aea7e9d5212adb8a3d198510cfcde4125988f9", + "fixed_version": "6.1.43" + }, + "6.4": { + "cmt_id": "1e50c11ed44e28a57c6215a5e7643ae85c6297fa", + "fixed_version": "6.4.8" + } + }, + "CVE-2023-1249": { + "5.10": { + "cmt_id": "558564db44755dfb3e48b0d64de327d20981e950", + "fixed_version": "5.10.110" + }, + "5.15": { + "cmt_id": "39fd0cc079c98dafcf355997ada7b5e67f0bb10a", + "fixed_version": "5.15.33" + }, + "5.16": { + "cmt_id": "c8015981eaa5bd8901a145c8d1253592a5619d2b", + "fixed_version": "5.16.19" + }, + "5.17": { + "cmt_id": "5c6baf808f409b69ad0799a551a704177b5a7ec1", + "fixed_version": "5.17.2" + } + }, + "CVE-2023-1252": { + "5.10": { + "cmt_id": "4fd9f0509a1452b45e89c668e2bab854cb05cd25", + "fixed_version": "5.10.80" + }, + "5.14": { + "cmt_id": "500a1bac743cf7505726ee491efb89772677fc72", + "fixed_version": "5.14.19" + }, + "5.15": { + "cmt_id": "2f372e38f5724301056e005353c8beecc3f8d257", + "fixed_version": "5.15.3" + } + }, + "CVE-2023-1281": { + "5.10": { + "cmt_id": "eb8e9d8572d1d9df17272783ad8a84843ce559d4", + "fixed_version": "5.10.169" + }, + "5.15": { + "cmt_id": "becf55394f6acb60dd60634a1c797e73c747f9da", + "fixed_version": "5.15.95" + }, + "6.1": { + "cmt_id": "bd662ba56187b5ef8a62a3511371cd38299a507f", + "fixed_version": "6.1.13" + }, + "6.2": { + "cmt_id": "ee059170b1f7e94e55fa6cadee544e176a6e59c2", + "fixed_version": "6.2" + } + }, + "CVE-2023-1295": { + "5.11": { + "cmt_id": "21eba814af427b0901811acdfce415c4b8b7c844", + "fixed_version": "5.11.6" + } + }, + "CVE-2023-1380": { + "4.14": { + "cmt_id": "ac5305e5d227b9af3aae25fa83380d3ff0225b73", + "fixed_version": "4.14.315" + }, + "4.19": { + "cmt_id": "39f9bd880abac6068bedb24a4e16e7bd26bf92da", + "fixed_version": "4.19.283" + }, + "5.10": { + "cmt_id": "549825602e3e6449927ca1ea1a08fd89868439df", + "fixed_version": "5.10.180" + }, + "5.15": { + "cmt_id": "936a23293bbb3332bdf4cdb9c1496e80cb0bc2c8", + "fixed_version": "5.15.110" + }, + "5.4": { + "cmt_id": "425eea395f1f5ae349fb55f7fe51d833a5324bfe", + "fixed_version": "5.4.243" + }, + "6.1": { + "cmt_id": "e29661611e6e71027159a3140e818ef3b99f32dd", + "fixed_version": "6.1.27" + }, + "6.2": { + "cmt_id": "228186629ea970cc78b7d7d5f593f2d32fddf9f6", + "fixed_version": "6.2.14" + }, + "6.3": { + "cmt_id": "21bee3e649d87f78fe8aef6ae02edd3d6f310fd0", + "fixed_version": "6.3.1" + } + }, + "CVE-2023-1382": { + "4.19": { + "cmt_id": "2c9c64a95d97727c9ada0d35abc90ee5fdbaeff7", + "fixed_version": "4.19.268" + }, + "5.10": { + "cmt_id": "e87a077d09c05985a0edac7c6c49bb307f775d12", + "fixed_version": "5.10.157" + }, + "5.15": { + "cmt_id": "4ae907c45fcad4450423b8cdefa5a74bad772068", + "fixed_version": "5.15.81" + }, + "5.4": { + "cmt_id": "30f91687fa2502abb0b4d79569b63d1381169ccf", + "fixed_version": "5.4.226" + }, + "6.0": { + "cmt_id": "66d7a37e2ec769fbb4b086cc03c320565be3fbb9", + "fixed_version": "6.0.11" + } + }, + "CVE-2023-1390": { + "4.14": { + "cmt_id": "3ed0b5bb8cf71b4b9f995d4b3763648674fa032a", + "fixed_version": "4.14.217" + }, + "4.19": { + "cmt_id": "4d1d3dddcb3f26000e66cd0a9b8b16f7c2eb41bb", + "fixed_version": "4.19.170" + }, + "4.9": { + "cmt_id": "310014f572a59b311c175321265a08c9adfced0c", + "fixed_version": "4.9.253" + }, + "5.10": { + "cmt_id": "60b8b4e6310b7dfc551ba68e8639eeaf70a0b2dd", + "fixed_version": "5.10.10" + }, + "5.4": { + "cmt_id": "56e8947bcf814d195eb4954b4821868803d3dd67", + "fixed_version": "5.4.92" + } + }, + "CVE-2023-1513": { + "4.14": { + "cmt_id": "1d43de93b35d85981006ec3c52c0cad8af1f2f6a", + "fixed_version": "4.14.306" + }, + "4.19": { + "cmt_id": "669c76e55de332fbcbce5b74fccef1b4698a8936", + "fixed_version": "4.19.273" + }, + "5.10": { + "cmt_id": "6416c2108ba54d569e4c98d3b62ac78cb12e7107", + "fixed_version": "5.10.169" + }, + "5.15": { + "cmt_id": "35351e3060d67eed8af1575d74b71347a87425d8", + "fixed_version": "5.15.95" + }, + "5.4": { + "cmt_id": "9f95a161a7deef62d6d2f57b1a69f94e0546d8d8", + "fixed_version": "5.4.232" + }, + "6.1": { + "cmt_id": "747ca7c8a0c7bce004709143d1cd6596b79b1deb", + "fixed_version": "6.1.13" + }, + "6.2": { + "cmt_id": "2c10b61421a28e95a46ab489fd56c0f442ff6952", + "fixed_version": "6.2" + } + }, + "CVE-2023-1582": { + "5.10": { + "cmt_id": "db3f3636e4aed2cba3e4e7897a053323f7a62249", + "fixed_version": "5.10.102" + }, + "5.15": { + "cmt_id": "a8dd0cfa37792863b6c4bf9542975212a6715d49", + "fixed_version": "5.15.25" + }, + "5.16": { + "cmt_id": "05d3f8045efa59457b323caf00bdb9273b7962fa", + "fixed_version": "5.16.10" + } + }, + "CVE-2023-1583": { + "6.1": { + "cmt_id": "7b100a45dc19ffd708f364ba66601efaca1ccf56", + "fixed_version": "6.1.22" + }, + "6.2": { + "cmt_id": "2ff9f7319b915acc42cf8fcf743589f926f4a014", + "fixed_version": "6.2.9" + } + }, + "CVE-2023-1611": { + "5.10": { + "cmt_id": "5f6347034341bf45056ca1ec3fa72040152ecf83", + "fixed_version": "5.10.177" + }, + "5.15": { + "cmt_id": "c976f9233ef926e090db5614a837824a0bcab3fb", + "fixed_version": "5.15.106" + }, + "5.4": { + "cmt_id": "0e0f324c259d87639bda61a0bdea9c32c4aecdc6", + "fixed_version": "5.4.253" + }, + "6.1": { + "cmt_id": "a38ff2024805a30d9b96f52557c6ea0bbc31252a", + "fixed_version": "6.1.23" + }, + "6.2": { + "cmt_id": "4caab245b0469ce9258ba099a41e909f5d307b33", + "fixed_version": "6.2.10" + } + }, + "CVE-2023-1637": { + "4.14": { + "cmt_id": "7b5f17024f115b6aa42d2a079326dd0ca8e3449b", + "fixed_version": "4.14.276" + }, + "4.19": { + "cmt_id": "edc7b755e8fce10009ac85bb234a035557301bc4", + "fixed_version": "4.19.238" + }, + "4.9": { + "cmt_id": "1d2e6ac145b6b818542a0810df51c931a696ab0d", + "fixed_version": "4.9.311" + }, + "5.10": { + "cmt_id": "fc4bdaed4d4ea4209e65115bd3948a1e4ac51cbb", + "fixed_version": "5.10.111" + }, + "5.15": { + "cmt_id": "fab4b79e869a8e1c0f7d931a4eff0285d9b5efa7", + "fixed_version": "5.15.34" + }, + "5.16": { + "cmt_id": "aeb473e7ed48b1d5e511353cbef5f4e6e00544ac", + "fixed_version": "5.16.20" + }, + "5.17": { + "cmt_id": "9ffaef8717992fd23184a745ca8224d9635f9db3", + "fixed_version": "5.17.3" + }, + "5.4": { + "cmt_id": "17f3e31c860371ff72db7f9b2fb44ab008a133e0", + "fixed_version": "5.4.189" + } + }, + "CVE-2023-1652": { + "5.15": { + "cmt_id": "0a27dcd5343026ac0cb168ee63304255372b7a36", + "fixed_version": "5.15.91" + }, + "6.1": { + "cmt_id": "32d5eb95f8f0e362e37c393310b13b9e95404560", + "fixed_version": "6.1.9" + } + }, + "CVE-2023-1670": { + "4.14": { + "cmt_id": "fe7eebebca51d56b900331c3052a6342731f1117", + "fixed_version": "4.14.312" + }, + "4.19": { + "cmt_id": "526660c25d3b93b1232a525b75469048388f0928", + "fixed_version": "4.19.280" + }, + "5.10": { + "cmt_id": "bfeeb3aaad4ee8eaaefe5d9edd9b2ccb5d9b7505", + "fixed_version": "5.10.177" + }, + "5.15": { + "cmt_id": "4ab9e85a5ce0b2ef6e63abf861179898da613d78", + "fixed_version": "5.15.105" + }, + "5.4": { + "cmt_id": "a07ec453e86abbd14e2d06d59367b4dd11437358", + "fixed_version": "5.4.240" + }, + "6.1": { + "cmt_id": "9d882229d365f68f74028252261ab14a8de7faed", + "fixed_version": "6.1.22" + }, + "6.2": { + "cmt_id": "9c515f3290456bb6850bd7ee29d5bf6652d7f103", + "fixed_version": "6.2.9" + } + }, + "CVE-2023-1829": { + "4.14": { + "cmt_id": "53af9c793f644d5841d84d8e0ad83bd7ab47f3e0", + "fixed_version": "4.14.308" + }, + "4.19": { + "cmt_id": "01d0d2b8b4e3cf2110baba9371c0c3d04ad5c77b", + "fixed_version": "4.19.276" + }, + "5.10": { + "cmt_id": "18c3fa7a7fdbb4d21dafc8a7710ae2c1680930f6", + "fixed_version": "5.10.173" + }, + "5.15": { + "cmt_id": "7c183dc0af472dec33d2c0786a5e356baa8cad19", + "fixed_version": "5.15.100" + }, + "5.4": { + "cmt_id": "7a6fb69bbcb21e9ce13bdf18c008c268874f0480", + "fixed_version": "5.4.235" + }, + "6.1": { + "cmt_id": "3abebc503a5148072052c229c6b04b329a420ecd", + "fixed_version": "6.1.18" + }, + "6.2": { + "cmt_id": "372ae77cf11d11fb118cbe2d37def9dd5f826abd", + "fixed_version": "6.2.5" + } + }, + "CVE-2023-1838": { + "4.14": { + "cmt_id": "d1bcb0ab20980c6da663708c9a47c322703f9fc3", + "fixed_version": "4.14.317" + }, + "4.19": { + "cmt_id": "6ca70982c646cc32e458150ee7f2530a24369b8c", + "fixed_version": "4.19.245" + }, + "5.10": { + "cmt_id": "ec0d801d1a44d9259377142c6218885ecd685e41", + "fixed_version": "5.10.118" + }, + "5.15": { + "cmt_id": "42d8a6dc45fc6619b8def1a70b7bd0800bcc4574", + "fixed_version": "5.15.42" + }, + "5.17": { + "cmt_id": "d759015c9bcaa87d2ebf41c7bab561f7033c3e80", + "fixed_version": "5.17.10" + }, + "5.18": { + "cmt_id": "fb4554c2232e44d595920f4d5c66cf8f7d13f9bc", + "fixed_version": "5.18" + }, + "5.4": { + "cmt_id": "3a12b2c413b20c17832ec51cb836a0b713b916ac", + "fixed_version": "5.4.196" + } + }, + "CVE-2023-1855": { + "4.14": { + "cmt_id": "c809ed776e190edfc04f8d6b25a62855b1386a0d", + "fixed_version": "4.14.311" + }, + "4.19": { + "cmt_id": "e0a37b43cd732038e37b4e7f6c6c0658fe0b6d73", + "fixed_version": "4.19.279" + }, + "5.10": { + "cmt_id": "0a73c8b3cc99d214dff83c51805c844240c4f749", + "fixed_version": "5.10.176" + }, + "5.15": { + "cmt_id": "7091951c2ca9d3fbec75ef1d677cbd89eeac9793", + "fixed_version": "5.15.104" + }, + "5.4": { + "cmt_id": "26c176ce902861a45f8d699e057245ed7e0bcdf2", + "fixed_version": "5.4.238" + }, + "6.1": { + "cmt_id": "b2ae1f15cd6fe0cb36e432a179ae7d479ae2e6e0", + "fixed_version": "6.1.21" + }, + "6.2": { + "cmt_id": "eacd1f6bb43ac4b9de3bf886083a71c18d5f329f", + "fixed_version": "6.2.8" + } + }, + "CVE-2023-1859": { + "4.14": { + "cmt_id": "b5664e929e2e19f644ea133ae8d87fbd5654ec5a", + "fixed_version": "4.14.313" + }, + "4.19": { + "cmt_id": "c078fcd3f00ea5eadad07da169956d84f65af49b", + "fixed_version": "4.19.281" + }, + "5.10": { + "cmt_id": "9266e939d76279d8710196d86215ba2be6345041", + "fixed_version": "5.10.178" + }, + "5.15": { + "cmt_id": "e35ae49bc198412c9294115677e5acdef95b1fb5", + "fixed_version": "5.15.108" + }, + "5.4": { + "cmt_id": "fcd084e199b9a38490bfedd97885bbaba14475e5", + "fixed_version": "5.4.241" + }, + "6.1": { + "cmt_id": "c4002b9d5e837f152a40d1333c56ccb84975147b", + "fixed_version": "6.1.25" + }, + "6.2": { + "cmt_id": "e7dcd834af53c79418ca3cd1c42749a314b9f7dc", + "fixed_version": "6.2.12" + } + }, + "CVE-2023-1872": { + "5.17": { + "cmt_id": "d657effd9029e9901243a6cec0467d425ab1fde5", + "fixed_version": "5.17.3" + } + }, + "CVE-2023-1989": { + "4.14": { + "cmt_id": "95eacef5692545f199fae4e52abfbfa273acb351", + "fixed_version": "4.14.312" + }, + "4.19": { + "cmt_id": "af4d48754d5517d33bac5e504ff1f1de0808e29e", + "fixed_version": "4.19.280" + }, + "5.10": { + "cmt_id": "da3d3fdfb4d523c5da30e35a8dd90e04f0fd8962", + "fixed_version": "5.10.177" + }, + "5.15": { + "cmt_id": "8efae2112d910d8e5166dd0a836791b08721eef1", + "fixed_version": "5.15.105" + }, + "5.4": { + "cmt_id": "a18fb433ceb56e0787546a9d77056dd0f215e762", + "fixed_version": "5.4.240" + }, + "6.1": { + "cmt_id": "cbf8deacb7053ce3e3fed64b277c6c6989e65bba", + "fixed_version": "6.1.22" + }, + "6.2": { + "cmt_id": "c59c65a14e8f7d738429648833f3bb3f9df0513f", + "fixed_version": "6.2.9" + } + }, + "CVE-2023-1990": { + "4.14": { + "cmt_id": "2156490c4b7cacda9a18ec99929940b8376dc0e3", + "fixed_version": "4.14.311" + }, + "4.19": { + "cmt_id": "3405eb641dafcc8b28d174784b203c1622c121bf", + "fixed_version": "4.19.279" + }, + "5.10": { + "cmt_id": "43aa468df246175207a7d5d7d6d31b231f15b49c", + "fixed_version": "5.10.176" + }, + "5.15": { + "cmt_id": "84dd9cc34014e3a3dcce0eb6d54b8a067e97676b", + "fixed_version": "5.15.104" + }, + "5.4": { + "cmt_id": "b0c202a8dc63008205a5d546559736507a9aae66", + "fixed_version": "5.4.238" + }, + "6.1": { + "cmt_id": "5e331022b448fbc5e76f24349cd0246844dcad25", + "fixed_version": "6.1.21" + }, + "6.2": { + "cmt_id": "f589e5b56c562d99ea74e05b1c3f0eab78aa17a3", + "fixed_version": "6.2.8" + } + }, + "CVE-2023-1998": { + "6.1": { + "cmt_id": "08d87c87d6461d16827c9b88d84c48c26b6c994a", + "fixed_version": "6.1.16" + }, + "6.2": { + "cmt_id": "ead3c8e54d28fa1d5454b1f8a21b96b4a969b1cb", + "fixed_version": "6.2.3" + } + }, + "CVE-2023-2002": { + "4.14": { + "cmt_id": "73ddc585228db650bd4ff10d5b59c831924fd9ba", + "fixed_version": "4.14.315" + }, + "4.19": { + "cmt_id": "8d59548bae309000442c297bff3e54ab535f0ab7", + "fixed_version": "4.19.283" + }, + "5.10": { + "cmt_id": "98cfbad52fc286c2a1a75e04bf47b98d6489db1f", + "fixed_version": "5.10.180" + }, + "5.15": { + "cmt_id": "f1e6a14d5ae879d6ab6d90c58d2fde1b5716b389", + "fixed_version": "5.15.110" + }, + "5.4": { + "cmt_id": "48cdcb40d589d990ccc1a99fb76843484ce732a0", + "fixed_version": "5.4.243" + }, + "6.1": { + "cmt_id": "47e6893a5b0ad14c0b1c25983a1facb1cf667b6e", + "fixed_version": "6.1.27" + }, + "6.2": { + "cmt_id": "727b3ea80f3fdda6c686806ce3579face0415c76", + "fixed_version": "6.2.14" + }, + "6.3": { + "cmt_id": "dd30f9da333748488d96b7cb3c5a17bbaf86b32d", + "fixed_version": "6.3.1" + } + }, + "CVE-2023-2006": { + "5.10": { + "cmt_id": "3535c632e6d16c98f76e615da8dc0cb2750c66cc", + "fixed_version": "5.10.157" + }, + "5.15": { + "cmt_id": "38fe0988bd516f35c614ea9a5ff86c0d29f90c9a", + "fixed_version": "5.15.81" + }, + "6.0": { + "cmt_id": "60272ee9be89f5e8021898e65862f93e9fba90dc", + "fixed_version": "6.0.11" + } + }, + "CVE-2023-2008": { + "5.10": { + "cmt_id": "20119c1e0fff89542ff3272ace87e04cf6ee6bea", + "fixed_version": "5.10.127" + }, + "5.15": { + "cmt_id": "5b45535865d62633e3816ee30eb8d3213038dc17", + "fixed_version": "5.15.51" + }, + "5.18": { + "cmt_id": "44bb0618ae37c8a05b93acfcd044b9beb42201dd", + "fixed_version": "5.18.8" + }, + "5.4": { + "cmt_id": "c7bdaad9cbfe17c83e4f56c7bb7a2d87d944f0fb", + "fixed_version": "5.4.202" + } + }, + "CVE-2023-2019": { + "5.15": { + "cmt_id": "f671cf48f383fccba313346eddb4bd6bcbdb55a4", + "fixed_version": "5.15.61" + }, + "5.18": { + "cmt_id": "0579d61ee38cbe0b32e190c29112c002f9e63190", + "fixed_version": "5.18.18" + }, + "5.19": { + "cmt_id": "ece188f236db01f5f60f1bc578bde5af2a816db2", + "fixed_version": "5.19.2" + } + }, + "CVE-2023-20569": { + "5.10": { + "cmt_id": "073a28a9b50662991e7d6956c2cf2fc5d54f28cd", + "fixed_version": "5.10.189" + }, + "5.15": { + "cmt_id": "236dd7133394bfe30275191e3aefcc6b3b09962b", + "fixed_version": "5.15.125" + }, + "5.4": { + "cmt_id": "1f0618bb24563aaa51473f23863b1e09bbf2ff2c", + "fixed_version": "5.4.252" + }, + "6.1": { + "cmt_id": "dfede4cb8ef732039b7a479d260bd89d3b474f14", + "fixed_version": "6.1.44" + }, + "6.4": { + "cmt_id": "d351cc7c14a6e2af73bfea4aa5ee093321f4c307", + "fixed_version": "6.4.9" + } + }, + "CVE-2023-20588": { + "5.10": { + "cmt_id": "b6fc2fbf89089ecfb8eb9a89a7fc91d444f4fec7", + "fixed_version": "5.10.190" + }, + "5.15": { + "cmt_id": "a74878207b02060c5feaf88b5566208ed08eb78d", + "fixed_version": "5.15.126" + }, + "6.1": { + "cmt_id": "f2615bb47be4f53be92c81a6a8aa286c92ef04d9", + "fixed_version": "6.1.45" + }, + "6.4": { + "cmt_id": "c9c0b889e2d33d49b06bb716b95a192ed3449173", + "fixed_version": "6.4.10" + } + }, + "CVE-2023-20593": { + "4.19": { + "cmt_id": "cfef7bbf0dca27209ea5d82d7060d4fc2c0d72ea", + "fixed_version": "4.19.289" + }, + "5.10": { + "cmt_id": "93df00f9d48d48466ddbe01a06eaaf3311ecfb53", + "fixed_version": "5.10.187" + }, + "5.15": { + "cmt_id": "be824fdb827dc06f77a31122949fe1bc011e3e1e", + "fixed_version": "5.15.122" + }, + "5.4": { + "cmt_id": "00363ef30797211c247605464dc3daaa988531a2", + "fixed_version": "5.4.250" + }, + "6.1": { + "cmt_id": "ed9b87010aa84c157096f98c322491e9af8e8f07", + "fixed_version": "6.1.41" + }, + "6.4": { + "cmt_id": "9b8bb5c4e25678af895dc9dd4a1e82b2f948cacc", + "fixed_version": "6.4.6" + } + }, + "CVE-2023-20928": { + "5.15": { + "cmt_id": "622ef885a89ad04cfb76ee478fb44f051125d1f1", + "fixed_version": "5.15.61" + }, + "5.18": { + "cmt_id": "925e6b6f82c9c80ab3c17acbde8d16f349da7d26", + "fixed_version": "5.18.18" + } + }, + "CVE-2023-20938": { + "5.10": { + "cmt_id": "ae9e0cc973fb7499ea1b1a8dfd0795f728b84faf", + "fixed_version": "5.10.157" + }, + "5.17": { + "cmt_id": "3bf989a7be204470c84534a5b75a8928a7ebe60d", + "fixed_version": "5.17.6" + }, + "5.4": { + "cmt_id": "4741b00cac23d5fe7d6f74858dff1968eeb1b63a", + "fixed_version": "5.4.226" + } + }, + "CVE-2023-21102": { + "5.10": { + "cmt_id": "d6544bccc1967cd6a883d6abac71fc7d863e8baa", + "fixed_version": "5.10.165" + }, + "5.15": { + "cmt_id": "7a993c1be595835acf578d0382bfd8f83475f301", + "fixed_version": "5.15.90" + }, + "6.1": { + "cmt_id": "72b0e5faa5149f09c6a7a74e4012f29e33509bab", + "fixed_version": "6.1.8" + } + }, + "CVE-2023-21106": { + "6.1": { + "cmt_id": "8103d53f25ec7b9aa99c134642c6e840e896be71", + "fixed_version": "6.1.9" + } + }, + "CVE-2023-2124": { + "5.10": { + "cmt_id": "0e98a97f772f2ffcee8ced7a49b71e72916e0aa1", + "fixed_version": "5.10.184" + }, + "5.15": { + "cmt_id": "6cfe9ddb6aa698464fa16fb77a0233f68c13360c", + "fixed_version": "5.15.117" + }, + "5.4": { + "cmt_id": "c87439055174b31c51a89f8d66af2600033c664d", + "fixed_version": "5.4.249" + }, + "6.1": { + "cmt_id": "a2961463d74f5c86a8dda3b41c484c28ccc4c289", + "fixed_version": "6.1.33" + }, + "6.3": { + "cmt_id": "69ebe82c73f4f9f4b49ed3b35ce347af20716d0a", + "fixed_version": "6.3.7" + } + }, + "CVE-2023-21255": { + "6.1": { + "cmt_id": "e1e198eff1fbaf56fd8022c4fbbf59c5324ea320", + "fixed_version": "6.1.31" + }, + "6.3": { + "cmt_id": "c9e6aae1f26758f3e87b93cff18d79dfd80f2f25", + "fixed_version": "6.3.5" + } + }, + "CVE-2023-21264": { + "6.3": { + "cmt_id": "c3cd33abe63f0ea32c3966ae67a7efc48e86c3e0", + "fixed_version": "6.3.7" + } + }, + "CVE-2023-2156": { + "5.10": { + "cmt_id": "c972851d3848647f57cd8d5625c48663410c3f96", + "fixed_version": "5.10.179" + }, + "5.15": { + "cmt_id": "4eee0d9d3c1117aa4a1c9f4c7f29287107e7c084", + "fixed_version": "5.15.109" + }, + "6.1": { + "cmt_id": "9a0b96d03c59ba560b074cdb9b6233493fd5492d", + "fixed_version": "6.1.26" + }, + "6.2": { + "cmt_id": "191642f5cfb38c0e44fb4783a37530bae15b8f8e", + "fixed_version": "6.2.13" + }, + "6.3": { + "cmt_id": "4e006c7a6dac0ead4c1bf606000aa90a372fc253", + "fixed_version": "6.3" + } + }, + "CVE-2023-2162": { + "4.14": { + "cmt_id": "496af9d3682ed4c28fb734342a09e6cc0c056ea4", + "fixed_version": "4.14.306" + }, + "4.19": { + "cmt_id": "6abd4698f4c8a78e7bbfc421205c060c199554a0", + "fixed_version": "4.19.273" + }, + "5.10": { + "cmt_id": "9758ffe1c07b86aefd7ca8e40d9a461293427ca0", + "fixed_version": "5.10.168" + }, + "5.15": { + "cmt_id": "0aaabdb900c7415caa2006ef580322f7eac5f6b6", + "fixed_version": "5.15.93" + }, + "5.4": { + "cmt_id": "d4d765f4761f9e3a2d62992f825aeee593bcb6b9", + "fixed_version": "5.4.232" + }, + "6.1": { + "cmt_id": "61e43ebfd243bcbad11be26bd921723027b77441", + "fixed_version": "6.1.11" + } + }, + "CVE-2023-2163": { + "5.10": { + "cmt_id": "b1281d008845ae9a4de9ef7510dcc1667557a67a", + "fixed_version": "5.10.179" + }, + "5.15": { + "cmt_id": "e722ea6dae2cc042d1bb7090e2ef8456dd5a0e57", + "fixed_version": "5.15.109" + }, + "5.4": { + "cmt_id": "0f0a291cc5208dcc6436974246e8c18106e3c3d2", + "fixed_version": "5.4.242" + }, + "6.1": { + "cmt_id": "89603f4c9154e818b9ead1abe08545a053c66ded", + "fixed_version": "6.1.26" + }, + "6.2": { + "cmt_id": "71035a0508c04827b91a5bfeb2c9ef374f321e65", + "fixed_version": "6.2.13" + }, + "6.3": { + "cmt_id": "71b547f561247897a0a14f3082730156c0533fed", + "fixed_version": "6.3" + } + }, + "CVE-2023-2166": { + "5.15": { + "cmt_id": "c142cba37de29f740a3852f01f59876af8ae462a", + "fixed_version": "5.15.83" + }, + "6.0": { + "cmt_id": "fcc63f2f7ee3038d53216edd0d8291e57c752557", + "fixed_version": "6.0.13" + }, + "6.1": { + "cmt_id": "0acc442309a0a1b01bcdaa135e56e6398a49439c", + "fixed_version": "6.1" + } + }, + "CVE-2023-2176": { + "6.1": { + "cmt_id": "88067197e97af3fcb104dd86030f788ec1b32fdb", + "fixed_version": "6.1.81" + } + }, + "CVE-2023-2177": { + "5.10": { + "cmt_id": "6f3505588d66b27220f07d0cab18da380fae2e2d", + "fixed_version": "5.10.135" + }, + "5.15": { + "cmt_id": "e796e1fe20ecaf6da419ef6a5841ba181bba7a0c", + "fixed_version": "5.15.59" + }, + "5.18": { + "cmt_id": "d99f144acc3b4b27ab91f78fd6d7085385ccd654", + "fixed_version": "5.18.16" + }, + "5.19": { + "cmt_id": "181d8d2066c000ba0a0e6940a7ad80f1a0e68e9d", + "fixed_version": "5.19" + }, + "5.4": { + "cmt_id": "8d6dab81ee3d0309c09987ff76164a25486c43e0", + "fixed_version": "5.4.209" + } + }, + "CVE-2023-2194": { + "4.14": { + "cmt_id": "b8cb50c68c87f2c4a1d65df9275073e9c94aef5e", + "fixed_version": "4.14.312" + }, + "4.19": { + "cmt_id": "5fc2b9485a8722c8350c3379992f5931ccfeaf98", + "fixed_version": "4.19.280" + }, + "5.10": { + "cmt_id": "1eaa2b7ae90c5a5e05586df310d804de250747d3", + "fixed_version": "5.10.177" + }, + "5.15": { + "cmt_id": "272dc775a52f2b0d0d8e844e77fefa7df8ebc653", + "fixed_version": "5.15.105" + }, + "5.4": { + "cmt_id": "f8cbad984b1601435d087125ac760d3cae90213a", + "fixed_version": "5.4.240" + }, + "6.1": { + "cmt_id": "7c64e839585eac8048bf67b1c6dcb7a5ca189a2e", + "fixed_version": "6.1.22" + }, + "6.2": { + "cmt_id": "cc3c3ee6d035d38f116a6dec88acf7f74598aebd", + "fixed_version": "6.2.9" + } + }, + "CVE-2023-2235": { + "5.15": { + "cmt_id": "de3ef7ba684a25313c4b7405d007ab22912ef95a", + "fixed_version": "5.15.104" + }, + "6.1": { + "cmt_id": "529546ea2834ce58aa075837d57918740accf713", + "fixed_version": "6.1.21" + }, + "6.2": { + "cmt_id": "2c6d1b32838d8cf0114dfdbbb93f4d808e498760", + "fixed_version": "6.2.8" + } + }, + "CVE-2023-2236": { + "6.0": { + "cmt_id": "77a467a3e20978607c56aa4886f46f78ca287054", + "fixed_version": "6.0.11" + } + }, + "CVE-2023-2248": { + "4.14": { + "cmt_id": "0616570ce23bbcc1ac842e97fb8e167235f1582d", + "fixed_version": "4.14.314" + }, + "4.19": { + "cmt_id": "6ef8120262dfa63d9ec517d724e6f15591473a78", + "fixed_version": "4.19.282" + }, + "5.10": { + "cmt_id": "ddcf35deb8f2a1d9addc74b586cf4c5a1f5d6020", + "fixed_version": "5.10.179" + }, + "5.15": { + "cmt_id": "1ffc0e8105510cb826cb9d27ed1820a1131c82d4", + "fixed_version": "5.15.109" + }, + "5.4": { + "cmt_id": "35dceaeab97c9e5f3fda3b10ce7f8110df0feecd", + "fixed_version": "5.4.242" + }, + "6.1": { + "cmt_id": "ce729b06dc33b01f8a6ac84da5ef54154326bf7e", + "fixed_version": "6.1.26" + }, + "6.2": { + "cmt_id": "420d014b19ff119e210ecc075ff611fe7844690c", + "fixed_version": "6.2.13" + }, + "6.3": { + "cmt_id": "3037933448f60f9acb705997eae62013ecb81e0d", + "fixed_version": "6.3" + } + }, + "CVE-2023-2269": { + "4.14": { + "cmt_id": "c9dfa8ba3b181e67970f06d80de18aa257d1ecda", + "fixed_version": "4.14.315" + }, + "4.19": { + "cmt_id": "b4b94b25c78ed03be0e07fa4e76fe51e64dac533", + "fixed_version": "4.19.283" + }, + "5.10": { + "cmt_id": "ea827627a9249154b34b646b1e1007013402afea", + "fixed_version": "5.10.180" + }, + "5.15": { + "cmt_id": "e11765cea2050fa25fc3e03da858e83284c5ce79", + "fixed_version": "5.15.111" + }, + "5.4": { + "cmt_id": "29a1ef57c3be1d53ecadb749d45b0636e8245a89", + "fixed_version": "5.4.243" + }, + "6.1": { + "cmt_id": "9a94ebc74c3540aba5aa2c7b05032da4610a08c9", + "fixed_version": "6.1.28" + }, + "6.2": { + "cmt_id": "243093d536fe3cc78b450f1beb8d584505ea3193", + "fixed_version": "6.2.15" + }, + "6.3": { + "cmt_id": "a554e6ec3626d4c11f55d7eef8d6aa93fb211c24", + "fixed_version": "6.3.2" + } + }, + "CVE-2023-22996": { + "5.16": { + "cmt_id": "2ee39164a701782bb88cf4a564dc7d8cb43c9bff", + "fixed_version": "5.16.19" + }, + "5.17": { + "cmt_id": "863bf0d2d794de665f7d3dfa5241c55300fad591", + "fixed_version": "5.17.2" + } + }, + "CVE-2023-22997": { + "6.0": { + "cmt_id": "052172bb0e4d816cdd3682e4d021d2911b83aa31", + "fixed_version": "6.0.16" + }, + "6.1": { + "cmt_id": "7a779e84b3c451ce4713456a413d3300143747a7", + "fixed_version": "6.1.2" + } + }, + "CVE-2023-22998": { + "5.10": { + "cmt_id": "0a4181b23acf53e9c95b351df6a7891116b98f9b", + "fixed_version": "5.10.171" + }, + "5.15": { + "cmt_id": "72893aadc0017f0f2998b33e7fa5e6b3a3a72d02", + "fixed_version": "5.15.61" + }, + "5.18": { + "cmt_id": "5e836ae771218ba91435d962c346cb116f0c1b8c", + "fixed_version": "5.18.18" + }, + "5.19": { + "cmt_id": "0cde00c48ea2bef890a0db7a788cd4bfad1573ac", + "fixed_version": "5.19.2" + } + }, + "CVE-2023-22999": { + "5.15": { + "cmt_id": "5157828d3975768b53a51cdf569203b953184022", + "fixed_version": "5.15.17" + }, + "5.16": { + "cmt_id": "d0ed1113ba26a515af47847cceb3618e8483595a", + "fixed_version": "5.16.3" + } + }, + "CVE-2023-23001": { + "5.15": { + "cmt_id": "0dc4db8abccf266390b81b72064191f876e55876", + "fixed_version": "5.15.17" + }, + "5.16": { + "cmt_id": "c994dbcc58d6d09c0f736dfbf9f5d6a62d26bd5a", + "fixed_version": "5.16.3" + } + }, + "CVE-2023-23002": { + "5.10": { + "cmt_id": "4579954bf4cc0bdfc4a42c88b16fe596f1e7f82d", + "fixed_version": "5.10.94" + }, + "5.15": { + "cmt_id": "9186e6ba52af11ba7b5f432aa2321f36e00ad721", + "fixed_version": "5.15.17" + }, + "5.16": { + "cmt_id": "85446a3b87799d87e6839611e5f528331bbe88fb", + "fixed_version": "5.16.3" + } + }, + "CVE-2023-23004": { + "5.10": { + "cmt_id": "a5bbea50d622b8f49ab8ee3b0eb283107febcf1a", + "fixed_version": "5.10.173" + }, + "5.15": { + "cmt_id": "1c7988d5c79f72287177bb774cde15fde69f3c97", + "fixed_version": "5.15.100" + } + }, + "CVE-2023-23006": { + "5.10": { + "cmt_id": "4cd1da02f0c39606e3378c9255f17d6f85d106c7", + "fixed_version": "5.10.90" + }, + "5.15": { + "cmt_id": "4595dffccfa5b9360162c72cc0f6a33477d871cf", + "fixed_version": "5.15.13" + }, + "5.4": { + "cmt_id": "db484d35a9482d21a7f36da4dfc7a68aa2e9e1d6", + "fixed_version": "5.4.170" + } + }, + "CVE-2023-23454": { + "4.14": { + "cmt_id": "c4b1e702dc841a79664c5b8000fd99ffe9b3e9c2", + "fixed_version": "4.14.312" + }, + "4.19": { + "cmt_id": "8ed4c82571d848d76877c4d70687686e607766e3", + "fixed_version": "4.19.280" + }, + "5.10": { + "cmt_id": "b2c917e510e5ddbc7896329c87d20036c8b82952", + "fixed_version": "5.10.163" + }, + "5.15": { + "cmt_id": "04dc4003e5df33fb38d3dd85568b763910c479d4", + "fixed_version": "5.15.87" + }, + "5.4": { + "cmt_id": "6b17b84634f932f4787f04578f5d030874b9ff32", + "fixed_version": "5.4.229" + }, + "6.0": { + "cmt_id": "cde7091efe3fcc0b19f736acd0163499d1fd6d31", + "fixed_version": "6.0.19" + }, + "6.1": { + "cmt_id": "dc46e39b727fddc5aacc0272ef83ee872d51be16", + "fixed_version": "6.1.5" + } + }, + "CVE-2023-23455": { + "4.14": { + "cmt_id": "db49adc5aff0c84ef0439a666f494a0d57c98bc7", + "fixed_version": "4.14.303" + }, + "4.19": { + "cmt_id": "5374c455ebe6102e3d5f1842c6d8ff72b3ca659f", + "fixed_version": "4.19.270" + }, + "5.10": { + "cmt_id": "5f65f48516bfeebaab1ccc52c8fad698ddf21282", + "fixed_version": "5.10.163" + }, + "5.15": { + "cmt_id": "f02327a4877a06cbc8277e22d4834cb189565187", + "fixed_version": "5.15.87" + }, + "5.4": { + "cmt_id": "63e469cb54a87df53edcfd85bb5bcdd84327ae4a", + "fixed_version": "5.4.229" + }, + "6.0": { + "cmt_id": "bbb870c88576239842602b0f7cc58c361dc8e061", + "fixed_version": "6.0.19" + }, + "6.1": { + "cmt_id": "85655c63877aeafdc23226510ea268a9fa0af807", + "fixed_version": "6.1.5" + } + }, + "CVE-2023-23559": { + "4.14": { + "cmt_id": "8a97563bf04358f035a0b98142ae48f1ef095b61", + "fixed_version": "4.14.305" + }, + "4.19": { + "cmt_id": "b4cc9d7ae9bed976de5463958afea2983b4ca57f", + "fixed_version": "4.19.272" + }, + "5.10": { + "cmt_id": "802fd7623e9ed19ee809b503e93fccc1e3f37bd6", + "fixed_version": "5.10.166" + }, + "5.15": { + "cmt_id": "8cbf932c5c40b0c20597fa623c308d5bde0848b5", + "fixed_version": "5.15.91" + }, + "5.4": { + "cmt_id": "9042a9a3f29c942387e6d6036551d90c9ae6ce4f", + "fixed_version": "5.4.231" + }, + "6.1": { + "cmt_id": "7794efa358bca8b8a2a80070c6e088a74945f018", + "fixed_version": "6.1.9" + } + }, + "CVE-2023-2430": { + "6.1": { + "cmt_id": "22a406b3629a10979916ea7cace47858410117b5", + "fixed_version": "6.1.50" + } + }, + "CVE-2023-2483": { + "4.14": { + "cmt_id": "aee129c0096e479eae92e2127f96f9d08f16ad8f", + "fixed_version": "4.14.312" + }, + "4.19": { + "cmt_id": "4bbc59ec4feb1ea8d5cb3d9d38d4cb1317943ea4", + "fixed_version": "4.19.280" + }, + "5.10": { + "cmt_id": "cb5879efde4f9b4de4248b835890df7b6c49ffbc", + "fixed_version": "5.10.177" + }, + "5.15": { + "cmt_id": "8c4a180dc12303159592d15e8f077c20deeb1e55", + "fixed_version": "5.15.105" + }, + "5.4": { + "cmt_id": "0e5c7d00ec4f2f359234044b809eb23b7032d9b0", + "fixed_version": "5.4.240" + }, + "6.1": { + "cmt_id": "5fc2c4e311a9341a2b0e044ab5f33afa37b56226", + "fixed_version": "6.1.22" + }, + "6.2": { + "cmt_id": "514dc3d0f176d280dc2d3cd25e898a7ec329e878", + "fixed_version": "6.2.9" + } + }, + "CVE-2023-25012": { + "5.10": { + "cmt_id": "fddde36316da8acb45a3cca2e5fda102f5215877", + "fixed_version": "5.10.173" + }, + "5.15": { + "cmt_id": "0fd9998052926ed24cfb30ab1a294cfeda4d0a8f", + "fixed_version": "5.15.99" + }, + "6.1": { + "cmt_id": "f2bf592ebd5077661e00aa11e12e054c4c8f6dd0", + "fixed_version": "6.1.16" + }, + "6.2": { + "cmt_id": "90289e71514e9533a9c44d694e2b492be9ed2b77", + "fixed_version": "6.2.3" + } + }, + "CVE-2023-2513": { + "4.14": { + "cmt_id": "ae2c644049184f04f672e23d3fa8122631ef762e", + "fixed_version": "4.14.314" + }, + "4.19": { + "cmt_id": "50c3bf3865da5b4c2fb3fedb79093d3ebcfcae21", + "fixed_version": "4.19.282" + }, + "4.9": { + "cmt_id": "9337f3877a5fb8db8c563ce93cf6095b24c45151", + "fixed_version": "4.9.326" + }, + "5.10": { + "cmt_id": "05cf34a2b6414a1172552d16159b3e17e9da36a3", + "fixed_version": "5.10.179" + }, + "5.15": { + "cmt_id": "21f6bd5cbdab8ac7f7e9321de53668e1ef8f22a6", + "fixed_version": "5.15.61" + }, + "5.18": { + "cmt_id": "c71148b6040674bd43c0148301446966048cb140", + "fixed_version": "5.18.18" + }, + "5.19": { + "cmt_id": "52e6feee51b859c52af61f8a75cfdad70238c100", + "fixed_version": "5.19.2" + }, + "5.4": { + "cmt_id": "5a62248c58556c395c604d4161d53afae16b6fad", + "fixed_version": "5.4.242" + } + }, + "CVE-2023-25775": { + "5.15": { + "cmt_id": "410c05b60c1af650b37ae45010086091f2d0cebe", + "fixed_version": "5.15.144" + }, + "6.1": { + "cmt_id": "f01cfec8d3456bf389918eb898eda11f46d8b1b7", + "fixed_version": "6.1.53" + }, + "6.4": { + "cmt_id": "ceba966f1d6391800cab3c1c9ac1661b5166bc5b", + "fixed_version": "6.4.16" + }, + "6.5": { + "cmt_id": "782c5702b933477b088e80e6d07b9493145b2916", + "fixed_version": "6.5.3" + } + }, + "CVE-2023-2598": { + "6.3": { + "cmt_id": "3a0a9211d7d0138d55aecd209b05e6d4a9eec383", + "fixed_version": "6.3.2" + } + }, + "CVE-2023-26544": { + "5.15": { + "cmt_id": "9c8471a17f1f15b18cb7b96cba86e6f9bd6aae1c", + "fixed_version": "5.15.87" + }, + "6.0": { + "cmt_id": "18f5468aadeef65501f1d0496a426ccdfd242e69", + "fixed_version": "6.0.17" + }, + "6.1": { + "cmt_id": "d34485d40b6a263d65bc476554299c42b2ec0187", + "fixed_version": "6.1.3" + } + }, + "CVE-2023-26545": { + "4.14": { + "cmt_id": "b89824a9b2398d78a32ea75343e5472a0fd4986e", + "fixed_version": "4.14.306" + }, + "4.19": { + "cmt_id": "aa07c86e43ed8780d610ecfb2ce13da326729201", + "fixed_version": "4.19.273" + }, + "5.10": { + "cmt_id": "7ff0fdba82298d1f456c685e24930da89703c0fb", + "fixed_version": "5.10.169" + }, + "5.15": { + "cmt_id": "59a74da8da75bdfb464cbdb399e87ba4f7500e96", + "fixed_version": "5.15.95" + }, + "5.4": { + "cmt_id": "df099e65564aa47478eb1cacf81ba69024fb5c69", + "fixed_version": "5.4.232" + }, + "6.1": { + "cmt_id": "c376227845eef8f2e62e2c29c3cf2140d35dd8e8", + "fixed_version": "6.1.13" + }, + "6.2": { + "cmt_id": "fda6c89fe3d9aca073495a664e1d5aea28cd4377", + "fixed_version": "6.2" + } + }, + "CVE-2023-26606": { + "5.15": { + "cmt_id": "ab53749c32db90eeb4495227c998d21dc07ad8c1", + "fixed_version": "5.15.86" + }, + "6.0": { + "cmt_id": "7e686013b7071f4c16644cfad8808e76097724c4", + "fixed_version": "6.0.16" + }, + "6.1": { + "cmt_id": "f2e58e95273ce072ca95a2afa1f274825a1e1772", + "fixed_version": "6.1.2" + } + }, + "CVE-2023-26607": { + "4.14": { + "cmt_id": "801906eea32d9781725905271a1d4ab275743fc9", + "fixed_version": "4.14.300" + }, + "4.19": { + "cmt_id": "4301aa833a734257ad3715f607cbde17402eda94", + "fixed_version": "4.19.267" + }, + "4.9": { + "cmt_id": "9fa645905c0457d69906eead302f70b1c7115538", + "fixed_version": "4.9.334" + }, + "5.10": { + "cmt_id": "6322dda483344abe47d17335809f7bbb730bd88b", + "fixed_version": "5.10.156" + }, + "5.15": { + "cmt_id": "ab6a1bb17e3c2f6670020d7edeea2fbfe6466690", + "fixed_version": "5.15.80" + }, + "5.4": { + "cmt_id": "0e2ce0954b39c8d60928f61217b72f352722a2cf", + "fixed_version": "5.4.225" + }, + "6.0": { + "cmt_id": "e9b64d1faa58a4ae3454acbf9c80483dd16692d4", + "fixed_version": "6.0.10" + } + }, + "CVE-2023-28327": { + "5.10": { + "cmt_id": "575a6266f63dbb3b8eb1da03671451f0d81b8034", + "fixed_version": "5.10.159" + }, + "5.15": { + "cmt_id": "5c014eb0ed6c8c57f483e94cc6e90f34ce426d91", + "fixed_version": "5.15.83" + }, + "5.4": { + "cmt_id": "c66d78aee55dab72c92020ebfbebc464d4f5dd2a", + "fixed_version": "5.4.227" + }, + "6.0": { + "cmt_id": "9c1d6f79a2c7b8221dcec27defc6dc461052ead4", + "fixed_version": "6.0.13" + }, + "6.1": { + "cmt_id": "b3abe42e94900bdd045c472f9c9be620ba5ce553", + "fixed_version": "6.1" + } + }, + "CVE-2023-28328": { + "4.14": { + "cmt_id": "c712d1ccbfb787620422b437a5b8fac0802547bd", + "fixed_version": "4.14.303" + }, + "4.19": { + "cmt_id": "7abfe467cd685f5da7ecb415441e45e3e4e2baa8", + "fixed_version": "4.19.270" + }, + "4.9": { + "cmt_id": "2b6a8a1a32746981044e7ab06649c804acb4068a", + "fixed_version": "4.9.337" + }, + "5.10": { + "cmt_id": "559891d430e3f3a178040c4371ed419edbfa7d65", + "fixed_version": "5.10.163" + }, + "5.15": { + "cmt_id": "210fcf64be4db82c0e190e74b5111e4eef661a7a", + "fixed_version": "5.15.86" + }, + "5.4": { + "cmt_id": "8b256d23361c51aa4b7fdb71176c1ca50966fb39", + "fixed_version": "5.4.229" + }, + "6.0": { + "cmt_id": "6fbc44731a4665cbe92a5090e9804a388a72214b", + "fixed_version": "6.0.16" + }, + "6.1": { + "cmt_id": "6b60cf73a931af34b7a0a3f467a79d9fe0df2d70", + "fixed_version": "6.1.2" + } + }, + "CVE-2023-28410": { + "5.10": { + "cmt_id": "89ddcc81914ab58cc203acc844f27d55ada8ec0e", + "fixed_version": "5.10.110" + }, + "5.15": { + "cmt_id": "312d3d4f49e12f97260bcf972c848c3562126a18", + "fixed_version": "5.15.33" + }, + "5.16": { + "cmt_id": "5f6e560e3e86ac053447524224e411034f41f5c7", + "fixed_version": "5.16.19" + }, + "5.17": { + "cmt_id": "8f0ebea8f6e8c474264ed97d7a64c9c09ed4f5aa", + "fixed_version": "5.17.2" + }, + "5.18": { + "cmt_id": "3886a86e7e6cc6ce2ce93c440fecd8f42aed0ce7", + "fixed_version": "5.18-rc1" + } + }, + "CVE-2023-28466": { + "5.10": { + "cmt_id": "1fde5782f187daa05919d2bebd872df8ebcc00d1", + "fixed_version": "5.10.177" + }, + "5.15": { + "cmt_id": "0b54d75aa43a1edebc8a3770901f5c3557ee0daa", + "fixed_version": "5.15.105" + }, + "5.4": { + "cmt_id": "754838aa02050ff3d8675bef79d172097218ea71", + "fixed_version": "5.4.240" + }, + "6.1": { + "cmt_id": "14c17c673e1bba08032d245d5fb025d1cbfee123", + "fixed_version": "6.1.20" + }, + "6.2": { + "cmt_id": "5231fa057bb0e52095591b303cf95ebd17bc62ce", + "fixed_version": "6.2.7" + } + }, + "CVE-2023-2860": { + "4.14": { + "cmt_id": "dc9dbd65c803af1607484fed5da50d41dc8dd864", + "fixed_version": "4.14.293" + }, + "4.19": { + "cmt_id": "f684c16971ed5e77dfa25a9ad25b5297e1f58eab", + "fixed_version": "4.19.258" + }, + "5.10": { + "cmt_id": "076f2479fc5a15c4a970ca3b5e57d42ba09a31fa", + "fixed_version": "5.10.143" + }, + "5.15": { + "cmt_id": "55195563ec29f80f984237b743de0e2b6ba4d093", + "fixed_version": "5.15.68" + }, + "5.4": { + "cmt_id": "3df71e11a4773d775c3633c44319f7acdb89011c", + "fixed_version": "5.4.213" + } + }, + "CVE-2023-28746": { + "6.1": { + "cmt_id": "8b5760939db9c49c03b9e19f6c485a8812f48d83", + "fixed_version": "6.1.82" + }, + "6.6": { + "cmt_id": "c35ca0968de41952af2ad7d22881e4a7c6e1b145", + "fixed_version": "6.6.22" + }, + "6.7": { + "cmt_id": "18867a204511d032c2a6ed083461a10905061fac", + "fixed_version": "6.7.10" + } + }, + "CVE-2023-28772": { + "4.14": { + "cmt_id": "50b51460f59acbd403475510ad423bb5ea7a4c97", + "fixed_version": "4.14.240" + }, + "4.19": { + "cmt_id": "1f4c6061fccee64b2072b28dfa3e93cf859c4c0a", + "fixed_version": "4.19.198" + }, + "4.4": { + "cmt_id": "7ad5c2f4dff68a00d24f0692e027b99c7231b995", + "fixed_version": "4.4.276" + }, + "4.9": { + "cmt_id": "f2b9f758e1dfb593872fd0fcd7644875bcb8757a", + "fixed_version": "4.9.276" + }, + "5.10": { + "cmt_id": "f9fb4986f4d81182f938d16beb4f983fe71212aa", + "fixed_version": "5.10.51" + }, + "5.12": { + "cmt_id": "681f78589bdb473de5276e0f5b7811101c0c7b87", + "fixed_version": "5.12.18" + }, + "5.13": { + "cmt_id": "d57fcab190b60f43046d5836c3c56114b4f50080", + "fixed_version": "5.13.3" + }, + "5.4": { + "cmt_id": "33ab9138a13e379cf1c4ccd76b97ae2ee8c5421b", + "fixed_version": "5.4.133" + } + }, + "CVE-2023-28866": { + "6.1": { + "cmt_id": "b3168abd24245aa0775c5a387dcf94d36ca7e738", + "fixed_version": "6.1.22" + }, + "6.2": { + "cmt_id": "8497222b22b591c6b2d106e0e3c1672ffe4e10e0", + "fixed_version": "6.2.9" + } + }, + "CVE-2023-2898": { + "5.10": { + "cmt_id": "b39ef5b52f10b819bd0ceeb22e8f7df7800880ca", + "fixed_version": "5.10.188" + }, + "5.15": { + "cmt_id": "982c29e0d27a48d65fd0fa0d1bcee501eeb06e76", + "fixed_version": "5.15.121" + }, + "6.1": { + "cmt_id": "ebe83e9bb8a6b3db28603fe938ee80ccaa01ed53", + "fixed_version": "6.1.39" + }, + "6.4": { + "cmt_id": "5619e9aabbd2b369cde2114ad6f55f6eb3e0b5be", + "fixed_version": "6.4.4" + } + }, + "CVE-2023-2985": { + "4.14": { + "cmt_id": "a9433406837c211af58a533d9e6f7a8f865b01f3", + "fixed_version": "4.14.308" + }, + "4.19": { + "cmt_id": "e226f1fdcee1ca6e68233b132718deb578a84e38", + "fixed_version": "4.19.276" + }, + "5.10": { + "cmt_id": "ef7d71d7bd57b8b7fe514e459927696c1c6d1047", + "fixed_version": "5.10.173" + }, + "5.15": { + "cmt_id": "05103d88482dc3757db108415342fdd86821a79b", + "fixed_version": "5.15.99" + }, + "5.4": { + "cmt_id": "3776ef785e1005355cdd86c751a8e838bac8e2e8", + "fixed_version": "5.4.235" + }, + "6.1": { + "cmt_id": "0c80bef0b7d297ea86e5408fe79c45479e504a26", + "fixed_version": "6.1.16" + }, + "6.2": { + "cmt_id": "f348b373cebeaa91bf3552099026951189f14436", + "fixed_version": "6.2.3" + } + }, + "CVE-2023-3006": { + "5.10": { + "cmt_id": "52a43b82006dc88f996bd06da5a3fcfef85220c8", + "fixed_version": "5.10.153" + }, + "5.15": { + "cmt_id": "52c2329147cf5d956dcaa3a91c886c550e7bdd39", + "fixed_version": "5.15.77" + }, + "5.4": { + "cmt_id": "f41cab7a4653a5b39e49f1385fca53c0b8f93324", + "fixed_version": "5.4.253" + }, + "6.0": { + "cmt_id": "5b962b004afa3c11e651c07232f2402b4678007b", + "fixed_version": "6.0.7" + } + }, + "CVE-2023-30456": { + "4.19": { + "cmt_id": "495adb06518bb10f50e1aa1a1dbd5daa47d118f2", + "fixed_version": "4.19.281" + }, + "5.10": { + "cmt_id": "c54974ccaff73525462e278602dfe4069877cfaa", + "fixed_version": "5.10.176" + }, + "5.15": { + "cmt_id": "9c2f09add608a505f0e5fb694805f4766801583f", + "fixed_version": "5.15.104" + }, + "5.4": { + "cmt_id": "65e4c9a6d0c9a8c81ce75576869d46fff5d7964f", + "fixed_version": "5.4.238" + }, + "6.1": { + "cmt_id": "4bba9c8adec804f03d12dc762e50d083ee88b6b0", + "fixed_version": "6.1.21" + }, + "6.2": { + "cmt_id": "71d05b9fa0bfc131a6e2250dea045a818ff25550", + "fixed_version": "6.2.8" + } + }, + "CVE-2023-30772": { + "4.14": { + "cmt_id": "bbf45f079f41efcf1e51bb65a0a45d2b31061bd5", + "fixed_version": "4.14.312" + }, + "4.19": { + "cmt_id": "533d915899b4a5a7b5b5a99eec24b2920ccd1f11", + "fixed_version": "4.19.280" + }, + "5.10": { + "cmt_id": "75e2144291e847009fbc0350e10ec588ff96e05a", + "fixed_version": "5.10.177" + }, + "5.15": { + "cmt_id": "0fdb1cc4fe5255d0198c332b961bc4c1f8787982", + "fixed_version": "5.15.105" + }, + "5.4": { + "cmt_id": "6fe078c2864b9defaa632733a5bae969b398b673", + "fixed_version": "5.4.240" + }, + "6.1": { + "cmt_id": "47b2e1a67e6da172bb4cf69ef9dafde4458bde5f", + "fixed_version": "6.1.22" + }, + "6.2": { + "cmt_id": "a7d686b36aa8021ee96128290ac3b58c4c1f6297", + "fixed_version": "6.2.9" + } + }, + "CVE-2023-3090": { + "4.14": { + "cmt_id": "8747ec637300f1212a47a9f15e2340cfe4dcbb9c", + "fixed_version": "4.14.316" + }, + "4.19": { + "cmt_id": "b36dcf3ed547c103acef6f52bed000a0ac6c074f", + "fixed_version": "4.19.284" + }, + "5.10": { + "cmt_id": "f4a371d3f5a7a71dff1ab48b3122c5cf23cc7ad5", + "fixed_version": "5.10.181" + }, + "5.15": { + "cmt_id": "7c8be27727fe194b4625da442ee2b854db76b200", + "fixed_version": "5.15.113" + }, + "5.4": { + "cmt_id": "1aa872e967f2017041bb2284479b3c6ce8d121b5", + "fixed_version": "5.4.244" + }, + "6.1": { + "cmt_id": "610a433810b277b3b77389733c07d22e8af68de2", + "fixed_version": "6.1.30" + }, + "6.3": { + "cmt_id": "3cd16c6a6a6b68bba02fbbc54b9906f44640ffde", + "fixed_version": "6.3.4" + } + }, + "CVE-2023-3106": { + "3.16": { + "cmt_id": "2dcb72918e387fd1d0af40c1c351822bfe1acf63", + "fixed_version": "3.16.39" + }, + "4.4": { + "cmt_id": "0cbb0084fa2b444b7316a0967a0d93f5ae520216", + "fixed_version": "4.4.223" + } + }, + "CVE-2023-31085": { + "4.14": { + "cmt_id": "ef7a4c97a85ab1bff7abc98f885678bd33bb4881", + "fixed_version": "4.14.327" + }, + "4.19": { + "cmt_id": "a0d71e9e61da8a85a46774c67549739e28fda795", + "fixed_version": "4.19.296" + }, + "5.10": { + "cmt_id": "a5f643ab11631095c60c9852705220edf1659d6f", + "fixed_version": "5.10.198" + }, + "5.15": { + "cmt_id": "0ea2a63497333019bd2931975ed489216b365755", + "fixed_version": "5.15.135" + }, + "5.4": { + "cmt_id": "c6d358387632a6d45b3e5d4c310cfec1bde59423", + "fixed_version": "5.4.258" + }, + "6.1": { + "cmt_id": "91aeb418b9175d09fc858f0fdf01988cbf990c5d", + "fixed_version": "6.1.57" + }, + "6.5": { + "cmt_id": "87b9858e404069817cd4b31830e0a1b9b3d183c4", + "fixed_version": "6.5.7" + } + }, + "CVE-2023-3111": { + "4.14": { + "cmt_id": "ff0e8ed8dfb584575cffc1561f17a1d094e8565b", + "fixed_version": "4.14.318" + }, + "4.19": { + "cmt_id": "dcb11fe0a0a9cca2b7425191b9bf30dc29f2ad0f", + "fixed_version": "4.19.286" + }, + "5.10": { + "cmt_id": "b60e862e133f646f19023ece1d476d630a660de1", + "fixed_version": "5.10.184" + }, + "5.15": { + "cmt_id": "78f8c2370e3d33e35f23bdc648653d779aeacb6e", + "fixed_version": "5.15.63" + }, + "5.19": { + "cmt_id": "5d741afed0bac206640cc64d77b97853283cf719", + "fixed_version": "5.19.4" + }, + "5.4": { + "cmt_id": "8e546674031fc1576da501e27a8fd165222e5a37", + "fixed_version": "5.4.247" + } + }, + "CVE-2023-3117": { + "4.14": { + "cmt_id": "d19a80db742ceffc8d92a0cf78885f60d10c6a6d", + "fixed_version": "4.14.322" + }, + "4.19": { + "cmt_id": "798aa8da13782fe472aa48841c5570d7439339b8", + "fixed_version": "4.19.291" + }, + "5.10": { + "cmt_id": "8180fc2fadd48dde4966f2db2c716c2ce7510d0b", + "fixed_version": "5.10.188" + }, + "5.15": { + "cmt_id": "44ebe988cb38e720b91826f4d7c31692061ca04a", + "fixed_version": "5.15.118" + }, + "5.4": { + "cmt_id": "1adb5c272b200c24e9a7dd3bff891ce6eb75b019", + "fixed_version": "5.4.251" + }, + "6.1": { + "cmt_id": "4aaa3b730d16c13cc3feaa127bfca1af201d969d", + "fixed_version": "6.1.35" + }, + "6.3": { + "cmt_id": "bdace3b1a51887211d3e49417a18fdbd315a313b", + "fixed_version": "6.3.9" + } + }, + "CVE-2023-31248": { + "5.10": { + "cmt_id": "4ae2e501331aaa506eaf760339bb2f43e5769395", + "fixed_version": "5.10.188" + }, + "5.15": { + "cmt_id": "041e2ac88caef286b39064e83e825e3f53113d36", + "fixed_version": "5.15.121" + }, + "6.1": { + "cmt_id": "fc95c8b02c6160936f1f3d8d9d7f4f66f3c84b49", + "fixed_version": "6.1.39" + }, + "6.4": { + "cmt_id": "5e5e967e8505fbdabfb6497367ec1b808cadc356", + "fixed_version": "6.4.4" + } + }, + "CVE-2023-3141": { + "4.14": { + "cmt_id": "3faa6fe21c516dbcca469c297df77decbc2fed0f", + "fixed_version": "4.14.316" + }, + "4.19": { + "cmt_id": "dce890c3dfaf631d0a8ac79c2792911f9fc551fa", + "fixed_version": "4.19.284" + }, + "5.10": { + "cmt_id": "5c23f6da62f71ebfeda6ea3960982ccd926ebb09", + "fixed_version": "5.10.181" + }, + "5.15": { + "cmt_id": "162a9b321538972a260c7b178638c2368c071f77", + "fixed_version": "5.15.113" + }, + "5.4": { + "cmt_id": "a2a5d3a584bf86c9c09017381a8fc63cfaf5a9e6", + "fixed_version": "5.4.244" + }, + "6.1": { + "cmt_id": "9a342d4eb9fb8e52f7d1afe088a79513f3f9a9a5", + "fixed_version": "6.1.30" + }, + "6.3": { + "cmt_id": "76fec5f01c9c70e11b85fdeb3f2707589c9238ca", + "fixed_version": "6.3.4" + } + }, + "CVE-2023-31436": { + "4.14": { + "cmt_id": "0616570ce23bbcc1ac842e97fb8e167235f1582d", + "fixed_version": "4.14.314" + }, + "4.19": { + "cmt_id": "6ef8120262dfa63d9ec517d724e6f15591473a78", + "fixed_version": "4.19.282" + }, + "5.10": { + "cmt_id": "ddcf35deb8f2a1d9addc74b586cf4c5a1f5d6020", + "fixed_version": "5.10.179" + }, + "5.15": { + "cmt_id": "1ffc0e8105510cb826cb9d27ed1820a1131c82d4", + "fixed_version": "5.15.109" + }, + "5.4": { + "cmt_id": "35dceaeab97c9e5f3fda3b10ce7f8110df0feecd", + "fixed_version": "5.4.242" + }, + "6.1": { + "cmt_id": "ce729b06dc33b01f8a6ac84da5ef54154326bf7e", + "fixed_version": "6.1.26" + }, + "6.2": { + "cmt_id": "420d014b19ff119e210ecc075ff611fe7844690c", + "fixed_version": "6.2.13" + }, + "6.3": { + "cmt_id": "3037933448f60f9acb705997eae62013ecb81e0d", + "fixed_version": "6.3" + } + }, + "CVE-2023-3159": { + "4.14": { + "cmt_id": "1269a6567274edecd04ee7fd7871aa4d0c937f2a", + "fixed_version": "4.14.278" + }, + "4.19": { + "cmt_id": "34380b5647f13fecb458fea9a3eb3d8b3a454709", + "fixed_version": "4.19.242" + }, + "4.9": { + "cmt_id": "2a08a260d2294b2ecd4190cceaaf12ae81f3cb9f", + "fixed_version": "4.9.313" + }, + "5.10": { + "cmt_id": "e757ff4bbc893bc030c2d10143091094da73b9ff", + "fixed_version": "5.10.115" + }, + "5.15": { + "cmt_id": "e259ba5c08d3791ab269b7775f1de5b36b06388c", + "fixed_version": "5.15.39" + }, + "5.17": { + "cmt_id": "bb0aef891131e6347b04528c3f0ce11638d6f419", + "fixed_version": "5.17.7" + }, + "5.4": { + "cmt_id": "34b9b91829111a7e44b593c790a22680c89cd402", + "fixed_version": "5.4.193" + } + }, + "CVE-2023-3161": { + "4.14": { + "cmt_id": "7625513267a2b155a5e31e4ac443bf954591b7fa", + "fixed_version": "4.14.306" + }, + "4.19": { + "cmt_id": "1c3d4901fad1db6a4e2dcdd6b13ed0ea22f227a1", + "fixed_version": "4.19.273" + }, + "5.10": { + "cmt_id": "28d190882ba55cbcee1db8e4ae90c149178dcf64", + "fixed_version": "5.10.168" + }, + "5.15": { + "cmt_id": "dccbd062d71657648efc32fdc9919b33763cc68b", + "fixed_version": "5.15.93" + }, + "5.4": { + "cmt_id": "4abcd352a0222cc807f6f87d2f58d59aeeb70340", + "fixed_version": "5.4.232" + }, + "6.1": { + "cmt_id": "5e7f6e2ade57dfd6d133ff7c643abd2079248943", + "fixed_version": "6.1.11" + } + }, + "CVE-2023-3212": { + "4.14": { + "cmt_id": "6fb4b344382879bd4f8cc8394f6fff77c1388b15", + "fixed_version": "4.14.322" + }, + "4.19": { + "cmt_id": "d3af9cea9a1ce56f427e41e5ffcdafe9280f099f", + "fixed_version": "4.19.291" + }, + "5.10": { + "cmt_id": "d03d31d3a206093b9b8759dddf0ba9bd843606ba", + "fixed_version": "5.10.183" + }, + "5.15": { + "cmt_id": "fd8b4e28f400a067e6ef84569816967be1f0642b", + "fixed_version": "5.15.116" + }, + "5.4": { + "cmt_id": "23f98fe887ce3e7c8bd111f37e62735c5018c534", + "fixed_version": "5.4.251" + }, + "6.1": { + "cmt_id": "5ae4a618a1558d2b536fdd5d42e53d3e2d73870c", + "fixed_version": "6.1.33" + }, + "6.3": { + "cmt_id": "14c454764a37b194dc916c07488ce7339c82bc4f", + "fixed_version": "6.3.7" + } + }, + "CVE-2023-3220": { + "4.19": { + "cmt_id": "c746a0b9210cebb29511f01d2becf240408327bf", + "fixed_version": "4.19.276" + }, + "5.10": { + "cmt_id": "e9743b3052e125c44b555f07f2876a4bdccfd983", + "fixed_version": "5.10.173" + }, + "5.15": { + "cmt_id": "c7ee1772e3c36fff8e13daa5ce1ac61426544a33", + "fixed_version": "5.15.99" + }, + "5.4": { + "cmt_id": "dadd30fcc7e3e01561ef3624f6c0e323105ab523", + "fixed_version": "5.4.235" + }, + "6.1": { + "cmt_id": "dd49cef313e6a62541b55e739261c5943cb06c47", + "fixed_version": "6.1.16" + }, + "6.2": { + "cmt_id": "c745fd463ccf21943cfc35cb8842a33dda2ae259", + "fixed_version": "6.2.3" + } + }, + "CVE-2023-32233": { + "4.14": { + "cmt_id": "86572872505023e3bb461b271c2f25fdaa3dfcd7", + "fixed_version": "4.14.315" + }, + "4.19": { + "cmt_id": "c6989314fd809c5eaf4980d6fa474f19fc653d6c", + "fixed_version": "4.19.283" + }, + "5.10": { + "cmt_id": "e044a24447189419c3a7ccc5fa6da7516036dc55", + "fixed_version": "5.10.180" + }, + "5.15": { + "cmt_id": "21c2a454486d5e9c1517ecca19266b3be3df73ca", + "fixed_version": "5.15.111" + }, + "5.4": { + "cmt_id": "c8b6063f13add68f89540aa5030ceee875f48aa2", + "fixed_version": "5.4.243" + }, + "6.1": { + "cmt_id": "4507918cd1f8b80f21a396fa0531d53e372bed66", + "fixed_version": "6.1.28" + }, + "6.2": { + "cmt_id": "6b0801dcc1aa4373d28ac8ee396788d2e715c495", + "fixed_version": "6.2.15" + }, + "6.3": { + "cmt_id": "f8486683ffa30456e0be4290282a44c4459a3287", + "fixed_version": "6.3.2" + } + }, + "CVE-2023-32247": { + "5.15": { + "cmt_id": "a6a9601ba995d0fec635324cb9fd8d14f9bea14e", + "fixed_version": "5.15.145" + }, + "6.1": { + "cmt_id": "1fc8a2b14ef5223f8e0b95faba2ee0a6e4d0f99d", + "fixed_version": "6.1.29" + }, + "6.2": { + "cmt_id": "750a2d772e9d9ff377fd32e3b6797bf2cd847a7a", + "fixed_version": "6.2.16" + }, + "6.3": { + "cmt_id": "6775ee7ef4b37c521aa4cf3730f54554c4875542", + "fixed_version": "6.3.2" + } + }, + "CVE-2023-32248": { + "5.15": { + "cmt_id": "227eb2689b44d0d60da3839b146983e73435924c", + "fixed_version": "5.15.111" + }, + "6.1": { + "cmt_id": "a70751dd7b60eab025e97e19b6b2477c6eaf2bbb", + "fixed_version": "6.1.28" + }, + "6.2": { + "cmt_id": "b35f6c031b87d9e51f141ff6de0ea59756a8e313", + "fixed_version": "6.2.15" + }, + "6.3": { + "cmt_id": "1636e09779f83e10e6ed57d91ef94abcefdd206b", + "fixed_version": "6.3.2" + } + }, + "CVE-2023-32250": { + "5.15": { + "cmt_id": "708c304b583d789957399dd8237f212cf8ad1e4d", + "fixed_version": "5.15.145" + }, + "6.1": { + "cmt_id": "f623f627ad2b1dc215ab3b0df53fb05cfd3a1c3b", + "fixed_version": "6.1.29" + }, + "6.2": { + "cmt_id": "d270631c21e68fb8016d6e231d022d7023a2df6f", + "fixed_version": "6.2.16" + }, + "6.3": { + "cmt_id": "02f41d88f15d6b7d523e52cc3f87488f57e9265b", + "fixed_version": "6.3.2" + } + }, + "CVE-2023-32252": { + "5.15": { + "cmt_id": "708c304b583d789957399dd8237f212cf8ad1e4d", + "fixed_version": "5.15.145" + }, + "6.1": { + "cmt_id": "f623f627ad2b1dc215ab3b0df53fb05cfd3a1c3b", + "fixed_version": "6.1.29" + }, + "6.2": { + "cmt_id": "d270631c21e68fb8016d6e231d022d7023a2df6f", + "fixed_version": "6.2.16" + }, + "6.3": { + "cmt_id": "02f41d88f15d6b7d523e52cc3f87488f57e9265b", + "fixed_version": "6.3.2" + } + }, + "CVE-2023-32254": { + "5.15": { + "cmt_id": "b36295c17fb97424406f0c3ab321b1ccaabb9be8", + "fixed_version": "5.15.145" + }, + "6.1": { + "cmt_id": "bd80d35725a0cf4df9307bfe2f1a3b2cb983d8e6", + "fixed_version": "6.1.28" + }, + "6.2": { + "cmt_id": "dc1c17716c099c90948ebb83e2170dd75a3be6b6", + "fixed_version": "6.2.15" + }, + "6.3": { + "cmt_id": "39366b47a59d46af15ac57beb0996268bf911f6a", + "fixed_version": "6.3.2" + } + }, + "CVE-2023-32257": { + "5.15": { + "cmt_id": "708c304b583d789957399dd8237f212cf8ad1e4d", + "fixed_version": "5.15.145" + }, + "6.1": { + "cmt_id": "f623f627ad2b1dc215ab3b0df53fb05cfd3a1c3b", + "fixed_version": "6.1.29" + }, + "6.2": { + "cmt_id": "d270631c21e68fb8016d6e231d022d7023a2df6f", + "fixed_version": "6.2.16" + }, + "6.3": { + "cmt_id": "02f41d88f15d6b7d523e52cc3f87488f57e9265b", + "fixed_version": "6.3.2" + } + }, + "CVE-2023-32258": { + "5.15": { + "cmt_id": "ae06b798f72d6cc792cfa1745490be65da90eb03", + "fixed_version": "5.15.145" + }, + "6.1": { + "cmt_id": "4aba9ab6a007e41182454f84f95c0bddf7d6d7e1", + "fixed_version": "6.1.29" + }, + "6.2": { + "cmt_id": "de428966b40c8b8abe35592ded2e9f4d366ffc38", + "fixed_version": "6.2.16" + }, + "6.3": { + "cmt_id": "920d5dd2d041484bf001c9713c2e3bcc6de79726", + "fixed_version": "6.3.2" + } + }, + "CVE-2023-32269": { + "4.14": { + "cmt_id": "35d5bb094bc7529c15561289a1ea995f897bf2e6", + "fixed_version": "4.14.306" + }, + "4.19": { + "cmt_id": "2c1984d101978e979783bdb2376eb6eca9f8f627", + "fixed_version": "4.19.273" + }, + "5.10": { + "cmt_id": "dd6991251a1382a9b4984962a0c7a467e9d71812", + "fixed_version": "5.10.168" + }, + "5.15": { + "cmt_id": "c27e0eac568a008cdf04ae7e4ea2d3c18717e627", + "fixed_version": "5.15.93" + }, + "5.4": { + "cmt_id": "20355b9569bd1fd5a236898524b6dd4117e660d0", + "fixed_version": "5.4.232" + }, + "6.1": { + "cmt_id": "5c2227f3f17782d5262ee0979ad30609b3e01f6e", + "fixed_version": "6.1.11" + } + }, + "CVE-2023-3268": { + "4.19": { + "cmt_id": "ed32488417669568308b65ba5d45799418f9ed49", + "fixed_version": "4.19.283" + }, + "5.10": { + "cmt_id": "1b0df44753bf9e45eaf5cee34f87597193f862e8", + "fixed_version": "5.10.180" + }, + "5.15": { + "cmt_id": "0b46ee654a9dcd330e8183856b88505a9f633f7d", + "fixed_version": "5.15.111" + }, + "5.4": { + "cmt_id": "bc0905a76531fa10fd12d661328636453a36f4ce", + "fixed_version": "5.4.243" + }, + "6.1": { + "cmt_id": "f6ee841ff2169d7a7d045340ee72b2b9de9f06c5", + "fixed_version": "6.1.28" + }, + "6.2": { + "cmt_id": "c86ec32b864d5247602c71986e0494d12f6c4d70", + "fixed_version": "6.2.15" + }, + "6.3": { + "cmt_id": "35ca4fb494c0c9f226fbcfa1c1688e6cc1e5062e", + "fixed_version": "6.3.2" + } + }, + "CVE-2023-3269": { + "6.1": { + "cmt_id": "d6a5c7a1a6e52d4c46fe181237ca96cd46a42386", + "fixed_version": "6.1.37" + }, + "6.3": { + "cmt_id": "bce721f87edd54379120ffb85111357923f4f326", + "fixed_version": "6.3.11" + }, + "6.4": { + "cmt_id": "b11fa3d22ac0fbc0bfaa740b3b3669d43ec48503", + "fixed_version": "6.4.1" + } + }, + "CVE-2023-3312": { + "6.2": { + "cmt_id": "0dac12ab5780e293b8dc24e513f5c2bf9f93c524", + "fixed_version": "6.2.15" + }, + "6.3": { + "cmt_id": "d9bad836cf156ee87d577f0bd1ed01501b31a253", + "fixed_version": "6.3.2" + } + }, + "CVE-2023-3317": { + "6.2": { + "cmt_id": "f1d2977584eb315a88956e457de7c800cb010478", + "fixed_version": "6.2.15" + } + }, + "CVE-2023-33203": { + "4.14": { + "cmt_id": "aee129c0096e479eae92e2127f96f9d08f16ad8f", + "fixed_version": "4.14.312" + }, + "4.19": { + "cmt_id": "4bbc59ec4feb1ea8d5cb3d9d38d4cb1317943ea4", + "fixed_version": "4.19.280" + }, + "5.10": { + "cmt_id": "cb5879efde4f9b4de4248b835890df7b6c49ffbc", + "fixed_version": "5.10.177" + }, + "5.15": { + "cmt_id": "8c4a180dc12303159592d15e8f077c20deeb1e55", + "fixed_version": "5.15.105" + }, + "5.4": { + "cmt_id": "0e5c7d00ec4f2f359234044b809eb23b7032d9b0", + "fixed_version": "5.4.240" + }, + "6.1": { + "cmt_id": "5fc2c4e311a9341a2b0e044ab5f33afa37b56226", + "fixed_version": "6.1.22" + }, + "6.2": { + "cmt_id": "514dc3d0f176d280dc2d3cd25e898a7ec329e878", + "fixed_version": "6.2.9" + } + }, + "CVE-2023-33250": { + "6.3": { + "cmt_id": "1d2b603d938c898b5fd8da6e3d80184366ca6ea0", + "fixed_version": "6.3.13" + }, + "6.4": { + "cmt_id": "dbe65261fe1367dc307a89466a1a75c0d80b8233", + "fixed_version": "6.4.4" + } + }, + "CVE-2023-33288": { + "5.10": { + "cmt_id": "2b346876b93168541a45551d5f9abd1d26102e89", + "fixed_version": "5.10.177" + }, + "5.15": { + "cmt_id": "4ca3fd39c72efa250129d2af406c3bb56eec7dd9", + "fixed_version": "5.15.105" + }, + "6.1": { + "cmt_id": "84bdb3b76b07f2e62183913a1f5da2d4aa25580a", + "fixed_version": "6.1.22" + }, + "6.2": { + "cmt_id": "2da4b860f3055ae40a809c020398778e6c27b856", + "fixed_version": "6.2.9" + } + }, + "CVE-2023-3338": { + "4.14": { + "cmt_id": "975840f8dec3c1e6a6b28a387bb7cf55a4775e18", + "fixed_version": "4.14.319" + }, + "4.19": { + "cmt_id": "3e77bbc87342841db66c18a3afca0441c8c555e4", + "fixed_version": "4.19.287" + }, + "5.10": { + "cmt_id": "1c004b379b0327992c1713334198cf5eba29a4ba", + "fixed_version": "5.10.185" + }, + "5.15": { + "cmt_id": "2a974abc09761c05fef697fe229d1b85a7ce3918", + "fixed_version": "5.15.118" + }, + "5.4": { + "cmt_id": "6b1203ae83c3d07bad90b6f38ebf2e4d5998dd28", + "fixed_version": "5.4.248" + } + }, + "CVE-2023-3355": { + "5.15": { + "cmt_id": "436fb91cadb82da0b0b114baa4fc3b5ef7e6d557", + "fixed_version": "5.15.99" + }, + "6.1": { + "cmt_id": "31c4251a20fd7addc1bf4fe801f95f9ba1b38990", + "fixed_version": "6.1.16" + }, + "6.2": { + "cmt_id": "abadeef9a82f86e6668759259adbcf8be6f44a9b", + "fixed_version": "6.2.3" + } + }, + "CVE-2023-3357": { + "5.15": { + "cmt_id": "d238f94b2b61c77dd60db820aa683ff6a58c1543", + "fixed_version": "5.15.86" + }, + "6.0": { + "cmt_id": "677766555ebd63a81b642a0165eed0dfc63add23", + "fixed_version": "6.0.16" + }, + "6.1": { + "cmt_id": "8a37cf11dc78b71a5e0ef18aa33af41415b5ca38", + "fixed_version": "6.1.2" + } + }, + "CVE-2023-3358": { + "4.14": { + "cmt_id": "eaa86c4ae77e9c6c28e3c417539ebbee987be0c9", + "fixed_version": "4.14.305" + }, + "4.19": { + "cmt_id": "cc906a3a4432da143ab3d2e894f99ddeff500cd3", + "fixed_version": "4.19.272" + }, + "5.10": { + "cmt_id": "7b4516ba56f1fcb13ffc91912f3074e28362228d", + "fixed_version": "5.10.166" + }, + "5.15": { + "cmt_id": "c4cb73febe35f92f7a401f4cbc84f94c764732a9", + "fixed_version": "5.15.91" + }, + "5.4": { + "cmt_id": "97445814efcd0ba7a347b1463ba86bdf3cdc65aa", + "fixed_version": "5.4.231" + }, + "6.1": { + "cmt_id": "9a65e90179ba06eb299badc3e4dc4aa2b1e35af3", + "fixed_version": "6.1.9" + } + }, + "CVE-2023-3359": { + "6.1": { + "cmt_id": "f5249bbae0e736d612d2095ad79dc1389b3e89b5", + "fixed_version": "6.1.11" + } + }, + "CVE-2023-3390": { + "4.14": { + "cmt_id": "d19a80db742ceffc8d92a0cf78885f60d10c6a6d", + "fixed_version": "4.14.322" + }, + "4.19": { + "cmt_id": "798aa8da13782fe472aa48841c5570d7439339b8", + "fixed_version": "4.19.291" + }, + "5.10": { + "cmt_id": "8180fc2fadd48dde4966f2db2c716c2ce7510d0b", + "fixed_version": "5.10.188" + }, + "5.15": { + "cmt_id": "44ebe988cb38e720b91826f4d7c31692061ca04a", + "fixed_version": "5.15.118" + }, + "5.4": { + "cmt_id": "1adb5c272b200c24e9a7dd3bff891ce6eb75b019", + "fixed_version": "5.4.251" + }, + "6.1": { + "cmt_id": "4aaa3b730d16c13cc3feaa127bfca1af201d969d", + "fixed_version": "6.1.35" + }, + "6.3": { + "cmt_id": "bdace3b1a51887211d3e49417a18fdbd315a313b", + "fixed_version": "6.3.9" + } + }, + "CVE-2023-33951": { + "6.1": { + "cmt_id": "0a127ac972404600c99eb141c8d5b5348e53ee4f", + "fixed_version": "6.1.13" + }, + "6.2": { + "cmt_id": "a950b989ea29ab3b38ea7f6e3d2540700a3c54e8", + "fixed_version": "6.2" + }, + "6.3": { + "cmt_id": "a950b989ea29ab3b38ea7f6e3d2540700a3c54e8", + "fixed_version": "6.3-rc1" + } + }, + "CVE-2023-33952": { + "6.1": { + "cmt_id": "0a127ac972404600c99eb141c8d5b5348e53ee4f", + "fixed_version": "6.1.13" + }, + "6.2": { + "cmt_id": "a950b989ea29ab3b38ea7f6e3d2540700a3c54e8", + "fixed_version": "6.2" + }, + "6.3": { + "cmt_id": "a950b989ea29ab3b38ea7f6e3d2540700a3c54e8", + "fixed_version": "6.3-rc1" + } + }, + "CVE-2023-34255": { + "5.10": { + "cmt_id": "0e98a97f772f2ffcee8ced7a49b71e72916e0aa1", + "fixed_version": "5.10.184" + }, + "5.15": { + "cmt_id": "6cfe9ddb6aa698464fa16fb77a0233f68c13360c", + "fixed_version": "5.15.117" + }, + "5.4": { + "cmt_id": "c87439055174b31c51a89f8d66af2600033c664d", + "fixed_version": "5.4.249" + }, + "6.1": { + "cmt_id": "a2961463d74f5c86a8dda3b41c484c28ccc4c289", + "fixed_version": "6.1.33" + }, + "6.3": { + "cmt_id": "69ebe82c73f4f9f4b49ed3b35ce347af20716d0a", + "fixed_version": "6.3.7" + } + }, + "CVE-2023-34256": { + "4.14": { + "cmt_id": "64b7487e3769e013fc7edb3804d1a769747f0228", + "fixed_version": "4.14.315" + }, + "4.19": { + "cmt_id": "a733c466cedd1013a41fd8908d5810f2c161072f", + "fixed_version": "4.19.283" + }, + "5.10": { + "cmt_id": "0dde3141c527b09b96bef1e7eeb18b8127810ce9", + "fixed_version": "5.10.180" + }, + "5.15": { + "cmt_id": "6d9a705a653eb146b4991dbd198b258f787c70b1", + "fixed_version": "5.15.112" + }, + "5.4": { + "cmt_id": "4f4fd982d972a55dee129f7da517b81fa16c408d", + "fixed_version": "5.4.243" + }, + "6.1": { + "cmt_id": "1fffe4750500148f3e744ed77cf233db8342603f", + "fixed_version": "6.1.29" + }, + "6.2": { + "cmt_id": "c06f5f1ecab83772b1e06ea5dcfe5ebb5927a43f", + "fixed_version": "6.2.16" + }, + "6.3": { + "cmt_id": "be7b6374a2ee8a59c1ff5addcbe25ebc1b4efd9f", + "fixed_version": "6.3.3" + } + }, + "CVE-2023-34319": { + "4.14": { + "cmt_id": "e1142d87c185c7d7bbf05d175754638b5b9dbf16", + "fixed_version": "4.14.321" + }, + "4.19": { + "cmt_id": "11e6919ae028b5de1fc48007354ea07069561b31", + "fixed_version": "4.19.290" + }, + "5.10": { + "cmt_id": "f9167a2d6b943f30743de6ff8163d1981c34f9a9", + "fixed_version": "5.10.189" + }, + "5.15": { + "cmt_id": "b14a3924c2675c22e07a5a190223b6b6cdc2867d", + "fixed_version": "5.15.125" + }, + "5.4": { + "cmt_id": "bc7b9a6c2ca42b116b0f24dbaa52b5a07d96d1d6", + "fixed_version": "5.4.252" + }, + "6.1": { + "cmt_id": "fa5b932b77c815d0e416612859d5899424bb4212", + "fixed_version": "6.1.44" + }, + "6.4": { + "cmt_id": "cf482893f721f76ac60c0a43482a59b2f194156b", + "fixed_version": "6.4.9" + } + }, + "CVE-2023-34324": { + "4.14": { + "cmt_id": "bc32110d6176cc34c58f4efa22194546f103b81a", + "fixed_version": "4.14.327" + }, + "4.19": { + "cmt_id": "3fdf2be9089b5096a28e76376656c60ce410ac4a", + "fixed_version": "4.19.296" + }, + "5.10": { + "cmt_id": "660627c71bc1098aa94e5f208f14748b105b73bc", + "fixed_version": "5.10.198" + }, + "5.15": { + "cmt_id": "c8af81a9d36e0d2e5f198eaceb38a743d834dfe2", + "fixed_version": "5.15.135" + }, + "5.4": { + "cmt_id": "f70c285cf02c2430da74c58b8a177fcb5df6ca43", + "fixed_version": "5.4.258" + }, + "6.1": { + "cmt_id": "a4cc925e2e12c3bbffb0860acdb9f9c1abde47dd", + "fixed_version": "6.1.57" + }, + "6.5": { + "cmt_id": "76b33722e2d2336a6e2a7d9eacbbb8988478cf98", + "fixed_version": "6.5.7" + } + }, + "CVE-2023-3439": { + "5.17": { + "cmt_id": "019e80a7f71e8e62efda501081172dc70b5a635a", + "fixed_version": "5.17.6" + } + }, + "CVE-2023-35001": { + "4.14": { + "cmt_id": "185a79c8be264720b0b89ce2cc42ca2582dbce6f", + "fixed_version": "4.14.322" + }, + "4.19": { + "cmt_id": "025fd7efe2639773540a5e425b7bc0dc10b6b023", + "fixed_version": "4.19.291" + }, + "5.10": { + "cmt_id": "ea213922249c7e448d217a0a0441c6f86a8155fd", + "fixed_version": "5.10.188" + }, + "5.15": { + "cmt_id": "870dcc31c0cf47cb15a568ade4168dc644b3ccfb", + "fixed_version": "5.15.121" + }, + "5.4": { + "cmt_id": "b7d636c924eb275651bfb036eb8eca49c3f7bc24", + "fixed_version": "5.4.251" + }, + "6.1": { + "cmt_id": "40f83dd66a823400d8592e3b71e190e3ad978eb5", + "fixed_version": "6.1.39" + }, + "6.4": { + "cmt_id": "b79c09c2bf2d7643902a6ef26152de602c5c5e4b", + "fixed_version": "6.4.4" + } + }, + "CVE-2023-3567": { + "4.14": { + "cmt_id": "af79ea9a2443016f64d8fd8d72020cc874f0e066", + "fixed_version": "4.14.329" + }, + "4.19": { + "cmt_id": "6332f52f44b9776568bf3c0b714ddfb0bb175e78", + "fixed_version": "4.19.273" + }, + "5.10": { + "cmt_id": "55515d7d8743b71b80bfe68e89eb9d92630626ab", + "fixed_version": "5.10.168" + }, + "5.15": { + "cmt_id": "fc9e27f3ba083534b8bbf72ab0f5c810ffdc7d18", + "fixed_version": "5.15.93" + }, + "5.4": { + "cmt_id": "d0332cbf53dad06a22189cc341391237f4ea6d9f", + "fixed_version": "5.4.232" + }, + "6.1": { + "cmt_id": "8506f16aae9daf354e3732bcfd447e2a97f023df", + "fixed_version": "6.1.11" + } + }, + "CVE-2023-35788": { + "4.19": { + "cmt_id": "59a27414bb00e48c4153a8b794fb4e69910a6a1b", + "fixed_version": "4.19.285" + }, + "5.10": { + "cmt_id": "7c5c67aa294444b53f697dc3ddce61b33ff8badd", + "fixed_version": "5.10.183" + }, + "5.15": { + "cmt_id": "45f47d2cf1142fbfe5d6fc39ad78f4aac058907c", + "fixed_version": "5.15.116" + }, + "5.4": { + "cmt_id": "94a00f1142c581fe01d17d7beca314592f85e83a", + "fixed_version": "5.4.246" + }, + "6.1": { + "cmt_id": "eac615ed3c6d91f1196f16f0a0599fff479cb220", + "fixed_version": "6.1.33" + }, + "6.3": { + "cmt_id": "900fab73a9cd3dd6a3a69f89980f8f3c9a738d5a", + "fixed_version": "6.3.7" + } + }, + "CVE-2023-35823": { + "4.19": { + "cmt_id": "95e684340470a95ff4957cb9a536ec7a0461c75b", + "fixed_version": "4.19.283" + }, + "5.10": { + "cmt_id": "7dac96e9cc985328ec1fae92f0c245f559dc0e11", + "fixed_version": "5.10.180" + }, + "5.15": { + "cmt_id": "2f48c0a463a37ac76ac089ec7936f673b9a0a448", + "fixed_version": "5.15.111" + }, + "5.4": { + "cmt_id": "a4b6ab360f56ccdcde29eab29f493d8c464c3ffb", + "fixed_version": "5.4.243" + }, + "6.1": { + "cmt_id": "5a72aea9acfe945353fb3a2f141f4e526a5f3684", + "fixed_version": "6.1.28" + }, + "6.2": { + "cmt_id": "efccd54c41887e66a03bf7af860ff5eb77c47fcf", + "fixed_version": "6.2.15" + }, + "6.3": { + "cmt_id": "3a60e51489a3ec61565f5bc53f726ac9ccc6083c", + "fixed_version": "6.3.2" + } + }, + "CVE-2023-35824": { + "4.14": { + "cmt_id": "df01f9c146ce2134de4daf393e29e18d6d5866ec", + "fixed_version": "4.14.315" + }, + "4.19": { + "cmt_id": "722c156c6eab40a6e7dda98dfa66724f9d5aeceb", + "fixed_version": "4.19.283" + }, + "5.10": { + "cmt_id": "e9d64e90a0ada4d00ac6562e351ef10ae7d9b911", + "fixed_version": "5.10.180" + }, + "5.15": { + "cmt_id": "c94388b5b9098db82d6ba4627ef6e41a35870818", + "fixed_version": "5.15.111" + }, + "5.4": { + "cmt_id": "cd1583caed7ea879ecb638ed876960e41363b7b6", + "fixed_version": "5.4.243" + }, + "6.1": { + "cmt_id": "305262a23c949010a056bd81b6e84051fd72a567", + "fixed_version": "6.1.28" + }, + "6.2": { + "cmt_id": "ad998076d42b394ca22e41e91c59a6056be6098d", + "fixed_version": "6.2.15" + }, + "6.3": { + "cmt_id": "d730bc84064364cafdb20c6ee7fda2cd7416407a", + "fixed_version": "6.3.2" + } + }, + "CVE-2023-35826": { + "6.1": { + "cmt_id": "2cdc8f729d953143b3bbdc56841bb6800752de7f", + "fixed_version": "6.1.28" + }, + "6.2": { + "cmt_id": "a858e35c62966761cc2bed2e4123cf68d7df546c", + "fixed_version": "6.2.15" + }, + "6.3": { + "cmt_id": "565c863bd982584aa4393f7bdb345dbccb3ad488", + "fixed_version": "6.3.2" + } + }, + "CVE-2023-35827": { + "5.10": { + "cmt_id": "db9aafa19547833240f58c2998aed7baf414dc82", + "fixed_version": "5.10.199" + }, + "5.15": { + "cmt_id": "616761cf9df9af838c0a1a1232a69322a9eb67e6", + "fixed_version": "5.15.136" + }, + "5.4": { + "cmt_id": "65d34cfd4e347054eb4193bc95d9da7eaa72dee5", + "fixed_version": "5.4.259" + }, + "6.1": { + "cmt_id": "6f6fa8061f756aedb93af12a8a5d3cf659127965", + "fixed_version": "6.1.59" + }, + "6.5": { + "cmt_id": "105abd68ad8f781985113aee2e92e0702b133705", + "fixed_version": "6.5.8" + } + }, + "CVE-2023-35828": { + "4.19": { + "cmt_id": "ad03fe033a71ed1fd2cb68a067198ae0e342f991", + "fixed_version": "4.19.283" + }, + "5.10": { + "cmt_id": "36c237b202a406ba441892eabcf44e60dae7ad73", + "fixed_version": "5.10.180" + }, + "5.15": { + "cmt_id": "1e58fb6b1cef4d5e552a0c3038bf946890af6f3b", + "fixed_version": "5.15.111" + }, + "5.4": { + "cmt_id": "0fee5030c09401818c17be0786f2684c1cc1e440", + "fixed_version": "5.4.243" + }, + "6.1": { + "cmt_id": "df2380520926bdbc264cffab0f45da9a21f304c8", + "fixed_version": "6.1.28" + }, + "6.2": { + "cmt_id": "1029639643c326396ce8e07a9f52ce7165c021c3", + "fixed_version": "6.2.15" + }, + "6.3": { + "cmt_id": "231598b40a070a6bf780c0df1ff5ae3e57102900", + "fixed_version": "6.3.2" + } + }, + "CVE-2023-35829": { + "5.10": { + "cmt_id": "de19d02d734ef29f5dbd2c12fe810fa960ecd83f", + "fixed_version": "5.10.180" + }, + "5.15": { + "cmt_id": "cac0f4f36e226c79c83d01dddc049ac59d2de157", + "fixed_version": "5.15.111" + }, + "6.1": { + "cmt_id": "6a17add9c61030683b9c1fc86878f00a2d318a95", + "fixed_version": "6.1.28" + }, + "6.2": { + "cmt_id": "26f55569eeb045db9fceda0a5523521c2e76d8aa", + "fixed_version": "6.2.15" + }, + "6.3": { + "cmt_id": "2115e94838adc9d1e7b75043c9f26abcc910f6fb", + "fixed_version": "6.3.2" + } + }, + "CVE-2023-3609": { + "4.14": { + "cmt_id": "a7f178f8439e939efdd12d190783eb0fabf5990d", + "fixed_version": "4.14.322" + }, + "4.19": { + "cmt_id": "8ffaf24a377519e4396f03da5ccda082edae1ac9", + "fixed_version": "4.19.291" + }, + "5.10": { + "cmt_id": "af6eaa57986e82d7efd81984ee607927c6de61e4", + "fixed_version": "5.10.185" + }, + "5.15": { + "cmt_id": "0e1098d72fa462944c68262e1b5cca045dcb555e", + "fixed_version": "5.15.118" + }, + "5.4": { + "cmt_id": "46305daf8064598a4008af1728651296815a74ed", + "fixed_version": "5.4.248" + }, + "6.1": { + "cmt_id": "07f9cc229b44cbcee6385802d390091d915f38c3", + "fixed_version": "6.1.35" + }, + "6.3": { + "cmt_id": "4efd555a43dc24f3342bcc036522c430f5869e6f", + "fixed_version": "6.3.9" + } + }, + "CVE-2023-3610": { + "5.10": { + "cmt_id": "d53c295c1f43b7460d28ba0f0f98a602084fdcb6", + "fixed_version": "5.10.188" + }, + "5.15": { + "cmt_id": "314a8697d08092df6d00521450d44c352c602943", + "fixed_version": "5.15.119" + }, + "6.1": { + "cmt_id": "891cd2edddc76c58e842706ad27e2ff96000bd5d", + "fixed_version": "6.1.36" + }, + "6.3": { + "cmt_id": "a1547f81341f14b1b355df04218152e8b5d4b264", + "fixed_version": "6.3.10" + }, + "6.4": { + "cmt_id": "4bedf9eee016286c835e3d8fa981ddece5338795", + "fixed_version": "6.4" + } + }, + "CVE-2023-3611": { + "4.14": { + "cmt_id": "c3f21ea515cb4ad7db86ddb511cead2f09e1c1e6", + "fixed_version": "4.14.322" + }, + "4.19": { + "cmt_id": "ee3bc829f9b4df96d208d58b654e400fa1f3b46c", + "fixed_version": "4.19.291" + }, + "5.10": { + "cmt_id": "8359ee85fd6dabc5c134ed69fb22faadd8a44071", + "fixed_version": "5.10.188" + }, + "5.15": { + "cmt_id": "91d3554ab1fc2804c36a815c0f79502d727a41e6", + "fixed_version": "5.15.121" + }, + "5.4": { + "cmt_id": "cf8ecd6ea68099a38e94e9b82cf58f6fd4cdf3c9", + "fixed_version": "5.4.253" + }, + "6.1": { + "cmt_id": "70feebdbfad85772ab3ef152812729cab5c6c426", + "fixed_version": "6.1.40" + }, + "6.4": { + "cmt_id": "bd2333fa86dc520823e8c317980b29ba91ee6b87", + "fixed_version": "6.4.5" + } + }, + "CVE-2023-37453": { + "6.4": { + "cmt_id": "b4a074b1fb222164ed7d5c0b8c922dc4a0840848", + "fixed_version": "6.4.16" + }, + "6.5": { + "cmt_id": "b9fbfb349eacc0820f91c797d7f0a3ac7a4935b5", + "fixed_version": "6.5.3" + } + }, + "CVE-2023-3772": { + "4.14": { + "cmt_id": "ed1cba039309c80b49719fcff3e3d7cdddb73d96", + "fixed_version": "4.14.324" + }, + "4.19": { + "cmt_id": "44f69c96f8a147413c23c68cda4d6fb5e23137cd", + "fixed_version": "4.19.293" + }, + "5.10": { + "cmt_id": "bd30aa9c7febb6e709670cd5154194189ca3b7b5", + "fixed_version": "5.10.192" + }, + "5.15": { + "cmt_id": "075448a2eb753f813fe873cfa52853e9fef8eedb", + "fixed_version": "5.15.128" + }, + "5.4": { + "cmt_id": "8046beb890ebc83c5820188c650073e1c6066e67", + "fixed_version": "5.4.255" + }, + "6.1": { + "cmt_id": "87b655f4936b6fc01f3658aa88a22c923b379ebd", + "fixed_version": "6.1.47" + }, + "6.4": { + "cmt_id": "53df4be4f5221e90dc7aa9ce745a9a21bb7024f4", + "fixed_version": "6.4.12" + } + }, + "CVE-2023-3773": { + "6.1": { + "cmt_id": "a442cd17019385c53bbddf3bb92d91474081916b", + "fixed_version": "6.1.47" + }, + "6.4": { + "cmt_id": "a9020514f175ef15bb68eea9345782abfd9afea3", + "fixed_version": "6.4.12" + } + }, + "CVE-2023-3776": { + "4.14": { + "cmt_id": "fa020e39526994c7248f241f75d615b0df5d7671", + "fixed_version": "4.14.322" + }, + "4.19": { + "cmt_id": "612f468cfc3df83777ae21058419b1fc8e9037eb", + "fixed_version": "4.19.291" + }, + "5.10": { + "cmt_id": "80e0e8d5f54397c5048fa2274144134dd9dc91b5", + "fixed_version": "5.10.188" + }, + "5.15": { + "cmt_id": "5b55f2d6ef403fcda93ae4eb4d8c1ba164c66e92", + "fixed_version": "5.15.121" + }, + "5.4": { + "cmt_id": "808211a8d427404331e39e3b8c94ab5242eef8f5", + "fixed_version": "5.4.251" + }, + "6.1": { + "cmt_id": "c91fb29bb07ee4dd40aabd1e41f19c0f92ac3199", + "fixed_version": "6.1.40" + }, + "6.4": { + "cmt_id": "0a2e3f49febda459252f58cec2d659623d582800", + "fixed_version": "6.4.5" + } + }, + "CVE-2023-3777": { + "5.10": { + "cmt_id": "30e5460d69e631c0e84db37dba2d8f98648778d4", + "fixed_version": "5.10.188" + }, + "5.15": { + "cmt_id": "10013f764ad2957de08968bd02870b6b7683e3f6", + "fixed_version": "5.15.123" + }, + "6.1": { + "cmt_id": "e18922ce3e3169eb97838d1dcba2d679bcca446c", + "fixed_version": "6.1.42" + }, + "6.4": { + "cmt_id": "ab87c6b43822a56ae0aadc715364b5f8d4a96037", + "fixed_version": "6.4.7" + } + }, + "CVE-2023-3812": { + "4.19": { + "cmt_id": "aa815bf32acf560dad63c3dc46bc7b98ca9a9672", + "fixed_version": "4.19.265" + }, + "5.10": { + "cmt_id": "3583826b443a63681deaa855048d3f2b742af47e", + "fixed_version": "5.10.154" + }, + "5.15": { + "cmt_id": "dcc79cf735b8ec4bedaa82c53bed8c62721c042b", + "fixed_version": "5.15.78" + }, + "5.4": { + "cmt_id": "ca791952d42c5b40d548ff6c4a879216039b0ca1", + "fixed_version": "5.4.224" + }, + "6.0": { + "cmt_id": "d24ba55946e6bdcfacae989638621d7728ee0ec8", + "fixed_version": "6.0.8" + } + }, + "CVE-2023-38409": { + "6.1": { + "cmt_id": "b15df140fe092c3ac28dab32c6b3acdda1a93c63", + "fixed_version": "6.1.25" + }, + "6.2": { + "cmt_id": "62055fa6fbf8f1f1457f5d6a7d17ce1a45972613", + "fixed_version": "6.2.12" + } + }, + "CVE-2023-38426": { + "5.15": { + "cmt_id": "865be1cff2c038984fe55c9deae5461a498cfdf9", + "fixed_version": "5.15.113" + }, + "6.1": { + "cmt_id": "75378b03a90d75b1349bb03577ac8465194c883e", + "fixed_version": "6.1.30" + }, + "6.3": { + "cmt_id": "0adcdc220fa555935bb37a273f08956616f8601a", + "fixed_version": "6.3.4" + } + }, + "CVE-2023-38427": { + "5.15": { + "cmt_id": "4adb4fbd74812aeada97e7cc6de3dad41952443e", + "fixed_version": "5.15.145" + }, + "6.1": { + "cmt_id": "bf12d7fb63b365fb766655cedcb5d5f292b0c35e", + "fixed_version": "6.1.34" + }, + "6.3": { + "cmt_id": "205279b96b5c40c60c6de4f9342416e02ee279f1", + "fixed_version": "6.3.8" + } + }, + "CVE-2023-38428": { + "5.15": { + "cmt_id": "7657321b2624197840ef2cfa4f29ccf873d7aa9b", + "fixed_version": "5.15.113" + }, + "6.1": { + "cmt_id": "40d90ee0275a1bfcd26fa7690adc4330b4227a69", + "fixed_version": "6.1.30" + }, + "6.3": { + "cmt_id": "3df195fbddfae60ca24a9bbc209402d9fccdef68", + "fixed_version": "6.3.4" + } + }, + "CVE-2023-38429": { + "5.15": { + "cmt_id": "61e043326e72b5abb02b5bc9132f2620a7faf8c5", + "fixed_version": "5.15.113" + }, + "6.1": { + "cmt_id": "af7335a4b946f9f6f9d98398cbcea15cd9850409", + "fixed_version": "6.1.30" + }, + "6.3": { + "cmt_id": "778aae5a513ea09aa5addfa352bd70a5b71dda85", + "fixed_version": "6.3.4" + } + }, + "CVE-2023-38430": { + "5.15": { + "cmt_id": "0d1a3f97efbe73fe6d6c18574e6ac94cd2492c11", + "fixed_version": "5.15.145" + }, + "6.1": { + "cmt_id": "e01fc7caac9ce9ad76df9f42f7f61ef4bf1d27c9", + "fixed_version": "6.1.35" + }, + "6.3": { + "cmt_id": "75e7d81679ef7995422adc84ef597fded99c24a6", + "fixed_version": "6.3.9" + } + }, + "CVE-2023-38431": { + "5.15": { + "cmt_id": "df3a4518aee64f21bcafa891105b468413f27431", + "fixed_version": "5.15.145" + }, + "6.1": { + "cmt_id": "543c12c2644e772caa6880662c2a852cfdc5a10c", + "fixed_version": "6.1.34" + }, + "6.3": { + "cmt_id": "e9cb7be2fcbaee9e808b729e92948d38d52e5add", + "fixed_version": "6.3.8" + } + }, + "CVE-2023-38432": { + "5.15": { + "cmt_id": "35f450f54dca1519bb24faacd0428db09f89a11f", + "fixed_version": "5.15.121" + }, + "6.1": { + "cmt_id": "9650cf70ec9d94ff34daa088b643229231723c26", + "fixed_version": "6.1.36" + }, + "6.3": { + "cmt_id": "768caf4019f0391c0b6452afe34cea1704133f7b", + "fixed_version": "6.3.10" + }, + "6.4": { + "cmt_id": "2b9b8f3b68edb3d67d79962f02e26dbb5ae3808d", + "fixed_version": "6.4" + } + }, + "CVE-2023-3863": { + "5.10": { + "cmt_id": "96f2c6f272ec04083d828de46285a7d7b17d1aad", + "fixed_version": "5.10.188" + }, + "5.15": { + "cmt_id": "fc8429f8d86801f092fbfbd257c3af821ac0dcd3", + "fixed_version": "5.15.121" + }, + "5.4": { + "cmt_id": "dd6ff3f3862709ab1a12566e73b9d6a9b8f6e548", + "fixed_version": "5.4.251" + }, + "6.1": { + "cmt_id": "425d9d3a92df7d96b3cfb7ee5c240293a21cbde3", + "fixed_version": "6.1.39" + }, + "6.3": { + "cmt_id": "b3ad46e155a6d91b36c6e892019a43e3ef3c696d", + "fixed_version": "6.3.13" + }, + "6.4": { + "cmt_id": "e5207c1d69b1a9707615ab6ff9376e59fc096815", + "fixed_version": "6.4.4" + } + }, + "CVE-2023-3865": { + "5.15": { + "cmt_id": "3813eee5154d6a4c5875cb4444cb2b63bac8947f", + "fixed_version": "5.15.121" + }, + "6.1": { + "cmt_id": "c86211159bc3178b891e0d60e586a32c7b6a231b", + "fixed_version": "6.1.36" + }, + "6.3": { + "cmt_id": "58a9c41064df27632e780c5a3ae3e0e4284957d1", + "fixed_version": "6.3.10" + }, + "6.4": { + "cmt_id": "5fe7f7b78290638806211046a99f031ff26164e1", + "fixed_version": "6.4" + } + }, + "CVE-2023-3866": { + "5.15": { + "cmt_id": "eb947403518ea3d93f6d89264bb1f5416bb0c7d0", + "fixed_version": "5.15.121" + }, + "6.1": { + "cmt_id": "854156d12caa9d36de1cf5f084591c7686cc8a9d", + "fixed_version": "6.1.36" + }, + "6.3": { + "cmt_id": "d1066c1b3663401cd23c0d6e60cdae750ce00c0f", + "fixed_version": "6.3.10" + }, + "6.4": { + "cmt_id": "5005bcb4219156f1bf7587b185080ec1da08518e", + "fixed_version": "6.4" + } + }, + "CVE-2023-3867": { + "5.15": { + "cmt_id": "97f5c1e3086c8ba1473c265d9a5523cc9ef5579e", + "fixed_version": "5.15.145" + }, + "6.1": { + "cmt_id": "869ef4f2965bbb91157dad220133f76c16faba9b", + "fixed_version": "6.1.40" + }, + "6.4": { + "cmt_id": "ffaa0c85edd9245594a94918c09db9163b71767a", + "fixed_version": "6.4.5" + } + }, + "CVE-2023-39189": { + "4.19": { + "cmt_id": "40d427ffccf9e60bd7288ea3748c066404a35622", + "fixed_version": "4.19.295" + }, + "5.10": { + "cmt_id": "780f60dde29692c42091602fee9c25e9e391f3dc", + "fixed_version": "5.10.195" + }, + "5.15": { + "cmt_id": "19280e8dfb52cf9660760fdc86e606e0653170fa", + "fixed_version": "5.15.132" + }, + "5.4": { + "cmt_id": "a44602888bbe89d9dd89cb84baed2e356aba7436", + "fixed_version": "5.4.257" + }, + "6.1": { + "cmt_id": "7bb8d52b4271be7527b6e3120ae6ce4c6cdf6e34", + "fixed_version": "6.1.54" + }, + "6.5": { + "cmt_id": "a3d0f898b80ac9b049e590b3ee6391716002da17", + "fixed_version": "6.5.4" + } + }, + "CVE-2023-39191": { + "6.2": { + "cmt_id": "720d2504791a93becde81c335abcea2f42d066a7", + "fixed_version": "6.2.3" + } + }, + "CVE-2023-39192": { + "4.14": { + "cmt_id": "e416d65ff456066d60d813c540ab2dd2a06d3d12", + "fixed_version": "4.14.326" + }, + "4.19": { + "cmt_id": "ddf190be80ef0677629416a128f9da91e5800d21", + "fixed_version": "4.19.295" + }, + "5.10": { + "cmt_id": "a1b711c370f5269f4e81a07e7542e351c0c4682e", + "fixed_version": "5.10.195" + }, + "5.15": { + "cmt_id": "b3d07714ad24e51ff6fc6dced3bd3d960e99ac25", + "fixed_version": "5.15.132" + }, + "5.4": { + "cmt_id": "28ce8495b5599abaa4b4f0bbb45f1f8e89b07e15", + "fixed_version": "5.4.257" + }, + "6.1": { + "cmt_id": "1c164c1e9e93b0a72a03a7edb754e3857d4e4302", + "fixed_version": "6.1.53" + }, + "6.4": { + "cmt_id": "83b995321eaaa0176041d9d79c7d0415cb6ed7e1", + "fixed_version": "6.4.16" + }, + "6.5": { + "cmt_id": "799cc0fb184408f688b030ea381844b16d1d9c62", + "fixed_version": "6.5.3" + } + }, + "CVE-2023-39193": { + "4.14": { + "cmt_id": "be52e3c14651ade0f4539f319f9f0c40a230b076", + "fixed_version": "4.14.326" + }, + "4.19": { + "cmt_id": "f25dbfadaf525d854597c16420dd753ca47b9396", + "fixed_version": "4.19.295" + }, + "5.10": { + "cmt_id": "5541827d13cf19b905594eaee586527476efaa61", + "fixed_version": "5.10.195" + }, + "5.15": { + "cmt_id": "267a29f8bfdb949ad2a03a3b6d7ad42aeb4c2bab", + "fixed_version": "5.15.132" + }, + "5.4": { + "cmt_id": "64831fb6a2040c25473ff8c8e85b3a42bd38494c", + "fixed_version": "5.4.257" + }, + "6.1": { + "cmt_id": "4921f9349b66da7c5a2b6418fe45e9ae0ae72924", + "fixed_version": "6.1.53" + }, + "6.4": { + "cmt_id": "b63b4e114593073a1c25087526782258c9dd5347", + "fixed_version": "6.4.16" + }, + "6.5": { + "cmt_id": "85ebbbe845823be6f8c04b4901da9a0a6f866283", + "fixed_version": "6.5.3" + } + }, + "CVE-2023-39194": { + "4.14": { + "cmt_id": "0a42d1335985f9ebfbc997944ba8b1d84b9b661e", + "fixed_version": "4.14.324" + }, + "4.19": { + "cmt_id": "a695f0e724330773283a6d67e149363b89087f76", + "fixed_version": "4.19.293" + }, + "5.10": { + "cmt_id": "7e50815d29037e08d3d26f3ebc41bcec729847b7", + "fixed_version": "5.10.192" + }, + "5.15": { + "cmt_id": "1960f468078b3471d1ee9aafa0cf06c8c34a505f", + "fixed_version": "5.15.128" + }, + "5.4": { + "cmt_id": "373848d51fde9138cdc539b1d97dc6b301cc04d5", + "fixed_version": "5.4.255" + }, + "6.1": { + "cmt_id": "9a0056276f5f38e188732bd7b6949edca6a80ea1", + "fixed_version": "6.1.47" + }, + "6.4": { + "cmt_id": "5713c7ca31f563a493281c25cbdbd3f4ef53a9e9", + "fixed_version": "6.4.12" + } + }, + "CVE-2023-39197": { + "5.10": { + "cmt_id": "9bdcda7abaf22f6453e5b5efb7eb4e524095d5d8", + "fixed_version": "5.10.188" + }, + "5.15": { + "cmt_id": "c052797ac36813419ad3bfa54cb8615db4b41f15", + "fixed_version": "5.15.121" + }, + "5.4": { + "cmt_id": "337fdce450637ea663bc816edc2ba81e5cdad02e", + "fixed_version": "5.4.251" + }, + "6.1": { + "cmt_id": "5c618daa5038712c4a4ef8923905a2ea1b8836a1", + "fixed_version": "6.1.39" + }, + "6.3": { + "cmt_id": "26bd1f210d3783a691052c51d76bb8a8bbd24c67", + "fixed_version": "6.3.13" + }, + "6.4": { + "cmt_id": "8c0980493beed3a80d6329c44ab293dc8c032927", + "fixed_version": "6.4.4" + } + }, + "CVE-2023-39198": { + "5.10": { + "cmt_id": "03585b18b715621a64ced023ca8c1fc36b6b2119", + "fixed_version": "5.10.208" + }, + "5.15": { + "cmt_id": "d578c919deb786b4d6ba8c7639255cb658731671", + "fixed_version": "5.15.128" + }, + "6.1": { + "cmt_id": "a1fa8f0fc58e0ec972f718030710efc442d7304b", + "fixed_version": "6.1.47" + }, + "6.4": { + "cmt_id": "a79aebe5bb68266ce9c7f8714fad166a3216460d", + "fixed_version": "6.4.12" + } + }, + "CVE-2023-4004": { + "5.10": { + "cmt_id": "3a91099ecd59a42d1632fcb152bf7222f268ea2b", + "fixed_version": "5.10.188" + }, + "5.15": { + "cmt_id": "706ce3c81b5c8e262a8bcf116ea689d0710c3a13", + "fixed_version": "5.15.123" + }, + "6.1": { + "cmt_id": "90c3955beb858bb52a9e5c4380ed0e520e3730d1", + "fixed_version": "6.1.42" + }, + "6.4": { + "cmt_id": "48dbb5d24c667bf26bc2fea8caa7fe51fcc6aa62", + "fixed_version": "6.4.7" + } + }, + "CVE-2023-4015": { + "5.10": { + "cmt_id": "ab5a97a94b57324df76d659686ac2d30494170e6", + "fixed_version": "5.10.190" + }, + "5.15": { + "cmt_id": "98bcfcaecc76c4be288278c213b47d36292f40fa", + "fixed_version": "5.15.124" + }, + "6.1": { + "cmt_id": "4237462a073e24f71c700f3e5929f07b6ee1bcaa", + "fixed_version": "6.1.43" + }, + "6.4": { + "cmt_id": "027d00132487bcf2a4ee7493bb8de9d6331d48e3", + "fixed_version": "6.4.8" + } + }, + "CVE-2023-40283": { + "4.14": { + "cmt_id": "51822644a047eac2310fab0799b64e3430b5a111", + "fixed_version": "4.14.322" + }, + "4.19": { + "cmt_id": "82cdb2ccbe43337798393369f0ceb98699fe6037", + "fixed_version": "4.19.291" + }, + "5.10": { + "cmt_id": "06f87c96216bc5cd1094c23492274f77f1d5dd3b", + "fixed_version": "5.10.190" + }, + "5.15": { + "cmt_id": "fbe5a2fed8156cc19eb3b956602b0a1dd46a302d", + "fixed_version": "5.15.126" + }, + "5.4": { + "cmt_id": "a2da00d1ea1abfb04f846638e210b5b5166e3c9c", + "fixed_version": "5.4.253" + }, + "6.1": { + "cmt_id": "29fac18499332211b2615ade356e2bd8b3269f98", + "fixed_version": "6.1.45" + }, + "6.4": { + "cmt_id": "10426afe65c8bf7b24dd0c7be4dcc65f86fc99f9", + "fixed_version": "6.4.10" + } + }, + "CVE-2023-40791": { + "6.4": { + "cmt_id": "0ba71114c3af9fa44a474d16a12cecd12e3779b9", + "fixed_version": "6.4.12" + } + }, + "CVE-2023-4128": { + "4.14": { + "cmt_id": "f0f874147a5b00eae875c24281531f8de7900079", + "fixed_version": "4.14.322" + }, + "4.19": { + "cmt_id": "4aae24015ecd70d824a953e2dc5b0ca2c4769243", + "fixed_version": "4.19.291" + }, + "5.10": { + "cmt_id": "b4256c99a7116c9514224847e8aaee2ecf110a0a", + "fixed_version": "5.10.190" + }, + "5.15": { + "cmt_id": "262430dfc618509246e07acd26211cb4cca79ecc", + "fixed_version": "5.15.126" + }, + "5.4": { + "cmt_id": "be785808db32b595728c4042d002c83d0dd4b66f", + "fixed_version": "5.4.253" + }, + "6.1": { + "cmt_id": "aab2d095ce4dd8d01ca484c0cc641fb497bf74db", + "fixed_version": "6.1.45" + }, + "6.4": { + "cmt_id": "4b717802428fa02cbcbb61209f638f65f9cd4710", + "fixed_version": "6.4.10" + } + }, + "CVE-2023-4132": { + "4.14": { + "cmt_id": "45224862e49e1fde86cbd26c7612f029b4e2e662", + "fixed_version": "4.14.322" + }, + "4.19": { + "cmt_id": "54073c46cbbd2c0c03d6f7d481540cb95cf181a1", + "fixed_version": "4.19.291" + }, + "5.10": { + "cmt_id": "d87ef4e857b790f1616809eccda6b4d0c9c3da11", + "fixed_version": "5.10.188" + }, + "5.15": { + "cmt_id": "784a8027b8ac5a876d71cb3d3d4d97b2b6cb5920", + "fixed_version": "5.15.121" + }, + "5.4": { + "cmt_id": "d485150c9a52167a6175f542397a098b4cd89dc9", + "fixed_version": "5.4.251" + }, + "6.1": { + "cmt_id": "8abb53c5167cfb5bb275512a3da4ec2468478626", + "fixed_version": "6.1.39" + }, + "6.4": { + "cmt_id": "ae65238d3f5a2df48341a7112820e04fb1017422", + "fixed_version": "6.4.4" + } + }, + "CVE-2023-4133": { + "6.2": { + "cmt_id": "7977bb80817b552d97bcc8a1ddf2b3029ca5b6a8", + "fixed_version": "6.2.13" + }, + "6.3": { + "cmt_id": "e50b9b9e8610d47b7c22529443e45a16b1ea3a15", + "fixed_version": "6.3" + } + }, + "CVE-2023-4134": { + "6.3": { + "cmt_id": "c261139c1df65c9c4bf00e96c91183bcfc1919ec", + "fixed_version": "6.3.13" + }, + "6.4": { + "cmt_id": "28dc11949357f10712bd641b724ab373a92318de", + "fixed_version": "6.4.4" + } + }, + "CVE-2023-4147": { + "5.10": { + "cmt_id": "308a43f1521d5b7220693d0865b23e8dad3ed137", + "fixed_version": "5.10.190" + }, + "5.15": { + "cmt_id": "5bee91121ccea8d69cea51632e9a1dd348ee49a1", + "fixed_version": "5.15.124" + }, + "6.1": { + "cmt_id": "268cb07ef3ee17b5454a7c4b23376802c5b00c79", + "fixed_version": "6.1.43" + }, + "6.4": { + "cmt_id": "14448359681062bf51d9c67e0264869548b79853", + "fixed_version": "6.4.8" + } + }, + "CVE-2023-4155": { + "6.1": { + "cmt_id": "5bdf1c1f346c81996b6e36b5efd5c92aeda4fbe4", + "fixed_version": "6.1.46" + }, + "6.4": { + "cmt_id": "ab8e9a874574ce511eca21caa5d7ef5426963a54", + "fixed_version": "6.4.11" + } + }, + "CVE-2023-4194": { + "6.4": { + "cmt_id": "36161e7d40e7293d7f213e16d881042d15c8a53a", + "fixed_version": "6.4.10" + } + }, + "CVE-2023-4206": { + "4.14": { + "cmt_id": "226d84d54a9339b7045aff36c8f56d6ee9270476", + "fixed_version": "4.14.322" + }, + "4.19": { + "cmt_id": "ad8f36f96696a7f1d191da66637c415959bab6d8", + "fixed_version": "4.19.291" + }, + "5.10": { + "cmt_id": "aaa71c4e8ad98828ed50dde3eec8e0d545a117f7", + "fixed_version": "5.10.190" + }, + "5.15": { + "cmt_id": "79c3d81c9ad140957b081c91908d7e2964dc603f", + "fixed_version": "5.15.126" + }, + "5.4": { + "cmt_id": "1c8262f31fd2d23d1cfd2539715d976c2a99e582", + "fixed_version": "5.4.253" + }, + "6.1": { + "cmt_id": "d4d3b53a4c66004e8e864fea744b3a2b86a73b62", + "fixed_version": "6.1.45" + }, + "6.4": { + "cmt_id": "a836184b670f59e24d3a0f7c07115ec6e6ce6900", + "fixed_version": "6.4.10" + } + }, + "CVE-2023-4207": { + "4.14": { + "cmt_id": "530a85ea747965b7c275fa44a364916e0ec2efaa", + "fixed_version": "4.14.326" + }, + "4.19": { + "cmt_id": "4f38dc8496d1991e2c055a0068dd98fb48affcc6", + "fixed_version": "4.19.295" + }, + "5.10": { + "cmt_id": "a8d478200b104ff356f51e1f63499fe46ba8c9b8", + "fixed_version": "5.10.190" + }, + "5.15": { + "cmt_id": "9edf7955025a602ab6bcc94d923c436e160a10e3", + "fixed_version": "5.15.126" + }, + "5.4": { + "cmt_id": "83e3d4b0ae373dcba30c68bf28f8d179191a297a", + "fixed_version": "5.4.253" + }, + "6.1": { + "cmt_id": "7f691439b29be0aae68f83ad5eecfddc11007724", + "fixed_version": "6.1.45" + }, + "6.4": { + "cmt_id": "7d848d718aeb3b482e177b682dd04e76dd413afb", + "fixed_version": "6.4.10" + } + }, + "CVE-2023-4208": { + "4.14": { + "cmt_id": "f0f874147a5b00eae875c24281531f8de7900079", + "fixed_version": "4.14.322" + }, + "4.19": { + "cmt_id": "4aae24015ecd70d824a953e2dc5b0ca2c4769243", + "fixed_version": "4.19.291" + }, + "5.10": { + "cmt_id": "b4256c99a7116c9514224847e8aaee2ecf110a0a", + "fixed_version": "5.10.190" + }, + "5.15": { + "cmt_id": "262430dfc618509246e07acd26211cb4cca79ecc", + "fixed_version": "5.15.126" + }, + "5.4": { + "cmt_id": "be785808db32b595728c4042d002c83d0dd4b66f", + "fixed_version": "5.4.253" + }, + "6.1": { + "cmt_id": "aab2d095ce4dd8d01ca484c0cc641fb497bf74db", + "fixed_version": "6.1.45" + }, + "6.4": { + "cmt_id": "4b717802428fa02cbcbb61209f638f65f9cd4710", + "fixed_version": "6.4.10" + } + }, + "CVE-2023-4244": { + "5.10": { + "cmt_id": "4046f2b56e5a7ba7e123ff961dd51187b8d59e78", + "fixed_version": "5.10.198" + }, + "5.15": { + "cmt_id": "6796800f0d8e5a892bceca7c198c115c4ca9d719", + "fixed_version": "5.15.134" + }, + "6.1": { + "cmt_id": "41113aa5698ad7a82635bcb747d483e4458d518d", + "fixed_version": "6.1.56" + }, + "6.4": { + "cmt_id": "3bdf400a1ad166274e85fa537f8a993a4553e36d", + "fixed_version": "6.4.12" + } + }, + "CVE-2023-4273": { + "5.10": { + "cmt_id": "381f7df0f3c3bd7dceb3e2b2b64c2f6247e2ac19", + "fixed_version": "5.10.190" + }, + "5.15": { + "cmt_id": "6b64974e02ea82d0bae917f1fa79495a1a59b5bf", + "fixed_version": "5.15.128" + }, + "6.1": { + "cmt_id": "c2fdf827f8fc6a571e1b7cc38a61041f0321adf5", + "fixed_version": "6.1.45" + }, + "6.4": { + "cmt_id": "e1a73ba43cf883cb37f6331aca5a4c5be6350982", + "fixed_version": "6.4.10" + } + }, + "CVE-2023-42752": { + "4.14": { + "cmt_id": "afd2657ba7af6d05afd6cc6b9315c091fafed14b", + "fixed_version": "4.14.326" + }, + "4.19": { + "cmt_id": "76ce657a5db97ff4e26b284fedc33e8591a4be17", + "fixed_version": "4.19.295" + }, + "5.10": { + "cmt_id": "1186eaffd87ed9be6f18cbc7145ffdcb1f6982e0", + "fixed_version": "5.10.195" + }, + "5.15": { + "cmt_id": "3e48f741e98a0bd2dc1ad517eec1931ea3accbd7", + "fixed_version": "5.15.132" + }, + "5.4": { + "cmt_id": "3d54e99499307c3e5613a2fe2a5c9b97eef95ff4", + "fixed_version": "5.4.257" + }, + "6.1": { + "cmt_id": "6678912b4df1bfac6f7c80642d56dc22e23419e4", + "fixed_version": "6.1.53" + }, + "6.4": { + "cmt_id": "87f07ec534e39e29bc715753df2e77509e8fafc3", + "fixed_version": "6.4.16" + }, + "6.5": { + "cmt_id": "3138192865c2a1f089dd27a7d80a7271ecd468e7", + "fixed_version": "6.5.3" + } + }, + "CVE-2023-42753": { + "5.10": { + "cmt_id": "83091f8ac03f118086596f17c9a52d31d6ca94b3", + "fixed_version": "5.10.195" + }, + "5.15": { + "cmt_id": "a9e6142e5f8f6ac7d1bca45c1b2b13b084ea9e14", + "fixed_version": "5.15.132" + }, + "5.4": { + "cmt_id": "109e830585e89a03d554bf8ad0e668630d0a6260", + "fixed_version": "5.4.257" + }, + "6.1": { + "cmt_id": "7ca0706c68adadf86a36b60dca090f5e9481e808", + "fixed_version": "6.1.53" + }, + "6.4": { + "cmt_id": "d59b6fc405549f7caf31f6aa5da1d6bef746b166", + "fixed_version": "6.4.16" + }, + "6.5": { + "cmt_id": "d95c8420efe684b964e3aa28108e9a354bcd7225", + "fixed_version": "6.5.3" + } + }, + "CVE-2023-42754": { + "5.10": { + "cmt_id": "8689c9ace976d6c078e6dc844b09598796e84099", + "fixed_version": "5.10.198" + }, + "5.15": { + "cmt_id": "8860d354f653628b6330e1c5b06b2828948135a4", + "fixed_version": "5.15.134" + }, + "5.4": { + "cmt_id": "810fd23d9715474aa27997584e8fc9396ef3cb67", + "fixed_version": "5.4.258" + }, + "6.1": { + "cmt_id": "2712545e535d7a2e4c53b9c9658a9c88c6055862", + "fixed_version": "6.1.56" + }, + "6.5": { + "cmt_id": "cda20fcddf53f0f959641c8ef4d50ab87ffa5124", + "fixed_version": "6.5.6" + } + }, + "CVE-2023-42755": { + "4.14": { + "cmt_id": "a048f77ba9cf7f77a06b2ee60446c6cc061c2daf", + "fixed_version": "4.14.326" + }, + "4.19": { + "cmt_id": "6ca0ea6a46e7a2d70fb1b1f6a886efe2b2365e16", + "fixed_version": "4.19.295" + }, + "5.10": { + "cmt_id": "8db844077ec9912d75952c80d76da71fc2412852", + "fixed_version": "5.10.197" + }, + "5.15": { + "cmt_id": "08569c92f7f339de21b7a68d43d6795fc0aa24f2", + "fixed_version": "5.15.133" + }, + "5.4": { + "cmt_id": "42900fd140c8db99141b9f083bfe8de887190ed9", + "fixed_version": "5.4.257" + }, + "6.1": { + "cmt_id": "b93aeb6352b0229e3c5ca5ca4ff015b015aff33c", + "fixed_version": "6.1.55" + } + }, + "CVE-2023-42756": { + "6.5": { + "cmt_id": "20a93d402b6fe6757e14b0eeb400dfac8b8aa3ad", + "fixed_version": "6.5.6" + } + }, + "CVE-2023-4385": { + "4.14": { + "cmt_id": "070ddf59cf17faf6aae7d89f78e0510c94d07940", + "fixed_version": "4.14.283" + }, + "4.19": { + "cmt_id": "c381558c278a540c61dfef1f2b77ab817d5d302d", + "fixed_version": "4.19.247" + }, + "4.9": { + "cmt_id": "6c4ad94011e20f4134b0606d9b68d5db564828e1", + "fixed_version": "4.9.318" + }, + "5.10": { + "cmt_id": "9dfa8d087bb854f613fcdbf1af4fb02c0b2d1e4f", + "fixed_version": "5.10.121" + }, + "5.15": { + "cmt_id": "4b9380d92c66cdc66987f65130789abad5c1af6f", + "fixed_version": "5.15.46" + }, + "5.17": { + "cmt_id": "b6267c8bf885d1ccdedd08d40cfec9598e2fe582", + "fixed_version": "5.17.14" + }, + "5.18": { + "cmt_id": "9d3fec8ab6e1f5c36078a4d0432b663c1c4c0e74", + "fixed_version": "5.18.3" + }, + "5.4": { + "cmt_id": "e54fd01178ebd5b13ef9e2fc0f3006765f37ee3c", + "fixed_version": "5.4.198" + } + }, + "CVE-2023-4387": { + "4.14": { + "cmt_id": "2bee202d0649cb53b9860fe15d0642167bffd6bf", + "fixed_version": "4.14.281" + }, + "4.19": { + "cmt_id": "3adaaf3472e8ea410cb1330e5dd8372b0483dc78", + "fixed_version": "4.19.245" + }, + "4.9": { + "cmt_id": "aae66daa4a8925109c87702979e767346291d1e2", + "fixed_version": "4.9.316" + }, + "5.10": { + "cmt_id": "a54d86cf418427584e0a3cd1e89f757c92df5e89", + "fixed_version": "5.10.118" + }, + "5.15": { + "cmt_id": "4ad09fdef55b70f16f8d385981b864ac75cf1354", + "fixed_version": "5.15.42" + }, + "5.17": { + "cmt_id": "54f87f3478097fe5b7e473738b787a24cbc2061e", + "fixed_version": "5.17.10" + }, + "5.18": { + "cmt_id": "9e7fef9521e73ca8afd7da9e58c14654b02dfad8", + "fixed_version": "5.18" + }, + "5.4": { + "cmt_id": "32f779e6fbbe0c0860a00777b7e3dee6b5ec0c1c", + "fixed_version": "5.4.196" + } + }, + "CVE-2023-4389": { + "5.10": { + "cmt_id": "1d2eda18f6ffbd9902594469c6e1a055014eb2ac", + "fixed_version": "5.10.112" + }, + "5.15": { + "cmt_id": "252db93fd0bd5ca07c9b933ed94e93a4a43e8901", + "fixed_version": "5.15.35" + }, + "5.17": { + "cmt_id": "0850b7bdcea69d330a4a9b9b290af073ff32c63c", + "fixed_version": "5.17.4" + } + }, + "CVE-2023-4394": { + "5.19": { + "cmt_id": "4b124ad87244cd7f0883c5eaa38d2326b2154cad", + "fixed_version": "5.19.6" + } + }, + "CVE-2023-44466": { + "5.15": { + "cmt_id": "db8ca8d9b4dfce6d8cded796f0e671ef2c782613", + "fixed_version": "5.15.121" + }, + "6.1": { + "cmt_id": "183c0ae4fafcdcb95c06f40c0c35a39d89c1aa2d", + "fixed_version": "6.1.40" + }, + "6.4": { + "cmt_id": "0a6db56467773851e4ea4d652308314d8f9c4f91", + "fixed_version": "6.4.5" + } + }, + "CVE-2023-4459": { + "4.14": { + "cmt_id": "5fd9a74bf04a1eae5dbde8ca8585106d4410427f", + "fixed_version": "4.14.281" + }, + "4.19": { + "cmt_id": "248a37ffd81c7121d30702d8caa31db48450680d", + "fixed_version": "4.19.245" + }, + "4.9": { + "cmt_id": "e40ed72f8c8b04ae629d895ed7eb221d8938cdd7", + "fixed_version": "4.9.316" + }, + "5.10": { + "cmt_id": "6e2caee5cddc3d9e0ad0484c9c21b9f10676c044", + "fixed_version": "5.10.118" + }, + "5.15": { + "cmt_id": "e35387a91318ccdec4a30b58d967391e011e34fa", + "fixed_version": "5.15.42" + }, + "5.17": { + "cmt_id": "8d20af6cdd1639c1e14346d4cb1d7b1d19fee34b", + "fixed_version": "5.17.10" + }, + "5.18": { + "cmt_id": "edf410cb74dc612fd47ef5be319c5a0bcd6e6ccd", + "fixed_version": "5.18" + }, + "5.4": { + "cmt_id": "dc64e8874e87dc1c1c723a1c6da7efc3305c18da", + "fixed_version": "5.4.196" + } + }, + "CVE-2023-4563": { + "5.10": { + "cmt_id": "b15ea4017af82011dd55225ce77cce3d4dfc169c", + "fixed_version": "5.10.198" + }, + "5.15": { + "cmt_id": "7c7e658a36f8b1522bd3586d8137e5f93a25ddc5", + "fixed_version": "5.15.134" + }, + "6.1": { + "cmt_id": "59dab3bf0b8fc08eb802721c0532f13dd89209b8", + "fixed_version": "6.1.56" + }, + "6.4": { + "cmt_id": "bd156ce9553dcaf2d6ee2c825d1a5a1718e86524", + "fixed_version": "6.4.11" + } + }, + "CVE-2023-4569": { + "5.15": { + "cmt_id": "1adaec4758d1cefbf348a291ad9b752aaa10f8d3", + "fixed_version": "5.15.128" + }, + "6.1": { + "cmt_id": "00ea7eb1c69eec91cdf9259f0e427c56e7999fcd", + "fixed_version": "6.1.47" + }, + "6.4": { + "cmt_id": "83ff16e449a675e215125d97a2c4a7f097d291d0", + "fixed_version": "6.4.12" + } + }, + "CVE-2023-45862": { + "4.14": { + "cmt_id": "26f31c6e1389c23a1b822a61c59d5d1f357cb478", + "fixed_version": "4.14.308" + }, + "4.19": { + "cmt_id": "cef5e33d8b893891817236db819982f87943e8fd", + "fixed_version": "4.19.276" + }, + "5.10": { + "cmt_id": "961f93d63da72f5fcaa6793fb2dcbc995c119a8e", + "fixed_version": "5.10.173" + }, + "5.15": { + "cmt_id": "7e902b949600c51c94d06b137f874126a27e6557", + "fixed_version": "5.15.100" + }, + "5.4": { + "cmt_id": "da4e715a466ca982d4584da21ea385f28ca79ce6", + "fixed_version": "5.4.235" + }, + "6.1": { + "cmt_id": "ff542083b105c9c72d83899d3f74eeec354f808e", + "fixed_version": "6.1.18" + }, + "6.2": { + "cmt_id": "5ee39d2216dc98a894ffc38d15e1ef2d41e2266b", + "fixed_version": "6.2.5" + } + }, + "CVE-2023-45863": { + "4.14": { + "cmt_id": "b43cf5ad5241d6f33a02c93271a282d5ed6c4cce", + "fixed_version": "4.14.329" + }, + "4.19": { + "cmt_id": "0af6c6c15681cf80aeb85fcb3a1928c63aa89deb", + "fixed_version": "4.19.298" + }, + "5.10": { + "cmt_id": "b2e62728b106fe54f8618c21a252df7d4a4cc775", + "fixed_version": "5.10.200" + }, + "5.15": { + "cmt_id": "89a0079049f5568268d75c8cdf28bec0e2553e23", + "fixed_version": "5.15.99" + }, + "5.4": { + "cmt_id": "5776aeee2a604ccc03e8269713624f9c8fd318e0", + "fixed_version": "5.4.260" + }, + "6.1": { + "cmt_id": "fe4dd80d58ec5633daf5d50671d1341f738508bf", + "fixed_version": "6.1.16" + }, + "6.2": { + "cmt_id": "e6ca1549afb2b495e61a8fb53ae942193ef823e0", + "fixed_version": "6.2.3" + } + }, + "CVE-2023-45871": { + "4.14": { + "cmt_id": "017d5c8eef06178e4148db273df03b7ad9eeb5bc", + "fixed_version": "4.14.326" + }, + "4.19": { + "cmt_id": "981d0bc43e8d5482294432677e80a1d15f4b790d", + "fixed_version": "4.19.295" + }, + "5.10": { + "cmt_id": "3e39008e9e3043663324f0920a5d6ebfa68cc92a", + "fixed_version": "5.10.195" + }, + "5.15": { + "cmt_id": "be7353af5b35c8f4a11573a38b997f74f8c2ae4b", + "fixed_version": "5.15.132" + }, + "5.4": { + "cmt_id": "c2ad60ed38b872aa971408b8b8eaad7a91501b37", + "fixed_version": "5.4.257" + }, + "6.1": { + "cmt_id": "d2e906c725979c39ebf120a189e521ceae787d26", + "fixed_version": "6.1.53" + }, + "6.4": { + "cmt_id": "6a9abbccaac418e965f42e8a8f6dd826e341a6f9", + "fixed_version": "6.4.16" + }, + "6.5": { + "cmt_id": "dad92377fc6e012e481c6f4a75e32e48fe2777db", + "fixed_version": "6.5.3" + } + }, + "CVE-2023-45898": { + "6.5": { + "cmt_id": "c15bf3330a9e3c01b23e59899a6a02432a62ddc3", + "fixed_version": "6.5.4" + } + }, + "CVE-2023-4610": { + "6.4": { + "cmt_id": "71c3ad65fabec9620d3f548b2da948c79c7ad9d5", + "fixed_version": "6.4" + } + }, + "CVE-2023-4611": { + "6.4": { + "cmt_id": "e872d6b6ea4947fb87f0d6ea1ef814019dbed89e", + "fixed_version": "6.4.8" + } + }, + "CVE-2023-4623": { + "4.14": { + "cmt_id": "3c0bd0b79733b7f628af1c967269db339eeef8d3", + "fixed_version": "4.14.327" + }, + "4.19": { + "cmt_id": "7c62e0c3c6e9c9c15ead63339db6a0e158d22a66", + "fixed_version": "4.19.295" + }, + "5.10": { + "cmt_id": "b08cc6c0396fd5cfaac4ca044f2282367347c062", + "fixed_version": "5.10.195" + }, + "5.15": { + "cmt_id": "4cf994d3f4ff42d604fae2b461bdd5195a7dfabd", + "fixed_version": "5.15.132" + }, + "5.4": { + "cmt_id": "da13749d5ff70bb033a8f35da32cfd6e88246b2f", + "fixed_version": "5.4.257" + }, + "6.1": { + "cmt_id": "a1e820fc7808e42b990d224f40e9b4895503ac40", + "fixed_version": "6.1.53" + }, + "6.4": { + "cmt_id": "5293f466d41d6c2eaad8b833576ea3dbee630dc2", + "fixed_version": "6.4.16" + }, + "6.5": { + "cmt_id": "eb07894c51c7d6bb8d00948a3e6e7b52c791e93e", + "fixed_version": "6.5.3" + } + }, + "CVE-2023-46343": { + "4.14": { + "cmt_id": "2b2edf089df3a69f0072c6e71563394c5a94e62e", + "fixed_version": "4.14.328" + }, + "4.19": { + "cmt_id": "5622592f8f74ae3e594379af02e64ea84772d0dd", + "fixed_version": "4.19.297" + }, + "5.10": { + "cmt_id": "c95fa5b20fe03609e0894656fa43c18045b5097e", + "fixed_version": "5.10.199" + }, + "5.15": { + "cmt_id": "ffdc881f68073ff86bf21afb9bb954812e8278be", + "fixed_version": "5.15.137" + }, + "5.4": { + "cmt_id": "76050b0cc5a72e0c7493287b7e18e1cb9e3c4612", + "fixed_version": "5.4.259" + }, + "6.1": { + "cmt_id": "d7dbdbe3800a908eecd4975c31be47dd45e2104a", + "fixed_version": "6.1.60" + }, + "6.5": { + "cmt_id": "bb6cacc439ddd2cd51227ab193f4f91cfc7f014f", + "fixed_version": "6.5.9" + } + }, + "CVE-2023-46813": { + "5.10": { + "cmt_id": "6550cbe25de182f6c0176909a90b324cb375133f", + "fixed_version": "5.10.199" + }, + "5.15": { + "cmt_id": "582f7993353c7b116651f88385b1785dffa14c5d", + "fixed_version": "5.15.137" + }, + "6.1": { + "cmt_id": "57d0639f60f1ff04cbe7fd52823b94b894d7f812", + "fixed_version": "6.1.60" + }, + "6.5": { + "cmt_id": "11b975cb82cc6d88e8b04f77a673077ac5c30c8b", + "fixed_version": "6.5.9" + } + }, + "CVE-2023-46838": { + "4.19": { + "cmt_id": "5bb8270789c88c0e4ad78c0de2f274f2275c7f6c", + "fixed_version": "4.19.306" + }, + "5.10": { + "cmt_id": "cce8ba6fa4ec43ad778d64823a2f8ca120d362c1", + "fixed_version": "5.10.209" + }, + "5.15": { + "cmt_id": "e03023fcdb5e959d4252b3a38e1b27afb6c1c23c", + "fixed_version": "5.15.148" + }, + "5.4": { + "cmt_id": "4404c2b832cf0a842b6e3c63fb5749e97dc618ea", + "fixed_version": "5.4.268" + }, + "6.1": { + "cmt_id": "437360133cbd1e9fb88b122e84fff0df08f18e23", + "fixed_version": "6.1.75" + }, + "6.6": { + "cmt_id": "78376d4415602d97773f20b49f4aa5fc8666f7a9", + "fixed_version": "6.6.14" + }, + "6.7": { + "cmt_id": "0179c6b07f7ed2f3ea7309596169e15a59e7ee0e", + "fixed_version": "6.7.2" + } + }, + "CVE-2023-46862": { + "5.10": { + "cmt_id": "c6e8af2a8a63e0957284c16003c501e4a058e8d9", + "fixed_version": "5.10.202" + }, + "5.15": { + "cmt_id": "3d7912710e5e187217313fea5c145881cfeaf952", + "fixed_version": "5.15.140" + }, + "6.1": { + "cmt_id": "9236d2ea6465b37c0a73d994c1ad31753d31e5f5", + "fixed_version": "6.1.61" + }, + "6.5": { + "cmt_id": "56e08ccc969796168f0e6adf6642f8546f54ba6f", + "fixed_version": "6.5.10" + }, + "6.6": { + "cmt_id": "7644b1a1c9a7ae8ab99175989bfc8676055edb46", + "fixed_version": "6.6" + } + }, + "CVE-2023-47233": { + "6.1": { + "cmt_id": "0b812f706fd7090be74812101114a0e165b36744", + "fixed_version": "6.1.84" + }, + "6.6": { + "cmt_id": "190794848e2b9d15de92d502b6ac652806904f5a", + "fixed_version": "6.6.24" + }, + "6.7": { + "cmt_id": "6678a1e7d896c00030b31491690e8ddc9a90767a", + "fixed_version": "6.7.12" + } + }, + "CVE-2023-4732": { + "5.10": { + "cmt_id": "9e1cf2d1ed37c934c9935f2c0b2f8b15d9355654", + "fixed_version": "5.10.53" + }, + "5.13": { + "cmt_id": "ac17145560031d7e1684c49039ad43a2aaf76343", + "fixed_version": "5.13.5" + } + }, + "CVE-2023-4881": { + "5.10": { + "cmt_id": "a7d86a77c33ba1c357a7504341172cc1507f0698", + "fixed_version": "5.10.198" + }, + "5.15": { + "cmt_id": "1ad7b189cc1411048434e8595ffcbe7873b71082", + "fixed_version": "5.15.132" + }, + "6.1": { + "cmt_id": "d9ebfc0f21377690837ebbd119e679243e0099cc", + "fixed_version": "6.1.54" + }, + "6.5": { + "cmt_id": "c8f292322ff16b9a2272a67de396c09a50e09dce", + "fixed_version": "6.5.4" + } + }, + "CVE-2023-4921": { + "4.14": { + "cmt_id": "d9f43fc5a78d1505733d3621cd4c044eaf71a02f", + "fixed_version": "4.14.326" + }, + "4.19": { + "cmt_id": "7ea1faa59c75336d86893378838ed1e6f20c0520", + "fixed_version": "4.19.295" + }, + "5.10": { + "cmt_id": "746a8df5e4d235059b1adf02e8456e7ec132d2d8", + "fixed_version": "5.10.195" + }, + "5.15": { + "cmt_id": "6ea277b2c6263931798234e2eed892ecfbb85596", + "fixed_version": "5.15.132" + }, + "5.4": { + "cmt_id": "a6d11571b91d34fd7ce8451c2dfd112194c79ae2", + "fixed_version": "5.4.257" + }, + "6.1": { + "cmt_id": "a18349dc8d916a64d7c93f05da98953e3386d8e9", + "fixed_version": "6.1.54" + }, + "6.5": { + "cmt_id": "e5471b82c36396e809817cb988dfc4bce0a688cb", + "fixed_version": "6.5.4" + } + }, + "CVE-2023-50431": { + "6.1": { + "cmt_id": "6d98d249175e568f72ca94cbd6f959bc4476414e", + "fixed_version": "6.1.75" + }, + "6.6": { + "cmt_id": "975aaaddc226303d382baa0d0ece84e8bec1fcf5", + "fixed_version": "6.6.14" + }, + "6.7": { + "cmt_id": "db43f2eabdceedc41b8c3e0621ac42ca19b13b7d", + "fixed_version": "6.7.2" + } + }, + "CVE-2023-5090": { + "6.1": { + "cmt_id": "7ab62e3415fb59289ab6dea31f0cc0237b949200", + "fixed_version": "6.1.62" + }, + "6.5": { + "cmt_id": "94805f9d3a3fb1f091bcc08b9c4846c4346706eb", + "fixed_version": "6.5.9" + } + }, + "CVE-2023-51042": { + "4.19": { + "cmt_id": "f9da11d96bde3db277f061ac5a665c234d505787", + "fixed_version": "4.19.293" + }, + "5.10": { + "cmt_id": "b870b9a47fdba29bd6828f690e4817c950fa3430", + "fixed_version": "5.10.192" + }, + "5.15": { + "cmt_id": "ef568da1fd843581e855c79a368209b752dea2c1", + "fixed_version": "5.15.128" + }, + "5.4": { + "cmt_id": "c6059af6bf5ed436b4aa5229e8113bd2546322d4", + "fixed_version": "5.4.255" + }, + "6.1": { + "cmt_id": "dd0b3b367c3839e439f36af908b39c98929a5e54", + "fixed_version": "6.1.47" + }, + "6.4": { + "cmt_id": "f5db29ce2502c4fc8a33ed7989950ba43875e322", + "fixed_version": "6.4.12" + } + }, + "CVE-2023-51043": { + "4.19": { + "cmt_id": "73a82b22963defa87204f0f9f44a534adf7f831a", + "fixed_version": "4.19.291" + }, + "5.10": { + "cmt_id": "f09c0ac142c59495262dd80545f261b2aeeba538", + "fixed_version": "5.10.188" + }, + "5.15": { + "cmt_id": "30580f3a3301173b1413a7b6d6ea100ec8c75da0", + "fixed_version": "5.15.121" + }, + "5.4": { + "cmt_id": "380c7ceabdde0ea5b4e709620f299bcd5c1c8abc", + "fixed_version": "5.4.251" + }, + "6.1": { + "cmt_id": "e4a0e09b79bd2c0895c508cdc5e0265a083cc05d", + "fixed_version": "6.1.40" + }, + "6.4": { + "cmt_id": "328f520540db49a7ab40db2835b5027a30bcd6ce", + "fixed_version": "6.4.5" + } + }, + "CVE-2023-5158": { + "5.15": { + "cmt_id": "1e69422efcc60571cc04f6c1940da848a8c2f21b", + "fixed_version": "5.15.135" + }, + "6.1": { + "cmt_id": "3a72decd6b49ff11a894aabd4d9b3025f046fe61", + "fixed_version": "6.1.57" + }, + "6.5": { + "cmt_id": "0bf2b9c2f3545ffce5720de61c33fc171c0e480a", + "fixed_version": "6.5.7" + } + }, + "CVE-2023-51779": { + "5.10": { + "cmt_id": "db1b14eec8c61a20374de9f9c2ddc6c9406a8c42", + "fixed_version": "5.10.206" + }, + "5.15": { + "cmt_id": "2b16d960c79abc397f102c3d23d30005b68cb036", + "fixed_version": "5.15.146" + }, + "6.1": { + "cmt_id": "37f71e2c9f515834841826f4eb68ec33cfb2a1ff", + "fixed_version": "6.1.70" + }, + "6.6": { + "cmt_id": "1d576c3a5af850bf11fbd103f9ba11aa6d6061fb", + "fixed_version": "6.6.9" + } + }, + "CVE-2023-5178": { + "5.10": { + "cmt_id": "e985d78bdcf37f7ef73666a43b0d2407715f00d3", + "fixed_version": "5.10.199" + }, + "5.15": { + "cmt_id": "34f62612be2a7f90ab68a14154db6664a32f8db0", + "fixed_version": "5.15.137" + }, + "5.4": { + "cmt_id": "4e53bab11f01a401a5acd3bc94335b27ec79106b", + "fixed_version": "5.4.260" + }, + "6.1": { + "cmt_id": "f691ec5a548257edb3aacd952e2a574e4e57b2c4", + "fixed_version": "6.1.60" + }, + "6.5": { + "cmt_id": "675f0e9bb716fa3252979145b9b1a950140e94e9", + "fixed_version": "6.5.9" + } + }, + "CVE-2023-51780": { + "4.14": { + "cmt_id": "3ddeb55deec5e0e324d0ab8cc2ddd528518ea12d", + "fixed_version": "4.14.334" + }, + "4.19": { + "cmt_id": "bff7ddb0d9d515170dcf133d239dba87c47c8cdb", + "fixed_version": "4.19.303" + }, + "5.10": { + "cmt_id": "64a032015c336ca1795b3e1b1d1f94085ada3553", + "fixed_version": "5.10.205" + }, + "5.15": { + "cmt_id": "3bb41dc361bfd938041a1d17a3768aa788a36a3c", + "fixed_version": "5.15.144" + }, + "5.4": { + "cmt_id": "b099c28847cfa33854731eeec9c64619d99a1255", + "fixed_version": "5.4.265" + }, + "6.1": { + "cmt_id": "2de2a6cbe14f7e949da59bddd5d69baf5dd893c0", + "fixed_version": "6.1.69" + }, + "6.6": { + "cmt_id": "531fd46f92895bcdc41bedd12533266c397196da", + "fixed_version": "6.6.8" + } + }, + "CVE-2023-51781": { + "4.14": { + "cmt_id": "0686da1ada51c787610185de6289d8a5006ad263", + "fixed_version": "4.14.334" + }, + "4.19": { + "cmt_id": "580ff9f59ab6537d8ce1d0d9f012cf970553ef3d", + "fixed_version": "4.19.303" + }, + "5.10": { + "cmt_id": "a232eb81c7cb5d4dbd325d4611ed029b7fa07596", + "fixed_version": "5.10.205" + }, + "5.15": { + "cmt_id": "5b87ac25e8cfeb2d3d27574cdc077b09e8ceca82", + "fixed_version": "5.15.144" + }, + "5.4": { + "cmt_id": "9112bd107208cd6a4f0175ca36289ed170622cce", + "fixed_version": "5.4.265" + }, + "6.1": { + "cmt_id": "1646b2929d5efc3861139ba58556b0f149c848f6", + "fixed_version": "6.1.69" + }, + "6.6": { + "cmt_id": "e15ded324a3911358e8541a1b573665f99f216ef", + "fixed_version": "6.6.8" + } + }, + "CVE-2023-51782": { + "4.14": { + "cmt_id": "02af3c8ab5cda2633b187bd18b5dc2b9f0af0859", + "fixed_version": "4.14.334" + }, + "4.19": { + "cmt_id": "6c9afea8827dde62c4062185d22ac035090ba39b", + "fixed_version": "4.19.303" + }, + "5.10": { + "cmt_id": "7eda5960a5332654b10d951e735750ed60d7f0a9", + "fixed_version": "5.10.205" + }, + "5.15": { + "cmt_id": "3f1f6a94d8858706863fe90da35663f6e24be274", + "fixed_version": "5.15.144" + }, + "5.4": { + "cmt_id": "3df812627e7d0bf557f3781c3448d42c8fe8313e", + "fixed_version": "5.4.265" + }, + "6.1": { + "cmt_id": "01540ee2366a0a8671c35cd57a66bf0817106ffa", + "fixed_version": "6.1.69" + }, + "6.6": { + "cmt_id": "63caa51833e8701248a8a89d83effe96f30e4c80", + "fixed_version": "6.6.8" + } + }, + "CVE-2023-5197": { + "5.10": { + "cmt_id": "5a03b42ae1ed646eb5f5acceff1fb2b1d85ec077", + "fixed_version": "5.10.198" + }, + "5.15": { + "cmt_id": "0c5fd85fb01fa1a5dbb9f213b0d1925e671f30df", + "fixed_version": "5.15.134" + }, + "6.1": { + "cmt_id": "9af8bb2afea3705b58fe930f97a39322f46e5b8b", + "fixed_version": "6.1.56" + }, + "6.5": { + "cmt_id": "13f385f99147b4445a1ff151fabd44c12d366ab0", + "fixed_version": "6.5.6" + } + }, + "CVE-2023-52340": { + "4.19": { + "cmt_id": "95372b040ae689293c6863b90049f1af68410c8b", + "fixed_version": "4.19.305" + }, + "5.10": { + "cmt_id": "dd56c5790dc3484f3c89fd4e21735c796a82b40d", + "fixed_version": "5.10.208" + }, + "5.15": { + "cmt_id": "b8a5308feedda10d4875a912e2e1f6be215a4ead", + "fixed_version": "5.15.147" + }, + "5.4": { + "cmt_id": "584756c3d75a1722a868a1d22602251385bee798", + "fixed_version": "5.4.267" + }, + "6.1": { + "cmt_id": "0f22c8a6efe63c16d1abf1e6c0317abbf121f883", + "fixed_version": "6.1.73" + } + }, + "CVE-2023-52429": { + "5.10": { + "cmt_id": "a891a0621e725e85529985139cada8cb5a74a116", + "fixed_version": "5.10.210" + }, + "5.15": { + "cmt_id": "888a0a46b80fa37eacfe81faf47ba0b83876251d", + "fixed_version": "5.15.149" + }, + "6.1": { + "cmt_id": "c5d83ac2bf6ca668a39ffb1a576899a66153ba19", + "fixed_version": "6.1.79" + }, + "6.6": { + "cmt_id": "438d19492b7f002334573bae43276297eb234c80", + "fixed_version": "6.6.18" + }, + "6.7": { + "cmt_id": "cd70175481f63af31901dd463e44386f033c3f4c", + "fixed_version": "6.7.6" + } + }, + "CVE-2023-52433": { + "6.5": { + "cmt_id": "e3213ff99a355cda811b41e8dbb3472d13167a3a", + "fixed_version": "6.5.4" + } + }, + "CVE-2023-52434": { + "5.10": { + "cmt_id": "13fb0fc4917621f3dfa285a27eaf7151d770b5e5", + "fixed_version": "5.10.211" + }, + "5.15": { + "cmt_id": "890bc4fac3c0973a49cac35f634579bebba7fe48", + "fixed_version": "5.15.150" + }, + "6.1": { + "cmt_id": "1ae3c59355dc9882e09c020afe8ffbd895ad0f29", + "fixed_version": "6.1.79" + }, + "6.6": { + "cmt_id": "17a0f64cc02d4972e21c733d9f21d1c512963afa", + "fixed_version": "6.6.8" + } + }, + "CVE-2023-52435": { + "5.10": { + "cmt_id": "8f8f185643747fbb448de6aab0efa51c679909a3", + "fixed_version": "5.10.210" + }, + "5.15": { + "cmt_id": "6c53e8547687d9c767c139cd4b50af566f58c29a", + "fixed_version": "5.15.149" + }, + "5.4": { + "cmt_id": "cd1022eaf87be8e6151435bd4df4c242c347e083", + "fixed_version": "5.4.269" + }, + "6.1": { + "cmt_id": "989b0ff35fe5fc9652ee5bafbe8483db6f27b137", + "fixed_version": "6.1.79" + }, + "6.6": { + "cmt_id": "95b3904a261a9f810205da560e802cc326f50d77", + "fixed_version": "6.6.11" + } + }, + "CVE-2023-52436": { + "4.19": { + "cmt_id": "16ae3132ff7746894894927c1892493693b89135", + "fixed_version": "4.19.306" + }, + "5.10": { + "cmt_id": "3e47740091b05ac8d7836a33afd8646b6863ca52", + "fixed_version": "5.10.209" + }, + "5.15": { + "cmt_id": "32a6cfc67675ee96fe107aeed5af9776fec63f11", + "fixed_version": "5.15.148" + }, + "5.4": { + "cmt_id": "12cf91e23b126718a96b914f949f2cdfeadc7b2a", + "fixed_version": "5.4.268" + }, + "6.1": { + "cmt_id": "5de9e9dd1828db9b8b962f7ca42548bd596deb8a", + "fixed_version": "6.1.74" + }, + "6.6": { + "cmt_id": "2525d1ba225b5c167162fa344013c408e8b4de36", + "fixed_version": "6.6.13" + }, + "6.7": { + "cmt_id": "f6c30bfe5a49bc38cae985083a11016800708fea", + "fixed_version": "6.7.1" + } + }, + "CVE-2023-52438": { + "5.10": { + "cmt_id": "c8c1158ffb007197f31f9d9170cf13e4f34cbb5c", + "fixed_version": "5.10.209" + }, + "5.15": { + "cmt_id": "8ad4d580e8aff8de2a4d57c5930fcc29f1ffd4a6", + "fixed_version": "5.15.148" + }, + "5.4": { + "cmt_id": "a53e15e592b4dcc91c3a3b8514e484a0bdbc53a3", + "fixed_version": "5.4.268" + }, + "6.1": { + "cmt_id": "9fa04c93f24138747807fe75b5591bb680098f56", + "fixed_version": "6.1.74" + }, + "6.6": { + "cmt_id": "a49087ab93508b60d9b8add91707a22dda832869", + "fixed_version": "6.6.13" + }, + "6.7": { + "cmt_id": "e074686e993ff1be5f21b085a3b1b4275ccd5727", + "fixed_version": "6.7.1" + } + }, + "CVE-2023-52439": { + "4.19": { + "cmt_id": "3174e0f7de1ba392dc191625da83df02d695b60c", + "fixed_version": "4.19.306" + }, + "5.10": { + "cmt_id": "5e0be1229ae199ebb90b33102f74a0f22d152570", + "fixed_version": "5.10.209" + }, + "5.15": { + "cmt_id": "5cf604ee538ed0c467abe3b4cda5308a6398f0f7", + "fixed_version": "5.15.148" + }, + "5.4": { + "cmt_id": "e93da893d52d82d57fc0db2ca566024e0f26ff50", + "fixed_version": "5.4.268" + }, + "6.1": { + "cmt_id": "17a8519cb359c3b483fb5c7367efa9a8a508bdea", + "fixed_version": "6.1.74" + }, + "6.6": { + "cmt_id": "35f102607054faafe78d2a6994b18d5d9d6e92ad", + "fixed_version": "6.6.13" + }, + "6.7": { + "cmt_id": "913205930da6213305616ac539447702eaa85e41", + "fixed_version": "6.7.1" + } + }, + "CVE-2023-52440": { + "6.1": { + "cmt_id": "30fd6521b2fbd9b767e438e31945e5ea3e3a2fba", + "fixed_version": "6.1.52" + }, + "6.4": { + "cmt_id": "7f1d6cb0eb6af3a8088dc24b7ddee9a9711538c4", + "fixed_version": "6.4.15" + }, + "6.5": { + "cmt_id": "ecd7e1c562cb08e41957fcd4b0e404de5ab38e20", + "fixed_version": "6.5.2" + } + }, + "CVE-2023-52441": { + "5.15": { + "cmt_id": "5c0df9d30c289d6b9d7d44e2a450de2f8e3cf40b", + "fixed_version": "5.15.145" + }, + "6.1": { + "cmt_id": "330d900620dfc9893011d725b3620cd2ee0bc2bc", + "fixed_version": "6.1.53" + }, + "6.4": { + "cmt_id": "aa669ef229ae8dd779da9caa24e254964545895f", + "fixed_version": "6.4.16" + } + }, + "CVE-2023-52442": { + "5.15": { + "cmt_id": "017d85c94f02090a87f4a473dbe0d6ee0da72693", + "fixed_version": "5.15.145" + }, + "6.1": { + "cmt_id": "becb5191d1d5fdfca0198a2e37457bbbf4fe266f", + "fixed_version": "6.1.53" + }, + "6.4": { + "cmt_id": "4c2b350b2e269e3fd17bbfa42de1b42775b777ac", + "fixed_version": "6.4.16" + } + }, + "CVE-2023-52443": { + "4.19": { + "cmt_id": "9286ee97aa4803d99185768735011d0d65827c9e", + "fixed_version": "4.19.306" + }, + "5.10": { + "cmt_id": "5ff00408e5029d3550ee77f62dc15f1e15c47f87", + "fixed_version": "5.10.209" + }, + "5.15": { + "cmt_id": "0a12db736edbb4933e4274932aeea594b5876fa4", + "fixed_version": "5.15.148" + }, + "5.4": { + "cmt_id": "1d8e62b5569cc1466ceb8a7e4872cf10160a9dcf", + "fixed_version": "5.4.268" + }, + "6.1": { + "cmt_id": "9d4fa5fe2b1d56662afd14915a73b4d0783ffa45", + "fixed_version": "6.1.75" + }, + "6.6": { + "cmt_id": "5c0392fdafb0a2321311900be83ffa572bef8203", + "fixed_version": "6.6.14" + }, + "6.7": { + "cmt_id": "77ab09b92f16c8439a948d1af489196953dc4a0e", + "fixed_version": "6.7.2" + } + }, + "CVE-2023-52444": { + "4.19": { + "cmt_id": "02160112e6d45c2610b049df6eb693d7a2e57b46", + "fixed_version": "4.19.306" + }, + "5.10": { + "cmt_id": "6f866885e147d33efc497f1095f35b2ee5ec7310", + "fixed_version": "5.10.209" + }, + "5.15": { + "cmt_id": "f100ba617d8be6c98a68f3744ef7617082975b77", + "fixed_version": "5.15.148" + }, + "5.4": { + "cmt_id": "5624a3c1b1ebc8991318e1cce2aa719542991024", + "fixed_version": "5.4.268" + }, + "6.1": { + "cmt_id": "f0145860c20be6bae6785c7a2249577674702ac7", + "fixed_version": "6.1.75" + }, + "6.6": { + "cmt_id": "d3c0b49aaa12a61d560528f5d605029ab57f0728", + "fixed_version": "6.6.14" + }, + "6.7": { + "cmt_id": "2fb4867f4405aea8c0519d7d188207f232a57862", + "fixed_version": "6.7.2" + } + }, + "CVE-2023-52445": { + "4.19": { + "cmt_id": "ec36c134dd020d28e312c2f1766f85525e747aab", + "fixed_version": "4.19.306" + }, + "5.10": { + "cmt_id": "3233d8bf7893550045682192cb227af7fa3defeb", + "fixed_version": "5.10.209" + }, + "5.15": { + "cmt_id": "ec3634ebe23fc3c44ebc67c6d25917300bc68c08", + "fixed_version": "5.15.148" + }, + "5.4": { + "cmt_id": "47aa8fcd5e8b5563af4042a00f25ba89bef8f33d", + "fixed_version": "5.4.268" + }, + "6.1": { + "cmt_id": "30773ea47d41773f9611ffb4ebc9bda9d19a9e7e", + "fixed_version": "6.1.75" + }, + "6.6": { + "cmt_id": "2cf0005d315549b8d2b940ff96a66c2a889aa795", + "fixed_version": "6.6.14" + }, + "6.7": { + "cmt_id": "437b5f57732bb4cc32cc9f8895d2010ee9ff521c", + "fixed_version": "6.7.2" + } + }, + "CVE-2023-52446": { + "6.6": { + "cmt_id": "d048dced8ea5eac6723ae873a40567e6f101ea42", + "fixed_version": "6.6.14" + }, + "6.7": { + "cmt_id": "f9ff6ef1c73cd9e1a6bb1ab3e57c5d141a536306", + "fixed_version": "6.7.2" + } + }, + "CVE-2023-52447": { + "5.10": { + "cmt_id": "90c445799fd1dc214d7c6279c144e33a35e29ef2", + "fixed_version": "5.10.214" + }, + "5.15": { + "cmt_id": "37d98fb9c3144c0fddf7f6e99aece9927ac8dce6", + "fixed_version": "5.15.153" + }, + "6.1": { + "cmt_id": "62fca83303d608ad4fec3f7428c8685680bb01b0", + "fixed_version": "6.1.75" + }, + "6.6": { + "cmt_id": "f91cd728b10c51f6d4a39957ccd56d1e802fc8ee", + "fixed_version": "6.6.14" + }, + "6.7": { + "cmt_id": "bfd9b20c4862f41d4590fde11d70a5eeae53dcc5", + "fixed_version": "6.7.2" + } + }, + "CVE-2023-52448": { + "5.10": { + "cmt_id": "5c28478af371a1c3fdb570ca67f110e1ae60fc37", + "fixed_version": "5.10.209" + }, + "5.15": { + "cmt_id": "ee0586d73cbaf0e7058bc640d62a9daf2dfa9178", + "fixed_version": "5.15.148" + }, + "5.4": { + "cmt_id": "efc8ef87ab9185a23d5676f2f7d986022d91bcde", + "fixed_version": "5.4.268" + }, + "6.1": { + "cmt_id": "d69d7804cf9e2ba171a27e5f98bc266f13d0414a", + "fixed_version": "6.1.75" + }, + "6.6": { + "cmt_id": "067a7c48c2c70f05f9460d6f0e8423e234729f05", + "fixed_version": "6.6.14" + }, + "6.7": { + "cmt_id": "c323efd620c741168c8e0cc6fc0be04ab57e331a", + "fixed_version": "6.7.2" + } + }, + "CVE-2023-52449": { + "4.19": { + "cmt_id": "aeba358bcc8ffddf9b4a9bd0e5ec9eb338d46022", + "fixed_version": "4.19.306" + }, + "5.10": { + "cmt_id": "001a3f59d8c914ef8273461d4bf495df384cc5f8", + "fixed_version": "5.10.209" + }, + "5.15": { + "cmt_id": "d8ac2537763b54d278b80b2b080e1652523c7d4c", + "fixed_version": "5.15.148" + }, + "5.4": { + "cmt_id": "1bf4fe14e97cda621522eb2f28b0a4e87c5b0745", + "fixed_version": "5.4.268" + }, + "6.1": { + "cmt_id": "5389407bba1eab1266c6d83e226fb0840cb98dd5", + "fixed_version": "6.1.75" + }, + "6.6": { + "cmt_id": "cfd7c9d260dc0a3baaea05a122a19ab91e193c65", + "fixed_version": "6.6.14" + }, + "6.7": { + "cmt_id": "b36aaa64d58aaa2f2cbc8275e89bae76a2b6c3dc", + "fixed_version": "6.7.2" + } + }, + "CVE-2023-52450": { + "6.6": { + "cmt_id": "bf1bf09e6b599758851457f3999779622a48d015", + "fixed_version": "6.6.14" + }, + "6.7": { + "cmt_id": "3d6f4a78b104c65e4256c3776c9949f49a1b459e", + "fixed_version": "6.7.2" + } + }, + "CVE-2023-52451": { + "4.19": { + "cmt_id": "bb79613a9a704469ddb8d6c6029d532a5cea384c", + "fixed_version": "4.19.306" + }, + "5.10": { + "cmt_id": "b582aa1f66411d4adcc1aa55b8c575683fb4687e", + "fixed_version": "5.10.209" + }, + "5.15": { + "cmt_id": "999a27b3ce9a69d54ccd5db000ec3a447bc43e6d", + "fixed_version": "5.15.148" + }, + "5.4": { + "cmt_id": "9b5f03500bc5b083c0df696d7dd169d7ef3dd0c7", + "fixed_version": "5.4.268" + }, + "6.1": { + "cmt_id": "026fd977dc50ff4a5e09bfb0603557f104d3f3a0", + "fixed_version": "6.1.75" + }, + "6.6": { + "cmt_id": "df16afba2378d985359812c865a15c05c70a967e", + "fixed_version": "6.6.14" + }, + "6.7": { + "cmt_id": "708a4b59baad96c4718dc0bd3a3427d3ab22fedc", + "fixed_version": "6.7.2" + } + }, + "CVE-2023-52452": { + "6.6": { + "cmt_id": "0954982db8283016bf38e9db2da5adf47a102e19", + "fixed_version": "6.6.14" + }, + "6.7": { + "cmt_id": "fbcf372c8eda2290470268e0afb5ab5d5f5d5fde", + "fixed_version": "6.7.2" + } + }, + "CVE-2023-52453": { + "6.6": { + "cmt_id": "45f80b2f230df10600e6fa1b83b28bf1c334185e", + "fixed_version": "6.6.14" + }, + "6.7": { + "cmt_id": "6bda81e24a35a856f58e6a5786de579b07371603", + "fixed_version": "6.7.2" + } + }, + "CVE-2023-52454": { + "5.10": { + "cmt_id": "f775f2621c2ac5cc3a0b3a64665dad4fb146e510", + "fixed_version": "5.10.209" + }, + "5.15": { + "cmt_id": "4cb3cf7177ae3666be7fb27d4ad4d72a295fb02d", + "fixed_version": "5.15.148" + }, + "5.4": { + "cmt_id": "ee5e7632e981673f42a50ade25e71e612e543d9d", + "fixed_version": "5.4.268" + }, + "6.1": { + "cmt_id": "2871aa407007f6f531fae181ad252486e022df42", + "fixed_version": "6.1.75" + }, + "6.6": { + "cmt_id": "24e05760186dc070d3db190ca61efdbce23afc88", + "fixed_version": "6.6.14" + }, + "6.7": { + "cmt_id": "70154e8d015c9b4fb56c1a2ef1fc8b83d45c7f68", + "fixed_version": "6.7.2" + } + }, + "CVE-2023-52455": { + "6.6": { + "cmt_id": "98b8a550da83cc392a14298c4b3eaaf0332ae6ad", + "fixed_version": "6.6.14" + }, + "6.7": { + "cmt_id": "5e23e283910c9f30248732ae0770bcb0c9438abf", + "fixed_version": "6.7.2" + } + }, + "CVE-2023-52456": { + "5.10": { + "cmt_id": "6e04a9d30509fb53ba6df5d655ed61d607a7cfda", + "fixed_version": "5.10.209" + }, + "5.15": { + "cmt_id": "ff168d4fdb0e1ba35fb413a749b3d6cce918ec19", + "fixed_version": "5.15.148" + }, + "6.1": { + "cmt_id": "63ee7be01a3f7d28b1ea8b8d7944f12bb7b0ed06", + "fixed_version": "6.1.75" + }, + "6.6": { + "cmt_id": "763cd68746317b5d746dc2649a3295c1efb41181", + "fixed_version": "6.6.14" + }, + "6.7": { + "cmt_id": "9a662d06c22ddfa371958c2071dc350436be802b", + "fixed_version": "6.7.2" + } + }, + "CVE-2023-52457": { + "5.10": { + "cmt_id": "bc57f3ef8a9eb0180606696f586a6dcfaa175ed0", + "fixed_version": "5.10.209" + }, + "5.15": { + "cmt_id": "828cd829483f0cda920710997aed79130b0af690", + "fixed_version": "5.15.148" + }, + "5.4": { + "cmt_id": "b502fb43f7fb55aaf07f6092ab44657595214b93", + "fixed_version": "5.4.268" + }, + "6.1": { + "cmt_id": "d74173bda29aba58f822175d983d07c8ed335494", + "fixed_version": "6.1.75" + }, + "6.6": { + "cmt_id": "887a558d0298d36297daea039954c39940228d9b", + "fixed_version": "6.6.14" + }, + "6.7": { + "cmt_id": "95e4e0031effad9837af557ecbfd4294a4d8aeee", + "fixed_version": "6.7.2" + } + }, + "CVE-2023-52458": { + "5.15": { + "cmt_id": "5010c27120962c85d2f421d2cf211791c9603503", + "fixed_version": "5.15.148" + }, + "6.1": { + "cmt_id": "ef31cc87794731ffcb578a195a2c47d744e25fb8", + "fixed_version": "6.1.75" + }, + "6.6": { + "cmt_id": "cb16cc1abda18a9514106d2ac8c8d7abc0be5ed8", + "fixed_version": "6.6.14" + }, + "6.7": { + "cmt_id": "bcdc288e7bc008daf38ef0401b53e4a8bb61bbe5", + "fixed_version": "6.7.2" + } + }, + "CVE-2023-52459": { + "6.6": { + "cmt_id": "b7062628caeaec90e8f691ebab2d70f31b7b6b91", + "fixed_version": "6.6.14" + }, + "6.7": { + "cmt_id": "49d82811428469566667f22749610b8c132cdb3e", + "fixed_version": "6.7.2" + } + }, + "CVE-2023-52460": { + "6.7": { + "cmt_id": "6b80326efff093d037e0971831dca6ebddba9b45", + "fixed_version": "6.7.2" + } + }, + "CVE-2023-52461": { + "6.7": { + "cmt_id": "1470d173925d697b497656b93f7c5bddae2e64b2", + "fixed_version": "6.7.2" + } + }, + "CVE-2023-52462": { + "6.1": { + "cmt_id": "fc3e3c50a0a4cac1463967c110686189e4a59104", + "fixed_version": "6.1.75" + }, + "6.6": { + "cmt_id": "8dc15b0670594543c356567a1a45b0182ec63174", + "fixed_version": "6.6.14" + }, + "6.7": { + "cmt_id": "40617d45ea05535105e202a8a819e388a2b1f036", + "fixed_version": "6.7.2" + } + }, + "CVE-2023-52463": { + "5.10": { + "cmt_id": "94c742324ed7e42c5bd6a9ed22e4ec6d764db4d8", + "fixed_version": "5.10.209" + }, + "5.15": { + "cmt_id": "2aa141f8bc580f8f9811dfe4e0e6009812b73826", + "fixed_version": "5.15.148" + }, + "6.1": { + "cmt_id": "d4a9aa7db574a0da64307729cc031fb68597aa8b", + "fixed_version": "6.1.75" + }, + "6.6": { + "cmt_id": "0049fe7e4a85849bdd778cdb72e51a791ff3d737", + "fixed_version": "6.6.14" + }, + "6.7": { + "cmt_id": "d4a714873db0866cc471521114eeac4a5072d548", + "fixed_version": "6.7.2" + } + }, + "CVE-2023-52464": { + "4.19": { + "cmt_id": "71c17ee02538802ceafc830f0736aa35b564e601", + "fixed_version": "4.19.306" + }, + "5.10": { + "cmt_id": "6aa7865ba7ff7f0ede0035180fb3b9400ceb405a", + "fixed_version": "5.10.209" + }, + "5.15": { + "cmt_id": "700cf4bead80fac994dcc43ae1ca5d86d8959b21", + "fixed_version": "5.15.148" + }, + "5.4": { + "cmt_id": "5da3b6e7196f0b4f3728e4e25eb20233a9ddfaf6", + "fixed_version": "5.4.268" + }, + "6.1": { + "cmt_id": "9dbac9fdae6e3b411fc4c3fca3bf48f70609c398", + "fixed_version": "6.1.75" + }, + "6.6": { + "cmt_id": "e1c86511241588efffaa49556196f09a498d5057", + "fixed_version": "6.6.14" + }, + "6.7": { + "cmt_id": "426fae93c01dffa379225eb2bd4d3cdc42c6eec5", + "fixed_version": "6.7.2" + } + }, + "CVE-2023-52465": { + "6.6": { + "cmt_id": "e2717302fbc20f148bcda362facee0444b949a3a", + "fixed_version": "6.6.14" + }, + "6.7": { + "cmt_id": "bd3d2ec447ede9da822addf3960a5f4275e3ae76", + "fixed_version": "6.7.2" + } + }, + "CVE-2023-52467": { + "5.10": { + "cmt_id": "927626a2073887ee30ba00633260d4d203f8e875", + "fixed_version": "5.10.209" + }, + "5.15": { + "cmt_id": "c3e3a2144bf50877551138ffce9f7aa6ddfe385b", + "fixed_version": "5.15.148" + }, + "6.1": { + "cmt_id": "527e8c5f3d00299822612c495d5adf1f8f43c001", + "fixed_version": "6.1.75" + }, + "6.6": { + "cmt_id": "3ef1130deee98997275904d9bfc37af75e1e906c", + "fixed_version": "6.6.14" + }, + "6.7": { + "cmt_id": "7f2c410ac470959b88e03dadd94b7a0b71df7973", + "fixed_version": "6.7.2" + } + }, + "CVE-2023-52468": { + "6.6": { + "cmt_id": "b57196a5ec5e4c0ffecde8348b085b778c7dce04", + "fixed_version": "6.6.14" + }, + "6.7": { + "cmt_id": "0f1486dafca3398c4c46b9f6e6452fa27e73b559", + "fixed_version": "6.7.2" + } + }, + "CVE-2023-52469": { + "4.19": { + "cmt_id": "8a27d9d9fc9b5564b8904c3a77a7dea482bfa34e", + "fixed_version": "4.19.306" + }, + "5.10": { + "cmt_id": "520e213a0b97b64735a13950e9371e0a5d7a5dc3", + "fixed_version": "5.10.209" + }, + "5.15": { + "cmt_id": "b6dcba02ee178282e0d28684d241e0b8462dea6a", + "fixed_version": "5.15.148" + }, + "5.4": { + "cmt_id": "8b55b06e737feb2a645b0293ea27e38418876d63", + "fixed_version": "5.4.268" + }, + "6.1": { + "cmt_id": "35fa2394d26e919f63600ce631e6aefc95ec2706", + "fixed_version": "6.1.75" + }, + "6.6": { + "cmt_id": "95084632a65d5c0d682a83b55935560bdcd2a1e3", + "fixed_version": "6.6.14" + }, + "6.7": { + "cmt_id": "3426f059eacc33ecc676b0d66539297e1cfafd02", + "fixed_version": "6.7.2" + } + }, + "CVE-2023-52470": { + "4.19": { + "cmt_id": "21b1645660717d6126dd4866c850fcc5c4703a41", + "fixed_version": "4.19.306" + }, + "5.10": { + "cmt_id": "57ca7984806d79b38af528de88fd803babf27feb", + "fixed_version": "5.10.209" + }, + "5.15": { + "cmt_id": "14bbfaa5df273b26cde6707f6e655585700e6fe1", + "fixed_version": "5.15.148" + }, + "5.4": { + "cmt_id": "5d12c5d75f7c78b83a738025947651ec5c95b4d4", + "fixed_version": "5.4.268" + }, + "6.1": { + "cmt_id": "c4ff55408187f2595066967047363ca84e76db85", + "fixed_version": "6.1.75" + }, + "6.6": { + "cmt_id": "0b813a6a0087451cb702b6eb841f10856f49d088", + "fixed_version": "6.6.14" + }, + "6.7": { + "cmt_id": "fb2d8bc9b5e55848b8a7c3c028e2ee8d49f28f97", + "fixed_version": "6.7.2" + } + }, + "CVE-2023-52471": { + "6.7": { + "cmt_id": "3cd9b9bee33f39f6c6d52360fe381b89a7b12695", + "fixed_version": "6.7.2" + } + }, + "CVE-2023-52472": { + "6.6": { + "cmt_id": "2831f4d3bfa68e64c5f83e96688be779c87b3511", + "fixed_version": "6.6.14" + }, + "6.7": { + "cmt_id": "95ad8b6879e2e49d02e3bfc0e1fb46421633fe2a", + "fixed_version": "6.7.2" + } + }, + "CVE-2023-52473": { + "6.6": { + "cmt_id": "335176dd8ebaca6493807dceea33c478305667fa", + "fixed_version": "6.6.14" + }, + "6.7": { + "cmt_id": "02871710b93058eb1249d5847c0b2d1c2c3c98ae", + "fixed_version": "6.7.2" + } + }, + "CVE-2023-52474": { + "5.10": { + "cmt_id": "9c4c6512d7330b743c4ffd18bd999a86ca26db0d", + "fixed_version": "5.10.180" + }, + "5.15": { + "cmt_id": "a2bd706ab63509793b5cd5065e685b7ef5cba678", + "fixed_version": "5.15.111" + }, + "6.1": { + "cmt_id": "dce59b5443700fbd0d2433ec6e4d4cf063448844", + "fixed_version": "6.1.28" + }, + "6.2": { + "cmt_id": "c76cb8f4bdf26d04cfa5485a93ce297dba5e6a80", + "fixed_version": "6.2.15" + }, + "6.3": { + "cmt_id": "7e6010f79b58f45b204cf18aa58f4b73c3f30adc", + "fixed_version": "6.3.2" + } + }, + "CVE-2023-52475": { + "4.14": { + "cmt_id": "8677575c4f39d65bf0d719b5d20e8042e550ccb9", + "fixed_version": "4.14.328" + }, + "4.19": { + "cmt_id": "67cace72606baf1758fd60feb358f4c6be92e1cc", + "fixed_version": "4.19.297" + }, + "5.10": { + "cmt_id": "cd2fbfd8b922b7fdd50732e47d797754ab59cb06", + "fixed_version": "5.10.199" + }, + "5.15": { + "cmt_id": "6a4a396386404e62fb59bc3bde48871a64a82b4f", + "fixed_version": "5.15.136" + }, + "5.4": { + "cmt_id": "5aa514100aaf59868d745196258269a16737c7bd", + "fixed_version": "5.4.259" + }, + "6.1": { + "cmt_id": "2efe67c581a2a6122b328d4bb6f21b3f36f40d46", + "fixed_version": "6.1.59" + }, + "6.5": { + "cmt_id": "e528b1b9d60743e0b26224e3fe7aa74c24b8b2f8", + "fixed_version": "6.5.8" + } + }, + "CVE-2023-52476": { + "5.15": { + "cmt_id": "403d201d1fd144cb249836dafb222f6375871c6c", + "fixed_version": "5.15.137" + }, + "6.1": { + "cmt_id": "3863989497652488a50f00e96de4331e5efabc6c", + "fixed_version": "6.1.59" + }, + "6.5": { + "cmt_id": "f71edacbd4f99c0e12fe4a4007ab4d687d0688db", + "fixed_version": "6.5.8" + } + }, + "CVE-2023-52477": { + "4.14": { + "cmt_id": "c64e4dca9aefd232b17ac4c779b608b286654e81", + "fixed_version": "4.14.328" + }, + "4.19": { + "cmt_id": "8e7346bfea56453e31b7421c1c17ca2fb9ed613d", + "fixed_version": "4.19.297" + }, + "5.10": { + "cmt_id": "241f230324337ed5eae3846a554fb6d15169872c", + "fixed_version": "5.10.199" + }, + "5.15": { + "cmt_id": "528f0ba9f7a4bc1b61c9b6eb591ff97ca37cac6b", + "fixed_version": "5.15.136" + }, + "5.4": { + "cmt_id": "6ad3e9fd3632106696692232bf7ff88b9f7e1bc3", + "fixed_version": "5.4.259" + }, + "6.1": { + "cmt_id": "fb9895ab9533534335fa83d70344b397ac862c81", + "fixed_version": "6.1.59" + }, + "6.5": { + "cmt_id": "136f69a04e71ba3458d137aec3bb2ce1232c0289", + "fixed_version": "6.5.8" + } + }, + "CVE-2023-52478": { + "4.14": { + "cmt_id": "ca0c4cc1d215dc22ab0e738c9f017c650f3183f5", + "fixed_version": "4.14.328" + }, + "4.19": { + "cmt_id": "44481b244fcaa2b895a53081d6204c574720c38c", + "fixed_version": "4.19.297" + }, + "5.10": { + "cmt_id": "093af62c023537f097d2ebdfaa0bc7c1a6e874e1", + "fixed_version": "5.10.199" + }, + "5.15": { + "cmt_id": "28ddc1e0b898291323b62d770b1b931de131a528", + "fixed_version": "5.15.136" + }, + "5.4": { + "cmt_id": "cd0e2bf7fb22fe9b989c59c42dca06367fd10e6b", + "fixed_version": "5.4.259" + }, + "6.1": { + "cmt_id": "fd72ac9556a473fc7daf54efb6ca8a97180d621d", + "fixed_version": "6.1.59" + }, + "6.5": { + "cmt_id": "f7b2c7d9831af99369fe8ad9b2a68d78942f414e", + "fixed_version": "6.5.8" + } + }, + "CVE-2023-52479": { + "5.15": { + "cmt_id": "694e13732e830cbbfedb562e57f28644927c33fd", + "fixed_version": "5.15.135" + }, + "6.1": { + "cmt_id": "8226ffc759ea59f10067b9acdf7f94bae1c69930", + "fixed_version": "6.1.57" + }, + "6.5": { + "cmt_id": "d5b0e9d3563e7e314a850e81f42b2ef6f39882f9", + "fixed_version": "6.5.7" + } + }, + "CVE-2023-52480": { + "5.15": { + "cmt_id": "c77fd3e25a51ac92b0f1b347a96eff6a0b4f066f", + "fixed_version": "5.15.145" + }, + "6.1": { + "cmt_id": "a2ca5fd3dbcc665e1169044fa0c9e3eba779202b", + "fixed_version": "6.1.57" + }, + "6.5": { + "cmt_id": "18ced78b0ebccc2d16f426143dc56ab3aad666be", + "fixed_version": "6.5.7" + } + }, + "CVE-2023-52481": { + "6.1": { + "cmt_id": "6e3ae2927b432a3b7c8374f14dbc1bd9ebe4372c", + "fixed_version": "6.1.57" + }, + "6.5": { + "cmt_id": "32b0a4ffcaea44a00a61e40c0d1bcc50362aee25", + "fixed_version": "6.5.7" + } + }, + "CVE-2023-52482": { + "5.15": { + "cmt_id": "f090a8b4d2e3ec6f318d6fdab243a2edc5a8cc37", + "fixed_version": "5.15.134" + }, + "6.1": { + "cmt_id": "6ce2f297a7168274547d0b5aea6c7c16268b8a96", + "fixed_version": "6.1.56" + }, + "6.5": { + "cmt_id": "cf43b304b6952b549d58feabc342807b334f03d4", + "fixed_version": "6.5.6" + } + }, + "CVE-2023-52483": { + "5.15": { + "cmt_id": "6c52b12159049046483fdb0c411a0a1869c41a67", + "fixed_version": "5.15.137" + }, + "6.1": { + "cmt_id": "1db0724a01b558feb1ecae551782add1951a114a", + "fixed_version": "6.1.59" + }, + "6.5": { + "cmt_id": "2405f64a95a7a094eb24cba9bcfaffd1ea264de4", + "fixed_version": "6.5.8" + } + }, + "CVE-2023-52484": { + "5.15": { + "cmt_id": "f5a604757aa8e37ea9c7011dc9da54fa1b30f29b", + "fixed_version": "5.15.134" + }, + "6.1": { + "cmt_id": "f90f4c562003ac3d3b135c5a40a5383313f27264", + "fixed_version": "6.1.56" + }, + "6.5": { + "cmt_id": "3283a1bce9bbc978059f790b84f3c10c32492429", + "fixed_version": "6.5.6" + } + }, + "CVE-2023-52485": { + "6.7": { + "cmt_id": "303197775a97416b62d4da69280d0c120a20e009", + "fixed_version": "6.7.3" + } + }, + "CVE-2023-52486": { + "4.19": { + "cmt_id": "376e21a9e4c2c63ee5d8d3aa74be5082c3882229", + "fixed_version": "4.19.307" + }, + "5.10": { + "cmt_id": "f55261469be87c55df13db76dc945f6bcd825105", + "fixed_version": "5.10.210" + }, + "5.15": { + "cmt_id": "b4af63da9d94986c529d74499fdfe44289acd551", + "fixed_version": "5.15.149" + }, + "5.4": { + "cmt_id": "9dd334a8245011ace45e53298175c7b659edb3e7", + "fixed_version": "5.4.269" + }, + "6.1": { + "cmt_id": "62f2e79cf9f4f47cc9dea9cebdf58d9f7b5695e0", + "fixed_version": "6.1.76" + }, + "6.6": { + "cmt_id": "d7afdf360f4ac142832b098b4de974e867cc063c", + "fixed_version": "6.6.15" + }, + "6.7": { + "cmt_id": "bfd0feb1b109cb63b87fdcd00122603787c75a1a", + "fixed_version": "6.7.3" + } + }, + "CVE-2023-52487": { + "6.6": { + "cmt_id": "74cec142f89bf85c6c99c5db957da9f663f9f16f", + "fixed_version": "6.6.15" + }, + "6.7": { + "cmt_id": "e24d6f5a7f2d95a98a46257a5a5a5381d572894f", + "fixed_version": "6.7.3" + } + }, + "CVE-2023-52488": { + "6.1": { + "cmt_id": "416b10d2817c94db86829fb92ad43ce7d002c573", + "fixed_version": "6.1.76" + }, + "6.6": { + "cmt_id": "084c24e788d9cf29c55564de368bf5284f2bb5db", + "fixed_version": "6.6.15" + }, + "6.7": { + "cmt_id": "aa7cb4787698add9367b19f7afc667662c9bdb23", + "fixed_version": "6.7.3" + } + }, + "CVE-2023-52489": { + "5.10": { + "cmt_id": "90ad17575d26874287271127d43ef3c2af876cea", + "fixed_version": "5.10.210" + }, + "5.15": { + "cmt_id": "b448de2459b6d62a53892487ab18b7d823ff0529", + "fixed_version": "5.15.149" + }, + "6.1": { + "cmt_id": "68ed9e33324021e9d6b798e9db00ca3093d2012a", + "fixed_version": "6.1.76" + }, + "6.6": { + "cmt_id": "70064241f2229f7ba7b9599a98f68d9142e81a97", + "fixed_version": "6.6.15" + }, + "6.7": { + "cmt_id": "3a01daace71b521563c38bbbf874e14c3e58adb7", + "fixed_version": "6.7.3" + } + }, + "CVE-2023-52490": { + "6.6": { + "cmt_id": "9128bfbc5c80d8f4874dd0a0424d1f5fb010df1b", + "fixed_version": "6.6.15" + }, + "6.7": { + "cmt_id": "3889a418b6eb9a1113fb989aaadecf2f64964767", + "fixed_version": "6.7.3" + } + }, + "CVE-2023-52491": { + "5.10": { + "cmt_id": "43872f44eee6c6781fea1348b38885d8e78face9", + "fixed_version": "5.10.210" + }, + "5.15": { + "cmt_id": "1b1036c60a37a30caf6759a90fe5ecd06ec35590", + "fixed_version": "5.15.149" + }, + "6.1": { + "cmt_id": "9fec4db7fff54d9b0306a332bab31eac47eeb5f6", + "fixed_version": "6.1.76" + }, + "6.6": { + "cmt_id": "8254d54d00eb6cdb8367399c7f912eb8d354ecd7", + "fixed_version": "6.6.15" + }, + "6.7": { + "cmt_id": "6e2f37022f0fc0893da4d85a0500c9d547fffd4c", + "fixed_version": "6.7.3" + } + }, + "CVE-2023-52492": { + "5.10": { + "cmt_id": "9de69732dde4e443c1c7f89acbbed2c45a6a8e17", + "fixed_version": "5.10.210" + }, + "5.15": { + "cmt_id": "047fce470412ab64cb7345f9ff5d06919078ad79", + "fixed_version": "5.15.149" + }, + "6.1": { + "cmt_id": "2ab32986a0b9e329eb7f8f04dd57cc127f797c08", + "fixed_version": "6.1.76" + }, + "6.6": { + "cmt_id": "7f0ccfad2031eddcc510caf4e57f2d4aa2d8a50b", + "fixed_version": "6.6.15" + }, + "6.7": { + "cmt_id": "9263fd2a63487c6d04cbb7b74a48fb12e1e352d0", + "fixed_version": "6.7.3" + } + }, + "CVE-2023-52493": { + "5.10": { + "cmt_id": "20a6dea2d1c68d4e03c6bb50bc12e72e226b5c0e", + "fixed_version": "5.10.210" + }, + "5.15": { + "cmt_id": "6e4c84316e2b70709f0d00c33ba3358d9fc8eece", + "fixed_version": "5.15.149" + }, + "6.1": { + "cmt_id": "3c5ec66b4b3f6816f3a6161538672e389e537690", + "fixed_version": "6.1.76" + }, + "6.6": { + "cmt_id": "eaefb9464031215d63c0a8a7e2bfaa00736aa17e", + "fixed_version": "6.6.15" + }, + "6.7": { + "cmt_id": "b8eff20d87092e14cac976d057cb0aea2f1d0830", + "fixed_version": "6.7.3" + } + }, + "CVE-2023-52494": { + "5.15": { + "cmt_id": "94991728c84f8df54fd9eec9b85855ef9057ea08", + "fixed_version": "5.15.149" + }, + "6.1": { + "cmt_id": "2df39ac8f813860f79782807c3f7acff40b3c551", + "fixed_version": "6.1.76" + }, + "6.6": { + "cmt_id": "a9ebfc405fe1be145f414eafadcbf09506082010", + "fixed_version": "6.6.15" + }, + "6.7": { + "cmt_id": "ecf8320111822a1ae5d5fc512953eab46d543d0b", + "fixed_version": "6.7.3" + } + }, + "CVE-2023-52495": { + "6.6": { + "cmt_id": "532a5557da6892a6b2d5793052e1bce1f4c9e177", + "fixed_version": "6.6.15" + }, + "6.7": { + "cmt_id": "d26edf4ee3672cc9828f2a3ffae34086a712574d", + "fixed_version": "6.7.3" + } + }, + "CVE-2023-52497": { + "5.10": { + "cmt_id": "a0180e940cf1aefa7d516e20b259ad34f7a8b379", + "fixed_version": "5.10.211" + }, + "5.15": { + "cmt_id": "77cbc04a1a8610e303a0e0d74f2676667876a184", + "fixed_version": "5.15.150" + }, + "6.1": { + "cmt_id": "33bf23c9940dbd3a22aad7f0cda4c84ed5701847", + "fixed_version": "6.1.76" + }, + "6.6": { + "cmt_id": "f36d200a80a3ca025532ed60dd1ac21b620e14ae", + "fixed_version": "6.6.15" + }, + "6.7": { + "cmt_id": "bffc4cc334c5bb31ded54bc3cfd651735a3cb79e", + "fixed_version": "6.7.3" + } + }, + "CVE-2023-52498": { + "5.10": { + "cmt_id": "f46eb832389f162ad13cb780d0b8cde93641990d", + "fixed_version": "5.10.210" + }, + "5.15": { + "cmt_id": "a1d62c775b07213c73f81ae842424c74dd14b5f0", + "fixed_version": "5.15.149" + }, + "6.1": { + "cmt_id": "e1c9d32c98309ae764893a481552d3f99d46cb34", + "fixed_version": "6.1.76" + }, + "6.6": { + "cmt_id": "e681e29d1f59a04ef773296e4bebb17b1b79f8fe", + "fixed_version": "6.6.15" + }, + "6.7": { + "cmt_id": "9bd3dce27b01c51295b60e1433e1dadfb16649f7", + "fixed_version": "6.7.3" + } + }, + "CVE-2023-52499": { + "5.15": { + "cmt_id": "29017ab1a539101d9c7bec63cc13a019f97b2820", + "fixed_version": "5.15.137" + }, + "6.1": { + "cmt_id": "8ac2689502f986a46f4221e239d4ff2897f1ccb3", + "fixed_version": "6.1.59" + }, + "6.5": { + "cmt_id": "70f6756ad96dd70177dddcfac2fe4bd4bb320746", + "fixed_version": "6.5.8" + } + }, + "CVE-2023-52500": { + "5.10": { + "cmt_id": "2afd8fcee0c4d65a482e30c3ad2a92c25e5e92d4", + "fixed_version": "5.10.198" + }, + "5.15": { + "cmt_id": "d540a4370aba378fbedf349ba0bb68e96e24243d", + "fixed_version": "5.15.134" + }, + "6.1": { + "cmt_id": "2259e1901b2d8c0e8538fc99e77de443b939e749", + "fixed_version": "6.1.56" + }, + "6.5": { + "cmt_id": "22e6d783a33015bcdf0979015e4eac603912bea7", + "fixed_version": "6.5.6" + } + }, + "CVE-2023-52501": { + "5.10": { + "cmt_id": "cee5151c5410e868826b8afecfb356f3799ebea3", + "fixed_version": "5.10.198" + }, + "5.15": { + "cmt_id": "344f2f3e61a90f0150c754796ec9a17fcaeec03d", + "fixed_version": "5.15.134" + }, + "6.1": { + "cmt_id": "b08a4938229dbb530a35c41b83002a1457c6ff49", + "fixed_version": "6.1.56" + }, + "6.5": { + "cmt_id": "75fc9e99b3a71006720ad1e029db11a4b5c32d4a", + "fixed_version": "6.5.6" + } + }, + "CVE-2023-52502": { + "4.19": { + "cmt_id": "e863f5720a5680e50c4cecf12424d7cc31b3eb0a", + "fixed_version": "4.19.297" + }, + "5.10": { + "cmt_id": "6ac22ecdaad2ecc662048f8c6b0ceb1ca0699ef9", + "fixed_version": "5.10.199" + }, + "5.15": { + "cmt_id": "d888d3f70b0de32b4f51534175f039ddab15eef8", + "fixed_version": "5.15.136" + }, + "5.4": { + "cmt_id": "7adcf014bda16cdbf804af5c164d94d5d025db2d", + "fixed_version": "5.4.259" + }, + "6.1": { + "cmt_id": "e4f2611f07c87b3ddb57c4b9e8efcd1e330fc3dc", + "fixed_version": "6.1.59" + }, + "6.5": { + "cmt_id": "d1af8a39cf839d93c8967fdd858f6bbdc3e4a15c", + "fixed_version": "6.5.8" + } + }, + "CVE-2023-52503": { + "5.10": { + "cmt_id": "da7ce52a2f6c468946195b116615297d3d113a27", + "fixed_version": "5.10.199" + }, + "5.15": { + "cmt_id": "1680c82929bc14d706065f123dab77f2f1293116", + "fixed_version": "5.15.136" + }, + "6.1": { + "cmt_id": "60c3e7a00db954947c265b55099c21b216f2a05c", + "fixed_version": "6.1.59" + }, + "6.5": { + "cmt_id": "1c95574350cd63bc3c5c2fa06658010768f2a0ce", + "fixed_version": "6.5.8" + } + }, + "CVE-2023-52504": { + "4.19": { + "cmt_id": "3719d3c36aa853d5a2401af9f8d6b116c91ad5ae", + "fixed_version": "4.19.297" + }, + "5.10": { + "cmt_id": "6788b10620ca6e98575d1e06e72a8974aad7657e", + "fixed_version": "5.10.199" + }, + "5.15": { + "cmt_id": "ecba5afe86f30605eb9dfb7f265a8de0218d4cfc", + "fixed_version": "5.15.136" + }, + "5.4": { + "cmt_id": "3770c38cd6a60494da29ac2da73ff8156440a2d1", + "fixed_version": "5.4.270" + }, + "6.1": { + "cmt_id": "5b784489c8158518bf7a466bb3cc045b0fb66b4b", + "fixed_version": "6.1.59" + }, + "6.5": { + "cmt_id": "cd287cc208dfe6bd6da98e7f88e723209242c9b4", + "fixed_version": "6.5.8" + } + }, + "CVE-2023-52505": { + "6.1": { + "cmt_id": "6f901f8448c6b25ed843796b114471d2a3fc5dfb", + "fixed_version": "6.1.59" + }, + "6.5": { + "cmt_id": "c2d7c79898b427d263c64a4841987eec131f2d4e", + "fixed_version": "6.5.8" + } + }, + "CVE-2023-52506": { + "6.1": { + "cmt_id": "f105e893a8edd48bdf4bef9fef845a9ff402f737", + "fixed_version": "6.1.56" + }, + "6.5": { + "cmt_id": "19878758accf6b2788091a771d9f9fee7bab11ab", + "fixed_version": "6.5.6" + } + }, + "CVE-2023-52507": { + "4.14": { + "cmt_id": "2c231a247a1d1628e41fa1eefd1a5307c41c5f53", + "fixed_version": "4.14.328" + }, + "4.19": { + "cmt_id": "a686f84101680b8442181a8846fbd3c934653729", + "fixed_version": "4.19.297" + }, + "5.10": { + "cmt_id": "a424807d860ba816aaafc3064b46b456361c0802", + "fixed_version": "5.10.199" + }, + "5.15": { + "cmt_id": "25dd54b95abfdca423b65a4ee620a774777d8213", + "fixed_version": "5.15.136" + }, + "5.4": { + "cmt_id": "95733ea130e35ef9ec5949a5908dde3feaba92cb", + "fixed_version": "5.4.259" + }, + "6.1": { + "cmt_id": "853dda54ba59ea70d5580a298b7ede4707826848", + "fixed_version": "6.1.59" + }, + "6.5": { + "cmt_id": "6584eba7688dcf999542778b07f63828c21521da", + "fixed_version": "6.5.8" + } + }, + "CVE-2023-52508": { + "6.1": { + "cmt_id": "be90c9e29dd59b7d19a73297a1590ff3ec1d22ea", + "fixed_version": "6.1.56" + }, + "6.5": { + "cmt_id": "dd46b3ac7322baf3772b33b29726e94f98289db7", + "fixed_version": "6.5.6" + } + }, + "CVE-2023-52509": { + "5.10": { + "cmt_id": "db9aafa19547833240f58c2998aed7baf414dc82", + "fixed_version": "5.10.199" + }, + "5.15": { + "cmt_id": "616761cf9df9af838c0a1a1232a69322a9eb67e6", + "fixed_version": "5.15.136" + }, + "5.4": { + "cmt_id": "65d34cfd4e347054eb4193bc95d9da7eaa72dee5", + "fixed_version": "5.4.259" + }, + "6.1": { + "cmt_id": "6f6fa8061f756aedb93af12a8a5d3cf659127965", + "fixed_version": "6.1.59" + }, + "6.5": { + "cmt_id": "105abd68ad8f781985113aee2e92e0702b133705", + "fixed_version": "6.5.8" + } + }, + "CVE-2023-52510": { + "4.14": { + "cmt_id": "28b68cba378e3e50a4082b65f262bc4f2c7c2add", + "fixed_version": "4.14.328" + }, + "4.19": { + "cmt_id": "cdb46be93c1f7bbf2c4649e9fc5fb147cfb5245d", + "fixed_version": "4.19.297" + }, + "5.10": { + "cmt_id": "55e06850c7894f00d41b767c5f5665459f83f58f", + "fixed_version": "5.10.199" + }, + "5.15": { + "cmt_id": "84c6aa0ae5c4dc121f9996bb8fed46c80909d80e", + "fixed_version": "5.15.136" + }, + "5.4": { + "cmt_id": "85c2857ef90041f567ce98722c1c342c4d31f4bc", + "fixed_version": "5.4.259" + }, + "6.1": { + "cmt_id": "217efe32a45249eb07dcd7197e8403de98345e66", + "fixed_version": "6.1.59" + }, + "6.5": { + "cmt_id": "becf5c147198f4345243c5df0c4f035415491640", + "fixed_version": "6.5.8" + } + }, + "CVE-2023-52511": { + "5.15": { + "cmt_id": "ff05ed4ae214011464a0156f05cac1b0b46b5fbc", + "fixed_version": "5.15.134" + }, + "6.1": { + "cmt_id": "e15bb292b24630ee832bfc7fd616bd72c7682bbb", + "fixed_version": "6.1.56" + }, + "6.5": { + "cmt_id": "b3c21c9c7289692f4019f163c3b06d8bdf78b355", + "fixed_version": "6.5.6" + } + }, + "CVE-2023-52512": { + "6.1": { + "cmt_id": "6c18c386fd13dbb3ff31a1086dabb526780d9bda", + "fixed_version": "6.1.59" + }, + "6.5": { + "cmt_id": "c9d7cac0fd27c74dd368e80dc4b5d0f9f2e13cf8", + "fixed_version": "6.5.8" + } + }, + "CVE-2023-52513": { + "5.10": { + "cmt_id": "0d520cdb0cd095eac5d00078dfd318408c9b5eed", + "fixed_version": "5.10.198" + }, + "5.15": { + "cmt_id": "81b7bf367eea795d259d0261710c6a89f548844d", + "fixed_version": "5.15.135" + }, + "5.4": { + "cmt_id": "6e26812e289b374c17677d238164a5a8f5770594", + "fixed_version": "5.4.258" + }, + "6.1": { + "cmt_id": "5cf38e638e5d01b68f9133968a85e8b3fd1ecf2f", + "fixed_version": "6.1.57" + }, + "6.5": { + "cmt_id": "eeafc50a77f6a783c2c44e7ec3674a7b693e06f8", + "fixed_version": "6.5.7" + } + }, + "CVE-2023-52515": { + "5.10": { + "cmt_id": "26788a5b48d9d5cd3283d777d238631c8cd7495a", + "fixed_version": "5.10.199" + }, + "5.15": { + "cmt_id": "b9bdffb3f9aaeff8379c83f5449c6b42cb71c2b5", + "fixed_version": "5.15.136" + }, + "6.1": { + "cmt_id": "2b298f9181582270d5e95774e5a6c7a7fb5b1206", + "fixed_version": "6.1.57" + }, + "6.5": { + "cmt_id": "05a10b316adaac1f322007ca9a0383b410d759cc", + "fixed_version": "6.5.7" + } + }, + "CVE-2023-52516": { + "5.10": { + "cmt_id": "c79300599923daaa30f417c75555d5566b3d31ae", + "fixed_version": "5.10.198" + }, + "5.15": { + "cmt_id": "ac0d068099349cbca3d93f2e3b15bb329364b08c", + "fixed_version": "5.15.134" + }, + "6.1": { + "cmt_id": "be8f49029eca3efbad0d74dbff3cb9129994ffab", + "fixed_version": "6.1.56" + }, + "6.5": { + "cmt_id": "fe2b811a02c3244ebf6059039e4a9e715e26a9e3", + "fixed_version": "6.5.6" + } + }, + "CVE-2023-52517": { + "5.15": { + "cmt_id": "bd1ec7f9983b5cd3c77e0f7cda3fa8aed041af2f", + "fixed_version": "5.15.134" + }, + "6.1": { + "cmt_id": "36b29974a7ad2ff604c24ad348f940506c7b1209", + "fixed_version": "6.1.56" + }, + "6.5": { + "cmt_id": "4e149d524678431638ff378ef6025e4e89b71097", + "fixed_version": "6.5.6" + } + }, + "CVE-2023-52518": { + "6.1": { + "cmt_id": "626535077ba9dc110787540d1fe24881094c15a1", + "fixed_version": "6.1.57" + }, + "6.5": { + "cmt_id": "eea5a8f0c3b7c884d2351e75fbdd0a3d7def5ae1", + "fixed_version": "6.5.7" + } + }, + "CVE-2023-52519": { + "5.15": { + "cmt_id": "8781fe259dd5a178fdd1069401bbd1437f9491c5", + "fixed_version": "5.15.135" + }, + "6.1": { + "cmt_id": "cdcc04e844a2d22d9d25cef1e8e504a174ea9f8f", + "fixed_version": "6.1.57" + }, + "6.5": { + "cmt_id": "60fb3f054c99608ddb1f2466c07108da6292951e", + "fixed_version": "6.5.7" + } + }, + "CVE-2023-52520": { + "5.15": { + "cmt_id": "124cf0ea4b82e1444ec8c7420af4e7db5558c293", + "fixed_version": "5.15.136" + }, + "6.1": { + "cmt_id": "af21c9119a37cecb7ff27ce0c2f3cf721e9d0ec4", + "fixed_version": "6.1.59" + }, + "6.5": { + "cmt_id": "c6e3023579de8d33256771ac0745239029e81106", + "fixed_version": "6.5.8" + } + }, + "CVE-2023-52522": { + "5.10": { + "cmt_id": "2ea52a2fb8e87067e26bbab4efb8872639240eb0", + "fixed_version": "5.10.198" + }, + "5.15": { + "cmt_id": "147d89ee41434b97043c2dcb17a97dc151859baa", + "fixed_version": "5.15.135" + }, + "5.4": { + "cmt_id": "95eabb075a5902f4c0834ab1fb12dc35730c05af", + "fixed_version": "5.4.258" + }, + "6.1": { + "cmt_id": "f82aac8162871e87027692b36af335a2375d4580", + "fixed_version": "6.1.57" + }, + "6.5": { + "cmt_id": "a75152d233370362eebedb2643592e7c883cc9fc", + "fixed_version": "6.5.7" + } + }, + "CVE-2023-52523": { + "5.15": { + "cmt_id": "bc8b89b6963803a123f64aa9494155a037b3d728", + "fixed_version": "5.15.135" + }, + "6.1": { + "cmt_id": "b8f97e47b6fb84fcf2f5a22e725eefb6cf5070c2", + "fixed_version": "6.1.57" + }, + "6.5": { + "cmt_id": "ded6e448028f0f91b6af35985afca01fa02a9089", + "fixed_version": "6.5.7" + } + }, + "CVE-2023-52524": { + "6.5": { + "cmt_id": "29c16c2bf5866326d5fbc4a537b3997fcac23391", + "fixed_version": "6.5.7" + } + }, + "CVE-2023-52526": { + "6.1": { + "cmt_id": "6a5a8f0a9740f865693d5aa97a42cc4504538e18", + "fixed_version": "6.1.57" + }, + "6.5": { + "cmt_id": "c955751cbf864cf2055117dd3fe7f780d2a57b56", + "fixed_version": "6.5.7" + } + }, + "CVE-2023-52527": { + "4.14": { + "cmt_id": "7626b9fed53092aa2147978070e610ecb61af844", + "fixed_version": "4.14.327" + }, + "4.19": { + "cmt_id": "559d697c5d072593d22b3e0bd8b8081108aeaf59", + "fixed_version": "4.19.296" + }, + "5.10": { + "cmt_id": "96b2e1090397217839fcd6c9b6d8f5d439e705ed", + "fixed_version": "5.10.198" + }, + "5.15": { + "cmt_id": "cd1189956393bf850b2e275e37411855d3bd86bb", + "fixed_version": "5.15.135" + }, + "5.4": { + "cmt_id": "1fc793d68d50dee4782ef2e808913d5dd880bcc6", + "fixed_version": "5.4.258" + }, + "6.1": { + "cmt_id": "f6a7182179c0ed788e3755ee2ed18c888ddcc33f", + "fixed_version": "6.1.57" + }, + "6.5": { + "cmt_id": "fe80658c08e3001c80c5533cd41abfbb0e0e28fd", + "fixed_version": "6.5.7" + } + }, + "CVE-2023-52528": { + "4.14": { + "cmt_id": "3e0af6eec1789fd11934164a7f4dbcad979855a4", + "fixed_version": "4.14.327" + }, + "4.19": { + "cmt_id": "2a36d9e2995c8c3c3f179aab1215a69cff06cbed", + "fixed_version": "4.19.296" + }, + "5.10": { + "cmt_id": "30bc4d7aebe33904b0f2d3aad4b4a9c6029ad0c5", + "fixed_version": "5.10.198" + }, + "5.15": { + "cmt_id": "cda10784a176d7192f08ecb518f777a4e9575812", + "fixed_version": "5.15.135" + }, + "5.4": { + "cmt_id": "310f1c92f65ad905b7e81fe14de82d979ebbd825", + "fixed_version": "5.4.258" + }, + "6.1": { + "cmt_id": "9ffc5018020fe646795a8dc1203224b8f776dc09", + "fixed_version": "6.1.57" + }, + "6.5": { + "cmt_id": "4931e80da9463b03bfe42be54a9a19f213b0f76d", + "fixed_version": "6.5.7" + } + }, + "CVE-2023-52529": { + "5.15": { + "cmt_id": "bb0707fde7492121917fd9ddb43829e96ec0bb9e", + "fixed_version": "5.15.135" + }, + "6.1": { + "cmt_id": "f237b17611fa3501f43f12d1cb64323e10fdcb4f", + "fixed_version": "6.1.57" + }, + "6.5": { + "cmt_id": "f566efa7de1e35e6523f4acbaf85068a540be07d", + "fixed_version": "6.5.7" + } + }, + "CVE-2023-52530": { + "6.1": { + "cmt_id": "2f4e16e39e4f5e78248dd9e51276a83203950b36", + "fixed_version": "6.1.57" + }, + "6.5": { + "cmt_id": "65c72a7201704574dace708cbc96a8f367b1491d", + "fixed_version": "6.5.7" + } + }, + "CVE-2023-52531": { + "5.15": { + "cmt_id": "7c8faa31080342aec4903c9acb20caf82fcca1ef", + "fixed_version": "5.15.135" + }, + "6.1": { + "cmt_id": "6b3223449c959a8be94a1f042288059e40fcccb0", + "fixed_version": "6.1.57" + }, + "6.5": { + "cmt_id": "f06cdd8d4ba5252986f51f80cc30263636397128", + "fixed_version": "6.5.7" + } + }, + "CVE-2023-52532": { + "6.1": { + "cmt_id": "b67d7b1bfc46d05c1a58b172516454698e8d5004", + "fixed_version": "6.1.59" + }, + "6.5": { + "cmt_id": "a910e0f6304726da30a212feecec65cb97ff7a80", + "fixed_version": "6.5.7" + } + }, + "CVE-2023-52559": { + "5.15": { + "cmt_id": "29298c85a81abdc512e87537515ed4b1a9601d0e", + "fixed_version": "5.15.136" + }, + "6.1": { + "cmt_id": "c12ef025add77ca3a0902e8719d552b6d47b4282", + "fixed_version": "6.1.57" + }, + "6.5": { + "cmt_id": "496c591f0b389eb782f36d9d4c2564b9a865eed0", + "fixed_version": "6.5.7" + } + }, + "CVE-2023-52560": { + "6.1": { + "cmt_id": "9a4fe81a8644b717d57d81ce5849e16583b13fe8", + "fixed_version": "6.1.56" + }, + "6.5": { + "cmt_id": "6b522001693aa113d97a985abc5f6932972e8e86", + "fixed_version": "6.5.6" + } + }, + "CVE-2023-52561": { + "6.1": { + "cmt_id": "dc1ab6577475b0460ba4261cd9caec37bd62ca0b", + "fixed_version": "6.1.56" + }, + "6.5": { + "cmt_id": "82dacd0ca0d9640723824026d6fdf773c02de1d2", + "fixed_version": "6.5.6" + } + }, + "CVE-2023-52562": { + "6.1": { + "cmt_id": "a5569bb187521432f509b69dda7d29f78b2d38b0", + "fixed_version": "6.1.56" + }, + "6.5": { + "cmt_id": "51988be187b041e5355245957b0b9751fa382e0d", + "fixed_version": "6.5.6" + } + }, + "CVE-2023-52563": { + "5.15": { + "cmt_id": "66cb6d74f5a1b6eafe3370b56bf2cb575a91acbc", + "fixed_version": "5.15.134" + }, + "6.1": { + "cmt_id": "ee335e0094add7fc2c7034e0534e1920d61d2078", + "fixed_version": "6.1.56" + }, + "6.5": { + "cmt_id": "43b63e088887a8b82750e16762f77100ffa76cba", + "fixed_version": "6.5.6" + } + }, + "CVE-2023-52564": { + "6.5": { + "cmt_id": "2bff660e0ff349dee84dc4f6f6d10da4497f5b28", + "fixed_version": "6.5.6" + } + }, + "CVE-2023-52565": { + "6.1": { + "cmt_id": "09635bf4cdd4adf2160198a6041bcc7ca46c0558", + "fixed_version": "6.1.56" + }, + "6.5": { + "cmt_id": "8bcf70d787f7d53a3b85ad394f926cfef3eed023", + "fixed_version": "6.5.6" + } + }, + "CVE-2023-52566": { + "4.14": { + "cmt_id": "fb1084e63ee56958b0a56e17a50a4fd86445b9c1", + "fixed_version": "4.14.327" + }, + "4.19": { + "cmt_id": "bb61224f6abc8e71bfdf06d7c984e23460875f5b", + "fixed_version": "4.19.296" + }, + "5.10": { + "cmt_id": "7130a87ca32396eb9bf48b71a2d42259ae44c6c7", + "fixed_version": "5.10.198" + }, + "5.15": { + "cmt_id": "3936e8714907cd55e37c7cc50e50229e4a9042e8", + "fixed_version": "5.15.134" + }, + "5.4": { + "cmt_id": "193b5a1c6c67c36b430989dc063fe7ea4e200a33", + "fixed_version": "5.4.258" + }, + "6.1": { + "cmt_id": "980663f1d189eedafd18d80053d9cf3e2ceb5c8c", + "fixed_version": "6.1.56" + }, + "6.5": { + "cmt_id": "28df4646ad8b433340772edc90ca709cdefc53e2", + "fixed_version": "6.5.6" + } + }, + "CVE-2023-52567": { + "6.5": { + "cmt_id": "3345cc5f02f1fb4c4dcb114706f2210d879ab933", + "fixed_version": "6.5.6" + } + }, + "CVE-2023-52568": { + "6.1": { + "cmt_id": "811ba2ef0cb6402672e64ba1419d6ef95aa3405d", + "fixed_version": "6.1.56" + }, + "6.5": { + "cmt_id": "1348f7f15d7c7798456856bee74a4235c2da994e", + "fixed_version": "6.5.6" + } + }, + "CVE-2023-52569": { + "6.1": { + "cmt_id": "39c4a9522db0072570d602e9b365119e17fb9f4f", + "fixed_version": "6.1.56" + }, + "6.5": { + "cmt_id": "d10fd53393cc5de4b9cf1a4b8f9984f0a037aa51", + "fixed_version": "6.5.6" + } + }, + "CVE-2023-52570": { + "6.1": { + "cmt_id": "c01b2e0ee22ef8b4dd7509a93aecc0ac0826bae4", + "fixed_version": "6.1.56" + }, + "6.5": { + "cmt_id": "52093779b1830ac184a23848d971f06404cf513e", + "fixed_version": "6.5.6" + } + }, + "CVE-2023-52571": { + "6.1": { + "cmt_id": "fe6406238d5a24e9fb0286c71edd67b99d8db58d", + "fixed_version": "6.1.56" + }, + "6.5": { + "cmt_id": "70326b46b6a043f7e7404b2ff678b033c06d6577", + "fixed_version": "6.5.6" + } + }, + "CVE-2023-52572": { + "6.1": { + "cmt_id": "908b3b5e97d25e879de3d1f172a255665491c2c3", + "fixed_version": "6.1.56" + }, + "6.5": { + "cmt_id": "76569e3819e0bb59fc19b1b8688b017e627c268a", + "fixed_version": "6.5.6" + } + }, + "CVE-2023-52573": { + "5.10": { + "cmt_id": "f515112e833791001aaa8ab886af3ca78503617f", + "fixed_version": "5.10.198" + }, + "5.15": { + "cmt_id": "ea82139e6e3561100d38d14401d57c0ea93fc07e", + "fixed_version": "5.15.134" + }, + "5.4": { + "cmt_id": "812da2a08dc5cc75fb71e29083ea20904510ac7a", + "fixed_version": "5.4.258" + }, + "6.1": { + "cmt_id": "51fa66024a5eabf270164f2dc82a48ffb35a12e9", + "fixed_version": "6.1.56" + }, + "6.5": { + "cmt_id": "069ac51c37a6f07a51f7134d8c34289075786a35", + "fixed_version": "6.5.6" + } + }, + "CVE-2023-52574": { + "4.14": { + "cmt_id": "1779eb51b9cc628cee551f252701a85a2a50a457", + "fixed_version": "4.14.327" + }, + "4.19": { + "cmt_id": "a7fb47b9711101d2405b0eb1276fb1f9b9b270c7", + "fixed_version": "4.19.296" + }, + "5.10": { + "cmt_id": "b44dd92e2afd89eb6e9d27616858e72a67bdc1a7", + "fixed_version": "5.10.198" + }, + "5.15": { + "cmt_id": "cd05eec2ee0cc396813a32ef675634e403748255", + "fixed_version": "5.15.134" + }, + "5.4": { + "cmt_id": "c5f6478686bb45f453031594ae19b6c9723a780d", + "fixed_version": "5.4.258" + }, + "6.1": { + "cmt_id": "2f0acb0736ecc3eb85dc80ad2790d634dcb10b58", + "fixed_version": "6.1.56" + }, + "6.5": { + "cmt_id": "cac50d9f5d876be32cb9aa21c74018468900284d", + "fixed_version": "6.5.6" + } + }, + "CVE-2023-52575": { + "6.5": { + "cmt_id": "e3cb8b2c391b1f287eb76df4ba37880f4ea56d8a", + "fixed_version": "6.5.6" + } + }, + "CVE-2023-52576": { + "6.1": { + "cmt_id": "eef16bfdb212da60f5144689f2967fb25b051a2b", + "fixed_version": "6.1.56" + }, + "6.5": { + "cmt_id": "d2dfbc0e3b7a04c2d941421a958dc31c897fb204", + "fixed_version": "6.5.6" + } + }, + "CVE-2023-52578": { + "4.19": { + "cmt_id": "d2346e6beb699909ca455d9d20c4e577ce900839", + "fixed_version": "4.19.296" + }, + "5.10": { + "cmt_id": "04cc361f029c14dd067ad180525c7392334c9bfd", + "fixed_version": "5.10.198" + }, + "5.15": { + "cmt_id": "8bc97117b51d68d5cea8f5351cca2d8c4153f394", + "fixed_version": "5.15.134" + }, + "5.4": { + "cmt_id": "ad8d39c7b437fcdab7208a6a56c093d222c008d5", + "fixed_version": "5.4.258" + }, + "6.1": { + "cmt_id": "89f9f20b1cbd36d99d5a248a4bf8d11d4fd049a2", + "fixed_version": "6.1.56" + }, + "6.5": { + "cmt_id": "f2ef4cb4d418fa64fe73eb84d10cc5c0e52e00fa", + "fixed_version": "6.5.6" + } + }, + "CVE-2023-52580": { + "5.15": { + "cmt_id": "f90a7b9586d72f907092078a9f394733ca502cc9", + "fixed_version": "5.15.134" + }, + "6.1": { + "cmt_id": "488ea2a3e2666022f79abfdd7d12e8305fc27a40", + "fixed_version": "6.1.56" + }, + "6.5": { + "cmt_id": "48e105a2a1a10adc21c0ae717969f5e8e990ba48", + "fixed_version": "6.5.6" + } + }, + "CVE-2023-52581": { + "6.5": { + "cmt_id": "4aea243b6853d06c1d160a9955b759189aa02b14", + "fixed_version": "6.5.6" + } + }, + "CVE-2023-52582": { + "6.1": { + "cmt_id": "df9950d37df113db59495fa09d060754366a2b7c", + "fixed_version": "6.1.56" + }, + "6.5": { + "cmt_id": "d9f5537479d4ec97ea92ff24e81a517d5772581a", + "fixed_version": "6.5.6" + } + }, + "CVE-2023-52583": { + "4.19": { + "cmt_id": "eb55ba8aa7fb7aad54f40fbf4d8dcdfdba0bebf6", + "fixed_version": "4.19.307" + }, + "5.10": { + "cmt_id": "e016e358461b89b231626fcf78c5c38e35c44fd3", + "fixed_version": "5.10.210" + }, + "5.15": { + "cmt_id": "a9c15d6e8aee074fae66c04d114f20b84274fcca", + "fixed_version": "5.15.149" + }, + "5.4": { + "cmt_id": "6ab4fd508fad942f1f1ba940492f2735e078e980", + "fixed_version": "5.4.269" + }, + "6.1": { + "cmt_id": "7f2649c94264d00df6b6ac27161e9f4372a3450e", + "fixed_version": "6.1.77" + }, + "6.6": { + "cmt_id": "196b87e5c00ce021e164a5de0f0d04f4116a9160", + "fixed_version": "6.6.16" + }, + "6.7": { + "cmt_id": "76cb2aa3421fee4fde706dec41b1344bc0a9ad67", + "fixed_version": "6.7.4" + } + }, + "CVE-2023-52584": { + "6.1": { + "cmt_id": "521f28eedd6b14228c46e3b81e3bf9b90c2818d8", + "fixed_version": "6.1.77" + }, + "6.6": { + "cmt_id": "f8dcafcb54632536684336161da8bdd52120f95e", + "fixed_version": "6.6.16" + }, + "6.7": { + "cmt_id": "9a3881b1f07db1bb55cb0108e6f05cfd027eaf2e", + "fixed_version": "6.7.4" + } + }, + "CVE-2023-52585": { + "6.7": { + "cmt_id": "195a6289282e039024ad30ba66e6f94a4d0fbe49", + "fixed_version": "6.7.4" + } + }, + "CVE-2023-52586": { + "6.7": { + "cmt_id": "14f109bf74dd67e1d0469fed859c8e506b0df53f", + "fixed_version": "6.7.4" + } + }, + "CVE-2023-52587": { + "4.19": { + "cmt_id": "4c8922ae8eb8dcc1e4b7d1059d97a8334288d825", + "fixed_version": "4.19.307" + }, + "5.10": { + "cmt_id": "ac2630fd3c90ffec34a0bfc4d413668538b0e8f2", + "fixed_version": "5.10.210" + }, + "5.15": { + "cmt_id": "ed790bd0903ed3352ebf7f650d910f49b7319b34", + "fixed_version": "5.15.149" + }, + "5.4": { + "cmt_id": "615e3adc2042b7be4ad122a043fc9135e6342c90", + "fixed_version": "5.4.269" + }, + "6.1": { + "cmt_id": "5108a2dc2db5630fb6cd58b8be80a0c134bc310a", + "fixed_version": "6.1.77" + }, + "6.6": { + "cmt_id": "342258fb46d66c1b4c7e2c3717ac01e10c03cf18", + "fixed_version": "6.6.16" + }, + "6.7": { + "cmt_id": "7c7bd4d561e9dc6f5b7df9e184974915f6701a89", + "fixed_version": "6.7.4" + } + }, + "CVE-2023-52588": { + "5.15": { + "cmt_id": "7ea0f29d9fd84905051be020c0df7d557e286136", + "fixed_version": "5.15.149" + }, + "6.1": { + "cmt_id": "7c972c89457511007dfc933814c06786905e515c", + "fixed_version": "6.1.77" + }, + "6.6": { + "cmt_id": "417b8a91f4e8831cadaf85c3f15c6991c1f54dde", + "fixed_version": "6.6.16" + }, + "6.7": { + "cmt_id": "b8094c0f1aae329b1c60a275a780d6c2c9ff7aa3", + "fixed_version": "6.7.4" + } + }, + "CVE-2023-52589": { + "6.1": { + "cmt_id": "bf808f58681cab64c81cd814551814fd34e540fe", + "fixed_version": "6.1.77" + }, + "6.6": { + "cmt_id": "fab483438342984f2a315fe13c882a80f0f7e545", + "fixed_version": "6.6.16" + }, + "6.7": { + "cmt_id": "7bb1a2822aa2c2de4e09bf7c56dd93bd532f1fa7", + "fixed_version": "6.7.4" + } + }, + "CVE-2023-52590": { + "6.7": { + "cmt_id": "de940cede3c41624e2de27f805b490999f419df9", + "fixed_version": "6.7.4" + } + }, + "CVE-2023-52591": { + "6.6": { + "cmt_id": "17e1361cb91dc1325834da95d2ab532959d2debc", + "fixed_version": "6.6.16" + }, + "6.7": { + "cmt_id": "c04c162f82ac403917780eb6d1654694455d4e7c", + "fixed_version": "6.7.4" + } + }, + "CVE-2023-52593": { + "6.1": { + "cmt_id": "574dcd3126aa2eed75437137843f254b1190dd03", + "fixed_version": "6.1.77" + }, + "6.6": { + "cmt_id": "9ab224744a47363f74ea29c6894c405e3bcf5132", + "fixed_version": "6.6.16" + }, + "6.7": { + "cmt_id": "3739121443f5114c6bcf6d841a5124deb006b878", + "fixed_version": "6.7.4" + } + }, + "CVE-2023-52594": { + "4.19": { + "cmt_id": "f44f073c78112ff921a220d01b86d09f2ace59bc", + "fixed_version": "4.19.307" + }, + "5.10": { + "cmt_id": "84770a996ad8d7f121ff2fb5a8d149aad52d64c1", + "fixed_version": "5.10.210" + }, + "5.15": { + "cmt_id": "9003fa9a0198ce004b30738766c67eb7373479c9", + "fixed_version": "5.15.149" + }, + "5.4": { + "cmt_id": "f11f0fd1ad6c11ae7856d4325fe9d05059767225", + "fixed_version": "5.4.269" + }, + "6.1": { + "cmt_id": "25c6f49ef59b7a9b80a3f7ab9e95268a1b01a234", + "fixed_version": "6.1.77" + }, + "6.6": { + "cmt_id": "e4f4bac7d3b64eb75f70cd3345712de6f68a215d", + "fixed_version": "6.6.16" + }, + "6.7": { + "cmt_id": "be609c7002dd4504b15b069cb7582f4c778548d1", + "fixed_version": "6.7.4" + } + }, + "CVE-2023-52595": { + "5.10": { + "cmt_id": "69e905beca193125820c201ab3db4fb0e245124e", + "fixed_version": "5.10.210" + }, + "5.15": { + "cmt_id": "4cc198580a7b93a36f5beb923f40f7ae27a3716c", + "fixed_version": "5.15.149" + }, + "5.4": { + "cmt_id": "e1f113b57ddd18274d7c83618deca25cc880bc48", + "fixed_version": "5.4.269" + }, + "6.1": { + "cmt_id": "739b3ccd9486dff04af95f9a890846d088a84957", + "fixed_version": "6.1.77" + }, + "6.6": { + "cmt_id": "04cfe4a5da57ab9358cdfadea22bcb37324aaf83", + "fixed_version": "6.6.16" + }, + "6.7": { + "cmt_id": "fdb580ed05df8973aa5149cafa598c64bebcd0cb", + "fixed_version": "6.7.4" + } + }, + "CVE-2023-52596": { + "6.6": { + "cmt_id": "15893975e9e382f8294ea8d926f08dc2d8d39ede", + "fixed_version": "6.6.16" + }, + "6.7": { + "cmt_id": "2ae7081bc10123b187e36a4f3a8e53768de31489", + "fixed_version": "6.7.4" + } + }, + "CVE-2023-52597": { + "4.19": { + "cmt_id": "3a04410b0bc7e056e0843ac598825dd359246d18", + "fixed_version": "4.19.307" + }, + "5.10": { + "cmt_id": "150a3a3871490e8c454ffbac2e60abeafcecff99", + "fixed_version": "5.10.210" + }, + "5.15": { + "cmt_id": "732a3bea7aba5b15026ea42d14953c3425cc7dc2", + "fixed_version": "5.15.149" + }, + "5.4": { + "cmt_id": "5e63c9ae8055109d805aacdaf2a4fe2c3b371ba1", + "fixed_version": "5.4.269" + }, + "6.1": { + "cmt_id": "0671f42a9c1084db10d68ac347d08dbf6689ecb3", + "fixed_version": "6.1.77" + }, + "6.6": { + "cmt_id": "c87d7d910775a025e230fd6359b60627e392460f", + "fixed_version": "6.6.16" + }, + "6.7": { + "cmt_id": "2823db0010c400e4b2b12d02aa5d0d3ecb15d7c7", + "fixed_version": "6.7.4" + } + }, + "CVE-2023-52598": { + "4.19": { + "cmt_id": "6ccf904aac0292e1f6b1a1be6c407c414f7cf713", + "fixed_version": "4.19.307" + }, + "5.10": { + "cmt_id": "856caf2730ea18cb39e95833719c02a02447dc0a", + "fixed_version": "5.10.210" + }, + "5.15": { + "cmt_id": "28a1f492cb527f64593457a0a0f0d809b3f36c25", + "fixed_version": "5.15.149" + }, + "5.4": { + "cmt_id": "6d0822f2cc9b153bf2df49a84599195a2e0d21a8", + "fixed_version": "5.4.269" + }, + "6.1": { + "cmt_id": "7a4d6481fbdd661f9e40e95febb95e3dee82bad3", + "fixed_version": "6.1.77" + }, + "6.6": { + "cmt_id": "02c6bbfb08bad78dd014e24c7b893723c15ec7a1", + "fixed_version": "6.6.16" + }, + "6.7": { + "cmt_id": "bdce67df7f12fb0409fbc604ce7c4254703f56d4", + "fixed_version": "6.7.4" + } + }, + "CVE-2023-52599": { + "4.19": { + "cmt_id": "f423528488e4f9606cef858eceea210bf1163f41", + "fixed_version": "4.19.307" + }, + "5.10": { + "cmt_id": "e2b77d107b33bb31c8b1f5c4cb8f277b23728f1e", + "fixed_version": "5.10.210" + }, + "5.15": { + "cmt_id": "6aa30020879042d46df9f747e4f0a486eea6fe98", + "fixed_version": "5.15.149" + }, + "5.4": { + "cmt_id": "de6a91aed1e0b1a23e9c11e7d7557f088eeeb017", + "fixed_version": "5.4.269" + }, + "6.1": { + "cmt_id": "3537f92cd22c672db97fae6997481e678ad14641", + "fixed_version": "6.1.77" + }, + "6.6": { + "cmt_id": "6996d43b14486f4a6655b10edc541ada1b580b4b", + "fixed_version": "6.6.16" + }, + "6.7": { + "cmt_id": "5a6660139195f5e2fbbda459eeecb8788f3885fe", + "fixed_version": "6.7.4" + } + }, + "CVE-2023-52600": { + "4.19": { + "cmt_id": "81b4249ef37297fb17ba102a524039a05c6c5d35", + "fixed_version": "4.19.307" + }, + "5.10": { + "cmt_id": "bc6ef64dbe71136f327d63b2b9071b828af2c2a8", + "fixed_version": "5.10.210" + }, + "5.15": { + "cmt_id": "8e44dc3f96e903815dab1d74fff8faafdc6feb61", + "fixed_version": "5.15.149" + }, + "5.4": { + "cmt_id": "93df0a2a0b3cde2d7ab3a52ed46ea1d6d4aaba5f", + "fixed_version": "5.4.269" + }, + "6.1": { + "cmt_id": "32e8f2d95528d45828c613417cb2827d866cbdce", + "fixed_version": "6.1.77" + }, + "6.6": { + "cmt_id": "1696d6d7d4a1b373e96428d0fe1166bd7c3c795e", + "fixed_version": "6.6.16" + }, + "6.7": { + "cmt_id": "bacdaa04251382d7efd4f09f9a0686bfcc297e2e", + "fixed_version": "6.7.4" + } + }, + "CVE-2023-52601": { + "4.19": { + "cmt_id": "3d3898b4d72c677d47fe3cb554449f2df5c12555", + "fixed_version": "4.19.307" + }, + "5.10": { + "cmt_id": "2037cb9d95f1741885f7daf50e8a028c4ade5317", + "fixed_version": "5.10.210" + }, + "5.15": { + "cmt_id": "8393c80cce45f40c1256d72e21ad351b3650c57e", + "fixed_version": "5.15.149" + }, + "5.4": { + "cmt_id": "3f8217c323fd6ecd6829a0c3ae7ac3f14eac368e", + "fixed_version": "5.4.269" + }, + "6.1": { + "cmt_id": "70780914cb57e2ba711e0ac1b677aaaa75103603", + "fixed_version": "6.1.77" + }, + "6.6": { + "cmt_id": "2e16a1389b5a7983b45cb2aa20b0e3f0ee364d6c", + "fixed_version": "6.6.16" + }, + "6.7": { + "cmt_id": "fc67a2e18f4c4e3f07e9f9ae463da24530470e73", + "fixed_version": "6.7.4" + } + }, + "CVE-2023-52602": { + "4.19": { + "cmt_id": "ce8bc22e948634a5c0a3fa58a179177d0e3f3950", + "fixed_version": "4.19.307" + }, + "5.10": { + "cmt_id": "1c40ca3d39d769931b28295b3145c25f1decf5a6", + "fixed_version": "5.10.210" + }, + "5.15": { + "cmt_id": "6c6a96c3d74df185ee344977d46944d6f33bb4dd", + "fixed_version": "5.15.149" + }, + "5.4": { + "cmt_id": "1b9d6828589d57f94a23fb1c46112cda39d7efdb", + "fixed_version": "5.4.269" + }, + "6.1": { + "cmt_id": "cab0c265ba182fd266c2aa3c69d7e40640a7f612", + "fixed_version": "6.1.77" + }, + "6.6": { + "cmt_id": "7110650b85dd2f1cee819acd1345a9013a1a62f7", + "fixed_version": "6.6.16" + }, + "6.7": { + "cmt_id": "bff9d4078a232c01e42e9377d005fb2f4d31a472", + "fixed_version": "6.7.4" + } + }, + "CVE-2023-52603": { + "4.19": { + "cmt_id": "e30b52a2ea3d1e0aaee68096957cf90a2f4ec5af", + "fixed_version": "4.19.307" + }, + "5.10": { + "cmt_id": "7aa33854477d9c346f5560a1a1fcb3fe7783e2a8", + "fixed_version": "5.10.210" + }, + "5.15": { + "cmt_id": "e4ce01c25ccbea02a09a5291c21749b1fc358e39", + "fixed_version": "5.15.149" + }, + "5.4": { + "cmt_id": "fd3486a893778770557649fe28afa5e463d4ed07", + "fixed_version": "5.4.269" + }, + "6.1": { + "cmt_id": "e4cbc857d75d4e22a1f75446e7480b1f305d8d60", + "fixed_version": "6.1.77" + }, + "6.6": { + "cmt_id": "edff092a59260bf0b0a2eba219cb3da6372c2f9f", + "fixed_version": "6.6.16" + }, + "6.7": { + "cmt_id": "6e2902ecc77e9760a9fc447f56d598383e2372d2", + "fixed_version": "6.7.4" + } + }, + "CVE-2023-52604": { + "4.19": { + "cmt_id": "e3e95c6850661c77e6dab079d9b5374a618ebb15", + "fixed_version": "4.19.307" + }, + "5.10": { + "cmt_id": "de34de6e57bbbc868e4fcf9e98c76b3587cabb0b", + "fixed_version": "5.10.210" + }, + "5.15": { + "cmt_id": "6fe8b702125aeee6ce83f20092a2341446704e7b", + "fixed_version": "5.15.149" + }, + "5.4": { + "cmt_id": "98f9537fe61b8382b3cc5dd97347531698517c56", + "fixed_version": "5.4.269" + }, + "6.1": { + "cmt_id": "42f433785f108893de0dd5260bafb85d7d51db03", + "fixed_version": "6.1.77" + }, + "6.6": { + "cmt_id": "6a44065dd604972ec1fbcccbdc4a70d266a89cdd", + "fixed_version": "6.6.16" + }, + "6.7": { + "cmt_id": "59342822276f753e49d27ef5eebffbba990572b9", + "fixed_version": "6.7.4" + } + }, + "CVE-2023-52606": { + "4.19": { + "cmt_id": "42084a428a139f1a429f597d44621e3a18f3e414", + "fixed_version": "4.19.307" + }, + "5.10": { + "cmt_id": "beee482cc4c9a6b1dcffb2e190b4fd8782258678", + "fixed_version": "5.10.210" + }, + "5.15": { + "cmt_id": "de4f5ed63b8a199704d8cdcbf810309d7eb4b36b", + "fixed_version": "5.15.149" + }, + "5.4": { + "cmt_id": "0580f4403ad33f379eef865c2a6fe94de37febdf", + "fixed_version": "5.4.269" + }, + "6.1": { + "cmt_id": "abd26515d4b767ba48241eea77b28ce0872aef3e", + "fixed_version": "6.1.77" + }, + "6.6": { + "cmt_id": "28b8ba8eebf26f66d9f2df4ba550b6b3b136082c", + "fixed_version": "6.6.16" + }, + "6.7": { + "cmt_id": "848e1d7fd710900397e1d0e7584680c1c04e3afd", + "fixed_version": "6.7.4" + } + }, + "CVE-2023-52607": { + "4.19": { + "cmt_id": "21e45a7b08d7cd98d6a53c5fc5111879f2d96611", + "fixed_version": "4.19.307" + }, + "5.10": { + "cmt_id": "aa28eecb43cac6e20ef14dfc50b8892c1fbcda5b", + "fixed_version": "5.10.210" + }, + "5.15": { + "cmt_id": "ac3ed969a40357b0542d20f096a6d43acdfa6cc7", + "fixed_version": "5.15.149" + }, + "5.4": { + "cmt_id": "f6781add1c311c17eff43e14c786004bbacf901e", + "fixed_version": "5.4.269" + }, + "6.1": { + "cmt_id": "d482d61025e303a2bef3733a011b6b740215cfa1", + "fixed_version": "6.1.77" + }, + "6.6": { + "cmt_id": "145febd85c3bcc5c74d87ef9a598fc7d9122d532", + "fixed_version": "6.6.16" + }, + "6.7": { + "cmt_id": "ffd29dc45bc0355393859049f6becddc3ed08f74", + "fixed_version": "6.7.4" + } + }, + "CVE-2023-52608": { + "5.15": { + "cmt_id": "614cc65032dcb0b64d23f5c5e338a8a04b12be5d", + "fixed_version": "5.15.149" + }, + "6.1": { + "cmt_id": "7f95f6997f4fdd17abec3200cae45420a5489350", + "fixed_version": "6.1.76" + }, + "6.6": { + "cmt_id": "9b5e1b93c83ee5fc9f5d7bd2d45b421bd87774a2", + "fixed_version": "6.6.15" + }, + "6.7": { + "cmt_id": "12dc4217f16551d6dee9cbefc23fdb5659558cda", + "fixed_version": "6.7.3" + } + }, + "CVE-2023-52609": { + "4.19": { + "cmt_id": "95b1d336b0642198b56836b89908d07b9a0c9608", + "fixed_version": "4.19.306" + }, + "5.10": { + "cmt_id": "7e7a0d86542b0ea903006d3f42f33c4f7ead6918", + "fixed_version": "5.10.209" + }, + "5.15": { + "cmt_id": "98fee5bee97ad47b527a997d5786410430d1f0e9", + "fixed_version": "5.15.148" + }, + "5.4": { + "cmt_id": "252a2a5569eb9f8d16428872cc24dea1ac0bb097", + "fixed_version": "5.4.268" + }, + "6.1": { + "cmt_id": "6696f76c32ff67fec26823fc2df46498e70d9bf3", + "fixed_version": "6.1.75" + }, + "6.6": { + "cmt_id": "67f16bf2cc1698fd50e01ee8a2becc5a8e6d3a3e", + "fixed_version": "6.6.14" + }, + "6.7": { + "cmt_id": "77d210e8db4d61d43b2d16df66b1ec46fad2ee01", + "fixed_version": "6.7.2" + } + }, + "CVE-2023-52610": { + "5.15": { + "cmt_id": "172ba7d46c202e679f3ccb10264c67416aaeb1c4", + "fixed_version": "5.15.148" + }, + "6.1": { + "cmt_id": "0b5b831122fc3789fff75be433ba3e4dd7b779d4", + "fixed_version": "6.1.75" + }, + "6.6": { + "cmt_id": "73f7da5fd124f2cda9161e2e46114915e6e82e97", + "fixed_version": "6.6.14" + }, + "6.7": { + "cmt_id": "f5346df0591d10bc948761ca854b1fae6d2ef441", + "fixed_version": "6.7.2" + } + }, + "CVE-2023-52611": { + "6.6": { + "cmt_id": "5b5ddf21b978ec315cab9d9e7e6ac7374791a8c7", + "fixed_version": "6.6.14" + }, + "6.7": { + "cmt_id": "0e9ffff72a0674cd6656314dbd99cdd2123a3030", + "fixed_version": "6.7.2" + } + }, + "CVE-2023-52612": { + "4.19": { + "cmt_id": "1142d65c5b881590962ad763f94505b6dd67d2fe", + "fixed_version": "4.19.306" + }, + "5.10": { + "cmt_id": "4518dc468cdd796757190515a9be7408adc8911e", + "fixed_version": "5.10.209" + }, + "5.15": { + "cmt_id": "a5f2f91b3fd7387e5102060809316a0f8f0bc625", + "fixed_version": "5.15.148" + }, + "5.4": { + "cmt_id": "e0e3f4a18784182cfe34e20c00eca11e78d53e76", + "fixed_version": "5.4.268" + }, + "6.1": { + "cmt_id": "4df0c942d04a67df174195ad8082f6e30e7f71a5", + "fixed_version": "6.1.75" + }, + "6.6": { + "cmt_id": "7d9e5bed036a7f9e2062a137e97e3c1e77fb8759", + "fixed_version": "6.6.14" + }, + "6.7": { + "cmt_id": "71c6670f9f032ec67d8f4e3f8db4646bf5a62883", + "fixed_version": "6.7.2" + } + }, + "CVE-2023-52613": { + "6.6": { + "cmt_id": "70481755ed77400e783200e2d022e5fea16060ce", + "fixed_version": "6.6.14" + }, + "6.7": { + "cmt_id": "6010a9fc14eb1feab5cafd84422001134fe8ec58", + "fixed_version": "6.7.2" + } + }, + "CVE-2023-52614": { + "5.15": { + "cmt_id": "796d3fad8c35ee9df9027899fb90ceaeb41b958f", + "fixed_version": "5.15.149" + }, + "6.1": { + "cmt_id": "8a7729cda2dd276d7a3994638038fb89035b6f2c", + "fixed_version": "6.1.76" + }, + "6.6": { + "cmt_id": "a979f56aa4b93579cf0e4265ae04d7e9300fd3e8", + "fixed_version": "6.6.15" + }, + "6.7": { + "cmt_id": "eaef4650fa2050147ca25fd7ee43bc0082e03c87", + "fixed_version": "6.7.3" + } + }, + "CVE-2023-52615": { + "4.19": { + "cmt_id": "eafd83b92f6c044007a3591cbd476bcf90455990", + "fixed_version": "4.19.307" + }, + "5.10": { + "cmt_id": "c6a8111aacbfe7a8a70f46cc0de8eed00561693c", + "fixed_version": "5.10.210" + }, + "5.15": { + "cmt_id": "26cc6d7006f922df6cc4389248032d955750b2a0", + "fixed_version": "5.15.149" + }, + "5.4": { + "cmt_id": "5030d4c798863ccb266563201b341a099e8cdd48", + "fixed_version": "5.4.269" + }, + "6.1": { + "cmt_id": "aa8aa16ed9adf1df05bb339d588cf485a011839e", + "fixed_version": "6.1.76" + }, + "6.6": { + "cmt_id": "ecabe8cd456d3bf81e92c53b074732f3140f170d", + "fixed_version": "6.6.15" + }, + "6.7": { + "cmt_id": "6822a14271786150e178869f1495cc03e74c5029", + "fixed_version": "6.7.3" + } + }, + "CVE-2023-52616": { + "5.10": { + "cmt_id": "0c3687822259a7628c85cd21a3445cbe3c367165", + "fixed_version": "5.10.210" + }, + "5.15": { + "cmt_id": "2bb86817b33c9d704e127f92b838035a72c315b6", + "fixed_version": "5.15.149" + }, + "6.1": { + "cmt_id": "bb44477d4506e52785693a39f03cdc6a2c5e8598", + "fixed_version": "6.1.79" + }, + "6.6": { + "cmt_id": "7ebf812b7019fd2d4d5a7ca45ef4bf3a6f4bda0a", + "fixed_version": "6.6.15" + }, + "6.7": { + "cmt_id": "7abdfd45a650c714d5ebab564bb1b988f14d9b49", + "fixed_version": "6.7.3" + } + }, + "CVE-2023-52617": { + "5.10": { + "cmt_id": "4a5d0528cf19dbf060313dffbe047bc11c90c24c", + "fixed_version": "5.10.210" + }, + "5.15": { + "cmt_id": "ff1c7e2fb9e9c3f53715fbe04d3ac47b80be7eb8", + "fixed_version": "5.15.149" + }, + "5.4": { + "cmt_id": "d8c293549946ee5078ed0ab77793cec365559355", + "fixed_version": "5.4.269" + }, + "6.1": { + "cmt_id": "1d83c85922647758c1f1e4806a4c5c3cf591a20a", + "fixed_version": "6.1.77" + }, + "6.6": { + "cmt_id": "0233b836312e39a3c763fb53512b3fa455b473b3", + "fixed_version": "6.6.16" + }, + "6.7": { + "cmt_id": "e129c7fa7070fbce57feb0bfc5eaa65eef44b693", + "fixed_version": "6.7.4" + } + }, + "CVE-2023-52618": { + "5.10": { + "cmt_id": "95bc866c11974d3e4a9d922275ea8127ff809cf7", + "fixed_version": "5.10.210" + }, + "5.15": { + "cmt_id": "f6abd5e17da33eba15df2bddc93413e76c2b55f7", + "fixed_version": "5.15.149" + }, + "6.1": { + "cmt_id": "af7bbdac89739e2e7380387fda598848d3b7010f", + "fixed_version": "6.1.77" + }, + "6.6": { + "cmt_id": "5b9ea86e662035a886ccb5c76d56793cba618827", + "fixed_version": "6.6.16" + }, + "6.7": { + "cmt_id": "a2c6206f18104fba7f887bf4dbbfe4c41adc4339", + "fixed_version": "6.7.4" + } + }, + "CVE-2023-52619": { + "4.19": { + "cmt_id": "8b69c30f4e8b69131d92096cb296dc1f217101e4", + "fixed_version": "4.19.307" + }, + "5.10": { + "cmt_id": "a63e48cd835c34c38ef671d344cc029b1ea5bf10", + "fixed_version": "5.10.210" + }, + "5.15": { + "cmt_id": "2a37905d47bffec61e95d99f0c1cc5dc6377956c", + "fixed_version": "5.15.149" + }, + "5.4": { + "cmt_id": "e9f6ac50890104fdf8194f2865680689239d30fb", + "fixed_version": "5.4.269" + }, + "6.1": { + "cmt_id": "75b0f71b26b3ad833c5c0670109c0af6e021e86a", + "fixed_version": "6.1.77" + }, + "6.6": { + "cmt_id": "0593cfd321df9001142a9d2c58d4144917dff7ee", + "fixed_version": "6.6.16" + }, + "6.7": { + "cmt_id": "cd40e43f870cf21726b22487a95ed223790b3542", + "fixed_version": "6.7.4" + } + }, + "CVE-2023-52620": { + "5.15": { + "cmt_id": "00b19ee0dcc1aef06294471ab489bae26d94524e", + "fixed_version": "5.15.151" + }, + "6.1": { + "cmt_id": "b7be6c737a179a76901c872f6b4c1d00552d9a1b", + "fixed_version": "6.1.81" + }, + "6.4": { + "cmt_id": "e26d3009efda338f19016df4175f354a9bd0a4ab", + "fixed_version": "6.4" + } + }, + "CVE-2023-52621": { + "6.1": { + "cmt_id": "d6d6fe4bb105595118f12abeed4a7bdd450853f3", + "fixed_version": "6.1.77" + }, + "6.6": { + "cmt_id": "483cb92334cd7f1d5387dccc0ab5d595d27a669d", + "fixed_version": "6.6.16" + }, + "6.7": { + "cmt_id": "c7f1b6146f4a46d727c0d046284c28b6882c6304", + "fixed_version": "6.7.4" + } + }, + "CVE-2023-52622": { + "4.19": { + "cmt_id": "cd1f93ca97a9136989f3bd2bf90696732a2ed644", + "fixed_version": "4.19.307" + }, + "5.10": { + "cmt_id": "cfbbb3199e71b63fc26cee0ebff327c47128a1e8", + "fixed_version": "5.10.210" + }, + "5.15": { + "cmt_id": "d76c8d7ffe163c6bf2f1ef680b0539c2b3902b90", + "fixed_version": "5.15.149" + }, + "5.4": { + "cmt_id": "b183fe8702e78bba3dcef8e7193cab6898abee07", + "fixed_version": "5.4.269" + }, + "6.1": { + "cmt_id": "6d2cbf517dcabc093159cf138ad5712c9c7fa954", + "fixed_version": "6.1.77" + }, + "6.6": { + "cmt_id": "8b1413dbfe49646eda2c00c0f1144ee9d3368e0c", + "fixed_version": "6.6.16" + }, + "6.7": { + "cmt_id": "dc3e0f55bec4410f3d74352c4a7c79f518088ee2", + "fixed_version": "6.7.4" + } + }, + "CVE-2023-52623": { + "4.19": { + "cmt_id": "fece80a2a6718ed58487ce397285bb1b83a3e54e", + "fixed_version": "4.19.307" + }, + "5.10": { + "cmt_id": "c430e6bb43955c6bf573665fcebf31694925b9f7", + "fixed_version": "5.10.210" + }, + "5.15": { + "cmt_id": "f8cf4dabbdcb8bef85335b0ed7ad5b25fd82ff56", + "fixed_version": "5.15.149" + }, + "5.4": { + "cmt_id": "7a96d85bf196c170dcf1b47a82e9bb97cca69aa6", + "fixed_version": "5.4.269" + }, + "6.1": { + "cmt_id": "e8ca3e73301e23e8c0ac0ce2e6bac4545cd776e0", + "fixed_version": "6.1.77" + }, + "6.6": { + "cmt_id": "69c7eeb4f622c2a28da965f970f982db171f3dc6", + "fixed_version": "6.6.16" + }, + "6.7": { + "cmt_id": "8f860c8407470baff2beb9982ad6b172c94f1d0a", + "fixed_version": "6.7.4" + } + }, + "CVE-2023-52624": { + "6.7": { + "cmt_id": "2ef98c6d753a744e333b7e34b9cf687040fba57d", + "fixed_version": "6.7.3" + } + }, + "CVE-2023-52625": { + "6.7": { + "cmt_id": "820c3870c491946a78950cdf961bf40e28c1025f", + "fixed_version": "6.7.3" + } + }, + "CVE-2023-52626": { + "6.7": { + "cmt_id": "33cdeae8c6fb58cc445f859b67c014dc9f60b4e0", + "fixed_version": "6.7.3" + } + }, + "CVE-2023-52627": { + "5.10": { + "cmt_id": "1eba6f7ffa295a0eec098c107043074be7cc4ec5", + "fixed_version": "5.10.210" + }, + "5.15": { + "cmt_id": "49f322ce1f265935f15e5512da69a399f27a5091", + "fixed_version": "5.15.149" + }, + "6.1": { + "cmt_id": "137568aa540a9f587c48ff7d4c51cdba08cfe9a4", + "fixed_version": "6.1.76" + }, + "6.6": { + "cmt_id": "89c4e63324e208a23098f7fb15c00487cecbfed2", + "fixed_version": "6.6.15" + }, + "6.7": { + "cmt_id": "55aca2ce91a63740278502066beaddbd841af9c6", + "fixed_version": "6.7.3" + } + }, + "CVE-2023-52628": { + "5.10": { + "cmt_id": "a7d86a77c33ba1c357a7504341172cc1507f0698", + "fixed_version": "5.10.198" + }, + "5.15": { + "cmt_id": "1ad7b189cc1411048434e8595ffcbe7873b71082", + "fixed_version": "5.15.132" + }, + "6.1": { + "cmt_id": "d9ebfc0f21377690837ebbd119e679243e0099cc", + "fixed_version": "6.1.54" + }, + "6.5": { + "cmt_id": "c8f292322ff16b9a2272a67de396c09a50e09dce", + "fixed_version": "6.5.4" + } + }, + "CVE-2023-52629": { + "6.5": { + "cmt_id": "610dbd8ac271aa36080aac50b928d700ee3fe4de", + "fixed_version": "6.5.4" + } + }, + "CVE-2023-52630": { + "5.10": { + "cmt_id": "9f56f38331171c9a19754004f0664686d67ee48d", + "fixed_version": "5.10.210" + }, + "5.15": { + "cmt_id": "1e4d3f8bd880e02932a9ea179f90bfa74fd2e899", + "fixed_version": "5.15.149" + }, + "6.1": { + "cmt_id": "e5dc63f01e027721c29f82069f7e97e2149fa131", + "fixed_version": "6.1.78" + }, + "6.6": { + "cmt_id": "27b216130e64651e76ed583742a1b4e4d08a67c3", + "fixed_version": "6.6.17" + }, + "6.7": { + "cmt_id": "cd33b330cb21675189e747953845f5c3689e4912", + "fixed_version": "6.7.5" + } + }, + "CVE-2023-52631": { + "5.15": { + "cmt_id": "ae4acad41b0f93f1c26cc0fc9135bb79d8282d0b", + "fixed_version": "5.15.149" + }, + "6.1": { + "cmt_id": "ec1bedd797588fe38fc11cba26d77bb1d9b194c6", + "fixed_version": "6.1.78" + }, + "6.6": { + "cmt_id": "fb7bcd1722bc9bc55160378f5f99c01198fd14a7", + "fixed_version": "6.6.17" + }, + "6.7": { + "cmt_id": "686820fe141ea0220fc6fdfc7e5694f915cf64b2", + "fixed_version": "6.7.5" + } + }, + "CVE-2023-52632": { + "6.1": { + "cmt_id": "b602f098f716723fa5c6c96a486e0afba83b7b94", + "fixed_version": "6.1.77" + }, + "6.6": { + "cmt_id": "752312f6a79440086ac0f9b08d7776870037323c", + "fixed_version": "6.6.16" + }, + "6.7": { + "cmt_id": "1556c242e64cdffe58736aa650b0b395854fe4d4", + "fixed_version": "6.7.4" + } + }, + "CVE-2023-52633": { + "5.15": { + "cmt_id": "0c7478a2da3f5fe106b4658338873d50c86ac7ab", + "fixed_version": "5.15.149" + }, + "6.1": { + "cmt_id": "4f7dad73df4cdb2b7042103d3922745d040ad025", + "fixed_version": "6.1.77" + }, + "6.6": { + "cmt_id": "de3e9d8e8d1ae0a4d301109d1ec140796901306c", + "fixed_version": "6.6.16" + }, + "6.7": { + "cmt_id": "b427f55e9d4185f6f17cc1e3296eb8d0c4425283", + "fixed_version": "6.7.4" + } + }, + "CVE-2023-52634": { + "6.7": { + "cmt_id": "ce29728ef6485a367934cc100249c66dd3cde5b6", + "fixed_version": "6.7.4" + } + }, + "CVE-2023-52635": { + "5.10": { + "cmt_id": "3399cc7013e761fee9d6eec795e9b31ab0cbe475", + "fixed_version": "5.10.210" + }, + "5.15": { + "cmt_id": "099f6a9edbe30b142c1d97fe9a4748601d995675", + "fixed_version": "5.15.149" + }, + "6.1": { + "cmt_id": "31569995fc65007b73a3fff605ec2b3401b435e9", + "fixed_version": "6.1.77" + }, + "6.6": { + "cmt_id": "0aedb319ef3ed39e9e5a7b7726c8264ca627bbd9", + "fixed_version": "6.6.16" + }, + "6.7": { + "cmt_id": "ae815e2fdc284ab31651d52460698bd89c0fce22", + "fixed_version": "6.7.4" + } + }, + "CVE-2023-52636": { + "6.6": { + "cmt_id": "da9c33a70f095d5d55c36d0bfeba969e31de08ae", + "fixed_version": "6.6.17" + }, + "6.7": { + "cmt_id": "bd9442e553ab8bf74b8be3b3c0a43bf4af4dc9b8", + "fixed_version": "6.7.5" + } + }, + "CVE-2023-52637": { + "5.10": { + "cmt_id": "978e50ef8c38dc71bd14d1b0143d554ff5d188ba", + "fixed_version": "5.10.210" + }, + "5.15": { + "cmt_id": "41ccb5bcbf03f02d820bc6ea8390811859f558f8", + "fixed_version": "5.15.149" + }, + "5.4": { + "cmt_id": "08de58abedf6e69396e1207e4f99ef8904b2b532", + "fixed_version": "5.4.269" + }, + "6.1": { + "cmt_id": "4dd684d4bb3cd5454e0bf6e2a1bdfbd5c9c872ed", + "fixed_version": "6.1.79" + }, + "6.6": { + "cmt_id": "f84e7534457dcd7835be743517c35378bb4e7c50", + "fixed_version": "6.6.18" + }, + "6.7": { + "cmt_id": "fc74b9cb789cae061bbca7b203a3842e059f6b5d", + "fixed_version": "6.7.6" + } + }, + "CVE-2023-52638": { + "5.15": { + "cmt_id": "03358aba991668d3bb2c65b3c82aa32c36851170", + "fixed_version": "5.15.149" + }, + "6.1": { + "cmt_id": "aedda066d717a0b4335d7e0a00b2e3a61e40afcf", + "fixed_version": "6.1.79" + }, + "6.6": { + "cmt_id": "26dfe112ec2e95fe0099681f6aec33da13c2dd8e", + "fixed_version": "6.6.18" + }, + "6.7": { + "cmt_id": "559b6322f9480bff68cfa98d108991e945a4f284", + "fixed_version": "6.7.6" + } + }, + "CVE-2023-52639": { + "6.1": { + "cmt_id": "5df3b81a567eb565029563f26f374ae3803a1dfc", + "fixed_version": "6.1.82" + }, + "6.6": { + "cmt_id": "f5572c0323cf8b4f1f0618178648a25b8fb8a380", + "fixed_version": "6.6.22" + }, + "6.7": { + "cmt_id": "28bb27824f25f36e5f80229a358d66ee09244082", + "fixed_version": "6.7.6" + } + }, + "CVE-2023-52640": { + "5.15": { + "cmt_id": "a585faf0591548fe0920641950ebfa8a6eefe1cd", + "fixed_version": "5.15.150" + }, + "6.1": { + "cmt_id": "6ed6cdbe88334ca3430c5aee7754dc4597498dfb", + "fixed_version": "6.1.80" + }, + "6.6": { + "cmt_id": "52fff5799e3d1b5803ecd2f5f19c13c65f4f7b23", + "fixed_version": "6.6.19" + }, + "6.7": { + "cmt_id": "0830c5cf19bdec50d0ede4755ddc463663deb21c", + "fixed_version": "6.7.7" + } + }, + "CVE-2023-52641": { + "5.15": { + "cmt_id": "ee8db6475cb15c8122855f72ad4cfa5375af6a7b", + "fixed_version": "5.15.150" + }, + "6.1": { + "cmt_id": "50545eb6cd5f7ff852a01fa29b7372524ef948cc", + "fixed_version": "6.1.80" + }, + "6.6": { + "cmt_id": "947c3f3d31ea185ddc8e7f198873f17d36deb24c", + "fixed_version": "6.6.19" + }, + "6.7": { + "cmt_id": "847b68f58c212f0439c5a8101b3841f32caffccd", + "fixed_version": "6.7.7" + } + }, + "CVE-2023-5345": { + "6.1": { + "cmt_id": "f555a508087ab8210b4658120ac6413d6fe2b4c7", + "fixed_version": "6.1.56" + }, + "6.5": { + "cmt_id": "0c116005af551e9cf437a9ec8c80204c2d4b1b53", + "fixed_version": "6.5.6" + } + }, + "CVE-2023-5633": { + "6.5": { + "cmt_id": "1474b39f961703d0bb33833a6d6b112826839781", + "fixed_version": "6.5.8" + } + }, + "CVE-2023-5717": { + "4.14": { + "cmt_id": "555e15e93f6dbb8ce6b5b92e5272473abfe8bd2b", + "fixed_version": "4.14.328" + }, + "4.19": { + "cmt_id": "a714491fa92d2068358dd603cc50bf2062517bd8", + "fixed_version": "4.19.297" + }, + "5.10": { + "cmt_id": "487a8e24643a0effb2ba19cad3227fc75dc3c4b7", + "fixed_version": "5.10.199" + }, + "5.15": { + "cmt_id": "71d224acc4d1df1b61a294abee0f1032a9b03b40", + "fixed_version": "5.15.137" + }, + "5.4": { + "cmt_id": "7252c8b981853bb8930de44fab924f947362683f", + "fixed_version": "5.4.259" + }, + "6.1": { + "cmt_id": "f6952655a61264900ed08e9d642adad8222f8e29", + "fixed_version": "6.1.60" + }, + "6.5": { + "cmt_id": "20f925d38e1ecc1d36ee6bf6e325fb514a6f727d", + "fixed_version": "6.5.9" + } + }, + "CVE-2023-5972": { + "6.5": { + "cmt_id": "8a544721329e711f85358f73fe56964cdedeb531", + "fixed_version": "6.5.9" + } + }, + "CVE-2023-6039": { + "6.4": { + "cmt_id": "a54bf862ccad27c8b91795b69a9ca105f8e6295e", + "fixed_version": "6.4.10" + } + }, + "CVE-2023-6040": { + "4.19": { + "cmt_id": "087d38ae0fd5a9a41b949e97601b4b0d09336f19", + "fixed_version": "4.19.305" + }, + "5.10": { + "cmt_id": "25d1e7be85cf0a5afca5555f90e4609c40480ece", + "fixed_version": "5.10.208" + }, + "5.15": { + "cmt_id": "ab3a3aadb373b47a1f401c7626608b1b214cec9e", + "fixed_version": "5.15.147" + }, + "5.4": { + "cmt_id": "8711fa0c06d49ad3a45b60cc10ae72980df89b00", + "fixed_version": "5.4.267" + } + }, + "CVE-2023-6111": { + "6.6": { + "cmt_id": "80d6a9236ab6d2c0fd241514d1af2e325d16a210", + "fixed_version": "6.6.3" + } + }, + "CVE-2023-6121": { + "5.10": { + "cmt_id": "2be451e7a2f124899546c1bb5c6d509a927968c8", + "fixed_version": "5.10.203" + }, + "5.15": { + "cmt_id": "e26c6febac43a2dd2c5fb993b2137489005d43bf", + "fixed_version": "5.15.141" + }, + "5.4": { + "cmt_id": "afbedd6136cbff0b4412efd09d98d2cb7348563c", + "fixed_version": "5.4.263" + }, + "6.1": { + "cmt_id": "0e485f12ebb7b69b67c7f85195a1b4aad95d354a", + "fixed_version": "6.1.65" + }, + "6.6": { + "cmt_id": "2291653c27236d34ca7df3bfd3427ce6e30c2d95", + "fixed_version": "6.6.4" + } + }, + "CVE-2023-6176": { + "5.10": { + "cmt_id": "a5096cc6e7836711541b7cd2d6da48d36fe420e9", + "fixed_version": "5.10.195" + }, + "5.15": { + "cmt_id": "481bd6dcc5fe6c0ec57b61240ab552f67ff51b6b", + "fixed_version": "5.15.132" + }, + "6.1": { + "cmt_id": "7f4116c6f98412a6e29ace6d6a7b41ebb4e8a392", + "fixed_version": "6.1.54" + }, + "6.5": { + "cmt_id": "74aecad5da19004ccf6321fd397d14b10756622a", + "fixed_version": "6.5.4" + } + }, + "CVE-2023-6200": { + "6.6": { + "cmt_id": "b577b9aa1340ee7f36441b0740691550abaad5f2", + "fixed_version": "6.6.9" + } + }, + "CVE-2023-6270": { + "4.19": { + "cmt_id": "ad80c34944d7175fa1f5c7a55066020002921a99", + "fixed_version": "4.19.311" + }, + "5.10": { + "cmt_id": "faf0b4c5e00bb680e8e43ac936df24d3f48c8e65", + "fixed_version": "5.10.214" + }, + "5.15": { + "cmt_id": "7dd09fa80b0765ce68bfae92f4e2f395ccf0fba4", + "fixed_version": "5.15.153" + }, + "5.4": { + "cmt_id": "1a54aa506b3b2f31496731039e49778f54eee881", + "fixed_version": "5.4.273" + }, + "6.1": { + "cmt_id": "74ca3ef68d2f449bc848c0a814cefc487bf755fa", + "fixed_version": "6.1.83" + }, + "6.6": { + "cmt_id": "eb48680b0255a9e8a9bdc93d6a55b11c31262e62", + "fixed_version": "6.6.23" + }, + "6.7": { + "cmt_id": "079cba4f4e307c69878226fdf5228c20aa1c969c", + "fixed_version": "6.7.11" + } + }, + "CVE-2023-6356": { + "5.10": { + "cmt_id": "f775f2621c2ac5cc3a0b3a64665dad4fb146e510", + "fixed_version": "5.10.209" + }, + "5.15": { + "cmt_id": "4cb3cf7177ae3666be7fb27d4ad4d72a295fb02d", + "fixed_version": "5.15.148" + }, + "5.4": { + "cmt_id": "ee5e7632e981673f42a50ade25e71e612e543d9d", + "fixed_version": "5.4.268" + }, + "6.1": { + "cmt_id": "2871aa407007f6f531fae181ad252486e022df42", + "fixed_version": "6.1.75" + }, + "6.6": { + "cmt_id": "24e05760186dc070d3db190ca61efdbce23afc88", + "fixed_version": "6.6.14" + }, + "6.7": { + "cmt_id": "70154e8d015c9b4fb56c1a2ef1fc8b83d45c7f68", + "fixed_version": "6.7.2" + } + }, + "CVE-2023-6531": { + "6.1": { + "cmt_id": "f2f57f51b53be153a522300454ddb3887722fb2c", + "fixed_version": "6.1.68" + }, + "6.6": { + "cmt_id": "5a33d385eb36991a91e3dddb189d8679e2aac2be", + "fixed_version": "6.6.7" + } + }, + "CVE-2023-6536": { + "5.10": { + "cmt_id": "39669fae69f302961d89f38d969c6fcc1d07eb02", + "fixed_version": "5.10.209" + }, + "5.15": { + "cmt_id": "0613a2fbdf8d32c3f8f1e62d704e92251a100795", + "fixed_version": "5.15.148" + }, + "5.4": { + "cmt_id": "9638beb4e10ac116c6a4fc13315e9c3608055ac0", + "fixed_version": "5.4.268" + }, + "6.1": { + "cmt_id": "83ccd15717ee2b6143df72df39685f0c832e3451", + "fixed_version": "6.1.75" + }, + "6.6": { + "cmt_id": "2f00fd8d50a7d5eedc85e62efdc1a29213168998", + "fixed_version": "6.6.14" + }, + "6.7": { + "cmt_id": "c32d355f507fa81cf23aaa4dd4150e696cb8ebaf", + "fixed_version": "6.7.2" + } + }, + "CVE-2023-6546": { + "5.10": { + "cmt_id": "869ce5e5984595bd2c62b598d977debc218b6f4d", + "fixed_version": "5.10.192" + }, + "5.15": { + "cmt_id": "2a523446438376bb7c224f3169ae9b98ce0fb893", + "fixed_version": "5.15.128" + }, + "6.1": { + "cmt_id": "31311a9a4baae0ad47c85e448af21b2120344ff0", + "fixed_version": "6.1.47" + }, + "6.4": { + "cmt_id": "f40e70d7f40bd44ecf6f35b946a899e59744fbe1", + "fixed_version": "6.4.12" + } + }, + "CVE-2023-6560": { + "6.6": { + "cmt_id": "4be625ba36bcfdfb9c72b712acd4ef943a269ebb", + "fixed_version": "6.6.5" + } + }, + "CVE-2023-6606": { + "4.19": { + "cmt_id": "89b6ae907c6bcc175bc95a67d6936217530a29ff", + "fixed_version": "4.19.304" + }, + "5.10": { + "cmt_id": "0c54b79d1d9b25f5a406bcf1969f956e14c4704d", + "fixed_version": "5.10.206" + }, + "5.15": { + "cmt_id": "ded3cfdefec8b2accc767f176419316b61c157c3", + "fixed_version": "5.15.146" + }, + "5.4": { + "cmt_id": "508e2fdd978e4c26798eac2059f9520255904f82", + "fixed_version": "5.4.266" + }, + "6.1": { + "cmt_id": "c60e10d1549f8748a68ec13dcd177c62843985ff", + "fixed_version": "6.1.70" + }, + "6.6": { + "cmt_id": "ac48fcef5ec2e9ac85c0b39045d874e60eac75d7", + "fixed_version": "6.6.9" + } + }, + "CVE-2023-6610": { + "6.1": { + "cmt_id": "5411e3292792be7dafd1fe948a87e3ca29c1f550", + "fixed_version": "6.1.74" + }, + "6.6": { + "cmt_id": "c5e0ed716c52fddea5e625668e75658c3b81d3fc", + "fixed_version": "6.6.13" + } + }, + "CVE-2023-6622": { + "5.15": { + "cmt_id": "cf5f113c41eb2c7dbe19d849a0883f7a429fa54b", + "fixed_version": "5.15.143" + }, + "6.1": { + "cmt_id": "96f8654b701f772af5f358b91807ce2836ff3444", + "fixed_version": "6.1.68" + }, + "6.6": { + "cmt_id": "5eeba00a89c5c6be4e45b69bef20d1d1b9edb968", + "fixed_version": "6.6.7" + } + }, + "CVE-2023-6817": { + "5.10": { + "cmt_id": "bf72b44fe81be08a9fcd58aabf417cd3337ffc99", + "fixed_version": "5.10.204" + }, + "5.15": { + "cmt_id": "e65128616faa101b336e52fefbd62b83bb309916", + "fixed_version": "5.15.143" + }, + "6.1": { + "cmt_id": "189c2a82933c67ad360c421258d5449f6647544a", + "fixed_version": "6.1.68" + }, + "6.6": { + "cmt_id": "c66d39f18e0ef16bac8c8491b657051f531a1eba", + "fixed_version": "6.6.7" + } + }, + "CVE-2023-6915": { + "5.10": { + "cmt_id": "dbf8b0d9387fa02de0aa047ce23eb3a7bd134e03", + "fixed_version": "5.10.209" + }, + "5.15": { + "cmt_id": "5dbcdaf4dbfe074e9142991c5c28eef789c1f6c6", + "fixed_version": "5.15.148" + }, + "5.4": { + "cmt_id": "ef7152f8705fed11796641d7644acc3c950b5967", + "fixed_version": "5.4.268" + }, + "6.1": { + "cmt_id": "9efdc0081ccae62c44a929e21d32bacc5f2e113f", + "fixed_version": "6.1.74" + }, + "6.6": { + "cmt_id": "ffcaafdb8be64555e9928d943a3655c755dba92b", + "fixed_version": "6.6.13" + } + }, + "CVE-2023-6931": { + "4.19": { + "cmt_id": "f5d6ab016792c9d6d5280fdb7f8962eb3b8c620e", + "fixed_version": "4.19.302" + }, + "5.10": { + "cmt_id": "208dd116f96ea19e5d38d7b80fce49bc5ce1bbe8", + "fixed_version": "5.10.204" + }, + "5.15": { + "cmt_id": "ebc7597ce9719d2ff72e13df072680aa491f27fb", + "fixed_version": "5.15.143" + }, + "5.4": { + "cmt_id": "152f51d159f35b2f64d7046429703500375becc9", + "fixed_version": "5.4.264" + }, + "6.1": { + "cmt_id": "06dec254c59afd01b7a44838cf8bfc382bef019b", + "fixed_version": "6.1.68" + }, + "6.6": { + "cmt_id": "cfe9295db0932f1b8e0d94ffc75521898e5a5a8a", + "fixed_version": "6.6.7" + } + }, + "CVE-2023-6932": { + "4.14": { + "cmt_id": "be70b329c7fcb4a90c33546dc7c34bff07975b60", + "fixed_version": "4.14.332" + }, + "4.19": { + "cmt_id": "6b6f5c6671fdfde9c94efe6409fa9f39436017e7", + "fixed_version": "4.19.301" + }, + "5.10": { + "cmt_id": "772fe1da9a8d4dcd8993abaecbde04789c52a4c2", + "fixed_version": "5.10.203" + }, + "5.15": { + "cmt_id": "c4a00c47a140c39a0497a40b0f54cf4586a2b1d7", + "fixed_version": "5.15.142" + }, + "5.4": { + "cmt_id": "7ccf772a8bad7962d12d48723447c3605a6e23c1", + "fixed_version": "5.4.263" + }, + "6.1": { + "cmt_id": "94445d9583079e0ccc5dde1370076ff24800d86e", + "fixed_version": "6.1.66" + }, + "6.6": { + "cmt_id": "bf8601dabed0c134a7d58085824e3e466840c5d1", + "fixed_version": "6.6.5" + } + }, + "CVE-2023-7042": { + "4.19": { + "cmt_id": "0cd3b0a1dc987697cba1fe93c784365aa1f8a230", + "fixed_version": "4.19.311" + }, + "5.10": { + "cmt_id": "e1dc7aa814a95aeeb1b2c05be2b62af8423b15cc", + "fixed_version": "5.10.214" + }, + "5.15": { + "cmt_id": "4c4e592266b6eec748ce90e82bd9cbc9838f3633", + "fixed_version": "5.15.153" + }, + "5.4": { + "cmt_id": "88a9dffaec779504ab3680d33cf677741c029420", + "fixed_version": "5.4.273" + }, + "6.1": { + "cmt_id": "90f089d77e38db1c48629f111f3c8c336be1bc38", + "fixed_version": "6.1.83" + }, + "6.6": { + "cmt_id": "10a342fa2fe4c4dd22f2c8fe917d3b1929582076", + "fixed_version": "6.6.23" + }, + "6.7": { + "cmt_id": "db755cf93f5895bbac491d27a8e2fe04c5f9ae4a", + "fixed_version": "6.7.11" + } + }, + "CVE-2023-7192": { + "4.14": { + "cmt_id": "8df5f3b50d9ce523251edf9cd0470963be20004b", + "fixed_version": "4.14.308" + }, + "4.19": { + "cmt_id": "43b9a9c78e37a5532c2a9260dff9d9989f2bbb23", + "fixed_version": "4.19.276" + }, + "5.10": { + "cmt_id": "1ff0b87df98b93e10ced45773aa7d35377355421", + "fixed_version": "5.10.173" + }, + "5.15": { + "cmt_id": "af41b3cd9a9245f482b8855bd3c62c6f04ae68ab", + "fixed_version": "5.15.100" + }, + "5.4": { + "cmt_id": "5d0d38805d3234ca2cd6fbeb74d706348f4bbc43", + "fixed_version": "5.4.235" + }, + "6.1": { + "cmt_id": "4f25d1dff80535f088b8f8568dd731fb098e29b4", + "fixed_version": "6.1.18" + }, + "6.2": { + "cmt_id": "033ac6ea4b513f9a4a20882f431f68cea307ba87", + "fixed_version": "6.2.5" + } + }, + "CVE-2024-0193": { + "5.10": { + "cmt_id": "73117ea03363d4493bd4e9f82f29b34b92d88a91", + "fixed_version": "5.10.206" + }, + "5.15": { + "cmt_id": "d10f7540c5541ad9f4fe2a02a73153d25d4a540d", + "fixed_version": "5.15.146" + }, + "6.1": { + "cmt_id": "0105571f80edb96f81bb4bbdd5233a9130dc345b", + "fixed_version": "6.1.71" + }, + "6.6": { + "cmt_id": "b7f1c01b55ad2a5da12f08e5ec3c76dabb99882a", + "fixed_version": "6.6.10" + }, + "6.7": { + "cmt_id": "7315dc1e122c85ffdfc8defffbb8f8b616c2eb1a", + "fixed_version": "6.7" + } + }, + "CVE-2024-0340": { + "4.19": { + "cmt_id": "95eab1039625d54d1770665756dd34e9fe926638", + "fixed_version": "4.19.307" + }, + "5.10": { + "cmt_id": "cda4ca038cafe016bd8dcac8cac83d771dfdcbf0", + "fixed_version": "5.10.210" + }, + "5.15": { + "cmt_id": "be38f291fd4d106be66370debd23d625c576023e", + "fixed_version": "5.15.149" + }, + "5.4": { + "cmt_id": "88c7e1e7a6b82d38ff82ca446862f3d5de34192a", + "fixed_version": "5.4.269" + }, + "6.1": { + "cmt_id": "4675661672e3730597babf97c4e9593a775c8917", + "fixed_version": "6.1.78" + } + }, + "CVE-2024-0443": { + "6.3": { + "cmt_id": "0f6090d90f627d8c58f939067d6c6821ce1b3c68", + "fixed_version": "6.3.9" + } + }, + "CVE-2024-0562": { + "5.15": { + "cmt_id": "f96b9f7c1676923bce871e728bb49c0dfa5013cc", + "fixed_version": "5.15.64" + }, + "5.19": { + "cmt_id": "9a6c710f3bc10bc9cc23e1c080b53245b7f9d5b7", + "fixed_version": "5.19.6" + } + }, + "CVE-2024-0565": { + "5.10": { + "cmt_id": "b03c8099a738a04d2343547ae6a04e5f0f63d3fa", + "fixed_version": "5.10.211" + }, + "5.15": { + "cmt_id": "858e73ff25639a0cc1f6f8d2587b62c045867e41", + "fixed_version": "5.15.150" + }, + "6.1": { + "cmt_id": "9f528a8e68327117837b5e28b096f52af4c26a05", + "fixed_version": "6.1.69" + }, + "6.6": { + "cmt_id": "534733397da26de0303057ce0b93a22bda150365", + "fixed_version": "6.6.8" + } + }, + "CVE-2024-0582": { + "6.6": { + "cmt_id": "7138ebbe65caf65f52b923d4ef819c77d04ea671", + "fixed_version": "6.6.5" + } + }, + "CVE-2024-0584": { + "4.14": { + "cmt_id": "be70b329c7fcb4a90c33546dc7c34bff07975b60", + "fixed_version": "4.14.332" + }, + "4.19": { + "cmt_id": "6b6f5c6671fdfde9c94efe6409fa9f39436017e7", + "fixed_version": "4.19.301" + }, + "5.10": { + "cmt_id": "772fe1da9a8d4dcd8993abaecbde04789c52a4c2", + "fixed_version": "5.10.203" + }, + "5.15": { + "cmt_id": "c4a00c47a140c39a0497a40b0f54cf4586a2b1d7", + "fixed_version": "5.15.142" + }, + "5.4": { + "cmt_id": "7ccf772a8bad7962d12d48723447c3605a6e23c1", + "fixed_version": "5.4.263" + }, + "6.1": { + "cmt_id": "94445d9583079e0ccc5dde1370076ff24800d86e", + "fixed_version": "6.1.66" + }, + "6.6": { + "cmt_id": "bf8601dabed0c134a7d58085824e3e466840c5d1", + "fixed_version": "6.6.5" + } + }, + "CVE-2024-0607": { + "4.19": { + "cmt_id": "fca41e5b687e029f69e3a35a2fa31e2560e538dc", + "fixed_version": "4.19.307" + }, + "5.10": { + "cmt_id": "9a865a11d6890d4a789db1eaafebdc8bd092b12c", + "fixed_version": "5.10.210" + }, + "5.15": { + "cmt_id": "b8b514b2a6cdfac24911e4910461bcb9db15ca8d", + "fixed_version": "5.15.140" + }, + "5.4": { + "cmt_id": "25b42be4e067e107a2559266b54bf07fa5b094fb", + "fixed_version": "5.4.269" + }, + "6.1": { + "cmt_id": "18a169810cff769a7a697b35058c756805f589e0", + "fixed_version": "6.1.64" + }, + "6.5": { + "cmt_id": "1a605657adc58b3c8e2c1c66aaa5fecd29072135", + "fixed_version": "6.5.13" + }, + "6.6": { + "cmt_id": "013deed31ab15ef287b0045e4e7bd8f250e75b94", + "fixed_version": "6.6.3" + } + }, + "CVE-2024-0639": { + "5.15": { + "cmt_id": "1fba2510b52f0bb9f408700e78db6d8d0ed6bcd5", + "fixed_version": "5.15.121" + }, + "6.1": { + "cmt_id": "1aa5a6a6d28c77e364feaba35ff7f12d2d74fec1", + "fixed_version": "6.1.39" + }, + "6.4": { + "cmt_id": "f8d77336af38e71435f92c5f271fd0b40f33fe66", + "fixed_version": "6.4.4" + } + }, + "CVE-2024-0641": { + "5.10": { + "cmt_id": "6a24d0661fa389c241d935da38e0f6a5ee8eb1ae", + "fixed_version": "5.10.198" + }, + "5.15": { + "cmt_id": "24fb22bddb71c6bfbe0fe25e1b7f793c5b580918", + "fixed_version": "5.15.135" + }, + "6.1": { + "cmt_id": "143e72757a902abcecd5f487553f44dc19a56cfc", + "fixed_version": "6.1.57" + }, + "6.5": { + "cmt_id": "aa1a21681b94f59c67ca56601e05dc1573ecb6cb", + "fixed_version": "6.5.7" + } + }, + "CVE-2024-0646": { + "5.10": { + "cmt_id": "c6b2a6b827d4b2d0f36b520e54e083df9b330a7b", + "fixed_version": "5.10.208" + }, + "5.15": { + "cmt_id": "ba5efd8544fa62ae85daeb36077468bf2ce974ab", + "fixed_version": "5.15.147" + }, + "5.4": { + "cmt_id": "c67bf30baf261b467988fd40668bc893b71586b9", + "fixed_version": "5.4.267" + }, + "6.1": { + "cmt_id": "9b3d3a7f3c4d710c1dd3f723851c3eeaf42642bc", + "fixed_version": "6.1.69" + }, + "6.6": { + "cmt_id": "eb30a025982f61910f32e99778db3c0ceceaff5c", + "fixed_version": "6.6.7" + } + }, + "CVE-2024-0775": { + "4.14": { + "cmt_id": "7dd95a282809fec91e54867a92e271064284ad98", + "fixed_version": "4.14.315" + }, + "4.19": { + "cmt_id": "37302d4c2724dc92be5f90a3718eafa29834d586", + "fixed_version": "4.19.283" + }, + "5.10": { + "cmt_id": "37c69da3adc45fc34df0b8d07a158a6fa5b2a3f7", + "fixed_version": "5.10.180" + }, + "5.15": { + "cmt_id": "b2f1314e6e36e2322554e5e6e9598eedd349d942", + "fixed_version": "5.15.112" + }, + "5.4": { + "cmt_id": "2dda2029067106f0835655a0417f1a5eaf3ba0b0", + "fixed_version": "5.4.243" + }, + "6.1": { + "cmt_id": "25c9fca7b71c5045d6dc537430af5b2e79598fa1", + "fixed_version": "6.1.29" + }, + "6.2": { + "cmt_id": "d2e11d152824deeeaa0d70eb8906a65261838ce2", + "fixed_version": "6.2.16" + }, + "6.3": { + "cmt_id": "536ecbd569cb99b2e8a4422c43926590c7893aef", + "fixed_version": "6.3.3" + } + }, + "CVE-2024-0841": { + "5.10": { + "cmt_id": "80d852299987a8037be145a94f41874228f1a773", + "fixed_version": "5.10.212" + }, + "5.15": { + "cmt_id": "22850c9950a4e43a67299755d11498f3292d02ff", + "fixed_version": "5.15.151" + }, + "5.4": { + "cmt_id": "1dde8ef4b7a749ae1bc73617c91775631d167557", + "fixed_version": "5.4.271" + }, + "6.1": { + "cmt_id": "2e2c07104b4904aed1389a59b25799b95a85b5b9", + "fixed_version": "6.1.79" + }, + "6.6": { + "cmt_id": "13c5a9fb07105557a1fa9efdb4f23d7ef30b7274", + "fixed_version": "6.6.18" + }, + "6.7": { + "cmt_id": "ec78418801ef7b0c22cd6a30145ec480dd48db39", + "fixed_version": "6.7.6" + } + }, + "CVE-2024-1085": { + "5.15": { + "cmt_id": "c9ed30eea4f7bfa2441235ce23abd339ee671f50", + "fixed_version": "5.15.148" + }, + "6.1": { + "cmt_id": "a372f1d01bc11aa85773a02353cd01aaf16dc18e", + "fixed_version": "6.1.75" + }, + "6.6": { + "cmt_id": "7baa33837ee2473eb0afd9755e29a25cd3771eac", + "fixed_version": "6.6.14" + }, + "6.7": { + "cmt_id": "7e0f5f8ae3e5f17e367f7040ade7a467f1f0e3b9", + "fixed_version": "6.7.2" + } + }, + "CVE-2024-1086": { + "4.19": { + "cmt_id": "8365e9d92b85fda975a5ece7a3a139cb964018c8", + "fixed_version": "4.19.307" + }, + "5.10": { + "cmt_id": "55a60251fa50d4e68175e36666b536a602ce4f6c", + "fixed_version": "5.10.210" + }, + "5.15": { + "cmt_id": "960cf4f812530f01f6acc6878ceaa5404c06af7b", + "fixed_version": "5.15.149" + }, + "5.4": { + "cmt_id": "4e66422f1b56149761dc76030e6345d1cca6f869", + "fixed_version": "5.4.269" + }, + "6.1": { + "cmt_id": "8e34430e33b8a80bc014f3efe29cac76bc30a4b4", + "fixed_version": "6.1.76" + }, + "6.6": { + "cmt_id": "6653118b176a00915125521c6572ae8e507621db", + "fixed_version": "6.6.15" + }, + "6.7": { + "cmt_id": "f05a497e7bc8851eeeb3a58da180ba469efebb05", + "fixed_version": "6.7.3" + } + }, + "CVE-2024-1151": { + "5.10": { + "cmt_id": "55cfccb658fc142d7fbfeae2d0496b7841d128c3", + "fixed_version": "5.10.210" + }, + "5.15": { + "cmt_id": "c45f2fa92cb273f77be33b60a120ff7cf6df8085", + "fixed_version": "5.15.149" + }, + "6.1": { + "cmt_id": "65ded4eb220695909eee657758e824fc30f0b561", + "fixed_version": "6.1.79" + }, + "6.6": { + "cmt_id": "5eeb2a9eaa5bc6e0aa655ac72a931b78f8f9b365", + "fixed_version": "6.6.18" + }, + "6.7": { + "cmt_id": "da05eb129c0208ef907420480c5859083408dc2c", + "fixed_version": "6.7.6" + } + }, + "CVE-2024-1312": { + "6.4": { + "cmt_id": "93a0b7d43de51b38c4c91d4121e447018132119a", + "fixed_version": "6.4.10" + } + }, + "CVE-2024-22099": { + "4.19": { + "cmt_id": "369f419c097e82407dd429a202cde9a73d3ae29b", + "fixed_version": "4.19.311" + }, + "5.10": { + "cmt_id": "81d7d920a22fd58ef9aedb1bd0a68ee32bd23e96", + "fixed_version": "5.10.214" + }, + "5.15": { + "cmt_id": "8d1753973f598531baaa2c1033cf7f7b5bb004b0", + "fixed_version": "5.15.153" + }, + "5.4": { + "cmt_id": "5f369efd9d963c1f711a06c9b8baf9f5ce616d85", + "fixed_version": "5.4.273" + }, + "6.1": { + "cmt_id": "567c0411dc3b424fc7bd1e6109726d7ba32d4f73", + "fixed_version": "6.1.83" + }, + "6.6": { + "cmt_id": "3ead59bafad05f2967ae2438c0528d53244cfde5", + "fixed_version": "6.6.23" + }, + "6.7": { + "cmt_id": "5f9fe302dd3a9bbc50f4888464c1773f45166bfd", + "fixed_version": "6.7.11" + } + }, + "CVE-2024-22705": { + "5.15": { + "cmt_id": "d739f2b6d8f57aa9377362cd8c0b1152a4dd6bd5", + "fixed_version": "5.15.146" + }, + "6.1": { + "cmt_id": "7a3bbbadac4be9d30b45e9f1134e94294f79ce77", + "fixed_version": "6.1.71" + }, + "6.6": { + "cmt_id": "7d5f219f1ef69f27eb8cbfb794d634fc9c4d24ac", + "fixed_version": "6.6.10" + } + }, + "CVE-2024-23196": { + "5.10": { + "cmt_id": "9f9eed451176ffcac6b5ba0f6dae1a6b4a1cb0eb", + "fixed_version": "5.10.192" + }, + "5.15": { + "cmt_id": "8703b26387e1fa4f8749db98d24c67617b873acb", + "fixed_version": "5.15.128" + }, + "5.4": { + "cmt_id": "109f0aaa0b8838a88af9125b79579023539300a7", + "fixed_version": "5.4.255" + }, + "6.1": { + "cmt_id": "cdd412b528dee6e0851c4735d6676ec138da13a4", + "fixed_version": "6.1.47" + }, + "6.4": { + "cmt_id": "b32e40379e5b2814de0c4bc199edc2d82317dc07", + "fixed_version": "6.4.12" + } + }, + "CVE-2024-23307": { + "6.1": { + "cmt_id": "9477cfeb300823461b44223a7d5fac26a31df4fe", + "fixed_version": "6.1.84" + }, + "6.6": { + "cmt_id": "8ec4a68a25a231e2303716a0aba8ff1413d47c87", + "fixed_version": "6.6.24" + }, + "6.7": { + "cmt_id": "1191f9391105e49115715e55030476849f6f6da5", + "fixed_version": "6.7.12" + } + }, + "CVE-2024-23849": { + "4.19": { + "cmt_id": "344350bfa3b4b37d7c3d5a00536e6fbf0e953fbf", + "fixed_version": "4.19.307" + }, + "5.10": { + "cmt_id": "5ae8d50044633306ff160fcf7faa24994175efe1", + "fixed_version": "5.10.210" + }, + "5.15": { + "cmt_id": "00d1ee8e1d02194f7b7b433e904e04bbcd2cc0dc", + "fixed_version": "5.15.149" + }, + "5.4": { + "cmt_id": "a37ae111db5e0f7e3d6b692056c30e3e0f6f79cd", + "fixed_version": "5.4.269" + }, + "6.1": { + "cmt_id": "71024928b3f71ce4529426f8692943205c58d30b", + "fixed_version": "6.1.76" + }, + "6.6": { + "cmt_id": "7a73190ea557e7f26914b0fe04c1f57a96cb771f", + "fixed_version": "6.6.15" + }, + "6.7": { + "cmt_id": "0b787c2dea15e7a2828fa3a74a5447df4ed57711", + "fixed_version": "6.7.3" + } + }, + "CVE-2024-23850": { + "5.10": { + "cmt_id": "3f5d47eb163bceb1b9e613c9003bae5fefc0046f", + "fixed_version": "5.10.210" + }, + "5.15": { + "cmt_id": "e31546b0f34af21738c4ceac47d662c00ee6382f", + "fixed_version": "5.15.149" + }, + "6.1": { + "cmt_id": "66b317a2fc45b2ef66527ee3f8fa08fb5beab88d", + "fixed_version": "6.1.79" + }, + "6.6": { + "cmt_id": "833775656d447c545133a744a0ed1e189ce61430", + "fixed_version": "6.6.18" + }, + "6.7": { + "cmt_id": "5a172344bfdabb46458e03708735d7b1a918c468", + "fixed_version": "6.7.6" + } + }, + "CVE-2024-23851": { + "5.10": { + "cmt_id": "a891a0621e725e85529985139cada8cb5a74a116", + "fixed_version": "5.10.210" + }, + "5.15": { + "cmt_id": "888a0a46b80fa37eacfe81faf47ba0b83876251d", + "fixed_version": "5.15.149" + }, + "6.1": { + "cmt_id": "c5d83ac2bf6ca668a39ffb1a576899a66153ba19", + "fixed_version": "6.1.79" + }, + "6.6": { + "cmt_id": "438d19492b7f002334573bae43276297eb234c80", + "fixed_version": "6.6.18" + }, + "6.7": { + "cmt_id": "cd70175481f63af31901dd463e44386f033c3f4c", + "fixed_version": "6.7.6" + } + }, + "CVE-2024-24860": { + "5.10": { + "cmt_id": "394c6c0b6d9bdd7d6ebca35ca9cfbabf44c0c257", + "fixed_version": "5.10.209" + }, + "5.15": { + "cmt_id": "4c71c01df8ef209e7fe22b58666cd2cf3dbafb44", + "fixed_version": "5.15.148" + }, + "6.1": { + "cmt_id": "96860d9ad462db61f4eeb09934235c38eab655c4", + "fixed_version": "6.1.75" + }, + "6.6": { + "cmt_id": "f56e715ef1c19c42c6aa6cb9280947dea13aab2e", + "fixed_version": "6.6.14" + }, + "6.7": { + "cmt_id": "d1c6a77d6d48215ba723f910eaabdb6e60d21a37", + "fixed_version": "6.7.2" + } + }, + "CVE-2024-24861": { + "6.1": { + "cmt_id": "09c1be4d581d3356159abcc5a8a7a6c5f1bf1e77", + "fixed_version": "6.1.84" + }, + "6.6": { + "cmt_id": "dc5e4f240473b64f7b2f24424e96c92435ebd8d7", + "fixed_version": "6.6.24" + }, + "6.7": { + "cmt_id": "b0864de231dece0f7226b909521bebc86105743a", + "fixed_version": "6.7.12" + } + }, + "CVE-2024-25744": { + "6.1": { + "cmt_id": "b8ec27ae221eee458b15b700706db311474ac619", + "fixed_version": "6.1.68" + }, + "6.6": { + "cmt_id": "34c686e5be2fa1c03ae09568159a9ef37d1c7cf5", + "fixed_version": "6.6.7" + } + }, + "CVE-2024-26581": { + "6.6": { + "cmt_id": "b734f7a47aeb32a5ba298e4ccc16bb0c52b6dbf7", + "fixed_version": "6.6.17" + }, + "6.7": { + "cmt_id": "6eb14441f10602fa1cf691da9d685718b68b78a9", + "fixed_version": "6.7.5" + } + }, + "CVE-2024-26582": { + "6.1": { + "cmt_id": "20b4ed034872b4d024b26e2bc1092c3f80e5db96", + "fixed_version": "6.1.79" + }, + "6.6": { + "cmt_id": "d684763534b969cca1022e2a28645c7cc91f7fa5", + "fixed_version": "6.6.18" + }, + "6.7": { + "cmt_id": "754c9bab77a1b895b97bd99d754403c505bc79df", + "fixed_version": "6.7.6" + } + }, + "CVE-2024-26583": { + "6.1": { + "cmt_id": "7a3ca06d04d589deec81f56229a9a9d62352ce01", + "fixed_version": "6.1.79" + }, + "6.6": { + "cmt_id": "86dc27ee36f558fe223dbdfbfcb6856247356f4a", + "fixed_version": "6.6.18" + }, + "6.7": { + "cmt_id": "6209319b2efdd8524691187ee99c40637558fa33", + "fixed_version": "6.7.6" + } + }, + "CVE-2024-26584": { + "6.1": { + "cmt_id": "cd1bbca03f3c1d845ce274c0d0a66de8e5929f72", + "fixed_version": "6.1.84" + }, + "6.6": { + "cmt_id": "13eca403876bbea3716e82cdfe6f1e6febb38754", + "fixed_version": "6.6.18" + }, + "6.7": { + "cmt_id": "ab6397f072e5097f267abf5cb08a8004e6b17694", + "fixed_version": "6.7.6" + } + }, + "CVE-2024-26585": { + "6.1": { + "cmt_id": "196f198ca6fce04ba6ce262f5a0e4d567d7d219d", + "fixed_version": "6.1.84" + }, + "6.6": { + "cmt_id": "6db22d6c7a6dc914b12c0469b94eb639b6a8a146", + "fixed_version": "6.6.18" + }, + "6.7": { + "cmt_id": "e327ed60bff4a991cd7a709c47c4f0c5b4a4fd57", + "fixed_version": "6.7.6" + } + }, + "CVE-2024-26586": { + "5.10": { + "cmt_id": "56750ea5d15426b5f307554e7699e8b5f76c3182", + "fixed_version": "5.10.209" + }, + "5.15": { + "cmt_id": "348112522a35527c5bcba933b9fefb40a4f44f15", + "fixed_version": "5.15.148" + }, + "6.1": { + "cmt_id": "6fd24675188d354b1cad47462969afa2ab09d819", + "fixed_version": "6.1.79" + }, + "6.6": { + "cmt_id": "2f5e1565740490706332c06f36211d4ce0f88e62", + "fixed_version": "6.6.14" + }, + "6.7": { + "cmt_id": "a361c2c1da5dbb13ca67601cf961ab3ad68af383", + "fixed_version": "6.7.2" + } + }, + "CVE-2024-26587": { + "6.6": { + "cmt_id": "08aca65997fb6f233066883b1f1e653bcb1f26ca", + "fixed_version": "6.6.14" + }, + "6.7": { + "cmt_id": "c5068e442eed063d2f1658e6b6d3c1c6fcf1e588", + "fixed_version": "6.7.2" + } + }, + "CVE-2024-26588": { + "6.1": { + "cmt_id": "4631c2dd69d928bca396f9f58baeddf85e14ced5", + "fixed_version": "6.1.75" + }, + "6.6": { + "cmt_id": "9aeb09f4d85a87bac46c010d75a2ea299d462f28", + "fixed_version": "6.6.14" + }, + "6.7": { + "cmt_id": "7924ade13a49c0067da6ea13e398102979c0654a", + "fixed_version": "6.7.2" + } + }, + "CVE-2024-26589": { + "5.15": { + "cmt_id": "29ffa63f21bcdcef3e36b03cccf9d0cd031f6ab0", + "fixed_version": "5.15.148" + }, + "6.1": { + "cmt_id": "4108b86e324da42f7ed425bd71632fd844300dc8", + "fixed_version": "6.1.75" + }, + "6.6": { + "cmt_id": "e8d3872b617c21100c5ee4f64e513997a68c2e3d", + "fixed_version": "6.6.14" + }, + "6.7": { + "cmt_id": "1b500d5d6cecf98dd6ca88bc9e7ae1783c83e6d3", + "fixed_version": "6.7.2" + } + }, + "CVE-2024-26590": { + "6.1": { + "cmt_id": "47467e04816cb297905c0f09bc2d11ef865942d9", + "fixed_version": "6.1.80" + }, + "6.6": { + "cmt_id": "823ba1d2106019ddf195287ba53057aee33cf724", + "fixed_version": "6.6.14" + }, + "6.7": { + "cmt_id": "eed24b816e50c6cd18cbee0ff0d7218c8fced199", + "fixed_version": "6.7.2" + } + }, + "CVE-2024-26591": { + "5.15": { + "cmt_id": "a7b98aa10f895e2569403896f2d19b73b6c95653", + "fixed_version": "5.15.148" + }, + "6.1": { + "cmt_id": "6cc9c0af0aa06f781fa515a1734b1a4239dfd2c0", + "fixed_version": "6.1.75" + }, + "6.6": { + "cmt_id": "8c8bcd45e9b10eef12321f08d2e5be33d615509c", + "fixed_version": "6.6.14" + }, + "6.7": { + "cmt_id": "50ae82f080cf87e84828f066c31723b781d68f5b", + "fixed_version": "6.7.2" + } + }, + "CVE-2024-26592": { + "5.15": { + "cmt_id": "999daf367b924fdf14e9d83e034ee0f86bc17ec6", + "fixed_version": "5.15.149" + }, + "6.1": { + "cmt_id": "380965e48e9c32ee4263c023e1d830ea7e462ed1", + "fixed_version": "6.1.75" + }, + "6.6": { + "cmt_id": "24290ba94cd0136e417283b0dbf8fcdabcf62111", + "fixed_version": "6.6.14" + }, + "6.7": { + "cmt_id": "69d54650b751532d1e1613a4fb433e591aeef126", + "fixed_version": "6.7.2" + } + }, + "CVE-2024-26593": { + "5.10": { + "cmt_id": "7a14b8a477b88607d157c24aeb23e7389ec3319f", + "fixed_version": "5.10.210" + }, + "5.15": { + "cmt_id": "1f8d0691c50581ba6043f009ec9e8b9f78f09d5a", + "fixed_version": "5.15.149" + }, + "5.4": { + "cmt_id": "d074d5ff5ae77b18300e5079c6bda6342a4d44b7", + "fixed_version": "5.4.269" + }, + "6.1": { + "cmt_id": "491528935c9c48bf341d8b40eabc6c4fc5df6f2c", + "fixed_version": "6.1.79" + }, + "6.6": { + "cmt_id": "6be99c51829b24c914cef5bff6164877178e84d9", + "fixed_version": "6.6.18" + }, + "6.7": { + "cmt_id": "609c7c1cc976e740d0fed4dbeec688b3ecb5dce2", + "fixed_version": "6.7.6" + } + }, + "CVE-2024-26594": { + "5.15": { + "cmt_id": "dd1de9268745f0eac83a430db7afc32cbd62e84b", + "fixed_version": "5.15.149" + }, + "6.1": { + "cmt_id": "6eb8015492bcc84e40646390e50a862b2c0529c9", + "fixed_version": "6.1.75" + }, + "6.6": { + "cmt_id": "a2b21ef1ea4cf632d19b3a7cc4d4245b8e63202a", + "fixed_version": "6.6.14" + }, + "6.7": { + "cmt_id": "5e6dfec95833edc54c48605a98365a7325e5541e", + "fixed_version": "6.7.2" + } + }, + "CVE-2024-26595": { + "6.6": { + "cmt_id": "817840d125a370626895df269c50c923b79b0a39", + "fixed_version": "6.6.14" + }, + "6.7": { + "cmt_id": "d0a1efe417c97a1e9b914056ee6b86f1ef75fe1f", + "fixed_version": "6.7.2" + } + }, + "CVE-2024-26596": { + "6.7": { + "cmt_id": "dbd909c20c11f0d29c0054d41e0d1f668a60e8c8", + "fixed_version": "6.7.2" + } + }, + "CVE-2024-26597": { + "4.19": { + "cmt_id": "093dab655808207f7a9f54cf156240aeafc70590", + "fixed_version": "4.19.306" + }, + "5.10": { + "cmt_id": "2295c22348faf795e1ccdf618f6eb7afdb2f7447", + "fixed_version": "5.10.209" + }, + "5.15": { + "cmt_id": "3b5254862258b595662a0ccca6e9eeb88d6e7468", + "fixed_version": "5.15.148" + }, + "5.4": { + "cmt_id": "02467ab8b404d80429107588e0f3425cf5fcd2e5", + "fixed_version": "5.4.268" + }, + "6.1": { + "cmt_id": "ee1dc3bf86f2df777038506b139371a9add02534", + "fixed_version": "6.1.75" + }, + "6.6": { + "cmt_id": "c4734535034672f59f2652e1e0058c490da62a5c", + "fixed_version": "6.6.14" + }, + "6.7": { + "cmt_id": "17d06a5c44d8fd2e8e61bac295b09153496f87e1", + "fixed_version": "6.7.2" + } + }, + "CVE-2024-26598": { + "5.10": { + "cmt_id": "ba7be666740847d967822bed15500656b26bc703", + "fixed_version": "5.10.209" }, "5.15": { - "cmt_id": "79c3d81c9ad140957b081c91908d7e2964dc603f", - "fixed_version": "5.15.126" + "cmt_id": "12c2759ab1343c124ed46ba48f27bd1ef5d2dff4", + "fixed_version": "5.15.148" }, "5.4": { - "cmt_id": "1c8262f31fd2d23d1cfd2539715d976c2a99e582", - "fixed_version": "5.4.253" + "cmt_id": "d04acadb6490aa3314f9c9e087691e55de153b88", + "fixed_version": "5.4.269" }, "6.1": { - "cmt_id": "d4d3b53a4c66004e8e864fea744b3a2b86a73b62", - "fixed_version": "6.1.45" + "cmt_id": "dba788e25f05209adf2b0175eb1691dc89fb1ba6", + "fixed_version": "6.1.75" }, - "6.4": { - "cmt_id": "a836184b670f59e24d3a0f7c07115ec6e6ce6900", - "fixed_version": "6.4.10" + "6.6": { + "cmt_id": "65b201bf3e9af1b0254243a5881390eda56f72d1", + "fixed_version": "6.6.14" + }, + "6.7": { + "cmt_id": "dd3956a1b3dd11f46488c928cb890d6937d1ca80", + "fixed_version": "6.7.2" } }, - "CVE-2023-4207": { - "4.14": { - "cmt_id": "530a85ea747965b7c275fa44a364916e0ec2efaa", - "fixed_version": "4.14.326" + "CVE-2024-26599": { + "6.1": { + "cmt_id": "7b85554c7c2aee91171e038e4d5442ffa130b282", + "fixed_version": "6.1.75" + }, + "6.6": { + "cmt_id": "e5f2b4b62977fb6c2efcbc5779e0c9dce18215f7", + "fixed_version": "6.6.14" }, + "6.7": { + "cmt_id": "bae45b7ebb31984b63b13c3519fd724b3ce92123", + "fixed_version": "6.7.2" + } + }, + "CVE-2024-26600": { "4.19": { - "cmt_id": "4f38dc8496d1991e2c055a0068dd98fb48affcc6", - "fixed_version": "4.19.295" + "cmt_id": "486218c11e8d1c8f515a3bdd70d62203609d4b6b", + "fixed_version": "4.19.307" }, "5.10": { - "cmt_id": "a8d478200b104ff356f51e1f63499fe46ba8c9b8", - "fixed_version": "5.10.190" + "cmt_id": "be3b82e4871ba00e9b5d0ede92d396d579d7b3b3", + "fixed_version": "5.10.210" }, "5.15": { - "cmt_id": "9edf7955025a602ab6bcc94d923c436e160a10e3", - "fixed_version": "5.15.126" + "cmt_id": "8cc889b9dea0579726be9520fcc766077890b462", + "fixed_version": "5.15.149" }, "5.4": { - "cmt_id": "83e3d4b0ae373dcba30c68bf28f8d179191a297a", - "fixed_version": "5.4.253" + "cmt_id": "8398d8d735ee93a04fb9e9f490e8cacd737e3bf5", + "fixed_version": "5.4.269" }, "6.1": { - "cmt_id": "7f691439b29be0aae68f83ad5eecfddc11007724", - "fixed_version": "6.1.45" + "cmt_id": "0430bfcd46657d9116a26cd377f112cbc40826a4", + "fixed_version": "6.1.78" }, - "6.4": { - "cmt_id": "7d848d718aeb3b482e177b682dd04e76dd413afb", - "fixed_version": "6.4.10" + "6.6": { + "cmt_id": "14ef61594a5a286ae0d493b8acbf9eac46fd04c4", + "fixed_version": "6.6.17" + }, + "6.7": { + "cmt_id": "396e17af6761b3cc9e6e4ca94b4de7f642bfece1", + "fixed_version": "6.7.5" } }, - "CVE-2023-4208": { - "4.14": { - "cmt_id": "f0f874147a5b00eae875c24281531f8de7900079", - "fixed_version": "4.14.322" + "CVE-2024-26601": { + "5.15": { + "cmt_id": "c1317822e2de80e78f137d3a2d99febab1b80326", + "fixed_version": "5.15.150" + }, + "6.1": { + "cmt_id": "78327acd4cdc4a1601af718b781eece577b6b7d4", + "fixed_version": "6.1.78" + }, + "6.6": { + "cmt_id": "ea42d6cffb0dd27a417f410b9d0011e9859328cb", + "fixed_version": "6.6.17" }, + "6.7": { + "cmt_id": "6b0d48647935e4b8c7b75d1eccb9043fcd4ee581", + "fixed_version": "6.7.5" + } + }, + "CVE-2024-26602": { "4.19": { - "cmt_id": "4aae24015ecd70d824a953e2dc5b0ca2c4769243", - "fixed_version": "4.19.291" + "cmt_id": "3cd139875e9a7688b3fc715264032620812a5fa3", + "fixed_version": "4.19.307" }, "5.10": { - "cmt_id": "b4256c99a7116c9514224847e8aaee2ecf110a0a", - "fixed_version": "5.10.190" + "cmt_id": "db896bbe4a9c67cee377e5f6a743350d3ae4acf6", + "fixed_version": "5.10.210" }, "5.15": { - "cmt_id": "262430dfc618509246e07acd26211cb4cca79ecc", - "fixed_version": "5.15.126" + "cmt_id": "50fb4e17df319bb33be6f14e2a856950c1577dee", + "fixed_version": "5.15.149" }, "5.4": { - "cmt_id": "be785808db32b595728c4042d002c83d0dd4b66f", - "fixed_version": "5.4.253" + "cmt_id": "2441a64070b85c14eecc3728cc87e883f953f265", + "fixed_version": "5.4.269" }, "6.1": { - "cmt_id": "aab2d095ce4dd8d01ca484c0cc641fb497bf74db", - "fixed_version": "6.1.45" + "cmt_id": "24ec7504a08a67247fbe798d1de995208a8c128a", + "fixed_version": "6.1.79" }, - "6.4": { - "cmt_id": "4b717802428fa02cbcbb61209f638f65f9cd4710", - "fixed_version": "6.4.10" + "6.6": { + "cmt_id": "b6a2a9cbb67545c825ec95f06adb7ff300a2ad71", + "fixed_version": "6.6.18" + }, + "6.7": { + "cmt_id": "c5b2063c65d05e79fad8029324581d86cfba7eea", + "fixed_version": "6.7.6" } }, - "CVE-2023-4244": { - "5.10": { - "cmt_id": "4046f2b56e5a7ba7e123ff961dd51187b8d59e78", - "fixed_version": "5.10.198" - }, + "CVE-2024-26603": { "5.15": { - "cmt_id": "6796800f0d8e5a892bceca7c198c115c4ca9d719", - "fixed_version": "5.15.134" + "cmt_id": "8bd3eee7720c14b59a206bd05b98d7586bccf99a", + "fixed_version": "5.15.150" }, "6.1": { - "cmt_id": "41113aa5698ad7a82635bcb747d483e4458d518d", - "fixed_version": "6.1.56" + "cmt_id": "627339cccdc9166792ecf96bc3c9f711a60ce996", + "fixed_version": "6.1.79" }, - "6.4": { - "cmt_id": "3bdf400a1ad166274e85fa537f8a993a4553e36d", - "fixed_version": "6.4.12" + "6.6": { + "cmt_id": "b2479ab426cef7ab79a13005650eff956223ced2", + "fixed_version": "6.6.18" + }, + "6.7": { + "cmt_id": "627e28cbb65564e55008315d9e02fbb90478beda", + "fixed_version": "6.7.6" } }, - "CVE-2023-4273": { + "CVE-2024-26604": { + "6.6": { + "cmt_id": "7f414d306320f837cc3df96cf52161cb8290fb1b", + "fixed_version": "6.6.18" + }, + "6.7": { + "cmt_id": "b746d52ce7bcac325a2fa264216ead85b7fbbfaa", + "fixed_version": "6.7.6" + } + }, + "CVE-2024-26605": { + "6.7": { + "cmt_id": "ef90508574d7af48420bdc5f7b9a4f1cdd26bc70", + "fixed_version": "6.7.5" + } + }, + "CVE-2024-26606": { + "4.19": { + "cmt_id": "dd64bb8329ce0ea27bc557e4160c2688835402ac", + "fixed_version": "4.19.307" + }, "5.10": { - "cmt_id": "381f7df0f3c3bd7dceb3e2b2b64c2f6247e2ac19", - "fixed_version": "5.10.190" + "cmt_id": "a423042052ec2bdbf1e552e621e6a768922363cc", + "fixed_version": "5.10.210" }, "5.15": { - "cmt_id": "6b64974e02ea82d0bae917f1fa79495a1a59b5bf", - "fixed_version": "5.15.128" + "cmt_id": "82722b453dc2f967b172603e389ee7dc1b3137cc", + "fixed_version": "5.15.149" + }, + "5.4": { + "cmt_id": "42beab162dcee1e691ee4934292d51581c29df61", + "fixed_version": "5.4.269" }, "6.1": { - "cmt_id": "c2fdf827f8fc6a571e1b7cc38a61041f0321adf5", - "fixed_version": "6.1.45" + "cmt_id": "90e09c016d72b91e76de25f71c7b93d94cc3c769", + "fixed_version": "6.1.79" }, - "6.4": { - "cmt_id": "e1a73ba43cf883cb37f6331aca5a4c5be6350982", - "fixed_version": "6.4.10" + "6.6": { + "cmt_id": "a7ae586f6f6024f490b8546c8c84670f96bb9b68", + "fixed_version": "6.6.18" + }, + "6.7": { + "cmt_id": "93b372c39c40cbf179e56621e6bc48240943af69", + "fixed_version": "6.7.6" } }, - "CVE-2023-42752": { - "4.14": { - "cmt_id": "afd2657ba7af6d05afd6cc6b9315c091fafed14b", - "fixed_version": "4.14.326" - }, - "4.19": { - "cmt_id": "76ce657a5db97ff4e26b284fedc33e8591a4be17", - "fixed_version": "4.19.295" + "CVE-2024-26607": { + "6.1": { + "cmt_id": "e0f83c234ea7a3dec1f84e5d02caa1c51664a076", + "fixed_version": "6.1.76" }, - "5.10": { - "cmt_id": "1186eaffd87ed9be6f18cbc7145ffdcb1f6982e0", - "fixed_version": "5.10.195" + "6.6": { + "cmt_id": "56f96cf6eb11a1c2d594367c3becbfb06a855ec1", + "fixed_version": "6.6.15" }, + "6.7": { + "cmt_id": "2a4c6af7934a7b4c304542c38fee35e09cc1770c", + "fixed_version": "6.7.3" + } + }, + "CVE-2024-26608": { "5.15": { - "cmt_id": "3e48f741e98a0bd2dc1ad517eec1931ea3accbd7", - "fixed_version": "5.15.132" - }, - "5.4": { - "cmt_id": "3d54e99499307c3e5613a2fe2a5c9b97eef95ff4", - "fixed_version": "5.4.257" + "cmt_id": "aaa1f1a2ee80888c12ae2783f3a0be10e14067c5", + "fixed_version": "5.15.149" }, "6.1": { - "cmt_id": "6678912b4df1bfac6f7c80642d56dc22e23419e4", - "fixed_version": "6.1.53" + "cmt_id": "2c939c74ef0b74e99b92e32edc2a59f9b9ca3d5a", + "fixed_version": "6.1.76" }, - "6.4": { - "cmt_id": "87f07ec534e39e29bc715753df2e77509e8fafc3", - "fixed_version": "6.4.16" + "6.6": { + "cmt_id": "9863a53100f47652755545c2bd43e14a1855104d", + "fixed_version": "6.6.15" }, - "6.5": { - "cmt_id": "3138192865c2a1f089dd27a7d80a7271ecd468e7", - "fixed_version": "6.5.3" + "6.7": { + "cmt_id": "6993328a4cd62a24df254b587c0796a4a1eecc95", + "fixed_version": "6.7.3" } }, - "CVE-2023-42753": { + "CVE-2024-26610": { "5.10": { - "cmt_id": "83091f8ac03f118086596f17c9a52d31d6ca94b3", - "fixed_version": "5.10.195" + "cmt_id": "05dd9facfb9a1e056752c0901c6e86416037d15a", + "fixed_version": "5.10.210" }, "5.15": { - "cmt_id": "a9e6142e5f8f6ac7d1bca45c1b2b13b084ea9e14", - "fixed_version": "5.15.132" + "cmt_id": "99a23462fe1a6f709f0fda3ebbe8b6b193ac75bd", + "fixed_version": "5.15.149" }, - "5.4": { - "cmt_id": "109e830585e89a03d554bf8ad0e668630d0a6260", - "fixed_version": "5.4.257" + "6.1": { + "cmt_id": "aa2cc9363926991ba74411e3aa0a0ea82c1ffe32", + "fixed_version": "6.1.76" + }, + "6.6": { + "cmt_id": "870171899d75d43e3d14360f3a4850e90a9c289b", + "fixed_version": "6.6.15" + }, + "6.7": { + "cmt_id": "f32a81999d0b8e5ce60afb5f6a3dd7241c17dd67", + "fixed_version": "6.7.3" + } + }, + "CVE-2024-26611": { + "6.6": { + "cmt_id": "82ee4781b8200e44669a354140d5c6bd966b8768", + "fixed_version": "6.6.15" }, + "6.7": { + "cmt_id": "5cd781f7216f980207af09c5e0e1bb1eda284540", + "fixed_version": "6.7.3" + } + }, + "CVE-2024-26612": { "6.1": { - "cmt_id": "7ca0706c68adadf86a36b60dca090f5e9481e808", - "fixed_version": "6.1.53" + "cmt_id": "82a9bc343ba019665d3ddc1d9a180bf0e0390cf3", + "fixed_version": "6.1.76" }, - "6.4": { - "cmt_id": "d59b6fc405549f7caf31f6aa5da1d6bef746b166", - "fixed_version": "6.4.16" + "6.6": { + "cmt_id": "1c45256e599061021e2c848952e50f406457e448", + "fixed_version": "6.6.15" }, - "6.5": { - "cmt_id": "d95c8420efe684b964e3aa28108e9a354bcd7225", - "fixed_version": "6.5.3" + "6.7": { + "cmt_id": "4200ad3e46ce50f410fdda302745489441bc70f0", + "fixed_version": "6.7.3" } }, - "CVE-2023-42754": { + "CVE-2024-26614": { "5.10": { - "cmt_id": "8689c9ace976d6c078e6dc844b09598796e84099", - "fixed_version": "5.10.198" + "cmt_id": "bc99dcedd2f422d602516762b96c8ef1ae6b2882", + "fixed_version": "5.10.210" }, "5.15": { - "cmt_id": "8860d354f653628b6330e1c5b06b2828948135a4", - "fixed_version": "5.15.134" - }, - "5.4": { - "cmt_id": "810fd23d9715474aa27997584e8fc9396ef3cb67", - "fixed_version": "5.4.258" + "cmt_id": "d86cc6ab33b085eaef27ea88b78fc8e2375c0ef3", + "fixed_version": "5.15.149" }, "6.1": { - "cmt_id": "2712545e535d7a2e4c53b9c9658a9c88c6055862", - "fixed_version": "6.1.56" + "cmt_id": "b1e0a68a0cd2a83259c444f638b417a8fffc6855", + "fixed_version": "6.1.76" }, - "6.5": { - "cmt_id": "cda20fcddf53f0f959641c8ef4d50ab87ffa5124", - "fixed_version": "6.5.6" + "6.6": { + "cmt_id": "168e7e599860654876c2a1102a82610285c02f02", + "fixed_version": "6.6.15" + }, + "6.7": { + "cmt_id": "3982fe726a63fb3de6005e534e2ac8ca7e0aca2a", + "fixed_version": "6.7.3" } }, - "CVE-2023-42755": { - "4.14": { - "cmt_id": "a048f77ba9cf7f77a06b2ee60446c6cc061c2daf", - "fixed_version": "4.14.326" - }, + "CVE-2024-26615": { "4.19": { - "cmt_id": "6ca0ea6a46e7a2d70fb1b1f6a886efe2b2365e16", - "fixed_version": "4.19.295" + "cmt_id": "27aea64838914c6122db5b8bd4bed865c9736f22", + "fixed_version": "4.19.307" }, "5.10": { - "cmt_id": "8db844077ec9912d75952c80d76da71fc2412852", - "fixed_version": "5.10.197" + "cmt_id": "5fed92ca32eafbfae8b6bee8ca34cca71c6a8b6d", + "fixed_version": "5.10.210" }, "5.15": { - "cmt_id": "08569c92f7f339de21b7a68d43d6795fc0aa24f2", - "fixed_version": "5.15.133" + "cmt_id": "68b888d51ac82f2b96bf5e077a31d76afcdef25a", + "fixed_version": "5.15.149" }, "5.4": { - "cmt_id": "42900fd140c8db99141b9f083bfe8de887190ed9", - "fixed_version": "5.4.257" + "cmt_id": "1fea9969b81c67d0cb1611d1b8b7d19049d937be", + "fixed_version": "5.4.269" }, "6.1": { - "cmt_id": "b93aeb6352b0229e3c5ca5ca4ff015b015aff33c", - "fixed_version": "6.1.55" + "cmt_id": "6994dba06321e3c48fdad0ba796a063d9d82183a", + "fixed_version": "6.1.76" + }, + "6.6": { + "cmt_id": "a164c2922675d7051805cdaf2b07daffe44f20d9", + "fixed_version": "6.6.15" + }, + "6.7": { + "cmt_id": "8f3f9186e5bb96a9c9654c41653210e3ea7e48a6", + "fixed_version": "6.7.3" } }, - "CVE-2023-42756": { - "6.5": { - "cmt_id": "20a93d402b6fe6757e14b0eeb400dfac8b8aa3ad", - "fixed_version": "6.5.6" + "CVE-2024-26616": { + "6.6": { + "cmt_id": "642b9c520ef2f104277ad1f902f8526edbe087fb", + "fixed_version": "6.6.15" + }, + "6.7": { + "cmt_id": "34de0f04684ec00c093a0455648be055f0e8e24f", + "fixed_version": "6.7.3" } }, - "CVE-2023-4385": { - "4.14": { - "cmt_id": "070ddf59cf17faf6aae7d89f78e0510c94d07940", - "fixed_version": "4.14.283" + "CVE-2024-26617": { + "6.7": { + "cmt_id": "05509adf297924f51e1493aa86f9fcde1433ed80", + "fixed_version": "6.7.3" + } + }, + "CVE-2024-26618": { + "6.6": { + "cmt_id": "569156e4fa347237f8fa2a7e935d860109c55ac4", + "fixed_version": "6.6.15" }, - "4.19": { - "cmt_id": "c381558c278a540c61dfef1f2b77ab817d5d302d", - "fixed_version": "4.19.247" + "6.7": { + "cmt_id": "814af6b4e6000e574e74d92197190edf07cc3680", + "fixed_version": "6.7.3" + } + }, + "CVE-2024-26619": { + "6.7": { + "cmt_id": "2fa79badf4bfeffda6b5032cf62b828486ec9a99", + "fixed_version": "6.7.3" + } + }, + "CVE-2024-26620": { + "6.1": { + "cmt_id": "d6b8d034b576f406af920a7bee81606c027b24c6", + "fixed_version": "6.1.76" }, - "4.9": { - "cmt_id": "6c4ad94011e20f4134b0606d9b68d5db564828e1", - "fixed_version": "4.9.318" + "6.6": { + "cmt_id": "c69d821197611678533fb3eb784fc823b921349a", + "fixed_version": "6.6.15" }, + "6.7": { + "cmt_id": "cdd134d56138302976685e6c7bc4755450b3880e", + "fixed_version": "6.7.3" + } + }, + "CVE-2024-26621": { + "6.7": { + "cmt_id": "7432376c913381c5f24d373a87ff629bbde94b47", + "fixed_version": "6.7.6" + } + }, + "CVE-2024-26622": { "5.10": { - "cmt_id": "9dfa8d087bb854f613fcdbf1af4fb02c0b2d1e4f", - "fixed_version": "5.10.121" + "cmt_id": "a23ac1788e2c828c097119e9a3178f0b7e503fee", + "fixed_version": "5.10.212" }, "5.15": { - "cmt_id": "4b9380d92c66cdc66987f65130789abad5c1af6f", - "fixed_version": "5.15.46" + "cmt_id": "7d930a4da17958f869ef679ee0e4a8729337affc", + "fixed_version": "5.15.151" }, - "5.17": { - "cmt_id": "b6267c8bf885d1ccdedd08d40cfec9598e2fe582", - "fixed_version": "5.17.14" + "6.1": { + "cmt_id": "3bfe04c1273d30b866f4c7c238331ed3b08e5824", + "fixed_version": "6.1.81" }, - "5.18": { - "cmt_id": "9d3fec8ab6e1f5c36078a4d0432b663c1c4c0e74", - "fixed_version": "5.18.3" + "6.6": { + "cmt_id": "2caa605079488da9601099fbda460cfc1702839f", + "fixed_version": "6.6.21" }, - "5.4": { - "cmt_id": "e54fd01178ebd5b13ef9e2fc0f3006765f37ee3c", - "fixed_version": "5.4.198" + "6.7": { + "cmt_id": "6edefe1b6c29a9932f558a898968a9fcbeec5711", + "fixed_version": "6.7.9" } }, - "CVE-2023-4387": { - "4.14": { - "cmt_id": "2bee202d0649cb53b9860fe15d0642167bffd6bf", - "fixed_version": "4.14.281" + "CVE-2024-26623": { + "6.6": { + "cmt_id": "22cd6046eb2148b18990257505834dd45c672a1b", + "fixed_version": "6.6.16" }, + "6.7": { + "cmt_id": "5939feb63ea1f011027576c64b68b681cbad31ca", + "fixed_version": "6.7.4" + } + }, + "CVE-2024-26625": { "4.19": { - "cmt_id": "3adaaf3472e8ea410cb1330e5dd8372b0483dc78", - "fixed_version": "4.19.245" - }, - "4.9": { - "cmt_id": "aae66daa4a8925109c87702979e767346291d1e2", - "fixed_version": "4.9.316" + "cmt_id": "6b950c712a9a05cdda4aea7fcb2848766576c11b", + "fixed_version": "4.19.307" }, "5.10": { - "cmt_id": "a54d86cf418427584e0a3cd1e89f757c92df5e89", - "fixed_version": "5.10.118" + "cmt_id": "d0b5b1f12429df3cd9751ab8b2f53729b77733b7", + "fixed_version": "5.10.210" }, "5.15": { - "cmt_id": "4ad09fdef55b70f16f8d385981b864ac75cf1354", - "fixed_version": "5.15.42" + "cmt_id": "dbc1b89981f9c5360277071d33d7f04a43ffda4a", + "fixed_version": "5.15.149" }, - "5.17": { - "cmt_id": "54f87f3478097fe5b7e473738b787a24cbc2061e", - "fixed_version": "5.17.10" + "5.4": { + "cmt_id": "64babb17e8150771c58575d8f93a35c5296b499f", + "fixed_version": "5.4.269" }, - "5.18": { - "cmt_id": "9e7fef9521e73ca8afd7da9e58c14654b02dfad8", - "fixed_version": "5.18" + "6.1": { + "cmt_id": "9c333d9891f34cea8af1b229dc754552304c8eee", + "fixed_version": "6.1.77" }, - "5.4": { - "cmt_id": "32f779e6fbbe0c0860a00777b7e3dee6b5ec0c1c", - "fixed_version": "5.4.196" + "6.6": { + "cmt_id": "3151051b787f7cd7e3329ea0016eb9113c248812", + "fixed_version": "6.6.16" + }, + "6.7": { + "cmt_id": "8e51f084b5716653f19e291ed5f026791d4b3ed4", + "fixed_version": "6.7.4" } }, - "CVE-2023-4389": { + "CVE-2024-26627": { "5.10": { - "cmt_id": "1d2eda18f6ffbd9902594469c6e1a055014eb2ac", - "fixed_version": "5.10.112" + "cmt_id": "f5944853f7a961fedc1227dc8f60393f8936d37c", + "fixed_version": "5.10.210" }, "5.15": { - "cmt_id": "252db93fd0bd5ca07c9b933ed94e93a4a43e8901", - "fixed_version": "5.15.35" + "cmt_id": "d37c1c81419fdef66ebd0747cf76fb8b7d979059", + "fixed_version": "5.15.149" }, - "5.17": { - "cmt_id": "0850b7bdcea69d330a4a9b9b290af073ff32c63c", - "fixed_version": "5.17.4" + "6.1": { + "cmt_id": "db6338f45971b4285ea368432a84033690eaf53c", + "fixed_version": "6.1.77" + }, + "6.6": { + "cmt_id": "65ead8468c21c2676d4d06f50b46beffdea69df1", + "fixed_version": "6.6.16" + }, + "6.7": { + "cmt_id": "07e3ca0f17f579491b5f54e9ed05173d6c1d6fcb", + "fixed_version": "6.7.4" } }, - "CVE-2023-4394": { - "5.19": { - "cmt_id": "4b124ad87244cd7f0883c5eaa38d2326b2154cad", - "fixed_version": "5.19.6" + "CVE-2024-26629": { + "6.1": { + "cmt_id": "e4cf8941664cae2f89f0189c29fe2ce8c6be0d03", + "fixed_version": "6.1.79" + }, + "6.6": { + "cmt_id": "b7d2eee1f53899b53f069bba3a59a419fc3d331b", + "fixed_version": "6.6.15" + }, + "6.7": { + "cmt_id": "8f5b860de87039b007e84a28a5eefc888154e098", + "fixed_version": "6.7.3" } }, - "CVE-2023-44466": { + "CVE-2024-26630": { + "6.6": { + "cmt_id": "ba60fdf75e89ea762bb617be578dc47f27655117", + "fixed_version": "6.6.21" + }, + "6.7": { + "cmt_id": "fe7e008e0ce728252e4ec652cceebcc62211657c", + "fixed_version": "6.7.9" + } + }, + "CVE-2024-26631": { "5.15": { - "cmt_id": "db8ca8d9b4dfce6d8cded796f0e671ef2c782613", - "fixed_version": "5.15.121" + "cmt_id": "62b3387beef11738eb6ce667601a28fa089fa02c", + "fixed_version": "5.15.148" }, "6.1": { - "cmt_id": "183c0ae4fafcdcb95c06f40c0c35a39d89c1aa2d", - "fixed_version": "6.1.40" + "cmt_id": "380540bb06bb1d1b12bdc947d1b8f56cda6b5663", + "fixed_version": "6.1.75" }, - "6.4": { - "cmt_id": "0a6db56467773851e4ea4d652308314d8f9c4f91", - "fixed_version": "6.4.5" + "6.6": { + "cmt_id": "3cc283fd16fba72e2cefe3a6f48d7a36b0438900", + "fixed_version": "6.6.14" + }, + "6.7": { + "cmt_id": "3bb5849675ae1d592929798a2b37ea450879c855", + "fixed_version": "6.7.2" } }, - "CVE-2023-4459": { - "4.14": { - "cmt_id": "5fd9a74bf04a1eae5dbde8ca8585106d4410427f", - "fixed_version": "4.14.281" + "CVE-2024-26632": { + "6.1": { + "cmt_id": "c6350b5cb78e9024c49eaee6fdb914ad2903a5fe", + "fixed_version": "6.1.75" }, - "4.19": { - "cmt_id": "248a37ffd81c7121d30702d8caa31db48450680d", - "fixed_version": "4.19.245" + "6.6": { + "cmt_id": "a6bd8182137a12d22d3f2cee463271bdcb491659", + "fixed_version": "6.6.14" }, - "4.9": { - "cmt_id": "e40ed72f8c8b04ae629d895ed7eb221d8938cdd7", - "fixed_version": "4.9.316" + "6.7": { + "cmt_id": "ca3ede3f5893e2d26d4dbdef1eec28a8487fafde", + "fixed_version": "6.7.2" + } + }, + "CVE-2024-26633": { + "4.19": { + "cmt_id": "135414f300c5db995e2a2f3bf0f455de9d014aee", + "fixed_version": "4.19.306" }, "5.10": { - "cmt_id": "6e2caee5cddc3d9e0ad0484c9c21b9f10676c044", - "fixed_version": "5.10.118" + "cmt_id": "da23bd709b46168f7dfc36055801011222b076cd", + "fixed_version": "5.10.209" }, "5.15": { - "cmt_id": "e35387a91318ccdec4a30b58d967391e011e34fa", - "fixed_version": "5.15.42" - }, - "5.17": { - "cmt_id": "8d20af6cdd1639c1e14346d4cb1d7b1d19fee34b", - "fixed_version": "5.17.10" - }, - "5.18": { - "cmt_id": "edf410cb74dc612fd47ef5be319c5a0bcd6e6ccd", - "fixed_version": "5.18" + "cmt_id": "4329426cf6b8e22b798db2331c7ef1dd2a9c748d", + "fixed_version": "5.15.148" }, "5.4": { - "cmt_id": "dc64e8874e87dc1c1c723a1c6da7efc3305c18da", - "fixed_version": "5.4.196" - } - }, - "CVE-2023-4563": { - "5.10": { - "cmt_id": "b15ea4017af82011dd55225ce77cce3d4dfc169c", - "fixed_version": "5.10.198" - }, - "5.15": { - "cmt_id": "7c7e658a36f8b1522bd3586d8137e5f93a25ddc5", - "fixed_version": "5.15.134" + "cmt_id": "3f15ba3dc14e6ee002ea01b4faddc3d49200377c", + "fixed_version": "5.4.268" }, "6.1": { - "cmt_id": "59dab3bf0b8fc08eb802721c0532f13dd89209b8", - "fixed_version": "6.1.56" + "cmt_id": "62a1fedeb14c7ac0947ef33fadbabd35ed2400a2", + "fixed_version": "6.1.75" }, - "6.4": { - "cmt_id": "bd156ce9553dcaf2d6ee2c825d1a5a1718e86524", - "fixed_version": "6.4.11" + "6.6": { + "cmt_id": "687c5d52fe53e602e76826dbd4d7af412747e183", + "fixed_version": "6.6.14" + }, + "6.7": { + "cmt_id": "ba8d904c274268b18ef3dc11d3ca7b24a96cb087", + "fixed_version": "6.7.2" } }, - "CVE-2023-4569": { - "5.15": { - "cmt_id": "1adaec4758d1cefbf348a291ad9b752aaa10f8d3", - "fixed_version": "5.15.128" - }, - "6.1": { - "cmt_id": "00ea7eb1c69eec91cdf9259f0e427c56e7999fcd", - "fixed_version": "6.1.47" + "CVE-2024-26634": { + "6.6": { + "cmt_id": "e855dded4b70d1975ee7b9fed0c700391e3c8ea6", + "fixed_version": "6.6.15" }, - "6.4": { - "cmt_id": "83ff16e449a675e215125d97a2c4a7f097d291d0", - "fixed_version": "6.4.12" + "6.7": { + "cmt_id": "8072699aa9e67d1727692cfb3c347263bb627fb9", + "fixed_version": "6.7.3" } }, - "CVE-2023-45862": { - "4.14": { - "cmt_id": "26f31c6e1389c23a1b822a61c59d5d1f357cb478", - "fixed_version": "4.14.308" - }, + "CVE-2024-26635": { "4.19": { - "cmt_id": "cef5e33d8b893891817236db819982f87943e8fd", - "fixed_version": "4.19.276" + "cmt_id": "165ad1e22779685c3ed3dd349c6c4c632309cc62", + "fixed_version": "4.19.307" }, "5.10": { - "cmt_id": "961f93d63da72f5fcaa6793fb2dcbc995c119a8e", - "fixed_version": "5.10.173" + "cmt_id": "9ccdef19cf9497c2803b005369668feb91cacdfd", + "fixed_version": "5.10.210" }, "5.15": { - "cmt_id": "7e902b949600c51c94d06b137f874126a27e6557", - "fixed_version": "5.15.100" + "cmt_id": "c0fe2fe7a5a291dfcf6dc64301732c8d3dc6a828", + "fixed_version": "5.15.149" }, "5.4": { - "cmt_id": "da4e715a466ca982d4584da21ea385f28ca79ce6", - "fixed_version": "5.4.235" + "cmt_id": "b8e8838f82f332ae80c643dbb1ca4418d0628097", + "fixed_version": "5.4.269" }, "6.1": { - "cmt_id": "ff542083b105c9c72d83899d3f74eeec354f808e", - "fixed_version": "6.1.18" + "cmt_id": "660c3053d992b68fee893a0e9ec9159228cffdc6", + "fixed_version": "6.1.76" }, - "6.2": { - "cmt_id": "5ee39d2216dc98a894ffc38d15e1ef2d41e2266b", - "fixed_version": "6.2.5" + "6.6": { + "cmt_id": "f1f34a515fb1e25e85dee94f781e7869ae351fb8", + "fixed_version": "6.6.15" + }, + "6.7": { + "cmt_id": "df57fc2f2abf548aa889a36ab0bdcc94a75399dc", + "fixed_version": "6.7.3" } }, - "CVE-2023-45863": { - "4.14": { - "cmt_id": "b43cf5ad5241d6f33a02c93271a282d5ed6c4cce", - "fixed_version": "4.14.329" - }, + "CVE-2024-26636": { "4.19": { - "cmt_id": "0af6c6c15681cf80aeb85fcb3a1928c63aa89deb", - "fixed_version": "4.19.298" + "cmt_id": "84e9d10419f6f4f3f3cd8f9aaf44a48719aa4b1b", + "fixed_version": "4.19.307" }, "5.10": { - "cmt_id": "b2e62728b106fe54f8618c21a252df7d4a4cc775", - "fixed_version": "5.10.200" + "cmt_id": "04f2a74b562f3a7498be0399309669f342793d8c", + "fixed_version": "5.10.210" }, "5.15": { - "cmt_id": "89a0079049f5568268d75c8cdf28bec0e2553e23", - "fixed_version": "5.15.99" + "cmt_id": "c22044270da68881074fda81a7d34812726cb249", + "fixed_version": "5.15.149" }, "5.4": { - "cmt_id": "5776aeee2a604ccc03e8269713624f9c8fd318e0", - "fixed_version": "5.4.260" + "cmt_id": "b643d0defcbacd7fe548bc65c3e4e6f17dc5eb2d", + "fixed_version": "5.4.269" }, "6.1": { - "cmt_id": "fe4dd80d58ec5633daf5d50671d1341f738508bf", - "fixed_version": "6.1.16" + "cmt_id": "6d53b813ff8b177f86f149c2f744442681f720e4", + "fixed_version": "6.1.76" }, - "6.2": { - "cmt_id": "e6ca1549afb2b495e61a8fb53ae942193ef823e0", - "fixed_version": "6.2.3" + "6.6": { + "cmt_id": "cafd3ad3fe03ef4d6632747be9ee15dc0029db4b", + "fixed_version": "6.6.15" + }, + "6.7": { + "cmt_id": "c451c008f563d56d5e676c9dcafae565fcad84bb", + "fixed_version": "6.7.3" } }, - "CVE-2023-45871": { - "4.14": { - "cmt_id": "017d5c8eef06178e4148db273df03b7ad9eeb5bc", - "fixed_version": "4.14.326" + "CVE-2024-26637": { + "6.7": { + "cmt_id": "aa74ce30a8a40d19a4256de4ae5322e71344a274", + "fixed_version": "6.7.3" + } + }, + "CVE-2024-26638": { + "6.1": { + "cmt_id": "d9c54763e5cdbbd3f81868597fe8aca3c96e6387", + "fixed_version": "6.1.76" }, - "4.19": { - "cmt_id": "981d0bc43e8d5482294432677e80a1d15f4b790d", - "fixed_version": "4.19.295" + "6.6": { + "cmt_id": "1960f2b534da1e6c65fb96f9e98bda773495f406", + "fixed_version": "6.6.15" }, + "6.7": { + "cmt_id": "b0028f333420a65a53a63978522db680b37379dd", + "fixed_version": "6.7.3" + } + }, + "CVE-2024-26640": { "5.10": { - "cmt_id": "3e39008e9e3043663324f0920a5d6ebfa68cc92a", - "fixed_version": "5.10.195" + "cmt_id": "f48bf9a83b1666d934247cb58a9887d7b3127b6f", + "fixed_version": "5.10.210" }, "5.15": { - "cmt_id": "be7353af5b35c8f4a11573a38b997f74f8c2ae4b", - "fixed_version": "5.15.132" - }, - "5.4": { - "cmt_id": "c2ad60ed38b872aa971408b8b8eaad7a91501b37", - "fixed_version": "5.4.257" + "cmt_id": "718f446e60316bf606946f7f42367d691d21541e", + "fixed_version": "5.15.149" }, "6.1": { - "cmt_id": "d2e906c725979c39ebf120a189e521ceae787d26", - "fixed_version": "6.1.53" + "cmt_id": "b383d4ea272fe5795877506dcce5aad1f6330e5e", + "fixed_version": "6.1.77" }, - "6.4": { - "cmt_id": "6a9abbccaac418e965f42e8a8f6dd826e341a6f9", - "fixed_version": "6.4.16" + "6.6": { + "cmt_id": "d15cc0f66884ef2bed28c7ccbb11c102aa3a0760", + "fixed_version": "6.6.16" }, - "6.5": { - "cmt_id": "dad92377fc6e012e481c6f4a75e32e48fe2777db", - "fixed_version": "6.5.3" + "6.7": { + "cmt_id": "1b8adcc0e2c584fec778add7777fe28e20781e60", + "fixed_version": "6.7.4" } }, - "CVE-2023-45898": { - "6.5": { - "cmt_id": "c15bf3330a9e3c01b23e59899a6a02432a62ddc3", - "fixed_version": "6.5.4" + "CVE-2024-26641": { + "5.10": { + "cmt_id": "a9bc32879a08f23cdb80a48c738017e39aea1080", + "fixed_version": "5.10.210" + }, + "5.15": { + "cmt_id": "af6b5c50d47ab43e5272ad61935d0ed2e264d3f0", + "fixed_version": "5.15.149" + }, + "6.1": { + "cmt_id": "d54e4da98bbfa8c257bdca94c49652d81d18a4d8", + "fixed_version": "6.1.77" + }, + "6.6": { + "cmt_id": "350a6640fac4b53564ec20aa3f4a0922cb0ba5e6", + "fixed_version": "6.6.16" + }, + "6.7": { + "cmt_id": "c835df3bcc14858ae9b27315dd7de76370b94f3a", + "fixed_version": "6.7.4" } }, - "CVE-2023-4610": { - "6.4": { - "cmt_id": "71c3ad65fabec9620d3f548b2da948c79c7ad9d5", - "fixed_version": "6.4" + "CVE-2024-26642": { + "6.1": { + "cmt_id": "72c1efe3f247a581667b7d368fff3bd9a03cd57a", + "fixed_version": "6.1.84" + }, + "6.6": { + "cmt_id": "c0c2176d1814b92ea4c8e7eb7c9cd94cd99c1b12", + "fixed_version": "6.6.24" + }, + "6.7": { + "cmt_id": "8e07c16695583a66e81f67ce4c46e94dece47ba7", + "fixed_version": "6.7.12" } }, - "CVE-2023-4611": { - "6.4": { - "cmt_id": "e872d6b6ea4947fb87f0d6ea1ef814019dbed89e", - "fixed_version": "6.4.8" + "CVE-2024-26643": { + "6.6": { + "cmt_id": "b2d6f9a5b1cf968f1eaa71085ceeb09c2cb276b1", + "fixed_version": "6.6.24" + }, + "6.7": { + "cmt_id": "5224afbc30c3ca9ba23e752f0f138729b2c48dd8", + "fixed_version": "6.7.12" } }, - "CVE-2023-4623": { - "4.14": { - "cmt_id": "3c0bd0b79733b7f628af1c967269db339eeef8d3", - "fixed_version": "4.14.327" - }, - "4.19": { - "cmt_id": "7c62e0c3c6e9c9c15ead63339db6a0e158d22a66", - "fixed_version": "4.19.295" - }, + "CVE-2024-26644": { "5.10": { - "cmt_id": "b08cc6c0396fd5cfaac4ca044f2282367347c062", - "fixed_version": "5.10.195" + "cmt_id": "2bdf872bcfe629a6202ffd6641615a8ed00e8464", + "fixed_version": "5.10.210" }, "5.15": { - "cmt_id": "4cf994d3f4ff42d604fae2b461bdd5195a7dfabd", - "fixed_version": "5.15.132" - }, - "5.4": { - "cmt_id": "da13749d5ff70bb033a8f35da32cfd6e88246b2f", - "fixed_version": "5.4.257" + "cmt_id": "0877497dc97834728e1b528ddf1e1c484292c29c", + "fixed_version": "5.15.149" }, "6.1": { - "cmt_id": "a1e820fc7808e42b990d224f40e9b4895503ac40", - "fixed_version": "6.1.53" + "cmt_id": "6e6bca99e8d88d989a7cde4c064abea552d5219b", + "fixed_version": "6.1.76" }, - "6.4": { - "cmt_id": "5293f466d41d6c2eaad8b833576ea3dbee630dc2", - "fixed_version": "6.4.16" + "6.6": { + "cmt_id": "ec794a7528199e1be6d47bec03f4755aa75df256", + "fixed_version": "6.6.15" }, - "6.5": { - "cmt_id": "eb07894c51c7d6bb8d00948a3e6e7b52c791e93e", - "fixed_version": "6.5.3" + "6.7": { + "cmt_id": "d8680b722f0ff6d7a01ddacc1844e0d52354d6ff", + "fixed_version": "6.7.3" } }, - "CVE-2023-46343": { - "4.14": { - "cmt_id": "2b2edf089df3a69f0072c6e71563394c5a94e62e", - "fixed_version": "4.14.328" - }, + "CVE-2024-26645": { "4.19": { - "cmt_id": "5622592f8f74ae3e594379af02e64ea84772d0dd", - "fixed_version": "4.19.297" + "cmt_id": "5022b331c041e8c54b9a6a3251579bd1e8c0fc0b", + "fixed_version": "4.19.307" }, "5.10": { - "cmt_id": "c95fa5b20fe03609e0894656fa43c18045b5097e", - "fixed_version": "5.10.199" + "cmt_id": "ef70dfa0b1e5084f32635156c9a5c795352ad860", + "fixed_version": "5.10.210" }, "5.15": { - "cmt_id": "ffdc881f68073ff86bf21afb9bb954812e8278be", - "fixed_version": "5.15.137" + "cmt_id": "aef1cb00856ccfd614467cfb50b791278992e177", + "fixed_version": "5.15.149" }, "5.4": { - "cmt_id": "76050b0cc5a72e0c7493287b7e18e1cb9e3c4612", - "fixed_version": "5.4.259" + "cmt_id": "dad9b28f675ed99b4dec261db2a397efeb80b74c", + "fixed_version": "5.4.269" }, "6.1": { - "cmt_id": "d7dbdbe3800a908eecd4975c31be47dd45e2104a", - "fixed_version": "6.1.60" + "cmt_id": "f4f7e696db0274ff560482cc52eddbf0551d4b7a", + "fixed_version": "6.1.76" }, - "6.5": { - "cmt_id": "bb6cacc439ddd2cd51227ab193f4f91cfc7f014f", - "fixed_version": "6.5.9" + "6.6": { + "cmt_id": "a1eebe76e187dbe11ca299f8dbb6e45d5b1889e7", + "fixed_version": "6.6.15" + }, + "6.7": { + "cmt_id": "bf4aeff7da85c3becd39fb73bac94122331c30fb", + "fixed_version": "6.7.3" } }, - "CVE-2023-46813": { - "5.10": { - "cmt_id": "6550cbe25de182f6c0176909a90b324cb375133f", - "fixed_version": "5.10.199" + "CVE-2024-26646": { + "6.1": { + "cmt_id": "28f010dc50df0f7987c04112114fcfa7e0803566", + "fixed_version": "6.1.76" }, - "5.15": { - "cmt_id": "582f7993353c7b116651f88385b1785dffa14c5d", - "fixed_version": "5.15.137" + "6.6": { + "cmt_id": "019ccc66d56a696a4dfee3bfa2f04d0a7c3d89ee", + "fixed_version": "6.6.15" + }, + "6.7": { + "cmt_id": "c9d6d63b6c03afaa6f185df249af693a7939577c", + "fixed_version": "6.7.3" + } + }, + "CVE-2024-26647": { + "6.6": { + "cmt_id": "6aa5ede6665122f4c8abce3c6eba06b49e54d25c", + "fixed_version": "6.6.15" + }, + "6.7": { + "cmt_id": "cf656fc7276e5b3709a81bc9d9639459be2b2647", + "fixed_version": "6.7.3" + } + }, + "CVE-2024-26648": { + "6.6": { + "cmt_id": "22ae604aea14756954e1c00ae653e34d2afd2935", + "fixed_version": "6.6.15" + }, + "6.7": { + "cmt_id": "c02d257c654191ecda1dc1af6875d527e85310e7", + "fixed_version": "6.7.3" + } + }, + "CVE-2024-26649": { + "6.6": { + "cmt_id": "8b5bacce2d13dbe648f0bfd3f738ecce8db4978c", + "fixed_version": "6.6.15" }, + "6.7": { + "cmt_id": "d3887448486caeef9687fb5dfebd4ff91e0f25aa", + "fixed_version": "6.7.3" + } + }, + "CVE-2024-26650": { "6.1": { - "cmt_id": "57d0639f60f1ff04cbe7fd52823b94b894d7f812", - "fixed_version": "6.1.60" + "cmt_id": "2841631a03652f32b595c563695d0461072e0de4", + "fixed_version": "6.1.76" }, - "6.5": { - "cmt_id": "11b975cb82cc6d88e8b04f77a673077ac5c30c8b", - "fixed_version": "6.5.9" + "6.6": { + "cmt_id": "847e1eb30e269a094da046c08273abe3f3361cf2", + "fixed_version": "6.6.15" + }, + "6.7": { + "cmt_id": "d281ac9a987c553d93211b90fd4fe97d8eca32cd", + "fixed_version": "6.7.3" } }, - "CVE-2023-46838": { + "CVE-2024-26651": { "4.19": { - "cmt_id": "5bb8270789c88c0e4ad78c0de2f274f2275c7f6c", - "fixed_version": "4.19.306" + "cmt_id": "424eba06ed405d557077339edb19ce0ebe39e7c7", + "fixed_version": "4.19.311" }, "5.10": { - "cmt_id": "cce8ba6fa4ec43ad778d64823a2f8ca120d362c1", - "fixed_version": "5.10.209" + "cmt_id": "6b4a39acafaf0186ed8e97c16e0aa6fca0e52009", + "fixed_version": "5.10.214" }, "5.15": { - "cmt_id": "e03023fcdb5e959d4252b3a38e1b27afb6c1c23c", - "fixed_version": "5.15.148" + "cmt_id": "276873ae26c8d75b00747c1dadb9561d6ef20581", + "fixed_version": "5.15.153" }, "5.4": { - "cmt_id": "4404c2b832cf0a842b6e3c63fb5749e97dc618ea", - "fixed_version": "5.4.268" + "cmt_id": "8a8b6a24684bc278036c3f159f7b3a31ad89546a", + "fixed_version": "5.4.273" }, "6.1": { - "cmt_id": "437360133cbd1e9fb88b122e84fff0df08f18e23", - "fixed_version": "6.1.75" + "cmt_id": "9c402819620a842cbfe39359a3ddfaac9adc8384", + "fixed_version": "6.1.83" }, "6.6": { - "cmt_id": "78376d4415602d97773f20b49f4aa5fc8666f7a9", - "fixed_version": "6.6.14" + "cmt_id": "e39a3a14eafcf17f03c037290b78c8f483529028", + "fixed_version": "6.6.23" }, "6.7": { - "cmt_id": "0179c6b07f7ed2f3ea7309596169e15a59e7ee0e", - "fixed_version": "6.7.2" + "cmt_id": "efba65777f98457773c5b65e3135c6132d3b015f", + "fixed_version": "6.7.11" } }, - "CVE-2023-46862": { - "5.10": { - "cmt_id": "c6e8af2a8a63e0957284c16003c501e4a058e8d9", - "fixed_version": "5.10.202" - }, - "5.15": { - "cmt_id": "3d7912710e5e187217313fea5c145881cfeaf952", - "fixed_version": "5.15.140" - }, - "6.1": { - "cmt_id": "9236d2ea6465b37c0a73d994c1ad31753d31e5f5", - "fixed_version": "6.1.61" + "CVE-2024-26652": { + "6.6": { + "cmt_id": "995f802abff209514ac2ee03b96224237646cec3", + "fixed_version": "6.6.22" }, - "6.5": { - "cmt_id": "56e08ccc969796168f0e6adf6642f8546f54ba6f", - "fixed_version": "6.5.10" + "6.7": { + "cmt_id": "ffda0e962f270b3ec937660afd15b685263232d3", + "fixed_version": "6.7.10" + } + }, + "CVE-2024-26653": { + "6.7": { + "cmt_id": "420babea4f1881a7c4ea22a8e218b8c6895d3f21", + "fixed_version": "6.7.12" + } + }, + "CVE-2024-26654": { + "6.1": { + "cmt_id": "9d66ae0e7bb78b54e1e0525456c6b54e1d132046", + "fixed_version": "6.1.84" }, "6.6": { - "cmt_id": "7644b1a1c9a7ae8ab99175989bfc8676055edb46", - "fixed_version": "6.6" + "cmt_id": "61d4787692c1fccdc268ffa7a891f9c149f50901", + "fixed_version": "6.6.24" + }, + "6.7": { + "cmt_id": "e955e8a7f38a856fc6534ba4e6bffd4d5cc80ac3", + "fixed_version": "6.7.12" } }, - "CVE-2023-4732": { - "5.10": { - "cmt_id": "9e1cf2d1ed37c934c9935f2c0b2f8b15d9355654", - "fixed_version": "5.10.53" + "CVE-2024-26655": { + "6.7": { + "cmt_id": "a88649b49523e8cbe95254440d803e38c19d2341", + "fixed_version": "6.7.12" + } + }, + "CVE-2024-26656": { + "6.6": { + "cmt_id": "e87e08c94c9541b4e18c4c13f2f605935f512605", + "fixed_version": "6.6.24" }, - "5.13": { - "cmt_id": "ac17145560031d7e1684c49039ad43a2aaf76343", - "fixed_version": "5.13.5" + "6.7": { + "cmt_id": "af054a5fb24a144f99895afce9519d709891894c", + "fixed_version": "6.7.12" } }, - "CVE-2023-4881": { + "CVE-2024-26657": { + "6.7": { + "cmt_id": "74cd204c7afe498aa9dcc3ebf0ecac53d477a429", + "fixed_version": "6.7.12" + } + }, + "CVE-2024-26658": { + "6.7": { + "cmt_id": "5b41d3fd04c6757b9c2a60a0c5b2609cae9999df", + "fixed_version": "6.7.5" + } + }, + "CVE-2024-26659": { "5.10": { - "cmt_id": "a7d86a77c33ba1c357a7504341172cc1507f0698", - "fixed_version": "5.10.198" + "cmt_id": "696e4112e5c1ee61996198f0ebb6ca3fab55166e", + "fixed_version": "5.10.213" }, "5.15": { - "cmt_id": "1ad7b189cc1411048434e8595ffcbe7873b71082", - "fixed_version": "5.15.132" + "cmt_id": "2aa7bcfdbb46241c701811bbc0d64d7884e3346c", + "fixed_version": "5.15.152" }, "6.1": { - "cmt_id": "d9ebfc0f21377690837ebbd119e679243e0099cc", - "fixed_version": "6.1.54" + "cmt_id": "2e3ec80ea7ba58bbb210e83b5a0afefee7c171d3", + "fixed_version": "6.1.82" }, - "6.5": { - "cmt_id": "c8f292322ff16b9a2272a67de396c09a50e09dce", - "fixed_version": "6.5.4" + "6.6": { + "cmt_id": "f5e7ffa9269a448a720e21f1ed1384d118298c97", + "fixed_version": "6.6.17" + }, + "6.7": { + "cmt_id": "418456c0ce56209610523f21734c5612ee634134", + "fixed_version": "6.7.5" } }, - "CVE-2023-4921": { - "4.14": { - "cmt_id": "d9f43fc5a78d1505733d3621cd4c044eaf71a02f", - "fixed_version": "4.14.326" - }, - "4.19": { - "cmt_id": "7ea1faa59c75336d86893378838ed1e6f20c0520", - "fixed_version": "4.19.295" - }, - "5.10": { - "cmt_id": "746a8df5e4d235059b1adf02e8456e7ec132d2d8", - "fixed_version": "5.10.195" - }, + "CVE-2024-26660": { "5.15": { - "cmt_id": "6ea277b2c6263931798234e2eed892ecfbb85596", - "fixed_version": "5.15.132" - }, - "5.4": { - "cmt_id": "a6d11571b91d34fd7ce8451c2dfd112194c79ae2", - "fixed_version": "5.4.257" + "cmt_id": "42442f74314d41ddc68227047036fa3e78940054", + "fixed_version": "5.15.149" }, "6.1": { - "cmt_id": "a18349dc8d916a64d7c93f05da98953e3386d8e9", - "fixed_version": "6.1.54" + "cmt_id": "efdd665ce1a1634b8c1dad5e7f6baaef3e131d0a", + "fixed_version": "6.1.78" }, - "6.5": { - "cmt_id": "e5471b82c36396e809817cb988dfc4bce0a688cb", - "fixed_version": "6.5.4" + "6.6": { + "cmt_id": "cd9bd10c59e3c1446680514fd3097c5b00d3712d", + "fixed_version": "6.6.17" + }, + "6.7": { + "cmt_id": "a938eab9586eea31cfd129a507f552efae14d738", + "fixed_version": "6.7.5" } }, - "CVE-2023-50431": { - "6.1": { - "cmt_id": "6d98d249175e568f72ca94cbd6f959bc4476414e", - "fixed_version": "6.1.75" - }, + "CVE-2024-26661": { "6.6": { - "cmt_id": "975aaaddc226303d382baa0d0ece84e8bec1fcf5", - "fixed_version": "6.6.14" + "cmt_id": "3f3c237a706580326d3b7a1b97697e5031ca4667", + "fixed_version": "6.6.17" }, "6.7": { - "cmt_id": "db43f2eabdceedc41b8c3e0621ac42ca19b13b7d", - "fixed_version": "6.7.2" + "cmt_id": "39f24c08363af1cd945abad84e3c87fd3e3c845a", + "fixed_version": "6.7.5" } }, - "CVE-2023-5090": { - "6.1": { - "cmt_id": "7ab62e3415fb59289ab6dea31f0cc0237b949200", - "fixed_version": "6.1.62" + "CVE-2024-26662": { + "6.6": { + "cmt_id": "2e150ccea13129eb048679114808eb9770443e4d", + "fixed_version": "6.6.17" }, - "6.5": { - "cmt_id": "94805f9d3a3fb1f091bcc08b9c4846c4346706eb", - "fixed_version": "6.5.9" + "6.7": { + "cmt_id": "0c863cab0e9173f8b6c7bc328bee3b8625f131b5", + "fixed_version": "6.7.5" } }, - "CVE-2023-51042": { + "CVE-2024-26663": { "4.19": { - "cmt_id": "f9da11d96bde3db277f061ac5a665c234d505787", - "fixed_version": "4.19.293" + "cmt_id": "24ec8f0da93b8a9fba11600be8a90f0d73fb46f1", + "fixed_version": "4.19.307" }, "5.10": { - "cmt_id": "b870b9a47fdba29bd6828f690e4817c950fa3430", - "fixed_version": "5.10.192" + "cmt_id": "19d7314f2fb9515bdaac9829d4d8eb34edd1fe95", + "fixed_version": "5.10.210" }, "5.15": { - "cmt_id": "ef568da1fd843581e855c79a368209b752dea2c1", - "fixed_version": "5.15.128" + "cmt_id": "c1701ea85ef0ec7be6a1b36c7da69f572ed2fd12", + "fixed_version": "5.15.149" }, "5.4": { - "cmt_id": "c6059af6bf5ed436b4aa5229e8113bd2546322d4", - "fixed_version": "5.4.255" + "cmt_id": "6f70f0b412458c622a12d4292782c8e92e210c2f", + "fixed_version": "5.4.269" }, "6.1": { - "cmt_id": "dd0b3b367c3839e439f36af908b39c98929a5e54", - "fixed_version": "6.1.47" + "cmt_id": "3d3a5b31b43515b5752ff282702ca546ec3e48b6", + "fixed_version": "6.1.78" }, - "6.4": { - "cmt_id": "f5db29ce2502c4fc8a33ed7989950ba43875e322", - "fixed_version": "6.4.12" + "6.6": { + "cmt_id": "888e3524be87f3df9fa3c083484e4b62b3e3bb59", + "fixed_version": "6.6.17" + }, + "6.7": { + "cmt_id": "0cd331dfd6023640c9669d0592bc0fd491205f87", + "fixed_version": "6.7.5" } }, - "CVE-2023-51043": { + "CVE-2024-26664": { "4.19": { - "cmt_id": "73a82b22963defa87204f0f9f44a534adf7f831a", - "fixed_version": "4.19.291" + "cmt_id": "93f0f4e846fcb682c3ec436e3b2e30e5a3a8ee6a", + "fixed_version": "4.19.307" }, "5.10": { - "cmt_id": "f09c0ac142c59495262dd80545f261b2aeeba538", - "fixed_version": "5.10.188" + "cmt_id": "f0da068c75c20ffc5ba28243ff577531dc2af1fd", + "fixed_version": "5.10.210" }, "5.15": { - "cmt_id": "30580f3a3301173b1413a7b6d6ea100ec8c75da0", - "fixed_version": "5.15.121" + "cmt_id": "a16afec8e83c56b14a4a73d2e3fb8eec3a8a057e", + "fixed_version": "5.15.149" }, "5.4": { - "cmt_id": "380c7ceabdde0ea5b4e709620f299bcd5c1c8abc", - "fixed_version": "5.4.251" + "cmt_id": "1eb74c00c9c3b13cb65e508c5d5a2f11afb96b8b", + "fixed_version": "5.4.269" }, "6.1": { - "cmt_id": "e4a0e09b79bd2c0895c508cdc5e0265a083cc05d", - "fixed_version": "6.1.40" + "cmt_id": "9bce69419271eb8b2b3ab467387cb59c99d80deb", + "fixed_version": "6.1.78" }, - "6.4": { - "cmt_id": "328f520540db49a7ab40db2835b5027a30bcd6ce", - "fixed_version": "6.4.5" + "6.6": { + "cmt_id": "853a6503c586a71abf27e60a7f8c4fb28092976d", + "fixed_version": "6.6.17" + }, + "6.7": { + "cmt_id": "3a7753bda55985dc26fae17795cb10d825453ad1", + "fixed_version": "6.7.5" } }, - "CVE-2023-5158": { + "CVE-2024-26665": { + "5.10": { + "cmt_id": "e77bf828f1ca1c47fcff58bdc26b60a9d3dfbe1d", + "fixed_version": "5.10.210" + }, "5.15": { - "cmt_id": "1e69422efcc60571cc04f6c1940da848a8c2f21b", - "fixed_version": "5.15.135" + "cmt_id": "d964dd1bc1452594b4207d9229c157d9386e5d8a", + "fixed_version": "5.15.149" }, "6.1": { - "cmt_id": "3a72decd6b49ff11a894aabd4d9b3025f046fe61", - "fixed_version": "6.1.57" + "cmt_id": "e37cde7a5716466ff2a76f7f27f0a29b05b9a732", + "fixed_version": "6.1.78" }, - "6.5": { - "cmt_id": "0bf2b9c2f3545ffce5720de61c33fc171c0e480a", - "fixed_version": "6.5.7" + "6.6": { + "cmt_id": "510c869ffa4068c5f19ff4df51d1e2f3a30aaac1", + "fixed_version": "6.6.17" + }, + "6.7": { + "cmt_id": "7dc9feb8b1705cf00de20563b6bc4831f4c99dab", + "fixed_version": "6.7.5" } }, - "CVE-2023-51779": { - "5.10": { - "cmt_id": "db1b14eec8c61a20374de9f9c2ddc6c9406a8c42", - "fixed_version": "5.10.206" + "CVE-2024-26666": { + "6.6": { + "cmt_id": "fc3432ae8232ff4025e7c55012dd88db0e3d18eb", + "fixed_version": "6.6.17" + }, + "6.7": { + "cmt_id": "c255c3b653c6e8b52ac658c305e2fece2825f7ad", + "fixed_version": "6.7.5" + } + }, + "CVE-2024-26667": { + "6.1": { + "cmt_id": "fb8bfc6ea3cd8c5ac3d35711d064e2f6646aec17", + "fixed_version": "6.1.78" }, + "6.6": { + "cmt_id": "79592a6e7bdc1d05460c95f891f5e5263a107af8", + "fixed_version": "6.6.17" + }, + "6.7": { + "cmt_id": "eb4f56f3ff5799ca754ae6d811803a63fe25a4a2", + "fixed_version": "6.7.5" + } + }, + "CVE-2024-26668": { "5.15": { - "cmt_id": "2b16d960c79abc397f102c3d23d30005b68cb036", - "fixed_version": "5.15.146" + "cmt_id": "79d4efd75e7dbecd855a3b8a63e65f7265f466e1", + "fixed_version": "5.15.149" }, "6.1": { - "cmt_id": "37f71e2c9f515834841826f4eb68ec33cfb2a1ff", - "fixed_version": "6.1.70" + "cmt_id": "bc6e242bb74e2ae616bfd2b250682b738e781c9b", + "fixed_version": "6.1.76" }, "6.6": { - "cmt_id": "1d576c3a5af850bf11fbd103f9ba11aa6d6061fb", - "fixed_version": "6.6.9" + "cmt_id": "9882495d02ecc490604f747437a40626dc9160d0", + "fixed_version": "6.6.15" + }, + "6.7": { + "cmt_id": "00c2c29aa36d1d1827c51a3720e9f893a22c7c6a", + "fixed_version": "6.7.3" } }, - "CVE-2023-5178": { + "CVE-2024-26669": { + "6.6": { + "cmt_id": "9ed46144cff3598a5cf79955630e795ff9af5b97", + "fixed_version": "6.6.15" + }, + "6.7": { + "cmt_id": "c04709b2cc99ae31c346f79f0211752d7b74df01", + "fixed_version": "6.7.3" + } + }, + "CVE-2024-26670": { + "6.6": { + "cmt_id": "58eb5c07f41704464b9acc09ab0707b6769db6c0", + "fixed_version": "6.6.15" + }, + "6.7": { + "cmt_id": "baa0aaac16432019651e0d60c41cd34a0c3c3477", + "fixed_version": "6.7.3" + } + }, + "CVE-2024-26671": { + "4.19": { + "cmt_id": "9525b38180e2753f0daa1a522b7767a2aa969676", + "fixed_version": "4.19.307" + }, "5.10": { - "cmt_id": "e985d78bdcf37f7ef73666a43b0d2407715f00d3", - "fixed_version": "5.10.199" + "cmt_id": "7610ba1319253225a9ba8a9d28d472fc883b4e2f", + "fixed_version": "5.10.210" }, "5.15": { - "cmt_id": "34f62612be2a7f90ab68a14154db6664a32f8db0", - "fixed_version": "5.15.137" + "cmt_id": "89e0e66682e1538aeeaa3109503473663cd24c8b", + "fixed_version": "5.15.149" }, "5.4": { - "cmt_id": "4e53bab11f01a401a5acd3bc94335b27ec79106b", - "fixed_version": "5.4.260" + "cmt_id": "ecd7744a1446eb02ccc63e493e2eb6ede4ef1e10", + "fixed_version": "5.4.269" }, "6.1": { - "cmt_id": "f691ec5a548257edb3aacd952e2a574e4e57b2c4", - "fixed_version": "6.1.60" + "cmt_id": "1d9c777d3e70bdc57dddf7a14a80059d65919e56", + "fixed_version": "6.1.77" }, - "6.5": { - "cmt_id": "675f0e9bb716fa3252979145b9b1a950140e94e9", - "fixed_version": "6.5.9" + "6.6": { + "cmt_id": "6d8b01624a2540336a32be91f25187a433af53a0", + "fixed_version": "6.6.16" + }, + "6.7": { + "cmt_id": "f1bc0d8163f8ee84a8d5affdf624cfad657df1d2", + "fixed_version": "6.7.4" } }, - "CVE-2023-51780": { - "4.14": { - "cmt_id": "3ddeb55deec5e0e324d0ab8cc2ddd528518ea12d", - "fixed_version": "4.14.334" - }, - "4.19": { - "cmt_id": "bff7ddb0d9d515170dcf133d239dba87c47c8cdb", - "fixed_version": "4.19.303" - }, + "CVE-2024-26672": { + "6.7": { + "cmt_id": "7b5d58c07024516c0e81b95e98f37710cf402c53", + "fixed_version": "6.7.4" + } + }, + "CVE-2024-26673": { "5.10": { - "cmt_id": "64a032015c336ca1795b3e1b1d1f94085ada3553", - "fixed_version": "5.10.205" + "cmt_id": "65ee90efc928410c6f73b3d2e0afdd762652c09d", + "fixed_version": "5.10.210" }, "5.15": { - "cmt_id": "3bb41dc361bfd938041a1d17a3768aa788a36a3c", - "fixed_version": "5.15.144" + "cmt_id": "b775ced05489f4b77a35fe203e9aeb22f428e38f", + "fixed_version": "5.15.149" }, "5.4": { - "cmt_id": "b099c28847cfa33854731eeec9c64619d99a1255", - "fixed_version": "5.4.265" + "cmt_id": "f549f340c91f08b938d60266e792ff7748dae483", + "fixed_version": "5.4.269" }, "6.1": { - "cmt_id": "2de2a6cbe14f7e949da59bddd5d69baf5dd893c0", - "fixed_version": "6.1.69" + "cmt_id": "0f501dae16b7099e69ee9b0d5c70b8f40fd30e98", + "fixed_version": "6.1.77" }, "6.6": { - "cmt_id": "531fd46f92895bcdc41bedd12533266c397196da", - "fixed_version": "6.6.8" + "cmt_id": "cfe3550ea5df292c9e2d608e8c4560032391847e", + "fixed_version": "6.6.16" + }, + "6.7": { + "cmt_id": "38cc1605338d99205a263707f4dde76408d3e0e8", + "fixed_version": "6.7.4" + } + }, + "CVE-2024-26674": { + "6.6": { + "cmt_id": "2aed1b6c33afd8599d01c6532bbecb829480a674", + "fixed_version": "6.6.17" + }, + "6.7": { + "cmt_id": "2da241c5ed78d0978228a1150735539fe1a60eca", + "fixed_version": "6.7.5" } }, - "CVE-2023-51781": { - "4.14": { - "cmt_id": "0686da1ada51c787610185de6289d8a5006ad263", - "fixed_version": "4.14.334" - }, + "CVE-2024-26675": { "4.19": { - "cmt_id": "580ff9f59ab6537d8ce1d0d9f012cf970553ef3d", - "fixed_version": "4.19.303" + "cmt_id": "4fdb14ba89faff6e6969a4dffdc8e54235d6e5ed", + "fixed_version": "4.19.307" }, "5.10": { - "cmt_id": "a232eb81c7cb5d4dbd325d4611ed029b7fa07596", - "fixed_version": "5.10.205" + "cmt_id": "b06e067e93fa4b98acfd3a9f38a398ab91bbc58b", + "fixed_version": "5.10.210" }, "5.15": { - "cmt_id": "5b87ac25e8cfeb2d3d27574cdc077b09e8ceca82", - "fixed_version": "5.15.144" + "cmt_id": "58fbe665b097bf7b3144da7e7b91fb27aa8d0ae3", + "fixed_version": "5.15.149" }, "5.4": { - "cmt_id": "9112bd107208cd6a4f0175ca36289ed170622cce", - "fixed_version": "5.4.265" + "cmt_id": "56fae81633ccee307cfcb032f706bf1863a56982", + "fixed_version": "5.4.269" }, "6.1": { - "cmt_id": "1646b2929d5efc3861139ba58556b0f149c848f6", - "fixed_version": "6.1.69" + "cmt_id": "4e2c4846b2507f6dfc9bea72b7567c2693a82a16", + "fixed_version": "6.1.78" }, "6.6": { - "cmt_id": "e15ded324a3911358e8541a1b573665f99f216ef", - "fixed_version": "6.6.8" + "cmt_id": "7e5ef49670766c9742ffcd9cead7cdb018268719", + "fixed_version": "6.6.17" + }, + "6.7": { + "cmt_id": "210d938f963dddc543b07e66a79b7d8d4bd00bd8", + "fixed_version": "6.7.5" } }, - "CVE-2023-51782": { - "4.14": { - "cmt_id": "02af3c8ab5cda2633b187bd18b5dc2b9f0af0859", - "fixed_version": "4.14.334" + "CVE-2024-26676": { + "5.15": { + "cmt_id": "4fe505c63aa3273135a57597fda761e9aecc7668", + "fixed_version": "5.15.149" + }, + "6.1": { + "cmt_id": "e0e09186d8821ad59806115d347ea32efa43ca4b", + "fixed_version": "6.1.78" + }, + "6.6": { + "cmt_id": "b74aa9ce13d02b7fd37c5325b99854f91b9b4276", + "fixed_version": "6.6.17" + }, + "6.7": { + "cmt_id": "82ae47c5c3a6b27fdc0f9e83c1499cb439c56140", + "fixed_version": "6.7.5" + } + }, + "CVE-2024-26677": { + "6.6": { + "cmt_id": "200cb50b9e154434470c8969d32474d38475acc2", + "fixed_version": "6.6.17" }, + "6.7": { + "cmt_id": "63719f490e6a89896e9a463d2b45e8203eab23ae", + "fixed_version": "6.7.5" + } + }, + "CVE-2024-26678": { + "6.7": { + "cmt_id": "4adeeff8c12321cd453412a659c3c0eeb9bb2397", + "fixed_version": "6.7.5" + } + }, + "CVE-2024-26679": { "4.19": { - "cmt_id": "6c9afea8827dde62c4062185d22ac035090ba39b", - "fixed_version": "4.19.303" + "cmt_id": "caa064c3c2394d03e289ebd6b0be5102eb8a5b40", + "fixed_version": "4.19.307" }, "5.10": { - "cmt_id": "7eda5960a5332654b10d951e735750ed60d7f0a9", - "fixed_version": "5.10.205" + "cmt_id": "88081ba415224cf413101def4343d660f56d082b", + "fixed_version": "5.10.210" }, "5.15": { - "cmt_id": "3f1f6a94d8858706863fe90da35663f6e24be274", - "fixed_version": "5.15.144" + "cmt_id": "3266e638ba5cc1165f5e6989eb8c0720f1cc4b41", + "fixed_version": "5.15.149" }, "5.4": { - "cmt_id": "3df812627e7d0bf557f3781c3448d42c8fe8313e", - "fixed_version": "5.4.265" + "cmt_id": "5993f121fbc01dc2d734f0ff2628009b258fb1dd", + "fixed_version": "5.4.269" }, "6.1": { - "cmt_id": "01540ee2366a0a8671c35cd57a66bf0817106ffa", - "fixed_version": "6.1.69" + "cmt_id": "54538752216bf89ee88d47ad07802063a498c299", + "fixed_version": "6.1.78" }, "6.6": { - "cmt_id": "63caa51833e8701248a8a89d83effe96f30e4c80", - "fixed_version": "6.6.8" + "cmt_id": "4a5e31bdd3c1702b520506d9cf8c41085f75c7f2", + "fixed_version": "6.6.17" + }, + "6.7": { + "cmt_id": "307fa8a75ab7423fa5c73573ec3d192de5027830", + "fixed_version": "6.7.5" } }, - "CVE-2023-5197": { - "5.10": { - "cmt_id": "5a03b42ae1ed646eb5f5acceff1fb2b1d85ec077", - "fixed_version": "5.10.198" + "CVE-2024-26680": { + "6.1": { + "cmt_id": "466ceebe48cbba3f4506f165fca7111f9eb8bb12", + "fixed_version": "6.1.78" }, - "5.15": { - "cmt_id": "0c5fd85fb01fa1a5dbb9f213b0d1925e671f30df", - "fixed_version": "5.15.134" + "6.6": { + "cmt_id": "004fe5b7f59286a926a45e0cafc7870e9cdddd56", + "fixed_version": "6.6.17" }, + "6.7": { + "cmt_id": "e42e334c645575be5432adee224975d4f536fdb1", + "fixed_version": "6.7.5" + } + }, + "CVE-2024-26681": { "6.1": { - "cmt_id": "9af8bb2afea3705b58fe930f97a39322f46e5b8b", - "fixed_version": "6.1.56" + "cmt_id": "0193e0660cc6689c794794b471492923cfd7bfbc", + "fixed_version": "6.1.78" }, - "6.5": { - "cmt_id": "13f385f99147b4445a1ff151fabd44c12d366ab0", - "fixed_version": "6.5.6" + "6.6": { + "cmt_id": "6eecddd9c3c8d6e3a097531cdc6d500335b35e46", + "fixed_version": "6.6.17" + }, + "6.7": { + "cmt_id": "d91964cdada76740811b7c621239f9c407820dbc", + "fixed_version": "6.7.5" } }, - "CVE-2023-52340": { - "4.19": { - "cmt_id": "95372b040ae689293c6863b90049f1af68410c8b", - "fixed_version": "4.19.305" - }, + "CVE-2024-26682": { + "6.7": { + "cmt_id": "ea88bde8e3fefbe4268f6991375dd629895a090a", + "fixed_version": "6.7.5" + } + }, + "CVE-2024-26683": { + "6.7": { + "cmt_id": "ce112c941c2b172afba3e913a90c380647d53975", + "fixed_version": "6.7.5" + } + }, + "CVE-2024-26684": { "5.10": { - "cmt_id": "dd56c5790dc3484f3c89fd4e21735c796a82b40d", - "fixed_version": "5.10.208" + "cmt_id": "2fc45a4631ac7837a5c497cb4f7e2115d950fc37", + "fixed_version": "5.10.210" }, "5.15": { - "cmt_id": "b8a5308feedda10d4875a912e2e1f6be215a4ead", - "fixed_version": "5.15.147" + "cmt_id": "6609e98ed82966a1b3168c142aca30f8284a7b89", + "fixed_version": "5.15.149" }, "5.4": { - "cmt_id": "584756c3d75a1722a868a1d22602251385bee798", - "fixed_version": "5.4.267" + "cmt_id": "e9837c83befb5b852fa76425dde98a87b737df00", + "fixed_version": "5.4.269" }, "6.1": { - "cmt_id": "0f22c8a6efe63c16d1abf1e6c0317abbf121f883", - "fixed_version": "6.1.73" + "cmt_id": "e42ff0844fe418c7d03a14f9f90e1b91ba119591", + "fixed_version": "6.1.78" + }, + "6.6": { + "cmt_id": "7e0ff50131e9d1aa507be8e670d38e9300a5f5bf", + "fixed_version": "6.6.17" + }, + "6.7": { + "cmt_id": "3b48c9e258c8691c2f093ee07b1ea3764caaa1b2", + "fixed_version": "6.7.5" } }, - "CVE-2023-52429": { + "CVE-2024-26685": { + "4.19": { + "cmt_id": "c4a09fdac625e64abe478dcf88bfa20406616928", + "fixed_version": "4.19.307" + }, "5.10": { - "cmt_id": "a891a0621e725e85529985139cada8cb5a74a116", + "cmt_id": "f3e4963566f58726d3265a727116a42b591f6596", "fixed_version": "5.10.210" }, "5.15": { - "cmt_id": "888a0a46b80fa37eacfe81faf47ba0b83876251d", + "cmt_id": "8fa90634ec3e9cc50f42dd605eec60f2d146ced8", "fixed_version": "5.15.149" }, + "5.4": { + "cmt_id": "d31c8721e816eff5ca6573cc487754f357c093cd", + "fixed_version": "5.4.269" + }, "6.1": { - "cmt_id": "c5d83ac2bf6ca668a39ffb1a576899a66153ba19", + "cmt_id": "6589f0f72f8edd1fa11adce4eedbd3615f2e78ab", "fixed_version": "6.1.79" }, "6.6": { - "cmt_id": "438d19492b7f002334573bae43276297eb234c80", + "cmt_id": "2c3bdba00283a6c7a5b19481a59a730f46063803", "fixed_version": "6.6.18" }, "6.7": { - "cmt_id": "cd70175481f63af31901dd463e44386f033c3f4c", + "cmt_id": "626daab3811b772086aef1bf8eed3ffe6f523eff", "fixed_version": "6.7.6" } }, - "CVE-2023-52433": { - "6.5": { - "cmt_id": "e3213ff99a355cda811b41e8dbb3472d13167a3a", - "fixed_version": "6.5.4" + "CVE-2024-26686": { + "6.1": { + "cmt_id": "cf4b8c39b9a0bd81c47afc7ef62914a62dd5ec4d", + "fixed_version": "6.1.82" + }, + "6.7": { + "cmt_id": "27978243f165b44e342f28f449b91327944ea071", + "fixed_version": "6.7.6" } }, - "CVE-2023-52434": { + "CVE-2024-26687": { "6.1": { - "cmt_id": "1ae3c59355dc9882e09c020afe8ffbd895ad0f29", - "fixed_version": "6.1.79" + "cmt_id": "585a344af6bcac222608a158fc2830ff02712af5", + "fixed_version": "6.1.81" }, "6.6": { - "cmt_id": "17a0f64cc02d4972e21c733d9f21d1c512963afa", - "fixed_version": "6.6.8" + "cmt_id": "20980195ec8d2e41653800c45c8c367fa1b1f2b4", + "fixed_version": "6.6.19" + }, + "6.7": { + "cmt_id": "9be71aa12afa91dfe457b3fb4a444c42b1ee036b", + "fixed_version": "6.7.6" } }, - "CVE-2023-52435": { + "CVE-2024-26688": { "5.10": { - "cmt_id": "8f8f185643747fbb448de6aab0efa51c679909a3", - "fixed_version": "5.10.210" + "cmt_id": "80d852299987a8037be145a94f41874228f1a773", + "fixed_version": "5.10.212" }, "5.15": { - "cmt_id": "6c53e8547687d9c767c139cd4b50af566f58c29a", - "fixed_version": "5.15.149" + "cmt_id": "22850c9950a4e43a67299755d11498f3292d02ff", + "fixed_version": "5.15.151" }, "5.4": { - "cmt_id": "cd1022eaf87be8e6151435bd4df4c242c347e083", - "fixed_version": "5.4.269" + "cmt_id": "1dde8ef4b7a749ae1bc73617c91775631d167557", + "fixed_version": "5.4.271" }, "6.1": { - "cmt_id": "989b0ff35fe5fc9652ee5bafbe8483db6f27b137", + "cmt_id": "2e2c07104b4904aed1389a59b25799b95a85b5b9", "fixed_version": "6.1.79" }, "6.6": { - "cmt_id": "95b3904a261a9f810205da560e802cc326f50d77", - "fixed_version": "6.6.11" + "cmt_id": "13c5a9fb07105557a1fa9efdb4f23d7ef30b7274", + "fixed_version": "6.6.18" + }, + "6.7": { + "cmt_id": "ec78418801ef7b0c22cd6a30145ec480dd48db39", + "fixed_version": "6.7.6" } }, - "CVE-2023-52436": { - "4.19": { - "cmt_id": "16ae3132ff7746894894927c1892493693b89135", - "fixed_version": "4.19.306" - }, + "CVE-2024-26689": { "5.10": { - "cmt_id": "3e47740091b05ac8d7836a33afd8646b6863ca52", - "fixed_version": "5.10.209" + "cmt_id": "8180d0c27b93a6eb60da1b08ea079e3926328214", + "fixed_version": "5.10.210" }, "5.15": { - "cmt_id": "32a6cfc67675ee96fe107aeed5af9776fec63f11", - "fixed_version": "5.15.148" + "cmt_id": "70e329b440762390258a6fe8c0de93c9fdd56c77", + "fixed_version": "5.15.149" }, - "5.4": { - "cmt_id": "12cf91e23b126718a96b914f949f2cdfeadc7b2a", - "fixed_version": "5.4.268" + "6.1": { + "cmt_id": "f3f98d7d84b31828004545e29fd7262b9f444139", + "fixed_version": "6.1.79" + }, + "6.6": { + "cmt_id": "ae20db45e482303a20e56f2db667a9d9c54ac7e7", + "fixed_version": "6.6.18" + }, + "6.7": { + "cmt_id": "7958c1bf5b03c6f1f58e724dbdec93f8f60b96fc", + "fixed_version": "6.7.6" + } + }, + "CVE-2024-26690": { + "6.6": { + "cmt_id": "9680b2ab54ba8d72581100e8c45471306101836e", + "fixed_version": "6.6.18" + }, + "6.7": { + "cmt_id": "e6af0f082a4b87b99ad033003be2a904a1791b3f", + "fixed_version": "6.7.6" + } + }, + "CVE-2024-26691": { + "6.6": { + "cmt_id": "3d16cebf01127f459dcfeb79ed77bd68b124c228", + "fixed_version": "6.6.18" + }, + "6.7": { + "cmt_id": "3ab1c40a1e915e350d9181a4603af393141970cc", + "fixed_version": "6.7.6" + } + }, + "CVE-2024-26692": { + "6.6": { + "cmt_id": "4145ccff546ea868428b3e0fe6818c6261b574a9", + "fixed_version": "6.6.18" + }, + "6.7": { + "cmt_id": "63c35afd50e28b49c5b75542045a8c42b696dab9", + "fixed_version": "6.7.6" + } + }, + "CVE-2024-26693": { + "6.6": { + "cmt_id": "00f4eb31b8193f6070ce24df636883f9c104ca95", + "fixed_version": "6.6.18" }, + "6.7": { + "cmt_id": "c12f0f4d4caf23b1bfdc2602b6b70d56bdcd6aa7", + "fixed_version": "6.7.6" + } + }, + "CVE-2024-26694": { + "6.6": { + "cmt_id": "ab9d4bb9a1892439b3123fc52b19e32b9cdf80ad", + "fixed_version": "6.6.18" + }, + "6.7": { + "cmt_id": "d24eb9a27bea8fe5237fa71be274391d9d51eff2", + "fixed_version": "6.7.6" + } + }, + "CVE-2024-26695": { "6.1": { - "cmt_id": "5de9e9dd1828db9b8b962f7ca42548bd596deb8a", - "fixed_version": "6.1.74" + "cmt_id": "8731fe001a60581794ed9cf65da8cd304846a6fb", + "fixed_version": "6.1.79" }, "6.6": { - "cmt_id": "2525d1ba225b5c167162fa344013c408e8b4de36", - "fixed_version": "6.6.13" + "cmt_id": "88aa493f393d2ee38ac140e1f6ac1881346e85d4", + "fixed_version": "6.6.18" }, "6.7": { - "cmt_id": "f6c30bfe5a49bc38cae985083a11016800708fea", - "fixed_version": "6.7.1" + "cmt_id": "b5909f197f3b26aebedca7d8ac7b688fd993a266", + "fixed_version": "6.7.6" } }, - "CVE-2023-52438": { + "CVE-2024-26696": { + "4.19": { + "cmt_id": "228742b2ddfb99dfd71e5a307e6088ab6836272e", + "fixed_version": "4.19.307" + }, "5.10": { - "cmt_id": "c8c1158ffb007197f31f9d9170cf13e4f34cbb5c", - "fixed_version": "5.10.209" + "cmt_id": "98a4026b22ff440c7f47056481bcbbe442f607d6", + "fixed_version": "5.10.210" }, "5.15": { - "cmt_id": "8ad4d580e8aff8de2a4d57c5930fcc29f1ffd4a6", - "fixed_version": "5.15.148" + "cmt_id": "7e9b622bd0748cc104d66535b76d9b3535f9dc0f", + "fixed_version": "5.15.149" }, "5.4": { - "cmt_id": "a53e15e592b4dcc91c3a3b8514e484a0bdbc53a3", - "fixed_version": "5.4.268" + "cmt_id": "862ee4422c38be5c249844a684b00d0dbe9d1e46", + "fixed_version": "5.4.269" }, "6.1": { - "cmt_id": "9fa04c93f24138747807fe75b5591bb680098f56", - "fixed_version": "6.1.74" + "cmt_id": "8494ba2c9ea00a54d5b50e69b22c55a8958bce32", + "fixed_version": "6.1.79" }, "6.6": { - "cmt_id": "a49087ab93508b60d9b8add91707a22dda832869", - "fixed_version": "6.6.13" + "cmt_id": "ea5ddbc11613b55e5128c85f57b08f907abd9b28", + "fixed_version": "6.6.18" }, "6.7": { - "cmt_id": "e074686e993ff1be5f21b085a3b1b4275ccd5727", - "fixed_version": "6.7.1" + "cmt_id": "e38585401d464578d30f5868ff4ca54475c34f7d", + "fixed_version": "6.7.6" } }, - "CVE-2023-52439": { + "CVE-2024-26697": { "4.19": { - "cmt_id": "3174e0f7de1ba392dc191625da83df02d695b60c", - "fixed_version": "4.19.306" + "cmt_id": "5278c3eb6bf5896417572b52adb6be9d26e92f65", + "fixed_version": "4.19.307" }, "5.10": { - "cmt_id": "5e0be1229ae199ebb90b33102f74a0f22d152570", - "fixed_version": "5.10.209" + "cmt_id": "364a66be2abdcd4fd426ffa44d9b8f40aafb3caa", + "fixed_version": "5.10.210" }, "5.15": { - "cmt_id": "5cf604ee538ed0c467abe3b4cda5308a6398f0f7", - "fixed_version": "5.15.148" + "cmt_id": "120f7fa2008e3bd8b7680b4ab5df942decf60fd5", + "fixed_version": "5.15.149" }, "5.4": { - "cmt_id": "e93da893d52d82d57fc0db2ca566024e0f26ff50", - "fixed_version": "5.4.268" + "cmt_id": "a6efe6dbaaf504f5b3f8a5c3f711fe54e7dda0ba", + "fixed_version": "5.4.269" }, "6.1": { - "cmt_id": "17a8519cb359c3b483fb5c7367efa9a8a508bdea", - "fixed_version": "6.1.74" + "cmt_id": "9c9c68d64fd3284f7097ed6ae057c8441f39fcd3", + "fixed_version": "6.1.79" }, "6.6": { - "cmt_id": "35f102607054faafe78d2a6994b18d5d9d6e92ad", - "fixed_version": "6.6.13" + "cmt_id": "2e1480538ef60bfee5473dfe02b1ecbaf1a4aa0d", + "fixed_version": "6.6.18" }, "6.7": { - "cmt_id": "913205930da6213305616ac539447702eaa85e41", - "fixed_version": "6.7.1" + "cmt_id": "2000016bab499074e6248ea85aeea7dd762355d9", + "fixed_version": "6.7.6" } }, - "CVE-2023-52440": { - "6.1": { - "cmt_id": "30fd6521b2fbd9b767e438e31945e5ea3e3a2fba", - "fixed_version": "6.1.52" - }, - "6.4": { - "cmt_id": "7f1d6cb0eb6af3a8088dc24b7ddee9a9711538c4", - "fixed_version": "6.4.15" + "CVE-2024-26698": { + "5.10": { + "cmt_id": "9ec807e7b6f5fcf9499f3baa69f254bb239a847f", + "fixed_version": "5.10.210" }, - "6.5": { - "cmt_id": "ecd7e1c562cb08e41957fcd4b0e404de5ab38e20", - "fixed_version": "6.5.2" - } - }, - "CVE-2023-52441": { "5.15": { - "cmt_id": "5c0df9d30c289d6b9d7d44e2a450de2f8e3cf40b", - "fixed_version": "5.15.145" + "cmt_id": "7656372ae190e54e8c8cf1039725a5ea59fdf84a", + "fixed_version": "5.15.149" }, "6.1": { - "cmt_id": "330d900620dfc9893011d725b3620cd2ee0bc2bc", - "fixed_version": "6.1.53" + "cmt_id": "48a8ccccffbae10c91d31fc872db5c31aba07518", + "fixed_version": "6.1.79" }, - "6.4": { - "cmt_id": "aa669ef229ae8dd779da9caa24e254964545895f", - "fixed_version": "6.4.16" + "6.6": { + "cmt_id": "22a77c0f5b8233237731df3288d067af51a2fd7b", + "fixed_version": "6.6.18" + }, + "6.7": { + "cmt_id": "0e8875de9dad12805ff66e92cd5edea6a421f1cd", + "fixed_version": "6.7.6" } }, - "CVE-2023-52442": { - "5.15": { - "cmt_id": "017d85c94f02090a87f4a473dbe0d6ee0da72693", - "fixed_version": "5.15.145" - }, - "6.1": { - "cmt_id": "becb5191d1d5fdfca0198a2e37457bbbf4fe266f", - "fixed_version": "6.1.53" - }, - "6.4": { - "cmt_id": "4c2b350b2e269e3fd17bbfa42de1b42775b777ac", - "fixed_version": "6.4.16" + "CVE-2024-26699": { + "6.7": { + "cmt_id": "ca400d8e0c1c9d79c08dfb6b7f966e26c8cae7fb", + "fixed_version": "6.7.6" } }, - "CVE-2023-52443": { - "4.19": { - "cmt_id": "9286ee97aa4803d99185768735011d0d65827c9e", - "fixed_version": "4.19.306" - }, - "5.10": { - "cmt_id": "5ff00408e5029d3550ee77f62dc15f1e15c47f87", - "fixed_version": "5.10.209" - }, - "5.15": { - "cmt_id": "0a12db736edbb4933e4274932aeea594b5876fa4", - "fixed_version": "5.15.148" - }, - "5.4": { - "cmt_id": "1d8e62b5569cc1466ceb8a7e4872cf10160a9dcf", - "fixed_version": "5.4.268" - }, + "CVE-2024-26700": { "6.1": { - "cmt_id": "9d4fa5fe2b1d56662afd14915a73b4d0783ffa45", - "fixed_version": "6.1.75" + "cmt_id": "01d992088dce3945f70f49f34b0b911c5213c238", + "fixed_version": "6.1.82" }, "6.6": { - "cmt_id": "5c0392fdafb0a2321311900be83ffa572bef8203", - "fixed_version": "6.6.14" + "cmt_id": "7407c61f43b66e90ad127d0cdd13cbc9d87141a5", + "fixed_version": "6.6.18" }, "6.7": { - "cmt_id": "77ab09b92f16c8439a948d1af489196953dc4a0e", - "fixed_version": "6.7.2" + "cmt_id": "5cd7185d2db76c42a9b7e69adad9591d9fca093f", + "fixed_version": "6.7.6" } }, - "CVE-2023-52444": { - "4.19": { - "cmt_id": "02160112e6d45c2610b049df6eb693d7a2e57b46", - "fixed_version": "4.19.306" - }, + "CVE-2024-26702": { "5.10": { - "cmt_id": "6f866885e147d33efc497f1095f35b2ee5ec7310", - "fixed_version": "5.10.209" + "cmt_id": "36a49290d7e6d554020057a409747a092b1d3b56", + "fixed_version": "5.10.210" }, "5.15": { - "cmt_id": "f100ba617d8be6c98a68f3744ef7617082975b77", - "fixed_version": "5.15.148" + "cmt_id": "8d5838a473e8e6d812257c69745f5920e4924a60", + "fixed_version": "5.15.149" }, "5.4": { - "cmt_id": "5624a3c1b1ebc8991318e1cce2aa719542991024", - "fixed_version": "5.4.268" + "cmt_id": "7200170e88e3ec54d9e9c63f07514c3cead11481", + "fixed_version": "5.4.269" }, "6.1": { - "cmt_id": "f0145860c20be6bae6785c7a2249577674702ac7", - "fixed_version": "6.1.75" + "cmt_id": "176256ff8abff29335ecff905a09fb49e8dcf513", + "fixed_version": "6.1.79" }, "6.6": { - "cmt_id": "d3c0b49aaa12a61d560528f5d605029ab57f0728", - "fixed_version": "6.6.14" + "cmt_id": "1d8c67e94e9e977603473a543d4f322cf2c4aa01", + "fixed_version": "6.6.18" }, "6.7": { - "cmt_id": "2fb4867f4405aea8c0519d7d188207f232a57862", - "fixed_version": "6.7.2" + "cmt_id": "57d05dbbcd0b3dc0c252103b43012eef5d6430d1", + "fixed_version": "6.7.6" } }, - "CVE-2023-52445": { + "CVE-2024-26703": { + "6.6": { + "cmt_id": "5f703935fdb559642d85b2088442ee55a557ae6d", + "fixed_version": "6.6.18" + }, + "6.7": { + "cmt_id": "2354d29986ebd138f89c2b73fecf8237e0a4ad6b", + "fixed_version": "6.7.6" + } + }, + "CVE-2024-26704": { "4.19": { - "cmt_id": "ec36c134dd020d28e312c2f1766f85525e747aab", - "fixed_version": "4.19.306" + "cmt_id": "b4fbb89d722cbb16beaaea234b7230faaaf68c71", + "fixed_version": "4.19.307" }, "5.10": { - "cmt_id": "3233d8bf7893550045682192cb227af7fa3defeb", - "fixed_version": "5.10.209" + "cmt_id": "d033a555d9a1cf53dbf3301af7199cc4a4c8f537", + "fixed_version": "5.10.210" }, "5.15": { - "cmt_id": "ec3634ebe23fc3c44ebc67c6d25917300bc68c08", - "fixed_version": "5.15.148" + "cmt_id": "afba9d11320dad5ce222ac8964caf64b7b4bedb1", + "fixed_version": "5.15.149" }, "5.4": { - "cmt_id": "47aa8fcd5e8b5563af4042a00f25ba89bef8f33d", - "fixed_version": "5.4.268" + "cmt_id": "afbcad9ae7d6d11608399188f03a837451b6b3a1", + "fixed_version": "5.4.269" }, "6.1": { - "cmt_id": "30773ea47d41773f9611ffb4ebc9bda9d19a9e7e", - "fixed_version": "6.1.75" + "cmt_id": "185eab30486ba3e7bf8b9c2e049c79a06ffd2bc1", + "fixed_version": "6.1.79" }, "6.6": { - "cmt_id": "2cf0005d315549b8d2b940ff96a66c2a889aa795", - "fixed_version": "6.6.14" + "cmt_id": "2883940b19c38d5884c8626483811acf4d7e148f", + "fixed_version": "6.6.18" }, "6.7": { - "cmt_id": "437b5f57732bb4cc32cc9f8895d2010ee9ff521c", - "fixed_version": "6.7.2" + "cmt_id": "559ddacb90da1d8786dd8ec4fd76bbfa404eaef6", + "fixed_version": "6.7.6" } }, - "CVE-2023-52446": { + "CVE-2024-26705": { "6.6": { - "cmt_id": "d048dced8ea5eac6723ae873a40567e6f101ea42", - "fixed_version": "6.6.14" + "cmt_id": "54944f45470af5965fb9c28cf962ec30f38a8f5b", + "fixed_version": "6.6.18" }, "6.7": { - "cmt_id": "f9ff6ef1c73cd9e1a6bb1ab3e57c5d141a536306", - "fixed_version": "6.7.2" + "cmt_id": "aa52be55276614d33f22fbe7da36c40d6432d10b", + "fixed_version": "6.7.6" } }, - "CVE-2023-52447": { + "CVE-2024-26706": { "6.1": { - "cmt_id": "62fca83303d608ad4fec3f7428c8685680bb01b0", - "fixed_version": "6.1.75" + "cmt_id": "23027309b099ffc4efca5477009a11dccbdae592", + "fixed_version": "6.1.79" }, "6.6": { - "cmt_id": "f91cd728b10c51f6d4a39957ccd56d1e802fc8ee", - "fixed_version": "6.6.14" + "cmt_id": "fa69a8063f8b27f3c7434a0d4f464a76a62f24d2", + "fixed_version": "6.6.18" }, "6.7": { - "cmt_id": "bfd9b20c4862f41d4590fde11d70a5eeae53dcc5", - "fixed_version": "6.7.2" + "cmt_id": "ce31d79aa1f13a2345791f84935281a2c194e003", + "fixed_version": "6.7.6" } }, - "CVE-2023-52448": { + "CVE-2024-26707": { "5.10": { - "cmt_id": "5c28478af371a1c3fdb570ca67f110e1ae60fc37", - "fixed_version": "5.10.209" + "cmt_id": "0d8011a878fdf96123bc0d6a12e2fe7ced5fddfb", + "fixed_version": "5.10.210" }, "5.15": { - "cmt_id": "ee0586d73cbaf0e7058bc640d62a9daf2dfa9178", - "fixed_version": "5.15.148" - }, - "5.4": { - "cmt_id": "efc8ef87ab9185a23d5676f2f7d986022d91bcde", - "fixed_version": "5.4.268" + "cmt_id": "de769423b2f053182a41317c4db5a927e90622a0", + "fixed_version": "5.15.149" }, "6.1": { - "cmt_id": "d69d7804cf9e2ba171a27e5f98bc266f13d0414a", - "fixed_version": "6.1.75" + "cmt_id": "56440799fc4621c279df16176f83a995d056023a", + "fixed_version": "6.1.79" }, "6.6": { - "cmt_id": "067a7c48c2c70f05f9460d6f0e8423e234729f05", - "fixed_version": "6.6.14" + "cmt_id": "923dea2a7ea9e1ef5ac4031fba461c1cc92e32b8", + "fixed_version": "6.6.18" }, "6.7": { - "cmt_id": "c323efd620c741168c8e0cc6fc0be04ab57e331a", - "fixed_version": "6.7.2" + "cmt_id": "547545e50c913861219947ce490c68a1776b9b51", + "fixed_version": "6.7.6" } }, - "CVE-2023-52449": { - "4.19": { - "cmt_id": "aeba358bcc8ffddf9b4a9bd0e5ec9eb338d46022", - "fixed_version": "4.19.306" + "CVE-2024-26708": { + "6.6": { + "cmt_id": "4bfe217e075d04e63c092df9d40c608e598c2ef2", + "fixed_version": "6.6.18" + }, + "6.7": { + "cmt_id": "e158fb9679d15a2317ec13b4f6301bd26265df2f", + "fixed_version": "6.7.6" + } + }, + "CVE-2024-26709": { + "6.7": { + "cmt_id": "c90fdea9cac9eb419fc266e75d625cb60c8f7f6c", + "fixed_version": "6.7.6" + } + }, + "CVE-2024-26711": { + "6.6": { + "cmt_id": "0e0dab37750926d4fb0144edb1c1ea0612fea273", + "fixed_version": "6.6.18" }, + "6.7": { + "cmt_id": "02876e2df02f8b17a593d77a0a7879a8109b27e1", + "fixed_version": "6.7.6" + } + }, + "CVE-2024-26712": { "5.10": { - "cmt_id": "001a3f59d8c914ef8273461d4bf495df384cc5f8", - "fixed_version": "5.10.209" + "cmt_id": "230e89b5ad0a33f530a2a976b3e5e4385cb27882", + "fixed_version": "5.10.210" }, "5.15": { - "cmt_id": "d8ac2537763b54d278b80b2b080e1652523c7d4c", - "fixed_version": "5.15.148" - }, - "5.4": { - "cmt_id": "1bf4fe14e97cda621522eb2f28b0a4e87c5b0745", - "fixed_version": "5.4.268" + "cmt_id": "2738e0aa2fb24a7ab9c878d912dc2b239738c6c6", + "fixed_version": "5.15.149" }, "6.1": { - "cmt_id": "5389407bba1eab1266c6d83e226fb0840cb98dd5", - "fixed_version": "6.1.75" + "cmt_id": "0c09912dd8387e228afcc5e34ac5d79b1e3a1058", + "fixed_version": "6.1.79" }, "6.6": { - "cmt_id": "cfd7c9d260dc0a3baaea05a122a19ab91e193c65", - "fixed_version": "6.6.14" + "cmt_id": "0516c06b19dc64807c10e01bb99b552bdf2d7dbe", + "fixed_version": "6.6.18" }, "6.7": { - "cmt_id": "b36aaa64d58aaa2f2cbc8275e89bae76a2b6c3dc", - "fixed_version": "6.7.2" + "cmt_id": "70ef2ba1f4286b2b73675aeb424b590c92d57b25", + "fixed_version": "6.7.6" } }, - "CVE-2023-52450": { + "CVE-2024-26713": { "6.6": { - "cmt_id": "bf1bf09e6b599758851457f3999779622a48d015", - "fixed_version": "6.6.14" + "cmt_id": "0040386b0b7187bd9c9665ac8b6dad93420bce79", + "fixed_version": "6.6.18" }, "6.7": { - "cmt_id": "3d6f4a78b104c65e4256c3776c9949f49a1b459e", - "fixed_version": "6.7.2" + "cmt_id": "12b55cfdd3ab91c70cc945cf8b5f45984ea0abf1", + "fixed_version": "6.7.6" } }, - "CVE-2023-52451": { - "4.19": { - "cmt_id": "bb79613a9a704469ddb8d6c6029d532a5cea384c", - "fixed_version": "4.19.306" - }, - "5.10": { - "cmt_id": "b582aa1f66411d4adcc1aa55b8c575683fb4687e", - "fixed_version": "5.10.209" - }, - "5.15": { - "cmt_id": "999a27b3ce9a69d54ccd5db000ec3a447bc43e6d", - "fixed_version": "5.15.148" - }, - "5.4": { - "cmt_id": "9b5f03500bc5b083c0df696d7dd169d7ef3dd0c7", - "fixed_version": "5.4.268" - }, + "CVE-2024-26714": { "6.1": { - "cmt_id": "026fd977dc50ff4a5e09bfb0603557f104d3f3a0", - "fixed_version": "6.1.75" + "cmt_id": "6616d3c4f8284a7b3ef978c916566bd240cea1c7", + "fixed_version": "6.1.79" }, "6.6": { - "cmt_id": "df16afba2378d985359812c865a15c05c70a967e", - "fixed_version": "6.6.14" + "cmt_id": "d8e36ff40cf9dadb135f3a97341c02c9a7afcc43", + "fixed_version": "6.6.18" }, "6.7": { - "cmt_id": "708a4b59baad96c4718dc0bd3a3427d3ab22fedc", - "fixed_version": "6.7.2" + "cmt_id": "7a3a70dd08e4b7dffc2f86f2c68fc3812804b9d0", + "fixed_version": "6.7.6" } }, - "CVE-2023-52452": { + "CVE-2024-26715": { + "5.15": { + "cmt_id": "88936ceab6b426f1312327e9ef849c215c6007a7", + "fixed_version": "5.15.149" + }, + "6.1": { + "cmt_id": "57e2e42ccd3cd6183228269715ed032f44536751", + "fixed_version": "6.1.79" + }, "6.6": { - "cmt_id": "0954982db8283016bf38e9db2da5adf47a102e19", - "fixed_version": "6.6.14" + "cmt_id": "c7ebd8149ee519d27232e6e4940e9c02071b568b", + "fixed_version": "6.6.18" }, "6.7": { - "cmt_id": "fbcf372c8eda2290470268e0afb5ab5d5f5d5fde", - "fixed_version": "6.7.2" + "cmt_id": "36695d5eeeefe5a64b47d0336e7c8fc144e78182", + "fixed_version": "6.7.6" } }, - "CVE-2023-52453": { + "CVE-2024-26716": { "6.6": { - "cmt_id": "45f80b2f230df10600e6fa1b83b28bf1c334185e", - "fixed_version": "6.6.14" + "cmt_id": "ed85777c640cf9e6920bb1b60ed8cd48e1f4d873", + "fixed_version": "6.6.18" }, "6.7": { - "cmt_id": "6bda81e24a35a856f58e6a5786de579b07371603", - "fixed_version": "6.7.2" + "cmt_id": "465b545d1d7ef282192ddd4439b08279bdb13f6f", + "fixed_version": "6.7.6" } }, - "CVE-2023-52454": { - "5.10": { - "cmt_id": "f775f2621c2ac5cc3a0b3a64665dad4fb146e510", - "fixed_version": "5.10.209" - }, + "CVE-2024-26717": { "5.15": { - "cmt_id": "4cb3cf7177ae3666be7fb27d4ad4d72a295fb02d", - "fixed_version": "5.15.148" - }, - "5.4": { - "cmt_id": "ee5e7632e981673f42a50ade25e71e612e543d9d", - "fixed_version": "5.4.268" + "cmt_id": "62f5d219edbd174829aa18d4b3d97cd5fefbb783", + "fixed_version": "5.15.149" }, "6.1": { - "cmt_id": "2871aa407007f6f531fae181ad252486e022df42", - "fixed_version": "6.1.75" + "cmt_id": "d7d7a0e3b6f5adc45f23667cbb919e99093a5b5c", + "fixed_version": "6.1.79" }, "6.6": { - "cmt_id": "24e05760186dc070d3db190ca61efdbce23afc88", - "fixed_version": "6.6.14" + "cmt_id": "4cad91344a62536a2949873bad6365fbb6232776", + "fixed_version": "6.6.18" }, "6.7": { - "cmt_id": "70154e8d015c9b4fb56c1a2ef1fc8b83d45c7f68", - "fixed_version": "6.7.2" + "cmt_id": "e28d6b63aeecbda450935fb58db0e682ea8212d3", + "fixed_version": "6.7.6" } }, - "CVE-2023-52455": { + "CVE-2024-26718": { + "6.1": { + "cmt_id": "30884a44e0cedc3dfda8c22432f3ba4078ec2d94", + "fixed_version": "6.1.79" + }, "6.6": { - "cmt_id": "98b8a550da83cc392a14298c4b3eaaf0332ae6ad", - "fixed_version": "6.6.14" + "cmt_id": "5735a2671ffb70ea29ca83969fe01316ee2ed6fc", + "fixed_version": "6.6.18" }, "6.7": { - "cmt_id": "5e23e283910c9f30248732ae0770bcb0c9438abf", - "fixed_version": "6.7.2" + "cmt_id": "0c45a20cbe68bc4d681734f5c03891124a274257", + "fixed_version": "6.7.6" } }, - "CVE-2023-52456": { - "5.10": { - "cmt_id": "6e04a9d30509fb53ba6df5d655ed61d607a7cfda", - "fixed_version": "5.10.209" - }, - "5.15": { - "cmt_id": "ff168d4fdb0e1ba35fb413a749b3d6cce918ec19", - "fixed_version": "5.15.148" - }, - "6.1": { - "cmt_id": "63ee7be01a3f7d28b1ea8b8d7944f12bb7b0ed06", - "fixed_version": "6.1.75" - }, + "CVE-2024-26719": { "6.6": { - "cmt_id": "763cd68746317b5d746dc2649a3295c1efb41181", - "fixed_version": "6.6.14" + "cmt_id": "cc0037fa592d56e4abb9c7d1c52c4d2dc25cd906", + "fixed_version": "6.6.18" }, "6.7": { - "cmt_id": "9a662d06c22ddfa371958c2071dc350436be802b", - "fixed_version": "6.7.2" + "cmt_id": "985d053f7633d8b539ab1531738d538efac678a9", + "fixed_version": "6.7.6" } }, - "CVE-2023-52457": { + "CVE-2024-26720": { + "4.19": { + "cmt_id": "c593d26fb5d577ef31b6e49a31e08ae3ebc1bc1e", + "fixed_version": "4.19.307" + }, "5.10": { - "cmt_id": "bc57f3ef8a9eb0180606696f586a6dcfaa175ed0", - "fixed_version": "5.10.209" + "cmt_id": "81e7d2530d458548b90a5c5e76b77ad5e5d1c0df", + "fixed_version": "5.10.210" }, "5.15": { - "cmt_id": "828cd829483f0cda920710997aed79130b0af690", - "fixed_version": "5.15.148" + "cmt_id": "5099871b370335809c0fd1abad74d9c7c205d43f", + "fixed_version": "5.15.149" }, "5.4": { - "cmt_id": "b502fb43f7fb55aaf07f6092ab44657595214b93", - "fixed_version": "5.4.268" + "cmt_id": "1f12e4b3284d6c863f272eb2de0d4248ed211cf4", + "fixed_version": "5.4.269" }, "6.1": { - "cmt_id": "d74173bda29aba58f822175d983d07c8ed335494", - "fixed_version": "6.1.75" + "cmt_id": "16b1025eaa8fc223ab4273ece20d1c3a4211a95d", + "fixed_version": "6.1.79" }, "6.6": { - "cmt_id": "887a558d0298d36297daea039954c39940228d9b", - "fixed_version": "6.6.14" + "cmt_id": "ec18ec230301583395576915d274b407743d8f6c", + "fixed_version": "6.6.18" }, "6.7": { - "cmt_id": "95e4e0031effad9837af557ecbfd4294a4d8aeee", - "fixed_version": "6.7.2" + "cmt_id": "65977bed167a92e87085e757fffa5798f7314c9f", + "fixed_version": "6.7.6" } }, - "CVE-2023-52458": { - "5.15": { - "cmt_id": "5010c27120962c85d2f421d2cf211791c9603503", - "fixed_version": "5.15.148" - }, - "6.1": { - "cmt_id": "ef31cc87794731ffcb578a195a2c47d744e25fb8", - "fixed_version": "6.1.75" - }, - "6.6": { - "cmt_id": "cb16cc1abda18a9514106d2ac8c8d7abc0be5ed8", - "fixed_version": "6.6.14" - }, + "CVE-2024-26721": { "6.7": { - "cmt_id": "bcdc288e7bc008daf38ef0401b53e4a8bb61bbe5", - "fixed_version": "6.7.2" + "cmt_id": "ff5999fb03f467e1e7159f0ddb199c787f7512b9", + "fixed_version": "6.7.6" } }, - "CVE-2023-52459": { + "CVE-2024-26722": { + "6.7": { + "cmt_id": "ed5b8b735369b40d6c1f8ef3e62d369f74b4c491", + "fixed_version": "6.7.6" + } + }, + "CVE-2024-26723": { + "6.1": { + "cmt_id": "b9357489c46c7a43999964628db8b47d3a1f8672", + "fixed_version": "6.1.79" + }, "6.6": { - "cmt_id": "b7062628caeaec90e8f691ebab2d70f31b7b6b91", - "fixed_version": "6.6.14" + "cmt_id": "48fae67d837488c87379f0c9f27df7391718477c", + "fixed_version": "6.6.18" }, "6.7": { - "cmt_id": "49d82811428469566667f22749610b8c132cdb3e", - "fixed_version": "6.7.2" + "cmt_id": "2a492f01228b7d091dfe38974ef40dccf8f9f2f1", + "fixed_version": "6.7.6" } }, - "CVE-2023-52460": { + "CVE-2024-26724": { "6.7": { - "cmt_id": "6b80326efff093d037e0971831dca6ebddba9b45", - "fixed_version": "6.7.2" + "cmt_id": "1596126ea50228f0ed96697bae4e9368fda02c56", + "fixed_version": "6.7.6" } }, - "CVE-2023-52461": { + "CVE-2024-26725": { "6.7": { - "cmt_id": "1470d173925d697b497656b93f7c5bddae2e64b2", - "fixed_version": "6.7.2" + "cmt_id": "087739cbd0d0b87b6cec2c0799436ac66e24acc8", + "fixed_version": "6.7.6" } }, - "CVE-2023-52462": { + "CVE-2024-26726": { "6.1": { - "cmt_id": "fc3e3c50a0a4cac1463967c110686189e4a59104", - "fixed_version": "6.1.75" + "cmt_id": "02f2b95b00bf57d20320ee168b30fb7f3db8e555", + "fixed_version": "6.1.79" }, "6.6": { - "cmt_id": "8dc15b0670594543c356567a1a45b0182ec63174", - "fixed_version": "6.6.14" + "cmt_id": "7bddf18f474f166c19f91b2baf67bf7c5eda03f7", + "fixed_version": "6.6.18" }, "6.7": { - "cmt_id": "40617d45ea05535105e202a8a819e388a2b1f036", - "fixed_version": "6.7.2" + "cmt_id": "a4b7741c8302e28073bfc6dd1c2e73598e5e535e", + "fixed_version": "6.7.6" } }, - "CVE-2023-52463": { + "CVE-2024-26727": { "5.10": { - "cmt_id": "94c742324ed7e42c5bd6a9ed22e4ec6d764db4d8", - "fixed_version": "5.10.209" + "cmt_id": "3f5d47eb163bceb1b9e613c9003bae5fefc0046f", + "fixed_version": "5.10.210" }, "5.15": { - "cmt_id": "2aa141f8bc580f8f9811dfe4e0e6009812b73826", - "fixed_version": "5.15.148" + "cmt_id": "e31546b0f34af21738c4ceac47d662c00ee6382f", + "fixed_version": "5.15.149" }, "6.1": { - "cmt_id": "d4a9aa7db574a0da64307729cc031fb68597aa8b", - "fixed_version": "6.1.75" + "cmt_id": "66b317a2fc45b2ef66527ee3f8fa08fb5beab88d", + "fixed_version": "6.1.79" }, "6.6": { - "cmt_id": "0049fe7e4a85849bdd778cdb72e51a791ff3d737", - "fixed_version": "6.6.14" + "cmt_id": "833775656d447c545133a744a0ed1e189ce61430", + "fixed_version": "6.6.18" }, "6.7": { - "cmt_id": "d4a714873db0866cc471521114eeac4a5072d548", - "fixed_version": "6.7.2" + "cmt_id": "5a172344bfdabb46458e03708735d7b1a918c468", + "fixed_version": "6.7.6" } }, - "CVE-2023-52464": { - "4.19": { - "cmt_id": "71c17ee02538802ceafc830f0736aa35b564e601", - "fixed_version": "4.19.306" - }, - "5.10": { - "cmt_id": "6aa7865ba7ff7f0ede0035180fb3b9400ceb405a", - "fixed_version": "5.10.209" - }, - "5.15": { - "cmt_id": "700cf4bead80fac994dcc43ae1ca5d86d8959b21", - "fixed_version": "5.15.148" - }, - "5.4": { - "cmt_id": "5da3b6e7196f0b4f3728e4e25eb20233a9ddfaf6", - "fixed_version": "5.4.268" - }, - "6.1": { - "cmt_id": "9dbac9fdae6e3b411fc4c3fca3bf48f70609c398", - "fixed_version": "6.1.75" - }, + "CVE-2024-26728": { + "6.7": { + "cmt_id": "2d392f7268a1a9bfbd98c831f0f4c964e59aa145", + "fixed_version": "6.7.7" + } + }, + "CVE-2024-26729": { + "6.7": { + "cmt_id": "351080ba3414c96afff0f1338b4aeb2983195b80", + "fixed_version": "6.7.7" + } + }, + "CVE-2024-26730": { "6.6": { - "cmt_id": "e1c86511241588efffaa49556196f09a498d5057", - "fixed_version": "6.6.14" + "cmt_id": "f006c45a3ea424f8f6c8e4b9283bc245ce2a4d0f", + "fixed_version": "6.6.19" }, "6.7": { - "cmt_id": "426fae93c01dffa379225eb2bd4d3cdc42c6eec5", - "fixed_version": "6.7.2" + "cmt_id": "c196387820c9214c5ceaff56d77303c82514b8b1", + "fixed_version": "6.7.7" } }, - "CVE-2023-5345": { - "6.1": { - "cmt_id": "f555a508087ab8210b4658120ac6413d6fe2b4c7", - "fixed_version": "6.1.56" + "CVE-2024-26731": { + "6.6": { + "cmt_id": "9b099ed46dcaf1403c531ff02c3d7400fa37fa26", + "fixed_version": "6.6.19" }, - "6.5": { - "cmt_id": "0c116005af551e9cf437a9ec8c80204c2d4b1b53", - "fixed_version": "6.5.6" + "6.7": { + "cmt_id": "d61608a4e394f23e0dca099df9eb8e555453d949", + "fixed_version": "6.7.7" } }, - "CVE-2023-5633": { - "6.5": { - "cmt_id": "1474b39f961703d0bb33833a6d6b112826839781", - "fixed_version": "6.5.8" + "CVE-2024-26732": { + "6.7": { + "cmt_id": "897f75e2cde8a5f9f7529b55249af1fa4248c83b", + "fixed_version": "6.7.7" } }, - "CVE-2023-5717": { - "4.14": { - "cmt_id": "555e15e93f6dbb8ce6b5b92e5272473abfe8bd2b", - "fixed_version": "4.14.328" - }, - "4.19": { - "cmt_id": "a714491fa92d2068358dd603cc50bf2062517bd8", - "fixed_version": "4.19.297" - }, + "CVE-2024-26733": { "5.10": { - "cmt_id": "487a8e24643a0effb2ba19cad3227fc75dc3c4b7", - "fixed_version": "5.10.199" + "cmt_id": "dbc9b22d0ed319b4e29034ce0a3fe32a3ee2c587", + "fixed_version": "5.10.211" }, "5.15": { - "cmt_id": "71d224acc4d1df1b61a294abee0f1032a9b03b40", - "fixed_version": "5.15.137" - }, - "5.4": { - "cmt_id": "7252c8b981853bb8930de44fab924f947362683f", - "fixed_version": "5.4.259" + "cmt_id": "97eaa2955db4120ce6ec2ef123e860bc32232c50", + "fixed_version": "5.15.150" }, "6.1": { - "cmt_id": "f6952655a61264900ed08e9d642adad8222f8e29", - "fixed_version": "6.1.60" + "cmt_id": "f119f2325ba70cbfdec701000dcad4d88805d5b0", + "fixed_version": "6.1.80" }, - "6.5": { - "cmt_id": "20f925d38e1ecc1d36ee6bf6e325fb514a6f727d", - "fixed_version": "6.5.9" - } - }, - "CVE-2023-5972": { - "6.5": { - "cmt_id": "8a544721329e711f85358f73fe56964cdedeb531", - "fixed_version": "6.5.9" + "6.6": { + "cmt_id": "a3f2c083cb575d80a7627baf3339e78fedccbb91", + "fixed_version": "6.6.19" + }, + "6.7": { + "cmt_id": "3ab0d6f8289ba8402ca95a9fc61a34909d5e1f3a", + "fixed_version": "6.7.7" } }, - "CVE-2023-6039": { - "6.4": { - "cmt_id": "a54bf862ccad27c8b91795b69a9ca105f8e6295e", - "fixed_version": "6.4.10" + "CVE-2024-26734": { + "6.6": { + "cmt_id": "919092bd5482b7070ae66d1daef73b600738f3a2", + "fixed_version": "6.6.19" + }, + "6.7": { + "cmt_id": "e91d3561e28d7665f4f837880501dc8755f635a9", + "fixed_version": "6.7.7" } }, - "CVE-2023-6040": { + "CVE-2024-26735": { "4.19": { - "cmt_id": "087d38ae0fd5a9a41b949e97601b4b0d09336f19", - "fixed_version": "4.19.305" + "cmt_id": "953f42934533c151f440cd32390044d2396b87aa", + "fixed_version": "4.19.308" }, "5.10": { - "cmt_id": "25d1e7be85cf0a5afca5555f90e4609c40480ece", - "fixed_version": "5.10.208" + "cmt_id": "65c38f23d10ff79feea1e5d50b76dc7af383c1e6", + "fixed_version": "5.10.211" }, "5.15": { - "cmt_id": "ab3a3aadb373b47a1f401c7626608b1b214cec9e", - "fixed_version": "5.15.147" + "cmt_id": "91b020aaa1e59bfb669d34c968e3db3d5416bcee", + "fixed_version": "5.15.150" }, "5.4": { - "cmt_id": "8711fa0c06d49ad3a45b60cc10ae72980df89b00", - "fixed_version": "5.4.267" - } - }, - "CVE-2023-6111": { + "cmt_id": "82831e3ff76ef09fb184eb93b79a3eb3fb284f1d", + "fixed_version": "5.4.270" + }, + "6.1": { + "cmt_id": "8391b9b651cfdf80ab0f1dc4a489f9d67386e197", + "fixed_version": "6.1.80" + }, "6.6": { - "cmt_id": "80d6a9236ab6d2c0fd241514d1af2e325d16a210", - "fixed_version": "6.6.3" + "cmt_id": "9e02973dbc6a91e40aa4f5d87b8c47446fbfce44", + "fixed_version": "6.6.19" + }, + "6.7": { + "cmt_id": "02b08db594e8218cfbc0e4680d4331b457968a9b", + "fixed_version": "6.7.7" } }, - "CVE-2023-6121": { + "CVE-2024-26736": { "5.10": { - "cmt_id": "2be451e7a2f124899546c1bb5c6d509a927968c8", - "fixed_version": "5.10.203" + "cmt_id": "d9b5e2b7a8196850383c70d099bfd39e81ab6637", + "fixed_version": "5.10.211" }, "5.15": { - "cmt_id": "e26c6febac43a2dd2c5fb993b2137489005d43bf", - "fixed_version": "5.15.141" + "cmt_id": "e56662160fc24d28cb75ac095cc6415ae1bda43e", + "fixed_version": "5.15.150" }, "5.4": { - "cmt_id": "afbedd6136cbff0b4412efd09d98d2cb7348563c", - "fixed_version": "5.4.263" + "cmt_id": "5c27d85a69fa16a08813ba37ddfb4bbc9a1ed6b5", + "fixed_version": "5.4.270" }, "6.1": { - "cmt_id": "0e485f12ebb7b69b67c7f85195a1b4aad95d354a", - "fixed_version": "6.1.65" + "cmt_id": "e8530b170e464017203e3b8c6c49af6e916aece1", + "fixed_version": "6.1.80" }, "6.6": { - "cmt_id": "2291653c27236d34ca7df3bfd3427ce6e30c2d95", - "fixed_version": "6.6.4" + "cmt_id": "6e6065dd25b661420fac19c34282b6c626fcd35e", + "fixed_version": "6.6.19" + }, + "6.7": { + "cmt_id": "d34a5e57632bb5ff825196ddd9a48ca403626dfa", + "fixed_version": "6.7.7" } }, - "CVE-2023-6176": { - "5.10": { - "cmt_id": "a5096cc6e7836711541b7cd2d6da48d36fe420e9", - "fixed_version": "5.10.195" - }, + "CVE-2024-26737": { "5.15": { - "cmt_id": "481bd6dcc5fe6c0ec57b61240ab552f67ff51b6b", - "fixed_version": "5.15.132" + "cmt_id": "5268bb02107b9eedfdcd51db75b407d10043368c", + "fixed_version": "5.15.150" }, "6.1": { - "cmt_id": "7f4116c6f98412a6e29ace6d6a7b41ebb4e8a392", - "fixed_version": "6.1.54" + "cmt_id": "addf5e297e6cbf5341f9c07720693ca9ba0057b5", + "fixed_version": "6.1.80" }, - "6.5": { - "cmt_id": "74aecad5da19004ccf6321fd397d14b10756622a", - "fixed_version": "6.5.4" + "6.6": { + "cmt_id": "8327ed12e8ebc5436bfaa1786c49988894f9c8a6", + "fixed_version": "6.6.19" + }, + "6.7": { + "cmt_id": "7d80a9e745fa5b47da3bca001f186c02485c7c33", + "fixed_version": "6.7.7" } }, - "CVE-2023-6200": { + "CVE-2024-26738": { "6.6": { - "cmt_id": "b577b9aa1340ee7f36441b0740691550abaad5f2", - "fixed_version": "6.6.9" + "cmt_id": "b8315b2e25b4e68e42fcb74630f824b9a5067765", + "fixed_version": "6.6.19" + }, + "6.7": { + "cmt_id": "46e36ebd5e00a148b67ed77c1d31675996f77c25", + "fixed_version": "6.7.7" } }, - "CVE-2023-6531": { + "CVE-2024-26739": { + "6.6": { + "cmt_id": "28cdbbd38a4413b8eff53399b3f872fd4e80db9d", + "fixed_version": "6.6.19" + }, + "6.7": { + "cmt_id": "f4e294bbdca8ac8757db436fc82214f3882fc7e7", + "fixed_version": "6.7.7" + } + }, + "CVE-2024-26740": { + "6.6": { + "cmt_id": "7c787888d164689da8b1b115f3ef562c1e843af4", + "fixed_version": "6.6.19" + }, + "6.7": { + "cmt_id": "60ddea1600bc476e0f5e02bce0e29a460ccbf0be", + "fixed_version": "6.7.7" + } + }, + "CVE-2024-26741": { "6.1": { - "cmt_id": "f2f57f51b53be153a522300454ddb3887722fb2c", - "fixed_version": "6.1.68" + "cmt_id": "729bc77af438a6e67914c97f6f3d3af8f72c0131", + "fixed_version": "6.1.80" }, "6.6": { - "cmt_id": "5a33d385eb36991a91e3dddb189d8679e2aac2be", - "fixed_version": "6.6.7" + "cmt_id": "334a8348b2df26526f3298848ad6864285592caf", + "fixed_version": "6.6.19" + }, + "6.7": { + "cmt_id": "f8c4a6b850882bc47aaa864b720c7a2ee3102f39", + "fixed_version": "6.7.7" } }, - "CVE-2023-6546": { + "CVE-2024-26742": { + "6.1": { + "cmt_id": "3c31b18a8dd8b7bf36af1cd723d455853b8f94fe", + "fixed_version": "6.1.80" + }, + "6.6": { + "cmt_id": "4f5b15c15e6016efb3e14582d02cc4ddf57227df", + "fixed_version": "6.6.19" + }, + "6.7": { + "cmt_id": "b9433b25cb06c415c9cb24782599649a406c8d6d", + "fixed_version": "6.7.7" + } + }, + "CVE-2024-26743": { "5.10": { - "cmt_id": "869ce5e5984595bd2c62b598d977debc218b6f4d", - "fixed_version": "5.10.192" + "cmt_id": "5639414a52a29336ffa1ede80a67c6d927acbc5a", + "fixed_version": "5.10.211" }, "5.15": { - "cmt_id": "2a523446438376bb7c224f3169ae9b98ce0fb893", - "fixed_version": "5.15.128" + "cmt_id": "135e5465fefa463c5ec93c4eede48b9fedac894a", + "fixed_version": "5.15.150" }, "6.1": { - "cmt_id": "31311a9a4baae0ad47c85e448af21b2120344ff0", - "fixed_version": "6.1.47" + "cmt_id": "7f31a244c753aacf40b71d01f03ca6742f81bbbc", + "fixed_version": "6.1.80" }, - "6.4": { - "cmt_id": "f40e70d7f40bd44ecf6f35b946a899e59744fbe1", - "fixed_version": "6.4.12" - } - }, - "CVE-2023-6560": { "6.6": { - "cmt_id": "4be625ba36bcfdfb9c72b712acd4ef943a269ebb", - "fixed_version": "6.6.5" + "cmt_id": "95175dda017cd4982cd47960536fa1de003d3298", + "fixed_version": "6.6.19" + }, + "6.7": { + "cmt_id": "bab8875c06ebda5e01c5c4cab30022aed85c14e6", + "fixed_version": "6.7.7" } }, - "CVE-2023-6606": { + "CVE-2024-26744": { "4.19": { - "cmt_id": "89b6ae907c6bcc175bc95a67d6936217530a29ff", - "fixed_version": "4.19.304" + "cmt_id": "84f1dac960cfa210a3b7a7522e6c2320ae91932b", + "fixed_version": "4.19.308" }, "5.10": { - "cmt_id": "0c54b79d1d9b25f5a406bcf1969f956e14c4704d", - "fixed_version": "5.10.206" + "cmt_id": "5a5c039dac1b1b7ba3e91c791f4421052bf79b82", + "fixed_version": "5.10.211" }, "5.15": { - "cmt_id": "ded3cfdefec8b2accc767f176419316b61c157c3", - "fixed_version": "5.15.146" - }, - "5.4": { - "cmt_id": "508e2fdd978e4c26798eac2059f9520255904f82", - "fixed_version": "5.4.266" + "cmt_id": "989af2f29342a9a7c7515523d879b698ac8465f4", + "fixed_version": "5.15.150" }, "6.1": { - "cmt_id": "c60e10d1549f8748a68ec13dcd177c62843985ff", - "fixed_version": "6.1.70" + "cmt_id": "aee4dcfe17219fe60f2821923adea98549060af8", + "fixed_version": "6.1.80" }, "6.6": { - "cmt_id": "ac48fcef5ec2e9ac85c0b39045d874e60eac75d7", - "fixed_version": "6.6.9" + "cmt_id": "fe2a73d57319feab4b3b175945671ce43492172f", + "fixed_version": "6.6.19" + }, + "6.7": { + "cmt_id": "c99a827d3cff9f84e1cb997b7cc6386d107aa74d", + "fixed_version": "6.7.7" } }, - "CVE-2023-6610": { + "CVE-2024-26745": { "6.1": { - "cmt_id": "5411e3292792be7dafd1fe948a87e3ca29c1f550", - "fixed_version": "6.1.74" + "cmt_id": "7eb95e0af5c9c2e6fad50356eaf32d216d0e7bc3", + "fixed_version": "6.1.81" }, "6.6": { - "cmt_id": "c5e0ed716c52fddea5e625668e75658c3b81d3fc", - "fixed_version": "6.6.13" + "cmt_id": "d4d1e4b1513d975961de7bb4f75e450a92d65ebf", + "fixed_version": "6.6.21" + }, + "6.7": { + "cmt_id": "5da6d306f315344af1ca2eff4bd9b10b130f0c28", + "fixed_version": "6.7.9" } }, - "CVE-2023-6622": { - "5.15": { - "cmt_id": "cf5f113c41eb2c7dbe19d849a0883f7a429fa54b", - "fixed_version": "5.15.143" - }, - "6.1": { - "cmt_id": "96f8654b701f772af5f358b91807ce2836ff3444", - "fixed_version": "6.1.68" - }, + "CVE-2024-26746": { "6.6": { - "cmt_id": "5eeba00a89c5c6be4e45b69bef20d1d1b9edb968", - "fixed_version": "6.6.7" + "cmt_id": "5e3022ea42e490a36ec6f2cfa6fc603deb0bace4", + "fixed_version": "6.6.21" + }, + "6.7": { + "cmt_id": "bb71e040323175e18c233a9afef32ba14fa64eb7", + "fixed_version": "6.7.9" } }, - "CVE-2023-6817": { + "CVE-2024-26747": { "5.10": { - "cmt_id": "bf72b44fe81be08a9fcd58aabf417cd3337ffc99", - "fixed_version": "5.10.204" + "cmt_id": "e279bf8e51893e1fe160b3d8126ef2dd00f661e1", + "fixed_version": "5.10.211" }, "5.15": { - "cmt_id": "e65128616faa101b336e52fefbd62b83bb309916", - "fixed_version": "5.15.143" + "cmt_id": "ef982fc41055fcebb361a92288d3225783d12913", + "fixed_version": "5.15.150" }, "6.1": { - "cmt_id": "189c2a82933c67ad360c421258d5449f6647544a", - "fixed_version": "6.1.68" + "cmt_id": "0158216805ca7e498d07de38840d2732166ae5fa", + "fixed_version": "6.1.80" }, "6.6": { - "cmt_id": "c66d39f18e0ef16bac8c8491b657051f531a1eba", - "fixed_version": "6.6.7" + "cmt_id": "4b45829440b1b208948b39cc71f77a37a2536734", + "fixed_version": "6.6.19" + }, + "6.7": { + "cmt_id": "01f82de440f2ab07c259b7573371e1c42e5565db", + "fixed_version": "6.7.7" } }, - "CVE-2023-6915": { + "CVE-2024-26748": { "5.10": { - "cmt_id": "dbf8b0d9387fa02de0aa047ce23eb3a7bd134e03", - "fixed_version": "5.10.209" + "cmt_id": "1e204a8e9eb514e22a6567fb340ebb47df3f3a48", + "fixed_version": "5.10.211" }, "5.15": { - "cmt_id": "5dbcdaf4dbfe074e9142991c5c28eef789c1f6c6", - "fixed_version": "5.15.148" + "cmt_id": "3a2a909942b5335b7ea66366d84261b3ed5f89c8", + "fixed_version": "5.15.150" }, "5.4": { - "cmt_id": "ef7152f8705fed11796641d7644acc3c950b5967", - "fixed_version": "5.4.268" + "cmt_id": "aad6132ae6e4809e375431f8defd1521985e44e7", + "fixed_version": "5.4.270" }, "6.1": { - "cmt_id": "9efdc0081ccae62c44a929e21d32bacc5f2e113f", - "fixed_version": "6.1.74" + "cmt_id": "9a52b694b066f299d8b9800854a8503457a8b64c", + "fixed_version": "6.1.80" }, "6.6": { - "cmt_id": "ffcaafdb8be64555e9928d943a3655c755dba92b", - "fixed_version": "6.6.13" + "cmt_id": "70e8038813f9d3e72df966748ebbc40efe466019", + "fixed_version": "6.6.19" + }, + "6.7": { + "cmt_id": "92d20406a3d4ff3e8be667c79209dc9ed31df5b3", + "fixed_version": "6.7.7" } }, - "CVE-2023-6931": { - "4.19": { - "cmt_id": "f5d6ab016792c9d6d5280fdb7f8962eb3b8c620e", - "fixed_version": "4.19.302" - }, + "CVE-2024-26749": { "5.10": { - "cmt_id": "208dd116f96ea19e5d38d7b80fce49bc5ce1bbe8", - "fixed_version": "5.10.204" + "cmt_id": "b40328eea93c75a5645891408010141a0159f643", + "fixed_version": "5.10.211" }, "5.15": { - "cmt_id": "ebc7597ce9719d2ff72e13df072680aa491f27fb", - "fixed_version": "5.15.143" + "cmt_id": "4e5c73b15d95452c1ba9c771dd013a3fbe052ff3", + "fixed_version": "5.15.150" }, "5.4": { - "cmt_id": "152f51d159f35b2f64d7046429703500375becc9", - "fixed_version": "5.4.264" + "cmt_id": "cfa9abb5570c489dabf6f7fb3a066cc576fc8824", + "fixed_version": "5.4.270" }, "6.1": { - "cmt_id": "06dec254c59afd01b7a44838cf8bfc382bef019b", - "fixed_version": "6.1.68" + "cmt_id": "2134e9906e17b1e5284300fab547869ebacfd7d9", + "fixed_version": "6.1.80" }, "6.6": { - "cmt_id": "cfe9295db0932f1b8e0d94ffc75521898e5a5a8a", - "fixed_version": "6.6.7" + "cmt_id": "29e42e1578a10c611b3f1a38f3229b2d664b5d16", + "fixed_version": "6.6.19" + }, + "6.7": { + "cmt_id": "9a07244f614bc417de527b799da779dcae780b5d", + "fixed_version": "6.7.7" } }, - "CVE-2023-6932": { - "4.14": { - "cmt_id": "be70b329c7fcb4a90c33546dc7c34bff07975b60", - "fixed_version": "4.14.332" - }, + "CVE-2024-26751": { "4.19": { - "cmt_id": "6b6f5c6671fdfde9c94efe6409fa9f39436017e7", - "fixed_version": "4.19.301" + "cmt_id": "9e200a06ae2abb321939693008290af32b33dd6e", + "fixed_version": "4.19.308" }, "5.10": { - "cmt_id": "772fe1da9a8d4dcd8993abaecbde04789c52a4c2", - "fixed_version": "5.10.203" + "cmt_id": "70d92abbe29692a3de8697ae082c60f2d21ab482", + "fixed_version": "5.10.211" }, "5.15": { - "cmt_id": "c4a00c47a140c39a0497a40b0f54cf4586a2b1d7", - "fixed_version": "5.15.142" + "cmt_id": "eec6cbbfa1e8d685cc245cfd5626d0715a127a48", + "fixed_version": "5.15.150" }, "5.4": { - "cmt_id": "7ccf772a8bad7962d12d48723447c3605a6e23c1", - "fixed_version": "5.4.263" + "cmt_id": "999a8bb70da2946336327b4480824d1691cae1fa", + "fixed_version": "5.4.270" }, "6.1": { - "cmt_id": "94445d9583079e0ccc5dde1370076ff24800d86e", - "fixed_version": "6.1.66" + "cmt_id": "786f089086b505372fb3f4f008d57e7845fff0d8", + "fixed_version": "6.1.80" }, "6.6": { - "cmt_id": "bf8601dabed0c134a7d58085824e3e466840c5d1", - "fixed_version": "6.6.5" + "cmt_id": "97ba7c1f9c0a2401e644760d857b2386aa895997", + "fixed_version": "6.6.19" + }, + "6.7": { + "cmt_id": "6abe0895b63c20de06685c8544b908c7e413efa8", + "fixed_version": "6.7.7" } }, - "CVE-2023-7192": { - "4.14": { - "cmt_id": "8df5f3b50d9ce523251edf9cd0470963be20004b", - "fixed_version": "4.14.308" - }, + "CVE-2024-26752": { "4.19": { - "cmt_id": "43b9a9c78e37a5532c2a9260dff9d9989f2bbb23", - "fixed_version": "4.19.276" + "cmt_id": "4c3ce64bc9d36ca9164dd6c77ff144c121011aae", + "fixed_version": "4.19.308" }, "5.10": { - "cmt_id": "1ff0b87df98b93e10ced45773aa7d35377355421", - "fixed_version": "5.10.173" + "cmt_id": "dcb4d14268595065c85dc5528056713928e17243", + "fixed_version": "5.10.211" }, "5.15": { - "cmt_id": "af41b3cd9a9245f482b8855bd3c62c6f04ae68ab", - "fixed_version": "5.15.100" + "cmt_id": "0da15a70395182ee8cb75716baf00dddc0bea38d", + "fixed_version": "5.15.150" }, "5.4": { - "cmt_id": "5d0d38805d3234ca2cd6fbeb74d706348f4bbc43", - "fixed_version": "5.4.235" + "cmt_id": "c1d3a84a67db910ce28a871273c992c3d7f9efb5", + "fixed_version": "5.4.270" }, "6.1": { - "cmt_id": "4f25d1dff80535f088b8f8568dd731fb098e29b4", - "fixed_version": "6.1.18" + "cmt_id": "13cd1daeea848614e585b2c6ecc11ca9c8ab2500", + "fixed_version": "6.1.80" }, - "6.2": { - "cmt_id": "033ac6ea4b513f9a4a20882f431f68cea307ba87", - "fixed_version": "6.2.5" + "6.6": { + "cmt_id": "804bd8650a3a2bf3432375f8c97d5049d845ce56", + "fixed_version": "6.6.19" + }, + "6.7": { + "cmt_id": "83340c66b498e49353530e41542500fc8a4782d6", + "fixed_version": "6.7.7" } }, - "CVE-2024-0193": { - "5.10": { - "cmt_id": "73117ea03363d4493bd4e9f82f29b34b92d88a91", - "fixed_version": "5.10.206" - }, - "5.15": { - "cmt_id": "d10f7540c5541ad9f4fe2a02a73153d25d4a540d", - "fixed_version": "5.15.146" - }, + "CVE-2024-26753": { "6.1": { - "cmt_id": "0105571f80edb96f81bb4bbdd5233a9130dc345b", - "fixed_version": "6.1.71" + "cmt_id": "62f361bfea60c6afc3df09c1ad4152e6507f6f47", + "fixed_version": "6.1.80" }, "6.6": { - "cmt_id": "b7f1c01b55ad2a5da12f08e5ec3c76dabb99882a", - "fixed_version": "6.6.10" + "cmt_id": "b0365460e945e1117b47cf7329d86de752daff63", + "fixed_version": "6.6.19" }, "6.7": { - "cmt_id": "7315dc1e122c85ffdfc8defffbb8f8b616c2eb1a", - "fixed_version": "6.7" + "cmt_id": "ef1e47d50324e232d2da484fe55a54274eeb9bc1", + "fixed_version": "6.7.7" } }, - "CVE-2024-0340": { + "CVE-2024-26754": { "4.19": { - "cmt_id": "95eab1039625d54d1770665756dd34e9fe926638", - "fixed_version": "4.19.307" + "cmt_id": "f0ecdfa679189d26aedfe24212d4e69e42c2c861", + "fixed_version": "4.19.308" }, "5.10": { - "cmt_id": "cda4ca038cafe016bd8dcac8cac83d771dfdcbf0", - "fixed_version": "5.10.210" + "cmt_id": "2e534fd15e5c2ca15821c897352cf0e8a3e30dca", + "fixed_version": "5.10.211" }, "5.15": { - "cmt_id": "be38f291fd4d106be66370debd23d625c576023e", - "fixed_version": "5.15.149" + "cmt_id": "a576308800be28f2eaa099e7caad093b97d66e77", + "fixed_version": "5.15.150" }, "5.4": { - "cmt_id": "88c7e1e7a6b82d38ff82ca446862f3d5de34192a", - "fixed_version": "5.4.269" + "cmt_id": "f8cbd1791900b5d96466eede8e9439a5b9ca4de7", + "fixed_version": "5.4.270" }, "6.1": { - "cmt_id": "4675661672e3730597babf97c4e9593a775c8917", - "fixed_version": "6.1.78" + "cmt_id": "3963f16cc7643b461271989b712329520374ad2a", + "fixed_version": "6.1.80" + }, + "6.6": { + "cmt_id": "ba6b8b02a3314e62571a540efa96560888c5f03e", + "fixed_version": "6.6.19" + }, + "6.7": { + "cmt_id": "5013bd54d283eda5262c9ae3bcc966d01daf8576", + "fixed_version": "6.7.7" } }, - "CVE-2024-0443": { - "6.3": { - "cmt_id": "0f6090d90f627d8c58f939067d6c6821ce1b3c68", - "fixed_version": "6.3.9" + "CVE-2024-26755": { + "6.7": { + "cmt_id": "60d6130d0ac1d883ed93c2a1e10aadb60967fd48", + "fixed_version": "6.7.7" + } + }, + "CVE-2024-26756": { + "6.7": { + "cmt_id": "13b520fb62b772e408f9b79c5fe18ad414e90417", + "fixed_version": "6.7.7" + } + }, + "CVE-2024-26757": { + "6.7": { + "cmt_id": "2ea169c5a0b1134d573d07fc27a16f327ad0e7d3", + "fixed_version": "6.7.7" + } + }, + "CVE-2024-26758": { + "6.7": { + "cmt_id": "a55f0d6179a19c6b982e2dc344d58c98647a3be0", + "fixed_version": "6.7.7" + } + }, + "CVE-2024-26759": { + "6.1": { + "cmt_id": "2dedda77d4493f3e92e414b272bfa60f1f51ed95", + "fixed_version": "6.1.80" + }, + "6.6": { + "cmt_id": "305152314df82b22cf9b181f3dc5fc411002079a", + "fixed_version": "6.6.19" + }, + "6.7": { + "cmt_id": "d183a4631acfc7af955c02a02e739cec15f5234d", + "fixed_version": "6.7.7" } }, - "CVE-2024-0562": { - "5.15": { - "cmt_id": "f96b9f7c1676923bce871e728bb49c0dfa5013cc", - "fixed_version": "5.15.64" + "CVE-2024-26760": { + "6.1": { + "cmt_id": "f49b20fd0134da84a6bd8108f9e73c077b7d6231", + "fixed_version": "6.1.80" }, - "5.19": { - "cmt_id": "9a6c710f3bc10bc9cc23e1c080b53245b7f9d5b7", - "fixed_version": "5.19.6" + "6.6": { + "cmt_id": "4ebc079f0c7dcda1270843ab0f38ab4edb8f7921", + "fixed_version": "6.6.19" + }, + "6.7": { + "cmt_id": "1cfe9489fb563e9a0c9cdc5ca68257a44428c2ec", + "fixed_version": "6.7.7" } }, - "CVE-2024-0565": { + "CVE-2024-26761": { "6.1": { - "cmt_id": "9f528a8e68327117837b5e28b096f52af4c26a05", - "fixed_version": "6.1.69" + "cmt_id": "031217128990d7f0ab8c46db1afb3cf1e075fd29", + "fixed_version": "6.1.80" }, "6.6": { - "cmt_id": "534733397da26de0303057ce0b93a22bda150365", - "fixed_version": "6.6.8" + "cmt_id": "2cc1a530ab31c65b52daf3cb5d0883c8b614ea69", + "fixed_version": "6.6.19" + }, + "6.7": { + "cmt_id": "3a3181a71935774bda2398451256d7441426420b", + "fixed_version": "6.7.7" } }, - "CVE-2024-0582": { - "6.6": { - "cmt_id": "7138ebbe65caf65f52b923d4ef819c77d04ea671", - "fixed_version": "6.6.5" + "CVE-2024-26762": { + "6.7": { + "cmt_id": "21e5e84f3f63fdf44e49642a6e45cd895e921a84", + "fixed_version": "6.7.7" } }, - "CVE-2024-0584": { - "4.14": { - "cmt_id": "be70b329c7fcb4a90c33546dc7c34bff07975b60", - "fixed_version": "4.14.332" - }, + "CVE-2024-26763": { "4.19": { - "cmt_id": "6b6f5c6671fdfde9c94efe6409fa9f39436017e7", - "fixed_version": "4.19.301" + "cmt_id": "43a202bd552976497474ae144942e32cc5f34d7e", + "fixed_version": "4.19.308" }, "5.10": { - "cmt_id": "772fe1da9a8d4dcd8993abaecbde04789c52a4c2", - "fixed_version": "5.10.203" + "cmt_id": "3c652f6fa1e1f9f02c3fbf359d260ad153ec5f90", + "fixed_version": "5.10.211" }, "5.15": { - "cmt_id": "c4a00c47a140c39a0497a40b0f54cf4586a2b1d7", - "fixed_version": "5.15.142" + "cmt_id": "1a4371db68a31076afbe56ecce34fbbe6c80c529", + "fixed_version": "5.15.150" }, "5.4": { - "cmt_id": "7ccf772a8bad7962d12d48723447c3605a6e23c1", - "fixed_version": "5.4.263" + "cmt_id": "0dccbb93538fe89a86c6de31d4b1c8c560848eaa", + "fixed_version": "5.4.270" }, "6.1": { - "cmt_id": "94445d9583079e0ccc5dde1370076ff24800d86e", - "fixed_version": "6.1.66" + "cmt_id": "e08c2a8d27e989f0f5b0888792643027d7e691e6", + "fixed_version": "6.1.80" }, "6.6": { - "cmt_id": "bf8601dabed0c134a7d58085824e3e466840c5d1", - "fixed_version": "6.6.5" + "cmt_id": "64ba01a365980755732972523600a961c4266b75", + "fixed_version": "6.6.19" + }, + "6.7": { + "cmt_id": "d9e3763a505e50ba3bd22846f2a8db99429fb857", + "fixed_version": "6.7.7" } }, - "CVE-2024-0607": { + "CVE-2024-26764": { "4.19": { - "cmt_id": "fca41e5b687e029f69e3a35a2fa31e2560e538dc", - "fixed_version": "4.19.307" + "cmt_id": "337b543e274fe7a8f47df3c8293cc6686ffa620f", + "fixed_version": "4.19.308" }, "5.10": { - "cmt_id": "9a865a11d6890d4a789db1eaafebdc8bd092b12c", - "fixed_version": "5.10.210" + "cmt_id": "ea1cd64d59f22d6d13f367d62ec6e27b9344695f", + "fixed_version": "5.10.211" }, "5.15": { - "cmt_id": "b8b514b2a6cdfac24911e4910461bcb9db15ca8d", - "fixed_version": "5.15.140" + "cmt_id": "d7b6fa97ec894edd02f64b83e5e72e1aa352f353", + "fixed_version": "5.15.150" }, "5.4": { - "cmt_id": "25b42be4e067e107a2559266b54bf07fa5b094fb", - "fixed_version": "5.4.269" + "cmt_id": "b4eea7a05ee0ab5ab0514421e6ba8c5d249cf942", + "fixed_version": "5.4.270" }, "6.1": { - "cmt_id": "18a169810cff769a7a697b35058c756805f589e0", - "fixed_version": "6.1.64" - }, - "6.5": { - "cmt_id": "1a605657adc58b3c8e2c1c66aaa5fecd29072135", - "fixed_version": "6.5.13" + "cmt_id": "18f614369def2a11a52f569fe0f910b199d13487", + "fixed_version": "6.1.80" }, "6.6": { - "cmt_id": "013deed31ab15ef287b0045e4e7bd8f250e75b94", - "fixed_version": "6.6.3" + "cmt_id": "e7e23fc5d5fe422827c9a43ecb579448f73876c7", + "fixed_version": "6.6.19" + }, + "6.7": { + "cmt_id": "1dc7d74fe456944a9b1c57bd776280249f441ac6", + "fixed_version": "6.7.7" } }, - "CVE-2024-0639": { - "5.15": { - "cmt_id": "1fba2510b52f0bb9f408700e78db6d8d0ed6bcd5", - "fixed_version": "5.15.121" - }, + "CVE-2024-26765": { "6.1": { - "cmt_id": "1aa5a6a6d28c77e364feaba35ff7f12d2d74fec1", - "fixed_version": "6.1.39" + "cmt_id": "a262b78dd085dbe9b3c75dc1d9c4cd102b110b53", + "fixed_version": "6.1.80" }, - "6.4": { - "cmt_id": "f8d77336af38e71435f92c5f271fd0b40f33fe66", - "fixed_version": "6.4.4" + "6.6": { + "cmt_id": "dffdf7c783ef291eef38a5a0037584fd1a7fa464", + "fixed_version": "6.6.19" + }, + "6.7": { + "cmt_id": "8bf2ca8c60712af288b88ba80f8e4df4573d923f", + "fixed_version": "6.7.7" } }, - "CVE-2024-0641": { + "CVE-2024-26766": { + "4.19": { + "cmt_id": "115b7f3bc1dce590a6851a2dcf23dc1100c49790", + "fixed_version": "4.19.308" + }, "5.10": { - "cmt_id": "6a24d0661fa389c241d935da38e0f6a5ee8eb1ae", - "fixed_version": "5.10.198" + "cmt_id": "3f38d22e645e2e994979426ea5a35186102ff3c2", + "fixed_version": "5.10.211" }, "5.15": { - "cmt_id": "24fb22bddb71c6bfbe0fe25e1b7f793c5b580918", - "fixed_version": "5.15.135" + "cmt_id": "47ae64df23ed1318e27bd9844e135a5e1c0e6e39", + "fixed_version": "5.15.150" + }, + "5.4": { + "cmt_id": "5833024a9856f454a964a198c63a57e59e07baf5", + "fixed_version": "5.4.270" }, "6.1": { - "cmt_id": "143e72757a902abcecd5f487553f44dc19a56cfc", - "fixed_version": "6.1.57" + "cmt_id": "52dc9a7a573dbf778625a0efca0fca55489f084b", + "fixed_version": "6.1.80" }, - "6.5": { - "cmt_id": "aa1a21681b94f59c67ca56601e05dc1573ecb6cb", - "fixed_version": "6.5.7" + "6.2": { + "cmt_id": "0ef9594936d1f078e8599a1cf683b052df2bec00", + "fixed_version": "6.2.3" + }, + "6.6": { + "cmt_id": "a2fef1d81becf4ff60e1a249477464eae3c3bc2a", + "fixed_version": "6.6.19" + }, + "6.7": { + "cmt_id": "9034a1bec35e9f725315a3bb6002ef39666114d9", + "fixed_version": "6.7.7" } }, - "CVE-2024-0646": { - "5.10": { - "cmt_id": "c6b2a6b827d4b2d0f36b520e54e083df9b330a7b", - "fixed_version": "5.10.208" + "CVE-2024-26767": { + "6.6": { + "cmt_id": "71783d1ff65204d69207fd156d4b2eb1d3882375", + "fixed_version": "6.6.19" }, - "5.15": { - "cmt_id": "ba5efd8544fa62ae85daeb36077468bf2ce974ab", - "fixed_version": "5.15.147" + "6.7": { + "cmt_id": "beea9ab9080cd2ef46296070bb327af066ee09d7", + "fixed_version": "6.7.7" + } + }, + "CVE-2024-26768": { + "6.6": { + "cmt_id": "88e189bd16e5889e44a41b3309558ebab78b9280", + "fixed_version": "6.6.19" }, - "5.4": { - "cmt_id": "c67bf30baf261b467988fd40668bc893b71586b9", - "fixed_version": "5.4.267" + "6.7": { + "cmt_id": "0f6810e39898af2d2cabd9313e4dbc945fb5dfdd", + "fixed_version": "6.7.7" + } + }, + "CVE-2024-26769": { + "5.15": { + "cmt_id": "5e0bc09a52b6169ce90f7ac6e195791adb16cec4", + "fixed_version": "5.15.150" }, "6.1": { - "cmt_id": "9b3d3a7f3c4d710c1dd3f723851c3eeaf42642bc", - "fixed_version": "6.1.69" + "cmt_id": "9e6987f8937a7bd7516aa52f25cb7e12c0c92ee8", + "fixed_version": "6.1.80" }, "6.6": { - "cmt_id": "eb30a025982f61910f32e99778db3c0ceceaff5c", - "fixed_version": "6.6.7" + "cmt_id": "eaf0971fdabf2a93c1429dc6bedf3bbe85dffa30", + "fixed_version": "6.6.19" + }, + "6.7": { + "cmt_id": "1d86f79287206deec36d63b89c741cf542b6cadd", + "fixed_version": "6.7.7" } }, - "CVE-2024-0775": { - "4.14": { - "cmt_id": "7dd95a282809fec91e54867a92e271064284ad98", - "fixed_version": "4.14.315" - }, - "4.19": { - "cmt_id": "37302d4c2724dc92be5f90a3718eafa29834d586", - "fixed_version": "4.19.283" + "CVE-2024-26770": { + "6.6": { + "cmt_id": "83527a13740f57b45f162e3af4c7db4b88521100", + "fixed_version": "6.6.19" }, + "6.7": { + "cmt_id": "e71cc4a1e584293deafff1a7dea614b0210d0443", + "fixed_version": "6.7.7" + } + }, + "CVE-2024-26771": { "5.10": { - "cmt_id": "37c69da3adc45fc34df0b8d07a158a6fa5b2a3f7", - "fixed_version": "5.10.180" + "cmt_id": "c432094aa7c9970f2fa10d2305d550d3810657ce", + "fixed_version": "5.10.211" }, "5.15": { - "cmt_id": "b2f1314e6e36e2322554e5e6e9598eedd349d942", - "fixed_version": "5.15.112" - }, - "5.4": { - "cmt_id": "2dda2029067106f0835655a0417f1a5eaf3ba0b0", - "fixed_version": "5.4.243" + "cmt_id": "4fe4e5adc7d29d214c59b59f61db73dec505ca3d", + "fixed_version": "5.15.150" }, "6.1": { - "cmt_id": "25c9fca7b71c5045d6dc537430af5b2e79598fa1", - "fixed_version": "6.1.29" + "cmt_id": "9d508c897153ae8dd79303f7f035f078139f6b49", + "fixed_version": "6.1.80" }, - "6.2": { - "cmt_id": "d2e11d152824deeeaa0d70eb8906a65261838ce2", - "fixed_version": "6.2.16" + "6.6": { + "cmt_id": "7b24760f3a3c7ae1a176d343136b6c25174b7b27", + "fixed_version": "6.6.19" }, - "6.3": { - "cmt_id": "536ecbd569cb99b2e8a4422c43926590c7893aef", - "fixed_version": "6.3.3" + "6.7": { + "cmt_id": "f2a5e30d1e9a629de6179fa23923a318d5feb29e", + "fixed_version": "6.7.7" } }, - "CVE-2024-1085": { + "CVE-2024-26772": { + "4.19": { + "cmt_id": "5a6dcc4ad0f7f7fa8e8d127b5526e7c5f2d38a43", + "fixed_version": "4.19.308" + }, + "5.10": { + "cmt_id": "ffeb72a80a82aba59a6774b0611f792e0ed3b0b7", + "fixed_version": "5.10.211" + }, "5.15": { - "cmt_id": "c9ed30eea4f7bfa2441235ce23abd339ee671f50", - "fixed_version": "5.15.148" + "cmt_id": "8de8305a25bfda607fc13475ebe84b978c96d7ff", + "fixed_version": "5.15.150" + }, + "5.4": { + "cmt_id": "6b92b1bc16d691c95b152c6dbf027ad64315668d", + "fixed_version": "5.4.270" }, "6.1": { - "cmt_id": "a372f1d01bc11aa85773a02353cd01aaf16dc18e", - "fixed_version": "6.1.75" + "cmt_id": "d639102f4cbd4cb65d1225dba3b9265596aab586", + "fixed_version": "6.1.80" }, "6.6": { - "cmt_id": "7baa33837ee2473eb0afd9755e29a25cd3771eac", - "fixed_version": "6.6.14" + "cmt_id": "d3bbe77a76bc52e9d4d0a120f1509be36e25c916", + "fixed_version": "6.6.19" }, "6.7": { - "cmt_id": "7e0f5f8ae3e5f17e367f7040ade7a467f1f0e3b9", - "fixed_version": "6.7.2" + "cmt_id": "21dbe20589c7f48e9c5d336ce6402bcebfa6d76a", + "fixed_version": "6.7.7" } }, - "CVE-2024-1086": { + "CVE-2024-26773": { "4.19": { - "cmt_id": "8365e9d92b85fda975a5ece7a3a139cb964018c8", - "fixed_version": "4.19.307" + "cmt_id": "21f8cfe79f776287459343e9cfa6055af61328ea", + "fixed_version": "4.19.308" }, "5.10": { - "cmt_id": "55a60251fa50d4e68175e36666b536a602ce4f6c", - "fixed_version": "5.10.210" + "cmt_id": "927794a02169778c9c2e7b25c768ab3ea8c1dc03", + "fixed_version": "5.10.211" }, "5.15": { - "cmt_id": "960cf4f812530f01f6acc6878ceaa5404c06af7b", - "fixed_version": "5.15.149" + "cmt_id": "4c21fa60a6f4606f6214a38f50612b17b2f738f5", + "fixed_version": "5.15.150" }, "5.4": { - "cmt_id": "4e66422f1b56149761dc76030e6345d1cca6f869", - "fixed_version": "5.4.269" + "cmt_id": "260fc96283c0f594de18a1b045faf6d8fb42874d", + "fixed_version": "5.4.270" }, "6.1": { - "cmt_id": "8e34430e33b8a80bc014f3efe29cac76bc30a4b4", - "fixed_version": "6.1.76" + "cmt_id": "f97e75fa4e12b0aa0224e83fcbda8853ac2adf36", + "fixed_version": "6.1.80" }, "6.6": { - "cmt_id": "6653118b176a00915125521c6572ae8e507621db", - "fixed_version": "6.6.15" + "cmt_id": "0184747b552d6b5a14db3b7fcc3b792ce64dedd1", + "fixed_version": "6.6.19" }, "6.7": { - "cmt_id": "f05a497e7bc8851eeeb3a58da180ba469efebb05", - "fixed_version": "6.7.3" + "cmt_id": "a2576ae9a35c078e488f2c573e9e6821d651fbbe", + "fixed_version": "6.7.7" } }, - "CVE-2024-1151": { - "5.10": { - "cmt_id": "55cfccb658fc142d7fbfeae2d0496b7841d128c3", - "fixed_version": "5.10.210" - }, + "CVE-2024-26774": { "5.15": { - "cmt_id": "c45f2fa92cb273f77be33b60a120ff7cf6df8085", - "fixed_version": "5.15.149" + "cmt_id": "687061cfaa2ac3095170e136dd9c29a4974f41d4", + "fixed_version": "5.15.150" }, "6.1": { - "cmt_id": "65ded4eb220695909eee657758e824fc30f0b561", - "fixed_version": "6.1.79" + "cmt_id": "8b40eb2e716b503f7a4e1090815a17b1341b2150", + "fixed_version": "6.1.80" }, "6.6": { - "cmt_id": "5eeb2a9eaa5bc6e0aa655ac72a931b78f8f9b365", - "fixed_version": "6.6.18" + "cmt_id": "f32d2a745b02123258026e105a008f474f896d6a", + "fixed_version": "6.6.19" }, "6.7": { - "cmt_id": "da05eb129c0208ef907420480c5859083408dc2c", - "fixed_version": "6.7.6" + "cmt_id": "8cf9cc602cfb40085967c0d140e32691c8b71cf3", + "fixed_version": "6.7.7" } }, - "CVE-2024-1312": { - "6.4": { - "cmt_id": "93a0b7d43de51b38c4c91d4121e447018132119a", - "fixed_version": "6.4.10" + "CVE-2024-26775": { + "6.1": { + "cmt_id": "2d623c94fbba3554f4446ba6f3c764994e8b0d26", + "fixed_version": "6.1.80" + }, + "6.6": { + "cmt_id": "673629018ba04906899dcb631beec34d871f709c", + "fixed_version": "6.6.19" + }, + "6.7": { + "cmt_id": "19a77b27163820f793b4d022979ffdca8f659b77", + "fixed_version": "6.7.7" } }, - "CVE-2024-22705": { + "CVE-2024-26776": { + "5.10": { + "cmt_id": "e94da8aca2e78ef9ecca02eb211869eacd5504e5", + "fixed_version": "5.10.211" + }, "5.15": { - "cmt_id": "d739f2b6d8f57aa9377362cd8c0b1152a4dd6bd5", - "fixed_version": "5.15.146" + "cmt_id": "0399d7eba41d9b28f5bdd7757ec21a5b7046858d", + "fixed_version": "5.15.150" }, "6.1": { - "cmt_id": "7a3bbbadac4be9d30b45e9f1134e94294f79ce77", - "fixed_version": "6.1.71" + "cmt_id": "f19361d570c67e7e014896fa2dacd7d721bf0aa8", + "fixed_version": "6.1.80" }, "6.6": { - "cmt_id": "7d5f219f1ef69f27eb8cbfb794d634fc9c4d24ac", - "fixed_version": "6.6.10" + "cmt_id": "d637b5118274701e8448f35953877daf04df18b4", + "fixed_version": "6.6.19" + }, + "6.7": { + "cmt_id": "e4168ac25b4bd378bd7dda322d589482a136c1fd", + "fixed_version": "6.7.7" } }, - "CVE-2024-23849": { + "CVE-2024-26777": { "4.19": { - "cmt_id": "344350bfa3b4b37d7c3d5a00536e6fbf0e953fbf", - "fixed_version": "4.19.307" + "cmt_id": "84246c35ca34207114055a87552a1c4289c8fd7e", + "fixed_version": "4.19.308" }, "5.10": { - "cmt_id": "5ae8d50044633306ff160fcf7faa24994175efe1", - "fixed_version": "5.10.210" + "cmt_id": "cd36da760bd1f78c63c7078407baf01dd724f313", + "fixed_version": "5.10.211" }, "5.15": { - "cmt_id": "00d1ee8e1d02194f7b7b433e904e04bbcd2cc0dc", - "fixed_version": "5.15.149" + "cmt_id": "df6e2088c6f4cad539cf67cba2d6764461e798d1", + "fixed_version": "5.15.150" }, "5.4": { - "cmt_id": "a37ae111db5e0f7e3d6b692056c30e3e0f6f79cd", - "fixed_version": "5.4.269" + "cmt_id": "6db07619d173765bd8622d63809cbfe361f04207", + "fixed_version": "5.4.270" }, "6.1": { - "cmt_id": "71024928b3f71ce4529426f8692943205c58d30b", - "fixed_version": "6.1.76" + "cmt_id": "f329523f6a65c3bbce913ad35473d83a319d5d99", + "fixed_version": "6.1.80" }, "6.6": { - "cmt_id": "7a73190ea557e7f26914b0fe04c1f57a96cb771f", - "fixed_version": "6.6.15" + "cmt_id": "99f1abc34a6dde248d2219d64aa493c76bbdd9eb", + "fixed_version": "6.6.19" }, "6.7": { - "cmt_id": "0b787c2dea15e7a2828fa3a74a5447df4ed57711", - "fixed_version": "6.7.3" + "cmt_id": "1d11dd3ea5d039c7da089f309f39c4cd363b924b", + "fixed_version": "6.7.7" } }, - "CVE-2024-23850": { + "CVE-2024-26778": { + "4.19": { + "cmt_id": "224453de8505aede1890f007be973925a3edf6a1", + "fixed_version": "4.19.308" + }, "5.10": { - "cmt_id": "3f5d47eb163bceb1b9e613c9003bae5fefc0046f", - "fixed_version": "5.10.210" + "cmt_id": "512ee6d6041e007ef5bf200c6e388e172a2c5b24", + "fixed_version": "5.10.211" }, "5.15": { - "cmt_id": "e31546b0f34af21738c4ceac47d662c00ee6382f", - "fixed_version": "5.15.149" + "cmt_id": "8c54acf33e5adaad6374bf3ec1e3aff0591cc8e1", + "fixed_version": "5.15.150" + }, + "5.4": { + "cmt_id": "84dce0f6a4cc5b7bfd7242ef9290db8ac1dd77ff", + "fixed_version": "5.4.270" }, "6.1": { - "cmt_id": "66b317a2fc45b2ef66527ee3f8fa08fb5beab88d", - "fixed_version": "6.1.79" + "cmt_id": "070398d32c5f3ab0e890374904ad94551c76aec4", + "fixed_version": "6.1.80" }, "6.6": { - "cmt_id": "833775656d447c545133a744a0ed1e189ce61430", - "fixed_version": "6.6.18" + "cmt_id": "bc3c2e58d73b28b9a8789fca84778ee165a72d13", + "fixed_version": "6.6.19" }, "6.7": { - "cmt_id": "5a172344bfdabb46458e03708735d7b1a918c468", - "fixed_version": "6.7.6" + "cmt_id": "a9ca4e80d23474f90841251f4ac0d941fa337a01", + "fixed_version": "6.7.7" } }, - "CVE-2024-23851": { + "CVE-2024-26779": { + "4.19": { + "cmt_id": "76fad1174a0cae6fc857b9f88b261a2e4f07d587", + "fixed_version": "4.19.308" + }, "5.10": { - "cmt_id": "a891a0621e725e85529985139cada8cb5a74a116", - "fixed_version": "5.10.210" + "cmt_id": "5ffab99e070b9f8ae0cf60c3c3602b84eee818dd", + "fixed_version": "5.10.211" }, "5.15": { - "cmt_id": "888a0a46b80fa37eacfe81faf47ba0b83876251d", - "fixed_version": "5.15.149" + "cmt_id": "88c18fd06608b3adee547102505d715f21075c9d", + "fixed_version": "5.15.150" + }, + "5.4": { + "cmt_id": "85720b69aef177318f4a18efbcc4302228a340e5", + "fixed_version": "5.4.270" }, "6.1": { - "cmt_id": "c5d83ac2bf6ca668a39ffb1a576899a66153ba19", - "fixed_version": "6.1.79" + "cmt_id": "eb39bb548bf974acad7bd6780fe11f9e6652d696", + "fixed_version": "6.1.80" }, "6.6": { - "cmt_id": "438d19492b7f002334573bae43276297eb234c80", - "fixed_version": "6.6.18" + "cmt_id": "54b79d8786964e2f840e8a2ec4a9f9a50f3d4954", + "fixed_version": "6.6.19" }, "6.7": { - "cmt_id": "cd70175481f63af31901dd463e44386f033c3f4c", - "fixed_version": "6.7.6" + "cmt_id": "281280276b70c822f55ce15b661f6d1d3228aaa9", + "fixed_version": "6.7.7" } }, - "CVE-2024-24860": { + "CVE-2024-26782": { "5.10": { - "cmt_id": "394c6c0b6d9bdd7d6ebca35ca9cfbabf44c0c257", - "fixed_version": "5.10.209" + "cmt_id": "f74362a004225df935863dea6eb7d82daaa5b16e", + "fixed_version": "5.10.212" }, "5.15": { - "cmt_id": "4c71c01df8ef209e7fe22b58666cd2cf3dbafb44", - "fixed_version": "5.15.148" + "cmt_id": "4a4eeb6912538c2d0b158e8d11b62d96c1dada4e", + "fixed_version": "5.15.151" }, "6.1": { - "cmt_id": "96860d9ad462db61f4eeb09934235c38eab655c4", - "fixed_version": "6.1.75" + "cmt_id": "d93fd40c62397326046902a2c5cb75af50882a85", + "fixed_version": "6.1.81" }, "6.6": { - "cmt_id": "f56e715ef1c19c42c6aa6cb9280947dea13aab2e", - "fixed_version": "6.6.14" + "cmt_id": "ce0809ada38dca8d6d41bb57ab40494855c30582", + "fixed_version": "6.6.21" }, "6.7": { - "cmt_id": "d1c6a77d6d48215ba723f910eaabdb6e60d21a37", - "fixed_version": "6.7.2" + "cmt_id": "85933e80d077c9ae2227226beb86c22f464059cc", + "fixed_version": "6.7.9" } }, - "CVE-2024-25744": { - "6.1": { - "cmt_id": "b8ec27ae221eee458b15b700706db311474ac619", - "fixed_version": "6.1.68" - }, + "CVE-2024-26783": { "6.6": { - "cmt_id": "34c686e5be2fa1c03ae09568159a9ef37d1c7cf5", - "fixed_version": "6.6.7" + "cmt_id": "d6159bd4c00594249e305bfe02304c67c506264e", + "fixed_version": "6.6.22" + }, + "6.7": { + "cmt_id": "bdd21eed8b72f9e28d6c279f6db258e090c79080", + "fixed_version": "6.7.9" } }, - "CVE-2024-26581": { - "6.6": { - "cmt_id": "b734f7a47aeb32a5ba298e4ccc16bb0c52b6dbf7", - "fixed_version": "6.6.17" - }, + "CVE-2024-26784": { "6.7": { - "cmt_id": "6eb14441f10602fa1cf691da9d685718b68b78a9", - "fixed_version": "6.7.5" + "cmt_id": "f6aaf131e4d4a9a26040ecc018eb70ab8b3d355d", + "fixed_version": "6.7.9" } }, - "CVE-2024-26582": { - "6.1": { - "cmt_id": "20b4ed034872b4d024b26e2bc1092c3f80e5db96", - "fixed_version": "6.1.79" - }, + "CVE-2024-26785": { + "6.7": { + "cmt_id": "fc719ecbca45c9c046640d72baddba3d83e0bc0b", + "fixed_version": "6.7.9" + } + }, + "CVE-2024-26786": { "6.6": { - "cmt_id": "d684763534b969cca1022e2a28645c7cc91f7fa5", - "fixed_version": "6.6.18" + "cmt_id": "f1fb745ee0a6fe43f1d84ec369c7e6af2310fda9", + "fixed_version": "6.6.21" }, "6.7": { - "cmt_id": "754c9bab77a1b895b97bd99d754403c505bc79df", - "fixed_version": "6.7.6" + "cmt_id": "9526a46cc0c378d381560279bea9aa34c84298a0", + "fixed_version": "6.7.9" } }, - "CVE-2024-26583": { + "CVE-2024-26787": { + "5.10": { + "cmt_id": "0224cbc53ba82b84affa7619b6d1b1a254bc2c53", + "fixed_version": "5.10.213" + }, + "5.15": { + "cmt_id": "5ae5060e17a3fc38e54c3e5bd8abd6b1d5bfae7c", + "fixed_version": "5.15.152" + }, "6.1": { - "cmt_id": "7a3ca06d04d589deec81f56229a9a9d62352ce01", - "fixed_version": "6.1.79" + "cmt_id": "70af82bb9c897faa25a44e4181f36c60312b71ef", + "fixed_version": "6.1.81" }, "6.6": { - "cmt_id": "86dc27ee36f558fe223dbdfbfcb6856247356f4a", - "fixed_version": "6.6.18" + "cmt_id": "176e66269f0de327375fc0ea51c12c2f5a97e4c4", + "fixed_version": "6.6.21" }, "6.7": { - "cmt_id": "6209319b2efdd8524691187ee99c40637558fa33", - "fixed_version": "6.7.6" + "cmt_id": "d610a307225951929b9dff807788439454476f85", + "fixed_version": "6.7.9" } }, - "CVE-2024-26584": { + "CVE-2024-26788": { + "5.10": { + "cmt_id": "9579a21e99fe8dab22a253050ddff28d340d74e1", + "fixed_version": "5.10.212" + }, + "5.15": { + "cmt_id": "4529c084a320be78ff2c5e64297ae998c6fdf66b", + "fixed_version": "5.15.151" + }, + "5.4": { + "cmt_id": "3cc5fb824c2125aa3740d905b3e5b378c8a09478", + "fixed_version": "5.4.271" + }, + "6.1": { + "cmt_id": "474d521da890b3e3585335fb80a6044cb2553d99", + "fixed_version": "6.1.81" + }, "6.6": { - "cmt_id": "13eca403876bbea3716e82cdfe6f1e6febb38754", - "fixed_version": "6.6.18" + "cmt_id": "a69c8bbb946936ac4eb6a6ae1e849435aa8d947d", + "fixed_version": "6.6.21" }, "6.7": { - "cmt_id": "ab6397f072e5097f267abf5cb08a8004e6b17694", - "fixed_version": "6.7.6" + "cmt_id": "677102a930643c31f1b4c512b041407058bdfef8", + "fixed_version": "6.7.9" } }, - "CVE-2024-26585": { + "CVE-2024-26789": { + "6.1": { + "cmt_id": "034e2d70b5c7f578200ad09955aeb2aa65d1164a", + "fixed_version": "6.1.81" + }, "6.6": { - "cmt_id": "6db22d6c7a6dc914b12c0469b94eb639b6a8a146", - "fixed_version": "6.6.18" + "cmt_id": "1291d278b5574819a7266568ce4c28bce9438705", + "fixed_version": "6.6.21" }, "6.7": { - "cmt_id": "e327ed60bff4a991cd7a709c47c4f0c5b4a4fd57", - "fixed_version": "6.7.6" + "cmt_id": "9e8ecd4908b53941ab6f0f51584ab80c6c6606c4", + "fixed_version": "6.7.9" } }, - "CVE-2024-26586": { + "CVE-2024-26790": { "5.10": { - "cmt_id": "56750ea5d15426b5f307554e7699e8b5f76c3182", - "fixed_version": "5.10.209" + "cmt_id": "bb3a06e9b9a30e33d96aadc0e077be095a4f8580", + "fixed_version": "5.10.212" }, "5.15": { - "cmt_id": "348112522a35527c5bcba933b9fefb40a4f44f15", - "fixed_version": "5.15.148" + "cmt_id": "106c1ac953a66556ec77456c46e818208d3a9bce", + "fixed_version": "5.15.151" + }, + "5.4": { + "cmt_id": "518d78b4fac68cac29a263554d7f3b19da99d0da", + "fixed_version": "5.4.271" }, "6.1": { - "cmt_id": "6fd24675188d354b1cad47462969afa2ab09d819", - "fixed_version": "6.1.79" + "cmt_id": "237ecf1afe6c22534fa43abdf2bf0b0f52de0aaa", + "fixed_version": "6.1.81" }, "6.6": { - "cmt_id": "2f5e1565740490706332c06f36211d4ce0f88e62", - "fixed_version": "6.6.14" + "cmt_id": "5b696e9c388251f1c7373be92293769a489fd367", + "fixed_version": "6.6.21" }, "6.7": { - "cmt_id": "a361c2c1da5dbb13ca67601cf961ab3ad68af383", - "fixed_version": "6.7.2" + "cmt_id": "ad2f8920c314e0a2d9e984fc94b729eca3cda471", + "fixed_version": "6.7.9" } }, - "CVE-2024-26587": { + "CVE-2024-26791": { + "4.19": { + "cmt_id": "11d7a2e429c02d51e2dc90713823ea8b8d3d3a84", + "fixed_version": "4.19.309" + }, + "5.10": { + "cmt_id": "2886fe308a83968dde252302884a1e63351cf16d", + "fixed_version": "5.10.212" + }, + "5.15": { + "cmt_id": "ab2d68655d0f04650bef09fee948ff80597c5fb9", + "fixed_version": "5.15.151" + }, + "5.4": { + "cmt_id": "c6652e20d7d783d060fe5f987eac7b5cabe31311", + "fixed_version": "5.4.271" + }, + "6.1": { + "cmt_id": "f590040ce2b712177306b03c2a63b16f7d48d3c8", + "fixed_version": "6.1.81" + }, "6.6": { - "cmt_id": "08aca65997fb6f233066883b1f1e653bcb1f26ca", - "fixed_version": "6.6.14" + "cmt_id": "b1690ced4d2d8b28868811fb81cd33eee5aefee1", + "fixed_version": "6.6.21" }, "6.7": { - "cmt_id": "c5068e442eed063d2f1658e6b6d3c1c6fcf1e588", - "fixed_version": "6.7.2" + "cmt_id": "343eecb4ff49a7b1cc1dfe86958a805cf2341cfb", + "fixed_version": "6.7.9" } }, - "CVE-2024-26588": { + "CVE-2024-26793": { + "4.19": { + "cmt_id": "01129059d5141d62fae692f7a336ae3bc712d3eb", + "fixed_version": "4.19.309" + }, + "5.10": { + "cmt_id": "e668b92a3a01429923fd5ca13e99642aab47de69", + "fixed_version": "5.10.212" + }, + "5.15": { + "cmt_id": "9376d059a705c5dfaac566c2d09891242013ae16", + "fixed_version": "5.15.151" + }, + "5.4": { + "cmt_id": "ec92aa2cab6f0048f10d6aa4f025c5885cb1a1b6", + "fixed_version": "5.4.271" + }, "6.1": { - "cmt_id": "4631c2dd69d928bca396f9f58baeddf85e14ced5", - "fixed_version": "6.1.75" + "cmt_id": "abd32d7f5c0294c1b2454c5a3b13b18446bac627", + "fixed_version": "6.1.81" }, "6.6": { - "cmt_id": "9aeb09f4d85a87bac46c010d75a2ea299d462f28", - "fixed_version": "6.6.14" + "cmt_id": "93dd420bc41531c9a31498b9538ca83ba6ec191e", + "fixed_version": "6.6.21" }, "6.7": { - "cmt_id": "7924ade13a49c0067da6ea13e398102979c0654a", - "fixed_version": "6.7.2" + "cmt_id": "5366969a19a8a0d2ffb3d27ef6e8905e5e4216f8", + "fixed_version": "6.7.9" } }, - "CVE-2024-26589": { + "CVE-2024-26795": { + "5.10": { + "cmt_id": "8af1c121b0102041809bc137ec600d1865eaeedd", + "fixed_version": "5.10.212" + }, "5.15": { - "cmt_id": "29ffa63f21bcdcef3e36b03cccf9d0cd031f6ab0", - "fixed_version": "5.15.148" + "cmt_id": "5941a90c55d3bfba732b32208d58d997600b44ef", + "fixed_version": "5.15.151" }, "6.1": { - "cmt_id": "4108b86e324da42f7ed425bd71632fd844300dc8", - "fixed_version": "6.1.75" + "cmt_id": "8310080799b40fd9f2a8b808c657269678c149af", + "fixed_version": "6.1.81" }, "6.6": { - "cmt_id": "e8d3872b617c21100c5ee4f64e513997a68c2e3d", - "fixed_version": "6.6.14" + "cmt_id": "a278d5c60f21aa15d540abb2f2da6e6d795c3e6e", + "fixed_version": "6.6.21" }, "6.7": { - "cmt_id": "1b500d5d6cecf98dd6ca88bc9e7ae1783c83e6d3", - "fixed_version": "6.7.2" + "cmt_id": "2a1728c15ec4f45ed9248ae22f626541c179bfbe", + "fixed_version": "6.7.9" } }, - "CVE-2024-26590": { + "CVE-2024-26796": { "6.6": { - "cmt_id": "823ba1d2106019ddf195287ba53057aee33cf724", - "fixed_version": "6.6.14" + "cmt_id": "e0d17ee872cf8d0f51cc561329b8e1a0aa792bbb", + "fixed_version": "6.6.21" }, "6.7": { - "cmt_id": "eed24b816e50c6cd18cbee0ff0d7218c8fced199", - "fixed_version": "6.7.2" + "cmt_id": "e4f50e85de5a6b21dfdc0d7ca435eba4f62935c3", + "fixed_version": "6.7.9" } }, - "CVE-2024-26591": { + "CVE-2024-26797": { + "6.7": { + "cmt_id": "50a6302cf881f67f1410461a68fe9eabd00ff31d", + "fixed_version": "6.7.9" + } + }, + "CVE-2024-26798": { "5.15": { - "cmt_id": "a7b98aa10f895e2569403896f2d19b73b6c95653", - "fixed_version": "5.15.148" + "cmt_id": "20a4b5214f7bee13c897477168c77bbf79683c3d", + "fixed_version": "5.15.151" }, "6.1": { - "cmt_id": "6cc9c0af0aa06f781fa515a1734b1a4239dfd2c0", - "fixed_version": "6.1.75" + "cmt_id": "2f91a96b892fab2f2543b4a55740c5bee36b1a6b", + "fixed_version": "6.1.81" }, "6.6": { - "cmt_id": "8c8bcd45e9b10eef12321f08d2e5be33d615509c", - "fixed_version": "6.6.14" + "cmt_id": "73a6bd68a1342f3a44cac9dffad81ad6a003e520", + "fixed_version": "6.6.21" }, "6.7": { - "cmt_id": "50ae82f080cf87e84828f066c31723b781d68f5b", - "fixed_version": "6.7.2" + "cmt_id": "a2c881413dcc5d801bdc9535e51270cc88cb9cd8", + "fixed_version": "6.7.9" } }, - "CVE-2024-26592": { - "5.15": { - "cmt_id": "999daf367b924fdf14e9d83e034ee0f86bc17ec6", - "fixed_version": "5.15.149" - }, - "6.1": { - "cmt_id": "380965e48e9c32ee4263c023e1d830ea7e462ed1", - "fixed_version": "6.1.75" - }, + "CVE-2024-26799": { "6.6": { - "cmt_id": "24290ba94cd0136e417283b0dbf8fcdabcf62111", - "fixed_version": "6.6.14" + "cmt_id": "99adc8b4d2f38bf0d06483ec845bc48f60c3f8cf", + "fixed_version": "6.6.21" }, "6.7": { - "cmt_id": "69d54650b751532d1e1613a4fb433e591aeef126", - "fixed_version": "6.7.2" + "cmt_id": "d5a7726e6ea62d447b79ab5baeb537ea6bdb225b", + "fixed_version": "6.7.9" } }, - "CVE-2024-26593": { + "CVE-2024-26801": { + "4.19": { + "cmt_id": "e0b278650f07acf2e0932149183458468a731c03", + "fixed_version": "4.19.309" + }, "5.10": { - "cmt_id": "7a14b8a477b88607d157c24aeb23e7389ec3319f", - "fixed_version": "5.10.210" + "cmt_id": "6dd0a9dfa99f8990a08eb8fdd8e79bee31c7d8e2", + "fixed_version": "5.10.212" }, "5.15": { - "cmt_id": "1f8d0691c50581ba6043f009ec9e8b9f78f09d5a", - "fixed_version": "5.15.149" + "cmt_id": "da4569d450b193e39e87119fd316c0291b585d14", + "fixed_version": "5.15.151" }, "5.4": { - "cmt_id": "d074d5ff5ae77b18300e5079c6bda6342a4d44b7", - "fixed_version": "5.4.269" + "cmt_id": "98fb98fd37e42fd4ce13ff657ea64503e24b6090", + "fixed_version": "5.4.271" }, "6.1": { - "cmt_id": "491528935c9c48bf341d8b40eabc6c4fc5df6f2c", - "fixed_version": "6.1.79" + "cmt_id": "45085686b9559bfbe3a4f41d3d695a520668f5e1", + "fixed_version": "6.1.81" }, "6.6": { - "cmt_id": "6be99c51829b24c914cef5bff6164877178e84d9", - "fixed_version": "6.6.18" + "cmt_id": "2ab9a19d896f5a0dd386e1f001c5309bc35f433b", + "fixed_version": "6.6.21" }, "6.7": { - "cmt_id": "609c7c1cc976e740d0fed4dbeec688b3ecb5dce2", - "fixed_version": "6.7.6" + "cmt_id": "dd594cdc24f2e48dab441732e6dfcafd6b0711d1", + "fixed_version": "6.7.9" } }, - "CVE-2024-26594": { + "CVE-2024-26802": { "5.15": { - "cmt_id": "dd1de9268745f0eac83a430db7afc32cbd62e84b", - "fixed_version": "5.15.149" + "cmt_id": "8e99556301172465c8fe33c7f78c39a3d4ce8462", + "fixed_version": "5.15.151" }, "6.1": { - "cmt_id": "6eb8015492bcc84e40646390e50a862b2c0529c9", - "fixed_version": "6.1.75" + "cmt_id": "17ccd9798fe0beda3db212cfa3ebe373f605cbd6", + "fixed_version": "6.1.81" }, "6.6": { - "cmt_id": "a2b21ef1ea4cf632d19b3a7cc4d4245b8e63202a", - "fixed_version": "6.6.14" + "cmt_id": "699b103e48ce32d03fc86c35b37ee8ae4288c7e3", + "fixed_version": "6.6.21" }, "6.7": { - "cmt_id": "5e6dfec95833edc54c48605a98365a7325e5541e", - "fixed_version": "6.7.2" + "cmt_id": "f72cf22dccc94038cbbaa1029cb575bf52e5cbc8", + "fixed_version": "6.7.9" } }, - "CVE-2024-26595": { + "CVE-2024-26803": { + "5.15": { + "cmt_id": "f011c103e654d83dc85f057a7d1bd0960d02831c", + "fixed_version": "5.15.151" + }, + "6.1": { + "cmt_id": "7985d73961bbb4e726c1be7b9cd26becc7be8325", + "fixed_version": "6.1.81" + }, "6.6": { - "cmt_id": "817840d125a370626895df269c50c923b79b0a39", - "fixed_version": "6.6.14" + "cmt_id": "16edf51f33f52dff70ed455bc40a6cc443c04664", + "fixed_version": "6.6.21" }, "6.7": { - "cmt_id": "d0a1efe417c97a1e9b914056ee6b86f1ef75fe1f", - "fixed_version": "6.7.2" + "cmt_id": "8f7a3894e58e6f5d5815533cfde60e3838947941", + "fixed_version": "6.7.9" } }, - "CVE-2024-26596": { + "CVE-2024-26804": { + "5.10": { + "cmt_id": "2e95350fe9db9d53c701075060ac8ac883b68aee", + "fixed_version": "5.10.212" + }, + "5.15": { + "cmt_id": "afec0c5cd2ed71ca95a8b36a5e6d03333bf34282", + "fixed_version": "5.15.151" + }, + "5.4": { + "cmt_id": "f81e94d2dcd2397137edcb8b85f4c5bed5d22383", + "fixed_version": "5.4.271" + }, + "6.1": { + "cmt_id": "ab63de24ebea36fe73ac7121738595d704b66d96", + "fixed_version": "6.1.81" + }, + "6.6": { + "cmt_id": "a0a1db40b23e8ff86dea2786c5ea1470bb23ecb9", + "fixed_version": "6.6.21" + }, "6.7": { - "cmt_id": "dbd909c20c11f0d29c0054d41e0d1f668a60e8c8", - "fixed_version": "6.7.2" + "cmt_id": "049d7989c67e8dd50f07a2096dbafdb41331fb9b", + "fixed_version": "6.7.9" } }, - "CVE-2024-26597": { + "CVE-2024-26805": { "4.19": { - "cmt_id": "093dab655808207f7a9f54cf156240aeafc70590", - "fixed_version": "4.19.306" + "cmt_id": "ec343a55b687a452f5e87f3b52bf9f155864df65", + "fixed_version": "4.19.309" }, "5.10": { - "cmt_id": "2295c22348faf795e1ccdf618f6eb7afdb2f7447", - "fixed_version": "5.10.209" + "cmt_id": "f19d1f98e60e68b11fc60839105dd02a30ec0d77", + "fixed_version": "5.10.212" }, "5.15": { - "cmt_id": "3b5254862258b595662a0ccca6e9eeb88d6e7468", - "fixed_version": "5.15.148" + "cmt_id": "c71ed29d15b1a1ed6c464f8c3536996963046285", + "fixed_version": "5.15.151" }, "5.4": { - "cmt_id": "02467ab8b404d80429107588e0f3425cf5fcd2e5", - "fixed_version": "5.4.268" + "cmt_id": "9ae51361da43270f4ba0eb924427a07e87e48777", + "fixed_version": "5.4.271" }, "6.1": { - "cmt_id": "ee1dc3bf86f2df777038506b139371a9add02534", - "fixed_version": "6.1.75" + "cmt_id": "0b27bf4c494d61e5663baa34c3edd7ccebf0ea44", + "fixed_version": "6.1.81" }, "6.6": { - "cmt_id": "c4734535034672f59f2652e1e0058c490da62a5c", - "fixed_version": "6.6.14" + "cmt_id": "d3ada42e534a83b618bbc1e490d23bf0fdae4736", + "fixed_version": "6.6.21" }, "6.7": { - "cmt_id": "17d06a5c44d8fd2e8e61bac295b09153496f87e1", - "fixed_version": "6.7.2" + "cmt_id": "59fc3e3d049e39e7d0d271f20dd5fb47c57faf1d", + "fixed_version": "6.7.9" } }, - "CVE-2024-26598": { + "CVE-2024-26806": { + "6.7": { + "cmt_id": "041562ebc4759c9932b59a06527f8753b86da365", + "fixed_version": "6.7.9" + } + }, + "CVE-2024-26807": { + "6.6": { + "cmt_id": "03f1573c9587029730ca68503f5062105b122f61", + "fixed_version": "6.6.21" + }, + "6.7": { + "cmt_id": "34e1d5c4407c78de0e3473e1fbf8fb74dbe66d03", + "fixed_version": "6.7.9" + } + }, + "CVE-2024-26808": { "5.10": { - "cmt_id": "ba7be666740847d967822bed15500656b26bc703", - "fixed_version": "5.10.209" + "cmt_id": "9489e214ea8f2a90345516016aa51f2db3a8cc2f", + "fixed_version": "5.10.210" }, "5.15": { - "cmt_id": "12c2759ab1343c124ed46ba48f27bd1ef5d2dff4", - "fixed_version": "5.15.148" - }, - "5.4": { - "cmt_id": "d04acadb6490aa3314f9c9e087691e55de153b88", - "fixed_version": "5.4.269" + "cmt_id": "70f17b48c86622217a58d5099d29242fc9adac58", + "fixed_version": "5.15.149" }, "6.1": { - "cmt_id": "dba788e25f05209adf2b0175eb1691dc89fb1ba6", - "fixed_version": "6.1.75" + "cmt_id": "af149a46890e8285d1618bd68b8d159bdb87fdb3", + "fixed_version": "6.1.76" }, "6.6": { - "cmt_id": "65b201bf3e9af1b0254243a5881390eda56f72d1", - "fixed_version": "6.6.14" + "cmt_id": "e5888acbf1a3d8d021990ce6c6061fd5b2bb21b4", + "fixed_version": "6.6.15" }, "6.7": { - "cmt_id": "dd3956a1b3dd11f46488c928cb890d6937d1ca80", - "fixed_version": "6.7.2" + "cmt_id": "36a0a80f32209238469deb481967d777a3d539ee", + "fixed_version": "6.7.3" } }, - "CVE-2024-26599": { + "CVE-2024-26809": { + "5.10": { + "cmt_id": "b36b83297ff4910dfc8705402c8abffd4bbf8144", + "fixed_version": "5.10.214" + }, + "5.15": { + "cmt_id": "362508506bf545e9ce18c72a2c48dcbfb891ab9c", + "fixed_version": "5.15.153" + }, "6.1": { - "cmt_id": "7b85554c7c2aee91171e038e4d5442ffa130b282", - "fixed_version": "6.1.75" + "cmt_id": "5ad233dc731ab64cdc47b84a5c1f78fff6c024af", + "fixed_version": "6.1.83" }, "6.6": { - "cmt_id": "e5f2b4b62977fb6c2efcbc5779e0c9dce18215f7", - "fixed_version": "6.6.14" + "cmt_id": "ff90050771412b91e928093ccd8736ae680063c2", + "fixed_version": "6.6.23" }, "6.7": { - "cmt_id": "bae45b7ebb31984b63b13c3519fd724b3ce92123", - "fixed_version": "6.7.2" + "cmt_id": "821e28d5b506e6a73ccc367ff792bd894050d48b", + "fixed_version": "6.7.11" } } } \ No newline at end of file